Function report |
Source Code:mm\kasan\common.c |
Create Date:2022-07-28 15:50:42 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:kasan_unpoison_shadow
Proto:void kasan_unpoison_shadow(const void *address, size_t size)
Type:void
Parameter:
Type | Parameter | Name |
---|---|---|
const void * | address | |
size_t | size |
165 | If size & KASAN_SHADOW_MASK Then |
166 | shadow = kasan_mem_to_shadow(address + size) |
168 | If IS_ENABLED(CONFIG_FOO) evaluates to 1 if CONFIG_FOO is set to 'y' or 'm',* 0 otherwise.(CONFIG_KASAN_SW_TAGS) Then shadow = tag |
170 | Else shadow = size & KASAN_SHADOW_MASK |
Name | Describe |
---|---|
__kasan_unpoison_stack | |
kasan_unpoison_task_stack_below | Unpoison the stack for the current task beyond a watermark sp value. |
kasan_unpoison_stack_above_sp_to | Clear all poison for the region between the current SP and a provided* watermark value, as is sometimes required prior to hand-crafted asm function* returns in the middle of functions. |
kasan_alloc_pages | |
kasan_unpoison_object_data | |
__kasan_kmalloc | |
kasan_kmalloc_large | |
register_global | |
__asan_alloca_poison | Emitted by compiler to poison alloca()ed objects. |
__asan_allocas_unpoison | Emitted by compiler to unpoison alloca()ed areas when the stack unwinds. |
kasan_unpoison_slab |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |