| /xnu-8019.80.24/bsd/kern/ |
| H A D | kern_overrides.c | 157 proc_getpid(current_proc()), 0, 0, 0, 0); in system_override_callouts() 160 proc_getpid(current_proc()), 0, 0, 0, 0); in system_override_callouts() 168 proc_getpid(current_proc()), 0, 0, 0, 0); in system_override_callouts() 171 proc_getpid(current_proc()), 0, 0, 0, 0); in system_override_callouts() 179 proc_getpid(current_proc()), 0, 0, 0, 0); in system_override_callouts() 182 proc_getpid(current_proc()), 0, 0, 0, 0); in system_override_callouts()
|
| H A D | kern_memorystatus.c | 983 b, proc_getpid(p), in memorystatus_debug_dump_bucket_locked() 1663 __unused pid_t victim_pid = proc_getpid(p); in memorystatus_do_kill() 1686 …lling process %d [%s] in high band %s (%d) - memorystatus_available_pages: %llu\n", proc_getpid(p), in memorystatus_do_kill() 1863 MEMORYSTATUS_DEBUG(1, "memorystatus_perform_idle_demotion() found %d\n", proc_getpid(p)); in memorystatus_perform_idle_demotion() 1937 …proc_getpid(p), p->p_memstat_dirty, set_state, (memorystatus_scheduled_idle_demotions_sysprocs + m… in memorystatus_schedule_idle_demotion_locked() 1989 …proc_getpid(p), clear_state, (memorystatus_scheduled_idle_demotions_sysprocs + memorystatus_schedu… in memorystatus_invalidate_idle_demotion_locked() 2060 …MEMORYSTATUS_DEBUG(1, "memorystatus_list_add(): adding pid %d with priority %d.\n", proc_getpid(p)… in memorystatus_add() 2152 (*p->p_name ? p->p_name : "unknown"), proc_getpid(p), priority, head_insert ? "head" : "tail"); in memorystatus_update_priority_locked() 2317 proc_getpid(p), (p->p_memstat_memlimit > 0 ? p->p_memstat_memlimit : -1), in memorystatus_update_priority_locked() 2358 …KERNEL_DEBUG_CONSTANT(BSDDBG_CODE(DBG_BSD_MEMSTAT, BSD_MEMSTAT_CHANGE_PRIORITY), proc_getpid(p), p… in memorystatus_update_priority_locked() [all …]
|
| H A D | kern_shutdown.c | 526 sd_log(ctx, "%s[%d] had to be forced closed with exit1().\n", p->p_comm, proc_getpid(p)); in sd_callback3() 530 proc_getpid(p), 0, 1, 0, 0); in sd_callback3() 633 printf("%s[%d]: didn't act on SIGTERM\n", p->p_comm, proc_getpid(p)); in proc_shutdown() 634 sd_log(ctx, "%s[%d]: didn't act on SIGTERM\n", p->p_comm, proc_getpid(p)); in proc_shutdown() 693 printf("%s[%d]: didn't act on SIGKILL\n", p->p_comm, proc_getpid(p)); in proc_shutdown() 694 sd_log(ctx, "%s[%d]: didn't act on SIGKILL\n", p->p_comm, proc_getpid(p)); in proc_shutdown()
|
| H A D | kern_exit.c | 505 pid_t pid = proc_getpid(p); in populate_corpse_crashinfo() 845 if (req->newptr != 0 && (proc_getpid(req->p) != 1 || initproc_spawned != 0)) { in sysctl_initproc_spawned() 973 proc_getpid(p), reason_namespace, in abort_with_payload_internal() 1090 __FUNCTION__, p->p_comm, proc_getpid(p), rv); in exit_with_reason() 1176 proc_getpid(p), exit_reason->osr_namespace, in exit_with_reason() 1211 …cess[%d] tried to exit while being frozen. Blocking exit until freeze completes.", proc_getpid(p)); in proc_memorystatus_remove() 1331 "Text page corruption detected in dying process %d\n", proc_getpid(p)); in proc_prepareexit() 1339 (void)sys_perf_notify(self, proc_getpid(p)); in proc_prepareexit() 1348 printf("Process[%d] has no vm space for corpse info.\n", proc_getpid(p)); in proc_prepareexit() 1350 …intf("Process[%d] was destined to be corpse. But corpse is disabled by config.\n", proc_getpid(p)); in proc_prepareexit() [all …]
