函数逻辑报告 |
Source Code:mm\kasan\common.c |
Create Date:2022-07-27 17:24:34 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| 首页 | 函数Tree |
| 注解内核,赢得工具 | 下载SCCT | English |
函数名称:memcpy
函数原型:void *memcpy(void *dest, const void *src, size_t len)
返回类型:void
参数:
| 类型 | 参数 | 名称 |
|---|---|---|
| void * | dest | |
| const void * | src | |
| size_t | len |
| 125 | check_memory_region((unsignedlong)src, len, TSC's on different sockets may be reset asynchronously.* This may cause the TSC ADJUST value on socket 0 to be NOT 0., _RET_IP_) |
| 126 | check_memory_region((unsignedlong)dest, len, true, _RET_IP_) |
| 名称 | 描述 |
|---|---|
| strlcat | 长字符串拼接 |
| ip6_compressed_string | |
| vsnprintf | vsnprintf - Format a string and place it in a buffer*@buf: The buffer to place the result into*@size: The size of the buffer, including the trailing null space*@fmt: The format string to use*@args: Arguments for the format string* This function generally |
| seq_buf_puts | 简单字符串序列打印 |
| seq_buf_putmem | seq_buf_putmem - write raw data into the sequenc buffer*@s: seq_buf descriptor*@mem: The raw memory to copy into the buffer*@len: The length of the raw memory to copy (in bytes)* There may be cases where raw memory needs to be written into the |
| fill_kobj_path | |
| unlzo | |
| match_strlcpy | match_strlcpy: - Copy the characters from a substring_t to a sized buffer*@dest: where to copy to*@src: &substring_t to copy*@size: size of destination buffer* Description: Copy the characters in &substring_t @src to the* c-style string @dest |
| sg_copy_buffer | sg_copy_buffer - Copy data between a linear buffer and an SG list*@sgl: The SG list*@nents: Number of SG entries*@buf: Where to copy from*@buflen: The number of bytes to copy*@skip: Number of bytes to skip before copying*@to_buffer: transfer direction |
| memcpy_from_page | |
| memcpy_to_page | |
| _copy_to_iter | |
| ldt_dup_context | Called on fork from arch_dup_mmap(). Just copy the current LDT state,* the new task is not running, so nothing can be installed. |
| write_ldt | |
| setup_arch | 平台相关启动 |
| __jump_label_set_jump_code | |
| boot_params_data_read | |
| setup_data_data_read | |
| e820__update_table | |
| e820__memory_setup_extended | Because of the small fixed size of struct boot_params, only the first* 128 E820 memory entries are passed to the kernel via boot_params.e820_table,* the remaining (if any) entries are passed via the SETUP_E820_EXT node of |
| e820__memory_setup | Calls e820__memory_setup_default() in essence to pick up the firmware/bootloader* E820 map - with an optional platform quirk available for virtual platforms* to override this method of boot environment processing: |
| add_nops | Use this to add nops to a buffer, then text_poke the whole buffer. |
| apply_alternatives | Replace instructions with better alternatives for this CPU type. This runs* before SMP is initialized to avoid SMP problems with self modifying code.* This implies that asymmetric systems where APs have less capabilities than |
| text_poke_early | xt_poke_early - Update instructions on a live kernel at boot time*@addr: address to modify*@opcode: source of the copy*@len: length to copy* When you use this code to patch more than one byte of an instruction |
| __text_poke | |
| text_poke_loc_init | |
| arch_dup_task_struct | his gets called so that we can store lazy state into memory and copy the* current task into the new thread. |
| fpu__copy | |
| xstateregs_get | |
| convert_from_fxsr | FXSR floating point environment conversions. |
| convert_to_fxsr | |
| fpstate_sanitize_xstate | When executing XSAVEOPT (or other optimized XSAVE instructions), if* a processor implementation detects that an FPU state component is still* (or is again) in its initialized state, it may clear the corresponding* bit in the header |
| __copy_xstate_to_kernel | This is similar to user_regset_copyout(), but will not add offset to* the source data pointer or increment pos, count, kbuf, and ubuf. |
| copy_kernel_to_xstate | Convert from a ptrace standard-format kernel buffer to kernel XSAVES format* and copy to the target thread. This is called from xstateregs_set(). |
| microcode_check | The microcode loader calls this upon late microcode load to recheck features,* only when microcode has been updated. Caller holds microcode_mutex and CPU* hotplug lock. |
| mce_gen_pool_add | |
| apei_write_mce | |
| apei_read_mce | |
| generic_load_microcode | |
| apply_microcode_early_amd | Early load occurs before we can vmalloc() |
| install_equiv_cpu_table | |
| load_microcode_amd | |
| smp_check_mpc | Read/parse the MPC |
| update_mp_table | |
| setup_APIC_timer | Setup the local APIC timer for this CPU. Copy the initialized values* of the boot CPU and register the clock event in the framework. |
| mp_save_irq | Will be called in mpparse/acpi/sfi codes for saving IRQ info |
| machine_kexec | Do not allocate memory (or fail in any way) in machine_kexec().* We are past the point of no return, committed to rebooting now. |
| add_e820_entry | |
| setup_cmdline | |
| setup_e820_entries | |
| setup_boot_parameters | |
| bzImage64_load | |
| copy_oldmem_page | py_oldmem_page - copy one page from "oldmem"*@pfn: page frame number to be copied*@buf: target memory address for the copy; this can be in kernel address* space or user address space (see @userbuf)*@csize: number of bytes to copy*@offset: offset in bytes |
| __recover_probed_insn | |
| __recover_optprobed_insn | |
| arch_prepare_optimized_kprobe | Copy replacing target instructions* Target instructions MUST be relocatable (checked inside)* This is called when new aggr(opt)probe is allocated or reused. |
| arch_optimize_kprobes | Replace breakpoints (int3) with relative jumps.* Caller must call with locking kprobe_mutex and text_mutex. |
| arch_unoptimize_kprobe | Replace a relative jump with a breakpoint (int3). |
| dbg_set_reg | |
| dbg_get_reg | |
| save_v86_state | |
| do_sys_vm86 | |
| paravirt_patch_insns | |
| jailhouse_init_platform | |
| emulate_umip_insn | mulate_umip_insn() - Emulate UMIP instructions and return dummy values*@insn: Instruction structure with operands*@umip_inst: A constant indicating the instruction to emulate*@data: Buffer into which the dummy result is stored*@data_size: Size of the |
| fixup_umip_exception | xup_umip_exception() - Fixup a general protection fault caused by UMIP*@regs: Registers as saved when entering the #GP handler* The instructions SGDT, SIDT, STR, SMSW and SLDT cause a general protection* fault if executed with CPL > 0 (i |
| copy_sighand | 复制信号句柄 |
| copy_signal | 复制信号 |
| proc_get_long | proc_get_long - reads an ASCII formatted integer from a user buffer*@buf: a kernel buffer*@size: size of the kernel buffer*@val: this is where the number will be stored*@neg: set to %TRUE if number is negative*@perm_tr: a vector which contains the allowed |
| SYSCALL_DEFINE1 | |
| SYSCALL_DEFINE1 | Old cruft |
| SYSCALL_DEFINE1 | |
| SYSCALL_DEFINE2 | |
| SYSCALL_DEFINE2 | |
| SYSCALL_DEFINE2 | Only setdomainname; getdomainname can be implemented by calling* uname() |
| prctl_set_auxv | |
| notes_read | |
| prepare_creds | prepare_creds - Prepare a new set of credentials for modification* Prepare a new set of task credentials for modification |
| get_recent_times | |
| init_triggers | |
| update_triggers | |
| init_header_complete | |
| mark_swapfiles | Saving part |
| save_image_lzo | save_image_lzo - Save the suspend image data compressed with LZO.*@handle: Swap map handle to use for saving the image.*@snapshot: Image to read data from.*@nr_to_write: Number of pages to save. |
| load_image_lzo | load_image_lzo - Load compressed image data and decompress them with LZO.*@handle: Swap map handle to use for loading data.*@snapshot: Image to copy uncompressed data into.*@nr_to_read: Number of pages to load. |
| swsusp_check | swsusp_check - Check for swsusp signature in the resume device |
| log_store | sert record into the buffer, discard old ones, update heads |
| setup_log_buf | 日志缓冲设置 |
| msg_print_text | |
| cont_add | |
| swiotlb_bounce | Bounce: copy the swiotlb buffer from or back to the original dma location |
| update_fast_timekeeper | pdate_fast_timekeeper - Update the fast and NMI safe monotonic timekeeper.*@tkr: Timekeeping readout base from which we take the update* We want to use this from any context including NMI and tracing /* instrumenting the timekeeping code itself. |
| halt_fast_timekeeper | halt_fast_timekeeper - Prevent fast timekeeper from accessing clocksource.*@tk: Timekeeper to snapshot.* It generally is unsafe to access the clocksource after timekeeping has been* suspended, so take a snapshot of the readout base of @tk and use it as the |
| timekeeping_update | must hold timekeeper_lock |
| timekeeping_advance | mekeeping_advance - Updates the timekeeper to the current time and* current NTP tick length |
| copy_module_elf | Persist Elf information about a module. Copy the Elf header,* section header table, section string table, and symtab section* index from info to mod->klp_info. |
| move_module | |
| mod_verify_sig | Verify the signature on a module. |
| append_elf_note | |
| crash_update_vmcoreinfo_safecopy | |
| vmcoreinfo_append_str | |
| kimage_load_normal_segment | |
| kimage_load_crash_segment | |
| crash_prepare_elf64_headers | |
| elf_read_ehdr | |
| compat_sig_setmask | sys_sigprocmask SIG_SETMASK sets the first (compat) word of the* blocked set of signals to the supplied signal set |
| find_css_set | d_css_set - return a new css_set with one cgroup updated*@old_cset: the baseline css_set*@cgrp: the cgroup to be updated* Return a new css_set that's equivalent to @old_cset, but with @cgrp* substituted into the appropriate hierarchy. |
| clone_uts_ns | Clone a new ns copying an original utsname, setting refcount to 1*@old_ns: namespace to clone* Return ERR_PTR(-ENOMEM) on error (failure to allocate), new ns otherwise |
| insert_extent | sert_extent - Safely insert a new idmap extent into struct uid_gid_map.* Takes care to allocate a 4K block of memory if the number of mappings exceeds* UID_GID_MAP_MAX_BASE_EXTENTS. |
| map_write | |
| audit_make_reply | |
| audit_receive_msg | |
| audit_log_n_string | Format a string of no more than slen characters into the audit buffer,* enclosed in quote marks. |
| audit_unpack_string | Unpack a filter field's string representation from user-space* buffer. |
| audit_pack_string | Pack a filter field's string representation into data block. |
| audit_dupe_rule | Duplicate an audit rule. This will be a deep copy with the exception* of the watch - that pointer is carried over. The LSM specific fields* will be updated in the copy. The point is to be able to replace the old |
| __audit_mq_open | __audit_mq_open - record audit data for a POSIX MQ open*@oflag: open flag*@mode: mode bits*@attr: queue attributes |
| __audit_mq_sendrecv | __audit_mq_sendrecv - record audit data for a POSIX MQ timed send/receive*@mqdes: MQ descriptor*@msg_len: Message length*@msg_prio: Message priority*@abs_timeout: Message timeout in absolute time |
| __audit_socketcall | __audit_socketcall - record audit data for sys_socketcall*@nargs: number of args, which should not be more than AUDITSC_ARGS.*@args: args array |
| __audit_sockaddr | __audit_sockaddr - record audit data for sys_bind, sys_connect, sys_sendto*@len: data length in user space*@a: data address in kernel space* Returns 0 for success or NULL context or < 0 on error. |
| __audit_ptrace | |
| audit_signal_info_syscall | audit_signal_info_syscall - record signal info for syscalls*@t: task being signaled* If the audit subsystem is being terminated, record the task (pid)* and uid that is doing that. |
| add_info | Associate a profiling data set with an existing node. Needs to be called* with node_lock held. |
| gcov_info_dup | gcov_info_dup - duplicate profiling data set*@info: profiling data set to duplicate* Return newly allocated duplicate on success, %NULL on error. |
| gcov_info_dup | gcov_info_dup - duplicate profiling data set*@info: profiling data set to duplicate* Return newly allocated duplicate on success, %NULL on error. |
| llvm_gcda_start_file | |
| gcov_fn_info_dup | |
| kcov_move_area | |
| copy_kprobe | Keep all fields in the kprobe consistent |
| kdb_read | kdb_read* This function reads a string of characters, terminated by* a newline, or by reaching the end of the supplied buffer,* from the current kernel debugger console device.* Parameters:* Returns:* Returns a pointer to the buffer containing the received |
| kdb_defcmd2 | |
| kdb_defcmd | |
| kdb_register_flags | |
| kallsyms_symbol_complete | kallsyms_symbol_complete* Parameters:* prefix_name prefix of a symbol name to lookup* max_len maximum length that can be returned* Returns:* Number of symbols which match the given prefix |
| kdb_getphys | kdb_getphys - Read data from a physical address |
| proc_do_uts_string | Special case of dostring for the UTS structure. This has locks* to observe. Should this be in kernel/sys.c ???? |
| fill_stats_for_tgid | |
| taskstats_exit | Send pid data out on exit |
| func_add | |
| account_global_scheduler_latency | |
| __account_scheduler_latency | __account_scheduler_latency - record an occurred latency*@tsk - the task struct of the task hitting the latency*@usecs - the duration of the latency in microseconds*@inter - 1 if the sleep was interruptible, 0 if uninterruptible* This function is the main |
| ring_buffer_write | g_buffer_write - write data to the buffer without reserving*@buffer: The ring buffer to write to |
| ring_buffer_read_page | g_buffer_read_page - extract a page from the ring buffer*@buffer: buffer to extract from*@data_page: the page to use allocated from ring_buffer_alloc_read_page*@len: amount to extract*@cpu: the cpu of the buffer to extract |
| __trace_puts | __trace_puts - write a constant string into the trace buffer.*@ip: The address of the caller*@str: The constant string to write*@size: The size of the string. |
| trace_seq_to_buffer | TODO add a seq_buf_to_buffer() |
| __ftrace_trace_stack | |
| trace_vbprintk | race_vbprintk - write binary msg to tracing buffer*@ip: The address of the caller*@fmt: The string format to write to the buffer*@args: Arguments for @fmt |
| __trace_array_vprintk | |
| tracing_mark_write | |
| tracing_mark_raw_write | |
| __tracing_map_insert | |
| ftrace_syscall_enter | |
| trace_inject_entry | |
| parse_entry | Caller is responsible to free the *pentry. |
| add_to_key | |
| trace_kprobe_create | |
| traceprobe_parse_probe_arg_body | String length checking wrapper |
| __uprobe_trace_func | |
| bpf_prog_realloc | |
| bpf_prog_calc_tag | |
| bpf_patch_insn_single | |
| bpf_prog_get_info_by_fd | |
| bpf_map_get_info_by_fd | |
| do_collect | |
| shrink_lruvec | |
| kstrdup | kstrdup - allocate space for and copy an existing string*@s: the string to duplicate*@gfp: the GFP mask used in the kmalloc() call when allocating memory* Return: newly allocated copy of @s or %NULL in case of error |
| kstrndup | kstrndup - allocate space for and copy an existing string*@s: the string to duplicate*@max: read at most @max chars from @s*@gfp: the GFP mask used in the kmalloc() call when allocating memory* Note: Use kmemdup_nul() instead if the size is known exactly |
| kmemdup | kmemdup - duplicate region of memory*@src: memory region to duplicate*@len: memory region length*@gfp: GFP mask to use* Return: newly allocated copy of @src or %NULL in case of error |
| kmemdup_nul | kmemdup_nul - Create a NUL-terminated string from unterminated data*@s: The data to stringify*@len: The size of the data*@gfp: the GFP mask used in the kmalloc() call when allocating memory* Return: newly allocated copy of @s with NUL-termination or %NULL |
| __do_krealloc | |
| vread | |
| vwrite | |
| aligned_vread | small helper routine , copy contents to buf from addr.* If the page is not present, fill zero. |
| aligned_vwrite | |
| memblock_double_array | |
| zswap_frontswap_store | attempts to compress and store an single page |
| transfer_objects | Transfer objects in one arraycache to another.* Locking must be handled by the caller.* Return the number of entries transferred. |
| init_list | swap the static kmem_cache_node with kmalloced memory |
| cache_flusharray | |
| bootstrap | Used for early kmem_cache structures that were allocated using* the page allocator. Allocate them properly then fix up the pointers* that may be pointing to the wrong kmem_cache structure. |
| proc_ipc_dointvec_minmax | |
| proc_ipc_doulongvec_minmax | |
| proc_ipc_auto_msgmni | |
| proc_mq_dointvec | |
| proc_mq_dointvec_minmax | |
| bio_alloc_map_data | |
| bio_copy_kern_endio_read | |
| bio_copy_kern | _copy_kern - copy kernel address into bio*@q: the struct request_queue for the bio*@data: pointer to buffer to copy*@len: length in bytes*@gfp_mask: allocation flags for bio and page allocation*@reading: data direction is READ* copy the kernel address |
| blk_mq_realloc_hw_ctxs | |
| blk_mq_realloc_tag_set_tags | |
| add_partition | Must be called either with bd_mutex held, before a disk can be opened or* after all disk users are gone. |
| read_lba | ad_lba(): Read bytes from disk, starting at given LBA*@state*@lba*@buffer*@count* Description: Reads @count bytes from @state->bdev into @buffer.* Returns number of bytes read on success, 0 on error. |
| ldm_get_vstr | ldm_get_vstr - Read a length-prefixed string into a buffer*@block: Pointer to the length marker*@buffer: Location to copy string to*@buflen: Size of the output buffer* Many of the strings in the LDM Database are not NULL terminated. Instead |
| ldm_parse_vol5 | ldm_parse_vol5 - Read a raw VBLK Volume object into a vblk structure*@buffer: Block of data being worked on*@buflen: Size of the block of data*@vb: In-memory vblk in which to return information |
| ldm_frag_add | ldm_frag_add - Add a VBLK fragment to a list*@data: Raw fragment to be added to the list*@size: Size of the raw fragment*@frags: Linked list of VBLK fragments* Fragmented VBLKs may not be consecutive in the database, so they are placed |
| find_label | |
| find_vol1_partitions | |
| read_lba | ad_lba(): Read bytes from disk, starting at given LBA*@state: disk parsed partitions*@lba: the Logical Block Address of the partition table*@buffer: destination buffer*@count: bytes to read* Description: Reads @count bytes from @state->bdev into @buffer. |
| __blk_queue_bounce | |
| ioc_refresh_params | |
| ioc_qos_write | |
| ioc_cost_model_write | |
| bio_integrity_clone | _integrity_clone - Callback for cloning bios with integrity metadata*@bio: New bio*@bio_src: Original bio*@gfp_mask: Memory allocation mask* Description: Called to allocate a bip when cloning a bio |
| add_token_bytestring | |
| build_locking_range | |
| build_locking_user | |
| generic_get_table_info | see TCG SAS 5.3.2.3 for a description of the available columns* the result is provided in dev->resp->tok[4] |
| gen_key | |
| start_auth_opal_session | |
| internal_activate_user | |
| set_new_pw | |
| set_sid_cpin_pin | |
| add_user_to_lr | |
| key_set_index_key | Finalise an index key to include a part of the description actually in the* index key, to set the domain tag and to calculate the hash. |
| user_preparse | Preparse a user defined key payload |
| compat_keyctl_dh_compute | Perform the DH computation or DH based key derivation.* If successful, 0 will be returned. |
| proc_keys_show | |
| big_key_preparse | Preparse a big key |
| osap | Create an object specific authorisation protocol (OSAP) session |
| oiap | Create an object independent authorisation protocol (oiap) session |
| tpm_seal | Have the TPM seal(encrypt) the trusted key, possibly based on* Platform Configuration Registers (PCRs). AUTH1 for sealing key. |
| tpm_unseal | se the AUTH2_COMMAND form of unseal, to authorize both key and blob |
| trusted_instantiate | rusted_instantiate - create a new trusted key* Unseal an existing trusted blob or, for a new key, get a* random key, then seal and create a trusted key-type key,* adding it to the specified keyring.* On success, return 0. Otherwise return errno. |
| trusted_update | rusted_update - reseal an existing key with new PCR values |
| tpm2_seal_trusted | pm2_seal_trusted() - seal the payload of a trusted key*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options* Return: < 0 on error and 0 on success. |
| tpm2_unseal_cmd | pm2_unseal_cmd() - execute a TPM2_Unload command*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options*@blob_handle: blob handle* Return: 0 on success* -EPERM on tpm error status* < 0 |
| get_derived_key | Derive authentication/encryption key from trusted key |
| derived_key_encrypt | Before returning data to userspace, encrypt decrypted data. |
| derived_key_decrypt | |
| __ekey_init | |
| encrypted_instantiate | rypted_instantiate - instantiate an encrypted key* Decrypt an existing encrypted datablob or create a new encrypted key* based on a kernel random number.* On success, return 0. Otherwise return errno. |
| encrypted_update | rypted_update - update the master key description* Change the master key description for an existing encrypted key.* The next read will return an encrypted datablob using the new* master key description.* On success, return 0. Otherwise return errno. |
| cap_inode_getsecurity | getsecurity: We are called for security |
| cap_convert_nscap | User requested a write of security.capability. If needed, update the* xattr to change from v2 to v3, or to fixup the v3 rootid.* If all is ok, we return the new size, on error return < 0. |
| avc_copy_xperms_decision | |
| avc_xperms_populate | |
| avc_node_populate | |
| avc_has_extended_perms | The avc extended permissions logic adds an additional 256 bits of* permissions to an avc node when extended permissions for that node are* specified in the avtab |
| avc_has_perm_noaudit | avc_has_perm_noaudit - Check permissions but perform no auditing |
| selinux_inode_listsecurity | |
| sel_write_context | |
| sel_write_create | |
| sel_write_relabel | |
| sel_write_user | |
| sel_write_member | |
| selinux_xfrm_alloc_user | Allocates a xfrm_sec_state and populates it using the supplied security* xfrm_user_sec_ctx context. |
| selinux_xfrm_state_alloc_acquire | LSM hook implementation that allocates a xfrm_sec_state and populates based* on a secid. |
| smack_inode_listsecurity | smack_inode_listsecurity - list the Smack attributes*@inode: the object*@buffer: where they go*@buffer_size: size of buffer |
| dump_common_audit_data | dump_common_audit_data - helper to dump common audit data*@a : common audit data |
| tomoyo_assign_domain | moyo_assign_domain - Create a domain or a namespace.*@domainname: The name of domain.*@transit: True if transit to domain found or created.* Returns pointer to "struct tomoyo_domain_info" on success, NULL otherwise.* Caller holds tomoyo_read_lock(). |
| tomoyo_dump_page | moyo_dump_page - Dump a page to buffer.*@bprm: Pointer to "struct linux_binprm".*@pos: Location to dump.*@dump: Poiner to "struct tomoyo_page_dump".* Returns true on success, false otherwise. |
| query_data | query_data - queries a policy and writes its data to buf*@buf: the resulting data is stored here (NOT NULL)*@buf_len: size of buf*@query: query string used to retrieve data*@query_len: size of query including second NUL byte |
| deflate_decompress | |
| prepend | modified from dcache.c |
| kvmemdup | |
| deflate_compress | |
| apparmor_setprocattr | |
| param_set_aaintbool | |
| param_get_aaintbool | |
