/openbmc/openbmc/poky/bitbake/doc/ |
H A D | releases.rst | 69 - :yocto_docs:`3.1 BitBake User Manual </3.1/bitbake-user-manual/bitbake-user-manual.html>` 70 - :yocto_docs:`3.1.1 BitBake User Manual </3.1.1/bitbake-user-manual/bitbake-user-manual.html>` 71 - :yocto_docs:`3.1.2 BitBake User Manual </3.1.2/bitbake-user-manual/bitbake-user-manual.html>` 72 - :yocto_docs:`3.1.3 BitBake User Manual </3.1.3/bitbake-user-manual/bitbake-user-manual.html>` 78 - :yocto_docs:`3.0 BitBake User Manual </3.0/bitbake-user-manual/bitbake-user-manual.html>` 79 - :yocto_docs:`3.0.1 BitBake User Manual </3.0.1/bitbake-user-manual/bitbake-user-manual.html>` 80 - :yocto_docs:`3.0.2 BitBake User Manual </3.0.2/bitbake-user-manual/bitbake-user-manual.html>` 81 - :yocto_docs:`3.0.3 BitBake User Manual </3.0.3/bitbake-user-manual/bitbake-user-manual.html>` 82 - :yocto_docs:`3.0.4 BitBake User Manual </3.0.4/bitbake-user-manual/bitbake-user-manual.html>` 88 - :yocto_docs:`2.7 BitBake User Manual </2.7/bitbake-user-manual/bitbake-user-manual.html>` [all …]
|
H A D | index.rst | 13 bitbake-user-manual/bitbake-user-manual-intro 14 bitbake-user-manual/bitbake-user-manual-execution 15 bitbake-user-manual/bitbake-user-manual-metadata 16 bitbake-user-manual/bitbake-user-manual-ref-variables-context 17 bitbake-user-manual/bitbake-user-manual-fetching 18 bitbake-user-manual/bitbake-user-manual-ref-variables 19 bitbake-user-manual/bitbake-user-manual-hello
|
/openbmc/linux/fs/smb/server/mgmt/ |
H A D | user_config.c | 15 struct ksmbd_user *user = NULL; in ksmbd_login_user() local 24 user = ksmbd_alloc_user(resp); in ksmbd_login_user() 27 return user; in ksmbd_login_user() 32 struct ksmbd_user *user = NULL; in ksmbd_alloc_user() local 34 user = kmalloc(sizeof(struct ksmbd_user), GFP_KERNEL); in ksmbd_alloc_user() 35 if (!user) in ksmbd_alloc_user() 38 user->name = kstrdup(resp->account, GFP_KERNEL); in ksmbd_alloc_user() 39 user->flags = resp->status; in ksmbd_alloc_user() 40 user->gid = resp->gid; in ksmbd_alloc_user() 41 user->uid = resp->uid; in ksmbd_alloc_user() [all …]
|
H A D | user_config.h | 23 static inline bool user_guest(struct ksmbd_user *user) in user_guest() argument 25 return user->flags & KSMBD_USER_FLAG_GUEST_ACCOUNT; in user_guest() 28 static inline void set_user_flag(struct ksmbd_user *user, int flag) in set_user_flag() argument 30 user->flags |= flag; in set_user_flag() 33 static inline int test_user_flag(struct ksmbd_user *user, int flag) in test_user_flag() argument 35 return user->flags & flag; in test_user_flag() 38 static inline void set_user_guest(struct ksmbd_user *user) in set_user_guest() argument 42 static inline char *user_passkey(struct ksmbd_user *user) in user_passkey() argument 44 return user->passkey; in user_passkey() 47 static inline char *user_name(struct ksmbd_user *user) in user_name() argument [all …]
|
/openbmc/linux/arch/arm64/kernel/ |
H A D | signal.c | 71 static void init_user_layout(struct rt_sigframe_user_layout *user) in init_user_layout() argument 74 sizeof(user->sigframe->uc.uc_mcontext.__reserved); in init_user_layout() 76 memset(user, 0, sizeof(*user)); in init_user_layout() 77 user->size = offsetof(struct rt_sigframe, uc.uc_mcontext.__reserved); in init_user_layout() 79 user->limit = user->size + reserved_size; in init_user_layout() 81 user->limit -= TERMINATOR_SIZE; in init_user_layout() 82 user->limit -= EXTRA_CONTEXT_SIZE; in init_user_layout() 86 static size_t sigframe_size(struct rt_sigframe_user_layout const *user) in sigframe_size() argument 88 return round_up(max(user->size, sizeof(struct rt_sigframe)), 16); in sigframe_size() 99 static int __sigframe_alloc(struct rt_sigframe_user_layout *user, in __sigframe_alloc() argument [all …]
|
/openbmc/linux/Documentation/admin-guide/sysctl/ |
H A D | user.rst | 2 Documentation for /proc/sys/user/ 12 /proc/sys/user. 16 per user per user namespace limits. 24 The creation of per user per user namespace objects are charged to 25 the user in the user namespace who created the object and 26 verified to be below the per user limit in that user namespace. 29 who created user namespaces the creation of the object happens 30 in (user namespaces can be nested) and verified to be below the per user 31 limits in the user namespaces of those users. 34 user namespace does not allow a user to escape their current limits. [all …]
|
/openbmc/linux/arch/arm/mach-omap2/ |
H A D | omap_hwmod_2xxx_interconnect_data.c | 27 .user = OCP_USER_MPU | OCP_USER_SDMA, 34 .user = OCP_USER_MPU, 47 .user = OCP_USER_MPU | OCP_USER_SDMA, 54 .user = OCP_USER_MPU | OCP_USER_SDMA, 62 .user = OCP_USER_MPU | OCP_USER_SDMA, 70 .user = OCP_USER_MPU | OCP_USER_SDMA, 78 .user = OCP_USER_MPU | OCP_USER_SDMA, 86 .user = OCP_USER_MPU | OCP_USER_SDMA, 94 .user = OCP_USER_MPU | OCP_USER_SDMA, 102 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
/openbmc/linux/kernel/trace/ |
H A D | trace_events_user.c | 194 typedef void (*user_event_func_t) (struct user_event *user, struct iov_iter *i, 202 static struct user_event_mm *user_event_mm_get_all(struct user_event *user); 204 static int destroy_user_event(struct user_event *user); 205 static bool user_fields_match(struct user_event *user, int argc, 224 static struct user_event *user_event_get(struct user_event *user) in user_event_get() argument 226 refcount_inc(&user->refcnt); in user_event_get() 228 return user; in user_event_get() 233 struct user_event *user = container_of( in delayed_destroy_user_event() local 238 if (!refcount_dec_and_test(&user->refcnt)) in delayed_destroy_user_event() 241 if (destroy_user_event(user)) { in delayed_destroy_user_event() [all …]
|
/openbmc/linux/drivers/mtd/nand/raw/atmel/ |
H A D | pmecc.c | 346 struct atmel_pmecc_user *user; in atmel_pmecc_create_user() local 354 size = sizeof(*user); in atmel_pmecc_create_user() 365 user = devm_kzalloc(pmecc->dev, size, GFP_KERNEL); in atmel_pmecc_create_user() 366 if (!user) in atmel_pmecc_create_user() 369 user->pmecc = pmecc; in atmel_pmecc_create_user() 371 user->partial_syn = (s16 *)PTR_ALIGN(user + 1, sizeof(u16)); in atmel_pmecc_create_user() 372 user->si = user->partial_syn + ((2 * req->ecc.strength) + 1); in atmel_pmecc_create_user() 373 user->lmu = user->si + ((2 * req->ecc.strength) + 1); in atmel_pmecc_create_user() 374 user->smu = user->lmu + (req->ecc.strength + 1); in atmel_pmecc_create_user() 375 user->mu = (s32 *)PTR_ALIGN(user->smu + in atmel_pmecc_create_user() [all …]
|
/openbmc/phosphor-mboxd/vpnor/test/ |
H A D | toc_flags.cpp | 26 assert((part.data.user.data[0]) == PARTITION_ECC_PROTECTED); in main() 27 assert(!(part.data.user.data[1] & DATA_MASK)); in main() 31 assert(!(part.data.user.data[0])); in main() 32 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_PRESERVED); in main() 36 assert(!(part.data.user.data[0])); in main() 37 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_READONLY); in main() 42 assert(!(part.data.user.data[0])); in main() 43 assert(!(part.data.user.data[1] & DATA_MASK)); in main() 47 assert(!(part.data.user.data[0])); in main() 48 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_REPROVISION); in main() [all …]
|
/openbmc/hiomapd/vpnor/test/ |
H A D | toc_flags.cpp | 28 assert((part.data.user.data[0]) == PARTITION_ECC_PROTECTED); in main() 29 assert(!(part.data.user.data[1] & DATA_MASK)); in main() 33 assert(!(part.data.user.data[0])); in main() 34 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_PRESERVED); in main() 38 assert(!(part.data.user.data[0])); in main() 39 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_READONLY); in main() 44 assert(!(part.data.user.data[0])); in main() 45 assert(!(part.data.user.data[1] & DATA_MASK)); in main() 49 assert(!(part.data.user.data[0])); in main() 50 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_REPROVISION); in main() [all …]
|
/openbmc/phosphor-webui/app/access-control/controllers/ |
H A D | user-controller.js | 34 function checkIfRoot(user) { argument 35 return user.UserName === 'root' ? true : false; 43 function mapTableData(user) { argument 44 const accountStatus = user.Locked ? 'Locked' : 45 user.Enabled ? 'Enabled' : 50 enabled: checkIfRoot(user) ? false : true, 53 user.selectable = checkIfRoot(user) ? false : true; 54 user.actions = [editAction, deleteAction]; 55 user.uiData = [user.UserName, user.RoleId, accountStatus]; 56 return user; [all …]
|
/openbmc/docs/architecture/ |
H A D | user-management.md | 6 user-management components. The implementation detail is beyond the scope of 11 1. Use common user-management (e.g. phosphor-user-manager) rather than 12 application-based user-management. Especially, avoid IPMI based 13 user-management. 15 Observe this rule even while creating, modifying or authenticating the user. 16 3. Have applications use the PAM module to authenticate the user instead of 24 or if the user created doesn't have an 'ipmi' group role. 26 user-management (e.g. phosphor-user-manager), whereas individual user-related 31 restriction etc. for the corresponding user). Design is made to cover this 37 corresponding user. This is used to determine at a high level whether the user [all …]
|
/openbmc/linux/scripts/ |
H A D | Makefile.userprogs | 7 user-csingle := $(foreach m, $(userprogs), $(if $($(m)-objs),,$(m))) 10 user-cmulti := $(foreach m, $(userprogs), $(if $($(m)-objs),$(m))) 13 user-cobjs := $(sort $(foreach m, $(userprogs), $($(m)-objs))) 15 user-csingle := $(addprefix $(obj)/, $(user-csingle)) 16 user-cmulti := $(addprefix $(obj)/, $(user-cmulti)) 17 user-cobjs := $(addprefix $(obj)/, $(user-cobjs)) 27 $(user-csingle): $(obj)/%: $(src)/%.c FORCE 35 $(user-cmulti): FORCE 37 $(call multi_depend, $(user-cmulti), , -objs) 42 $(user-cobjs): $(obj)/%.o: $(src)/%.c FORCE [all …]
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_ipmi_redfish_user.robot | 2 Documentation Test IPMI and Redfish combinations for user management. 28 [Documentation] Create user using redfish and verify via IPMI. 40 # Delay added for created new user password to get set. 47 [Documentation] Update user password via Redfish and verify using IPMI. 50 # Create user using Redfish. 60 # Update user password using Redfish. 72 [Documentation] Update user privilege via Redfish and verify using IPMI. 75 # Create user using Redfish with admin privilege. 85 # Update user privilege to operator using Redfish. 89 # Verify new user privilege level via IPMI. [all …]
|
/openbmc/linux/include/linux/ |
H A D | ipmi.h | 48 struct ipmi_user *user; member 119 struct ipmi_user **user); 129 int ipmi_destroy_user(struct ipmi_user *user); 132 int ipmi_get_version(struct ipmi_user *user, 145 int ipmi_set_my_address(struct ipmi_user *user, 148 int ipmi_get_my_address(struct ipmi_user *user, 151 int ipmi_set_my_LUN(struct ipmi_user *user, 154 int ipmi_get_my_LUN(struct ipmi_user *user, 171 int ipmi_request_settime(struct ipmi_user *user, 189 int ipmi_request_supply_msgs(struct ipmi_user *user, [all …]
|
/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_user.robot | 2 Documentation Test suite for OpenBMC IPMI user management. 17 ${invalid_username} user% 40 [Documentation] Verify IPMI maximum supported IPMI user ID and 41 ... enabled user from user summary. 50 Run IPMI Standard Command user enable ${random_userid} 57 # Verify maximum user count IPMI local user can have. 62 [Documentation] Verify user list via IPMI. 71 ... user set password ${random_userid} ${valid_password} 72 Run IPMI Standard Command user enable ${random_userid} 73 # Delay added for IPMI user to get enabled. [all …]
|
/openbmc/qemu/docs/system/devices/ |
H A D | vhost-user.rst | 3 vhost-user back ends 6 vhost-user back ends are way to service the request of VirtIO devices 10 vhost-user device 16 device that connects via a socket to the vhost-user *daemon*. 21 .. list-table:: vhost-user devices 28 * - vhost-user-blk 30 - See contrib/vhost-user-blk 31 * - vhost-user-fs 34 * - vhost-user-gpio 37 * - vhost-user-gpu [all …]
|
/openbmc/linux/drivers/fsi/ |
H A D | fsi-sbefifo.c | 782 static void sbefifo_release_command(struct sbefifo_user *user) in sbefifo_release_command() argument 784 if (is_vmalloc_addr(user->pending_cmd)) in sbefifo_release_command() 785 vfree(user->pending_cmd); in sbefifo_release_command() 786 user->pending_cmd = NULL; in sbefifo_release_command() 787 user->pending_len = 0; in sbefifo_release_command() 793 struct sbefifo_user *user; in sbefifo_user_open() local 795 user = kzalloc(sizeof(struct sbefifo_user), GFP_KERNEL); in sbefifo_user_open() 796 if (!user) in sbefifo_user_open() 799 file->private_data = user; in sbefifo_user_open() 800 user->sbefifo = sbefifo; in sbefifo_user_open() [all …]
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_user_management_sub_menu.robot | 19 ${xpath_add_user} //button[contains(text(),'Add user')] 30 ${xpath_delete_button} //button[text()='Delete user'] 31 ${xpath_add_user_heading} //h5[contains(text(),'Add user')] 37 ${xpath_user_creation_error_message} //*[contains(text(),'Error creating user')] 46 [Documentation] Verify navigation to user management page. 53 [Documentation] Verify existence of all sections in user management page. 60 [Documentation] Verify existence of all sections in user managemnet page. 67 [Documentation] Verify existence of all buttons in user management page. 77 [Documentation] Verify existence of all buttons and fields in add user page. 108 [Documentation] Create a new user with a privilege and verify that user is created. [all …]
|
/openbmc/openbmc-test-automation/openpower/localuser/ |
H A D | test_ipmi_redfish_user.robot | 2 Documentation Test IPMI and Redfish combinations for user management. 26 [Documentation] Create user using IPMI without privilege and verify user privilege 30 # Create IPMI user with random id and username. 34 ... user set name ${random_userid} ${random_username} 36 # Verify new user privilege level via Redfish. 43 [Documentation] Create user via redfish and verify via IPMI. 55 # Add delay for a new admin user password to set. 60 # Update user password using Redfish. 68 [Documentation] Delete user via redfish and verify using IPMI. 71 # Create user using Redfish. [all …]
|
/openbmc/linux/arch/m68k/ifpsp060/ |
H A D | os.S | 57 | Each IO routine checks to see if the memory write/read is to/from user 60 | for user mode applications. 71 | working in user space 80 | a1 - user destination address 82 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode 110 | a0 - user source address 113 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode 140 | Read a data byte from user memory. 143 | a0 - user source address 144 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/ |
H A D | README.md | 5 User Manager service exposes D-Bus methods for user management operations. 16 - CreateUser - To create new user to the system. 17 - RenameUser - To rename existing user to new name in the system. 26 - UserRenamed - Signal sent out when user is renamed in the system. 32 - MaxLoginAttemptBeforeLockout - Permissible attempt before locking out the user 38 when updating password for the user. 42 User manager daemon, will create user objects for every user existing in the 43 system under object path `/xyz/openbmc_project/user/<user name>`. Each user 51 - UserPrivilege - Privilege of the user. 52 - UserGroups - Groups to which the user belongs. [all …]
|
/openbmc/openbmc/meta-google/recipes-google/ssh/authorized-keys-comp/ |
H A D | authorized-keys-comp.sh | 6 while read -r user; do 7 home="$(eval echo "~$user")" || continue 11 if [[ $link != "/run/authorized_keys/$user" ]]; then 12 echo "Ignoring $user $home/.ssh/authorized_keys" >&2 19 "/usr/share/authorized_keys.d/$user" 21 "/run/authorized_keys.d/$user" 49 mv /run/authorized_keys.tmp /run/authorized_keys/"$user" 50 chown "$user" /run/authorized_keys/"$user"
|
/openbmc/linux/tools/net/ynl/generated/ |
H A D | Makefile | 12 YNL_GEN_ARG_ethtool:=--user-header linux/ethtool_netlink.h \ 18 SRCS=$(patsubst %,%-user.c,${GENS}) 19 HDRS=$(patsubst %,%-user.h,${GENS}) 20 OBJS=$(patsubst %,%-user.o,${GENS}) 28 %-user.h: ../../../../Documentation/netlink/specs/%.yaml $(TOOL) 30 @$(TOOL) --mode user --header --spec $< $(YNL_GEN_ARG_$*) > $@ 32 %-user.c: ../../../../Documentation/netlink/specs/%.yaml $(TOOL) 34 @$(TOOL) --mode user --source --spec $< $(YNL_GEN_ARG_$*) > $@ 36 %-user.o: %-user.c %-user.h
|