Searched refs:process_name (Results 1 – 4 of 4) sorted by relevance
| /xnu-8019.80.24/bsd/security/audit/ |
| H A D | audit_bsd.c | 477 audit_send_analytics(char* signing_id, char* process_name) in audit_send_analytics() argument 484 (void)audit_analytics(audit_port, signing_id, process_name); in audit_send_analytics()
|
| H A D | audit_syscalls.c | 170 char process_name[MAXCOMLEN + 1] = {}; in audit() local 334 proc_name(proc_pid(p), process_name, sizeof(process_name)); in audit() 335 (void)audit_send_analytics(signing_id, process_name); in audit()
|
| /xnu-8019.80.24/bsd/kern/ |
| H A D | bsd_init.c | 318 static void process_name(const char *, proc_t); 367 process_name(const char *s, proc_t p) in process_name() function 512 process_name("kernel_task", kernproc); in bsd_init() 1038 process_name("init", p); in bsdinit_task()
|
| /xnu-8019.80.24/tools/lldbmacros/ |
| H A D | process.py | 721 process_name = GetProcName(proc) 722 if process_name == 'xpcproxy': 726 process_name += ' (' + thread_name + ')' 728 …oin([proc_rage_str, io_policy_str]), wq_num_threads, wq_idle_threads, wq_req_threads, process_name) 1151 process_name = "{:s}".format(GetProcName(pval)) 1152 if search_regex.search(process_name): 2313 process_name = "{:s}".format(GetProcName(pval)) 2315 … print " *** Continuing to dump the thread stacks from the process *** :" + " " + process_name
|