Home
last modified time | relevance | path

Searched full:shadow (Results 1 – 25 of 606) sorted by relevance

12345678910>>...25

/freebsd-src/contrib/llvm-project/compiler-rt/lib/tsan/rtl/
H A Dtsan_rtl_access.cpp148 NOINLINE void DoReportRace(ThreadState* thr, RawShadow* shadow_mem, Shadow cur, in DoReportRace()
149 Shadow old, in DoReportRace()
151 // For the free shadow markers the first element (that contains kFreeSid) in DoReportRace()
155 old = Shadow(LoadShadow(&shadow_mem[1])); in DoReportRace()
158 StoreShadow(&shadow_mem[i], i == 0 ? Shadow::kRodata : Shadow::kEmpty); in DoReportRace()
166 ReportRace(thr, shadow_mem, cur, Shadow(old), typ); in DoReportRace()
173 bool ContainsSameAccess(RawShadow* s, Shadow cur, int unused0, int unused1, in ContainsSameAccess()
183 static_cast<u32>(Shadow::kRodata)); in ContainsSameAccess()
187 if (old == Shadow in ContainsSameAccess()
239 ContainsSameAccess(RawShadow * unused0,Shadow unused1,m128 shadow,m128 access,AccessType typ) ContainsSameAccess() argument
275 DoReportRaceV(ThreadState * thr,RawShadow * shadow_mem,Shadow cur,u32 race_mask,m128 shadow,AccessType typ) DoReportRaceV() argument
306 CheckRaces(ThreadState * thr,RawShadow * shadow_mem,Shadow cur,m128 shadow,m128 access,AccessType typ) CheckRaces() argument
616 const m128 shadow = _mm_load_si128((m128*)shadow_mem); MemoryRangeFreed() local
[all...]
H A Dtsan_shadow.h41 friend class Shadow;
57 class Shadow {
61 Shadow(FastState state, u32 addr, u32 size, AccessType typ) { in Shadow() function
77 explicit Shadow(RawShadow x = Shadow::kEmpty) { raw_ = static_cast<u32>(x); }
85 DCHECK(part_.access_ != 0 || raw_ == static_cast<u32>(Shadow::kRodata)); in GetAccess()
136 Shadow s(fs, 0, 8, kAccessWrite); in FreedMarker()
141 Shadow s; in FreedInfo()
174 // .rodata shadow marker, see MapRodata and ContainsSameAccessFast.
179 static_assert(sizeof(Shadow) == kShadowSize, "bad Shadow size");
H A Dtsan_platform_posix.cpp29 "FATAL: %s can not madvise shadow region [%zx, %zx] with %s (errno: %d)\n";
46 // Map memory shadow. in InitializeShadowMemory()
48 "shadow")) { in InitializeShadowMemory()
49 Printf("FATAL: ThreadSanitizer can not mmap the shadow memory\n"); in InitializeShadowMemory()
58 DPrintf("memory shadow: %zx-%zx (%zuGB)\n", in InitializeShadowMemory()
62 // Map meta shadow. in InitializeShadowMemory()
65 if (!MmapFixedSuperNoReserve(meta, meta_size, "meta shadow")) { in InitializeShadowMemory()
66 Printf("FATAL: ThreadSanitizer can not mmap the shadow memory\n"); in InitializeShadowMemory()
71 DPrintf("meta shadow: %zx-%zx (%zuGB)\n", in InitializeShadowMemory()
/freebsd-src/contrib/llvm-project/compiler-rt/lib/asan/
H A Dasan_shadow_setup.cpp11 // Set up the shadow memory.
