/art/runtime/ |
D | oat_file.h | 105 bool executable, 114 bool executable, in Open() argument 121 executable, in Open() 131 bool executable, in Open() argument 137 executable, in Open() 151 bool executable, 387 OatFile(const std::string& filename, bool executable);
|
D | oat_file.cc | 113 bool executable, 126 bool executable, 133 OatFileBase(const std::string& filename, bool executable) : OatFile(filename, executable) {} in OatFileBase() argument 153 bool executable, 160 bool executable, 201 bool executable, in OpenOatFile() argument 206 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(location, executable)); in OpenOatFile() 212 executable, in OpenOatFile() 243 bool executable, in OpenOatFile() argument 248 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(oat_location, executable)); in OpenOatFile() [all …]
|
D | oat_file_assistant.cc | 827 bool executable = oat_file_assistant_->load_executable_; in GetFile() local 829 executable = false; in GetFile() 864 if (executable && oat_file_assistant_->only_load_trusted_executable_) { in GetFile() 865 executable = LocationIsTrusted(filename_, /*trust_art_apex_data_files=*/ true); in GetFile() 867 VLOG(oat) << "Loading " << filename_ << " with executable: " << executable; in GetFile() 876 executable, in GetFile() 886 executable, in GetFile() 897 VLOG(oat) << "Successfully loaded " << filename_ << " with executable: " << executable; in GetFile()
|
D | elf_file.h | 58 bool executable,
|
D | elf_file_impl.h | 121 bool executable,
|
D | elf_file.cc | 1095 bool executable, in Load() argument 1101 if (executable) { in Load() 1184 if (executable && ((program_header->p_flags & PF_X) != 0)) { in Load() 1596 bool executable, in Load() argument 1600 DELEGATE_TO_IMPL(Load, file, executable, low_4gb, reservation, error_msg); in Load()
|
D | art_method.cc | 109 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(jlr_method); in FromReflectedMethod() local 110 DCHECK(executable != nullptr); in FromReflectedMethod() 111 return executable->GetArtMethod(); in FromReflectedMethod()
|
D | reflection.cc | 706 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(javaMethod); in InvokeMethod() local 707 const bool accessible = executable->IsAccessible(); in InvokeMethod() 708 ArtMethod* m = executable->GetArtMethod(); in InvokeMethod()
|
D | Android.bp | 173 "mirror/executable.cc",
|
/art/tools/runtime_memusage/ |
D | README | 22 sanitizer_logcat_analysis.sh is the main executable that will use the other two 31 sanitizer_logcat_analysis.sh uses external executable development/scripts/stack.
|
/art/runtime/native/ |
D | java_lang_reflect_Executable.cc | 162 Handle<mirror::Method> executable = hs.NewHandle(soa.Decode<mirror::Method>(javaMethod)); in Executable_getParameters0() local 163 ArtMethod* art_method = executable.Get()->GetArtMethod(); in Executable_getParameters0() 236 PointerToLowMemUInt32(executable.Get()), in Executable_getParameters0()
|
/art/runtime/gc/space/ |
D | image_space.h | 130 bool executable,
|
D | image_space.cc | 2235 bool executable) in BootImageLoader() argument 2241 executable_(executable), in BootImageLoader() 3170 bool executable, in LoadBootImage() argument 3191 executable); in LoadBootImage()
|
/art/test/ |
D | README.md | 26 distributed together with the executable files.
|
/art/test/testrunner/ |
D | testrunner.py | 59 sys.stdout.write("\n\n" + sys.executable + " " + sys.version + "\n\n")
|
/art/build/boot/hiddenapi/ |
D | hiddenapi-max-target-o-low-priority.txt | 3159 Ljava/lang/reflect/Parameter;->executable:Ljava/lang/reflect/Executable;
|