/external/chromium_org/sandbox/win/tests/common/ |
controller.h | 23 // All the possible error codes returned by the child process in 95 // Starts a child process in the sandbox and ask it to run |command|. Returns 102 // Sets TestRunner to return without waiting for the process to exit. 105 // Sets TestRunner to return without waiting for the process to exit. 111 // Sets a flag whether the process should be killed when the TestRunner is 121 // Returns the process handle for an asynchronous test. 122 HANDLE process() { return target_process_; } function in class:sandbox::TestRunner 124 // Returns the process ID for an asynchronous test. 154 // Runs the given test on the target process.
|
/external/lldb/source/Plugins/Process/Linux/ |
ProcessMonitor.h | 33 /// @brief Manages communication with the inferior (debugee) process. 35 /// Upon construction, this class prepares and launches an inferior process for 38 /// Changes in the inferior process state are propagated to the associated 43 /// the inferior process state. 48 /// Launches an inferior process ready for debugging. Forms the 49 /// implementation of Process::DoLaunch. 50 ProcessMonitor(ProcessPOSIX *process, 60 ProcessMonitor(ProcessPOSIX *process, 71 /// Provides the process number of debugee. 75 /// Returns the process associated with this ProcessMonitor [all...] |
/external/lldb/test/python_api/frame/inlines/ |
TestInlinedFrame.py | 54 # Now launch the process, and do not stop at the entry point. 55 process = target.LaunchSimple(None, None, os.getcwd()) 57 process = target.GetProcess() 58 self.assertTrue(process.GetState() == lldb.eStateStopped, 62 stack_traces1 = lldbutil.print_stacktraces(process, string_buffer=True) 73 frame0 = process.GetThreadAtIndex(0).GetFrameAtIndex(0) 81 process.Continue() 82 self.assertTrue(process.GetState() == lldb.eStateStopped, 84 stack_traces2 = lldbutil.print_stacktraces(process, string_buffer=True)
|
/external/lldb/utils/vim-lldb/python-vim-lldb/ |
lldb_controller.py | 56 # servicing LLDB events from the main UI thread. Usually, we only process events that are already 69 self.process = None 104 """ Perform a step command and block the UI for eventDelayStep seconds in order to process 110 if not self.process: 111 sys.stderr.write("No process to step") 114 t = self.process.GetSelectedThread() 134 """ Handle 'process' command. If 'launch' is requested, use doLaunch() instead 135 of the command interpreter to start the inferior process. 139 self.doCommand("process", args) 145 """ Handle process attach. "" [all...] |
/external/ltrace/sysdeps/linux-gnu/arm/ |
regs.c | 43 arm_get_register(struct process *proc, enum arm_register reg, uint32_t *lp) 54 arm_set_register(struct process *proc, enum arm_register reg, uint32_t lp) 61 arm_get_register_offpc(struct process *proc, enum arm_register reg, 72 arm_get_shifted_register(struct process *proc, uint32_t inst, int carry, 124 get_register_nocheck(struct process *proc, enum arm_register r) 135 get_instruction_pointer(struct process *proc) 141 set_instruction_pointer(struct process *proc, arch_addr_t addr) 148 get_stack_pointer(struct process *proc) 154 get_return_addr(struct process *proc, arch_addr_t stack_pointer)
|
/external/chromium_org/components/nacl/browser/ |
nacl_browser.h | 40 // Will it be possible to launch a NaCl process, eventually? 43 // Are we ready to launch a NaCl process now? Implies IsOk(). 46 // Attempt to asynchronously acquire all resources needed to start a process. 51 // a process have been acquired. 92 // PPAPI. This allows the NaCl process to get trusted information about the 93 // file directly from the browser process. In theory, a compromised renderer 100 // Instead of allowing these attacks, the NaCl process only trusts information 101 // it gets directly from the browser process. Because the information is 102 // stored in a cache of bounded size, it is not guaranteed the browser process 104 // NaCl process must make conservative assumptions about the origin of th [all...] |
/external/chromium_org/extensions/browser/ |
process_map.h | 25 // - In spanning mode, extensions share a single process between all incognito 29 // usually have a process model similar to normal web sites: multiple 31 // - A single hosted app can have more than one SiteInstance in the same process 32 // if we're over the process limit and force them to share a process. 34 // In general, we seem to play with the process model of extensions a lot, so 38 // Chrome's process isolation, extension code can still end up running outside 39 // an assigned process. 42 // when it is running in an assigned process. 49 // and packaged apps. Just because a process is present here *does not* mea [all...] |
/external/chromium_org/remoting/host/ |
daemon_process.h | 17 #include "base/process/process.h" 39 // This class implements core of the daemon process. It manages the networking 40 // process running at lower privileges and maintains the list of desktop 51 // Creates a platform-specific implementation of the daemon process object 73 // Sends an IPC message to the network process. The message will be dropped 74 // unless the network process is connected over the IPC channel. 77 // Called when a desktop integration process attaches to |terminal_id|. 78 // |desktop_process| is a handle of the desktop integration process. 103 // Requests the network process to crash [all...] |
desktop_process.h | 57 // Crashes the process in response to a daemon's request. The daemon passes 73 // Name of the IPC channel connecting the desktop process with the daemon 74 // process. 77 // IPC channel connecting the desktop process with the daemon process. 81 // the network process.
