Searched refs:untrusted (Results 1 – 25 of 34) sorted by relevance
12
/linux-6.3-rc2/drivers/gpu/drm/vc4/ |
A D | vc4_validate.c | 53 void *untrusted 144 return (untrusted - 1 == exec->bin_u + pos); in validate_bin_pos() 267 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_indexed_prim_list() 268 uint32_t offset = *(uint32_t *)(untrusted + 5); in validate_indexed_prim_list() 269 uint32_t max_index = *(uint32_t *)(untrusted + 9); in validate_indexed_prim_list() 305 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_gl_array_primitive() 306 uint32_t base_index = *(uint32_t *)(untrusted + 5); in validate_gl_array_primitive() 372 exec->bin_tiles_x = *(uint8_t *)(untrusted + 12); in validate_tile_binning_config() 373 exec->bin_tiles_y = *(uint8_t *)(untrusted + 13); in validate_tile_binning_config() 375 flags = *(uint8_t *)(untrusted + 14); in validate_tile_binning_config() [all …]
|
/linux-6.3-rc2/Documentation/x86/ |
A D | buslock.rst | 79 "untrusted" user processes on other cores. The hard real time cannot afford 80 to have any bus lock from the untrusted processes to hurt real time 82 solutions as they have no way to prevent the "untrusted" user code from
|
A D | mds.rst | 65 There is one exception, which is untrusted BPF. The functionality of 66 untrusted BPF is limited, but it needs to be thoroughly investigated
|
A D | tdx.rst | 107 information in shared memory, exposing it to the untrusted hypervisor. 123 userspace are completely untrusted.
|
A D | exception-tables.rst | 10 mode memory whose address has been passed by an untrusted program.
|
/linux-6.3-rc2/Documentation/admin-guide/hw-vuln/ |
A D | l1tf.rst | 258 which run untrusted guests, reduces the attack vector space. 260 Whether the interrupts with are affine to CPUs, which run untrusted 472 3. Virtualization with untrusted guests 521 affinity to the CPUs which run the untrusted guests can depending on 590 SMT systems vulnerable when running untrusted guests with EPT enabled. 597 - If regular users run untrusted guests on their machine, then L1TF is 598 just an add on to other malware which might be embedded in an untrusted 601 There is no technical way to prevent a user from running untrusted code
|
A D | core-scheduling.rst | 167 core. But there could be small window of time during which untrusted tasks run 204 Another approach to resolve these would be to make every untrusted task on the 205 system to not trust every other untrusted task. While this could reduce 206 parallelism of the untrusted tasks, it would still solve the above issues while
|
A D | multihit.rst | 163 3. Virtualization with untrusted guests 165 If the guest comes from an untrusted source, the guest host kernel will need
|
A D | mds.rst | 281 execute untrusted code which is supplied externally, then the mitigation 290 3. Virtualization with untrusted guests 309 SMT systems vulnerable when running untrusted code. The same rationale as
|
A D | tsx_async_abort.rst | 254 untrusted code which is supplied externally, then the mitigation can be 261 If there are untrusted applications or guests on the system, enabling TSX
|
A D | spectre.rst | 319 If SMT is used, Spectre variant 2 attacks from an untrusted guest 561 in use, an untrusted guest running in the sibling thread can have 647 execute externally supplied untrusted code, then the mitigations can 658 3. Sandbox untrusted programs 664 This prevents untrusted programs from polluting the branch target
|
A D | processor_mmio_stale_data.rst | 10 provided to untrusted guests may need mitigation. These vulnerabilities are 145 is more critical, or the untrusted software has no MMIO access). Note that
|
/linux-6.3-rc2/Documentation/ABI/testing/ |
A D | securityfs-secrets-coco | 12 and therefore are not readable by the untrusted host.
|
A D | sysfs-class-bdi | 123 affordable for given relatively slow (or untrusted) device. Turning
|
/linux-6.3-rc2/drivers/pci/ |
A D | ats.c | 45 return (dev->untrusted == 0); in pci_ats_supported()
|
A D | probe.c | 1606 if (parent && (parent->untrusted || parent->external_facing)) in set_pcie_untrusted() 1607 dev->untrusted = true; in set_pcie_untrusted()
|
/linux-6.3-rc2/Documentation/security/ |
A D | landlock.rst | 15 backdoored (i.e. untrusted), Landlock's features must be safe to use from the
|
/linux-6.3-rc2/certs/ |
A D | Kconfig | 98 Keys in the keyring are considered entirely untrusted. Keys in this
|
/linux-6.3-rc2/Documentation/admin-guide/aoe/ |
A D | aoe.rst | 53 untrusted networks should be ignored as a matter of security. See
|
/linux-6.3-rc2/Documentation/networking/ |
A D | ipvlan.rst | 132 (c) If the slave device is to be put into the hostile / untrusted network
|
/linux-6.3-rc2/arch/loongarch/ |
A D | Kconfig | 525 bool "Enable seccomp to safely compute untrusted bytecode" 530 that may need to compute untrusted bytecode during their
|
/linux-6.3-rc2/Documentation/admin-guide/LSM/ |
A D | SafeSetID.rst | 35 other untrusted uids without full blown CAP_SETUID capabilities. The non-root
|
/linux-6.3-rc2/Documentation/filesystems/ |
A D | overlayfs.rst | 361 Do not use metacopy=on with untrusted upper/lower directories. Otherwise 366 for untrusted layers like from a pen drive.
|
/linux-6.3-rc2/Documentation/userspace-api/ |
A D | landlock.rst | 489 issues, especially when untrusted processes can manipulate them (cf.
|
/linux-6.3-rc2/arch/ |
A D | Kconfig | 532 prompt "Enable seccomp to safely execute untrusted bytecode" 537 that may need to handle untrusted bytecode during their
|
Completed in 40 milliseconds
12