HomeSort by relevance Sort by last modified time
    Searched refs:stack (Results 901 - 925 of 3945) sorted by null

<<31323334353637383940>>

  /external/chromium_org/third_party/tcmalloc/vendor/src/
heap-profile-table.h 55 // Longest stack trace we record.
77 const void* const* call_stack; // call stack that made the allocation call
84 // An allocation context is a unique caller stack trace
87 int stack_depth; // Depth of stack trace
88 const void* const* call_stack; // Stack trace
100 // Collect the stack trace for the function that asked to do the
103 // The stack trace is stored in 'stack'. The stack depth is returned.
105 // 'skip_count' gives the number of stack frames between this cal
209 const void** stack; \/\/ Stack trace member in struct:HeapProfileTable::Bucket
    [all...]
tcmalloc.cc 197 "Allocations larger than this value cause a stack "
199 "dumping stack traces is increased by a factor of 1.125 "
496 t->stack[tcmalloc::kMaxStackDepth-1])) {
506 "tcmalloc: allocation failed for stack trace slots",
516 t->stack[tcmalloc::kMaxStackDepth-1])) {
527 result[used_slots+3+d] = t->stack[d];
980 StackTrace *stack = Static::stacktrace_allocator()->New(); local
1002 StackTrace stack; local
    [all...]
  /external/compiler-rt/lib/asan/
asan_interceptors.cc 39 // that no extra frames are created, and stack trace contains
48 ReportStringFunctionSizeOverflow(__offset, __size, &stack); \
73 offset2, length2, &stack); \
187 CreateThreadContextArgs args = { t, &stack };
236 static void ClearShadowMemoryForContextStack(uptr stack, uptr ssize) {
239 uptr bottom = stack & ~(PageSize - 1);
240 ssize += stack - bottom;
256 // Clear shadow memory for new context (it may share stack
258 uptr stack, ssize; local
259 ReadContextStack(ucp, &stack, &ssize)
    [all...]
asan_linux.cc 232 void ReadContextStack(void *context, uptr *stack, uptr *ssize) {
234 *stack = (uptr)ucp->uc_stack.ss_sp;
238 void ReadContextStack(void *context, uptr *stack, uptr *ssize) {
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_common.cc 200 void ReportErrorSummary(const char *error_type, StackTrace *stack) {
205 if (stack->size > 0 && Symbolizer::Get()->CanReturnFileLineInfo()) {
206 // Currently, we include the first stack frame into the report summary.
208 uptr pc = StackTrace::GetPreviousInstructionPc(stack->trace[0]);
sanitizer_linux_libcdep.cc 83 // Find the mapping that contains a stack variable.
99 // When running with unlimited stack size, we still want to set some limit.
100 // The unlimited stack size is caused by 'ulimit -s unlimited'.
101 // Also, for some reason, GNU make spawns subprocesses with unlimited stack.
177 "Failed to open libcorkscrew.so. You may see broken stack traces "
191 "You may see broken stack traces in SEGV reports.");
221 StackTrace *stack; member in struct:__sanitizer::UnwindTraceArg
227 CHECK_LT(arg->stack->size, arg->max_depth);
229 arg->stack->trace[arg->stack->size++] = pc
    [all...]
  /external/libvpx/libvpx/vp8/common/arm/neon/
variance_neon.asm 27 ; stack unsigned int *sse
70 ldr r12, [sp] ;load *sse from stack
140 ldr r12, [sp] ;load *sse from stack
195 ldr r12, [sp] ;load *sse from stack
216 ; stack unsigned int *sse
260 ldr r12, [sp] ;load *sse from stack
vp8_subpixelvariance8x8_neon.asm 22 ; stack(r4) unsigned char *dst_ptr,
23 ; stack(r5) int dst_pixels_per_line,
24 ; stack(r6) unsigned int *sse
31 ldr r4, [sp, #12] ;load *dst_ptr from stack
32 ldr r5, [sp, #16] ;load dst_pixels_per_line from stack
33 ldr lr, [sp, #20] ;load *sse from stack
  /external/llvm/test/MC/ARM/
eh-directive-pad.s 4 @ Check for different stack pointer offsets.
6 @ The .pad directive will track the stack pointer offsets. There are several
7 @ ways to encode the stack offsets. We have to test:
  /external/mockito/cglib-and-asm/src/org/mockito/cglib/transform/
MethodVisitorTee.java 29 public void visitFrame(int type, int nLocal, Object[] local, int nStack, Object[] stack) {
30 mv1.visitFrame(type, nLocal, local, nStack, stack);
31 mv2.visitFrame(type, nLocal, local, nStack, stack);
  /external/openssl/apps/
crl2p7.c 74 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile);
295 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
310 /* This loads from a file, a stack of x509/crl/pkey sets */
323 sk_X509_push(stack,xi->x509);
  /external/proguard/src/proguard/evaluation/
Stack.java 28 * This class represents an operand stack that contains <code>Value</code>
33 public class Stack
44 * Creates a new Stack with a given maximum size, accounting for the double
47 public Stack(int maxSize)
54 * Creates a Stack that is a copy of the given Stack.
56 public Stack(Stack stack)
59 this(stack.values.length)
    [all...]
  /external/srec/tools/grxmlcompile/
grxmldoc.h 28 #include <stack>
159 std::stack<ItemData*> m_ItemVarsStack;
160 std::stack<std::string> m_RuleListStack;
  /hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/vp8/common/arm/neon/
variance_neon.asm 27 ; stack unsigned int *sse
70 ldr r12, [sp] ;load *sse from stack
140 ldr r12, [sp] ;load *sse from stack
195 ldr r12, [sp] ;load *sse from stack
216 ; stack unsigned int *sse
260 ldr r12, [sp] ;load *sse from stack
vp8_subpixelvariance8x8_neon.asm 22 ; stack(r4) unsigned char *dst_ptr,
23 ; stack(r5) int dst_pixels_per_line,
24 ; stack(r6) unsigned int *sse
31 ldr r4, [sp, #12] ;load *dst_ptr from stack
32 ldr r5, [sp, #16] ;load dst_pixels_per_line from stack
33 ldr lr, [sp, #20] ;load *sse from stack
  /art/runtime/
instrumentation.cc 240 // need to push a DEX pc into the dex_pcs_ list to match size of instrumentation stack.
280 // Insert frame at the right position so we do not corrupt the instrumentation stack.
281 // Instrumentation stack frames are in descending frame id order.
319 // Create method enter events for all methods currently on the thread's stack. We only do this
411 std::deque<instrumentation::InstrumentationStackFrame>* stack = thread->GetInstrumentationStack(); local
412 if (stack->size() > 0) {
417 CHECK_EQ(visitor.frames_removed_, stack->size());
418 while (stack->size() > 0) {
419 stack->pop_front();
605 // Restore stack only if there is no method currently deoptimized
1042 std::deque<instrumentation::InstrumentationStackFrame>* stack = self->GetInstrumentationStack(); local
1059 std::deque<instrumentation::InstrumentationStackFrame>* stack = self->GetInstrumentationStack(); local
1115 std::deque<instrumentation::InstrumentationStackFrame>* stack = self->GetInstrumentationStack(); local
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
pdb.py 100 self.commands_silent = {} # for each bp num, tells if the stack trace
113 self.stack = []
119 self.stack, self.curindex = self.get_stack(f, t)
120 self.curframe = self.stack[self.curindex][0]
177 self.print_stack_entry(self.stack[self.curindex])
209 self.print_stack_entry(self.stack[self.curindex])
639 self.curframe = self.stack[self.curindex][0]
641 self.print_stack_entry(self.stack[self.curindex])
646 if self.curindex + 1 == len(self.stack):
650 self.curframe = self.stack[self.curindex][0
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
pdb.py 100 self.commands_silent = {} # for each bp num, tells if the stack trace
113 self.stack = []
119 self.stack, self.curindex = self.get_stack(f, t)
120 self.curframe = self.stack[self.curindex][0]
177 self.print_stack_entry(self.stack[self.curindex])
209 self.print_stack_entry(self.stack[self.curindex])
639 self.curframe = self.stack[self.curindex][0]
641 self.print_stack_entry(self.stack[self.curindex])
646 if self.curindex + 1 == len(self.stack):
650 self.curframe = self.stack[self.curindex][0
    [all...]
