Lines Matching full:accesses
5586 and to align the memory accesses in the loop. The pass is
5681 If mudflap is enabled, we rewrite some memory accesses with code to
8035 These nodes represent array accesses. The first operand is the
8053 These nodes represent memory accesses whose address directly map to
8139 These nodes represent non-static data member accesses. The first
8880 accesses operand 2 of expression X, as an expression.
8884 accesses the same operand as an integer. `XSTR', used in the same
10147 accesses the whole of `(reg:SI 0)', but the exact relationship
10155 accesses to the two halves of
10164 represent independent 2-byte accesses that together span the whole
11292 Accesses the unique id of insn I.
11295 Accesses the chain pointer to the insn preceding I. If I is the
11299 Accesses the chain pointer to the insn following I. If I is the
15079 variable. All accesses that could possibly overlap with a given
15805 for arrays (for which we have base objects). Pointer accesses are
15859 subscript of the data references. Given two array accesses a
24940 This target hook should return `true' if accesses to volatile
24942 return `false' if these accesses should use the bitfield container
26263 all bits of the register are copied and prevents accesses to the
28257 `__builtin_args_info' accesses the same data structure of type
29228 accesses are faster than word accesses, using word accesses is
29230 subsequent accesses occur to other fields in the same word of the
29234 Define this macro to be the value 1 if memory accesses described
29236 than aligned accesses, for example if they are emulated in a trap
29243 accesses only add a cycle or two to the time for a memory access.
32546 the FPU. One accesses COP1 registers through standard mips