Searched refs:stack (Results 226 - 250 of 1370) sorted by relevance

1234567891011>>

/external/valgrind/drd/tests/
H A Dtc21_pthonce.stderr.exp9 (thread finished, call stack no longer available)
11 (thread finished, call stack no longer available)
19 (thread finished, call stack no longer available)
21 (thread finished, call stack no longer available)
/external/valgrind/memcheck/tests/
H A Dbadjump.stderr.exp5 Address 0x........ is not stack'd, malloc'd or (recently) free'd
12 If you believe this happened as a result of a stack
15 main thread stack using the --main-stacksize= flag.
16 The main thread stack size used in this run was ....
H A Dbadjump2.stderr.exp4 Address 0x........ is not stack'd, malloc'd or (recently) free'd
H A Dlong_namespace_xml.stderr.exp36 <stack>
53 </stack>
55 <stack>
80 </stack>
H A Dsendmsg.stderr.exp4 Address 0x........ is on thread 1's stack
H A Dgone_abrt_xml.stderr.exp39 <stack>
48 </stack>
/external/valgrind/memcheck/tests/solaris/
H A Dscalar_uuidsys.stderr.exp9 Address 0x........ is not stack'd, malloc'd or (recently) free'd
H A Dscalar_frealpathat.stderr.exp18 Address 0x........ is not stack'd, malloc'd or (recently) free'd
22 Address 0x........ is not stack'd, malloc'd or (recently) free'd
/external/compiler-rt/lib/asan/
H A Dasan_suppressions.cc73 bool IsStackTraceSuppressed(const StackTrace *stack) { argument
80 for (uptr i = 0; i < stack->size && stack->trace[i]; i++) {
81 uptr addr = stack->trace[i];
H A Dasan_malloc_linux.cc50 asan_free(ptr, &stack, FROM_MALLOC);
57 asan_free(ptr, &stack, FROM_MALLOC);
65 return asan_malloc(size, &stack);
73 return asan_calloc(nmemb, size, &stack);
81 void *new_ptr = asan_malloc(size, &stack);
85 return asan_realloc(ptr, size, &stack);
90 return asan_memalign(boundary, size, &stack, FROM_MALLOC);
95 return asan_memalign(boundary, size, &stack, FROM_MALLOC);
100 void *res = asan_memalign(boundary, size, &stack, FROM_MALLOC);
132 return asan_posix_memalign(memptr, alignment, size, &stack);
[all...]
/external/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_symbolizer_libbacktrace.h36 bool SymbolizePC(uptr addr, SymbolizedStack *stack) override;
/external/google-breakpad/src/processor/
H A Dstackwalker_address_list.h32 // Doesn't actually walk a stack, rather initializes a CallStack given an
50 // Initializes this stack walker with an explicit set of frame addresses.
61 virtual StackFrame* GetCallerFrame(const CallStack* stack,
H A Dstackwalker_ppc.h32 // Provides stack frames given ppc register context and a memory region
33 // corresponding to a ppc stack.
54 // included in the stack. The other arguments are passed directly through
63 // Implementation of Stackwalker, using ppc context (stack pointer in %r1,
64 // saved program counter in %srr0) and stack conventions (saved stack
67 virtual StackFrame* GetCallerFrame(const CallStack* stack,
70 // Stores the CPU context corresponding to the innermost stack frame to
H A Dstackwalker_ppc64.h32 // Provides stack frames given ppc64 register context and a memory region
33 // corresponding to a ppc64 stack.
52 // included in the stack. The other arguments are passed directly through
61 // Implementation of Stackwalker, using ppc64 context (stack pointer in %r1,
62 // saved program counter in %srr0) and stack conventions (saved stack
65 virtual StackFrame* GetCallerFrame(const CallStack* stack,
68 // Stores the CPU context corresponding to the innermost stack frame to
H A Dstackwalker_sparc.h32 // Provides stack frames given sparc register context and a memory region
33 // corresponding to an sparc stack.
54 // included in the stack. The other arguments are passed directly through
64 // stack conventions
66 virtual StackFrame* GetCallerFrame(const CallStack* stack,
69 // Stores the CPU context corresponding to the innermost stack frame to
H A Dmicrodump_processor.cc78 scoped_ptr<CallStack> stack(new CallStack());
