Home
last modified time | relevance | path

Searched refs:executable (Results 1 – 15 of 15) sorted by relevance

/art/runtime/
Doat_file.cc112 bool executable,
125 bool executable,
132 OatFileBase(const std::string& filename, bool executable) : OatFile(filename, executable) {} in OatFileBase() argument
152 bool executable,
159 bool executable,
199 bool executable, in OpenOatFile() argument
204 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(location, executable)); in OpenOatFile()
210 executable, in OpenOatFile()
241 bool executable, in OpenOatFile() argument
246 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(oat_location, executable)); in OpenOatFile()
[all …]
Doat_file.h108 bool executable,
117 bool executable, in Open() argument
124 executable, in Open()
134 bool executable, in Open() argument
140 executable, in Open()
154 bool executable,
382 OatFile(const std::string& filename, bool executable);
Doat_file_assistant.cc838 bool executable = oat_file_assistant_->load_executable_; in GetFile() local
839 if (executable && oat_file_assistant_->only_load_system_executable_) { in GetFile()
840 executable = LocationIsOnSystem(filename_.c_str()); in GetFile()
842 VLOG(oat) << "Loading " << filename_ << " with executable: " << executable; in GetFile()
852 executable, in GetFile()
862 executable, in GetFile()
871 VLOG(oat) << "Successfully loaded " << filename_ << " with executable: " << executable; in GetFile()
Delf_file.h58 bool executable,
Delf_file_impl.h121 bool executable,
Dart_method.cc106 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(jlr_method); in FromReflectedMethod() local
107 DCHECK(executable != nullptr); in FromReflectedMethod()
108 return executable->GetArtMethod(); in FromReflectedMethod()
Delf_file.cc1096 bool executable, in Load() argument
1102 if (executable) { in Load()
1185 if (executable && ((program_header->p_flags & PF_X) != 0)) { in Load()
1804 bool executable, in Load() argument
1808 DELEGATE_TO_IMPL(Load, file, executable, low_4gb, reservation, error_msg); in Load()
Dreflection.cc697 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(javaMethod); in InvokeMethod() local
698 const bool accessible = executable->IsAccessible(); in InvokeMethod()
699 ArtMethod* m = executable->GetArtMethod(); in InvokeMethod()
DAndroid.bp161 "mirror/executable.cc",
/art/tools/runtime_memusage/
DREADME22 sanitizer_logcat_analysis.sh is the main executable that will use the other two
31 sanitizer_logcat_analysis.sh uses external executable development/scripts/stack.
/art/runtime/native/
Djava_lang_reflect_Executable.cc162 Handle<mirror::Method> executable = hs.NewHandle(soa.Decode<mirror::Method>(javaMethod)); in Executable_getParameters0() local
163 ArtMethod* art_method = executable.Get()->GetArtMethod(); in Executable_getParameters0()
236 PointerToLowMemUInt32(executable.Get()), in Executable_getParameters0()
/art/runtime/gc/space/
Dimage_space.h133 bool executable,
Dimage_space.cc2495 bool executable, in BootImageLoader() argument
2502 executable_(executable), in BootImageLoader()
3560 bool executable, in LoadBootImage() argument
3582 executable, in LoadBootImage()
/art/test/
DREADME.md26 distributed together with the executable files.
/art/test/testrunner/
Dtestrunner.py59 sys.stdout.write("\n\n" + sys.executable + " " + sys.version + "\n\n")