HomeSort by relevance Sort by last modified time
    Searched full:stack (Results 1551 - 1575 of 10778) sorted by null

<<61626364656667686970>>

  /external/chromium_org/third_party/android_platform/development/scripts/
stack_core.py 17 """stack symbolizes native crash dumps."""
27 print "Stack Trace:"
36 """Print stack data values."""
39 print "Stack Data:"
48 STACK = "[stack]"
68 """Convert strings containing native crash to a stack."""
76 # whitespace (e.g. \t). This is because the we want to allow for the stack
174 if area == UNKNOWN or area == HEAP or area == STACK:
178 # display "a -> b -> c" in the stack trace instead of just "a -> c
    [all...]
  /external/chromium_org/third_party/mesa/src/src/glx/
indirect_vertex_array.c 118 if (arrays->stack) {
119 free(arrays->stack);
120 arrays->stack = NULL;
293 arrays->stack = malloc(sizeof(struct array_stack_state)
1910 struct array_stack_state *stack = local
1936 struct array_stack_state *stack; local
    [all...]
  /external/libvpx/libvpx/vpx_ports/
x86_abi_support.asm 164 ; This macro aligns the stack to the given alignment (in bytes). The stack
165 ; is left such that the previous value of the stack pointer is the first
166 ; argument on the stack (ie, the inverse of this macro is 'pop rsp.')
322 ; store registers 6-n on the stack
324 ; Win64 ABI requires 16 byte stack alignment, but then pushes an 8 byte return
325 ; value. Typically we follow this up with 'push rbp' - re-aligning the stack -
384 ; Tell GNU ld that we don't require an executable stack.
386 section .note.GNU-stack noalloc noexec nowrite progbits
389 section .note.GNU-stack noalloc noexec nowrite progbit
    [all...]
  /external/llvm/lib/CodeGen/
PrologEpilogInserter.cpp 52 WarnStackSize("warn-stack-size", cl::Hidden, cl::init((unsigned)-1),
53 cl::desc("Warn for stack size bigger than the given"
67 "Number of bytes used for stack in all functions");
112 // Calculate actual frame offsets for all abstract stack objects...
116 // to align the stack frame as necessary for any stack variables or
138 // Warn on stack size when we exceeds the given limit.
142 errs() << "warning: Stack size limit exceeded (" << MFI->getStackSize()
182 // Some inline asm's need a stack frame, as indicated by operand 1.
195 // If call frames are not being included as part of the stack frame, an
    [all...]
  /external/mesa3d/src/glx/
indirect_vertex_array.c 118 if (arrays->stack) {
119 free(arrays->stack);
120 arrays->stack = NULL;
293 arrays->stack = malloc(sizeof(struct array_stack_state)
1910 struct array_stack_state *stack = local
1936 struct array_stack_state *stack; local
    [all...]
  /external/neven/Embedded/common/src/b_BasicEm/
Context.h 90 /** error stack */
93 /** error stack index */
148 /** puts an error onto the error stack (returns false if stack was already full) */
151 /** takes the last error from stack and returns it (when stack is empty: returns the error at stack position 0)*/
154 /** returns the last error of stack without removing it (when stack is empty: returns the error at stack position 0)*
    [all...]
  /art/runtime/arch/
context.h 28 // the quick stack frame layout.
43 // Set the stack pointer value
  /art/runtime/
thread_linux.cc 36 // Create and set an alternate signal stack.
47 VLOG(threads) << "Alternate signal stack is " << PrettySize(ss.ss_size) << " at " << ss.ss_sp;
  /dalvik/vm/arch/arm/
CallOldABI.S 19 * argument list has to be pushed onto the native stack according to
61 Stack is "full descending". Only the arguments that don't fit in the first 4
62 registers are placed on the stack. "sp" points at the first stacked argument
88 @ Standard gcc stack frame setup. We don't need to push the original
96 @ We need to push a variable number of arguments onto the stack.
98 @ the stack pointers.
119 @ to the stack. We need to push the last item in argv first, and we
137 @ Load the last two args. These are coming out of the interpreted stack,
  /external/chromium_org/base/debug/
proc_maps_linux.h 39 // "[heap]" and "[stack]" are used to represent the location of the process'
40 // heap and stack, respectively.
  /external/chromium_org/base/
run_loop.cc 74 // Push RunLoop stack:
86 // Pop RunLoop stack:
  /external/chromium_org/chrome/app/
chrome_exe_main_gtk.cc 18 // - set the malloc_context_size (i.e. the size of stack traces collected by
19 // ASan for each malloc/free) to 5. These stack traces tend to accumulate
  /external/chromium_org/chrome_frame/crash_reporting/
veh_test.cc 37 // this will be detected since we are on the stack!
96 // Not detected since we are not on the stack.
  /external/chromium_org/third_party/tcmalloc/chromium/src/
getpc.h 72 // down its own stack frame. In that case, it's possible for the
73 // interrupt to happen when execution is in Bar(), but the stack frame
76 // cases, the stack trace cannot see the caller function anymore.
83 // down a stack frame.
102 // The offset from the stack pointer (e)sp where to look for the
118 // Top-of-stack contains the caller IP.
124 // Top-of-stack contains the old frame, caller IP is +4.
130 // Top-of-stack contains the caller IP.
  /external/chromium_org/third_party/tcmalloc/chromium/src/tests/
stacktrace_unittest.cc 112 void *stack[STACK_LEN]; local
118 size = GetStackTrace(stack, STACK_LEN, 0);
119 printf("Obtained %d stack frames.\n", size);
125 char **strings = backtrace_symbols(stack, size);
126 printf("Obtained %d stack frames.\n", size);
128 printf("%s %p\n", strings[i], stack[i]);
136 i, expected_range[i].start, expected_range[i].end, stack[i]);
138 CheckRetAddrIsInFunction(stack[i], expected_range[i]);
  /external/chromium_org/third_party/tcmalloc/vendor/src/
getpc.h 70 // down its own stack frame. In that case, it's possible for the
71 // interrupt to happen when execution is in Bar(), but the stack frame
74 // cases, the stack trace cannot see the caller function anymore.
81 // down a stack frame.
100 // The offset from the stack pointer (e)sp where to look for the
115 // Top-of-stack contains the caller IP.
121 // Top-of-stack contains the old frame, caller IP is +4.
127 // Top-of-stack contains the caller IP.
  /external/chromium_org/third_party/tcmalloc/vendor/src/tests/
stacktrace_unittest.cc 112 void *stack[STACK_LEN]; local
118 size = GetStackTrace(stack, STACK_LEN, 0);
119 printf("Obtained %d stack frames.\n", size);
125 char **strings = backtrace_symbols(stack, size);
126 printf("Obtained %d stack frames.\n", size);
128 printf("%s %p\n", strings[i], stack[i]);
136 i, expected_range[i].start, expected_range[i].end, stack[i]);
138 CheckRetAddrIsInFunction(stack[i], expected_range[i]);
  /external/chromium_org/v8/test/mjsunit/regress/
regress-233.js 29 // A stack overflow detected by a global regexp match wasn't handled correctly.
38 // Stack overflow caught.
  /external/chromium_org/v8/test/mjsunit/
stack-traces-custom-lazy.js 38 // function right before calling error.stack should be fine.
43 assertEquals("bar", error.stack);
  /external/clang/include/clang/Sema/
PrettyDeclStackTrace.h 1 //===- PrettyDeclStackTrace.h - Stack trace for decl processing -*- C++ -*-===//
30 /// declaration in the stack trace.
  /external/clang/test/SemaObjC/
block-explicit-return-type.m 74 block = ^(double x){ return ^(char c, short y) { return one + c + y; };}; // expected-error {{returning block that lives on the local stack}}
76 block = ^(double x){ return ^(char c, short y) { return one + (int)c + y; };}; // expected-error {{returning block that lives on the local stack}}
  /external/compiler-rt/lib/arm/
restore_vfp_d8_d15_regs.S 26 // Restore registers d8-d15 from stack
30 vldmia sp!, {d8-d15} // pop registers d8-d15 off stack
save_vfp_d8_d15_regs.S 26 // Save registers d8-d15 onto stack
30 vstmdb sp!, {d8-d15} // push registers d8-d15 onto stack
  /external/compiler-rt/lib/
enable_execute_stack.c 33 * trampoline functions on the stack for use with nested functions.
35 * and the next 48 bytes as executable. Since the stack is normally rw-
  /external/compiler-rt/lib/lsan/
lsan_allocator.h 23 void *Allocate(const StackTrace &stack, uptr size, uptr alignment,
26 void *Reallocate(const StackTrace &stack, void *p, uptr new_size,

Completed in 1837 milliseconds

<<61626364656667686970>>