HomeSort by relevance Sort by last modified time
    Searched full:process (Results 476 - 500 of 17637) sorted by null

<<11121314151617181920>>

  /external/chromium_org/sandbox/win/tests/common/
controller.h 23 // All the possible error codes returned by the child process in
95 // Starts a child process in the sandbox and ask it to run |command|. Returns
102 // Sets TestRunner to return without waiting for the process to exit.
105 // Sets TestRunner to return without waiting for the process to exit.
111 // Sets a flag whether the process should be killed when the TestRunner is
121 // Returns the process handle for an asynchronous test.
122 HANDLE process() { return target_process_; } function in class:sandbox::TestRunner
124 // Returns the process ID for an asynchronous test.
154 // Runs the given test on the target process.
  /external/lldb/source/Plugins/Process/Linux/
ProcessMonitor.h 33 /// @brief Manages communication with the inferior (debugee) process.
35 /// Upon construction, this class prepares and launches an inferior process for
38 /// Changes in the inferior process state are propagated to the associated
43 /// the inferior process state.
48 /// Launches an inferior process ready for debugging. Forms the
49 /// implementation of Process::DoLaunch.
50 ProcessMonitor(ProcessPOSIX *process,
60 ProcessMonitor(ProcessPOSIX *process,
71 /// Provides the process number of debugee.
75 /// Returns the process associated with this ProcessMonitor
    [all...]
  /external/lldb/test/python_api/frame/inlines/
TestInlinedFrame.py 54 # Now launch the process, and do not stop at the entry point.
55 process = target.LaunchSimple(None, None, os.getcwd())
57 process = target.GetProcess()
58 self.assertTrue(process.GetState() == lldb.eStateStopped,
62 stack_traces1 = lldbutil.print_stacktraces(process, string_buffer=True)
73 frame0 = process.GetThreadAtIndex(0).GetFrameAtIndex(0)
81 process.Continue()
82 self.assertTrue(process.GetState() == lldb.eStateStopped,
84 stack_traces2 = lldbutil.print_stacktraces(process, string_buffer=True)
  /external/lldb/utils/vim-lldb/python-vim-lldb/
lldb_controller.py 56 # servicing LLDB events from the main UI thread. Usually, we only process events that are already
69 self.process = None
104 """ Perform a step command and block the UI for eventDelayStep seconds in order to process
110 if not self.process:
111 sys.stderr.write("No process to step")
114 t = self.process.GetSelectedThread()
134 """ Handle 'process' command. If 'launch' is requested, use doLaunch() instead
135 of the command interpreter to start the inferior process.
139 self.doCommand("process", args)
145 """ Handle process attach. ""
    [all...]
  /external/ltrace/sysdeps/linux-gnu/arm/
regs.c 43 arm_get_register(struct process *proc, enum arm_register reg, uint32_t *lp)
54 arm_set_register(struct process *proc, enum arm_register reg, uint32_t lp)
61 arm_get_register_offpc(struct process *proc, enum arm_register reg,
72 arm_get_shifted_register(struct process *proc, uint32_t inst, int carry,
124 get_register_nocheck(struct process *proc, enum arm_register r)
135 get_instruction_pointer(struct process *proc)
141 set_instruction_pointer(struct process *proc, arch_addr_t addr)
148 get_stack_pointer(struct process *proc)
154 get_return_addr(struct process *proc, arch_addr_t stack_pointer)
  /external/chromium_org/components/nacl/browser/
nacl_browser.h 40 // Will it be possible to launch a NaCl process, eventually?
43 // Are we ready to launch a NaCl process now? Implies IsOk().
46 // Attempt to asynchronously acquire all resources needed to start a process.
51 // a process have been acquired.
92 // PPAPI. This allows the NaCl process to get trusted information about the
93 // file directly from the browser process. In theory, a compromised renderer
100 // Instead of allowing these attacks, the NaCl process only trusts information
101 // it gets directly from the browser process. Because the information is
102 // stored in a cache of bounded size, it is not guaranteed the browser process
104 // NaCl process must make conservative assumptions about the origin of th
    [all...]
  /external/chromium_org/extensions/browser/
process_map.h 25 // - In spanning mode, extensions share a single process between all incognito
29 // usually have a process model similar to normal web sites: multiple
31 // - A single hosted app can have more than one SiteInstance in the same process
32 // if we're over the process limit and force them to share a process.
