/vbox/src/VBox/Additions/common/VBoxGuestLib/ |
H A D | SysHlp.cpp | 58 uint32_t fAccess = RTMEM_PROT_READ | (fWriteAccess ? RTMEM_PROT_WRITE : 0); local 113 rc = RTR0MemObjLockUser(&MemObj, (RTR3PTR)pv, u32Size, fAccess, NIL_RTR0PROCESS); 115 rc = RTR0MemObjLockKernel(&MemObj, pv, u32Size, fAccess);
|
H A D | HGCMInternal.cpp | 289 uint32_t fAccess = pSrcParm->type == VMMDevHGCMParmType_LinAddr_In local 299 rc = RTR0MemObjLockKernel(&hObj, (void *)pSrcParm->u.Pointer.u.linearAddr, cb, fAccess); 319 rc = RTR0MemObjLockUser(&hObj, (RTR3PTR)pSrcParm->u.Pointer.u.linearAddr, cb, fAccess, NIL_RTR0PROCESS); 359 rc = RTR0MemObjLockKernel(&hObj, pvSmallBuf, cb, fAccess);
|
/vbox/src/VBox/HostDrivers/Support/testcase/ |
H A D | tstNtQueryStuff.cpp | 413 uint32_t fAccess = PROCESS_QUERY_INFORMATION; local 415 fAccess = RTStrToInt32(argv[2]); 417 g_hProcess = OpenProcess(fAccess, FALSE, idPid);
|
/vbox/src/VBox/HostDrivers/VBoxUSB/win/cmn/ |
H A D | VBoxDrvTool.cpp | 49 VBOXDRVTOOL_DECL(NTSTATUS) VBoxDrvToolRegOpenKeyU(OUT PHANDLE phKey, IN PUNICODE_STRING pName, IN ACCESS_MASK fAccess) argument 55 return ZwOpenKey(phKey, fAccess, &ObjAttr); 58 VBOXDRVTOOL_DECL(NTSTATUS) VBoxDrvToolRegOpenKey(OUT PHANDLE phKey, IN PWCHAR pName, IN ACCESS_MASK fAccess) argument 63 return VBoxDrvToolRegOpenKeyU(phKey, &RtlStr, fAccess);
|
/vbox/src/VBox/Runtime/r0drv/haiku/ |
H A D | memobj-r0drv-haiku.c | 305 * @param fAccess The mapping protection to apply. 311 static int rtR0MemObjNativeLockInMap(PPRTR0MEMOBJINTERNAL ppMem, void *pvStart, size_t cb, uint32_t fAccess, argument 314 NOREF(fAccess); 318 LogFlowFunc(("ppMem=%p pvStart=%p cb=%u fAccess=%x R0Process=%d fFlags=%x\n", ppMem, pvStart, cb, fAccess, R0Process, 341 int rtR0MemObjNativeLockUser(PPRTR0MEMOBJINTERNAL ppMem, RTR3PTR R3Ptr, size_t cb, uint32_t fAccess, RTR0PROCESS R0Process) argument 343 return rtR0MemObjNativeLockInMap(ppMem, (void *)R3Ptr, cb, fAccess, R0Process, B_READ_DEVICE); 347 int rtR0MemObjNativeLockKernel(PPRTR0MEMOBJINTERNAL ppMem, void *pv, size_t cb, uint32_t fAccess) argument 349 return rtR0MemObjNativeLockInMap(ppMem, pv, cb, fAccess, NIL_RTR0PROCESS, B_READ_DEVICE);
|
/vbox/src/VBox/Runtime/r0drv/ |
H A D | memobj-r0drv.cpp | 469 uint32_t fAccess, RTR0PROCESS R0Process, const char *pszTag) 480 AssertReturn(!(fAccess & ~(RTMEM_PROT_READ | RTMEM_PROT_WRITE)), VERR_INVALID_PARAMETER); 481 AssertReturn(fAccess, VERR_INVALID_PARAMETER); 485 return rtR0MemObjNativeLockUser(pMemObj, R3PtrAligned, cbAligned, fAccess, R0Process); 490 RTR0DECL(int) RTR0MemObjLockKernelTag(PRTR0MEMOBJ pMemObj, void *pv, size_t cb, uint32_t fAccess, const char *pszTag) argument 500 AssertReturn(!(fAccess & ~(RTMEM_PROT_READ | RTMEM_PROT_WRITE)), VERR_INVALID_PARAMETER); 501 AssertReturn(fAccess, VERR_INVALID_PARAMETER); 505 return rtR0MemObjNativeLockKernel(pMemObj, pvAligned, cbAligned, fAccess); 468 RTR0MemObjLockUserTag(PRTR0MEMOBJ pMemObj, RTR3PTR R3Ptr, size_t cb, uint32_t fAccess, RTR0PROCESS R0Process, const char *pszTag) argument
