/external/compiler-rt/test/msan/ |
mmap_below_shadow.cc | 1 // Test mmap behavior when map address is below shadow range. 17 // Hint address just below shadow.
|
msan_copy_shadow.cc | 1 // Test that __msan_copy_shadow copies shadow, updates origin and does not touch 22 // Test that __msan_copy_shadow correctly updates shadow and origin of b[].
|
msan_print_shadow2.cc | 25 // CHECK: Shadow map of [0x{{.*}}, 0x{{.*}}), 1 bytes: 30 // CHECK: Shadow map of [0x{{.*}}, 0x{{.*}}), 1 bytes: 35 // CHECK: Shadow map of [0x{{.*}}, 0x{{.*}}), 1 bytes: 40 // CHECK: Shadow map of [0x{{.*}}, 0x{{.*}}), 1 bytes: 45 // CHECK: Shadow map of [0x{{.*}}, 0x{{.*}}), 0 bytes: 47 // CHECK: Shadow map of [0x{{.*}}, 0x{{.*}}), 3 bytes:
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
captest.8 | 7 \fBcaptest\fP is a program that demonstrates and prints out the current process capabilities. Each option prints the same report. It will output current capabilities. then it will try to access /etc/shadow directly to show if that can be done. Then it creates a child process that attempts to read /etc/shadow and outputs the results of that. Then it outputs the capabilities that a child process would have.
|
/external/skia/include/effects/ |
SkBlurDrawLooper.h | 19 This class draws a shadow of the object (possibly offset), and then draws 21 should there be an option to just draw the shadow/blur layer? webkit?
|
/external/vboot_reference/scripts/image_signing/ |
set_chronos_password.sh | 22 sudo grep -Ev ^chronos: "$rootfs/etc/shadow" \ 24 sudo mv -f "$temp_shadow" "$rootfs/etc/shadow"
|
/frameworks/base/tools/layoutlib/bridge/src/android/view/ |
ViewGroup_Delegate.java | 43 * Overrides the original drawChild call in ViewGroup to draw the shadow. 71 BufferedImage shadow = null; local 73 shadow = getPathShadow(outline, canvas, elevation); 75 if (shadow == null) { 78 Bitmap bitmap = Bitmap_Delegate.createBitmap(shadow, false, 106 // which were never taken. Ideally, we should hook up the shadow code in the same method so
|
/external/llvm/lib/Transforms/Instrumentation/ |
DataFlowSanitizer.cpp | 20 /// byte of application memory is backed by two bytes of shadow memory which 32 /// | shadow memory | 37 /// To derive a shadow memory address from an application memory address, 40 /// account for the double byte representation of shadow labels and move the 41 /// address into the shadow memory range. See the function 75 // External symbol to be used when generating the shadow address for 83 // the shadow load to have alignment 16. This flag is disabled by default as 91 // The ABI list files control how shadow parameters are passed. The pass treats 220 /// pass the return value shadow in a register, while WK_Custom uses an 221 /// extra pointer argument to return the shadow. This allows the wrappe [all...] |
/frameworks/base/docs/html/distribute/tools/promote/ |
device-art.jd | 38 <input type="checkbox" id="output-shadow" checked="checked" class="form-field-checkbutton"> 39 <label for="output-shadow">Shadow</label><br> 193 landRes: ['shadow', 'back', 'fore'], 195 portRes: ['shadow', 'back', 'fore'], 207 landRes: ['shadow', 'back', 'fore'], 209 portRes: ['shadow', 'back', 'fore'], 220 landRes: ['shadow', 'back', 'fore'], 222 portRes: ['shadow', 'back', 'fore'], 234 landRes: ['shadow', 'back', 'fore'] [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_rtl.cc | 245 MmapFixedNoReserve(MemToShadow(addr), size * kShadowMultiplier, "shadow"); 247 // Meta shadow is 2:1, so tread carefully. 257 MmapFixedNoReserve(meta_begin, meta_end - meta_begin, "meta shadow"); 267 MmapFixedNoReserve(meta_begin, meta_end - meta_begin, "meta shadow"); 270 VPrintf(2, "mapped meta shadow for (%p-%p) at (%p-%p)\n", 290 VPrintf(3, "checking shadow region %p-%p\n", beg, end); 298 VPrintf(3, " checking pointer %p: shadow=%p meta=%p\n", p, s, m); 538 Shadow LoadShadow(u64 *p) { 540 return Shadow(raw); 556 Shadow cur, Shadow old) [all...] |
tsan_rtl.h | 83 const u64 kShadowRodata = (u64)-1; // .rodata shadow marker 159 friend class Shadow; 168 // Shadow (from most significant bit): 176 class Shadow : public FastState { 178 explicit Shadow(u64 x) 182 explicit Shadow(const FastState &s) 218 static inline bool TidsAreEqual(const Shadow s1, const Shadow s2) { 225 bool Addr0AndSizeAreEqual(const Shadow s1, const Shadow s2) [all...] |
/art/runtime/interpreter/mterp/arm64/ |
header.S | 21 handle invoke, allows higher-level code to create frame & shadow frame. 23 Once that's working, support direct entry code & eliminate shadow frame (and 27 base of the vreg array within the shadow frame. Access the other fields, 29 the shadow frame mechanism of double-storing object references - via xFP & 76 x25 xREFS base of object references in shadow frame (ideally, we'll get rid of this later). 94 /* During bringup, we'll use the shadow frame model instead of xFP */ 109 * Instead of holding a pointer to the shadow frame, we keep xFP at the base of the vregs. So, 110 * to access other shadow frame fields, we need to use a backwards offset. Define those here. 123 * "export" the PC to dex_pc field in the shadow frame, f/b/o future exception objects. Must 278 add \reg, xFP, \vreg, lsl #2 /* WARNING: handle shadow frame vreg zero if store * [all...] |
/external/robolectric/v1/src/test/java/com/xtremelabs/robolectric/shadows/ |
ActivityTest.java | 308 ShadowActivity shadow = shadowOf(activity); local 310 assertNull(shadow.getCurrentFocus()); 312 shadow.setCurrentFocus(view); 313 assertEquals(view, shadow.getCurrentFocus()); 437 ShadowActivity shadow = shadowOf(activity); local 438 shadow.recreate(); 460 ShadowActivity shadow = shadowOf(activity); local 462 assertThat( shadow.getManagedCursors(), notNullValue() ); 463 assertThat( shadow.getManagedCursors().size(), equalTo(0) ); 468 assertThat( shadow.getManagedCursors(), notNullValue() ) [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/editors/layout/gle2/ |
ImageUtils.java | 339 * Creates a drop shadow of a given image and returns a new image which shows the 340 * input image on top of its drop shadow. 346 * @param shadowSize the size of the shadow in pixels 347 * @param shadowOpacity the opacity of the shadow, with 0=transparent and 1=opaque 348 * @param shadowRgb the RGB int to use for the shadow color 349 * @return a new image with the source image on top of its shadow 451 * Draws a rectangular drop shadow (of size {@link #SHADOW_SIZE} by 456 * @return the source image with a drop shadow on the bottom and right 476 * Draws a drop shadow for the given rectangle into the given context. It 478 * determined by the assets used to draw the shadow graphics [all...] |
/art/runtime/interpreter/mterp/x86/ |
header.S | 21 handle invoke, allows higher-level code to create frame & shadow frame. 23 Once that's working, support direct entry code & eliminate shadow frame (and 27 base of the vreg array within the shadow frame. Access the other fields, 29 the shadow frame mechanism of double-storing object references - via rFP & 74 rREFS ebp base of object references in shadow frame. 121 * Instead of holding a pointer to the shadow frame, we keep rFP at the base of the vregs. So, 122 * to access other shadow frame fields, we need to use a backwards offset. Define those here. 155 /* During bringup, we'll use the shadow frame model instead of rFP */ 171 * "export" the PC to dex_pc field in the shadow frame, f/b/o future exception objects. Must
|
/art/runtime/interpreter/mterp/x86_64/ |
header.S | 21 handle invoke, allows higher-level code to create frame & shadow frame. 23 Once that's working, support direct entry code & eliminate shadow frame (and 27 base of the vreg array within the shadow frame. Access the other fields, 29 the shadow frame mechanism of double-storing object references - via rFP & 70 rREFS r15 base of object references in shadow frame. 117 * Instead of holding a pointer to the shadow frame, we keep rFP at the base of the vregs. So, 118 * to access other shadow frame fields, we need to use a backwards offset. Define those here. 155 /* During bringup, we'll use the shadow frame model instead of rFP */ 172 * "export" the PC to dex_pc field in the shadow frame, f/b/o future exception objects. Must
|
/external/compiler-rt/lib/asan/ |
asan_mapping.h | 22 // Typical shadow mapping on Linux/x86_64 with SHADOW_OFFSET == 0x00007fff8000: 90 // Shadow mapping on FreeBSD/x86-64 with SHADOW_OFFSET == 0x400000000000: 97 // Shadow mapping on FreeBSD/i386 with SHADOW_OFFSET == 0x40000000: 170 #define SHADOW_TO_MEM(shadow) (((shadow) - SHADOW_OFFSET) << SHADOW_SCALE) 186 // With the zero shadow base we can not actually map pages starting from 0. 209 // If 1, all shadow boundaries are constants. 282 // In zero-based shadow mode we treat addresses near zero as addresses 283 // in shadow gap as well.
|
/external/chromium-trace/catapult/third_party/mocha/ |
mocha.css | 93 -webkit-box-shadow: inset 0 1px 1px rgba(0,0,0,.2); 94 -moz-box-shadow: inset 0 1px 1px rgba(0,0,0,.2); 95 box-shadow: inset 0 1px 1px rgba(0,0,0,.2); 157 -webkit-box-shadow: 0 1px 3px #eee; 159 -moz-box-shadow: 0 1px 3px #eee;
|
/external/chromium-trace/catapult/third_party/polymer/components/web-animations-js/node_modules/mocha/ |
mocha.css | 93 -webkit-box-shadow: inset 0 1px 1px rgba(0,0,0,.2); 94 -moz-box-shadow: inset 0 1px 1px rgba(0,0,0,.2); 95 box-shadow: inset 0 1px 1px rgba(0,0,0,.2); 157 -webkit-box-shadow: 0 1px 3px #eee; 159 -moz-box-shadow: 0 1px 3px #eee;
|
/external/chromium-trace/catapult/tracing/third_party/mocha/ |
mocha.css | 93 -webkit-box-shadow: inset 0 1px 1px rgba(0,0,0,.2); 94 -moz-box-shadow: inset 0 1px 1px rgba(0,0,0,.2); 95 box-shadow: inset 0 1px 1px rgba(0,0,0,.2); 157 -webkit-box-shadow: 0 1px 3px #eee; 159 -moz-box-shadow: 0 1px 3px #eee;
|
/external/compiler-rt/include/sanitizer/ |
msan_interface.h | 53 void __msan_partial_poison(const volatile void *data, void *shadow, 76 /* Print shadow and origin for the memory range to stderr in a human-readable 80 /* Print shadow for the memory range to stderr in a minimalistic 101 /* Update shadow for the application copy of size bytes from src to dst. 103 actual application memory, it only updates shadow and origin for such
|
/external/llvm/test/Instrumentation/MemorySanitizer/AArch64/ |
vararg.ll | 18 ; First check if the variadic shadow values are saved in stack with correct 30 ; Propagate the GR shadow values on for the va_list::__gp_top, adjust the 37 ; Propagate the VR shadow values on for the va_list::__vr_top, adjust the 44 ; Copy the remaining shadow values on the va_list::__stack position (it is 61 ; Save the incoming shadow value from the arguments in the __msan_va_arg_tls
|
/external/toybox/lib/ |
password.c | 100 * /etc/shadow, /etc/group and /etc/gshadow files, 111 char *filenamesfx = NULL, *namesfx = NULL, *shadow = NULL, local 117 shadow = strstr(filename, "shadow"); 164 if (shadow) {
|
/external/valgrind/exp-sgcheck/ |
h_main.c | 467 shadow value computation. 483 When .kind is NonShad, .shadow may give the identity of the temp 484 currently holding the associated shadow value, or it may be 485 IRTemp_INVALID if code to compute the shadow has not yet been 488 When .kind is Shad tmp holds a shadow value, and so .shadow must be 489 IRTemp_INVALID, since it is illogical for a shadow tmp itself to be 499 IRTemp shadow; member in struct:__anon25864 514 current kind and possibly shadow temps for each temp in the 541 /* READONLY: the guest state size, so we can generate shadow [all...] |
/frameworks/base/docs/html-intl/intl/zh-cn/distribute/tools/promote/ |
device-art.jd | 34 <input type="checkbox" id="output-shadow" checked="checked" class="form-field-checkbutton"> 35 <label for="output-shadow">??</label><br> 175 landRes: ['shadow', 'back', 'fore'], 177 portRes: ['shadow', 'back', 'fore'], 188 landRes: ['shadow', 'back', 'fore'], 190 portRes: ['shadow', 'back', 'fore'], 202 landRes: ['shadow', 'back', 'fore'], 204 portRes: ['shadow', 'back', 'fore'], 216 landRes: ['shadow', 'back', 'fore'], 218 portRes: ['shadow', 'back', 'fore'] [all...] |