Searched refs:flags (Results 26 - 50 of 90) sorted by last modified time

1234

/art/runtime/native/
H A Ddalvik_system_VMDebug.cc90 static void VMDebug_startMethodTracingDdmsImpl(JNIEnv*, jclass, jint bufferSize, jint flags, argument
92 Trace::Start("[DDMS]", -1, bufferSize, flags, Trace::TraceOutputMode::kDDMS,
98 jint javaFd, jint bufferSize, jint flags,
121 Trace::Start(traceFilename.c_str(), fd, bufferSize, flags, outputMode,
127 jint bufferSize, jint flags,
133 Trace::Start(traceFilename.c_str(), -1, bufferSize, flags, Trace::TraceOutputMode::kFile,
190 static void VMDebug_printLoadedClasses(JNIEnv* env, jclass, jint flags) { argument
203 DumpClassVisitor visitor(flags);
97 VMDebug_startMethodTracingFd(JNIEnv* env, jclass, jstring javaTraceFilename, jint javaFd, jint bufferSize, jint flags, jboolean samplingEnabled, jint intervalUs, jboolean streamingOutput) argument
126 VMDebug_startMethodTracingFilename(JNIEnv* env, jclass, jstring javaTraceFilename, jint bufferSize, jint flags, jboolean samplingEnabled, jint intervalUs) argument
/art/runtime/
H A Doat_file.cc1069 extinfo.flags = ANDROID_DLEXT_FORCE_LOAD | // Force-load, don't reuse handle
1075 extinfo.flags |= ANDROID_DLEXT_LOAD_AT_FIXED_ADDRESS; // Use the requested addr if
H A Druntime.cc921 // Start the JDWP thread. If the command-line debugger flags specified "suspend=y",
1362 // Change the implicit checks flags based on runtime architecture.
2007 void Runtime::VisitConcurrentRoots(RootVisitor* visitor, VisitRootFlags flags) { argument
2008 intern_table_->VisitRoots(visitor, flags);
2009 class_linker_->VisitRoots(visitor, flags);
2011 if ((flags & kVisitRootFlagNewRoots) == 0) {
2033 void Runtime::VisitNonConcurrentRoots(RootVisitor* visitor, VisitRootFlags flags) { argument
2034 VisitThreadRoots(visitor, flags);
2038 void Runtime::VisitThreadRoots(RootVisitor* visitor, VisitRootFlags flags) { argument
2039 thread_list_->VisitRoots(visitor, flags);
2042 VisitRoots(RootVisitor* visitor, VisitRootFlags flags) argument
[all...]
H A Druntime.h324 void VisitRoots(RootVisitor* visitor, VisitRootFlags flags = kVisitRootFlagAllRoots)
334 VisitRootFlags flags = kVisitRootFlagAllRoots)
615 bool AreExperimentalFlagsEnabled(ExperimentalFlags flags) { argument
616 return (experimental_flags_ & flags) != ExperimentalFlags::kNone;
797 void VisitThreadRoots(RootVisitor* visitor, VisitRootFlags flags)
801 void VisitNonConcurrentRoots(RootVisitor* visitor, VisitRootFlags flags)
964 // Implicit checks flags.
H A Druntime_common.cc142 void DumpX86Flags(std::ostream& os, uint32_t flags) const;
297 void UContext::DumpX86Flags(std::ostream& os, uint32_t flags) const {
299 if ((flags & (1 << 0)) != 0) {
302 if ((flags & (1 << 2)) != 0) {
305 if ((flags & (1 << 4)) != 0) {
308 if ((flags & (1 << 6)) != 0) {
311 if ((flags & (1 << 7)) != 0) {
314 if ((flags & (1 << 8)) != 0) {
317 if ((flags & (1 << 9)) != 0) {
320 if ((flags
[all...]
H A Druntime_stats.h67 void Clear(int flags) { argument
68 if ((flags & KIND_ALLOCATED_OBJECTS) != 0) {
71 if ((flags & KIND_ALLOCATED_BYTES) != 0) {
74 if ((flags & KIND_FREED_OBJECTS) != 0) {
77 if ((flags & KIND_FREED_BYTES) != 0) {
80 if ((flags & KIND_GC_INVOCATIONS) != 0) {
83 if ((flags & KIND_CLASS_INIT_COUNT) != 0) {
86 if ((flags & KIND_CLASS_INIT_TIME) != 0) {
H A Dthread-inl.h188 if (UNLIKELY((old_state_and_flags.as_struct.flags & kCheckpointRequest) != 0)) {
192 if (UNLIKELY((old_state_and_flags.as_struct.flags & kEmptyCheckpointRequest) != 0)) {
196 // Change the state but keep the current flags (kCheckpointRequest is clear).