| parse_efi_signature_list | parse_efi_signature_list - Parse an EFI signature list for certificates*@source: The source of the key*@data: The data blob to parse*@size: The size of the data blob*@get_handler_for_guid: Get the handler func for the sig type (or NULL) |
| uefi_blacklist_hash | Blacklist a hash. |
| ima_pcr_extend | Return the amount of memory required for serializing the* entire binary_runtime_measurement list, including the ima_kexec_hdr* structure. |
| ima_add_template_entry | Add template entry to the measurement list and hash table, and* extend the pcr.* On systems which support carrying the IMA measurement list across* kexec, maintain the total memory size required for serializing the* binary_runtime_measurements. |
| ima_calc_field_array_hash_tfm | Calculate the hash of template data |
| ima_store_template | ma_store_template - store ima template measurements* Calculate the hash of a template entry, add the template entry* to an ordered list of measurement entries maintained inside the kernel,* and also update the aggregate integrity value (maintained inside |
| ima_collect_measurement | ma_collect_measurement - collect file measurement* Calculate the file hash, if it doesn't already exist,* storing the measurement and i_version in the iint.* Must be called with iint->mutex held.* Return 0 on success, error code otherwise |
| ima_lsm_copy_rule | |
| template_desc_init_fields | |
| ima_restore_template_data | |
| ima_restore_measurement_list | Restore the serialized binary measurement list without extending PCRs. |
| ima_write_template_field_data | |
| ima_eventdigest_init_common | |
| ima_read_modsig | ma_read_modsig - Read modsig from buf.* Return: 0 on success, error code otherwise. |
| evm_set_key | vm_set_key() - set EVM HMAC key from the kernel*@key: pointer to a buffer with the key data*@size: length of the key data* This function allows setting the EVM HMAC key from the kernel* without using the "encrypted" key subsystem keys |
| pipe_set_size | Allocate a new array of pipe buffers and copy the info over. Returns the* pipe size if successful, or return -ERROR on error. |
| getname_kernel | |
| __nd_alloc_stack | |
| __page_symlink | The nofs argument instructs pagecache_write_begin to pass AOP_FLAG_NOFS |
| take_dentry_name_snapshot | |
| __d_alloc | __d_alloc - allocate a dcache entry*@sb: filesystem it will belong to*@name: qstr of the name* Allocates a dentry. It returns %NULL if there is insufficient memory* available. On a success the dentry is returned. The name passed in is |
| swap_names | |
| copy_name | |
| copy_fd_bitmaps | Copy 'count' fd bits from the old table to the new table and clear the extra* space if any. This does not copy the file pointers. Called with the files* spinlock held for write. |
| copy_fdtable | Copy all file descriptors from the old table to the new, expanded table and* clear the extra space. Called with the files spinlock held for write. |
| seq_puts | |
| seq_write | seq_write - write arbitrary data to buffer*@seq: seq_file identifying the buffer to which data should be written*@data: data address*@len: number of bytes* Return 0 on success, non-zero otherwise. |
| xattr_getsecurity | |
| generic_listxattr | Combine the results of the list() operation from every xattr_handler in the* list. |
| simple_xattr_alloc | Allocate new xattr and copy in the value; but leave the name to callers. |
| simple_xattr_get | xattr GET operation for in-memory/pseudo filesystems |
| xattr_list_one | |
| memory_read_from_buffer | memory_read_from_buffer - copy data from the buffer*@to: the kernel space buffer to read to*@count: the maximum number of bytes to read*@ppos: the current position in the buffer*@from: the buffer to read from*@available: the size of the buffer* The |
| prepend | |
| dynamic_dname | Helper function for dentry_operations.d_dname() members |
| do_statfs_native | |
| do_statfs64 | |
| legacy_parse_param | Add a parameter to a legacy config. We build up a comma-separated list of* options. |
| copy_fid_to_user | |
| ioctx_add_table | |
| io_req_map_rw | |
| io_sendmsg | |
| io_recvmsg | |
| io_connect | |
| fscrypt_generate_iv | |
| fname_encrypt | ame_encrypt() - encrypt a filename* The output buffer must be at least as large as the input buffer.* Any extra space is filled with NUL padding before encryption.* Return: 0 on success, -errno on failure |
| fscrypt_fname_disk_to_usr | scrypt_fname_disk_to_usr() - converts a filename from disk space to user* space* The caller must have allocated sufficient memory for the @oname string.* If the key is available, we'll decrypt the disk name; otherwise, we'll encode* it for presentation |
| fscrypt_hkdf_expand | HKDF-Expand (RFC 5869 section 2 |
| move_master_key_secret | |
| fscrypt_verify_key_added | Verify that the current user has added a master key with the given identifier* (returns -ENOKEY if not) |
| setup_per_mode_key | |
| setup_file_encryption_key | Find the master key, then set up the inode's actual encryption key.* If the master key is found in the filesystem-level keyring, then the* corresponding 'struct key' is returned in *master_key_ret with* ->mk_secret_sem read-locked |
| fscrypt_get_encryption_info | |
| find_or_insert_direct_key | Find/insert the given key into the fscrypt_direct_keys table. If found, it* is returned with elevated refcount, and 'to_insert' is freed if non-NULL. If* not found, 'to_insert' is inserted and returned if it's non-NULL; otherwise* NULL is returned. |
| fscrypt_get_direct_key | Prepare to encrypt directly using the master key in the given mode |
| fscrypt_new_context_from_policy | |
| fscrypt_policy_from_context | |
| build_merkle_tree | Build the Merkle tree for the given inode using the given parameters, and* return the root hash in @root_hash.* The tree is written to a filesystem-specific location as determined by the* ->write_merkle_tree_block() method |
| fsverity_prepare_hash_state | sverity_prepare_hash_state() - precompute the initial hash state*@alg: hash algorithm*@salt: a salt which is to be prepended to all data to be hashed*@salt_size: salt size in bytes, possibly 0* Return: NULL if the salt is empty, otherwise the kmalloc()'ed |
| fsverity_create_info | Validate the given fsverity_descriptor and create a new fsverity_info from* it. The signature (if present) is also checked. |
| extract_hash | Extract a hash from a hash page |
| fsverity_verify_signature | sverity_verify_signature() - check a verity file's signature* If the file's fs-verity descriptor includes a signature of the file* measurement, verify it against the certificates in the fs-verity keyring |
| iomap_read_inline_data | |
| iomap_write_end_inline | |
| iomap_swapfile_activate_actor | Accumulate iomaps for this swap file. We have to accumulate iomaps because* swap only cares about contiguous page-aligned physical extents and makes no* distinction between written and unwritten extents. |
| print_shadow_for_address | |
| __mem_cgroup_usage_register_event | |
| __zs_map_object | |
| __zs_unmap_object | |
| zs_object_copy | |
| zs_pool_stats | |
| compact_single_buddy | |
| z3fold_page_migrate | |
| copy_from_early_mem | |
| tpm_buf_append | |
| xfrm_flowi_addr_get | |
| xfrm_mark_get | |
| fscrypt_new_context_from_policy | scrypt_new_context_from_policy - create a new fscrypt_context from a policy* Create an fscrypt_context for an inode that is being assigned the given* encryption policy. A new nonce is randomly generated.* Return: the size of the new context in bytes. |
| fscrypt_policy_from_context | scrypt_policy_from_context - convert an fscrypt_context to an fscrypt_policy* Given an fscrypt_context, build the corresponding fscrypt_policy.* Return: 0 on success, or -EINVAL if the fscrypt_context has an unrecognized* version number or size. |
| 源代码转换工具 开放的插件接口 | X |
|---|---|
| 支持:c/c++/esqlc/java Oracle/Informix/Mysql 插件可实现:逻辑报告 代码生成和批量转换代码 |