Home
last modified time | relevance | path

Searched refs:malicious (Results 1 – 9 of 9) sorted by relevance

/drivers/net/ethernet/intel/ice/
A Dice_vf_mbx.c360 if (is_malvf && !vf_info->malicious) { in ice_mbx_vf_state_handler()
361 vf_info->malicious = 1; in ice_mbx_vf_state_handler()
377 vf_info->malicious = 0; in ice_mbx_clear_malvf()
A Dice_type.h823 u8 malicious : 1; member
A Dice_virtchnl.c4379 return vf->mbx_info.malicious; in ice_is_malicious_vf()
4397 return vf->mbx_info.malicious; in ice_is_malicious_vf()
/drivers/virt/coco/sev-guest/
A DKconfig8 the PSP without risk from a malicious hypervisor who wishes to read,
/drivers/firmware/efi/
A DKconfig202 kernel. System firmware may configure the IOMMU to prevent malicious
211 any malicious PCI devices from being able to perform DMA until the
280 This mechanism helps prevent malicious hosts from making changes
/drivers/net/ethernet/broadcom/bnx2x/
A Dbnx2x_sriov.h145 bool malicious; /* true if FW indicated so, until FLR */ member
A Dbnx2x_sriov.c897 vf->malicious = false; in bnx2x_vf_flr()
1831 vf->malicious = true; in bnx2x_iov_eq_sp_event()
1908 if (vf->malicious) { in bnx2x_iov_adjust_stats_req()
/drivers/infiniband/ulp/rtrs/
A DREADME57 (always_invalidate=N), if he understands and can take the risk of a malicious
/drivers/tty/
A DKconfig153 as a malicious privilege escalation mechanism, and provides no

Completed in 29 milliseconds