/freebsd-11-stable/sys/amd64/vmm/intel/ |
H A D | vmx.c | 756 * Check support for TPR shadow. 1092 * Set up the CR0/4 shadows, and init the read shadow 3140 * Forcing the vcpu into an interrupt shadow is not supported. 3203 int error, hostcpu, running, shadow; local 3242 shadow = vmx_shadow_reg(reg); 3243 if (shadow > 0) { 3245 * Store the unmodified value in the shadow 3248 VMCS_IDENT(shadow), val);
|
/freebsd-11-stable/sys/dev/mxge/ |
H A D | if_mxge.c | 2437 rx->shadow[idx].addr_low = 2439 rx->shadow[idx].addr_high = 2444 mxge_submit_8rx(&rx->lanai[idx - 7], &rx->shadow[idx - 7]); 2470 rx->shadow[idx].addr_low = 2472 rx->shadow[idx].addr_high = 2477 rx->shadow[idx + i].addr_low = 2479 rx->shadow[idx + i].addr_high = 2488 &rx->shadow[idx - 7]); 3249 if (ss->rx_small.shadow != NULL) 3250 free(ss->rx_small.shadow, M_DEVBU [all...] |
/freebsd-11-stable/sys/netpfil/pf/ |
H A D | pf_table.c | 1500 struct pfr_ktable *kt, *rt, *shadow, key; local 1547 shadow = pfr_create_ktable(tbl, 0, 0); 1548 if (shadow == NULL) { 1556 if (pfr_lookup_addr(shadow, ad, 1) != NULL) 1559 (shadow->pfrkt_flags & PFR_TFLAG_COUNTERS) != 0); 1562 if (pfr_route_kentry(shadow, p)) { 1574 shadow->pfrkt_cnt = (flags & PFR_FLAG_ADDRSTOO) ? 1576 kt->pfrkt_shadow = shadow; 1578 pfr_clean_node_mask(shadow, &addrq); 1579 pfr_destroy_ktable(shadow, 1676 struct pfr_ktable *shadow = kt->pfrkt_shadow; local [all...] |
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/msan/ |
H A D | msan.h | 51 {0x002200000000ULL, 0x004000000000ULL, MappingDesc::SHADOW, "shadow-2"}, 55 {0x006200000000ULL, 0x008000000000ULL, MappingDesc::SHADOW, "shadow-3"}, 56 {0x008000000000ULL, 0x008200000000ULL, MappingDesc::SHADOW, "shadow-1"}, 64 #define SHADOW_TO_ORIGIN(shadow) (((uptr)(shadow)) + 0x2000000000ULL) 83 {0x01000000000ULL, 0x02000000000ULL, MappingDesc::SHADOW, "shadow-2"}, 85 {0x03000000000ULL, 0x04000000000ULL, MappingDesc::SHADOW, "shadow-1"}, 92 {0x09000000000ULL, 0x0A000000000ULL, MappingDesc::SHADOW, "shadow-3"}, 99 {0x17000000000ULL, 0x18000000000ULL, MappingDesc::SHADOW, "shadow-4"}, 104 {0x26000000000ULL, 0x27000000000ULL, MappingDesc::SHADOW, "shadow [all...] |
H A D | msan.cpp | 40 // Function argument shadow. Each argument starts at the next available 8-byte 46 // corresponding shadow in (__msan_param_tls). Slightly weird, but changing this 436 Printf("FATAL: MemorySanitizer can not mmap the shadow memory.\n"); 544 void __msan_partial_poison(const void* data, void* shadow, uptr size) { argument 545 internal_memcpy((void*)MEM_TO_SHADOW((uptr)data), shadow, size);
|
H A D | msan_interface_internal.h | 143 void __msan_partial_poison(const void* data, void* shadow, uptr size);
|
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/asan/ |
H A D | asan_premap_shadow.cpp | 11 // Reserve shadow memory with an ifunc resolver. 54 uptr shadow = reinterpret_cast<uptr>(&__asan_shadow); local 56 // shadow == resolver is how Android KitKat and older handles ifunc. 57 // shadow == 0 just in case. 58 if (shadow == 0 || shadow == resolver) 66 // The resolver may be called multiple times. Map the shadow just once. 73 // the shadow mapping.
