/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/vpx_ports/ |
x86_abi_support.asm | 164 ; This macro aligns the stack to the given alignment (in bytes). The stack 165 ; is left such that the previous value of the stack pointer is the first 166 ; argument on the stack (ie, the inverse of this macro is 'pop rsp.') 322 ; store registers 6-n on the stack 324 ; Win64 ABI requires 16 byte stack alignment, but then pushes an 8 byte return 325 ; value. Typically we follow this up with 'push rbp' - re-aligning the stack - 384 ; Tell GNU ld that we don't require an executable stack. 386 section .note.GNU-stack noalloc noexec nowrite progbits 389 section .note.GNU-stack noalloc noexec nowrite progbit [all...] |
/external/deqp/framework/qphelper/ |
qpTestLog.c | 81 DE_INLINE void ContainerStack_reset (ContainerStack* stack) 83 deMemset(stack, 0, sizeof(ContainerStack)); 86 DE_INLINE deBool ContainerStack_isEmpty (const ContainerStack* stack) 88 return stack->numElements == 0; 91 DE_INLINE deBool ContainerStack_push (ContainerStack* stack, ContainerType type) 93 if (stack->numElements == MAX_CONTAINER_STACK_DEPTH) 96 if (stack->numElements > 0 && !childContainersOk(stack->elements[stack->numElements-1])) 99 stack->elements[stack->numElements] = type [all...] |
/bionic/libc/arch-mips64/bionic/ |
syscall.S | 39 PTR_SUBU sp, FRAMESZ # allocate stack frame
|
/bionic/libc/arch-x86/bionic/ |
__bionic_clone.S | 16 # Copy 'fn' and 'arg' onto the child stack
|
/bionic/linker/ |
Android.mk | 27 -fno-stack-protector \ 60 # Leave the symbols in the shared library so that stack unwinders can produce
|
/device/moto/shamu/camera/QCamera/HAL2/core/ |
Android.mk | 52 $(LOCAL_PATH)/../../stack/mm-camera-interface/inc\ 53 $(LOCAL_PATH)/../../stack/mm-jpeg-interface/inc\
|
/external/bluetooth/bluedroid/bta/ |
Android.mk | 106 $(LOCAL_PATH)/../stack/include \ 107 $(LOCAL_PATH)/../stack/btm \
|
/external/chromium_org/components/nacl/loader/nonsfi/ |
irt_exception_handling.cc | 62 int IrtExceptionStack(void* stack, size_t size) { 63 // TODO(uekawa): Implement this function so that the exception stack 65 // we don't switch stack, which means we can't handle stack overflow
|
irt_thread.cc | 17 // We heuristically chose 1M for the stack size per thread. 56 int IrtThreadCreate(void (*start_func)(), void* stack, void* thread_ptr) { 63 // Note: Currently we ignore the argument stack. 88 // As we actually don't use stack given to thread_create, it means that the
|
/external/chromium_org/third_party/bintrees/bintrees/ |
walker.py | 150 stack = self._stack 154 stack.append(node) 162 if len(stack) == 0: 164 node = stack.pop()
|
/external/chromium_org/third_party/cld/base/ |
stl_decl_msvc.h | 30 #include <stack>
|
/external/chromium_org/third_party/libvpx/source/libvpx/vp8/common/arm/armv6/ |
sixtappredict8x4_v6.asm | 20 ; stack unsigned char *dst_ptr, 21 ; stack int dst_pitch 23 ;note: In first pass, store the result in transpose(8linesx9columns) on stack. Temporary stack size is 184. 24 ;Line width is 20 that is 9 short data plus 2 to make it 4bytes aligned. In second pass, load data from stack, 28 str r3, [sp, #-184]! ;reserve space on stack for temporary storage, store yoffset 124 ldr r0, [sp, #216] ; load dst address from stack 180+36 125 ldr r1, [sp, #220] ; load dst stride from stack 180+40
|
/external/chromium_org/third_party/libvpx/source/libvpx/vp8/encoder/ppc/ |
rdopt_altivec.asm | 22 stwu r1,-32(r1) ;# create space on the stack 48 addi r1, r1, 32 ;# recover stack
|
/external/chromium_org/third_party/mesa/src/src/glx/ |
indirect_vertex_array_priv.h | 306 struct array_stack_state *stack; member in struct:array_state_vector
|
/external/chromium_org/third_party/openssl/openssl/crypto/txt_db/ |
txt_db.h | 66 #include <openssl/stack.h>
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
txt_db.h | 66 #include <openssl/stack.h>
|
/external/chromium_org/third_party/skia/tests/ |
ClipCacheTest.cpp | 71 // create a clip stack that will (trivially) reduce to a single rect that 73 SkClipStack stack; local 74 stack.clipDevRect(clipRect, SkRegion::kReplace_Op, false); 79 stack.getConservativeBounds(0, 0, kXSize, kYSize, 89 clipData.fClipStack = &stack; 102 // verify that the top state of the stack matches the passed in state
|
/external/chromium_org/third_party/tcmalloc/chromium/src/ |
stacktrace_arm-inl.h | 48 // mode in a fixed location on its stack frame. If the caller is a different 50 // still in the designated register or saved on stack along with other callee 53 // Given a pointer to a stack frame, locate and return the calling 64 // With the stack growing downwards, older stack frame must be 67 // Assume stack frames larger than 100,000 bytes are bogus. 70 // In the non-strict mode, allow discontiguous stack frames. 98 // void** result: the stack-trace, as an array 99 // int* sizes: the size of each stack frame, as an array 102 // int skip_count: how many stack pointers to skip before storing in resul [all...] |
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
stacktrace_arm-inl.h | 48 // mode in a fixed location on its stack frame. If the caller is a different 50 // still in the designated register or saved on stack along with other callee 53 // Given a pointer to a stack frame, locate and return the calling 64 // With the stack growing downwards, older stack frame must be 67 // Assume stack frames larger than 100,000 bytes are bogus. 70 // In the non-strict mode, allow discontiguous stack frames. 98 // void** result: the stack-trace, as an array 99 // int* sizes: the size of each stack frame, as an array 102 // int skip_count: how many stack pointers to skip before storing in resul [all...] |
/external/chromium_org/third_party/yasm/source/patched-yasm/tools/python-yasm/pyxelator/ |
cparse.py | 265 stack = [] 266 # read up to identifier, pushing tokens onto stack 267 self.ident = self.parse_identifier(lexer,symbols,stack) 273 self.parse_declarator(lexer,symbols,stack) 276 def parse_identifier(self,lexer,symbols,stack): 282 stack.append( (lexer.tok, lexer.kind) ) 286 #stack.append( (ident.name, ident) ) 292 def parse_declarator(self,lexer,symbols,stack,level=0): 295 (self,stack) 312 while stack [all...] |
/external/chromium_org/tools/clang/blink_gc_plugin/ |
JsonWriter.h | 70 std::stack<bool> state_;
|
/external/chromium_org/v8/src/ |
regexp-stack.h | 13 // Maintains a per-v8thread stack area that can be used by irregexp 14 // implementation for its backtracking stack. 15 // Since there is only one stack area, the Irregexp implementation is not 20 // Create and delete an instance to control the life-time of a growing stack. 22 // Initializes the stack memory area if necessary. 24 ~RegExpStackScope(); // Releases the stack if it has grown. 26 RegExpStack* stack() const { return regexp_stack_; } function in class:v8::internal::RegExpStackScope 37 // Number of allocated locations on the stack below the limit. 38 // No sequence of pushes must be longer that this without doing a stack-limit 42 // Gives the top of the memory used as stack [all...] |
/external/chromium_org/v8/test/cctest/ |
test-log-stack-tracer.cc | 76 // from the calling function. When this function runs, the stack contains 138 // This test verifies that stack tracing works when called during 140 // TickSample::Trace uses Isolate::c_entry_fp as a starting point for stack 163 // When stack tracer is invoked, the stack should look as follows: 174 // Stack tracing will start from the first JS function, i.e. "JSFuncDoTrace" 179 context, "JSFuncDoTrace", sample.stack[base + 0])); 180 CHECK(IsAddressWithinFuncCode(context, "JSTrace", sample.stack[base + 1])); 184 // This test verifies that stack tracing works when called during 188 // pointer value as a starting point for stack walking [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_fd.h | 57 bool FdLocation(uptr addr, int *fd, int *tid, u32 *stack);
|
tsan_mman.cc | 75 StackTrace stack; 76 stack.ObtainCurrent(thr, pc); 79 if (!IsFiredSuppression(ctx, rep, stack)) { 80 rep.AddStack(&stack, true);
|