/openbmc/linux/kernel/rcu/ |
H A D | srcutree.c | 171 struct srcu_node *snp; in init_srcu_struct_nodes() local 187 srcu_for_each_node_breadth_first(ssp, snp) { in init_srcu_struct_nodes() 188 spin_lock_init(&ACCESS_PRIVATE(snp, lock)); in init_srcu_struct_nodes() 189 WARN_ON_ONCE(ARRAY_SIZE(snp->srcu_have_cbs) != in init_srcu_struct_nodes() 190 ARRAY_SIZE(snp->srcu_data_have_cbs)); in init_srcu_struct_nodes() 191 for (i = 0; i < ARRAY_SIZE(snp->srcu_have_cbs); i++) { in init_srcu_struct_nodes() 192 snp->srcu_have_cbs[i] = SRCU_SNP_INIT_SEQ; in init_srcu_struct_nodes() 193 snp->srcu_data_have_cbs[i] = 0; in init_srcu_struct_nodes() 195 snp->srcu_gp_seq_needed_exp = SRCU_SNP_INIT_SEQ; in init_srcu_struct_nodes() 196 snp->grplo = -1; in init_srcu_struct_nodes() [all …]
|
/openbmc/linux/drivers/infiniband/hw/qib/ |
H A D | qib_eeprom.c | 244 char *snp = dd->serial; in qib_get_eeprom_info() local 250 memcpy(snp, ifp->if_sprefix, sizeof(ifp->if_sprefix)); in qib_get_eeprom_info() 251 snp[sizeof(ifp->if_sprefix)] = '\0'; in qib_get_eeprom_info() 252 len = strlen(snp); in qib_get_eeprom_info() 253 snp += len; in qib_get_eeprom_info() 257 memcpy(snp, ifp->if_serial, len); in qib_get_eeprom_info()
|
/openbmc/linux/security/smack/ |
H A D | smackfs.c | 1158 struct smk_net4addr *snp; in smk_write_net4addr() local 1249 list_for_each_entry_rcu(snp, &smk_net4addr_list, list) { in smk_write_net4addr() 1250 if (snp->smk_host.s_addr == nsa && snp->smk_masks == masks) { in smk_write_net4addr() 1258 snp = kzalloc(sizeof(*snp), GFP_KERNEL); in smk_write_net4addr() 1259 if (snp == NULL) in smk_write_net4addr() 1263 snp->smk_host.s_addr = newname.sin_addr.s_addr; in smk_write_net4addr() 1264 snp->smk_mask.s_addr = mask.s_addr; in smk_write_net4addr() 1265 snp->smk_label = skp; in smk_write_net4addr() 1266 snp->smk_masks = masks; in smk_write_net4addr() 1267 smk_net4addr_insert(snp); in smk_write_net4addr() [all …]
|
H A D | smack_lsm.c | 2460 struct smk_net4addr *snp; in smack_ipv4host_label() local 2466 list_for_each_entry_rcu(snp, &smk_net4addr_list, list) in smack_ipv4host_label() 2472 if (snp->smk_host.s_addr == in smack_ipv4host_label() 2473 (siap->s_addr & snp->smk_mask.s_addr)) in smack_ipv4host_label() 2474 return snp->smk_label; in smack_ipv4host_label() 2510 struct smk_net6addr *snp; in smack_ipv6host_label() local 2521 list_for_each_entry_rcu(snp, &smk_net6addr_list, list) { in smack_ipv6host_label() 2526 if (snp->smk_label == NULL) in smack_ipv6host_label() 2534 if ((sap->s6_addr16[i] & snp->smk_mask.s6_addr16[i]) != in smack_ipv6host_label() 2535 snp->smk_host.s6_addr16[i]) { in smack_ipv6host_label() [all …]
|
/openbmc/u-boot/board/Synology/ds414/ |
H A D | cmd_syno.c | 85 char *snp, *csump; in do_syno_populate() local 89 snp = bufp = buf + 32 + strlen(SYNO_SN_TAG); in do_syno_populate() 111 printf("parsed SN = %s\n", snp); in do_syno_populate() 112 env_set("SN", snp); in do_syno_populate()
|
/openbmc/linux/arch/x86/boot/compressed/ |
H A D | sev.c | 450 bool snp; in sev_enable() local 476 snp = snp_init(bp); in sev_enable() 482 if (snp) in sev_enable() 510 if (snp && !(sev_status & MSR_AMD64_SEV_SNP_ENABLED)) in sev_enable()
|
/openbmc/u-boot/doc/ |
H A D | README.iscsi | 39 iPXE can be built as an EFI application (named snp.efi) which can be loaded and 44 U-Boot loads the EFI application iPXE snp.efi using the bootefi command. This 68 | EFI | | snp.efi| 117 For running iPXE on arm64 the bin-arm64-efi/snp.efi build target is needed:: 121 make bin-arm64-efi/snp.efi -j6 EMBED=myscript.ipxe
|
/openbmc/qemu/qapi/ |
H A D | misc-target.json | 57 # @sev-snp: The guest is an SEV-SNP guest. 62 'data': [ 'sev', 'sev-snp' ], 86 # @snp-policy: SEV-SNP policy value 91 'data': { 'snp-policy': 'uint64' }, 123 'sev-snp': 'SevSnpGuestInfo' },
|
H A D | qom.json | 997 # Properties for sev-snp-guest objects. Most of these are direct 1132 'sev-snp-guest', 1206 'sev-snp-guest': 'SevSnpGuestProperties',
|
/openbmc/linux/arch/x86/mm/ |
H A D | mem_encrypt_identity.c | 498 bool snp; in sme_enable() local 501 snp = snp_init(bp); in sme_enable() 535 if (snp && !(msr & MSR_AMD64_SEV_SNP_ENABLED)) in sme_enable()
|
/openbmc/linux/Documentation/virt/coco/ |
H A D | sev-guest.rst | 73 :Technology: sev-snp 88 :Technology: sev-snp 107 :Technology: sev-snp
|
/openbmc/qemu/docs/system/i386/ |
H A D | amd-memory-encryption.rst | 178 QAPI schema for the sev-snp-guest object. 182 'sev-snp-guest' object. 207 'sev-snp-guest' object. 223 schema for the 'sev-snp-guest' object):: 227 -object sev-snp-guest,id=sev0,cbitpos=51,reduced-phys-bits=1
|
/openbmc/u-boot/lib/efi_selftest/ |
H A D | efi_selftest_snp.c | 424 EFI_UNIT_TEST(snp) = {
|
/openbmc/qemu/docs/interop/ |
H A D | firmware.json | 147 # @amd-sev-snp: The firmware supports running under AMD Secure Encrypted 221 'amd-sev', 'amd-sev-es', 'amd-sev-snp',
|