OXIESEC PANEL
- Current Dir:
/
/
usr
/
src
/
linux-headers-4.15.0-197
/
arch
/
x86
/
include
/
asm
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
11/17/2022 06:42:16 AM
rwxr-xr-x
📄
Kbuild
294 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
a.out-core.h
1.89 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
acenv.h
1.56 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
acpi.h
4.76 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
agp.h
1.04 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
alternative-asm.h
2.43 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
alternative.h
8.28 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
amd_nb.h
2.98 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
apb_timer.h
1.43 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
apic.h
14.53 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
apic_flat_64.h
151 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
apicdef.h
11.26 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
apm.h
1.8 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
arch_hweight.h
1.28 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
archrandom.h
3.03 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
asm-offsets.h
35 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
asm-prototypes.h
946 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
asm.h
4.97 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
atomic.h
6.02 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
atomic64_32.h
8.71 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
atomic64_64.h
6.31 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
barrier.h
3.6 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
bios_ebda.h
914 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
bitops.h
13.78 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
boot.h
1.53 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
bootparam_utils.h
2.86 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
bug.h
2.07 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
bugs.h
493 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cache.h
641 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cacheflush.h
306 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cacheinfo.h
209 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
calgary.h
2.31 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
ce4100.h
121 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
checksum.h
133 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
checksum_32.h
4.86 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
checksum_64.h
5.41 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
clocksource.h
488 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cmdline.h
302 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cmpxchg.h
7.68 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
cmpxchg_32.h
3.15 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
cmpxchg_64.h
543 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
compat.h
7.37 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
cpu.h
975 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cpu_device_id.h
1.38 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
cpu_entry_area.h
2.27 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
cpufeature.h
7.75 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
cpufeatures.h
24.62 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
cpumask.h
408 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
crash.h
320 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📁
crypto
-
11/17/2022 06:42:22 AM
rwxr-xr-x
📄
current.h
443 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
debugreg.h
2.67 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
delay.h
208 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
desc.h
11.42 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
desc_defs.h
3.16 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
device.h
568 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
disabled-features.h
2.31 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
div64.h
1.79 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
dma-mapping.h
2.4 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
dma.h
9.58 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
dmi.h
556 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
dwarf2.h
2.43 KB
01/28/2018 09:20:33 PM
rw-r--r--
📁
e820
-
11/17/2022 06:42:22 AM
rwxr-xr-x
📄
edac.h
474 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
efi.h
6.9 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
elf.h
10.82 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
emergency-restart.h
202 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
entry_arch.h
1.88 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
espfix.h
426 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
exec.h
37 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
export.h
120 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
extable.h
1.27 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
fb.h
540 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
fixmap.h
6.04 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
floppy.h
6.59 KB
01/28/2018 09:20:33 PM
rw-r--r--
📁
fpu
-
11/17/2022 06:42:22 AM
rwxr-xr-x
📄
frame.h
815 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
ftrace.h
1.8 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
futex.h
2.2 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
gart.h
2.64 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
genapic.h
22 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
geode.h
842 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
hardirq.h
2.3 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
highmem.h
2.6 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
hpet.h
3.38 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
hugetlb.h
2.15 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
hw_breakpoint.h
1.96 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
hw_irq.h
3.85 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
hypervisor.h
1.84 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
i8259.h
1.93 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
ia32.h
1.46 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
ia32_unistd.h
313 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
imr.h
1.81 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
inat.h
6.58 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
inat_types.h
1013 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
init.h
632 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
insn-eval.h
837 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
insn.h
7.46 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
inst.h
5.07 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
intel-family.h
3.29 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
intel-mid.h
4.91 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
intel_ds.h
793 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
intel_mid_vrtc.h
326 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
intel_pmc_ipc.h
2.08 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
intel_pt.h
292 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
intel_punit_ipc.h
4.56 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
intel_rdt_sched.h
2.59 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
intel_scu_ipc.h
2.3 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
intel_telemetry.h
3.96 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
invpcid.h
1.57 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
io.h
12.21 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
io_apic.h
5.63 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
iomap.h
1.22 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
iommu.h
392 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
iommu_table.h
3.82 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
iosf_mbi.h
5.74 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
ipi.h
2.84 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
irq.h
1.12 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
irq_regs.h
679 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
irq_remapping.h
2.96 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
irq_vectors.h
4.12 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
irq_work.h
397 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
irqdomain.h
1.61 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
irqflags.h
4.38 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
ist.h
735 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
jump_label.h
2.44 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
kasan.h
966 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
kaslr.h
424 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
kbdleds.h
454 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
kdebug.h
752 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
kexec-bzimage64.h
189 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
kexec.h
6.69 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
kgdb.h
2.09 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
kmap_types.h
289 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
kprobes.h
3.82 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
kvm_emulate.h
15.23 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
kvm_guest.h
172 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
kvm_host.h
42.72 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
kvm_page_track.h
2.48 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
kvm_para.h
3 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
kvmclock.h
170 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
linkage.h
581 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
livepatch.h
1.12 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
local.h
3.83 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
local64.h
33 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
mach_timer.h
1.55 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
mach_traps.h
1013 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
math_emu.h
395 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
mc146818rtc.h
2.76 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
mce.h
12.54 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
mem_encrypt.h
2.83 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
microcode.h
4.14 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
microcode_amd.h
1.41 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
microcode_intel.h
2.46 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
misc.h
143 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
mmconfig.h
374 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
mmu.h
1.57 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
mmu_context.h
10.27 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
mmx.h
337 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
mmzone.h
129 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
mmzone_32.h
1.16 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
mmzone_64.h
430 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
module.h
2.05 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
mpspec.h
3.93 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
mpspec_def.h
3.93 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
mpx.h
2.97 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
mshyperv.h
10.69 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
msi.h
392 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
msidef.h
1.77 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
msr-index.h
30.36 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
msr-trace.h
1.35 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
msr.h
10.85 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
mtrr.h
4.62 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
mwait.h
3.74 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
nmi.h
1.39 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
nops.h
4.31 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
nospec-branch.h
10.87 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
numa.h
2.18 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
numa_32.h
256 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📁
numachip
-
11/17/2022 06:42:22 AM
rwxr-xr-x
📄
olpc.h
3.16 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
olpc_ofw.h
1.1 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
orc_lookup.h
1.63 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
orc_types.h
3.47 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
page.h
2.18 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
page_32.h
1.01 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
page_32_types.h
1.7 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
page_64.h
1.42 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
page_64_types.h
2.34 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
page_types.h
2.29 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
paravirt.h
23.31 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
paravirt_types.h
22.15 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
parport.h
314 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
pat.h
768 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
pci-direct.h
995 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
pci-functions.h
654 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
pci.h
3.51 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
pci_64.h
684 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
pci_x86.h
5.71 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
percpu.h
18.97 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
perf_event.h
8.82 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
perf_event_p4.h
26.1 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
pgalloc.h
5.57 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
pgtable-2level.h
2.75 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
pgtable-2level_types.h
867 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
pgtable-3level.h
10.24 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
pgtable-3level_types.h
1.06 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
pgtable-invert.h
1.07 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
pgtable.h
33.91 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
pgtable_32.h
3.1 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
pgtable_32_types.h
2.01 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
pgtable_64.h
7.37 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
pgtable_64_types.h
3.67 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
pgtable_types.h
16.75 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
pkeys.h
3.17 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
platform_sst_audio.h
3.18 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
pm-trace.h
611 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
posix_types.h
144 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
preempt.h
3.04 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
probe_roms.h
273 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
processor-cyrix.h
879 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
processor-flags.h
1.71 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
processor.h
24.54 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
prom.h
1 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
proto.h
1003 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
pti.h
369 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
ptrace.h
8.52 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
purgatory.h
571 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
pvclock-abi.h
1.49 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
pvclock.h
2.64 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
qrwlock.h
199 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
qspinlock.h
2.54 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
qspinlock_paravirt.h
1.85 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
