Searched refs:PID (Results 1 - 23 of 23) sorted by relevance

/vbox/src/VBox/ExtPacks/VBoxDTrace/onnv/cmd/dtrace/test/tst/i386/pid/
H A Dtst.retlist.ksh32 PID=$!
41 match=`$dtrace -l -n pid$PID:a.out:simple: -n pid$PID:a.out:complex: | wc -l`
43 kill $PID
/vbox/src/VBox/Installer/linux/testcase/
H A DtstHeadlessXOrg.sh42 PID="$1" ## The PID we are waiting for.
47 { sleep "${TIME_OUT}"; kill "${PID}" 2>/dev/null; } &
49 wait "${PID}"
133 PID=$!
134 expect_exit "${PID}" 5 test_simple_start_up
155 PID=$!
156 expect_exit "${PID}" 5 test_should_fail
167 PID=$!
168 expect_exit "${PID}"
[all...]
/vbox/src/libs/xpcom18a4/ipc/ipcd/daemon/src/
H A DipcClient.h85 PRUint32 PID() const { return mPID; } function in class:ipcClient
123 // on windows, we store the PID of the client process to help us determine
124 // the client from which a message originated. each message has the PID
H A DipcdWin.cpp116 i, client->ID(), client->PID()));
118 IPC_GetClientWindowName(client->PID(), wName);
164 if (ipcClientArray[i].PID() == pid)
208 client->ID(), client->PID()));
247 // grab client PID and hwnd.
/vbox/src/VBox/ExtPacks/VBoxDTrace/onnv/cmd/dtrace/demo/udp/
H A Dudptop.d8 * This analyses UDP network packets and prints the responsible PID plus
104 "ZONE", "PID", "LADDR", "LPORT", "RADDR", "RPORT", "SIZE");
/vbox/src/VBox/Installer/linux/
H A Dvboxballoonctrl-service.sh319 PID=`pidof $binary 2>/dev/null`
320 if [ -n "$PID" ]; then
321 echo "$PID" > $PIDFILE
H A Dvboxweb-service.sh332 PID=`pidof $binary 2>/dev/null`
333 if [ -n "$PID" ]; then
334 echo "$PID" > $PIDFILE
/vbox/src/VBox/Frontends/VirtualBox/src/platform/os2/
H A DVBoxHlp.asm22 ; 02-03-2008 22:19:37 SYS3175 PID 4383 TID 0001 Slot 0076
/vbox/src/VBox/Installer/linux/scripts/
H A DVBoxHeadlessXOrg.sh222 trap "kill \${PID}; sleep 5; kill -KILL \${PID} 2>/dev/null" ${EXIT_SIGNALS}
224 PID="$!"
/vbox/src/libs/xpcom18a4/nsprpub/pr/src/md/os2/
H A Dos2vacpp.asm73 implementation to hold the TID:PID in the lower 31 bits and the lock
120 ;;; EAX - packed TID:PID word
197 jnz short rel_ownerok ; getting/checking PID/TID
H A Dos2misc.c269 PID pid = 0;
547 PID pidEnded = 0;
/vbox/src/VBox/Runtime/r3/os2/
H A Dsems-os2.cpp373 PID pid;
/vbox/src/VBox/Devices/Network/
H A DDevE1000Phy.cpp99 { 2, Phy::regReadDefault , Phy::regWriteForbidden , "PID" , "PHY Identifier" },
300 REG(PID) = 0x0141;
/vbox/src/VBox/Frontends/VBoxManage/
H A DVBoxManageGuestCtrlListener.cpp135 CHECK_ERROR_BREAK(pProcess, COMGETTER(PID)(&uPID));
137 RTPrintf("Process PID=%RU32 \"%s\" changed status to [%s]\n",
H A DVBoxManageGuestCtrl.cpp384 " <PID> ... <PID n>\n"
391 " <PID> ... <PID n>\n"
1341 CHECK_ERROR_BREAK(pProcess, COMGETTER(PID)(&uPID));
1344 RTPrintf("Process '%s' (PID %RU32) started\n",
1349 /* Just print plain PID to make it easier for scripts
3432 CHECK_ERROR_BREAK(pCurProcess, COMGETTER(PID)(&uPID));
3438 RTPrintf("\n\t\tProcess #%-03zu PID=%-6RU32 Status=[%s] Command=%ls",
3498 "Must specify at least a PID t
[all...]
/vbox/src/libs/xpcom18a4/nsprpub/pr/include/md/
H A D_os2.h217 PID pid;
/vbox/src/VBox/ValidationKit/tests/additions/
H A DtdAddGuestCtrl.py1016 reporter.log2('Process (PID %ld) started, waiting for termination (%dms), waitFlags=%s ...' \
1017 % (curProc.PID, oTest.timeoutMS, fWaitFor));
1028 reporter.log2('Process (PID %ld) got %ld bytes of stdout data' % (curProc.PID, len(buf)));
1037 reporter.log2('Process (PID %ld) got %ld bytes of stderr data' % (curProc.PID, len(buf)));
1043 pass; #reporter.log2('Process (PID %ld) needs stdin data' % (curProc.pid,));
1048 reporter.log2('Process (PID %ld) reported terminate/error/timeout: %ld, status: %ld' \
1049 % (curProc.PID, waitResult, curProc.status));
1054 reporter.log2('Final process status (PID
[all...]
/vbox/src/VBox/Main/src-server/
H A DClientWatcher.cpp401 PID pid; TID tid;
H A DMachineImpl.cpp3319 // get the caller's session PID
3322 pSessionControl->COMGETTER(PID)((ULONG*)&pid);
3364 tr("An unexpected process (PID=0x%08X) has tried to lock the "
3365 "machine '%s', while only the process started by LaunchVMProcess (PID=0x%08X) is allowed"),
3409 * acquire the lock again, will fail because of the wrong PID.
3505 /* memorize PID of the directly opened session */
7696 * too fast and call LockMachine() that will fail (because of PID, etc.),
7845 /* PID not yet initialized, skip check. */
/vbox/src/VBox/Main/src-client/
H A DGuestSessionImpl.cpp1791 HRESULT hr = pProcess->COMGETTER(PID)(&uPID);
1794 LogFlowFunc(("Removing process (PID=%RU32) ...\n", uPID));
1811 hr = pProc->COMGETTER(PID)(&uPID);
1816 LogFlowFunc(("Removing process ID=%RU32 (Session: %RU32), guest PID=%RU32 (now total %zu processes, %RU32 objects)\n",
1949 0 /* PID */, true /* Process registered */);
1985 HRESULT hr = pCurProc->COMGETTER(PID)(&uCurPID);
3423 LogFlowThisFunc(("PID=%RU32\n", aPid));
3426 return setError(E_INVALIDARG, tr("No valid process ID (PID) specified"));
3435 hr = setError(E_INVALIDARG, tr("No process with PID %RU32 found"), aPid);
/vbox/src/VBox/Frontends/VBoxShell/
H A Dvboxshell.py1127 print "executed with pid %d" % (process.PID)
/vbox/src/VBox/Main/cbinding/
H A DVBoxCAPI_v4_2.h4969 nsresult (*GetPID)(IProcess *pThis, PRUint32 *PID);
H A DVBoxCAPI_v4_3.h9382 nsresult (*GetPID)(IProcess *pThis, PRUint32 *PID);
9452 nsresult (*GetPID)(IProcess *pThis, PRUint32 *PID);
9574 nsresult (*GetPID)(IGuestProcess *pThis, PRUint32 *PID);

Completed in 633 milliseconds