|
/external/lldb/test/functionalities/process_launch/ |
TestProcessLaunch.py | 2 Test lldb process launch flags. 17 # disable "There is a running process, kill it and restart?" prompt 24 """Test that process launch I/O redirection flags work properly.""" 30 """Test that process launch I/O redirection flags work properly.""" 35 """Test that process launch I/O redirection flags work properly.""" 46 # Make sure the output files do not exist before launching the process 57 launch_command = "process launch -i " + in_file + " -o " + out_file + " -e " + err_file 60 patterns = [ "Process .* launched: .*a.out" ]) 129 # The process launch flag '-w' for setting the current working directory not working? 143 # Make sure the output files do not exist before launching the process [all...] |
/external/llvm/lib/Support/ |
Process.cpp | 1 //===-- Process.cpp - Implement OS Process Concept --------------*- C++ -*-===// 10 // This file implements the operating system Process concept. 18 #include "llvm/Support/Process.h" 29 // Empty virtual destructor to anchor the vtable for the process class. 30 process::~process() {} 32 self_process *process::get_self() { 42 // instance should live until the process terminates to avoid the potential for 53 /// startup of the process to get approximately correct results [all...] |
/external/chromium_org/chrome/tools/ |
chrome-process-identifier.sh | 19 # Find the browser's process id. If there are multiple active instances of 21 # must match a process in the browser's process hierarchy. When using the 22 # zygote inside of the setuid sandbox, renderers are in a process tree separate 23 # from the browser process. You cannot use any of their pids. 58 echo "Process $child is part of the browser" 62 echo "Process $child is an extension" 68 echo "Process $child is a \"$plugin\" plugin" 71 renderer|worker|gpu-process) 72 # The seccomp sandbox has exactly one child process that has no othe [all...] |
/external/lldb/test/functionalities/breakpoint/breakpoint_conditions/ |
TestBreakpointConditions.py | 81 # The process should be stopped at this point. 82 self.expect("process status", PROCESS_STOPPED, 83 patterns = ['Process .* stopped']) 104 self.runCmd("process kill") 112 # The process should be stopped at this point. 113 self.expect("process status", PROCESS_STOPPED, 114 patterns = ['Process .* stopped']) 120 self.runCmd("process kill") 127 self.expect("process status", PROCESS_STOPPED, 128 patterns = ['Process .* stopped'] [all...] |
/external/chromium_org/chrome/browser/extensions/api/messaging/ |
native_process_launcher.h | 11 #include "base/process/process.h" 33 // Callback that's called after the process has been launched. |result| is set 50 // access the host. |callback| is called after the process has been started. 52 // canceled and the process is stopped if it has been started already (by 69 // Launches native messaging process.
|
/external/chromium_org/chrome/browser/ui/cocoa/ |
hung_renderer_controller.h | 13 // share a render process. Since there can only be a single dialog 48 // shares a renderer process with |hungContents_|. 51 // Favicons of each WebContents that shares a renderer process with 64 // process with |contents|. The caller must not delete any tab 69 // If |contents| shares the same render process as the tab contents 71 // If |contents| has a different process, this function does nothing.
|
/external/chromium_org/chrome/common/ |
service_messages.h | 22 // Tell the service process to enable the cloud proxy passing in the OAuth2 30 // Tell the service process to disable the cloud proxy. 43 // Tell the service process to shutdown. 46 // Tell the service process that an update is available. 50 // Service process host messages: 51 // These are messages from the service process to the browser.
