/linux/tools/testing/selftests/net/ |
H A D | vlan_hw_filter.sh | 41 ip netns exec ${NETNS} ip link add bond0 type bond mode 0 42 ip netns exec ${NETNS} ip link add bond_slave_1 type veth peer veth2 43 ip netns exec ${NETNS} ip link set bond_slave_1 master bond0 44 ip netns exec ${NETNS} ethtool -K bond0 rx-vlan-filter off 45 ip netns exec ${NETNS} ip link add link bond_slave_1 name bond_slave_1.0 type vlan id 0 46 ip netns exec ${NETNS} ip link add link bond0 name bond0.0 type vlan id 0 47 ip netns exec ${NETNS} ip link set bond_slave_1 nomaster 48 ip netns exec ${NETNS} ip link del veth2 || fail "Please check vlan HW filter function" 55 ip netns exec ${NETNS} ip link add bond0 type bond mode 0 56 ip netns exec ${NETNS} ip link add link bond0 name vlan0 type vlan id 0 protocol 802.1q [all …]
|
H A D | ip_defrag.sh | 17 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_high_thresh=9000000 >/dev/null 2>&1 18 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_low_thresh=7000000 >/dev/null 2>&1 19 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_time=1 >/dev/null 2>&1 21 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_high_thresh=9000000 >/dev/null 2>&1 22 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_low_thresh=7000000 >/dev/null 2>&1 23 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_time=1 >/dev/null 2>&1 25 …ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_high_thresh=9000000 >/dev/null… 26 …ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_low_thresh=7000000 >/dev/null… 27 ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_timeout=1 >/dev/null 2>&1 30 ip netns exec "${NETNS}" sysctl -w net.ipv6.route.max_size=65536 >/dev/null 2>&1 [all …]
|
H A D | amt.sh | 131 ip netns exec "${LISTENER}" ip a a 192.168.0.2/24 dev l_gw 132 ip netns exec "${LISTENER}" ip r a default via 192.168.0.1 dev l_gw 133 ip netns exec "${LISTENER}" ip a a 2001:db8::2/64 dev l_gw 134 ip netns exec "${LISTENER}" ip r a default via 2001:db8::1 dev l_gw 135 ip netns exec "${LISTENER}" ip a a 239.0.0.1/32 dev l_gw autojoin 136 ip netns exec "${LISTENER}" ip a a ff0e::5:6/128 dev l_gw autojoin 138 ip netns exec "${GATEWAY}" ip a a 192.168.0.1/24 dev gw_l 139 ip netns exec "${GATEWAY}" ip a a 2001:db8::1/64 dev gw_l 140 ip netns exec "${GATEWAY}" ip a a 10.0.0.1/24 dev gw_relay 141 ip netns exec "${GATEWAY}" ip link add br0 type bridge [all …]
|
H A D | traceroute.sh | 28 out=$(eval ip netns exec ${ns} ${cmd} 2>&1) 52 ip netns exec ${ns} ip addr add dev lo ${addr} 55 ip netns exec ${ns} ip -6 addr add dev lo ${addr6} 58 ip netns exec ${ns} ip ro add unreachable default metric 8192 59 ip netns exec ${ns} ip -6 ro add unreachable default metric 8192 61 ip netns exec ${ns} sysctl -qw net.ipv4.ip_forward=1 62 ip netns exec ${ns} sysctl -qw net.ipv6.conf.all.keep_addr_on_down=1 63 ip netns exec ${ns} sysctl -qw net.ipv6.conf.all.forwarding=1 64 ip netns exec ${ns} sysctl -qw net.ipv6.conf.default.forwarding=1 65 ip netns exec [all...] |
