Home
last modified time | relevance | path

Searched +full:end +full:- +full:user (Results 1 – 25 of 1037) sorted by relevance

12345678910>>...42

/openbmc/qemu/docs/interop/
H A Dvhost-user.rst4 Vhost-user Protocol
11 version 2 or later. See the COPYING file in the top-level
21 the control plane needed to establish virtqueue sharing with a user
26 The protocol defines 2 sides of the communication, *front-end* and
27 *back-end*. The *front-end* is the application that shares its virtqueues, in
28 our case QEMU. The *back-end* is the consumer of the virtqueues.
30 In the current implementation QEMU is the *front-end*, and the *back-end*
32 software Ethernet switch running in user space, such as Snabbswitch,
33 or a block device back-end processing read & write to a virtual
34 disk. In order to facilitate interoperability between various back-end
[all …]
/openbmc/linux/arch/arm64/include/asm/
H A Dcacheflush.h1 /* SPDX-License-Identifier: GPL-2.0-only */
5 * Copyright (C) 1999-2002 Russell King.
16 * and does not require cleaning before returning it to the user.
26 * Start addresses are inclusive and end addresses are exclusive; start
27 * addresses should be rounded down, end addresses up.
29 * See Documentation/core-api/cachetlb.rst for more information. Please note that
30 * the implementation assumes non-aliasing VIPT D-cache and (aliasing)
31 * VIPT I-cache.
33 * All functions below apply to the interval [start, end)
34 * - start - virtual start address (inclusive)
[all …]
H A Dtlbflush.h1 /* SPDX-License-Identifier: GPL-2.0-only */
5 * Copyright (C) 1999-2003 Russell King
69 * - 4KB : 1
70 * - 16KB : 2
71 * - 64KB : 3
92 * Level-based TLBI operations.
94 * When ARMv8.4-TTL exists, TLBI operations take an additional hint for
98 * perform a non-hinted invalidation.
100 * For Stage-2 invalidation, use the level values provided to that effect
128 * +----------+------+-------+-------+-------+----------------------+
[all …]
/openbmc/phosphor-user-manager/
H A Duser_mgr.cpp8 // http://www.apache.org/licenses/LICENSE-2.0
34 #include <phosphor-logging/elog-errors.hpp>
35 #include <phosphor-logging/elog.hpp>
36 #include <phosphor-logging/lg2.hpp>
38 #include <xyz/openbmc_project/User/Common/error.hpp>
53 namespace user namespace
61 static constexpr int failure = -1;
77 "/xyz/openbmc_project/user/ldap";
95 sdbusplus::xyz::openbmc_project::User
494 const auto& user = usersList[userName]; renameUser() local
1202 const auto& user = usersList[userName]; getUserInfo() local
1446 for (auto& user : userNameList) initUserObjects() local
[all...]
/openbmc/linux/Documentation/core-api/
H A Dcachetlb.rst19 if it can be proven that a user address space has never executed
25 virtual-->physical address translations obtained from the software
43 This interface flushes an entire user address space from
54 unsigned long start, unsigned long end)``
56 Here we are flushing a specific range of (user) virtual
59 modifications for the address space 'vma->vm_mm' in the range
60 'start' to 'end-1' will be visible to the cpu. That is, after
62 virtual addresses in the range 'start' to 'end-1'.
78 address space is available via vma->vm_mm. Also, one may
79 test (vma->vm_flags & VM_EXEC) to see if this region is
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_user_management_sub_menu.robot3 Documentation Test OpenBMC GUI "User management" sub-menu of "Security and access".
16 ${xpath_user_management_heading} //h1[text()="User management"]
17 ${xpath_select_user} //input[contains(@class,"custom-control-input")]
19 ${xpath_add_user} //button[contains(text(),'Add user')]
20 ${xpath_edit_user} //*[@data-test-id='userManagement-tableRowAction-edit-0']
21 ${xpath_delete_user} //*[@data-test-id='userManagement-tableRowAction-delete-1']
22 ${xpath_account_status_enabled_button} //*[@data-test-id='userManagement-radioButton-statusEnable…
23 ${xpath_account_status_disabled_button} //*[@data-test-id='userManagement-radioButton-statusDisabl…
24 ${xpath_username_input_button} //*[@data-test-id='userManagement-input-username']
25 ${xpath_privilege_list_button} //*[@data-test-id='userManagement-select-privilege']
[all …]
/openbmc/u-boot/cmd/
H A Dini.c1 // SPDX-License-Identifier: BSD-3-Clause
3 * inih -- simple .INI file parser
38 /* Strip whitespace chars off end of given string, in place. Return s. */
43 while (p > s && isspace(*--p)) in rstrip()
48 /* Return pointer to first non-whitespace char in given string. */
57 null at end of string if neither found. ';' must be prefixed by a whitespace
70 /* Version of strncpy that ensures dest (size bytes) is null-terminated. */
74 dest[size - 1] = '\0'; in strncpy0()
81 char *end; in memgets() local
85 end = memchr(*mem, '\n', *memsize); in memgets()
[all …]
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_payload.robot93 Verify Set User Access Payload For Standard Payload SOL
96 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex}
97 ... AND Delete Created User ${userid}
100 ${userid} ${username}= Create And Verify IPMI User
104 # Get default user access payload values.
