| /xnu-8019.80.24/san/tools/ |
| H A D | kstksz | 128 -- It is possible that we redord BELOW event as first. Ignore it if we haven't seen 232 …-- When reading from a file, we can't use CoreSymbolication to symbolicate the stack frames as the…
|
| /xnu-8019.80.24/tests/ |
| H A D | stackshot_accuracy.m | 51 /* ssh won't let the session die if we still have file handles open to its output. */ 96 /* we should be able to verify delta stackshots */ 205 * given that we've targetted the pid, we can be sure that this 206 * ts_pid will be the pid we expect 245 T_LOG("did we stop because of the limit?: %s", fault_stats.sfs_stopped_faulting ? "yes" : "no"); 252 /* if we couldn't fault the pages back in, then at least verify that we tried */ 293 * then send SIGUSR1 to the parent to let it know that we are done. 345 /* check if we can run the child successfully */
|
| H A D | stackshot_tests.m | 74 #define TEST_STACKSHOT_QUEUE_LABEL "houston.we.had.a.problem" 537 /* First kill the child so we can reap it */ 654 …/* sleep for a bit in the hope of ensuring that the other thread has called the sysctl before we s… 714 * This will mark the test as failed but let it continue so we 734 /* First unwedge the child so we can reap it */ 914 dispatch_semaphore_t child_ready_sem; /* signal parent we're ready */ 928 /* Tell the main thread we're all set up, then wait for permission to exit */ 931 usleep(1); /* make sure we don't tailcall semaphore_wait */ 1255 T_ASSERT_FALSE(seen_page_table_snapshot, "check that we haven't yet seen a page table snapshot"); 1295 T_ASSERT_TRUE(nonzero_tte, "check that we saw at least one non-empty TTE"); [all …]
|
| H A D | stackshot_block_owner_14362384.m | 227 /* perform various actions with a mutex in kernel memory. note that, since we aren't allowed 231 * exist in the kernel (to determine if we're running with CONFIG_XNUPOST defined). Else, 279 /* We don't really care what goes into these messages, we're just sending something to a port. */ 334 /* perform various actions with a rwlock in kernel memory. note that, since we aren't allowed 338 * exist in the kernel (to determine if we're running with CONFIG_XNUPOST defined). Else, 500 * This allows us to create a situation in the kernel where we know a thread to be blocked 513 …_create(&waiting, NULL, kmutex_grab_and_wait_thread, NULL); // thread will block until we signal it 622 …lper(send); // ping! msg_blocking_thread will now try to send us stuff, and block until we receive. 634 msg_recv_helper(recv); // thread should block until we receive one of its messages
|
| H A D | test_sysctl_kern_procargs_25397314.m | 58 /* Determine how much memory to allocate. If allocSize is 0 we will use the size 59 * we get from the sysctl for our buffer. */ 85 /* Without KERN_PROCARGS2, we can't tell where argv ends and environ begins.
|
| H A D | hvtest_x86.m | 34 * so we have to bake it ourselves. (This can 317 * specific test, so we just retry here, unless we 320 * To guard against cycling faults that we do not detect 321 * here, we also put a maximum on the number of 709 // To cause the VCPU pointer to be cleared from the wrong thread, we need 936 * Otherwise, we'd have to handle the switch ourselves, and would 974 // Map test code (because we start in protected mode without 975 // paging, we cannot use the harness's fault management yet.) 1055 * but in the case that it still fails, we don't want the test to fail through 1114 // invalid selectors: ok as long as we don't try to use them [all …]
|
| /xnu-8019.80.24/libkern/libkern/c++/ |
| H A D | OSPtr.h | 55 functions. This is great! However, please note that we may \ 63 off on enabling shared pointers in IOKit APIs until we have \
|
| /xnu-8019.80.24/config/ |
| H A D | Kasan_disabled.exports | 2 # so we generate an empty export list for non-KASan.
