/qemu/tests/unit/ |
H A D | ptimer-test.c | 68 const uint8_t *policy = arg; in check_set_count() local 69 ptimer_state *ptimer = ptimer_init(ptimer_trigger, NULL, *policy); in check_set_count() 83 const uint8_t *policy = arg; in check_set_limit() local 84 ptimer_state *ptimer = ptimer_init(ptimer_trigger, NULL, *policy); in check_set_limit() 106 const uint8_t *policy = arg; in check_oneshot() local 107 ptimer_state *ptimer = ptimer_init(ptimer_trigger, NULL, *policy); in check_oneshot() 108 bool no_round_down = (*policy & PTIMER_POLICY_NO_COUNTER_ROUND_DOWN); in check_oneshot() 224 const uint8_t *policy = arg; in check_periodic() local 225 ptimer_state *ptimer = ptimer_init(ptimer_trigger, NULL, *policy); in check_periodic() 226 bool wrap_policy = (*policy & PTIMER_POLICY_WRAP_AFTER_ONE_PERIOD); in check_periodic() [all …]
|
H A D | test-authz-listfile.c | 50 "{ \"policy\": \"deny\" }"); in test_authz_default_deny() 68 "{ \"policy\": \"allow\" }"); in test_authz_default_allow() 88 " \"policy\": \"deny\"," in test_authz_explicit_deny() 90 " \"policy\": \"allow\" }"); in test_authz_explicit_deny() 111 " \"policy\": \"allow\"," in test_authz_explicit_allow() 113 " \"policy\": \"deny\" }"); in test_authz_explicit_allow() 135 " \"policy\": \"allow\"," in test_authz_complex() 138 " \"policy\": \"allow\"," in test_authz_complex() 141 " \"policy\": \"deny\"," in test_authz_complex() 144 " \"policy\": \"allow\"," in test_authz_complex() [all …]
|
/qemu/authz/ |
H A D | list.c | 41 format, rule->policy); in qauthz_list_is_allowed() 45 return rule->policy == QAUTHZ_LIST_POLICY_ALLOW; in qauthz_list_is_allowed() 50 return rule->policy == QAUTHZ_LIST_POLICY_ALLOW; in qauthz_list_is_allowed() 60 trace_qauthz_list_default_policy(authz, identity, lauthz->policy); in qauthz_list_is_allowed() 61 return lauthz->policy == QAUTHZ_LIST_POLICY_ALLOW; in qauthz_list_is_allowed() 72 lauthz->policy = value; in qauthz_list_prop_set_policy() 82 return lauthz->policy; in qauthz_list_prop_get_policy() 123 object_class_property_add_enum(oc, "policy", in qauthz_list_class_init() 139 QAuthZListPolicy policy, in qauthz_list_new() argument 146 "policy", QAuthZListPolicy_str(policy), in qauthz_list_new() [all …]
|
H A D | trace-events | 10 …identity, const char *rule, int format, int policy) "AuthZ list %p check rule=%s identity=%s forma… 11 …fault_policy(void *authz, const char *identity, int policy) "AuthZ list %p default identity=%s pol…
|
/qemu/include/authz/ |
H A D | list.h | 40 * list of globs. Each match rule has an associated policy 41 * and a catch all policy applies if no rule matches 52 * { "match": "fred", "policy": "allow", "format": "exact" }, 53 * { "match": "bob", "policy": "allow", "format": "exact" }, 54 * { "match": "danb", "policy": "deny", "format": "exact" }, 55 * { "match": "dan*", "policy": "allow", "format": "glob" } 57 * "policy": "deny" 66 QAuthZListPolicy policy; member 74 QAuthZListPolicy policy, 79 QAuthZListPolicy policy, [all …]
|
H A D | listfile.h | 40 * file of globs. Each match rule has an associated policy 41 * and a catch all policy applies if no rule matches 65 * { "match": "fred", "policy": "allow", "format": "exact" }, 66 * { "match": "bob", "policy": "allow", "format": "exact" }, 67 * { "match": "danb", "policy": "deny", "format": "exact" }, 68 * { "match": "dan*", "policy": "allow", "format": "glob" } 70 * "policy": "deny"
|
H A D | pamacct.h | 40 * list of globs. Each match rule has an associated policy 41 * and a catch all policy applies if no rule matches
|
/qemu/docs/system/ |
H A D | authz.rst | 98 rule has an associated policy and a catch all policy applies if no rule 112 { "match": "fred", "policy": "allow", "format": "exact" }, 113 { "match": "bob", "policy": "allow", "format": "exact" }, 114 { "match": "danb", "policy": "deny", "format": "exact" }, 115 { "match": "dan*", "policy": "allow", "format": "glob" } 117 "policy": "deny" 130 access control policy by storing the match rules in a standalone file 158 { "match": "fred", "policy": "allow", "format": "exact" }, 159 { "match": "bob", "policy": "allow", "format": "exact" }, 160 { "match": "danb", "policy": "deny", "format": "exact" }, [all …]
|
/qemu/qapi/ |
H A D | authz.json | 11 # The authorization policy result 26 # The authorization policy match format 45 # @policy: the result to return if @match evaluates to true 53 'policy': 'QAuthZListPolicy', 61 # @policy: Default policy to apply when no rule matches (default: 69 'data': { '*policy': 'QAuthZListPolicy',
|
H A D | compat.json | 5 # = Compatibility policy 11 # Policy for handling "funny" input. 27 # Policy for handling "funny" output. 41 # Policy for handling deprecated management interfaces. 49 # Limitation: deprecated-output policy @hide is not implemented for 50 # enumeration values. They behave the same as with policy @accept.
|
H A D | qapi-util.c | 14 #include "qapi/compat-policy.h" 22 CompatPolicyInput policy, in compat_policy_input_ok1() argument 27 switch (policy) { in compat_policy_input_ok1() 31 error_set(errp, error_class, "%s %s %s disabled by policy", in compat_policy_input_ok1() 41 const CompatPolicy *policy, in compat_policy_input_ok() argument 48 policy->deprecated_input, in compat_policy_input_ok() 54 policy->unstable_input, in compat_policy_input_ok()
|
H A D | cxl.json | 392 # The policy to use for selecting which extents comprise the added 409 # different host using free, contiguous or prescriptive policy 410 # with a known tag. This policy then instructs the device to make 444 # @selection-policy: The "Selection Policy" bits as defined in 446 # Table 7-70. It specifies the policy to use for selecting 468 'selection-policy': 'CxlExtentSelectionPolicy', 479 # The policy to use for selecting which extents comprise the released 510 # @removal-policy: Bit[3:0] of the "Flags" field as defined in 547 'removal-policy': 'CxlExtentRemovalPolicy',
|
H A D | common.json | 146 # Host memory policy types 148 # @default: restore default policy, remove any nondefault policy 152 # @bind: a strict policy that restricts memory allocation to the host
|
H A D | misc-i386.json | 72 # @policy: SEV policy value 79 'data': { 'policy': 'uint32', 87 # @snp-policy: SEV-SNP policy value 92 'data': { 'snp-policy': 'uint64' } } 143 # "build-id" : 0, "policy" : 0, "state" : "running", number
|
/qemu/backends/ |
H A D | hostmem.c | 146 return backend->policy; in host_memory_backend_get_policy() 150 host_memory_backend_set_policy(Object *obj, int policy, Error **errp) in host_memory_backend_set_policy() argument 153 backend->policy = policy; in host_memory_backend_set_policy() 156 if (policy != HOST_MEM_POLICY_DEFAULT) { in host_memory_backend_set_policy() 371 * Ensure policy won't be ignored in case memory is preallocated in host_memory_backend_memory_complete() 376 int mode = backend->policy; in host_memory_backend_memory_complete() 380 if (maxnode && backend->policy == MPOL_DEFAULT) { in host_memory_backend_memory_complete() 381 error_setg(errp, "host-nodes must be empty for policy default," in host_memory_backend_memory_complete() 382 " or you should explicitly specify a policy other" in host_memory_backend_memory_complete() 385 } else if (maxnode == 0 && backend->policy != MPOL_DEFAULT) { in host_memory_backend_memory_complete() [all …]
|
/qemu/docs/system/i386/ |
H A D | amd-memory-encryption.rst | 42 the firmware. To create this context, guest owner must provide a guest policy, 46 The guest policy is passed as plaintext. A hypervisor may choose to read it, 47 but should not modify it (any modification of the policy bits will result 48 in bad measurement). The guest policy is a 4-byte data structure containing 52 The guest policy can be provided via the ``policy`` property:: 55 sev-guest,id=sev0,policy=0x1...\ 57 Setting the "SEV-ES required" policy bit (bit 2) will launch the guest as a 61 sev-guest,id=sev0,policy=0x5...\ 108 -object sev-guest,id=sev0,cbitpos=47,reduced-phys-bits=1,policy=0x5 133 HMAC(0x04 || API_MAJOR || API_MINOR || BUILD || GCTX.POLICY || GCTX.LD || MNONCE; GCTX.TIK) [all …]
|
H A D | sgx.rst | 163 -object memory-backend-ram,size=2G,host-nodes=0,policy=bind,id=node0 \\ 164 -object memory-backend-epc,id=mem0,size=64M,prealloc=on,host-nodes=0,policy=bind \\ 166 -object memory-backend-ram,size=2G,host-nodes=1,policy=bind,id=node1 \\ 167 -object memory-backend-epc,id=mem1,size=28M,prealloc=on,host-nodes=1,policy=bind \\
