/external/google-breakpad/src/processor/ |
H A D | stackwalker_mips.cc | 219 uint32_t caller_pc, caller_sp, caller_fp; local 228 int count = kMaxFrameStackSize / sizeof(caller_pc); 237 last_sp += kMinArgsOnStack * sizeof(caller_pc); 245 if (!ScanForReturnAddress(last_sp, &caller_sp, &caller_pc, count)) { 252 if (!memory_->GetMemoryAtAddress(caller_sp - sizeof(caller_pc), 258 count = count - (caller_sp - last_sp) / sizeof(caller_pc); 260 last_sp = caller_sp + sizeof(caller_pc); 271 caller_sp += sizeof(caller_pc); 272 // caller_pc is actually containing $ra value; 274 // so the caller_pc need [all...] |
H A D | stackwalker_arm.cc | 167 uint32_t caller_sp, caller_pc; local 169 if (!ScanForReturnAddress(last_sp, &caller_sp, &caller_pc, 186 frame->context.iregs[MD_CONTEXT_ARM_REG_PC] = caller_pc;
|
H A D | stackwalker_arm64.cc | 158 uint64_t caller_sp, caller_pc; local 160 if (!ScanForReturnAddress(last_sp, &caller_sp, &caller_pc, 177 frame->context.iregs[MD_CONTEXT_ARM64_REG_PC] = caller_pc;
|
/external/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_interceptors.h | 25 const uptr caller_pc = GET_CALLER_PC(); \ 26 ScopedInterceptor si(thr, #func, caller_pc); \
|
H A D | tsan_interface_java.cc | 63 const uptr caller_pc = GET_CALLER_PC(); \ 66 ScopedJavaFunc scoped(thr, caller_pc); \ 230 Acquire(thr, caller_pc, addr); 240 Release(thr, caller_pc, addr); 250 ReleaseStore(thr, caller_pc, addr);
|
H A D | tsan_interface_ann.cc | 53 const uptr caller_pc = (uptr)__builtin_return_address(0); \ 56 ScopedAnnotation sa(thr, __func__, f, l, caller_pc); \
|
H A D | tsan_interceptors.cc | 2268 const uptr caller_pc; member in struct:TsanInterceptorContext 2322 TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \ 2328 TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \
|
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_coverage_mapping_libcdep.cc | 64 void CovUpdateMapping(const char *coverage_dir, uptr caller_pc) { argument 69 if (!cached_mapping.NeedsUpdate(caller_pc)) 90 if (caller_pc && caller_pc >= start && caller_pc < end)
|
H A D | sanitizer_coverage_libcdep.cc | 103 uptr caller_pc); 114 void UpdateModuleNameVec(uptr caller_pc, uptr range_beg, uptr range_end); 180 void CovUpdateMapping(const char *path, uptr caller_pc = 0); 344 void CoverageData::UpdateModuleNameVec(uptr caller_pc, uptr range_beg, argument 349 const char *module_name = sym->GetModuleNameForPc(caller_pc); 360 uptr caller_pc) { 371 UpdateModuleNameVec(caller_pc, range_beg, range_end); 358 InitializeGuards(s32 *guards, uptr n, const char *comp_unit_name, uptr caller_pc) argument
|
/external/compiler-rt/include/sanitizer/ |
H A D | dfsan_interface.h | 100 void dfsan_weak_hook_memcmp(void *caller_pc, const void *s1, const void *s2, 103 void dfsan_weak_hook_strncmp(void *caller_pc, const char *s1, const char *s2,
|
/external/v8/third_party/llvm-build/Release+Asserts/lib/clang/3.9.0/include/sanitizer/ |
H A D | dfsan_interface.h | 100 void dfsan_weak_hook_memcmp(void *caller_pc, const void *s1, const void *s2, 103 void dfsan_weak_hook_strncmp(void *caller_pc, const char *s1, const char *s2,
|
/external/compiler-rt/lib/lsan/ |
H A D | lsan_common_linux.cc | 115 uptr caller_pc = 0; local 117 caller_pc = GetCallerPC(stack_id, param->stack_depot_reverse_map); 118 // If caller_pc is unknown, this chunk may be allocated in a coroutine. Mark 120 if (caller_pc == 0 || linker->containsAddress(caller_pc)) {
|
/external/llvm/lib/Fuzzer/ |
H A D | FuzzerTraceState.cpp | 413 void dfsan_weak_hook_memcmp(void *caller_pc, const void *s1, const void *s2, argument 417 uintptr_t PC = reinterpret_cast<uintptr_t>(caller_pc); 427 void dfsan_weak_hook_strncmp(void *caller_pc, const char *s1, const char *s2, argument 431 uintptr_t PC = reinterpret_cast<uintptr_t>(caller_pc); 443 void dfsan_weak_hook_strcmp(void *caller_pc, const char *s1, const char *s2, argument 446 uintptr_t PC = reinterpret_cast<uintptr_t>(caller_pc); 460 void __sanitizer_weak_hook_memcmp(void *caller_pc, const void *s1, argument 463 uintptr_t PC = reinterpret_cast<uintptr_t>(caller_pc); 471 void __sanitizer_weak_hook_strncmp(void *caller_pc, const char *s1, argument 474 uintptr_t PC = reinterpret_cast<uintptr_t>(caller_pc); 487 __sanitizer_weak_hook_strcmp(void *caller_pc, const char *s1, const char *s2) argument [all...] |
/external/v8/src/ |
H A D | frames-inl.h | 130 inline Address StandardFrame::caller_pc() const { function in class:v8::internal::StandardFrame
|
H A D | frames.h | 706 inline Address caller_pc() const;
|
/external/compiler-rt/lib/dfsan/ |
H A D | dfsan_custom.cc | 93 DECLARE_WEAK_INTERCEPTOR_HOOK(dfsan_weak_hook_memcmp, uptr caller_pc, 127 DECLARE_WEAK_INTERCEPTOR_HOOK(dfsan_weak_hook_strcmp, uptr caller_pc, 168 DECLARE_WEAK_INTERCEPTOR_HOOK(dfsan_weak_hook_strncmp, uptr caller_pc,
|