105 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format}
107 # Disable Standard payload 1 via set user access payload command.
108 Set User Access Payload For Given User ${user_id_in_hex} Disable
113 Verify Set User Access Payload For Operator Privileged User
114 [Documentation] Try to set user access payload using operator privileged user and expect error.
[all …]
/openbmc/linux/arch/arm/include/asm/
H A Dcacheflush.h1 /* SPDX-License-Identifier: GPL-2.0-only */
5 * Copyright (C) 1999-2002 Russell King
12 #include <asm/glue-cache.h>
17 #define CACHE_COLOUR(vaddr) ((vaddr & (SHMLBA - 1)) >> PAGE_SHIFT)
21 * and does not require cleaning before returning it to the user.
29 * The arch/arm/mm/cache-*.S and arch/arm/mm/proc-*.S files
32 * Start addresses are inclusive and end addresses are exclusive;
33 * start addresses should be rounded down, end addresses up.
35 * See Documentation/core-api/cachetlb.rst for more information.
37 * effects are cache-type (VIVT/VIPT/PIPT) specific.
[all …]
/openbmc/openbmc-test-automation/openpower/ext_interfaces/
H A Dtest_vmicert_management.robot21 # users User Name password
34 [Documentation] Get CSR request signed by VMI using different user roles and verify.
41 # Send CSR request from operator user.
44 # Send CSR request from ReadOnly user.
47 # Send CSR request from NoAccess user.
57 # Request root certificate from admin user.
60 # Request root certificate from operator user.
63 # Request root certificate from ReadOnly user.
66 # Request root certificate from NoAccess user.
81 # Send CSR request from operator user.
[all …]
/openbmc/linux/arch/arm64/mm/
H A Dflush.c1 // SPDX-License-Identifier: GPL-2.0-only
5 * Copyright (C) 1995-2002 Russell King
18 void sync_icache_aliases(unsigned long start, unsigned long end) in sync_icache_aliases() argument
21 dcache_clean_pou(start, end); in sync_icache_aliases()
25 * Don't issue kick_all_cpus_sync() after I-cache invalidation in sync_icache_aliases()
26 * for user mappings. in sync_icache_aliases()
28 caches_clean_inval_pou(start, end); in sync_icache_aliases()
33 unsigned long end) in flush_ptrace_access() argument
35 if (vma->vm_flags & VM_EXEC) in flush_ptrace_access()
36 sync_icache_aliases(start, end); in flush_ptrace_access()
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/dlt-daemon/dlt-daemon/
H A D0002-Don-t-execute-processes-as-a-specific-user.patch4 Subject: [PATCH 2/4] Don't execute processes as a specific user.
6 Upstream-Status: Inappropriate [Configuration Specific]
7 Signed-off-by: Andrei Gherzan <andrei.gherzan@windriver.com>
8 ---
9 systemd/dlt-adaptor-udp.service.cmake | 1 -
10 systemd/dlt-dbus.service.cmake | 1 -
11 systemd/dlt-example-user.service.cmake | 1 -
12 systemd/dlt-receive.service.cmake | 1 -
13 systemd/dlt-system.service.cmake | 1 -
14 systemd/dlt.service.cmake | 1 -
[all …]
/openbmc/linux/net/ipv4/
H A Dip_fragment.c1 // SPDX-License-Identifier: GPL-2.0
5 * interface as the means of communication with the user level.
56 * as well. Or notify me, at least. --ANK
58 static const char ip_frag_cache_name[] = "ip4-frags";
86 struct net *net = q->fqdir->net; in ip4_frag_init()
89 q->key.v4 = *key; in ip4_frag_init()
90 qp->ecn = 0; in ip4_frag_init()
91 if (q->fqdir->max_dist) { in ip4_frag_init()
93 p = inet_getpeer_v4(net->ipv4.peers, key->saddr, key->vif); in ip4_frag_init()
94 if (p && !refcount_inc_not_zero(&p->refcnt)) in ip4_frag_init()
[all …]
/openbmc/linux/arch/um/drivers/
H A Dnet_kern.c1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright (C) 2001 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
28 #define DRIVER_NAME "uml-netdev"
56 err = -ENOMEM; in update_drop_skb()
80 skb = dev_alloc_skb(lp->max_packet); in uml_net_rx()
82 drop_skb->dev = dev; in uml_net_rx()
84 (*lp->read)(lp->fd, drop_skb, lp); in uml_net_rx()
85 dev->stats.rx_dropped++; in uml_net_rx()
89 skb->dev = dev; in uml_net_rx()
90 skb_put(skb, lp->max_packet); in uml_net_rx()
[all …]
/openbmc/linux/arch/riscv/lib/
H A Duaccess.S2 #include <asm-generic/export.h>
4 #include <asm/asm-extable.h>
16 /* Enable access to user memory */
28 * a0 - start of uncopied dst
29 * a1 - start of uncopied src
30 * a2 - size
31 * t0 - end of uncopied dst
44 * a0 - start of dst
45 * t1 - start of aligned dst
47 addi t1, a0, SZREG-1
[all …]
/openbmc/linux/drivers/iommu/iommufd/
H A Dpages.c1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (c) 2021-2022, NVIDIA CORPORATION & AFFILIATES.
21 * If access_itree includes the PFN's index then an in-kernel access has
31 * means removing an iommu_domain or releasing a in-kernel access will not fail
41 * [0,0] refers to a single PFN. 'end' means an open range, eg [0,0) refers to
108 for (i = 0; i != ARRAY_SIZE(iter->spans); i++) { in interval_tree_double_span_iter_update()
109 if (interval_tree_span_iter_done(&iter->spans[i])) { in interval_tree_double_span_iter_update()
110 iter->is_used = -1; in interval_tree_double_span_iter_update()
114 if (iter->spans[i].is_hole) { in interval_tree_double_span_iter_update()
115 last_hole = min(last_hole, iter->spans[i].last_hole); in interval_tree_double_span_iter_update()
[all …]
/openbmc/phosphor-host-ipmid/user_channel/
H A Duser_mgmt.cpp8 // http://www.apache.org/licenses/LICENSE-2.0
29 #include <phosphor-logging/elog-errors.hpp>
30 #include <phosphor-logging/lg2.hpp>
34 #include <xyz/openbmc_project/User/Common/error.hpp>
44 // TODO: Move D-Bus & Object Manager related stuff, to common files
45 // D-Bus property related
79 // User manager related
80 static constexpr const char* userMgrObjBasePath = "/xyz/openbmc_project/user";
81 static constexpr const char* userObjBasePath = "/xyz/openbmc_project/user";
[all...]
/openbmc/linux/arch/arm64/kernel/
H A Dsignal.c1 // SPDX-License-Identifier: GPL-2.0-only
5 * Copyright (C) 1995-2009 Russell King
24 #include <asm/debug-monitors.h>
38 * Do a signal return; undo the signal stack. These are aligned to 128-bit.
71 static void init_user_layout(struct rt_sigframe_user_layout *user) in init_user_layout() argument
74 sizeof(user->sigframe->uc.uc_mcontext.__reserved); in init_user_layout()
76 memset(user, 0, sizeof(*user)); in init_user_layout()
77 user->size = offsetof(struct rt_sigframe, uc.uc_mcontext.__reserved); in init_user_layout()
79 user->limit = user->size + reserved_size; in init_user_layout()
81 user->limit -= TERMINATOR_SIZE; in init_user_layout()
[all …]
/openbmc/linux/drivers/gpu/drm/vmwgfx/
H A Dvmwgfx_page_dirty.c1 // SPDX-License-Identifier: GPL-2.0 OR MIT
4 * Copyright 2019-2023 VMware, Inc., Palo Alto, CA., USA
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
32 * VMW_BO_DIRTY_PAGETABLE - Scan the pagetable for hardware dirty bits
33 * VMW_BO_DIRTY_MKWRITE - Write-protect page table entries and record write-
53 * struct vmw_bo_dirty - Dirty information for buffer objects
55 * @end: Last currently dirty bit + 1
66 unsigned long end; member
75 * vmw_bo_dirty_scan_pagetable - Perform a pagetable scan for dirty bits
80 * dirty-tracking method.
