/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/removal/ |
H A D | removal_nopwrite.ksh | 35 origin="$TESTPOOL/$TESTFS" 37 log_must zfs set compress=on $origin 38 log_must zfs set checksum=skein $origin 40 log_must zfs set copies=1 $origin 41 log_must zfs set recordsize=8k $origin 44 log_must zfs set copies=3 $origin 48 log_must zfs set copies=1 $origin 49 log_must zfs set recordsize=128k $origin 52 log_must zfs set copies=3 $origin 57 zfs snapshot $origin@a || log_fail "zfs snap failed" [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/nopwrite/ |
H A D | nopwrite_negative.ksh | 27 # 1. The file in the origin ds is written without compression or sha256. 28 # 2. The file in the origin ds is written before sha256 checksum is turned on. 34 origin="$TESTPOOL/$TESTFS" 39 datasetexists $origin && destroy_dataset $origin -R 40 log_must zfs create -o mountpoint=$TESTDIR $origin 45 # Data written into origin fs without compression or sha256 48 zfs snapshot $origin@a || log_fail "zfs snap failed" 49 log_must zfs clone -o compress=on $origin@a $origin/clone 50 log_must zfs set checksum=sha256 $origin/clone 53 log_mustnot verify_nopwrite $origin $origin@a $origin/clone [all …]
|
H A D | nopwrite_copies.ksh | 26 # 1. Create a clone with copies set higher than the origin fs 32 origin="$TESTPOOL/$TESTFS" 37 datasetexists $origin && destroy_dataset $origin -R 38 log_must zfs create -o mountpoint=$TESTDIR $origin 44 log_must zfs set compress=on $origin 45 log_must zfs set checksum=sha256 $origin 48 zfs snapshot $origin@a || log_fail "zfs snap failed" 49 log_must zfs clone $origin@a $origin/clone 50 zfs set copies=3 $origin/clone 53 log_mustnot verify_nopwrite $origin $origin@a $origin/clone [all …]
|
H A D | nopwrite_varying_compression.ksh | 25 # Verify that if the checksum on the origin and clone is sha256, any compression 29 # 1. Create an origin dataset with compression and sha256 checksum. 30 # 2. Write a 64M file into the origin dataset. 32 # 3a. Create a snap and clone (inheriting the checksum property) of the origin. 39 origin="$TESTPOOL/$TESTFS" 44 datasetexists $origin && destroy_dataset $origin -R 45 log_must zfs create -o mountpoint=$TESTDIR $origin 50 log_must zfs set compress=on $origin 51 log_must zfs set checksum=sha256 $origin 57 zfs snapshot $origin@a || log_fail "zfs snap failed" [all …]
|
H A D | nopwrite_recsize.ksh | 26 # 1. Create an origin fs that's suitable to make nopwrite clones. 28 # checksum, and verify overwriting the origin file consumes no new space. 32 origin="$TESTPOOL/$TESTFS" 37 datasetexists $origin && destroy_dataset $origin -R 38 log_must zfs create -o mountpoint=$TESTDIR $origin 43 log_must zfs set compress=on $origin 44 log_must zfs set checksum=sha256 $origin 47 zfs snapshot $origin@a || log_fail "zfs snap failed" 48 log_must zfs clone $origin@a $origin/clone 51 log_must zfs set recsize=$rs $origin/clone [all …]
|
H A D | nopwrite_sync.ksh | 26 # 1. Create an origin fs with compression and sha256. 27 # 2. Clone origin such that it inherits the properties. 32 origin="$TESTPOOL/$TESTFS" 37 datasetexists $origin && destroy_dataset $origin -R 38 log_must zfs create -o mountpoint=$TESTDIR $origin 43 log_must zfs set compress=on $origin 44 log_must zfs set checksum=sha256 $origin 47 zfs snapshot $origin@a || log_fail "zfs snap failed" 48 log_must zfs clone $origin@a $origin/clone 53 log_must verify_nopwrite $origin $origin@a $origin/clone
|
H A D | nopwrite_volume.ksh | 27 # 2. Overwrite the same blocks from the origin vol and verify that 32 origin="$TESTPOOL/$TESTVOL" 34 vol="${ZVOL_RDEVDIR}/$origin" 40 datasetexists $origin && destroy_dataset $origin -R 46 log_must zfs set compress=on $origin 47 log_must zfs set checksum=sha256 $origin 49 2>&1 || log_fail "dd into $origin failed." 50 zfs snapshot $origin@a || log_fail "zfs snap failed" 51 log_must zfs clone $origin@a $clone 57 log_must verify_nopwrite $origin $origin@a $clone
|
H A D | nopwrite_mtime.ksh | 32 origin="$TESTPOOL/$TESTFS" 37 datasetexists $origin && destroy_dataset $origin -R 38 log_must zfs create -o mountpoint=$TESTDIR $origin 43 log_must zfs set compress=on $origin 44 log_must zfs set checksum=sha256 $origin 47 zfs snapshot $origin@a || log_fail "zfs snap failed" 48 log_must zfs clone $origin@a $origin/clone 87 log_must verify_nopwrite $origin $origin@a $origin/clone
|
H A D | nopwrite_promoted_clone.ksh | 29 # 3. Overwrite the file in the clone (former origin fs) and verify it 34 origin="$TESTPOOL/$TESTFS" 39 datasetexists $origin && destroy_dataset $TESTPOOL/clone -R 40 log_must zfs create -o mountpoint=$TESTDIR $origin 45 log_must zfs set compress=on $origin 46 log_must zfs set checksum=sha256 $origin 49 zfs snapshot $origin@a || log_fail "zfs snap failed" 50 log_must zfs clone $origin@a $TESTPOOL/clone 56 log_must verify_nopwrite $TESTPOOL/clone $TESTPOOL/clone@a $origin
|
/freebsd/contrib/llvm-project/compiler-rt/lib/msan/ |
H A D | msan_origin.h | 9 // Origin id utils. 19 // Origin handling. 21 // Origin is a 32-bit identifier that is attached to any uninitialized value in 25 // There are 3 kinds of origin ids: 26 // 1xxx xxxx xxxx xxxx heap origin id 27 // 0000 xxxx xxxx xxxx stack origin id 28 // 0zzz xxxx xxxx xxxx chained origin id 30 // Heap origin id describes a heap memory allocation and contains (in the xxx 33 // Stack origin id describes a stack memory allocation and contains (in the xxx 37 // Chained origin id describes an event of storing an uninitialized value to [all …]
|
H A D | msan.h | 40 ORIGIN = 16, 59 {0x004200000000ULL, 0x006000000000ULL, MappingDesc::ORIGIN, "origin-2"}, 63 {0x008200000000ULL, 0x00a000000000ULL, MappingDesc::ORIGIN, "origin-3"}, 64 {0x00a000000000ULL, 0x00a200000000ULL, MappingDesc::ORIGIN, "origin-1"}, 79 // the larger app/shadow/origin regions. 85 {0X0300000000000, 0X0400000000000, MappingDesc::ORIGIN, "origin 36 INVALID, APP, SHADOW, ORIGIN global() enumerator [all...] |
H A D | msan_poisoning.h | 20 // Return origin for the first poisoned byte in the memory range, or 0. 23 // Walk [addr, addr+size) app memory region, copying origin tags from the 28 // Copy origin from src (app address) to dst (app address), creating chained 29 // origin ids as necessary, without overriding origin for fully initialized 33 // memmove() shadow and origin. Dst and src are application addresses. 34 // See CopyOrigin() for the origin copying logic. 38 // memcpy() shadow and origin. Dst and src are application addresses. 39 // See CopyOrigin() for the origin copying logic. 44 // origin regions. 50 // Set origin for the memory region. [all …]
|
H A D | msan_report.cpp | 35 const char *Origin() const { return Magenta(); } in Origin() function in __msan::Decorator 41 Printf("%s", d.Origin()); in DescribeStackOrigin() 46 d.Origin(), d.Name(), so, d.Origin(), d.Default()); in DescribeStackOrigin() 49 d.Origin(), d.Default()); in DescribeStackOrigin() 57 VPrintf(1, " raw origin id: %d\n", id); in DescribeOrigin() 59 Origin o = Origin::FromRawId(id); in DescribeOrigin() 63 Printf(" %sUninitialized value was stored to memory at%s\n", d.Origin(), in DescribeOrigin() 76 d.Origin(), in DescribeOrigin() 102 ReportUMR(StackTrace * stack,u32 origin) ReportUMR() argument [all...] |
H A D | msan.cpp | 47 // Function argument origin. Each argument starts at the same offset as the 217 f->origin_history_size > Origin::kMaxDepth) { in InitializeFlags() 219 "Origin history size invalid: %d. Must be 0 (unlimited) or in [1, %d] " in InitializeFlags() 221 f->origin_history_size, Origin::kMaxDepth); in InitializeFlags() 229 "Origin per-stack limit invalid: %d. Must be 0 (unlimited) or in [1, " in InitializeFlags() 237 void PrintWarningWithOrigin(uptr pc, uptr bp, u32 origin) { in PrintWarningWithOrigin() argument 240 __msan_origin_tls = origin; in PrintWarningWithOrigin() 250 (__msan_get_track_origins() && Origin::isValidId(origin)) ? origin : 0; in PrintWarningWithOrigin() 253 if (__msan_get_track_origins() && !Origin::isValidId(origin)) { in PrintWarningWithOrigin() 255 " ORIGIN: invalid (%x). Might be a bug in MemorySanitizer origin " in PrintWarningWithOrigin() [all …]
|
H A D | msan_poisoning.cpp | 49 // Copy left unaligned origin if that memory is poisoned. in CopyOrigin() 63 // Copy right unaligned origin if that memory is poisoned. in CopyOrigin() 106 // Copy right unaligned origin if that memory is poisoned. in ReverseCopyOrigin() 143 // Copy left unaligned origin if that memory is poisoned. in ReverseCopyOrigin() 156 // If destination origin range overlaps with source origin range, move in MoveOrigin() 184 // Because origin's range is slightly larger than app range, memcpy may also in CopyShadowAndOrigin() 185 // cause overlapped origin ranges. in CopyShadowAndOrigin() 221 // No need to set origin for zero shadow, but we can release pages. in SetShadow() 230 void SetOrigin(const void *dst, uptr size, u32 origin) { in SetOrigin() argument 231 // Origin mapping is 4 bytes per 4 bytes of application memory. in SetOrigin() [all …]
|
/freebsd/contrib/llvm-project/compiler-rt/lib/dfsan/ |
H A D | dfsan_origin.h | 11 // Origin id utils. 23 // Origin handling. 25 // Origin is a 32-bit identifier that is attached to any taint value in the 28 // Chained origin id is like: 31 // Chained origin id describes an event of storing a taint value to 36 // * prev_id is another origin id that describes the earlier part of the 42 // marked with origin ids, and edges are events that are marked with stack_id. 44 // The "zzzz" bits of chained origin id are used to store the length of the 45 // origin chain. 47 class Origin { [all …]
|
H A D | dfsan.cpp | 76 // | origin 1 | 84 // | origin 3 | 88 // | origin 2 | 109 // origin of the first taint byte at the low 32 bit. 177 // Return the origin of the first taint byte in the size bytes from the address 209 // from_init = true if this is the first chain of an origin tracking path. 217 // As an optimization the origin of an application byte is updated only when in ChainOrigin() 219 // taint labels, it does not matter what origin a zero label has. This reduces in ChainOrigin() 223 Printf(" DFSan found invalid origin invariant\n"); in ChainOrigin() 227 Origin o = Origin::FromRawId(id); in ChainOrigin() [all …]
|
H A D | dfsan_platform.h | 35 ORIGIN = 16, enumerator 51 // the larger app/shadow/origin regions. 57 {0X0300000000000, 0X0400000000000, MappingDesc::ORIGIN, "origin-14"}, 59 {0X0600000000000, 0X0800000000000, MappingDesc::ORIGIN, "origin-15"}, 64 {0X0D00000000000, 0X0E00000000000, MappingDesc::ORIGIN, "origin-10-13"}, 81 {0x110000000000ULL, 0x200000000000ULL, MappingDesc::ORIGIN, "origin-2"}, 83 {0x300000000000ULL, 0x400000000000ULL, MappingDesc::ORIGIN, "origin-3"}, 87 {0x600000000000ULL, 0x610000000000ULL, MappingDesc::ORIGIN, "origin-1"}, 123 #define MEM_IS_ORIGIN(mem) addr_is_type((uptr)(mem), MappingDesc::ORIGIN)
|
/freebsd/crypto/openssl/doc/internal/man7/ |
H A D | EVP_PKEY.pod | 23 as its "internal key" or "origin" (the reason for "origin" is 29 =item legacy origin 43 =item provider-native origin 60 confusing which one of the two is the origin. 95 For provider native origin keys, this doesn't require any help from 99 For legacy origin keys, this requires the associated 121 the key data that the cached keys came from is the "origin", and since 122 there are two forms of the latter, we have the "legacy origin" and the 123 "provider native origin" [all...] |
/freebsd/contrib/llvm-project/compiler-rt/lib/scudo/standalone/ |
