| /xnu-8020.121.3/doc/allocators/ |
| H A D | read-only.md | 24 By necessity, we store lots of data on the heap that informs the various 26 directly mutable allocations because this fits what we need the memory for: 35 This is where the Read-Only Allocator provides its defense: we observe that 36 the majority of security-sensitive data that we allocate on the heap tends to 44 written programmatically (i.e. through calling a function), we raise the cost 67 relationships, we can validate the ownership invariant that we expect to hold. 88 that we're making conscious, considered choices over which zones are made
|
| H A D | api-basics.md | 128 we have typically found that there is a large array of data, 341 data that we prefer to be known by the owning object
|
| /xnu-8020.121.3/san/tools/ |
| H A D | kstksz | 128 -- It is possible that we redord BELOW event as first. Ignore it if we haven't seen 232 …-- When reading from a file, we can't use CoreSymbolication to symbolicate the stack frames as the…
|
| /xnu-8020.121.3/tests/ |
| H A D | stackshot_accuracy.m | 51 /* ssh won't let the session die if we still have file handles open to its output. */ 96 /* we should be able to verify delta stackshots */ 205 * given that we've targetted the pid, we can be sure that this 206 * ts_pid will be the pid we expect 245 T_LOG("did we stop because of the limit?: %s", fault_stats.sfs_stopped_faulting ? "yes" : "no"); 252 /* if we couldn't fault the pages back in, then at least verify that we tried */ 293 * then send SIGUSR1 to the parent to let it know that we are done. 345 /* check if we can run the child successfully */
|
| H A D | stackshot_tests.m | 74 #define TEST_STACKSHOT_QUEUE_LABEL "houston.we.had.a.problem" 540 /* First kill the child so we can reap it */ 657 …/* sleep for a bit in the hope of ensuring that the other thread has called the sysctl before we s… 717 * This will mark the test as failed but let it continue so we 737 /* First unwedge the child so we can reap it */ 917 dispatch_semaphore_t child_ready_sem; /* signal parent we're ready */ 931 /* Tell the main thread we're all set up, then wait for permission to exit */ 934 usleep(1); /* make sure we don't tailcall semaphore_wait */ 1258 T_ASSERT_FALSE(seen_page_table_snapshot, "check that we haven't yet seen a page table snapshot"); 1298 T_ASSERT_TRUE(nonzero_tte, "check that we saw at least one non-empty TTE"); [all …]
|
| H A D | stackshot_block_owner_14362384.m | 239 /* perform various actions with a mutex in kernel memory. note that, since we aren't allowed 243 * exist in the kernel (to determine if we're running with CONFIG_XNUPOST defined). Else, 291 /* We don't really care what goes into these messages, we're just sending something to a port. */ 346 /* perform various actions with a rwlock in kernel memory. note that, since we aren't allowed 350 * exist in the kernel (to determine if we're running with CONFIG_XNUPOST defined). Else, 512 * This allows us to create a situation in the kernel where we know a thread to be blocked 525 …_create(&waiting, NULL, kmutex_grab_and_wait_thread, NULL); // thread will block until we signal it 634 …; // ping! msg_blocking_thread will now try to test_send_port us stuff, and block until we receive. 646 msg_recv_helper(test_recv_port); // thread should block until we receive one of its messages
|
| H A D | test_sysctl_kern_procargs_25397314.m | 58 /* Determine how much memory to allocate. If allocSize is 0 we will use the size 59 * we get from the sysctl for our buffer. */ 85 /* Without KERN_PROCARGS2, we can't tell where argv ends and environ begins.
|
| H A D | hvtest_x86.m | 34 * so we have to bake it ourselves. (This can 317 * specific test, so we just retry here, unless we 320 * To guard against cycling faults that we do not detect 321 * here, we also put a maximum on the number of 709 // To cause the VCPU pointer to be cleared from the wrong thread, we need 936 * Otherwise, we'd have to handle the switch ourselves, and would 974 // Map test code (because we start in protected mode without 975 // paging, we cannot use the harness's fault management yet.) 1055 * but in the case that it still fails, we don't want the test to fail through 1114 // invalid selectors: ok as long as we don't try to use them [all …]
|
| /xnu-8020.121.3/libkern/libkern/c++/ |
| H A D | OSPtr.h | 55 functions. This is great! However, please note that we may \ 63 off on enabling shared pointers in IOKit APIs until we have \
|
| /xnu-8020.121.3/config/ |
| H A D | Kasan_disabled.exports | 2 # so we generate an empty export list for non-KASan.
|
| H A D | MASTER | 208 # we are clipping the max based on 16G 328 # configurable kernel - general switch to say we are building for an 660 # sync with bsd/conf/MASTER until we fix the config system... todo XXX
|
| /xnu-8020.121.3/san/coverage/ |
| H A D | kcov-blacklist-arm64 | 8 # These use a local variable to work out which stack we're on, but can end up with
|
| /xnu-8020.121.3/makedefs/ |
| H A D | MakeInc.def | 143 # NOTE: order matters here. -Wno-xxx goes before opt-in of ones we want 183 # diagnostic here until we've completed that: 257 # This can have false negatives, and is used to avoid calling CTF when we'll build a static KC 508 # Currently we have to keep alive two separated UBSAN runtimes (minimal for DEVELOPMENT, 509 # full for KASAN). This implies that we cannot use CFLAGS_$(CURRENT_KERNEL_CONFIG), because 510 # CFLAGS_DEVELOPMENT is folded into CFLAGS_KASAN. For the time being we leave this check here, 511 # as we work (independently) to both break the CFLAGS direct dependency and commonize the 659 # we're dealing with uintptr_t values here, so explicitly use bash which 760 # for a 16KB page runtime, and we wish to use the first virtual block 763 # multiple of the block size in alignment/length, we will implictly map [all …]
|
| H A D | MakeInc.top | 15 # As such, we have no knowledge of how to build 339 # we try to throttle behavior into more managable S "stripes" of N/S 381 # $(1) is the Makefile target we are building for 393 # $(1) is the Makefile target we are building for 399 # $(1) is the Makefile target we are building for
|
| H A D | MakeInc.kernel | 242 # the LAST segment is mapped read-only on arm, so if we include llvm profiling 305 # date, start over. Normal dependencies don't work because we can have 308 # to BUILDA. So we maintain a separate file at the time make(1)
|
| H A D | MakeInc.cmd | 181 # CC/CXX get defined by make(1) by default, so we can't check them 256 # Scripts or tools we build ourselves
|
| /xnu-8020.121.3/san/memory/ |
| H A D | kasan-blacklist-arm64 | 12 # These use a local variable to work out which stack we're on, but can end up with
|
| /xnu-8020.121.3/libkdd/ |
| H A D | README.md | 73 object for a consumer to understand arbitrary data, we package it using container markers. 89 Following is an example of how we can describe a kernel specific struct sample_disk_io_stats in buf…
|
| H A D | KCDBasicTypeDescription.m | 126 * Calculate the maximum number of data elements we can parse, Taking into 128 * actual length of the data buffer and the offset into the buffer where we
|
| /xnu-8020.121.3/libsyscall/mach/ |
| H A D | vm_map.defs | 36 * LIBSYSCALL_INTERFACE indicates that we are building the
|
| /xnu-8020.121.3/doc/ |
| H A D | debugging.md | 66 or just **str** in Python 2. For Python 2 we would have to explicitly encode all Unicode strings 84 The result is that we have non-unicode literal being registered with unicode API in Python 3. 442 After inspecting addkext macro code and calling few functions with arguments directly we can see th… 518 Now we can move a frame above and inspect stopped target: 540 provides the offset to the seek method. Lets see where we are in the source code. 559 That means we are broken by a library update! Older versions of library do not load data for a sect…
|
| /xnu-8020.121.3/libkern/zlib/ |
| H A D | README | 116 If you use the zlib library in a product, we would appreciate *not* 122 If you redistribute modified sources, we would appreciate that you include
|
| /xnu-8020.121.3/osfmk/mach/ |
| H A D | resource_notify.defs | 46 /* The kernel sends the message, so we compile with KernelUser when
|
| H A D | thread_act.defs | 98 * we want the interfaces to be able to be defined in more standard
|
| /xnu-8020.121.3/osfmk/ipc/ |
| H A D | ipc_port.c | 1403 ipc_port_update_watchport_elem(ipc_port_t port, struct task_watchport_elem *we) in ipc_port_update_watchport_elem() argument 1423 if (we) { in ipc_port_update_watchport_elem() 1425 we->twe_pdrequest = pdrequest; in ipc_port_update_watchport_elem() 1426 port->ip_twe = we; in ipc_port_update_watchport_elem()
|