/freebsd/tests/sys/kern/ |
H A D | ktrace_test.c | 130 /* Wait for child to raise violation and exit. */ in trace_child() 150 /* Read ktrace header and ensure violation occurred. */ in cap_trace_child() 156 /* Read the capability violation. */ in cap_trace_child() 171 struct ktr_cap_fail violation; in ATF_TC_BODY() local 196 cap_trace_child(pid, &violation, 1); in ATF_TC_BODY() 197 ATF_REQUIRE_EQ(violation.cap_type, CAPFAIL_NOTCAPABLE); in ATF_TC_BODY() 198 ATF_REQUIRE(cap_rights_is_set(&violation.cap_data.cap_needed, in ATF_TC_BODY() 208 struct ktr_cap_fail violation; in ATF_TC_BODY() local 234 cap_trace_child(pid, &violation, 1); in ATF_TC_BODY() 235 ATF_REQUIRE_EQ(violation.cap_type, CAPFAIL_INCREASE); in ATF_TC_BODY() [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpkdf_argon2.txt | 103 # Expected fail on condition violation: m_cost < 8 * lanes 112 # Expected fail on condition violation: m_cost < 2 * syncpoints = 8 120 # Expected fail on condition violation: threads > avail threads 130 # Expected fail on condition violation: lanes >= 1 135 # Expected fail on condition violation: lanes <= 0xFFFFFF 140 # Expected fail on condition violation: threads >= 1 145 # Expected fail on condition violation: threads <= 0xFFFFFF 150 # Expected fail on condition violation: outlen >= 4 155 # Expected fail on condition violation: iter >= 1 160 # Expected fail on condition violation: saltlen > 8 [all …]
|
/freebsd/lib/libc/stdlib/ |
H A D | set_constraint_handler_s.3 | 31 .Nd runtime-constraint violation handling 64 function sets the runtime-constraint violation handler to be 68 function detects a runtime-constraint violation. 73 A pointer to a character string describing the runtime-constraint violation. 89 is called when a runtime-constraint violation occurs.
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | X509_STORE_CTX_get_error.3 | 328 .IP "\fBX509_V_ERR_PERMITTED_VIOLATION: permitted subtree violation\fR" 4 329 .IX Item "X509_V_ERR_PERMITTED_VIOLATION: permitted subtree violation" 330 A name constraint violation occurred in the permitted subtrees. 331 .IP "\fBX509_V_ERR_EXCLUDED_VIOLATION: excluded subtree violation\fR" 4 332 .IX Item "X509_V_ERR_EXCLUDED_VIOLATION: excluded subtree violation" 333 A name constraint violation occurred in the excluded subtrees. 393 .IP "\fBX509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION: proxy subject name violation\fR" 4 394 .IX Item "X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION: proxy subject name violation" 395 Proxy subject name violation.
|
/freebsd/contrib/llvm-project/compiler-rt/lib/asan/ |
H A D | asan_globals.cpp | 138 // Check ODR violation for given global G via special ODR indicator. We use 151 // externally visible symbol with the same name. This is an ODR violation. in CheckODRViolationViaIndicator() 161 // Check ODR violation for given global G by checking if it's already poisoned. 181 // cheaply detect ODR violation: if we try to poison an already poisoned 182 // global, we have ODR violation error. 190 // and can freely check ODR violation with the first method. 192 // This routine chooses between two different methods of ODR violation 212 Report("In either case this is likely an ODR violation bug,\n"); in RegisterGlobal() 219 // Try detecting ODR (One Definition Rule) violation, i.e. the situation in RegisterGlobal()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | X509_STORE_CTX_get_error.pod | 339 =item B<X509_V_ERR_PERMITTED_VIOLATION: permitted subtree violation> 341 A name constraint violation occurred in the permitted subtrees. 343 =item B<X509_V_ERR_EXCLUDED_VIOLATION: excluded subtree violation> 345 A name constraint violation occurred in the excluded subtrees. 426 =item B<X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION: proxy subject name violation> 428 Proxy subject name violation.
|
/freebsd/share/man/man4/ |
H A D | witness.4 | 46 If a lock order violation is detected, then a message is output to the 50 violation occurs. 82 lock order violation is detected can be set in a variety of ways.
|
/freebsd/sys/contrib/xen/ |
H A D | vm_event.h | 137 /* Memory access violation */ 277 * R/W/X: Defines the type of violation that has triggered the event 278 * Multiple types can be set in a single violation! 280 * FAULT_WITH_GLA: If the violation was triggered by accessing gla 281 * FAULT_IN_GPT: If the violation was triggered during translating gla
|
/freebsd/crypto/krb5/src/include/krb5/ |
H A D | audit_plugin.h | 75 #define LOCAL_POLICY 2 /**< Local policy violation */ 94 int violation; /**< local or protocol policy problem */ member 199 * - If available, KDC status, local policy violation or S4U protocol 222 * - If available, KDC status, local policy violation or S4U protocol
|
/freebsd/crypto/openssl/ssl/quic/ |
H A D | quic_rx_depack.c | 163 return 1; /* old deleted stream, not a protocol violation, ignore */ in depack_do_frame_reset_stream() 199 "flow control violation"); in depack_do_frame_reset_stream() 238 return 1; /* old deleted stream, not a protocol violation, ignore */ in depack_do_frame_stop_sending() 362 * Returns 1 if no protocol violation has occurred. In this case *result will be 364 * causing this function to be called. Returns 0 on protocol violation. 394 * not exist yet. This is a protocol violation and we must in depack_do_implicit_stream_create() 475 * violation. in depack_do_implicit_stream_create() 525 * Data for old stream which is not a protocol violation but should be in depack_do_frame_stream() 556 "flow control violation"); in depack_do_frame_stream() 713 return 1; /* old deleted stream, not a protocol violation, ignore */ in depack_do_frame_max_stream_data() [all …]
|
/freebsd/crypto/openssl/crypto/x509/ |
H A D | x509_txt.c | 120 return "permitted subtree violation"; in X509_verify_cert_error_string() 122 return "excluded subtree violation"; in X509_verify_cert_error_string() 170 return "proxy subject name violation"; in X509_verify_cert_error_string()
|
/freebsd/tools/test/stress2/misc/ |
H A D | nullfs6.sh | 29 # Lock violation panic regression test 47 mv $nullfs_srcdir/1/test.file $nullfs_srcdir/2/ # panics with lock violation
|
/freebsd/contrib/libder/libder/ |
H A D | libder_error.c | 32 DESCRIBE(STRICT_EOC, "Strict: end-of-content violation"), 33 DESCRIBE(STRICT_TAG, "Strict: tag violation"),
|
H A D | libder.h | 88 LDE_STRICT_EOC, /* Strict: end-of-content violation */ 89 LDE_STRICT_TAG, /* Strict: tag violation */
|
/freebsd/contrib/diff/lib/ |
H A D | c-stack.c | 165 /* Handle a segmentation violation and exit. This function is 179 this segmentation violation is a stack overflow. */ in segv_handler() 222 for a segmentation violation that does not appear related to stack
|
/freebsd/contrib/llvm-project/compiler-rt/lib/rtsan/ |
H A D | rtsan_context.cpp | 51 violation is detected. The RTSan developers intend for the 90 "Real-time violation: intercepted call to real-time unsafe function " in PrintDiagnostics()
|
/freebsd/contrib/ofed/libibverbs/ |
H A D | enum_strs.c | 75 [IBV_EVENT_QP_ACCESS_ERR] = "local access violation work queue error", in ibv_event_type_str() 116 [IBV_WC_LOC_RDD_VIOL_ERR] = "local RDD violation error", in ibv_wc_status_str()
|
/freebsd/usr.bin/netstat/ |
H A D | ipsec.c | 158 p(ips_in_polvio, "\t{:dropped-policy-violation/%ju} " in print_ipsecstats() 164 p(ips_out_polvio, "\t{:discarded-policy-violation/%ju} " in print_ipsecstats() 289 p(ahs_pdrops, "dropped-policy-violation", in print_ahstats() 349 p(esps_pdrops, "dropped-policy-violation", in print_espstats() 403 p(ipcomps_pdrops, "dropped-policy-violation", in print_ipcompstats()
|
/freebsd/contrib/libarchive/libarchive/ |
H A D | archive_write_set_options.3 | 408 If enabled, allows filenames to contain multiple period characters, in violation of the ISO9660 spe… 413 If enabled, allows filenames to contain trailing period characters, in violation of the ISO9660 spe… 418 If enabled, the Primary Volume Descriptor may contain lowercase ASCII characters, in violation of t… 422 If enabled, sharp and tilde characters will be permitted in filenames, in violation if the ISO9660 … 427 If disabled, version numbers will be suppressed, in violation of the ISO9660 standard.
|
/freebsd/sys/amd64/include/ |
H A D | pte.h | 96 #define PGEX_P 0x01 /* Protection violation vs. not present */ 101 #define PGEX_PK 0x20 /* protection key violation */
|
/freebsd/contrib/llvm-project/lld/docs/ELF/ |
H A D | warn_backrefs.rst | 68 unnecessarily large. Moreover, the layering violation makes lower-level 98 In C++, this is likely an ODR violation. We probably need a dedicated option
|
/freebsd/contrib/tcpdump/ |
H A D | print-tftp.c | 50 #define EACCESS 2 /* access violation */ 73 { EACCESS, "EACCESS" }, /* access violation */
|
/freebsd/sys/contrib/device-tree/Bindings/rtc/ |
H A D | imxdi-rtc.txt | 11 - interrupts: dryice security violation interrupt (second entry)
|
H A D | imxdi-rtc.yaml | 22 - description: dryice security violation interrupt
|
/freebsd/contrib/llvm-project/clang/include/clang/AST/ |
H A D | ASTConsumer.h | 23 class ASTDeserializationListener; // layering violation because void* is ugly 24 class SemaConsumer; // layering violation required for safe SemaConsumer
|