/openbmc/qemu/tests/tcg/multiarch/gdbstub/ |
H A D | test-proc-mappings.py | 1 """Test that gdbstub has access to proc mappings. 16 mappings = gdb.execute("info proc mappings", False, True) 17 report(isinstance(mappings, str), "Fetched the mappings from the inferior") 19 # report("/sha1" in mappings, "Found the test binary name in the mappings")
|
/openbmc/qemu/util/ |
H A D | vfio-helpers.c | 86 * - Fixed mappings of HVAs are assigned "low" IOVAs in the range of 93 * mappings. At each qemu_vfio_dma_reset_temporary() call, the whole area 95 * mappings are completed before calling. 99 IOVAMapping *mappings; member 509 * VFIO may pin all memory inside mappings, resulting it in pinning in qemu_vfio_open_pci() 532 trace_qemu_vfio_dump_mapping(s->mappings[i].host, in qemu_vfio_dump_mappings() 533 s->mappings[i].iova, in qemu_vfio_dump_mappings() 534 s->mappings[i].size); in qemu_vfio_dump_mappings() 547 IOVAMapping *p = s->mappings; in qemu_vfio_find_mapping() 570 } else if (mid < &s->mappings[s->nr_mappings - 1] in qemu_vfio_find_mapping() [all …]
|
H A D | mmap-alloc.c | 97 * shared mappings. For shared mappings, all mappers have to specify in map_noreserve_effective() 106 * Accountable mappings in the kernel that can be affected by MAP_NORESEVE in map_noreserve_effective() 107 * are private writable mappings (see mm/mmap.c:accountable_mapping() in in map_noreserve_effective() 108 * Linux). For all shared or readonly mappings, MAP_NORESERVE is always in map_noreserve_effective() 118 * MAP_NORESERVE is globally ignored for applicable !hugetlb mappings when in map_noreserve_effective() 158 * On ppc64 mappings in the same segment (aka slice) must share the same in mmap_reserve() 240 /* Mappings in the same segment must share the same page size */ in mmap_guard_pagesize()
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_redfish_privilege_registry.robot | 64 Verify Redfish Privilege Registry Mappings Properties For Account Service 65 [Documentation] Verify Privilege Registry Account Service Mappings resource properties. 71 # "Mappings": [ 111 # Get mappings properties for Entity: Account Service. 112 @{mappings}= Get From Dictionary ${resp.dict} Mappings 114 Should Be Equal ${mappings[${account_service}]['OperationMap']['GET'][0]['Privilege'][0]} 116 Should Be Equal ${mappings[${account_service}]['OperationMap']['HEAD'][0]['Privilege'][0]} 118 Should Be Equal ${mappings[${account_service}]['OperationMap']['PATCH'][0]['Privilege'][0]} 120 Should Be Equal ${mappings[${account_service}]['OperationMap']['PUT'][0]['Privilege'][0]} 122 Should Be Equal ${mappings[${account_service}]['OperationMap']['DELETE'][0]['Privilege'][0]} [all …]
|
/openbmc/openbmc/poky/meta/recipes-core/readline/files/ |
H A D | inputrc | 34 # mappings for "page up" and "page down" to step to the beginning/end 39 # alternate mappings for "page up" and "page down" to search the history 43 # # mappings for Ctrl-left-arrow and Ctrl-right-arrow for word moving
|
/openbmc/qemu/linux-headers/asm-generic/ |
H A D | mman.h | 18 #define MCL_CURRENT 1 /* lock all current mappings */ 19 #define MCL_FUTURE 2 /* lock all future mappings */
|
/openbmc/sdbusplus/tools/sdbusplus/ |
H A D | event.py | 214 mappings = {} 218 mappings[self.name + "." + e.name] = e.registry_mapping( 237 if len(mappings) != 0: 238 result["Oem"] = {"OpenBMC_Mapping": mappings}
|
/openbmc/u-boot/arch/arm/include/asm/arch-pxa/ |
H A D | hardware.h | 25 * PXA300/310/320 all have distinct register mappings in some cases, that's why 59 * Intel PXA internal I/O mappings:
|
/openbmc/qemu/docs/devel/ |
H A D | tcg.rst | 118 * The direct branch cannot cross a page boundary. Memory mappings 179 mappings change, all caches in QEMU are physically indexed. This 182 In order to avoid invalidating the basic block chain when MMU mappings 200 map files. ``-perfmap`` is lightweight and produces only guest-host mappings. 214 Note that qemu-system generates mappings only for ``-kernel`` files in ELF
|
/openbmc/qemu/linux-headers/asm-mips/ |
H A D | mman.h | 57 #define MS_INVALIDATE 0x0002 /* invalidate mappings & caches */ 63 #define MCL_CURRENT 1 /* lock all current mappings */ 64 #define MCL_FUTURE 2 /* lock all future mappings */
|
/openbmc/phosphor-state-manager/ |
H A D | systemd_target_monitor.cpp | 35 "target/error mappings" in print_usage() 51 "Full path to json file(s) with target/error mappings"); in main()
|
/openbmc/openbmc/poky/scripts/ |
H A D | oe-pkgdata-util | 211 mappings = OrderedDict() 216 mappings[pkg] = os.path.basename(os.readlink(revlink)) 218 mappings = defaultdict(list) 226 mappings[pkg].append(fields[1]) 228 return mappings 236 mappings = lookup_pkglist(pkgs, args.pkgdata_dir, args.reverse) 238 if len(mappings) < len(pkgs): 239 missing = list(set(pkgs) - set(mappings.keys())) 244 items = list(mappings.values()) 248 items.extend(mappings.get(pkg, []))
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | PrivilegeRegistry.v1_1_5.json | 216 … "description": "The `PrivilegeRegistry` schema describes the operation-to-privilege mappings.", 217 "longDescription": "This resource shall contain operation-to-privilege mappings.", 257 "Mappings": { object 258 …"description": "The mappings between entities and the relevant privileges that access those entiti… 262 …"longDescription": "This property shall describe the mappings between entities and the relevant pr…
|
/openbmc/u-boot/include/asm-generic/ |
H A D | io.h | 80 * may create new mappings, so should generally be paired with a matching call 94 * unmap_physmem() - Remove mappings created by a prior call to map_physmem()
|
/openbmc/openbmc/poky/meta/recipes-graphics/xorg-app/ |
H A D | xmodmap_1.0.11.bb | 3 SUMMARY = "Utility for modifying keymaps and pointer button mappings in X"
|
/openbmc/phosphor-user-manager/phosphor-ldap-config/ |
H A D | ldap_config_mgr.cpp | 207 // Restore the ldap config and their mappings in restore() 210 // Restore the role mappings in restore() 216 // Restore the role mappings in restore()
|
/openbmc/qemu/tests/tcg/multiarch/ |
H A D | Makefile.target | 93 run-gdbstub-proc-mappings: sha1 97 --bin $< --test $(MULTIARCH_SRC)/gdbstub/test-proc-mappings.py, \ 98 proc mappings support) 154 run-gdbstub-proc-mappings run-gdbstub-thread-breakpoint \
|
/openbmc/phosphor-led-manager/manager/ |
H A D | grouplayout.hpp | 13 * @brief Depicts the LED and their mappings and group actions
|
/openbmc/qemu/include/hw/xen/interface/ |
H A D | grant_table.h | 144 * @trans_grant in @trans_domid. No mappings are allowed. 154 * GTF_readonly: Restrict @domid to read-only mappings and accesses. [GST] 159 * mappings of the grant [GST] 322 * 3. Mappings should only be destroyed via GNTTABOP_unmap_grant_ref. If a 341 * GNTTABOP_unmap_grant_ref: Destroy one or more grant-reference mappings 349 * mappings will remain in the device or host TLBs. 480 * GNTTABOP_unmap_and_replace: Destroy one or more grant-reference mappings 488 * mappings will remain in the device or host TLBs.
|
H A D | arch-arm.h | 393 /* Virtio MMIO mappings */ 398 * vGIC mappings: Only one set of mapping is used by the guest. 402 /* vGIC v2 mappings */ 408 /* vGIC v3 mappings */ 428 /* PL011 mappings */
|
/openbmc/qemu/tests/unit/ |
H A D | test-vmstate.c | 855 GTree *mappings; member 890 g_tree_destroy(domain->mappings); in destroy_domain() 898 domain->mappings = g_tree_new_full((GCompareDataFunc)interval_cmp, in domain_preload() 919 VMSTATE_GTREE_V(mappings, TestGTreeDomain, 1, 976 0x00, 0x0, 0x0, 0x2, /* 2 mappings */ 1020 domain->mappings = g_tree_new_full((GCompareDataFunc)interval_cmp, NULL, in create_first_domain() 1023 g_tree_insert(domain->mappings, a, map_a); in create_first_domain() 1024 g_tree_insert(domain->mappings, b, map_b); in create_first_domain() 1091 compare_trees(d1->mappings, d2->mappings, match_interval_mapping_node); in diff_domain() 1150 0x1, /* start of mappings */ [all …]
|
/openbmc/pldm/common/ |
H A D | transport.cpp | 20 * mappings over the EID space excluding the Null (0), Reserved (1 to 7), 31 * its TID. The EID to TID mappings of pldmtool and pldmd should be coherent to
|
/openbmc/qemu/hw/virtio/ |
H A D | virtio-iommu.c | 51 GTree *mappings; member 312 g_tree_foreach(domain->mappings, virtio_iommu_notify_unmap_cb, in virtio_iommu_detach_endpoint_from_domain() 368 domain->mappings = g_tree_new_full((GCompareDataFunc)interval_cmp, in virtio_iommu_get_domain() 386 g_tree_destroy(domain->mappings); in virtio_iommu_put_domain() 757 /* Replay domain mappings on the associated memory region */ in virtio_iommu_attach() 758 g_tree_foreach(domain->mappings, virtio_iommu_notify_map_cb, in virtio_iommu_attach() 825 mapping = g_tree_lookup(domain->mappings, (gpointer)interval); in virtio_iommu_map() 837 g_tree_insert(domain->mappings, interval, mapping); in virtio_iommu_map() 873 while (g_tree_lookup_extended(domain->mappings, &interval, in virtio_iommu_unmap() 883 g_tree_remove(domain->mappings, iter_key); in virtio_iommu_unmap() [all …]
|
/openbmc/openpower-vpd-parser/vpd-manager/include/ |
H A D | isdimm_parser.hpp | 84 * Mappings for FRU number from calculated part number is used 137 * Mappings for FRU number from calculated part number is used
|
/openbmc/qemu/include/qemu/ |
H A D | cacheflush.h | 19 * mappings of the same physical page(s).
|