Home
last modified time | relevance | path

Searched refs:access (Results 1 – 25 of 1117) sorted by relevance

12345678910>>...45

/openbmc/qemu/tests/qtest/
H A Dtpm-tis-util.c37 __func__, __LINE__, locty, l, access, pending_request_flag)
48 uint8_t access; in tpm_tis_test_check_localities() local
55 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_localities()
56 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_test_check_localities()
78 uint8_t access; in tpm_tis_test_check_access_reg() local
82 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_access_reg()
83 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_test_check_access_reg()
89 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_access_reg()
90 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_test_check_access_reg()
97 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_access_reg()
[all …]
H A Dtpm-tis-i2c-test.c34 __func__, __LINE__, locty, l, access, pending_request_flag)
94 uint8_t access; in tpm_tis_i2c_test_basic() local
103 access = tpm_tis_i2c_readb(0, TPM_I2C_REG_ACCESS); in tpm_tis_i2c_test_basic()
104 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_i2c_test_basic()
163 uint8_t access; in tpm_tis_i2c_test_check_localities() local
169 access = tpm_tis_i2c_readb(locty, TPM_I2C_REG_ACCESS); in tpm_tis_i2c_test_check_localities()
170 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_i2c_test_check_localities()
198 uint8_t access; in tpm_tis_i2c_test_check_access_reg() local
202 access = tpm_tis_i2c_readb(locty, TPM_I2C_REG_ACCESS); in tpm_tis_i2c_test_check_access_reg()
203 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_i2c_test_check_access_reg()
[all …]
/openbmc/qemu/target/arm/
H A Dcortex-regs.c32 .access = PL1_RW, .readfn = l2ctlr_read,
36 .access = PL1_RW, .readfn = l2ctlr_read,
40 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
43 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
46 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
49 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
52 .access = PL1_RW, .type = ARM_CP_CONST | ARM_CP_64BIT, .resetvalue = 0 },
55 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
58 .access = PL1_RW, .type = ARM_CP_CONST | ARM_CP_64BIT, .resetvalue = 0 },
61 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 },
[all …]
H A Ddebug_helper.c959 .access = PL0_R, .accessfn = access_tdra,
963 .access = PL1_R, .accessfn = access_tdra,
966 .access = PL0_R, .accessfn = access_tdra,
971 .access = PL1_RW, .accessfn = access_tda,
982 .access = PL0_R, .accessfn = access_tdcc,
992 .access = PL1_RW, .accessfn = access_tdcc,
996 .access = PL1_RW, .accessfn = access_tdcc,
1001 .access = PL0_RW, .accessfn = access_tdcc,
1005 .access = PL0_RW, .accessfn = access_tdcc,
1010 .access = PL0_RW, .accessfn = access_tdcc,
[all …]
H A Dcpregs-pmu.c1024 .access = PL0_RW, .type = ARM_CP_ALIAS | ARM_CP_IO,
1032 .access = PL0_RW, .accessfn = pmreg_access,
1037 .access = PL0_RW,
1045 .access = PL0_RW, .accessfn = pmreg_access,
1051 .access = PL0_RW, .type = ARM_CP_IO,
1059 .access = PL0_RW, .accessfn = pmreg_access,
1066 .access = PL0_W, .accessfn = pmreg_access_swinc,
1072 .access = PL0_W, .accessfn = pmreg_access_swinc,
1077 .access = PL0_RW, .type = ARM_CP_ALIAS,
1084 .access = PL0_RW, .accessfn = pmreg_access_selr,
[all …]
/openbmc/openbmc/meta-openembedded/meta-multimedia/recipes-multimedia/pipewire/pipewire-media-session/
H A D0001-pass-right-types-to-methods.patch10 src/access-flatpak.c | 2 +-
11 src/access-portal.c | 2 +-
15 diff --git a/src/access-flatpak.c b/src/access-flatpak.c
17 --- a/src/access-flatpak.c
18 +++ b/src/access-flatpak.c
28 diff --git a/src/access-portal.c b/src/access-portal.c
30 --- a/src/access-portal.c
31 +++ b/src/access-portal.c
/openbmc/qemu/pc-bios/optionrom/
H A Doptrom_fw_cfg.h54 struct fw_cfg_dma_access access; in bios_cfg_read_entry_dma() local
