/openbmc/linux/net/netlink/ |
H A D | policy.c | 24 } policies[]; member 38 if (state->policies[i].policy == policy && in add_policy() 39 state->policies[i].maxtype == maxtype) in add_policy() 42 if (!state->policies[i].policy) { in add_policy() 43 state->policies[i].policy = policy; in add_policy() 44 state->policies[i].maxtype = maxtype; in add_policy() 50 state = krealloc(state, struct_size(state, policies, n_alloc), in add_policy() 55 memset(&state->policies[state->n_alloc], 0, in add_policy() 56 flex_array_size(state, policies, n_alloc - state->n_alloc)); in add_policy() 58 state->policies[state->n_alloc].policy = policy; in add_policy() [all …]
|
/openbmc/webui-vue/src/views/SecurityAndAccess/Policies/ |
H A D | Policies.vue | 17 data-test-id="policies-toggle-bmcShell" 67 data-test-id="policies-toggle-vtpm" 92 data-test-id="policies-toggle-rtad" 169 return this.$store.getters['policies/sshProtocolEnabled']; 177 return this.$store.getters['policies/ipmiProtocolEnabled']; 185 if (this.$store.getters['policies/rtadEnabled'] === 'Enabled') { 197 if (this.$store.getters['policies/vtpmEnabled'] === 'Enabled') { 209 return this.$store.getters['policies/getSessionTimeoutValue']; 219 this.$store.dispatch('policies/getBiosStatus'), 220 this.$store.dispatch('policies/getNetworkProtocolStatus'), [all …]
|
/openbmc/phosphor-fan-presence/presence/templates/ |
H A D | generated.mako.hpp | 66 using Policies = std::array<std::unique_ptr<RedundancyPolicy>, ${len(policies)}>; 70 static const Policies policies = in get() local 72 % for p in policies: in get() 76 return policies; in get()
|
/openbmc/linux/tools/testing/selftests/amd-pstate/ |
H A D | run.sh | 73 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 74 for policy in $policies; do 86 policies=$(awk '{print $1}' $OUTFILE.backup_governor.log) 87 for policy in $policies; do 101 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 102 for policy in $policies; do
|
/openbmc/linux/tools/testing/selftests/cpufreq/ |
H A D | cpufreq.sh | 31 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 32 for policy in $policies; do 39 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 40 for policy in $policies; do
|
/openbmc/linux/Documentation/admin-guide/mm/ |
H A D | numa_memory_policy.rst | 15 Memory policies should not be confused with cpusets 18 memory may be allocated by a set of processes. Memory policies are a 20 both cpusets and policies are applied to a task, the restrictions of the cpuset 61 In a multi-threaded task, task policies apply only to the thread 88 VMA policies have a few complicating details: 100 * VMA policies are shared between all tasks that share a 103 fork(). However, because VMA policies refer to a specific 105 space is discarded and recreated on exec*(), VMA policies 107 applications may use VMA policies. 123 Conceptually, shared policies apply to "memory objects" mapped [all …]
|
/openbmc/ibm-logging/ |
H A D | policy_table.cpp | 67 policies.emplace(policy["err"], std::move(detailsList)); in load() 87 auto policy = policies.find(error); in find() 89 if (policy != policies.end()) in find()
|
H A D | policy_table.hpp | 132 PolicyMap policies; member in ibm::logging::policy::Table
|
/openbmc/phosphor-fan-presence/presence/ |
H A D | json_parser.hpp | 30 using policies = std::vector<std::unique_ptr<RedundancyPolicy>>; typedef 65 static const policies& get(); 86 static policies _policies;
|
H A D | json_parser.cpp | 46 policies JsonConfig::_policies; 74 const policies& JsonConfig::get() in get() 106 policies policies; in process() local 203 policies.emplace_back(std::move(policy)); in process() 212 _policies.swap(policies); in process()
|
H A D | pfpgen.py | 321 self.policies = kw.pop("policy", []) 333 policies=self.policies,
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_policies_sub_menu.robot | 19 ${xpath_bmc_ssh_toggle} //*[@data-test-id='policies-toggle-bmcShell'] 24 ${xpath_virtual_tpm_toggle} //*[@data-test-id='policies-toggle-vtpm'] 25 ${xpath_rtad_toggle} //*[@data-test-id='policies-toggle-rtad'] 26 ${xpath_usb_firmware_update_policy_toggle} //*[@data-test-id='policies-toggle-usbFirmwareUpdateP… 27 ${xpath_secure_version_lockin_toggle} //*[@data-test-id='policies-toggle-svle'] 28 ${xpath_host_usb_enablement_toggle} //*[@data-test-id='policies-toggle-hostUsb'] 34 [Documentation] Verify navigation to policies page. 41 [Documentation] Verify existence of all sections in policies page. 55 [Documentation] Verify existence of All Buttons in policies page. 216 Wait Until Keyword Succeeds 30 sec 15 sec Location Should Contain policies
|
/openbmc/linux/tools/perf/trace/beauty/ |
H A D | sched_policy.c | 22 const char *policies[] = { in syscall_arg__scnprintf_sched_policy() local 31 printed = scnprintf(bf, size, "%s%s", show_prefix ? prefix : "", policies[policy]); in syscall_arg__scnprintf_sched_policy()
|
/openbmc/linux/drivers/gpu/drm/i915/gt/uc/ |
H A D | intel_guc_ads.c | 60 struct guc_policies policies; member 148 ads_blob_write(guc, policies.dpc_promote_time, in guc_policies_init() 150 ads_blob_write(guc, policies.max_num_work_items, in guc_policies_init() 156 ads_blob_write(guc, policies.global_flags, global_flags); in guc_policies_init() 157 ads_blob_write(guc, policies.is_valid, 1); in guc_policies_init() 168 ads_blob_read(guc, policies.dpc_promote_time)); in intel_guc_ads_print_policy_info() 170 ads_blob_read(guc, policies.max_num_work_items)); in intel_guc_ads_print_policy_info() 172 ads_blob_read(guc, policies.global_flags)); in intel_guc_ads_print_policy_info() 834 offsetof(struct __guc_ads_blob, policies)); in __guc_ads_init()
|
/openbmc/linux/Documentation/filesystems/ |
H A D | fscrypt.rst | 148 Limitations of v1 policies 151 v1 encryption policies have some weaknesses with respect to online 167 All the above problems are fixed with v2 encryption policies. For 169 policies on all new encrypted directories. 212 the key is used for v1 encryption policies or for v2 encryption 213 policies. Users **must not** use the same key for both v1 and v2 214 encryption policies. (No real-world attack is currently known on this 218 For v1 encryption policies, the KDF only supports deriving per-file 224 For v2 encryption policies, the KDF is HKDF-SHA512. The master key is 259 DIRECT_KEY policies [all …]
|
/openbmc/linux/drivers/net/wireless/silabs/wfx/ |
H A D | data_tx.c | 152 struct wfx_tx_policy *policies = wvif->tx_policy_cache.cache; in wfx_tx_policy_upload() local 159 is_used = memzcmp(policies[i].rates, sizeof(policies[i].rates)); in wfx_tx_policy_upload() 160 if (!policies[i].uploaded && is_used) in wfx_tx_policy_upload() 164 policies[i].uploaded = true; in wfx_tx_policy_upload() 165 memcpy(tmp_rates, policies[i].rates, sizeof(tmp_rates)); in wfx_tx_policy_upload()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/ |
H A D | vlock_pam | 1 # Use the default auth and account policies for vlock
|
/openbmc/openbmc/meta-security/recipes-mac/smack/smack/ |
H A D | smack_generator_make_fixup.patch | 17 policies: ./generator ./make_policies.bash
|
/openbmc/linux/Documentation/admin-guide/device-mapper/ |
H A D | cache-policies.rst | 2 Guidance for writing policies 7 makes it easier to write the policies. 26 Overview of supplied cache replacement policies
|
H A D | index.rst | 8 cache-policies
|
/openbmc/linux/Documentation/ABI/removed/ |
H A D | raw1394 | 7 to implement sensible device security policies, and its low level
|
/openbmc/linux/security/landlock/ |
H A D | Kconfig | 10 tailored access control policies. A Landlock security policy is a
|
/openbmc/openbmc/meta-security/recipes-security/fscryptctl/ |
H A D | fscryptctl_1.1.0.bb | 3 policies for Linux filesystem encryption (https://lwn.net/Articles/639427). \
|
/openbmc/qemu/docs/interop/ |
H A D | dbus.rst | 51 dbus-daemon can enforce various policies based on the UID/GID of the 53 helpers as different UID from QEMU and set appropriate policies.
|
/openbmc/webui-vue/src/store/ |
H A D | index.js | 72 policies: PoliciesStore, property in AnonymousClassb4283c500101.modules
|