Function report |
Source Code:include\linux\kasan.h |
Create Date:2022-07-28 06:00:25 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:kasan_mem_to_shadow
Proto:static inline void *kasan_mem_to_shadow(const void *addr)
Type:void
Parameter:
Type | Parameter | Name |
---|---|---|
const void * | addr |
28 | Return (addr >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET |
Name | Describe |
---|---|
kasan_poison_shadow | Poisons the shadow memory for 'size' bytes starting from 'addr'.* Memory addresses should be aligned to KASAN_SHADOW_SCALE_SIZE. |
kasan_unpoison_shadow | |
__kasan_slab_free | |
kasan_module_alloc | |
kasan_free_shadow | |
kasan_mem_notifier | |
kasan_remove_zero_shadow | |
kasan_add_zero_shadow | |
get_address_stack_frame_info | |
print_shadow_for_address | |
memory_is_poisoned_1 | All functions below always inlined so compiler could* perform better optimizations in each of __asan_loadX/__assn_storeX* depending on memory access size X. |
memory_is_poisoned_2_4_8 | |
memory_is_poisoned_16 | |
memory_is_poisoned_n | |
find_first_bad_addr | |
get_shadow_bug_type | |
check_memory_region | |
find_first_bad_addr | |
print_tags |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |