/external/llvm/test/Bindings/OCaml/ |
vectorize.ml | 9 (* Note: It takes several seconds for ocamlopt to link an executable with
|
/external/mesa3d/src/mapi/shared-glapi/ |
SConscript | 4 from sys import executable as python_cmd
|
/external/protobuf/gtest/test/ |
run_tests_util_test.py | 149 def spawnv(self, wait, executable, *kargs): 151 return self.spawn_impl(executable, kargs) 168 directory, executable = map(os.path.normpath, pair) 174 executable = re.sub(r'\.exe$', '', executable) 175 return (directory, executable) 599 def SpawnImpl(executable, argv): 602 if '.py' in executable or '.py' in argv[0]:
|
/external/swiftshader/third_party/LLVM/test/Bindings/Ocaml/ |
target.ml | 6 (* Note: It takes several seconds for ocamlopt to link an executable with
|
/external/v8/src/heap/ |
spaces-inl.h | 103 Executability executable) { 104 base::OS::Unprotect(start, size, executable); 117 chunks_[id].owner()->executable() == EXECUTABLE); 168 Page* Page::Initialize(Heap* heap, MemoryChunk* chunk, Executability executable, 170 DCHECK_EQ(executable, Executability::NOT_EXECUTABLE); 186 Page* Page::Initialize(Heap* heap, MemoryChunk* chunk, Executability executable, 593 Executability executable, Space* owner) { 594 if (executable && chunk->size() > LargePage::kMaxCodePageSize) {
|
/frameworks/av/services/mediacodec/ |
Android.mk | 21 # service executable
|
/frameworks/native/services/inputflinger/host/ |
Android.mk | 47 # build input flinger executable
|
/prebuilts/gdb/darwin-x86/lib/python2.7/multiprocessing/ |
__init__.py | 140 Check whether this is a fake forked process in a frozen executable. 268 def set_executable(executable): 271 child processes on Windows instead of sys.executable. 275 set_executable(executable)
|
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
test_pdb.py | 24 cmd = [sys.executable, '-m', 'pdb', filename] 356 cmd = [sys.executable, '-m', 'pdb', test_fn,]
|
test_quopri.py | 179 process = subprocess.Popen([sys.executable, "-mquopri"], 190 process = subprocess.Popen([sys.executable, "-mquopri", "-d"],
|
/prebuilts/gdb/linux-x86/lib/python2.7/multiprocessing/ |
__init__.py | 140 Check whether this is a fake forked process in a frozen executable. 268 def set_executable(executable): 271 child processes on Windows instead of sys.executable. 275 set_executable(executable)
|
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
test_pdb.py | 24 cmd = [sys.executable, '-m', 'pdb', filename] 356 cmd = [sys.executable, '-m', 'pdb', test_fn,]
|
test_quopri.py | 179 process = subprocess.Popen([sys.executable, "-mquopri"], 190 process = subprocess.Popen([sys.executable, "-mquopri", "-d"],
|
/prebuilts/misc/common/swig/include/2.0.11/tcl/ |
wish.i | 11 new version of the wish executable. Like tclsh.i, this file should
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/multiprocessing/ |
__init__.py | 140 Check whether this is a fake forked process in a frozen executable. 268 def set_executable(executable): 271 child processes on Windows instead of sys.executable. 275 set_executable(executable)
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_pdb.py | 24 cmd = [sys.executable, '-m', 'pdb', filename] 356 cmd = [sys.executable, '-m', 'pdb', test_fn,]
|
test_quopri.py | 179 process = subprocess.Popen([sys.executable, "-mquopri"], 190 process = subprocess.Popen([sys.executable, "-mquopri", "-d"],
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/multiprocessing/ |
__init__.py | 140 Check whether this is a fake forked process in a frozen executable. 268 def set_executable(executable): 271 child processes on Windows instead of sys.executable. 275 set_executable(executable)
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_pdb.py | 24 cmd = [sys.executable, '-m', 'pdb', filename] 356 cmd = [sys.executable, '-m', 'pdb', test_fn,]
|
test_quopri.py | 179 process = subprocess.Popen([sys.executable, "-mquopri"], 190 process = subprocess.Popen([sys.executable, "-mquopri", "-d"],
|
/system/vold/fs/ |
Ext4.cpp | 116 ALOGD("Not running %s on %s (executable not in system image)\n", 134 bool remount, bool executable) { 143 flags |= (executable ? 0 : MS_NOEXEC);
|
Vfat.cpp | 127 bool remount, bool executable, int ownerUid, int ownerGid, int permMask, 138 flags |= (executable ? 0 : MS_NOEXEC);
|
/toolchain/binutils/binutils-2.25/ld/testsuite/ld-cris/ |
tls-e-tpoffgotcomm1.d | 8 # executable* with TPOFFGOT relocs against common symbols.
|
tls-gc-75.d | 11 # An executable with a R_CRIS_32_GOT_GD, a R_CRIS_16_GOT_GD, a
|
tls-ie-78.d | 10 # R_CRIS_32_IE, for an executable, symbol defined elsewhere.
|