/linux-master/arch/m68k/fpsp040/ |
H A D | ssin.S | 199 |--THIS IS THE USUAL CASE, |X| <= 15 PI. 200 |--THE ARGUMENT REDUCTION IS DONE BY TABLE LOOK UP. 204 |--HIDE THE NEXT THREE INSTRUCTIONS 213 addal %d0,%a1 | ...A1 IS THE ADDRESS OF N*PIBY2 217 |--HIDE THE NEXT ONE 231 |--LET J BE THE LEAST SIG. BIT OF D0, LET SGN := (-1)**J. 241 |---HIDE THE NEXT TWO WHILE WAITING FOR FP0 247 |--HIDE THE NEXT TWO WHILE WAITING FOR FP1 286 |--LET J BE THE LEAST SIG. BIT OF D0, LET SGN := (-1)**J. 297 |---HIDE THE NEX [all...] |
H A D | slogn.S | 340 |--THIS SHOULD BE THE USUAL CASE, X NOT VERY CLOSE TO 1 344 |--THE IDEA IS THAT LOG(X) = K*LOG2 + LOG(Y) 348 |--ALSO NOTE THAT THE VALUE 1/F IS STORED IN A TABLE SO THAT NO 359 |--WHILE THE CONVERSION IS GOING ON, WE GET F AND ADDRESS OF 1/F 363 oril #0x01000000,FFRAC(%a6) | ...GET F: ATTACH A 1 AT THE EIGHTH BIT 368 asrl #4,%d0 | ...SHIFTED 20, D0 IS THE DISPLACEMENT 369 addal %d0,%a0 | ...A0 IS THE ADDRESS FOR 1/F 423 |--REGISTERS SAVED: FPCR, FP1. FP0 CONTAINS THE INPUT. 525 |--HERE WE USE THE USUAL TABLE DRIVEN APPROACH. CARE HAS TO BE 527 |--PRESERVE ALL THE INFORMATIO [all...] |
H A D | stan.S | 187 |--THIS IS THE USUAL CASE, |X| <= 15 PI. 188 |--THE ARGUMENT REDUCTION IS DONE BY TABLE LOOK UP. 192 |--HIDE THE NEXT TWO INSTRUCTIONS 202 |--HIDE THE NEXT ONE 292 |--IF |X| > 15PI, WE USE THE GENERAL ARGUMENT REDUCTION. 307 |--WHEN REDUCEX IS USED, THE CODE WILL INEVITABLY BE SLOW. 309 |--THE REMAINDER INSTRUCTION WHICH IS NOW IN SOFTWARE. 361 |--FIND THE REMAINDER OF (R,r) W.R.T. 2**L * (PI/2). L IS SO CHOSEN 377 |--FLOATING POINT FORMAT, THE TWO FMOVE'S FMOVE.L FP <--> N 378 |--WILL BE TOO INEFFICIENT. THE WA [all...] |
H A D | satan.S | 257 |--THE MOST LIKELY CASE, |X| IN [1/16, 16). WE USE TABLE TECHNIQUE 258 |--THE IDEA IS ATAN(X) = ATAN(F) + ATAN( [X-F] / [1+XF] ). 262 |--TRUE THAT A DIVIDE IS NOW NEEDED, BUT THE APPROXIMATION FOR 263 |--ATAN(U) IS A VERY SHORT POLYNOMIAL AND THE INDEXING TO 264 |--FETCH F AND SAVING OF REGISTERS CAN BE ALL HIDED UNDER THE 265 |--DIVIDE. IN THE END THIS METHOD IS MUCH FASTER THAN A TRADITIONAL 266 |--ONE. NOTE ALSO THAT THE TRADITIONAL SCHEME THAT APPROXIMATE 273 |--THAT IS IT MATCHES THE EXPONENT AND FIRST 5 BITS OF X, THE 291 |--WHILE THE DIVISIO [all...] |
H A D | sasin.S | 71 |--THIS IS THE USUAL CASE, |X| < 1
|
H A D | satanh.S | 75 |--THIS IS THE USUAL CASE, |X| < 1
|
H A D | scosh.S | 88 |--THIS IS THE USUAL CASE, |X| < 16380 LOG2
|
H A D | ssinh.S | 85 |--THIS IS THE USUAL CASE, |X| < 16380 LOG2
|
H A D | stanh.S | 94 |--THIS IS THE USUAL CASE
|
H A D | stwotox.S | 248 |--SUMMARY: a1 IS ADDRESS FOR THE LEADING PORTION OF 2^(J/64), 352 |--SUMMARY: a1 IS ADDRESS FOR THE LEADING PORTION OF 2^(J/64), 384 |--FP0 IS R. THE FOLLOWING CODE COMPUTES
|
/linux-master/arch/x86/crypto/ |
H A D | crct10dif-pcl-asm_64.S | 36 # EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 44 # NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 45 # SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
H A D | sha256-ssse3-asm.S | 30 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 31 # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 33 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS 36 # CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
