/freebsd/usr.bin/protect/ |
H A D | protect.1 | 30 .Nm protect 31 .Nd "protect processes from being killed when swap space is exhausted" 82 .Dl "pgrep Xorg | xargs protect -p" 84 Protect all ssh sessions and their child processes: 86 .Dl "pgrep sshd | xargs protect -dip" 90 .Dl "protect -cdi -p 1" 94 to check if the protect flag has been applied to the process: 115 .It "protect: procctl: Operation not permitted" 118 command does not have the required permissions to protect selected processes. 136 If you protect a runaway process that allocates all memory the system will
|
/freebsd/crypto/openssl/providers/common/ |
H A D | securitycheck.c | 26 * Set protect = 1 for encryption or signing operations, or 0 otherwise. See 31 int protect = 0; in ossl_rsa_check_key() local 35 protect = 1; in ossl_rsa_check_key() 41 protect = 1; in ossl_rsa_check_key() 64 if (protect ? (sz < 2048) : (sz < 1024)) { in ossl_rsa_check_key() 71 /* make protect used */ in ossl_rsa_check_key() 72 (void)protect; in ossl_rsa_check_key() 80 * protect should be 1 for any operations that need 112 bits of security 92 int ossl_ec_check_key(OSSL_LIB_CTX *ctx, const EC_KEY *ec, int protect) in ossl_ec_check_key() argument 133 if (protect && strength < 112) { in ossl_ec_check_key()
|
/freebsd/contrib/llvm-project/llvm/lib/Support/Unix/ |
H A D | Memory.inc | 98 int Protect = getPosixProtectionFlags(PFlags); 101 Protect |= PROT_MPROTECT(PROT_READ | PROT_WRITE | PROT_EXEC); 116 Protect, MMFlags, fd, 0); 173 int Protect = getPosixProtectionFlags(Flags); 186 if (InvalidateCache && !(Protect & PROT_READ)) { 187 int Result = ::mprotect((void *)Start, End - Start, Protect | PROT_READ); 196 int Result = ::mprotect((void *)Start, End - Start, Protect);
|
/freebsd/sys/contrib/device-tree/Bindings/sound/ |
H A D | qcom,msm8916-wcd-analog.txt | 15 "cdc_spk_ocp_int" - Speaker over current protect interrupt. 21 "cdc_ear_ocp_int" - Earphone over current protect interrupt. 22 "cdc_hphr_ocp_int" - Headphone R over current protect interrupt. 23 "cdc_hphl_ocp_det" - Headphone L over current protect interrupt.
|
/freebsd/libexec/rc/tests/ |
H A D | rc_subr_test.sh | 33 atf_set "require.user" "root" # For protect(1). 39 atf_skip "protect(1) cannot be used in a jail" 74 atf_set "require.user" "root" # For protect(1). 80 atf_skip "protect(1) cannot be used in a jail"
|
/freebsd/contrib/llvm-project/compiler-rt/lib/msan/ |
H A D | msan_linux.cpp | 66 // Depending on the kernel configuration, we may not be able to protect in ProtectMemoryRange() 76 "FATAL: MemorySanitizer: Cannot protect memory range %p-%p (%s).\n", in ProtectMemoryRange() 145 bool protect = type == MappingDesc::INVALID || in InitShadow() local 147 CHECK(!(map && protect)); in InitShadow() 148 if (!map && !protect) { in InitShadow() 164 if (protect) { in InitShadow() 199 // The earlier dry run didn't actually map or protect anything. Run again in in InitShadowWithReExec()
|
/freebsd/sys/contrib/openzfs/module/lua/ |
