/openbmc/qemu/docs/system/ |
H A D | cpu-models-mips.rst.inc | 1 Supported CPU model configurations on MIPS hosts 6 Supported CPU models for MIPS32 hosts 9 The following CPU models are supported for use on MIPS32 hosts. 14 across all desired hosts. 38 Supported CPU models for MIPS64 hosts 41 The following CPU models are supported for use on MIPS64 hosts. 46 across all desired hosts. 82 Supported CPU models for nanoMIPS hosts 85 The following CPU models are supported for use on nanoMIPS hosts. 90 across all desired hosts. [all …]
|
H A D | cpu-models-x86.rst.inc | 1 Recommendations for KVM CPU model configuration on x86 hosts 5 CPU models on x86 hosts. The goals are to maximise performance, while 7 enabling live migration between hosts with heterogeneous CPU models. 19 stable CPU is exposed to the guest across hosts. This is the 28 migrating between hosts with differing hardware. @end table 64 Preferred CPU models for Intel x86 hosts 67 The following CPU models are preferred for use on Intel hosts. 72 across all desired hosts. 110 Important CPU features for Intel x86 hosts 114 x86 hosts, when available in the host CPU. Some of them require explicit [all …]
|
/openbmc/openbmc/meta-facebook/recipes-phosphor/fans/phosphor-fan/greatlakes/ |
H A D | host-poweroff | 2 # Power off the hosts when fan sensors crossed thresholds. 4 echo "Power off the hosts if fansensors threshold crossed ::" 14 # Power off the hosts. 15 power-off-all-hosts() 28 power-off-all-hosts
|
/openbmc/openbmc/meta-facebook/recipes-phosphor/fans/phosphor-fan/yosemitev2/ |
H A D | host-poweroff | 2 # Power off the hosts when fan sensors crossed thresholds. 4 echo "Power off the hosts if fansensors threshold crossed ::" 14 # Power off the hosts. 15 power-off-all-hosts() 28 power-off-all-hosts
|
/openbmc/openbmc/meta-facebook/recipes-phosphor/fans/phosphor-fan/yosemite4-common/ |
H A D | host-poweroff | 2 # Power off the hosts when fan sensors crossed thresholds. 4 echo "Power off the hosts if fansensors threshold crossed ::" 12 # Power off the hosts. 13 power-off-all-hosts() 27 power-off-all-hosts
|
/openbmc/fb-ipmi-oem/include/ |
H A D | commandutils.hpp | 46 std::vector<std::string> hosts = {}; in findHost() local 53 instances(hostInstances, hosts); in findHost() 55 std::sort(hosts.begin(), hosts.end()); in findHost() 63 auto instance = std::lower_bound(hosts.begin(), hosts.end(), num); in findHost() 65 if (instance != std::end(hosts)) in findHost()
|
/openbmc/linux/net/netfilter/ipset/ |
H A D | ip_set_bitmap_ip.c | 44 u32 hosts; /* number of hosts in a subnet */ member 61 return ((ip & ip_set_hostmask(m->netmask)) - m->first_ip) / m->hosts; in ip_to_id() 97 htonl(map->first_ip + id * map->hosts)); in bitmap_ip_do_list() 181 for (; !before(ip_to, ip); ip += map->hosts) { in bitmap_ip_uadt() 218 u32 elements, u32 hosts, u8 netmask) in init_map_ip() argument 226 map->hosts = hosts; in init_map_ip() 254 u32 first_ip = 0, last_ip = 0, hosts; in bitmap_ip_create() local 295 hosts = 1; in bitmap_ip_create() 308 hosts = 2U << (32 - netmask - 1); in bitmap_ip_create() 314 pr_debug("hosts %u, elements %llu\n", in bitmap_ip_create() [all …]
|
/openbmc/linux/tools/testing/selftests/net/ |
H A D | srv6_hencap_red_l3vpn_test.sh | 9 # IPv4/IPv6 VPN services to hosts, enabling them to communicate with each 11 # In this example, hosts hs-1 and hs-2 are connected through an IPv4/IPv6 VPN 18 # by connected hosts, initiating the VPN tunnel. Such a behavior is an 104 # Hosts hs-1 and hs-2 are connected using dedicated IPv4/IPv6 VPNs. 145 # Hosts hs-3 and hs-4 are connected using a dedicated IPv6 only VPN. 187 # IDs of routers and hosts are initialized during the setup of the testing 190 HOSTS='' 311 # destroy hosts 312 for i in ${HOSTS}; do 480 # add SRv6 policy to incoming traffic sent by connected hosts [all …]
|
H A D | srv6_hl2encap_red_l2vpn_test.sh | 9 # services to hosts, enabling them to communicate with each other. 10 # In this example, hosts hs-1 and hs-2 are connected through an L2 VPN service. 11 # Currently, the SRv6 subsystem in Linux allows hosts hs-1 and hs-2 to exchange 18 # received by connected hosts, initiating the VPN tunnel. Such a behavior 94 # Hosts hs-1 and hs-2 are connected using a dedicated L2 VPN. 138 # IDs of routers and hosts are initialized during the setup of the testing 141 HOSTS='' 262 # destroy hosts 263 for i in ${HOSTS}; do 418 # add SRv6 policy to incoming traffic sent by connected hosts [all …]
|
H A D | srv6_end_flavors_test.sh | 56 # two hosts (hs-1, hs-2) and four routers (rt-1, rt-2, rt-3, rt-4). 57 # Hosts hs-1 and hs-2 are connected to routers rt-1 and rt-2, respectively, 64 # connected hosts. It pushes the Segment Routing Header (SRH) after the 129 # from connected hosts on the basis of the destination addresses. 214 # IDs of routers and hosts are initialized during the setup of the testing 217 HOSTS='' 338 # destroy hosts 339 for i in ${HOSTS}; do 562 # add SRv6 policy to incoming traffic sent by connected hosts 620 # create hosts [all …]
|
H A D | srv6_end_next_csid_l3vpn_test.sh | 12 # two hosts and four routers. Hosts hs-1 and hs-2 are connected through an 17 # traffic received by connected hosts, initiating the VPN tunnel; 129 # simplify the test setup and avoid adding other hosts or multiple addresses on 315 # IDs of routers and hosts are initialized during the setup of the testing 318 HOSTS='' 439 # destroy hosts 440 for i in ${HOSTS}; do 812 # create hosts 813 HOSTS="1 2"; readonly HOSTS 814 for i in ${HOSTS}; do [all …]
|
H A D | srv6_end_x_next_csid_l3vpn_test.sh | 13 # two hosts and four routers. Hosts hs-1 and hs-2 are connected through an 18 # traffic received by connected hosts, initiating the VPN tunnel; 132 # simplify the test setup and avoid adding other hosts or multiple addresses on 357 # IDs of routers and hosts are initialized during the setup of the testing 360 HOSTS='' 489 # destroy hosts 490 for i in ${HOSTS}; do 872 # create hosts 873 HOSTS="1 2"; readonly HOSTS 874 for i in ${HOSTS}; do [all …]
|
H A D | srv6_end_dt46_l3vpn_test.sh | 20 # and 200) offer IPv4/IPv6 L3 VPN services allowing hosts to communicate with 23 # Only hosts belonging to the same tenant (and to the same VPN) can communicate 24 # with each other. Instead, the communication among hosts of different tenants 26 # In other words, hosts hs-t100-1 and hs-t100-2 are connected through the 61 # L3 VPN for tenant 100. In this case, only hosts hs-t200-3 and hs-t200-4 are 253 # destroy routers rt-* and hosts hs-* 385 # setup two hosts for the tenant 100. 391 # setup two hosts for the tenant 200 453 log_test $? 0 "IPv6 Hosts connectivity: hs-t${tid}-${hssrc} -> hs-t${tid}-${hsdst} (tenant ${tid})" 456 log_test $? 0 "IPv4 Hosts connectivity: hs-t${tid}-${hssrc} -> hs-t${tid}-${hsdst} (tenant ${tid})" [all …]
|
H A D | srv6_end_dt6_l3vpn_test.sh | 11 # and 200) offer IPv6 L3 VPN services allowing hosts to communicate with each 14 # Only hosts belonging to the same tenant (and to the same VPN) can communicate 15 # with each other. Instead, the communication among hosts of different tenants 17 # In other words, hosts hs-t100-1 and hs-t100-2 are connected through the IPv6 52 # for tenant 100. In this case, only hosts hs-t200-3 and hs-t200-4 are able to 223 # destroy routers rt-* and hosts hs-* 337 # setup two hosts for the tenant 100. 343 # setup two hosts for the tenant 200 395 log_test $? 0 "Hosts connectivity: hs-t${tid}-${hssrc} -> hs-t${tid}-${hsdst} (tenant ${tid})" 407 log_test $? 1 "Hosts isolation: hs-t${tidsrc}-${hssrc} -X-> hs-t${tiddst}-${hsdst}" [all …]
|
/openbmc/openbmc/meta-facebook/conf/recipes/ |
H A D | fb-consoles.inc | 7 # Calculate the TTY assignments for the hosts. 9 hosts = len(d.getVar('OBMC_HOST_INSTANCES', True).split()) 11 if hosts <= 1: 19 return " ".join(consoles[:hosts])
|
/openbmc/openbmc/poky/meta/recipes-support/nss-myhostname/ |
H A D | nss-myhostname_0.3.bb | 23 sed -e '/^hosts:/s/\s*\<myhostname\>//' \ 24 -e 's/\(^hosts:.*\)\(\<files\>\)\(.*\)\(\<dns\>\)\(.*\)/\1\2 myhostname \3\4\5/' \ 29 sed -e '/^hosts:/s/\s*\<myhostname\>//' \ 30 -e '/^hosts:/s/\s*myhostname//' \
