Lines Matching full:shadow
73 runtime component and use hidden, byte-granular shadow state to determine
78 Otherwise, the shadow state is propagated to destination operand.
99 perform validation of the input's shadow state and will raise an error if
106 the kernel map requires two bytes of shadow state.
124 shadow state.
148 shadow state.
161 function and its sub-typed siblings validate the shadow state of the region(s)
175 .Ss Shadow Maps
181 The first, simply called the shadow map, tracks the state of the corresponding
183 A non-zero byte in the shadow map indicates that the corresponding byte of
187 instrumentation automatically propagates shadow state as the contents of kernel
190 The second shadow is called the origin map, and exists only to help debug
204 Unlike the shadow map, the origin map is not byte-granular, but consists of 4-byte
222 shadow state to reflect the operations performed by the original
227 to manually update shadow state.
230 Inline assembly is instrumented by the compiler to update shadow state
234 In addition to the shadow maps, the sanitizer requires some thread-local