Function report |
Source Code:mm\page_poison.c |
Create Date:2022-07-28 15:42:19 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:check_poison_mem
Proto:static void check_poison_mem(unsigned char *mem, size_t bytes)
Type:void
Parameter:
| Type | Parameter | Name |
|---|---|---|
| unsigned char * | mem | |
| size_t | bytes |
| 68 | DEFINE_RATELIMIT_STATE(ratelimit, 5 * HZ, 10) |
| 72 | If IS_ENABLED(CONFIG_FOO) evaluates to 1 if CONFIG_FOO is set to 'y' or 'm',* 0 otherwise.(CONFIG_PAGE_POISONING_NO_SANITY) Then Return |
| 76 | If Not start Then Return |
| 80 | If end != PAGE_POISON Then Break |
| 84 | If Not __ratelimit( & ratelimit) Then Return |
| 86 | Else if start == end && single_bit_flip( * start, PAGE_POISON) Then pr_err("pagealloc: single bit error\n") |
| 88 | Else pr_err("pagealloc: memory corruption\n") |
| 93 | dump_stack() |
| Name | Describe |
|---|---|
| unpoison_page |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |