Home
last modified time | relevance | path

Searched +full:uuid +full:- +full:dev (Results 1 – 25 of 174) sorted by relevance

1234567

/openbmc/qemu/tests/unit/
H A Dtest-virtio-dmabuf.c2 * QEMU tests for shared dma-buf API
22 #include "hw/virtio/virtio-dmabuf.h"
27 QemuUUID uuid; in test_add_remove_resources() local
31 qemu_uuid_generate(&uuid); in test_add_remove_resources()
34 g_assert(virtio_add_dmabuf(&uuid, dmabuf_fd)); in test_add_remove_resources()
35 g_assert_cmpint(virtio_lookup_dmabuf(&uuid), ==, dmabuf_fd); in test_add_remove_resources()
37 g_assert(virtio_remove_resource(&uuid)); in test_add_remove_resources()
39 g_assert_cmpint(virtio_lookup_dmabuf(&uuid), ==, -1); in test_add_remove_resources()
45 QemuUUID uuid; in test_add_remove_dev() local
46 struct vhost_dev *dev = g_new0(struct vhost_dev, 1); in test_add_remove_dev() local
[all …]
/openbmc/qemu/hw/display/
H A Dvirtio-dmabuf.c2 * Virtio Shared dma-buf
10 * See the COPYING file in the top-level directory.
15 #include "hw/virtio/virtio-dmabuf.h"
22 * uuid_equal_func: wrapper for UUID is_equal function to
30 static bool virtio_add_resource(QemuUUID *uuid, VirtioSharedObject *value) in virtio_add_resource() argument
41 if (g_hash_table_lookup(resource_uuids, uuid) == NULL) { in virtio_add_resource()
42 g_hash_table_insert(resource_uuids, uuid, value); in virtio_add_resource()
51 bool virtio_add_dmabuf(QemuUUID *uuid, int udmabuf_fd) in virtio_add_dmabuf() argument
59 vso->type = TYPE_DMABUF; in virtio_add_dmabuf()
60 vso->value = GINT_TO_POINTER(udmabuf_fd); in virtio_add_dmabuf()
[all …]
/openbmc/qemu/include/hw/virtio/
H A Dvirtio-dmabuf.h2 * Virtio Shared dma-buf
10 * See the COPYING file in the top-level directory.
16 #include "qemu/uuid.h"
31 * virtio_add_dmabuf() - Add a new dma-buf resource to the lookup table
32 * @uuid: new resource's UUID
33 * @dmabuf_fd: the dma-buf descriptor that will be stored and shared with
37 * Note: @dmabuf_fd must be a valid (non-negative) file descriptor.
39 * Return: true if the UUID did not exist and the resource has been added,
40 * false if another resource with the same UUID already existed.
41 * Note that if it finds a repeated UUID, the resource is not inserted in
[all …]
/openbmc/u-boot/drivers/tee/
H A Dsandbox.c1 // SPDX-License-Identifier: GPL-2.0+
18 * struct ta_entry - TA entries
19 * @uuid: UUID of an emulated TA
26 struct tee_optee_ta_uuid uuid; member
163 { .uuid = TA_AVB_UUID,
170 static void sandbox_tee_get_version(struct udevice *dev, in sandbox_tee_get_version() argument
180 static int sandbox_tee_close_session(struct udevice *dev, u32 session) in sandbox_tee_close_session() argument
182 struct sandbox_tee_state *state = dev_get_priv(dev); in sandbox_tee_close_session()
184 if (!state->ta || state->session != session) in sandbox_tee_close_session()
185 return -EINVAL; in sandbox_tee_close_session()
[all …]
/openbmc/qemu/subprojects/libvhost-user/
H A Dlibvhost-user.h8 * Marc-André Lureau <mlureau@redhat.com>
11 * later. See the COPYING file in the top-level directory.
23 #include "standard-headers/linux/virtio_ring.h"
25 /* Based on qemu/hw/virtio/vhost-user.c */
36 * limit is sufficient to support many DIMMs and virtio-mem in
37 * "dynamic-memslots" mode.
75 #define VHOST_USER_PROTOCOL_FEATURE_MASK ((1 << VHOST_USER_PROTOCOL_F_MAX) - 1)
186 unsigned char uuid[UUID_LEN]; member
235 typedef uint64_t (*vu_get_features_cb) (VuDev *dev);
236 typedef void (*vu_set_features_cb) (VuDev *dev, uint64_t features);
[all …]
/openbmc/u-boot/cmd/
H A Dfs_uuid.c1 // SPDX-License-Identifier: GPL-2.0+
3 * cmd_fs_uuid.c -- fsuuid command
20 "Look up a filesystem UUID",
21 "<interface> <dev>:<part>\n"
22 " - print filesystem UUID\n"
23 "fsuuid <interface> <dev>:<part> <varname>\n"
24 " - set environment variable to filesystem UUID\n"
H A Dpart.c1 // SPDX-License-Identifier: GPL-2.0+
8 * esd gmbh <www.esd-electronics.com>
9 * Reinhard Arlt <reinhard.arlt@esd-electronics.com>
13 * (C) Copyright 2003 - 2004
14 * Sysgo Real-Time Solutions, AG <www.elinos.com>
45 env_set(argv[2], info.uuid); in do_part_uuid()
47 printf("%s\n", info.uuid); in do_part_uuid()
65 if (argv[i][0] == '-') { in do_part_list()
66 if (!strcmp(argv[i], "-bootable")) { in do_part_list()
141 if (part == -1) in do_part_info()
[all …]
H A Dgpt.c1 // SPDX-License-Identifier: GPL-2.0+
3 * cmd_gpt.c -- GPT (GUID Partition Table) handling command
31 * @param str - pointer to string
32 * @param env - pointer to pointer to extracted env
34 * @return - zero on successful expand and env is set
38 int ret = -1; in extract_env()
45 return -1; in extract_env()
47 if (!((strncmp(str, "${", 2) == 0) && (str[strlen(str) - 1] == '}'))) in extract_env()
48 return -1; in extract_env()
52 return -1; in extract_env()
[all …]
/openbmc/u-boot/include/configs/
H A Dtrats.h1 /* SPDX-License-Identifier: GPL-2.0+ */
12 #include <configs/exynos4-common.h>
42 - GENERATED_GBL_DATA_SIZE)
53 #define CONFIG_ENV_OFFSET ((32 - 4) << 10) /* 32KiB - 4KiB */
57 /* Tizen - partitions definitions */
58 #define PARTS_CSA "csa-mmc"
68 "name="PARTS_CSA",start=5MiB,size=8MiB,uuid=${uuid_gpt_"PARTS_CSA"};" \
69 "name="PARTS_BOOT",size=60MiB,uuid=${uuid_gpt_"PARTS_BOOT"};" \
70 "name="PARTS_QBOOT",size=100MiB,uuid=${uuid_gpt_"PARTS_QBOOT"};" \
71 "name="PARTS_CSC",size=150MiB,uuid=${uuid_gpt_"PARTS_CSC"};" \
[all …]
H A Dtrats2.h1 /* SPDX-License-Identifier: GPL-2.0+ */
13 #include <configs/exynos4-common.h>
40 - GENERATED_GBL_DATA_SIZE)
48 #define CONFIG_ENV_OFFSET ((32 - 4) << 10) /* 32KiB - 4KiB */
52 /* Tizen - partitions definitions */
53 #define PARTS_CSA "csa-mmc"
63 "name="PARTS_CSA",start=5MiB,size=8MiB,uuid=${uuid_gpt_"PARTS_CSA"};" \
64 "name="PARTS_BOOT",size=60MiB,uuid=${uuid_gpt_"PARTS_BOOT"};" \
65 "name="PARTS_QBOOT",size=100MiB,uuid=${uuid_gpt_"PARTS_QBOOT"};" \
66 "name="PARTS_CSC",size=150MiB,uuid=${uuid_gpt_"PARTS_CSC"};" \
[all …]
H A Ds5p_goni.h1 /* SPDX-License-Identifier: GPL-2.0+ */
49 /* USB Composite download gadget - g_dnl */
63 #define PARTS_CSA "csa-mmc"
64 #define PARTS_BOOTLOADER "u-boot"
72 "u-boot raw 0x80 0x400;" \
74 "exynos3-goni.dtb ext4 0 2;" \
79 "name="PARTS_CSA",size=8MiB,uuid=${uuid_gpt_"PARTS_CSA"};" \
81 "uuid=${uuid_gpt_"PARTS_BOOTLOADER"};" \
82 "name="PARTS_BOOT",size=100MiB,uuid=${uuid_gpt_"PARTS_BOOT"};" \
83 "name="PARTS_ROOT",size=1GiB,uuid=${uuid_gpt_"PARTS_ROOT"};" \
[all …]
/openbmc/openbmc/meta-security/recipes-core/initrdscripts/initramfs-framework-dm/
H A Ddmverity13 . /usr/share/misc/dm-verity.env
16 delay=${bootparam_rootdelay:-1}
17 timeout=${bootparam_roottimeout:-5}
20 if [ "${SEPARATE_HASH}" -eq "1" ]; then
21 while [ ! -b "/dev/disk/by-partuuid/${ROOT_UUID}" ]; do
22 if [ $(( $C * $delay )) -gt $timeout ]; then
32 --data-block-size=${DATA_BLOCK_SIZE} \
34 /dev/disk/by-partuuid/${ROOT_UUID} \
35 /dev/disk/by-partuuid/${RHASH_UUID} \
39 -o ro \
[all …]
/openbmc/u-boot/test/dm/
H A Dtee.c1 // SPDX-License-Identifier: GPL-2.0+
14 static int open_session(struct udevice *dev, u32 *session) in open_session() argument
17 const struct tee_optee_ta_uuid uuid = TA_AVB_UUID; in open_session() local
21 tee_optee_ta_uuid_to_octets(arg.uuid, &uuid); in open_session()
22 rc = tee_open_session(dev, &arg, 0, NULL); in open_session()
26 return -EIO; in open_session()
32 static int invoke_func(struct udevice *dev, u32 session) in invoke_func() argument
41 if (tee_invoke_func(dev, &arg, 1, &param) || arg.ret) in invoke_func()
42 return -1; in invoke_func()
49 return vers->gen_caps & TEE_GEN_CAP_GP; in match()
[all …]
/openbmc/u-boot/include/environment/ti/
H A Dboot.h1 /* SPDX-License-Identifier: GPL-2.0+ */
21 ",uuid=${uuid_gpt_vbmeta};"
31 "name=bootloader,start=384K,size=1792K,uuid=${uuid_gpt_bootloader};" \
32 "name=rootfs,start=2688K,size=-,uuid=${uuid_gpt_rootfs}\0" \
36 "name=xloader,start=128K,size=256K,uuid=${uuid_gpt_xloader};" \
37 "name=bootloader,size=2048K,uuid=${uuid_gpt_bootloader};" \
38 "name=uboot-env,start=2432K,size=256K,uuid=${uuid_gpt_reserved};" \
39 "name=misc,size=128K,uuid=${uuid_gpt_misc};" \
40 "name=recovery,size=40M,uuid=${uuid_gpt_recovery};" \
41 "name=boot,size=10M,uuid=${uuid_gpt_boot};" \
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/
H A D0004-FF-A-v15-arm_ffa-introduce-Arm-FF-A-support.patch4 Subject: [PATCH] FF-A v15: arm_ffa: introduce Arm FF-A support
6 Add Arm FF-A support implementing Arm Firmware Framework for Armv8-A v1.0
8 The Firmware Framework for Arm A-profile processors (FF-A v1.0) [1]
13 This driver uses 64-bit registers as per SMCCCv1.2 spec and comes
14 on top of the SMCCC layer. The driver provides the FF-A ABIs needed for
15 querying the FF-A framework from the secure world.
18 32-bit data of the Xn registers.
20 All supported ABIs come with their 32-bit version except FFA_RXTX_MAP
21 which has 64-bit version supported.
