Home
last modified time | relevance | path

Searched full:shadow (Results 1 – 25 of 1078) sorted by relevance

12345678910>>...44

/titanic_41/usr/src/man/man1m/
H A Diiadm.1m90 Copy software allows immediate read/write access to both the master and shadow
95 shadow volumes (caused by writes) from the moment that the snapshot was
97 data to move forward in time independently of applications accessing the shadow
102 and shadow volumes facilitates a fast resynchronization or a full copy at a
103 later time. The volume resynchronization can occur from either shadow to master
104 or master to shadow.
109 be remounted or the applications using them can be resumed. Also, the shadow
130 UPDATE (\fB-u\fR), there are two associated shadow volume selection qualifiers,
137 perform a full volume copy operation from the master to the shadow. When the
138 copy completes, the shadow volume data is identical to the master volume data
[all …]
H A Diicpshd.1m8 iicpshd \- copy Availability Suite Point-in-Time shadow volume
18 The \fBiicpshd\fR command copies an Availability Suite Instant Image shadow
20 reflect the new shadow volume.
23 No checks on the current use of either the old or new shadow volumes are made.
24 The \fBiicpshd\fR command should only be run when the Instant Image shadow set
25 using the old shadow volume is suspended.
36 Update the StorageTek configuration information for the Point-in-Time shadow
37 set, but do \fBnot\fR copy data from the old shadow volume to the new shadow
53 shadow volume to the new shadow volume and updates the bit map header and
83 is using the old shadow volume can result in shadow volume data loss. If you
[all …]
H A Dpwconv.1m9 pwconv \- installs and updates /etc/shadow with information from /etc/passwd
19 The \fBpwconv\fR command creates and updates \fB/etc/shadow\fR with information
25 is already in \fB/etc/shadow\fR and should not be modified.
28 If the \fB/etc/shadow\fR file does not exist, this command will create
29 \fB/etc/shadow\fR with information from \fB/etc/passwd\fR. The command
30 populates \fB/etc/shadow\fR with the user's login name, password, and password
32 \fB/etc/passwd\fR for a given user, none will be added to \fB/etc/shadow\fR.
36 If the \fB/etc/shadow\fR file does exist, the following tasks will be
46 \fB/etc/shadow\fR file will be added to the \fB/etc/shadow\fR file.
56 Entries that are in the \fB/etc/shadow\fR file and not in the
[all …]
H A Drpc.yppasswdd.1m30 \fBshadow\fR, and \fBsecurity/passwd.adjunct\fR files. The \fBpasswd\fR and
31 \fBshadow\fR files provide the basis for the \fBpasswd.byname\fR and
34 the \fBpasswd\fR, \fBshadow\fR or \fBpasswd.adjunct\fR files are changed only
39 If the \fB-D\fR option is given, the \fBpasswd\fR, \fBshadow,\fR or
50 after any of the \fBpasswd\fR, \fBshadow\fR, or \fBpasswd.adjunct\fR files are
57 \fBpasswd.adjunct\fR file. If a shadow file is found in the same directory as
73 The server does not insist on the presence of a \fBshadow\fR file unless there
86 files are in use, the encrypted password is expected in the \fBshadow\fR file.
90 If you remove or add a \fBshadow\fR or \fBpasswd.adjunct\fR file after
112 source files, \fBpasswd\fR, \fBshadow\fR, and \fBpasswd.adjunct\fR, for
[all …]
/freebsd/contrib/llvm-project/compiler-rt/lib/tsan/rtl/
H A Dtsan_rtl_access.cpp148 NOINLINE void DoReportRace(ThreadState* thr, RawShadow* shadow_mem, Shadow cur, in DoReportRace()
149 Shadow old, in DoReportRace()
151 // For the free shadow markers the first element (that contains kFreeSid) in DoReportRace()
155 old = Shadow(LoadShadow(&shadow_mem[1])); in DoReportRace()
158 StoreShadow(&shadow_mem[i], i == 0 ? Shadow::kRodata : Shadow::kEmpty); in DoReportRace()
166 ReportRace(thr, shadow_mem, cur, Shadow(old), typ); in DoReportRace()
173 bool ContainsSameAccess(RawShadow* s, Shadow cur, int unused0, int unused1, in ContainsSameAccess()
183 static_cast<u32>(Shadow::kRodata)); in ContainsSameAccess()
187 if (old == Shadow::kRodata) in ContainsSameAccess()
195 bool CheckRaces(ThreadState* thr, RawShadow* shadow_mem, Shadow cur, in CheckRaces()
[all …]
/titanic_41/usr/src/cmd/krb5/kadmin/gui/visualrt/sunsoft/jws/visual/rt/base/
H A DShadow.java33 * @(#) Shadow.java 1.89 - last change made 07/25/97
45 * the Visual Java palette must be sub-classed from Shadow.
62 public class Shadow extends AttributeManager { class
72 * recreate on the shadow and validate on the shadow's
80 * do with a shadow 'body' and therefore
81 * <a href="sunsoft.jws.visual.rt.base.Shadow.html
83 * <a href="sunsoft.jws.visual.rt.base.Shadow.html
92 public Shadow() { in Shadow() method in Shadow
97 * The AWT component for this shadow.
102 * Returns the AWT component for this shadow.
[all …]
H A DAMContainerHelper.java40 import sunsoft.jws.visual.rt.shadow.java.awt.ComponentShadow;
46 * This is a helper class for shadow containers. Shadow containers are
47 * nodes in the shadow tree. A shadow container should implement the
59 * A list of any shadow children a particular shadow instance
129 if ((child instanceof Shadow) && ((Shadow)child).getBody() in add()
131 container.addChildBody((Shadow) child); in add()
199 if ((child instanceof Shadow) && ((Shadow)child).getBody() in remove()
201 container.removeChildBody((Shadow) child); in remove()
286 if ((child instanceof Shadow) && ((Shadow)child).getBody() in reparentChildren()
288 container.addChildBody((Shadow) child); in reparentChildren()
/freebsd/contrib/llvm-project/compiler-rt/lib/msan/
H A Dmsan.h39 SHADOW = 8,
57 {0x002200000000ULL, 0x004000000000ULL, MappingDesc::SHADOW, "shadow-2"},
61 {0x006200000000ULL, 0x008000000000ULL, MappingDesc::SHADOW, "shadow-3"},
62 {0x008000000000ULL, 0x008200000000ULL, MappingDesc::SHADOW, "shadow-1"},
70 #define SHADOW_TO_ORIGIN(shadow) (((uptr)(shadow)) + 0x2000000000ULL)
79 // the larger app/shadow/origi
36 INVALID, APP, SHADOW, ORIGIN global() enumerator
64 SHADOW_TO_ORIGIN(shadow) global() argument
90 SHADOW_TO_ORIGIN(shadow) global() argument
111 SHADOW_TO_ORIGIN(shadow) global() argument
134 SHADOW_TO_ORIGIN(shadow) global() argument
148 SHADOW_TO_ORIGIN(shadow) global() argument
169 SHADOW_TO_ORIGIN(shadow) global() argument
190 SHADOW_TO_ORIGIN(shadow) global() argument
[all...]
/freebsd/contrib/llvm-project/compiler-rt/lib/asan/
H A Dasan_shadow_setup.cpp11 // Set up the shadow memory.
26 // The shadow gap is unprotected, so there is a chance that someone in ProtectGap()
27 // is actually using this memory. Which means it needs a shadow... in ProtectGap()
34 " not protecting shadow gap, allocating gap's shadow\n" in ProtectGap()
35 "|| `[%p, %p]` || ShadowGap's shadow ||\n", in ProtectGap()
38 "unprotected gap shadow"); in ProtectGap()
56 // Set the shadow memory address to uninitialized. in InitializeShadowMemory()
60 // Detect if a dynamic shadow address must used and find a available location in InitializeShadowMemory()
69 // Update the shadow memory address (potentially) used by instrumentation. in InitializeShadowMemory()
89 // mmap the low shadow plus at least one page at the left. in InitializeShadowMemory()
[all …]
/titanic_41/usr/src/man/man3c/
H A Dgetspnam.3c14 #include <shadow.h>
60 These functions are used to obtain shadow password entries. An entry may come
61 from any of the sources for \fBshadow\fR specified in the
65 The \fBgetspnam()\fR function searches for a shadow password entry with the
70 used to enumerate shadow password entries from the database.
