Searched refs:executable (Results 1 – 14 of 14) sorted by relevance
/art/runtime/ |
D | oat_file.cc | 111 bool executable, 124 bool executable, 131 OatFileBase(const std::string& filename, bool executable) : OatFile(filename, executable) {} in OatFileBase() argument 151 bool executable, 158 bool executable, 194 bool executable, in OpenOatFile() argument 199 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(location, executable)); in OpenOatFile() 205 executable, in OpenOatFile() 236 bool executable, in OpenOatFile() argument 241 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(oat_location, executable)); in OpenOatFile() [all …]
|
D | oat_file_assistant.cc | 854 bool executable = oat_file_assistant_->load_executable_; in GetFile() local 855 if (executable && oat_file_assistant_->only_load_system_executable_) { in GetFile() 856 executable = LocationIsOnSystem(filename_.c_str()); in GetFile() 858 VLOG(oat) << "Loading " << filename_ << " with executable: " << executable; in GetFile() 866 executable, in GetFile() 876 executable, in GetFile() 886 VLOG(oat) << "Successfully loaded " << filename_ << " with executable: " << executable; in GetFile()
|
D | oat_file.h | 92 bool executable, 105 bool executable, 374 OatFile(const std::string& filename, bool executable);
|
D | elf_file.h | 58 bool executable,
|
D | elf_file_impl.h | 117 bool executable,
|
D | art_method.cc | 103 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(jlr_method); in FromReflectedMethod() local 104 DCHECK(executable != nullptr); in FromReflectedMethod() 105 return executable->GetArtMethod(); in FromReflectedMethod()
|
D | elf_file.cc | 1104 bool executable, in Load() argument 1110 if (executable) { in Load() 1193 if (executable && ((program_header->p_flags & PF_X) != 0)) { in Load() 1812 bool executable, in Load() argument 1816 DELEGATE_TO_IMPL(Load, file, executable, low_4gb, reservation, error_msg); in Load()
|
D | reflection.cc | 659 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(javaMethod); in InvokeMethod() local 660 const bool accessible = executable->IsAccessible(); in InvokeMethod() 661 ArtMethod* m = executable->GetArtMethod(); in InvokeMethod()
|
D | Android.bp | 132 "mirror/executable.cc",
|
/art/tools/runtime_memusage/ |
D | README | 22 sanitizer_logcat_analysis.sh is the main executable that will use the other two 31 sanitizer_logcat_analysis.sh uses external executable development/scripts/stack.
|
/art/runtime/native/ |
D | java_lang_reflect_Executable.cc | 162 Handle<mirror::Method> executable = hs.NewHandle(soa.Decode<mirror::Method>(javaMethod)); in Executable_getParameters0() local 163 ArtMethod* art_method = executable.Get()->GetArtMethod(); in Executable_getParameters0() 236 PointerToLowMemUInt32(executable.Get()), in Executable_getParameters0()
|
/art/runtime/gc/space/ |
D | image_space.h | 54 bool executable,
|
D | image_space.cc | 1367 bool executable, in BootImageLoader() argument 1374 executable_(executable), in BootImageLoader() 1972 bool executable, in LoadBootImage() argument 1994 executable, in LoadBootImage()
|
/art/test/ |
D | README.md | 13 together with the executable files.
|