58 access.address = cpu_to_be64((uint64_t)(uint32_t)buf); in bios_cfg_read_entry_dma()
59 access.length = cpu_to_be32(len); in bios_cfg_read_entry_dma()
60 access.control = cpu_to_be32(control); in bios_cfg_read_entry_dma()
64 outl(cpu_to_be32((uint32_t)&access), BIOS_CFG_DMA_ADDR_LOW); in bios_cfg_read_entry_dma()
66 while (be32_to_cpu(access.control) & ~FW_CFG_DMA_CTL_ERROR) { in bios_cfg_read_entry_dma()
/openbmc/qemu/docs/specs/
H A Dacpi_pci_hotplug.rst7 ACPI GPE block (IO ports 0xafe0-0xafe3, byte access)
13 PCI slot injection notification pending (IO port 0xae00-0xae03, 4-byte access)
21 PCI slot removal notification (IO port 0xae04-0xae07, 4-byte access)
29 PCI device eject (IO port 0xae08-0xae0b, 4-byte access)
38 - Read-only "up" register @0xae00, 4-byte access, bit per slot
39 - Read-only "down" register @0xae04, 4-byte access, bit per slot
40 - Read/write "eject" register @0xae08, 4-byte access,
42 - Read-only hotplug capable register @0xae0c, 4-byte access, bit per slot
44 PCI removability status (IO port 0xae0c-0xae0f, 4-byte access)
/openbmc/qemu/target/xtensa/
H A Dmmu_helper.c324 unsigned access; in xtensa_cpu_get_phys_page_debug() local
327 &paddr, &page_size, &access) == 0) { in xtensa_cpu_get_phys_page_debug()
331 &paddr, &page_size, &access) == 0) { in xtensa_cpu_get_phys_page_debug()
578 unsigned access = 0; in mmu_attr_to_access() local
581 access |= PAGE_READ; in mmu_attr_to_access()
583 access |= PAGE_EXEC; in mmu_attr_to_access()
586 access |= PAGE_WRITE; in mmu_attr_to_access()
591 access |= PAGE_CACHE_BYPASS; in mmu_attr_to_access()
595 access |= PAGE_CACHE_WB; in mmu_attr_to_access()
599 access |= PAGE_CACHE_WT; in mmu_attr_to_access()
[all …]
H A Dop_helper.c82 uint32_t paddr, page_size, access; in HELPER() local
85 xtensa_get_cring(env), &paddr, &page_size, &access); in HELPER()
92 (access & (PAGE_READ | PAGE_WRITE)) != (PAGE_READ | PAGE_WRITE)) { in HELPER()
106 access = PAGE_CACHE_BYPASS; in HELPER()
109 switch (access & PAGE_CACHE_MASK) { in HELPER()
136 uint32_t paddr, page_size, access; in HELPER() local
140 &page_size, &access); in HELPER()
148 access = PAGE_CACHE_BYPASS; in HELPER()
151 switch (access & PAGE_CACHE_MASK) { in HELPER()
/openbmc/phosphor-mboxd/vpnor/
H A DREADME.md8 Enabling the feature virtualises both the host's access to the flash (the mbox
9 protocol), and the BMC's access to the flash (via some filesystem on top of the
32 1. The FFS ToC defines the set of valid access ranges in terms of partitions
35 4. Read access to valid ranges must be granted
36 5. Write access to valid ranges may be granted
39 7. A read of a valid access range that maps into the backing file will render
41 8. A read of a valid access range that does not map into the backing file will
43 9. A read of an invalid access range will appear erased
44 10. A write to a valid access range that maps into the backing file will update
46 11. A write to a valid access range that does not map into the backing file
[all …]
/openbmc/hiomapd/vpnor/
H A DREADME.md7 Enabling the feature virtualises both the host's access to the flash (the mbox
8 protocol), and the BMC's access to the flash (via some filesystem on top of the
28 1. The FFS ToC defines the set of valid access ranges in terms of partitions
31 4. Read access to valid ranges must be granted
32 5. Write access to valid ranges may be granted
35 7. A read of a valid access range that maps into the backing file will render
37 8. A read of a valid access range that does not map into the backing file will
39 9. A read of an invalid access range will appear erased
40 10. A write to a valid access range that maps into the backing file will update
42 11. A write to a valid access range that does not map into the backing file will
[all …]
/openbmc/u-boot/doc/
H A DREADME.unaligned-memory-access.txt8 when it comes to memory access. This document presents some details about
13 The definition of an unaligned access
20 access.
