HomeSort by relevance Sort by last modified time
    Searched full:executable (Results 1651 - 1675 of 4711) sorted by null

<<61626364656667686970>>

  /art/runtime/
oat_file_assistant_test.cc 503 // We should still be able to get the non-executable odex file to run from.
    [all...]
oat_file_assistant.h 103 // be loaded executable only if the ISA matches the current runtime.
109 // executable code for this dex location.
333 // Returns true if the odex file is opened executable.
352 // Returns true if the oat file is opened executable.
384 // Whether we will attempt to load oat files executable.
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/share/man/man1/
x86_64-w64-mingw32-ld.1 421 When creating a dynamically linked executable, using the \fB\-E\fR
502 When creating an \s-1ELF\s0 executable or shared object, call \s-1NAME\s0 when the
503 executable or shared object is unloaded, by setting \s-1DT_FINI\s0 to the
526 the specified name. When an executable is linked with a shared object
527 which has a \s-1DT_SONAME\s0 field, then when the executable is run the dynamic
535 When creating an \s-1ELF\s0 executable or shared object, call \s-1NAME\s0 when the
536 executable or shared object is loaded, by setting \s-1DT_INIT\s0 to the address
    [all...]
  /external/google-breakpad/src/tools/mac/dump_syms/dump_syms.xcodeproj/
project.pbxproj 291 B84A91F4116CF784006C210E /* stabs_to_module_unittest */ = {isa = PBXFileReference; explicitFileType = "compiled.mach-o.executable"; includeInIndex = 0; path = stabs_to_module_unittest; sourceTree = BUILT_PRODUCTS_DIR; };
311 B88FAF2F116A591E00407530 /* dwarf2reader_cfi_unittest */ = {isa = PBXFileReference; explicitFileType = "compiled.mach-o.executable"; includeInIndex = 0; path = dwarf2reader_cfi_unittest; sourceTree = BUILT_PRODUCTS_DIR; };
316 B88FB007116BDE8300407530 /* stabs_reader_unittest */ = {isa = PBXFileReference; explicitFileType = "compiled.mach-o.executable"; includeInIndex = 0; path = stabs_reader_unittest; sourceTree = BUILT_PRODUCTS_DIR; };
319 B88FB0B9116CEABF00407530 /* module_unittest */ = {isa = PBXFileReference; explicitFileType = "compiled.mach-o.executable"; includeInIndex = 0; path = module_unittest; sourceTree = BUILT_PRODUCTS_DIR; };
328 B88FB0DF116CEEA800407530 /* dwarf2diehandler_unittest */ = {isa = PBXFileReference; explicitFileType = "compiled.mach-o.executable"; includeInIndex = 0; path = dwarf2diehandler_unittest; sourceTree = BUILT_PRODUCTS_DIR; };
329 B88FB0F2116CEF1900407530 /* dwarf_line_to_module_unittest */ = {isa = PBXFileReference; explicitFileType = "compiled.mach-o.executable"; includeInIndex = 0; path = dwarf_line_to_module_unittest; sourceTree = BUILT_PRODUCTS_DIR; };
330 B88FB10A116CF07900407530 /* dwarf_cu_to_module_unittest */ = {isa = PBXFileReference; explicitFileType = "compiled.mach-o.executable"; includeInIndex = 0; path = dwarf_cu_to_module_unittest; sourceTree = BUILT_PRODUCTS_DIR; };
331 B88FB11F116CF27F00407530 /* dwarf_cfi_to_module_unittest */ = {isa = PBXFileReference; explicitFileType = "compiled.mach-o.executable"; includeInIndex = 0; path = dwarf_cfi_to_module_unittest; sourceTree = BUILT_PRODUCTS_DIR; };
332 B88FB135116CF30F00407530 /* bytereader_unittest */ = {isa = PBXFileReference; explicitFileType = "compiled.mach-o.executable"; includeInIndex = 0; path = bytereader_unittest; sourceTree = BUILT_PRODUCTS_DIR; };
333 B88FB14B116CF4A700407530 /* byte_cursor_unittest */ = {isa = PBXFileReference; explicitFileType = "compiled.mach-o.executable"; includeInIndex = 0; path = byte_cursor_unittest; sourceTree = BUILT_PRODUCTS_DIR; }
    [all...]
  /external/v8/test/cctest/
test-assembler-x64.cc 72 // Allocate an executable page of memory.
94 // Allocate an executable page of memory.
126 // Allocate an executable page of memory.
148 // Allocate an executable page of memory.
179 // Allocate an executable page of memory.
207 // Allocate an executable page of memory.
235 // Allocate an executable page of memory.
259 // Allocate an executable page of memory.
281 // Allocate an executable page of memory.
305 // Allocate an executable page of memory
    [all...]
  /external/dbus/
COPYING 349 under Section 2) in object code or executable form under the terms of
366 received the program in object code or executable form with such
370 making modifications to it. For an executable work, complete source
373 control compilation and installation of the executable. However, as a
377 operating system on which the executable runs, unless that component
378 itself accompanies the executable.
380 If distribution of executable or object code is made by offering
NOTICE 348 under Section 2) in object code or executable form under the terms of
365 received the program in object code or executable form with such
369 making modifications to it. For an executable work, complete source
372 control compilation and installation of the executable. However, as a
376 operating system on which the executable runs, unless that component
377 itself accompanies the executable.
379 If distribution of executable or object code is made by offering
  /external/dbus/bus/
NOTICE 348 under Section 2) in object code or executable form under the terms of
365 received the program in object code or executable form with such
369 making modifications to it. For an executable work, complete source
372 control compilation and installation of the executable. However, as a
376 operating system on which the executable runs, unless that component
377 itself accompanies the executable.
379 If distribution of executable or object code is made by offering
  /external/dbus/dbus/
NOTICE 348 under Section 2) in object code or executable form under the terms of
365 received the program in object code or executable form with such
369 making modifications to it. For an executable work, complete source
372 control compilation and installation of the executable. However, as a
376 operating system on which the executable runs, unless that component
377 itself accompanies the executable.
379 If distribution of executable or object code is made by offering
  /external/dbus/tools/
NOTICE 348 under Section 2) in object code or executable form under the terms of
365 received the program in object code or executable form with such
369 making modifications to it. For an executable work, complete source
372 control compilation and installation of the executable. However, as a
376 operating system on which the executable runs, unless that component
377 itself accompanies the executable.
379 If distribution of executable or object code is made by offering
  /external/dnsmasq/contrib/dnslist/
dnslist.pl 403 under Section 2) in object code or executable form under the terms of
420 received the program in object code or executable form with such
424 making modifications to it. For an executable work, complete source
427 control compilation and installation of the executable. However, as a
431 operating system on which the executable runs, unless that component
432 itself accompanies the executable.
434 If distribution of executable or object code is made by offering
  /prebuilts/gdb/darwin-x86/lib/python2.7/
subprocess.py 33 class Popen(args, bufsize=0, executable=None,
44 string, but can be explicitly set by using the executable argument.
650 def __init__(self, args, bufsize=0, executable=None,
706 self._execute_child(args, executable, preexec_fn, close_fds,
898 def _execute_child(self, args, executable, preexec_fn, close_fds,
    [all...]
  /prebuilts/gdb/linux-x86/lib/python2.7/
subprocess.py 33 class Popen(args, bufsize=0, executable=None,
44 string, but can be explicitly set by using the executable argument.
650 def __init__(self, args, bufsize=0, executable=None,
706 self._execute_child(args, executable, preexec_fn, close_fds,
898 def _execute_child(self, args, executable, preexec_fn, close_fds,
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
subprocess.py 33 class Popen(args, bufsize=0, executable=None,
44 string, but can be explicitly set by using the executable argument.
650 def __init__(self, args, bufsize=0, executable=None,
706 self._execute_child(args, executable, preexec_fn, close_fds,
898 def _execute_child(self, args, executable, preexec_fn, close_fds,
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
subprocess.py 33 class Popen(args, bufsize=0, executable=None,
44 string, but can be explicitly set by using the executable argument.
650 def __init__(self, args, bufsize=0, executable=None,
706 self._execute_child(args, executable, preexec_fn, close_fds,
898 def _execute_child(self, args, executable, preexec_fn, close_fds,
    [all...]
  /external/cblas/testing/
c_cblat1.f 20 * .. Executable Statements ..
70 * .. Executable Statements ..
199 * .. Executable Statements ..
473 * .. Executable Statements ..
552 * .. Executable Statements ..
594 * .. Executable Statements ..
608 * .. Executable Statements ..
630 * .. Executable Statements ..
662 * .. Executable Statements ..
c_zblat1.f 20 * .. Executable Statements ..
70 * .. Executable Statements ..
199 * .. Executable Statements ..
473 * .. Executable Statements ..
552 * .. Executable Statements ..
594 * .. Executable Statements ..
608 * .. Executable Statements ..
630 * .. Executable Statements ..
662 * .. Executable Statements ..
  /external/eigen/blas/testing/
cblat1.f 20 * .. Executable Statements ..
70 * .. Executable Statements ..
199 * .. Executable Statements ..
474 * .. Executable Statements ..
551 * .. Executable Statements ..
593 * .. Executable Statements ..
607 * .. Executable Statements ..
629 * .. Executable Statements ..
661 * .. Executable Statements ..
zblat1.f 20 * .. Executable Statements ..
70 * .. Executable Statements ..
199 * .. Executable Statements ..
474 * .. Executable Statements ..
551 * .. Executable Statements ..
593 * .. Executable Statements ..
607 * .. Executable Statements ..
629 * .. Executable Statements ..
661 * .. Executable Statements ..
  /external/valgrind/coregrind/
vgdb-invoker-ptrace.c 850 /* 64bit vgdb speaking with a 32bit executable.
884 // vgdb speaking with a 32bit executable.
947 XERROR(0, "TBD arm64: vgdb a 32 bits executable with a 64 bits exe");
962 assert(0); // cannot vgdb a 32 bits executable with a 64 bits exe
970 assert(0); // cannot vgdb a 64 bits executable with a 32 bits exe
972 // vgdb speaking with a 64 bit executable.
    [all...]
  /prebuilts/gdb/darwin-x86/lib/python2.7/distutils/
ccompiler.py 140 is a string that will be split into executable name and (optional)
148 # attributes 'cpp', 'cc', etc. with hard-coded executable names;
158 "unknown executable '%s' for class %s" % \
615 EXECUTABLE = "executable"
621 """Link a bunch of stuff together to create an executable or
697 self.link(CCompiler.EXECUTABLE, objects,
722 linked into the shared library or executable.
    [all...]
  /prebuilts/gdb/linux-x86/lib/python2.7/distutils/
ccompiler.py 140 is a string that will be split into executable name and (optional)
148 # attributes 'cpp', 'cc', etc. with hard-coded executable names;
158 "unknown executable '%s' for class %s" % \
615 EXECUTABLE = "executable"
621 """Link a bunch of stuff together to create an executable or
697 self.link(CCompiler.EXECUTABLE, objects,
722 linked into the shared library or executable.
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/distutils/
ccompiler.py 140 is a string that will be split into executable name and (optional)
148 # attributes 'cpp', 'cc', etc. with hard-coded executable names;
158 "unknown executable '%s' for class %s" % \
615 EXECUTABLE = "executable"
621 """Link a bunch of stuff together to create an executable or
697 self.link(CCompiler.EXECUTABLE, objects,
722 linked into the shared library or executable.
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/distutils/
ccompiler.py 140 is a string that will be split into executable name and (optional)
148 # attributes 'cpp', 'cc', etc. with hard-coded executable names;
158 "unknown executable '%s' for class %s" % \
615 EXECUTABLE = "executable"
621 """Link a bunch of stuff together to create an executable or
697 self.link(CCompiler.EXECUTABLE, objects,
722 linked into the shared library or executable.
    [all...]
  /external/autotest/client/common_lib/
software_manager.py 372 executable = os_dep.command('yum')
374 self.base_command = executable + ' ' + base_arguments
378 y_cmd = executable + ' --version | head -1'
619 executable = os_dep.command('apt-get')
620 self.base_command = executable + ' -y'

Completed in 1108 milliseconds

<<61626364656667686970>>