Home
last modified time | relevance | path

Searched refs:opcode (Results 1 – 5 of 5) sorted by relevance

/ndk/sources/cxx-stl/llvm-libc++abi/libcxxabi/src/Unwind/
DDwarfInstructions.hpp237 uint8_t opcode = addressSpace.get8(p++); in evaluateExpression() local
241 switch (opcode) { in evaluateExpression()
607 value = opcode - DW_OP_lit0; in evaluateExpression()
645 reg = opcode - DW_OP_reg0; in evaluateExpression()
690 reg = opcode - DW_OP_breg0; in evaluateExpression()
DDwarfParser.hpp382 uint8_t opcode = addressSpace.get8(p); in parseInstructions() local
386 switch (opcode) { in parseInstructions()
679 operand = opcode & 0x3F; in parseInstructions()
680 switch (opcode & 0xC0) { in parseInstructions()
705 fprintf(stderr, "unknown CFA opcode 0x%02X\n", opcode); in parseInstructions()
/ndk/sources/host-tools/sed-4.2.1/testsuite/
Duniq.good119 /* On entry ecode points to the first opcode, and eptr to the first character
173 DPRINTF (("Unknown opcode %d\n", *ecode));
686 number from a dummy opcode at the start. */
704 opcode. */
831 the number from a dummy opcode at the start. */
Duniq.inp508 /* On entry ecode points to the first opcode, and eptr to the first character
576 DPRINTF (("Unknown opcode %d\n", *ecode));
1454 number from a dummy opcode at the start. */
1475 opcode. */
1727 the number from a dummy opcode at the start. */
/ndk/tests/device/issue42891-boost-1_52/jni/boost/boost/test/impl/
Dexecution_monitor.ipp362 "signal: illegal opcode; address of failing instruction: 0x%08lx",
393 "signal: privileged opcode; address of failing instruction: 0x%08lx",