|
| H A D | kern_prot.c | 157 *retval = proc_getpid(p); in getpid() 488 if (p->p_pgrpid == proc_getpid(p) || in setsid_internal() 489 (pg = pgrp_find(proc_getpid(p)))) { in setsid_internal() 495 (void)enterpgrp(p, proc_getpid(p), 1); in setsid_internal() 527 *retval = proc_getpid(p); in setsid() 582 if (uap->pid != 0 && uap->pid != proc_getpid(curp)) { in setpgid() 615 uap->pgid = proc_getpid(targp); in setpgid() 616 } else if (uap->pgid != proc_getpid(targp)) { in setpgid() 1714 audit_token->val[5] = proc_getpid(p); in proc_calc_audit_token()
|
| H A D | mach_process.c | 143 proc_getpid(p), W_EXITCODE(ENOTSUP, 0), 4, 0, 0); in ptrace() 198 if (p->p_ppid != proc_getpid(pproc)) { in ptrace() 517 if (proc_getpid(traced_procp) == proc_getpid(cur_procp)) { in cantrace()
|
| H A D | kern_memorystatus_notify.c | 263 pid_t knote_pid = proc_getpid(knote_proc); in filt_memorystatus() 500 pid_t pid = proc_getpid(p); in memorystatus_warn_process() 516 pid_t knote_pid = proc_getpid(knote_proc); in memorystatus_warn_process() 744 …MEMORYSTATUS_DEBUG(1, "memorystatus_bg_pressure_eligible: pid %d, state 0x%x\n", proc_getpid(p), p… in memorystatus_bg_pressure_eligible() 1172 VM_PRESSURE_DEBUG(1, "[vm_pressure] skipping process %d\n", proc_getpid(p)); in vm_pressure_select_optimal_candidate_to_notify() 1269 …, "[vm_pressure] threshold failed for pid %d with %llu resident...\n", proc_getpid(p), resident_si… in vm_pressure_select_optimal_candidate_to_notify() 1276 …VM_DEBUG_CONSTANT_EVENT(vm_pressure_event, VM_PRESSURE_EVENT, DBG_FUNC_NONE, proc_getpid(knote_get… in vm_pressure_select_optimal_candidate_to_notify() 1277 …VM_PRESSURE_DEBUG(1, "[vm_pressure] sending event to pid %d with %llu resident\n", proc_getpid(kno… in vm_pressure_select_optimal_candidate_to_notify() 1586 target_pid = proc_getpid(target_proc); in memorystatus_update_vm_pressure() 1622 pid_t knote_pid = proc_getpid(knote_proc); in memorystatus_update_vm_pressure() [all …]
|
| H A D | sys_coalition.c | 437 pid = proc_getpid(req->p); 473 pid = proc_getpid(req->p); 510 pid = proc_getpid(req->p); 567 pid = proc_getpid(req->p); 574 pid = proc_getpid(req->p);
|
| H A D | kern_fork.c | 250 panic("The process table is full; parent pid=%d", proc_getpid(parent_proc)); in fork1() 275 …panic("The per-user process limit has been hit; parent pid=%d, uid=%d", proc_getpid(parent_proc), … in fork1() 346 AUDIT_ARG(pid, proc_getpid(child_proc)); in fork1() 359 thread_set_child(child_thread, proc_getpid(child_proc)); in fork1() 579 retval[0] = proc_getpid(child_proc); in fork() 597 proc_knote(parent_proc, NOTE_FORK | proc_getpid(child_proc)); in fork() 920 phash_remove_locked(proc_getpid(p), p); in forkproc_free()
|
