/external/linux-tools-perf/perf-3.12.0/tools/perf/bench/ |
H A D | sched-pipe.c | 59 pid_t pid, retpid __maybe_unused; local 67 pid = fork(); 68 assert(pid >= 0); 72 if (!pid) { 87 if (pid) { 88 retpid = waitpid(pid, &wait_stat, 0); 89 assert((retpid == pid) && WIFEXITED(wait_stat));
|
/external/linux-tools-perf/perf-3.12.0/tools/perf/util/ |
H A D | thread.c | 10 struct thread *thread__new(pid_t pid, pid_t tid) argument 16 self->pid_ = pid;
|
/external/lldb/source/Utility/ |
H A D | PseudoTerminal.cpp | 195 // In the parent process when a valid pid is returned, the master file 210 // in the parent process: the pid of the child, or -1 if fork fails 219 pid_t pid = LLDB_INVALID_PROCESS_ID; local 224 pid = ::fork (); 225 if (pid < 0) 231 else if (pid == 0) 273 // Do nothing and let the pid get returned! 276 return pid;
|
/external/llvm/include/llvm/Analysis/ |
H A D | CallGraphSCCPass.h | 36 explicit CallGraphSCCPass(char &pid) : Pass(PT_CallGraphSCC, pid) {} argument
|
H A D | LoopPass.h | 31 explicit LoopPass(char &pid) : Pass(PT_Loop, pid) {} argument
|
H A D | RegionPass.h | 36 explicit RegionPass(char &pid) : Pass(PT_Region, pid) {} argument
|
/external/ltrace/sysdeps/linux-gnu/arm/ |
H A D | breakpoint.c | 34 arch_enable_breakpoint(pid_t pid, struct breakpoint *sbp) argument 40 debug(1, "arch_enable_breakpoint(%d,%p)", pid, sbp->addr); 49 current.l = ptrace(PTRACE_PEEKTEXT, pid, sbp->addr + i * sizeof(long), 0); 63 ptrace(PTRACE_POKETEXT, pid, sbp->addr + i * sizeof(long), 69 arch_disable_breakpoint(pid_t pid, const struct breakpoint *sbp) argument 73 debug(1, "arch_disable_breakpoint(%d,%p)", pid, sbp->addr); 82 current.l = ptrace(PTRACE_PEEKTEXT, pid, sbp->addr + i * sizeof(long), 0); 89 ptrace(PTRACE_POKETEXT, pid, sbp->addr + i * sizeof(long),
|
/external/oprofile/libutil++/ |
H A D | child_reader.h | 98 pid_t pid; member in class:child_reader
|
/external/qemu/distrib/libselinux/src/ |
H A D | procattr.c | 19 pid_t pid, const char *attr) 28 if (pid > 0) 29 rc = asprintf(&path, "/proc/%d/attr/%s", pid, attr); 77 pid_t pid, const char *attr) 85 if (pid > 0) 86 rc = asprintf(&path, "/proc/%d/attr/%s", pid, attr); 132 int get##fn(pid_t pid, char **c) \ 134 return getprocattrcon(c, pid, #attr); \ 18 getprocattrcon(char ** context, pid_t pid, const char *attr) argument 76 setprocattrcon(const char * context, pid_t pid, const char *attr) argument
|
/external/robolectric/src/main/java/com/xtremelabs/robolectric/shadows/ |
H A D | ShadowBinder.java | 41 public static void setCallingPid(int pid) { argument 42 ShadowBinder.callingPid = pid;
|
/external/valgrind/main/none/tests/ |
H A D | pth_atfork1.c | 99 pid_t pid; local 101 pid = fork (); 102 if (pid == 0) 107 else if (pid == (pid_t) -1) 110 if (waitpid (pid, &status, 0) != pid)
|
/external/bison/djgpp/ |
H A D | subpipe.c | 116 pid_t pid; local 119 pid = getpid(); 163 return pid; 178 end_of_output_subpipe(pid_t pid, int fd[2]) argument 277 reap_subpipe(pid_t pid, char const *program) argument
|
/external/chromium_org/android_webview/browser/ |
H A D | aw_ssl_host_state_delegate.cc | 59 int pid) { 64 int pid) const { 58 HostRanInsecureContent(const std::string& host, int pid) argument
|
/external/chromium_org/base/process/ |
H A D | process_iterator_linux.cc | 36 // Reads /proc/<pid>/cmdline and populates |proc_cmd_line_args| with the command 38 // Note: /proc/<pid>/cmdline contains command line arguments separated by single 41 bool GetProcCmdline(pid_t pid, std::vector<std::string>* proc_cmd_line_args) { argument 45 FilePath cmd_line_file = internal::GetProcPidDir(pid).Append("cmdline"); 72 pid_t pid = kNullProcessId; local 88 pid = internal::ProcDirSlotToPid(slot->d_name); 89 if (!pid) { 94 if (!GetProcCmdline(pid, &cmd_line_args)) 97 if (!internal::ReadProcStats(pid, &stats_data)) 123 entry_.pid_ = pid; [all...] |
