rol32             244 arch/arm/net/bpf_jit_32.c #define imm12val(v, s) (rol32(v, (s)) | (s) << 7)
rol32             293 arch/arm/net/bpf_jit_32.c 			return rol32(x, 2 * rot) | (rot << 8);
rol32             814 arch/x86/crypto/camellia_glue.c 	subRL[1] ^= rol32(dw, 1);
rol32             826 arch/x86/crypto/camellia_glue.c 	subRL[1] ^= rol32(dw, 1);
rol32             845 arch/x86/crypto/camellia_glue.c 		subRL[1] ^= rol32(dw, 1);
rol32             868 arch/x86/crypto/camellia_glue.c 		kw4 ^= rol32(dw, 1);
rol32             881 arch/x86/crypto/camellia_glue.c 	kw4 ^= rol32(dw, 1);
rol32             893 arch/x86/crypto/camellia_glue.c 	kw4 ^= rol32(dw, 1);
rol32             914 arch/x86/crypto/camellia_glue.c 	tr = subRL[10] ^ rol32(dw, 1);
rol32             923 arch/x86/crypto/camellia_glue.c 	tr = subRL[7] ^ rol32(dw, 1);
rol32             934 arch/x86/crypto/camellia_glue.c 	tr = subRL[18] ^ rol32(dw, 1);
rol32             943 arch/x86/crypto/camellia_glue.c 	tr = subRL[15] ^ rol32(dw, 1);
rol32             958 arch/x86/crypto/camellia_glue.c 		tr = subRL[26] ^ rol32(dw, 1);
rol32             967 arch/x86/crypto/camellia_glue.c 		tr = subRL[23] ^ rol32(dw, 1);
rol32              49 crypto/aegis.h 	d0 = t[s[ 0]] ^ rol32(t[s[ 5]], 8) ^ rol32(t[s[10]], 16) ^ rol32(t[s[15]], 24);
rol32              50 crypto/aegis.h 	d1 = t[s[ 4]] ^ rol32(t[s[ 9]], 8) ^ rol32(t[s[14]], 16) ^ rol32(t[s[ 3]], 24);
rol32              51 crypto/aegis.h 	d2 = t[s[ 8]] ^ rol32(t[s[13]], 8) ^ rol32(t[s[ 2]], 16) ^ rol32(t[s[ 7]], 24);
rol32              52 crypto/aegis.h 	d3 = t[s[12]] ^ rol32(t[s[ 1]], 8) ^ rol32(t[s[ 6]], 16) ^ rol32(t[s[11]], 24);
rol32             379 crypto/camellia_generic.c 	subR[1] ^= rol32(dw, 1); /* modified for FLinv(kl2) */
rol32             388 crypto/camellia_generic.c 	subR[1] ^= rol32(dw, 1); /* modified for FLinv(kl4) */
rol32             404 crypto/camellia_generic.c 		subR[1] ^= rol32(dw, 1); /* modified for FLinv(kl6) */
rol32             424 crypto/camellia_generic.c 		kw4r ^= rol32(dw, 1); /* modified for FL(kl5) */
rol32             434 crypto/camellia_generic.c 	kw4r ^= rol32(dw, 1); /* modified for FL(kl3) */
rol32             443 crypto/camellia_generic.c 	kw4r ^= rol32(dw, 1); /* modified for FL(kl1) */
rol32             468 crypto/camellia_generic.c 	tr = subR[10] ^ rol32(dw, 1);
rol32             477 crypto/camellia_generic.c 	tr = subR[7] ^ rol32(dw, 1);
rol32             490 crypto/camellia_generic.c 	tr = subR[18] ^ rol32(dw, 1);
rol32             499 crypto/camellia_generic.c 	tr = subR[15] ^ rol32(dw, 1);
rol32             518 crypto/camellia_generic.c 		tr = subR[26] ^ rol32(dw, 1);
rol32             527 crypto/camellia_generic.c 		tr = subR[23] ^ rol32(dw, 1);
rol32             825 crypto/camellia_generic.c 	lr ^= rol32(t0, 1);						\
rol32             831 crypto/camellia_generic.c 	rr ^= rol32(t3, 1);						\
rol32             295 crypto/cast5_generic.c #define F1(D, m, r)  ((I = ((m) + (D))), (I = rol32(I, (r))),   \
rol32             297 crypto/cast5_generic.c #define F2(D, m, r)  ((I = ((m) ^ (D))), (I = rol32(I, (r))),   \
rol32             299 crypto/cast5_generic.c #define F3(D, m, r)  ((I = ((m) - (D))), (I = rol32(I, (r))),   \
rol32              27 crypto/cast6_generic.c #define F1(D, r, m)  ((I = ((m) + (D))), (I = rol32(I, (r))),   \
rol32              29 crypto/cast6_generic.c #define F2(D, r, m)  ((I = ((m) ^ (D))), (I = rol32(I, (r))),   \
rol32              31 crypto/cast6_generic.c #define F3(D, r, m)  ((I = ((m) - (D))), (I = rol32(I, (r))),   \
rol32              36 crypto/michael_mic.c 	r ^= rol32(l, 17);	\
rol32              40 crypto/michael_mic.c 	r ^= rol32(l, 3);	\
rol32              42 crypto/rmd128.c 	(a) = rol32((a), (s)); \
rol32              45 crypto/rmd160.c 	(a) = rol32((a), (s)) + (e); \
rol32              46 crypto/rmd160.c 	(c) = rol32((c), 10); \
rol32              42 crypto/rmd256.c 	(a) = rol32((a), (s)); \
rol32              45 crypto/rmd320.c 	(a) = rol32((a), (s)) + (e); \
rol32              46 crypto/rmd320.c 	(c) = rol32((c), 10); \
rol32              43 crypto/salsa20_generic.c 		x[ 4] ^= rol32((x[ 0] + x[12]),  7);
rol32              44 crypto/salsa20_generic.c 		x[ 8] ^= rol32((x[ 4] + x[ 0]),  9);
rol32              45 crypto/salsa20_generic.c 		x[12] ^= rol32((x[ 8] + x[ 4]), 13);
rol32              46 crypto/salsa20_generic.c 		x[ 0] ^= rol32((x[12] + x[ 8]), 18);
rol32              47 crypto/salsa20_generic.c 		x[ 9] ^= rol32((x[ 5] + x[ 1]),  7);
rol32              48 crypto/salsa20_generic.c 		x[13] ^= rol32((x[ 9] + x[ 5]),  9);
rol32              49 crypto/salsa20_generic.c 		x[ 1] ^= rol32((x[13] + x[ 9]), 13);
rol32              50 crypto/salsa20_generic.c 		x[ 5] ^= rol32((x[ 1] + x[13]), 18);
rol32              51 crypto/salsa20_generic.c 		x[14] ^= rol32((x[10] + x[ 6]),  7);
rol32              52 crypto/salsa20_generic.c 		x[ 2] ^= rol32((x[14] + x[10]),  9);
rol32              53 crypto/salsa20_generic.c 		x[ 6] ^= rol32((x[ 2] + x[14]), 13);
rol32              54 crypto/salsa20_generic.c 		x[10] ^= rol32((x[ 6] + x[ 2]), 18);
rol32              55 crypto/salsa20_generic.c 		x[ 3] ^= rol32((x[15] + x[11]),  7);
rol32              56 crypto/salsa20_generic.c 		x[ 7] ^= rol32((x[ 3] + x[15]),  9);
rol32              57 crypto/salsa20_generic.c 		x[11] ^= rol32((x[ 7] + x[ 3]), 13);
rol32              58 crypto/salsa20_generic.c 		x[15] ^= rol32((x[11] + x[ 7]), 18);
rol32              59 crypto/salsa20_generic.c 		x[ 1] ^= rol32((x[ 0] + x[ 3]),  7);
rol32              60 crypto/salsa20_generic.c 		x[ 2] ^= rol32((x[ 1] + x[ 0]),  9);
rol32              61 crypto/salsa20_generic.c 		x[ 3] ^= rol32((x[ 2] + x[ 1]), 13);
rol32              62 crypto/salsa20_generic.c 		x[ 0] ^= rol32((x[ 3] + x[ 2]), 18);
rol32              63 crypto/salsa20_generic.c 		x[ 6] ^= rol32((x[ 5] + x[ 4]),  7);
rol32              64 crypto/salsa20_generic.c 		x[ 7] ^= rol32((x[ 6] + x[ 5]),  9);
rol32              65 crypto/salsa20_generic.c 		x[ 4] ^= rol32((x[ 7] + x[ 6]), 13);
rol32              66 crypto/salsa20_generic.c 		x[ 5] ^= rol32((x[ 4] + x[ 7]), 18);
rol32              67 crypto/salsa20_generic.c 		x[11] ^= rol32((x[10] + x[ 9]),  7);
rol32              68 crypto/salsa20_generic.c 		x[ 8] ^= rol32((x[11] + x[10]),  9);
rol32              69 crypto/salsa20_generic.c 		x[ 9] ^= rol32((x[ 8] + x[11]), 13);
rol32              70 crypto/salsa20_generic.c 		x[10] ^= rol32((x[ 9] + x[ 8]), 18);
rol32              71 crypto/salsa20_generic.c 		x[12] ^= rol32((x[15] + x[14]),  7);
rol32              72 crypto/salsa20_generic.c 		x[13] ^= rol32((x[12] + x[15]),  9);
rol32              73 crypto/salsa20_generic.c 		x[14] ^= rol32((x[13] + x[12]), 13);
rol32              74 crypto/salsa20_generic.c 		x[15] ^= rol32((x[14] + x[13]), 18);
rol32              30 crypto/serpent_generic.c 	({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; })
rol32              47 crypto/serpent_generic.c 							x0 = rol32(x0, 13);\
rol32              48 crypto/serpent_generic.c 	x2 = rol32(x2, 3);	x1 ^= x0;		x4  = x0 << 3;	   \
rol32              50 crypto/serpent_generic.c 	x1 = rol32(x1, 1);	x3 ^= x4;				   \
rol32              51 crypto/serpent_generic.c 	x3 = rol32(x3, 7);	x4  = x1;				   \
rol32              54 crypto/serpent_generic.c 	x1 ^= k[4*i+1];		x0 = rol32(x0, 5);	x2 = rol32(x2, 22);\
rol32              31 crypto/sm3_generic.c 	return x ^ rol32(x, 9) ^ rol32(x, 17);
rol32              36 crypto/sm3_generic.c 	return x ^ rol32(x, 15) ^ rol32(x, 23);
rol32              64 crypto/sm3_generic.c 		tmp = w[i - 16] ^ w[i - 9] ^ rol32(w[i - 3], 15);
rol32              65 crypto/sm3_generic.c 		w[i] = p1(tmp) ^ (rol32(w[i - 13], 7)) ^ w[i - 6];
rol32              92 crypto/sm3_generic.c 		ss1 = rol32((rol32(a, 12) + e + rol32(t(i), i & 31)), 7);
rol32              94 crypto/sm3_generic.c 		ss2 = ss1 ^ rol32(a, 12);
rol32             103 crypto/sm3_generic.c 		c = rol32(b, 9);
rol32             107 crypto/sm3_generic.c 		g = rol32(f, 19);
rol32              82 crypto/sm4_generic.c 	return x ^ rol32(x, 13) ^ rol32(x, 23);
rol32              88 crypto/sm4_generic.c 	return x ^ rol32(x, 2) ^ rol32(x, 10) ^ rol32(x, 18) ^ rol32(x, 24);
rol32             538 crypto/twofish_common.c    y = rol32(y, 8); \
rol32             540 crypto/twofish_common.c    ctx->a[(j) + 1] = rol32(y, 9)
rol32             551 crypto/twofish_common.c    y = rol32(y, 8); \
rol32             553 crypto/twofish_common.c    ctx->a[(j) + 1] = rol32(y, 9)
rol32             564 crypto/twofish_common.c    y = rol32(y, 8); \
rol32             566 crypto/twofish_common.c    ctx->a[(j) + 1] = rol32(y, 9)
rol32              58 crypto/twofish_generic.c    (d) = rol32((d), 1) ^ y
rol32              65 crypto/twofish_generic.c    (c) = rol32((c), 1); \
rol32             608 drivers/char/random.c 		w = rol32(*bytes++, input_rotate);
rol32             671 drivers/char/random.c 	b = rol32(b, 6);	d = rol32(d, 27);
rol32             675 drivers/char/random.c 	b = rol32(b, 16);	d = rol32(d, 14);
rol32             679 drivers/char/random.c 	b = rol32(b, 6);	d = rol32(d, 27);
rol32             683 drivers/char/random.c 	b = rol32(b, 16);	d = rol32(d, 14);
rol32            1547 drivers/char/random.c 	hash.w[2] ^= rol32(hash.w[2], 16);
rol32              85 drivers/leds/leds-mlxreg.c 	nib = (ror32(data->mask, data->bit) == 0xf0) ? rol32(vset, data->bit) :
rol32              86 drivers/leds/leds-mlxreg.c 	      rol32(vset, data->bit + 4);
rol32              82 drivers/platform/mellanox/mlxreg-io.c 			in_val = rol32(in_val, data->bit - 1) & data->mask;
rol32              45 fs/ext4/hash.c 	(a += f(b, c, d) + x, a = rol32(a, s))
rol32            1910 fs/namei.c     	y ^= x,	x = rol32(x, 7),\
rol32            1911 fs/namei.c     	x += y,	y = rol32(y,20),\
rol32            2019 fs/xfs/libxfs/xfs_da_btree.c 		       (name[3] << 0) ^ rol32(hash, 7 * 4);
rol32            2027 fs/xfs/libxfs/xfs_da_btree.c 		       rol32(hash, 7 * 3);
rol32            2029 fs/xfs/libxfs/xfs_da_btree.c 		return (name[0] << 7) ^ (name[1] << 0) ^ rol32(hash, 7 * 2);
rol32            2031 fs/xfs/libxfs/xfs_da_btree.c 		return (name[0] << 0) ^ rol32(hash, 7 * 1);
rol32              63 fs/xfs/libxfs/xfs_dir2.c 		hash = tolower(name->name[i]) ^ rol32(hash, 7);
rol32              37 include/linux/jhash.h 	a -= c;  a ^= rol32(c, 4);  c += b;	\
rol32              38 include/linux/jhash.h 	b -= a;  b ^= rol32(a, 6);  a += c;	\
rol32              39 include/linux/jhash.h 	c -= b;  c ^= rol32(b, 8);  b += a;	\
rol32              40 include/linux/jhash.h 	a -= c;  a ^= rol32(c, 16); c += b;	\
rol32              41 include/linux/jhash.h 	b -= a;  b ^= rol32(a, 19); a += c;	\
rol32              42 include/linux/jhash.h 	c -= b;  c ^= rol32(b, 4);  b += a;	\
rol32              48 include/linux/jhash.h 	c ^= b; c -= rol32(b, 14);		\
rol32              49 include/linux/jhash.h 	a ^= c; a -= rol32(c, 11);		\
rol32              50 include/linux/jhash.h 	b ^= a; b -= rol32(a, 25);		\
rol32              51 include/linux/jhash.h 	c ^= b; c -= rol32(b, 16);		\
rol32              52 include/linux/jhash.h 	a ^= c; a -= rol32(c, 4);		\
rol32              53 include/linux/jhash.h 	b ^= a; b -= rol32(a, 14);		\
rol32              54 include/linux/jhash.h 	c ^= b; c -= rol32(b, 24);		\
rol32             883 include/net/ipv6.h 	hash = rol32(hash, 16);
rol32              23 lib/chacha.c   		x[0]  += x[4];    x[12] = rol32(x[12] ^ x[0],  16);
rol32              24 lib/chacha.c   		x[1]  += x[5];    x[13] = rol32(x[13] ^ x[1],  16);
rol32              25 lib/chacha.c   		x[2]  += x[6];    x[14] = rol32(x[14] ^ x[2],  16);
rol32              26 lib/chacha.c   		x[3]  += x[7];    x[15] = rol32(x[15] ^ x[3],  16);
rol32              28 lib/chacha.c   		x[8]  += x[12];   x[4]  = rol32(x[4]  ^ x[8],  12);
rol32              29 lib/chacha.c   		x[9]  += x[13];   x[5]  = rol32(x[5]  ^ x[9],  12);
rol32              30 lib/chacha.c   		x[10] += x[14];   x[6]  = rol32(x[6]  ^ x[10], 12);
rol32              31 lib/chacha.c   		x[11] += x[15];   x[7]  = rol32(x[7]  ^ x[11], 12);
rol32              33 lib/chacha.c   		x[0]  += x[4];    x[12] = rol32(x[12] ^ x[0],   8);
rol32              34 lib/chacha.c   		x[1]  += x[5];    x[13] = rol32(x[13] ^ x[1],   8);
rol32              35 lib/chacha.c   		x[2]  += x[6];    x[14] = rol32(x[14] ^ x[2],   8);
rol32              36 lib/chacha.c   		x[3]  += x[7];    x[15] = rol32(x[15] ^ x[3],   8);
