Function report |
Source Code:mm\kasan\common.c |
Create Date:2022-07-28 15:50:40 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Poisons the shadow memory for 'size' bytes starting from 'addr'.* Memory addresses should be aligned to KASAN_SHADOW_SCALE_SIZE.
Proto:void kasan_poison_shadow(const void *address, size_t size, u8 value)
Type:void
Parameter:
| Type | Parameter | Name |
|---|---|---|
| const void * | address | |
| size_t | size | |
| u8 | value |
| 147 | shadow_end = kasan_mem_to_shadow(address + size) |
| 149 | __memset(shadow_start, value, shadow_end - shadow_start) |
| Name | Describe |
|---|---|
| kasan_unpoison_shadow | |
| kasan_free_pages | |
| kasan_poison_slab | |
| kasan_poison_object_data | |
| __kasan_slab_free | |
| __kasan_kmalloc | |
| kasan_kmalloc_large | |
| kasan_poison_kfree | |
| register_global | |
| __asan_alloca_poison | Emitted by compiler to poison alloca()ed objects. |
| __hwasan_tag_memory |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |