/external/google-breakpad/src/tools/windows/dump_syms/testdata/ |
D | omap_reorder_bbs.sym | 3705 STACK WIN 4 2cec 54 6 0 8 0 14 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 3706 STACK WIN 4 4b70 a 3 0 0 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 3707 STACK WIN 4 25a8 21 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 3708 STACK WIN 4 131c 14 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 3709 STACK WIN 4 1b94 16 7 0 4 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 3710 STACK WIN 4 11e8 1e 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 3711 STACK WIN 4 1b3c 10 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 3712 STACK WIN 4 669c 7 3 0 4 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 3713 STACK WIN 4 16d4 7 7 0 4 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 3714 STACK WIN 4 16db 19 0 0 4 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = [all …]
|
D | omap_stretched.sym | 2788 STACK WIN 4 1000 54 6 0 8 0 14 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2789 STACK WIN 4 1060 a 3 0 0 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2790 STACK WIN 4 106a 35 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2791 STACK WIN 4 109f 1e 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2792 STACK WIN 4 10bd 7 7 0 4 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2793 STACK WIN 4 10c4 6 0 0 4 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2794 STACK WIN 4 10d4 9 0 0 4 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2795 STACK WIN 4 10dd 7 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2796 STACK WIN 4 10e4 24 0 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2797 STACK WIN 4 1112 7 0 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = [all …]
|
D | omap_stretched_filled.sym | 2665 STACK WIN 4 1000 54 6 0 8 0 14 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2666 STACK WIN 4 1060 a 3 0 0 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2667 STACK WIN 4 106a 35 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2668 STACK WIN 4 109f 1e 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2669 STACK WIN 4 10bd 20 7 0 4 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2670 STACK WIN 4 10dd 3c 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2671 STACK WIN 4 1119 10 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2672 STACK WIN 4 1129 7 3 0 4 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2673 STACK WIN 4 1130 2c 7 0 4 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = 2675 STACK WIN 4 1176 21 8 0 4 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = [all …]
|
/external/boringssl/mac-x86/crypto/fipsmodule/ |
D | sha1-586.S | 14 pushl %ebp 20 popl %ebp 21 movl L_OPENSSL_ia32cap_P$non_lazy_ptr-L000pic_point(%ebp),%esi 22 leal LK_XX_XX-L000pic_point(%ebp),%ebp 38 movl 20(%esp),%ebp 45 movl 16(%ebp),%edi 98 movl (%ebp),%eax 99 movl 4(%ebp),%ebx 100 movl 8(%ebp),%ecx 101 movl 12(%ebp),%edx [all …]
|
D | md5-586.S | 19 pushl %ebp 33 movl (%esi),%ebp 37 leal 3614090360(%eax,%ebp,1),%eax 42 movl 4(%esi),%ebp 47 leal 3905402710(%edx,%ebp,1),%edx 52 movl 8(%esi),%ebp 57 leal 606105819(%ecx,%ebp,1),%ecx 62 movl 12(%esi),%ebp 67 leal 3250441966(%ebx,%ebp,1),%ebx 72 movl 16(%esi),%ebp [all …]
