/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | CAL-1.0-Combined-Work-Exception | 150 vulnerability or a security flaw in the Work, 152 + b) disclosure of the vulnerability or security flaw before the end 157 vulnerability or security flaw with one or more additional Licensees,
|
H A D | CAL-1.0 | 150 vulnerability or a security flaw in the Work, 152 + b) disclosure of the vulnerability or security flaw before the end 157 vulnerability or security flaw with one or more additional Licensees,
|
/openbmc/linux/Documentation/devicetree/bindings/input/ |
H A D | goodix,gt7375p.yaml | 55 Due to potential touchscreen hardware flaw, back-powering could happen in
|
/openbmc/linux/Documentation/security/ |
H A D | self-protection.rst | 8 entire classes of bugs, blocking security flaw exploitation methods, 185 flaw. By trapping atomic wrapping, this class of bug vanishes. 210 flaw.
|
/openbmc/openbmc/poky/meta/recipes-graphics/xorg-xserver/ |
H A D | xserver-xorg.inc | 26 As per upstream, exploiting this flaw is non-trivial and it requires exact \ 30 available for this flaw."
|
/openbmc/openbmc/poky/documentation/dev-manual/ |
H A D | security-subjects.rst | 73 If you find a security flaw: a crash, an information leakage, or anything that 146 the flaw to the upstream project. Normally the upstream project analyzes the
|
/openbmc/u-boot/doc/ |
H A D | README.memory-test | 70 fundamental, unfixable design flaw: they are based on the assumption
|
/openbmc/linux/Documentation/admin-guide/sysctl/ |
H A D | fs.rst | 193 directories like ``/tmp``. The common method of exploitation of this flaw 229 directories like ``/tmp``. The common method of exploitation of this flaw
|
/openbmc/linux/Documentation/translations/sp_SP/process/ |
H A D | researcher-guidelines.rst | 114 This flaw was found using an experimental static analysis tool we are
|
/openbmc/linux/Documentation/process/ |
H A D | researcher-guidelines.rst | 134 This flaw was found using an experimental static analysis tool we are
|
H A D | embargoed-hardware-issues.rst | 48 identified a potential hardware flaw.
|
/openbmc/linux/tools/testing/selftests/x86/ |
H A D | single_step_syscall.c | 179 * SYSENTER: it triggers a nasty design flaw in SYSENTER. in main()
|
/openbmc/qemu/util/ |
H A D | keyval.c | 63 * Design flaw: there is no way to denote an empty array or non-root 70 * Design flaw: scalar values can only be strings; there is no way to
|
/openbmc/linux/Documentation/admin-guide/hw-vuln/ |
H A D | l1tf.rst | 97 share the L1 Data Cache (L1D) is important for this. As the flaw allows 295 activated. Due to a design flaw of Intel processors related
|
/openbmc/linux/drivers/scsi/isci/ |
H A D | isci.h | 172 * an operation due to a critical flaw the prevents any further operation
|
/openbmc/linux/drivers/scsi/ |
H A D | am53c974.c | 412 * The am53c974 HBA has a design flaw of generating in pci_esp_probe_one()
|
/openbmc/qemu/ui/ |
H A D | input.c | 332 * when 'alt+print' was pressed. This flaw is now fixed and the in qemu_input_event_send()
|
/openbmc/linux/drivers/ata/ |
H A D | pata_it821x.c | 59 * flaw that it has a single set of PIO/MWDMA timings per channel so
|
/openbmc/linux/drivers/char/tpm/ |
H A D | tpm_tis_core.c | 724 * Early probing for iTPM with STS_DATA_EXPECT flaw.
|
/openbmc/linux/drivers/usb/class/ |
H A D | usblp.c | 1055 * have this flaw (HP 810, 880, 895, etc.), or needing an init string
|
/openbmc/qemu/qapi/ |
H A D | ui.json | 945 # 'alt+print' was pressed. This flaw is now fixed and the 'sysrq' key
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | ras.rst | 94 Just detecting a hardware flaw is usually not enough, as the system needs
|
/openbmc/linux/Documentation/scsi/ |
H A D | sym53c8xx_2.rst | 466 if only one has a flaw for some SCSI feature, you can disable the
|
/openbmc/linux/kernel/ |
H A D | seccomp.c | 461 /* Assume default seccomp processes want spec flaw mitigation. */ in seccomp_assign_mode()
|
/openbmc/linux/drivers/net/wireless/atmel/ |
H A D | at76c50x-usb.c | 1181 likely to compensate a flaw in the AT76C503A USB part ... */
|