rol32              38 lib/chacha.c   		x[8]  += x[12];   x[4]  = rol32(x[4]  ^ x[8],   7);
rol32              39 lib/chacha.c   		x[9]  += x[13];   x[5]  = rol32(x[5]  ^ x[9],   7);
rol32              40 lib/chacha.c   		x[10] += x[14];   x[6]  = rol32(x[6]  ^ x[10],  7);
rol32              41 lib/chacha.c   		x[11] += x[15];   x[7]  = rol32(x[7]  ^ x[11],  7);
rol32              43 lib/chacha.c   		x[0]  += x[5];    x[15] = rol32(x[15] ^ x[0],  16);
rol32              44 lib/chacha.c   		x[1]  += x[6];    x[12] = rol32(x[12] ^ x[1],  16);
rol32              45 lib/chacha.c   		x[2]  += x[7];    x[13] = rol32(x[13] ^ x[2],  16);
rol32              46 lib/chacha.c   		x[3]  += x[4];    x[14] = rol32(x[14] ^ x[3],  16);
rol32              48 lib/chacha.c   		x[10] += x[15];   x[5]  = rol32(x[5]  ^ x[10], 12);
rol32              49 lib/chacha.c   		x[11] += x[12];   x[6]  = rol32(x[6]  ^ x[11], 12);
rol32              50 lib/chacha.c   		x[8]  += x[13];   x[7]  = rol32(x[7]  ^ x[8],  12);
rol32              51 lib/chacha.c   		x[9]  += x[14];   x[4]  = rol32(x[4]  ^ x[9],  12);
rol32              53 lib/chacha.c   		x[0]  += x[5];    x[15] = rol32(x[15] ^ x[0],   8);
rol32              54 lib/chacha.c   		x[1]  += x[6];    x[12] = rol32(x[12] ^ x[1],   8);
rol32              55 lib/chacha.c   		x[2]  += x[7];    x[13] = rol32(x[13] ^ x[2],   8);
rol32              56 lib/chacha.c   		x[3]  += x[4];    x[14] = rol32(x[14] ^ x[3],   8);
rol32              58 lib/chacha.c   		x[10] += x[15];   x[5]  = rol32(x[5]  ^ x[10],  7);
rol32              59 lib/chacha.c   		x[11] += x[12];   x[6]  = rol32(x[6]  ^ x[11],  7);
rol32              60 lib/chacha.c   		x[8]  += x[13];   x[7]  = rol32(x[7]  ^ x[8],   7);
rol32              61 lib/chacha.c   		x[9]  += x[14];   x[4]  = rol32(x[4]  ^ x[9],   7);
rol32              25 lib/crypto/des.c #define ROL(x, r) ((x) = rol32((x), (r)))
rol32              53 lib/sha1.c     #define SHA_MIX(t) rol32(W(t+13) ^ W(t+8) ^ W(t+2) ^ W(t), 1)
rol32              57 lib/sha1.c     	E += TEMP + rol32(A,5) + (fn) + (constant); \
rol32             394 lib/siphash.c  	v0 += v1; v1 = rol32(v1, 5); v1 ^= v0; v0 = rol32(v0, 16); \
rol32             395 lib/siphash.c  	v2 += v3; v3 = rol32(v3, 8); v3 ^= v2; \
rol32             396 lib/siphash.c  	v0 += v3; v3 = rol32(v3, 7); v3 ^= v0; \
rol32             397 lib/siphash.c  	v2 += v1; v1 = rol32(v1, 13); v1 ^= v2; v2 = rol32(v2, 16); \
rol32              99 net/ipv6/seg6_iptunnel.c 		hash = rol32(hash, 16);
rol32              16 net/mac80211/michael.c 	mctx->r ^= rol32(mctx->l, 17);
rol32              21 net/mac80211/michael.c 	mctx->r ^= rol32(mctx->l, 3);
rol32              37 tools/include/linux/jhash.h 	a -= c;  a ^= rol32(c, 4);  c += b;	\
rol32              38 tools/include/linux/jhash.h 	b -= a;  b ^= rol32(a, 6);  a += c;	\
rol32              39 tools/include/linux/jhash.h 	c -= b;  c ^= rol32(b, 8);  b += a;	\
rol32              40 tools/include/linux/jhash.h 	a -= c;  a ^= rol32(c, 16); c += b;	\
rol32              41 tools/include/linux/jhash.h 	b -= a;  b ^= rol32(a, 19); a += c;	\
rol32              42 tools/include/linux/jhash.h 	c -= b;  c ^= rol32(b, 4);  b += a;	\
rol32              48 tools/include/linux/jhash.h 	c ^= b; c -= rol32(b, 14);		\
rol32              49 tools/include/linux/jhash.h 	a ^= c; a -= rol32(c, 11);		\
rol32              50 tools/include/linux/jhash.h 	b ^= a; b -= rol32(a, 25);		\
rol32              51 tools/include/linux/jhash.h 	c ^= b; c -= rol32(b, 16);		\
rol32              52 tools/include/linux/jhash.h 	a ^= c; a -= rol32(c, 4);		\
rol32              53 tools/include/linux/jhash.h 	b ^= a; b -= rol32(a, 14);		\
rol32              54 tools/include/linux/jhash.h 	c ^= b; c -= rol32(b, 24);		\
rol32              14 tools/testing/selftests/bpf/progs/test_jhash.h 	a -= c;  a ^= rol32(c, 4);  c += b;	\
rol32              15 tools/testing/selftests/bpf/progs/test_jhash.h 	b -= a;  b ^= rol32(a, 6);  a += c;	\
rol32              16 tools/testing/selftests/bpf/progs/test_jhash.h 	c -= b;  c ^= rol32(b, 8);  b += a;	\
rol32              17 tools/testing/selftests/bpf/progs/test_jhash.h 	a -= c;  a ^= rol32(c, 16); c += b;	\
rol32              18 tools/testing/selftests/bpf/progs/test_jhash.h 	b -= a;  b ^= rol32(a, 19); a += c;	\
rol32              19 tools/testing/selftests/bpf/progs/test_jhash.h 	c -= b;  c ^= rol32(b, 4);  b += a;	\
rol32              24 tools/testing/selftests/bpf/progs/test_jhash.h 	c ^= b; c -= rol32(b, 14);		\
rol32              25 tools/testing/selftests/bpf/progs/test_jhash.h 	a ^= c; a -= rol32(c, 11);		\
rol32              26 tools/testing/selftests/bpf/progs/test_jhash.h 	b ^= a; b -= rol32(a, 25);		\
rol32              27 tools/testing/selftests/bpf/progs/test_jhash.h 	c ^= b; c -= rol32(b, 16);		\
rol32              28 tools/testing/selftests/bpf/progs/test_jhash.h 	a ^= c; a -= rol32(c, 4);		\
rol32              29 tools/testing/selftests/bpf/progs/test_jhash.h 	b ^= a; b -= rol32(a, 14);		\
rol32              30 tools/testing/selftests/bpf/progs/test_jhash.h 	c ^= b; c -= rol32(b, 24);		\
rol32              36 tools/testing/selftests/bpf/progs/test_l4lb.c 	a -= c;  a ^= rol32(c, 4);  c += b;	\
rol32              37 tools/testing/selftests/bpf/progs/test_l4lb.c 	b -= a;  b ^= rol32(a, 6);  a += c;	\
rol32              38 tools/testing/selftests/bpf/progs/test_l4lb.c 	c -= b;  c ^= rol32(b, 8);  b += a;	\
rol32              39 tools/testing/selftests/bpf/progs/test_l4lb.c 	a -= c;  a ^= rol32(c, 16); c += b;	\
rol32              40 tools/testing/selftests/bpf/progs/test_l4lb.c 	b -= a;  b ^= rol32(a, 19); a += c;	\
rol32              41 tools/testing/selftests/bpf/progs/test_l4lb.c 	c -= b;  c ^= rol32(b, 4);  b += a;	\
rol32              46 tools/testing/selftests/bpf/progs/test_l4lb.c 	c ^= b; c -= rol32(b, 14);		\
rol32              47 tools/testing/selftests/bpf/progs/test_l4lb.c 	a ^= c; a -= rol32(c, 11);		\
rol32              48 tools/testing/selftests/bpf/progs/test_l4lb.c 	b ^= a; b -= rol32(a, 25);		\
rol32              49 tools/testing/selftests/bpf/progs/test_l4lb.c 	c ^= b; c -= rol32(b, 16);		\
rol32              50 tools/testing/selftests/bpf/progs/test_l4lb.c 	a ^= c; a -= rol32(c, 4);		\
