| /prebuilts/gcc/darwin-x86/arm/arm-eabi-4.6/lib/gcc/arm-eabi/4.6.x-google/plugin/include/ |
| vec.h | [all...] |
| /prebuilts/gcc/darwin-x86/arm/arm-linux-androideabi-4.6/lib/gcc/arm-linux-androideabi/4.6.x-google/plugin/include/ |
| vec.h | [all...] |
| /prebuilts/gcc/linux-x86/arm/arm-eabi-4.6/lib/gcc/arm-eabi/4.6.x-google/plugin/include/ |
| vec.h | [all...] |
| /prebuilts/gcc/linux-x86/arm/arm-linux-androideabi-4.6/lib/gcc/arm-linux-androideabi/4.6.x-google/plugin/include/ |
| vec.h | [all...] |
| /dalvik/vm/mterp/armv5te/ |
| OP_EXECUTE_INLINE.S | 10 * is on the stack. The function's return value is a flag that tells 28 add sp, sp, #8 @ pop stack 85 add sp, sp, #8 @ pop stack
|
| OP_EXECUTE_INLINE_RANGE.S | 11 * is on the stack. The function's return value is a flag that tells 26 add sp, sp, #8 @ pop stack 79 add sp, sp, #8 @ pop stack
|
| /external/compiler-rt/lib/asan/ |
| asan_internal.h | 124 void ReadContextStack(void *context, uptr *stack, uptr *ssize);
|
| /external/freetype/src/cff/ |
| cffgload.h | 125 FT_Fixed stack[CFF_MAX_OPERANDS + 1]; member in struct:CFF_Decoder_
|
| /external/kernel-headers/original/asm-mips/ |
| thread_info.h | 20 * - this struct shares the supervisor stack pages 59 #define init_stack (init_thread_union.stack)
|
| /external/nist-sip/java/gov/nist/javax/sip/ |
| NistSipMessageFactoryImpl.java | 32 import gov.nist.javax.sip.stack.*; 37 * Implements all the support classes that are necessary for the nist-sip stack 38 * on which the jain-sip stack has been based. This is a mapping class to map 42 * messageChannel, the NIST-SIP stack calls the SIPStackMessageFactory 92 * Generate a new server response for the stack.
|
| /external/nist-sip/java/gov/nist/javax/sip/stack/ |
| HopImpl.java | 29 package gov.nist.javax.sip.stack;
|
| MessageLog.java | 30 package gov.nist.javax.sip.stack; 66 * @see gov.nist.javax.sip.stack.LogRecord#equals(java.lang.Object) 142 * @see gov.nist.javax.sip.stack.LogRecord#toString()
|
| /external/speex/libspeex/ |
| cb_search_sse.h | 54 static void compute_weighted_codebook(const signed char *shape_cb, const spx_sig_t *_r, float *resp, __m128 *resp2, __m128 *E, int shape_cb_size, int subvect_size, char *stack)
|
| ltp_arm4.h | 88 void pitch_xcorr(const spx_word16_t *_x, const spx_word16_t *_y, spx_word32_t *corr, int len, int nb_pitch, char *stack)
|
| ltp_sse.h | 57 void pitch_xcorr(const float *_x, const float *_y, float *corr, int len, int nb_pitch, char *stack)
|
| vq_arm4.h | 36 void vq_nbest(spx_word16_t *in, const spx_word16_t *codebook, int len, int entries, spx_word32_t *E, int N, int *nbest, spx_word32_t *best_dist, char *stack)
|
| /external/v8/test/cctest/ |
| test-log-stack-tracer.cc | 73 // sp is only used to define stack high bound 214 // from the calling function. When this function runs, the stack contains 273 // This test verifies that stack tracing works when called during 275 // StackTracer uses Isolate::c_entry_fp as a starting point for stack 296 // When stack tracer is invoked, the stack should look as follows: 307 // Stack tracing will start from the first JS function, i.e. "JSFuncDoTrace" 311 CHECK(IsAddressWithinFuncCode("JSFuncDoTrace", sample.stack[base + 0])); 312 CHECK(IsAddressWithinFuncCode("JSTrace", sample.stack[base + 1])); 316 // This test verifies that stack tracing works when called durin [all...] |
| /external/v8/test/mjsunit/regress/ |
| regress-1118.js | 30 // An exception thrown in a function optimized by on-stack replacement (OSR) 31 // should be able to construct a receiver from all optimized stack frames.
|
| regress-1184.js | 28 // Test the case when finally clause throws another exception (stack overflow) 41 // stack with catcher set while processing exception
|
| /external/valgrind/main/coregrind/m_dispatch/ |
| dispatch-mips32-linux.S | 66 /* New stack frame. Stack must remain 8 aligned (at least) */ 89 /* Save a0 ($4) on stack. In postamble it will be restored such that the 115 /* Restore $4 from stack; holds address of two_words */ 243 /* Let the linker know we do not need an executable stack */ 244 .section .note.GNU-stack,"",@progbits
|
| /external/valgrind/main/coregrind/m_syswrap/ |
| syscall-arm-linux.S | 79 /* Stash callee-saves and our args on the stack */ 144 /* Let the linker know we don't need an executable stack */ 145 .section .note.GNU-stack,"",%progbits
|
| /external/valgrind/main/massif/tests/ |
| deep-C.stderr.exp | 50 Massif: stack allocs: 0 51 Massif: stack frees: 0
|
| /external/webkit/Tools/Scripts/ |
| run-leaks | 131 # Call stack: leak_caller() | leak() | malloc 177 "callStack" => "", # The leaks tool sometimes omits the call stack. 183 if ($line =~ /Call stack:/) {
|
| /prebuilts/gcc/darwin-x86/arm/arm-eabi-4.6/arm-eabi/lib/ldscripts/ |
| armelf.xr | 151 .stack 0 : 153 *(.stack)
|
| armelf.xu | 152 .stack 0 : 154 *(.stack)
|