Home
last modified time | relevance | path

Searched refs:untrusted (Results 1 – 25 of 30) sorted by relevance

12

/linux/drivers/gpu/drm/vc4/
A Dvc4_validate.c53 void *untrusted
140 return (untrusted - 1 == exec->bin_u + pos); in validate_bin_pos()
259 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_indexed_prim_list()
260 uint32_t offset = *(uint32_t *)(untrusted + 5); in validate_indexed_prim_list()
261 uint32_t max_index = *(uint32_t *)(untrusted + 9); in validate_indexed_prim_list()
297 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_gl_array_primitive()
298 uint32_t base_index = *(uint32_t *)(untrusted + 5); in validate_gl_array_primitive()
364 exec->bin_tiles_x = *(uint8_t *)(untrusted + 12); in validate_tile_binning_config()
365 exec->bin_tiles_y = *(uint8_t *)(untrusted + 13); in validate_tile_binning_config()
367 flags = *(uint8_t *)(untrusted + 14); in validate_tile_binning_config()
[all …]
/linux/Documentation/x86/
A Dbuslock.rst79 "untrusted" user processes on other cores. The hard real time cannot afford
80 to have any bus lock from the untrusted processes to hurt real time
82 solutions as they have no way to prevent the "untrusted" user code from
A Dmds.rst65 There is one exception, which is untrusted BPF. The functionality of
66 untrusted BPF is limited, but it needs to be thoroughly investigated
A Dexception-tables.rst10 mode memory whose address has been passed by an untrusted program.
/linux/Documentation/admin-guide/hw-vuln/
A Dl1tf.rst258 which run untrusted guests, reduces the attack vector space.
260 Whether the interrupts with are affine to CPUs, which run untrusted
472 3. Virtualization with untrusted guests
521 affinity to the CPUs which run the untrusted guests can depending on
590 SMT systems vulnerable when running untrusted guests with EPT enabled.
597 - If regular users run untrusted guests on their machine, then L1TF is
598 just an add on to other malware which might be embedded in an untrusted
601 There is no technical way to prevent a user from running untrusted code
A Dcore-scheduling.rst167 core. But there could be small window of time during which untrusted tasks run
204 Another approach to resolve these would be to make every untrusted task on the
205 system to not trust every other untrusted task. While this could reduce
206 parallelism of the untrusted tasks, it would still solve the above issues while
A Dmultihit.rst163 3. Virtualization with untrusted guests
165 If the guest comes from an untrusted source, the guest host kernel will need
A Dmds.rst281 execute untrusted code which is supplied externally, then the mitigation
290 3. Virtualization with untrusted guests
309 SMT systems vulnerable when running untrusted code. The same rationale as
A Dspectre.rst306 If SMT is used, Spectre variant 2 attacks from an untrusted guest
527 in use, an untrusted guest running in the sibling thread can have
611 execute externally supplied untrusted code, then the mitigations can
622 3. Sandbox untrusted programs
628 This prevents untrusted programs from polluting the branch target
A Dtsx_async_abort.rst254 untrusted code which is supplied externally, then the mitigation can be
261 If there are untrusted applications or guests on the system, enabling TSX
/linux/Documentation/security/
A Dlandlock.rst15 backdoored (i.e. untrusted), Landlock's features must be safe to use from the
/linux/drivers/pci/
A Dats.c45 return (dev->untrusted == 0); in pci_ats_supported()
A Dprobe.c1607 if (parent && (parent->untrusted || parent->external_facing)) in set_pcie_untrusted()
1608 dev->untrusted = true; in set_pcie_untrusted()
/linux/certs/
A DKconfig99 Keys in the keyring are considered entirely untrusted. Keys in this
/linux/Documentation/admin-guide/aoe/
A Daoe.rst53 untrusted networks should be ignored as a matter of security. See
/linux/Documentation/networking/
A Dipvlan.rst132 (c) If the slave device is to be put into the hostile / untrusted network
/linux/Documentation/admin-guide/LSM/
A DSafeSetID.rst35 other untrusted uids without full blown CAP_SETUID capabilities. The non-root
/linux/Documentation/userspace-api/
A Dlandlock.rst301 issues, especially when untrusted processes can manipulate them (cf.
/linux/Documentation/filesystems/
A Doverlayfs.rst361 Do not use metacopy=on with untrusted upper/lower directories. Otherwise
366 for untrusted layers like from a pen drive.
/linux/drivers/iommu/
A Ddma-iommu.c310 return dev_is_pci(dev) && to_pci_dev(dev)->untrusted; in dev_is_untrusted()
A Diommu.c1524 if (dev_is_pci(dev) && to_pci_dev(dev)->untrusted) in iommu_get_def_domain_type()
/linux/arch/
A DKconfig500 prompt "Enable seccomp to safely execute untrusted bytecode"
505 that may need to handle untrusted bytecode during their
/linux/include/linux/
A Dpci.h443 unsigned int untrusted:1; member
/linux/Documentation/networking/device_drivers/ethernet/intel/
A Di40e.rst82 To set a VF as trusted or untrusted, enter the following command in the
/linux/Documentation/admin-guide/
A Dcgroup-v2.rst2821 child's own (possibly untrusted) configuration. However, untrusted
2824 swappability when overcommitting untrusted jobs.

Completed in 62 milliseconds

12