Home
last modified time | relevance | path

Searched refs:executable (Results 1 – 25 of 2379) sorted by relevance

12345678910>>...96

/external/python/cpython2/Lib/distutils/
Dspawn.py64 executable = cmd[0]
68 executable = find_executable(executable) or executable
69 log.info(' '.join([executable] + cmd[1:]))
73 rc = os.spawnv(os.P_WAIT, executable, cmd)
77 cmd = executable
83 cmd = executable
88 executable = cmd[0]
91 executable = find_executable(executable) or executable
92 log.info(' '.join([executable] + cmd[1:]))
96 rc = os.spawnv(os.P_WAIT, executable, cmd)
[all …]
/external/autotest/client/site_tests/platform_Firewall/
Dplatform_Firewall.py32 def _iptables_rules(executable): argument
33 rule_output = utils.system_output("%s -S" % executable)
39 def _check(expected_rule, actual_rules, error_msg, executable, check): argument
42 raise error.TestFail(error_msg % executable)
46 def _check_included(expected_rule, actual_rules, error_msg, executable): argument
49 expected_rule, actual_rules, error_msg, executable,
54 def _check_not_included(expected_rule, actual_rules, error_msg, executable): argument
57 expected_rule, actual_rules, error_msg, executable,
97 for executable in ["iptables", "ip6tables"]:
98 actual_rules = self._iptables_rules(executable)
[all …]
/external/mesa3d/src/util/
D00-mesa-defaults.conf37 executable CDATA #IMPLIED
59 <application name="Unigine Sanctuary" executable="Sanctuary">
65 <application name="Unigine Tropics" executable="Tropics">
71 <application name="Unigine Heaven (32-bit)" executable="heaven_x86">
77 <application name="Unigine Heaven (64-bit)" executable="heaven_x64">
83 <application name="Unigine Valley (32-bit)" executable="valley_x86">
89 <application name="Unigine Valley (64-bit)" executable="valley_x64">
95 <application name="Unigine OilRush (32-bit)" executable="OilRush_x86">
100 <application name="Unigine OilRush (64-bit)" executable="OilRush_x64">
105 <application name="Savage 2" executable="savage2.bin">
[all …]
/external/python/cpython3/PC/
Dpython_uwp.cpp89 std::wstring executable; in set_process_name() local
98 executable = std::wstring(localAppData) in set_process_name()
109 if (home.empty() && executable.empty()) { in set_process_name()
110 executable.resize(MAX_PATH); in set_process_name()
113 NULL, executable.data(), (DWORD)executable.size()); in set_process_name()
115 executable.clear(); in set_process_name()
117 } else if (len == executable.size() && in set_process_name()
119 executable.resize(len * 2); in set_process_name()
121 executable.resize(len); in set_process_name()
125 size_t i = executable.find_last_of(L"/\\"); in set_process_name()
[all …]
Dlauncher.c174 wchar_t executable[MAX_PATH]; member
224 if (_wcsicmp(path, ip->executable) == 0) { in find_existing_python()
302 data_size = sizeof(ip->executable) - 1; in _locate_pythons_for_key()
306 (LPBYTE)ip->executable, &data_size); in _locate_pythons_for_key()
312 data_size = sizeof(ip->executable) - 1; in _locate_pythons_for_key()
314 (LPBYTE)ip->executable, &data_size); in _locate_pythons_for_key()
328 if (ip->executable[data_size - 1] == L'\\') in _locate_pythons_for_key()
334 _snwprintf_s(&ip->executable[data_size], in _locate_pythons_for_key()
339 attrs = GetFileAttributesW(ip->executable); in _locate_pythons_for_key()
343 ip->executable, message); in _locate_pythons_for_key()
[all …]
/external/python/cpython2/Lib/test/
Dtest_subprocess.py87 rc = subprocess.call([sys.executable, "-c",
93 rc = subprocess.check_call([sys.executable, "-c",
100 subprocess.check_call([sys.executable, "-c",
107 [sys.executable, "-c", "print 'BDFL'"])
114 [sys.executable, "-c", "import sys; sys.exit(5)"])
120 [sys.executable, "-c", "import sys; sys.stderr.write('BDFL')"],
128 [sys.executable, "-c", "print 'will not be run'"],
137 rc = subprocess.call([sys.executable, "-c",
155 p = subprocess.Popen([sys.executable, "-c", 'print "banana"'],
177 p = subprocess.Popen([sys.executable, "-c", code],
[all …]
/external/libkmsxx/utils/
Dmeson.build5 executable('kmstest', 'kmstest.cpp', dependencies : [ common_deps ], install : true)
6 executable('kmsview', 'kmsview.cpp', dependencies : [ common_deps ], install : false)
7 executable('kmsprint', 'kmsprint.cpp', dependencies : [ common_deps ], install : true)
8 executable('fbtest', 'fbtest.cpp', dependencies : [ common_deps ], install : true)
9 executable('kmscapture', 'kmscapture.cpp', dependencies : [ common_deps ], install : false)
10 executable('kmsblank', 'kmsblank.cpp', dependencies : [ common_deps ], install : true)
13executable('kmstouch', 'kmstouch.cpp', dependencies : [ common_deps, libevdev_dep ], install : fal…
16 executable('omap-wbcap', 'omap-wbcap.cpp', dependencies : [ common_deps ], install : false)
17 executable('omap-wbm2m', 'omap-wbm2m.cpp', dependencies : [ common_deps ], install : false)
/external/python/cpython3/Lib/distutils/
Dspawn.py48 executable = find_executable(cmd[0])
49 if executable is not None:
50 cmd[0] = executable
91 def find_executable(executable, path=None): argument
97 _, ext = os.path.splitext(executable)
99 executable = executable + '.exe'
101 if os.path.isfile(executable):
102 return executable
121 f = os.path.join(p, executable)
/external/llvm-project/lldb/source/Core/
DDynamicLoader.cpp76 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local
78 if (executable) { in GetTargetExecutable()
79 if (FileSystem::Instance().Exists(executable->GetFileSpec())) { in GetTargetExecutable()
80 ModuleSpec module_spec(executable->GetFileSpec(), in GetTargetExecutable()
81 executable->GetArchitecture()); in GetTargetExecutable()
87 executable->GetUUID().IsValid()) { in GetTargetExecutable()
88 if (module_sp->GetUUID() != executable->GetUUID()) in GetTargetExecutable()
89 executable.reset(); in GetTargetExecutable()
90 } else if (executable->FileHasChanged()) { in GetTargetExecutable()
91 executable.reset(); in GetTargetExecutable()
[all …]
/external/llvm-project/lldb/source/Plugins/DynamicLoader/Windows-DYLD/
DDynamicLoaderWindowsDYLD.cpp101 lldb::addr_t DynamicLoaderWindowsDYLD::GetLoadAddress(ModuleSP executable) { in GetLoadAddress() argument
103 auto it = m_loaded_modules.find(executable); in GetLoadAddress()
111 FileSpec file_spec(executable->GetPlatformFileSpec()); in GetLoadAddress()
117 m_loaded_modules[executable] = load_addr; in GetLoadAddress()
128 ModuleSP executable = GetTargetExecutable(); in DidAttach() local
130 if (!executable.get()) in DidAttach()
135 lldb::addr_t load_addr = GetLoadAddress(executable); in DidAttach()
145 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_addr, false); in DidAttach()
148 module_list.Append(executable); in DidAttach()
158 ModuleSP executable = GetTargetExecutable(); in DidLaunch() local
[all …]
/external/bazelbuild-rules_android/toolchains/android/
Dtoolchain.bzl26 executable = True,
32 executable = True,
38 executable = True,
44 executable = True,
55 executable = True,
61 executable = True,
67 executable = True,
73 executable = True,
86 executable = True,
92 executable = True,
[all …]
/external/selinux/sandbox/
Dtest_sandbox.py30 p2 = Popen([sys.executable, 'sandbox', 'grep', 'root'], stdin=p1.stdout, stdout=PIPE)
38 p = Popen([sys.executable, 'sandbox', 'kill', '-HUP', str(pid)], stdout=PIPE, stderr=PIPE)
44 … p = Popen([sys.executable, 'sandbox', 'ping', '-c 1 ', '127.0.0.1'], stdout=PIPE, stderr=PIPE)
50 p = Popen([sys.executable, 'sandbox', 'mkdir', '~/test'], stdout=PIPE, stderr=PIPE)
56 p = Popen([sys.executable, 'sandbox', 'ls', '~'], stdout=PIPE, stderr=PIPE)
62 p = Popen([sys.executable, 'sandbox', 'mail'], stdout=PIPE, stderr=PIPE)
68 p = Popen([sys.executable, 'sandbox', 'sudo'], stdout=PIPE, stderr=PIPE)
74 p = Popen([sys.executable, 'sandbox', '-M', 'id'], stdout=PIPE, stderr=PIPE)
80 p = Popen([sys.executable, 'sandbox', '-l', 's0', 'id'], stdout=PIPE, stderr=PIPE)
87 p = Popen([sys.executable, 'sandbox', '-H', homedir, '-M', 'id'], stdout=PIPE, stderr=PIPE)
[all …]
/external/lz4/contrib/meson/examples/
Dmeson.build14 printVersion = executable('printVersion',
18 doubleBuffer = executable('doubleBuffer',
22 dictionaryRandomAccess = executable('dictionaryRandomAccess',
26 ringBuffer = executable('ringBuffer',
30 ringBufferHC = executable('ringBufferHC',
34 lineCompress = executable('lineCompress',
38 frameCompress = executable('frameCompress',
42 compressFunctions = executable('compressFunctions',
46 simpleBuffer = executable('simpleBuffer',
/external/tensorflow/tensorflow/lite/delegates/gpu/cl/
Drun_tests.sh84 executable=${target##*:} #finds last token after ':'
89 ADB shell chmod +x $OPENCL_DIR/$executable
90 ADB shell ./$OPENCL_DIR/$executable
91 ADB shell rm -f $OPENCL_DIR/$executable
95 executable=${target##*:} #finds last token after ':'
100 ADB shell chmod +x $OPENCL_DIR/$executable
101 …ADB shell ./$OPENCL_DIR/$executable --logtostderr 2> /dev/null | grep '\][[:space:]][a-zA-Z][a-zA-…
102 ADB shell rm -f $OPENCL_DIR/$executable
/external/llvm-project/lldb/source/Plugins/DynamicLoader/Hexagon-DYLD/
DDynamicLoaderHexagonDYLD.cpp125 ModuleSP executable; in DidAttach() local
128 executable = GetTargetExecutable(); in DidAttach()
135 if (executable.get() == nullptr) in DidAttach()
146 module_list.Append(executable); in DidAttach()
150 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_offset, true); in DidAttach()
175 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local
178 if (!executable.get()) in GetTargetExecutable()
179 return executable; in GetTargetExecutable()
182 if (!FileSystem::Instance().Exists(executable->GetFileSpec())) in GetTargetExecutable()
183 return executable; in GetTargetExecutable()
[all …]
/external/python/cpython3/Lib/test/
Dtest_subprocess.py58 ZERO_RETURN_CMD = (sys.executable, '-c', 'pass')
134 rc = subprocess.call([sys.executable, "-c",
144 [sys.executable, "-c", "while True: pass"],
155 subprocess.check_call([sys.executable, "-c",
162 [sys.executable, "-c", "print('BDFL')"])
169 [sys.executable, "-c", "import sys; sys.exit(5)"])
175 [sys.executable, "-c", "import sys; sys.stderr.write('BDFL')"],
186 [sys.executable, "-c",
194 [sys.executable, "-c",
203 [sys.executable, "-c", "print('will not be run')"],
[all …]
/external/angle/src/libANGLE/renderer/d3d/d3d11/
DShaderExecutable11.cpp21 d3d11::PixelShader &&executable) in ShaderExecutable11() argument
23 mPixelExecutable(std::move(executable)), in ShaderExecutable11()
32 d3d11::VertexShader &&executable, in ShaderExecutable11() argument
36 mVertexExecutable(std::move(executable)), in ShaderExecutable11()
44 d3d11::GeometryShader &&executable) in ShaderExecutable11() argument
48 mGeometryExecutable(std::move(executable)), in ShaderExecutable11()
55 d3d11::ComputeShader &&executable) in ShaderExecutable11() argument
61 mComputeExecutable(std::move(executable)) in ShaderExecutable11()
/external/tensorflow/tensorflow/compiler/jit/
Dget_compiler_ir.cc42 xla::LocalExecutable* executable = nullptr; in GetLocalExecutable() local
45 &compilation_result, &executable)); in GetLocalExecutable()
46 return executable; in GetLocalExecutable()
143 xla::StatusOr<xla::LocalExecutable*> executable = GetLocalExecutable( in GetCompilerIr() local
145 TF_RETURN_IF_ERROR(executable.status()); in GetCompilerIr()
146 xla::Executable* new_executable = (*executable)->executable(); in GetCompilerIr()
154 xla::StatusOr<xla::LocalExecutable*> executable = GetLocalExecutable( in GetCompilerIr() local
156 TF_RETURN_IF_ERROR(executable.status()); in GetCompilerIr()
158 *(*executable)->executable()->module().entry_computation(), in GetCompilerIr()
/external/rust/crates/grpcio-sys/grpc/bazel/
Dpython_rules.bzl22 tools = [context.executable._protoc]
35 context.executable.plugin,
41 tools.append(context.executable.plugin)
49 executable = context.executable._protoc,
75 executable = True,
82 executable = True,
133 tools = [context.executable._protoc, context.executable._grpc_plugin]
136 context.executable._grpc_plugin,
143 context.executable.plugin,
149 tools.append(context.executable.plugin)
[all …]
/external/tensorflow/tensorflow/compiler/xrt/kernels/
Dxrt_execute_op.cc89 xla::LocalExecutable* executable, XRTMemoryManager::WorkingSet* working_set, in GetInputTuples() argument
93 executable->executable()->module_config().entry_computation_layout(); in GetInputTuples()