26 // The shadow gap is unprotected, so there is a chance that someone in ProtectGap()
27 // is actually using this memory. Which means it needs a shadow... in ProtectGap()
34 " not protecting shadow gap, allocating gap's shadow\n" in ProtectGap()
35 "|| `[%p, %p]` || ShadowGap's shadow ||\n", in ProtectGap()
38 "unprotected gap shadow"); in ProtectGap()
56 // Set the shadow memory address to uninitialized. in InitializeShadowMemory()
60 // Detect if a dynamic shadow address must used and find a available location in InitializeShadowMemory()
69 // Update the shadow memory address (potentially) used by instrumentation. in InitializeShadowMemory()
89 // mmap the low shadow plus at least one page at the left. in InitializeShadowMemory()
[all …]
H A Dasan_premap_shadow.cpp11 // Reserve shadow memory with an ifunc resolver.
41 uptr shadow = reinterpret_cast<uptr>(&__asan_shadow); in PremapShadowFailed()
43 // shadow == resolver is how Android KitKat and older handles ifunc. in PremapShadowFailed()
44 // shadow == 0 just in case. in PremapShadowFailed()
45 if (shadow == 0 || shadow == resolver) in PremapShadowFailed()
53 // The resolver may be called multiple times. Map the shadow just once. in __asan_premap_shadow()
60 // the shadow mapping.
40 uptr shadow = reinterpret_cast<uptr>(&__asan_shadow); PremapShadowFailed() local
H A Dasan_poisoning.h11 // Shadow memory poisoning by ASan RTL and by user application.
26 // Poisons the shadow memory for "size" bytes starting from "addr".
29 // Poisons the shadow memory for "redzone_size" bytes starting from
50 // for mapping shadow and zeroing out pages doesn't "just work", so we should in FastPoisonShadow()
80 u8 *shadow = (u8*)MEM_TO_SHADOW(aligned_addr); in FastPoisonShadowPartialRightRedzone() local
81 for (uptr i = 0; i < redzone_size; i += ASAN_SHADOW_GRANULARITY, shadow++) { in FastPoisonShadowPartialRightRedzone()
83 *shadow = 0; // fully addressable in FastPoisonShadowPartialRightRedzone()
85 *shadow = in FastPoisonShadowPartialRightRedzone()
89 *shadow = poison_partial ? static_cast<u8>(size - i) : 0; in FastPoisonShadowPartialRightRedzone()
H A Dasan_descriptions.h89 static const char *const ShadowNames[] = {"low shadow", "shadow gap",
90 "high shadow"};
177 // a shadow, global (variable), stack, or heap address.
199 ShadowAddressDescription shadow; member
223 return data.shadow.addr; in Address()
239 return data.shadow.Print();
254 return data.kind == kAddressKindShadow ? &data.shadow : nullptr; in AsShadow()
/freebsd-src/contrib/llvm-project/compiler-rt/lib/msan/
H A Dmsan.h39 SHADOW = 8, enumerator
57 {0x002200000000ULL, 0x004000000000ULL, MappingDesc::SHADOW, "shadow-2"},
61 {0x006200000000ULL, 0x008000000000ULL, MappingDesc::SHADOW, "shadow-3"},
62 {0x008000000000ULL, 0x008200000000ULL, MappingDesc::SHADOW, "shadow-1"},
70 #define SHADOW_TO_ORIGIN(shadow) (((uptr)(shadow)) + 0x2000000000ULL) argument
79 // the larger app/shadow/origin regions.
83 {0X0100000000000, 0X0200000000000, MappingDesc::SHADOW, "shadow-14"},
86 {0X0400000000000, 0X0600000000000, MappingDesc::SHADOW, "shadow-15"},
90 {0X0B00000000000, 0X0C00000000000, MappingDesc::SHADOW, "shadow-10-13"},
97 # define SHADOW_TO_ORIGIN(shadow) (((uptr)(shadow)) + 0x200000000000ULL) argument
[all …]
/freebsd-src/contrib/llvm-project/compiler-rt/lib/dfsan/
H A Ddfsan_platform.h24 // TODO: The memory mapping code to setup a 1:1 shadow is based on msan.
34 SHADOW = 8,
51 // the larger app/shadow/origin regions.
55 {0X0100000000000, 0X0200000000000, MappingDesc::SHADOW, "shadow-14"},
58 {0X0400000000000, 0X0600000000000, MappingDesc::SHADOW, "shadow-15"},
62 {0X0B00000000000, 0X0C00000000000, MappingDesc::SHADOW, "shadow-10-13"},
69 # define SHADOW_TO_ORIGIN(shadow) (((upt
30 enum Type { INVALID, APP, SHADOW, ORIGIN } type; global() enumerator
59 SHADOW_TO_ORIGIN(shadow) global() argument
[all...]
/freebsd-src/contrib/llvm-project/compiler-rt/lib/memprof/
H A Dmemprof_shadow_setup.cpp11 // Set up the shadow memory.
23 // The shadow gap is unprotected, so there is a chance that someone in ProtectGap()
24 // is actually using this memory. Which means it needs a shadow... in ProtectGap()
30 " not protecting shadow gap, allocating gap's shadow\n" in ProtectGap()
31 "|| `[%p, %p]` || ShadowGap's shadow ||\n", in ProtectGap()
34 "unprotected gap shadow"); in ProtectGap()
43 // Update the shadow memory address (potentially) used by instrumentation. in InitializeShadowMemory()
52 // mmap the low shadow plus at least one page at the left. in InitializeShadowMemory()
54 ReserveShadowMemoryRange(shadow_start, kLowShadowEnd, "low shadow"); in InitializeShadowMemory()
55 // mmap the high shadow. in InitializeShadowMemory()
[all …]
/freebsd-src/contrib/llvm-project/compiler-rt/lib/hwasan/
H A Dhwasan_dynamic_shadow.cpp10 /// This file is a part of HWAddressSanitizer. It reserves dynamic shadow memory
56 const uptr shadow = reinterpret_cast<uptr>(&__hwasan_shadow); in IsPremapShadowAvailable()
58 // shadow == resolver is how Android KitKat and older handles ifunc. in FindPremappedShadowStart()
59 // shadow == 0 just in case. in FindPremappedShadowStart()
60 return shadow != 0 && shadow != resolver; in FindPremappedShadowStart()
79 // The resolver might be called multiple times. Map the shadow just once. in __hwasan_premap_shadow()
80 static __sanitizer::uptr shadow = 0;
81 if (!shadow)
82 shadow
51 const uptr shadow = reinterpret_cast<uptr>(&__hwasan_shadow); IsPremapShadowAvailable() local
75 static __sanitizer::uptr shadow = 0; __hwasan_premap_shadow() local
[all...]
/freebsd-src/contrib/llvm-project/llvm/lib/Transforms/Instrumentation/
H A DMemorySanitizer.cpp15 /// We associate a few shadow bits with every byte of the application memory,
16 /// poison the shadow of the malloc-ed or alloca-ed memory, load the shadow,
17 /// bits on every memory read, propagate the shadow bits through some of the
18 /// arithmetic instruction (including MOV), store the shadow bits on every memory
20 /// associated shadow is poisoned.
30 /// Another difference from Memcheck is that we use 8 shadow bits per
31 /// byte of application memory and use a direct shadow mapping. This
33 /// shadow updates (Memcheck is single-threaded so races are not a
34 /// concern there. Memcheck uses 2 shadow bit
1146 Value *Shadow; global() member
1321 Value *Shadow = SI->isAtomic() ? getCleanShadow(Val) : getShadow(Val); materializeStores() local
1421 Value *Shadow = nullptr; materializeInstructionChecks() local
1930 Value *Shadow = ShadowMap[V]; getShadow() local
2091 Value *Shadow, *Origin; insertShadowCheck() local
2415 Value *Shadow = nullptr; global() member in __anon427849950811::MemorySanitizerVisitor::Combiner
2750 Value *Shadow = IRB.CreateICmpSLT(getShadow(op), getCleanShadow(op), handleSignedRelationalComparison() local
2889 Value *Shadow = getShadow(&I, 1); handleVectorStoreIntrinsic() local
3402 Value *Shadow = IRB.CreateAlignedLoad(Ty, ShadowPtr, Alignment, "_ldmxcsr"); handleLdmxcsr() local
3430 Value *Shadow = IRB.CreateMaskedExpandLoad( handleMaskedExpandLoad() local
3450 Value *Shadow = getShadow(Values); handleMaskedCompressStore() local
3489 Value *Shadow = handleMaskedGather() local
3516 Value *Shadow = getShadow(Values); handleMaskedScatter() local
3534 Value *Shadow = getShadow(V); handleMaskedStore() local
3664 Value *Shadow = IRB.CreateShuffleVector(First, Second, Mask); handleUnarySdSsIntrinsic() local
3677 Value *Shadow = IRB.CreateZExt(Scalar, getShadowTy(&I)); handleVtestIntrinsic() local
3695 Value *Shadow = IRB.CreateShuffleVector(First, OrShadow, Mask); handleBinarySdSsIntrinsic() local
3716 Value *Shadow = getShadow(&I, 0); handleIsFpClass() local
4326 Value *Shadow = getShadow(RetVal); visitReturnInst() local
4887 Value *Shadow = MSV.getShadow(A); visitCallBase() local
5622 Value *Shadow = MSV.getShadow(A); visitCallBase() local
[all...]
H A DDataFlowSanitizer.cpp24 /// Each byte of application memory is backed by a shadow memory byte. The
25 /// shadow byte can represent up to 8 labels. On Linux/x86_64, memory is then
37 /// | shadow 1 |
43 /// | shadow 3 |
49 /// | shadow 2 |
55 /// SHADOW_TO_ORIGIN(shadow) = shadow + 0x100000000000
135 // the shadow load to have alignment 16. This flag is disabled by default as
143 // The ABI list files control how shadow parameters are passed. The pass treats
156 // will make all shadow an
605 Value *Shadow; global() member
945 expandFromPrimitiveShadowRecursive(Value * Shadow,SmallVector<unsigned,4> & Indices,Type * SubShadowTy,Value * PrimitiveShadow,IRBuilder<> & IRB) expandFromPrimitiveShadowRecursive() argument
989 Value *Shadow = UndefValue::get(ShadowTy); expandFromPrimitiveShadow() local
999 collapseAggregateShadow(AggregateType * AT,Value * Shadow,IRBuilder<> & IRB) collapseAggregateShadow() argument
1015 collapseToPrimitiveShadow(Value * Shadow,IRBuilder<> & IRB) collapseToPrimitiveShadow() argument
1027 collapseToPrimitiveShadow(Value * Shadow,Instruction * Pos) collapseToPrimitiveShadow() argument
1875 Value *&Shadow = ValShadowMap[V]; getShadow() local
1889 setShadow(Instruction * I,Value * Shadow) setShadow() argument
2032 Value *Shadow = getShadow(Inst->getOperand(0)); combineOperandShadows() local
2425 Value *Shadow = visitLoadInst() local
2445 updateOriginIfTainted(Value * Shadow,Value * Origin,IRBuilder<> & IRB) updateOriginIfTainted() argument
2514 storeOrigin(Instruction * Pos,Value * Addr,uint64_t Size,Value * Shadow,Value * Origin,Value * StoreOriginAddr,Align InstAlignment) storeOrigin() argument
2667 Value *Shadow = visitStoreInst() local
[all...]
/freebsd-src/share/man/man9/
H A Dkmsan.973 runtime component and use hidden, byte-granular shadow state to determine
78 Otherwise, the shadow state is propagated to destination operand.
99 perform validation of the input's shadow state and will raise an error if
106 the kernel map requires two bytes of shadow state.
124 shadow state.
148 shadow state.
161 function and its sub-typed siblings validate the shadow state of the region(s)
175 .Ss Shadow Maps
181 The first, simply called the shadow map, tracks the state of the corresponding
183 A non-zero byte in the shadow map indicates that the corresponding byte of
[all …]
H A Dkasan.999 runtime works by maintaining a shadow map for the kernel map.
101 in the shadow map.
102 The shadow map is used to store information about the current state of
106 the corresponding region of the shadow map is marked to indicate that the
108 When it is freed, the shadow map is updated to mark the buffer as invalid.
111 runtime and validated using the contents of the shadow map.
120 Updates to the shadow map are performed by calling
124 is the address of the buffer whose shadow is to be updated,
/freebsd-src/contrib/llvm-project/compiler-rt/lib/cfi/
H A Dcfi.cpp60 // The pointer to the cfi shadow region is stored at the start of this page.
76 // Get the start address of the CFI shadow region.
85 // This will only work while the shadow is not allocated.
100 // This class reads and decodes the shadow contents.
118 // Load a shadow value for the given application memory address.
134 // Allocate a new empty shadow (for the entire address space) on the side.
143 // Finish shadow construction. Atomically switch the current active shadow
149 shadow_ = (uptr)MmapNoReserveOrDie(GetShadowSize(), "CFI shadow"); in Start()
150 VReport(1, "CFI: shadow at %zx .. %zx\n", shadow_, shadow_ + GetShadowSize()); in Start()
156 // memset takes a byte, so our unchecked shadow value requires both bytes to in AddUnchecked()
[all …]
/freebsd-src/contrib/libxo/xohtml/external/
H A Djquery.qtip.css27 box-shadow: none;
236 .qtip-shadow{
237 -webkit-box-shadow: 1px 1px 3px 1px rgba(0, 0, 0, 0.15);
238 -moz-box-shadow: 1px 1px 3px 1px rgba(0, 0, 0, 0.15);
239 box-shadow: 1px 1px 3px 1px rgba(0, 0, 0, 0.15);
263 -webkit-box-shadow: 0 0 3px #333;
264 -moz-box-shadow: 0 0 3px #333;
265 box-shadow: 0 0 3px #333;
317 -webkit-box-shadow: 0 0 12px #333;
318 -moz-box-shadow: 0 0 12px #333;
[all …]
/freebsd-src/sys/dev/ixl/
H A Di40e_nvm.c44 * We are accessing FLASH always through the Shadow RAM.
176 * Polls the SRCTL Shadow RAM register done bit.
200 * i40e_read_nvm_word_srctl - Reads Shadow RAM via SRCTL register
202 * @offset: offset of the Shadow RAM word to read (0x000000 - 0x001FFF)
203 * @data: word read from the Shadow RAM
205 * Reads one 16 bit word from the Shadow RAM using the GLNVM_SRCTL register.
217 "NVM read error: Offset %d beyond Shadow RAM limit %d\n", in i40e_read_nvm_word_srctl()
242 "NVM read error: Couldn't access Shadow RAM address: 0x%x\n", in i40e_read_nvm_word_srctl()
250 * i40e_read_nvm_aq - Read Shadow RAM.
255 * @data: buffer with words to write to the Shadow RAM
[all …]
/freebsd-src/sys/dev/ice/
H A Dice_nvm.c44 * @read_shadow_ram: tell if this is a shadow RAM read
86 * @read_shadow_ram: if true, read from shadow RAM instead of NVM
89 * breaks read requests across Shadow RAM sectors and ensures that no single
108 /* Verify the length of the read if this is for the Shadow RAM */ in ice_read_flat_nvm()
110 ice_debug(hw, ICE_DBG_NVM, "NVM error: requested data is beyond Shadow RAM limit\n"); in ice_read_flat_nvm()
118 * Additionally, a read from the Shadow RAM may not cross over in ice_read_flat_nvm()
298 * ice_check_sr_access_params - verify params for Shadow RAM R/W operations
329 * ice_read_sr_word_aq - Reads Shadow RAM via AQ
331 * @offset: offset of the Shadow RAM word to read (0x000000 - 0x001FFF)
332 * @data: word read from the Shadow RA
[all...]
