Searched refs:E (Results 1 – 7 of 7) sorted by relevance
334 def E(self, msg): member in SysCallsTxtParser345 E = self.E347 E("missing left parenthesis in '%s'" % line)352 E("missing or misplaced right parenthesis in '%s'" % line)357 E("missing return type in '%s'" % line)369 E("misplaced colon in '%s'" % line)380 E("misplaced colon2 in '%s'" % line)431 E("invalid syscall architecture '%s' in '%s'" % (arch, line))473 E("socketcall_id for dispatch syscalls is only supported for x86 in '%s'" % t)
69 …04-10 12:00:45.621 7412 7412 E malloc_debug: +++ ALLOCATION 0x12345678 SIZE 100 HAS A CORRUPTED …70 04-10 12:00:45.622 7412 7412 E malloc_debug: allocation[-32] = 0x00 (expected 0xaa)71 04-10 12:00:45.622 7412 7412 E malloc_debug: allocation[-15] = 0x02 (expected 0xaa)89 …04-10 12:00:45.621 7412 7412 E malloc_debug: +++ ALLOCATION 0x12345678 SIZE 100 HAS A CORRUPTED …90 04-10 12:00:45.622 7412 7412 E malloc_debug: allocation[130] = 0xbf (expected 0xbb)91 04-10 12:00:45.622 7412 7412 E malloc_debug: allocation[131] = 0x00 (expected 0xbb)292 04-15 12:00:31.304 7412 7412 E malloc_debug: +++ ALLOCATION 0x12345678 USED AFTER FREE293 04-15 12:00:31.305 7412 7412 E malloc_debug: allocation[20] = 0xaf (expected 0xef)294 04-15 12:00:31.305 7412 7412 E malloc_debug: allocation[99] = 0x12 (expected 0xef)295 04-15 12:00:31.305 7412 7412 E malloc_debug: Backtrace at time of free:[all …]
126 #define E(i) (U[(i)].E) macro291 float E; /* H(i) * G(i) - 1 (exact) */ member512 d = (x - H(i)) * G(i) + E(i); in k_logl()629 d_hi = (x - H(i)) * G(i) + E(i); in log1pl()
38 …droid.googlesource.com/platform/frameworks/base/+/679f3e4242b8e018eb7df90ef433f81088a64fff%5E%21/),
372 writable. This means that the W (for Writable) and E (for Executable)
2353 // (thanks to the -dD -E flags) and not binary files. They will then be2361 "-E",
4671 Copyright (c) 2000, 2001, 2008, 2011, David E. O'Brien4999 David E. O'Brien