/openbmc/phosphor-power/phosphor-regulators/test/ |
H A D | validate-regulators-config_tests.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 44 "comments": [ "Config file for a FooBar one-chassis system" ], 46 "rules": [ 140 "../phosphor-regulators/tools/validate-regulators-config.py -s \ in getValidationToolCommand() 141 ../phosphor-regulators/schema/config_schema.json -c "; in getValidationToolCommand() 172 if (returnValue == -1) in runToolForOutputWithCommand() 264 TEST(ValidateRegulatorsConfigTest, Action) in TEST() function 274 configFile["rules"][0]["actions"][0]["comments"][0] = in TEST() 290 configFile["rules"][0]["actions"].push_back(andAction); in TEST() 296 configFile["rules"][0]["actions"][1]["compare_presence"]["fru"] = in TEST() [all …]
|
H A D | system_tests.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 61 TEST(SystemTests, Constructor) in TEST() function 63 // Create Rules in TEST() 64 std::vector<std::unique_ptr<Rule>> rules{}; in TEST() local 65 rules.emplace_back(createRule("set_voltage_rule")); in TEST() 75 System system{std::move(rules), std::move(chassis)}; in TEST() 77 EXPECT_EQ(system.getChassis()[0]->getNumber(), 1); in TEST() 83 EXPECT_EQ(system.getRules()[0]->getID(), "set_voltage_rule"); in TEST() 86 TEST(SystemTests, ClearCache) in TEST() function 110 std::vector<std::unique_ptr<Rule>> rules{}; in TEST() local [all …]
|
H A D | configuration_tests.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 56 TEST(ConfigurationTests, Constructor) in TEST() function 58 // Test where volts value specified in TEST() 72 // Test where volts value not specified in TEST() 85 // Test for execute(Services&, System&, Chassis&, Device&) 86 TEST(ConfigurationTests, ExecuteForDevice) in TEST() function 88 // Test where works: Volts value not specified in TEST() 133 std::vector<std::unique_ptr<Rule>> rules{}; in TEST() local 136 System system{std::move(rules), std::move(chassisVec)}; in TEST() 139 configurationPtr->execute(services, system, *chassisPtr, *devicePtr); in TEST() [all …]
|
H A D | rail_tests.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 54 TEST(RailTests, Constructor) in TEST() function 56 // Test where only required parameters are specified in TEST() 64 // Test where all parameters are specified in TEST() 85 EXPECT_EQ(rail.getConfiguration()->getVolts().has_value(), true); in TEST() 86 EXPECT_EQ(rail.getConfiguration()->getVolts().value(), 1.3); in TEST() 87 EXPECT_EQ(rail.getConfiguration()->getActions().size(), 2); in TEST() 89 EXPECT_EQ(rail.getSensorMonitoring()->getActions().size(), 1); in TEST() 93 TEST(RailTests, ClearErrorHistory) in TEST() function 134 std::vector<std::unique_ptr<Rule>> rules{}; in TEST() local [all …]
|
/openbmc/linux/Documentation/admin-guide/aoe/ |
H A D | udev-install.sh | 1 # install the aoe-specific udev rules from udev.txt into 10 if test -z "$conf"; then 11 if test -r /etc/udev/udev.conf; then 14 conf="`find /etc -type f -name udev.conf 2> /dev/null`" 15 if test -z "$conf" || test ! -r "$conf"; then 22 # find the directory where udev rules are stored, often 23 # /etc/udev/rules.d 25 rules_d="`sed -n '/^udev_rules=/{ s!udev_rules=!!; s!\"!!g; p; }' $conf`" 26 if test -z "$rules_d" ; then 27 rules_d=/etc/udev/rules.d [all …]
|
/openbmc/linux/drivers/gpu/drm/ci/ |
H A D | gitlab-ci.yml | 2 DRM_CI_PROJECT_PATH: &drm-ci-project-path mesa/mesa 3 DRM_CI_COMMIT_SHA: &drm-ci-commit-sha edfbf74df1d4d6ce54ffe24566108be0e1a98c3d 6 TARGET_BRANCH: drm-next 10 DEQP_RUNNER_GIT_URL: https://gitlab.freedesktop.org/anholt/deqp-runner.git 13 FDO_UPSTREAM_REPO: helen.fornazier/linux # The repo where the git-archive daily runs 14 MESA_TEMPLATES_COMMIT: &ci-templates-commit d5aa3941aa03c2f716595116354fb81eb8012acb 16 CI_PRE_CLONE_SCRIPT: |- 17 set -o xtrace 18 …-L --retry 4 -f --retry-all-errors --retry-delay 60 -s ${DRM_CI_PROJECT_URL}/-/raw/${DRM_CI_COMMIT… 19 bash download-git-cache.sh [all …]
