| /kernel/linux/linux-5.10/Documentation/admin-guide/aoe/ |
| D | udev-install.sh | 1 # install the aoe-specific udev rules from udev.txt into 10 if test -z "$conf"; then 11 if test -r /etc/udev/udev.conf; then 14 conf="`find /etc -type f -name udev.conf 2> /dev/null`" 15 if test -z "$conf" || test ! -r "$conf"; then 22 # find the directory where udev rules are stored, often 23 # /etc/udev/rules.d 25 rules_d="`sed -n '/^udev_rules=/{ s!udev_rules=!!; s!\"!!g; p; }' $conf`" 26 if test -z "$rules_d" ; then 27 rules_d=/etc/udev/rules.d [all …]
|
| /kernel/linux/linux-6.6/Documentation/admin-guide/aoe/ |
| D | udev-install.sh | 1 # install the aoe-specific udev rules from udev.txt into 10 if test -z "$conf"; then 11 if test -r /etc/udev/udev.conf; then 14 conf="`find /etc -type f -name udev.conf 2> /dev/null`" 15 if test -z "$conf" || test ! -r "$conf"; then 22 # find the directory where udev rules are stored, often 23 # /etc/udev/rules.d 25 rules_d="`sed -n '/^udev_rules=/{ s!udev_rules=!!; s!\"!!g; p; }' $conf`" 26 if test -z "$rules_d" ; then 27 rules_d=/etc/udev/rules.d [all …]
|
| /kernel/linux/linux-6.6/drivers/gpu/drm/ci/ |
| D | gitlab-ci.yml | 2 DRM_CI_PROJECT_PATH: &drm-ci-project-path mesa/mesa 3 DRM_CI_COMMIT_SHA: &drm-ci-commit-sha edfbf74df1d4d6ce54ffe24566108be0e1a98c3d 6 TARGET_BRANCH: drm-next 10 DEQP_RUNNER_GIT_URL: https://gitlab.freedesktop.org/anholt/deqp-runner.git 13 FDO_UPSTREAM_REPO: helen.fornazier/linux # The repo where the git-archive daily runs 14 MESA_TEMPLATES_COMMIT: &ci-templates-commit d5aa3941aa03c2f716595116354fb81eb8012acb 16 CI_PRE_CLONE_SCRIPT: |- 17 set -o xtrace 18 …-L --retry 4 -f --retry-all-errors --retry-delay 60 -s ${DRM_CI_PROJECT_URL}/-/raw/${DRM_CI_COMMIT… 19 bash download-git-cache.sh [all …]
|
| D | test.yml | 1 .test-rules: 2 rules: 3 - if: '$FD_FARM == "offline" && $RUNNER_TAG =~ /^google-freedreno-/' 5 - if: '$COLLABORA_FARM == "offline" && $RUNNER_TAG =~ /^mesa-ci-x86-64-lava-/' 7 - !reference [.no_scheduled_pipelines-rules, rules] 8 - when: on_success 10 .lava-test: 12 - .test-rules 15 - rm -rf install 16 - tar -xf artifacts/install.tar [all …]
|
| D | container.yml | 3 …_REPOSITORY_URL: ${DRM_CI_PROJECT_URL}.git # So ci-templates clones drm-ci instead of the repo to … 6 debian/x86_64_build-base: 8 …airo-dev libdw-dev libjson-c-dev libkmod2 libkmod-dev libpciaccess-dev libproc2-dev libudev-dev li… 10 debian/x86_64_test-gl: 12 …CKAGES: "jq libasound2 libcairo2 libdw1 libglib2.0-0 libjson-c5 libkmod-dev libkmod2 libgles2 libp… 16 …-dev libdw-dev libjson-c-dev libproc2-dev libkmod2 libkmod-dev libpciaccess-dev libudev-dev libunw… 20 EXTRA_LOCAL_PACKAGES: "jq libasound2 libcairo2 libdw1 libglib2.0-0 libjson-c5" 24 rules: 25 - when: never 27 debian/x86_64_test-vk: [all …]
|
| /kernel/linux/linux-6.6/security/apparmor/ |
| D | capability.c | 1 // SPDX-License-Identifier: GPL-2.0-only 7 * Copyright (C) 1998-2008 Novell/SUSE 8 * Copyright 2009-2010 Canonical Ltd. 40 * audit_cb - call back for capability components of audit struct 41 * @ab - audit buffer (NOT NULL) 42 * @va - audit struct to audit data from (NOT NULL) 49 audit_log_untrustedstring(ab, capability_names[sa->u.cap]); in audit_cb() 53 * audit_caps - audit a capability 57 * @error: error code returned by test 62 * Returns: 0 or ad->error on success, error code on failure [all …]
|
| D | file.c | 1 // SPDX-License-Identifier: GPL-2.0-only 7 * Copyright (C) 1998-2008 Novell/SUSE 8 * Copyright 2009-2010 Canonical Ltd. 40 * file_audit_cb - call back for file specific audit fields 48 kuid_t fsuid = ad->subj_cred ? ad->subj_cred->fsuid : current_fsuid(); in file_audit_cb() 51 if (ad->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() 53 map_mask_to_chr_mask(ad->request)); in file_audit_cb() 56 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 58 map_mask_to_chr_mask(ad->denied)); in file_audit_cb() 61 if (ad->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() [all …]