| H A D | kern_proc.c | 334 if (proc_getpid(p) == 0) { in inferior() 364 if ((proc_getpid(p) == 0) || (p->p_pptr == start) || (nchecked >= nprocs)) { in isinferior() 976 proc_getpid(proc_t p) in proc_getpid() function 990 return proc_getpid(p); in proc_pid() 1029 return proc_getpid(current_proc()); in proc_selfpid() 2027 if (proc_getpid(p) == pid) { in pzfind() 2211 sess->s_sid = proc_getpid(leader); in session_alloc() 2301 child->p_ppid = proc_getpid(parent); in pinsertchild() 2302 child->p_original_ppid = proc_getpid(parent); in pinsertchild() 2347 pid_t savepid = proc_getpid(p); in enterpgrp() [all …]
|
| H A D | kern_cs.c | 208 proc_getpid(p)); in cs_allow_invalid() 215 proc_getpid(p)); in cs_allow_invalid() 229 printf("CODE SIGNING: cs_allow_invalid() not allowed by pmap: pid %d\n", proc_getpid(p)); in cs_allow_invalid() 257 vaddr, proc_getpid(p), p->p_comm); in cs_invalid_page() 300 vaddr, proc_getpid(p), p->p_comm, (unsigned int)proc_getcsflags(p), in cs_invalid_page() 781 printf("clearing platform binary on proc/task: pid = %d\n", proc_getpid(p)); in csproc_clear_platform_binary()
|
| H A D | kern_sig.c | 1670 if (target_pid != proc_getpid(cur_proc)) { in terminate_with_payload_internal() 1680 proc_getpid(target_proc), reason_namespace, in terminate_with_payload_internal() 1686 if (target_pid == proc_getpid(cur_proc)) { in terminate_with_payload_internal() 1719 return proc_getpid(p) > 1 && !(p->p_flag & P_SYSTEM) && in killpg1_allfilt() 1901 proc_getpid(p), OS_REASON_SIGNAL, signum, 0, 0); in threadsignal() 2066 pid_t pid = proc_getpid(sender_proc); in build_signal_reason() 2359 uth->t_dtrace_siginfo.si_pid = proc_getpid(current_proc()); in psignal_internal() 2370 sig_proc->p_contproc = proc_getpid(current_proc()); in psignal_internal() 2404 sig_proc->si_pid = proc_getpid(current_proc()); in psignal_internal() 2451 pp->si_pid = proc_getpid(sig_proc); in psignal_internal() [all …]
|
| H A D | kern_memorystatus_freeze.c | 911 leader_pid = proc_getpid(leader_proc); in memorystatus_freezer_get_status() 924 list_entry->p_pid = proc_getpid(p); in memorystatus_freezer_get_status() 1100 frozen_procs->gfp_procs[frozen_procs->gfp_num_frozen].fp_pid = proc_getpid(p); in memorystatus_freezer_get_procs() 1269 …ipping kill of frozen process %s (%d) because it's already exiting.\n", p->p_name, proc_getpid(p)); in kill_all_frozen_processes() 1276 pid = proc_getpid(p); in kill_all_frozen_processes() 1829 pid_t aPid = proc_getpid(p); in memorystatus_freeze_process() 1953 …ret = memorystatus_update_inactive_jetsam_priority_band(proc_getpid(p), MEMORYSTATUS_CMD_ELEVATED_… in memorystatus_freeze_process() 2133 entry->pid = proc_getpid(p); in memorystatus_freezer_candidate_list_get_proc() 2419 …(urgent_mode ? "urgent" : "normal"), (p ? proc_getpid(p) : -1), ((p && *p->p_name) ? p->p_name : "… in memorystatus_demote_frozen_process() 3126 if (proc_getpid(p) != pid) { in memorystatus_get_process_is_frozen() [all …]
|
