HomeSort by relevance Sort by last modified time
    Searched full:executable (Results 576 - 600 of 4711) sorted by null

<<21222324252627282930>>

  /toolchain/binutils/binutils-2.25/ld/testsuite/ld-mips-elf/
pic-and-nonpic-6-n32.sd 2 Elf file type is EXEC \(Executable file\)
pic-and-nonpic-6-n64.sd 2 Elf file type is EXEC \(Executable file\)
pic-and-nonpic-6-o32.sd 2 Elf file type is EXEC \(Executable file\)
  /development/python-packages/gdbrunner/
__init__.py 61 msg = "ERROR: Unable to run adb executable (tried '{}')."
189 """Finds a device executable file.
197 executable_path: absolute path to the executable or symlink.
205 RuntimeError: could not find the executable binary.
224 # Last, download the stripped executable from the device if necessary.
241 raise RuntimeError('Could not find executable {}'.format(executable_path))
245 """Finds a device executable file corresponding to |pid|."""
  /external/chromium-trace/catapult/telemetry/telemetry/internal/backends/chrome/
desktop_browser_finder.py 26 def __init__(self, browser_type, finder_options, executable, flash_path,
34 self._local_executable = executable
41 return 'PossibleDesktopBrowser(type=%s, executable=%s, flash=%s)' % (
164 # Add the explicit browser executable if given and we can handle it.
172 # It is okay if the executable name doesn't match any of known chrome
185 '%s specified by --browser-executable does not exist or is not '
186 'executable' %
  /external/chromium-trace/catapult/third_party/py_vulcanize/third_party/rcssmin/_setup/py2/
shell.py 196 for arg in [_sys.executable, name]:
204 argv = [_sys.executable, name]
293 for arg in [_sys.executable, name]:
301 argv = [_sys.executable, name]
453 def frompath(executable):
454 """ Find executable in PATH """
461 ext = _os.path.splitext(executable)[1]
469 if not _os.path.isfile(executable + ext):
471 fname = _os.path.join(path, executable + ext)
476 return executable + ex
    [all...]
  /external/chromium-trace/catapult/third_party/py_vulcanize/third_party/rjsmin/_setup/py2/
shell.py 196 for arg in [_sys.executable, name]:
204 argv = [_sys.executable, name]
293 for arg in [_sys.executable, name]:
301 argv = [_sys.executable, name]
453 def frompath(executable):
454 """ Find executable in PATH """
461 ext = _os.path.splitext(executable)[1]
469 if not _os.path.isfile(executable + ext):
471 fname = _os.path.join(path, executable + ext)
476 return executable + ex
    [all...]
  /external/clang/tools/clang-format/
clang-format.el 38 (defcustom clang-format-executable
39 (or (executable-find "clang-format")
41 "Location of the clang-format executable.
43 A string containing the name or the full path of the executable."
125 (point-min) (point-max) clang-format-executable
  /external/libxml2/result/HTML/
fp40.htm 40 <a href="#executables">Uploading files into executable folders</a></p>
90 <h3><a name="executables">Uploading files into executable folders</a></h3>
94 executable folders. For security reasons, the default setting on FrontPage 2000 webs does not
95 allow authors to upload executable files into executable folders in a FrontPage web. This
  /external/libxml2/test/HTML/
fp40.htm 39 <a href="#executables">Uploading files into executable folders</a></p>
89 <h3><a name="executables">Uploading files into executable folders</a></h3>
93 executable folders. For security reasons, the default setting on FrontPage 2000 webs does not
94 allow authors to upload executable files into executable folders in a FrontPage web. This
  /external/llvm/test/tools/dsymutil/
debug-map-parsing.test 5 RUN: not llvm-dsymutil -dump-debug-map %p/Inputs/inexistant 2>&1 | FileCheck %s --check-prefix=NO-EXECUTABLE
8 Check that We can parse the debug map of the basic executable.
28 Check that we can parse the debug-map of the basic-lto executable
84 NO-EXECUTABLE: cannot parse{{.*}}/inexistant": {{[Nn]o}} such file
85 NO-EXECUTABLE-NOT: ---
  /external/valgrind/coregrind/
link_tool_exe_darwin.in 12 # the tool executable) to be loaded at that address.
59 # is placed 64M after the executable start. It is probably safer to
60 # place it 64M before the executable's start point, so the executable
65 # executable for which we are linking. We need to know this because
pub_core_ume.h 62 Addr text; // OUT: address of executable's Mach header
63 Bool dynamic; // OUT: False iff executable is static
73 Addr entry; // OUT: entrypoint in main executable
86 // Do a number of appropriate checks to see if the file looks executable by
87 // the kernel: ie. it's a file, it's readable and executable, and it's in
  /external/valgrind/coregrind/m_initimg/
initimg-pathscan.c 3 /*--- Startup: search PATH for an executable initimg-pathscan.c ---*/
44 /*=== Find executable ===*/
104 // If we match an executable, we choose that immediately. If we find a
105 // matching non-executable we remember it but keep looking for an
106 // matching executable later in the path.
  /toolchain/binutils/binutils-2.25/ld/testsuite/ld-s390/
tlsbinpic_64.s 83 /* GD -> IE because variable is not defined in executable */
88 /* GD -> IE because variable is not defined in executable where
94 /* GD -> LE with global variable defined in executable */
99 /* GD -> LE with local variable defined in executable */
104 /* GD -> LE with hidden variable defined in executable */
  /external/dbus/dbus/
dbus-spawn-win.c 71 char *executable; member in struct:DBusBabysitter
261 dbus_free (sitter->executable);
340 sitter->executable, emsg);
348 sitter->executable, sitter->child_status);
355 sitter->executable);
596 _dbus_verbose ("babysitter: spawning %s\n", sitter->executable);
599 sitter->child_handle = spawn_program (sitter->executable,
670 sitter->executable = _dbus_strdup (argv[0]);
671 if (sitter->executable == NULL)
820 _dbus_warn ("Did not get an error launching nonexistent executable\n")
    [all...]
dbus-spawn.c 195 char *executable; /**< executable name to use in error messages */ member in struct:DBusBabysitter
346 dbus_free (sitter->executable);
701 sitter->executable, _dbus_strerror (sitter->errnum));
707 sitter->executable, _dbus_strerror (sitter->errnum));
714 sitter->executable, WEXITSTATUS (sitter->status));
718 sitter->executable, WTERMSIG (sitter->status));
722 sitter->executable);
728 sitter->executable);
1118 * Spawns a new process. The executable name and argv[0
    [all...]
  /external/v8/src/heap/
spaces.cc 125 // the beginning of an executable space.
222 return isolate_->memory_allocator()->CommitMemory(start, length, EXECUTABLE);
314 Executability executable) {
316 executable == EXECUTABLE)) {
326 Executability executable) {
339 Executability executable) {
345 DCHECK(executable == NOT_EXECUTABLE || isolate_->code_range() == NULL ||
354 Executability executable) {
358 DCHECK(executable == EXECUTABLE)
515 Executability executable = local
    [all...]
  /external/icu/icu4c/source/tools/
icu-svnprops-check.py 56 configure = svn:eol-style=native;svn:executable
57 *.sh = svn:eol-style=native;svn:executable
58 *.pl = svn:eol-style=native;svn:executable
59 *.py = svn:eol-style=native;svn:executable
116 # example string_proplist at this point: " svn:eol-style=native;svn:executable"
126 # properties with no explicit value, e.g. svn:executable
  /external/valgrind/coregrind/m_ume/
main.c 66 // Check the file looks executable.
90 "Warning: Can't execute setuid/setgid/setcap executable: %s\n",
110 // Look for a matching executable format
118 // Rejected by all executable format handlers.
215 // It was an executable file, but in an unacceptable format. Probably
257 // Was it not executable?
  /external/webrtc/webrtc/
webrtc_examples.gyp 15 'type': 'executable',
26 'type': 'executable',
37 'type': 'executable',
48 'type': 'executable',
71 'type': 'executable',
248 'type': 'executable',
  /art/runtime/
compiler_filter.h 48 // compiled executable code for bytecode.
52 // compiled executable code for JNI methods.
  /bionic/libc/bionic/
dl_iterate_phdr_static.cpp 57 // Try the executable first.
83 // There's only the executable to try.
  /bootable/recovery/
Android.mk 114 # recovery-persist (system partition dynamic executable run after /data mounts)
124 # recovery-refresh (system partition dynamic executable run at init)
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/os/
FileUtils.java 65 private boolean executable; field in class:FileUtils.FileStatus
96 return executable;

Completed in 1453 milliseconds

<<21222324252627282930>>