Home
last modified time | relevance | path

Searched full:executable (Results 1 – 25 of 4487) sorted by relevance

12345678910>>...180

/external/mesa3d/src/util/
D00-mesa-defaults.conf37 executable CDATA #IMPLIED
59 <application name="Unigine Sanctuary" executable="Sanctuary">
65 <application name="Unigine Tropics" executable="Tropics">
71 <application name="Unigine Heaven (32-bit)" executable="heaven_x86">
77 <application name="Unigine Heaven (64-bit)" executable="heaven_x64">
83 <application name="Unigine Valley (32-bit)" executable="valley_x86">
89 <application name="Unigine Valley (64-bit)" executable="valley_x64">
95 <application name="Unigine OilRush (32-bit)" executable="OilRush_x86">
100 <application name="Unigine OilRush (64-bit)" executable="OilRush_x64">
105 <application name="Savage 2" executable="savage2.bin">
[all …]
/external/python/cpython2/Lib/distutils/
Dspawn.py6 executable name.
24 executable.
26 If 'search_path' is true (the default), the system's executable
28 must be the exact path to the executable. If 'dry_run' is true,
64 executable = cmd[0]
68 executable = find_executable(executable) or executable
69 log.info(' '.join([executable] + cmd[1:]))
73 rc = os.spawnv(os.P_WAIT, executable, cmd)
77 cmd = executable
83 cmd = executable
[all …]
/external/autotest/client/site_tests/platform_Firewall/
Dplatform_Firewall.py32 def _iptables_rules(executable): argument
33 rule_output = utils.system_output("%s -S" % executable)
39 def _check(expected_rule, actual_rules, error_msg, executable, check): argument
42 raise error.TestFail(error_msg % executable)
46 def _check_included(expected_rule, actual_rules, error_msg, executable): argument
49 expected_rule, actual_rules, error_msg, executable,
54 def _check_not_included(expected_rule, actual_rules, error_msg, executable): argument
57 expected_rule, actual_rules, error_msg, executable,
97 for executable in ["iptables", "ip6tables"]:
98 actual_rules = self._iptables_rules(executable)
[all …]
/external/llvm-project/lldb/test/Shell/SymbolFile/NativePDB/
Dlocate-pdb.cpp4 // Test that lldb can find the PDB file that corresponds to the executable. The linker
5 // writes a path to the PDB in the executable. If the PDB is not there, lldb should
6 // check the directory that contains the executable. We'll generate the PDB file in
7 // a subdirectory and then move it into the directory with the executable. That will
8 // ensure the PDB path stored in the executable is wrong.
11 // RUN: mkdir -p %t/executable
12 // RUN: rm -f %t/executable/foo.exe %t/executable/bar.pdb
15 // RUN: %clang_cl --target=x86_64-windows-msvc -Od -Z7 -c /Fo%t/executable/foo.obj -- %s
16 // RUN: lld-link -debug:full -nodefaultlib -entry:main %t/executable/foo.obj \
17 // RUN: -out:%t/executable/foo.exe -pdb:%t/symbols/bar.pdb
[all …]
Dload-pdb.cpp6 // RUN: mkdir -p %t/executable
7 // RUN: rm -f %t/executable/foo.exe %t/executable/bar.pdb
8 // RUN: %clang_cl --target=x86_64-windows-msvc -Od -Z7 -c /Fo%t/executable/foo.obj -- %s
9 // RUN: lld-link -debug:full -nodefaultlib -entry:main %t/executable/foo.obj \
10 // RUN: -out:%t/executable/foo.exe -pdb:%t/executable/foo.pdb
11 // Rename the PDB file so that the name is different from the name inside the executable (foo.exe).
12 // RUN: mv %t/executable/foo.pdb %t/executable/bar.pdb
13 // RUN: env LLDB_USE_NATIVE_PDB_READER=1 %lldb %t/executable/foo.exe \
14 // RUN: -o "target symbols add %t/executable/bar.pdb" \
/external/bazelbuild-rules_android/toolchains/android/
Dtoolchain.bzl26 executable = True,
32 executable = True,
38 executable = True,
44 executable = True,
55 executable = True,
61 executable = True,
67 executable = True,
73 executable = True,
86 executable = True,
92 executable = True,
[all …]
/external/python/cpython3/Lib/distutils/
Dspawn.py6 executable name.
29 executable.
