rol32 244 arch/arm/net/bpf_jit_32.c #define imm12val(v, s) (rol32(v, (s)) | (s) << 7) rol32 293 arch/arm/net/bpf_jit_32.c return rol32(x, 2 * rot) | (rot << 8); rol32 814 arch/x86/crypto/camellia_glue.c subRL[1] ^= rol32(dw, 1); rol32 826 arch/x86/crypto/camellia_glue.c subRL[1] ^= rol32(dw, 1); rol32 845 arch/x86/crypto/camellia_glue.c subRL[1] ^= rol32(dw, 1); rol32 868 arch/x86/crypto/camellia_glue.c kw4 ^= rol32(dw, 1); rol32 881 arch/x86/crypto/camellia_glue.c kw4 ^= rol32(dw, 1); rol32 893 arch/x86/crypto/camellia_glue.c kw4 ^= rol32(dw, 1); rol32 914 arch/x86/crypto/camellia_glue.c tr = subRL[10] ^ rol32(dw, 1); rol32 923 arch/x86/crypto/camellia_glue.c tr = subRL[7] ^ rol32(dw, 1); rol32 934 arch/x86/crypto/camellia_glue.c tr = subRL[18] ^ rol32(dw, 1); rol32 943 arch/x86/crypto/camellia_glue.c tr = subRL[15] ^ rol32(dw, 1); rol32 958 arch/x86/crypto/camellia_glue.c tr = subRL[26] ^ rol32(dw, 1); rol32 967 arch/x86/crypto/camellia_glue.c tr = subRL[23] ^ rol32(dw, 1); rol32 49 crypto/aegis.h d0 = t[s[ 0]] ^ rol32(t[s[ 5]], 8) ^ rol32(t[s[10]], 16) ^ rol32(t[s[15]], 24); rol32 50 crypto/aegis.h d1 = t[s[ 4]] ^ rol32(t[s[ 9]], 8) ^ rol32(t[s[14]], 16) ^ rol32(t[s[ 3]], 24); rol32 51 crypto/aegis.h d2 = t[s[ 8]] ^ rol32(t[s[13]], 8) ^ rol32(t[s[ 2]], 16) ^ rol32(t[s[ 7]], 24); rol32 52 crypto/aegis.h d3 = t[s[12]] ^ rol32(t[s[ 1]], 8) ^ rol32(t[s[ 6]], 16) ^ rol32(t[s[11]], 24); rol32 379 crypto/camellia_generic.c subR[1] ^= rol32(dw, 1); /* modified for FLinv(kl2) */ rol32 388 crypto/camellia_generic.c subR[1] ^= rol32(dw, 1); /* modified for FLinv(kl4) */ rol32 404 crypto/camellia_generic.c subR[1] ^= rol32(dw, 1); /* modified for FLinv(kl6) */ rol32 424 crypto/camellia_generic.c kw4r ^= rol32(dw, 1); /* modified for FL(kl5) */ rol32 434 crypto/camellia_generic.c kw4r ^= rol32(dw, 1); /* modified for FL(kl3) */ rol32 443 crypto/camellia_generic.c kw4r ^= rol32(dw, 1); /* modified for FL(kl1) */ rol32 468 crypto/camellia_generic.c tr = subR[10] ^ rol32(dw, 1); rol32 477 crypto/camellia_generic.c tr = subR[7] ^ rol32(dw, 1); rol32 490 crypto/camellia_generic.c tr = subR[18] ^ rol32(dw, 1); rol32 499 crypto/camellia_generic.c tr = subR[15] ^ rol32(dw, 1); rol32 518 crypto/camellia_generic.c tr = subR[26] ^ rol32(dw, 1); rol32 527 crypto/camellia_generic.c tr = subR[23] ^ rol32(dw, 1); rol32 825 crypto/camellia_generic.c lr ^= rol32(t0, 1); \ rol32 831 crypto/camellia_generic.c rr ^= rol32(t3, 1); \ rol32 295 crypto/cast5_generic.c #define F1(D, m, r) ((I = ((m) + (D))), (I = rol32(I, (r))), \ rol32 297 crypto/cast5_generic.c #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ rol32 299 crypto/cast5_generic.c #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \ rol32 27 crypto/cast6_generic.c #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \ rol32 29 crypto/cast6_generic.c #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ rol32 31 crypto/cast6_generic.c #define F3(D, r, m) ((I = ((m) - (D))), (I = rol32(I, (r))), \ rol32 36 crypto/michael_mic.c r ^= rol32(l, 17); \ rol32 40 crypto/michael_mic.c r ^= rol32(l, 3); \ rol32 42 crypto/rmd128.c (a) = rol32((a), (s)); \ rol32 45 crypto/rmd160.c (a) = rol32((a), (s)) + (e); \ rol32 46 crypto/rmd160.c (c) = rol32((c), 10); \ rol32 42 crypto/rmd256.c (a) = rol32((a), (s)); \ rol32 45 crypto/rmd320.c (a) = rol32((a), (s)) + (e); \ rol32 46 crypto/rmd320.c (c) = rol32((c), 10); \ rol32 43 crypto/salsa20_generic.c x[ 4] ^= rol32((x[ 0] + x[12]), 7); rol32 44 crypto/salsa20_generic.c x[ 8] ^= rol32((x[ 4] + x[ 0]), 9); rol32 45 crypto/salsa20_generic.c x[12] ^= rol32((x[ 8] + x[ 4]), 13); rol32 46 crypto/salsa20_generic.c x[ 0] ^= rol32((x[12] + x[ 8]), 18); rol32 47 crypto/salsa20_generic.c x[ 9] ^= rol32((x[ 5] + x[ 1]), 7); rol32 48 crypto/salsa20_generic.c x[13] ^= rol32((x[ 9] + x[ 5]), 9); rol32 49 crypto/salsa20_generic.c x[ 1] ^= rol32((x[13] + x[ 9]), 13); rol32 50 crypto/salsa20_generic.c x[ 5] ^= rol32((x[ 1] + x[13]), 18); rol32 51 crypto/salsa20_generic.c x[14] ^= rol32((x[10] + x[ 6]), 7); rol32 52 crypto/salsa20_generic.c x[ 2] ^= rol32((x[14] + x[10]), 9); rol32 53 crypto/salsa20_generic.c x[ 6] ^= rol32((x[ 2] + x[14]), 13); rol32 54 crypto/salsa20_generic.c x[10] ^= rol32((x[ 6] + x[ 2]), 18); rol32 55 crypto/salsa20_generic.c x[ 3] ^= rol32((x[15] + x[11]), 7); rol32 56 crypto/salsa20_generic.c x[ 7] ^= rol32((x[ 3] + x[15]), 9); rol32 57 crypto/salsa20_generic.c x[11] ^= rol32((x[ 7] + x[ 3]), 13); rol32 58 crypto/salsa20_generic.c x[15] ^= rol32((x[11] + x[ 7]), 18); rol32 59 crypto/salsa20_generic.c x[ 1] ^= rol32((x[ 0] + x[ 3]), 7); rol32 60 crypto/salsa20_generic.c x[ 2] ^= rol32((x[ 1] + x[ 0]), 9); rol32 61 crypto/salsa20_generic.c x[ 3] ^= rol32((x[ 2] + x[ 1]), 13); rol32 62 crypto/salsa20_generic.c x[ 0] ^= rol32((x[ 3] + x[ 2]), 18); rol32 63 crypto/salsa20_generic.c x[ 6] ^= rol32((x[ 5] + x[ 4]), 7); rol32 64 crypto/salsa20_generic.c x[ 7] ^= rol32((x[ 6] + x[ 5]), 9); rol32 65 crypto/salsa20_generic.c x[ 4] ^= rol32((x[ 7] + x[ 6]), 13); rol32 66 crypto/salsa20_generic.c x[ 5] ^= rol32((x[ 4] + x[ 7]), 18); rol32 67 crypto/salsa20_generic.c x[11] ^= rol32((x[10] + x[ 9]), 7); rol32 68 crypto/salsa20_generic.c x[ 8] ^= rol32((x[11] + x[10]), 9); rol32 69 crypto/salsa20_generic.c x[ 9] ^= rol32((x[ 8] + x[11]), 13); rol32 70 crypto/salsa20_generic.c x[10] ^= rol32((x[ 9] + x[ 8]), 18); rol32 71 crypto/salsa20_generic.c x[12] ^= rol32((x[15] + x[14]), 7); rol32 72 crypto/salsa20_generic.c x[13] ^= rol32((x[12] + x[15]), 9); rol32 73 crypto/salsa20_generic.c x[14] ^= rol32((x[13] + x[12]), 13); rol32 74 crypto/salsa20_generic.c x[15] ^= rol32((x[14] + x[13]), 18); rol32 30 crypto/serpent_generic.c ({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; }) rol32 47 crypto/serpent_generic.c x0 = rol32(x0, 13);\ rol32 48 crypto/serpent_generic.c x2 = rol32(x2, 3); x1 ^= x0; x4 = x0 << 3; \ rol32 50 crypto/serpent_generic.c x1 = rol32(x1, 1); x3 ^= x4; \ rol32 51 crypto/serpent_generic.c x3 = rol32(x3, 7); x4 = x1; \ rol32 54 crypto/serpent_generic.c x1 ^= k[4*i+1]; x0 = rol32(x0, 5); x2 = rol32(x2, 22);\ rol32 31 crypto/sm3_generic.c return x ^ rol32(x, 9) ^ rol32(x, 17); rol32 36 crypto/sm3_generic.c return x ^ rol32(x, 15) ^ rol32(x, 23); rol32 64 crypto/sm3_generic.c tmp = w[i - 16] ^ w[i - 9] ^ rol32(w[i - 3], 15); rol32 65 crypto/sm3_generic.c w[i] = p1(tmp) ^ (rol32(w[i - 13], 7)) ^ w[i - 6]; rol32 92 crypto/sm3_generic.c ss1 = rol32((rol32(a, 12) + e + rol32(t(i), i & 31)), 7); rol32 94 crypto/sm3_generic.c ss2 = ss1 ^ rol32(a, 12); rol32 103 crypto/sm3_generic.c c = rol32(b, 9); rol32 107 crypto/sm3_generic.c g = rol32(f, 19); rol32 82 crypto/sm4_generic.c return x ^ rol32(x, 13) ^ rol32(x, 23); rol32 88 crypto/sm4_generic.c return x ^ rol32(x, 2) ^ rol32(x, 10) ^ rol32(x, 18) ^ rol32(x, 24); rol32 538 crypto/twofish_common.c y = rol32(y, 8); \ rol32 540 crypto/twofish_common.c ctx->a[(j) + 1] = rol32(y, 9) rol32 551 crypto/twofish_common.c y = rol32(y, 8); \ rol32 553 crypto/twofish_common.c ctx->a[(j) + 1] = rol32(y, 9) rol32 564 crypto/twofish_common.c y = rol32(y, 8); \ rol32 566 crypto/twofish_common.c ctx->a[(j) + 1] = rol32(y, 9) rol32 58 crypto/twofish_generic.c (d) = rol32((d), 1) ^ y rol32 65 crypto/twofish_generic.c (c) = rol32((c), 1); \ rol32 608 drivers/char/random.c w = rol32(*bytes++, input_rotate); rol32 671 drivers/char/random.c b = rol32(b, 6); d = rol32(d, 27); rol32 675 drivers/char/random.c b = rol32(b, 16); d = rol32(d, 14); rol32 679 drivers/char/random.c b = rol32(b, 6); d = rol32(d, 27); rol32 683 drivers/char/random.c b = rol32(b, 16); d = rol32(d, 14); rol32 1547 drivers/char/random.c hash.w[2] ^= rol32(hash.w[2], 16); rol32 85 drivers/leds/leds-mlxreg.c nib = (ror32(data->mask, data->bit) == 0xf0) ? rol32(vset, data->bit) : rol32 86 drivers/leds/leds-mlxreg.c rol32(vset, data->bit + 4); rol32 82 drivers/platform/mellanox/mlxreg-io.c in_val = rol32(in_val, data->bit - 1) & data->mask; rol32 45 fs/ext4/hash.c (a += f(b, c, d) + x, a = rol32(a, s)) rol32 1910 fs/namei.c y ^= x, x = rol32(x, 7),\ rol32 1911 fs/namei.c x += y, y = rol32(y,20),\ rol32 2019 fs/xfs/libxfs/xfs_da_btree.c (name[3] << 0) ^ rol32(hash, 7 * 4); rol32 2027 fs/xfs/libxfs/xfs_da_btree.c rol32(hash, 7 * 3); rol32 2029 fs/xfs/libxfs/xfs_da_btree.c return (name[0] << 7) ^ (name[1] << 0) ^ rol32(hash, 7 * 2); rol32 2031 fs/xfs/libxfs/xfs_da_btree.c return (name[0] << 0) ^ rol32(hash, 7 * 1); rol32 63 fs/xfs/libxfs/xfs_dir2.c hash = tolower(name->name[i]) ^ rol32(hash, 7); rol32 37 include/linux/jhash.h a -= c; a ^= rol32(c, 4); c += b; \ rol32 38 include/linux/jhash.h b -= a; b ^= rol32(a, 6); a += c; \ rol32 39 include/linux/jhash.h c -= b; c ^= rol32(b, 8); b += a; \ rol32 40 include/linux/jhash.h a -= c; a ^= rol32(c, 16); c += b; \ rol32 41 include/linux/jhash.h b -= a; b ^= rol32(a, 19); a += c; \ rol32 42 include/linux/jhash.h c -= b; c ^= rol32(b, 4); b += a; \ rol32 48 include/linux/jhash.h c ^= b; c -= rol32(b, 14); \ rol32 49 include/linux/jhash.h a ^= c; a -= rol32(c, 11); \ rol32 50 include/linux/jhash.h b ^= a; b -= rol32(a, 25); \ rol32 51 include/linux/jhash.h c ^= b; c -= rol32(b, 16); \ rol32 52 include/linux/jhash.h a ^= c; a -= rol32(c, 4); \ rol32 53 include/linux/jhash.h b ^= a; b -= rol32(a, 14); \ rol32 54 include/linux/jhash.h c ^= b; c -= rol32(b, 24); \ rol32 883 include/net/ipv6.h hash = rol32(hash, 16); rol32 23 lib/chacha.c x[0] += x[4]; x[12] = rol32(x[12] ^ x[0], 16); rol32 24 lib/chacha.c x[1] += x[5]; x[13] = rol32(x[13] ^ x[1], 16); rol32 25 lib/chacha.c x[2] += x[6]; x[14] = rol32(x[14] ^ x[2], 16); rol32 26 lib/chacha.c x[3] += x[7]; x[15] = rol32(x[15] ^ x[3], 16); rol32 28 lib/chacha.c x[8] += x[12]; x[4] = rol32(x[4] ^ x[8], 12); rol32 29 lib/chacha.c x[9] += x[13]; x[5] = rol32(x[5] ^ x[9], 12); rol32 30 lib/chacha.c x[10] += x[14]; x[6] = rol32(x[6] ^ x[10], 12); rol32 31 lib/chacha.c x[11] += x[15]; x[7] = rol32(x[7] ^ x[11], 12); rol32 33 lib/chacha.c x[0] += x[4]; x[12] = rol32(x[12] ^ x[0], 8); rol32 34 lib/chacha.c x[1] += x[5]; x[13] = rol32(x[13] ^ x[1], 8); rol32 35 lib/chacha.c x[2] += x[6]; x[14] = rol32(x[14] ^ x[2], 8); rol32 36 lib/chacha.c x[3] += x[7]; x[15] = rol32(x[15] ^ x[3], 8); rol32 38 lib/chacha.c x[8] += x[12]; x[4] = rol32(x[4] ^ x[8], 7); rol32 39 lib/chacha.c x[9] += x[13]; x[5] = rol32(x[5] ^ x[9], 7); rol32 40 lib/chacha.c x[10] += x[14]; x[6] = rol32(x[6] ^ x[10], 7); rol32 41 lib/chacha.c x[11] += x[15]; x[7] = rol32(x[7] ^ x[11], 7); rol32 43 lib/chacha.c x[0] += x[5]; x[15] = rol32(x[15] ^ x[0], 16); rol32 44 lib/chacha.c x[1] += x[6]; x[12] = rol32(x[12] ^ x[1], 16); rol32 45 lib/chacha.c x[2] += x[7]; x[13] = rol32(x[13] ^ x[2], 16); rol32 46 lib/chacha.c x[3] += x[4]; x[14] = rol32(x[14] ^ x[3], 16); rol32 48 lib/chacha.c x[10] += x[15]; x[5] = rol32(x[5] ^ x[10], 12); rol32 49 lib/chacha.c x[11] += x[12]; x[6] = rol32(x[6] ^ x[11], 12); rol32 50 lib/chacha.c x[8] += x[13]; x[7] = rol32(x[7] ^ x[8], 12); rol32 51 lib/chacha.c x[9] += x[14]; x[4] = rol32(x[4] ^ x[9], 12); rol32 53 lib/chacha.c x[0] += x[5]; x[15] = rol32(x[15] ^ x[0], 8); rol32 54 lib/chacha.c x[1] += x[6]; x[12] = rol32(x[12] ^ x[1], 8); rol32 55 lib/chacha.c x[2] += x[7]; x[13] = rol32(x[13] ^ x[2], 8); rol32 56 lib/chacha.c x[3] += x[4]; x[14] = rol32(x[14] ^ x[3], 8); rol32 58 lib/chacha.c x[10] += x[15]; x[5] = rol32(x[5] ^ x[10], 7); rol32 59 lib/chacha.c x[11] += x[12]; x[6] = rol32(x[6] ^ x[11], 7); rol32 60 lib/chacha.c x[8] += x[13]; x[7] = rol32(x[7] ^ x[8], 7); rol32 61 lib/chacha.c x[9] += x[14]; x[4] = rol32(x[4] ^ x[9], 7); rol32 25 lib/crypto/des.c #define ROL(x, r) ((x) = rol32((x), (r))) rol32 53 lib/sha1.c #define SHA_MIX(t) rol32(W(t+13) ^ W(t+8) ^ W(t+2) ^ W(t), 1) rol32 57 lib/sha1.c E += TEMP + rol32(A,5) + (fn) + (constant); \ rol32 394 lib/siphash.c v0 += v1; v1 = rol32(v1, 5); v1 ^= v0; v0 = rol32(v0, 16); \ rol32 395 lib/siphash.c v2 += v3; v3 = rol32(v3, 8); v3 ^= v2; \ rol32 396 lib/siphash.c v0 += v3; v3 = rol32(v3, 7); v3 ^= v0; \ rol32 397 lib/siphash.c v2 += v1; v1 = rol32(v1, 13); v1 ^= v2; v2 = rol32(v2, 16); \ rol32 99 net/ipv6/seg6_iptunnel.c hash = rol32(hash, 16); rol32 16 net/mac80211/michael.c mctx->r ^= rol32(mctx->l, 17); rol32 21 net/mac80211/michael.c mctx->r ^= rol32(mctx->l, 3); rol32 37 tools/include/linux/jhash.h a -= c; a ^= rol32(c, 4); c += b; \ rol32 38 tools/include/linux/jhash.h b -= a; b ^= rol32(a, 6); a += c; \ rol32 39 tools/include/linux/jhash.h c -= b; c ^= rol32(b, 8); b += a; \ rol32 40 tools/include/linux/jhash.h a -= c; a ^= rol32(c, 16); c += b; \ rol32 41 tools/include/linux/jhash.h b -= a; b ^= rol32(a, 19); a += c; \ rol32 42 tools/include/linux/jhash.h c -= b; c ^= rol32(b, 4); b += a; \ rol32 48 tools/include/linux/jhash.h c ^= b; c -= rol32(b, 14); \ rol32 49 tools/include/linux/jhash.h a ^= c; a -= rol32(c, 11); \ rol32 50 tools/include/linux/jhash.h b ^= a; b -= rol32(a, 25); \ rol32 51 tools/include/linux/jhash.h c ^= b; c -= rol32(b, 16); \ rol32 52 tools/include/linux/jhash.h a ^= c; a -= rol32(c, 4); \ rol32 53 tools/include/linux/jhash.h b ^= a; b -= rol32(a, 14); \ rol32 54 tools/include/linux/jhash.h c ^= b; c -= rol32(b, 24); \ rol32 14 tools/testing/selftests/bpf/progs/test_jhash.h a -= c; a ^= rol32(c, 4); c += b; \ rol32 15 tools/testing/selftests/bpf/progs/test_jhash.h b -= a; b ^= rol32(a, 6); a += c; \ rol32 16 tools/testing/selftests/bpf/progs/test_jhash.h c -= b; c ^= rol32(b, 8); b += a; \ rol32 17 tools/testing/selftests/bpf/progs/test_jhash.h a -= c; a ^= rol32(c, 16); c += b; \ rol32 18 tools/testing/selftests/bpf/progs/test_jhash.h b -= a; b ^= rol32(a, 19); a += c; \ rol32 19 tools/testing/selftests/bpf/progs/test_jhash.h c -= b; c ^= rol32(b, 4); b += a; \ rol32 24 tools/testing/selftests/bpf/progs/test_jhash.h c ^= b; c -= rol32(b, 14); \ rol32 25 tools/testing/selftests/bpf/progs/test_jhash.h a ^= c; a -= rol32(c, 11); \ rol32 26 tools/testing/selftests/bpf/progs/test_jhash.h b ^= a; b -= rol32(a, 25); \ rol32 27 tools/testing/selftests/bpf/progs/test_jhash.h c ^= b; c -= rol32(b, 16); \ rol32 28 tools/testing/selftests/bpf/progs/test_jhash.h a ^= c; a -= rol32(c, 4); \ rol32 29 tools/testing/selftests/bpf/progs/test_jhash.h b ^= a; b -= rol32(a, 14); \ rol32 30 tools/testing/selftests/bpf/progs/test_jhash.h c ^= b; c -= rol32(b, 24); \ rol32 36 tools/testing/selftests/bpf/progs/test_l4lb.c a -= c; a ^= rol32(c, 4); c += b; \ rol32 37 tools/testing/selftests/bpf/progs/test_l4lb.c b -= a; b ^= rol32(a, 6); a += c; \ rol32 38 tools/testing/selftests/bpf/progs/test_l4lb.c c -= b; c ^= rol32(b, 8); b += a; \ rol32 39 tools/testing/selftests/bpf/progs/test_l4lb.c a -= c; a ^= rol32(c, 16); c += b; \ rol32 40 tools/testing/selftests/bpf/progs/test_l4lb.c b -= a; b ^= rol32(a, 19); a += c; \ rol32 41 tools/testing/selftests/bpf/progs/test_l4lb.c c -= b; c ^= rol32(b, 4); b += a; \ rol32 46 tools/testing/selftests/bpf/progs/test_l4lb.c c ^= b; c -= rol32(b, 14); \ rol32 47 tools/testing/selftests/bpf/progs/test_l4lb.c a ^= c; a -= rol32(c, 11); \ rol32 48 tools/testing/selftests/bpf/progs/test_l4lb.c b ^= a; b -= rol32(a, 25); \ rol32 49 tools/testing/selftests/bpf/progs/test_l4lb.c c ^= b; c -= rol32(b, 16); \ rol32 50 tools/testing/selftests/bpf/progs/test_l4lb.c a ^= c; a -= rol32(c, 4); \ rol32 51 tools/testing/selftests/bpf/progs/test_l4lb.c b ^= a; b -= rol32(a, 14); \ rol32 52 tools/testing/selftests/bpf/progs/test_l4lb.c c ^= b; c -= rol32(b, 24); \ rol32 32 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c a -= c; a ^= rol32(c, 4); c += b; \ rol32 33 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c b -= a; b ^= rol32(a, 6); a += c; \ rol32 34 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c c -= b; c ^= rol32(b, 8); b += a; \ rol32 35 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c a -= c; a ^= rol32(c, 16); c += b; \ rol32 36 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c b -= a; b ^= rol32(a, 19); a += c; \ rol32 37 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c c -= b; c ^= rol32(b, 4); b += a; \ rol32 42 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c c ^= b; c -= rol32(b, 14); \ rol32 43 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c a ^= c; a -= rol32(c, 11); \ rol32 44 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c b ^= a; b -= rol32(a, 25); \ rol32 45 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c c ^= b; c -= rol32(b, 16); \ rol32 46 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c a ^= c; a -= rol32(c, 4); \ rol32 47 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c b ^= a; b -= rol32(a, 14); \ rol32 48 tools/testing/selftests/bpf/progs/test_l4lb_noinline.c c ^= b; c -= rol32(b, 24); \ rol32 29 tools/testing/selftests/bpf/progs/test_xdp_noinline.c a -= c; a ^= rol32(c, 4); c += b; \ rol32 30 tools/testing/selftests/bpf/progs/test_xdp_noinline.c b -= a; b ^= rol32(a, 6); a += c; \ rol32 31 tools/testing/selftests/bpf/progs/test_xdp_noinline.c c -= b; c ^= rol32(b, 8); b += a; \ rol32 32 tools/testing/selftests/bpf/progs/test_xdp_noinline.c a -= c; a ^= rol32(c, 16); c += b; \ rol32 33 tools/testing/selftests/bpf/progs/test_xdp_noinline.c b -= a; b ^= rol32(a, 19); a += c; \ rol32 34 tools/testing/selftests/bpf/progs/test_xdp_noinline.c c -= b; c ^= rol32(b, 4); b += a; \ rol32 39 tools/testing/selftests/bpf/progs/test_xdp_noinline.c c ^= b; c -= rol32(b, 14); \ rol32 40 tools/testing/selftests/bpf/progs/test_xdp_noinline.c a ^= c; a -= rol32(c, 11); \ rol32 41 tools/testing/selftests/bpf/progs/test_xdp_noinline.c b ^= a; b -= rol32(a, 25); \ rol32 42 tools/testing/selftests/bpf/progs/test_xdp_noinline.c c ^= b; c -= rol32(b, 16); \ rol32 43 tools/testing/selftests/bpf/progs/test_xdp_noinline.c a ^= c; a -= rol32(c, 4); \ rol32 44 tools/testing/selftests/bpf/progs/test_xdp_noinline.c b ^= a; b -= rol32(a, 14); \ rol32 45 tools/testing/selftests/bpf/progs/test_xdp_noinline.c c ^= b; c -= rol32(b, 24); \