Home
last modified time | relevance | path

Searched full:protect (Results 1 – 25 of 2182) sorted by relevance

12345678910>>...88

/openbmc/linux/tools/testing/selftests/powerpc/mm/
H A Dpkey_siginfo.c97 static void *protect(void *p) in protect() function
119 * Repeatedly try to protect the common region with a permissive in protect()
164 * Repeatedly try to protect the common region with a restrictive in protect_access()
287 * the one from the protect-and-access thread since the other in test()
294 /* Setup barrier for protect and protect-and-access threads */ in test()
298 /* Setup and start protect and protect-and-read threads */ in test()
299 puts("starting thread pair (protect, protect-and-read)"); in test()
301 FAIL_IF(pthread_create(&prot_thread, &attr, &protect, &r) != 0); in test()
306 /* Setup and start protect and protect-and-write threads */ in test()
307 puts("starting thread pair (protect, protect-and-write)"); in test()
[all …]
/openbmc/u-boot/include/configs/
H A DUCP1020.h473 "protect off $nor_recoveryaddr +$filesize; " \
476 "protect on $nor_recoveryaddr +$filesize\0 " \
478 "protect off $nor_ubootaddr +$filesize; " \
481 "protect on $nor_ubootaddr +$filesize\0 " \
483 "protect off $nor_workingaddr +$filesize; " \
486 "protect on $nor_workingaddr +$filesize\0 " \
541 "protect off 0xeC000000 +$filesize; " \
545 "protect on 0xeC000000 +$filesize\0" \
547 "protect off 0xeFF80000 +$filesize; " \
551 "protect on 0xeFF80000 +$filesize\0" \
[all …]
H A Dp1_twr.h394 "protect off " __stringify(CONFIG_SYS_TEXT_BASE) " +$filesize; " \
397 "protect on " __stringify(CONFIG_SYS_TEXT_BASE) " +$filesize; " \
400 "protect off 0xefa80000 +$filesize; " \
403 "protect on 0xefa80000 +$filesize; " \
406 "protect off 0xefe80000 +$filesize; " \
409 "protect on 0xefe80000 +$filesize; " \
412 "protect off 0xeeb80000 +$filesize; " \
415 "protect on 0xeeb80000 +$filesize; " \
418 "protect off 0xefec0000 +$filesize; " \
421 "protect on 0xefec0000 +$filesize; " \
/openbmc/u-boot/cmd/
H A Dflash.c131 * erase and protect commands. The range of the addresses on which
478 info->protect[i] = p; in do_protect()
502 info->protect[i] = p; in do_protect()
514 /* protect on/off <part-id> */ in do_protect()
564 info->protect[i] = p; in do_protect()
619 info->protect[i] = p; in flash_sect_protect()
643 # define TMP_PROT_ON "protect on <part-id>\n - protect partition\n"
644 # define TMP_PROT_OFF "protect off <part-id>\n - make partition writable\n"
673 protect, 4, 0, do_protect,
676 " - protect FLASH from addr 'start' to addr 'end'\n"
[all …]
/openbmc/linux/Documentation/misc-devices/
H A Deeprom.rst38 Atmel 34C02B 2K 0x50 - 0x57, SW write protect at 0x30-37
39 Catalyst 34FC02 2K 0x50 - 0x57, SW write protect at 0x30-37
40 Catalyst 34RC02 2K 0x50 - 0x57, SW write protect at 0x30-37
41 Fairchild 34W02 2K 0x50 - 0x57, SW write protect at 0x30-37
42 Microchip 24AA52 2K 0x50 - 0x57, SW write protect at 0x30-37
43 ST M34C02 2K 0x50 - 0x57, SW write protect at 0x30-37
78 software write protect register at 0x30 - 0x37 (0x20 less than the memory
82 this address will write protect the memory array permanently, and the
/openbmc/u-boot/drivers/pch/
H A Dsandbox_pch.c11 bool protect; member
18 return priv->protect; in sandbox_get_pch_spi_protect()
28 static int sandbox_pch_set_spi_protect(struct udevice *dev, bool protect) in sandbox_pch_set_spi_protect() argument
32 priv->protect = protect; in sandbox_pch_set_spi_protect()
/openbmc/linux/arch/powerpc/include/asm/
H A Dkfence.h24 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument
28 __kernel_map_pages(page, 1, !protect); in kfence_protect_page()
33 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument
37 if (protect) { in kfence_protect_page()
/openbmc/linux/arch/mips/sgi-ip22/
H A Dip22-nvram.c18 #define EEPROM_PRREAD 0xc000 /* read protect register */
19 #define EEPROM_PREN 0x9800 /* enable protect register mode */
20 #define EEPROM_PRCLEAR 0xffff /* clear protect register */
21 #define EEPROM_PRWRITE 0xa000 /* write protect register */
22 #define EEPROM_PRDS 0x8000 /* disable protect register, forever */
24 #define EEPROM_EPROT 0x01 /* Protect register enable */
/openbmc/u-boot/include/
H A Dpch.h45 * @protect: true to protect, false to unprotect
49 int (*set_spi_protect)(struct udevice *dev, bool protect);
102 * @protect: true to protect, false to unprotect
106 int pch_set_spi_protect(struct udevice *dev, bool protect);
/openbmc/linux/include/soc/at91/
H A Dat91sam9_ddrsdr.h114 #define AT91_DDRSDRC_WPMR 0xE4 /* Write Protect Mode Register [SAM9 Only] */
115 #define AT91_DDRSDRC_WP (1 << 0) /* Write protect enable */
116 #define AT91_DDRSDRC_WPKEY (0xffffff << 8) /* Write protect key */
117 #define AT91_DDRSDRC_KEY (0x444452 << 8) /* Write protect key = "DDR" */
119 #define AT91_DDRSDRC_WPSR 0xE8 /* Write Protect Status Register [SAM9 Only] */
120 #define AT91_DDRSDRC_WPVS (1 << 0) /* Write protect violation status */
121 #define AT91_DDRSDRC_WPVSRC (0xffff << 8) /* Write protect violation source */
/openbmc/linux/drivers/scsi/
H A Dpmcraid.h666 spinlock_t resource_lock; /* spinlock to protect resource list */
943 "Data Protect, device is read/write protected by IOA"},
945 "Data Protect, IOA doesn't support device attribute"},
947 "Data Protect, NVRAM mirroring prohibited"},
949 "Data Protect, array is short 2 or more devices"},
951 "Data Protect, exposed array is short a required device"},
953 "Data Protect, array members not at required addresses"},
955 "Data Protect, exposed mode device resource address conflict"},
957 "Data Protect, incorrect resource address of exposed mode device"},
959 "Data Protect, Array is missing a device and parity is out of sync"},
[all …]
/openbmc/linux/drivers/net/wireless/microchip/wilc1000/
H A Dnetdev.h213 /* protect vif list */
218 /* protect head of transmit queue */
221 /* protect txq_entry_t transmit queue */
224 /* protect rxq_entry_t receiver queue */
227 /* lock to protect hif access */
239 /* lock to protect issue of wid command to firmware */
/openbmc/linux/arch/parisc/include/asm/
H A Dkfence.h21 /* Protect the given page and flush TLB. */
22 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument
34 if (protect) in kfence_protect_page()
/openbmc/openbmc/meta-ibm/recipes-bsp/u-boot/u-boot-aspeed-sdk/p10bmc/
H A Dibm.json52 "Write Protect: Secure Region": true,
53 "Write Protect: User region": true,
54 "Write Protect: Configure region": true,
55 "Write Protect: OTP strap region": true,
