Searched full:exploited (Results 1 – 23 of 23) sorted by relevance
/linux/Documentation/arch/x86/ |
H A D | mds.rst | 20 memory address, which can be exploited under certain conditions. Store 31 be exploited under certain conditions. Fill buffers are shared between 39 exploited eventually. Load ports are shared between Hyper-Threads so cross
|
/linux/Documentation/admin-guide/hw-vuln/ |
H A D | attack_vector_controls.rst | 37 all memory in the system, depending on the vulnerability exploited. 77 exploited.
|
H A D | l1tf.rst | 605 impossible that L1TF can be exploited via the most popular attack
|
/linux/Documentation/process/ |
H A D | maintainer-kvm-x86.rst | 386 Bugs that can be exploited by the guest to attack the host (kernel or 387 userspace), or that can be exploited by a nested VM to *its* host (L2 attacking
|
H A D | stable-kernel-rules.rst | 28 condition", unless an explanation of how the bug can be exploited is also
|
/linux/Documentation/tee/ |
H A D | op-tee.rst | 135 OP-TEE can be exploited to then load an alternate OS image.
|
/linux/tools/perf/Documentation/ |
H A D | perf-amd-ibs.txt | 26 Both, IBS Op and IBS Fetch, are exposed as PMUs by Linux and can be exploited
|
/linux/fs/orangefs/ |
H A D | protocol.h | 175 * max extended attribute name len as imposed by the VFS and exploited for the
|
/linux/Documentation/security/ |
H A D | self-protection.rst | 15 cases, bugs being exploited will not provide this level of access,
|
/linux/arch/arm/include/asm/ |
H A D | uaccess.h | 27 * be exploited for priviledge escalation.
|
/linux/net/dccp/ccids/ |
H A D | ccid2.c |
|
/linux/Documentation/networking/ |
H A D | scaling.rst | 55 input entropy and could potentially be exploited.
|
/linux/drivers/net/ethernet/netronome/nfp/ |
H A D | nfp_net.h | 451 /* This byte can be exploited for more use, currently,
|
/linux/block/ |
H A D | bfq-iosched.h | 91 * optimization, not yet exploited: while a given entity is still in
|
/linux/security/apparmor/ |
H A D | policy.c | 51 * is preserved. This feature isn't exploited by AppArmor reference policy
|
/linux/arch/m68k/fpsp040/ |
H A D | setox.S | 269 | will all be exact --- a property that will be exploited
|
/linux/arch/x86/kernel/ |
H A D | traps.c | 1496 * and can be exploited for privilege escalation. Exceptions in the NMI
|
/linux/fs/ocfs2/ |
H A D | journal.c | 279 /* XXX: Can this be exploited? Not from o2dlm... */ in ocfs2_recovery_map_set()
|
/linux/mm/ |
H A D | vmstat.c | 432 * in between and therefore the atomicity vs. interrupt cannot be exploited
|
/linux/include/uapi/linux/ |
H A D | ethtool.h | 2289 * be exploited to reduce the RSS queue spread.
|
/linux/arch/x86/ |
H A D | Kconfig | 1821 On the other hand it has been shown that TSX can be exploited
|
/linux/arch/m68k/ifpsp060/src/ |
H A D | fplsp.S | 6936 # be exploited in Step 6 below. The total relative error #
|
H A D | fpsp.S | 7042 # be exploited in Step 6 below. The total relative error #
|