H A D | wrappers_cpp.cpp | 39 void *Ptr = Allocator.allocate(size, scudo::Chunk::Origin::New); in operator new() 44 void *Ptr = Allocator.allocate(size, scudo::Chunk::Origin::NewArray); in operator new[]() 50 void *Ptr = Allocator.allocate(size, scudo::Chunk::Origin::New); in operator new() 56 void *Ptr = Allocator.allocate(size, scudo::Chunk::Origin::NewArray); 61 void *Ptr = Allocator.allocate(size, scudo::Chunk::Origin::New, in operator delete[]() 67 void *Ptr = Allocator.allocate(size, scudo::Chunk::Origin::NewArray, in operator delete[]() 74 void *Ptr = Allocator.allocate(size, scudo::Chunk::Origin::New, in operator delete[]() 81 void *Ptr = Allocator.allocate(size, scudo::Chunk::Origin::NewArray, in operator delete() 89 Allocator.deallocate(ptr, scudo::Chunk::Origin::New); in operator delete() 93 Allocator.deallocate(ptr, scudo::Chunk::Origin in operator delete[]() [all...] |
/freebsd/sys/contrib/openzfs/contrib/pyzfs/libzfs_core/ |
H A D | _libzfs_core.py | 130 def lzc_clone(name, origin, props=None): argument 135 :param bytes origin: a name of the origin snapshot. 142 dataset or the origin snapshot does not exist. 146 :raises SnapshotNameInvalid: if the origin is not a valid snapshot name. 147 :raises NameTooLong: if the name or the origin name is too long. 148 :raises PoolsDiffer: if the clone and the origin have different pool names. 153 the target or the origin snapshot does not exist. 161 ret = _lib.lzc_clone(name, origin, nvlist) 162 errors.lzc_clone_translate_error(ret, name, origin, props) 590 ``snapname``, or it can be the origin of ``snapname``'s filesystem, or an [all …]
|
/freebsd/contrib/llvm-project/clang/include/clang/AST/ |
H A D | ExternalASTMerger.h | 33 /// - The DeclContext of origin can be found by simple name lookup. In this 36 /// - The DeclContext of origin is different from what would be found by name 40 /// - The DeclContext of origin was determined by another ExternalASTMerger. 42 /// its own ExternalASTMerger). The origin must be properly forwarded in this 50 /// A single origin for a DeclContext. Unlike Decls, DeclContexts do 81 /// a DeclContext whose origin has been overridden, then this 135 /// Sometimes an origin goes away (for example, if a source file gets 161 /// Records an origin in Origins only if name lookup would find 163 void MaybeRecordOrigin(const DeclContext *ToDC, DCOrigin Origin); 165 /// Regardless of any checks, override the Origin for a DeclContext. [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/redacted_send/ |
H A D | redacted_origin.ksh | 35 typeset ds_name="origin" 66 log_must eval "zfs receive -o origin=$POOL2/rBCD@snap0 $POOL2/BCDrF <$stream" 67 log_must eval "zfs receive -o origin=$POOL2/rBC@snap0 $POOL2/BCrF <$stream" 68 log_must eval "zfs receive -o origin=$POOL2/rE@snap0 $POOL2/ErF <$stream" 72 log_must eval "zfs receive -o origin=$targ $POOL2/tdBCD <$stream" 75 log_must eval "zfs receive -o origin=$targ $POOL2/tdBC <$stream" 78 log_mustnot eval "zfs receive -o origin=$targ $POOL2/tdE <$stream" 82 log_must eval "zfs receive -o origin=$targ $POOL2/tbBC <$stream" 85 log_mustnot eval "zfs receive -o origin=$targ $POOL2/tbE <$stream"
|
/freebsd/stand/lua/ |
H A D | gfx.lua.8 | 31 The units are in pixels and have an origin of 40 The units are in pixels and have an origin of 49 The units are in pixels and have an origin of 61 The units are in pixels and have an origin of 66 The units are in pixels and have an origin of 73 The units are in character cells and have an origin of 85 The units are in character cells and have an origin of
|
/freebsd/sys/dev/fb/ |
H A D | splash_pcx.c | 204 int banksize, origin; in pcx_draw() local 219 for (origin = 0; origin < sheight*sbpsl; origin += banksize) { in pcx_draw() 220 vidd_set_win_org(adp, origin); in pcx_draw() 226 origin = 0; in pcx_draw() 230 origin += banksize; in pcx_draw() 232 vidd_set_win_org(adp, origin); in pcx_draw() 250 origin += banksize; in pcx_draw() 252 vidd_set_win_org(adp, origin); in pcx_draw() 259 origin += banksize; in pcx_draw() 261 vidd_set_win_org(adp, origin); in pcx_draw()
|