/Linux-v5.10/tools/testing/selftests/filesystems/binderfs/ |
D | binderfs_test.c | 45 TH_LOG("%s - Failed to unshare mount namespace", in change_mountns() 51 TH_LOG("%s - Failed to mount / as private", in change_mountns() 69 TH_LOG("%s - Failed to create binderfs mountpoint", in __do_binderfs_test() 78 TH_LOG("%s - Failed to mount binderfs", strerror(errno)); in __do_binderfs_test() 89 TH_LOG("%s - Failed to open binder-control device", in __do_binderfs_test() 99 TH_LOG("%s - Failed to allocate new binder device", in __do_binderfs_test() 104 TH_LOG("Allocated new binder device with major %d, minor %d, and name %s", in __do_binderfs_test() 112 TH_LOG("%s - Failed to open my-binder device", in __do_binderfs_test() 122 TH_LOG("%s - Failed to open perform BINDER_VERSION request", in __do_binderfs_test() 127 TH_LOG("Detected binder version: %d", version.protocol_version); in __do_binderfs_test() [all …]
|
/Linux-v5.10/tools/testing/selftests/mincore/ |
D | mincore_selftest.c | 54 TH_LOG("mmap error: %s", strerror(errno)); in TEST() 98 TH_LOG("mmap error: %s", strerror(errno)); in TEST() 103 TH_LOG("Page found in memory before use"); in TEST() 112 TH_LOG("Page not found in memory after use"); in TEST() 124 TH_LOG("Page in memory after being zapped"); in TEST() 157 TH_LOG("mmap error: %s", strerror(errno)); in TEST() 162 TH_LOG("Page found in memory before use"); in TEST() 170 TH_LOG("Page not found in memory after use"); in TEST() 206 TH_LOG("Can't allocate array"); in TEST() 212 TH_LOG("Can't create temporary file: %s", in TEST() [all …]
|
/Linux-v5.10/tools/testing/selftests/net/ |
D | reuseaddr_ports_exhausted.c | 61 ASSERT_NE(-1, fd) TH_LOG("failed to open socket."); in bind_port() 64 ASSERT_EQ(0, ret) TH_LOG("failed to setsockopt: SO_REUSEADDR."); in bind_port() 67 ASSERT_EQ(0, ret) TH_LOG("failed to setsockopt: SO_REUSEPORT."); in bind_port() 92 ASSERT_NE(-1, fd[0]) TH_LOG("failed to bind."); in TEST() 93 EXPECT_EQ(-1, fd[1]) TH_LOG("should fail to bind."); in TEST() 112 ASSERT_NE(-1, fd[0]) TH_LOG("failed to bind."); in TEST() 115 EXPECT_EQ(-1, fd[1]) TH_LOG("should fail to bind because both sockets succeed to be listened."); in TEST() 117 EXPECT_NE(-1, fd[1]) TH_LOG("should succeed to bind to connect to different destinations."); in TEST() 137 ASSERT_EQ(0, ret) TH_LOG("failed to seteuid: %d.", euid[j]); in TEST() 142 ASSERT_EQ(0, ret) TH_LOG("failed to seteuid: 0."); in TEST() [all …]
|
/Linux-v5.10/tools/testing/selftests/arm64/pauth/ |
D | pac.c | 28 ASSERT_NE(0, hwcaps & HWCAP_PACA) TH_LOG("PAUTH not enabled"); \ 34 ASSERT_NE(0, hwcaps & HWCAP_PACG) TH_LOG("Generic PAUTH not enabled"); \ 208 ASSERT_TRUE(0) TH_LOG("SIGSEGV/SIGILL signal did not occur"); in TEST() 232 ASSERT_NE(0, keyia) TH_LOG("keyia instructions did nothing"); in TEST() 233 ASSERT_NE(0, keyib) TH_LOG("keyib instructions did nothing"); in TEST() 234 ASSERT_NE(0, keyda) TH_LOG("keyda instructions did nothing"); in TEST() 235 ASSERT_NE(0, keydb) TH_LOG("keydb instructions did nothing"); in TEST() 247 ASSERT_NE(0, keyg) TH_LOG("keyg instructions did nothing"); in TEST() 259 ASSERT_NE(0, hwcaps & HWCAP_PACA) TH_LOG("PAUTH not enabled"); in TEST() 261 TH_LOG("WARNING: Generic PAUTH not enabled. Skipping generic key checks"); in TEST() [all …]
|
/Linux-v5.10/tools/testing/selftests/clone3/ |
D | clone3_cap_checkpoint_restore.c | 55 TH_LOG("%s - Failed to create new process", strerror(errno)); in call_clone3_set_tid() 63 TH_LOG("I am the child, my PID is %d (expected %d)", getpid(), set_tid[0]); in call_clone3_set_tid() 70 TH_LOG("I am the parent (%d). My child's pid is %d", getpid(), pid); in call_clone3_set_tid() 73 TH_LOG("Child returned %s", strerror(errno)); in call_clone3_set_tid() 88 TH_LOG("[%d] Trying clone3() with CLONE_SET_TID to %d", getpid(), set_tid[0]); in test_clone3_set_tid() 90 TH_LOG("[%d] clone3() with CLONE_SET_TID %d says:%d", getpid(), set_tid[0], ret); in test_clone3_set_tid() 155 TH_LOG("Child has PID %d", getpid()); in TEST() 159 TH_LOG("Waiting for child %d failed", pid); in TEST() 165 TH_LOG("Could not set CAP_CHECKPOINT_RESTORE"); in TEST() 170 TH_LOG("Failed to setgid(65534)"); in TEST() [all …]
