Home
last modified time | relevance | path

Searched refs:kernel (Results 1 – 25 of 256) sorted by relevance

1234567891011

/tools/testing/selftests/ftrace/test.d/ftrace/
A Dfunc_stack_tracer.tc9 echo 1 > /proc/sys/kernel/stack_tracer_enabled
19 echo 0 > /proc/sys/kernel/stack_tracer_enabled
25 echo 1 > /proc/sys/kernel/stack_tracer_enabled
35 echo 0 > /proc/sys/kernel/stack_tracer_enabled
A Dfgraph-filter-stack.tc10 if [ -e /proc/sys/kernel/stack_tracer_enabled ]; then
11 echo 0 > /proc/sys/kernel/stack_tracer_enabled
36 echo 1 > /proc/sys/kernel/stack_tracer_enabled
55 echo 0 > /proc/sys/kernel/stack_tracer_enabled
/tools/testing/selftests/kho/
A Dvmtest.sh22 -d) path to the kernel build directory
82 local kernel=$1
92 cp "$kernel" "$initrd_dir/kernel"
102 local kernel=$3
111 -kernel "$kernel" \
175 local kernel="$build_dir/arch/$arch/boot/$KERNEL_IMAGE"
176 mkinitrd "$kernel"
178 run_qemu "$QEMU_CMD" "$KERNEL_CMDLINE" "$kernel"
/tools/testing/selftests/powerpc/security/
A Dmitigation-patching.sh31 cd /sys/kernel/debug/powerpc || rc=1
37 tainted=$(cat /proc/sys/kernel/tainted)
46 if [[ -f /sys/kernel/debug/powerpc/$m ]]
71 tainted=$(cat /proc/sys/kernel/tainted)
/tools/include/uapi/
A DREADME1 Why we want a copy of kernel headers in tools?
4 There used to be no copies, with tools/ code using kernel headers
5 directly. From time to time tools/perf/ broke due to legitimate kernel
40 the original kernel headers, that will be done later, when
47 was pushed back on from the kernel side, when tooling modified the
48 headers and broke them accidentally for kernel builds.
52 notification mechanism to look at new kernel side changes.
56 - A software-enforced copy-on-write mechanism of kernel headers to
58 kernel headers get modified:
66 The tooling policy is to always pick up the kernel side headers as-is,
[all …]
/tools/memory-model/Documentation/
A DREADME5 to expert both in kernel hacking and in understanding LKMM.
14 o You are new to Linux-kernel concurrency: simple.txt
16 o You have some background in Linux-kernel concurrency, and would
18 that the Linux kernel provides: ordering.txt
22 o You are familiar with the Linux-kernel concurrency primitives
32 o You are familiar with Linux-kernel concurrency, and would
44 o You are familiar with Linux-kernel concurrency and the use of
47 o You are familiar with Linux-kernel concurrency and the use
69 Quick-reference guide to the Linux-kernel memory model.
94 Overview of the Linux kernel's low-level memory-ordering
[all …]
/tools/perf/Documentation/
A Dperf-buildid-list.txt19 It can also be used to show the build id of the running kernel or in an ELF
34 --kernel::
35 Show running kernel build id.
37 --kernel-maps::
38 Show buildid, start/end text address, and path of running kernel and
A Dperf-intel-pt.txt69 To also trace kernel space presents a problem, namely kernel self-modifying
70 code. A fairly good kernel image is available in /proc/kcore but to get an
228 The Intel PT kernel driver creates a new PMU for Intel PT. PMU events are
277 k kernel
678 512KiB (actually /proc/sys/kernel/perf_event_mlock_kb minus 1 page) per cpu
838 The v4.2 kernel introduced support for a context switch metadata event,
1310 Tracing Virtual Machines (kernel only)
1313 Currently, kernel tracing is supported with either "timeless" decoding
1356 Only kernel decoding is supported, so 'k' must be specified.
1419 Only kernel decoding is supported, so 'k' must be specified.
[all …]
A Dguest-files.txt5 kernel symbols. Users copy it out from guest OS.
9 kernel module information. Users copy it out from guest OS.
12 Guest OS kernel vmlinux.
/tools/testing/selftests/fpu/
A Drun_test_fpu.sh30 if [ ! -e /sys/kernel/debug/selftest_helpers/test_fpu ]; then
31 mount -t debugfs none /sys/kernel/debug
33 if [ ! -e /sys/kernel/debug/selftest_helpers/test_fpu ]; then
/tools/perf/tests/shell/common/
A Dinit.sh125 test -e /sys/kernel/debug/tracing/kprobe_events
130 test -e /sys/kernel/debug/tracing/uprobe_events
135 echo 0 > /sys/kernel/debug/tracing/events/enable
136 check_kprobes_available && echo > /sys/kernel/debug/tracing/kprobe_events
137 check_uprobes_available && echo > /sys/kernel/debug/tracing/uprobe_events
/tools/testing/selftests/bpf/
A Dtest_ftrace.sh3 if [[ -e /sys/kernel/tracing/trace ]]; then
4 TR=/sys/kernel/tracing/
6 TR=/sys/kernel/debug/tracing/
/tools/memory-model/
A Dlinux-kernel.cfg1 macros linux-kernel.def
2 bell linux-kernel.bell
3 model linux-kernel.cat
A DREADME10 short) of the Linux kernel, written in the "cat" language and executable
16 that litmus test to be exercised within the Linux kernel.
35 a later release of Linux kernel.
41 dependency on a target kernel release where converted code is built
42 and executed. Any change in kernel APIs essential to klitmus7 will
79 https://git.kernel.org/pub/scm/linux/kernel/git/paulmck/perfbook.git/tree/CodeSamples/formal/herd
80 https://git.kernel.org/pub/scm/linux/kernel/git/paulmck/perfbook.git/tree/CodeSamples/formal/litmus
168 linux-kernel.bell
177 linux-kernel.cat
186 linux-kernel.cfg
[all …]
/tools/testing/selftests/net/netfilter/
A Dbr_netfilter_queue.sh7 read t < /proc/sys/kernel/tainted
9 echo SKIP: kernel is tainted
76 read t < /proc/sys/kernel/tainted
78 echo PASS: kernel not tainted
80 echo ERROR: kernel is tainted
/tools/testing/selftests/livepatch/
A DREADME5 This is a small set of sanity tests for the kernel livepatching.
7 The test suite loads and unloads several test kernel modules to verify
8 livepatch behavior. Debug information is logged to the kernel's message
32 Test kernel modules are built before running the livepatch selftests. The
38 To run the livepatch selftests, from the top of the kernel source tree:
52 check_result(). The latter function greps the kernel's ring buffer for
/tools/testing/selftests/bpf/progs/
A Dtest_kernel_flag.c19 int BPF_PROG(bpf, int cmd, union bpf_attr *attr, unsigned int size, bool kernel) in BPF_PROG() argument
24 if (!kernel || tid != monitored_tid) in BPF_PROG()
A Dtest_kfunc_dynptr_param.c39 int BPF_PROG(not_valid_dynptr, int cmd, union bpf_attr *attr, unsigned int size, bool kernel) in BPF_PROG() argument
49 int BPF_PROG(not_ptr_to_stack, int cmd, union bpf_attr *attr, unsigned int size, bool kernel) in BPF_PROG() argument
58 int BPF_PROG(dynptr_data_null, int cmd, union bpf_attr *attr, unsigned int size, bool kernel) in BPF_PROG() argument
/tools/debugging/
A DMakefile8 TARGET = kernel-chktaint
14 install: kernel-chktaint
/tools/testing/vsock/
A DREADME14 1. Build the kernel, make headers_install, and build these tests.
15 2. Install the kernel and tests on the host.
16 3. Install the kernel and tests inside the guest.
39 Some tests are designed to produce kernel memory leaks. Leaks detection,
44 # echo clear > /sys/kernel/debug/kmemleak
47 # echo scan > /sys/kernel/debug/kmemleak
49 # echo scan > /sys/kernel/debug/kmemleak
50 # cat /sys/kernel/debug/kmemleak
/tools/bpf/bpftool/Documentation/
A Dbpftool-feature.rst7 tool for inspection of eBPF-related parameters for Linux kernel or net device
30 | *COMPONENT* := { **kernel** | **dev** *NAME* }
35 bpftool feature probe [kernel] [full] [macros [prefix *PREFIX*]]
36 Probe the running kernel and dump a number of eBPF-related parameters, such
41 () and **bpf_trace_printk**\() helpers which print warnings to kernel logs.
51 Keyword **kernel** can be omitted. If no probe target is specified, probing
52 the kernel is the default behaviour.
67 probing the kernel.
A Dbpftool-iter.rst35 A bpf iterator combines a kernel iterating of particular kernel data (e.g.,
36 tasks, bpf_maps, etc.) and a bpf program called for each kernel data object
37 (e.g., one task, one bpf_map, etc.). User space can *read* kernel iterator
46 program in kernel to run with each map element, do checking, filtering,
/tools/testing/selftests/pstore/
A Dpstore_crash_test16 echo 1 > /proc/sys/kernel/sysrq
18 echo 3 > /proc/sys/kernel/panic
/tools/perf/
A Dcheck-headers.sh198 check_2 tools/perf/arch/powerpc/entry/syscalls/syscall.tbl arch/powerpc/kernel/syscalls/syscall.tbl
199 check_2 tools/perf/arch/s390/entry/syscalls/syscall.tbl arch/s390/kernel/syscalls/syscall.tbl
200 check_2 tools/perf/arch/mips/entry/syscalls/syscall_n64.tbl arch/mips/kernel/syscalls/syscall_n64.t…
202 check_2 tools/perf/arch/sh/entry/syscalls/syscall.tbl arch/sh/kernel/syscalls/syscall.tbl
203 check_2 tools/perf/arch/sparc/entry/syscalls/syscall.tbl arch/sparc/kernel/syscalls/syscall.tbl
204 check_2 tools/perf/arch/xtensa/entry/syscalls/syscall.tbl arch/xtensa/kernel/syscalls/syscall.tbl
/tools/testing/selftests/kvm/x86/
A Dnx_huge_pages_test.sh14 HUGE_PAGES=$(cat /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages)
43 sudo_echo "$(( $HUGE_PAGES + 3 ))" /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages
67 sudo_echo "$HUGE_PAGES" /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages

Completed in 27 milliseconds

1234567891011