| /external/adeb/bcc/misc/ |
| lockstat.py | 211 def get_syms(stack, pid): 214 for addr in stack: 231 def disp_stack(stack, pid): 232 for addr in stack: 280 # print("Last stack for this lock:")
|
| /external/bcc/examples/lua/ |
| memleak.lua | 172 local stack = stack_traces:get(stack_id, resolve) 173 alloc_info[stack_id] = { stack=stack, count=1, size=tonumber(info.size) } 187 print("\t%d bytes in %d allocations from stack\n\t\t%s" % 188 {alloc.size, alloc.count, table.concat(alloc.stack, "\n\t\t")})
|
| /external/boringssl/src/include/openssl/ |
| conf.h | 62 #include <openssl/stack.h> 109 // NCONF_get_section returns a stack of values for a given section in |conf|.
|
| /external/clang/unittests/Tooling/ |
| RecursiveASTVisitorTestCallVisitor.cpp | 11 #include <stack>
|
| RecursiveASTVisitorTestTypeLocVisitor.cpp | 11 #include <stack>
|
| /external/compiler-rt/lib/lsan/ |
| lsan.cc | 99 stack.Print();
|
| /external/compiler-rt/lib/sanitizer_common/ |
| sanitizer_symbolizer_libbacktrace.cc | 158 bool LibbacktraceSymbolizer::SymbolizePC(uptr addr, SymbolizedStack *stack) { 160 data.first = stack; 161 data.last = stack; 184 bool LibbacktraceSymbolizer::SymbolizePC(uptr addr, SymbolizedStack *stack) {
|
| /external/compiler-rt/lib/tsan/rtl/ |
| tsan_fd.h | 57 bool FdLocation(uptr addr, int *fd, int *tid, u32 *stack);
|
| /external/compiler-rt/test/asan/TestCases/Linux/ |
| stress_dtls.c | 59 uintptr_t stack; local 60 // fprintf(stderr, "STACK: %p TLS: %p SELF: %p\n", &stack, &my_tls,
|
| /external/deqp-deps/SPIRV-Tools/source/opt/ |
| feature_manager.cpp | 18 #include <stack>
|
| /external/freetype/src/cff/ |
| cffparse.h | 31 /* CFF uses constant parser stack size; */ 37 * revision of the CFF2 specification, increasing the (then static) stack 38 * size to 513. By making the default stack size equal to the maximum 39 * stack size, the operator is essentially disabled, which has the 59 FT_Byte** stack; member in struct:CFF_ParserRec_
|
| /external/freetype/src/lzw/ |
| ftzopen.h | 139 FT_Byte* stack; /* character stack */ member in struct:FT_LzwStateRec_
|
| /external/freetype/src/psaux/ |
| t1decode.c | 457 /* compute random seed from stack address of parameter */ 467 decoder->top = decoder->stack; 512 FT_TRACE5(( " (%d)", decoder->top - decoder->stack )); 726 * Push value on stack, or process operator 731 if ( top - decoder->stack >= T1_MAX_CHARSTRINGS_OPERANDS ) 733 FT_ERROR(( "t1_decoder_parse_charstrings: stack overflow\n" )); 758 if ( top - decoder->stack < 2 ) 768 * remove all operands to callothersubr from the stack 771 * arguments, we increase the stack by the value of 775 * stack pointer as necessar [all...] |
| /external/junit/src/main/java/junit/runner/ |
| BaseTestRunner.java | 264 * Returns a filtered stack trace 275 * Filters stack frames from internal JUnit classes 277 public static String getFilteredTrace(String stack) { 279 return stack; 284 StringReader sr = new StringReader(stack); 295 return stack; // return the stack unfiltered
|
| /external/libchrome/base/ |
| at_exit.cc | 17 // Keep a stack of registered AtExitManagers. We always operate on the most 77 base::stack<base::Closure> tasks;
|
| run_loop.h | 13 #include "base/containers/stack.h" 38 // per RunLoop lifetime. Create a RunLoop on the stack and call Run/Quit to run 166 // this is the first Run() call on the stack or it was made from a nested 191 // A vector-based stack is more memory efficient than the default 192 // deque-based stack as the active RunLoop stack isn't expected to ever 194 using RunLoopStack = base::stack<RunLoop*, std::vector<RunLoop*>>;
|
| /external/libffi/src/arm/ |
| gentramp.sh | 92 // Save to stack
|
| /external/libffi/src/cris/ |
| ffi.c | 70 ffi_prep_args (char *stack, extended_cif * ecif) 78 argp = stack; 109 (unsigned int) (UINT32 *) (stack + uiLocOnStack); 110 memcpy ((stack + uiLocOnStack), *p_argv, (*p_arg)->size); 336 looking at the those passed on the stack. Step over the
|
| /external/libunwind/src/hppa/ |
| getcontext.S | 55 SPILL (30) /* stack pointer */ 72 /* We do not need executable stack. */ 73 .section .note.GNU-stack,"",@progbits
|
| setcontext.S | 58 FILL (30) /* stack pointer */ 75 /* We do not need executable stack. */ 76 .section .note.GNU-stack,"",@progbits
|
| /external/libunwind/src/ia64/ |
| siglongjmp.S | 46 * Note: we can use the scratch stack are because the caller 67 /* We do not need executable stack. */ 68 .section .note.GNU-stack,"",@progbits
|
| sigsetjmp.S | 67 /* We do not need executable stack. */ 68 .section .note.GNU-stack,"",@progbits
|
| /external/libunwind/src/x86/ |
| getcontext-linux.S | 73 /* We do not need executable stack. */ 74 .section .note.GNU-stack,"",@progbits
|
| siglongjmp.S | 35 /* Stack layout at this point: 91 /* We do not need executable stack. */ 92 .section .note.GNU-stack,"",@progbits
|
| /external/linux-kselftest/tools/testing/selftests/memfd/ |
| fuse_test.c | 201 uint8_t *stack; local 204 stack = malloc(STACK_SIZE); 205 if (!stack) { 211 stack + STACK_SIZE,
|