Searched refs:where (Results 1 - 25 of 27) sorted by relevance

12

/macosx-10.5.8/xnu-1228.15.4/bsd/dev/ppc/
H A Dmem.c151 vm_offset_t where; local
172 if (kmem_alloc_pageable(kernel_map, &where, PAGE_SIZE) != KERN_SUCCESS) {
178 collad = mapping_make(kernel_pmap, (addr64_t)where, (ppnum_t)(vll >> 12), 0, 1, VM_PROT_READ); /* Map it in for the moment */
180 kmem_free(kernel_map, where, PAGE_SIZE); /* Toss the page */
186 if (kmem_alloc(kernel_map, &where, 4096)
194 error = uiomove((caddr_t)(where + o), c, uio);
196 if(dgWork.dgFlags & enaDiagDM) (void)mapping_remove(kernel_pmap, (addr64_t)where); /* Unmap it */
197 kmem_free(kernel_map, where, PAGE_SIZE);
/macosx-10.5.8/xnu-1228.15.4/bsd/kern/
H A Dkern_pcsamples.c68 int pcsamples_control(int *name, u_int namelen, user_addr_t where, size_t *sizep);
230 pcsamples_control(int *name, __unused u_int namelen, user_addr_t where, size_t *sizep) argument
294 if(copyout (&pc_bufinfo, where, sizeof(pc_bufinfo)))
313 ret = pcsamples_read(where, sizep);
350 ret = pcsamples_read(where, sizep);
360 if (copyin(where, &pc_bufinfo, sizeof(pc_bufinfo)))
376 if (copyin(where, pcsample_comm, size))
H A Dkdebug.c1046 kdbg_control(int *name, u_int namelen, user_addr_t where, size_t *sizep) argument
1102 if (copyout (&kd_bufinfo, where, sizeof(kd_bufinfo))) {
1113 if (copyout (&kd_bufinfo, where, size)) {
1126 ret = kdbg_getentropy(where, sizep, value);
1201 if (copyin(where, &kd_Reg, sizeof(kd_regtype))) {
1213 if (copyout(&kd_Reg, where, sizeof(kd_regtype))){
1218 ret = kdbg_read(where, sizep);
1225 if (copyin(where, &kd_Reg, sizeof(kd_regtype))) {
1236 if (copyin(where, &kd_Reg, sizeof(kd_regtype))) {
1243 ret = kdbg_readmap(where, size
[all...]
H A Dkern_sysctl.c158 kdbg_control(int *name, u_int namelen, user_addr_t where, size_t * sizep);
160 kdebug_ops(int *name, u_int namelen, user_addr_t where, size_t *sizep, proc_t p);
166 pcsamples_ops(int *name, u_int namelen, user_addr_t where, size_t *sizep,
171 sysctl_doproc(int *name, u_int namelen, user_addr_t where, size_t *sizep);
178 sysctl_procargs(int *name, u_int namelen, user_addr_t where,
181 sysctl_procargs2(int *name, u_int namelen, user_addr_t where, size_t *sizep,
184 sysctl_procargsx(int *name, u_int namelen, user_addr_t where, size_t *sizep,
1187 sysctl_doproc(int *name, u_int namelen, user_addr_t where, size_t *sizep) argument
1189 user_addr_t dp = where;
1191 int buflen = where !
1586 kdebug_ops(int *name, u_int namelen, user_addr_t where, size_t *sizep, proc_t p) argument
1629 sysctl_procargs(int *name, u_int namelen, user_addr_t where, size_t *sizep, proc_t cur_proc) argument
1636 sysctl_procargs2(int *name, u_int namelen, user_addr_t where, size_t *sizep, proc_t cur_proc) argument
1643 sysctl_procargsx(int *name, u_int namelen, user_addr_t where, size_t *sizep, proc_t cur_proc, int argc_yes) argument
[all...]
H A Duipc_socket2.c648 * discarded and mbufs are compacted where possible.
