/external/autotest/client/common_lib/ |
pidfile.py | 8 self.pid_file = None 13 self.pid_file = open(self.path, "w") 14 self.pid_file.write("%s\n" % os.getpid()) 15 self.pid_file.flush() 20 if not self.pid_file: 22 pid_file = self.pid_file 23 self.pid_file = None 25 pid_file.write("%s\n" % encoded_exit_code) 26 pid_file.write("%s\n" % self.num_tests_failed [all...] |
/system/connectivity/shill/test-scripts/ |
veth | 26 pid_file="/tmp/dnsmasq.${iface}.pid" 33 dnsmasq --pid-file="$pid_file" \ 43 pid_file="/tmp/dnsmasq.${iface}.pid" 44 [ -f "$pid_file" ] && kill -TERM $(cat "$pid_file")
|
/external/chromium-trace/catapult/telemetry/telemetry/internal/platform/profiler/ |
tcmalloc_heap_profiler.py | 69 'browser.pid'), 'w') as pid_file: 70 pid_file.write(str(self._browser_backend.pid).rjust(5, '0')) 97 'browser.pid'), 'w') as pid_file: 98 pid_file.write(str(self._browser_backend.pid))
|
/external/wpa_supplicant_8/src/utils/ |
os_none.c | 47 int os_daemonize(const char *pid_file) 53 void os_daemonize_terminate(const char *pid_file)
|
os_internal.c | 98 int os_daemonize(const char *pid_file) 105 if (pid_file) { 106 FILE *f = fopen(pid_file, "w"); 117 void os_daemonize_terminate(const char *pid_file) 119 if (pid_file) 120 unlink(pid_file);
|
os_unix.c | 218 int os_daemonize(const char *pid_file) 228 if (pid_file) { 229 FILE *f = fopen(pid_file, "w"); 241 void os_daemonize_terminate(const char *pid_file) 243 if (pid_file) 244 unlink(pid_file);
|
os_win32.c | 120 int os_daemonize(const char *pid_file) 127 void os_daemonize_terminate(const char *pid_file)
|
os.h | 148 * @pid_file: File name to write the process ID to or %NULL to skip this 151 int os_daemonize(const char *pid_file); 155 * @pid_file: File name to write the process ID to or %NULL to skip this 157 void os_daemonize_terminate(const char *pid_file);
|
/external/ipsec-tools/src/racoon/ |
session.c | 123 char pid_file[MAXPATHLEN]; local 158 strlcpy(pid_file, _PATH_VARRUN "racoon.pid", MAXPATHLEN); 160 strlcpy(pid_file, lcconf->pathinfo[LC_PATHTYPE_PIDFILE], MAXPATHLEN); 162 strlcat(pid_file, _PATH_VARRUN, MAXPATHLEN); 163 strlcat(pid_file, lcconf->pathinfo[LC_PATHTYPE_PIDFILE], MAXPATHLEN); 165 fp = fopen(pid_file, "w"); 177 "cannot open %s", pid_file);
|
main.c | 283 const char *pid_file = _PATH_VARRUN "racoon.pid"; 285 (void) unlink(pid_file);
|
/external/libbrillo/brillo/ |
process.h | 145 // Same as Reset but reads the pid from |pid_file|. Returns false 147 virtual bool ResetPidByFile(const std::string& pid_file) = 0; 185 virtual bool ResetPidByFile(const std::string& pid_file);
|
process_mock.h | 40 MOCK_METHOD1(ResetPidByFile, bool(const std::string& pid_file));
|
process.cc | 394 bool ProcessImpl::ResetPidByFile(const std::string& pid_file) { 396 if (!base::ReadFileToString(base::FilePath(pid_file), &contents)) { 397 LOG(ERROR) << "Could not read pid file" << pid_file;
|
/external/autotest/client/cros/ |
network_chroot.py | 176 def get_pid_file(self, pid_file, missing_ok=False): 177 """Returns the integer contents of |pid_file| in the chroot. 179 @param pid_file string containing the filename within the choot 188 chroot_pid_file = self.chroot_path(pid_file) 199 def kill_pid_file(self, pid_file, missing_ok=False): 200 """Kills the process belonging to |pid_file| in the chroot. 202 @param pid_file string filename within the chroot to gain the process ID 208 pid = self.get_pid_file(pid_file, missing_ok=missing_ok)
|
/external/wpa_supplicant_8/hostapd/ |
main.c | 360 static void hostapd_global_deinit(const char *pid_file) 386 os_daemonize_terminate(pid_file); 391 const char *pid_file) 413 if (os_daemonize(pid_file)) { 579 char *pid_file = NULL; local 630 os_free(pid_file); 631 pid_file = os_rel2abs_path(optarg); 790 if (hostapd_global_run(&interfaces, daemonize, pid_file)) { 811 hostapd_global_deinit(pid_file); 812 os_free(pid_file); [all...] |
hostapd_cli.c | 104 static const char *pid_file = NULL; variable [all...] |
/external/chromium-trace/catapult/devil/devil/android/ |
forwarder.py | 262 with os.fdopen(fd, 'r+') as pid_file: 263 pid_with_start_time = pid_file.readline() 270 pid_file.seek(0) 271 pid_file.write( 273 pid_file.truncate()
|
/external/autotest/site_utils/chromeos_proxy/ |
swarming_bots.py | 96 PID_FILE = 'swarming_bot.pid' 119 self.pid_file = os.path.join(self.bot_dir, self.PID_FILE) 132 with open(self.pid_file, 'w') as f: 139 if os.path.exists(self.pid_file): 140 os.remove(self.pid_file) 170 if os.path.exists(self.pid_file): 171 with open(self.pid_file) as f:
|
/external/wpa_supplicant_8/wpa_supplicant/ |
main.c | 279 os_free(params.pid_file); 280 params.pid_file = os_rel2abs_path(optarg); 404 os_free(params.pid_file);
|
wpa_priv.c | 1116 char *pid_file = NULL; local 1145 pid_file = os_rel2abs_path(optarg); 1174 if (daemonize && os_daemonize(pid_file) && eloop_sock_requeue()) 1194 os_daemonize_terminate(pid_file); 1195 os_free(pid_file);
|
wpa_cli.c | 87 static const char *pid_file = NULL; variable [all...] |
wpa_supplicant.c | [all...] |
/external/fio/ |
init.c | 1944 void *pid_file = NULL; local [all...] |
/external/minijail/ |
libminijail.c | 112 int pid_file:1; member in struct:minijail::__anon21290 153 j->flags.pid_file = 0; 535 j->flags.pid_file = 1; [all...] |
/external/autotest/server/ |
site_linux_router.py | [all...] |