/openbmc/linux/drivers/soc/mediatek/ |
H A D | mtk-devapc.c | 47 /* numbers of violation index */ 103 * devapc_sync_vio_dbg - do "shift" mechansim" to get full violation information. 106 * When violation is triggered, violation info is kept 108 * Driver should do shift mechansim to sync full violation 128 /* Find the minimum shift group which has violation */ in devapc_sync_vio_dbg() 144 dev_err(ctx->dev, "%s: Shift violation info failed\n", __func__); in devapc_sync_vio_dbg() 158 * devapc_extract_vio_dbg - extract full violation information after doing 173 /* Print violation information */ in devapc_extract_vio_dbg() 175 dev_info(ctx->dev, "Write Violation\n"); in devapc_extract_vio_dbg() 177 dev_info(ctx->dev, "Read Violation\n"); in devapc_extract_vio_dbg() [all …]
|
H A D | Kconfig | 24 This driver is mainly used to handle the violation which catches 26 The violation information is logged for further analysis or
|
/openbmc/linux/Documentation/process/ |
H A D | kernel-enforcement-statement.rst | 26 However, if you cease all violation of this License, then your license 30 fails to notify you of the violation by some reasonable means prior to 35 violation by some reasonable means, this is the first time you have 36 received notice of violation of this License (for any work) from that 37 copyright holder, and you cure the violation prior to 30 days after
|
H A D | code-of-conduct-interpretation.rst | 52 considered a violation report unless you want it to be. If you are 77 rejecting unsuitable contributions are not viewed as a violation of the 82 have to set priorities. This, also, is not to be seen as a violation of 115 addressed now as a violation. Inappropriate language can be seen as a
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | Elastic-2.0 | 58 If you use the software in violation of these terms, such use is not licensed, 60 with a notice of your violation, and you cease all violation of this license no 63 reinstatement, any additional violation of these terms will cause your licenses
|
H A D | CC-BY-NC-SA-2.0-FR | 23 …'exercer des droits dans le cadre du présent contrat malgré une précédente violation de ce contrat. 63 …violation des droits de tiers, notamment du droit de la propriété littéraire et artistique, du dro… 67 …par le régime de la responsabilité vis-à-vis d'un tiers en raison de la violation des garanties pr…
|
H A D | GFDL-1.3-no-invariants-or-later | 113 …violation of this License, then your license from a particular copyright holder is reinstated (a) … 115 …violation by some reasonable means, this is the first time you have received notice of violation o…
|
/openbmc/linux/security/integrity/ima/ |
H A D | ima_api.c | 103 int violation, struct inode *inode, in ima_store_template() argument 111 if (!violation) { in ima_store_template() 122 result = ima_add_template_entry(entry, violation, op, inode, filename); in ima_store_template() 127 * ima_add_violation - add violation to measurement list. 142 .violation = cause }; in ima_add_violation() 143 int violation = 1; in ima_add_violation() local 154 result = ima_store_template(entry, violation, inode, in ima_add_violation() 362 int violation = 0; in ima_store_measurement() local 380 result = ima_store_template(entry, violation, inode, filename, pcr); in ima_store_measurement()
|
H A D | ima_template_lib.c | 325 * If digest is NULL, the event being recorded is a violation. in ima_eventdigest_init_common() 355 if (event_data->violation) /* recording a violation. */ in ima_eventdigest_init() 412 if (event_data->violation) /* recording a violation. */ in ima_eventdigest_ng_init() 436 if (event_data->violation) /* recording a violation. */ in ima_eventdigest_ngv2_init() 465 if (event_data->violation) { in ima_eventdigest_modsig_init() 466 /* Recording a violation. */ in ima_eventdigest_modsig_init()
|
H A D | ima_queue.c | 159 int ima_add_template_entry(struct ima_template_entry *entry, int violation, in ima_add_template_entry() argument 171 if (!violation && !IS_ENABLED(CONFIG_IMA_DISABLE_HTABLE)) { in ima_add_template_entry() 187 if (violation) /* invalidate pcr */ in ima_add_template_entry()
|