58 "Enable write Protect of OTP key retire bits": false,
H A Dips.json59 "Write Protect: Secure Region": true,
60 "Write Protect: User region": true,
61 "Write Protect: Configure region": true,
62 "Write Protect: OTP strap region": true,
65 "Enable write Protect of OTP key retire bits": false,
/openbmc/u-boot/arch/x86/cpu/intel_common/
H A Dlpc.c83 int lpc_set_spi_protect(struct udevice *dev, int bios_ctrl, bool protect) in lpc_set_spi_protect() argument
87 /* Adjust the BIOS write protect and SMM BIOS Write Protect Disable */ in lpc_set_spi_protect()
89 if (protect) { in lpc_set_spi_protect()
/openbmc/u-boot/arch/arm/dts/
H A Darmada-385-atl-x530DP.dts12 nand-protect {
13 compatible = "atl,nand-protect";
14 protect-gpio = <&gpio1 11 GPIO_ACTIVE_HIGH>;
H A Darmada-385-atl-x530.dts11 nand-protect {
12 compatible = "atl,nand-protect";
13 protect-gpio = <&gpio1 11 GPIO_ACTIVE_HIGH>;
/openbmc/linux/security/
H A Dmin_addr.c7 /* amount of vm to protect from userspace access by both DAC and the LSM*/
9 /* amount of vm to protect from userspace using CAP_SYS_RAWIO (DAC) */
11 /* amount of vm to protect from userspace using the LSM = CONFIG_LSM_MMAP_MIN_ADDR */
/openbmc/u-boot/arch/arm/mach-at91/arm926ejs/
H A Deflash.c23 * Each sector can be hardware protected (protect on/off).
109 flash_info[0].protect[i] = 0; in flash_init()
120 flash_info[0].protect[i] = (tmp >> (i%32)) & 1; in flash_init()
123 flash_info[0].protect[i] = 1; in flash_init()
144 info->protect[i] ? " (RO)" : " " in flash_print_info()
157 debug("protect sector=%ld prot=%d\n", sector, prot); in flash_real_protect()
184 info->protect[i] = (tmp >> (i%32)) & 1; in flash_real_protect()
/openbmc/linux/arch/loongarch/include/asm/
H A Dkfence.h41 /* Protect the given page and flush TLB. */
42 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument
49 if (protect) in kfence_protect_page()
/openbmc/u-boot/drivers/rtc/
H A Dds1302.c72 unsigned char WP:1; /* write protect 1=protect 0=unprot */
200 /* disable write protect */ in rtc_init()
234 /* enable write protect */ in rtc_init()
238 /* Else just turn write protect on */ in rtc_init()
301 bbclk.WP=1; /* write protect when we're done */ in rtc_set()
324 write_ser_drv(0x8e,&b,1); /* disable write protect */ in rtc_set()
/openbmc/u-boot/arch/arm/mach-at91/include/mach/
H A Dat91_matrix.h67 u32 womr; /* 0x1E4 Write Protect Mode */
68 u32 wpsr; /* 0x1E8 Write Protect Status */
212 /* Write Protect Mode Register */
215 #define AT91_MATRIX_WPMR_WPKEY 0xFFFFFF00 /* Write Protect KEY */
216 /* Write Protect Status Register */
219 #define AT91_MATRIX_WPSR_WPVSRC 0x00FFFF00 /* Write Protect Violation Source */
/openbmc/linux/arch/x86/include/asm/
H A Dkfence.h40 /* Protect the given page and flush TLB. */
41 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument
56 if (protect) in kfence_protect_page()
/openbmc/u-boot/common/
H A Dflash.c47 * or the protect range and flash range don't overlap. in flash_protect()
67 info->protect[i] = 0; in flash_protect()
69 debug ("protect off %d\n", i); in flash_protect()
75 info->protect[i] = 1; in flash_protect()
77 debug ("protect on %d\n", i); in flash_protect()
148 (info->protect[i] != 0) ) { in flash_write()

12345678910>>...88