Home
last modified time | relevance | path

Searched refs:stacks (Results 1 – 25 of 113) sorted by relevance

12345

/external/cldr/tools/java/org/unicode/cldr/util/
DStackTracker.java36 private Hashtable<Object, String> stacks = new Hashtable<Object, String>(); field in StackTracker
45 stacks.put(o, stack); in add()
54 stacks.remove(o); in remove()
78 if (stacks.isEmpty()) { in toString()
85 for (Map.Entry<Object, String> e : stacks.entrySet()) { in toString()
86 sb.append("Held Obj #" + (++n) + "/" + stacks.size() + ": " + e.getKey() + "\n"); in toString()
97 stacks.clear(); in clear()
124 return stacks.isEmpty(); in isEmpty()
132 return stacks.keySet().iterator(); in iterator()
/external/bcc/tools/old/
Dmemleak.py245 stacks = {}
253 if stack in stacks:
254 stacks[stack] = (stacks[stack][0] + 1,
255 stacks[stack][1] + info.size)
257 stacks[stack] = (1, info.size)
261 to_show = sorted(stacks.items(), key=lambda s: s[1][1])[-top_stacks:]
Dprofile_example.txt161 Lets add delimiters between the user and kernel stacks, using -d:
270 frequency counting and only printing unique stacks? We are, but in terms of
271 the raw addresses, not the symbols. See the 1st column: those stacks are
574 You can also restrict profiling to just kernel stacks (-K) or user stacks (-U).
575 For example, just user stacks:
736 If this doesn't work on your architecture (and your kernel stacks are a
762 -U, --user-stacks-only
763 show stacks from user space only (no kernel space
764 stacks)
765 -K, --kernel-stacks-only
[all …]
/external/compiler-rt/lib/tsan/rtl/
Dtsan_report.cc56 : stacks(MBlockReportStack) in ReportDesc()
259 if (rep->stacks.Size()) in ChooseSummaryStack()
260 return rep->stacks[0]; in ChooseSummaryStack()
306 rep->stacks.Size()); in PrintReport()
316 PrintStack(rep->stacks[2*i]); in PrintReport()
320 PrintStack(rep->stacks[2*i+1]); in PrintReport()
322 PrintStack(rep->stacks[i]); in PrintReport()
329 for (uptr i = 0; i < rep->stacks.Size(); i++) { in PrintReport()
332 PrintStack(rep->stacks[i]); in PrintReport()
444 PrintStack(rep->stacks[2*i]); in PrintReport()
[all …]
Dtsan_debugging.cc72 *stack_count = rep->stacks.Size(); in __tsan_get_report_data()
86 CHECK_LT(idx, rep->stacks.Size()); in __tsan_get_report_stack()
87 ReportStack *stack = rep->stacks[idx]; in __tsan_get_report_stack()
Dtsan_platform_linux.cc117 StackDepotStats *stacks = StackDepotGetStats(); in WriteMemoryProfile() local
124 stacks->allocated >> 20, stacks->n_uniq_ids, in WriteMemoryProfile()
Dtsan_report.h107 Vector<ReportStack*> stacks; variable
/external/bcc/tools/
Dmemleak_example.txt5 collects call stacks for each allocation. memleak can then print a summary
6 of which call stacks performed allocations that weren't subsequently freed.
11 [11:16:33] Top 2 stacks with outstanding allocations:
16 [11:16:34] Top 2 stacks with outstanding allocations:
37 [11:16:33] Top 2 stacks with outstanding allocations:
46 [11:16:34] Top 2 stacks with outstanding allocations:
130 [11:16:33] Top 2 stacks with outstanding allocations:
135 [11:16:38] Top 2 stacks with outstanding allocations:
140 [11:16:43] Top 2 stacks with outstanding allocations:
173 stacks
[all …]
Dstackcount_example.txt81 walkers. Similar broken stacks will be seen by other profilers and debuggers
93 Now adding the -d option to delimit kernel and user stacks:
179 A "--" is printed between the kernel and user stacks.
290 some Java stacks where user-level has been walked correctly (even includes a
365 Watch what happens if I filter on kernel stacks only (-K) for ip_output():
392 Here is just the user stacks, fetched during the kernel function ip_output():
438 Kernel stacks are absent as this didn't enter kernel code.
770 kernel stacks only (-K) with offsets (-s):
866 -P, --perpid display stacks separately for each process
867 -K, --kernel-stacks-only
[all …]
Doffcputime_example.txt10 Here is some example output. The -K option was used to only match kernel stacks.
658 A -f option will emit output using the "folded stacks" format, which can be
740 -U, --user-stacks-only
741 show stacks from user space only (no kernel space
742 stacks)
743 -K, --kernel-stacks-only
744 show stacks from kernel space only (no user space
745 stacks)
746 -d, --delimited insert delimiter between kernel/user stacks
770 ./offcputime -U # only show user space stacks (no kernel)
[all …]
Doffwaketime_example.txt10 The combined stacks, task names, and total time is summarized in kernel context
173 The number beneath the stacks is the total time spent from the blocking event
179 show the stacks in "folded stacks" format. Eg:
326 -U, --user-stacks-only
327 show stacks from user space only (no kernel space
328 stacks)
329 -K, --kernel-stacks-only
330 show stacks from kernel space only (no user space
331 stacks)
332 -d, --delimited insert delimiter between kernel/user stacks
[all …]
Dprofile_example.txt160 Lets add delimiters between the user and kernel stacks, using -d:
269 frequency counting and only printing unique stacks? We are, but in terms of
270 the raw addresses, not the symbols. See the 1st column: those stacks are
573 You can also restrict profiling to just kernel stacks (-K) or user stacks (-U).
574 For example, just user stacks:
754 -U, --user-stacks-only
755 show stacks from user space only (no kernel space
756 stacks)
757 -K, --kernel-stacks-only
758 show stacks from kernel space only (no user space
[all …]
Dmemleak.py479 stacks = sorted(bpf["combined_allocs"].items(),
483 for stack_id, info in stacks:
Dfuncslower_example.txt134 show stacks from user space
136 show stacks from kernel space
Dwakeuptime_example.txt14 blocked stacks. wakeuptime can then be used to show the stacks that performed
263 The last two stacks show bash waking up to service tty input (keystrokes).
327 A -f option will emit output using the "folded stacks" format, which can be
477 ./wakeuptime # trace blocked time with waker stacks
/external/gemmlowp/profiling/
Dprofiler.h241 explicit ProfileTreeView(const std::vector<ProfilingStack>& stacks) { in ProfileTreeView() argument
242 for (auto stack : stacks) { in ProfileTreeView()
328 std::vector<ProfilingStack> stacks; in ProfilerThreadFunc() local
337 stacks.push_back(s); in ProfilerThreadFunc()
343 ProfileTreeView(stacks).Print(); in ProfilerThreadFunc()
/external/bcc/examples/cpp/
DTCPSendStack.cc89 auto stacks = bpf.get_stack_table("stack_traces"); in main() local
98 auto syms = stacks.get_stack_symbol(it.first.kernel_stack, -1); in main()
111 auto syms = stacks.get_stack_symbol(it.first.user_stack, it.first.pid); in main()
/external/swiftshader/third_party/llvm-7.0/llvm/docs/
DXRayExample.rst204 The way to use the command is to output the top stacks by call count and time spent.
226 In the default mode, identical stacks on different threads are independently
228 stacks fill your list of top calls.
231 ``-per-thread-stacks`` flags. ``-per-thread-stacks`` treats the thread id as an
233 identical stacks from all threads.
246 - ``-all-stacks`` - Emits all of the stacks.
255 …xray-log.llc.5rqxkU -instr_map ./bin/llc -stack-format=flame -aggregation-type=time -all-stacks | \
258 If you open the svg in a browser, mouse events allow exploring the call stacks.
332 - Collecting function call stacks and how often they're encountered in the
/external/tensorflow/tensorflow/contrib/eager/python/examples/spinn/
Dspinn_test.py220 stacks = []
224 stacks.append(stack)
225 self.assertEqual(1, len(stacks))
226 self.assertEqual(3, len(stacks[0]))
227 self.assertEqual((batch_size, size * 2), stacks[0][0].shape)
230 out1, out2 = tracker(bufs, stacks)
/external/bcc/src/cc/frontends/p4/compiler/
DebpfProgram.py64 self.stacks = [] # header stack instances EbpfHeaderStack
94 self.stacks.append(stack)
285 for h in self.stacks:
379 for h in self.stacks:
388 for h in self.stacks:
/external/swiftshader/third_party/LLVM/test/CodeGen/X86/
Dsegmented-stacks.ll1 ; RUN: llc < %s -mtriple=i686-linux -segmented-stacks | FileCheck %s -check-prefix=X32
2 ; RUN: llc < %s -mtriple=x86_64-linux -segmented-stacks | FileCheck %s -check-prefix=X64
/external/swiftshader/third_party/llvm-7.0/llvm/tools/llvm-xray/
DCMakeLists.txt20 xray-stacks.cpp
/external/swiftshader/third_party/llvm-7.0/llvm/test/CodeGen/AArch64/
Darm64-big-stack.ll4 ; Check that big stacks are generated correctly.
/external/llvm/test/CodeGen/AArch64/
Darm64-big-stack.ll4 ; Check that big stacks are generated correctly.
/external/compiler-rt/lib/lsan/
Dlsan_flags.inc31 LSAN_FLAG(bool, use_stacks, true, "Root set: include thread stacks")

12345