| /tools/tracing/rtla/ |
| A D | Makefile.rtla | 3 define allow-override 10 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 11 $(call allow-override,AR,$(CROSS_COMPILE)ar) 12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 13 $(call allow-override,PKG_CONFIG,pkg-config) 14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 15 $(call allow-override,LDCONFIG,ldconfig)
|
| /tools/verification/rv/ |
| A D | Makefile.rv | 3 define allow-override 10 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 11 $(call allow-override,AR,$(CROSS_COMPILE)ar) 12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 13 $(call allow-override,PKG_CONFIG,pkg-config) 14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 15 $(call allow-override,LDCONFIG,ldconfig)
|
| /tools/scripts/ |
| A D | Makefile.include | 48 define allow-override 61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX)) 62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX)) 63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX)) 64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX)) 65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX)) 68 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 69 $(call allow-override,AR,$(CROSS_COMPILE)ar) 70 $(call allow-override,LD,$(CROSS_COMPILE)ld) 71 $(call allow-override,CXX,$(CROSS_COMPILE)g++) [all …]
|
| /tools/build/ |
| A D | Makefile | 9 define allow-override 15 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
| A D | Build.include | 95 # - BUILD_STR macro to allow '-D"$(variable)"' constructs
|
| /tools/testing/selftests/cgroup/ |
| A D | test_cpuset.c | 65 static int test_cpuset_perms_object(const char *root, bool allow) in test_cpuset_perms_object() argument 112 if (allow && chown(parent_procs, test_euid, -1)) in test_cpuset_perms_object() 126 if (allow ^ (cg_run(child_dst, do_migration_fn, (void *)(size_t)object_pid) == EXIT_SUCCESS)) in test_cpuset_perms_object()
|
| /tools/testing/selftests/net/ |
| A D | xfrm_policy.sh | 38 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow 40 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow 145 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow 148 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow 272 …::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 275 …000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 299 ip -net $ns xfrm policy add dst $j.0.0.0/24 dir out priority 10 action allow 313 ip -net $ns xfrm policy add dst $addr dir out priority 10 action allow
|
| /tools/testing/selftests/net/forwarding/ |
| A D | mirror_gre_topo_lib.sh | 67 ttl 100 tos inherit allow-localremote
|
| A D | mirror_gre_bound.sh | 131 ttl 100 tos inherit dev ul allow-localremote
|
| A D | mirror_gre_changes.sh | 237 test_span_gre_tun_del gt6 ip6gretap allow-localremote \
|
| A D | README | 4 One of the nice things about network namespaces is that they allow one
|
| /tools/testing/selftests/drivers/net/mlxsw/ |
| A D | mirror_gre.sh | 28 ttl 100 tos inherit allow-localremote \ 55 ttl 100 tos inherit allow-localremote
|
| A D | mirror_gre_scale.sh | 71 ttl 100 tos inherit allow-localremote
|
| /tools/testing/selftests/damon/ |
| A D | sysfs.py | 86 assert_true(filter_.allow == dump['allow'], 'allow', dump) 235 allow=False, addr_start=42, 240 allow=True),
|
| A D | _damon_sysfs.py | 235 allow = None variable in DamosFilter 245 def __init__(self, type_='anon', matching=False, allow=False, argument 250 self.allow = allow 269 err = write_file(os.path.join(self.sysfs_dir(), 'allow'), self.allow)
|
| A D | drgn_dump_damon_status.py | 152 'allow': bool(damos_filter.allow),
|
| /tools/testing/selftests/zram/ |
| A D | README | 7 in memory itself. These disks allow very fast I/O and compression provides
|
| /tools/testing/selftests/powerpc/eeh/ |
| A D | eeh-functions.sh | 157 if [ ! -f /proc/device-tree/rtas/ibm,open-sriov-allow-unfreeze ] ||
|
| /tools/testing/selftests/net/packetdrill/ |
| A D | tcp_slow_start_slow-start-fq-ack-per-2pkt.pkt | 40 // So FQ will allow following packet to be sent a bit earlier (quantum/2)
|
| /tools/testing/selftests/coredump/ |
| A D | README.rst | 32 * commit cb8f381f1613 ("fs/proc/array.c: allow reporting eip/esp for all coredumping threads") fixed
|
| /tools/testing/selftests/seccomp/ |
| A D | seccomp_bpf.c | 437 struct sock_filter allow[] = { in TEST() local 448 filter[i] = allow[0]; in TEST() 474 struct sock_filter allow[] = { in TEST() local 485 filter[i] = allow[0]; in TEST() 1171 struct sock_fprog allow; in FIXTURE() local 1226 FILTER_ALLOC(allow); in FIXTURE_SETUP() 1237 FILTER_FREE(allow); in FIXTURE_TEARDOWN() 1254 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &self->allow); in TEST_F() 1280 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &self->allow); in TEST_F_SIGNAL() 1309 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &self->allow); in TEST_F_SIGNAL() [all …]
|
| /tools/perf/tests/shell/attr/ |
| A D | README | 23 store 'fd' and 'group_fd' values to allow checking for groups.
|
| /tools/testing/memblock/ |
| A D | README | 9 the actual memory management is initialized. Its APIs allow to register physical
|
| /tools/power/pm-graph/ |
| A D | bootgraph.py | 405 allow = False 408 allow = True 410 if not allow:
|
| /tools/perf/ |
| A D | design.txt | 132 * physical and sw events of the kernel (and allow the profiling of them as 218 In future, this will allow sophisticated monitoring programs to supply 232 The 'mmap' and 'munmap' bits allow recording of PROT_EXEC mmap/munmap
|