/external/guava/guava-testlib/test/com/google/common/testing/ |
H A D | TestLogHandlerTest.java | 33 private TearDownStack stack = new TearDownStack(); field in class:TestLogHandlerTest 45 stack.addTearDown(new TearDown() { 84 stack.runTearDown();
|
/external/javassist/src/main/javassist/expr/ |
H A D | FieldAccess.java | 243 int stack; 245 stack = 0; 247 stack = -1; 252 stack += ((CtPrimitiveType)fieldType).getDataSize(); 254 ++stack; 258 bytecode.growStack(stack); 292 int stack; 294 stack = 0; 296 stack = -1; 303 stack [all...] |
/external/libcxx/test/std/containers/container.adaptors/stack/stack.cons.alloc/ |
H A D | ctor_container_alloc.pass.cpp | 10 // <stack> 13 // stack(const container_type& c, const Alloc& a); 15 #include <stack> 34 : public std::stack<int, C> 36 typedef std::stack<int, C> base;
|
H A D | ctor_rcontainer_alloc.pass.cpp | 10 // <stack> 13 // stack(const container_type& c, const Alloc& a); 15 #include <stack> 37 : public std::stack<T, C> 39 typedef std::stack<T, C> base;
|
H A D | ctor_rqueue_alloc.pass.cpp | 10 // <stack> 13 // stack(stack&& q, const Alloc& a); 15 #include <stack> 37 : public std::stack<T, C> 39 typedef std::stack<T, C> base;
|
/external/libunwind/tests/ |
H A D | Gtest-exc.c | 92 long stack; local 97 n, &stack, (unsigned long) get_bsp ()); 107 &stack, (unsigned long) get_bsp ());
|
/external/proguard/src/proguard/evaluation/ |
H A D | BasicInvocationUnit.java | 34 * and it updates the stack for the invocation of a class member, 50 private Stack stack; field in class:BasicInvocationUnit 138 public void invokeMember(Clazz clazz, Method method, CodeAttribute codeAttribute, int offset, ConstantInstruction constantInstruction, Stack stack) argument 177 this.stack = stack; 179 this.stack = null; 190 setFieldValue(clazz, fieldrefConstant, stack.pop()); 196 setFieldClassValue(clazz, fieldrefConstant, stack.apop()); 204 stack.push(getFieldValue(clazz, fieldrefConstant, type)); 223 setMethodParameterValue(clazz, methodrefConstant, parameterIndex, stack [all...] |
/external/v8/src/compiler/ |
H A D | control-equivalence.cc | 93 ZoneStack<DFSStackEntry> stack(zone_); 94 DFSPush(stack, exit, nullptr, kInputDirection); 97 while (!stack.empty()) { // Undirected depth-first backwards traversal. 98 DFSStackEntry& entry = stack.top(); 111 // Found backedge if input is on stack. 116 // Push input onto stack. 117 DFSPush(stack, input, node, kInputDirection); 141 // Found backedge if use is on stack. 146 // Push use onto stack. 147 DFSPush(stack, us 192 DFSPush(DFSStack& stack, Node* node, Node* from, DFSDirection dir) argument 203 DFSPop(DFSStack& stack, Node* node) argument [all...] |
/external/python/cpython2/Lib/ |
H A D | pyclbr.py | 151 stack = [] # stack of (class, indent) pairs 159 while stack and stack[-1][1] >= thisindent: 160 del stack[-1] 164 while stack and stack[-1][1] >= thisindent: 165 del stack[-1] 169 if stack: 170 cur_class = stack[ [all...] |
/external/autotest/frontend/client/src/autotest/tko/ |
H A D | SpreadsheetHeaderSelectorView.java | 31 private StackPanel stack = new StackPanel(); field in class:SpreadsheetHeaderSelectorView 38 stack.add(singleHeaderOptions); 39 stack.add(doubleListDisplay); 46 panel.add(stack); 92 stack.showStack(doubleListVisible ? 1 : 0);
|
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_unwind_linux_libcdep.cc | 10 // This file contains the unwind.h-based (aka "slow") stack unwinding routines 59 "Failed to open libcorkscrew.so. You may see broken stack traces " 73 "You may see broken stack traces in SEGV reports."); 103 BufferedStackTrace *stack; member in struct:__sanitizer::UnwindTraceArg 109 CHECK_LT(arg->stack->size, arg->max_depth); 116 arg->stack->trace_buffer[arg->stack->size++] = pc; 117 if (arg->stack->size == arg->max_depth) return UNWIND_STOP; 129 // unless there is only 1 frame in the stack trace (1 frame is always better
|
H A D | sanitizer_symbolizer_mac.cc | 31 bool DlAddrSymbolizer::SymbolizePC(uptr addr, SymbolizedStack *stack) { argument 36 stack->info.function = demangled ? internal_strdup(demangled) : nullptr; 135 bool AtosSymbolizer::SymbolizePC(uptr addr, SymbolizedStack *stack) { argument 143 if (!ParseCommandOutput(buf, addr, &stack->info.function, &stack->info.module, 144 &stack->info.file, &line, nullptr)) { 148 stack->info.line = (int)line;
|
/external/guava/guava/src/com/google/thirdparty/publicsuffix/ |
H A D | TrieParser.java | 54 * @param stack The prefixes that preceed the characters represented by this 55 * node. Each entry of the stack is in reverse order. 61 List<CharSequence> stack, 77 stack.add(0, reverse(encoded.subSequence(0, idx))); 84 String domain = PREFIX_JOINER.join(stack); 94 idx += doParseTrieToBuilder(stack, encoded.subSequence(idx, encodedLen), builder); 102 stack.remove(0); 60 doParseTrieToBuilder( List<CharSequence> stack, CharSequence encoded, ImmutableMap.Builder<String, PublicSuffixType> builder) argument
|
/external/valgrind/coregrind/m_syswrap/ |
H A D | syswrap-x86-darwin.c | 199 // on a separate non-client stack. 206 char *stack; local 211 stack = (char *)allocstack(tst->tid); 212 stack -= 64+320; // make room for top frame 213 memset(stack, 0, 64+320); // ...and clear it 214 *(uintptr_t *)stack = (uintptr_t)tst; // set parameter 215 stack -= sizeof(uintptr_t); 216 *(uintptr_t *)stack = 0; // push fake return address 219 mach->__esp = (uintptr_t)stack; 223 /* Call f(arg1), but first switch stacks, using 'stack' a 315 Addr stack = VG_PGROUNDUP(sp) - stacksize; local 385 Addr stack; local [all...] |
/external/compiler-rt/lib/asan/ |
H A D | asan_mac.cc | 96 void ReadContextStack(void *context, uptr *stack, uptr *ssize) { argument 144 void asan_register_worker_thread(int parent_tid, StackTrace *stack) { argument 148 parent_tid, stack, /* detached */ true); 165 asan_register_worker_thread(context->parent_tid, &stack); 168 asan_free(context, &stack, FROM_MALLOC); 179 BufferedStackTrace *stack) { 181 (asan_block_context_t*) asan_malloc(sizeof(asan_block_context_t), stack); 194 asan_block_context_t *asan_ctxt = alloc_asan_context(ctxt, func, &stack); \ 212 asan_block_context_t *asan_ctxt = alloc_asan_context(ctxt, func, &stack); 225 asan_block_context_t *asan_ctxt = alloc_asan_context(ctxt, func, &stack); 178 alloc_asan_context(void *ctxt, dispatch_function_t func, BufferedStackTrace *stack) argument [all...] |
H A D | asan_malloc_win.cc | 45 return asan_free(ptr, &stack, FROM_MALLOC); 66 return asan_malloc(size, &stack); 82 return asan_calloc(nmemb, size, &stack); 103 return asan_realloc(ptr, size, &stack); 167 void *p = asan_malloc(dwBytes, &stack); 181 asan_free(lpMem, &stack, FROM_MALLOC); 192 return asan_realloc(lpMem, dwBytes, &stack);
|
H A D | asan_allocator.cc | 323 void *Allocate(uptr size, uptr alignment, BufferedStackTrace *stack, argument 328 CHECK(stack); 422 m->alloc_context_id = StackDepotPut(*stack); 463 BufferedStackTrace *stack) { 469 ReportInvalidFree(ptr, old_chunk_state, stack); 479 void QuarantineChunk(AsanChunk *m, void *ptr, BufferedStackTrace *stack, argument 487 m->free_context_id = StackDepotPut(*stack); 511 void Deallocate(void *ptr, uptr delete_size, BufferedStackTrace *stack, argument 522 if (!AtomicallySetQuarantineFlagIfAllocated(m, ptr, stack)) return; 526 ReportAllocTypeMismatch((uptr)ptr, stack, (AllocTyp 462 AtomicallySetQuarantineFlagIfAllocated(AsanChunk *m, void *ptr, BufferedStackTrace *stack) argument 539 Reallocate(void *old_ptr, uptr new_size, BufferedStackTrace *stack) argument 564 Calloc(uptr nmemb, uptr size, BufferedStackTrace *stack) argument 575 ReportInvalidFree(void *ptr, u8 chunk_state, BufferedStackTrace *stack) argument 719 asan_memalign(uptr alignment, uptr size, BufferedStackTrace *stack, AllocType alloc_type) argument 724 asan_free(void *ptr, BufferedStackTrace *stack, AllocType alloc_type) argument 728 asan_sized_free(void *ptr, uptr size, BufferedStackTrace *stack, AllocType alloc_type) argument 733 asan_malloc(uptr size, BufferedStackTrace *stack) argument 737 asan_calloc(uptr nmemb, uptr size, BufferedStackTrace *stack) argument 741 asan_realloc(void *p, uptr size, BufferedStackTrace *stack) argument 751 asan_valloc(uptr size, BufferedStackTrace *stack) argument 755 asan_pvalloc(uptr size, BufferedStackTrace *stack) argument 765 asan_posix_memalign(void **memptr, uptr alignment, uptr size, BufferedStackTrace *stack) argument [all...] |
/external/compiler-rt/lib/msan/ |
H A D | msan_report.cc | 48 " in the stack frame of function '%s%s%s'%s\n", 66 StackTrace stack; local 67 o = o.getNextChainedOrigin(&stack); 70 stack.Print(); 77 StackTrace stack = o.getStackTraceForHeapOrigin(); local 78 switch (stack.tag) { 95 stack.Print(); 99 void ReportUMR(StackTrace *stack, u32 origin) { argument 108 stack->Print(); 112 ReportErrorSummary("use-of-uninitialized-value", stack); 115 ReportExpectedUMRNotFound(StackTrace *stack) argument [all...] |
/external/valgrind/memcheck/tests/solaris/ |
H A D | scalar_obsolete.stderr.exp | 12 Address 0x........ is not stack'd, malloc'd or (recently) free'd 28 Address 0x........ is not stack'd, malloc'd or (recently) free'd 41 Address 0x........ is not stack'd, malloc'd or (recently) free'd 45 Address 0x........ is not stack'd, malloc'd or (recently) free'd 55 Address 0x........ is not stack'd, malloc'd or (recently) free'd 68 Address 0x........ is not stack'd, malloc'd or (recently) free'd 84 Address 0x........ is not stack'd, malloc'd or (recently) free'd 97 Address 0x........ is not stack'd, malloc'd or (recently) free'd 101 Address 0x........ is not stack'd, malloc'd or (recently) free'd 114 Address 0x........ is not stack' [all...] |
H A D | thr_daemon_exit_standalone.c | 146 static id_t lwp_create(void *stack) { argument 160 ucontext.uc_mcontext.gregs[UESP] = (greg_t) stack; 161 ucontext.uc_mcontext.gregs[EBP] = (greg_t) stack; 165 ucontext.uc_mcontext.gregs[REG_RSP] = (greg_t) stack; 166 ucontext.uc_mcontext.gregs[REG_RBP] = (greg_t) stack; 231 void *stack = allocate_stack(STACK_SIZE); local 232 id_t tid = lwp_create((char *) stack + STACK_SIZE);
|
H A D | scalar_modctl_modnvl.stderr.exp | 21 Address 0x........ is not stack'd, malloc'd or (recently) free'd 40 Address 0x........ is not stack'd, malloc'd or (recently) free'd 44 Address 0x........ is not stack'd, malloc'd or (recently) free'd 63 Address 0x........ is not stack'd, malloc'd or (recently) free'd 79 Address 0x........ is on thread 1's stack 83 Address 0x........ is not stack'd, malloc'd or (recently) free'd 96 Address 0x........ is not stack'd, malloc'd or (recently) free'd
|
/external/compiler-rt/lib/tsan/dd/ |
H A D | dd_rtl.cc | 23 BufferedStackTrace stack; local 25 stack.Unwind(1000, 0, 0, 0, 0, 0, false); 27 if (stack.size <= skip) 29 return StackDepotPut(StackTrace(stack.trace + skip, stack.size - skip)); 33 StackTrace stack = StackDepotGet(stk); local 35 stack.Print();
|
/external/google-breakpad/src/processor/ |
H A D | stackwalker.cc | 106 CallStack* stack, 109 BPLOG_IF(ERROR, !stack) << "Stackwalker::Walk requires |stack|"; 110 assert(stack); 111 stack->Clear(); 170 // Add the frame to the call stack. Relinquish the ownership claim 171 // over the frame, because the stack now owns it. 172 stack->frames_.push_back(frame.release()); 173 if (stack->frames_.size() > max_frames_) { 177 BPLOG(ERROR) << "The stack i 105 Walk( CallStack* stack, vector<const CodeModule*>* modules_without_symbols, vector<const CodeModule*>* modules_with_corrupt_symbols) argument [all...] |
/external/python/cpython2/Demo/scripts/ |
H A D | eqfix.py | 174 stack = [] 185 if stack and token == stack[-1]: 186 del stack[-1] 188 stack.append(match[token]) 189 elif token == '=' and stack: 192 elif token == '==' and not stack:
|
/external/autotest/tko/parsers/ |
H A D | version_1.py | 305 stack = status_lib.status_stack() 334 if stack.size() == 0: 336 # We have status lines left on the stack; 348 for i in reversed(xrange(stack.size())): 378 expected_indent = stack.size() 384 buffer, raw_line, stack.size() - 1, subdir_stack[-1], 394 stack.start() 399 min_stack_size = stack.size() 410 elif stack.size() == min_stack_size + 1 and not running_test: 441 if line.subdir and stack [all...] |