/* * The annotations present in this file are only relevant for the software * KASAN modes that rely on compiler instrumentation, and will be optimized * away for the hardware tag-based KASAN mode. Use kasan_check_byte() instead.
*/
/* * __kasan_check_*: Always available when KASAN is enabled. This may be used * even in compilation units that selectively disable KASAN, but must use KASAN * to validate access to an address. Never use these in header files!
*/ #ifdefined(CONFIG_KASAN_GENERIC) || defined(CONFIG_KASAN_SW_TAGS) bool __kasan_check_read(constvolatilevoid *p, unsignedint size); bool __kasan_check_write(constvolatilevoid *p, unsignedint size); #else staticinlinebool __kasan_check_read(constvolatilevoid *p, unsignedint size)
{ returntrue;
} staticinlinebool __kasan_check_write(constvolatilevoid *p, unsignedint size)
{ returntrue;
} #endif
/* * kasan_check_*: Only available when the particular compilation unit has KASAN * instrumentation enabled. May be used in header files.
*/ #ifdef __SANITIZE_ADDRESS__ #define kasan_check_read __kasan_check_read #define kasan_check_write __kasan_check_write #else staticinlinebool kasan_check_read(constvolatilevoid *p, unsignedint size)
{ returntrue;
} staticinlinebool kasan_check_write(constvolatilevoid *p, unsignedint size)
{ returntrue;
} #endif
#endif
Messung V0.5
¤ Dauer der Verarbeitung: 0.0 Sekunden
(vorverarbeitet)
¤
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.