Lines Matching refs:will
262 Secure firmware image will execute in Secure state. It may
277 Execution. A Non-Secure firmware image will execute
310 If a user thread overflows its stack, this will be caught and the
311 kernel itself will be shielded from harm. Enabling this option
322 This option sets the privileged stack region size that will be used
324 this region will be inaccessible from user mode. During system calls,
325 this region will be utilized by the system call. This value must be
369 changes will be necessary for this.
380 Selected if the architecture will generate a fault if unused stack
390 Every kernel object will have an associated bitfield to store
466 Enable installation of interrupts at runtime, which will move some
476 caution as enabling this will increase the image size by a
491 script to generate its interrupt tables. This mechanism will create
564 will be subtracted from CONFIG_NUM_IRQS to properly size them.
812 memory mappings. The architecture will need to implement
845 pointer dereferences. With this enabled, the kernel will not assume that
853 Although the kernel will not disturb this RAM mapping by re-mapping the associated
855 virtual address space. The kernel's page frame ontology will not consider
856 this mapping at all; non-kernel pages will be considered free (unless marked
857 as reserved) and K_MEM_PAGE_FRAME_MAPPED will not be set.
929 If this option is turned on, certain areas of the kernel image will
933 1) All program text will be have read-only, execute memory permission
934 2) All read-only data will have read-only permission, and execution
936 3) All other RAM addresses will have read-write permission, and
946 If this option is disabled, the entire kernel will have default memory