| /linux/tools/testing/selftests/kselftest_harness/ |
| H A D | harness-selftest.c | 19 TH_LOG("before"); in TEST() 23 TH_LOG("after"); in TEST() 27 TH_LOG("before"); in TEST() 31 TH_LOG("after"); in TEST() 35 TH_LOG("before"); in TEST_SIGNAL() 37 TH_LOG("after"); in TEST_SIGNAL() 42 TH_LOG("before"); in TEST_SIGNAL() 44 TH_LOG("after"); in TEST_SIGNAL() 53 TH_LOG("setup"); in FIXTURE_SETUP() 58 TH_LOG("teardown same-process=%d", self->testpid == getpid()); in FIXTURE_TEARDOWN() [all …]
|
| /linux/tools/testing/selftests/net/ |
| H A D | epoll_busy_poll.c | 56 TH_LOG("error creating unix socket"); in FIXTURE_SETUP() 76 TH_LOG("EPIOCGPARAMS on invalid epoll FD should error"); in TEST_F() 79 TH_LOG("EPIOCGPARAMS on invalid epoll FD should set errno to ENOTTY"); in TEST_F() 86 TH_LOG("EPIOCSPARAMS on invalid epoll FD should error"); in TEST_F() 89 TH_LOG("EPIOCSPARAMS on invalid epoll FD should set errno to ENOTTY"); in TEST_F() 106 TH_LOG("epoll_create1 failed?"); in FIXTURE_SETUP() 123 TH_LOG("unable to free capabilities"); in FIXTURE_TEARDOWN() 142 TH_LOG("ioctl EPIOCGPARAMS should succeed"); in TEST_F() 145 TH_LOG("EPIOCGPARAMS busy_poll_usecs should have been 0"); in TEST_F() 148 TH_LOG("EPIOCGPARAMS busy_poll_budget should have been 0"); in TEST_F() [all …]
|
| H A D | ip_local_port_range.c | 191 ASSERT_GE(fd, 0) TH_LOG("socket failed"); in TEST_F() 196 EXPECT_TRUE(err) TH_LOG("expected setsockopt(IP_LOCAL_PORT_RANGE) to fail"); in TEST_F() 202 EXPECT_TRUE(err) TH_LOG("expected setsockopt(IP_LOCAL_PORT_RANGE) to fail"); in TEST_F() 208 EXPECT_TRUE(err) TH_LOG("expected setsockopt(IP_LOCAL_PORT_RANGE) to fail"); in TEST_F() 212 ASSERT_TRUE(!err) TH_LOG("close failed"); in TEST_F() 234 TH_LOG("lo %5hu, hi %5hu", t->range_lo, t->range_hi); in TEST_F() 241 ASSERT_GE(fd, 0) TH_LOG("#%d: socket failed", i); in TEST_F() 245 ASSERT_TRUE(!err) TH_LOG("#%d: setsockopt(IP_LOCAL_PORT_RANGE) failed", i); in TEST_F() 248 ASSERT_TRUE(!err) TH_LOG("#%d: bind failed", i); in TEST_F() 252 ASSERT_GE(port, 40000) TH_LOG("#%d: expected port within netns range", i); in TEST_F() [all …]
|
| H A D | reuseaddr_ports_exhausted.c | 61 ASSERT_NE(-1, fd) TH_LOG("failed to open socket."); in bind_port() 64 ASSERT_EQ(0, ret) TH_LOG("failed to setsockopt: SO_REUSEADDR."); in bind_port() 67 ASSERT_EQ(0, ret) TH_LOG("failed to setsockopt: SO_REUSEPORT."); in bind_port() 92 ASSERT_NE(-1, fd[0]) TH_LOG("failed to bind."); in TEST() 93 EXPECT_EQ(-1, fd[1]) TH_LOG("should fail to bind."); in TEST() 112 ASSERT_NE(-1, fd[0]) TH_LOG("failed to bind."); in TEST() 115 EXPECT_EQ(-1, fd[1]) TH_LOG("should fail to bind because both sockets successfully listened."); in TEST() 117 EXPECT_NE(-1, fd[1]) TH_LOG("should succeed to bind to connect to different destinations."); in TEST() 137 ASSERT_EQ(0, ret) TH_LOG("failed to seteuid: %d.", euid[j]); in TEST() 142 ASSERT_EQ(0, ret) TH_LOG("failed to seteuid: 0."); in TEST() [all …]
|
| H A D | tcp_port_share.c | 143 ASSERT_GE(ln, 0) TH_LOG("socket(): %m"); in TEST_F() 147 ASSERT_EQ(bind(ln, &addr.sa, addr.len), 0) TH_LOG("bind(%s): %m", addr.str); in TEST_F() 152 ASSERT_GE(c1, 0) TH_LOG("socket(): %m"); in TEST_F() 156 ASSERT_EQ(bind(c1, &addr.sa, addr.len), 0) TH_LOG("bind(%s): %m", addr.str); in TEST_F() 159 ASSERT_EQ(connect(c1, &addr.sa, addr.len), 0) TH_LOG("connect(%s): %m", addr.str); in TEST_F() 164 ASSERT_GE(pb, 0) TH_LOG("socket(): %m"); in TEST_F() 168 ASSERT_EQ(bind(pb, &addr.sa, addr.len), 0) TH_LOG("bind(%s): %m", addr.str); in TEST_F() 172 ASSERT_GE(c2, 0) TH_LOG("socket"); in TEST_F() 176 ASSERT_EQ(bind(c2, &addr.sa, addr.len), 0) TH_LOG("bind(%s): %m", addr.str); in TEST_F() 179 ASSERT_EQ(connect(c2, &addr.sa, addr.len), -1) TH_LOG("connect(%s)", addr.str); in TEST_F() [all …]
|
| /linux/tools/testing/selftests/filesystems/binderfs/ |
| H A D | binderfs_test.c | 45 TH_LOG("%s - Failed to unshare mount namespace", in change_mountns() 51 TH_LOG("%s - Failed to mount / as private", in change_mountns() 74 TH_LOG("%s - Failed to create binderfs mountpoint", in __do_binderfs_test() 83 TH_LOG("%s - Failed to mount binderfs", strerror(errno)); in __do_binderfs_test() 94 TH_LOG("%s - Failed to open binder-control device", in __do_binderfs_test() 104 TH_LOG("%s - Failed to allocate new binder device", in __do_binderfs_test() 109 TH_LOG("Allocated new binder device with major %d, minor %d, and name %s", in __do_binderfs_test() 117 TH_LOG("%s - Failed to open my-binder device", in __do_binderfs_test() 127 TH_LOG("%s - Failed to open perform BINDER_VERSION request", in __do_binderfs_test() 132 TH_LOG("Detected binder version: %d", version.protocol_version); in __do_binderfs_test() [all …]
|
| /linux/tools/testing/selftests/pci_endpoint/ |
| H A D | pci_endpoint_test.c | 43 ASSERT_NE(-1, self->fd) TH_LOG("Can't open PCI Endpoint Test device"); in FIXTURE_SETUP() 70 EXPECT_FALSE(ret) TH_LOG("Test failed for BAR%d", variant->barno); in TEST_F() 82 ASSERT_NE(-1, self->fd) TH_LOG("Can't open PCI Endpoint Test device"); in FIXTURE_SETUP() 95 EXPECT_FALSE(ret) TH_LOG("Consecutive BAR test failed"); in TEST_F() 103 ASSERT_EQ(0, ret) TH_LOG("Can't set Legacy IRQ type"); in TEST_F() 106 ASSERT_EQ(PCITEST_IRQ_TYPE_INTX, ret) TH_LOG("Can't get Legacy IRQ type"); in TEST_F() 109 EXPECT_FALSE(ret) TH_LOG("Test failed for Legacy IRQ"); in TEST_F() 117 ASSERT_EQ(0, ret) TH_LOG("Can't set MSI IRQ type"); in TEST_F() 120 ASSERT_EQ(PCITEST_IRQ_TYPE_MSI, ret) TH_LOG("Can't get MSI IRQ type"); in TEST_F() 126 EXPECT_FALSE(ret) TH_LOG("Test failed for MSI%d", i); in TEST_F() [all …]
|
| /linux/tools/testing/selftests/hid/ |
| H A D | hid_bpf.c | 53 TH_LOG(fmt, ##__VA_ARGS__); \ 83 TH_LOG("too many programs are to be loaded"); in load_programs() 96 ASSERT_OK_PTR(prog) TH_LOG("can not find program by name '%s'", programs[i].name); in load_programs() 102 ASSERT_OK_PTR(map) TH_LOG("can not find struct_ops by name '%s'", in load_programs() 107 ASSERT_OK_PTR(ops_hid_id) TH_LOG("unable to retrieve struct_ops data"); in load_programs() 120 ASSERT_OK(err) TH_LOG("hid_skel_load failed: %d", err); in load_programs() 127 ASSERT_OK_PTR(map) TH_LOG("can not find struct_ops by name '%s'", in load_programs() 131 ASSERT_OK_PTR(self->hid_links[i]) TH_LOG("failed to attach struct ops '%s'", in load_programs() 138 ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw"); in load_programs() 166 ASSERT_EQ(self->skel->data->callback_check, 52) TH_LOG("callback_check1"); in TEST_F() [all …]
|
