Function report | 
Source Code:include\linux\kasan.h | 
Create Date:2022-07-28 06:00:25 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:kasan_mem_to_shadow
Proto:static inline void *kasan_mem_to_shadow(const void *addr)
Type:void
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| const void * | addr | 
| 28 | Return (addr >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET | 
| Name | Describe | 
|---|---|
| kasan_poison_shadow | Poisons the shadow memory for 'size' bytes starting from 'addr'.* Memory addresses should be aligned to KASAN_SHADOW_SCALE_SIZE. | 
| kasan_unpoison_shadow | |
| __kasan_slab_free | |
| kasan_module_alloc | |
| kasan_free_shadow | |
| kasan_mem_notifier | |
| kasan_remove_zero_shadow | |
| kasan_add_zero_shadow | |
| get_address_stack_frame_info | |
| print_shadow_for_address | |
| memory_is_poisoned_1 | All functions below always inlined so compiler could* perform better optimizations in each of __asan_loadX/__assn_storeX* depending on memory access size X. | 
| memory_is_poisoned_2_4_8 | |
| memory_is_poisoned_16 | |
| memory_is_poisoned_n | |
| find_first_bad_addr | |
| get_shadow_bug_type | |
| check_memory_region | |
| find_first_bad_addr | |
| print_tags | 
| Source code conversion tool public plug-in interface  | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion  |