/third_party/ltp/tools/ |
D | restore_kernel_faults_default.sh | 35 echo 0 > /sys/kernel/debug/fail_io_timeout/reject-end 36 echo 0 > /sys/kernel/debug/fail_io_timeout/reject-start 37 echo 4294967295 > /sys/kernel/debug/fail_io_timeout/require-end 38 echo 0 > /sys/kernel/debug/fail_io_timeout/require-start 39 echo 32 > /sys/kernel/debug/fail_io_timeout/stacktrace-depth 40 echo N > /sys/kernel/debug/fail_io_timeout/task-filter 41 echo 2 > /sys/kernel/debug/fail_io_timeout/verbose 42 echo 0 > /sys/kernel/debug/fail_io_timeout/space 43 echo 1 > /sys/kernel/debug/fail_io_timeout/times 44 echo 1 > /sys/kernel/debug/fail_io_timeout/interval [all …]
|
/third_party/ltp/ |
D | README.kernel_config | 2 Enable CODE COVERAGE for your Kernel: 4 1) Apply kernel-gcov patch(s) against the corresponding Kernel. They are available here: 5 http://ltp.cvs.sourceforge.net/viewvc/ltp/utils/analysis/gcov-kernel/linux-2.*.*-gcov.patch?view=lo… 6 2) Also enable the following options in your .config file before building the kernel 13 Enabling Kernel Configuration to test Containers/Namespaces 32 Enabling Kernel Configuration to test Controllers 44 Enabling Kernel Configuration to test Power Management features 66 Enabling Kernel Configuration to test filecaps security feature 70 Enabling Kernel Configuration to test SELinux security feature 72 Your Kernel should have been built with the following options to [all …]
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Support/ |
D | AMDGPUMetadata.cpp | 22 LLVM_YAML_IS_SEQUENCE_VECTOR(Kernel::Arg::Metadata) 23 LLVM_YAML_IS_SEQUENCE_VECTOR(Kernel::Metadata) 93 struct MappingTraits<Kernel::Attrs::Metadata> { 94 static void mapping(IO &YIO, Kernel::Attrs::Metadata &MD) { in mapping() 95 YIO.mapOptional(Kernel::Attrs::Key::ReqdWorkGroupSize, in mapping() 97 YIO.mapOptional(Kernel::Attrs::Key::WorkGroupSizeHint, in mapping() 99 YIO.mapOptional(Kernel::Attrs::Key::VecTypeHint, in mapping() 101 YIO.mapOptional(Kernel::Attrs::Key::RuntimeHandle, MD.mRuntimeHandle, in mapping() 107 struct MappingTraits<Kernel::Arg::Metadata> { 108 static void mapping(IO &YIO, Kernel::Arg::Metadata &MD) { in mapping() [all …]
|
/third_party/libbpf/.github/actions/vmtest/ |
D | action.yml | 4 kernel: 5 description: 'kernel version or LATEST' 24 # 1. download CHECKPOINT kernel source 30 - name: Get kernel source at checkpoint 33 repo: 'https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git' 35 dest: '${{ github.workspace }}/.kernel' 36 - name: Patch kernel source 37 uses: libbpf/ci/patch-kernel@master 40 repo-root: '.kernel' 45 cd .kernel [all …]
|
/third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/test/ |
D | operand_capabilities_test.cpp | 113 CASE1(EXECUTION_MODEL, ExecutionModelKernel, Kernel), 133 CASE1(MEMORY_MODEL, MemoryModelOpenCL, Kernel), 161 CASE1(EXECUTION_MODE, ExecutionModeLocalSizeHint, Kernel), 177 CASE1(EXECUTION_MODE, ExecutionModeVecTypeHint, Kernel), 178 CASE1(EXECUTION_MODE, ExecutionModeContractionOff, Kernel), 185 CASE1(EXECUTION_MODE, ExecutionModeInitializer, Kernel), 186 CASE1(EXECUTION_MODE, ExecutionModeFinalizer, Kernel), 218 CASE3(DIMENSIONALITY, Dim2D, Kernel, Shader, ImageMSArray), 232 CASE1(SAMPLER_ADDRESSING_MODE, SamplerAddressingModeNone, Kernel), 234 Kernel), [all …]
|
/third_party/skia/third_party/externals/spirv-tools/test/ |
D | operand_capabilities_test.cpp | 113 CASE1(EXECUTION_MODEL, ExecutionModelKernel, Kernel), 133 CASE1(MEMORY_MODEL, MemoryModelOpenCL, Kernel), 161 CASE1(EXECUTION_MODE, ExecutionModeLocalSizeHint, Kernel), 177 CASE1(EXECUTION_MODE, ExecutionModeVecTypeHint, Kernel), 178 CASE1(EXECUTION_MODE, ExecutionModeContractionOff, Kernel), 185 CASE1(EXECUTION_MODE, ExecutionModeInitializer, Kernel), 186 CASE1(EXECUTION_MODE, ExecutionModeFinalizer, Kernel), 218 CASE3(DIMENSIONALITY, Dim2D, Kernel, Shader, ImageMSArray), 232 CASE1(SAMPLER_ADDRESSING_MODE, SamplerAddressingModeNone, Kernel), 234 Kernel), [all …]
|
/third_party/spirv-tools/test/ |
D | operand_capabilities_test.cpp | 121 CASE1(EXECUTION_MODEL, ExecutionModelKernel, Kernel), 141 CASE1(MEMORY_MODEL, MemoryModelOpenCL, Kernel), 169 CASE1(EXECUTION_MODE, ExecutionModeLocalSizeHint, Kernel), 185 CASE1(EXECUTION_MODE, ExecutionModeVecTypeHint, Kernel), 186 CASE1(EXECUTION_MODE, ExecutionModeContractionOff, Kernel), 193 CASE1(EXECUTION_MODE, ExecutionModeInitializer, Kernel), 194 CASE1(EXECUTION_MODE, ExecutionModeFinalizer, Kernel), 226 CASE3(DIMENSIONALITY, Dim2D, Kernel, Shader, ImageMSArray), 240 CASE1(SAMPLER_ADDRESSING_MODE, SamplerAddressingModeNone, Kernel), 242 Kernel), [all …]
|
/third_party/ltp/testcases/kernel/mce-test/doc/cases/ |
D | soft-inj_panic_npcc.txt | 29 * No warning or bug during kernel processing. 30 * MCE records collected via kernel panic log is same as reference ones. 31 * Kernel panic message is "Fatal Machine check" 38 * Test MCE handler logic for EIPV MCE in kernel space 44 * No warning or bug during kernel processing. 45 * MCE records collected via kernel panic log is same as reference ones. 46 * Kernel panic message is "Fatal Machine check" 47 * Exception message is "In kernel and no restart IP" 53 * Test MCE handler timeout logic for EIPV MCE in kernel space 64 * No warning or bug during kernel processing. [all …]
|
D | soft-inj_panic.txt | 29 * No warning or bug during kernel processing. 30 * MCE records collected via kernel panic log is same as reference ones. 31 * Kernel panic message is "Fatal Machine check" 51 * No warning or bug during kernel processing. 52 * MCE records collected via kernel panic log is same as reference ones. 53 * Kernel panic message is "Fatal machine check on current CPU" 68 * No warning or bug during kernel processing. 69 * MCE records collected via kernel panic log is same as reference ones. 70 * Kernel panic message is "Fatal Machine check" 85 * No warning or bug during kernel processing. [all …]
|
D | soft-inj_panic_ucr.txt | 28 * No warning or bug during kernel processing. 29 * MCE records collected via kernel panic log is same as reference ones. 30 * Kernel panic message is "Fatal Machine check" 51 * No warning or bug during kernel processing. 52 * MCE records collected via kernel panic log is same as reference ones. 53 * Kernel panic message is "Fatal Machine check" 74 * No warning or bug during kernel processing. 75 * MCE records collected via kernel panic log is same as reference ones. 76 * Kernel panic message is "Fatal Machine check" 98 * No warning or bug during kernel processing. [all …]
|
/third_party/protobuf/js/experimental/runtime/kernel/ |
D | message_set.js | 20 const Kernel = goog.require('protobuf.runtime.Kernel'); constant 37 * @param {!Kernel} kernel 40 function createItemMap(kernel) { argument 43 for (const item of kernel.getRepeatedGroupIterable( 51 writeItemMap(kernel, itemMap); 57 * @param {!Kernel} kernel 60 function writeItemMap(kernel, itemMap) { argument 61 kernel.setRepeatedGroupIterable(MSET_GROUP_FIELD_NUMBER, itemMap.values()); 70 * @param {!Kernel} kernel 73 static fromKernel(kernel) { argument [all …]
|
D | kernel_test.js | 2 * @fileoverview Tests for kernel.js. 11 const Kernel = goog.require('protobuf.runtime.Kernel'); constant 27 describe('Kernel', () => { 29 const accessor = Kernel.fromArrayBuffer(new ArrayBuffer(0)); 34 const accessor = Kernel.fromArrayBuffer( 43 const accessor = Kernel.fromArrayBuffer(new ArrayBuffer(0)); 48 const accessor = Kernel.fromArrayBuffer(new ArrayBuffer(0), 50); 53 describe('Kernel hasFieldNumber', () => { 55 const accessor = Kernel.fromArrayBuffer(new ArrayBuffer(0)); 61 const accessor = Kernel.fromArrayBuffer(bytes); [all …]
|
D | kernel_compatibility_test.js | 2 * @fileoverview Tests to make sure Kernel can read data in a backward 19 const Kernel = goog.require('protobuf.runtime.Kernel'); constant 42 const oldAccessor = Kernel.createEmpty(); 47 const newAccessor = Kernel.fromArrayBuffer(serializedData); 53 const message = new TestMessage(Kernel.createEmpty()); 56 const oldAccessor = Kernel.createEmpty(); 61 const newAccessor = Kernel.fromArrayBuffer(serializedData); 71 const message = new TestMessage(Kernel.createEmpty()); 74 const oldAccessor = Kernel.createEmpty(); 80 const newAccessor = Kernel.fromArrayBuffer(serializedData); [all …]
|
D | kernel_repeated_test.js | 2 * @fileoverview Tests for repeated methods in kernel.js. 11 const Kernel = goog.require('protobuf.runtime.Kernel'); constant 71 describe('Kernel for repeated boolean does', () => { 73 const accessor = Kernel.createEmpty(); 78 const accessor = Kernel.createEmpty(); 85 const accessor = Kernel.createEmpty(); 91 const accessor = Kernel.fromArrayBuffer(bytes); 97 const accessor = Kernel.fromArrayBuffer(bytes); 105 const accessor = Kernel.fromArrayBuffer(bytes); 110 const accessor = Kernel.createEmpty(); [all …]
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/include/llvm/Support/ |
D | AMDGPUMetadata.h | 100 // Kernel Metadata. 102 namespace Kernel { 105 // Kernel Attributes Metadata. 110 /// Key for Kernel::Attr::Metadata::mReqdWorkGroupSize. 112 /// Key for Kernel::Attr::Metadata::mWorkGroupSizeHint. 114 /// Key for Kernel::Attr::Metadata::mVecTypeHint. 116 /// Key for Kernel::Attr::Metadata::mRuntimeHandle. 120 /// In-memory representation of kernel attributes metadata. 128 /// External symbol created by runtime to store the kernel address 135 /// \returns True if kernel attributes metadata is empty, false otherwise. [all …]
|
/third_party/mesa3d/docs/ci/ |
D | kernel.rst | 1 Upreving Linux Kernel 4 Occasionally, the Gitlab CI needs a Linux Kernel update to enable new kernel 6 Kernel uprevs in Gitlab CI are relatively simple, but prone to lots of 10 Kernel repository 13 The Linux Kernel used in the Gitlab CI is stored at the following repository: 16 It is common that Mesa kernel brings some patches that were not merged on the 17 Linux mainline, that is why Mesa has its own kernel version which should be used 20 So, one should base the kernel uprev from the last tag used in the Mesa CI, 27 Building Kernel 30 When Mesa CI generates a new rootfs image, the Linux Kernel is built based on [all …]
