/external/chromium_org/third_party/WebKit/Tools/Scripts/ |
parse-malloc-history | 127 # count stack frames backwards from end of callstack 135 # start at beginning of callstack 139 my $callstack = substr($line, $callstackBegin + 2); # + 2 skips "| " 141 if ($callstack =~ $regexp) { 142 $callstack = $regexp . "\n"; 147 if (!$callstacks{$callstack}) { 148 $callstacks{$callstack} = {"callCount" => 0, "byteCount" => 0}; 151 $callstacks{$callstack}{"callCount"} += $callCount; 152 $callstacks{$callstack}{"byteCount"} += $byteCount; 156 for my $callstack (sort { $callstacks{$b}{"byteCount"} <=> $callstacks{$a}{"byteCount"} } keys %callstacks) [all...] |
/external/ltrace/sysdeps/linux-gnu/m68k/ |
trace.c | 62 proc->callstack[depth - 1].is_syscall && 63 proc->callstack[depth - 1].c_un.syscall == *sysnum) {
|
/external/chromium_org/tools/findit/ |
component_dictionary.py | 24 stack_frame_index: The file's position in the callstack. 63 def __init__(self, callstack, components): 71 # Create file dict from callstack. 72 self.__CreateFileDictFromCallstack(callstack) 99 def __CreateFileDictFromCallstack(self, callstack, top_n_frames=10): 103 callstack: A list containing parsed result from a single stack 118 stack_list = callstack.GetTopNFrames(top_n_frames)
|
findit_for_crash.py | 223 callstack, components, component_to_changelog_map, results, 231 callstack: A callstack in a stacktrace to find the result for. 238 component_dict = component_dictionary.ComponentDictionary(callstack, 240 callstack_priority = callstack.priority 244 # If the component to consider in this callstack is not in the parsed list 314 for callstack in stacktrace.stack_list: 315 FindMatchForCallstack(callstack, components, component_to_changelog_map, 327 2) The callstack this match is computed (crash stack, freed, allocation). 335 callstack it is from [all...] |
blame.py | 61 def FindBlame(self, callstack, component_to_crash_revision_dict, 70 callstack: The list of stack frames. 79 stack_frames = callstack.GetTopNFrames(top_n_frames)
|
stacktrace.py | 39 class CallStack(object): 87 # position of a frame within a callstack. The reason for not extracting 90 current_stack = CallStack(-1) 97 # If this callstack is crash stack, update the boolean. 100 current_stack = CallStack(stack_priority) 102 # If this is from freed or allocation, add the callstack we have 108 current_stack = CallStack(stack_priority) 122 # Add the current callstack only if there are frames in it. 127 """Check if this line is the start of the new callstack. 137 True if the line is the start of new callstack, False otherwise. If True [all...] |
/external/ltrace/sysdeps/linux-gnu/aarch64/ |
trace.c | 75 && proc->callstack[d1].is_syscall 76 && proc->callstack[d1].c_un.syscall == *sysnum)
|
/external/ltrace/sysdeps/linux-gnu/alpha/ |
trace.c | 62 proc->callstack[proc->callstack_depth - 1].is_syscall && 63 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
|
/external/ltrace/sysdeps/linux-gnu/ia64/ |
trace.c | 134 proc->callstack[proc->callstack_depth - 1].is_syscall && 135 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
|
/external/ltrace/sysdeps/linux-gnu/sparc/ |
trace.c | 59 proc->callstack[proc->callstack_depth - 1].is_syscall && 60 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
|
/external/ltrace/sysdeps/linux-gnu/s390/ |
trace.c | 92 proc->callstack[proc->callstack_depth - 96 proc->callstack[proc->callstack_depth - 169 proc->callstack[proc->callstack_depth - 1].is_syscall) {
|
/external/ltrace/sysdeps/linux-gnu/cris/ |
trace.c | 64 && proc->callstack[proc->callstack_depth -
|
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sources/ |
