/xnu-2782.1.97/bsd/sys/ |
H A D | fslog.h | 38 void fslog_extmod_msgtracer(proc_t caller, proc_t target);
|
/xnu-2782.1.97/bsd/vfs/ |
H A D | vfs_fslog.c | 50 * using MessageTracer formatting. Assumes that both the caller 59 fslog_extmod_msgtracer(proc_t caller, proc_t target) argument 61 if ((caller != PROC_NULL) && (target != PROC_NULL)) { 72 strlcpy(c_name, caller->p_comm, sizeof(c_name)); 73 uuid_unparse_upper(caller->p_uuid, uuidstr); 92 proc_pid(caller),
|
/xnu-2782.1.97/osfmk/i386/ |
H A D | locks_i386.c | 490 char *caller) 493 panic("%s: null lock pointer", caller); 495 panic("%s: %p is not a usimple lock, 0x%x", caller, l, l->lock_type); 497 panic("%s: %p is not an initialized lock, 0x%x", caller, l, l->debug.state); 512 char caller[] = "usimple_lock"; local 515 if (!usld_lock_common_checks(l, caller)) 529 caller, l, l->debug.lock_pc); 532 panic("%s", caller); 535 usl_trace(l, cpu_number(), pc, caller); 552 char caller[] local 488 usld_lock_common_checks( usimple_lock_t l, char *caller) argument 589 char caller[] = "usimple_unlock"; local 630 char caller[] = "usimple_lock_try"; local 654 char caller[] = "successful usimple_lock_try"; local [all...] |
/xnu-2782.1.97/osfmk/chud/i386/ |
H A D | chud_thread_i386.c | 203 uint64_t caller; member in struct:_cframe64_t 210 uint32_t caller; member in struct:_cframe_t 255 /* read our caller */ 257 kr = chudxnu_kern_read(&tmpWord, (vm_offset_t) &fp->caller, sizeof(uint32_t)); 259 kr = chudxnu_task_read(task, &tmpWord, (vm_offset_t) &fp->caller, sizeof(uint32_t)); 321 // this is the address where caller lives in the user thread 322 uint64_t caller = currFP + sizeof(uint64_t); local 334 /* read our caller */ 336 kr = chudxnu_kern_read(&currPC, (vm_offset_t)caller, sizeof(uint64_t)); 338 kr = chudxnu_task_read(task, &currPC, caller, sizeo 421 uint64_t caller = currFP + sizeof(uint64_t); local 424 uint32_t caller = (uint32_t)currFP + sizeof(uint32_t); local [all...] |
/xnu-2782.1.97/bsd/dev/i386/ |
H A D | dtrace_isa.c | 368 * and back the pc up to the caller, which is stored at the 665 uintptr_t caller = CPU->cpu_dtrace_caller; local 705 if (--aframes == 0 && caller != 0) { 708 * and we have a valid caller -- fill it in 712 pcstack[depth++] = (pc_t)caller; 713 caller = 0;
|
/xnu-2782.1.97/osfmk/i386/AT386/ |
H A D | model_dep.c | 147 uintptr_t caller; member in struct:_cframe_t 1085 kdb_printf("%p : 0x%lx ", frame, frame->caller); 1087 raddrs[frame_index] = frame->caller; 1102 panic_print_symbol_name((vm_address_t)frame->caller);
|
/xnu-2782.1.97/bsd/netinet/ |
H A D | tcp_usrreq.c | 888 * generally are caller-frees. 1609 proc_t caller = PROC_NULL; local 1614 if ((caller = proc_self()) != PROC_NULL) { 1616 strlcpy(command_name, caller->p_comm, sizeof(command_name)); 1619 if ((caller_parent = proc_find(caller->p_ppid)) != PROC_NULL) { 1642 if (caller != PROC_NULL) 1643 proc_rele(caller);
|
H A D | tcp_input.c | 5509 proc_t caller = PROC_NULL; variable 5514 if ((caller = proc_self()) != PROC_NULL) { 5516 strlcpy(command_name, caller->p_comm, sizeof(command_name)); 5519 if ((caller_parent = proc_find(caller->p_ppid)) != PROC_NULL) { 5541 if (caller != PROC_NULL) 5542 proc_rele(caller); variable
|
/xnu-2782.1.97/osfmk/kdp/ml/x86_64/ |
H A D | kdp_machdep.c | 359 unsigned caller; member in struct:_cframe_t
|
/xnu-2782.1.97/iokit/Kernel/ |
H A D | IOPlatformExpert.cpp | 1003 void IOPlatformExpert::registerNVRAMController(IONVRAMController * caller)
|
/xnu-2782.1.97/bsd/dev/dtrace/ |
H A D | dtrace.c | 900 * region. The caller of dtrace_canstore() is responsible for performing any 2534 * incremented -- it is up to the caller to take appropriate action. 3164 pc_t caller[2]; local 3166 dtrace_getpcstack(caller, 2, aframes, 3168 mstate->dtms_caller = caller[1]; 3176 pc_t caller; local 3178 dtrace_getpcstack(&caller, 1, aframes, NULL); 3179 mstate->dtms_caller = caller; 3197 * uint64_t will contain the caller, which is what 5935 * args[2-4] established by caller [all...] |