Searched full:hardened (Results 1 – 19 of 19) sorted by relevance
17 * normally be ignored by hardened usercopy, so force the compiler19 * hardened usercopy checks by added "unconst" to all the const copies,131 * This checks for whole-object size validation with hardened usercopy,
37 # GCC hardened also auto-enables -fpic, but we need %ebx so it can't work ->
31 echo "[ JIT enabled:$1 hardened:$2 ]"
24 (e.g. hardened Linux distributions or hermetic container images) could use
128 /* Whitelist the fstate from the task_struct for hardened usercopy */
205 Many drivers for VMBus devices have been "hardened" by adding code to fully209 CoCo VM have not been hardened, and they are not allowed to load in a CoCo
219 driver is specifically documented as being hardened against untrusted media.
18 the moment, most hardened security environments require a discrete
228 * by the Core Power Reduction hardened (CPRh) and the
197 * by the Core Power Reduction hardened (CPRh) and the
431 * by the Core Power Reduction hardened (CPRh) and the
153 * Whitelisted fields for hardened usercopy:
499 SDFEC(16nm) hardened block. To compile this as a module choose M.
220 compiler, though one could imagine hardened kernel builds treating the
129 * triggers one of hardened usercopy checks. in iscsi_tcp_segment_map()
95 * triggers one of hardened usercopy checks. in ceph_tcp_sendpage()
165 * which triggers one of hardened usercopy checks. in do_try_sendpage()
1942 hardening is enabled for this boot. Hardened1950 on Perform hardened usercopy checks.1951 off Disable hardened usercopy checks.6999 allocs to different slabs, especially in hardened
3102 * Hardened version of skb_reset_transport_header().