/xnu-2422.115.4/bsd/miscfs/devfs/ |
H A D | devfs.h | 89 * A handle to a device node if successful, NULL otherwise. 108 * A handle to a device node if successful, NULL otherwise. 123 int devfs_make_link(void * handle, char *fmt, ...); 133 void devfs_remove(void * handle);
|
/xnu-2422.115.4/security/ |
H A D | mac_data.c | 59 mac_find_policy_data(const mac_policy_handle_t handle, const char *key, argument 65 if ((mpc = mac_get_mpc(handle)) != NULL)
|
H A D | mac_audit.c | 190 mac_audit_data(int len, u_char *data, mac_policy_handle_t handle) 209 mac_audit_text(char *text, mac_policy_handle_t handle) argument 215 name = mac_get_mpc(handle)->mpc_name; 394 mac_audit_text(__unused char *text, __unused mac_policy_handle_t handle) argument
|
H A D | mac_base.c | 261 * handle lower than staticmax are considered "static" and cannot be 264 * Modules with a handle at or above the staticmax high water mark 586 mac_policy_addto_labellist(mac_policy_handle_t handle, int static_entry) argument 595 mpc = mac_get_mpc(handle); 662 new_mlls[mll_free]->mll_handle = handle; 688 mac_policy_removefrom_labellist(mac_policy_handle_t handle) argument 694 mpc = mac_get_mpc(handle); 710 if (mll->mll_handle == handle) { 868 /* Find the first free handle in the list (using our hint). */ 880 * we can place its handle adjacen 928 mac_policy_unregister(mac_policy_handle_t handle) argument [all...] |
H A D | mac_policy.h | 176 allocation calls: one to handle sleepable requests, and one to handle 3517 The policy must handle NULL MBUF labels. This will likely be the case 5734 labeling to be retried at a later access. Failure to handle policy 6617 @brief MAC policy handle type 6619 The MAC handle is used to uniquely identify a loaded policy within 6678 int mac_policy_unregister(mac_policy_handle_t handle); 6683 int mac_audit_text(char *text, mac_policy_handle_t handle); 6729 system objects, and cannot handle objects that have not been 6782 #define MAC_POLICY_SET(handle, mpop [all...] |
/xnu-2422.115.4/bsd/kern/ |
H A D | kpi_socketfilter.c | 350 sflt_attach_internal(socket_t socket, sflt_handle handle) argument 352 if (socket == NULL || handle == 0) 361 if (filter->sf_filter.sf_handle == handle) break; 491 sflt_handle handle) 503 ((handle && entry->sfe_filter->sf_filter.sf_handle != 504 handle) || !handle)) { 545 sflt_handle handle) 547 sflt_notify_internal(so, event, NULL, handle); 1214 sflt_attach(socket_t socket, sflt_handle handle) argument 490 sflt_notify_internal(struct socket *so, sflt_event_t event, void *param, sflt_handle handle) argument 544 sflt_notify_after_register(struct socket *so, sflt_event_t event, sflt_handle handle) argument 1223 sflt_detach(socket_t socket, sflt_handle handle) argument 1375 sflt_handle handle = filter->sf_handle; local 1413 sflt_unregister(sflt_handle handle) argument [all...] |
H A D | kern_mman.c | 158 void *handle; local 281 handle = NULL; 338 * XXX hack to handle use of /dev/zero to map anon memory (ala 404 handle = (void *)vp; 484 if (handle == NULL) {
|
H A D | tty_ptmx.c | 150 _devfs_setattr(void * handle, unsigned short mode, uid_t uid, gid_t gid) argument 152 devdirent_t *direntp = (devdirent_t *)handle; 253 void *pt_devhandle; /* cloned slave device handle */
|
H A D | tty_pty.c | 94 int _devfs_setattr(void * handle, unsigned short mode, uid_t uid, gid_t gid); 132 void *pt_devhandle; /* slave device handle for grantpt() */
|
/xnu-2422.115.4/bsd/nfs/ |
H A D | nfs_gss.h | 142 uint32_t gss_clnt_handle_len; // Size of server's ctx handle 151 gssd_cred gss_clnt_cred_handle; // Opaque cred handle from gssd 152 gssd_ctx gss_clnt_context; // Opaque context handle from gssd 186 gssd_cred gss_svc_cred_handle; // Opaque cred handle from gssd 187 gssd_ctx gss_svc_context; // Opaque context handle from gssd 196 #define SVC_CTX_HASH(handle) ((handle) % SVC_CTX_HASHSZ)
|
H A D | nfs_gss.c | 269 if (req->r_wrongsec) /* Not OK if we're trying to handle a wrongsec error */ 991 * should have its session key and a handle that it can use to refer to its 1930 * Find a server context based on a handle value received 1934 nfs_gss_svc_ctx_find(uint32_t handle) argument 1940 if (handle == 0) 1943 head = &nfs_gss_svc_ctx_hashtbl[SVC_CTX_HASH(handle)]; 1952 if (cp->gss_svc_handle == handle) { 1994 * Give the client a random handle so that if we reboot 2082 * being set up, or is complete. Then we use the handle to find 2092 uint32_t handle, handle_le local [all...] |
