/src/sys/external/bsd/compiler_rt/dist/lib/msan/ |
msan_linux.cc | 61 // Depending on the kernel configuration, we may not be able to protect 70 Printf("FATAL: Cannot protect memory range %p - %p (%s).\n", beg, end, 138 bool protect = type == MappingDesc::INVALID || local in function:__msan::InitShadow 140 CHECK(!(map && protect)); 141 if (!map && !protect) 151 if (protect) {
|
/src/sys/external/isc/atheros_hal/dist/ |
ah_eeprom_v1.c | 115 uint16_t protect, eeprom_version, eeval; local in function:ath_hal_v1EepromAttach 132 if (!ath_hal_eepromRead(ah, AR_EEPROM_PROTECT, &protect)) { 138 HALDEBUG(ah, HAL_DEBUG_ATTACH, "EEPROM protect 0x%x\n", protect); 187 ee->ee_protect = protect;
|
/src/sys/arch/mac68k/mac68k/ |
pramasm.s | 248 movel #0x00d50035,%d1 | we have to set the write protect bit 257 movel #0x00550035,%d1 | de-write-protect the PRAM 268 movel #0x00d50035,%d1 | we have to set the write protect bit 287 bne NoWrit | go around de-write protect logic 288 movel #0x00550035,%d1 | clear write protect bit of PRAM 292 bsr _C_LABEL(Transfer) | and go de-write protect RTC
|
/src/sys/external/bsd/drm2/dist/drm/nouveau/dispnv04/ |
hw.h | 245 static inline void NVVgaProtect(struct drm_device *dev, int head, bool protect) 249 if (protect) { 257 NVSetEnablePalette(dev, head, protect);
|
/src/usr.bin/mail/ |
format.c | 959 * Protect a string against strftime() conversion. 962 protect(const char *str) function in typeref:typename:const char * 994 subj = protect(subjof(mp)); 995 addr = protect(addrof(mp)); 996 user = protect(userof(mp));
|
/src/tests/net/if_bridge/ |
t_bridge.sh | 437 # Protect shmif0 and shmif2 438 atf_check -s exit:0 $HIJACKING brconfig bridge0 protect shmif0 439 atf_check -s exit:0 $HIJACKING brconfig bridge0 protect shmif2 486 atf_check -s exit:0 $HIJACKING brconfig bridge0 -protect shmif2
|
/src/usr.bin/make/unit-tests/ |
varname-empty.mk | 17 # Var_Append, and these places protect the variable named "" from being
|
cmd-interrupt.mk | 13 # To protect the target from being removed, the target has to be marked with
|
/src/sys/arch/sparc64/doc/ |
TODO | 54 (in other words: let's protect the OF context with the lock, not
|
/src/sys/arch/m68k/m68k/ |
busaddrerr.s | 242 btst #3,%d1 | write protect bit set? 245 andw #0xc0,%d0 | write protect is set on page:
|
/src/sys/arch/sun3/sun3x/ |
locore.s | 238 btst #3,%d1 | write protect bit set? 241 andw #0xc0,%d0 | write protect is set on page:
|
/src/sys/external/gpl2/dts/dist/arch/arm/boot/dts/ |
am33xx.dtsi | 488 protect-exec;
|
rk3288-veyron.dtsi | 588 write-protect {
|
exynos5410-odroidxu.dts | 561 /* Pin is floating so be sure to disable write-protect */
|
omap3-pandora-common.dtsi | 514 * Many pandora boards have been produced with defective write-protect switches
|
am4372.dtsi | 690 protect-exec;
|
tegra20-acer-a500-picasso.dts | 1042 * The CPU zone is intended to protect silicon from damage.
|
tegra30-asus-nexus7-grouper-common.dtsi | 1268 * The CPU zone is intended to protect silicon from damage.
|
/src/share/mk/ |
bsd.sys.mk | 187 # GCC 4.8 on m68k erroneously does not protect functions with
|
/src/sys/arch/atari/atari/ |
locore.s | 229 btst #3,%d1 | write protect bit set? 232 andw #0xc0,%d0 | Write protect is set on page:
|
/src/sys/uvm/pmap/ |
pmap.c | 195 PMAP_COUNTER(protect, "protects"); 1319 PMAP_COUNT(protect);
|
/src/sys/external/gpl2/dts/dist/arch/arm64/boot/dts/rockchip/ |
rk3399-gru.dtsi | 824 write-protect {
|
/src/sys/external/gpl2/dts/dist/arch/mips/boot/dts/img/ |
pistachio.dtsi | 628 pin_sdhost_write_protect: sdhost-write-protect {
|
/src/sys/arch/amiga/amiga/ |
locore.s | 244 btst #3,%d1 | write protect bit set? 247 andw #0xc0,%d0 | Write protect is set on page:
|
/src/sys/arch/aarch64/aarch64/ |
pmap.c | 124 PMAP_COUNTER(protect, "pmap_protect call"); 1291 PMAP_COUNT(protect);
|