/external/valgrind/main/exp-sgcheck/docs/ |
sg-manual.xml | 8 xreflabel="SGCheck: an experimental stack and global array overrun detector"> 9 <title>SGCheck: an experimental stack and global array overrun detector</title> 21 <para>SGCheck is a tool for finding overruns of stack and global 23 observation about the likely forms of stack and global array accesses. 53 debugging information which describes the location of all stack and 63 if a memory referencing instruction accesses inside a stack or 77 of <computeroutput>a[]</computeroutput> on the stack, and so we can 83 possibly an un-accounted for area of the stack (eg, spill slot), so 91 copying loop only ever access one particular stack or global variable, we 115 created by heap or stack allocations. But it does not perform bound [all...] |
/external/compiler-rt/lib/asan/ |
asan_report.cc | 134 PrintShadowByte(" Stack left redzone: ", kAsanStackLeftRedzoneMagic); 135 PrintShadowByte(" Stack mid redzone: ", kAsanStackMidRedzoneMagic); 136 PrintShadowByte(" Stack right redzone: ", kAsanStackRightRedzoneMagic); 137 PrintShadowByte(" Stack partial redzone: ", kAsanStackPartialRedzoneMagic); 138 PrintShadowByte(" Stack after return: ", kAsanStackAfterReturnMagic); 139 PrintShadowByte(" Stack use after scope: ", kAsanStackUseAfterScopeMagic); 290 Printf("Address %p is located in stack of thread T%d%s " 296 // We print this frame as a stack trace with one element. 298 // The frame numbers may be different than those in the stack trace printed 301 // (e.g. use-after-scope, or different thread's stack) [all...] |
/external/apache-harmony/support/src/test/java/tests/util/ |
CallVerificationStack.java | 20 import java.util.Stack; 23 * A stack to store the parameters of a call, as well as the call stack. 26 public class CallVerificationStack extends Stack<Object> { 45 // the call stack, store StackTraceElement 46 private final Stack<StackTraceElement> callStack = new Stack<StackTraceElement>(); 77 * Pushes the call stack. 109 * Clear the parameter stack and the call stack [all...] |
/external/apache-xml/src/main/java/org/apache/xalan/processor/ |
StylesheetHandler.java | 23 import java.util.Stack; 62 * a ContentHandler stack, and pushing appropriate content 219 * Utility function to see if the stack contains the given URL. 221 * @param stack non-null reference to a Stack. 224 * @return true if the stack contains the url argument. 226 private boolean stackContains(Stack stack, String url) 229 int n = stack.size(); 234 String url2 = (String) stack.elementAt(i) [all...] |
/external/chromium_org/v8/src/ |
execution.h | 143 // If the stack guard is triggered, but it is not an actual 144 // stack overflow, then handle the interruption accordingly. 166 // number of nested invocations of JavaScript and the stack size used in each 170 // Pass the address beyond which the stack should not grow. The stack 179 // Sets up the default stack guard for this thread if it has not 182 // Clears the stack guard for this thread so it does not look as if 206 // This provides an asynchronous read of the stack limits for the current 271 // Returns true if the heap's stack limits should be set, false if not. 274 // The stack limit is split into a JavaScript and a C++ stack limit. Thes [all...] |
/external/v8/src/ |
execution.h | 146 // If the stack guard is triggered, but it is not an actual 147 // stack overflow, then handle the interruption accordingly. 169 // number of nested invocations of JavaScript and the stack size used in each 173 // Pass the address beyond which the stack should not grow. The stack 182 // Sets up the default stack guard for this thread if it has not 185 // Clears the stack guard for this thread so it does not look as if 208 // This provides an asynchronous read of the stack limits for the current 273 // Returns true if the heap's stack limits should be set, false if not. 276 // The stack limit is split into a JavaScript and a C++ stack limit. Thes [all...] |
/libcore/support/src/test/java/tests/util/ |
CallVerificationStack.java | 20 import java.util.Stack; 23 * A stack to store the parameters of a call, as well as the call stack. 26 public class CallVerificationStack extends Stack<Object> { 45 // the call stack, store StackTraceElement 46 private final Stack<StackTraceElement> callStack = new Stack<StackTraceElement>(); 77 * Pushes the call stack. 109 * Clear the parameter stack and the call stack [all...] |
/dalvik/vm/arch/mips/ |
HintsO32.cpp | 19 * argument list has to be pushed onto the native stack according to 56 * L - number of double-words of storage required on the stack (0-30 words) 57 * F - pad flag -- if set, the stack increases 8 bytes, else the stack increases 4 bytes 58 * after copying 32 bits args into stack. (little different from ARM) 106 * 16 bytes on stack in CallO32.S, so we should subtract 2 from stackOffset.
|
/dalvik/vm/mterp/armv5te/ |
entry.S | 21 * We don't have formal stack frames, so gdb scans upward in the code 24 * got pushed onto the stack. From this it figures out how to restore 25 * the registers, including PC, for the previous stack frame. If gdb 57 /* save stack pointer, add magic word for debuggerd */ 112 * Restore the stack pointer and PC from the save point established on entry. 116 * We pushed some registers on the stack in dvmMterpStdRun, then saved
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
CustomElementCallbackDispatcher.h | 48 // This is stack allocated in many DOM callbacks. Make it cheap. 84 // CallbackDeliveryScope active. Also, if the processing stack 94 // stack. An offset into instance().m_flattenedProcessingStack. 98 // stack. A cache of instance().m_flattenedProcessingStack.size(). 112 // The processing stack, flattened. Element queues lower in the 113 // stack appear toward the head of the vector. The first element
|
/external/chromium_org/v8/test/mjsunit/ |
error-constructors.js | 39 desc = Object.getOwnPropertyDescriptor(e, 'stack'); 56 ReferenceError.prototype.__defineSetter__('stack', fail); 59 assertTrue(e.hasOwnProperty('stack')); 63 assertTrue(e.hasOwnProperty('stack')); 66 assertTrue(e.hasOwnProperty('stack')); 76 var props = ["name", "message", "stack"];
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_posix_libcdep.cc | 93 void GetStackTrace(StackTrace *stack, uptr max_s, uptr pc, uptr bp, 103 return stack->SlowUnwindStack(pc, max_s); 105 stack->size = 0; 106 stack->trace[0] = pc; 108 stack->max_size = max_s; 109 stack->FastUnwindStack(pc, bp, stack_top, stack_bottom);
|
/external/llvm/include/llvm/Support/ |
PrettyStackTrace.h | 31 /// "pretty" stack trace that is dumped when a program crashes. You can define 32 /// subclasses of this and declare them on the program stack: when they are 34 /// virtual stack trace. This gets dumped out if the program crashes. 43 /// print - Emit information about this stack frame to OS. 51 /// should not contain newlines) to the stream as the stack trace when a crash 61 /// to the stream as the stack trace when a crash occurs.
|
/external/llvm/lib/CodeGen/ |
StackSlotColoring.cpp | 1 //===-- StackSlotColoring.cpp - Stack slot coloring pass. -----------------===// 10 // This file implements the stack slot coloring pass. 37 DisableSharing("no-stack-slot-sharing", 39 cl::desc("Suppress slot sharing during stack coloring")); 43 STATISTIC(NumEliminated, "Number of stack slots eliminated due to coloring"); 44 STATISTIC(NumDead, "Number of trivially dead stack accesses eliminated"); 62 // OrigAlignments - Alignments of stack objects before coloring. 65 // OrigSizes - Sizess of stack objects before coloring. 70 // closest to stack pointer / frame pointer. Therefore, smaller 118 INITIALIZE_PASS_BEGIN(StackSlotColoring, "stack-slot-coloring" [all...] |
/external/llvm/lib/Target/Sparc/ |
SparcInstrInfo.h | 50 /// load from a stack slot, return the virtual or physical register number of 51 /// the destination along with the FrameIndex of the loaded stack slot. If 53 /// any side effects other than loading from the stack slot. 58 /// store to a stack slot, return the virtual or physical register number of 59 /// the source reg along with the FrameIndex of the loaded stack slot. If 61 /// any side effects other than storing to the stack slot.
