/openbmc/qemu/authz/ |
H A D | list.c | 33 QAuthZListRuleList *rules = lauthz->rules; in qauthz_list_is_allowed() local 35 while (rules) { in qauthz_list_is_allowed() 36 QAuthZListRule *rule = rules->value; in qauthz_list_is_allowed() 57 rules = rules->next; in qauthz_list_is_allowed() 92 visit_type_QAuthZListRuleList(v, name, &lauthz->rules, errp); in qauthz_list_prop_get_rules() 102 oldrules = lauthz->rules; in qauthz_list_prop_set_rules() 103 visit_type_QAuthZListRuleList(v, name, &lauthz->rules, errp); in qauthz_list_prop_set_rules() 114 qapi_free_QAuthZListRuleList(lauthz->rules); in qauthz_list_finalize() 129 object_class_property_add(oc, "rules", "QAuthZListRule", in qauthz_list_class_init() 157 QAuthZListRuleList *rules, *tmp; in qauthz_list_append_rule() local [all …]
|
/openbmc/phosphor-power/phosphor-regulators/test/ |
H A D | validate-regulators-config_tests.cpp | 46 "rules": [ 274 configFile["rules"][0]["actions"][0]["comments"][0] = in TEST() 290 configFile["rules"][0]["actions"].push_back(andAction); in TEST() 296 configFile["rules"][0]["actions"][1]["compare_presence"]["fru"] = in TEST() 298 configFile["rules"][0]["actions"][1]["compare_presence"]["value"] = in TEST() 305 configFile["rules"][0]["actions"][1]["compare_vpd"]["fru"] = in TEST() 307 configFile["rules"][0]["actions"][1]["compare_vpd"]["keyword"] = "CCIN"; in TEST() 308 configFile["rules"][0]["actions"][1]["compare_vpd"]["value"] = "2D35"; in TEST() 314 configFile["rules"][0]["actions"][1]["i2c_capture_bytes"]["register"] = in TEST() 316 configFile["rules"][0]["actions"][1]["i2c_capture_bytes"]["count"] = 2; in TEST() [all …]
|
/openbmc/openbmc/poky/meta/recipes-core/udev/ |
H A D | udev-extraconf_1.1.bb | 8 file://automount.rules \ 11 file://autonet.rules \ 13 file://localextra.rules \ 23 install -d ${D}${sysconfdir}/udev/rules.d 25 install -m 0644 ${S}/automount.rules ${D}${sysconfdir}/udev/rules.d/automount.rules 26 install -m 0644 ${S}/autonet.rules ${D}${sysconfdir}/udev/rules.d/autonet.rules 27 install -m 0644 ${S}/localextra.rules ${D}${sysconfdir}/udev/rules.d/localextra.rules 59 # to replace udev-extra-rules from meta-oe 60 RPROVIDES:${PN} = "udev-extra-rules" 61 RREPLACES:${PN} = "udev-extra-rules" [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/multipath-tools/files/ |
H A D | 0001-RH-fixup-udev-rules-for-redhat.patch | 4 Subject: [PATCH] RH: fixup udev rules for redhat 6 The multipath rules need to run after scsi_id is run. This means moving 7 them after 60-persistent-storage.rules for redhat. Redhat also uses a 26 kpartx/kpartx.rules.in | 2 +- 37 udevrulesdir := $(libudevdir)/rules.d 43 diff --git a/kpartx/kpartx.rules.in b/kpartx/kpartx.rules.in 45 --- a/kpartx/kpartx.rules.in 46 +++ b/kpartx/kpartx.rules.in 61 $(Q)$(INSTALL_PROGRAM) -m 644 11-dm-mpath.rules $(DESTDIR)$(udevrulesdir) 62 $(Q)$(INSTALL_PROGRAM) -m 644 99-z-dm-mpath-late.rules $(DESTDIR)$(udevrulesdir) [all …]
|
/openbmc/phosphor-fan-presence/monitor/test/ |
H A D | power_off_rule_test.cpp | 63 auto rules = getPowerOffRules(faultConfig, powerIface, func); in TEST() local 64 ASSERT_EQ(rules.size(), 4); in TEST() 73 rules[0]->check(PowerRuleState::runtime, health); in TEST() 74 EXPECT_FALSE(rules[0]->active()); in TEST() 76 rules[0]->check(PowerRuleState::atPgood, health); in TEST() 77 EXPECT_TRUE(rules[0]->active()); in TEST() 85 rules[0]->cancel(); in TEST() 86 EXPECT_FALSE(rules[0]->active()); in TEST() 91 rules[1]->check(PowerRuleState::runtime, health); in TEST() 92 EXPECT_FALSE(rules[1]->active()); in TEST() [all …]
