Lines Matching refs:image

58 #include "image-inl.h"
359 CHECK(!heap->HasBootImageSpace()) << "Runtime has image. We should use it.";
362 // Use the pointer size from the runtime since we are probably creating the image.
365 *error_msg = StringPrintf("Invalid image pointer size: %zu", image_pointer_size_);
535 // We need to set up the generic trampolines since we don't have an image.
883 // Set image methods' entry point to interpreter.
944 *error_msg = StringPrintf("Invalid image pointer size: %zu", image_pointer_size_);
948 // Only the Aot compiler supports having an image with a different pointer size than the
952 *error_msg = StringPrintf("Runtime must use current image pointer size: %zu vs %zu",
988 // Make sure that all methods in this image do not contain those trampolines as
1161 // Must be in image space for non-miranda method.
1163 << resolved_types << " is not in image starting at "
1178 // Must be in image space for non-miranda method.
1180 << resolved_methods << " is not in image starting at "
1240 // Add image classes into the class table for the class loader, and fixup the dex caches and
1245 // rely on clobering the dex cache arrays in the image to forward to bss.
1259 // Reject application image since we cannot forward only some of the dex cache arrays.
1351 // The image space is not yet added to the heap, avoid read barriers.
1353 // There may also be boot image classes,
1356 // Update the class loader from the one in the image class loader to the one that loaded
1357 // the app image.
1379 if (VLOG_IS_ON(image)) {
1380 VLOG(image) << PrettyClass(klass) << " " << klass->GetStatus();
1382 VLOG(image) << "From " << klass->GetDexCache()->GetDexFile()->GetBaseLocation();
1384 VLOG(image) << "Direct methods";
1386 VLOG(image) << PrettyMethod(&m);
1388 VLOG(image) << "Virtual methods";
1390 VLOG(image) << PrettyMethod(&m);
1401 // The image space is not yet added to the heap, avoid read barriers.
1467 // classes in the image space.
1484 << "String dex cache array for " << PrettyClass(klass) << " is not in app image";
1583 // Check that the image is what we are expecting.
1585 *error_msg = StringPrintf("Application image pointer size does not match runtime: %zu vs %zu",
1597 // Check against existing class roots to make sure they match the ones in the boot image.
1600 *error_msg = "App image class roots must have pointer equality with runtime ones.";
1607 "image";
1637 // TODO: Store image class loaders as image roots.
1662 // Check that the class loader resolves the same way as the ones in the image.
1663 // Image class loader [A][B][C][image dex files]
1664 // Class loader = [???][dex_elements][image dex files]
1678 *error_msg = StringPrintf("Failed to flatten image class loader hierarchy '%s'",
1697 // Ignore the number of image dex files since we are adding those to the class loader anyways.
1711 VLOG(image) << "Image dex files " << image_dex_file_names.size();
1713 VLOG(image) << name->ToModifiedUtf8();
1715 VLOG(image) << "Loader dex files " << loader_dex_file_names.size();
1717 VLOG(image) << name->ToModifiedUtf8();
1719 *error_msg = "Rejecting application image due to class loader mismatch";
1766 VLOG(image) << "Adding class table classes took " << PrettyDuration(NanoTime() - start_time2);
1789 // In this case, madvise away the dex cache arrays section of the image to reduce RAM usage and
1799 VLOG(image) << "Released and protected dex cache array image section from "
1815 VLOG(class_linker) << "Adding image space took " << PrettyDuration(NanoTime() - start_time);
1875 // We deliberately ignore the class roots in the image since we
1876 // handle image roots by using the MS/CMS rescanning of dirty cards.
1881 // mapped image.
2796 // On the other hand, keep all AOT code from the boot image, since the
2802 // Boot image classes may be AOT-compiled as non-debuggable.
3578 // Check a class loaded with the system class loader matches one in the image if the class
3579 // is in the image.
3642 // Searching the image dex files/caches failed, we don't want to get into this situation
3643 // often as map searches are faster, so after kMaxFailedDexCacheLookups move all image
3677 ScopedAssertNoThreadSuspension ants(self, "Moving image classes to class table");
4003 // kAccSkipAccessChecks flag when compiling image classes, the flag is recorded
4004 // in the image and is set when loading the image.
4027 // we are not compiling the image or if the class we're verifying is not part of
4035 // We are compiling an app (not the image).
4044 // In case we run without an image there won't be a backing oat file.
4049 // We may be running with a preopted oat file but without image. In this case,
4052 // We need to trust image classes, as these might be coming out of a pre-opted, quickened boot
4053 // image (that we just failed loading), and the verifier can't be run on quickened opcodes when
5203 // Check a class loaded with the system class loader matches one in the image if the class
5204 // is in the image.
5927 // The image pointer size.
8176 // TODO: Should we scan the image?