Searched
full:executable (Results
651 -
675 of
4711) sorted by null
<<21222324252627282930>>
/docs/source.android.com/src/security/enhancements/ |
enhancements41.jd | 37 <li>PIE (Position Independent Executable) support</li>
|
/external/apache-xml/src/main/java/org/apache/xpath/ |
ExpressionNode.java | 29 * this interface does not lay any claim to being directly executable.
|
/external/autotest/client/site_tests/firmware_TouchMTB/ |
common_util.py | 59 """Check if an executable program exists."""
|
/external/autotest/server/site_tests/native_Benchmarks/ |
octane.py | 31 cmd = 'cd %s && %s run_all.js' % (wd, self.v8.executable)
|
/external/autotest/server/site_tests/ssp_PackageInstall/ |
ssp_PackageInstall.py | 56 logging.info('Found sox executable.')
|
/external/bison/lib/ |
progname.h | 50 /* Return the full pathname of the current executable, based on the earlier
|
/external/chromium-trace/catapult/catapult_base/catapult_base/ |
binary_manager.py | 19 """ Return a path to the executable for <binary_name>, or None if not found.
|
/external/chromium-trace/catapult/telemetry/telemetry/testing/ |
unittest_runner.py | 39 return subprocess.call([sys.executable, path_to_run_tests] + args, env=env)
|
/external/chromium-trace/catapult/telemetry/third_party/modulegraph/modulegraph_tests/testdata/nspkg/src/ |
install.py | 35 sys.executable,
|
/external/compiler-rt/lib/asan/ |
asan_preinit.cc | 21 // This code linked into the main executable when -fsanitize=address is in
|
/external/compiler-rt/test/msan/ |
dso-origin.cc | 1 // Build a library with origin tracking and an executable w/o origin tracking.
|
/external/compiler-rt/test/profile/ |
lit.cfg | 11 # Setup executable root.
|
/external/curl/tests/server/ |
CMakeLists.txt | 31 # Add the postfix to the executable since it is not added
|
/external/elfutils/tests/ |
run-linkmap-cut.sh | 22 # therefore all libraries after the main executable and vDSO are removed.
|
/external/emma/core/res/com/vladium/emma/ |
run_usage.res | 11 "run an executable jar file";
|
/external/google-breakpad/src/common/mac/ |
launch_reporter.h | 36 // |reporter_executable_path| is the path to the sender executable.
|
/external/google-breakpad/src/tools/windows/symupload/ |
symupload.gyp | 36 'type': 'executable',
|
/external/icu/icu4j/perf-tests/ |
build.xml | 34 <exec executable="${perl}">
|
/external/jsilver/ |
build.xml | 12 <exec executable="java">
|
/external/kernel-headers/original/uapi/linux/ |
a.out.h | 62 /* Code indicating object file or impure executable. */ 64 /* Code indicating pure executable. */ 66 /* Code indicating demand-paged executable. */ 68 /* This indicates a demand-paged executable with the header in the text.
|
/external/libchrome/sandbox/win/ |
sandbox_win.gypi | 208 'type': 'executable', 242 'type': 'executable', 259 'type': 'executable', 286 'type': 'executable',
|
/external/libchrome/sandbox/win/src/ |
sandbox_factory.h | 29 // The Sandbox library needs to be linked against the main executable, but
|
/external/libgdx/extensions/gdx-freetype/jni/freetype-2.6.2/builds/compiler/ |
visualc.mk | 58 # Target executable flag
|
/external/libgdx/extensions/gdx-setup/src/com/badlogic/gdx/setup/resources/ios/ |
robovm.xml | 2 <executableName>${app.executable}</executableName>
|
/external/libunwind/src/ia64/ |
longjmp.S | 40 /* We do not need executable stack. */
|
Completed in 1238 milliseconds
<<21222324252627282930>>