Lines Matching full:privileged
38 * This function is the entry point to user mode from privileged execution.
50 /* prepare to set stack to privileged stack */
85 /* set stack to privileged stack
90 * The operation is safe since, by design, the privileged stack is
97 /* At this point the privileged stack is not yet protected by PSPLIM.
98 * Since we have just switched to the top of the privileged stack, we
127 * this function immediately after we have switched to the privileged stack
158 /* clear the user stack area to clean out privileged data */
205 * memory area compared to the privileged stack.
208 * would re-configure PSPLIM to guard the privileged stack; we enforce
211 * Between PSPLIM update and PSP switch, the privileged stack will be
212 * left un-guarded; this is safe, as long as the privileged stack is
311 * 2) Configuring privileged stack and loading up stack arguments
319 * The function is executing in privileged mode. This implies that we
336 /* setup privileged stack */
355 /* setup privileged stack */
367 * The SVC handler has already switched to the privileged stack.
377 /* switch to privileged stack */
382 * We do not need to lock IRQs after switching PSP to the privileged stack;
385 * privileged stack we are safe, as long as the stack can accommodate
390 /* Set stack pointer limit (needed in privileged mode) */
411 /* fixup stack frame on the privileged stack, adding ssf */
421 /* push ssf to privileged stack */
458 /* fixup stack frame on the privileged stack, adding ssf */
489 * memory area compared to the privileged stack.
492 * would re-configure PSPLIM to guard the privileged stack; we enforce
495 * Between PSPLIM update and PSP switch, the privileged stack will be
496 * left un-guarded; this is safe, as long as the privileged stack is