HomeSort by relevance Sort by last modified time
    Searched refs:r30 (Results 1 - 25 of 49) sorted by null

1 2

  /external/valgrind/main/coregrind/
pub_core_basics.h 122 UInt r30; /* Stack frame pointer or subroutine variable */ member in struct:__anon36409::__anon36410::__anon36418
127 ULong r30; /* Stack frame pointer or subroutine variable */ member in struct:__anon36409::__anon36410::__anon36419
m_libcassert.c 197 (srP)->misc.MIPS32.r30 = (ULong)fp; \
222 (srP)->misc.MIPS64.r30 = (ULong)fp; \
  /external/valgrind/main/none/tests/ppc32/
ldst_multiple.c 30 register HWord_t r30 asm("r30");
99 r27, r28, r29, r30, r31);
103 * load the last two values into r30 - r31.
107 " lmw %r30, 20(%r14) \n");
114 r27, r28, r29, r30, r31);
157 * store r30 - r31 into the last two places in the array
161 " stmw %r30, 20(%r14) \n");
  /external/libunwind/src/ia64/
ucontext_i.h 67 #define rLC r30
Ginstall_cursor.S 119 ld8 r30 = [r3], 2*LOC_SIZE // r30 = loc[IA64_REG_FR30]
134 and r30 = -4, r30
145 ldf.fill f30 = [r30] // f30 restored (don't touch no more)
236 mov r30 = in3 // make backup-copy of new bsp
268 mov.m ar.bspstore = r30 // restore register backing-store
  /external/chromium_org/third_party/openssl/openssl/crypto/bn/asm/
pa-risc2W.s 43 ; Stack pointer ; r30 (sp)
746 STD %r2,-16(%r30)
747 STD,MA %r3,352(%r30)
748 STD %r4,-344(%r30)
749 STD %r5,-336(%r30)
750 STD %r6,-328(%r30)
751 STD %r7,-320(%r30)
752 STD %r8,-312(%r30)
753 STD %r9,-304(%r30)
754 STD %r10,-296(%r30)
    [all...]
pa-risc2.s 49 ; Stack pointer ; r30 (sp)
756 STW %r2,-20(%r30) ;offset 0x8ec
757 STW,MA %r3,192(%r30) ;offset 0x8f0
758 STW %r4,-188(%r30) ;offset 0x8f4
760 STD %r6,-184(%r30) ;offset 0x8fc
762 STD %r8,-176(%r30) ;offset 0x904
763 STW %r9,-168(%r30) ;offset 0x908
764 LDD -248(%r30),%r3 ;offset 0x90c
807 STD %r29,-152(%r30) ;offset 0x998
857 LDW -212(%r30),%r2 ;offset 0xa4
    [all...]
ia64-mont.pl 125 $ADDP r30=8,in1 };;
126 { .mmi; ldf8 alo[3]=[r30],16 // ap[1]
129 { .mmi; ldf8 alo[1]=[r30] // ap[3]
207 add r30=8,aptr };;
209 ldf8 alo[3]=[r30],16 // ap[1]
215 { .mfb; ldf8 alo[1]=[r30] // ap[3]
365 n1=r24; n2=r25; n3=r26; n4=r27; n5=r28; n6=r29; n7=r30; n8=r31;
418 { .mmi; $ADDP r30=8,in2
422 ldf8 bj[6]=[r30],16 // bp[1]
437 { .mfi; (p6)ldf8 bj[4]=[r30],16 // bp[3
    [all...]
ia64.S 928 { .mfi; getf.sig r30=f56
962 add r30=r30,r29 };;
967 cmp.ltu p6,p0=r30,r29
968 add r31=r31,r30 };;
976 cmp.ltu p6,p0=r31,r30
1020 { .mfb; getf.sig r30=f58 }
1039 add r30=r30,r29 };;
1045 cmp.ltu p6,p0=r30,r2
    [all...]
ppc64-mont.pl 121 $t6="r30";
228 $PUSH r30,`-12*8-2*$SIZE_T`($i)
1073 $POP r30,`-12*8-2*$SIZE_T`($i)
  /external/openssl/crypto/bn/asm/
pa-risc2W.s 43 ; Stack pointer ; r30 (sp)
746 STD %r2,-16(%r30)
747 STD,MA %r3,352(%r30)
748 STD %r4,-344(%r30)
749 STD %r5,-336(%r30)
750 STD %r6,-328(%r30)
751 STD %r7,-320(%r30)
752 STD %r8,-312(%r30)
753 STD %r9,-304(%r30)
754 STD %r10,-296(%r30)
    [all...]
pa-risc2.s 49 ; Stack pointer ; r30 (sp)
756 STW %r2,-20(%r30) ;offset 0x8ec
757 STW,MA %r3,192(%r30) ;offset 0x8f0
758 STW %r4,-188(%r30) ;offset 0x8f4
760 STD %r6,-184(%r30) ;offset 0x8fc
762 STD %r8,-176(%r30) ;offset 0x904
763 STW %r9,-168(%r30) ;offset 0x908
764 LDD -248(%r30),%r3 ;offset 0x90c
807 STD %r29,-152(%r30) ;offset 0x998
857 LDW -212(%r30),%r2 ;offset 0xa4
    [all...]
ia64-mont.pl 125 $ADDP r30=8,in1 };;
126 { .mmi; ldf8 alo[3]=[r30],16 // ap[1]
129 { .mmi; ldf8 alo[1]=[r30] // ap[3]
207 add r30=8,aptr };;
209 ldf8 alo[3]=[r30],16 // ap[1]
215 { .mfb; ldf8 alo[1]=[r30] // ap[3]
365 n1=r24; n2=r25; n3=r26; n4=r27; n5=r28; n6=r29; n7=r30; n8=r31;
418 { .mmi; $ADDP r30=8,in2
422 ldf8 bj[6]=[r30],16 // bp[1]
437 { .mfi; (p6)ldf8 bj[4]=[r30],16 // bp[3
    [all...]
ia64.S 928 { .mfi; getf.sig r30=f56
962 add r30=r30,r29 };;
967 cmp.ltu p6,p0=r30,r29
968 add r31=r31,r30 };;
976 cmp.ltu p6,p0=r31,r30
1020 { .mfb; getf.sig r30=f58 }
1039 add r30=r30,r29 };;
1045 cmp.ltu p6,p0=r30,r2
    [all...]
ppc64-mont.pl 121 $t6="r30";
228 $PUSH r30,`-12*8-2*$SIZE_T`($i)
1073 $POP r30,`-12*8-2*$SIZE_T`($i)
  /external/linux-tools-perf/perf-3.12.0/arch/ia64/lib/
memcpy_mck.S 37 /* r19-r30 are temp for each code section */
58 #define tmp r30
96 sub r30=8,r28 // for .align_dest
101 cmp.le p6,p0 = 1,r30 // for .align_dest
297 and r30=7,src0 // source alignment
338 shl r28=r30, LOOP_SIZE // jmp_table thread
354 (p6) shl r25=r30,3
400 add src0=src1,r30 // forward by src alignment
462 * r30 - distance to 8-byte boundary
467 cmp.le p7,p0 = 2,r30 // for .align_des
    [all...]
  /external/llvm/test/DebugInfo/SystemZ/
eh_frame.s 67 # DW_CFA_offset: r30 at cfa-184
  /external/llvm/test/MC/PowerPC/
ppc64-regs.s 36 #CHECK: .cfi_offset r30, 248
153 .cfi_offset r30,248
  /external/oprofile/module/ia64/
IA64minstate.h 18 #define rCRIFS r30
262 .mem.offset 0, 0; st8.spill [r2]=r30, 16; \
  /external/chromium_org/third_party/openssl/openssl/crypto/sha/asm/
sha1-ppc.pl 69 "r24","r25","r26","r27","r28","r29","r30","r31");
185 $PUSH r30,`$FRAME-$SIZE_T*2`($sp)
260 $POP r30,`$FRAME-$SIZE_T*2`($sp)
sha1-ia64.pl 45 "r24", "r25", "r26", "r27", "r28", "r29", "r30", "r31" );
  /external/openssl/crypto/sha/asm/
sha1-ppc.pl 69 "r24","r25","r26","r27","r28","r29","r30","r31");
185 $PUSH r30,`$FRAME-$SIZE_T*2`($sp)
260 $POP r30,`$FRAME-$SIZE_T*2`($sp)
  /external/valgrind/main/VEX/auxprogs/
genoffsets.c 224 GENOFFSET(MIPS32,mips32,r30);
261 GENOFFSET(MIPS64,mips64,r30);
  /external/chromium_org/third_party/openssl/openssl/crypto/
ia64cpuid.S 103 mov r30=r0 }
  /external/openssl/crypto/
ia64cpuid.S 103 mov r30=r0 }

Completed in 995 milliseconds

1 2