| /kernel/linux/linux-6.6/security/integrity/ima/ |
| D | ima_fs.c | 55 return ima_show_htable_value(buf, count, ppos, &ima_htable.violations); in ima_show_htable_violations() 364 static struct dentry *violations; variable 495 violations = in ima_fs_init() 496 securityfs_create_file("violations", S_IRUSR | S_IRGRP, in ima_fs_init() 498 if (IS_ERR(violations)) { in ima_fs_init() 499 ret = PTR_ERR(violations); in ima_fs_init() 514 securityfs_remove(violations); in ima_fs_init()
|
| D | ima_init.c | 39 * a different value.) Violations add a zero entry to the measurement
|
| D | ima_api.c | 129 * Violations are flagged in the measurement list with zero hash values. 147 atomic_long_inc(&ima_htable.violations); in ima_add_violation()
|
| D | ima_queue.c | 37 .violations = ATOMIC_LONG_INIT(0),
|
| /kernel/linux/linux-5.10/security/integrity/ima/ |
| D | ima_fs.c | 55 return ima_show_htable_value(buf, count, ppos, &ima_htable.violations); in ima_show_htable_violations() 364 static struct dentry *violations; variable 485 violations = in ima_fs_init() 486 securityfs_create_file("violations", S_IRUSR | S_IRGRP, in ima_fs_init() 488 if (IS_ERR(violations)) in ima_fs_init() 500 securityfs_remove(violations); in ima_fs_init()
|
| D | ima_api.c | 129 * Violations are flagged in the measurement list with zero hash values. 147 atomic_long_inc(&ima_htable.violations); in ima_add_violation()
|
| D | ima_init.c | 37 * a different value.) Violations add a zero entry to the measurement
|
| /kernel/linux/linux-5.10/arch/ia64/ |
| D | Kconfig.debug | 22 bool "Print possible IA-64 dependency violations to console" 27 or Write-after-Read (WAR) violations. This option is ignored if you
|
| /kernel/linux/linux-6.6/arch/ia64/ |
| D | Kconfig.debug | 22 bool "Print possible IA-64 dependency violations to console" 27 or Write-after-Read (WAR) violations. This option is ignored if you
|
| /kernel/linux/linux-6.6/Documentation/process/ |
| D | submit-checklist.rst | 39 Check for trivial violations with the patch style checker prior to 41 You should be able to justify all violations that remain in
|
| /kernel/linux/linux-5.10/Documentation/process/ |
| D | submit-checklist.rst | 39 Check for trivial violations with the patch style checker prior to 41 You should be able to justify all violations that remain in
|
| /kernel/linux/linux-6.6/Documentation/ABI/testing/ |
| D | debugfs-driver-habanalabs | 124 Description: Dumps all security violations to dmesg. This will also ack 125 all security violations meanings those violations will not be
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | processor.h | 17 * Violations of these guidelies will not cause a bug, but may cause sub
|
| /kernel/linux/linux-6.6/include/linux/ |
| D | processor.h | 17 * Violations of these guidelies will not cause a bug, but may cause sub
|
| /kernel/linux/linux-6.6/Documentation/arch/ia64/ |
| D | mca.rst | 117 violations. Unfortunately MCA/INIT start off as massive layer 118 violations (can occur at _any_ time) and they build from there.
|
| /kernel/linux/linux-5.10/Documentation/ia64/ |
| D | mca.rst | 117 violations. Unfortunately MCA/INIT start off as massive layer 118 violations (can occur at _any_ time) and they build from there.
|
| /kernel/linux/linux-6.6/tools/testing/selftests/kvm/x86_64/ |
| D | smaller_maxphyaddr_emulation_test.c | 5 * Test that KVM emulates instructions in response to EPT violations when
|
| /kernel/linux/linux-6.6/Documentation/core-api/ |
| D | gfp_mask-from-fs-io.rst | 67 layering violations then the recommended way around that is to wrap ``vmalloc``
|
| /kernel/linux/linux-5.10/Documentation/core-api/ |
| D | gfp_mask-from-fs-io.rst | 67 layering violations then the recommended way around that is to wrap ``vmalloc``
|
| /kernel/linux/linux-6.6/Documentation/devicetree/bindings/crypto/ |
| D | fsl,sec-v4.0-mon.yaml | 18 violations. This also included rtc, system power off and ON/OFF key.
|
| /kernel/linux/linux-5.10/Documentation/devicetree/bindings/powerpc/fsl/ |
| D | pamu.txt | 22 interrupt, used for reporting access violations. The second
|
| /kernel/linux/linux-6.6/Documentation/devicetree/bindings/powerpc/fsl/ |
| D | pamu.txt | 22 interrupt, used for reporting access violations. The second
|
| /kernel/linux/linux-6.6/tools/workqueue/ |
| D | wq_monitor.py | 69 PWQ_STAT_CPU_INTENSIVE = prog['PWQ_STAT_CPU_INTENSIVE'] # wq_cpu_intensive_thresh_us violations
|
| /kernel/linux/linux-6.6/arch/x86/coco/tdx/ |
| D | tdx.c | 278 * violations. 292 * For EPT violations, ve->insn_len is not defined. For those, in ve_instr_len() 296 WARN_ONCE(1, "ve->instr_len is not defined for EPT violations"); in ve_instr_len()
|
| /kernel/linux/linux-6.6/drivers/infiniband/hw/qib/ |
| D | qib_mad.h | 194 __be16 violations; member
|