/external/llvm/include/llvm/ |
InlineAsm.h | 159 /// Parse - Analyze the specified string (e.g. "=*&{eax}") and fill in the
|
/external/llvm/lib/Target/X86/ |
X86SelectionDAGInfo.cpp | 98 ValReg = X86::EAX;
|
X86CodeEmitter.cpp | 421 // 89 05 00 00 00 00 mov %eax,0(%rip) # PC-relative 422 // 89 04 25 00 00 00 00 mov %eax,0x0 # Absolute 513 // indirect register encoding, this handles addresses like [EAX]. The [all...] |
/external/llvm/lib/VMCore/ |
InlineAsm.cpp | 76 /// Parse - Analyze the specified string (e.g. "==&{eax}") and fill in the
|
/external/llvm/test/CodeGen/X86/ |
loop-strength-reduce8.ll | 3 ; CHECK: leal 16(%eax), %edx
|
/external/valgrind/main/coregrind/ |
m_main.c | [all...] |
/external/valgrind/main/lackey/ |
lk_main.c | 89 // add %eax, %ebx No loads or stores instr 91 // movl (%eax), %ebx loads (%eax) instr, load 93 // movl %eax, (%ebx) stores (%ebx) instr, store [all...] |
/external/valgrind/main/none/tests/amd64/ |
rcl-amd64.c | 5 #define I32(C) "rcrl %%ebx\n" "rcll $" #C ",%%eax\n" "rcll %%ebx\n"
|
/external/webkit/Source/JavaScriptCore/dfg/ |
DFGJITCompiler.h | 134 static const RegisterID regT0 = X86Registers::eax;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
nmake.mak | 71 $(OBJDIR)\aes-eax.obj \
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JCEBlockCipher.java | 292 // else if (modeName.startsWith("EAX")) 759 return "CCM".equals(modeName) || "EAX".equals(modeName) || "GCM".equals(modeName); [all...] |
/external/libvpx/vp8/encoder/x86/ |
variance_impl_mmx.asm | 297 mov dword ptr [rsi], eax 412 mov dword ptr [rsi], eax [all...] |
/external/llvm/include/llvm/MC/ |
MCInstrDesc.h | 228 /// instruction always deposits the quotient and remainder in the EAX/EDX 230 /// EAX/EDX/EFLAGS registers.
|
/external/llvm/lib/CodeGen/ |
RegisterCoalescer.cpp | 451 // sbbl $3,$0>, 10, %EAX<def>, 14, %ECX<earlyclobber,def>, 9, 452 // %EAX<kill>, 454 // 188 %EAX<def> = MOV32rr %EAX<kill> 457 // 212 %EAX<def> = MOV32rr %EAX<kill> 458 // 220 %EAX<def> = MOV32rr %EAX [all...] |
VirtRegRewriter.cpp | [all...] |
/external/openssl/crypto/sha/asm/ |
sha512-x86_64.pl | 72 @ROT=($A,$B,$C,$D,$E,$F,$G,$H)=("%eax","%ebx","%ecx","%edx", 426 mov \$1,%eax # ExceptionContinueSearch
|
/external/quake/quake/src/QW/gas2masm/ |
gas2masm.c | 63 {"%eax", "eax", 4},
|
/external/quake/quake/src/WinQuake/gas2masm/ |
gas2masm.c | 63 {"%eax", "eax", 4},
|
/external/llvm/lib/Target/ |
README.txt | 188 movl 136(%esp), %eax 189 cmpl $0, %eax 196 movl _foo, %eax 198 sbbl $-1, %eax 199 movl %eax, _foo 478 popl %eax 552 movzbl 4(%rax), %eax [all...] |
/external/v8/src/x64/ |
assembler-x64.h | 609 // One byte opcode for test eax,0xXXXXXXXX. 905 // Sign-extends eax into edx:eax. 910 // Divide edx:eax by lower 32 bits of src. Quotient in eax, rem. in edx. [all...] |
/external/valgrind/main/VEX/priv/ |
guest_x86_toIR.c | 148 87DB (xchgl %ebx,%ebx) %EDX = client_request ( %EAX ) 149 87C9 (xchgl %ecx,%ecx) %EAX = guest_NRADDR 150 87D2 (xchgl %edx,%edx) call-noredir *%EAX [all...] |
/external/chromium/base/ |
message_loop_unittest.cc | 505 mov eax, dword ptr [CrasherTask::bad_array_] local 506 mov byte ptr [eax], 66 534 // that the last instruction: mov eax, [CrasherTask::bad_array_] to be retried [all...] |
/external/dropbear/libtomcrypt/testprof/ |
x86_prof.c | 52 asm __volatile__ ("rdtsc\nmovl %%eax,(%0)\nmovl %%edx,4(%0)\n"::"r"(&a):"%eax","%edx"); [all...] |
/external/llvm/include/llvm/Target/ |
Target.td | 50 // themselves overlap. e.g. For X86, EAX's SubRegs list contains only [AX], 743 /// sal %eax, %cl -> shl %eax, %cl [all...] |
/external/valgrind/main/coregrind/m_sigframe/ |
sigframe-ppc32-linux.c | 485 //.. SC2(eax,EAX); 835 //.. tst->arch.vex.guest_EAX = sc->eax; [all...] |