|
| D | domain.c | 1 // SPDX-License-Identifier: GPL-2.0-only 7 * Copyright (C) 2002-2008 Novell/SUSE 8 * Copyright 2009-2010 Canonical Ltd. 33 * may_change_ptraced_domain - check if can change profile on ptraced task 77 /**** TODO: dedup to aa_label_match - needs perm and dfa, merging 83 * Assumes visibility test has already been done. 85 * visibility test. 91 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_component() local 92 typeof(*rules), list); in match_component() 96 state = aa_dfa_match(rules->file.dfa, state, "&"); in match_component() [all …]
|
| D | resource.c | 1 // SPDX-License-Identifier: GPL-2.0-only 7 * Copyright (C) 1998-2008 Novell/SUSE 8 * Copyright 2009-2010 Canonical Ltd. 36 rlim_names[ad->rlim.rlim], ad->rlim.max); in audit_cb() 37 if (ad->peer) { in audit_cb() 39 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in audit_cb() 45 * audit_resource - audit setting resource limit 54 * Returns: 0 or ad->error else other error code on failure 75 * aa_map_resource - map compiled policy resource to internal # 92 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_setrlimit() local [all …]
|
| /kernel/linux/linux-6.6/tools/perf/tests/shell/lib/ |
| D | perf_metric_validation.py | 1 #SPDX-License-Identifier: GPL-2.0 13 self.rules = None 29 # vars for test pass/failure statistics 30 …oremetrics= set() # metrics with no results or negative results, neg result counts as a failed test 51 def read_json(self, filename: str) -> dict: 75 def get_bounds(self, lb, ub, error, alias={}, ridx:int = 0) -> list: 84 upper bound, return -1 if the upper bound is a metric value and is not collected 107 ubv = get_bound_value(ub, -1, ridx) 116 def get_value(self, name:str, ridx:int = 0) -> list: 120 All future test(s) on this metric will fail. [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/drivers/net/mlxsw/ |
| D | tc_flower_scale.sh | 2 # SPDX-License-Identifier: GPL-2.0 4 # Test for resource limit of offloaded flower rules. The test adds a given 6 # indication for all of the tc flower rules. This file contains functions to set 7 # up a testing topology and run the test, and is meant to be sourced from a test 8 # script that calls the testing routine with a given number of rules. 56 if [[ -v TC_FLOWER_BATCH_FILE ]]; then 57 rm -f $TC_FLOWER_BATCH_FILE 76 cat >> $TC_FLOWER_BATCH_FILE <<-EOF 85 tc -b $TC_FLOWER_BATCH_FILE 93 local last=$((count - 1)) [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/drivers/net/mlxsw/ |
| D | tc_flower_scale.sh | 2 # SPDX-License-Identifier: GPL-2.0 4 # Test for resource limit of offloaded flower rules. The test adds a given 6 # indication for all of the tc flower rules. This file contains functions to set 7 # up a testing topology and run the test, and is meant to be sourced from a test 8 # script that calls the testing routine with a given number of rules. 56 if [[ -v TC_FLOWER_BATCH_FILE ]]; then 57 rm -f $TC_FLOWER_BATCH_FILE 76 cat >> $TC_FLOWER_BATCH_FILE <<-EOF 86 tc -b $TC_FLOWER_BATCH_FILE 94 local last=$((count - 1)) [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/netfilter/ |
| D | xt_string.sh | 2 # SPDX-License-Identifier: GPL-2.0 4 # return code to signal skipped test 8 if ! iptables --version >/dev/null 2>&1; then 9 echo "SKIP: Test needs iptables" 12 if ! ip -V >/dev/null 2>&1; then 13 echo "SKIP: Test needs iproute2" 16 if ! nc -h >/dev/null 2>&1; then 17 echo "SKIP: Test needs netcat" 24 ns="ns-$(mktemp -u XXXXXXXX)" 27 ip -net "$ns" link add d0 type dummy [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/ |
