/openbmc/docs/designs/mctp/ |
H A D | mctp-userspace.md | 20 provides a socket-based interface for other processes to send and receive 24 handling local MCTP-stack configuration, like local EID assignments. 30 2. one or more binding implementations (eg, MCTP-over-serial), which interact 33 3. an interface to handler applications over a unix-domain socket. 38 - an "upper" messaging transmit/receive interface, for tx/rx of a full message 41 - a "lower" hardware binding for transmit/receive of individual packets, 45 The lower interface would be plugged in to one of a number of hardware-specific 47 tree, but others can be plugged-in too, perhaps where the physical layer 48 implementation does not make sense to include in the platform-agnostic library. 56 for the library should also allow this re-use; a dual Apache & GPLv2+ licence [all …]
|
H A D | mctp-kernel.md | 1 # OpenBMC in-kernel MCTP 8 This document describes a kernel-based implementation of MCTP infrastructure, 9 providing a sockets-based API for MCTP communication within an OpenBMC-based 14 - The MCTP messaging API should be an obvious application of the existing POSIX 15 socket interface 17 - Configuration should be simple for a straightforward MCTP endpoint: a single 20 - Infrastructure should be flexible enough to allow for more complex MCTP 23 - each MCTP network (as defined by section 3.2.31 of DSP0236) may consist of 26 - multiple distinct (ie., non-bridged) networks, possibly containing 29 - multiple local EIDs on a single interface, and [all …]
|
/openbmc/linux/Documentation/networking/ |
H A D | kcm.rst | 1 .. SPDX-License-Identifier: GPL-2.0 7 Kernel Connection Multiplexor (KCM) is a mechanism that provides a message based 14 +------------+ +------------+ +------------+ +------------+ 15 | KCM socket | | KCM socket | | KCM socket | | KCM socket | 16 +------------+ +------------+ +------------+ +------------+ 18 +-----------+ | | +----------+ 20 +----------------------------------+ 22 +----------------------------------+ 24 +---------+ | | | ------------+ 26 +----------+ +----------+ +----------+ +----------+ +----------+ [all …]
|
H A D | rds.rst | 1 .. SPDX-License-Identifier: GPL-2.0 14 http://oss.oracle.com/pipermail/rds-devel/2007-November/000228.html 21 applications to use a single socket to talk to any other process in the 22 cluster - so in a cluster with N processes you need N sockets, in contrast 23 to N*N if you use a connection-oriented socket transport like TCP. 25 RDS is not Infiniband-specific; it was designed to support different 29 The high-level semantics of RDS from the application's point of view are 34 the end point of a connection. All socket operations that involve 39 transport has to be IP-based. In fact, RDS over IB uses a 46 * Socket interface [all …]
|
H A D | tls-offload.rst | 1 .. SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 13 For details regarding the user-facing interface refer to the TLS 18 * Software crypto mode (``TLS_SW``) - CPU handles the cryptography. 22 latency on socket reads (decryption only starts when a read syscall 24 * Packet-based NIC offload mode (``TLS_HW``) - the NIC handles crypto 28 (``ethtool`` flags ``tls-hw-tx-offload`` and ``tls-hw-rx-offload``). 29 * Full TCP NIC offload mode (``TLS_HW_RECORD``) - mode of operation where 33 abilities or QoS and packet scheduling (``ethtool`` flag ``tls-hw-record``). 35 The operation mode is selected automatically based on device configuration, 36 offload opt-in or opt-out on per-connection basis is not currently supported. [all …]
|
H A D | mctp.rst | 1 .. SPDX-License-Identifier: GPL-2.0 11 The core code provides a socket-based interface to send and receive MCTP 12 messages, through an AF_MCTP, SOCK_DGRAM socket. 24 A network defines a unique address space for MCTP endpoints by endpoint-ID 25 (described by DSP0236, section 3.2.31). A network has a user-visible identifier 39 -------------------- 41 MCTP uses ``AF_MCTP`` / ``PF_MCTP`` for the address- and protocol- families. 42 Since MCTP is message-based, only ``SOCK_DGRAM`` sockets are supported. 44 .. code-block:: C 46 int sd = socket(AF_MCTP, SOCK_DGRAM, 0); [all …]
|
/openbmc/qemu/docs/system/devices/ |
H A D | vhost-user.rst | 3 vhost-user back ends 4 -------------------- 6 vhost-user back ends are way to service the request of VirtIO devices 10 vhost-user device 15 a ``chardev`` option which specifies the ID of the ``--chardev`` 16 device that connects via a socket to the vhost-user *daemon*. 18 Each device will have an virtio-mmio and virtio-pci variant. See your 21 .. list-table:: vhost-user devices 23 :header-rows: 1 25 * - Device [all …]
|
H A D | net.rst | 4 ----------------- 10 devices or the non-privileged user mode network stack), or to other 12 socket host network backend). 24 As an example, you can download the ``linux-test-xxx.tar.gz`` archive 25 and copy the script ``qemu-ifup`` in ``/etc`` and configure properly 26 ``sudo`` so that the command ``ifconfig`` contained in ``qemu-ifup`` can 37 TAP-Win32. But it is not included in standard QEMU for Windows, so you 44 By using the option ``-net user`` (default configuration if no ``-net`` 49 guest (10.0.2.15) <------> Firewall/DHCP server <-----> Internet 52 ----> DNS server (10.0.2.3) [all …]
|
/openbmc/linux/Documentation/userspace-api/netlink/ |
H A D | intro-specs.rst | 1 .. SPDX-License-Identifier: BSD-3-Clause 21 - ``--spec`` - point to the spec file 22 - ``--do $name`` / ``--dump $name`` - issue request ``$name`` 23 - ``--json $attrs`` - provide attributes for the request 24 - ``--subscribe $group`` - receive notifications from ``$group`` 30 $ ./tools/net/ynl/cli.py --spec Documentation/netlink/specs/ethtool.yaml \ 31 --do rings-get \ 32 --json '{"header":{"dev-index": 18}}' 33 {'header': {'dev-index': 18, 'dev-name': 'eni1np1'}, 35 'rx-jumbo': 0, [all …]
|
/openbmc/u-boot/arch/sandbox/include/asm/ |
H A D | eth-raw-os.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 15 * struct eth_sandbox_raw_priv - raw socket session 17 * sd: socket descriptor - the open socket during a session 20 * device: struct sockaddr_ll - the host interface packets move to/from 22 * local_bindsd: socket descriptor to prevent the kernel from sending 40 char *if_name; /* Null-terminated name ("eth0", etc.) */ 50 * ifname - the interface name on the host to check 52 * returns - 0 if real interface, 1 if local, negative if error 57 * Look up the name of the interface based on the ifindex populated in priv. 59 * Overwrite the host_ifname member in priv based on looking up host_ifindex [all …]
|
/openbmc/linux/Documentation/driver-api/ |
H A D | connector.rst | 1 .. SPDX-License-Identifier: GPL-2.0 7 Kernel connector - new netlink based userspace <-> kernel space easy 11 netlink based network. One must register a callback and an identifier. 17 - socket(); 18 - bind(); 19 - send(); 20 - recv(); 25 netlink based networking for inter-process communication in a significantly 39 connector.h header for in-kernel usage. `void (*callback) (void *)` is a 59 .. kernel-doc:: include/linux/connector.h [all …]
|
/openbmc/linux/tools/testing/selftests/bpf/ |
H A D | cgroup_tcp_skb.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 4 /* Define states of a socket to tracking messages sending to and from the 5 * socket. 7 * These states are based on rfc9293 with some modifications to support 8 * tracking of messages sent out from a socket. For example, when a SYN is 9 * received, a new socket is transiting to the SYN_RECV state defined in 11 * SYN-ACK is sent out, it moves to SYN_RECV state. With this modification, 12 * we can track the message sent out from a socket.
|
/openbmc/qemu/docs/system/s390x/ |
H A D | cpu-topology.rst | 1 .. _cpu-topology-s390x: 8 tree-shaped hierarchy. 10 The socket container has one or more CPU entries. 13 - CPU type 14 - entitlement 15 - dedication 17 Each bit set in the bitmap correspond to a core-id of a vCPU with matching 23 monitor polarization changes, see ``docs/devel/s390-cpu-topology.rst``. 26 ------------- 31 The s390x host needs to use a Linux kernel v6.0 or newer (which provides the so-called [all …]
|
/openbmc/linux/net/iucv/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 5 prompt "IUCV support (S390 - z/VM only)" 7 Select this option if you want to use inter-user communication 14 prompt "AF_IUCV Socket support (S390 - z/VM and HiperSockets transport)" 16 Select this option if you want to use AF_IUCV socket applications 17 based on z/VM inter-user communication vehicle or based on
|
/openbmc/linux/Documentation/bpf/ |
H A D | prog_sk_lookup.rst | 1 .. SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 8 into the socket lookup performed by the transport layer when a packet is to be 11 When invoked BPF sk_lookup program can select a socket that will receive the 20 binding sockets to an address with ``bind()`` socket call is impractical, such 29 Such setups would require creating and ``bind()``'ing one socket to each of the 31 latency spikes during socket lookup. 47 find a listening (TCP) or an unconnected (UDP) socket for an incoming packet. 54 ``SK_PASS`` signifies that the socket lookup should continue on to regular 55 hashtable-based lookup, while ``SK_DROP`` causes the transport layer to drop the 58 A BPF sk_lookup program can also select a socket to receive the packet by [all …]
|
H A D | map_sockmap.rst | 1 .. SPDX-License-Identifier: GPL-2.0-only 9 - ``BPF_MAP_TYPE_SOCKMAP`` was introduced in kernel version 4.14 10 - ``BPF_MAP_TYPE_SOCKHASH`` was introduced in kernel version 4.18 13 redirect skbs between sockets or to apply policy at the socket level based on 19 index to look up a reference to a ``struct sock``. The map values are socket 21 holds references to sockets via their socket descriptors. 25 returning socket cookies to userspace. Returning the ``struct sock *`` that 26 the map holds to user-space is neither safe nor useful. 34 When a socket is inserted into one of these maps, its socket callbacks are 44 .. code-block:: c [all …]
|
/openbmc/qemu/backends/ |
H A D | spdm-socket.c | 1 /* SPDX-License-Identifier: BSD-3-Clause */ 3 * QEMU SPDM socket support 5 * This is based on: 6 …* https://github.com/DMTF/spdm-emu/blob/07c0a838bcc1c6207c656ac75885c0603e344b6f/spdm_emu/spdm_emu… 7 * but has been re-written to match QEMU style 14 #include "system/spdm-socket.h" 17 static bool read_bytes(const int socket, uint8_t *buffer, in read_bytes() argument 24 result = recv(socket, buffer + number_received, in read_bytes() 25 number_of_bytes - number_received, 0); in read_bytes() 34 static bool read_data32(const int socket, uint32_t *data) in read_data32() argument [all …]
|
/openbmc/qemu/python/qemu/machine/ |
H A D | qtest.py | 5 offer a connection to QEMU's qtest protocol socket, and a qtest-enabled 15 # the COPYING file in the top-level directory. 17 # Based on qmp.py. 21 import socket 37 QEMUQtestProtocol implements a connection to a qtest socket. 39 :param address: QEMU address, can be either a unix socket path (string) 42 :param sock: An existing socket can be provided as an alternative to 44 :param server: server mode, listens on the socket. Only meaningful 46 socket. 48 :raise socket.error: on socket connection errors [all …]
|
/openbmc/linux/Documentation/netlabel/ |
H A D | cipso_ipv4.rst | 12 The NetLabel CIPSO/IPv4 protocol engine is based on the IETF Commercial 15 (draft-ietf-cipso-ipsecurity-01.txt). While the IETF draft never made 16 it to an RFC standard it has become a de-facto standard for labeled 23 adding the CIPSO label to the socket. This causes all packets leaving the 24 system through the socket to have the CIPSO IP option applied. The socket's 26 that it is set upon the socket's creation. The LSM can set the socket's CIPSO 29 generated and attached to the socket. 38 This is typically done at the socket layer using the 'socket_sock_rcv_skb()'
