/external/chromium/base/ |
at_exit.h | 9 #include <stack> 23 // AtExitManager object on the stack: 52 // AtExitManagers are kept on a global stack, and it will be removed during 65 std::stack<CallbackAndParam> stack_; 66 AtExitManager* next_manager_; // Stack of managers to allow shadowing.
|
/external/chromium_org/base/ |
at_exit.h | 8 #include <stack> 23 // AtExitManager object on the stack: 55 // AtExitManagers are kept on a global stack, and it will be removed during 61 std::stack<base::Closure> stack_; 62 AtExitManager* next_manager_; // Stack of managers to allow shadowing.
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/coverage/ |
bytecode.py | 73 self.stack = [code] 79 if self.stack: 80 # We're going to return the code object on the stack, but first 82 code = self.stack.pop() 85 self.stack.append(c)
|
/external/chromium_org/tools/deep_memory_profiler/ |
policy.l0.json | 13 "unhooked-stack", 27 "stack", 91 "name": "unhooked-stack", 92 "mappedpathname": ".stack.", 151 "name": "stack",
|
/external/chromium_org/v8/src/x64/ |
regexp-macro-assembler-x64.h | 127 // Called from RegExp if the stack-guard is triggered. 142 // Parameters (first four passed as registers, but with room on stack). 144 // stack (before the return address) to spill parameter registers. We 155 // 32 bit of this 64-bit stack slot may contain garbage. 163 // are passed as registers, and caller must allocate space on the stack 199 // First register address. Following registers are below it on the stack. 212 // Check whether we are exceeding the stack limit on the backtrack stack. 224 // The register containing the backtrack stack top. Provides a meaningful 245 // is GC-safe (i.e., doesn't leave absolute code addresses on the stack) [all...] |
/external/chromium_org/v8/test/webkit/fast/js/ |
deep-recursion-test.js | 24 description("This test how deep we can recurse, and that we get an exception when we do, as opposed to a stack overflow."); 41 shouldBe("msg", "'RangeError: Maximum call stack size exceeded.'"); 48 shouldBe("msg", "'RangeError: Maximum call stack size exceeded.'"); 65 shouldBe("msg", "'RangeError: Maximum call stack size exceeded.'"); 77 shouldBe("msg", "'RangeError: Maximum call stack size exceeded.'");
|
/external/compiler-rt/lib/asan/ |
asan_stack.cc | 12 // Code for ASan stack trace. 27 void PrintStack(StackTrace *stack) { 28 stack->PrintStack(stack->trace, stack->size, common_flags()->symbolize,
|
/external/compiler-rt/lib/tsan/rtl/ |
tsan_report.h | 54 ReportStack *stack; member in struct:__tsan::ReportMop 78 ReportStack *stack; member in struct:__tsan::ReportLocation 87 ReportStack *stack; member in struct:__tsan::ReportThread 93 ReportStack *stack; member in struct:__tsan::ReportMutex 117 void PrintStack(const ReportStack *stack);
|
/external/llvm/lib/Target/R600/ |
AMDGPUFrameLowering.h | 11 /// \brief Interface to describe a layout of a stack frame on a AMDIL target 23 /// \brief Information about the stack frame layout on the AMDGPU targets. 25 /// It holds the direction of the stack growth, the known stack alignment on 35 /// values to the stack.
|
/external/nist-sip/java/gov/nist/core/ |
StackLogger.java | 7 * interface that loggers should implement so that the stack can log to various 15 * log a stack trace. This helps to look at the stack frame. 20 * Log a stack trace if the current logging level exceeds 116 * Stack creation properties.
|
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
StackMessageFactory.java | 29 package gov.nist.javax.sip.stack; 34 * by the application and called by the stack for processing requests 35 * and responses. When a Request comes in off the wire, the stack calls 37 * When a response comes off the wire, the stack calls newSIPServerResponse 61 * Generate a new server response for the stack.
|
/external/proguard/docs/manual/retrace/ |
introduction.html | 14 stack traces. 16 When an obfuscated program throws an exception, the resulting stack trace 48 <td class="whiteblock">Readable stack trace</td> 50 <td class="whiteblock">Obfuscated stack trace</td> 55 ReTrace can read an obfuscated stack trace and restore it to what it would
|
/external/proguard/src/proguard/classfile/attribute/preverification/ |
SameOneFrame.java | 28 * This StackMapFrame represents a "same locals 1 stack item frame" or a 29 * "same locals 1 stack item frame extended". 56 * Creates a SameOneFrame with the given stack verification type. 65 * Applies the given verification type visitor to the stack item. 113 return super.toString()+"Var: ..., Stack: ["+stackItem.toString()+"]";
|
/frameworks/base/core/java/android/app/ |
TaskStackBuilder.java | 43 * <p>When crossing from one task stack to another post-Android 3.0, 44 * the application should synthesize a back stack/history for the new task so that 53 * For more detailed information about tasks, the back stack, and navigation design guidelines, 55 * <a href="{@docRoot}guide/topics/fundamentals/tasks-and-back-stack.html">Tasks and Back Stack</a> 71 * Return a new TaskStackBuilder for launching a fresh task stack consisting 74 * @param context The context that will launch the new task stack or generate a PendingIntent 82 * Add a new Intent to the task stack. The most recently added Intent will invoke 83 * the Activity at the top of the final task stack. 85 * @param nextIntent Intent for the next Activity in the synthesized task stack [all...] |
/ndk/sources/cxx-stl/llvm-libc++/libcxx/test/containers/container.adaptors/stack/stack.cons.alloc/ |
