/openbmc/linux/tools/testing/selftests/powerpc/mm/ |
H A D | pkey_siginfo.c | 97 static void *protect(void *p) in protect() function 119 * Repeatedly try to protect the common region with a permissive in protect() 164 * Repeatedly try to protect the common region with a restrictive in protect_access() 287 * the one from the protect-and-access thread since the other in test() 294 /* Setup barrier for protect and protect-and-access threads */ in test() 298 /* Setup and start protect and protect-and-read threads */ in test() 299 puts("starting thread pair (protect, protect-and-read)"); in test() 301 FAIL_IF(pthread_create(&prot_thread, &attr, &protect, &r) != 0); in test() 306 /* Setup and start protect and protect-and-write threads */ in test() 307 puts("starting thread pair (protect, protect-and-write)"); in test() [all …]
|
/openbmc/u-boot/include/configs/ |
H A D | UCP1020.h | 473 "protect off $nor_recoveryaddr +$filesize; " \ 476 "protect on $nor_recoveryaddr +$filesize\0 " \ 478 "protect off $nor_ubootaddr +$filesize; " \ 481 "protect on $nor_ubootaddr +$filesize\0 " \ 483 "protect off $nor_workingaddr +$filesize; " \ 486 "protect on $nor_workingaddr +$filesize\0 " \ 541 "protect off 0xeC000000 +$filesize; " \ 545 "protect on 0xeC000000 +$filesize\0" \ 547 "protect off 0xeFF80000 +$filesize; " \ 551 "protect on 0xeFF80000 +$filesize\0" \ [all …]
|
H A D | p1_twr.h | 394 "protect off " __stringify(CONFIG_SYS_TEXT_BASE) " +$filesize; " \ 397 "protect on " __stringify(CONFIG_SYS_TEXT_BASE) " +$filesize; " \ 400 "protect off 0xefa80000 +$filesize; " \ 403 "protect on 0xefa80000 +$filesize; " \ 406 "protect off 0xefe80000 +$filesize; " \ 409 "protect on 0xefe80000 +$filesize; " \ 412 "protect off 0xeeb80000 +$filesize; " \ 415 "protect on 0xeeb80000 +$filesize; " \ 418 "protect off 0xefec0000 +$filesize; " \ 421 "protect on 0xefec0000 +$filesize; " \
|
/openbmc/u-boot/cmd/ |
H A D | flash.c | 131 * erase and protect commands. The range of the addresses on which 478 info->protect[i] = p; in do_protect() 502 info->protect[i] = p; in do_protect() 514 /* protect on/off <part-id> */ in do_protect() 564 info->protect[i] = p; in do_protect() 619 info->protect[i] = p; in flash_sect_protect() 643 # define TMP_PROT_ON "protect on <part-id>\n - protect partition\n" 644 # define TMP_PROT_OFF "protect off <part-id>\n - make partition writable\n" 673 protect, 4, 0, do_protect, 676 " - protect FLASH from addr 'start' to addr 'end'\n" [all …]
|
/openbmc/linux/Documentation/misc-devices/ |
H A D | eeprom.rst | 38 Atmel 34C02B 2K 0x50 - 0x57, SW write protect at 0x30-37 39 Catalyst 34FC02 2K 0x50 - 0x57, SW write protect at 0x30-37 40 Catalyst 34RC02 2K 0x50 - 0x57, SW write protect at 0x30-37 41 Fairchild 34W02 2K 0x50 - 0x57, SW write protect at 0x30-37 42 Microchip 24AA52 2K 0x50 - 0x57, SW write protect at 0x30-37 43 ST M34C02 2K 0x50 - 0x57, SW write protect at 0x30-37 78 software write protect register at 0x30 - 0x37 (0x20 less than the memory 82 this address will write protect the memory array permanently, and the
|
/openbmc/u-boot/drivers/pch/ |
H A D | sandbox_pch.c | 11 bool protect; member 18 return priv->protect; in sandbox_get_pch_spi_protect() 28 static int sandbox_pch_set_spi_protect(struct udevice *dev, bool protect) in sandbox_pch_set_spi_protect() argument 32 priv->protect = protect; in sandbox_pch_set_spi_protect()
