/openbmc/qemu/docs/interop/ |
H A D | vhost-user.rst | 4 Vhost-user Protocol 11 version 2 or later. See the COPYING file in the top-level 21 the control plane needed to establish virtqueue sharing with a user 26 The protocol defines 2 sides of the communication, *front-end* and 27 *back-end*. The *front-end* is the application that shares its virtqueues, in 28 our case QEMU. The *back-end* is the consumer of the virtqueues. 30 In the current implementation QEMU is the *front-end*, and the *back-end* 32 software Ethernet switch running in user space, such as Snabbswitch, 33 or a block device back-end processing read & write to a virtual 34 disk. In order to facilitate interoperability between various back-end [all …]
|
/openbmc/linux/arch/arm64/include/asm/ |
H A D | cacheflush.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 5 * Copyright (C) 1999-2002 Russell King. 16 * and does not require cleaning before returning it to the user. 26 * Start addresses are inclusive and end addresses are exclusive; start 27 * addresses should be rounded down, end addresses up. 29 * See Documentation/core-api/cachetlb.rst for more information. Please note that 30 * the implementation assumes non-aliasing VIPT D-cache and (aliasing) 31 * VIPT I-cache. 33 * All functions below apply to the interval [start, end) 34 * - start - virtual start address (inclusive) [all …]
|
H A D | tlbflush.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 5 * Copyright (C) 1999-2003 Russell King 69 * - 4KB : 1 70 * - 16KB : 2 71 * - 64KB : 3 92 * Level-based TLBI operations. 94 * When ARMv8.4-TTL exists, TLBI operations take an additional hint for 98 * perform a non-hinted invalidation. 100 * For Stage-2 invalidation, use the level values provided to that effect 128 * +----------+------+-------+-------+-------+----------------------+ [all …]
|
/openbmc/phosphor-user-manager/ |
H A D | user_mgr.cpp | 8 // http://www.apache.org/licenses/LICENSE-2.0 34 #include <phosphor-logging/elog-errors.hpp> 35 #include <phosphor-logging/elog.hpp> 36 #include <phosphor-logging/lg2.hpp> 38 #include <xyz/openbmc_project/User/Common/error.hpp> 53 namespace user namespace 61 static constexpr int failure = -1; 77 "/xyz/openbmc_project/user/ldap"; 95 sdbusplus::xyz::openbmc_project::User 494 const auto& user = usersList[userName]; renameUser() local 1202 const auto& user = usersList[userName]; getUserInfo() local 1446 for (auto& user : userNameList) initUserObjects() local [all...] |
/openbmc/linux/Documentation/core-api/ |
H A D | cachetlb.rst | 19 if it can be proven that a user address space has never executed 25 virtual-->physical address translations obtained from the software 43 This interface flushes an entire user address space from 54 unsigned long start, unsigned long end)`` 56 Here we are flushing a specific range of (user) virtual 59 modifications for the address space 'vma->vm_mm' in the range 60 'start' to 'end-1' will be visible to the cpu. That is, after 62 virtual addresses in the range 'start' to 'end-1'. 78 address space is available via vma->vm_mm. Also, one may 79 test (vma->vm_flags & VM_EXEC) to see if this region is [all …]
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_user_management_sub_menu.robot | 3 Documentation Test OpenBMC GUI "User management" sub-menu of "Security and access". 16 ${xpath_user_management_heading} //h1[text()="User management"] 17 ${xpath_select_user} //input[contains(@class,"custom-control-input")] 19 ${xpath_add_user} //button[contains(text(),'Add user')] 20 ${xpath_edit_user} //*[@data-test-id='userManagement-tableRowAction-edit-0'] 21 ${xpath_delete_user} //*[@data-test-id='userManagement-tableRowAction-delete-1'] 22 ${xpath_account_status_enabled_button} //*[@data-test-id='userManagement-radioButton-statusEnable… 23 ${xpath_account_status_disabled_button} //*[@data-test-id='userManagement-radioButton-statusDisabl… 24 ${xpath_username_input_button} //*[@data-test-id='userManagement-input-username'] 25 ${xpath_privilege_list_button} //*[@data-test-id='userManagement-select-privilege'] [all …]
|
/openbmc/u-boot/cmd/ |
H A D | ini.c | 1 // SPDX-License-Identifier: BSD-3-Clause 3 * inih -- simple .INI file parser 38 /* Strip whitespace chars off end of given string, in place. Return s. */ 43 while (p > s && isspace(*--p)) in rstrip() 48 /* Return pointer to first non-whitespace char in given string. */ 57 null at end of string if neither found. ';' must be prefixed by a whitespace 70 /* Version of strncpy that ensures dest (size bytes) is null-terminated. */ 74 dest[size - 1] = '\0'; in strncpy0() 81 char *end; in memgets() local 85 end = memchr(*mem, '\n', *memsize); in memgets() [all …]
|
/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_payload.robot | 93 Verify Set User Access Payload For Standard Payload SOL 96 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex} 97 ... AND Delete Created User ${userid} 100 ${userid} ${username}= Create And Verify IPMI User 104 # Get default user access payload values. 105 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format} 107 # Disable Standard payload 1 via set user access payload command. 108 Set User Access Payload For Given User ${user_id_in_hex} Disable 113 Verify Set User Access Payload For Operator Privileged User 114 [Documentation] Try to set user access payload using operator privileged user and expect error. [all …]
|
/openbmc/linux/arch/arm/include/asm/ |
H A D | cacheflush.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 5 * Copyright (C) 1999-2002 Russell King 12 #include <asm/glue-cache.h> 17 #define CACHE_COLOUR(vaddr) ((vaddr & (SHMLBA - 1)) >> PAGE_SHIFT) 21 * and does not require cleaning before returning it to the user. 29 * The arch/arm/mm/cache-*.S and arch/arm/mm/proc-*.S files 32 * Start addresses are inclusive and end addresses are exclusive; 33 * start addresses should be rounded down, end addresses up. 35 * See Documentation/core-api/cachetlb.rst for more information. 37 * effects are cache-type (VIVT/VIPT/PIPT) specific. [all …]
|
/openbmc/openbmc-test-automation/openpower/ext_interfaces/ |
H A D | test_vmicert_management.robot | 21 # users User Name password 34 [Documentation] Get CSR request signed by VMI using different user roles and verify. 41 # Send CSR request from operator user. 44 # Send CSR request from ReadOnly user. 47 # Send CSR request from NoAccess user. 57 # Request root certificate from admin user. 60 # Request root certificate from operator user. 63 # Request root certificate from ReadOnly user. 66 # Request root certificate from NoAccess user. 81 # Send CSR request from operator user. [all …]
|
/openbmc/linux/arch/arm64/mm/ |
H A D | flush.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Copyright (C) 1995-2002 Russell King 18 void sync_icache_aliases(unsigned long start, unsigned long end) in sync_icache_aliases() argument 21 dcache_clean_pou(start, end); in sync_icache_aliases() 25 * Don't issue kick_all_cpus_sync() after I-cache invalidation in sync_icache_aliases() 26 * for user mappings. in sync_icache_aliases() 28 caches_clean_inval_pou(start, end); in sync_icache_aliases() 33 unsigned long end) in flush_ptrace_access() argument 35 if (vma->vm_flags & VM_EXEC) in flush_ptrace_access() 36 sync_icache_aliases(start, end); in flush_ptrace_access() [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/dlt-daemon/dlt-daemon/ |
H A D | 0002-Don-t-execute-processes-as-a-specific-user.patch | 4 Subject: [PATCH 2/4] Don't execute processes as a specific user. 6 Upstream-Status: Inappropriate [Configuration Specific] 7 Signed-off-by: Andrei Gherzan <andrei.gherzan@windriver.com> 8 --- 9 systemd/dlt-adaptor-udp.service.cmake | 1 - 10 systemd/dlt-dbus.service.cmake | 1 - 11 systemd/dlt-example-user.service.cmake | 1 - 12 systemd/dlt-receive.service.cmake | 1 - 13 systemd/dlt-system.service.cmake | 1 - 14 systemd/dlt.service.cmake | 1 - [all …]
|
/openbmc/linux/net/ipv4/ |
H A D | ip_fragment.c | 1 // SPDX-License-Identifier: GPL-2.0 5 * interface as the means of communication with the user level. 56 * as well. Or notify me, at least. --ANK 58 static const char ip_frag_cache_name[] = "ip4-frags"; 86 struct net *net = q->fqdir->net; in ip4_frag_init() 89 q->key.v4 = *key; in ip4_frag_init() 90 qp->ecn = 0; in ip4_frag_init() 91 if (q->fqdir->max_dist) { in ip4_frag_init() 93 p = inet_getpeer_v4(net->ipv4.peers, key->saddr, key->vif); in ip4_frag_init() 94 if (p && !refcount_inc_not_zero(&p->refcnt)) in ip4_frag_init() [all …]
|
/openbmc/linux/arch/um/drivers/ |
H A D | net_kern.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Copyright (C) 2001 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com) 28 #define DRIVER_NAME "uml-netdev" 56 err = -ENOMEM; in update_drop_skb() 80 skb = dev_alloc_skb(lp->max_packet); in uml_net_rx() 82 drop_skb->dev = dev; in uml_net_rx() 84 (*lp->read)(lp->fd, drop_skb, lp); in uml_net_rx() 85 dev->stats.rx_dropped++; in uml_net_rx() 89 skb->dev = dev; in uml_net_rx() 90 skb_put(skb, lp->max_packet); in uml_net_rx() [all …]
|
/openbmc/linux/arch/riscv/lib/ |
H A D | uaccess.S | 2 #include <asm-generic/export.h> 4 #include <asm/asm-extable.h> 16 /* Enable access to user memory */ 28 * a0 - start of uncopied dst 29 * a1 - start of uncopied src 30 * a2 - size 31 * t0 - end of uncopied dst 44 * a0 - start of dst 45 * t1 - start of aligned dst 47 addi t1, a0, SZREG-1 [all …]
|
/openbmc/linux/drivers/iommu/iommufd/ |
H A D | pages.c | 1 // SPDX-License-Identifier: GPL-2.0 2 /* Copyright (c) 2021-2022, NVIDIA CORPORATION & AFFILIATES. 21 * If access_itree includes the PFN's index then an in-kernel access has 31 * means removing an iommu_domain or releasing a in-kernel access will not fail 41 * [0,0] refers to a single PFN. 'end' means an open range, eg [0,0) refers to 108 for (i = 0; i != ARRAY_SIZE(iter->spans); i++) { in interval_tree_double_span_iter_update() 109 if (interval_tree_span_iter_done(&iter->spans[i])) { in interval_tree_double_span_iter_update() 110 iter->is_used = -1; in interval_tree_double_span_iter_update() 114 if (iter->spans[i].is_hole) { in interval_tree_double_span_iter_update() 115 last_hole = min(last_hole, iter->spans[i].last_hole); in interval_tree_double_span_iter_update() [all …]
|
/openbmc/phosphor-host-ipmid/user_channel/ |
H A D | user_mgmt.cpp | 8 // http://www.apache.org/licenses/LICENSE-2.0 29 #include <phosphor-logging/elog-errors.hpp> 30 #include <phosphor-logging/lg2.hpp> 34 #include <xyz/openbmc_project/User/Common/error.hpp> 44 // TODO: Move D-Bus & Object Manager related stuff, to common files 45 // D-Bus property related 79 // User manager related 80 static constexpr const char* userMgrObjBasePath = "/xyz/openbmc_project/user"; 81 static constexpr const char* userObjBasePath = "/xyz/openbmc_project/user"; [all...] |
/openbmc/linux/arch/arm64/kernel/ |
H A D | signal.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Copyright (C) 1995-2009 Russell King 24 #include <asm/debug-monitors.h> 38 * Do a signal return; undo the signal stack. These are aligned to 128-bit. 71 static void init_user_layout(struct rt_sigframe_user_layout *user) in init_user_layout() argument 74 sizeof(user->sigframe->uc.uc_mcontext.__reserved); in init_user_layout() 76 memset(user, 0, sizeof(*user)); in init_user_layout() 77 user->size = offsetof(struct rt_sigframe, uc.uc_mcontext.__reserved); in init_user_layout() 79 user->limit = user->size + reserved_size; in init_user_layout() 81 user->limit -= TERMINATOR_SIZE; in init_user_layout() [all …]
|
/openbmc/linux/drivers/gpu/drm/vmwgfx/ |
H A D | vmwgfx_page_dirty.c | 1 // SPDX-License-Identifier: GPL-2.0 OR MIT 4 * Copyright 2019-2023 VMware, Inc., Palo Alto, CA., USA 20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL 32 * VMW_BO_DIRTY_PAGETABLE - Scan the pagetable for hardware dirty bits 33 * VMW_BO_DIRTY_MKWRITE - Write-protect page table entries and record write- 53 * struct vmw_bo_dirty - Dirty information for buffer objects 55 * @end: Last currently dirty bit + 1 66 unsigned long end; member 75 * vmw_bo_dirty_scan_pagetable - Perform a pagetable scan for dirty bits 80 * dirty-tracking method. [all …]
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-bus-event_source-devices-hv_gpci | 3 Contact: Linux on PowerPC Developer List <linuxppc-dev@lists.ozlabs.org> 4 Description: Read-only. Attribute group to describe the magic bits 6 (See ABI/testing/sysfs-bus-event_source-devices-format). 12 counter_info_version = "config:16-23" 13 length = "config:24-31" 14 partition_id = "config:32-63" 15 request = "config:0-31" 16 sibling_part_id = "config:32-63" 17 hw_chip_id = "config:32-63" 18 offset = "config:32-63" [all …]
|
/openbmc/qemu/docs/system/ |
H A D | device-emulation.rst | 1 .. _device-emulation: 4 ---------------- 15 Device Front End 18 A device front end is how a device is presented to the guest. The type 21 ``--device`` command line option. Running QEMU with the command line 22 options ``--device help`` will list all devices it is aware of. Using 23 the command line ``--device foo,help`` will list the additional 26 A front end is often paired with a back end, which describes how the 33 machine model you choose (``-M foo``) a number of buses will have been 45 --device foo,bus=pci.0,addr=0,id=foo [all …]
|
/openbmc/linux/net/ceph/ |
H A D | cls_lock_client.c | 1 // SPDX-License-Identifier: GPL-2.0 12 * ceph_cls_lock - grab rados lock for object 18 * @cookie: user-defined identifier for this instance of the lock 19 * @tag: user-defined tag 20 * @desc: user-defined lock description 36 void *p, *end; in ceph_cls_lock() local 50 return -E2BIG; in ceph_cls_lock() 54 return -ENOMEM; in ceph_cls_lock() 57 end = p + lock_op_buf_size; in ceph_cls_lock() 61 lock_op_buf_size - CEPH_ENCODING_START_BLK_LEN); in ceph_cls_lock() [all …]
|
/openbmc/linux/drivers/scsi/ |
H A D | scsi_proc.c | 1 // SPDX-License-Identifier: GPL-2.0 10 * (c) 1995 Michael Neuffer neuffer@goofy.zdv.uni-mainz.de 14 * Andreas Heilwagen <crashcar@informatik.uni-koblenz.de> 51 * struct scsi_proc_entry - (host template, SCSI proc dir) association 68 ssize_t ret = -ENOMEM; in proc_scsi_host_write() 72 return -EOVERFLOW; in proc_scsi_host_write() 74 if (!shost->hostt->write_info) in proc_scsi_host_write() 75 return -EINVAL; in proc_scsi_host_write() 79 ret = -EFAULT; in proc_scsi_host_write() 82 ret = shost->hostt->write_info(shost, page, count); in proc_scsi_host_write() [all …]
|
/openbmc/linux/arch/x86/mm/ |
H A D | tlb.c | 1 // SPDX-License-Identifier: GPL-2.0-only 17 #include <asm/nospec-branch.h> 37 * TLB flushing, formerly SMP-only 41 * writing to user space from interrupts. (Its not allowed anyway). 68 * Instead we have a small per-cpu array of ASIDs and cache the last few mm's 72 * We end up with different spaces for different things. To avoid confusion we 75 * ASID - [0, TLB_NR_DYN_ASIDS-1] 78 * kPCID - [1, TLB_NR_DYN_ASIDS] 82 * uPCID - [2048 + 1, 2048 + TLB_NR_DYN_ASIDS] 94 * user/kernel switches [all …]
|
/openbmc/phosphor-net-ipmid/command/ |
H A D | rakp34.cpp | 9 #include <phosphor-logging/lg2.hpp> 21 auto authAlgo = session->getAuthAlgo(); in applyIntegrityAlgo() 23 switch (authAlgo->intAlgo) in applyIntegrityAlgo() 27 session->setIntegrityAlgo( in applyIntegrityAlgo() 29 authAlgo->sessionIntegrityKey)); in applyIntegrityAlgo() 34 session->setIntegrityAlgo( in applyIntegrityAlgo() 36 authAlgo->sessionIntegrityKey)); in applyIntegrityAlgo() 48 auto authAlgo = session->getAuthAlgo(); in applyCryptAlgo() 50 switch (authAlgo->cryptAlgo) in applyCryptAlgo() 54 auto intAlgo = session->getIntegrityAlgo(); in applyCryptAlgo() [all …]
|