| H A D | kern_exec.c | 1168 proc_getpid(p), OS_REASON_EXEC, EXEC_EXIT_REASON_BAD_MACHO, 0, 0); in exec_mach_imgact() 1396 proc_getpid(p), OS_REASON_EXEC, EXEC_EXIT_REASON_SUGID_FAILURE, 0, 0); in exec_mach_imgact() 1426 proc_getpid(p), OS_REASON_EXEC, EXEC_EXIT_REASON_ACTV_THREADSTATE, 0, 0); in exec_mach_imgact() 1456 proc_getpid(p), OS_REASON_EXEC, EXEC_EXIT_REASON_STACK_ALLOC, 0, 0); in exec_mach_imgact() 1475 printf("setting platform binary on task: pid = %d\n", proc_getpid(p)); in exec_mach_imgact() 1485 printf("clearing platform binary on task: pid = %d\n", proc_getpid(p)); in exec_mach_imgact() 1510 proc_getpid(p), OS_REASON_EXEC, EXEC_EXIT_REASON_APPLE_STRING_INIT, 0, 0); in exec_mach_imgact() 1536 proc_getpid(p), OS_REASON_EXEC, EXEC_EXIT_REASON_COPYOUT_STRINGS, 0, 0); in exec_mach_imgact() 1561 proc_getpid(p), OS_REASON_EXEC, EXEC_EXIT_REASON_COPYOUT_DYNLINKER, 0, 0); in exec_mach_imgact() 1661 KERNEL_DEBUG_CONSTANT_IST1(TRACE_DATA_EXEC, proc_getpid(p), fsid, fileid, 0, in exec_mach_imgact() [all …]
|
| H A D | ubc_subr.c | 3967 printf("check_signature[pid: %d], error = %d\n", proc_getpid(current_proc()), error); in ubc_cs_blob_add() 3973 printf("check_signature[pid: %d], is not apple signed\n", proc_getpid(current_proc())); in ubc_cs_blob_add() 4000 printf("check_signature[pid: %d]: platform binary\n", proc_getpid(current_proc())); in ubc_cs_blob_add() 4010 …printf("check_signature[pid: %d]: team-id is %s\n", proc_getpid(current_proc()), tmp_blob.csb_team… in ubc_cs_blob_add() 4012 printf("check_signature[pid: %d]: no team-id\n", proc_getpid(current_proc())); in ubc_cs_blob_add() 4172 proc_getpid(p), p->p_comm, in ubc_cs_blob_add() 4196 printf("check_signature[pid: %d]: error = %d\n", proc_getpid(current_proc()), error); in ubc_cs_blob_add() 4274 proc_getpid(p), p->p_comm, iname); in ubc_cs_blob_add_supplement() 4301 proc_getpid(p), p->p_comm, iname); in ubc_cs_blob_add_supplement() 4328 … printf("check_supplemental_signature[pid: %d], error = %d\n", proc_getpid(current_proc()), error); in ubc_cs_blob_add_supplement() [all …]
|
| H A D | sys_ulock.c | 547 key.ulk_pid = proc_getpid(p); in ulock_wait2() 628 …if (((ull_simulate_copyin_fault == proc_getpid(p)) || (ull_simulate_copyin_fault == 1)) && (copy_r… in ulock_wait2() 855 *retval = ull_hash_dump(proc_getpid(p)); in ulock_wake() 924 key.ulk_pid = proc_getpid(p); in ulock_wake()
|
| H A D | kern_sfi.c | 167 pid_t pid = proc_getpid(p); in proc_apply_sfi_managed()
|
| H A D | kern_core.c | 310 proc_getpid(core_proc), alloced_name, MAXPATHLEN)) { in coredump() 312 "/cores/core.%d", proc_getpid(core_proc)); in coredump()
|
| H A D | tty.c | 2930 pickpid = proc_getpid(p); in ttyinfo_locked() 2932 pickpid = proc_getpid(pick); in ttyinfo_locked() 2980 proc_getpid(pick), in ttyinfo_locked() 3042 return proc_getpid(p2) > proc_getpid(p1); /* tie - return highest pid */ in proc_compare() 3053 return proc_getpid(p2) > proc_getpid(p1); /* tie - return highest pid */ in proc_compare() 3067 return proc_getpid(p2) > proc_getpid(p1); /* tie - return highest pid */ in proc_compare()
|
| /xnu-8019.80.24/bsd/vm/ |
