Lines Matching refs:cur_offset

415   bool CheckArrayData(uint32_t cur_offset);
422 bool CheckBranchTarget(uint32_t cur_offset);
426 bool CheckSwitchTargets(uint32_t cur_offset);
470 bool GetBranchOffset(uint32_t cur_offset, int32_t* pOffset, bool* pConditional,
1362 bool MethodVerifier<kVerifierDebug>::CheckArrayData(uint32_t cur_offset) { in CheckArrayData() argument
1364 const uint16_t* insns = code_item_accessor_.Insns() + cur_offset; in CheckArrayData()
1368 DCHECK_LT(cur_offset, insn_count); in CheckArrayData()
1371 if (UNLIKELY(static_cast<int32_t>(cur_offset) + array_data_offset < 0 || in CheckArrayData()
1372 cur_offset + array_data_offset + 2 >= insn_count)) { in CheckArrayData()
1373 Fail(VERIFY_ERROR_BAD_CLASS_HARD) << "invalid array data start: at " << cur_offset in CheckArrayData()
1382 Fail(VERIFY_ERROR_BAD_CLASS_HARD) << "unaligned array data table: at " << cur_offset in CheckArrayData()
1388 if (UNLIKELY(!GetInstructionFlags(cur_offset + array_data_offset).IsOpcode())) { in CheckArrayData()
1389 Fail(VERIFY_ERROR_BAD_CLASS_HARD) << "array data table at " << cur_offset in CheckArrayData()
1399 if (UNLIKELY(cur_offset + array_data_offset + table_size > insn_count)) { in CheckArrayData()
1400 Fail(VERIFY_ERROR_BAD_CLASS_HARD) << "invalid array data end: at " << cur_offset in CheckArrayData()
1402 << cur_offset + array_data_offset + table_size in CheckArrayData()
1410 bool MethodVerifier<kVerifierDebug>::CheckBranchTarget(uint32_t cur_offset) { in CheckBranchTarget() argument
1413 if (!GetBranchOffset(cur_offset, &offset, &isConditional, &selfOkay)) { in CheckBranchTarget()
1418 << reinterpret_cast<void*>(cur_offset); in CheckBranchTarget()
1423 if (UNLIKELY(((int64_t) cur_offset + (int64_t) offset) != (int64_t) (cur_offset + offset))) { in CheckBranchTarget()
1425 << reinterpret_cast<void*>(cur_offset) << " +" << offset; in CheckBranchTarget()
1428 int32_t abs_offset = cur_offset + offset; in CheckBranchTarget()
1434 << reinterpret_cast<void*>(cur_offset); in CheckBranchTarget()
1442 bool MethodVerifier<kVerifierDebug>::GetBranchOffset(uint32_t cur_offset, in GetBranchOffset() argument
1446 const uint16_t* insns = code_item_accessor_.Insns() + cur_offset; in GetBranchOffset()
1482 bool MethodVerifier<kVerifierDebug>::CheckSwitchTargets(uint32_t cur_offset) { in CheckSwitchTargets() argument
1484 DCHECK_LT(cur_offset, insn_count); in CheckSwitchTargets()
1485 const uint16_t* insns = code_item_accessor_.Insns() + cur_offset; in CheckSwitchTargets()
1488 if (UNLIKELY(static_cast<int32_t>(cur_offset) + switch_offset < 0 || in CheckSwitchTargets()
1489 cur_offset + switch_offset + 2 > insn_count)) { in CheckSwitchTargets()
1490 Fail(VERIFY_ERROR_BAD_CLASS_HARD) << "invalid switch start: at " << cur_offset in CheckSwitchTargets()
1499 Fail(VERIFY_ERROR_BAD_CLASS_HARD) << "unaligned switch table: at " << cur_offset in CheckSwitchTargets()
1505 if (UNLIKELY(!GetInstructionFlags(cur_offset + switch_offset).IsOpcode())) { in CheckSwitchTargets()
1506 Fail(VERIFY_ERROR_BAD_CLASS_HARD) << "switch table at " << cur_offset in CheckSwitchTargets()
1534 if (UNLIKELY(cur_offset + switch_offset + table_size > (uint32_t) insn_count)) { in CheckSwitchTargets()
1535 Fail(VERIFY_ERROR_BAD_CLASS_HARD) << "invalid switch end: at " << cur_offset in CheckSwitchTargets()
1537 << ", end " << (cur_offset + switch_offset + table_size) in CheckSwitchTargets()
1574 int32_t abs_offset = cur_offset + offset; in CheckSwitchTargets()
1580 << reinterpret_cast<void*>(cur_offset) in CheckSwitchTargets()