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | DRL-1.1 | 3 …Rules"), to deal in the Rules without restriction, including without limitation the rights to use,… 5 If you share the Rules (including in modified form), you must retain the following if it is supplie… 11 indicate the Rules are licensed under this Detection Rule License, and include the text of, or the … 13 …the Rules (including in modified form) on data, messages based on matches with the Rules must reta… 17 …RULES ARE PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LI…
|
H A D | DRL-1.0 | 2 …Rules"), to deal in the Rules without restriction, including without limitation the rights to use,… 4 If you share the Rules (including in modified form), you must retain the following if it is supplie… 10 indicate the Rules are licensed under this Detection Rule License, and include the text of, or the … 12 …RULES ARE PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LI…
|
/openbmc/openbmc/meta-raspberrypi/recipes-core/udev/ |
H A D | udev-rules-rpi.bb | 1 DESCRIPTION = "udev rules for Raspberry Pi Boards" 7 file://can.rules \ 8 file://fb.rules \ 17 install -d ${D}${sysconfdir}/udev/rules.d 18 install -m 0644 ${S}/etc.armhf/udev/rules.d/99-com.rules ${D}${sysconfdir}/udev/rules.d/ 19 install -m 0644 ${UNPACKDIR}/can.rules ${D}${sysconfdir}/udev/rules.d/ 20 install -m 0644 ${UNPACKDIR}/fb.rules ${D}${sysconfdir}/udev/rules.d/
|
/openbmc/linux/drivers/gpu/drm/ci/ |
H A D | gitlab-ci.yml | 86 - '/.gitlab-ci/farm-rules.yml' 126 .rules-anchors: 127 rules: 151 .scheduled_pipeline-rules: 152 rules: 158 .no_scheduled_pipelines-rules: 159 rules: 164 .build-rules: 165 rules: 166 - !reference [.no_scheduled_pipelines-rules, rules] [all …]
|
H A D | container.yml | 24 rules: 28 rules: 32 rules: 36 rules: 40 rules: 44 rules: 48 rules: 52 rules: 56 rules: 60 rules: [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/linuxconsole/ |
H A D | linuxconsole_1.7.1.bb | 16 file://51-these-are-not-joysticks-rm.rules \ 17 file://60-joystick.rules \ 53 …KDIR}/51-these-are-not-joysticks-rm.rules ${D}${nonarch_base_libdir}/udev/rules.d/51-these-are-not… 54 …install -Dm 0644 ${UNPACKDIR}/60-joystick.rules ${D}${nonarch_base_libdir}/udev/rules.d/60-joystic… 79 ${nonarch_base_libdir}/udev/rules.d/51-these-are-not-joysticks-rm.rules \ 81 ${nonarch_base_libdir}/udev/rules.d/60-joystick.rules \ 82 ${nonarch_base_libdir}/udev/rules.d/80-stelladaptor-joystick.rules \
|
/openbmc/openbmc/poky/meta/recipes-devtools/cdrtools/cdrtools/ |
H A D | 0001-Don-t-set-uid-gid-during-install.patch | 9 RULES/rules.prg | 2 +- 12 diff --git a/RULES/rules.prg b/RULES/rules.prg 14 --- a/RULES/rules.prg 15 +++ b/RULES/rules.prg
|
/openbmc/linux/tools/perf/util/ |
H A D | strfilter.h | 23 * @rules: Filter rule, which is a combination of glob expressions. 24 * @err: Pointer which points an error detected on @rules 26 * Parse @rules and return new strfilter. Return NULL if an error detected. 30 struct strfilter *strfilter__new(const char *rules, const char **err); 35 * @rules: Filter rule to be appended at left of the root of 37 * @err: Pointer which points an error detected on @rules 39 * Parse @rules and join it to the @filter by using logical-or. 43 const char *rules, const char **err); 48 * @rules: Filter rule to be appended at left of the root of 50 * @err: Pointer which points an error detected on @rules [all …]
