Home
last modified time | relevance | path

Searched full:able (Results 1 – 25 of 2050) sorted by relevance

12345678910>>...82

/freebsd/tests/sys/cddl/zfs/tests/cli_root/zpool_upgrade/
H A Dzpool_upgrade.cfg33 # work out which types of pool we should be able to upgrade on this
173 # This statement builds up a list of configurations we should be able to
178 # we should be able to upgrade pools of version 1
183 # we should be able to upgrade pools of version 1 & 2
188 # we should be able to upgrade pools of version 1, 2 & 3
194 # we should be able to upgrade pools of version 1, 2, 3 & 4
200 # we should be able to upgrade pools up to version 5
206 # we should be able to upgrade pools up to version 6
212 # we should be able to upgrade pools up to version 7
218 # we should be able to upgrade pools up to version 8
[all …]
H A Dzpool_upgrade_009_neg.ksh38 # Zpool upgrade -V shouldn't be able to upgrade a pool to an unknown version
63 "Zpool upgrade -V shouldn't be able to upgrade a pool to an unknown version"
86 "Zpool upgrade -V shouldn't be able to upgrade a pool to an unknown version"
H A Dzpool_upgrade_008_pos.ksh38 # Zpool upgrade should be able to upgrade pools to a given version using -V
66 "Zpool upgrade should be able to upgrade pools to a given version using -V"
94 "Zpool upgrade should be able to upgrade pools to a given version using -V"
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_set/
H A Dzpool_set_features.ksh21 # 'zpool set' should be able to enable features on pools
25 # 2. Verify 'zpool set' is able to enable a single feature
27 # 4. Verify 'zpool set' is *not* able to disable a single feature
39 log_assert "'zpool set' should be able to enable features on pools"
52 # Verify 'zpool set' is able to enable a single feature
63 # Verify 'zpool set' is *not* able to disable a single feature
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/
H A Dsend_encrypted_props.ksh88 log_note "Must not be able to receive an embedded stream as encrypted"
93 log_note "Must not be able to use 'keylocation=prompt' on receive"
102 log_note "Must not be able to disable encryption properties on raw send"
110 log_note "Must not be able to change encryption properties on incrementals"
122 log_note "Must be able to receive stream as encryption root"
137 log_note "Must be able to override sharesmb property for encrypted raw stream"
146 log_note "Must be able to receive stream with props as encryption root"
164 log_note "Must be able to receive recursive stream as encryption root"
180 log_note "Must be able to receive stream with props to encrypted child"
194 log_note "Must be able to receive recursive stream to encrypted child"
[all …]
/freebsd/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/privs/
H A Dtst.procpriv.ksh29 # When we have dtrace_proc (but lack dtrace_kernel), we expect to be able to
32 # structures that we know we shouldn't be able to read, as they require reading
34 # are a few fields that we may or may not be able to read depending on the
36 # think we should be able to, that we can't read what we think we shouldn't be
37 # able to, and (for purposes of completeness) that we are indifferent about
82 * be able to read pr_pgid -- but we won't if not.
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/longname/
H A Dlongname_002_pos.ksh39 # 6. Should be able to create long named files and directories.
40 # 7. Should be able to disable longname property.
42 # able to access existing longnamed files/dirs.
109 # But, should be able to stat and rename existing files
H A Dlongname_001_pos.ksh39 # 5. Ensure that "ls" is able to list the file.
40 # 6. Ensure stat(1) is able to stat the file/directory.
92 # Should be able to create a file with name of 1023 chars
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_upgrade/
H A Dzpool_upgrade_009_neg.ksh38 # zpool upgrade -V shouldn't be able to upgrade a pool to an unknown version
53 log_assert "zpool upgrade -V shouldn't be able to upgrade a pool to" \
65 log_pass "zpool upgrade -V shouldn't be able to upgrade a pool to" \
H A Dzpool_upgrade_008_pos.ksh39 # zpool upgrade should be able to upgrade pools to a given version using -V
57 log_assert "zpool upgrade should be able to upgrade pools to a given version" \
79 log_pass "zpool upgrade should be able to upgrade pools to a given version" \
/freebsd/usr.sbin/jail/
