/macosx-10.10.1/mDNSResponder-561.1.1/mDNSWindows/SystemService/ |
H A D | Firewall.h | 54 LPWSTR executable,
|
/macosx-10.10.1/JavaScriptCore-7600.1.17/runtime/ |
H A D | TestRunnerUtils.cpp | 40 FunctionExecutable* executable = jsDynamicCast<FunctionExecutable*>( 41 theFunction->executable()); 42 return executable; 47 FunctionExecutable* executable = getExecutableForFunction(theFunctionValue); local 48 if (!executable) 51 CodeBlock* baselineCodeBlock = executable->baselineCodeBlockFor(CodeForCall); 54 baselineCodeBlock = executable->baselineCodeBlockFor(CodeForConstruct); 80 if (FunctionExecutable* executable = getExecutableForFunction(theFunctionValue)) 81 executable->setNeverInline(true);
|
H A D | FunctionExecutableDump.h | 36 explicit FunctionExecutableDump(FunctionExecutable* executable) argument 37 : m_executable(executable)
|
H A D | Executable.cpp | 139 ProgramExecutable* executable = jsCast<ProgramExecutable*>(this); local 144 oldCodeBlock = executable->m_programCodeBlock; 145 executable->m_programCodeBlock = codeBlock; 150 EvalExecutable* executable = jsCast<EvalExecutable*>(this); local 155 oldCodeBlock = executable->m_evalCodeBlock; 156 executable->m_evalCodeBlock = codeBlock; 161 FunctionExecutable* executable = jsCast<FunctionExecutable*>(this); local 166 oldCodeBlock = executable->m_codeBlockForCall; 167 executable->m_codeBlockForCall = codeBlock; 170 oldCodeBlock = executable 197 EvalExecutable* executable = jsCast<EvalExecutable*>(this); local 207 ProgramExecutable* executable = jsCast<ProgramExecutable*>(this); local 218 FunctionExecutable* executable = jsCast<FunctionExecutable*>(this); local 256 EvalExecutable* executable = jsCast<EvalExecutable*>(this); local 267 ProgramExecutable* executable = jsCast<ProgramExecutable*>(this); local 277 FunctionExecutable* executable = jsCast<FunctionExecutable*>(this); local 338 EvalExecutable* executable = new (NotNull, allocateCell<EvalExecutable>(*exec->heap())) EvalExecutable(exec, source, isInStrictContext); local [all...] |
/macosx-10.10.1/tcl-105/tcl_ext/tcllib/tcllib/modules/fumagic/ |
H A D | mimetypes.tcl | 78 switch -- [Nv s 0 ] 1538 {emit application/x-alan-adventure-game} 387 {emit application/x-executable-file} -147 {emit application/data} -155 {emit application/data} -5536 {emit application/x-arj} -138 {emit application/data} -394 {emit application/data} -650 {emit application/x-lzh} 387 {emit application/x-executable-file} 392 {emit application/x-executable-file} 399 {emit application/x-object-file} -13230 {emit {RLE image data,}} 322 {emit {basic-16 executable}} 323 {emit {basic-16 executable \(TV\)}} 328 {emit application/x-executable-file} 329 {emit application/x-executable-file} 330 {emit application/x-executable-file} 338 {emit application/x-executable-file} 332 {emit application/x-executable [all...] |
/macosx-10.10.1/WTF-7600.1.24/wtf/ |
H A D | OSAllocatorWin.cpp | 36 static inline DWORD protection(bool writable, bool executable) argument 38 return executable ? 43 void* OSAllocator::reserveUncommitted(size_t bytes, Usage, bool writable, bool executable, bool) argument 45 void* result = VirtualAlloc(0, bytes, MEM_RESERVE, protection(writable, executable)); 51 void* OSAllocator::reserveAndCommit(size_t bytes, Usage, bool writable, bool executable, bool) argument 53 void* result = VirtualAlloc(0, bytes, MEM_RESERVE | MEM_COMMIT, protection(writable, executable)); 59 void OSAllocator::commit(void* address, size_t bytes, bool writable, bool executable) argument 61 void* result = VirtualAlloc(address, bytes, MEM_COMMIT, protection(writable, executable));
|
H A D | OSAllocator.h | 47 WTF_EXPORT_PRIVATE static void* reserveUncommitted(size_t, Usage = UnknownUsage, bool writable = true, bool executable = false, bool includesGuardPages = false); 53 WTF_EXPORT_PRIVATE static void commit(void*, size_t, bool writable, bool executable); 59 WTF_EXPORT_PRIVATE static void* reserveAndCommit(size_t, Usage = UnknownUsage, bool writable = true, bool executable = false, bool includesGuardPages = false); 65 WTF_EXPORT_PRIVATE static void* reserveAndCommit(size_t reserveSize, size_t commitSize, Usage = UnknownUsage, bool writable = true, bool executable = false); 72 static T* reallocateCommitted(T*, size_t oldSize, size_t newSize, Usage = UnknownUsage, bool writable = true, bool executable = false); 75 inline void* OSAllocator::reserveAndCommit(size_t reserveSize, size_t commitSize, Usage usage, bool writable, bool executable) argument 77 void* base = reserveUncommitted(reserveSize, usage, writable, executable); 78 commit(base, commitSize, writable, executable); 102 inline T* OSAllocator::reallocateCommitted(T* oldBase, size_t oldSize, size_t newSize, Usage usage, bool writable, bool executable) argument 104 void* newBase = reserveAndCommit(newSize, usage, writable, executable); [all...] |
