/external/google-breakpad/src/processor/ |
D | stackwalker_mips.cc | 219 uint32_t caller_pc, caller_sp, caller_fp; in GetCallerByStackScan() local 228 int count = kMaxFrameStackSize / sizeof(caller_pc); in GetCallerByStackScan() 237 last_sp += kMinArgsOnStack * sizeof(caller_pc); in GetCallerByStackScan() 245 if (!ScanForReturnAddress(last_sp, &caller_sp, &caller_pc, count)) { in GetCallerByStackScan() 252 if (!memory_->GetMemoryAtAddress(caller_sp - sizeof(caller_pc), in GetCallerByStackScan() 258 count = count - (caller_sp - last_sp) / sizeof(caller_pc); in GetCallerByStackScan() 260 last_sp = caller_sp + sizeof(caller_pc); in GetCallerByStackScan() 271 caller_sp += sizeof(caller_pc); in GetCallerByStackScan() 275 caller_pc -= 2 * sizeof(caller_pc); in GetCallerByStackScan() 283 frame->context.epc = caller_pc; in GetCallerByStackScan() [all …]
|
D | stackwalker_arm64.cc | 158 uint64_t caller_sp, caller_pc; in GetCallerByStackScan() local 160 if (!ScanForReturnAddress(last_sp, &caller_sp, &caller_pc, in GetCallerByStackScan() 177 frame->context.iregs[MD_CONTEXT_ARM64_REG_PC] = caller_pc; in GetCallerByStackScan()
|
D | stackwalker_arm.cc | 167 uint32_t caller_sp, caller_pc; in GetCallerByStackScan() local 169 if (!ScanForReturnAddress(last_sp, &caller_sp, &caller_pc, in GetCallerByStackScan() 186 frame->context.iregs[MD_CONTEXT_ARM_REG_PC] = caller_pc; in GetCallerByStackScan()
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_coverage_mapping_libcdep.cc | 64 void CovUpdateMapping(const char *coverage_dir, uptr caller_pc) { in CovUpdateMapping() argument 69 if (!cached_mapping.NeedsUpdate(caller_pc)) in CovUpdateMapping() 86 if (caller_pc && caller_pc >= start && caller_pc < end) in CovUpdateMapping()
|
D | sanitizer_coverage_libcdep.cc | 105 uptr caller_pc); 122 void UpdateModuleNameVec(uptr caller_pc, uptr range_beg, uptr range_end); 187 void CovUpdateMapping(const char *path, uptr caller_pc = 0); 360 void CoverageData::UpdateModuleNameVec(uptr caller_pc, uptr range_beg, in UpdateModuleNameVec() argument 365 const char *module_name = sym->GetModuleNameForPc(caller_pc); in UpdateModuleNameVec() 376 uptr caller_pc) { in InitializeGuards() argument 387 UpdateModuleNameVec(caller_pc, range_beg, range_end); in InitializeGuards()
|
/external/compiler-rt/lib/lsan/ |
D | lsan_common_linux.cc | 119 uptr caller_pc = 0; in ProcessPlatformSpecificAllocationsCb() local 121 caller_pc = GetCallerPC(stack_id, param->stack_depot_reverse_map); in ProcessPlatformSpecificAllocationsCb() 124 if (caller_pc == 0 || (param->skip_linker_allocations && in ProcessPlatformSpecificAllocationsCb() 125 linker->containsAddress(caller_pc))) { in ProcessPlatformSpecificAllocationsCb()
|
/external/compiler-rt/lib/tsan/rtl/ |
D | tsan_interface_java.cc | 63 const uptr caller_pc = GET_CALLER_PC(); \ 66 ScopedJavaFunc scoped(thr, caller_pc); \ 230 Acquire(thr, caller_pc, addr); in __tsan_java_acquire() 240 Release(thr, caller_pc, addr); in __tsan_java_release() 250 ReleaseStore(thr, caller_pc, addr); in __tsan_java_release_store()
|
D | tsan_interceptors.h | 25 const uptr caller_pc = GET_CALLER_PC(); \ 26 ScopedInterceptor si(thr, #func, caller_pc); \
|
D | tsan_interface_ann.cc | 53 const uptr caller_pc = (uptr)__builtin_return_address(0); \ 56 ScopedAnnotation sa(thr, __func__, f, l, caller_pc); \
|
D | tsan_interceptors.cc | 2125 const uptr caller_pc; member 2176 TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \ 2182 TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \
|
/external/compiler-rt/include/sanitizer/ |
D | dfsan_interface.h | 100 void dfsan_weak_hook_memcmp(void *caller_pc, const void *s1, const void *s2, 103 void dfsan_weak_hook_strncmp(void *caller_pc, const char *s1, const char *s2,
|
/external/llvm/lib/Fuzzer/ |
D | FuzzerTraceState.cpp | 533 void dfsan_weak_hook_memcmp(void *caller_pc, const void *s1, const void *s2, in dfsan_weak_hook_memcmp() argument 543 void dfsan_weak_hook_strncmp(void *caller_pc, const char *s1, const char *s2, in dfsan_weak_hook_strncmp() argument 555 void dfsan_weak_hook_strcmp(void *caller_pc, const char *s1, const char *s2, in dfsan_weak_hook_strcmp() argument 574 void __sanitizer_weak_hook_memcmp(void *caller_pc, const void *s1, in __sanitizer_weak_hook_memcmp() argument 583 void __sanitizer_weak_hook_strncmp(void *caller_pc, const char *s1, in __sanitizer_weak_hook_strncmp() argument 596 void __sanitizer_weak_hook_strcmp(void *caller_pc, const char *s1, in __sanitizer_weak_hook_strcmp() argument
|
/external/autotest/client/profilers/lockmeter/ |
D | patch.2.6.14-lockmeter-1.gz | 1Index: linux/arch/i386/Kconfig.debug
2====== ... |
/external/compiler-rt/lib/dfsan/ |
D | dfsan_custom.cc | 93 DECLARE_WEAK_INTERCEPTOR_HOOK(dfsan_weak_hook_memcmp, uptr caller_pc, in DECLARE_WEAK_INTERCEPTOR_HOOK() argument 127 DECLARE_WEAK_INTERCEPTOR_HOOK(dfsan_weak_hook_strcmp, uptr caller_pc, in DECLARE_WEAK_INTERCEPTOR_HOOK() argument 168 DECLARE_WEAK_INTERCEPTOR_HOOK(dfsan_weak_hook_strncmp, uptr caller_pc, in DECLARE_WEAK_INTERCEPTOR_HOOK() argument
|
/external/v8/src/ |
D | frames-inl.h | 153 inline Address StandardFrame::caller_pc() const { in caller_pc() function
|
D | frames.h | 806 inline Address caller_pc() const;
|