Home
last modified time | relevance | path

Searched full:shadow (Results 1 – 25 of 611) sorted by relevance

12345678910>>...25

/freebsd/contrib/llvm-project/compiler-rt/lib/tsan/rtl/
H A Dtsan_rtl_access.cpp148 NOINLINE void DoReportRace(ThreadState* thr, RawShadow* shadow_mem, Shadow cur, in DoReportRace()
149 Shadow old, in DoReportRace()
151 // For the free shadow markers the first element (that contains kFreeSid) in DoReportRace()
155 old = Shadow(LoadShadow(&shadow_mem[1])); in DoReportRace()
158 StoreShadow(&shadow_mem[i], i == 0 ? Shadow::kRodata : Shadow::kEmpty); in DoReportRace()
166 ReportRace(thr, shadow_mem, cur, Shadow(old), typ); in DoReportRace()
173 bool ContainsSameAccess(RawShadow* s, Shadow cur, int unused0, int unused1, in ContainsSameAccess()
183 static_cast<u32>(Shadow::kRodata)); in ContainsSameAccess()
187 if (old == Shadow::kRodata) in ContainsSameAccess()
195 bool CheckRaces(ThreadState* thr, RawShadow* shadow_mem, Shadow cur, in CheckRaces()
[all …]
H A Dtsan_shadow.h41 friend class Shadow;
57 class Shadow {
61 Shadow(FastState state, u32 addr, u32 size, AccessType typ) { in Shadow() function
77 explicit Shadow(RawShadow x = Shadow::kEmpty) { raw_ = static_cast<u32>(x); }
85 DCHECK(part_.access_ != 0 || raw_ == static_cast<u32>(Shadow::kRodata)); in GetAccess()
136 Shadow s(fs, 0, 8, kAccessWrite); in FreedMarker()
141 Shadow s; in FreedInfo()
174 // .rodata shadow marker, see MapRodata and ContainsSameAccessFast.
179 static_assert(sizeof(Shadow) == kShadowSize, "bad Shadow size");
H A Dtsan_platform_posix.cpp29 "FATAL: %s can not madvise shadow region [%zx, %zx] with %s (errno: %d)\n";
46 // Map memory shadow. in InitializeShadowMemory()
48 "shadow")) { in InitializeShadowMemory()
49 Printf("FATAL: ThreadSanitizer can not mmap the shadow memory\n"); in InitializeShadowMemory()
58 DPrintf("memory shadow: %zx-%zx (%zuGB)\n", in InitializeShadowMemory()
62 // Map meta shadow. in InitializeShadowMemory()
65 if (!MmapFixedSuperNoReserve(meta, meta_size, "meta shadow")) { in InitializeShadowMemory()
66 Printf("FATAL: ThreadSanitizer can not mmap the shadow memory\n"); in InitializeShadowMemory()
71 DPrintf("meta shadow: %zx-%zx (%zuGB)\n", in InitializeShadowMemory()
/freebsd/contrib/llvm-project/compiler-rt/lib/msan/
H A Dmsan.h39 SHADOW = 8,
57 {0x002200000000ULL, 0x004000000000ULL, MappingDesc::SHADOW, "shadow-2"},
61 {0x006200000000ULL, 0x008000000000ULL, MappingDesc::SHADOW, "shadow-3"},
62 {0x008000000000ULL, 0x008200000000ULL, MappingDesc::SHADOW, "shadow-1"},
70 #define SHADOW_TO_ORIGIN(shadow) (((uptr)(shadow)) + 0x2000000000ULL)
79 // the larger app/shadow/origi
36 INVALID, APP, SHADOW, ORIGIN global() enumerator
64 SHADOW_TO_ORIGIN(shadow) global() argument
90 SHADOW_TO_ORIGIN(shadow) global() argument
111 SHADOW_TO_ORIGIN(shadow) global() argument
134 SHADOW_TO_ORIGIN(shadow) global() argument
148 SHADOW_TO_ORIGIN(shadow) global() argument
169 SHADOW_TO_ORIGIN(shadow) global() argument
190 SHADOW_TO_ORIGIN(shadow) global() argument
[all...]
/freebsd/contrib/llvm-project/compiler-rt/lib/asan/
H A Dasan_shadow_setup.cpp11 // Set up the shadow memory.
26 // The shadow gap is unprotected, so there is a chance that someone in ProtectGap()
27 // is actually using this memory. Which means it needs a shadow... in ProtectGap()
34 " not protecting shadow gap, allocating gap's shadow\n" in ProtectGap()
35 "|| `[%p, %p]` || ShadowGap's shadow ||\n", in ProtectGap()
38 "unprotected gap shadow"); in ProtectGap()
56 // Set the shadow memory address to uninitialized. in InitializeShadowMemory()
60 // Detect if a dynamic shadow address must used and find a available location in InitializeShadowMemory()
69 // Update the shadow memory address (potentially) used by instrumentation. in InitializeShadowMemory()
89 // mmap the low shadow plus at least one page at the left. in InitializeShadowMemory()
[all …]
H A Dasan_premap_shadow.cpp11 // Reserve shadow memory with an ifunc resolver.
41 uptr shadow = reinterpret_cast<uptr>(&__asan_shadow); in PremapShadowFailed() local
43 // shadow == resolver is how Android KitKat and older handles ifunc. in PremapShadowFailed()
44 // shadow == 0 just in case. in PremapShadowFailed()
45 if (shadow == 0 || shadow == resolver) in PremapShadowFailed()
53 // The resolver may be called multiple times. Map the shadow just once. in __asan_premap_shadow()
60 // the shadow mapping.
H A Dasan_poisoning.h11 // Shadow memory poisoning by ASan RTL and by user application.
26 // Poisons the shadow memory for "size" bytes starting from "addr".
29 // Poisons the shadow memory for "redzone_size" bytes starting from
50 // for mapping shadow and zeroing out pages doesn't "just work", so we should in FastPoisonShadow()
80 u8 *shadow = (u8*)MEM_TO_SHADOW(aligned_addr); in FastPoisonShadowPartialRightRedzone() local
81 for (uptr i = 0; i < redzone_size; i += ASAN_SHADOW_GRANULARITY, shadow++) { in FastPoisonShadowPartialRightRedzone()
83 *shadow = 0; // fully addressable in FastPoisonShadowPartialRightRedzone()
85 *shadow = in FastPoisonShadowPartialRightRedzone()
89 *shadow = poison_partial ? static_cast<u8>(size - i) : 0; in FastPoisonShadowPartialRightRedzone()
/freebsd/contrib/llvm-project/compiler-rt/lib/nsan/
H A Dnsan.cpp17 // These return the shadow memory pointer for loading the shadow value,
21 // Sets the shadow types appropriately and returns the shadow memory
22 // pointer for storing the shadow value.
24 // accuracy of a value against its shadow and emits a warning depending
27 // shadow, and depends on the instrumentation configuration.
29 // corresponding shadow fcmp result differs.
56 // When copying application memory, we also copy its shadow and shadow type.
88 ShadowFT Shadow; in ReadShadowInternal() local
89 __builtin_memcpy(&Shadow, ptr, sizeof(Shadow)); in ReadShadowInternal()
90 return Shadow; in ReadShadowInternal()
[all …]
H A Dnsan_platform.h19 // - 'shadow memory' stores the shadow copies of numerical values stored in
21 // - 'shadow types' is used to determine which value type each byte of memory
22 // belongs to. This makes sure that we always know whether a shadow value is
23 // valid. Shadow values may be tampered with using access through other
33 // the corresponding shadow value is no longer valid.
44 // | shadow memory |
46 // | shadow types |
52 // To derive a shadow memory address from an application memory address,
55 // shadow value takes twice as much space as the original value.
56 // Then we add kShadowAddr to put the shadow relative offset into the shadow
[all …]
/freebsd/contrib/llvm-project/compiler-rt/lib/dfsan/
H A Ddfsan_platform.h24 // TODO: The memory mapping code to setup a 1:1 shadow is based on msan.
34 SHADOW = 8, enumerator
51 // the larger app/shadow/origin regions.
55 {0X0100000000000, 0X0200000000000, MappingDesc::SHADOW, "shadow-14"},
58 {0X0400000000000, 0X0600000000000, MappingDesc::SHADOW, "shadow-15"},
62 {0X0B00000000000, 0X0C00000000000, MappingDesc::SHADOW, "shadow-10-13"},
69 # define SHADOW_TO_ORIGIN(shadow) (((uptr)(shadow)) + 0x200000000000ULL) argument
79 {0x010000000000ULL, 0x100000000000ULL, MappingDesc::SHADOW, "shadow-2"},
82 {0x200000000000ULL, 0x300000000000ULL, MappingDesc::SHADOW, "shadow-3"},
85 {0x500000000000ULL, 0x510000000000ULL, MappingDesc::SHADOW, "shadow-1"},
[all …]
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Instrumentation/
H A DNumericalStabilitySanitizer.cpp10 // Conceptually the pass injects shadow computations using higher precision
69 // Using smaller shadow types types can help improve speed. For example, `dlq`
73 "nsan-shadow-type-mapping", cl::init("dqq"),
74 cl::desc("One shadow type id for each of `float`, `double`, `long double`. "
77 "shadow `float` as `double`, and `double` and `x86_fp80` as "
97 "shadow check in the shadow (`x_shadow == 0.0) == (x == 0.0f)`) or app "
104 // When there is external, uninstrumented code writing to memory, the shadow
109 // framework did a bad job at tracking shadow memory modifications by failing on
126 // It's not really necessary to shadow such stores,
127 // if the shadow value is unknown the framework will re-extend it on load
[all …]
H A DMemorySanitizer.cpp15 /// We associate a few shadow bits with every byte of the application memory,
16 /// poison the shadow of the malloc-ed or alloca-ed memory, load the shadow,
17 /// bits on every memory read, propagate the shadow bits through some of the
18 /// arithmetic instruction (including MOV), store the shadow bits on every memory
20 /// associated shadow is poisoned.
30 /// Another difference from Memcheck is that we use 8 shadow bits per
31 /// byte of application memory and use a direct shadow mapping. This
33 /// shadow updates (Memcheck is single-threaded so races are not a
34 /// concern there. Memcheck uses 2 shadow bits per byte with a slow
37 /// The default value of shadow is 0, which means "clean" (not poisoned).
[all …]
H A DDataFlowSanitizer.cpp24 /// Each byte of application memory is backed by a shadow memory byte. The
25 /// shadow byte can represent up to 8 labels. On Linux/x86_64, memory is then
37 /// | shadow 1 |
43 /// | shadow 3 |
49 /// | shadow 2 |
55 /// SHADOW_TO_ORIGIN(shadow) = shadow + 0x100000000000
135 // the shadow load to have alignment 16. This flag is disabled by default as
143 // The ABI list files control how shadow parameters are passed. The pass treats
156 // will make all shadow and return values set zero labels.
277 // Memory map parameters used in application-to-shadow address calculation.
[all …]
/freebsd/contrib/llvm-project/compiler-rt/lib/memprof/
H A Dmemprof_shadow_setup.cpp11 // Set up the shadow memory.
23 // The shadow gap is unprotected, so there is a chance that someone in ProtectGap()
24 // is actually using this memory. Which means it needs a shadow... in ProtectGap()
30 " not protecting shadow gap, allocating gap's shadow\n" in ProtectGap()
31 "|| `[%p, %p]` || ShadowGap's shadow ||\n", in ProtectGap()
34 "unprotected gap shadow"); in ProtectGap()
43 // Update the shadow memory address (potentially) used by instrumentation. in InitializeShadowMemory()
52 // mmap the low shadow plus at least one page at the left. in InitializeShadowMemory()
54 ReserveShadowMemoryRange(shadow_start, kLowShadowEnd, "low shadow"); in InitializeShadowMemory()
55 // mmap the high shadow. in InitializeShadowMemory()
[all …]
/freebsd/share/man/man9/
H A Dkmsan.973 runtime component and use hidden, byte-granular shadow state to determine
78 Otherwise, the shadow state is propagated to destination operand.
99 perform validation of the input's shadow state and will raise an error if
106 the kernel map requires two bytes of shadow state.
