/external/chromium_org/tools/gyp/ |
gyptest.py | 242 status = cr.run([sys.executable, test] + gyp_options,
|
/external/chromium_org/tools/gyp/pylib/gyp/ |
win_tool.py | 145 'python': sys.executable,
|
/external/icu/icu4c/source/ |
icudefs.mk | 224 # Platform commands to remove or move executable and library targets 226 # when the library needs to have executable permissions
|
/external/chromium_org/tools/gyp/pylib/gyp/generator/ |
xcode.py | 648 'executable': 'com.apple.product-type.tool', 652 'executable+bundle': 'com.apple.product-type.application', 656 'executable+extension+bundle': 'com.apple.product-type.app-extension', [all...] |
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/layout_tests/port/ |
base.py | 492 executable = self._path_to_image_diff() 494 comand = [executable, '--diff', native_actual_filename, native_expected_filename, native_diff_filename] [all...] |
mock_drt.py | 89 sys.executable,
|
/external/lldb/test/ |
lldbtest.py | 67 CURRENT_EXECUTABLE_SET = "Current executable set successfully" 185 """Returns true if fpath is an executable.""" 848 # module cacheing subsystem to be confused with executable name "a.out" [all...] |
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/tool/commands/ |
rebaseline.py | 396 copy_baseline_commands.append(tuple([[self._tool.executable, path_to_webkit_patch, 'copy-existing-baselines-internal'] + cmd_line, cwd])) 397 rebaseline_commands.append(tuple([[self._tool.executable, path_to_webkit_patch, 'rebaseline-test-internal'] + cmd_line, cwd])) 444 optimize_commands.append(tuple([[self._tool.executable, path_to_webkit_patch, 'optimize-baselines'] + cmd_line, cwd])) [all...] |
/external/lldb/source/Plugins/DynamicLoader/MacOSX-DYLD/ |
DynamicLoaderMacOSXDYLD.cpp | 321 Module *executable = m_process->GetTarget().GetExecutableModulePointer(); local 323 if (executable) 325 const ArchSpec &exe_arch = executable->GetArchitecture(); 415 // If we didn't have an executable before, but now we do, then the 507 // the __PAGEZERO segment in the main executable. We might be able [all...] |
/art/runtime/ |
elf_file.cc | [all...] |
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/test/ |
test_endtoend.py | 189 return subprocess.Popen([sys.executable] + commandline, close_fds=True,
|
/external/chromium_org/content/browser/renderer_host/ |
sandbox_ipc_linux.cc | 369 if (!pickle.ReadBool(&iter, &options.executable))
|
/external/chromium_org/native_client_sdk/src/tools/tests/ |
oshelpers_test.py | 36 command = [sys.executable, 'oshelpers.py', cmd] + args
|
/external/chromium_org/sdch/open-vcdiff/vsprojects/ |
vcdiff_test.bat | 18 rem executable. It is the Windows equivalent of the src/vcdiff_test.sh 26 rem vcdiff.exe executable.
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/common/system/ |
executive.py | 160 return sys.executable
|
/external/chromium_org/third_party/cython/src/Cython/Build/ |
Inline.py | 151 key = orig_code, arg_sigs, sys.version_info, sys.executable, Cython.__version__
|
/external/chromium_org/tools/telemetry/telemetry/ |
test_runner.py | 299 base_cmd = [sys.executable, os.path.realpath(sys.argv[0]),
|
/external/chromium_org/v8/test/mjsunit/tools/ |
tickprocessor.js | 67 // shell executable 131 // shell executable
|
/external/jsoncpp/ |
makerelease.py | 147 cmd = [sys.executable, 'scons.py', 'platform=%s' % platform, 'check']
|
/external/chromium_org/base/files/ |
file_util_posix.cc | 816 bool GetShmemTempDir(bool executable, FilePath* path) { 819 if (executable) {
|
/external/chromium_org/tools/ |
bisect-builds.py | 142 # _binary_name = The name of the executable to run. 245 that is used to run the executable.""" 443 gsutil = subprocess.Popen([sys.executable, gsutil_path] + args, [all...] |
/external/lldb/examples/python/ |
crashlog.py | 384 # We weren't able to open the main executable as, but we can still symbolicate 404 print "Usage: lldb-symbolicate.py [-n name] executable-image" 548 identifier = lldb.target.executable.basename 553 out_file.write('Path: %s\n' % (lldb.target.executable.fullpath)) [all...] |
/external/lldb/scripts/Python/interface/ |
SBTarget.i | 272 /// target object's executable module's file as the file to launch. 384 executable. 822 if _newclass: modules = property(get_modules_array, None, doc='''A read only property that returns a list() of lldb.SBModule objects contained in this target. This list is a list all modules that the target currently is tracking (the main executable and all dependent shared libraries).''') 830 __swig_getmethods__["executable"] = GetExecutable 831 if _newclass: executable = property(GetExecutable, None, doc='''A read only property that returns an lldb object that represents the main executable module (lldb.SBModule) for this target.''')
|
/external/llvm/bindings/ocaml/executionengine/ |
llvm_executionengine.mli | 85 invoking a static compiler and generating a native executable. *)
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.p2.publisher_1.1.2.v20100824-2220.jar | |