Searched refs:opcode (Results 126 - 150 of 375) sorted by relevance

1234567891011>>

/external/proguard/src/proguard/optimize/
H A DTailRecursionSimplifier.java155 switch (constantInstruction.opcode)
173 switch (nextInstruction.opcode)
289 byte opcode;
297 opcode = InstructionConstants.OP_ISTORE;
301 opcode = InstructionConstants.OP_LSTORE;
305 opcode = InstructionConstants.OP_FSTORE;
309 opcode = InstructionConstants.OP_DSTORE;
313 opcode = InstructionConstants.OP_ASTORE;
318 new VariableInstruction(opcode, parameterOffset + parameterIndex).shrink());
/external/smali/dexlib/src/main/java/org/jf/dexlib/Code/Format/
H A DUnresolvedOdexInstruction.java45 super(originalInstruction.opcode);
/external/tcpdump/
H A Dprint-rx.c383 * Cache entries we keep around so we can figure out the RX opcode
393 u_int32_t opcode; /* RX opcode (host order) */ member in struct:rx_cache_entry
439 int32_t opcode; local
541 sport, &opcode)) {
545 fs_reply_print(bp, length, opcode);
548 cb_reply_print(bp, length, opcode);
551 prot_reply_print(bp, length, opcode);
554 vldb_reply_print(bp, length, opcode);
557 kauth_reply_print(bp, length, opcode);
616 rx_cache_find(const struct rx_header *rxh, const struct ip *ip, int sport, int32_t *opcode) argument
922 fs_reply_print(register const u_char *bp, int length, int32_t opcode) argument
1171 cb_reply_print(register const u_char *bp, int length, int32_t opcode) argument
1362 prot_reply_print(register const u_char *bp, int length, int32_t opcode) argument
1567 vldb_reply_print(register const u_char *bp, int length, int32_t opcode) argument
1847 kauth_reply_print(register const u_char *bp, int length, int32_t opcode) argument
1936 vol_reply_print(register const u_char *bp, int length, int32_t opcode) argument
2071 bos_reply_print(register const u_char *bp, int length, int32_t opcode) argument
2115 is_ubik(u_int32_t opcode) argument
2238 ubik_reply_print(register const u_char *bp, int length, int32_t opcode) argument
[all...]
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/
H A Dmux.py154 def _create_control_block_length_value(channel_id, opcode, flags, value):
155 """Creates a control block that consists of objective channel id, opcode,
156 flags, encoded length of opcode specific value, and the value.
161 opcode: opcode of the control block.
162 flags: 3bit opcode specific flags.
163 value: opcode specific data.
168 if (opcode != _MUX_OPCODE_ADD_CHANNEL_REQUEST and
169 opcode != _MUX_OPCODE_ADD_CHANNEL_RESPONSE and
170 opcode !
[all...]
/external/bluetooth/bluedroid/hci/include/
H A Dbt_vendor_lib.h251 * The opcode parameter gives the HCI OpCode (combination of OGF and OCF) of
252 * HCI Command packet. For example, opcode = 0x0c03 for the HCI_RESET command
255 typedef uint8_t (*cmd_xmit_cb)(uint16_t opcode, void *p_buf, tINT_CMD_CBACK p_cback);
303 int (*op)(bt_vendor_opcode_t opcode, void *param);
/external/bluetooth/bluedroid/hci/src/
H A Dbt_hw.c160 static uint8_t xmit_cb(uint16_t opcode, void *p_buf, tINT_CMD_CBACK p_cback) argument
162 return p_hci_if->send_int_cmd(opcode, (HC_BT_HDR *)p_buf, p_cback);
/external/chromium/sdch/open-vcdiff/src/
H A Dinstruction_map.h38 // the corresponding opcode.
44 // to create the instruction->opcode mappings. The caller *must* have
54 // Finds an opcode that has the given inst, size, and mode for its first
57 // opcode. Otherwise, returns an opcode value between 0 and 255.