|
H A D | test.yml | 1 .test-rules: 2 rules: 3 - if: '$FD_FARM == "offline" && $RUNNER_TAG =~ /^google-freedreno-/' 5 - if: '$COLLABORA_FARM == "offline" && $RUNNER_TAG =~ /^mesa-ci-x86-64-lava-/' 7 - !reference [.no_scheduled_pipelines-rules, rules] 8 - when: on_success 10 .lava-test: 12 - .test-rules 15 - rm -rf install 16 - tar -xf artifacts/install.tar [all …]
|
H A D | container.yml | 3 …_REPOSITORY_URL: ${DRM_CI_PROJECT_URL}.git # So ci-templates clones drm-ci instead of the repo to … 6 debian/x86_64_build-base: 8 …airo-dev libdw-dev libjson-c-dev libkmod2 libkmod-dev libpciaccess-dev libproc2-dev libudev-dev li… 10 debian/x86_64_test-gl: 12 …CKAGES: "jq libasound2 libcairo2 libdw1 libglib2.0-0 libjson-c5 libkmod-dev libkmod2 libgles2 libp… 16 …-dev libdw-dev libjson-c-dev libproc2-dev libkmod2 libkmod-dev libpciaccess-dev libudev-dev libunw… 20 EXTRA_LOCAL_PACKAGES: "jq libasound2 libcairo2 libdw1 libglib2.0-0 libjson-c5" 24 rules: 25 - when: never 27 debian/x86_64_test-vk: [all …]
|
/openbmc/linux/security/apparmor/ |
H A D | capability.c | 1 // SPDX-License-Identifier: GPL-2.0-only 7 * Copyright (C) 1998-2008 Novell/SUSE 8 * Copyright 2009-2010 Canonical Ltd. 40 * audit_cb - call back for capability components of audit struct 41 * @ab - audit buffer (NOT NULL) 42 * @va - audit struct to audit data from (NOT NULL) 49 audit_log_untrustedstring(ab, capability_names[sa->u.cap]); in audit_cb() 53 * audit_caps - audit a capability 57 * @error: error code returned by test 62 * Returns: 0 or ad->error on success, error code on failure [all …]
|
H A D | file.c | 1 // SPDX-License-Identifier: GPL-2.0-only 7 * Copyright (C) 1998-2008 Novell/SUSE 8 * Copyright 2009-2010 Canonical Ltd. 40 * file_audit_cb - call back for file specific audit fields 48 kuid_t fsuid = ad->subj_cred ? ad->subj_cred->fsuid : current_fsuid(); in file_audit_cb() 51 if (ad->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() 53 map_mask_to_chr_mask(ad->request)); in file_audit_cb() 56 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 58 map_mask_to_chr_mask(ad->denied)); in file_audit_cb() 61 if (ad->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() [all …]
|
/openbmc/linux/tools/perf/tests/shell/lib/ |
H A D | perf_metric_validation.py | 1 #SPDX-License-Identifier: GPL-2.0 13 self.rules = None 29 # vars for test pass/failure statistics 30 …oremetrics= set() # metrics with no results or negative results, neg result counts as a failed test 51 def read_json(self, filename: str) -> dict: 75 def get_bounds(self, lb, ub, error, alias={}, ridx:int = 0) -> list: 84 upper bound, return -1 if the upper bound is a metric value and is not collected 107 ubv = get_bound_value(ub, -1, ridx) 116 def get_value(self, name:str, ridx:int = 0) -> list: 120 All future test(s) on this metric will fail. [all …]
|
/openbmc/openbmc/poky/meta/recipes-multimedia/alsa/ |
H A D | alsa-utils_1.2.13.bb | 4 HOMEPAGE = "http://www.alsa-project.org" 5 BUGTRACKER = "http://alsa-project.org/main/index.php/Bug_Tracking" 7 # Some parts are GPL-2.0-or-later, some are GPL-2.0-only (e.g. axfer, alsactl) 8 # so result is GPL-2.0-only 9 LICENSE = "GPL-2.0-only" 12 DEPENDS = "alsa-lib ncurses libsamplerate0" 21 PACKAGECONFIG[bat] = "--enable-bat,--disable-bat,fftwf" 23 PACKAGECONFIG[udev] = "--with-udev-rules-dir=`pkg-config --variable=udevdir udev`/rules.d,--with-ud… 24 PACKAGECONFIG[manpages] = "--enable-xmlto, --disable-xmlto, xmlto-native docbook-xml-dtd4-native do… 26 # alsa-utils specified in SRC_URI due to alsa-utils-scripts recipe [all …]
|
/openbmc/linux/tools/testing/selftests/drivers/net/mlxsw/ |
