Home
last modified time | relevance | path

Searched full:payload (Results 1 – 25 of 2497) sorted by relevance

12345678910>>...100

/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_payload.robot2 Documentation This suite tests IPMI Payload in OpenBMC.
10 Suite Setup IPMI Payload Setup Execution
34 Test Get Payload Activation Status
35 [Documentation] Test get payload activation status.
38 # SOL is the payload currently supported for payload status.
43 ${payload_status}= Get Payload Activation Status
47 Test Activate Payload
48 [Documentation] Test activate payload via IPMI raw command.
51 ${payload_status}= Get Payload Activation Status
52 Run Keyword If '${payload_status}' == '01' Deactivate Payload
[all …]
/openbmc/linux/drivers/media/radio/wl128x/
H A Dfmdrv_tx.c16 u16 payload; in fm_tx_set_stereo_mono() local
25 payload = (1 - mode); in fm_tx_set_stereo_mono()
26 ret = fmc_send_cmd(fmdev, MONO_SET, REG_WR, &payload, in fm_tx_set_stereo_mono()
27 sizeof(payload), NULL, NULL); in fm_tx_set_stereo_mono()
38 u16 payload; in set_rds_text() local
47 payload = (u16)0x1; in set_rds_text()
48 ret = fmc_send_cmd(fmdev, DISPLAY_MODE, REG_WR, &payload, in set_rds_text()
49 sizeof(payload), NULL, NULL); in set_rds_text()
58 u16 payload; in set_rds_data_mode() local
62 payload = (u16)0xcafe; in set_rds_data_mode()
[all …]
H A Dfmdrv_rx.c36 u16 payload, curr_frq, intr_flag; in fm_rx_set_freq() local
47 payload = FM_RX_AUDIO_ENABLE_I2S_AND_ANALOG; in fm_rx_set_freq()
49 ret = fmc_send_cmd(fmdev, AUDIO_ENABLE_SET, REG_WR, &payload, in fm_rx_set_freq()
50 sizeof(payload), NULL, NULL); in fm_rx_set_freq()
55 payload = FM_RX_IFFREQ_HILO_AUTOMATIC; in fm_rx_set_freq()
56 ret = fmc_send_cmd(fmdev, HILO_SET, REG_WR, &payload, in fm_rx_set_freq()
57 sizeof(payload), NULL, NULL); in fm_rx_set_freq()
62 payload = (freq - fmdev->rx.region.bot_freq) / FM_FREQ_MUL; in fm_rx_set_freq()
64 ret = fmc_send_cmd(fmdev, FREQ_SET, REG_WR, &payload, in fm_rx_set_freq()
65 sizeof(payload), NULL, NULL); in fm_rx_set_freq()
[all …]
/openbmc/phosphor-net-ipmid/command/
H A Dpayload_cmds.hpp21 * IPMI payload for Activate Payload command request.
26 uint8_t payloadType:6; //!< Payload type.
31 uint8_t reserved1:2; //!< Payload type.
32 uint8_t payloadType:6; //!< Payload type.
36 uint8_t payloadInstance:4; //!< Payload instance.
42 uint8_t payloadInstance:4; //!< Payload instance.
45 /** @brief The following Auxiliary Request Data applies only for payload
54 uint8_t auth:1; //!< If true, activate payload with authentication.
55 uint8_t encryption:1; //!< If true, activate payload with encryption.
59 uint8_t encryption:1; //!< If true, activate payload with encryption.
[all …]
/openbmc/linux/drivers/net/ethernet/mellanox/mlxsw/
H A Dreg.h30 #define MLXSW_REG_ZERO(type, payload) memset(payload, 0, MLXSW_REG(type)->len) argument
49 static inline void mlxsw_reg_sgcr_pack(char *payload, bool llb) in mlxsw_reg_sgcr_pack() argument
51 MLXSW_REG_ZERO(sgcr, payload); in mlxsw_reg_sgcr_pack()
52 mlxsw_reg_sgcr_llb_set(payload, !!llb); in mlxsw_reg_sgcr_pack()
110 static inline void mlxsw_reg_sspr_pack(char *payload, u16 local_port) in mlxsw_reg_sspr_pack() argument
112 MLXSW_REG_ZERO(sspr, payload); in mlxsw_reg_sspr_pack()
113 mlxsw_reg_sspr_m_set(payload, 1); in mlxsw_reg_sspr_pack()
114 mlxsw_reg_sspr_local_port_set(payload, local_port); in mlxsw_reg_sspr_pack()
115 mlxsw_reg_sspr_system_port_set(payload, local_port); in mlxsw_reg_sspr_pack()
143 static inline void mlxsw_reg_sfdat_pack(char *payload, u32 age_time) in mlxsw_reg_sfdat_pack() argument
[all …]
/openbmc/linux/security/keys/
H A Dbig_key.c21 * Layout of key payload words.
28 #define to_big_key_payload(payload) \ argument
29 (struct big_key_payload *)((payload).data)
40 * arbitrary blob of data as the payload
59 struct big_key_payload *payload = to_big_key_payload(prep->payload); in big_key_preparse() local
67 BUILD_BUG_ON(sizeof(*payload) != sizeof(prep->payload.data)); in big_key_preparse()
75 payload->length = datalen; in big_key_preparse()
123 payload->data = enckey; in big_key_preparse()
124 payload->path = file->f_path; in big_key_preparse()
125 path_get(&payload->path); in big_key_preparse()
[all …]
/openbmc/linux/tools/perf/util/arm-spe-decoder/
H A Darm-spe-decoder.c25 static u64 arm_spe_calc_ip(int index, u64 payload) in arm_spe_calc_ip() argument
32 ns = SPE_ADDR_PKT_GET_NS(payload); in arm_spe_calc_ip()
33 el = SPE_ADDR_PKT_GET_EL(payload); in arm_spe_calc_ip()
36 payload = SPE_ADDR_PKT_ADDR_GET_BYTES_0_6(payload); in arm_spe_calc_ip()
40 payload |= 0xffULL << SPE_ADDR_PKT_ADDR_BYTE7_SHIFT; in arm_spe_calc_ip()
46 payload = SPE_ADDR_PKT_ADDR_GET_BYTES_0_6(payload); in arm_spe_calc_ip()
50 * defines the data virtual address payload format, the top byte in arm_spe_calc_ip()
55 * specific pattern in bits [55:52] of payload which falls in in arm_spe_calc_ip()
62 val = SPE_ADDR_PKT_ADDR_GET_BYTE_6(payload); in arm_spe_calc_ip()
64 payload |= 0xffULL << SPE_ADDR_PKT_ADDR_BYTE7_SHIFT; in arm_spe_calc_ip()
[all …]
H A Darm-spe-pkt-decoder.c72 case 1: packet->payload = *(uint8_t *)buf; break; in arm_spe_get_payload()
73 case 2: packet->payload = le16_to_cpu(*(uint16_t *)buf); break; in arm_spe_get_payload()
74 case 4: packet->payload = le32_to_cpu(*(uint32_t *)buf); break; in arm_spe_get_payload()
75 case 8: packet->payload = le64_to_cpu(*(uint64_t *)buf); break; in arm_spe_get_payload()
295 u64 payload = packet->payload; in arm_spe_pkt_desc_event() local
300 if (payload & BIT(EV_EXCEPTION_GEN)) in arm_spe_pkt_desc_event()
302 if (payload & BIT(EV_RETIRED)) in arm_spe_pkt_desc_event()
304 if (payload & BIT(EV_L1D_ACCESS)) in arm_spe_pkt_desc_event()
306 if (payload & BIT(EV_L1D_REFILL)) in arm_spe_pkt_desc_event()
308 if (payload & BIT(EV_TLB_ACCESS)) in arm_spe_pkt_desc_event()
[all …]
/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Dtest_varlen.c46 void *payload = payload1; in handler64_unsigned() local
53 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in1[0]); in handler64_unsigned()
55 payload += len; in handler64_unsigned()
59 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in2[0]); in handler64_unsigned()
61 payload += len; in handler64_unsigned()
65 total1 = payload - (void *)payload1; in handler64_unsigned()
76 void *payload = payload3; in handler64_signed() local
83 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in1[0]); in handler64_signed()
85 payload += len; in handler64_signed()
88 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in2[0]); in handler64_signed()
[all …]
H A Dprofiler.inc.h207 void* payload, in read_full_cgroup_path() argument
210 void* payload_start = payload; in read_full_cgroup_path()
218 bpf_probe_read_kernel_str(payload, MAX_PATH, in read_full_cgroup_path()
221 return payload; in read_full_cgroup_path()
223 *root_pos = payload - payload_start; in read_full_cgroup_path()
226 payload += filepart_length; in read_full_cgroup_path()
230 return payload; in read_full_cgroup_path()
253 void* payload) in populate_cgroup_info() argument
306 bpf_probe_read_kernel_str(payload, MAX_PATH, in populate_cgroup_info()
312 payload += cgroup_root_length; in populate_cgroup_info()
[all …]
/openbmc/linux/include/uapi/linux/
H A Ddm-log-userspace.h41 * you will see 'Payload-to-userspace' and 'Payload-to-kernel'. The
42 * 'Payload-to-userspace' is what the kernel sends in 'additional data' as
43 * necessary parameters to complete the request. The 'Payload-to-kernel' is
46 * structure denotes the availability and amount of payload data.
54 * Payload-to-userspace:
56 * Payload-to-kernel:
78 * Payload-to-userspace:
80 * Payload-to-kernel:
85 * payload data.
97 * Payload-to-userspace:
[all …]
/openbmc/linux/tools/perf/util/intel-pt-decoder/
H A Dintel-pt-pkt-decoder.c80 uint64_t payload; in intel_pt_get_long_tnt() local
86 payload = le64_to_cpu(*(uint64_t *)buf); in intel_pt_get_long_tnt()
89 if (payload & BIT63) in intel_pt_get_long_tnt()
91 payload <<= 1; in intel_pt_get_long_tnt()
96 packet->payload = payload << 1; in intel_pt_get_long_tnt()
103 uint64_t payload = 0; in intel_pt_get_pip() local
109 memcpy_le64(&payload, buf + 2, 6); in intel_pt_get_pip()
110 packet->payload = payload; in intel_pt_get_pip()
127 packet->payload = le16_to_cpu(*(uint16_t *)(buf + 2)); in intel_pt_get_cbr()
144 memcpy_le64(&packet->payload, buf + 2, count); in intel_pt_get_vmcs()
[all …]
/openbmc/ipmitool/src/plugins/lanplus/
H A Dlanplus.c96 struct ipmi_v2_payload * payload);
99 struct ipmi_v2_payload * payload, /* in */
107 struct ipmi_v2_payload * payload);
119 struct ipmi_v2_payload * payload);
644 * The authtype / payload type determines what we are receiving in ipmi_lan_poll_single()
654 * 2) An RMCP+ message with an IPMI reponse payload in ipmi_lan_poll_single()
699 lprintf(LOG_DEBUG+1, "<< Payload type : %s", in ipmi_lan_poll_single()
705 lprintf(LOG_DEBUG+1, "<< IPMI Msg/Payload Length : %d", in ipmi_lan_poll_single()
709 rsp->payload.ipmi_response.rq_addr); in ipmi_lan_poll_single()
711 rsp->payload.ipmi_response.netfn); in ipmi_lan_poll_single()
[all …]
/openbmc/linux/drivers/gpu/drm/amd/display/dc/dce/
H A Ddce_aux.c241 /* program action and address and payload data (if 'is_write') */ in submit_channel_request()
533 static enum i2caux_transaction_action i2caux_action_from_payload(struct aux_payload *payload) in i2caux_action_from_payload() argument
535 if (payload->i2c_over_aux) { in i2caux_action_from_payload()
536 if (payload->write_status_update) { in i2caux_action_from_payload()
537 if (payload->mot) in i2caux_action_from_payload()
542 if (payload->write) { in i2caux_action_from_payload()
543 if (payload->mot) in i2caux_action_from_payload()
548 if (payload->mot) in i2caux_action_from_payload()
553 if (payload->write) in i2caux_action_from_payload()
560 struct aux_payload *payload, in dce_aux_transfer_raw() argument
[all …]
/openbmc/qemu/docs/interop/
H A Dvhost-user-gpu.rst39 fields and a payload.
42 | request | flags | size | payload |
54 :size: ``u32``, size of the payload
56 Payload types
59 Depending on the request type, **payload** can be:
160 uint32_t size; /* the following payload size */
171 } payload;
194 :request payload: N/A
195 :reply payload: ``u64``
201 :request payload: ``u64``
[all …]
/openbmc/linux/security/keys/trusted-keys/
H A Dtrusted_tpm2.c31 static int tpm2_key_encode(struct trusted_key_payload *payload, in tpm2_key_encode() argument
84 work1 = payload->blob; in tpm2_key_encode()
85 work1 = asn1_encode_sequence(work1, work1 + sizeof(payload->blob), in tpm2_key_encode()
94 return work1 - payload->blob; in tpm2_key_encode()
109 static int tpm2_key_decode(struct trusted_key_payload *payload, in tpm2_key_decode() argument
119 ret = asn1_ber_decoder(&tpm2key_decoder, &ctx, payload->blob, in tpm2_key_decode()
120 payload->blob_len); in tpm2_key_decode()
232 * tpm2_seal_trusted() - seal the payload of a trusted key
235 * @payload: the key data in clear and encrypted form
241 struct trusted_key_payload *payload, in tpm2_seal_trusted() argument
[all …]
/openbmc/slpd-lite/test/
H A Dtest-suite.py14 print("Invalid Lang Tag Length, large payload")
15 payload = ( variable
26 ret = sock.sendto(payload, addr)
30 print("Large Lang Tag Length, large payload")
31 payload = ( variable
42 ret = sock.sendto(payload, addr)
46 print("Invalid Lang Tag Length, small payload")
47 payload = ( variable
58 ret = sock.sendto(payload, addr)
62 print("Large Lang Tag Length, small payload")
[all …]
/openbmc/linux/drivers/net/ethernet/netronome/nfp/flower/
H A Dtunnel_conf.c210 struct nfp_tun_active_tuns *payload; in nfp_tunnel_keep_alive() local
217 payload = nfp_flower_cmsg_get_data(skb); in nfp_tunnel_keep_alive()
218 count = be32_to_cpu(payload->count); in nfp_tunnel_keep_alive()
225 if (pay_len != struct_size(payload, tun_info, count)) { in nfp_tunnel_keep_alive()
232 ipv4_addr = payload->tun_info[i].ipv4; in nfp_tunnel_keep_alive()
233 port = be32_to_cpu(payload->tun_info[i].egress_port); in nfp_tunnel_keep_alive()
252 struct nfp_tun_active_tuns_v6 *payload; in nfp_tunnel_keep_alive_v6() local
259 payload = nfp_flower_cmsg_get_data(skb); in nfp_tunnel_keep_alive_v6()
260 count = be32_to_cpu(payload->count); in nfp_tunnel_keep_alive_v6()
267 if (pay_len != struct_size(payload, tun_info, count)) { in nfp_tunnel_keep_alive_v6()
[all …]
/openbmc/phosphor-host-ipmid/test/message/
H A Dpayload.cpp27 TEST(Payload, InputSize) in TEST() argument
31 ipmi::message::Payload p(std::forward<ipmi::SecureBuffer>(i)); in TEST()
35 TEST(Payload, OutputSize) in TEST() argument
37 ipmi::message::Payload p; in TEST()
47 TEST(Payload, Resize) in TEST() argument
50 ipmi::message::Payload p; in TEST()
56 TEST(Payload, Data) in TEST() argument
59 ipmi::message::Payload p; in TEST()
67 ipmi::message::Payload p; in TEST()
75 ipmi::message::Payload p; in TEST()
[all …]
/openbmc/linux/drivers/net/ipa/
H A Dipa_cmd.c30 * has a well-defined format, having a payload of a known length. This
32 * immediate command's opcode. The payload for a command resides in AP
136 /* Immediate command payload */
258 struct ipa_cmd_register_write *payload; in ipa_cmd_register_write_offset_valid() local
268 bit_count = BITS_PER_BYTE * sizeof(payload->offset); in ipa_cmd_register_write_offset_valid()
366 struct ipa_cmd_hw_ip_fltrt_init *payload; in ipa_cmd_table_init_add() local
387 payload = &cmd_payload->table_init; in ipa_cmd_table_init_add()
391 payload->hash_rules_addr = cpu_to_le64(hash_addr); in ipa_cmd_table_init_add()
392 payload->flags = cpu_to_le64(val); in ipa_cmd_table_init_add()
393 payload->nhash_rules_addr = cpu_to_le64(addr); in ipa_cmd_table_init_add()
[all …]
/openbmc/google-misc/subprojects/libcr51sign/src/
H A Dlibcr51sign_mauv.c33 // Verify BLOB magic bytes in payload's image descriptor at the expected offset
39 // @param[in] payload_blob_offset Absolute offset of payload BLOB data in
40 // payload's image descriptor
61 CPRINTS(ctx, "%s: Could not read BLOB magic bytes from payload\n", in verify_payload_blob_magic()
68 CPRINTS(ctx, "%s: BLOB magic bytes read from payload(%x) are invalid\n", in verify_payload_blob_magic()
76 // Find offset of Image MAUV data in payload BLOB inside the image descriptor
83 // payload BLOB magic bytes in image
85 // @param[in] payload_blob_size Size of payload BLOB as per its image
88 // data in payload's image
91 // payload's image descriptor
[all …]
/openbmc/phosphor-net-ipmid/
H A Dcrypt_algo.hpp18 * algorithm field that is used for encrypted payload data under the session.
19 * The ‘encrypted’ bit in the payload type field being set identifies packets
21 * When payload data is encrypted, there may be additional “Confidentiality
23 * payload. The size and definition of those fields is specific to the
56 * @brief Decrypt the incoming payload
60 * @param[in] payloadLen - Length of the encrypted IPMI payload
62 * @return decrypted payload if the operation is successful
69 * @brief Encrypt the outgoing payload
71 * @param[in] payload - plain payload for the outgoing IPMI packet
73 * @return encrypted payload if the operation is successful
[all …]
/openbmc/phosphor-net-ipmid/sol/
H A Dsol_context.hpp16 * Operation/Status in an outbound SOL payload format(BMC to Remote Console).
43 * Operation/Status in an Inbound SOL Payload format(Remote Console to BMC).
70 /** @struct Payload
72 * SOL Payload Data Format.The following fields make up the SOL payload in an
75 struct Payload struct
95 * packets under the IPMI session. At the payload level, SOL packets include
127 * @return outbound sequence number to populate the SOL payload.
151 * interfaces to handle incoming SOL payload, send response and send outbound
152 * SOL payload.
166 * This is called by the SOL Manager when a SOL payload instance is
[all …]
/openbmc/phosphor-networkd/src/
H A Dncsi_cmd.cpp59 " " << progname << " <options> raw TYPE [PAYLOAD...]\n" in print_usage()
60 " " << progname << " <options> oem [PAYLOAD...]\n" in print_usage()
71 "raw TYPE [PAYLOAD...]\n" in print_usage()
72 " Send a single command using raw type/payload data.\n" in print_usage()
74 " PAYLOAD Command payload bytes, as hex\n" in print_usage()
76 "oem PAYLOAD\n" in print_usage()
78 " PAYLOAD Command payload bytes, as hex\n"; in print_usage()
103 std::vector<unsigned char> payload; in parsePayload() local
105 /* we support two formats of payload - all as one argument: in parsePayload()
122 std::cerr << "Invalid payload length " << len0 in parsePayload()
[all …]
/openbmc/linux/drivers/platform/surface/aggregator/
H A Dssh_parser.c97 * @payload: The parsed payload (output).
100 * Parses and validates a SSH frame, including its payload, from the given
102 * writes the limits of the frame payload to the provided @payload span
109 * the %NULL pointer and the payload span will be set to the null span (start
114 * payload) CRC is invalid, or %-EMSGSIZE if the SSH message is bigger than
118 struct ssh_frame **frame, struct ssam_span *payload, in sshp_parse_frame() argument
126 payload->ptr = NULL; in sshp_parse_frame()
127 payload->len = 0; in sshp_parse_frame()
158 /* Pin down payload. */ in sshp_parse_frame()
161 /* Check for frame + payload length. */ in sshp_parse_frame()
[all …]

12345678910>>...100