Lines Matching refs:dex_pc
1137 uint32_t dex_pc = iterator.GetHandlerAddress(); in ScanTryCatchBlocks() local
1138 if (!GetInstructionFlags(dex_pc).IsOpcode()) { in ScanTryCatchBlocks()
1140 << "exception handler starts at bad address (" << dex_pc << ")"; in ScanTryCatchBlocks()
1143 if (!CheckNotMoveResult(code_item_accessor_.Insns(), dex_pc)) { in ScanTryCatchBlocks()
1145 << "exception handler begins with move-result* (" << dex_pc << ")"; in ScanTryCatchBlocks()
1148 GetModifiableInstructionFlags(dex_pc).SetBranchTarget(); in ScanTryCatchBlocks()
1171 const uint32_t dex_pc = inst.DexPc(); in VerifyInstructions() local
1172 if (!VerifyInstruction<kAllowRuntimeOnlyInstructions>(&inst.Inst(), dex_pc)) { in VerifyInstructions()
1178 GetModifiableInstructionFlags(dex_pc).SetReturn(); in VerifyInstructions()
1181 GetModifiableInstructionFlags(dex_pc).SetCompileTimeInfoPoint(); in VerifyInstructions()
1645 const size_t dex_pc = inst.DexPc(); in Dump() local
1649 RegisterLine* reg_line = reg_table_.GetLine(dex_pc); in Dump()
1656 << StringPrintf("0x%04zx", dex_pc) << ": " << GetInstructionFlags(dex_pc).ToString() << " "; in Dump()
1858 monitor_enter_dex_pcs->back().dex_pc = work_line->GetMonitorEnterDexPc(pair.second.dex_pc); in HandleMonitorDexPcsWorkLine()
5434 uint32_t dex_pc, in FindLocksAtDexPc() argument
5459 verifier.interesting_dex_pc_ = dex_pc; in FindLocksAtDexPc()