/art/runtime/oat/ |
D | oat_file.cc | 115 bool executable, 129 bool executable, 137 OatFileBase(const std::string& filename, bool executable) : OatFile(filename, executable) {} in OatFileBase() argument 157 bool executable, 164 bool executable, 219 bool executable, in OpenOatFile() argument 225 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(location, executable)); in OpenOatFile() 231 executable, in OpenOatFile() 262 bool executable, in OpenOatFile() argument 268 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(oat_location, executable)); in OpenOatFile() [all …]
|
D | oat_file.h | 113 bool executable, 123 bool executable, in Open() argument 130 executable, in Open() 141 bool executable, in Open() argument 147 executable, in Open() 162 bool executable, 421 OatFile(const std::string& filename, bool executable);
|
D | oat_file_assistant.cc | 1058 bool executable = oat_file_assistant_->load_executable_; in GetFile() local 1060 executable = false; in GetFile() 1094 executable = false; in GetFile() 1108 if (executable && oat_file_assistant_->only_load_trusted_executable_) { in GetFile() 1109 executable = LocationIsTrusted(filename_, /*trust_art_apex_data_files=*/true); in GetFile() 1111 VLOG(oat) << "Loading " << filename_ << " with executable: " << executable; in GetFile() 1120 executable, in GetFile() 1131 executable, in GetFile() 1140 VLOG(oat) << "Successfully loaded " << filename_ << " with executable: " << executable; in GetFile()
|
D | elf_file.h | 58 bool executable,
|
D | elf_file_impl.h | 125 bool executable,
|
D | elf_file.cc | 1111 bool executable, in Load() argument 1117 if (executable) { in Load() 1200 if (executable && ((program_header->p_flags & PF_X) != 0)) { in Load() 1611 bool executable, in Load() argument 1615 DELEGATE_TO_IMPL(Load, file, executable, low_4gb, reservation, error_msg); in Load()
|
/art/test/testrunner/ |
D | run_build_test_target.py | 40 print("Using", sys.executable, sys.version, flush=True) 128 run_test_command = [sys.executable, # Use the same python as we are using now.
|
D | testrunner.py | 59 sys.stdout.write("\n\n" + sys.executable + " " + sys.version + "\n\n")
|
/art/test/ |
D | run_test_build.py | 126 def run(self, executable: pathlib.Path, args: List[Union[pathlib.Path, str]]): 127 assert isinstance(executable, pathlib.Path), executable 131 if executable.suffix == ".sh": 133 cmd += [executable]
|
D | README.md | 26 distributed together with the executable files.
|
D | run-test | 137 executable="/bin/bash",
|
D | Android.bp | 236 // be incompatible. The linker exports symbols from an executable that are 340 // Reduce test executable size by disabling automatic export of static lib symbols.
|
/art/tools/runtime_memusage/ |
D | README | 22 sanitizer_logcat_analysis.sh is the main executable that will use the other two 31 sanitizer_logcat_analysis.sh uses external executable development/scripts/stack.
|
/art/runtime/native/ |
D | java_lang_reflect_Executable.cc | 162 Handle<mirror::Method> executable = hs.NewHandle(soa.Decode<mirror::Method>(javaMethod)); in Executable_getParameters0() local 163 ArtMethod* art_method = executable.Get()->GetArtMethod(); in Executable_getParameters0() 221 self, name, modifiers, executable, parameter_index); in Executable_getParameters0()
|
/art/tools/luci/config/ |
D | main.star | 161 executable = luci.recipe(
|
/art/runtime/ |
D | art_method.cc | 108 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(jlr_method); in FromReflectedMethod() local 109 DCHECK(executable != nullptr); in FromReflectedMethod() 110 return executable->GetArtMethod(); in FromReflectedMethod()
|
D | reflection.cc | 709 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(javaMethod); in InvokeMethod() local 710 const bool accessible = executable->IsAccessible(); in InvokeMethod() 711 ArtMethod* m = executable->GetArtMethod(); in InvokeMethod()
|
D | Android.bp | 331 "mirror/executable.cc",
|
/art/runtime/gc/space/ |
D | image_space.h | 145 bool executable,
|
D | image_space.cc | 2233 bool executable, in BootImageLoader() argument 2244 executable_(executable), in BootImageLoader() 3307 bool executable, in LoadBootImage() argument 3334 executable, in LoadBootImage()
|
/art/build/boot/hiddenapi/ |
D | hiddenapi-max-target-o-low-priority.txt | 3158 Ljava/lang/reflect/Parameter;->executable:Ljava/lang/reflect/Executable;
|