|
/external/llvm/lib/Target/XCore/ |
XCoreInstrInfo.h | 37 /// load from a stack slot, return the virtual or physical register number of 38 /// the destination along with the FrameIndex of the loaded stack slot. If 40 /// any side effects other than loading from the stack slot. 45 /// store to a stack slot, return the virtual or physical register number of 46 /// the source reg along with the FrameIndex of the loaded stack slot. If 48 /// any side effects other than storing to the stack slot.
|
/external/llvm/test/CodeGen/R600/ |
indirect-addressing.ll | 16 %stack = alloca [5 x i32], align 4 18 %arrayidx1 = getelementptr inbounds [5 x i32]* %stack, i32 0, i32 %0 22 %arrayidx3 = getelementptr inbounds [5 x i32]* %stack, i32 0, i32 %1 24 %arrayidx10 = getelementptr inbounds [5 x i32]* %stack, i32 0, i32 0 27 %arrayidx12 = getelementptr inbounds [5 x i32]* %stack, i32 0, i32 1 34 ; This test checks that the stack offset is calculated correctly for structs.
|
/external/proguard/src/proguard/preverify/ |
CodePreverifier.java | 109 // Collect the stack map frames. 126 // Convert the stack values to types. 140 // Compress the stack map frames if the target is not Java Micro Edition. 198 // Remove any stack map (table) attribute from the code attribute. 212 // Put the frames into a stack map attribute. 221 // Put the frames into a stack map table attribute. 225 // Fill out the name of the stack map attribute. 229 // Add the new stack map (table) attribute to the code attribute. 328 * stack. If necessary, class constants are added to the constant pool 335 TracedStack stack) 500 VerificationType[] stack = fullFrame.stack; local [all...] |
/external/valgrind/main/docs/internals/ |
tracking-fn-entry-exit.txt | 20 > complicated things to get it right, eg. unwinding the stack. How robust 30 I have a shadow call stack for every thread. For signal handlers of a thread, 31 I first PUSH a separation marker on the shadow stack, and use the stack as 45 - do unwinding if needed (i.e, POPs of the shadow call stack) 47 - if our call stack is empty, simulate a CALL lasting from beginning 55 BB on shadow call stack. 114 > - have a shadow call stack for every thread 123 changes with %esp > stored esp on shadow stack. 139 the stack, a normal jump will rarely jump to the first BB of a function, [all...] |
/external/valgrind/main/exp-bbv/tests/x86/ |
fldcw_check.S | 34 # offset on stack 35 stack: label 36 sub $4,%esp # allocate space on stack 39 add $4,%esp # restore stack 85 fldl three # load value onto fp stack 91 fistpl result # save stack value as integer to mem
|
/external/valgrind/main/memcheck/tests/ |
origin1-yes.stderr.exp | 2 Undef 1 of 8 (stack, 32 bit) 5 Uninitialised value was created by a stack allocation 9 Undef 2 of 8 (stack, 32 bit) 12 Uninitialised value was created by a stack allocation 16 Undef 3 of 8 (stack, 64 bit) 19 Uninitialised value was created by a stack allocation
|
/dalvik/dx/src/com/android/dx/cf/code/ |
Simulator.java | 118 * Constructs an "illegal top-of-stack" exception, for the stack 122 return new SimException("stack mismatch: illegal " + 123 "top-of-stack for opcode"); 136 * to the actual array present on the stack, as long as what is 141 * actually present on the stack.</p> 143 * <p>In the case where there is a known-null on the stack where 156 * stack; is either an array type or a known-null 363 * over one extra stack slot to find the array. 365 ExecutionStack stack = frame.getStack() local 386 ExecutionStack stack = frame.getStack(); local 418 ExecutionStack stack = frame.getStack(); local 430 ExecutionStack stack = frame.getStack(); local 450 ExecutionStack stack = frame.getStack(); local 471 ExecutionStack stack = frame.getStack(); local 503 ExecutionStack stack = frame.getStack(); local [all...] |
/bionic/libc/arch-arm/bionic/ |
kill.S | 34 on the stack, as well as a few other registers. this makes 35 our stack unwinder happy, when we generate debug stack
|
tgkill.S | 34 on the stack, as well as a few other registers. this makes 35 our stack unwinder happy, when we generate debug stack
|
tkill.S | 34 on the stack, as well as a few other registers. this makes 35 our stack unwinder happy, when we generate debug stack
|