758 sblastrecordchk(struct sockbuf *sb, const char *where) argument
771 panic("sblastrecordchk from %s", where);
776 sblastmbufchk(struct sockbuf *sb, const char *where) argument
797 panic("sblastmbufchk from %s", where);
1214 sb_empty_assert(struct sockbuf *sb, const char *where) argument
1219 "lastrecord %p\n", where, sb, sb->sb_so, sb->sb_cc,
1255 * of where we get to in the tree and then zeroing the
/macosx-10.5.8/xnu-1228.15.4/iokit/Kernel/
H A DIORegistryEntry.cpp1156 IORegistryEntry * where = 0; local
1188 where = aliasEntry;
1189 if( where)
1198 if( 0 == where) {
1201 where = fromEntry;
1202 if( 0 == where)
1208 where = 0;
1212 next = where->getChildFromComponent( &path, plane );
1214 where = next;
1217 if( where) {
[all...]
H A DIOCatalogue.cpp540 SInt32 count, where, end; local
575 for (where = next + 1;
576 (where < count) && (togo[where] > depIdx);
577 where++) {}
579 if (where != count)
581 if (togo[where] == depIdx)
583 for (end = count; end != where; end--)
587 togo[where] = depIdx;
H A DIOService.cpp3957 IOService * where; local
3971 where = this;
3980 match = (0 != where->metaCast( str ));
3988 match = where->compareNames( obj, changesOK ? &matched : 0 );
4005 sym = where->copyLocation();
4023 dict = where->dictionaryWithProperties();
4052 match = (where == entry);
4067 iter = where->getClientIterator();
4093 match = where->matchPropertyTable( table, &score );
4098 LOG("%s: family specific matching fails\n", where
[all...]
H A DIONVRAM.cpp1258 bool IODTNVRAM::searchNVRAMProperty(IONVRAMDescriptor *hdr, UInt32 *where) argument
1277 *where = offset;
1284 *where = nvEnd;
1286 *where = 0;
/macosx-10.5.8/xnu-1228.15.4/bsd/dev/i386/
H A Dmem.c140 vm_offset_t where; local
164 if (kmem_alloc(kernel_map, &where, size)
171 error = uiomove((caddr_t) (where + o), c, uio);
172 kmem_free(kernel_map, where, PAGE_SIZE);
H A Ddis_tables.c2838 * int n, where n is indicated in the subsequent
2840 * where, although the 3 looks like an operand,
3060 char *where; local
3068 where = opcode + strlen(opcode) - 1;
3069 while (where > opcode && *where != ' ')
3070 --where;
3071 if (*where == ' ')
3072 ++where;
3075 if (strncmp(where, unsigned_op
[all...]
/macosx-10.5.8/xnu-1228.15.4/osfmk/console/
H A Dvideo_console.c1396 unsigned long *where; local
1405 where = (unsigned long*)(vinfo.v_baseaddr +
1410 unsigned long *store = where;
1418 where = (unsigned long*)(((unsigned char*)where)+vinfo.v_rowbytes);
1420 unsigned long *store = where, lastpixel = 0;
1442 where = (unsigned long*)(((unsigned char*)where)+vinfo.v_rowbytes);
1453 unsigned long *where; local
1462 where
1506 unsigned long *where; local
1658 unsigned long *where; local
[all...]
/macosx-10.5.8/xnu-1228.15.4/iokit/IOKit/
H A DIONVRAM.h109 UInt32 *where);
H A DIORegistryEntry.h813 IORegCursor * where; member in class:IORegistryIterator
/macosx-10.5.8/xnu-1228.15.4/bsd/dev/vn/
H A Dshadow.c135 bitmap_offset(off_t where) argument
139 b.byte = where / NBBY;
140 b.bit = where % NBBY;
/macosx-10.5.8/xnu-1228.15.4/osfmk/ppc/
H A Dhw_exception.s239 * This is also the point where new threads come when they are created.
265 ; Here is where we go when we detect that the kernel stack is all messed up.
