Lines Matching refs:target

171 	printf("%s (map: %p) triggered DYLD shared region unnest for map: %p, region 0x%qx->0x%qx. While not abnormal for debuggers, this increases system memory footprint until the target exits.\n", current_proc()->p_comm, get_task_map(current_proc()->task), m, (uint64_t)s, (uint64_t)e);
454 * get the target process's task port. This is only
458 * - The target process's real, effective, and saved uids
460 * - The target process's group set is a subset of the
462 * - The target process hasn't switched credentials.
468 task_for_pid_posix_check(proc_t target)
475 if (target->p_stat == SZOMB) {
487 if (target == current_proc())
498 targetcred = kauth_cred_proc_ref(target);
501 /* Do target's ruid, euid, and saved uid match my euid? */
509 /* Are target's groups a subset of my groups? */
516 /* Has target switched credentials? */
517 if (target->p_flag & P_SUGID) {
589 /* If we aren't root and target's task access port is set... */
731 task_t target = NULL;
760 target = targetproc->task;
762 if (target != TASK_NULL) {
765 /* If we aren't root and target's task access port is set... */
768 (task_get_task_access_port(target, &tfpport) == 0) &&
790 task_reference(target);
791 error = task_pidsuspend(target);
805 task_deallocate(target);
817 task_t target = NULL;
846 target = targetproc->task;
848 if (target != TASK_NULL) {
851 /* If we aren't root and target's task access port is set... */
854 (task_get_task_access_port(target, &tfpport) == 0) &&
876 task_reference(target);
882 error = task_pidresume(target);
891 task_deallocate(target);
1564 reclaimed. It allows the app to calculate how much memory is free outside the free target. */
1567 &vm_page_free_target, 0, "Pageout daemon free target");