/external/python/cpython2/Lib/distutils/ |
D | spawn.py | 64 executable = cmd[0] 68 executable = find_executable(executable) or executable 69 log.info(' '.join([executable] + cmd[1:])) 73 rc = os.spawnv(os.P_WAIT, executable, cmd) 77 cmd = executable 83 cmd = executable 88 executable = cmd[0] 91 executable = find_executable(executable) or executable 92 log.info(' '.join([executable] + cmd[1:])) 96 rc = os.spawnv(os.P_WAIT, executable, cmd) [all …]
|
/external/autotest/client/site_tests/platform_Firewall/ |
D | platform_Firewall.py | 32 def _iptables_rules(executable): argument 33 rule_output = utils.system_output("%s -S" % executable) 39 def _check(expected_rule, actual_rules, error_msg, executable, check): argument 42 raise error.TestFail(error_msg % executable) 46 def _check_included(expected_rule, actual_rules, error_msg, executable): argument 49 expected_rule, actual_rules, error_msg, executable, 54 def _check_not_included(expected_rule, actual_rules, error_msg, executable): argument 57 expected_rule, actual_rules, error_msg, executable, 97 for executable in ["iptables", "ip6tables"]: 98 actual_rules = self._iptables_rules(executable) [all …]
|
/external/mesa3d/src/util/ |
D | 00-mesa-defaults.conf | 37 executable CDATA #IMPLIED 59 <application name="Unigine Sanctuary" executable="Sanctuary"> 65 <application name="Unigine Tropics" executable="Tropics"> 71 <application name="Unigine Heaven (32-bit)" executable="heaven_x86"> 77 <application name="Unigine Heaven (64-bit)" executable="heaven_x64"> 83 <application name="Unigine Valley (32-bit)" executable="valley_x86"> 89 <application name="Unigine Valley (64-bit)" executable="valley_x64"> 95 <application name="Unigine OilRush (32-bit)" executable="OilRush_x86"> 100 <application name="Unigine OilRush (64-bit)" executable="OilRush_x64"> 105 <application name="Savage 2" executable="savage2.bin"> [all …]
|
/external/python/cpython3/PC/ |
D | python_uwp.cpp | 89 std::wstring executable; in set_process_name() local 98 executable = std::wstring(localAppData) in set_process_name() 109 if (home.empty() && executable.empty()) { in set_process_name() 110 executable.resize(MAX_PATH); in set_process_name() 113 NULL, executable.data(), (DWORD)executable.size()); in set_process_name() 115 executable.clear(); in set_process_name() 117 } else if (len == executable.size() && in set_process_name() 119 executable.resize(len * 2); in set_process_name() 121 executable.resize(len); in set_process_name() 125 size_t i = executable.find_last_of(L"/\\"); in set_process_name() [all …]
|
D | launcher.c | 174 wchar_t executable[MAX_PATH]; member 224 if (_wcsicmp(path, ip->executable) == 0) { in find_existing_python() 302 data_size = sizeof(ip->executable) - 1; in _locate_pythons_for_key() 306 (LPBYTE)ip->executable, &data_size); in _locate_pythons_for_key() 312 data_size = sizeof(ip->executable) - 1; in _locate_pythons_for_key() 314 (LPBYTE)ip->executable, &data_size); in _locate_pythons_for_key() 328 if (ip->executable[data_size - 1] == L'\\') in _locate_pythons_for_key() 334 _snwprintf_s(&ip->executable[data_size], in _locate_pythons_for_key() 339 attrs = GetFileAttributesW(ip->executable); in _locate_pythons_for_key() 343 ip->executable, message); in _locate_pythons_for_key() [all …]
|
/external/python/cpython2/Lib/test/ |
D | test_subprocess.py | 87 rc = subprocess.call([sys.executable, "-c", 93 rc = subprocess.check_call([sys.executable, "-c", 100 subprocess.check_call([sys.executable, "-c", 107 [sys.executable, "-c", "print 'BDFL'"]) 114 [sys.executable, "-c", "import sys; sys.exit(5)"]) 120 [sys.executable, "-c", "import sys; sys.stderr.write('BDFL')"], 128 [sys.executable, "-c", "print 'will not be run'"], 137 rc = subprocess.call([sys.executable, "-c", 155 p = subprocess.Popen([sys.executable, "-c", 'print "banana"'], 177 p = subprocess.Popen([sys.executable, "-c", code], [all …]
|
/external/libkmsxx/utils/ |
D | meson.build | 5 executable('kmstest', 'kmstest.cpp', dependencies : [ common_deps ], install : true) 6 executable('kmsview', 'kmsview.cpp', dependencies : [ common_deps ], install : false) 7 executable('kmsprint', 'kmsprint.cpp', dependencies : [ common_deps ], install : true) 8 executable('fbtest', 'fbtest.cpp', dependencies : [ common_deps ], install : true) 9 executable('kmscapture', 'kmscapture.cpp', dependencies : [ common_deps ], install : false) 10 executable('kmsblank', 'kmsblank.cpp', dependencies : [ common_deps ], install : true) 13 …executable('kmstouch', 'kmstouch.cpp', dependencies : [ common_deps, libevdev_dep ], install : fal… 16 executable('omap-wbcap', 'omap-wbcap.cpp', dependencies : [ common_deps ], install : false) 17 executable('omap-wbm2m', 'omap-wbm2m.cpp', dependencies : [ common_deps ], install : false)
|
/external/python/cpython3/Lib/distutils/ |
D | spawn.py | 48 executable = find_executable(cmd[0]) 49 if executable is not None: 50 cmd[0] = executable 91 def find_executable(executable, path=None): argument 97 _, ext = os.path.splitext(executable) 99 executable = executable + '.exe' 101 if os.path.isfile(executable): 102 return executable 121 f = os.path.join(p, executable)
|
/external/llvm-project/lldb/source/Core/ |
D | DynamicLoader.cpp | 76 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local 78 if (executable) { in GetTargetExecutable() 79 if (FileSystem::Instance().Exists(executable->GetFileSpec())) { in GetTargetExecutable() 80 ModuleSpec module_spec(executable->GetFileSpec(), in GetTargetExecutable() 81 executable->GetArchitecture()); in GetTargetExecutable() 87 executable->GetUUID().IsValid()) { in GetTargetExecutable() 88 if (module_sp->GetUUID() != executable->GetUUID()) in GetTargetExecutable() 89 executable.reset(); in GetTargetExecutable() 90 } else if (executable->FileHasChanged()) { in GetTargetExecutable() 91 executable.reset(); in GetTargetExecutable() [all …]
|
/external/llvm-project/lldb/source/Plugins/DynamicLoader/Windows-DYLD/ |
D | DynamicLoaderWindowsDYLD.cpp | 101 lldb::addr_t DynamicLoaderWindowsDYLD::GetLoadAddress(ModuleSP executable) { in GetLoadAddress() argument 103 auto it = m_loaded_modules.find(executable); in GetLoadAddress() 111 FileSpec file_spec(executable->GetPlatformFileSpec()); in GetLoadAddress() 117 m_loaded_modules[executable] = load_addr; in GetLoadAddress() 128 ModuleSP executable = GetTargetExecutable(); in DidAttach() local 130 if (!executable.get()) in DidAttach() 135 lldb::addr_t load_addr = GetLoadAddress(executable); in DidAttach() 145 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_addr, false); in DidAttach() 148 module_list.Append(executable); in DidAttach() 158 ModuleSP executable = GetTargetExecutable(); in DidLaunch() local [all …]
|
/external/bazelbuild-rules_android/toolchains/android/ |
D | toolchain.bzl | 26 executable = True, 32 executable = True, 38 executable = True, 44 executable = True, 55 executable = True, 61 executable = True, 67 executable = True, 73 executable = True, 86 executable = True, 92 executable = True, [all …]
|
/external/selinux/sandbox/ |
D | test_sandbox.py | 30 p2 = Popen([sys.executable, 'sandbox', 'grep', 'root'], stdin=p1.stdout, stdout=PIPE) 38 p = Popen([sys.executable, 'sandbox', 'kill', '-HUP', str(pid)], stdout=PIPE, stderr=PIPE) 44 … p = Popen([sys.executable, 'sandbox', 'ping', '-c 1 ', '127.0.0.1'], stdout=PIPE, stderr=PIPE) 50 p = Popen([sys.executable, 'sandbox', 'mkdir', '~/test'], stdout=PIPE, stderr=PIPE) 56 p = Popen([sys.executable, 'sandbox', 'ls', '~'], stdout=PIPE, stderr=PIPE) 62 p = Popen([sys.executable, 'sandbox', 'mail'], stdout=PIPE, stderr=PIPE) 68 p = Popen([sys.executable, 'sandbox', 'sudo'], stdout=PIPE, stderr=PIPE) 74 p = Popen([sys.executable, 'sandbox', '-M', 'id'], stdout=PIPE, stderr=PIPE) 80 p = Popen([sys.executable, 'sandbox', '-l', 's0', 'id'], stdout=PIPE, stderr=PIPE) 87 p = Popen([sys.executable, 'sandbox', '-H', homedir, '-M', 'id'], stdout=PIPE, stderr=PIPE) [all …]
|
/external/lz4/contrib/meson/examples/ |
D | meson.build | 14 printVersion = executable('printVersion', 18 doubleBuffer = executable('doubleBuffer', 22 dictionaryRandomAccess = executable('dictionaryRandomAccess', 26 ringBuffer = executable('ringBuffer', 30 ringBufferHC = executable('ringBufferHC', 34 lineCompress = executable('lineCompress', 38 frameCompress = executable('frameCompress', 42 compressFunctions = executable('compressFunctions', 46 simpleBuffer = executable('simpleBuffer',
|
/external/tensorflow/tensorflow/lite/delegates/gpu/cl/ |
D | run_tests.sh | 84 executable=${target##*:} #finds last token after ':' 89 ADB shell chmod +x $OPENCL_DIR/$executable 90 ADB shell ./$OPENCL_DIR/$executable 91 ADB shell rm -f $OPENCL_DIR/$executable 95 executable=${target##*:} #finds last token after ':' 100 ADB shell chmod +x $OPENCL_DIR/$executable 101 …ADB shell ./$OPENCL_DIR/$executable --logtostderr 2> /dev/null | grep '\][[:space:]][a-zA-Z][a-zA-… 102 ADB shell rm -f $OPENCL_DIR/$executable
|
/external/llvm-project/lldb/source/Plugins/DynamicLoader/Hexagon-DYLD/ |
D | DynamicLoaderHexagonDYLD.cpp | 125 ModuleSP executable; in DidAttach() local 128 executable = GetTargetExecutable(); in DidAttach() 135 if (executable.get() == nullptr) in DidAttach() 146 module_list.Append(executable); in DidAttach() 150 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_offset, true); in DidAttach() 175 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local 178 if (!executable.get()) in GetTargetExecutable() 179 return executable; in GetTargetExecutable() 182 if (!FileSystem::Instance().Exists(executable->GetFileSpec())) in GetTargetExecutable() 183 return executable; in GetTargetExecutable() [all …]
|
/external/python/cpython3/Lib/test/ |
D | test_subprocess.py | 58 ZERO_RETURN_CMD = (sys.executable, '-c', 'pass') 134 rc = subprocess.call([sys.executable, "-c", 144 [sys.executable, "-c", "while True: pass"], 155 subprocess.check_call([sys.executable, "-c", 162 [sys.executable, "-c", "print('BDFL')"]) 169 [sys.executable, "-c", "import sys; sys.exit(5)"]) 175 [sys.executable, "-c", "import sys; sys.stderr.write('BDFL')"], 186 [sys.executable, "-c", 194 [sys.executable, "-c", 203 [sys.executable, "-c", "print('will not be run')"], [all …]
|
/external/angle/src/libANGLE/renderer/d3d/d3d11/ |
D | ShaderExecutable11.cpp | 21 d3d11::PixelShader &&executable) in ShaderExecutable11() argument 23 mPixelExecutable(std::move(executable)), in ShaderExecutable11() 32 d3d11::VertexShader &&executable, in ShaderExecutable11() argument 36 mVertexExecutable(std::move(executable)), in ShaderExecutable11() 44 d3d11::GeometryShader &&executable) in ShaderExecutable11() argument 48 mGeometryExecutable(std::move(executable)), in ShaderExecutable11() 55 d3d11::ComputeShader &&executable) in ShaderExecutable11() argument 61 mComputeExecutable(std::move(executable)) in ShaderExecutable11()
|
/external/tensorflow/tensorflow/compiler/jit/ |
D | get_compiler_ir.cc | 42 xla::LocalExecutable* executable = nullptr; in GetLocalExecutable() local 45 &compilation_result, &executable)); in GetLocalExecutable() 46 return executable; in GetLocalExecutable() 143 xla::StatusOr<xla::LocalExecutable*> executable = GetLocalExecutable( in GetCompilerIr() local 145 TF_RETURN_IF_ERROR(executable.status()); in GetCompilerIr() 146 xla::Executable* new_executable = (*executable)->executable(); in GetCompilerIr() 154 xla::StatusOr<xla::LocalExecutable*> executable = GetLocalExecutable( in GetCompilerIr() local 156 TF_RETURN_IF_ERROR(executable.status()); in GetCompilerIr() 158 *(*executable)->executable()->module().entry_computation(), in GetCompilerIr()
|
/external/rust/crates/grpcio-sys/grpc/bazel/ |
D | python_rules.bzl | 22 tools = [context.executable._protoc] 35 context.executable.plugin, 41 tools.append(context.executable.plugin) 49 executable = context.executable._protoc, 75 executable = True, 82 executable = True, 133 tools = [context.executable._protoc, context.executable._grpc_plugin] 136 context.executable._grpc_plugin, 143 context.executable.plugin, 149 tools.append(context.executable.plugin) [all …]
|
/external/tensorflow/tensorflow/compiler/xrt/kernels/ |
D | xrt_execute_op.cc | 89 xla::LocalExecutable* executable, XRTMemoryManager::WorkingSet* working_set, in GetInputTuples() argument 93 executable->executable()->module_config().entry_computation_layout(); in GetInputTuples() 298 xla::LocalExecutable* executable, in RunExecutable() argument 303 executable->executable()->module_config().entry_computation_layout(); in RunExecutable() 308 executable->executable()->module().input_output_alias_config(), in RunExecutable() 319 if (executable->executable() in RunExecutable() 323 &executable->executable()->module_config().static_device_assignment()); in RunExecutable() 349 executable->executable() in RunExecutable() 357 executable->Run(std::move(execution_inputs), run_options)); in RunExecutable() 369 executable->executable()->module().input_output_alias_config())); in RunExecutable() [all …]
|
/external/angle/src/libANGLE/ |
D | ProgramPipeline.cpp | 398 const ProgramExecutable &executable = shaderProgram->getExecutable(); in updateLinkedVaryings() local 400 executable.getLinkedOutputVaryings(shaderType); in updateLinkedVaryings() 402 executable.getLinkedInputVaryings(shaderType); in updateLinkedVaryings() 409 const ProgramExecutable &executable = computeProgram->getExecutable(); in updateLinkedVaryings() local 411 executable.getLinkedOutputVaryings(ShaderType::Compute); in updateLinkedVaryings() 413 executable.getLinkedInputVaryings(ShaderType::Compute); in updateLinkedVaryings() 425 const ProgramExecutable &executable = shaderProgram->getExecutable(); in updateHasBooleans() local 427 if (executable.hasUniformBuffers()) in updateHasBooleans() 431 if (executable.hasGraphicsStorageBuffers()) in updateHasBooleans() 435 if (executable.hasAtomicCounterBuffers()) in updateHasBooleans() [all …]
|
/external/angle/src/libANGLE/renderer/vulkan/ |
D | TransformFeedbackVk.cpp | 93 const gl::ProgramExecutable *executable = contextVk->getState().getProgramExecutable(); in begin() local 94 ASSERT(executable); in begin() 95 size_t xfbBufferCount = executable->getTransformFeedbackBufferCount(); in begin() 174 const gl::ProgramExecutable *executable = contextVk->getState().getProgramExecutable(); in pause() local 175 ASSERT(executable); in pause() 176 size_t xfbBufferCount = executable->getTransformFeedbackBufferCount(); in pause() 193 const gl::ProgramExecutable *executable = contextVk->getState().getProgramExecutable(); in resume() local 194 ASSERT(executable); in resume() 195 size_t xfbBufferCount = executable->getTransformFeedbackBufferCount(); in resume() 276 const gl::ProgramExecutable *executable = contextVk->getState().getProgramExecutable(); in updateDescriptorSet() local [all …]
|
/external/python/setuptools/setuptools/tests/ |
D | test_namespaces.py | 33 sys.executable, 43 sys.executable, 52 sys.executable, 69 sys.executable, 78 sys.executable, 95 sys.executable, 107 sys.executable,
|
/external/tensorflow/tensorflow/core/tpu/kernels/ |
D | tpu_compilation_cache_rpc_support.cc | 94 TpuExecutableSerializedProto executable; in SerializeCacheEntryToBufferSlices() local 95 auto cleanup_executable = xla::MakeCleanup([&executable]() { in SerializeCacheEntryToBufferSlices() 96 if (executable.size > 0) { in SerializeCacheEntryToBufferSlices() 97 stream_executor::tpu::SerializedProto_Free(executable); in SerializeCacheEntryToBufferSlices() 101 cache_entry.core_index(), &executable); in SerializeCacheEntryToBufferSlices() 108 if (!header.mutable_proto()->ParseFromArray(executable.bytes, in SerializeCacheEntryToBufferSlices() 109 executable.size)) { in SerializeCacheEntryToBufferSlices()
|
/external/llvm-project/lld/test/MachO/ |
D | load-commands.s | 4 # RUN: %lld -o %t/executable %t/test.o 5 # RUN: %lld -execute -o %t/explicit-executable %t/test.o 16 ## executable. Also check that it has the right filetype. 17 # RUN: llvm-objdump --macho --all-headers %t/executable | FileCheck %s --check-prefix=COMMON 18 # RUN: llvm-objdump --macho --all-headers %t/executable | FileCheck %s --check-prefix=EXEC 19 # RUN: llvm-objdump --macho --all-headers %t/explicit-executable | FileCheck %s --check-prefix=COMM… 20 # RUN: llvm-objdump --macho --all-headers %t/explicit-executable | FileCheck %s --check-prefix=EXEC 26 ## Check for the absence of load commands that should not be in an executable. 27 # RUN: llvm-objdump --macho --all-headers %t/executable | FileCheck %s --check-prefix=NEXEC
|