Home
last modified time | relevance | path

Searched refs:leaked (Results 1 – 16 of 16) sorted by relevance

/linux/drivers/xen/xenbus/
A Dxenbus_client.c508 bool *leaked) in __xenbus_map_ring() argument
547 *leaked = false; in __xenbus_map_ring()
550 *leaked = true; in __xenbus_map_ring()
622 bool leaked = false; in xenbus_map_ring_hvm() local
659 if (!leaked) in xenbus_map_ring_hvm()
665 if (!leaked) in xenbus_map_ring_hvm()
717 &leaked); in xenbus_map_ring_pv()
734 if (!leaked) in xenbus_map_ring_pv()
782 leaked = false; in xenbus_unmap_ring_pv()
785 leaked = true; in xenbus_unmap_ring_pv()
[all …]
/linux/Documentation/staging/
A Dspeculation.rst48 result in sensitive information being leaked. Consider the following
76 prevent information from being leaked via side-channels.
/linux/Documentation/vm/
A Dbalance.rst71 are not leaked (for example, in situations where a HIGHMEM page is in
A Dhugetlbfs_reserv.rst551 so that a reservation will not be leaked when the huge page is freed.
/linux/Documentation/admin-guide/hw-vuln/
A Dspectre.rst152 accessed and leaked.
166 could cause privileged memory to be accessed and leaked.
197 If an attacker tries to control the memory addresses leaked during
A Dtsx_async_abort.rst76 be leaked. Only the victim is responsible for bringing data to the CPU. As
/linux/Documentation/x86/
A Dmds.rst108 itself are not required because the necessary gadgets to expose the leaked
A Dsgx.rst221 "EREMOVE returned ... and an EPC page was leaked. SGX may become unusable..."
/linux/security/
A DKconfig.hardening247 leaked beyond the function boundary. This means that register
/linux/tools/testing/selftests/tc-testing/
A DREADME240 and the other is a test whether the command leaked memory or not.
/linux/Documentation/process/
A Dmaintainer-pgp-guide.rst206 disk. This way, even if your ``.gnupg`` directory is leaked or stolen in
326 think. They can be leaked or stolen via many different means:
407 Even though the master key is now safe from being leaked or stolen, the
/linux/Documentation/ia64/
A Dfsys.rst38 security-sensitive kernel-level state is leaked back to
/linux/Documentation/admin-guide/sysctl/
A Dnet.rst321 a leaked reference faster. A larger value may be useful to prevent false
/linux/Documentation/driver-api/
A Ddma-buf.rst71 access to buffers, via the leaked fd, to which it should otherwise
/linux/Documentation/scsi/
A DChangeLog.megaraid_sas24 3. Return leaked MPT frames to MPT command pool.
/linux/Documentation/networking/
A Dfilter.rst1308 reference is not leaked, it is imperative to NULL-check the reference and in

Completed in 17 milliseconds