| H A D | hidraw.c | 34 TH_LOG(fmt, ##__VA_ARGS__); \ 46 ASSERT_GE(self->hidraw_fd, 0) TH_LOG("open_hidraw"); 74 ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); in TEST_F() 96 ASSERT_EQ(err, 6) TH_LOG("read_hidraw"); in TEST_F() 102 ASSERT_OK(err) TH_LOG("couldn't revoke the hidraw fd"); in TEST_F() 112 ASSERT_EQ(err, -1) TH_LOG("read_hidraw"); in TEST_F() 113 ASSERT_EQ(errno, ENODEV) TH_LOG("unexpected error code while reading the hidraw node: %d", 126 ASSERT_OK(err) TH_LOG("couldn't revoke the hidraw fd"); in TEST_F() 130 ASSERT_EQ(err, -1) TH_LOG("ioctl_hidraw"); in TEST_F() 131 ASSERT_EQ(errno, ENODEV) TH_LOG("unexpecte in TEST_F() [all...] |
| H A D | hid_common.h | 105 TH_LOG(fmt, ##__VA_ARGS__); \ 124 TH_LOG("Cannot write to uhid: %m"); in uhid_write() 127 TH_LOG("Wrong size written to uhid: %zd != %zu", in uhid_write() 241 TH_LOG("Invalid event from uhid-dev: %u", ev.type); in uhid_event() 267 TH_LOG("Cannot poll for fds: %m"); in uhid_read_events_thread() 291 TH_LOG("Could not start the uhid thread: %d", err); in uhid_start_listener() 457 ASSERT_GE(hid->uhid_fd, 0) TH_LOG("open uhid-cdev failed; %d", hid->uhid_fd); in setup_uhid() 462 TH_LOG("create uhid device failed: %d", ret); in setup_uhid() 470 TH_LOG("Could not locate uhid device id: %d", hid->hid_id); in setup_uhid() 474 TH_LOG("could not start udev listener: %d", ret); in setup_uhid()
|
| /linux/tools/testing/selftests/mincore/ |
| H A D | mincore_selftest.c | 53 TH_LOG("mmap error: %s", strerror(errno)); in TEST() 97 TH_LOG("mmap error: %s", strerror(errno)); in TEST() 102 TH_LOG("Page found in memory before use"); in TEST() 111 TH_LOG("Page not found in memory after use"); in TEST() 123 TH_LOG("Page in memory after being zapped"); in TEST() 156 TH_LOG("mmap error: %s", strerror(errno)); in TEST() 161 TH_LOG("Page found in memory before use"); in TEST() 169 TH_LOG("Page not found in memory after use"); in TEST() 205 TH_LOG("Can't allocate array"); in TEST() 212 TH_LOG("Can't create temporary file: %s", in TEST() [all …]
|
| /linux/tools/testing/selftests/pidfd/ |
| H A D | pidfd_setns_test.c | 108 TH_LOG("%m - Failed to open /proc/self/ns"); in FIXTURE_SETUP() 114 TH_LOG("%m - Failed to open pidfd for process %d", self->pid); in FIXTURE_SETUP() 122 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP() 130 TH_LOG("%m - Failed to derive %s namespace from pidfd of process %d", in FIXTURE_SETUP() 152 TH_LOG("%m - Failed to open pidfd for process %d", self->pid); in FIXTURE_SETUP() 173 TH_LOG("%m - Failed to unshare mount namespace for process %d", self->pid); in FIXTURE_SETUP() 177 TH_LOG("%m - Failed to unshare cgroup namespace for process %d", self->pid); in FIXTURE_SETUP() 181 TH_LOG("%m - Failed to unshare ipc namespace for process %d", self->pid); in FIXTURE_SETUP() 185 TH_LOG("%m - Failed to unshare uts namespace for process %d", self->pid); in FIXTURE_SETUP() 189 TH_LOG("%m - Failed to unshare net namespace for process %d", self->pid); in FIXTURE_SETUP() [all …]
|
| /linux/tools/testing/selftests/namespaces/ |
| H A D | listns_test.c | 43 TH_LOG("listns failed: %s (errno=%d)", strerror(errno), errno); in TEST() 49 TH_LOG("Found %zd active namespaces", ret); in TEST() 54 TH_LOG(" [%zd] ns_id: %llu", i, (unsigned long long)ns_ids[i]); in TEST() 79 TH_LOG("listns failed: %s (errno=%d)", strerror(errno), errno); in TEST() 86 TH_LOG("Found %zd active network namespaces", ret); in TEST() 141 TH_LOG("listns failed: %s (errno=%d)", strerror(errno), errno); in TEST() 149 TH_LOG("First batch: %zd namespaces", ret1); in TEST() 157 TH_LOG("Second batch: %zd namespaces (after ns_id=%llu)", in TEST() 163 TH_LOG("Pagination working: %llu > %llu", in TEST() 168 TH_LOG("All namespaces fit in first batch"); in TEST() [all …]
|
| H A D | ns_active_ref_test.c | 489 TH_LOG("Child: creating new network namespace"); in TEST() 494 TH_LOG("Child: unshare(CLONE_NEWNET) failed: %s", strerror(errno)); in TEST() 500 TH_LOG("Child: network namespace created successfully"); in TEST() 505 TH_LOG("Child: failed to open /proc/self/ns/net: %s", strerror(errno)); in TEST() 511 TH_LOG("Child: opened namespace fd %d", nsfd); in TEST() 519 TH_LOG("Child: name_to_handle_at failed: %s", strerror(errno)); in TEST() 525 TH_LOG("Child: got file handle (bytes=%u)", handle->handle_bytes); in TEST() 529 TH_LOG("Child: sent %d bytes of file handle to parent", ret); in TEST() 533 TH_LOG("Child: waiting for parent to open fd"); in TEST() 537 TH_LOG("Child: parent signaled (read %d bytes), exiting now", ret); in TEST() [all …]
|
| H A D | stress_test.c | 57 TH_LOG("Baseline: %zd active user namespaces", ret_before); in TEST() 82 TH_LOG("After 100 rapid create/destroy cycles: %zd active user namespaces", ret_after); in TEST() 116 TH_LOG("Baseline: %zd active user namespaces", ret_before); in TEST() 173 TH_LOG("With %d children running: %zd active user namespaces", num_children, ret_during); in TEST() 205 TH_LOG("After all children exit: %zd active user namespaces", ret_after); in TEST() 235 TH_LOG("Baseline: %zd active namespaces (all types)", ret_before); in TEST() 268 TH_LOG("After 50 rapid mixed namespace cycles: %zd active namespaces", ret_after); in TEST() 298 TH_LOG("Baseline: %zd active user namespaces", ret_before); in TEST() 336 TH_LOG("After 20 nested namespace hierarchies: %zd active user namespaces", ret_after); in TEST() 444 TH_LOG("Paginated through %d user namespaces", total_found); in TEST() [all …]
|
| H A D | siocgskns_test.c | 95 TH_LOG("unshare(CLONE_NEWNET) failed: %s", strerror(errno)); in TEST() 103 TH_LOG("socket() failed: %s", strerror(errno)); in TEST() 728 TH_LOG("listns failed: %s", strerror(errno)); in TEST() 741 TH_LOG("Found netns %llu in listns() output (kept alive by socket)", netns_id); in TEST() 758 TH_LOG("Found netns %llu owned by userns %llu", netns_id, owner_id); in TEST() 779 TH_LOG("Netns %llu correctly disappeared from listns() after socket closed", netns_id); in TEST() 914 TH_LOG("Constructed file handle for netns %lu (id=%llu)", netns_ino, netns_id); in TEST() 923 TH_LOG("open_by_handle_at failed: %s", strerror(errno)); in TEST() 932 TH_LOG("Successfully reopened netns %lu via file handle", netns_ino); in TEST() 942 TH_LOG("Correctly failed to reopen inactive netns: %s", strerror(errno)); in TEST() [all …]
|
| /linux/tools/testing/selftests/clone3/ |