124 shadow state.
148 shadow state.
161 function and its sub-typed siblings validate the shadow state of the region(s)
175 .Ss Shadow Maps
181 The first, simply called the shadow map, tracks the state of the corresponding
183 A non-zero byte in the shadow map indicates that the corresponding byte of
[all …]
H A Dkasan.999 runtime works by maintaining a shadow map for the kernel map.
101 in the shadow map.
102 The shadow map is used to store information about the current state of
106 the corresponding region of the shadow map is marked to indicate that the
108 When it is freed, the shadow map is updated to mark the buffer as invalid.
111 runtime and validated using the contents of the shadow map.
120 Updates to the shadow map are performed by calling
124 is the address of the buffer whose shadow is to be updated,
/freebsd/contrib/llvm-project/compiler-rt/lib/hwasan/
H A Dhwasan_dynamic_shadow.cpp10 /// This file is a part of HWAddressSanitizer. It reserves dynamic shadow memory
56 const uptr shadow = reinterpret_cast<uptr>(&__hwasan_shadow); in IsPremapShadowAvailable() local
58 // shadow == resolver is how Android KitKat and older handles ifunc. in IsPremapShadowAvailable()
59 // shadow == 0 just in case. in IsPremapShadowAvailable()
60 return shadow != 0 && shadow != resolver; in IsPremapShadowAvailable()
79 // The resolver might be called multiple times. Map the shadow just once. in __hwasan_premap_shadow()
80 static __sanitizer::uptr shadow = 0; in __hwasan_premap_shadow() local
81 if (!shadow) in __hwasan_premap_shadow()
82 shadow = __hwasan::PremapShadow(); in __hwasan_premap_shadow()
83 return reinterpret_cast<decltype(__hwasan_shadow)*>(shadow); in __hwasan_premap_shadow()
[all …]
/freebsd/contrib/llvm-project/compiler-rt/include/sanitizer/
H A Dnsan_interface.h30 // Dumps nsan shadow data for a block of `size_bytes` bytes of application
33 // Each line contains application address, shadow types, then values.
36 // shown as a single hex digit. The shadow value itself appears on the line that
38 // FIXME: Show both shadow and application value.
48 // - a shadow double for the float at address 0x0add7360, with value 42;
49 // - a shadow float128 for the double at address 0x0add7362, with value -1;
50 // - a shadow double for the float at address 0x0add736a, with value 12.5;
51 // There was also a shadow double for the float at address 0x0add736e, but bytes
52 // f0 and f1 were overwritten by one or several stores, so that the shadow value
/freebsd/contrib/llvm-project/compiler-rt/lib/cfi/
H A Dcfi.cpp60 // The pointer to the cfi shadow region is stored at the start of this page.
76 // Get the start address of the CFI shadow region.
85 // This will only work while the shadow is not allocated.
100 // This class reads and decodes the shadow contents. in ShadowValue()
118 // Load a shadow value for the given application memory address. in load()
134 // Allocate a new empty shadow (for the entire address space) on the side.
143 // Finish shadow construction. Atomically switch the current active shadow
149 shadow_ = (uptr)MmapNoReserveOrDie(GetShadowSize(), "CFI shadow"); in AddUnchecked()
150 VReport(1, "CFI: shadow a in AddUnchecked()
[all...]
/freebsd/sys/dev/ixl/
H A Di40e_nvm.c44 * We are accessing FLASH always through the Shadow RAM.
176 * Polls the SRCTL Shadow RAM register done bit.
200 * i40e_read_nvm_word_srctl - Reads Shadow RAM via SRCTL register
202 * @offset: offset of the Shadow RAM word to read (0x000000 - 0x001FFF)
203 * @data: word read from the Shadow RAM
205 * Reads one 16 bit word from the Shadow RAM using the GLNVM_SRCTL register.
217 "NVM read error: Offset %d beyond Shadow RAM limit %d\n", in i40e_read_nvm_word_srctl()
242 "NVM read error: Couldn't access Shadow RAM address: 0x%x\n", in i40e_read_nvm_word_srctl()
250 * i40e_read_nvm_aq - Read Shadow RAM.
255 * @data: buffer with words to write to the Shadow RAM
[all …]
/freebsd/contrib/libxo/xohtml/external/
H A Djquery.qtip.css27 box-shadow: none;
236 .qtip-shadow{
237 -webkit-box-shadow: 1px 1px 3px 1px rgba(0, 0, 0, 0.15);
238 -moz-box-shadow: 1px 1px 3px 1px rgba(0, 0, 0, 0.15);
239 box-shadow: 1px 1px 3px 1px rgba(0, 0, 0, 0.15);
263 -webkit-box-shadow: 0 0 3px #333;
264 -moz-box-shadow: 0 0 3px #333;
265 box-shadow: 0 0 3px #333;
317 -webkit-box-shadow: 0 0 12px #333;
318 -moz-box-shadow: 0 0 12px #333;
[all …]
/freebsd/sys/dev/ice/
H A Dice_nvm.c44 * @read_shadow_ram: tell if this is a shadow RAM read
86 * @read_shadow_ram: if true, read from shadow RAM instead of NVM
89 * breaks read requests across Shadow RAM sectors and ensures that no single
108 /* Verify the length of the read if this is for the Shadow RAM */ in ice_read_flat_nvm()
110 ice_debug(hw, ICE_DBG_NVM, "NVM error: requested data is beyond Shadow RAM limit\n"); in ice_read_flat_nvm()
118 * Additionally, a read from the Shadow RAM may not cross over in ice_read_flat_nvm()
298 * ice_check_sr_access_params - verify params for Shadow RAM R/W operations
329 * ice_read_sr_word_aq - Reads Shadow RAM via AQ
331 * @offset: offset of the Shadow RAM word to read (0x000000 - 0x001FFF)
332 * @data: word read from the Shadow RA
[all...]
/freebsd/contrib/bsddialog/lib/
H A Dtheme.c59 .shadow.color = GET_COLOR(COLOR_BLACK, COLOR_BLACK),
60 .shadow.y = 1,
61 .shadow.x = 2,
108 .shadow.color = GET_COLOR(COLOR_BLACK, COLOR_BLACK),
109 .shadow.y = 1,
110 .shadow.x = 2,
159 dst->shadow.color = src->shadow.color; in set_theme()
160 dst->shadow.y = src->shadow.y; in set_theme()
161 dst->shadow.x = src->shadow.x; in set_theme()
/freebsd/contrib/llvm-project/llvm/lib/CodeGen/
H A DShadowStackGCLowering.cpp1 //===- ShadowStackGCLowering.cpp - Custom lowering for shadow-stack gc ----===//
9 // This file contains the custom lowering code required by the shadow-stack GC
51 #define DEBUG_TYPE "shadow-stack-gc-lowering"
60 /// StackEntryTy - Abstract type of a link in the shadow stack.
113 if (Map.StrategyMap.contains("shadow-stack")) in GetFrameMap()
137 "Shadow Stack GC Lowering", false, false) in GetFrameMap()
141 "Shadow Stack GC Lowering", false, false) in GetFrameMap()
218 if (F.hasGC() && F.getGC() == "shadow-stack") { in doInitialization()
331 /// runOnFunction - Insert code to maintain the shadow stack. in runOnFunction()
334 // Quick exit for functions that do not use the shadow stac in runOnFunction()
[all...]
/freebsd/contrib/llvm-project/llvm/lib/Target/X86/
H A DX86AsmPrinter.h35 // This utility class tracks the length of a stackmap instruction's 'shadow'.
36 // It is used by the X86AsmPrinter to ensure that the stackmap shadow
38 // the shadow) are met, while outputting a minimal number of NOPs for padding.
40 // To minimise the number of NOPs used, the shadow tracker counts the number
42 // few instruction bytes to cover the shadow are NOPs used for padding.
51 // Called to signal the start of a shadow of RequiredSize bytes.
65 // RequiredShadowSize holds the length of the shadow specified in the most
79 // outputting it to the OutStream. This allows the shadow tracker to minimise

12345678910>>...25