OXIESEC PANEL
- Current Dir:
/
/
usr
/
src
/
linux-headers-4.15.0-213
/
arch
/
arm64
/
include
/
asm
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
05/09/2024 07:14:12 AM
rwxr-xr-x
📄
Kbuild
703 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
acenv.h
541 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
acpi.h
4.34 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
alternative.h
7.63 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
arch_gicv3.h
3.44 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
arch_timer.h
4.87 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
arm-cci.h
794 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
asm-bug.h
1.45 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
asm-offsets.h
35 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
asm-uaccess.h
2.09 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
assembler.h
13.51 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
atomic.h
8.35 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
atomic_ll_sc.h
10.61 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
atomic_lse.h
14.82 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
barrier.h
3.78 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
bitops.h
1.9 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
bitrev.h
452 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
boot.h
384 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
brk-imm.h
706 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
bug.h
1.09 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
cache.h
2.23 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
cacheflush.h
4.87 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
checksum.h
1.35 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
clocksource.h
192 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cmpxchg.h
7.98 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
compat.h
7.15 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
compiler.h
1.18 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
cpu.h
1.84 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
cpu_ops.h
2.73 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
cpucaps.h
1.87 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
cpufeature.h
19.14 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
cpuidle.h
401 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cputype.h
8.1 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
current.h
517 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
daifflags.h
1.59 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
dcc.h
1.36 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
debug-monitors.h
3.76 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
device.h
886 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
dma-mapping.h
2.42 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
dmi.h
850 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
efi.h
4.57 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
elf.h
5.7 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
esr.h
9.02 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
exception.h
1.21 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
exec.h
868 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
extable.h
815 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
fb.h
1000 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
fixmap.h
2.91 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
fpsimd.h
4.21 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
fpsimdmacros.h
5.62 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
ftrace.h
1.92 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
futex.h
3.41 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
hardirq.h
2.08 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
hugetlb.h
2.71 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
hw_breakpoint.h
4.46 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
hwcap.h
1.86 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
hypervisor.h
144 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
insn.h
16.03 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
io.h
7.72 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
irq.h
307 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
irq_work.h
228 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
irqflags.h
2.3 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
jump_label.h
1.68 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
kasan.h
1.16 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
kernel-pgtable.h
4.03 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
kexec.h
2.42 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
kgdb.h
3.79 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
kprobes.h
1.74 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
kvm_arm.h
8.38 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
kvm_asm.h
4.26 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
kvm_coproc.h
2.04 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
kvm_emulate.h
10.38 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
kvm_host.h
15.73 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
kvm_hyp.h
5.79 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
kvm_mmio.h
1.3 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
kvm_mmu.h
11.72 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
linkage.h
114 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
lse.h
1.26 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
memblock.h
720 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
memory.h
9.16 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
mmu.h
2.76 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
mmu_context.h
6.35 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
mmzone.h
266 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
module.h
2.8 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
neon.h
815 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
numa.h
1.33 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
page-def.h
1.17 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
page.h
1.61 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
paravirt.h
458 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
pci.h
878 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
percpu.h
7.48 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
perf_event.h
3.17 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
pgalloc.h
3.71 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
pgtable-hwdef.h
9.4 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
pgtable-prot.h
4.38 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
pgtable-types.h
1.84 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
pgtable.h
21.55 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
probes.h
1022 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
proc-fns.h
1.21 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
processor.h
6.52 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
ptdump.h
1.42 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
ptrace.h
9 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
sdei.h
1.46 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
seccomp.h
714 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sections.h
1.46 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
shmparam.h
965 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
signal32.h
1.45 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
simd.h
1.39 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
smp.h
4.23 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
smp_plat.h
1.43 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sparsemem.h
771 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
spinlock.h
3.33 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
spinlock_types.h
1.06 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
stack_pointer.h
247 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
stackprotector.h
1.11 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
stacktrace.h
2.53 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
stage2_pgtable-nopmd.h
1.3 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
stage2_pgtable-nopud.h
1.24 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
stage2_pgtable.h
4.89 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
stat.h
1.43 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
string.h
2.33 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
suspend.h
1.65 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sync_bitops.h
1.11 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
syscall.h
2.87 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sysreg.h
25.1 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
system_misc.h
1.86 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
thread_info.h
3.93 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
timex.h
883 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
tlb.h
2.22 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
tlbflush.h
5.38 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
topology.h
1.29 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
traps.h
3.33 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
uaccess.h
12.01 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
unistd.h
1.6 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
unistd32.h
27.53 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
uprobes.h
777 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
vdso.h
1.09 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
vdso_datapage.h
1.53 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
vectors.h
1.75 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
virt.h
3 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
vmap_stack.h
769 bytes
06/16/2023 05:32:39 PM
rw-r--r--
📄
word-at-a-time.h
2.22 KB
06/16/2023 05:32:39 PM
rw-r--r--
📁
xen
-
05/09/2024 07:14:16 AM
rwxr-xr-x
Editing: efi.h
Close
/* SPDX-License-Identifier: GPL-2.0 */ #ifndef _ASM_EFI_H #define _ASM_EFI_H #include <asm/boot.h> #include <asm/cpufeature.h> #include <asm/fpsimd.h> #include <asm/io.h> #include <asm/memory.h> #include <asm/mmu_context.h> #include <asm/neon.h> #include <asm/ptrace.h> #include <asm/tlbflush.h> #ifdef CONFIG_EFI extern void efi_init(void); #else #define efi_init() #endif int efi_create_mapping(struct mm_struct *mm, efi_memory_desc_t *md); int efi_set_mapping_permissions(struct mm_struct *mm, efi_memory_desc_t *md); #define arch_efi_call_virt_setup() \ ({ \ efi_virtmap_load(); \ __efi_fpsimd_begin(); \ }) #define arch_efi_call_virt(p, f, args...) \ ({ \ efi_##f##_t *__f; \ __f = p->f; \ __f(args); \ }) #define arch_efi_call_virt_teardown() \ ({ \ __efi_fpsimd_end(); \ efi_virtmap_unload(); \ }) #define ARCH_EFI_IRQ_FLAGS_MASK (PSR_D_BIT | PSR_A_BIT | PSR_I_BIT | PSR_F_BIT) /* arch specific definitions used by the stub code */ /* * AArch64 requires the DTB to be 8-byte aligned in the first 512MiB from * start of kernel and may not cross a 2MiB boundary. We set alignment to * 2MiB so we know it won't cross a 2MiB boundary. */ #define EFI_FDT_ALIGN SZ_2M /* used by allocate_new_fdt_and_exit_boot() */ /* * In some configurations (e.g. VMAP_STACK && 64K pages), stacks built into the * kernel need greater alignment than we require the segments to be padded to. */ #define EFI_KIMG_ALIGN \ (SEGMENT_ALIGN > THREAD_ALIGN ? SEGMENT_ALIGN : THREAD_ALIGN) /* on arm64, the FDT may be located anywhere in system RAM */ static inline unsigned long efi_get_max_fdt_addr(unsigned long dram_base) { return ULONG_MAX; } /* * On arm64, we have to ensure that the initrd ends up in the linear region, * which is a 1 GB aligned region of size '1UL << (VA_BITS - 1)' that is * guaranteed to cover the kernel Image. * * Since the EFI stub is part of the kernel Image, we can relax the * usual requirements in Documentation/arm64/booting.txt, which still * apply to other bootloaders, and are required for some kernel * configurations. */ static inline unsigned long efi_get_max_initrd_addr(unsigned long dram_base, unsigned long image_addr) { return (image_addr & ~(SZ_1G - 1UL)) + (1UL << (VA_BITS - 1)); } #define efi_call_early(f, ...) sys_table_arg->boottime->f(__VA_ARGS__) #define __efi_call_early(f, ...) f(__VA_ARGS__) #define efi_call_runtime(f, ...) sys_table_arg->runtime->f(__VA_ARGS__) #define efi_is_64bit() (true) #define efi_call_proto(protocol, f, instance, ...) \ ((protocol##_t *)instance)->f(instance, ##__VA_ARGS__) #define alloc_screen_info(x...) &screen_info static inline void free_screen_info(efi_system_table_t *sys_table_arg, struct screen_info *si) { } /* redeclare as 'hidden' so the compiler will generate relative references */ extern struct screen_info screen_info __attribute__((__visibility__("hidden"))); static inline void efifb_setup_from_dmi(struct screen_info *si, const char *opt) { } #define EFI_ALLOC_ALIGN SZ_64K /* * On ARM systems, virtually remapped UEFI runtime services are set up in two * distinct stages: * - The stub retrieves the final version of the memory map from UEFI, populates * the virt_addr fields and calls the SetVirtualAddressMap() [SVAM] runtime * service to communicate the new mapping to the firmware (Note that the new * mapping is not live at this time) * - During an early initcall(), the EFI system table is permanently remapped * and the virtual remapping of the UEFI Runtime Services regions is loaded * into a private set of page tables. If this all succeeds, the Runtime * Services are enabled and the EFI_RUNTIME_SERVICES bit set. */ static inline void efi_set_pgd(struct mm_struct *mm) { __switch_mm(mm); if (system_uses_ttbr0_pan()) { if (mm != current->active_mm) { /* * Update the current thread's saved ttbr0 since it is * restored as part of a return from exception. Enable * access to the valid TTBR0_EL1 and invoke the errata * workaround directly since there is no return from * exception when invoking the EFI run-time services. */ update_saved_ttbr0(current, mm); uaccess_ttbr0_enable(); post_ttbr_update_workaround(); } else { /* * Defer the switch to the current thread's TTBR0_EL1 * until uaccess_enable(). Restore the current * thread's saved ttbr0 corresponding to its active_mm */ uaccess_ttbr0_disable(); update_saved_ttbr0(current, current->active_mm); } } } void efi_virtmap_load(void); void efi_virtmap_unload(void); #endif /* _ASM_EFI_H */