| /openbmc/qemu/tests/qtest/ |
| H A D | tpm-tis-util.c | 37 __func__, __LINE__, locty, l, access, pending_request_flag) 48 uint8_t access; in tpm_tis_test_check_localities() local 55 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_localities() 56 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_test_check_localities() 78 uint8_t access; in tpm_tis_test_check_access_reg() local 82 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_access_reg() 83 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_test_check_access_reg() 89 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_access_reg() 90 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_test_check_access_reg() 97 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_access_reg() [all …]
|
| H A D | tpm-tis-i2c-test.c | 34 __func__, __LINE__, locty, l, access, pending_request_flag) 94 uint8_t access; in tpm_tis_i2c_test_basic() local 103 access = tpm_tis_i2c_readb(0, TPM_I2C_REG_ACCESS); in tpm_tis_i2c_test_basic() 104 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_i2c_test_basic() 163 uint8_t access; in tpm_tis_i2c_test_check_localities() local 169 access = tpm_tis_i2c_readb(locty, TPM_I2C_REG_ACCESS); in tpm_tis_i2c_test_check_localities() 170 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_i2c_test_check_localities() 198 uint8_t access; in tpm_tis_i2c_test_check_access_reg() local 202 access = tpm_tis_i2c_readb(locty, TPM_I2C_REG_ACCESS); in tpm_tis_i2c_test_check_access_reg() 203 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_i2c_test_check_access_reg() [all …]
|
| /openbmc/qemu/target/arm/ |
| H A D | cortex-regs.c | 32 .access = PL1_RW, .readfn = l2ctlr_read, 36 .access = PL1_RW, .readfn = l2ctlr_read, 40 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 43 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 46 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 49 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 52 .access = PL1_RW, .type = ARM_CP_CONST | ARM_CP_64BIT, .resetvalue = 0 }, 55 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 58 .access = PL1_RW, .type = ARM_CP_CONST | ARM_CP_64BIT, .resetvalue = 0 }, 61 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, [all …]
|
| H A D | debug_helper.c | 959 .access = PL0_R, .accessfn = access_tdra, 963 .access = PL1_R, .accessfn = access_tdra, 966 .access = PL0_R, .accessfn = access_tdra, 971 .access = PL1_RW, .accessfn = access_tda, 982 .access = PL0_R, .accessfn = access_tdcc, 992 .access = PL1_RW, .accessfn = access_tdcc, 996 .access = PL1_RW, .accessfn = access_tdcc, 1001 .access = PL0_RW, .accessfn = access_tdcc, 1005 .access = PL0_RW, .accessfn = access_tdcc, 1010 .access = PL0_RW, .accessfn = access_tdcc, [all …]
|
| H A D | cpregs-pmu.c | 1024 .access = PL0_RW, .type = ARM_CP_ALIAS | ARM_CP_IO, 1032 .access = PL0_RW, .accessfn = pmreg_access, 1037 .access = PL0_RW, 1045 .access = PL0_RW, .accessfn = pmreg_access, 1051 .access = PL0_RW, .type = ARM_CP_IO, 1059 .access = PL0_RW, .accessfn = pmreg_access, 1066 .access = PL0_W, .accessfn = pmreg_access_swinc, 1072 .access = PL0_W, .accessfn = pmreg_access_swinc, 1077 .access = PL0_RW, .type = ARM_CP_ALIAS, 1084 .access = PL0_RW, .accessfn = pmreg_access_selr, [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-multimedia/recipes-multimedia/pipewire/pipewire-media-session/ |
| H A D | 0001-pass-right-types-to-methods.patch | 10 src/access-flatpak.c | 2 +- 11 src/access-portal.c | 2 +- 15 diff --git a/src/access-flatpak.c b/src/access-flatpak.c 17 --- a/src/access-flatpak.c 18 +++ b/src/access-flatpak.c 28 diff --git a/src/access-portal.c b/src/access-portal.c 30 --- a/src/access-portal.c 31 +++ b/src/access-portal.c
|
| /openbmc/qemu/pc-bios/optionrom/ |