H A D | ima_init.c | 52 int violation = 0; in ima_add_boot_aggregate() local 86 result = ima_store_template(entry, violation, NULL, in ima_add_boot_aggregate()
|
/openbmc/u-boot/arch/arc/cpu/arcv1/ |
H A D | ivt.S | 22 j EV_TLBProtV /* 0x118, Protection Violation (0x23) 24 j EV_PrivilegeV /* 0x120, Privilege Violation (0x24) */
|
/openbmc/u-boot/arch/arc/cpu/arcv2/ |
H A D | ivt.S | 17 .word EV_TLBProtV /* 0x06 - Protection Violation or Misaligned Access */ 18 .word EV_PrivilegeV /* 0x07 - Privilege Violation */
|
/openbmc/linux/arch/arc/kernel/ |
H A D | entry-compact.S | 32 * exception. Thus FAKE RTIE needed in low level Priv-Violation handler. 107 VECTOR EV_TLBProtV ; 0x118, Protection Violation (0x23) 109 VECTOR EV_PrivilegeV ; 0x120, Privilege Violation (0x24) 252 ; Protection Violation Exception Handler 259 ;------ (5) Type of Protection Violation? ---------- 262 ; -Access Violation : 00_23_(00|01|02|03)_00 267 ;========= (6a) Access Violation Processing ========
|
H A D | entry-arcv2.S | 36 VECTOR EV_TLBProtV ; Protection Violation 37 VECTOR EV_PrivilegeV ; Privilege Violation 149 ; Protection Violation Exception Handler
|
/openbmc/u-boot/include/ |
H A D | fsl_sec_mon.h | 37 #define HPCOMR_SW_SV 0x100 /* Security Violation bit */ 38 #define HPCOMR_SW_FSV 0x200 /* Fatal Security Violation bit */
|
/openbmc/linux/drivers/rtc/ |
H A D | rtc-imxdi.c | 72 #define DSR_SVF (1 << 0) /* Security Violation Flag */ 79 #define DIER_SVIE (1 << 0) /* Security-violation Interrupt Enable */ 295 "The security violation has happened at %u seconds\n", in di_handle_invalid_state() 388 * now we are trying to clear the "Security-violation flag" to in di_handle_invalid_and_failure_state() 397 "Cannot clear the security violation flag. We are ending up in an endless loop!\n"); in di_handle_invalid_and_failure_state() 658 * interrupt handler for dryice "normal" and security violation interrupt 669 /* handle the security violation event */ in dryice_irq() 681 /* report the violation */ in dryice_irq() 764 /* the 2nd irq is the security violation irq in dryice_rtc_probe() 809 dev_warn(&pdev->dev, "security violation interrupt not available.\n"); in dryice_rtc_probe()
|
/openbmc/qemu/docs/devel/ |
H A D | control-flow-integrity.rst | 26 In case of a CFI violation (i.e. call to a non-compatible function) QEMU will 47 of a CFI violation is offered (``--enable-debug-cfi``). 53 violation, the binary will terminate with an illegal instruction signal.
|
/openbmc/linux/arch/nios2/mm/ |
H A D | fault.c | 34 #define EXC_X_PROTECTION_FAULT 13 /* TLB permission violation (x) */ 35 #define EXC_R_PROTECTION_FAULT 14 /* TLB permission violation (r) */ 36 #define EXC_W_PROTECTION_FAULT 15 /* TLB permission violation (w) */
|
/openbmc/u-boot/drivers/misc/ |
H A D | fsl_sec_mon.c | 28 * Security Violation Bit and transition to Non-Secure State. in set_sec_mon_state_non_sec() 54 * the Software Security Violation Bit and transition to Soft-Fail in set_sec_mon_state_non_sec()
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-bus-pci-devices-aer_stats | 56 ACS Violation 0 86 ACS Violation 0
|
/openbmc/libcper/ |
H A D | json-schema.c | 168 …"Desired field type not provided within schema/is not a string for field '%s' (schema violation).", in validate_field() 204 //If the "oneOf" member isn't an object, warn on schema violation. in validate_field() 211 "Schema Warning: 'oneOf' member for field '%s' is not an object, schema violation.", in validate_field() 332 "Required field for object '%s' is not a string (schema violation).", in validate_object()
|
/openbmc/u-boot/arch/arc/lib/ |
H A D | interrupts.c | 121 printf("TLB protection violation or misaligned access @ 0x%lx\n", in do_tlb_prot_violation() 128 printf("Privilege violation exception\n"); in do_privilege_violation()
|
/openbmc/linux/drivers/memory/tegra/ |
H A D | mc.c | 740 [ 8] = "Security violation", 744 [12] = "VPR violation", 745 [13] = "Secure carveout violation", 746 [16] = "MTS carveout violation", 747 [17] = "Generalized carveout violation", 753 [3] = "TrustZone violation", 754 [4] = "Carveout violation",
|
/openbmc/linux/lib/ |
H A D | Kconfig.ubsan | 31 when a UBSAN violation occurs. (Except on arm64 and x86, which 34 out the details of a UBSAN violation. It makes the kernel log
|