|
/openbmc/linux/arch/powerpc/include/asm/ |
H A D | kfence.h | 24 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 28 __kernel_map_pages(page, 1, !protect); in kfence_protect_page() 33 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 37 if (protect) { in kfence_protect_page()
|
/openbmc/linux/arch/mips/sgi-ip22/ |
H A D | ip22-nvram.c | 18 #define EEPROM_PRREAD 0xc000 /* read protect register */ 19 #define EEPROM_PREN 0x9800 /* enable protect register mode */ 20 #define EEPROM_PRCLEAR 0xffff /* clear protect register */ 21 #define EEPROM_PRWRITE 0xa000 /* write protect register */ 22 #define EEPROM_PRDS 0x8000 /* disable protect register, forever */ 24 #define EEPROM_EPROT 0x01 /* Protect register enable */
|
/openbmc/u-boot/include/ |
H A D | pch.h | 45 * @protect: true to protect, false to unprotect 49 int (*set_spi_protect)(struct udevice *dev, bool protect); 102 * @protect: true to protect, false to unprotect 106 int pch_set_spi_protect(struct udevice *dev, bool protect);
|
/openbmc/linux/include/soc/at91/ |
H A D | at91sam9_ddrsdr.h | 114 #define AT91_DDRSDRC_WPMR 0xE4 /* Write Protect Mode Register [SAM9 Only] */ 115 #define AT91_DDRSDRC_WP (1 << 0) /* Write protect enable */ 116 #define AT91_DDRSDRC_WPKEY (0xffffff << 8) /* Write protect key */ 117 #define AT91_DDRSDRC_KEY (0x444452 << 8) /* Write protect key = "DDR" */ 119 #define AT91_DDRSDRC_WPSR 0xE8 /* Write Protect Status Register [SAM9 Only] */ 120 #define AT91_DDRSDRC_WPVS (1 << 0) /* Write protect violation status */ 121 #define AT91_DDRSDRC_WPVSRC (0xffff << 8) /* Write protect violation source */
|
/openbmc/linux/drivers/scsi/ |
H A D | pmcraid.h | 666 spinlock_t resource_lock; /* spinlock to protect resource list */ 943 "Data Protect, device is read/write protected by IOA"}, 945 "Data Protect, IOA doesn't support device attribute"}, 947 "Data Protect, NVRAM mirroring prohibited"}, 949 "Data Protect, array is short 2 or more devices"}, 951 "Data Protect, exposed array is short a required device"}, 953 "Data Protect, array members not at required addresses"}, 955 "Data Protect, exposed mode device resource address conflict"}, 957 "Data Protect, incorrect resource address of exposed mode device"}, 959 "Data Protect, Array is missing a device and parity is out of sync"}, [all …]
|
/openbmc/linux/drivers/net/wireless/microchip/wilc1000/ |
H A D | netdev.h | 213 /* protect vif list */ 218 /* protect head of transmit queue */ 221 /* protect txq_entry_t transmit queue */ 224 /* protect rxq_entry_t receiver queue */ 227 /* lock to protect hif access */ 239 /* lock to protect issue of wid command to firmware */
|
/openbmc/linux/arch/parisc/include/asm/ |
H A D | kfence.h | 21 /* Protect the given page and flush TLB. */ 22 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 34 if (protect) in kfence_protect_page()
|
/openbmc/openbmc/meta-ibm/recipes-bsp/u-boot/u-boot-aspeed-sdk/p10bmc/ |
H A D | ibm.json | 52 "Write Protect: Secure Region": true, 53 "Write Protect: User region": true, 54 "Write Protect: Configure region": true, 55 "Write Protect: OTP strap region": true, 58 "Enable write Protect of OTP key retire bits": false,
