/external/valgrind/memcheck/tests/ |
sigaltstack.c | 21 char *stk = (char *)mmap(0, size, PROT_READ|PROT_WRITE|PROT_EXEC, local 23 sigstk.ss_sp = stk;
|
/packages/apps/Stk/src/com/android/stk/ |
StkDigitsKeyListener.java | 17 package com.android.stk;
|
StkMenuAdapter.java | 17 package com.android.stk; 32 * Icon list view adapter to show the list of STK items.
|
BootCompletedReceiver.java | 17 package com.android.stk;
|
StkApp.java | 17 package com.android.stk; 24 * Top-level Application class for STK app. 45 public static final String TAG = "STK App";
|
StkAppInstaller.java | 17 package com.android.stk; 34 private static final String STK_MAIN_ACTIVITY = "com.android.stk.StkMain"; 60 ComponentName cName = new ComponentName("com.android.stk", STK_MAIN_ACTIVITY); 76 CatLog.d(LOG_TAG, "Could not change STK app state");
|
TonePlayer.java | 17 package com.android.stk; 33 // Map STK tone ids to the system tone ids.
|
StkCmdReceiver.java | 17 package com.android.stk; 30 * Receiver class to get STK intents, broadcasted by telephony layer.
|
StkMain.java | 17 package com.android.stk; 44 private static final String PACKAGE_NAME = "com.android.stk"; 60 //launch stk menu activity for the SIM. 90 CatLog.d(LOG_TAG, "do not show stk list menu.");
|
StkLauncherActivity.java | 17 package com.android.stk; 92 CatLog.d(LOG_TAG, "launch stk menu id: " + item.id); 128 CatLog.d(LOG_TAG, "resume to show multiple stk list."); 192 CatLog.d(LOG_TAG, "No stk menu item add.");
|
ToneDialog.java | 17 package com.android.stk;
|
/external/libunwind/tests/ |
Gtest-bt.c | 212 stack_t stk; local 233 stk.ss_sp = malloc (SIG_STACK_SIZE); 234 if (!stk.ss_sp) 236 stk.ss_size = SIG_STACK_SIZE; 237 stk.ss_flags = 0; 238 if (sigaltstack (&stk, NULL) < 0) 257 stk.ss_flags = SS_DISABLE; 258 sigaltstack (&stk, NULL); 259 free (stk.ss_sp);
|
Gtest-trace.c | 226 stack_t stk; local 247 stk.ss_sp = malloc (SIG_STACK_SIZE); 248 if (!stk.ss_sp) 250 stk.ss_size = SIG_STACK_SIZE; 251 stk.ss_flags = 0; 252 if (sigaltstack (&stk, NULL) < 0) 272 stk.ss_flags = SS_DISABLE; 273 sigaltstack (&stk, NULL); 274 free (stk.ss_sp);
|
/external/opencv3/3rdparty/libjasper/ |
jpc_tagtree.c | 270 jpc_tagtreenode_t *stk[JPC_TAGTREE_MAXDEPTH - 1]; local 282 stkptr = stk; 315 if (stkptr == stk) { 330 jpc_tagtreenode_t *stk[JPC_TAGTREE_MAXDEPTH - 1]; local 342 stkptr = stk; 367 if (stkptr == stk) {
|
/external/pdfium/third_party/libopenjpeg20/ |
tgt.c | 261 opj_tgt_node_t *stk[31]; local 266 stkptr = stk; 294 if (stkptr == stk) 301 opj_tgt_node_t *stk[31]; local 306 stkptr = stk; 328 if (stkptr == stk) {
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 32 struct wpa_ptk stk, tstk; member in struct:wpa_peerkey
|
peerkey.c | 50 /* TODO: time out SMK and any STK that was generated using this SMK */ 293 * 8.5.1.4 Station to station (STK) key hierarchy 364 "RSN: Failed to get random data for INonce (STK)"); 368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", 372 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, 427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR, 429 wpa_eapol_key_send(sm, peerkey->stk.kck, peerkey->stk.kck_len, ver, 647 /* TODO: abort SMK/STK handshake and remove all related keys */ 662 struct wpa_ptk *stk; local [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_deadlock_detector1.cc | 95 m->stk = cb->Unwind(); 143 rep->loop[i].stk[0] = stk_to; 144 rep->loop[i].stk[1] = stk_from; 150 u32 stk = 0; local 152 stk = cb->Unwind(); 153 // Printf("T%p MutexLock: %zx stk %u\n", lt, m->id, stk); 154 if (dd.onFirstLock(<->dd, m->id, stk)) 156 if (dd.onLockFast(<->dd, m->id, stk)) 164 dd.addEdges(<->dd, m->id, stk ? stk : cb->Unwind(), cb->UniqueTid()) [all...] |
sanitizer_deadlock_detector_interface.h | 38 u32 stk; // creation stack member in struct:__sanitizer::DDMutex 60 u32 stk[2]; // stack ids for the edge member in struct:__sanitizer::DDReport::__anon9292
|
sanitizer_deadlock_detector.h | 60 bool addLock(uptr lock_id, uptr current_epoch, u32 stk) { 61 // Printf("addLock: %zx %zx stk %u\n", lock_id, current_epoch, stk); 72 LockWithContext l = {lock_id_short, stk}; 105 return all_locks_with_contexts_[i].stk; 124 u32 stk; member in struct:__sanitizer::DeadlockDetectorTLS::LockWithContext 217 void onLockAfter(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk = 0) { 220 dtls->addLock(cur_idx, current_epoch_, stk); 244 uptr addEdges(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, u32 stk, 254 dtls->findLockContext(added_edges[i]), stk, 307 dtls->addLock(nodeToIndexUnchecked(node), nodeToEpoch(node), stk); local 342 dtls->addLock(nodeToIndexUnchecked(node), nodeToEpoch(node), stk); local [all...] |
sanitizer_deadlock_detector2.cc | 68 u32 stk; member in struct:__sanitizer::ThreadMutex 216 tm->stk = cb->Unwind(); 227 u32 stk1 = lt->locked[i].stk; 303 tm->stk = cb->Unwind(); 414 rep->loop[i].stk[0] = flags.second_deadlock_stack ? link->stk0 : 0; 415 rep->loop[i].stk[1] = link->stk1;
|
/external/compiler-rt/lib/tsan/rtl/ |
tsan_defs.h | 158 u32 stk; member in struct:__tsan::MBlock
|
tsan_rtl_mutex.cc | 474 u32 stk = r->loop[i].stk[j]; local 475 if (stk && stk != 0xffffffff) { 476 rep.AddStack(StackDepotGet(stk), true);
|
/external/regex-re2/re2/ |
nfa.cc | 194 // pushing at most two entries on stk. 197 AddState* stk = astack_; local 198 stk[nstk++] = AddState(id0); 202 const AddState& a = stk[--nstk]; 242 stk[nstk++] = AddState(ip->out1()); 243 stk[nstk++] = AddState(ip->out()); 248 stk[nstk++] = AddState(ip->out()); 255 stk[nstk++] = AddState(0, capture[j], j); 260 stk[nstk++] = AddState(ip->out()); 278 stk[nstk++] = AddState(ip->out()) [all...] |
/art/tools/dmtracedump/ |
createtesttrace.cc | 187 dataRecord** stk = new dataRecord*[maxFrames]; local 188 callStack[threadId].frames = stk;
|