/openbmc/linux/tools/testing/selftests/net/forwarding/ |
H A D | fib_offload_lib.sh | 60 RET=0 93 RET=0 122 RET=0 152 RET=0 189 RET=0 221 RET=0 248 RET=0 274 RET=0 300 RET=0 326 RET=0 [all …]
|
H A D | ip6_forward_instats_vrf.sh | 91 RET=0 108 RET=0 126 RET=0 145 RET=0 163 RET=0
|
H A D | sch_red.sh | 265 RET=0 275 RET=0 297 RET=0 320 RET=0 341 RET=0 349 RET=0 368 RET=0 409 RET=0
|
/openbmc/linux/tools/testing/selftests/drivers/net/mlxsw/ |
H A D | vxlan.sh | 87 RET=0 104 RET=0 121 RET=0 138 RET=0 158 RET=0 175 RET=0 192 RET=0 211 RET=0 229 RET=0 246 RET=0 [all …]
|
H A D | qos_headroom.sh | 111 RET=0 122 RET=0 147 RET=0 175 RET=0 194 RET=0 211 RET=0 222 RET=0 243 RET=0 271 RET=0 315 RET=0
|
H A D | devlink_trap_l3_drops.sh | 170 RET=0 199 RET=0 234 RET=0 268 RET=0 303 RET=0 334 RET=0 386 RET=0 432 RET=0 471 RET=0 496 RET=0 [all …]
|
H A D | rtnetlink.sh | 65 RET=0 84 RET=0 124 RET=0 149 RET=0 176 RET=0 203 RET=0 217 RET=0 243 RET=0 286 RET=0 334 RET=0 [all …]
|
H A D | devlink_trap_l2_drops.sh | 108 RET=0 155 RET=0 164 RET=0 186 RET=0 264 RET=0 275 RET=0 299 RET=0 344 RET=0 390 RET=0 432 RET=0 [all …]
|
/openbmc/linux/arch/x86/kernel/ |
H A D | ftrace_64.S | 136 RET 142 RET 150 RET 195 RET 283 RET 305 ALTERNATIVE __stringify(RET), \ 314 RET 324 RET 376 ALTERNATIVE __stringify(RET), \
|
H A D | ftrace_32.S | 22 RET 87 RET 109 subl $3*4, %esp # RET-IP + 3 gaps 115 pushl 7*4(%esp) # ip <- RET-IP 168 RET 185 RET
|
/openbmc/linux/arch/x86/lib/ |
H A D | cmpxchg8b_emu.S | 38 RET 47 RET 72 RET 81 RET
|
H A D | clear_page_64.S | 21 RET 43 RET 51 RET 81 RET 112 RET
|
H A D | memcpy_64.S | 39 RET 127 RET 139 RET 152 RET 170 RET
|
H A D | copy_user_64.S | 50 RET 72 1: RET 84 RET
|
/openbmc/linux/tools/testing/selftests/drivers/net/bonding/ |
H A D | dev_addr_lists.sh | 45 RET=0 51 RET=0 92 RET=0 99 RET=0
|
H A D | bond_options.sh | 61 RET=0 207 RET=0 213 [ $RET -ne 0 ] && log_test "arp_validate" "$retmsg" 220 RET=1 262 RET=0 268 [ $RET -ne 0 ] && log_test "num_grat_arp" "$retmsg" 290 RET=1
|
/openbmc/linux/tools/testing/selftests/drivers/net/netdevsim/ |
H A D | fib_notifications.sh | 107 RET=0 159 RET=0 204 RET=0 237 RET=0 274 RET=0 302 RET=0 321 RET=0 353 RET=0
|
/openbmc/linux/tools/testing/selftests/drivers/net/mlxsw/spectrum/ |
H A D | vxlan_flooding_ipv6.sh | 220 RET=0 236 RET=0 250 RET=0 264 RET=0 279 RET=0 288 RET=0 297 RET=0 306 RET=0 315 RET=0
|
/openbmc/linux/Documentation/admin-guide/hw-vuln/ |
H A D | srso.rst | 13 AMD CPUs predict RET instructions using a Return Address Predictor (aka 17 to predict the target of a subsequent RET instruction. 22 control the speculative target of a subsequent kernel RET, potentially 58 * 'Vulnerable: Safe RET, no microcode': 60 The "Safe RET" mitigation (see below) has been applied to protect the 64 * 'Vulnerable: Microcode, no safe RET': 85 * 'Mitigation: Safe RET': 95 Similar protection as "safe RET" above but employs an IBPB barrier on 123 default one is 'Mitigation: safe RET' which should take care of most 142 Mitigation: Safe RET [all …]
|
/openbmc/linux/arch/x86/math-emu/ |
H A D | shr_Xsig.S | 48 RET 64 RET 79 RET 88 RET
|
/openbmc/linux/arch/x86/xen/ |
H A D | xen-asm.S | 32 RET 61 RET 87 RET 103 RET 111 RET 118 RET
|
/openbmc/linux/tools/arch/x86/lib/ |
H A D | memcpy_64.S | 38 RET 126 RET 138 RET 151 RET 169 RET
|
/openbmc/linux/tools/testing/selftests/drivers/net/mlxsw/spectrum-2/ |
H A D | resource_scale.sh | 47 RET=0 63 if ((!RET)); then 75 RET_FIN=$(( RET_FIN || RET ))
|
H A D | vxlan_flooding_ipv6.sh | 237 RET=0 253 RET=0 266 RET=0 279 RET=0 293 RET=0 302 RET=0 311 RET=0 320 RET=0
|
/openbmc/linux/include/linux/ |
H A D | lsm_hooks.h | 34 #define LSM_HOOK(RET, DEFAULT, NAME, ...) RET (*NAME)(__VA_ARGS__); argument 40 #define LSM_HOOK(RET, DEFAULT, NAME, ...) struct hlist_head NAME; argument
|