Searched refs:executable (Results 1 – 15 of 15) sorted by relevance
/art/runtime/ |
D | oat_file.cc | 112 bool executable, 125 bool executable, 132 OatFileBase(const std::string& filename, bool executable) : OatFile(filename, executable) {} in OatFileBase() argument 152 bool executable, 159 bool executable, 199 bool executable, in OpenOatFile() argument 204 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(location, executable)); in OpenOatFile() 210 executable, in OpenOatFile() 241 bool executable, in OpenOatFile() argument 246 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(oat_location, executable)); in OpenOatFile() [all …]
|
D | oat_file.h | 108 bool executable, 117 bool executable, in Open() argument 124 executable, in Open() 134 bool executable, in Open() argument 140 executable, in Open() 154 bool executable, 382 OatFile(const std::string& filename, bool executable);
|
D | oat_file_assistant.cc | 838 bool executable = oat_file_assistant_->load_executable_; in GetFile() local 839 if (executable && oat_file_assistant_->only_load_system_executable_) { in GetFile() 840 executable = LocationIsOnSystem(filename_.c_str()); in GetFile() 842 VLOG(oat) << "Loading " << filename_ << " with executable: " << executable; in GetFile() 852 executable, in GetFile() 862 executable, in GetFile() 871 VLOG(oat) << "Successfully loaded " << filename_ << " with executable: " << executable; in GetFile()
|
D | elf_file.h | 58 bool executable,
|
D | elf_file_impl.h | 121 bool executable,
|
D | art_method.cc | 106 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(jlr_method); in FromReflectedMethod() local 107 DCHECK(executable != nullptr); in FromReflectedMethod() 108 return executable->GetArtMethod(); in FromReflectedMethod()
|
D | elf_file.cc | 1096 bool executable, in Load() argument 1102 if (executable) { in Load() 1185 if (executable && ((program_header->p_flags & PF_X) != 0)) { in Load() 1804 bool executable, in Load() argument 1808 DELEGATE_TO_IMPL(Load, file, executable, low_4gb, reservation, error_msg); in Load()
|
D | reflection.cc | 697 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(javaMethod); in InvokeMethod() local 698 const bool accessible = executable->IsAccessible(); in InvokeMethod() 699 ArtMethod* m = executable->GetArtMethod(); in InvokeMethod()
|
D | Android.bp | 161 "mirror/executable.cc",
|
/art/tools/runtime_memusage/ |
D | README | 22 sanitizer_logcat_analysis.sh is the main executable that will use the other two 31 sanitizer_logcat_analysis.sh uses external executable development/scripts/stack.
|
/art/runtime/native/ |
D | java_lang_reflect_Executable.cc | 162 Handle<mirror::Method> executable = hs.NewHandle(soa.Decode<mirror::Method>(javaMethod)); in Executable_getParameters0() local 163 ArtMethod* art_method = executable.Get()->GetArtMethod(); in Executable_getParameters0() 236 PointerToLowMemUInt32(executable.Get()), in Executable_getParameters0()
|
/art/runtime/gc/space/ |
D | image_space.h | 133 bool executable,
|
D | image_space.cc | 2495 bool executable, in BootImageLoader() argument 2502 executable_(executable), in BootImageLoader() 3560 bool executable, in LoadBootImage() argument 3582 executable, in LoadBootImage()
|
/art/test/ |
D | README.md | 26 distributed together with the executable files.
|
/art/test/testrunner/ |
D | testrunner.py | 59 sys.stdout.write("\n\n" + sys.executable + " " + sys.version + "\n\n")
|