/openbmc/qemu/gdb-xml/ |
H A D | arm-m-profile-mve.xml | 11 <!-- ARMv8.1-M and MVE: Unprivileged and privileged Access. --> 13 <!-- ARMv8.1-M: Privileged Access only. --> 15 <!-- ARMv8.1-M: Privileged Access only. -->
|
/openbmc/u-boot/drivers/timer/ |
H A D | riscv_timer.c | 5 * RISC-V privileged architecture defined generic timer driver 9 * by the RISC-V privileged architecture spec. 25 * @time: the 64-bit timer count as defined by the RISC-V privileged
|
/openbmc/qemu/docs/devel/ |
H A D | uefi-vars.rst | 19 approach taken by physical hardware. Only privileged code running in 30 Instead of running the privileged code inside the guest we can run it
|
/openbmc/qemu/docs/tools/ |
H A D | qemu-vmsr-helper.rst | 20 However those registers are accessible under privileged access (CAP_SYS_RAWIO). 21 QEMU can use an external helper to access those privileged registers.
|
H A D | qemu-pr-helper.rst | 23 requests to a privileged external helper program. :program:`qemu-pr-helper`
|
/openbmc/openbmc/poky/meta/recipes-connectivity/inetutils/inetutils/ |
H A D | rlogin.xinetd.inetutils | 4 # execution with authentication based on privileged port numbers from trusted
|
H A D | rsh.xinetd.inetutils | 6 # privileged port numbers from trusted hosts.
|
/openbmc/openbmc/meta-security/recipes-mac/smack/smack-test/ |
H A D | test_privileged_change_self_label.sh | 13 echo "Privileged process could not change its label"
|
/openbmc/qemu/scripts/ci/gitlab-kubernetes-runners/ |
H A D | values.yaml | 7 privileged: true
|
/openbmc/qemu/bsd-user/freebsd/ |
H A D | target_os_siginfo.h | 131 #define TARGET_ILL_PRVOPC (5) /* Privileged opcode. */ 132 #define TARGET_ILL_PRVREG (6) /* Privileged register. */
|
/openbmc/qemu/tools/i386/ |
H A D | rapl-msr-index.h | 2 * Allowed list of MSR for Privileged RAPL MSR helper commands for QEMU
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libutempter/ |
H A D | libutempter_1.2.2-alt1.bb | 1 SUMMARY = "A privileged helper for utmp/wtmp updates"
|
/openbmc/qemu/include/semihosting/ |
H A D | semihost.h | 31 * @is_user: true if guest code is in usermode (i.e. not privileged)
|
/openbmc/qemu/hw/arm/ |
H A D | armv7m.c | 145 /* NS attrs are RAZ/WI for privileged, and BusFault for user */ in v7m_sysreg_ns_write() 165 /* NS attrs are RAZ/WI for privileged, and BusFault for user */ in v7m_sysreg_ns_read() 213 * Unassigned portions of the PPB space are RAZ/WI for privileged 214 * accesses, and fault for non-privileged accesses. 391 * is to RAZ/WI for privileged access and BusFault for non-privileged in armv7m_realize()
|
/openbmc/qemu/include/hw/xen/interface/ |
H A D | event_channel.h | 138 * 2. Only a sufficiently-privileged domain may bind to a physical IRQ. 189 * 2. Only a sufficiently-privileged domain may obtain the status of an event 252 * 2. Only a sufficiently-privileged domain may specify other than DOMID_SELF.
|
/openbmc/u-boot/doc/ |
H A D | README.qemu-riscv | 15 configuration information to guest software. It implements RISC-V privileged
|
H A D | README.bedbug | 31 if it is an illegal instruction, privileged instruction or
|
/openbmc/qemu/target/ppc/translate/ |
H A D | storage-ctrl-impl.c.inc | 197 /* tlbie[l] is privileged... */ 204 * making it hypervisor privileged.
|
/openbmc/u-boot/arch/arm/include/asm/arch-imx8/sci/svc/rm/ |
H A D | api.h | 26 #define SC_RM_SPA_ASSERT 2U /* Assert (force to be secure/privileged) */
|
/openbmc/qemu/docs/system/ppc/ |
H A D | pseries.rst | 176 i.e. the virtual machine is run in user mode and all privileged instructions 183 Because all privileged instructions are trapped, guests that use a lot of 184 privileged instructions run quite slow with KVM-PR. On the other hand, because 213 As KVM-HV has access to privileged instructions, guests that use a lot of these
|
/openbmc/openbmc/meta-phosphor/classes/ |
H A D | phosphor-deploy-ssh-keys.bbclass | 5 # Add a basic class to add a privileged user from an ssh
|
/openbmc/google-misc/subprojects/dhcp-done/ |
H A D | dhcp-done.cpp | 25 // A privileged port that is reserved for querying BMC DHCP completion.
|
/openbmc/openbmc-build-scripts/ |
H A D | run-rootfs-size-docker.sh | 73 --privileged=true \
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/polkit/ |
H A D | polkit_126.bb | 2 …ining and handling the policy that allows unprivileged processes to speak to privileged processes."
|
/openbmc/openbmc/poky/meta/recipes-core/glibc/glibc/ |
H A D | 0017-Replace-echo-with-printf-builtin-in-nscd-init-script.patch | 49 # a non-privileged user
|