Lines Matching +full:0 +full:x2b0

11 0	string	dex\n
12 >0 regex dex\n[0-9]{2} Dalvik dex file
14 0 string dey\n
15 >0 regex dey\n[0-9]{2} Dalvik dex file (optimized for host)
22 0 string ANDROID! Android bootimg
24 >>1028 lelong 0 \b (boot)
26 >8 lelong >0 \b, kernel
27 >>12 lelong >0 \b (%#x)
28 >16 lelong >0 \b, ramdisk
29 >>20 lelong >0 \b (%#x)
30 >24 lelong >0 \b, second stage
31 >>28 lelong >0 \b (%#x)
32 >36 lelong >0 \b, page size: %d
33 >38 string >0 \b, name: %s
34 >64 string >0 \b, cmdline (%s)
40 # 0bacfd2ba68d21a68a3df345b830bc2a1e515b5a/services/java/com/\
50 0 string/b ANDROID\ BACKUP\n Android Backup
57 >15 string >\0 \b, version %s
59 >17 string 0\n \b, Not-Compressed
67 #>>>&0 ubequad x \b, content %#16.16llx...
69 #>>>&0 indirect x \b; contains
75 #>>>&0 indirect x
82 #>>>&1 string >\0 \b, PASSWORD salt: "%-128.128s"
94 #>>>0x204 ubyte 0x0a NL found
102 0 ulelong 0x12349876
104 >0x01C ulequad&0xFFFFFFFCFFFFFFFC =0x0000000000000000
109 >>>4 ulelong >0 \b; #1
110 >>>0x01C use PIT-entry
112 >>>0x0A0 use PIT-entry
114 >>>0x124 use PIT-entry
116 >>>0x1A8 use PIT-entry
118 >>>0x22C use PIT-entry
120 >>>0x2B0 use PIT-entry
122 >>>0x334 use PIT-entry
124 >>>0x3B8 use PIT-entry
126 >>>0x43C use PIT-entry
128 >>>0x4C0 use PIT-entry
130 >>>0x544 use PIT-entry
132 >>>0x5C8 use PIT-entry
134 >>>>0x64C use PIT-entry
137 >>>>0x6D0 use PIT-entry
139 >>>0x754 use PIT-entry
141 >>>0x7D8 use PIT-entry
143 >>>0x85C use PIT-entry
146 >>>0x8E0 use PIT-entry
148 0 name PIT-entry
150 >0x00 ulequad&0xFFFFFFFCFFFFFFFC =0x0000000000000000
152 >>0x24 ubyte !0
154 >>>0x24 string >\0 %-.32s
156 >>>0x0C ulelong&0x00000002 2 \b+RW
158 # 0~IPL,MOVINAND,GANG;1~PIT,GPT;2~HIDDEN;3~SBL,HIDDEN;4~SBL2,HIDDEN;5~BOOT;6~kernel,RECOVER,misc;7~…
160 >>>0x08 ulelong x (%#x)
162 >>>0x44 string >\0 "%-.64s"
163 #>>>0x18 ulelong >0
165 #>>>>0x18 ulelong x \b, %db
167 #>>>>0x22 ulelong x \b*%d
172 0 lelong 0xed26ff3a Android sparse image
181 # RES_XML_TYPE = 0x0003 followed by the size of the header (ResXMLTree_header),
184 0 lelong 0x00080003 Android binary XML
190 0 lelong 0xd0b5b1c4 Android cryptfs footer
197 0 string vdex Android vdex file,
200 >12 lelong >0 number of dex files: %d,
201 >16 lelong >0 verifier deps size: %d
207 0 string wdex Android vdex file, being processed by dex2oat,
210 >12 lelong >0 number of dex files: %d,
211 >16 lelong >0 verifier deps size: %d
214 0 string/t .class\x20
215 >&0 regex/512 \^\\.super\x20L.*;$ disassembled Android DEX Java class (smali/baksmali)
225 0 string pro\x00
226 >4 regex 0[0-9][0-9] Android ART profile
233 0 string prm\x00
234 >0 regex 0[0-9][0-9] Android ART profile metadata
243 # 00: resource table type = 0x0002 (2) + header size = 12 (2)
246 0 ulelong 0x000c0002 Android package resource table (ARSC)
249 # 12: string pool type = 0x0001 (2) + header size = 28 (2)
252 >12 ulelong 0x001c0001
253 >>20 ulelong !0 \b, %d string(s)
254 >>24 ulelong !0 \b, %d style(s)