Searched full:privilege (Results 1 – 25 of 70) sorted by relevance
123
/Zephyr-latest/include/zephyr/arch/x86/ |
D | thread_stack.h | 46 * | Privilege elevation stack | 62 * | Privilege elevation stack | 73 * Privilege elevation stacks are fixed-size. All the pages containing the 78 * privilege elevation stack is also marked read-only. 80 * If a thread starts in, or drops down to user mode, the privilege stack page 84 * updated to point to the top of the privilege elevation stack. Otherwise
|
/Zephyr-latest/subsys/debug/coredump/ |
D | Kconfig | 111 bool "Dump privilege stack of user threads" 116 Dump the privilege stack of user threads. 119 need to look into the privilege stacks.
|
/Zephyr-latest/doc/kernel/usermode/ |
D | index.rst | 6 Zephyr offers the capability to run threads at a reduced privilege level
|
/Zephyr-latest/dts/bindings/pm_cpu_ops/ |
D | arm_psci.yaml | 7 privilege on an ARM device.
|
/Zephyr-latest/include/zephyr/arch/x86/ia32/ |
D | arch.h | 45 * The 0x03 is added to limit privilege. 89 /** Privilege level associated with ISR/stub */ 104 * vector, @a v using the descriptor privilege level @a d. On the IA-32 107 * vector number and the descriptor privilege level. The genIdt tool then picks 111 * The @a d argument specifies the privilege level for the interrupt-gate 118 * @param d Descriptor Privilege Level 144 * @param dpl_p Descriptor privilege level
|
/Zephyr-latest/arch/arc/core/secureshield/ |
D | secure_sys_services.c | 20 * Some aux regs require secure privilege, this function implements 35 * Some aux regs require secure privilege, this function implements
|
/Zephyr-latest/dts/bindings/arm/ |
D | arm,ethos-u.yaml | 30 privilege-enable:
|
/Zephyr-latest/soc/common/riscv-privileged/ |
D | soc_irq.S | 19 * SOCs that do not truly follow the riscv privilege specification.
|
/Zephyr-latest/include/zephyr/arch/xtensa/ |
D | thread.h | 41 /* Initial privilege mode stack pointer when doing a system call.
|
/Zephyr-latest/arch/x86/core/ |
D | userspace.c | 25 * the privilege elevation stack. 34 * We don't need to update the privilege mode initial stack pointer either, 35 * privilege elevation always lands on the trampoline stack and the irq/syscall
|
/Zephyr-latest/arch/xtensa/core/ |
D | fatal.c | 58 return "instr fetch privilege"; in xtensa_exccause() 66 return "load/store privilege"; in xtensa_exccause()
|
/Zephyr-latest/doc/security/ |
D | secure-coding.rst | 82 - **Separation of privilege** is the principle that two conditions or 86 - **Least privilege** describes an access model in which each user, 160 - separation of privilege (ideally, access to important objects should 166 - least privilege (processes should operate with the least privilege
|
/Zephyr-latest/include/zephyr/arch/x86/intel64/ |
D | thread.h | 88 /* Privilege mode stack pointer value when doing a system call */ 128 /* Initial privilege mode stack pointer when doing a system call.
|
/Zephyr-latest/include/zephyr/arch/arc/ |
D | arch.h | 159 * the stack object will contain the MPU guard, the privilege stack, and then 183 "improper privilege stack size"); 187 /* Use defaults for everything. The privilege elevation stack is located 208 /* Reserved area of the thread object just contains the privilege stack: 226 "improper privilege stack size");
|
/Zephyr-latest/arch/arm/core/mpu/ |
D | arm_core_mpu.c | 202 * in front of the privilege mode stack, thread->arch.priv_stack_start. in z_arm_configure_dynamic_mpu_regions() 267 * supervisor/privilege mode stack depending on the type of thread in z_arm_configure_dynamic_mpu_regions() 281 /* A K_USER thread has the stack guard protecting the privilege in z_arm_configure_dynamic_mpu_regions() 288 "Guard start: (0x%lx) below privilege stacks boundary: (%p)", in z_arm_configure_dynamic_mpu_regions()
|
/Zephyr-latest/doc/hardware/porting/ |
D | arch.rst | 506 reserved for privilege elevation stacks. 651 This is the case when privilege elevation stacks are not inside the stack 666 * A separate fixed-sized privilege mode stack, specified by 693 contain the privilege mode stack. The layout could be something like: 704 | Privilege elevation stack | 712 * If the thread is a supervisor thread, the privilege elevation region is just 717 before or after it. An overflow in user mode will crash into the privilege 721 On an MMU system there should be no physical guards; the privilege mode stack 730 the size of the reserved region containing platform data, privilege elevation 741 privilege elevation stack must be allocated elsewhere. [all …]
|
/Zephyr-latest/arch/x86/core/ia32/ |
D | userspace.S | 60 /* Switch to privilege mode stack */ 165 /* Switch to privilege elevation stack */ 344 /* Inter-privilege 'iret' pops all of these. Need to fake an interrupt 345 * return to enter user mode as far calls cannot change privilege
|
/Zephyr-latest/arch/arm/core/cortex_a_r/ |
D | thread.c | 206 * longer used here, it instead is moved to the privilege stack in arch_user_mode_enter() 276 * privilege mode (when User Space is supported) is reported upon an 331 /* User thread in privilege mode */ in z_check_thread_stack_fail() 336 /* Thread's privilege stack corruption */ in z_check_thread_stack_fail()
|
/Zephyr-latest/arch/arm/core/cortex_m/ |
D | thread.c | 197 * MPU guard to safely detect privilege thread stack overflows. in z_arm_mpu_stack_guard_and_fpu_adjust() 202 * program a large MPU guard to detect privilege thread in z_arm_mpu_stack_guard_and_fpu_adjust() 239 * longer used here, it instead is moved to the privilege stack in arch_user_mode_enter() 351 * privilege mode (when User Space is supported) is reported upon an 406 /* User thread in privilege mode */ in z_check_thread_stack_fail() 411 /* Thread's privilege stack corruption */ in z_check_thread_stack_fail()
|
/Zephyr-latest/arch/x86/core/intel64/ |
D | userspace.S | 96 /* Switch to the privilege mode stack pointer stored in 101 /* We're now on the privilege mode stack; push the old user stack 286 /* switch to privilege mode stack so we can erase thread stack buffer,
|
/Zephyr-latest/arch/arc/core/ |
D | fault.c | 72 * into the privilege mode stack buffer which in z_check_thread_stack_fail() 78 /* Special case: handling a syscall on privilege stack. in z_check_thread_stack_fail() 223 ARC_EXCEPTION_DUMP("Privilege violation"); in dump_privilege_exception()
|
D | userspace.S | 69 /* start of privilege stack in blink */ 101 /* get start of privilege stack, r6 points to current thread */
|
/Zephyr-latest/boards/arm/mps3/ |
D | mps3_corstone300_an547.dts | 56 privilege-enable;
|
D | mps3_corstone300_an552.dts | 55 privilege-enable;
|
D | mps3_corstone300_fvp.dts | 55 privilege-enable;
|
123