/openbmc/bmcweb/redfish-core/include/registries/ |
H A D | base_message_registry.hpp | 45 …"Indicates that while attempting to access, connect to, or transfer to or from another resource, t… 52 … "Attempt to ensure that the URI is correct and that the service has the appropriate credentials.", 57 … "Indicates that the account for the session was removed, and so the session was removed as well.", 67 "Indicates that the account was successfully modified.", 77 "Indicates that the modification requested for the account was not successful.", 87 "Indicates that the account was successfully removed.", 109 … "Indicates that the action supplied with the `POST` operation is not supported by the resource.", 121 … "Indicates that the action was supplied with a duplicated action parameter in the request body.", 134 …"Indicates that the action requested was missing an action parameter that is required to process t… 147 … "Indicates that the parameter supplied for the action is not supported on the resource.", [all …]
|
H A D | environmental_message_registry.hpp | 45 "Indicates that a fan has failed.", 57 "Indicates that a fan group has a critical status.", 69 "Indicates that a fan group has returned to normal operations.", 81 "Indicates that a fan group has a warning status.", 93 "Indicates that a fan was inserted or installed.", 105 "Indicates that a fan was removed.", 117 "Indicates that a fan was repaired or restored to normal operation.", 129 "Indicates that a filter was inserted or installed.", 141 "Indicates that a filter was removed.", 153 "Indicates that a filter requires service.", [all …]
|
H A D | fabric_message_registry.hpp | 45 "Indicates that an address pool was created.", 58 "Indicates that an address pool was modified.", 71 "Indicates that an address pool was removed.", 84 "Indicates that a cable has failed.", 97 "Indicates that a cable was inserted into a switch's port.", 110 "Indicates that a cable has returned to working condition.", 123 "Indicates that a cable was removed from a switch's port.", 136 "Indicates that a connection was created.", 149 "Indicates that a connection was modified.", 162 "Indicates that a connection was removed.", [all …]
|
/openbmc/qemu/docs/devel/migration/ |
H A D | main.rst | 7 QEMU has code to load/save the state of the guest that it is running. 9 that, saves the state for each device that the guest is running. 14 two times. I.e. it can only restore the state in one guest that has 15 the same devices that the one it was saved (this last requirement can 16 be relaxed a bit, but for now we can consider that configuration has 19 Once that we are able to save/restore a guest, a new functionality is 20 requested: migration. This means that QEMU is able to start in one 29 the guest to be stopped. Typically the time that the guest is 31 (notice that this depends on a lot of things). 38 The migration stream is normally just a byte stream that can be passed [all …]
|
H A D | vfio.rst | 5 Migration of virtual machine involves saving the state for each device that 12 accommodate VFIO devices that have a large amount of data that needs to be 22 and recommends that the initial bytes are sent and loaded in the destination 24 guarantee that and thus, can potentially reduce downtime even further. 26 To support migration of multiple devices that might do P2P transactions between 33 All the devices that support P2P migration are first transitioned to the P2P 48 * A ``save_setup`` function that sets up migration on the source. 50 * A ``load_setup`` function that sets the VFIO device on the destination in 53 * A ``state_pending_estimate`` function that reports an estimate of the 54 remaining pre-copy data that the vendor driver has yet to save for the VFIO [all …]
|
/openbmc/bmcweb/docs/ |
H A D | REDFISH_CHECKLIST.md | 7 that have not been completed. 10 that have been added or are used in the commit. 13 that this should include behavior changes that may not affect your system. 15 3. Verify that any additional properties exist in the CSDL schema in 20 Verify that the @odata.type on the schema on which you've added functionality 21 has a version that includes the parameters you've added 23 5. Verify that testing was performed per TESTING.md and it is documented in my 27 not the present commit, note that explicitly with "Tested on prior commit". 29 6. Ensure that you have written unit tests for any behavior that does not have 32 7. Read COMMON_ERRORS.md, and verify that to the best of your knowledge no [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/licenses/ |
H A D | FLTK | 13 The authors do request that such modifications be 19 2. Widgets that are subclassed from FLTK widgets do not 35 with programs that are linked to the FLTK library, nor 74 price. Our General Public Licenses are designed to make sure that you 76 this service if you wish), that you receive source code or can get it 77 if you want it, that you can change the software or use pieces of it 78 in new free programs; and that you know you can do these things. 80 To protect your rights, we need to make restrictions that forbid 86 or for a fee, you must give the recipients all the rights that we gave 87 you. You must make sure that they, too, receive or can get the source [all …]
|
H A D | Mini-XML-License | 20 with programs that are linked to the Mini-XML library, nor 51 price. Our General Public Licenses are designed to make sure that you 53 this service if you wish), that you receive source code or can get it 54 if you want it, that you can change the software or use pieces of it 55 in new free programs; and that you know you can do these things. 57 To protect your rights, we need to make restrictions that forbid 63 or for a fee, you must give the recipients all the rights that we gave 64 you. You must make sure that they, too, receive or can get the source 66 complete object files to the recipients so that they can relink them 75 that everyone understands that there is no warranty for this free [all …]
|
H A D | QWTv1.0 | 8 1. Widgets that are subclassed from Qwt widgets do not 24 with programs that are linked to the Qwt library, nor 67 not price. Our General Public Licenses are designed to make sure that 69 for this service if you wish); that you receive source code or can get 70 it if you want it; that you can change the software and use pieces of 71 it in new free programs; and that you are informed that you can do 74 To protect your rights, we need to make restrictions that forbid 80 or for a fee, you must give the recipients all the rights that we gave 81 you. You must make sure that they, too, receive or can get the source 83 complete object files to the recipients, so that they can relink them [all …]
|
H A D | SSPL-1 | 15 “Copyright” also means copyright-like laws that apply to other kinds of 30 To “propagate” a work means to do anything with it that, without 37 To “convey” a work means any kind of propagation that enables other 42 extent that it includes a convenient and prominently visible feature that 43 (1) displays an appropriate copyright notice, and (2) tells the user that 44 there is no warranty for the work (except to the extent that warranties 45 are provided), that licensees may convey the work under this License, and 56 A “Standard Interface” means an interface that either is an official 58 interfaces specified for a particular programming language, one that is 59 widely used among developers working in that language. The “System [all …]
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | LGPL-2.1-or-later | 31 Our General Public Licenses are designed to make sure that you have the freedom 33 wish); that you receive source code or can get it if you want it; that you 34 can change the software and use pieces of it in new free programs; and that 35 you are informed that you can do these things. 37 To protect your rights, we need to make restrictions that forbid distributors 43 a fee, you must give the recipients all the rights that we gave you. You must 44 make sure that they, too, receive or can get the source code. If you link 46 recipients, so that they can relink them with the library after making changes 54 To protect each distributor, we want to make it very clear that there is no 56 else and passed on, the recipients should know that what they have is not [all …]
|
H A D | LGPL-2.1-only | 20 …that you have the freedom to distribute copies of free software (and charge for this service if yo… 22 To protect your rights, we need to make restrictions that forbid distributors to deny you these rig… 24 …that we gave you. You must make sure that they, too, receive or can get the source code. If you li… 28 …that there is no warranty for the free library. Also, if the library is modified by someone else a… 30 …that a company cannot effectively restrict the users of a free program by obtaining a restrictive … 38 …ary, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to… 42 …reedom, it does ensure that the user of a program that is linked with the Library has the freedom … 44 …ntion to the difference between a "work based on the library" and a "work that uses the library". … 52 …ary" means either the Library or any derivative work under copyright law: that is to say, a work c… 56 …brary in a tool for writing it). Whether that is true depends on what the Library does and what th… [all …]
|
H A D | LGPL-2.0-or-later | 25 General Public Licenses are designed to make sure that you have the freedom 27 wish), that you receive source code or can get it if you want it, that you 28 can change the software or use pieces of it in new free programs; and that 31 To protect your rights, we need to make restrictions that forbid anyone to 37 a fee, you must give the recipients all the rights that we gave you. You must 38 make sure that they, too, receive or can get the source code. If you link 40 recipients so that they can relink them with the library, after making changes 48 Also, for each distributor's protection, we want to make certain that everyone 49 understands that there is no warranty for this free library. If the library 51 that what they have is not the original version, so that any problems introduced [all …]
|
H A D | LGPL-2.0-only | 35 …that you have the freedom to distribute copies of free software (and charge for this service if yo… 39 To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or… 43 …that we gave you. You must make sure that they, too, receive or can get the source code. If you li… 51 …that everyone understands that there is no warranty for this free library. If the library is modif… 55 …that companies distributing free software will individually obtain patent licenses, thus in effect… 59 …erent from the ordinary one; be sure to read it in full, and don't assume that anything in it is t… 63 The reason we have a separate public license for some libraries is that they blur the distinction w… 67 … sharing, because most developers did not use the libraries. We concluded that weaker conditions m… 71 …that are incorporated in them. (We have not seen how to achieve this as regards changes in header … 75 …ntion to the difference between a "work based on the library" and a "work that uses the library". … [all …]
|
H A D | NGPL | 9 …right to share NetHack. To make sure that you get the rights we want you to have, we need to make … 11 …that you have the right to give away copies of NetHack, that you receive source code or else can g… 13 …that everyone has such rights, we have to forbid you to deprive anyone else of these rights. For e… 15 …that everyone finds out that there is no warranty for NetHack. If NetHack is modified by someone e… 21 …ce code as you receive it, in any medium, provided that you keep intact the notices on all files t… 22 …ragraph 1 above (including distributing this License Agreement), provided that you also do the fol… 23 a) cause the modified files to carry prominent notices stating that you changed the files and the d… 25 …that you distribute or publish, that in whole or in part contains or is a derivative of NetHack or… 29 …e or executable form under the terms of Paragraphs 1 and 2 above provided that you also do one of … 37 … permitted to modify NetHack, or otherwise use parts of NetHack, provided that you comply with the…
|
H A D | Community-Spec-1.0 | 18 materials. Contributor also acknowledges that the Working Group may 25 That attribution must include, at minimum, the material’s name, 39 Contributor’s Contributions and 2) to the Draft Specification that 40 is within Scope as of the date of that Contribution, in both cases for 48 that are within Scope for Licensee’s Implementation of the Approved 59 extend only to Licensees that have indicated their agreement to this 77 claim in a court asserting that a Necessary Claim is infringed by an 79 are immediately terminated unless 1) that claim is directly in response 80 to a claim against Licensee regarding an Implementation, or 2) that claim 85 that any of Contributor’s copyrights or issued patent claims cover [all …]
|
H A D | LGPL-3.0-only | 16 An “Application” is any work that makes use of an interface provided by the Library, but which is n… 20 …ombined Work, excluding any source code for portions of the Combined Work that, considered in isol… 28 … a facility refers to a function or data to be supplied by an Application that uses the facility (… 30 …* a) under this License, provided that you make a good faith effort to ensure that, in the event a… 31 …under the GNU GPL, with none of the additional permissions of this License applicable to that copy. 35 …erial from a header file that is part of the Library. You may convey such object code under terms … 37 … Give prominent notice with each copy of the object code that the Library is used in it and that t… 42 You may convey a Combined Work under terms of your choice that, taken together, effectively do not … 44 …ive prominent notice with each copy of the Combined Work that the Library is used in it and that t… 46 …* c) For a Combined Work that displays copyright notices during execution, include the copyright n… [all …]
|
H A D | LGPL-3.0-or-later | 29 An "Application" is any work that makes use of an interface provided by the 44 Combined Work that, considered in isolation, are based on the Application, 62 refers to a function or data to be supplied by an Application that uses the 66 a) under this License, provided that you make a good faith effort to ensure 67 that, in the event an Application does not supply the function or data, the 72 applicable to that copy. 77 file that is part of the Library. You may convey such object code under terms 78 of your choice, provided that, if the incorporated material is not limited 83 a) Give prominent notice with each copy of the object code that the Library 84 is used in it and that the Library and its use are covered by this License. [all …]
|
H A D | LPPL-1.3c | 21 it is written in such a way that you can use it even if your work is 30 that work may be distributed. 32 We, the LaTeX3 Project, believe that the conditions below give you 34 that conform with whatever technical specifications you wish while 36 that work. If you do not see how to achieve your goal while 50 Any work that under any applicable law is derived from the Work. 53 Any procedure that produces a Derived Work under any applicable 60 To apply any procedure that produces a Derived Work under any 71 A version of the Work that has been processed into a form where it 75 other activities. Note that modification of any installation [all …]
|
H A D | SSPL-1.0 | 15 “Copyright” also means copyright-like laws that apply to other kinds of 30 To “propagate” a work means to do anything with it that, without 37 To “convey” a work means any kind of propagation that enables other 42 extent that it includes a convenient and prominently visible feature that 43 (1) displays an appropriate copyright notice, and (2) tells the user that 44 there is no warranty for the work (except to the extent that warranties 45 are provided), that licensees may convey the work under this License, and 56 A “Standard Interface” means an interface that either is an official 58 interfaces specified for a particular programming language, one that is 59 widely used among developers working in that language. The “System [all …]
|
H A D | Artistic-2.0 | 13 The intent is that the Copyright Holder maintains some artistic 14 control over the development of that Package while still keeping the 19 terms of this license do not permit the full use that you propose to 28 "Contributor" means any party that has contributed code or other 36 Copyright Holder, and derivatives of that collection and/or of 44 "Distributor Fee" means any fee that you charge for Distributing 71 Modified Versions for any purpose without restriction, provided that 79 either gratis or for a Distributor Fee, provided that you duplicate 94 Modified Version) provided that you clearly document how it differs 96 any non-standard features, executables, or modules, and provided that [all …]
|
/openbmc/u-boot/Licenses/ |
H A D | lgpl-2.1.txt | 28 not price. Our General Public Licenses are designed to make sure that 30 for this service if you wish); that you receive source code or can get 31 it if you want it; that you can change the software and use pieces of 32 it in new free programs; and that you are informed that you can do 35 To protect your rights, we need to make restrictions that forbid 41 or for a fee, you must give the recipients all the rights that we gave 42 you. You must make sure that they, too, receive or can get the source 44 complete object files to the recipients, so that they can relink them 52 To protect each distributor, we want to make it very clear that 55 that what they have is not the original version, so that the original [all …]
|
H A D | lgpl-2.0.txt | 25 price. Our General Public Licenses are designed to make sure that you 27 this service if you wish), that you receive source code or can get it 28 if you want it, that you can change the software or use pieces of it 29 in new free programs; and that you know you can do these things. 31 To protect your rights, we need to make restrictions that forbid 37 or for a fee, you must give the recipients all the rights that we gave 38 you. You must make sure that they, too, receive or can get the source 40 complete object files to the recipients so that they can relink them 49 that everyone understands that there is no warranty for this free 51 want its recipients to know that what they have is not the original [all …]
|
/openbmc/phosphor-host-ipmid/test/message/ |
H A D | unpack.cpp | 26 // check that the number of bytes matches in TEST() 28 // check that the payload was fully unpacked in TEST() 31 // check that the bytes were correctly unpacked (LSB first) in TEST() 40 // check that the number of bytes matches in TEST() 42 // check that the payload was not fully unpacked in TEST() 45 // check that the bytes were correctly unpacked (LSB first) in TEST() 54 // check that the number of bytes matches in TEST() 56 // check that the payload was not fully unpacked (comprehends unpack errors) in TEST() 58 // check that v is zero in TEST() 67 // check that the number of bytes matches in TEST() [all …]
|
/openbmc/docs/ |
H A D | meta-layer-guidelines.md | 5 "Why" section, to ensure that the intent is being met, and that if exceptions to 10 ## Meta layers should not patch projects that exist within the openBMC tree 15 the possibility that patches exist that repo maintainers aren't aware of makes 16 it much more likely that a single machine breaks, or we have behavior 19 Also, in general, the maintainer is there to ensure that the greater community, 33 PACKAGECONFIG entry that can be set to enable it. 39 Yocto itself is an open source project that accepts contributions. The more 40 changes that OpenBMC stacks against Yocto recipes, the more unmaintainable it 59 There are some OpenBMC projects that are utilized outside of OpenBMC. As such, 60 there are configuration items that are not intended to be used in OpenBMC, or [all …]
|