/freebsd-src/contrib/bsddialog/lib/
H A Dtheme.c59 .shadow.color = GET_COLOR(COLOR_BLACK, COLOR_BLACK),
60 .shadow.y = 1,
61 .shadow.x = 2,
108 .shadow.color = GET_COLOR(COLOR_BLACK, COLOR_BLACK),
109 .shadow.y = 1,
110 .shadow.x = 2,
159 dst->shadow.color = src->shadow.color; in set_theme()
160 dst->shadow.y = src->shadow.y; in set_theme()
161 dst->shadow.x = src->shadow.x; in set_theme()
/freebsd-src/contrib/llvm-project/llvm/lib/Target/X86/
H A DX86AsmPrinter.h35 // This utility class tracks the length of a stackmap instruction's 'shadow'.
36 // It is used by the X86AsmPrinter to ensure that the stackmap shadow
38 // the shadow) are met, while outputting a minimal number of NOPs for padding.
40 // To minimise the number of NOPs used, the shadow tracker counts the number
42 // few instruction bytes to cover the shadow are NOPs used for padding.
51 // Called to signal the start of a shadow of RequiredSize bytes.
65 // RequiredShadowSize holds the length of the shadow specified in the most
79 // outputting it to the OutStream. This allows the shadow tracker to minimise
/freebsd-src/contrib/llvm-project/llvm/lib/CodeGen/
H A DShadowStackGCLowering.cpp1 //===- ShadowStackGCLowering.cpp - Custom lowering for shadow-stack gc ----===//
9 // This file contains the custom lowering code required by the shadow-stack GC
51 #define DEBUG_TYPE "shadow-stack-gc-lowering"
60 /// StackEntryTy - Abstract type of a link in the shadow stack.
113 if (Map.StrategyMap.contains("shadow-stack")) in run()
137 "Shadow Stack GC Lowering", false, false)
141 "Shadow Stack GC Lowering", false, false) in INITIALIZE_PASS_DEPENDENCY()
218 if (F.hasGC() && F.getGC() == "shadow-stack") { in doInitialization()
331 /// runOnFunction - Insert code to maintain the shadow stack.
334 // Quick exit for functions that do not use the shadow stack GC. in runOnFunction()
[all …]
/freebsd-src/tools/test/stress2/misc/
H A Dunionfs12.sh61 mkdir $mp2/shadow
62 cp /bin/ls $mp2/shadow/
71 chmod +w $mp2/shadow/ls
72 sleep 2 >> $mp2/shadow/ls &
75 # This line should cause a "$mp1/shadow/ls: Text file busy" error
76 $mp1/shadow/ls -l /bin/ls $mp1 $mp2 && echo FAIL || echo OK
/freebsd-src/contrib/llvm-project/llvm/include/llvm/Transforms/Utils/
H A DASanStackFrameLayout.h45 uint64_t Granularity; // Shadow granularity.
53 // AddressSanitizer's shadow granularity. Usually 8, may also be 16, 32, 64.
64 // Returns shadow bytes with marked red zones. This shadow represents the state
70 // Returns shadow bytes with marked red zones and after scope. This shadow
/freebsd-src/sys/dev/pms/RefTisa/sallsdk/api/
H A Dsa_spec.h207 Register of the Shadow Command Block */
208 …bit8 error; /* Contains the contents to be placed in the Error register of the Shadow Command …
222 the Status register of the Shadow Command Block */
225 Status register of the Shadow Command Block */
227 the Shadow Command Block */
239 the Shadow Command Block */
241 the Shadow Command Block */
293 of the Shadow Command Block */
295 of the Shadow Command Block */
298 of the Shadow Command Block */
[all …]

12345678910>>...25