/tools/testing/selftests/syscall_user_dispatch/ |
D | sud_test.c | 61 char sel = SYSCALL_DISPATCH_FILTER_ALLOW; in TEST_SIGNAL() local 68 ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 0, 0, &sel); in TEST_SIGNAL() 73 SYSCALL_DISPATCH_ON(sel); in TEST_SIGNAL() 84 char sel = SYSCALL_DISPATCH_FILTER_ALLOW; in TEST() local 89 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0, 0, &sel); in TEST() 104 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0x0, &sel); in TEST() 116 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x1, 0x0, &sel); in TEST() 118 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, -1L, 0x0, &sel); in TEST() 128 prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 1, -1L, &sel); in TEST() 136 prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, -1L, 0x1, &sel); in TEST() [all …]
|
/tools/testing/selftests/x86/ |
D | ldt_gdt.c | 733 unsigned short sel; in test_gdt_invalidation() local 744 sel = (gdt_entry_num << 3) | 3; in test_gdt_invalidation() 757 : [prev_sel] "=&r" (prev_sel), [sel] "+r" (sel), in test_gdt_invalidation() 763 if (sel != 0) { in test_gdt_invalidation() 770 result, sel); in test_gdt_invalidation() 775 sel = (gdt_entry_num << 3) | 3; in test_gdt_invalidation() 788 : [prev_sel] "=&r" (prev_sel), [sel] "+r" (sel), in test_gdt_invalidation() 794 if (sel != 0) { in test_gdt_invalidation() 801 result, sel); in test_gdt_invalidation() 806 sel = (gdt_entry_num << 3) | 3; in test_gdt_invalidation() [all …]
|
D | fsgsbase.c | 162 unsigned short sel; in check_gs_value() local 168 asm volatile ("mov %%gs, %0" : "=rm" (sel)); in check_gs_value() 172 sel); in check_gs_value() 176 base, sel); in check_gs_value() 183 sel); in check_gs_value() 187 base, sel); in check_gs_value() 239 unsigned short sel; in do_remote_base() local 240 asm volatile ("mov %%gs, %0" : "=rm" (sel)); in do_remote_base() 242 to_set, hard_zero ? " and clear gs" : "", sel); in do_remote_base() 649 unsigned short sel = s; in main() local [all …]
|
D | fsgsbase_restore.c | 105 unsigned short sel = (unsigned short)((desc.entry_number << 3) | 0x3); in init_seg() local 106 asm volatile ("mov %0, %" SEG :: "rm" (sel)); in init_seg() 126 unsigned short sel; in tracee_zap_segment() local 129 : "=rm" (sel)); in tracee_zap_segment()
|
/tools/testing/selftests/net/ |
D | vrf-xfrm-tests.sh | 269 sel src ${h1_4} dst ${h2_4} ${devarg} 276 sel src ${h1_4} dst ${h2_4} 284 sel src ${h2_4} dst ${h1_4} ${devarg} 291 sel src ${h2_4} dst ${h1_4} 299 sel src ${h1_6} dst ${h2_6} ${devarg} 306 sel src ${h1_6} dst ${h2_6} 314 sel src ${h2_6} dst ${h1_6} ${devarg} 321 sel src ${h2_6} dst ${h1_6}
|
D | ipsec.c | 946 memcpy(&req.info.sel.daddr, &dst, sizeof(dst)); in xfrm_state_add() 947 memcpy(&req.info.sel.saddr, &src, sizeof(src)); in xfrm_state_add() 948 req.info.sel.family = AF_INET; in xfrm_state_add() 949 req.info.sel.prefixlen_d = PREFIX_LEN; in xfrm_state_add() 950 req.info.sel.prefixlen_s = PREFIX_LEN; in xfrm_state_add() 984 if (memcmp(&info->sel.daddr, &dst, sizeof(dst))) in xfrm_usersa_found() 987 if (memcmp(&info->sel.saddr, &src, sizeof(src))) in xfrm_usersa_found() 990 if (info->sel.family != AF_INET || in xfrm_usersa_found() 991 info->sel.prefixlen_d != PREFIX_LEN || in xfrm_usersa_found() 992 info->sel.prefixlen_s != PREFIX_LEN) in xfrm_usersa_found() [all …]
|
D | xfrm_policy.sh | 53 …me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $rnet dst $lnet 54 …mote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $lnet dst $rnet
|
D | rtnetlink.sh | 661 $algo sel src $srcip/24 dst $dstip/24 791 mode transport reqid 42 $algo sel src $srcip/24 dst $dstip/24 \ 795 mode transport reqid 42 $algo sel src $dstip/24 dst $srcip/24 \
|
D | nettest.c | 1377 policy.sel.family = args->version; in config_xfrm_policy()
|
/tools/testing/selftests/bpf/ |
D | test_progs.c | 75 static bool should_run(struct test_selector *sel, int num, const char *name) in should_run() argument 79 for (i = 0; i < sel->blacklist.cnt; i++) { in should_run() 80 if (glob_match(name, sel->blacklist.strs[i])) in should_run() 84 for (i = 0; i < sel->whitelist.cnt; i++) { in should_run() 85 if (glob_match(name, sel->whitelist.strs[i])) in should_run() 89 if (!sel->whitelist.cnt && !sel->num_set) in should_run() 92 return num < sel->num_set_len && sel->num_set[num]; in should_run()
|
/tools/testing/selftests/kvm/aarch64/ |
D | get-reg-list.c | 587 struct vcpu_config *c, *sel = NULL; in main() local 595 sel = parse_config(av[i]); in main() 610 if (!sel) in main() 616 if (sel && c != sel) in main()
|
/tools/testing/selftests/netfilter/ |
D | nft_flowtable.sh | 483 …$me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $rnet dst $lnet 484 …mote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $lnet dst $rnet
|