Home
last modified time | relevance | path

Searched refs:process_name (Results 1 – 4 of 4) sorted by relevance

/xnu-8019.80.24/bsd/security/audit/
H A Daudit_bsd.c477 audit_send_analytics(char* signing_id, char* process_name) in audit_send_analytics() argument
484 (void)audit_analytics(audit_port, signing_id, process_name); in audit_send_analytics()
H A Daudit_syscalls.c170 char process_name[MAXCOMLEN + 1] = {}; in audit() local
334 proc_name(proc_pid(p), process_name, sizeof(process_name)); in audit()
335 (void)audit_send_analytics(signing_id, process_name); in audit()
/xnu-8019.80.24/bsd/kern/
H A Dbsd_init.c318 static void process_name(const char *, proc_t);
367 process_name(const char *s, proc_t p) in process_name() function
512 process_name("kernel_task", kernproc); in bsd_init()
1038 process_name("init", p); in bsdinit_task()
/xnu-8019.80.24/tools/lldbmacros/
H A Dprocess.py721 process_name = GetProcName(proc)
722 if process_name == 'xpcproxy':
726 process_name += ' (' + thread_name + ')'
728 …oin([proc_rage_str, io_policy_str]), wq_num_threads, wq_idle_threads, wq_req_threads, process_name)
1151 process_name = "{:s}".format(GetProcName(pval))
1152 if search_regex.search(process_name):
2313 process_name = "{:s}".format(GetProcName(pval))
2315 … print " *** Continuing to dump the thread stacks from the process *** :" + " " + process_name