/openbmc/linux/tools/testing/selftests/net/ |
H A D | l2tp.sh | 2 # SPDX-License-Identifier: GPL-2.0 6 # host-1 | router | host-2 25 local rc=$1 26 local expected=$2 27 local msg="$3" 29 if [ ${rc} -eq ${expected} ]; then 30 printf "TEST: %-60s [ OK ]\n" "${msg}" 35 printf "TEST: %-60s [FAIL]\n" "${msg}" 47 local ns 48 local cmd [all …]
|
H A D | traceroute.sh | 2 # SPDX-License-Identifier: GPL-2.0 14 local rc=$1 15 local expected=$2 16 local msg="$3" 18 if [ ${rc} -eq ${expected} ]; then 19 printf "TEST: %-60s [ OK ]\n" "${msg}" 24 printf "TEST: %-60s [FAIL]\n" "${msg}" 36 local ns 37 local cmd 38 local out [all …]
|
H A D | srv6_end_dt6_l3vpn_test.sh | 2 # SPDX-License-Identifier: GPL-2.0 17 # In other words, hosts hs-t100-1 and hs-t100-2 are connected through the IPv6 18 # L3 VPN of tenant 100 while hs-t200-3 and hs-t200-4 are connected using the 20 # is forbidden and thus, for example, hs-t100-1 cannot reach hs-t200-3 and vice 23 # Routers rt-1 and rt-2 implement IPv6 L3 VPN services leveraging the SRv6 28 # example where, within the same domain of tenant 100, the host hs-t100-1 pings 29 # the host hs-t100-2. 31 # First of all, L2 reachability of the host hs-t100-2 is taken into account by 32 # the router rt-1 which acts as a ndp proxy. 34 # When the host hs-t100-1 sends an IPv6 packet destined to hs-t100-2, the [all …]
|
H A D | srv6_end_dt4_l3vpn_test.sh | 2 # SPDX-License-Identifier: GPL-2.0 16 # In other words, hosts hs-t100-1 and hs-t100-2 are connected through the IPv4 17 # L3 VPN of tenant 100 while hs-t200-3 and hs-t200-4 are connected using the 19 # is forbidden and thus, for example, hs-t100-1 cannot reach hs-t200-3 and vice 22 # Routers rt-1 and rt-2 implement IPv4 L3 VPN services leveraging the SRv6 27 # example where, within the same domain of tenant 100, the host hs-t100-1 pings 28 # the host hs-t100-2. 30 # First of all, L2 reachability of the host hs-t100-2 is taken into account by 31 # the router rt-1 which acts as an arp proxy. 33 # When the host hs-t100-1 sends an IPv4 packet destined to hs-t100-2, the [all …]
|
H A D | srv6_hl2encap_red_l2vpn_test.sh | 2 # SPDX-License-Identifier: GPL-2.0 10 # In this example, hosts hs-1 and hs-2 are connected through an L2 VPN service. 11 # Currently, the SRv6 subsystem in Linux allows hosts hs-1 and hs-2 to exchange 14 # Routers rt-1,rt-2,rt-3 and rt-4 implement L2 VPN services 31 # sent over the interface connected with the destination host. 35 # +--------+ +--------+ 37 # | hs-1 | | hs-2 | 39 # +---+----+ +--- +---+ 42 # +---+----+ +----+---+ 44 # | rt-1 +-------------------+ rt-2 | [all …]
|
H A D | srv6_end_dt46_l3vpn_test.sh | 2 # SPDX-License-Identifier: GPL-2.0 11 # End.DT6 Behaviors which can be used respectively to support IPv4-in-IPv6 and 12 # IPv6-in-IPv6 VPNs. With End.DT4 and End.DT6 it is not possible to create a 26 # In other words, hosts hs-t100-1 and hs-t100-2 are connected through the 27 # IPv4/IPv6 L3 VPN of tenant 100 while hs-t200-3 and hs-t200-4 are connected 29 # and tenant 200 is forbidden and thus, for example, hs-t100-1 cannot reach 30 # hs-t200-3 and vice versa. 32 # Routers rt-1 and rt-2 implement IPv4/IPv6 L3 VPN services leveraging the SRv6 37 # consider an example where, within the same domain of tenant 100, the host 38 # hs-t100-1 pings the host hs-t100-2. [all …]
|
H A D | fib_nexthop_multiprefix.sh | 2 # SPDX-License-Identifier: GPL-2.0 5 # Validate a different # exception is generated in h0 for each remote host. 9 # h0 - r1 - h2 25 local rc=$1 26 local expected=$2 27 local msg="$3" 29 if [ ${rc} -eq ${expected} ]; then 30 printf "TEST: %-60s [ OK ]\n" "${msg}" 35 printf "TEST: %-60s [FAIL]\n" "${msg}" 49 local cmd="$*" [all …]
|
/openbmc/openbmc/meta-facebook/meta-bletchley/recipes-bletchley/motor-ctrl/files/ |
H A D | power-ctrl | 9 # shellcheck source=meta-facebook/meta-bletchley/recipes-bletchley/plat-tools/files/bletchley-common-functions 10 source /usr/libexec/bletchley-common-functions 21 DBUS_HOST_ST_ON="xyz.openbmc_project.State.Host.HostState.Running" 22 DBUS_HOST_ST_OFF="xyz.openbmc_project.State.Host [all...] |
/openbmc/linux/drivers/misc/vmw_vmci/ |
H A D | vmci_route.c | 1 // SPDX-License-Identifier: GPL-2.0-only 38 * not touch a non-existent device. in vmci_route() 42 if (VMCI_INVALID_ID == dst->context) in vmci_route() 46 if (VMCI_HYPERVISOR_CONTEXT_ID == dst->context) { in vmci_route() 51 * from a local client. in vmci_route() 63 /* And we cannot send if the source is the host context. */ in vmci_route() 64 if (VMCI_HOST_CONTEXT_ID == src->context) in vmci_route() 75 if (VMCI_INVALID_ID == src->context && in vmci_route() 76 VMCI_INVALID_ID != src->resource) in vmci_route() 77 src->context = vmci_get_context_id(); in vmci_route() [all …]
|
/openbmc/linux/drivers/net/ethernet/sfc/ |
H A D | filter.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 4 * Copyright 2005-2013 Solarflare Communications Inc. 16 * enum efx_filter_match_flags - Flags for hardware filter match type 17 * @EFX_FILTER_MATCH_REM_HOST: Match by remote IP host address 18 * @EFX_FILTER_MATCH_LOC_HOST: Match by local IP host address 21 * @EFX_FILTER_MATCH_LOC_MAC: Match by local MAC address 22 * @EFX_FILTER_MATCH_LOC_PORT: Match by local TCP/UDP port 23 * @EFX_FILTER_MATCH_ETHER_TYPE: Match by Ether-type 27 * @EFX_FILTER_MATCH_LOC_MAC_IG: Match by local MAC address I/G bit. 33 * - Huntington supports filter matching controlled by firmware, potentially [all …]
|
/openbmc/openbmc/meta-facebook/meta-bletchley/recipes-bletchley/plat-svc/files/ |
H A D | bletchley-host-state-monitor | 5 # shellcheck source=meta-facebook/meta-bletchley/recipes-bletchley/plat-tools/files/bletchley-common-functions 6 source /usr/libexec/bletchley-common-functions 9 SWITCH_MDIO_BUS="1e650000.mdio-1" 11 declare - [all...] |
/openbmc/linux/drivers/net/ethernet/sfc/falcon/ |
H A D | filter.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 4 * Copyright 2005-2013 Solarflare Communications Inc. 15 * enum ef4_filter_match_flags - Flags for hardware filter match type 16 * @EF4_FILTER_MATCH_REM_HOST: Match by remote IP host address 17 * @EF4_FILTER_MATCH_LOC_HOST: Match by local IP host address 20 * @EF4_FILTER_MATCH_LOC_MAC: Match by local MAC address 21 * @EF4_FILTER_MATCH_LOC_PORT: Match by local TCP/UDP port 22 * @EF4_FILTER_MATCH_ETHER_TYPE: Match by Ether-type 26 * @EF4_FILTER_MATCH_LOC_MAC_IG: Match by local MAC address I/G bit. 31 * - Falcon supports RX filters matching by {TCP,UDP}/IPv4 4-tuple or [all …]
|
/openbmc/openbmc/poky/documentation/overview-manual/ |
H A D | development-environment.rst | 1 .. SPDX-License-Identifier: CC-BY-SA-2.0-UK 38 Linus Torvalds in 1991. Conversely, a good example of a non-open source 47 The Development Host 50 A development host or :term:`Build Host` is key to 54 system not intended to run the software --- the development host. 56 You need to set up a development host in order to use it with the Yocto 58 function as the development host. However, it is possible to use a 60 development host. When you have a Mac or Windows-based system, you can 61 set it up as the development host by using 62 `CROPS <https://github.com/crops/poky-container>`__, which leverages [all …]
|
/openbmc/linux/drivers/net/ethernet/sfc/siena/ |
H A D | filter.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 4 * Copyright 2005-2013 Solarflare Communications Inc. 15 * enum efx_filter_match_flags - Flags for hardware filter match type 16 * @EFX_FILTER_MATCH_REM_HOST: Match by remote IP host address 17 * @EFX_FILTER_MATCH_LOC_HOST: Match by local IP host address 20 * @EFX_FILTER_MATCH_LOC_MAC: Match by local MAC address 21 * @EFX_FILTER_MATCH_LOC_PORT: Match by local TCP/UDP port 22 * @EFX_FILTER_MATCH_ETHER_TYPE: Match by Ether-type 26 * @EFX_FILTER_MATCH_LOC_MAC_IG: Match by local MAC address I/G bit. 32 * - Falcon supports RX filters matching by {TCP,UDP}/IPv4 4-tuple or [all …]
|
/openbmc/openbmc/meta-facebook/meta-yosemite4/recipes-phosphor/dbus/phosphor-dbus-monitor/ |
H A D | fan-rotor-fail-mechanism | 15 local slot_number=$1 16 local object_path="/xyz/openbmc_project/state/host${slot_number}" 17 local service_name="xyz.openbmc_project.State.Host${slot_number}" 18 local interface="xyz.openbmc_project.State.Host" 19 local property="RequestedHostTransition" 20 local value="xyz.openbmc_project.State.Host.Transition.Off" 21 local ret=0 25 busctl set-property "$service_name" "$object_path" "$interface" "$property" s "$value" 29 if [ $ret -eq 0 ]; then
|
/openbmc/openbmc/meta-asrock/meta-common/recipes-phosphor/flash/phosphor-software-manager/ |
H A D | bios-update.sh | 3 die() { logger -s -t bios-update "Error: $*"; exit 1; } 4 info() { logger -s -t bios-update "$*"; } 7 . /etc/default/bios-update || die "Failed: unable to load /etc/default/bios-update" 9 [ -n "$BIOS_UPDATE_MAGIC_OFFSET" ] || die "BIOS_UPDATE_MAGIC_OFFSET not set" 10 [ -n "$BIOS_UPDATE_MAGIC" ] || die "BIOS_UPDATE_MAGIC not set" 11 [ -n "$BIOS_UPDATE_SIZE" ] || die "BIOS_UPDATE_SIZE not set" 13 declare -A prep_gpios_pids 16 smc_drvdir="/sys/bus/platform/drivers/spi-aspeed-smc" 18 hoststate_svc="xyz.openbmc_project.State.Host" 20 hoststate_intf="xyz.openbmc_project.State.Host" [all …]
|
/openbmc/openbmc-test-automation/ffdc/plugins/ |
H A D | scp_execution.py | 7 # ---------Set sys.path for pluqin execution---------------------------------- 26 Copy a file from a remote host to the local host using SCP. 28 This function copies a file from a remote host to the local host using the 29 SCP protocol. The function takes the remote host details (hostname, 30 username, password), the filename with its full path on the remote host, 31 and the local directory path as arguments. 36 hostname (str): Name or IP address of the remote host. 37 username (str): User on the remote host with access to files. 38 password (str): Password for the user on the remote host. 40 filename (str): Filename with full path on the remote host. [all …]
|
/openbmc/linux/tools/usb/usbip/doc/ |
H A D | usbip.8 | 3 usbip \- manage USB/IP devices 15 \fB\-\-debug\fR 21 \fB\-\-log\fR 27 \fB\-\-tcp-port PORT\fR 29 Connect to PORT on remote host (used for attach and list --remote). 47 \fBattach\fR \-\-remote=<\fIhost\fR> \-\-busid=<\fIbus_id\fR> 53 \fBattach\fR \-\-remote=<\fIhost\fR> \-\-device=<\fIdev_id\fR> 60 \fBdetach\fR \-\-port=<\fIport\fR> 66 \fBbind\fR \-\-busid=<\fIbusid\fR> 72 \fBunbind\fR \-\-busid=<\fIbusid\fR> [all …]
|
/openbmc/linux/drivers/scsi/libfc/ |
H A D | fc_lport.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Maintained at www.Open-FCoE.org 27 * be held while attempting to acquire a greater lock. Here is the hierarchy- 42 * single-threaded workqueue. An rport would never be free'd while in a 92 /* Fabric IDs to use for point-to-point mode, chosen on whims. */ 134 * struct fc_bsg_info - FC Passthrough managemet structure 136 * @lport: The local port to pass through a command 138 * @sg: job->reply_payload.sg_list 139 * @nents: job->reply_payload.sg_cnt 152 * fc_frame_drop() - Dummy frame handler [all …]
|
/openbmc/linux/Documentation/driver-api/mei/ |
H A D | iamt.rst | 1 .. SPDX-License-Identifier: GPL-2.0 10 Intel AMT provides the ability to manage a host remotely out-of-band (OOB) 11 even when the operating system running on the host processor has crashed or 15 - Monitoring hardware state and platform components 16 - Remote power off/on (useful for green computing or overnight IT 18 - OS updates 19 - Storage of useful platform information such as software assets 20 - Built-in hardware KVM 21 - Selective network isolation of Ethernet and IP protocol flows based 23 - IDE device redirection from remote management console [all …]
|
/openbmc/docs/testing/ |
H A D | local-ci-build.md | 1 # Local CI Build 13 `sudo docker run hello-world`. 26 git clone https://github.com/openbmc/openbmc-build-scripts.git 29 ## Add a Read-Only Repo 33 clones and builds phosphor-hwmon directly. The upstream CI will try building 35 `format-code.sh` and check if the code is formatted properly if there is a 36 `.clang-format` file present in the target repository, or if there is a script 37 in the repo named `format-code.sh`. 41 git clone https://github.com/openbmc/phosphor-hwmon 42 WORKSPACE=$(pwd) UNIT_TEST_PKG=phosphor-hwmon \ [all …]
|
/openbmc/linux/tools/testing/selftests/net/forwarding/ |
H A D | sch_tbf_core.sh | 1 # SPDX-License-Identifier: GPL-2.0 7 # In order to test per-class shaping, $swp2 actually contains TBF under PRIO or 10 # +-------------------------------------------+ 18 # +---------------------|---------------------+ 20 # +---------------------|---------------------+ 24 # | +-|--------------+ +--------------|-+ | 30 # | +-|--------------+ +--------------|-+ | 34 # +---------------------|---------------------+ 36 # +---------------------|---------------------+ 43 # +-------------------------------------------+ [all …]
|
/openbmc/linux/tools/testing/selftests/drivers/net/mlxsw/ |
H A D | sch_red_core.sh | 1 # SPDX-License-Identifier: GPL-2.0 9 # is what H2 is used for--it sends the extra traffic to create backlog. 16 # The test uses the buffer build-up behavior to test the installed RED. 23 # +--------------------------+ +--------------------------+ 34 # +-------------|------------+ +-------------|------------+ 36 # +-------------|------------------------------------------------|------------+ 40 # | +-|-----------------+ | +-|-----------------+ | | 42 # | | | | .-------------+ $swp5.10 | | | 46 # | +-|-----------------+ | | | + $swp3.10 | | | 47 # | | | | +-|-----------------+ | | [all …]
|
/openbmc/qemu/net/ |
H A D | dgram.c | 4 * Copyright (c) 2003-2008 Fabrice Bellard 32 #include "qemu/error-report.h" 36 #include "qemu/main-loop.h" 55 qemu_set_fd_handler(s->fd, in net_dgram_update_fd_handler() 56 s->read_poll ? net_dgram_send : NULL, in net_dgram_update_fd_handler() 57 s->write_poll ? net_dgram_writable : NULL, in net_dgram_update_fd_handler() 63 s->read_poll = enable; in net_dgram_read_poll() 69 s->write_poll = enable; in net_dgram_write_poll() 79 qemu_flush_queued_packets(&s->nc); in net_dgram_writable() 89 if (s->dest_addr) { in net_dgram_receive() [all …]
|
/openbmc/linux/tools/testing/selftests/drivers/net/dsa/ |
H A D | bridge_mdb.sh | 2 # SPDX-License-Identifier: GPL-2.0 4 # +------- [all...] |