/external/compiler-rt/lib/lsan/ |
lsan_thread.cc | 61 uptr stack_begin, stack_end, member in struct:__lsan::OnStartedArgs 69 stack_end_ = args->stack_end; 91 args.stack_end = args.stack_begin + stack_size; 133 bool GetThreadRangesLocked(uptr os_id, uptr *stack_begin, uptr *stack_end, 140 *stack_end = context->stack_end();
|
lsan_thread.h | 28 uptr stack_end() { return stack_end_; } function in class:__lsan::ThreadContext
|
lsan_common.h | 164 bool GetThreadRangesLocked(uptr os_id, uptr *stack_begin, uptr *stack_end,
|
lsan_common.cc | 212 uptr stack_begin, stack_end, tls_begin, tls_end, cache_begin, cache_end; local 213 bool thread_found = GetThreadRangesLocked(os_id, &stack_begin, &stack_end, 236 LOG_THREADS("Stack at %p-%p (SP = %p).\n", stack_begin, stack_end, sp); 237 if (sp < stack_begin || sp >= stack_end) { 246 ScanRangeForPointers(stack_begin, stack_end, frontier, "STACK",
|
lsan_interceptors.cc | 44 stack_top = t->stack_end(); \
|
/art/runtime/ |
thread.h | 105 // +---------------------+ <- stack_end 118 // between the stack_end and the highest address in stack memory. An implicit stack 120 // If the thread's SP is below the stack_end address this will be a read into the protected 121 // region. If the SP is above the stack_end address, the thread is guaranteed to have 124 // might only have 4K of memory (if the SP is adjacent to stack_end). 578 return tlsPtr_.stack_size - (tlsPtr_.stack_end - tlsPtr_.stack_begin); 583 // The interpreter needs the extra overflow bytes that stack_end does 585 return tlsPtr_.stack_end + GetStackOverflowReservedBytes(kRuntimeISA); 587 return tlsPtr_.stack_end; 592 return tlsPtr_.stack_end; 1043 byte* stack_end; variable [all...] |
entrypoints_order_test.cc | 90 EXPECT_OFFSET_DIFFP(Thread, tlsPtr_, exception, stack_end, kPointerSize); 91 EXPECT_OFFSET_DIFFP(Thread, tlsPtr_, stack_end, managed_stack, kPointerSize);
|
thread.cc | 256 byte* stack_himem = tlsPtr_.stack_end; 569 tlsPtr_.stack_end += read_guard_size + kStackOverflowProtectedSize; 577 CHECK_GT(&stack_variable, reinterpret_cast<void*>(tlsPtr_.stack_end)); [all...] |
/external/compiler-rt/lib/asan/ |
asan_thread.cc | 311 bool GetThreadRangesLocked(uptr os_id, uptr *stack_begin, uptr *stack_end, 317 *stack_end = t->stack_top();
|
/external/chromium_org/third_party/tcmalloc/chromium/src/ |
heap-checker.cc | 680 uintptr_t stack_end = end; local 686 if (top < r->start_addr && r->start_addr < stack_end) { 687 stack_end = r->start_addr; 693 if (stack_start != start || stack_end != end) { 695 top_ptr, AsPtr(stack_start), AsPtr(stack_end)); 700 top_ptr, stack_end - top); 702 AllocObject(top_ptr, stack_end - top, THREAD_DATA)); 715 if (stack_end != end) { 716 lib->second.push_back(AllocObject(AsPtr(stack_end), end - stack_end, [all...] |
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
heap-checker.cc | 680 uintptr_t stack_end = end; local 686 if (top < r->start_addr && r->start_addr < stack_end) { 687 stack_end = r->start_addr; 693 if (stack_start != start || stack_end != end) { 695 top_ptr, AsPtr(stack_start), AsPtr(stack_end)); 700 top_ptr, stack_end - top); 702 AllocObject(top_ptr, stack_end - top, THREAD_DATA)); 715 if (stack_end != end) { 716 lib->second.push_back(AllocObject(AsPtr(stack_end), end - stack_end, [all...] |
/external/chromium_org/tools/telemetry/telemetry/core/backends/chrome/ |
desktop_browser_backend.py | 253 stack_end = output.find('quit:') 254 return output[stack_start:stack_end]
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_linux.cc | 389 uptr* stack_end = (uptr*)__libc_stack_end; local 390 int argc = *stack_end; 391 *argv = (char**)(stack_end + 1); 392 *envp = (char**)(stack_end + argc + 2);
|
/external/chromium_org/v8/src/ |
profile-generator.cc | 626 *stack_end = stack_pos + sample.frames_count; 627 stack_pos != stack_end;
|
/art/compiler/llvm/ |
gbc_expander.cc | 676 llvm::Value* stack_end = local 682 llvm::Value* is_stack_overflow = irb_.CreateICmpULT(frame_address, stack_end); [all...] |