mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-25 21:54:06 +08:00
dfec072ecd
General description: kmemcheck is a patch to the linux kernel that detects use of uninitialized memory. It does this by trapping every read and write to memory that was allocated dynamically (e.g. using kmalloc()). If a memory address is read that has not previously been written to, a message is printed to the kernel log. Thanks to Andi Kleen for the set_memory_4k() solution. Andrew Morton suggested documenting the shadow member of struct page. Signed-off-by: Vegard Nossum <vegardno@ifi.uio.no> Signed-off-by: Pekka Enberg <penberg@cs.helsinki.fi> [export kmemcheck_mark_initialized] [build fix for setup_max_cpus] Signed-off-by: Ingo Molnar <mingo@elte.hu> [rebased for mainline inclusion] Signed-off-by: Vegard Nossum <vegardno@ifi.uio.no>
16 lines
352 B
C
16 lines
352 B
C
#ifndef ARCH__X86__MM__KMEMCHECK__ERROR_H
|
|
#define ARCH__X86__MM__KMEMCHECK__ERROR_H
|
|
|
|
#include <linux/ptrace.h>
|
|
|
|
#include "shadow.h"
|
|
|
|
void kmemcheck_error_save(enum kmemcheck_shadow state,
|
|
unsigned long address, unsigned int size, struct pt_regs *regs);
|
|
|
|
void kmemcheck_error_save_bug(struct pt_regs *regs);
|
|
|
|
void kmemcheck_error_recall(void);
|
|
|
|
#endif
|