Home
last modified time | relevance | path

Searched refs:leaked (Results 1 – 16 of 16) sorted by relevance

/kernel/linux/linux-5.10/drivers/xen/xenbus/
Dxenbus_client.c506 bool *leaked) in __xenbus_map_ring() argument
546 *leaked = false; in __xenbus_map_ring()
549 *leaked = true; in __xenbus_map_ring()
622 bool leaked = false; in xenbus_map_ring_hvm() local
634 info, GNTMAP_host_map, &leaked); in xenbus_map_ring_hvm()
659 if (!leaked) in xenbus_map_ring_hvm()
665 if (!leaked) in xenbus_map_ring_hvm()
706 bool leaked = false; in xenbus_map_ring_pv() local
717 &leaked); in xenbus_map_ring_pv()
734 if (!leaked) in xenbus_map_ring_pv()
[all …]
/kernel/linux/linux-5.10/Documentation/staging/
Dspeculation.rst48 result in sensitive information being leaked. Consider the following
76 prevent information from being leaked via side-channels.
/kernel/linux/linux-5.10/Documentation/vm/
Dbalance.rst71 are not leaked (for example, in situations where a HIGHMEM page is in
Dhugetlbfs_reserv.rst551 so that a reservation will not be leaked when the huge page is freed.
/kernel/linux/linux-5.10/Documentation/admin-guide/hw-vuln/
Dspectre.rst165 accessed and leaked.
179 could cause privileged memory to be accessed and leaked.
210 If an attacker tries to control the memory addresses leaked during
Dtsx_async_abort.rst76 be leaked. Only the victim is responsible for bringing data to the CPU. As
/kernel/linux/linux-5.10/Documentation/x86/
Dmds.rst108 itself are not required because the necessary gadgets to expose the leaked
/kernel/linux/linux-5.10/Documentation/driver-api/
Ddma-buf.rst71 access to buffers, via the leaked fd, to which it should otherwise
/kernel/linux/linux-5.10/tools/testing/selftests/tc-testing/
DREADME240 and the other is a test whether the command leaked memory or not.
/kernel/linux/linux-5.10/Documentation/process/
Dmaintainer-pgp-guide.rst206 disk. This way, even if your ``.gnupg`` directory is leaked or stolen in
326 think. They can be leaked or stolen via many different means:
407 Even though the master key is now safe from being leaked or stolen, the
/kernel/linux/linux-5.10/Documentation/ia64/
Dfsys.rst38 security-sensitive kernel-level state is leaked back to
/kernel/linux/linux-5.10/Documentation/scsi/
DChangeLog.megaraid_sas24 3. Return leaked MPT frames to MPT command pool.
/kernel/linux/linux-5.10/Documentation/networking/
Dfilter.rst1258 reference is not leaked, it is imperative to NULL-check the reference and in
/kernel/linux/patches/linux-5.10/imx8mm_patch/patches/drivers/
D0036_linux_drivers_staging.patch18311 + so the pool must be leaked */
18381 + " CGR will be leaked\n",
19913 + " recover portal, portal will be leaked\n");
D0038_linux_drivers_mxc.patch74224 + gctSIZE_T leaked = 0;
74247 + leaked += node->bytes;
74263 + /* Return the number of leaked bytes. */
74264 + return leaked;
74518 + gctSIZE_T leaked = 0;
74529 + /* Check for leaked memory. */
74530 + leaked += _DumpHeap(heap);
74545 + gcmkFOOTER_ARG("leaked=%lu", leaked);
/kernel/linux/patches/linux-5.10/imx8mm_patch/patches/
D0005_linux_include.patch6286 + * always succeeds, but returns non-zero if there were "leaked" FQID