|
/external/chromium_org/content/browser/ |
histogram_controller.h | 17 // HistogramController is used on the browser process to collect histogram data. 22 // Returns the HistogramController object for the current process, or NULL if 26 // Normally instantiated when the child process is launched. Only one instance 27 // should be created per process. 32 // OnHistogramDataCollected is returning histogram data from a child process. 37 // OnHistogramDataCollected is returning histogram data from a child process.
|
/external/chromium_org/mojo/shell/ |
child_process_host.h | 9 #include "base/process/process_handle.h" 19 // (Base) class for a "child process host". Handles launching and connecting a 21 // process. Intended for use as a base class, but may be used on its own in 41 // |Start()|s the child process; calls the delegate's |DidStart()| (on the 48 // Waits for the child process to terminate, and returns its exit code. 74 // Platform-specific "pipe" to the child process. Valid immediately after
|
/external/chromium_org/tools/telemetry/telemetry/timeline/ |
process.py | 9 class Process(event_container.TimelineEventContainer): 10 ''' The Process represents a single userland process in the trace. 13 super(Process, self).__init__('process %s' % pid, parent) 59 'Counter %s not found in process with id %s.' % (counter_id,
|
/external/lldb/source/Plugins/Process/FreeBSD/ |
ProcessMonitor.h | 33 /// @brief Manages communication with the inferior (debugee) process. 35 /// Upon construction, this class prepares and launches an inferior process for 38 /// Changes in the inferior process state are propagated to the associated 43 /// the inferior process state. 48 /// Launches an inferior process ready for debugging. Forms the 49 /// implementation of Process::DoLaunch. 50 ProcessMonitor(ProcessPOSIX *process, 60 ProcessMonitor(ProcessPOSIX *process, 66 /// Provides the process number of debugee. 70 /// Returns the process associated with this ProcessMonitor [all...] |
/external/qemu/distrib/sdl-1.2.15/test/ |
testlock.c | 29 printf("Process %u: exiting\n", SDL_ThreadID()); 41 printf("Process %u: Cleaning up...\n", id == mainthread ? 0 : id); 52 printf("Process %u ready to work\n", SDL_ThreadID()); 57 printf("Process %u, working!\n", SDL_ThreadID()); 59 printf("Process %u, done!\n", SDL_ThreadID()); 67 printf("Process %u: raising SIGTERM\n", SDL_ThreadID());
|
/external/sepolicy/ |
netd.te | 11 # than one of the groups assigned to the current process to see if 40 allow netd dhcp:process signal; 55 allow netd hostapd:process signal; 59 allow netd dnsmasq:process signal; 63 allow netd clatd:process signal; 80 neverallow netd { domain }:process ptrace;
|
zygote.te | 12 allow zygote self:process setcurrent; 13 allow zygote system_server:process dyntransition; 14 allow zygote appdomain:process dyntransition; 18 # Move children into the peer process group. 19 allow zygote system_server:process { getpgid setpgid }; 20 allow zygote appdomain:process { getpgid setpgid };
|
/frameworks/base/core/java/android/os/ |
UserHandle.java | 47 * user, but if this is calling from a user process then we will send it 52 * user, but if this is calling from a user process then we will send it 100 return appId >= Process.FIRST_ISOLATED_UID && appId <= Process.LAST_ISOLATED_UID; 110 return appId >= Process.FIRST_APPLICATION_UID && appId <= Process.LAST_APPLICATION_UID; 170 return getUid(userId, Process.SHARED_USER_GID); 178 return Process.FIRST_SHARED_APPLICATION_GID + (id % PER_USER_RANGE) 179 - Process.FIRST_APPLICATION_UID; 188 if (uid < Process.FIRST_APPLICATION_UID) [all...] |
/libcore/dalvik/src/main/java/dalvik/system/ |
ZygoteHooks.java | 33 * process and {@link #postForkCommon()} on both the parent and the child 34 * process. {@code postForkCommon} is called after {@code postForkChild} in 35 * the child process. 44 * Called by the zygote in the child process after every fork. The debug 45 * flags from {@code debugFlags} are applied to the child process. The string 54 * every fork. In the child process, this method is called after
|