|
/vbox/src/VBox/Runtime/r0drv/nt/ |
H A D | memobj-r0drv-nt.cpp | 532 * @param fAccess The desired access, a combination of RTMEM_PROT_READ 536 static int rtR0MemObjNtLock(PPRTR0MEMOBJINTERNAL ppMem, void *pv, size_t cb, uint32_t fAccess, RTR0PROCESS R0Process) argument 581 fAccess == RTMEM_PROT_READ 583 : fAccess == RTMEM_PROT_WRITE 601 fAccess & RTMEM_PROT_WRITE 643 DECLHIDDEN(int) rtR0MemObjNativeLockUser(PPRTR0MEMOBJINTERNAL ppMem, RTR3PTR R3Ptr, size_t cb, uint32_t fAccess, argument 648 return rtR0MemObjNtLock(ppMem, (void *)R3Ptr, cb, fAccess, R0Process); 652 DECLHIDDEN(int) rtR0MemObjNativeLockKernel(PPRTR0MEMOBJINTERNAL ppMem, void *pv, size_t cb, uint32_t fAccess) argument 654 return rtR0MemObjNtLock(ppMem, pv, cb, fAccess, NIL_RTR0PROCESS);
|
/vbox/src/VBox/Runtime/r0drv/os2/ |
H A D | memobj-r0drv-os2.cpp | 252 DECLHIDDEN(int) rtR0MemObjNativeLockUser(PPRTR0MEMOBJINTERNAL ppMem, RTR3PTR R3Ptr, size_t cb, uint32_t fAccess, argument 265 int rc = KernVMLock(VMDHL_LONG | (fAccess & RTMEM_PROT_WRITE ? VMDHL_WRITE : 0), 281 DECLHIDDEN(int) rtR0MemObjNativeLockKernel(PPRTR0MEMOBJINTERNAL ppMem, void *pv, size_t cb, uint32_t fAccess) argument 291 int rc = KernVMLock(VMDHL_LONG | (fAccess & RTMEM_PROT_WRITE ? VMDHL_WRITE : 0),
|
/vbox/src/VBox/Runtime/r0drv/freebsd/ |
H A D | memobj-r0drv-freebsd.c | 511 vm_offset_t AddrStart, size_t cb, uint32_t fAccess, 515 NOREF(fAccess); 541 DECLHIDDEN(int) rtR0MemObjNativeLockUser(PPRTR0MEMOBJINTERNAL ppMem, RTR3PTR R3Ptr, size_t cb, uint32_t fAccess, RTR0PROCESS R0Process) argument 547 fAccess, 553 DECLHIDDEN(int) rtR0MemObjNativeLockKernel(PPRTR0MEMOBJINTERNAL ppMem, void *pv, size_t cb, uint32_t fAccess) argument 559 fAccess, 510 rtR0MemObjNativeLockInMap(PPRTR0MEMOBJINTERNAL ppMem, vm_map_t pVmMap, vm_offset_t AddrStart, size_t cb, uint32_t fAccess, RTR0PROCESS R0Process, int fFlags) argument
|
/vbox/src/VBox/Runtime/r3/posix/ |
H A D | fileio-posix.cpp | 344 RTR3DECL(int) RTFileOpenBitBucket(PRTFILE phFile, uint64_t fAccess) argument 346 AssertReturn( fAccess == RTFILE_O_READ 347 || fAccess == RTFILE_O_WRITE 348 || fAccess == RTFILE_O_READWRITE, 350 return RTFileOpen(phFile, "/dev/null", fAccess | RTFILE_O_DENY_NONE | RTFILE_O_OPEN);
|
