/freebsd/tests/sys/cddl/zfs/tests/cli_root/zpool_upgrade/ |
H A D | zpool_upgrade.cfg | 33 # work out which types of pool we should be able to upgrade on this 173 # This statement builds up a list of configurations we should be able to 178 # we should be able to upgrade pools of version 1 183 # we should be able to upgrade pools of version 1 & 2 188 # we should be able to upgrade pools of version 1, 2 & 3 194 # we should be able to upgrade pools of version 1, 2, 3 & 4 200 # we should be able to upgrade pools up to version 5 206 # we should be able to upgrade pools up to version 6 212 # we should be able to upgrade pools up to version 7 218 # we should be able to upgrade pools up to version 8 [all …]
|
H A D | zpool_upgrade_009_neg.ksh | 38 # Zpool upgrade -V shouldn't be able to upgrade a pool to an unknown version 63 "Zpool upgrade -V shouldn't be able to upgrade a pool to an unknown version" 86 "Zpool upgrade -V shouldn't be able to upgrade a pool to an unknown version"
|
H A D | zpool_upgrade_008_pos.ksh | 38 # Zpool upgrade should be able to upgrade pools to a given version using -V 66 "Zpool upgrade should be able to upgrade pools to a given version using -V" 94 "Zpool upgrade should be able to upgrade pools to a given version using -V"
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_set/ |
H A D | zpool_set_features.ksh | 21 # 'zpool set' should be able to enable features on pools 25 # 2. Verify 'zpool set' is able to enable a single feature 27 # 4. Verify 'zpool set' is *not* able to disable a single feature 39 log_assert "'zpool set' should be able to enable features on pools" 52 # Verify 'zpool set' is able to enable a single feature 63 # Verify 'zpool set' is *not* able to disable a single feature
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/ |
H A D | send_encrypted_props.ksh | 88 log_note "Must not be able to receive an embedded stream as encrypted" 93 log_note "Must not be able to use 'keylocation=prompt' on receive" 102 log_note "Must not be able to disable encryption properties on raw send" 110 log_note "Must not be able to change encryption properties on incrementals" 122 log_note "Must be able to receive stream as encryption root" 137 log_note "Must be able to override sharesmb property for encrypted raw stream" 146 log_note "Must be able to receive stream with props as encryption root" 164 log_note "Must be able to receive recursive stream as encryption root" 180 log_note "Must be able to receive stream with props to encrypted child" 194 log_note "Must be able to receive recursive stream to encrypted child" [all …]
|
/freebsd/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/privs/ |
H A D | tst.procpriv.ksh | 29 # When we have dtrace_proc (but lack dtrace_kernel), we expect to be able to 32 # structures that we know we shouldn't be able to read, as they require reading 34 # are a few fields that we may or may not be able to read depending on the 36 # think we should be able to, that we can't read what we think we shouldn't be 37 # able to, and (for purposes of completeness) that we are indifferent about 82 * be able to read pr_pgid -- but we won't if not.
