/external/python/cpython3/Parser/ |
parser.h | 20 stackentry s_base[MAXSTACK];/* Array of stack entries */ 21 /* NB The stack grows down */ 22 } stack; typedef in typeref:struct:__anon37507 25 stack p_stack; /* Stack of parser states */
|
/external/perfetto/src/trace_processor/ |
slice_tracker.cc | 73 auto* stack = &threads_[utid]; local 76 const uint8_t depth = static_cast<uint8_t>(stack->size()); 81 int64_t parent_stack_id = depth == 0 ? 0 : slices->stack_ids()[stack->back()]; 85 stack->emplace_back(slice_idx); 87 slices->set_stack_id(slice_idx, GetStackHash(*stack)); 118 const auto& stack = threads_[utid]; local 119 if (stack.empty()) 123 size_t slice_idx = stack.back(); 143 void SliceTracker::MaybeCloseStack(int64_t ts, SlicesStack* stack) { 146 for (int i = static_cast<int>(stack->size()) - 1; i >= 0; i--) [all...] |
/external/selinux/libsepol/cil/src/ |
cil_parser.c | 53 static void push_hll_info(struct cil_stack *stack, int hll_lineno, int hll_expand) 60 cil_stack_push(stack, CIL_NONE, new); 63 static void pop_hll_info(struct cil_stack *stack, int *hll_lineno, int *hll_expand) 65 struct cil_stack_item *curr = cil_stack_pop(stack); 66 struct cil_stack_item *prev = cil_stack_peek(stack); 101 static int add_hll_linemark(struct cil_tree_node **current, int *hll_lineno, int *hll_expand, struct cil_stack *stack, char *path) 112 if (cil_stack_is_empty(stack)) { 116 pop_hll_info(stack, hll_lineno, hll_expand); 149 push_hll_info(stack, *hll_lineno, *hll_expand); 208 struct cil_stack *stack; local [all...] |
/external/icu/icu4j/tools/build/src/com/ibm/icu/dev/tool/docs/ |
CheckTags.java | 47 DocStack stack = new DocStack(); field in class:CheckTags 70 private DocNode[] stack; field in class:CheckTags.DocStack 75 if (stack == null) { 76 stack = new DocNode[5]; 78 if (index == stack.length) { 79 DocNode[] temp = new DocNode[stack.length * 2]; 80 System.arraycopy(stack, 0, temp, 0, index); 81 stack = temp; 84 if (stack[index] == null) { 85 stack[index] = new DocNode() [all...] |
/bionic/libc/arch-common/bionic/ |
crtend_so.S | 30 .section .note.GNU-stack,"",%progbits
|
/development/samples/devbytes/animation/CardFlip/src/com/example/android/cardflip/ |
CardFlip.java | 35 * these cards can be flipped from one stack to another where each flip comes with 37 * or right to left depending on which stack the animating card currently belongs to. 39 * This application demonstrates an animation where a stack of cards can either be 41 * Rotate out: Down fling on stack of cards 42 * Rotate in: Up fling on stack of cards 43 * Full rotation: Tap on stack of cards 47 * state, no new cards can be rotated to or from that stack. These changes were made to 113 * Adds a new card to the specified stack. Also performs all the necessary layout setup 116 public void addNewCard(int stack) { 118 view.updateTranslation(mStackCards.get(stack).size()) [all...] |
/device/linaro/bootloader/edk2/ArmPlatformPkg/PrePeiCore/Arm/ |
Exception.asm | 43 cps #0x13 ; Switch to SVC for common stack
49 cps #0x13 ; Switch to SVC for common stack
55 cps #0x13 ; Switch to SVC for common stack
61 cps #0x13 ; Switch to SVC for common stack
67 cps #0x13 ; Switch to SVC for common stack
73 cps #0x13 ; Switch to SVC for common stack
79 cps #0x13 ; Switch to SVC for common stack
85 cps #0x13 ; Switch to SVC for common stack
|
/external/antlr/runtime/Ruby/test/functional/debugging/ |
rule-tracing.rb | 15 @stack = nil 20 attr_accessor :stack, :traces 32 @stack = nil 37 attr_accessor :stack, :traces
|
/external/compiler-rt/lib/msan/ |
msan_allocator.cc | 110 static void *MsanAllocate(StackTrace *stack, uptr size, uptr alignment, 135 stack->tag = StackTrace::TAG_ALLOC; 136 Origin o = Origin::CreateHeapOrigin(stack); 144 void MsanDeallocate(StackTrace *stack, void *p) { 155 stack->tag = StackTrace::TAG_DEALLOC; 156 Origin o = Origin::CreateHeapOrigin(stack); 171 void *MsanCalloc(StackTrace *stack, uptr nmemb, uptr size) { 174 return MsanReallocate(stack, nullptr, nmemb * size, sizeof(u64), true); 177 void *MsanReallocate(StackTrace *stack, void *old_p, uptr new_size, 180 return MsanAllocate(stack, new_size, alignment, zeroise) [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_suppressions.h | 33 uptr IsSuppressed(ReportType typ, const ReportStack *stack, Suppression **sp);
|
/external/compiler-rt/test/lsan/TestCases/ |
guard-page.c | 1 // Check that if LSan finds that SP doesn't point into thread stack (e.g. 34 void* stack; local 38 stack = malloc(1 << 10); 39 if (stack == NULL) 41 ctx.uc_stack.ss_sp = stack;
|
/external/google-breakpad/src/processor/ |
stackwalker_address_list.h | 32 // Doesn't actually walk a stack, rather initializes a CallStack given an 50 // Initializes this stack walker with an explicit set of frame addresses. 61 virtual StackFrame* GetCallerFrame(const CallStack* stack,
|
stackwalker_ppc.h | 32 // Provides stack frames given ppc register context and a memory region 33 // corresponding to a ppc stack. 54 // included in the stack. The other arguments are passed directly through 63 // Implementation of Stackwalker, using ppc context (stack pointer in %r1, 64 // saved program counter in %srr0) and stack conventions (saved stack 67 virtual StackFrame* GetCallerFrame(const CallStack* stack, 70 // Stores the CPU context corresponding to the innermost stack frame to
|
stackwalker_ppc64.h | 32 // Provides stack frames given ppc64 register context and a memory region 33 // corresponding to a ppc64 stack. 52 // included in the stack. The other arguments are passed directly through 61 // Implementation of Stackwalker, using ppc64 context (stack pointer in %r1, 62 // saved program counter in %srr0) and stack conventions (saved stack 65 virtual StackFrame* GetCallerFrame(const CallStack* stack, 68 // Stores the CPU context corresponding to the innermost stack frame to
|
stackwalker_sparc.h | 32 // Provides stack frames given sparc register context and a memory region 33 // corresponding to an sparc stack. 54 // included in the stack. The other arguments are passed directly through 64 // stack conventions 66 virtual StackFrame* GetCallerFrame(const CallStack* stack, 69 // Stores the CPU context corresponding to the innermost stack frame to
|
/external/guava/guava-testlib/src/com/google/common/testing/ |
TearDownStack.java | 31 * A {@code TearDownStack} contains a stack of {@link TearDown} instances. 41 final LinkedList<TearDown> stack = new LinkedList<TearDown>(); field in class:TearDownStack 55 stack.addFirst(checkNotNull(tearDown)); 63 for (TearDown tearDown : stack) { 74 stack.clear();
|
/external/honggfuzz/examples/badcode/targets/ |
Makefile | 2 CFLAGS ?= -fno-stack-protector -Wno-builtin-memcpy-chk-size
|
/external/libchrome/base/allocator/ |
allocator_extension.h | 36 // Attempts to unwind the call stack from the current location where this 41 // stack: pointer to a pre-allocated array of void*'s. 42 // max_stack_size: indicates the size of the array in |stack|. 44 // Returns the number of call stack frames stored in |stack|, or 0 if no call 45 // stack information is available. 46 BASE_EXPORT int GetCallStack(void** stack, int max_stack_size);
|
/external/libchrome/base/task_scheduler/ |
service_thread_unittest.cc | 24 // Verifies that |query| is found on the current stack. Ignores failures if this 27 const std::string stack = debug::StackTrace().ToString(); local 28 SCOPED_TRACE(stack); 29 const bool found_on_stack = stack.find(query) != std::string::npos; 31 stack.find("SchedulerWorker") != std::string::npos;
|
/external/libcxx/test/std/containers/container.adaptors/stack/stack.defn/ |
emplace.pass.cpp | 12 // <stack> 18 #include <stack> 26 template <typename Stack> 28 typedef typename Stack::container_type Container; 30 typedef decltype(std::declval<Stack>().emplace(std::declval<value_type &>())) stack_return_type; 42 test_return_type<std::stack<int> > (); 43 test_return_type<std::stack<int, std::vector<int> > > (); 45 std::stack<Emplaceable> q;
|
/external/libunwind/src/hppa/ |
siglongjmp.S | 14 /* We do not need executable stack. */ 15 .section .note.GNU-stack,"",@progbits
|
/external/libunwind/src/ia64/ |
longjmp.S | 40 /* We do not need executable stack. */ 41 .section .note.GNU-stack,"",@progbits
|
/external/libunwind/src/x86/ |
longjmp.S | 38 /* We do not need executable stack. */ 39 .section .note.GNU-stack,"",@progbits
|
/external/llvm/test/MC/ELF/ |
call-abs.s | 16 .section .note.GNU-stack,"",@progbits
|
/external/ltp/testcases/kernel/syscalls/kcmp/ |
kcmp03.c | 43 static void *stack; variable 57 stack = SAFE_MALLOC(STACK_SIZE); 62 free(stack); 92 STACK_SIZE, stack);
|