Lines Matching full:verify

361 	/* verify PROT_READ *is* allowed */  in mfd_assert_read()
374 /* verify MAP_PRIVATE is *always* allowed (even writable) */ in mfd_assert_read()
393 /* verify PROT_READ and MAP_SHARED *is* allowed */ in mfd_assert_read_shared()
449 * verify everything else here. in mfd_assert_write()
452 /* verify write() succeeds */ in mfd_assert_write()
460 /* verify PROT_READ | PROT_WRITE is allowed */ in mfd_assert_write()
474 /* verify PROT_WRITE is allowed */ in mfd_assert_write()
488 /* verify PROT_READ with MAP_SHARED is allowed and a following in mfd_assert_write()
510 /* verify PUNCH_HOLE works */ in mfd_assert_write()
527 /* verify write() fails */ in mfd_fail_write()
534 /* verify PROT_READ | PROT_WRITE is not allowed */ in mfd_fail_write()
546 /* verify PROT_WRITE is not allowed */ in mfd_fail_write()
558 /* Verify PROT_READ with MAP_SHARED with a following mprotect is not in mfd_fail_write()
575 /* verify PUNCH_HOLE fails */ in mfd_fail_write()
762 /* verify that file mode bits did not change */ in mfd_fail_chmod()
834 * Verify syscall-argument validation, including name checks, flag validation
856 /* verify "" is a valid name */ in test_create()
860 /* verify invalid O_* open flags */ in test_create()
867 /* verify EXEC and NOEXEC_SEAL can't both be set */ in test_create()
870 /* verify MFD_CLOEXEC is allowed */ in test_create()
874 /* verify MFD_ALLOW_SEALING is allowed */ in test_create()
878 /* verify MFD_ALLOW_SEALING | MFD_CLOEXEC is allowed */ in test_create()
917 /* verify that sealing no longer works */ in test_basic()
923 /* verify sealing does not work without MFD_ALLOW_SEALING */ in test_basic()
1392 /* Verify that the rules are actually inherited after fork. */ in sysctl_nested_child()
1412 * Verify that the current effective setting is saved on fork, meaning in sysctl_nested_child()