/Linux-v6.1/tools/testing/selftests/filesystems/binderfs/ |
D | binderfs_test.c | 45 TH_LOG("%s - Failed to unshare mount namespace", in change_mountns() 51 TH_LOG("%s - Failed to mount / as private", in change_mountns() 73 TH_LOG("%s - Failed to create binderfs mountpoint", in __do_binderfs_test() 82 TH_LOG("%s - Failed to mount binderfs", strerror(errno)); in __do_binderfs_test() 93 TH_LOG("%s - Failed to open binder-control device", in __do_binderfs_test() 103 TH_LOG("%s - Failed to allocate new binder device", in __do_binderfs_test() 108 TH_LOG("Allocated new binder device with major %d, minor %d, and name %s", in __do_binderfs_test() 116 TH_LOG("%s - Failed to open my-binder device", in __do_binderfs_test() 126 TH_LOG("%s - Failed to open perform BINDER_VERSION request", in __do_binderfs_test() 131 TH_LOG("Detected binder version: %d", version.protocol_version); in __do_binderfs_test() [all …]
|
/Linux-v6.1/tools/testing/selftests/mincore/ |
D | mincore_selftest.c | 53 TH_LOG("mmap error: %s", strerror(errno)); in TEST() 97 TH_LOG("mmap error: %s", strerror(errno)); in TEST() 102 TH_LOG("Page found in memory before use"); in TEST() 111 TH_LOG("Page not found in memory after use"); in TEST() 123 TH_LOG("Page in memory after being zapped"); in TEST() 156 TH_LOG("mmap error: %s", strerror(errno)); in TEST() 161 TH_LOG("Page found in memory before use"); in TEST() 169 TH_LOG("Page not found in memory after use"); in TEST() 205 TH_LOG("Can't allocate array"); in TEST() 212 TH_LOG("Can't create temporary file: %s", in TEST() [all …]
|
/Linux-v6.1/tools/testing/selftests/net/ |
D | reuseaddr_ports_exhausted.c | 61 ASSERT_NE(-1, fd) TH_LOG("failed to open socket."); in bind_port() 64 ASSERT_EQ(0, ret) TH_LOG("failed to setsockopt: SO_REUSEADDR."); in bind_port() 67 ASSERT_EQ(0, ret) TH_LOG("failed to setsockopt: SO_REUSEPORT."); in bind_port() 92 ASSERT_NE(-1, fd[0]) TH_LOG("failed to bind."); in TEST() 93 EXPECT_EQ(-1, fd[1]) TH_LOG("should fail to bind."); in TEST() 112 ASSERT_NE(-1, fd[0]) TH_LOG("failed to bind."); in TEST() 115 EXPECT_EQ(-1, fd[1]) TH_LOG("should fail to bind because both sockets succeed to be listened."); in TEST() 117 EXPECT_NE(-1, fd[1]) TH_LOG("should succeed to bind to connect to different destinations."); in TEST() 137 ASSERT_EQ(0, ret) TH_LOG("failed to seteuid: %d.", euid[j]); in TEST() 142 ASSERT_EQ(0, ret) TH_LOG("failed to seteuid: 0."); in TEST() [all …]
|
/Linux-v6.1/tools/testing/selftests/syscall_user_dispatch/ |
D | sud_test.c | 70 TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH"); in TEST_SIGNAL() 78 TH_LOG("Unreachable!"); in TEST_SIGNAL() 130 TH_LOG("Should reject bad syscall range"); in TEST() 138 TH_LOG("Should reject bad syscall range"); in TEST() 189 TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH"); in TEST() 196 TH_LOG("Dispatch triggered unexpectedly"); in TEST() 205 TH_LOG("Failed to intercept syscall"); in TEST() 208 TH_LOG("Failed to emulate syscall"); in TEST() 211 TH_LOG("Bad si_code in SIGSYS"); in TEST() 214 TH_LOG("Bad si_errno in SIGSYS"); in TEST() [all …]
|
/Linux-v6.1/tools/testing/selftests/clone3/ |
D | clone3_cap_checkpoint_restore.c | 55 TH_LOG("%s - Failed to create new process", strerror(errno)); in call_clone3_set_tid() 63 TH_LOG("I am the child, my PID is %d (expected %d)", getpid(), set_tid[0]); in call_clone3_set_tid() 70 TH_LOG("I am the parent (%d). My child's pid is %d", getpid(), pid); in call_clone3_set_tid() 73 TH_LOG("Child returned %s", strerror(errno)); in call_clone3_set_tid() 88 TH_LOG("[%d] Trying clone3() with CLONE_SET_TID to %d", getpid(), set_tid[0]); in test_clone3_set_tid() 90 TH_LOG("[%d] clone3() with CLONE_SET_TID %d says:%d", getpid(), set_tid[0], ret); in test_clone3_set_tid() 155 TH_LOG("Child has PID %d", getpid()); in TEST() 159 TH_LOG("Waiting for child %d failed", pid); in TEST() 165 TH_LOG("Could not set CAP_CHECKPOINT_RESTORE"); in TEST() 170 TH_LOG("Failed to setgid(65534)"); in TEST() [all …]
|
/Linux-v6.1/tools/testing/selftests/arm64/pauth/ |
D | pac.c | 210 ASSERT_TRUE(0) TH_LOG("SIGSEGV/SIGILL signal did not occur"); in TEST() 234 ASSERT_NE(0, keyia) TH_LOG("keyia instructions did nothing"); in TEST() 235 ASSERT_NE(0, keyib) TH_LOG("keyib instructions did nothing"); in TEST() 236 ASSERT_NE(0, keyda) TH_LOG("keyda instructions did nothing"); in TEST() 237 ASSERT_NE(0, keydb) TH_LOG("keydb instructions did nothing"); in TEST() 249 ASSERT_NE(0, keyg) TH_LOG("keyg instructions did nothing"); in TEST() 263 TH_LOG("WARNING: Generic PAUTH not enabled. Skipping generic key checks"); in TEST() 287 ASSERT_EQ(0, same) TH_LOG("%d keys clashed every time", same); in TEST() 306 TH_LOG("WARNING: Generic PAUTH not enabled. Skipping generic key checks"); in TEST() 312 ASSERT_EQ(0, ret) TH_LOG("failed to run worker"); in TEST() [all …]
|
/Linux-v6.1/tools/testing/selftests/pidfd/ |
D | pidfd_setns_test.c | 138 TH_LOG("%m - Failed to open /proc/self/ns"); in FIXTURE_SETUP() 147 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP() 155 TH_LOG("%m - Failed to open pidfd for process %d", self->pid); in FIXTURE_SETUP() 170 TH_LOG("%m - Failed to open pidfd for process %d", self->pid); in FIXTURE_SETUP() 240 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP() 253 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP() 266 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP() 392 TH_LOG("%m - Failed to setns to %s namespace of %d via pidfd %d", in TEST_F() 404 TH_LOG("setns failed to place us correctly into %s namespace of %d via pidfd %d", in TEST_F() 408 TH_LOG("Managed to correctly setns to %s namespace of %d via pidfd %d", in TEST_F() [all …]
|
D | pidfd_getfd_test.c | 139 TH_LOG("%s: failed to create socketpair", strerror(errno)); in FIXTURE_SETUP() 225 TH_LOG("getfd succeeded while fetching unknown fd"); in TEST_F() 228 TH_LOG("%s: getfd did not get EBADF", strerror(errno)); in TEST_F()
|
/Linux-v6.1/tools/testing/selftests/landlock/ |
D | common.h | 119 TH_LOG("Failed to cap_get_proc: %s", strerror(errno)); in _init_caps() 123 TH_LOG("Failed to cap_clear: %s", strerror(errno)); in _init_caps() 129 TH_LOG("Failed to cap_set_flag: %s", strerror(errno)); in _init_caps() 134 TH_LOG("Failed to cap_set_proc: %s", strerror(errno)); in _init_caps() 138 TH_LOG("Failed to cap_free: %s", strerror(errno)); in _init_caps() 163 TH_LOG("Failed to cap_get_proc: %s", strerror(errno)); in _effective_cap() 167 TH_LOG("Failed to cap_set_flag: %s", strerror(errno)); in _effective_cap() 171 TH_LOG("Failed to cap_set_proc: %s", strerror(errno)); in _effective_cap() 175 TH_LOG("Failed to cap_free: %s", strerror(errno)); in _effective_cap()
|
D | fs_test.c | 108 TH_LOG("Failed to create directory \"%s\": %s", parent, in mkdir_parents() 122 TH_LOG("Failed to create directory \"%s\": %s", path, in create_directory() 133 TH_LOG("Failed to create file \"%s\": %s", path, in create_file() 500 TH_LOG("Failed to open directory \"%s\": %s", path, in add_path_beneath() 506 TH_LOG("Failed to update the ruleset with \"%s\": %s", path, in add_path_beneath() 540 TH_LOG("No rule list"); in create_ruleset() 544 TH_LOG("Empty rule list"); in create_ruleset() 551 TH_LOG("Failed to create a ruleset: %s", strerror(errno)); in create_ruleset() 567 TH_LOG("Failed to enforce ruleset: %s", strerror(errno)); in enforce_ruleset() 1448 TH_LOG("Failed to pivot root: %s", strerror(errno)); in TEST_F_FORK() [all …]