H A D | tfo_passive.sh | 26 -path $NSIM_SV_SYS/net -exec basename {} \;) 28 -path $NSIM_CL_SYS/net -exec basename {} \;) 33 ip netns exec nssv ip addr add "${SERVER_IP}/24" dev $NSIM_SV_NAME 34 ip netns exec nscl ip addr add "${CLIENT_IP}/24" dev $NSIM_CL_NAME 36 ip netns exec nssv ip link set dev $NSIM_SV_NAME up 37 ip netns exec nscl ip link set dev $NSIM_CL_NAME up 40 ip netns exec nssv sysctl -w net.ipv4.tcp_fastopen=519 > /dev/null 66 exec {NSIM_SV_FD}</var/run/netns/nssv 67 NSIM_SV_IFIDX=$(ip netns exec nssv cat /sys/class/net/$NSIM_SV_NAME/ifindex) 70 exec {NSIM_CL_F [all...] |
/linux/tools/testing/selftests/bpf/ |
H A D | test_lwt_seg6local.sh |
|
H A D | test_tunnel.sh |
|
H A D | test_xdp_vlan.sh |
|
/linux/drivers/gpu/drm/vc4/ |
H A D | vc4_gem.c | 158 struct vc4_exec_info *exec[2]; in vc4_save_hang_state() local 170 exec[0] = vc4_first_bin_job(vc4); in vc4_save_hang_state() 171 exec[1] = vc4_first_render_job(vc4); in vc4_save_hang_state() 172 if (!exec[0] && !exec[1]) { in vc4_save_hang_state() 180 if (!exec[i]) in vc4_save_hang_state() 184 list_for_each_entry(bo, &exec[i]->unref_list, unref_head) in vc4_save_hang_state() 186 state->bo_count += exec[i]->bo_count + unref_list_count; in vc4_save_hang_state() 199 if (!exec[i]) in vc4_save_hang_state() 202 for (j = 0; j < exec[i]->bo_count; j++) { in vc4_save_hang_state() 203 bo = to_vc4_bo(exec[i]->bo[j]); in vc4_save_hang_state() [all …]
|
H A D | vc4_irq.c | 67 struct vc4_exec_info *exec; in vc4_overflow_mem_work() local 92 exec = vc4_first_bin_job(vc4); in vc4_overflow_mem_work() 93 if (!exec) in vc4_overflow_mem_work() 94 exec = vc4_last_render_job(vc4); in vc4_overflow_mem_work() 95 if (exec) { in vc4_overflow_mem_work() 96 exec->bin_slots |= vc4->bin_alloc_overflow; in vc4_overflow_mem_work() 120 struct vc4_exec_info *next, *exec = vc4_first_bin_job(vc4); in vc4_irq_finish_bin_job() local 122 if (!exec) in vc4_irq_finish_bin_job() 125 trace_vc4_bcl_end_irq(dev, exec->seqno); in vc4_irq_finish_bin_job() 127 vc4_move_job_to_render(dev, exec); in vc4_irq_finish_bin_job() [all …]
|
/linux/tools/testing/selftests/net/netfilter/ |
H A D | ipvs.sh | 65 ip netns exec "${ns0}" ip link set veth01 up 66 ip netns exec "${ns0}" ip link set veth02 up 67 ip netns exec "${ns0}" ip link add br0 type bridge 68 ip netns exec "${ns0}" ip link set veth01 master br0 69 ip netns exec "${ns0}" ip link set veth02 master br0 70 ip netns exec "${ns0}" ip link set br0 up 71 ip netns exec "${ns0}" ip addr add "${cip_v4}/24" dev br0 73 ip netns exec "${ns1}" ip link set veth10 up 74 ip netns exec "${ns1}" ip addr add "${gip_v4}/24" dev veth10 75 ip netns exec "${ns1}" ip link set veth12 up [all …]
|
H A D | nft_nat.sh | 69 ip netns exec "$ns" nft list counter inet filter "$counter" 1>&2 77 if ! ip netns exec "$ns" nft list counter inet filter ns0in | grep -q "packets 1 bytes 84";then 82 if ! ip netns exec "$ns" nft list counter inet filter ns0out | grep -q "packets 1 bytes 84";then 88 if ! ip netns exec "$ns" nft list counter inet filter ns0in6 | grep -q "$expect";then 92 if ! ip netns exec "$ns" nft list counter inet filter ns0out6 | grep -q "$expect";then 105 if ! ip netns exec "$ns0" nft list counter inet filter ns0in | grep -q "packets 0 bytes 0";then 110 if ! ip netns exec "$ns0" nft list counter inet filter ns0in6 | grep -q "packets 0 bytes 0";then 115 if ! ip netns exec "$ns0" nft list counter inet filter ns0out | grep -q "packets 0 bytes 0";then 119 if ! ip netns exec "$ns0" nft list counter inet filter ns0out6 | grep -q "packets 0 bytes 0";then 126 if ! ip netns exec " [all...] |
