/bionic/libc/arch-x86/syscalls/ |
mount.S | 7 pushl %ebx 12 mov 24(%esp), %ebx 31 popl %ebx
|
perf_event_open.S | 7 pushl %ebx 12 mov 24(%esp), %ebx 31 popl %ebx
|
prctl.S | 7 pushl %ebx 12 mov 24(%esp), %ebx 31 popl %ebx
|
pread64.S | 7 pushl %ebx 12 mov 24(%esp), %ebx 31 popl %ebx
|
pwrite64.S | 7 pushl %ebx 12 mov 24(%esp), %ebx 31 popl %ebx
|
select.S | 7 pushl %ebx 12 mov 24(%esp), %ebx 31 popl %ebx
|
setxattr.S | 7 pushl %ebx 12 mov 24(%esp), %ebx 31 popl %ebx
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/ |
ea-warn.asm | 12 add ecx,[byte ebx*8+06h] ;db 03,0c,0dd,06 probably wrong 14 add ecx,[dword ebx*8+06h] 16 add ecx,[ebx*8+06h]
|
amd200707.asm | 16 lzcnt eax, ebx 26 popcnt eax, ebx
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/gas64/ |
gas-shift.asm | 21 shldl $5, %ebx, %edx 22 shldl %cl, %ebx, %edx 23 shldl %ebx, %edx
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/objfmts/win64/tests/ |
win64-dataref.asm | 34 mov ebx, foobar ; WTF ML64.. this had [] 45 mov ebx, trap 63 ;mov ebx,[foobar2] 74 mov ebx, foobar3 75 mov ebx, [foobar3 wrt rip] 86 mov ebx, __savident 87 mov ebx,[__savident wrt rip] 98 mov ebx, savidentptr2 99 mov ebx, [savidentptr2 wrt rip] 110 mov ebx, [all...] |
/external/clang/test/Parser/ |
ms-inline-asm.c | 26 push ebx 27 mov ebx, 0x07 28 pop ebx
|
/external/compiler-rt/lib/i386/ |
divdi3.S | 54 pushl %ebx 55 movl 24(%esp), %ebx // Find the index i of the leading bit in b. 56 bsrl %ebx, %ecx // If the high word of b is zero, jump to 66 shll %cl, %ebx // (low word of b) >> (1 + i) 67 orl %eax, %ebx // 70 cmpl %ebx, %edx // to avoid overflowing the upcoming divide. 75 divl %ebx // eax <-- qs, edx <-- r such that ahi:alo = bs*qs + r 83 movl 16(%esp), %ebx 84 movl 20(%esp), %ecx // ECX:EBX = a 85 subl %eax, %ebx [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/sha/asm/ |
sha1-x86_64.S | 618 movl %r11d,%ebx 623 xorl %r12d,%ebx 628 andl %edi,%ebx 630 addl %ebx,%r13d 636 movl %edi,%ebx 641 xorl %r11d,%ebx 646 andl %esi,%ebx 648 addl %ebx,%r12d 654 movl %esi,%ebx 659 xorl %edi,%ebx [all...] |
/external/openssl/crypto/sha/asm/ |
sha1-x86_64.S | 618 movl %r11d,%ebx 623 xorl %r12d,%ebx 628 andl %edi,%ebx 630 addl %ebx,%r13d 636 movl %edi,%ebx 641 xorl %r11d,%ebx 646 andl %esi,%ebx 648 addl %ebx,%r12d 654 movl %esi,%ebx 659 xorl %edi,%ebx [all...] |
/bionic/libc/arch-x86/bionic/ |
clone.S | 6 pushl %ebx 11 movl %ecx, %ebx 20 movl %ebx, -8(%ecx) 23 movl 20(%esp), %ebx 52 popl %ebx 67 pushl %ebx 80 movl 16(%esp), %ebx 113 popl %ebx
|
/external/llvm/test/CodeGen/X86/ |
pr14314.ll | 8 ; CHECK: movl %eax, %ebx 9 ; CHECK: subl {{%[a-z]+}}, %ebx
|
/external/chromium_org/third_party/openssl/openssl/crypto/md5/asm/ |
md5-x86_64.pl | 147 mov 1*4(%rbp), %ebx # ebx = ctx->B 153 # B is 'ebx' 163 mov %ebx, %r9d 167 round1_step(-1,'%eax','%ebx','%ecx','%edx', '1','0xd76aa478', '7'); 168 round1_step( 0,'%edx','%eax','%ebx','%ecx', '2','0xe8c7b756','12'); 169 round1_step( 0,'%ecx','%edx','%eax','%ebx', '3','0x242070db','17'); 170 round1_step( 0,'%ebx','%ecx','%edx','%eax', '4','0xc1bdceee','22'); 171 round1_step( 0,'%eax','%ebx','%ecx','%edx', '5','0xf57c0faf', '7'); 172 round1_step( 0,'%edx','%eax','%ebx','%ecx', '6','0x4787c62a','12') [all...] |
/external/openssl/crypto/md5/asm/ |
md5-x86_64.pl | 147 mov 1*4(%rbp), %ebx # ebx = ctx->B 153 # B is 'ebx' 163 mov %ebx, %r9d 167 round1_step(-1,'%eax','%ebx','%ecx','%edx', '1','0xd76aa478', '7'); 168 round1_step( 0,'%edx','%eax','%ebx','%ecx', '2','0xe8c7b756','12'); 169 round1_step( 0,'%ecx','%edx','%eax','%ebx', '3','0x242070db','17'); 170 round1_step( 0,'%ebx','%ecx','%edx','%eax', '4','0xc1bdceee','22'); 171 round1_step( 0,'%eax','%ebx','%ecx','%edx', '5','0xf57c0faf', '7'); 172 round1_step( 0,'%edx','%eax','%ebx','%ecx', '6','0x4787c62a','12') [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/aes/asm/ |
vpaes-x86.S | 85 leal 192(%ebp),%ebx 97 movdqa -64(%ebx,%ecx,1),%xmm1 101 movdqa (%ebx,%ecx,1),%xmm4 140 movdqa 64(%ebx,%ecx,1),%xmm1 149 leal 608(%ebp),%ebx 151 movdqa -64(%ebx),%xmm2 159 movdqa -48(%ebx),%xmm0 167 leal -352(%ebx,%ecx,1),%ecx 171 movdqa -32(%ebx),%xmm4 174 movdqa -16(%ebx),%xmm [all...] |
aes-586.S | 8 xorl 4(%edi),%ebx 45 movl %ebx,%esi 47 shrl $16,%ebx 93 andl $255,%ebx 94 movzbl -128(%ebp,%ebx,1),%ebx 95 shll $16,%ebx 96 xorl %ebx,%edx 97 movl 8(%esp),%ebx 154 movl %ebx,%es [all...] |
/external/openssl/crypto/aes/asm/ |
vpaes-x86.S | 85 leal 192(%ebp),%ebx 97 movdqa -64(%ebx,%ecx,1),%xmm1 101 movdqa (%ebx,%ecx,1),%xmm4 140 movdqa 64(%ebx,%ecx,1),%xmm1 149 leal 608(%ebp),%ebx 151 movdqa -64(%ebx),%xmm2 159 movdqa -48(%ebx),%xmm0 167 leal -352(%ebx,%ecx,1),%ecx 171 movdqa -32(%ebx),%xmm4 174 movdqa -16(%ebx),%xmm [all...] |
aes-586.S | 8 xorl 4(%edi),%ebx 45 movl %ebx,%esi 47 shrl $16,%ebx 93 andl $255,%ebx 94 movzbl -128(%ebp,%ebx,1),%ebx 95 shll $16,%ebx 96 xorl %ebx,%edx 97 movl 8(%esp),%ebx 154 movl %ebx,%es [all...] |
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/objfmts/elf/tests/ |
elfso.asm | 55 greet push ebx ; we'll use EBX for GOT, so save it 57 .getgot: pop ebx 58 add ebx,_GLOBAL_OFFSET_TABLE_ + $$ - .getgot wrt ..gotpc 59 mov eax,[ebx+integer wrt ..got] ; [14] 62 mov [ebx+localint wrt ..gotoff],eax ; [14] 63 mov eax,[ebx+commvar wrt ..got] 65 mov eax,[ebx+localptr wrt ..gotoff] ; [13] 67 mov eax,[ebx+integer wrt ..got] ; [1] [14] 69 lea eax,[ebx+printfstr wrt ..gotoff [all...] |
/external/chromium_org/v8/src/ia32/ |
builtins-ia32.cc | 62 Register scratch = ebx; 173 __ CmpObjectType(eax, MAP_TYPE, ebx); 210 __ Allocate(edi, ebx, edi, no_reg, &rt_call, NO_ALLOCATION_FLAGS); 213 // ebx: JSObject 215 __ mov(Operand(ebx, JSObject::kMapOffset), eax); 218 __ mov(Operand(ebx, JSObject::kPropertiesOffset), ecx); 219 __ mov(Operand(ebx, JSObject::kElementsOffset), ecx); 222 // ebx: JSObject 224 __ lea(ecx, Operand(ebx, JSObject::kHeaderSize)); 230 Operand(ebx, esi, times_pointer_size, JSObject::kHeaderSize)) 774 __ mov(Operand(esp, eax, times_4, 0), ebx); local 801 __ mov(Operand(esp, ecx, times_4, kPointerSize), ebx); local 1143 __ mov(FieldOperand(eax, JSValue::kValueOffset), ebx); local [all...] |