ctor_container_alloc.pass.cpp | 10 // <stack> 13 // stack(const container_type& c, const Alloc& a); 15 #include <stack> 33 : public std::stack<int, C> 35 typedef std::stack<int, C> base;
|
ctor_rcontainer_alloc.pass.cpp | 10 // <stack> 13 // stack(const container_type& c, const Alloc& a); 15 #include <stack> 37 : public std::stack<T, C> 39 typedef std::stack<T, C> base;
|
/external/chromium_org/media/base/simd/ |
linear_scale_yuv_to_rgb_mmx.inc | 58 ; Defines for stack variables. These are used in both PIC and non-PIC code. 63 ; Handle stack variables differently for PIC and non-PIC code. 66 ; Define stack usage for PIC code. PIC code push U plane onto stack. 78 ; Define stack usage. Non-PIC code just push 3 registers to stack. 101 mov Uq, U_PLANE ; PIC code saves U_PLANE on stack. 121 mov Vq, V_PLANE ; Read V address from stack 131 add Xq, SOURCE_DX ; Add source_dx from stack 142 cmp Xq, SOURCE_WIDTH ; Compare source_width from stack [all...] |
/external/chromium_org/third_party/tcmalloc/chromium/src/gperftools/ |
stacktrace.h | 33 // Routines to extract the current stack trace. These functions are 49 // Skips the most recent "skip_count" stack frames (also skips the 52 // "result", and the corresponding stack frame sizes in "sizes". 71 // And corresponding stack frame sizes will also be recorded: 74 // (Stack frame sizes of 16 above are just for illustration purposes.) 75 // Stack frame sizes of 0 or less indicate that those frame sizes couldn't 78 // This routine may return fewer stack frame entries than are 86 // better stack trace under certain conditions. The "uc" may safely be NULL. 91 // the stack trace only, and not the stack frame sizes as well [all...] |
/external/chromium_org/third_party/tcmalloc/vendor/src/gperftools/ |
stacktrace.h | 33 // Routines to extract the current stack trace. These functions are 49 // Skips the most recent "skip_count" stack frames (also skips the 52 // "result", and the corresponding stack frame sizes in "sizes". 71 // And corresponding stack frame sizes will also be recorded: 74 // (Stack frame sizes of 16 above are just for illustration purposes.) 75 // Stack frame sizes of 0 or less indicate that those frame sizes couldn't 78 // This routine may return fewer stack frame entries than are 86 // better stack trace under certain conditions. The "uc" may safely be NULL. 91 // the stack trace only, and not the stack frame sizes as well [all...] |
/external/compiler-rt/lib/msan/ |
msan_report.cc | 64 " in the stack frame of function '%s%s%s'%s\n", 77 static void ReportSummary(const char *error_type, StackTrace *stack) { 78 if (!stack->size || !IsSymbolizerAvailable()) return; 80 uptr pc = StackTrace::GetPreviousInstructionPc(stack->trace[0]); 91 void ReportUMR(StackTrace *stack, u32 origin) { 100 PrintStack(stack->trace, stack->size); 104 ReportSummary("use-of-uninitialized-value", stack); 107 void ReportExpectedUMRNotFound(StackTrace *stack) { 111 PrintStack(stack->trace, stack->size) [all...] |
/art/runtime/entrypoints/jni/ |
jni_entrypoints.cc | 62 // On entry the stack pointed by sp is: 74 intptr_t* arg_ptr = sp + 4; // pointer to r1 on stack 80 int reg_num = 2; // Current register being processed, -1 for stack arguments. 96 arg_ptr += 3; // unaligned, pad and move through stack arguments 98 arg_ptr += 2; // aligned, move through stack arguments 106 arg_ptr = sp + 8; // skip to outgoing stack arguments 110 arg_ptr++; // move through stack arguments
|
/dalvik/dx/src/com/android/dx/cf/code/ |
Frame.java | 27 * of a set of locals and a value stack, and it can be told to act on 35 /** {@code non-null;} the stack */ 36 private final ExecutionStack stack; field in class:Frame 38 /** {@code null-ok;} stack of labels of subroutines that this block is nested in */ 45 * @param stack {@code non-null;} the execution stack to use 47 private Frame(LocalsArray locals, ExecutionStack stack) { 48 this(locals, stack, IntList.EMPTY); 55 * @param stack {@code non-null;} the execution stack to us [all...] |
/external/antlr/antlr-3.4/tool/src/main/java/org/antlr/analysis/ |
NFAContext.java | 32 * so we can walk back up the tree (i.e., pop stuff off the stack). We 33 * never walk from stack down down through the children. 36 * representing all possible return nodes. The initial stack has 48 * you bound the stack so your states don't explode. The main difference 49 * is that I bound only recursion on the stack, not the simple stack size. 53 * Bermudez's m operates differently as it is his LR stack depth 54 * I'm pretty sure it therefore includes all stack symbols. Here I 56 * stack component may mention the same NFA invocation state at 63 * This constant prevents new states from being created after a stack get [all...] |
/external/chromium_org/native_client_sdk/src/libraries/third_party/pthreads-win32/ |
pthread_attr_setstackaddr.c | 46 * Threads created with 'attr' will run on the stack 48 * Stack must be at least PTHREAD_STACK_MIN bytes. 55 * the address of the stack to use 59 * Threads created with 'attr' will run on the stack 61 * Stack must be at least PTHREAD_STACK_MIN bytes. 69 * 2) Create only one thread for each stack 75 * 0 successfully set stack address,
|
/external/chromium_org/third_party/WebKit/Source/wtf/ |
StackStats.h | 32 // Define this flag to enable Stack stats collection. This feature is useful 33 // for getting a sample of native stack usage sizes. 52 // each location in code where a stack recursion check is being done. 78 // each location in code where a stack recursion check is being done. 114 // Used for probing the stack at places where we suspect to be high 115 // points of stack usage but are NOT check points where stack recursion
|