HomeSort by relevance Sort by last modified time
    Searched refs:opcode (Results 201 - 225 of 681) sorted by null

1 2 3 4 5 6 7 891011>>

  /dalvik/vm/mterp/x86/
OP_INVOKE_SUPER_JUMBO.S 20 je .L${opcode}_resolve
26 .L${opcode}_continue:
30 jae .L${opcode}_nsm # method not present in superclass
40 .L${opcode}_resolve:
50 jne .L${opcode}_continue # good to go - continue
57 .L${opcode}_nsm:
  /external/javassist/src/main/javassist/bytecode/
CodeAnalyzer.java 21 class CodeAnalyzer implements Opcode {
98 private boolean processBranch(int opcode, CodeIterator ci, int index,
102 if ((IFEQ <= opcode && opcode <= IF_ACMPNE)
103 || opcode == IFNULL || opcode == IFNONNULL) {
109 switch (opcode) {
120 if (opcode == JSR)
159 if (opcode == LOOKUPSWITCH) {
204 private static boolean isEnd(int opcode) {
    [all...]
  /frameworks/base/tools/layoutlib/create/src/com/android/tools/layoutlib/create/
StubMethodAdapter.java 240 public void visitInsn(int opcode) {
242 switch (opcode) {
255 mParentVisitor.visitInsn(opcode);
272 public void visitMethodInsn(int opcode, String owner, String name, String desc) {
274 mParentVisitor.visitMethodInsn(opcode, owner, name, desc);
278 public void visitFieldInsn(int opcode, String owner, String name, String desc) {
280 mParentVisitor.visitFieldInsn(opcode, owner, name, desc);
296 public void visitIntInsn(int opcode, int operand) {
298 mParentVisitor.visitIntInsn(opcode, operand);
302 public void visitJumpInsn(int opcode, Label label)
    [all...]
DelegateMethodAdapter2.java 339 public void visitInsn(int opcode) {
341 mOrgWriter.visitInsn(opcode);
357 public void visitMethodInsn(int opcode, String owner, String name, String desc) {
359 mOrgWriter.visitMethodInsn(opcode, owner, name, desc);
363 public void visitFieldInsn(int opcode, String owner, String name, String desc) {
365 mOrgWriter.visitFieldInsn(opcode, owner, name, desc);
381 public void visitIntInsn(int opcode, int operand) {
383 mOrgWriter.visitIntInsn(opcode, operand);
387 public void visitJumpInsn(int opcode, Label label) {
389 mOrgWriter.visitJumpInsn(opcode, label)
    [all...]
  /system/bluetooth/brfpatch/
brfpatch.c 41 " FORMAT: Send_HCI_xxxx OPCODE DATA1 DATA2 DATA3 ...\n"
42 " where OPCODE, DATA1 etc are one of:\n"
50 " FORMAT: 0x01 OPCODE DATA_LEN DATA\n");
54 static void dump_record(FILE *fpo, unsigned short opcode, unsigned char len,
59 fwrite(&opcode, 2, 1, fpo); // opcode
81 unsigned int opcode; local
83 FAILIF(advance(&buf), "Could not find opcode in: %s\n", buffer);
84 FAILIF(sscanf(buf, "0x%04x\n", &opcode) != 1,
85 "Could not find opcode in: %s\n", buffer)
    [all...]
  /dalvik/dexgen/src/com/android/dexgen/rop/code/
Insn.java 28 * an opcode (which specifies operation and source/result types), a
33 /** {@code non-null;} opcode */
34 private final Rop opcode; field in class:Insn
48 * @param opcode {@code non-null;} the opcode
53 public Insn(Rop opcode, SourcePosition position, RegisterSpec result,
55 if (opcode == null) {
56 throw new NullPointerException("opcode == null");
67 this.opcode = opcode;
    [all...]
  /external/javassist/src/main/javassist/convert/
TransformAccessArrayField.java 126 int opcode, String signature) throws BadBytecode {
128 String methodName = getMethodName(opcode);
131 if (opcode == AALOAD) {
165 private String getMethodName(int opcode) {
167 switch (opcode) {
224 private String getLoadReplacementSignature(int opcode) throws BadBytecode {
225 switch (opcode) {
244 throw new BadBytecode(opcode);
247 private String getStoreReplacementSignature(int opcode) throws BadBytecode {
248 switch (opcode) {
    [all...]
  /development/tools/mkstubs/src/com/android/mkstubs/stubber/
MethodStubber.java 51 Opcodes.INVOKESPECIAL, // opcode
96 public void visitFieldInsn(int opcode, String owner, String name, String desc) {
111 public void visitInsn(int opcode) {
116 public void visitIntInsn(int opcode, int operand) {
121 public void visitJumpInsn(int opcode, Label label) {
157 public void visitMethodInsn(int opcode, String owner, String name, String desc) {
177 public void visitTypeInsn(int opcode, String type) {
182 public void visitVarInsn(int opcode, int var) {
  /external/proguard/src/proguard/classfile/editor/
MethodInvocationFixer.java 93 // Do we need to update the opcode?
94 byte opcode = constantInstruction.opcode;
100 if (opcode != InstructionConstants.OP_INVOKESTATIC)
121 if (opcode != InstructionConstants.OP_INVOKESPECIAL)
145 if (opcode != InstructionConstants.OP_INVOKEINTERFACE ||
169 if (opcode != InstructionConstants.OP_INVOKEVIRTUAL &&
170 (opcode != InstructionConstants.OP_INVOKESPECIAL ||
  /external/proguard/src/proguard/classfile/instruction/
Instruction.java 660 public byte opcode; field in class:Instruction
664 * Returns the canonical opcode of this instruction, i.e. typically the
665 * opcode whose extension has been removed.
669 return opcode;
695 // Write the wide opcode, if necessary.
701 // Write the opcode.
702 code[offset++] = opcode;
710 * Returns whether the instruction is wide, i.e. preceded by a wide opcode.
720 * Reads the data following the instruction opcode.
726 * Writes data following the instruction opcode
    [all...]
  /sdk/emulator/qtools/
Android.mk 21 thumbdis.cpp opcode.cpp read_elf.cpp parse_options.cpp
29 opcode.cpp read_elf.cpp parse_options.cpp
53 opcode.cpp read_elf.cpp parse_options.cpp
61 thumbdis.cpp opcode.cpp
69 opcode.cpp read_elf.cpp parse_options.cpp gtrace.cpp
77 thumbdis.cpp opcode.cpp read_elf.cpp parse_options.cpp dmtrace.cpp
85 thumbdis.cpp opcode.cpp read_elf.cpp parse_options.cpp
93 thumbdis.cpp opcode.cpp read_elf.cpp parse_options.cpp
101 thumbdis.cpp opcode.cpp read_elf.cpp parse_options.cpp
  /dalvik/dx/src/com/android/dx/ssa/
LiteralOpUpgrader.java 97 Rop opcode = originalRopInsn.getOpcode();
108 if (opcode.getBranchingness() == Rop.BRANCH_IF) {
114 RegOps.flippedIfOpcode(opcode.getOpcode()), null);
117 opcode.getOpcode(), null);
120 opcode, sources.get(0), sources.get(1))) {
122 } else if (opcode.isCommutative()
124 opcode, sources.get(1), sources.get(0))) {
148 Rop opcode = originalRopInsn.getOpcode(); local
152 opcode.getOpcode() != RegOps.CONST) {
160 if (opcode.getOpcode() == RegOps.MOVE_RESULT_PSEUDO)
    [all...]
  /dalvik/vm/mterp/armv5te/
OP_SGET_WIDE.S 15 beq .L${opcode}_resolve @ yes, do resolve
16 .L${opcode}_finish:
27 GET_INST_OPCODE(ip) @ extract opcode from rINST
38 .L${opcode}_resolve:
55 b .L${opcode}_finish @ resume
OP_SPUT_WIDE.S 17 beq .L${opcode}_resolve @ yes, do resolve
18 .L${opcode}_finish: @ field ptr in r2, AA in r9
21 GET_INST_OPCODE(r10) @ extract opcode from rINST
39 .L${opcode}_resolve:
57 b .L${opcode}_finish @ resume
OP_SPUT_WIDE_JUMBO.S 19 beq .L${opcode}_resolve @ yes, do resolve
20 .L${opcode}_finish: @ field ptr in r2, BBBB in r9
23 GET_INST_OPCODE(r10) @ extract opcode from rINST
41 .L${opcode}_resolve:
59 b .L${opcode}_finish @ resume
OP_AGET_WIDE.S 19 bcc .L${opcode}_finish @ okay, continue below
26 .L${opcode}_finish:
30 GET_INST_OPCODE(ip) @ extract opcode from rINST
OP_APUT_WIDE.S 20 bcc .L${opcode}_finish @ okay, continue below
27 .L${opcode}_finish:
30 GET_INST_OPCODE(ip) @ extract opcode from rINST
OP_INVOKE_VIRTUAL.S 22 bne .L${opcode}_continue @ yes, continue on
28 bne .L${opcode}_continue @ no, continue
37 .L${opcode}_continue:
OP_INVOKE_VIRTUAL_JUMBO.S 16 bne .L${opcode}_continue @ yes, continue on
22 bne .L${opcode}_continue @ no, continue
30 .L${opcode}_continue:
  /dalvik/vm/mterp/x86-atom/
OP_INVOKE_VIRTUAL.S 56 je .L${opcode}_break
58 jmp .L${opcode}_continue
61 .L${opcode}_break:
76 jne .L${opcode}_continue
85 .L${opcode}_continue:
OP_IPUT.S 46 jne .L${opcode}_finish2
48 jmp .L${opcode}_finish
51 .L${opcode}_finish:
62 jne .L${opcode}_finish2
65 .L${opcode}_finish2:
OP_IPUT_OBJECT.S 44 jne .L${opcode}_finish2
46 jmp .L${opcode}_finish
49 .L${opcode}_finish:
60 jne .L${opcode}_finish2
63 .L${opcode}_finish2:
OP_IPUT_WIDE.S 39 jne .L${opcode}_finish
45 jmp .L${opcode}_finish2
48 .L${opcode}_finish2:
54 jne .L${opcode}_finish
63 .L${opcode}_finish:
  /external/bluetooth/bluez/tools/
hciattach_tialt.c 66 static int read_command_complete(int fd, unsigned short opcode, unsigned char len) {
85 /* cmd-complete event: opcode */
86 FAILIF(resp.cmd_complete.opcode != (uint16_t)opcode,
87 "Error in response: opcode is 0x%04x, not 0x%04x!",
88 resp.cmd_complete.opcode, opcode);
106 cmd.hci_hdr.opcode = 0xff36;
122 if (read_command_complete(fd, cmd.hci_hdr.opcode, cmd.hci_hdr.plen) < 0) {
156 "Could not read %d bytes of data for command with opcode %04x!\n"
    [all...]
  /external/v8/src/x64/
disasm-x64.cc 420 const char* TwoByteMnemonic(byte opcode);
1008 byte opcode = *(data + 1); local
1011 const char* mnemonic = TwoByteMnemonic(opcode);
1015 if (opcode == 0x3A) {
1029 if (opcode == 0x6E) {
1034 } else if (opcode == 0x6F) {
1038 } else if (opcode == 0x7E) {
1043 } else if (opcode == 0x7F) {
1049 if (opcode == 0x50) {
1051 } else if (opcode == 0x54)
1525 byte opcode = *data; local
    [all...]

Completed in 713 milliseconds

1 2 3 4 5 6 7 891011>>