|
/qemu/docs/interop/ |
H A D | dbus.rst | 48 dbus-daemon policy 76 ``org.qemu.Helper1`` service, a dbus-daemon policy may contain: 80 <policy user="qemu"> 83 </policy> 85 <policy user="qemu-helper"> 87 </policy>
|
/qemu/include/qapi/ |
H A D | compat-policy.h | 2 * Policy for handling "funny" management interfaces 22 const CompatPolicy *policy, 31 * policy for handling deprecated management interfaces set with 40 * policy for handling deprecated management interfaces set with
|
/qemu/target/i386/ |
H A D | trace-events | 8 kvm_sev_launch_start(int policy, void *session, void *pdh) "policy 0x%x session %p pdh %p" 14 kvm_sev_snp_launch_start(uint64_t policy, char *gosvw) "policy 0x%" PRIx64 " gosvw %s"
|
/qemu/tests/vm/ |
H A D | conf_example_x86.yml | 28 -object memory-backend-ram,size=4G,policy=bind,host-nodes=0,id=ram-node0 29 -object memory-backend-ram,size=4G,policy=bind,host-nodes=0,id=ram-node1 30 -object memory-backend-ram,size=4G,policy=bind,host-nodes=1,id=ram-node2 31 -object memory-backend-ram,size=4G,policy=bind,host-nodes=1,id=ram-node3
|
/qemu/tests/ |
H A D | dbus-vmstate-daemon.sh | 5 # This script allows to tweak the dbus-daemon policy during the test 31 <policy context="default"> 69 </policy>
|
/qemu/tests/qtest/ |
H A D | numa-test.c | 451 " 'level': 1, 'associativity': \"direct\", 'policy': \"write-back\"," in pc_hmat_build_cfg() 457 " 'level': 4, 'associativity': \"direct\", 'policy': \"write-back\"," in pc_hmat_build_cfg() 463 " 'level': 0, 'associativity': \"direct\", 'policy': \"none\"," in pc_hmat_build_cfg() 465 /* Fail: policy option should be 'none', if level is 0 */ in pc_hmat_build_cfg() 468 " 'level': 0, 'associativity': \"none\", 'policy': \"write-back\"," in pc_hmat_build_cfg() 473 " 'level': 0, 'associativity': \"none\", 'policy': \"none\"," in pc_hmat_build_cfg() 479 " 'level': 1, 'associativity': \"direct\", 'policy': \"write-back\"," in pc_hmat_build_cfg() 483 " 'level': 1, 'associativity': \"direct\", 'policy': \"write-back\"," in pc_hmat_build_cfg() 488 " 'level': 2, 'associativity': \"direct\", 'policy': \"write-back\"," in pc_hmat_build_cfg() 493 " 'level': 0, 'associativity': \"direct\", 'policy': \"write-back\"," in pc_hmat_build_cfg() [all …]
|
/qemu/include/hw/ |
H A D | ptimer.h | 37 * The 'legacy' ptimer policy retains backward compatibility with the 38 * traditional ptimer behaviour from before policy flags were introduced. 42 * that you need and specify the right set of policy flags to get that. 46 * consider updating it to specify the right policy flags. 48 * The rough edges of the default policy: 104 * @policy: PTIMER_POLICY_* bits specifying behaviour
|
/qemu/contrib/plugins/ |
H A D | cache.c | 34 enum EvictionPolicy policy; variable 127 * LRU evection policy: For each set, a generation counter is maintained 183 * FIFO eviction policy: a FIFO queue is maintained for each CacheSet that 318 switch (policy) { in get_replaced_block() 718 switch (policy) { in policy_init() 762 policy = LRU; in qemu_plugin_install() 802 policy = RAND; in qemu_plugin_install() 804 policy = LRU; in qemu_plugin_install() 806 policy = FIFO; in qemu_plugin_install() 808 fprintf(stderr, "invalid eviction policy: %s\n", opt); in qemu_plugin_install()
|