Lines Matching defs:pid
166 printf("Data/Stack execution not permitted: %s[pid %d] at virtual address 0x%qx, protections were %s\n",
463 * args->pid Process ID (returned value; see below)
468 * Implicit returns: args->pid Process ID
476 user_addr_t pid_addr = args->pid;
479 int pid = -1;
493 pid = proc_pid(p);
501 AUDIT_ARG(pid, pid);
502 (void) copyout((char *) &pid, pid_addr, sizeof(int));
614 * Note: if pid == 0, an error is return no matter who is calling.
623 int pid = args->pid;
633 AUDIT_ARG(pid, pid);
636 /* Always check if pid == 0 */
637 if (pid == 0) {
651 p = proc_find(pid);
679 error = __KERNEL_WAITING_ON_TASKGATED_CHECK_ACCESS_UPCALL__(tfpport, proc_selfpid(), kauth_getgid(), pid);
735 int pid = args->pid;
745 AUDIT_ARG(pid, pid);
755 p = proc_find(pid);
811 int pid = args->pid;
822 if (pid == 0) {
827 targetproc = proc_find(pid);
854 error = __KERNEL_WAITING_ON_TASKGATED_CHECK_ACCESS_UPCALL__(tfpport, proc_selfpid(), kauth_getgid(), pid);
895 int pid = args->pid;
906 if (pid == 0) {
911 targetproc = proc_find(pid);
938 error = __KERNEL_WAITING_ON_TASKGATED_CHECK_ACCESS_UPCALL__(tfpport, proc_selfpid(), kauth_getgid(), pid);