/freebsd-src/sys/contrib/device-tree/Bindings/firmware/meson/ |
H A D | meson_sm.txt | 1 * Amlogic Secure Monitor 3 In the Amlogic SoCs the Secure Monitor code is used to provide access to the 6 Required properties for the secure monitor node: 7 - compatible: Should be "amlogic,meson-gxbb-sm" 12 sm: secure-monitor { 13 compatible = "amlogic,meson-gxbb-sm";
|
/freebsd-src/sys/contrib/device-tree/Bindings/nvmem/ |
H A D | amlogic-efuse.txt | 4 - compatible: should be "amlogic,meson-gxbb-efuse" 5 - clocks: phandle to the efuse peripheral clock provided by the 7 - secure-monitor: phandle to the secure-monitor node 16 compatible = "amlogic,meson-gxbb-efuse"; 18 #address-cells = <1>; 19 #size-cells = <1>; 20 secure-monitor = <&sm>; 35 sm: secure-monitor { 36 compatible = "amlogic,meson-gxbb-sm"; 46 nvmem-cells = <ð_mac>; [all …]
|
H A D | amlogic,meson-gxbb-efuse.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/nvmem/amlogic,meson-gxb [all...] |
/freebsd-src/sys/contrib/device-tree/Bindings/firmware/ |
H A D | intel,stratix10-svc.txt | 3 Intel Stratix10 SoC is composed of a 64 bit quad-core ARM Cortex A53 hard 4 processor system (HPS) and Secure Device Manager (SDM). When the FPGA is 10 communication with SDM, only the secure world of software (EL3, Exception 18 driver also manages secure monitor call (SMC) to communicate with secure monitor 22 ------------------- 26 - compatible: "intel,stratix10-svc" or "intel,agilex-svc" 27 - method: smc or hvc 28 smc - Secure Monitor Call 29 hvc - Hypervisor Call 30 - memory-region: [all …]
|
H A D | amlogic,meson-gxbb-sm.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/firmware/amlogic,meson-gxbb-sm.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Amlogic Secure Monitor (SM) 10 In the Amlogic SoCs the Secure Monitor code is used to provide access to the 14 - Neil Armstrong <neil.armstrong@linaro.org> 19 - const: amlogic,meson-gxbb-sm 20 - items: 21 - const: amlogic,meson-gx-sm [all …]
|
H A D | brcm,kona-smc.yaml | 1 # SPDX-License-Identifier: GPL-2.0-only OR BSD-2-Clause 3 --- 4 $id: http://devicetree.org/schemas/firmware/brcm,kona-smc.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Broadcom Kona family Secure Monitor bounce buffer 10 A bounce buffer used for non-secure to secure communications. 13 - Florian Fainelli <f.fainelli@gmail.com> 18 - enum: 19 - brcm,bcm11351-smc 20 - brcm,bcm21664-smc [all …]
|
/freebsd-src/sys/contrib/device-tree/Bindings/power/ |
H A D | amlogic,meson-sec-pwrc.yaml | 1 # SPDX-License-Identifier: (GPL-2.0+ OR MIT) 5 --- 6 $id: http://devicetree.org/schemas/power/amlogic,meson-sec-pwrc.yaml# 7 $schema: http://devicetree.org/meta-schemas/core.yaml# 9 title: Amlogic Meson Secure Powe [all...] |
/freebsd-src/sys/contrib/device-tree/Bindings/arm/ |
H A D | pmu.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: ARM Performance Monitor Units 10 - Mark Rutland <mark.rutland@arm.com> 11 - Wil [all...] |
/freebsd-src/sys/contrib/device-tree/Bindings/misc/ |
H A D | brcm,kona-smc.txt | 1 Broadcom Secure Monitor Bounce buffer 2 ----------------------------------------------------- 4 used for non-secure to secure communications. 7 - compatible : "brcm,kona-smc" 8 - DEPRECATED: compatible : "bcm,kona-smc" 9 - reg : Location and size of bounce buffer 13 compatible = "brcm,bcm11351-smc", "brcm,kona-smc";
|
/freebsd-src/sys/contrib/device-tree/Bindings/arm/amlogic/ |
H A D | amlogic,meson-mx-secbus2.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/arm/amlogic/amlogic,meson-mx-secbus2.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Martin Blumenstingl <martin.blumenstingl@googlemail.com> 14 contains registers for various IP blocks such as pin-controller bits for 16 The registers can be accessed directly when not running in "secure mode". 17 When "secure mode" is enabled then these registers have to be accessed 18 through secure monitor calls. 23 - enum: [all …]
