Searched refs:executable (Results 1 - 25 of 404) sorted by relevance

1234567891011>>

/macosx-10.10/JavaScriptCore-7600.1.17/runtime/
H A DTestRunnerUtils.cpp40 FunctionExecutable* executable = jsDynamicCast<FunctionExecutable*>(
41 theFunction->executable());
42 return executable;
47 FunctionExecutable* executable = getExecutableForFunction(theFunctionValue); local
48 if (!executable)
51 CodeBlock* baselineCodeBlock = executable->baselineCodeBlockFor(CodeForCall);
54 baselineCodeBlock = executable->baselineCodeBlockFor(CodeForConstruct);
80 if (FunctionExecutable* executable = getExecutableForFunction(theFunctionValue))
81 executable->setNeverInline(true);
H A DFunctionExecutableDump.h36 explicit FunctionExecutableDump(FunctionExecutable* executable) argument
37 : m_executable(executable)
H A DExecutable.cpp139 ProgramExecutable* executable = jsCast<ProgramExecutable*>(this); local
144 oldCodeBlock = executable->m_programCodeBlock;
145 executable->m_programCodeBlock = codeBlock;
150 EvalExecutable* executable = jsCast<EvalExecutable*>(this); local
155 oldCodeBlock = executable->m_evalCodeBlock;
156 executable->m_evalCodeBlock = codeBlock;
161 FunctionExecutable* executable = jsCast<FunctionExecutable*>(this); local
166 oldCodeBlock = executable->m_codeBlockForCall;
167 executable->m_codeBlockForCall = codeBlock;
170 oldCodeBlock = executable
197 EvalExecutable* executable = jsCast<EvalExecutable*>(this); local
207 ProgramExecutable* executable = jsCast<ProgramExecutable*>(this); local
218 FunctionExecutable* executable = jsCast<FunctionExecutable*>(this); local
256 EvalExecutable* executable = jsCast<EvalExecutable*>(this); local
267 ProgramExecutable* executable = jsCast<ProgramExecutable*>(this); local
277 FunctionExecutable* executable = jsCast<FunctionExecutable*>(this); local
338 EvalExecutable* executable = new (NotNull, allocateCell<EvalExecutable>(*exec->heap())) EvalExecutable(exec, source, isInStrictContext); local
[all...]
/macosx-10.10/mDNSResponder-561.1.1/mDNSWindows/SystemService/
H A DFirewall.h54 LPWSTR executable,
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/fumagic/
H A Dmimetypes.tcl78 switch -- [Nv s 0 ] 1538 {emit application/x-alan-adventure-game} 387 {emit application/x-executable-file} -147 {emit application/data} -155 {emit application/data} -5536 {emit application/x-arj} -138 {emit application/data} -394 {emit application/data} -650 {emit application/x-lzh} 387 {emit application/x-executable-file} 392 {emit application/x-executable-file} 399 {emit application/x-object-file} -13230 {emit {RLE image data,}} 322 {emit {basic-16 executable}} 323 {emit {basic-16 executable \(TV\)}} 328 {emit application/x-executable-file} 329 {emit application/x-executable-file} 330 {emit application/x-executable-file} 338 {emit application/x-executable-file} 332 {emit application/x-executable
[all...]
/macosx-10.10/WTF-7600.1.24/wtf/
H A DOSAllocatorWin.cpp36 static inline DWORD protection(bool writable, bool executable) argument
38 return executable ?
43 void* OSAllocator::reserveUncommitted(size_t bytes, Usage, bool writable, bool executable, bool) argument
45 void* result = VirtualAlloc(0, bytes, MEM_RESERVE, protection(writable, executable));
51 void* OSAllocator::reserveAndCommit(size_t bytes, Usage, bool writable, bool executable, bool) argument
53 void* result = VirtualAlloc(0, bytes, MEM_RESERVE | MEM_COMMIT, protection(writable, executable));
59 void OSAllocator::commit(void* address, size_t bytes, bool writable, bool executable) argument
61 void* result = VirtualAlloc(address, bytes, MEM_COMMIT, protection(writable, executable));
H A DOSAllocator.h47 WTF_EXPORT_PRIVATE static void* reserveUncommitted(size_t, Usage = UnknownUsage, bool writable = true, bool executable = false, bool includesGuardPages = false);
53 WTF_EXPORT_PRIVATE static void commit(void*, size_t, bool writable, bool executable);
59 WTF_EXPORT_PRIVATE static void* reserveAndCommit(size_t, Usage = UnknownUsage, bool writable = true, bool executable = false, bool includesGuardPages = false);
65 WTF_EXPORT_PRIVATE static void* reserveAndCommit(size_t reserveSize, size_t commitSize, Usage = UnknownUsage, bool writable = true, bool executable = false);
72 static T* reallocateCommitted(T*, size_t oldSize, size_t newSize, Usage = UnknownUsage, bool writable = true, bool executable = false);
75 inline void* OSAllocator::reserveAndCommit(size_t reserveSize, size_t commitSize, Usage usage, bool writable, bool executable) argument
77 void* base = reserveUncommitted(reserveSize, usage, writable, executable);
78 commit(base, commitSize, writable, executable);
102 inline T* OSAllocator::reallocateCommitted(T* oldBase, size_t oldSize, size_t newSize, Usage usage, bool writable, bool executable) argument
104 void* newBase = reserveAndCommit(newSize, usage, writable, executable);
[all...]
