| /xnu-12377.61.12/libkern/libkern/c++/ |
| H A D | intrusive_shared_ptr.h | 131 using pointer = T *; 155 intrusive_shared_ptr(pointer p, retain_t) noexcept : ptr_(p) { 173 intrusive_shared_ptr(__attribute__((os_consumed)) pointer p, no_retain_t) noexcept : ptr_(p) { 335 constexpr pointer 370 reset(__attribute__((os_consumed)) pointer p, no_retain_t) noexcept 387 reset(pointer p, retain_t) noexcept 390 pointer old = ptr_; 414 constexpr pointer 420 constexpr pointer 438 constexpr pointer [all …]
|
| H A D | bounded_ptr.h | 180 bounded_ptr(T* pointer, T const* begin, T const* end) 196 if (__improbable(os_sub_overflow(reinterpret_cast<uintptr_t>(pointer),
|
| /xnu-12377.61.12/doc/primitives/ |
| H A D | string-handling.md | 70 functions assume the output pointer is a buffer and the input is a NUL- 88 a `__null_terminated` pointer to the output string instead of the length of the input string. 126 in lieu of a pointer+length pair: `strbuflen(array)`, `strbufcmp(a, b)`, 131 NUL-terminated and returned as a NUL-terminated string pointer. 134 of indexable pointer, and only once you're done should you convert it to a 137 any NUL character found through a `__null_terminated` pointer access will result 153 This code converts the string pointer to a NUL-terminated string too early, 154 while it's still being modified. Keeping my_string a `__null_terminated` pointer 169 NUL-terminated). Using `my_buffer` as an indexable pointer allows you to modify 196 pointer to you for convenience, not all use cases are resolved by calling [all …]
|
| H A D | atomics.md | 232 which has an extra `orig_value` argument which must be a pointer to a local 345 - loads through a pointer loaded with a *dependency* memory ordering 349 particular pointer with the `os_atomic_load_with_dependency_on` and 417 the pointer can only take a couple of values and ditch all these manually
|
| /xnu-12377.61.12/libkern/os/ |
| H A D | hash.h | 120 os_hash_kernel_pointer(const void *pointer) in os_hash_kernel_pointer() argument 122 uintptr_t key = (uintptr_t)((intptr_t)pointer << 16) >> 20; in os_hash_kernel_pointer()
|
| /xnu-12377.61.12/doc/arm/ |
| H A D | apple_speculative_hardening.md | 219 micro-architectural side channels (see: [PACMAN: attacking ARM pointer 360 or other pointer-like types (unchecked index or length values, physical 388 certain usage restrictions as all non-constant pointer arithmetic with such 391 valid pointer arithmetic operations to produce corrupted or otherwise surprising 408 pointer of a magnitude less than 4GB will not leave the submap or submap front 409 which contains that pointer. While we exploit these invariants in much greater 411 the offset of all kernel pointer arithmetic to either ±2GB or ±4GB and be 412 guaranteed that any out-of-bounds access from a legitimate, in-bounds pointer 429 efficiently limits the offset of potentially speculatively hazardous pointer 430 arithmetic operations such that if the operation’s base pointer is legitimate [all …]
|
| /xnu-12377.61.12/osfmk/mach/ |
| H A D | dyld_kernel_fixups.h | 75 sign_pointer(struct dyld_chained_ptr_64_kernel_cache_rebase pointer __unused, in sign_pointer() 80 uint64_t discriminator = pointer.diversity; in sign_pointer() 81 if (pointer.addrDiv) { in sign_pointer() 88 switch (pointer.key) { in sign_pointer()
|
| /xnu-12377.61.12/doc/debugging/ |
| H A D | extensible_paniclog.md | 21 … data_id, max len, and options as input and emits an instance in the out pointer. The data id take… 68 … UUID, data_id and the max len as input and emits an instance in the out pointer. The data id take… 93 This function is called to get a pointer to the ext paniclog buffer. After this function is called,… 133 … data_id, max len, and options as input and emits an instance in the out pointer. The data id take… 169 This function is called to get a pointer to the ext paniclog buffer. To modify the buffer after get… 175 This function is called to get a pointer to the ext paniclog buffer. After this function is called,…
|
| /xnu-12377.61.12/iokit/DriverKit/ |
| H A D | IOExtensiblePaniclog.iig | 71 …* @param out The pointer to the created IOExtensiblePaniclog object. NULL in case of an erro… 122 * @param mem The pointer to the IOBufferMemoryDescriptor object 129 * @brief This function is called to get a pointer to the ext paniclog buffer
|
| H A D | IODispatchQueue.iig | 109 * @discussion Returns a pointer to the queues name. Only valid while the queue is retained. 110 * @return C-string pointer in the queues internal storage. 121 * @return C-string pointer in the queues internal storage.
