/external/google-breakpad/src/processor/ |
D | stackwalker_mips.cc | 295 uint32_t caller_pc, caller_sp, caller_fp; in GetCallerByStackScan() local 304 int count = kMaxFrameStackSize / sizeof(caller_pc); in GetCallerByStackScan() 313 last_sp += kMinArgsOnStack * sizeof(caller_pc); in GetCallerByStackScan() 321 if (!ScanForReturnAddress(last_sp, &caller_sp, &caller_pc, count)) { in GetCallerByStackScan() 328 if (!memory_->GetMemoryAtAddress(caller_sp - sizeof(caller_pc), in GetCallerByStackScan() 334 count = count - (caller_sp - last_sp) / sizeof(caller_pc); in GetCallerByStackScan() 336 last_sp = caller_sp + sizeof(caller_pc); in GetCallerByStackScan() 347 caller_sp += sizeof(caller_pc); in GetCallerByStackScan() 351 caller_pc -= 2 * sizeof(caller_pc); in GetCallerByStackScan() 358 frame->context.epc = caller_pc; in GetCallerByStackScan() [all …]
|
D | stackwalker_arm.cc | 168 uint32_t caller_sp, caller_pc; in GetCallerByStackScan() local 170 if (!ScanForReturnAddress(last_sp, &caller_sp, &caller_pc, in GetCallerByStackScan() 187 frame->context.iregs[MD_CONTEXT_ARM_REG_PC] = caller_pc; in GetCallerByStackScan()
|
D | stackwalker_arm64.cc | 181 uint64_t caller_sp, caller_pc; in GetCallerByStackScan() local 183 if (!ScanForReturnAddress(last_sp, &caller_sp, &caller_pc, in GetCallerByStackScan() 200 frame->context.iregs[MD_CONTEXT_ARM64_REG_PC] = caller_pc; in GetCallerByStackScan()
|
/external/llvm-project/compiler-rt/lib/tsan/rtl/ |
D | tsan_external.cpp | 61 void ExternalAccess(void *addr, uptr caller_pc, void *tag, AccessFunc access) { in ExternalAccess() argument 64 if (caller_pc) FuncEntry(thr, caller_pc); in ExternalAccess() 67 if (!caller_pc || !libignore()->IsIgnored(caller_pc, &in_ignored_lib)) { in ExternalAccess() 71 if (caller_pc) FuncExit(thr); in ExternalAccess() 113 void __tsan_external_read(void *addr, void *caller_pc, void *tag) { in __tsan_external_read() argument 114 ExternalAccess(addr, STRIP_PC(caller_pc), tag, MemoryRead); in __tsan_external_read() 118 void __tsan_external_write(void *addr, void *caller_pc, void *tag) { in __tsan_external_write() argument 119 ExternalAccess(addr, STRIP_PC(caller_pc), tag, MemoryWrite); in __tsan_external_write()
|
D | tsan_interface_java.cpp | 62 const uptr caller_pc = GET_CALLER_PC(); \ 65 ScopedJavaFunc scoped(thr, caller_pc); \ 246 Acquire(thr, caller_pc, addr); in __tsan_java_acquire() 256 Release(thr, caller_pc, addr); in __tsan_java_release() 266 ReleaseStore(thr, caller_pc, addr); in __tsan_java_release_store()
|
D | tsan_interceptors.h | 36 const uptr caller_pc = GET_CALLER_PC(); \ 37 ScopedInterceptor si(thr, #func, caller_pc); \
|
D | tsan_interface.h | 88 void __tsan_external_read(void *addr, void *caller_pc, void *tag); 90 void __tsan_external_write(void *addr, void *caller_pc, void *tag);
|
D | tsan_interface_ann.cpp | 51 const uptr caller_pc = (uptr)__builtin_return_address(0); \ 54 ScopedAnnotation sa(thr, __func__, caller_pc); \
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_coverage_mapping_libcdep.cc | 64 void CovUpdateMapping(const char *coverage_dir, uptr caller_pc) { in CovUpdateMapping() argument 69 if (!cached_mapping.NeedsUpdate(caller_pc)) in CovUpdateMapping() 86 if (caller_pc && caller_pc >= start && caller_pc < end) in CovUpdateMapping()