|
H A D | asan_fake_stack.cpp | 30 u64 *shadow = reinterpret_cast<u64*>(MemToShadow(ptr)); local 34 shadow[i] = magic;
|
H A D | asan_descriptions.h | 89 static const char *const ShadowNames[] = {"low shadow", "shadow gap", 90 "high shadow"}; 170 // a shadow, global (variable), stack, or heap address. 192 ShadowAddressDescription shadow; member in union:__asan::AddressDescription::AddressDescriptionData::__anon970 216 return data.shadow.addr; 232 return data.shadow.Print(); 247 return data.kind == kAddressKindShadow ? &data.shadow : nullptr;
|
H A D | asan_descriptions.cpp | 80 CHECK(0 && "Address is not in memory and not in shadow?"); 441 if (GetShadowAddressInformation(addr, &data.shadow)) {
|
H A D | asan_debugging.cpp | 88 if (auto shadow = descr.AsShadow()) { 90 switch (shadow->kind) { 92 region_kind = "low shadow"; 95 region_kind = "shadow gap"; 98 region_kind = "high shadow";
|
H A D | asan_allocator.cpp | 197 // Mark the corresponding shadow memory as not needed. 535 u8 *shadow = local 537 *shadow = fl.poison_partial ? (size & (SHADOW_GRANULARITY - 1)) : 0;
|
H A D | asan_poisoning.h | 26 // Poisons the shadow memory for "size" bytes starting from "addr". 29 // Poisons the shadow memory for "redzone_size" bytes starting from 50 // for mapping shadow and zeroing out pages doesn't "just work", so we should 83 u8 *shadow = (u8*)MEM_TO_SHADOW(aligned_addr); local 84 for (uptr i = 0; i < redzone_size; i += SHADOW_GRANULARITY, shadow++) { 86 *shadow = 0; // fully addressable 88 *shadow = (SHADOW_GRANULARITY == 128) ? 0xff : value; // unaddressable 91 *shadow = poison_partial ? static_cast<u8>(size - i) : 0;
|
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/hwasan/ |
H A D | hwasan_dynamic_shadow.cpp | 10 /// This file is a part of HWAddressSanitizer. It reserves dynamic shadow memory 89 const uptr shadow = reinterpret_cast<uptr>(&__hwasan_shadow); local 91 // shadow == resolver is how Android KitKat and older handles ifunc. 92 // shadow == 0 just in case. 93 return shadow != 0 && shadow != resolver; 112 // The resolver might be called multiple times. Map the shadow just once. 113 static __sanitizer::uptr shadow = 0; local 114 if (!shadow) 115 shadow [all...] |
/freebsd-11-stable/contrib/llvm-project/compiler-rt/include/sanitizer/ |
H A D | msan_interface.h | 55 void __msan_partial_poison(const volatile void *data, void *shadow, 78 /* Print shadow and origin for the memory range to stderr in a human-readable 82 /* Print shadow for the memory range to stderr in a minimalistic 103 /* Update shadow for the application copy of size bytes from src to dst. 105 actual application memory, it only updates shadow and origin for such
|
/freebsd-11-stable/contrib/libpcap/rpcapd/ |
H A D | daemon.c | 55 #include <shadow.h> // for password management 1221 * We use the Solaris/Linux shadow password authentication if 1224 * with shadow passwords, if we're running as root. Traditional
|
/freebsd-11-stable/contrib/tcsh/ |
H A D | sh.h | 408 # include <shadow.h>
|
/freebsd-11-stable/sys/dev/qlnx/qlnxe/ |
H A D | ecore_vf.c | 1723 struct ecore_bulletin_content shadow; local 1730 OSAL_MEMCPY(&shadow, p_iov->bulletin.p_virt, p_iov->bulletin.size); 1733 if (shadow.version == p_iov->bulletin_shadow.version) 1737 crc = OSAL_CRC32(0, (u8 *)&shadow + crc_size, 1739 if (crc != shadow.crc) 1742 /* Set the shadow bulletin and process it */ 1743 OSAL_MEMCPY(&p_iov->bulletin_shadow, &shadow, p_iov->bulletin.size); 1746 "Read a bulletin update %08x\n", shadow.version);
|
/freebsd-11-stable/secure/usr.sbin/sshd/ |
H A D | Makefile | 15 loginrec.c auth-pam.c auth-shadow.c auth-sia.c md5crypt.c \
|
/freebsd-11-stable/crypto/openssh/ |
H A D | auth.h | 139 #include <shadow.h>
|
H A D | auth.c | 45 #include <shadow.h>
|
/freebsd-11-stable/crypto/openssh/openbsd-compat/ |
H A D | xcrypt.c | 48 # include <shadow.h>
|
/freebsd-11-stable/crypto/heimdal/ |
H A D | configure | 15960 shadow.h \ 23123 #include <shadow.h>
|
/freebsd-11-stable/crypto/heimdal/appl/login/ |
H A D | Makefile.am | 20 shadow.c \
|
H A D | Makefile.in | 104 read_string.$(OBJEXT) shadow.$(OBJEXT) stty_default.$(OBJEXT) \ 413 shadow.c \ 523 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/shadow.Po@am__quote@
|