|
D | aes-586.S | 21 movl -128(%ebp),%edi 22 movl -96(%ebp),%esi 23 movl -64(%ebp),%edi 24 movl -32(%ebp),%esi 25 movl (%ebp),%edi 26 movl 32(%ebp),%esi 27 movl 64(%ebp),%edi 28 movl 96(%ebp),%esi 33 movzbl -128(%ebp,%esi,1),%esi 35 movzbl -128(%ebp,%edi,1),%edi [all …]
|
D | co-586.S | 18 pushl %ebp 25 xorl %ebp,%ebp 32 adcl $0,%ebp 42 adcl %edx,%ebp 49 adcl %edx,%ebp 59 addl %eax,%ebp 66 addl %eax,%ebp 73 addl %eax,%ebp 78 movl %ebp,8(%eax) 82 xorl %ebp,%ebp [all …]
|
D | x86-mont.S | 14 pushl %ebp 26 leal -32(%esp,%edi,4),%ebp 28 movl %ebp,%eax 31 subl %eax,%ebp 32 xorl %ebp,%edx 35 subl %edx,%ebp 36 andl $-64,%ebp 38 subl %ebp,%eax 41 leal (%ebp,%eax,1),%esp 43 cmpl %ebp,%esp [all …]
|
/external/boringssl/linux-x86/crypto/fipsmodule/ |
D | sha1-586.S | 15 pushl %ebp 21 popl %ebp 22 leal OPENSSL_ia32cap_P-.L000pic_point(%ebp),%esi 23 leal .LK_XX_XX-.L000pic_point(%ebp),%ebp 39 movl 20(%esp),%ebp 46 movl 16(%ebp),%edi 99 movl (%ebp),%eax 100 movl 4(%ebp),%ebx 101 movl 8(%ebp),%ecx 102 movl 12(%ebp),%edx [all …]
|
D | md5-586.S | 20 pushl %ebp 34 movl (%esi),%ebp 38 leal 3614090360(%eax,%ebp,1),%eax 43 movl 4(%esi),%ebp 48 leal 3905402710(%edx,%ebp,1),%edx 53 movl 8(%esi),%ebp 58 leal 606105819(%ecx,%ebp,1),%ecx 63 movl 12(%esi),%ebp 68 leal 3250441966(%ebx,%ebp,1),%ebx 73 movl 16(%esi),%ebp [all …]
|
D | co-586.S | 19 pushl %ebp 26 xorl %ebp,%ebp 33 adcl $0,%ebp 43 adcl %edx,%ebp 50 adcl %edx,%ebp 60 addl %eax,%ebp 67 addl %eax,%ebp 74 addl %eax,%ebp 79 movl %ebp,8(%eax) 83 xorl %ebp,%ebp [all …]
|
D | aes-586.S | 22 movl -128(%ebp),%edi 23 movl -96(%ebp),%esi 24 movl -64(%ebp),%edi 25 movl -32(%ebp),%esi 26 movl (%ebp),%edi 27 movl 32(%ebp),%esi 28 movl 64(%ebp),%edi 29 movl 96(%ebp),%esi 34 movzbl -128(%ebp,%esi,1),%esi 36 movzbl -128(%ebp,%edi,1),%edi [all …]
|
D | x86-mont.S | 15 pushl %ebp 27 leal -32(%esp,%edi,4),%ebp 29 movl %ebp,%eax 32 subl %eax,%ebp 33 xorl %ebp,%edx 36 subl %edx,%ebp 37 andl $-64,%ebp 39 subl %ebp,%eax 42 leal (%ebp,%eax,1),%esp 44 cmpl %ebp,%esp [all …]
|
/external/google-breakpad/src/processor/testdata/symbols/kernel32.pdb/BCE8785C57B44245A669896B6A19B9542/ |
D | kernel32.sym | 1578 STACK WIN 4 b5ae 16 5 0 c 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T0 .c… 1579 STACK WIN 4 9b47 66 5 0 4 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T0 .c… 1581 STACK WIN 4 55709 1f7 c 0 10 8 4c 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T… 1582 STACK WIN 4 558b4 e 0 0 10 8 4c 0 1 $T0 $ebp = $T2 $esp = $T1 .raSearchStart = $eip $T1 ^ = $ebp $e… 1583 STACK WIN 4 be41 c7 c 0 4 8 3c 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T0 .… 1584 STACK WIN 4 39bc8 e 0 0 4 8 3c 0 1 $T0 $ebp = $T2 $esp = $T1 .raSearchStart = $eip $T1 ^ = $ebp $eb… 1585 STACK WIN 4 98f4 2b 5 0 8 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T0 .c… 1586 STACK WIN 4 936b 1e 6 0 4 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T0 .c… 1587 STACK WIN 4 9371 14 0 0 4 4 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T0 .c… 1588 STACK WIN 4 92b0 32 7 0 4 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T0 .c… [all …]
|
/external/boringssl/win-x86/crypto/fipsmodule/ |
D | sha1-586.asm | 28 push ebp 34 pop ebp 36 lea ebp,[(L$K_XX_XX-L$000pic_point)+ebp] 52 mov ebp,DWORD [20+esp] 59 mov edi,DWORD [16+ebp] 112 mov eax,DWORD [ebp] 113 mov ebx,DWORD [4+ebp] 114 mov ecx,DWORD [8+ebp] 115 mov edx,DWORD [12+ebp] 118 mov ebp,eax [all …]
|
D | md5-586.asm | 32 push ebp 46 mov ebp,DWORD [esi] 50 lea eax,[3614090360+ebp*1+eax] 55 mov ebp,DWORD [4+esi] 60 lea edx,[3905402710+ebp*1+edx] 65 mov ebp,DWORD [8+esi] 70 lea ecx,[606105819+ebp*1+ecx] 75 mov ebp,DWORD [12+esi] 80 lea ebx,[3250441966+ebp*1+ebx] 85 mov ebp,DWORD [16+esi] [all …]
|
D | aes-586.asm | 34 mov edi,DWORD [ebp-128] 35 mov esi,DWORD [ebp-96] 36 mov edi,DWORD [ebp-64] 37 mov esi,DWORD [ebp-32] 38 mov edi,DWORD [ebp] 39 mov esi,DWORD [32+ebp] 40 mov edi,DWORD [64+ebp] 41 mov esi,DWORD [96+ebp] 46 movzx esi,BYTE [esi*1+ebp-128] 48 movzx edi,BYTE [edi*1+ebp-128] [all …]
|
D | x86-mont.asm | 28 push ebp 40 lea ebp,[edi*4+esp-32] 42 mov eax,ebp 45 sub ebp,eax 46 xor edx,ebp 49 sub ebp,edx 50 and ebp,-64 52 sub eax,ebp 55 lea esp,[eax*1+ebp] 57 cmp esp,ebp [all …]
|
D | co-586.asm | 31 push ebp 38 xor ebp,ebp 45 adc ebp,0 55 adc ebp,edx 62 adc ebp,edx 72 add ebp,eax 79 add ebp,eax 86 add ebp,eax 91 mov DWORD [8+eax],ebp 95 xor ebp,ebp [all …]
|
/external/boringssl/linux-x86_64/crypto/fipsmodule/ |
D | sha1-x86_64.S | 71 movl 4(%r9),%ebp 75 bswapl %ebp 86 movl %ebp,4(%rsp) 110 movl 16(%r9),%ebp 114 bswapl %ebp 125 movl %ebp,16(%rsp) 149 movl 28(%r9),%ebp 153 bswapl %ebp 164 movl %ebp,28(%rsp) 188 movl 40(%r9),%ebp [all …]
|
/external/boringssl/mac-x86_64/crypto/fipsmodule/ |
D | sha1-x86_64.S | 70 movl 4(%r9),%ebp 74 bswapl %ebp 85 movl %ebp,4(%rsp) 109 movl 16(%r9),%ebp 113 bswapl %ebp 124 movl %ebp,16(%rsp) 148 movl 28(%r9),%ebp 152 bswapl %ebp 163 movl %ebp,28(%rsp) 187 movl 40(%r9),%ebp [all …]
|
/external/swiftshader/third_party/llvm-7.0/llvm/test/CodeGen/X86/ |
D | leaFixup32.mir | 16 ; where the base is rbp/r13/ebp register 21 ;test1add_ebp_32: 2 operands LEA32r where base register is ebp and can be replaced 33 ; where the base is ebp register 38 ;test1lea_ebp_32: 2 operands LEA32r wher base register is rbp/r13/ebp and can be replaced 51 ; where the base is rbp/r13/ebp register 57 ; where the base and the index are ebp register and there is offset 63 ; where the base and the index are ebp register and there is scale 89 - { reg: '$ebp' } 106 liveins: $eax, $ebp 107 ; CHECK: $eax = ADD32rr $eax, killed $ebp [all …]
|
/external/boringssl/win-x86_64/crypto/fipsmodule/ |
D | sha1-x86_64.asm | 77 mov ebp,DWORD[4+r9] 81 bswap ebp 92 mov DWORD[4+rsp],ebp 116 mov ebp,DWORD[16+r9] 120 bswap ebp 131 mov DWORD[16+rsp],ebp 155 mov ebp,DWORD[28+r9] 159 bswap ebp 170 mov DWORD[28+rsp],ebp 194 mov ebp,DWORD[40+r9] [all …]
|
/external/python/cpython3/Modules/_ctypes/libffi_osx/x86/ |
D | x86-darwin.S | 54 pushl %ebp 56 movl %esp,%ebp 60 movl 16(%ebp),%ecx 67 pushl 12(%ebp) 69 call *8(%ebp) 74 call *28(%ebp) 77 movl 16(%ebp),%ecx 81 movl 20(%ebp),%ecx 84 cmpl $0,24(%ebp) 99 movl 24(%ebp),%ecx [all …]
|
/external/python/cpython2/Modules/_ctypes/libffi_osx/x86/ |
D | x86-darwin.S | 54 pushl %ebp 56 movl %esp,%ebp 60 movl 16(%ebp),%ecx 67 pushl 12(%ebp) 69 call *8(%ebp) 74 call *28(%ebp) 77 movl 16(%ebp),%ecx 81 movl 20(%ebp),%ecx 84 cmpl $0,24(%ebp) 99 movl 24(%ebp),%ecx [all …]
|