| /kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
| D | verifier_masking.c | 16 r2 -= r1; \ in test_out_of_bounds_1() 17 r2 |= r1; \ in test_out_of_bounds_1() 18 r2 = -r2; \ in test_out_of_bounds_1() 19 r2 s>>= 63; \ in test_out_of_bounds_1() 20 r1 &= r2; \ in test_out_of_bounds_1() 36 r2 -= r1; \ in test_out_of_bounds_2() 37 r2 |= r1; \ in test_out_of_bounds_2() 38 r2 = -r2; \ in test_out_of_bounds_2() 39 r2 s>>= 63; \ in test_out_of_bounds_2() 40 r1 &= r2; \ in test_out_of_bounds_2() [all …]
|
| D | verifier_helper_value_access.c | 47 r2 = r10; \ in access_to_map_full_range() 48 r2 += -8; \ in access_to_map_full_range() 50 *(u64*)(r2 + 0) = r1; \ in access_to_map_full_range() 55 r2 = %[sizeof_test_val]; \ in access_to_map_full_range() 73 r2 = r10; \ in access_to_map_partial_range() 74 r2 += -8; \ in access_to_map_partial_range() 76 *(u64*)(r2 + 0) = r1; \ in access_to_map_partial_range() 81 r2 = 8; \ in access_to_map_partial_range() 94 __failure __msg("R2 invalid zero-sized read") 98 r2 = r10; \ in access_to_map_empty_range() [all …]
|
| D | verifier_var_off.c | 22 r2 = *(u32*)(r1 + 0); \ in variable_offset_ctx_access() 24 r2 &= 4; \ in variable_offset_ctx_access() 28 r1 += r2; \ in variable_offset_ctx_access() 38 __msg_unpriv("R2 variable stack access prohibited for !root") 47 r2 = *(u32*)(r1 + 0); \ in stack_read_priv_vs_unpriv() 49 r2 &= 4; \ in stack_read_priv_vs_unpriv() 50 r2 -= 8; \ in stack_read_priv_vs_unpriv() 54 r2 += r10; \ in stack_read_priv_vs_unpriv() 56 r0 = *(u32*)(r2 + 0); \ in stack_read_priv_vs_unpriv() 65 __failure_unpriv __msg_unpriv("R2 variable stack access prohibited for !root") [all …]
|
| D | verifier_helper_access_var_len.c | 51 r2 = 16; \ in bitwise_and_jmp_correct_bounds() 52 *(u64*)(r1 - 128) = r2; \ in bitwise_and_jmp_correct_bounds() 53 r2 = *(u64*)(r1 - 128); \ in bitwise_and_jmp_correct_bounds() 54 r2 &= 64; \ in bitwise_and_jmp_correct_bounds() 56 if r4 >= r2 goto l0_%=; \ in bitwise_and_jmp_correct_bounds() 70 __msg_unpriv("invalid indirect read from stack R2 off -64+0 size 64") 84 r2 = r10; \ in stack_bitwise_and_zero_included() 85 r2 += -64; \ in stack_bitwise_and_zero_included() 107 r2 = *(u64*)(r1 + 8); \ in bitwise_and_jmp_wrong_max() 110 *(u64*)(r1 - 128) = r2; \ in bitwise_and_jmp_wrong_max() [all …]
|
| /kernel/linux/linux-5.10/arch/arm/crypto/ |
| D | sha256-core.S_shipped | 109 add r2,r1,r2,lsl#6 @ len to point at the end of inp 110 stmdb sp!,{r0,r1,r2,r4-r11,lr} 116 ldr r2,[r1],#4 118 ldrb r2,[r1,#3] 123 @ ldr r2,[r1],#4 @ 0 131 rev r2,r2 134 @ ldrb r2,[r1,#3] @ 0 138 orr r2,r2,r12,lsl#8 140 orr r2,r2,r0,lsl#16 145 orr r2,r2,r12,lsl#24 [all …]
|