H A DOSAllocatorPosix.cpp38 void* OSAllocator::reserveUncommitted(size_t bytes, Usage usage, bool writable, bool executable, bool includesGuardPages) argument
43 UNUSED_PARAM(executable);
51 void* result = reserveAndCommit(bytes, usage, writable, executable, includesGuardPages);
62 void* OSAllocator::reserveAndCommit(size_t bytes, Usage usage, bool writable, bool executable, bool includesGuardPages) argument
68 if (executable)
73 if (executable)
86 if (executable) {
107 if (executable)
123 void OSAllocator::commit(void* address, size_t bytes, bool writable, bool executable) argument
129 if (executable)
[all...]
H A DPageReservation.h104 static PageReservation reserve(size_t size, OSAllocator::Usage usage = OSAllocator::UnknownUsage, bool writable = true, bool executable = false)
107 return PageReservation(OSAllocator::reserveUncommitted(size, usage, writable, executable), size, writable, executable, false);
110 static PageReservation reserveWithGuardPages(size_t size, OSAllocator::Usage usage = OSAllocator::UnknownUsage, bool writable = true, bool executable = false)
113 return PageReservation(OSAllocator::reserveUncommitted(size + pageSize() * 2, usage, writable, executable, true), size, writable, executable, true);
132 PageReservation(void* base, size_t size, bool writable, bool executable, bool hasGuardPages) argument
136 , m_executable(executable)
/macosx-10.10/cxxfilt-11/cxxfilt/libiberty/
H A Dpex-one.c24 pex_one (int flags, const char *executable, char * const *argv, argument
32 errmsg = pex_run (obj, flags, executable, argv, outname, errname, err);
H A Dpex-win32.c66 /* Ensure that the executable pathname uses Win32 backslashes. This
69 that calls CreateProcess) *iff* the executable pathname (argv[0])
150 /* Tack the executable on the end of a (possibly slash terminated) buffer
153 tack_on_executable (char *buf, const char *executable) argument
158 backslashify (strcat (buf, executable));
184 mingw_rootify (const char *executable) argument
197 return executable;
205 return executable;
217 return executable;
240 return executable;
287 msys_rootify(const char *executable) argument
526 win32_spawn(const char *executable, BOOL search, char *const *argv, char *const *env, DWORD dwCreationFlags, LPSTARTUPINFO si, LPPROCESS_INFORMATION pi) argument
623 spawn_script(const char *executable, char *const *argv, char* const *env, DWORD dwCreationFlags, LPSTARTUPINFO si, LPPROCESS_INFORMATION pi) argument
700 pex_win32_exec_child(struct pex_obj *obj ATTRIBUTE_UNUSED, int flags, const char *executable, char * const * argv, char* const* env, int in, int out, int errdes, int toclose ATTRIBUTE_UNUSED, const char **errmsg, int *err) argument
[all...]
/macosx-10.10/JavaScriptCore-7600.1.17/dfg/
H A DDFGDesiredWriteBarriers.cpp63 WriteBarrier<ScriptExecutable>& executable = inlineCallFrame->executable; local
64 executable.set(vm, m_owner, executable.get());
81 WriteBarrier<ScriptExecutable>& executable = inlineCallFrame->executable; local
82 visitor.append(&executable);
H A DDFGOSRExitPreparation.cpp45 FunctionExecutable* executable = local
46 static_cast<FunctionExecutable*>(codeOrigin.inlineCallFrame->executable.get());
47 CodeBlock* codeBlock = executable->baselineCodeBlockFor(
/macosx-10.10/JavaScriptCore-7600.1.17/jit/
H A DClosureCallStubRoutine.cpp42 Structure* structure, ExecutableBase* executable, const CodeOrigin& codeOrigin)
45 , m_executable(vm, owner, executable)
40 ClosureCallStubRoutine( const MacroAssemblerCodeRef& code, VM& vm, const JSCell* owner, Structure* structure, ExecutableBase* executable, const CodeOrigin& codeOrigin) argument
H A DClosureCallStubRoutine.h45 ExecutableBase* executable() const { return m_executable.get(); } function in class:JSC::ClosureCallStubRoutine
/macosx-10.10/JavaScriptCore-7600.1.17/bytecode/
H A DCodeOrigin.cpp77 if (a.inlineCallFrame->executable != b.inlineCallFrame->executable)
100 result += WTF::PtrHash<JSCell*>::hash(codeOrigin.inlineCallFrame->executable.get());
130 out.print(frame->briefFunctionInformation(), ":<", RawPointer(frame->executable.get()), "> ");
151 return jsCast<FunctionExecutable*>(executable.get())->codeBlockFor(
157 return jsCast<FunctionExecutable*>(executable.get())->codeBlockFor(
163 return jsCast<FunctionExecutable*>(executable.get())->inferredName().utf8();
168 return jsCast<FunctionExecutable*>(executable.get())->baselineCodeBlockFor(specializationKind());
178 out.print(briefFunctionInformation(), ":<", RawPointer(executable.get()));
179 if (executable
[all...]
