/external/qemu/distrib/sdl-1.2.15/src/hermes/ |
x86p_16.asm | 80 lea esi,[esi+ecx*4] 81 lea edi,[edi+ecx*4] 187 lea esi,[esi+ecx*8] 188 lea edi,[edi+ecx*8] 302 lea esi,[esi+ecx*4] 303 lea edi,[edi+ecx*4]
|
x86p_32.asm | 514 lea esi,[esi+ecx*8] 515 lea edi,[edi+ecx*4] 626 lea esi,[esi+ecx*8] 627 lea edi,[edi+ecx*4] 740 lea esi,[esi+ecx*8] 741 lea edi,[edi+ecx*4] 852 lea esi,[esi+ecx*8] 853 lea edi,[edi+ecx*4]
|
/dalvik/vm/mterp/x86/ |
footer.S | 114 lea 4(%esp), %esp #to recover the esp update due to function call 152 lea 4(%esp), %esp #to recover the esp update due to function call 156 lea -17(%eax), %ebx #$$JIT_OFFSET_CHAIN_START(%eax), %ebx 157 lea -4(%esp), %esp 162 lea 4(%esp), %esp 199 lea -17(%eax), %ebx #$$JIT_OFFSET_CHAIN_START(%eax), %ebx 200 lea 4(%esp), %esp 209 #lea 4(%esp), %esp 212 #lea -8(%esp), %esp 216 #lea 8(%esp), %es [all...] |
OP_INVOKE_STATIC.S | 18 lea (%ecx,%eax,4), %edx
|
OP_SGET_WIDE.S | 16 lea (%ecx,%eax,4),%ecx
|
OP_SPUT_OBJECT.S | 15 lea (%ecx,%eax,4),%ecx
|
OP_SPUT_WIDE.S | 17 lea (%ecx,%eax,4),%ecx
|
OP_NEW_INSTANCE.S | 21 lea (%ecx,%eax,4),%ebx # ebx <- &resolved class
|
/external/kernel-headers/original/asm-x86/ |
percpu_32.h | 21 lea per_cpu__##var(reg), reg
|
/external/quake/quake/src/QW/client/ |
surf16.asm | 283 lea esi,ds:dword ptr[esi+ebx*2]
297 lea esi,ds:dword ptr[esi+ebx*2]
311 lea esi,ds:dword ptr[esi+ebx*2]
325 lea esi,ds:dword ptr[esi+ebx*2]
340 lea esi,ds:dword ptr[esi+ebx*2]
354 lea esi,ds:dword ptr[esi+ebx*2]
369 lea esi,ds:dword ptr[esi+ebx*2]
384 lea esi,ds:dword ptr[esi+ebx*2]
|
/external/libvpx/libvpx/vp8/common/x86/ |
sad_ssse3.asm | 43 lea rsi, [rsi+rax*2] 44 lea rdi, [rdi+rdx*2] 105 lea rsi, [rsi+rax*2] 106 lea rdi, [rdi+rdx*2]
|
subpixel_sse2.asm | 119 lea rsi, [rsi + rax] 297 lea rsi, [rsi + rax] 619 lea rsi, [rsi + rax] 785 lea rsi, [rsi + rax] [all...] |
idctllm_sse2.asm | 54 lea rcx, [rdx + rdx*2] 86 lea rax, [rax + 2*rdx] 169 lea rcx, [rdx + rdx*2] ;dst_stride * 3 384 lea rcx, [rdx + rdx*2] 652 lea rcx, [rdx + rdx*2] 685 lea rdi, [rdi + 2*rdx]
|
loopfilter_block_sse2.asm | 191 lea spp, [src + stride] 192 lea stride3, [stride + 2 * stride] 193 lea stride5, [stride3 + 2 * stride] 194 lea stride7, [stride3 + 4 * stride] 356 lea spp, [src + stride] 357 lea stride3, [stride + 2 * stride] 358 lea stride5, [stride3 + 2 * stride] 359 lea stride7, [stride3 + 4 * stride]
|
/external/openssl/crypto/perlasm/ |
x86gas.pl | 199 { &::lea($dst,&::DWP("_GLOBAL_OFFSET_TABLE_+[.-$reflabel]", 205 { &::lea($dst,&::DWP($sym)); }
|
x86masm.pl | 19 if ($opcode =~ /lea/ && @arg[1] =~ s/.*PTR\s+(\(.*\))$/OFFSET $1/) # no [] 174 &::lea($dst,&::DWP($sym));
|
