Function report |
Source Code:mm\slab_common.c |
Create Date:2022-07-28 14:29:54 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:kzfree - like kfree but zero memory*@p: object to free memory of* The memory of the object @p points to is zeroed before freed.* If @p is %NULL, kzfree() does nothing.* Note: this function zeroes the whole allocated buffer which can be a good
Proto:void kzfree(const void *p)
Type:void
Parameter:
Type | Parameter | Name |
---|---|---|
const void * | p |
1747 | If Value for the false possibility is greater at compile time(ZERO_OR_NULL_PTR(mem)) Then Return |
Name | Describe |
---|---|
kmalloc_double_kzfree | |
mpi_free_limb_space | |
mpi_resize | Resize the array of A to NLIMBS. the additional space is cleared* (set to 0) [done by m_realloc()] |
mpi_free | |
user_free_preparse | Free a preparse of a user defined key payload |
user_free_payload_rcu | |
user_destroy | dispose of the data dangling from the corpse of a user key |
dh_free_data | |
kdf_dealloc | |
keyctl_dh_compute_kdf | |
__keyctl_dh_compute | |
big_key_preparse | Preparse a big key |
big_key_free_preparse | Clear preparsement. |
big_key_destroy | dispose of the data dangling from the corpse of a big_key key |
TSS_sha1 | |
TSS_rawhmac | |
TSS_authhmac | alculate authorization info fields to send to TPM |
TSS_checkhmac1 | verify the AUTH1_COMMAND (Seal) result from TPM |
TSS_checkhmac2 | verify the AUTH2_COMMAND (unseal) result from TPM |
tpm_seal | Have the TPM seal(encrypt) the trusted key, possibly based on* Platform Configuration Registers (PCRs). AUTH1 for sealing key. |
trusted_instantiate | rusted_instantiate - create a new trusted key* Unseal an existing trusted blob or, for a new key, get a* random key, then seal and create a trusted key-type key,* adding it to the specified keyring.* On success, return 0. Otherwise return errno. |
trusted_rcu_free | |
trusted_update | rusted_update - reseal an existing key with new PCR values |
trusted_read | rusted_read - copy the sealed blob data to userspace in hex.* On success, return to userspace the trusted key datablob size. |
trusted_destroy | rusted_destroy - clear and free the key's payload |
get_derived_key | Derive authentication/encryption key from trusted key |
encrypted_instantiate | rypted_instantiate - instantiate an encrypted key* Decrypt an existing encrypted datablob or create a new encrypted key* based on a kernel random number.* On success, return 0. Otherwise return errno. |
encrypted_rcu_free | |
encrypted_update | rypted_update - update the master key description* Change the master key description for an existing encrypted key.* The next read will return an encrypted datablob using the new* master key description.* On success, return 0. Otherwise return errno. |
encrypted_read | rypted_read - format and copy the encrypted data to userspace* The resulting datablob format is:* |
encrypted_destroy | rypted_destroy - clear and free the key's payload |
aa_free_domain_entries | aa_free_domain_entries - free entries in a domain table*@domain: the domain table to free (MAYBE NULL) |
aa_free_data | aa_free_data - free a data blob*@ptr: data to free*@arg: unused |
aa_free_profile | aa_free_profile - free a profile*@profile: the profile to free (MAYBE NULL)* Free a profile, its hats and null_profile |
do_loaddata_free | d to take the ns mutex lock which is NOT safe most places that* put_loaddata is called, so we have to delay freeing it |
unpack_profile | pack_profile - unpack a serialized profile*@e: serialized data extent information (NOT NULL)* NOTE: unpack profile sets audit struct if there is a failure |
aa_load_ent_free | |
alloc_ns | alloc_ns - allocate, initialize and return a new namespace*@prefix: parent namespace name (MAYBE NULL)*@name: a preallocated name (NOT NULL)* Returns: refcounted namespace or NULL on failure. |
aa_free_ns | aa_free_ns - free a profile namespace*@ns: the namespace to free (MAYBE NULL)* Requires: All references to the namespace must have been put, if the* namespace was referenced by a profile confining a task, |
free_direct_key | |
setup_v1_file_key_derived | v1 policy, !DIRECT_KEY: derive the file's encryption key |
ahash_request_free | ahash_request_free() - zeroize and free the request data structure*@req: request data structure cipher handle to be freed |
aead_request_free | aead_request_free() - zeroize and free request data structure*@req: request data structure cipher handle to be freed |
skcipher_request_free | skcipher_request_free() - zeroize and free request data structure*@req: request data structure cipher handle to be freed |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |