/openbmc/linux/drivers/mtd/spi-nor/ |
H A D | Kconfig | 28 prompt "Software write protection at boot" 34 This option disables the software write protection on any SPI 37 Depending on the flash chip this either clears the block protection 40 Don't use this if you intent to use the software write protection 44 bool "Disable SWP on flashes w/ volatile protection bits" 46 Some SPI flashes have volatile block protection bits, ie. after a 50 This option disables the software write protection for these kind 52 which have non-volatile write protection bits. 54 If the software write protection will be disabled depending on 55 the flash either the block protection bits are cleared or a [all …]
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-extended/dlm/dlm/ |
H A D | 0001-Remove-fcf-protection-full.patch | 4 Subject: [PATCH] Remove -fcf-protection=full 8 | cc1: error: '-fcf-protection=full' is not supported for this target 25 - -fstack-clash-protection -fcf-protection=full 26 + -fstack-clash-protection 36 - -fstack-clash-protection -fcf-protection=full 37 + -fstack-clash-protection 47 - -fstack-clash-protection -fcf-protection=full 48 + -fstack-clash-protection 58 -LIB_CFLAGS += $(CFLAGS) -D_REENTRANT -fcf-protection=full 59 -LLT_CFLAGS += $(CFLAGS) -fcf-protection=full
|
/openbmc/u-boot/arch/arm/include/asm/arch-sunxi/ |
H A D | tzpc.h | 12 u32 decport0_status; /* 0x04 Status of decode protection port 0 */ 13 u32 decport0_set; /* 0x08 Set decode protection port 0 */ 14 u32 decport0_clear; /* 0x0c Clear decode protection port 0 */ 16 u32 decport1_status; /* 0x10 Status of decode protection port 1 */ 17 u32 decport1_set; /* 0x14 Set decode protection port 1 */ 18 u32 decport1_clear; /* 0x18 Clear decode protection port 1 */ 19 u32 decport2_status; /* 0x1c Status of decode protection port 2 */ 20 u32 decport2_set; /* 0x20 Set decode protection port 2 */ 21 u32 decport2_clear; /* 0x24 Clear decode protection port 2 */
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-devices-platform-docg3 | 6 Show whether the floor (0 to 4), protection area (0 or 1) is 7 keylocked. Each docg3 chip (or floor) has 2 protection areas, 9 The protection has information embedded whether it blocks reads, 23 Enter the protection key for the floor (0 to 4), protection area 24 (0 or 1). Each docg3 chip (or floor) has 2 protection areas, 26 The protection has information embedded whether it blocks reads, 28 The protection key is a string of 8 bytes (value 0-255).
|
/openbmc/linux/drivers/platform/x86/ |
H A D | toshiba_haps.c | 3 * Toshiba HDD Active Protection Sensor (HAPS) driver 17 MODULE_DESCRIPTION("Toshiba HDD Active Protection Sensor"); 35 pr_err("Unable to reset the HDD protection\n"); in toshiba_haps_reset_protection() 48 pr_err("Error while setting the protection level\n"); in toshiba_haps_protection_level() 52 pr_debug("HDD protection level set to: %d\n", level); in toshiba_haps_protection_level() 110 /* Reset the protection interface */ in reset_protection_store() 161 pr_err("ACPI call to query HDD protection failed\n"); in toshiba_haps_available() 166 pr_info("HDD protection not available or using SSD\n"); in toshiba_haps_available() 184 pr_info("Toshiba HDD Active Protection Sensor device\n"); in toshiba_haps_add() 195 /* Set the protection level, currently at level 2 (Medium) */ in toshiba_haps_add() [all …]
|
/openbmc/linux/tools/testing/selftests/kvm/s390x/ |
H A D | tprot.c | 3 * Test TEST PROTECTION emulation. 79 * We perform each test in the array by executing TEST PROTECTION on 85 * TEST PROTECTION instruction. 91 * See Enhanced Suppression-on-Protection Facilities in the 97 * protection for it 105 /* mismatched keys, but no fetch protection -> RO */ 111 /* mismatched keys, fetch protection -> inaccessible */ 117 * guest: set storage key of page 0 to 9 and enable fetch protection 120 * enable fetch protection override 122 /* mismatched keys, fetch protection, but override applies -> RO */ [all …]
|
/openbmc/linux/Documentation/admin-guide/laptops/ |
H A D | toshiba_haps.rst | 2 Toshiba HDD Active Protection Sensor 23 laptops, being called "Toshiba HDD Protection - Shock Sensor" officially, 26 automatic HDD protection (head unload) on sudden moves or harsh vibrations, 29 file to set the desired protection level or sensor sensibility. 40 PTLV Sets the desired protection level. 41 RSSS Shuts down the HDD protection interface for a few seconds, 48 any "protection" as well as failing during the evaluation of the _STA method 76 provides a way to let userspace query the current protection 77 level, as well as set the desired protection level, the 78 available protection levels are:: [all …]
|
H A D | disk-shock-protection.rst | 2 Hard disk shock protection 25 a shock protection facility. The idea is to stop all I/O operations on 31 system in order to get disk shock protection working (see 128 protection capabilities. As manufacturers have refused to support open 130 support for shock protection varies considerably between different 133 protection on different systems. Unfortunately, I only know of a 141 active protection system as implemented in IBM/Lenovo Thinkpads.