x86nasm.pl | 20 elsif ($opcode eq "lea" && $#_==1) # wipe storage qualifier from lea 151 &::lea($dst,&::DWP($sym));
|
/external/v8/src/ia32/ |
debug-ia32.cc | 310 __ lea(esp, Operand(ebp, -1 * kPointerSize)); 321 __ lea(edx, FieldOperand(edx, Code::kHeaderSize));
|
/external/v8/src/x64/ |
debug-x64.cc | 316 __ lea(rsp, Operand(rbp, -1 * kPointerSize)); 327 __ lea(rdx, FieldOperand(rdx, Code::kHeaderSize));
|
code-stubs-x64.cc | 98 __ lea(rdx, FieldOperand(rdx, Code::kHeaderSize)); 257 __ lea(rdx, Operand(rax, JSArray::kSize)); 618 __ lea(double_exponent, Operand(double_value, double_value, times_1, 0)); [all...] |
macro-assembler-x64.cc | 122 lea(destination, Operand(kRootRegister, static_cast<int32_t>(delta))); 139 // Operand is lea(scratch, Operand(kRootRegister, delta)); 143 size += 3; // Need full four-byte displacement in lea. 272 lea(scratch, Operand(object, kScratchRegister, times_1, 0)); 306 lea(dst, FieldOperand(object, offset)); 346 lea(dst, Operand(object, index, times_pointer_size, 666 lea(rcx, StackSpaceOperand(arg_stack_space)); 922 lea(dst, Operand(kSmiConstantRegister, kSmiConstantRegister, times_8, 0)); 926 lea(dst, Operand(dst, kSmiConstantRegister, times_8, 0)); 930 lea(dst, Operand(dst, kSmiConstantRegister, times_4, 0)) [all...] |
/external/openssl/crypto/sha/asm/ |
sha1-586.pl | 43 # "distance" between instructions producing input to 'lea' instruction 44 # and the 'lea' instruction itself, which is essential for Intel Atom 154 &lea($tmp1,&DWP(0x5a827999,$tmp1,$e)); # tmp1+=K_00_19+xi 182 &lea($f,&DWP(0x5a827999,$f,$e));# f+=F_00_19(b,c,d)+e 199 &lea($f,&DWP(0x5a827999,$f,$e));# f+=F_00_19(b,c,d)+e 226 &lea($f,&DWP($K,$f,$e)); # f+=e+K_XX_YY 243 &lea($f,&DWP($K,$f,$e)); # f+=e+K_XX_YY 271 &lea($f,&DWP(0x8f1bbcdc,$f,$e));# f+=K_40_59+e+(b&(c^d)) 287 &lea($f,&DWP(0x8f1bbcdc,$f,$tmp1));# f+=K_40_59+e+(b&(c^d)) 306 &lea ($tmp1,&DWP(&label("K_XX_XX")."-".&label("pic_point"),$tmp1)) [all...] |
/external/openssl/crypto/ripemd/asm/ |
rmd-586.pl | 135 &lea($a, &DWP($K,$a,$tmp2,1)); 155 &lea($a, &DWP($K,$a,$tmp1,1)); 162 &lea($a, &DWP($K,$a,$tmp2,1)); 186 &lea($a, &DWP($K,$a,$tmp2,1)); 202 &lea($a, &DWP($K,$a,$tmp1,1)); 226 &lea($a, &DWP($K,$a,$tmp2)); 243 &lea($a, &DWP($K,$a,$tmp2)); 274 &lea($a, &DWP($K,$a,$tmp2,1)); 290 &lea($a, &DWP($K,$a,$tmp1,1));
|
/external/zlib/src/contrib/masmx64/ |
gvmat64.asm | 273 lea r13, [r10 + rbp]
302 lea rsi,[r10+r11]
408 lea rsi,[r8+r10]
410 lea rsi, [rsi + r13 + 0108h] ;MAX_MATCH_8]
411 lea rdi, [r9 + r13 + 0108h] ;MAX_MATCH_8]
474 lea rax, [rdi + rdx]
486 lea rsi,[r10+r11]
503 lea rsi,[r10+rax]
|
/system/core/libcutils/arch-x86/ |
sse2-memset32-atom.S | 150 lea (%edx, %ecx, 4), %edx 303 lea 128(%edx), %edx 316 lea 128(%edx), %edx 320 lea 128(%ecx), %ecx
|