This file is indexed.

/usr/src/linux-source-3.13.0/debian.master/abi/3.13.0-143.192/i386/generic.retpoline is in linux-source-3.13.0 3.13.0-144.193.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
apm.ko __apm_bios_call lcall  *%cs:0x0
apm.ko __apm_bios_call_simple lcall  *%cs:0x0
kvm-intel.ko vmx_handle_external_intr call   *%eax
kvm.ko em_loop call   *%edx
kvm.ko fastop call   *%esi
kvm.ko x86_emulate_insn call   *%edx
kvm.ko x86_emulate_insn call   *%edx
kvm.ko x86_emulate_insn call   *%edx
vmlinux .altinstr_replacement call   *%edi
vmlinux .altinstr_replacement call   *%edx
vmlinux .altinstr_replacement jmp    *%eax
vmlinux .altinstr_replacement jmp    *%ebp
vmlinux .altinstr_replacement jmp    *%ebx
vmlinux .altinstr_replacement jmp    *%ebx
vmlinux .altinstr_replacement jmp    *%ebx
vmlinux .altinstr_replacement jmp    *%ecx
vmlinux .altinstr_replacement jmp    *%ecx
vmlinux .altinstr_replacement jmp    *%edi
vmlinux .altinstr_replacement jmp    *%edx
vmlinux .altinstr_replacement jmp    *%esi
vmlinux .altinstr_replacement jmp    *%esp
vmlinux __x86_indirect_thunk_eax jmp    *%eax
vmlinux __x86_indirect_thunk_ebp jmp    *%ebp
vmlinux __x86_indirect_thunk_ebx jmp    *%ebx
vmlinux __x86_indirect_thunk_ecx jmp    *%ecx
vmlinux __x86_indirect_thunk_edi jmp    *%edi
vmlinux __x86_indirect_thunk_edx jmp    *%edx
vmlinux __x86_indirect_thunk_esi jmp    *%esi
vmlinux __x86_indirect_thunk_esp jmp    *%esp
vmlinux _text jmp    *%eax
vmlinux call_on_stack call   *%edi
vmlinux csum_partial jmp    *%ebx
vmlinux csum_partial_copy_generic jmp    *%ebx
vmlinux efi_call_phys jmp    *%ecx
vmlinux efi_call_phys jmp    *%edx
vmlinux efi_call_phys jmp    *%edx
vmlinux enable_paging call   *%eax
vmlinux error_code call   *%edi
vmlinux handle_irq call   *%edi
vmlinux identity_mapped call   *%edx
vmlinux irq_return jmp    *%cs:0xc194a8e4
vmlinux ldt_ss call   *%cs:0xc194a8fc
vmlinux resume_userspace call   *%cs:0xc194a8fc
vmlinux ret_from_kernel_thread call   *%edx
vmlinux return_to_handler jmp    *%ecx
vmlinux syscall_exit call   *%cs:0xc194a8fc
vmlinux syscall_exit_work call   *%cs:0xc194a900
vmlinux sysenter_after_call call   *%cs:0xc194a8fc
vmlinux sysenter_exit jmp    *%cs:0xc194a8d8
vmlinux sysenter_past_esp call   *%cs:0xc194a900
vmlinux sysexit_audit call   *%cs:0xc194a8fc
vmlinux sysexit_audit call   *%cs:0xc194a900
vmlinux wakeup_pmode_return jmp    *%eax
vmlinux work_notifysig call   *%cs:0xc194a900
vmlinux work_resched call   *%cs:0xc194a8fc
vmlinux xen_mc_flush call   *%eax
xen-privcmd.ko privcmd_ioctl call   *%eax