Searched refs:shadow (Results 1 - 25 of 52) sorted by last modified time

123

/freebsd-11-stable/sys/amd64/vmm/intel/
H A Dvmx.c756 * Check support for TPR shadow.
1092 * Set up the CR0/4 shadows, and init the read shadow
3140 * Forcing the vcpu into an interrupt shadow is not supported.
3203 int error, hostcpu, running, shadow; local
3242 shadow = vmx_shadow_reg(reg);
3243 if (shadow > 0) {
3245 * Store the unmodified value in the shadow
3248 VMCS_IDENT(shadow), val);
/freebsd-11-stable/sys/dev/mxge/
H A Dif_mxge.c2437 rx->shadow[idx].addr_low =
2439 rx->shadow[idx].addr_high =
2444 mxge_submit_8rx(&rx->lanai[idx - 7], &rx->shadow[idx - 7]);
2470 rx->shadow[idx].addr_low =
2472 rx->shadow[idx].addr_high =
2477 rx->shadow[idx + i].addr_low =
2479 rx->shadow[idx + i].addr_high =
2488 &rx->shadow[idx - 7]);
3249 if (ss->rx_small.shadow != NULL)
3250 free(ss->rx_small.shadow, M_DEVBU
[all...]
/freebsd-11-stable/sys/netpfil/pf/
H A Dpf_table.c1500 struct pfr_ktable *kt, *rt, *shadow, key; local
1547 shadow = pfr_create_ktable(tbl, 0, 0);
1548 if (shadow == NULL) {
1556 if (pfr_lookup_addr(shadow, ad, 1) != NULL)
1559 (shadow->pfrkt_flags & PFR_TFLAG_COUNTERS) != 0);
1562 if (pfr_route_kentry(shadow, p)) {
1574 shadow->pfrkt_cnt = (flags & PFR_FLAG_ADDRSTOO) ?
1576 kt->pfrkt_shadow = shadow;
1578 pfr_clean_node_mask(shadow, &addrq);
1579 pfr_destroy_ktable(shadow,
1676 struct pfr_ktable *shadow = kt->pfrkt_shadow; local
[all...]
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/msan/
H A Dmsan.h51 {0x002200000000ULL, 0x004000000000ULL, MappingDesc::SHADOW, "shadow-2"},
55 {0x006200000000ULL, 0x008000000000ULL, MappingDesc::SHADOW, "shadow-3"},
56 {0x008000000000ULL, 0x008200000000ULL, MappingDesc::SHADOW, "shadow-1"},
64 #define SHADOW_TO_ORIGIN(shadow) (((uptr)(shadow)) + 0x2000000000ULL)
83 {0x01000000000ULL, 0x02000000000ULL, MappingDesc::SHADOW, "shadow-2"},
85 {0x03000000000ULL, 0x04000000000ULL, MappingDesc::SHADOW, "shadow-1"},
92 {0x09000000000ULL, 0x0A000000000ULL, MappingDesc::SHADOW, "shadow-3"},
99 {0x17000000000ULL, 0x18000000000ULL, MappingDesc::SHADOW, "shadow-4"},
104 {0x26000000000ULL, 0x27000000000ULL, MappingDesc::SHADOW, "shadow
[all...]
H A Dmsan.cpp40 // Function argument shadow. Each argument starts at the next available 8-byte
46 // corresponding shadow in (__msan_param_tls). Slightly weird, but changing this
436 Printf("FATAL: MemorySanitizer can not mmap the shadow memory.\n");
544 void __msan_partial_poison(const void* data, void* shadow, uptr size) { argument
545 internal_memcpy((void*)MEM_TO_SHADOW((uptr)data), shadow, size);
H A Dmsan_interface_internal.h143 void __msan_partial_poison(const void* data, void* shadow, uptr size);
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/asan/
H A Dasan_premap_shadow.cpp11 // Reserve shadow memory with an ifunc resolver.
54 uptr shadow = reinterpret_cast<uptr>(&__asan_shadow); local
56 // shadow == resolver is how Android KitKat and older handles ifunc.
57 // shadow == 0 just in case.
58 if (shadow == 0 || shadow == resolver)
66 // The resolver may be called multiple times. Map the shadow just once.
73 // the shadow mapping.
H A Dasan_fake_stack.cpp30 u64 *shadow = reinterpret_cast<u64*>(MemToShadow(ptr)); local
34 shadow[i] = magic;
H A Dasan_descriptions.h89 static const char *const ShadowNames[] = {"low shadow", "shadow gap",
90 "high shadow"};
170 // a shadow, global (variable), stack, or heap address.
192 ShadowAddressDescription shadow; member in union:__asan::AddressDescription::AddressDescriptionData::__anon970
216 return data.shadow.addr;
232 return data.shadow.Print();
247 return data.kind == kAddressKindShadow ? &data.shadow : nullptr;
H A Dasan_descriptions.cpp80 CHECK(0 && "Address is not in memory and not in shadow?");
441 if (GetShadowAddressInformation(addr, &data.shadow)) {
H A Dasan_debugging.cpp88 if (auto shadow = descr.AsShadow()) {
90 switch (shadow->kind) {
92 region_kind = "low shadow";
95 region_kind = "shadow gap";
98 region_kind = "high shadow";
H A Dasan_allocator.cpp197 // Mark the corresponding shadow memory as not needed.
535 u8 *shadow = local
537 *shadow = fl.poison_partial ? (size & (SHADOW_GRANULARITY - 1)) : 0;
H A Dasan_poisoning.h26 // Poisons the shadow memory for "size" bytes starting from "addr".
29 // Poisons the shadow memory for "redzone_size" bytes starting from
50 // for mapping shadow and zeroing out pages doesn't "just work", so we should
83 u8 *shadow = (u8*)MEM_TO_SHADOW(aligned_addr); local
84 for (uptr i = 0; i < redzone_size; i += SHADOW_GRANULARITY, shadow++) {
86 *shadow = 0; // fully addressable
88 *shadow = (SHADOW_GRANULARITY == 128) ? 0xff : value; // unaddressable
91 *shadow = poison_partial ? static_cast<u8>(size - i) : 0;
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/hwasan/
H A Dhwasan_dynamic_shadow.cpp10 /// This file is a part of HWAddressSanitizer. It reserves dynamic shadow memory
89 const uptr shadow = reinterpret_cast<uptr>(&__hwasan_shadow); local
91 // shadow == resolver is how Android KitKat and older handles ifunc.
92 // shadow == 0 just in case.
93 return shadow != 0 && shadow != resolver;
112 // The resolver might be called multiple times. Map the shadow just once.
113 static __sanitizer::uptr shadow = 0; local
114 if (!shadow)
115 shadow
[all...]
/freebsd-11-stable/contrib/llvm-project/compiler-rt/include/sanitizer/
H A Dmsan_interface.h55 void __msan_partial_poison(const volatile void *data, void *shadow,
78 /* Print shadow and origin for the memory range to stderr in a human-readable
82 /* Print shadow for the memory range to stderr in a minimalistic
103 /* Update shadow for the application copy of size bytes from src to dst.
105 actual application memory, it only updates shadow and origin for such
/freebsd-11-stable/contrib/libpcap/rpcapd/
H A Ddaemon.c55 #include <shadow.h> // for password management
1221 * We use the Solaris/Linux shadow password authentication if
1224 * with shadow passwords, if we're running as root. Traditional
/freebsd-11-stable/contrib/tcsh/
H A Dsh.h408 # include <shadow.h>
/freebsd-11-stable/sys/dev/qlnx/qlnxe/
H A Decore_vf.c1723 struct ecore_bulletin_content shadow; local
1730 OSAL_MEMCPY(&shadow, p_iov->bulletin.p_virt, p_iov->bulletin.size);
1733 if (shadow.version == p_iov->bulletin_shadow.version)
1737 crc = OSAL_CRC32(0, (u8 *)&shadow + crc_size,
1739 if (crc != shadow.crc)
1742 /* Set the shadow bulletin and process it */
1743 OSAL_MEMCPY(&p_iov->bulletin_shadow, &shadow, p_iov->bulletin.size);
1746 "Read a bulletin update %08x\n", shadow.version);
/freebsd-11-stable/secure/usr.sbin/sshd/
H A DMakefile15 loginrec.c auth-pam.c auth-shadow.c auth-sia.c md5crypt.c \
/freebsd-11-stable/crypto/openssh/
H A Dauth.h139 #include <shadow.h>
H A Dauth.c45 #include <shadow.h>
/freebsd-11-stable/crypto/openssh/openbsd-compat/
H A Dxcrypt.c48 # include <shadow.h>
/freebsd-11-stable/crypto/heimdal/
H A Dconfigure15960 shadow.h \
23123 #include <shadow.h>
/freebsd-11-stable/crypto/heimdal/appl/login/
H A DMakefile.am20 shadow.c \
H A DMakefile.in104 read_string.$(OBJEXT) shadow.$(OBJEXT) stty_default.$(OBJEXT) \
413 shadow.c \
523 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/shadow.Po@am__quote@

Completed in 266 milliseconds

123