H A DCallLinkStatus.h64 CallLinkStatus(ExecutableBase* executable, Structure* structure) argument
65 : m_executable(executable)
70 ASSERT(!!executable == !!structure);
110 ExecutableBase* executable() const { return m_executable; } function in class:JSC::CallLinkStatus
H A DCallLinkInfo.cpp65 || !Heap::isMarked(stub->executable())) {
69 stub->executable()->hashFor(specializationKind()),
79 callee.get()->executable()->hashFor(specializationKind()),
/macosx-10.10/vim-55/runtime/autoload/
H A DnetrwFileHandlers.vim80 if executable("mozilla")
83 elseif executable("netscape")
103 if executable("mozilla")
106 elseif executable("netscape")
123 if executable("gimp")
125 elseif executable(expand("$SystemRoot")."/SYSTEM32/MSPAINT.EXE")
142 if executable("gimp")
144 elseif executable(expand("$SystemRoot")."/SYSTEM32/MSPAINT.EXE")
160 if executable("gimp")
162 elseif executable(expan
[all...]
/macosx-10.10/emacs-93/emacs/lisp/progmodes/
H A Dexecutable.el0 ;;; executable.el --- base functionality for executable interpreter scripts -*- byte-compile-dynamic: t -*-
28 ;; executable.el is used by certain major modes to insert a suitable
32 ;; Unless it has a magic number, a Unix file with executable mode is passed to
36 ;; executable script. Such a magic number is made up by the characters `#!'
44 ;; makes the file executable if it wasn't, as soon as it's saved.
49 ;; Modes that use this should nconc `executable-map' to the end of their own
50 ;; keymap and `executable-font-lock-keywords' to the end of their own font
52 ;; `executable-set-magic'.
56 (defgroup executable ni function
[all...]
/macosx-10.10/ruby-106/ruby/test/rubygems/
H A Dtest_gem_commands_uninstall_command.rb16 @executable = File.join(@gemhome, 'bin', 'executable')
40 assert_equal "Removing executable", output.shift
55 assert File.exist?(@executable)
57 assert File.symlink?(@executable)
61 FileUtils.rm_f @executable
63 open @executable, "wb+" do |f| f.puts "binary" end
72 assert_match(/Removing executable/, output.shift)
74 assert_equal false, File.exist?(@executable)
79 FileUtils.rm_f @executable # Wis
[all...]
/macosx-10.10/DiskArbitration-268/diskarbitrationd/
H A DDACommand.h46 extern void DACommandExecute( CFURLRef executable,
/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/
H A Ddirscanner.cpp93 bool executable = ent->fts_statp->st_mode & (S_IXUSR | S_IXGRP | S_IXOTH); local
98 rule = match(relpath, file, executable);
107 rule = match(relpath, symlink, executable, target);
114 rule = match(relpath, directory, executable);
136 DirValidator::Rule * DirValidator::match(const char *path, uint32_t flags, bool executable, const char *target) argument
141 && !(executable && (rule->flags & noexec))
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/
H A Ddirscanner.cpp93 bool executable = ent->fts_statp->st_mode & (S_IXUSR | S_IXGRP | S_IXOTH); local
98 rule = match(relpath, file, executable);
107 rule = match(relpath, symlink, executable, target);
114 rule = match(relpath, directory, executable);
136 DirValidator::Rule * DirValidator::match(const char *path, uint32_t flags, bool executable, const char *target) argument
141 && !(executable && (rule->flags & noexec))
/macosx-10.10/swig-12/Lib/perl5/
H A Dperlmain.i14 Perl executable. This will be necessary on systems that do
19 Perl executable. Thus, it may be necessary (or desirable)

Completed in 311 milliseconds

1234567891011>>