Home
last modified time | relevance | path

Searched refs:process_name (Results 1 – 4 of 4) sorted by relevance

/xnu-8020.121.3/bsd/security/audit/
H A Daudit_bsd.c477 audit_send_analytics(char* signing_id, char* process_name) in audit_send_analytics() argument
484 (void)audit_analytics(audit_port, signing_id, process_name); in audit_send_analytics()
H A Daudit_syscalls.c170 char process_name[MAXCOMLEN + 1] = {}; in audit() local
334 proc_name(proc_pid(p), process_name, sizeof(process_name)); in audit()
335 (void)audit_send_analytics(signing_id, process_name); in audit()
/xnu-8020.121.3/bsd/kern/
H A Dbsd_init.c318 static void process_name(const char *, proc_t);
367 process_name(const char *s, proc_t p) in process_name() function
516 process_name("kernel_task", kernproc); in bsd_init()
1035 process_name("init", p); in bsdinit_task()
/xnu-8020.121.3/tools/lldbmacros/
H A Dprocess.py738 process_name = GetProcName(proc)
739 if process_name == 'xpcproxy':
743 process_name += ' (' + thread_name + ')'
745 …oin([proc_rage_str, io_policy_str]), wq_num_threads, wq_idle_threads, wq_req_threads, process_name)
1168 process_name = "{:s}".format(GetProcName(pval))
1169 if search_regex.search(process_name):
2282 process_name = "{:s}".format(GetProcName(pval))
2284 … print(" *** Continuing to dump the thread stacks from the process *** :" + " " + process_name)