HomeSort by relevance Sort by last modified time
    Searched full:ebx (Results 601 - 625 of 1021) sorted by null

<<21222324252627282930>>

  /external/kernel-headers/original/asm-x86/
user32.h 35 __u32 ebx, ecx, edx, esi, edi, ebp, eax; member in struct:user_regs_struct32
  /external/llvm/include/llvm/Support/
Solaris.h 38 #undef EBX
  /external/llvm/test/CodeGen/X86/
2009-04-29-IndirectDestOperands.ll 1 ; RUN: llc < %s | grep "movl.*%ebx, 8(%esi)"
  /external/openssl/crypto/bn/asm/x86/
sqr.pl 13 $num="ebx";
  /external/openssl/crypto/
x86_64cpuid.pl 66 cmp \$0x756e6547,%ebx # "Genu"
77 cmp \$0x68747541,%ebx # "Auth"
111 shr \$16,%ebx # number of logical processors
148 shr \$16,%ebx
  /prebuilts/ndk/4/platforms/android-5/arch-x86/usr/include/asm/
vm86.h 55 long ebx; member in struct:vm86_regs
  /prebuilts/ndk/4/platforms/android-8/arch-x86/usr/include/asm/
vm86.h 55 long ebx; member in struct:vm86_regs
  /prebuilts/ndk/6/platforms/android-9/arch-x86/usr/include/asm/
vm86.h 55 long ebx; member in struct:vm86_regs
  /prebuilts/ndk/7/platforms/android-14/arch-x86/usr/include/asm/
vm86.h 55 long ebx; member in struct:vm86_regs
  /prebuilts/ndk/7/platforms/android-9/arch-x86/usr/include/asm/
vm86.h 55 long ebx; member in struct:vm86_regs
  /prebuilts/ndk/8/platforms/android-14/arch-x86/usr/include/asm/
ptrace-abi.h 21 #define EBX 0
  /prebuilts/ndk/8/platforms/android-9/arch-x86/usr/include/asm/
ptrace-abi.h 21 #define EBX 0
  /prebuilts/ndk/9/platforms/android-14/arch-x86/usr/include/asm/
ptrace-abi.h 21 #define EBX 0
  /prebuilts/ndk/9/platforms/android-18/arch-x86/usr/include/asm/
ptrace-abi.h 21 #define EBX 0
  /prebuilts/ndk/9/platforms/android-9/arch-x86/usr/include/asm/
ptrace-abi.h 21 #define EBX 0
  /external/chromium_org/v8/test/mjsunit/
codegen-coverage.js 47 var b; // Register ebx, rbx.
57 // A fresh register {ebx,rbx} will be allocated for x, then reused for
90 b = 0; // Free register ebx.
  /external/v8/test/mjsunit/
codegen-coverage.js 47 var b; // Register ebx, rbx.
57 // A fresh register {ebx,rbx} will be allocated for x, then reused for
90 b = 0; // Free register ebx.
  /bionic/libc/arch-x86/string/
ssse3-memcpy-atom.S 99 # define PARMS 8 /* Preserve EBX. */
100 # define ENTRANCE PUSH (%ebx);
101 # define RETURN_END POP (%ebx); ret
102 # define RETURN RETURN_END; CFI_PUSH (%ebx)
108 /* Load an entry in a jump table into EBX and branch to it. TABLE is a
113 /* We first load PC into EBX. */ \
116 addl $(TABLE - .), %ebx; \
119 addl (%ebx, INDEX, SCALE), %ebx; \
121 jmp *%ebx
    [all...]
ssse3-strcmp-atom.S 213 PUSH (%ebx)
226 xor %ebx, %ebx
230 or $0x20, %ebx
289 mov $0x10, %ebx
338 or $1, %ebx
444 or $2, %ebx
551 or $3, %ebx
657 or $4, %ebx
766 or $5, %ebx
    [all...]
  /external/zlib/src/contrib/amd64/
amd64-match.S 16 #define scanend ebx
165 movl dsGoodMatch, %ebx
166 cmpl %ebx, %eax
185 movl dsLookahead, %ebx
186 cmpl %eax, %ebx
188 movl %eax, %ebx
189 LookaheadLess: movl %ebx, %nicematch
  /external/qemu/distrib/libpng-1.2.19/
pnggccrd.c 104 * ebx (where "row" pointer was stored), it nevertheless managed to zero
113 * listings... Apparently register spillage has to do with ebx, since
120 * "AuthenticAMD", etc.) placed in ebx:ecx:edx. Still need to polish.
165 * - avoid all usage of ebx (including bx, bh, bl) register [20000823]
175 * ebx is getting clobbered again (explicitly this time); need to save it
179 * - first section was trickiest; all remaining sections have ebx -> edx now.
237 * - fixed insufficient preservation of ebx register [Sami Farin]
350 * (save/restore ebx only if needed)
386 * %%ebx) clears the top half of its corresponding 64-bit reg (%%rbx), so
    [all...]
  /external/qemu/target-i386/
helper.c 712 cpu_fprintf(f, "EAX=%08x EBX=%08x ECX=%08x EDX=%08x\n"
    [all...]
  /external/v8/src/ia32/
deoptimizer-ia32.cc 888 __ mov(Operand(esp, 2 * kPointerSize), ebx); \/\/ Bailout id. local
    [all...]
  /external/valgrind/main/VEX/orig_amd64/
test1.sorted 20 01D8 addl %ebx, %eax
123 83FB01 cmpl $1, %ebx
136 3B5C2418 cmpl 24(%rsp), %ebx
138 81FBFE000000 cmpl $254, %ebx
139 81FBFF000000 cmpl $255, %ebx
151 83FB02 cmpl $2, %ebx
156 83FB21 cmpl $33, %ebx
164 83FB05 cmpl $5, %ebx
171 81FB00000100 cmpl $65536, %ebx
217 4439F3 cmpl %r14d, %ebx
    [all...]
  /bionic/libc/tools/
gensyscalls.py 46 x86_registers = [ "%ebx", "%ecx", "%edx", "%esi", "%edi", "%ebp" ]
224 # %ebx <--- Argument 1 - The call id of the needed vectored
235 result += " pushl %ebx" + "\n"
240 # set the call id (%ebx)
241 result += " mov $%d, %%ebx" % (cid) + "\n"
252 result += " popl %ebx" + "\n"

Completed in 476 milliseconds

<<21222324252627282930>>