/aosp12/hardware/google/apf/ |
H A D | disassembler.c | 80 const uint8_t bytecode = program[pc++]; in apf_disassemble() local 81 const uint32_t opcode = EXTRACT_OPCODE(bytecode); in apf_disassemble() 83 const uint32_t reg_num = EXTRACT_REGISTER(bytecode); in apf_disassemble() 85 const uint32_t len_field = EXTRACT_IMM_LENGTH(bytecode); in apf_disassemble()
|
H A D | apf_interpreter.c | 97 const uint8_t bytecode = program[pc++]; in accept_packet() local 98 const uint32_t opcode = EXTRACT_OPCODE(bytecode); in accept_packet() 99 const uint32_t reg_num = EXTRACT_REGISTER(bytecode); in accept_packet() 103 const uint32_t len_field = EXTRACT_IMM_LENGTH(bytecode); in accept_packet()
|
/aosp12/packages/modules/NetworkStack/src/android/net/apf/ |
H A D | ApfGenerator.java | 225 private int writeValue(int value, byte[] bytecode, int writingOffset) { in writeValue() argument 227 bytecode[writingOffset++] = (byte)((value >> (i * 8)) & 255); in writeValue() 235 void generate(byte[] bytecode) throws IllegalInstructionException { in generate() argument 240 bytecode[writingOffset++] = generateInstructionByte(); in generate() 242 writingOffset = writeValue(calculateTargetLabelOffset(), bytecode, writingOffset); in generate() 245 writingOffset = writeValue(mImm, bytecode, writingOffset); in generate() 248 System.arraycopy(mCompareBytes, 0, bytecode, writingOffset, mCompareBytes.length); in generate() 931 byte[] bytecode = new byte[total_size]; in generate() 933 instruction.generate(bytecode); in generate() 935 return bytecode; in generate()
|
/aosp12/frameworks/base/tools/lock_agent/ |
H A D | agent.cpp | 109 bool Visit(Bytecode* bytecode) override { in transform() 110 if (bytecode->opcode == OP_MONITOR_ENTER) { in transform() 111 insertHook(bytecode, true, in transform() 112 reinterpret_cast<VReg*>(bytecode->operands[0])->reg); in transform() 115 if (bytecode->opcode == OP_MONITOR_EXIT) { in transform() 116 insertHook(bytecode, false, in transform() 117 reinterpret_cast<VReg*>(bytecode->operands[0])->reg); in transform()
|
/aosp12/system/netd/server/ |
H A D | SockDiag.cpp | 483 struct bytecode { in destroySocketsLackingPermission() struct 487 } __attribute__((packed)) bytecode; in destroySocketsLackingPermission() local 494 constexpr uint8_t bytecodelen = sizeof(bytecode); in destroySocketsLackingPermission() 496 bytecode = (struct bytecode) { in destroySocketsLackingPermission() 525 { &bytecode, bytecodelen }, in destroySocketsLackingPermission()
|
/aosp12/art/tools/jvmti-agents/titrace/ |
H A D | titrace.cc | 154 MethodBytecode& bytecode = LookupBytecode(jvmti_env, method); in OnSingleStep() local 160 CHECK_LE(actual_location, bytecode.bytecode_.Size()); in OnSingleStep() 161 RecordInstruction(bytecode.bytecode_.GetMemory() + actual_location); in OnSingleStep()
|
H A D | README.md | 3 Titrace is a bytecode instruction tracing tool that uses JVMTI and works on both ART and the RI.
|
/aosp12/art/test/422-instanceof/ |
H A D | info.txt | 1 Tests for instanceof bytecode.
|
/aosp12/art/test/952-invoke-custom/ |
H A D | info.txt | 1 Tests the invoke-custom bytecode.
|
/aosp12/art/test/112-double-math/ |
H A D | info.txt | 1 This checks the neg_double bytecode.
|
/aosp12/art/test/088-monitor-verification/ |
H A D | info.txt | 2 lock checks in the bytecode verifier.
|
/aosp12/art/test/080-oom-throw/ |
H A D | info.txt | 3 the interpreter and re-execute the bytecode.
|
/aosp12/art/test/2034-spaces-in-SimpleName/ |
H A D | info.txt | 3 This test uses ASM Java bytecode generator to generate a simple class with
|
/aosp12/art/test/ |
H A D | README.md | 4 * _ART run-tests_: Tests of the ART runtime using Dex bytecode (mostly written 10 ART run-tests are tests exercising the runtime using Dex bytecode. They are 12 (compiled/assembled as Dex bytecode) and sometimes native code (written as C/C++ 15 [ASM](https://asm.ow2.io/) bytecode manipulation tool. Run-tests are
|
/aosp12/system/extras/ioshark/ |
H A D | README | 9 device) is the tester that takes as input the bytecode files (*.wl 16 the host where the script runs, compiles and packages up the bytecode
|
/aosp12/art/test/727-checker-unresolved-class/jasmin/ |
H A D | GetPackagePrivateSubclassOfUnresolvedClass2FromSamePackage.j | 15 .bytecode 49.0
|
H A D | GetPublicSubclassOfUnresolvedClass2FromSamePackage.j | 15 .bytecode 49.0
|
/aosp12/art/test/031-class-attributes/jasmin/ |
H A D | ClassAttrs$1.j | 25 .bytecode 52.0
|
/aosp12/art/test/800-smali/smali/ |
H A D | sameFieldNames.smali | 5 # (Invalid in Java language but valid in bytecode.)
|
/aosp12/frameworks/compile/libbcc/tests/debuginfo/ |
H A D | README | 10 Host tests use clang to build bytecode (bc) files, which are then executed
|
/aosp12/frameworks/layoutlib/create/ |
H A D | README.txt | 32 - modifies some of the classes directly using some bytecode manipulation, 38 The ASM library is used to do the bytecode modification using its visitor pattern API. 250 Understanding bytecode:
|
/aosp12/art/runtime/interpreter/mterp/ |
H A D | README.txt | 71 transitioning from one Dalvik bytecode to the next. Mterp for ARM targets
|
/aosp12/art/tools/dexfuzz/ |
H A D | README | 124 Each bytecode mutation has a chance out of 100% of firing. Following is the listing
|
/aosp12/hardware/interfaces/wifi/1.0/ |
H A D | IWifiStaIface.hal | 33 * bytecode executed by the firmware. 150 * APF functionality, instructions and bytecode/binary format is described in:
|
/aosp12/frameworks/base/tools/aapt2/integration-tests/CommandTests/ |
H A D | android-28.jar | META-INF/
META-INF/MANIFEST.MF
javax/
javax/net/
javax/ ... |