298 xla::LocalExecutable* executable, in RunExecutable() argument
303 executable->executable()->module_config().entry_computation_layout(); in RunExecutable()
308 executable->executable()->module().input_output_alias_config(), in RunExecutable()
319 if (executable->executable() in RunExecutable()
323 &executable->executable()->module_config().static_device_assignment()); in RunExecutable()
349 executable->executable() in RunExecutable()
357 executable->Run(std::move(execution_inputs), run_options)); in RunExecutable()
369 executable->executable()->module().input_output_alias_config())); in RunExecutable()
[all …]
/external/angle/src/libANGLE/
DProgramPipeline.cpp398 const ProgramExecutable &executable = shaderProgram->getExecutable(); in updateLinkedVaryings() local
400 executable.getLinkedOutputVaryings(shaderType); in updateLinkedVaryings()
402 executable.getLinkedInputVaryings(shaderType); in updateLinkedVaryings()
409 const ProgramExecutable &executable = computeProgram->getExecutable(); in updateLinkedVaryings() local
411 executable.getLinkedOutputVaryings(ShaderType::Compute); in updateLinkedVaryings()
413 executable.getLinkedInputVaryings(ShaderType::Compute); in updateLinkedVaryings()
425 const ProgramExecutable &executable = shaderProgram->getExecutable(); in updateHasBooleans() local
427 if (executable.hasUniformBuffers()) in updateHasBooleans()
431 if (executable.hasGraphicsStorageBuffers()) in updateHasBooleans()
435 if (executable.hasAtomicCounterBuffers()) in updateHasBooleans()
[all …]
/external/angle/src/libANGLE/renderer/vulkan/
DTransformFeedbackVk.cpp93 const gl::ProgramExecutable *executable = contextVk->getState().getProgramExecutable(); in begin() local
94 ASSERT(executable); in begin()
95 size_t xfbBufferCount = executable->getTransformFeedbackBufferCount(); in begin()
174 const gl::ProgramExecutable *executable = contextVk->getState().getProgramExecutable(); in pause() local
175 ASSERT(executable); in pause()
176 size_t xfbBufferCount = executable->getTransformFeedbackBufferCount(); in pause()
193 const gl::ProgramExecutable *executable = contextVk->getState().getProgramExecutable(); in resume() local
194 ASSERT(executable); in resume()
195 size_t xfbBufferCount = executable->getTransformFeedbackBufferCount(); in resume()
276 const gl::ProgramExecutable *executable = contextVk->getState().getProgramExecutable(); in updateDescriptorSet() local
[all …]
/external/python/setuptools/setuptools/tests/
Dtest_namespaces.py33 sys.executable,
43 sys.executable,
52 sys.executable,
69 sys.executable,
78 sys.executable,
95 sys.executable,
107 sys.executable,
/external/tensorflow/tensorflow/core/tpu/kernels/
Dtpu_compilation_cache_rpc_support.cc94 TpuExecutableSerializedProto executable; in SerializeCacheEntryToBufferSlices() local
95 auto cleanup_executable = xla::MakeCleanup([&executable]() { in SerializeCacheEntryToBufferSlices()
96 if (executable.size > 0) { in SerializeCacheEntryToBufferSlices()
97 stream_executor::tpu::SerializedProto_Free(executable); in SerializeCacheEntryToBufferSlices()
101 cache_entry.core_index(), &executable); in SerializeCacheEntryToBufferSlices()
108 if (!header.mutable_proto()->ParseFromArray(executable.bytes, in SerializeCacheEntryToBufferSlices()
109 executable.size)) { in SerializeCacheEntryToBufferSlices()
/external/llvm-project/lld/test/MachO/
Dload-commands.s4 # RUN: %lld -o %t/executable %t/test.o
5 # RUN: %lld -execute -o %t/explicit-executable %t/test.o
16 ## executable. Also check that it has the right filetype.
17 # RUN: llvm-objdump --macho --all-headers %t/executable | FileCheck %s --check-prefix=COMMON
18 # RUN: llvm-objdump --macho --all-headers %t/executable | FileCheck %s --check-prefix=EXEC
19 # RUN: llvm-objdump --macho --all-headers %t/explicit-executable | FileCheck %s --check-prefix=COMM…
20 # RUN: llvm-objdump --macho --all-headers %t/explicit-executable | FileCheck %s --check-prefix=EXEC
26 ## Check for the absence of load commands that should not be in an executable.
27 # RUN: llvm-objdump --macho --all-headers %t/executable | FileCheck %s --check-prefix=NEXEC

12345678910>>...96