HomeSort by relevance Sort by last modified time
    Searched full:shadow (Results 201 - 225 of 1600) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/compiler-rt/test/msan/
mmap_below_shadow.cc 1 // Test mmap behavior when map address is below shadow range.
17 // Hint address just below shadow.
msan_copy_shadow.cc 1 // Test that __msan_copy_shadow copies shadow, updates origin and does not touch
22 // Test that __msan_copy_shadow correctly updates shadow and origin of b[].
msan_print_shadow2.cc 25 // CHECK: Shadow map of [0x{{.*}}, 0x{{.*}}), 1 bytes:
30 // CHECK: Shadow map of [0x{{.*}}, 0x{{.*}}), 1 bytes:
35 // CHECK: Shadow map of [0x{{.*}}, 0x{{.*}}), 1 bytes:
40 // CHECK: Shadow map of [0x{{.*}}, 0x{{.*}}), 1 bytes:
45 // CHECK: Shadow map of [0x{{.*}}, 0x{{.*}}), 0 bytes:
47 // CHECK: Shadow map of [0x{{.*}}, 0x{{.*}}), 3 bytes:
  /external/libcap-ng/libcap-ng-0.7/utils/
captest.8 7 \fBcaptest\fP is a program that demonstrates and prints out the current process capabilities. Each option prints the same report. It will output current capabilities. then it will try to access /etc/shadow directly to show if that can be done. Then it creates a child process that attempts to read /etc/shadow and outputs the results of that. Then it outputs the capabilities that a child process would have.
  /external/skia/include/effects/
SkBlurDrawLooper.h 19 This class draws a shadow of the object (possibly offset), and then draws
21 should there be an option to just draw the shadow/blur layer? webkit?
  /external/vboot_reference/scripts/image_signing/
set_chronos_password.sh 22 sudo grep -Ev ^chronos: "$rootfs/etc/shadow" \
24 sudo mv -f "$temp_shadow" "$rootfs/etc/shadow"
  /frameworks/base/tools/layoutlib/bridge/src/android/view/
ViewGroup_Delegate.java 43 * Overrides the original drawChild call in ViewGroup to draw the shadow.
71 BufferedImage shadow = null; local
73 shadow = getPathShadow(outline, canvas, elevation);
75 if (shadow == null) {
78 Bitmap bitmap = Bitmap_Delegate.createBitmap(shadow, false,
106 // which were never taken. Ideally, we should hook up the shadow code in the same method so
  /external/llvm/lib/Transforms/Instrumentation/
DataFlowSanitizer.cpp 20 /// byte of application memory is backed by two bytes of shadow memory which
32 /// | shadow memory |
37 /// To derive a shadow memory address from an application memory address,
40 /// account for the double byte representation of shadow labels and move the
41 /// address into the shadow memory range. See the function
75 // External symbol to be used when generating the shadow address for
83 // the shadow load to have alignment 16. This flag is disabled by default as
91 // The ABI list files control how shadow parameters are passed. The pass treats
220 /// pass the return value shadow in a register, while WK_Custom uses an
221 /// extra pointer argument to return the shadow. This allows the wrappe
    [all...]
  /frameworks/base/docs/html/distribute/tools/promote/
device-art.jd 38 <input type="checkbox" id="output-shadow" checked="checked" class="form-field-checkbutton">
39 <label for="output-shadow">Shadow</label><br>
193 landRes: ['shadow', 'back', 'fore'],
195 portRes: ['shadow', 'back', 'fore'],
207 landRes: ['shadow', 'back', 'fore'],
209 portRes: ['shadow', 'back', 'fore'],
220 landRes: ['shadow', 'back', 'fore'],
222 portRes: ['shadow', 'back', 'fore'],
234 landRes: ['shadow', 'back', 'fore']
    [all...]
  /external/compiler-rt/lib/tsan/rtl/
tsan_rtl.cc 245 MmapFixedNoReserve(MemToShadow(addr), size * kShadowMultiplier, "shadow");
247 // Meta shadow is 2:1, so tread carefully.
257 MmapFixedNoReserve(meta_begin, meta_end - meta_begin, "meta shadow");
267 MmapFixedNoReserve(meta_begin, meta_end - meta_begin, "meta shadow");
270 VPrintf(2, "mapped meta shadow for (%p-%p) at (%p-%p)\n",
290 VPrintf(3, "checking shadow region %p-%p\n", beg, end);
298 VPrintf(3, " checking pointer %p: shadow=%p meta=%p\n", p, s, m);
538 Shadow LoadShadow(u64 *p) {
540 return Shadow(raw);
556 Shadow cur, Shadow old)
    [all...]
tsan_rtl.h 83 const u64 kShadowRodata = (u64)-1; // .rodata shadow marker
159 friend class Shadow;
168 // Shadow (from most significant bit):
176 class Shadow : public FastState {
178 explicit Shadow(u64 x)
182 explicit Shadow(const FastState &s)
218 static inline bool TidsAreEqual(const Shadow s1, const Shadow s2) {
225 bool Addr0AndSizeAreEqual(const Shadow s1, const Shadow s2)
    [all...]
  /art/runtime/interpreter/mterp/arm64/
header.S 21 handle invoke, allows higher-level code to create frame & shadow frame.
23 Once that's working, support direct entry code & eliminate shadow frame (and
27 base of the vreg array within the shadow frame. Access the other fields,
29 the shadow frame mechanism of double-storing object references - via xFP &
76 x25 xREFS base of object references in shadow frame (ideally, we'll get rid of this later).
94 /* During bringup, we'll use the shadow frame model instead of xFP */
109 * Instead of holding a pointer to the shadow frame, we keep xFP at the base of the vregs. So,
110 * to access other shadow frame fields, we need to use a backwards offset. Define those here.
123 * "export" the PC to dex_pc field in the shadow frame, f/b/o future exception objects. Must
278 add \reg, xFP, \vreg, lsl #2 /* WARNING: handle shadow frame vreg zero if store *
    [all...]
  /external/robolectric/v1/src/test/java/com/xtremelabs/robolectric/shadows/
ActivityTest.java 308 ShadowActivity shadow = shadowOf(activity); local
310 assertNull(shadow.getCurrentFocus());
312 shadow.setCurrentFocus(view);
313 assertEquals(view, shadow.getCurrentFocus());
437 ShadowActivity shadow = shadowOf(activity); local
438 shadow.recreate();
460 ShadowActivity shadow = shadowOf(activity); local
462 assertThat( shadow.getManagedCursors(), notNullValue() );
463 assertThat( shadow.getManagedCursors().size(), equalTo(0) );
468 assertThat( shadow.getManagedCursors(), notNullValue() )
    [all...]
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/layout/gle2/
ImageUtils.java 339 * Creates a drop shadow of a given image and returns a new image which shows the
340 * input image on top of its drop shadow.
346 * @param shadowSize the size of the shadow in pixels
347 * @param shadowOpacity the opacity of the shadow, with 0=transparent and 1=opaque
348 * @param shadowRgb the RGB int to use for the shadow color
349 * @return a new image with the source image on top of its shadow
451 * Draws a rectangular drop shadow (of size {@link #SHADOW_SIZE} by
456 * @return the source image with a drop shadow on the bottom and right
476 * Draws a drop shadow for the given rectangle into the given context. It
478 * determined by the assets used to draw the shadow graphics
    [all...]
  /art/runtime/interpreter/mterp/x86/
header.S 21 handle invoke, allows higher-level code to create frame & shadow frame.
23 Once that's working, support direct entry code & eliminate shadow frame (and
27 base of the vreg array within the shadow frame. Access the other fields,
29 the shadow frame mechanism of double-storing object references - via rFP &
74 rREFS ebp base of object references in shadow frame.
121 * Instead of holding a pointer to the shadow frame, we keep rFP at the base of the vregs. So,
122 * to access other shadow frame fields, we need to use a backwards offset. Define those here.
155 /* During bringup, we'll use the shadow frame model instead of rFP */
171 * "export" the PC to dex_pc field in the shadow frame, f/b/o future exception objects. Must
  /art/runtime/interpreter/mterp/x86_64/
header.S 21 handle invoke, allows higher-level code to create frame & shadow frame.
23 Once that's working, support direct entry code & eliminate shadow frame (and
27 base of the vreg array within the shadow frame. Access the other fields,
29 the shadow frame mechanism of double-storing object references - via rFP &
70 rREFS r15 base of object references in shadow frame.
117 * Instead of holding a pointer to the shadow frame, we keep rFP at the base of the vregs. So,
118 * to access other shadow frame fields, we need to use a backwards offset. Define those here.
155 /* During bringup, we'll use the shadow frame model instead of rFP */
172 * "export" the PC to dex_pc field in the shadow frame, f/b/o future exception objects. Must
  /external/compiler-rt/lib/asan/
asan_mapping.h 22 // Typical shadow mapping on Linux/x86_64 with SHADOW_OFFSET == 0x00007fff8000:
90 // Shadow mapping on FreeBSD/x86-64 with SHADOW_OFFSET == 0x400000000000:
97 // Shadow mapping on FreeBSD/i386 with SHADOW_OFFSET == 0x40000000:
170 #define SHADOW_TO_MEM(shadow) (((shadow) - SHADOW_OFFSET) << SHADOW_SCALE)
186 // With the zero shadow base we can not actually map pages starting from 0.
209 // If 1, all shadow boundaries are constants.
282 // In zero-based shadow mode we treat addresses near zero as addresses
283 // in shadow gap as well.
  /external/chromium-trace/catapult/third_party/mocha/
mocha.css 93 -webkit-box-shadow: inset 0 1px 1px rgba(0,0,0,.2);
94 -moz-box-shadow: inset 0 1px 1px rgba(0,0,0,.2);
95 box-shadow: inset 0 1px 1px rgba(0,0,0,.2);
157 -webkit-box-shadow: 0 1px 3px #eee;
159 -moz-box-shadow: 0 1px 3px #eee;
  /external/chromium-trace/catapult/third_party/polymer/components/web-animations-js/node_modules/mocha/
mocha.css 93 -webkit-box-shadow: inset 0 1px 1px rgba(0,0,0,.2);
94 -moz-box-shadow: inset 0 1px 1px rgba(0,0,0,.2);
95 box-shadow: inset 0 1px 1px rgba(0,0,0,.2);
157 -webkit-box-shadow: 0 1px 3px #eee;
159 -moz-box-shadow: 0 1px 3px #eee;
  /external/chromium-trace/catapult/tracing/third_party/mocha/
mocha.css 93 -webkit-box-shadow: inset 0 1px 1px rgba(0,0,0,.2);
94 -moz-box-shadow: inset 0 1px 1px rgba(0,0,0,.2);
95 box-shadow: inset 0 1px 1px rgba(0,0,0,.2);
157 -webkit-box-shadow: 0 1px 3px #eee;
159 -moz-box-shadow: 0 1px 3px #eee;
  /external/compiler-rt/include/sanitizer/
msan_interface.h 53 void __msan_partial_poison(const volatile void *data, void *shadow,
76 /* Print shadow and origin for the memory range to stderr in a human-readable
80 /* Print shadow for the memory range to stderr in a minimalistic
101 /* Update shadow for the application copy of size bytes from src to dst.
103 actual application memory, it only updates shadow and origin for such
  /external/llvm/test/Instrumentation/MemorySanitizer/AArch64/
vararg.ll 18 ; First check if the variadic shadow values are saved in stack with correct
30 ; Propagate the GR shadow values on for the va_list::__gp_top, adjust the
37 ; Propagate the VR shadow values on for the va_list::__vr_top, adjust the
44 ; Copy the remaining shadow values on the va_list::__stack position (it is
61 ; Save the incoming shadow value from the arguments in the __msan_va_arg_tls
  /external/toybox/lib/
password.c 100 * /etc/shadow, /etc/group and /etc/gshadow files,
111 char *filenamesfx = NULL, *namesfx = NULL, *shadow = NULL, local
117 shadow = strstr(filename, "shadow");
164 if (shadow) {
  /external/valgrind/exp-sgcheck/
h_main.c 467 shadow value computation.
483 When .kind is NonShad, .shadow may give the identity of the temp
484 currently holding the associated shadow value, or it may be
485 IRTemp_INVALID if code to compute the shadow has not yet been
488 When .kind is Shad tmp holds a shadow value, and so .shadow must be
489 IRTemp_INVALID, since it is illogical for a shadow tmp itself to be
499 IRTemp shadow; member in struct:__anon25864
514 current kind and possibly shadow temps for each temp in the
541 /* READONLY: the guest state size, so we can generate shadow
    [all...]
  /frameworks/base/docs/html-intl/intl/zh-cn/distribute/tools/promote/
device-art.jd 34 <input type="checkbox" id="output-shadow" checked="checked" class="form-field-checkbutton">
35 <label for="output-shadow">??</label><br>
175 landRes: ['shadow', 'back', 'fore'],
177 portRes: ['shadow', 'back', 'fore'],
188 landRes: ['shadow', 'back', 'fore'],
190 portRes: ['shadow', 'back', 'fore'],
202 landRes: ['shadow', 'back', 'fore'],
204 portRes: ['shadow', 'back', 'fore'],
216 landRes: ['shadow', 'back', 'fore'],
218 portRes: ['shadow', 'back', 'fore']
    [all...]

Completed in 843 milliseconds

1 2 3 4 5 6 7 891011>>