Home
last modified time | relevance | path

Searched full:intercept (Results 1 – 25 of 185) sorted by relevance

12345678

/openbmc/openbmc/poky/scripts/postinst-intercepts/
H A Dpostinst_intercept6 # actually adds, at the end, the list of packages for which the intercept script
7 # is valid. Also, if one wants to pass any variables to the intercept script from
11 # * intercept_script_name - the name of the intercept script we want to change;
12 # * package_name - add the package_name to list of packages the intercept script
15 # * var1=... - var1 will have the value we provide in the intercept script. This
17 # the intercept script;
H A Dupdate_desktop_database5 # Post-install intercept for mime-xdg.bbclass
H A Dupdate_mime_database5 # Post-install intercept for mime.bbclass
H A Dupdate_gtk_icon_cache5 # Post-install intercept for gtk-icon-cache.bbclass
/openbmc/linux/tools/testing/selftests/timers/
H A Dfreq-step.c111 static void regress(struct sample *samples, int n, double *intercept, in regress() argument
130 *intercept = (y_sum - *slope * x_sum) / n; in regress()
137 r = fabs(x * *slope + *intercept - y); in regress()
149 double intercept, slope, stddev1, max1, stddev2, max2; in run_test() local
173 regress(samples, SAMPLES, &intercept, &slope, &stddev1, &max1); in run_test()
180 regress(samples, SAMPLES / 2, &intercept, &slope, &stddev1, &max1); in run_test()
184 regress(samples + SAMPLES / 2, SAMPLES / 2, &intercept, &slope, in run_test()
/openbmc/openbmc/poky/meta/lib/oe/package_manager/
H A D__init__.py177 bb.note("Initializing intercept dir for %s" % self.target_rootfs)
194 for intercept in postinst_intercepts:
195 shutil.copy(intercept, os.path.join(self.intercepts_dir, os.path.basename(intercept)))
202 with open(postinst_intercept_hook) as intercept:
204 for line in intercept.read().split("\n"):
222 bb.note("Running intercept scripts:")
237 …bb.note("The postinstall intercept hook '%s' could not be executed due to missing wine support, de…
241 bb.note("> Executing %s intercept ..." % script)
249 …bb.fatal("The postinstall intercept hook '%s' failed, details in %s/log.do_%s" % (script, self.d.g…
252 …bb.note("The postinstall intercept hook '%s' could not be executed due to missing qemu usermode su…
[all …]
/openbmc/openbmc/poky/meta/recipes-devtools/valgrind/valgrind/
H A Dvalgrind-make-ld-XXX.so-strlen-intercept-optional.patch4 Subject: [PATCH] make ld-XXX.so strlen intercept optional
9 intercept it, don't make it mandatory to do so.
29 + Therefore although we should still try to intercept it, don't make it
/openbmc/openbmc/poky/meta/recipes-extended/sudo/files/
H A D0001-sudo.conf.in-fix-conflict-with-multilib.patch39 -#Path intercept @intercept_file@
40 +#Path intercept $intercept_file
/openbmc/linux/arch/x86/kvm/svm/
H A Dsvm.c85 bool always; /* True if intercept is initially cleared */
134 * intercept the MSR 0x832, and do not setup direct_access_msr.
154 * intercept is enabled. Refer to AMD APM Vol 2 Section 15.14.4 Pause
155 * Intercept Filtering for more details.
171 * value is less than zero and PAUSE intercept is enabled, a #VMEXIT is
315 /* #GP intercept is still needed for vmware backdoor */ in svm_set_efer()
336 * Never intercept #GP for SEV guests, KVM can't in svm_set_efer()
796 /* Set the shadow bitmaps to the desired intercept states */ in set_shadow_msr_intercept()
822 * If the L01 MSR bitmap does not intercept the MSR, then we need to in msr_write_intercepted()
826 * If the L02 MSR bitmap does not intercept the MSR, then we need to in msr_write_intercepted()
[all …]
/openbmc/linux/tools/testing/selftests/kvm/x86_64/
H A Dhyperv_svm_test.c102 /* Intercept RDMSR 0xc0000100 */ in guest_code()
103 vmcb->control.intercept |= 1ULL << INTERCEPT_MSR_PROT; in guest_code()
115 /* Intercept RDMSR 0xc0000101 without telling KVM about it */ in guest_code()
H A Dtriple_fault_event_test.c50 /* don't intercept shutdown to test the case of SVM allowing to do so */ in l1_guest_code_svm()
51 vmcb->control.intercept &= ~(BIT(INTERCEPT_SHUTDOWN)); in l1_guest_code_svm()
H A Dnested_exceptions_test.c99 ctrl->intercept |= BIT_ULL(INTERCEPT_SHUTDOWN); in l1_svm_code()
213 * honors L1 exception intercept controls when a #SS is pending/injected,
265 * L1 should intercept before KVM morphs it to #DF. L1 should then in main()
/openbmc/linux/Documentation/livepatch/
H A Dreliable-stacktrace.rst163 to intercept when that function returns with a return trampoline, e.g.
166 tracing can intercept returns.
169 kretprobes can intercept returns.
228 Some trampolines do not rewrite the return address in order to intercept
/openbmc/linux/arch/s390/kvm/
H A Dintercept.c97 KVM_EVENT(3, "validity intercept 0x%x for pid %u (kvm 0x%pK)", viwhy, in handle_validity()
101 WARN_ONCE(viwhy != 0x44, "kvm: unhandled validity intercept 0x%x\n", in handle_validity()
254 * Intercept 8 indicates a loop of specification exceptions in handle_prog()
521 * be delivered after a notification intercept (instruction has in handle_pv_sclp()
543 WARN_ONCE(1, "Unexpected notification intercept for UVC 0x%x\n", in handle_pv_uvc()
575 * 108 (pv notify) intercept. In contrast to external call, in handle_pv_notification()
H A DMakefile10 kvm-y += kvm-s390.o intercept.o interrupt.o priv.o sigp.o
/openbmc/openbmc/poky/scripts/native-intercept/
H A Dchgrp5 echo "Intercept $0: $@ -- do nothing"
H A Dchown5 echo "Intercept $0: $@ -- do nothing"
/openbmc/openbmc/meta-openembedded/meta-webserver/recipes-httpd/nginx/files/
H A Dnginx-cross.patch25 # /bin/sh is used to intercept "Killed" or "Abort trap" messages
36 # /bin/sh is used to intercept "Killed" or "Abort trap" messages
68 # /bin/sh is used to intercept "Killed" or "Abort trap" messages
/openbmc/qemu/target/i386/tcg/
H A Dexcp_helper.c154 * intercept". Instead there is a separate fault-like ICEBP intercept. in helper_icebp()
/openbmc/openbmc/poky/documentation/migration-guides/
H A Drelease-notes-4.0.23.rst58 - nativesdk-intercept: Fix bad intercept chgrp/chown logic
73 - pseudo: Update to pull in gcc14 fix and missing statvfs64 intercept
/openbmc/openbmc/poky/meta/lib/oeqa/selftest/cases/
H A Dintercept.py18 We have an intercept which disables pseudo, so verify that it works.
/openbmc/qemu/target/i386/tcg/sysemu/
H A Dsvm_helper.c175 /* Exceptions are checked before the intercept. */ in helper_vmrun()
238 env->intercept = x86_ldq_phys(cs, env->vm_vmcb + offsetof(struct vmcb, in helper_vmrun()
239 control.intercept)); in helper_vmrun()
488 /* Exceptions are checked before the intercept. */ in helper_vmload()
549 /* Exceptions are checked before the intercept. */ in helper_vmsave()
642 if (env->intercept & (1ULL << (type - SVM_EXIT_INTR))) { in cpu_svm_has_intercept()
710 if (env->intercept & (1ULL << (SVM_EXIT_IOIO - SVM_EXIT_INTR))) { in helper_svm_check_io()
823 env->intercept = 0; in do_vmexit()
/openbmc/linux/arch/x86/mm/
H A Dpf_in.h16 OTHERS /* Other instructions can not intercept */
/openbmc/qemu/target/s390x/kvm/
H A Dtrace-events13 kvm_intercept(uint32_t icpt_code, uint64_t psw_addr) "intercept: 0x%x (at 0x%"PRIx64"lx)"
/openbmc/linux/arch/x86/kvm/
H A Dkvm_emulate.h37 u8 intercept; /* which intercept */ member
210 int (*intercept)(struct x86_emulate_ctxt *ctxt, member
328 u8 intercept; member

12345678