mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-11-19 16:14:13 +08:00
dfec072ecd
General description: kmemcheck is a patch to the linux kernel that detects use of uninitialized memory. It does this by trapping every read and write to memory that was allocated dynamically (e.g. using kmalloc()). If a memory address is read that has not previously been written to, a message is printed to the kernel log. Thanks to Andi Kleen for the set_memory_4k() solution. Andrew Morton suggested documenting the shadow member of struct page. Signed-off-by: Vegard Nossum <vegardno@ifi.uio.no> Signed-off-by: Pekka Enberg <penberg@cs.helsinki.fi> [export kmemcheck_mark_initialized] [build fix for setup_max_cpus] Signed-off-by: Ingo Molnar <mingo@elte.hu> [rebased for mainline inclusion] Signed-off-by: Vegard Nossum <vegardno@ifi.uio.no>
10 lines
254 B
C
10 lines
254 B
C
#ifndef ARCH__X86__MM__KMEMCHECK__OPCODE_H
|
|
#define ARCH__X86__MM__KMEMCHECK__OPCODE_H
|
|
|
|
#include <linux/types.h>
|
|
|
|
void kmemcheck_opcode_decode(const uint8_t *op, unsigned int *size);
|
|
const uint8_t *kmemcheck_opcode_get_primary(const uint8_t *op);
|
|
|
|
#endif
|