Searched refs:session (Results 1 - 23 of 23) sorted by relevance

/xnu-2782.1.97/bsd/sys/
H A Dtprintf.h72 typedef struct session *tpr_t;
H A Dproc_internal.h120 * One structure allocated per session.
122 struct session { struct
123 int s_count; /* Ref cnt; pgrps in session. (LL) */
132 LIST_ENTRY(session) s_hash; /* Hash chain.(LL) */
133 lck_mtx_t s_mlock; /* mutex lock to protect session */
137 #define SESSION_NULL (struct session *)0
141 * note that s_ttyp is not a reference in the session structre, so it can
142 * become invalid out from under the session if the device is closed, without
168 struct session * pg_session; /* Pointer to session
[all...]
H A Dproc.h87 struct session;
H A Dtty.h129 struct session *t_session; /* Enclosing session. */
H A Dsysctl.h678 #define KERN_PROC_SESSION 3 /* by session of pid */
717 struct session *e_sess; /* session pointer */
726 struct session *e_tsess; /* tty session pointer */
735 #define EPROC_SLEADER 0x02 /* session leader */
789 user32_addr_t e_sess; /* session pointer */
798 user32_addr_t e_tsess; /* tty session pointer */
818 user_addr_t e_sess; /* session pointer */
827 user64_addr_t e_tsess __attribute((aligned(8))); /* tty session pointe
[all...]
/xnu-2782.1.97/bsd/net/
H A Dnecp.c69 * Each session owns a list of session policies, each of which can
71 * session also has a priority level (such as High, Default, or Low)
73 * a session order value is assigned to the session, which will be used
74 * to sort kernel policies generated by the session. The session client
83 * Whenever a session send the Apply command, its policies are ingested
87 * 1. The session policy is parsed to create kernel policies at the socket
119 * by a session wit
561 struct necp_session *session = (struct necp_session *)unitinfo; local
744 necp_send_ctl_data(struct necp_session *session, u_int8_t *buffer, size_t buffer_size) argument
758 necp_send_success_response(struct necp_session *session, u_int8_t packet_type, u_int32_t message_id) argument
781 necp_send_error_response(struct necp_session *session, u_int8_t packet_type, u_int32_t message_id, u_int32_t error) argument
804 necp_send_policy_id_response(struct necp_session *session, u_int8_t packet_type, u_int32_t message_id, necp_policy_id policy_id) argument
830 struct necp_session *session = (struct necp_session *)unitinfo; local
962 necp_delete_session(struct necp_session *session) argument
1207 necp_handle_set_session_priority(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1258 necp_handle_lock_session_to_proc(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1267 necp_handle_register_service(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1317 necp_handle_unregister_service(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1363 necp_handle_policy_add(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1513 necp_handle_policy_get(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1574 necp_handle_policy_delete(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1607 necp_handle_policy_apply_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1615 necp_handle_policy_list_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1658 necp_handle_policy_delete_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1689 necp_policy_create(struct necp_session *session, necp_policy_order order, u_int8_t *conditions_array, size_t conditions_array_size, u_int8_t *result, size_t result_size) argument
1726 necp_policy_find(struct necp_session *session, necp_policy_id policy_id) argument
1772 necp_policy_mark_for_deletion(struct necp_session *session, struct necp_session_policy *policy) argument
1788 necp_policy_mark_all_for_deletion(struct necp_session *session) argument
1801 necp_policy_delete(struct necp_session *session, struct necp_session_policy *policy) argument
1898 necp_policy_apply(struct necp_session *session, struct necp_session_policy *policy) argument
2354 necp_policy_apply_all(struct necp_session *session) argument
[all...]
/xnu-2782.1.97/bsd/kern/
H A Dsubr_prf.c164 struct session *sessp;
186 struct session * sessp;
203 session_rele((struct session *) sessp);
208 * with the given session.
215 struct session *sess = (struct session *)tpr;
H A Dtty_tty.c92 struct session *sessp;
138 * get called is when the session leader , whose controlling
204 struct session *sessp;
260 struct session *sessp;
H A Dkern_proc.c195 struct session * mysession;
1084 struct session *
1087 struct session *sess;
1144 * Move p to a new or existing process group (and session)
1154 struct session * procsp;
1164 panic("enterpgrp: session leader attempted setpgrp");
1192 struct session *sess;
1195 * new session
1197 MALLOC_ZONE(sess, struct session *,
1198 sizeof(struct session), M_SESSIO
[all...]
H A Dkern_acct.c249 struct session * sessp;
H A Dkern_prot.c236 * process is not in the same session as the calling process,
265 * Description: Get an arbitary pid's session leaders process group ID
273 * process is not in the same session as the calling process,
283 struct session * sessp;
509 * Description: Create a new session and set the process group ID to the
510 * session ID
520 * session, a new process group, and put the caller in the
521 * process group (as the sole member) and make it the session
522 * leader (as the sole process in the session).
563 * session a
[all...]
H A Dtty.c149 static int isctty_sp(proc_t p, struct tty *tp, struct session *sessp);
346 struct session *sessp, *oldsess;
365 * tty, if the tty does not already have a session associated with it.
367 if (SESS_LEADER(p, sessp) && /* the process is the session leader */
430 struct session * oldsessp;
458 /* drop the reference on prev session and pgrp */
1056 * ttcompat:ENOTTY TIOCGSID, if no session or session
1080 struct session *sessp, *oldsessp;
1296 * is to exit from the session leade
[all...]
H A Dbsd_init.c208 struct session session0;
H A Dkern_malloc.c147 "session", /* 18 M_SESSION */
355 { SOS(session), KMZ_CREATEZONE, FALSE }, /* 18 M_SESSION */
H A Dkern_exit.c481 struct session *sessp;
1836 struct session *sessp;
H A Dkern_fork.c1080 /* Update the audit session proc count */
1123 struct session *sessp;
1248 /* update audit session proc count */
H A Dkern_sig.c294 struct session * p_sessp = SESSION_NULL;
295 struct session * q_sessp = SESSION_NULL;
321 return (1); /* SIGCONT in session */
H A Dkern_sysctl.c900 struct session *sessp;
960 struct session *sessp;
H A Dproc_info.c547 struct session *sessionp = NULL;
/xnu-2782.1.97/bsd/security/audit/
H A Daudit_session.c71 auditinfo_addr_t se_auinfo; /* Public audit session data. */
79 long se_procnt; /* Processes in session. */
174 MALLOC_DEFINE(M_AU_SESSION, "audit_session", "Audit session data");
182 * Audit session device.
375 SYSCTL_NODE(_audit, OID_AUTO, session, CTLFLAG_RW|CTLFLAG_LOCKED, 0, "Audit sessions");
378 "Audit session flags settable by superuser");
381 "Audit session flags clearable by superuser");
384 "Audit session flags settable by a session member");
387 "Audit session flag
[all...]
/xnu-2782.1.97/bsd/vfs/
H A Dvfs_vnops.c1364 struct session * sessp;
H A Dvfs_syscalls.c3288 struct session *sessp = SESSION_NULL;
3311 * but the open flags deny it, set a flag in the session to
3395 * clear the flag in the session structure that prevented the lower
3406 * want to set the vp of the tty into the session structure. We have
/xnu-2782.1.97/bsd/miscfs/specfs/
H A Dspec_vnops.c2134 struct session *sessp;
2141 * has a reference from the session structure.
2168 * of the session leader, the winner

Completed in 134 milliseconds