|
/Linux-v5.10/tools/testing/selftests/pidfd/ |
D | pidfd_setns_test.c | 138 TH_LOG("%m - Failed to open /proc/self/ns"); in FIXTURE_SETUP() 147 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP() 155 TH_LOG("%m - Failed to open pidfd for process %d", self->pid); in FIXTURE_SETUP() 170 TH_LOG("%m - Failed to open pidfd for process %d", self->pid); in FIXTURE_SETUP() 240 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP() 253 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP() 266 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP() 392 TH_LOG("%m - Failed to setns to %s namespace of %d via pidfd %d", in TEST_F() 404 TH_LOG("setns failed to place us correctly into %s namespace of %d via pidfd %d", in TEST_F() 408 TH_LOG("Managed to correctly setns to %s namespace of %d via pidfd %d", in TEST_F() [all …]
|
D | pidfd_getfd_test.c | 139 TH_LOG("%s: failed to create socketpair", strerror(errno)); in FIXTURE_SETUP() 225 TH_LOG("getfd succeeded while fetching unknown fd"); in TEST_F() 228 TH_LOG("%s: getfd did not get EBADF", strerror(errno)); in TEST_F()
|
/Linux-v5.10/tools/testing/selftests/rtc/ |
D | rtctest.c | 47 TH_LOG("Current RTC date/time is %02d/%02d/%02d %02d:%02d:%02d.", in TEST_F() 60 TH_LOG("skip update IRQs not supported."); 85 TH_LOG("skip update IRQs not supported."); in TEST_F() 129 TH_LOG("skip alarms are not supported."); in TEST_F() 136 TH_LOG("Alarm time now set to %02d:%02d:%02d.", in TEST_F() 156 TH_LOG("data: %lx", data); in TEST_F() 185 TH_LOG("skip alarms are not supported."); in TEST_F() 192 TH_LOG("Alarm time now set to %02d/%02d/%02d %02d:%02d:%02d.", in TEST_F() 231 TH_LOG("skip alarms are not supported."); 238 TH_LOG("Alarm time now set to %02d:%02d:%02d.", [all …]
|
/Linux-v5.10/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 305 TH_LOG("kcmp() syscall missing (test is less accurate)");\ 327 TH_LOG("Kernel does not support CONFIG_SECCOMP"); in TEST() 338 TH_LOG("Kernel does not support CONFIG_SECCOMP"); in TEST_SIGNAL() 343 TH_LOG("Unreachable!"); in TEST_SIGNAL() 354 TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); in TEST() 365 TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); in TEST() 370 TH_LOG("Kernel does not support CONFIG_SECCOMP_FILTER!"); in TEST() 387 TH_LOG("Expected 0 or unsupported for NO_NEW_PRIVS"); in TEST() 429 TH_LOG("Installing %d insn filter was allowed", prog.len); in TEST() 436 TH_LOG("Installing %d insn filter wasn't allowed", prog.len); in TEST() [all …]
|
/Linux-v5.10/tools/testing/selftests/ptrace/ |
D | get_syscall_info.c | 39 TH_LOG("wait #%d: " fmt, \ 80 TH_LOG("fork: %m"); in TEST() 87 TH_LOG("PTRACE_TRACEME: %m"); in TEST() 91 TH_LOG("kill SIGSTOP: %m"); in TEST()
|
/Linux-v5.10/tools/testing/selftests/exec/ |
D | non-regular.c | 27 TH_LOG("Not ENOENT: %s", pathname); in rm() 31 TH_LOG("Failed to remove: %s", pathname); in rm() 69 TH_LOG("Could not find viable 'true' binary"); in setup_link()
|
/Linux-v5.10/tools/testing/selftests/uevent/ |
D | uevent_filtering.c | 354 TH_LOG("Uevent filtering tests require root privileges. Skipping test"); in TEST() 361 TH_LOG(__DEV_FULL " does not exist. Skipping test"); in TEST()
|
/Linux-v5.10/tools/testing/selftests/ |
D | kselftest_harness.h | 105 #define TH_LOG(fmt, ...) do { \ macro
|
/Linux-v5.10/Documentation/dev-tools/ |
D | kselftest.rst | 335 :functions: TH_LOG TEST TEST_SIGNAL FIXTURE FIXTURE_DATA FIXTURE_SETUP
|