Function report |
Source Code:mm\kasan\common.c |
Create Date:2022-07-28 15:50:39 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:memcpy
Proto:void *memcpy(void *dest, const void *src, size_t len)
Type:void
Parameter:
Type | Parameter | Name |
---|---|---|
void * | dest | |
const void * | src | |
size_t | len |
125 | check_memory_region((unsignedlong)src, len, TSC's on different sockets may be reset asynchronously.* This may cause the TSC ADJUST value on socket 0 to be NOT 0., _RET_IP_) |
126 | check_memory_region((unsignedlong)dest, len, true, _RET_IP_) |
Name | Describe |
---|---|
strlcat | strlcat - Append a length-limited, C-string to another*@dest: The string to be appended to*@src: The string to append to it*@count: The size of the destination buffer. |
ip6_compressed_string | |
vsnprintf | vsnprintf - Format a string and place it in a buffer*@buf: The buffer to place the result into*@size: The size of the buffer, including the trailing null space*@fmt: The format string to use*@args: Arguments for the format string* This function generally |
seq_buf_puts | seq_buf_puts - sequence printing of simple string*@s: seq_buf descriptor*@str: simple string to record* Copy a simple string into the sequence buffer.* Returns zero on success, -1 on overflow |
seq_buf_putmem | seq_buf_putmem - write raw data into the sequenc buffer*@s: seq_buf descriptor*@mem: The raw memory to copy into the buffer*@len: The length of the raw memory to copy (in bytes)* There may be cases where raw memory needs to be written into the |
fill_kobj_path | |
unlzo | |
match_strlcpy | match_strlcpy: - Copy the characters from a substring_t to a sized buffer*@dest: where to copy to*@src: &substring_t to copy*@size: size of destination buffer* Description: Copy the characters in &substring_t @src to the* c-style string @dest |
sg_copy_buffer | sg_copy_buffer - Copy data between a linear buffer and an SG list*@sgl: The SG list*@nents: Number of SG entries*@buf: Where to copy from*@buflen: The number of bytes to copy*@skip: Number of bytes to skip before copying*@to_buffer: transfer direction |
memcpy_from_page | |
memcpy_to_page | |
_copy_to_iter | |
ldt_dup_context | Called on fork from arch_dup_mmap(). Just copy the current LDT state,* the new task is not running, so nothing can be installed. |
write_ldt | |
setup_arch | setup_arch - architecture-specific boot-time initializations* Note: On x86_64, fixmaps are ready for use even before this is called. |
__jump_label_set_jump_code | |
boot_params_data_read | |
setup_data_data_read | |
e820__update_table | |
e820__memory_setup_extended | Because of the small fixed size of struct boot_params, only the first* 128 E820 memory entries are passed to the kernel via boot_params.e820_table,* the remaining (if any) entries are passed via the SETUP_E820_EXT node of |
e820__memory_setup | Calls e820__memory_setup_default() in essence to pick up the firmware/bootloader* E820 map - with an optional platform quirk available for virtual platforms* to override this method of boot environment processing: |
add_nops | Use this to add nops to a buffer, then text_poke the whole buffer. |
apply_alternatives | Replace instructions with better alternatives for this CPU type. This runs* before SMP is initialized to avoid SMP problems with self modifying code.* This implies that asymmetric systems where APs have less capabilities than |
text_poke_early | xt_poke_early - Update instructions on a live kernel at boot time*@addr: address to modify*@opcode: source of the copy*@len: length to copy* When you use this code to patch more than one byte of an instruction |
__text_poke | |
text_poke_loc_init | |
arch_dup_task_struct | his gets called so that we can store lazy state into memory and copy the* current task into the new thread. |
fpu__copy | |
xstateregs_get | |
convert_from_fxsr | FXSR floating point environment conversions. |
convert_to_fxsr | |
fpstate_sanitize_xstate | When executing XSAVEOPT (or other optimized XSAVE instructions), if* a processor implementation detects that an FPU state component is still* (or is again) in its initialized state, it may clear the corresponding* bit in the header |
__copy_xstate_to_kernel | This is similar to user_regset_copyout(), but will not add offset to* the source data pointer or increment pos, count, kbuf, and ubuf. |
copy_kernel_to_xstate | Convert from a ptrace standard-format kernel buffer to kernel XSAVES format* and copy to the target thread. This is called from xstateregs_set(). |