34 // In general, we seem to play with the process model of extensions a lot, so
38 // Chrome's process isolation, extension code can still end up running outside
39 // an assigned process.
42 // when it is running in an assigned process.
49 // and packaged apps. Just because a process is present here *does not* mea
    [all...]
  /external/chromium_org/remoting/host/
daemon_process.h 17 #include "base/process/process.h"
39 // This class implements core of the daemon process. It manages the networking
40 // process running at lower privileges and maintains the list of desktop
51 // Creates a platform-specific implementation of the daemon process object
73 // Sends an IPC message to the network process. The message will be dropped
74 // unless the network process is connected over the IPC channel.
77 // Called when a desktop integration process attaches to |terminal_id|.
78 // |desktop_process| is a handle of the desktop integration process.
103 // Requests the network process to crash
    [all...]
desktop_process.h 57 // Crashes the process in response to a daemon's request. The daemon passes
73 // Name of the IPC channel connecting the desktop process with the daemon
74 // process.
77 // IPC channel connecting the desktop process with the daemon process.
81 // the network process.
  /external/lldb/test/functionalities/process_launch/
TestProcessLaunch.py 2 Test lldb process launch flags.
17 # disable "There is a running process, kill it and restart?" prompt
24 """Test that process launch I/O redirection flags work properly."""
30 """Test that process launch I/O redirection flags work properly."""
35 """Test that process launch I/O redirection flags work properly."""
46 # Make sure the output files do not exist before launching the process
57 launch_command = "process launch -i " + in_file + " -o " + out_file + " -e " + err_file
60 patterns = [ "Process .* launched: .*a.out" ])
129 # The process launch flag '-w' for setting the current working directory not working?
143 # Make sure the output files do not exist before launching the process
    [all...]
  /external/llvm/lib/Support/
Process.cpp 1 //===-- Process.cpp - Implement OS Process Concept --------------*- C++ -*-===//
10 // This file implements the operating system Process concept.
18 #include "llvm/Support/Process.h"
29 // Empty virtual destructor to anchor the vtable for the process class.
30 process::~process() {}
32 self_process *process::get_self() {
42 // instance should live until the process terminates to avoid the potential for
53 /// startup of the process to get approximately correct results
    [all...]
  /external/chromium_org/chrome/tools/
chrome-process-identifier.sh 19 # Find the browser's process id. If there are multiple active instances of
21 # must match a process in the browser's process hierarchy. When using the
22 # zygote inside of the setuid sandbox, renderers are in a process tree separate
23 # from the browser process. You cannot use any of their pids.
58 echo "Process $child is part of the browser"
62 echo "Process $child is an extension"
68 echo "Process $child is a \"$plugin\" plugin"
71 renderer|worker|gpu-process)
72 # The seccomp sandbox has exactly one child process that has no othe
    [all...]
  /external/lldb/test/functionalities/breakpoint/breakpoint_conditions/
TestBreakpointConditions.py 81 # The process should be stopped at this point.
82 self.expect("process status", PROCESS_STOPPED,
83 patterns = ['Process .* stopped'])
104 self.runCmd("process kill")
112 # The process should be stopped at this point.
113 self.expect("process status", PROCESS_STOPPED,
114 patterns = ['Process .* stopped'])
120 self.runCmd("process kill")
127 self.expect("process status", PROCESS_STOPPED,
128 patterns = ['Process .* stopped']
    [all...]
  /external/chromium_org/chrome/browser/extensions/api/messaging/
native_process_launcher.h 11 #include "base/process/process.h"
33 // Callback that's called after the process has been launched. |result| is set
50 // access the host. |callback| is called after the process has been started.
52 // canceled and the process is stopped if it has been started already (by
69 // Launches native messaging process.
  /external/chromium_org/chrome/browser/ui/cocoa/
hung_renderer_controller.h 13 // share a render process. Since there can only be a single dialog
48 // shares a renderer process with |hungContents_|.
51 // Favicons of each WebContents that shares a renderer process with
64 // process with |contents|. The caller must not delete any tab
69 // If |contents| shares the same render process as the tab contents
71 // If |contents| has a different process, this function does nothing.
  /external/chromium_org/chrome/common/
service_messages.h 22 // Tell the service process to enable the cloud proxy passing in the OAuth2
30 // Tell the service process to disable the cloud proxy.
43 // Tell the service process to shutdown.
46 // Tell the service process that an update is available.
50 // Service process host messages:
51 // These are messages from the service process to the browser.
  /external/chromium_org/content/browser/
histogram_controller.h 17 // HistogramController is used on the browser process to collect histogram data.
22 // Returns the HistogramController object for the current process, or NULL if
26 // Normally instantiated when the child process is launched. Only one instance
27 // should be created per process.
32 // OnHistogramDataCollected is returning histogram data from a child process.
37 // OnHistogramDataCollected is returning histogram data from a child process.
  /external/chromium_org/mojo/shell/
child_process_host.h 9 #include "base/process/process_handle.h"
19 // (Base) class for a "child process host". Handles launching and connecting a
21 // process. Intended for use as a base class, but may be used on its own in
41 // |Start()|s the child process; calls the delegate's |DidStart()| (on the
48 // Waits for the child process to terminate, and returns its exit code.
74 // Platform-specific "pipe" to the child process. Valid immediately after
  /external/chromium_org/tools/telemetry/telemetry/timeline/
process.py 9 class Process(event_container.TimelineEventContainer):
10 ''' The Process represents a single userland process in the trace.
13 super(Process, self).__init__('process %s' % pid, parent)
59 'Counter %s not found in process with id %s.' % (counter_id,
  /external/lldb/source/Plugins/Process/FreeBSD/
ProcessMonitor.h 33 /// @brief Manages communication with the inferior (debugee) process.
35 /// Upon construction, this class prepares and launches an inferior process for
38 /// Changes in the inferior process state are propagated to the associated
43 /// the inferior process state.
48 /// Launches an inferior process ready for debugging. Forms the
49 /// implementation of Process::DoLaunch.
50 ProcessMonitor(ProcessPOSIX *process,
60 ProcessMonitor(ProcessPOSIX *process,
66 /// Provides the process number of debugee.
70 /// Returns the process associated with this ProcessMonitor
    [all...]
  /external/qemu/distrib/sdl-1.2.15/test/
testlock.c 29 printf("Process %u: exiting\n", SDL_ThreadID());
41 printf("Process %u: Cleaning up...\n", id == mainthread ? 0 : id);
52 printf("Process %u ready to work\n", SDL_ThreadID());
57 printf("Process %u, working!\n", SDL_ThreadID());
59 printf("Process %u, done!\n", SDL_ThreadID());
67 printf("Process %u: raising SIGTERM\n", SDL_ThreadID());
  /external/sepolicy/
netd.te 11 # than one of the groups assigned to the current process to see if
40 allow netd dhcp:process signal;
55 allow netd hostapd:process signal;
59 allow netd dnsmasq:process signal;
63 allow netd clatd:process signal;
80 neverallow netd { domain }:process ptrace;
zygote.te 12 allow zygote self:process setcurrent;
13 allow zygote system_server:process dyntransition;
14 allow zygote appdomain:process dyntransition;
18 # Move children into the peer process group.
19 allow zygote system_server:process { getpgid setpgid };
20 allow zygote appdomain:process { getpgid setpgid };
  /frameworks/base/core/java/android/os/
UserHandle.java 47 * user, but if this is calling from a user process then we will send it
52 * user, but if this is calling from a user process then we will send it
100 return appId >= Process.FIRST_ISOLATED_UID && appId <= Process.LAST_ISOLATED_UID;
110 return appId >= Process.FIRST_APPLICATION_UID && appId <= Process.LAST_APPLICATION_UID;
170 return getUid(userId, Process.SHARED_USER_GID);
178 return Process.FIRST_SHARED_APPLICATION_GID + (id % PER_USER_RANGE)
179 - Process.FIRST_APPLICATION_UID;
188 if (uid < Process.FIRST_APPLICATION_UID)
    [all...]
  /libcore/dalvik/src/main/java/dalvik/system/
ZygoteHooks.java 33 * process and {@link #postForkCommon()} on both the parent and the child
34 * process. {@code postForkCommon} is called after {@code postForkChild} in
35 * the child process.
44 * Called by the zygote in the child process after every fork. The debug
45 * flags from {@code debugFlags} are applied to the child process. The string
54 * every fork. In the child process, this method is called after

Completed in 509 milliseconds

<<11121314151617181920>>