Lines Matching refs:Then
378 # integer instructions caused this exception. This handler then calls #
387 # instructions may be executing while Trace is enabled. If so, then #
391 # _mem_{read,write}() "callout"s returns a failing value, then an #
394 # If none of these occur, then a normal exit is made through #
588 # if exception occurred in user mode, then we have to restore a7 in case it
1674 # reg2mem: fetch dx, then write it to memory
1754 # determines the dest register, and then writes the bytes into it.
1885 # First, calculate the effective address, then fetch the byte, #
1886 # word, or longword sized operands. Then, in the interest of #
2072 # Unless the operand is immediate data. Then use _imem_read_long(). #
2166 # - is hi(dividend) >= divisor ? if yes, then overflow
2243 # if the divisor msw is 0, use simpler algorithm then the full blown
2300 # Now calculate an estimate of the quotient words (msw first, then lsw).
2510 # Unless the operand is immediate data. Then use _imem_read_long(). #
2553 # if the operation is to be signed, then the operands are converted
2638 # for '040 compatibility, if Dl == Dh then only the hi(result) is
2752 # Compare operands. Then call the "callout" _real_lock_page() for each #
2763 # emulation. Then unlock each operands page by calling the "callout" #
2840 # if the 2nd lock attempt fails, then we must still unlock the
2972 # First, calculate the effective address. Then, decode the #
2978 # The routine then branches to _real_cas(). This external routine #
3203 # (2) Save current SR; Then mask off all maskable interrupts. #
3204 # (3) Save current SFC/DFC (ASSUMED TO BE EQUAL!!!); Then set #
3316 # shares the same set, then the "plpaw" for ADDR2 can push the ADDR1
3618 # shares the same set, then the "plpaw" for ADDR2 can push the ADDR1
3823 # (2) Save current SR; Then mask off all maskable interrupts. #
3824 # (3) Save current DFC/SFC (ASSUMED TO BE EQUAL!!!); Then set #