| H A D | clone3_cap_checkpoint_restore.c | 51 TH_LOG("%s - Failed to create new process", strerror(errno)); in call_clone3_set_tid() 59 TH_LOG("I am the child, my PID is %d (expected %d)", getpid(), set_tid[0]); in call_clone3_set_tid() 66 TH_LOG("I am the parent (%d). My child's pid is %d", getpid(), pid); in call_clone3_set_tid() 69 TH_LOG("Child returned %s", strerror(errno)); in call_clone3_set_tid() 84 TH_LOG("[%d] Trying clone3() with CLONE_SET_TID to %d", getpid(), set_tid[0]); in test_clone3_set_tid() 86 TH_LOG("[%d] clone3() with CLONE_SET_TID %d says:%d", getpid(), set_tid[0], ret); in test_clone3_set_tid() 151 TH_LOG("Child has PID %d", getpid()); in TEST() 155 TH_LOG("Waiting for child %d failed", pid); in TEST() 161 TH_LOG("Could not set CAP_CHECKPOINT_RESTORE"); in TEST() 166 TH_LOG("Failed to setgid(65534)"); in TEST() [all …]
|
| /linux/tools/testing/selftests/arm64/pauth/ |
| H A D | pac.c | 213 ASSERT_TRUE(0) TH_LOG("SIGSEGV/SIGILL signal did not occur"); in TEST() 237 ASSERT_NE(0, keyia) TH_LOG("keyia instructions did nothing"); in TEST() 238 ASSERT_NE(0, keyib) TH_LOG("keyib instructions did nothing"); in TEST() 239 ASSERT_NE(0, keyda) TH_LOG("keyda instructions did nothing"); in TEST() 240 ASSERT_NE(0, keydb) TH_LOG("keydb instructions did nothing"); in TEST() 252 ASSERT_NE(0, keyg) TH_LOG("keyg instructions did nothing"); in TEST() 266 TH_LOG("WARNING: Generic PAUTH not enabled. Skipping generic key checks"); in TEST() 290 ASSERT_EQ(0, same) TH_LOG("%d keys clashed every time", same); in TEST() 309 TH_LOG("WARNING: Generic PAUTH not enabled. Skipping generic key checks"); in TEST() 315 ASSERT_EQ(0, ret) TH_LOG("failed to run worker"); in TEST() [all …]
|
| /linux/tools/testing/selftests/syscall_user_dispatch/ |
| H A D | sud_test.c | 76 TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH"); in TEST_SIGNAL() 84 TH_LOG("Unreachable!"); in TEST_SIGNAL() 226 TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH"); in TEST() 233 TH_LOG("Dispatch triggered unexpectedly"); in TEST() 242 TH_LOG("Failed to intercept syscall"); in TEST() 245 TH_LOG("Failed to emulate syscall"); in TEST() 248 TH_LOG("Bad si_code in SIGSYS"); in TEST() 251 TH_LOG("Bad si_errno in SIGSYS"); in TEST() 282 TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH"); in TEST_SIGNAL() 294 TH_LOG("Unreachable!"); in TEST_SIGNAL() [all …]
|
| /linux/tools/testing/selftests/net/can/ |
| H A D | test_raw_filter.c | 71 TH_LOG("failed to create CAN_RAW socket: %d", errno); in FIXTURE_SETUP() 76 TH_LOG("failed SIOCGIFINDEX: %d", errno); in FIXTURE_SETUP() 86 TH_LOG("failed bind socket: %d", errno); in FIXTURE_SETUP() 345 TH_LOG("filters: can_id = 0x%08X can_mask = 0x%08X", in TEST_F() 350 TH_LOG("failed to send CAN frames"); in TEST_F() 365 TH_LOG("failed select for frame %d, err: %d)", i, errno); in TEST_F() 370 TH_LOG("too many frames received"); in TEST_F() 373 TH_LOG("too few frames received"); in TEST_F() 377 TH_LOG("failed to read frame %d, err: %d", i, errno); in TEST_F() 379 TH_LOG("rx: can_id = 0x%08X rx = %d", frame.can_id, i); in TEST_F() [all …]
|
| /linux/tools/testing/selftests/kvm/s390/ |
| H A D | ucontrol_test.c | 137 TH_LOG("create VM 0x%llx", info.cpuid); in FIXTURE_SETUP() 144 TH_LOG(KVM_IOCTL_ERROR(KVM_GET_VCPU_MMAP_SIZE, self->kvm_run_size)); in FIXTURE_SETUP() 157 TH_LOG("VM created %p %p", self->run, self->sie_block); in FIXTURE_SETUP() 163 ASSERT_NE(NULL, self->vm_mem) TH_LOG("malloc failed %u", errno); in FIXTURE_SETUP() 171 TH_LOG("ucas map %p %p 0x%llx", in FIXTURE_SETUP() 174 ASSERT_EQ(0, rc) TH_LOG("ucas map result %d not expected, %s", in FIXTURE_SETUP() 177 TH_LOG("page in %p", (void *)self->base_gpa); in FIXTURE_SETUP() 179 ASSERT_EQ(0, rc) TH_LOG("vcpu fault (%p) result %d not expected, %s", in FIXTURE_SETUP() 457 TH_LOG("errno %s (%i) not expected for ioctl KVM_SET_USER_MEMORY_REGION", in TEST_F() 462 TH_LOG("errno %s (%i) not expected for ioctl KVM_SET_USER_MEMORY_REGION2", in TEST_F() [all …]
