Searched refs:THE (Results 1 - 25 of 34) sorted by relevance

12

/linux-master/arch/m68k/fpsp040/
H A Dssin.S199 |--THIS IS THE USUAL CASE, |X| <= 15 PI.
200 |--THE ARGUMENT REDUCTION IS DONE BY TABLE LOOK UP.
204 |--HIDE THE NEXT THREE INSTRUCTIONS
213 addal %d0,%a1 | ...A1 IS THE ADDRESS OF N*PIBY2
217 |--HIDE THE NEXT ONE
231 |--LET J BE THE LEAST SIG. BIT OF D0, LET SGN := (-1)**J.
241 |---HIDE THE NEXT TWO WHILE WAITING FOR FP0
247 |--HIDE THE NEXT TWO WHILE WAITING FOR FP1
286 |--LET J BE THE LEAST SIG. BIT OF D0, LET SGN := (-1)**J.
297 |---HIDE THE NEX
[all...]
H A Dslogn.S340 |--THIS SHOULD BE THE USUAL CASE, X NOT VERY CLOSE TO 1
344 |--THE IDEA IS THAT LOG(X) = K*LOG2 + LOG(Y)
348 |--ALSO NOTE THAT THE VALUE 1/F IS STORED IN A TABLE SO THAT NO
359 |--WHILE THE CONVERSION IS GOING ON, WE GET F AND ADDRESS OF 1/F
363 oril #0x01000000,FFRAC(%a6) | ...GET F: ATTACH A 1 AT THE EIGHTH BIT
368 asrl #4,%d0 | ...SHIFTED 20, D0 IS THE DISPLACEMENT
369 addal %d0,%a0 | ...A0 IS THE ADDRESS FOR 1/F
423 |--REGISTERS SAVED: FPCR, FP1. FP0 CONTAINS THE INPUT.
525 |--HERE WE USE THE USUAL TABLE DRIVEN APPROACH. CARE HAS TO BE
527 |--PRESERVE ALL THE INFORMATIO
[all...]
H A Dstan.S187 |--THIS IS THE USUAL CASE, |X| <= 15 PI.
188 |--THE ARGUMENT REDUCTION IS DONE BY TABLE LOOK UP.
192 |--HIDE THE NEXT TWO INSTRUCTIONS
202 |--HIDE THE NEXT ONE
292 |--IF |X| > 15PI, WE USE THE GENERAL ARGUMENT REDUCTION.
307 |--WHEN REDUCEX IS USED, THE CODE WILL INEVITABLY BE SLOW.
309 |--THE REMAINDER INSTRUCTION WHICH IS NOW IN SOFTWARE.
361 |--FIND THE REMAINDER OF (R,r) W.R.T. 2**L * (PI/2). L IS SO CHOSEN
377 |--FLOATING POINT FORMAT, THE TWO FMOVE'S FMOVE.L FP <--> N
378 |--WILL BE TOO INEFFICIENT. THE WA
[all...]
H A Dsatan.S257 |--THE MOST LIKELY CASE, |X| IN [1/16, 16). WE USE TABLE TECHNIQUE
258 |--THE IDEA IS ATAN(X) = ATAN(F) + ATAN( [X-F] / [1+XF] ).
262 |--TRUE THAT A DIVIDE IS NOW NEEDED, BUT THE APPROXIMATION FOR
263 |--ATAN(U) IS A VERY SHORT POLYNOMIAL AND THE INDEXING TO
264 |--FETCH F AND SAVING OF REGISTERS CAN BE ALL HIDED UNDER THE
265 |--DIVIDE. IN THE END THIS METHOD IS MUCH FASTER THAN A TRADITIONAL
266 |--ONE. NOTE ALSO THAT THE TRADITIONAL SCHEME THAT APPROXIMATE
273 |--THAT IS IT MATCHES THE EXPONENT AND FIRST 5 BITS OF X, THE
291 |--WHILE THE DIVISIO
[all...]
H A Dsasin.S71 |--THIS IS THE USUAL CASE, |X| < 1
H A Dsatanh.S75 |--THIS IS THE USUAL CASE, |X| < 1
H A Dscosh.S88 |--THIS IS THE USUAL CASE, |X| < 16380 LOG2
H A Dssinh.S85 |--THIS IS THE USUAL CASE, |X| < 16380 LOG2
H A Dstanh.S94 |--THIS IS THE USUAL CASE
H A Dstwotox.S248 |--SUMMARY: a1 IS ADDRESS FOR THE LEADING PORTION OF 2^(J/64),
352 |--SUMMARY: a1 IS ADDRESS FOR THE LEADING PORTION OF 2^(J/64),
384 |--FP0 IS R. THE FOLLOWING CODE COMPUTES
/linux-master/arch/x86/crypto/
H A Dcrct10dif-pcl-asm_64.S36 # EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
44 # NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
45 # SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
H A Dsha256-ssse3-asm.S30 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
31 # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
33 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
36 # CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
H A Dsha256-avx-asm.S30 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
31 # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
33 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
36 # CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
H A Dsha512-avx-asm.S31 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
32 # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
34 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
37 # CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
H A Dsha512-ssse3-asm.S31 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
32 # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
34 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
37 # CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
H A Dsha512-avx2-asm.S31 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
32 # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
34 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
37 # CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
H A Dsha256-avx2-asm.S30 # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
31 # EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
33 # NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
36 # CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
/linux-master/scripts/
H A Dparse-maintainers.pl68 $a =~ s/THE REST/ZZZZZZ/g;
69 $b =~ s/THE REST/ZZZZZZ/g;
/linux-master/arch/m68k/ifpsp060/
H A Diskeleton.S9 |THE SOFTWARE is provided on an "AS IS" basis and without warranty.
20 |ARISING OF THE USE OR INABILITY TO USE THE SOFTWARE.
188 | NOTE: THE ROUTINE SHOULD RETURN AN FSLW VALUE IN D0 ON FAILURE
189 | SO THAT THE 060SP CAN CREATE A PROPER ACCESS ERROR FRAME.
H A Dfskeleton.S9 |THE SOFTWARE is provided on an "AS IS" basis and without warranty.
20 |ARISING OF THE USE OR INABILITY TO USE THE SOFTWARE.
H A Dos.S9 |THE SOFTWARE is provided on an "AS IS" basis and without warranty.
20 |ARISING OF THE USE OR INABILITY TO USE THE SOFTWARE.
/linux-master/arch/arm64/kvm/
H A Dnested.c285 if (!kvm_has_feat(kvm, ID_AA64PFR1_EL1, THE, IMP))
338 if (!kvm_has_feat(kvm, ID_AA64PFR1_EL1, THE, IMP))
/linux-master/drivers/gpu/drm/amd/amdkfd/
H A Dcwsr_trap_handler_gfx8.asm14 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
15 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR
19 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
20 * OTHER DEALINGS IN THE SOFTWARE.
H A Dcwsr_trap_handler_gfx9.asm14 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
15 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR
19 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
20 * OTHER DEALINGS IN THE SOFTWARE.
/linux-master/arch/m68k/ifpsp060/src/
H A Dfplsp.S9 THE SOFTWARE is provided on an "AS IS" basis and without warranty. label
20 ARISING OF THE USE OR INABILITY TO USE THE SOFTWARE.
5045 #--THIS IS THE USUAL CASE, |X| <= 15 PI.
5046 #--THE ARGUMENT REDUCTION IS DONE BY TABLE LOOK UP.
5059 # A1 IS THE ADDRESS OF N*PIBY2
5074 #--LET J BE THE LEAST SIG. BIT OF D0, LET SGN := (-1)**J.
5127 #--LET J BE THE LEAST SIG. BIT OF D0, LET SGN := (-1)**J.
5192 #--IF |X| > 15PI, WE USE THE GENERAL ARGUMENT REDUCTION.
5256 #--THIS IS THE USUA
[all...]

Completed in 453 milliseconds

12