OXIESEC PANEL
- Current Dir:
/
/
usr
/
src
/
linux-headers-4.15.0-197
/
arch
/
riscv
/
include
/
uapi
/
asm
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
11/17/2022 06:42:16 AM
rwxr-xr-x
📄
Kbuild
626 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
auxvec.h
898 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
bitsperlong.h
893 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
byteorder.h
843 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
elf.h
2.3 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
hwcap.h
1.37 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
ptrace.h
1.97 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sigcontext.h
923 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
siginfo.h
816 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
syscalls.h
1.02 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
ucontext.h
1.79 KB
01/28/2018 09:20:33 PM
rw-r--r--
Editing: syscalls.h
Close
/* SPDX-License-Identifier: GPL-2.0 */ /* * Copyright (C) 2017 SiFive */ #ifndef _ASM__UAPI__SYSCALLS_H #define _ASM__UAPI__SYSCALLS_H /* * Allows the instruction cache to be flushed from userspace. Despite RISC-V * having a direct 'fence.i' instruction available to userspace (which we * can't trap!), that's not actually viable when running on Linux because the * kernel might schedule a process on another hart. There is no way for * userspace to handle this without invoking the kernel (as it doesn't know the * thread->hart mappings), so we've defined a RISC-V specific system call to * flush the instruction cache. * * __NR_riscv_flush_icache is defined to flush the instruction cache over an * address range, with the flush applying to either all threads or just the * caller. We don't currently do anything with the address range, that's just * in there for forwards compatibility. */ #define __NR_riscv_flush_icache (__NR_arch_specific_syscall + 15) __SYSCALL(__NR_riscv_flush_icache, sys_riscv_flush_icache) #endif