Searched refs:stack (Results 251 - 275 of 1370) sorted by relevance

<<11121314151617181920>>

/external/guava/guava-testlib/test/com/google/common/testing/
H A DTestLogHandlerTest.java33 private TearDownStack stack = new TearDownStack(); field in class:TestLogHandlerTest
45 stack.addTearDown(new TearDown() {
84 stack.runTearDown();
/external/javassist/src/main/javassist/expr/
H A DFieldAccess.java243 int stack;
245 stack = 0;
247 stack = -1;
252 stack += ((CtPrimitiveType)fieldType).getDataSize();
254 ++stack;
258 bytecode.growStack(stack);
292 int stack;
294 stack = 0;
296 stack = -1;
303 stack
[all...]
/external/libcxx/test/std/containers/container.adaptors/stack/stack.cons.alloc/
H A Dctor_container_alloc.pass.cpp10 // <stack>
13 // stack(const container_type& c, const Alloc& a);
15 #include <stack>
34 : public std::stack<int, C>
36 typedef std::stack<int, C> base;
H A Dctor_rcontainer_alloc.pass.cpp10 // <stack>
13 // stack(const container_type& c, const Alloc& a);
15 #include <stack>
37 : public std::stack<T, C>
39 typedef std::stack<T, C> base;
H A Dctor_rqueue_alloc.pass.cpp10 // <stack>
13 // stack(stack&& q, const Alloc& a);
15 #include <stack>
37 : public std::stack<T, C>
39 typedef std::stack<T, C> base;
/external/libunwind/tests/
H A DGtest-exc.c92 long stack; local
97 n, &stack, (unsigned long) get_bsp ());
107 &stack, (unsigned long) get_bsp ());
/external/proguard/src/proguard/evaluation/
H A DBasicInvocationUnit.java34 * and it updates the stack for the invocation of a class member,
50 private Stack stack; field in class:BasicInvocationUnit
138 public void invokeMember(Clazz clazz, Method method, CodeAttribute codeAttribute, int offset, ConstantInstruction constantInstruction, Stack stack) argument
177 this.stack = stack;
179 this.stack = null;
190 setFieldValue(clazz, fieldrefConstant, stack.pop());
196 setFieldClassValue(clazz, fieldrefConstant, stack.apop());
204 stack.push(getFieldValue(clazz, fieldrefConstant, type));
223 setMethodParameterValue(clazz, methodrefConstant, parameterIndex, stack
[all...]
/external/v8/src/compiler/
H A Dcontrol-equivalence.cc93 ZoneStack<DFSStackEntry> stack(zone_);
94 DFSPush(stack, exit, nullptr, kInputDirection);
97 while (!stack.empty()) { // Undirected depth-first backwards traversal.
98 DFSStackEntry& entry = stack.top();
111 // Found backedge if input is on stack.
116 // Push input onto stack.
117 DFSPush(stack, input, node, kInputDirection);
141 // Found backedge if use is on stack.
146 // Push use onto stack.
147 DFSPush(stack, us
192 DFSPush(DFSStack& stack, Node* node, Node* from, DFSDirection dir) argument
203 DFSPop(DFSStack& stack, Node* node) argument
[all...]
/external/python/cpython2/Lib/
H A Dpyclbr.py151 stack = [] # stack of (class, indent) pairs
159 while stack and stack[-1][1] >= thisindent:
160 del stack[-1]
164 while stack and stack[-1][1] >= thisindent:
165 del stack[-1]
169 if stack:
170 cur_class = stack[
[all...]
/external/autotest/frontend/client/src/autotest/tko/
H A DSpreadsheetHeaderSelectorView.java31 private StackPanel stack = new StackPanel(); field in class:SpreadsheetHeaderSelectorView
38 stack.add(singleHeaderOptions);
39 stack.add(doubleListDisplay);
46 panel.add(stack);
92 stack.showStack(doubleListVisible ? 1 : 0);
/external/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_unwind_linux_libcdep.cc10 // This file contains the unwind.h-based (aka "slow") stack unwinding routines
59 "Failed to open libcorkscrew.so. You may see broken stack traces "
73 "You may see broken stack traces in SEGV reports.");
103 BufferedStackTrace *stack; member in struct:__sanitizer::UnwindTraceArg
109 CHECK_LT(arg->stack->size, arg->max_depth);
116 arg->stack->trace_buffer[arg->stack->size++] = pc;
117 if (arg->stack->size == arg->max_depth) return UNWIND_STOP;
129 // unless there is only 1 frame in the stack trace (1 frame is always better
H A Dsanitizer_symbolizer_mac.cc31 bool DlAddrSymbolizer::SymbolizePC(uptr addr, SymbolizedStack *stack) { argument
36 stack->info.function = demangled ? internal_strdup(demangled) : nullptr;
135 bool AtosSymbolizer::SymbolizePC(uptr addr, SymbolizedStack *stack) { argument
143 if (!ParseCommandOutput(buf, addr, &stack->info.function, &stack->info.module,
144 &stack->info.file, &line, nullptr)) {
148 stack->info.line = (int)line;
/external/guava/guava/src/com/google/thirdparty/publicsuffix/
H A DTrieParser.java54 * @param stack The prefixes that preceed the characters represented by this
55 * node. Each entry of the stack is in reverse order.
61 List<CharSequence> stack,
77 stack.add(0, reverse(encoded.subSequence(0, idx)));
84 String domain = PREFIX_JOINER.join(stack);
94 idx += doParseTrieToBuilder(stack, encoded.subSequence(idx, encodedLen), builder);
102 stack.remove(0);
60 doParseTrieToBuilder( List<CharSequence> stack, CharSequence encoded, ImmutableMap.Builder<String, PublicSuffixType> builder) argument
/external/valgrind/coregrind/m_syswrap/
H A Dsyswrap-x86-darwin.c199 // on a separate non-client stack.
206 char *stack; local
211 stack = (char *)allocstack(tst->tid);
212 stack -= 64+320; // make room for top frame
213 memset(stack, 0, 64+320); // ...and clear it
214 *(uintptr_t *)stack = (uintptr_t)tst; // set parameter
215 stack -= sizeof(uintptr_t);
216 *(uintptr_t *)stack = 0; // push fake return address
219 mach->__esp = (uintptr_t)stack;
223 /* Call f(arg1), but first switch stacks, using 'stack' a
315 Addr stack = VG_PGROUNDUP(sp) - stacksize; local
385 Addr stack; local
[all...]
/external/compiler-rt/lib/asan/
H A Dasan_mac.cc96 void ReadContextStack(void *context, uptr *stack, uptr *ssize) { argument
144 void asan_register_worker_thread(int parent_tid, StackTrace *stack) { argument
148 parent_tid, stack, /* detached */ true);
165 asan_register_worker_thread(context->parent_tid, &stack);
168 asan_free(context, &stack, FROM_MALLOC);
179 BufferedStackTrace *stack) {
181 (asan_block_context_t*) asan_malloc(sizeof(asan_block_context_t), stack);
194 asan_block_context_t *asan_ctxt = alloc_asan_context(ctxt, func, &stack); \
212 asan_block_context_t *asan_ctxt = alloc_asan_context(ctxt, func, &stack);
225 asan_block_context_t *asan_ctxt = alloc_asan_context(ctxt, func, &stack);
178 alloc_asan_context(void *ctxt, dispatch_function_t func, BufferedStackTrace *stack) argument
[all...]
H A Dasan_malloc_win.cc45 return asan_free(ptr, &stack, FROM_MALLOC);
66 return asan_malloc(size, &stack);
82 return asan_calloc(nmemb, size, &stack);
103 return asan_realloc(ptr, size, &stack);
167 void *p = asan_malloc(dwBytes, &stack);
181 asan_free(lpMem, &stack, FROM_MALLOC);
192 return asan_realloc(lpMem, dwBytes, &stack);
H A Dasan_allocator.cc323 void *Allocate(uptr size, uptr alignment, BufferedStackTrace *stack, argument
328 CHECK(stack);
422 m->alloc_context_id = StackDepotPut(*stack);
463 BufferedStackTrace *stack) {
469 ReportInvalidFree(ptr, old_chunk_state, stack);
479 void QuarantineChunk(AsanChunk *m, void *ptr, BufferedStackTrace *stack, argument
487 m->free_context_id = StackDepotPut(*stack);
511 void Deallocate(void *ptr, uptr delete_size, BufferedStackTrace *stack, argument
522 if (!AtomicallySetQuarantineFlagIfAllocated(m, ptr, stack)) return;
526 ReportAllocTypeMismatch((uptr)ptr, stack, (AllocTyp
462 AtomicallySetQuarantineFlagIfAllocated(AsanChunk *m, void *ptr, BufferedStackTrace *stack) argument
539 Reallocate(void *old_ptr, uptr new_size, BufferedStackTrace *stack) argument
564 Calloc(uptr nmemb, uptr size, BufferedStackTrace *stack) argument
575 ReportInvalidFree(void *ptr, u8 chunk_state, BufferedStackTrace *stack) argument
719 asan_memalign(uptr alignment, uptr size, BufferedStackTrace *stack, AllocType alloc_type) argument
724 asan_free(void *ptr, BufferedStackTrace *stack, AllocType alloc_type) argument
728 asan_sized_free(void *ptr, uptr size, BufferedStackTrace *stack, AllocType alloc_type) argument
733 asan_malloc(uptr size, BufferedStackTrace *stack) argument
737 asan_calloc(uptr nmemb, uptr size, BufferedStackTrace *stack) argument
741 asan_realloc(void *p, uptr size, BufferedStackTrace *stack) argument
751 asan_valloc(uptr size, BufferedStackTrace *stack) argument
755 asan_pvalloc(uptr size, BufferedStackTrace *stack) argument
765 asan_posix_memalign(void **memptr, uptr alignment, uptr size, BufferedStackTrace *stack) argument
[all...]
/external/compiler-rt/lib/msan/
H A Dmsan_report.cc48 " in the stack frame of function '%s%s%s'%s\n",
66 StackTrace stack; local
67 o = o.getNextChainedOrigin(&stack);
70 stack.Print();
77 StackTrace stack = o.getStackTraceForHeapOrigin(); local
78 switch (stack.tag) {
95 stack.Print();
99 void ReportUMR(StackTrace *stack, u32 origin) { argument
108 stack->Print();
112 ReportErrorSummary("use-of-uninitialized-value", stack);
115 ReportExpectedUMRNotFound(StackTrace *stack) argument
[all...]
/external/valgrind/memcheck/tests/solaris/
H A Dscalar_obsolete.stderr.exp12 Address 0x........ is not stack'd, malloc'd or (recently) free'd
28 Address 0x........ is not stack'd, malloc'd or (recently) free'd
41 Address 0x........ is not stack'd, malloc'd or (recently) free'd
45 Address 0x........ is not stack'd, malloc'd or (recently) free'd
55 Address 0x........ is not stack'd, malloc'd or (recently) free'd
68 Address 0x........ is not stack'd, malloc'd or (recently) free'd
84 Address 0x........ is not stack'd, malloc'd or (recently) free'd
97 Address 0x........ is not stack'd, malloc'd or (recently) free'd
101 Address 0x........ is not stack'd, malloc'd or (recently) free'd
114 Address 0x........ is not stack'
[all...]
H A Dthr_daemon_exit_standalone.c146 static id_t lwp_create(void *stack) { argument
160 ucontext.uc_mcontext.gregs[UESP] = (greg_t) stack;
161 ucontext.uc_mcontext.gregs[EBP] = (greg_t) stack;
165 ucontext.uc_mcontext.gregs[REG_RSP] = (greg_t) stack;
166 ucontext.uc_mcontext.gregs[REG_RBP] = (greg_t) stack;
231 void *stack = allocate_stack(STACK_SIZE); local
232 id_t tid = lwp_create((char *) stack + STACK_SIZE);
H A Dscalar_modctl_modnvl.stderr.exp21 Address 0x........ is not stack'd, malloc'd or (recently) free'd
40 Address 0x........ is not stack'd, malloc'd or (recently) free'd
44 Address 0x........ is not stack'd, malloc'd or (recently) free'd
63 Address 0x........ is not stack'd, malloc'd or (recently) free'd
79 Address 0x........ is on thread 1's stack
83 Address 0x........ is not stack'd, malloc'd or (recently) free'd
96 Address 0x........ is not stack'd, malloc'd or (recently) free'd
/external/compiler-rt/lib/tsan/dd/
H A Ddd_rtl.cc23 BufferedStackTrace stack; local
25 stack.Unwind(1000, 0, 0, 0, 0, 0, false);
27 if (stack.size <= skip)
29 return StackDepotPut(StackTrace(stack.trace + skip, stack.size - skip));
33 StackTrace stack = StackDepotGet(stk); local
35 stack.Print();
/external/google-breakpad/src/processor/
H A Dstackwalker.cc106 CallStack* stack,
109 BPLOG_IF(ERROR, !stack) << "Stackwalker::Walk requires |stack|";
110 assert(stack);
111 stack->Clear();
170 // Add the frame to the call stack. Relinquish the ownership claim
171 // over the frame, because the stack now owns it.
172 stack->frames_.push_back(frame.release());
173 if (stack->frames_.size() > max_frames_) {
177 BPLOG(ERROR) << "The stack i
105 Walk( CallStack* stack, vector<const CodeModule*>* modules_without_symbols, vector<const CodeModule*>* modules_with_corrupt_symbols) argument
[all...]
/external/python/cpython2/Demo/scripts/
H A Deqfix.py174 stack = []
185 if stack and token == stack[-1]:
186 del stack[-1]
188 stack.append(match[token])
189 elif token == '=' and stack:
192 elif token == '==' and not stack:
/external/autotest/tko/parsers/
H A Dversion_1.py305 stack = status_lib.status_stack()
334 if stack.size() == 0:
336 # We have status lines left on the stack;
348 for i in reversed(xrange(stack.size())):
378 expected_indent = stack.size()
384 buffer, raw_line, stack.size() - 1, subdir_stack[-1],
394 stack.start()
399 min_stack_size = stack.size()
410 elif stack.size() == min_stack_size + 1 and not running_test:
441 if line.subdir and stack
[all...]

Completed in 911 milliseconds

<<11121314151617181920>>