31 If 'search_path' is true (the default), the system's executable
33 must be the exact path to the executable. If 'dry_run' is true,
48 executable = find_executable(cmd[0])
49 if executable is not None:
50 cmd[0] = executable
91 def find_executable(executable, path=None): argument
92 """Tries to find 'executable' in the directories listed in 'path'.
97 _, ext = os.path.splitext(executable)
[all …]
/external/python/cpython3/PC/
Dpython_uwp.cpp89 std::wstring executable; in set_process_name() local
98 executable = std::wstring(localAppData) in set_process_name()
109 if (home.empty() && executable.empty()) { in set_process_name()
110 executable.resize(MAX_PATH); in set_process_name()
113 NULL, executable.data(), (DWORD)executable.size()); in set_process_name()
115 executable.clear(); in set_process_name()
117 } else if (len == executable.size() && in set_process_name()
119 executable.resize(len * 2); in set_process_name()
121 executable.resize(len); in set_process_name()
125 size_t i = executable.find_last_of(L"/\\"); in set_process_name()
[all …]
/external/python/cpython2/Lib/test/
Dtest_subprocess.py87 rc = subprocess.call([sys.executable, "-c",
93 rc = subprocess.check_call([sys.executable, "-c",
100 subprocess.check_call([sys.executable, "-c",
107 [sys.executable, "-c", "print 'BDFL'"])
114 [sys.executable, "-c", "import sys; sys.exit(5)"])
120 [sys.executable, "-c", "import sys; sys.stderr.write('BDFL')"],
128 [sys.executable, "-c", "print 'will not be run'"],
137 rc = subprocess.call([sys.executable, "-c",
155 p = subprocess.Popen([sys.executable, "-c", 'print "banana"'],
174 'p = Popen([sys.executable, "-c", "print \'test_stdout_none\'"],'
[all …]
/external/autotest/client/common_lib/
Dmagic.py163 [0, 'short', '=', 420, 'application/x-executable-file'],
164 [0, 'short', '=', 421, 'application/x-executable-file'],
165 [0, 'leshort', '=', 603, 'application/x-executable-file'],
166 [0, 'string', '=', 'Core\001', 'application/x-executable-file'],
168 [0, 'belong', '=', 1011, 'application/x-executable-file'],
244 [0, 'beshort', '=', 560, 'application/x-executable-file'],
245 [0, 'beshort', '=', 561, 'application/x-executable-file'],
279 [0, 'short', '=', 3401, 'application/x-executable-file'],
280 [0, 'long', '=', 406, 'application/x-executable-file'],
281 [0, 'short', '=', 406, 'application/x-executable-file'],
[all …]
/external/llvm-project/lldb/source/Plugins/DynamicLoader/Hexagon-DYLD/
DDynamicLoaderHexagonDYLD.cpp125 ModuleSP executable; in DidAttach() local
128 executable = GetTargetExecutable(); in DidAttach()
134 // Check that there is a valid executable in DidAttach()
135 if (executable.get() == nullptr) in DidAttach()
144 // Add the current executable to the module list in DidAttach()
146 module_list.Append(executable); in DidAttach()
148 // Map the loaded sections of this executable in DidAttach()
150 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_offset, true); in DidAttach()
172 /// accordingly and returns the target executable module.
175 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local
[all …]
/external/libkmsxx/utils/
Dmeson.build5 executable('kmstest', 'kmstest.cpp', dependencies : [ common_deps ], install : true)
6 executable('kmsview', 'kmsview.cpp', dependencies : [ common_deps ], install : false)
7 executable('kmsprint', 'kmsprint.cpp', dependencies : [ common_deps ], install : true)
8 executable('fbtest', 'fbtest.cpp', dependencies : [ common_deps ], install : true)
9 executable('kmscapture', 'kmscapture.cpp', dependencies : [ common_deps ], install : false)
10 executable('kmsblank', 'kmsblank.cpp', dependencies : [ common_deps ], install : true)
13executable('kmstouch', 'kmstouch.cpp', dependencies : [ common_deps, libevdev_dep ], install : fal…
16 executable('omap-wbcap', 'omap-wbcap.cpp', dependencies : [ common_deps ], install : false)
17 executable('omap-wbm2m', 'omap-wbm2m.cpp', dependencies : [ common_deps ], install : false)
/external/tensorflow/tensorflow/compiler/xla/service/
Dexecutable.cc16 #include "tensorflow/compiler/xla/service/executable.h"
81 StatusOr<ScopedShapedBuffer> Executable::ExecuteOnStream( in ExecuteOnStream()
103 StatusOr<ScopedShapedBuffer> Executable::ExecuteAsyncOnStream( in ExecuteAsyncOnStream()
118 StatusOr<ExecutionOutput> Executable::ExecuteOnStream( in ExecuteOnStream()
130 StatusOr<std::vector<ScopedShapedBuffer>> Executable::ExecuteOnStreams( in ExecuteOnStreams()
162 StatusOr<ScopedShapedBuffer> Executable::ExecuteOnStreamWrapper( in ExecuteOnStreamWrapper()
173 StatusOr<ExecutionOutput> Executable::ExecuteOnStreamWrapper( in ExecuteOnStreamWrapper()
191 const Executable& executable, in ExecuteWrapperBeforeExecution() argument
201 VLOG(1) << "enqueueing executable on stream..."; in ExecuteWrapperBeforeExecution()
205 executable.module_config().debug_options().xla_hlo_profile() && in ExecuteWrapperBeforeExecution()
[all …]
Dhlo_runner.h29 #include "tensorflow/compiler/xla/service/executable.h"
82 std::unique_ptr<Executable> executable,
94 Executable* executable, absl::Span<ScopedShapedBuffer const> arguments,
97 // Creates an executable object given an HLO module. If run_hlo_passes is
99 StatusOr<std::unique_ptr<Executable>> CreateExecutable(
115 // Same as above, but with a reusable Executable. This may update the profile
116 // information in *executable.
119 // since we've already compiled the Executable.
121 Executable* executable, const ReplicatedExecuteOptions& options,
128 // since we've already compiled the Executable.
[all …]
/external/rust/crates/grpcio-sys/grpc/bazel/
Dpython_rules.bzl22 tools = [context.executable._protoc]
35 context.executable.plugin,
41 tools.append(context.executable.plugin)
49 executable = context.executable._protoc,
75 executable = True,
82 executable = True,
133 tools = [context.executable._protoc, context.executable._grpc_plugin]
136 context.executable._grpc_plugin,
143 context.executable.plugin,
149 tools.append(context.executable.plugin)
[all …]
/external/python/cpython3/Lib/test/
Dtest_subprocess.py58 ZERO_RETURN_CMD = (sys.executable, '-c', 'pass')
134 rc = subprocess.call([sys.executable, "-c",
144 [sys.executable, "-c", "while True: pass"],
155 subprocess.check_call([sys.executable, "-c",
162 [sys.executable, "-c", "print('BDFL')"])
169 [sys.executable, "-c", "import sys; sys.exit(5)"])
175 [sys.executable, "-c", "import sys; sys.stderr.write('BDFL')"],
186 [sys.executable, "-c",
194 [sys.executable, "-c",
203 [sys.executable, "-c", "print('will not be run')"],
[all …]
/external/webrtc/tools_webrtc/
Dexecutable_host_build.py11 This script builds a GN executable targeting the host machine.
16 executable to analyze a video downloaded from a device).
19 the output name of the GN executable. For example, if you have the
20 following executable in your out folder:
24 You will be able to compile the same executable targeting your host machine
29 The generated executable will have the same name as the input executable with
45 The executable for the host machine will be generated in the GN out directory
66 desc = 'Generates a GN executable targeting the host machine.'
