| /linux/Documentation/process/ | 
| H A D | kernel-enforcement-statement.rst | 26 	However, if you cease all violation of this License, then your license30 	fails to notify you of the violation by some reasonable means prior to
 35 	violation by some reasonable means, this is the first time you have
 36 	received notice of violation of this License (for any work) from that
 37 	copyright holder, and you cure the violation prior to 30 days after
 
 | 
| H A D | embargoed-hardware-issues.rst | 104 the received information confidential. Violation of the pledge will lead to108 effective deterrent in our community. In case a violation happens the
 110 or anyone else becomes aware of a potential violation, please report it
 
 | 
| /linux/security/integrity/ima/ | 
| H A D | ima_template_lib.c | 325 		 * If digest is NULL, the event being recorded is a violation.  in ima_eventdigest_init_common()357 	if (event_data->violation)	/* recording a violation. */  in ima_eventdigest_init()
 414 	if (event_data->violation)	/* recording a violation. */  in ima_eventdigest_ng_init()
 438 	if (event_data->violation)	/* recording a violation. */  in ima_eventdigest_ngv2_init()
 467 	if (event_data->violation) {  in ima_eventdigest_modsig_init()
 468 		/* Recording a violation. */  in ima_eventdigest_modsig_init()
 
 | 
| H A D | ima.h | 77 	const char *violation;  member 262 int ima_add_template_entry(struct ima_template_entry *entry, int violation,
 406 int ima_store_template(struct ima_template_entry *entry, int violation,
 
 | 
| /linux/arch/arc/kernel/ | 
| H A D | entry-compact.S | 32  *   exception. Thus FAKE RTIE needed in low level Priv-Violation handler.107 VECTOR   EV_TLBProtV             ; 0x118, Protection Violation  (0x23)
 109 VECTOR   EV_PrivilegeV           ; 0x120, Privilege Violation   (0x24)
 252 ; Protection Violation Exception Handler
 259 	;------ (5) Type of Protection Violation? ----------
 262 	;   -Access Violation	: 00_23_(00|01|02|03)_00
 267 	;========= (6a) Access Violation Processing ========
 
 | 
| H A D | entry-arcv2.S | 36 VECTOR	EV_TLBProtV		; Protection Violation37 VECTOR	EV_PrivilegeV		; Privilege Violation
 149 ; Protection Violation Exception Handler
 
 | 
| /linux/drivers/rtc/ | 
| H A D | rtc-imxdi.c | 72 #define DSR_SVF   (1 << 0)       /* Security Violation Flag */79 #define DIER_SVIE (1 << 0)       /* Security-violation Interrupt Enable */
 295 			 "The security violation has happened at %u seconds\n",  in di_handle_invalid_state()
 388 	 * now we are trying to clear the "Security-violation flag" to  in di_handle_invalid_and_failure_state()
 397 			 "Cannot clear the security violation flag. We are ending up in an endless loop!\n");  in di_handle_invalid_and_failure_state()
 658  * interrupt handler for dryice "normal" and security violation interrupt
 669 	/* handle the security violation event */  in dryice_irq()
 681 			/* report the violation */  in dryice_irq()
 764 	/* the 2nd irq is the security violation irq  in dryice_rtc_probe()
 809 		dev_warn(&pdev->dev, "security violation interrupt not available.\n");  in dryice_rtc_probe()
 
 | 
| /linux/lib/ | 
| H A D | Kconfig.ubsan | 32 	  when a UBSAN violation occurs. (Except on arm64 and x86, which35 	  out the details of a UBSAN violation. It makes the kernel log
 176 	  In this mode, any UBSAN violation in EL2 would panic the kernel
 
 | 
| /linux/arch/nios2/mm/ | 
| H A D | fault.c | 34 #define EXC_X_PROTECTION_FAULT	13 /* TLB permission violation (x) */35 #define EXC_R_PROTECTION_FAULT	14 /* TLB permission violation (r) */
 36 #define EXC_W_PROTECTION_FAULT	15 /* TLB permission violation (w) */
 
 | 
| /linux/drivers/memory/tegra/ | 
| H A D | mc.c | 738 	[ 8] = "Security violation",742 	[12] = "VPR violation",
 743 	[13] = "Secure carveout violation",
 744 	[16] = "MTS carveout violation",
 745 	[17] = "Generalized carveout violation",
 751 	[3] = "TrustZone violation",
 752 	[4] = "Carveout violation",
 
