函数逻辑报告 |
Source Code:mm\kasan\common.c |
Create Date:2022-07-27 17:24:37 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
首页 | 函数Tree |
注解内核,赢得工具 | 下载SCCT | English |
函数名称:kasan_unpoison_shadow
函数原型:void kasan_unpoison_shadow(const void *address, size_t size)
返回类型:void
参数:
类型 | 参数 | 名称 |
---|---|---|
const void * | address | |
size_t | size |
165 | 如果size按位与KASAN_SHADOW_MASK则 |
166 | shadow等于kasan_mem_to_shadow(address + size) |
168 | 如果IS_ENABLED(CONFIG_FOO) evaluates to 1 if CONFIG_FOO is set to 'y' or 'm',* 0 otherwise.(CONFIG_KASAN_SW_TAGS)则shadow等于tag |
170 | 否则shadow等于size按位与KASAN_SHADOW_MASK |
名称 | 描述 |
---|---|
__kasan_unpoison_stack | |
kasan_unpoison_task_stack_below | Unpoison the stack for the current task beyond a watermark sp value. |
kasan_unpoison_stack_above_sp_to | Clear all poison for the region between the current SP and a provided* watermark value, as is sometimes required prior to hand-crafted asm function* returns in the middle of functions. |
kasan_alloc_pages | |
kasan_unpoison_object_data | |
__kasan_kmalloc | |
kasan_kmalloc_large | |
register_global | |
__asan_alloca_poison | Emitted by compiler to poison alloca()ed objects. |
__asan_allocas_unpoison | Emitted by compiler to unpoison alloca()ed areas when the stack unwinds. |
ksize | ksize - get the actual amount of memory allocated for a given object*@objp: Pointer to the object* kmalloc may internally round up allocations and return more memory* than requested. ksize() can be used to determine the actual amount of* memory allocated |
kasan_unpoison_slab |
源代码转换工具 开放的插件接口 | X |
---|---|
支持:c/c++/esqlc/java Oracle/Informix/Mysql 插件可实现:逻辑报告 代码生成和批量转换代码 |