Search results

Jump to: navigation, search
  • ...r one or more select_alternatives. Two provide timed and conditional entry calls. The fourth provides asynchronous transfer of control.
    1 KB (157 words) - 10:51, 30 April 2019
  • ...or short) is an upper bound on the active priority a task can have when it calls protected operations of that protected object. ..."I6566"></span><span id="I6567"></span><span id="I6568"></span>When a task calls a protected operation, a check is made that its active priority is not high
    6 KB (920 words) - 22:58, 1 May 2019
  • === Displaying Call Chains: CALLS === ...chain is the list of calls leading to the current location. The syntax of CALLS is:
    13 KB (1,852 words) - 00:36, 25 April 2019
  • ...lls, communications, and more. At the code level, RootCause shows function calls, data and variable values, and line-by-line execution of the application. B
    3 KB (399 words) - 03:26, 21 December 2018
  • ...calls executed in parallel on the same task is defined as executing these calls in some serial order. 26  Changing the priorities of a set of tasks can be performed by a series of calls to Set_Priority for each task separately. For this to work reliably, it sho
    5 KB (778 words) - 22:59, 1 May 2019
  • ...able to get all of the transaction data you need using these existing ARM calls. ...need additional ARM instrumentation to obtain that data, we insert the ARM calls you need using RootCause. Then we configure the software and implement your
    3 KB (440 words) - 03:47, 21 December 2018
  • ...F. Debugger Command Reference/Debugging Machine-Level Code#MARKER-2-2020|.calls debugger command]]
    2 KB (237 words) - 16:01, 24 April 2019
  • ...On the other hand, the body of a protected procedure can contain internal calls on both protected functions and procedures. ''Examples of protected subprogram calls (see [[Guide:95lrm/RM-9-4|9.4]]):''
    6 KB (879 words) - 10:39, 30 April 2019
  • ...nterrupt entry behaves like a ordinary entry call. Pending interrupt entry calls to a an interrupt entry are queued one deep.
    909 bytes (136 words) - 00:31, 24 April 2019
  • ...xt]]</div><div class="linenumbers">{{DISPLAYTITLE: 9.7.3 Conditional Entry Calls}}
    2 KB (228 words) - 11:00, 30 April 2019
  • *Pragma EXPORT to allow LegacyAda/390 subprogram calls from VS COBOL II, VS FORTRAN, C/370 and S/370 Assembly.
    1 KB (187 words) - 03:19, 21 December 2018
  • ...ait call and either calls the task entry that registered for the signal or calls the protected object procedure that was registered for the signal. The following calls (to subprograms in the Task_Attributes package) shall be measured:
    12 KB (2,090 words) - 00:36, 25 April 2019
  • ...7-3|Next]]</div><div class="linenumbers">{{DISPLAYTITLE: 9.7.2 Timed Entry Calls}}
    2 KB (308 words) - 10:59, 30 April 2019
  • 2687 locking problem with fast heap and probes across fork() calls.
    2 KB (298 words) - 18:24, 16 February 2021
  • ...am. The probe records the number of calls made to functions, the number of calls made ''by'' functions. The profiling information is reported for the progr // see who calls and is called by system functions
    12 KB (1,561 words) - 16:31, 16 July 2018
  • .... Eventually, all larger blocks may be used and all subsequent allocation calls for a particular size block will return <code>NULL</code>.
    5 KB (796 words) - 14:38, 17 September 2020
  • ...mizer supports [[PowerAda:APPENDIX A. Glossary#MARKER-9-1048|inlining]] of calls to subprograms that the user identifies through the pragma INLINE. The prag ...e certain coding practices and still avoid the overhead of many subprogram calls. For instance, you can separate out a functional block of [[PowerAda:APPEND
    9 KB (1,461 words) - 00:36, 25 April 2019
  • ...et ARM working in the IBM software stack, then use RootCause to inject ARM calls into any components that are not already ARM-enabled—without modifying th
    2 KB (288 words) - 03:46, 21 December 2018
  • ...A ''protected object'' provides coordinated access to shared data, through calls on its visible ''protected operations'', which can be ''protected subprogra ...ations given in the protected_body define the actions that take place upon calls to the protected operations.
    8 KB (1,148 words) - 10:38, 30 April 2019
  • ...s which have been converted to string instructions on Linux x86/x86_64 and calls to AIX low-core millicode functions. : don't instrument x86/_64 string instructions or AIX low-core calls [FALSE]
    14 KB (1,537 words) - 18:32, 6 November 2023

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)