 | 
| /linux/Documentation/ABI/testing/ | 
| H A D | sysfs-bus-pci-devices-aer | 56 		    ACS Violation 086 		    ACS Violation 0
 
 | 
| /linux/include/soc/at91/ | 
| H A D | at91sam9_ddrsdr.h | 120 #define		AT91_DDRSDRC_WPVS	(1 << 0)		/* Write protect violation status */121 #define		AT91_DDRSDRC_WPVSRC	(0xffff << 8)		/* Write protect violation source */
 
 | 
| /linux/drivers/iommu/ | 
| H A D | fsl_pamu.c | 448 	 * & enable PAMU access violation interrupts.  in setup_one_pamu()503 	pr_emerg("access violation interrupt\n");  in pamu_av_isr()
 538 			/* clear access violation condition */  in pamu_av_isr()
 542 			/* check if we got a violation for a disabled LIODN */  in pamu_av_isr()
 546 				 * violation can be reported for a disabled  in pamu_av_isr()
 548 				 * access violation reporting.  in pamu_av_isr()
 
 | 
| /linux/arch/x86/platform/efi/ | 
| H A D | efi_stub_64.S | 15 	 * The EFI code doesn't have any CFI, annotate away the CFI violation.
 | 
| /linux/Documentation/devicetree/bindings/rtc/ | 
| H A D | imxdi-rtc.yaml | 22       - description: dryice security violation interrupt
 | 
| /linux/arch/nios2/kernel/ | 
| H A D | entry.S | 87 	.word protection_exception_pte	/* 13 - TLB permission violation (x) */88 	.word protection_exception_pte	/* 14 - TLB permission violation (r) */
 89 	.word protection_exception_pte	/* 15 - TLB permission violation (w) */
 91 	.word unhandled_exception	/* 16 - MPU region violation */
 
 | 
| /linux/drivers/memory/ | 
| H A D | fsl-corenet-cf.c | 74 #define ERRDET_CV		(1 << 1)  /* Coherency Violation */152 		dev_crit(ccf->dev, "Coherency Violation\n");  in ccf_irq()
 
 | 
| /linux/arch/x86/include/asm/ | 
| H A D | trap_pf.h | 18  *   bit 31 ==				1: fault was due to RMP violation
 | 
| /linux/Documentation/devicetree/bindings/soc/mediatek/ | 
| H A D | devapc.yaml | 13   The security violation is logged and sent to the processor for further
 | 
| /linux/drivers/net/ethernet/apple/ | 
| H A D | bmac.h | 57 #	define	RxCodeViolation	0x00000040 /* Code-violation counter expired */147 #define RXCV		0x6e0   /* Receive code violation */
 
 | 
| /linux/drivers/net/ethernet/sun/ | 
| H A D | sunbmac.h | 124 #define BMAC_RXCVALID	0x338UL	/* Receiver code violation            */149 #define BIGMAC_STAT_CVCNTEXP   0x00000040 /* Code-violation counter expired           */
 166 #define BIGMAC_IMASK_CVCNTEXP  0x00000040 /* Code-violation counter expired           */
 
 | 
| /linux/include/linux/fsl/bestcomm/ | 
| H A D | fec.h | 30 #define BCOM_FEC_RX_BD_LG	0x00200000ul	/* Rx frame length violation */
 | 
| /linux/arch/m68k/include/asm/ | 
| H A D | traps.h | 120 #define MMU_L	     (0x4000)    /* limit violation */121 #define MMU_S	     (0x2000)    /* supervisor violation */
 
 | 
| /linux/arch/mips/mm/ | 
| H A D | fault.c | 120 				pr_notice("Cpu%d[%s:%d:%0*lx:%ld:%0*lx] XI violation\n",  in __do_page_fault()131 				pr_notice("Cpu%d[%s:%d:%0*lx:%ld:%0*lx] RI violation\n",  in __do_page_fault()
 
 | 
| /linux/Documentation/bpf/ | 
| H A D | graph_ds_impl.rst | 191 To prevent this logic violation all non-owning references are invalidated by the248 has already been removed as a result of this violation. State 6 is a dangerous
 
 |