H A D | OSAllocatorPosix.cpp | 38 void* OSAllocator::reserveUncommitted(size_t bytes, Usage usage, bool writable, bool executable, bool includesGuardPages) argument 43 UNUSED_PARAM(executable); 51 void* result = reserveAndCommit(bytes, usage, writable, executable, includesGuardPages); 62 void* OSAllocator::reserveAndCommit(size_t bytes, Usage usage, bool writable, bool executable, bool includesGuardPages) argument 68 if (executable) 73 if (executable) 86 if (executable) { 107 if (executable) 123 void OSAllocator::commit(void* address, size_t bytes, bool writable, bool executable) argument 129 if (executable) [all...] |
H A D | PageReservation.h | 104 static PageReservation reserve(size_t size, OSAllocator::Usage usage = OSAllocator::UnknownUsage, bool writable = true, bool executable = false) 107 return PageReservation(OSAllocator::reserveUncommitted(size, usage, writable, executable), size, writable, executable, false); 110 static PageReservation reserveWithGuardPages(size_t size, OSAllocator::Usage usage = OSAllocator::UnknownUsage, bool writable = true, bool executable = false) 113 return PageReservation(OSAllocator::reserveUncommitted(size + pageSize() * 2, usage, writable, executable, true), size, writable, executable, true); 132 PageReservation(void* base, size_t size, bool writable, bool executable, bool hasGuardPages) argument 136 , m_executable(executable)
|
/macosx-10.10.1/cxxfilt-11/cxxfilt/libiberty/ |
H A D | pex-one.c | 24 pex_one (int flags, const char *executable, char * const *argv, argument 32 errmsg = pex_run (obj, flags, executable, argv, outname, errname, err);
|
H A D | pex-win32.c | 66 /* Ensure that the executable pathname uses Win32 backslashes. This 69 that calls CreateProcess) *iff* the executable pathname (argv[0]) 150 /* Tack the executable on the end of a (possibly slash terminated) buffer 153 tack_on_executable (char *buf, const char *executable) argument 158 backslashify (strcat (buf, executable)); 184 mingw_rootify (const char *executable) argument 197 return executable; 205 return executable; 217 return executable; 240 return executable; 287 msys_rootify(const char *executable) argument 526 win32_spawn(const char *executable, BOOL search, char *const *argv, char *const *env, DWORD dwCreationFlags, LPSTARTUPINFO si, LPPROCESS_INFORMATION pi) argument 623 spawn_script(const char *executable, char *const *argv, char* const *env, DWORD dwCreationFlags, LPSTARTUPINFO si, LPPROCESS_INFORMATION pi) argument 700 pex_win32_exec_child(struct pex_obj *obj ATTRIBUTE_UNUSED, int flags, const char *executable, char * const * argv, char* const* env, int in, int out, int errdes, int toclose ATTRIBUTE_UNUSED, const char **errmsg, int *err) argument [all...] |
/macosx-10.10.1/JavaScriptCore-7600.1.17/dfg/ |
H A D | DFGDesiredWriteBarriers.cpp | 63 WriteBarrier<ScriptExecutable>& executable = inlineCallFrame->executable; local 64 executable.set(vm, m_owner, executable.get()); 81 WriteBarrier<ScriptExecutable>& executable = inlineCallFrame->executable; local 82 visitor.append(&executable);
|
H A D | DFGOSRExitPreparation.cpp | 45 FunctionExecutable* executable = local 46 static_cast<FunctionExecutable*>(codeOrigin.inlineCallFrame->executable.get()); 47 CodeBlock* codeBlock = executable->baselineCodeBlockFor(
|
/macosx-10.10.1/JavaScriptCore-7600.1.17/jit/ |
H A D | ClosureCallStubRoutine.cpp | 42 Structure* structure, ExecutableBase* executable, const CodeOrigin& codeOrigin) 45 , m_executable(vm, owner, executable) 40 ClosureCallStubRoutine( const MacroAssemblerCodeRef& code, VM& vm, const JSCell* owner, Structure* structure, ExecutableBase* executable, const CodeOrigin& codeOrigin) argument
|
