/external/chromium_org/base/ |
base.gypi | 443 'process/internal_linux.cc', 444 'process/internal_linux.h', 445 'process/kill.cc', 446 'process/kill.h', 447 'process/kill_mac.cc', 448 'process/kill_posix.cc', 449 'process/kill_win.cc', 450 'process/launch.cc', 451 'process/launch.h', 452 'process/launch_ios.cc' [all...] |
/external/chromium_org/ash/accelerators/ |
accelerator_controller_unittest.cc | 289 EXPECT_TRUE(GetController()->Process(press)); 290 EXPECT_FALSE(GetController()->Process(release)); 293 EXPECT_TRUE(GetController()->Process(press)); // second press before timer. 294 EXPECT_FALSE(GetController()->Process(release)); 311 EXPECT_TRUE(GetController()->Process(press)); 312 EXPECT_FALSE(GetController()->Process(release)); 342 EXPECT_TRUE(GetController()->Process(accelerator_a)); 355 EXPECT_TRUE(GetController()->Process(accelerator_a)); 370 EXPECT_TRUE(GetController()->Process(accelerator_a)); 376 EXPECT_FALSE(GetController()->Process(accelerator_a)) [all...] |
/external/lldb/source/Plugins/DynamicLoader/Darwin-Kernel/ |
DynamicLoaderDarwinKernel.h | 27 #include "lldb/Target/Process.h" 48 CreateInstance (lldb_private::Process *process, bool force); 53 DynamicLoaderDarwinKernel (lldb_private::Process *process, lldb::addr_t kernel_addr); 59 /// Called after attaching a process. 62 /// attaching to a process. 88 PrivateInitialize (lldb_private::Process *process); 91 PrivateProcessStateChanged (lldb_private::Process *process [all...] |
/external/lldb/test/python_api/event/ |
TestEvents.py | 77 # Now launch the process, and do not stop at the entry point. 78 process = target.LaunchSimple(None, None, os.getcwd()) 79 self.assertTrue(process.GetState() == lldb.eStateStopped, 82 # Get a handle on the process's broadcaster. 83 broadcaster = process.GetBroadcaster() 95 lldbutil.print_stacktraces(process) 115 print "Process state:", lldbutil.state_type_to_str(process.GetState()) 127 # Use Python API to continue the process. The listening thread should be 129 process.Continue( [all...] |
/external/chromium_org/sandbox/win/src/ |
sandbox.h | 6 // 'privileged' process and a 'locked down process' to interact with. 7 // The privileged process is called the broker and it is started by external 8 // means (such as the user starting it). The 'sandboxed' process is called the 10 // started by a single broker process. This library provides facilities 62 // Creates a new target (child process) in a suspended state. 68 // process. This can be null if the exe_path parameter is not null. 71 // target: returns the resulting target process information such as process 88 // Adds an unsandboxed process as a peer for policy decisions (e.g [all...] |
/device/asus/flo/sepolicy/ |
bridge.te | 1 # Bridge Manager (radio process)
|
/device/lge/hammerhead/sepolicy/ |
bridge.te | 1 # Bridge Manager (radio process)
|
/device/lge/mako/sepolicy/ |
bridge.te | 1 # Bridge Manager (radio process)
|
/device/moto/shamu/sepolicy/ |
bridge.te | 1 # Bridge Manager (radio process)
|
/external/chromium_org/base/process/ |
launch_ios.cc | 5 #include "base/process/launch.h"
|
process_metrics_ios.cc | 5 #include "base/process/process_metrics.h" 24 ProcessMetrics::ProcessMetrics(ProcessHandle process) {} 29 ProcessMetrics* ProcessMetrics::CreateProcessMetrics(ProcessHandle process) { 30 return new ProcessMetrics(process);
|
/external/chromium_org/chrome/browser/install_verification/win/ |
install_verification.h | 8 // Starts a background process to verify the Chrome installation. Results are
|
/external/chromium_org/chrome_elf/blacklist/ |
blacklist_interceptions.h | 15 // Interception of NtMapViewOfSection within the current process. 21 HANDLE process, 32 // Interception of NtMapViewOfSection within the current process. 36 HANDLE section, HANDLE process, PVOID *base, ULONG_PTR zero_bits,
|
/external/chromium_org/content/browser/ |
plugin_process_host.h | 47 // channel. Different plugins run in their own process, but multiple instances 48 // of the same plugin run in the same process. There will be one 49 // PluginProcessHost per plugin process, matched with a corresponding 50 // PluginProcess running in the plugin process. The browser is responsible for 51 // starting the plugin process when a plugin is created that doesn't already 52 // have a process. After that, most of the communication is directly between 59 // Returns an opaque unique identifier for the process requesting 82 // Initialize the new plugin process, returning true on success. This must 86 // Force the plugin process to shutdown (cleanly). 93 // Tells the plugin process to create a new channel for communication with [all...] |
profiler_controller_impl.h | 9 #include "base/process/process.h" 25 // Normally instantiated when the child process is launched. Only one instance 26 // should be created per process.
|
/external/chromium_org/content/common/gpu/ |
gpu_config.h | 8 // This file declares common preprocessor configuration for the GPU process.
|
/external/chromium_org/content/common/ |
plugin_carbon_interpose_constants_mac.h | 10 // Strings used in setting up Carbon interposing for the plugin process.
|
/external/chromium_org/content/public/android/java/src/org/chromium/content/app/ |
ContentApplication.java | 42 // Happens if the process is isolated. Ignore. 51 * For emulated process environment only. On a production device, the application process is 60 // Happens if the process is isolated. Ignore.
|
PrivilegedProcessService0.java | 9 * more than one sandboxed process.
|
PrivilegedProcessService1.java | 9 * more than one sandboxed process.
|
PrivilegedProcessService2.java | 9 * more than one sandboxed process.
|
SandboxedProcessService0.java | 9 * more than one sandboxed process.
|
SandboxedProcessService1.java | 9 * more than one sandboxed process.
|
SandboxedProcessService10.java | 9 * more than one sandboxed process.
|
SandboxedProcessService11.java | 9 * more than one sandboxed process.
|