23 Both 32-bit and 64-bit direct messaging are supported which allows both
[all …]
H A D0003-FF-A-v15-lib-uuid-introduce-testcase-for-uuid_str_to.patch4 Subject: [PATCH] FF-A v15: lib: uuid: introduce testcase for
9 Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
10 Reviewed-by: Simon Glass <sjg@chromium.org>
12 Upstream-Status: Submitted [cover letter: https://lore.kernel.org/all/20230713132847.176000-1-abdel…
13 ---
16 test/lib/uuid.c | 41 +++++++++++++++++++++++++++++++++++++++++
18 create mode 100644 test/lib/uuid.c
20 diff --git a/MAINTAINERS b/MAINTAINERS
22 --- a/MAINTAINERS
24 @@ -1632,3 +1632,8 @@ S: Maintained
[all …]
/openbmc/openbmc/poky/meta/recipes-kernel/lttng/babeltrace2/
H A D0001-tests-fix-test-applications-in-cpp-common.patch4 Subject: [PATCH] Tests: fix test applications in cpp-common are needed to
5 re-build
7 Test applications in cpp-common directory are needed to re-build when
10 make[3]: *** No rule to make target 'cpp-common/test-c-string-view.cpp',
11 needed by 'cpp-common/test-c-string-view.o'.
13 needed by 'cpp-common/test-c-string-view'.
15 needed by 'cpp-common/test-c-string-view'.
17 needed by 'cpp-common/test-c-string-view'.
19 make[2]: *** [Makefile:1274: check-TESTS] Error 2
20 make[1]: *** [Makefile:1805: check-am] Error 2
[all …]
/openbmc/qemu/hw/acpi/
H A Dcxl.c26 #include "hw/mem/memory-device.h"
28 #include "hw/acpi/aml-build.h"
29 #include "hw/acpi/bios-linker-loader.h"
32 #include "qemu/uuid.h"
34 void build_cxl_dsm_method(Aml *dev) in build_cxl_dsm_method() argument
40 Aml *function, *uuid; in build_cxl_dsm_method() local
42 uuid = aml_arg(0); in build_cxl_dsm_method()
46 uuid, aml_touuid("F365F9A6-A7DE-4071-A66A-B40C0B4F8E52"))); in build_cxl_dsm_method()
71 * Return: A package containing two elements - a WORD that returns in build_cxl_dsm_method()
100 aml_append(dev, method); in build_cxl_dsm_method()
[all …]
H A Dipmi.c7 * See the COPYING file in the top-level directory.
12 #include "hw/acpi/aml-build.h"
24 switch (info->memspace) { in aml_ipmi_crs()
26 aml_append(crs, aml_io(AML_DECODE16, info->base_address, in aml_ipmi_crs()
27 info->base_address + info->register_length - 1, in aml_ipmi_crs()
28 info->register_spacing, info->register_length)); in aml_ipmi_crs()
36 info->base_address, in aml_ipmi_crs()
37 info->base_address + info->register_length - 1, in aml_ipmi_crs()
38 info->register_spacing, info->register_length)); in aml_ipmi_crs()
46 info->base_address, in aml_ipmi_crs()
[all …]
/openbmc/qemu/hw/ipmi/
H A Dpci_ipmi_bt.c31 #define TYPE_PCI_IPMI_BT "pci-ipmi-bt"
35 PCIDevice dev; member
38 uint32_t uuid; member
45 ipmi_bt_get_fwinfo(&pib->bt, info); in pci_ipmi_bt_get_fwinfo()
46 info->irq_source = IPMI_PCI_IRQ; in pci_ipmi_bt_get_fwinfo()
47 info->interrupt_number = pci_intx(&pib->dev); in pci_ipmi_bt_get_fwinfo()
48 info->i2c_slave_address = pib->bt.bmc->slave_addr; in pci_ipmi_bt_get_fwinfo()
49 info->uuid = pib->uuid; in pci_ipmi_bt_get_fwinfo()
54 PCIIPMIBTDevice *pib = ib->opaque; in pci_ipmi_raise_irq()
56 pci_set_irq(&pib->dev, true); in pci_ipmi_raise_irq()
[all …]
H A Dpci_ipmi_kcs.c31 #define TYPE_PCI_IPMI_KCS "pci-ipmi-kcs"
35 PCIDevice dev; member
38 uint32_t uuid; member
45 ipmi_kcs_get_fwinfo(&pik->kcs, info); in pci_ipmi_kcs_get_fwinfo()
46 info->irq_source = IPMI_PCI_IRQ; in pci_ipmi_kcs_get_fwinfo()
47 info->interrupt_number = pci_intx(&pik->dev); in pci_ipmi_kcs_get_fwinfo()
48 info->uuid = pik->uuid; in pci_ipmi_kcs_get_fwinfo()
53 PCIIPMIKCSDevice *pik = ik->opaque; in pci_ipmi_raise_irq()
55 pci_set_irq(&pik->dev, true); in pci_ipmi_raise_irq()
60 PCIIPMIKCSDevice *pik = ik->opaque; in pci_ipmi_lower_irq()
[all …]
H A Disa_ipmi_bt.c31 #include "hw/qdev-properties.h"
36 #define TYPE_ISA_IPMI_BT "isa-ipmi-bt"
40 ISADevice dev; member
44 uint32_t uuid; member
51 ipmi_bt_get_fwinfo(&iib->bt, info); in isa_ipmi_bt_get_fwinfo()
52 info->irq_source = IPMI_ISA_IRQ; in isa_ipmi_bt_get_fwinfo()
53 info->interrupt_number = iib->isairq; in isa_ipmi_bt_get_fwinfo()
54 info->i2c_slave_address = iib->bt.bmc->slave_addr; in isa_ipmi_bt_get_fwinfo()
55 info->uuid = iib->uuid; in isa_ipmi_bt_get_fwinfo()
60 ISAIPMIBTDevice *iib = ib->opaque; in isa_ipmi_bt_raise_irq()
[all …]
H A Disa_ipmi_kcs.c31 #include "hw/qdev-properties.h"
36 #define TYPE_ISA_IPMI_KCS "isa-ipmi-kcs"
40 ISADevice dev; member
44 uint32_t uuid; member
51 ipmi_kcs_get_fwinfo(&iik->kcs, info); in isa_ipmi_kcs_get_fwinfo()
52 info->irq_source = IPMI_ISA_IRQ; in isa_ipmi_kcs_get_fwinfo()
53 info->interrupt_number = iik->isairq; in isa_ipmi_kcs_get_fwinfo()
54 info->uuid = iik->uuid; in isa_ipmi_kcs_get_fwinfo()
59 ISAIPMIKCSDevice *iik = ik->opaque; in isa_ipmi_kcs_raise_irq()
61 qemu_irq_raise(iik->irq); in isa_ipmi_kcs_raise_irq()
[all …]
/openbmc/u-boot/include/
H A Dtee.h1 /* SPDX-License-Identifier: GPL-2.0+ */
55 * struct tee_optee_ta_uuid - OP-TEE Trusted Application (TA) UUID format
57 * Used to identify an OP-TEE TA and define suitable to initialize structs
60 * OP-TEE. See RFC4122 for details on the format.
70 * struct tee_shm - memory shared with the TEE
71 * @dev: The TEE device
78 struct udevice *dev; member
86 * struct tee_param_memref - memory reference for a Trusted Application
100 * struct tee_param_value - value parameter for a Trusted Application
112 * struct tee_param - invoke parameter for a Trusted Application
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/minifi-cpp/files/
H A D0002-Fix-osspuuid-build.patch9 Upstream-Status: Inappropriate [embedded specific]
11 Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
12 ---
13 cmake/BundledOSSPUUID.cmake | 10 +++++-----
14 .../ossp-uuid/ossp-uuid-cross-compile-fix.patch | 13 +++++++++++++
15 2 files changed, 18 insertions(+), 5 deletions(-)
16 create mode 100644 thirdparty/ossp-uuid/ossp-uuid-cross-compile-fix.patch
18 diff --git a/cmake/BundledOSSPUUID.cmake b/cmake/BundledOSSPUUID.cmake
20 --- a/cmake/BundledOSSPUUID.cmake
22 @@ -23,10 +23,12 @@ function(use_bundled_osspuuid SOURCE_DIR BINARY_DIR)
[all …]

1234567