/arch/arm64/crypto/ |
D | sm4-ce-asm.h | 110 #define SM4_CRYPT_BLK8_BE(b0, b1, b2, b3, b4, b5, b6, b7) \ argument 117 sm4e b6.4s, v24.4s; \ 125 sm4e b6.4s, v25.4s; \ 133 sm4e b6.4s, v26.4s; \ 141 sm4e b6.4s, v27.4s; \ 149 sm4e b6.4s, v28.4s; \ 157 sm4e b6.4s, v29.4s; \ 165 sm4e b6.4s, v30.4s; \ 173 sm4e b6.4s, v31.4s; \ 181 rev64 b6.4s, b6.4s; \ [all …]
|
D | aes-neonbs-core.S | 26 .macro in_bs_ch, b0, b1, b2, b3, b4, b5, b6, b7 28 eor \b5, \b5, \b6 30 eor \b6, \b6, \b2 32 eor \b6, \b6, \b3 42 .macro out_bs_ch, b0, b1, b2, b3, b4, b5, b6, b7 43 eor \b0, \b0, \b6 45 eor \b4, \b4, \b6 47 eor \b6, \b6, \b1 56 .macro inv_in_bs_ch, b6, b1, b2, b4, b7, b0, b3, b5 63 eor \b6, \b6, \b1 [all …]
|
D | sm4-neon-core.S | 220 #define SM4_CRYPT_BLK8_norotate(b0, b1, b2, b3, b4, b5, b6, b7) \ argument 227 rev32 b6.16b, b6.16b; \ 235 ROUND8(0, b0, b1, b2, b3, b4, b5, b6, b7); \ 236 ROUND8(1, b1, b2, b3, b0, b5, b6, b7, b4); \ 237 ROUND8(2, b2, b3, b0, b1, b6, b7, b4, b5); \ 238 ROUND8(3, b3, b0, b1, b2, b7, b4, b5, b6); \ 248 rev32 b6.16b, b6.16b; \ 254 #define SM4_CRYPT_BLK8(b0, b1, b2, b3, b4, b5, b6, b7) \ argument 255 SM4_CRYPT_BLK8_norotate(b0, b1, b2, b3, b4, b5, b6, b7); \ 256 rotate_clockwise_4x4_2x(b0, b1, b2, b3, b4, b5, b6, b7); \
|
/arch/arm/crypto/ |
D | aes-neonbs-core.S | 80 .macro in_bs_ch, b0, b1, b2, b3, b4, b5, b6, b7 82 veor \b5, \b5, \b6 84 veor \b6, \b6, \b2 86 veor \b6, \b6, \b3 96 .macro out_bs_ch, b0, b1, b2, b3, b4, b5, b6, b7 97 veor \b0, \b0, \b6 99 veor \b4, \b4, \b6 101 veor \b6, \b6, \b1 110 .macro inv_in_bs_ch, b6, b1, b2, b4, b7, b0, b3, b5 117 veor \b6, \b6, \b1 [all …]
|
/arch/ia64/kernel/ |
D | fsys.S | 54 .altrp b6 63 .altrp b6 96 .altrp b6 143 .altrp b6 318 .altrp b6 334 .altrp b6 387 .altrp b6 408 .altrp b6 501 mov r19=b6 // I0 save b6 (2 cyc) 505 mov b6=r18 // I0 copy syscall entry-point to b6 (7 cyc) [all …]
|
D | mca_drv_asm.S | 41 mov b6=loc1 49 br.call.sptk.many rp=b6 // does not return ...
