HomeSort by relevance Sort by last modified time
    Searched full:stack (Results 826 - 850 of 10778) sorted by null

<<31323334353637383940>>

  /external/valgrind/main/exp-sgcheck/docs/
sg-manual.xml 8 xreflabel="SGCheck: an experimental stack and global array overrun detector">
9 <title>SGCheck: an experimental stack and global array overrun detector</title>
21 <para>SGCheck is a tool for finding overruns of stack and global
23 observation about the likely forms of stack and global array accesses.
53 debugging information which describes the location of all stack and
63 if a memory referencing instruction accesses inside a stack or
77 of <computeroutput>a[]</computeroutput> on the stack, and so we can
83 possibly an un-accounted for area of the stack (eg, spill slot), so
91 copying loop only ever access one particular stack or global variable, we
115 created by heap or stack allocations. But it does not perform bound
    [all...]
  /external/compiler-rt/lib/asan/
asan_report.cc 134 PrintShadowByte(" Stack left redzone: ", kAsanStackLeftRedzoneMagic);
135 PrintShadowByte(" Stack mid redzone: ", kAsanStackMidRedzoneMagic);
136 PrintShadowByte(" Stack right redzone: ", kAsanStackRightRedzoneMagic);
137 PrintShadowByte(" Stack partial redzone: ", kAsanStackPartialRedzoneMagic);
138 PrintShadowByte(" Stack after return: ", kAsanStackAfterReturnMagic);
139 PrintShadowByte(" Stack use after scope: ", kAsanStackUseAfterScopeMagic);
290 Printf("Address %p is located in stack of thread T%d%s "
296 // We print this frame as a stack trace with one element.
298 // The frame numbers may be different than those in the stack trace printed
301 // (e.g. use-after-scope, or different thread's stack)
    [all...]
  /external/apache-harmony/support/src/test/java/tests/util/
CallVerificationStack.java 20 import java.util.Stack;
23 * A stack to store the parameters of a call, as well as the call stack.
26 public class CallVerificationStack extends Stack<Object> {
45 // the call stack, store StackTraceElement
46 private final Stack<StackTraceElement> callStack = new Stack<StackTraceElement>();
77 * Pushes the call stack.
109 * Clear the parameter stack and the call stack
    [all...]
  /external/apache-xml/src/main/java/org/apache/xalan/processor/
StylesheetHandler.java 23 import java.util.Stack;
62 * a ContentHandler stack, and pushing appropriate content
219 * Utility function to see if the stack contains the given URL.
221 * @param stack non-null reference to a Stack.
224 * @return true if the stack contains the url argument.
226 private boolean stackContains(Stack stack, String url)
229 int n = stack.size();
234 String url2 = (String) stack.elementAt(i)
    [all...]
  /external/chromium_org/v8/src/
execution.h 143 // If the stack guard is triggered, but it is not an actual
144 // stack overflow, then handle the interruption accordingly.
166 // number of nested invocations of JavaScript and the stack size used in each
170 // Pass the address beyond which the stack should not grow. The stack
179 // Sets up the default stack guard for this thread if it has not
182 // Clears the stack guard for this thread so it does not look as if
206 // This provides an asynchronous read of the stack limits for the current
271 // Returns true if the heap's stack limits should be set, false if not.
274 // The stack limit is split into a JavaScript and a C++ stack limit. Thes
    [all...]
  /external/v8/src/
execution.h 146 // If the stack guard is triggered, but it is not an actual
147 // stack overflow, then handle the interruption accordingly.
169 // number of nested invocations of JavaScript and the stack size used in each
173 // Pass the address beyond which the stack should not grow. The stack
182 // Sets up the default stack guard for this thread if it has not
185 // Clears the stack guard for this thread so it does not look as if
208 // This provides an asynchronous read of the stack limits for the current
273 // Returns true if the heap's stack limits should be set, false if not.
276 // The stack limit is split into a JavaScript and a C++ stack limit. Thes
    [all...]
  /libcore/support/src/test/java/tests/util/
CallVerificationStack.java 20 import java.util.Stack;
23 * A stack to store the parameters of a call, as well as the call stack.
26 public class CallVerificationStack extends Stack<Object> {
45 // the call stack, store StackTraceElement
46 private final Stack<StackTraceElement> callStack = new Stack<StackTraceElement>();
77 * Pushes the call stack.