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/p910nd/p910nd/ |
H A D | fix-var-lock.patch | 13 -/var/run/p9100d.pid, /var/lock/subsys/p9100d, /etc/hosts.allow, /etc/hosts.deny 14 +/var/run/p9100d.pid, /var/lock/p9100d, /etc/hosts.allow, /etc/hosts.deny
|
/openbmc/openbmc/poky/meta/recipes-extended/tcp-wrappers/ |
H A D | tcp-wrappers_7.6.bb | 84 …oe_runmake 'TABLES=-DHOSTS_DENY=\"${sysconfdir}/hosts.deny\" -DHOSTS_ALLOW=\"${sysconfdir}/hosts.a… 130 touch ${D}${sysconfdir}/hosts.allow 131 touch ${D}${sysconfdir}/hosts.deny 134 FILES:${PN} += "${sysconfdir}/hosts.allow ${sysconfdir}/hosts.deny"
|
/openbmc/openbmc/poky/meta/recipes-devtools/distcc/files/ |
H A D | default | 12 # Which networks/hosts should be allowed to connect to the daemon? 13 # You can list multiple hosts/networks separated by spaces. 15 # Hosts are represented by a single IP Adress
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/tayga/files/ |
H A D | tayga.conf | 55 # Prefix will prohibit IPv6 hosts from contacting IPv4 hosts that have private 67 # Dynamic pool prefix. IPv6 hosts which send traffic through TAYGA (and do 73 # configured), packets from unknown IPv6 hosts will be rejected with an ICMP 93 # `map' directive. (IPv6 hosts numbered with an IPv4-translatable address do
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/State/ |
H A D | README.md | 10 reboot the BMC and hosts, and turn on and off power to the chassis. The 73 programmatically work out the mapping between BMCs, Chassis and Hosts. 78 host. If there are multiple hosts, then bmc0/chassis0/host0 will _not_ exist. In 93 For example, a system with multiple hosts would have BMCs, Chassis and Hosts 94 _all_ start numbering from 1 rather than 0. This is because multiple hosts could
|
/openbmc/linux/drivers/memstick/host/ |
H A D | jmb38x_ms.c | 69 struct memstick_host *hosts[]; member 803 if (!jm->hosts[cnt]) in jmb38x_ms_suspend() 805 memstick_suspend_host(jm->hosts[cnt]); in jmb38x_ms_suspend() 821 if (!jm->hosts[rc]) in jmb38x_ms_resume() 823 memstick_resume_host(jm->hosts[rc]); in jmb38x_ms_resume() 824 memstick_detect_change(jm->hosts[rc]); in jmb38x_ms_resume() 930 jm = kzalloc(struct_size(jm, hosts, cnt), GFP_KERNEL); in jmb38x_ms_probe() 941 jm->hosts[cnt] = jmb38x_ms_alloc_host(jm, cnt); in jmb38x_ms_probe() 942 if (!jm->hosts[cnt]) in jmb38x_ms_probe() 945 rc = memstick_add_host(jm->hosts[cnt]); in jmb38x_ms_probe() [all …]
|
/openbmc/docs/designs/ |
H A D | multihost-ipmi-design.md | 16 As detailed below the hosts are connected in the IPMB interface, all host 54 Hosts are connected with IPMB interface, the hosts can be 1 to N. The IPMB 55 request coming from the hosts are routed to ipmid by the ipmbbridged. The IPMB 172 Using a different IPMI channel for handling multiple hosts, in the ipmbbridged 176 specification.This limits the maximum hosts to be supported. 185 The proposed design can be tested in a platform in which the multiple hosts are 186 connected.The commands requests are received from all the hosts and responses
|
/openbmc/linux/drivers/soc/qcom/ |
H A D | smsm.c | 29 * in updates of the entry for each of the N hosts. Upon updating a state bit 73 * @hosts: context for each of the hosts 90 struct smsm_host *hosts; member 170 /* Iterate over all hosts to check whom wants a kick */ in smsm_update_bits() 172 hostp = &smsm->hosts[host]; in smsm_update_bits() 367 struct smsm_host *host = &smsm->hosts[host_id]; in smsm_parse_ipc() 437 * Attempt to acquire the number of hosts and entries from the optional shared 469 "found custom size of smsm: %d entries %d hosts\n", in smsm_get_size_info() 504 smsm->hosts = devm_kcalloc(&pdev->dev, in qcom_smsm_probe() 508 if (!smsm->hosts) in qcom_smsm_probe()
|
/openbmc/qemu/tcg/tci/ |
H A D | README | 12 QEMU can create native code for some hosts (arm, i386, ia64, ppc, ppc64, 35 For hosts without native TCG, the interpreter TCI must be enabled by 44 For hosts with native TCG, the interpreter TCI can be enabled by 59 Hosts with native TCG can also enable TCI by claiming to be unsupported:
|