60 // usually want to try again with size == 0 to find an opcode that
73 // Given a first opcode (presumed to have been returned by a previous call to
74 // lookupFirstOpcode), finds an opcode that has the same first instruction as
75 // the first opcode, and has the given inst, size, and mode for its second
79 // usually want to try again with size == 0 to find an opcode tha
97 Add(unsigned char inst, unsigned char size, unsigned char mode, unsigned char opcode) argument
[all...]
H A Dencodetable_test.cc56 int opcode) {
57 g_exercise_code_table_->inst1[opcode] = inst1;
58 g_exercise_code_table_->mode1[opcode] = mode1;
59 g_exercise_code_table_->size1[opcode] = (inst1 == VCD_NOOP) ? 0 : size1;
60 g_exercise_code_table_->inst2[opcode] = inst2;
61 g_exercise_code_table_->mode2[opcode] = mode2;
62 g_exercise_code_table_->size2[opcode] = (inst2 == VCD_NOOP) ? 0 : size2;
67 int opcode = 0; local
86 AddExerciseOpcode(inst1, mode1, 0, inst2, mode2, 0, opcode++);
87 AddExerciseOpcode(inst1, mode1, 0, inst2, mode2, 255, opcode
50 AddExerciseOpcode(unsigned char inst1, unsigned char mode1, unsigned char size1, unsigned char inst2, unsigned char mode2, unsigned char size2, int opcode) argument
[all...]
H A Dencodetable.cc107 // The VCDiff format allows each opcode to represent either
109 // examine the opcode generated by the last call to EncodeInstruction.
110 // If that opcode was a single-instruction opcode, this function checks
111 // whether there is a compound (double-instruction) opcode that can
114 // single-instruction opcode at position last_opcode_index_ will be
115 // overwritten with the new double-instruction opcode.
117 // In the majority of cases, no compound opcode will be possible,
118 // and a new single-instruction opcode will be appended to
120 // if the opcode doe
186 OpcodeOrNone opcode = kNoOpcode; local
[all...]
/external/javassist/src/main/javassist/bytecode/analysis/
H A DExecutor.java68 int opcode = iter.byteAt(pos);
71 // Declared opcode in order
72 switch (opcode) {
132 evalLoad(Type.INTEGER, opcode - ILOAD_0, frame, subroutine);
138 evalLoad(Type.LONG, opcode - LLOAD_0, frame, subroutine);
144 evalLoad(Type.FLOAT, opcode - FLOAD_0, frame, subroutine);
150 evalLoad(Type.DOUBLE, opcode - DLOAD_0, frame, subroutine);
156 evalLoad(Type.OBJECT, opcode - ALOAD_0, frame, subroutine);
197 evalStore(Type.INTEGER, opcode - ISTORE_0, frame, subroutine);
203 evalStore(Type.LONG, opcode
703 evalGetField(int opcode, int index, Frame frame) argument
715 evalInvokeIntfMethod(int opcode, int index, Frame frame) argument
732 evalInvokeMethod(int opcode, int index, Frame frame) argument
847 evalPutField(int opcode, int index, Frame frame) argument
[all...]
/external/llvm/utils/TableGen/
H A DX86DisassemblerTables.h37 /// The decoder tables. There is one for each opcode type:
150 /// IC is one of the contexts in InstructionContext. There is an opcode
192 /// 0xnn is the lowest possible opcode for the current instruction, used for
236 /// @param opcode - The opcode of the instruction, for error reporting.
240 uint8_t opcode);
252 /// setTableFields - Uses the opcode type, instruction context, opcode, and a
256 /// @param type - The opcode type (ONEBYTE, TWOBYTE, etc.)
258 /// @param opcode
[all...]
/external/proguard/src/proguard/optimize/info/
H A DDotClassMarker.java51 if (constantInstruction.opcode == InstructionConstants.OP_LDC ||
52 constantInstruction.opcode == InstructionConstants.OP_LDC_W)
/external/smali/dexlib/src/main/java/org/jf/dexlib/Code/Analysis/
H A DAnalyzedInstruction.java117 assert originalInstruction.opcode.odexOnly();
122 assert originalInstruction.opcode.odexOnly();
240 (instruction.opcode != Opcode.INVOKE_DIRECT && instruction.opcode != Opcode.INVOKE_DIRECT_RANGE &&
241 instruction.opcode != Opcode.INVOKE_DIRECT_EMPTY)) {
260 return instruction.opcode.setsRegister();
264 return instruction.opcode.setsWideRegister();
315 if (!this.instruction.opcode.setsRegister()) {
H A DOdexedFieldInstructionMapper.java205 private static int getOpcodeSubtype(Opcode opcode) { argument
206 if (opcode.isOdexedInstanceQuick()) {
208 } else if (opcode.isOdexedInstanceVolatile()) {
210 } else if (opcode.isOdexedStaticVolatile()) {
213 throw new RuntimeException(String.format("Not an odexed field access opcode: %s", opcode.name));
/external/webkit/Source/JavaScriptCore/bytecode/
H A DOpcode.h196 macro(op_end, 2) // end must be the last opcode in the list
198 #define OPCODE_ID_ENUM(opcode, length) opcode,
208 #define OPCODE_LENGTH(opcode) opcode##_length
210 #define OPCODE_ID_LENGTH_MAP(opcode, length) length,
256 static void recordInstruction(int opcode);
262 inline size_t opcodeLength(OpcodeID opcode) argument
264 switch (opcode) {
/external/openssl/crypto/perlasm/
H A Dx86masm.pl14 { my ($opcode,@arg)=@_;
19 if ($opcode =~ /lea/ && @arg[1] =~ s/.*PTR\s+(\(.*\))$/OFFSET $1/) # no []
20 { $opcode="mov"; }
21 elsif ($opcode !~ /movq/)
27 &::emit($opcode,@arg);
H A Dx86nasm.pl14 { my $opcode=shift;
18 { if ($opcode =~ m/^j/o && $#_==0) # optimize jumps
20 elsif ($opcode eq "lea" && $#_==1) # wipe storage qualifier from lea
22 elsif ($opcode eq "clflush" && $#_==0)
25 &::emit($opcode,@_);
H A Dppc-xlate.pl149 my $opcode = eval("\$$mnemonic");
151 if (ref($opcode) eq 'CODE') { $line = &$opcode($f,split(',',$line)); }
/external/smali/smali/src/main/antlr3/org/jf/smali/
H A DsmaliTreeWalker.g892 throw new SemanticException(input, $I_REGISTER_LIST, "A list of registers can only have a maximum of 5 registers. Use the <op>/range alternate opcode instead.");
942 Opcode opcode = Opcode.getOpcodeByName($INSTRUCTION_FORMAT10t.text);
946 $instructions.add(new Instruction10t(opcode, addressOffset));
951 Opcode opcode = Opcode.getOpcodeByName($INSTRUCTION_FORMAT10x.text);
952 $instructions.add(new Instruction10x(opcode));
957 Opcode opcode = Opcode.getOpcodeByName($INSTRUCTION_FORMAT11n.text);
963 $instructions.add(new Instruction11n(opcode, regA, (byte)litB));
968 Opcode opcode = Opcode.getOpcodeByName($INSTRUCTION_FORMAT11x.text);
971 $instructions.add(new Instruction11x(opcode, regA));
976 Opcode opcode
[all...]
/external/bluetooth/bluedroid/stack/btu/
H A Dbtu_hcif.c151 UINT16 opcode; local
155 /* get command opcode */
156 STREAM_TO_UINT16 (opcode, p);
159 if ((opcode == HCI_RESET) || (opcode == HCI_HOST_NUM_PACKETS_DONE))
174 if ((opcode & HCI_GRP_VENDOR_SPECIFIC) == HCI_GRP_VENDOR_SPECIFIC
176 || (opcode == HCI_BLE_RAND )
177 || (opcode == HCI_BLE_ENCRYPT)
183 "Storing VSC callback opcode=0x%04x, Callback function=0x%07x",
184 opcode, *(UINT3
986 btu_hcif_hdl_command_complete(UINT16 opcode, UINT8 *p, UINT16 evt_len, void *p_cplt_cback, UINT8 ctr_id) argument
1216 btu_hcif_hdl_command_status(UINT16 opcode, UINT8 status, UINT8 *p_cmd, void *p_vsc_status_cback, UINT8 controller_id) argument
1380 UINT16 opcode; local
1467 UINT16 opcode; local
[all...]
/external/clang/lib/Sema/
H A DSemaPseudoObject.cpp183 BinaryOperatorKind opcode,
186 UnaryOperatorKind opcode,
228 BinaryOperatorKind opcode,
231 UnaryOperatorKind opcode,
264 BinaryOperatorKind opcode,
340 BinaryOperatorKind opcode,
342 assert(BinaryOperator::isAssignmentOp(opcode));
350 if (opcode == BO_Assign) {
353 opcode, capturedRHS->getType(),
362 BinaryOperator::getOpForCompoundAssignment(opcode);
389 buildIncDecOperation(Scope *Sc, SourceLocation opcLoc, UnaryOperatorKind opcode, Expr *op) argument
738 buildAssignmentOperation(Scope *Sc, SourceLocation opcLoc, BinaryOperatorKind opcode, Expr *LHS, Expr *RHS) argument
785 buildIncDecOperation(Scope *Sc, SourceLocation opcLoc, UnaryOperatorKind opcode, Expr *op) argument
836 buildAssignmentOperation(Scope *Sc, SourceLocation opcLoc, BinaryOperatorKind opcode, Expr *LHS, Expr *RHS) argument
1308 checkPseudoObjectIncDec(Scope *Sc, SourceLocation opcLoc, UnaryOperatorKind opcode, Expr *op) argument
1329 checkPseudoObjectAssignment(Scope *S, SourceLocation opcLoc, BinaryOperatorKind opcode, Expr *LHS, Expr *RHS) argument
[all...]
/external/llvm/lib/Transforms/Instrumentation/
H A DProfilingUtils.cpp73 Instruction::CastOps opcode = CastInst::getCastOpcode(AI, false, ArgVTy, local
76 CastInst::Create(opcode, AI, ArgVTy, "argv.cast", InitCall));
87 Instruction::CastOps opcode; local
89 opcode = CastInst::getCastOpcode(InitCall, true, AI->getType(), true);
91 CastInst::Create(opcode, InitCall, AI->getType(), "", InsertPos));
93 opcode = CastInst::getCastOpcode(AI, true,
96 CastInst::Create(opcode, AI, Type::getInt32Ty(Context),
/external/proguard/src/proguard/classfile/instruction/
H A DInstructionFactory.java39 byte opcode = code[index++];
42 if (opcode == InstructionConstants.OP_WIDE)
44 opcode = code[index++];
48 switch (opcode)
290 throw new IllegalArgumentException("Unknown instruction opcode ["+opcode+"] at offset "+offset);
293 instruction.opcode = opcode;
/external/proguard/src/proguard/preverify/
H A DCodeSubroutineInliner.java254 byte opcode = variableInstruction.opcode;
255 if (opcode == InstructionConstants.OP_RET)
304 byte opcode = branchInstruction.opcode;
305 if (opcode == InstructionConstants.OP_JSR ||
306 opcode == InstructionConstants.OP_JSR_W)
/external/openssl/crypto/modes/asm/
H A Dghash-parisc.pl639 { my $opcode=(0x03<<26)|($2<<21)|($1<<16)|(3<<6)|$3;
640 sprintf "\t.WORD\t0x%08x\t; %s",$opcode,$orig;
643 { my $opcode=(0x03<<26)|($2<<21)|(1<<12)|(3<<6)|$3;
644 $opcode|=(($1&0xF)<<17)|(($1&0x10)<<12); # encode offset
645 $opcode|=(1<<5) if ($mod =~ /^,m/);
646 $opcode|=(1<<13) if ($mod =~ /^,mb/);
647 sprintf "\t.WORD\t0x%08x\t; %s",$opcode,$orig;
657 { my $opcode=(0x1c<<26)|($3<<21)|($1<<16)|(($2&0x1FF8)<<1)|(($2>>13)&1);
658 sprintf "\t.WORD\t0x%08x\t; %s",$opcode,$orig;
669 { my $opcode
[all...]

Completed in 8479 milliseconds

1234567891011>>