HomeSort by relevance Sort by last modified time
    Searched full:process (Results 376 - 400 of 18366) sorted by null

<<11121314151617181920>>

  /external/icu/icu4j/main/classes/core/src/com/ibm/icu/text/
RBNFPostProcessor.java 23 * Work routine. Post process the output, which was generated by the
28 void process(StringBuffer output, NFRuleSet ruleSet); method in interface:RBNFPostProcessor
  /external/libcap-ng/libcap-ng-0.7/docs/
capng_lock.3 3 capng_lock \- lock the current process capabilities settings
11 capng_lock will take steps to prevent children of the current process to regain full privileges if the uid is 0. This should be called while possessing the CAP_SETPCAP capability in the kernel. This function will do the following if permitted by the kernel: Set the NOROOT option on for PR_SET_SECUREBITS, set the NOROOT_LOCKED option to on for PR_SET_SECUREBITS, set the PR_NO_SETUID_FIXUP option on for PR_SET_SECUREBITS, and set the PR_NO_SETUID_FIXUP_LOCKED option on for PR_SET_SECUREBITS.
  /external/libcap-ng/libcap-ng-0.7/utils/
netcap.8 7 \fBnetcap\fP is a program that prints out a report of process capabilities. If the application is using tcp, udp, raw, or packet family of sockets AND has any capabilities, it will be in the report. If the process has partial capabilities, it is further examined to see if it has an open-ended bounding set. If this is found to be true, a '+' symbol is added.
  /external/libchrome/sandbox/linux/services/
init_process_reaper.h 13 // The current process will fork(). The parent will become a process reaper
  /external/libchrome/sandbox/win/src/
interceptors.h 34 // Process-thread dispatcher:
44 // Process mitigations Win32k dispatcher:
  /external/llvm/lib/Support/
Process.cpp 1 //===-- Process.cpp - Implement OS Process Concept --------------*- C++ -*-===//
10 // This file implements the operating system Process concept.
18 #include "llvm/Support/Process.h"
29 Optional<std::string> Process::FindInEnvPath(const std::string& EnvName,
34 Optional<std::string> OptPath = Process::GetEnv(EnvName);
78 #include "Unix/Process.inc"
81 #include "Windows/Process.inc"
  /external/ltrace/
fetch.h 41 struct fetch_context *fetch_arg_init(enum tof type, struct process *proc,
45 struct fetch_context *fetch_arg_clone(struct process *proc,
52 struct process *proc,
58 struct process *proc,
78 struct fetch_context *arch_fetch_arg_init(enum tof type, struct process *proc,
80 struct fetch_context *arch_fetch_arg_clone(struct process *proc,
83 struct process *proc, struct arg_type_info *info,
86 struct process *proc, struct arg_type_info *info,
  /external/opencv3/modules/java/src/
photo+MergeMertens.java 20 // C++: void process(vector_Mat src, Mat& dst, Mat times, Mat response)
23 //javadoc: MergeMertens::process(src, dst, times, response)
24 public void process(List<Mat> src, Mat dst, Mat times, Mat response) method in class:MergeMertens
34 // C++: void process(vector_Mat src, Mat& dst)
37 //javadoc: MergeMertens::process(src, dst)
38 public void process(List<Mat> src, Mat dst) method in class:MergeMertens
138 // C++: void process(vector_Mat src, Mat& dst, Mat times, Mat response)
141 // C++: void process(vector_Mat src, Mat& dst)
  /external/selinux/policycoreutils/sepolicy/sepolicy/help/
lockdown_permissive.txt 6 When the distribution policy writers write a new confined domain, they initially ship the policy for that domain in permissive mode. Permissive mode means that a process running in the domain will not be confined by SELinux. The kernel will log the AVC messages, access denials, that would have happened had the process been run in enforcing mode.
  /external/tpm2/
RSAKeySieve_fp.h 16 hashAlg, // IN: hash algorithm to use in the key generation process
18 const char *label, // IN: A label for the generation process.
  /external/valgrind/gdbserver_tests/
nlpasssigalrm.stdinB.gdb 3 echo vgdb launched process attached\n
11 # ensure SIGALRM can be passed directly to the process, without
  /external/valgrind/gdbserver_tests/solaris/
nlcontrolc.vgtest 3 # the user can control-c a process with all threads in WaitSys
4 # the user can control-c a process with all threads in Running/Yielding
  /external/valgrind/none/tests/
fdleak.h 18 * The macro below closes file descriptors inherited from the process
19 * that forked the current process. Close these file descriptors right
  /external/vogar/src/vogar/target/
Runner.java 27 * process should kill this process and attempt to resume after the last
  /hardware/bsp/intel/peripheral/libmraa/src/javascript/
binding.gyp.cmake 13 "v8_version%": "<!(node -e 'console.log(process.versions.v8)' | sed 's/\.//g' | cut -c 1-5)",
14 "arch%": "<!(node -e 'console.log(process.arch)')"
  /prebuilts/gdb/darwin-x86/lib/python2.7/test/subprocessdata/
sigchild_ignore.py 3 # reaped our child process. The wait() passing the OSError on to the caller
11 # Waiting for the process to finish.
  /prebuilts/gdb/linux-x86/lib/python2.7/test/subprocessdata/
sigchild_ignore.py 3 # reaped our child process. The wait() passing the OSError on to the caller
11 # Waiting for the process to finish.
  /prebuilts/go/darwin-x86/src/os/
exec_posix.go 14 // are Interrupt (send the process an interrupt) and Kill (force
15 // the process to exit).
21 func startProcess(name string, argv []string, attr *ProcAttr) (p *Process, err error) {
52 func (p *Process) kill() error {
56 // ProcessState stores information about a process, as reported by Wait.
58 pid int // The process's id.
63 // Pid returns the process id of the exited process.
  /prebuilts/go/linux-x86/src/os/
exec_posix.go 14 // are Interrupt (send the process an interrupt) and Kill (force
15 // the process to exit).
21 func startProcess(name string, argv []string, attr *ProcAttr) (p *Process, err error) {
52 func (p *Process) kill() error {
56 // ProcessState stores information about a process, as reported by Wait.
58 pid int // The process's id.
63 // Pid returns the process id of the exited process.
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/subprocessdata/
sigchild_ignore.py 3 # reaped our child process. The wait() passing the OSError on to the caller
11 # Waiting for the process to finish.
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/subprocessdata/
sigchild_ignore.py 3 # reaped our child process. The wait() passing the OSError on to the caller
11 # Waiting for the process to finish.
  /system/connectivity/apmanager/
process_factory.h 24 #include <brillo/process.h>
35 virtual brillo::Process* CreateProcess();
  /system/extras/ext4_utils/
key_control.h 10 // special process keyring shortcut IDs
12 #define KEY_SPEC_PROCESS_KEYRING -2 // key ID for process-specific keyring
  /system/sepolicy/
blkid_untrusted.te 34 neverallow { domain -vold } blkid_untrusted:process transition;
35 neverallow * blkid_untrusted:process dyntransition;
fsck_untrusted.te 34 neverallow { domain -vold } fsck_untrusted:process transition;
35 neverallow * fsck_untrusted:process dyntransition;

Completed in 1360 milliseconds

<<11121314151617181920>>