Home
last modified time | relevance | path

Searched refs:DWORD64 (Results 1 – 23 of 23) sorted by relevance

/external/angle/util/windows/third_party/StackWalker/src/
DStackWalker.h52 typedef unsigned __int64 DWORD64, *PDWORD64; typedef
107 DWORD64 qwBaseAddress,
139 DWORD64 offset; // if 0, we have no valid entry
143 DWORD64 offsetFromSmybol;
150 DWORD64 baseOfImage;
164 DWORD64 baseAddr,
171 virtual void OnDbgHelpErr(LPCSTR szFuncName, DWORD gle, DWORD64 addr);
184 DWORD64 qwBaseAddress,
DStackWalker.cpp120 DWORD64 Address; // first instruction of line
125 DWORD64 BaseOfImage; // base load address of module
138 DWORD64 Address; // virtual address including dll base address
153 DWORD64 Offset;
159 DWORD64 Thread;
164 DWORD64 KiCallUserMode;
165 DWORD64 KeUserCallbackDispatcher;
166 DWORD64 SystemRangeStart;
167 DWORD64 Reserved[8];
177 DWORD64 Params[4]; // possible arguments to the function
[all …]
/external/mesa3d/src/gallium/auxiliary/util/
Ddbghelp.h171 DWORD64 Offset;
200 DWORD64 Thread;
205 DWORD64 KiCallUserMode;
206 DWORD64 KeUserCallbackDispatcher;
207 DWORD64 SystemRangeStart;
208 DWORD64 Reserved[8];
245 DWORD64 Params[4];
248 DWORD64 Reserved[3];
271 …typedef BOOL (WINAPI *PREAD_PROCESS_MEMORY_ROUTINE64)(HANDLE hProcess,DWORD64 qwBaseAddress,PVOID …
272 typedef PVOID (WINAPI *PFUNCTION_TABLE_ACCESS_ROUTINE64)(HANDLE hProcess,DWORD64 AddrBase);
[all …]
/external/mesa3d/src/util/
Du_debug_symbol.c137 (HANDLE hProcess, DWORD64 Address, PDWORD64 Displacement, PSYMBOL_INFO Symbol),
142 (HANDLE hProcess, DWORD64 dwAddr, PDWORD pdwDisplacement, PIMAGEHLP_LINE64 Line),
152 DWORD64 dwAddr = (DWORD64)(uintptr_t)addr; in debug_symbol_name_dbghelp()
161DWORD64 dwDisplacement = 0; /* Displacement of the input address, relative to the start of the sy… in debug_symbol_name_dbghelp()
/external/swiftshader/third_party/llvm-7.0/llvm/lib/Support/Windows/
DSignals.inc61 DWORD64 Address;
66 DWORD64 Address;
74 DWORD64 Offset;
80 DWORD64 Thread;
85 DWORD64 KiCallUserMode;
86 DWORD64 KeUserCallbackDispatcher;
87 DWORD64 SystemRangeStart;
88 DWORD64 KiUserExceptionDispatcher;
89 DWORD64 StackBase;
90 DWORD64 StackLimit;
[all …]
/external/llvm/lib/Support/Windows/
DSignals.inc62 DWORD64 Address;
67 DWORD64 Address;
75 DWORD64 Offset;
81 DWORD64 Thread;
86 DWORD64 KiCallUserMode;
87 DWORD64 KeUserCallbackDispatcher;
88 DWORD64 SystemRangeStart;
89 DWORD64 KiUserExceptionDispatcher;
90 DWORD64 StackBase;
91 DWORD64 StackLimit;
[all …]
DDynamicLibrary.inc48 ELM_Callback(PCSTR ModuleName, DWORD64 ModuleBase,
/external/swiftshader/third_party/llvm-subzero/lib/Support/Windows/
DSignals.inc63 DWORD64 Address;
68 DWORD64 Address;
76 DWORD64 Offset;
82 DWORD64 Thread;
87 DWORD64 KiCallUserMode;
88 DWORD64 KeUserCallbackDispatcher;
89 DWORD64 SystemRangeStart;
90 DWORD64 KiUserExceptionDispatcher;
91 DWORD64 StackBase;
92 DWORD64 StackLimit;
[all …]
/external/grpc-grpc/test/core/util/
Dtest_config.cc91 SymFromAddrW(process, (DWORD64)(callers_stack[i]), 0, symbol); in print_current_stack()
93 (DWORD64)callers_stack[i], symbol->Name, (DWORD64)symbol->Address); in print_current_stack()
146 SymFromAddrW(process, (DWORD64)(s.AddrPC.Offset), 0, symbol); in print_stack_from_context()
148 stderr, L"*** %016I64X %ls - %016I64X\n", (DWORD64)(s.AddrPC.Offset), in print_stack_from_context()
149 has_symbol ? symbol->Name : L"<<no symbol>>", (DWORD64)symbol->Address); in print_stack_from_context()
/external/webrtc/webrtc/base/
Dwin32regkey.h99 HRESULT SetValue(const wchar_t* value_name, DWORD64 value) const;
121 HRESULT GetValue(const wchar_t* value_name, DWORD64* value) const;
165 DWORD64 value);
207 DWORD64* value);
Dwin32regkey.cc67 DWORD64 value) { in SetValue()
132 DWORD64* value) { in GetValue()
404 hr = key.SetValue(value_name, *(static_cast<DWORD64*>(value))); in SetValueStaticHelper()
454 hr = key.GetValue(value_name, reinterpret_cast<DWORD64*>(value)); in GetValueStaticHelper()
530 HRESULT RegKey::GetValue(const wchar_t* value_name, DWORD64* value) const { in GetValue()
534 DWORD byte_count = sizeof(DWORD64); in GetValue()
539 ASSERT((hr != S_OK) || (byte_count == sizeof(DWORD64))); in GetValue()
692 HRESULT RegKey::SetValue(const wchar_t* value_name, DWORD64 value) const { in SetValue()
697 sizeof(DWORD64)); in SetValue()
Dwin32regkey_unittest.cc42 const DWORD64 kIntVal64 = 119600064000000000uI64;
175 DWORD64 int64_val = 0; in RegKeyNonStaticFunctionsTest()
368 DWORD64 int64_val = 0; in RegKeyStaticFunctionsTest()
/external/compiler-rt/lib/sanitizer_common/
Dsanitizer_symbolizer_win.cc110 DWORD64 offset = 0; in SymbolizePC()
112 (DWORD64)addr, &offset, symbol); in SymbolizePC()
119 BOOL got_fileline = SymGetLineFromAddr64(GetCurrentProcess(), (DWORD64)addr, in SymbolizePC()
/external/v8/src/base/platform/
Dplatform-win32.cc1077 using DLL_FUNC_TYPE(SymLoadModule64) = DWORD64(__stdcall*)(
1079 IN DWORD64 BaseOfDll, IN DWORD SizeOfDll);
1088 IN HANDLE hProcess, IN DWORD64 qwAddr, OUT PDWORD64 pdwDisplacement,
1091 BOOL(__stdcall*)(IN HANDLE hProcess, IN DWORD64 qwAddr,
1096 DWORD64 AddrBase); // DbgHelp.h typedef PFUNCTION_TABLE_ACCESS_ROUTINE64
1097 using DLL_FUNC_TYPE(SymGetModuleBase64) = DWORD64(__stdcall*)(
1099 DWORD64 AddrBase); // DbgHelp.h typedef PGET_MODULE_BASE_ROUTINE64
1217 DWORD64 base; in LoadSymbols()
1225 reinterpret_cast<DWORD64>(module_entry.modBaseAddr), // BaseOfDll in LoadSymbols()
/external/tensorflow/tensorflow/core/platform/windows/
Dstacktrace.cc86 if (SymFromAddr(current_process, reinterpret_cast<DWORD64>(trace[i]), 0, in CurrentStackTrace()
/external/python/cpython3/PC/
Dwinreg.c588 *retDataBuf = (BYTE *)PyMem_NEW(DWORD64, 1); in Py2Reg()
593 *retDataSize = sizeof(DWORD64); in Py2Reg()
595 DWORD64 zero = 0; in Py2Reg()
596 memcpy(*retDataBuf, &zero, sizeof(DWORD64)); in Py2Reg()
599 DWORD64 d = PyLong_AsUnsignedLongLong(value); in Py2Reg()
600 memcpy(*retDataBuf, &d, sizeof(DWORD64)); in Py2Reg()
735 obData = PyLong_FromUnsignedLongLong(*(DWORD64 *)retDataBuf); in Reg2Py()
/external/v8/src/diagnostics/
Dunwinding-info-win64.cc539 reinterpret_cast<DWORD64>(start))); in RegisterNonABICompliantCodeRange()
554 reinterpret_cast<DWORD64>(start), in RegisterNonABICompliantCodeRange()
555 reinterpret_cast<DWORD64>(reinterpret_cast<uint8_t*>(start) + in RegisterNonABICompliantCodeRange()
/external/boringssl/src/crypto/test/
Dabi_test.cc270 DWORD64 image_base; in Step()
287 DWORD64 establisher_frame; in Step()
614 DWORD64 displacement; in ReadUnwindResult()
/external/deqp/framework/qphelper/
DqpCrashHandler.c352 BOOL symInfoOk = SymFromAddr(process, (DWORD64)handler->crashAddress, 0, symInfo); in qpCrashHandler_writeCrashInfo()
371 BOOL symInfoOk = SymFromAddr(process, (DWORD64)addresses[curFrame], 0, symInfo); in qpCrashHandler_writeCrashInfo()
/external/skqp/tools/
DCrashHandler.cpp169 DWORD64 offset; in handler()
/external/skia/tools/
DCrashHandler.cpp225 DWORD64 offset; in handler()
/external/v8/src/base/debug/
Dstack_trace_win.cc123 DWORD64 sym_displacement = 0; in OutputTraceToStream()
/external/python/cpython3/Tools/msi/bundle/bootstrap/
DPythonBootstrapperApplication.cpp717 __in DWORD64 /*dw64Version*/, in OnDetectRelatedMsiPackage() argument
746 __in DWORD64 /*dw64Version*/, in OnDetectRelatedBundle() argument
946 __in DWORD64 dw64PackageCacheSize in OnCachePackageBegin()
968 __in DWORD64 dw64Progress, in OnCacheAcquireProgress()
969 __in DWORD64 dw64Total, in OnCacheAcquireProgress()