| H A D | vm_unix.c | 357 current_proc()->p_comm, proc_getpid(current_proc()), vaddr, prot_values[prot & VM_PROT_ALL]); in log_stack_execution_failure() 461 …m memory footprint until the target exits.\n", current_proc()->p_comm, proc_getpid(current_proc())… in log_unnest_badness() 1830 if (proc_getpid(p) == pid || so->last_pid == pid || in networking_defunct_callout() 1840 if (proc_getpid(p) == pid) { in networking_defunct_callout() 1849 if (proc_getpid(p) == pid) { in networking_defunct_callout() 1870 ASSERT(proc_getpid(p) == pid); in networking_defunct_callout() 1876 ASSERT(proc_getpid(p) == pid); in networking_defunct_callout() 2031 proc_getpid(p), p->p_comm, in shared_region_check_np() 2071 proc_getpid(p), p->p_comm, in shared_region_check_np() 2086 proc_getpid(p), p->p_comm, in shared_region_check_np() [all …]
|
| /xnu-8019.80.24/bsd/dev/arm/ |
| H A D | unix_signal.c | 326 …cess [%s][%d] sendsig_get_state64 failed with ret %d, expected 0", p->p_comm, proc_getpid(p), ret); in sendsig() 337 …cess [%s][%d] sendsig_get_state32 failed with ret %d, expected 0", p->p_comm, proc_getpid(p), ret); in sendsig() 579 …p, size) = (0x%llx, %zu) failed with ret %d, expected 0\n", p->p_comm, proc_getpid(p), sp, sizeof(… in sendsig() 588 …[%s][%d] sendsig_set_thread_state64 failed with kr %d, expected 0", p->p_comm, proc_getpid(p), kr); in sendsig() 849 p->p_comm, proc_getpid(p), (user64_addr_t)uap->token, token); in sigreturn() 859 p->p_comm, proc_getpid(p), error); in sigreturn() 872 p->p_comm, proc_getpid(p), (user32_addr_t)uap->token, token); in sigreturn() 882 p->p_comm, proc_getpid(p), error); in sigreturn()
|
| /xnu-8019.80.24/bsd/dev/dtrace/ |
| H A D | dtrace_subr.c | 159 ASSERT(proc_getpid(p) != -1); in dtrace_proc_exec_notification() 189 entry->pdesc->p_pid = proc_getpid(p); in dtrace_proc_exec_notification()
|
| H A D | fasttrap.c | 467 s->fttps_pid = proc_getpid(p); in fasttrap_tracepoint_retire() 624 pid_t ppid = proc_getpid(p); in fasttrap_fork() 646 if (cp != sprlock(proc_getpid(cp))) { in fasttrap_fork() 647 printf("fasttrap_fork: sprlock(%d) returned a different proc\n", proc_getpid(cp)); in fasttrap_fork() 1592 pid_t pid = proc_getpid(p); in fasttrap_provider_lookup() 1652 new_fp->ftp_pid = proc_getpid(p); in fasttrap_provider_lookup() 1774 bucket = &fasttrap_provs.fth_table[FASTTRAP_PROVS_INDEX(proc_getpid(p), name)]; in fasttrap_provider_retire() 1778 if (fp->ftp_pid == proc_getpid(p) && strncmp(fp->ftp_name, name, sizeof(fp->ftp_name)) == 0 && in fasttrap_provider_retire() 2139 "process %u", dhpv->dthpv_provname, (uint_t)proc_getpid(p)); in fasttrap_meta_provide()
|
| /xnu-8019.80.24/bsd/pthread/ |
| H A D | workqueue_trace.h | 110 ({ KERNEL_DEBUG_CONSTANT(x, proc_getpid((wq)->wq_proc), b, c, d, 0); })
|
| /xnu-8019.80.24/bsd/dev/i386/ |
| H A D | unix_signal.c | 854 p->p_comm, proc_getpid(p), (user64_addr_t)uap->token, token); in sigreturn() 888 p->p_comm, proc_getpid(p), (user32_addr_t)uap->token, token); in sigreturn() 918 p->p_comm, proc_getpid(p), rval); in sigreturn() 929 p->p_comm, proc_getpid(p), rval); in sigreturn()
|