HomeSort by relevance Sort by last modified time
    Searched full:executable (Results 651 - 675 of 4711) sorted by null

<<21222324252627282930>>

  /docs/source.android.com/src/security/enhancements/
enhancements41.jd 37 <li>PIE (Position Independent Executable) support</li>
  /external/apache-xml/src/main/java/org/apache/xpath/
ExpressionNode.java 29 * this interface does not lay any claim to being directly executable.
  /external/autotest/client/site_tests/firmware_TouchMTB/
common_util.py 59 """Check if an executable program exists."""
  /external/autotest/server/site_tests/native_Benchmarks/
octane.py 31 cmd = 'cd %s && %s run_all.js' % (wd, self.v8.executable)
  /external/autotest/server/site_tests/ssp_PackageInstall/
ssp_PackageInstall.py 56 logging.info('Found sox executable.')
  /external/bison/lib/
progname.h 50 /* Return the full pathname of the current executable, based on the earlier
  /external/chromium-trace/catapult/catapult_base/catapult_base/
binary_manager.py 19 """ Return a path to the executable for <binary_name>, or None if not found.
  /external/chromium-trace/catapult/telemetry/telemetry/testing/
unittest_runner.py 39 return subprocess.call([sys.executable, path_to_run_tests] + args, env=env)
  /external/chromium-trace/catapult/telemetry/third_party/modulegraph/modulegraph_tests/testdata/nspkg/src/
install.py 35 sys.executable,
  /external/compiler-rt/lib/asan/
asan_preinit.cc 21 // This code linked into the main executable when -fsanitize=address is in
  /external/compiler-rt/test/msan/
dso-origin.cc 1 // Build a library with origin tracking and an executable w/o origin tracking.
  /external/compiler-rt/test/profile/
lit.cfg 11 # Setup executable root.
  /external/curl/tests/server/
CMakeLists.txt 31 # Add the postfix to the executable since it is not added
  /external/elfutils/tests/
run-linkmap-cut.sh 22 # therefore all libraries after the main executable and vDSO are removed.
  /external/emma/core/res/com/vladium/emma/
run_usage.res 11 "run an executable jar file";
  /external/google-breakpad/src/common/mac/
launch_reporter.h 36 // |reporter_executable_path| is the path to the sender executable.
  /external/google-breakpad/src/tools/windows/symupload/
symupload.gyp 36 'type': 'executable',
  /external/icu/icu4j/perf-tests/
build.xml 34 <exec executable="${perl}">
  /external/jsilver/
build.xml 12 <exec executable="java">
  /external/kernel-headers/original/uapi/linux/
a.out.h 62 /* Code indicating object file or impure executable. */
64 /* Code indicating pure executable. */
66 /* Code indicating demand-paged executable. */
68 /* This indicates a demand-paged executable with the header in the text.
  /external/libchrome/sandbox/win/
sandbox_win.gypi 208 'type': 'executable',
242 'type': 'executable',
259 'type': 'executable',
286 'type': 'executable',
  /external/libchrome/sandbox/win/src/
sandbox_factory.h 29 // The Sandbox library needs to be linked against the main executable, but
  /external/libgdx/extensions/gdx-freetype/jni/freetype-2.6.2/builds/compiler/
visualc.mk 58 # Target executable flag
  /external/libgdx/extensions/gdx-setup/src/com/badlogic/gdx/setup/resources/ios/
robovm.xml 2 <executableName>${app.executable}</executableName>
  /external/libunwind/src/ia64/
longjmp.S 40 /* We do not need executable stack. */

Completed in 1238 milliseconds

<<21222324252627282930>>