Home
last modified time | relevance | path

Searched refs:malicious (Results 1 – 17 of 17) sorted by relevance

/Linux-v4.19/Documentation/admin-guide/
Dl1tf.rst55 opportunity for side channel attacks to unprivileged malicious code,
72 PTE which is marked non present. This allows a malicious user space
84 malicious user space applications.
89 The fact that L1TF breaks all domain protections allows malicious guest
90 OSes, which can control the PTEs directly, and malicious guest user
98 only to attack data which is present in L1D, a malicious guest running
161 The kernel is unconditionally protected against L1TF attacks from malicious
177 by a potentially malicious guest, it also flushes the guest
514 further, but still allows a malicious guest to explore a limited amount
578 - PTE inversion to protect against malicious user space. This is done
Dmodule-signing.rst25 making it harder to load a malicious module into the kernel. The module
Dcgroup-v2.rst2119 malicious applications.
/Linux-v4.19/Documentation/mmc/
Dmmc-dev-parts.txt39 not accessible through sysfs in order to avoid accidental or malicious
/Linux-v4.19/Documentation/security/keys/
Decryptfs.rst37 threats of malicious software, because it is available in clear form only at
/Linux-v4.19/Documentation/device-mapper/
Ddm-integrity.txt133 Protect sector numbers in the journal from accidental or malicious
135 crc algorithm, to protect against malicious modification, use a
/Linux-v4.19/Documentation/networking/
Digb.txt97 When a malicious driver attempts to send a spoofed packet, it is dropped by
Di40e.txt152 When a malicious driver attempts to send a spoofed packet, it is dropped by
Dixgbe.txt289 When a malicious driver attempts to send a spoofed packet, it is dropped by
Dip-sysctl.txt329 a buggy or malicious middlebox or man-in-the-middle can
/Linux-v4.19/drivers/net/ethernet/broadcom/bnx2x/
Dbnx2x_sriov.h144 bool malicious; /* true if FW indicated so, until FLR */ member
Dbnx2x_sriov.c904 vf->malicious = false; in bnx2x_vf_flr()
1835 vf->malicious = true; in bnx2x_iov_eq_sp_event()
1917 if (vf->malicious) { in bnx2x_iov_adjust_stats_req()
/Linux-v4.19/Documentation/process/
Dmaintainer-pgp-guide.rst693 that their copy of linux.git has not been tampered with by a malicious
833 developer and not to a malicious imposter?
913 importing a malicious key.
958 administrators of the PGP Pathfinder service to not be malicious (in
/Linux-v4.19/Documentation/filesystems/
Dfuse.txt210 in all cases except some malicious deadlocks
/Linux-v4.19/Documentation/target/
Dtcmu-design.txt253 Userspace handler process is malicious:
/Linux-v4.19/Documentation/filesystems/configfs/
Dconfigfs.txt73 To avoid a malicious user OOMing the kernel, there's a per-binary attribute
/Linux-v4.19/arch/x86/
DKconfig2326 malicious userspace programs can be identified.