Home
last modified time | relevance | path

Searched full:access (Results 1 – 25 of 1361) sorted by relevance

12345678910>>...55

/Zephyr-Core-3.7.0/subsys/net/lib/lwm2m/
Dlwm2m_obj_access_control.h12 * @brief Main access control logic. Checks if the server with instance id @p server_obj_inst are
14 * and object instance id @p obj_inst_id. If access control is enabled, this should
15 * be called before every operation to test access.
21 * @param bootstrap_mode 1/0. Bootstrap servers should have complete access during bootstrap.
22 * @return int to signal access:
23 * 0 - server has access
31 * @brief Creates an access control object instance. Should be called every
34 * @param obj_id object id of the object instance getting an access control.
35 * @param obj_inst_id object instance id of the object instance getting access control.
41 * @brief Creates an access control object instance for objects. Should be called if servers should
[all …]
Dlwm2m_obj_access_control.c134 LOG_DBG("Access control for obj_inst /%d/%d already exist", obj_id, obj_inst_id); in access_control_add()
148 LOG_ERR("Can not create access control instance - no more room: %u", obj_inst_id); in access_control_add()
197 LOG_DBG("Cannot remove access control for /%d/%d - not found", obj_id, obj_inst_id); in access_control_remove()
216 uint16_t access) in check_acl_table() argument
222 LOG_DBG("Access control for obj_inst /%d/%d not found", obj_id, obj_inst_id); in check_acl_table()
232 /* If server has access or if default exist */ in check_acl_table()
242 return (access_rights & access) == access; in check_acl_table()
245 /* Full access if server is the ac_owner and no acl is specified for that server */ in check_acl_table()
251 return (default_rights & access) == access; in check_acl_table()
259 return 0; /* Full access for bootstrap servers */ in access_control_check_access()
[all …]
/Zephyr-Core-3.7.0/tests/bsim/bluetooth/mesh/tests_scripts/persistence/
Daccess.sh16 -- -argstest access-cfg=configured
20 -- -argstest access-cfg=configured
24 -- -argstest access-cfg=new-subs
28 -- -argstest access-cfg=new-subs
32 -- -argstest access-cfg=not-configured
39 -- -argstest access-cfg=configured
43 -- -argstest access-cfg=configured
47 -- -argstest access-cfg=new-subs
51 -- -argstest access-cfg=new-subs
55 -- -argstest access-cfg=not-configured
/Zephyr-Core-3.7.0/include/zephyr/mgmt/mcumgr/grp/fs_mgmt/
Dfs_mgmt_callbacks.h22 /** The type of operation that is being requested for a given file access callback. */
24 /** Access to read file (file upload). */
27 /** Access to write file (file download). */
30 /** Access to get status of file. */
33 /** Access to calculate hash or checksum of file. */
40 * authorise or deny it. Access will be allowed so long as all notification handlers return
41 * #MGMT_ERR_EOK, if one returns an error then access will be denied.
45 enum fs_mgmt_file_access_types access; member
49 * redirect file access if needed (as long as it does not exceed the maximum path string
/Zephyr-Core-3.7.0/soc/nxp/imx/imx6sx/
Dsoc.c21 /* Set access to WDOG3 for M4 core */ in SOC_RdcInit()
27 /* Set access to UART_1 for M4 core */ in SOC_RdcInit()
31 /* Set access to UART_2 for M4 core */ in SOC_RdcInit()
35 /* Set access to UART_3 for M4 core */ in SOC_RdcInit()
39 /* Set access to UART_4 for M4 core */ in SOC_RdcInit()
43 /* Set access to UART_5 for M4 core */ in SOC_RdcInit()
47 /* Set access to UART_6 for M4 core */ in SOC_RdcInit()
51 /* Set access to GPIO_1 for M4 core */ in SOC_RdcInit()
55 /* Set access to GPIO_2 for M4 core */ in SOC_RdcInit()
59 /* Set access to GPIO_3 for M4 core */ in SOC_RdcInit()
[all …]
/Zephyr-Core-3.7.0/tests/subsys/mgmt/mcumgr/settings_mgmt/src/
Dmain.c158 zassert_false(access_read_got, "Did not expect read access notification"); in ZTEST()
159 zassert_false(access_write_got, "Did not expect write access notification"); in ZTEST()
160 zassert_false(access_delete_got, "Did not expect delete access notification"); in ZTEST()
161 zassert_false(access_load_got, "Did not expect load access notification"); in ZTEST()
162 zassert_false(access_save_got, "Did not expect save access notification"); in ZTEST()
163 zassert_true(access_commit_got, "Expected commit access notification"); in ZTEST()
164 zassert_false(access_invalid_got, "Did not expect an invalid access notification type"); in ZTEST()
213 zassert_false(access_read_got, "Did not expect read access notification"); in ZTEST()
214 zassert_false(access_write_got, "Did not expect write access notification"); in ZTEST()
215 zassert_false(access_delete_got, "Did not expect delete access notification"); in ZTEST()
[all …]
/Zephyr-Core-3.7.0/drivers/smbus/
DKconfig48 bool "SMBus register access mode"
51 Default PCH register access mode. Set default access IO so
55 bool "I/O PCH SMBus Register Access Mode"
