Searched refs:malicious (Results 1 – 17 of 17) sorted by relevance
/Linux-v4.19/Documentation/admin-guide/ |
D | l1tf.rst | 55 opportunity for side channel attacks to unprivileged malicious code, 72 PTE which is marked non present. This allows a malicious user space 84 malicious user space applications. 89 The fact that L1TF breaks all domain protections allows malicious guest 90 OSes, which can control the PTEs directly, and malicious guest user 98 only to attack data which is present in L1D, a malicious guest running 161 The kernel is unconditionally protected against L1TF attacks from malicious 177 by a potentially malicious guest, it also flushes the guest 514 further, but still allows a malicious guest to explore a limited amount 578 - PTE inversion to protect against malicious user space. This is done
|
D | module-signing.rst | 25 making it harder to load a malicious module into the kernel. The module
|
D | cgroup-v2.rst | 2119 malicious applications.
|
/Linux-v4.19/Documentation/mmc/ |
D | mmc-dev-parts.txt | 39 not accessible through sysfs in order to avoid accidental or malicious
|
/Linux-v4.19/Documentation/security/keys/ |
D | ecryptfs.rst | 37 threats of malicious software, because it is available in clear form only at
|
/Linux-v4.19/Documentation/device-mapper/ |
D | dm-integrity.txt | 133 Protect sector numbers in the journal from accidental or malicious 135 crc algorithm, to protect against malicious modification, use a
|
/Linux-v4.19/Documentation/networking/ |
D | igb.txt | 97 When a malicious driver attempts to send a spoofed packet, it is dropped by
|
D | i40e.txt | 152 When a malicious driver attempts to send a spoofed packet, it is dropped by
|
D | ixgbe.txt | 289 When a malicious driver attempts to send a spoofed packet, it is dropped by
|
D | ip-sysctl.txt | 329 a buggy or malicious middlebox or man-in-the-middle can
|
/Linux-v4.19/drivers/net/ethernet/broadcom/bnx2x/ |
D | bnx2x_sriov.h | 144 bool malicious; /* true if FW indicated so, until FLR */ member
|
D | bnx2x_sriov.c | 904 vf->malicious = false; in bnx2x_vf_flr() 1835 vf->malicious = true; in bnx2x_iov_eq_sp_event() 1917 if (vf->malicious) { in bnx2x_iov_adjust_stats_req()
|
/Linux-v4.19/Documentation/process/ |
D | maintainer-pgp-guide.rst | 693 that their copy of linux.git has not been tampered with by a malicious 833 developer and not to a malicious imposter? 913 importing a malicious key. 958 administrators of the PGP Pathfinder service to not be malicious (in
|
/Linux-v4.19/Documentation/filesystems/ |
D | fuse.txt | 210 in all cases except some malicious deadlocks
|
/Linux-v4.19/Documentation/target/ |
D | tcmu-design.txt | 253 Userspace handler process is malicious:
|
/Linux-v4.19/Documentation/filesystems/configfs/ |
D | configfs.txt | 73 To avoid a malicious user OOMing the kernel, there's a per-binary attribute
|
/Linux-v4.19/arch/x86/ |
D | Kconfig | 2326 malicious userspace programs can be identified.
|