Function report | 
Source Code:mm\page_poison.c | 
Create Date:2022-07-28 15:42:19 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:check_poison_mem
Proto:static void check_poison_mem(unsigned char *mem, size_t bytes)
Type:void
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| unsigned char * | mem | |
| size_t | bytes | 
| 68 | DEFINE_RATELIMIT_STATE(ratelimit, 5 * HZ, 10) | 
| 72 | If IS_ENABLED(CONFIG_FOO) evaluates to 1 if CONFIG_FOO is set to 'y' or 'm',* 0 otherwise.(CONFIG_PAGE_POISONING_NO_SANITY) Then Return | 
| 76 | If Not start Then Return | 
| 80 | If end != PAGE_POISON Then Break | 
| 84 | If Not __ratelimit( & ratelimit) Then Return | 
| 86 | Else if start == end && single_bit_flip( * start, PAGE_POISON) Then pr_err("pagealloc: single bit error\n") | 
| 88 | Else pr_err("pagealloc: memory corruption\n") | 
| 93 | dump_stack() | 
| Name | Describe | 
|---|---|
| unpoison_page | 
| Source code conversion tool public plug-in interface  | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion  |