| /external/python/cpython2/Demo/tkinter/guido/ |
| solitaire.py | 13 - The determination of which stack you drag to is more relaxed. 42 # work in a "grid" where each card/stack is surrounded by MARGIN 119 A card doesn't record to which stack it belongs; only the stack 128 tkraise() -- raise the card to the top of its stack 158 (adding it to a stack will position it according to that 159 stack's rules). 217 class Stack: 219 """A generic stack of cards. 226 add(card) -- add a card to the stack [all...] |
| /external/python/cpython2/Lib/ |
| plistlib.py | 155 self.stack = [] 160 self.stack.append(element) 166 assert self.stack.pop() == element 396 self.stack = [] 425 self.stack[-1][self.currentKey] = value 427 elif not self.stack: 431 self.stack[-1].append(value) 447 self.stack.append(d) 449 self.stack.pop() 457 self.stack.append(a [all...] |
| /external/python/cpython2/Lib/idlelib/ |
| Debugger.py | 72 # below. So our stack looks something like this: 86 # ScriptBinding. However, we also need to unwind the stack back to 96 # clean stack. 160 text="Stack", command=self.show_stack, variable=self.vstack) 223 stack, i = self.idb.get_stack(self.frame, tb) 224 sv.load_stack(stack, i) 291 stack, i = self.idb.get_stack(self.frame, None) 292 sv.load_stack(stack, i) 383 self.stack = [] 385 def load_stack(self, stack, index=None) [all...] |
| /external/python/cpython3/Lib/idlelib/ |
| debugger.py | 77 # below. So our stack looks something like this: 91 # ScriptBinding. However, we also need to unwind the stack back to 101 # clean stack. 165 text="Stack", command=self.show_stack, variable=self.vstack) 228 stack, i = self.idb.get_stack(self.frame, tb) 229 sv.load_stack(stack, i) 296 stack, i = self.idb.get_stack(self.frame, None) 297 sv.load_stack(stack, i) 387 self.stack = [] 389 def load_stack(self, stack, index=None) [all...] |
| /external/v8/src/profiler/ |
| profile-generator.cc | 162 info.stack.push_back(CpuProfileDeoptFrame( 165 info.stack = rare_data_->deopt_inlined_frames_; 244 indent + 10, "", info.stack[0].script_id, 245 info.stack[0].position, info.deopt_reason); 246 for (size_t index = 1; index < info.stack.size(); ++index) { 249 indent + 10, "", info.stack[index].script_id, 250 info.stack[index].position); 367 std::vector<Position> stack; local 368 stack.emplace_back(root_); 369 while (stack.size() > 0) [all...] |
| /external/syzkaller/pkg/report/ |
| report.go | 214 // If stack is not nil, extracted function name is passed as an additional last argument. 218 stack *stackFmt 224 // parts describe how guilty stack frame must be extracted from the report. 229 // - special value parseStackTrace means that a stack trace must be parsed 234 // Skip these functions in stack traces (matched as substring). 311 if f.stack != nil { 313 frame, corrupted = extractStackFrame(params, f.stack, output[match[0]:]) 317 corrupted = "extracted no stack frame" 327 // a title of an oops but not full report regexp or stack trace, 351 // stackStartRes matches start of stack traces [all...] |
| /external/libaom/libaom/aom_ports/ |
| x86_abi_support.asm | 167 ; This macro aligns the stack to the given alignment (in bytes). The stack 168 ; is left such that the previous value of the stack pointer is the first 169 ; argument on the stack (ie, the inverse of this macro is 'pop rsp.') 323 ; store registers 6-n on the stack 325 ; Win64 ABI requires 16 byte stack alignment, but then pushes an 8 byte return 326 ; value. Typically we follow this up with 'push rbp' - re-aligning the stack - 385 ; Tell GNU ld that we don't require an executable stack. 387 section .note.GNU-stack noalloc noexec nowrite progbits 390 section .note.GNU-stack noalloc noexec nowrite progbit [all...] |
| /external/libvpx/libvpx/vpx_ports/ |
| x86_abi_support.asm | 164 ; This macro aligns the stack to the given alignment (in bytes). The stack 165 ; is left such that the previous value of the stack pointer is the first 166 ; argument on the stack (ie, the inverse of this macro is 'pop rsp.') 320 ; store registers 6-n on the stack 322 ; Win64 ABI requires 16 byte stack alignment, but then pushes an 8 byte return 323 ; value. Typically we follow this up with 'push rbp' - re-aligning the stack - 382 ; Tell GNU ld that we don't require an executable stack. 384 section .note.GNU-stack noalloc noexec nowrite progbits 387 section .note.GNU-stack noalloc noexec nowrite progbit [all...] |
| /external/deqp/framework/qphelper/ |
| qpTestLog.c | 81 DE_INLINE void ContainerStack_reset (ContainerStack* stack) 83 deMemset(stack, 0, sizeof(ContainerStack)); 86 DE_INLINE deBool ContainerStack_isEmpty (const ContainerStack* stack) 88 return stack->numElements == 0; 91 DE_INLINE deBool ContainerStack_push (ContainerStack* stack, ContainerType type) 93 if (stack->numElements == MAX_CONTAINER_STACK_DEPTH) 96 if (stack->numElements > 0 && !childContainersOk(stack->elements[stack->numElements-1])) 99 stack->elements[stack->numElements] = type [all...] |
| /bionic/libc/arch-mips64/bionic/ |
| syscall.S | 39 PTR_SUBU $sp, FRAMESZ # allocate stack frame
|
| /cts/tests/framework/base/windowmanager/util/src/android/server/wm/ |
| WindowManagerState.java | 204 final WindowStack stack = new WindowStack(stackProto); local 205 mStacks.add(stack); 206 stacks.add(stack); 207 allWindows.addAll(stack.getWindows()); 449 for (WindowStack stack : mStacks) { 450 if (stackId == stack.mStackId) { 458 for (WindowStack stack : mStacks) { 460 && activityType != stack.getActivityType()) { 464 && windowingMode != stack.getWindowingMode()) { 514 for (WindowStack stack : mStacks) [all...] |
| /device/google/bonito/json-c/ |
| json_tokener.h | 86 struct json_tokener_srec *stack; member in struct:json_tokener
|
| /device/google/crosshatch/json-c/ |
| json_tokener.h | 86 struct json_tokener_srec *stack; member in struct:json_tokener
|
| /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/hotshot/ |
| log.py | 38 # This mirrors the call stack of the profiled code as the log
182 stack = [st.totuple(1)]
184 while stack:
185 tree = stack.pop()
194 stack.extend(list(tree[1:]))
|
| /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
| pickletools.py | 39 The PM has two data areas, "the stack" and "the memo".
41 Many opcodes push Python objects onto the stack; e.g., INT pushes a Python
42 integer object on the stack, whose value is gotten from a decimal string
44 opcodes take Python objects off the stack. The result of unpickling is
45 whatever object is left on the stack when the final STOP opcode is executed.
50 names. Some opcodes pop a stack object into the memo at a given index,
51 and others push a memo object at a given index onto the stack again.
111 a number of opcodes that operate on many stack elements at once (like APPENDS
153 # off the stack -- ArgumentDescriptor applies only to arguments embedded in
692 # Object descriptors. The stack used by the pickle machine holds objects, [all...] |
| /device/linaro/bootloader/edk2/ArmPlatformPkg/ArmVExpressPkg/Library/ArmVExpressSecLibRTSM/Arm/ |
| RTSMBoot.asm | 34 Note: This function must be implemented in assembler as there is no stack set up yet
46 This function is called before the satck has been set up. Its implementation must ensure the stack
|
| /device/linaro/bootloader/edk2/ArmPlatformPkg/Library/ArmPlatformSecLibNull/Arm/ |
| ArmPlatformLibNullBoot.asm | 29 Note: This function must be implemented in assembler as there is no stack set up yet
41 This function is called before the satck has been set up. Its implementation must ensure the stack
|
| /device/linaro/bootloader/edk2/CorebootModulePkg/SecCore/Ia32/ |
| SecEntry.asm | 63 ; Pass stack base into the PEI Core
68 ; Pass stack size into the PEI Core
|
| /device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Library/CompilerStub/Ia32/ |
| memcpy.asm | 65 pop ecx ; stack cleanup
66 pop ecx ; stack cleanup
|
| /device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Library/Pei/PeiLib/Ia32/ |
| ProcessorAsms.S | 131 # This allows the caller to switch the stack and goes to the new entry point
136 # NewStack - New Location of the stack
169 # This allows the caller to switch the stack and goes to the new entry point
174 # NewStack - New Location of the stack
|
| /device/linaro/bootloader/edk2/IntelFspPkg/FspSecCore/Ia32/ |
| FspHelper.asm | 43 ; No stack counter part of AsmGetFspBaseAddress. Return address is in edi.
65 ; No stack counter part of AsmGetFspInfoHeader. Return address is in edi.
|
| /device/linaro/bootloader/edk2/IntelFspPkg/Library/BaseFspSwitchStackLib/Ia32/ |
| Stack.asm | 14 ; Switch the stack from temporary memory to permenent memory.
63 ; Load new stack
|
| /device/linaro/bootloader/edk2/MdePkg/Library/BaseLib/Arm/ |
| SwitchStack.asm | 20 ; This allows the caller to switch the stack and goes to the new entry point
25 ; @param NewStack New Location of the stack
|
| /device/linaro/bootloader/edk2/MdePkg/Library/BaseLib/Ia32/ |
| DivU64x32.S | 37 push %eax # save quotient on stack
|
| /device/linaro/bootloader/edk2/MdePkg/Library/BaseMemoryLibMmx/Ia32/ |
| CopyMem.asm | 62 pop ecx ; stack cleanup
63 pop ecx ; stack cleanup
|