/openbmc/linux/tools/testing/selftests/openat2/ |
H A D | openat2_test.c | 159 struct open_how how; member 170 .how.flags = O_TMPFILE | O_PATH | O_RDWR, .err = -EINVAL }, in test_openat2_flags() 172 .how.flags = O_TMPFILE | O_CREAT | O_RDWR, .err = -EINVAL }, in test_openat2_flags() 176 .how.flags = O_PATH | O_CLOEXEC }, in test_openat2_flags() 178 .how.flags = O_PATH | O_DIRECTORY }, in test_openat2_flags() 180 .how.flags = O_PATH | O_NOFOLLOW }, in test_openat2_flags() 183 .how.flags = O_PATH | O_RDWR, .err = -EINVAL }, in test_openat2_flags() 185 .how.flags = O_PATH | O_CREAT, .err = -EINVAL }, in test_openat2_flags() 187 .how.flags = O_PATH | O_EXCL, .err = -EINVAL }, in test_openat2_flags() 189 .how.flags = O_PATH | O_NOCTTY, .err = -EINVAL }, in test_openat2_flags() [all …]
|
H A D | resolve_test.c | 113 struct open_how how; member 139 .path = "/", .how.resolve = RESOLVE_BENEATH, in test_openat2_opath_tests() 142 .path = "cheeky/absself", .how.resolve = RESOLVE_BENEATH, in test_openat2_opath_tests() 145 .path = "abscheeky/absself", .how.resolve = RESOLVE_BENEATH, in test_openat2_opath_tests() 148 .path = "..", .how.resolve = RESOLVE_BENEATH, in test_openat2_opath_tests() 151 .path = "../root/", .how.resolve = RESOLVE_BENEATH, in test_openat2_opath_tests() 154 .path = "cheeky/self", .how.resolve = RESOLVE_BENEATH, in test_openat2_opath_tests() 157 .path = "abscheeky/self", .how.resolve = RESOLVE_BENEATH, in test_openat2_opath_tests() 160 .path = "cheeky/garbageself", .how.resolve = RESOLVE_BENEATH, in test_openat2_opath_tests() 163 .path = "abscheeky/garbageself", .how.resolve = RESOLVE_BENEATH, in test_openat2_opath_tests() [all …]
|
H A D | helpers.c | 17 bool needs_openat2(const struct open_how *how) in needs_openat2() argument 19 return how->resolve != 0; in needs_openat2() 22 int raw_openat2(int dfd, const char *path, void *how, size_t size) in raw_openat2() argument 24 int ret = syscall(__NR_openat2, dfd, path, how, size); in raw_openat2() 28 int sys_openat2(int dfd, const char *path, struct open_how *how) in sys_openat2() argument 30 return raw_openat2(dfd, path, how, sizeof(*how)); in sys_openat2() 33 int sys_openat(int dfd, const char *path, struct open_how *how) in sys_openat() argument 35 int ret = openat(dfd, path, how->flags, how->mode); in sys_openat() 98 struct open_how how = {}; in init() local 104 fd = sys_openat2(AT_FDCWD, ".", &how); in init()
|
H A D | helpers.h | 28 * Arguments for how openat2(2) should open the target path. If @resolve is 48 bool needs_openat2(const struct open_how *how); 51 /* how->resolve flags for openat2(2). */ 96 int raw_openat2(int dfd, const char *path, void *how, size_t size); 97 int sys_openat2(int dfd, const char *path, struct open_how *how); 98 int sys_openat(int dfd, const char *path, struct open_how *how);
|
/openbmc/linux/fs/autofs/ |
H A D | expire.c | 12 unsigned long timeout, unsigned int how) in autofs_can_expire() argument 20 if (!(how & AUTOFS_EXP_IMMEDIATE)) { in autofs_can_expire() 30 struct dentry *dentry, unsigned int how) in autofs_mount_busy() argument 52 if (how & AUTOFS_EXP_FORCED) { in autofs_mount_busy() 153 unsigned int how) in autofs_direct_busy() argument 158 if (how & AUTOFS_EXP_FORCED) in autofs_direct_busy() 172 if (!autofs_can_expire(top, timeout, how)) in autofs_direct_busy() 185 unsigned int how) in autofs_tree_busy() argument 207 if (autofs_mount_busy(mnt, p, how)) { in autofs_tree_busy() 231 if (how & AUTOFS_EXP_FORCED) in autofs_tree_busy() [all …]
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-kernel-mm-ksm | 19 full_scans: how many times all mergeable areas have been 22 pages_shared: how many shared pages are being used. 24 pages_sharing: how many more sites are sharing them i.e. how 27 pages_to_scan: how many present pages to scan before ksmd goes 30 pages_unshared: how many pages unique but repeatedly checked 33 pages_volatile: how many pages changing too fast to be placed 41 sleep_millisecs: how many milliseconds ksm should sleep between 59 Description: Measure how effective KSM is. 60 general_profit: how effective is KSM. The formula for the
|
H A D | sysfs-kernel-slab | 19 The aliases file is read-only and specifies how many caches 48 The alloc_fastpath file shows how many objects have been 59 The alloc_from_partial file shows how many times a cpu slab has 71 The alloc_refill file shows how many times the per-cpu freelist 82 The alloc_slab file is shows how many times a new slab had to 93 The alloc_slowpath file shows how many objects have been 115 The cpu_slabs file is read-only and displays how many cpu slabs 124 The file cpuslab_flush shows how many times a cache's cpu slabs 147 The deactivate_empty file shows how many times an empty cpu slab 157 The deactivate_full file shows how many times a full cpu slab [all …]
|
/openbmc/openbmc/poky/meta/lib/oeqa/core/tests/cases/ |
H A D | depends.py | 13 self.assertTrue(True, msg='How is this possible?') 17 self.assertTrue(True, msg='How is this possible?') 21 self.assertTrue(True, msg='How is this possible?') 25 self.assertTrue(True, msg='How is this possible?') 29 self.assertTrue(True, msg='How is this possible?') 33 self.assertTrue(True, msg='How is this possible?') 37 self.assertTrue(True, msg='How is this possible?') 41 self.assertTrue(True, msg='How is this possible?')
|
H A D | oetag.py | 13 self.assertTrue(True, msg='How is this possible?') 17 self.assertTrue(True, msg='How is this possible?') 21 self.assertTrue(True, msg='How is this possible?') 24 self.assertTrue(True, msg='How is this possible?') 30 self.assertTrue(True, msg='How is this possible?') 34 self.assertTrue(True, msg='How is this possible?') 37 self.assertTrue(True, msg='How is this possible?')
|
/openbmc/linux/io_uring/ |
H A D | openclose.c | 24 struct open_how how; member 42 return open->how.flags & (O_TRUNC | O_CREAT | __O_TMPFILE); in io_openat_force_async() 56 /* open.how should be already initialised */ in __io_openat_prep() 57 if (!(open->how.flags & O_PATH) && force_o_largefile()) in __io_openat_prep() 58 open->how.flags |= O_LARGEFILE; in __io_openat_prep() 70 if (open->file_slot && (open->how.flags & O_CLOEXEC)) in __io_openat_prep() 86 open->how = build_open_how(flags, mode); in io_openat_prep() 93 struct open_how __user *how; in io_openat2_prep() local 97 how = u64_to_user_ptr(READ_ONCE(sqe->addr2)); in io_openat2_prep() 102 ret = copy_struct_from_user(&open->how, sizeof(open->how), how, len); in io_openat2_prep() [all …]
|
/openbmc/linux/Documentation/admin-guide/mm/ |
H A D | ksm.rst | 80 how many pages to scan before ksmd goes to sleep 86 how many milliseconds ksmd should sleep before next scan 99 sharing of setting 1 (default). You may wish to compare how 151 specifies how frequently KSM checks the metadata of the pages 161 how effective is KSM. The calculation is explained below. 163 how many pages are being scanned for ksm 165 how many shared pages are being used 167 how many more sites are sharing them i.e. how much saved 169 how many pages unique but repeatedly checked for merging 171 how many pages changing too fast to be placed in a tree [all …]
|
/openbmc/openbmc/poky/documentation/ |
H A D | what-i-wish-id-known.rst | 19 understanding of how the build process works, you'll find yourself trying to 26 because of how git works. If you download the tarball instead, you will need 83 #. **Understand the basic concepts of how the build system works: the workflow:** 85 pinpoint where trouble is occurring and how the build is breaking. The 101 .. image:: figures/yp-how-it-works-new-diagram.png 104 #. **Know that you can generate a dependency graph and learn how to do it:** 110 dependency graphs and how to generate them in the 114 #. **Here's how you decode "magic" folder names in tmp/work:** 130 :doc:`brief-yoctoprojectqs/index` show how to create an image 137 Shell` for information on how to build and run a specific task using [all …]
|
/openbmc/docs/development/ |
H A D | README.md | 9 Start here. This shows how to setup an OpenBMC development environment using 10 its bitbake build process and how to start the software emulator, QEMU. 14 This shows how to use the yocto tool, devtool, to extract an OpenBMC source 19 This shows how to modify the phosphor-webui web application and test your 24 This shows how to setup your environment to utilize Gerrit for submitting
|
/openbmc/openbmc/poky/documentation/kernel-dev/ |
H A D | faq.rst | 12 How do I use my own Linux kernel ``.config`` file? 19 How do I create configuration fragments? 26 How do I use my own Linux kernel sources? 33 How do I install/not-install the kernel image on the root filesystem? 43 Yocto Project Development Tasks Manual for information on how to use an 46 How do I install a specific kernel module? 67 How do I change the Linux kernel command line?
|
/openbmc/linux/drivers/net/ethernet/intel/ |
H A D | Kconfig | 47 adapters. For more information on how to identify your adapter, go 66 use the regular e1000 driver For more information on how to 95 adapters. For more information on how to identify your adapter, go 131 information on how to identify your adapter, go to the Adapter & 150 adapters. For more information on how to identify your adapter, go 202 Intel(R) ixgbe driver. For more information on how to identify your 230 devices. For more information on how to identify your adapter, go 263 information on how to identify your adapter, go to the Adapter 289 devices. For more information on how to identify your adapter, go 331 Interface. For more information on how to identify your adapter, [all …]
|
/openbmc/linux/security/smack/ |
H A D | Kconfig | 14 If you are unsure how to answer this question, answer N. 32 If you are unsure how to answer this question, answer N. 43 If you are unsure how to answer this question, answer N. 55 If you are unsure how to answer this question, answer N.
|
/openbmc/docs/security/ |
H A D | obmc-security-response-team.md | 21 explains the problem, its severity, and how to protect your systems that 31 [How to privately report a security vulnerability](./how-to-report-a-security-vulnerability.md) 32 web page explains how OpenBMC community members can report a security
|
/openbmc/u-boot/doc/ |
H A D | README.sata | 8 1.0 How to read the SATA hard disk's information? 17 1.1 How to raw write the kernel, file system, dtb to a SATA hard disk? 34 1.2 How to raw read the kernel, file system, dtb from a SATA hard disk? 48 1.3 How to load an image from an ext2 file system in U-Boot?
|
/openbmc/qemu/qapi/ |
H A D | compat.json | 52 # @deprecated-input: how to handle deprecated input (default 'accept') 54 # @deprecated-output: how to handle deprecated output (default 57 # @unstable-input: how to handle unstable input (default 'accept') 60 # @unstable-output: how to handle unstable output (default 'accept')
|
/openbmc/linux/security/ |
H A D | Kconfig | 20 If you are unsure how to answer this question, answer N. 65 If you are unsure how to answer this question, answer N. 73 If you are unsure how to answer this question, answer N. 82 If you are unsure how to answer this question, answer N. 91 If you are unsure how to answer this question, answer N. 104 If you are unsure how to answer this question, answer N. 113 If you are unsure how to answer this question, answer N. 140 See Documentation/arch/x86/intel_txt.rst for a description of how to enable
|
/openbmc/linux/Documentation/process/ |
H A D | howto.rst | 7 instructions on how to become a Linux kernel developer and how to learn 20 So, you want to learn how to become a Linux kernel developer? Or you 24 and hints on how to work with the community. It will also try to 49 Please remember that you are trying to learn how to work with the 64 rules and how to use `SPDX <https://spdx.org/>`_ identifiers in source code are 79 invaluable for learning how to interact with the kernel community. When 81 documentation files are also added which explain how to use the feature. 109 This file describes in explicit detail how to successfully create 120 Other excellent descriptions of how to create patches properly are: 147 This document describes how Linux kernel maintainers operate and the [all …]
|
/openbmc/linux/fs/ |
H A D | open.c | 1205 struct open_how how = { in build_open_how() local 1211 if (how.flags & O_PATH) in build_open_how() 1212 how.flags &= O_PATH_FLAGS; in build_open_how() 1214 if (!WILL_CREATE(how.flags)) in build_open_how() 1215 how.mode = 0; in build_open_how() 1216 return how; in build_open_how() 1219 inline int build_open_flags(const struct open_how *how, struct open_flags *op) in build_open_flags() argument 1221 u64 flags = how->flags; in build_open_flags() 1243 if (how->resolve & ~VALID_RESOLVE_FLAGS) in build_open_flags() 1247 if ((how->resolve & RESOLVE_BENEATH) && (how->resolve & RESOLVE_IN_ROOT)) in build_open_flags() [all …]
|
/openbmc/linux/Documentation/driver-api/virtio/ |
H A D | virtio.rst | 47 reference definitions of virtqueues and "Virtqueues and virtio ring: How 48 the data travels" blog post (`[2]`_) for an illustrated overview of how 77 How a virtio device is found and configured by the kernel depends on how 140 _`[2]` Virtqueues and virtio ring: How the data travels 141 https://www.redhat.com/en/blog/virtqueues-and-virtio-ring-how-data-travels
|
/openbmc/docs/ |
H A D | SECURITY.md | 3 ## How to report a security vulnerability 5 This describes how you can report an OpenBMC security vulnerability privately to 21 - how to reproduce the problem 36 - Coordinate announcement details with you, such as timing or how you want to be
|
/openbmc/bmcweb/ |
H A D | OWNERS | 5 # - Have a solid understanding of the bmcweb core code, and how it's used. 19 # how it interacts with OpenBMC, and how the bmcweb implementation compares to 20 # other Redfish instances and how changes effect compatibility with other 56 # how they differ from "normal" client-based use cases, as well as an
|