/prebuilts/clang/host/linux-x86/clang-4630689/lib64/clang/6.0.1/include/sanitizer/ |
tsan_interface.h | 66 // Annotate creation of a mutex. 70 // Annotate destruction of a mutex. 75 // Annotate start of lock operation. 82 // Annotate end of lock operation. 91 // Annotate start of unlock operation. 97 // Annotate end of unlock operation. 102 // Annotate start/end of notify/signal/broadcast operation. 107 // Annotate start/end of a region of code where lock/unlock/signal operation 109 // annotate, for example, calls into cooperative scheduler or contention
|
/prebuilts/clang/host/linux-x86/clang-4639204/lib64/clang/6.0.1/include/sanitizer/ |
tsan_interface.h | 66 // Annotate creation of a mutex. 70 // Annotate destruction of a mutex. 75 // Annotate start of lock operation. 82 // Annotate end of lock operation. 91 // Annotate start of unlock operation. 97 // Annotate end of unlock operation. 102 // Annotate start/end of notify/signal/broadcast operation. 107 // Annotate start/end of a region of code where lock/unlock/signal operation 109 // annotate, for example, calls into cooperative scheduler or contention
|
/prebuilts/clang/host/linux-x86/clang-4691093/lib64/clang/6.0.2/include/sanitizer/ |
tsan_interface.h | 66 // Annotate creation of a mutex. 70 // Annotate destruction of a mutex. 75 // Annotate start of lock operation. 82 // Annotate end of lock operation. 91 // Annotate start of unlock operation. 97 // Annotate end of unlock operation. 102 // Annotate start/end of notify/signal/broadcast operation. 107 // Annotate start/end of a region of code where lock/unlock/signal operation 109 // annotate, for example, calls into cooperative scheduler or contention
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
const.h | 7 * C code. Therefore we cannot annotate them always with
|
/external/clang/test/Analysis/ |
objc_invalidation.m | 27 - (void) invalidate __attribute__((annotate("objc_instance_variable_invalidator"))); 31 - (void) invalidate __attribute__((annotate("objc_instance_variable_invalidator"))); 35 - (void) invalidate __attribute__((annotate("objc_instance_variable_invalidator"))); 36 - (void) invalidate2 __attribute__((annotate("objc_instance_variable_invalidator"))); 52 - (void) invalidate __attribute__((annotate("objc_instance_variable_invalidator"))); 119 -(void)partialInvalidator1 __attribute__((annotate("objc_instance_variable_invalidator_partial"))); 120 -(void)partialInvalidator2 __attribute__((annotate("objc_instance_variable_invalidator_partial"))); 241 - (void)invalidate __attribute__((annotate("objc_instance_variable_invalidator"))); 296 -(void)partialInvalidator __attribute__((annotate("objc_instance_variable_invalidator_partial"))); 308 -(void)partialInvalidator __attribute__((annotate("objc_instance_variable_invalidator_partial"))) [all...] |
/external/clang/test/CodeGen/ |
annotations-field.c | 8 int v __attribute__((annotate("v_ann_0"))) __attribute__((annotate("v_ann_1")));
|
/external/clang/test/Index/ |
annotate-tokens-preamble.c | 7 // RUN: c-index-test -test-annotate-tokens=%s:1:1:5:1 %s | FileCheck %s 8 // RUN: env CINDEXTEST_EDITING=1 c-index-test -test-annotate-tokens=%s:1:1:5:1 %s | FileCheck %s
|
annotate-tokens-with-default-args.cpp | 1 #include "annotate-tokens-with-default-args.h" 5 // RUN: c-index-test -test-annotate-tokens=%s:3:1:4:1 %s | FileCheck %s
|
annotate-parameterized-classes.m | 18 // RUN: c-index-test -test-annotate-tokens=%s:7:1:9:1 %s -target x86_64-apple-macosx10.7.0 | FileCheck -check-prefix=CHECK-INTERFACE-DECL %s 24 // RUN: c-index-test -test-annotate-tokens=%s:10:1:12:1 %s -target x86_64-apple-macosx10.7.0 | FileCheck -check-prefix=CHECK-CATEGORY-DECL %s 30 // RUN: c-index-test -test-annotate-tokens=%s:13:1:14:1 %s -target x86_64-apple-macosx10.7.0 | FileCheck -check-prefix=CHECK-SPECIALIZATION %s 35 // RUN: c-index-test -test-annotate-tokens=%s:15:1:16:1 %s -target x86_64-apple-macosx10.7.0 | FileCheck -check-prefix=CHECK-SUPER %s
|
/external/smali/dexlib2/src/main/java/org/jf/dexlib2/dexbacked/raw/ |
ClassDataItem.java | 77 out.annotate(0, "static_fields:"); 80 out.annotate(0, "static_field[%d]", i); 89 out.annotate(0, "instance_fields:"); 93 out.annotate(0, "instance_field[%d]", i); 102 out.annotate(0, "direct_methods:"); 106 out.annotate(0, "direct_method[%d]", i); 115 out.annotate(0, "virtual_methods:"); 119 out.annotate(0, "virtual_method[%d]", i);
|
MapItem.java | 83 out.annotate(2, "type = 0x%x: %s", itemType, ItemType.getItemTypeName(itemType)); 85 out.annotate(2, "unused"); 88 out.annotate(4, "size = %d", size); 91 out.annotate(4, "offset = 0x%x", offset); 97 out.annotate(4, "size = %d", mapItemCount);
|
/external/mesa3d/src/gallium/auxiliary/util/ |
u_debug_flush.h | 94 * Used to annotate a map of the buffer described by the buffer representation. 103 * Used to annotate an unmap of the buffer described by the 113 * Used to annotate a conditional (possible) flush of the given context. 122 * Used to annotate a real flush of the given context. 132 * Used to annotate a real flush of the given context.
|
/dalvik/dexgen/src/com/android/dexgen/util/ |
AnnotatedOutput.java | 49 public void annotate(String msg); method in interface:AnnotatedOutput 62 public void annotate(int amt, String msg); method in interface:AnnotatedOutput 66 * until the next call to {@link #annotate}.
|
/dalvik/dx/src/com/android/dx/util/ |
AnnotatedOutput.java | 49 public void annotate(String msg); method in interface:AnnotatedOutput 62 public void annotate(int amt, String msg); method in interface:AnnotatedOutput 66 * until the next call to {@link #annotate}.
|
/external/ImageMagick/Magick++/demo/ |
shapes.cpp | 88 image.annotate( "Hello world!", "+150+20" ); 92 image.annotate( "Goodbye cruel world!", "+150+38" ); 96 image.annotate( "I'm climbing the wall!", "+280+120",
|
/external/clang/test/Analysis/objc/ |
direct-ivar-assignment-in-annotated-functions.m | 18 - (void) someMethod: (MyClass*)In __attribute__((annotate("objc_no_direct_instance_variable_assignment"))); 26 MyClass* _NotA __attribute__((annotate("objc_allow_direct_instance_variable_assignment"))); 39 @property (assign) MyClass* NotX __attribute__((annotate("objc_allow_direct_instance_variable_assignment"))); // warnings should be suppressed
|
/external/python/cpython2/Doc/library/ |
dircache.rst | 18 Additionally, it defines a function to annotate directories by appending a 44 .. function:: annotate(head, list) 57 >>> dircache.annotate('/', a)
|
/dalvik/dexgen/src/com/android/dexgen/dex/file/ |
MemberIdItem.java | 72 out.annotate(0, indexString() + ' ' + cst.toHuman()); 73 out.annotate(2, " class_idx: " + Hex.u2(classIdx)); 74 out.annotate(2, String.format(" %-10s %s", getTypoidName() + ':', 76 out.annotate(4, " name_idx: " + Hex.u4(nameIdx));
|
CatchStructs.java | 224 * Helper method to annotate or simply print the exception handlers. 230 * @param annotateTo {@code null-ok;} where to consume bytes and annotate to 243 annotateTo.annotate(0, prefix + "tries:"); 256 annotateTo.annotate(amt1, s1); 257 annotateTo.annotate(amt2, s2); 269 annotateTo.annotate(0, prefix + "handlers:"); 270 annotateTo.annotate(encodedHandlerHeaderSize, 296 * Helper for {@link #annotateEntries} to annotate a catch handler list 299 * @param handlers {@code non-null;} handlers to annotate 304 * @param annotateTo {@code non-null;} where to annotate t [all...] |
/dalvik/dx/src/com/android/dx/dex/file/ |
MemberIdItem.java | 70 out.annotate(0, indexString() + ' ' + cst.toHuman()); 71 out.annotate(2, " class_idx: " + Hex.u2(classIdx)); 72 out.annotate(2, String.format(" %-10s %s", getTypoidName() + ':', 74 out.annotate(4, " name_idx: " + Hex.u4(nameIdx));
|
/external/dagger2/compiler/src/main/java/dagger/internal/codegen/ |
MonitoringModuleGenerator.java | 72 classWriter.annotate(Generated.class).setValue(ComponentProcessor.class.getName()); 73 classWriter.annotate(Module.class); 80 emptySetBindingMethod.annotate(Provides.class).setMember("type", Provides.Type.SET_VALUES); 89 monitorMethod.annotate(Provides.class);
|
/external/guava/guava-tests/test/com/google/common/cache/ |
LongAdderTest.java | 19 * which checks package-private methods that we don't want to have to annotate as {@code Nullable}
|
/external/javaparser/javaparser-core-generators/src/main/java/com/github/javaparser/generator/ |
Generator.java | 31 annotate(node, Generated.class, new StringLiteralExpr(getClass().getName())); method 35 annotate(node, SuppressWarnings.class, new StringLiteralExpr("unchecked")); method 39 annotate(method, Override.class, null); method 42 private <T extends Node & NodeWithAnnotations<?>> void annotate(T node, Class<?> annotation, Expression content) { method in class:Generator
|
/external/jsr305/ri/src/main/java/javax/annotation/ |
CheckForSigned.java | 11 * Used to annotate a value that may be either negative or nonnegative, and
|
/external/kernel-headers/original/uapi/linux/ |
const.h | 8 * C code. Therefore we cannot annotate them always with
|