/system/bt/test/suite/ |
BUILD.gn | 17 executable("net_test_bluetooth") {
|
/system/bt/tools/mcap_tool/ |
BUILD.gn | 16 executable("mcap_tool") {
|
/system/bt/service/ |
BUILD.gn | 64 executable("bluetoothtbd") { 85 executable("service_unittests") {
|
/system/bt/stack/ |
BUILD.gn | 190 executable("stack_unittests") { 237 executable("net_test_stack_multi_adv") {
|
/system/bt/btcore/ |
BUILD.gn | 36 executable("net_test_btcore") {
|
/system/bt/device/ |
BUILD.gn | 37 executable("net_test_device") {
|
/system/bt/hci/ |
BUILD.gn | 45 executable("net_test_hci") {
|
/system/bt/osi/ |
BUILD.gn | 59 executable("net_test_osi") {
|
/external/python/cpython3/Lib/unittest/ |
__main__.py | 7 # use executable without path, unquoted 9 # (if you have spaces in your executable you get what you deserve!) 10 executable = os.path.basename(sys.executable) variable 11 sys.argv[0] = executable + " -m unittest"
|
/external/libmojo/base/files/ |
file_util_android.cc | 12 bool GetShmemTempDir(bool executable, base::FilePath* path) {
|
/external/mdnsresponder/mDNSWindows/SystemService/ |
Firewall.h | 54 LPWSTR executable,
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/subprocessdata/ |
sigchild_ignore.py | 6 subprocess.Popen([sys.executable, '-c', 'print("albatross")']).wait()
|
/external/python/cpython2/Lib/distutils/ |
spawn.py | 6 executable name. 24 executable. 26 If 'search_path' is true (the default), the system's executable 28 must be the exact path to the executable. If 'dry_run' is true, 64 executable = cmd[0] 68 executable = find_executable(executable) or executable 69 log.info(' '.join([executable] + cmd[1:])) 73 rc = os.spawnv(os.P_WAIT, executable, cmd [all...] |
/external/python/cpython2/Lib/test/subprocessdata/ |
sigchild_ignore.py | 6 subprocess.Popen([sys.executable, '-c', 'print("albatross")']).wait() 8 p = subprocess.Popen([sys.executable, '-c', 'print("albatross")'])
|
/external/python/cpython3/Lib/test/subprocessdata/ |
sigchild_ignore.py | 6 subprocess.Popen([sys.executable, '-c', 'print("albatross")']).wait() 8 p = subprocess.Popen([sys.executable, '-c', 'print("albatross")'])
|
/prebuilts/gdb/darwin-x86/lib/python2.7/test/subprocessdata/ |
sigchild_ignore.py | 6 subprocess.Popen([sys.executable, '-c', 'print("albatross")']).wait() 8 p = subprocess.Popen([sys.executable, '-c', 'print("albatross")'])
|
/prebuilts/gdb/linux-x86/lib/python2.7/test/subprocessdata/ |
sigchild_ignore.py | 6 subprocess.Popen([sys.executable, '-c', 'print("albatross")']).wait() 8 p = subprocess.Popen([sys.executable, '-c', 'print("albatross")'])
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/subprocessdata/ |
sigchild_ignore.py | 6 subprocess.Popen([sys.executable, '-c', 'print("albatross")']).wait() 8 p = subprocess.Popen([sys.executable, '-c', 'print("albatross")'])
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/subprocessdata/ |
sigchild_ignore.py | 6 subprocess.Popen([sys.executable, '-c', 'print("albatross")']).wait() 8 p = subprocess.Popen([sys.executable, '-c', 'print("albatross")'])
|
/system/bt/types/ |
BUILD.gn | 36 executable("types_unittests") {
|
/toolchain/binutils/binutils-2.27/ld/testsuite/ld-arm/ |
rel32-reject-pie.d | 3 #error: .*relocation R_ARM_REL32.*can not.*PIE executable.*
|
/external/autotest/client/site_tests/security_Firewall/ |
security_Firewall.py | 20 def get_firewall_settings(executable): 21 rules = utils.system_output("%s -S" % executable) 35 def dump_rules(self, rules, executable): 42 @param executable: 'iptables' for IPv4 or 'ip6tables' for IPv6. 44 outf = open(os.path.join(self.resultsdir, "%s_rules" % executable), 'w') 68 for executable in ["iptables", "ip6tables"]: 69 baseline = self.load_baseline("baseline.%s" % executable) 74 current = self.get_firewall_settings(executable) 77 self.dump_rules(current, executable) 85 "Missing %s rules" % executable) [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/distutils/ |
spawn.py | 6 executable name.
23 executable.
25 If 'search_path' is true (the default), the system's executable
27 must be the exact path to the executable. If 'dry_run' is true,
60 executable = cmd[0]
64 executable = find_executable(executable) or executable
65 log.info(' '.join([executable] + cmd[1:]))
69 rc = os.spawnv(os.P_WAIT, executable, cmd) [all...] |
/external/python/cpython3/Tools/scripts/ |
pyvenv | 6 executable = pathlib.Path(sys.executable or 'python3').name 8 f'`{executable} -m venv`', file=sys.stderr)
|
/external/tensorflow/tensorflow/compiler/xla/service/ |
source_map_util.h | 19 #include "tensorflow/compiler/xla/service/executable.h" 28 // Also, attempts to extract the OpMetadata for parameter_number on executable 31 // executable may be nullptr, but parameter_number should not be out of bounds 33 Status InvalidParameterArgument(Executable* executable, int parameter_number, 38 // from the executable.
|