H A D | ClosureCallStubRoutine.h | 45 ExecutableBase* executable() const { return m_executable.get(); } function in class:JSC::ClosureCallStubRoutine
|
/macosx-10.10.1/JavaScriptCore-7600.1.17/bytecode/ |
H A D | CodeOrigin.cpp | 77 if (a.inlineCallFrame->executable != b.inlineCallFrame->executable) 100 result += WTF::PtrHash<JSCell*>::hash(codeOrigin.inlineCallFrame->executable.get()); 130 out.print(frame->briefFunctionInformation(), ":<", RawPointer(frame->executable.get()), "> "); 151 return jsCast<FunctionExecutable*>(executable.get())->codeBlockFor( 157 return jsCast<FunctionExecutable*>(executable.get())->codeBlockFor( 163 return jsCast<FunctionExecutable*>(executable.get())->inferredName().utf8(); 168 return jsCast<FunctionExecutable*>(executable.get())->baselineCodeBlockFor(specializationKind()); 178 out.print(briefFunctionInformation(), ":<", RawPointer(executable.get())); 179 if (executable [all...] |
H A D | CallLinkStatus.h | 64 CallLinkStatus(ExecutableBase* executable, Structure* structure) argument 65 : m_executable(executable) 70 ASSERT(!!executable == !!structure); 110 ExecutableBase* executable() const { return m_executable; } function in class:JSC::CallLinkStatus
|
H A D | CallLinkInfo.cpp | 65 || !Heap::isMarked(stub->executable())) { 69 stub->executable()->hashFor(specializationKind()), 79 callee.get()->executable()->hashFor(specializationKind()),
|
/macosx-10.10.1/vim-55/runtime/autoload/ |
H A D | netrwFileHandlers.vim | 80 if executable("mozilla") 83 elseif executable("netscape") 103 if executable("mozilla") 106 elseif executable("netscape") 123 if executable("gimp") 125 elseif executable(expand("$SystemRoot")."/SYSTEM32/MSPAINT.EXE") 142 if executable("gimp") 144 elseif executable(expand("$SystemRoot")."/SYSTEM32/MSPAINT.EXE") 160 if executable("gimp") 162 elseif executable(expan [all...] |
/macosx-10.10.1/emacs-93/emacs/lisp/progmodes/ |
H A D | executable.el | 0 ;;; executable.el --- base functionality for executable interpreter scripts -*- byte-compile-dynamic: t -*- 28 ;; executable.el is used by certain major modes to insert a suitable 32 ;; Unless it has a magic number, a Unix file with executable mode is passed to 36 ;; executable script. Such a magic number is made up by the characters `#!' 44 ;; makes the file executable if it wasn't, as soon as it's saved. 49 ;; Modes that use this should nconc `executable-map' to the end of their own 50 ;; keymap and `executable-font-lock-keywords' to the end of their own font 52 ;; `executable-set-magic'. 56 (defgroup executable ni function [all...] |
/macosx-10.10.1/ruby-106/ruby/test/rubygems/ |
H A D | test_gem_commands_uninstall_command.rb | 16 @executable = File.join(@gemhome, 'bin', 'executable') 40 assert_equal "Removing executable", output.shift 55 assert File.exist?(@executable) 57 assert File.symlink?(@executable) 61 FileUtils.rm_f @executable 63 open @executable, "wb+" do |f| f.puts "binary" end 72 assert_match(/Removing executable/, output.shift) 74 assert_equal false, File.exist?(@executable) 79 FileUtils.rm_f @executable # Wis [all...] |
/macosx-10.10.1/DiskArbitration-268/diskarbitrationd/ |
H A D | DACommand.h | 46 extern void DACommandExecute( CFURLRef executable,
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | dirscanner.cpp | 93 bool executable = ent->fts_statp->st_mode & (S_IXUSR | S_IXGRP | S_IXOTH); local 98 rule = match(relpath, file, executable); 107 rule = match(relpath, symlink, executable, target); 114 rule = match(relpath, directory, executable); 136 DirValidator::Rule * DirValidator::match(const char *path, uint32_t flags, bool executable, const char *target) argument 141 && !(executable && (rule->flags & noexec))
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | dirscanner.cpp | 93 bool executable = ent->fts_statp->st_mode & (S_IXUSR | S_IXGRP | S_IXOTH); local 98 rule = match(relpath, file, executable); 107 rule = match(relpath, symlink, executable, target); 114 rule = match(relpath, directory, executable); 136 DirValidator::Rule * DirValidator::match(const char *path, uint32_t flags, bool executable, const char *target) argument 141 && !(executable && (rule->flags & noexec))
|
/macosx-10.10.1/swig-12/Lib/perl5/ |
H A D | perlmain.i | 14 Perl executable. This will be necessary on systems that do 19 Perl executable. Thus, it may be necessary (or desirable)
|