| /xnu-10063.121.3/osfmk/i386/ |
| H A D | pal_routines.c | 162 return KERN_INVALID_ADDRESS; in pal_efi_call_in_64bit_mode() 180 return KERN_INVALID_ADDRESS; in pal_efi_call_in_64bit_mode() 210 return KERN_INVALID_ADDRESS; in pal_efi_call_in_32bit_mode()
|
| H A D | pmap.h | 889 (KERN_INVALID_ADDRESS) 891 (KERN_INVALID_ADDRESS)
|
| H A D | bsd_i386.c | 322 regs->eax = KERN_INVALID_ADDRESS; in machdep_syscall()
|
| /xnu-10063.121.3/tests/vm/ |
| H A D | vm_allocation.c | 1828 …size ? KERN_INVALID_ADDRESS : (get_allocator() != wrapper_mach_vm_allocate) ? KERN_INVALID_ARGUMEN… in test_allocate_at_zero() 2207 assert_read_return(address, size, &read_address, &read_size, KERN_INVALID_ADDRESS); in test_read_partially_deallocated_range() 2208 logv("Returned expected error: %s.", mach_error_string(KERN_INVALID_ADDRESS)); in test_read_partially_deallocated_range() 2224 …kern_return_t kr_expected = (size < vm_page_size * 2) ? KERN_INVALID_ADDRESS : KERN_PROTECTION_FAI… in test_read_partially_unreadable_range() 2311 T_QUIET; T_ASSERT_EQ(kr, KERN_INVALID_ADDRESS, in test_read_wrapped_around_ranges() 2316 mach_error_string(KERN_INVALID_ADDRESS)); in test_read_wrapped_around_ranges() 2318 logv("Returned expected error on each range: %s.", mach_error_string(KERN_INVALID_ADDRESS)); in test_read_wrapped_around_ranges() 2464 assert_write_return(address, data, buffer_size, KERN_INVALID_ADDRESS); in test_write_on_partially_deallocated_range() 2465 logv("Returned expected error: %s.", mach_error_string(KERN_INVALID_ADDRESS)); in test_write_on_partially_deallocated_range() 2481 …kern_return_t kr_expected = (buffer_size < vm_page_size * 2) ? KERN_INVALID_ADDRESS : KERN_PROTECT… in test_write_on_partially_unwritable_range() [all …]
|
| H A D | vm_ranges.c | 273 T_EXPECT_MACH_ERROR(kr, KERN_INVALID_ADDRESS, "should fail"); in ensure_rogue_fixed_fails() 593 T_EXPECT_MACH_ERROR(kr, KERN_INVALID_ADDRESS, "should fail");
|
| /xnu-10063.121.3/osfmk/mach/ |
| H A D | kern_return.h | 74 #define KERN_INVALID_ADDRESS 1 macro
|
| /xnu-10063.121.3/osfmk/vm/ |
| H A D | vm_map.c | 904 return KERN_INVALID_ADDRESS; in vm_map_apple_protected() 980 kr = KERN_INVALID_ADDRESS; in vm_map_apple_protected() 988 kr = KERN_INVALID_ADDRESS; in vm_map_apple_protected() 2859 RETURN(KERN_INVALID_ADDRESS); in vm_map_enter() 2882 RETURN(KERN_INVALID_ADDRESS); in vm_map_enter() 3775 RETURN(KERN_INVALID_ADDRESS); in vm_map_enter_fourk() 5997 return KERN_INVALID_ADDRESS; in vm_map_protect() 6071 return KERN_INVALID_ADDRESS; in vm_map_protect() 6081 return KERN_INVALID_ADDRESS; in vm_map_protect() 6108 return KERN_INVALID_ADDRESS; in vm_map_protect() [all …]
|
| H A D | vm32_user.c | 401 return KERN_INVALID_ADDRESS; in vm32_region() 479 return KERN_INVALID_ADDRESS; in vm32_region_recurse()
|
| H A D | vm_kern.c | 4011 kr = KERN_INVALID_ADDRESS; in copyinmap() 4017 kr = KERN_INVALID_ADDRESS; in copyinmap() 4046 …M, KDBG_TRIAGE_RESERVED, KDBG_TRIAGE_VM_COPYOUTMAP_SAMEMAP_ERROR), KERN_INVALID_ADDRESS /* arg */); in copyoutmap() 4047 kr = KERN_INVALID_ADDRESS; in copyoutmap() 4053 …BG_TRIAGE_RESERVED, KDBG_TRIAGE_VM_COPYOUTMAP_DIFFERENTMAP_ERROR), KERN_INVALID_ADDRESS /* arg */); in copyoutmap() 4054 kr = KERN_INVALID_ADDRESS; in copyoutmap() 4082 kr = KERN_INVALID_ADDRESS; in copyoutmap_atomic32() 4088 kr = KERN_INVALID_ADDRESS; in copyoutmap_atomic32() 4110 kr = KERN_INVALID_ADDRESS; in copyoutmap_atomic64() 4116 kr = KERN_INVALID_ADDRESS; in copyoutmap_atomic64()
|
| H A D | vm_tests.c | 627 …assertf(kr == KERN_INVALID_ADDRESS, "fault_addr = 0x%lx kr = 0x%x expected 0x%x", fault_addr, kr, … in vm_test_4k()
|
| H A D | vm_shared_region.c | 1028 kr = KERN_INVALID_ADDRESS; in vm_shared_region_start_address() 1634 kr = KERN_INVALID_ADDRESS; in vm_shared_region_map_file_setup() 2627 kr = KERN_INVALID_ADDRESS; in vm_shared_region_slide_mapping() 2644 kr = KERN_INVALID_ADDRESS; in vm_shared_region_slide_mapping()
|
| H A D | vm_user.c | 1948 return KERN_INVALID_ADDRESS; in vm_region_64() 1983 return KERN_INVALID_ADDRESS; in vm_region() 2063 return KERN_INVALID_ADDRESS; in vm_region_recurse_64() 2119 return KERN_INVALID_ADDRESS; in vm_region_recurse()
|
| H A D | vm_fourk_pager.c | 1254 return KERN_INVALID_ADDRESS; in fourk_pager_populate()
|
| /xnu-10063.121.3/bsd/kern/ |
| H A D | posix_sem.c | 394 kern_return_t kret = KERN_INVALID_ADDRESS; /* default fail */ in sem_open() 849 case KERN_INVALID_ADDRESS: in sem_wait_nocancel() 911 case KERN_INVALID_ADDRESS: in sem_trywait() 971 case KERN_INVALID_ADDRESS: in sem_post() 1048 case KERN_INVALID_ADDRESS: in psem_delete()
|
| H A D | kern_mman.c | 948 case KERN_INVALID_ADDRESS: in mmap() 1052 case KERN_INVALID_ADDRESS: /* hole in region being sync'ed */ in msync_nocancel() 1179 case KERN_INVALID_ADDRESS: in mprotect() 1198 case KERN_INVALID_ADDRESS: in mprotect() 1324 case KERN_INVALID_ADDRESS: in madvise()
|
| H A D | posix_shm.c | 661 case KERN_INVALID_ADDRESS: in pshm_truncate() 930 case KERN_INVALID_ADDRESS: in pshm_mmap()
|
| H A D | sysv_shm.c | 558 case KERN_INVALID_ADDRESS: in shmat() 880 case KERN_INVALID_ADDRESS: in shmget_allocate_segment()
|
| H A D | kern_core.c | 598 kret = KERN_INVALID_ADDRESS; in coredump()
|
| /xnu-10063.121.3/bsd/uxkern/ |
| H A D | ux_exception.c | 69 if (code == KERN_INVALID_ADDRESS) { in ux_exception()
|
| /xnu-10063.121.3/osfmk/tests/ |
| H A D | ptrauth_data_tests.c | 60 kr = KERN_INVALID_ADDRESS; \
|
| /xnu-10063.121.3/osfmk/kern/ |
| H A D | kext_alloc.c | 223 rval = KERN_INVALID_ADDRESS; in kext_alloc()
|
| /xnu-10063.121.3/tests/ |
| H A D | vm_test_mach_map.c | 1147 if (kr == KERN_INVALID_ADDRESS) { 1468 if (kr == KERN_INVALID_ADDRESS) { 1786 if (kr == KERN_INVALID_ADDRESS) { 1811 kr == KERN_INVALID_ADDRESS) { 1941 if (kr == KERN_INVALID_ADDRESS) {
|
| /xnu-10063.121.3/osfmk/arm64/sptm/pmap/ |
| H A D | pmap.h | 476 #define pmap_attribute(pmap, addr, size, attr, value) (KERN_INVALID_ADDRESS)
|
| /xnu-10063.121.3/osfmk/arm/pmap/ |
| H A D | pmap.h | 546 #define pmap_attribute(pmap, addr, size, attr, value) (KERN_INVALID_ADDRESS)
|
| /xnu-10063.121.3/bsd/dev/arm64/ |
| H A D | fasttrap_isa.c | 289 t->uu_exception = KERN_INVALID_ADDRESS; /* SIGSEGV */
|