/external/libmojo/base/files/ |
H A D | file_util_android.cc | 12 bool GetShmemTempDir(bool executable, base::FilePath* path) { argument
|
/external/autotest/client/site_tests/security_SMMLocked/ |
H A D | security_SMMLocked.py | 16 executable = 'smm' variable in class:security_SMMLocked 20 utils.make(self.executable) 28 r = utils.run("%s/%s" % (self.srcdir, self.executable),
|
/external/autotest/client/site_tests/security_SeccompSyscallFilters/ |
H A D | security_SeccompSyscallFilters.py | 18 executable = 'seccomp_bpf_tests' variable in class:security_SeccompSyscallFilters 36 binpath = os.path.join(self.srcdir, self.executable)
|
/external/autotest/client/site_tests/kernel_PerfEventRename/ |
H A D | kernel_PerfEventRename.py | 28 executable = 'perf-rename-test' variable in class:kernel_PerfEventRename 33 utils.make(self.executable) 45 self.executable),
|
/external/autotest/client/site_tests/platform_TraceClockMonotonic/ |
H A D | platform_TraceClockMonotonic.py | 21 executable = 'ftrace-clock-monotonic' variable in class:platform_TraceClockMonotonic 93 binpath = os.path.join(self.srcdir, self.executable)
|
/external/autotest/client/site_tests/security_mprotect/ |
H A D | security_mprotect.py | 16 executable = 'prot_exec' variable in class:security_mprotect 21 utils.make(self.executable) 25 with tempfile.NamedTemporaryFile(prefix='%s-' % (self.executable), 29 r = utils.run("%s/%s %s" % (self.srcdir, self.executable,
|
/external/autotest/client/site_tests/platform_CompressedSwap/ |
H A D | platform_CompressedSwap.py | 18 executable = 'hog' variable in class:platform_CompressedSwap 25 utils.make(self.executable) 92 cmd = [ self.srcdir + '/' + self.executable, '50' ]
|
/external/clang/tools/clang-format/ |
H A D | clang-format.el | 38 (defcustom clang-format-executable 39 (or (executable-find "clang-format") 41 "Location of the clang-format executable. 43 A string containing the name or the full path of the executable." 125 (point-min) (point-max) clang-format-executable
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.build.tools/src_rss/org/eclipse/releng/util/rss/ |
H A D | RSSFeedUtil.java | 46 public ExecTask runExecTask(String executable, String commandline, String dir) argument 53 exec.setExecutable(executable); 56 Project project = new Project(); project.setName(executable); 72 System.out.println(Messages.getString("RSSFeedPublisherTask.Execute") + SP + executable + (commandline==null?"":SP + commandline)); //$NON-NLS-1$ //$NON-NLS-2$
|
/external/elfutils/libdwfl/ |
H A D | dwfl_build_id_find_elf.c | 147 /* When dwfl_core_file_report was called with a non-NULL executable file 149 recorded executable file when MOD was identified as main executable 150 (which then triggers opening and reporting of the executable). */ 151 const char *executable = mod->dwfl->user_core->executable_for_core; local 152 int fd = open (executable, O_RDONLY); 155 *file_name = strdup (executable);
|
H A D | core-file.c | 445 dwfl_core_file_report (Dwfl *dwfl, Elf *elf, const char *executable) argument 456 if (executable == NULL) 473 dwfl->user_core->executable_for_core = strdup (executable);
|
/external/mdnsresponder/mDNSWindows/SystemService/ |
H A D | Firewall.cpp | 229 // Set the executable file name 385 LPWSTR executable, 413 err = mDNSFirewallAddApp( fwProfile, executable, name ); 383 mDNSAddToFirewall( LPWSTR executable, LPWSTR name ) argument
|
/external/v8/tools/ |
H A D | run-valgrind.py | 32 # Uses valgrind from third_party/valgrind. Assumes the executable is passed 56 print 'Please provide an executable to analyze.' 59 executable = path.join(V8_ROOT, sys.argv[1]) variable 60 if not path.exists(executable): 61 print 'Cannot find the file specified: %s' % executable 65 command = VALGRIND_ARGUMENTS + [executable] + sys.argv[2:]
|
/external/autotest/client/site_tests/platform_CompressedSwapPerf/ |
H A D | platform_CompressedSwapPerf.py | 107 executable = 'hog' variable in class:platform_CompressedSwapPerf 126 utils.make(self.executable) 292 cmd = [ os.path.join(self.srcdir, self.executable) ]
|
/external/libchrome/base/memory/ |
H A D | shared_memory.h | 57 // If true, mappings might need to be made executable later. 58 bool executable; member in struct:base::SharedMemoryCreateOptions
|
/external/protobuf/conformance/ |
H A D | conformance_test_runner.cc | 88 ForkPipeRunner(const std::string &executable) argument 89 : child_pid_(-1), executable_(executable) {} 186 scoped_array<char> executable(new char[executable_.size() + 1]); 187 memcpy(executable.get(), executable_.c_str(), executable_.size()); 188 executable[executable_.size()] = '\0'; 190 char *const argv[] = {executable.get(), NULL}; 191 CHECK_SYSCALL(execv(executable.get(), argv)); // Never returns.