/xnu-2422.115.4/bsd/sys/ |
H A D | kpi_socketfilter.h | 129 @abstract Inbound and outbound data filters may handle many 153 @param handle The socket filter handle used to identify this filter. 155 typedef void (*sf_unregistered_func)(sflt_handle handle); 580 @param handle The sf_handle of the socket filter to unregister. 583 extern errno_t sflt_unregister(sflt_handle handle); 590 @param handle The handle of the registered filter to be attached. 599 @param handle The handle o [all...] |
/xnu-2422.115.4/bsd/net/ |
H A D | kext_net.h | 54 extern errno_t sflt_attach_internal(struct socket *so, sflt_handle handle); 87 * 'handle' is the NKE to be inserted, 'where' is an insertion point,
|
/xnu-2422.115.4/bsd/net/pktsched/ |
H A D | pktsched_cbq.c | 307 /* return handle to user space. */ 308 cl->stats_.handle = qid; 348 * free the class handle 379 cl->stats_.handle, cl->pri_); 386 * free the class handle 400 /* convert class handle to class pointer */ 411 * the handle. if it fails, do the linear table search. 415 cl->stats_.handle == chandle) 419 cl->stats_.handle == chandle) 632 cbq_style(cbqp), cl->stats_.handle, [all...] |
H A D | pktsched_cbq.h | 122 u_int32_t handle; member in struct:cbq_classstats
|
H A D | pktsched_rmclass.h | 173 u_int32_t handle; member in struct:_rm_class_stats_
|
H A D | pktsched_rmclass.c | 863 CBQTRACE(rmc_queue_packet, 'type', cl->stats_.handle); 1412 cl->stats_.handle); 1580 CBQTRACE(rmc_delay_action, 'yled', cl->stats_.handle); 1652 CBQTRACE(rmc_restart, 'trts', cl->stats_.handle); 1705 cl->sfb_ = sfb_alloc(ifp, cl->stats_.handle, 1716 cl->stats_.handle, cl->pri_);
|
/xnu-2422.115.4/osfmk/i386/commpage/ |
H A D | commpage.c | 117 ipc_port_t handle; local 145 &handle, // this is the object handle we get 154 handle, // port is the memory entry we just made 162 ipc_port_release(handle); 165 * cannot handle disjoint permissions at this time.
|
/xnu-2422.115.4/iokit/IOKit/ |
H A D | IOMapper.h | 101 static void FreeARTTable(OSData *handle, IOByteCount size);
|
/xnu-2422.115.4/iokit/IOKit/pwr_mgt/ |
H A D | RootDomain.h | 64 * <link>IOPMrootDomain::createPMAssertion</link>, PM returns a handle to 223 @param handle Caller should keep the OSObject * returned here. If non-NULL, 224 handle will have a retain count of 1 on return. To deregister, pass to 233 OSObject **handle); // out param 244 @param handle Caller should keep the OSObject * returned here. If non-NULL, 245 handle will have a retain count of 1 on return. To deregister, pass to 255 OSObject **handle); // out param
|
/xnu-2422.115.4/bsd/vfs/ |
H A D | kpi_vfs.c | 666 /* return the private data handle stored in mount_t */ 673 /* set the private data handle in mount_t */ 785 * It returns a handle which is to be used to when the FS is to be removed 790 vfs_fsadd(struct vfs_fsentry *vfe, vfstable_t * handle) argument 860 * Also handle backwards compatibility. 942 *handle = vfstable_add(newvfstbl); 951 bcopy((*handle)->vfc_name, vfsc.vfc_name, sizeof(vfsc.vfc_name)); 952 vfsc.vfc_typenum = (*handle)->vfc_typenum; 953 vfsc.vfc_refcount = (*handle)->vfc_refcount; 954 vfsc.vfc_flags = (*handle) 972 vfs_fsremove(vfstable_t handle) argument 5355 VNOP_MONITOR(vnode_t vp, uint32_t events, uint32_t flags, void *handle, vfs_context_t ctx) argument [all...] |
/xnu-2422.115.4/iokit/Kernel/ |
H A D | IOPMrootDomain.cpp | 344 * Opaque handle passed to clients of registerPMSettingController() 1014 // events, and to handle those events on the PM work loop. 1864 // Submit a power event to handle those changes on the PM work loop. 3559 OSObject **handle) 3564 func, target, refcon, handle); 3580 // * handle - This is a return argument. We will populate this pointer upon 3593 OSObject **handle) 3602 NULL == handle) 3612 *handle = NULL; 3632 // Return handle t 3554 registerPMSettingController( const OSSymbol * settings[], IOPMSettingControllerCallback func, OSObject *target, uintptr_t refcon, OSObject **handle) argument 3587 registerPMSettingController( const OSSymbol * settings[], uint32_t supportedPowerSources, IOPMSettingControllerCallback func, OSObject *target, uintptr_t refcon, OSObject **handle) argument [all...] |