Search Options

Results per page
Sort
Preferred Languages
Advance

Results 71 - 80 of 152 for r13d (0.03 sec)

  1. src/cmd/vendor/golang.org/x/sys/unix/zptrace_x86_linux.go

    	return ptracePtr(PTRACE_SETREGS, pid, 0, unsafe.Pointer(regs))
    }
    
    // PtraceRegsAmd64 is the registers used by amd64 binaries.
    type PtraceRegsAmd64 struct {
    	R15      uint64
    	R14      uint64
    	R13      uint64
    	R12      uint64
    	Rbp      uint64
    	Rbx      uint64
    	R11      uint64
    	R10      uint64
    	R9       uint64
    	R8       uint64
    	Rax      uint64
    	Rcx      uint64
    	Rdx      uint64
    	Rsi      uint64
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Oct 19 23:33:33 UTC 2023
    - 1.8K bytes
    - Viewed (0)
  2. src/runtime/sys_dragonfly_amd64.s

    	MOVL $495, AX		// lwp_create
    	SYSCALL
    	MOVL	AX, ret+8(FP)
    	RET
    
    TEXT runtime·lwp_start(SB),NOSPLIT,$0
    	MOVQ	DI, R13 // m
    
    	// set up FS to point at m->tls
    	LEAQ	m_tls(R13), DI
    	CALL	runtime·settls(SB)	// smashes DI
    
    	// set up m, g
    	get_tls(CX)
    	MOVQ	m_g0(R13), DI
    	MOVQ	R13, g_m(DI)
    	MOVQ	DI, g(CX)
    
    	CALL	runtime·stackcheck(SB)
    	CALL	runtime·mstart(SB)
    
    	MOVQ 0, AX			// crash (not reached)
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Jun 06 18:49:01 UTC 2023
    - 8.3K bytes
    - Viewed (0)
  3. src/runtime/signal_ppc64x.go

    	print("r8   ", hex(c.r8()), "\t")
    	print("r9   ", hex(c.r9()), "\n")
    	print("r10  ", hex(c.r10()), "\t")
    	print("r11  ", hex(c.r11()), "\n")
    	print("r12  ", hex(c.r12()), "\t")
    	print("r13  ", hex(c.r13()), "\n")
    	print("r14  ", hex(c.r14()), "\t")
    	print("r15  ", hex(c.r15()), "\n")
    	print("r16  ", hex(c.r16()), "\t")
    	print("r17  ", hex(c.r17()), "\n")
    	print("r18  ", hex(c.r18()), "\t")
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Sep 08 15:08:04 UTC 2023
    - 3.7K bytes
    - Viewed (0)
  4. src/runtime/sys_linux_amd64.s

    	MOVQ    $0, R8
    	// Copy mp, gp, fn off parent stack for use by child.
    	// Careful: Linux system call clobbers CX and R11.
    	MOVQ	mp+16(FP), R13
    	MOVQ	gp+24(FP), R9
    	MOVQ	fn+32(FP), R12
    	CMPQ	R13, $0    // m
    	JEQ	nog1
    	CMPQ	R9, $0    // g
    	JEQ	nog1
    	LEAQ	m_tls(R13), R8
    #ifdef GOOS_android
    	// Android stores the TLS offset in runtime·tls_g.
    	SUBQ	runtime·tls_g(SB), R8
    #else
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Mar 24 18:53:44 UTC 2023
    - 15.7K bytes
    - Viewed (0)
  5. src/crypto/md5/md5block_arm64.s

    	MOVD	dig+0(FP), R0
    	MOVD	p+8(FP), R1
    	MOVD	p_len+16(FP), R2
    	AND	$~63, R2
    	CBZ	R2, zero
    
    	ADD	R1, R2, R21
    	LDPW	(0*8)(R0), (R4, R5)
    	LDPW	(1*8)(R0), (R6, R7)
    
    loop:
    	MOVW	R4, R12
    	MOVW	R5, R13
    	MOVW	R6, R14
    	MOVW	R7, R15
    
    	MOVW	(0*4)(R1), R8
    	MOVW	R7, R9
    
    #define ROUND1(a, b, c, d, index, const, shift) \
    	ADDW	$const, a; \
    	ADDW	R8, a; \
    	MOVW	(index*4)(R1), R8; \
    	EORW	c, R9; \
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 4.1K bytes
    - Viewed (0)
  6. src/internal/bytealg/count_amd64.s

    	POPCNTL DX, DX
    	MOVQ	DX, (R8)
    	RET
    
    avx2:
    #ifndef hasAVX2
    	CMPB   internal∕cpu·X86+const_offsetX86HasAVX2(SB), $1
    	JNE sse
    #endif
    	MOVD AX, X0
    	LEAQ -64(SI)(BX*1), R11
    	LEAQ (SI)(BX*1), R13
    	VPBROADCASTB  X0, Y1
    	PCALIGN $32
    avx2_loop:
    	VMOVDQU (DI), Y2
    	VMOVDQU 32(DI), Y4
    	VPCMPEQB Y1, Y2, Y3
    	VPCMPEQB Y1, Y4, Y5
    	VPMOVMSKB Y3, DX
    	VPMOVMSKB Y5, CX
    	POPCNTL DX, DX
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Oct 06 20:54:43 UTC 2023
    - 4.7K bytes
    - Viewed (0)
  7. src/internal/bytealg/compare_loong64.s

    	// R4 = a_base
    	// R5 = a_len
    	// R6 = b_base
    	// R7 = b_len
    	JMP	cmpbody<>(SB)
    
    // On entry:
    // R5 length of a
    // R7 length of b
    // R4 points to the start of a
    // R6 points to the start of b
    // R13 points to the return value (-1/0/1)
    TEXT cmpbody<>(SB),NOSPLIT|NOFRAME,$0
    	BEQ	R4, R6, samebytes // same start of a and b
    
    	SGTU	R5, R7, R9
    	BNE	R0, R9, r2_lt_r1
    	MOVV	R5, R14
    	JMP	entry
    r2_lt_r1:
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 15:04:25 UTC 2024
    - 1.7K bytes
    - Viewed (0)
  8. src/runtime/signal_openbsd_amd64.go

    func (c *sigctxt) r10() uint64 { return c.regs().sc_r10 }
    func (c *sigctxt) r11() uint64 { return c.regs().sc_r11 }
    func (c *sigctxt) r12() uint64 { return c.regs().sc_r12 }
    func (c *sigctxt) r13() uint64 { return c.regs().sc_r13 }
    func (c *sigctxt) r14() uint64 { return c.regs().sc_r14 }
    func (c *sigctxt) r15() uint64 { return c.regs().sc_r15 }
    
    //go:nosplit
    //go:nowritebarrierrec
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Oct 11 12:56:15 UTC 2016
    - 2K bytes
    - Viewed (0)
  9. src/crypto/md5/md5block_amd64.s

    	LEAQ	(SI)(DX*1),	DI
    	MOVL	(0*4)(BP),	AX
    	MOVL	(1*4)(BP),	BX
    	MOVL	(2*4)(BP),	CX
    	MOVL	(3*4)(BP),	DX
    	MOVL	$0xffffffff,	R11
    
    	CMPQ	SI,		DI
    	JEQ	end
    
    loop:
    	MOVL	AX,		R12
    	MOVL	BX,		R13
    	MOVL	CX,		R14
    	MOVL	DX,		R15
    
    	MOVL	(0*4)(SI),	R8
    	MOVL	DX,		R9
    
    #define ROUND1(a, b, c, d, index, const, shift) \
    	XORL	c, R9; \
    	ADDL	$const, a; \
    	ADDL	R8, a; \
    	ANDL	b, R9; \
    	XORL	d, R9; \
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 4.8K bytes
    - Viewed (0)
  10. src/crypto/sha1/sha1block_amd64.s

    	MOVQ	p_len+16(FP),	DX
    	SHRQ	$6,		DX
    	SHLQ	$6,		DX
    
    	MOVQ	$K_XMM_AR<>(SB), R8
    
    	MOVQ	DI, R9
    	MOVQ	SI, R10
    	LEAQ	64(SI), R13
    
    	ADDQ	SI, DX
    	ADDQ	$64, DX
    	MOVQ	DX, R11
    
    	CMPQ	R13, R11
    	CMOVQCC	R8, R13
    
    	VMOVDQU	BSWAP_SHUFB_CTL<>(SB), Y10
    
    	CALC // RET is inside macros
    
    DATA K_XMM_AR<>+0x00(SB)/4,$0x5a827999
    DATA K_XMM_AR<>+0x04(SB)/4,$0x5a827999
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 31.5K bytes
    - Viewed (0)
Back to top