|
/external/v8/src/base/platform/ |
H A D | platform-freebsd.cc | 61 bool executable) { 63 int prot = PROT_READ | PROT_WRITE | (executable ? PROT_EXEC : 0); 106 // Ignore mappings that are not executable. 59 Allocate(const size_t requested, size_t* allocated, bool executable) argument
|
H A D | platform-aix.cc | 67 void* OS::Allocate(const size_t requested, size_t* allocated, bool executable) { argument 69 int prot = PROT_READ | PROT_WRITE | (executable ? PROT_EXEC : 0); 111 // Ignore mappings that are not executable.
|
/external/v8/src/heap/ |
H A D | spaces-inl.h | 103 Executability executable) { 104 base::OS::Unprotect(start, size, executable); 117 chunks_[id].owner()->executable() == EXECUTABLE); 168 Page* Page::Initialize(Heap* heap, MemoryChunk* chunk, Executability executable, argument 170 DCHECK_EQ(executable, Executability::NOT_EXECUTABLE); 186 Page* Page::Initialize(Heap* heap, MemoryChunk* chunk, Executability executable, argument 593 Executability executable, Space* owner) { 594 if (executable && chunk->size() > LargePage::kMaxCodePageSize) { 102 Unprotect(Address start, size_t size, Executability executable) argument 592 Initialize(Heap* heap, MemoryChunk* chunk, Executability executable, Space* owner) argument
|
H A D | spaces.cc | 131 // the beginning of an executable space. 408 Executability executable) { 410 executable == EXECUTABLE)) { 419 Executability executable) { 424 DCHECK(executable == NOT_EXECUTABLE || !code_range()->valid() || 432 Executability executable) { 436 DCHECK(executable == EXECUTABLE); 439 DCHECK(executable == NOT_EXECUTABLE || !code_range()->valid()); 460 Executability executable, base::VirtualMemory* controller) { 466 if (executable 407 CommitMemory(Address base, size_t size, Executability executable) argument 418 FreeMemory(base::VirtualMemory* reservation, Executability executable) argument 431 FreeMemory(Address base, size_t size, Executability executable) argument 458 AllocateAlignedMemory( size_t reserve_size, size_t commit_size, size_t alignment, Executability executable, base::VirtualMemory* controller) argument 499 Initialize(Heap* heap, Address base, size_t size, Address area_start, Address area_end, Executability executable, Space* owner, base::VirtualMemory* reservation) argument 562 Executability executable = local 636 AllocateChunk(size_t reserve_area_size, size_t commit_area_size, Executability executable, Space* owner) argument 926 AllocatePage(size_t size, SpaceType* owner, Executability executable) argument 951 AllocateLargePage(size_t size, LargeObjectSpace* owner, Executability executable) argument 977 CommitBlock(Address start, size_t size, Executability executable) argument 1181 PagedSpace(Heap* heap, AllocationSpace space, Executability executable) argument 2973 AllocateRaw(int object_size, Executability executable) argument [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_common.cc | 267 void LoadedModule::addAddressRange(uptr beg, uptr end, bool executable) { argument 269 AddressRange *r = new(mem) AddressRange(beg, end, executable);
|
H A D | sanitizer_linux_libcdep.cc | 446 bool executable = phdr->p_flags & PF_X; local 447 cur_module.addAddressRange(cur_beg, cur_end, executable);
|
/external/libcups/cups/ |
H A D | file.c | 485 int executable, /* I - 1 = executable files, 0 = any file/dir */ 497 DEBUG_printf(("cupsFileFind(filename=\"%s\", path=\"%s\", executable=%d, buffer=%p, bufsize=%d)", filename, path, executable, (void *)buffer, bufsize)); 540 if (!access(buffer, executable ? X_OK : 0)) 483 cupsFileFind(const char *filename, const char *path, int executable, char *buffer, int bufsize) argument
|
/external/libchrome/base/files/ |
H A D | file_util_posix.cc | 461 const FilePath::StringType& executable) { 464 LOG(ERROR) << "No $PATH variable. Assuming no " << executable << "."; 472 if (GetPosixFilePermissions(file.Append(executable), &permissions) && 860 bool GetShmemTempDir(bool executable, FilePath* path) { argument 863 if (executable) { 872 (void)executable; // Avoid unused warning when !defined(OS_LINUX). 460 ExecutableExistsInPath(Environment* env, const FilePath::StringType& executable) argument
|
/external/selinux/python/sepolicy/sepolicy/ |
H A D | generate.py | 34 from .templates import executable namespace 523 return re.sub("TEMPLATETYPE", self.name, executable.te_uid_rules) 529 return re.sub("TEMPLATETYPE", self.name, executable.te_syslog_rules) 535 return re.sub("TEMPLATETYPE", self.name, executable.te_resolve_rules) 541 return re.sub("TEMPLATETYPE", self.name, executable.te_kerberos_rules) 547 return re.sub("TEMPLATETYPE", self.name, executable.te_manage_krb5_rcache_rules) 554 newte = re.sub("TEMPLATETYPE", self.name, executable.te_pam_rules) 560 newte = re.sub("TEMPLATETYPE", self.name, executable.te_audit_rules) 566 newte = re.sub("TEMPLATETYPE", self.name, executable.te_etc_rules) 572 newte = re.sub("TEMPLATETYPE", self.name, executable [all...] |