| /linux/Documentation/ABI/testing/ |
| H A D | debugfs-driver-habanalabs | 124 Description: Dumps all security violations to dmesg. This will also ack 125 all security violations meanings those violations will not be
|
| /linux/include/linux/ |
| H A D | processor.h | 17 * Violations of these guidelies will not cause a bug, but may cause sub
|
| /linux/Documentation/gpu/ |
| H A D | drm-vm-bind-locking.rst | 111 lists are manipulated. However, to avoid locking order violations 128 over the gpu_vm_bo and gpu_vma lists to avoid locking-order violations. 477 reclaim context and, again, to avoid locking order violations, we can't
|
| /linux/security/integrity/ima/ |
| H A D | ima_fs.c | 55 return ima_show_htable_value(buf, count, ppos, &ima_htable.violations); in ima_show_htable_violations() 539 dentry = securityfs_create_file("violations", S_IRUSR | S_IRGRP, in ima_fs_init()
|
| H A D | ima.h | 302 atomic_long_t violations; in ima_hash_key() 296 atomic_long_t violations; global() member
|
| /linux/tools/workqueue/ |
| H A D | wq_monitor.py | 62 PWQ_STAT_CPU_INTENSIVE = prog['PWQ_STAT_CPU_INTENSIVE'] # wq_cpu_intensive_thresh_us violations
|
| /linux/Documentation/devicetree/bindings/powerpc/fsl/ |
| H A D | pamu.txt | 22 interrupt, used for reporting access violations. The second
|
| /linux/arch/x86/kvm/ |
| H A D | Kconfig | 116 Note: some CPUs appear to generate spurious EPT Violations #VEs
|
| /linux/include/uapi/linux/can/ |
| H A D | error.h | 54 #define CAN_ERR_PROT 0x00000008U /* protocol violations / data[2..3] */
|
| /linux/arch/x86/include/asm/ |
| H A D | vmxfeatures.h | 80 …OLATION_VE ( 2*32+ 18) /* "ept_violation_ve" Conditionally reflect EPT violations as #VE exception…
|
| H A D | vmx.h | 591 * Exit Qualifications for EPT Violations
|
| /linux/arch/x86/coco/tdx/ |
| H A D | tdx.c | 383 * violations. 397 * For EPT violations, ve->insn_len is not defined. For those, in ve_instr_len() 401 WARN_ONCE(1, "ve->instr_len is not defined for EPT violations"); in ve_instr_len()
|
| /linux/drivers/gpu/drm/i915/ |
| H A D | i915_cmd_parser.c | 1425 * intel_engine_cmd_parser() - parse a batch buffer for privilege violations 1433 * Parses the specified batch buffer looking for privilege violations as 1436 * Return: non-zero if the parser finds violations or otherwise fails; -EACCES 1607 * 1. Initial version. Checks batches and reports violations, but leaves in i915_cmd_parser_get_version()
|
| /linux/fs/crypto/ |
| H A D | policy.c | 654 * malicious offline violations of this constraint, while the link and rename 655 * checks are needed to prevent online violations of this constraint.
|
| /linux/drivers/net/wan/ |
| H A D | farsync.h | 131 unsigned int codeViolationCount; /* code violations */
|
| /linux/security/apparmor/include/ |
| H A D | policy.h | 75 APPARMOR_COMPLAIN, /* allow and log access violations */
|
| /linux/arch/arc/plat-axs10x/ |
| H A D | axs10x.c | 306 * revealed P&R timing violations so clamp it down to safe 50 MHz in axs103_early_init()
|
| /linux/LICENSES/dual/ |
| H A D | CC-BY-4.0 | 344 right the Licensor may have to seek remedies for Your violations
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | README.rst | 16 violations of other checks (such as additional warnings being emitted or a
|
| /linux/drivers/clocksource/ |
| H A D | hyperv_timer.c | 525 * detection of noinstr violations can work correctly.
|
| /linux/Documentation/dev-tools/ |
| H A D | checkpatch.rst | 8 style violations in patches and optionally corrects them. Checkpatch can 12 messages. If your code looks better with the violations, then its probably
|
| /linux/tools/testing/selftests/kvm/lib/ |
| H A D | sparsebit.c | 149 * temporary violations occur when node_split() is called with a specified 153 * has no bits set. Such temporary violations must be corrected before 574 * This function is designed to fix invariant violations that are introduced
|
| /linux/Documentation/networking/ |
| H A D | j1939.rst | 614 failures, protocol violations, or other issues that occur during J1939 802 reason for the abort, such as protocol violations or timeouts.
|
| /linux/Documentation/hwmon/ |
| H A D | sysfs-interface.rst | 58 make comparisons of readings to thresholds. This allows violations
|
| /linux/arch/x86/kvm/mmu/ |
| H A D | spte.h | 156 * #VE and get EPT violations on non-present PTEs. We can use the
|