Home
last modified time | relevance | path

Searched +full:8 +full:a (Results 1 – 25 of 2461) sorted by relevance

12345678910>>...99

/linux-6.12.1/arch/x86/crypto/
Dtwofish-x86_64-asm_64.S15 #define c_offset 8
24 #define w 4096 /* 8 whitening keys (word) */
27 /* define a few register aliases to allow macro substitution */
60 * a input register containing a (rotated 16)
64 * operations on a and b are interleaved to increase performance
66 #define encrypt_round(a,b,c,d,round)\ argument
69 movzx a ## B, %edi;\
74 movzx a ## H, %edi;\
75 ror $16, a ## D;\
79 movzx a ## B, %edi;\
[all …]
Dtwofish-i586-asm_32.S16 #define out_blk 8 /* output byte array address parameter*/
21 #define c_offset 8
30 #define w 4096 /* 8 whitening keys (word) */
33 /* define a few register aliases to allow macro substitution */
61 * a input register containing a (rotated 16)
65 * operations on a and b are interleaved to increase performance
67 #define encrypt_round(a,b,c,d,round)\ argument
71 movzx a ## B, %edi;\
76 movzx a ## H, %edi;\
77 ror $16, a ## D;\
[all …]
Daes-gcm-aesni-x86_64.S14 // Licensed under the Apache License 2.0 (the "License"). You may obtain a copy
39 // IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
81 // do an 8-register wide loop. Considering that and the fact that we have
96 // As a rough approximation, we can assume that Karatsuba multiplication is
98 // 0.25 pxors are cheaper than a pclmulqdq. (We assume that the 64-bit
114 // An additional 0.25 pclmulqdq per block (2 per 8 blocks) could be
115 // saved by using a multiplication-less reduction method. We don't do that
116 // because it would require a large number of shift and xor instructions,
119 // It does make sense to sometimes use a different reduction optimization
120 // that saves a pclmulqdq, though: precompute the hash key times x^64, and
[all …]
/linux-6.12.1/Documentation/userspace-api/media/v4l/
Dmetafmt-generic.rst17 .. _v4l2-meta-fmt-generic-8:
22 The V4L2_META_FMT_GENERIC_8 format is a plain 8-bit metadata format. This format
23 is used on CSI-2 for 8 bits per :term:`Data Unit`.
30 Each cell is one byte. "M" denotes a byte of metadata.
37 :widths: 12 8 8 8 8
55 V4L2_META_FMT_GENERIC_CSI2_10 contains 8-bit generic metadata packed in 10-bit
57 format is typically used by CSI-2 receivers with a source that transmits
72 Each cell is one byte. "M" denotes a byte of metadata and "x" a byte of padding.
74 .. tabularcolumns:: |p{2.4cm}|p{1.2cm}|p{1.2cm}|p{1.2cm}|p{1.2cm}|p{.8cm}|
79 :widths: 12 8 8 8 8 8
[all …]
/linux-6.12.1/fs/reiserfs/
Dhashes.c3 * Keyed 32-bit hash function using TEA in a Davis-Meyer function
23 /* a, b, c, d - data; h0, h1 - accumulated hash */
36 b0 += ((b1 << 4)+a) ^ (b1+sum) ^ ((b1 >> 5)+b); \
49 u32 a, b, c, d; in keyed_hash() local
55 pad = (u32) len | ((u32) len << 8); in keyed_hash()
59 a = (u32) msg[0] | in keyed_hash()
60 (u32) msg[1] << 8 | (u32) msg[2] << 16 | (u32) msg[3] << 24; in keyed_hash()
62 (u32) msg[5] << 8 | (u32) msg[6] << 16 | (u32) msg[7] << 24; in keyed_hash()
63 c = (u32) msg[8] | in keyed_hash()
64 (u32) msg[9] << 8 | in keyed_hash()
[all …]
/linux-6.12.1/include/uapi/drm/
Ddrm_fourcc.h4 * Permission is hereby granted, free of charge, to any person obtaining a
17 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
38 * fourcc code, a Format Modifier may optionally be provided, in order to
44 * Format modifiers are used in conjunction with a fourcc code, forming a
56 * vendor-namespaced, and as such the relationship between a fourcc code and a
61 * Modifiers must uniquely encode buffer layout. In other words, a buffer must
62 * match only a single modifier. A modifier must not be a subset of layouts of
64 * a modifier: a buffer may match a 64-pixel aligned modifier and a 32-pixel
69 * a canonical pair needs to be defined and used by all drivers. Preferred
105 #define fourcc_code(a, b, c, d) ((__u32)(a) | ((__u32)(b) << 8) | \ argument
[all …]
/linux-6.12.1/Documentation/gpu/
Dafbc.rst7 AFBC is a proprietary lossless image compression protocol and format.
21 AFBC streams can contain several components - where a component
22 corresponds to a color channel (i.e. R, G, B, X, A, Y, Cb, Cr).
42 * Component 0: R(8)
43 * Component 1: G(8)
44 * Component 2: B(8)
45 * Component 3: A(8)
49 * Component 0: R(8)
50 * Component 1: G(8)
51 * Component 2: B(8)
[all …]
/linux-6.12.1/Documentation/bpf/
Dverifier.rst16 At the start of the program the register R1 contains a pointer to context
33 R0 has a return type of the function.
44 is a correct program. If there was R1 instead of R6, it would have
56 will be rejected, since R1 doesn't have a valid pointer type at the time of
59 At the start R1 type is PTR_TO_CTX (a pointer to generic ``struct bpf_context``)
60 A callback is used to customize verifier to restrict eBPF program access to only
65 bpf_ld R0 = *(u32 *)(R6 + 8)
67 intends to load a word from address R6 + 8 and store it into R0
69 that offset 8 of size 4 bytes can be accessed for reading, otherwise
72 stack bounds, which are [-MAX_BPF_STACK, 0). In this example offset is 8,
[all …]
/linux-6.12.1/lib/842/
D842.h12 * template operation. For normal operations, each arg is either a specific
14 * to a previously-written number of data bytes to copy to the output buffer.
16 * The template code is a 5-bit value. This code indicates what to do with
20 * an arg following the template code bits. Each action is either a "data"
21 * type action, or a "index" type action, and each action results in 2, 4, or 8
23 * in the table row) will add up to 8 bytes being written to the output buffer.
28 * corresponding arg is 2, 4, or 8 bytes, respectively, in the compressed data
32 * corresponding arg is an index parameter that points to, respectively, a 2,
33 * 4, or 8 byte value already in the output buffer, that should be copied to
34 * the end of the output buffer. Essentially, the index points to a position
[all …]
/linux-6.12.1/Documentation/admin-guide/device-mapper/
Ddm-service-time.rst5 dm-service-time is a path selector module for device-mapper targets,
6 which selects a path with the shortest estimated service time for
10 of in-flight I/Os on a path with the performance value of the path.
11 The performance value is a relative throughput value among all paths
12 in a path-group, and it can be specified as a table argument.
30 other paths having a positive value are available.
36 'A' if the path is active, 'F' if the path is failed.
51 Basically, dm-service-time selects a path having minimum service time
82 # echo "0 10 multipath 0 0 1 1 service-time 0 2 2 8:0 128 1 8:16 128 4" \
86 test: 0 10 multipath 0 0 1 1 service-time 0 2 2 8:0 128 1 8:16 128 4
[all …]
/linux-6.12.1/Documentation/admin-guide/media/
Ddvb_intro.rst17 video) is an analogue encoding of a sequence of image frames (25 frames
20 Analogue TV card for a PC has the following purpose:
22 * Tune the receiver to receive a broadcast signal
29 some countries employ a digital audio signal
37 circuitry on the card and is often presented uncompressed. For a PAL TV
38 signal encoded at a resolution of 768x576 24-bit color pixels over 25
39 frames per second - a fair amount of data is generated and must be
46 The purpose of a simple budget digital TV card (DVB-T,C or S) is to
49 * Tune the received to receive a broadcast signal. * Extract the encoded
55 digital TV card spits out a compressed encoded digital datastream. As
[all …]
/linux-6.12.1/arch/powerpc/kernel/
Didle_book3s.S26 * An EC=0 type wakeup will return with a value of 0. SRESET wakeup (which can
44 * A wakeup without GPR loss may alteratively be handled as in
56 * Use the stack red zone rather than a new frame for saving regs since
60 std r2,-8*1(r1)
61 std r14,-8*2(r1)
62 std r15,-8*3(r1)
63 std r16,-8*4(r1)
64 std r17,-8*5(r1)
65 std r18,-8*6(r1)
66 std r19,-8*7(r1)
[all …]
/linux-6.12.1/drivers/gpu/drm/ci/xfails/
Dvkms-none-skips.txt11a 01 00 00 8b 42 30 2b 42 28 41 39 c5 0f 8c 6f 01 00 00 49 83 c7 01 49 39 df 74 3b 4b 8b 34 fc 48
45a 01 00 00 8b 42 30 2b 42 28 41 39 c5 0f 8c 6f 01 00 00 49 83 c7 01 49 39 df 74 3b 4b 8b 34 fc 48
62a 01 00 00 8b 42 30 2b 42 28 41 39 c5 0f 8c 6f 01 00 00 49 83 c7 01 49 39 df 74 3b 4b 8b 34 fc 48
96a 01 00 00 8b 42 30 2b 42 28 41 39 c5 0f 8c 6f 01 00 00 49 83 c7 01 49 39 df 74 3b 4b 8b 34 fc 48
113a 34 0f 8e 91 fe ff ff 44 89 ea 48 8d 7c 24 48 e8 71 f0 ff ff 4b 8b 04 fc 48 8b 4c 24 50 48 8b 7c …
147a 34 0f 8e 91 fe ff ff 44 89 ea 48 8d 7c 24 48 e8 71 f0 ff ff 4b 8b 04 fc 48 8b 4c 24 50 48 8b 7c …
164a 34 0f 8e 91 fe ff ff 44 89 ea 48 8d 7c 24 48 e8 71 f0 ff ff 4b 8b 04 fc 48 8b 4c 24 50 48 8b 7c …
200a 34 0f 8e 91 fe ff ff 44 89 ea 48 8d 7c 24 48 e8 71 f0 ff ff 4b 8b 04 fc 48 8b 4c 24 50 48 8b 7c …
/linux-6.12.1/Documentation/userspace-api/media/rc/
Drc-protos.rst9 IR is encoded as a series of pulses and spaces, using a protocol. These
10 protocols can encode e.g. an address (which device should respond) and a
12 across different devices for a given protocol.
14 Therefore out the output of the IR decoder is a scancode; a single u32
17 Other things can be encoded too. Some IR protocols encode a toggle bit; this
22 Some remotes have a pointer-type device which can used to control the
32 This IR protocol uses manchester encoding to encode 14 bits. There is a
67 - 8 to 13
77 There is a variant of rc5 called either rc5x or extended rc5
130 This rc-5 extended to encoded 20 bits. The is a 3555 microseconds space
[all …]
/linux-6.12.1/kernel/irq/
Dtimings.c40 * Currently, the interrupt timings are stored in a circular array
41 * buffer every time there is an interrupt, as a tuple: the interrupt
45 * For every interrupt occurring in a short period of time, we can
47 * interrupt and we end up with a suite of intervals. The experience
48 * showed the interrupts are often coming following a periodic
52 * in a fastest way and use its period to predict the next irq event.
69 * Suffix array is an array of all the suffixes of a string. It is
70 * widely used as a data structure for compression, text search, ...
72 * 'anana' 'nana' 'ana' 'na' 'a'
77 * search by a max period and min period.
[all …]
/linux-6.12.1/arch/arm64/lib/
Dkasan_sw_tags.S10 * Report a tag mismatch detected by tag-based KASAN.
12 * A compiler-generated thunk calls this with a non-AAPCS calling
22 * The caller has decremented the SP by 256 bytes, and created a
30 * Note that this is not a struct pt_regs.
32 * To call a regular AAPCS function we must save x2 to x15 (which we can
33 * store in the gaps), and create a frame record (for which we can use
43 stp x2, x3, [sp, #8 * 2]
44 stp x4, x5, [sp, #8 * 4]
45 stp x6, x7, [sp, #8 * 6]
46 stp x8, x9, [sp, #8 * 8]
[all …]
Dstrncmp.S14 * ARMv8-a, AArch64.
71 (=> (X - 1) & ~(X | 0x7f)) is non-zero iff a byte is zero, and
75 ldr data1, [src1], #8
76 ldr data2, [src2], #8
78 subs limit, limit, #8
91 add limit, limit, 8 /* Rewind limit to before last subs. */
103 perform a signed 32-bit subtraction. */
109 /* Not reached the limit, must have found the end or a diff. */
111 add tmp1, limit, 8
136 /* Re-compute the NUL-byte detection, using a byte-reversed value. */
[all …]
/linux-6.12.1/net/ceph/
Dceph_hash.c10 #define mix(a, b, c) \ argument
12 a = a - b; a = a - c; a = a ^ (c >> 13); \
13 b = b - c; b = b - a; b = b ^ (a << 8); \
14 c = c - a; c = c - b; c = c ^ (b >> 13); \
15 a = a - b; a = a - c; a = a ^ (c >> 12); \
16 b = b - c; b = b - a; b = b ^ (a << 16); \
17 c = c - a; c = c - b; c = c ^ (b >> 5); \
18 a = a - b; a = a - c; a = a ^ (c >> 3); \
19 b = b - c; b = b - a; b = b ^ (a << 10); \
20 c = c - a; c = c - b; c = c ^ (b >> 15); \
[all …]
/linux-6.12.1/drivers/ras/amd/atl/
Dreg_fields.h17 * a) "x" is the first major revision where the new field appears.
31 * DF2 BlockFabricId [19:8]
32 * DF3 BlockFabricId [19:8]
33 * DF3p5 BlockFabricId [19:8]
34 * DF4 BlockFabricId [19:8]
35 * DF4p5 BlockFabricId [15:8]
37 #define DF2_COH_ST_FABRIC_ID GENMASK(19, 8)
38 #define DF4p5_COH_ST_FABRIC_ID GENMASK(15, 8)
48 * DF2 N/A
97 * DF2 DieIdMask [15:8]
[all …]
/linux-6.12.1/arch/powerpc/crypto/
Daes-tab-4k.S10 * crypto/aes_generic.c and are designed to be simply accessed by a combination
11 * of rlwimi/lwz instructions with a minimum of table registers (usually only
18 * the generic tables they have been reduced from 16KB to 8KB + 256 bytes.
19 * This is a quite good tradeoff for low power devices (e.g. routers) without
25 #define R(a, b, c, d) \ argument
26 0x##a##b##c##d, 0x##d##a##b##c, 0x##c##d##a##b, 0x##b##c##d##a
34 .long R(ee, 77, 77, 99), R(f6, 7b, 7b, 8d)
40 .long R(4d, ab, ab, e6), R(ec, 76, 76, 9a)
41 .long R(8f, ca, ca, 45), R(1f, 82, 82, 9d)
44 .long R(8e, 47, 47, c9), R(fb, f0, f0, 0b)
[all …]
/linux-6.12.1/include/uapi/linux/
Dvideodev2.h14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
36 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
74 #define VIDEO_MAX_PLANES 8
77 * M I S C E L L A N E O U S
81 #define v4l2_fourcc(a, b, c, d)\ argument
82 ((__u32)(a) | ((__u32)(b) << 8) | ((__u32)(c) << 16) | ((__u32)(d) << 24))
83 #define v4l2_fourcc_be(a, b, c, d) (v4l2_fourcc(a, b, c, d) | (1U << 31)) argument
102 V4L2_FIELD_INTERLACED_TB = 8, /* both fields interlaced, top field
149 V4L2_BUF_TYPE_VIDEO_OUTPUT_OVERLAY = 8,
213 * based on a misunderstanding of the bt878 datasheet.
[all …]
/linux-6.12.1/Documentation/driver-api/early-userspace/
Dbuffer-format.rst14 expanded into a ramfs filesystem; this document details the format of
20 initramfs buffer is thus a single .cpio.gz file.
42 In human terms, the initramfs buffer contains a collection of
59 c_ino 8 bytes File inode number
60 c_mode 8 bytes File mode and permissions
61 c_uid 8 bytes File uid
62 c_gid 8 bytes File gid
63 c_nlink 8 bytes Number of links
64 c_mtime 8 bytes Modification time
65 c_filesize 8 bytes Size of data field
[all …]
/linux-6.12.1/tools/testing/selftests/bpf/progs/
Dverifier_array_access.c39 __description("valid map access into an array with a constant")
46 *(u64*)(r10 - 8) = r1; \ in an_array_with_a_constant_1()
48 r2 += -8; \ in an_array_with_a_constant_1()
63 __description("valid map access into an array with a register")
70 *(u64*)(r10 - 8) = r1; \ in __flag()
72 r2 += -8; \ in __flag()
90 __description("valid map access into an array with a variable")
97 *(u64*)(r10 - 8) = r1; \ in __flag()
99 r2 += -8; \ in __flag()
119 __description("valid map access into an array with a signed variable")
[all …]
/linux-6.12.1/Documentation/filesystems/ext4/
Ddirectory.rst6 In an ext4 filesystem, a directory is more or less a flat file that maps
12 associated with a directory file for the particular directory entry that
19 array. I write “almost” because it's not a linear array in the memory
21 Therefore, it is more accurate to say that a directory is a series of
22 data blocks and that each block contains a linear array of directory
24 end of the block; the last entry in the block has a record length that
37 :widths: 8 8 24 40
51 - Length of this directory entry. Must be a multiple of 4.
62 entry format shortens the name_len field and uses the space for a file
69 :widths: 8 8 24 40
[all …]
/linux-6.12.1/arch/arm64/crypto/
Dcrct10dif-ce-core.S24 // This software is available to you under a choice of one of two
49 // IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
69 .arch armv8-a+crypto
116 movi perm4.8b, #8
119 ushr perm2.2d, perm1.2d, #8
136 ext t4.8b, ad.8b, ad.8b, #1 // A1
137 ext t5.8b, ad.8b, ad.8b, #2 // A2
138 ext t6.8b, ad.8b, ad.8b, #3 // A3
140 pmull t4.8h, t4.8b, fold_consts.8b // F = A1*B
141 pmull t8.8h, ad.8b, bd1.8b // E = A*B1
[all …]

12345678910>>...99