Home | History | Annotate | Download | only in analysis

Lines Matching full:meth

37 bool dvmComputeCodeWidths(const Method* meth, InsnFlags* insnFlags,
40 const int insnCount = dvmGetMethodInsnsSize(meth);
41 const u2* insns = meth->insns;
66 LOG_VFY_METH(meth,
82 LOG_VFY_METH(meth, "VFY: insane width %d\n", width);
90 if (i != (int) dvmGetMethodInsnsSize(meth)) {
91 LOG_VFY_METH(meth, "VFY: code did not end where expected (%d vs. %d)\n",
92 i, dvmGetMethodInsnsSize(meth));
113 bool dvmSetTryFlags(const Method* meth, InsnFlags* insnFlags)
115 u4 insnsSize = dvmGetMethodInsnsSize(meth);
116 DexFile* pDexFile = meth->clazz->pDvmDex->pDexFile;
117 const DexCode* pCode = dvmGetMethodCode(meth);
138 LOG_VFY_METH(meth,
145 LOG_VFY_METH(meth,
175 LOG_VFY_METH(meth,
194 bool dvmCheckSwitchTargets(const Method* meth, InsnFlags* insnFlags,
197 const int insnCount = dvmGetMethodInsnsSize(meth);
198 const u2* insns = meth->insns + curOffset;
212 LOG_VFY_METH(meth,
223 LOG_VFY_METH(meth,
245 LOG_VFY_METH(meth,
253 LOG_VFY_METH(meth,
270 LOG_VFY_METH(meth,
289 LOG_VFY_METH(meth,
310 bool dvmCheckBranchTarget(const Method* meth, InsnFlags* insnFlags,
313 const int insnCount = dvmGetMethodInsnsSize(meth);
314 const u2* insns = meth->insns + curOffset;
318 if (!dvmGetBranchTarget(meth, insnFlags, curOffset, &offset,
323 LOG_VFY_METH(meth, "VFY: branch offset of zero not allowed at 0x%x\n",
334 LOG_VFY_METH(meth, "VFY: branch target overflow 0x%x +%d\n",
342 LOG_VFY_METH(meth,
358 void dvmLogVerifyFailure(const Method* meth, const char* format, ...)
372 if (meth != NULL) {
373 char* desc = dexProtoCopyMethodDescriptor(&meth->prototype);
375 meth->clazz->descriptor, meth->name, desc);
388 const Method* meth)
394 char* dotFromClass = dvmDescriptorToDot(meth->clazz->descriptor);
395 //char* methodDescr = dexProtoCopyMethodDescriptor(&meth->prototype);
398 dotMissingClass, dotFromClass, meth->name/*, methodDescr*/);
410 bool dvmGetBranchTarget(const Method* meth, InsnFlags* insnFlags,
413 const u2* insns = meth->insns + curOffset;