/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_payload.robot | 2 Documentation This suite tests IPMI Payload in OpenBMC. 10 Suite Setup IPMI Payload Setup Execution 34 Test Get Payload Activation Status 35 [Documentation] Test get payload activation status. 38 # SOL is the payload currently supported for payload status. 43 ${payload_status}= Get Payload Activation Status 47 Test Activate Payload 48 [Documentation] Test activate payload via IPMI raw command. 51 ${payload_status}= Get Payload Activation Status 52 Run Keyword If '${payload_status}' == '01' Deactivate Payload [all …]
|
/openbmc/linux/drivers/media/radio/wl128x/ |
H A D | fmdrv_tx.c | 16 u16 payload; in fm_tx_set_stereo_mono() local 25 payload = (1 - mode); in fm_tx_set_stereo_mono() 26 ret = fmc_send_cmd(fmdev, MONO_SET, REG_WR, &payload, in fm_tx_set_stereo_mono() 27 sizeof(payload), NULL, NULL); in fm_tx_set_stereo_mono() 38 u16 payload; in set_rds_text() local 47 payload = (u16)0x1; in set_rds_text() 48 ret = fmc_send_cmd(fmdev, DISPLAY_MODE, REG_WR, &payload, in set_rds_text() 49 sizeof(payload), NULL, NULL); in set_rds_text() 58 u16 payload; in set_rds_data_mode() local 62 payload = (u16)0xcafe; in set_rds_data_mode() [all …]
|
H A D | fmdrv_rx.c | 36 u16 payload, curr_frq, intr_flag; in fm_rx_set_freq() local 47 payload = FM_RX_AUDIO_ENABLE_I2S_AND_ANALOG; in fm_rx_set_freq() 49 ret = fmc_send_cmd(fmdev, AUDIO_ENABLE_SET, REG_WR, &payload, in fm_rx_set_freq() 50 sizeof(payload), NULL, NULL); in fm_rx_set_freq() 55 payload = FM_RX_IFFREQ_HILO_AUTOMATIC; in fm_rx_set_freq() 56 ret = fmc_send_cmd(fmdev, HILO_SET, REG_WR, &payload, in fm_rx_set_freq() 57 sizeof(payload), NULL, NULL); in fm_rx_set_freq() 62 payload = (freq - fmdev->rx.region.bot_freq) / FM_FREQ_MUL; in fm_rx_set_freq() 64 ret = fmc_send_cmd(fmdev, FREQ_SET, REG_WR, &payload, in fm_rx_set_freq() 65 sizeof(payload), NULL, NULL); in fm_rx_set_freq() [all …]
|
/openbmc/phosphor-net-ipmid/command/ |
H A D | payload_cmds.hpp | 21 * IPMI payload for Activate Payload command request. 26 uint8_t payloadType:6; //!< Payload type. 31 uint8_t reserved1:2; //!< Payload type. 32 uint8_t payloadType:6; //!< Payload type. 36 uint8_t payloadInstance:4; //!< Payload instance. 42 uint8_t payloadInstance:4; //!< Payload instance. 45 /** @brief The following Auxiliary Request Data applies only for payload 54 uint8_t auth:1; //!< If true, activate payload with authentication. 55 uint8_t encryption:1; //!< If true, activate payload with encryption. 59 uint8_t encryption:1; //!< If true, activate payload with encryption. [all …]
|
/openbmc/linux/drivers/net/ethernet/mellanox/mlxsw/ |
H A D | reg.h | 30 #define MLXSW_REG_ZERO(type, payload) memset(payload, 0, MLXSW_REG(type)->len) argument 49 static inline void mlxsw_reg_sgcr_pack(char *payload, bool llb) in mlxsw_reg_sgcr_pack() argument 51 MLXSW_REG_ZERO(sgcr, payload); in mlxsw_reg_sgcr_pack() 52 mlxsw_reg_sgcr_llb_set(payload, !!llb); in mlxsw_reg_sgcr_pack() 110 static inline void mlxsw_reg_sspr_pack(char *payload, u16 local_port) in mlxsw_reg_sspr_pack() argument 112 MLXSW_REG_ZERO(sspr, payload); in mlxsw_reg_sspr_pack() 113 mlxsw_reg_sspr_m_set(payload, 1); in mlxsw_reg_sspr_pack() 114 mlxsw_reg_sspr_local_port_set(payload, local_port); in mlxsw_reg_sspr_pack() 115 mlxsw_reg_sspr_system_port_set(payload, local_port); in mlxsw_reg_sspr_pack() 143 static inline void mlxsw_reg_sfdat_pack(char *payload, u32 age_time) in mlxsw_reg_sfdat_pack() argument [all …]
|
/openbmc/linux/security/keys/ |
H A D | big_key.c | 21 * Layout of key payload words. 28 #define to_big_key_payload(payload) \ argument 29 (struct big_key_payload *)((payload).data) 40 * arbitrary blob of data as the payload 59 struct big_key_payload *payload = to_big_key_payload(prep->payload); in big_key_preparse() local 67 BUILD_BUG_ON(sizeof(*payload) != sizeof(prep->payload.data)); in big_key_preparse() 75 payload->length = datalen; in big_key_preparse() 123 payload->data = enckey; in big_key_preparse() 124 payload->path = file->f_path; in big_key_preparse() 125 path_get(&payload->path); in big_key_preparse() [all …]
|
/openbmc/linux/tools/perf/util/arm-spe-decoder/ |
H A D | arm-spe-decoder.c | 25 static u64 arm_spe_calc_ip(int index, u64 payload) in arm_spe_calc_ip() argument 32 ns = SPE_ADDR_PKT_GET_NS(payload); in arm_spe_calc_ip() 33 el = SPE_ADDR_PKT_GET_EL(payload); in arm_spe_calc_ip() 36 payload = SPE_ADDR_PKT_ADDR_GET_BYTES_0_6(payload); in arm_spe_calc_ip() 40 payload |= 0xffULL << SPE_ADDR_PKT_ADDR_BYTE7_SHIFT; in arm_spe_calc_ip() 46 payload = SPE_ADDR_PKT_ADDR_GET_BYTES_0_6(payload); in arm_spe_calc_ip() 50 * defines the data virtual address payload format, the top byte in arm_spe_calc_ip() 55 * specific pattern in bits [55:52] of payload which falls in in arm_spe_calc_ip() 62 val = SPE_ADDR_PKT_ADDR_GET_BYTE_6(payload); in arm_spe_calc_ip() 64 payload |= 0xffULL << SPE_ADDR_PKT_ADDR_BYTE7_SHIFT; in arm_spe_calc_ip() [all …]
|
H A D | arm-spe-pkt-decoder.c | 72 case 1: packet->payload = *(uint8_t *)buf; break; in arm_spe_get_payload() 73 case 2: packet->payload = le16_to_cpu(*(uint16_t *)buf); break; in arm_spe_get_payload() 74 case 4: packet->payload = le32_to_cpu(*(uint32_t *)buf); break; in arm_spe_get_payload() 75 case 8: packet->payload = le64_to_cpu(*(uint64_t *)buf); break; in arm_spe_get_payload() 295 u64 payload = packet->payload; in arm_spe_pkt_desc_event() local 300 if (payload & BIT(EV_EXCEPTION_GEN)) in arm_spe_pkt_desc_event() 302 if (payload & BIT(EV_RETIRED)) in arm_spe_pkt_desc_event() 304 if (payload & BIT(EV_L1D_ACCESS)) in arm_spe_pkt_desc_event() 306 if (payload & BIT(EV_L1D_REFILL)) in arm_spe_pkt_desc_event() 308 if (payload & BIT(EV_TLB_ACCESS)) in arm_spe_pkt_desc_event() [all …]
|
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_varlen.c | 46 void *payload = payload1; in handler64_unsigned() local 53 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in1[0]); in handler64_unsigned() 55 payload += len; in handler64_unsigned() 59 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in2[0]); in handler64_unsigned() 61 payload += len; in handler64_unsigned() 65 total1 = payload - (void *)payload1; in handler64_unsigned() 76 void *payload = payload3; in handler64_signed() local 83 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in1[0]); in handler64_signed() 85 payload += len; in handler64_signed() 88 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in2[0]); in handler64_signed() [all …]
|
H A D | profiler.inc.h | 207 void* payload, in read_full_cgroup_path() argument 210 void* payload_start = payload; in read_full_cgroup_path() 218 bpf_probe_read_kernel_str(payload, MAX_PATH, in read_full_cgroup_path() 221 return payload; in read_full_cgroup_path() 223 *root_pos = payload - payload_start; in read_full_cgroup_path() 226 payload += filepart_length; in read_full_cgroup_path() 230 return payload; in read_full_cgroup_path() 253 void* payload) in populate_cgroup_info() argument 306 bpf_probe_read_kernel_str(payload, MAX_PATH, in populate_cgroup_info() 312 payload += cgroup_root_length; in populate_cgroup_info() [all …]
|
/openbmc/linux/include/uapi/linux/ |
H A D | dm-log-userspace.h | 41 * you will see 'Payload-to-userspace' and 'Payload-to-kernel'. The 42 * 'Payload-to-userspace' is what the kernel sends in 'additional data' as 43 * necessary parameters to complete the request. The 'Payload-to-kernel' is 46 * structure denotes the availability and amount of payload data. 54 * Payload-to-userspace: 56 * Payload-to-kernel: 78 * Payload-to-userspace: 80 * Payload-to-kernel: 85 * payload data. 97 * Payload-to-userspace: [all …]
|
/openbmc/linux/tools/perf/util/intel-pt-decoder/ |
H A D | intel-pt-pkt-decoder.c | 80 uint64_t payload; in intel_pt_get_long_tnt() local 86 payload = le64_to_cpu(*(uint64_t *)buf); in intel_pt_get_long_tnt() 89 if (payload & BIT63) in intel_pt_get_long_tnt() 91 payload <<= 1; in intel_pt_get_long_tnt() 96 packet->payload = payload << 1; in intel_pt_get_long_tnt() 103 uint64_t payload = 0; in intel_pt_get_pip() local 109 memcpy_le64(&payload, buf + 2, 6); in intel_pt_get_pip() 110 packet->payload = payload; in intel_pt_get_pip() 127 packet->payload = le16_to_cpu(*(uint16_t *)(buf + 2)); in intel_pt_get_cbr() 144 memcpy_le64(&packet->payload, buf + 2, count); in intel_pt_get_vmcs() [all …]
|
/openbmc/ipmitool/src/plugins/lanplus/ |
H A D | lanplus.c | 96 struct ipmi_v2_payload * payload); 99 struct ipmi_v2_payload * payload, /* in */ 107 struct ipmi_v2_payload * payload); 119 struct ipmi_v2_payload * payload); 644 * The authtype / payload type determines what we are receiving in ipmi_lan_poll_single() 654 * 2) An RMCP+ message with an IPMI reponse payload in ipmi_lan_poll_single() 699 lprintf(LOG_DEBUG+1, "<< Payload type : %s", in ipmi_lan_poll_single() 705 lprintf(LOG_DEBUG+1, "<< IPMI Msg/Payload Length : %d", in ipmi_lan_poll_single() 709 rsp->payload.ipmi_response.rq_addr); in ipmi_lan_poll_single() 711 rsp->payload.ipmi_response.netfn); in ipmi_lan_poll_single() [all …]
|
/openbmc/linux/drivers/gpu/drm/amd/display/dc/dce/ |
H A D | dce_aux.c | 241 /* program action and address and payload data (if 'is_write') */ in submit_channel_request() 533 static enum i2caux_transaction_action i2caux_action_from_payload(struct aux_payload *payload) in i2caux_action_from_payload() argument 535 if (payload->i2c_over_aux) { in i2caux_action_from_payload() 536 if (payload->write_status_update) { in i2caux_action_from_payload() 537 if (payload->mot) in i2caux_action_from_payload() 542 if (payload->write) { in i2caux_action_from_payload() 543 if (payload->mot) in i2caux_action_from_payload() 548 if (payload->mot) in i2caux_action_from_payload() 553 if (payload->write) in i2caux_action_from_payload() 560 struct aux_payload *payload, in dce_aux_transfer_raw() argument [all …]
|
/openbmc/qemu/docs/interop/ |
H A D | vhost-user-gpu.rst | 39 fields and a payload. 42 | request | flags | size | payload | 54 :size: ``u32``, size of the payload 56 Payload types 59 Depending on the request type, **payload** can be: 160 uint32_t size; /* the following payload size */ 171 } payload; 194 :request payload: N/A 195 :reply payload: ``u64`` 201 :request payload: ``u64`` [all …]
|
/openbmc/linux/security/keys/trusted-keys/ |
