/external/compiler-rt/test/asan/TestCases/Linux/ |
stress_dtls.c | 58 uintptr_t stack; local 59 // fprintf(stderr, "STACK: %p TLS: %p SELF: %p\n", &stack, &my_tls,
|
/external/junit/src/junit/runner/ |
BaseTestRunner.java | 269 * Returns a filtered stack trace 288 * Filters stack frames from internal JUnit classes 290 public static String getFilteredTrace(String stack) { 292 return stack; 296 StringReader sr= new StringReader(stack); 309 return stack; // return the stack unfiltered
|
/external/libunwind/src/hppa/ |
getcontext.S | 55 SPILL (30) /* stack pointer */ 72 /* We do not need executable stack. */ 73 .section .note.GNU-stack,"",@progbits
|
setcontext.S | 58 FILL (30) /* stack pointer */ 75 /* We do not need executable stack. */ 76 .section .note.GNU-stack,"",@progbits
|
/external/libunwind/src/ia64/ |
siglongjmp.S | 46 * Note: we can use the scratch stack are because the caller 67 /* We do not need executable stack. */ 68 .section .note.GNU-stack,"",@progbits
|
sigsetjmp.S | 67 /* We do not need executable stack. */ 68 .section .note.GNU-stack,"",@progbits
|
/external/libunwind/src/x86/ |
getcontext-linux.S | 73 /* We do not need executable stack. */ 74 .section .note.GNU-stack,"",@progbits
|
siglongjmp.S | 35 /* Stack layout at this point: 91 /* We do not need executable stack. */ 92 .section .note.GNU-stack,"",@progbits
|
/external/libvpx/libvpx/vp8/common/arm/armv6/ |
sixtappredict8x4_v6.asm | 20 ; stack unsigned char *dst_ptr, 21 ; stack int dst_pitch 23 ;note: In first pass, store the result in transpose(8linesx9columns) on stack. Temporary stack size is 184. 24 ;Line width is 20 that is 9 short data plus 2 to make it 4bytes aligned. In second pass, load data from stack, 28 str r3, [sp, #-184]! ;reserve space on stack for temporary storage, store yoffset 124 ldr r0, [sp, #216] ; load dst address from stack 180+36 125 ldr r1, [sp, #220] ; load dst stride from stack 180+40
|
/external/libvpx/libvpx/vp8/encoder/ppc/ |
rdopt_altivec.asm | 22 stwu r1,-32(r1) ;# create space on the stack 48 addi r1, r1, 32 ;# recover stack
|
/external/llvm/include/llvm/CodeGen/PBQP/ |
ReductionRules.h | 159 Solution backpropagate(GraphT& G, StackT stack) { 166 while (!stack.empty()) { 167 NodeId NId = stack.back(); 168 stack.pop_back();
|
/external/ltrace/testsuite/ltrace.torture/ |
ia64-sigill.s | 42 .section .note.GNU-stack,"",@progbits
|
/external/mesa3d/src/glx/ |
indirect_vertex_array_priv.h | 306 struct array_stack_state *stack; member in struct:array_state_vector
|
/external/mockito/cglib-and-asm/src/org/mockito/asm/ |
MethodVisitor.java | 104 * Visits the current state of the local variables and operand stack
109 * values of the local variables and of the operand stack elements <i>just
116 * locals as the previous frame and with the empty stack.</li> <li>{@link Opcodes#F_SAME1}
118 * with single value on the stack (<code>nStack</code> is 1 and
119 * <code>stack[0]</code> contains value for the type of the stack item).</li>
126 * locals are absent and with the empty stack (<code>nLocals</code> is 1,
130 * @param type the type of this stack map frame. Must be
147 * @param nStack the number of operand stack elements in the visited frame.
148 * @param stack the operand stack types in this frame. This array must not [all...] |
/external/openssl/crypto/txt_db/ |
txt_db.h | 66 #include <openssl/stack.h>
|
/external/openssl/include/openssl/ |
txt_db.h | 66 #include <openssl/stack.h>
|
/external/skia/tests/ |
ClipCacheTest.cpp | 71 // create a clip stack that will (trivially) reduce to a single rect that 73 SkClipStack stack; local 74 stack.clipDevRect(clipRect, SkRegion::kReplace_Op, false); 79 stack.getConservativeBounds(0, 0, kXSize, kYSize, 89 clipData.fClipStack = &stack; 102 // verify that the top state of the stack matches the passed in state
|
/external/valgrind/main/coregrind/ |
m_stacks.c | 3 /*--- Stack management. m_stacks.c ---*/ 44 The stack 46 The stack's segment seems to be dynamically extended downwards by 47 the kernel as the stack pointer moves down. Initially, a 1-page 48 (4k) stack is allocated. When SP moves below that for the first 51 upwards to the current valid stack. It then extends the stack 56 That means that Valgrind can't spot when the stack segment is being 58 update stack permissions around SP, so we need to spot all writes 61 The deal is: when SP is assigned a lower value, the stack is bein 266 Stack* stack = find_stack_by_addr(SP); local [all...] |
/external/valgrind/main/coregrind/m_syswrap/ |
syscall-mips64-linux.S | 74 /* save regs $a0 - $a4 on stack */ 148 /* Let the linker know we don't need an executable stack */ 149 .section .note.GNU-stack,"",%progbits
|
syscall-ppc32-linux.S | 78 /* make a stack frame */ 128 /* pop off stack frame */ 158 /* Let the linker know we don't need an executable stack */ 159 .section .note.GNU-stack,"",@progbits
|
syscall-ppc64-linux.S | 86 /* make a stack frame */ 136 /* pop off stack frame */ 165 /* Let the linker know we don't need an executable stack */ 166 .section .note.GNU-stack,"",@progbits
|
/external/valgrind/main/helgrind/tests/ |
filter_xml | 11 # (2) Removal of stack frames 12 # Stack frames whose associated file name does not match any name in 24 # these files will be removed from stack frames matching these files. 143 if ($line =~ /<\/stack>/) {
|
/external/valgrind/main/massif/tests/ |
deep-B.stderr.exp | 47 Massif: stack allocs: 0 48 Massif: stack frees: 0
|
realloc.stderr.exp | 37 Massif: stack allocs: 0 38 Massif: stack frees: 0
|
/external/valgrind/main/memcheck/tests/x86/ |
pushfpopf_s.S | 18 # save possibly undef flags on stack
|