/vbox/src/VBox/Runtime/r0drv/darwin/ |
H A D | memobj-r0drv-darwin.cpp | 750 * @param fAccess The desired access, a combination of RTMEM_PROT_READ 754 static int rtR0MemObjNativeLock(PPRTR0MEMOBJINTERNAL ppMem, void *pv, size_t cb, uint32_t fAccess, task_t Task) argument 756 NOREF(fAccess); 824 DECLHIDDEN(int) rtR0MemObjNativeLockUser(PPRTR0MEMOBJINTERNAL ppMem, RTR3PTR R3Ptr, size_t cb, uint32_t fAccess, RTR0PROCESS R0Process) argument 826 return rtR0MemObjNativeLock(ppMem, (void *)R3Ptr, cb, fAccess, (task_t)R0Process); 830 DECLHIDDEN(int) rtR0MemObjNativeLockKernel(PPRTR0MEMOBJINTERNAL ppMem, void *pv, size_t cb, uint32_t fAccess) argument 832 return rtR0MemObjNativeLock(ppMem, pv, cb, fAccess, kernel_task);
|
/vbox/src/VBox/Runtime/r0drv/linux/ |
H A D | memobj-r0drv-linux.c | 977 DECLHIDDEN(int) rtR0MemObjNativeLockUser(PPRTR0MEMOBJINTERNAL ppMem, RTR3PTR R3Ptr, size_t cb, uint32_t fAccess, RTR0PROCESS R0Process) argument 984 int const fWrite = fAccess & RTMEM_PROT_WRITE ? 1 : 0; 1074 DECLHIDDEN(int) rtR0MemObjNativeLockKernel(PPRTR0MEMOBJINTERNAL ppMem, void *pv, size_t cb, uint32_t fAccess) argument 1083 NOREF(fAccess);
|
/vbox/src/VBox/Runtime/r0drv/solaris/ |
H A D | memobj-r0drv-solaris.c | 66 int fAccess; member in struct:RTR0MEMOBJSOL 515 * @param fAccess Page access rights (S_READ, S_WRITE, S_EXEC) 622 rtR0MemObjSolUnlock(pMemSolaris->Core.pv, pMemSolaris->Core.cb, pMemSolaris->fAccess); 845 DECLHIDDEN(int) rtR0MemObjNativeLockUser(PPRTR0MEMOBJINTERNAL ppMem, RTR3PTR R3Ptr, size_t cb, uint32_t fAccess, argument 849 NOREF(fAccess); 858 if (fAccess & RTMEM_PROT_WRITE) 860 if (fAccess & RTMEM_PROT_EXEC) 873 pMemSolaris->fAccess = fPageAccess; 879 DECLHIDDEN(int) rtR0MemObjNativeLockKernel(PPRTR0MEMOBJINTERNAL ppMem, void *pv, size_t cb, uint32_t fAccess) argument 881 NOREF(fAccess); [all...] |
/vbox/src/VBox/Runtime/r3/win/ |
H A D | fileio-win.cpp | 334 RTR3DECL(int) RTFileOpenBitBucket(PRTFILE phFile, uint64_t fAccess) argument 336 AssertReturn( fAccess == RTFILE_O_READ 337 || fAccess == RTFILE_O_WRITE 338 || fAccess == RTFILE_O_READWRITE, 340 return RTFileOpen(phFile, "NUL", fAccess | RTFILE_O_DENY_NONE | RTFILE_O_OPEN);
|
/vbox/src/VBox/Additions/common/VBoxGuest/ |
H A D | VBoxGuest-haiku-stubs.c | 197 RTR0DECL(int) RTR0MemObjLockKernelTag(PRTR0MEMOBJ pMemObj, void *pv, size_t cb, uint32_t fAccess, const char *pszTag) argument 199 return g_VBoxGuest->_RTR0MemObjLockKernelTag(pMemObj, pv, cb, fAccess, pszTag); 201 RTR0DECL(int) RTR0MemObjLockUserTag(PRTR0MEMOBJ pMemObj, RTR3PTR R3Ptr, size_t cb, uint32_t fAccess, RTR0PROCESS R0Process, const char *pszTag) argument 203 return g_VBoxGuest->_RTR0MemObjLockUserTag(pMemObj, R3Ptr, cb, fAccess, R0Process, pszTag);
