HomeSort by relevance Sort by last modified time
    Searched refs:rdx (Results 76 - 100 of 241) sorted by null

1 2 34 5 6 7 8 910

  /external/libvpx/libvpx/vp8/common/x86/
sad_ssse3.asm 39 lddqu xmm1, XMMWORD PTR [rdi+rdx]
40 lddqu xmm2, XMMWORD PTR [rdi+rdx+1]
41 lddqu xmm3, XMMWORD PTR [rdi+rdx+2]
44 lea rdi, [rdi+rdx*2]
94 movdqa xmm4, XMMWORD PTR [rdi+rdx]
95 movdqa xmm3, XMMWORD PTR [rdi+rdx+16]
106 lea rdi, [rdi+rdx*2]
169 mov rdx, 0xf
170 and rdx, rdi
198 movsxd rax, dword [rax + 4*rdx] ; get the 32 bit offset from the jumptabl
    [all...]
postproc_mmx.asm 56 mov rdx, arg(2)
57 sub rdx, 9
58 imul rdx, rax
59 lea rdi, [rdi+rdx]
114 xor rdx, rdx
182 mov rcx, rdx
207 mov rcx, rdx
217 add rdx, 1
265 ; rdx could be trashed by rand(
    [all...]
subpixel_mmx.asm 41 mov rdx, arg(6) ;vp8_filter
43 movq mm1, [rdx + 16] ; do both the negative taps first!!!
44 movq mm2, [rdx + 32] ;
45 movq mm6, [rdx + 48] ;
46 movq mm7, [rdx + 64] ;
81 pmullw mm4, [rdx+80] ; mm5 *= kernel 0 modifiers
85 pmullw mm5, [rdx] ; mm5 *= kernel 5 modifiers
146 movsxd rdx, dword ptr arg(3) ;pixels_per_line
149 sub rsi, rdx
150 sub rsi, rdx
    [all...]
recon_sse2.asm 174 lea rdx, [rdi+rcx*4]
180 movq [rdx ], mm1
181 movq [rdx+rcx ], mm1
182 movq [rdx+rcx*2], mm1
183 movq [rdx+rax ], mm1
333 movsxd rdx, dword ptr arg(1) ;dst_stride
334 lea rcx, [rdx*3]
337 movq [rax+rdx ], mm1
338 movq [rax+rdx*2], mm1
340 lea rax, [rax+rdx*4
    [all...]
sad_mmx.asm 37 movsxd rdx, dword ptr arg(3) ;ref_stride
80 add rdi, rdx
129 movsxd rdx, dword ptr arg(3) ;ref_stride
155 add rdi, rdx
201 movsxd rdx, dword ptr arg(3) ;ref_stride
226 add rdi, rdx
271 movsxd rdx, dword ptr arg(3) ;ref_stride
277 movd mm3, DWORD PTR [rdi+rdx]
297 lea rdi, [rdi+rdx*2]
303 movd mm7, DWORD PTR [rdi+rdx]
    [all...]
  /external/libvpx/libvpx/vp9/encoder/x86/
vp9_sad_sse4.asm 61 movq xmm5, MMWORD PTR [rdi+ rdx]
62 movq xmm3, MMWORD PTR [rdi+ rdx+8]
63 movq xmm2, MMWORD PTR [rdi+ rdx+16]
68 lea rdi, [rdi+rdx*2]
111 movq xmm5, MMWORD PTR [rdi+ rdx]
112 movq xmm3, MMWORD PTR [rdi+ rdx+8]
116 lea rdi, [rdi+rdx*2]
145 movq xmm5, MMWORD PTR [rdi+ rdx]
146 movq xmm3, MMWORD PTR [rdi+ rdx+8]
150 lea rdi, [rdi+rdx*2
    [all...]
vp9_sad_ssse3.asm 39 lddqu xmm1, XMMWORD PTR [rdi+rdx]
40 lddqu xmm2, XMMWORD PTR [rdi+rdx+1]
41 lddqu xmm3, XMMWORD PTR [rdi+rdx+2]
44 lea rdi, [rdi+rdx*2]
94 movdqa xmm4, XMMWORD PTR [rdi+rdx]
95 movdqa xmm3, XMMWORD PTR [rdi+rdx+16]
106 lea rdi, [rdi+rdx*2]
169 mov rdx, 0xf
170 and rdx, rdi
198 movsxd rax, dword [rax + 4*rdx] ; get the 32 bit offset from the jumptabl
    [all...]
vp9_variance_impl_sse2.asm 96 movsxd rdx, DWORD PTR arg(3) ;[recon_stride]
110 lea rcx, [rdx+rdx*2]
112 prefetcht0 [rdi+rdx]
113 prefetcht0 [rdi+rdx*2]
115 lea rbx, [rdi+rdx*4]
117 prefetcht0 [rbx+rdx]
118 prefetcht0 [rbx+rdx*2]
132 prefetcht0 [rdi+rdx*8]
158 add rdi, rdx
    [all...]
vp9_sad_mmx.asm 37 movsxd rdx, dword ptr arg(3) ;ref_stride
80 add rdi, rdx
129 movsxd rdx, dword ptr arg(3) ;ref_stride
155 add rdi, rdx
201 movsxd rdx, dword ptr arg(3) ;ref_stride
226 add rdi, rdx
271 movsxd rdx, dword ptr arg(3) ;ref_stride
277 movd mm3, DWORD PTR [rdi+rdx]
297 lea rdi, [rdi+rdx*2]
303 movd mm7, DWORD PTR [rdi+rdx]
    [all...]
  /external/valgrind/main/exp-bbv/tests/amd64-linux/
ll.S 89 mov text_buf(%rdx), %al # load byte from text_buf[]
127 mov $strcat,%edx # use rdx as call pointer (smaller op)
142 call *%rdx # call strcat
145 call *%rdx # call strcat
149 call *%rdx # call strcat
153 call *%rdx # call strcat
157 call *%rdx # call strcat
164 call *%rdx # call strcat
176 push %rdx # save call pointer
244 pop %rdx # restore call pointe
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/aes/asm/
aesni-x86_64.S 7 movl 240(%rdx),%eax
8 movups (%rdx),%xmm0
9 movups 16(%rdx),%xmm1
10 leaq 32(%rdx),%rdx
15 movups (%rdx),%xmm1
16 leaq 16(%rdx),%rdx
28 movl 240(%rdx),%eax
29 movups (%rdx),%xmm
    [all...]
  /external/openssl/crypto/aes/asm/
aesni-x86_64.S 7 movl 240(%rdx),%eax
8 movups (%rdx),%xmm0
9 movups 16(%rdx),%xmm1
10 leaq 32(%rdx),%rdx
15 movups (%rdx),%xmm1
16 leaq 16(%rdx),%rdx
28 movl 240(%rdx),%eax
29 movups (%rdx),%xmm
    [all...]
  /external/chromium_org/v8/src/x64/
code-stubs-x64.cc 66 static Register registers[] = { rax, rbx, rcx, rdx };
87 static Register registers[] = { rdx, rax };
108 static Register registers[] = { rdx };
118 static Register registers[] = { rdx, rcx, rax };
252 static Register registers[] = { rdx, rcx, rax };
263 static Register registers[] = { rax, rbx, rcx, rdx };
309 __ movq(rdx, Operand(rsp, 1 * kPointerSize));
328 __ movq(FieldOperand(rax, JSFunction::kSharedFunctionInfoOffset), rdx); local
339 FieldOperand(rdx, SharedFunctionInfo::kOptimizedCodeMapOffset));
346 __ movq(rdx, FieldOperand(rdx, SharedFunctionInfo::kCodeOffset))
348 __ movq(FieldOperand(rax, JSFunction::kCodeEntryOffset), rdx); local
394 __ movq(FieldOperand(rax, JSFunction::kCodeEntryOffset), rdx); local
399 __ movq(FieldOperand(rax, JSFunction::kNextFunctionLinkOffset), rdx); local
2255 __ movq(Operand(rsp, 2 * kPointerSize), rdx); local
2311 __ movq(FieldOperand(rax, i), rdx); local
2319 rdx); local
2457 __ movq(Operand(rsp, 2 * kPointerSize), rdx); local
2489 __ movq(Operand(rsp, 2 * kPointerSize), rdx); local
3040 __ movq(FieldOperand(rax, HeapObject::kMapOffset), rdx); local
3068 __ movq(FieldOperand(rcx, FixedArray::kLengthOffset), rdx); local
3082 __ movq(Operand(rcx, rbx, times_pointer_size, 0), rdx); local
4645 __ movq(FieldOperand(rcx, ConsString::kSecondOffset), rdx); local
4655 __ movq(FieldOperand(rcx, ConsString::kSecondOffset), rdx); local
5250 __ movq(FieldOperand(rax, SlicedString::kOffsetOffset), rdx); local
6574 __ movq(FieldOperand(rcx, AllocationSite::kTransitionInfoOffset), rdx); local
    [all...]
  /external/libvpx/libvpx/vp8/encoder/x86/
subtract_sse2.asm 30 movsxd rdx, dword ptr arg(1);src_stride;
41 movd mm0, [rsi+rdx]
48 movd mm0, [rsi+rdx*2]
55 lea rsi, [rsi+rdx*2]
58 movd mm0, [rsi+rdx]
88 movsxd rdx, dword ptr arg(2);src_stride
110 movdqa xmm3, [rsi + rdx]
113 lea rsi, [rsi+rdx*2]
162 movsxd rdx, dword ptr arg(3);src_stride;
172 movq xmm2, [rsi+rdx] ; src -- next lin
    [all...]
quantize_ssse3.asm 43 mov rsi, rdx ; BLOCKD *d
52 mov rdx, [rdi + vp8_block_quant_fast]
76 pmulhw xmm1, [rdx]
77 pmulhw xmm5, [rdx + 16]
  /external/libvpx/libvpx/vp9/common/x86/
vp9_postproc_mmx.asm 63 xor rdx, rdx ; clear out rdx for use as loop counter
146 add rdx, 4
151 sub rsi, rdx
152 sub rdi, rdx
156 xor rdx, rdx
162 movq mm4, [rdi+rdx] ; mm4 = p0..p7
199 movq mm4, [rdi+rdx-2] ; mm4 = p-2..p
    [all...]
  /external/chromium_org/third_party/yasm/source/patched-yasm/modules/objfmts/win64/tests/
win64-dataref.asm 36 lea rdx, [foobar wrt rip]
51 lea rdx, [trap wrt rip]
65 ;lea rdx, foobar2
77 lea rdx, [foobar3 wrt rip]
89 lea rdx, [__savident wrt rip]
101 lea rdx, [savidentptr2 wrt rip]
113 lea rdx, [y wrt rip]
145 lea rdx, [foobar3 wrt rip]
  /external/chromium_org/v8/test/cctest/
test-code-stubs-x64.cc 63 __ push(rdx);
105 __ pop(rdx);
138 Register source_registers[] = {rsp, rax, rbx, rcx, rdx, rsi, rdi, r8, r9};
139 Register dest_registers[] = {rax, rbx, rcx, rdx, rsi, rdi, r8, r9};
  /external/libffi/src/x86/
darwin64.S 50 movq %rdx, (%rax) /* Save flags. */
63 movq 16(%r10), %rdx
168 cmovnz %rax, %rdx
171 cmovnz %r10, %rdx
174 cmovnz %r11, %rdx
176 movq %rdx, 8(%rsi)
212 movq %rdx, 16(%rsp)
221 movq %rsp, %rdx
287 /* There are four possibilities here, %rax/%rdx, %xmm0/%rax,
289 both rdx and xmm1 with the second word. For the remaining
    [all...]
  /external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/
mem64.asm 20 mov rdx, [rsp] ; 48 8B 14 24
  /external/zlib/src/contrib/masmx64/
inffasx64.asm 29 ; rax, rcx, rdx, r8, r-9, r10, and r11, which are scratch.
53 mov rdx, [rsp+80] ; /* rdx = hold */
78 or rdx, rax ; /* hold |= *((uint *)in)++ << bits */
97 or rdx, rax ; /* hold |= *((uint *)in)++ << bits */
100 and r8, rdx ; /* r8 &= hold */
105 shr rdx, cl ; /* hold >>= this.bits */
115 and r8, rdx ; /* r8 &= hold */
121 shr rdx, cl ; /* hold >>= this.bits */
148 shr rdx, cl
    [all...]
  /external/chromium_org/third_party/yasm/source/patched-yasm/modules/objfmts/rdf/tests/
rdtmain.asm 1 ;; rdtmain - main part of test program for RDX execution.
9 ;; ldrdf rdtmain.rdf rdtlib.rdf -o rdxtest.rdx
11 ;; run with 'rdx rdxtest.rdx [parameters]' on a Linux (or possibly
  /external/llvm/lib/Target/X86/
X86CompilationCallback_Win64.asm 26 push rdx
44 mov rdx, qword ptr [rbp+8]
60 pop rdx
  /external/chromium_org/third_party/yasm/source/patched-yasm/libyasm/tests/
opt-gvmat64.asm 48 ; register used : rax,rbx,rcx,rdx,rsi,rdi,r8,r9,r10,r11,r12
155 ; parameter 1 in r8(deflate state s), param 2 in rdx (cur match)
161 ; rax, rcx, rdx, r8, r9, r10, and r11, which are scratch.
176 ; this clear high 32 bits of r8, which can be garbage in both r8 and rdx
371 mov rdx, 0fffffffffffffef8h; -(MAX_MATCH_8)
375 prefetcht1 [rsi+rdx]
376 prefetcht1 [rdi+rdx]
380 ;;; adjust rdx so that it is offset to the exact byte that mismatched.
394 mov rax, [rsi + rdx]
395 xor rax, [rdi + rdx]
    [all...]
  /external/valgrind/main/none/tests/amd64/
pcmpxstrx64.stdout.exp 2 rdx 0000000000000000 argL aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa rax 0000000000000000 argR aaaaaaaaaaaaaaaa00aaaaaaaaaaaaaa
12 rdx 0000000000000000 argL 00000000000000000000000000000000 rax 0000000000000000 argR aaaaaaaaaaaaaaaa00aaaaaaaaaaaaaa
22 rdx 0000000000000000 argL aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa rax 0000000000000000 argR aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
32 rdx 0000000000000005 argL aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa rax 0000000000000000 argR aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
42 rdx 0000000000000000 argL aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa rax 0000000000000006 argR aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
52 rdx 0000000000000005 argL aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa rax 0000000000000006 argR aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
62 rdx 0000000000000005 argL aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa rax 000000000000000f argR aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
72 rdx 0000000000000005 argL aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa rax 0000000000000010 argR aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
82 rdx 0000000000000005 argL aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa rax 0000000000000011 argR aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
92 rdx 0000000000000005 argL aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa rax fffffffffffffffa argR aaaaaaaaaaaaaa (…)
    [all...]

Completed in 7923 milliseconds

1 2 34 5 6 7 8 910