/external/chromium_org/v8/src/third_party/vtune/ |
jitprofiling.cc | 117 /* Virtual stack - the struct is used as a virtual stack for each thread. 118 ** Every thread initializes with a stack of size INIT_TOP_STACK. 119 ** Every method entry decreases from the current stack point, 120 ** and when a thread stack reaches its top of stack (return from the global function), 121 ** the top of stack and the current stack increase. Notice that when returning from a function 122 ** the stack pointer is the address of the function return. 138 /* end of virtual stack. * [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_stacktrace.h | 63 static uptr CompressStack(StackTrace *stack, 65 static void UncompressStack(StackTrace *stack, 73 void GetStackTrace(StackTrace *stack, uptr max_s, uptr pc, uptr bp, 78 // Use this macro if you want to print stack trace with the caller 86 // Use this macro if you want to print stack trace with the current
|
/external/llvm/lib/CodeGen/ |
LiveStackAnalysis.cpp | 1 //===-- LiveStackAnalysis.cpp - Live Stack Slot Analysis ------------------===// 10 // This file implements the live stack slot analysis pass. It is analogous to 11 // live interval analysis except it's analyzing liveness of stack slots rather 29 "Live Stack Slot Analysis", false, false) 32 "Live Stack Slot Analysis", false, false)
|
/external/llvm/lib/ExecutionEngine/IntelJITEvents/ |
jitprofiling.c | 78 /* Virtual stack - the struct is used as a virtual stack for each thread. 79 * Every thread initializes with a stack of size INIT_TOP_STACK. 80 * Every method entry decreases from the current stack point, 81 * and when a thread stack reaches its top of stack (return from the global 82 * function), the top of stack and the current stack increase. Notice that 83 * when returning from a function the stack pointer is the address of 100 /* end of virtual stack. * [all...] |
/external/llvm/test/CodeGen/X86/ |
force-align-stack-alloca.ll | 2 ; stack to an alignment greater than would be available due to the ABI. We 6 ; RUN: llc < %s -mcpu=generic -force-align-stack -stack-alignment=32 | FileCheck %s 31 ; The next adjustment of the stack is due to the alloca. 51 ; This is the state prior to stack realignment and the allocation of VLAs.
|
/external/skia/src/utils/ |
SkCanvasStack.cpp | 22 // push the canvas onto the stack 25 // push the canvas data onto the stack 30 // subtract this region from the canvas objects already on the stack. 50 * Traverse all canvases (e.g. layers) the stack and ensure that they are clipped 51 * to their bounds and that the area covered by any canvas higher in the stack is
|
/external/valgrind/main/drd/tests/ |
thread_name_xml.stderr.exp | 39 <stack> 64 </stack> 75 <stack> 100 </stack> 111 <stack> 136 </stack> 147 <stack> 172 </stack> 183 <stack> 208 </stack> [all...] |
/external/valgrind/main/exp-sgcheck/tests/ |
hsg.stderr.exp | 37 <stack> 54 </stack> 65 <stack> 90 </stack> 92 <auxwhat>Expected: stack array "la" of size 200 in frame 1 back from here</auxwhat>
|
/frameworks/av/media/libstagefright/codecs/on2/h264dec/omxdl/arm11/vc/m4p2/src/ |
omxVCM4P2_DecodeVLCZigzag_Inter_s.s | 100 ;// Allocate stack memory to store the VLC,Zigzag,LMAX and RMAX tables 115 M_STR pZigzagTable,ppZigzagTable ;// Store zigzag table on stack to pass as argument to unsafe function 117 M_STR pVlcTableL0L1,ppVlcTableL0L1 ;// Store optimized VLC table address on stack 119 M_STR pLMAXTableL0L1,ppLMAXTableL0L1 ;// Store LMAX table address on stack 122 M_STR pRMAXTableL0L1,ppRMAXTableL0L1 ;// store RMAX table address on stack
|
/frameworks/av/media/libstagefright/codecs/on2/h264dec/omxdl/arm_neon/vc/m4p2/src/ |
omxVCM4P2_DecodeVLCZigzag_Inter_s.s | 100 ;// Allocate stack memory to store the VLC,Zigzag,LMAX and RMAX tables 115 M_STR pZigzagTable,ppZigzagTable ;// Store zigzag table on stack to pass as argument to unsafe function 117 M_STR pVlcTableL0L1,ppVlcTableL0L1 ;// Store optimized VLC table address on stack 119 M_STR pLMAXTableL0L1,ppLMAXTableL0L1 ;// Store LMAX table address on stack 122 M_STR pRMAXTableL0L1,ppRMAXTableL0L1 ;// store RMAX table address on stack
|
/frameworks/base/core/java/android/content/ |
UndoOperation.java | 89 * Called when this undo state is being committed to the undo stack. 96 * Called when this undo state is being popped off the undo stack (in to 97 * the temporary redo stack). The implementation should remove the original 104 * redo stack to the main undo stack. The implementation should re-apply
|
/frameworks/base/core/jni/ |
android_server_Watchdog.cpp | 34 snprintf(buf, sizeof(buf), "/proc/%d/stack", tid); 41 // copy the stack dump text 51 ALOGE("Unable to open stack of tid %d : %d (%s)", tid, errno, strerror(errno)); 70 ALOGE("Unable to open stack dump file: %d (%s)", errno, strerror(errno)); 85 // dump each stack trace
|
/ndk/build/tools/ |
build-ndk-stack.sh | 17 # This script is used to rebuild the host 'ndk-stack' tool from the 18 # sources under sources/host-tools/ndk-stack. 20 # Note: The tool is installed under prebuilt/$HOST_TAG/bin/ndk-stack 28 "This script is used to rebuild the host ndk-stack binary program." 44 PROGNAME=ndk-stack
|
/ndk/sources/cxx-stl/gabi++/src/ |
terminate.cc | 45 // a complete stack trace explaining the failure. 47 // - Otherwise, the default SIGSEGV handler will generate a stack 48 // trace in the log, that can later be processed with ndk-stack 53 // be recorded in a Minidump, which contains a stack trace to be 62 // identify stack traces (like 0xdeadbaad is used when heap corruption
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/idlelib/ |
StackViewer.py | 22 self.stack = self.get_stack(tb) 28 stack = [] 32 stack.append((tb.tb_frame, tb.tb_lineno)) 34 return stack 51 for info in self.stack:
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/idlelib/ |
StackViewer.py | 22 self.stack = self.get_stack(tb) 28 stack = [] 32 stack.append((tb.tb_frame, tb.tb_lineno)) 34 return stack 51 for info in self.stack:
|
/prebuilts/tools/common/proguard/proguard4.7/docs/manual/retrace/ |
introduction.html | 25 stack traces. 27 When an obfuscated program throws an exception, the resulting stack trace 59 <td class="whiteblock">Readable stack trace</td> 61 <td class="whiteblock">Obfuscated stack trace</td> 66 ReTrace can read an obfuscated stack trace and restore it to what it would
|
/sdk/emulator/qtools/ |
stack_dump.cpp | 127 // Get the stack for the current thread 130 // If the stack does not exist, then allocate a new one. 138 // Update the stack 141 // If the user requested a stack dump at a certain time, 142 // and we are at that time, then dump the stack and exit.
|
/external/chromium_org/v8/src/ |
frames.h | 116 // Get the address of this stack handler. 119 // Get the next stack handler in the chain. 136 // Generator support to preserve stack handlers. 184 // Abstract base class for all stack frames. 192 // Used by FrameScope to indicate that the stack frame is constructed 198 // Opaque data type for identifying stack frames. Used extensively 222 // (as an iterator usually lives on stack). 267 // Get the id of this stack frame. 270 // Checks if this frame includes any stack handlers. 287 // safepoint entry and the number of stack slots. The pc must be a [all...] |
/external/compiler-rt/lib/lsan/ |
lsan_interceptors.cc | 38 StackTrace stack; \ 47 GetStackTrace(&stack, __sanitizer::common_flags()->malloc_context_size, \ 63 return Allocate(stack, size, 1, kAlwaysClearMemory); 76 return Allocate(stack, size, 1, true); 82 return Reallocate(stack, q, size, 1); 88 return Allocate(stack, size, alignment, kAlwaysClearMemory); 94 *memptr = Allocate(stack, size, alignment, kAlwaysClearMemory); 104 return Allocate(stack, size, GetPageSizeCached(), kAlwaysClearMemory); 135 return Allocate(stack, size, GetPageSizeCached(), kAlwaysClearMemory); 143 return Allocate(stack, size, 1, kAlwaysClearMemory) [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_rtl_amd64.S | 35 # Align stack frame. 46 # Unalign stack frame back. 115 # Align stack frame. 126 # Unalign stack frame back. 231 // align stack frame 241 // unalign stack frame 272 // align stack frame 282 // unalign stack frame 301 /* We do not need executable stack. */ 302 .section .note.GNU-stack,"",@progbit [all...] |
/external/nist-sip/java/gov/nist/javax/sip/ |
SipStackImpl.java | 38 import gov.nist.javax.sip.stack.DefaultMessageLogFactory; 39 import gov.nist.javax.sip.stack.DefaultRouter; 40 import gov.nist.javax.sip.stack.MessageProcessor; 41 import gov.nist.javax.sip.stack.SIPTransactionStack; 74 * The JAIN-SIP stack is initialized by a set of properties (see the JAIN SIP 77 * meaningful properties for the NIST SIP stack (specify these in the property 96 * file (e.g. log4j.properties). The logger name for the stack is specified 98 * logger name for the stack is the same as the stack name. For example, <code> 101 * </code> allows you to now control logging in the stack entirely using log4 [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/lib/ |
librt.a | 26 ELF ? 4 ( U??WVS???]?}?D$ ?$????????b ?$ ???????ts9uI?`s?t? ?$ ?????????[^_]É?1??????????u?f???9~?? ?F???u??$ ???????????????? ????[^_]É??????????t??8?} ?¹ 1????????1??????v?;f???F?@`} ?F?@d????????????^??????????8????????v??D$ ?D$? ?D$ ?$ ??????p?@ ??t4? ???????? ?q????>t1???1???????F ?S???? ??????& |