/external/chromium_org/v8/src/ia32/ |
H A D | codegen-ia32.cc | 112 // edi - destination, always aligned 120 Register dst = edi; 169 __ pop(edi); 228 __ push(edi); 231 Register dst = edi; 532 Register scratch = edi; 570 __ JumpIfJSArrayHasAllocationMemento(edx, edi, fail); 575 __ mov(edi, FieldOperand(edx, JSObject::kElementsOffset)); 576 __ cmp(edi, Immediate(masm->isolate()->factory()->empty_fixed_array())); 582 __ mov(edi, FieldOperan 597 __ mov(FieldOperand(eax, FixedDoubleArray::kLengthOffset), edi); local [all...] |
/external/llvm/test/MC/X86/ |
H A D | x86_64-encoding.s | 219 // CHECK: flds (%edi) 221 flds (%edi) 223 // CHECK: filds (%edi) 225 filds (%edi)
|
/external/chromium_org/third_party/libjpeg_turbo/simd/ |
H A D | jimmxred.asm | 132 push edi 141 lea edi, [workspace] ; JCOEF * wsptr 180 movq MMWORD [MMBLOCK(0,0,edi,SIZEOF_JCOEF)], mm0 181 movq MMWORD [MMBLOCK(1,0,edi,SIZEOF_JCOEF)], mm1 182 movq MMWORD [MMBLOCK(2,0,edi,SIZEOF_JCOEF)], mm2 183 movq MMWORD [MMBLOCK(3,0,edi,SIZEOF_JCOEF)], mm3 320 movq MMWORD [MMBLOCK(0,0,edi,SIZEOF_JCOEF)], mm1 321 movq MMWORD [MMBLOCK(1,0,edi,SIZEOF_JCOEF)], mm0 322 movq MMWORD [MMBLOCK(2,0,edi,SIZEOF_JCOEF)], mm6 323 movq MMWORD [MMBLOCK(3,0,edi,SIZEOF_JCOE [all...] |
H A D | jimmxint.asm | 124 push edi 133 lea edi, [workspace] ; JCOEF * wsptr 173 movq MMWORD [MMBLOCK(0,0,edi,SIZEOF_JCOEF)], mm0 174 movq MMWORD [MMBLOCK(0,1,edi,SIZEOF_JCOEF)], mm0 175 movq MMWORD [MMBLOCK(1,0,edi,SIZEOF_JCOEF)], mm1 176 movq MMWORD [MMBLOCK(1,1,edi,SIZEOF_JCOEF)], mm1 177 movq MMWORD [MMBLOCK(2,0,edi,SIZEOF_JCOEF)], mm2 178 movq MMWORD [MMBLOCK(2,1,edi,SIZEOF_JCOEF)], mm2 179 movq MMWORD [MMBLOCK(3,0,edi,SIZEOF_JCOEF)], mm3 180 movq MMWORD [MMBLOCK(3,1,edi,SIZEOF_JCOE [all...] |
H A D | jiss2fst.asm | 109 push edi 332 mov edi, JSAMPARRAY [output_buf(eax)] ; (JSAMPROW *) 472 mov edx, JSAMPROW [edi+0*SIZEOF_JSAMPROW] 473 mov esi, JSAMPROW [edi+2*SIZEOF_JSAMPROW] 476 mov edx, JSAMPROW [edi+4*SIZEOF_JSAMPROW] 477 mov esi, JSAMPROW [edi+6*SIZEOF_JSAMPROW] 481 mov edx, JSAMPROW [edi+1*SIZEOF_JSAMPROW] 482 mov esi, JSAMPROW [edi+3*SIZEOF_JSAMPROW] 485 mov edx, JSAMPROW [edi+5*SIZEOF_JSAMPROW] 486 mov esi, JSAMPROW [edi [all...] |
/external/libyuv/files/source/ |
H A D | scale.cc | 386 push edi 391 lea edi, [esi + esi * 2] // src_stride * 3 local 405 movdqa xmm4, [eax + edi] 406 movdqa xmm5, [eax + edi + 16] 434 pop edi 480 push edi 486 lea edi, [esi + esi * 2] // src_stride * 3 local 499 movdqa xmm4, [eax + edi] 500 movdqa xmm5, [eax + edi + 16] 516 movdqa xmm6, [ebp + edi] 881 mov edi, [esp + 16 + 12] // dst_ptr local 915 lea edi, [edi + 32] local 942 mov edi, [esp + 8 + 4] // dst_ptr local 947 sub edi, esi local 1033 mov edi, [esp + 8 + 4] // dst_ptr local 1038 sub edi, esi local [all...] |
/external/kernel-headers/original/uapi/asm-x86/asm/ |
H A D | vm86.h | 70 long edi; member in struct:vm86_regs
|
/external/kernel-headers/original/uapi/video/ |
H A D | uvesafb.h | 11 __u32 edi; member in struct:v86_regs
|
/external/libunwind/src/coredump/ |
H A D | _UCD_elf_map_image.c | 32 struct elf_image *ei = &ui->edi.ei;
|
H A D | _UCD_internal.h | 97 struct elf_dyn_info edi; member in struct:UCD_info
|
/external/libunwind/src/x86/ |
H A D | getcontext-linux.S | 48 movl %edi, (LINUX_UC_MCONTEXT_OFF+LINUX_SC_EDI_OFF)(%eax)
|
/external/openssl/crypto/des/ |
H A D | des3s.cpp | 11 #pragma aux GetTSC = 0x0f 0x31 "mov [edi], eax" parm [edi] modify [edx eax];
|
H A D | dess.cpp | 11 #pragma aux GetTSC = 0x0f 0x31 "mov [edi], eax" parm [edi] modify [edx eax];
|
/external/openssl/crypto/md4/ |
H A D | md4s.cpp | 11 #pragma aux GetTSC = 0x0f 0x31 "mov [edi], eax" parm [edi] modify [edx eax];
|
/external/openssl/crypto/md5/ |
H A D | md5s.cpp | 11 #pragma aux GetTSC = 0x0f 0x31 "mov [edi], eax" parm [edi] modify [edx eax];
|
/external/openssl/crypto/rc4/ |
H A D | rc4s.cpp | 11 #pragma aux GetTSC = 0x0f 0x31 "mov [edi], eax" parm [edi] modify [edx eax];
|
/external/valgrind/main/exp-bbv/tests/amd64-linux/ |
H A D | ll.S | 58 mov $out_buffer, %edi # point to out_buffer 136 mov $uname_info,%edi # uname struct (0 extend address) 139 mov %ebp,%edi # point %edi to out_buffer 181 # mov $cpuinfo,%edi # '/proc/cpuinfo' 187 # mov %eax,%edi # save our fd 242 mov %ebp,%edi # move output buffer to edi 311 # mov $sysinfo_buff,%edi 355 mov %ebp,%edi # poin [all...] |
/external/chromium_org/third_party/boringssl/win-x86_64/crypto/aes/ |
H A D | aes-x86_64.asm | 18 movzx edi,bl 25 movzx edi,ch 43 movzx edi,dl 50 movzx edi,ah 57 movzx edi,bh 72 movzx edi,bl 79 movzx edi,bh 82 mov edi,DWORD PTR[rdi*8+r14] 85 and edi,00000ff00h 88 xor r10d,edi [all...] |
/external/zlib/src/contrib/gcc_gvmat64/ |
H A D | gvmat64.S | 219 mov edi, prev_length
223 cmp edi, esi
271 xor edi,edi
276 cmovng ebp,edi
380 ;;; edi = prev
413 ;;; Point edi to the string under scrutiny, and esi to the string we
414 ;;; are hoping to match it up with. In actuality, esi and edi are
433 ;;; bytes, as much as necessary in order to dword-align the edi
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/ |
H A D | simd-2.asm | 14 pmovmskb edi, mm0 ; 0F D7 F8
99 cvttsd2si edi, qword [0] ; F2 0F 2C 3D 00 00 00 00
|
/external/libunwind/src/x86_64/ |
H A D | setcontext.S | 68 movl $3,%edi/* SIG_SETMASK */
|
/external/llvm/test/MC/ELF/ |
H A D | relocation-386.s | 131 leal 1 + und_symbol@GOTOFF, %edi
|
/external/qemu/distrib/sdl-1.2.15/src/video/ |
H A D | SDL_stretch.c | 314 push edi 317 mov edi, dstp 322 pop edi
|
/external/valgrind/main/exp-bbv/tests/x86-linux/ |
H A D | ll.S | 52 mov $out_buffer, %edi # point to out_buffer 53 push %edi # save this value for later 131 mov %ebp,%edi # point %edi to out_buffer 237 mov %ebp,%edi # move output buffer to edi 353 mov %ebp,%edi # point to output_buffer 381 # edi points at output buffer 425 movb $0, (%edi) # replace last value with NUL 436 stosb # store a byte to [es:edi] [all...] |
/external/chromium_org/v8/test/cctest/ |
H A D | test-assembler-x87.cc | 260 __ push(edi); 266 __ mov(edi, 5); 283 __ cmp(edi, 5); 289 __ pop(edi); 297 __ pop(edi);
|