476 ; they should be. We are in a state here where
851 ; This is where we handle someone trying who did a thread_create followed
1551 * Here's where we handle the fastpath stuff
1603 * Here's where we check for a hit on the Blue Box Assist
1629 ; Here is where we exit from the emulated context
1667 ; Here is the system choke handler. This is where the system goes
1672 ; fatal error. Examples of where this may be used is when we detect
H A Dlowmem_vectors.s2075 ; Here is where we call the firmware. If it returns T_IN_VAIN, that means
2084 ; Here is where we return from the firmware call
2098 ; Here is where we return from the PTE miss and segment exception handler
2299 ; Here is where we handle the "recovery mode" stuff.
2325 ; Here is where we handle the context switch firmware call. The old
2512 ; Note: bug in early chips where scom reads are shifted right by 1. We fix that here.
2672 ; where we handle ml_probe_read problems eventually.
2793 ; Right here is where we end up after a failure on a ml_probe_read_64.
2890 * Here's where we come back from some instruction emulator. If we come back with
3025 * This routine is the main place where w
[all...]
H A Dsavearea_asm.s485 rldicr r5,r3,0,51 ; r5 <-- page ptr, where SAC is kept
625 rlwinm r5,r3,0,0,19 ; r5 <-- page ptr, where SAC is kept
H A Dvmachmon_asm.s336 * Here is where we transition to the virtual machine.
442 ; Here is where we actually swap into the VM (alternate) context.
754 ; Here is where we exit from vmm mode. We do this on any kind of exception.
815 ; Here is where we force exit from vmm mode. We do this when as
H A Dstart.s143 ; Here is where we do any one time general low-level initialization
H A Dhw_vm.s567 ; Here is where we join in from the hw_purge_* routines
656 ; Here is also where we need to split 32- and 64-bit processing
877 ; Here is where we come when all is lost. Somehow, we failed a mapping function
891 ; PTEG up to the point where we have cleared it all (64 for 32-bit architecture)
3815 ; This is where we loop descending nested pmaps
3943 ; Here is where we handle special mappings. So far, the only use is to load a
4654 ; This is where we go if we have started processing the fault, but find that someone
4669 ; This is where we go when we find that someone else
4693 ; our group, which could have dire consequences depending upon where the
8089 eqv r10,r10,r5 ; Get 0xF where w
[all...]
H A Dcswtch.s302 * R3 where it belongs.
307 ; This is where we go when a continuation is set. We are actually
1965 mtcrf 0x02,r9 ; put cache line size bits in cr6 where we can test
/macosx-10.5.8/xnu-1228.15.4/bsd/netinet/
H A Dip_input.c210 * to the loopback interface instead of the interface where the
884 * to the loopback interface instead of the interface where
1271 ip_reass(struct mbuf *m, struct ipq *fp, struct ipq *where, argument
1279 ip_reass(struct mbuf *m, struct ipq *fp, struct ipq *where)
1314 insque((void*)fp, (void*)where);
/macosx-10.5.8/xnu-1228.15.4/bsd/vfs/
H A Dvfs_subr.c1558 * in the case where we're not on the free
3854 * also need to make sure that the vnode isn't on a list where "new_vnode"
4005 /* The file systems usually pass the address of the location where
4006 * where there store the vnode pointer. When we add the vnode in mount
4484 * XXX: We should enummerate the possible errno values here, and where
4855 const char *where = "uninitialized"; local
4856 # define _SETWHERE(c) where = c;
4962 vcp->vp, (error == 0) ? "ALLOWED" : "DENIED", where,
/macosx-10.5.8/xnu-1228.15.4/bsd/dev/dtrace/
H A Ddtrace.c238 * several places where dtrace_provider_lock is held by the framework as it
379 #define DTRACE_TLS_THRKEY(where) { \
385 (where) = ((curthread->t_did + DIF_VARIABLE_MAX) & \
389 #define DTRACE_TLS_THRKEY(where) { \
394 (where) = ((((uint64_t)thr << 32 | pid) + DIF_VARIABLE_MAX) & \
12014 * Logical XOR, where are you?
13060 dtrace_mstate_t *mstate, dtrace_vstate_t *vstate, int where)
13099 ent->dtht_where = where;

Completed in 417 milliseconds

12