SourcesPanel.js | 83 this.sidebarPanes.callstack = new WebInspector.CallStackSidebarPane(); 84 this.sidebarPanes.callstack.addEventListener(WebInspector.CallStackSidebarPane.Events.CallFrameSelected, this._callFrameSelectedInSidebar.bind(this)); 85 this.sidebarPanes.callstack.registerShortcuts(this.registerShortcuts.bind(this)); 217 this.sidebarPanes.callstack.update(details); 225 this.sidebarPanes.callstack.setStatus(element); 238 this.sidebarPanes.callstack.setStatus(WebInspector.UIString("Paused on a JavaScript breakpoint.")); 249 this.sidebarPanes.callstack.setStatus(WebInspector.UIString("Paused on a \"%s\" Event Listener.", eventNameForUI)); 252 this.sidebarPanes.callstack.setStatus(WebInspector.UIString("Paused on a XMLHttpRequest.")); 254 this.sidebarPanes.callstack.setStatus(WebInspector.UIString("Paused on exception: '%s'.", details.auxData["description"])); 256 this.sidebarPanes.callstack.setStatus(WebInspector.UIString("Paused on assertion.")) [all...] |
/external/ltrace/sysdeps/linux-gnu/ppc/ |
trace.c | 77 proc->callstack[proc->callstack_depth - 1].is_syscall && 78 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
|
/external/ltrace/ |
handle_event.c | 475 struct callstack_element *elem = &proc->callstack[i]; 480 struct callstack_element *elem = &proc->callstack[i]; 624 struct callstack_element *elem = &event->proc->callstack[d - 1]; 657 struct callstack_element *elem = &proc->callstack[d - 1]; 695 if (brk_addr == event->proc->callstack[i].return_addr) { 700 event->proc->callstack[i].c_un.libfunc; 715 prev = &event->proc->callstack[d - 1]; 782 elem = &proc->callstack[proc->callstack_depth]; 809 elem = &proc->callstack[proc->callstack_depth++]; 840 elem = &proc->callstack[proc->callstack_depth - 1] [all...] |
proc.c | 261 if (!proc->callstack[i].is_syscall) 262 proc->callstack[i].return_addr = 0; 415 /* XXX clearly the callstack handling should be moved to a 418 memcpy(retp->callstack, proc->callstack, sizeof(retp->callstack)); 423 struct callstack_element *elem = &retp->callstack[i]; 431 nctx = retp->callstack[j].fetch_context; 446 nargs = retp->callstack[j].arguments;
|
proc.h | 103 struct callstack_element callstack[MAX_CALLDEPTH]; member in struct:process
|
output.c | 123 = &proc->callstack[proc->callstack_depth - 1]; 261 if (current_proc->callstack[current_depth].return_addr) 564 = &proc->callstack[proc->callstack_depth - 1]; 668 = &proc->callstack[proc->callstack_depth - 1];
|
/external/chromium_org/third_party/WebKit/Source/core/inspector/ |
InspectorTraceEvents.cpp | 40 explicit JSCallStack(PassRefPtrWillBeRawPtr<ScriptCallStack> callstack) 42 m_serialized = callstack ? callstack->buildInspectorArray()->toJSONString() : "[]"; 124 RefPtrWillBeRawPtr<ScriptCallStack> callstack = createScriptCallStack(maxInvalidationTrackingCallstackSize, true); local 125 value->setString("callstack", callstack ? callstack->buildInspectorArray()->toJSONString() : "[]");
|
/external/ltrace/sysdeps/linux-gnu/x86/ |
trace.c | 84 elem = proc->callstack + proc->callstack_depth - 1;
|
/external/ltrace/sysdeps/linux-gnu/mips/ |
trace.c | 112 proc->callstack[proc->callstack_depth - 1].is_syscall && 113 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
|
/external/chromium_org/remoting/webapp/ |
base.js | 44 * @return {string} The callstack of the current method. 46 base.debug.callstack = function() { 51 var callstack = error.stack 54 callstack.splice(0,2); // Remove the stack of the current function. 56 return callstack.join('\n');
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/r600/ |
r600_asm.h | 214 struct r600_cf_callstack callstack[SQ_MAX_CALL_DEPTH]; member in struct:r600_bytecode
|
/external/mesa3d/src/gallium/drivers/r600/ |
r600_asm.h | 214 struct r600_cf_callstack callstack[SQ_MAX_CALL_DEPTH]; member in struct:r600_bytecode
|
/external/chromium_org/remoting/webapp/browser_test/ |
browser_test.js | 76 var stack_trace = base.debug.callstack(); 124 // callstack, V8 will assert at V8RecursionScope.h(66) with 126 // To avoid the assert, execute the callback in a different callstack.
|