Home
last modified time | relevance | path

Searched refs:violation (Results 1 – 24 of 24) sorted by relevance

/linux-4.4.14/security/integrity/ima/
Dima_api.c89 int violation, struct inode *inode, in ima_store_template() argument
101 if (!violation) { in ima_store_template()
117 result = ima_add_template_entry(entry, violation, op, inode, filename); in ima_store_template()
136 int violation = 1; in ima_add_violation() local
147 result = ima_store_template(entry, violation, inode, filename); in ima_add_violation()
271 int violation = 0; in ima_store_measurement() local
283 result = ima_store_template(entry, violation, inode, filename); in ima_store_measurement()
Dima_queue.c108 int ima_add_template_entry(struct ima_template_entry *entry, int violation, in ima_add_template_entry() argument
119 if (!violation) { in ima_add_template_entry()
135 if (violation) /* invalidate pcr */ in ima_add_template_entry()
Dima_init.c55 int violation = 0; in ima_add_boot_aggregate() local
81 result = ima_store_template(entry, violation, NULL, in ima_add_boot_aggregate()
Dima.h62 const char *violation; member
105 int ima_add_template_entry(struct ima_template_entry *entry, int violation,
154 int ima_store_template(struct ima_template_entry *entry, int violation,
Dima_template_lib.c213 if (event_data->violation) /* recording a violation. */ in ima_eventdigest_init()
251 if (event_data->violation) /* recording a violation. */ in ima_eventdigest_ng_init()
/linux-4.4.14/Documentation/x86/
Dintel_mpx.txt58 information about the violation in the 'struct siginfo'.
96 * bounds violation caused by MPX instructions.
166 If a #BR is generated due to a bounds violation caused by MPX.
167 We need to decode MPX instructions to get violation address and
185 The '_addr' field refers to violation address, and new '_addr_and'
189 can get violation address and bounds when bounds violations occur.
/linux-4.4.14/drivers/staging/rdma/hfi1/
Dpcie.c737 u32 violation; in load_eq_table() local
752 &violation); in load_eq_table()
753 if (violation in load_eq_table()
/linux-4.4.14/drivers/memory/
DKconfig102 represents a coherency violation.
/linux-4.4.14/arch/m68k/ifpsp060/
DCHANGES58 ADDR should cause a "segmentation violation", the memory read
/linux-4.4.14/Documentation/ABI/stable/
Dsysfs-bus-usb103 Note that some devices, in violation of the USB spec, have a
/linux-4.4.14/arch/frv/kernel/
Dbreak.S439 # to get a BREAK fault not an access violation should the return be to userspace
/linux-4.4.14/Documentation/usb/
DURB.txt174 memory-access violation. The driver is responsible for avoiding this,
/linux-4.4.14/Documentation/block/
Ddata-integrity.txt98 concept of an end-to-end protection scheme is a layering violation.
/linux-4.4.14/drivers/base/
DKconfig136 then it may be a violation of the GPL to distribute the resulting
/linux-4.4.14/Documentation/locking/
Dlockdep-design.txt108 any rule violation between the new lock and any of the held locks.
/linux-4.4.14/Documentation/development-process/
D1.Intro202 a result, their distribution is a violation of the GNU General Public
/linux-4.4.14/Documentation/virtual/kvm/
Dmmu.txt274 - guest page fault (or npt page fault, or ept violation)
/linux-4.4.14/Documentation/netlabel/
Ddraft-ietf-cipso-ipsecurity-01.txt442 protected by the receiving host or if acceptance may result in violation of
/linux-4.4.14/Documentation/
DDMA-API.txt576 do not violate those constraints. In the worst case such a violation can
DDMA-API-HOWTO.txt508 kernel logs when the DMA controller hardware detects violation of the
DSubmittingPatches252 looks better with a violation then its probably best left alone.
/linux-4.4.14/drivers/scsi/aic7xxx/
Daic7xxx.reg879 mask PROTO_VIOLATION 0x20|SEQINT /* SCSI protocol violation */
/linux-4.4.14/net/netfilter/
DKconfig293 in PNS->PAC direction. This is a violation of RFC2637.
/linux-4.4.14/Documentation/filesystems/cifs/
DCHANGES171 (helps with certain sharing violation cases when server such as