[all …]
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-bus-event_source-devices-hv_gpci3 Contact: Linux on PowerPC Developer List <linuxppc-dev@lists.ozlabs.org>
4 Description: Read-only. Attribute group to describe the magic bits
6 (See ABI/testing/sysfs-bus-event_source-devices-format).
12 counter_info_version = "config:16-23"
13 length = "config:24-31"
14 partition_id = "config:32-63"
15 request = "config:0-31"
16 sibling_part_id = "config:32-63"
17 hw_chip_id = "config:32-63"
18 offset = "config:32-63"
[all …]
/openbmc/qemu/docs/system/
H A Ddevice-emulation.rst1 .. _device-emulation:
4 ----------------
15 Device Front End
18 A device front end is how a device is presented to the guest. The type
21 ``--device`` command line option. Running QEMU with the command line
22 options ``--device help`` will list all devices it is aware of. Using
23 the command line ``--device foo,help`` will list the additional
26 A front end is often paired with a back end, which describes how the
33 machine model you choose (``-M foo``) a number of buses will have been
45 --device foo,bus=pci.0,addr=0,id=foo
[all …]
/openbmc/linux/net/ceph/
H A Dcls_lock_client.c1 // SPDX-License-Identifier: GPL-2.0
12 * ceph_cls_lock - grab rados lock for object
18 * @cookie: user-defined identifier for this instance of the lock
19 * @tag: user-defined tag
20 * @desc: user-defined lock description
36 void *p, *end; in ceph_cls_lock() local
50 return -E2BIG; in ceph_cls_lock()
54 return -ENOMEM; in ceph_cls_lock()
57 end = p + lock_op_buf_size; in ceph_cls_lock()
61 lock_op_buf_size - CEPH_ENCODING_START_BLK_LEN); in ceph_cls_lock()
[all …]
/openbmc/linux/drivers/scsi/
H A Dscsi_proc.c1 // SPDX-License-Identifier: GPL-2.0
10 * (c) 1995 Michael Neuffer neuffer@goofy.zdv.uni-mainz.de
14 * Andreas Heilwagen <crashcar@informatik.uni-koblenz.de>
51 * struct scsi_proc_entry - (host template, SCSI proc dir) association
68 ssize_t ret = -ENOMEM; in proc_scsi_host_write()
72 return -EOVERFLOW; in proc_scsi_host_write()
74 if (!shost->hostt->write_info) in proc_scsi_host_write()
75 return -EINVAL; in proc_scsi_host_write()
79 ret = -EFAULT; in proc_scsi_host_write()
82 ret = shost->hostt->write_info(shost, page, count); in proc_scsi_host_write()
[all …]
/openbmc/linux/arch/x86/mm/
H A Dtlb.c1 // SPDX-License-Identifier: GPL-2.0-only
17 #include <asm/nospec-branch.h>
37 * TLB flushing, formerly SMP-only
41 * writing to user space from interrupts. (Its not allowed anyway).
68 * Instead we have a small per-cpu array of ASIDs and cache the last few mm's
72 * We end up with different spaces for different things. To avoid confusion we
75 * ASID - [0, TLB_NR_DYN_ASIDS-1]
78 * kPCID - [1, TLB_NR_DYN_ASIDS]
82 * uPCID - [2048 + 1, 2048 + TLB_NR_DYN_ASIDS]
94 * user/kernel switches
[all …]
/openbmc/phosphor-net-ipmid/command/
H A Drakp34.cpp9 #include <phosphor-logging/lg2.hpp>
21 auto authAlgo = session->getAuthAlgo(); in applyIntegrityAlgo()
23 switch (authAlgo->intAlgo) in applyIntegrityAlgo()
27 session->setIntegrityAlgo( in applyIntegrityAlgo()
29 authAlgo->sessionIntegrityKey)); in applyIntegrityAlgo()
34 session->setIntegrityAlgo( in applyIntegrityAlgo()
36 authAlgo->sessionIntegrityKey)); in applyIntegrityAlgo()
48 auto authAlgo = session->getAuthAlgo(); in applyCryptAlgo()
50 switch (authAlgo->cryptAlgo) in applyCryptAlgo()
54 auto intAlgo = session->getIntegrityAlgo(); in applyCryptAlgo()
[all …]

12345678910>>...42