/openbmc/linux/drivers/net/ethernet/intel/ice/ |
H A D | ice_virtchnl_allowlist.c | 6 /* Purpose of this file is to share functionality to allowlist or denylist 124 * ice_vc_allowlist_opcodes - allowlist selected opcodes 126 * @opcodes: array of opocodes to allowlist 129 * Function should be called to allowlist opcodes on VF. 141 * ice_vc_clear_allowlist - clear all allowlist opcodes 150 * ice_vc_set_default_allowlist - allowlist default opcodes for VF 161 * ice_vc_set_working_allowlist - allowlist opcodes needed to by VF to work 164 * allowlist opcodes that aren't associated with specific caps, but 174 * ice_vc_set_caps_allowlist - allowlist VF opcodes according caps
|
/openbmc/intel-ipmi-oem/ |
H A D | meson.build | 83 generate_allowlist_script = files('generate-allowlist.py') 85 'ipmi-allowlist.hpp', 86 input: [generate_allowlist_script, 'ipmi-allowlist.conf' ], 87 output: 'ipmi-allowlist.hpp', 106 'src/allowlist-filter.cpp',
|
H A D | generate-allowlist.py | 8 sys.stderr.write("Usage: $0 allowlist-config-in allowlist-header-out\n") 9 sys.stderr.write(" Reads in allowlist config, sorting the contents\n") 109 "constexpr const std::array<netfncmd_tuple, {}> allowlist = ".format(
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Control/Security/ |
H A D | RestrictionMode.interface.yaml | 18 - name: Allowlist 20 Allow, only if in the allowlist. 30 Commands in the allowlist will only be executed through system
|
/openbmc/phosphor-host-ipmid/ |
H A D | whitelist-filter.cpp | 59 lg2::info("Loading allowlist filter"); in AllowlistFilter() 116 (restrictionMode == RestrictionMode::Modes::Allowlist); in cacheRestrictedMode() 159 (restrictionMode == RestrictionMode::Modes::Allowlist); in handleRestrictedModeChange() 234 allowlist.cbegin(), allowlist.cend(), in filterMessage()
|
H A D | ipmiallowlist.hpp | 8 extern const std::vector<netfncmd_pair> allowlist;
|
H A D | generate_whitelist.sh | 12 const std::vector<netfncmd_pair> allowlist = {
|
H A D | apphandler.cpp | 1640 std::vector<i2cControllerWRAllowlist>& allowlist = getWRAllowlist(); in populateI2CControllerWRAllowlist() 1647 "Corrupted I2C controller write read allowlist config file, " in populateI2CControllerWRAllowlist() 1658 lg2::error("I2C controller write read allowlist filter " in populateI2CControllerWRAllowlist() 1662 allowlist.push_back( in populateI2CControllerWRAllowlist() 1673 if (allowlist.size() != filters.size()) in populateI2CControllerWRAllowlist() 1676 "I2C controller write read allowlist filter size mismatch"); in populateI2CControllerWRAllowlist() 1682 lg2::error("I2C controller write read allowlist " in populateI2CControllerWRAllowlist() 1707 std::vector<i2cControllerWRAllowlist>& allowList = getWRAllowlist(); in isCmdAllowlisted() 1708 for (const auto& wlEntry : allowList) in isCmdAllowlisted() 1732 lg2::info("I2C_WHITELIST_CHECK is disabled, do not populate allowlist"); 1637 std::vector<i2cControllerWRAllowlist>& allowlist = getWRAllowlist(); populateI2CControllerWRAllowlist() local 1704 std::vector<i2cControllerWRAllowlist>& allowList = getWRAllowlist(); isCmdAllowlisted() local [all...] |
/openbmc/intel-ipmi-oem/src/ |
H A D | allowlist-filter.cpp | 1 #include <ipmi-allowlist.hpp> 107 log<level::INFO>("Loading Allowlist filter"); in AllowlistFilter() 392 allowlist.cbegin(), allowlist.cend(), in filterMessage() 420 // ( Allowlist ? ccSuccess : ccInsufficientPrivilege ) in filterMessage() 440 // Restricted - follow Allowlist in filterMessage() 449 default: // for Allowlist and Blocklist in filterMessage()
|
/openbmc/openbmc/meta-phosphor/recipes-phosphor/ipmi/ |
H A D | phosphor-ipmi-host_git.bb | 28 allowlist \ 31 i2c-allowlist \ 36 PACKAGECONFIG[allowlist] = "-Dipmi-whitelist=enabled,-Dipmi-whitelist=disabled" 42 PACKAGECONFIG[i2c-allowlist] = "-Di2c-whitelist-check=enabled,-Di2c-whitelist-check=disabled"
|
/openbmc/openbmc/poky/meta/recipes-support/gnutls/gnutls/ |
H A D | run-ptest | 45 test_disallowlist="${test_disallowlist} protocol-set-allowlist" 49 test_disallowlist="${test_disallowlist} system-override-curves-allowlist"
|
/openbmc/openbmc/meta-facebook/recipes-phosphor/settings/phosphor-settings-manager/ |
H A D | restrictionmode-ocpdebugcard-settings.override.yml | 5 Default: RestrictionMode::Modes::Allowlist
|
/openbmc/openbmc/meta-quanta/meta-gbs/recipes-phosphor/settings/ |
H A D | phosphor-settings-manager_%.bbappend | 2 SRC_URI:append:gbs = " file://restrictionmode-default-allowlist.override.yml"
|
/openbmc/openbmc/meta-facebook/recipes-phosphor/settings/phosphor-settings-defaults-native/fb-compute/ |
H A D | restrictionmode-host-settings.override.yml | 5 Default: RestrictionMode::Modes::Allowlist
|
/openbmc/openbmc/meta-quanta/meta-gbs/recipes-phosphor/settings/phosphor-settings-manager/ |
H A D | restrictionmode-default-allowlist.override.yml | 6 Default: RestrictionMode::Modes::Allowlist
|
/openbmc/linux/security/safesetid/ |
H A D | lsm.c | 207 * that could arise from a missing allowlist entry preventing a in safesetid_task_fix_setuid() 231 * that could arise from a missing allowlist entry preventing a in safesetid_task_fix_setgid() 252 * that could arise from a missing allowlist entry preventing a in safesetid_task_fix_setgroups()
|
/openbmc/openbmc/meta-amd/meta-daytonax/recipes-phosphor/ipmi/ |
H A D | phosphor-ipmi-host_%.bbappend | 5 PACKAGECONFIG:remove = " i2c-allowlist"
|
/openbmc/dbus-sensors/src/ |
H A D | SensorPaths.cpp | 9 // This is an allowlist of the units a sensor can measure. Should be in sync
|
H A D | SensorPaths.hpp | 9 // This is an allowlist of the units a sensor can measure. Should be in sync
|
/openbmc/linux/drivers/cpufreq/ |
H A D | cpufreq-dt-platdev.c | 18 static const struct of_device_id allowlist[] __initconst = { variable 209 match = of_match_node(allowlist, np); in cpufreq_dt_platdev_init()
|
/openbmc/linux/net/bluetooth/ |
H A D | hci_request.c | 308 * If so, we should alternate between allowlist scan and one without in __hci_update_interleaved_scan() 525 /* Use the allowlist unless the following conditions are all true: in update_accept_list() 528 * - Interleaved scanning is not currently using the allowlist in update_accept_list() 827 bt_dev_dbg(hdev, "next state: allowlist"); in hci_req_add_le_interleaved_scan()
|
/openbmc/linux/include/linux/ |
H A D | dma-map-ops.h | 470 * allowlist. DMA Mapping routines should return an error when 486 * allowlist. In this case, a normal mapping either with CPU physical
|
/openbmc/linux/Documentation/admin-guide/LSM/ |
H A D | SafeSetID.rst | 6 system-wide allowlist. These restrictions also prohibit the given UIDs/GIDs
|
/openbmc/google-misc/subprojects/libcr51sign/include/libcr51sign/ |
H A D | libcr51sign.h | 164 // @func verify check that if the prod to dev downgrade/ hardware allowlist
|
/openbmc/linux/rust/ |
H A D | Makefile | 354 --blocklist-type '.*' --allowlist-var '' \ 355 --allowlist-function 'rust_helper_.*'
|