/openbmc/openbmc/poky/scripts/postinst-intercepts/ |
H A D | postinst_intercept | 6 # actually adds, at the end, the list of packages for which the intercept script 7 # is valid. Also, if one wants to pass any variables to the intercept script from 11 # * intercept_script_name - the name of the intercept script we want to change; 12 # * package_name - add the package_name to list of packages the intercept script 15 # * var1=... - var1 will have the value we provide in the intercept script. This 17 # the intercept script;
|
H A D | update_desktop_database | 5 # Post-install intercept for mime-xdg.bbclass
|
H A D | update_mime_database | 5 # Post-install intercept for mime.bbclass
|
H A D | update_gtk_icon_cache | 5 # Post-install intercept for gtk-icon-cache.bbclass
|
/openbmc/linux/tools/testing/selftests/timers/ |
H A D | freq-step.c | 111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument 130 *intercept = (y_sum - *slope * x_sum) / n; in regress() 137 r = fabs(x * *slope + *intercept - y); in regress() 149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local 173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test() 180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test() 184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
|
/openbmc/openbmc/poky/meta/lib/oe/package_manager/ |
H A D | __init__.py | 177 bb.note("Initializing intercept dir for %s" % self.target_rootfs) 194 for intercept in postinst_intercepts: 195 shutil.copy(intercept, os.path.join(self.intercepts_dir, os.path.basename(intercept))) 202 with open(postinst_intercept_hook) as intercept: 204 for line in intercept.read().split("\n"): 222 bb.note("Running intercept scripts:") 237 …bb.note("The postinstall intercept hook '%s' could not be executed due to missing wine support, de… 241 bb.note("> Executing %s intercept ..." % script) 249 …bb.fatal("The postinstall intercept hook '%s' failed, details in %s/log.do_%s" % (script, self.d.g… 252 …bb.note("The postinstall intercept hook '%s' could not be executed due to missing qemu usermode su… [all …]
|
/openbmc/openbmc/poky/meta/recipes-devtools/valgrind/valgrind/ |
H A D | valgrind-make-ld-XXX.so-strlen-intercept-optional.patch | 4 Subject: [PATCH] make ld-XXX.so strlen intercept optional 9 intercept it, don't make it mandatory to do so. 29 + Therefore although we should still try to intercept it, don't make it
|
/openbmc/openbmc/poky/meta/recipes-extended/sudo/files/ |
H A D | 0001-sudo.conf.in-fix-conflict-with-multilib.patch | 39 -#Path intercept @intercept_file@ 40 +#Path intercept $intercept_file
|
/openbmc/linux/arch/x86/kvm/svm/ |
H A D | svm.c | 85 bool always; /* True if intercept is initially cleared */ 134 * intercept the MSR 0x832, and do not setup direct_access_msr. 154 * intercept is enabled. Refer to AMD APM Vol 2 Section 15.14.4 Pause 155 * Intercept Filtering for more details. 171 * value is less than zero and PAUSE intercept is enabled, a #VMEXIT is 315 /* #GP intercept is still needed for vmware backdoor */ in svm_set_efer() 336 * Never intercept #GP for SEV guests, KVM can't in svm_set_efer() 796 /* Set the shadow bitmaps to the desired intercept states */ in set_shadow_msr_intercept() 822 * If the L01 MSR bitmap does not intercept the MSR, then we need to in msr_write_intercepted() 826 * If the L02 MSR bitmap does not intercept the MSR, then we need to in msr_write_intercepted() [all …]
|
/openbmc/linux/tools/testing/selftests/kvm/x86_64/ |
H A D | hyperv_svm_test.c | 102 /* Intercept RDMSR 0xc0000100 */ in guest_code() 103 vmcb->control.intercept |= 1ULL << INTERCEPT_MSR_PROT; in guest_code() 115 /* Intercept RDMSR 0xc0000101 without telling KVM about it */ in guest_code()
|
H A D | triple_fault_event_test.c | 50 /* don't intercept shutdown to test the case of SVM allowing to do so */ in l1_guest_code_svm() 51 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code_svm()
|
H A D | nested_exceptions_test.c | 99 ctrl->intercept |= BIT_ULL(INTERCEPT_SHUTDOWN); in l1_svm_code() 213 * honors L1 exception intercept controls when a #SS is pending/injected, 265 * L1 should intercept before KVM morphs it to #DF. L1 should then in main()
|
/openbmc/linux/Documentation/livepatch/ |
H A D | reliable-stacktrace.rst | 163 to intercept when that function returns with a return trampoline, e.g. 166 tracing can intercept returns. 169 kretprobes can intercept returns. 228 Some trampolines do not rewrite the return address in order to intercept
|
/openbmc/linux/arch/s390/kvm/ |
H A D | intercept.c | 97 KVM_EVENT(3, "validity intercept 0x%x for pid %u (kvm 0x%pK)", viwhy, in handle_validity() 101 WARN_ONCE(viwhy != 0x44, "kvm: unhandled validity intercept 0x%x\n", in handle_validity() 254 * Intercept 8 indicates a loop of specification exceptions in handle_prog() 521 * be delivered after a notification intercept (instruction has in handle_pv_sclp() 543 WARN_ONCE(1, "Unexpected notification intercept for UVC 0x%x\n", in handle_pv_uvc() 575 * 108 (pv notify) intercept. In contrast to external call, in handle_pv_notification()
|
H A D | Makefile | 10 kvm-y += kvm-s390.o intercept.o interrupt.o priv.o sigp.o
|
/openbmc/openbmc/poky/scripts/native-intercept/ |
H A D | chgrp | 5 echo "Intercept $0: $@ -- do nothing"
|
H A D | chown | 5 echo "Intercept $0: $@ -- do nothing"
|
/openbmc/openbmc/meta-openembedded/meta-webserver/recipes-httpd/nginx/files/ |
H A D | nginx-cross.patch | 25 # /bin/sh is used to intercept "Killed" or "Abort trap" messages 36 # /bin/sh is used to intercept "Killed" or "Abort trap" messages 68 # /bin/sh is used to intercept "Killed" or "Abort trap" messages
|
/openbmc/qemu/target/i386/tcg/ |
H A D | excp_helper.c | 154 * intercept". Instead there is a separate fault-like ICEBP intercept. in helper_icebp()
|
/openbmc/openbmc/poky/documentation/migration-guides/ |
H A D | release-notes-4.0.23.rst | 58 - nativesdk-intercept: Fix bad intercept chgrp/chown logic 73 - pseudo: Update to pull in gcc14 fix and missing statvfs64 intercept
|
/openbmc/openbmc/poky/meta/lib/oeqa/selftest/cases/ |
H A D | intercept.py | 18 We have an intercept which disables pseudo, so verify that it works.
|
/openbmc/qemu/target/i386/tcg/sysemu/ |
H A D | svm_helper.c | 175 /* Exceptions are checked before the intercept. */ in helper_vmrun() 238 env->intercept = x86_ldq_phys(cs, env->vm_vmcb + offsetof(struct vmcb, in helper_vmrun() 239 control.intercept)); in helper_vmrun() 488 /* Exceptions are checked before the intercept. */ in helper_vmload() 549 /* Exceptions are checked before the intercept. */ in helper_vmsave() 642 if (env->intercept & (1ULL << (type - SVM_EXIT_INTR))) { in cpu_svm_has_intercept() 710 if (env->intercept & (1ULL << (SVM_EXIT_IOIO - SVM_EXIT_INTR))) { in helper_svm_check_io() 823 env->intercept = 0; in do_vmexit()
|
/openbmc/linux/arch/x86/mm/ |
H A D | pf_in.h | 16 OTHERS /* Other instructions can not intercept */
|
/openbmc/qemu/target/s390x/kvm/ |
H A D | trace-events | 13 kvm_intercept(uint32_t icpt_code, uint64_t psw_addr) "intercept: 0x%x (at 0x%"PRIx64"lx)"
|
/openbmc/linux/arch/x86/kvm/ |
H A D | kvm_emulate.h | 37 u8 intercept; /* which intercept */ member 210 int (*intercept)(struct x86_emulate_ctxt *ctxt, member 328 u8 intercept; member
|