Home
last modified time | relevance | path

Searched refs:dmesg (Results 1 - 15 of 15) sorted by relevance

/third_party/ltp/testcases/kernel/tracing/dynamic_debug/
H A Ddynamic_debug01.sh7 # settings don't cause issues by searching dmesg.
93 dmesg > ./dmesg.old
109 dmesg > ./dmesg.new
110 sed -i -e 1,`wc -l < ./dmesg.old`d ./dmesg.new
113 -e "fault" -e "warn" -e "\<BUG\>" ./dmesg.new ; then
114 tst_res TFAIL "Issues found in dmesg!"
/third_party/ltp/testcases/kernel/controllers/cgroup/
H A Dcgroup_regression_test.sh13 TST_NEEDS_CMDS="awk dmesg find mountpoint rmdir"
23 dmesg -c > /dev/null
24 NR_BUG=`dmesg | grep -c "kernel BUG"`
25 NR_NULL=`dmesg | grep -c "kernel NULL pointer dereference"`
26 NR_WARNING=`dmesg | grep -c "^WARNING"`
27 NR_LOCKDEP=`dmesg | grep -c "possible recursive locking detected"`
43 local new_bug=`dmesg | grep -c "kernel BUG"`
44 local new_null=`dmesg | grep -c "kernel NULL pointer dereference"`
45 local new_warning=`dmesg | grep -c "^WARNING"`
46 local new_lockdep=`dmesg | gre
[all...]
/third_party/ltp/testcases/kernel/controllers/memcg/regression/
H A Dmemcg_regression_test.sh17 dmesg -c > /dev/null
26 new_bug=`dmesg | grep -c "kernel BUG"`
27 new_null=`dmesg | grep -c "kernel NULL pointer dereference"`
28 new_warning=`dmesg | grep -c "^WARNING"`
29 new_lockdep=`dmesg | grep -c "possible recursive locking detected"`
57 dmesg
/third_party/ltp/testcases/kernel/security/integrity/ima/tests/
H A Dima_tpm.sh78 tst_require_cmds dmesg
79 if dmesg | grep -q 'activating TPM-bypass'; then
81 elif dmesg | grep -q '1\.2 TPM (device-id'; then
84 elif dmesg | grep -q '2\.0 TPM (device-id'; then
H A Dima_kexec.sh63 elif tst_cmd_available dmesg; then
64 if dmesg | grep -qi 'Secure boot enabled'; then
H A Dima_measurements.sh39 if dmesg | grep -q "XFS.*Mounting V[1-4] Filesystem"; then
/third_party/ltp/testcases/kernel/device-drivers/rcu/
H A Drcu_torture.sh10 # dmesg output for module's test results.
17 TST_NEEDS_CMDS="modprobe dmesg sed tail"
63 dmesg | grep -q "invalid torture type: \"$rcu_type\"" && \
74 # check module status in dmesg
75 local res=$(dmesg | sed -nE "s/.* $rcu_type-torture:.* End of test: (.*): .*/\1/p" | tail -n1)
79 tst_res TFAIL "$rcu_type-torture: $res, see dmesg"
/third_party/ltp/testcases/kernel/mce-test/drivers/simple/
H A Ddriver.sh33 dmesg > $tmp_klog.1
38 dmesg | sed -e '1d' > $tmp_klog.2
/third_party/ltp/testcases/network/tcp_cmds/tc/
H A Dtc01.sh25 TST_NEEDS_CMDS="tc modprobe dmesg grep"
38 if dmesg | grep -q 'RIP:.*sch_teql'; then
/third_party/ltp/testcases/commands/sysctl/
H A Dsysctl02.sh67 if dmesg | grep -q "KASAN: global-out-of-bounds in __do_proc_doulongvec_minmax"; then
/third_party/ltp/testcases/kernel/device-drivers/locking/
H A Dlock_torture.sh22 # module using particular options and then inspects dmesg output for module's
85 # check module status in dmesg
86 result_str=`dmesg | sed -nE '$s/.*End of test: ([A-Z]+):.*/\1/p'`
90 tst_resm TFAIL "$type: $result_str, see dmesg"
/third_party/ltp/testcases/network/iptables/
H A Diptables_lib.sh258 dmesg | grep "$logprefix" > tst_iptables.err 2>&1
310 dmesg | grep "$logprefix" | grep "=$dport " \
358 logcnt=$(dmesg | grep -c "$logprefix")
/third_party/alsa-utils/alsa-info/
H A Dalsa-info.sh38 REQUIRES=(mktemp grep pgrep awk date uname cat sort dmesg amixer alsactl)
233 echo "!!ALSA/HDA dmesg" >> "$FILE"
236 dmesg | grep -C1 -E 'ALSA|HDA|HDMI|snd[_-]|sound|audio|hda.codec|hda.intel' >> "$FILE"
375 dmesg
790 --with-dmesg)
832 echo " --with-dmesg (shows the ALSA/HDA kernel messages)"
/third_party/toybox/generated/
H A Dglobals.h38 // toys/lsb/dmesg.c
1619 struct dmesg_data dmesg; member
H A Dflags.h707 // dmesg w(follow)CSTtrs#<1n#c[!Ttr][!Cc][!Sw] w(follow)CSTtrs#<1n#c[!Ttr][!Cc][!Sw]
4080 #define TT this.dmesg

Completed in 22 milliseconds