realmode.h
1.76 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
reboot.h
850 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
reboot_fixups.h
183 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
refcount.h
2.83 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
required-features.h
2.81 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
rio.h
2.57 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
rmwcc.h
1.62 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
rwsem.h
7.02 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
seccomp.h
510 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sections.h
465 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
segment.h
9.47 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
serial.h
1.11 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
set_memory.h
3.86 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
setup.h
3.4 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
setup_arch.h
77 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
shmparam.h
193 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sigcontext.h
261 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sigframe.h
2.25 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sighandling.h
649 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
signal.h
2.37 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
simd.h
287 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
smap.h
1.71 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
smp.h
4.73 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
sparsemem.h
1.01 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
spec-ctrl.h
2.81 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
special_insns.h
5.04 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
spinlock.h
1.19 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
spinlock_types.h
719 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sta2x11.h
352 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
stackprotector.h
4.13 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
stacktrace.h
2.57 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
string.h
129 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
string_32.h
7.74 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
string_64.h
3.56 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
suspend.h
131 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
suspend_32.h
822 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
suspend_64.h
1.79 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
svm.h
7.06 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
swiotlb.h
991 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
switch_to.h
2.98 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
sync_bitops.h
3.42 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sys_ia32.h
1.8 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
syscall.h
5.14 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
syscalls.h
1.39 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sysfb.h
2.54 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
tce.h
1.68 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
text-patching.h
2.3 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
thread_info.h
9.33 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
time.h
331 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
timer.h
1 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
timex.h
546 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
tlb.h
1.05 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
tlbbatch.h
332 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
tlbflush.h
17.09 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
topology.h
4.84 KB
11/01/2022 04:52:05 PM
rw-r--r--
📁
trace
-
11/17/2022 06:42:22 AM
rwxr-xr-x
📄
trace_clock.h
406 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
traps.h
5.74 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
tsc.h
1.93 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
uaccess.h
21.69 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
uaccess_32.h
1.54 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
uaccess_64.h
5.32 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
umip.h
329 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
unaligned.h
345 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
unistd.h
1.45 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
unwind.h
3.13 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
unwind_hints.h
3.01 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
uprobes.h
1.57 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
user.h
2.2 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
user32.h
2.11 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
user_32.h
4.92 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
user_64.h
5.21 KB
01/28/2018 09:20:33 PM
rw-r--r--
📁
uv
-
11/17/2022 06:42:22 AM
rwxr-xr-x
📄
vdso.h
1.09 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
vga.h
740 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
vgtod.h
2.13 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
virtext.h
2.62 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
vm86.h
2.16 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
vmx.h
23.5 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
vsyscall.h
635 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
