/art/runtime/native/ |
H A D | dalvik_system_VMDebug.cc | 90 static void VMDebug_startMethodTracingDdmsImpl(JNIEnv*, jclass, jint bufferSize, jint flags, argument 92 Trace::Start("[DDMS]", -1, bufferSize, flags, Trace::TraceOutputMode::kDDMS, 98 jint javaFd, jint bufferSize, jint flags, 121 Trace::Start(traceFilename.c_str(), fd, bufferSize, flags, outputMode, 127 jint bufferSize, jint flags, 133 Trace::Start(traceFilename.c_str(), -1, bufferSize, flags, Trace::TraceOutputMode::kFile, 190 static void VMDebug_printLoadedClasses(JNIEnv* env, jclass, jint flags) { argument 203 DumpClassVisitor visitor(flags); 97 VMDebug_startMethodTracingFd(JNIEnv* env, jclass, jstring javaTraceFilename, jint javaFd, jint bufferSize, jint flags, jboolean samplingEnabled, jint intervalUs, jboolean streamingOutput) argument 126 VMDebug_startMethodTracingFilename(JNIEnv* env, jclass, jstring javaTraceFilename, jint bufferSize, jint flags, jboolean samplingEnabled, jint intervalUs) argument
|
/art/runtime/ |
H A D | oat_file.cc | 1069 extinfo.flags = ANDROID_DLEXT_FORCE_LOAD | // Force-load, don't reuse handle 1075 extinfo.flags |= ANDROID_DLEXT_LOAD_AT_FIXED_ADDRESS; // Use the requested addr if
|
H A D | runtime.cc | 921 // Start the JDWP thread. If the command-line debugger flags specified "suspend=y", 1362 // Change the implicit checks flags based on runtime architecture. 2007 void Runtime::VisitConcurrentRoots(RootVisitor* visitor, VisitRootFlags flags) { argument 2008 intern_table_->VisitRoots(visitor, flags); 2009 class_linker_->VisitRoots(visitor, flags); 2011 if ((flags & kVisitRootFlagNewRoots) == 0) { 2033 void Runtime::VisitNonConcurrentRoots(RootVisitor* visitor, VisitRootFlags flags) { argument 2034 VisitThreadRoots(visitor, flags); 2038 void Runtime::VisitThreadRoots(RootVisitor* visitor, VisitRootFlags flags) { argument 2039 thread_list_->VisitRoots(visitor, flags); 2042 VisitRoots(RootVisitor* visitor, VisitRootFlags flags) argument [all...] |
H A D | runtime.h | 324 void VisitRoots(RootVisitor* visitor, VisitRootFlags flags = kVisitRootFlagAllRoots) 334 VisitRootFlags flags = kVisitRootFlagAllRoots) 615 bool AreExperimentalFlagsEnabled(ExperimentalFlags flags) { argument 616 return (experimental_flags_ & flags) != ExperimentalFlags::kNone; 797 void VisitThreadRoots(RootVisitor* visitor, VisitRootFlags flags) 801 void VisitNonConcurrentRoots(RootVisitor* visitor, VisitRootFlags flags) 964 // Implicit checks flags.
|
H A D | runtime_common.cc | 142 void DumpX86Flags(std::ostream& os, uint32_t flags) const; 297 void UContext::DumpX86Flags(std::ostream& os, uint32_t flags) const { 299 if ((flags & (1 << 0)) != 0) { 302 if ((flags & (1 << 2)) != 0) { 305 if ((flags & (1 << 4)) != 0) { 308 if ((flags & (1 << 6)) != 0) { 311 if ((flags & (1 << 7)) != 0) { 314 if ((flags & (1 << 8)) != 0) { 317 if ((flags & (1 << 9)) != 0) { 320 if ((flags [all...] |
H A D | runtime_stats.h | 67 void Clear(int flags) { argument 68 if ((flags & KIND_ALLOCATED_OBJECTS) != 0) { 71 if ((flags & KIND_ALLOCATED_BYTES) != 0) { 74 if ((flags & KIND_FREED_OBJECTS) != 0) { 77 if ((flags & KIND_FREED_BYTES) != 0) { 80 if ((flags & KIND_GC_INVOCATIONS) != 0) { 83 if ((flags & KIND_CLASS_INIT_COUNT) != 0) { 86 if ((flags & KIND_CLASS_INIT_TIME) != 0) {
|
H A D | thread-inl.h | 188 if (UNLIKELY((old_state_and_flags.as_struct.flags & kCheckpointRequest) != 0)) { 192 if (UNLIKELY((old_state_and_flags.as_struct.flags & kEmptyCheckpointRequest) != 0)) { 196 // Change the state but keep the current flags (kCheckpointRequest is clear). 197 DCHECK_EQ((old_state_and_flags.as_struct.flags & kCheckpointRequest), 0); 198 DCHECK_EQ((old_state_and_flags.as_struct.flags & kEmptyCheckpointRequest), 0); 199 new_state_and_flags.as_struct.flags = old_state_and_flags.as_struct.flags; 214 uint16_t current_flags = tls32_.state_and_flags.as_struct.flags; 248 if (LIKELY(old_state_and_flags.as_struct.flags == 0)) { 262 } else if ((old_state_and_flags.as_struct.flags [all...] |
H A D | thread.cc | 1250 uint16_t flags = kSuspendRequest; local 1264 flags |= kActiveSuspendBarrier; 1283 tls32_.state_and_flags.as_atomic_int.FetchAndBitwiseOrSequentiallyConsistent(flags); 1394 new_state_and_flags.as_struct.flags |= kCheckpointRequest; 1423 new_state_and_flags.as_struct.flags |= kEmptyCheckpointRequest; 1687 << " flags=" << thread->tls32_.state_and_flags.as_struct.flags 2107 tls32_.state_and_flags.as_struct.flags = 0; 3810 void Thread::VisitRoots(RootVisitor* visitor, VisitRootFlags flags) { argument 3811 if ((flags [all...] |
H A D | thread.h | 253 (state_and_flags.as_struct.flags & kSuspendRequest) != 0; 630 void VisitRoots(RootVisitor* visitor, VisitRootFlags flags) 1105 return (tls32_.state_and_flags.as_struct.flags & flag) != 0; 1109 return (tls32_.state_and_flags.as_struct.flags != 0); 1403 // 32 bits of atomically changed state and flags. Keeping as 32 bits allows and atomic CAS to 1410 volatile uint16_t flags; variable
|
H A D | thread_list.cc | 1543 void ThreadList::VisitRoots(RootVisitor* visitor, VisitRootFlags flags) const { 1546 thread->VisitRoots(visitor, flags);
|
H A D | thread_list.h | 165 void VisitRoots(RootVisitor* visitor, VisitRootFlags flags) const
|
H A D | trace.cc | 322 void Trace::Start(const char* trace_filename, int trace_fd, size_t buffer_size, int flags, argument 360 // Enable count of allocs if specified in the flags. 374 enable_stats = (flags && kTraceCountAllocs) != 0; 375 the_trace_ = new Trace(trace_file.release(), trace_filename, buffer_size, flags, output_mode, 551 // Enable count of allocs if specified in the flags. 598 Trace::Trace(File* trace_file, const char* trace_name, size_t buffer_size, int flags, argument 602 flags_(flags), trace_output_mode_(output_mode), trace_mode_(trace_mode),
|
H A D | trace.h | 118 static void Start(const char* trace_filename, int trace_fd, size_t buffer_size, int flags, 215 Trace(File* trace_file, const char* trace_name, size_t buffer_size, int flags,
|
H A D | zip_archive.cc | 211 int flags = fcntl(fd, F_GETFD); local 212 if (flags == -1) { 216 int rc = fcntl(fd, F_SETFD, flags | FD_CLOEXEC); 218 PLOG(WARNING) << "fcntl(" << fd << ", F_SETFD, " << flags << ") failed"; local
|
/art/runtime/verifier/ |
H A D | method_verifier.cc | 80 void PcToRegisterLineTable::Init(RegisterTrackingMode mode, InstructionFlags* flags, argument 89 interesting = flags[i].IsOpcode(); 92 interesting = flags[i].IsCompileTimeInfoPoint() || flags[i].IsBranchTarget(); 95 interesting = flags[i].IsBranchTarget(); 705 // Abstract methods are not allowed to have the following flags. 1829 /* all flags are clear */ 1835 // "changed" flags, we need to load the set of registers from the table. 2006 * The behavior can be determined from the opcode flags. 3884 // See if the method type implied by the invoke instruction matches the access flags fo [all...] |
