| /xnu-12377.81.4/osfmk/vm/ |
| H A D | vm_sanitize_error_compat.c | 192 return vm_sanitize_make_policy_telemeter_and_rewrite_err(KERN_INVALID_ADDRESS); in vm_sanitize_err_compat_addr_size_vm_allocate_fixed() 357 return vm_sanitize_make_policy_telemeter_and_rewrite_err(KERN_INVALID_ADDRESS); in vm_sanitize_err_compat_addr_size_vm_map_copyio() 425 return vm_sanitize_make_policy_telemeter_and_rewrite_err(KERN_INVALID_ADDRESS); in vm_sanitize_err_compat_addr_size_vm_protect() 515 return vm_sanitize_make_policy_telemeter_and_rewrite_err(KERN_INVALID_ADDRESS); in vm_sanitize_err_compat_addr_size_vm_behavior_set() 541 return vm_sanitize_make_policy_telemeter_and_rewrite_err(KERN_INVALID_ADDRESS); in vm_sanitize_err_compat_addr_size_vm_msync() 569 return vm_sanitize_make_policy_telemeter_and_rewrite_err(KERN_INVALID_ADDRESS); in vm_sanitize_err_compat_addr_size_vm_machine_attribute() 594 return vm_sanitize_make_policy_telemeter_and_rewrite_err(KERN_INVALID_ADDRESS); in vm_sanitize_err_compat_addr_size_vm_map_page_range_info()
|
| H A D | vm_map.c | 1139 vmlp_api_end(VM_MAP_APPLE_PROTECTED, KERN_INVALID_ADDRESS); in vm_map_apple_protected() 1140 return KERN_INVALID_ADDRESS; in vm_map_apple_protected() 1228 kr = KERN_INVALID_ADDRESS; in vm_map_apple_protected() 1236 kr = KERN_INVALID_ADDRESS; in vm_map_apple_protected() 2589 return KERN_INVALID_ADDRESS; in vm_map_locate_space_fixed() 2612 return KERN_INVALID_ADDRESS; in vm_map_locate_space_fixed() 6140 vmlp_api_end(VM_MAP_PROTECT, KERN_INVALID_ADDRESS); in vm_map_protect() 6141 return KERN_INVALID_ADDRESS; in vm_map_protect() 6220 vmlp_api_end(VM_MAP_PROTECT, KERN_INVALID_ADDRESS); in vm_map_protect() 6221 return KERN_INVALID_ADDRESS; in vm_map_protect() [all …]
|
| H A D | vm_kern.c | 4603 kr = KERN_INVALID_ADDRESS; in copyinmap() 4609 kr = KERN_INVALID_ADDRESS; in copyinmap() 4636 KERN_INVALID_ADDRESS /* arg */); in copyoutmap() 4637 kr = KERN_INVALID_ADDRESS; in copyoutmap() 4647 KERN_INVALID_ADDRESS /* arg */); in copyoutmap() 4648 kr = KERN_INVALID_ADDRESS; in copyoutmap() 4670 kr = KERN_INVALID_ADDRESS; in copyoutmap_atomic32() 4676 kr = KERN_INVALID_ADDRESS; in copyoutmap_atomic32() 4698 kr = KERN_INVALID_ADDRESS; in copyoutmap_atomic64() 4704 kr = KERN_INVALID_ADDRESS; in copyoutmap_atomic64()
|
| /xnu-12377.81.4/osfmk/i386/ |
| H A D | pal_routines.c | 162 return KERN_INVALID_ADDRESS; in pal_efi_call_in_64bit_mode() 180 return KERN_INVALID_ADDRESS; in pal_efi_call_in_64bit_mode() 210 return KERN_INVALID_ADDRESS; in pal_efi_call_in_32bit_mode()
|
| H A D | pmap.h | 889 (KERN_INVALID_ADDRESS) 891 (KERN_INVALID_ADDRESS)
|
| /xnu-12377.81.4/tests/vm/ |
| H A D | vm_allocation.c | 1930 …size ? KERN_INVALID_ADDRESS : (get_allocator() != wrapper_mach_vm_allocate) ? KERN_INVALID_ARGUMEN… in test_allocate_at_zero() 2268 assert_read_return(address, size, &read_address, &read_size, KERN_INVALID_ADDRESS); in test_read_partially_deallocated_range() 2269 logv("Returned expected error: %s.", mach_error_string(KERN_INVALID_ADDRESS)); in test_read_partially_deallocated_range() 2285 …kern_return_t kr_expected = (size < vm_page_size * 2) ? KERN_INVALID_ADDRESS : KERN_PROTECTION_FAI… in test_read_partially_unreadable_range() 2371 assert_mach_return(kr, KERN_INVALID_ADDRESS, in test_read_wrapped_around_ranges() 2376 logv("Returned expected error on each range: %s.", mach_error_string(KERN_INVALID_ADDRESS)); in test_read_wrapped_around_ranges() 2522 assert_write_return(address, data, buffer_size, KERN_INVALID_ADDRESS); in test_write_on_partially_deallocated_range() 2523 logv("Returned expected error: %s.", mach_error_string(KERN_INVALID_ADDRESS)); in test_write_on_partially_deallocated_range() 2539 …kern_return_t kr_expected = (buffer_size < vm_page_size * 2) ? KERN_INVALID_ADDRESS : KERN_PROTECT… in test_write_on_partially_unwritable_range() 2676 copy_edge_size((mach_vm_size_t)UINT_MAX - 1, KERN_INVALID_ADDRESS); in test_copy_invalid_large_size() [all …]
|
| H A D | configurator_vm_protect.c | 114 if (kr != KERN_INVALID_ADDRESS) { in vm_protect_with_holes() 116 name_for_kr(KERN_INVALID_ADDRESS), name_for_kr(kr)); in vm_protect_with_holes()
|
| H A D | configurator_vm_behavior_set.c | 91 expected_kr = KERN_INVALID_ADDRESS; in vm_behavior_common_no_cow() 125 expected_kr = KERN_INVALID_ADDRESS; in vm_behavior_common_no_cow() 359 expected_kr = KERN_INVALID_ADDRESS; in vm_behavior_zero_once()
|
| H A D | vm_ranges.c | 309 T_EXPECT_MACH_ERROR(kr, KERN_INVALID_ADDRESS, "should fail"); in ensure_rogue_fixed_fails() 629 T_EXPECT_MACH_ERROR(kr, KERN_INVALID_ADDRESS, "should fail");
|
| /xnu-12377.81.4/tests/ |
| H A D | try_read_write_test_unexpected.c | 65 T_QUIET; T_ASSERT_EQ(kr, KERN_INVALID_ADDRESS, "try_write_byte to NULL"); in install_exception_handler()
|
| H A D | try_read_write_test.c | 180 test_try_read_byte(0, 0, KERN_INVALID_ADDRESS, "read unmapped address"); 181 test_try_write_byte(0, 0, KERN_INVALID_ADDRESS, "write unmapped address");
|
| H A D | arm_mte.c | 1222 … T_EXPECT_MACH_ERROR(kr, KERN_INVALID_ADDRESS, "mach_vm_allocate %zu (%#x)", i, ALLOCATE_FLAGS[i]); 1237 T_EXPECT_MACH_ERROR(kr, KERN_INVALID_ADDRESS, "mach_make_memory_entry_64"); 1258 T_EXPECT_MACH_ERROR(kr, KERN_INVALID_ADDRESS, "mach_vm_map %zu (%#x)", i, ALLOCATE_FLAGS[i]); 1269 T_EXPECT_MACH_ERROR(kr, KERN_INVALID_ADDRESS, "mach_vm_purgable_control"); 1281 T_EXPECT_MACH_ERROR(kr, KERN_INVALID_ADDRESS, "mach_vm_region"); 1313 T_EXPECT_MACH_ERROR(kr, KERN_INVALID_ADDRESS, "mach_vm_remap_new %zu (%s, %#x)", i, msg, flags); 1606 if (task != mach_task_self() && kr == KERN_INVALID_ADDRESS) { in get_object_id() 2203 T_ASSERT_MACH_ERROR(kr, KERN_INVALID_ADDRESS, "copyin fails"); 2245 T_ASSERT_MACH_ERROR(kr, KERN_INVALID_ADDRESS, "copyin fails");
|
| H A D | exc_guard_helper_test.c | 75 if (kr == KERN_INVALID_ADDRESS) { in is_hole()
|
| H A D | vm_test_mach_map.c | 1266 if (kr == KERN_INVALID_ADDRESS) { 1679 if (kr == KERN_INVALID_ADDRESS) { 1997 if (kr == KERN_INVALID_ADDRESS) { 2022 kr == KERN_INVALID_ADDRESS) { 2152 if (kr == KERN_INVALID_ADDRESS) {
|
| /xnu-12377.81.4/osfmk/mach/ |
| H A D | kern_return.h | 74 #define KERN_INVALID_ADDRESS 1 macro
|
| /xnu-12377.81.4/bsd/uxkern/ |
| H A D | ux_exception.c | 69 if (code == KERN_INVALID_ADDRESS) { in ux_exception()
|
| /xnu-12377.81.4/osfmk/tests/ |
| H A D | ptrauth_data_tests.c | 61 kr = KERN_INVALID_ADDRESS; \
|
| /xnu-12377.81.4/bsd/kern/ |
| H A D | posix_sem.c | 553 kern_return_t kret = KERN_INVALID_ADDRESS; /* default fail */ in sem_open() 1018 case KERN_INVALID_ADDRESS: in sem_wait_nocancel() 1080 case KERN_INVALID_ADDRESS: in sem_trywait() 1140 case KERN_INVALID_ADDRESS: in sem_post() 1217 case KERN_INVALID_ADDRESS: in psem_delete()
|
| H A D | kern_mman.c | 957 case KERN_INVALID_ADDRESS: in mmap() 1092 case KERN_INVALID_ADDRESS: /* hole in region being sync'ed */ in msync_nocancel() 1232 case KERN_INVALID_ADDRESS: in mprotect() 1293 case KERN_INVALID_ADDRESS: in mprotect() 1312 case KERN_INVALID_ADDRESS: in mprotect() 1503 case KERN_INVALID_ADDRESS: in madvise()
|
| H A D | posix_shm.c | 663 case KERN_INVALID_ADDRESS: in pshm_truncate() 931 case KERN_INVALID_ADDRESS: in pshm_mmap()
|
| H A D | sysv_shm.c | 559 case KERN_INVALID_ADDRESS: in shmat() 881 case KERN_INVALID_ADDRESS: in shmget_allocate_segment()
|
| /xnu-12377.81.4/osfmk/kern/ |
| H A D | kext_alloc.c | 224 rval = KERN_INVALID_ADDRESS; in kext_alloc()
|
| H A D | exclaves.c | 518 return KERN_INVALID_ADDRESS; in _exclaves_ctl_trap() 742 kr = KERN_INVALID_ADDRESS; in _exclaves_ctl_trap() 772 kr = KERN_INVALID_ADDRESS; in _exclaves_ctl_trap() 778 kr = KERN_INVALID_ADDRESS; in _exclaves_ctl_trap() 829 return KERN_INVALID_ADDRESS; in _exclaves_ctl_trap()
|
| /xnu-12377.81.4/libsyscall/mach/ |
| H A D | vm_reclaim.c | 496 case KERN_INVALID_ADDRESS: in mach_vm_reclaim_get_rings_for_task() 564 case KERN_INVALID_ADDRESS: in mach_vm_reclaim_ring_copy()
|
| /xnu-12377.81.4/osfmk/arm64/sptm/pmap/ |
| H A D | pmap.h | 503 #define pmap_attribute(pmap, addr, size, attr, value) (KERN_INVALID_ADDRESS)
|