H A D | lvm.c | 85 ci->func = L->top - 1; /* protect stack below results */ in traceexec() 571 #define Protect(x) { {x;} base = ci->u.l.base; } macro 574 Protect( luaC_condGC(L,{L->top = (c); /* limit of live values */ \ 587 else { Protect(luaV_arith(L, ra, rb, rc, tm)); } } 610 Protect(traceexec(L)); in luaV_execute() 646 Protect(luaV_gettable(L, cl->upvals[b]->v, RKC(i), ra)); in luaV_execute() 649 Protect(luaV_gettable(L, RB(i), RKC(i), ra)); in luaV_execute() 653 Protect(luaV_settable(L, cl->upvals[a]->v, RKB(i), RKC(i))); in luaV_execute() 661 Protect(luaV_settable(L, ra, RKB(i), RKC(i))); in luaV_execute() 675 Protect(luaV_gettable(L, rb, RKC(i), ra)); in luaV_execute() [all …]
|
/freebsd/sys/ofed/include/rdma/ |
H A D | rdma_vt.h | 70 spinlock_t lock; /* protect changes in this struct */ 367 spinlock_t n_pds_lock; /* Protect pd allocated count */ 370 spinlock_t n_ahs_lock; /* Protect ah allocated count */ 373 spinlock_t n_srqs_lock; /* Protect srqs allocated count */ 383 spinlock_t n_qps_lock; /* protect qps, rc qps and busy jiffy counts */ 387 spinlock_t mmap_offset_lock; /* protect mmap_offset */ 389 spinlock_t pending_lock; /* protect pending mmap list */ 394 spinlock_t n_cqs_lock; /* protect count of in use cqs */
|
/freebsd/sys/contrib/device-tree/Bindings/mmc/ |
H A D | mmc-controller.yaml | 74 The Write Protect line polarity is inverted. 107 When set, no physical write-protect line is present. This 109 dedicated write-protect detection logic. If a GPIO is always used 110 for the write-protect detection logic, it is sufficient to not 111 specify the wp-gpios property in the absence of a write-protect 117 GPIO to use for the write-protect detection.
|
/freebsd/sys/dev/ath/ath_hal/ |
H A D | ah_eeprom_v3.h | 28 #define AR_EEPROM_PROTECT 0x3f /* EEPROM protect bits */ 29 #define AR_EEPROM_PROTECT_PCIE 0x01 /* EEPROM protect bits for Condor/Swan*/ 103 /* Protect Bits RP is read protect, WP is write protect */ 339 uint16_t ee_protect; /* EEPROM protect field */
|
H A D | ah_eeprom_v1.c | 115 uint16_t protect, eeprom_version, eeval; in ath_hal_v1EepromAttach() local 132 if (!ath_hal_eepromRead(ah, AR_EEPROM_PROTECT, &protect)) { in ath_hal_v1EepromAttach() 138 HALDEBUG(ah, HAL_DEBUG_ATTACH, "EEPROM protect 0x%x\n", protect); in ath_hal_v1EepromAttach() 187 ee->ee_protect = protect; in ath_hal_v1EepromAttach()
|
/freebsd/share/man/man9/ |
H A D | dpcpu.9 | 107 For example, it may be desirable to protect access using 126 * Protect with a critical section, which prevents preemption 138 * Protect with a per-CPU mutex, tolerating migration, but
|
/freebsd/sys/dev/irdma/ |
H A D | irdma_main.h | 193 spinlock_t req_lock; /* protect CQP request list */ 194 spinlock_t compl_lock; /* protect CQP completion processing */ 340 spinlock_t arp_lock; /*protect ARP table access*/ 341 spinlock_t rsrc_lock; /* protect HW resource array access */ 342 spinlock_t qptable_lock; /*protect QP table access*/ 343 spinlock_t cqtable_lock; /*protect CQ table access*/ 346 spinlock_t qh_list_lock; /* protect mc_qht_list */
|
H A D | irdma_verbs.h | 53 spinlock_t cq_reg_mem_list_lock; /* protect CQ memory list */ 55 spinlock_t qp_reg_mem_list_lock; /* protect QP memory list */ 58 struct mutex vma_list_mutex; /* protect the vma_list */ 241 spinlock_t dwork_flush_lock; /* protect mod_delayed_work */
|
/freebsd/share/examples/ipfilter/rules/ |
H A D | example.11 | 17 # this will also protect syslog. 23 # this will also protect syslog.
