/external/kernel-headers/original/uapi/linux/ |
H A D | kvm_para.h | 16 #define KVM_EPERM EPERM
|
/external/chromium_org/native_client_sdk/src/libraries/nacl_io/ |
H A D | pepper_interface.cc | 73 case PP_ERROR_FAILED: return EPERM; 74 case PP_ERROR_ABORTED: return EPERM; 84 case PP_ERROR_BLOCKS_MAIN_THREAD: return EPERM; 90 case PP_ERROR_USERCANCEL: return EPERM; 91 case PP_ERROR_NO_USER_GESTURE: return EPERM; 92 case PP_ERROR_CONTEXT_LOST: return EPERM; 93 case PP_ERROR_NO_MESSAGE_LOOP: return EPERM; 94 case PP_ERROR_WRONG_THREAD: return EPERM;
|
/external/libcxx/test/thread/thread.mutex/thread.lock/thread.lock.shared/thread.lock.shared.locking/ |
H A D | unlock.pass.cpp | 47 assert(e.code().value() == EPERM); 57 assert(e.code().value() == EPERM);
|
H A D | try_lock.pass.cpp | 65 assert(e.code().value() == EPERM);
|
/external/libcxx/test/thread/thread.mutex/thread.lock/thread.lock.unique/thread.lock.unique.locking/ |
H A D | unlock.pass.cpp | 42 assert(e.code().value() == EPERM); 52 assert(e.code().value() == EPERM);
|
H A D | try_lock.pass.cpp | 60 assert(e.code().value() == EPERM);
|
H A D | try_lock_for.pass.cpp | 65 assert(e.code().value() == EPERM);
|
/external/chromium_org/native_client_sdk/src/libraries/third_party/pthreads-win32/ |
H A D | pthread_spin_unlock.c | 55 return EPERM;
|
H A D | sched_getscheduler.c | 47 * such as EPERM and ESRCH errors. 62 (0xFF & ERROR_ACCESS_DENIED)) ? EPERM : ESRCH;
|
H A D | sched_setscheduler.c | 47 * such as EPERM and ESRCH errors. Choosing to check 64 (0xFF & ERROR_ACCESS_DENIED)) ? EPERM : ESRCH;
|
H A D | pthread_mutex_unlock.c | 107 result = EPERM; 165 result = EPERM;
|
H A D | sem_init.c | 80 * EPERM the process lacks appropriate privilege 94 result = EPERM;
|
/external/chromium_org/content/common/sandbox_linux/ |
H A D | sandbox_bpf_base_policy_linux.cc | 19 static const int kFSDeniedErrno = EPERM;
|
H A D | bpf_renderer_policy_linux.cc | 57 return Error(EPERM); // See crbug.com/160157.
|
/external/kernel-headers/original/uapi/asm-generic/ |
H A D | errno-base.h | 4 #define EPERM 1 /* Operation not permitted */ macro
|
/external/chromium_org/components/nacl/loader/sandbox_linux/ |
H A D | nacl_bpf_sandbox_linux.cc | 104 return Error(EPERM); 110 return Error(EPERM); 119 CHECK_EQ(EPERM, errno);
|
/external/chromium_org/sandbox/linux/bpf_dsl/ |
H A D | bpf_dsl_unittest.cc | 70 return If(pid == 0, Error(EPERM)).Else(Error(EINVAL)); 84 ASSERT_SYSCALL_RESULT(-EPERM, getpgid, 0); 103 Error(EPERM)).Else(Error(EINVAL)); 115 // Acceptable combinations that should return EPERM. 116 ASSERT_SYSCALL_RESULT(-EPERM, socketpair, AF_UNIX, SOCK_STREAM, 0, sv); 117 ASSERT_SYSCALL_RESULT(-EPERM, socketpair, AF_UNIX, SOCK_DGRAM, 0, sv); 138 return If(ruid == 0 || euid == 0 || suid == 0, Error(EPERM)) 150 // Expect EPERM if any set to 0. 151 ASSERT_SYSCALL_RESULT(-EPERM, setresuid, 0, 5, 5); 152 ASSERT_SYSCALL_RESULT(-EPERM, setresui [all...] |
/external/chromium_org/third_party/android_crazy_linker/src/src/ |
H A D | crazy_linker_ashmem.cpp | 54 // fails with EPERM. 58 errno = EPERM; 61 if (errno != EPERM) {
|
/external/libcxx/src/ |
H A D | condition_variable.cpp | 38 __throw_system_error(EPERM, 51 __throw_system_error(EPERM,
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
H A D | baseline_policy.cc | 149 return Error(EPERM); 157 return Error(EPERM); 165 return If(advice == MADV_DONTNEED, Allow()).Else(Error(EPERM)); 205 return Error(EPERM); 208 return Error(EPERM); 215 return Error(EPERM); 238 : fs_denied_errno_(EPERM), current_pid_(syscall(__NR_getpid)) {}
|
H A D | baseline_policy_unittest.cc | 102 BPF_ASSERT_EQ(EPERM, errno); 112 BPF_ASSERT_EQ(EPERM, fork_errno); 126 BPF_ASSERT_EQ(EPERM, fork_errno); 141 BPF_ASSERT_EQ(EPERM, fork_errno); 198 BPF_ASSERT_EQ(EPERM, errno); 205 BPF_ASSERT_EQ(EPERM, errno); 213 BPF_ASSERT_EQ(EPERM, errno); 319 BPF_ASSERT_EQ(EPERM, errno); 330 BPF_ASSERT_EQ(EPERM, errno);
|
/external/chromium_org/content/renderer/ |
H A D | renderer_main_platform_delegate_linux.cc | 68 // but we know that under the seccomp-bpf sandbox, this should return EPERM. 70 CHECK_EQ(errno, EPERM);
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
H A D | errorcode_unittest.cc | 24 ErrorCode e2(EPERM); 25 SANDBOX_ASSERT(e2.err() == SECCOMP_RET_ERRNO + EPERM); 62 ErrorCode e3(EPERM); 82 ErrorCode e3(EPERM);
|
/external/chromium_org/third_party/libusb/src/msvc/ |
H A D | errno.h | 24 #define EPERM 1 /* Operation not permitted */ macro
|
/external/chromium_org/sandbox/linux/services/ |
H A D | broker_process_unittest.cc | 52 new BrokerProcess(EPERM, read_whitelist, std::vector<std::string>())); 63 BrokerProcess open_broker(EPERM, empty, empty); 215 TestOpenFilePerms(true /* fast_check_in_client */, EPERM); 221 TestOpenFilePerms(false /* fast_check_in_client */, EPERM); 226 // Run the same twice again, but with ENOENT instead of EPERM. 245 EPERM, read_whitelist, std::vector<std::string>(), fast_check_in_client)); 251 ASSERT_EQ(fd, -EPERM); 257 ASSERT_EQ(can_access, -EPERM); 310 BrokerProcess open_broker(EPERM, whitelist, whitelist); 343 BrokerProcess open_broker(EPERM, [all...] |