vvar.h
1.38 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
word-at-a-time.h
2.54 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
x86_init.h
9.25 KB
11/01/2022 04:52:05 PM
rw-r--r--
📁
xen
-
11/17/2022 06:42:22 AM
rwxr-xr-x
📄
xor.h
10.26 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
xor_32.h
14.4 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
xor_64.h
716 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
xor_avx.h
4.5 KB
01/28/2018 09:20:33 PM
rw-r--r--
Editing: nospec-branch.h
Close
/* SPDX-License-Identifier: GPL-2.0 */ #ifndef _ASM_X86_NOSPEC_BRANCH_H_ #define _ASM_X86_NOSPEC_BRANCH_H_ #include <linux/static_key.h> #include <asm/alternative.h> #include <asm/alternative-asm.h> #include <asm/cpufeatures.h> #include <asm/msr-index.h> /* * Fill the CPU return stack buffer. * * Each entry in the RSB, if used for a speculative 'ret', contains an * infinite 'pause; lfence; jmp' loop to capture speculative execution. * * This is required in various cases for retpoline and IBRS-based * mitigations for the Spectre variant 2 vulnerability. Sometimes to * eliminate potentially bogus entries from the RSB, and sometimes * purely to ensure that it doesn't get empty, which on some CPUs would * allow predictions from other (unwanted!) sources to be used. * * We define a CPP macro such that it can be used from both .S files and * inline assembly. It's possible to do a .macro and then include that * from C via asm(".include <asm/nospec-branch.h>") but let's not go there. */ #define RSB_CLEAR_LOOPS 32 /* To forcibly overwrite all entries */ #define RSB_FILL_LOOPS 16 /* To avoid underflow */ /* * Google experimented with loop-unrolling and this turned out to be * the optimal version — two calls, each with their own speculation * trap should their return address end up getting used, in a loop. */ #define __FILL_RETURN_BUFFER(reg, nr, sp) \ mov $(nr/2), reg; \ 771: \ call 772f; \ 773: /* speculation trap */ \ pause; \ lfence; \ jmp 773b; \ 772: \ call 774f; \ 775: /* speculation trap */ \ pause; \ lfence; \ jmp 775b; \ 774: \ dec reg; \ jnz 771b; \ add $(BITS_PER_LONG/8) * nr, sp; #ifdef __ASSEMBLY__ /* * This should be used immediately before a retpoline alternative. It tells * objtool where the retpolines are so that it can make sense of the control * flow by just reading the original instruction(s) and ignoring the * alternatives. */ .macro ANNOTATE_NOSPEC_ALTERNATIVE .Lannotate_\@: .pushsection .discard.nospec .long .Lannotate_\@ - . .popsection .endm /* * This should be used immediately before an indirect jump/call. It tells * objtool the subsequent indirect jump/call is vouched safe for retpoline * builds. */ .macro ANNOTATE_RETPOLINE_SAFE .Lannotate_\@: .pushsection .discard.retpoline_safe _ASM_PTR .Lannotate_\@ .popsection .endm /* * These are the bare retpoline primitives for indirect jmp and call. * Do not use these directly; they only exist to make the ALTERNATIVE * invocation below less ugly. */ .macro RETPOLINE_JMP reg:req call .Ldo_rop_\@ .Lspec_trap_\@: pause lfence jmp .Lspec_trap_\@ .Ldo_rop_\@: mov \reg, (%_ASM_SP) ret .endm /* * This is a wrapper around RETPOLINE_JMP so the called function in reg * returns to the instruction after the macro. */ .macro RETPOLINE_CALL reg:req jmp .Ldo_call_\@ .Ldo_retpoline_jmp_\@: RETPOLINE_JMP \reg .Ldo_call_\@: call .Ldo_retpoline_jmp_\@ .endm /* * JMP_NOSPEC and CALL_NOSPEC macros can be used instead of a simple * indirect jmp/call which may be susceptible to the Spectre variant 2 * attack. */ .macro JMP_NOSPEC reg:req #ifdef CONFIG_RETPOLINE ANNOTATE_NOSPEC_ALTERNATIVE ALTERNATIVE_2 __stringify(ANNOTATE_RETPOLINE_SAFE; jmp *\reg), \ __stringify(RETPOLINE_JMP \reg), X86_FEATURE_RETPOLINE, \ __stringify(lfence; ANNOTATE_RETPOLINE_SAFE; jmp *\reg), X86_FEATURE_RETPOLINE_LFENCE #else jmp *\reg #endif .endm .macro CALL_NOSPEC reg:req #ifdef CONFIG_RETPOLINE ANNOTATE_NOSPEC_ALTERNATIVE ALTERNATIVE_2 __stringify(ANNOTATE_RETPOLINE_SAFE; call *\reg), \ __stringify(RETPOLINE_CALL \reg), X86_FEATURE_RETPOLINE,\ __stringify(lfence; ANNOTATE_RETPOLINE_SAFE; call *\reg), X86_FEATURE_RETPOLINE_LFENCE #else call *\reg #endif .endm /* * A simpler FILL_RETURN_BUFFER macro. Don't make people use the CPP * monstrosity above, manually. */ .macro FILL_RETURN_BUFFER reg:req nr:req ftr:req #ifdef CONFIG_RETPOLINE ANNOTATE_NOSPEC_ALTERNATIVE ALTERNATIVE "jmp .Lskip_rsb_\@", \ __stringify(__FILL_RETURN_BUFFER(\reg,\nr,%_ASM_SP)) \ \ftr .Lskip_rsb_\@: #endif .endm #else /* __ASSEMBLY__ */ #define ANNOTATE_NOSPEC_ALTERNATIVE \ "999:\n\t" \ ".pushsection .discard.nospec\n\t" \ ".long 999b - .\n\t" \ ".popsection\n\t" #define ANNOTATE_RETPOLINE_SAFE \ "999:\n\t" \ ".pushsection .discard.retpoline_safe\n\t" \ _ASM_PTR " 999b\n\t" \ ".popsection\n\t" #ifdef CONFIG_RETPOLINE #ifdef CONFIG_X86_64 /* * Inline asm uses the %V modifier which is only in newer GCC * which is ensured when CONFIG_RETPOLINE is defined. */ # define CALL_NOSPEC \ ANNOTATE_NOSPEC_ALTERNATIVE \ ALTERNATIVE_2( \ ANNOTATE_RETPOLINE_SAFE \ "call *%[thunk_target]\n", \ "call __x86_indirect_thunk_%V[thunk_target]\n", \ X86_FEATURE_RETPOLINE, \ "lfence;\n" \ ANNOTATE_RETPOLINE_SAFE \ "call *%[thunk_target]\n", \ X86_FEATURE_RETPOLINE_LFENCE) # define THUNK_TARGET(addr) [thunk_target] "r" (addr) #else /* CONFIG_X86_32 */ /* * For i386 we use the original ret-equivalent retpoline, because * otherwise we'll run out of registers. We don't care