70 help='Name of the executable to build')
98 _RunCommand([sys.executable, DepotToolPath('gn.py'), 'gen', build_dir])
/external/llvm-project/lldb/source/Core/
DDynamicLoader.cpp76 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local
78 if (executable) { in GetTargetExecutable()
79 if (FileSystem::Instance().Exists(executable->GetFileSpec())) { in GetTargetExecutable()
80 ModuleSpec module_spec(executable->GetFileSpec(), in GetTargetExecutable()
81 executable->GetArchitecture()); in GetTargetExecutable()
84 // Check if the executable has changed and set it to the target in GetTargetExecutable()
85 // executable if they differ. in GetTargetExecutable()
87 executable->GetUUID().IsValid()) { in GetTargetExecutable()
88 if (module_sp->GetUUID() != executable->GetUUID()) in GetTargetExecutable()
89 executable.reset(); in GetTargetExecutable()
[all …]
/external/libxkbcommon/
Dmeson.build388 executable('xkbcli', 'tools/xkbcli.c',
392 executable('xkbcli-compile-keymap',
399 executable('compile-keymap',
407 executable('xkbcli-how-to-type',
415 executable('xkbcli-interactive-evdev',
432 executable('xkbcli-interactive-x11',
466 executable('xkbcli-interactive-wayland',
478 executable('xkbcli-list',
549 executable('test-keysym', 'test/keysym.c', dependencies: test_dep),
554 executable('test-keymap', 'test/keymap.c', dependencies: test_dep),
[all …]
/external/selinux/sandbox/
Dtest_sandbox.py30 p2 = Popen([sys.executable, 'sandbox', 'grep', 'root'], stdin=p1.stdout, stdout=PIPE)
38 p = Popen([sys.executable, 'sandbox', 'kill', '-HUP', str(pid)], stdout=PIPE, stderr=PIPE)
44 … p = Popen([sys.executable, 'sandbox', 'ping', '-c 1 ', '127.0.0.1'], stdout=PIPE, stderr=PIPE)
50 p = Popen([sys.executable, 'sandbox', 'mkdir', '~/test'], stdout=PIPE, stderr=PIPE)
56 p = Popen([sys.executable, 'sandbox', 'ls', '~'], stdout=PIPE, stderr=PIPE)
62 p = Popen([sys.executable, 'sandbox', 'mail'], stdout=PIPE, stderr=PIPE)
68 p = Popen([sys.executable, 'sandbox', 'sudo'], stdout=PIPE, stderr=PIPE)
74 p = Popen([sys.executable, 'sandbox', '-M', 'id'], stdout=PIPE, stderr=PIPE)
80 p = Popen([sys.executable, 'sandbox', '-l', 's0', 'id'], stdout=PIPE, stderr=PIPE)
87 p = Popen([sys.executable, 'sandbox', '-H', homedir, '-M', 'id'], stdout=PIPE, stderr=PIPE)
[all …]
/external/python/setuptools/setuptools/tests/
Dtest_install_scripts.py24 def _run_install_scripts(self, install_dir, executable=None): argument
29 if executable is not None:
31 bs.executable = executable
40 from sys.executable.
43 monkeypatch.setattr('sys.executable', self.unix_exe)
54 from sys.executable and it contains a space.
57 monkeypatch.setattr('sys.executable', self.win32_exe)
68 is specified using --executable.
81 from --executable, that is itself properly quoted.
/external/bazelbuild-rules_android/rules/
Dutils.bzl284 executable = attr[DefaultInfo].files_to_run.executable
285 if executable:
286 runfiles = runfiles.merge(ctx.runfiles([executable]))
347 executable,
351 """Creates an action that runs an executable as a validation.
353 Note: When the validation executable fails, it should return a non-zero
358 validation_out: A File. The output of the executable is piped to the
361 executable: See ctx.actions.run#executable.
367 exec_type = type(executable)
371 exec_bin = executable.executable
[all …]
/external/lz4/contrib/meson/examples/
Dmeson.build14 printVersion = executable('printVersion',
18 doubleBuffer = executable('doubleBuffer',
22 dictionaryRandomAccess = executable('dictionaryRandomAccess',
26 ringBuffer = executable('ringBuffer',
30 ringBufferHC = executable('ringBufferHC',
34 lineCompress = executable('lineCompress',
38 frameCompress = executable('frameCompress',
42 compressFunctions = executable('compressFunctions',
46 simpleBuffer = executable('simpleBuffer',
/external/igt-gpu-tools/tests/
Dmeson.build262 test_executables += executable(prog, prog + '.c',
271 test_executables += executable(prog,
280 test_executables += executable('gem_create',
288 test_executables += executable('gem_ctx_sseu',
296 test_executables += executable('gem_eio',
304 test_executables += executable('gem_exec_balancer', 'i915/gem_exec_balancer.c',
311 test_executables += executable('gem_mocs_settings',
319 test_executables += executable('perf_pmu', 'perf_pmu.c',
326 executable('testdisplay', ['testdisplay.c', 'testdisplay_hotplug.c'],
333 test_executables += executable('sw_sync', 'sw_sync.c',
[all …]
/external/python/cpython2/Lib/plat-mac/
Dbundlebuilder.py288 # start a real new process. Also, the executable name must match
290 # deliberately with argv[0]. The actual Python executable is
292 # sys.executable later.
299 executable = os.path.join(execdir, "%(executable)s")
318 os.environ["PYTHONEXECUTABLE"] = executable
321 os.execve(executable, sys.argv, os.environ)
361 # platform, name of the subfolder of Contents that contains the executable.
365 # executable in the bundle will be a small wrapper that invokes
369 # The main executable. If a Python main program is specified
370 # the executable will be copied to Resources and be invoked
[all …]

12345678910>>...180