|
/vbox/src/VBox/VMM/VMMAll/ |
H A D | IEMAllInstructions.cpp.h | 62 uint32_t const fAccess = pImpl->pfnLockedU8 ? IEM_ACCESS_DATA_RW : IEM_ACCESS_DATA_R; /* CMP,TEST */ local 70 IEM_MC_MEM_MAP(pu8Dst, fAccess, pIemCpu->iEffSeg, GCPtrEffDst, 0 /*arg*/); 78 IEM_MC_MEM_COMMIT_AND_UNMAP(pu8Dst, fAccess); 161 uint32_t const fAccess = pImpl->pfnLockedU8 ? IEM_ACCESS_DATA_RW : IEM_ACCESS_DATA_R /* CMP,TEST */; local 172 IEM_MC_MEM_MAP(pu16Dst, fAccess, pIemCpu->iEffSeg, GCPtrEffDst, 0 /*arg*/); 180 IEM_MC_MEM_COMMIT_AND_UNMAP(pu16Dst, fAccess); 194 IEM_MC_MEM_MAP(pu32Dst, fAccess, pIemCpu->iEffSeg, GCPtrEffDst, 0 /*arg*/); 202 IEM_MC_MEM_COMMIT_AND_UNMAP(pu32Dst, fAccess); 216 IEM_MC_MEM_MAP(pu64Dst, fAccess, pIemCpu->iEffSeg, GCPtrEffDst, 0 /*arg*/); 224 IEM_MC_MEM_COMMIT_AND_UNMAP(pu64Dst, fAccess); 4462 uint32_t fAccess; local 5730 uint32_t fAccess; local 9153 uint32_t fAccess; local 9217 uint32_t fAccess; local 9272 uint32_t fAccess; local 9326 uint32_t fAccess; local 9441 uint32_t fAccess; local [all...] |
H A D | PGMAll.cpp | 552 * @param fAccess Access type (r/w, user/supervisor (X86_PTE_*)) 555 VMMDECL(int) PGMIsValidAccess(PVMCPU pVCpu, RTGCPTR Addr, uint32_t cbSize, uint32_t fAccess) argument 560 if (fAccess & ~(X86_PTE_US | X86_PTE_RW)) 562 AssertMsgFailed(("PGMIsValidAccess: invalid access type %08x\n", fAccess)); 580 bool fWrite = !!(fAccess & X86_PTE_RW); 581 bool fUser = !!(fAccess & X86_PTE_US); 591 return PGMIsValidAccess(pVCpu, Addr + PAGE_SIZE, (cbSize > PAGE_SIZE) ? cbSize - PAGE_SIZE : 1, fAccess); 605 * @param fAccess Access type (r/w, user/supervisor (X86_PTE_*)) 607 VMMDECL(int) PGMVerifyAccess(PVMCPU pVCpu, RTGCPTR Addr, uint32_t cbSize, uint32_t fAccess) argument 611 AssertMsg(!(fAccess [all...] |
H A D | IEMAll.cpp | 682 /*static VBOXSTRICTRC iemRaiseSelectorNotPresent(PIEMCPU pIemCpu, uint32_t iSegReg, uint32_t fAccess);*/ 690 static VBOXSTRICTRC iemRaiseSelectorBounds(PIEMCPU pIemCpu, uint32_t iSegReg, uint32_t fAccess); 692 static VBOXSTRICTRC iemRaiseSelectorInvalidAccess(PIEMCPU pIemCpu, uint32_t iSegReg, uint32_t fAccess); 693 static VBOXSTRICTRC iemRaisePageFault(PIEMCPU pIemCpu, RTGCPTR GCPtrWhere, uint32_t fAccess, int rc); 695 static VBOXSTRICTRC iemMemMap(PIEMCPU pIemCpu, void **ppvMem, size_t cbMem, uint8_t iSegReg, RTGCPTR GCPtrMem, uint32_t fAccess); 696 static VBOXSTRICTRC iemMemCommitAndUnmap(PIEMCPU pIemCpu, void *pvMem, uint32_t fAccess); 4107 DECL_NO_INLINE(static, VBOXSTRICTRC) iemRaiseSelectorBounds(PIEMCPU pIemCpu, uint32_t iSegReg, uint32_t fAccess) argument 4109 