Home
last modified time | relevance | path

Searched +full:- +full:user (Results 1 – 25 of 1093) sorted by relevance

12345678910>>...44

/openbmc/openbmc/poky/bitbake/doc/
H A Dreleases.rst1 .. SPDX-License-Identifier: CC-BY-2.5
11 - :yocto_docs:`BitBake 2.8 User Manual </bitbake/2.8/>`
17 - :yocto_docs:`BitBake 2.0 User Manual </bitbake/2.0/>`
23 - :yocto_docs:`BitBake 1.46 User Manual </bitbake/1.46/>`
33 - :yocto_docs:`BitBake 2.6 User Manual </bitbake/2.6/>`
39 - :yocto_docs:`BitBake 2.4 User Manual </bitbake/2.4/>`
45 - :yocto_docs:`BitBake 2.2 User Manual </bitbake/2.2/>`
51 - :yocto_docs:`BitBake 1.52 User Manual </bitbake/1.52/>`
57 - :yocto_docs:`BitBake 1.50 User Manual </bitbake/1.50/>`
63 - :yocto_docs:`BitBake 1.48 User Manual </bitbake/1.48/>`
[all …]
H A Dindex.rst1 .. SPDX-License-Identifier: CC-BY-2.5
4 BitBake User Manual
13 bitbake-user-manual/bitbake-user-manual-intro
14 bitbake-user-manual/bitbake-user-manual-execution
15 bitbake-user-manual/bitbake-user-manual-metadata
16 bitbake-user-manual/bitbake-user-manual-ref-variables-context
17 bitbake-user-manual/bitbake-user-manual-fetching
18 bitbake-user-manual/bitbake-user-manual-ref-variables
19 bitbake-user-manual/bitbake-user-manual-hello
28 ----
[all …]
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/
H A DManager.interface.yaml2 Provides user management functionality. As communication to this service is
7 - name: CreateUser
9 Creates a new user. If the user already exists, then it will throw an
12 - name: UserName
15 User name which has to be created.
16 - name: GroupNames
19 List of groups to which the user has to be added.
20 - name: Privilege
23 Privilege of the user to be added.
24 - name: Enabled
[all …]
H A DREADME.md1 # User Management
5 User Manager service exposes D-Bus methods for user management operations.
7 ### User Manager Interface
9 User manager interface `xyz.openbmc_project.User.Manager` provides following
12 #### xyz.openbmc_project.User.Manager interface
16 - CreateUser - To create new user to the system.
17 - RenameUser - To rename existing user to new name in the system.
21 - AllGroups - To list all the groups supported in the system.
22 - AllPrivileges - To list all the privileges supported in the system.
26 - UserRenamed - Signal sent out when user is renamed in the system.
[all …]
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A Dtest_redfishtool_local_user.robot4 Documentation Suite to test local user management.
23 ... redfishtool raw -r ${OPENBMC_HOST}:${HTTPS_PORT} -u ${OPENBMC_USERNAME} -p ${OPENBMC_PASSWORD}…
29 [Documentation] Create user via Redfishtool and verify.
31 [Teardown] Redfishtool Delete User "UserT100"
33 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true
34 Redfishtool Verify User "UserT100" "ReadOnly"
38 [Documentation] Modify user via Redfishtool and verify.
40 [Teardown] Redfishtool Delete User "UserT100"
42 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true
43 Redfishtool Update User Role "UserT100" "Administrator"
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_user_management_sub_menu.robot3 Documentation Test OpenBMC GUI "User management" sub-menu of "Security and access".
16 ${xpath_user_management_heading} //h1[text()="User management"]
17 ${xpath_select_user} //input[contains(@class,"custom-control-input")]
19 ${xpath_add_user} //button[contains(text(),'Add user')]
20 ${xpath_edit_user} //*[@data-test-id='userManagement-tableRowAction-edit-0']
21 ${xpath_delete_user} //*[@data-test-id='userManagement-tableRowAction-delete-1']
22 ${xpath_account_status_enabled_button} //*[@data-test-id='userManagement-radioButton-statusEnable…
23 ${xpath_account_status_disabled_button} //*[@data-test-id='userManagement-radioButton-statusDisabl…
24 ${xpath_username_input_button} //*[@data-test-id='userManagement-input-username']
25 ${xpath_privilege_list_button} //*[@data-test-id='userManagement-select-privilege']
[all …]
/openbmc/linux/Documentation/admin-guide/sysctl/
H A Duser.rst2 Documentation for /proc/sys/user/
9 ------------------------------------------------------------------------------
12 /proc/sys/user.
16 per user per user namespace limits.
24 The creation of per user per user namespace objects are charged to
25 the user in the user namespace who created the object and
26 verified to be below the per user limit in that user namespace.
29 who created user namespaces the creation of the object happens
30 in (user namespaces can be nested) and verified to be below the per user
31 limits in the user namespaces of those users.
[all …]
/openbmc/linux/fs/smb/server/mgmt/
H A Duser_config.c1 // SPDX-License-Identifier: GPL-2.0-or-later
15 struct ksmbd_user *user = NULL; in ksmbd_login_user() local
21 if (!(resp->status & KSMBD_USER_FLAG_OK)) in ksmbd_login_user()
24 user = ksmbd_alloc_user(resp); in ksmbd_login_user()
27 return user; in ksmbd_login_user()
32 struct ksmbd_user *user = NULL; in ksmbd_alloc_user() local
34 user = kmalloc(sizeof(struct ksmbd_user), GFP_KERNEL); in ksmbd_alloc_user()
35 if (!user) in ksmbd_alloc_user()
38 user->name = kstrdup(resp->account, GFP_KERNEL); in ksmbd_alloc_user()
39 user->flags = resp->status; in ksmbd_alloc_user()
[all …]
H A Duser_config.h1 /* SPDX-License-Identifier: GPL-2.0-or-later */
23 static inline bool user_guest(struct ksmbd_user *user) in user_guest() argument
25 return user->flags & KSMBD_USER_FLAG_GUEST_ACCOUNT; in user_guest()
28 static inline void set_user_flag(struct ksmbd_user *user, int flag) in set_user_flag() argument
30 user->flags |= flag; in set_user_flag()
33 static inline int test_user_flag(struct ksmbd_user *user, int flag) in test_user_flag() argument
35 return user->flags & flag; in test_user_flag()
38 static inline void set_user_guest(struct ksmbd_user *user) in set_user_guest() argument
42 static inline char *user_passkey(struct ksmbd_user *user) in user_passkey() argument
44 return user->passkey; in user_passkey()
[all …]
/openbmc/phosphor-host-ipmid/user_channel/
H A Duser_mgmt.hpp8 // http://www.apache.org/licenses/LICENSE-2.0
42 * @enum User update events.
57 * Structure for user privilege access (refer spec sec 22.22)
69 * Structure for user related information
83 * Structure for array of user related information
88 UserInfo user[ipmiMaxUsers + 1]; member
91 /** @brief PAM User Authentication check
93 * @param[in] username - username in string
94 * @param[in] password - password in string
118 * @param[in] chNum - channel number
[all …]
H A Duser_layer.hpp8 // http://www.apache.org/licenses/LICENSE-2.0
47 * User privilege related access data as per IPMI specification.(refer spec
71 * given user and channel. (refer spec sec 24.6)
81 /** @brief initializes user management
87 /** @brief The ipmi get user password layer call
89 * @param[in] userName - user name
98 * @param[in] userName - user name to be removed
100 * @return 0 on success, non-zero otherwise.
104 /** @brief The IPMI call to reuse password entry for the renamed user
107 * @param[in] userName - user name which has to be renamed
[all …]
/openbmc/docs/architecture/
H A Duser-management.md1 # User Management - OpenBMC - Design document
6 user-management components. The implementation detail is beyond the scope of
11 1. Use common user-management (e.g. phosphor-user-manager) rather than
12 application-based user-management. Especially, avoid IPMI based
13 user-management.
14 2. For security reasons, avoid transmitting passwords over any D-Bus API.
15 Observe this rule even while creating, modifying or authenticating the user.
16 3. Have applications use the PAM module to authenticate the user instead of
17 relying on a D-Bus API-based approach.
18 4. User creation has to be generic in nature wherever possible.
[all …]
/openbmc/phosphor-user-manager/
H A Duser_mgr.hpp8 // http://www.apache.org/licenses/LICENSE-2.0
21 #include <phosphor-logging/elog-errors.hpp>
22 #include <phosphor-logging/elog.hpp>
23 #include <phosphor-logging/lg2.hpp>
27 #include <xyz/openbmc_project/User/AccountPolicy/server.hpp>
28 #include <xyz/openbmc_project/User/Manager/server.hpp>
38 namespace user namespace
47 using UserMgrIface = sdbusplus::xyz::openbmc_project::User::server::Manager;
51 sdbusplus::xyz::openbmc_project::User::server::AccountPolicy;
110 * @brief Responsible for managing user accounts over the D-Bus interface.
[all …]
H A Dusers.hpp8 // http://www.apache.org/licenses/LICENSE-2.0
20 #include <xyz/openbmc_project/User/Attributes/server.hpp>
24 namespace user namespace
28 using UsersIface = Base::User::server::Attributes;
31 // Place where all user objects has to be created
32 constexpr auto usersObjPath = "/xyz/openbmc_project/user";
37 * @brief Lists User objects and it's properties
51 * @param[in] bus - sdbusplus handler
52 * @param[in] path - D-Bus path
53 * @param[in] groups - users group list
[all …]
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_user_account.robot2 Documentation Test Redfish user account.
31 Verify Redfish Admin User Persistence After Reboot
32 [Documentation] Verify Redfish admin user persistence after reboot.
35 ... Redfish Create User admin_user TestPwd123 Administrator ${True}
43 Redfish Verify User admin_user TestPwd123 Administrator ${True}
46 Verify Redfish Operator User Persistence After Reboot
47 [Documentation] Verify Redfish operator user persistence after reboot.
50 ... Redfish Create User operator_user TestPwd123 Operator ${True}
58 Redfish Verify User operator_user TestPwd123 Operator ${True}
61 Verify Redfish Readonly User Persistence After Reboot
[all …]
/openbmc/linux/arch/arm64/kernel/
H A Dsignal.c1 // SPDX-License-Identifier: GPL-2.0-only
5 * Copyright (C) 1995-2009 Russell King
24 #include <asm/debug-monitors.h>
38 * Do a signal return; undo the signal stack. These are aligned to 128-bit.
71 static void init_user_layout(struct rt_sigframe_user_layout *user) in init_user_layout() argument
74 sizeof(user->sigframe->uc.uc_mcontext.__reserved); in init_user_layout()
76 memset(user, 0, sizeof(*user)); in init_user_layout()
77 user->size = offsetof(struct rt_sigframe, uc.uc_mcontext.__reserved); in init_user_layout()
79 user->limit = user->size + reserved_size; in init_user_layout()
81 user->limit -= TERMINATOR_SIZE; in init_user_layout()
[all …]
/openbmc/openbmc-test-automation/gui/test/access_control/
H A Dtest_obmc_gui_local_users.robot3 Documentation Test OpenBMC GUI "Local users" sub-menu of "Access control".
14 ${xpath_select_user} //input[contains(@class,"bmc-table__checkbox-input")]
15 ${xpath_edit_user} //button[@aria-label="Edit"]
16 ${xpath_delete_user} //button[@aria-label="Delete"]
18 ${xpath_add_user} //button[text()[contains(.,"Add user")]]
29 Verify Existence Of All Sections In Local User Management Page
30 [Documentation] Verify existence of all sections in local user management page.
36 Verify Existence Of All Buttons In Local User Management Page
37 [Documentation] Verify existence of all buttons in local user management page.
46 Verify Existence Of All Input Boxes In Local User Management Page
[all …]
/openbmc/phosphor-webui/app/access-control/controllers/
H A Duser-controller.js2 * Controller for user Accounts
4 * @module app/access-control
32 * @param {*} user
34 function checkIfRoot(user) { argument
35 return user.UserName === 'root' ? true : false;
40 * @param {*} user
41 * @returns user
43 function mapTableData(user) { argument
44 const accountStatus = user.Locked ? 'Locked' :
45 user.Enabled ? 'Enabled' :
[all …]
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_payload.robot93 Verify Set User Access Payload For Standard Payload SOL
96 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex}
97 ... AND Delete Created User ${userid}
100 ${userid} ${username}= Create And Verify IPMI User
104 # Get default user access payload values.
105 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format}
107 # Disable Standard payload 1 via set user access payload command.
108 Set User Access Payload For Given User ${user_id_in_hex} Disable
113 Verify Set User Access Payload For Operator Privileged User
114 [Documentation] Try to set user access payload using operator privileged user and expect error.
