Home
last modified time | relevance | path

Searched full:exec (Results 1 – 25 of 770) sorted by relevance

12345678910>>...31

/linux/tools/testing/selftests/net/
H A Dvlan_hw_filter.sh41 ip netns exec ${NETNS} ip link add bond0 type bond mode 0
42 ip netns exec ${NETNS} ip link add bond_slave_1 type veth peer veth2
43 ip netns exec ${NETNS} ip link set bond_slave_1 master bond0
44 ip netns exec ${NETNS} ethtool -K bond0 rx-vlan-filter off
45 ip netns exec ${NETNS} ip link add link bond_slave_1 name bond_slave_1.0 type vlan id 0
46 ip netns exec ${NETNS} ip link add link bond0 name bond0.0 type vlan id 0
47 ip netns exec ${NETNS} ip link set bond_slave_1 nomaster
48 ip netns exec ${NETNS} ip link del veth2 || fail "Please check vlan HW filter function"
55 ip netns exec ${NETNS} ip link add bond0 type bond mode 0
56 ip netns exec ${NETNS} ip link add link bond0 name vlan0 type vlan id 0 protocol 802.1q
[all …]
H A Dip_defrag.sh17 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_high_thresh=9000000 >/dev/null 2>&1
18 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_low_thresh=7000000 >/dev/null 2>&1
19 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_time=1 >/dev/null 2>&1
21 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_high_thresh=9000000 >/dev/null 2>&1
22 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_low_thresh=7000000 >/dev/null 2>&1
23 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_time=1 >/dev/null 2>&1
25 …ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_high_thresh=9000000 >/dev/null…
26 …ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_low_thresh=7000000 >/dev/null…
27 ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_timeout=1 >/dev/null 2>&1
30 ip netns exec "${NETNS}" sysctl -w net.ipv6.route.max_size=65536 >/dev/null 2>&1
[all …]
H A Damt.sh131 ip netns exec "${LISTENER}" ip a a 192.168.0.2/24 dev l_gw
132 ip netns exec "${LISTENER}" ip r a default via 192.168.0.1 dev l_gw
133 ip netns exec "${LISTENER}" ip a a 2001:db8::2/64 dev l_gw
134 ip netns exec "${LISTENER}" ip r a default via 2001:db8::1 dev l_gw
135 ip netns exec "${LISTENER}" ip a a 239.0.0.1/32 dev l_gw autojoin
136 ip netns exec "${LISTENER}" ip a a ff0e::5:6/128 dev l_gw autojoin
138 ip netns exec "${GATEWAY}" ip a a 192.168.0.1/24 dev gw_l
139 ip netns exec "${GATEWAY}" ip a a 2001:db8::1/64 dev gw_l
140 ip netns exec "${GATEWAY}" ip a a 10.0.0.1/24 dev gw_relay
141 ip netns exec "${GATEWAY}" ip link add br0 type bridge
[all …]
H A Dtraceroute.sh28 out=$(eval ip netns exec ${ns} ${cmd} 2>&1)
52 ip netns exec ${ns} ip addr add dev lo ${addr}
55 ip netns exec ${ns} ip -6 addr add dev lo ${addr6}
58 ip netns exec ${ns} ip ro add unreachable default metric 8192
59 ip netns exec ${ns} ip -6 ro add unreachable default metric 8192
61 ip netns exec ${ns} sysctl -qw net.ipv4.ip_forward=1
62 ip netns exec ${ns} sysctl -qw net.ipv6.conf.all.keep_addr_on_down=1
63 ip netns exec ${ns} sysctl -qw net.ipv6.conf.all.forwarding=1
64 ip netns exec ${ns} sysctl -qw net.ipv6.conf.default.forwarding=1
65 ip netns exec
[all...]
