/external/angle/util/windows/third_party/StackWalker/src/ |
D | StackWalker.h | 52 typedef unsigned __int64 DWORD64, *PDWORD64; typedef 107 DWORD64 qwBaseAddress, 139 DWORD64 offset; // if 0, we have no valid entry 143 DWORD64 offsetFromSmybol; 150 DWORD64 baseOfImage; 164 DWORD64 baseAddr, 171 virtual void OnDbgHelpErr(LPCSTR szFuncName, DWORD gle, DWORD64 addr); 184 DWORD64 qwBaseAddress,
|
D | StackWalker.cpp | 120 DWORD64 Address; // first instruction of line 125 DWORD64 BaseOfImage; // base load address of module 138 DWORD64 Address; // virtual address including dll base address 153 DWORD64 Offset; 159 DWORD64 Thread; 164 DWORD64 KiCallUserMode; 165 DWORD64 KeUserCallbackDispatcher; 166 DWORD64 SystemRangeStart; 167 DWORD64 Reserved[8]; 177 DWORD64 Params[4]; // possible arguments to the function [all …]
|
/external/mesa3d/src/gallium/auxiliary/util/ |
D | dbghelp.h | 171 DWORD64 Offset; 200 DWORD64 Thread; 205 DWORD64 KiCallUserMode; 206 DWORD64 KeUserCallbackDispatcher; 207 DWORD64 SystemRangeStart; 208 DWORD64 Reserved[8]; 245 DWORD64 Params[4]; 248 DWORD64 Reserved[3]; 271 …typedef BOOL (WINAPI *PREAD_PROCESS_MEMORY_ROUTINE64)(HANDLE hProcess,DWORD64 qwBaseAddress,PVOID … 272 typedef PVOID (WINAPI *PFUNCTION_TABLE_ACCESS_ROUTINE64)(HANDLE hProcess,DWORD64 AddrBase); [all …]
|
/external/mesa3d/src/util/ |
D | u_debug_symbol.c | 137 (HANDLE hProcess, DWORD64 Address, PDWORD64 Displacement, PSYMBOL_INFO Symbol), 142 (HANDLE hProcess, DWORD64 dwAddr, PDWORD pdwDisplacement, PIMAGEHLP_LINE64 Line), 152 DWORD64 dwAddr = (DWORD64)(uintptr_t)addr; in debug_symbol_name_dbghelp() 161 …DWORD64 dwDisplacement = 0; /* Displacement of the input address, relative to the start of the sy… in debug_symbol_name_dbghelp()
|
/external/swiftshader/third_party/llvm-7.0/llvm/lib/Support/Windows/ |
D | Signals.inc | 61 DWORD64 Address; 66 DWORD64 Address; 74 DWORD64 Offset; 80 DWORD64 Thread; 85 DWORD64 KiCallUserMode; 86 DWORD64 KeUserCallbackDispatcher; 87 DWORD64 SystemRangeStart; 88 DWORD64 KiUserExceptionDispatcher; 89 DWORD64 StackBase; 90 DWORD64 StackLimit; [all …]
|
/external/llvm/lib/Support/Windows/ |
D | Signals.inc | 62 DWORD64 Address; 67 DWORD64 Address; 75 DWORD64 Offset; 81 DWORD64 Thread; 86 DWORD64 KiCallUserMode; 87 DWORD64 KeUserCallbackDispatcher; 88 DWORD64 SystemRangeStart; 89 DWORD64 KiUserExceptionDispatcher; 90 DWORD64 StackBase; 91 DWORD64 StackLimit; [all …]
|
D | DynamicLibrary.inc | 48 ELM_Callback(PCSTR ModuleName, DWORD64 ModuleBase,
|
/external/swiftshader/third_party/llvm-subzero/lib/Support/Windows/ |
D | Signals.inc | 63 DWORD64 Address; 68 DWORD64 Address; 76 DWORD64 Offset; 82 DWORD64 Thread; 87 DWORD64 KiCallUserMode; 88 DWORD64 KeUserCallbackDispatcher; 89 DWORD64 SystemRangeStart; 90 DWORD64 KiUserExceptionDispatcher; 91 DWORD64 StackBase; 92 DWORD64 StackLimit; [all …]
|
/external/grpc-grpc/test/core/util/ |
D | test_config.cc | 91 SymFromAddrW(process, (DWORD64)(callers_stack[i]), 0, symbol); in print_current_stack() 93 (DWORD64)callers_stack[i], symbol->Name, (DWORD64)symbol->Address); in print_current_stack() 146 SymFromAddrW(process, (DWORD64)(s.AddrPC.Offset), 0, symbol); in print_stack_from_context() 148 stderr, L"*** %016I64X %ls - %016I64X\n", (DWORD64)(s.AddrPC.Offset), in print_stack_from_context() 149 has_symbol ? symbol->Name : L"<<no symbol>>", (DWORD64)symbol->Address); in print_stack_from_context()
|
/external/webrtc/webrtc/base/ |
D | win32regkey.h | 99 HRESULT SetValue(const wchar_t* value_name, DWORD64 value) const; 121 HRESULT GetValue(const wchar_t* value_name, DWORD64* value) const; 165 DWORD64 value); 207 DWORD64* value);
|
D | win32regkey.cc | 67 DWORD64 value) { in SetValue() 132 DWORD64* value) { in GetValue() 404 hr = key.SetValue(value_name, *(static_cast<DWORD64*>(value))); in SetValueStaticHelper() 454 hr = key.GetValue(value_name, reinterpret_cast<DWORD64*>(value)); in GetValueStaticHelper() 530 HRESULT RegKey::GetValue(const wchar_t* value_name, DWORD64* value) const { in GetValue() 534 DWORD byte_count = sizeof(DWORD64); in GetValue() 539 ASSERT((hr != S_OK) || (byte_count == sizeof(DWORD64))); in GetValue() 692 HRESULT RegKey::SetValue(const wchar_t* value_name, DWORD64 value) const { in SetValue() 697 sizeof(DWORD64)); in SetValue()
|
D | win32regkey_unittest.cc | 42 const DWORD64 kIntVal64 = 119600064000000000uI64; 175 DWORD64 int64_val = 0; in RegKeyNonStaticFunctionsTest() 368 DWORD64 int64_val = 0; in RegKeyStaticFunctionsTest()
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_symbolizer_win.cc | 110 DWORD64 offset = 0; in SymbolizePC() 112 (DWORD64)addr, &offset, symbol); in SymbolizePC() 119 BOOL got_fileline = SymGetLineFromAddr64(GetCurrentProcess(), (DWORD64)addr, in SymbolizePC()
|
/external/v8/src/base/platform/ |
D | platform-win32.cc | 1077 using DLL_FUNC_TYPE(SymLoadModule64) = DWORD64(__stdcall*)( 1079 IN DWORD64 BaseOfDll, IN DWORD SizeOfDll); 1088 IN HANDLE hProcess, IN DWORD64 qwAddr, OUT PDWORD64 pdwDisplacement, 1091 BOOL(__stdcall*)(IN HANDLE hProcess, IN DWORD64 qwAddr, 1096 DWORD64 AddrBase); // DbgHelp.h typedef PFUNCTION_TABLE_ACCESS_ROUTINE64 1097 using DLL_FUNC_TYPE(SymGetModuleBase64) = DWORD64(__stdcall*)( 1099 DWORD64 AddrBase); // DbgHelp.h typedef PGET_MODULE_BASE_ROUTINE64 1217 DWORD64 base; in LoadSymbols() 1225 reinterpret_cast<DWORD64>(module_entry.modBaseAddr), // BaseOfDll in LoadSymbols()
|
/external/tensorflow/tensorflow/core/platform/windows/ |
D | stacktrace.cc | 86 if (SymFromAddr(current_process, reinterpret_cast<DWORD64>(trace[i]), 0, in CurrentStackTrace()
|
/external/python/cpython3/PC/ |
D | winreg.c | 588 *retDataBuf = (BYTE *)PyMem_NEW(DWORD64, 1); in Py2Reg() 593 *retDataSize = sizeof(DWORD64); in Py2Reg() 595 DWORD64 zero = 0; in Py2Reg() 596 memcpy(*retDataBuf, &zero, sizeof(DWORD64)); in Py2Reg() 599 DWORD64 d = PyLong_AsUnsignedLongLong(value); in Py2Reg() 600 memcpy(*retDataBuf, &d, sizeof(DWORD64)); in Py2Reg() 735 obData = PyLong_FromUnsignedLongLong(*(DWORD64 *)retDataBuf); in Reg2Py()
|
/external/v8/src/diagnostics/ |
D | unwinding-info-win64.cc | 539 reinterpret_cast<DWORD64>(start))); in RegisterNonABICompliantCodeRange() 554 reinterpret_cast<DWORD64>(start), in RegisterNonABICompliantCodeRange() 555 reinterpret_cast<DWORD64>(reinterpret_cast<uint8_t*>(start) + in RegisterNonABICompliantCodeRange()
|
/external/boringssl/src/crypto/test/ |
D | abi_test.cc | 270 DWORD64 image_base; in Step() 287 DWORD64 establisher_frame; in Step() 614 DWORD64 displacement; in ReadUnwindResult()
|
/external/deqp/framework/qphelper/ |
D | qpCrashHandler.c | 352 BOOL symInfoOk = SymFromAddr(process, (DWORD64)handler->crashAddress, 0, symInfo); in qpCrashHandler_writeCrashInfo() 371 BOOL symInfoOk = SymFromAddr(process, (DWORD64)addresses[curFrame], 0, symInfo); in qpCrashHandler_writeCrashInfo()
|
/external/skqp/tools/ |
D | CrashHandler.cpp | 169 DWORD64 offset; in handler()
|
/external/skia/tools/ |
D | CrashHandler.cpp | 225 DWORD64 offset; in handler()
|
/external/v8/src/base/debug/ |
D | stack_trace_win.cc | 123 DWORD64 sym_displacement = 0; in OutputTraceToStream()
|
/external/python/cpython3/Tools/msi/bundle/bootstrap/ |
D | PythonBootstrapperApplication.cpp | 717 __in DWORD64 /*dw64Version*/, in OnDetectRelatedMsiPackage() argument 746 __in DWORD64 /*dw64Version*/, in OnDetectRelatedBundle() argument 946 __in DWORD64 dw64PackageCacheSize in OnCachePackageBegin() 968 __in DWORD64 dw64Progress, in OnCacheAcquireProgress() 969 __in DWORD64 dw64Total, in OnCacheAcquireProgress()
|