|
/openbmc/linux/security/apparmor/ |
H A D | resource.c | 92 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_setrlimit() local 93 typeof(*rules), list); in profile_setrlimit() 96 if (rules->rlimits.mask & (1 << resource) && new_rlim->rlim_max > in profile_setrlimit() 97 rules->rlimits.limits[resource].rlim_max) in profile_setrlimit() 128 * profiles. AppArmor rules currently have the implicit assumption in aa_task_setrlimit() 168 struct aa_ruleset *rules = list_first_entry(&old->rules, in __aa_transition_rlimits() local 169 typeof(*rules), in __aa_transition_rlimits() 171 if (rules->rlimits.mask) { in __aa_transition_rlimits() 176 if (rules->rlimits.mask & mask) { in __aa_transition_rlimits() 188 struct aa_ruleset *rules = list_first_entry(&new->rules, in __aa_transition_rlimits() local [all …]
|
H A D | net.c | 113 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_af_perm() local 114 typeof(*rules), list); in aa_profile_af_perm() 124 state = RULE_MEDIATES(rules, AA_CLASS_NET); in aa_profile_af_perm() 130 state = aa_dfa_match_len(rules->policy.dfa, state, (char *) &buffer, in aa_profile_af_perm() 132 perms = *aa_lookup_perms(&rules->policy, state); in aa_profile_af_perm() 226 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_secmark_perm() local 227 typeof(*rules), list); in aa_secmark_perm() 229 if (rules->secmark_count == 0) in aa_secmark_perm() 232 for (i = 0; i < rules->secmark_count; i++) { in aa_secmark_perm() 233 if (!rules->secmark[i].secid) { in aa_secmark_perm() [all …]
|
H A D | policy_unpack.c | 565 static bool unpack_secmark(struct aa_ext *e, struct aa_ruleset *rules) in unpack_secmark() argument 575 rules->secmark = kcalloc(size, sizeof(struct aa_secmark), in unpack_secmark() 577 if (!rules->secmark) in unpack_secmark() 580 rules->secmark_count = size; in unpack_secmark() 583 if (!unpack_u8(e, &rules->secmark[i].audit, NULL)) in unpack_secmark() 585 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark() 587 if (!aa_unpack_strdup(e, &rules->secmark[i].label, NULL)) in unpack_secmark() 599 if (rules->secmark) { in unpack_secmark() 601 kfree(rules->secmark[i].label); in unpack_secmark() 602 kfree(rules->secmark); in unpack_secmark() [all …]
|
/openbmc/openbmc/meta-google/recipes-google/nftables/files/ |
H A D | nft-configure.sh | 6 for file in "$dir"/*.rules; do 12 rules="" 13 trap 'rm -f -- "$rules"' TERM INT EXIT ERR 14 rules="$(mktemp)" || exit 15 echo 'flush ruleset' >"$rules" 18 echo '' >>"$rules" 19 cat "${basemap[$key]}" >>"$rules" 21 nft -f "$rules" || exit
|
/openbmc/openbmc-build-scripts/config/ |
H A D | .gitlint | 4 # Rules and sections can be referenced by their full name or by id. For example 10 # OpenBMC-specific rule that covers both of these rules. 38 # Enable community contributed rules 42 # Set the extra-path where gitlint will search for user defined rules 63 # Note that the regex can contradict with other rules if not used correctly 82 # files=gitlint-core/gitlint/rules.py,README.md 95 # Ignore certain rules for commits of which the title matches a regex 99 # Ignore certain rules, you can reference them by their id or by their full name 100 # Use 'all' to ignore all rules 104 # Ignore certain rules for commits of which the body has a line that matches a regex [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/audit/ |
