/external/chromium_org/third_party/yasm/source/patched-yasm/libyasm/tests/ |
H A D | expr-wide-ident.asm | 0 lea edx, [lentry+edx+ecx] 1 lea edx, [lentry+edx+ecx] label
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/ |
H A D | ea-over.asm | 4 lea eax,[eax+P+Q] label
|
H A D | ea-nonzero.asm | 5 lea rbp,[rsi+rbp*1+(b-a)] label
|
H A D | effaddr.asm | 4 lea edi,[edi*8+eax+label] label 5 lea edi,[eax+edi*8+label] label
|
/external/chromium_org/third_party/openssl/openssl/crypto/bn/asm/ |
H A D | via-mont.pl | 132 &lea ("ecx",&DWP($pad,"","ecx",4)); # ecx becomes vector size in bytes 133 &lea ("ebp",&DWP(64,"","ecx",4)); # allocate 4 vectors + 64 bytes 143 &lea ("esi",&DWP(64,"esp")); # tp 145 &lea ("edi",&DWP(32,"esp")); # scratch area 149 &lea ("ebp",&DWP(-$pad,"ecx")); 155 &lea ("ecx",&DWP((32+$pad)/4,"ecx"));# padded tp + scratch 159 &lea ("edi",&DWP(64+$pad,"esp","ecx",4));# pointer to ap copy 190 &lea ("esi",&DWP(64,"esp")); # tp 193 &lea ("ebp",&DWP(-$pad,"edi","ebp",4)); # so just "rewind" 201 &lea ("ed [all...] |
H A D | x86_64-mont5.pl | 78 lea -0x28(%rsp),%rsp 85 lea 2($num),%r11 87 lea (%rsp,%r11,8),%rsp # tp=alloca(8*(num+2)) 102 lea .Lmagic_masks(%rip),%rax 104 lea 96($bp,%r11,8),$bp # pointer within 1st cache line 120 lea $STRIDE($bp),$bp 151 lea $STRIDE($bp),$bp 160 lea 1($j),$j # j++ 179 lea 1($j),$j # j++ 203 lea [all...] |
H A D | x86-mont.pl | 64 &lea ("esi",&wparam(0)); # put aside pointer to argument block 65 &lea ("edx",&wparam(1)); # load ap 69 &lea ("esp",&DWP(-$frame,"esp","edi",4)); # alloca($frame+4*(num+2)) 102 &lea ($num,&DWP(-3,"edi")); # num=num-1 to assist modulo-scheduling 167 &lea ($j,&DWP(1,$j)); 236 &lea ($j,&DWP(1,$j)); # j++ 257 &lea ($i,&DWP(1,$i)); # i++ 284 &lea ($carry,&DWP(1,$num)); 290 &lea ("eax",&DWP(4,$word,$num,4)); # &bp[num] 302 &lea ( [all...] |
/external/openssl/crypto/bn/asm/ |
H A D | via-mont.pl | 132 &lea ("ecx",&DWP($pad,"","ecx",4)); # ecx becomes vector size in bytes 133 &lea ("ebp",&DWP(64,"","ecx",4)); # allocate 4 vectors + 64 bytes 143 &lea ("esi",&DWP(64,"esp")); # tp 145 &lea ("edi",&DWP(32,"esp")); # scratch area 149 &lea ("ebp",&DWP(-$pad,"ecx")); 155 &lea ("ecx",&DWP((32+$pad)/4,"ecx"));# padded tp + scratch 159 &lea ("edi",&DWP(64+$pad,"esp","ecx",4));# pointer to ap copy 190 &lea ("esi",&DWP(64,"esp")); # tp 193 &lea ("ebp",&DWP(-$pad,"edi","ebp",4)); # so just "rewind" 201 &lea ("ed [all...] |
H A D | x86_64-mont5.pl | 78 lea -0x28(%rsp),%rsp 85 lea 2($num),%r11 87 lea (%rsp,%r11,8),%rsp # tp=alloca(8*(num+2)) 102 lea .Lmagic_masks(%rip),%rax 104 lea 96($bp,%r11,8),$bp # pointer within 1st cache line 120 lea $STRIDE($bp),$bp 151 lea $STRIDE($bp),$bp 160 lea 1($j),$j # j++ 179 lea 1($j),$j # j++ 203 lea [all...] |
/external/llvm/test/MC/X86/ |
H A D | x86_errors.s | 26 lea (%rsp, %rbp, $4), %rax label
|
/external/chromium_org/tools/traceline/traceline/ |
H A D | assembler_unittest.cc | 26 cb.lea(EAX, Operand(EAX)); 27 cb.lea(EAX, Operand(0x12345678)); 28 cb.lea(EAX, Operand(EBX, 0x12345678)); 29 cb.lea(EAX, Operand(EBX, ECX, SCALE_TIMES_2, 0x12345678)); 30 cb.lea(EAX, Operand(ECX, SCALE_TIMES_2, 0x12345678)); 31 cb.lea(EAX, Operand(EAX, SCALE_TIMES_2, 0)); 32 cb.lea(EAX, Operand(EBX, SCALE_TIMES_2, 0)); 33 cb.lea(EBP, Operand(EBP, SCALE_TIMES_2, 1));
|
/external/libvpx/libvpx/vp9/common/x86/ |
H A D | vp9_copy_sse2.asm | 58 lea srcq, [srcq+src_strideq*2] 69 lea dstq, [dstq+dst_strideq*2] 76 lea r5q, [src_strideq*3] 77 lea r6q, [dst_strideq*3] 83 lea srcq, [srcq+src_strideq*4] 94 lea dstq, [dstq+dst_strideq*4] 102 lea r5q, [src_strideq*3] 103 lea r6q, [dst_strideq*3] 109 lea srcq, [srcq+src_strideq*4] 120 lea dst [all...] |
H A D | vp9_intrapred_ssse3.asm | 53 lea dstq, [dstq+strideq*2] 71 lea dstq, [dstq+strideq*2] 89 lea dstq, [dstq+strideq*2] 109 lea dstq, [dstq+strideq*2] 130 lea dstq, [dstq+strideq*2] 142 lea stride3q, [strideq*3] 160 lea dstq, [dstq+strideq*4] 176 lea stride3q, [strideq*3] 177 lea dst8q, [dstq+strideq*8] 202 lea dst [all...] |
/external/clang/test/CodeGen/ |
H A D | ms-inline-asm-64.c | 25 lea ebx, foo 31 // CHECK: call void asm sideeffect inteldialect "lea ebx, qword ptr $0\0A\09mov eax, [ebx].0\0A\09mov [ebx].4, ecx", "*m,~{eax},~{ebx},~{dirflag},~{fpsr},~{flags}"(%struct.t3_type* %{{.*}}) 39 lea ebx, foo 45 // CHECK: call void asm sideeffect inteldialect "lea ebx, qword ptr $0\0A\09mov eax, [ebx].0\0A\09mov [ebx].4, ecx", "*m,~{eax},~{ebx},~{dirflag},~{fpsr},~{flags}"(%struct.t3_type* %{{.*}})
|
/external/libvpx/libvpx/vp9/encoder/x86/ |
H A D | vp9_subtract_sse2.asm | 62 lea diffq, [diffq+diff_strideq*2] 73 lea diffq, [diffq+diff_strideq*2] 84 lea diffq, [diffq+diff_strideq*4] 85 lea predq, [predq+pred_str*2] 86 lea srcq, [srcq+src_strideq*2] 110 lea diffq, [diffq+diff_strideq*4] 111 lea srcq, [srcq+src_strideq*2] 112 lea predq, [predq+pred_str*2] 122 lea diffq, [diffq+diff_strideq*4] 123 lea src [all...] |
H A D | vp9_sad4d_sse2.asm | 54 lea srcq, [srcq +src_strideq*2] 55 lea ref1q, [ref1q+ref_strideq*2] 56 lea ref2q, [ref2q+ref_strideq*2] 57 lea ref3q, [ref3q+ref_strideq*2] 58 lea ref4q, [ref4q+ref_strideq*2] 99 lea srcq, [srcq +src_strideq*2] 100 lea ref1q, [ref1q+ref_strideq*2] 101 lea ref2q, [ref2q+ref_strideq*2] 102 lea ref3q, [ref3q+ref_strideq*2] 103 lea ref4 [all...] |
/external/qemu/distrib/sdl-1.2.15/src/audio/mint/ |
H A D | SDL_mintaudio_it.S | 63 lea sp@(-216),sp; \ 66 lea sp@(-64),sp; \ 71 lea sp@(64),sp; \ 74 lea sp@(216),sp 122 lea sp@(-60),sp 188 lea _SDL_MintAudio_audiobuf,a0 191 lea a1@(d1:l),a2 198 lea sp@(12),sp 212 lea sp@(60),sp 222 lea s [all...] |
/external/libvpx/libvpx/vp8/common/ |
H A D | entropymode.c | 23 int lea = (l->as_int == a->as_int); local 25 if (lea && lez) 28 if (lea)
|
/external/qemu/distrib/sdl-1.2.15/src/timer/mint/ |
H A D | SDL_vbltimer.S | 44 lea sp@(-216),sp; \ 47 lea sp@(-64),sp; \ 52 lea sp@(64),sp; \ 55 lea sp@(216),sp 85 lea _my_vbl,a0 171 lea sp@(-60),sp 216 lea sp@(60),sp
|
/external/chromium_org/third_party/openssl/openssl/crypto/ |
H A D | x86cpuid.pl | 249 &lea ("eax",&DWP(4,"esp")); 260 &lea ("ebx",&DWP(0,"eax","ecx")); 319 &lea ("edx",&DWP(1,"edx")); 328 &lea ("ecx",&DWP(-1,"ecx")); 329 &lea ("edx",&DWP(1,"edx")); 333 &lea ("ecx",&DWP(-4,"ecx")); 335 &lea ("edx",&DWP(4,"edx"));
|
/external/openssl/crypto/ |
H A D | x86cpuid.pl | 249 &lea ("eax",&DWP(4,"esp")); 260 &lea ("ebx",&DWP(0,"eax","ecx")); 319 &lea ("edx",&DWP(1,"edx")); 328 &lea ("ecx",&DWP(-1,"ecx")); 329 &lea ("edx",&DWP(1,"edx")); 333 &lea ("ecx",&DWP(-4,"ecx")); 335 &lea ("edx",&DWP(4,"edx"));
|
/external/libvpx/libvpx/vp8/common/x86/ |
H A D | sad_sse2.asm | 35 lea rcx, [rsi+rax*8] 37 lea rcx, [rcx+rax*8] 59 lea rsi, [rsi+rax*2] 61 lea rdi, [rdi+rdx*2] 109 lea rcx, [rsi+rbx*8] 111 lea rcx, [rcx+rbx*8] 129 lea rsi, [rsi+rbx*2] 130 lea rdi, [rdi+rdx*2] 172 lea rcx, [rsi+rbx*8] 185 lea rs [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/aes/asm/ |
H A D | bsaes-x86_64.pl | 450 lea 0x80($key),$key 755 lea .LBS0(%rip), $const # constants table 758 lea 0x10($key), $key 819 lea .LBS0(%rip), $const # constants table 822 lea 0x10($key), $key 910 lea .Lmasks(%rip), $const 912 lea 0x10($inp), $inp 922 lea 0x10($out), $out 963 lea 0x10($inp), $inp 981 lea [all...] |
/external/openssl/crypto/aes/asm/ |
H A D | bsaes-x86_64.pl | 450 lea 0x80($key),$key 755 lea .LBS0(%rip), $const # constants table 758 lea 0x10($key), $key 819 lea .LBS0(%rip), $const # constants table 822 lea 0x10($key), $key 910 lea .Lmasks(%rip), $const 912 lea 0x10($inp), $inp 922 lea 0x10($out), $out 963 lea 0x10($inp), $inp 981 lea [all...] |
/external/qemu/distrib/sdl-1.2.15/src/video/ataricommon/ |
H A D | SDL_ikbdinterrupt.S | 46 lea sp@(-16),sp 58 lea 0xfffffa00:w,a0 79 lea ikbd,a0 111 lea sp@(16),sp 130 lea 0xfffffa00:w,a0 153 lea 0xfffffc00:w,a0 183 lea sp@(-12),sp 245 lea _SDL_AtariIkbd_keyboard,a0 265 lea sp@(12),sp 278 lea s [all...] |