/vbox/src/VBox/ExtPacks/VBoxDTrace/onnv/cmd/dtrace/test/tst/i386/pid/ |
H A D | tst.retlist.ksh | 32 PID=$! 41 match=`$dtrace -l -n pid$PID:a.out:simple: -n pid$PID:a.out:complex: | wc -l` 43 kill $PID
|
/vbox/src/VBox/Installer/linux/testcase/ |
H A D | tstHeadlessXOrg.sh | 42 PID="$1" ## The PID we are waiting for. 47 { sleep "${TIME_OUT}"; kill "${PID}" 2>/dev/null; } & 49 wait "${PID}" 133 PID=$! 134 expect_exit "${PID}" 5 test_simple_start_up 155 PID=$! 156 expect_exit "${PID}" 5 test_should_fail 167 PID=$! 168 expect_exit "${PID}" [all...] |
/vbox/src/libs/xpcom18a4/ipc/ipcd/daemon/src/ |
H A D | ipcClient.h | 85 PRUint32 PID() const { return mPID; } function in class:ipcClient 123 // on windows, we store the PID of the client process to help us determine 124 // the client from which a message originated. each message has the PID
|
H A D | ipcdWin.cpp | 116 i, client->ID(), client->PID())); 118 IPC_GetClientWindowName(client->PID(), wName); 164 if (ipcClientArray[i].PID() == pid) 208 client->ID(), client->PID())); 247 // grab client PID and hwnd.
|
/vbox/src/VBox/ExtPacks/VBoxDTrace/onnv/cmd/dtrace/demo/udp/ |
H A D | udptop.d | 8 * This analyses UDP network packets and prints the responsible PID plus 104 "ZONE", "PID", "LADDR", "LPORT", "RADDR", "RPORT", "SIZE");
|
/vbox/src/VBox/Installer/linux/ |
H A D | vboxballoonctrl-service.sh | 319 PID=`pidof $binary 2>/dev/null` 320 if [ -n "$PID" ]; then 321 echo "$PID" > $PIDFILE
|
H A D | vboxweb-service.sh | 332 PID=`pidof $binary 2>/dev/null` 333 if [ -n "$PID" ]; then 334 echo "$PID" > $PIDFILE
|
/vbox/src/VBox/Frontends/VirtualBox/src/platform/os2/ |
H A D | VBoxHlp.asm | 22 ; 02-03-2008 22:19:37 SYS3175 PID 4383 TID 0001 Slot 0076
|
/vbox/src/VBox/Installer/linux/scripts/ |
H A D | VBoxHeadlessXOrg.sh | 222 trap "kill \${PID}; sleep 5; kill -KILL \${PID} 2>/dev/null" ${EXIT_SIGNALS} 224 PID="$!"
|
/vbox/src/libs/xpcom18a4/nsprpub/pr/src/md/os2/ |
H A D | os2vacpp.asm | 73 implementation to hold the TID:PID in the lower 31 bits and the lock 120 ;;; EAX - packed TID:PID word 197 jnz short rel_ownerok ; getting/checking PID/TID
|
H A D | os2misc.c | 269 PID pid = 0; 547 PID pidEnded = 0;
|
/vbox/src/VBox/Runtime/r3/os2/ |
H A D | sems-os2.cpp | 373 PID pid;
|
/vbox/src/VBox/Devices/Network/ |
H A D | DevE1000Phy.cpp | 99 { 2, Phy::regReadDefault , Phy::regWriteForbidden , "PID" , "PHY Identifier" }, 300 REG(PID) = 0x0141;
|
/vbox/src/VBox/Frontends/VBoxManage/ |
H A D | VBoxManageGuestCtrlListener.cpp | 135 CHECK_ERROR_BREAK(pProcess, COMGETTER(PID)(&uPID)); 137 RTPrintf("Process PID=%RU32 \"%s\" changed status to [%s]\n",
|
H A D | VBoxManageGuestCtrl.cpp | 384 " <PID> ... <PID n>\n" 391 " <PID> ... <PID n>\n" 1341 CHECK_ERROR_BREAK(pProcess, COMGETTER(PID)(&uPID)); 1344 RTPrintf("Process '%s' (PID %RU32) started\n", 1349 /* Just print plain PID to make it easier for scripts 3432 CHECK_ERROR_BREAK(pCurProcess, COMGETTER(PID)(&uPID)); 3438 RTPrintf("\n\t\tProcess #%-03zu PID=%-6RU32 Status=[%s] Command=%ls", 3498 "Must specify at least a PID t [all...] |
/vbox/src/libs/xpcom18a4/nsprpub/pr/include/md/ |
H A D | _os2.h | 217 PID pid;
|
/vbox/src/VBox/ValidationKit/tests/additions/ |
H A D | tdAddGuestCtrl.py | 1016 reporter.log2('Process (PID %ld) started, waiting for termination (%dms), waitFlags=%s ...' \ 1017 % (curProc.PID, oTest.timeoutMS, fWaitFor)); 1028 reporter.log2('Process (PID %ld) got %ld bytes of stdout data' % (curProc.PID, len(buf))); 1037 reporter.log2('Process (PID %ld) got %ld bytes of stderr data' % (curProc.PID, len(buf))); 1043 pass; #reporter.log2('Process (PID %ld) needs stdin data' % (curProc.pid,)); 1048 reporter.log2('Process (PID %ld) reported terminate/error/timeout: %ld, status: %ld' \ 1049 % (curProc.PID, waitResult, curProc.status)); 1054 reporter.log2('Final process status (PID [all...] |
/vbox/src/VBox/Main/src-server/ |
H A D | ClientWatcher.cpp | 401 PID pid; TID tid;
|
H A D | MachineImpl.cpp | 3319 // get the caller's session PID 3322 pSessionControl->COMGETTER(PID)((ULONG*)&pid); 3364 tr("An unexpected process (PID=0x%08X) has tried to lock the " 3365 "machine '%s', while only the process started by LaunchVMProcess (PID=0x%08X) is allowed"), 3409 * acquire the lock again, will fail because of the wrong PID. 3505 /* memorize PID of the directly opened session */ 7696 * too fast and call LockMachine() that will fail (because of PID, etc.), 7845 /* PID not yet initialized, skip check. */
|
/vbox/src/VBox/Main/src-client/ |
H A D | GuestSessionImpl.cpp | 1791 HRESULT hr = pProcess->COMGETTER(PID)(&uPID); 1794 LogFlowFunc(("Removing process (PID=%RU32) ...\n", uPID)); 1811 hr = pProc->COMGETTER(PID)(&uPID); 1816 LogFlowFunc(("Removing process ID=%RU32 (Session: %RU32), guest PID=%RU32 (now total %zu processes, %RU32 objects)\n", 1949 0 /* PID */, true /* Process registered */); 1985 HRESULT hr = pCurProc->COMGETTER(PID)(&uCurPID); 3423 LogFlowThisFunc(("PID=%RU32\n", aPid)); 3426 return setError(E_INVALIDARG, tr("No valid process ID (PID) specified")); 3435 hr = setError(E_INVALIDARG, tr("No process with PID %RU32 found"), aPid);
|
/vbox/src/VBox/Frontends/VBoxShell/ |
H A D | vboxshell.py | 1127 print "executed with pid %d" % (process.PID)
|
/vbox/src/VBox/Main/cbinding/ |
H A D | VBoxCAPI_v4_2.h | 4969 nsresult (*GetPID)(IProcess *pThis, PRUint32 *PID);
|
H A D | VBoxCAPI_v4_3.h | 9382 nsresult (*GetPID)(IProcess *pThis, PRUint32 *PID); 9452 nsresult (*GetPID)(IProcess *pThis, PRUint32 *PID); 9574 nsresult (*GetPID)(IGuestProcess *pThis, PRUint32 *PID);
|