/openbmc/qemu/ui/ |
H A D | shader.c | 109 GLuint program; in qemu_gl_create_link_program() local 113 program = glCreateProgram(); in qemu_gl_create_link_program() 114 glAttachShader(program, vert); in qemu_gl_create_link_program() 115 glAttachShader(program, frag); in qemu_gl_create_link_program() 116 glLinkProgram(program); in qemu_gl_create_link_program() 118 glGetProgramiv(program, GL_LINK_STATUS, &status); in qemu_gl_create_link_program() 120 glGetProgramiv(program, GL_INFO_LOG_LENGTH, &length); in qemu_gl_create_link_program() 122 glGetProgramInfoLog(program, length, &length, errmsg); in qemu_gl_create_link_program() 127 return program; in qemu_gl_create_link_program() 133 GLuint vert_shader, frag_shader, program = 0; in qemu_gl_create_compile_link_program() local [all …]
|
/openbmc/linux/drivers/pwm/ |
H A D | pwm-stmpe.c | 103 u16 program[3] = { in stmpe_24xx_pwm_config() local 158 program[0] = SMAX; /* off all the time */ in stmpe_24xx_pwm_config() 161 program[0] = LOAD | 0xff; /* LOAD 0xff */ in stmpe_24xx_pwm_config() 166 program[0] = SMIN; /* on all the time */ in stmpe_24xx_pwm_config() 199 program[0] = LOAD | value; in stmpe_24xx_pwm_config() 200 program[1] = 0x0000; in stmpe_24xx_pwm_config() 216 program[1] = BRANCH; in stmpe_24xx_pwm_config() 221 pwm->hwpwm, value, last, program[0], program[1], in stmpe_24xx_pwm_config() 222 program[2]); in stmpe_24xx_pwm_config() 232 value = (program[i] >> 8) & 0xff; in stmpe_24xx_pwm_config() [all …]
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | MakeIndex | 15 …program provided that the copyright notice and this permission notice are preserved and provided t… 17 …program under the conditions above with the additional requirement that the entire modified work m… 19 This program is distributed with no warranty of any sort. No contributor accepts responsibility fo…
|
H A D | NAIST-2003 | 33 The program was produced on an experimental basis in the course of the 36 program is provided without any warranty whatsoever, whether express, 40 the program and the nonexistence of any infringement or violation of 43 Each user of the program will agree and understand, and be deemed to 45 the program and, accordingly, the entire risk arising from or 46 otherwise connected with the program is assumed by the user. 55 or result produced or otherwise obtained by using the program, 61 modification, copying and distribution of the program and the 62 production of secondary products from the program. 64 In the case where the program, whether in its original form or [all …]
|
H A D | XSkat | 1 This program is free software; you can redistribute it freely. 10 …t changed the program. The program is renamed or the version number is of the form x.y.z, where x.…
|
/openbmc/openbmc/poky/meta/recipes-graphics/piglit/piglit/ |
H A D | 0001-utils-Include-libgen.h-on-musl-linux-systems.patch | 13 Since we're also including this from the CL program-tester, let's 21 tests/cl/program/program-tester.c | 5 ++++- 38 diff --git a/tests/cl/program/program-tester.c b/tests/cl/program/program-tester.c 40 --- a/tests/cl/program/program-tester.c 41 +++ b/tests/cl/program/program-tester.c 48 #include "piglit-framework-cl-program.h"
|
/openbmc/qemu/docs/devel/ |
H A D | s390-dasd-ipl.rst | 23 program contained in the IPL2 data. The TIC channel command is the 29 The TIC ccw instruction at the end of the IPL1 channel program will begin 30 the execution of the IPL2 channel program. IPL2 is stage-2 of the boot 39 NOTE: The IPL2 channel program might read data into memory 58 off the reading of IPL1 data. Since the channel program from IPL1 will be 72 2. Execute channel program at ``0x0``. 88 immediately to the IPL1 channel program that was read by "Read IPL". 91 IPL1 channel program from transferring control to the IPL2 channel program. 117 This address is where the IPL2 channel program starts. 121 5. Execute the IPL2 channel program at the address obtained in step #4. [all …]
|
/openbmc/openbmc/poky/meta/recipes-core/util-linux/util-linux/ |
H A D | fcntl-lock.c | 64 const char *program; variable 82 program); in usage() 145 program = argv[0]; in main() 195 program, argv[optind+1]); in main() 222 program, argv[optind], strerror(err)); in main() 233 fprintf(stderr, _("%s: bad number: %s\n"), program, argv[optind]); in main() 241 program); in main() 278 fprintf(stderr, "%s: %s: %s\n", program, filename, strerror(err)); in main() 280 fprintf(stderr, "%s: %d: %s\n", program, fd, strerror(err)); in main() 301 fprintf(stderr, _("%s: fork failed: %s\n"), program, strerror(err)); in main() [all …]
|
/openbmc/openbmc-test-automation/extended/ |
H A D | run_keyword.robot | 5 # keyword_string The keyword string to be run by this program. If this 13 # test_mode This means that this program should go through all the 15 # debug If this parameter is set to "1", this program will print 17 # quiet If this parameter is set to "1", this program will print 38 # Initialize program parameters variables. 39 # Create parm_list containing all of our program parameters. parm_list is 44 # Initialize each program parameter. 54 [Documentation] Run the keyword program. 59 [Documentation] Do main program processing.
|
/openbmc/linux/Documentation/userspace-api/ |
H A D | ELF.rst | 10 "First" program header is the one with the smallest offset in the file: 13 "Last" program header is the one with the biggest offset in the file: 19 First PT_INTERP program header is used to locate the filename of ELF 25 Last PT_GNU_STACK program header defines userspace stack executability 31 ELF interpreter's last PT_GNU_PROPERTY program header is used (since 33 program header of an executable is used. Other PT_GNU_PROPERTY headers
|
/openbmc/linux/Documentation/bpf/ |
H A D | prog_sk_lookup.rst | 4 BPF sk_lookup program 7 BPF sk_lookup program type (``BPF_PROG_TYPE_SK_LOOKUP``) introduces programmability 11 When invoked BPF sk_lookup program can select a socket that will receive the 19 BPF sk_lookup program type was introduced to address setup scenarios where 36 BPF sk_lookup program can be attached to a network namespace with 53 verdict code. As for other BPF program types that are network filters, 58 A BPF sk_lookup program can also select a socket to receive the packet by 62 selection. Selecting a socket only takes effect if the program has terminated 68 1. If any program returned ``SK_PASS`` and selected a valid socket, the socket 72 3. If any program returned ``SK_DROP``, and no program returned ``SK_PASS`` and [all …]
|
H A D | bpf_prog_run.rst | 19 execute a BPF program in the kernel and return the results to userspace. This 44 object and (for program types operating on network packets) a buffer containing 45 the packet data that the BPF program will operate on. The kernel will then 57 be processed by the kernel after the execution of the XDP program as if they 59 ``BPF_F_TEST_XDP_LIVE_FRAMES`` flag when supplying an XDP program to 63 XDP program many times (suitable for, e.g., running as a traffic generator), 69 operation indicated by the program's return code (drop the packet, redirect 80 the regular (non-live) mode. The XDP program will be executed as though the 86 because the program execution is not happening in driver context, an 95 the kernel executes the XDP program repeatedly, each invocation getting a [all …]
|
H A D | bpf_iterators.rst | 48 program verified and loaded by the kernel. 54 program is obtained using ``bpf_link_create()``, and the program callback is 121 so they won't go away when the BPF program runs. 157 the program is a BPF iterator program to iterate all files from all tasks. The 158 context of the program is ``bpf_iter__task_file`` struct. 160 The user space program invokes the BPF iterator program running in the kernel 334 The whole program looks like the following code: 398 The following lines are the output of the program. 422 BPF program to pass a *pid* to the BPF program. 424 The BPF program would look like the following block. [all …]
|
H A D | map_cgroup_storage.rst | 11 storage is identified by the cgroup the program is attached to. 13 The map provide a local storage at the cgroup that the BPF program is attached 34 ``attach_type`` is the program's attach type. 42 To access the storage in a program, use ``bpf_get_local_storage``:: 67 int program(struct __sk_buff *skb) 102 int program(struct __sk_buff *skb) 132 that uses the map. A program may be attached to multiple cgroups or have 138 each map can only be used by one BPF program and each BPF program can only use 140 program, sharing of this cgroup's storage with other BPF programs were 153 However, the BPF program can still only associate with one map of each type [all …]
|
H A D | prog_cgroup_sockopt.rst | 7 ``BPF_PROG_TYPE_CGROUP_SOCKOPT`` program type can be attached to two 26 If BPF program sets ``optlen`` to -1, the control will be returned 62 the BPF program from the parent cgroup). 76 the programs are executed from the bottom up: B, A. First program 79 control will be passed to the second (A) program which will see the 82 Same for ``BPF_CGROUP_SETSOCKOPT``: if the program is attached to 85 then the next program in the chain (A) will see those changes, 96 done by the BPF program to the ``optval`` are ignored. 100 When the BPF program returns with the ``optlen`` greater than 102 buffers without any modifications that the BPF program might have [all …]
|
/openbmc/linux/Documentation/hid/ |
H A D | hid-bpf.rst | 38 HID-BPF allows the userspace program to load the program itself, ensuring we 119 program. 155 program has been loaded, it is not possible to overwrite it unless the program which 166 Available tracing functions to attach a HID-BPF program: 184 General overview of a HID-BPF program 222 Effect of a HID-BPF program 229 program, the new program is appended at the end of the list. 294 Attaching a bpf program to a device 322 component that loads the eBPF program. 411 program first:: [all …]
|
/openbmc/linux/drivers/fpga/ |
H A D | lattice-sysconfig.c | 91 struct gpio_desc *program = priv->program; in sysconfig_gpio_refresh() local 97 gpiod_set_value(program, 1); in sysconfig_gpio_refresh() 107 gpiod_set_value(program, 0); in sysconfig_gpio_refresh() 128 struct gpio_desc *program = priv->program; in sysconfig_refresh() local 132 if (program && init && done) in sysconfig_refresh() 355 struct gpio_desc *program, *init, *done; in sysconfig_probe() local 370 program = devm_gpiod_get_optional(dev, "program", GPIOD_OUT_LOW); in sysconfig_probe() 371 if (IS_ERR(program)) in sysconfig_probe() 372 return dev_err_probe(dev, PTR_ERR(program), in sysconfig_probe() 385 priv->program = program; in sysconfig_probe()
|
/openbmc/openbmc-test-automation/templates/ |
H A D | pgm_template.robot | 3 # Copy this template as a base to get a start on a robot program. You may remove any generic commen… 6 Documentation Base to get a start on a robot program. 19 # Initialize program parameters variables. 20 # Create parm_list containing all of our program parameters. 23 # Initialize each program parameter.
