| /xnu-11417.140.69/tests/ |
| H A D | mach_port_mod_refs.c | 38 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs SEND: -1 on a RECV right"); 42 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs SEND_ONCE: -1 on a RECV right"); 46 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs PORT_SET: -1 on a RECV right"); 50 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs DEAD_NAME: -1 on a RECV right"); 54 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs LABELH: -1 on a RECV right"); 67 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs SEND: -1 on a PORT_SET right"); 71 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs SEND_ONCE: -1 on a PORT_SET right"); 75 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs RECV: -1 on a PORT_SET right"); 79 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs DEAD_NAME: -1 on a PORT_SET right"); 83 T_ASSERT_EQ(ret, KERN_INVALID_RIGHT, "mach_port_mod_refs LABELH: -1 on a PORT_SET right");
|
| H A D | imm_pinned_control_port.c | 216 T_EXPECT_EQ(kr, KERN_INVALID_RIGHT, "should disallow task_set_special_port() with immovable port"); in test_immovable_port_stashing() 219 T_EXPECT_EQ(kr, KERN_INVALID_RIGHT, "should disallow task_set_special_port() with immovable port"); in test_immovable_port_stashing() 223 T_EXPECT_EQ(kr, KERN_INVALID_RIGHT, "should disallow mach_ports_register() with immovable port"); in test_immovable_port_stashing()
|
| H A D | mktimer_kobject.c | 61 T_ASSERT_MACH_ERROR(kr, KERN_INVALID_RIGHT, "notifications should NOT work on mk_timer ports!");
|
| H A D | mach_service_port.c | 270 if (kr == KERN_INVALID_RIGHT || kr == KERN_INVALID_NAME) {
|
| H A D | vm_test_mach_map.c | 1582 T_QUIET; T_ASSERT_EQ(kr, KERN_INVALID_RIGHT, "vm_map(read/write)");
|
| /xnu-11417.140.69/osfmk/ipc/ |
| H A D | mach_port.c | 767 return KERN_INVALID_RIGHT; in mach_port_deallocate_kernel() 986 return KERN_INVALID_RIGHT; in mach_port_peek() 1053 return KERN_INVALID_RIGHT; in mach_port_set_mscount() 1095 return KERN_INVALID_RIGHT; in mach_port_set_seqno() 1138 return KERN_INVALID_RIGHT; in mach_port_get_context() 1207 return KERN_INVALID_RIGHT; in mach_port_set_context() 1267 return KERN_INVALID_RIGHT; in mach_port_get_set_status() 1419 return KERN_INVALID_RIGHT; in mach_port_move_member() 1423 return KERN_INVALID_RIGHT; in mach_port_move_member() 1582 return KERN_INVALID_RIGHT; in mach_port_request_notification() [all …]
|
| H A D | ipc_object.c | 273 return KERN_INVALID_RIGHT; in ipc_object_translate() 284 return KERN_INVALID_RIGHT; in ipc_object_translate() 333 return KERN_INVALID_RIGHT; in ipc_object_translate_port_pset() 340 return KERN_INVALID_RIGHT; in ipc_object_translate_port_pset() 863 return KERN_INVALID_RIGHT; in ipc_object_insert_send_right() 886 kr = KERN_INVALID_RIGHT; in ipc_object_insert_send_right() 897 kr = KERN_INVALID_RIGHT; in ipc_object_insert_send_right()
|
| H A D | ipc_right.c | 603 KERN_INVALID_ARGUMENT : KERN_INVALID_RIGHT; in ipc_right_request_alloc() 962 return KERN_INVALID_RIGHT; in ipc_right_destroy() 1219 return KERN_INVALID_RIGHT; in ipc_right_dealloc() 1668 return KERN_INVALID_RIGHT; in ipc_right_delta() 1679 return KERN_INVALID_RIGHT; in ipc_right_delta() 1722 return KERN_INVALID_RIGHT; in ipc_right_destruct() 1728 return KERN_INVALID_RIGHT; in ipc_right_destruct() 2591 return KERN_INVALID_RIGHT; in ipc_right_copyin()
|
| H A D | mach_debug.c | 491 return KERN_INVALID_RIGHT; in mach_port_kobject_description()
|
| H A D | ipc_kmsg.c | 2368 if (kr == KERN_INVALID_RIGHT) { in ipc_kmsg_copyin_port_descriptor() 2611 if (kr == KERN_INVALID_RIGHT) { in ipc_kmsg_copyin_ool_ports_descriptor() 2699 if (kr == KERN_INVALID_RIGHT) { in ipc_kmsg_copyin_guarded_port_descriptor()
|
| /xnu-11417.140.69/libsyscall/mach/ |
| H A D | mach_right.c | 123 case KERN_INVALID_RIGHT: in mach_right_send_retain() 147 case KERN_INVALID_RIGHT: in mach_right_send_release() 179 case KERN_INVALID_RIGHT: in mach_right_send_once_consume()
|
| /xnu-11417.140.69/tests/ipc/ |
| H A D | port_api.c | 30 T_ASSERT_MACH_ERROR(kr, KERN_INVALID_RIGHT, "insert right fails");
|
| H A D | ipc_read_inspect.c | 185 if (kr == KERN_INVALID_RIGHT || kr == KERN_INVALID_NAME) { in test_task_threads() 249 if (kr == KERN_INVALID_RIGHT || kr == KERN_INVALID_NAME) { in test_processor_set_tasks()
|
| /xnu-11417.140.69/osfmk/mach/ |
| H A D | kern_return.h | 151 #define KERN_INVALID_RIGHT 17 macro
|
| H A D | mach_port.defs | 478 * KERN_INVALID_RIGHT is returned.
|
| /xnu-11417.140.69/tests/vm/ |
| H A D | vm_unaligned_copy_switch_race.c | 147 T_QUIET; T_EXPECT_MACH_ERROR(kr, KERN_INVALID_RIGHT, " vm_map() mem_entry_rw"); 160 T_QUIET; T_EXPECT_MACH_ERROR(kr, KERN_INVALID_RIGHT, " vm_map() mem_entry_rw");
|
| H A D | vm_memory_entry_parent_test.c | 215 T_EXPECT_MACH_ERROR(kr, KERN_INVALID_RIGHT, "entry shouldn't have write permissions");
|
| /xnu-11417.140.69/osfmk/kern/ |
| H A D | mk_timer.c | 225 return KERN_INVALID_RIGHT; in mk_timer_destroy_trap()
|
| H A D | ipc_kobject.c | 1248 kern_return_t kr = KERN_INVALID_RIGHT; in ipc_kobject_nsrequest() 1358 kern_return_t kr = KERN_INVALID_RIGHT; in ipc_kobject_make_send_nsrequest() 1380 kern_return_t kr = KERN_INVALID_RIGHT; in ipc_kobject_make_send_nsrequest_locked()
|
| H A D | ipc_tt.c | 1915 return KERN_INVALID_RIGHT; in thread_set_special_port() 2246 return KERN_INVALID_RIGHT; in task_set_special_port() 2407 return KERN_INVALID_RIGHT; in _kernelrpc_mach_ports_register3() 4260 return KERN_INVALID_RIGHT; in set_exception_ports_validation()
|
| H A D | host.c | 1316 return KERN_INVALID_RIGHT; in host_set_special_port_from_user()
|
| H A D | bsd_kern.c | 1470 case KERN_INVALID_RIGHT: in mach_to_bsd_errno()
|
| /xnu-11417.140.69/osfmk/vm/ |
| H A D | memory_object.c | 1260 return KERN_INVALID_RIGHT; in memory_object_iopl_request() 1270 return KERN_INVALID_RIGHT; in memory_object_iopl_request() 1276 return KERN_INVALID_RIGHT; in memory_object_iopl_request()
|
| H A D | vm_memory_entry.c | 208 return mach_make_memory_entry_cleanup(KERN_INVALID_RIGHT, target_map, in mach_make_memory_entry_mem_only()
|
| /xnu-11417.140.69/doc/mach_ipc/ |
| H A D | guard_exceptions.md | 284 These correspond to cases leading to the `KERN_INVALID_RIGHT` or
|