/openbmc/qemu/hw/virtio/ |
H A D | virtio-pci.c | 73 VirtIOPCIProxy *proxy = to_virtio_pci_proxy_fast(d); in virtio_pci_notify() local 75 if (msix_enabled(&proxy->pci_dev)) { in virtio_pci_notify() 77 msix_notify(&proxy->pci_dev, vector); in virtio_pci_notify() 80 VirtIODevice *vdev = virtio_bus_get_device(&proxy->bus); in virtio_pci_notify() 81 pci_set_irq(&proxy->pci_dev, qatomic_read(&vdev->isr) & 1); in virtio_pci_notify() 87 VirtIOPCIProxy *proxy = to_virtio_pci_proxy(d); in virtio_pci_save_config() local 88 VirtIODevice *vdev = virtio_bus_get_device(&proxy->bus); in virtio_pci_save_config() 90 pci_device_save(&proxy->pci_dev, f); in virtio_pci_save_config() 91 msix_save(&proxy->pci_dev, f); in virtio_pci_save_config() 92 if (msix_present(&proxy->pci_dev)) in virtio_pci_save_config() [all …]
|
H A D | virtio-mmio.c | 40 VirtIOMMIOProxy *proxy = VIRTIO_MMIO(d); in virtio_mmio_ioeventfd_enabled() local 42 return (proxy->flags & VIRTIO_IOMMIO_FLAG_USE_IOEVENTFD) != 0; in virtio_mmio_ioeventfd_enabled() 49 VirtIOMMIOProxy *proxy = VIRTIO_MMIO(d); in virtio_mmio_ioeventfd_assign() local 52 memory_region_add_eventfd(&proxy->iomem, VIRTIO_MMIO_QUEUE_NOTIFY, 4, in virtio_mmio_ioeventfd_assign() 55 memory_region_del_eventfd(&proxy->iomem, VIRTIO_MMIO_QUEUE_NOTIFY, 4, in virtio_mmio_ioeventfd_assign() 61 static void virtio_mmio_start_ioeventfd(VirtIOMMIOProxy *proxy) in virtio_mmio_start_ioeventfd() argument 63 virtio_bus_start_ioeventfd(&proxy->bus); in virtio_mmio_start_ioeventfd() 66 static void virtio_mmio_stop_ioeventfd(VirtIOMMIOProxy *proxy) in virtio_mmio_stop_ioeventfd() argument 68 virtio_bus_stop_ioeventfd(&proxy->bus); in virtio_mmio_stop_ioeventfd() 71 static void virtio_mmio_soft_reset(VirtIOMMIOProxy *proxy) in virtio_mmio_soft_reset() argument [all …]
|
/openbmc/linux/drivers/gpu/drm/i915/gt/uc/ |
H A D | intel_gsc_proxy.c | 20 * GSC proxy: 24 * and back. i915 must manually start the proxy flow after the GSC is loaded to 28 * The proxy flow is as follow: 30 * 2 - GSC replies with the proxy header + payload for CSME 31 * 3 - i915 sends the reply from GSC as-is to CSME via the mei proxy component 32 * 4 - CSME replies with the proxy header + payload for GSC 49 /* FW-defined proxy header */ 53 * Bits 0-7: type of the proxy message (see enum intel_gsc_proxy_type) 55 * Bits 16-31: length in bytes of the payload following the proxy header 61 u32 source; /* Source of the Proxy message */ [all …]
|
H A D | intel_gsc_uc.c | 34 /* setup proxy on a new load */ in gsc_work() 40 * The HuC auth can be done both before or after the proxy init; in gsc_work() 41 * if done after, a proxy request will be issued and must be in gsc_work() 43 * Since this worker also handles proxy requests, we can't in gsc_work() 44 * perform an action that requires the proxy from within it and in gsc_work() 47 * first and do proxy later. The GSC will ack the HuC auth and in gsc_work() 48 * then send the HuC proxy request as part of the proxy init in gsc_work() 60 gt_err(gt, "Proxy request received with GSC not loaded!\n"); in gsc_work() 68 * A proxy failure right after firmware load means the proxy-init in gsc_work() 72 "GSC proxy handler failed to init\n"); in gsc_work() [all …]
|
/openbmc/openbmc/poky/meta/recipes-connectivity/connman/connman-gnome/ |
H A D | connman-gnome-fix-dbus-interface-name.patch | 27 - ret = connman_set_property(proxy, "IPv4.Configuration", &value, NULL); 28 + ret = net_connman_set_property(proxy, "IPv4.Configuration", &value, NULL); 30 g_object_unref(proxy); 36 - connman_set_property(proxy, "Powered", &value, &error); 37 + net_connman_set_property(proxy, "Powered", &value, &error); 49 DBusGProxy *proxy; 51 if (proxy == NULL) 54 - connman_scan_async(proxy, callback, user_data); 55 + net_connman_scan_async(proxy, callback, user_data); 57 g_object_unref(proxy); [all …]
|
/openbmc/openbmc/poky/scripts/ |
H A D | oe-git-proxy | 3 # oe-git-proxy is a simple tool to be via GIT_PROXY_COMMAND. It uses socat 4 # to make SOCKS5 or HTTPS proxy connections. 5 # It uses ALL_PROXY or all_proxy or http_proxy to determine the proxy server, 7 # It uses NO_PROXY to skip using the proxy for a comma delimited list of 13 # ALL_PROXY=https://proxy.example.com:8080 26 echo 'oe-git-proxy: error: the following arguments are required: host port' 27 echo 'Usage: oe-git-proxy host port' 29 echo 'OpenEmbedded git-proxy - a simple tool to be used via GIT_PROXY_COMMAND.' 30 echo 'It uses socat to make SOCKS or HTTPS proxy connections.' 31 echo 'It uses ALL_PROXY to determine the proxy server, protocol, and port.' [all …]
|
/openbmc/openbmc/poky/meta-poky/conf/templates/default/ |
H A D | site.conf.sample | 3 # such as proxy server addresses and optionally any shared download location 9 # Uncomment to cause CVS to use the proxy host specified 10 #CVS_PROXY_HOST = "proxy.example.com" 15 #http-proxy-host = proxy.example.com 16 #http-proxy-port = 81 19 # To use git with a proxy, you must use an external git proxy command, such as 20 # the one provided by scripts/oe-git-proxy. To use this script, copy it to 22 #GIT_PROXY_COMMAND ?= "oe-git-proxy" 25 #ALL_PROXY ?= "https://proxy.example.com:8080" 26 # If you wish to use certain hosts without the proxy, specify them in NO_PROXY. [all …]
|
/openbmc/sdbusplus/include/sdbusplus/async/ |
H A D | client.hpp | 3 #include <sdbusplus/async/proxy.hpp> 16 /** An aggregation class of sdbusplus::async::proxy-based client types. 21 * Like a `proxy`, the class only becomes functional once the service and 29 sdbusplus::async::proxy_ns::proxy<S, P, false, Preserved>>... 33 using Proxy = sdbusplus::async::proxy_ns::proxy<S, P, false, Preserved>; typedef in sdbusplus::async::client::client 37 Proxy proxy{}; member in sdbusplus::async::client::client 48 : context_ref(ctx), Types<Self, Proxy>(Proxy{})... in client() 51 /* Conversion constructor for a non-empty (Service and/or Path) proxy. */ 52 explicit client(sdbusplus::async::context& ctx, Proxy p) in client() 54 : context_ref(ctx), Types<Self, Proxy>(p)..., proxy(p) in client() [all …]
|
H A D | proxy.hpp | 17 /** A (client-side) proxy to a dbus object. 23 * The proxy is a holder of these 3 addresses. 25 * One all 3 pieces of the address are known by the proxy, the proxy 37 * constexpr auto systemd = sdbusplus::async::proxy() 43 * The proxy object can be filled as information is available and attempts 46 * proxy to leave a scope where it would be no longer safe to use the 48 * to transform an existing proxy into one which is safe to leave (because 53 struct proxy : private sdbusplus::bus::details::bus_friend struct 68 constexpr proxy() 71 constexpr proxy() [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/ |
