Home
last modified time | relevance | path

Searched +full:test +full:- +full:rules (Results 1 – 25 of 294) sorted by relevance

12345678910>>...12

/linux-6.8/Documentation/admin-guide/aoe/
Dudev-install.sh1 # install the aoe-specific udev rules from udev.txt into
10 if test -z "$conf"; then
11 if test -r /etc/udev/udev.conf; then
14 conf="`find /etc -type f -name udev.conf 2> /dev/null`"
15 if test -z "$conf" || test ! -r "$conf"; then
22 # find the directory where udev rules are stored, often
23 # /etc/udev/rules.d
25 rules_d="`sed -n '/^udev_rules=/{ s!udev_rules=!!; s!\"!!g; p; }' $conf`"
26 if test -z "$rules_d" ; then
27 rules_d=/etc/udev/rules.d
[all …]
/linux-6.8/drivers/gpu/drm/ci/
Dgitlab-ci.yml2 DRM_CI_PROJECT_PATH: &drm-ci-project-path mesa/mesa
3 DRM_CI_COMMIT_SHA: &drm-ci-commit-sha edfbf74df1d4d6ce54ffe24566108be0e1a98c3d
6 TARGET_BRANCH: drm-next
10 DEQP_RUNNER_GIT_URL: https://gitlab.freedesktop.org/anholt/deqp-runner.git
13 FDO_UPSTREAM_REPO: helen.fornazier/linux # The repo where the git-archive daily runs
14 MESA_TEMPLATES_COMMIT: &ci-templates-commit d5aa3941aa03c2f716595116354fb81eb8012acb
16 CI_PRE_CLONE_SCRIPT: |-
17 set -o xtrace
18-L --retry 4 -f --retry-all-errors --retry-delay 60 -s ${DRM_CI_PROJECT_URL}/-/raw/${DRM_CI_COMMIT…
19 bash download-git-cache.sh
[all …]
Dtest.yml1 .test-rules:
2 rules:
3 - if: '$FD_FARM == "offline" && $RUNNER_TAG =~ /^google-freedreno-/'
5 - if: '$COLLABORA_FARM == "offline" && $RUNNER_TAG =~ /^mesa-ci-x86-64-lava-/'
7 - !reference [.no_scheduled_pipelines-rules, rules]
8 - when: on_success
10 .lava-test:
12 - .test-rules
15 - rm -rf install
16 - tar -xf artifacts/install.tar
[all …]
Dcontainer.yml3 …_REPOSITORY_URL: ${DRM_CI_PROJECT_URL}.git # So ci-templates clones drm-ci instead of the repo to
6 debian/x86_64_build-base:
8 …airo-dev libdw-dev libjson-c-dev libkmod2 libkmod-dev libpciaccess-dev libproc2-dev libudev-dev li…
10 debian/x86_64_test-gl:
12 …CKAGES: "jq libasound2 libcairo2 libdw1 libglib2.0-0 libjson-c5 libkmod-dev libkmod2 libgles2 libp…
16-dev libdw-dev libjson-c-dev libproc2-dev libkmod2 libkmod-dev libpciaccess-dev libudev-dev libunw…
20 EXTRA_LOCAL_PACKAGES: "jq libasound2 libcairo2 libdw1 libglib2.0-0 libjson-c5"
24 rules:
25 - when: never
27 debian/x86_64_test-vk:
[all …]
/linux-6.8/security/apparmor/
Dcapability.c1 // SPDX-License-Identifier: GPL-2.0-only
7 * Copyright (C) 1998-2008 Novell/SUSE
8 * Copyright 2009-2010 Canonical Ltd.
40 * audit_cb - call back for capability components of audit struct
49 audit_log_untrustedstring(ab, capability_names[sa->u.cap]); in audit_cb()
53 * audit_caps - audit a capability
57 * @error: error code returned by test
62 * Returns: 0 or ad->error on success, error code on failure
67 struct aa_ruleset *rules = list_first_entry(&profile->rules, in audit_caps() local
68 typeof(*rules), list); in audit_caps()
[all …]
Dfile.c1 // SPDX-License-Identifier: GPL-2.0-only
7 * Copyright (C) 1998-2008 Novell/SUSE
8 * Copyright 2009-2010 Canonical Ltd.
40 * file_audit_cb - call back for file specific audit fields
48 kuid_t fsuid = ad->subj_cred ? ad->subj_cred->fsuid : current_fsuid(); in file_audit_cb()
51 if (ad->request & AA_AUDIT_FILE_MASK) { in file_audit_cb()
53 map_mask_to_chr_mask(ad->request)); in file_audit_cb()
56 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb()
58 map_mask_to_chr_mask(ad->denied)); in file_audit_cb()
61 if (ad->request & AA_AUDIT_FILE_MASK) { in file_audit_cb()
[all …]
Ddomain.c1 // SPDX-License-Identifier: GPL-2.0-only
7 * Copyright (C) 2002-2008 Novell/SUSE
8 * Copyright 2009-2010 Canonical Ltd.
33 * may_change_ptraced_domain - check if can change profile on ptraced task
77 /**** TODO: dedup to aa_label_match - needs perm and dfa, merging
80 * and policy->dfa with file->dfa
83 * Assumes visibility test has already been done.
85 * visibility test.
91 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_component() local
92 typeof(*rules), list); in match_component()
[all …]
Dresource.c1 // SPDX-License-Identifier: GPL-2.0-only
7 * Copyright (C) 1998-2008 Novell/SUSE
8 * Copyright 2009-2010 Canonical Ltd.
36 rlim_names[ad->rlim.rlim], ad->rlim.max); in audit_cb()
37 if (ad->peer) { in audit_cb()
39 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in audit_cb()
45 * audit_resource - audit setting resource limit
54 * Returns: 0 or ad->error else other error code on failure
75 * aa_map_resource - map compiled policy resource to internal #
92 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_setrlimit() local
[all …]
Dlabel.c1 // SPDX-License-Identifier: GPL-2.0-only
27 * code - will take a ref count on a label if it needs the label
29 * profiles - each profile is a label
30 * secids - a pinned secid will keep a refcount of the label it is
32 * objects - inode, files, sockets, ...
45 /* p->label will not updated any more as p is dead */ in free_proxy()
46 aa_put_label(rcu_dereference_protected(proxy->label, true)); in free_proxy()
48 RCU_INIT_POINTER(proxy->label, (struct aa_label *)PROXY_POISON); in free_proxy()
66 kref_init(&new->count); in aa_alloc_proxy()
67 rcu_assign_pointer(new->label, aa_get_label(label)); in aa_alloc_proxy()
[all …]
/linux-6.8/tools/perf/tests/shell/lib/
Dperf_metric_validation.py1 #SPDX-License-Identifier: GPL-2.0
13 self.rules = None
29 # vars for test pass/failure statistics
30 …oremetrics= set() # metrics with no results or negative results, neg result counts as a failed test
51 def read_json(self, filename: str) -> dict:
75 def get_bounds(self, lb, ub, error, alias={}, ridx:int = 0) -> list:
84 upper bound, return -1 if the upper bound is a metric value and is not collected
107 ubv = get_bound_value(ub, -1, ridx)
116 def get_value(self, name:str, ridx:int = 0) -> list:
120 All future test(s) on this metric will fail.
[all …]
/linux-6.8/tools/testing/selftests/drivers/net/mlxsw/
Dtc_flower_scale.sh2 # SPDX-License-Identifier: GPL-2.0
4 # Test for resource limit of offloaded flower rules. The test adds a given
6 # indication for all of the tc flower rules. This file contains functions to set
7 # up a testing topology and run the test, and is meant to be sourced from a test
8 # script that calls the testing routine with a given number of rules.
56 if [[ -v TC_FLOWER_BATCH_FILE ]]; then
57 rm -f $TC_FLOWER_BATCH_FILE
76 cat >> $TC_FLOWER_BATCH_FILE <<-EOF
86 tc -b $TC_FLOWER_BATCH_FILE
94 local last=$((count - 1))
[all …]
/linux-6.8/tools/testing/selftests/netfilter/
Dxt_string.sh2 # SPDX-License-Identifier: GPL-2.0
4 # return code to signal skipped test
8 if ! iptables --version >/dev/null 2>&1; then
9 echo "SKIP: Test needs iptables"
12 if ! ip -V >/dev/null 2>&1; then
13 echo "SKIP: Test needs iproute2"
16 if ! nc -h >/dev/null 2>&1; then
17 echo "SKIP: Test needs netcat"
24 ns="ns-$(mktemp -u XXXXXXXX)"
27 ip -net "$ns" link add d0 type dummy
[all …]
/linux-6.8/tools/testing/selftests/hid/tests/
Dbase.py2 # SPDX-License-Identifier: GPL-2.0
3 # -*- coding: utf-8 -*-
19 logger = logging.getLogger("hidtools.test.base")
140 name = f"uhid test {self.__class__.__name__}"
141 if not name.startswith("uhid test "):
142 name = "uhid test " + self.name
154 # List of kernel modules to load before starting the test
155 # if any module is not available (not compiled), the test will skip.
