/freebsd/tests/sys/kern/ |
H A D | ktrace_test.c | 130 /* Wait for child to raise violation and exit. */ in trace_child() 150 /* Read ktrace header and ensure violation occurred. */ in cap_trace_child() 156 /* Read the capability violation. */ in cap_trace_child() 171 struct ktr_cap_fail violation; in ATF_TC_BODY() local 196 cap_trace_child(pid, &violation, 1); in ATF_TC_BODY() 197 ATF_REQUIRE_EQ(violation.cap_type, CAPFAIL_NOTCAPABLE); in ATF_TC_BODY() 198 ATF_REQUIRE(cap_rights_is_set(&violation.cap_data.cap_needed, in ATF_TC_BODY() 208 struct ktr_cap_fail violation; in ATF_TC_BODY() local 234 cap_trace_child(pid, &violation, 1); in ATF_TC_BODY() 235 ATF_REQUIRE_EQ(violation.cap_type, CAPFAIL_INCREASE); in ATF_TC_BODY() [all …]
|
/freebsd/lib/libc/stdlib/ |
H A D | set_constraint_handler_s.3 | 31 .Nd runtime-constraint violation handling 64 function sets the runtime-constraint violation handler to be 68 function detects a runtime-constraint violation. 73 A pointer to a character string describing the runtime-constraint violation. 89 is called when a runtime-constraint violation occurs.
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | X509_STORE_CTX_get_error.3 | 402 .IP "\fBX509_V_ERR_PERMITTED_VIOLATION: permitted subtree violation\fR" 4 403 .IX Item "X509_V_ERR_PERMITTED_VIOLATION: permitted subtree violation" 404 A name constraint violation occurred in the permitted subtrees. 405 .IP "\fBX509_V_ERR_EXCLUDED_VIOLATION: excluded subtree violation\fR" 4 406 .IX Item "X509_V_ERR_EXCLUDED_VIOLATION: excluded subtree violation" 407 A name constraint violation occurred in the excluded subtrees. 467 .IP "\fBX509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION: proxy subject name violation\fR" 4 468 .IX Item "X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION: proxy subject name violation" 469 Proxy subject name violation.
|
/freebsd/contrib/llvm-project/compiler-rt/lib/asan/ |
H A D | asan_globals.cpp | 138 // Check ODR violation for given global G via special ODR indicator. We use 151 // externally visible symbol with the same name. This is an ODR violation. in CheckODRViolationViaIndicator() 161 // Check ODR violation for given global G by checking if it's already poisoned. 181 // cheaply detect ODR violation: if we try to poison an already poisoned 182 // global, we have ODR violation error. 190 // and can freely check ODR violation with the first method. 192 // This routine chooses between two different methods of ODR violation 212 Report("In either case this is likely an ODR violation bug,\n"); in RegisterGlobal() 219 // Try detecting ODR (One Definition Rule) violation, i.e. the situation in RegisterGlobal()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | X509_STORE_CTX_get_error.pod | 337 =item B<X509_V_ERR_PERMITTED_VIOLATION: permitted subtree violation> 339 A name constraint violation occurred in the permitted subtrees. 341 =item B<X509_V_ERR_EXCLUDED_VIOLATION: excluded subtree violation> 343 A name constraint violation occurred in the excluded subtrees. 424 =item B<X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION: proxy subject name violation> 426 Proxy subject name violation.
|
/freebsd/share/man/man4/ |
H A D | witness.4 | 46 If a lock order violation is detected, then a message is output to the 50 violation occurs. 82 lock order violation is detected can be set in a variety of ways.
|
/freebsd/sys/contrib/xen/ |
H A D | vm_event.h | 137 /* Memory access violation */ 277 * R/W/X: Defines the type of violation that has triggered the event 278 * Multiple types can be set in a single violation! 280 * FAULT_WITH_GLA: If the violation was triggered by accessing gla 281 * FAULT_IN_GPT: If the violation was triggered during translating gla
|
/freebsd/crypto/openssl/crypto/x509/ |
H A D | x509_txt.c | 120 return "permitted subtree violation"; in X509_verify_cert_error_string() 122 return "excluded subtree violation"; in X509_verify_cert_error_string() 170 return "proxy subject name violation"; in X509_verify_cert_error_string()
|
/freebsd/tools/test/stress2/misc/ |
H A D | nullfs6.sh | 29 # Lock violation panic regression test 47 mv $nullfs_srcdir/1/test.file $nullfs_srcdir/2/ # panics with lock violation
|
/freebsd/contrib/libder/libder/ |
H A D | libder_error.c | 32 DESCRIBE(STRICT_EOC, "Strict: end-of-content violation"), 33 DESCRIBE(STRICT_TAG, "Strict: tag violation"),
|
H A D | libder.h | 88 LDE_STRICT_EOC, /* Strict: end-of-content violation */ 89 LDE_STRICT_TAG, /* Strict: tag violation */
|
/freebsd/contrib/diff/lib/ |
H A D | c-stack.c | 165 /* Handle a segmentation violation and exit. This function is 179 this segmentation violation is a stack overflow. */ in segv_handler() 222 for a segmentation violation that does not appear related to stack
|
/freebsd/contrib/libarchive/libarchive/ |
H A D | archive_write_set_options.3 | 400 If enabled, allows filenames to contain multiple period characters, in violation of the ISO9660 specification. 405 If enabled, allows filenames to contain trailing period characters, in violation of the ISO9660 specification. 410 If enabled, the Primary Volume Descriptor may contain lowercase ASCII characters, in violation of the ISO9660 specification. 414 If enabled, sharp and tilde characters will be permitted in filenames, in violation if the ISO9660 specification. 419 If disabled, version numbers will be suppressed, in violation of the ISO9660 standard.
|
/freebsd/contrib/llvm-project/compiler-rt/lib/rtsan/ |
H A D | rtsan_context.cpp | 51 violation is detected. The RTSan developers intend for the 90 "Real-time violation: intercepted call to real-time unsafe function " in PrintDiagnostics()
|
/freebsd/contrib/ofed/libibverbs/ |
H A D | enum_strs.c | 75 [IBV_EVENT_QP_ACCESS_ERR] = "local access violation work queue error", in ibv_event_type_str() 116 [IBV_WC_LOC_RDD_VIOL_ERR] = "local RDD violation error", in ibv_wc_status_str()
|
/freebsd/usr.bin/netstat/ |
H A D | ipsec.c | 158 p(ips_in_polvio, "\t{:dropped-policy-violation/%ju} " in print_ipsecstats() 164 p(ips_out_polvio, "\t{:discarded-policy-violation/%ju} " in print_ipsecstats() 289 p(ahs_pdrops, "dropped-policy-violation", in print_ahstats() 349 p(esps_pdrops, "dropped-policy-violation", in print_espstats() 403 p(ipcomps_pdrops, "dropped-policy-violation", in print_ipcompstats()
|
/freebsd/sys/amd64/include/ |
H A D | pte.h | 96 #define PGEX_P 0x01 /* Protection violation vs. not present */ 101 #define PGEX_PK 0x20 /* protection key violation */
|
/freebsd/contrib/llvm-project/lld/docs/ELF/ |
H A D | warn_backrefs.rst | 68 unnecessarily large. Moreover, the layering violation makes lower-level 98 In C++, this is likely an ODR violation. We probably need a dedicated option
|
/freebsd/contrib/tcpdump/ |
H A D | print-tftp.c | 50 #define EACCESS 2 /* access violation */ 73 { EACCESS, "EACCESS" }, /* access violation */
|
/freebsd/contrib/llvm-project/clang/include/clang/AST/ |
H A D | ASTConsumer.h | 23 class ASTDeserializationListener; // layering violation because void* is ugly 24 class SemaConsumer; // layering violation required for safe SemaConsumer
|
/freebsd/sys/contrib/device-tree/Bindings/rtc/ |
H A D | imxdi-rtc.txt | 11 - interrupts: dryice security violation interrupt (second entry)
|
H A D | imxdi-rtc.yaml | 22 - description: dryice security violation interrupt
|
/freebsd/contrib/llvm-project/clang/include/clang/InstallAPI/ |
H A D | DylibVerifier.h | 65 // Determines what kind of banner to print a violation for. 184 /// when there is a violation to report and there is not a known declaration
|
/freebsd/contrib/llvm-project/llvm/lib/Support/ |
H A D | DivisionByConstantInfo.cpp | 22 assert(!D.isZero() && "Precondition violation."); in get() 76 assert(!D.isZero() && !D.isOne() && "Precondition violation."); in get()
|
/freebsd/contrib/ofed/libibverbs/man/ |
H A D | ibv_query_port.3 | 36 uint32_t qkey_viol_cntr; /* Q_Key violation counter */
|