Searched refs:leaked (Results 1 – 15 of 15) sorted by relevance
| /linux/drivers/xen/xenbus/ |
| H A D | xenbus_client.c | 563 bool *leaked) in __xenbus_map_ring() argument 602 *leaked = false; in __xenbus_map_ring() 605 *leaked = true; in __xenbus_map_ring() 678 bool leaked = false; in xenbus_map_ring_hvm() local 690 info, GNTMAP_host_map, &leaked); in xenbus_map_ring_hvm() 715 if (!leaked) in xenbus_map_ring_hvm() 721 if (!leaked) in xenbus_map_ring_hvm() 763 bool leaked = false; in xenbus_map_ring_pv() local 774 &leaked); in xenbus_map_ring_pv() 791 if (!leaked) in xenbus_map_ring_pv() [all …]
|
| /linux/Documentation/staging/ |
| H A D | speculation.rst | 48 result in sensitive information being leaked. Consider the following 75 prevent information from being leaked via side-channels.
|
| /linux/drivers/xen/ |
| H A D | grant-table.c | 557 uint64_t leaked, deferred; in gnttab_add_deferred() local 581 leaked = atomic64_read(&leaked_count); in gnttab_add_deferred() 583 ref, page ? page_to_pfn(page) : -1, deferred, leaked); in gnttab_add_deferred() 586 leaked = atomic64_inc_return(&leaked_count); in gnttab_add_deferred() 588 ref, page ? page_to_pfn(page) : -1, deferred, leaked); in gnttab_add_deferred()
|
| /linux/Documentation/security/keys/ |
| H A D | trusted-encrypted.rst | 27 compromised/leaked. 37 Hence, if the protected-key is leaked or compromised, it is of no use to the
|
| /linux/tools/testing/selftests/tc-testing/ |
| H A D | README | 195 and the other is a test whether the command leaked memory or not.
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | spectre.rst | 164 accessed and leaked. 178 could cause privileged memory to be accessed and leaked. 209 If an attacker tries to control the memory addresses leaked during
|
| H A D | tsx_async_abort.rst | 76 be leaked. Only the victim is responsible for bringing data to the CPU. As
|
| /linux/Documentation/arch/x86/ |
| H A D | mds.rst | 111 itself are not required because the necessary gadgets to expose the leaked
|
| H A D | sgx.rst | 236 "EREMOVE returned ... and an EPC page was leaked. SGX may become unusable..."
|
| /linux/Documentation/security/tpm/ |
| H A D | tpm-security.rst | 109 during boot may have been leaked).
|
| /linux/Documentation/driver-api/ |
| H A D | dma-buf.rst | 87 access to buffers, via the leaked fd, to which it should otherwise
|
| /linux/Documentation/scsi/ |
| H A D | ChangeLog.megaraid_sas | 24 3. Return leaked MPT frames to MPT command pool.
|
| /linux/Documentation/RCU/ |
| H A D | checklist.rst | 506 combine with KASAN to check for pointers leaked out
|
| /linux/Documentation/mm/ |
| H A D | hugetlbfs_reserv.rst | 550 so that a reservation will not be leaked when the huge page is freed.
|
| /linux/Documentation/filesystems/ |
| H A D | fscrypt.rst | 1366 kernel memory is leaked. This is done without limiting the number of
|