74 of the set of shadow password entries. This function should be called before
84 to do no further shadow password retrieval operations; the system may then
85 close the shadow password file, deallocate resources it was using, and so
87 call more shadow password functions after calling \fBendspent()\fR.
92 \fIfp\fR, which is assumed to have the format of the \fBshadow\fR file (see
[all …]
H A Dlckpwdf.3c8 lckpwdf, ulckpwdf \- manipulate shadow password database lock file
12 #include <shadow.h>
28 modify the \fB/etc/passwd\fR or \fB/etc/shadow\fR password database. See
29 \fBpasswd\fR(4) and \fBshadow\fR(4). Upon completing modifications, a process
33 databases \fB/etc/passwd\fR and \fB/etc/shadow\fR.
62 \fB\fB/etc/shadow\fR\fR
65 shadow password database
96 \fBgetpwnam\fR(3C), \fBgetspnam\fR(3C), \fBpasswd\fR(4), \fBshadow\fR(4),
/freebsd/contrib/llvm-project/compiler-rt/lib/nsan/
H A Dnsan.cpp17 // These return the shadow memory pointer for loading the shadow value,
21 // Sets the shadow types appropriately and returns the shadow memory
22 // pointer for storing the shadow value.
24 // accuracy of a value against its shadow and emits a warning depending
27 // shadow, and depends on the instrumentation configuration.
29 // corresponding shadow fcmp result differs.
56 // When copying application memory, we also copy its shadow and shadow type.
88 ShadowFT Shadow; in ReadShadowInternal() local
89 __builtin_memcpy(&Shadow, ptr, sizeof(Shadow)); in ReadShadowInternal()
90 return Shadow; in ReadShadowInternal()
[all …]
H A Dnsan_platform.h19 // - 'shadow memory' stores the shadow copies of numerical values stored in
21 // - 'shadow types' is used to determine which value type each byte of memory
22 // belongs to. This makes sure that we always know whether a shadow value is
23 // valid. Shadow values may be tampered with using access through other
33 // the corresponding shadow value is no longer valid.
44 // | shadow memory |
46 // | shadow types |
52 // To derive a shadow memory address from an application memory address,
55 // shadow value takes twice as much space as the original value.
56 // Then we add kShadowAddr to put the shadow relative offset into the shadow
[all …]
/titanic_41/usr/src/uts/common/fs/nfs/
H A Dnfs4_shadow.c50 * Map a vnode back to the shadow which points to it. This is
51 * hard now that the vnode is not embedded in the shadow vnode.
61 /* Check to see if it's the master shadow vnode first. */ in vtosv()
82 * sv_activate - find and activate the shadow vnode for the given
109 * Call sv_find to find and/or initialize the shadow in sv_activate()
115 * Initialize the shadow vnode. in sv_activate()
130 * No shadow vnodes (i.e. hard links) in this branch. in sv_activate()
145 * previous shadow vnode reference. Don't in sv_activate()
148 * this shadow vnode. in sv_activate()
161 * sv_find - find the shadow vnode for the desired name and directory
[all …]
/freebsd/contrib/llvm-project/compiler-rt/lib/dfsan/
H A Ddfsan_platform.h24 // TODO: The memory mapping code to setup a 1:1 shadow is based on msan.
34 SHADOW = 8, enumerator
51 // the larger app/shadow/origin regions.
55 {0X0100000000000, 0X0200000000000, MappingDesc::SHADOW, "shadow-14"},
58 {0X0400000000000, 0X0600000000000, MappingDesc::SHADOW, "shadow-15"},
62 {0X0B00000000000, 0X0C00000000000, MappingDesc::SHADOW, "shadow-10-13"},
69 # define SHADOW_TO_ORIGIN(shadow) (((uptr)(shadow)) + 0x200000000000ULL) argument
79 {0x010000000000ULL, 0x100000000000ULL, MappingDesc::SHADOW, "shadow-2"},
82 {0x200000000000ULL, 0x300000000000ULL, MappingDesc::SHADOW, "shadow-3"},
85 {0x500000000000ULL, 0x510000000000ULL, MappingDesc::SHADOW, "shadow-1"},
[all …]
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Instrumentation/
H A DNumericalStabilitySanitizer.cpp10 // Conceptually the pass injects shadow computations using higher precision
69 // Using smaller shadow types types can help improve speed. For example, `dlq`
73 "nsan-shadow-type-mapping", cl::init("dqq"),
74 cl::desc("One shadow type id for each of `float`, `double`, `long double`. "
77 "shadow `float` as `double`, and `double` and `x86_fp80` as "
97 "shadow check in the shadow (`x_shadow == 0.0) == (x == 0.0f)`) or app "
104 // When there is external, uninstrumented code writing to memory, the shadow
109 // framework did a bad job at tracking shadow memory modifications by failing on
126 // It's not really necessary to shadow such stores,
127 // if the shadow value is unknown the framework will re-extend it on load
[all …]
H A DMemorySanitizer.cpp15 /// We associate a few shadow bits with every byte of the application memory,
16 /// poison the shadow of the malloc-ed or alloca-ed memory, load the shadow,
17 /// bits on every memory read, propagate the shadow bits through some of the
18 /// arithmetic instruction (including MOV), store the shadow bits on every memory
20 /// associated shadow is poisoned.
30 /// Another difference from Memcheck is that we use 8 shadow bits per
31 /// byte of application memory and use a direct shadow mapping. This
33 /// shadow updates (Memcheck is single-threaded so races are not a
34 /// concern there. Memcheck uses 2 shadow bits per byte with a slow
37 /// The default value of shadow is 0, which means "clean" (not poisoned).
[all …]
H A DDataFlowSanitizer.cpp24 /// Each byte of application memory is backed by a shadow memory byte. The
25 /// shadow byte can represent up to 8 labels. On Linux/x86_64, memory is then
37 /// | shadow 1 |
43 /// | shadow 3 |
49 /// | shadow 2 |
55 /// SHADOW_TO_ORIGIN(shadow) = shadow + 0x100000000000
135 // the shadow load to have alignment 16. This flag is disabled by default as
143 // The ABI list files control how shadow parameters are passed. The pass treats
156 // will make all shadow and return values set zero labels.
277 // Memory map parameters used in application-to-shadow address calculation.
[all …]
/freebsd/contrib/llvm-project/compiler-rt/lib/memprof/
H A Dmemprof_shadow_setup.cpp11 // Set up the shadow memory.
23 // The shadow gap is unprotected, so there is a chance that someone in ProtectGap()
24 // is actually using this memory. Which means it needs a shadow... in ProtectGap()
30 " not protecting shadow gap, allocating gap's shadow\n" in ProtectGap()
31 "|| `[%p, %p]` || ShadowGap's shadow ||\n", in ProtectGap()
34 "unprotected gap shadow"); in ProtectGap()
43 // Update the shadow memory address (potentially) used by instrumentation. in InitializeShadowMemory()
52 // mmap the low shadow plus at least one page at the left. in InitializeShadowMemory()
54 ReserveShadowMemoryRange(shadow_start, kLowShadowEnd, "low shadow"); in InitializeShadowMemory()
55 // mmap the high shadow. in InitializeShadowMemory()
[all …]
/titanic_41/usr/src/lib/libc/port/gen/
H A Dgetspent_r.c32 #include <shadow.h>
167 * str2spwd() -- convert a string to a shadow passwd entry. The parser is
182 struct spwd *shadow = (struct spwd *)ent; in str2spwd() local
213 shadow->sp_namp = bufp = buffer; in str2spwd()
214 shadow->sp_pwdp = 0; in str2spwd()
215 shadow->sp_lstchg = -1; in str2spwd()
216 shadow->sp_min = -1; in str2spwd()
217 shadow->sp_max = -1; in str2spwd()
218 shadow->sp_warn = -1; in str2spwd()
219 shadow->sp_inact = -1; in str2spwd()
[all …]
/titanic_41/usr/src/cmd/pwconv/
H A Dpwconv.c34 /* password file to the shadow file. */
42 #include <shadow.h>
60 #define BADSHW 6 /* Bad entry in shadow file */
70 * getspnan routine that ONLY looks at the local shadow file
79 if ((shadf = fopen("/etc/shadow", "r")) == NULL) in local_getspnam()
178 /* default mode mask of the shadow file */ in main()
181 /* check the existence of shadow file */ in main()
182 /* if the shadow file exists, get mode mask and group id of the file */ in main()
186 if (access(SHADOW, F_OK) == 0) { in main()
187 if (stat(SHADOW, &buf) == 0) { in main()
[all …]
/titanic_41/usr/src/man/man4/
H A Dshadow.46 .TH SHADOW 4 "Sep 15, 2005"
8 shadow \- shadow password file
12 \fB/etc/shadow\fR is an access-restricted ASCII system file that stores users'
13 encrypted passwords and related information. The shadow file can be used in
14 conjunction with other shadow sources, including the \fBNIS\fR maps
21 \fB/etc/shadow\fR does not have general read permission.