| D | lib.mk | 1 # This mimics the top-level Makefile. We do it explicitly here so that this 17 # The following are built by lib.mk common compile rules. 20 # TEST_PROGS are for test shell scripts. 36 # Invoke headers install with --no-builtin-rules to avoid circular 38 # make inherits builtin-rules which will use the rule generate 40 # "Circular Makefile.o <- prepare dependency dropped." 41 # and headers_install fails and test compile fails. 43 # invokes them as sub-makes and --no-builtin-rules is not necessary, 47 # when test Makefile is run directly with "make -C". 55 $(MAKE) --no-builtin-rules ARCH=$(ARCH) -C $(top_srcdir) headers_install [all …]
|
| D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 11 TARGETS += cpu-hotplug 12 TARGETS += drivers/dma-buf 34 TARGETS += memory-hotplug 60 TARGETS += tc-testing 75 TARGETS_HOTPLUG = cpu-hotplug 76 TARGETS_HOTPLUG += memory-hotplug 81 TMP := $(filter-out $(SKIP_TARGETS), $(TARGETS)) 91 # Clear LDFLAGS and MAKEFLAGS when implicit rules are missing. This provides 92 # implicit rules to sub-test Makefiles which avoids build failures in test [all …]
|
| /kernel/linux/linux-6.6/lib/ |
| D | Kconfig.kcsan | 1 # SPDX-License-Identifier: GPL-2.0-only 7 def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-distinguish-volatile=1)) || \ 8 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-distinguish-volatile=1)) 11 <file:Documentation/dev-tools/kcsan.rst>. 21 data-race detector that relies on compile-time instrumentation. 22 KCSAN uses a watchpoint-based sampling approach to detect races. 29 See <file:Documentation/dev-tools/kcsan.rst> for more details. 34 …def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-compound-read-before-write=1))… 35 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-compound-read-before-write=1)) 37 The compiler instruments plain compound read-write operations [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/hid/tests/ |
| D | base.py | 2 # SPDX-License-Identifier: GPL-2.0 3 # -*- coding: utf-8 -*- 19 logger = logging.getLogger("hidtools.test.base") 140 name = f"uhid test {self.__class__.__name__}" 141 if not name.startswith("uhid test "): 142 name = "uhid test " + self.name 154 # List of kernel modules to load before starting the test 155 # if any module is not available (not compiled), the test will skip. 157 # for example ("playstation", "hid-playstation") 212 sysfs_path = Path("/sys/module") / kernel_module.replace("-", "_") [all …]
|
| /kernel/linux/linux-6.6/drivers/net/ethernet/microchip/vcap/ |
| D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 9 bool "VCAP (Versatile Content-Aware Processor) library" 13 A VCAP is essentially a TCAM with rules consisting of 15 - Programmable key fields 16 - Programmable action fields 17 - A counter (which may be only one bit wide) 21 - A number of lookups 22 - A keyset configuration per port per lookup 24 The VCAP implementation provides switchcore independent handling of rules 27 - Creating and deleting rules [all …]
|
| D | vcap_api_kunit.c | 1 // SPDX-License-Identifier: BSD-3-Clause 3 * Microchip VCAP API kunit test suite 6 #include <kunit/test.h> 11 /* First we have the test infrastructure that emulates the platform 39 if (kslist->cnt > 0) { in test_val_keyset() 40 switch (admin->vtype) { in test_val_keyset() 42 for (idx = 0; idx < kslist->cnt; idx++) { in test_val_keyset() 43 if (kslist->keysets[idx] == VCAP_KFS_ETAG) in test_val_keyset() 44 return kslist->keysets[idx]; in test_val_keyset() 45 if (kslist->keysets[idx] == VCAP_KFS_PURE_5TUPLE_IP4) in test_val_keyset() [all …]
|
| /kernel/linux/linux-6.6/samples/bpf/ |
