/openbmc/linux/Documentation/devicetree/bindings/soc/ti/ |
H A D | wkup-m3-ipc.yaml | 35 Support for IO Isolation 38 isolation is activated. Those pins have pad control registers prefixed by 41 IO isolation is active. 84 ti,set-io-isolation: 88 the CM3 firmware to activate IO isolation when suspending to deep sleep. 101 ti,set-io-isolation: false 141 * will be disabled to save power when IO isolation is active. Note that 170 ti,set-io-isolation;
|
/openbmc/qemu/docs/system/ |
H A D | security.rst | 50 QEMU to provide guest isolation or any security guarantees. 58 Guest Isolation 61 Guest isolation is the confinement of guest code to the virtual machine. When 63 virtual machine. Isolation also includes resource limits such as throttling of 90 Following the principle of least privilege immediately fulfills guest isolation 103 Isolation mechanisms 106 Several isolation mechanisms are available to realize this architecture of 107 guest isolation and the principle of least privilege. With the exception of 112 The fundamental isolation mechanism is that QEMU processes must run as
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/HardwareIsolation/ |
H A D | Create.interface.yaml | 21 The severity of hardware isolation. 42 caused the isolation. 51 The severity of hardware isolation. 55 The BMC error log caused the isolation of hardware.
|
H A D | Entry.interface.yaml | 23 The severity of hardware isolation. 37 Possible severity for hardware isolation.
|
/openbmc/linux/arch/arm/mach-meson/ |
H A D | platsmp.c | 186 /* Isolation disable */ in meson8_smp_boot_secondary() 190 pr_err("Error when disabling isolation of CPU%d\n", cpu); in meson8_smp_boot_secondary() 269 /* Isolation disable */ in meson8b_smp_boot_secondary() 273 pr_err("Error when disabling isolation of CPU%d\n", cpu); in meson8b_smp_boot_secondary() 333 /* Isolation enable */ in meson8_smp_cpu_kill() 337 pr_err("Error when enabling isolation for CPU%d\n", cpu); in meson8_smp_cpu_kill() 383 /* Isolation enable */ in meson8b_smp_cpu_kill() 387 pr_err("Error when enabling isolation for CPU%d\n", cpu); in meson8b_smp_cpu_kill()
|
/openbmc/linux/drivers/s390/net/ |
H A D | qeth_core_sys.c | 411 switch (card->options.isolation) { in qeth_dev_isolation_show() 427 enum qeth_ipa_isolation_modes isolation; in qeth_dev_isolation_store() local 434 "support QDIO data connection isolation\n"); in qeth_dev_isolation_store() 438 /* parse input into isolation mode */ in qeth_dev_isolation_store() 440 isolation = ISOLATION_MODE_NONE; in qeth_dev_isolation_store() 442 isolation = ISOLATION_MODE_FWD; in qeth_dev_isolation_store() 444 isolation = ISOLATION_MODE_DROP; in qeth_dev_isolation_store() 451 rc = qeth_setadpparms_set_access_ctrl(card, isolation); in qeth_dev_isolation_store() 454 WRITE_ONCE(card->options.isolation, isolation); in qeth_dev_isolation_store() 462 static DEVICE_ATTR(isolation, 0644, qeth_dev_isolation_show,
|
/openbmc/docs/designs/ |
H A D | guard-on-bmc.md | 7 document discusses the design of the BMC support for such isolation procedures. 11 notifying users about the components in isolation, clearing isolation, isolating 13 process of isolation is mentioned as guard in this document, which means 219 created, an isolation procedure is needed to isolate the units from service. 245 and that should be automated, further tests on the isolation of each type of the
|
/openbmc/linux/tools/testing/selftests/net/forwarding/ |
H A D | bridge_port_isolation.sh | 48 check_err $? "Can't set isolation on port $swp1" 50 check_err $? "Can't set isolation on port $swp2" 52 check_err $? "Can't disable isolation on port $swp3"
|
/openbmc/linux/mm/ |
H A D | page_isolation.c | 7 #include <linux/page-isolation.h> 23 * PageLRU check without isolation or lru_lock could race so that 224 * approach in order to merge them. Isolation and free will make in unset_migratetype_isolate() 286 * @flags: isolation flags 289 * @skip_isolation: the flag to skip the pageblock isolation in second 402 * can be migrated. Otherwise, fail the isolation. in isolate_single_pageblock() 519 * A call to drain_all_pages() after isolation can flush most of them. However 523 * might be used to flush and disable pcplist before isolation and enable after 533 /* isolation is done at page block granularity */ in start_isolate_page_range()
|
/openbmc/openbmc-test-automation/lib/ras/ |
H A D | host_utils.robot | 42 # fir_address FIR (Fault isolation register) value (e.g. 2011400). 90 # fir_address FIR (Fault isolation register) value (e.g. 2011400). 112 # fir_address FIR (Fault isolation register) value (e.g. 2011400). 187 # fir_address FIR (Fault isolation register) value (e.g. '2011400'). 218 # fir_address FIR (Fault isolation register) value (e.g. '2011400').
|
/openbmc/openpower-proc-control/procedures/phal/ |
H A D | start_host.cpp | 174 * procedure callout for the hardware isolation policy 207 // and even we should allow the hardware isolation by default. in createPELForHwIsolationSettingsErr() 210 "for the hardware isolation policy settings failures.", in createPELForHwIsolationSettingsErr() 217 * @brief Helper function to decide the hardware isolation (aka guard) 220 * true on failure since hardware isolation feature should be
|
/openbmc/u-boot/arch/arm/mach-keystone/ |
H A D | psc.c | 104 * isolation functionality in psc_set_state() 188 * psc_set_reset_iso() - Set the reset isolation bit in mdctl 191 * The reset isolation enable bit is set. The state of the module is not 194 * Return: 0 if the module config showed that reset isolation is supported. 203 /* Set the reset isolation bit */ in psc_set_reset_iso()
|
/openbmc/linux/arch/x86/hyperv/ |
H A D | ivm.c | 3 * Hyper-V Isolation VM interface with paravisor and hypervisor 459 * In Isolation VM, all guest memory is encrypted from host and guest 471 /* no-op if partition isolation is not enabled */ in hv_mark_gpa_visibility() 508 * In Isolation VM, all guest memory is encrypted from host and guest 602 panic("hv_vtom_init: unsupported isolation type %d\n", type); in hv_vtom_init() 629 * isolation VM. 646 * isolation VM.
|
/openbmc/linux/include/uapi/linux/ |
H A D | batman_adv.h | 41 * interface. This information is used by the "AP Isolation" feature 47 * information is used by the Extended Isolation feature 363 * @BATADV_ATTR_ISOLATION_MARK: the isolation mark which is used to 364 * classify clients as "isolated" by the Extended Isolation feature. 369 * @BATADV_ATTR_ISOLATION_MASK: the isolation (bit)mask which is used to 370 * classify clients as "isolated" by the Extended Isolation feature.
|
/openbmc/openbmc-test-automation/openpower/ras/ |
H A D | ras_utils.robot | 59 # fir_address FIR (Fault isolation register) value (e.g. 2011400). 88 # fir_address FIR (Fault isolation register) value (e.g. 2011400). 128 # fir_address FIR (Fault isolation register) value (e.g. '2011400'). 217 # fir_address FIR (Fault isolation register) value (e.g. 2011400).
|
/openbmc/linux/include/linux/ |
H A D | balloon_compaction.h | 12 * the address space operations for page isolation/migration/compaction. 14 * As the page isolation scanning step a compaction thread does is a lockless 27 * ii. isolation or dequeueing procedure must remove the page from balloon
|
/openbmc/linux/arch/mips/alchemy/common/ |
H A D | vss.c | 49 __raw_writel(0x1f, base + VSS_FTR); /* enable isolation cells */ in __enable_block() 58 __raw_writel(0x0f, base + VSS_FTR); /* disable isolation cells */ in __disable_block()
|
/openbmc/linux/kernel/sched/ |
H A D | build_utility.c | 15 #include <linux/sched/isolation.h> 105 # include "isolation.c"
|
/openbmc/linux/drivers/pmdomain/mediatek/ |
H A D | mtk-pm-domains.h | 85 * @ext_buck_iso_offs: The offset for external buck isolation 86 * @ext_buck_iso_mask: The mask for external buck isolation
|
/openbmc/linux/drivers/phy/samsung/ |
H A D | phy-exynos-dp-video.c | 33 /* Disable power isolation on DP-PHY */ in exynos_dp_video_phy_power_on() 42 /* Enable power isolation on DP-PHY */ in exynos_dp_video_phy_power_off()
|
/openbmc/openpower-hw-diags/analyzer/ |
H A D | service_data.hpp | 25 * @param i_isoData The data found during isolation. 50 /** The data found during isolation. */ 73 /** @return The data found during isolation. */
|
/openbmc/u-boot/arch/arm/include/asm/arch-fsl-layerscape/ |
H A D | stream_id_lsch3.h | 42 * -the MC is responsible for allocating and setting up 'isolation context 55 * ICID[6:0] 6-0 // isolation context id
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/ |
H A D | 0016-Platform-corstone1000-Fix-isolation-L2-memory-protection.patch | 4 Subject: [PATCH] Platform: corstone1000: Fix isolation L2 memory protection 7 the memory protection required for isolation level 2 was not present.
|
/openbmc/qemu/docs/interop/ |
H A D | dbus.rst | 68 - Moderately improved user based security isolation 72 - Best user based security isolation
|
/openbmc/linux/arch/arm/boot/dts/marvell/ |
H A D | armada-385-clearfog-gtr.dtsi | 50 47 - Control isolation of boot sensitive SAR signals 172 cf_gtr_isolation_pins: cf-gtr-isolation-pins { 437 sar-isolation { 441 line-name = "sar-isolation";
|