|
| H A D | OSAction.iig | 101 * @brief Return a pointer to any state allocated by the OSAction creator. 104 …* @return A pointer to storage for the owner. It will be NULL if referenceSize was zero, and …
|
| H A D | bounded_ptr.h | 180 bounded_ptr(T* pointer, T const* begin, T const* end) 196 if (__improbable(os_sub_overflow(reinterpret_cast<uintptr_t>(pointer),
|
| /xnu-12377.61.12/doc/allocators/ |
| H A D | api-basics.md | 77 pointer in read-only memory (using `SECURITY_READ_ONLY_LATE` storage). 112 as attackers tend to use data/pointer overlaps to carry out their exploitations. 118 to denote when a data-looking type is actually a pointer. 134 - for union types, data/pointer overlaps should be avoided if possible. 195 <td>This should be used when the allocated type contains no kernel pointer only</td> 273 respectively. They expect both their pointer and size arguments to be 274 modifiable, and the pointer and size will be set to 0 together, in accordance
|
| H A D | read-only.md | 59 read-only element should include a pointer back to the read/write side (a 66 chain from source pointer (e.g. thread) to destination data (e.g. credential). 99 macro that automatically zeroes the pointer after freeing.
|
| H A D | guard-objects.md | 15 pointer ranges of `kmem_alloc()`, which previously used a first-fit allocator. 210 element to be freed, knowing that a dangling pointer to it remains. They will 223 pointer to the original slot. Each round, the allocator will choose one slot
|
| /xnu-12377.61.12/libkern/conf/ |
| H A D | Makefile.template | 135 OSUnserialize.cpo_CXXWARNFLAGS_ADD += -Wno-zero-as-null-pointer-constant 136 OSUnserializeXML.cpo_CXXWARNFLAGS_ADD += -Wno-zero-as-null-pointer-constant
|
| /xnu-12377.61.12/osfmk/conf/ |
| H A D | Makefile.x86_64 | 37 locks_i386_opt.o_CFLAGS_ADD += -momit-leaf-frame-pointer -O2
|
| /xnu-12377.61.12/osfmk/mach/machine/ |
| H A D | machine_types.defs | 68 * in kernel space as a pointer. 112 * maximum pointer, offset, etc... supported on the
|
| /xnu-12377.61.12/tests/sched/ |
| H A D | Makefile | 15 sched/cluster_bound_threads: OTHER_CFLAGS += -Wno-int-to-void-pointer-cast
|
| /xnu-12377.61.12/libkern/libclosure/ |
| H A D | runtime.cpp | 230 uintptr_t pointer = base + extendedOffset; in unwrap_relative_pointer() local 231 return (T *)pointer; in unwrap_relative_pointer()
|
| /xnu-12377.61.12/libsyscall/ |
| H A D | Libsyscall.xcconfig | 26 …o-stack-protector -fno-stack-check -fno-builtin-calloc -momit-leaf-frame-pointer -DLIBSYSCALL_INTE…
|
| /xnu-12377.61.12/tools/lldbmacros/ |
| H A D | Makefile | 42 core/pointer.py \
|
| /xnu-12377.61.12/doc/mach_ipc/ |
| H A D | kmsg.md | 375 - an unsigned pointer variant prefixed with `kext_`, 376 - a signed pointer (keeping its current name).
|
| /xnu-12377.61.12/tests/unit/ |
| H A D | Makefile | 102 XNU_CFLAGS_EXTRA += -fsanitize=signed-integer-overflow,shift,pointer-overflow,bounds,object-size,vl…
|
| /xnu-12377.61.12/bsd/man/man2/ |
| H A D | getdirentriesattr.2 | 102 parameter is a pointer to an 132 by simply adding this length to your pointer.
|