| /device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Library/Thunk16/Ia32/ |
| Thunk16.asm | 98 push edi ; save stack offset
100 add edi, eax ; edi <- linear address of 16-bit stack
103 rep movsd ; copy context to 16-bit stack
105 ; copy eflags to stack frame
109 pop ebx ; ebx <- 16-bit stack offset
128 mov edi, edx ; edi <- 16-bit stack segment
147 add eax, esp ; eax <- address of 16-bit stack
161 mov ss, di ; set up stack
|
| /device/linaro/bootloader/edk2/IntelFspWrapperPkg/Library/SecPeiFspPlatformSecLibSample/Ia32/ |
| PeiCoreEntry.S | 29 # Obtain the stack information
50 # Set stack top pointer
69 # Push processor count to stack first, then BIST status (AP then BSP)
118 # Pass stack size into the PEI Core
|
| /device/linaro/bootloader/edk2/MdeModulePkg/Universal/EbcDxe/X64/ |
| EbcLowLevel.asm | 36 ; code. For x64, we switch stacks, copy the arguments to the stack
38 ; On return, we restore the stack pointer to its original location.
52 ; Set stack pointer to new value
76 ; From MSDN x64 Software Conventions, Stack Usage:
77 ; "The stack will always be maintained 16-byte aligned, except within
118 ; The stack is below:
160 ; save old parameter to stack
166 ; Construct new stack
211 ; The stack is below:
|
| /external/boringssl/src/include/openssl/ |
| pool.h | 20 #include <openssl/stack.h>
|
| /external/compiler-rt/test/asan/TestCases/Linux/ |
| swapcontext_annotation.cc | 49 char x[32] = {0}; // Stack gets poisoned. 65 char x[32] = {0}; // Stack gets poisoned. 69 // (b) Jump into the original function. Stack remains poisoned unless we do 98 printf("Child stack: %p\n", child_stack); 119 // Touch childs's stack to make sure it's unpoisoned. 159 char stack[kStackSize + 1]; local 164 ret += Run(argc - 1, 0, stack); 165 ret += Run(argc - 1, 1, stack); 166 ret += Run(argc - 1, 2, stack);
|
| /external/gemmlowp/profiling/ |
| instrumentation.h | 107 // A pseudo-call-stack. Contrary to a real call-stack, this only 162 ProfilingStack stack; member in struct:gemmlowp::ThreadInfo 167 stack.lock = new Mutex(); 175 delete self->stack.lock; 209 : profiling_stack_(&ThreadLocalThreadInfo().stack) {
|
| /external/google-breakpad/src/processor/ |
| stackwalker_x86.h | 34 // Provides stack frames given x86 register context and a memory region 35 // corresponding to an x86 stack. 60 // included in the stack. The other arguments are passed directly through 69 // A STACK CFI-driven frame walker for the X86. 73 // stack conventions (saved %ebp at [%ebp], saved %eip at 4[%ebp], or 77 virtual StackFrame* GetCallerFrame(const CallStack* stack, 80 // Use windows_frame_info (derived from STACK WIN and FUNC records) 88 // Use cfi_frame_info (derived from STACK CFI records) to construct 102 // Stores the CPU context corresponding to the innermost stack frame to
|
| /external/guava/guava/src/com/google/common/io/ |
| Closer.java | 110 private final Deque<Closeable> stack = new ArrayDeque<Closeable>(4); field in class:Closer 126 stack.addFirst(closeable); 211 while (!stack.isEmpty()) { 212 Closeable closeable = stack.removeFirst();
|
| /external/libffi/src/alpha/ |
| ffi.c | 82 unsigned long *stack, *argp; local 93 argp = stack = alloca(cif->bytes + 4*FFI_SIZEOF_ARG); 137 if (argp - stack < 6) 169 ffi_call_osf(stack, cif->bytes, cif->flags, rvalue, fn); 233 /* Grab the addresses of the arguments from the stack frame. */
|
| /external/libunwind/tests/ |
| ia64-test-readonly-asm.S | 53 /* We do not need executable stack. */ 54 .section .note.GNU-stack,"",@progbits
|
| /external/linux-kselftest/tools/testing/selftests/vDSO/ |
| Makefile | 14 CFLAGS_vdso_standalone_test_x86 := -nostdlib -fno-asynchronous-unwind-tables -fno-stack-protector
|
| /external/linux-kselftest/tools/testing/selftests/x86/ |
| sysret_ss_attrs.c | 44 extern unsigned long call32_from_64(void *stack, void (*function)(void)); 89 * end the system call with a valid stack segment. This
|
| /external/llvm/test/MC/ELF/ |
| basic-elf-32.s | 31 .section .note.GNU-stack,"",@progbits
|
| basic-elf-64.s | 31 .section .note.GNU-stack,"",@progbits
|
| /external/llvm/test/MC/Mips/ |
| cpsetup-bad.s | 12 # ASM: :[[@LINE-1]]:23: error: expected save register or stack offset
|
| /external/nist-sip/java/gov/nist/javax/sip/stack/ |
| DefaultMessageLogFactory.java | 1 package gov.nist.javax.sip.stack; 7 * The Default Message log factory. This can be replaced as a stack
|
| /external/python/cpython2/Modules/_ctypes/libffi/src/alpha/ |
| ffi.c | 82 unsigned long *stack, *argp; local 93 argp = stack = alloca(cif->bytes + 4*FFI_SIZEOF_ARG); 137 if (argp - stack < 6) 169 ffi_call_osf(stack, cif->bytes, cif->flags, rvalue, fn); 233 /* Grab the addresses of the arguments from the stack frame. */
|
| /external/strace/m4/ |
| st_libunwind.m4 | 32 [use libunwind to implement stack tracing support])], 113 [Whether to use libunwind for stack tracing])
|
| /external/swiftshader/src/OpenGL/common/ |
| MatrixStack.hpp | 55 Matrix *stack; member in class:sw::MatrixStack
|
| /external/swiftshader/third_party/LLVM/include/llvm/Analysis/ |
| PathNumbering.h | 35 #include <stack> 49 typedef std::stack<BallLarusNode*> BLNodeStack; 287 void buildNode(BLBlockNodeMap& inDag, std::stack<BallLarusNode*>& dfsStack); 290 void buildEdge(BLBlockNodeMap& inDag, std::stack<BallLarusNode*>& dfsStack,
|
| /external/swiftshader/third_party/LLVM/test/MC/ELF/ |
| basic-elf-32.s | 31 .section .note.GNU-stack,"",@progbits
|
| basic-elf-64.s | 31 .section .note.GNU-stack,"",@progbits
|
| /external/swiftshader/third_party/llvm-7.0/llvm/test/MC/AsmParser/ |
| seh-directive-errors.s | 26 # CHECK: :[[@LINE-1]]:{{[0-9]+}}: error: stack allocation size must be non-zero 28 # CHECK: :[[@LINE-1]]:{{[0-9]+}}: error: stack allocation size is not a multiple of 8 53 # CHECK: :[[@LINE-1]]:{{[0-9]+}}: error: you must specify a stack pointer offset 76 # CHECK: :[[@LINE-1]]:{{[0-9]+}}: error: you must specify an offset on the stack
|
| /external/swiftshader/third_party/llvm-7.0/llvm/test/MC/ELF/ |
| basic-elf-32.s | 31 .section .note.GNU-stack,"",@progbits
|
| basic-elf-64.s | 32 .section .note.GNU-stack,"",@progbits
|