H A D | 0007-plat-corstone1000-Initialize-capsule-update-provider.patch | 6 Initializes the capsule update service provider in se-proxy-sp.c deployment 12 .../se-proxy/env/commonsp/se_proxy_sp.c | 14 +++++++++- 14 .../se-proxy/infra/service_proxy_factory.h | 1 + 17 diff --git a/deployments/se-proxy/env/commonsp/se_proxy_sp.c b/deployments/se-proxy/env/commonsp/se… 19 --- a/deployments/se-proxy/env/commonsp/se_proxy_sp.c 20 +++ b/deployments/se-proxy/env/commonsp/se_proxy_sp.c 36 + EMSG("Failed to create Capsule Update proxy"); 49 diff --git a/deployments/se-proxy/infra/corstone1000/service_proxy_factory.c b/deployments/se-proxy… 51 --- a/deployments/se-proxy/infra/corstone1000/service_proxy_factory.c 52 +++ b/deployments/se-proxy/infra/corstone1000/service_proxy_factory.c [all …]
|
/openbmc/sdbusplus/tools/sdbusplus/templates/ |
H A D | interface.client.hpp.mako | 16 template <typename Client, typename Proxy> 26 template <typename Client = void, typename Proxy = void> 30 details::${interface.classname}<Client, Proxy>> 36 details::${interface.classname}<Client, Proxy>>( 44 template <typename Client, typename Proxy> 65 // Conversion constructor from proxy used by client_t. 66 explicit constexpr ${interface.classname}(Proxy p) : 67 proxy(p.interface(interface)) 76 decltype(std::declval<Proxy>().interface(interface)) proxy = {};
|
/openbmc/linux/include/drm/ |
H A D | i915_gsc_proxy_mei_interface.h | 15 * struct i915_gsc_proxy_component_ops - ops for GSC Proxy services. 17 * @send: sends a proxy message from GSC FW to ME FW 18 * @recv: receives a proxy message for GSC FW from ME FW 24 * send - Sends a proxy message to ME FW. 33 * recv - Receives a proxy message from ME FW. 44 * MEI drivers for GSC proxy services 45 * @mei_dev: device that provide the GSC proxy service. 46 * @ops: Ops implemented by GSC proxy driver, used by i915 driver.
|
/openbmc/linux/Documentation/devicetree/bindings/mailbox/ |
H A D | ti,secure-proxy.yaml | 4 $id: http://devicetree.org/schemas/mailbox/ti,secure-proxy.yaml# 7 title: Texas Instruments' Secure Proxy 13 The Texas Instruments' secure proxy is a mailbox controller that has 25 const: ti,am654-secure-proxy 30 Contains the secure proxy thread ID used for the specific transfer path. 48 secure proxy thread in the form 'rx_<PID>'. 55 proxy. 71 compatible = "ti,am654-secure-proxy";
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-core/dbus/ |
H A D | dbus-daemon-proxy_git.bb | 3 LIC_FILES_CHKSUM = "file://dbus-daemon-proxy.c;endline=19;md5=41df6d21fe1c97d6a1cc22a5bf374cba" 8 SRC_URI = "git://github.com/alban/dbus-daemon-proxy;branch=master;protocol=https \ 9 file://0001-dbus-daemon-proxy-Return-DBUS_HANDLER_RESULT_NOT_YET.patch \ 20 …${CC} ${CFLAGS} -o dbus-daemon-proxy dbus-daemon-proxy.c `pkg-config --cflags --libs dbus-glib-1` … 25 install -m 0755 dbus-daemon-proxy ${D}${bindir}
|
/openbmc/openbmc/meta-openembedded/meta-filesystems/dynamic-layers/meta-python/recipes-support/gpiod-sysfs-proxy/ |
H A D | gpiod-sysfs-proxy_0.1.1.bb | 11 file://gpiod-sysfs-proxy.service.in \ 14 file://gpiod-sysfs-proxy.init.in \ 32 …install -m 0644 ${UNPACKDIR}/gpiod-sysfs-proxy.service.in ${D}${systemd_system_unitdir}/gpiod-sysf… 44 … sed -i "s/@mountpoint@/$MOUNTPOINT/g" ${D}${systemd_system_unitdir}/gpiod-sysfs-proxy.service 47 … install -m 0755 ${UNPACKDIR}/gpiod-sysfs-proxy.init.in ${D}${sysconfdir}/init.d/gpiod-sysfs-proxy 48 sed -i "s/@mountpoint@/$MOUNTPOINT/g" ${D}${sysconfdir}/init.d/gpiod-sysfs-proxy 52 SYSTEMD_SERVICE:${PN} = "gpiod-sysfs-proxy.service" 55 INITSCRIPT_NAME = "gpiod-sysfs-proxy"
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-core/dbus/dbus-daemon-proxy/ |
H A D | 0001-dbus-daemon-proxy-Return-DBUS_HANDLER_RESULT_NOT_YET.patch | 4 Subject: [PATCH] dbus-daemon-proxy: Return DBUS_HANDLER_RESULT_NOT_YET_HANDLED 14 dbus-daemon-proxy.c | 2 +- 17 diff --git a/dbus-daemon-proxy.c b/dbus-daemon-proxy.c 19 --- a/dbus-daemon-proxy.c 20 +++ b/dbus-daemon-proxy.c
|
/openbmc/qemu/backends/ |
H A D | dbus-vmstate.c | 105 g_autoptr(GDBusProxy) proxy = NULL; in dbus_get_proxies() 110 proxy = g_dbus_proxy_new_sync(self->bus, G_DBUS_PROXY_FLAGS_NONE, in dbus_get_proxies() 116 if (!proxy) { in dbus_get_proxies() 118 warn_report("%s: Failed to create proxy: %s", in dbus_get_proxies() 125 result = g_dbus_proxy_get_cached_property(proxy, "Id"); in dbus_get_proxies() 128 g_clear_object(&proxy); in dbus_get_proxies() 135 g_clear_object(&proxy); in dbus_get_proxies() 144 if (!g_hash_table_insert(proxies, id, proxy)) { in dbus_get_proxies() 150 proxy = NULL; in dbus_get_proxies() 171 dbus_load_state_proxy(GDBusProxy *proxy, const uint8_t *data, size_t size) in dbus_load_state_proxy() argument [all …]
|
/openbmc/linux/arch/powerpc/boot/dts/fsl/ |
H A D | p4080si-post.dtsi | 218 dcsr-cpu-sb-proxy@40000 { 219 compatible = "fsl,dcsr-e500mc-sb-proxy", "fsl,dcsr-cpu-sb-proxy"; 223 dcsr-cpu-sb-proxy@41000 { 224 compatible = "fsl,dcsr-e500mc-sb-proxy", "fsl,dcsr-cpu-sb-proxy"; 228 dcsr-cpu-sb-proxy@42000 { 229 compatible = "fsl,dcsr-e500mc-sb-proxy", "fsl,dcsr-cpu-sb-proxy"; 233 dcsr-cpu-sb-proxy@43000 { 234 compatible = "fsl,dcsr-e500mc-sb-proxy", "fsl,dcsr-cpu-sb-proxy"; 238 dcsr-cpu-sb-proxy@44000 { 239 compatible = "fsl,dcsr-e500mc-sb-proxy", "fsl,dcsr-cpu-sb-proxy"; [all …]
|
/openbmc/skeleton/libopenbmc_intf/ |
H A D | openbmc_intf.h | 244 Fan *proxy, 251 Fan *proxy, 256 Fan *proxy, 262 Fan *proxy, 268 Fan *proxy, 274 Fan *proxy, 280 Fan *proxy, 287 Fan *proxy, 292 Fan *proxy, 508 SensorValue *proxy, [all …]
|
H A D | openbmc_intf.c | 1001 HwmonProxy *proxy = HWMON_PROXY (object); in G_DEFINE_TYPE_WITH_CODE() local 1002 g_datalist_clear (&proxy->priv->qdata); in G_DEFINE_TYPE_WITH_CODE() 1031 hwmon_proxy_set_property_cb (GDBusProxy *proxy, in hwmon_proxy_set_property_cb() argument 1039 _ret = g_dbus_proxy_call_finish (proxy, res, &error); in hwmon_proxy_set_property_cb() 1074 hwmon_proxy_g_signal (GDBusProxy *proxy, in hwmon_proxy_g_signal() argument 1092 g_value_set_object (¶mv[0], proxy); in hwmon_proxy_g_signal() 1120 HwmonProxy *proxy = HWMON_PROXY (_proxy); in hwmon_proxy_g_properties_changed() local 1129 g_datalist_remove_data (&proxy->priv->qdata, key); in hwmon_proxy_g_properties_changed() 1131 g_object_notify (G_OBJECT (proxy), info->hyphen_name); in hwmon_proxy_g_properties_changed() 1137 g_datalist_remove_data (&proxy->priv->qdata, invalidated_properties[n]); in hwmon_proxy_g_properties_changed() [all …]
|
/openbmc/openbmc/meta-phosphor/recipes-connectivity/jsnbd/ |
H A D | jsnbd_git.bb | 1 SUMMARY = "Network Block Device Proxy" 21 install -d ${D}${sysconfdir}/nbd-proxy/ 22 install -m 0644 ${NBD_PROXY_CONFIG_JSON} ${D}${sysconfdir}/nbd-proxy/config.json 23 install -m 0755 ${UNPACKDIR}/state_hook ${D}${sysconfdir}/nbd-proxy/state 26 FILES:${PN} += "${sysconfdir}/nbd-proxy/state"
|
/openbmc/openbmc-build-scripts/ |
H A D | build-setup.sh | 11 # http_proxy The HTTP address of the proxy server to connect to. 12 # Default: "", proxy is not setup if this is not set 112 PROXY="" 161 PROXY="RUN echo \"proxy=${http_proxy}\" >> /etc/dnf/dnf.conf" 167 ${PROXY} 215 …PROXY="RUN echo \"Acquire::http::Proxy \\"\"${http_proxy}/\\"\";\" > /etc/apt/apt.conf.d/000apt-ca… 221 ${PROXY} 299 cat > ${WORKSPACE}/bin/git-proxy << \EOF_GIT 302 PROXY=${PROXY_HOST} 304 exec socat STDIO PROXY:\${PROXY}:\${1}:\${2},proxyport=\${PROXY_PORT} [all …]
|
/openbmc/openbmc/poky/meta/lib/oeqa/selftest/cases/ |
H A D | oescripts.py | 75 res = runCmd('%s/oe-git-proxy --help' % self.scripts_dir, assert_error=False) 82 os.environ['ALL_PROXY'] = "https://proxy.example.com:3128" 83 os.environ['NO_PROXY'] = "*.example.com,.no-proxy.org,192.168.42.0/24,127.*.*.*" 90 # outside, use the proxy 91 res = runCmd('%s%s/oe-git-proxy host.outside-example.com 9418' % 93 self.assertIn('PROXY:', res.output) 95 res = runCmd('%s%s/oe-git-proxy host.example.com 9418' % 99 res = runCmd('%s%s/oe-git-proxy host.no-proxy.org 9418' % 103 res = runCmd('%s%s/oe-git-proxy 192.168.42.42 9418' % 107 res = runCmd('%s%s/oe-git-proxy 127.1.2.3 9418' % [all …]
|
/openbmc/qemu/include/hw/virtio/ |
H A D | virtio-pci.h | 176 static inline bool virtio_pci_modern(VirtIOPCIProxy *proxy) in virtio_pci_modern() argument 178 return !proxy->disable_modern; in virtio_pci_modern() 181 static inline bool virtio_pci_legacy(VirtIOPCIProxy *proxy) in virtio_pci_legacy() argument 183 return proxy->disable_legacy == ON_OFF_AUTO_OFF; in virtio_pci_legacy() 186 static inline void virtio_pci_force_virtio_1(VirtIOPCIProxy *proxy) in virtio_pci_force_virtio_1() argument 188 proxy->disable_modern = false; in virtio_pci_force_virtio_1() 189 proxy->disable_legacy = ON_OFF_AUTO_ON; in virtio_pci_force_virtio_1() 192 static inline void virtio_pci_disable_modern(VirtIOPCIProxy *proxy) in virtio_pci_disable_modern() argument 194 proxy->disable_modern = true; in virtio_pci_disable_modern() 277 int virtio_pci_add_shm_cap(VirtIOPCIProxy *proxy, uint8_t bar, uint64_t offset,
|
/openbmc/u-boot/doc/device-tree-bindings/mailbox/ |
H A D | k3-secure-proxy.txt | 1 Texas Instruments' K3 Secure Proxy 4 The Texas Instruments' K3 Secure Proxy is a mailbox controller that has 8 Secure Proxy Device Node: 12 - compatible: Shall be: "ti,am654-secure-proxy" 23 compatible = "ti,am654-secure-proxy";
|