/external/chromium_org/content/browser/gamepad/ |
H A D | gamepad_provider.cc | 67 base::ProcessHandle process) { 69 gamepad_shared_memory_.ShareToProcess(process, &renderer_handle); 66 GetSharedMemoryHandleForProcess( base::ProcessHandle process) argument
|
/external/chromium_org/content/public/test/ |
H A D | test_renderer_host.cc | 128 MockRenderProcessHost* RenderViewHostTestHarness::process() { function in class:content::RenderViewHostTestHarness
|
/external/chromium_org/extensions/browser/api/declarative/ |
H A D | rules_registry_service.cc | 165 // Thus, |embedder_process_id| == |process_id| ==> the process ID is a 229 content::RenderProcessHost* process = local 231 RemoveWebViewRulesRegistries(process->GetID());
|
/external/chromium_org/extensions/browser/ |
H A D | event_listener_map.cc | 23 content::RenderProcessHost* process, 26 event_name, extension_id, GURL(), process, filter.Pass())); 33 content::RenderProcessHost* process, 36 new EventListener(event_name, "", listener_url, process, filter.Pass())); 75 content::RenderProcessHost* process, 80 process_(process), 165 bool EventListenerMap::HasProcessListener(content::RenderProcessHost* process, argument 171 if ((*it2)->process() == process && 249 const content::RenderProcessHost* process) { 20 ForExtension( const std::string& event_name, const std::string& extension_id, content::RenderProcessHost* process, scoped_ptr<base::DictionaryValue> filter) argument 30 ForURL( const std::string& event_name, const GURL& listener_url, content::RenderProcessHost* process, scoped_ptr<base::DictionaryValue> filter) argument 72 EventListener(const std::string& event_name, const std::string& extension_id, const GURL& listener_url, content::RenderProcessHost* process, scoped_ptr<DictionaryValue> filter) argument 248 RemoveListenersForProcess( const content::RenderProcessHost* process) argument [all...] |
H A D | event_listener_map_unittest.cc | 30 content::RenderProcessHost*, // process 92 content::RenderProcessHost* process, 95 event_name, extension_id, process, make_scoped_ptr(filter)); 101 content::RenderProcessHost* process, 104 event_name, listener_url, process, make_scoped_ptr(filter)); 89 CreateEventListenerForExtension( const std::string& extension_id, const std::string& event_name, content::RenderProcessHost* process, base::DictionaryValue* filter) argument 98 CreateEventListenerForURL( const GURL& listener_url, const std::string& event_name, content::RenderProcessHost* process, base::DictionaryValue* filter) argument
|
H A D | extension_message_filter.cc | 114 RenderProcessHost* process = RenderProcessHost::FromID(render_process_id_); local 115 if (!process) 122 router->AddEventListener(event_name, process, extension_id); 124 router->AddEventListenerForURL(event_name, process, listener_url); 135 RenderProcessHost* process = RenderProcessHost::FromID(render_process_id_); local 136 if (!process) 143 router->RemoveEventListener(event_name, process, extension_id); 145 router->RemoveEventListenerForURL(event_name, process, listener_url); 226 RenderProcessHost* process = RenderProcessHost::FromID(render_process_id_); local 227 if (!process) 241 RenderProcessHost* process = RenderProcessHost::FromID(render_process_id_); local 269 RenderProcessHost* process = RenderProcessHost::FromID(render_process_id_); local [all...] |
/external/chromium_org/sandbox/win/src/ |
H A D | process_thread_dispatcher.cc | 27 // The create process call is smarter than us. It tries really hard to launch 28 // the process even if the command line is wrong. For example: 180 bool ThreadProcessDispatcher::NtOpenProcessToken(IPCInfo* ipc, HANDLE process, argument 184 process, desired_access, 191 bool ThreadProcessDispatcher::NtOpenProcessTokenEx(IPCInfo* ipc, HANDLE process, argument 196 process, 236 // If our logic was wrong, at least we wont allow create a random process.
