/external/mesa3d/src/util/ |
D | 00-mesa-defaults.conf | 37 executable CDATA #IMPLIED 59 <application name="Unigine Sanctuary" executable="Sanctuary"> 65 <application name="Unigine Tropics" executable="Tropics"> 71 <application name="Unigine Heaven (32-bit)" executable="heaven_x86"> 77 <application name="Unigine Heaven (64-bit)" executable="heaven_x64"> 83 <application name="Unigine Valley (32-bit)" executable="valley_x86"> 89 <application name="Unigine Valley (64-bit)" executable="valley_x64"> 95 <application name="Unigine OilRush (32-bit)" executable="OilRush_x86"> 100 <application name="Unigine OilRush (64-bit)" executable="OilRush_x64"> 105 <application name="Savage 2" executable="savage2.bin"> [all …]
|
/external/python/cpython2/Lib/distutils/ |
D | spawn.py | 6 executable name. 24 executable. 26 If 'search_path' is true (the default), the system's executable 28 must be the exact path to the executable. If 'dry_run' is true, 64 executable = cmd[0] 68 executable = find_executable(executable) or executable 69 log.info(' '.join([executable] + cmd[1:])) 73 rc = os.spawnv(os.P_WAIT, executable, cmd) 77 cmd = executable 83 cmd = executable [all …]
|
/external/autotest/client/site_tests/platform_Firewall/ |
D | platform_Firewall.py | 32 def _iptables_rules(executable): argument 33 rule_output = utils.system_output("%s -S" % executable) 39 def _check(expected_rule, actual_rules, error_msg, executable, check): argument 42 raise error.TestFail(error_msg % executable) 46 def _check_included(expected_rule, actual_rules, error_msg, executable): argument 49 expected_rule, actual_rules, error_msg, executable, 54 def _check_not_included(expected_rule, actual_rules, error_msg, executable): argument 57 expected_rule, actual_rules, error_msg, executable, 97 for executable in ["iptables", "ip6tables"]: 98 actual_rules = self._iptables_rules(executable) [all …]
|
/external/llvm-project/lldb/test/Shell/SymbolFile/NativePDB/ |
D | locate-pdb.cpp | 4 // Test that lldb can find the PDB file that corresponds to the executable. The linker 5 // writes a path to the PDB in the executable. If the PDB is not there, lldb should 6 // check the directory that contains the executable. We'll generate the PDB file in 7 // a subdirectory and then move it into the directory with the executable. That will 8 // ensure the PDB path stored in the executable is wrong. 11 // RUN: mkdir -p %t/executable 12 // RUN: rm -f %t/executable/foo.exe %t/executable/bar.pdb 15 // RUN: %clang_cl --target=x86_64-windows-msvc -Od -Z7 -c /Fo%t/executable/foo.obj -- %s 16 // RUN: lld-link -debug:full -nodefaultlib -entry:main %t/executable/foo.obj \ 17 // RUN: -out:%t/executable/foo.exe -pdb:%t/symbols/bar.pdb [all …]
|
D | load-pdb.cpp | 6 // RUN: mkdir -p %t/executable 7 // RUN: rm -f %t/executable/foo.exe %t/executable/bar.pdb 8 // RUN: %clang_cl --target=x86_64-windows-msvc -Od -Z7 -c /Fo%t/executable/foo.obj -- %s 9 // RUN: lld-link -debug:full -nodefaultlib -entry:main %t/executable/foo.obj \ 10 // RUN: -out:%t/executable/foo.exe -pdb:%t/executable/foo.pdb 11 // Rename the PDB file so that the name is different from the name inside the executable (foo.exe). 12 // RUN: mv %t/executable/foo.pdb %t/executable/bar.pdb 13 // RUN: env LLDB_USE_NATIVE_PDB_READER=1 %lldb %t/executable/foo.exe \ 14 // RUN: -o "target symbols add %t/executable/bar.pdb" \
|
/external/bazelbuild-rules_android/toolchains/android/ |
D | toolchain.bzl | 26 executable = True, 32 executable = True, 38 executable = True, 44 executable = True, 55 executable = True, 61 executable = True, 67 executable = True, 73 executable = True, 86 executable = True, 92 executable = True, [all …]
|
/external/python/cpython3/Lib/distutils/ |
D | spawn.py | 6 executable name. 29 executable. 31 If 'search_path' is true (the default), the system's executable 33 must be the exact path to the executable. If 'dry_run' is true, 48 executable = find_executable(cmd[0]) 49 if executable is not None: 50 cmd[0] = executable 91 def find_executable(executable, path=None): argument 92 """Tries to find 'executable' in the directories listed in 'path'. 97 _, ext = os.path.splitext(executable) [all …]
