HomeSort by relevance Sort by last modified time
    Searched refs:lea (Results 76 - 100 of 165) sorted by null

1 2 34 5 6 7

  /external/qemu/distrib/sdl-1.2.15/src/hermes/
x86p_16.asm 80 lea esi,[esi+ecx*4]
81 lea edi,[edi+ecx*4]
187 lea esi,[esi+ecx*8]
188 lea edi,[edi+ecx*8]
302 lea esi,[esi+ecx*4]
303 lea edi,[edi+ecx*4]
x86p_32.asm 514 lea esi,[esi+ecx*8]
515 lea edi,[edi+ecx*4]
626 lea esi,[esi+ecx*8]
627 lea edi,[edi+ecx*4]
740 lea esi,[esi+ecx*8]
741 lea edi,[edi+ecx*4]
852 lea esi,[esi+ecx*8]
853 lea edi,[edi+ecx*4]
  /dalvik/vm/mterp/x86/
footer.S 114 lea 4(%esp), %esp #to recover the esp update due to function call
152 lea 4(%esp), %esp #to recover the esp update due to function call
156 lea -17(%eax), %ebx #$$JIT_OFFSET_CHAIN_START(%eax), %ebx
157 lea -4(%esp), %esp
162 lea 4(%esp), %esp
199 lea -17(%eax), %ebx #$$JIT_OFFSET_CHAIN_START(%eax), %ebx
200 lea 4(%esp), %esp
209 #lea 4(%esp), %esp
212 #lea -8(%esp), %esp
216 #lea 8(%esp), %es
    [all...]
OP_INVOKE_STATIC.S 18 lea (%ecx,%eax,4), %edx
OP_SGET_WIDE.S 16 lea (%ecx,%eax,4),%ecx
OP_SPUT_OBJECT.S 15 lea (%ecx,%eax,4),%ecx
OP_SPUT_WIDE.S 17 lea (%ecx,%eax,4),%ecx
OP_NEW_INSTANCE.S 21 lea (%ecx,%eax,4),%ebx # ebx <- &resolved class
  /external/kernel-headers/original/asm-x86/
percpu_32.h 21 lea per_cpu__##var(reg), reg
  /external/quake/quake/src/QW/client/
surf16.asm 283 lea esi,ds:dword ptr[esi+ebx*2]
297 lea esi,ds:dword ptr[esi+ebx*2]
311 lea esi,ds:dword ptr[esi+ebx*2]
325 lea esi,ds:dword ptr[esi+ebx*2]
340 lea esi,ds:dword ptr[esi+ebx*2]
354 lea esi,ds:dword ptr[esi+ebx*2]
369 lea esi,ds:dword ptr[esi+ebx*2]
384 lea esi,ds:dword ptr[esi+ebx*2]
  /external/libvpx/libvpx/vp8/common/x86/
sad_ssse3.asm 43 lea rsi, [rsi+rax*2]
44 lea rdi, [rdi+rdx*2]
105 lea rsi, [rsi+rax*2]
106 lea rdi, [rdi+rdx*2]
subpixel_sse2.asm 119 lea rsi, [rsi + rax]
297 lea rsi, [rsi + rax]
619 lea rsi, [rsi + rax]
785 lea rsi, [rsi + rax]
    [all...]
idctllm_sse2.asm 54 lea rcx, [rdx + rdx*2]
86 lea rax, [rax + 2*rdx]
169 lea rcx, [rdx + rdx*2] ;dst_stride * 3
384 lea rcx, [rdx + rdx*2]
652 lea rcx, [rdx + rdx*2]
685 lea rdi, [rdi + 2*rdx]
loopfilter_block_sse2.asm 191 lea spp, [src + stride]
192 lea stride3, [stride + 2 * stride]
193 lea stride5, [stride3 + 2 * stride]
194 lea stride7, [stride3 + 4 * stride]
356 lea spp, [src + stride]
357 lea stride3, [stride + 2 * stride]
358 lea stride5, [stride3 + 2 * stride]
359 lea stride7, [stride3 + 4 * stride]
  /external/openssl/crypto/perlasm/
x86gas.pl 199 { &::lea($dst,&::DWP("_GLOBAL_OFFSET_TABLE_+[.-$reflabel]",
205 { &::lea($dst,&::DWP($sym)); }
x86masm.pl 19 if ($opcode =~ /lea/ && @arg[1] =~ s/.*PTR\s+(\(.*\))$/OFFSET $1/) # no []
174 &::lea($dst,&::DWP($sym));
x86nasm.pl 20 elsif ($opcode eq "lea" && $#_==1) # wipe storage qualifier from lea
151 &::lea($dst,&::DWP($sym));
  /external/v8/src/ia32/
debug-ia32.cc 310 __ lea(esp, Operand(ebp, -1 * kPointerSize));
321 __ lea(edx, FieldOperand(edx, Code::kHeaderSize));
  /external/v8/src/x64/
debug-x64.cc 316 __ lea(rsp, Operand(rbp, -1 * kPointerSize));
327 __ lea(rdx, FieldOperand(rdx, Code::kHeaderSize));
code-stubs-x64.cc 98 __ lea(rdx, FieldOperand(rdx, Code::kHeaderSize));
257 __ lea(rdx, Operand(rax, JSArray::kSize));
618 __ lea(double_exponent, Operand(double_value, double_value, times_1, 0));
    [all...]
macro-assembler-x64.cc 122 lea(destination, Operand(kRootRegister, static_cast<int32_t>(delta)));
139 // Operand is lea(scratch, Operand(kRootRegister, delta));
143 size += 3; // Need full four-byte displacement in lea.
272 lea(scratch, Operand(object, kScratchRegister, times_1, 0));
306 lea(dst, FieldOperand(object, offset));
346 lea(dst, Operand(object, index, times_pointer_size,
666 lea(rcx, StackSpaceOperand(arg_stack_space));
922 lea(dst, Operand(kSmiConstantRegister, kSmiConstantRegister, times_8, 0));
926 lea(dst, Operand(dst, kSmiConstantRegister, times_8, 0));
930 lea(dst, Operand(dst, kSmiConstantRegister, times_4, 0))
    [all...]
  /external/openssl/crypto/sha/asm/
sha1-586.pl 43 # "distance" between instructions producing input to 'lea' instruction
44 # and the 'lea' instruction itself, which is essential for Intel Atom
154 &lea($tmp1,&DWP(0x5a827999,$tmp1,$e)); # tmp1+=K_00_19+xi
182 &lea($f,&DWP(0x5a827999,$f,$e));# f+=F_00_19(b,c,d)+e
199 &lea($f,&DWP(0x5a827999,$f,$e));# f+=F_00_19(b,c,d)+e
226 &lea($f,&DWP($K,$f,$e)); # f+=e+K_XX_YY
243 &lea($f,&DWP($K,$f,$e)); # f+=e+K_XX_YY
271 &lea($f,&DWP(0x8f1bbcdc,$f,$e));# f+=K_40_59+e+(b&(c^d))
287 &lea($f,&DWP(0x8f1bbcdc,$f,$tmp1));# f+=K_40_59+e+(b&(c^d))
306 &lea ($tmp1,&DWP(&label("K_XX_XX")."-".&label("pic_point"),$tmp1))
    [all...]
  /external/openssl/crypto/ripemd/asm/
rmd-586.pl 135 &lea($a, &DWP($K,$a,$tmp2,1));
155 &lea($a, &DWP($K,$a,$tmp1,1));
162 &lea($a, &DWP($K,$a,$tmp2,1));
186 &lea($a, &DWP($K,$a,$tmp2,1));
202 &lea($a, &DWP($K,$a,$tmp1,1));
226 &lea($a, &DWP($K,$a,$tmp2));
243 &lea($a, &DWP($K,$a,$tmp2));
274 &lea($a, &DWP($K,$a,$tmp2,1));
290 &lea($a, &DWP($K,$a,$tmp1,1));
  /external/zlib/src/contrib/masmx64/
gvmat64.asm 273 lea r13, [r10 + rbp]
302 lea rsi,[r10+r11]
408 lea rsi,[r8+r10]
410 lea rsi, [rsi + r13 + 0108h] ;MAX_MATCH_8]
411 lea rdi, [r9 + r13 + 0108h] ;MAX_MATCH_8]
474 lea rax, [rdi + rdx]
486 lea rsi,[r10+r11]
503 lea rsi,[r10+rax]
  /system/core/libcutils/arch-x86/
sse2-memset32-atom.S 150 lea (%edx, %ecx, 4), %edx
303 lea 128(%edx), %edx
316 lea 128(%edx), %edx
320 lea 128(%ecx), %ecx

Completed in 780 milliseconds

1 2 34 5 6 7