函数逻辑报告 |
Source Code:include\linux\kasan.h |
Create Date:2022-07-27 06:59:00 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| 首页 | 函数Tree |
| 注解内核,赢得工具 | 下载SCCT | English |
函数名称:kasan_mem_to_shadow
函数原型:static inline void *kasan_mem_to_shadow(const void *addr)
返回类型:void
参数:
| 类型 | 参数 | 名称 |
|---|---|---|
| const void * | addr |
| 28 | 返回:addr右移KASAN_SHADOW_SCALE_SHIFT位的值加KASAN_SHADOW_OFFSET |
| 名称 | 描述 |
|---|---|
| kasan_poison_shadow | Poisons the shadow memory for 'size' bytes starting from 'addr'.* Memory addresses should be aligned to KASAN_SHADOW_SCALE_SIZE. |
| kasan_unpoison_shadow | |
| __kasan_slab_free | |
| kasan_module_alloc | |
| kasan_free_shadow | |
| kasan_mem_notifier | |
| kasan_remove_zero_shadow | |
| kasan_add_zero_shadow | |
| get_address_stack_frame_info | |
| print_shadow_for_address | |
| memory_is_poisoned_1 | All functions below always inlined so compiler could* perform better optimizations in each of __asan_loadX/__assn_storeX* depending on memory access size X. |
| memory_is_poisoned_2_4_8 | |
| memory_is_poisoned_16 | |
| memory_is_poisoned_n | |
| find_first_bad_addr | |
| get_shadow_bug_type | |
| check_memory_region | |
| find_first_bad_addr | |
| print_tags |
| 源代码转换工具 开放的插件接口 | X |
|---|---|
| 支持:c/c++/esqlc/java Oracle/Informix/Mysql 插件可实现:逻辑报告 代码生成和批量转换代码 |