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/longname/ |
H A D | longname_002_pos.ksh | 39 # 6. Should be able to create long named files and directories. 40 # 7. Should be able to disable longname property. 42 # able to access existing longnamed files/dirs. 109 # But, should be able to stat and rename existing files
|
H A D | longname_001_pos.ksh | 39 # 5. Ensure that "ls" is able to list the file. 40 # 6. Ensure stat(1) is able to stat the file/directory. 92 # Should be able to create a file with name of 1023 chars
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_upgrade/ |
H A D | zpool_upgrade_009_neg.ksh | 38 # zpool upgrade -V shouldn't be able to upgrade a pool to an unknown version 53 log_assert "zpool upgrade -V shouldn't be able to upgrade a pool to" \ 65 log_pass "zpool upgrade -V shouldn't be able to upgrade a pool to" \
|
H A D | zpool_upgrade_008_pos.ksh | 39 # zpool upgrade should be able to upgrade pools to a given version using -V 57 log_assert "zpool upgrade should be able to upgrade pools to a given version" \ 79 log_pass "zpool upgrade should be able to upgrade pools to a given version" \
|
/freebsd/usr.sbin/jail/ |
H A D | jail.8 | 471 This determines what information processes in a jail are able to get 562 privileged users inside the jail will be able to mount and unmount file 572 privileged users inside the jail will be able to mount and unmount the 695 privileged users inside the jail will be able to mount and unmount the 703 privileged users inside the jail will be able to mount and unmount 711 privileged users inside the jail will be able to mount and unmount the 719 privileged users inside the jail will be able to mount and unmount the 727 privileged users inside the jail will be able to mount and unmount the 735 privileged users inside the jail will be able to mount and unmount the 743 privileged users inside the jail will be able to mount and unmount the [all …]
|
/freebsd/usr.bin/diff/tests/ |
H A D | simple.out | 2 < to be able to test diff 5 > to be able to test diff utility
|
H A D | simple_u.out | 5 -to be able to test diff 7 +to be able to test diff utility
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/acl/posix/ |
H A D | posix_001_pos.ksh | 67 # Should be able to write to file 89 # Should NOT be able to create new file 92 # Root should be able to run file, but not user
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/acl/posix-sa/ |
H A D | posix_001_pos.ksh | 67 # Should be able to write to file 89 # Should NOT be able to create new file 92 # Root should be able to run file, but not user
|
/freebsd/sbin/fsck/ |
H A D | fsck.8 | 169 or if it is able to do its job in background after the 173 A zero exit code indicates that it is able to run later in background 181 or if it is able to do its job in background after the 185 A zero exit code indicates that it is able to run in background
|
/freebsd/tests/sys/netpfil/common/ |
H A D | tos.sh | 57 # Check if the firewall is able to set the ToS bits 72 # Check if the firewall is able to set the ToS bits 87 # Check if the firewall is able to filter the
|
/freebsd/sys/contrib/device-tree/Bindings/power/ |
H A D | power-controller.txt | 4 sometimes able to control the system power. The device driver associated with these 8 marks the device as able to control the system power. In order to test if this
|
/freebsd/sys/contrib/device-tree/Bindings/power/supply/ |
H A D | axp20x_ac_power.txt | 14 The AXP22X is only able to tell if an AC power supply is present and 17 AXP813/AXP803 are able to limit current and supply voltage
|
H A D | x-powers,axp20x-ac-power-supply.yaml | 11 reading ADC channels from the AXP20X ADC. The AXP22X is only able to 13 able to limit current and supply voltage
|
/freebsd/sys/fs/cd9660/ |
H A D | TODO.hibler | 3 Since it was modelled after the inode code, we might be able to merge 7 2. It would be nice to be able to use the vfs_cluster code.
|
/freebsd/crypto/heimdal/appl/telnet/telnetd/ |
H A D | telnetd.8 | 401 Indicates a desire to be able to request the 412 Indicates a desire to be able to request information 416 Indicates a desire to be able to request the name 420 Indicates a desire to be able to request environment 423 Indicates a desire to be able to request environment
|
/freebsd/lib/libpmc/pmu-events/arch/x86/silvermont/ |
H A D | other.json | 7 …es that fetch is stalled due to any reason. That is, the decoder queue is able to accept bytes, bu… 16 …is stalled due to an outstanding ITLB miss. That is, the decoder queue is able to accept bytes, bu…
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/user_namespace/ |
H A D | user_namespace_002.ksh | 31 # 2. Check that 'zfs list' is only able to see inside the delegation. 32 # 3. Check that 'zfs create' is able to create only inside the delegation. 35 # 5. Check that 'zfs destroy' is able to destroy only inside the delegation.
|
/freebsd/share/man/man7/ |
H A D | security.7 | 102 It may not be able to take your machine down, but it can fill up your Internet 129 able to do nothing more than mess with the user's files or crash the machine. 137 may find a bug in a root-run server and be able to break root over a network 205 Of course, as a sysadmin you have to be able to get to root, so we open up 259 This way an intruder may be able to steal the password 260 file but will not be able to break into any staff accounts or root, even if 280 Being able 337 onion approach to security still stands: if someone is able to break in 403 intruder might be able to read 426 may not be able to do so with any general user accounts you might have. [all …]
|