Home | History | Annotate | Download | only in info

Lines Matching full:accesses

5586      and to align the memory accesses in the loop.  The pass is
5682 If mudflap is enabled, we rewrite some memory accesses with code to
8036 These nodes represent array accesses. The first operand is the
8054 These nodes represent memory accesses whose address directly map to
8140 These nodes represent non-static data member accesses. The first
8881 accesses operand 2 of expression X, as an expression.
8885 accesses the same operand as an integer. `XSTR', used in the same
10148 accesses the whole of `(reg:SI 0)', but the exact relationship
10156 accesses to the two halves of
10165 represent independent 2-byte accesses that together span the whole
11293 Accesses the unique id of insn I.
11296 Accesses the chain pointer to the insn preceding I. If I is the
11300 Accesses the chain pointer to the insn following I. If I is the
15080 variable. All accesses that could possibly overlap with a given
15806 for arrays (for which we have base objects). Pointer accesses are
15860 subscript of the data references. Given two array accesses a
24946 This target hook should return `true' if accesses to volatile
24948 return `false' if these accesses should use the bitfield container
26269 all bits of the register are copied and prevents accesses to the
28276 `__builtin_args_info' accesses the same data structure of type
29247 accesses are faster than word accesses, using word accesses is
29249 subsequent accesses occur to other fields in the same word of the
29253 Define this macro to be the value 1 if memory accesses described
29255 than aligned accesses, for example if they are emulated in a trap
29262 accesses only add a cycle or two to the time for a memory access.
32565 the FPU. One accesses COP1 registers through standard mips