HomeSort by relevance Sort by last modified time
    Searched full:ebx (Results 276 - 300 of 1021) sorted by null

<<11121314151617181920>>

  /bionic/libc/arch-x86/syscalls/
mount.S 7 pushl %ebx
12 mov 24(%esp), %ebx
31 popl %ebx
perf_event_open.S 7 pushl %ebx
12 mov 24(%esp), %ebx
31 popl %ebx
prctl.S 7 pushl %ebx
12 mov 24(%esp), %ebx
31 popl %ebx
pread64.S 7 pushl %ebx
12 mov 24(%esp), %ebx
31 popl %ebx
pwrite64.S 7 pushl %ebx
12 mov 24(%esp), %ebx
31 popl %ebx
select.S 7 pushl %ebx
12 mov 24(%esp), %ebx
31 popl %ebx
setxattr.S 7 pushl %ebx
12 mov 24(%esp), %ebx
31 popl %ebx
  /external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/
ea-warn.asm 12 add ecx,[byte ebx*8+06h] ;db 03,0c,0dd,06 probably wrong
14 add ecx,[dword ebx*8+06h]
16 add ecx,[ebx*8+06h]
amd200707.asm 16 lzcnt eax, ebx
26 popcnt eax, ebx
  /external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/gas64/
gas-shift.asm 21 shldl $5, %ebx, %edx
22 shldl %cl, %ebx, %edx
23 shldl %ebx, %edx
  /external/chromium_org/third_party/yasm/source/patched-yasm/modules/objfmts/win64/tests/
win64-dataref.asm 34 mov ebx, foobar ; WTF ML64.. this had []
45 mov ebx, trap
63 ;mov ebx,[foobar2]
74 mov ebx, foobar3
75 mov ebx, [foobar3 wrt rip]
86 mov ebx, __savident
87 mov ebx,[__savident wrt rip]
98 mov ebx, savidentptr2
99 mov ebx, [savidentptr2 wrt rip]
110 mov ebx,
    [all...]
  /external/clang/test/Parser/
ms-inline-asm.c 26 push ebx
27 mov ebx, 0x07
28 pop ebx
  /external/compiler-rt/lib/i386/
divdi3.S 54 pushl %ebx
55 movl 24(%esp), %ebx // Find the index i of the leading bit in b.
56 bsrl %ebx, %ecx // If the high word of b is zero, jump to
66 shll %cl, %ebx // (low word of b) >> (1 + i)
67 orl %eax, %ebx //
70 cmpl %ebx, %edx // to avoid overflowing the upcoming divide.
75 divl %ebx // eax <-- qs, edx <-- r such that ahi:alo = bs*qs + r
83 movl 16(%esp), %ebx
84 movl 20(%esp), %ecx // ECX:EBX = a
85 subl %eax, %ebx
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/sha/asm/
sha1-x86_64.S 618 movl %r11d,%ebx
623 xorl %r12d,%ebx
628 andl %edi,%ebx
630 addl %ebx,%r13d
636 movl %edi,%ebx
641 xorl %r11d,%ebx
646 andl %esi,%ebx
648 addl %ebx,%r12d
654 movl %esi,%ebx
659 xorl %edi,%ebx
    [all...]
  /external/openssl/crypto/sha/asm/
sha1-x86_64.S 618 movl %r11d,%ebx
623 xorl %r12d,%ebx
628 andl %edi,%ebx
630 addl %ebx,%r13d
636 movl %edi,%ebx
641 xorl %r11d,%ebx
646 andl %esi,%ebx
648 addl %ebx,%r12d
654 movl %esi,%ebx
659 xorl %edi,%ebx
    [all...]
  /bionic/libc/arch-x86/bionic/
clone.S 6 pushl %ebx
11 movl %ecx, %ebx
20 movl %ebx, -8(%ecx)
23 movl 20(%esp), %ebx
52 popl %ebx
67 pushl %ebx
80 movl 16(%esp), %ebx
113 popl %ebx
  /external/llvm/test/CodeGen/X86/
pr14314.ll 8 ; CHECK: movl %eax, %ebx
9 ; CHECK: subl {{%[a-z]+}}, %ebx
  /external/chromium_org/third_party/openssl/openssl/crypto/md5/asm/
md5-x86_64.pl 147 mov 1*4(%rbp), %ebx # ebx = ctx->B
153 # B is 'ebx'
163 mov %ebx, %r9d
167 round1_step(-1,'%eax','%ebx','%ecx','%edx', '1','0xd76aa478', '7');
168 round1_step( 0,'%edx','%eax','%ebx','%ecx', '2','0xe8c7b756','12');
169 round1_step( 0,'%ecx','%edx','%eax','%ebx', '3','0x242070db','17');
170 round1_step( 0,'%ebx','%ecx','%edx','%eax', '4','0xc1bdceee','22');
171 round1_step( 0,'%eax','%ebx','%ecx','%edx', '5','0xf57c0faf', '7');
172 round1_step( 0,'%edx','%eax','%ebx','%ecx', '6','0x4787c62a','12')
    [all...]
  /external/openssl/crypto/md5/asm/
md5-x86_64.pl 147 mov 1*4(%rbp), %ebx # ebx = ctx->B
153 # B is 'ebx'
163 mov %ebx, %r9d
167 round1_step(-1,'%eax','%ebx','%ecx','%edx', '1','0xd76aa478', '7');
168 round1_step( 0,'%edx','%eax','%ebx','%ecx', '2','0xe8c7b756','12');
169 round1_step( 0,'%ecx','%edx','%eax','%ebx', '3','0x242070db','17');
170 round1_step( 0,'%ebx','%ecx','%edx','%eax', '4','0xc1bdceee','22');
171 round1_step( 0,'%eax','%ebx','%ecx','%edx', '5','0xf57c0faf', '7');
172 round1_step( 0,'%edx','%eax','%ebx','%ecx', '6','0x4787c62a','12')
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/aes/asm/
vpaes-x86.S 85 leal 192(%ebp),%ebx
97 movdqa -64(%ebx,%ecx,1),%xmm1
101 movdqa (%ebx,%ecx,1),%xmm4
140 movdqa 64(%ebx,%ecx,1),%xmm1
149 leal 608(%ebp),%ebx
151 movdqa -64(%ebx),%xmm2
159 movdqa -48(%ebx),%xmm0
167 leal -352(%ebx,%ecx,1),%ecx
171 movdqa -32(%ebx),%xmm4
174 movdqa -16(%ebx),%xmm
    [all...]
aes-586.S 8 xorl 4(%edi),%ebx
45 movl %ebx,%esi
47 shrl $16,%ebx
93 andl $255,%ebx
94 movzbl -128(%ebp,%ebx,1),%ebx
95 shll $16,%ebx
96 xorl %ebx,%edx
97 movl 8(%esp),%ebx
154 movl %ebx,%es
    [all...]
  /external/openssl/crypto/aes/asm/
vpaes-x86.S 85 leal 192(%ebp),%ebx
97 movdqa -64(%ebx,%ecx,1),%xmm1
101 movdqa (%ebx,%ecx,1),%xmm4
140 movdqa 64(%ebx,%ecx,1),%xmm1
149 leal 608(%ebp),%ebx
151 movdqa -64(%ebx),%xmm2
159 movdqa -48(%ebx),%xmm0
167 leal -352(%ebx,%ecx,1),%ecx
171 movdqa -32(%ebx),%xmm4
174 movdqa -16(%ebx),%xmm
    [all...]
aes-586.S 8 xorl 4(%edi),%ebx
45 movl %ebx,%esi
47 shrl $16,%ebx
93 andl $255,%ebx
94 movzbl -128(%ebp,%ebx,1),%ebx
95 shll $16,%ebx
96 xorl %ebx,%edx
97 movl 8(%esp),%ebx
154 movl %ebx,%es
    [all...]
  /external/chromium_org/third_party/yasm/source/patched-yasm/modules/objfmts/elf/tests/
elfso.asm 55 greet push ebx ; we'll use EBX for GOT, so save it
57 .getgot: pop ebx
58 add ebx,_GLOBAL_OFFSET_TABLE_ + $$ - .getgot wrt ..gotpc
59 mov eax,[ebx+integer wrt ..got] ; [14]
62 mov [ebx+localint wrt ..gotoff],eax ; [14]
63 mov eax,[ebx+commvar wrt ..got]
65 mov eax,[ebx+localptr wrt ..gotoff] ; [13]
67 mov eax,[ebx+integer wrt ..got] ; [1] [14]
69 lea eax,[ebx+printfstr wrt ..gotoff
    [all...]
  /external/chromium_org/v8/src/ia32/
builtins-ia32.cc 62 Register scratch = ebx;
173 __ CmpObjectType(eax, MAP_TYPE, ebx);
210 __ Allocate(edi, ebx, edi, no_reg, &rt_call, NO_ALLOCATION_FLAGS);
213 // ebx: JSObject
215 __ mov(Operand(ebx, JSObject::kMapOffset), eax);
218 __ mov(Operand(ebx, JSObject::kPropertiesOffset), ecx);
219 __ mov(Operand(ebx, JSObject::kElementsOffset), ecx);
222 // ebx: JSObject
224 __ lea(ecx, Operand(ebx, JSObject::kHeaderSize));
230 Operand(ebx, esi, times_pointer_size, JSObject::kHeaderSize))
774 __ mov(Operand(esp, eax, times_4, 0), ebx); local
801 __ mov(Operand(esp, ecx, times_4, kPointerSize), ebx); local
1143 __ mov(FieldOperand(eax, JSValue::kValueOffset), ebx); local
    [all...]

Completed in 465 milliseconds

<<11121314151617181920>>