|
/freebsd/lib/libwrap/ |
H A D | hosts.allow | 28 # Protect against simple DNS spoofing attacks by checking that the 49 # Sendmail can help protect you against spammers and relay-rapers 61 # Rpcbind is used for all RPC services; protect your NFS!
|
/freebsd/sys/dev/sdhci/ |
H A D | sdhci_fdt_gpio.c | 28 * for card detect and write protect, and uses FDT data to describe those pins. 168 * Write protect setup. 180 device_printf(dev, "Write protect disabled\n"); in wp_setup() 191 device_printf(dev, "Write protect switch on %s pin %u\n", in wp_setup()
|
/freebsd/sys/contrib/openzfs/include/sys/ |
H A D | txg_impl.h | 57 * The tc_lock is used to protect all members of the tx_cpu structure with 83 * is used to protect the members of this structure, it is not used to 84 * protect the tx_open_txg. Instead a special lock in the tx_cpu structure
|
H A D | mmp.h | 41 kmutex_t mmp_thread_lock; /* protect thread mgmt fields */ 45 kmutex_t mmp_io_lock; /* protect below */
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | RSA_blinding_on.pod | 5 RSA_blinding_on, RSA_blinding_off - protect the RSA operation from timing attacks 25 must be used to protect the RSA operation from that attack.
|
/freebsd/sys/dev/mlx5/ |
H A D | driver.h | 256 /* protect block chain allocations 311 /* protect command average calculations */ 335 /* protect command queue allocations 339 /* protect token allocations 463 /* protect blue flame registers allocations */ 502 spinlock_t lock; /* protect EQs list */ 535 /* protect radix tree 544 /* protect radix tree 551 /* protect radix tree 558 /* protect radix tree [all …]
|
/freebsd/contrib/llvm-project/llvm/lib/Support/Windows/ |
H A D | Memory.inc | 130 DWORD Protect = getWindowsProtectionFlags(Flags); 134 AllocType, Protect); 173 DWORD Protect = getWindowsProtectionFlags(Flags); 176 if (!VirtualProtect(M.Address, M.AllocatedSize, Protect, &OldFlags))
|
/freebsd/contrib/lua/src/ |
H A D | lvm.c | 1024 Protect(cond = other(L, s2v(ra), rb)); \ 1045 Protect(cond = luaT_callorderiTM(L, s2v(ra), im, inv, isf, tm)); \ 1115 ** Protect code that, in general, can raise errors, reallocate the 1118 #define Protect(exp) (savestate(L,ci), (exp), updatetrap(ci)) macro 1124 ** Protect code that can only raise errors. (That is, it cannot change 1265 Protect(luaV_finishget(L, upval, rc, ra, slot)); in luaV_execute() 1280 Protect(luaV_finishget(L, rb, rc, ra, slot)); in luaV_execute() 1294 Protect(luaV_finishget(L, rb, &key, ra, slot)); in luaV_execute() 1308 Protect(luaV_finishget(L, rb, rc, ra, slot)); in luaV_execute() 1321 Protect(luaV_finishset(L, upval, rb, rc, slot)); in luaV_execute() [all …]
|
/freebsd/crypto/openssl/doc/internal/man3/ |
H A D | ossl_cmp_certreq_new.pod | 76 The function does not protect the message if the B<status> value in I<si> 123 It does not protect the message if the B<status> value in I<si> is B<rejected> 149 The function does not protect the message if I<unprotectedErrors> is nonzero.
|
/freebsd/sys/dev/liquidio/base/ |
H A D | lio_iq.h | 104 /* A lock to protect access to the input ring. */ 107 /* A lock to protect while enqueue to the input ring. */ 110 /* A lock to protect while posting on the ring. */ 115 /* A lock to protect access to the input ring. */
|