Home
last modified time | relevance | path

Searched full:violations (Results 1 – 25 of 63) sorted by relevance

123

/linux/security/integrity/ima/
H A Dima_fs.c55 return ima_show_htable_value(buf, count, ppos, &ima_htable.violations); in ima_show_htable_violations()
402 static struct dentry *violations; variable
601 violations = in ima_fs_init()
602 securityfs_create_file("violations", S_IRUSR | S_IRGRP, in ima_fs_init()
604 if (IS_ERR(violations)) { in ima_fs_init()
605 ret = PTR_ERR(violations); in ima_fs_init()
620 securityfs_remove(violations); in ima_fs_init()
H A Dima_api.c129 * Violations are flagged in the measurement list with zero hash values.
147 atomic_long_inc(&ima_htable.violations); in ima_add_violation()
H A Dima_init.c39 * a different value.) Violations add a zero entry to the measurement
H A Dima_queue.c37 .violations = ATOMIC_LONG_INIT(0),
H A Dima.h291 atomic_long_t violations; member
/linux/Documentation/process/
H A Dsubmit-checklist.rst65 1) Check for trivial violations with the patch style checker prior to
67 You should be able to justify all violations that remain in
/linux/Documentation/ABI/testing/
H A Ddebugfs-driver-habanalabs124 Description: Dumps all security violations to dmesg. This will also ack
125 all security violations meanings those violations will not be
/linux/include/linux/
H A Dprocessor.h17 * Violations of these guidelies will not cause a bug, but may cause sub
H A Dllist.h23 * consumer may cause violations.
/linux/tools/testing/selftests/kvm/x86_64/
H A Dsmaller_maxphyaddr_emulation_test.c5 * Test that KVM emulates instructions in response to EPT violations when
/linux/Documentation/devicetree/bindings/crypto/
H A Dfsl,sec-v4.0-mon.yaml18 violations. This also included rtc, system power off and ON/OFF key.
/linux/Documentation/gpu/
H A Ddrm-vm-bind-locking.rst111 lists are manipulated. However, to avoid locking order violations
128 over the gpu_vm_bo and gpu_vma lists to avoid locking-order violations.
477 reclaim context and, again, to avoid locking order violations, we can't
/linux/tools/workqueue/
H A Dwq_monitor.py62 PWQ_STAT_CPU_INTENSIVE = prog['PWQ_STAT_CPU_INTENSIVE'] # wq_cpu_intensive_thresh_us violations
/linux/Documentation/devicetree/bindings/powerpc/fsl/
H A Dpamu.txt22 interrupt, used for reporting access violations. The second
/linux/drivers/infiniband/hw/qib/
H A Dqib_mad.h194 __be16 violations; member
/linux/include/uapi/linux/can/
H A Derror.h54 #define CAN_ERR_PROT 0x00000008U /* protocol violations / data[2..3] */
/linux/arch/x86/coco/tdx/
H A Dtdx.c330 * violations.
344 * For EPT violations, ve->insn_len is not defined. For those, in ve_instr_len()
348 WARN_ONCE(1, "ve->instr_len is not defined for EPT violations"); in ve_instr_len()
/linux/arch/x86/include/asm/
H A Dvmxfeatures.h80 …OLATION_VE ( 2*32+ 18) /* "ept_violation_ve" Conditionally reflect EPT violations as #VE exception…
/linux/drivers/gpu/drm/i915/
H A Di915_cmd_parser.c1425 * intel_engine_cmd_parser() - parse a batch buffer for privilege violations
1433 * Parses the specified batch buffer looking for privilege violations as
1436 * Return: non-zero if the parser finds violations or otherwise fails; -EACCES
1607 * 1. Initial version. Checks batches and reports violations, but leaves in i915_cmd_parser_get_version()
/linux/arch/x86/entry/vsyscall/
H A Dvsyscall_64.c169 * Check for access_ok violations and find the syscall nr. in emulate_vsyscall()
/linux/fs/crypto/
H A Dpolicy.c652 * malicious offline violations of this constraint, while the link and rename
653 * checks are needed to prevent online violations of this constraint.
/linux/security/apparmor/include/
H A Dpolicy.h70 APPARMOR_COMPLAIN, /* allow and log access violations */
/linux/drivers/net/wan/
H A Dfarsync.h131 unsigned int codeViolationCount; /* code violations */
/linux/arch/arc/plat-axs10x/
H A Daxs10x.c306 * revealed P&R timing violations so clamp it down to safe 50 MHz in axs103_early_init()
/linux/LICENSES/dual/
H A DCC-BY-4.0344 right the Licensor may have to seek remedies for Your violations

123