Lines Matching defs:target

171 	printf("%s (map: %p) triggered DYLD shared region unnest for map: %p, region 0x%qx->0x%qx. While not abnormal for debuggers, this increases system memory footprint until the target exits.\n", current_proc()->p_comm, get_task_map(current_proc()->task), m, (uint64_t)s, (uint64_t)e);
474 * get the target process's task port. This is only
478 * - The target process's real, effective, and saved uids
480 * - The target process's group set is a subset of the
482 * - The target process hasn't switched credentials.
488 task_for_pid_posix_check(proc_t target)
495 if (target->p_stat == SZOMB) {
507 if (target == current_proc())
518 targetcred = kauth_cred_proc_ref(target);
521 /* Do target's ruid, euid, and saved uid match my euid? */
529 /* Are target's groups a subset of my groups? */
536 /* Has target switched credentials? */
537 if (target->p_flag & P_SUGID) {
609 /* If we aren't root and target's task access port is set... */
751 task_t target = NULL;
780 target = targetproc->task;
781 if (target != TASK_NULL) {
784 /* If we aren't root and target's task access port is set... */
787 (task_get_task_access_port(target, &tfpport) == 0) &&
808 task_reference(target);
809 error = task_pidsuspend(target);
823 task_deallocate(target);
835 task_t target = NULL;
864 target = targetproc->task;
865 if (target != TASK_NULL) {
868 /* If we aren't root and target's task access port is set... */
871 (task_get_task_access_port(target, &tfpport) == 0) &&
892 task_reference(target);
898 error = task_pidresume(target);
911 task_deallocate(target);
1417 reclaimed. It allows the app to calculate how much memory is free outside the free target. */
1420 &vm_page_free_target, 0, "Pageout daemon free target");