__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

[email protected]: ~ $
/* SPDX-License-Identifier: GPL-2.0 */
/*
 * Prevent the compiler from merging or refetching reads or writes. The
 * compiler is also forbidden from reordering successive instances of
 * READ_ONCE and WRITE_ONCE, but only when the compiler is aware of some
 * particular ordering. One way to make the compiler aware of ordering is to
 * put the two invocations of READ_ONCE or WRITE_ONCE in different C
 * statements.
 *
 * These two macros will also work on aggregate data types like structs or
 * unions.
 *
 * Their two major use cases are: (1) Mediating communication between
 * process-level code and irq/NMI handlers, all running on the same CPU,
 * and (2) Ensuring that the compiler does not fold, spindle, or otherwise
 * mutilate accesses that either do not require ordering or that interact
 * with an explicit memory barrier or atomic instruction that provides the
 * required ordering.
 */
#ifndef __ASM_GENERIC_RWONCE_H
#define __ASM_GENERIC_RWONCE_H

#ifndef __ASSEMBLY__

#include <linux/compiler_types.h>
#include <linux/kasan-checks.h>
#include <linux/kcsan-checks.h>

/*
 * Yes, this permits 64-bit accesses on 32-bit architectures. These will
 * actually be atomic in some cases (namely Armv7 + LPAE), but for others we
 * rely on the access being split into 2x32-bit accesses for a 32-bit quantity
 * (e.g. a virtual address) and a strong prevailing wind.
 */
#define compiletime_assert_rwonce_type(t)					\
	compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long),	\
		"Unsupported access size for {READ,WRITE}_ONCE().")

/*
 * Use __READ_ONCE() instead of READ_ONCE() if you do not require any
 * atomicity. Note that this may result in tears!
 */
#ifndef __READ_ONCE
#define __READ_ONCE(x)	(*(const volatile __unqual_scalar_typeof(x) *)&(x))
#endif

#define READ_ONCE(x)							\
({									\
	compiletime_assert_rwonce_type(x);				\
	__READ_ONCE(x);							\
})

#define __WRITE_ONCE(x, val)						\
do {									\
	*(volatile typeof(x) *)&(x) = (val);				\
} while (0)

#define WRITE_ONCE(x, val)						\
do {									\
	compiletime_assert_rwonce_type(x);				\
	__WRITE_ONCE(x, val);						\
} while (0)

static __no_sanitize_or_inline
unsigned long __read_once_word_nocheck(const void *addr)
{
	return __READ_ONCE(*(unsigned long *)addr);
}

/*
 * Use READ_ONCE_NOCHECK() instead of READ_ONCE() if you need to load a
 * word from memory atomically but without telling KASAN/KCSAN. This is
 * usually used by unwinding code when walking the stack of a running process.
 */
#define READ_ONCE_NOCHECK(x)						\
({									\
	compiletime_assert(sizeof(x) == sizeof(unsigned long),		\
		"Unsupported access size for READ_ONCE_NOCHECK().");	\
	(typeof(x))__read_once_word_nocheck(&(x));			\
})

static __no_sanitize_or_inline
unsigned long read_word_at_a_time(const void *addr)
{
	/* open-coded instrument_read(addr, 1) */
	kasan_check_read(addr, 1);
	kcsan_check_read(addr, 1);

	/*
	 * This load can race with concurrent stores to out-of-bounds memory,
	 * but READ_ONCE() can't be used because it requires higher alignment
	 * than plain loads in arm64 builds with LTO.
	 */
	return *(unsigned long *)addr;
}