NOREF(iSegReg); NOREF(fAccess); 4124 DECL_NO_INLINE(static, VBOXSTRICTRC) iemRaiseSelectorInvalidAccess(PIEMCPU pIemCpu, uint32_t iSegReg, uint32_t fAccess) argument 4126 NOREF(iSegReg); NOREF(fAccess); 4132 iemRaisePageFault(PIEMCPU pIemCpu, RTGCPTR GCPtrWhere, uint32_t fAccess, int rc) argument 6026 iemMemUpdateWrittenCounter(PIEMCPU pIemCpu, uint32_t fAccess, size_t cbMem) argument 6111 iemMemApplySegment(PIEMCPU pIemCpu, uint32_t fAccess, uint8_t iSegReg, size_t cbMem, PRTGCPTR pGCPtrMem) argument 6206 iemMemPageTranslateAndCheckAccess(PIEMCPU pIemCpu, RTGCPTR GCPtrMem, uint32_t fAccess, PRTGCPHYS pGCPhysMem) argument 6288 iemMemPageMap(PIEMCPU pIemCpu, RTGCPHYS GCPhysMem, uint32_t fAccess, void **ppvMem, PPGMPAGEMAPLOCK pLock) argument 6342 iemMemPageUnmap(PIEMCPU pIemCpu, RTGCPHYS GCPhysMem, uint32_t fAccess, const void *pvMem, PPGMPAGEMAPLOCK pLock) argument 6360 iemMapLookup(PIEMCPU pIemCpu, void *pvMem, uint32_t fAccess) argument 6527 iemMemBounceBufferMapCrossPage(PIEMCPU pIemCpu, int iMemMap, void **ppvMem, size_t cbMem, RTGCPTR GCPtrFirst, uint32_t fAccess) argument 6669 iemMemBounceBufferMapPhys(PIEMCPU pIemCpu, unsigned iMemMap, void **ppvMem, size_t cbMem, RTGCPHYS GCPhysFirst, uint32_t fAccess, VBOXSTRICTRC rcMap) argument 6786 iemMemMap(PIEMCPU pIemCpu, void **ppvMem, size_t cbMem, uint8_t iSegReg, RTGCPTR GCPtrMem, uint32_t fAccess) argument 6845 iemMemCommitAndUnmap(PIEMCPU pIemCpu, void *pvMem, uint32_t fAccess) argument 6883 uint32_t fAccess = pIemCpu->aMemMappings[iMemMap].fAccess; local [all...] |
/vbox/src/VBox/HostDrivers/Support/win/ |
H A D | SUPR3HardenedMain-win.cpp | 1051 ULONG fAccess = 0; local 1054 rcNt = supR3HardenedScreenImage(hFile, true /*fImage*/, false /*fIgnoreArch*/, &fAccess, &fProtect, 1177 "supR3HardenedScreenImage/%s: NtQueryObject -> %#x (fImage=%d fProtect=%#x fAccess=%#x)\n", 1241 "supR3HardenedScreenImage/%s: cached rc=%Rrc fImage=%d fProtect=%#x fAccess=%#x cHits=%u %ls\n", 1393 "supR3HardenedScreenImage/%s: Not a trusted location: '%ls' (fImage=%d fProtect=%#x fAccess=%#x)\n", 1431 "supR3HardenedScreenImage/%s: rc=%Rrc fImage=%d fProtect=%#x fAccess=%#x %ls: %s\n", 1488 ULONG fAccess = 0; local 1492 supR3HardenedScreenImage(hFile, false, false /*fIgnoreArch*/, &fAccess, &fProtect, &fCallRealApi, "preload", 1506 * @param fAccess The desired access. 1514 supR3HardenedMonitor_NtCreateSection(PHANDLE phSection, ACCESS_MASK fAccess, POBJECT_ATTRIBUTE argument 1865 ULONG fAccess = 0; local 2033 ULONG fAccess = 0; local [all...] |
/vbox/src/VBox/VMM/include/ |
H A D | IEMInternal.h | 335 uint32_t fAccess; member in struct:IEMCPU::__anon16917
|