H A D | audit_4.0.3.bb | 25 SYSTEMD_SERVICE:auditd = "auditd.service audit-rules.service" 61 ${datadir}/audit-rules/* ${libexecdir}/* \ 73 CONFFILES:auditd = "${sysconfdir}/audit/audit.rules" 83 # Install default rules 85 install -d -m 750 ${D}/etc/audit/rules.d 87 install -m 0640 ${S}/rules/10-base-config.rules ${D}/etc/audit/rules.d/audit.rules 89 # Based on the audit.spec "Copy default rules into place on new installation" 90 install -m 0640 ${D}/etc/audit/rules.d/audit.rules ${D}/etc/audit/audit.rules
|
/openbmc/openbmc/poky/meta/recipes-core/systemd/ |
H A D | systemd_257.1.bb | 22 file://touchscreen.rules \ 166 # Update NAT firewall rules 299 install -d ${D}${sysconfdir}/udev/rules.d/ 301 for rule in $(find ${UNPACKDIR} -maxdepth 1 -type f -name "*.rules"); do 302 install -m 0644 $rule ${D}${sysconfdir}/udev/rules.d/ 378 # create link for existing udev rules 432 ${PN}-udev-rules \ 662 FILES:${PN}-udev-rules = "\ 663 ${nonarch_libdir}/udev/rules.d/70-uaccess.rules \ 664 ${nonarch_libdir}/udev/rules.d/71-seat.rules \ [all …]
|
/openbmc/openbmc/meta-google/recipes-core/dropbear/ |
H A D | dropbear_%.bbappend | 11 rules=$nftables_dir/50-dropbear-dev.rules 13 echo 'table inet filter {' >"$rules" 14 echo ' chain gbmc_br_pub_input {' >>"$rules" 15 echo ' tcp dport 22 accept' >>"$rules" 16 echo ' }' >>"$rules" 17 echo '}' >>"$rules"
|
/openbmc/openbmc/meta-facebook/meta-minerva/recipes-phosphor/console/ |
H A D | obmc-console_%.bbappend | 8 file://80-minerva-obmc-console-uart.rules \ 15 # Replace upstream-provided udev rules 16 install -d ${D}/${nonarch_base_libdir}/udev/rules.d 17 rm -f ${D}/${nonarch_base_libdir}/udev/rules.d/80-obmc-console-uart.rules 18 …all -m 0644 ${UNPACKDIR}/80-minerva-obmc-console-uart.rules ${D}/${nonarch_base_libdir}/udev/rules…
|
/openbmc/linux/drivers/net/dsa/qca/ |
H A D | qca8k-leds.c | 53 * 3 control rules for phy0-3 that applies to all their leds in qca8k_get_control_led_reg() 54 * 3 control rules for phy4 in qca8k_get_control_led_reg() 65 qca8k_parse_netdev(unsigned long rules, u32 *offload_trigger) in qca8k_parse_netdev() argument 68 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca8k_parse_netdev() 70 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca8k_parse_netdev() 72 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca8k_parse_netdev() 74 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca8k_parse_netdev() 76 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca8k_parse_netdev() 78 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca8k_parse_netdev() 80 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca8k_parse_netdev() [all …]
|
/openbmc/openbmc/meta-google/recipes-google/networking/ |
H A D | gbmc-iperf3.bb | 23 rules=$nftables_dir/50-gbmc-iperf3-dev.rules 25 echo 'table inet filter {' >"$rules" 26 echo ' chain gbmc_br_pub_input {' >>"$rules" 27 echo ' tcp dport 5201 accept' >>"$rules" 28 echo ' }' >>"$rules" 29 echo '}' >>"$rules"
|
/openbmc/openbmc/meta-facebook/meta-catalina/recipes-phosphor/network/ |
H A D | phosphor-network_%.bbappend | 5 file://90-hmc-usb0-network.rules \ 10 ${sysconfdir}/udev/rules.d/90-hmc-usb0-network.rules \ 17 install -d ${D}${sysconfdir}/udev/rules.d 18 …all -m 0644 ${UNPACKDIR}/90-hmc-usb0-network.rules ${D}${sysconfdir}/udev/rules.d/90-hmc-usb0-netw…
|