24 Each entry in the shadow file has the form:
144 In order to make system administration manageable, \fB/etc/shadow\fR entries
156 \fB\fB/etc/shadow\fR\fR
159 shadow password file
/freebsd/contrib/llvm-project/compiler-rt/lib/hwasan/
H A Dhwasan_dynamic_shadow.cpp10 /// This file is a part of HWAddressSanitizer. It reserves dynamic shadow memory
56 const uptr shadow = reinterpret_cast<uptr>(&__hwasan_shadow); in IsPremapShadowAvailable() local
58 // shadow == resolver is how Android KitKat and older handles ifunc. in IsPremapShadowAvailable()
59 // shadow == 0 just in case. in IsPremapShadowAvailable()
60 return shadow != 0 && shadow != resolver; in IsPremapShadowAvailable()
79 // The resolver might be called multiple times. Map the shadow just once. in __hwasan_premap_shadow()
80 static __sanitizer::uptr shadow = 0; in __hwasan_premap_shadow() local
81 if (!shadow) in __hwasan_premap_shadow()
82 shadow = __hwasan::PremapShadow(); in __hwasan_premap_shadow()
83 return reinterpret_cast<decltype(__hwasan_shadow)*>(shadow); in __hwasan_premap_shadow()
[all …]
/freebsd/share/man/man9/
H A Dkmsan.973 runtime component and use hidden, byte-granular shadow state to determine
78 Otherwise, the shadow state is propagated to destination operand.
99 perform validation of the input's shadow state and will raise an error if
106 the kernel map requires two bytes of shadow state.
124 shadow state.
148 shadow state.
161 function and its sub-typed siblings validate the shadow state of the region(s)
175 .Ss Shadow Maps
181 The first, simply called the shadow map, tracks the state of the corresponding
183 A non-zero byte in the shadow map indicates that the corresponding byte of
[all …]
/titanic_41/usr/src/cmd/krb5/kadmin/gui/visualrt/sunsoft/jws/visual/rt/props/
H A DVisualRTProperties.java53 "sunsoft.jws.visual.rt.shadow.GenericComponentShadow.Class__not__found",
56 "sunsoft.jws.visual.rt.shadow.GenericComponentShadow.FMT.1",
59 "sunsoft.jws.visual.rt.shadow.GenericComponentShadow.NotAComponentSubclass",
62 "sunsoft.jws.visual.rt.shadow.GenericComponentShadow.IllegalAccess",
65 "sunsoft.jws.visual.rt.shadow.GenericComponentShadow.InstantiationException",
68 "sunsoft.jws.visual.rt.shadow.GenericComponentShadow.Noconstructor",
71 "sunsoft.jws.visual.rt.shadow.GenericWindowShadow.Class__not__found",
74 "sunsoft.jws.visual.rt.shadow.GenericWindowShadow.NotARootSubclass",
77 "sunsoft.jws.visual.rt.shadow.GenericWindowShadow.IllegalAccess",
80 "sunsoft.jws.visual.rt.shadow.GenericWindowShadow.InstantiationException",
[all …]

12345678910>>...44