Home
Sort by
last modified time
|
relevance
|
path
Repository(s)
applications
arkcompiler
base
build
commonlibrary
developtools
device
docs
domains
drivers
foundation
ide
interface
kernel
napi_generator
productdefine
test
third_party
vendor
select all
invert selection
clear
Full Search
Search through all text tokens(words,strings,identifiers,numbers) in index.
Definition
Only finds symbol definitions(where e.g a variable(function,...) is defined).
Symbol
Only finds symbol(e.g. methods classes,function,variables).
File Path
Path of the source file(use "/").If you want just exact path,enclose it in "".Source files end with: .jar/.bz2/.a/.h/.java...
History
History log comments.
Type
Any
Bzip(2)
C
Clojure
C#
C++
ELF
Erlang
Image file
Fortran
Golang
GZIP
Haskell
Jar
Java
Java class
JavaScript
Lisp
Lua
Pascal
Perl
PHP
Plain Text
PL/SQL
Python
Rust
Scala
Shell script
SQL
Tar
Tcl
Troff
UUEncoded
Visual Basic
XML
Zip
Type of analyzer used to filter file types include with selected(e.g. just C sources).
Help
Searched
refs:malicious
(Results
1 - 7
of
7
) sorted by relevance
/kernel/linux/linux-6.6/drivers/net/ethernet/intel/ice/
H
A
D
ice_vf_mbx.c
87
* is a possibility of a
malicious
VF transmitting too many MBX messages to the
92
* messages within the mailbox queue while looking for a
malicious
VF.
108
* caller whether it must report this VF as
malicious
or not.
110
* 5. When a VF is identified to be
malicious
, the caller can send a message
116
* assume that the new VF is not
malicious
and may report it again if we
153
* for
malicious
VFs.
186
* ice_mbx_detect_malvf - Detect
malicious
VF in snapshot
190
* @is_malvf: boolean output to indicate if VF is
malicious
193
* sent per VF and marks the VF as
malicious
if it exceeds
220
* The function serves as an entry point for the
malicious
V
[all...]
H
A
D
ice_type.h
769
* 1. state: the state of the mailbox snapshot in the
malicious
VF
792
* 3.
malicious
: whether this VF has been detected as
malicious
before
797
u8
malicious
: 1;
member
H
A
D
ice_virtchnl.c
3853
* Detect if a given VF might be
malicious
and attempting to overflow the PF
3868
return vf->mbx_info.
malicious
;
in ice_is_malicious_vf()
3870
/* check to see if we have a newly
malicious
VF */
in ice_is_malicious_vf()
3886
return vf->mbx_info.
malicious
;
in ice_is_malicious_vf()
/kernel/linux/linux-5.10/drivers/net/ethernet/broadcom/bnx2x/
H
A
D
bnx2x_sriov.h
145
bool
malicious
; /* true if FW indicated so, until FLR */
member
H
A
D
bnx2x_sriov.c
897
vf->
malicious
= false;
in bnx2x_vf_flr()
1832
vf->
malicious
= true;
in bnx2x_iov_eq_sp_event()
1914
if (vf->
malicious
) {
in bnx2x_iov_adjust_stats_req()
1916
"vf %d
malicious
so no stats for it\n",
in bnx2x_iov_adjust_stats_req()
/kernel/linux/linux-6.6/drivers/net/ethernet/broadcom/bnx2x/
H
A
D
bnx2x_sriov.h
145
bool
malicious
; /* true if FW indicated so, until FLR */
member
H
A
D
bnx2x_sriov.c
897
vf->
malicious
= false;
in bnx2x_vf_flr()
1831
vf->
malicious
= true;
in bnx2x_iov_eq_sp_event()
1908
if (vf->
malicious
) {
in bnx2x_iov_adjust_stats_req()
1910
"vf %d
malicious
so no stats for it\n",
in bnx2x_iov_adjust_stats_req()
Completed in 19 milliseconds