/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/subprocessdata/ |
sigchild_ignore.py | 6 subprocess.Popen([sys.executable, '-c', 'print("albatross")']).wait() 8 p = subprocess.Popen([sys.executable, '-c', 'print("albatross")'])
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/subprocessdata/ |
sigchild_ignore.py | 6 subprocess.Popen([sys.executable, '-c', 'print("albatross")']).wait() 8 p = subprocess.Popen([sys.executable, '-c', 'print("albatross")'])
|
/sdk/emulator/mksdcard/ |
build.gradle | 27 executable true 33 executable true
|
/system/extras/simpleperf/runtest/ |
runtest.conf | 3 <executable name="simpleperf_runtest_one_function"/> 21 <executable name="simpleperf_runtest_two_functions"/> 43 <executable name="simpleperf_runtest_function_fork"/> 65 <executable name="simpleperf_runtest_function_pthread"/> 84 <executable name="simpleperf_runtest_comm_change"/> 108 <executable name="simpleperf_runtest_function_recursive"/> 156 <executable name="simpleperf_runtest_function_indirect_recursive"/> 197 <executable name="simpleperf_runtest_comm_change"/>
|
/external/bsdiff/ |
README.chromium | 10 files. By using suffix sorting and taking advantage of how executable files
|
/external/bzip2/ |
words0 | 7 if your build produces an executable which is unable to correctly
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
asan_rt_confict_test-1.cc | 2 // executable is prohibited.
|
/external/skia/gyp/ |
fuzz.gyp | 10 'type': 'executable',
|
/external/strace/tests/ |
utimensat.test | 14 skip_ 'test executable does not use utimensat syscall'
|
/external/valgrind/VEX/useful/ |
Makefile-vex | 1 # Crude makefile to build the "vex" executable from test_main.c
|
/external/valgrind/none/tests/scripts/ |
shell.stdout.exp | 2 Execute a non-executable file
|
/external/vulkan-validation-layers/windowsRuntimeInstaller/ |
CreateInstallerRT.sh | 11 # signing an executable. If you don't need to sign the uninstaller,
|
/ndk/tests/build/topological-sort/jni/ |
Android.mk | 13 # 3/ Third, define an executable that depends on both 'foo' and 'bar', 19 # With NDK r8b and earlier, the final link command for the executable 22 # <linker> -o <executable> main.o libfoo.a libbar.a 32 # <linker> -o <executable> main.o libbar.a libfoo.a
|
/ndk/tests/device/test-gnustl_shared-exception/ |
test_config.py | 3 # The pre-KitKat linker didn't search the main executable for symbols,
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/distutils/tests/ |
test_build.py | 48 # executable is os.path.normpath(sys.executable) 49 self.assertEqual(cmd.executable, os.path.normpath(sys.executable))
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/distutils/tests/ |
test_build.py | 48 # executable is os.path.normpath(sys.executable) 49 self.assertEqual(cmd.executable, os.path.normpath(sys.executable))
|
/system/sepolicy/ |
mediaextractor.te | 20 # mediaextractor should never execute any executable without a
|
/toolchain/binutils/binutils-2.25/binutils/testsuite/binutils-all/ |
elfedit-2.d | 14 Type:[ \t]+EXEC \(Executable file\)
|
/toolchain/binutils/binutils-2.25/ld/emulparams/ |
solaris2.sh | 6 # executable and shared object.
|
/toolchain/binutils/binutils-2.25/ld/testsuite/ld-cris/ |
tls-err-53.d | 7 # R_CRIS_16_DTPREL in executable against symbol from DSO.
|
tls-err-65.d | 7 # R_CRIS_16_TPREL in executable against symbol from DSO.
|
/external/autotest/client/common_lib/ |
magic.py | 156 [0L, 'short', '=', 420L, 'application/x-executable-file'], 157 [0L, 'short', '=', 421L, 'application/x-executable-file'], 158 [0L, 'leshort', '=', 603L, 'application/x-executable-file'], 159 [0L, 'string', '=', 'Core\001', 'application/x-executable-file'], 161 [0L, 'belong', '=', 1011L, 'application/x-executable-file'], 237 [0L, 'beshort', '=', 560L, 'application/x-executable-file'], 238 [0L, 'beshort', '=', 561L, 'application/x-executable-file'], 272 [0L, 'short', '=', 3401L, 'application/x-executable-file'], 273 [0L, 'long', '=', 406L, 'application/x-executable-file'], 274 [0L, 'short', '=', 406L, 'application/x-executable-file'] [all...] |
/art/imgdiag/ |
Android.mk | 19 include art/build/Android.executable.mk 29 # Honor HOST_PREFER_32_BIT, as building a 64-bit imgdiag executable 32 $(eval $(call build-art-multi-executable,imgdiag,$(IMGDIAG_SRC_FILES),libart-compiler libbacktrace,libcutils,libziparchive-host,art/compiler,both,$(HOST_PREFER_32_BIT)))
|
/cts/tests/tests/renderscript/src/android/renderscript/cts/ |
float16_gen.sh | 24 EXECUTABLE=$TMPDIR/float16_gen 26 $CLANG -Wl,-rpath=$LIBDIR -L $LIBDIR -lcompiler_rt -m64 float16_gen.c -o $EXECUTABLE 27 $EXECUTABLE > $TMPFILE
|
/cts/tests/tests/security/src/android/security/cts/ |
MMapExecutableTest.java | 21 * Verify that we can mmap executable code from an APK. 28 * Test that we can mmap the APK file executable. 35 * Attempts to mmap a portion of the specified file executable (PROT_EXEC).
|