|
/third_party/libabigail/tests/data/test-read-dwarf/ |
D | PR25007-sdhci.ko.abi | 40 …-size='64' path='/ws/android/kernel/aosp/common-mainline/common/drivers/mmc/host/sdhci.c' comp-dir… 104 …<enum-decl name='dl_dev_state' filepath='/ws/android/kernel/aosp/common-mainline/common/include/li… 111 …<enum-decl name='dma_data_direction' filepath='/ws/android/kernel/aosp/common-mainline/common/incl… 118 …<enum-decl name='hrtimer_restart' filepath='/ws/android/kernel/aosp/common-mainline/common/include… 123 …<enum-decl name='kobj_ns_type' filepath='/ws/android/kernel/aosp/common-mainline/common/include/li… 129 …<enum-decl name='led_brightness' filepath='/ws/android/kernel/aosp/common-mainline/common/include/… 136 …<enum-decl name='memory_type' filepath='/ws/android/kernel/aosp/common-mainline/common/include/lin… 143 …<enum-decl name='migrate_mode' filepath='/ws/android/kernel/aosp/common-mainline/common/include/li… 150 …<enum-decl name='module_state' filepath='/ws/android/kernel/aosp/common-mainline/common/include/li… 157 …<enum-decl name='page_entry_size' filepath='/ws/android/kernel/aosp/common-mainline/common/include… [all …]
|
/third_party/mesa3d/src/freedreno/computerator/ |
D | ir3_asm.c | 32 struct ir3_kernel *kernel = calloc(1, sizeof(*kernel)); in ir3_asm_assemble() local 33 struct ir3_shader *shader = ir3_parse_asm(c, &kernel->info, in); in ir3_asm_assemble() 38 kernel->v = v; in ir3_asm_assemble() 39 kernel->bin = v->bin; in ir3_asm_assemble() 41 kernel->base.local_size[0] = v->local_size[0]; in ir3_asm_assemble() 42 kernel->base.local_size[1] = v->local_size[1]; in ir3_asm_assemble() 43 kernel->base.local_size[2] = v->local_size[2]; in ir3_asm_assemble() 44 kernel->base.num_bufs = kernel->info.num_bufs; in ir3_asm_assemble() 45 memcpy(kernel->base.buf_sizes, kernel->info.buf_sizes, in ir3_asm_assemble() 46 sizeof(kernel->base.buf_sizes)); in ir3_asm_assemble() [all …]
|
D | a4xx.c | 49 static struct kernel * 59 a4xx_disassemble(struct kernel *kernel, FILE *out) in a4xx_disassemble() argument 61 ir3_asm_disassemble(to_ir3_kernel(kernel), out); in a4xx_disassemble() 65 cs_program_emit(struct fd_ringbuffer *ring, struct kernel *kernel) in cs_program_emit() argument 67 struct ir3_kernel *ir3_kernel = to_ir3_kernel(kernel); in cs_program_emit() 159 emit_const(struct fd_ringbuffer *ring, struct kernel *kernel, uint32_t constid, uint32_t sizedwords, in emit_const() argument 169 if (kernel->buf_addr_regs[i] != INVALID_REG) { in emit_const() 170 int idx = kernel->buf_addr_regs[i]; in emit_const() 173 replacements[idx] = kernel->bufs[i]; in emit_const() 202 cs_const_emit(struct fd_ringbuffer *ring, struct kernel *kernel, in cs_const_emit() argument [all …]
|
/third_party/gstreamer/gstplugins_good/gst/audiofx/ |
D | audiofirfilter.c | 28 * usage the "kernel" property has to be set to the filter kernel that should be 30 * that is introduced by the filter kernel. Setting a latency of n samples 34 * The filter kernel describes the impulse response of the filter. To 38 * To change the filter kernel whenever the sampling rate changes the 115 g_param_spec_value_array ("kernel", "Filter Kernel", in gst_audio_fir_filter_class_init() 116 "Filter kernel for the FIR filter", in gst_audio_fir_filter_class_init() 117 g_param_spec_double ("Element", "Filter Kernel Element", in gst_audio_fir_filter_class_init() 118 "Element of the filter kernel", -G_MAXDOUBLE, G_MAXDOUBLE, 0.0, in gst_audio_fir_filter_class_init() 144 "Generic audio FIR filter with custom filter kernel", in gst_audio_fir_filter_class_init() 151 gdouble *kernel; in gst_audio_fir_filter_update_kernel() local [all …]
