/external/chromium_org/third_party/android_platform/development/scripts/ |
stack_core.py | 17 """stack symbolizes native crash dumps.""" 27 print "Stack Trace:" 36 """Print stack data values.""" 39 print "Stack Data:" 48 STACK = "[stack]" 68 """Convert strings containing native crash to a stack.""" 76 # whitespace (e.g. \t). This is because the we want to allow for the stack 174 if area == UNKNOWN or area == HEAP or area == STACK: 178 # display "a -> b -> c" in the stack trace instead of just "a -> c [all...] |
/external/chromium_org/third_party/mesa/src/src/glx/ |
indirect_vertex_array.c | 118 if (arrays->stack) { 119 free(arrays->stack); 120 arrays->stack = NULL; 293 arrays->stack = malloc(sizeof(struct array_stack_state) 1910 struct array_stack_state *stack = local 1936 struct array_stack_state *stack; local [all...] |
/external/libvpx/libvpx/vpx_ports/ |
x86_abi_support.asm | 164 ; This macro aligns the stack to the given alignment (in bytes). The stack 165 ; is left such that the previous value of the stack pointer is the first 166 ; argument on the stack (ie, the inverse of this macro is 'pop rsp.') 322 ; store registers 6-n on the stack 324 ; Win64 ABI requires 16 byte stack alignment, but then pushes an 8 byte return 325 ; value. Typically we follow this up with 'push rbp' - re-aligning the stack - 384 ; Tell GNU ld that we don't require an executable stack. 386 section .note.GNU-stack noalloc noexec nowrite progbits 389 section .note.GNU-stack noalloc noexec nowrite progbit [all...] |
/external/llvm/lib/CodeGen/ |
PrologEpilogInserter.cpp | 52 WarnStackSize("warn-stack-size", cl::Hidden, cl::init((unsigned)-1), 53 cl::desc("Warn for stack size bigger than the given" 67 "Number of bytes used for stack in all functions"); 112 // Calculate actual frame offsets for all abstract stack objects... 116 // to align the stack frame as necessary for any stack variables or 138 // Warn on stack size when we exceeds the given limit. 142 errs() << "warning: Stack size limit exceeded (" << MFI->getStackSize() 182 // Some inline asm's need a stack frame, as indicated by operand 1. 195 // If call frames are not being included as part of the stack frame, an [all...] |
/external/mesa3d/src/glx/ |
indirect_vertex_array.c | 118 if (arrays->stack) { 119 free(arrays->stack); 120 arrays->stack = NULL; 293 arrays->stack = malloc(sizeof(struct array_stack_state) 1910 struct array_stack_state *stack = local 1936 struct array_stack_state *stack; local [all...] |
/external/neven/Embedded/common/src/b_BasicEm/ |
Context.h | 90 /** error stack */ 93 /** error stack index */ 148 /** puts an error onto the error stack (returns false if stack was already full) */ 151 /** takes the last error from stack and returns it (when stack is empty: returns the error at stack position 0)*/ 154 /** returns the last error of stack without removing it (when stack is empty: returns the error at stack position 0)* [all...] |
/art/runtime/arch/ |
context.h | 28 // the quick stack frame layout. 43 // Set the stack pointer value
|
/art/runtime/ |
thread_linux.cc | 36 // Create and set an alternate signal stack. 47 VLOG(threads) << "Alternate signal stack is " << PrettySize(ss.ss_size) << " at " << ss.ss_sp;
|
/dalvik/vm/arch/arm/ |
CallOldABI.S | 19 * argument list has to be pushed onto the native stack according to 61 Stack is "full descending". Only the arguments that don't fit in the first 4 62 registers are placed on the stack. "sp" points at the first stacked argument 88 @ Standard gcc stack frame setup. We don't need to push the original 96 @ We need to push a variable number of arguments onto the stack. 98 @ the stack pointers. 119 @ to the stack. We need to push the last item in argv first, and we 137 @ Load the last two args. These are coming out of the interpreted stack,
|
/external/chromium_org/base/debug/ |
proc_maps_linux.h | 39 // "[heap]" and "[stack]" are used to represent the location of the process' 40 // heap and stack, respectively.
|
/external/chromium_org/base/ |
run_loop.cc | 74 // Push RunLoop stack: 86 // Pop RunLoop stack:
|
/external/chromium_org/chrome/app/ |
chrome_exe_main_gtk.cc | 18 // - set the malloc_context_size (i.e. the size of stack traces collected by 19 // ASan for each malloc/free) to 5. These stack traces tend to accumulate
|
/external/chromium_org/chrome_frame/crash_reporting/ |
veh_test.cc | 37 // this will be detected since we are on the stack! 96 // Not detected since we are not on the stack.
|
/external/chromium_org/third_party/tcmalloc/chromium/src/ |
getpc.h | 72 // down its own stack frame. In that case, it's possible for the 73 // interrupt to happen when execution is in Bar(), but the stack frame 76 // cases, the stack trace cannot see the caller function anymore. 83 // down a stack frame. 102 // The offset from the stack pointer (e)sp where to look for the 118 // Top-of-stack contains the caller IP. 124 // Top-of-stack contains the old frame, caller IP is +4. 130 // Top-of-stack contains the caller IP.
|
/external/chromium_org/third_party/tcmalloc/chromium/src/tests/ |
stacktrace_unittest.cc | 112 void *stack[STACK_LEN]; local 118 size = GetStackTrace(stack, STACK_LEN, 0); 119 printf("Obtained %d stack frames.\n", size); 125 char **strings = backtrace_symbols(stack, size); 126 printf("Obtained %d stack frames.\n", size); 128 printf("%s %p\n", strings[i], stack[i]); 136 i, expected_range[i].start, expected_range[i].end, stack[i]); 138 CheckRetAddrIsInFunction(stack[i], expected_range[i]);
|
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
getpc.h | 70 // down its own stack frame. In that case, it's possible for the 71 // interrupt to happen when execution is in Bar(), but the stack frame 74 // cases, the stack trace cannot see the caller function anymore. 81 // down a stack frame. 100 // The offset from the stack pointer (e)sp where to look for the 115 // Top-of-stack contains the caller IP. 121 // Top-of-stack contains the old frame, caller IP is +4. 127 // Top-of-stack contains the caller IP.
|
/external/chromium_org/third_party/tcmalloc/vendor/src/tests/ |
stacktrace_unittest.cc | 112 void *stack[STACK_LEN]; local 118 size = GetStackTrace(stack, STACK_LEN, 0); 119 printf("Obtained %d stack frames.\n", size); 125 char **strings = backtrace_symbols(stack, size); 126 printf("Obtained %d stack frames.\n", size); 128 printf("%s %p\n", strings[i], stack[i]); 136 i, expected_range[i].start, expected_range[i].end, stack[i]); 138 CheckRetAddrIsInFunction(stack[i], expected_range[i]);
|
/external/chromium_org/v8/test/mjsunit/regress/ |
regress-233.js | 29 // A stack overflow detected by a global regexp match wasn't handled correctly. 38 // Stack overflow caught.
|
/external/chromium_org/v8/test/mjsunit/ |
stack-traces-custom-lazy.js | 38 // function right before calling error.stack should be fine. 43 assertEquals("bar", error.stack);
|
/external/clang/include/clang/Sema/ |
PrettyDeclStackTrace.h | 1 //===- PrettyDeclStackTrace.h - Stack trace for decl processing -*- C++ -*-===// 30 /// declaration in the stack trace.
|
/external/clang/test/SemaObjC/ |
block-explicit-return-type.m | 74 block = ^(double x){ return ^(char c, short y) { return one + c + y; };}; // expected-error {{returning block that lives on the local stack}} 76 block = ^(double x){ return ^(char c, short y) { return one + (int)c + y; };}; // expected-error {{returning block that lives on the local stack}}
|
/external/compiler-rt/lib/arm/ |
restore_vfp_d8_d15_regs.S | 26 // Restore registers d8-d15 from stack 30 vldmia sp!, {d8-d15} // pop registers d8-d15 off stack
|
save_vfp_d8_d15_regs.S | 26 // Save registers d8-d15 onto stack 30 vstmdb sp!, {d8-d15} // push registers d8-d15 onto stack
|
/external/compiler-rt/lib/ |
enable_execute_stack.c | 33 * trampoline functions on the stack for use with nested functions. 35 * and the next 48 bytes as executable. Since the stack is normally rw-
|
/external/compiler-rt/lib/lsan/ |
lsan_allocator.h | 23 void *Allocate(const StackTrace &stack, uptr size, uptr alignment, 26 void *Reallocate(const StackTrace &stack, void *p, uptr new_size,
|