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/ |
H A D | DevToolsServer.java | 59 private static boolean checkDebugPermission(Context context, int pid, int uid) { argument 61 return context.checkPermission(debugPermissionName, pid, uid)
|
/external/chromium_org/chrome/browser/ |
H A D | memory_details_win.cc | 93 base::ProcessId pid = process_entry.th32ProcessID; local 95 PROCESS_QUERY_INFORMATION | PROCESS_VM_READ, FALSE, pid)); 111 info.pid = pid; 112 if (info.pid == GetCurrentProcessId()) 132 if (child_info[child].pid != info.pid)
|
/external/chromium_org/components/crash/app/ |
H A D | breakpad_linux_impl.h | 57 uint64_t pid; // PID where applicable. member in struct:breakpad::BreakpadInfo
|
/external/chromium_org/components/crash/browser/ |
H A D | crash_dump_manager_android.cc | 84 base::ProcessHandle pid) { 108 rand, pid); 152 base::ProcessHandle pid) { 168 base::Bind(&CrashDumpManager::ProcessMinidump, minidump_path, pid)); 83 ProcessMinidump(const base::FilePath& minidump_path, base::ProcessHandle pid) argument 151 OnChildExit(int child_process_id, base::ProcessHandle pid) argument
|
/external/chromium_org/components/nacl/browser/ |
H A D | nacl_broker_host_win.cc | 97 int32 pid, base::ProcessHandle process_handle, 106 pid, handle_in_broker_process, startup_info)); 109 void NaClBrokerHost::OnDebugExceptionHandlerLaunched(int32 pid, bool success) { argument 110 NaClBrokerService::GetInstance()->OnDebugExceptionHandlerLaunched(pid, 96 LaunchDebugExceptionHandler( int32 pid, base::ProcessHandle process_handle, const std::string& startup_info) argument
|
H A D | nacl_broker_service_win.cc | 73 base::WeakPtr<NaClProcessHost> nacl_process_host, int32 pid, 75 pending_debuggers_[pid] = nacl_process_host; 79 return broker_host->LaunchDebugExceptionHandler(pid, process_handle, 83 void NaClBrokerService::OnDebugExceptionHandlerLaunched(int32 pid, argument 85 PendingDebugExceptionHandlersMap::iterator it = pending_debuggers_.find(pid); 72 LaunchDebugExceptionHandler( base::WeakPtr<NaClProcessHost> nacl_process_host, int32 pid, base::ProcessHandle process_handle, const std::string& startup_info) argument
|
/external/chromium_org/components/nacl/loader/nonsfi/ |
H A D | nonsfi_sandbox_unittest.cc | 100 const int pid = syscall(__NR_clone, SIGCHLD, NULL); local 101 if (pid == 0) 103 return pid; 108 const int pid = DoFork(); local 109 ASSERT_LT(0, pid); 111 ASSERT_EQ(pid, HANDLE_EINTR(waitpid(pid, &status, 0)));
|
/external/chromium_org/content/browser/ssl/ |
H A D | ssl_policy.cc | 234 void SSLPolicy::OriginRanInsecureContent(const std::string& origin, int pid) { argument 237 backend_->HostRanInsecureContent(parsed_origin.host(), pid);
|
/external/chromium_org/content/browser/ |
H A D | tcmalloc_internals_request_job.cc | 27 base::ProcessId pid, int process_type, 30 base::StringAppendF(&header, " PID %d", static_cast<int>(pid)); 26 OnStatsForChildProcess( base::ProcessId pid, int process_type, const std::string& output) argument
|
/external/chromium_org/ipc/mojo/ |
H A D | ipc_channel_mojo.h | 123 void set_peer_pid(base::ProcessId pid) { peer_pid_ = pid; } argument
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
H A D | syscall_parameters_restrictions_unittests.cc | 104 // the init process (pid=1). If kernel supports this feature, 161 void CheckSchedGetParam(pid_t pid, struct sched_param* param) { argument 162 BPF_ASSERT_EQ(0, sched_getparam(pid, param)); 166 const pid_t pid = getpid(); local 168 BPF_ASSERT_NE(pid, tid); 171 CheckSchedGetParam(pid, ¤t_pid_param); 193 // Run the actual test in a new thread so that the current pid and tid are
|