| H A D | optrom_fw_cfg.h | 54 struct fw_cfg_dma_access access; in bios_cfg_read_entry_dma() local 58 access.address = cpu_to_be64((uint64_t)(uint32_t)buf); in bios_cfg_read_entry_dma() 59 access.length = cpu_to_be32(len); in bios_cfg_read_entry_dma() 60 access.control = cpu_to_be32(control); in bios_cfg_read_entry_dma() 64 outl(cpu_to_be32((uint32_t)&access), BIOS_CFG_DMA_ADDR_LOW); in bios_cfg_read_entry_dma() 66 while (be32_to_cpu(access.control) & ~FW_CFG_DMA_CTL_ERROR) { in bios_cfg_read_entry_dma()
|
| /openbmc/qemu/docs/specs/ |
| H A D | acpi_pci_hotplug.rst | 7 ACPI GPE block (IO ports 0xafe0-0xafe3, byte access) 13 PCI slot injection notification pending (IO port 0xae00-0xae03, 4-byte access) 21 PCI slot removal notification (IO port 0xae04-0xae07, 4-byte access) 29 PCI device eject (IO port 0xae08-0xae0b, 4-byte access) 38 - Read-only "up" register @0xae00, 4-byte access, bit per slot 39 - Read-only "down" register @0xae04, 4-byte access, bit per slot 40 - Read/write "eject" register @0xae08, 4-byte access, 42 - Read-only hotplug capable register @0xae0c, 4-byte access, bit per slot 44 PCI removability status (IO port 0xae0c-0xae0f, 4-byte access)
|
| /openbmc/qemu/target/xtensa/ |
| H A D | mmu_helper.c | 324 unsigned access; in xtensa_cpu_get_phys_page_debug() local 327 &paddr, &page_size, &access) == 0) { in xtensa_cpu_get_phys_page_debug() 331 &paddr, &page_size, &access) == 0) { in xtensa_cpu_get_phys_page_debug() 578 unsigned access = 0; in mmu_attr_to_access() local 581 access |= PAGE_READ; in mmu_attr_to_access() 583 access |= PAGE_EXEC; in mmu_attr_to_access() 586 access |= PAGE_WRITE; in mmu_attr_to_access() 591 access |= PAGE_CACHE_BYPASS; in mmu_attr_to_access() 595 access |= PAGE_CACHE_WB; in mmu_attr_to_access() 599 access |= PAGE_CACHE_WT; in mmu_attr_to_access() [all …]
|
| H A D | op_helper.c | 82 uint32_t paddr, page_size, access; in HELPER() local 85 xtensa_get_cring(env), &paddr, &page_size, &access); in HELPER() 92 (access & (PAGE_READ | PAGE_WRITE)) != (PAGE_READ | PAGE_WRITE)) { in HELPER() 106 access = PAGE_CACHE_BYPASS; in HELPER() 109 switch (access & PAGE_CACHE_MASK) { in HELPER() 136 uint32_t paddr, page_size, access; in HELPER() local 140 &page_size, &access); in HELPER() 148 access = PAGE_CACHE_BYPASS; in HELPER() 151 switch (access & PAGE_CACHE_MASK) { in HELPER()
|
| /openbmc/phosphor-mboxd/vpnor/ |
| H A D | README.md | 8 Enabling the feature virtualises both the host's access to the flash (the mbox 9 protocol), and the BMC's access to the flash (via some filesystem on top of the 32 1. The FFS ToC defines the set of valid access ranges in terms of partitions 35 4. Read access to valid ranges must be granted 36 5. Write access to valid ranges may be granted 39 7. A read of a valid access range that maps into the backing file will render 41 8. A read of a valid access range that does not map into the backing file will 43 9. A read of an invalid access range will appear erased 44 10. A write to a valid access range that maps into the backing file will update 46 11. A write to a valid access range that does not map into the backing file [all …]
|
| /openbmc/hiomapd/vpnor/ |
| H A D | README.md | 7 Enabling the feature virtualises both the host's access to the flash (the mbox 8 protocol), and the BMC's access to the flash (via some filesystem on top of the 28 1. The FFS ToC defines the set of valid access ranges in terms of partitions 31 4. Read access to valid ranges must be granted 32 5. Write access to valid ranges may be granted 35 7. A read of a valid access range that maps into the backing file will render 37 8. A read of a valid access range that does not map into the backing file will 39 9. A read of an invalid access range will appear erased 40 10. A write to a valid access range that maps into the backing file will update 42 11. A write to a valid access range that does not map into the backing file will [all …]
|
| /openbmc/u-boot/doc/ |
| H A D | README.unaligned-memory-access.txt | 8 when it comes to memory access. This document presents some details about 13 The definition of an unaligned access 20 access. 22 The above may seem a little vague, as memory access can happen in different 26 which will compile to multiple-byte memory access instructions, namely when 41 of memory access. However, we must consider ALL supported architectures; 46 Why unaligned access is bad 49 The effects of performing an unaligned memory access vary from architecture 56 happen. The exception handler is able to correct the unaligned access, 60 unaligned access to be corrected. [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-multimedia/recipes-multimedia/vlc/vlc/ |
| H A D | 0005-ioctl-does-not-have-same-signature-between-glibc-and.patch | 9 modules/access/v4l2/lib.c | 4 ++++ 10 modules/access/v4l2/v4l2.h | 4 ++++ 13 --- a/modules/access/v4l2/lib.c 14 +++ b/modules/access/v4l2/lib.c 27 --- a/modules/access/v4l2/v4l2.h 28 +++ b/modules/access/v4l2/v4l2.h
|
| /openbmc/openbmc-test-automation/ipmi/ |
| H A D | test_ipmi_disable.robot | 16 ... AND Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access on 19 Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access off 24 Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access on 36 ... AND Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access on 40 ... Run External IPMI Standard Command lan set ${CHANNEL_NUMBER} access off 46 Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access on 58 ... AND Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access on 61 Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access off
|
| /openbmc/openbmc/meta-ibm/recipes-phosphor/images/ |
| H A D | obmc-phosphor-image.bbappend | 20 # accounting purposes and for debugging service access. 22 # SystemAdministrator. Admin users have access to interfaces including: 23 # Redfish, REST APIs, Web. No access to the BMC via: the BMC's physical 25 # IPMI access is not granted by default, but admins can authorize 27 # The admin has access to the host console: ssh -p2200 admin@${bmc}. 30 # known as customer engineers or CEs) access to the BMC. The role is 31 # OemIBMServiceAgent. The service user has full admin access, plus access 33 # SSH access to the BMC's command line.
|
| /openbmc/u-boot/drivers/spi/ |
| H A D | Kconfig | 12 the SPI uclass. Drivers provide methods to access the SPI 32 access the SPI NOR flash on platforms embedding this Altera 41 used to access the SPI NOR flash on boards using the Aspeed 55 used to access the SPI flash on AE3XX and AE250 platforms embedding 63 to access SPI NOR flash and other SPI peripherals. This driver 72 many AT91 (ARM) chips. This driver can be used to access 80 access the SPI NOR flash on platforms embedding this Broadcom 88 access the SPI NOR flash on platforms embedding these Broadcom 95 be used to access the SPI flash on platforms embedding this 102 used to access the SPI NOR flash on platforms embedding this [all …]
|
| /openbmc/u-boot/doc/device-tree-bindings/clock/ |
| H A D | rockchip,rk3399-dmc.txt | 4 - rockchip,cru: this driver should access cru regs, so need get cru here 5 - rockchip,pmucru: this driver should access pmucru regs, so need get pmucru here 6 - rockchip,pmugrf: this driver should access pmugrf regs, so need get pmugrf here 7 - rockchip,pmusgrf: this driver should access pmusgrf regs, so need get pmusgrf here 8 - rockchip,cic: this driver should access cic regs, so need get cic here
|
| /openbmc/u-boot/env/ |
| H A D | flags.c | 99 const char *env_flags_get_varaccess_name(enum env_flags_varaccess access) in env_flags_get_varaccess_name() argument 101 return env_flags_varaccess_names[access]; in env_flags_get_varaccess_name() 132 char *access; in env_flags_parse_varaccess() local 137 access = strchr(env_flags_varaccess_rep, in env_flags_parse_varaccess() 140 if (access != NULL) in env_flags_parse_varaccess() 142 (access - &env_flags_varaccess_rep[0]); in env_flags_parse_varaccess() 365 enum env_flags_varaccess access; in env_flags_validate_varaccess() local 368 access = env_flags_get_varaccess(name); in env_flags_validate_varaccess() 369 access_mask = env_flags_varaccess_mask[access]; in env_flags_validate_varaccess()
|
| /openbmc/openbmc/meta-openembedded/meta-networking/recipes-protocols/net-snmp/files/ |
| H A D | snmpd.conf | 91 access MyROSystem "" any noauth exact system none none 92 access MyROGroup "" any noauth exact all none none 93 access MyRWGroup "" any noauth exact all all none
|
| /openbmc/qemu/hw/tpm/ |
| H A D | tpm_tis_common.c | 130 if ((s->loc[l].access & TPM_TIS_ACCESS_REQUEST_USE)) { in tpm_tis_check_request_use_except() 146 s->loc[new_active_locty].access & TPM_TIS_ACCESS_SEIZE; in tpm_tis_new_active_locality() 155 s->loc[s->active_locty].access &= mask; in tpm_tis_new_active_locality() 158 s->loc[s->active_locty].access |= TPM_TIS_ACCESS_BEEN_SEIZED; in tpm_tis_new_active_locality() 168 s->loc[new_active_locty].access |= TPM_TIS_ACCESS_ACTIVE_LOCALITY; in tpm_tis_new_active_locality() 169 s->loc[new_active_locty].access &= ~(TPM_TIS_ACCESS_REQUEST_USE | in tpm_tis_new_active_locality() 353 val = s->loc[locty].access & ~TPM_TIS_ACCESS_SEIZE; in tpm_tis_mmio_read() 523 if ((s->loc[c].access & TPM_TIS_ACCESS_REQUEST_USE)) { in tpm_tis_mmio_write() 539 s->loc[locty].access &= ~TPM_TIS_ACCESS_REQUEST_USE; in tpm_tis_mmio_write() 544 s->loc[locty].access &= ~TPM_TIS_ACCESS_BEEN_SEIZED; in tpm_tis_mmio_write() [all …]
|
| /openbmc/qemu/tests/qtest/libqos/ |
| H A D | fw_cfg.c | 68 FWCfgDmaAccess access; in qfw_cfg_dma_transfer() local 79 access.address = cpu_to_be64(gaddr); in qfw_cfg_dma_transfer() 80 access.length = cpu_to_be32(length); in qfw_cfg_dma_transfer() 81 access.control = cpu_to_be32(control); in qfw_cfg_dma_transfer() 84 guest_access_addr = guest_alloc(&qs->alloc, sizeof(access)); in qfw_cfg_dma_transfer() 85 qtest_bufwrite(fw_cfg->qts, guest_access_addr, &access, sizeof(access)); in qfw_cfg_dma_transfer() 95 g_assert(!(be32_to_cpu(access.control) & FW_CFG_DMA_CTL_ERROR)); in qfw_cfg_dma_transfer()
|
| /openbmc/u-boot/arch/arm/mach-rockchip/rk3288/ |
| H A D | Kconfig | 9 WiFi. It includes a Chrome OS EC (Cortex-M3) to provide access to 20 keyboard and mouse access. 29 EC (Cortex-M3) to provide access to the keyboard and battery 40 EC (Cortex-M3) to provide access to the keyboard and battery 51 provide access to display pins, I2C, SPI, UART and GPIOs. 60 provide access to display pins, I2C, SPI, UART and GPIOs. 69 provide access to display pins, I2C, SPI, UART and GPIOs. 77 has 1 or 2 GiB SDRAM. Expansion connectors provide access to 95 2GB DDR3. Expansion connectors provide access to I2C, SPI, UART, 121 provide access to display pins, I2C, SPI, UART and GPIOs. [all …]
|
| /openbmc/openbmc/poky/meta/recipes-kernel/lttng/lttng-tools/ |
| H A D | 0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch | 105 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || 131 -skip $isroot "Root access is needed for kernel testing, skipping." 9 || 150 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || 169 -skip $isroot "Root access is needed. Skipping all tests." "$NUM_TESTS" || 188 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || 207 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || 226 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || 245 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || 264 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS || 282 -skip $isroot "Root access is needed. Skipping all tests." "$NUM_TESTS" && exit 0 [all …]
|
| /openbmc/u-boot/drivers/net/ti/ |
| H A D | cpsw_mdio.c | 34 u32 access; member 66 return wait_for_bit_le32(&mdio->regs->user[0].access, in cpsw_mdio_wait_for_user_access() 87 writel(reg, &mdio->regs->user[0].access); in cpsw_mdio_read() 92 reg = readl(&mdio->regs->user[0].access); in cpsw_mdio_read() 114 writel(reg, &mdio->regs->user[0].access); in cpsw_mdio_write()
|