Home
last modified time | relevance | path

Searched refs:leaked (Results 1 – 19 of 19) sorted by relevance

/Linux-v6.6/drivers/xen/xenbus/
Dxenbus_client.c551 bool *leaked) in __xenbus_map_ring() argument
590 *leaked = false; in __xenbus_map_ring()
593 *leaked = true; in __xenbus_map_ring()
665 bool leaked = false; in xenbus_map_ring_hvm() local
677 info, GNTMAP_host_map, &leaked); in xenbus_map_ring_hvm()
702 if (!leaked) in xenbus_map_ring_hvm()
708 if (!leaked) in xenbus_map_ring_hvm()
749 bool leaked = false; in xenbus_map_ring_pv() local
760 &leaked); in xenbus_map_ring_pv()
777 if (!leaked) in xenbus_map_ring_pv()
[all …]
/Linux-v6.6/Documentation/staging/
Dspeculation.rst48 result in sensitive information being leaked. Consider the following
76 prevent information from being leaked via side-channels.
/Linux-v6.6/drivers/xen/
Dgrant-table.c559 uint64_t leaked, deferred; in gnttab_add_deferred() local
583 leaked = atomic64_read(&leaked_count); in gnttab_add_deferred()
585 ref, page ? page_to_pfn(page) : -1, deferred, leaked); in gnttab_add_deferred()
588 leaked = atomic64_inc_return(&leaked_count); in gnttab_add_deferred()
590 ref, page ? page_to_pfn(page) : -1, deferred, leaked); in gnttab_add_deferred()
/Linux-v6.6/Documentation/mm/
Dbalance.rst69 are not leaked (for example, in situations where a HIGHMEM page is in
Dhugetlbfs_reserv.rst550 so that a reservation will not be leaked when the huge page is freed.
/Linux-v6.6/rust/alloc/
Dboxed.rs1096 let (leaked, alloc) = Box::into_unique(b); in into_raw_with_allocator()
1097 (leaked.as_ptr(), alloc) in into_raw_with_allocator()
/Linux-v6.6/Documentation/admin-guide/hw-vuln/
Dspectre.rst165 accessed and leaked.
179 could cause privileged memory to be accessed and leaked.
210 If an attacker tries to control the memory addresses leaked during
Dtsx_async_abort.rst76 be leaked. Only the victim is responsible for bringing data to the CPU. As
/Linux-v6.6/Documentation/arch/x86/
Dmds.rst108 itself are not required because the necessary gadgets to expose the leaked
Dsgx.rst236 "EREMOVE returned ... and an EPC page was leaked. SGX may become unusable..."
/Linux-v6.6/tools/testing/selftests/tc-testing/
DREADME240 and the other is a test whether the command leaked memory or not.
/Linux-v6.6/Documentation/process/
Dmaintainer-pgp-guide.rst184 disk. This way, even if your ``.gnupg`` directory is leaked or stolen in
286 think. They can be leaked or stolen via many different means:
367 Even though the Certify key is now safe from being leaked or stolen, the
/Linux-v6.6/Documentation/arch/ia64/
Dfsys.rst38 security-sensitive kernel-level state is leaked back to
/Linux-v6.6/security/
DKconfig.hardening270 leaked beyond the function boundary. This means that register
/Linux-v6.6/Documentation/driver-api/
Ddma-buf.rst71 access to buffers, via the leaked fd, to which it should otherwise
/Linux-v6.6/Documentation/admin-guide/sysctl/
Dnet.rst331 a leaked reference faster. A larger value may be useful to prevent false
/Linux-v6.6/Documentation/scsi/
DChangeLog.megaraid_sas24 3. Return leaked MPT frames to MPT command pool.
/Linux-v6.6/Documentation/bpf/
Dverifier.rst204 reference is not leaked, it is imperative to NULL-check the reference and in
/Linux-v6.6/Documentation/filesystems/
Dxfs-online-fsck-design.rst2347 the incore records to be sorted prior to commit, but was very slow and leaked