|
D | efi_stub.S | 63 mov b6=r2 76 br.call.sptk.many rp=b6 // call the EFI function
|
D | esi_stub.S | 81 mov b6=r2 87 br.call.sptk.many rp=b6 // call the ESI function
|
D | gate.S | 41 .altrp b6 50 br.ret.sptk.many b6 154 mov b6=r10 164 br.call.sptk.many rp=b6 // call the signal handler 316 .altrp b6
|
D | ivt.S | 738 mov r19=b6 // I0 (2 cyc) 791 mov b6=r30 // I0 setup syscall handler branch reg early 809 mov b6=r30 // I0 setup syscall handler branch reg early 859 (p14) br.call.sptk.many b6=b6 // B invoke syscall-handker (ignore return addr) 944 # error This code assumes that b6 is the first field in pt_regs. 1536 br.call.sptk.many b6=ia64_do_page_fault // ignore return address 1562 br.call.sptk.many b6=ia64_bad_break // avoid WAW on CFM and ignore return addr 1585 br.call.sptk.many b6=ia64_handle_irq 1646 br.call.sptk.many b6=ia64_fault 1683 mov b6=r8 [all …]
|
D | entry.S | 508 mov b6=r20 509 br.call.sptk.many rp=b6 // do the syscall 564 mov b6 = r14 567 br.call.sptk.many rp=b6 // fn(arg) 767 mov b6=r18 // I0 restore b6 879 mov b6=r28 1302 mov b6=loc2 1307 br.call.sptk.many rp=b6 // invoke the callback function 1361 mov b6 = r3 1363 br.call.sptk.many b0 = b6 [all …]
|
D | relocate_kernel.S | 57 mov b6=in1 171 br.call.sptk.many b0=b6;; 235 mov r4=b6
|
D | brl_emu.c | 148 regs->b6 = next_ip; in ia64_emulate_brl()
|
D | kprobes.c | 631 if ((regs->b6 == bundle_addr) || in resume_execution() 632 (regs->b6 == bundle_addr + 0x10)) { in resume_execution() 633 regs->b6 = (regs->b6 - bundle_addr) + in resume_execution()
|
D | signal.c | 63 err |= __get_user(scr->pt.b6, &sc->sc_br[6]); /* b6 */ in restore_sigcontext() 197 err |= __put_user(scr->pt.b6, &sc->sc_br[6]); /* b6 */ in setup_sigcontext()
|
D | minstate.h | 176 mov r18=b6; \
|
D | process.c | 116 printk("b0 : %016lx b6 : %016lx b7 : %016lx\n", regs->b0, regs->b6, regs->b7); in show_regs()
|
D | ptrace.c | 863 retval |= __put_user(pt->b6, &ppr->br[6]); in ptrace_getregs() 999 retval |= __get_user(pt->b6, &ppr->br[6]); in ptrace_setregs() 1274 ptr = &pt->b6; in access_elf_breg()
|
/arch/ia64/include/asm/ |
D | asmmacro.h | 101 br.ret.sptk.many b6;; \ 104 # define FSYS_RETURN br.ret.sptk.many b6
|
/arch/powerpc/crypto/ |
D | aes-tab-4k.S | 76 .long R(79, b1, b1, c8), R(b6, 5b, 5b, ed) 93 .long R(63, bc, bc, df), R(77, b6, b6, c1) 149 .long R(2d, 9b, 9b, b6), R(3c, 1e, 1e, 22) 182 .long R(be, e1, 4f, b6), R(f0, 88, ad, 17) 227 .long R(2d, b6, a8, b9), R(14, 1e, a9, c8) 233 .long R(b6, ed, fc, 68), R(b8, e4, f1, 63) 290 .long R(7b, cb, 84, 61), R(d5, 32, b6, 70)
|
/arch/ia64/include/uapi/asm/ |
D | ptrace.h | 78 unsigned long b6; /* scratch */ member
|
/arch/ia64/lib/ |
D | memcpy.S | 255 mov b6=t4 256 br.sptk.few b6
|
D | memcpy_mck.S | 347 mov b6=r29 // jmp_table thread 349 br.cond.sptk.few b6
|
/arch/x86/kernel/ |
D | uprobes.c | 46 #define W(row, b0, b1, b2, b3, b4, b5, b6, b7, b8, b9, ba, bb, bc, bd, be, bf)\ argument 48 (b4##UL << 0x4)|(b5##UL << 0x5)|(b6##UL << 0x6)|(b7##UL << 0x7) | \
|
/arch/x86/kernel/kprobes/ |
D | core.c | 64 #define W(row, b0, b1, b2, b3, b4, b5, b6, b7, b8, b9, ba, bb, bc, bd, be, bf)\ argument 66 (b4##UL << 0x4)|(b5##UL << 0x5)|(b6##UL << 0x6)|(b7##UL << 0x7) | \
|