Function report |
Source Code:mm\kasan\common.c |
Create Date:2022-07-28 15:50:42 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:kasan_unpoison_shadow
Proto:void kasan_unpoison_shadow(const void *address, size_t size)
Type:void
Parameter:
| Type | Parameter | Name |
|---|---|---|
| const void * | address | |
| size_t | size |
| 165 | If size & KASAN_SHADOW_MASK Then |
| 166 | shadow = kasan_mem_to_shadow(address + size) |
| 168 | If IS_ENABLED(CONFIG_FOO) evaluates to 1 if CONFIG_FOO is set to 'y' or 'm',* 0 otherwise.(CONFIG_KASAN_SW_TAGS) Then shadow = tag |
| 170 | Else shadow = size & KASAN_SHADOW_MASK |
| Name | Describe |
|---|---|
| __kasan_unpoison_stack | |
| kasan_unpoison_task_stack_below | Unpoison the stack for the current task beyond a watermark sp value. |
| kasan_unpoison_stack_above_sp_to | Clear all poison for the region between the current SP and a provided* watermark value, as is sometimes required prior to hand-crafted asm function* returns in the middle of functions. |
| kasan_alloc_pages | |
| kasan_unpoison_object_data | |
| __kasan_kmalloc | |
| kasan_kmalloc_large | |
| register_global | |
| __asan_alloca_poison | Emitted by compiler to poison alloca()ed objects. |
| __asan_allocas_unpoison | Emitted by compiler to unpoison alloca()ed areas when the stack unwinds. |
| kasan_unpoison_slab |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |