| /arch/powerpc/include/asm/ |
| A D | kfence.h | 37 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 41 __kernel_map_pages(page, 1, !protect); in kfence_protect_page() 46 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 50 if (protect) { in kfence_protect_page()
|
| /arch/arm64/include/asm/ |
| A D | kfence.h | 15 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 17 set_memory_valid(addr, 1, !protect); in kfence_protect_page()
|
| /arch/s390/include/asm/ |
| A D | kfence.h | 25 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 27 __kernel_map_pages(virt_to_page((void *)addr), 1, !protect); in kfence_protect_page()
|
| /arch/parisc/include/asm/ |
| A D | kfence.h | 22 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 34 if (protect) in kfence_protect_page()
|
| /arch/riscv/include/asm/ |
| A D | kfence.h | 16 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 20 if (protect) in kfence_protect_page()
|
| /arch/x86/include/asm/ |
| A D | kfence.h | 41 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 56 if (protect) in kfence_protect_page()
|
| /arch/arm/include/asm/ |
| A D | kfence.h | 46 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 48 set_memory_valid(addr, 1, !protect); in kfence_protect_page()
|
| /arch/loongarch/include/asm/ |
| A D | kfence.h | 52 static inline bool kfence_protect_page(unsigned long addr, bool protect) in kfence_protect_page() argument 59 if (protect) in kfence_protect_page()
|
| /arch/x86/kernel/ |
| A D | machine_kexec_64.c | 600 kexec_mark_range(unsigned long start, unsigned long end, bool protect) in kexec_mark_range() argument 614 if (protect) in kexec_mark_range() 620 static void kexec_mark_crashkres(bool protect) in kexec_mark_crashkres() argument 624 kexec_mark_range(crashk_low_res.start, crashk_low_res.end, protect); in kexec_mark_crashkres() 628 kexec_mark_range(crashk_res.start, control - 1, protect); in kexec_mark_crashkres() 630 kexec_mark_range(control, crashk_res.end, protect); in kexec_mark_crashkres() 634 static void kexec_mark_dm_crypt_keys(bool protect) in kexec_mark_dm_crypt_keys() argument 643 if (protect) in kexec_mark_dm_crypt_keys()
|
| /arch/s390/kernel/ |
| A D | machine_kexec.c | 152 static void crash_protect_pages(int protect) in crash_protect_pages() argument 159 if (protect) in crash_protect_pages()
|
| /arch/arm/boot/dts/nxp/imx/ |
| A D | imx6qdl-aristainetos2.dtsi | 619 MX6QDL_PAD_DI0_PIN4__GPIO4_IO20 0x1b0b0 /* SD1 write protect input */ 633 MX6QDL_PAD_SD4_DAT2__GPIO2_IO10 0x1b0b0 /* SD2 write protect input */
|
| A D | imx6q-novena.dts | 785 /* Write protect */
|
| /arch/powerpc/boot/dts/ |
| A D | ac14xx.dts | 166 wp-gpios = <&gpio_pic 24 0>; /* write protect */
|
| A D | xpedite5200.dts | 103 * 5: Flash write protect enable
|
| A D | xpedite5200_xmon.dts | 107 * 5: Flash write protect enable
|
| /arch/arm/boot/dts/rockchip/ |
| A D | rk3288-veyron.dtsi | 592 write-protect {
|
| /arch/arm/boot/dts/samsung/ |
| A D | exynos5410-odroidxu.dts | 549 /* Pin is floating so be sure to disable write-protect */
|
| /arch/arm/boot/dts/ti/omap/ |
| A D | omap3-pandora-common.dtsi | 514 * Many pandora boards have been produced with defective write-protect switches
|
| A D | am33xx.dtsi | 499 protect-exec;
|
| A D | am4372.dtsi | 692 protect-exec;
|
| /arch/arm64/boot/dts/qcom/ |
| A D | sc7180-acer-aspire1.dts | 857 * The TZ seem to protect those because some boards can have
|
| /arch/mips/boot/dts/img/ |
| A D | pistachio.dtsi | 628 pin_sdhost_write_protect: sdhost-write-protect {
|
| /arch/arm/mm/ |
| A D | Kconfig | 634 using the DACR (domain access control register) to protect memory 636 and IO. The domains are used to protect userspace from kernelspace
|
| /arch/arm64/boot/dts/rockchip/ |
| A D | rk3399-gru.dtsi | 859 write-protect {
|
| /arch/arm/boot/dts/nvidia/ |
| A D | tegra20-asus-tf101.dts | 1230 * The CPU zone is intended to protect silicon from damage.
|