Home
last modified time | relevance | path

Searched refs:R0 (Results 1 – 25 of 85) sorted by relevance

1234

/linux/arch/hexagon/kernel/
H A Dvm_entry.S37 memd(R0 + #_PT_R3130) = R31:30; \
38 { memw(R0 + #_PT_R2928) = R28; \
39 R31 = memw(R0 + #_PT_ER_VMPSP); }\
40 { memw(R0 + #(_PT_R2928 + 4)) = R31; \
42 { memd(R0 + #_PT_R2726) = R27:26; \
44 memd(R0 + #_PT_R2524) = R25:24; \
45 memd(R0 + #_PT_R2322) = R23:22; \
46 memd(R0 + #_PT_R2120) = R21:20; \
47 memd(R0 + #_PT_R1918) = R19:18; \
48 memd(R0 + #_PT_R1716) = R17:16; \
[all …]
H A Dvm_switch.S55 memw(R0+#_TASK_THREAD_INFO) = THREADINFO_REG;
56 memw(R0 +#(_TASK_STRUCT_THREAD + _THREAD_STRUCT_SWITCH_SP)) = R29;
/linux/lib/
H A Dtest_bpf.c39 #define R0 BPF_REG_0 macro
280 insn[1] = BPF_ALU32_IMM(BPF_MOV, R0, 0xcbababab); in bpf_fill_maxinsns9()
284 insn[i] = BPF_ALU32_IMM(BPF_MOV, R0, 0xfefefefe); in bpf_fill_maxinsns9()
311 insn[hlen] = BPF_ALU32_IMM(BPF_MOV, R0, 0xabababac); in bpf_fill_maxinsns10()
441 insn[0] = BPF_ALU32_IMM(BPF_MOV, R0, 1); in __bpf_fill_stxdw()
445 insn[i] = BPF_STX_XADD(size, R10, R0, -40); in __bpf_fill_stxdw()
447 insn[len - 2] = BPF_LDX_MEM(size, R0, R10, -40); in __bpf_fill_stxdw()
492 insns[i++] = BPF_ALU64_IMM(BPF_MOV, R0, 1); in __bpf_fill_max_jmp()
493 insns[i++] = BPF_JMP_IMM(jmp, R0, imm, S16_MAX); in __bpf_fill_max_jmp()
494 insns[i++] = BPF_ALU64_IMM(BPF_MOV, R0, 2); in __bpf_fill_max_jmp()
[all …]
/linux/arch/x86/crypto/
H A Dtwofish-x86_64-asm_64.S29 #define R0 %rax macro
226 encrypt_round(R0,R1,R2,R3,0);
227 encrypt_round(R2,R3,R0,R1,8);
228 encrypt_round(R0,R1,R2,R3,2*8);
229 encrypt_round(R2,R3,R0,R1,3*8);
230 encrypt_round(R0,R1,R2,R3,4*8);
231 encrypt_round(R2,R3,R0,R1,5*8);
232 encrypt_round(R0,R1,R2,R3,6*8);
233 encrypt_round(R2,R3,R0,R1,7*8);
234 encrypt_round(R0,R1,R2,R3,8*8);
[all …]
H A Dtwofish-i586-asm_32.S231 encrypt_round(R0,R1,R2,R3,0);
232 encrypt_round(R2,R3,R0,R1,8);
233 encrypt_round(R0,R1,R2,R3,2*8);
234 encrypt_round(R2,R3,R0,R1,3*8);
235 encrypt_round(R0,R1,R2,R3,4*8);
236 encrypt_round(R2,R3,R0,R1,5*8);
237 encrypt_round(R0,R1,R2,R3,6*8);
238 encrypt_round(R2,R3,R0,R1,7*8);
239 encrypt_round(R0,R1,R2,R3,8*8);
240 encrypt_round(R2,R3,R0,R1,9*8);
[all …]
H A Dpoly1305-x86_64-cryptogams.pl2207 my ($R0,$R1,$R2,$R3,$R4, $S1,$S2,$S3,$S4) = map("%zmm$_",(16..24));
2248 vmovdqu `16*0-64`($ctx),%x#$D0 # will become expanded ${R0}
2259 vpermd $D0,$T2,$R0 # 00003412 -> 14243444
2264 vmovdqa64 $R0,0x00(%rsp){%k2} # save in case $len%128 != 0
2265 vpsrlq \$32,$R0,$T0 # 14243444 -> 01020304
2290 vpmuludq $T0,$R0,$D0 # d0 = r0'*r0
2298 vpmuludq $T1,$R0,$M1
2313 vpmuludq $T2,$R0,$M2
2322 vpmuludq $T3,$R0,$M3
2333 vpmuludq $T4,$R0,$M4
[all …]
/linux/arch/arm/crypto/
H A Dpoly1305-armv4.pl495 my ($R0,$R1,$S1,$R2,$S2,$R3,$S3,$R4,$S4) = map("d$_",(0..9));
530 vdup.32 $R0,r2 @ r^1 in both lanes
554 vmull.u32 $D0,$R0,${R0}[1]
555 vmull.u32 $D1,$R1,${R0}[1]
556 vmull.u32 $D2,$R2,${R0}[1]
557 vmull.u32 $D3,$R3,${R0}[1]
558 vmull.u32 $D4,$R4,${R0}[1]
561 vmlal.u32 $D1,$R0,${R1}[1]
569 vmlal.u32 $D2,$R0,${R2}[1]
573 vmlal.u32 $D3,$R0,${R3}[1]
[all …]
/linux/arch/arm64/crypto/
H A Dpoly1305-armv8.pl262 my ($R0,$R1,$S1,$R2,$S2,$R3,$S3,$R4,$S4) = map("v$_.4s",(0..8));
514 ld1 {$R0,$R1,$S1,$R2},[x15],#64
578 umull $ACC0,$IN23_0,${R0}[2]
592 umlal $ACC1,$IN23_1,${R0}[2]
601 umlal $ACC2,$IN23_2,${R0}[2]
610 umlal $ACC3,$IN23_3,${R0}[2]
621 umlal $ACC4,$IN23_4,${R0}[2]
643 umlal $ACC2,$IN01_2,${R0}[0]
657 umlal $ACC0,$IN01_0,${R0}[0]
672 umlal $ACC1,$IN01_1,${R0}[0]
[all …]
/linux/arch/sh/kernel/cpu/sh3/
H A Dswsusp.S59 ! BL=0: R7->R0 is bank0
65 ! BL=1: R7->R0 is bank1
80 ! BL=0: R7->R0 is bank0
105 ! BL=0: R7->R0 is bank0
112 ! BL=1: R7->R0 is bank1
119 ! BL=0: R7->R0 is bank0
/linux/drivers/tty/serial/
H A Dpmac_zilog.c162 write_zsreg(uap, R0, RES_EXT_INT); in pmz_load_zsregs()
163 write_zsreg(uap, R0, RES_EXT_INT); in pmz_load_zsregs()
229 write_zsreg(uap, R0, ERR_RES); in pmz_receive_chars()
293 ch = read_zsreg(uap, R0); in pmz_receive_chars()
305 status = read_zsreg(uap, R0); in pmz_status_handle()
306 write_zsreg(uap, R0, RES_EXT_INT); in pmz_status_handle()
340 unsigned char status = read_zsreg(uap, R0); in pmz_transmit_chars()
407 write_zsreg(uap, R0, RES_Tx_P); in pmz_transmit_chars()
434 write_zsreg(uap_a, R0, RES_H_IUS); in pmz_interrupt()
459 write_zsreg(uap_b, R0, RES_H_IUS); in pmz_interrupt()
[all …]
/linux/Documentation/bpf/standardization/
H A Dabi.rst19 * R0: return value from function calls, and exit value for BPF programs
24 R0 - R5 are scratch registers and BPF programs needs to spill/fill them if
27 The BPF program needs to store the return value into register R0 before doing an
/linux/Documentation/virt/kvm/arm/
H A Dhypercalls.rst34 | Return Values: | (uint32) | R0 | Bitmap of available function numbers 0-31 |
66 | Return Values: | (int64) | R0 | ``INVALID_PARAMETER (-3)`` on error, else |
90 | Return Values: | (int64) | R0 | ``SUCCESS (0)`` |
115 | Return Values: | (int64) | R0 | ``SUCCESS (0)`` |
141 | Return Values: | (int64) | R0 | ``SUCCESS (0)`` |
H A Dptp_kvm.rst27 | Return Values: | (int32) | R0 | ``NOT_SUPPORTED (-1)`` on error, else |
/linux/arch/sh/math-emu/
H A Dmath.c52 #define R0 (regs->regs[0]) macro
162 MREAD(FRn, Rm + R0 + 4); in fmov_idx_reg()
164 MREAD(FRn, Rm + R0); in fmov_idx_reg()
166 MREAD(FRn, Rm + R0); in fmov_idx_reg()
212 MWRITE(FRm, Rn + R0 + 4); in fmov_reg_idx()
214 MWRITE(FRm, Rn + R0); in fmov_reg_idx()
216 MWRITE(FRm, Rn + R0); in fmov_reg_idx()
/linux/arch/powerpc/mm/nohash/
H A Dtlb_low.S219 PPC_TLBILX_ALL(0,R0)
232 PPC_TLBILX_PID(0,R0)
284 PPC_TLBILX_PID(0,R0)
296 PPC_TLBILX_PID(0,R0)
303 PPC_TLBILX_ALL(0,R0)
/linux/tools/perf/arch/arm/tests/
H A Dregs_load.S4 #define R0 0x00 macro
41 str r0, [r0, #R0]
/linux/tools/perf/arch/powerpc/tests/
H A Dregs_load.S5 #define R0 0 macro
44 std 0, R0(3)
/linux/Documentation/bpf/
H A Dlinux-notes.rst67 * Register R0 is an implicit output which contains the data fetched from
78 R0 = ntohl(*(u32 *) ((struct sk_buff *) R6->data + imm))
84 R0 = ntohl(*(u32 *) ((struct sk_buff *) R6->data + src + imm))
H A Dclassic_vs_extended.rst30 R0 - R5 are scratch registers and eBPF program needs spill/fill them if
74 After an in-kernel function call, R1 - R5 are reset to unreadable and R0 has
118 R0 - rax
141 bpf_mov R7, R0 /* save foo() return value */
148 bpf_add R0, R7
186 registers and place their return value into ``%rax`` which is R0 in eBPF.
188 interpreter. R0-R5 are scratch registers, so eBPF program needs to preserve
195 bpf_mov R0, R1
340 value into register R0 before doing a BPF_EXIT. Class 6 in eBPF is used as
H A Dverifier.rst27 bpf_mov R0 = R2
33 R0 has a return type of the function.
41 bpf_mov R0 = R6
65 bpf_ld R0 = *(u32 *)(R6 + 8)
67 intends to load a word from address R6 + 8 and store it into R0
81 bpf_ld R0 = *(u32 *)(R10 - 4)
93 After the call register R0 will be set to return type of the function.
238 R0=inv1 R1=ctx R3=pkt(id=0,off=0,r=14) R4=pkt_end R5=pkt(id=0,off=14,r=14) R10=fp
252R0=inv(id=0,umax_value=255,var_off=(0x0; 0xff)) R1=pkt_end R2=pkt(id=2,off=8,r=8) R3=pkt(id=2,off=…
641 Program that doesn't initialize R0 before exiting::
[all …]
/linux/drivers/media/i2c/
H A Dwm8739.c35 R0 = 0, R1, enumerator
114 wm8739_write(sd, R0, (vol_l & 0x1f) | mute); in wm8739_s_ctrl()
/linux/arch/arm/include/asm/vdso/
H A Dcp15.h17 "mrrc", "mcrr", __stringify(p15, Op1, %Q0, %R0, CRm), u64
/linux/arch/powerpc/lib/
H A Dldstfp.S169 1: LXVD2X(0,R0,R4)
198 STXVD2X(0,R0,R4)
/linux/tools/perf/arch/arm/util/
H A Dunwind-libdw.c20 dwarf_regs[0] = REG(R0); in libdw__arch_set_initial_registers()
/linux/Documentation/hwmon/
H A Dds1621.rst138 support, which is achieved via the R0 and R1 config register bits, where:
140 R0..R1
144 R0 R1

1234