/external/llvm/test/CodeGen/X86/ |
extract-store.ll | 14 define void @pextrw(i16* nocapture %dst, <8 x i16> %foo) { 16 ; SSE41: pextrw
|
sse3.ll | 41 ; X64: pextrw $1, %xmm1, %eax 51 ; X64: pextrw $5, %xmm0, %eax 62 ; X64: pextrw $7, [[XMM0:%xmm[0-9]+]], %eax 65 ; X64: pextrw $1, [[XMM0]], %eax 167 ; X64: pextrw $4, [[X0:%xmm[0-9]+]], %e{{..}} 168 ; X64: pextrw $6, [[X0]], %e{{..}} 197 ; X64: pextrw $3, %xmm1, %eax 211 ; X64: pextrw $3, %xmm1, %eax 235 ; X64: pextrw $7, %xmm0, %eax 243 ; Test yonah where we convert a shuffle to pextrw and pinrs [all...] |
vec_shuffle-35.ll | 2 ; RUN: grep pextrw %t | count 12
|
widen_arith-1.ll | 5 ; CHECK-NOT: pextrw
|
2009-04-21-NoReloadImpDef.ll | 6 ; CHECK: pextrw $14
|
widen_load-2.ll | 153 ; CHECK: pextrw
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/ |
sse4.asm | 107 pextrw eax, xmm1, 5 label 108 pextrw [0], xmm1, 5 label 109 pextrw word [0], xmm1, 5 label 110 pextrw rax, xmm1, 5 label
|
simd-2.asm | 2 pextrw ebx, mm5, 0 ; 0F C5 DD 00
label 3 pextrw ecx, xmm0, 1 ; 66 0F C5 C8 01
label
|
/external/valgrind/main/none/tests/x86/ |
insn_mmxext.def | 6 pextrw imm8[0] mm.uw[1234,5678,4321,8765] r32.ud[0xffffffff] => 2.ud[1234] 7 pextrw imm8[1] mm.uw[1234,5678,4321,8765] r32.ud[0xffffffff] => 2.ud[5678] 8 pextrw imm8[2] mm.uw[1234,5678,4321,8765] r32.ud[0xffffffff] => 2.ud[4321] 9 pextrw imm8[3] mm.uw[1234,5678,4321,8765] r32.ud[0xffffffff] => 2.ud[8765]
|
insn_sse.def | 97 pextrw imm8[0] mm.uw[1234,5678,4321,8765] r32.ud[0xffffffff] => 2.ud[1234] 98 pextrw imm8[1] mm.uw[1234,5678,4321,8765] r32.ud[0xffffffff] => 2.ud[5678] 99 pextrw imm8[2] mm.uw[1234,5678,4321,8765] r32.ud[0xffffffff] => 2.ud[4321] 100 pextrw imm8[3] mm.uw[1234,5678,4321,8765] r32.ud[0xffffffff] => 2.ud[8765]
|
insn_sse2.def | 173 pextrw imm8[0] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[1234] 174 pextrw imm8[1] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[5678] 175 pextrw imm8[2] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[4321] 176 pextrw imm8[3] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[8765] 177 pextrw imm8[4] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[1111] 178 pextrw imm8[5] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[2222] 179 pextrw imm8[6] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[3333] 180 pextrw imm8[7] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[4444] [all...] |
/external/chromium_org/third_party/libvpx/source/libvpx/third_party/libyuv/source/ |
scale_win.cc | 819 pextrw eax, xmm2, 1 // get x0 integer. preroll 828 pextrw edx, xmm2, 3 // get x1 integer. preroll 844 pextrw eax, xmm2, 1 // get x0 integer. next iteration. 845 pextrw edx, xmm2, 3 // get x1 integer. next iteration. [all...] |
scale_posix.cc | 799 "pextrw $0x1,%%xmm2,%k3 \n" 807 "pextrw $0x3,%%xmm2,%k4 \n" 823 "pextrw $0x1,%%xmm2,%k3 \n" 824 "pextrw $0x3,%%xmm2,%k4 \n" [all...] |
/external/chromium_org/third_party/libyuv/source/ |
scale_win.cc | 819 pextrw eax, xmm2, 1 // get x0 integer. preroll 828 pextrw edx, xmm2, 3 // get x1 integer. preroll 844 pextrw eax, xmm2, 1 // get x0 integer. next iteration. 845 pextrw edx, xmm2, 3 // get x1 integer. next iteration. [all...] |
scale_posix.cc | 799 "pextrw $0x1,%%xmm2,%k3 \n" 807 "pextrw $0x3,%%xmm2,%k4 \n" 823 "pextrw $0x1,%%xmm2,%k3 \n" 824 "pextrw $0x3,%%xmm2,%k4 \n" [all...] |
/external/libvpx/libvpx/vp8/encoder/x86/ |
quantize_sse4.asm | 138 pextrw ecx, %4, %2 145 pextrw edi, %3, %2 ; y
|
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/vp8/encoder/x86/ |
quantize_sse4.asm | 138 pextrw ecx, %4, %2 145 pextrw edi, %3, %2 ; y
|
/external/valgrind/main/memcheck/tests/amd64/ |
sse_memory.c | 228 //TEST_INSN( &AllMask, 0,pextrw) 336 //TEST_INSN( &AllMask, 16,pextrw) 459 //TEST_INSN( &AllMask, 0,pextrw) 568 //TEST_INSN( &AllMask, 16,pextrw)
|
/external/llvm/test/MC/Disassembler/X86/ |
x86-64.txt | 239 # CHECK: pextrw $3, %xmm3, %ecx 242 # CHECK: pextrw $3, %xmm3, (%rax)
|
/external/elfutils/0.153/ |
TODO | 58 pextrw
|
/external/valgrind/main/none/tests/amd64/ |
insn_sse.def | 97 pextrw imm8[0] mm.uw[1234,5678,4321,8765] r32.ud[0xffffffff] => 2.ud[1234] 98 pextrw imm8[1] mm.uw[1234,5678,4321,8765] r32.ud[0xffffffff] => 2.ud[5678] 99 pextrw imm8[2] mm.uw[1234,5678,4321,8765] r32.ud[0xffffffff] => 2.ud[4321] 100 pextrw imm8[3] mm.uw[1234,5678,4321,8765] r32.ud[0xffffffff] => 2.ud[8765]
|
insn_sse2.def | 173 pextrw imm8[0] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[1234] 174 pextrw imm8[1] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[5678] 175 pextrw imm8[2] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[4321] 176 pextrw imm8[3] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[8765] 177 pextrw imm8[4] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[1111] 178 pextrw imm8[5] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[2222] 179 pextrw imm8[6] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[3333] 180 pextrw imm8[7] xmm.uw[1234,5678,4321,8765,1111,2222,3333,4444] r32.ud[0xffffffff] => 2.ud[4444] [all...] |
/external/chromium_org/third_party/libvpx/source/libvpx/vp9/encoder/x86/ |
vp9_quantize_ssse3_x86_64.asm | 191 pextrw r6, m8, 0 374 pextrw r6, m8, 0
|
/external/libvpx/libvpx/vp9/encoder/x86/ |
vp9_quantize_ssse3.asm | 191 pextrw r6, m8, 0
|
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/vp9/encoder/x86/ |
vp9_quantize_ssse3.asm | 191 pextrw r6, m8, 0
|