Searched refs:EXC_GUARD (Results 1 – 15 of 15) sorted by relevance
| /xnu-10002.1.13/tests/ |
| H A D | imm_pinned_control_port.c | 50 EXC_GUARD, // Soft crash delivered as EXC_CORPSE_NOTIFY 51 EXC_GUARD, 52 EXC_GUARD, 53 EXC_GUARD, 54 EXC_GUARD, 55 EXC_GUARD, 56 EXC_GUARD, 155 if (exception == EXC_GUARD || exception == EXC_CORPSE_NOTIFY) { in catch_mach_exception_raise() 410 if (exception_taken == EXC_GUARD) {
|
| H A D | immovable_send.c | 71 T_ASSERT_EQ(exception, EXC_GUARD, "exception type"); in catch_mach_exception_raise()
|
| H A D | reply_port_defense.c | 102 if (exception == EXC_GUARD) { in catch_mach_exception_raise()
|
| H A D | corpse_backtrace.c | 51 T_ASSERT_EQ(codes[0], EXC_GUARD, "Effective exception should be EXC_GUARD"); in exc_handler_backtrace()
|
| /xnu-10002.1.13/osfmk/mach/ |
| H A D | exception_types.h | 101 #define EXC_GUARD 12 /* Violated guarded resource protections */ macro 157 #define EXC_MASK_GUARD (1 << EXC_GUARD)
|
| /xnu-10002.1.13/osfmk/corpses/ |
| H A D | corpse.c | 592 assert(etype == EXC_GUARD); in task_enqueue_exception_with_corpse() 634 assert(etype == EXC_RESOURCE || etype == EXC_GUARD); in task_enqueue_exception_with_corpse() 697 if (etype == EXC_GUARD && EXC_GUARD_DECODE_GUARD_TYPE(code) == GUARD_TYPE_USER) { in task_generate_corpse_internal()
|
| /xnu-10002.1.13/osfmk/kern/ |
| H A D | exception.c | 545 assert(exception == EXC_GUARD); in exception_deliver_backtrace() 713 (exception != EXC_GUARD) && (exception != EXC_CORPSE_NOTIFY)) { in exception_triage_thread()
|
| H A D | thread.c | 979 assert(EXC_RESOURCE == etype || EXC_GUARD == etype); in thread_exception_enqueue()
|
| H A D | task.c | 6838 kr = task_enqueue_exception_with_corpse(task, EXC_GUARD, codes, 2, reason, backtrace_only); in PROC_VIOLATED_GUARD__SEND_EXC_GUARD()
|
| /xnu-10002.1.13/bsd/kern/ |
| H A D | kern_debug.c | 185 if (task_exception_notify(EXC_GUARD, code, subcode) == KERN_SUCCESS) { in rejected_syscall_guard_ast()
|
| H A D | kern_guarded.c | 234 if (task_exception_notify(EXC_GUARD, code, subcode) == KERN_SUCCESS) { in fd_guard_ast() 1318 if (task_exception_notify(EXC_GUARD, code, subcode) == KERN_SUCCESS) { in vn_guard_ast()
|
| H A D | kern_exit.c | 1915 if (etype != EXC_RESOURCE || etype != EXC_GUARD) { in proc_prepareexit() 3507 return exit_with_mach_exception(p, reason, EXC_GUARD, code, subcode); in exit_with_guard_exception()
|
| H A D | proc_info.c | 1932 …task_enqueue_exception_with_corpse(current_task(), EXC_GUARD, code, EXCEPTION_CODE_MAX, NULL, TRUE… in PROC_UNPERMITTED_PIDINFO_FLAVOR()
|
| /xnu-10002.1.13/osfmk/ipc/ |
| H A D | mach_port.c | 2515 if (task_exception_notify(EXC_GUARD, code, subcode) == KERN_SUCCESS) { in mach_port_guard_ast() 2544 sync_exception_result = task_exception_notify(EXC_GUARD, code, subcode); in mach_port_guard_ast()
|
| /xnu-10002.1.13/osfmk/vm/ |
| H A D | vm_map.c | 7900 sync_exception_result = task_exception_notify(EXC_GUARD, code, subcode); in virt_memory_guard_ast()
|