函数逻辑报告 |
Source Code:lib\strncpy_from_user.c |
Create Date:2022-07-27 08:18:51 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
首页 | 函数Tree |
注解内核,赢得工具 | 下载SCCT | English |
函数名称:复制用户字符串
函数原型:long strncpy_from_user(char *dst, const char __user *src, long count)
返回类型:long
参数:
类型 | 参数 | 名称 |
---|---|---|
char * | dst | |
const char __user * | src | |
long | count |
101 | 如果此条件成立可能性小(为编译器优化)(count <= 0)则返回:0 |
104 | max_addr等于user_addr_max() |
106 | 如果此条件成立可能性大(为编译器优化)(src_addr < max_addr)则 |
117 | kasan_check_write(dst, count) |
118 | check_object_size(dst, count, false) |
119 | 如果user_access_begin(src, max)则 |
125 | 返回:负EFAULT |
名称 | 描述 |
---|---|
SYSCALL_DEFINE4 | Reboot system call: for obvious reasons only root may call it,* and even root needs to set up some magic numbers in the registers* so that some mistake won't make this reboot the whole machine.* You can also set the meaning of the ctrl-alt-del-key here. |
audit_log_execve_info | |
fetch_store_string | Fetch a null-terminated string. Caller MUST set *(u32 *)dest with max* length and relative data location. |
bpf_prog_load | |
bpf_raw_tracepoint_open | |
kmemleak_write | File write operation to configure kmemleak at run-time |
getname_flags | |
setxattr | Extended attribute SET operations |
getxattr | Extended attribute GET operations |
removexattr | Extended attribute REMOVE operations |
copy_user_test | |
mtrr_write | seq_file can seek but we ignore it.* Format of control line:* "base=%Lx size=%Lx type=%s" or "disable=%d" |
SYSCALL_DEFINE5 | |
strncpy_from_unsafe_user | strncpy_from_unsafe_user: - Copy a NUL terminated string from unsafe user* address.*@dst: Destination address, in kernel space. This buffer must be at* least @count bytes long.*@unsafe_addr: Unsafe user address. |
key_get_type_from_user |
源代码转换工具 开放的插件接口 | X |
---|---|
支持:c/c++/esqlc/java Oracle/Informix/Mysql 插件可实现:逻辑报告 代码生成和批量转换代码 |