Function report |
Source Code:lib\strncpy_from_user.c |
Create Date:2022-07-28 07:20:09 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Copy a NUL terminated string from userspace
Proto:long strncpy_from_user(char *dst, const char __user *src, long count)
Type:long
Parameter:
| Type | Parameter | Name |
|---|---|---|
| char * | dst | |
| const char __user * | src | |
| long | count |
| 101 | If Value for the false possibility is greater at compile time(count <= 0) Then Return 0 |
| 104 | max_addr = user_addr_max() |
| 106 | If Value is more likely to compile time(src_addr < max_addr) Then |
| 117 | kasan_check_write(dst, count) |
| 118 | check_object_size(dst, count, false) |
| 119 | If user_access_begin(src, max) Then |
| 125 | Return -EFAULT |
| Name | Describe |
|---|---|
| SYSCALL_DEFINE4 | Reboot system call: for obvious reasons only root may call it,* and even root needs to set up some magic numbers in the registers* so that some mistake won't make this reboot the whole machine.* You can also set the meaning of the ctrl-alt-del-key here. |
| audit_log_execve_info | |
| fetch_store_string | Fetch a null-terminated string. Caller MUST set *(u32 *)dest with max* length and relative data location. |
| bpf_prog_load | |
| bpf_raw_tracepoint_open | |
| kmemleak_write | File write operation to configure kmemleak at run-time |
| getname_flags | |
| setxattr | Extended attribute SET operations |
| getxattr | Extended attribute GET operations |
| removexattr | Extended attribute REMOVE operations |
| copy_user_test |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |