/freebsd-src/contrib/llvm-project/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_rtl_access.cpp | 148 NOINLINE void DoReportRace(ThreadState* thr, RawShadow* shadow_mem, Shadow cur, in DoReportRace() 149 Shadow old, in DoReportRace() 151 // For the free shadow markers the first element (that contains kFreeSid) in DoReportRace() 155 old = Shadow(LoadShadow(&shadow_mem[1])); in DoReportRace() 158 StoreShadow(&shadow_mem[i], i == 0 ? Shadow::kRodata : Shadow::kEmpty); in DoReportRace() 166 ReportRace(thr, shadow_mem, cur, Shadow(old), typ); in DoReportRace() 173 bool ContainsSameAccess(RawShadow* s, Shadow cur, int unused0, int unused1, in ContainsSameAccess() 183 static_cast<u32>(Shadow::kRodata)); in ContainsSameAccess() 187 if (old == Shadow in ContainsSameAccess() 239 ContainsSameAccess(RawShadow * unused0,Shadow unused1,m128 shadow,m128 access,AccessType typ) ContainsSameAccess() argument 275 DoReportRaceV(ThreadState * thr,RawShadow * shadow_mem,Shadow cur,u32 race_mask,m128 shadow,AccessType typ) DoReportRaceV() argument 306 CheckRaces(ThreadState * thr,RawShadow * shadow_mem,Shadow cur,m128 shadow,m128 access,AccessType typ) CheckRaces() argument 616 const m128 shadow = _mm_load_si128((m128*)shadow_mem); MemoryRangeFreed() local [all...] |
H A D | tsan_shadow.h | 41 friend class Shadow; 57 class Shadow { 61 Shadow(FastState state, u32 addr, u32 size, AccessType typ) { in Shadow() function 77 explicit Shadow(RawShadow x = Shadow::kEmpty) { raw_ = static_cast<u32>(x); } 85 DCHECK(part_.access_ != 0 || raw_ == static_cast<u32>(Shadow::kRodata)); in GetAccess() 136 Shadow s(fs, 0, 8, kAccessWrite); in FreedMarker() 141 Shadow s; in FreedInfo() 174 // .rodata shadow marker, see MapRodata and ContainsSameAccessFast. 179 static_assert(sizeof(Shadow) == kShadowSize, "bad Shadow size");
|
H A D | tsan_platform_posix.cpp | 29 "FATAL: %s can not madvise shadow region [%zx, %zx] with %s (errno: %d)\n"; 46 // Map memory shadow. in InitializeShadowMemory() 48 "shadow")) { in InitializeShadowMemory() 49 Printf("FATAL: ThreadSanitizer can not mmap the shadow memory\n"); in InitializeShadowMemory() 58 DPrintf("memory shadow: %zx-%zx (%zuGB)\n", in InitializeShadowMemory() 62 // Map meta shadow. in InitializeShadowMemory() 65 if (!MmapFixedSuperNoReserve(meta, meta_size, "meta shadow")) { in InitializeShadowMemory() 66 Printf("FATAL: ThreadSanitizer can not mmap the shadow memory\n"); in InitializeShadowMemory() 71 DPrintf("meta shadow: %zx-%zx (%zuGB)\n", in InitializeShadowMemory()
|
/freebsd-src/contrib/llvm-project/compiler-rt/lib/asan/ |
H A D | asan_shadow_setup.cpp | 11 // Set up the shadow memory. 26 // The shadow gap is unprotected, so there is a chance that someone in ProtectGap() 27 // is actually using this memory. Which means it needs a shadow... in ProtectGap() 34 " not protecting shadow gap, allocating gap's shadow\n" in ProtectGap() 35 "|| `[%p, %p]` || ShadowGap's shadow ||\n", in ProtectGap() 38 "unprotected gap shadow"); in ProtectGap() 56 // Set the shadow memory address to uninitialized. in InitializeShadowMemory() 60 // Detect if a dynamic shadow address must used and find a available location in InitializeShadowMemory() 69 // Update the shadow memory address (potentially) used by instrumentation. in InitializeShadowMemory() 89 // mmap the low shadow plus at least one page at the left. in InitializeShadowMemory() [all …]
|
H A D | asan_premap_shadow.cpp | 11 // Reserve shadow memory with an ifunc resolver. 41 uptr shadow = reinterpret_cast<uptr>(&__asan_shadow); in PremapShadowFailed() 43 // shadow == resolver is how Android KitKat and older handles ifunc. in PremapShadowFailed() 44 // shadow == 0 just in case. in PremapShadowFailed() 45 if (shadow == 0 || shadow == resolver) in PremapShadowFailed() 53 // The resolver may be called multiple times. Map the shadow just once. in __asan_premap_shadow() 60 // the shadow mapping. 40 uptr shadow = reinterpret_cast<uptr>(&__asan_shadow); PremapShadowFailed() local
|
H A D | asan_poisoning.h | 11 // Shadow memory poisoning by ASan RTL and by user application. 26 // Poisons the shadow memory for "size" bytes starting from "addr". 29 // Poisons the shadow memory for "redzone_size" bytes starting from 50 // for mapping shadow and zeroing out pages doesn't "just work", so we should in FastPoisonShadow() 80 u8 *shadow = (u8*)MEM_TO_SHADOW(aligned_addr); in FastPoisonShadowPartialRightRedzone() local 81 for (uptr i = 0; i < redzone_size; i += ASAN_SHADOW_GRANULARITY, shadow++) { in FastPoisonShadowPartialRightRedzone() 83 *shadow = 0; // fully addressable in FastPoisonShadowPartialRightRedzone() 85 *shadow = in FastPoisonShadowPartialRightRedzone() 89 *shadow = poison_partial ? static_cast<u8>(size - i) : 0; in FastPoisonShadowPartialRightRedzone()
|
H A D | asan_descriptions.h | 89 static const char *const ShadowNames[] = {"low shadow", "shadow gap", 90 "high shadow"}; 177 // a shadow, global (variable), stack, or heap address. 199 ShadowAddressDescription shadow; member 223 return data.shadow.addr; in Address() 239 return data.shadow.Print(); 254 return data.kind == kAddressKindShadow ? &data.shadow : nullptr; in AsShadow()
|
/freebsd-src/contrib/llvm-project/compiler-rt/lib/msan/ |
H A D | msan.h | 39 SHADOW = 8, enumerator 57 {0x002200000000ULL, 0x004000000000ULL, MappingDesc::SHADOW, "shadow-2"}, 61 {0x006200000000ULL, 0x008000000000ULL, MappingDesc::SHADOW, "shadow-3"}, 62 {0x008000000000ULL, 0x008200000000ULL, MappingDesc::SHADOW, "shadow-1"}, 70 #define SHADOW_TO_ORIGIN(shadow) (((uptr)(shadow)) + 0x2000000000ULL) argument 79 // the larger app/shadow/origin regions. 83 {0X0100000000000, 0X0200000000000, MappingDesc::SHADOW, "shadow-14"}, 86 {0X0400000000000, 0X0600000000000, MappingDesc::SHADOW, "shadow-15"}, 90 {0X0B00000000000, 0X0C00000000000, MappingDesc::SHADOW, "shadow-10-13"}, 97 # define SHADOW_TO_ORIGIN(shadow) (((uptr)(shadow)) + 0x200000000000ULL) argument [all …]
|
/freebsd-src/contrib/llvm-project/compiler-rt/lib/dfsan/ |
H A D | dfsan_platform.h | 24 // TODO: The memory mapping code to setup a 1:1 shadow is based on msan. 34 SHADOW = 8, 51 // the larger app/shadow/origin regions. 55 {0X0100000000000, 0X0200000000000, MappingDesc::SHADOW, "shadow-14"}, 58 {0X0400000000000, 0X0600000000000, MappingDesc::SHADOW, "shadow-15"}, 62 {0X0B00000000000, 0X0C00000000000, MappingDesc::SHADOW, "shadow-10-13"}, 69 # define SHADOW_TO_ORIGIN(shadow) (((upt 30 enum Type { INVALID, APP, SHADOW, ORIGIN } type; global() enumerator 59 SHADOW_TO_ORIGIN(shadow) global() argument [all...] |
/freebsd-src/contrib/llvm-project/compiler-rt/lib/memprof/ |
H A D | memprof_shadow_setup.cpp | 11 // Set up the shadow memory. 23 // The shadow gap is unprotected, so there is a chance that someone in ProtectGap() 24 // is actually using this memory. Which means it needs a shadow... in ProtectGap() 30 " not protecting shadow gap, allocating gap's shadow\n" in ProtectGap() 31 "|| `[%p, %p]` || ShadowGap's shadow ||\n", in ProtectGap() 34 "unprotected gap shadow"); in ProtectGap() 43 // Update the shadow memory address (potentially) used by instrumentation. in InitializeShadowMemory() 52 // mmap the low shadow plus at least one page at the left. in InitializeShadowMemory() 54 ReserveShadowMemoryRange(shadow_start, kLowShadowEnd, "low shadow"); in InitializeShadowMemory() 55 // mmap the high shadow. in InitializeShadowMemory() [all …]
|
/freebsd-src/contrib/llvm-project/compiler-rt/lib/hwasan/ |
H A D | hwasan_dynamic_shadow.cpp | 10 /// This file is a part of HWAddressSanitizer. It reserves dynamic shadow memory 56 const uptr shadow = reinterpret_cast<uptr>(&__hwasan_shadow); in IsPremapShadowAvailable() 58 // shadow == resolver is how Android KitKat and older handles ifunc. in FindPremappedShadowStart() 59 // shadow == 0 just in case. in FindPremappedShadowStart() 60 return shadow != 0 && shadow != resolver; in FindPremappedShadowStart() 79 // The resolver might be called multiple times. Map the shadow just once. in __hwasan_premap_shadow() 80 static __sanitizer::uptr shadow = 0; 81 if (!shadow) 82 shadow 51 const uptr shadow = reinterpret_cast<uptr>(&__hwasan_shadow); IsPremapShadowAvailable() local 75 static __sanitizer::uptr shadow = 0; __hwasan_premap_shadow() local [all...] |
/freebsd-src/contrib/llvm-project/llvm/lib/Transforms/Instrumentation/ |
H A D | MemorySanitizer.cpp | 15 /// We associate a few shadow bits with every byte of the application memory, 16 /// poison the shadow of the malloc-ed or alloca-ed memory, load the shadow, 17 /// bits on every memory read, propagate the shadow bits through some of the 18 /// arithmetic instruction (including MOV), store the shadow bits on every memory 20 /// associated shadow is poisoned. 30 /// Another difference from Memcheck is that we use 8 shadow bits per 31 /// byte of application memory and use a direct shadow mapping. This 33 /// shadow updates (Memcheck is single-threaded so races are not a 34 /// concern there. Memcheck uses 2 shadow bit 1146 Value *Shadow; global() member 1321 Value *Shadow = SI->isAtomic() ? getCleanShadow(Val) : getShadow(Val); materializeStores() local 1421 Value *Shadow = nullptr; materializeInstructionChecks() local 1930 Value *Shadow = ShadowMap[V]; getShadow() local 2091 Value *Shadow, *Origin; insertShadowCheck() local 2415 Value *Shadow = nullptr; global() member in __anon427849950811::MemorySanitizerVisitor::Combiner 2750 Value *Shadow = IRB.CreateICmpSLT(getShadow(op), getCleanShadow(op), handleSignedRelationalComparison() local 2889 Value *Shadow = getShadow(&I, 1); handleVectorStoreIntrinsic() local 3402 Value *Shadow = IRB.CreateAlignedLoad(Ty, ShadowPtr, Alignment, "_ldmxcsr"); handleLdmxcsr() local 3430 