Function report |
Source Code:mm\kasan\common.c |
Create Date:2022-07-28 15:50:40 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Poisons the shadow memory for 'size' bytes starting from 'addr'.* Memory addresses should be aligned to KASAN_SHADOW_SCALE_SIZE.
Proto:void kasan_poison_shadow(const void *address, size_t size, u8 value)
Type:void
Parameter:
Type | Parameter | Name |
---|---|---|
const void * | address | |
size_t | size | |
u8 | value |
147 | shadow_end = kasan_mem_to_shadow(address + size) |
149 | __memset(shadow_start, value, shadow_end - shadow_start) |
Name | Describe |
---|---|
kasan_unpoison_shadow | |
kasan_free_pages | |
kasan_poison_slab | |
kasan_poison_object_data | |
__kasan_slab_free | |
__kasan_kmalloc | |
kasan_kmalloc_large | |
kasan_poison_kfree | |
register_global | |
__asan_alloca_poison | Emitted by compiler to poison alloca()ed objects. |
__hwasan_tag_memory |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |