| /openbmc/qemu/tests/unit/ |
| H A D | test-virtio-dmabuf.c | 2 * QEMU tests for shared dma-buf API 22 #include "hw/virtio/virtio-dmabuf.h" 27 QemuUUID uuid; in test_add_remove_resources() local 31 qemu_uuid_generate(&uuid); in test_add_remove_resources() 34 g_assert(virtio_add_dmabuf(&uuid, dmabuf_fd)); in test_add_remove_resources() 35 g_assert_cmpint(virtio_lookup_dmabuf(&uuid), ==, dmabuf_fd); in test_add_remove_resources() 37 g_assert(virtio_remove_resource(&uuid)); in test_add_remove_resources() 39 g_assert_cmpint(virtio_lookup_dmabuf(&uuid), ==, -1); in test_add_remove_resources() 45 QemuUUID uuid; in test_add_remove_dev() local 46 struct vhost_dev *dev = g_new0(struct vhost_dev, 1); in test_add_remove_dev() local [all …]
|
| /openbmc/qemu/hw/display/ |
| H A D | virtio-dmabuf.c | 2 * Virtio Shared dma-buf 10 * See the COPYING file in the top-level directory. 15 #include "hw/virtio/virtio-dmabuf.h" 22 * uuid_equal_func: wrapper for UUID is_equal function to 30 static bool virtio_add_resource(QemuUUID *uuid, VirtioSharedObject *value) in virtio_add_resource() argument 41 if (g_hash_table_lookup(resource_uuids, uuid) == NULL) { in virtio_add_resource() 42 g_hash_table_insert(resource_uuids, uuid, value); in virtio_add_resource() 51 bool virtio_add_dmabuf(QemuUUID *uuid, int udmabuf_fd) in virtio_add_dmabuf() argument 59 vso->type = TYPE_DMABUF; in virtio_add_dmabuf() 60 vso->value = GINT_TO_POINTER(udmabuf_fd); in virtio_add_dmabuf() [all …]
|
| /openbmc/qemu/include/hw/virtio/ |
| H A D | virtio-dmabuf.h | 2 * Virtio Shared dma-buf 10 * See the COPYING file in the top-level directory. 16 #include "qemu/uuid.h" 31 * virtio_add_dmabuf() - Add a new dma-buf resource to the lookup table 32 * @uuid: new resource's UUID 33 * @dmabuf_fd: the dma-buf descriptor that will be stored and shared with 37 * Note: @dmabuf_fd must be a valid (non-negative) file descriptor. 39 * Return: true if the UUID did not exist and the resource has been added, 40 * false if another resource with the same UUID already existed. 41 * Note that if it finds a repeated UUID, the resource is not inserted in [all …]
|
| /openbmc/u-boot/drivers/tee/ |
| H A D | sandbox.c | 1 // SPDX-License-Identifier: GPL-2.0+ 18 * struct ta_entry - TA entries 19 * @uuid: UUID of an emulated TA 26 struct tee_optee_ta_uuid uuid; member 163 { .uuid = TA_AVB_UUID, 170 static void sandbox_tee_get_version(struct udevice *dev, in sandbox_tee_get_version() argument 180 static int sandbox_tee_close_session(struct udevice *dev, u32 session) in sandbox_tee_close_session() argument 182 struct sandbox_tee_state *state = dev_get_priv(dev); in sandbox_tee_close_session() 184 if (!state->ta || state->session != session) in sandbox_tee_close_session() 185 return -EINVAL; in sandbox_tee_close_session() [all …]
|
| /openbmc/qemu/subprojects/libvhost-user/ |
| H A D | libvhost-user.h | 8 * Marc-André Lureau <mlureau@redhat.com> 11 * later. See the COPYING file in the top-level directory. 23 #include "standard-headers/linux/virtio_ring.h" 25 /* Based on qemu/hw/virtio/vhost-user.c */ 36 * limit is sufficient to support many DIMMs and virtio-mem in 37 * "dynamic-memslots" mode. 75 #define VHOST_USER_PROTOCOL_FEATURE_MASK ((1 << VHOST_USER_PROTOCOL_F_MAX) - 1) 186 unsigned char uuid[UUID_LEN]; member 235 typedef uint64_t (*vu_get_features_cb) (VuDev *dev); 236 typedef void (*vu_set_features_cb) (VuDev *dev, uint64_t features); [all …]
|
| /openbmc/u-boot/cmd/ |
| H A D | fs_uuid.c | 1 // SPDX-License-Identifier: GPL-2.0+ 3 * cmd_fs_uuid.c -- fsuuid command 20 "Look up a filesystem UUID", 21 "<interface> <dev>:<part>\n" 22 " - print filesystem UUID\n" 23 "fsuuid <interface> <dev>:<part> <varname>\n" 24 " - set environment variable to filesystem UUID\n"
|
| H A D | part.c | 1 // SPDX-License-Identifier: GPL-2.0+ 8 * esd gmbh <www.esd-electronics.com> 9 * Reinhard Arlt <reinhard.arlt@esd-electronics.com> 13 * (C) Copyright 2003 - 2004 14 * Sysgo Real-Time Solutions, AG <www.elinos.com> 45 env_set(argv[2], info.uuid); in do_part_uuid() 47 printf("%s\n", info.uuid); in do_part_uuid() 65 if (argv[i][0] == '-') { in do_part_list() 66 if (!strcmp(argv[i], "-bootable")) { in do_part_list() 141 if (part == -1) in do_part_info() [all …]
|
| H A D | gpt.c | 1 // SPDX-License-Identifier: GPL-2.0+ 3 * cmd_gpt.c -- GPT (GUID Partition Table) handling command 31 * @param str - pointer to string 32 * @param env - pointer to pointer to extracted env 34 * @return - zero on successful expand and env is set 38 int ret = -1; in extract_env() 45 return -1; in extract_env() 47 if (!((strncmp(str, "${", 2) == 0) && (str[strlen(str) - 1] == '}'))) in extract_env() 48 return -1; in extract_env() 52 return -1; in extract_env() [all …]
|
| /openbmc/u-boot/include/configs/ |
| H A D | trats.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 12 #include <configs/exynos4-common.h> 42 - GENERATED_GBL_DATA_SIZE) 53 #define CONFIG_ENV_OFFSET ((32 - 4) << 10) /* 32KiB - 4KiB */ 57 /* Tizen - partitions definitions */ 58 #define PARTS_CSA "csa-mmc" 68 "name="PARTS_CSA",start=5MiB,size=8MiB,uuid=${uuid_gpt_"PARTS_CSA"};" \ 69 "name="PARTS_BOOT",size=60MiB,uuid=${uuid_gpt_"PARTS_BOOT"};" \ 70 "name="PARTS_QBOOT",size=100MiB,uuid=${uuid_gpt_"PARTS_QBOOT"};" \ 71 "name="PARTS_CSC",size=150MiB,uuid=${uuid_gpt_"PARTS_CSC"};" \ [all …]
|
| H A D | trats2.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 13 #include <configs/exynos4-common.h> 40 - GENERATED_GBL_DATA_SIZE) 48 #define CONFIG_ENV_OFFSET ((32 - 4) << 10) /* 32KiB - 4KiB */ 52 /* Tizen - partitions definitions */ 53 #define PARTS_CSA "csa-mmc" 63 "name="PARTS_CSA",start=5MiB,size=8MiB,uuid=${uuid_gpt_"PARTS_CSA"};" \ 64 "name="PARTS_BOOT",size=60MiB,uuid=${uuid_gpt_"PARTS_BOOT"};" \ 65 "name="PARTS_QBOOT",size=100MiB,uuid=${uuid_gpt_"PARTS_QBOOT"};" \ 66 "name="PARTS_CSC",size=150MiB,uuid=${uuid_gpt_"PARTS_CSC"};" \ [all …]
|
| H A D | s5p_goni.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 49 /* USB Composite download gadget - g_dnl */ 63 #define PARTS_CSA "csa-mmc" 64 #define PARTS_BOOTLOADER "u-boot" 72 "u-boot raw 0x80 0x400;" \ 74 "exynos3-goni.dtb ext4 0 2;" \ 79 "name="PARTS_CSA",size=8MiB,uuid=${uuid_gpt_"PARTS_CSA"};" \ 81 "uuid=${uuid_gpt_"PARTS_BOOTLOADER"};" \ 82 "name="PARTS_BOOT",size=100MiB,uuid=${uuid_gpt_"PARTS_BOOT"};" \ 83 "name="PARTS_ROOT",size=1GiB,uuid=${uuid_gpt_"PARTS_ROOT"};" \ [all …]
|
| /openbmc/openbmc/meta-security/recipes-core/initrdscripts/initramfs-framework-dm/ |
| H A D | dmverity | 13 . /usr/share/misc/dm-verity.env 16 delay=${bootparam_rootdelay:-1} 17 timeout=${bootparam_roottimeout:-5} 20 if [ "${SEPARATE_HASH}" -eq "1" ]; then 21 while [ ! -b "/dev/disk/by-partuuid/${ROOT_UUID}" ]; do 22 if [ $(( $C * $delay )) -gt $timeout ]; then 32 --data-block-size=${DATA_BLOCK_SIZE} \ 34 /dev/disk/by-partuuid/${ROOT_UUID} \ 35 /dev/disk/by-partuuid/${RHASH_UUID} \ 39 -o ro \ [all …]
|
| /openbmc/u-boot/test/dm/ |
| H A D | tee.c | 1 // SPDX-License-Identifier: GPL-2.0+ 14 static int open_session(struct udevice *dev, u32 *session) in open_session() argument 17 const struct tee_optee_ta_uuid uuid = TA_AVB_UUID; in open_session() local 21 tee_optee_ta_uuid_to_octets(arg.uuid, &uuid); in open_session() 22 rc = tee_open_session(dev, &arg, 0, NULL); in open_session() 26 return -EIO; in open_session() 32 static int invoke_func(struct udevice *dev, u32 session) in invoke_func() argument 41 if (tee_invoke_func(dev, &arg, 1, ¶m) || arg.ret) in invoke_func() 42 return -1; in invoke_func() 49 return vers->gen_caps & TEE_GEN_CAP_GP; in match() [all …]
|
| /openbmc/u-boot/include/environment/ti/ |
| H A D | boot.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 21 ",uuid=${uuid_gpt_vbmeta};" 31 "name=bootloader,start=384K,size=1792K,uuid=${uuid_gpt_bootloader};" \ 32 "name=rootfs,start=2688K,size=-,uuid=${uuid_gpt_rootfs}\0" \ 36 "name=xloader,start=128K,size=256K,uuid=${uuid_gpt_xloader};" \ 37 "name=bootloader,size=2048K,uuid=${uuid_gpt_bootloader};" \ 38 "name=uboot-env,start=2432K,size=256K,uuid=${uuid_gpt_reserved};" \ 39 "name=misc,size=128K,uuid=${uuid_gpt_misc};" \ 40 "name=recovery,size=40M,uuid=${uuid_gpt_recovery};" \ 41 "name=boot,size=10M,uuid=${uuid_gpt_boot};" \ [all …]
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/ |
| H A D | 0004-FF-A-v15-arm_ffa-introduce-Arm-FF-A-support.patch | 4 Subject: [PATCH] FF-A v15: arm_ffa: introduce Arm FF-A support 6 Add Arm FF-A support implementing Arm Firmware Framework for Armv8-A v1.0 8 The Firmware Framework for Arm A-profile processors (FF-A v1.0) [1] 13 This driver uses 64-bit registers as per SMCCCv1.2 spec and comes 14 on top of the SMCCC layer. The driver provides the FF-A ABIs needed for 15 querying the FF-A framework from the secure world. 18 32-bit data of the Xn registers. 20 All supported ABIs come with their 32-bit version except FFA_RXTX_MAP 21 which has 64-bit version supported. 23 Both 32-bit and 64-bit direct messaging are supported which allows both [all …]
|
