Lines Matching refs:dotoprocs
58 * is called indirectly through the dotoprocs() function which
69 * which is called indirectly through dotoprocs().
307 * dotoprocs(). The underlying classes expect pidlock to
338 * The dotoprocs() call below will cause
345 error1 = dotoprocs(&procset, setparms,
371 * EPERM in stp_error so dotoprocs() will
373 * dotoprocs() returned an error above, it was
374 * more serious than permissions and dotoprocs
469 * dotoprocs(). proccmp() will call a class
473 * dotoprocs() function, the proccmp() function,
489 error1 = dotoprocs(&procset, proccmp,
534 * dotoprocs() ignores the init process if it is
552 * If dotoprocs returned success it found at least
755 * code through the dotoprocs function. Basic strategy is dotoprocs()
757 * specific function to compare the current thread from dotoprocs to the
875 * through the dotoprocs() function. setparms() acts as an
876 * intermediary between dotoprocs() and the parmsset() function,
878 * the error returns on their way back up to dotoprocs().
1016 err_proc = dotoprocs(procset, setprocnice, (char *)pcnice);
1030 * returned by the previous dotoprocs() call.
1037 * dotoprocs() ignores the init process if it is in the set, unless
1189 err_proc = dotoprocs(procset, setprocprio, (char *)pcprio);
1203 * returned by the previous dotoprocs() call.
1210 * dotoprocs() ignores the init process if it is in the set, unless