H A Djail.8471 This determines what information processes in a jail are able to get
562 privileged users inside the jail will be able to mount and unmount file
572 privileged users inside the jail will be able to mount and unmount the
695 privileged users inside the jail will be able to mount and unmount the
703 privileged users inside the jail will be able to mount and unmount
711 privileged users inside the jail will be able to mount and unmount the
719 privileged users inside the jail will be able to mount and unmount the
727 privileged users inside the jail will be able to mount and unmount the
735 privileged users inside the jail will be able to mount and unmount the
743 privileged users inside the jail will be able to mount and unmount the
[all …]
/freebsd/usr.bin/diff/tests/
H A Dsimple.out2 < to be able to test diff
5 > to be able to test diff utility
H A Dsimple_u.out5 -to be able to test diff
7 +to be able to test diff utility
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/acl/posix/
H A Dposix_001_pos.ksh67 # Should be able to write to file
89 # Should NOT be able to create new file
92 # Root should be able to run file, but not user
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/acl/posix-sa/
H A Dposix_001_pos.ksh67 # Should be able to write to file
89 # Should NOT be able to create new file
92 # Root should be able to run file, but not user
/freebsd/sbin/fsck/
H A Dfsck.8169 or if it is able to do its job in background after the
173 A zero exit code indicates that it is able to run later in background
181 or if it is able to do its job in background after the
185 A zero exit code indicates that it is able to run in background
/freebsd/tests/sys/netpfil/common/
H A Dtos.sh57 # Check if the firewall is able to set the ToS bits
72 # Check if the firewall is able to set the ToS bits
87 # Check if the firewall is able to filter the
/freebsd/sys/contrib/device-tree/Bindings/power/
H A Dpower-controller.txt4 sometimes able to control the system power. The device driver associated with these
8 marks the device as able to control the system power. In order to test if this
/freebsd/sys/contrib/device-tree/Bindings/power/supply/
H A Daxp20x_ac_power.txt14 The AXP22X is only able to tell if an AC power supply is present and
17 AXP813/AXP803 are able to limit current and supply voltage
H A Dx-powers,axp20x-ac-power-supply.yaml11 reading ADC channels from the AXP20X ADC. The AXP22X is only able to
13 able to limit current and supply voltage
/freebsd/sys/fs/cd9660/
H A DTODO.hibler3 Since it was modelled after the inode code, we might be able to merge
7 2. It would be nice to be able to use the vfs_cluster code.
/freebsd/crypto/heimdal/appl/telnet/telnetd/
H A Dtelnetd.8401 Indicates a desire to be able to request the
412 Indicates a desire to be able to request information
416 Indicates a desire to be able to request the name
420 Indicates a desire to be able to request environment
423 Indicates a desire to be able to request environment
/freebsd/lib/libpmc/pmu-events/arch/x86/silvermont/
H A Dother.json7 …es that fetch is stalled due to any reason. That is, the decoder queue is able to accept bytes, bu…
16 …is stalled due to an outstanding ITLB miss. That is, the decoder queue is able to accept bytes, bu…
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/user_namespace/
H A Duser_namespace_002.ksh31 # 2. Check that 'zfs list' is only able to see inside the delegation.
32 # 3. Check that 'zfs create' is able to create only inside the delegation.
35 # 5. Check that 'zfs destroy' is able to destroy only inside the delegation.
/freebsd/share/man/man7/
H A Dsecurity.7102 It may not be able to take your machine down, but it can fill up your Internet
129 able to do nothing more than mess with the user's files or crash the machine.
137 may find a bug in a root-run server and be able to break root over a network
205 Of course, as a sysadmin you have to be able to get to root, so we open up
259 This way an intruder may be able to steal the password
260 file but will not be able to break into any staff accounts or root, even if
280 Being able
337 onion approach to security still stands: if someone is able to break in
403 intruder might be able to read
426 may not be able to do so with any general user accounts you might have.
[all …]

12345678910>>...82