H A D | method_verifier.h | 77 void Init(RegisterTrackingMode mode, InstructionFlags* flags, uint32_t insns_size, 147 // Dump the state of the verifier, namely each instruction, what flags are set on it, register 342 * Set the "in try" flags for all instructions protected by "try" statements. Also sets the 343 * "branch target" flags for exception handlers. 363 * As a side effect, this sets the "branch target" flags in InsnFlags. 537 * addresses. Does not set or clear any other flags in "insn_flags_". 722 const uint32_t method_access_flags_; // Method's access flags. 732 // Instruction widths and flags, one entry per code unit. 801 // the flags in the dex file. Some older code does not mark methods named "<init>" and "<clinit>"
|
/art/test/099-vmdebug/src/ |
H A D | Main.java | 335 public static void startMethodTracing(String filename, int bufferSize, int flags, argument 337 startMethodTracingMethod.invoke(null, filename, bufferSize, flags, samplingEnabled,
|
/art/dex2oat/ |
H A D | dex2oat_image_test.cc | 327 uint32_t flags = ProfileCompilationInfo::MethodHotness::kFlagHot | 330 static_cast<ProfileCompilationInfo::MethodHotness::Flag>(flags),
|
/art/dexdump/ |
H A D | dexdump.cc | 211 * Returns a quoted string representing the access flags. 235 * Creates a new string with human-readable access flags. 240 static char* createAccessFlagStr(u4 flags, AccessFor forWhat) { argument 306 const int count = countOnes(flags); 312 if (flags & 0x01) { 321 flags >>= 1; 1194 static void dumpCode(const DexFile* pDexFile, u4 idx, u4 flags, argument 1213 bool is_static = (flags & kAccStatic) != 0; 1223 static void dumpMethod(const DexFile* pDexFile, u4 idx, u4 flags, argument 1226 if (gOptions.exportsOnly && (flags 1329 dumpSField(const DexFile* pDexFile, u4 idx, u4 flags, int i, const u1** data) argument 1376 dumpIField(const DexFile* pDexFile, u4 idx, u4 flags, int i) argument [all...] |
/art/dexlayout/ |
H A D | dexlayout.cc | 132 * Returns a quoted string representing the access flags. 156 * Creates a new string with human-readable access flags. 160 static char* CreateAccessFlagStr(uint32_t flags, AccessFor for_what) { argument 226 const int count = CountOnes(flags); 232 if (flags & 0x01) { 241 flags >>= 1; 1179 void DexLayout::DumpMethod(uint32_t idx, uint32_t flags, const dex_ir::CodeItem* code, int i) { argument 1181 if (options_.exports_only_ && (flags & (kAccPublic | kAccProtected)) == 0) { 1189 char* access_str = CreateAccessFlagStr(flags, kAccessForMethod); 1195 fprintf(out_file_, " access : 0x%04x (%s)\n", flags, access_st 1289 DumpSField(uint32_t idx, uint32_t flags, int i, dex_ir::EncodedValue* init) argument 1336 DumpIField(uint32_t idx, uint32_t flags, int i) argument [all...] |
H A D | dexlayout.h | 151 void DumpIField(uint32_t idx, uint32_t flags, int i); 159 void DumpMethod(uint32_t idx, uint32_t flags, const dex_ir::CodeItem* code, int i); 161 void DumpSField(uint32_t idx, uint32_t flags, int i, dex_ir::EncodedValue* init);
|
H A D | dexlayout_test.cc | 347 uint8_t flags = 0u; local 350 flags |= ProfileCompilationInfo::MethodHotness::kFlagHot; 353 flags |= ProfileCompilationInfo::MethodHotness::kFlagStartup; 356 pfi.AddMethodIndex(static_cast<ProfileCompilationInfo::MethodHotness::Flag>(flags),
|
/art/dexlist/ |
H A D | dexlist.cc | 98 const char* fileName, u4 idx, u4 flags ATTRIBUTE_UNUSED,
|
/art/dt_fd_forward/ |
H A D | dt_fd_forward.cc | 464 pkt_->type.cmd.flags = ReadByte(); 469 } else if ((pkt_->type.reply.flags & JDWPTRANSPORT_FLAGS_REPLY) == JDWPTRANSPORT_FLAGS_REPLY) { 582 PushByte(pkt_->type.cmd.flags); 583 if ((pkt_->type.reply.flags & JDWPTRANSPORT_FLAGS_REPLY) == JDWPTRANSPORT_FLAGS_REPLY) {
|
/art/imgdiag/ |
H A D | imgdiag.cc | 1155 if ((map->flags & PROT_WRITE) != 0) { 1543 *error_msg = StringPrintf("Failed to read the page flags from %s",
|