|
H A D | process_thread_interception.cc | 21 // open a thread in the same process. 40 // We support only the calls for the current process 80 // in the broker we set the process id in the CID (client ID) param 81 // to be the current process. If you try to open a thread from another 82 // process you will get this INVALID_CID error. On the other hand, if you 83 // try to open a thread in your own process, it should return success. 103 // open the current process. 105 PHANDLE process, ACCESS_MASK desired_access, 108 NTSTATUS status = orig_OpenProcess(process, desired_access, object_attributes, 142 if (!ValidParameter(process, sizeo 104 TargetNtOpenProcess(NtOpenProcessFunction orig_OpenProcess, PHANDLE process, ACCESS_MASK desired_access, POBJECT_ATTRIBUTES object_attributes, PCLIENT_ID client_id) argument 173 TargetNtOpenProcessToken( NtOpenProcessTokenFunction orig_OpenProcessToken, HANDLE process, ACCESS_MASK desired_access, PHANDLE token) argument 217 TargetNtOpenProcessTokenEx( NtOpenProcessTokenExFunction orig_OpenProcessTokenEx, HANDLE process, ACCESS_MASK desired_access, ULONG handle_attributes, PHANDLE token) argument [all...] |
H A D | process_thread_policy.cc | 20 // process for the process created by the broker. All others are potential 35 // Creates a child process and duplicates the handles to 'target_process'. The 79 scoped_ptr<PolicyRule> process; local 82 process.reset(new PolicyRule(GIVE_READONLY)); 86 process.reset(new PolicyRule(GIVE_ALLACCESS)); 94 if (!process->AddStringMatch(IF, NameBased::NAME, name, CASE_INSENSITIVE)) { 97 if (!policy->AddRule(IPC_CREATEPROCESSW_TAG, process.get())) { 125 client_info.process, handle, 0, FALSE, 156 client_info.process, handl 165 OpenProcessTokenAction(const ClientInfo& client_info, HANDLE process, uint32 desired_access, HANDLE* handle) argument 189 OpenProcessTokenExAction(const ClientInfo& client_info, HANDLE process, uint32 desired_access, uint32 attributes, HANDLE* handle) argument [all...] |
H A D | target_process.cc | 81 // Give a chance to the process to die. In most cases the JOB_KILL_ON_CLOSE 84 // If this process is already dead, the function will return without waiting. 85 // TODO(nsylvain): If the process is still alive at the end, we should kill 93 // It is an error to destroy this object while the target process is still 104 // ipc_server_ references our process handle, so make sure the former is shut 109 // Creates the target (child) process suspended and assigns it to the job 121 // Start the target process suspended. 163 // Change the token of the main thread of the new process for the 328 TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address) { argument 331 process_info.hProcess = process; [all...] |
/external/chromium_org/sandbox/win/tests/common/ |
H A D | controller.cc | 9 #include "base/process/process.h" 54 bool IsProcessRunning(HANDLE process) { argument 56 if (::GetExitCodeProcess(process, &exit_code)) 197 // For simplicity TestRunner supports only one process per instance. 205 // Get the path to the sandboxed process. 209 // Launch the sandboxed process. 245 // Don't kill the target process on a time-out while we are debugging.
|
H A D | controller.h | 23 // All the possible error codes returned by the child process in 95 // Starts a child process in the sandbox and ask it to run |command|. Returns 102 // Sets TestRunner to return without waiting for the process to exit. 105 // Sets TestRunner to return without waiting for the process to exit. 111 // Sets a flag whether the process should be killed when the TestRunner is 121 // Returns the process handle for an asynchronous test. 122 HANDLE process() { return target_process_.Get(); } function in class:sandbox::TestRunner 124 // Returns the process ID for an asynchronous test. 154 // Runs the given test on the target process.
|
/external/chromium_org/sandbox/win/tests/validation_tests/ |
H A D | commands.cc | 101 HANDLE process = ::OpenProcess(access_mask, local 104 if (NULL == process) { 111 ::CloseHandle(process); 321 // We need to give the broker a chance to kill our process on failure.
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
H A D | HTMLMetaElement-in.cpp | 428 process(); 444 process(); 455 void HTMLMetaElement::process() function in class:blink::HTMLMetaElement 479 // Get the document to process the tag, but only if we're actually part of DOM
|
/external/chromium_org/third_party/WebKit/Source/modules/webaudio/ |
H A D | OscillatorNode.cpp | 219 void OscillatorNode::process(size_t framesToProcess) function in class:blink::OscillatorNode 336 // This synchronizes with process().
|
/external/chromium_org/third_party/WebKit/Source/modules/webmidi/ |
H A D | MIDIOutput.cpp | 57 return validator.process(exceptionState, sysexEnabled); 65 bool process(ExceptionState& exceptionState, bool sysexEnabled) function in class:blink::__anon11224::MessageValidator
|
/external/chromium_org/third_party/WebKit/Source/platform/audio/ |
H A D | Reverb.cpp | 130 // For "True" stereo processing we allocate a temporary buffer to avoid repeatedly allocating it in the process() method. 136 void Reverb::process(const AudioBus* sourceBus, AudioBus* destinationBus, size_t framesToProcess) function in class:blink::Reverb 165 m_convolvers[0]->process(sourceChannelL, destinationChannelL, framesToProcess); 166 m_convolvers[1]->process(sourceChannelR, destinationChannelR, framesToProcess); 171 m_convolvers[i]->process(sourceChannelL, destinationChannel, framesToProcess); 175 m_convolvers[0]->process(sourceChannelL, destinationChannelL, framesToProcess); 186 m_convolvers[0]->process(sourceChannelL, destinationChannelL, framesToProcess); 196 m_convolvers[0]->process(sourceChannelL, destinationChannelL, framesToProcess); 197 m_convolvers[1]->process(sourceChannelL, destinationChannelR, framesToProcess); 200 m_convolvers[2]->process(sourceChannel [all...] |
/external/chromium_org/third_party/libjpeg_turbo/ |
H A D | rdjpgcom.c | 111 #define M_SOF1 0xC1 /* N indicates which compression process */ 192 * want to process. 287 const char * process; local 298 case M_SOF0: process = "Baseline"; break; 299 case M_SOF1: process = "Extended sequential"; break; 300 case M_SOF2: process = "Progressive"; break; 301 case M_SOF3: process = "Lossless"; break; 302 case M_SOF5: process = "Differential sequential"; break; 303 case M_SOF6: process = "Differential progressive"; break; 304 case M_SOF7: process [all...] |
/external/chromium_org/third_party/libvpx/source/libvpx/build/make/ |
H A D | configure.sh | 1388 process() { function
|
/external/chromium_org/third_party/mesa/src/src/glsl/ |
H A D | link_uniforms.cpp | 61 uniform_field_visitor::process(ir_variable *var) function in class:uniform_field_visitor 250 process(var); 573 /* FINISHME: Update code to process built-in uniforms! 578 uniform_size.process(var); 618 /* FINISHME: Update code to process built-in uniforms!
|
/external/chromium_org/third_party/tcmalloc/chromium/src/windows/ |
H A D | nm-pdb.c | 116 static void ShowSymbolInfo(HANDLE process, ULONG64 module_base) { argument 123 getmoduleinfo_rv = SymGetModuleInfo64(process, module_base, &module_info); 185 HANDLE process; local 208 process = GetCurrentProcess(); 210 if (!SymInitialize(process, NULL, FALSE)) { 217 if (SymGetSearchPath(process, search, SEARCH_CAP)) { 220 SymCleanup(process); 230 if (!SymSetSearchPath(process, search)) { 237 module_base = SymLoadModuleEx(process, NULL, filename, NULL, 0, 0, NULL, 0); 243 SymCleanup(process); [all...] |
/external/chromium_org/third_party/tcmalloc/vendor/src/windows/ |
H A D | nm-pdb.c | 116 static void ShowSymbolInfo(HANDLE process, ULONG64 module_base) { argument 123 getmoduleinfo_rv = SymGetModuleInfo64(process, module_base, &module_info); 189 HANDLE process; local 215 process = GetCurrentProcess(); 217 if (!SymInitialize(process, NULL, FALSE)) { 224 if (SymGetSearchPath(process, search, SEARCH_CAP)) { 227 SymCleanup(process); 237 if (!SymSetSearchPath(process, search)) { 244 module_base = SymLoadModuleEx(process, NULL, filename, NULL, 0, 0, NULL, 0); 250 SymCleanup(process); [all...] |
/external/deqp/framework/platform/android/ |
H A D | tcuAndroidExecService.cpp | 212 DE_UNREF(res); // Failure to kill process is ignored. 227 // On Android process launch is asynchronous so we don't want to poll for process until after some time. 260 // Timeout, kill process. 328 ServerThread::ServerThread (JavaVM* vm, xs::TestProcess* process, deSocketFamily family, int port) argument 329 : m_server(vm, process, family, port, xs::ExecutionServer::RUNMODE_FOREVER)
|
/external/dexmaker/src/dx/java/com/android/dx/ssa/ |
H A D | EscapeAnalysis.java | 110 * @param ssaMeth method to process 206 * @param ssaMethod {@code non-null;} method to process 208 public static void process(SsaMethod ssaMethod) { method in class:EscapeAnalysis 216 * @param insn {@code non-null;} instruction to process 248 * @param insn {@code non-null;} move result pseudo instruction to process 357 * process for this object 390 * process for this object
|
H A D | SCCP.java | 59 /** Worklist for SSA edges. This is a list of registers to process */ 89 * @param ssaMethod Method to process 91 public static void process (SsaMethod ssaMethod) { method in class:SCCP
|