/external/bluetooth/bluez/sbc/ |
sbc_primitives_mmx.c | 349 "push %%ebx\n" 354 "pop %%ebx\n"
|
/external/grub/stage1/ |
stage1.S | 194 movl ABS(stage2_sector), %ebx 203 movl %ebx, 8(%si)
|
/external/libffi/src/x86/ |
darwin.S | 197 movl %ebx, 8(%esp) 200 movl 8(%esp), %ebx
|
/external/llvm/lib/Target/X86/Disassembler/ |
X86DisassemblerDecoder.h | 128 ENTRY(EBX) \ 146 ENTRY(EBX) \
|
/external/openssl/crypto/bn/asm/ |
via-mont.pl | 127 &mov ("ebx",&wparam(2)); # bp 167 &mov ("esi","ebx");
|
/external/webkit/Source/JavaScriptCore/jit/ |
JSInterfaceJIT.h | 66 static const RegisterID regT3 = X86Registers::ebx; 85 static const RegisterID regT3 = X86Registers::ebx;
|
/bionic/libc/kernel/arch-x86/asm/ |
processor_32.h | 161 unsigned long eax,ecx,edx,ebx; member in struct:i386_hw_tss
|
/development/ndk/platforms/android-9/arch-x86/include/asm/ |
processor_32.h | 161 unsigned long eax,ecx,edx,ebx; member in struct:i386_hw_tss
|
/external/llvm/test/MC/X86/ |
x86-32.s | 57 // CHECK: cmpl %eax, %ebx # encoding: [0x39,0xc3] 58 cmpl %eax, %ebx 660 // CHECK: bound 4(%ebx), %ecx 662 bound 4(%ebx),%ecx
|
/external/qemu-pc-bios/vgabios/ |
vbe.c | 748 shl ebx, #16 variable 749 or eax, ebx 752 mov ebx, eax variable 753 shr ebx, #16 variable [all...] |
/external/valgrind/main/docs/internals/ |
register-uses.txt | 15 ebx y n y
|
/external/valgrind/main/none/tests/amd64/ |
gen_insn_test.pl | 57 bl => 5, bx => 5, ebx => 5, rbx => 5, 70 bl => "r8", bh => "r8", bx => "r16", ebx => "r32", rbx => "r64", 77 # { r8 => "bl", r16 => "bx", r32 => "ebx", r64 => "rbx" }, 92 { r8 => "bl", r16 => "bx", r32 => "ebx", r64 => "rbx" },
|
insn_basic.def | 31 adcl eflags[0x1,0x0] : imm32[12345678] ebx.ud[87654321] => 1.ud[99999999] 32 adcl eflags[0x1,0x1] : imm32[12345678] ebx.ud[87654321] => 1.ud[100000000] 70 addl imm32[12345678] ebx.ud[87654321] => 1.ud[99999999] 97 andl imm32[0x86427531] ebx.ud[0x12345678] => 1.ud[0x02005430] [all...] |
/external/zlib/contrib/masmx64/ |
inffas8664.c | 95 /* 88 44 */ unsigned bits; /* ebx rbx local strm->bits */
|
/prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-x86/usr/include/asm/ |
processor_32.h | 161 unsigned long eax,ecx,edx,ebx; member in struct:i386_hw_tss
|
/prebuilt/ndk/android-ndk-r4/platforms/android-8/arch-x86/usr/include/asm/ |
processor_32.h | 161 unsigned long eax,ecx,edx,ebx; member in struct:i386_hw_tss
|
/prebuilt/ndk/android-ndk-r6/platforms/android-9/arch-x86/usr/include/asm/ |
processor_32.h | 161 unsigned long eax,ecx,edx,ebx; member in struct:i386_hw_tss
|
/external/kernel-headers/original/asm-x86/ |
paravirt.h | 112 void (*cpuid)(unsigned int *eax, unsigned int *ebx, 475 static inline void __cpuid(unsigned int *eax, unsigned int *ebx, 478 PVOP_VCALL4(pv_cpu_ops.cpuid, eax, ebx, ecx, edx);
|
/external/opencv/cxcore/src/ |
cxswitcher.cpp | 151 push ebx 163 pop ebx 177 : "%ebx", "%esi", "%edi"
|
/external/openssl/crypto/rc4/asm/ |
rc4-x86_64.pl | 174 mov 4($inp),%ebx 211 ror \$8,%ebx 219 mov %ebx,4($out)
|
/external/v8/tools/ |
grokdump.py | 219 ("ebx", EnableOnFlag(ctypes.c_uint32, MD_CONTEXT_X86_INTEGER)), 794 print " ebx: %08x" % reader.exception_context.ebx
|
/external/valgrind/main/coregrind/m_syswrap/ |
syswrap-x86-darwin.c | 247 " movl $0, %ebx\n" 268 " push %ebx\n" // kport 366 " push %ebx\n" // kport
|
/external/llvm/lib/Target/X86/ |
README.txt | 143 movl 8(%esp), %ebx 145 cmpl %ebx, 4(%esp) [all...] |
/external/valgrind/main/VEX/priv/ |
host_x86_defs.c | 51 = { "%eax", "%ecx", "%edx", "%ebx", "%esp", "%ebp", "%esi", "%edi" }; 1013 vex_printf("{%%eax->%%ebx},"); 1017 vex_printf("lock cmpxchg8b {%%edx:%%eax->%%ecx:%%ebx},"); 2607 HReg eax = hregX86_EAX(), ebx = hregX86_EBX(), local [all...] |
/external/v8/src/ia32/ |
assembler-ia32.cc | 88 __ push(ebx); 128 __ pop(ebx); 1327 // variant: eax, ebx, ecx, and edx. [all...] |