/external/chromium_org/third_party/tcmalloc/vendor/src/ |
heap-profile-table.h | 55 // Longest stack trace we record. 77 const void* const* call_stack; // call stack that made the allocation call 84 // An allocation context is a unique caller stack trace 87 int stack_depth; // Depth of stack trace 88 const void* const* call_stack; // Stack trace 100 // Collect the stack trace for the function that asked to do the 103 // The stack trace is stored in 'stack'. The stack depth is returned. 105 // 'skip_count' gives the number of stack frames between this cal 209 const void** stack; \/\/ Stack trace member in struct:HeapProfileTable::Bucket [all...] |
tcmalloc.cc | 197 "Allocations larger than this value cause a stack " 199 "dumping stack traces is increased by a factor of 1.125 " 496 t->stack[tcmalloc::kMaxStackDepth-1])) { 506 "tcmalloc: allocation failed for stack trace slots", 516 t->stack[tcmalloc::kMaxStackDepth-1])) { 527 result[used_slots+3+d] = t->stack[d]; 980 StackTrace *stack = Static::stacktrace_allocator()->New(); local 1002 StackTrace stack; local [all...] |
/external/compiler-rt/lib/asan/ |
asan_interceptors.cc | 39 // that no extra frames are created, and stack trace contains 48 ReportStringFunctionSizeOverflow(__offset, __size, &stack); \ 73 offset2, length2, &stack); \ 187 CreateThreadContextArgs args = { t, &stack }; 236 static void ClearShadowMemoryForContextStack(uptr stack, uptr ssize) { 239 uptr bottom = stack & ~(PageSize - 1); 240 ssize += stack - bottom; 256 // Clear shadow memory for new context (it may share stack 258 uptr stack, ssize; local 259 ReadContextStack(ucp, &stack, &ssize) [all...] |
asan_linux.cc | 232 void ReadContextStack(void *context, uptr *stack, uptr *ssize) { 234 *stack = (uptr)ucp->uc_stack.ss_sp; 238 void ReadContextStack(void *context, uptr *stack, uptr *ssize) {
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_common.cc | 200 void ReportErrorSummary(const char *error_type, StackTrace *stack) { 205 if (stack->size > 0 && Symbolizer::Get()->CanReturnFileLineInfo()) { 206 // Currently, we include the first stack frame into the report summary. 208 uptr pc = StackTrace::GetPreviousInstructionPc(stack->trace[0]);
|
sanitizer_linux_libcdep.cc | 83 // Find the mapping that contains a stack variable. 99 // When running with unlimited stack size, we still want to set some limit. 100 // The unlimited stack size is caused by 'ulimit -s unlimited'. 101 // Also, for some reason, GNU make spawns subprocesses with unlimited stack. 177 "Failed to open libcorkscrew.so. You may see broken stack traces " 191 "You may see broken stack traces in SEGV reports."); 221 StackTrace *stack; member in struct:__sanitizer::UnwindTraceArg 227 CHECK_LT(arg->stack->size, arg->max_depth); 229 arg->stack->trace[arg->stack->size++] = pc [all...] |
/external/libvpx/libvpx/vp8/common/arm/neon/ |
variance_neon.asm | 27 ; stack unsigned int *sse 70 ldr r12, [sp] ;load *sse from stack 140 ldr r12, [sp] ;load *sse from stack 195 ldr r12, [sp] ;load *sse from stack 216 ; stack unsigned int *sse 260 ldr r12, [sp] ;load *sse from stack
|
vp8_subpixelvariance8x8_neon.asm | 22 ; stack(r4) unsigned char *dst_ptr, 23 ; stack(r5) int dst_pixels_per_line, 24 ; stack(r6) unsigned int *sse 31 ldr r4, [sp, #12] ;load *dst_ptr from stack 32 ldr r5, [sp, #16] ;load dst_pixels_per_line from stack 33 ldr lr, [sp, #20] ;load *sse from stack
|
/external/llvm/test/MC/ARM/ |
eh-directive-pad.s | 4 @ Check for different stack pointer offsets. 6 @ The .pad directive will track the stack pointer offsets. There are several 7 @ ways to encode the stack offsets. We have to test:
|
/external/mockito/cglib-and-asm/src/org/mockito/cglib/transform/ |
MethodVisitorTee.java | 29 public void visitFrame(int type, int nLocal, Object[] local, int nStack, Object[] stack) { 30 mv1.visitFrame(type, nLocal, local, nStack, stack); 31 mv2.visitFrame(type, nLocal, local, nStack, stack);
|
/external/openssl/apps/ |
crl2p7.c | 74 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile); 295 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) 310 /* This loads from a file, a stack of x509/crl/pkey sets */ 323 sk_X509_push(stack,xi->x509);
|
/external/proguard/src/proguard/evaluation/ |
Stack.java | 28 * This class represents an operand stack that contains <code>Value</code> 33 public class Stack 44 * Creates a new Stack with a given maximum size, accounting for the double 47 public Stack(int maxSize) 54 * Creates a Stack that is a copy of the given Stack. 56 public Stack(Stack stack) 59 this(stack.values.length) [all...] |
/external/srec/tools/grxmlcompile/ |
grxmldoc.h | 28 #include <stack> 159 std::stack<ItemData*> m_ItemVarsStack; 160 std::stack<std::string> m_RuleListStack;
|
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/vp8/common/arm/neon/ |
variance_neon.asm | 27 ; stack unsigned int *sse 70 ldr r12, [sp] ;load *sse from stack 140 ldr r12, [sp] ;load *sse from stack 195 ldr r12, [sp] ;load *sse from stack 216 ; stack unsigned int *sse 260 ldr r12, [sp] ;load *sse from stack
|
vp8_subpixelvariance8x8_neon.asm | 22 ; stack(r4) unsigned char *dst_ptr, 23 ; stack(r5) int dst_pixels_per_line, 24 ; stack(r6) unsigned int *sse 31 ldr r4, [sp, #12] ;load *dst_ptr from stack 32 ldr r5, [sp, #16] ;load dst_pixels_per_line from stack 33 ldr lr, [sp, #20] ;load *sse from stack
|
/art/runtime/ |
instrumentation.cc | 240 // need to push a DEX pc into the dex_pcs_ list to match size of instrumentation stack. 280 // Insert frame at the right position so we do not corrupt the instrumentation stack. 281 // Instrumentation stack frames are in descending frame id order. 319 // Create method enter events for all methods currently on the thread's stack. We only do this 411 std::deque<instrumentation::InstrumentationStackFrame>* stack = thread->GetInstrumentationStack(); local 412 if (stack->size() > 0) { 417 CHECK_EQ(visitor.frames_removed_, stack->size()); 418 while (stack->size() > 0) { 419 stack->pop_front(); 605 // Restore stack only if there is no method currently deoptimized 1042 std::deque<instrumentation::InstrumentationStackFrame>* stack = self->GetInstrumentationStack(); local 1059 std::deque<instrumentation::InstrumentationStackFrame>* stack = self->GetInstrumentationStack(); local 1115 std::deque<instrumentation::InstrumentationStackFrame>* stack = self->GetInstrumentationStack(); local [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
pdb.py | 100 self.commands_silent = {} # for each bp num, tells if the stack trace 113 self.stack = [] 119 self.stack, self.curindex = self.get_stack(f, t) 120 self.curframe = self.stack[self.curindex][0] 177 self.print_stack_entry(self.stack[self.curindex]) 209 self.print_stack_entry(self.stack[self.curindex]) 639 self.curframe = self.stack[self.curindex][0] 641 self.print_stack_entry(self.stack[self.curindex]) 646 if self.curindex + 1 == len(self.stack): 650 self.curframe = self.stack[self.curindex][0 [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
pdb.py | 100 self.commands_silent = {} # for each bp num, tells if the stack trace 113 self.stack = [] 119 self.stack, self.curindex = self.get_stack(f, t) 120 self.curframe = self.stack[self.curindex][0] 177 self.print_stack_entry(self.stack[self.curindex]) 209 self.print_stack_entry(self.stack[self.curindex]) 639 self.curframe = self.stack[self.curindex][0] 641 self.print_stack_entry(self.stack[self.curindex]) 646 if self.curindex + 1 == len(self.stack): 650 self.curframe = self.stack[self.curindex][0 [all...] |
/dalvik/tools/dmtracedump/ |
CreateTestTrace.c | 79 typedef struct stack { struct 82 } stack; typedef in typeref:struct:stack 105 * determines the call stack. Each called method must be indented by one 126 stack *callStack; 163 callStack = (stack *) malloc(sizeof(stack) * numThreads); 198 // Allocate space for the thread stack, if necessary 263 // Exiting method must be currently on top of stack (unless stack is empty) 266 printf(" Exiting %s (past bottom of stack)\n", records[nextRecord].fullName) [all...] |
/external/chromium_org/third_party/markdown/ |
treeprocessors.py | 306 stack = [tree] 308 while stack: 309 currElement = stack.pop() 317 stack += lst 332 stack.append(child)
|
/external/chromium_org/third_party/mesa/src/src/mesa/program/ |
register_allocate.c | 40 * pushed on a stack and removed (with its edges) from the graph. 44 * stack, their edges restored, and assigned a color different from 45 * their neighbors. Because they were pushed on the stack only when 132 * Set when the node is in the trivially colorable stack. When 153 unsigned int *stack; member in struct:ra_graph 314 g->stack = rzalloc_array(g, unsigned int, count); 364 * trivially-colorable nodes into a stack of nodes to be colored, 385 g->stack[g->stack_count] = i; 402 * Pops nodes from the stack back into the graph, coloring them with 415 int n = g->stack[g->stack_count - 1] [all...] |
/external/chromium_org/third_party/ots/src/ |
cff_type2_charstring.cc | 13 #include <stack> 36 std::stack<int32_t> *argument_stack, 125 std::stack<int32_t> *argument_stack, 291 // The first stack-clearing operator should be one of hstem, hstemhm, 482 // whether |N| is smaller than the current stack depth or not. 610 // argument_stack: The stack which an operator in |char_string| operates. 620 std::stack<int32_t> *argument_stack, 770 std::stack<int32_t> argument_stack;
|
/external/chromium_org/tools/mac/ |
symbolicate_crash.py | 66 """Symbolicates a crash report stack trace.""" 94 # Attaches a list of symbol names to stack frames. This assumes that the 104 # dictionary until the first thread stack is reached. 122 # thread stack heading has been read past. Seek backwards from the current 128 """Parses the stack dump of a crash report and creates a list of threads 129 and their stack traces.""" 130 # Compile a regex that matches the start of a thread stack. Note that this 132 # right after all the stack traces. 141 # Check for start of the thread stack. 145 # A blank line indicates a break in the thread stack [all...] |
/external/chromium_org/ui/views/widget/desktop_aura/ |
x11_topmost_window_finder_unittest.cc | 93 std::vector<XID> stack; variable 94 ui::GetXWindowStack(ui::GetX11RootWindow(), &stack); variable 97 stack.begin(), stack.end(), expected_windows_[i]); 98 if (it == stack.end())
|
/external/libunwind/doc/ |
libunwind-ia64.tex | 43 \Prog{libunwind} depends on the type of stack frame that a cursor 77 explicitly (e.g., if a memory stack frame is 16 bytes in size, the 78 previous stack-pointer value can be calculated simply as 79 \texttt{sp+16}, so there is no need to save the stack-pointer 81 identifies a stack frame. The IA-64 architecture defines two stacks 82 (a memory and a register stack). Including the instruction-pointer 86 ``program counter'') of the current stack frame. Given this value, 93 stack-frame of a signal-handler trampoline. 94 \item[\Const{UNW\_IA64\_SP}:] Contains the (memory) stack-pointer 167 the register-stack configuration register [all...] |