| /xnu-12377.41.6/tests/ |
| H A D | mach_port_mod_refs.c | 38 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs SEND: -1 on a RECV right"); 42 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs SEND_ONCE: -1 on a RECV right"); 46 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs PORT_SET: -1 on a RECV right"); 50 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs DEAD_NAME: -1 on a RECV right"); 54 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs LABELH: -1 on a RECV right"); 67 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs SEND: -1 on a PORT_SET right"); 71 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs SEND_ONCE: -1 on a PORT_SET right"); 75 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs RECV: -1 on a PORT_SET right"); 79 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs DEAD_NAME: -1 on a PORT_SET right"); 83 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs LABELH: -1 on a PORT_SET right");
|
| H A D | mach_service_port.c | 246 if (kr == KERN_INVALID_RIGHT || kr == KERN_INVALID_NAME) {
|
| H A D | reply_port_defense_client.c | 616 …T_QUIET; T_ASSERT_MACH_ERROR(kr, KERN_INVALID_RIGHT, "test_service_port_as_exception_port IOT_BOOT… in test_service_port_as_exception_port()
|
| H A D | vm_test_mach_map.c | 1591 T_QUIET; T_ASSERT_EQ(kr, KERN_INVALID_RIGHT, "vm_map(read/write)");
|
| /xnu-12377.41.6/libsyscall/mach/ |
| H A D | mach_right.c | 123 case KERN_INVALID_RIGHT: in mach_right_send_retain() 147 case KERN_INVALID_RIGHT: in mach_right_send_release() 179 case KERN_INVALID_RIGHT: in mach_right_send_once_consume()
|
| /xnu-12377.41.6/osfmk/ipc/ |
| H A D | mach_port.c | 767 return KERN_INVALID_RIGHT; in mach_port_deallocate_kernel() 986 return KERN_INVALID_RIGHT; in mach_port_peek() 1054 return KERN_INVALID_RIGHT; in mach_port_set_mscount() 1096 return KERN_INVALID_RIGHT; in mach_port_set_seqno() 1139 return KERN_INVALID_RIGHT; in mach_port_get_context() 1208 return KERN_INVALID_RIGHT; in mach_port_set_context() 1268 return KERN_INVALID_RIGHT; in mach_port_get_set_status() 1420 return KERN_INVALID_RIGHT; in mach_port_move_member() 1424 return KERN_INVALID_RIGHT; in mach_port_move_member() 1583 return KERN_INVALID_RIGHT; in mach_port_request_notification() [all …]
|
| H A D | ipc_object.c | 267 return KERN_INVALID_RIGHT; in ipc_object_translate() 278 return KERN_INVALID_RIGHT; in ipc_object_translate() 330 return KERN_INVALID_RIGHT; in ipc_object_translate_port_pset() 339 return KERN_INVALID_RIGHT; in ipc_object_translate_port_pset() 792 return KERN_INVALID_RIGHT; in ipc_object_insert_send_right() 815 kr = KERN_INVALID_RIGHT; in ipc_object_insert_send_right() 826 kr = KERN_INVALID_RIGHT; in ipc_object_insert_send_right()
|
| H A D | ipc_right.c | 612 KERN_INVALID_ARGUMENT : KERN_INVALID_RIGHT; in ipc_right_request_alloc() 909 return KERN_INVALID_RIGHT; in ipc_right_destroy() 1176 return KERN_INVALID_RIGHT; in ipc_right_dealloc() 1626 return KERN_INVALID_RIGHT; in ipc_right_delta() 1640 return KERN_INVALID_RIGHT; in ipc_right_delta() 1691 return KERN_INVALID_RIGHT; in ipc_right_destruct() 1699 return KERN_INVALID_RIGHT; in ipc_right_destruct() 2515 return KERN_INVALID_RIGHT; in ipc_right_copyin()
|
| H A D | ipc_policy.c | 1370 return KERN_INVALID_RIGHT; in ipc_allow_register_pd_notification() 1376 return KERN_INVALID_RIGHT; in ipc_allow_register_pd_notification()
|
| H A D | mach_debug.c | 555 return KERN_INVALID_RIGHT; in mach_port_kobject_description()
|
| H A D | ipc_kmsg.c | 2209 if (kr == KERN_INVALID_RIGHT) { in ipc_kmsg_copyin_port_descriptor() 2474 if (kr == KERN_INVALID_RIGHT) { in ipc_kmsg_copyin_ool_ports_descriptor() 2564 if (kr == KERN_INVALID_RIGHT) { in ipc_kmsg_copyin_guarded_port_descriptor()
|
| /xnu-12377.41.6/tests/ipc/ |
| H A D | imm_pinned_control_port.c | 217 T_EXPECT_EQ(kr, KERN_INVALID_RIGHT, "should disallow task_set_special_port() with immovable port"); in test_immovable_port_stashing() 220 T_EXPECT_EQ(kr, KERN_INVALID_RIGHT, "should disallow task_set_special_port() with immovable port"); in test_immovable_port_stashing() 224 T_EXPECT_EQ(kr, KERN_INVALID_RIGHT, "should disallow mach_ports_register() with immovable port"); in test_immovable_port_stashing()
|
| H A D | port_api.c | 30 T_ASSERT_MACH_ERROR(kr, KERN_INVALID_RIGHT, "insert right fails");
|
| H A D | ipc_read_inspect.c | 175 if (kr == KERN_INVALID_RIGHT || kr == KERN_INVALID_NAME) { in test_task_threads() 239 if (kr == KERN_INVALID_RIGHT || kr == KERN_INVALID_NAME) { in test_processor_set_tasks()
|
| /xnu-12377.41.6/osfmk/mach/ |
| H A D | kern_return.h | 151 #define KERN_INVALID_RIGHT 17 macro
|
| H A D | mach_port.defs | 478 * KERN_INVALID_RIGHT is returned.
|
| /xnu-12377.41.6/tests/vm/ |
| H A D | vm_unaligned_copy_switch_race.c | 147 T_QUIET; T_EXPECT_MACH_ERROR(kr, KERN_INVALID_RIGHT, " vm_map() mem_entry_rw"); 160 T_QUIET; T_EXPECT_MACH_ERROR(kr, KERN_INVALID_RIGHT, " vm_map() mem_entry_rw");
|
| H A D | vm_memory_entry_parent_test.c | 215 T_EXPECT_MACH_ERROR(kr, KERN_INVALID_RIGHT, "entry shouldn't have write permissions");
|
| /xnu-12377.41.6/osfmk/kern/ |
| H A D | mk_timer.c | 216 return KERN_INVALID_RIGHT; in mk_timer_destroy_trap()
|
| H A D | ipc_tt.c | 1727 return KERN_INVALID_RIGHT; in thread_set_special_port() 2057 return KERN_INVALID_RIGHT; in task_set_special_port() 2219 return KERN_INVALID_RIGHT; in _kernelrpc_mach_ports_register3() 4023 return KERN_INVALID_RIGHT; in set_exception_ports_validation()
|
| H A D | bsd_kern.c | 1477 case KERN_INVALID_RIGHT: in mach_to_bsd_errno()
|
| H A D | task.c | 6611 return KERN_INVALID_RIGHT; in task_dyld_process_info_notify_register() 6615 return KERN_INVALID_RIGHT; in task_dyld_process_info_notify_register() 6774 return KERN_INVALID_RIGHT; in task_dyld_process_info_notify_deregister()
|
| /xnu-12377.41.6/osfmk/vm/ |
| H A D | memory_object.c | 1260 return KERN_INVALID_RIGHT; in memory_object_iopl_request() 1270 return KERN_INVALID_RIGHT; in memory_object_iopl_request() 1276 return KERN_INVALID_RIGHT; in memory_object_iopl_request()
|
| H A D | vm_memory_entry.c | 209 return mach_make_memory_entry_cleanup(KERN_INVALID_RIGHT, target_map, in mach_make_memory_entry_mem_only()
|
| /xnu-12377.41.6/doc/mach_ipc/ |
| H A D | guard_exceptions.md | 342 These correspond to cases leading to the `KERN_INVALID_RIGHT` or
|