Searched defs:executable (Results 1 - 25 of 53) sorted by relevance

123

/external/libmojo/base/files/
H A Dfile_util_android.cc12 bool GetShmemTempDir(bool executable, base::FilePath* path) { argument
/external/autotest/client/site_tests/security_SMMLocked/
H A Dsecurity_SMMLocked.py16 executable = 'smm' variable in class:security_SMMLocked
20 utils.make(self.executable)
28 r = utils.run("%s/%s" % (self.srcdir, self.executable),
/external/autotest/client/site_tests/security_SeccompSyscallFilters/
H A Dsecurity_SeccompSyscallFilters.py18 executable = 'seccomp_bpf_tests' variable in class:security_SeccompSyscallFilters
36 binpath = os.path.join(self.srcdir, self.executable)
/external/autotest/client/site_tests/kernel_PerfEventRename/
H A Dkernel_PerfEventRename.py28 executable = 'perf-rename-test' variable in class:kernel_PerfEventRename
33 utils.make(self.executable)
45 self.executable),
/external/autotest/client/site_tests/platform_TraceClockMonotonic/
H A Dplatform_TraceClockMonotonic.py21 executable = 'ftrace-clock-monotonic' variable in class:platform_TraceClockMonotonic
93 binpath = os.path.join(self.srcdir, self.executable)
/external/autotest/client/site_tests/security_mprotect/
H A Dsecurity_mprotect.py16 executable = 'prot_exec' variable in class:security_mprotect
21 utils.make(self.executable)
25 with tempfile.NamedTemporaryFile(prefix='%s-' % (self.executable),
29 r = utils.run("%s/%s %s" % (self.srcdir, self.executable,
/external/autotest/client/site_tests/platform_CompressedSwap/
H A Dplatform_CompressedSwap.py18 executable = 'hog' variable in class:platform_CompressedSwap
25 utils.make(self.executable)
92 cmd = [ self.srcdir + '/' + self.executable, '50' ]
/external/clang/tools/clang-format/
H A Dclang-format.el38 (defcustom clang-format-executable
39 (or (executable-find "clang-format")
41 "Location of the clang-format executable.
43 A string containing the name or the full path of the executable."
125 (point-min) (point-max) clang-format-executable
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.build.tools/src_rss/org/eclipse/releng/util/rss/
H A DRSSFeedUtil.java46 public ExecTask runExecTask(String executable, String commandline, String dir) argument
53 exec.setExecutable(executable);
56 Project project = new Project(); project.setName(executable);
72 System.out.println(Messages.getString("RSSFeedPublisherTask.Execute") + SP + executable + (commandline==null?"":SP + commandline)); //$NON-NLS-1$ //$NON-NLS-2$
/external/elfutils/libdwfl/
H A Ddwfl_build_id_find_elf.c147 /* When dwfl_core_file_report was called with a non-NULL executable file
149 recorded executable file when MOD was identified as main executable
150 (which then triggers opening and reporting of the executable). */
151 const char *executable = mod->dwfl->user_core->executable_for_core; local
152 int fd = open (executable, O_RDONLY);
155 *file_name = strdup (executable);
H A Dcore-file.c445 dwfl_core_file_report (Dwfl *dwfl, Elf *elf, const char *executable) argument
456 if (executable == NULL)
473 dwfl->user_core->executable_for_core = strdup (executable);
/external/mdnsresponder/mDNSWindows/SystemService/
H A DFirewall.cpp229 // Set the executable file name
385 LPWSTR executable,
413 err = mDNSFirewallAddApp( fwProfile, executable, name );
383 mDNSAddToFirewall( LPWSTR executable, LPWSTR name ) argument
/external/v8/tools/
H A Drun-valgrind.py32 # Uses valgrind from third_party/valgrind. Assumes the executable is passed
56 print 'Please provide an executable to analyze.'
59 executable = path.join(V8_ROOT, sys.argv[1]) variable
60 if not path.exists(executable):
61 print 'Cannot find the file specified: %s' % executable
65 command = VALGRIND_ARGUMENTS + [executable] + sys.argv[2:]
/external/autotest/client/site_tests/platform_CompressedSwapPerf/
H A Dplatform_CompressedSwapPerf.py107 executable = 'hog' variable in class:platform_CompressedSwapPerf
126 utils.make(self.executable)
292 cmd = [ os.path.join(self.srcdir, self.executable) ]
/external/libchrome/base/memory/
H A Dshared_memory.h57 // If true, mappings might need to be made executable later.
58 bool executable; member in struct:base::SharedMemoryCreateOptions
/external/protobuf/conformance/
H A Dconformance_test_runner.cc88 ForkPipeRunner(const std::string &executable) argument
89 : child_pid_(-1), executable_(executable) {}
186 scoped_array<char> executable(new char[executable_.size() + 1]);
187 memcpy(executable.get(), executable_.c_str(), executable_.size());
188 executable[executable_.size()] = '\0';
190 char *const argv[] = {executable.get(), NULL};
191 CHECK_SYSCALL(execv(executable.get(), argv)); // Never returns.
/external/v8/src/base/platform/
H A Dplatform-freebsd.cc61 bool executable) {
63 int prot = PROT_READ | PROT_WRITE | (executable ? PROT_EXEC : 0);
106 // Ignore mappings that are not executable.
59 Allocate(const size_t requested, size_t* allocated, bool executable) argument
H A Dplatform-aix.cc67 void* OS::Allocate(const size_t requested, size_t* allocated, bool executable) { argument
69 int prot = PROT_READ | PROT_WRITE | (executable ? PROT_EXEC : 0);
111 // Ignore mappings that are not executable.
/external/v8/src/heap/
H A Dspaces-inl.h103 Executability executable) {
104 base::OS::Unprotect(start, size, executable);
117 chunks_[id].owner()->executable() == EXECUTABLE);
168 Page* Page::Initialize(Heap* heap, MemoryChunk* chunk, Executability executable, argument
170 DCHECK_EQ(executable, Executability::NOT_EXECUTABLE);
186 Page* Page::Initialize(Heap* heap, MemoryChunk* chunk, Executability executable, argument
593 Executability executable, Space* owner) {
594 if (executable && chunk->size() > LargePage::kMaxCodePageSize) {
102 Unprotect(Address start, size_t size, Executability executable) argument
592 Initialize(Heap* heap, MemoryChunk* chunk, Executability executable, Space* owner) argument
H A Dspaces.cc131 // the beginning of an executable space.
408 Executability executable) {
410 executable == EXECUTABLE)) {
419 Executability executable) {
424 DCHECK(executable == NOT_EXECUTABLE || !code_range()->valid() ||
432 Executability executable) {
436 DCHECK(executable == EXECUTABLE);
439 DCHECK(executable == NOT_EXECUTABLE || !code_range()->valid());
460 Executability executable, base::VirtualMemory* controller) {
466 if (executable
407 CommitMemory(Address base, size_t size, Executability executable) argument
418 FreeMemory(base::VirtualMemory* reservation, Executability executable) argument
431 FreeMemory(Address base, size_t size, Executability executable) argument
458 AllocateAlignedMemory( size_t reserve_size, size_t commit_size, size_t alignment, Executability executable, base::VirtualMemory* controller) argument
499 Initialize(Heap* heap, Address base, size_t size, Address area_start, Address area_end, Executability executable, Space* owner, base::VirtualMemory* reservation) argument
562 Executability executable = local
636 AllocateChunk(size_t reserve_area_size, size_t commit_area_size, Executability executable, Space* owner) argument
926 AllocatePage(size_t size, SpaceType* owner, Executability executable) argument
951 AllocateLargePage(size_t size, LargeObjectSpace* owner, Executability executable) argument
977 CommitBlock(Address start, size_t size, Executability executable) argument
1181 PagedSpace(Heap* heap, AllocationSpace space, Executability executable) argument
2973 AllocateRaw(int object_size, Executability executable) argument
[all...]
/external/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_common.cc267 void LoadedModule::addAddressRange(uptr beg, uptr end, bool executable) { argument
269 AddressRange *r = new(mem) AddressRange(beg, end, executable);
H A Dsanitizer_linux_libcdep.cc446 bool executable = phdr->p_flags & PF_X; local
447 cur_module.addAddressRange(cur_beg, cur_end, executable);
/external/libcups/cups/
H A Dfile.c485 int executable, /* I - 1 = executable files, 0 = any file/dir */
497 DEBUG_printf(("cupsFileFind(filename=\"%s\", path=\"%s\", executable=%d, buffer=%p, bufsize=%d)", filename, path, executable, (void *)buffer, bufsize));
540 if (!access(buffer, executable ? X_OK : 0))
483 cupsFileFind(const char *filename, const char *path, int executable, char *buffer, int bufsize) argument
/external/libchrome/base/files/
H A Dfile_util_posix.cc461 const FilePath::StringType& executable) {
464 LOG(ERROR) << "No $PATH variable. Assuming no " << executable << ".";
472 if (GetPosixFilePermissions(file.Append(executable), &permissions) &&
860 bool GetShmemTempDir(bool executable, FilePath* path) { argument
863 if (executable) {
872 (void)executable; // Avoid unused warning when !defined(OS_LINUX).
460 ExecutableExistsInPath(Environment* env, const FilePath::StringType& executable) argument
/external/selinux/python/sepolicy/sepolicy/
H A Dgenerate.py34 from .templates import executable namespace
523 return re.sub("TEMPLATETYPE", self.name, executable.te_uid_rules)
529 return re.sub("TEMPLATETYPE", self.name, executable.te_syslog_rules)
535 return re.sub("TEMPLATETYPE", self.name, executable.te_resolve_rules)
541 return re.sub("TEMPLATETYPE", self.name, executable.te_kerberos_rules)
547 return re.sub("TEMPLATETYPE", self.name, executable.te_manage_krb5_rcache_rules)
554 newte = re.sub("TEMPLATETYPE", self.name, executable.te_pam_rules)
560 newte = re.sub("TEMPLATETYPE", self.name, executable.te_audit_rules)
566 newte = re.sub("TEMPLATETYPE", self.name, executable.te_etc_rules)
572 newte = re.sub("TEMPLATETYPE", self.name, executable
[all...]

Completed in 645 milliseconds

123