HomeSort by relevance Sort by last modified time
    Searched refs:callstack (Results 1 - 25 of 32) sorted by null

1 2

  /external/chromium_org/third_party/WebKit/Tools/Scripts/
parse-malloc-history 127 # count stack frames backwards from end of callstack
135 # start at beginning of callstack
139 my $callstack = substr($line, $callstackBegin + 2); # + 2 skips "| "
141 if ($callstack =~ $regexp) {
142 $callstack = $regexp . "\n";
147 if (!$callstacks{$callstack}) {
148 $callstacks{$callstack} = {"callCount" => 0, "byteCount" => 0};
151 $callstacks{$callstack}{"callCount"} += $callCount;
152 $callstacks{$callstack}{"byteCount"} += $byteCount;
156 for my $callstack (sort { $callstacks{$b}{"byteCount"} <=> $callstacks{$a}{"byteCount"} } keys %callstacks)
    [all...]
  /external/ltrace/sysdeps/linux-gnu/m68k/
trace.c 62 proc->callstack[depth - 1].is_syscall &&
63 proc->callstack[depth - 1].c_un.syscall == *sysnum) {
  /external/chromium_org/tools/findit/
component_dictionary.py 24 stack_frame_index: The file's position in the callstack.
63 def __init__(self, callstack, components):
71 # Create file dict from callstack.
72 self.__CreateFileDictFromCallstack(callstack)
99 def __CreateFileDictFromCallstack(self, callstack, top_n_frames=10):
103 callstack: A list containing parsed result from a single stack
118 stack_list = callstack.GetTopNFrames(top_n_frames)
findit_for_crash.py 223 callstack, components, component_to_changelog_map, results,
231 callstack: A callstack in a stacktrace to find the result for.
238 component_dict = component_dictionary.ComponentDictionary(callstack,
240 callstack_priority = callstack.priority
244 # If the component to consider in this callstack is not in the parsed list
314 for callstack in stacktrace.stack_list:
315 FindMatchForCallstack(callstack, components, component_to_changelog_map,
327 2) The callstack this match is computed (crash stack, freed, allocation).
335 callstack it is from
    [all...]
blame.py 61 def FindBlame(self, callstack, component_to_crash_revision_dict,
70 callstack: The list of stack frames.
79 stack_frames = callstack.GetTopNFrames(top_n_frames)
stacktrace.py 39 class CallStack(object):
87 # position of a frame within a callstack. The reason for not extracting
90 current_stack = CallStack(-1)
97 # If this callstack is crash stack, update the boolean.
100 current_stack = CallStack(stack_priority)
102 # If this is from freed or allocation, add the callstack we have
108 current_stack = CallStack(stack_priority)
122 # Add the current callstack only if there are frames in it.
127 """Check if this line is the start of the new callstack.
137 True if the line is the start of new callstack, False otherwise. If True
    [all...]
  /external/ltrace/sysdeps/linux-gnu/aarch64/
trace.c 75 && proc->callstack[d1].is_syscall
76 && proc->callstack[d1].c_un.syscall == *sysnum)
  /external/ltrace/sysdeps/linux-gnu/alpha/
trace.c 62 proc->callstack[proc->callstack_depth - 1].is_syscall &&
63 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
  /external/ltrace/sysdeps/linux-gnu/ia64/
trace.c 134 proc->callstack[proc->callstack_depth - 1].is_syscall &&
135 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
  /external/ltrace/sysdeps/linux-gnu/sparc/
trace.c 59 proc->callstack[proc->callstack_depth - 1].is_syscall &&
60 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
  /external/ltrace/sysdeps/linux-gnu/s390/
trace.c 92 proc->callstack[proc->callstack_depth -
96 proc->callstack[proc->callstack_depth -
169 proc->callstack[proc->callstack_depth - 1].is_syscall) {
  /external/ltrace/sysdeps/linux-gnu/cris/
trace.c 64 && proc->callstack[proc->callstack_depth -
  /external/chromium_org/third_party/WebKit/Source/devtools/front_end/sources/
SourcesPanel.js 83 this.sidebarPanes.callstack = new WebInspector.CallStackSidebarPane();
84 this.sidebarPanes.callstack.addEventListener(WebInspector.CallStackSidebarPane.Events.CallFrameSelected, this._callFrameSelectedInSidebar.bind(this));
85 this.sidebarPanes.callstack.registerShortcuts(this.registerShortcuts.bind(this));
217 this.sidebarPanes.callstack.update(details);
225 this.sidebarPanes.callstack.setStatus(element);
238 this.sidebarPanes.callstack.setStatus(WebInspector.UIString("Paused on a JavaScript breakpoint."));
249 this.sidebarPanes.callstack.setStatus(WebInspector.UIString("Paused on a \"%s\" Event Listener.", eventNameForUI));
252 this.sidebarPanes.callstack.setStatus(WebInspector.UIString("Paused on a XMLHttpRequest."));
254 this.sidebarPanes.callstack.setStatus(WebInspector.UIString("Paused on exception: '%s'.", details.auxData["description"]));
256 this.sidebarPanes.callstack.setStatus(WebInspector.UIString("Paused on assertion."))
    [all...]
  /external/ltrace/sysdeps/linux-gnu/ppc/
trace.c 77 proc->callstack[proc->callstack_depth - 1].is_syscall &&
78 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
  /external/ltrace/
handle_event.c 475 struct callstack_element *elem = &proc->callstack[i];
480 struct callstack_element *elem = &proc->callstack[i];
624 struct callstack_element *elem = &event->proc->callstack[d - 1];
657 struct callstack_element *elem = &proc->callstack[d - 1];
695 if (brk_addr == event->proc->callstack[i].return_addr) {
700 event->proc->callstack[i].c_un.libfunc;
715 prev = &event->proc->callstack[d - 1];
782 elem = &proc->callstack[proc->callstack_depth];
809 elem = &proc->callstack[proc->callstack_depth++];
840 elem = &proc->callstack[proc->callstack_depth - 1]
    [all...]
proc.c 261 if (!proc->callstack[i].is_syscall)
262 proc->callstack[i].return_addr = 0;
415 /* XXX clearly the callstack handling should be moved to a
418 memcpy(retp->callstack, proc->callstack, sizeof(retp->callstack));
423 struct callstack_element *elem = &retp->callstack[i];
431 nctx = retp->callstack[j].fetch_context;
446 nargs = retp->callstack[j].arguments;
proc.h 103 struct callstack_element callstack[MAX_CALLDEPTH]; member in struct:process
output.c 123 = &proc->callstack[proc->callstack_depth - 1];
261 if (current_proc->callstack[current_depth].return_addr)
564 = &proc->callstack[proc->callstack_depth - 1];
668 = &proc->callstack[proc->callstack_depth - 1];
  /external/chromium_org/third_party/WebKit/Source/core/inspector/
InspectorTraceEvents.cpp 40 explicit JSCallStack(PassRefPtrWillBeRawPtr<ScriptCallStack> callstack)
42 m_serialized = callstack ? callstack->buildInspectorArray()->toJSONString() : "[]";
124 RefPtrWillBeRawPtr<ScriptCallStack> callstack = createScriptCallStack(maxInvalidationTrackingCallstackSize, true); local
125 value->setString("callstack", callstack ? callstack->buildInspectorArray()->toJSONString() : "[]");
  /external/ltrace/sysdeps/linux-gnu/x86/
trace.c 84 elem = proc->callstack + proc->callstack_depth - 1;
  /external/ltrace/sysdeps/linux-gnu/mips/
trace.c 112 proc->callstack[proc->callstack_depth - 1].is_syscall &&
113 proc->callstack[proc->callstack_depth - 1].c_un.syscall == *sysnum) {
  /external/chromium_org/remoting/webapp/
base.js 44 * @return {string} The callstack of the current method.
46 base.debug.callstack = function() {
51 var callstack = error.stack
54 callstack.splice(0,2); // Remove the stack of the current function.
56 return callstack.join('\n');
  /external/chromium_org/third_party/mesa/src/src/gallium/drivers/r600/
r600_asm.h 214 struct r600_cf_callstack callstack[SQ_MAX_CALL_DEPTH]; member in struct:r600_bytecode
  /external/mesa3d/src/gallium/drivers/r600/
r600_asm.h 214 struct r600_cf_callstack callstack[SQ_MAX_CALL_DEPTH]; member in struct:r600_bytecode
  /external/chromium_org/remoting/webapp/browser_test/
browser_test.js 76 var stack_trace = base.debug.callstack();
124 // callstack, V8 will assert at V8RecursionScope.h(66) with
126 // To avoid the assert, execute the callback in a different callstack.

Completed in 814 milliseconds

1 2