Server IP : 184.154.167.98 / Your IP : 18.221.217.100 Web Server : Apache System : Linux pink.dnsnetservice.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 User : puertode ( 1767) PHP Version : 8.2.26 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /usr/src/kernels/4.18.0-553.30.1.lve.el8.x86_64/include/linux/ |
Upload File : |
/* SPDX-License-Identifier: GPL-2.0 */ #ifndef _LINUX_KCSAN_H #define _LINUX_KCSAN_H #include <linux/kcsan-checks.h> #include <linux/types.h> #ifdef CONFIG_KCSAN /* * Context for each thread of execution: for tasks, this is stored in * task_struct, and interrupts access internal per-CPU storage. */ struct kcsan_ctx { int disable_count; /* disable counter */ int atomic_next; /* number of following atomic ops */ /* * We distinguish between: (a) nestable atomic regions that may contain * other nestable regions; and (b) flat atomic regions that do not keep * track of nesting. Both (a) and (b) are entirely independent of each * other, and a flat region may be started in a nestable region or * vice-versa. * * This is required because, for example, in the annotations for * seqlocks, we declare seqlock writer critical sections as (a) nestable * atomic regions, but reader critical sections as (b) flat atomic * regions, but have encountered cases where seqlock reader critical * sections are contained within writer critical sections (the opposite * may be possible, too). * * To support these cases, we independently track the depth of nesting * for (a), and whether the leaf level is flat for (b). */ int atomic_nest_count; bool in_flat_atomic; /* * Access mask for all accesses if non-zero. */ unsigned long access_mask; }; /** * kcsan_init - initialize KCSAN runtime */ void kcsan_init(void); /** * kcsan_disable_current - disable KCSAN for the current context * * Supports nesting. */ void kcsan_disable_current(void); /** * kcsan_enable_current - re-enable KCSAN for the current context * * Supports nesting. */ void kcsan_enable_current(void); #else /* CONFIG_KCSAN */ static inline void kcsan_init(void) { } static inline void kcsan_disable_current(void) { } static inline void kcsan_enable_current(void) { } #endif /* CONFIG_KCSAN */ #endif /* _LINUX_KCSAN_H */