/external/lldb/test/pexpect-2.4/examples/ |
ftp.py | 12 child = pexpect.spawn('ftp ftp.openbsd.org') variable 13 child.expect('(?i)name .*: ') 14 child.sendline('anonymous') 15 child.expect('(?i)password') 16 child.sendline('pexpect@sourceforge.net') 17 child.expect('ftp> ') 18 child.sendline('cd /pub/OpenBSD/3.7/packages/i386') 19 child.expect('ftp> ') 20 child.sendline('bin') 21 child.expect('ftp> ' [all...] |
df.py | 12 child = pexpect.spawn ('df') variable 18 i = child.expect ([pattern, pexpect.EOF]) 20 filesystem_list.append (child.match.groups())
|
/external/ltrace/testsuite/ltrace.minor/ |
trace-fork.c | 2 Objectives : Verify that ltrace can trace to child process after 11 child () function 13 printf("Fork Child\n"); 26 child(); 29 printf("My child pid is %d\n",pid);
|
trace-clone.c | 2 Objectives : Verify that ltrace can trace to child process after 13 int child () function 29 pid = __clone2((myfunc)&child, stack, STACK_SIZE, CLONE_FS, NULL); 31 pid = clone((myfunc)&child, stack + STACK_SIZE, CLONE_FS, NULL);
|
/external/strace/test/ |
clone.c | 9 int child(void* arg) function 18 clone(child, stack+4000, CLONE_VM|CLONE_FS|CLONE_FILES, NULL);
|
childthread.c | 1 /* Test exit of a child of a TCB_EXITING child where the toplevel process starts 26 pid_t child, got_pid; local 30 child = fork(); 32 switch (child) { 38 /* The thread must be initialized, it becomes thread-child of this 39 process-child (child of a child of the toplevel process). */ 41 /* Here the child TCB cannot be deallocated as there still exis [all...] |
sigkill_rain.c | 40 /* child */ 41 int child = getpid(); local 51 /* grandchild: kill child */ 52 kill(child, SIGKILL);
|
/external/valgrind/main/helgrind/tests/ |
tc02_simple_tls.c | 6 /* Simple test program, no race: parent only modified x after child 14 /* Unprotected relative to parent, but in child's segment only */ 21 pthread_t child; local 25 if (pthread_create(&child, NULL, child_fn, NULL)) { 30 if (pthread_join(child, NULL)) {
|
tc01_simple_race.c | 6 /* Simple test program, has a race. Parent and child both modify x 21 pthread_t child; local 22 if (pthread_create(&child, NULL, child_fn, NULL)) { 27 /* Unprotected relative to child */ 30 if (pthread_join(child, NULL)) {
|
tc05_simple_race.c | 6 /* Simple test program, has a race. Parent and child both modify y 26 pthread_t child; local 27 if (pthread_create(&child, NULL, child_fn, NULL)) { 38 if (pthread_join(child, NULL)) {
|
tc06_two_races.c | 24 pthread_t child; local 26 if (pthread_create(&child, NULL, child_fn, NULL)) { 37 if (pthread_join(child, NULL)) {
|
tc16_byterace.c | 13 bytes[2*i + 0] ++; /* child accesses: 0 2 4 6 8 */ 21 pthread_t child; local 22 if (pthread_create(&child, NULL, child_fn, NULL)) { 27 /* Unprotected relative to child, but harmless, since different 32 /* Unprotected relative to child, but harmful; same bytes */ 36 if (pthread_join(child, NULL)) {
|
/external/elfutils/0.153/libelf/ |
elf_readall.c | 69 Elf *child = elf->state.ar.children; local 71 while (child != NULL) 73 if (child->map_address == NULL) 75 child->map_address = elf->map_address; 76 child->start_offset -= offset; 77 if (child->kind == ELF_K_AR) 78 child->state.ar.offset -= offset; 80 set_address (child, offset); 83 child = child->next [all...] |
/external/valgrind/main/memcheck/tests/ |
noisy_child.c | 22 pid_t child; local 29 child = fork(); 30 assert(child != -1); /* assert fork did not fail */ 32 if (child == 0) { 33 /* I am the child */
|
err_disable3.c | 2 /* Check that a child thread doesn't inherit its parent's disablement 39 pthread_t child; local 49 fprintf(stderr, "\n--------- p: creating child ---------\n\n"); 51 r = pthread_create(&child, NULL, child_fn, NULL); 53 sleep(1); // let the child run first (determinism fix) 54 fprintf(stderr, "\n--------- p: join child ---------\n\n"); 55 r = pthread_join(child, NULL);
|
/external/chromium_org/third_party/WebKit/Source/core/editing/ |
RemoveNodePreservingChildrenCommand.cpp | 45 for (Node* child = m_node->firstChild(); child; child = child->nextSibling()) 46 children.append(child); 50 RefPtrWillBeRawPtr<Node> child = children[i].release(); local 51 removeNode(child, m_shouldAssumeContentIsAlwaysEditable); 52 insertNodeBefore(child.release(), m_node, m_shouldAssumeContentIsAlwaysEditable);
|
/external/chromium_org/third_party/skia/src/svg/ |
SkSVGClipPath.cpp | 28 SkSVGElement* child = *fChildren.begin(); local 29 SkASSERT(child->getType() == SkSVGType_Use); 30 SkSVGUse* use = (SkSVGUse*) child;
|
/external/chromium_org/ui/compositor/ |
layer_tree_owner.cc | 19 Layer* child = *it; local 20 DeepDeleteLayers(child);
|
/external/qemu/qom/ |
container.c | 30 Object *obj, *child; local 38 for (i = 1; parts[i] != NULL; i++, obj = child) { 39 child = object_resolve_path_component(obj, parts[i]); 40 if (!child) { 41 child = object_new("container"); 42 object_property_add_child(obj, parts[i], child, NULL);
|
/external/skia/src/svg/ |
SkSVGClipPath.cpp | 28 SkSVGElement* child = *fChildren.begin(); local 29 SkASSERT(child->getType() == SkSVGType_Use); 30 SkSVGUse* use = (SkSVGUse*) child;
|
/packages/apps/LegacyCamera/src/com/android/camera/ui/ |
RightAlignedHorizontalScrollView.java | 38 // Get the width of the child, i.e. the LinearLayout, and scroll to 40 View child = getChildAt(0); local 41 if (child != null) scrollTo(child.getWidth(), 0);
|
/external/chromium_org/ash/system/chromeos/ |
label_tray_view.cc | 45 HoverHighlightView* child = new HoverHighlightView(click_listener_); local 49 child->AddIconAndLabel(*icon, message, gfx::Font::NORMAL); 50 child->SetBorder(views::Border::CreateEmptyBorder( 52 child->text_label()->SetMultiLine(true); 53 child->text_label()->SizeToFit(kTrayNotificationContentsWidth); 55 child->AddLabel(message, gfx::ALIGN_LEFT, gfx::Font::NORMAL); 56 child->text_label()->SetMultiLine(true); 57 child->text_label()->SizeToFit(kTrayNotificationContentsWidth + 60 child->text_label()->SetAllowCharacterBreak(true); 61 child->SetExpandable(true) [all...] |
/external/chromium_org/chrome/browser/task_profiler/ |
task_profiler_data_serializer_unittest.cc | 66 tracked_objects::BirthOnThreadSnapshot child; local 67 child.location.file_name = "path/to/bar.cc"; 68 child.location.function_name = "FizzBoom"; 69 child.location.line_number = 433; 70 child.thread_name = "Chrome_IOThread"; 87 process_data.tasks.back().birth = child; 97 // Add a parent-child pair. 101 process_data.descendants.back().child = child;
|
/external/chromium_org/skia/ext/ |
refptr_unittest.cc | 113 RefPtr<Subclass> child = AdoptRef(new Subclass()); local 114 EXPECT_EQ(1, child->getRefCnt()); 116 RefPtr<SkRefCnt> parent = child; 117 EXPECT_TRUE(child); 120 EXPECT_EQ(2, child->getRefCnt());
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
HTMLTableRowsCollection.cpp | 66 HTMLElement* child = 0; local 68 child = Traversal<HTMLElement>::firstChild(table); 70 child = Traversal<HTMLElement>::nextSibling(*previous->parentNode()); 71 for (; child; child = Traversal<HTMLElement>::nextSibling(*child)) { 72 if (child->hasLocalName(theadTag)) { 73 if (HTMLTableRowElement* row = Traversal<HTMLTableRowElement>::firstChild(*child)) 80 child = Traversal<HTMLElement>::firstChild(table); 82 child = Traversal<HTMLElement>::nextSibling(*previous) [all...] |