| D | cookie_uid_helper_example.c | 1 /* This test is a demo of using get_socket_uid and get_socket_cookie 6 * TEST: 7 * ./run_cookie_uid_helper_example.sh -option 9 * -t: do traffic monitoring test, the program will continuously 22 * -s: do getsockopt SO_COOKIE test, the program will set up a pair of 92 /* pc2-4: save &socketCookie to r7 for future usage*/ in prog_load() 93 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8), in prog_load() 95 BPF_ALU64_IMM(BPF_ADD, BPF_REG_7, -8), in prog_load() 97 * pc5-8: set up the registers for BPF_FUNC_map_lookup_elem, in prog_load() 107 * Otherwise do pc10-22 to setup a new data entry. in prog_load() [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/vm/ |
| D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 3 uname_M := $(shell uname -m 2>/dev/null || echo not) 4 MACHINE ?= $(shell echo $(uname_M) | sed -e 's/aarch64.*/arm64/' -e 's/ppc64.*/ppc64/') 6 # Without this, failed build products remain, with up-to-date timestamps, 11 # Avoid accidental wrong builds, due to built-in rules working just a little 12 # bit too well--but not quite as well as required for our situation here. 16 # However, the built-in rules, if not suppressed, will pick up CFLAGS and the 17 # initial LDLIBS (but not the target-specific LDLIBS, because those are only 21 MAKEFLAGS += --no-builtin-rules 23 CFLAGS = -Wall -I ../../../../usr/include $(EXTRA_CFLAGS) [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/landlock/ |
| D | fs_test.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Landlock tests - Filesystem 5 * Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net> 7 * Copyright © 2020-2022 Microsoft Corporation 132 /* Ignores too-long filesystem names. */ in supports_filesystem() 218 for (i = strlen(walker); i > 0; i--) { in remove_path() 253 return mount(mnt->source ?: mnt->type, target, mnt->type, mnt->flags, in mount_opt() 254 mnt->data); in mount_opt() 272 TH_LOG("Failed to mount the %s filesystem: %s", mnt->type, in prepare_layout_opt() 299 /* clang-format off */ [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/mm/ |
| D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 11 uname_M := $(shell uname -m 2>/dev/null || echo not) 13 uname_M := $(shell echo $(CROSS_COMPILE) | grep -o '^[a-z0-9]\+') 15 ARCH ?= $(shell echo $(uname_M) | sed -e 's/aarch64.*/arm64/' -e 's/ppc64.*/powerpc/') 18 # Without this, failed build products remain, with up-to-date timestamps, 23 # Avoid accidental wrong builds, due to built-in rules working just a little 24 # bit too well--but not quite as well as required for our situation here. 28 # However, the built-in rules, if not suppressed, will pick up CFLAGS and the 29 # initial LDLIBS (but not the target-specific LDLIBS, because those are only 33 MAKEFLAGS += --no-builtin-rules [all …]
|
| /kernel/linux/linux-5.10/tools/lib/traceevent/Documentation/ |
| D | libtraceevent-filter.txt | 5 ---- 8 tep_filter_remove_event, tep_filter_strerror, tep_filter_add_filter_str - 12 -------- 14 -- 15 *#include <event-parse.h>* 28 -- 31 ----------- 43 The _tep_filter_reset()_ function removes all rules from an event filter and 59 The _tep_filter_compare()_ function compares two filers - _filter1_ and _filter2_. 69 ------------ [all …]
|
| /kernel/linux/linux-6.6/tools/memory-model/Documentation/ |
| D | recipes.txt | 8 and the third section provides a few rules of thumb. 20 ------------------------------------ 31 2. Compilers are permitted to use the "as-if" rule. That is, a 33 as long as the results of a single-threaded execution appear 34 just as if the compiler had followed all the relevant rules. 41 your full-ordering warranty, as do undersized accesses that load 51 holding the update-side lock, reads from that variable 62 ------- 64 Locking is well-known and straightforward, at least if you don't think 96 following litmus test: [all …]
|