Searched full:privileged (Results 1 – 25 of 96) sorted by relevance
1234
/Zephyr-latest/doc/kernel/usermode/ |
D | mpu_userspace.rst | 8 defined in the system. The privileged stacks are created as a part of the 12 ELF file and finds all of the thread stack objects. A set of privileged 16 During the process of dropping a thread to user mode, the privileged stack 23 to privileged mode, the stack is switched to use the privileged stack, and the
|
/Zephyr-latest/arch/arm/core/ |
D | userspace.S | 38 * This function is the entry point to user mode from privileged execution. 50 /* prepare to set stack to privileged stack */ 85 /* set stack to privileged stack 90 * The operation is safe since, by design, the privileged stack is 97 /* At this point the privileged stack is not yet protected by PSPLIM. 98 * Since we have just switched to the top of the privileged stack, we 127 * this function immediately after we have switched to the privileged stack 158 /* clear the user stack area to clean out privileged data */ 205 * memory area compared to the privileged stack. 208 * would re-configure PSPLIM to guard the privileged stack; we enforce [all …]
|
/Zephyr-latest/soc/litex/litex_vexriscv/ |
D | CMakeLists.txt | 8 ${ZEPHYR_BASE}/soc/common/riscv-privileged/soc_irq.S 9 ${ZEPHYR_BASE}/soc/common/riscv-privileged/vector.S
|
/Zephyr-latest/include/zephyr/arch/arm/mpu/ |
D | arm_mpu_v7m.h | 17 /* Privileged No Access, Unprivileged No Access */ 20 /* Privileged No Access, Unprivileged No Access */ 23 /* Privileged Read Write, Unprivileged No Access */ 26 /* Privileged Read Write, Unprivileged Read Only */ 29 /* Privileged Read Write, Unprivileged Read Write */ 32 /* Privileged Read Write, Unprivileged Read Write */ 35 /* Privileged Read Only, Unprivileged No Access */ 38 /* Privileged Read Only, Unprivileged Read Only */ 41 /* Privileged Read Only, Unprivileged Read Only */
|
D | arm_mpu_v8.h | 38 /* Privileged No Access, Unprivileged No Access */ 41 /* Privileged No Access, Unprivileged No Access */ 44 /* Privileged Read Write, Unprivileged No Access */ 47 /* Privileged Read Write, Unprivileged Read Only */ 50 /* Privileged Read Write, Unprivileged Read Write */ 53 /* Privileged Read Write, Unprivileged Read Write */ 56 /* Privileged Read Only, Unprivileged No Access */ 59 /* Privileged Read Only, Unprivileged Read Only */ 62 /* Privileged Read Only, Unprivileged Read Only */ 218 /* Note that the access permissions allow for un-privileged writes, contrary [all …]
|
/Zephyr-latest/dts/bindings/arm/ |
D | arm,ethos-u.yaml | 32 description: Configure Ethos-U NPU to operate in privileged- or non-privileged mode
|
/Zephyr-latest/drivers/serial/ |
D | Kconfig.xen | 25 privileged domain (Dom0) or for Zephyr DomU in Dom0less 27 privileged domain. Thus, there is no console daemon and Xen
|
/Zephyr-latest/soc/common/ |
D | CMakeLists.txt | 4 add_subdirectory_ifdef(CONFIG_RISCV_PRIVILEGED riscv-privileged)
|
D | Kconfig | 6 rsource "riscv-privileged/Kconfig"
|
/Zephyr-latest/soc/common/riscv-privileged/ |
D | Kconfig | 1 # Configuration options for riscv SOCs supporting the riscv privileged
|
/Zephyr-latest/dts/bindings/timer/ |
D | lowrisc,machine-timer.yaml | 7 The OpenTitan machine timer provides RISC-V privileged mtime and mtimecmp
|
D | neorv32-machine-timer.yaml | 7 The NEORV32 machine timer provides RISC-V privileged mtime and mtimecmp
|
D | niosv-machine-timer.yaml | 7 The NIOSV machine timer provides RISC-V privileged mtime and mtimecmp
|
D | telink,machine-timer.yaml | 7 The Telink machine timer provides RISC-V privileged mtime and mtimecmp
|
D | andestech,machine-timer.yaml | 7 The Andes machine timer provides RISC-V privileged mtime and mtimecmp
|
/Zephyr-latest/arch/arm/include/cortex_m/ |
D | cmse.h | 45 * - the function is called from privileged mode 68 * mode is privileged or unprivileged. 88 * mode is privileged or unprivileged. 110 * mode is privileged or unprivileged. 132 * mode is privileged or unprivileged. 299 * mode is privileged or unprivileged. 319 * mode is privileged or unprivileged. 341 * mode is privileged or unprivileged. 364 * mode is privileged or unprivileged.
|
/Zephyr-latest/include/zephyr/debug/ |
D | thread_analyzer.h | 44 /** Total size of privileged stack */ 47 /** Privileged stack size in used */
|
/Zephyr-latest/include/zephyr/arch/arm64/cortex_r/ |
D | arm_mpu.h | 39 /* Privileged Read Write, Unprivileged No Access */ 42 /* Privileged Read Write, Unprivileged Read Write */ 45 /* Privileged Read Only, Unprivileged No Access */ 48 /* Privileged Read Only, Unprivileged Read Only */ 176 /* Note that the access permissions allow for un-privileged writes
|
/Zephyr-latest/include/zephyr/arch/riscv/riscv-privileged/ |
D | asm_inline.h | 17 #include <zephyr/arch/riscv/riscv-privileged/asm_inline_gcc.h>
|
/Zephyr-latest/arch/arm/include/cortex_a_r/ |
D | tcm.h | 33 * This function shall only be called in Privileged mode.
|
/Zephyr-latest/arch/arm64/core/xen/ |
D | Kconfig | 20 Built binary will be used as Xen privileged domain (Domain 0).
|
/Zephyr-latest/arch/arm64/core/ |
D | thread.c | 25 * running in a privileged stack that is their own. 30 * privileged portion of the user stack without touching SP_EL0. This portion 65 * E | ESF | | Privileged portion of the stack 169 /* Top of the privileged non-user-accessible part of the stack */ in arch_user_mode_enter()
|
/Zephyr-latest/soc/ite/ec/common/ |
D | soc_irq.S | 9 * privileged architecture specification
|
D | soc_common_irq.c | 10 privileged architecture specification
|
/Zephyr-latest/samples/userspace/hello_world_user/src/ |
D | main.c | 21 k_is_user_context() ? "UserSpace!" : "privileged mode.", in user_function()
|
1234