/external/chromium_org/third_party/WebKit/Source/core/rendering/ |
RenderFlexibleBox.cpp | 60 Violation(RenderBox* child, LayoutUnit childSize) 61 : child(child) 66 RenderBox* child; member in struct:WebCore::RenderFlexibleBox::Violation 100 for (RenderBox* child = firstChildBox(); child; child = child->nextSiblingBox()) { 101 if (child->isOutOfFlowPositioned()) 104 LayoutUnit margin = marginIntrinsicLogicalWidthForChild(child); 709 RenderBox* child = children[i]; local 922 RenderBox* child = violations[i].child; local 941 RenderBox* child = children[i]; local 1054 RenderBox* child = children[i]; local 1104 RenderBox* child = children[i]; local 1190 RenderBox* child = children[i]; local 1253 RenderBox* child = m_orderIterator.first(); local 1287 RenderBox* child = m_orderIterator.first(); local 1416 RenderBox* child = m_orderIterator.first(); local [all...] |
/external/chromium_org/third_party/WebKit/Source/core/editing/ |
RemoveNodePreservingChildrenCommand.cpp | 45 for (Node* child = m_node->firstChild(); child; child = child->nextSibling()) 46 children.append(child); 50 RefPtrWillBeRawPtr<Node> child = children[i].release(); local 51 removeNode(child, m_shouldAssumeContentIsAlwaysEditable); 52 insertNodeBefore(child.release(), m_node, m_shouldAssumeContentIsAlwaysEditable);
|
/external/chromium_org/third_party/WebKit/Source/core/html/imports/ |
HTMLImportStateResolver.cpp | 44 HTMLImportChild* child = toHTMLImportChild(import); 45 if (!child->loader()->isFirstImport(child)) 60 for (HTMLImport* child = m_import->firstChild(); child; child = child->next()) { 61 if (isBlockingFollowers(child))
|
/external/chromium_org/third_party/WebKit/Source/core/svg/ |
SVGAltGlyphDefElement.cpp | 89 for (SVGElement* child = Traversal<SVGElement>::firstChild(*this); child; child = Traversal<SVGElement>::nextSibling(*child)) { 90 if (!foundFirstAltGlyphItem && isSVGGlyphRefElement(*child)) { 94 if (toSVGGlyphRefElement(child)->hasValidGlyphElement(referredGlyphName)) 104 } else if (!fountFirstGlyphRef && isSVGAltGlyphItemElement(*child)) { 110 if (toSVGAltGlyphItemElement(child)->hasValidGlyphElements(glyphNames) && !glyphNames.isEmpty())
|
/external/chromium_org/ui/aura/ |
layout_manager.cc | 17 void LayoutManager::SetChildBoundsDirect(aura::Window* child, 19 child->SetBoundsInternal(bounds);
|
/external/chromium_org/ui/v2/public/ |
layout.h | 19 virtual void SetChildBounds(View* child, 23 // Sets the specified |bounds| on |child| without consulting layout. 24 void SetChildBoundsDirect(View* child, const gfx::Rect& bounds);
|
/external/clang/test/CodeGenCXX/ |
microsoft-abi-multiple-nonvirtual-inheritance.cpp | 21 void call_left_no_override(ChildNoOverride *child) { 23 // CHECK: %[[CHILD:.*]] = load %struct.ChildNoOverride 25 child->left(); 27 // CHECK: %[[LEFT:.*]] = bitcast %struct.ChildNoOverride* %[[CHILD]] to %struct.Left* 50 void call_left_override(ChildOverride *child) { 52 // CHECK: %[[CHILD:.*]] = load %struct.ChildOverride 54 child->left(); 55 // CHECK: %[[VFPTR:.*]] = bitcast %struct.ChildOverride* %[[CHILD]] to void (%struct.ChildOverride*)*** 60 // CHECK: call x86_thiscallcc void %[[VFUN_VALUE]](%struct.ChildOverride* %[[CHILD]]) 64 void call_right_no_override(ChildNoOverride *child) { [all...] |
/external/ltrace/testsuite/ltrace.minor/ |
trace-fork.c | 2 Objectives : Verify that ltrace can trace to child process after 11 child () function 13 printf("Fork Child\n"); 26 child(); 29 printf("My child pid is %d\n",pid);
|
/external/chromium_org/base/process/ |
kill_mac.cc | 23 // Reap |child| process. This call blocks until completion. 24 void BlockingReap(pid_t child) { 25 const pid_t result = HANDLE_EINTR(waitpid(child, NULL, 0)); 27 DPLOG(ERROR) << "waitpid(" << child << ", NULL, 0)"; 31 // Waits for |timeout| seconds for the given |child| to exit and reap it. If 32 // the child doesn't exit within the time specified, kills it. 38 // the exited child. If the kqueue doesn't provide an exit event notification, 42 // A child process passed to this function may be in one of several states: 52 // collects the known-dying child, preventing zombies from congregating. 56 // function will forcibly kill and reap the child without delay. Thi [all...] |
/external/chromium_org/sandbox/win/src/ |
policy_broker.h | 19 bool SetupNtdllImports(TargetProcess *child);
|
/external/lldb/test/benchmarks/expression/ |
TestExpressionCmd.py | 41 # So that the child gets torn down after the test. 42 self.child = pexpect.spawn('%s %s %s' % (self.lldbHere, self.lldbOption, exe)) 43 child = self.child 45 # Turn on logging for what the child sends back. 47 child.logfile_read = sys.stdout 49 child.expect_exact(prompt) 50 child.sendline('breakpoint set -f %s -l %d' % (self.source, self.line_to_break)) 51 child.expect_exact(prompt) 52 child.sendline('run' [all...] |
/external/valgrind/main/memcheck/tests/ |
noisy_child.c | 22 pid_t child; local 29 child = fork(); 30 assert(child != -1); /* assert fork did not fail */ 32 if (child == 0) { 33 /* I am the child */
|
/external/chromium_org/ash/system/chromeos/ |
label_tray_view.cc | 45 HoverHighlightView* child = new HoverHighlightView(click_listener_); local 49 child->AddIconAndLabel(*icon, message, gfx::Font::NORMAL); 50 child->SetBorder(views::Border::CreateEmptyBorder( 52 child->text_label()->SetMultiLine(true); 53 child->text_label()->SizeToFit(kTrayNotificationContentsWidth); 55 child->AddLabel(message, gfx::ALIGN_LEFT, gfx::Font::NORMAL); 56 child->text_label()->SetMultiLine(true); 57 child->text_label()->SizeToFit(kTrayNotificationContentsWidth + 60 child->text_label()->SetAllowCharacterBreak(true); 61 child->SetExpandable(true) [all...] |
/external/lldb/test/benchmarks/stepping/ |
TestRunHooksThenSteppings.py | 31 self.child = pexpect.spawn('%s %s' % (self.lldbHere, self.lldbOption)) 32 self.child.expect_exact(prompt) 33 # So that the child gets torn down after the test. 34 child = self.child 36 # Turn on logging for what the child sends back. 38 child.logfile_read = sys.stdout 43 self.runHooks(child=child, child_prompt=prompt) 50 child.sendline('next') # Aka 'thread step-over' [all...] |
/external/lldb/test/functionalities/single-quote-in-filename-to-lldb/ |
TestSingleQuoteInFilename.py | 35 # So that the child gets torn down after the test. 36 self.child = pexpect.spawn('%s %s "%s"' % (self.lldbHere, self.lldbOption, self.myexe)) 37 child = self.child 38 child.setecho(True) 39 # Turn on logging for input/output to/from the child. 42 child.logfile_send = f_send 43 child.logfile_read = f_read 45 child.expect_exact(prompt) 47 child.send("help watchpoint" [all...] |
/external/valgrind/main/helgrind/tests/ |
tc01_simple_race.c | 6 /* Simple test program, has a race. Parent and child both modify x 21 pthread_t child; local 22 if (pthread_create(&child, NULL, child_fn, NULL)) { 27 /* Unprotected relative to child */ 30 if (pthread_join(child, NULL)) {
|
tc02_simple_tls.c | 6 /* Simple test program, no race: parent only modified x after child 14 /* Unprotected relative to parent, but in child's segment only */ 21 pthread_t child; local 25 if (pthread_create(&child, NULL, child_fn, NULL)) { 30 if (pthread_join(child, NULL)) {
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
ChildFrameDisconnector.cpp | 31 for (Node* child = m_root.firstChild(); child; child = child->nextSibling()) 32 collectFrameOwners(*child); 46 for (Node* child = root.firstChild(); child; child = child->nextSibling()) 47 collectFrameOwners(*child); [all...] |
PseudoElement.cpp | 101 RenderObject* child = content->createRenderer(document(), style); local 102 if (renderer->isChildAllowed(child, style)) { 103 renderer->addChild(child); 104 if (child->isQuote()) 105 toRenderQuote(child)->attachQuote(); 107 child->destroy(); 124 for (RenderObject* child = renderer->nextInPreOrder(renderer); child; child = child->nextInPreOrder(renderer)) [all...] |
/external/lldb/test/functionalities/stop-hook/multiple_threads/ |
TestStopHookMultipleThreads.py | 48 # So that the child gets torn down after the test. 49 self.child = pexpect.spawn('%s %s %s' % (self.lldbHere, self.lldbOption, exe)) 50 child = self.child 51 # Turn on logging for what the child sends back. 53 child.logfile_read = sys.stdout 56 child.expect_exact(prompt) 57 child.sendline('breakpoint set -f main.cpp -l %d' % self.first_stop) 58 child.expect_exact(prompt) 59 child.sendline('breakpoint set -f main.cpp -l %d' % self.thread_function [all...] |
/external/lldb/test/pexpect-2.4/examples/ |
chess.py | 17 self.child = pexpect.spawn (engine) 20 self.child.expect ('Chess') 21 if self.child.after != 'Chess': 28 self.child.read(1, 60) 34 self.child.expect ('Your move is') 35 self.child.sendline (move) 42 #self.child.expect ('\[19;60H') 43 self.child.sendline (move) 48 self.child.expect ('My move is') 49 self.child.expect (REGEX_MOVE [all...] |
/external/chromium_org/ash/wm/ |
root_window_layout_manager.h | 38 virtual void OnWindowAddedToLayout(aura::Window* child) OVERRIDE; 39 virtual void OnWillRemoveWindowFromLayout(aura::Window* child) OVERRIDE; 40 virtual void OnWindowRemovedFromLayout(aura::Window* child) OVERRIDE; 41 virtual void OnChildWindowVisibilityChanged(aura::Window* child, 43 virtual void SetChildBounds(aura::Window* child,
|
status_area_layout_manager.h | 25 virtual void OnWindowAddedToLayout(aura::Window* child) OVERRIDE; 26 virtual void OnWillRemoveWindowFromLayout(aura::Window* child) OVERRIDE; 27 virtual void OnWindowRemovedFromLayout(aura::Window* child) OVERRIDE; 28 virtual void OnChildWindowVisibilityChanged(aura::Window* child, 30 virtual void SetChildBounds(aura::Window* child,
|
/external/chromium_org/athena/common/ |
fill_layout_manager.h | 20 virtual void OnWindowAddedToLayout(aura::Window* child) OVERRIDE; 21 virtual void OnWillRemoveWindowFromLayout(aura::Window* child) OVERRIDE; 22 virtual void OnWindowRemovedFromLayout(aura::Window* child) OVERRIDE; 23 virtual void OnChildWindowVisibilityChanged(aura::Window* child, 25 virtual void SetChildBounds(aura::Window* child,
|
/external/chromium_org/chrome/tools/ |
chrome-process-identifier.sh | 49 # Iterate over child processes and try to identify them 51 local child cmd foundzygote plugin seccomp type 53 for child in $(ps h --format pid --ppid $1); do 54 cmd="$(xargs -0 </proc/$child/cmdline|sed 's/ -/\n-/g')" 2>/dev/null 58 echo "Process $child is part of the browser" 59 identify "$child" 62 echo "Process $child is an extension" 68 echo "Process $child is a \"$plugin\" plugin" 69 identify "$child" 72 # The seccomp sandbox has exactly one child process that has no othe [all...] |