|
| H A D | MASTER | 216 # we are clipping the max based on 16G 336 # configurable kernel - general switch to say we are building for an 701 # sync with bsd/conf/MASTER until we fix the config system... todo XXX
|
| /xnu-8019.80.24/san/coverage/ |
| H A D | kcov-blacklist-arm64 | 8 # These use a local variable to work out which stack we're on, but can end up with
|
| /xnu-8019.80.24/makedefs/ |
| H A D | MakeInc.def | 143 # NOTE: order matters here. -Wno-xxx goes before opt-in of ones we want 184 # diagnostic here until we've completed that: 258 # This can have false negatives, and is used to avoid calling CTF when we'll build a static KC 509 # Currently we have to keep alive two separated UBSAN runtimes (minimal for DEVELOPMENT, 510 # full for KASAN). This implies that we cannot use CFLAGS_$(CURRENT_KERNEL_CONFIG), because 511 # CFLAGS_DEVELOPMENT is folded into CFLAGS_KASAN. For the time being we leave this check here, 512 # as we work (independently) to both break the CFLAGS direct dependency and commonize the 660 # we're dealing with uintptr_t values here, so explicitly use bash which 761 # for a 16KB page runtime, and we wish to use the first virtual block 764 # multiple of the block size in alignment/length, we will implictly map [all …]
|
| H A D | MakeInc.top | 15 # As such, we have no knowledge of how to build 339 # we try to throttle behavior into more managable S "stripes" of N/S 381 # $(1) is the Makefile target we are building for 393 # $(1) is the Makefile target we are building for 399 # $(1) is the Makefile target we are building for
|
| H A D | MakeInc.kernel | 242 # the LAST segment is mapped read-only on arm, so if we include llvm profiling 305 # date, start over. Normal dependencies don't work because we can have 308 # to BUILDA. So we maintain a separate file at the time make(1)
|
| H A D | MakeInc.cmd | 181 # CC/CXX get defined by make(1) by default, so we can't check them 256 # Scripts or tools we build ourselves
|
| H A D | MakeInc.rule | 438 # This isn't the right place to put this, but we need to := override some settings
|
| /xnu-8019.80.24/san/memory/ |
| H A D | kasan-blacklist-arm64 | 12 # These use a local variable to work out which stack we're on, but can end up with
|
| /xnu-8019.80.24/libkdd/ |
| H A D | README.md | 73 object for a consumer to understand arbitrary data, we package it using container markers. 89 Following is an example of how we can describe a kernel specific struct sample_disk_io_stats in buf…
|
| H A D | KCDBasicTypeDescription.m | 126 * Calculate the maximum number of data elements we can parse, Taking into 128 * actual length of the data buffer and the offset into the buffer where we
|
| /xnu-8019.80.24/libsyscall/mach/ |
| H A D | vm_map.defs | 36 * LIBSYSCALL_INTERFACE indicates that we are building the
|
| /xnu-8019.80.24/libkern/zlib/ |
| H A D | README | 116 If you use the zlib library in a product, we would appreciate *not* 122 If you redistribute modified sources, we would appreciate that you include
|
| /xnu-8019.80.24/osfmk/mach/ |
| H A D | resource_notify.defs | 46 /* The kernel sends the message, so we compile with KernelUser when
|
| H A D | thread_act.defs | 98 * we want the interfaces to be able to be defined in more standard
|
| /xnu-8019.80.24/osfmk/ipc/ |
| H A D | ipc_port.c | 1443 ipc_port_update_watchport_elem(ipc_port_t port, struct task_watchport_elem *we) in ipc_port_update_watchport_elem() argument 1447 port->ip_waitq.waitq_tspriv = we; in ipc_port_update_watchport_elem()
|
| /xnu-8019.80.24/osfmk/conf/ |
| H A D | files | 313 # This file should go away when we get
|
| /xnu-8019.80.24/tools/lldbmacros/ |
| H A D | README.md | 164 …- note that we use core.value class as an interface to underlying C structures. Refer [Section B] … 211 …00 wouldnt have been much help. But with the registered summary for zone_t we can see all the inte…
|