[all …]
H A Dtest_ipmi_user.robot2 Documentation Test suite for OpenBMC IPMI user management.
17 ${invalid_username} user%
34 # User defined count.
39 Verify IPMI User Summary
40 [Documentation] Verify IPMI maximum supported IPMI user ID and
41 ... enabled user from user summary.
44 ... Delete Created User ${random_userid}
46 ${initial_user_count} ${maximum_ids}= Get Enabled User Count
48 ${random_userid} ${random_username}= Create Random IPMI User
50 Run IPMI Standard Command user enable ${random_userid}
[all …]
/openbmc/qemu/docs/system/devices/
H A Dvhost-user.rst3 vhost-user back ends
4 --------------------
6 vhost-user back ends are way to service the request of VirtIO devices
10 vhost-user device
15 a ``chardev`` option which specifies the ID of the ``--chardev``
16 device that connects via a socket to the vhost-user *daemon*.
18 Each device will have an virtio-mmio and virtio-pci variant. See your
21 .. list-table:: vhost-user devices
23 :header-rows: 1
25 * - Device
[all …]
/openbmc/qemu/scripts/
H A Dupdate-syscalltbl.sh2 arch/alpha/kernel/syscalls/syscall.tbl,linux-user/alpha/syscall.tbl \
3 arch/arm/tools/syscall.tbl,linux-user/arm/syscall.tbl \
4 scripts/syscall.tbl,linux-user/aarch64/syscall_64.tbl \
5 scripts/syscall.tbl,linux-user/hexagon/syscall.tbl \
6 scripts/syscall.tbl,linux-user/loongarch64/syscall.tbl \
7 arch/m68k/kernel/syscalls/syscall.tbl,linux-user/m68k/syscall.tbl \
8 arch/microblaze/kernel/syscalls/syscall.tbl,linux-user/microblaze/syscall.tbl \
9 arch/mips/kernel/syscalls/syscall_n32.tbl,linux-user/mips64/syscall_n32.tbl \
10 arch/mips/kernel/syscalls/syscall_n64.tbl,linux-user/mips64/syscall_n64.tbl \
11 arch/mips/kernel/syscalls/syscall_o32.tbl,linux-user/mips/syscall_o32.tbl \
[all …]
/openbmc/qemu/tests/docker/dockerfiles/
H A Ddebian-all-test-cross.docker2 # Docker all cross-compiler target (tests only)
7 # to build and run linux-user tests on GitLab
9 FROM docker.io/library/debian:12-slim
11 # Duplicate deb line as deb-src
12 RUN sed -in "s/Types: deb/Types: deb deb-src/g" /etc/apt/sources.list.d/debian.sources
15 apt-get update && \
16 apt-get install -y eatmydata && \
17 eatmydata apt-get dist-upgrade -y && \
18 apt build-dep -yy qemu
22 apt install -y --no-install-recommends \
[all …]
/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_expire_password.robot2 Documentation Test root user expire password.
17 # If user re-tries more than 5 time incorrectly, the user gets locked for 5 minutes.
29 [Documentation] Expire root user password and expect an error while access via IPMI.
35 ${status}= Run Keyword And Return Status Run External IPMI Standard Command lan print -v
40 [Documentation] Expire root user password and expect an error while access via SSH.
51 Expire And Change Root User Password And Access Via SSH
52 [Documentation] Expire and change root user password and access via SSH.
55 ... Restore Default Password For Root User AND FFDC On Test Case Fail
72 ... Restore Default Password For Root User AND FFDC On Test Case Fail
83 Expire And Change Root User Password Via Redfish And Verify
[all …]
/openbmc/linux/kernel/trace/
H A Dtrace_events_user.c1 // SPDX-License-Identifier: GPL-2.0-only
29 #define USER_EVENTS_PREFIX_LEN (sizeof(USER_EVENTS_PREFIX)-1)
37 #define EVENT_NAME(user_event) ((user_event)->tracepoint.name)
44 * probes to print out to the user.
46 * These do not reflect the mapped bytes between the user and kernel space.
63 /* Group for init_user_ns mapping, top-most group */
73 * Stores per-event properties, as users register events
96 * Stores per-mm/event properties that enable an address to be
109 /* Bits 0-5 are for the bit to update upon enable/disable (0-63 allowed) */
118 /* Bit 8 is for marking 32-bit on 64-bit */
[all …]

12345678910>>...44