H A D | tc_flower_scale.sh | 2 # SPDX-License-Identifier: GPL-2.0 4 # Test for resource limit of offloaded flower rules. The test adds a given 6 # indication for all of the tc flower rules. This file contains functions to set 7 # up a testing topology and run the test, and is meant to be sourced from a test 8 # script that calls the testing routine with a given number of rules. 56 if [[ -v TC_FLOWER_BATCH_FILE ]]; then 57 rm -f $TC_FLOWER_BATCH_FILE 76 cat >> $TC_FLOWER_BATCH_FILE <<-EOF 86 tc -b $TC_FLOWER_BATCH_FILE 94 local last=$((count - 1)) [all …]
|
/openbmc/linux/tools/testing/selftests/netfilter/ |
H A D | xt_string.sh | 2 # SPDX-License-Identifier: GPL-2.0 4 # return code to signal skipped test 8 if ! iptables --version >/dev/null 2>&1; then 9 echo "SKIP: Test needs iptables" 12 if ! ip -V >/dev/null 2>&1; then 13 echo "SKIP: Test needs iproute2" 16 if ! nc -h >/dev/null 2>&1; then 17 echo "SKIP: Test needs netcat" 24 ns="ns-$(mktemp -u XXXXXXXX)" 27 ip -net "$ns" link add d0 type dummy [all …]
|
/openbmc/webui-vue/docs/guide/coding-standards/ |
H A D | readme.md | 6 - [ESLint](https://eslint.org/) 7 - [Prettier](https://prettier.io/) 8 - [ESLint Plugin for Vue](https://eslint.vuejs.org/) 12 - [Vue Recommended](https://eslint.vuejs.org/rules/#priority-c-recommended-minimizing-arbitrary-cho… 13 - [ESLint Recommended](https://eslint.org/docs/rules/) 14 - [Prettier](https://prettier.io/docs/en/options.html) 16 The rules are applied in the following order: 18 1. Vue rules 27 ## Running the lint test 29 To test all files for linting, run `npm run lint`. This command will evaluate [all …]
|
/openbmc/openbmc/poky/meta/recipes-support/apr/ |
H A D | apr-util_1.6.3.bb | 8 LICENSE = "Apache-2.0" 12 SRC_URI = "${APACHE_MIRROR}/apr/${BPN}-${PV}.tar.gz \ 15 file://0001-test_transformation-Check-if-transform-is-supported-.patch \ 16 file://run-ptest \ 21 EXTRA_OECONF = "--with-apr=${STAGING_BINDIR_CROSS}/apr-1-config \ 22 --without-odbc \ 23 --without-pgsql \ 24 --without-sqlite2 \ 25 --with-expat=${STAGING_DIR_HOST}${prefix}" 30 MULTILIB_SCRIPTS = "${PN}-dev:${bindir}/apu-1-config" [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/linuxconsole/ |
H A D | linuxconsole_1.7.1.bb | 3 utilities to test and configure joysticks, connect legacy devices to the kernel's \ 4 input subsystem (providing support for serial mice, touchscreens etc.), and test \ 8 LICENSE = "GPL-2.0-only" 14 ${SOURCEFORGE_MIRROR}/linuxconsole/linuxconsoletools-${PV}.tar.bz2 \ 15 file://0001-utils-Use-name-of-the-first-prerequisite-in-rule.patch \ 16 file://51-these-are-not-joysticks-rm.rules \ 17 file://60-joystick.rules \ 24 S = "${WORKDIR}/linuxconsoletools-${PV}" 28 EXTRA_OEMAKE = "DESTDIR=${D} PREFIX=${prefix} -C utils" 43 sed '/^PROGRAMS/s/ffmvforce *//g' -i ${S}/utils/Makefile [all …]
|
/openbmc/linux/lib/ |
H A D | Kconfig.kcsan | 1 # SPDX-License-Identifier: GPL-2.0-only 7 def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-distinguish-volatile=1)) || \ 8 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-distinguish-volatile=1)) 11 <file:Documentation/dev-tools/kcsan.rst>. 21 data-race detector that relies on compile-time instrumentation. 22 KCSAN uses a watchpoint-based sampling approach to detect races. 29 See <file:Documentation/dev-tools/kcsan.rst> for more details. 34 …def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-compound-read-before-write=1))… 35 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-compound-read-before-write=1)) 37 The compiler instruments plain compound read-write operations [all …]
|
/openbmc/linux/tools/testing/selftests/hid/tests/ |
H A D | base.py | 2 # SPDX-License-Identifier: GPL-2.0 3 # -*- coding: utf-8 -*- 19 logger = logging.getLogger("hidtools.test.base") 140 name = f"uhid test {self.__class__.__name__}" 141 if not name.startswith("uhid test "): 142 name = "uhid test " + self.name 154 # List of kernel modules to load before starting the test 155 # if any module is not available (not compiled), the test will skip. 157 # for example ("playstation", "hid-playstation") 212 sysfs_path = Path("/sys/module") / kernel_module.replace("-", "_") [all …]
