| /external/skqp/tools/viewer/ |
| BisectSlide.h | 15 #include <stack> 52 std::stack<std::pair<SkTArray<FoundPath>, SkTArray<FoundPath>>> fPathHistory;
|
| /external/strace/m4/ |
| st_libdw.m4 | 37 [use libdw to implement stack tracing support] 77 [AC_MSG_ERROR([elfutils version >= 164 is required for stack tracing support])], 78 [AC_MSG_WARN([elfutils version >= 164 is required for stack tracing support])] 104 [Whether to use libdw for stack tracing]
|
| /external/u-boot/arch/mips/lib/ |
| Makefile | 10 obj-y += stack.o
|
| /external/python/cpython3/Lib/test/ |
| test_contextlib.py | 583 with self.exit_stack() as stack: 586 f = stack.callback(_exit, *args, **kwds) 588 f = stack.callback(_exit, *args) 590 f = stack.callback(_exit, **kwds) 592 f = stack.callback(_exit) 594 for wrapper in stack._exit_callbacks: 617 with self.exit_stack() as stack: 618 stack.push(_expect_ok) 619 self.assertIs(stack._exit_callbacks[-1][1], _expect_ok) 621 stack.push(cm [all...] |
| /bionic/libc/arch-common/bionic/ |
| crtend.S | 44 .section .note.GNU-stack,"",%progbits
|
| /development/vndk/tools/sourcedr/ninja/ |
| list_ninja_build_dep.py | 46 stack = [build] 47 while stack: 48 build = stack.pop() 57 stack.append(dep)
|
| /device/linaro/bootloader/edk2/MdeModulePkg/Universal/EbcDxe/X64/ |
| EbcLowLevel.S | 30 # code. For x64, we switch stacks, copy the arguments to the stack
32 # On return, we restore the stack pointer to its original location.
47 # Set stack pointer to new value
71 # From MSDN x64 Software Conventions, Stack Usage:
72 # "The stack will always be maintained 16-byte aligned, except within
100 # save old parameter to stack
106 # Construct new stack
|
| /device/linaro/bootloader/edk2/StdLib/LibC/CRT/Ia32/ |
| mulll.S | 35 # Original local stack when calling __mulll
52 # Set up the local stack for Multiplicand parameter
60 # Set up the local stack for Multiplier parameter
73 # Adjust stack
|
| /external/compiler-rt/lib/asan/ |
| asan_suppressions.cc | 73 bool IsStackTraceSuppressed(const StackTrace *stack) { 80 for (uptr i = 0; i < stack->size && stack->trace[i]; i++) { 81 uptr addr = stack->trace[i];
|
| asan_malloc_linux.cc | 50 asan_free(ptr, &stack, FROM_MALLOC); 57 asan_free(ptr, &stack, FROM_MALLOC); 65 return asan_malloc(size, &stack); 73 return asan_calloc(nmemb, size, &stack); 81 void *new_ptr = asan_malloc(size, &stack); 85 return asan_realloc(ptr, size, &stack); 90 return asan_memalign(boundary, size, &stack, FROM_MALLOC); 95 return asan_memalign(boundary, size, &stack, FROM_MALLOC); 100 void *res = asan_memalign(boundary, size, &stack, FROM_MALLOC); 132 return asan_posix_memalign(memptr, alignment, size, &stack); [all...] |
| /external/compiler-rt/lib/sanitizer_common/ |
| sanitizer_symbolizer_libbacktrace.h | 36 bool SymbolizePC(uptr addr, SymbolizedStack *stack) override;
|
| /external/google-breakpad/src/processor/ |
| stackwalker_mips.h | 32 // Provides stack frames given MIPS register context and a memory region 54 // included in the stack. The other arguments are passed directly 63 // Implementation of Stackwalker, using mips context and stack conventions. 65 virtual StackFrame* GetCallerFrame(const CallStack* stack, 68 // Use cfi_frame_info (derived from STACK CFI records) to construct 74 // Scan the stack for plausible return address and frame pointer pair. 78 // Stores the CPU context corresponding to the innermost stack frame to
|
| microdump_processor.cc | 78 scoped_ptr<CallStack> stack(new CallStack()); 80 if (!stackwalker->Walk(stack.get(), 91 process_state->threads_.push_back(stack.release());
|
| stackwalker_ppc64.cc | 75 StackFrame* StackwalkerPPC64::GetCallerFrame(const CallStack* stack, 77 if (!memory_ || !stack) { 78 BPLOG(ERROR) << "Can't get caller frame without memory or stack"; 82 // The instruction pointers for previous frames are saved on the stack. 84 // its return address in the calling procedure's stack frame at 8(%r1), 85 // and to allocate its own stack frame by decrementing %r1 (the stack 87 // no hardware stack, there is no distinction between the stack pointer and 89 // an x86 is usually referred to as the stack pointer on a ppc64 [all...] |
| /external/libchrome/base/ |
| at_exit.h | 10 #include "base/containers/stack.h" 22 // AtExitManager object on the stack: 58 // AtExitManagers are kept on a global stack, and it will be removed during 64 base::stack<base::Closure> stack_; 66 AtExitManager* next_manager_; // Stack of managers to allow shadowing.
|
| /external/nist-sip/java/gov/nist/javax/sip/stack/ |
| HandshakeCompletedListenerImpl.java | 19 package gov.nist.javax.sip.stack;
|
| /external/tensorflow/tensorflow/core/graph/ |
| algorithm.cc | 32 // Stack of work to do. 37 std::vector<Work> stack(start.size()); 39 stack[i] = Work{start[i], false}; 43 while (!stack.empty()) { 44 Work w = stack.back(); 45 stack.pop_back(); 58 if (leave) stack.push_back(Work{n, true}); 60 auto add_work = [&visited, &stack](Node* out) { 63 stack.push_back(Work{out, false}); 126 // Stack of work to do [all...] |
| /external/v8/src/heap/ |
| invalidated-slots.h | 9 #include <stack>
|
| /external/wayland/src/ |
| dtddata.S | 24 * Avoid executable stack. 28 .section .note.GNU-stack,"",%progbits
|
| /external/compiler-rt/lib/msan/ |
| msan_poisoning.cc | 44 StackTrace *stack) { 53 if (__msan_get_track_origins() > 1) o = ChainOrigin(o, stack); 67 if (__msan_get_track_origins() > 1) o = ChainOrigin(o, stack); 87 dst_o = ChainOrigin(src_o, stack); 99 StackTrace *stack) { 105 if (__msan_get_track_origins()) CopyOrigin(dst, src, size, stack); 109 StackTrace *stack) { 114 if (__msan_get_track_origins()) CopyOrigin(dst, src, size, stack); 117 void CopyMemory(void *dst, const void *src, uptr size, StackTrace *stack) { 119 CopyShadowAndOrigin(dst, src, size, stack); [all...] |
| /external/compiler-rt/lib/tsan/rtl/ |
| tsan_debugging.cc | 41 if (typ == ReportLocationStack) return "stack"; 87 ReportStack *stack = rep->stacks[idx]; local 88 if (stack) CopyTrace(stack->frames, trace, trace_size); 89 return stack ? 1 : 0; 104 if (mop->stack) CopyTrace(mop->stack->frames, trace, trace_size); 123 if (loc->stack) CopyTrace(loc->stack->frames, trace, trace_size); 136 if (mutex->stack) CopyTrace(mutex->stack->frames, trace, trace_size) [all...] |
| /external/compiler-rt/test/asan/TestCases/Linux/ |
| swapcontext_test.cc | 35 char x[32] = {0}; // Stack gets poisoned. 39 // (b) Jump into the original function. Stack remains poisoned unless we do 50 printf("Child stack: %p\n", child_stack); 63 // Touch childs's stack to make sure it's unpoisoned. 71 char stack[kStackSize + 1]; local 74 ret += Run(argc - 1, 0, stack); 77 ret += Run(argc - 1, 1, stack);
|
| /external/desugar/test/java/com/google/devtools/build/android/desugar/ |
| FrameInfoTest.java | 34 assertThat(info.stack()).isEmpty(); 40 assertThat(info.stack()).containsExactly(InferredType.BYTE).inOrder(); 48 assertThat(info.stack()).containsExactly(InferredType.BOOLEAN, InferredType.LONG).inOrder();
|
| /external/elfutils/tests/ |
| run-stack-demangled-test.sh | 25 # See run-stack-d-test.sh and run-stack-i-test.sh 35 STACKCMD=${bindir}/`program_transform stack` 37 STACKCMD=${abs_top_builddir}/src/stack 46 testrun_compare ${abs_top_builddir}/src/stack -n 2 -e testfiledwarfinlines --core testfiledwarfinlines.core<<EOF 56 testrun_compare ${abs_top_builddir}/src/stack -n 2 -s -e testfiledwarfinlines --core testfiledwarfinlines.core<<EOF 68 testrun_compare ${abs_top_builddir}/src/stack -n 6 -i -e testfiledwarfinlines --core testfiledwarfinlines.core<<EOF 82 testrun_compare ${abs_top_builddir}/src/stack -n 6 -s -i -e testfiledwarfinlines --core testfiledwarfinlines.core<<EOF
|
| /external/fonttools/Snippets/ |
| subset-fpgm.py | 20 stack = [] variable 27 stack.append(num) 31 num = stack.pop()
|