Home
last modified time | relevance | path

Searched full:exploited (Results 1 – 23 of 23) sorted by relevance

/linux/Documentation/arch/x86/
H A Dmds.rst20 memory address, which can be exploited under certain conditions. Store
31 be exploited under certain conditions. Fill buffers are shared between
39 exploited eventually. Load ports are shared between Hyper-Threads so cross
/linux/Documentation/admin-guide/hw-vuln/
H A Dattack_vector_controls.rst37 all memory in the system, depending on the vulnerability exploited.
77 exploited.
H A Dl1tf.rst605 impossible that L1TF can be exploited via the most popular attack
/linux/Documentation/process/
H A Dmaintainer-kvm-x86.rst386 Bugs that can be exploited by the guest to attack the host (kernel or
387 userspace), or that can be exploited by a nested VM to *its* host (L2 attacking
H A Dstable-kernel-rules.rst28 condition", unless an explanation of how the bug can be exploited is also
/linux/Documentation/tee/
H A Dop-tee.rst135 OP-TEE can be exploited to then load an alternate OS image.
/linux/tools/perf/Documentation/
H A Dperf-amd-ibs.txt26 Both, IBS Op and IBS Fetch, are exposed as PMUs by Linux and can be exploited
/linux/fs/orangefs/
H A Dprotocol.h175 * max extended attribute name len as imposed by the VFS and exploited for the
/linux/Documentation/security/
H A Dself-protection.rst15 cases, bugs being exploited will not provide this level of access,
/linux/arch/arm/include/asm/
H A Duaccess.h27 * be exploited for priviledge escalation.
/linux/net/dccp/ccids/
H A Dccid2.c
/linux/Documentation/networking/
H A Dscaling.rst55 input entropy and could potentially be exploited.
/linux/drivers/net/ethernet/netronome/nfp/
H A Dnfp_net.h451 /* This byte can be exploited for more use, currently,
/linux/block/
H A Dbfq-iosched.h91 * optimization, not yet exploited: while a given entity is still in
/linux/security/apparmor/
H A Dpolicy.c51 * is preserved. This feature isn't exploited by AppArmor reference policy
/linux/arch/m68k/fpsp040/
H A Dsetox.S269 | will all be exact --- a property that will be exploited
/linux/arch/x86/kernel/
H A Dtraps.c1496 * and can be exploited for privilege escalation. Exceptions in the NMI
/linux/fs/ocfs2/
H A Djournal.c279 /* XXX: Can this be exploited? Not from o2dlm... */ in ocfs2_recovery_map_set()
/linux/mm/
H A Dvmstat.c432 * in between and therefore the atomicity vs. interrupt cannot be exploited
/linux/include/uapi/linux/
H A Dethtool.h2289 * be exploited to reduce the RSS queue spread.
/linux/arch/x86/
H A DKconfig1821 On the other hand it has been shown that TSX can be exploited
/linux/arch/m68k/ifpsp060/src/
H A Dfplsp.S6936 # be exploited in Step 6 below. The total relative error #
H A Dfpsp.S7042 # be exploited in Step 6 below. The total relative error #