HomeSort by relevance Sort by last modified time
    Searched refs:stack (Results 426 - 450 of 965) sorted by null

<<11121314151617181920>>

  /external/libffi/src/sparc/
ffi.c 33 /* ffi_prep_args is called by the assembly routine once stack space
36 void ffi_prep_args_v8(char *stack, extended_cif *ecif)
44 argp = stack + 16*sizeof(int);
122 int ffi_prep_args_v9(char *stack, extended_cif *ecif)
133 argp = stack + 16*sizeof(long long);
287 /* The stack must be 2 word aligned, so round bytes up
498 /* Grab the addresses of the arguments from the stack frame. */
565 /* Grab the addresses of the arguments from the stack frame. */
  /external/nist-sip/java/gov/nist/javax/sip/parser/
Pipeline.java 29 import gov.nist.javax.sip.stack.SIPStackTimerTask;
  /external/opencv/cxcore/include/
cxmisc.h 66 /* maximal linear size of matrix to allocate it on stack. */
433 stack[48]; \
440 stack[0].lb = array; \
441 stack[0].ub = array + (total - 1); \
445 T* left = stack[sp].lb; \
446 T* right = stack[sp--].ub; \
562 stack[++sp].lb = left0; \
563 stack[sp].ub = left0 + n - 1; \
568 stack[++sp].lb = right0 - m + 1; \
569 stack[sp].ub = right0;
    [all...]
  /external/openssl/crypto/asn1/
tasn_prn.c 357 STACK_OF(ASN1_VALUE) *stack;
376 stack = (STACK_OF(ASN1_VALUE) *)*fld;
377 for(i = 0; i < sk_ASN1_VALUE_num(stack); i++)
382 skitem = sk_ASN1_VALUE_value(stack, i);
  /external/protobuf/src/google/protobuf/
test_util.h 38 #include <stack>
158 // We have to split this into three function otherwise it creates a stack
  /external/v8/test/mjsunit/
arguments-apply.js 109 // Make sure that the stack after the apply optimization is
132 // stack even in the presence of the apply optimizations.
  /external/v8/test/mjsunit/bugs/
bug-941049.js 96 // activation of q is popped from the stack.
99 // activation of q is popped from the stack.
  /external/valgrind/main/coregrind/m_syswrap/
syscall-amd64-linux.S 131 pushq %rdi /* syscallno -> stack */
208 /* Let the linker know we don't need an executable stack */
209 .section .note.GNU-stack,"",@progbits
syscall-x86-linux.S 168 /* Let the linker know we don't need an executable stack */
169 .section .note.GNU-stack,"",@progbits
  /external/valgrind/main/exp-bbv/tests/amd64-linux/
clone_test.S 43 mov $(new_stack+4096),%rsi # new stack
  /external/valgrind/main/exp-bbv/tests/x86-linux/
clone_test.S 43 mov $(new_stack+4096),%ecx # new stack
  /external/valgrind/main/memcheck/tests/amd64-linux/
defcfaexpr.S 3 stack unwinder understands DW_CFA_def_cfa_expression. It is
28 The .jz causes memcheck to complain, hence unwind the stack, but
144 GDB to show an extraneous aaa frame on the stack. Oh well. */
186 .section .note.GNU-stack,"",@progbits
  /external/webkit/Source/JavaScriptCore/wtf/
WTFThreadData.h 118 const StackBounds& stack() const function in class:WTF::WTFThreadData
  /frameworks/base/opengl/libagl/
matrix.cpp 127 // Validate the projection stack (in fact, it's never needed)
152 // Validate the texture stack
387 stack = new matrixf_t[depth];
396 delete [] stack;
402 stack[depth].loadIdentity();
409 stack[depth].load(rhs);
415 stack[depth].load(rhs);
421 stack[depth].multiply(rhs);
427 stack[depth].translate(x,y,z);
433 stack[depth].scale(x,y,z)
912 matrix_stack_t* stack = 0; local
    [all...]
  /external/openssl/ssl/
Makefile 123 bio_ssl.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
142 d1_both.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
164 d1_clnt.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
184 d1_enc.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
203 d1_lib.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
222 d1_meth.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
241 d1_pkt.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
263 d1_srvr.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
281 kssl.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
300 s23_clnt.o: ../include/openssl/ssl3.h ../include/openssl/stack.
    [all...]
  /dalvik/vm/mterp/x86-atom/
OP_DOUBLE_TO_LONG.S 34 fldl (rFP, rINST, 4) # push vB to floating point stack
OP_EXECUTE_INLINE.S 84 lea 24(%esp), %esp # update stack pointer
OP_FLOAT_TO_LONG.S 34 flds (rFP, rINST, 4) # push vB to floating point stack
entry.S 39 lea -40(%esp), %esp # set callee stack pointer
49 lea 40(%esp), %esp # correct stack pointer
58 * DvmMterpStdRun entry point: save stack pointer, setup memory locations, get
102 * Restore the stack pointer and PC from the save point established on entry and
  /external/javassist/src/main/javassist/bytecode/stackmap/
TypedBlock.java 68 sbuf.append(",\n stack={");
98 public void setStackMap(int st, TypeData[] stack, int nl, TypeData[] locals)
102 stackTypes = stack;
  /external/javassist/src/main/javassist/expr/
Expr.java 84 protected final int stack() { method in class:Expr
229 * After executing this method, the current stack depth might be less than
313 codeAttr.setMaxStack(stack()); method
  /external/libffi/src/powerpc/
ffi.c 63 /* ffi_prep_args_SYSV is called by the assembly routine once stack space
66 The stack layout we want looks like this:
70 | Previous backchain pointer 4 | stack pointer here
77 |--------------------------------------------| | stack |
83 |--------------------------------------------| | stack pointer here
90 ffi_prep_args_SYSV (extended_cif *ecif, unsigned *const stack)
144 stacktop.c = (char *) stack + bytes;
150 next_arg.u = stack + 2;
153 FFI_ASSERT (((unsigned) (char *) stack & 0xF) == 0);
222 stack, 4-byte aligned. *
    [all...]
  /external/llvm/lib/Target/X86/
X86CompilationCallback_Win64.asm 30 ; Align stack on 16-byte boundary.
  /external/openssl/crypto/bn/asm/
sparcv9a-mont.pl 148 add %sp,$bias,%o0 ! real top of stack
  /external/openssl/crypto/perlasm/
x86gas.pl 118 $::stack=4;
124 $::stack=0;

Completed in 1694 milliseconds

<<11121314151617181920>>