|
/openbmc/openbmc/poky/meta/recipes-devtools/syslinux/syslinux/ |
H A D | 0002-linux-syslinux-implement-open_ext2_fs.patch | 44 extern const char *program; /* Name of program */ 55 fprintf(stderr, "%s: %s\n", program, msg); 77 + program, device); 86 + program, device); 91 + fprintf(stderr, "%s: %s is mounted\n", program, device); 101 + program, device); 109 + program, device); 119 + program, subdir, device); 125 + fprintf(stderr, "%s: failed to cd to: %s\n", program, subdir);
|
/openbmc/openbmc/meta-nuvoton/recipes-nuvoton/program-edid/ |
H A D | program-edid.bb | 2 DESCRIPTION = "Add program EDID data support for DDC to SMB internal \ 12 SRC_URI = "file://program-edid.service \ 13 file://program-edid.sh \ 18 SYSTEMD_SERVICE:${PN} = "program-edid.service" 28 install -m 0755 ${WORKDIR}/program-edid.sh ${D}${bindir}/
|
/openbmc/linux/tools/bpf/bpftool/Documentation/ |
H A D | bpftool-cgroup.rst | 52 Output will start with program ID followed by attach type, 53 attach flags and program name. 66 program ID, attach type, attach flags and program name. 73 Attach program *PROG* to the cgroup *CGROUP* with attach type 77 some bpf program, the program in this cgroup yields to sub-cgroup 78 program; **multi** if a sub-cgroup installs some bpf program, 79 that cgroup program gets run in addition to the program in this 82 Only one program is allowed to be attached to a cgroup with 84 program will release old program and attach the new one.
|
H A D | bpftool-prog.rst | 75 Output will start with program ID followed by program type and 113 Dump jited image (host machine code) of the program. 126 Pin program *PROG* as *FILE*. 154 If **autoattach** is specified program will be attached 156 program attached to its hook) is pinned, not the program as 161 supported for all program types. If a program does not 163 for that program instead. 170 Attach bpf program *PROG* (with type specified by 176 Detach bpf program *PROG* (with type specified by 191 for BPF, meaning that the program works on the data and [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/konkretcmpi/konkretcmpi/ |
H A D | 0001-drop-including-rpath-cmake-module.patch | 14 src/program/CMakeLists.txt | 1 - 29 diff --git a/src/program/CMakeLists.txt b/src/program/CMakeLists.txt 31 --- a/src/program/CMakeLists.txt 32 +++ b/src/program/CMakeLists.txt
|
/openbmc/linux/security/tomoyo/ |
H A D | domain.c | 231 && p1->program == p2->program; in tomoyo_same_transition_control() 247 char *program = param->data; in tomoyo_write_transition_control() local 255 domainname = program; in tomoyo_write_transition_control() 256 program = NULL; in tomoyo_write_transition_control() 258 if (program && strcmp(program, "any")) { in tomoyo_write_transition_control() 259 if (!tomoyo_correct_path(program)) in tomoyo_write_transition_control() 261 e.program = tomoyo_get_name(program); in tomoyo_write_transition_control() 262 if (!e.program) in tomoyo_write_transition_control() 280 tomoyo_put_name(e.program); in tomoyo_write_transition_control() 321 if (ptr->program && tomoyo_pathcmp(ptr->program, program)) in tomoyo_scan_transition() [all …]
|
/openbmc/linux/Documentation/networking/ |
H A D | xdp-rx-metadata.rst | 5 This document describes how an eXpress Data Path (XDP) program can access 23 An XDP program can use these kfuncs to read the metadata into stack 25 consumers, an XDP program can store it into the metadata area carried 44 An XDP program can store individual metadata items into this ``data_meta`` 53 program that redirects XDP frames into the ``AF_XDP`` socket (``XSK``) and 54 the final consumer. Thus the BPF program manually allocates a fixed number of 74 This is the path where the packets processed by the XDP program are passed 82 In the future, we'd like to support a case where an XDP program 90 program after the redirect. However, the final consumer doesn't have 96 currently supported, which has to be prepared by the initial XDP program [all …]
|