|
/third_party/mesa3d/src/gallium/frontends/clover/core/ |
D | kernel.cpp | 23 #include "core/kernel.hpp" 31 kernel::kernel(clover::program &prog, const std::string &name, in kernel() function in kernel 63 kernel::launch(command_queue &q, in launch() 120 kernel::mem_local() const { in mem_local() 132 kernel::mem_private() const { in mem_private() 137 kernel::name() const { in name() 142 kernel::optimal_block_size(const command_queue &q, in optimal_block_size() 153 kernel::required_block_size() const { in required_block_size() 157 kernel::argument_range 158 kernel::args() { in args() [all …]
|
/third_party/ltp/testcases/kernel/mce-test/doc/ |
D | howto.txt | 16 kernel patch and user space tools needed for automatic tests, usage 22 - Install the Linux kernel with full MCE injection support, including 23 latest Linux kernel (2.6.31) and MCE injection enhancement patchset 24 in: http://ftp.kernel.org/pub/linux/kernel/people/yhuang/mce/. Make 32 git://git.kernel.org/pub/scm/utils/cpu/mce/mcelog.git. 35 git clone git://git.kernel.org/pub/scm/utils/cpu/mce/mcelog.git 41 git://git.kernel.org/pub/scm/utils/cpu/mce/mce-inject.git. 43 git clone git://git.kernel.org/pub/scm/utils/cpu/mce/mce-inject.git 48 - Install page-types tool (sec 3.4), which is accompanied with Linux kernel 63 testing the Linux kernel MCE processing features. The goal is to cover [all …]
|
/third_party/libbpf/.github/workflows/ |
D | ondemand.yml | 6 kernel-origin: 7 description: 'git repo for linux kernel' 8 default: 'https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git' 10 kernel-rev: 11 description: 'rev/tag/branch for linux kernel' 16 default: 'https://git.kernel.org/pub/scm/devel/pahole/pahole.git' 26 name: vmtest with customized pahole/Kernel 32 kernel: 'LATEST' 33 kernel-rev: ${{ github.event.inputs.kernel-rev }} 34 kernel-origin: ${{ github.event.inputs.kernel-origin }}
|
/third_party/vk-gl-cts/external/amber/src/tests/cases/ |
D | opencl_set_arg.amber | 17 kernel void line(global int* in, global int* out, int slope, int offset) { 31 BIND BUFFER in_buf KERNEL ARG_NAME in 32 BIND BUFFER out_buf1 KERNEL ARG_NAME out 33 SET KERNEL ARG_NAME offset AS uint32 1 34 SET KERNEL ARG_NAME slope AS int32 2 38 BIND BUFFER out_buf2 KERNEL ARG_NAME out 45 BIND BUFFER out_buf3 KERNEL ARG_NAME out 47 -cluster-pod-kernel-args 52 BIND BUFFER out_buf4 KERNEL ARG_NAME out 53 SET KERNEL ARG_NAME slope AS int32 3 [all …]
|
/third_party/ltp/include/ |
D | tst_taint.h | 23 * tst_res(TFAIL, "kernel has issues"); 25 * tst_res(TPASS, "kernel seems to be fine"); 30 * The above code checks whether the kernel issued a warning (TST_TAINT_W) 33 * triggered a kernel bug. 44 * This are all 17 flags that are present in kernel 4.15 45 * see kernel/panic.c in kernel sources 47 * Not all of them are valid in all kernel versions. 51 #define TST_TAINT_S (1 << 2) /* SMP with Non-SMP kernel */ 56 #define TST_TAINT_D (1 << 7) /* kernel died recently - OOPS or BUG */ 58 #define TST_TAINT_W (1 << 9) /* a warning has been issued by kernel */ [all …]
|