Home
last modified time | relevance | path

Searched full:violation (Results 1 – 25 of 220) sorted by relevance

123456789

/linux/Documentation/process/
H A Dkernel-enforcement-statement.rst26 However, if you cease all violation of this License, then your license
30 fails to notify you of the violation by some reasonable means prior to
35 violation by some reasonable means, this is the first time you have
36 received notice of violation of this License (for any work) from that
37 copyright holder, and you cure the violation prior to 30 days after
H A Dembargoed-hardware-issues.rst104 the received information confidential. Violation of the pledge will lead to
108 effective deterrent in our community. In case a violation happens the
110 or anyone else becomes aware of a potential violation, please report it
/linux/security/integrity/ima/
H A Dima_api.c105 int violation, struct inode *inode, in ima_store_template() argument
113 if (!violation) { in ima_store_template()
124 result = ima_add_template_entry(entry, violation, op, inode, filename); in ima_store_template()
129 * ima_add_violation - add violation to measurement list.
144 .violation = cause }; in ima_add_violation()
145 int violation = 1; in ima_add_violation() local
156 result = ima_store_template(entry, violation, inode, in ima_add_violation()
372 int violation = 0; in ima_store_measurement()
390 result = ima_store_template(entry, violation, inode, filename, pcr); in ima_store_measurement()
367 int violation = 0; ima_store_measurement() local
H A Dima_template_lib.c325 * If digest is NULL, the event being recorded is a violation. in ima_eventdigest_init_common()
357 if (event_data->violation) /* recording a violation. */ in ima_eventdigest_init()
414 if (event_data->violation) /* recording a violation. */ in ima_eventdigest_ng_init()
438 if (event_data->violation) /* recording a violation. */ in ima_eventdigest_ngv2_init()
467 if (event_data->violation) { in ima_eventdigest_modsig_init()
468 /* Recording a violation. */ in ima_eventdigest_modsig_init()
H A Dima_queue.c166 int ima_add_template_entry(struct ima_template_entry *entry, int violation, in ima_add_template_entry() argument
190 if (!violation && !IS_ENABLED(CONFIG_IMA_DISABLE_HTABLE)) { in ima_add_template_entry()
206 if (violation) /* invalidate pcr */ in ima_add_template_entry()
H A Dima.h78 const char *violation;
199 * integrity violation (a file that is already opened for read is opened for
202 * IMA_EMITTED_OPENWRITERS - indicates to add open-writers integrity violation
289 int ima_add_template_entry(struct ima_template_entry *entry, int violation,
433 int ima_store_template(struct ima_template_entry *entry, int violation,
77 const char *violation; global() member
/linux/arch/arc/kernel/
H A Dentry-compact.S32 * exception. Thus FAKE RTIE needed in low level Priv-Violation handler.
107 VECTOR EV_TLBProtV ; 0x118, Protection Violation (0x23)
109 VECTOR EV_PrivilegeV ; 0x120, Privilege Violation (0x24)
252 ; Protection Violation Exception Handler
259 ;------ (5) Type of Protection Violation? ----------
262 ; -Access Violation : 00_23_(00|01|02|03)_00
267 ;========= (6a) Access Violation Processing ========
H A Dentry-arcv2.S36 VECTOR EV_TLBProtV ; Protection Violation
37 VECTOR EV_PrivilegeV ; Privilege Violation
149 ; Protection Violation Exception Handler
/linux/drivers/rtc/
H A Drtc-imxdi.c72 #define DSR_SVF (1 << 0) /* Security Violation Flag */
79 #define DIER_SVIE (1 << 0) /* Security-violation Interrupt Enable */
295 "The security violation has happened at %u seconds\n", in di_handle_invalid_state()
388 * now we are trying to clear the "Security-violation flag" to in di_handle_invalid_and_failure_state()
397 "Cannot clear the security violation flag. We are ending up in an endless loop!\n"); in di_handle_invalid_and_failure_state()
658 * interrupt handler for dryice "normal" and security violation interrupt
669 /* handle the security violation event */ in dryice_irq()
681 /* report the violation */ in dryice_irq()
764 /* the 2nd irq is the security violation irq in dryice_rtc_probe()
809 dev_warn(&pdev->dev, "security violation interrupt not available.\n"); in dryice_rtc_probe()
/linux/tools/testing/selftests/riscv/cfi/
H A Dcfitests.c25 ksft_print_msg("Control flow violation happened somewhere\n"); in sigsegv_handler()
26 ksft_print_msg("PC where violation happened %lx\n", ctx->uc_mcontext.gregs[0]); in sigsegv_handler()
41 ksft_print_msg("Registering signal handler for landing pad violation failed\n"); in register_signal_handler()
/linux/arch/nios2/mm/
H A Dfault.c34 #define EXC_X_PROTECTION_FAULT 13 /* TLB permission violation (x) */
35 #define EXC_R_PROTECTION_FAULT 14 /* TLB permission violation (r) */
36 #define EXC_W_PROTECTION_FAULT 15 /* TLB permission violation (w) */
/linux/Documentation/ABI/testing/
H A Dsysfs-bus-pci-devices-aer56 ACS Violation 0
86 ACS Violation 0
/linux/include/soc/at91/
H A Dat91sam9_ddrsdr.h120 #define AT91_DDRSDRC_WPVS (1 << 0) /* Write protect violation status */
121 #define AT91_DDRSDRC_WPVSRC (0xffff << 8) /* Write protect violation source */
/linux/drivers/iommu/
H A Dfsl_pamu.c448 * & enable PAMU access violation interrupts. in setup_one_pamu()
503 pr_emerg("access violation interrupt\n"); in pamu_av_isr()
538 /* clear access violation condition */ in pamu_av_isr()
542 /* check if we got a violation for a disabled LIODN */ in pamu_av_isr()
546 * violation can be reported for a disabled in pamu_av_isr()
548 * access violation reporting. in pamu_av_isr()
/linux/arch/riscv/kernel/
H A Dtraps.c368 * of indirect jumps or calls, in this case, forward cfi violation in handle_user_cfi_violation()
379 "Oops - control flow violation"); in handle_user_cfi_violation()
400 /* not a cfi violation, then merge into flow of unknown trap handler */ in do_trap_software_check()
/linux/arch/x86/platform/efi/
H A Defi_stub_64.S15 * The EFI code doesn't have any CFI, annotate away the CFI violation.
/linux/arch/nios2/kernel/
H A Dentry.S87 .word protection_exception_pte /* 13 - TLB permission violation (x) */
88 .word protection_exception_pte /* 14 - TLB permission violation (r) */
89 .word protection_exception_pte /* 15 - TLB permission violation (w) */
91 .word unhandled_exception /* 16 - MPU region violation */
/linux/Documentation/devicetree/bindings/rtc/
H A Dimxdi-rtc.yaml22 - description: dryice security violation interrupt
/linux/drivers/memory/
H A Dfsl-corenet-cf.c74 #define ERRDET_CV (1 << 1) /* Coherency Violation */
152 dev_crit(ccf->dev, "Coherency Violation\n"); in ccf_irq()
/linux/arch/x86/include/asm/
H A Dtrap_pf.h18 * bit 31 == 1: fault was due to RMP violation
/linux/Documentation/devicetree/bindings/soc/mediatek/
H A Ddevapc.yaml13 The security violation is logged and sent to the processor for further
/linux/drivers/net/ethernet/apple/
H A Dbmac.h57 # define RxCodeViolation 0x00000040 /* Code-violation counter expired */
147 #define RXCV 0x6e0 /* Receive code violation */
/linux/drivers/net/ethernet/sun/
H A Dsunbmac.h124 #define BMAC_RXCVALID 0x338UL /* Receiver code violation */
149 #define BIGMAC_STAT_CVCNTEXP 0x00000040 /* Code-violation counter expired */
166 #define BIGMAC_IMASK_CVCNTEXP 0x00000040 /* Code-violation counter expired */
/linux/include/linux/fsl/bestcomm/
H A Dfec.h30 #define BCOM_FEC_RX_BD_LG 0x00200000ul /* Rx frame length violation */
/linux/arch/m68k/include/asm/
H A Dtraps.h120 #define MMU_L (0x4000) /* limit violation */
121 #define MMU_S (0x2000) /* supervisor violation */

123456789