|
/external/python/cpython3/PC/ |
D | python_uwp.cpp | 89 std::wstring executable; in set_process_name() local 98 executable = std::wstring(localAppData) in set_process_name() 109 if (home.empty() && executable.empty()) { in set_process_name() 110 executable.resize(MAX_PATH); in set_process_name() 113 NULL, executable.data(), (DWORD)executable.size()); in set_process_name() 115 executable.clear(); in set_process_name() 117 } else if (len == executable.size() && in set_process_name() 119 executable.resize(len * 2); in set_process_name() 121 executable.resize(len); in set_process_name() 125 size_t i = executable.find_last_of(L"/\\"); in set_process_name() [all …]
|
/external/python/cpython2/Lib/test/ |
D | test_subprocess.py | 87 rc = subprocess.call([sys.executable, "-c", 93 rc = subprocess.check_call([sys.executable, "-c", 100 subprocess.check_call([sys.executable, "-c", 107 [sys.executable, "-c", "print 'BDFL'"]) 114 [sys.executable, "-c", "import sys; sys.exit(5)"]) 120 [sys.executable, "-c", "import sys; sys.stderr.write('BDFL')"], 128 [sys.executable, "-c", "print 'will not be run'"], 137 rc = subprocess.call([sys.executable, "-c", 155 p = subprocess.Popen([sys.executable, "-c", 'print "banana"'], 174 'p = Popen([sys.executable, "-c", "print \'test_stdout_none\'"],' [all …]
|
/external/autotest/client/common_lib/ |
D | magic.py | 163 [0, 'short', '=', 420, 'application/x-executable-file'], 164 [0, 'short', '=', 421, 'application/x-executable-file'], 165 [0, 'leshort', '=', 603, 'application/x-executable-file'], 166 [0, 'string', '=', 'Core\001', 'application/x-executable-file'], 168 [0, 'belong', '=', 1011, 'application/x-executable-file'], 244 [0, 'beshort', '=', 560, 'application/x-executable-file'], 245 [0, 'beshort', '=', 561, 'application/x-executable-file'], 279 [0, 'short', '=', 3401, 'application/x-executable-file'], 280 [0, 'long', '=', 406, 'application/x-executable-file'], 281 [0, 'short', '=', 406, 'application/x-executable-file'], [all …]
|
/external/llvm-project/lldb/source/Plugins/DynamicLoader/Hexagon-DYLD/ |
D | DynamicLoaderHexagonDYLD.cpp | 125 ModuleSP executable; in DidAttach() local 128 executable = GetTargetExecutable(); in DidAttach() 134 // Check that there is a valid executable in DidAttach() 135 if (executable.get() == nullptr) in DidAttach() 144 // Add the current executable to the module list in DidAttach() 146 module_list.Append(executable); in DidAttach() 148 // Map the loaded sections of this executable in DidAttach() 150 UpdateLoadedSections(executable, LLDB_INVALID_ADDRESS, load_offset, true); in DidAttach() 172 /// accordingly and returns the target executable module. 175 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local [all …]
|
/external/libkmsxx/utils/ |
D | meson.build | 5 executable('kmstest', 'kmstest.cpp', dependencies : [ common_deps ], install : true) 6 executable('kmsview', 'kmsview.cpp', dependencies : [ common_deps ], install : false) 7 executable('kmsprint', 'kmsprint.cpp', dependencies : [ common_deps ], install : true) 8 executable('fbtest', 'fbtest.cpp', dependencies : [ common_deps ], install : true) 9 executable('kmscapture', 'kmscapture.cpp', dependencies : [ common_deps ], install : false) 10 executable('kmsblank', 'kmsblank.cpp', dependencies : [ common_deps ], install : true) 13 …executable('kmstouch', 'kmstouch.cpp', dependencies : [ common_deps, libevdev_dep ], install : fal… 16 executable('omap-wbcap', 'omap-wbcap.cpp', dependencies : [ common_deps ], install : false) 17 executable('omap-wbm2m', 'omap-wbm2m.cpp', dependencies : [ common_deps ], install : false)
|
/external/tensorflow/tensorflow/compiler/xla/service/ |
