__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
/* SPDX-License-Identifier: GPL-2.0-only */
/*
* Based on arch/arm/include/asm/memory.h
*
* Copyright (C) 2000-2002 Russell King
* Copyright (C) 2012 ARM Ltd.
*
* Note: this file should not be included by non-asm/.h files
*/
#ifndef __ASM_MEMORY_H
#define __ASM_MEMORY_H
#include <linux/const.h>
#include <linux/sizes.h>
#include <asm/page-def.h>
/*
* Size of the PCI I/O space. This must remain a power of two so that
* IO_SPACE_LIMIT acts as a mask for the low bits of I/O addresses.
*/
#define PCI_IO_SIZE SZ_16M
/*
* VMEMMAP_SIZE - allows the whole linear region to be covered by
* a struct page array
*
* If we are configured with a 52-bit kernel VA then our VMEMMAP_SIZE
* needs to cover the memory region from the beginning of the 52-bit
* PAGE_OFFSET all the way to PAGE_END for 48-bit. This allows us to
* keep a constant PAGE_OFFSET and "fallback" to using the higher end
* of the VMEMMAP where 52-bit support is not available in hardware.
*/
#define VMEMMAP_RANGE (_PAGE_END(VA_BITS_MIN) - PAGE_OFFSET)
#define VMEMMAP_SIZE ((VMEMMAP_RANGE >> PAGE_SHIFT) * sizeof(struct page))
/*
* PAGE_OFFSET - the virtual address of the start of the linear map, at the
* start of the TTBR1 address space.
* PAGE_END - the end of the linear map, where all other kernel mappings begin.
* KIMAGE_VADDR - the virtual address of the start of the kernel image.
* VA_BITS - the maximum number of bits for virtual addresses.
*/
#define VA_BITS (CONFIG_ARM64_VA_BITS)
#define _PAGE_OFFSET(va) (-(UL(1) << (va)))
#define PAGE_OFFSET (_PAGE_OFFSET(VA_BITS))
#define KIMAGE_VADDR (MODULES_END)
#define MODULES_END (MODULES_VADDR + MODULES_VSIZE)
#define MODULES_VADDR (_PAGE_END(VA_BITS_MIN))
#define MODULES_VSIZE (SZ_2G)
#define VMEMMAP_START (VMEMMAP_END - VMEMMAP_SIZE)
#define VMEMMAP_END (-UL(SZ_1G))
#define PCI_IO_START (VMEMMAP_END + SZ_8M)
#define PCI_IO_END (PCI_IO_START + PCI_IO_SIZE)
#define FIXADDR_TOP (-UL(SZ_8M))
#if VA_BITS > 48
#ifdef CONFIG_ARM64_16K_PAGES
#define VA_BITS_MIN (47)
#else
#define VA_BITS_MIN (48)
#endif
#else
#define VA_BITS_MIN (VA_BITS)
#endif
#define _PAGE_END(va) (-(UL(1) << ((va) - 1)))
#define KERNEL_START _text
#define KERNEL_END _end
/*
* Generic and Software Tag-Based KASAN modes require 1/8th and 1/16th of the
* kernel virtual address space for storing the shadow memory respectively.
*
* The mapping between a virtual memory address and its corresponding shadow
* memory address is defined based on the formula:
*
* shadow_addr = (addr >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET
*
* where KASAN_SHADOW_SCALE_SHIFT is the order of the number of bits that map
* to a single shadow byte and KASAN_SHADOW_OFFSET is a constant that offsets
* the mapping. Note that KASAN_SHADOW_OFFSET does not point to the start of
* the shadow memory region.
*
* Based on this mapping, we define two constants:
*
* KASAN_SHADOW_START: the start of the shadow memory region;
* KASAN_SHADOW_END: the end of the shadow memory region.
*
* KASAN_SHADOW_END is defined first as the shadow address that corresponds to
* the upper bound of possible virtual kernel memory addresses UL(1) << 64
* according to the mapping formula.
*
* KASAN_SHADOW_START is defined second based on KASAN_SHADOW_END. The shadow
* memory start must map to the lowest possible kernel virtual memory address
* and thus it depends on the actual bitness of the address space.
*
* As KASAN inserts redzones between stack variables, this increases the stack
* memory usage significantly. Thus, we double the (minimum) stack size.
*/
#if defined(CONFIG_KASAN_GENERIC) || defined(CONFIG_KASAN_SW_TAGS)
#define KASAN_SHADOW_OFFSET _AC(CONFIG_KASAN_SHADOW_OFFSET, UL)
#define KASAN_SHADOW_END ((UL(1) << (64 - KASAN_SHADOW_SCALE_SHIFT)) + KASAN_SHADOW_OFFSET)
#define _KASAN_SHADOW_START(va) (KASAN_SHADOW_END - (UL(1) << ((va) - KASAN_SHADOW_SCALE_SHIFT)))
#define KASAN_SHADOW_START _KASAN_SHADOW_START(vabits_actual)
#define PAGE_END KASAN_SHADOW_START
#define KASAN_THREAD_SHIFT 1
#else
#define KASAN_THREAD_SHIFT 0
#define PAGE_END (_PAGE_END(VA_BITS_MIN))
#endif /* CONFIG_KASAN */
#define DIRECT_MAP_PHYSMEM_END __pa(PAGE_END - 1)
#define MIN_THREAD_SHIFT (14 + KASAN_THREAD_SHIFT)
/*
* VMAP'd stacks are allocated at page granularity, so we must ensure that such
* stacks are a multiple of page size.
*/
#if defined(CONFIG_VMAP_STACK) && (MIN_THREAD_SHIFT < PAGE_SHIFT)
#define THREAD_SHIFT PAGE_SHIFT
#else
#define THREAD_SHIFT MIN_THREAD_SHIFT
#endif
#if THREAD_SHIFT >= PAGE_SHIFT
#define THREAD_SIZE_ORDER (THREAD_SHIFT - PAGE_SHIFT)
#endif
#define THREAD_SIZE (UL(1) << THREAD_SHIFT)
/*
* By aligning VMAP'd stacks to 2 * THREAD_SIZE, we can detect overflow by
* checking sp & (1 << THREAD_SHIFT), which we can do cheaply in the entry
* assembly.
*/
#ifdef CONFIG_VMAP_STACK
#define THREAD_ALIGN (2 * THREAD_SIZE)
#else
#define THREAD_ALIGN THREAD_SIZE
#endif
#define IRQ_STACK_SIZE THREAD_SIZE
#define OVERFLOW_STACK_SIZE SZ_4K
#define NVHE_STACK_SHIFT PAGE_SHIFT
#define NVHE_STACK_SIZE (UL(1) << NVHE_STACK_SHIFT)
/*
* With the minimum frame size of [x29, x30], exactly half the combined
* sizes of the hyp and overflow stacks is the maximum size needed to
* save the unwinded stacktrace; plus an additional entry to delimit the
* end.
*/
#define NVHE_STACKTRACE_SIZE ((OVERFLOW_STACK_SIZE + NVHE_STACK_SIZE) / 2 + sizeof(long))
/*
* Alignment of kernel segments (e.g. .text, .data).
*
* 4 KB granule: 16 level 3 entries, with contiguous bit
* 16 KB granule: 4 level 3 entries, without contiguous bit
* 64 KB granule: 1 level 3 entry
*/
#define SEGMENT_ALIGN SZ_64K
/*
* Memory types available.
*
* IMPORTANT: MT_NORMAL must be index 0 since vm_get_page_prot() may 'or' in
* the MT_NORMAL_TAGGED memory type for PROT_MTE mappings. Note
* that protection_map[] only contains MT_NORMAL attributes.
*/
#define MT_NORMAL 0
#define MT_NORMAL_TAGGED 1
#define MT_NORMAL_NC 2
#define MT_DEVICE_nGnRnE 3
#define MT_DEVICE_nGnRE 4
/*
* Memory types for Stage-2 translation
*/
#define MT_S2_NORMAL 0xf
#define MT_S2_NORMAL_NC 0x5
#define MT_S2_DEVICE_nGnRE 0x1
/*
* Memory types for Stage-2 translation when ID_AA64MMFR2_EL1.FWB is 0001
* Stage-2 enforces Normal-WB and Device-nGnRE
*/
#define MT_S2_FWB_NORMAL 6
#define MT_S2_FWB_NORMAL_NC 5
#define MT_S2_FWB_DEVICE_nGnRE 1
#ifdef CONFIG_ARM64_4K_PAGES
#define IOREMAP_MAX_ORDER (PUD_SHIFT)
#else
#define IOREMAP_MAX_ORDER (PMD_SHIFT)
#endif
/*
* Open-coded (swapper_pg_dir - reserved_pg_dir) as this cannot be calculated
* until link time.
*/
#define RESERVED_SWAPPER_OFFSET (PAGE_SIZE)
/*
* Open-coded (swapper_pg_dir - tramp_pg_dir) as this cannot be calculated
* until link time.
*/
#define TRAMP_SWAPPER_OFFSET (2 * PAGE_SIZE)
#ifndef __ASSEMBLY__
#include <linux/bitops.h>
#include <linux/compiler.h>
#include <linux/mmdebug.h>
#include <linux/types.h>
#include <asm/boot.h>
#include <asm/bug.h>
#include <asm/sections.h>
#include <asm/sysreg.h>
static inline u64 __pure read_tcr(void)
{
u64 tcr;
// read_sysreg() uses asm volatile, so avoid it here
asm("mrs %0, tcr_el1" : "=r"(tcr));
return tcr;
}
#if VA_BITS > 48
// For reasons of #include hell, we can't use TCR_T1SZ_OFFSET/TCR_T1SZ_MASK here
#define vabits_actual (64 - ((read_tcr() >> 16) & 63))
#else
#define vabits_actual ((u64)VA_BITS)
#endif
extern s64 memstart_addr;
/* PHYS_OFFSET - the physical address of the start of memory. */
#define PHYS_OFFSET ({ VM_BUG_ON(memstart_addr & 1); memstart_addr; })
/* the offset between the kernel virtual and physical mappings */
extern u64 kimage_voffset;
static inline unsigned long kaslr_offset(void)
{
return (u64)&_text - KIMAGE_VADDR;
}
#ifdef CONFIG_RANDOMIZE_BASE
void kaslr_init(void);
static inline bool kaslr_enabled(void)
{
extern bool __kaslr_is_enabled;
return __kaslr_is_enabled;
}
#else
static inline void kaslr_init(void) { }
static inline bool kaslr_enabled(void) { return false; }
#endif
/*
* Allow all memory at the discovery stage. We will clip it later.
*/
#define MIN_MEMBLOCK_ADDR 0
#define MAX_MEMBLOCK_ADDR U64_MAX
/*
* PFNs are used to describe any physical page; this means
* PFN 0 == physical address 0.
*
* This is the PFN of the first RAM page in the kernel
* direct-mapped view. We assume this is the first page
* of RAM in the mem_map as well.
*/
#define PHYS_PFN_OFFSET (PHYS_OFFSET >> PAGE_SHIFT)
/*
* When dealing with data aborts, watchpoints, or instruction traps we may end
* up with a tagged userland pointer. Clear the tag to get a sane pointer to
* pass on to access_ok(), for instance.