|
/freebsd-src/share/man/man7/ |
H A D | security.7 | 47 multi-user systems have some inherent security, the job of building and 53 only as secure as you make them, and security concerns are ever competing 60 As yesterday's mini-computers and mainframes 67 and then carefully monitor the system for intrusions. 74 .Bl -enum -offset indent 89 Typically, DoS attacks are brute-force mechanisms that attempt 99 Brute-force network attacks are harder to deal with. 100 A spoofed-packet attack, for example, is 114 The result is that if you have any moderate-size [all...] |
/freebsd-src/contrib/tcsh/nls/german/ |
H A D | set2 | 28 26 Apollo-spezifischer Fehler 33 31 Unterbrechung (Ctrl-Break) 34 32 Mögliches Ein-/Ausgabesignal 36 34 Dringende Anfrage von Ein-/Ausgabekanal 37 35 Multitasking wake-up 39 37 Fortran asynchrones Ein-Ausgabeende 42 40 CPU-Zeitbeschränkung überschritten 44 42 micro-tasking group-no wakeup flag set 45 43 Thread error - (use cord -T for detailed info) 46 44 CRAY Y-MP register parity error [all …]
|
/freebsd-src/contrib/tcsh/nls/C/ |
H A D | set2 | 28 26 Apollo-specific fault 33 31 Break (Ctrl-Break) 37 35 Multitasking wake-up 44 42 micro-tasking group-no wakeup flag set 45 43 Thread error - (use cord -T for detailed info) 46 44 CRAY Y-MP register parity error 81 79 HFT monitor mode granted 82 80 HFT monitor mode should be relinguished 86 84 Secure attention key
|
/freebsd-src/contrib/tcsh/nls/ukrainian/ |
H A D | set2 | 28 26 Apollo-specific fault 33 31 Break (Ctrl-Break) 37 35 Multitasking wake-up 44 42 micro-tasking group-no wakeup flag set 45 43 Thread error - (use cord -T for detailed info) 46 44 CRAY Y-MP register parity error 81 79 HFT monitor mode granted 82 80 HFT monitor mode should be relinguished 86 84 Secure attention key
|
/freebsd-src/contrib/tcsh/nls/et/ |
H A D | set2 | 28 26 Apollo-spetsiifiline tõrge 33 31 Break (Ctrl-Break) 37 35 Multitasking wake-up 44 42 micro-tasking group-no wakeup flag set 45 43 Thread error - (use cord -T for detailed info) 46 44 CRAY Y-MP registri paarsuse viga 81 79 HFT monitor mode granted 82 80 HFT monitor mode should be relinguished 86 84 Secure attention key
|
/freebsd-src/contrib/tcsh/nls/russian/ |
H A D | set2 | 28 26 Apollo-specific fault 33 31 Break (Ctrl-Break) 37 35 Multitasking wake-up 44 42 micro-tasking group-no wakeup flag set 45 43 Thread error - (use cord -T for detailed info) 46 44 Ошибка четности в регистре CRAY Y-MP 81 79 HFT monitor mode granted 82 80 HFT monitor mode should be relinguished 86 84 Secure attention key
|
/freebsd-src/sys/arm/arm/ |
H A D | cpuinfo.c | 1 /*- 61 * Be careful, ACTRL cannot be changed if CPU is started in secure 127 /* non ARM -> must be new id scheme */ in cpuinfo_init() 136 /* CP15 c0,c0 regs 0-7 exist on all CPUs (although aliased with MIDR) */ in cpuinfo_init() 161 /* Not yet - CBAR only exist on ARM SMP Cortex A CPUs in cpuinfo_init() 203 cpuinfo.dcache_line_mask = cpuinfo.dcache_line_size - 1; in cpuinfo_init() 204 cpuinfo.icache_line_mask = cpuinfo.icache_line_size - 1; in cpuinfo_init() 280 * Enable snoop-delayed exclusive handling in cpuinfo_get_actlr_modifier() 372 return (-1); in apply_bp_hardening() 391 * Note: Access to ACTRL is locked to secure world on most boards. in handle_bp_hardening() [all …]
|
/freebsd-src/secure/usr.sbin/sshd/ |
H A D | Makefile | 2 .include "${SRCTOP}/secure/ssh.mk" 7 SRCS= sshd.c auth-rhosts.c auth-passwd.c \ 8 audit.c audit-bsm.c audit-linux.c platform.c \ 10 auth.c auth2.c auth-options.c session.c \ 11 auth2-chall.c groupaccess.c \ 12 auth-bsdauth.c auth2-hostbased.c auth2-kbdin [all...] |
/freebsd-src/sys/contrib/device-tree/Bindings/arm/firmware/ |
H A D | tlm,trusted-foundations.txt | 2 ------------------- 4 Boards that use the Trusted Foundations secure monitor can signal its 5 presence by declaring a node compatible with "tlm,trusted-foundations" 9 - compatible: "tlm,trusted-foundations" 10 - tlm,version-major: major version number of Trusted Foundations firmware 11 - tlm,version-minor: minor version number of Trusted Foundations firmware 15 trusted-foundations { 16 compatible = "tlm,trusted-foundations"; 17 tlm,version-major = <2>; 18 tlm,version-minor = <8>;
|
H A D | tlm,trusted-foundations.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/arm/firmware/tlm,trusted-foundations.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 Boards that use the Trusted Foundations secure monitor can signal its 14 - Stephen Warren <swarren@nvidia.com> 18 const: trusted-foundations 21 const: tlm,trusted-foundations 23 tlm,version-major: 27 tlm,version-minor: [all …]
|
/freebsd-src/sys/contrib/device-tree/Bindings/watchdog/ |
H A D | arm-smc-wdt.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/watchdog/arm-smc-wdt.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: ARM Secure Monitor Call based watchdog 10 - Julius Werner <jwerner@chromium.org> 13 - $ref: watchdog.yaml# 18 - arm,smc-wdt 20 arm,smc-id: 27 - compatible [all …]
|
/freebsd-src/contrib/tcp_wrappers/ |
H A D | tcpd.8 | 3 tcpd \- access control facility for internet services 6 The \fItcpd\fR program can be set up to monitor incoming requests for 9 that have a one-to-one mapping onto executable files. 11 The program supports both 4.3BSD-style sockets and System V.4-style 21 Optional features are: pattern-based access control, client username 39 matching. The access-control software provides hooks for the execution 49 verifies the client host name that is returned by the address->name DNS 51 name->address DNS server. If any discrepancy is detected, 56 If the sources are compiled with -DPARANOID, 64 disables source-routing socket options on every connection that it [all …]
|
/freebsd-src/sys/arm/include/ |
H A D | sysreg.h | 1 /*- 31 * Note that when register r0 is hard-coded in these definitions it means the 33 * because some syntatically-valid register name has to appear at that point to 96 #define CP15_SCR(rr) p15, 0, rr, c1, c1, 0 /* Secure Configuration Register */ 97 #define CP15_SDER(rr) p15, 0, rr, c1, c1, 1 /* Secure Debug Enable Register */ 98 #define CP15_NSACR(rr) p15, 0, rr, c1, c1, 2 /* Non-Secure Access Control Register */ 170 #define CP15_ATS12NSOPR(rr) p15, 0, rr, c7, c8, 4 /* Stages 1 and 2 Non-secure only PL1 read */ 171 #define CP15_ATS12NSOPW(rr) p15, 0, rr, c7, c8, 5 /* Stages 1 and 2 Non-secur [all...] |
/freebsd-src/share/man/man4/ |
H A D | rsu.4 | 1 .\"- 2 .\" SPDX-License-Identifier: ISC 29 .Bd -ragged -offset indent 42 .Bd -literal -offset indent 44 rsu-rtl8712fw_load="YES" 56 The RTL8191SU is a highly integrated multiple-in, single-ou [all...] |
/freebsd-src/contrib/unbound/contrib/ |
H A D | unbound_munin_ | 3 # plugin for munin to monitor usage of unbound servers. 5 # and use munin-node-configure (--suggest, --shell). 9 # To install; enable statistics and unbound-control in unbound.conf 10 # server: extended-statistics: yes 11 # statistics-cumulative: no 12 # statistics-interval: 0 13 # remote-control: control-enable: yes 14 # Run the command unbound-control-setup to generate the key files. 17 # unbound_conf - where the unbound.conf file is located. 18 # unbound_control - where to find unbound-control executable. [all …]
|