109 * Clear the parameter stack and the call stack
    [all...]
  /dalvik/vm/arch/mips/
HintsO32.cpp 19 * argument list has to be pushed onto the native stack according to
56 * L - number of double-words of storage required on the stack (0-30 words)
57 * F - pad flag -- if set, the stack increases 8 bytes, else the stack increases 4 bytes
58 * after copying 32 bits args into stack. (little different from ARM)
106 * 16 bytes on stack in CallO32.S, so we should subtract 2 from stackOffset.
  /dalvik/vm/mterp/armv5te/
entry.S 21 * We don't have formal stack frames, so gdb scans upward in the code
24 * got pushed onto the stack. From this it figures out how to restore
25 * the registers, including PC, for the previous stack frame. If gdb
57 /* save stack pointer, add magic word for debuggerd */
112 * Restore the stack pointer and PC from the save point established on entry.
116 * We pushed some registers on the stack in dvmMterpStdRun, then saved
  /external/chromium_org/third_party/WebKit/Source/core/dom/
CustomElementCallbackDispatcher.h 48 // This is stack allocated in many DOM callbacks. Make it cheap.
84 // CallbackDeliveryScope active. Also, if the processing stack
94 // stack. An offset into instance().m_flattenedProcessingStack.
98 // stack. A cache of instance().m_flattenedProcessingStack.size().
112 // The processing stack, flattened. Element queues lower in the
113 // stack appear toward the head of the vector. The first element
  /external/chromium_org/v8/test/mjsunit/
error-constructors.js 39 desc = Object.getOwnPropertyDescriptor(e, 'stack');
56 ReferenceError.prototype.__defineSetter__('stack', fail);
59 assertTrue(e.hasOwnProperty('stack'));
63 assertTrue(e.hasOwnProperty('stack'));
66 assertTrue(e.hasOwnProperty('stack'));
76 var props = ["name", "message", "stack"];
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_posix_libcdep.cc 93 void GetStackTrace(StackTrace *stack, uptr max_s, uptr pc, uptr bp,
103 return stack->SlowUnwindStack(pc, max_s);
105 stack->size = 0;
106 stack->trace[0] = pc;
108 stack->max_size = max_s;
109 stack->FastUnwindStack(pc, bp, stack_top, stack_bottom);
  /external/llvm/include/llvm/Support/
PrettyStackTrace.h 31 /// "pretty" stack trace that is dumped when a program crashes. You can define
32 /// subclasses of this and declare them on the program stack: when they are
34 /// virtual stack trace. This gets dumped out if the program crashes.
43 /// print - Emit information about this stack frame to OS.
51 /// should not contain newlines) to the stream as the stack trace when a crash
61 /// to the stream as the stack trace when a crash occurs.
  /external/llvm/lib/CodeGen/
StackSlotColoring.cpp 1 //===-- StackSlotColoring.cpp - Stack slot coloring pass. -----------------===//
10 // This file implements the stack slot coloring pass.
37 DisableSharing("no-stack-slot-sharing",
39 cl::desc("Suppress slot sharing during stack coloring"));
43 STATISTIC(NumEliminated, "Number of stack slots eliminated due to coloring");
44 STATISTIC(NumDead, "Number of trivially dead stack accesses eliminated");
62 // OrigAlignments - Alignments of stack objects before coloring.
65 // OrigSizes - Sizess of stack objects before coloring.
70 // closest to stack pointer / frame pointer. Therefore, smaller
118 INITIALIZE_PASS_BEGIN(StackSlotColoring, "stack-slot-coloring"
    [all...]
  /external/llvm/lib/Target/Sparc/
SparcInstrInfo.h 50 /// load from a stack slot, return the virtual or physical register number of
51 /// the destination along with the FrameIndex of the loaded stack slot. If
53 /// any side effects other than loading from the stack slot.
58 /// store to a stack slot, return the virtual or physical register number of
59 /// the source reg along with the FrameIndex of the loaded stack slot. If
61 /// any side effects other than storing to the stack slot.
  /external/llvm/lib/Target/XCore/
XCoreInstrInfo.h 37 /// load from a stack slot, return the virtual or physical register number of
38 /// the destination along with the FrameIndex of the loaded stack slot. If
40 /// any side effects other than loading from the stack slot.
45 /// store to a stack slot, return the virtual or physical register number of
46 /// the source reg along with the FrameIndex of the loaded stack slot. If
48 /// any side effects other than storing to the stack slot.
  /external/llvm/test/CodeGen/R600/
indirect-addressing.ll 16 %stack = alloca [5 x i32], align 4
18 %arrayidx1 = getelementptr inbounds [5 x i32]* %stack, i32 0, i32 %0
22 %arrayidx3 = getelementptr inbounds [5 x i32]* %stack, i32 0, i32 %1
24 %arrayidx10 = getelementptr inbounds [5 x i32]* %stack, i32 0, i32 0
27 %arrayidx12 = getelementptr inbounds [5 x i32]* %stack, i32 0, i32 1
34 ; This test checks that the stack offset is calculated correctly for structs.
  /external/proguard/src/proguard/preverify/
CodePreverifier.java 109 // Collect the stack map frames.
126 // Convert the stack values to types.
140 // Compress the stack map frames if the target is not Java Micro Edition.
198 // Remove any stack map (table) attribute from the code attribute.
212 // Put the frames into a stack map attribute.
221 // Put the frames into a stack map table attribute.
225 // Fill out the name of the stack map attribute.
229 // Add the new stack map (table) attribute to the code attribute.
328 * stack. If necessary, class constants are added to the constant pool
335 TracedStack stack)
500 VerificationType[] stack = fullFrame.stack; local
    [all...]
  /external/valgrind/main/docs/internals/
tracking-fn-entry-exit.txt 20 > complicated things to get it right, eg. unwinding the stack. How robust
30 I have a shadow call stack for every thread. For signal handlers of a thread,
31 I first PUSH a separation marker on the shadow stack, and use the stack as
45 - do unwinding if needed (i.e, POPs of the shadow call stack)
47 - if our call stack is empty, simulate a CALL lasting from beginning
55 BB on shadow call stack.
114 > - have a shadow call stack for every thread
123 changes with %esp > stored esp on shadow stack.
139 the stack, a normal jump will rarely jump to the first BB of a function,
    [all...]
  /external/valgrind/main/exp-bbv/tests/x86/
fldcw_check.S 34 # offset on stack
35 stack: label
36 sub $4,%esp # allocate space on stack
39 add $4,%esp # restore stack
85 fldl three # load value onto fp stack
91 fistpl result # save stack value as integer to mem
  /external/valgrind/main/memcheck/tests/
origin1-yes.stderr.exp 2 Undef 1 of 8 (stack, 32 bit)
5 Uninitialised value was created by a stack allocation
9 Undef 2 of 8 (stack, 32 bit)
12 Uninitialised value was created by a stack allocation
16 Undef 3 of 8 (stack, 64 bit)
19 Uninitialised value was created by a stack allocation
  /dalvik/dx/src/com/android/dx/cf/code/
Simulator.java 118 * Constructs an "illegal top-of-stack" exception, for the stack
122 return new SimException("stack mismatch: illegal " +
123 "top-of-stack for opcode");
136 * to the actual array present on the stack, as long as what is
141 * actually present on the stack.</p>
143 * <p>In the case where there is a known-null on the stack where
156 * stack; is either an array type or a known-null
363 * over one extra stack slot to find the array.
365 ExecutionStack stack = frame.getStack() local
386 ExecutionStack stack = frame.getStack(); local
418 ExecutionStack stack = frame.getStack(); local
430 ExecutionStack stack = frame.getStack(); local
450 ExecutionStack stack = frame.getStack(); local
471 ExecutionStack stack = frame.getStack(); local
503 ExecutionStack stack = frame.getStack(); local
    [all...]
  /bionic/libc/arch-arm/bionic/
kill.S 34 on the stack, as well as a few other registers. this makes
35 our stack unwinder happy, when we generate debug stack
tgkill.S 34 on the stack, as well as a few other registers. this makes
35 our stack unwinder happy, when we generate debug stack
tkill.S 34 on the stack, as well as a few other registers. this makes
35 our stack unwinder happy, when we generate debug stack

Completed in 1457 milliseconds

<<31323334353637383940>>