| /xnu-11417.121.6/osfmk/kern/ |
| H A D | exclaves_conclave.c | 100 conclave_launcher_conclavelauncherfailure_s *failure = NULL; in exclaves_conclave_launcher_launch() 101 failure = conclave_launcher_conclavecontrol_launch__result_get_failure(&result); in exclaves_conclave_launcher_launch() 102 assert3p(failure, !=, NULL); in exclaves_conclave_launcher_launch() 104 "conclave launch failure: failure %u\n", *failure); in exclaves_conclave_launcher_launch() 140 conclave_launcher_conclavelauncherfailure_s *failure = NULL; in exclaves_conclave_launcher_stop() 141 failure = conclave_launcher_conclavecontrol_stop__result_get_failure(&result); in exclaves_conclave_launcher_stop() 142 assert3p(failure, !=, NULL); in exclaves_conclave_launcher_stop() 145 "conclave stop failure: failure %u\n", *failure); in exclaves_conclave_launcher_stop() 181 conclave_launcher_conclavelauncherfailure_s *failure = NULL; in exclaves_conclave_launcher_suspend() 182 failure = conclave_launcher_conclavecontrol_suspend__result_get_failure(&result); in exclaves_conclave_launcher_suspend() [all …]
|
| H A D | hv_support_kext.h | 94 uint32_t failure, uint32_t error);
|
| /xnu-11417.121.6/SETUP/config/ |
| H A D | searchp.c | 72 int failure; in searchp() local 91 failure = (*func)(fullname); in searchp() 92 }while (failure && (*lastchar)); in searchp() 93 return failure ? -1 : 0; in searchp()
|
| /xnu-11417.121.6/libsyscall/mach/ |
| H A D | err_libkern.sub | 49 "(libkern/metaclass) allocation failure, internal data", /* 4 */ 50 "(libkern/metaclass) allocation failure, class tracking dictionaries", /* 5 */ 51 "(libkern/metaclass) allocation failure, no kext/class set", /* 6 */ 64 "(libkern/kext) allocation failure", /* 0x2 */ 75 "(libkern/kext) validation failure (plist/executable)", /* 0xc */ 76 "(libkern/kext) authentication failure (file ownership/permissions)", /* 0xd */ 77 "(libkern/kext) dependency resolution failure", /* 0xe */
|
| H A D | err_mach_ipc.sub | 86 /* 0 */ "(ipc/mig) client type check failure", 90 /* 4 */ "(ipc/mig) server type check failure",
|
| H A D | err_kern.sub | 42 "(os/kern) protection failure", 45 "(os/kern) failure", /* 5 */ 49 "(os/kern) memory failure",
|
| H A D | err_iokit.sub | 57 "(iokit/common) misc. VM failure", // 0x2c8 68 "(iokit/common) rld failure", // 0x2d3 69 "(iokit/common) DMA failure", // 0x2d4
|
| H A D | err_ipc.sub | 67 "(ipc/mig) type check failure in message interface", /* 0 (-300) */
|
| H A D | err_server.sub | 153 "(server/sunrpc) failure in sending call", 154 "(server/sunrpc) failure in receiving result",
|
| /xnu-11417.121.6/bsd/miscfs/devfs/ |
| H A D | devfs_vnops.c | 1160 goto failure; in devfs_mkdir() 1169 failure: in devfs_mkdir() 1242 goto failure; in devfs_make_symlink() 1254 failure: in devfs_make_symlink() 1298 goto failure; in devfs_mknod() 1303 goto failure; in devfs_mknod() 1311 failure: in devfs_mknod()
|
| /xnu-11417.121.6/osfmk/tests/ |
| H A D | README.md | 48 …* And you are set. Use KERN_SUCCESS to report successful run and any other error for failure. Here… 77 …* T_ASSERT macros will check for condition and upon failure return with KERN_FAILURE. This way it … 78 * T_EXPECT will just report failure of that test case, but will continue to run further test code.
|
| /xnu-11417.121.6/libkern/kxld/ |
| H A D | kxld_vtable.c | 499 boolean_t failure = FALSE; in kxld_vtable_patch() local 602 failure = TRUE; in kxld_vtable_patch() 662 require_action(!failure, finish, rval = KERN_FAILURE); in kxld_vtable_patch()
|
| H A D | kxld_kext.c | 838 boolean_t failure = FALSE; in patch_vtables() local 894 if (failure) { in patch_vtables() 997 require_action(!failure, finish, rval = KERN_FAILURE); in patch_vtables() 998 failure = (nprogress == 0); in patch_vtables()
|
| /xnu-11417.121.6/tools/lldbmacros/tests/lldbtest/ |
| H A D | unittest.py | 155 for test, failure in result.failures: 161 self.stream.writelines(failure)
|
| /xnu-11417.121.6/osfmk/mach/ |
| H A D | task_access.defs | 43 * Access granted by return value (success/failure)
|
| /xnu-11417.121.6/osfmk/conf/ |
| H A D | copyright.osf | 47 # failure to abide by the terms of this license.
|
| /xnu-11417.121.6/doc/debugging/ |
| H A D | macro_testing.md | 73 result either in test or tested code failure.
|
| /xnu-11417.121.6/makedefs/ |
| H A D | MakeInc.rule | 91 $(ERR) Parse failure for $$<; \ 128 $(ERR) Parse failure for $$<; \ 559 $(ERR) Parse failure for $<; \
|
| /xnu-11417.121.6/iokit/DriverKit/ |
| H A D | IOExtensiblePaniclog.iig | 83 * @return 0 on success, negative value in case of failure.
|
| /xnu-11417.121.6/doc/primitives/ |
| H A D | atomics.md | 235 will always be `expected`, however in case of failure it will be filled with 241 for the failure case ordering, as it is what is used most of the time.
|
| /xnu-11417.121.6/tools/lldbmacros/ |
| H A D | README.md | 409 isolate possible causes of failure, and eventually filing a bug with kernel team. Following are som… 417 …s particularly tricky. Many parts of memory may not be readable. There could be failure in network, 421 …orruption, the lldbmacros may have followed wrong pointer dereferencing. This might lead to failure
|
| /xnu-11417.121.6/doc/lifecycle/ |
| H A D | hibernation.md | 53 (in case of later failure) and the `boot-image` nvram variable is set to point
|
| /xnu-11417.121.6/doc/mach_ipc/ |
| H A D | guard_exceptions.md | 250 message due to sandboxing, and that a hard failure has been requested by either
|
| /xnu-11417.121.6/doc/vm/ |
| H A D | sanitize.md | 244 - Ensure that you return safe values on failure for all opaque types that
|
| /xnu-11417.121.6/ |
| H A D | APPLE_LICENSE | 213 systems, or air traffic control machines in which case the failure of
|