/openbmc/linux/tools/testing/selftests/ftrace/ |
H A D | README | 31 * Take care with side effects as the tests are run with root privilege.
|
/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_network_verification.robot | 243 [Documentation] Verify cipher suite privilege which belongs to LAN Configuration Parameters 247 # Get the Cipher Suite privilege and verify the response. 259 #44b = Maximum privilege for cipher suite.
|
/openbmc/openbmc-test-automation/docs/ |
H A D | redfish_request_via_mTLS.md | 67 privilege, and then verifies the login via Redfish. Therefore, it will logout
|
/openbmc/linux/Documentation/userspace-api/ |
H A D | spec_ctrl.rst | 7 privilege domains.
|
/openbmc/bmcweb/ |
H A D | README.md | 47 privilege level.
|
/openbmc/phosphor-user-manager/ |
H A D | user_mgr.cpp | 1255 std::string privilege; in getUserInfo() local 1266 privilege = std::get<std::string>(propValue); in getUserInfo() 1270 if (!groupName.empty() && !privilege.empty() && in getUserInfo() 1273 userPrivilege = privilege; in getUserInfo()
|
/openbmc/openbmc-test-automation/lib/ |
H A D | ipmi_utils.robot | 84 Run Keyword and Expect Error *Insufficient privilege level*
|
H A D | resource.robot | 33 # For users privilege admin or sudo.
|
/openbmc/linux/Documentation/admin-guide/sysctl/ |
H A D | fs.rst | 194 is to cross privilege boundaries when following a given hardlink (i.e. a 230 is to cross privilege boundaries when following a given symlink (i.e. a 252 privilege levels or is execute only will not be dumped.
|
/openbmc/linux/tools/perf/Documentation/ |
H A D | perf-top.txt | 250 The privilege levels may be omitted, in which case, the privilege levels of the associated 251 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
|
H A D | perf-record.txt | 172 filter. BPF filters need root privilege. 444 - priv: save privilege state during sampling in case binary is not available later 448 The privilege levels may be omitted, in which case, the privilege levels of the associated 449 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
|
/openbmc/docs/designs/ |
H A D | ci-authorization.md | 95 was considered but is a major violation of the least-privilege-required
|
/openbmc/ipmitool/src/plugins/imb/ |
H A D | imbapi.c | 1397 BYTE * privilege in GetAsyncImbpMessage_Ex() argument 1489 if((sessionHandle ==NULL) || (privilege ==NULL)) in GetAsyncImbpMessage_Ex() 1496 *privilege = (resp->data[0] & 0xf0)>> 4; in GetAsyncImbpMessage_Ex()
|
H A D | imbapi.h | 596 BYTE * privilege
|
/openbmc/phosphor-user-manager/test/ |
H A D | user_mgr_test.cpp | 119 std::string privilege = "priv-admin"; in TEST_F() local 122 createLocalUser(userName, groups, privilege, true); in TEST_F() 126 EXPECT_EQ(privilege, std::get<std::string>(userInfo["UserPrivilege"])); in TEST_F()
|
/openbmc/qemu/target/hppa/ |
H A D | translate.c | 85 int privilege; member 781 if (ctx->privilege != 0) { \ 2035 switch (ctx->privilege) { in do_ibranch_priv() 2046 tcg_gen_ori_i64(dest, dest, ctx->privilege); in do_ibranch_priv() 3989 if (ctx->privilege == 0) { in trans_b_gate() 3993 disp -= ctx->privilege; in trans_b_gate() 4009 if (ctx->privilege < 3) { in trans_b_gate() 4012 tcg_gen_ori_i64(tmp, tmp, ctx->privilege); in trans_b_gate() 4629 ctx->privilege = PRIV_USER; in hppa_tr_init_disas_context() 4633 ctx->privilege = (ctx->tb_flags >> TB_FLAG_PRIV_SHIFT) & 3; in hppa_tr_init_disas_context() [all …]
|
/openbmc/qemu/docs/system/devices/ |
H A D | net.rst | 46 (you don't need root privilege to use the virtual network). The virtual
|
/openbmc/linux/Documentation/admin-guide/hw-vuln/ |
H A D | gather_data_sampling.rst | 39 lower-privilege contexts like guests and when running outside SGX enclaves.
|
/openbmc/linux/Documentation/security/ |
H A D | credentials.rst | 238 * UNIX exec privilege escalation bits (SUID/SGID); 239 * File capabilities exec privilege escalation bits. 243 privilege escalation bits come into play, and may allow the resulting process 550 To avoid "confused deputy" privilege escalation attacks, access control checks
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_user_account.robot | 336 [Documentation] Verify admin user privilege. 359 [Documentation] Verify operator user role change using admin privilege user 382 [Documentation] Verify operator user privilege. 408 [Documentation] Verify ReadOnly user privilege.
|
/openbmc/ipmitool/control/ |
H A D | ipmitool.spec.in | 200 - Add support for name+privilege lookup for lanplus sessions 265 - Raise privilege level after creating IPMIv2 session 347 - Set channel privilege limit to ADMIN during "access on"
|
/openbmc/linux/Documentation/powerpc/ |
H A D | ultravisor.rst | 68 * The privilege of a process is now determined by three MSR bits, 70 from least privilege to highest privilege. The higher privilege 71 modes can access all the resources of the lower privilege modes.
|
/openbmc/linux/Documentation/admin-guide/LSM/ |
H A D | Smack.rst | 427 policy is said to have privilege. As of this writing a task can 428 have privilege either by possessing capabilities or by having an 614 only be changed by a process with privilege. 779 privilege. 793 program has appropriate privilege:: 798 packets will be checked if the program has appropriate privilege.
|
/openbmc/linux/Documentation/driver-api/nvdimm/ |
H A D | security.rst | 86 frozen by a user with root privilege.
|
/openbmc/linux/Documentation/devicetree/bindings/arm/ |
H A D | psci.yaml | 21 Functions are invoked by trapping to the privilege level of the PSCI
|