*/
#define __untagged_addr(addr) \
((__force __typeof__(addr))sign_extend64((__force u64)(addr), 55))
#define untagged_addr(addr) ({ \
u64 __addr = (__force u64)(addr); \
__addr &= __untagged_addr(__addr); \
(__force __typeof__(addr))__addr; \
})
#if defined(CONFIG_KASAN_SW_TAGS) || defined(CONFIG_KASAN_HW_TAGS)
#define __tag_shifted(tag) ((u64)(tag) << 56)
#define __tag_reset(addr) __untagged_addr(addr)
#define __tag_get(addr) (__u8)((u64)(addr) >> 56)
#else
#define __tag_shifted(tag) 0UL
#define __tag_reset(addr) (addr)
#define __tag_get(addr) 0
#endif /* CONFIG_KASAN_SW_TAGS || CONFIG_KASAN_HW_TAGS */
static inline const void *__tag_set(const void *addr, u8 tag)
{
u64 __addr = (u64)addr & ~__tag_shifted(0xff);
return (const void *)(__addr | __tag_shifted(tag));
}
#ifdef CONFIG_KASAN_HW_TAGS
#define arch_enable_tag_checks_sync() mte_enable_kernel_sync()
#define arch_enable_tag_checks_async() mte_enable_kernel_async()
#define arch_enable_tag_checks_asymm() mte_enable_kernel_asymm()
#define arch_suppress_tag_checks_start() mte_enable_tco()
#define arch_suppress_tag_checks_stop() mte_disable_tco()
#define arch_force_async_tag_fault() mte_check_tfsr_exit()
#define arch_get_random_tag() mte_get_random_tag()
#define arch_get_mem_tag(addr) mte_get_mem_tag(addr)
#define arch_set_mem_tag_range(addr, size, tag, init) \
mte_set_mem_tag_range((addr), (size), (tag), (init))
#endif /* CONFIG_KASAN_HW_TAGS */
/*
* Physical vs virtual RAM address space conversion. These are
* private definitions which should NOT be used outside memory.h
* files. Use virt_to_phys/phys_to_virt/__pa/__va instead.
*/
/*
* Check whether an arbitrary address is within the linear map, which
* lives in the [PAGE_OFFSET, PAGE_END) interval at the bottom of the
* kernel's TTBR1 address range.
*/
#define __is_lm_address(addr) (((u64)(addr) - PAGE_OFFSET) < (PAGE_END - PAGE_OFFSET))
#define __lm_to_phys(addr) (((addr) - PAGE_OFFSET) + PHYS_OFFSET)
#define __kimg_to_phys(addr) ((addr) - kimage_voffset)
#define __virt_to_phys_nodebug(x) ({ \
phys_addr_t __x = (phys_addr_t)(__tag_reset(x)); \
__is_lm_address(__x) ? __lm_to_phys(__x) : __kimg_to_phys(__x); \
})
#define __pa_symbol_nodebug(x) __kimg_to_phys((phys_addr_t)(x))
#ifdef CONFIG_DEBUG_VIRTUAL
extern phys_addr_t __virt_to_phys(unsigned long x);
extern phys_addr_t __phys_addr_symbol(unsigned long x);
#else
#define __virt_to_phys(x) __virt_to_phys_nodebug(x)
#define __phys_addr_symbol(x) __pa_symbol_nodebug(x)
#endif /* CONFIG_DEBUG_VIRTUAL */
#define __phys_to_virt(x) ((unsigned long)((x) - PHYS_OFFSET) | PAGE_OFFSET)
#define __phys_to_kimg(x) ((unsigned long)((x) + kimage_voffset))
/*
* Note: Drivers should NOT use these. They are the wrong
* translation for translating DMA addresses. Use the driver
* DMA support - see dma-mapping.h.
*/
#define virt_to_phys virt_to_phys
static inline phys_addr_t virt_to_phys(const volatile void *x)
{
return __virt_to_phys((unsigned long)(x));
}
#define phys_to_virt phys_to_virt
static inline void *phys_to_virt(phys_addr_t x)
{
return (void *)(__phys_to_virt(x));
}
/* Needed already here for resolving __phys_to_pfn() in virt_to_pfn() */
#include <asm-generic/memory_model.h>
static inline unsigned long virt_to_pfn(const void *kaddr)
{
return __phys_to_pfn(virt_to_phys(kaddr));
}
/*
* Drivers should NOT use these either.