D | executable.cc | 16 #include "tensorflow/compiler/xla/service/executable.h" 81 StatusOr<ScopedShapedBuffer> Executable::ExecuteOnStream( in ExecuteOnStream() 103 StatusOr<ScopedShapedBuffer> Executable::ExecuteAsyncOnStream( in ExecuteAsyncOnStream() 118 StatusOr<ExecutionOutput> Executable::ExecuteOnStream( in ExecuteOnStream() 130 StatusOr<std::vector<ScopedShapedBuffer>> Executable::ExecuteOnStreams( in ExecuteOnStreams() 162 StatusOr<ScopedShapedBuffer> Executable::ExecuteOnStreamWrapper( in ExecuteOnStreamWrapper() 173 StatusOr<ExecutionOutput> Executable::ExecuteOnStreamWrapper( in ExecuteOnStreamWrapper() 191 const Executable& executable, in ExecuteWrapperBeforeExecution() argument 201 VLOG(1) << "enqueueing executable on stream..."; in ExecuteWrapperBeforeExecution() 205 executable.module_config().debug_options().xla_hlo_profile() && in ExecuteWrapperBeforeExecution() [all …]
|
D | hlo_runner.h | 29 #include "tensorflow/compiler/xla/service/executable.h" 82 std::unique_ptr<Executable> executable, 94 Executable* executable, absl::Span<ScopedShapedBuffer const> arguments, 97 // Creates an executable object given an HLO module. If run_hlo_passes is 99 StatusOr<std::unique_ptr<Executable>> CreateExecutable( 115 // Same as above, but with a reusable Executable. This may update the profile 116 // information in *executable. 119 // since we've already compiled the Executable. 121 Executable* executable, const ReplicatedExecuteOptions& options, 128 // since we've already compiled the Executable. [all …]
|
/external/rust/crates/grpcio-sys/grpc/bazel/ |
D | python_rules.bzl | 22 tools = [context.executable._protoc] 35 context.executable.plugin, 41 tools.append(context.executable.plugin) 49 executable = context.executable._protoc, 75 executable = True, 82 executable = True, 133 tools = [context.executable._protoc, context.executable._grpc_plugin] 136 context.executable._grpc_plugin, 143 context.executable.plugin, 149 tools.append(context.executable.plugin) [all …]
|
/external/python/cpython3/Lib/test/ |
D | test_subprocess.py | 58 ZERO_RETURN_CMD = (sys.executable, '-c', 'pass') 134 rc = subprocess.call([sys.executable, "-c", 144 [sys.executable, "-c", "while True: pass"], 155 subprocess.check_call([sys.executable, "-c", 162 [sys.executable, "-c", "print('BDFL')"]) 169 [sys.executable, "-c", "import sys; sys.exit(5)"]) 175 [sys.executable, "-c", "import sys; sys.stderr.write('BDFL')"], 186 [sys.executable, "-c", 194 [sys.executable, "-c", 203 [sys.executable, "-c", "print('will not be run')"], [all …]
|
/external/webrtc/tools_webrtc/ |
D | executable_host_build.py | 11 This script builds a GN executable targeting the host machine. 16 executable to analyze a video downloaded from a device). 19 the output name of the GN executable. For example, if you have the 20 following executable in your out folder: 24 You will be able to compile the same executable targeting your host machine 29 The generated executable will have the same name as the input executable with 45 The executable for the host machine will be generated in the GN out directory 66 desc = 'Generates a GN executable targeting the host machine.' 70 help='Name of the executable to build') 98 _RunCommand([sys.executable, DepotToolPath('gn.py'), 'gen', build_dir])
|
/external/llvm-project/lldb/source/Core/ |
D | DynamicLoader.cpp | 76 ModuleSP executable = target.GetExecutableModule(); in GetTargetExecutable() local 78 if (executable) { in GetTargetExecutable() 79 if (FileSystem::Instance().Exists(executable->GetFileSpec())) { in GetTargetExecutable() 80 ModuleSpec module_spec(executable->GetFileSpec(), in GetTargetExecutable() 81 executable->GetArchitecture()); in GetTargetExecutable() 84 // Check if the executable has changed and set it to the target in GetTargetExecutable() 85 // executable if they differ. in GetTargetExecutable() 87 executable->GetUUID().IsValid()) { in GetTargetExecutable() 88 if (module_sp->GetUUID() != executable->GetUUID()) in GetTargetExecutable() 89 executable.reset(); in GetTargetExecutable() [all …]
|
/external/libxkbcommon/ |
D | meson.build | 388 executable('xkbcli', 'tools/xkbcli.c', 392 executable('xkbcli-compile-keymap', 399 executable('compile-keymap', 407 executable('xkbcli-how-to-type', 415 executable('xkbcli-interactive-evdev', 432 executable('xkbcli-interactive-x11', 466 executable('xkbcli-interactive-wayland', 478 executable('xkbcli-list', 549 executable('test-keysym', 'test/keysym.c', dependencies: test_dep), 554 executable('test-keymap', 'test/keymap.c', dependencies: test_dep), [all …]
|
/external/selinux/sandbox/ |
D | test_sandbox.py | 30 p2 = Popen([sys.executable, 'sandbox', 'grep', 'root'], stdin=p1.stdout, stdout=PIPE) 38 p = Popen([sys.executable, 'sandbox', 'kill', '-HUP', str(pid)], stdout=PIPE, stderr=PIPE) 44 … p = Popen([sys.executable, 'sandbox', 'ping', '-c 1 ', '127.0.0.1'], stdout=PIPE, stderr=PIPE) 50 p = Popen([sys.executable, 'sandbox', 'mkdir', '~/test'], stdout=PIPE, stderr=PIPE) 56 p = Popen([sys.executable, 'sandbox', 'ls', '~'], stdout=PIPE, stderr=PIPE) 62 p = Popen([sys.executable, 'sandbox', 'mail'], stdout=PIPE, stderr=PIPE) 68 p = Popen([sys.executable, 'sandbox', 'sudo'], stdout=PIPE, stderr=PIPE) 74 p = Popen([sys.executable, 'sandbox', '-M', 'id'], stdout=PIPE, stderr=PIPE) 80 p = Popen([sys.executable, 'sandbox', '-l', 's0', 'id'], stdout=PIPE, stderr=PIPE) 87 p = Popen([sys.executable, 'sandbox', '-H', homedir, '-M', 'id'], stdout=PIPE, stderr=PIPE) [all …]
|
/external/python/setuptools/setuptools/tests/ |
D | test_install_scripts.py | 24 def _run_install_scripts(self, install_dir, executable=None): argument 29 if executable is not None: 31 bs.executable = executable 40 from sys.executable. 43 monkeypatch.setattr('sys.executable', self.unix_exe) 54 from sys.executable and it contains a space. 57 monkeypatch.setattr('sys.executable', self.win32_exe) 68 is specified using --executable. 81 from --executable, that is itself properly quoted.
|
/external/bazelbuild-rules_android/rules/ |
D | utils.bzl | 284 executable = attr[DefaultInfo].files_to_run.executable 285 if executable: 286 runfiles = runfiles.merge(ctx.runfiles([executable])) 347 executable, 351 """Creates an action that runs an executable as a validation. 353 Note: When the validation executable fails, it should return a non-zero 358 validation_out: A File. The output of the executable is piped to the 361 executable: See ctx.actions.run#executable. 367 exec_type = type(executable) 371 exec_bin = executable.executable [all …]
|
/external/lz4/contrib/meson/examples/ |
D | meson.build | 14 printVersion = executable('printVersion', 18 doubleBuffer = executable('doubleBuffer', 22 dictionaryRandomAccess = executable('dictionaryRandomAccess', 26 ringBuffer = executable('ringBuffer', 30 ringBufferHC = executable('ringBufferHC', 34 lineCompress = executable('lineCompress', 38 frameCompress = executable('frameCompress', 42 compressFunctions = executable('compressFunctions', 46 simpleBuffer = executable('simpleBuffer',
|
/external/igt-gpu-tools/tests/ |
D | meson.build | 262 test_executables += executable(prog, prog + '.c', 271 test_executables += executable(prog, 280 test_executables += executable('gem_create', 288 test_executables += executable('gem_ctx_sseu', 296 test_executables += executable('gem_eio', 304 test_executables += executable('gem_exec_balancer', 'i915/gem_exec_balancer.c', 311 test_executables += executable('gem_mocs_settings', 319 test_executables += executable('perf_pmu', 'perf_pmu.c', 326 executable('testdisplay', ['testdisplay.c', 'testdisplay_hotplug.c'], 333 test_executables += executable('sw_sync', 'sw_sync.c', [all …]
|
/external/python/cpython2/Lib/plat-mac/ |
D | bundlebuilder.py | 288 # start a real new process. Also, the executable name must match 290 # deliberately with argv[0]. The actual Python executable is 292 # sys.executable later. 299 executable = os.path.join(execdir, "%(executable)s") 318 os.environ["PYTHONEXECUTABLE"] = executable 321 os.execve(executable, sys.argv, os.environ) 361 # platform, name of the subfolder of Contents that contains the executable. 365 # executable in the bundle will be a small wrapper that invokes 369 # The main executable. If a Python main program is specified 370 # the executable will be copied to Resources and be invoked [all …]
|