Home
last modified time | relevance | path

Searched refs:stdin_read (Results 1 – 6 of 6) sorted by relevance

/external/python/cpython3/Lib/
Dpty.py130 def _copy(master_fd, master_read=_read, stdin_read=_read): argument
145 data = stdin_read(STDIN_FILENO)
151 def spawn(argv, master_read=_read, stdin_read=_read): argument
166 _copy(master_fd, master_read, stdin_read)
/external/python/cpython2/Lib/
Dpty.py140 def _copy(master_fd, master_read=_read, stdin_read=_read): argument
155 data = stdin_read(STDIN_FILENO)
161 def spawn(argv, master_read=_read, stdin_read=_read): argument
175 _copy(master_fd, master_read, stdin_read)
/external/compiler-rt/lib/sanitizer_common/
Dsanitizer_symbolizer_win.cc172 ScopedHandle stdin_read, stdin_write; in StartSymbolizerSubprocess() local
178 if (!::CreatePipe(stdin_read.receive(), stdin_write.receive(), &attrs, 0) || in StartSymbolizerSubprocess()
216 si.hStdInput = stdin_read.get(); in StartSymbolizerSubprocess()
/external/python/cpython3/Doc/library/
Dpty.rst42 .. function:: spawn(argv[, master_read[, stdin_read]])
50 The functions *master_read* and *stdin_read* are passed a file descriptor
58 process, and *stdin_read* is passed file descriptor 0, to read from the
63 that. If *stdin_read* signals EOF the controlling terminal can no longer
/external/llvm-project/compiler-rt/lib/sanitizer_common/
Dsanitizer_symbolizer_win.cpp202 ScopedHandle stdin_read, stdin_write; in StartSymbolizerSubprocess() local
208 if (!::CreatePipe(stdin_read.receive(), stdin_write.receive(), &attrs, 0) || in StartSymbolizerSubprocess()
246 si.hStdInput = stdin_read.get(); in StartSymbolizerSubprocess()
/external/python/cpython2/Doc/library/
Dpty.rst39 .. function:: spawn(argv[, master_read[, stdin_read]])
45 The functions *master_read* and *stdin_read* should be functions which read from