/openbmc/openbmc/poky/bitbake/lib/bb/pysh/ |
H A D | pyshlex.py | 368 remaining = token 440 token = ''.join(self._token) 443 return token, remaining 720 self._token = token 816 def on_token(self, token): argument 843 def on_token(self, token): argument 844 value, type = token 860 def token(self): member in PLYLexer 877 token = lexer.token() 878 if token is None: [all …]
|
/openbmc/linux/drivers/misc/cxl/ |
H A D | flash.c | 54 static int rcall(int token, char *buf, s32 scope) in rcall() argument 61 rc = rtas_call(token, 2, 1, NULL, rtas_data_buf, scope); in rcall() 114 int token; in update_node() local 118 token = rtas_token("ibm,update-properties"); in update_node() 119 if (token == RTAS_UNKNOWN_SERVICE) in update_node() 135 rc = rcall(token, buf, scope); in update_node() 178 int token, rc, i; in update_devicetree() local 182 token = rtas_token("ibm,update-nodes"); in update_devicetree() 183 if (token == RTAS_UNKNOWN_SERVICE) in update_devicetree() 193 rc = rcall(token, buf, scope); in update_devicetree()
|
/openbmc/linux/include/trace/events/ |
H A D | kvm.h | 294 TP_PROTO(u64 token, u64 gva), 296 TP_ARGS(token, gva), 299 __field(__u64, token) 304 __entry->token = token; 308 TP_printk("token %#llx gva %#llx", __entry->token, __entry->gva) 314 TP_PROTO(u64 token, u64 gva), 316 TP_ARGS(token, gva) 321 TP_PROTO(u64 token, u64 gva), 323 TP_ARGS(token, gva)
|
/openbmc/linux/mm/ |
H A D | vmpressure.c | 382 char *token; in vmpressure_register_event() local 390 token = strsep(&spec, ","); in vmpressure_register_event() 391 ret = match_string(vmpressure_str_levels, VMPRESSURE_NUM_LEVELS, token); in vmpressure_register_event() 397 token = strsep(&spec, ","); in vmpressure_register_event() 398 if (token) { in vmpressure_register_event() 399 ret = match_string(vmpressure_str_modes, VMPRESSURE_NUM_MODES, token); in vmpressure_register_event()
|
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | mptcp.c | 62 __u32 token; member 123 static int verify_msk(int map_fd, int client_fd, __u32 token) in verify_msk() argument 129 if (!ASSERT_GT(token, 0, "invalid token")) in verify_msk() 144 if (!ASSERT_EQ(val.token, token, "unexpected token")) in verify_msk() 181 err += is_mptcp ? verify_msk(map_fd, client_fd, sock_skel->bss->token) : in run_test()
|
H A D | lwt_helpers.h | 21 struct nstoken *token = open_netns(NETNS); \ 22 if (ASSERT_OK_PTR(token, "setns")) { \ 24 close_netns(token); \
|
/openbmc/linux/arch/x86/kernel/cpu/sgx/ |
H A D | virt.c | 368 static int __sgx_virt_einit(void __user *sigstruct, void __user *token, in __sgx_virt_einit() argument 380 !access_ok(token, SGX_EINITTOKEN_SIZE) || in __sgx_virt_einit() 385 ret = __einit((void *)sigstruct, (void *)token, (void *)secs); in __sgx_virt_einit() 408 int sgx_virt_einit(void __user *sigstruct, void __user *token, in sgx_virt_einit() argument 414 ret = __sgx_virt_einit(sigstruct, token, secs); in sgx_virt_einit() 420 ret = __sgx_virt_einit(sigstruct, token, secs); in sgx_virt_einit()
|
/openbmc/linux/drivers/net/wireless/mediatek/mt76/ |
H A D | tx.c | 754 int token; in mt76_token_consume() local 758 token = idr_alloc(&dev->token, *ptxwi, 0, dev->token_size, GFP_ATOMIC); in mt76_token_consume() 759 if (token >= 0) in mt76_token_consume() 764 token >= dev->mmio.wed.wlan.token_start) in mt76_token_consume() 773 return token; in mt76_token_consume() 780 int token; in mt76_rx_token_consume() local 785 if (token >= 0) { in mt76_rx_token_consume() 791 return token; in mt76_rx_token_consume() 802 txwi = idr_remove(&dev->token, token); in mt76_token_release() 808 token >= dev->mmio.wed.wlan.token_start && in mt76_token_release() [all …]
|
/openbmc/linux/fs/ecryptfs/ |
H A D | debug.c | 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
/openbmc/linux/net/mptcp/ |
H A D | crypto.c | 31 void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn) in mptcp_crypto_key_sha() argument 38 if (token) in mptcp_crypto_key_sha() 39 *token = be32_to_cpu(mptcp_hashed_key[0]); in mptcp_crypto_key_sha()
|
/openbmc/qemu/hw/i386/kvm/ |
H A D | xenstore_impl.h | 50 const char *token); 52 const char *token, xs_impl_watch_fn fn, void *opaque); 54 const char *path, const char *token, xs_impl_watch_fn fn,
|
/openbmc/linux/security/apparmor/include/ |
H A D | task.h | 29 u64 token; member 34 int aa_set_current_hat(struct aa_label *label, u64 token); 77 ctx->token = 0; in aa_clear_task_ctx_trans()
|
/openbmc/linux/rust/macros/ |
H A D | paste.rs | 50 for token in tokens.iter_mut() { in expand() 51 if let TokenTree::Group(group) = token { in expand() 62 *token = concat(&stream[1..stream.len() - 1], span); in expand() 68 *token = TokenTree::Group(group); in expand()
|
/openbmc/ipmitool/lib/ |
H A D | ipmi_chassis.c | 761 char *token; in get_bootparam_options() local 790 while (token != NULL) { in get_bootparam_options() 792 if (strcmp(token, "help") == 0) { in get_bootparam_options() 796 if (strncmp(token, "no-", 3) == 0) { in get_bootparam_options() 798 token += 3; in get_bootparam_options() 814 token -=3; in get_bootparam_options() 818 token = strtok_r(NULL, ",", &saveptr); in get_bootparam_options() 1293 char *token; in ipmi_chassis_main() local 1354 while (token != NULL) { in ipmi_chassis_main() 1355 if (strcmp(token, "help") == 0) { in ipmi_chassis_main() [all …]
|
/openbmc/linux/drivers/s390/cio/ |
H A D | qdio.h | 88 static inline int do_sqbs(u64 token, unsigned char state, int queue, in do_sqbs() argument 98 : [state] "a" ((unsigned long)state), [token] "d" (token) in do_sqbs() 106 static inline int do_eqbs(u64 token, unsigned char *state, int queue, in do_eqbs() argument 118 : [token] "d" (token) in do_eqbs()
|
/openbmc/linux/scripts/ |
H A D | check-sysctl-docs | 77 token = trimpunct($i) 78 if (length(token) > 0 && token != "and") {
|
/openbmc/linux/drivers/staging/rtl8723bs/include/ |
H A D | ioctl_cfg80211.h | 14 u8 token; member 26 (invit_info)->token = 0; \ 37 u8 token; member 52 (nego_info)->token = 0; \
|
/openbmc/linux/tools/testing/selftests/resctrl/ |
H A D | cat_test.c | 60 char *token = strtok(temp, ":\t"); in check_results() local 63 while (token) { in check_results() 64 token_array[fields++] = token; in check_results() 65 token = strtok(NULL, ":\t"); in check_results()
|
/openbmc/u-boot/drivers/i2c/ |
H A D | meson_i2c.c | 62 static void meson_i2c_add_token(struct meson_i2c *i2c, int token) in meson_i2c_add_token() argument 65 i2c->tokens[0] |= (token & 0xf) << (i2c->num_tokens * 4); in meson_i2c_add_token() 67 i2c->tokens[1] |= (token & 0xf) << ((i2c->num_tokens % 8) * 4); in meson_i2c_add_token() 148 int token; in meson_i2c_do_start() local 150 token = (msg->flags & I2C_M_RD) ? TOKEN_SLAVE_ADDR_READ : in meson_i2c_do_start() 155 meson_i2c_add_token(i2c, token); in meson_i2c_do_start()
