/linux-master/arch/x86/crypto/ |
H A D | aesni-intel_asm.S | 1660 call _key_expansion_256a 1662 call _key_expansion_256b 1664 call _key_expansion_256a 1666 call _key_expansion_256b 1668 call _key_expansion_256a 1670 call _key_expansion_256b 1672 call _key_expansion_256a 1674 call _key_expansion_256b 1676 call _key_expansion_256a 1678 call _key_expansion_256 [all...] |
H A D | aria-aesni-avx-asm_64.S | 988 call __aria_aesni_avx_crypt_16way; 1013 call __aria_aesni_avx_crypt_16way; 1109 call __aria_aesni_avx_ctr_gen_keystream_16way; 1117 call __aria_aesni_avx_crypt_16way; 1284 call __aria_aesni_avx_gfni_crypt_16way; 1309 call __aria_aesni_avx_gfni_crypt_16way; 1329 call __aria_aesni_avx_ctr_gen_keystream_16way 1337 call __aria_aesni_avx_gfni_crypt_16way;
|
H A D | aria-aesni-avx2-asm_64.S | 985 call __aria_aesni_avx2_crypt_32way; 1010 call __aria_aesni_avx2_crypt_32way; 1188 call __aria_aesni_avx2_ctr_gen_keystream_32way; 1196 call __aria_aesni_avx2_crypt_32way; 1363 call __aria_aesni_avx2_gfni_crypt_32way; 1388 call __aria_aesni_avx2_gfni_crypt_32way; 1408 call __aria_aesni_avx2_ctr_gen_keystream_32way 1416 call __aria_aesni_avx2_gfni_crypt_32way;
|
H A D | aria-gfni-avx512-asm_64.S | 797 call __aria_gfni_avx512_crypt_64way; 822 call __aria_gfni_avx512_crypt_64way; 939 call __aria_gfni_avx512_ctr_gen_keystream_64way 947 call __aria_gfni_avx512_crypt_64way;
|
H A D | camellia-aesni-avx-asm_64.S | 215 call roundsm16_x0_x1_x2_x3_x4_x5_x6_x7_y0_y1_y2_y3_y4_y5_y6_y7_cd; \ 227 call roundsm16_x4_x5_x6_x7_x0_x1_x2_x3_y4_y5_y6_y7_y0_y1_y2_y3_ab; \ 900 call __camellia_enc_blk16; 930 call __camellia_dec_blk16; 964 call __camellia_dec_blk16;
|
H A D | camellia-aesni-avx2-asm_64.S | 247 call roundsm32_x0_x1_x2_x3_x4_x5_x6_x7_y0_y1_y2_y3_y4_y5_y6_y7_cd; \ 259 call roundsm32_x4_x5_x6_x7_x0_x1_x2_x3_y4_y5_y6_y7_y0_y1_y2_y3_ab; \ 936 call __camellia_enc_blk32; 970 call __camellia_dec_blk32; 1017 call __camellia_dec_blk32;
|
H A D | cast5-avx-x86_64-asm_64.S | 385 call __cast5_enc_blk16; 423 call __cast5_dec_blk16; 462 call __cast5_dec_blk16; 541 call __cast5_enc_blk16;
|
H A D | cast6-avx-x86_64-asm_64.S | 360 call __cast6_enc_blk8; 383 call __cast6_dec_blk8; 408 call __cast6_dec_blk8;
|
H A D | chacha-ssse3-x86_64.S | 133 call chacha_permute 214 call chacha_permute
|
H A D | ghash-clmulni-intel_asm.S | 98 call __clmul_gf128mul_ble 122 call __clmul_gf128mul_ble
|
H A D | poly1305-x86_64-cryptogams.pl | 446 call __poly1305_block # r^2 515 call __poly1305_block # r^3 555 call __poly1305_block # r^4 686 call __poly1305_block 793 call __poly1305_block 821 call __poly1305_init_avx 1610 call __poly1305_block 1722 call __poly1305_block 1754 call __poly1305_init_avx 4098 call *__imp_RtlVirtualUnwin [all...] |
H A D | serpent-avx-x86_64-asm_64.S | 669 call __serpent_enc_blk8_avx; 687 call __serpent_dec_blk8_avx; 705 call __serpent_dec_blk8_avx;
|
H A D | serpent-avx2-asm_64.S | 671 call __serpent_enc_blk16; 693 call __serpent_dec_blk16; 715 call __serpent_dec_blk16;
|
H A D | sm4-aesni-avx-asm_64.S | 393 call __sm4_crypt_blk8; 464 call __sm4_crypt_blk8; 511 call __sm4_crypt_blk8;
|
H A D | sm4-aesni-avx2-asm_64.S | 365 call __sm4_crypt_blk16; 414 call __sm4_crypt_blk16;
|
H A D | twofish-avx-x86_64-asm_64.S | 323 call __twofish_enc_blk8; 343 call __twofish_dec_blk8; 366 call __twofish_dec_blk8;
|
/linux-master/arch/x86/entry/ |
H A D | calling.h | 15 x86 function call convention, 64-bit: 23 functions when it sees tail-call optimization possibilities) rflags is 64 * 64-bit system call stack frame layout defines and helpers, 372 call stackleak_erase 390 call stackleak_erase 447 call \func 478 call \func
|
H A D | entry_32.S | 5 * entry_32.S contains the system-call and low-level fault and trap handling routines. 647 call \cfunc 698 * When switching from a shallower to a deeper call stack 736 call ret_from_fork 758 * if X86_FEATURE_SEP is available. This is the preferred system call 777 * eax system call number 835 call do_SYSENTER_32 905 * 32-bit legacy system call entry. 916 * call. (64-bit programs can use INT $0x80 as well, but they can 924 * eax system call numbe [all...] |
H A D | entry_64.S | 9 * entry.S contains the system-call and fault low-level handling routines. 69 * rax system call number 121 call do_syscall_64 /* returns with IRQs disabled */ 199 * When switching from a shallower to a deeper call stack 244 call ret_from_fork 298 ALTERNATIVE "call error_entry; movq %rax, %rsp", \ 299 "call xen_error_entry", X86_FEATURE_XENPV 311 call \cfunc 350 * int3 handler to emulate a call instruction. 414 call paranoid_entr [all...] |
H A D | entry_64_compat.S | 3 * Compatibility mode system call entry point for x86-64. 41 * eax system call number 120 call do_SYSENTER_32 167 * eax system call number 212 call do_fast_syscall_32 252 * when the system call started, which is already known to user 282 * int 0x80 is used by 32 bit mode as a system call entry. Normally idt entries 283 * point to C routines, however since this is a system call interface the branch
|
H A D | entry_64_fred.S | 38 call fred_entry_from_user 54 call fred_entry_from_kernel 68 * because there is no need to protect from reentrancy and the call 116 call __fred_entry_from_kvm /* Call the C entry point */
|
/linux-master/arch/x86/entry/syscalls/ |
H A D | Makefile | 29 $(call if_changed,syshdr) 34 $(call if_changed,syshdr) 39 $(call if_changed,syshdr) 43 $(call if_changed,syshdr) 48 $(call if_changed,syshdr) 52 $(call if_changed,systbl) 55 $(call if_changed,systbl) 58 $(call if_changed,systbl) 61 $(call if_changed,hypercalls)
|
/linux-master/arch/x86/entry/vdso/ |
H A D | Makefile | 64 $(call if_changed,vdso_and_check) 73 $(call if_changed,vdso2c) 127 $(call if_changed,x32) 133 $(call if_changed,objcopy) 136 $(call if_changed,vdso_and_check) 157 KBUILD_CFLAGS_32 += $(call cc-option, -foptimize-sibling-calls) 170 $(call if_changed,vdso_and_check) 182 $(call ld-option, --eh-frame-hdr) -Bsymbolic -z noexecstack
|
H A D | vsgx.S | 128 * injection) protection before making the call. 132 call *%rax
|
/linux-master/arch/x86/include/asm/ |
H A D | alternative.h | 157 #define ALT_CALL_INSTR "call BUG_func" 294 /* Like alternative_io, but for replacing a direct call with another one. */ 296 asm_inline volatile (ALTERNATIVE("call %c[old]", "call %c[new]", ft_flags) \ 307 asm_inline volatile (ALTERNATIVE_2("call %c[old]", "call %c[new1]", ft_flags1, \ 308 "call %c[new2]", ft_flags2) \ 321 * alternative_{input,io,call}() 382 call BUG_func
|