Home
last modified time | relevance | path

Searched full:exploited (Results 1 – 22 of 22) sorted by relevance

/linux/Documentation/arch/x86/
H A Dmds.rst20 memory address, which can be exploited under certain conditions. Store
31 be exploited under certain conditions. Fill buffers are shared between
39 exploited eventually. Load ports are shared between Hyper-Threads so cross
/linux/Documentation/admin-guide/hw-vuln/
H A Dattack_vector_controls.rst37 all memory in the system, depending on the vulnerability exploited.
77 exploited.
H A Dl1tf.rst605 impossible that L1TF can be exploited via the most popular attack
H A Dspectre.rst224 There may be gadget code in firmware which could be exploited with
/linux/Documentation/process/
H A Dmaintainer-kvm-x86.rst386 Bugs that can be exploited by the guest to attack the host (kernel or
387 userspace), or that can be exploited by a nested VM to *its* host (L2 attacking
H A Dstable-kernel-rules.rst28 condition", unless an explanation of how the bug can be exploited is also
/linux/Documentation/tee/
H A Dop-tee.rst135 OP-TEE can be exploited to then load an alternate OS image.
/linux/tools/perf/Documentation/
H A Dperf-amd-ibs.txt26 Both, IBS Op and IBS Fetch, are exposed as PMUs by Linux and can be exploited
/linux/fs/orangefs/
H A Dprotocol.h175 * max extended attribute name len as imposed by the VFS and exploited for the
/linux/Documentation/security/
H A Dself-protection.rst15 cases, bugs being exploited will not provide this level of access,
/linux/Documentation/core-api/
H A Dprintk-formats.rst189 exploited anyway, and with %px there would be no need to reproduce the panic
/linux/net/dccp/ccids/
H A Dccid2.c
/linux/Documentation/networking/
H A Dscaling.rst55 input entropy and could potentially be exploited.
/linux/drivers/net/ethernet/netronome/nfp/
H A Dnfp_net.h451 /* This byte can be exploited for more use, currently,
/linux/block/
H A Dbfq-iosched.h91 * optimization, not yet exploited: while a given entity is still in
/linux/security/apparmor/
H A Dpolicy.c51 * is preserved. This feature isn't exploited by AppArmor reference policy
/linux/arch/m68k/fpsp040/
H A Dsetox.S269 | will all be exact --- a property that will be exploited
/linux/fs/ocfs2/
H A Djournal.c279 /* XXX: Can this be exploited? Not from o2dlm... */ in ocfs2_recovery_map_set()
/linux/mm/
H A Dvmstat.c432 * in between and therefore the atomicity vs. interrupt cannot be exploited
/linux/arch/x86/
H A DKconfig1825 On the other hand it has been shown that TSX can be exploited
/linux/arch/m68k/ifpsp060/src/
H A Dfplsp.S6936 # be exploited in Step 6 below. The total relative error #
H A Dfpsp.S7042 # be exploited in Step 6 below. The total relative error #