Home
last modified time | relevance | path

Searched refs:inject (Results 1 – 25 of 30) sorted by relevance

12

/external/vogar/lib/
Dminiguice.jar ... javax/ javax/inject/ javax/inject/Inject.class Inject.java package javax.inject public ...
/external/linux-tools-perf/src/tools/perf/
Dbuiltin-inject.c43 struct perf_inject *inject = container_of(tool, struct perf_inject, tool); in perf_event__repipe_synth() local
50 int ret = write(inject->output, buf, size); in perf_event__repipe_synth()
56 inject->bytes_written += ret; in perf_event__repipe_synth()
254 struct perf_inject *inject = container_of(tool, struct perf_inject, tool); in perf_inject__sched_process_exit() local
257 list_for_each_entry(ent, &inject->samples, node) { in perf_inject__sched_process_exit()
274 struct perf_inject *inject = container_of(tool, struct perf_inject, tool); in perf_inject__sched_switch() local
288 list_add(&ent->node, &inject->samples); in perf_inject__sched_switch()
301 struct perf_inject *inject = container_of(tool, struct perf_inject, tool); in perf_inject__sched_stat() local
304 list_for_each_entry(ent, &inject->samples, node) { in perf_inject__sched_stat()
344 static int __cmd_inject(struct perf_inject *inject) in __cmd_inject() argument
[all …]
Dcommand-list.txt12 perf-inject mainporcelain common
DAndroid.mk51 builtin-inject.c \
DMakefile429 BUILTIN_OBJS += $(OUTPUT)builtin-inject.o
/external/linux-tools-perf/src/tools/perf/Documentation/
Dperf-inject.txt1 perf-inject(1)
6 perf-inject - Filter to augment the events stream with additional information
11 'perf inject <options>'
15 perf-inject reads a perf-record event stream and repipes it to stdout. At any
16 point the processing code can inject other events into the event stream - in
20 Build-ids are just the first user of perf-inject - potentially anything that
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/
Dprofile.rb79 inject( :+ )
87 inject( 0.0 ) { |t, i| t + ( i - mean )**2 } / ( length - 1 )
328 @profile.hidden_characters_matched = hidden_tokens.inject( 0 ) do |count, token|
Dutil.rb48 additional_writers = additional_members.inject( '' ) do |src, attr|
Dstreams.rb958 ( k - 1 ).times.inject( @position ) do |cursor, |
980 k.times.inject( @position ) do |cursor, |
Dtask.rb59 @grammar_sets.inject( [] ) do | list, set |
Dmain.rb267 name.split( /::/ ).inject( Object ) do |mod, name|
/external/iputils/
Dipg28 echo inject > ${PGDEV}
/external/valgrind/memcheck/tests/vbit-test/
DREADME25 The key step here is #2. To "execute an IROp" we need to inject some
71 (2) inject IR into the current IRSB to exacute a single IROp, and
77 The file provides the function vex_inject_ir which will inject a piece of
/external/libcxxabi/
D.gitignore27 # before PyInstaller builds the exe, so as to inject date/other infos into it.
/external/libcxx/
D.gitignore27 # before PyInstaller builds the exe, so as to inject date/other infos into it.
/external/chromium-trace/trace-viewer/tracing/third_party/css-element-queries/test/
Dmootools-more-yui-compressed.min.js1inject(f);if(g!="tr"){f=new Element("tr").inject(f)}}}return(f||new Element("div")).set("html",h).… property
Dmootools-core-full-nocompat.js3396 inject: function(el, where){
5629 if (options.filter) response.elements.reverse().inject(append);
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/streams/
Drewrite.rb262 @operations.inject( {} ) do |map, operation|
/external/llvm/test/CodeGen/X86/
Dpmovsx-inreg.ll6 ; These tests inject a store into the chain to test the inreg versions of pmovsx
/external/openssh/
DPROTOCOL.mux218 XXX inject packet (what about replies)
/external/iproute2/doc/
Dip-tunnels.tex330 anyone on the Internet may inject to your network any packets with
/external/protobuf/
DCHANGES.txt224 code for new languages or inject additional code into the output of other
/external/clang/test/
Dcxx-sections.data327 14.7.5 [temp.inject]
/external/libvncserver/x11vnc/
DREADME2078 Q-116: How do I inject touch screen input into an
2336 connects to does not support XTEST. In both cases it cannot inject
7568 program that will inject or otherwise process mouse and keystroke
7738 Another example provided in libvncserver CVS is a script to inject
7763 be installed) and so is /dev/tty0. The latter is used to inject
7765 will need to be root to inject keystrokes. /dev/tty0 refers to the
8004 is used to inject keystrokes and mouse input. Often you will just have
8062 Q-116: How do I inject touch screen input into an
15919 e.g., inject ButtonRelease at the wrong position.
16387 it will inject some user input: button clicks, Escape,
[all …]
DChangeLog892 * -xtrap use XESimulateXEventRequest to inject user input.

12