80 if (!stackwalker->Walk(stack.get(),
91 process_state->threads_.push_back(stack.release());
H A Dstackwalker_ppc64.cc75 StackFrame* StackwalkerPPC64::GetCallerFrame(const CallStack* stack, argument
77 if (!memory_ || !stack) {
78 BPLOG(ERROR) << "Can't get caller frame without memory or stack";
82 // The instruction pointers for previous frames are saved on the stack.
84 // its return address in the calling procedure's stack frame at 8(%r1),
85 // and to allocate its own stack frame by decrementing %r1 (the stack
87 // no hardware stack, there is no distinction between the stack pointer and
89 // an x86 is usually referred to as the stack pointe
[all...]
H A Dstackwalker_sparc.cc75 StackFrame* StackwalkerSPARC::GetCallerFrame(const CallStack* stack, argument
77 if (!memory_ || !stack) {
78 BPLOG(ERROR) << "Can't get caller frame without memory or stack";
83 stack->frames()->back());
96 // end of the stack.
/external/nist-sip/java/gov/nist/javax/sip/stack/
H A DHandshakeCompletedListenerImpl.java19 package gov.nist.javax.sip.stack;
/external/syslinux/core/thread/
H A Dexit_thread.c18 free(curr->stack);
/external/valgrind/memcheck/tests/linux/
H A Drfcomm.stderr.exp4 Address 0x........ is on thread 1's stack
12 Address 0x........ is on thread 1's stack
20 Address 0x........ is on thread 1's stack
28 Address 0x........ is on thread 1's stack
36 Address 0x........ is on thread 1's stack
44 Address 0x........ is on thread 1's stack
52 Address 0x........ is on thread 1's stack
60 Address 0x........ is on thread 1's stack
/external/compiler-rt/lib/msan/
H A Dmsan_poisoning.cc44 StackTrace *stack) {
53 if (__msan_get_track_origins() > 1) o = ChainOrigin(o, stack);
67 if (__msan_get_track_origins() > 1) o = ChainOrigin(o, stack);
87 dst_o = ChainOrigin(src_o, stack);
99 StackTrace *stack) {
105 if (__msan_get_track_origins()) CopyOrigin(dst, src, size, stack);
109 StackTrace *stack) {
114 if (__msan_get_track_origins()) CopyOrigin(dst, src, size, stack);
117 void CopyMemory(void *dst, const void *src, uptr size, StackTrace *stack) { argument
119 CopyShadowAndOrigin(dst, src, size, stack);
43 CopyOrigin(const void *dst, const void *src, uptr size, StackTrace *stack) argument
98 MoveShadowAndOrigin(const void *dst, const void *src, uptr size, StackTrace *stack) argument
108 CopyShadowAndOrigin(const void *dst, const void *src, uptr size, StackTrace *stack) argument
165 PoisonMemory(const void *dst, uptr size, StackTrace *stack) argument
[all...]
/external/compiler-rt/lib/tsan/rtl/
H A Dtsan_debugging.cc41 if (typ == ReportLocationStack) return "stack";
87 ReportStack *stack = rep->stacks[idx]; local
88 if (stack) CopyTrace(stack->frames, trace, trace_size);
89 return stack ? 1 : 0;
104 if (mop->stack) CopyTrace(mop->stack->frames, trace, trace_size);
123 if (loc->stack) CopyTrace(loc->stack->frames, trace, trace_size);
136 if (mutex->stack) CopyTrac
[all...]
/external/compiler-rt/test/asan/TestCases/Linux/
H A Dswapcontext_test.cc50 printf("Child stack: %p\n", child_stack);
63 // Touch childs's stack to make sure it's unpoisoned.
71 char stack[kStackSize + 1]; local
74 ret += Run(argc - 1, 0, stack);
77 ret += Run(argc - 1, 1, stack);
/external/elfutils/tests/
H A Drun-stack-demangled-test.sh25 # See run-stack-d-test.sh and run-stack-i-test.sh
35 STACKCMD=${bindir}/`program_transform stack`
37 STACKCMD=${abs_top_builddir}/src/stack
46 testrun_compare ${abs_top_builddir}/src/stack -n 2 -e testfiledwarfinlines --core testfiledwarfinlines.core<<EOF
56 testrun_compare ${abs_top_builddir}/src/stack -n 2 -s -e testfiledwarfinlines --core testfiledwarfinlines.core<<EOF
68 testrun_compare ${abs_top_builddir}/src/stack -n 6 -i -e testfiledwarfinlines --core testfiledwarfinlines.core<<EOF
82 testrun_compare ${abs_top_builddir}/src/stack -n 6 -s -i -e testfiledwarfinlines --core testfiledwarfinlines.core<<EOF

Completed in 516 milliseconds

1234567891011>>