#endif /* __ASSEMBLY__ */
#endif	/* __ASM_GENERIC_RWONCE_H */

Filemanager

Name Type Size Permission Actions
bitops Folder 0755
vdso Folder 0755
Kbuild File 1.64 KB 0644
access_ok.h File 1.37 KB 0644
agp.h File 277 B 0644
archrandom.h File 342 B 0644
asm-offsets.h File 35 B 0644
asm-prototypes.h File 507 B 0644
atomic.h File 3.33 KB 0644
atomic64.h File 2.49 KB 0644
audit_change_attr.h File 584 B 0644
audit_dir_write.h File 528 B 0644
audit_read.h File 241 B 0644
audit_signal.h File 36 B 0644
audit_write.h File 461 B 0644
barrier.h File 7.37 KB 0644
bitops.h File 1.13 KB 0644
bitsperlong.h File 1.18 KB 0644
bug.h File 6.26 KB 0644
cache.h File 384 B 0644
cacheflush.h File 2.63 KB 0644
cfi.h File 129 B 0644
checksum.h File 1.58 KB 0644
cmpxchg-local.h File 1.49 KB 0644
cmpxchg.h File 2.42 KB 0644
codetag.lds.h File 946 B 0644
compat.h File 3.81 KB 0644
current.h File 284 B 0644
delay.h File 2.81 KB 0644
device.h File 245 B 0644
div64.h File 6.03 KB 0644
dma-mapping.h File 232 B 0644
dma.h File 553 B 0644
early_ioremap.h File 1.46 KB 0644
emergency-restart.h File 248 B 0644
error-injection.h File 1.25 KB 0644
exec.h File 460 B 0644
extable.h File 802 B 0644
fixmap.h File 2.77 KB 0644
flat.h File 610 B 0644
fprobe.h File 1.4 KB 0644
ftrace.h File 314 B 0644
futex.h File 2.59 KB 0644
getorder.h File 1.23 KB 0644
hardirq.h File 568 B 0644
hugetlb.h File 3.58 KB 0644
hw_irq.h File 270 B 0644
int-ll64.h File 863 B 0644
io.h File 27.85 KB 0644
ioctl.h File 506 B 0644
iomap.h File 3.9 KB 0644
irq.h File 403 B 0644
irq_regs.h File 773 B 0644
irq_work.h File 194 B 0644
irqflags.h File 1.51 KB 0644
kdebug.h File 182 B 0644
kmap_size.h File 263 B 0644
kprobes.h File 833 B 0644
kvm_para.h File 549 B 0644
kvm_types.h File 113 B 0644
linkage.h File 225 B 0644
local.h File 2.31 KB 0644
local64.h File 4.04 KB 0644
logic_io.h File 2.35 KB 0644
mcs_spinlock.h File 260 B 0644
memory_model.h File 2.03 KB 0644
mm_hooks.h File 641 B 0644
mmiowb.h File 1.72 KB 0644
mmiowb_types.h File 249 B 0644
mmu.h File 449 B 0644
mmu_context.h File 1.62 KB 0644
mmzone.h File 107 B 0644
module.h File 1.09 KB 0644
module.lds.h File 278 B 0644
mshyperv.h File 9.26 KB 0644
msi.h File 1.01 KB 0644
nommu_context.h File 420 B 0644
numa.h File 1.6 KB 0644
param.h File 367 B 0644
parport.h File 604 B 0644
pci.h File 655 B 0644
pci_iomap.h File 1.96 KB 0644
percpu.h File 15.2 KB 0644
pgalloc.h File 7.6 KB 0644
pgtable-nop4d.h File 1.72 KB 0644
pgtable-nopmd.h File 2.04 KB 0644
pgtable-nopud.h File 1.95 KB 0644
pgtable_uffd.h File 1.03 KB 0644
preempt.h File 2.38 KB 0644
qrwlock.h File 3.99 KB 0644
qrwlock_types.h File 683 B 0644
qspinlock.h File 4.71 KB 0644
qspinlock_types.h File 2.08 KB 0644
resource.h File 1.07 KB 0644
runtime-const.h File 414 B 0644
rwonce.h File 3.13 KB 0644
seccomp.h File 1.16 KB 0644
sections.h File 7.67 KB 0644
serial.h File 345 B 0644
set_memory.h File 362 B 0644
shmparam.h File 207 B 0644
signal.h File 282 B 0644
simd.h File 436 B 0644
softirq_stack.h File 281 B 0644
spinlock.h File 212 B 0644
spinlock_types.h File 244 B 0644
statfs.h File 169 B 0644
string.h File 281 B 0644
switch_to.h File 755 B 0644
syscall.h File 5.03 KB 0644
syscalls.h File 745 B 0644
text-patching.h File 156 B 0644
ticket_spinlock.h File 3.26 KB 0644
timex.h File 508 B 0644
tlb.h File 21.9 KB 0644
tlbflush.h File 485 B 0644
topology.h File 2.17 KB 0644
trace_clock.h File 391 B 0644
uaccess.h File 5.51 KB 0644
user.h File 242 B 0644
vermagic.h File 179 B 0644
vga.h File 128 B 0644
video.h File 2.86 KB 0644
vmlinux.lds.h File 33.55 KB 0644
word-at-a-time.h File 2.79 KB 0644
xor.h File 14.33 KB 0644
Filemanager