H A Dtfo_passive.sh26 -path $NSIM_SV_SYS/net -exec basename {} \;)
28 -path $NSIM_CL_SYS/net -exec basename {} \;)
33 ip netns exec nssv ip addr add "${SERVER_IP}/24" dev $NSIM_SV_NAME
34 ip netns exec nscl ip addr add "${CLIENT_IP}/24" dev $NSIM_CL_NAME
36 ip netns exec nssv ip link set dev $NSIM_SV_NAME up
37 ip netns exec nscl ip link set dev $NSIM_CL_NAME up
40 ip netns exec nssv sysctl -w net.ipv4.tcp_fastopen=519 > /dev/null
66 exec {NSIM_SV_FD}</var/run/netns/nssv
67 NSIM_SV_IFIDX=$(ip netns exec nssv cat /sys/class/net/$NSIM_SV_NAME/ifindex)
70 exec {NSIM_CL_F
[all...]
/linux/tools/testing/selftests/bpf/
H A Dtest_lwt_seg6local.sh
H A Dtest_tunnel.sh
H A Dtest_xdp_vlan.sh
/linux/drivers/gpu/drm/vc4/
H A Dvc4_gem.c158 struct vc4_exec_info *exec[2]; in vc4_save_hang_state() local
170 exec[0] = vc4_first_bin_job(vc4); in vc4_save_hang_state()
171 exec[1] = vc4_first_render_job(vc4); in vc4_save_hang_state()
172 if (!exec[0] && !exec[1]) { in vc4_save_hang_state()
180 if (!exec[i]) in vc4_save_hang_state()
184 list_for_each_entry(bo, &exec[i]->unref_list, unref_head) in vc4_save_hang_state()
186 state->bo_count += exec[i]->bo_count + unref_list_count; in vc4_save_hang_state()
199 if (!exec[i]) in vc4_save_hang_state()
202 for (j = 0; j < exec[i]->bo_count; j++) { in vc4_save_hang_state()
203 bo = to_vc4_bo(exec[i]->bo[j]); in vc4_save_hang_state()
[all …]
H A Dvc4_irq.c67 struct vc4_exec_info *exec; in vc4_overflow_mem_work() local
92 exec = vc4_first_bin_job(vc4); in vc4_overflow_mem_work()
93 if (!exec) in vc4_overflow_mem_work()
94 exec = vc4_last_render_job(vc4); in vc4_overflow_mem_work()
95 if (exec) { in vc4_overflow_mem_work()
96 exec->bin_slots |= vc4->bin_alloc_overflow; in vc4_overflow_mem_work()
120 struct vc4_exec_info *next, *exec = vc4_first_bin_job(vc4); in vc4_irq_finish_bin_job() local
122 if (!exec) in vc4_irq_finish_bin_job()
125 trace_vc4_bcl_end_irq(dev, exec->seqno); in vc4_irq_finish_bin_job()
127 vc4_move_job_to_render(dev, exec); in vc4_irq_finish_bin_job()
[all …]
/linux/tools/testing/selftests/net/netfilter/
H A Dipvs.sh65 ip netns exec "${ns0}" ip link set veth01 up
66 ip netns exec "${ns0}" ip link set veth02 up
67 ip netns exec "${ns0}" ip link add br0 type bridge
68 ip netns exec "${ns0}" ip link set veth01 master br0
69 ip netns exec "${ns0}" ip link set veth02 master br0
70 ip netns exec "${ns0}" ip link set br0 up
71 ip netns exec "${ns0}" ip addr add "${cip_v4}/24" dev br0
73 ip netns exec "${ns1}" ip link set veth10 up
74 ip netns exec "${ns1}" ip addr add "${gip_v4}/24" dev veth10
75 ip netns exec "${ns1}" ip link set veth12 up
[all …]
H A Dnft_nat.sh69 ip netns exec "$ns" nft list counter inet filter "$counter" 1>&2
77 if ! ip netns exec "$ns" nft list counter inet filter ns0in | grep -q "packets 1 bytes 84";then
82 if ! ip netns exec "$ns" nft list counter inet filter ns0out | grep -q "packets 1 bytes 84";then
88 if ! ip netns exec "$ns" nft list counter inet filter ns0in6 | grep -q "$expect";then
92 if ! ip netns exec "$ns" nft list counter inet filter ns0out6 | grep -q "$expect";then
105 if ! ip netns exec "$ns0" nft list counter inet filter ns0in | grep -q "packets 0 bytes 0";then
110 if ! ip netns exec "$ns0" nft list counter inet filter ns0in6 | grep -q "packets 0 bytes 0";then
115 if ! ip netns exec "$ns0" nft list counter inet filter ns0out | grep -q "packets 0 bytes 0";then
119 if ! ip netns exec "$ns0" nft list counter inet filter ns0out6 | grep -q "packets 0 bytes 0";then
126 if ! ip netns exec "
[all...]
H A Dnft_queue.sh90 ip netns exec "$nsrouter" nft -f /dev/stdin <<EOF
126 ip netns exec "$nsrouter" nft -f /dev/stdin <<EOF
153 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.99 > /dev/null; then
157 if ! ip netns exec "$ns1" ping -c 1 -q dead:2::99 > /dev/null; then
165 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.1 > /dev/null; then
169 if ! ip netns exec "$ns1" ping -c 1 -q dead:2::1 > /dev/null; then
179 ip netns exec "$nsrouter" nft -f /dev/stdin <<EOF
188 ip netns exec "$ns1" ping -W 2 -c 1 -q 10.0.2.99 > /dev/null
191 ip netns exec "$ns1" ping -W 2 -c 1 -q dead:2::99 > /dev/null
203 if ! ip netns exec "
[all...]
H A Dnf_nat_edemux.sh29 ip netns exec "$ns" ss -nt -o state established "dport = :$port" | grep -q "$port"
37 if ! ip netns exec "$ns" conntrack --get -s 192.168.1.2 -d 192.168.1.1 -p tcp \
40 ip netns exec "$ns" bash -c 'conntrack -L; conntrack -S; ss -nt'
52 ip netns exec "$ns1" ip link set up dev lo
53 ip netns exec "$ns1" ip link set up dev veth1
54 ip netns exec "$ns1" ip addr add 192.168.1.1/24 dev veth1
56 ip netns exec "$ns2" ip link set up dev lo
57 ip netns exec "$ns2" ip link set up dev veth2
58 ip netns exec "$ns2" ip addr add 192.168.1.2/24 dev veth2
61 ip netns exec "$ns1" socat -u TCP-LISTEN:5201,fork OPEN:/dev/null,wronly=1 &
[all …]
H A Dnft_nat_zones.sh87 echo netns exec "$cl" ip link set eth0 up
88 echo netns exec "$cl" sysctl -q net.ipv4.tcp_syn_retries=2
89 echo netns exec "$gw" ip link set "veth$i" up
90 echo netns exec "$gw" sysctl -q net.ipv4.conf.veth"$i".arp_ignore=2
93 echo netns exec "$cl" ip addr add 10.1.0.3/24 dev eth0
94 echo netns exec "$cl" ip addr add dead:1::3/64 dev eth0 nodad
95 echo netns exec "$cl" ip route add default via 10.1.0.2 dev eth0
96 echo netns exec "$cl" ip route add default via dead:1::2 dev eth0
99 echo netns exec "$gw" ip addr add 10.1.0.2/24 dev "veth$i"
100 echo netns exec "
[all...]
H A Dconntrack_vrf.sh79 ip netns exec "$ns1" socat -u -4 TCP-LISTEN:55555,reuseaddr,fork STDOUT > /dev/null &
87 ip netns exec "$ns0" nft -f - <<EOF
108 ip netns exec "$ns1" ping -W 1 -c 1 -I veth0 "$IP0" > /dev/null
111 count=$(ip netns exec "$ns0" conntrack -L -s $IP1 -d $IP0 -p icmp --zone 1 2>/dev/null | wc -l)
116 count=$(ip netns exec "$ns0" conntrack -L -s $IP1 -d $IP0 -p icmp --zone 2 2> /dev/null | wc -l)
121 ip netns exec "$ns0" conntrack -L
122 ip netns exec "$ns0" nft list ruleset
138 ip netns exec "$ns0" conntrack -F 2>/dev/null
140 ip netns exec "$ns0" nft -f - <<EOF
161 if ! ip netns exec "
[all...]
H A Dbridge_brouter.sh54 if ! ip netns exec "$nsbr" ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP; then
59 ip netns exec "$nsbr" sysctl -q net.ipv4.conf.veth0.forwarding=0
62 if ip netns exec "$ns1" ping -q -c 1 10.0.0.12 -W 0.5 > /dev/null 2>&1; then
71 ip netns exec "$nsbr" sysctl -q net.ipv4.conf.veth0.forwarding=1
72 ip netns exec "$nsbr" sysctl -q net.ipv4.conf.veth1.forwarding=1
74 if ! ip netns exec "$ns1" ping -q -c 1 10.0.0.12 > /dev/null; then
80 ip netns exec "$nsbr" ebtables -t broute -F
83 if ! ip netns exec "$ns1" ping -q -c 1 10.0.0.12 > /dev/null; then
88 ip netns exec "$nsbr" ebtables -t filter -A FORWARD -p ipv4 --ip-protocol icmp -j DROP
91 if ip netns exec "
[all...]
H A Drpath.sh38 ip netns exec "$ns2" sysctl -q net.ipv6.conf.all.keep_addr_on_down=1
70 if ! ip netns exec "$ns2" "$iptables" $common -m rpfilter;then
74 ip netns exec "$ns2" "$iptables" $common -m rpfilter --invert
79 if ! ip netns exec "$ns2" "$ip6tables" $common -m rpfilter;then
83 ip netns exec "$ns2" "$ip6tables" $common -m rpfilter --invert
85 [ -n "$nft" ] && ip netns exec "$ns2" $nft -f - <<EOF
99 #ip netns exec "$ns2" "$iptables" -t raw -vS
100 #ip netns exec "$ns2" "$ip6tables" -t raw -vS
101 #ip netns exec "$ns2" nft list ruleset
108 ip netns exec "
[all...]
/linux/include/drm/
H A Ddrm_exec.h56 * @exec: Pointer to the drm_exec context
63 drm_exec_obj(struct drm_exec *exec, unsigned long index) in drm_exec_obj() argument
65 return index < exec->num_objects ? exec->objects[index] : NULL; in drm_exec_obj()
70 * @exec: drm_exec object
76 #define drm_exec_for_each_locked_object(exec, index, obj) \ argument
77 for ((index) = 0; ((obj) = drm_exec_obj(exec, index)); ++(index))
82 * @exec: drm_exec object
90 #define drm_exec_for_each_locked_object_reverse(exec, index, obj) \ argument
91 for ((index) = (exec)->num_objects - 1; \
92 ((obj) = drm_exec_obj(exec, index)); --(index))
[all …]
/linux/tools/testing/selftests/exec/
H A Dcheck-exec-tests.sh7 # samples/check-exec/inc.c
14 exec 2>/dev/null
86 out="$(cat script-exec.inc | "$@" ./inc -i)" || ret=$?
101 out="$("$@" ./inc -c "$(< script-exec.inc)")" || ret=$?