H A D | sha256-avx-asm.S | 30 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 31 # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 33 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS 36 # CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
H A D | sha512-avx-asm.S | 31 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 32 # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 34 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS 37 # CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
H A D | sha512-ssse3-asm.S | 31 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 32 # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 34 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS 37 # CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
H A D | sha512-avx2-asm.S | 31 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 32 # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 34 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS 37 # CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
H A D | sha256-avx2-asm.S | 30 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 31 # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 33 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS 36 # CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
/linux-master/scripts/ |
H A D | parse-maintainers.pl | 68 $a =~ s/THE REST/ZZZZZZ/g; 69 $b =~ s/THE REST/ZZZZZZ/g;
|
/linux-master/arch/m68k/ifpsp060/ |
H A D | iskeleton.S | 9 |THE SOFTWARE is provided on an "AS IS" basis and without warranty. 20 |ARISING OF THE USE OR INABILITY TO USE THE SOFTWARE. 188 | NOTE: THE ROUTINE SHOULD RETURN AN FSLW VALUE IN D0 ON FAILURE 189 | SO THAT THE 060SP CAN CREATE A PROPER ACCESS ERROR FRAME.
|
H A D | fskeleton.S | 9 |THE SOFTWARE is provided on an "AS IS" basis and without warranty. 20 |ARISING OF THE USE OR INABILITY TO USE THE SOFTWARE.
|
H A D | os.S | 9 |THE SOFTWARE is provided on an "AS IS" basis and without warranty. 20 |ARISING OF THE USE OR INABILITY TO USE THE SOFTWARE.
|
/linux-master/arch/arm64/kvm/ |
H A D | nested.c | 285 if (!kvm_has_feat(kvm, ID_AA64PFR1_EL1, THE, IMP)) 338 if (!kvm_has_feat(kvm, ID_AA64PFR1_EL1, THE, IMP))
|
/linux-master/drivers/gpu/drm/amd/amdkfd/ |
H A D | cwsr_trap_handler_gfx8.asm | 14 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 15 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR 19 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR 20 * OTHER DEALINGS IN THE SOFTWARE.
|
H A D | cwsr_trap_handler_gfx9.asm | 14 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 15 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR 19 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR 20 * OTHER DEALINGS IN THE SOFTWARE.
|
/linux-master/arch/m68k/ifpsp060/src/ |
H A D | fplsp.S | 9 THE SOFTWARE is provided on an "AS IS" basis and without warranty. label 20 ARISING OF THE USE OR INABILITY TO USE THE SOFTWARE. 5045 #--THIS IS THE USUAL CASE, |X| <= 15 PI. 5046 #--THE ARGUMENT REDUCTION IS DONE BY TABLE LOOK UP. 5059 # A1 IS THE ADDRESS OF N*PIBY2 5074 #--LET J BE THE LEAST SIG. BIT OF D0, LET SGN := (-1)**J. 5127 #--LET J BE THE LEAST SIG. BIT OF D0, LET SGN := (-1)**J. 5192 #--IF |X| > 15PI, WE USE THE GENERAL ARGUMENT REDUCTION. 5256 #--THIS IS THE USUA [all...] |