rol32              51 tools/testing/selftests/bpf/progs/test_l4lb.c 	b ^= a; b -= rol32(a, 14);		\
rol32              52 tools/testing/selftests/bpf/progs/test_l4lb.c 	c ^= b; c -= rol32(b, 24);		\
rol32              32 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c 	a -= c;  a ^= rol32(c, 4);  c += b;	\
rol32              33 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c 	b -= a;  b ^= rol32(a, 6);  a += c;	\
rol32              34 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c 	c -= b;  c ^= rol32(b, 8);  b += a;	\
rol32              35 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c 	a -= c;  a ^= rol32(c, 16); c += b;	\
rol32              36 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c 	b -= a;  b ^= rol32(a, 19); a += c;	\
rol32              37 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c 	c -= b;  c ^= rol32(b, 4);  b += a;	\
rol32              42 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c 	c ^= b; c -= rol32(b, 14);		\
rol32              43 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c 	a ^= c; a -= rol32(c, 11);		\
rol32              44 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c 	b ^= a; b -= rol32(a, 25);		\
rol32              45 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c 	c ^= b; c -= rol32(b, 16);		\
rol32              46 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c 	a ^= c; a -= rol32(c, 4);		\
rol32              47 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c 	b ^= a; b -= rol32(a, 14);		\
rol32              48 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c 	c ^= b; c -= rol32(b, 24);		\
rol32              29 tools/testing/selftests/bpf/progs/test_xdp_noinline.c 	a -= c;  a ^= rol32(c, 4);  c += b;	\
rol32              30 tools/testing/selftests/bpf/progs/test_xdp_noinline.c 	b -= a;  b ^= rol32(a, 6);  a += c;	\
rol32              31 tools/testing/selftests/bpf/progs/test_xdp_noinline.c 	c -= b;  c ^= rol32(b, 8);  b += a;	\
rol32              32 tools/testing/selftests/bpf/progs/test_xdp_noinline.c 	a -= c;  a ^= rol32(c, 16); c += b;	\
rol32              33 tools/testing/selftests/bpf/progs/test_xdp_noinline.c 	b -= a;  b ^= rol32(a, 19); a += c;	\
rol32              34 tools/testing/selftests/bpf/progs/test_xdp_noinline.c 	c -= b;  c ^= rol32(b, 4);  b += a;	\
rol32              39 tools/testing/selftests/bpf/progs/test_xdp_noinline.c 	c ^= b; c -= rol32(b, 14);		\
rol32              40 tools/testing/selftests/bpf/progs/test_xdp_noinline.c 	a ^= c; a -= rol32(c, 11);		\
rol32              41 tools/testing/selftests/bpf/progs/test_xdp_noinline.c 	b ^= a; b -= rol32(a, 25);		\
rol32              42 tools/testing/selftests/bpf/progs/test_xdp_noinline.c 	c ^= b; c -= rol32(b, 16);		\
rol32              43 tools/testing/selftests/bpf/progs/test_xdp_noinline.c 	a ^= c; a -= rol32(c, 4);		\
rol32              44 tools/testing/selftests/bpf/progs/test_xdp_noinline.c 	b ^= a; b -= rol32(a, 14);		\
rol32              45 tools/testing/selftests/bpf/progs/test_xdp_noinline.c 	c ^= b; c -= rol32(b, 24);		\