197 DCHECK_EQ((old_state_and_flags.as_struct.flags & kCheckpointRequest), 0);
198 DCHECK_EQ((old_state_and_flags.as_struct.flags & kEmptyCheckpointRequest), 0);
199 new_state_and_flags.as_struct.flags = old_state_and_flags.as_struct.flags;
214 uint16_t current_flags = tls32_.state_and_flags.as_struct.flags;
248 if (LIKELY(old_state_and_flags.as_struct.flags == 0)) {
262 } else if ((old_state_and_flags.as_struct.flags
[all...]
H A Dthread.cc1250 uint16_t flags = kSuspendRequest; local
1264 flags |= kActiveSuspendBarrier;
1283 tls32_.state_and_flags.as_atomic_int.FetchAndBitwiseOrSequentiallyConsistent(flags);
1394 new_state_and_flags.as_struct.flags |= kCheckpointRequest;
1423 new_state_and_flags.as_struct.flags |= kEmptyCheckpointRequest;
1687 << " flags=" << thread->tls32_.state_and_flags.as_struct.flags
2107 tls32_.state_and_flags.as_struct.flags = 0;
3810 void Thread::VisitRoots(RootVisitor* visitor, VisitRootFlags flags) { argument
3811 if ((flags
[all...]
H A Dthread.h253 (state_and_flags.as_struct.flags & kSuspendRequest) != 0;
630 void VisitRoots(RootVisitor* visitor, VisitRootFlags flags)
1105 return (tls32_.state_and_flags.as_struct.flags & flag) != 0;
1109 return (tls32_.state_and_flags.as_struct.flags != 0);
1403 // 32 bits of atomically changed state and flags. Keeping as 32 bits allows and atomic CAS to
1410 volatile uint16_t flags; variable
H A Dthread_list.cc1543 void ThreadList::VisitRoots(RootVisitor* visitor, VisitRootFlags flags) const {
1546 thread->VisitRoots(visitor, flags);
H A Dthread_list.h165 void VisitRoots(RootVisitor* visitor, VisitRootFlags flags) const
H A Dtrace.cc322 void Trace::Start(const char* trace_filename, int trace_fd, size_t buffer_size, int flags, argument
360 // Enable count of allocs if specified in the flags.
374 enable_stats = (flags && kTraceCountAllocs) != 0;
375 the_trace_ = new Trace(trace_file.release(), trace_filename, buffer_size, flags, output_mode,
551 // Enable count of allocs if specified in the flags.
598 Trace::Trace(File* trace_file, const char* trace_name, size_t buffer_size, int flags, argument
602 flags_(flags), trace_output_mode_(output_mode), trace_mode_(trace_mode),
H A Dtrace.h118 static void Start(const char* trace_filename, int trace_fd, size_t buffer_size, int flags,
215 Trace(File* trace_file, const char* trace_name, size_t buffer_size, int flags,
H A Dzip_archive.cc211 int flags = fcntl(fd, F_GETFD); local
212 if (flags == -1) {
216 int rc = fcntl(fd, F_SETFD, flags | FD_CLOEXEC);
218 PLOG(WARNING) << "fcntl(" << fd << ", F_SETFD, " << flags << ") failed"; local
/art/runtime/verifier/
H A Dmethod_verifier.cc80 void PcToRegisterLineTable::Init(RegisterTrackingMode mode, InstructionFlags* flags, argument
89 interesting = flags[i].IsOpcode();
92 interesting = flags[i].IsCompileTimeInfoPoint() || flags[i].IsBranchTarget();
95 interesting = flags[i].IsBranchTarget();
705 // Abstract methods are not allowed to have the following flags.
1829 /* all flags are clear */
1835 // "changed" flags, we need to load the set of registers from the table.
2006 * The behavior can be determined from the opcode flags.
3884 // See if the method type implied by the invoke instruction matches the access flags fo
[all...]
H A Dmethod_verifier.h77 void Init(RegisterTrackingMode mode, InstructionFlags* flags, uint32_t insns_size,
147 // Dump the state of the verifier, namely each instruction, what flags are set on it, register
342 * Set the "in try" flags for all instructions protected by "try" statements. Also sets the
343 * "branch target" flags for exception handlers.
363 * As a side effect, this sets the "branch target" flags in InsnFlags.
537 * addresses. Does not set or clear any other flags in "insn_flags_".
722 const uint32_t method_access_flags_; // Method's access flags.
732 // Instruction widths and flags, one entry per code unit.
801 // the flags in the dex file. Some older code does not mark methods named "<init>" and "<clinit>"
/art/test/099-vmdebug/src/
H A DMain.java335 public static void startMethodTracing(String filename, int bufferSize, int flags, argument
337 startMethodTracingMethod.invoke(null, filename, bufferSize, flags, samplingEnabled,
/art/dex2oat/
H A Ddex2oat_image_test.cc327 uint32_t flags = ProfileCompilationInfo::MethodHotness::kFlagHot |
330 static_cast<ProfileCompilationInfo::MethodHotness::Flag>(flags),
/art/dexdump/
H A Ddexdump.cc211 * Returns a quoted string representing the access flags.
235 * Creates a new string with human-readable access flags.
240 static char* createAccessFlagStr(u4 flags, AccessFor forWhat) { argument
306 const int count = countOnes(flags);
312 if (flags & 0x01) {
321 flags >>= 1;
1194 static void dumpCode(const DexFile* pDexFile, u4 idx, u4 flags, argument
1213 bool is_static = (flags & kAccStatic) != 0;
1223 static void dumpMethod(const DexFile* pDexFile, u4 idx, u4 flags, argument
1226 if (gOptions.exportsOnly && (flags
1329 dumpSField(const DexFile* pDexFile, u4 idx, u4 flags, int i, const u1** data) argument
1376 dumpIField(const DexFile* pDexFile, u4 idx, u4 flags, int i) argument
[all...]
/art/dexlayout/
H A Ddexlayout.cc132 * Returns a quoted string representing the access flags.
156 * Creates a new string with human-readable access flags.
160 static char* CreateAccessFlagStr(uint32_t flags, AccessFor for_what) { argument
226 const int count = CountOnes(flags);
232 if (flags & 0x01) {
241 flags >>= 1;
1179 void DexLayout::DumpMethod(uint32_t idx, uint32_t flags, const dex_ir::CodeItem* code, int i) { argument
1181 if (options_.exports_only_ && (flags & (kAccPublic | kAccProtected)) == 0) {
1189 char* access_str = CreateAccessFlagStr(flags, kAccessForMethod);
1195 fprintf(out_file_, " access : 0x%04x (%s)\n", flags, access_st
1289 DumpSField(uint32_t idx, uint32_t flags, int i, dex_ir::EncodedValue* init) argument
1336 DumpIField(uint32_t idx, uint32_t flags, int i) argument
[all...]
H A Ddexlayout.h151 void DumpIField(uint32_t idx, uint32_t flags, int i);
159 void DumpMethod(uint32_t idx, uint32_t flags, const dex_ir::CodeItem* code, int i);
161 void DumpSField(uint32_t idx, uint32_t flags, int i, dex_ir::EncodedValue* init);
H A Ddexlayout_test.cc347 uint8_t flags = 0u; local
350 flags |= ProfileCompilationInfo::MethodHotness::kFlagHot;
353 flags |= ProfileCompilationInfo::MethodHotness::kFlagStartup;
356 pfi.AddMethodIndex(static_cast<ProfileCompilationInfo::MethodHotness::Flag>(flags),
/art/dexlist/
H A Ddexlist.cc98 const char* fileName, u4 idx, u4 flags ATTRIBUTE_UNUSED,
/art/dt_fd_forward/
H A Ddt_fd_forward.cc464 pkt_->type.cmd.flags = ReadByte();
469 } else if ((pkt_->type.reply.flags & JDWPTRANSPORT_FLAGS_REPLY) == JDWPTRANSPORT_FLAGS_REPLY) {
582 PushByte(pkt_->type.cmd.flags);
583 if ((pkt_->type.reply.flags & JDWPTRANSPORT_FLAGS_REPLY) == JDWPTRANSPORT_FLAGS_REPLY) {
/art/imgdiag/
H A Dimgdiag.cc1155 if ((map->flags & PROT_WRITE) != 0) {
1543 *error_msg = StringPrintf("Failed to read the page flags from %s",

Completed in 248 milliseconds

1234