Home
last modified time | relevance | path

Searched refs:executable (Results 1 – 16 of 16) sorted by relevance

/art/runtime/
Doat_file.h105 bool executable,
114 bool executable, in Open() argument
121 executable, in Open()
131 bool executable, in Open() argument
137 executable, in Open()
151 bool executable,
387 OatFile(const std::string& filename, bool executable);
Doat_file.cc113 bool executable,
126 bool executable,
133 OatFileBase(const std::string& filename, bool executable) : OatFile(filename, executable) {} in OatFileBase() argument
153 bool executable,
160 bool executable,
201 bool executable, in OpenOatFile() argument
206 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(location, executable)); in OpenOatFile()
212 executable, in OpenOatFile()
243 bool executable, in OpenOatFile() argument
248 std::unique_ptr<OatFileBase> ret(new kOatFileBaseSubType(oat_location, executable)); in OpenOatFile()
[all …]
Doat_file_assistant.cc827 bool executable = oat_file_assistant_->load_executable_; in GetFile() local
829 executable = false; in GetFile()
864 if (executable && oat_file_assistant_->only_load_trusted_executable_) { in GetFile()
865 executable = LocationIsTrusted(filename_, /*trust_art_apex_data_files=*/ true); in GetFile()
867 VLOG(oat) << "Loading " << filename_ << " with executable: " << executable; in GetFile()
876 executable, in GetFile()
886 executable, in GetFile()
897 VLOG(oat) << "Successfully loaded " << filename_ << " with executable: " << executable; in GetFile()
Delf_file.h58 bool executable,
Delf_file_impl.h121 bool executable,
Delf_file.cc1095 bool executable, in Load() argument
1101 if (executable) { in Load()
1184 if (executable && ((program_header->p_flags & PF_X) != 0)) { in Load()
1596 bool executable, in Load() argument
1600 DELEGATE_TO_IMPL(Load, file, executable, low_4gb, reservation, error_msg); in Load()
Dart_method.cc109 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(jlr_method); in FromReflectedMethod() local
110 DCHECK(executable != nullptr); in FromReflectedMethod()
111 return executable->GetArtMethod(); in FromReflectedMethod()
Dreflection.cc706 ObjPtr<mirror::Executable> executable = soa.Decode<mirror::Executable>(javaMethod); in InvokeMethod() local
707 const bool accessible = executable->IsAccessible(); in InvokeMethod()
708 ArtMethod* m = executable->GetArtMethod(); in InvokeMethod()
DAndroid.bp173 "mirror/executable.cc",
/art/tools/runtime_memusage/
DREADME22 sanitizer_logcat_analysis.sh is the main executable that will use the other two
31 sanitizer_logcat_analysis.sh uses external executable development/scripts/stack.
/art/runtime/native/
Djava_lang_reflect_Executable.cc162 Handle<mirror::Method> executable = hs.NewHandle(soa.Decode<mirror::Method>(javaMethod)); in Executable_getParameters0() local
163 ArtMethod* art_method = executable.Get()->GetArtMethod(); in Executable_getParameters0()
236 PointerToLowMemUInt32(executable.Get()), in Executable_getParameters0()
/art/runtime/gc/space/
Dimage_space.h130 bool executable,
Dimage_space.cc2235 bool executable) in BootImageLoader() argument
2241 executable_(executable), in BootImageLoader()
3170 bool executable, in LoadBootImage() argument
3191 executable); in LoadBootImage()
/art/test/
DREADME.md26 distributed together with the executable files.
/art/test/testrunner/
Dtestrunner.py59 sys.stdout.write("\n\n" + sys.executable + " " + sys.version + "\n\n")
/art/build/boot/hiddenapi/
Dhiddenapi-max-target-o-low-priority.txt3159 Ljava/lang/reflect/Parameter;->executable:Ljava/lang/reflect/Executable;