| H A D | 0003-FF-A-v15-lib-uuid-introduce-testcase-for-uuid_str_to.patch | 4 Subject: [PATCH] FF-A v15: lib: uuid: introduce testcase for 9 Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com> 10 Reviewed-by: Simon Glass <sjg@chromium.org> 12 Upstream-Status: Submitted [cover letter: https://lore.kernel.org/all/20230713132847.176000-1-abdel… 13 --- 16 test/lib/uuid.c | 41 +++++++++++++++++++++++++++++++++++++++++ 18 create mode 100644 test/lib/uuid.c 20 diff --git a/MAINTAINERS b/MAINTAINERS 22 --- a/MAINTAINERS 24 @@ -1632,3 +1632,8 @@ S: Maintained [all …]
|
| /openbmc/openbmc/poky/meta/recipes-kernel/lttng/babeltrace2/ |
| H A D | 0001-tests-fix-test-applications-in-cpp-common.patch | 4 Subject: [PATCH] Tests: fix test applications in cpp-common are needed to 5 re-build 7 Test applications in cpp-common directory are needed to re-build when 10 make[3]: *** No rule to make target 'cpp-common/test-c-string-view.cpp', 11 needed by 'cpp-common/test-c-string-view.o'. 13 needed by 'cpp-common/test-c-string-view'. 15 needed by 'cpp-common/test-c-string-view'. 17 needed by 'cpp-common/test-c-string-view'. 19 make[2]: *** [Makefile:1274: check-TESTS] Error 2 20 make[1]: *** [Makefile:1805: check-am] Error 2 [all …]
|
| /openbmc/qemu/hw/acpi/ |
| H A D | cxl.c | 26 #include "hw/mem/memory-device.h" 28 #include "hw/acpi/aml-build.h" 29 #include "hw/acpi/bios-linker-loader.h" 32 #include "qemu/uuid.h" 34 void build_cxl_dsm_method(Aml *dev) in build_cxl_dsm_method() argument 40 Aml *function, *uuid; in build_cxl_dsm_method() local 42 uuid = aml_arg(0); in build_cxl_dsm_method() 46 uuid, aml_touuid("F365F9A6-A7DE-4071-A66A-B40C0B4F8E52"))); in build_cxl_dsm_method() 71 * Return: A package containing two elements - a WORD that returns in build_cxl_dsm_method() 100 aml_append(dev, method); in build_cxl_dsm_method() [all …]
|
| H A D | ipmi.c | 7 * See the COPYING file in the top-level directory. 12 #include "hw/acpi/aml-build.h" 24 switch (info->memspace) { in aml_ipmi_crs() 26 aml_append(crs, aml_io(AML_DECODE16, info->base_address, in aml_ipmi_crs() 27 info->base_address + info->register_length - 1, in aml_ipmi_crs() 28 info->register_spacing, info->register_length)); in aml_ipmi_crs() 36 info->base_address, in aml_ipmi_crs() 37 info->base_address + info->register_length - 1, in aml_ipmi_crs() 38 info->register_spacing, info->register_length)); in aml_ipmi_crs() 46 info->base_address, in aml_ipmi_crs() [all …]
|
| /openbmc/qemu/hw/ipmi/ |
| H A D | pci_ipmi_bt.c | 31 #define TYPE_PCI_IPMI_BT "pci-ipmi-bt" 35 PCIDevice dev; member 38 uint32_t uuid; member 45 ipmi_bt_get_fwinfo(&pib->bt, info); in pci_ipmi_bt_get_fwinfo() 46 info->irq_source = IPMI_PCI_IRQ; in pci_ipmi_bt_get_fwinfo() 47 info->interrupt_number = pci_intx(&pib->dev); in pci_ipmi_bt_get_fwinfo() 48 info->i2c_slave_address = pib->bt.bmc->slave_addr; in pci_ipmi_bt_get_fwinfo() 49 info->uuid = pib->uuid; in pci_ipmi_bt_get_fwinfo() 54 PCIIPMIBTDevice *pib = ib->opaque; in pci_ipmi_raise_irq() 56 pci_set_irq(&pib->dev, true); in pci_ipmi_raise_irq() [all …]
|
| H A D | pci_ipmi_kcs.c | 31 #define TYPE_PCI_IPMI_KCS "pci-ipmi-kcs" 35 PCIDevice dev; member 38 uint32_t uuid; member 45 ipmi_kcs_get_fwinfo(&pik->kcs, info); in pci_ipmi_kcs_get_fwinfo() 46 info->irq_source = IPMI_PCI_IRQ; in pci_ipmi_kcs_get_fwinfo() 47 info->interrupt_number = pci_intx(&pik->dev); in pci_ipmi_kcs_get_fwinfo() 48 info->uuid = pik->uuid; in pci_ipmi_kcs_get_fwinfo() 53 PCIIPMIKCSDevice *pik = ik->opaque; in pci_ipmi_raise_irq() 55 pci_set_irq(&pik->dev, true); in pci_ipmi_raise_irq() 60 PCIIPMIKCSDevice *pik = ik->opaque; in pci_ipmi_lower_irq() [all …]
|
| H A D | isa_ipmi_bt.c | 31 #include "hw/qdev-properties.h" 36 #define TYPE_ISA_IPMI_BT "isa-ipmi-bt" 40 ISADevice dev; member 44 uint32_t uuid; member 51 ipmi_bt_get_fwinfo(&iib->bt, info); in isa_ipmi_bt_get_fwinfo() 52 info->irq_source = IPMI_ISA_IRQ; in isa_ipmi_bt_get_fwinfo() 53 info->interrupt_number = iib->isairq; in isa_ipmi_bt_get_fwinfo() 54 info->i2c_slave_address = iib->bt.bmc->slave_addr; in isa_ipmi_bt_get_fwinfo() 55 info->uuid = iib->uuid; in isa_ipmi_bt_get_fwinfo() 60 ISAIPMIBTDevice *iib = ib->opaque; in isa_ipmi_bt_raise_irq() [all …]
|
| H A D | isa_ipmi_kcs.c | 31 #include "hw/qdev-properties.h" 36 #define TYPE_ISA_IPMI_KCS "isa-ipmi-kcs" 40 ISADevice dev; member 44 uint32_t uuid; member 51 ipmi_kcs_get_fwinfo(&iik->kcs, info); in isa_ipmi_kcs_get_fwinfo() 52 info->irq_source = IPMI_ISA_IRQ; in isa_ipmi_kcs_get_fwinfo() 53 info->interrupt_number = iik->isairq; in isa_ipmi_kcs_get_fwinfo() 54 info->uuid = iik->uuid; in isa_ipmi_kcs_get_fwinfo() 59 ISAIPMIKCSDevice *iik = ik->opaque; in isa_ipmi_kcs_raise_irq() 61 qemu_irq_raise(iik->irq); in isa_ipmi_kcs_raise_irq() [all …]
|
| /openbmc/u-boot/include/ |
| H A D | tee.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 55 * struct tee_optee_ta_uuid - OP-TEE Trusted Application (TA) UUID format 57 * Used to identify an OP-TEE TA and define suitable to initialize structs 60 * OP-TEE. See RFC4122 for details on the format. 70 * struct tee_shm - memory shared with the TEE 71 * @dev: The TEE device 78 struct udevice *dev; member 86 * struct tee_param_memref - memory reference for a Trusted Application 100 * struct tee_param_value - value parameter for a Trusted Application 112 * struct tee_param - invoke parameter for a Trusted Application [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/minifi-cpp/files/ |
| H A D | 0002-Fix-osspuuid-build.patch | 9 Upstream-Status: Inappropriate [embedded specific] 11 Signed-off-by: Yi Zhao <yi.zhao@windriver.com> 12 --- 13 cmake/BundledOSSPUUID.cmake | 10 +++++----- 14 .../ossp-uuid/ossp-uuid-cross-compile-fix.patch | 13 +++++++++++++ 15 2 files changed, 18 insertions(+), 5 deletions(-) 16 create mode 100644 thirdparty/ossp-uuid/ossp-uuid-cross-compile-fix.patch 18 diff --git a/cmake/BundledOSSPUUID.cmake b/cmake/BundledOSSPUUID.cmake 20 --- a/cmake/BundledOSSPUUID.cmake 22 @@ -23,10 +23,12 @@ function(use_bundled_osspuuid SOURCE_DIR BINARY_DIR) [all …]
|