HomeSort by relevance Sort by last modified time
    Searched full:stack (Results 751 - 775 of 10778) sorted by null

<<31323334353637383940>>

  /external/chromium/base/
at_exit.h 9 #include <stack>
23 // AtExitManager object on the stack:
52 // AtExitManagers are kept on a global stack, and it will be removed during
65 std::stack<CallbackAndParam> stack_;
66 AtExitManager* next_manager_; // Stack of managers to allow shadowing.
  /external/chromium_org/base/
at_exit.h 8 #include <stack>
23 // AtExitManager object on the stack:
55 // AtExitManagers are kept on a global stack, and it will be removed during
61 std::stack<base::Closure> stack_;
62 AtExitManager* next_manager_; // Stack of managers to allow shadowing.
  /external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/coverage/
bytecode.py 73 self.stack = [code]
79 if self.stack:
80 # We're going to return the code object on the stack, but first
82 code = self.stack.pop()
85 self.stack.append(c)
  /external/chromium_org/tools/deep_memory_profiler/
policy.l0.json 13 "unhooked-stack",
27 "stack",
91 "name": "unhooked-stack",
92 "mappedpathname": ".stack.",
151 "name": "stack",
  /external/chromium_org/v8/src/x64/
regexp-macro-assembler-x64.h 127 // Called from RegExp if the stack-guard is triggered.
142 // Parameters (first four passed as registers, but with room on stack).
144 // stack (before the return address) to spill parameter registers. We
155 // 32 bit of this 64-bit stack slot may contain garbage.
163 // are passed as registers, and caller must allocate space on the stack
199 // First register address. Following registers are below it on the stack.
212 // Check whether we are exceeding the stack limit on the backtrack stack.
224 // The register containing the backtrack stack top. Provides a meaningful
245 // is GC-safe (i.e., doesn't leave absolute code addresses on the stack)
    [all...]
  /external/chromium_org/v8/test/webkit/fast/js/
deep-recursion-test.js 24 description("This test how deep we can recurse, and that we get an exception when we do, as opposed to a stack overflow.");
41 shouldBe("msg", "'RangeError: Maximum call stack size exceeded.'");
48 shouldBe("msg", "'RangeError: Maximum call stack size exceeded.'");
65 shouldBe("msg", "'RangeError: Maximum call stack size exceeded.'");
77 shouldBe("msg", "'RangeError: Maximum call stack size exceeded.'");
  /external/compiler-rt/lib/asan/
asan_stack.cc 12 // Code for ASan stack trace.
27 void PrintStack(StackTrace *stack) {
28 stack->PrintStack(stack->trace, stack->size, common_flags()->symbolize,
  /external/compiler-rt/lib/tsan/rtl/
tsan_report.h 54 ReportStack *stack; member in struct:__tsan::ReportMop
78 ReportStack *stack; member in struct:__tsan::ReportLocation
87 ReportStack *stack; member in struct:__tsan::ReportThread
93 ReportStack *stack; member in struct:__tsan::ReportMutex
117 void PrintStack(const ReportStack *stack);
  /external/llvm/lib/Target/R600/
AMDGPUFrameLowering.h 11 /// \brief Interface to describe a layout of a stack frame on a AMDIL target
23 /// \brief Information about the stack frame layout on the AMDGPU targets.
25 /// It holds the direction of the stack growth, the known stack alignment on
35 /// values to the stack.
  /external/nist-sip/java/gov/nist/core/
StackLogger.java 7 * interface that loggers should implement so that the stack can log to various
15 * log a stack trace. This helps to look at the stack frame.
20 * Log a stack trace if the current logging level exceeds
116 * Stack creation properties.
  /external/nist-sip/java/gov/nist/javax/sip/stack/
StackMessageFactory.java 29 package gov.nist.javax.sip.stack;
34 * by the application and called by the stack for processing requests
35 * and responses. When a Request comes in off the wire, the stack calls
37 * When a response comes off the wire, the stack calls newSIPServerResponse
61 * Generate a new server response for the stack.
  /external/proguard/docs/manual/retrace/
introduction.html 14 stack traces.
16 When an obfuscated program throws an exception, the resulting stack trace
48 <td class="whiteblock">Readable stack trace</td>
50 <td class="whiteblock">Obfuscated stack trace</td>
55 ReTrace can read an obfuscated stack trace and restore it to what it would
  /external/proguard/src/proguard/classfile/attribute/preverification/
SameOneFrame.java 28 * This StackMapFrame represents a "same locals 1 stack item frame" or a
29 * "same locals 1 stack item frame extended".
56 * Creates a SameOneFrame with the given stack verification type.
65 * Applies the given verification type visitor to the stack item.
113 return super.toString()+"Var: ..., Stack: ["+stackItem.toString()+"]";
  /frameworks/base/core/java/android/app/
TaskStackBuilder.java 43 * <p>When crossing from one task stack to another post-Android 3.0,
44 * the application should synthesize a back stack/history for the new task so that
53 * For more detailed information about tasks, the back stack, and navigation design guidelines,
55 * <a href="{@docRoot}guide/topics/fundamentals/tasks-and-back-stack.html">Tasks and Back Stack</a>
71 * Return a new TaskStackBuilder for launching a fresh task stack consisting
74 * @param context The context that will launch the new task stack or generate a PendingIntent
82 * Add a new Intent to the task stack. The most recently added Intent will invoke
83 * the Activity at the top of the final task stack.
85 * @param nextIntent Intent for the next Activity in the synthesized task stack
    [all...]
  /ndk/sources/cxx-stl/llvm-libc++/libcxx/test/containers/container.adaptors/stack/stack.cons.alloc/
ctor_container_alloc.pass.cpp 10 // <stack>
13 // stack(const container_type& c, const Alloc& a);
15 #include <stack>
33 : public std::stack<int, C>
35 typedef std::stack<int, C> base;
ctor_rcontainer_alloc.pass.cpp 10 // <stack>
13 // stack(const container_type& c, const Alloc& a);
15 #include <stack>
37 : public std::stack<T, C>
39 typedef std::stack<T, C> base;
  /external/chromium_org/media/base/simd/
linear_scale_yuv_to_rgb_mmx.inc 58 ; Defines for stack variables. These are used in both PIC and non-PIC code.
63 ; Handle stack variables differently for PIC and non-PIC code.
66 ; Define stack usage for PIC code. PIC code push U plane onto stack.
78 ; Define stack usage. Non-PIC code just push 3 registers to stack.
101 mov Uq, U_PLANE ; PIC code saves U_PLANE on stack.
121 mov Vq, V_PLANE ; Read V address from stack
131 add Xq, SOURCE_DX ; Add source_dx from stack
142 cmp Xq, SOURCE_WIDTH ; Compare source_width from stack
    [all...]
  /external/chromium_org/third_party/tcmalloc/chromium/src/gperftools/
stacktrace.h 33 // Routines to extract the current stack trace. These functions are
49 // Skips the most recent "skip_count" stack frames (also skips the
52 // "result", and the corresponding stack frame sizes in "sizes".
71 // And corresponding stack frame sizes will also be recorded:
74 // (Stack frame sizes of 16 above are just for illustration purposes.)
75 // Stack frame sizes of 0 or less indicate that those frame sizes couldn't
78 // This routine may return fewer stack frame entries than are
86 // better stack trace under certain conditions. The "uc" may safely be NULL.
91 // the stack trace only, and not the stack frame sizes as well
    [all...]
  /external/chromium_org/third_party/tcmalloc/vendor/src/gperftools/
stacktrace.h 33 // Routines to extract the current stack trace. These functions are
49 // Skips the most recent "skip_count" stack frames (also skips the
52 // "result", and the corresponding stack frame sizes in "sizes".
71 // And corresponding stack frame sizes will also be recorded:
74 // (Stack frame sizes of 16 above are just for illustration purposes.)
75 // Stack frame sizes of 0 or less indicate that those frame sizes couldn't
78 // This routine may return fewer stack frame entries than are
86 // better stack trace under certain conditions. The "uc" may safely be NULL.
91 // the stack trace only, and not the stack frame sizes as well
    [all...]
  /external/compiler-rt/lib/msan/
msan_report.cc 64 " in the stack frame of function '%s%s%s'%s\n",
77 static void ReportSummary(const char *error_type, StackTrace *stack) {
78 if (!stack->size || !IsSymbolizerAvailable()) return;
80 uptr pc = StackTrace::GetPreviousInstructionPc(stack->trace[0]);
91 void ReportUMR(StackTrace *stack, u32 origin) {
100 PrintStack(stack->trace, stack->size);
104 ReportSummary("use-of-uninitialized-value", stack);
107 void ReportExpectedUMRNotFound(StackTrace *stack) {
111 PrintStack(stack->trace, stack->size)
    [all...]
  /art/runtime/entrypoints/jni/
jni_entrypoints.cc 62 // On entry the stack pointed by sp is:
74 intptr_t* arg_ptr = sp + 4; // pointer to r1 on stack
80 int reg_num = 2; // Current register being processed, -1 for stack arguments.
96 arg_ptr += 3; // unaligned, pad and move through stack arguments
98 arg_ptr += 2; // aligned, move through stack arguments
106 arg_ptr = sp + 8; // skip to outgoing stack arguments
110 arg_ptr++; // move through stack arguments
  /dalvik/dx/src/com/android/dx/cf/code/
Frame.java 27 * of a set of locals and a value stack, and it can be told to act on
35 /** {@code non-null;} the stack */
36 private final ExecutionStack stack; field in class:Frame
38 /** {@code null-ok;} stack of labels of subroutines that this block is nested in */
45 * @param stack {@code non-null;} the execution stack to use
47 private Frame(LocalsArray locals, ExecutionStack stack) {
48 this(locals, stack, IntList.EMPTY);
55 * @param stack {@code non-null;} the execution stack to us
    [all...]
  /external/antlr/antlr-3.4/tool/src/main/java/org/antlr/analysis/
NFAContext.java 32 * so we can walk back up the tree (i.e., pop stuff off the stack). We
33 * never walk from stack down down through the children.
36 * representing all possible return nodes. The initial stack has
48 * you bound the stack so your states don't explode. The main difference
49 * is that I bound only recursion on the stack, not the simple stack size.
53 * Bermudez's m operates differently as it is his LR stack depth
54 * I'm pretty sure it therefore includes all stack symbols. Here I
56 * stack component may mention the same NFA invocation state at
63 * This constant prevents new states from being created after a stack get
    [all...]
  /external/chromium_org/native_client_sdk/src/libraries/third_party/pthreads-win32/
pthread_attr_setstackaddr.c 46 * Threads created with 'attr' will run on the stack
48 * Stack must be at least PTHREAD_STACK_MIN bytes.
55 * the address of the stack to use
59 * Threads created with 'attr' will run on the stack
61 * Stack must be at least PTHREAD_STACK_MIN bytes.
69 * 2) Create only one thread for each stack
75 * 0 successfully set stack address,
  /external/chromium_org/third_party/WebKit/Source/wtf/
StackStats.h 32 // Define this flag to enable Stack stats collection. This feature is useful
33 // for getting a sample of native stack usage sizes.
52 // each location in code where a stack recursion check is being done.
78 // each location in code where a stack recursion check is being done.
114 // Used for probing the stack at places where we suspect to be high
115 // points of stack usage but are NOT check points where stack recursion

Completed in 1752 milliseconds

<<31323334353637383940>>