|
D | sanitizer_coverage_libcdep.cc | 105 uptr caller_pc); 122 void UpdateModuleNameVec(uptr caller_pc, uptr range_beg, uptr range_end); 187 void CovUpdateMapping(const char *path, uptr caller_pc = 0); 360 void CoverageData::UpdateModuleNameVec(uptr caller_pc, uptr range_beg, in UpdateModuleNameVec() argument 365 const char *module_name = sym->GetModuleNameForPc(caller_pc); in UpdateModuleNameVec() 376 uptr caller_pc) { in InitializeGuards() argument 387 UpdateModuleNameVec(caller_pc, range_beg, range_end); in InitializeGuards()
|
/external/compiler-rt/lib/lsan/ |
D | lsan_common_linux.cc | 119 uptr caller_pc = 0; in ProcessPlatformSpecificAllocationsCb() local 121 caller_pc = GetCallerPC(stack_id, param->stack_depot_reverse_map); in ProcessPlatformSpecificAllocationsCb() 124 if (caller_pc == 0 || (param->skip_linker_allocations && in ProcessPlatformSpecificAllocationsCb() 125 linker->containsAddress(caller_pc))) { in ProcessPlatformSpecificAllocationsCb()
|
/external/compiler-rt/lib/tsan/rtl/ |
D | tsan_interceptors.h | 25 const uptr caller_pc = GET_CALLER_PC(); \ 26 ScopedInterceptor si(thr, #func, caller_pc); \
|
D | tsan_interface_java.cc | 63 const uptr caller_pc = GET_CALLER_PC(); \ 66 ScopedJavaFunc scoped(thr, caller_pc); \ 230 Acquire(thr, caller_pc, addr); in __tsan_java_acquire() 240 Release(thr, caller_pc, addr); in __tsan_java_release() 250 ReleaseStore(thr, caller_pc, addr); in __tsan_java_release_store()
|
D | tsan_interface_ann.cc | 53 const uptr caller_pc = (uptr)__builtin_return_address(0); \ 56 ScopedAnnotation sa(thr, __func__, f, l, caller_pc); \
|
/external/llvm-project/compiler-rt/include/sanitizer/ |
D | tsan_interface.h | 136 void __tsan_external_read(void *addr, void *caller_pc, void *tag); 137 void __tsan_external_write(void *addr, void *caller_pc, void *tag);
|
D | dfsan_interface.h | 107 void dfsan_weak_hook_memcmp(void *caller_pc, const void *s1, const void *s2, 110 void dfsan_weak_hook_strncmp(void *caller_pc, const char *s1, const char *s2,
|
/external/llvm-project/compiler-rt/test/tsan/Darwin/ |
D | external-lib.cpp | 27 void (*callback_read)(void *addr, void *caller_pc, void *tag); 28 void (*callback_write)(void *addr, void *caller_pc, void *tag);
|
/external/compiler-rt/include/sanitizer/ |
D | dfsan_interface.h | 100 void dfsan_weak_hook_memcmp(void *caller_pc, const void *s1, const void *s2, 103 void dfsan_weak_hook_strncmp(void *caller_pc, const char *s1, const char *s2,
|
/external/rust/crates/libfuzzer-sys/libfuzzer/ |
D | FuzzerTracePC.cpp | 338 void TracePC::AddValueForMemcmp(void *caller_pc, const void *s1, const void *s2, in AddValueForMemcmp() argument 363 size_t PC = reinterpret_cast<size_t>(caller_pc); in AddValueForMemcmp() 608 void __sanitizer_weak_hook_memcmp(void *caller_pc, const void *s1, in __sanitizer_weak_hook_memcmp() argument 613 fuzzer::TPC.AddValueForMemcmp(caller_pc, s1, s2, n, /*StopAtZero*/false); in __sanitizer_weak_hook_memcmp() 617 void __sanitizer_weak_hook_strncmp(void *caller_pc, const char *s1, in __sanitizer_weak_hook_strncmp() argument 626 fuzzer::TPC.AddValueForMemcmp(caller_pc, s1, s2, n, /*StopAtZero*/true); in __sanitizer_weak_hook_strncmp() 630 void __sanitizer_weak_hook_strcmp(void *caller_pc, const char *s1, in __sanitizer_weak_hook_strcmp() argument 636 fuzzer::TPC.AddValueForMemcmp(caller_pc, s1, s2, N, /*StopAtZero*/true); in __sanitizer_weak_hook_strcmp()
|
D | FuzzerTracePC.h | 102 void AddValueForMemcmp(void *caller_pc, const void *s1, const void *s2,
|
/external/llvm-project/compiler-rt/lib/fuzzer/ |
D | FuzzerTracePC.cpp | 338 void TracePC::AddValueForMemcmp(void *caller_pc, const void *s1, const void *s2, in AddValueForMemcmp() argument 363 size_t PC = reinterpret_cast<size_t>(caller_pc); in AddValueForMemcmp() 608 void __sanitizer_weak_hook_memcmp(void *caller_pc, const void *s1, in __sanitizer_weak_hook_memcmp() argument 613 fuzzer::TPC.AddValueForMemcmp(caller_pc, s1, s2, n, /*StopAtZero*/false); in __sanitizer_weak_hook_memcmp() 617 void __sanitizer_weak_hook_strncmp(void *caller_pc, const char *s1, in __sanitizer_weak_hook_strncmp() argument 626 fuzzer::TPC.AddValueForMemcmp(caller_pc, s1, s2, n, /*StopAtZero*/true); in __sanitizer_weak_hook_strncmp() 630 void __sanitizer_weak_hook_strcmp(void *caller_pc, const char *s1, in __sanitizer_weak_hook_strcmp() argument 636 fuzzer::TPC.AddValueForMemcmp(caller_pc, s1, s2, N, /*StopAtZero*/true); in __sanitizer_weak_hook_strcmp()
|
/external/llvm/lib/Fuzzer/ |
D | FuzzerTraceState.cpp | 533 void dfsan_weak_hook_memcmp(void *caller_pc, const void *s1, const void *s2, in dfsan_weak_hook_memcmp() argument 543 void dfsan_weak_hook_strncmp(void *caller_pc, const char *s1, const char *s2, in dfsan_weak_hook_strncmp() argument 555 void dfsan_weak_hook_strcmp(void *caller_pc, const char *s1, const char *s2, in dfsan_weak_hook_strcmp() argument 574 void __sanitizer_weak_hook_memcmp(void *caller_pc, const void *s1, in __sanitizer_weak_hook_memcmp() argument 583 void __sanitizer_weak_hook_strncmp(void *caller_pc, const char *s1, in __sanitizer_weak_hook_strncmp() argument 596 void __sanitizer_weak_hook_strcmp(void *caller_pc, const char *s1, in __sanitizer_weak_hook_strcmp() argument
|
/external/llvm-project/compiler-rt/lib/lsan/ |
D | lsan_common.cpp | 430 uptr caller_pc = 0; in MarkInvalidPCCb() local 432 caller_pc = GetCallerPC(stack_id, param->stack_depot_reverse_map); in MarkInvalidPCCb() 435 if (caller_pc == 0 || (param->skip_linker_allocations && in MarkInvalidPCCb() 436 GetLinker()->containsAddress(caller_pc))) { in MarkInvalidPCCb()
|
/external/autotest/client/profilers/lockmeter/ |
D | patch.2.6.14-lockmeter-1.gz | 1Index: linux/arch/i386/Kconfig.debug
2====== ... |
/external/compiler-rt/lib/dfsan/ |
D | dfsan_custom.cc | 93 DECLARE_WEAK_INTERCEPTOR_HOOK(dfsan_weak_hook_memcmp, uptr caller_pc, in DECLARE_WEAK_INTERCEPTOR_HOOK() argument 127 DECLARE_WEAK_INTERCEPTOR_HOOK(dfsan_weak_hook_strcmp, uptr caller_pc, in DECLARE_WEAK_INTERCEPTOR_HOOK() argument 168 DECLARE_WEAK_INTERCEPTOR_HOOK(dfsan_weak_hook_strncmp, uptr caller_pc, in DECLARE_WEAK_INTERCEPTOR_HOOK() argument
|