Home
last modified time | relevance | path

Searched refs:executable (Results 1 – 14 of 14) sorted by relevance

/art/runtime/
Doat_file.cc111 bool executable,
124 bool executable,
131 OatFileBase(const std::string& filename, bool executable) : OatFile(filename, executable) {} in OatFileBase() argument
151 bool executable,
158 bool executable,
194 bool executable, in OpenOatFile() argument
199 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(location, executable)); in OpenOatFile()
205 executable, in OpenOatFile()
236 bool executable, in OpenOatFile() argument
241 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(oat_location, executable)); in OpenOatFile()
[all …]
Doat_file_assistant.cc854 bool executable = oat_file_assistant_->load_executable_; in GetFile() local
855 if (executable && oat_file_assistant_->only_load_system_executable_) { in GetFile()
856 executable = LocationIsOnSystem(filename_.c_str()); in GetFile()
858 VLOG(oat) << "Loading " << filename_ << " with executable: " << executable; in GetFile()
866 executable, in GetFile()
876 executable, in GetFile()
886 VLOG(oat) << "Successfully loaded " << filename_ << " with executable: " << executable; in GetFile()
Doat_file.h92 bool executable,
105 bool executable,
374 OatFile(const std::string& filename, bool executable);
Delf_file.h58 bool executable,
Delf_file_impl.h117 bool executable,
Dart_method.cc103 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(jlr_method); in FromReflectedMethod() local
104 DCHECK(executable != nullptr); in FromReflectedMethod()
105 return executable->GetArtMethod(); in FromReflectedMethod()
Delf_file.cc1104 bool executable, in Load() argument
1110 if (executable) { in Load()
1193 if (executable && ((program_header->p_flags & PF_X) != 0)) { in Load()
1812 bool executable, in Load() argument
1816 DELEGATE_TO_IMPL(Load, file, executable, low_4gb, reservation, error_msg); in Load()
Dreflection.cc659 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(javaMethod); in InvokeMethod() local
660 const bool accessible = executable->IsAccessible(); in InvokeMethod()
661 ArtMethod* m = executable->GetArtMethod(); in InvokeMethod()
DAndroid.bp132 "mirror/executable.cc",
/art/tools/runtime_memusage/
DREADME22 sanitizer_logcat_analysis.sh is the main executable that will use the other two
31 sanitizer_logcat_analysis.sh uses external executable development/scripts/stack.
/art/runtime/native/
Djava_lang_reflect_Executable.cc162 Handle<mirror::Method> executable = hs.NewHandle(soa.Decode<mirror::Method>(javaMethod)); in Executable_getParameters0() local
163 ArtMethod* art_method = executable.Get()->GetArtMethod(); in Executable_getParameters0()
236 PointerToLowMemUInt32(executable.Get()), in Executable_getParameters0()
/art/runtime/gc/space/
Dimage_space.h54 bool executable,
Dimage_space.cc1367 bool executable, in BootImageLoader() argument
1374 executable_(executable), in BootImageLoader()
1972 bool executable, in LoadBootImage() argument
1994 executable, in LoadBootImage()
/art/test/
DREADME.md13 together with the executable files.