Home
last modified time | relevance | path

Searched refs:leak (Results 1 – 6 of 6) sorted by relevance

/xnu-12377.41.6/doc/arm/
H A Dapple_speculative_hardening.md15 to extract—or “leak”—useful information from the other context. When the leaked
22 index is in-bounds, leading the CPU to speculatively load and leak out-of-bounds
60 about what memory any particular gadget can leak. This forces attackers to
62 reliably leak interesting MTE tags. While this is a significant divergence
179 On an unmitigated kernel, such a code sequence could be used to leak the
187 leak information from the data submap, the kernel’s type segregation ensures
242 attacker is able to successfully leak the contents of a given type when
286 able to successfully leak the contents of the same-sized target allocation using
555 data flow terminates and it is assumed that the caller or callee will leak
560 leak in an exploitable manner.
[all …]
/xnu-12377.41.6/san/memory/
H A Dkasan-denylist52 # Exclude leak detection code that reads all memory
/xnu-12377.41.6/doc/debugging/
H A Dtask_ref.md29 information to determine what code was responsible for the leak.
/xnu-12377.41.6/iokit/Kernel/
H A DIOHibernateIO.cpp655 uint64_t * leak = IONew(uint64_t, extraAlloc); in IOHibernateSystemSleep() local
656 assert(leak); in IOHibernateSystemSleep()
658 leak[idx] = idx; in IOHibernateSystemSleep()
/xnu-12377.41.6/doc/allocators/
H A Dguard-objects.md255 objects, which an attacker a priori doesn’t know without some information leak.
/xnu-12377.41.6/config/
H A DMASTER600 options CONFIG_ZLEAKS # Live zone leak debugging # <zleaks>