H A D | nft_queue.sh | 90 ip netns exec "$nsrouter" nft -f /dev/stdin <<EOF 126 ip netns exec "$nsrouter" nft -f /dev/stdin <<EOF 153 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.99 > /dev/null; then 157 if ! ip netns exec "$ns1" ping -c 1 -q dead:2::99 > /dev/null; then 165 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.1 > /dev/null; then 169 if ! ip netns exec "$ns1" ping -c 1 -q dead:2::1 > /dev/null; then 179 ip netns exec "$nsrouter" nft -f /dev/stdin <<EOF 188 ip netns exec "$ns1" ping -W 2 -c 1 -q 10.0.2.99 > /dev/null 191 ip netns exec "$ns1" ping -W 2 -c 1 -q dead:2::99 > /dev/null 203 if ! ip netns exec " [all...] |
H A D | nf_nat_edemux.sh | 29 ip netns exec "$ns" ss -nt -o state established "dport = :$port" | grep -q "$port" 37 if ! ip netns exec "$ns" conntrack --get -s 192.168.1.2 -d 192.168.1.1 -p tcp \ 40 ip netns exec "$ns" bash -c 'conntrack -L; conntrack -S; ss -nt' 52 ip netns exec "$ns1" ip link set up dev lo 53 ip netns exec "$ns1" ip link set up dev veth1 54 ip netns exec "$ns1" ip addr add 192.168.1.1/24 dev veth1 56 ip netns exec "$ns2" ip link set up dev lo 57 ip netns exec "$ns2" ip link set up dev veth2 58 ip netns exec "$ns2" ip addr add 192.168.1.2/24 dev veth2 61 ip netns exec "$ns1" socat -u TCP-LISTEN:5201,fork OPEN:/dev/null,wronly=1 & [all …]
|
H A D | nft_nat_zones.sh | 87 echo netns exec "$cl" ip link set eth0 up 88 echo netns exec "$cl" sysctl -q net.ipv4.tcp_syn_retries=2 89 echo netns exec "$gw" ip link set "veth$i" up 90 echo netns exec "$gw" sysctl -q net.ipv4.conf.veth"$i".arp_ignore=2 93 echo netns exec "$cl" ip addr add 10.1.0.3/24 dev eth0 94 echo netns exec "$cl" ip addr add dead:1::3/64 dev eth0 nodad 95 echo netns exec "$cl" ip route add default via 10.1.0.2 dev eth0 96 echo netns exec "$cl" ip route add default via dead:1::2 dev eth0 99 echo netns exec "$gw" ip addr add 10.1.0.2/24 dev "veth$i" 100 echo netns exec " [all...] |
H A D | conntrack_vrf.sh | 79 ip netns exec "$ns1" socat -u -4 TCP-LISTEN:55555,reuseaddr,fork STDOUT > /dev/null & 87 ip netns exec "$ns0" nft -f - <<EOF 108 ip netns exec "$ns1" ping -W 1 -c 1 -I veth0 "$IP0" > /dev/null 111 count=$(ip netns exec "$ns0" conntrack -L -s $IP1 -d $IP0 -p icmp --zone 1 2>/dev/null | wc -l) 116 count=$(ip netns exec "$ns0" conntrack -L -s $IP1 -d $IP0 -p icmp --zone 2 2> /dev/null | wc -l) 121 ip netns exec "$ns0" conntrack -L 122 ip netns exec "$ns0" nft list ruleset 138 ip netns exec "$ns0" conntrack -F 2>/dev/null 140 ip netns exec "$ns0" nft -f - <<EOF 161 if ! ip netns exec " [all...] |
H A D | bridge_brouter.sh | 54 if ! ip netns exec "$nsbr" ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP; then 59 ip netns exec "$nsbr" sysctl -q net.ipv4.conf.veth0.forwarding=0 62 if ip netns exec "$ns1" ping -q -c 1 10.0.0.12 -W 0.5 > /dev/null 2>&1; then 71 ip netns exec "$nsbr" sysctl -q net.ipv4.conf.veth0.forwarding=1 72 ip netns exec "$nsbr" sysctl -q net.ipv4.conf.veth1.forwarding=1 74 if ! ip netns exec "$ns1" ping -q -c 1 10.0.0.12 > /dev/null; then 80 ip netns exec "$nsbr" ebtables -t broute -F 83 if ! ip netns exec "$ns1" ping -q -c 1 10.0.0.12 > /dev/null; then 88 ip netns exec "$nsbr" ebtables -t filter -A FORWARD -p ipv4 --ip-protocol icmp -j DROP 91 if ip netns exec " [all...] |
H A D | rpath.sh | 38 ip netns exec "$ns2" sysctl -q net.ipv6.conf.all.keep_addr_on_down=1 70 if ! ip netns exec "$ns2" "$iptables" $common -m rpfilter;then 74 ip netns exec "$ns2" "$iptables" $common -m rpfilter --invert 79 if ! ip netns exec "$ns2" "$ip6tables" $common -m rpfilter;then 83 ip netns exec "$ns2" "$ip6tables" $common -m rpfilter --invert 85 [ -n "$nft" ] && ip netns exec "$ns2" $nft -f - <<EOF 99 #ip netns exec "$ns2" "$iptables" -t raw -vS 100 #ip netns exec "$ns2" "$ip6tables" -t raw -vS 101 #ip netns exec "$ns2" nft list ruleset 108 ip netns exec " [all...] |
/linux/include/drm/ |
H A D | drm_exec.h | 56 * @exec: Pointer to the drm_exec context 63 drm_exec_obj(struct drm_exec *exec, unsigned long index) in drm_exec_obj() argument 65 return index < exec->num_objects ? exec->objects[index] : NULL; in drm_exec_obj() 70 * @exec: drm_exec object 76 #define drm_exec_for_each_locked_object(exec, index, obj) \ argument 77 for ((index) = 0; ((obj) = drm_exec_obj(exec, index)); ++(index)) 82 * @exec: drm_exec object 90 #define drm_exec_for_each_locked_object_reverse(exec, index, obj) \ argument 91 for ((index) = (exec)->num_objects - 1; \ 92 ((obj) = drm_exec_obj(exec, index)); --(index)) [all …]
|
/linux/tools/testing/selftests/exec/ |
H A D | check-exec-tests.sh | 7 # samples/check-exec/inc.c 14 exec 2>/dev/null 86 out="$(cat script-exec.inc | "$@" ./inc -i)" || ret=$? 101 out="$("$@" ./inc -c "$(< script-exec.inc)")" || ret=$? 128 ktap_test exec_direct 0 script-exec.inc 129 ktap_test exec_indirect 0 script-exec.inc 132 ktap_test exec_stdin_reg 0 script-exec.inc 148 ktap_test exec_direct 0 script-exec.inc ./set-exec -f -- 149 ktap_test exec_indirect 0 script-exec.inc ./set-exec -f -- 152 ktap_test exec_stdin_reg 0 script-exec.inc ./set-exec -f -- [all …]
|
/linux/drivers/gpu/drm/xe/ |
H A D | xe_exec_queue_types.h | 41 /** @xef: Back pointer to xe file if this is user created exec queue */ 44 /** @gt: GT structure this exec queue can submit to */ 52 /** @refcount: ref count of this exec queue */ 54 /** @vm: VM (address space) for this exec queue */ 56 /** @class: class of this exec queue */ 59 * @logical_mask: logical mask of where job submitted to exec queue can run 62 /** @name: name of this exec queue */ 64 /** @width: width (number BB submitted per exec) of this exec queue */ 72 * @last_fence: last fence on exec queue, protected by vm->lock in write 73 * mode if bind exec queue, protected by dma resv lock if non-bind exec [all …]
