/xnu-2422.115.4/bsd/net/ |
H A D | bpf_compat.h | 74 #define malloc(size, type, canwait) _MALLOC(size, type, canwait)
|
H A D | multicast_list.c | 132 mc = _MALLOC(sizeof(struct multicast_entry), M_DEVBUF, M_WAITOK);
|
H A D | if_mib.c | 181 if ((ifmd_supp = _MALLOC(sizeof (*ifmd_supp), M_TEMP,
|
H A D | net_str_id.c | 180 iffmid = _MALLOC(iffmid_size, M_TEMP, M_WAITOK);
|
H A D | radix.h | 194 #define R_Malloc(p, t, n) (p = (t) _MALLOC((uint32_t)(n), M_RTABLE, M_WAITOK))
|
H A D | pf_if.c | 127 pfi_buffer = _MALLOC(pfi_buffer_max * sizeof (*pfi_buffer), 156 if ((kif = _MALLOC(sizeof (*kif), PFI_MTYPE, M_WAITOK|M_ZERO)) == NULL) 517 p = _MALLOC(new_max * sizeof (*pfi_buffer), PFI_MTYPE,
|
H A D | kpi_protocol.c | 110 entry = _MALLOC(sizeof (*entry), M_IFADDR, M_WAITOK); 368 _MALLOC(sizeof (struct proto_family_str), M_IFADDR, M_WAITOK);
|
H A D | devtimer.c | 179 timer = _MALLOC(sizeof(*timer), M_DEVTIMER, M_WAITOK);
|
H A D | bpf.c | 434 new_dtab = (struct bpf_d **)_MALLOC(sizeof(struct bpf_d *) * new_dtab_size, M_DEVBUF, M_WAIT); 657 d = (struct bpf_d *)_MALLOC(sizeof(struct bpf_d), M_DEVBUF, M_WAIT); 1680 fcode = (struct bpf_insn *) _MALLOC(size, M_DEVBUF, M_WAIT); 2326 d->bd_fbuf = (caddr_t) _MALLOC(d->bd_bufsize, M_DEVBUF, M_WAIT); 2330 d->bd_sbuf = (caddr_t) _MALLOC(d->bd_bufsize, M_DEVBUF, M_WAIT); 2389 bp_new = (struct bpf_if *) _MALLOC(sizeof(*bp_new), M_DEVBUF, M_WAIT);
|
H A D | if_pflog.c | 149 if ((pflogif = _MALLOC(sizeof (*pflogif),
|
H A D | if_gif.c | 333 sc = _MALLOC(sizeof (struct gif_softc), M_DEVBUF, M_WAITOK); 859 sa = (struct sockaddr *)_MALLOC(src->sa_len, M_IFADDR, 870 sa = (struct sockaddr *)_MALLOC(dst->sa_len, M_IFADDR,
|
/xnu-2422.115.4/bsd/netkey/ |
H A D | keydb.c | 68 p = (struct secpolicy *)_MALLOC(sizeof(*p), M_SECA, M_WAITOK); 94 p = (struct secashead *)_MALLOC(sizeof(*p), M_SECA, M_NOWAIT); 97 p = (struct secashead *)_MALLOC(sizeof(*p), M_SECA, M_WAITOK); 129 p = (struct secasvar *)_MALLOC(sizeof(*p), M_SECA, M_WAITOK); 183 p = (struct secreplay *)_MALLOC(sizeof(*p), M_SECA, M_NOWAIT); 186 p = (struct secreplay *)_MALLOC(sizeof(*p), M_SECA, M_WAITOK); 194 p->bitmap = (caddr_t)_MALLOC(wsize, M_SECA, M_NOWAIT); 197 p->bitmap = (caddr_t)_MALLOC(wsize, M_SECA, M_WAITOK); 229 p = (struct secreg *)_MALLOC(sizeof(*p), M_SECA, M_WAITOK);
|
/xnu-2422.115.4/bsd/dev/random/YarrowCoreLib/port/ |
H A D | smf.c | 51 mem = _MALLOC (request, M_DEVBUF, M_WAITOK);
|
/xnu-2422.115.4/bsd/netinet/ |
H A D | ip_id.c | 158 id_array = (uint16_t *)_MALLOC(ARRAY_SIZE * sizeof (uint16_t), 160 id_bits = (bitstr_t *)_MALLOC(bitstr_size(65536), M_TEMP,
|
