Home
last modified time | relevance | path

Searched full:privileged (Results 1 – 25 of 136) sorted by relevance

123456

/openbmc/qemu/gdb-xml/
H A Darm-m-profile-mve.xml11 <!-- ARMv8.1-M and MVE: Unprivileged and privileged Access. -->
13 <!-- ARMv8.1-M: Privileged Access only. -->
15 <!-- ARMv8.1-M: Privileged Access only. -->
/openbmc/u-boot/drivers/timer/
H A Driscv_timer.c5 * RISC-V privileged architecture defined generic timer driver
9 * by the RISC-V privileged architecture spec.
25 * @time: the 64-bit timer count as defined by the RISC-V privileged
/openbmc/qemu/docs/devel/
H A Duefi-vars.rst19 approach taken by physical hardware. Only privileged code running in
30 Instead of running the privileged code inside the guest we can run it
/openbmc/qemu/docs/tools/
H A Dqemu-vmsr-helper.rst20 However those registers are accessible under privileged access (CAP_SYS_RAWIO).
21 QEMU can use an external helper to access those privileged registers.
H A Dqemu-pr-helper.rst23 requests to a privileged external helper program. :program:`qemu-pr-helper`
/openbmc/openbmc/poky/meta/recipes-connectivity/inetutils/inetutils/
H A Drlogin.xinetd.inetutils4 # execution with authentication based on privileged port numbers from trusted
H A Drsh.xinetd.inetutils6 # privileged port numbers from trusted hosts.
/openbmc/openbmc/meta-security/recipes-mac/smack/smack-test/
H A Dtest_privileged_change_self_label.sh13 echo "Privileged process could not change its label"
/openbmc/qemu/scripts/ci/gitlab-kubernetes-runners/
H A Dvalues.yaml7 privileged: true
/openbmc/qemu/bsd-user/freebsd/
H A Dtarget_os_siginfo.h131 #define TARGET_ILL_PRVOPC (5) /* Privileged opcode. */
132 #define TARGET_ILL_PRVREG (6) /* Privileged register. */
/openbmc/qemu/tools/i386/
H A Drapl-msr-index.h2 * Allowed list of MSR for Privileged RAPL MSR helper commands for QEMU
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libutempter/
H A Dlibutempter_1.2.2-alt1.bb1 SUMMARY = "A privileged helper for utmp/wtmp updates"
/openbmc/qemu/include/semihosting/
H A Dsemihost.h31 * @is_user: true if guest code is in usermode (i.e. not privileged)
/openbmc/qemu/hw/arm/
H A Darmv7m.c145 /* NS attrs are RAZ/WI for privileged, and BusFault for user */ in v7m_sysreg_ns_write()
165 /* NS attrs are RAZ/WI for privileged, and BusFault for user */ in v7m_sysreg_ns_read()
213 * Unassigned portions of the PPB space are RAZ/WI for privileged
214 * accesses, and fault for non-privileged accesses.
391 * is to RAZ/WI for privileged access and BusFault for non-privileged in armv7m_realize()
/openbmc/qemu/include/hw/xen/interface/
H A Devent_channel.h138 * 2. Only a sufficiently-privileged domain may bind to a physical IRQ.
189 * 2. Only a sufficiently-privileged domain may obtain the status of an event
252 * 2. Only a sufficiently-privileged domain may specify other than DOMID_SELF.
/openbmc/u-boot/doc/
H A DREADME.qemu-riscv15 configuration information to guest software. It implements RISC-V privileged
H A DREADME.bedbug31 if it is an illegal instruction, privileged instruction or
/openbmc/qemu/target/ppc/translate/
H A Dstorage-ctrl-impl.c.inc197 /* tlbie[l] is privileged... */
204 * making it hypervisor privileged.
/openbmc/u-boot/arch/arm/include/asm/arch-imx8/sci/svc/rm/
H A Dapi.h26 #define SC_RM_SPA_ASSERT 2U /* Assert (force to be secure/privileged) */
/openbmc/qemu/docs/system/ppc/
H A Dpseries.rst176 i.e. the virtual machine is run in user mode and all privileged instructions
183 Because all privileged instructions are trapped, guests that use a lot of
184 privileged instructions run quite slow with KVM-PR. On the other hand, because
213 As KVM-HV has access to privileged instructions, guests that use a lot of these
/openbmc/openbmc/meta-phosphor/classes/
H A Dphosphor-deploy-ssh-keys.bbclass5 # Add a basic class to add a privileged user from an ssh
/openbmc/google-misc/subprojects/dhcp-done/
H A Ddhcp-done.cpp25 // A privileged port that is reserved for querying BMC DHCP completion.
/openbmc/openbmc-build-scripts/
H A Drun-rootfs-size-docker.sh73 --privileged=true \
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/polkit/
H A Dpolkit_126.bb2 …ining and handling the policy that allows unprivileged processes to speak to privileged processes."
/openbmc/openbmc/poky/meta/recipes-core/glibc/glibc/
H A D0017-Replace-echo-with-printf-builtin-in-nscd-init-script.patch49 # a non-privileged user

123456