Value *Shadow = IRB.CreateMaskedExpandLoad( handleMaskedExpandLoad() local 3450 Value *Shadow = getShadow(Values); handleMaskedCompressStore() local 3489 Value *Shadow = handleMaskedGather() local 3516 Value *Shadow = getShadow(Values); handleMaskedScatter() local 3534 Value *Shadow = getShadow(V); handleMaskedStore() local 3664 Value *Shadow = IRB.CreateShuffleVector(First, Second, Mask); handleUnarySdSsIntrinsic() local 3677 Value *Shadow = IRB.CreateZExt(Scalar, getShadowTy(&I)); handleVtestIntrinsic() local 3695 Value *Shadow = IRB.CreateShuffleVector(First, OrShadow, Mask); handleBinarySdSsIntrinsic() local 3716 Value *Shadow = getShadow(&I, 0); handleIsFpClass() local 4326 Value *Shadow = getShadow(RetVal); visitReturnInst() local 4887 Value *Shadow = MSV.getShadow(A); visitCallBase() local 5622 Value *Shadow = MSV.getShadow(A); visitCallBase() local [all...] |
H A D | DataFlowSanitizer.cpp | 24 /// Each byte of application memory is backed by a shadow memory byte. The 25 /// shadow byte can represent up to 8 labels. On Linux/x86_64, memory is then 37 /// | shadow 1 | 43 /// | shadow 3 | 49 /// | shadow 2 | 55 /// SHADOW_TO_ORIGIN(shadow) = shadow + 0x100000000000 135 // the shadow load to have alignment 16. This flag is disabled by default as 143 // The ABI list files control how shadow parameters are passed. The pass treats 156 // will make all shadow an 605 Value *Shadow; global() member 945 expandFromPrimitiveShadowRecursive(Value * Shadow,SmallVector<unsigned,4> & Indices,Type * SubShadowTy,Value * PrimitiveShadow,IRBuilder<> & IRB) expandFromPrimitiveShadowRecursive() argument 989 Value *Shadow = UndefValue::get(ShadowTy); expandFromPrimitiveShadow() local 999 collapseAggregateShadow(AggregateType * AT,Value * Shadow,IRBuilder<> & IRB) collapseAggregateShadow() argument 1015 collapseToPrimitiveShadow(Value * Shadow,IRBuilder<> & IRB) collapseToPrimitiveShadow() argument 1027 collapseToPrimitiveShadow(Value * Shadow,Instruction * Pos) collapseToPrimitiveShadow() argument 1875 Value *&Shadow = ValShadowMap[V]; getShadow() local 1889 setShadow(Instruction * I,Value * Shadow) setShadow() argument 2032 Value *Shadow = getShadow(Inst->getOperand(0)); combineOperandShadows() local 2425 Value *Shadow = visitLoadInst() local 2445 updateOriginIfTainted(Value * Shadow,Value * Origin,IRBuilder<> & IRB) updateOriginIfTainted() argument 2514 storeOrigin(Instruction * Pos,Value * Addr,uint64_t Size,Value * Shadow,Value * Origin,Value * StoreOriginAddr,Align InstAlignment) storeOrigin() argument 2667 Value *Shadow = visitStoreInst() local [all...] |
/freebsd-src/share/man/man9/ |
H A D | kmsan.9 | 73 runtime component and use hidden, byte-granular shadow state to determine 78 Otherwise, the shadow state is propagated to destination operand. 99 perform validation of the input's shadow state and will raise an error if 106 the kernel map requires two bytes of shadow state. 124 shadow state. 148 shadow state. 161 function and its sub-typed siblings validate the shadow state of the region(s) 175 .Ss Shadow Maps 181 The first, simply called the shadow map, tracks the state of the corresponding 183 A non-zero byte in the shadow map indicates that the corresponding byte of [all …]
|
H A D | kasan.9 | 99 runtime works by maintaining a shadow map for the kernel map. 101 in the shadow map. 102 The shadow map is used to store information about the current state of 106 the corresponding region of the shadow map is marked to indicate that the 108 When it is freed, the shadow map is updated to mark the buffer as invalid. 111 runtime and validated using the contents of the shadow map. 120 Updates to the shadow map are performed by calling 124 is the address of the buffer whose shadow is to be updated,
|
/freebsd-src/contrib/llvm-project/compiler-rt/lib/cfi/ |
H A D | cfi.cpp | 60 // The pointer to the cfi shadow region is stored at the start of this page. 76 // Get the start address of the CFI shadow region. 85 // This will only work while the shadow is not allocated. 100 // This class reads and decodes the shadow contents. 118 // Load a shadow value for the given application memory address. 134 // Allocate a new empty shadow (for the entire address space) on the side. 143 // Finish shadow construction. Atomically switch the current active shadow 149 shadow_ = (uptr)MmapNoReserveOrDie(GetShadowSize(), "CFI shadow"); in Start() 150 VReport(1, "CFI: shadow at %zx .. %zx\n", shadow_, shadow_ + GetShadowSize()); in Start() 156 // memset takes a byte, so our unchecked shadow value requires both bytes to in AddUnchecked() [all …]
|
/freebsd-src/contrib/libxo/xohtml/external/ |
H A D | jquery.qtip.css | 27 box-shadow: none; 236 .qtip-shadow{ 237 -webkit-box-shadow: 1px 1px 3px 1px rgba(0, 0, 0, 0.15); 238 -moz-box-shadow: 1px 1px 3px 1px rgba(0, 0, 0, 0.15); 239 box-shadow: 1px 1px 3px 1px rgba(0, 0, 0, 0.15); 263 -webkit-box-shadow: 0 0 3px #333; 264 -moz-box-shadow: 0 0 3px #333; 265 box-shadow: 0 0 3px #333; 317 -webkit-box-shadow: 0 0 12px #333; 318 -moz-box-shadow: 0 0 12px #333; [all …]
|
/freebsd-src/sys/dev/ixl/ |
H A D | i40e_nvm.c | 44 * We are accessing FLASH always through the Shadow RAM. 176 * Polls the SRCTL Shadow RAM register done bit. 200 * i40e_read_nvm_word_srctl - Reads Shadow RAM via SRCTL register 202 * @offset: offset of the Shadow RAM word to read (0x000000 - 0x001FFF) 203 * @data: word read from the Shadow RAM 205 * Reads one 16 bit word from the Shadow RAM using the GLNVM_SRCTL register. 217 "NVM read error: Offset %d beyond Shadow RAM limit %d\n", in i40e_read_nvm_word_srctl() 242 "NVM read error: Couldn't access Shadow RAM address: 0x%x\n", in i40e_read_nvm_word_srctl() 250 * i40e_read_nvm_aq - Read Shadow RAM. 255 * @data: buffer with words to write to the Shadow RAM [all …]
|
/freebsd-src/sys/dev/ice/ |
H A D | ice_nvm.c | 44 * @read_shadow_ram: tell if this is a shadow RAM read 86 * @read_shadow_ram: if true, read from shadow RAM instead of NVM 89 * breaks read requests across Shadow RAM sectors and ensures that no single 108 /* Verify the length of the read if this is for the Shadow RAM */ in ice_read_flat_nvm() 110 ice_debug(hw, ICE_DBG_NVM, "NVM error: requested data is beyond Shadow RAM limit\n"); in ice_read_flat_nvm() 118 * Additionally, a read from the Shadow RAM may not cross over in ice_read_flat_nvm() 298 * ice_check_sr_access_params - verify params for Shadow RAM R/W operations 329 * ice_read_sr_word_aq - Reads Shadow RAM via AQ 331 * @offset: offset of the Shadow RAM word to read (0x000000 - 0x001FFF) 332 * @data: word read from the Shadow RA [all...] |
/freebsd-src/contrib/bsddialog/lib/ |
H A D | theme.c | 59 .shadow.color = GET_COLOR(COLOR_BLACK, COLOR_BLACK), 60 .shadow.y = 1, 61 .shadow.x = 2, 108 .shadow.color = GET_COLOR(COLOR_BLACK, COLOR_BLACK), 109 .shadow.y = 1, 110 .shadow.x = 2, 159 dst->shadow.color = src->shadow.color; in set_theme() 160 dst->shadow.y = src->shadow.y; in set_theme() 161 dst->shadow.x = src->shadow.x; in set_theme()
|
/freebsd-src/contrib/llvm-project/llvm/lib/Target/X86/ |
H A D | X86AsmPrinter.h | 35 // This utility class tracks the length of a stackmap instruction's 'shadow'. 36 // It is used by the X86AsmPrinter to ensure that the stackmap shadow 38 // the shadow) are met, while outputting a minimal number of NOPs for padding. 40 // To minimise the number of NOPs used, the shadow tracker counts the number 42 // few instruction bytes to cover the shadow are NOPs used for padding. 51 // Called to signal the start of a shadow of RequiredSize bytes. 65 // RequiredShadowSize holds the length of the shadow specified in the most 79 // outputting it to the OutStream. This allows the shadow tracker to minimise
|
/freebsd-src/contrib/llvm-project/llvm/lib/CodeGen/ |
H A D | ShadowStackGCLowering.cpp | 1 //===- ShadowStackGCLowering.cpp - Custom lowering for shadow-stack gc ----===// 9 // This file contains the custom lowering code required by the shadow-stack GC 51 #define DEBUG_TYPE "shadow-stack-gc-lowering" 60 /// StackEntryTy - Abstract type of a link in the shadow stack. 113 if (Map.StrategyMap.contains("shadow-stack")) in run() 137 "Shadow Stack GC Lowering", false, false) 141 "Shadow Stack GC Lowering", false, false) in INITIALIZE_PASS_DEPENDENCY() 218 if (F.hasGC() && F.getGC() == "shadow-stack") { in doInitialization() 331 /// runOnFunction - Insert code to maintain the shadow stack. 334 // Quick exit for functions that do not use the shadow stack GC. in runOnFunction() [all …]
|
/freebsd-src/tools/test/stress2/misc/ |
H A D | unionfs12.sh | 61 mkdir $mp2/shadow 62 cp /bin/ls $mp2/shadow/ 71 chmod +w $mp2/shadow/ls 72 sleep 2 >> $mp2/shadow/ls & 75 # This line should cause a "$mp1/shadow/ls: Text file busy" error 76 $mp1/shadow/ls -l /bin/ls $mp1 $mp2 && echo FAIL || echo OK
|
/freebsd-src/contrib/llvm-project/llvm/include/llvm/Transforms/Utils/ |
H A D | ASanStackFrameLayout.h | 45 uint64_t Granularity; // Shadow granularity. 53 // AddressSanitizer's shadow granularity. Usually 8, may also be 16, 32, 64. 64 // Returns shadow bytes with marked red zones. This shadow represents the state 70 // Returns shadow bytes with marked red zones and after scope. This shadow
|
/freebsd-src/sys/dev/pms/RefTisa/sallsdk/api/ |
H A D | sa_spec.h | 207 Register of the Shadow Command Block */ 208 …bit8 error; /* Contains the contents to be placed in the Error register of the Shadow Command … 222 the Status register of the Shadow Command Block */ 225 Status register of the Shadow Command Block */ 227 the Shadow Command Block */ 239 the Shadow Command Block */ 241 the Shadow Command Block */ 293 of the Shadow Command Block */ 295 of the Shadow Command Block */ 298 of the Shadow Command Block */ [all …]
|