Searched refs:process_name (Results 1 – 5 of 5) sorted by relevance
| /xnu-8796.121.2/tests/ ! |
| H A D | corpse_backtrace.c | 83 char process_name[MAXCOMLEN + 1]; in exc_handler_backtrace() local 84 memcpy(process_name, kcdata_iter_payload(btdata), MAXCOMLEN); // limited to 16 chars in exc_handler_backtrace() 85 process_name[MAXCOMLEN] = '\0'; // ensure string is null terminated in exc_handler_backtrace() 86 T_LOG("Found TASK_BTINFO_PROC_NAME: %s", process_name); in exc_handler_backtrace()
|
| /xnu-8796.121.2/bsd/security/audit/ ! |
| H A D | audit_bsd.c | 477 audit_send_analytics(char* signing_id, char* process_name) in audit_send_analytics() argument 484 (void)audit_analytics(audit_port, signing_id, process_name); in audit_send_analytics()
|
| H A D | audit_syscalls.c | 170 char process_name[MAXCOMLEN + 1] = {}; in audit() local 334 proc_name(proc_pid(p), process_name, sizeof(process_name)); in audit() 335 (void)audit_send_analytics(signing_id, process_name); in audit()
|
| /xnu-8796.121.2/bsd/kern/ ! |
| H A D | bsd_init.c | 323 static void process_name(const char *, proc_t); 372 process_name(const char *s, proc_t p) in process_name() function 540 process_name("kernel_task", kernproc); in bsd_init() 1057 process_name("init", p); in bsdinit_task()
|
| /xnu-8796.121.2/tools/lldbmacros/ ! |
| H A D | process.py | 785 process_name = GetProcName(proc) 786 if process_name == 'xpcproxy': 790 process_name += ' (' + thread_name + ')' 792 …oin([proc_rage_str, io_policy_str]), wq_num_threads, wq_idle_threads, wq_req_threads, process_name) 1215 process_name = "{:s}".format(GetProcName(pval)) 1216 if search_regex.search(process_name): 2344 process_name = "{:s}".format(GetProcName(pval)) 2346 … print(" *** Continuing to dump the thread stacks from the process *** :" + " " + process_name)
|