|
| /linux/tools/testing/selftests/riscv/vector/ |
| H A D | vstate_prctl.c | 44 TH_LOG("GET_CONTROL should fail on kernel/hw without ZVE32X"); in TEST() 46 TH_LOG("GET_CONTROL should fail on kernel/hw without ZVE32X"); in TEST() 58 TH_LOG("SET_CONTROL should fail on kernel/hw without ZVE32X"); in TEST() 60 TH_LOG("SET_CONTROL should fail on kernel/hw without ZVE32X"); in TEST() 73 EXPECT_EQ(0, rc) TH_LOG("Enabling V for current should always succeed"); in TEST() 87 TH_LOG("Disabling V in current thread with V enabled must fail with EPERM(%d)", errno); in TEST() 89 TH_LOG("Disabling V in current thread with V enabled must fail with EPERM(%d)", errno); in TEST()
|
| /linux/tools/testing/selftests/seccomp/ |
| H A D | seccomp_bpf.c | 342 TH_LOG("kcmp() syscall missing (test is less accurate)");\ 364 TH_LOG("Kernel does not support CONFIG_SECCOMP"); in TEST() 375 TH_LOG("Kernel does not support CONFIG_SECCOMP"); in TEST_SIGNAL() 380 TH_LOG("Unreachable!"); in TEST_SIGNAL() 391 TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); in TEST() 402 TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); in TEST() 407 TH_LOG("Kernel does not support CONFIG_SECCOMP_FILTER!"); in TEST() 426 TH_LOG("Expected 0 or unsupported for NO_NEW_PRIVS"); in TEST() 468 TH_LOG("Installing %d insn filter was allowed", prog.len); in TEST() 475 TH_LOG("Installing %d insn filter wasn't allowed", prog.len); in TEST() [all …]
|
| /linux/tools/testing/selftests/rtc/ |
| H A D | rtctest.c | 59 TH_LOG("Current RTC date/time is %02d/%02d/%02d %02d:%02d:%02d.", in TEST_F() 124 TH_LOG("Continuously reading RTC time for %ds (with %dms breaks after every read).", 151 TH_LOG("Performed %ld RTC time reads.", iter_count); 166 TH_LOG("skip update IRQs not supported."); 195 TH_LOG("skip update IRQs not supported."); in TEST_F() 255 TH_LOG("skip alarms are not supported."); in TEST_F() 262 TH_LOG("Alarm time now set to %02d:%02d:%02d.", in TEST_F() 282 TH_LOG("data: %lx", data); in TEST_F() 327 TH_LOG("skip alarms are not supported."); in TEST_F() 334 TH_LOG("Alarm time now set to %02d/%02d/%02d %02d:%02d:%02d.", in TEST_F() [all …]
|
| /linux/tools/testing/selftests/tty/ |
| H A D | tty_tiocsti_test.c | 387 TH_LOG("Failed to write legacy_tiocsti: %s", strerror(errno)); in set_legacy_tiocsti_setting() 549 TH_LOG("Backup: Restoring legacy_tiocsti from %d to %d", in FIXTURE_TEARDOWN() 605 TH_LOG("=== TIOCSTI FD Passing Test Context ==="); in TEST_F() 606 TH_LOG("legacy_tiocsti: %d, Parent CAP_SYS_ADMIN: %s, Child: %s", in TEST_F() 615 TH_LOG("*** SECURITY CONCERN DEMONSTRATED ***"); in TEST_F() 616 TH_LOG("Privileged parent can use TIOCSTI on FD from unprivileged child"); in TEST_F() 617 TH_LOG("This shows current process credentials are used, not opener credentials"); in TEST_F() 622 TH_LOG("FD passing: expected error %d, got %d", in TEST_F() 640 TH_LOG("Child terminated by signal %d", WTERMSIG(status)); in TEST_F() 643 TH_LOG("Child process failed assertion"); in TEST_F()
|