|
H A D | ips.json | 59 "Write Protect: Secure Region": true, 60 "Write Protect: User region": true, 61 "Write Protect: Configure region": true, 62 "Write Protect: OTP strap region": true, 65 "Enable write Protect of OTP key retire bits": false,
|
/openbmc/u-boot/arch/x86/cpu/intel_common/ |
H A D | lpc.c | 83 int lpc_set_spi_protect(struct udevice *dev, int bios_ctrl, bool protect) in lpc_set_spi_protect() argument 87 /* Adjust the BIOS write protect and SMM BIOS Write Protect Disable */ in lpc_set_spi_protect() 89 if (protect) { in lpc_set_spi_protect()
|
/openbmc/u-boot/arch/arm/dts/ |
H A D | armada-385-atl-x530DP.dts | 12 nand-protect { 13 compatible = "atl,nand-protect"; 14 protect-gpio = <&gpio1 11 GPIO_ACTIVE_HIGH>;
|
H A D | armada-385-atl-x530.dts | 11 nand-protect { 12 compatible = "atl,nand-protect"; 13 protect-gpio = <&gpio1 11 GPIO_ACTIVE_HIGH>;
|
/openbmc/linux/security/ |
H A D | min_addr.c | 7 /* amount of vm to protect from userspace access by both DAC and the LSM*/ 9 /* amount of vm to protect from userspace using CAP_SYS_RAWIO (DAC) */ 11 /* amount of vm to protect from userspace using the LSM = CONFIG_LSM_MMAP_MIN_ADDR */
|
/openbmc/u-boot/arch/arm/mach-at91/arm926ejs/ |
H A D | eflash.c | 23 * Each sector can be hardware protected (protect on/off). 109 flash_info[0].protect[i] = 0; in flash_init() 120 flash_info[0].protect[i] = (tmp >> (i%32)) & 1; in flash_init() 123 flash_info[0].protect[i] = 1; in flash_init() 144 info->protect[i] ? " (RO)" : " " in flash_print_info() 157 debug("protect sector=%ld prot=%d\n", sector, prot); in flash_real_protect() 184 info->protect[i] = (tmp >> (i%32)) & 1; in flash_real_protect()
|
/openbmc/linux/arch/loongarch/include/asm/ |
H A D | kfence.h | 41 /* Protect the given page and flush TLB. */ 42 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 49 if (protect) in kfence_protect_page()
|
/openbmc/u-boot/drivers/rtc/ |
H A D | ds1302.c | 72 unsigned char WP:1; /* write protect 1=protect 0=unprot */ 200 /* disable write protect */ in rtc_init() 234 /* enable write protect */ in rtc_init() 238 /* Else just turn write protect on */ in rtc_init() 301 bbclk.WP=1; /* write protect when we're done */ in rtc_set() 324 write_ser_drv(0x8e,&b,1); /* disable write protect */ in rtc_set()
|
/openbmc/u-boot/arch/arm/mach-at91/include/mach/ |
H A D | at91_matrix.h | 67 u32 womr; /* 0x1E4 Write Protect Mode */ 68 u32 wpsr; /* 0x1E8 Write Protect Status */ 212 /* Write Protect Mode Register */ 215 #define AT91_MATRIX_WPMR_WPKEY 0xFFFFFF00 /* Write Protect KEY */ 216 /* Write Protect Status Register */ 219 #define AT91_MATRIX_WPSR_WPVSRC 0x00FFFF00 /* Write Protect Violation Source */
|
/openbmc/linux/arch/x86/include/asm/ |
H A D | kfence.h | 40 /* Protect the given page and flush TLB. */ 41 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 56 if (protect) in kfence_protect_page()
|
/openbmc/u-boot/common/ |
H A D | flash.c | 47 * or the protect range and flash range don't overlap. in flash_protect() 67 info->protect[i] = 0; in flash_protect() 69 debug ("protect off %d\n", i); in flash_protect() 75 info->protect[i] = 1; in flash_protect() 77 debug ("protect on %d\n", i); in flash_protect() 148 (info->protect[i] != 0) ) { in flash_write()
|