H A D | trusted_tpm2.c | 31 static int tpm2_key_encode(struct trusted_key_payload *payload, in tpm2_key_encode() argument 84 work1 = payload->blob; in tpm2_key_encode() 85 work1 = asn1_encode_sequence(work1, work1 + sizeof(payload->blob), in tpm2_key_encode() 94 return work1 - payload->blob; in tpm2_key_encode() 109 static int tpm2_key_decode(struct trusted_key_payload *payload, in tpm2_key_decode() argument 119 ret = asn1_ber_decoder(&tpm2key_decoder, &ctx, payload->blob, in tpm2_key_decode() 120 payload->blob_len); in tpm2_key_decode() 232 * tpm2_seal_trusted() - seal the payload of a trusted key 235 * @payload: the key data in clear and encrypted form 241 struct trusted_key_payload *payload, in tpm2_seal_trusted() argument [all …]
|
/openbmc/slpd-lite/test/ |
H A D | test-suite.py | 14 print("Invalid Lang Tag Length, large payload") 15 payload = ( variable 26 ret = sock.sendto(payload, addr) 30 print("Large Lang Tag Length, large payload") 31 payload = ( variable 42 ret = sock.sendto(payload, addr) 46 print("Invalid Lang Tag Length, small payload") 47 payload = ( variable 58 ret = sock.sendto(payload, addr) 62 print("Large Lang Tag Length, small payload") [all …]
|
/openbmc/linux/drivers/net/ethernet/netronome/nfp/flower/ |
H A D | tunnel_conf.c | 210 struct nfp_tun_active_tuns *payload; in nfp_tunnel_keep_alive() local 217 payload = nfp_flower_cmsg_get_data(skb); in nfp_tunnel_keep_alive() 218 count = be32_to_cpu(payload->count); in nfp_tunnel_keep_alive() 225 if (pay_len != struct_size(payload, tun_info, count)) { in nfp_tunnel_keep_alive() 232 ipv4_addr = payload->tun_info[i].ipv4; in nfp_tunnel_keep_alive() 233 port = be32_to_cpu(payload->tun_info[i].egress_port); in nfp_tunnel_keep_alive() 252 struct nfp_tun_active_tuns_v6 *payload; in nfp_tunnel_keep_alive_v6() local 259 payload = nfp_flower_cmsg_get_data(skb); in nfp_tunnel_keep_alive_v6() 260 count = be32_to_cpu(payload->count); in nfp_tunnel_keep_alive_v6() 267 if (pay_len != struct_size(payload, tun_info, count)) { in nfp_tunnel_keep_alive_v6() [all …]
|
/openbmc/phosphor-host-ipmid/test/message/ |
H A D | payload.cpp | 27 TEST(Payload, InputSize) in TEST() argument 31 ipmi::message::Payload p(std::forward<ipmi::SecureBuffer>(i)); in TEST() 35 TEST(Payload, OutputSize) in TEST() argument 37 ipmi::message::Payload p; in TEST() 47 TEST(Payload, Resize) in TEST() argument 50 ipmi::message::Payload p; in TEST() 56 TEST(Payload, Data) in TEST() argument 59 ipmi::message::Payload p; in TEST() 67 ipmi::message::Payload p; in TEST() 75 ipmi::message::Payload p; in TEST() [all …]
|
/openbmc/linux/drivers/net/ipa/ |
H A D | ipa_cmd.c | 30 * has a well-defined format, having a payload of a known length. This 32 * immediate command's opcode. The payload for a command resides in AP 136 /* Immediate command payload */ 258 struct ipa_cmd_register_write *payload; in ipa_cmd_register_write_offset_valid() local 268 bit_count = BITS_PER_BYTE * sizeof(payload->offset); in ipa_cmd_register_write_offset_valid() 366 struct ipa_cmd_hw_ip_fltrt_init *payload; in ipa_cmd_table_init_add() local 387 payload = &cmd_payload->table_init; in ipa_cmd_table_init_add() 391 payload->hash_rules_addr = cpu_to_le64(hash_addr); in ipa_cmd_table_init_add() 392 payload->flags = cpu_to_le64(val); in ipa_cmd_table_init_add() 393 payload->nhash_rules_addr = cpu_to_le64(addr); in ipa_cmd_table_init_add() [all …]
|
/openbmc/google-misc/subprojects/libcr51sign/src/ |
H A D | libcr51sign_mauv.c | 33 // Verify BLOB magic bytes in payload's image descriptor at the expected offset 39 // @param[in] payload_blob_offset Absolute offset of payload BLOB data in 40 // payload's image descriptor 61 CPRINTS(ctx, "%s: Could not read BLOB magic bytes from payload\n", in verify_payload_blob_magic() 68 CPRINTS(ctx, "%s: BLOB magic bytes read from payload(%x) are invalid\n", in verify_payload_blob_magic() 76 // Find offset of Image MAUV data in payload BLOB inside the image descriptor 83 // payload BLOB magic bytes in image 85 // @param[in] payload_blob_size Size of payload BLOB as per its image 88 // data in payload's image 91 // payload's image descriptor [all …]
|
/openbmc/phosphor-net-ipmid/ |
H A D | crypt_algo.hpp | 18 * algorithm field that is used for encrypted payload data under the session. 19 * The ‘encrypted’ bit in the payload type field being set identifies packets 21 * When payload data is encrypted, there may be additional “Confidentiality 23 * payload. The size and definition of those fields is specific to the 56 * @brief Decrypt the incoming payload 60 * @param[in] payloadLen - Length of the encrypted IPMI payload 62 * @return decrypted payload if the operation is successful 69 * @brief Encrypt the outgoing payload 71 * @param[in] payload - plain payload for the outgoing IPMI packet 73 * @return encrypted payload if the operation is successful [all …]
|
/openbmc/phosphor-net-ipmid/sol/ |
H A D | sol_context.hpp | 16 * Operation/Status in an outbound SOL payload format(BMC to Remote Console). 43 * Operation/Status in an Inbound SOL Payload format(Remote Console to BMC). 70 /** @struct Payload 72 * SOL Payload Data Format.The following fields make up the SOL payload in an 75 struct Payload struct 95 * packets under the IPMI session. At the payload level, SOL packets include 127 * @return outbound sequence number to populate the SOL payload. 151 * interfaces to handle incoming SOL payload, send response and send outbound 152 * SOL payload. 166 * This is called by the SOL Manager when a SOL payload instance is [all …]
|
/openbmc/phosphor-networkd/src/ |
H A D | ncsi_cmd.cpp | 59 " " << progname << " <options> raw TYPE [PAYLOAD...]\n" in print_usage() 60 " " << progname << " <options> oem [PAYLOAD...]\n" in print_usage() 71 "raw TYPE [PAYLOAD...]\n" in print_usage() 72 " Send a single command using raw type/payload data.\n" in print_usage() 74 " PAYLOAD Command payload bytes, as hex\n" in print_usage() 76 "oem PAYLOAD\n" in print_usage() 78 " PAYLOAD Command payload bytes, as hex\n"; in print_usage() 103 std::vector<unsigned char> payload; in parsePayload() local 105 /* we support two formats of payload - all as one argument: in parsePayload() 122 std::cerr << "Invalid payload length " << len0 in parsePayload() [all …]
|
/openbmc/linux/drivers/platform/surface/aggregator/ |
H A D | ssh_parser.c | 97 * @payload: The parsed payload (output). 100 * Parses and validates a SSH frame, including its payload, from the given 102 * writes the limits of the frame payload to the provided @payload span 109 * the %NULL pointer and the payload span will be set to the null span (start 114 * payload) CRC is invalid, or %-EMSGSIZE if the SSH message is bigger than 118 struct ssh_frame **frame, struct ssam_span *payload, in sshp_parse_frame() argument 126 payload->ptr = NULL; in sshp_parse_frame() 127 payload->len = 0; in sshp_parse_frame() 158 /* Pin down payload. */ in sshp_parse_frame() 161 /* Check for frame + payload length. */ in sshp_parse_frame() [all …]
|