Searched refs:malicious (Results 1 – 25 of 31) sorted by relevance
12
/Linux-v5.10/Documentation/admin-guide/hw-vuln/ |
D | l1tf.rst | 55 opportunity for side channel attacks to unprivileged malicious code, 72 PTE which is marked non present. This allows a malicious user space 84 malicious user space applications. 89 The fact that L1TF breaks all domain protections allows malicious guest 90 OSes, which can control the PTEs directly, and malicious guest user 98 only to attack data which is present in L1D, a malicious guest running 161 The kernel is unconditionally protected against L1TF attacks from malicious 177 by a potentially malicious guest, it also flushes the guest 518 further, but still allows a malicious guest to explore a limited amount 582 - PTE inversion to protect against malicious user space. This is done
|
D | multihit.rst | 8 or cache type. A malicious guest running on a virtualized system can 62 Attacks against the iTLB multihit erratum can be mounted from malicious
|
D | mds.rst | 53 incorrect program execution or state changes. But a malicious operation 67 Attacks against the MDS vulnerabilities can be mounted from malicious non 221 for malicious user space. The exposure can be disabled on the kernel
|
D | tsx_async_abort.rst | 61 The victim of a malicious actor does not need to make use of TSX. Only the 77 a result, the malicious actor has to sample as much data as possible and 262 might allow a malicious actor to leak data from the host or from other
|
D | spectre.rst | 128 (BTB) may be shared between hardware threads in a CPU core. A malicious 220 A malicious user process can try to attack another user process, 484 target buffer left by malicious software. Alternatively, the
|
/Linux-v5.10/Documentation/driver-api/mmc/ |
D | mmc-dev-parts.rst | 40 not accessible through sysfs in order to avoid accidental or malicious
|
/Linux-v5.10/fs/verity/ |
D | Kconfig | 28 protection against malicious disks vs. an ahead-of-time hash.
|
/Linux-v5.10/Documentation/security/keys/ |
D | ecryptfs.rst | 37 threats of malicious software, because it is available in clear form only at
|
/Linux-v5.10/Documentation/devicetree/bindings/pci/ |
D | pci.txt | 72 malicious devices to this port.
|
/Linux-v5.10/Documentation/x86/ |
D | mds.rst | 109 data cannot be controlled in a way which allows exploitation from malicious 184 flushed either on exit to user space or on VMENTER so malicious code
|
/Linux-v5.10/drivers/firmware/efi/ |
D | Kconfig | 229 kernel. System firmware may configure the IOMMU to prevent malicious 238 any malicious PCI devices from being able to perform DMA until the
|
/Linux-v5.10/Documentation/admin-guide/device-mapper/ |
D | dm-integrity.rst | 156 Protect sector numbers in the journal from accidental or malicious 158 crc algorithm, to protect against malicious modification, use a
|
/Linux-v5.10/Documentation/userspace-api/ |
D | iommu.rst | 79 4. A malicious/misbehaving user passing illegal/invalid size but within
|
/Linux-v5.10/drivers/net/ethernet/broadcom/bnx2x/ |
D | bnx2x_sriov.h | 145 bool malicious; /* true if FW indicated so, until FLR */ member
|
D | bnx2x_sriov.c | 884 vf->malicious = false; in bnx2x_vf_flr() 1817 vf->malicious = true; in bnx2x_iov_eq_sp_event() 1899 if (vf->malicious) { in bnx2x_iov_adjust_stats_req()
|
/Linux-v5.10/Documentation/networking/device_drivers/ethernet/intel/ |
D | igb.rst | 164 When a malicious driver attempts to send a spoofed packet, it is dropped by the
|
D | ixgbe.rst | 491 When a malicious driver attempts to send a spoofed packet, it is dropped by the
|
/Linux-v5.10/Documentation/process/ |
D | maintainer-pgp-guide.rst | 696 that their copy of linux.git has not been tampered with by a malicious 836 developer and not to a malicious imposter? 916 importing a malicious key. 961 administrators of the PGP Pathfinder service to not be malicious (in
|
/Linux-v5.10/Documentation/driver-api/ |
D | dma-buf.rst | 206 protect against malicious userspace:
|
/Linux-v5.10/drivers/infiniband/ulp/rtrs/ |
D | README | 57 (always_invalidate=N), if he understands and can take the risk of a malicious
|
/Linux-v5.10/Documentation/admin-guide/ |
D | module-signing.rst | 25 making it harder to load a malicious module into the kernel. The module
|
/Linux-v5.10/Documentation/filesystems/ |
D | fsverity.rst | 42 protection, i.e. detection of accidental (non-malicious) corruption. 46 authentication (detection of malicious modifications) or auditing 64 time it's paged in. This ensures that malicious disk firmware can't
|
D | fuse.rst | 196 in all cases except some malicious deadlocks
|
D | ubifs-authentication.rst | 24 binary to perform a malicious action when executed [DMC-CBC-ATTACK]. Since
|
/Linux-v5.10/Documentation/target/ |
D | tcmu-design.rst | 277 Userspace handler process is malicious:
|
12