*/
#define __pa(x) __virt_to_phys((unsigned long)(x))
#define __pa_symbol(x) __phys_addr_symbol(RELOC_HIDE((unsigned long)(x), 0))
#define __pa_nodebug(x) __virt_to_phys_nodebug((unsigned long)(x))
#define __va(x) ((void *)__phys_to_virt((phys_addr_t)(x)))
#define pfn_to_kaddr(pfn) __va((pfn) << PAGE_SHIFT)
#define sym_to_pfn(x) __phys_to_pfn(__pa_symbol(x))
/*
* virt_to_page(x) convert a _valid_ virtual address to struct page *
* virt_addr_valid(x) indicates whether a virtual address is valid
*/
#define ARCH_PFN_OFFSET ((unsigned long)PHYS_PFN_OFFSET)
#if defined(CONFIG_DEBUG_VIRTUAL)
#define page_to_virt(x) ({ \
__typeof__(x) __page = x; \
void *__addr = __va(page_to_phys(__page)); \
(void *)__tag_set((const void *)__addr, page_kasan_tag(__page));\
})
#define virt_to_page(x) pfn_to_page(virt_to_pfn(x))
#else
#define page_to_virt(x) ({ \
__typeof__(x) __page = x; \
u64 __idx = ((u64)__page - VMEMMAP_START) / sizeof(struct page);\
u64 __addr = PAGE_OFFSET + (__idx * PAGE_SIZE); \
(void *)__tag_set((const void *)__addr, page_kasan_tag(__page));\
})
#define virt_to_page(x) ({ \
u64 __idx = (__tag_reset((u64)x) - PAGE_OFFSET) / PAGE_SIZE; \
u64 __addr = VMEMMAP_START + (__idx * sizeof(struct page)); \
(struct page *)__addr; \
})
#endif /* CONFIG_DEBUG_VIRTUAL */
#define virt_addr_valid(addr) ({ \
__typeof__(addr) __addr = __tag_reset(addr); \
__is_lm_address(__addr) && pfn_is_map_memory(virt_to_pfn(__addr)); \
})
void dump_mem_limit(void);
#endif /* !ASSEMBLY */
/*
* Given that the GIC architecture permits ITS implementations that can only be
* configured with a LPI table address once, GICv3 systems with many CPUs may
* end up reserving a lot of different regions after a kexec for their LPI
* tables (one per CPU), as we are forced to reuse the same memory after kexec
* (and thus reserve it persistently with EFI beforehand)
*/
#if defined(CONFIG_EFI) && defined(CONFIG_ARM_GIC_V3_ITS)
# define INIT_MEMBLOCK_RESERVED_REGIONS (INIT_MEMBLOCK_REGIONS + NR_CPUS + 1)
#endif
/*
* memory regions which marked with flag MEMBLOCK_NOMAP(for example, the memory
* of the EFI_UNUSABLE_MEMORY type) may divide a continuous memory block into
* multiple parts. As a result, the number of memory regions is large.
