Searched refs:untrusted (Results 1 – 23 of 23) sorted by relevance
/Linux-v5.10/drivers/gpu/drm/vc4/ |
D | vc4_validate.c | 53 void *untrusted 135 validate_bin_pos(struct vc4_exec_info *exec, void *untrusted, uint32_t pos) in validate_bin_pos() argument 140 return (untrusted - 1 == exec->bin_u + pos); in validate_bin_pos() 216 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 1)) { in validate_flush() 245 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 2)) { in validate_increment_semaphore() 259 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_indexed_prim_list() 260 uint32_t offset = *(uint32_t *)(untrusted + 5); in validate_indexed_prim_list() 261 uint32_t max_index = *(uint32_t *)(untrusted + 9); in validate_indexed_prim_list() 262 uint32_t index_size = (*(uint8_t *)(untrusted + 0) >> 4) ? 2 : 1; in validate_indexed_prim_list() 297 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_gl_array_primitive() [all …]
|
/Linux-v5.10/Documentation/admin-guide/hw-vuln/ |
D | l1tf.rst | 258 which run untrusted guests, reduces the attack vector space. 260 Whether the interrupts with are affine to CPUs, which run untrusted 472 3. Virtualization with untrusted guests 521 affinity to the CPUs which run the untrusted guests can depending on 590 SMT systems vulnerable when running untrusted guests with EPT enabled. 597 - If regular users run untrusted guests on their machine, then L1TF is 598 just an add on to other malware which might be embedded in an untrusted 601 There is no technical way to prevent a user from running untrusted code
|
D | multihit.rst | 163 3. Virtualization with untrusted guests 165 If the guest comes from an untrusted source, the guest host kernel will need
|
D | mds.rst | 281 execute untrusted code which is supplied externally, then the mitigation 290 3. Virtualization with untrusted guests 309 SMT systems vulnerable when running untrusted code. The same rationale as
|
D | tsx_async_abort.rst | 254 untrusted code which is supplied externally, then the mitigation can be 261 If there are untrusted applications or guests on the system, enabling TSX
|
D | spectre.rst | 306 If SMT is used, Spectre variant 2 attacks from an untrusted guest 528 in use, an untrusted guest running in the sibling thread can have 659 execute externally supplied untrusted code, then the mitigations can 670 3. Sandbox untrusted programs 676 This prevents untrusted programs from polluting the branch target
|
/Linux-v5.10/drivers/pci/ |
D | ats.c | 45 return (dev->untrusted == 0); in pci_ats_supported()
|
D | probe.c | 1573 if (parent && (parent->untrusted || parent->external_facing)) in set_pcie_untrusted() 1574 dev->untrusted = true; in set_pcie_untrusted()
|
D | pci.c | 889 if (dev->external_facing || dev->untrusted) in pci_std_enable_acs()
|
D | quirks.c | 4941 if (dev->external_facing || dev->untrusted) in pci_quirk_enable_intel_spt_pch_acs()
|
/Linux-v5.10/certs/ |
D | Kconfig | 73 Keys in the keyring are considered entirely untrusted. Keys in this
|
/Linux-v5.10/Documentation/x86/ |
D | mds.rst | 65 There is one exception, which is untrusted BPF. The functionality of 66 untrusted BPF is limited, but it needs to be thoroughly investigated
|
D | exception-tables.rst | 10 mode memory whose address has been passed by an untrusted program.
|
/Linux-v5.10/Documentation/admin-guide/aoe/ |
D | aoe.rst | 53 untrusted networks should be ignored as a matter of security. See
|
/Linux-v5.10/Documentation/networking/ |
D | ipvlan.rst | 132 (c) If the slave device is to be put into the hostile / untrusted network
|
/Linux-v5.10/Documentation/admin-guide/LSM/ |
D | SafeSetID.rst | 35 other untrusted uids without full blown CAP_SETUID capabilities. The non-root
|
/Linux-v5.10/Documentation/filesystems/ |
D | overlayfs.rst | 361 Do not use metacopy=on with untrusted upper/lower directories. Otherwise 366 for untrusted layers like from a pen drive.
|
/Linux-v5.10/arch/ |
D | Kconfig | 491 prompt "Enable seccomp to safely execute untrusted bytecode" 496 that may need to handle untrusted bytecode during their
|
/Linux-v5.10/drivers/iommu/intel/ |
D | iommu.c | 386 to_pci_dev(d)->untrusted) 2923 if (pdev->untrusted) in device_def_domain_type() 3574 if (intel_iommu_strict || (pdev && pdev->untrusted) || in intel_unmap() 6080 if (pdev->untrusted) { in risky_device()
|
/Linux-v5.10/include/linux/ |
D | pci.h | 435 unsigned int untrusted:1; member
|
/Linux-v5.10/Documentation/networking/device_drivers/ethernet/intel/ |
D | i40e.rst | 82 To set a VF as trusted or untrusted, enter the following command in the
|
/Linux-v5.10/Documentation/admin-guide/ |
D | cgroup-v2.rst | 2634 child's own (possibly untrusted) configuration. However, untrusted 2637 swappability when overcommitting untrusted jobs.
|
D | kernel-parameters.txt | 1887 Disable bounce buffer for untrusted devices such as 1888 the Thunderbolt devices. This will treat the untrusted
|