57 Access PCH SMBus registers through I/O space.
60 bool "MMIO PCH SMBus Register Access Mode"
62 Access PCH SMBus registers though MMIO space.
/Zephyr-Core-3.7.0/subsys/bluetooth/audio/
DKconfig.has1 # Bluetooth Audio - Hearing Access Service options
8 bool "Hearing Access Service support"
13 This option enables support for Hearing Access Service.
28 This option sets the number of Hearing Access Service Presets
58 bool "Hearing Access Service Client support"
64 This option enables support for Hearing Access Service Client.
/Zephyr-Core-3.7.0/drivers/flash/
DKconfig.npcx_fiu40 bool "Direct Read Access version 1 support"
46 bool "Direct Read Access version 2 support"
52 bool "4 byte address support in Direct Read Access mode"
57 Access mode.
60 bool "4 byte address support in Direct Read Access mode"
65 Read Access (DRA) on QSPI bus.
/Zephyr-Core-3.7.0/doc/kernel/usermode/
Doverview.rst34 - We prevent access to memory not specifically granted, or incorrect access to
38 - Access to thread stack buffers will be controlled with a policy which
41 - A user thread will by default have read/write access to its own stack
44 - A user thread will never by default have access to user thread stacks
47 - A user thread will never by default have access to thread stacks owned
51 - A user thread may have read/write access to the stacks of other user
54 - On MPU systems, threads may only access their own stack buffer.
56 - On MMU systems, threads may access any user thread stack in the same
62 - User threads by default are not granted default access to any memory
78 access to read or write, depending on the semantics of the API.
[all …]
/Zephyr-Core-3.7.0/subsys/net/l2/ieee802154/
DKconfig.radio23 prompt "Radio channel access protocol"
26 Select which medium access protocol to use.
29 bool "IEEE 802.15.4 unslotted CSMA-CA medium access protocol"
33 channel access and fits most usage scenarios (see IEEE 802.15.4-2020,
37 bool "IEEE 802.15.4 Aloha medium access protocol (CCA mode 4)"
43 current implementation does not randomize channel access.
55 before declaring a channel access failure (MAC PIB attribute:
/Zephyr-Core-3.7.0/dts/bindings/watchdog/
Dnxp,s32-swt.yaml20 master-access-mask:
24 Each bit set on this mask enables access to this watchdog for the platform
27 Defaults to access enabled for all masters (hardware reset value).
29 reset-on-invalid-access:
32 Set this flag to generate a reset on respond to an invalid access.
61 Lock mechanism that provides write access protection to the configuration
/Zephyr-Core-3.7.0/dts/bindings/flash_controller/
Dnuvoton,npcx-fiu-nor.yaml30 description: Mapped memory address of direct read access for spi nor flash.
43 Selects the SPI read access type of Direct Read Access. Usually, we choose
47 - "NPCX_RD_MODE_NORMAL" # Direct read access by command code 03h
48 - "NPCX_RD_MODE_FAST" # Direct read access by command code 0bh
49 - "NPCX_RD_MODE_FAST_DUAL" # Direct read access by command code bbh
/Zephyr-Core-3.7.0/arch/arm64/core/
Dfpu.c26 * used to pass float arguments, and that triggers an FPU access trap.
64 * Flush FPU content and disable access.
76 /* turn on FPU access */ in arch_flush_local_fpu()
88 /* disable FPU access */ in arch_flush_local_fpu()
144 /* always deny FPU access whenever an exception is entered */ in z_arm64_fpu_enter_exc()
156 * FPU access is disabled and we're trapped while in exception context.
157 * Rather than flushing the FPU context to its owner and enabling access
159 * simulate them and leave the FPU access disabled. This also avoids the
216 * We also get here when FP regs are used while in exception as FP access
218 * to the owning thread and simply enable FPU access. Exceptions should be
[all …]
/Zephyr-Core-3.7.0/include/zephyr/dt-bindings/interrupt-controller/
Desp32s2-xtensa-intmux.h40 #define FROM_CPU_INTR2_SOURCE 30 /* int2 from a CPU, level, for DPORT Access */
41 #define FROM_CPU_INTR3_SOURCE 31 /* int3 from a CPU, level, for DPORT Access */
80 #define CACHE_IA_INTR_SOURCE 70 /* Cache Invalid Access, level */
85 #define PMS_PRO_IRAM0_ILG_INTR_SOURCE 75 /* illegal IRAM1 access, level */
86 #define PMS_PRO_DRAM0_ILG_INTR_SOURCE 76 /* illegal DRAM0 access, level */
87 #define PMS_PRO_DPORT_ILG_INTR_SOURCE 77 /* illegal DPORT access, level */
88 #define PMS_PRO_AHB_ILG_INTR_SOURCE 78 /* illegal AHB access, level */
89 #define PMS_PRO_CACHE_ILG_INTR_SOURCE 79 /* illegal CACHE access, level */
90 #define PMS_DMA_APB_I_ILG_INTR_SOURCE 80 /* illegal APB access, level */
91 #define PMS_DMA_RX_I_ILG_INTR_SOURCE 81 /* illegal DMA RX access, level */
[all …]
/Zephyr-Core-3.7.0/include/zephyr/mgmt/mcumgr/grp/settings_mgmt/
Dsettings_mgmt_callbacks.h33 * read/write/delete/load/save/commit request and to authorise or deny it. Access will be allowed
34 * so long as no handlers return an error, if one returns an error then access will be denied.
37 /** Type of access */
38 enum settings_mgmt_access_types access; member
43 * access if needed (as long as it does not exceed the maximum setting string size) if
/Zephyr-Core-3.7.0/soc/nxp/kinetis/k2x/
Dnxp_mpu_regions.c11 /* Debugger access can't be disabled; ENET and USB devices will not be able
12 * to access RAM when their regions are dynamically disabled in NXP MPU.
20 * MPU, which means that if one region grants access then another
21 * region cannot revoke access. If an application enables hardware
24 * background region that enables supervisor read/write access from the
/Zephyr-Core-3.7.0/soc/nxp/kinetis/k6x/
Dnxp_mpu_regions.c11 /* Debugger access can't be disabled; ENET and USB devices will not be able
12 * to access RAM when their regions are dynamically disabled in NXP MPU.
20 * MPU, which means that if one region grants access then another
21 * region cannot revoke access. If an application enables hardware
24 * background region that enables supervisor read/write access from the
/Zephyr-Core-3.7.0/subsys/shell/modules/
DKconfig14 This shell provides access to basic kernel data like version, uptime
33 This shell provides access to basic device data.
40 This shell provides access to date and time based on Unix time.
47 This shell command provides read/write access to physical memory.
/Zephyr-Core-3.7.0/dts/bindings/reserved-memory/
Dnordic,owned-memory.yaml9 access is then configured for the domain at boot time, based on the UICR.
30 description: Owner has read access to the region.
34 description: Owner has write access to the region.
42 description: Owner has secure-only access to the region.
/Zephyr-Core-3.7.0/soc/renesas/smartbond/da1469x/
Dintvect_reserved.ld9 /* Access to addresses in range 0x0-0x1ff is remapped to sram to allow rw
10 * access to interrupt vector which is located at 0x0 where flash is remapped.
11 * This means first 512 bytes of sram has to be reserved so remapped access does
/Zephyr-Core-3.7.0/arch/arm64/core/cortex_r/
DKconfig28 system requires PRIV access policy different from the access policy
35 allow nPRIV access at all. However, since the background map
57 bool "Add MPU access to write to flash"
59 Enable this to allow MPU RWX access to flash memory
/Zephyr-Core-3.7.0/kernel/
DKconfig.mem_domain48 thread access to memory. Memory domain APIs may only be invoked from
51 For these reasons, on uniprocessor systems unless memory access
71 have no access to others threads' stacks.
73 If disabled, threads within the same memory domains can access
76 Regardless of this settings, threads cannot access the stacks of
/Zephyr-Core-3.7.0/drivers/spi/
DKconfig.dw17 bool "DesignWare SPI only allows word access"
20 DesignWare SPI only allows word access, byte access will raise
/Zephyr-Core-3.7.0/arch/riscv/core/
Dfpu.c24 * used to pass float arguments, and that would trigger an FPU access trap.
82 "must be called with FPU access disabled"); in z_riscv_fpu_load()
96 * transfer. The saved FPU state is updated upon disabling FPU access so
106 "must be called with FPU access disabled"); in arch_flush_local_fpu()
114 /* turn on FPU access */ in arch_flush_local_fpu()
123 /* disable FPU access */ in arch_flush_local_fpu()
186 /* always deny FPU access whenever an exception is entered */ in z_riscv_fpu_enter_exc()
196 * We also get here when FP regs are used while in exception as FP access
198 * to the owning thread and simply enable FPU access. Exceptions should be
218 * We were already in exception when the FPU access trapped. in z_riscv_fpu_trap()
[all …]

12345678910>>...55