/linux/arch/hexagon/kernel/ |
H A D | vm_entry.S | 37 memd(R0 + #_PT_R3130) = R31:30; \ 38 { memw(R0 + #_PT_R2928) = R28; \ 39 R31 = memw(R0 + #_PT_ER_VMPSP); }\ 40 { memw(R0 + #(_PT_R2928 + 4)) = R31; \ 42 { memd(R0 + #_PT_R2726) = R27:26; \ 44 memd(R0 + #_PT_R2524) = R25:24; \ 45 memd(R0 + #_PT_R2322) = R23:22; \ 46 memd(R0 + #_PT_R2120) = R21:20; \ 47 memd(R0 + #_PT_R1918) = R19:18; \ 48 memd(R0 + #_PT_R1716) = R17:16; \ [all …]
|
H A D | vm_switch.S | 55 memw(R0+#_TASK_THREAD_INFO) = THREADINFO_REG; 56 memw(R0 +#(_TASK_STRUCT_THREAD + _THREAD_STRUCT_SWITCH_SP)) = R29;
|
/linux/lib/ |
H A D | test_bpf.c | 39 #define R0 BPF_REG_0 macro 280 insn[1] = BPF_ALU32_IMM(BPF_MOV, R0, 0xcbababab); in bpf_fill_maxinsns9() 284 insn[i] = BPF_ALU32_IMM(BPF_MOV, R0, 0xfefefefe); in bpf_fill_maxinsns9() 311 insn[hlen] = BPF_ALU32_IMM(BPF_MOV, R0, 0xabababac); in bpf_fill_maxinsns10() 441 insn[0] = BPF_ALU32_IMM(BPF_MOV, R0, 1); in __bpf_fill_stxdw() 445 insn[i] = BPF_STX_XADD(size, R10, R0, -40); in __bpf_fill_stxdw() 447 insn[len - 2] = BPF_LDX_MEM(size, R0, R10, -40); in __bpf_fill_stxdw() 492 insns[i++] = BPF_ALU64_IMM(BPF_MOV, R0, 1); in __bpf_fill_max_jmp() 493 insns[i++] = BPF_JMP_IMM(jmp, R0, imm, S16_MAX); in __bpf_fill_max_jmp() 494 insns[i++] = BPF_ALU64_IMM(BPF_MOV, R0, 2); in __bpf_fill_max_jmp() [all …]
|
/linux/arch/x86/crypto/ |
H A D | twofish-x86_64-asm_64.S | 29 #define R0 %rax macro 226 encrypt_round(R0,R1,R2,R3,0); 227 encrypt_round(R2,R3,R0,R1,8); 228 encrypt_round(R0,R1,R2,R3,2*8); 229 encrypt_round(R2,R3,R0,R1,3*8); 230 encrypt_round(R0,R1,R2,R3,4*8); 231 encrypt_round(R2,R3,R0,R1,5*8); 232 encrypt_round(R0,R1,R2,R3,6*8); 233 encrypt_round(R2,R3,R0,R1,7*8); 234 encrypt_round(R0,R1,R2,R3,8*8); [all …]
|
H A D | twofish-i586-asm_32.S | 231 encrypt_round(R0,R1,R2,R3,0); 232 encrypt_round(R2,R3,R0,R1,8); 233 encrypt_round(R0,R1,R2,R3,2*8); 234 encrypt_round(R2,R3,R0,R1,3*8); 235 encrypt_round(R0,R1,R2,R3,4*8); 236 encrypt_round(R2,R3,R0,R1,5*8); 237 encrypt_round(R0,R1,R2,R3,6*8); 238 encrypt_round(R2,R3,R0,R1,7*8); 239 encrypt_round(R0,R1,R2,R3,8*8); 240 encrypt_round(R2,R3,R0,R1,9*8); [all …]
|
H A D | poly1305-x86_64-cryptogams.pl | 2207 my ($R0,$R1,$R2,$R3,$R4, $S1,$S2,$S3,$S4) = map("%zmm$_",(16..24)); 2248 vmovdqu `16*0-64`($ctx),%x#$D0 # will become expanded ${R0} 2259 vpermd $D0,$T2,$R0 # 00003412 -> 14243444 2264 vmovdqa64 $R0,0x00(%rsp){%k2} # save in case $len%128 != 0 2265 vpsrlq \$32,$R0,$T0 # 14243444 -> 01020304 2290 vpmuludq $T0,$R0,$D0 # d0 = r0'*r0 2298 vpmuludq $T1,$R0,$M1 2313 vpmuludq $T2,$R0,$M2 2322 vpmuludq $T3,$R0,$M3 2333 vpmuludq $T4,$R0,$M4 [all …]
|
/linux/arch/arm/crypto/ |
H A D | poly1305-armv4.pl | 495 my ($R0,$R1,$S1,$R2,$S2,$R3,$S3,$R4,$S4) = map("d$_",(0..9)); 530 vdup.32 $R0,r2 @ r^1 in both lanes 554 vmull.u32 $D0,$R0,${R0}[1] 555 vmull.u32 $D1,$R1,${R0}[1] 556 vmull.u32 $D2,$R2,${R0}[1] 557 vmull.u32 $D3,$R3,${R0}[1] 558 vmull.u32 $D4,$R4,${R0}[1] 561 vmlal.u32 $D1,$R0,${R1}[1] 569 vmlal.u32 $D2,$R0,${R2}[1] 573 vmlal.u32 $D3,$R0,${R3}[1] [all …]
|
/linux/arch/arm64/crypto/ |
H A D | poly1305-armv8.pl | 262 my ($R0,$R1,$S1,$R2,$S2,$R3,$S3,$R4,$S4) = map("v$_.4s",(0..8)); 514 ld1 {$R0,$R1,$S1,$R2},[x15],#64 578 umull $ACC0,$IN23_0,${R0}[2] 592 umlal $ACC1,$IN23_1,${R0}[2] 601 umlal $ACC2,$IN23_2,${R0}[2] 610 umlal $ACC3,$IN23_3,${R0}[2] 621 umlal $ACC4,$IN23_4,${R0}[2] 643 umlal $ACC2,$IN01_2,${R0}[0] 657 umlal $ACC0,$IN01_0,${R0}[0] 672 umlal $ACC1,$IN01_1,${R0}[0] [all …]
|
/linux/arch/sh/kernel/cpu/sh3/ |
H A D | swsusp.S | 59 ! BL=0: R7->R0 is bank0 65 ! BL=1: R7->R0 is bank1 80 ! BL=0: R7->R0 is bank0 105 ! BL=0: R7->R0 is bank0 112 ! BL=1: R7->R0 is bank1 119 ! BL=0: R7->R0 is bank0
|
/linux/drivers/tty/serial/ |
H A D | pmac_zilog.c | 162 write_zsreg(uap, R0, RES_EXT_INT); in pmz_load_zsregs() 163 write_zsreg(uap, R0, RES_EXT_INT); in pmz_load_zsregs() 229 write_zsreg(uap, R0, ERR_RES); in pmz_receive_chars() 293 ch = read_zsreg(uap, R0); in pmz_receive_chars() 305 status = read_zsreg(uap, R0); in pmz_status_handle() 306 write_zsreg(uap, R0, RES_EXT_INT); in pmz_status_handle() 340 unsigned char status = read_zsreg(uap, R0); in pmz_transmit_chars() 407 write_zsreg(uap, R0, RES_Tx_P); in pmz_transmit_chars() 434 write_zsreg(uap_a, R0, RES_H_IUS); in pmz_interrupt() 459 write_zsreg(uap_b, R0, RES_H_IUS); in pmz_interrupt() [all …]
|
/linux/Documentation/bpf/standardization/ |
H A D | abi.rst | 19 * R0: return value from function calls, and exit value for BPF programs 24 R0 - R5 are scratch registers and BPF programs needs to spill/fill them if 27 The BPF program needs to store the return value into register R0 before doing an
|
/linux/Documentation/virt/kvm/arm/ |
H A D | hypercalls.rst | 34 | Return Values: | (uint32) | R0 | Bitmap of available function numbers 0-31 | 66 | Return Values: | (int64) | R0 | ``INVALID_PARAMETER (-3)`` on error, else | 90 | Return Values: | (int64) | R0 | ``SUCCESS (0)`` | 115 | Return Values: | (int64) | R0 | ``SUCCESS (0)`` | 141 | Return Values: | (int64) | R0 | ``SUCCESS (0)`` |
|
H A D | ptp_kvm.rst | 27 | Return Values: | (int32) | R0 | ``NOT_SUPPORTED (-1)`` on error, else |
|
/linux/arch/sh/math-emu/ |
H A D | math.c | 52 #define R0 (regs->regs[0]) macro 162 MREAD(FRn, Rm + R0 + 4); in fmov_idx_reg() 164 MREAD(FRn, Rm + R0); in fmov_idx_reg() 166 MREAD(FRn, Rm + R0); in fmov_idx_reg() 212 MWRITE(FRm, Rn + R0 + 4); in fmov_reg_idx() 214 MWRITE(FRm, Rn + R0); in fmov_reg_idx() 216 MWRITE(FRm, Rn + R0); in fmov_reg_idx()
|
/linux/arch/powerpc/mm/nohash/ |
H A D | tlb_low.S | 219 PPC_TLBILX_ALL(0,R0) 232 PPC_TLBILX_PID(0,R0) 284 PPC_TLBILX_PID(0,R0) 296 PPC_TLBILX_PID(0,R0) 303 PPC_TLBILX_ALL(0,R0)
|
/linux/tools/perf/arch/arm/tests/ |
H A D | regs_load.S | 4 #define R0 0x00 macro 41 str r0, [r0, #R0]
|
/linux/tools/perf/arch/powerpc/tests/ |
H A D | regs_load.S | 5 #define R0 0 macro 44 std 0, R0(3)
|
/linux/Documentation/bpf/ |
H A D | linux-notes.rst | 67 * Register R0 is an implicit output which contains the data fetched from 78 R0 = ntohl(*(u32 *) ((struct sk_buff *) R6->data + imm)) 84 R0 = ntohl(*(u32 *) ((struct sk_buff *) R6->data + src + imm))
|
H A D | classic_vs_extended.rst | 30 R0 - R5 are scratch registers and eBPF program needs spill/fill them if 74 After an in-kernel function call, R1 - R5 are reset to unreadable and R0 has 118 R0 - rax 141 bpf_mov R7, R0 /* save foo() return value */ 148 bpf_add R0, R7 186 registers and place their return value into ``%rax`` which is R0 in eBPF. 188 interpreter. R0-R5 are scratch registers, so eBPF program needs to preserve 195 bpf_mov R0, R1 340 value into register R0 before doing a BPF_EXIT. Class 6 in eBPF is used as
|
H A D | verifier.rst | 27 bpf_mov R0 = R2 33 R0 has a return type of the function. 41 bpf_mov R0 = R6 65 bpf_ld R0 = *(u32 *)(R6 + 8) 67 intends to load a word from address R6 + 8 and store it into R0 81 bpf_ld R0 = *(u32 *)(R10 - 4) 93 After the call register R0 will be set to return type of the function. 238 R0=inv1 R1=ctx R3=pkt(id=0,off=0,r=14) R4=pkt_end R5=pkt(id=0,off=14,r=14) R10=fp 252 …R0=inv(id=0,umax_value=255,var_off=(0x0; 0xff)) R1=pkt_end R2=pkt(id=2,off=8,r=8) R3=pkt(id=2,off=… 641 Program that doesn't initialize R0 before exiting:: [all …]
|
/linux/drivers/media/i2c/ |
H A D | wm8739.c | 35 R0 = 0, R1, enumerator 114 wm8739_write(sd, R0, (vol_l & 0x1f) | mute); in wm8739_s_ctrl()
|
/linux/arch/arm/include/asm/vdso/ |
H A D | cp15.h | 17 "mrrc", "mcrr", __stringify(p15, Op1, %Q0, %R0, CRm), u64
|
/linux/arch/powerpc/lib/ |
H A D | ldstfp.S | 169 1: LXVD2X(0,R0,R4) 198 STXVD2X(0,R0,R4)
|
/linux/tools/perf/arch/arm/util/ |
H A D | unwind-libdw.c | 20 dwarf_regs[0] = REG(R0); in libdw__arch_set_initial_registers()
|
/linux/Documentation/hwmon/ |
H A D | ds1621.rst | 138 support, which is achieved via the R0 and R1 config register bits, where: 140 R0..R1 144 R0 R1
|