about CET * here, anyway. */ # define CALL_NOSPEC \ ANNOTATE_NOSPEC_ALTERNATIVE \ ALTERNATIVE_2( \ ANNOTATE_RETPOLINE_SAFE \ "call *%[thunk_target]\n", \ " jmp 904f;\n" \ " .align 16\n" \ "901: call 903f;\n" \ "902: pause;\n" \ " lfence;\n" \ " jmp 902b;\n" \ " .align 16\n" \ "903: lea 4(%%esp), %%esp;\n" \ " pushl %[thunk_target];\n" \ " ret;\n" \ " .align 16\n" \ "904: call 901b;\n", \ X86_FEATURE_RETPOLINE, \ "lfence;\n" \ ANNOTATE_RETPOLINE_SAFE \ "call *%[thunk_target]\n", \ X86_FEATURE_RETPOLINE_LFENCE) # define THUNK_TARGET(addr) [thunk_target] "rm" (addr) #endif #else /* No retpoline for C / inline asm */ # define CALL_NOSPEC "call *%[thunk_target]\n" # define THUNK_TARGET(addr) [thunk_target] "rm" (addr) #endif /* The Spectre V2 mitigation variants */ enum spectre_v2_mitigation { SPECTRE_V2_NONE, SPECTRE_V2_RETPOLINE, SPECTRE_V2_LFENCE, SPECTRE_V2_EIBRS, SPECTRE_V2_EIBRS_RETPOLINE, SPECTRE_V2_EIBRS_LFENCE, }; /* The indirect branch speculation control variants */ enum spectre_v2_user_mitigation { SPECTRE_V2_USER_NONE, SPECTRE_V2_USER_STRICT, SPECTRE_V2_USER_STRICT_PREFERRED, SPECTRE_V2_USER_PRCTL, SPECTRE_V2_USER_SECCOMP, }; /* The Speculative Store Bypass disable variants */ enum ssb_mitigation { SPEC_STORE_BYPASS_NONE, SPEC_STORE_BYPASS_DISABLE, SPEC_STORE_BYPASS_PRCTL, SPEC_STORE_BYPASS_SECCOMP, }; extern char __indirect_thunk_start[]; extern char __indirect_thunk_end[]; /* * On VMEXIT we must ensure that no RSB predictions learned in the guest * can be followed in the host, by overwriting the RSB completely. Both * retpoline and IBRS mitigations for Spectre v2 need this; only on future * CPUs with IBRS_ALL *might* it be avoided. */ static inline void vmexit_fill_RSB(void) { #ifdef CONFIG_RETPOLINE unsigned long loops; asm volatile (ANNOTATE_NOSPEC_ALTERNATIVE ALTERNATIVE("jmp 910f", __stringify(__FILL_RETURN_BUFFER(%0, RSB_CLEAR_LOOPS, %1)), X86_FEATURE_RETPOLINE) "910:" : "=r" (loops), ASM_CALL_CONSTRAINT : : "memory" ); #endif } static __always_inline void alternative_msr_write(unsigned int msr, u64 val, unsigned int feature) { asm volatile(ALTERNATIVE("", "wrmsr", %c[feature]) : : "c" (msr), "a" ((u32)val), "d" ((u32)(val >> 32)), [feature] "i" (feature) : "memory"); } static inline void indirect_branch_prediction_barrier(void) { u64 val = PRED_CMD_IBPB; alternative_msr_write(MSR_IA32_PRED_CMD, val, X86_FEATURE_USE_IBPB); } /* The Intel SPEC CTRL MSR base value cache */ extern u64 x86_spec_ctrl_base; /* * With retpoline, we must use IBRS to restrict branch prediction * before calling into firmware. * * (Implemented as CPP macros due to header hell.) */ #define firmware_restrict_branch_speculation_start() \ do { \ u64 val = x86_spec_ctrl_base | SPEC_CTRL_IBRS; \ \ preempt_disable(); \ alternative_msr_write(MSR_IA32_SPEC_CTRL, val, \ X86_FEATURE_USE_IBRS_FW); \ } while (0) #define firmware_restrict_branch_speculation_end() \ do { \ u64 val = x86_spec_ctrl_base; \ \ alternative_msr_write(MSR_IA32_SPEC_CTRL, val, \ X86_FEATURE_USE_IBRS_FW); \ preempt_enable(); \ } while (0) DECLARE_STATIC_KEY_FALSE(switch_to_cond_stibp); DECLARE_STATIC_KEY_FALSE(switch_mm_cond_ibpb); DECLARE_STATIC_KEY_FALSE(switch_mm_always_ibpb); DECLARE_STATIC_KEY_FALSE(mds_user_clear); DECLARE_STATIC_KEY_FALSE(mds_idle_clear); DECLARE_STATIC_KEY_FALSE(mmio_stale_data_clear); #include <asm/segment.h> /** * mds_clear_cpu_buffers - Mitigation for MDS and TAA vulnerability * * This uses the otherwise unused and obsolete VERW instruction in * combination with microcode which triggers a CPU buffer flush when the * instruction is executed. */ static __always_inline void mds_clear_cpu_buffers(void) { static const u16 ds = __KERNEL_DS; /* * Has to be the memory-operand variant because only that * guarantees the CPU buffer flush functionality according to * documentation. The register-operand variant does not. * Works with any segment selector, but a valid writable * data segment is the fastest variant. * * "cc" clobber is required because VERW modifies ZF. */ asm volatile("verw %[ds]" : : [ds] "m" (ds) : "cc"); } /** * mds_user_clear_cpu_buffers - Mitigation for MDS and TAA vulnerability * * Clear CPU buffers if the corresponding static key is enabled */ static __always_inline void mds_user_clear_cpu_buffers(void) { if (static_branch_likely(&mds_user_clear)) mds_clear_cpu_buffers(); } /** * mds_idle_clear_cpu_buffers - Mitigation for MDS vulnerability * * Clear CPU buffers if the corresponding static key is enabled */ static inline void mds_idle_clear_cpu_buffers(void) { if (static_branch_likely(&mds_idle_clear)) mds_clear_cpu_buffers(); } #endif /* __ASSEMBLY__ */ /* * Below is used in the eBPF JIT compiler and emits the byte sequence * for the following assembly: * * With retpolines configured: * * callq do_rop * spec_trap: * pause * lfence * jmp spec_trap * do_rop: * mov %rax,(%rsp) * retq * * Without retpolines configured: * * jmp *%rax */ #ifdef CONFIG_RETPOLINE # define RETPOLINE_RAX_BPF_JIT_SIZE 17 # define RETPOLINE_RAX_BPF_JIT() \ EMIT1_off32(0xE8, 7); /* callq do_rop */ \ /* spec_trap: */ \ EMIT2(0xF3, 0x90); /* pause */ \ EMIT3(0x0F, 0xAE, 0xE8); /* lfence */ \ EMIT2(0xEB, 0xF9); /* jmp spec_trap */ \ /* do_rop: */ \ EMIT4(0x48, 0x89, 0x04, 0x24); /* mov %rax,(%rsp) */ \ EMIT1(0xC3); /* retq */ #else # define RETPOLINE_RAX_BPF_JIT_SIZE 2 # define RETPOLINE_RAX_BPF_JIT() \ EMIT2(0xFF, 0xE0); /* jmp *%rax */ #endif #endif /* _ASM_X86_NOSPEC_BRANCH_H_ */