157 # for example ("playstation", "hid-playstation")
212 sysfs_path = Path("/sys/module") / kernel_module.replace("-", "_")
[all …]
/linux-6.8/lib/
DKconfig.kcsan1 # SPDX-License-Identifier: GPL-2.0-only
7 def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-distinguish-volatile=1)) || \
8 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-distinguish-volatile=1))
11 <file:Documentation/dev-tools/kcsan.rst>.
21 data-race detector that relies on compile-time instrumentation.
22 KCSAN uses a watchpoint-based sampling approach to detect races.
29 See <file:Documentation/dev-tools/kcsan.rst> for more details.
34 …def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-compound-read-before-write=1))…
35 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-compound-read-before-write=1))
37 The compiler instruments plain compound read-write operations
[all …]
/linux-6.8/drivers/net/ethernet/microchip/vcap/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
9 bool "VCAP (Versatile Content-Aware Processor) library"
13 A VCAP is essentially a TCAM with rules consisting of
15 - Programmable key fields
16 - Programmable action fields
17 - A counter (which may be only one bit wide)
21 - A number of lookups
22 - A keyset configuration per port per lookup
24 The VCAP implementation provides switchcore independent handling of rules
27 - Creating and deleting rules
[all …]
Dvcap_api_kunit.c1 // SPDX-License-Identifier: BSD-3-Clause
3 * Microchip VCAP API kunit test suite
6 #include <kunit/test.h>
11 /* First we have the test infrastructure that emulates the platform
39 if (kslist->cnt > 0) { in test_val_keyset()
40 switch (admin->vtype) { in test_val_keyset()
42 for (idx = 0; idx < kslist->cnt; idx++) { in test_val_keyset()
43 if (kslist->keysets[idx] == VCAP_KFS_ETAG) in test_val_keyset()
44 return kslist->keysets[idx]; in test_val_keyset()
45 if (kslist->keysets[idx] == VCAP_KFS_PURE_5TUPLE_IP4) in test_val_keyset()
[all …]
Dvcap_api_debugfs_kunit.c1 // SPDX-License-Identifier: BSD-3-Clause
3 * Microchip VCAP API kunit test suite
6 #include <kunit/test.h>
12 /* First we have the test infrastructure that emulates the platform
43 if (kslist->cnt > 0) { in test_val_keyset()
44 switch (admin->vtype) { in test_val_keyset()
46 for (idx = 0; idx < kslist->cnt; idx++) { in test_val_keyset()
47 if (kslist->keysets[idx] == VCAP_KFS_ETAG) in test_val_keyset()
48 return kslist->keysets[idx]; in test_val_keyset()
49 if (kslist->keysets[idx] == in test_val_keyset()
[all …]
/linux-6.8/drivers/gpu/drm/xe/tests/
Dxe_rtp_test.c1 // SPDX-License-Identifier: GPL-2.0
12 #include <kunit/test.h>
55 .name = "coalesce-same-reg",
62 { XE_RTP_NAME("basic-1"),
66 { XE_RTP_NAME("basic-2"),
74 .name = "no-match-no-add",
79 /* Don't coalesce second entry since rules don't match */
81 { XE_RTP_NAME("basic-1"),
85 { XE_RTP_NAME("basic-2"),
93 .name = "no-match-no-add-multiple-rules",
[all …]
/linux-6.8/samples/bpf/
Dcookie_uid_helper_example.c1 /* This test is a demo of using get_socket_uid and get_socket_cookie
6 * TEST:
7 * ./run_cookie_uid_helper_example.sh -option
9 * -t: do traffic monitoring test, the program will continuously
22 * -s: do getsockopt SO_COOKIE test, the program will set up a pair of
92 /* pc2-4: save &socketCookie to r7 for future usage*/ in prog_load()
93 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8), in prog_load()
95 BPF_ALU64_IMM(BPF_ADD, BPF_REG_7, -8), in prog_load()
97 * pc5-8: set up the registers for BPF_FUNC_map_lookup_elem, in prog_load()
107 * Otherwise do pc10-22 to setup a new data entry. in prog_load()
[all …]
/linux-6.8/drivers/gpu/drm/xe/
Dxe_rtp.h1 /* SPDX-License-Identifier: MIT */
28 * Macros to encode rules to match against platform, IP version, stepping, etc.
29 * Shouldn't be used directly - see XE_RTP_RULES()
51 * XE_RTP_RULE_PLATFORM - Create rule matching platform
60 * XE_RTP_RULE_SUBPLATFORM - Create rule matching platform and sub-platform
62 * @sub_: sub-platform to match
70 * XE_RTP_RULE_GRAPHICS_STEP - Create rule matching graphics stepping
83 * XE_RTP_RULE_MEDIA_STEP - Create rule matching media stepping
96 * XE_RTP_RULE_ENGINE_CLASS - Create rule matching an engine class
105 * XE_RTP_RULE_FUNC - Create rule using callback function for match
[all …]
/linux-6.8/tools/testing/selftests/landlock/
Dfs_test.c1 // SPDX-License-Identifier: GPL-2.0
3 * Landlock tests - Filesystem
5 * Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net>
7 * Copyright © 2020-2022 Microsoft Corporation
132 /* Ignores too-long filesystem names. */ in supports_filesystem()
218 for (i = strlen(walker); i > 0; i--) { in remove_path()
253 return mount(mnt->source ?: mnt->type, target, mnt->type, mnt->flags, in mount_opt()
254 mnt->data); in mount_opt()
272 TH_LOG("Failed to mount the %s filesystem: %s", mnt->type, in prepare_layout_opt()
299 /* clang-format off */
[all …]
/linux-6.8/tools/testing/selftests/mm/
DMakefile1 # SPDX-License-Identifier: GPL-2.0
11 uname_M := $(shell uname -m 2>/dev/null || echo not)
13 uname_M := $(shell echo $(CROSS_COMPILE) | grep -o '^[a-z0-9]\+')
15 ARCH ?= $(shell echo $(uname_M) | sed -e 's/aarch64.*/arm64/' -e 's/ppc64.*/ppc64/')
18 # Without this, failed build products remain, with up-to-date timestamps,
23 # Avoid accidental wrong builds, due to built-in rules working just a little
24 # bit too well--but not quite as well as required for our situation here.
28 # However, the built-in rules, if not suppressed, will pick up CFLAGS and the
29 # initial LDLIBS (but not the target-specific LDLIBS, because those are only
33 MAKEFLAGS += --no-builtin-rules
[all …]
/linux-6.8/tools/memory-model/Documentation/
Drecipes.txt8 and the third section provides a few rules of thumb.
20 ------------------------------------
31 2. Compilers are permitted to use the "as-if" rule. That is, a
33 as long as the results of a single-threaded execution appear
34 just as if the compiler had followed all the relevant rules.
41 your full-ordering warranty, as do undersized accesses that load
51 holding the update-side lock, reads from that variable
62 -------
64 Locking is well-known and straightforward, at least if you don't think
96 following litmus test:
[all …]
/linux-6.8/tools/testing/selftests/kexec/
Dtest_kexec_file_load.sh2 # SPDX-License-Identifier: GPL-2.0
8 # To determine whether the kernel image is signed, this test depends
9 # on pesign and getfattr. This test also requires the kernel to be
11 # enabled or access to the extract-ikconfig script.
13 TEST="KEXEC_FILE_LOAD"
16 trap "{ rm -f $IKCONFIG ; }" EXIT
19 # be signed, but these policy rules may be replaced with a custom
30 if [ $? -eq 1 ]; then
36 # kexec kernel image be signed. Policy rules are walked
38 # might not necessarily be used. This test assumes if a policy
[all …]
/linux-6.8/tools/testing/selftests/powerpc/nx-gzip/
DREADME1 Test the nx-gzip function:
5 /dev/crypto/nx-gzip
7 sudo chmod go+rw /dev/crypto/nx-gzip
10 /etc/udev/rules.d/99-nx-gzip.rules
14 $ gcc -O3 -I./include -o gzfht_test gzfht_test.c gzip_vas.c
15 $ gcc -O3 -I./include -o gunz_test gunz_test.c gzip_vas.c
40 Note that the code here are intended for testing the nx-gzip hardware function.
45 https://github.com/libnxz/power-gzip

12345678910>>...12