|
/openbmc/obmc-console/ |
H A D | CHANGELOG.md | 5 The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/), 11 - Added 12 - Changed 13 - Deprecated 14 - Removed 15 - Fixed 16 - Security 22 1. config: Added support for the `aspeed-uart-routing` configuration key 23 2. config: Added support for the `ringbuffer-size` configuration key 26 More details can be found [in the documentation](docs/mux-support.md). [all …]
|
/openbmc/linux/net/handshake/ |
H A D | tlshd.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Establish a TLS session for a kernel socket consumer 8 * Copyright (c) 2021-2023, Oracle and/or its affiliates. 12 #include <linux/socket.h> 50 treq->th_timeout_ms = args->ta_timeout_ms; in tls_handshake_req_init() 51 treq->th_consumer_done = args->ta_done; in tls_handshake_req_init() 52 treq->th_consumer_data = args->ta_data; in tls_handshake_req_init() 53 treq->th_peername = args->ta_peername; in tls_handshake_req_init() 54 treq->th_keyring = args->ta_keyring; in tls_handshake_req_init() 55 treq->th_num_peerids = 0; in tls_handshake_req_init() [all …]
|
/openbmc/boost-dbus/include/dbus/detail/ |
H A D | watch_timeout.hpp | 28 boost::asio::generic::stream_protocol::socket &socket = in operator ()() local 29 *static_cast<boost::asio::generic::stream_protocol::socket *>(data); in operator ()() 31 watch_toggled(dbus_watch, &socket.get_io_service()); in operator ()() 41 auto socket = in watch_toggled() local 42 static_cast<boost::asio::generic::stream_protocol::socket *>(watch_data); in watch_toggled() 45 socket->async_read_some(boost::asio::null_buffers(), in watch_toggled() 49 socket->async_write_some(boost::asio::null_buffers(), in watch_toggled() 53 socket->cancel(); in watch_toggled() 66 if (fd == -1) in add_watch() 67 // socket based watches in add_watch() [all …]
|
/openbmc/linux/net/ipv6/netfilter/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 10 tristate "IPv6 socket lookup support" 12 This option enables the IPv6 socket lookup infrastructure. This 13 is used by the {ip6,nf}tables socket match. 66 This is a backwards-compat option for the user's convenience 107 frag matching allows you to match packets based on the fragmentation 113 tristate '"hbh" hop-by-hop and "dst" opts header match support' 116 This allows one to match packets based on the hop-by-hop 126 This is a backwards-compat option for the user's convenience 134 This module allows one to match packets based upon [all …]
|
/openbmc/linux/include/uapi/linux/ |
H A D | tipc.h | 1 /* SPDX-License-Identifier: ((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) */ 3 * include/uapi/linux/tipc.h: Header for TIPC socket interface 5 * Copyright (c) 2003-2006, 2015-2016 Ericsson AB 6 * Copyright (c) 2005, 2010-2011, Wind River Systems 65 * Application-accessible service types 71 #define TIPC_RESERVED_TYPES 64 /* lowest user-allowed service type */ 132 struct tipc_socket_addr port; /* associated socket */ 137 * Socket API 180 * TIPC-specific socket option names 184 #define TIPC_SRC_DROPPABLE 128 /* Default: based on socket type */ [all …]
|
/openbmc/linux/net/ipv4/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 40 so-called IP spoofing, however it can pose problems if you use 42 than packets from that host to you) or if you operate a non-routing 52 <file:Documentation/networking/ip-sysctl.rst>. 68 Normally, a router decides what to do with a received packet based 71 address into account. Furthermore, the TOS (Type-Of-Service) field 89 equal "cost" and chooses one of them in a non-deterministic fashion 110 of the routing table during kernel boot, based on either information 132 <file:Documentation/admin-guide/nfs/nfsroot.rst> for details. 147 Read <file:Documentation/admin-guide/nfs/nfsroot.rst> for details. [all …]
|