|
/linux/tools/testing/selftests/net/mptcp/ |
H A D | userspace_pm.sh | 125 ip netns exec "$ns1" sysctl -q net.mptcp.path_manager=userspace 126 pm_type="$(ip netns exec "$ns1" sysctl -n net.mptcp.pm_type)" 133 ip netns exec "$ns1" sysctl -q net.mptcp.path_manager=error 2>/dev/null 134 pm_type="$(ip netns exec "$ns1" sysctl -n net.mptcp.pm_type)" 141 ip netns exec "$ns1" sysctl -q net.mptcp.pm_type=0 142 pm_name="$(ip netns exec "$ns1" sysctl -n net.mptcp.path_manager)" 151 ip netns exec "$i" sysctl -q net.mptcp.pm_type=1 205 ip netns exec "$ns2" sysctl -q net.mptcp.allow_join_initial_addr_port=0 211 ip netns exec "$ns1" \ 218 ip netns exec "$ns2" \ [all …]
|
/linux/tools/testing/selftests/drivers/net/bonding/ |
H A D | bond-arp-interval-causes-panic.sh | 28 ip netns exec server ip link set dev eth0 up 29 ip netns exec server ip addr add ${server_ip4}/24 dev eth0 31 ip netns exec client ip link add dev bond0 down type bond mode 1 \ 33 ip netns exec client ip link set dev eth0 master bond0 34 ip netns exec client ip link set dev bond0 up 35 ip netns exec client ip addr add ${client_ip4}/24 dev bond0 36 ip netns exec client ping -c 5 $server_ip4 >/dev/null 38 ip netns exec client ip link set dev eth0 nomaster 39 ip netns exec client ip link set dev bond0 down 40 ip netns exec client ip link set dev bond0 type bond mode 0 \ [all …]
|
H A D | lag_lib.sh | 128 ip netns exec ${SWITCH} ip link add br0 up type bridge 129 ip netns exec ${SWITCH} ip link set eth0 master br0 up 130 ip netns exec ${SWITCH} ip link set eth1 master br0 up 131 ip netns exec ${SWITCH} ip addr add ${SWITCHIP}/24 dev br0 136 ip netns exec ${CLIENT} ip link del bond0 137 ip netns exec ${SWITCH} ip link set eth0 up 138 ip netns exec ${SWITCH} ip link set eth1 up 144 ip netns exec ${CLIENT} ip link set eth0 down 145 ip netns exec ${CLIENT} ip link set eth1 down 147 ip netns exec ${CLIENT} ip link add bond0 type bond $@ [all …]
|
/linux/tools/testing/selftests/powerpc/dexcr/ |
H A D | dexcr_test.c | 14 * Helper function for testing the behaviour of a newly exec-ed process 24 "setting aspect across exec not applied"); in dexcr_prctl_onexec_test_child() 27 "setting aspect across exec not inherited"); in dexcr_prctl_onexec_test_child() 29 FAIL_IF_EXIT_MSG(!(aspect & dexcr), "setting aspect across exec did not take effect"); in dexcr_prctl_onexec_test_child() 32 "clearing aspect across exec not applied"); in dexcr_prctl_onexec_test_child() 35 "clearing aspect across exec not inherited"); in dexcr_prctl_onexec_test_child() 37 FAIL_IF_EXIT_MSG(aspect & dexcr, "clearing aspect across exec did not take effect"); in dexcr_prctl_onexec_test_child() 68 FAIL_IF_MSG(err != -1, "simultaneous set and clear on exec should be rejected"); in dexcr_prctl_aspect_test() 69 …FAIL_IF_MSG(errno_save != EINVAL, "simultaneous set and clear on exec should be rejected with EINV… in dexcr_prctl_aspect_test() 89 /* We make it set on exec (doesn't change our current value) */ in dexcr_prctl_aspect_test() [all …]
|