|
D | ptrace_test.c | 33 TH_LOG("Failed to create a ruleset: %s", strerror(errno)); in create_domain()
|
/Linux-v6.1/tools/testing/selftests/rtc/ |
D | rtctest.c | 49 TH_LOG("Current RTC date/time is %02d/%02d/%02d %02d:%02d:%02d.", in TEST_F() 88 TH_LOG("Continuously reading RTC time for %ds (with %dms breaks after every read).", 115 TH_LOG("Performed %ld RTC time reads.", iter_count); 126 TH_LOG("skip update IRQs not supported."); 151 TH_LOG("skip update IRQs not supported."); in TEST_F() 195 TH_LOG("skip alarms are not supported."); in TEST_F() 202 TH_LOG("Alarm time now set to %02d:%02d:%02d.", in TEST_F() 222 TH_LOG("data: %lx", data); in TEST_F() 251 TH_LOG("skip alarms are not supported."); in TEST_F() 258 TH_LOG("Alarm time now set to %02d/%02d/%02d %02d:%02d:%02d.", in TEST_F() [all …]
|
/Linux-v6.1/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 316 TH_LOG("kcmp() syscall missing (test is less accurate)");\ 338 TH_LOG("Kernel does not support CONFIG_SECCOMP"); in TEST() 349 TH_LOG("Kernel does not support CONFIG_SECCOMP"); in TEST_SIGNAL() 354 TH_LOG("Unreachable!"); in TEST_SIGNAL() 365 TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); in TEST() 376 TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); in TEST() 381 TH_LOG("Kernel does not support CONFIG_SECCOMP_FILTER!"); in TEST() 398 TH_LOG("Expected 0 or unsupported for NO_NEW_PRIVS"); in TEST() 440 TH_LOG("Installing %d insn filter was allowed", prog.len); in TEST() 447 TH_LOG("Installing %d insn filter wasn't allowed", prog.len); in TEST() [all …]
|
/Linux-v6.1/tools/testing/selftests/ptrace/ |
D | get_syscall_info.c | 39 TH_LOG("wait #%d: " fmt, \ 80 TH_LOG("fork: %m"); in TEST() 87 TH_LOG("PTRACE_TRACEME: %m"); in TEST() 91 TH_LOG("kill SIGSTOP: %m"); in TEST()
|
/Linux-v6.1/tools/testing/selftests/exec/ |
D | non-regular.c | 27 TH_LOG("Not ENOENT: %s", pathname); in rm() 31 TH_LOG("Failed to remove: %s", pathname); in rm() 69 TH_LOG("Could not find viable 'true' binary"); in setup_link()
|
/Linux-v6.1/tools/testing/selftests/uevent/ |
D | uevent_filtering.c | 354 TH_LOG("Uevent filtering tests require root privileges. Skipping test"); in TEST() 361 TH_LOG(__DEV_FULL " does not exist. Skipping test"); in TEST()
|
/Linux-v6.1/tools/testing/selftests/sgx/ |
D | main.c | 188 TH_LOG("Failed to load the test enclave."); in setup_test_encl() 231 TH_LOG("0x%016lx 0x%016lx 0x%02x", seg->offset, seg->size, seg->prot); in setup_test_encl() 240 TH_LOG("%s", maps_line); in setup_test_encl() 246 TH_LOG("Failed to initialize the test enclave."); in setup_test_encl() 278 TH_LOG("0x%02x 0x%02x 0x%016llx", (run)->exception_vector, \ 402 TH_LOG("Creating an enclave with %lu bytes heap may take a while ...", 457 TH_LOG("Changing type of %zd bytes to trimmed may take a while ...", 473 TH_LOG("Entering enclave to run EACCEPT for each page of %zd bytes may take a while ...", 494 TH_LOG("Removing %zd bytes from enclave may take a while ...",
|
/Linux-v6.1/tools/testing/selftests/mount_setattr/ |
D | mount_setattr_test.c | 1086 TH_LOG("failure: created idmapped mount with negative fd"); in TEST_F() 1104 TH_LOG("failure: created idmapped mount with too large fd value"); in TEST_F() 1127 TH_LOG("failure: created idmapped mount with closed fd"); in TEST_F()
|
/Linux-v6.1/tools/testing/selftests/ |
D | kselftest_harness.h | 106 #define TH_LOG(fmt, ...) do { \ macro
|
/Linux-v6.1/Documentation/dev-tools/ |
D | kselftest.rst | 377 :functions: TH_LOG TEST TEST_SIGNAL FIXTURE FIXTURE_DATA FIXTURE_SETUP
|