22 The above may seem a little vague, as memory access can happen in different
26 which will compile to multiple-byte memory access instructions, namely when
41 of memory access. However, we must consider ALL supported architectures;
46 Why unaligned access is bad
49 The effects of performing an unaligned memory access vary from architecture
56 happen. The exception handler is able to correct the unaligned access,
60 unaligned access to be corrected.
[all …]
/openbmc/openbmc/meta-openembedded/meta-multimedia/recipes-multimedia/vlc/vlc/
H A D0005-ioctl-does-not-have-same-signature-between-glibc-and.patch9 modules/access/v4l2/lib.c | 4 ++++
10 modules/access/v4l2/v4l2.h | 4 ++++
13 --- a/modules/access/v4l2/lib.c
14 +++ b/modules/access/v4l2/lib.c
27 --- a/modules/access/v4l2/v4l2.h
28 +++ b/modules/access/v4l2/v4l2.h
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_disable.robot16 ... AND Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access on
19 Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access off
24 Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access on
36 ... AND Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access on
40 ... Run External IPMI Standard Command lan set ${CHANNEL_NUMBER} access off
46 Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access on
58 ... AND Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access on
61 Run Inband IPMI Standard Command lan set ${CHANNEL_NUMBER} access off
/openbmc/openbmc/meta-ibm/recipes-phosphor/images/
H A Dobmc-phosphor-image.bbappend20 # accounting purposes and for debugging service access.
22 # SystemAdministrator. Admin users have access to interfaces including:
23 # Redfish, REST APIs, Web. No access to the BMC via: the BMC's physical
25 # IPMI access is not granted by default, but admins can authorize
27 # The admin has access to the host console: ssh -p2200 admin@${bmc}.
30 # known as customer engineers or CEs) access to the BMC. The role is
31 # OemIBMServiceAgent. The service user has full admin access, plus access
33 # SSH access to the BMC's command line.
/openbmc/u-boot/drivers/spi/
H A DKconfig12 the SPI uclass. Drivers provide methods to access the SPI
32 access the SPI NOR flash on platforms embedding this Altera
41 used to access the SPI NOR flash on boards using the Aspeed
55 used to access the SPI flash on AE3XX and AE250 platforms embedding
63 to access SPI NOR flash and other SPI peripherals. This driver
72 many AT91 (ARM) chips. This driver can be used to access
80 access the SPI NOR flash on platforms embedding this Broadcom
88 access the SPI NOR flash on platforms embedding these Broadcom
95 be used to access the SPI flash on platforms embedding this
102 used to access the SPI NOR flash on platforms embedding this
[all …]
/openbmc/u-boot/doc/device-tree-bindings/clock/
H A Drockchip,rk3399-dmc.txt4 - rockchip,cru: this driver should access cru regs, so need get cru here
5 - rockchip,pmucru: this driver should access pmucru regs, so need get pmucru here
6 - rockchip,pmugrf: this driver should access pmugrf regs, so need get pmugrf here
7 - rockchip,pmusgrf: this driver should access pmusgrf regs, so need get pmusgrf here
8 - rockchip,cic: this driver should access cic regs, so need get cic here
/openbmc/u-boot/env/
H A Dflags.c99 const char *env_flags_get_varaccess_name(enum env_flags_varaccess access) in env_flags_get_varaccess_name() argument
101 return env_flags_varaccess_names[access]; in env_flags_get_varaccess_name()
132 char *access; in env_flags_parse_varaccess() local
137 access = strchr(env_flags_varaccess_rep, in env_flags_parse_varaccess()
140 if (access != NULL) in env_flags_parse_varaccess()
142 (access - &env_flags_varaccess_rep[0]); in env_flags_parse_varaccess()
365 enum env_flags_varaccess access; in env_flags_validate_varaccess() local
368 access = env_flags_get_varaccess(name); in env_flags_validate_varaccess()
369 access_mask = env_flags_varaccess_mask[access]; in env_flags_validate_varaccess()
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-protocols/net-snmp/files/
H A Dsnmpd.conf91 access MyROSystem "" any noauth exact system none none
92 access MyROGroup "" any noauth exact all none none
93 access MyRWGroup "" any noauth exact all all none
/openbmc/qemu/hw/tpm/
H A Dtpm_tis_common.c130 if ((s->loc[l].access & TPM_TIS_ACCESS_REQUEST_USE)) { in tpm_tis_check_request_use_except()
146 s->loc[new_active_locty].access & TPM_TIS_ACCESS_SEIZE; in tpm_tis_new_active_locality()
155 s->loc[s->active_locty].access &= mask; in tpm_tis_new_active_locality()
158 s->loc[s->active_locty].access |= TPM_TIS_ACCESS_BEEN_SEIZED; in tpm_tis_new_active_locality()
168 s->loc[new_active_locty].access |= TPM_TIS_ACCESS_ACTIVE_LOCALITY; in tpm_tis_new_active_locality()
169 s->loc[new_active_locty].access &= ~(TPM_TIS_ACCESS_REQUEST_USE | in tpm_tis_new_active_locality()
353 val = s->loc[locty].access & ~TPM_TIS_ACCESS_SEIZE; in tpm_tis_mmio_read()
523 if ((s->loc[c].access & TPM_TIS_ACCESS_REQUEST_USE)) { in tpm_tis_mmio_write()
539 s->loc[locty].access &= ~TPM_TIS_ACCESS_REQUEST_USE; in tpm_tis_mmio_write()
544 s->loc[locty].access &= ~TPM_TIS_ACCESS_BEEN_SEIZED; in tpm_tis_mmio_write()
[all …]
/openbmc/qemu/tests/qtest/libqos/
H A Dfw_cfg.c68 FWCfgDmaAccess access; in qfw_cfg_dma_transfer() local
79 access.address = cpu_to_be64(gaddr); in qfw_cfg_dma_transfer()
80 access.length = cpu_to_be32(length); in qfw_cfg_dma_transfer()
81 access.control = cpu_to_be32(control); in qfw_cfg_dma_transfer()
84 guest_access_addr = guest_alloc(&qs->alloc, sizeof(access)); in qfw_cfg_dma_transfer()
85 qtest_bufwrite(fw_cfg->qts, guest_access_addr, &access, sizeof(access)); in qfw_cfg_dma_transfer()
95 g_assert(!(be32_to_cpu(access.control) & FW_CFG_DMA_CTL_ERROR)); in qfw_cfg_dma_transfer()
/openbmc/u-boot/arch/arm/mach-rockchip/rk3288/
H A DKconfig9 WiFi. It includes a Chrome OS EC (Cortex-M3) to provide access to
20 keyboard and mouse access.
29 EC (Cortex-M3) to provide access to the keyboard and battery
40 EC (Cortex-M3) to provide access to the keyboard and battery
51 provide access to display pins, I2C, SPI, UART and GPIOs.
60 provide access to display pins, I2C, SPI, UART and GPIOs.
69 provide access to display pins, I2C, SPI, UART and GPIOs.
77 has 1 or 2 GiB SDRAM. Expansion connectors provide access to
95 2GB DDR3. Expansion connectors provide access to I2C, SPI, UART,
121 provide access to display pins, I2C, SPI, UART and GPIOs.
[all …]
/openbmc/openbmc/poky/meta/recipes-kernel/lttng/lttng-tools/
H A D0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch105 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS ||
131 -skip $isroot "Root access is needed for kernel testing, skipping." 9 ||
150 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS ||
169 -skip $isroot "Root access is needed. Skipping all tests." "$NUM_TESTS" ||
188 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS ||
207 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS ||
226 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS ||
245 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS ||
264 -skip $isroot "Root access is needed. Skipping all tests." $NUM_TESTS ||
282 -skip $isroot "Root access is needed. Skipping all tests." "$NUM_TESTS" && exit 0
[all …]
/openbmc/u-boot/drivers/net/ti/
H A Dcpsw_mdio.c34 u32 access; member
66 return wait_for_bit_le32(&mdio->regs->user[0].access, in cpsw_mdio_wait_for_user_access()
87 writel(reg, &mdio->regs->user[0].access); in cpsw_mdio_read()
92 reg = readl(&mdio->regs->user[0].access); in cpsw_mdio_read()
114 writel(reg, &mdio->regs->user[0].access); in cpsw_mdio_write()

12345678910>>...45