*/
#ifdef CONFIG_EFI
#define INIT_MEMBLOCK_MEMORY_REGIONS (INIT_MEMBLOCK_REGIONS * 8)
#endif
#endif /* __ASM_MEMORY_H */
| Name | Type | Size | Permission | Actions |
|---|---|---|---|---|
| stacktrace | Folder | 0755 |
|
|
| vdso | Folder | 0755 |
|
|
| xen | Folder | 0755 |
|
|
| Kbuild | File | 528 B | 0644 |
|
| acenv.h | File | 395 B | 0644 |
|
| acpi.h | File | 5.48 KB | 0644 |
|
| alternative-macros.h | File | 6.45 KB | 0644 |
|
| alternative.h | File | 1.08 KB | 0644 |
|
| apple_m1_pmu.h | File | 2.23 KB | 0644 |
|
| arch_gicv3.h | File | 4.44 KB | 0644 |
|
| arch_timer.h | File | 4.84 KB | 0644 |
|
| archrandom.h | File | 2.99 KB | 0644 |
|
| arm-cci.h | File | 254 B | 0644 |
|
| arm_dsu_pmu.h | File | 2.94 KB | 0644 |
|
| arm_pmuv3.h | File | 3.4 KB | 0644 |
|
| asm-bug.h | File | 952 B | 0644 |
|
| asm-extable.h | File | 3.59 KB | 0644 |
|
| asm-offsets.h | File | 35 B | 0644 |
|
| asm-prototypes.h | File | 958 B | 0644 |
|
| asm-uaccess.h | File | 2.38 KB | 0644 |
|
| asm_pointer_auth.h | File | 2.49 KB | 0644 |
|
| assembler.h | File | 21.19 KB | 0644 |
|
| atomic.h | File | 7.23 KB | 0644 |
|
| atomic_ll_sc.h | File | 10.75 KB | 0644 |
|
| atomic_lse.h | File | 8.2 KB | 0644 |
|
| barrier.h | File | 5.85 KB | 0644 |
|
| bitops.h | File | 813 B | 0644 |
|
| bitrev.h | File | 452 B | 0644 |
|
| boot.h | File | 369 B | 0644 |
|
| brk-imm.h | File | 1.27 KB | 0644 |
|
| bug.h | File | 572 B | 0644 |
|
| cache.h | File | 3.28 KB | 0644 |
|
| cacheflush.h | File | 4.61 KB | 0644 |
|
| checksum.h | File | 1.06 KB | 0644 |
|
| clocksource.h | File | 136 B | 0644 |
|
| cmpxchg.h | File | 7.15 KB | 0644 |
|
| compat.h | File | 2.13 KB | 0644 |
|
| compiler.h | File | 979 B | 0644 |
|
| cpu.h | File | 1.57 KB | 0644 |
|
| cpu_ops.h | File | 1.92 KB | 0644 |
|
| cpucaps.h | File | 2.28 KB | 0644 |
|
| cpufeature.h | File | 32.74 KB | 0644 |
|
| cpuidle.h | File | 1.03 KB | 0644 |
|
| cputype.h | File | 13.99 KB | 0644 |
|
| crash_reserve.h | File | 335 B | 0644 |
|
| current.h | File | 517 B | 0644 |
|
| daifflags.h | File | 3.45 KB | 0644 |
|
| dcc.h | File | 981 B | 0644 |
|
| debug-monitors.h | File | 3.26 KB | 0644 |
|
| device.h | File | 189 B | 0644 |
|
| dmi.h | File | 850 B | 0644 |
|
| efi.h | File | 5.05 KB | 0644 |
|
| el2_setup.h | File | 11.6 KB | 0644 |
|
| elf.h | File | 8 KB | 0644 |
|
| esr.h | File | 17.16 KB | 0644 |
|
| exception.h | File | 3.29 KB | 0644 |
|
| exec.h | File | 278 B | 0644 |
|
| extable.h | File | 1.36 KB | 0644 |
|
| fixmap.h | File | 3.11 KB | 0644 |
|
| fpsimd.h | File | 11.63 KB | 0644 |
|
| fpsimdmacros.h | File | 7.7 KB | 0644 |
|