H A D | ip_encap.c | 408 ep = _MALLOC(sizeof(*ep), M_NETADDR, M_WAITOK); /*XXX*/ 450 ep = _MALLOC(sizeof(*ep), M_NETADDR, M_WAITOK); /*XXX*/
|
H A D | in_pcblist.c | 310 buf = _MALLOC(item_size, M_TEMP, M_WAITOK); 316 inp_list = _MALLOC(n * sizeof (*inp_list), M_TEMP, M_WAITOK);
|
/xnu-2422.115.4/bsd/dev/dtrace/ |
H A D | dtrace_alloc.c | 124 return _MALLOC(size, M_TEMP, M_WAITOK);
|
H A D | dtrace_glue.c | 357 wrap_timer_call_t *wrapTC = _MALLOC(sizeof(wrap_timer_call_t), M_TEMP, M_ZERO | M_WAITOK); 399 _MALLOC( (sizeof(wrap_timer_call_t))*NCPU + 471 wrap_thread_call_t *wrapTC = _MALLOC(sizeof(wrap_thread_call_t), M_TEMP, M_ZERO | M_WAITOK); 566 for (i = 0; i < NSOFT_STATES; ++i) soft[i] = _MALLOC(size, M_TEMP, M_ZERO | M_WAITOK); 619 int *p = (int *)_MALLOC(nelements*sizeof(int), M_TEMP, M_WAITOK); 848 * We'll manage this constricted use of kmem_cache with ordinary _MALLOC and _FREE. 871 return (void *)_MALLOC(bufsize, M_TEMP, M_WAITOK); 942 struct blist_hdl *p = _MALLOC(sizeof(struct blist_hdl), M_TEMP, M_WAITOK);
|
H A D | dtrace_ptss.c | 47 * page of memory, the underlying kernel _MALLOC may block. 157 struct dtrace_ptss_page* ptss_page = _MALLOC(sizeof(struct dtrace_ptss_page), M_TEMP, M_ZERO | M_WAITOK);
|
/xnu-2422.115.4/bsd/sys/ |
H A D | malloc.h | 257 (space) = (cast)_MALLOC(size, type, flags) 271 extern void *_MALLOC(
|
/xnu-2422.115.4/bsd/kern/ |
H A D | kern_malloc.c | 559 _MALLOC( function 585 panic("_MALLOC: overflow detected, size %llu ", (uint64_t) size); 602 panic("_MALLOC: kalloc returned NULL (potential leak), size %llu", (uint64_t) size); 646 return (_MALLOC(size, type, flags)); 649 if ((newaddr = _MALLOC(size, type, flags)) == NULL)
|
H A D | uipc_domain.c | 271 dp = _MALLOC(sizeof (*dp), M_TEMP, M_WAITOK | M_ZERO); 458 pru = _MALLOC(sizeof (*pru), M_TEMP, M_WAITOK | M_ZERO); 486 pp = _MALLOC(sizeof (*pp), M_TEMP, M_WAITOK | M_ZERO);
|
/xnu-2422.115.4/bsd/netinet6/ |
H A D | esp_rijndael.c | 284 sp_aligned = (u_int8_t *)_MALLOC(MAX_REALIGN_LEN, M_SECA, M_DONTWAIT); 479 sp_aligned = (u_int8_t *)_MALLOC(MAX_REALIGN_LEN, M_SECA, M_DONTWAIT);
|
H A D | ipcomp_core.c | 155 ptr = _MALLOC(items * siz, M_TEMP, M_NOWAIT);
|
H A D | ah_core.c | 309 state->foo = (void *)_MALLOC(sizeof(MD5_CTX), M_TEMP, M_NOWAIT); 429 state->foo = (void *)_MALLOC(sizeof(SHA1_CTX), M_TEMP, M_NOWAIT); 556 state->foo = (void *)_MALLOC(64 + 64 + sizeof(MD5_CTX), M_TEMP, M_NOWAIT); 681 state->foo = (void *)_MALLOC(64 + 64 + sizeof(SHA1_CTX), 821 state->foo = (void *)_MALLOC(64 + 64 + sizeof(SHA256_CTX), 963 state->foo = (void *)_MALLOC(128 + 128 + sizeof(SHA384_CTX), 1106 state->foo = (void *)_MALLOC(128 + 128 + sizeof(SHA512_CTX),
|