|
/openbmc/linux/tools/perf/util/ |
H A D | parse-events.y | 58 %token PE_START_EVENTS PE_START_TERMS 59 %token PE_VALUE PE_VALUE_SYM_HW PE_VALUE_SYM_SW PE_TERM 60 %token PE_VALUE_SYM_TOOL 61 %token PE_EVENT_NAME 62 %token PE_RAW PE_NAME 63 %token PE_MODIFIER_EVENT PE_MODIFIER_BP PE_BP_COLON PE_BP_SLASH 64 %token PE_LEGACY_CACHE 65 %token PE_PREFIX_MEM 66 %token PE_ERROR 67 %token PE_DRV_CFG_TERM [all …]
|
/openbmc/linux/tools/power/cpupower/utils/idle_monitor/ |
H A D | cpupower-monitor.c | 224 char *tmp = param, *token; in parse_monitor_param() local 229 token = strtok(tmp, ","); in parse_monitor_param() 230 if (token == NULL) in parse_monitor_param() 232 if (strlen(token) >= MONITOR_NAME_LEN) { in parse_monitor_param() 234 " (%d) exceeded\n"), token, MONITOR_NAME_LEN); in parse_monitor_param() 239 if (!strcmp(monitors[num]->name, token)) { in parse_monitor_param() 240 dprint("Found requested monitor: %s\n", token); in parse_monitor_param()
|
/openbmc/qemu/target/hexagon/idef-parser/ |
H A D | idef-parser.y | 52 %token IN INAME VAR 54 %token ASR LSR EQ NEQ LTE GTE MIN MAX ANDL FOR ICIRC IF MUN FSCR FCHK SXT 55 %token ZXT CONSTEXT LOCNT BREV SIGN LOAD STORE PC LPCFG 57 %token CAST4_8U FAIL CARRY_FROM_ADD ADDSAT64 LSBNEW 58 %token TYPE_SIZE_T TYPE_INT TYPE_SIGNED TYPE_UNSIGNED TYPE_LONG 60 %token <rvalue> REG IMM PRED 61 %token <index> ELSE 62 %token <mpy> MPY 63 %token <sat> SAT 64 %token <cast> CAST DEPOSIT SETHALF [all …]
|
/openbmc/phosphor-event/ |
H A D | event_messaged_sdbus.c | 102 char *token; in prop_message_assoc() local 126 token = strtok(p, " "); in prop_message_assoc() 128 if (token) { in prop_message_assoc() 132 fprintf(stderr,"Error opening container %s to reply %s\n", token, strerror(-r)); in prop_message_assoc() 135 while(token) { in prop_message_assoc() 136 r = sd_bus_message_append(reply, "(sss)", "fru", "event", token); in prop_message_assoc() 138 fprintf(stderr,"Error adding properties for %s to reply %s\n", token, strerror(-r)); in prop_message_assoc() 141 token = strtok(NULL, " "); in prop_message_assoc()
|
/openbmc/linux/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 87 char *tmp, *orig, *token, *digest_name; in chap_check_algorithm() local 98 token = strsep(&tmp, "="); in chap_check_algorithm() 99 if (!token) in chap_check_algorithm() 102 if (strcmp(token, "CHAP_A")) { in chap_check_algorithm() 106 while (token) { in chap_check_algorithm() 107 token = strsep(&tmp, ","); in chap_check_algorithm() 108 if (!token) in chap_check_algorithm() 111 if (kstrtol(token, 10, &digest_type)) in chap_check_algorithm()
|
/openbmc/u-boot/drivers/usb/host/ |
H A D | ehci-hcd.c | 310 uint32_t endpt, maxpacket, token, usbsts; in ehci_submit_async() local 496 token = QT_TOKEN_DT(toggle) | in ehci_submit_async() 585 token = hc32_to_cpu(vtd->qt_token); in ehci_submit_async() 620 token = hc32_to_cpu(qh->qh_overlay.qt_token); in ehci_submit_async() 622 debug("TOKEN=%#x\n", token); in ehci_submit_async() 623 switch (QT_TOKEN_GET_STATUS(token) & in ehci_submit_async() 626 toggle = QT_TOKEN_GET_DT(token); in ehci_submit_async() 1401 uint32_t token, toggle; in _ehci_poll_int_queue() local 1413 token = hc32_to_cpu(cur_td->qt_token); in _ehci_poll_int_queue() 1419 toggle = QT_TOKEN_GET_DT(token); in _ehci_poll_int_queue() [all …]
|