HomeSort by relevance Sort by last modified time
    Searched refs:stack (Results 451 - 475 of 2132) sorted by null

<<11121314151617181920>>

  /device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Library/Thunk16/Ia32/
Thunk16.asm 98 push edi ; save stack offset
100 add edi, eax ; edi <- linear address of 16-bit stack
103 rep movsd ; copy context to 16-bit stack
105 ; copy eflags to stack frame
109 pop ebx ; ebx <- 16-bit stack offset
128 mov edi, edx ; edi <- 16-bit stack segment
147 add eax, esp ; eax <- address of 16-bit stack
161 mov ss, di ; set up stack
  /device/linaro/bootloader/edk2/IntelFspWrapperPkg/Library/SecPeiFspPlatformSecLibSample/Ia32/
PeiCoreEntry.S 29 # Obtain the stack information
50 # Set stack top pointer
69 # Push processor count to stack first, then BIST status (AP then BSP)
118 # Pass stack size into the PEI Core
  /device/linaro/bootloader/edk2/MdeModulePkg/Universal/EbcDxe/X64/
EbcLowLevel.asm 36 ; code. For x64, we switch stacks, copy the arguments to the stack
38 ; On return, we restore the stack pointer to its original location.
52 ; Set stack pointer to new value
76 ; From MSDN x64 Software Conventions, Stack Usage:
77 ; "The stack will always be maintained 16-byte aligned, except within
118 ; The stack is below:
160 ; save old parameter to stack
166 ; Construct new stack
211 ; The stack is below:
  /external/boringssl/src/include/openssl/
pool.h 20 #include <openssl/stack.h>
  /external/compiler-rt/test/asan/TestCases/Linux/
swapcontext_annotation.cc 49 char x[32] = {0}; // Stack gets poisoned.
65 char x[32] = {0}; // Stack gets poisoned.
69 // (b) Jump into the original function. Stack remains poisoned unless we do
98 printf("Child stack: %p\n", child_stack);
119 // Touch childs's stack to make sure it's unpoisoned.
159 char stack[kStackSize + 1]; local
164 ret += Run(argc - 1, 0, stack);
165 ret += Run(argc - 1, 1, stack);
166 ret += Run(argc - 1, 2, stack);
  /external/gemmlowp/profiling/
instrumentation.h 107 // A pseudo-call-stack. Contrary to a real call-stack, this only
162 ProfilingStack stack; member in struct:gemmlowp::ThreadInfo
167 stack.lock = new Mutex();
175 delete self->stack.lock;
209 : profiling_stack_(&ThreadLocalThreadInfo().stack) {
  /external/google-breakpad/src/processor/
stackwalker_x86.h 34 // Provides stack frames given x86 register context and a memory region
35 // corresponding to an x86 stack.
60 // included in the stack. The other arguments are passed directly through
69 // A STACK CFI-driven frame walker for the X86.
73 // stack conventions (saved %ebp at [%ebp], saved %eip at 4[%ebp], or
77 virtual StackFrame* GetCallerFrame(const CallStack* stack,
80 // Use windows_frame_info (derived from STACK WIN and FUNC records)
88 // Use cfi_frame_info (derived from STACK CFI records) to construct
102 // Stores the CPU context corresponding to the innermost stack frame to
  /external/guava/guava/src/com/google/common/io/
Closer.java 110 private final Deque<Closeable> stack = new ArrayDeque<Closeable>(4); field in class:Closer
126 stack.addFirst(closeable);
211 while (!stack.isEmpty()) {
212 Closeable closeable = stack.removeFirst();
  /external/libffi/src/alpha/
ffi.c 82 unsigned long *stack, *argp; local
93 argp = stack = alloca(cif->bytes + 4*FFI_SIZEOF_ARG);
137 if (argp - stack < 6)
169 ffi_call_osf(stack, cif->bytes, cif->flags, rvalue, fn);
233 /* Grab the addresses of the arguments from the stack frame. */
  /external/libunwind/tests/
ia64-test-readonly-asm.S 53 /* We do not need executable stack. */
54 .section .note.GNU-stack,"",@progbits
  /external/linux-kselftest/tools/testing/selftests/vDSO/
Makefile 14 CFLAGS_vdso_standalone_test_x86 := -nostdlib -fno-asynchronous-unwind-tables -fno-stack-protector
  /external/linux-kselftest/tools/testing/selftests/x86/
sysret_ss_attrs.c 44 extern unsigned long call32_from_64(void *stack, void (*function)(void));
89 * end the system call with a valid stack segment. This
  /external/llvm/test/MC/ELF/
basic-elf-32.s 31 .section .note.GNU-stack,"",@progbits
basic-elf-64.s 31 .section .note.GNU-stack,"",@progbits
  /external/llvm/test/MC/Mips/
cpsetup-bad.s 12 # ASM: :[[@LINE-1]]:23: error: expected save register or stack offset
  /external/nist-sip/java/gov/nist/javax/sip/stack/
DefaultMessageLogFactory.java 1 package gov.nist.javax.sip.stack;
7 * The Default Message log factory. This can be replaced as a stack
  /external/python/cpython2/Modules/_ctypes/libffi/src/alpha/
ffi.c 82 unsigned long *stack, *argp; local
93 argp = stack = alloca(cif->bytes + 4*FFI_SIZEOF_ARG);
137 if (argp - stack < 6)
169 ffi_call_osf(stack, cif->bytes, cif->flags, rvalue, fn);
233 /* Grab the addresses of the arguments from the stack frame. */
  /external/strace/m4/
st_libunwind.m4 32 [use libunwind to implement stack tracing support])],
113 [Whether to use libunwind for stack tracing])
  /external/swiftshader/src/OpenGL/common/
MatrixStack.hpp 55 Matrix *stack; member in class:sw::MatrixStack
  /external/swiftshader/third_party/LLVM/include/llvm/Analysis/
PathNumbering.h 35 #include <stack>
49 typedef std::stack<BallLarusNode*> BLNodeStack;
287 void buildNode(BLBlockNodeMap& inDag, std::stack<BallLarusNode*>& dfsStack);
290 void buildEdge(BLBlockNodeMap& inDag, std::stack<BallLarusNode*>& dfsStack,
  /external/swiftshader/third_party/LLVM/test/MC/ELF/
basic-elf-32.s 31 .section .note.GNU-stack,"",@progbits
basic-elf-64.s 31 .section .note.GNU-stack,"",@progbits
  /external/swiftshader/third_party/llvm-7.0/llvm/test/MC/AsmParser/
seh-directive-errors.s 26 # CHECK: :[[@LINE-1]]:{{[0-9]+}}: error: stack allocation size must be non-zero
28 # CHECK: :[[@LINE-1]]:{{[0-9]+}}: error: stack allocation size is not a multiple of 8
53 # CHECK: :[[@LINE-1]]:{{[0-9]+}}: error: you must specify a stack pointer offset
76 # CHECK: :[[@LINE-1]]:{{[0-9]+}}: error: you must specify an offset on the stack
  /external/swiftshader/third_party/llvm-7.0/llvm/test/MC/ELF/
basic-elf-32.s 31 .section .note.GNU-stack,"",@progbits
basic-elf-64.s 32 .section .note.GNU-stack,"",@progbits

Completed in 2275 milliseconds

<<11121314151617181920>>