| fpu.h | File | 309 B | 0644 |
|
| ftrace.h | File | 5.93 KB | 0644 |
|
| futex.h | File | 2.71 KB | 0644 |
|
| gcs.h | File | 2.1 KB | 0644 |
|
| gpr-num.h | File | 708 B | 0644 |
|
| hardirq.h | File | 2.28 KB | 0644 |
|
| hugetlb.h | File | 3.07 KB | 0644 |
|
| hw_breakpoint.h | File | 4.16 KB | 0644 |
|
| hwcap.h | File | 8.77 KB | 0644 |
|
| hyp_image.h | File | 1.87 KB | 0644 |
|
| hypervisor.h | File | 444 B | 0644 |
|
| image.h | File | 1.48 KB | 0644 |
|
| insn-def.h | File | 571 B | 0644 |
|
| insn.h | File | 23.8 KB | 0644 |
|
| io.h | File | 8.9 KB | 0644 |
|
| irq.h | File | 571 B | 0644 |
|
| irq_work.h | File | 192 B | 0644 |
|
| irqflags.h | File | 4.31 KB | 0644 |
|
| jump_label.h | File | 1.32 KB | 0644 |
|
| kasan.h | File | 578 B | 0644 |
|
| kernel-pgtable.h | File | 3.3 KB | 0644 |
|
| kexec.h | File | 3.37 KB | 0644 |
|
| kfence.h | File | 680 B | 0644 |
|
| kgdb.h | File | 3.27 KB | 0644 |
|
| kprobes.h | File | 965 B | 0644 |
|
| kvm_arm.h | File | 14.34 KB | 0644 |
|
| kvm_asm.h | File | 12.18 KB | 0644 |
|
| kvm_emulate.h | File | 16.59 KB | 0644 |
|
| kvm_host.h | File | 47.41 KB | 0644 |
|
| kvm_hyp.h | File | 5.14 KB | 0644 |
|
| kvm_mmu.h | File | 11.14 KB | 0644 |
|
| kvm_mte.h | File | 1.35 KB | 0644 |
|
| kvm_nested.h | File | 6.23 KB | 0644 |
|
| kvm_pgtable.h | File | 28.64 KB | 0644 |
|
| kvm_pkvm.h | File | 5.35 KB | 0644 |
|
| kvm_ptrauth.h | File | 4.04 KB | 0644 |
|
| kvm_ras.h | File | 594 B | 0644 |
|
| kvm_types.h | File | 185 B | 0644 |
|
| linkage.h | File | 1.19 KB | 0644 |
|
| lse.h | File | 933 B | 0644 |
|
| mem_encrypt.h | File | 999 B | 0644 |
|
| memory.h | File | 14.24 KB | 0644 |
|
| mman.h | File | 2.36 KB | 0644 |
|
| mmu.h | File | 3.47 KB | 0644 |
|
| mmu_context.h | File | 8.5 KB | 0644 |
|
| module.h | File | 1.73 KB | 0644 |
|
| module.lds.h | File | 795 B | 0644 |
|
| mshyperv.h | File | 1.34 KB | 0644 |
|
| mte-def.h | File | 577 B | 0644 |
|
| mte-kasan.h | File | 5.58 KB | 0644 |
|
| mte.h | File | 6.99 KB | 0644 |
|
| neon-intrinsics.h | File | 959 B | 0644 |
|
| neon.h | File | 385 B | 0644 |
|
| numa.h | File | 165 B | 0644 |
|
| page-def.h | File | 296 B | 0644 |
|
| page.h | File | 1.34 KB | 0644 |
|
| paravirt.h | File | 580 B | 0644 |
|
| paravirt_api_clock.h | File | 26 B | 0644 |
|
| pci.h | File | 469 B | 0644 |
|
| percpu.h | File | 8.31 KB | 0644 |
|
| perf_event.h | File | 515 B | 0644 |
|
| pgalloc.h | File | 3.04 KB | 0644 |
|
| pgtable-hwdef.h | File | 11.47 KB | 0644 |
|
| pgtable-prot.h | File | 8.19 KB | 0644 |
|
| pgtable-types.h | File | 1.41 KB | 0644 |
|
| pgtable.h | File | 52.72 KB | 0644 |
|
