| /xnu-11215/libkern/libkern/c++/ |
| H A D | intrusive_shared_ptr.h | 131 using pointer = T *; 155 intrusive_shared_ptr(pointer p, retain_t) noexcept : ptr_(p) { 335 constexpr pointer 387 reset(pointer p, retain_t) noexcept 390 pointer old = ptr_; 414 constexpr pointer 420 constexpr pointer 438 constexpr pointer 441 pointer tmp = ptr_; 450 pointer tmp = a.ptr_; [all …]
|
| H A D | bounded_ptr.h | 180 bounded_ptr(T* pointer, T const* begin, T const* end) 196 if (__improbable(os_sub_overflow(reinterpret_cast<uintptr_t>(pointer),
|
| /xnu-11215/doc/primitives/ |
| H A D | string-handling.md | 70 functions assume the output pointer is a buffer and the input is a NUL- 119 in lieu of a pointer+length pair: `strbuflen(array)`, `strbufcmp(a, b)`, 124 NUL-terminated and returned as a NUL-terminated string pointer. 127 of indexable pointer, and only once you're done should you convert it to a 146 This code converts the string pointer to a NUL-terminated string too early, 162 NUL-terminated). Using `my_buffer` as an indexable pointer allows you to modify 189 pointer to you for convenience, not all use cases are resolved by calling 193 perform more manipulations. (`p_start` is a pointer to the first character, and 197 NUL-terminated string pointer. 200 (usually to interoperate with copy APIs that need a pointer and a byte count). [all …]
|
| H A D | atomics.md | 232 which has an extra `orig_value` argument which must be a pointer to a local 345 - loads through a pointer loaded with a *dependency* memory ordering 349 particular pointer with the `os_atomic_load_with_dependency_on` and 417 the pointer can only take a couple of values and ditch all these manually
|
| /xnu-11215/libkern/os/ |
| H A D | hash.h | 120 os_hash_kernel_pointer(const void *pointer) in os_hash_kernel_pointer() argument 122 uintptr_t key = (uintptr_t)pointer >> 4; in os_hash_kernel_pointer()
|
| /xnu-11215/osfmk/mach/ |
| H A D | dyld_kernel_fixups.h | 75 sign_pointer(struct dyld_chained_ptr_64_kernel_cache_rebase pointer __unused, in sign_pointer() 80 uint64_t discriminator = pointer.diversity; in sign_pointer() 81 if (pointer.addrDiv) { in sign_pointer() 88 switch (pointer.key) { in sign_pointer()
|
| H A D | mach_port.defs | 512 * Gets the context pointer for the port. 532 * Sets the context pointer for the port.
|
| /xnu-11215/iokit/DriverKit/ |
| H A D | IOExtensiblePaniclog.iig | 71 …* @param out The pointer to the created IOExtensiblePaniclog object. NULL in case of an erro… 122 * @param mem The pointer to the IOBufferMemoryDescriptor object 129 * @brief This function is called to get a pointer to the ext paniclog buffer
|
| H A D | IODispatchQueue.iig | 109 * @discussion Returns a pointer to the queues name. Only valid while the queue is retained. 110 * @return C-string pointer in the queues internal storage. 121 * @return C-string pointer in the queues internal storage.
|
| H A D | OSAction.iig | 101 * @brief Return a pointer to any state allocated by the OSAction creator. 104 …* @return A pointer to storage for the owner. It will be NULL if referenceSize was zero, and …
|
| H A D | bounded_ptr.h | 180 bounded_ptr(T* pointer, T const* begin, T const* end) 196 if (__improbable(os_sub_overflow(reinterpret_cast<uintptr_t>(pointer),
|
| /xnu-11215/doc/allocators/ |
| H A D | api-basics.md | 77 pointer in read-only memory (using `SECURITY_READ_ONLY_LATE` storage). 112 as attackers tend to use data/pointer overlaps to carry out their exploitations. 118 to denote when a data-looking type is actually a pointer. 134 - for union types, data/pointer overlaps should be avoided if possible. 195 <td>This should be used when the allocated type contains no kernel pointer only</td> 273 respectively. They expect both their pointer and size arguments to be 274 modifiable, and the pointer and size will be set to 0 together, in accordance
|
| H A D | read-only.md | 59 read-only element should include a pointer back to the read/write side (a 66 chain from source pointer (e.g. thread) to destination data (e.g. credential). 99 macro that automatically zeroes the pointer after freeing.
|
| /xnu-11215/libkern/conf/ |
| H A D | Makefile.template | 135 OSUnserialize.cpo_CXXWARNFLAGS_ADD += -Wno-zero-as-null-pointer-constant 136 OSUnserializeXML.cpo_CXXWARNFLAGS_ADD += -Wno-zero-as-null-pointer-constant
|
| /xnu-11215/osfmk/conf/ |
| H A D | Makefile.x86_64 | 37 locks_i386_opt.o_CFLAGS_ADD += -momit-leaf-frame-pointer -O2
|
| /xnu-11215/osfmk/mach/machine/ |
| H A D | machine_types.defs | 68 * in kernel space as a pointer. 112 * maximum pointer, offset, etc... supported on the
|
| /xnu-11215/libkern/libclosure/ |
| H A D | runtime.cpp | 230 uintptr_t pointer = base + extendedOffset; in unwrap_relative_pointer() local 231 return (T *)pointer; in unwrap_relative_pointer()
|
| /xnu-11215/libsyscall/ |
| H A D | Libsyscall.xcconfig | 26 …o-stack-protector -fno-stack-check -fno-builtin-calloc -momit-leaf-frame-pointer -DLIBSYSCALL_INTE…
|
| /xnu-11215/tools/lldbmacros/ |
| H A D | Makefile | 42 core/pointer.py \
|
| H A D | README.md | 299 …Note that if your argument pointer is bad or the memory is corrupted lldb macros will fail with a … 318 …* As a convention, I suggest that for printing pointer values in hex use "{0: <#020x}".format(some… 412 …* The lldbmacros cannot divine the type of memory by inspection. If a wrong pointer is passed from… 421 …* In case of memory corruption, the lldbmacros may have followed wrong pointer dereferencing. This…
|
| /xnu-11215/doc/mach_ipc/ |
| H A D | kmsg.md | 375 - an unsigned pointer variant prefixed with `kext_`, 376 - a signed pointer (keeping its current name).
|
| /xnu-11215/bsd/man/man2/ |
| H A D | getdirentriesattr.2 | 102 parameter is a pointer to an 132 by simply adding this length to your pointer.
|
| /xnu-11215/osfmk/tests/ |
| H A D | README.md | 117 void * xtp_context_p; /* a context pointer for callbacks to track */
|
| /xnu-11215/makedefs/ |
| H A D | MakeInc.def | 187 -Wno-incompatible-function-pointer-types-strict 198 -Wno-error=incompatible-function-pointer-types-strict \ 362 $(LARGE_MEMORY_DEFINE) -momit-leaf-frame-pointer -fno-strict-aliasing -D__API__=v4 -mkernel \ 584 UBSAN_CHECKS += signed-integer-overflow shift pointer-overflow bounds object-size # non-fatal (call…
|
| /xnu-11215/bsd/miscfs/devfs/ |
| H A D | README | 20 (or directory) and a pointer to the vnode if one has been associated
|