| D | curve25519-core.S | 61 vld1.8 {d8}, [r2] 62 vld1.8 {d10}, [r2] 63 add r2, r2, #6 64 vld1.8 {d12}, [r2] 65 vld1.8 {d14}, [r2] 66 add r2, r2, #6 67 vld1.8 {d16}, [r2] 68 add r2, r2, #4 69 vld1.8 {d18}, [r2] 70 vld1.8 {d20}, [r2] [all …]
|
| /kernel/linux/linux-5.10/crypto/ |
| D | serpent_generic.c | 233 static noinline void __serpent_setkey_sbox(u32 r0, u32 r1, u32 r2, in __serpent_setkey_sbox() argument 237 S3(r3, r4, r0, r1, r2); store_and_load_keys(r1, r2, r4, r3, 28, 24); in __serpent_setkey_sbox() 238 S4(r1, r2, r4, r3, r0); store_and_load_keys(r2, r4, r3, r0, 24, 20); in __serpent_setkey_sbox() 239 S5(r2, r4, r3, r0, r1); store_and_load_keys(r1, r2, r4, r0, 20, 16); in __serpent_setkey_sbox() 240 S6(r1, r2, r4, r0, r3); store_and_load_keys(r4, r3, r2, r0, 16, 12); in __serpent_setkey_sbox() 241 S7(r4, r3, r2, r0, r1); store_and_load_keys(r1, r2, r0, r4, 12, 8); in __serpent_setkey_sbox() 242 S0(r1, r2, r0, r4, r3); store_and_load_keys(r0, r2, r4, r1, 8, 4); in __serpent_setkey_sbox() 243 S1(r0, r2, r4, r1, r3); store_and_load_keys(r3, r4, r1, r0, 4, 0); in __serpent_setkey_sbox() 244 S2(r3, r4, r1, r0, r2); store_and_load_keys(r2, r4, r3, r0, 0, -4); in __serpent_setkey_sbox() 245 S3(r2, r4, r3, r0, r1); store_and_load_keys(r0, r1, r4, r2, -4, -8); in __serpent_setkey_sbox() [all …]
|
| /kernel/linux/linux-6.6/crypto/ |
| D | serpent_generic.c | 228 static noinline void __serpent_setkey_sbox(u32 r0, u32 r1, u32 r2, in __serpent_setkey_sbox() argument 232 S3(r3, r4, r0, r1, r2); store_and_load_keys(r1, r2, r4, r3, 28, 24); in __serpent_setkey_sbox() 233 S4(r1, r2, r4, r3, r0); store_and_load_keys(r2, r4, r3, r0, 24, 20); in __serpent_setkey_sbox() 234 S5(r2, r4, r3, r0, r1); store_and_load_keys(r1, r2, r4, r0, 20, 16); in __serpent_setkey_sbox() 235 S6(r1, r2, r4, r0, r3); store_and_load_keys(r4, r3, r2, r0, 16, 12); in __serpent_setkey_sbox() 236 S7(r4, r3, r2, r0, r1); store_and_load_keys(r1, r2, r0, r4, 12, 8); in __serpent_setkey_sbox() 237 S0(r1, r2, r0, r4, r3); store_and_load_keys(r0, r2, r4, r1, 8, 4); in __serpent_setkey_sbox() 238 S1(r0, r2, r4, r1, r3); store_and_load_keys(r3, r4, r1, r0, 4, 0); in __serpent_setkey_sbox() 239 S2(r3, r4, r1, r0, r2); store_and_load_keys(r2, r4, r3, r0, 0, -4); in __serpent_setkey_sbox() 240 S3(r2, r4, r3, r0, r1); store_and_load_keys(r0, r1, r4, r2, -4, -8); in __serpent_setkey_sbox() [all …]
|
| /kernel/linux/linux-5.10/arch/nios2/mm/ |
| D | uaccess.c | 16 " movi r2,7\n" 18 " bge r2,r6,1f\n" 19 " xor r2,r4,r5\n" 20 " andi r2,r2,3\n" 22 " beq r2,zero,4f\n" 24 " movi r2,-1\n" 25 " beq r6,r2,3f\n" 26 " mov r7,r2\n" 27 "2: ldbu r2,0(r5)\n" 30 " stb r2,0(r3)\n" [all …]
|
| /kernel/linux/linux-6.6/arch/nios2/mm/ |
| D | uaccess.c | 16 " movi r2,7\n" 18 " bge r2,r6,1f\n" 19 " xor r2,r4,r5\n" 20 " andi r2,r2,3\n" 22 " beq r2,zero,4f\n" 24 " movi r2,-1\n" 25 " beq r6,r2,3f\n" 26 " mov r7,r2\n" 27 "2: ldbu r2,0(r5)\n" 30 " stb r2,0(r3)\n" [all …]
|
| /kernel/linux/linux-5.10/arch/arm/lib/ |
| D | findbit.S | 24 mov r2, #0 26 ARM( ldrb r3, [r0, r2, lsr #3] ) 27 THUMB( lsr r3, r2, #3 ) 31 add r2, r2, #8 @ next bit pointer 32 2: cmp r2, r1 @ any more? 43 cmp r2, r1 45 ands ip, r2, #7 47 ARM( ldrb r3, [r0, r2, lsr #3] ) 48 THUMB( lsr r3, r2, #3 ) 53 orr r2, r2, #7 @ if zero, then no bits here [all …]
|
| /kernel/linux/linux-6.6/arch/arc/lib/ |
| D | strchr-700.S | 16 bmsk r2,r0,1 19 breq.d r2,r0,.Laligned 21 sub_s r0,r0,r2 22 asl r7,r2,3 23 ld_s r2,[r0] 31 sub r12,r2,r7 32 bic_s r12,r12,r2 35 xor r6,r2,r5 36 ld.a r2,[r0,4] 47 bic r2,r7,r6 [all …]
|
| D | strcmp.S | 16 or r2,r0,r1 17 bmsk_s r2,r2,1 18 brne r2,0,.Lcharloop 22 ld.ab r2,[r0,4] 25 sub r4,r2,r12 26 bic r4,r4,r2 29 breq r2,r3,.Lwordloop 31 xor r0,r2,r3 ; mask for difference 36 and_s r2,r2,r0 39 cmp_s r2,r3 [all …]
|
| /kernel/linux/linux-5.10/arch/arc/lib/ |
| D | strchr-700.S | 16 bmsk r2,r0,1 19 breq.d r2,r0,.Laligned 21 sub_s r0,r0,r2 22 asl r7,r2,3 23 ld_s r2,[r0] 31 sub r12,r2,r7 32 bic_s r12,r12,r2 35 xor r6,r2,r5 36 ld.a r2,[r0,4] 47 bic r2,r7,r6 [all …]
|
| D | strcmp.S | 16 or r2,r0,r1 17 bmsk_s r2,r2,1 18 brne r2,0,.Lcharloop 22 ld.ab r2,[r0,4] 25 sub r4,r2,r12 26 bic r4,r4,r2 29 breq r2,r3,.Lwordloop 31 xor r0,r2,r3 ; mask for difference 36 and_s r2,r2,r0 39 cmp_s r2,r3 [all …]
|
| /kernel/linux/linux-5.10/arch/sh/lib/ |
| D | __clear_user.S | 22 mov r4, r2 27 add #31, r2 28 and r1, r2 29 cmp/eq r4, r2 31 mov r2, r3 34 mov r4, r2 37 0: mov.b r0, @r2 39 add #1, r2 42 mov r2, r4 47 cmp/hi r2, r3 [all …]
|
| /kernel/linux/linux-6.6/arch/sh/lib/ |
| D | __clear_user.S | 22 mov r4, r2 27 add #31, r2 28 and r1, r2 29 cmp/eq r4, r2 31 mov r2, r3 34 mov r4, r2 37 0: mov.b r0, @r2 39 add #1, r2 42 mov r2, r4 47 cmp/hi r2, r3 [all …]
|
| /kernel/linux/linux-6.6/arch/sh/kernel/cpu/sh2/ |
| D | entry.S | 43 mov.l r2,@-sp 46 mov.l $cpu_mode,r2 52 add r3,r2 54 mov.l @r2,r0 62 mov.l r0,@r2 ! enter kernel mode 63 mov.l $current_thread_info,r2 69 add r0,r2 71 mov.l @r2,r2 74 add r2,r0 75 mov r15,r2 ! r2 = user stack top [all …]
|
| /kernel/linux/linux-5.10/arch/sh/kernel/cpu/sh2/ |
| D | entry.S | 43 mov.l r2,@-sp 46 mov.l $cpu_mode,r2 52 add r3,r2 54 mov.l @r2,r0 62 mov.l r0,@r2 ! enter kernel mode 63 mov.l $current_thread_info,r2 69 add r0,r2 71 mov.l @r2,r2 74 add r2,r0 75 mov r15,r2 ! r2 = user stack top [all …]
|
| /kernel/linux/linux-6.6/arch/arm/crypto/ |
| D | curve25519-core.S | 61 vld1.8 {d8}, [r2] 62 vld1.8 {d10}, [r2] 63 add r2, r2, #6 64 vld1.8 {d12}, [r2] 65 vld1.8 {d14}, [r2] 66 add r2, r2, #6 67 vld1.8 {d16}, [r2] 68 add r2, r2, #4 69 vld1.8 {d18}, [r2] 70 vld1.8 {d20}, [r2] [all …]
|
| /kernel/linux/linux-5.10/drivers/memory/ |
| D | ti-emif-sram-pm.S | 54 ldr r2, [r4, #EMIF_PM_REGS_VIRT_OFFSET] 58 str r1, [r2, #EMIF_SDCFG_VAL_OFFSET] 61 str r1, [r2, #EMIF_REF_CTRL_VAL_OFFSET] 64 str r1, [r2, #EMIF_TIMING1_VAL_OFFSET] 67 str r1, [r2, #EMIF_TIMING2_VAL_OFFSET] 70 str r1, [r2, #EMIF_TIMING3_VAL_OFFSET] 73 str r1, [r2, #EMIF_PMCR_VAL_OFFSET] 76 str r1, [r2, #EMIF_PMCR_SHDW_VAL_OFFSET] 79 str r1, [r2, #EMIF_ZQCFG_VAL_OFFSET] 82 str r1, [r2, #EMIF_DDR_PHY_CTLR_1_OFFSET] [all …]
|
| /kernel/linux/linux-6.6/drivers/memory/ |
| D | ti-emif-sram-pm.S | 47 ldr r2, [r4, #EMIF_PM_REGS_VIRT_OFFSET] 51 str r1, [r2, #EMIF_SDCFG_VAL_OFFSET] 54 str r1, [r2, #EMIF_REF_CTRL_VAL_OFFSET] 57 str r1, [r2, #EMIF_TIMING1_VAL_OFFSET] 60 str r1, [r2, #EMIF_TIMING2_VAL_OFFSET] 63 str r1, [r2, #EMIF_TIMING3_VAL_OFFSET] 66 str r1, [r2, #EMIF_PMCR_VAL_OFFSET] 69 str r1, [r2, #EMIF_PMCR_SHDW_VAL_OFFSET] 72 str r1, [r2, #EMIF_ZQCFG_VAL_OFFSET] 75 str r1, [r2, #EMIF_DDR_PHY_CTLR_1_OFFSET] [all …]
|
| /kernel/liteos_a/lib/libc/musl/src/arch/arm/ |
| D | memset.S | 48 @ r2 = count 53 cmp r2, #0 62 cmp r2, r3 63 movlo r3, r2 64 sub r2, r2, r3 77 cmp r2, #64 80 sub r2, r2, #64 83 subs r2, r2, #64 90 add r2, r2, #64 92 cmp r2, #0 [all …]
|
| /kernel/linux/linux-5.10/include/media/ |
| D | v4l2-rect.h | 73 * v4l2_rect_same_size() - return true if r1 has the same size as r2 75 * @r2: rectangle. 80 const struct v4l2_rect *r2) in v4l2_rect_same_size() argument 82 return r1->width == r2->width && r1->height == r2->height; in v4l2_rect_same_size() 86 * v4l2_rect_same_position() - return true if r1 has the same position as r2 88 * @r2: rectangle. 93 const struct v4l2_rect *r2) in v4l2_rect_same_position() argument 95 return r1->top == r2->top && r1->left == r2->left; in v4l2_rect_same_position() 99 * v4l2_rect_equal() - return true if r1 equals r2 101 * @r2: rectangle. [all …]
|
| /kernel/linux/linux-6.6/include/media/ |
| D | v4l2-rect.h | 73 * v4l2_rect_same_size() - return true if r1 has the same size as r2 75 * @r2: rectangle. 80 const struct v4l2_rect *r2) in v4l2_rect_same_size() argument 82 return r1->width == r2->width && r1->height == r2->height; in v4l2_rect_same_size() 86 * v4l2_rect_same_position() - return true if r1 has the same position as r2 88 * @r2: rectangle. 93 const struct v4l2_rect *r2) in v4l2_rect_same_position() argument 95 return r1->top == r2->top && r1->left == r2->left; in v4l2_rect_same_position() 99 * v4l2_rect_equal() - return true if r1 equals r2 101 * @r2: rectangle. [all …]
|