  /dalvik/tools/dmtracedump/
CreateTestTrace.c 79 typedef struct stack { struct
82 } stack; typedef in typeref:struct:stack
105 * determines the call stack. Each called method must be indented by one
126 stack *callStack;
163 callStack = (stack *) malloc(sizeof(stack) * numThreads);
198 // Allocate space for the thread stack, if necessary
263 // Exiting method must be currently on top of stack (unless stack is empty)
266 printf(" Exiting %s (past bottom of stack)\n", records[nextRecord].fullName)
    [all...]
  /external/chromium_org/third_party/markdown/
treeprocessors.py 306 stack = [tree]
308 while stack:
309 currElement = stack.pop()
317 stack += lst
332 stack.append(child)
  /external/chromium_org/third_party/mesa/src/src/mesa/program/
register_allocate.c 40 * pushed on a stack and removed (with its edges) from the graph.
44 * stack, their edges restored, and assigned a color different from
45 * their neighbors. Because they were pushed on the stack only when
132 * Set when the node is in the trivially colorable stack. When
153 unsigned int *stack; member in struct:ra_graph
314 g->stack = rzalloc_array(g, unsigned int, count);
364 * trivially-colorable nodes into a stack of nodes to be colored,
385 g->stack[g->stack_count] = i;
402 * Pops nodes from the stack back into the graph, coloring them with
415 int n = g->stack[g->stack_count - 1]
    [all...]
  /external/chromium_org/third_party/ots/src/
cff_type2_charstring.cc 13 #include <stack>
36 std::stack<int32_t> *argument_stack,
125 std::stack<int32_t> *argument_stack,
291 // The first stack-clearing operator should be one of hstem, hstemhm,
482 // whether |N| is smaller than the current stack depth or not.
610 // argument_stack: The stack which an operator in |char_string| operates.
620 std::stack<int32_t> *argument_stack,
770 std::stack<int32_t> argument_stack;
  /external/chromium_org/tools/mac/
symbolicate_crash.py 66 """Symbolicates a crash report stack trace."""
94 # Attaches a list of symbol names to stack frames. This assumes that the
104 # dictionary until the first thread stack is reached.
122 # thread stack heading has been read past. Seek backwards from the current
128 """Parses the stack dump of a crash report and creates a list of threads
129 and their stack traces."""
130 # Compile a regex that matches the start of a thread stack. Note that this
132 # right after all the stack traces.
141 # Check for start of the thread stack.
145 # A blank line indicates a break in the thread stack
    [all...]
  /external/chromium_org/ui/views/widget/desktop_aura/
x11_topmost_window_finder_unittest.cc 93 std::vector<XID> stack; variable
94 ui::GetXWindowStack(ui::GetX11RootWindow(), &stack); variable
97 stack.begin(), stack.end(), expected_windows_[i]);
98 if (it == stack.end())
  /external/libunwind/doc/
libunwind-ia64.tex 43 \Prog{libunwind} depends on the type of stack frame that a cursor
77 explicitly (e.g., if a memory stack frame is 16 bytes in size, the
78 previous stack-pointer value can be calculated simply as
79 \texttt{sp+16}, so there is no need to save the stack-pointer
81 identifies a stack frame. The IA-64 architecture defines two stacks
82 (a memory and a register stack). Including the instruction-pointer
86 ``program counter'') of the current stack frame. Given this value,
93 stack-frame of a signal-handler trampoline.
94 \item[\Const{UNW\_IA64\_SP}:] Contains the (memory) stack-pointer
167 the register-stack configuration register
    [all...]

Completed in 898 milliseconds

<<31323334353637383940>>