Home
last modified time | relevance | path

Searched refs:bytecode (Results 1 – 25 of 31) sorted by relevance

12

/aosp12/hardware/google/apf/
H A Ddisassembler.c80 const uint8_t bytecode = program[pc++]; in apf_disassemble() local
81 const uint32_t opcode = EXTRACT_OPCODE(bytecode); in apf_disassemble()
83 const uint32_t reg_num = EXTRACT_REGISTER(bytecode); in apf_disassemble()
85 const uint32_t len_field = EXTRACT_IMM_LENGTH(bytecode); in apf_disassemble()
H A Dapf_interpreter.c97 const uint8_t bytecode = program[pc++]; in accept_packet() local
98 const uint32_t opcode = EXTRACT_OPCODE(bytecode); in accept_packet()
99 const uint32_t reg_num = EXTRACT_REGISTER(bytecode); in accept_packet()
103 const uint32_t len_field = EXTRACT_IMM_LENGTH(bytecode); in accept_packet()
/aosp12/packages/modules/NetworkStack/src/android/net/apf/
H A DApfGenerator.java225 private int writeValue(int value, byte[] bytecode, int writingOffset) { in writeValue() argument
227 bytecode[writingOffset++] = (byte)((value >> (i * 8)) & 255); in writeValue()
235 void generate(byte[] bytecode) throws IllegalInstructionException { in generate() argument
240 bytecode[writingOffset++] = generateInstructionByte(); in generate()
242 writingOffset = writeValue(calculateTargetLabelOffset(), bytecode, writingOffset); in generate()
245 writingOffset = writeValue(mImm, bytecode, writingOffset); in generate()
248 System.arraycopy(mCompareBytes, 0, bytecode, writingOffset, mCompareBytes.length); in generate()
931 byte[] bytecode = new byte[total_size]; in generate()
933 instruction.generate(bytecode); in generate()
935 return bytecode; in generate()
/aosp12/frameworks/base/tools/lock_agent/
H A Dagent.cpp109 bool Visit(Bytecode* bytecode) override { in transform()
110 if (bytecode->opcode == OP_MONITOR_ENTER) { in transform()
111 insertHook(bytecode, true, in transform()
112 reinterpret_cast<VReg*>(bytecode->operands[0])->reg); in transform()
115 if (bytecode->opcode == OP_MONITOR_EXIT) { in transform()
116 insertHook(bytecode, false, in transform()
117 reinterpret_cast<VReg*>(bytecode->operands[0])->reg); in transform()
/aosp12/system/netd/server/
H A DSockDiag.cpp483 struct bytecode { in destroySocketsLackingPermission() struct
487 } __attribute__((packed)) bytecode; in destroySocketsLackingPermission() local
494 constexpr uint8_t bytecodelen = sizeof(bytecode); in destroySocketsLackingPermission()
496 bytecode = (struct bytecode) { in destroySocketsLackingPermission()
525 { &bytecode, bytecodelen }, in destroySocketsLackingPermission()
/aosp12/art/tools/jvmti-agents/titrace/
H A Dtitrace.cc154 MethodBytecode& bytecode = LookupBytecode(jvmti_env, method); in OnSingleStep() local
160 CHECK_LE(actual_location, bytecode.bytecode_.Size()); in OnSingleStep()
161 RecordInstruction(bytecode.bytecode_.GetMemory() + actual_location); in OnSingleStep()
H A DREADME.md3 Titrace is a bytecode instruction tracing tool that uses JVMTI and works on both ART and the RI.
/aosp12/art/test/422-instanceof/
H A Dinfo.txt1 Tests for instanceof bytecode.
/aosp12/art/test/952-invoke-custom/
H A Dinfo.txt1 Tests the invoke-custom bytecode.
/aosp12/art/test/112-double-math/
H A Dinfo.txt1 This checks the neg_double bytecode.
/aosp12/art/test/088-monitor-verification/
H A Dinfo.txt2 lock checks in the bytecode verifier.
/aosp12/art/test/080-oom-throw/
H A Dinfo.txt3 the interpreter and re-execute the bytecode.
/aosp12/art/test/2034-spaces-in-SimpleName/
H A Dinfo.txt3 This test uses ASM Java bytecode generator to generate a simple class with
/aosp12/art/test/
H A DREADME.md4 * _ART run-tests_: Tests of the ART runtime using Dex bytecode (mostly written
10 ART run-tests are tests exercising the runtime using Dex bytecode. They are
12 (compiled/assembled as Dex bytecode) and sometimes native code (written as C/C++
15 [ASM](https://asm.ow2.io/) bytecode manipulation tool. Run-tests are
/aosp12/system/extras/ioshark/
H A DREADME9 device) is the tester that takes as input the bytecode files (*.wl
16 the host where the script runs, compiles and packages up the bytecode
/aosp12/art/test/727-checker-unresolved-class/jasmin/
H A DGetPackagePrivateSubclassOfUnresolvedClass2FromSamePackage.j15 .bytecode 49.0
H A DGetPublicSubclassOfUnresolvedClass2FromSamePackage.j15 .bytecode 49.0
/aosp12/art/test/031-class-attributes/jasmin/
H A DClassAttrs$1.j25 .bytecode 52.0
/aosp12/art/test/800-smali/smali/
H A DsameFieldNames.smali5 # (Invalid in Java language but valid in bytecode.)
/aosp12/frameworks/compile/libbcc/tests/debuginfo/
H A DREADME10 Host tests use clang to build bytecode (bc) files, which are then executed
/aosp12/frameworks/layoutlib/create/
H A DREADME.txt32 - modifies some of the classes directly using some bytecode manipulation,
38 The ASM library is used to do the bytecode modification using its visitor pattern API.
250 Understanding bytecode:
/aosp12/art/runtime/interpreter/mterp/
H A DREADME.txt71 transitioning from one Dalvik bytecode to the next. Mterp for ARM targets
/aosp12/art/tools/dexfuzz/
H A DREADME124 Each bytecode mutation has a chance out of 100% of firing. Following is the listing
/aosp12/hardware/interfaces/wifi/1.0/
H A DIWifiStaIface.hal33 * bytecode executed by the firmware.
150 * APF functionality, instructions and bytecode/binary format is described in:
/aosp12/frameworks/base/tools/aapt2/integration-tests/CommandTests/
H A Dandroid-28.jarMETA-INF/ META-INF/MANIFEST.MF javax/ javax/net/ javax/ ...

12