6240defd17
This option allows to test the constant-flow nature of selected code, using MemSan and the fundamental observation behind ctgrind that the set of operations allowed on undefined memory by dynamic analysers is the same as the set of operations allowed on secret data to avoid leaking it to a local attacker via side channels, namely, any operation except branching and dereferencing. (This isn't the full story, as on some CPUs some instructions have variable execution depending on the inputs, most notably division and on some cores multiplication. However, testing that no branch or memory access depends on secret data is already a good start.) Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com> |
||
---|---|---|
.. | ||
data_files | ||
abi_check.py | ||
apidoc_full.sh | ||
assemble_changelog.py | ||
bump_version.sh | ||
config.pl | ||
config.py | ||
ecc-heap.sh | ||
find-mem-leak.cocci | ||
footprint.sh | ||
generate_errors.pl | ||
generate_features.pl | ||
generate_psa_constants.py | ||
generate_query_config.pl | ||
generate_visualc_files.pl | ||
massif_max.pl | ||
memory.sh | ||
output_env.sh | ||
rename.pl | ||
rm-calloc-cast.cocci | ||
tmp_ignore_makefiles.sh | ||
windows_msbuild.bat |