128 ktap_test exec_direct 0 script-exec.inc
129 ktap_test exec_indirect 0 script-exec.inc
132 ktap_test exec_stdin_reg 0 script-exec.inc
148 ktap_test exec_direct 0 script-exec.inc ./set-exec -f --
149 ktap_test exec_indirect 0 script-exec.inc ./set-exec -f --
152 ktap_test exec_stdin_reg 0 script-exec.inc ./set-exec -f --
[all …]
/linux/drivers/gpu/drm/xe/
H A Dxe_exec_queue_types.h41 /** @xef: Back pointer to xe file if this is user created exec queue */
44 /** @gt: GT structure this exec queue can submit to */
52 /** @refcount: ref count of this exec queue */
54 /** @vm: VM (address space) for this exec queue */
56 /** @class: class of this exec queue */
59 * @logical_mask: logical mask of where job submitted to exec queue can run
62 /** @name: name of this exec queue */
64 /** @width: width (number BB submitted per exec) of this exec queue */
72 * @last_fence: last fence on exec queue, protected by vm->lock in write
73 * mode if bind exec queue, protected by dma resv lock if non-bind exec
[all …]
/linux/tools/testing/selftests/net/mptcp/
H A Duserspace_pm.sh125 ip netns exec "$ns1" sysctl -q net.mptcp.path_manager=userspace
126 pm_type="$(ip netns exec "$ns1" sysctl -n net.mptcp.pm_type)"
133 ip netns exec "$ns1" sysctl -q net.mptcp.path_manager=error 2>/dev/null
134 pm_type="$(ip netns exec "$ns1" sysctl -n net.mptcp.pm_type)"
141 ip netns exec "$ns1" sysctl -q net.mptcp.pm_type=0
142 pm_name="$(ip netns exec "$ns1" sysctl -n net.mptcp.path_manager)"
151 ip netns exec "$i" sysctl -q net.mptcp.pm_type=1
205 ip netns exec "$ns2" sysctl -q net.mptcp.allow_join_initial_addr_port=0
211 ip netns exec "$ns1" \
218 ip netns exec "$ns2" \
[all …]
/linux/tools/testing/selftests/drivers/net/bonding/
H A Dbond-arp-interval-causes-panic.sh28 ip netns exec server ip link set dev eth0 up
29 ip netns exec server ip addr add ${server_ip4}/24 dev eth0
31 ip netns exec client ip link add dev bond0 down type bond mode 1 \
33 ip netns exec client ip link set dev eth0 master bond0
34 ip netns exec client ip link set dev bond0 up
35 ip netns exec client ip addr add ${client_ip4}/24 dev bond0
36 ip netns exec client ping -c 5 $server_ip4 >/dev/null
38 ip netns exec client ip link set dev eth0 nomaster
39 ip netns exec client ip link set dev bond0 down
40 ip netns exec client ip link set dev bond0 type bond mode 0 \
[all …]
H A Dlag_lib.sh128 ip netns exec ${SWITCH} ip link add br0 up type bridge
129 ip netns exec ${SWITCH} ip link set eth0 master br0 up
130 ip netns exec ${SWITCH} ip link set eth1 master br0 up
131 ip netns exec ${SWITCH} ip addr add ${SWITCHIP}/24 dev br0
136 ip netns exec ${CLIENT} ip link del bond0
137 ip netns exec ${SWITCH} ip link set eth0 up
138 ip netns exec ${SWITCH} ip link set eth1 up
144 ip netns exec ${CLIENT} ip link set eth0 down
145 ip netns exec ${CLIENT} ip link set eth1 down
147 ip netns exec ${CLIENT} ip link add bond0 type bond $@
[all …]
/linux/tools/testing/selftests/powerpc/dexcr/
H A Ddexcr_test.c14 * Helper function for testing the behaviour of a newly exec-ed process
24 "setting aspect across exec not applied"); in dexcr_prctl_onexec_test_child()
27 "setting aspect across exec not inherited"); in dexcr_prctl_onexec_test_child()
29 FAIL_IF_EXIT_MSG(!(aspect & dexcr), "setting aspect across exec did not take effect"); in dexcr_prctl_onexec_test_child()
32 "clearing aspect across exec not applied"); in dexcr_prctl_onexec_test_child()
35 "clearing aspect across exec not inherited"); in dexcr_prctl_onexec_test_child()
37 FAIL_IF_EXIT_MSG(aspect & dexcr, "clearing aspect across exec did not take effect"); in dexcr_prctl_onexec_test_child()
68 FAIL_IF_MSG(err != -1, "simultaneous set and clear on exec should be rejected"); in dexcr_prctl_aspect_test()
69 …FAIL_IF_MSG(errno_save != EINVAL, "simultaneous set and clear on exec should be rejected with EINV… in dexcr_prctl_aspect_test()
89 /* We make it set on exec (doesn't change our current value) */ in dexcr_prctl_aspect_test()
[all …]

12345678910>>...31