/external/valgrind/drd/tests/ |
H A D | tc21_pthonce.stderr.exp | 9 (thread finished, call stack no longer available) 11 (thread finished, call stack no longer available) 19 (thread finished, call stack no longer available) 21 (thread finished, call stack no longer available)
|
/external/valgrind/memcheck/tests/ |
H A D | badjump.stderr.exp | 5 Address 0x........ is not stack'd, malloc'd or (recently) free'd 12 If you believe this happened as a result of a stack 15 main thread stack using the --main-stacksize= flag. 16 The main thread stack size used in this run was ....
|
H A D | badjump2.stderr.exp | 4 Address 0x........ is not stack'd, malloc'd or (recently) free'd
|
H A D | long_namespace_xml.stderr.exp | 36 <stack> 53 </stack> 55 <stack> 80 </stack>
|
H A D | sendmsg.stderr.exp | 4 Address 0x........ is on thread 1's stack
|
H A D | gone_abrt_xml.stderr.exp | 39 <stack> 48 </stack>
|
/external/valgrind/memcheck/tests/solaris/ |
H A D | scalar_uuidsys.stderr.exp | 9 Address 0x........ is not stack'd, malloc'd or (recently) free'd
|
H A D | scalar_frealpathat.stderr.exp | 18 Address 0x........ is not stack'd, malloc'd or (recently) free'd 22 Address 0x........ is not stack'd, malloc'd or (recently) free'd
|
/external/compiler-rt/lib/asan/ |
H A D | asan_suppressions.cc | 73 bool IsStackTraceSuppressed(const StackTrace *stack) { argument 80 for (uptr i = 0; i < stack->size && stack->trace[i]; i++) { 81 uptr addr = stack->trace[i];
|
H A D | asan_malloc_linux.cc | 50 asan_free(ptr, &stack, FROM_MALLOC); 57 asan_free(ptr, &stack, FROM_MALLOC); 65 return asan_malloc(size, &stack); 73 return asan_calloc(nmemb, size, &stack); 81 void *new_ptr = asan_malloc(size, &stack); 85 return asan_realloc(ptr, size, &stack); 90 return asan_memalign(boundary, size, &stack, FROM_MALLOC); 95 return asan_memalign(boundary, size, &stack, FROM_MALLOC); 100 void *res = asan_memalign(boundary, size, &stack, FROM_MALLOC); 132 return asan_posix_memalign(memptr, alignment, size, &stack); [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_symbolizer_libbacktrace.h | 36 bool SymbolizePC(uptr addr, SymbolizedStack *stack) override;
|
/external/google-breakpad/src/processor/ |
H A D | stackwalker_address_list.h | 32 // Doesn't actually walk a stack, rather initializes a CallStack given an 50 // Initializes this stack walker with an explicit set of frame addresses. 61 virtual StackFrame* GetCallerFrame(const CallStack* stack,
|
H A D | stackwalker_ppc.h | 32 // Provides stack frames given ppc register context and a memory region 33 // corresponding to a ppc stack. 54 // included in the stack. The other arguments are passed directly through 63 // Implementation of Stackwalker, using ppc context (stack pointer in %r1, 64 // saved program counter in %srr0) and stack conventions (saved stack 67 virtual StackFrame* GetCallerFrame(const CallStack* stack, 70 // Stores the CPU context corresponding to the innermost stack frame to
|
H A D | stackwalker_ppc64.h | 32 // Provides stack frames given ppc64 register context and a memory region 33 // corresponding to a ppc64 stack. 52 // included in the stack. The other arguments are passed directly through 61 // Implementation of Stackwalker, using ppc64 context (stack pointer in %r1, 62 // saved program counter in %srr0) and stack conventions (saved stack 65 virtual StackFrame* GetCallerFrame(const CallStack* stack, 68 // Stores the CPU context corresponding to the innermost stack frame to
|
H A D | stackwalker_sparc.h | 32 // Provides stack frames given sparc register context and a memory region 33 // corresponding to an sparc stack. 54 // included in the stack. The other arguments are passed directly through 64 // stack conventions 66 virtual StackFrame* GetCallerFrame(const CallStack* stack, 69 // Stores the CPU context corresponding to the innermost stack frame to
|
H A D | microdump_processor.cc | 78 scoped_ptr<CallStack> stack(new CallStack()); 80 if (!stackwalker->Walk(stack.get(), 91 process_state->threads_.push_back(stack.release());
|
H A D | stackwalker_ppc64.cc | 75 StackFrame* StackwalkerPPC64::GetCallerFrame(const CallStack* stack, argument 77 if (!memory_ || !stack) { 78 BPLOG(ERROR) << "Can't get caller frame without memory or stack"; 82 // The instruction pointers for previous frames are saved on the stack. 84 // its return address in the calling procedure's stack frame at 8(%r1), 85 // and to allocate its own stack frame by decrementing %r1 (the stack 87 // no hardware stack, there is no distinction between the stack pointer and 89 // an x86 is usually referred to as the stack pointe [all...] |
H A D | stackwalker_sparc.cc | 75 StackFrame* StackwalkerSPARC::GetCallerFrame(const CallStack* stack, argument 77 if (!memory_ || !stack) { 78 BPLOG(ERROR) << "Can't get caller frame without memory or stack"; 83 stack->frames()->back()); 96 // end of the stack.
|
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
H A D | HandshakeCompletedListenerImpl.java | 19 package gov.nist.javax.sip.stack;
|
/external/syslinux/core/thread/ |
H A D | exit_thread.c | 18 free(curr->stack);
|
/external/valgrind/memcheck/tests/linux/ |
H A D | rfcomm.stderr.exp | 4 Address 0x........ is on thread 1's stack 12 Address 0x........ is on thread 1's stack 20 Address 0x........ is on thread 1's stack 28 Address 0x........ is on thread 1's stack 36 Address 0x........ is on thread 1's stack 44 Address 0x........ is on thread 1's stack 52 Address 0x........ is on thread 1's stack 60 Address 0x........ is on thread 1's stack
|
/external/compiler-rt/lib/msan/ |
H A D | msan_poisoning.cc | 44 StackTrace *stack) { 53 if (__msan_get_track_origins() > 1) o = ChainOrigin(o, stack); 67 if (__msan_get_track_origins() > 1) o = ChainOrigin(o, stack); 87 dst_o = ChainOrigin(src_o, stack); 99 StackTrace *stack) { 105 if (__msan_get_track_origins()) CopyOrigin(dst, src, size, stack); 109 StackTrace *stack) { 114 if (__msan_get_track_origins()) CopyOrigin(dst, src, size, stack); 117 void CopyMemory(void *dst, const void *src, uptr size, StackTrace *stack) { argument 119 CopyShadowAndOrigin(dst, src, size, stack); 43 CopyOrigin(const void *dst, const void *src, uptr size, StackTrace *stack) argument 98 MoveShadowAndOrigin(const void *dst, const void *src, uptr size, StackTrace *stack) argument 108 CopyShadowAndOrigin(const void *dst, const void *src, uptr size, StackTrace *stack) argument 165 PoisonMemory(const void *dst, uptr size, StackTrace *stack) argument [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_debugging.cc | 41 if (typ == ReportLocationStack) return "stack"; 87 ReportStack *stack = rep->stacks[idx]; local 88 if (stack) CopyTrace(stack->frames, trace, trace_size); 89 return stack ? 1 : 0; 104 if (mop->stack) CopyTrace(mop->stack->frames, trace, trace_size); 123 if (loc->stack) CopyTrace(loc->stack->frames, trace, trace_size); 136 if (mutex->stack) CopyTrac [all...] |
/external/compiler-rt/test/asan/TestCases/Linux/ |
H A D | swapcontext_test.cc | 50 printf("Child stack: %p\n", child_stack); 63 // Touch childs's stack to make sure it's unpoisoned. 71 char stack[kStackSize + 1]; local 74 ret += Run(argc - 1, 0, stack); 77 ret += Run(argc - 1, 1, stack);
|
/external/elfutils/tests/ |
H A D | run-stack-demangled-test.sh | 25 # See run-stack-d-test.sh and run-stack-i-test.sh 35 STACKCMD=${bindir}/`program_transform stack` 37 STACKCMD=${abs_top_builddir}/src/stack 46 testrun_compare ${abs_top_builddir}/src/stack -n 2 -e testfiledwarfinlines --core testfiledwarfinlines.core<<EOF 56 testrun_compare ${abs_top_builddir}/src/stack -n 2 -s -e testfiledwarfinlines --core testfiledwarfinlines.core<<EOF 68 testrun_compare ${abs_top_builddir}/src/stack -n 6 -i -e testfiledwarfinlines --core testfiledwarfinlines.core<<EOF 82 testrun_compare ${abs_top_builddir}/src/stack -n 6 -s -i -e testfiledwarfinlines --core testfiledwarfinlines.core<<EOF
|