/external/kernel-headers/original/asm-x86/ |
user32.h | 35 __u32 ebx, ecx, edx, esi, edi, ebp, eax; member in struct:user_regs_struct32
|
/external/llvm/include/llvm/Support/ |
Solaris.h | 38 #undef EBX
|
/external/llvm/test/CodeGen/X86/ |
2009-04-29-IndirectDestOperands.ll | 1 ; RUN: llc < %s | grep "movl.*%ebx, 8(%esi)"
|
/external/openssl/crypto/bn/asm/x86/ |
sqr.pl | 13 $num="ebx";
|
/external/openssl/crypto/ |
x86_64cpuid.pl | 66 cmp \$0x756e6547,%ebx # "Genu" 77 cmp \$0x68747541,%ebx # "Auth" 111 shr \$16,%ebx # number of logical processors 148 shr \$16,%ebx
|
/prebuilts/ndk/4/platforms/android-5/arch-x86/usr/include/asm/ |
vm86.h | 55 long ebx; member in struct:vm86_regs
|
/prebuilts/ndk/4/platforms/android-8/arch-x86/usr/include/asm/ |
vm86.h | 55 long ebx; member in struct:vm86_regs
|
/prebuilts/ndk/6/platforms/android-9/arch-x86/usr/include/asm/ |
vm86.h | 55 long ebx; member in struct:vm86_regs
|
/prebuilts/ndk/7/platforms/android-14/arch-x86/usr/include/asm/ |
vm86.h | 55 long ebx; member in struct:vm86_regs
|
/prebuilts/ndk/7/platforms/android-9/arch-x86/usr/include/asm/ |
vm86.h | 55 long ebx; member in struct:vm86_regs
|
/prebuilts/ndk/8/platforms/android-14/arch-x86/usr/include/asm/ |
ptrace-abi.h | 21 #define EBX 0
|
/prebuilts/ndk/8/platforms/android-9/arch-x86/usr/include/asm/ |
ptrace-abi.h | 21 #define EBX 0
|
/prebuilts/ndk/9/platforms/android-14/arch-x86/usr/include/asm/ |
ptrace-abi.h | 21 #define EBX 0
|
/prebuilts/ndk/9/platforms/android-18/arch-x86/usr/include/asm/ |
ptrace-abi.h | 21 #define EBX 0
|
/prebuilts/ndk/9/platforms/android-9/arch-x86/usr/include/asm/ |
ptrace-abi.h | 21 #define EBX 0
|
/external/chromium_org/v8/test/mjsunit/ |
codegen-coverage.js | 47 var b; // Register ebx, rbx. 57 // A fresh register {ebx,rbx} will be allocated for x, then reused for 90 b = 0; // Free register ebx.
|
/external/v8/test/mjsunit/ |
codegen-coverage.js | 47 var b; // Register ebx, rbx. 57 // A fresh register {ebx,rbx} will be allocated for x, then reused for 90 b = 0; // Free register ebx.
|
/bionic/libc/arch-x86/string/ |
ssse3-memcpy-atom.S | 99 # define PARMS 8 /* Preserve EBX. */ 100 # define ENTRANCE PUSH (%ebx); 101 # define RETURN_END POP (%ebx); ret 102 # define RETURN RETURN_END; CFI_PUSH (%ebx) 108 /* Load an entry in a jump table into EBX and branch to it. TABLE is a 113 /* We first load PC into EBX. */ \ 116 addl $(TABLE - .), %ebx; \ 119 addl (%ebx, INDEX, SCALE), %ebx; \ 121 jmp *%ebx [all...] |
ssse3-strcmp-atom.S | 213 PUSH (%ebx) 226 xor %ebx, %ebx 230 or $0x20, %ebx 289 mov $0x10, %ebx 338 or $1, %ebx 444 or $2, %ebx 551 or $3, %ebx 657 or $4, %ebx 766 or $5, %ebx [all...] |
/external/zlib/src/contrib/amd64/ |
amd64-match.S | 16 #define scanend ebx 165 movl dsGoodMatch, %ebx 166 cmpl %ebx, %eax 185 movl dsLookahead, %ebx 186 cmpl %eax, %ebx 188 movl %eax, %ebx 189 LookaheadLess: movl %ebx, %nicematch
|
/external/qemu/distrib/libpng-1.2.19/ |
pnggccrd.c | 104 * ebx (where "row" pointer was stored), it nevertheless managed to zero 113 * listings... Apparently register spillage has to do with ebx, since 120 * "AuthenticAMD", etc.) placed in ebx:ecx:edx. Still need to polish. 165 * - avoid all usage of ebx (including bx, bh, bl) register [20000823] 175 * ebx is getting clobbered again (explicitly this time); need to save it 179 * - first section was trickiest; all remaining sections have ebx -> edx now. 237 * - fixed insufficient preservation of ebx register [Sami Farin] 350 * (save/restore ebx only if needed) 386 * %%ebx) clears the top half of its corresponding 64-bit reg (%%rbx), so [all...] |
/external/qemu/target-i386/ |
helper.c | 712 cpu_fprintf(f, "EAX=%08x EBX=%08x ECX=%08x EDX=%08x\n" [all...] |
/external/v8/src/ia32/ |
deoptimizer-ia32.cc | 888 __ mov(Operand(esp, 2 * kPointerSize), ebx); \/\/ Bailout id. local [all...] |
/external/valgrind/main/VEX/orig_amd64/ |
test1.sorted | 20 01D8 addl %ebx, %eax 123 83FB01 cmpl $1, %ebx 136 3B5C2418 cmpl 24(%rsp), %ebx 138 81FBFE000000 cmpl $254, %ebx 139 81FBFF000000 cmpl $255, %ebx 151 83FB02 cmpl $2, %ebx 156 83FB21 cmpl $33, %ebx 164 83FB05 cmpl $5, %ebx 171 81FB00000100 cmpl $65536, %ebx 217 4439F3 cmpl %r14d, %ebx [all...] |
/bionic/libc/tools/ |
gensyscalls.py | 46 x86_registers = [ "%ebx", "%ecx", "%edx", "%esi", "%edi", "%ebp" ] 224 # %ebx <--- Argument 1 - The call id of the needed vectored 235 result += " pushl %ebx" + "\n" 240 # set the call id (%ebx) 241 result += " mov $%d, %%ebx" % (cid) + "\n" 252 result += " popl %ebx" + "\n"
|