|
/openbmc/linux/Documentation/devicetree/bindings/regulator/ |
H A D | regulator.yaml | 117 regulator-over-current-protection: 118 description: Enable over current protection. 121 regulator-oc-protection-microamp: 122 description: Set over current protection limit. This is a limit where 124 protection and value '1' indicates that protection should be enabled but 140 regulator-ov-protection-microvolt: 141 description: Set over voltage protection limit. This is a limit where 143 protection and value '1' indicates that protection should be enabled but 162 regulator-uv-protection-microvolt: 163 description: Set over under voltage protection limit. This is a limit where [all …]
|
/openbmc/linux/drivers/soc/mediatek/ |
H A D | mtk-infracfg.c | 17 * mtk_infracfg_set_bus_protection - enable bus protection 19 * @mask: The mask containing the protection bits to be enabled. 20 * @reg_update: The boolean flag determines to set the protection bits 24 * This function enables the bus protection bits for disabled power 48 * mtk_infracfg_clear_bus_protection - disable bus protection 50 * @mask: The mask containing the protection bits to be disabled. 51 * @reg_update: The boolean flag determines to clear the protection bits 55 * This function disables the bus protection bits previously enabled with
|
/openbmc/linux/arch/arm/boot/dts/aspeed/ |
H A D | aspeed-bmc-ibm-sbp1.dts | 1979 regulator-over-current-protection; 1980 regulator-oc-protection-microamp = <2800000>; 2020 regulator-over-current-protection; 2021 regulator-oc-protection-microamp = <2800000>; 3644 regulator-over-current-protection; 3645 regulator-oc-protection-microamp = <3400000>; 3651 regulator-over-current-protection; 3652 regulator-oc-protection-microamp = <3400000>; 4152 regulator-over-current-protection; 4153 regulator-oc-protection-microamp = <3400000>; [all …]
|
/openbmc/linux/Documentation/block/ |
H A D | data-integrity.rst | 16 protocols (SBC Data Integrity Field, SCC protection proposal) as well 17 as SATA/T13 (External Path Protection) try to remedy this by adding 19 metadata (or protection information in SCSI terminology) includes a 22 for some protection schemes also that the I/O is written to the right 29 DIF and the other integrity extensions is that the protection format 42 the protection information to be transferred to and from their 45 The SCSI Data Integrity Field works by appending 8 bytes of protection 85 The data integrity framework in Linux enables protection information 92 disadvantage. It means that the protection information must be in a 101 protection information to send to a disk. Consequently, the very [all …]
|
/openbmc/linux/Documentation/core-api/ |
H A D | protection-keys.rst | 4 Memory Protection Keys 7 Memory Protection Keys provide a mechanism for enforcing page-based 9 application changes protection domains. 17 a "protection key", giving 16 possible keys. 74 The kernel attempts to make protection keys consistent with the 80 you can expect the same effects with protection keys when doing this:: 97 to SEGV_PKERR when violating protection keys versus SEGV_ACCERR when
|
/openbmc/linux/drivers/accel/habanalabs/common/ |
H A D | security.h | 63 * of IP block which has protection bits. 66 * @prot_map: each bit corresponds to one among 32 protection configuration regs 68 * to be written into the corresponding protection configuration reg. 70 * @data_map: each bit corresponds to one among 32 protection configuration regs 71 * (e.g., SPECIAL_GLBL_PRIV). '1' means corresponding protection 75 * to corresponding protection configuration reg(s). 79 * protection configuration registers e.g., SPECIAL GLBL PRIV regs (starting at 80 * offset 0xE80). '1' in 'data_map' means protection configuration to be done 81 * using configuration in data array. '0' in 'data_map" means protection
|
/openbmc/linux/tools/testing/selftests/cgroup/ |
H A D | memcg_protection.m | 5 % This script simulates reclaim protection behavior on a single level of memcg 6 % hierarchy to illustrate how overcommitted protection spreads among siblings 15 % E number parent effective protection 16 % n vector nominal protection of siblings set at the given level (memory.low) 54 % recursive protection 65 % commit 1bc63fb1272b ("mm, memcg: make scan aggression always exclude protection")
|
/openbmc/linux/drivers/mtd/maps/ |
H A D | physmap-versatile.c | 65 * Flash protection handling for the Integrator/AP 100 /* Clear VPP and write protection bits */ in ap_flash_init() 142 * Flash protection handling for the Integrator/CP 172 * Flash protection handling for the Versatiles and RealViews 197 /* Not all flash chips use this protection line */ in of_flash_probe_versatile() 224 dev_info(&pdev->dev, "Integrator/AP flash protection\n"); in of_flash_probe_versatile() 228 dev_info(&pdev->dev, "Integrator/CP flash protection\n"); in of_flash_probe_versatile() 233 dev_info(&pdev->dev, "versatile/realview flash protection\n"); in of_flash_probe_versatile()
|
/openbmc/linux/drivers/net/wireless/intel/iwlwifi/fw/api/ |
H A D | time-event.h | 339 * enum iwl_mvm_session_prot_conf_id - session protection's configurations 340 * @SESSION_PROTECT_CONF_ASSOC: Start a session protection for association. 356 * Only the duration is configurable for this protection. 377 * struct iwl_mvm_session_prot_cmd - configure a session protection 378 * @id_and_color: the id and color of the mac for which this session protection 383 * @duration_tu: the duration of the whole protection in TUs. 387 * Note: the session protection will always be scheduled to start as 389 * The firmware supports only one concurrent session protection per vif. 390 * Adding a new session protection will remove any currently running session. 403 * struct iwl_mvm_session_prot_notif - session protection started / ended [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/mfd/ |
H A D | as3711.txt | 30 and one of these to select the over-voltage protection pin 31 - su2-fbprot-lx-sd4 : LX_SD4 is used for over-voltage protection 32 - su2-fbprot-gpio2 : GPIO2 is used for over-voltage protection 33 - su2-fbprot-gpio3 : GPIO3 is used for over-voltage protection 34 - su2-fbprot-gpio4 : GPIO4 is used for over-voltage protection
|
H A D | dlg,da9063.yaml | 15 Using regulator-{uv,ov}-{warn,error,protection}-microvolt requires special 132 regulator-uv-protection-microvolt = <0>; 133 regulator-ov-protection-microvolt = <0>; 139 regulator-uv-protection-microvolt = <1>; 140 regulator-ov-protection-microvolt = <1>;
|
H A D | st,stpmic1.yaml | 127 regulator-over-current-protection: true 149 regulator-over-current-protection: true 188 regulator-over-current-protection: true 214 regulator-over-current-protection: true 239 regulator-over-current-protection: true 255 regulator-over-current-protection: true 334 regulator-over-current-protection;
|
/openbmc/linux/drivers/gpu/drm/display/ |
H A D | drm_hdcp_helper.c | 326 * drm_connector_attach_content_protection_property - attach content protection in DRM_ENUM_NAME_FN() 332 * This is used to add support for content protection on select connectors. in DRM_ENUM_NAME_FN() 333 * Content Protection is intentionally vague to allow for different underlying in DRM_ENUM_NAME_FN() 346 * The content protection will be set to &drm_connector_state.content_protection in DRM_ENUM_NAME_FN() 348 * When kernel triggered content protection state change like DESIRED->ENABLED in DRM_ENUM_NAME_FN() 350 * the content protection state of a connector. in DRM_ENUM_NAME_FN() 363 prop = drm_property_create_enum(dev, 0, "Content Protection", in DRM_ENUM_NAME_FN() 394 * drm_hdcp_update_content_protection - Updates the content protection state 397 * @connector: drm_connector on which content protection state needs an update 398 * @val: New state of the content protection property [all …]
|
/openbmc/linux/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | time-event.h | 62 * iwl_mvm_protect_session - start / extend the session protection. 72 * This function can be used to start a session protection which means that the 85 * iwl_mvm_stop_session_protection - cancel the session protection. 89 * This functions cancels the session protection which is an act of good 195 * iwl_mvm_schedule_session_protection - schedule a session protection 197 * @vif: the virtual interface for which the protection issued 198 * @duration: the duration of the protection 199 * @wait_for_notif: if true, will block until the start of the protection
|
/openbmc/linux/include/dt-bindings/dma/ |
H A D | dw-dmac.h | 7 * Protection Control bits provide protection against illegal transactions. 8 * The protection bits[0:2] are one-to-one mapped to AHB HPROT[3:1] signals.
|
/openbmc/linux/drivers/mtd/chips/ |
H A D | Kconfig | 156 bool "Protection Registers aka one-time programmable (OTP) bits" 161 "Protection Registers" present on some flash chips. 165 The user-programmable Protection Registers contain one-time 167 erased. Each Protection Register can be accessed multiple times to 170 Each Protection Register has an associated Lock Register bit. When a 171 Lock Register bit is programmed, the associated Protection Register 174 Lock Register bits cannot be erased. Therefore, when a Protection
|
/openbmc/linux/Documentation/ABI/removed/ |
H A D | sysfs-selinux-checkreqprot | 11 to check the protection requested by userspace for mmap/mprotect 12 calls instead of the actual protection applied by the kernel. 18 actual protection), and Android and Linux distributions have been
|