| /OK3568_Linux_fs/kernel/security/integrity/ima/ |
| H A D | ima_fs.c | 55 return ima_show_htable_value(buf, count, ppos, &ima_htable.violations); in ima_show_htable_violations() 364 static struct dentry *violations; variable 485 violations = in ima_fs_init() 488 if (IS_ERR(violations)) in ima_fs_init() 500 securityfs_remove(violations); in ima_fs_init()
|
| H A D | ima_queue.c | 37 .violations = ATOMIC_LONG_INIT(0),
|
| H A D | ima_api.c | 147 atomic_long_inc(&ima_htable.violations); in ima_add_violation()
|
| H A D | ima.h | 178 atomic_long_t violations; member
|
| /OK3568_Linux_fs/kernel/arch/ia64/ |
| H A D | Kconfig.debug | 22 bool "Print possible IA-64 dependency violations to console" 27 or Write-after-Read (WAR) violations. This option is ignored if you
|
| /OK3568_Linux_fs/kernel/Documentation/process/ |
| H A D | submit-checklist.rst | 39 Check for trivial violations with the patch style checker prior to 41 You should be able to justify all violations that remain in
|
| H A D | submitting-patches.rst | 180 Check your patch for basic style violations, details of which can be 204 You should be able to justify all violations that remain in your
|
| /OK3568_Linux_fs/kernel/drivers/infiniband/hw/qib/ |
| H A D | qib_mad.h | 194 __be16 violations; member
|
| /OK3568_Linux_fs/kernel/Documentation/core-api/ |
| H A D | gfp_mask-from-fs-io.rst | 67 layering violations then the recommended way around that is to wrap ``vmalloc``
|
| /OK3568_Linux_fs/u-boot/drivers/misc/ |
| H A D | Kconfig | 176 like software violations or hardware security violations.
|
| /OK3568_Linux_fs/kernel/Documentation/ia64/ |
| H A D | mca.rst | 117 violations. Unfortunately MCA/INIT start off as massive layer 118 violations (can occur at _any_ time) and they build from there.
|
| /OK3568_Linux_fs/yocto/poky/meta/files/common-licenses/ |
| H A D | PolyForm-Noncommercial-1.0.0 | 99 and take practical steps to correct past violations, within
|
| H A D | PolyForm-Small-Business-1.0.0 | 89 and take practical steps to correct past violations, within
|
| H A D | CC-BY-ND-4.0 | 130 …s not affect any right the Licensor may have to seek remedies for Your violations of this Public L…
|
| H A D | CC-BY-4.0 | 132 …s not affect any right the Licensor may have to seek remedies for Your violations of this Public L…
|
| H A D | CC-BY-NC-ND-4.0 | 131 …s not affect any right the Licensor may have to seek remedies for Your violations of this Public L…
|
| H A D | CC-BY-NC-SA-4.0 | 146 …s not affect any right the Licensor may have to seek remedies for Your violations of this Public L…
|
| H A D | CC-BY-NC-4.0 | 134 …s not affect any right the Licensor may have to seek remedies for Your violations of this Public L…
|
| H A D | CC-BY-SA-4.0 | 362 right the Licensor may have to seek remedies for Your violations
|
| /OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/powerpc/fsl/ |
| H A D | pamu.txt | 22 interrupt, used for reporting access violations. The second
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/include/c++/10.3.1/ |
| H A D | stdexcept | 110 * program runs (e.g., violations of class invariants).
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/include/c++/10.3.1/ |
| H A D | stdexcept | 110 * program runs (e.g., violations of class invariants).
|
| /OK3568_Linux_fs/kernel/security/ |
| H A D | Kconfig | 156 bool "Allow usercopy whitelist violations to fallback to object size"
|
| /OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/crypto/ |
| H A D | fsl-sec4.txt | 314 security violations. This also included rtc,
|
| /OK3568_Linux_fs/kernel/arch/ |
| H A D | Kconfig | 726 When selected, Control Flow Integrity (CFI) violations result in a 728 CFI violations during development.
|