Lines Matching full:verify

342 	/* verify PROT_READ *is* allowed */  in mfd_assert_read()
355 /* verify MAP_PRIVATE is *always* allowed (even writable) */ in mfd_assert_read()
374 /* verify PROT_READ and MAP_SHARED *is* allowed */ in mfd_assert_read_shared()
430 * verify everything else here. in mfd_assert_write()
433 /* verify write() succeeds */ in mfd_assert_write()
441 /* verify PROT_READ | PROT_WRITE is allowed */ in mfd_assert_write()
455 /* verify PROT_WRITE is allowed */ in mfd_assert_write()
469 /* verify PROT_READ with MAP_SHARED is allowed and a following in mfd_assert_write()
491 /* verify PUNCH_HOLE works */ in mfd_assert_write()
508 /* verify write() fails */ in mfd_fail_write()
515 /* verify PROT_READ | PROT_WRITE is not allowed */ in mfd_fail_write()
527 /* verify PROT_WRITE is not allowed */ in mfd_fail_write()
539 /* Verify PROT_READ with MAP_SHARED with a following mprotect is not in mfd_fail_write()
556 /* verify PUNCH_HOLE fails */ in mfd_fail_write()
743 /* verify that file mode bits did not change */ in mfd_fail_chmod()
815 * Verify syscall-argument validation, including name checks, flag validation
837 /* verify "" is a valid name */ in test_create()
841 /* verify invalid O_* open flags */ in test_create()
848 /* verify EXEC and NOEXEC_SEAL can't both be set */ in test_create()
851 /* verify MFD_CLOEXEC is allowed */ in test_create()
855 /* verify MFD_ALLOW_SEALING is allowed */ in test_create()
859 /* verify MFD_ALLOW_SEALING | MFD_CLOEXEC is allowed */ in test_create()
898 /* verify that sealing no longer works */ in test_basic()
904 /* verify sealing does not work without MFD_ALLOW_SEALING */ in test_basic()
1349 /* Verify that the rules are actually inherited after fork. */ in sysctl_nested_child()
1369 * Verify that the current effective setting is saved on fork, meaning in sysctl_nested_child()