| pkeys.h | File | 2.36 KB | 0644 |
|
| pointer_auth.h | File | 4.68 KB | 0644 |
|
| por.h | File | 635 B | 0644 |
|
| preempt.h | File | 2.71 KB | 0644 |
|
| probes.h | File | 549 B | 0644 |
|
| proc-fns.h | File | 562 B | 0644 |
|
| processor.h | File | 12.19 KB | 0644 |
|
| ptdump.h | File | 1.78 KB | 0644 |
|
| ptrace.h | File | 9.35 KB | 0644 |
|
| pvclock-abi.h | File | 374 B | 0644 |
|
| rsi.h | File | 1.64 KB | 0644 |
|
| rsi_cmds.h | File | 3.85 KB | 0644 |
|
| rsi_smc.h | File | 5.23 KB | 0644 |
|
| runtime-const.h | File | 2.3 KB | 0644 |
|
| rwonce.h | File | 1.96 KB | 0644 |
|
| scs.h | File | 1.09 KB | 0644 |
|
| sdei.h | File | 1.53 KB | 0644 |
|
| seccomp.h | File | 891 B | 0644 |
|
| sections.h | File | 1.14 KB | 0644 |
|
| semihost.h | File | 537 B | 0644 |
|
| set_memory.h | File | 715 B | 0644 |
|
| setup.h | File | 789 B | 0644 |
|
| shmparam.h | File | 425 B | 0644 |
|
| signal.h | File | 650 B | 0644 |
|
| signal32.h | File | 1.93 KB | 0644 |
|
| simd.h | File | 1.04 KB | 0644 |
|
| smp.h | File | 3.44 KB | 0644 |
|
| smp_plat.h | File | 824 B | 0644 |
|
| sparsemem.h | File | 747 B | 0644 |
|
| spectre.h | File | 3.75 KB | 0644 |
|
| spinlock.h | File | 601 B | 0644 |
|
| spinlock_types.h | File | 366 B | 0644 |
|
| stack_pointer.h | File | 247 B | 0644 |
|
| stackprotector.h | File | 1.15 KB | 0644 |
|
| stacktrace.h | File | 2.96 KB | 0644 |
|
| stage2_pgtable.h | File | 1.03 KB | 0644 |
|
| stat.h | File | 947 B | 0644 |
|
| string.h | File | 1.89 KB | 0644 |
|
| suspend.h | File | 1.65 KB | 0644 |
|
| sync_bitops.h | File | 1.06 KB | 0644 |
|
| syscall.h | File | 1.97 KB | 0644 |
|
| syscall_wrapper.h | File | 3.09 KB | 0644 |
|
| sysreg.h | File | 46.33 KB | 0644 |
|
| system_misc.h | File | 880 B | 0644 |
|
| text-patching.h | File | 544 B | 0644 |
|
| thread_info.h | File | 3.96 KB | 0644 |
|
| timex.h | File | 343 B | 0644 |
|
| tlb.h | File | 2.65 KB | 0644 |
|
| tlbbatch.h | File | 281 B | 0644 |
|
| tlbflush.h | File | 17.05 KB | 0644 |
|
| topology.h | File | 1.22 KB | 0644 |
|
| trans_pgd.h | File | 1.02 KB | 0644 |
|
| traps.h | File | 4.37 KB | 0644 |
|
| uaccess.h | File | 14.43 KB | 0644 |
|
| unistd.h | File | 898 B | 0644 |
|
| unistd32.h | File | 240 B | 0644 |
|
| uprobes.h | File | 579 B | 0644 |
|
| vdso.h | File | 468 B | 0644 |
|
| vectors.h | File | 1.74 KB | 0644 |
|
| vermagic.h | File | 200 B | 0644 |
|
| virt.h | File | 4.26 KB | 0644 |
|
| vmalloc.h | File | 805 B | 0644 |
|
| vmap_stack.h | File | 739 B | 0644 |
|
| vncr_mapping.h | File | 3.56 KB | 0644 |
|
| word-at-a-time.h | File | 1.5 KB | 0644 |
|
| xor.h | File | 1.88 KB | 0644 |
|