|
/openbmc/phosphor-power/phosphor-regulators/docs/config_file/ |
H A D | README.md | 1 # phosphor-regulators Configuration File 5 - [Overview](#overview) 6 - [Data Format](#data-format) 7 - [Example](#example) 8 - [Name](#name) 9 - [Contents](#contents) 10 - [Validation](#validation) 11 - [Installation](#installation) 12 - [Loading and Reloading](#loading-and-reloading) 13 - [Testing](#testing) [all …]
|
/openbmc/openbmc/meta-security/recipes-ids/tripwire/files/ |
H A D | tripwire.txt | 1 Post-Installation Instructions 4 2. Initialize the Tripwire database file. (/usr/sbin/tripwire--init) 5 3. Run the first integrity check. (/usr/sbin/tripwire--check) 9 …u modify the policy file after running the configuration script, you must re-run the configuration… 14 …ripwire/twpol.txt. An example policy file (located at /usr/doc/tripwire-VER#-REL#/policyguide.tx… 16 After you modify the policy file, follow the Post-Installation Instructions (run the configuration … 27 …e, Tripwire software builds a database of filesystem objects based on the rules in the policy file… 28 tripwire --init 32 tripwire --check 34 Printing Reports - twprint Print Report Mode [all …]
|
/openbmc/qemu/docs/devel/testing/ |
H A D | blkdebug.rst | 5 Copyright (C) 2014-2015 Red Hat Inc 8 the COPYING file in the top-level directory. 10 The ``blkdebug`` block driver is a rule-based error injection engine. It can be 17 ---------- 23 Error injection allows test cases to trigger I/O errors at specific points. 26 Rules chapter 27 ----- 28 The ``blkdebug`` block driver takes a list of "rules" that tell the error injection 31 Each I/O request is evaluated against the rules. If a rule matches the request 34 Rules can be placed in a configuration file; the configuration file [all …]
|
/openbmc/qemu/tests/unit/ |
H A D | check-block-qdict.c | 2 * Unit-tests for Block layer QDict extras 4 * Copyright (c) 2013-2018 Red Hat, Inc. 7 * See the COPYING.LIB file in the top-level directory. 49 * Test the flattening of in qdict_flatten_test() 135 * Test that we can clone and flatten in qdict_clone_flatten_test() 168 * Test the split of in qdict_array_split_test() 249 * Test the split of in qdict_array_split_test() 270 * That is, test whether splitting stops if there is both an entry with key in qdict_array_split_test() 312 g_assert_cmpint(qdict_array_entries(dict, "foo."), ==, -EINVAL); in qdict_array_entries_test() 316 g_assert_cmpint(qdict_array_entries(dict, "foo."), ==, -EINVAL); in qdict_array_entries_test() [all …]
|
/openbmc/openbmc/meta-security/recipes-mac/smack/smack-test/ |
H A D | smack_test_file_access.sh | 11 python3 $TMP/notroot.py $uid "TheOther" $ECHO 'TEST' > $test_file 12 chsmack -a "TheOther" $test_file 15 delrule="TheOne TheOther -----" 16 rule_ro="TheOne TheOther r----" 18 # Remove pre-existent rules for "TheOne TheOther <access>" 19 echo -n "$delrule" > $SMACK_PATH/load 20 python3 $TMP/notroot.py $uid "TheOne" $CAT $test_file 2>&1 1>/dev/null | grep -q "Permission denied… 21 if [ $RC -ne 0 ]; then 22 echo "Process with different label than the test file and no read access on it can read it" 27 echo -n "$rule_ro" > $SMACK_PATH/load [all …]
|
/openbmc/linux/drivers/net/ethernet/microchip/vcap/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 9 bool "VCAP (Versatile Content-Aware Processor) library" 13 A VCAP is essentially a TCAM with rules consisting of 15 - Programmable key fields 16 - Programmable action fields 17 - A counter (which may be only one bit wide) 21 - A number of lookups 22 - A keyset configuration per port per lookup 24 The VCAP implementation provides switchcore independent handling of rules 27 - Creating and deleting rules [all …]
|