microcode_check | The microcode loader calls this upon late microcode load to recheck features,* only when microcode has been updated. Caller holds microcode_mutex and CPU* hotplug lock. |
mce_gen_pool_add | |
apei_write_mce | |
apei_read_mce | |
generic_load_microcode | |
apply_microcode_early_amd | Early load occurs before we can vmalloc() |
install_equiv_cpu_table | |
load_microcode_amd | |
smp_check_mpc | Read/parse the MPC |
update_mp_table | |
setup_APIC_timer | Setup the local APIC timer for this CPU. Copy the initialized values* of the boot CPU and register the clock event in the framework. |
mp_save_irq | Will be called in mpparse/acpi/sfi codes for saving IRQ info |
machine_kexec | Do not allocate memory (or fail in any way) in machine_kexec().* We are past the point of no return, committed to rebooting now. |
add_e820_entry | |
setup_cmdline | |
setup_e820_entries | |
setup_boot_parameters | |
bzImage64_load | |
copy_oldmem_page | py_oldmem_page - copy one page from "oldmem"*@pfn: page frame number to be copied*@buf: target memory address for the copy; this can be in kernel address* space or user address space (see @userbuf)*@csize: number of bytes to copy*@offset: offset in bytes |
__recover_probed_insn | |
__recover_optprobed_insn | |
arch_prepare_optimized_kprobe | Copy replacing target instructions* Target instructions MUST be relocatable (checked inside)* This is called when new aggr(opt)probe is allocated or reused. |
arch_optimize_kprobes | Replace breakpoints (int3) with relative jumps.* Caller must call with locking kprobe_mutex and text_mutex. |
arch_unoptimize_kprobe | Replace a relative jump with a breakpoint (int3). |
dbg_set_reg | |
dbg_get_reg | |
save_v86_state | |
do_sys_vm86 | |
paravirt_patch_insns | |
jailhouse_init_platform | |
emulate_umip_insn | mulate_umip_insn() - Emulate UMIP instructions and return dummy values*@insn: Instruction structure with operands*@umip_inst: A constant indicating the instruction to emulate*@data: Buffer into which the dummy result is stored*@data_size: Size of the |
fixup_umip_exception | xup_umip_exception() - Fixup a general protection fault caused by UMIP*@regs: Registers as saved when entering the #GP handler* The instructions SGDT, SIDT, STR, SMSW and SLDT cause a general protection* fault if executed with CPL > 0 (i |
copy_sighand | |
copy_signal | |
proc_get_long | proc_get_long - reads an ASCII formatted integer from a user buffer*@buf: a kernel buffer*@size: size of the kernel buffer*@val: this is where the number will be stored*@neg: set to %TRUE if number is negative*@perm_tr: a vector which contains the allowed |
SYSCALL_DEFINE1 | |
SYSCALL_DEFINE1 | Old cruft |
SYSCALL_DEFINE1 | |
SYSCALL_DEFINE2 | |
SYSCALL_DEFINE2 | |
SYSCALL_DEFINE2 | Only setdomainname; getdomainname can be implemented by calling* uname() |
prctl_set_auxv | |
notes_read | |
prepare_creds | prepare_creds - Prepare a new set of credentials for modification* Prepare a new set of task credentials for modification |
get_recent_times | |
init_triggers | |
update_triggers | |
init_header_complete | |
mark_swapfiles | Saving part |
save_image_lzo | save_image_lzo - Save the suspend image data compressed with LZO.*@handle: Swap map handle to use for saving the image.*@snapshot: Image to read data from.*@nr_to_write: Number of pages to save. |
load_image_lzo | load_image_lzo - Load compressed image data and decompress them with LZO.*@handle: Swap map handle to use for loading data.*@snapshot: Image to copy uncompressed data into.*@nr_to_read: Number of pages to load. |
swsusp_check | swsusp_check - Check for swsusp signature in the resume device |
log_store | sert record into the buffer, discard old ones, update heads |
setup_log_buf | |
msg_print_text | |
cont_add | |
swiotlb_bounce | Bounce: copy the swiotlb buffer from or back to the original dma location |
update_fast_timekeeper | pdate_fast_timekeeper - Update the fast and NMI safe monotonic timekeeper.*@tkr: Timekeeping readout base from which we take the update* We want to use this from any context including NMI and tracing /* instrumenting the timekeeping code itself. |
halt_fast_timekeeper | halt_fast_timekeeper - Prevent fast timekeeper from accessing clocksource.*@tk: Timekeeper to snapshot.* It generally is unsafe to access the clocksource after timekeeping has been* suspended, so take a snapshot of the readout base of @tk and use it as the |
timekeeping_update | must hold timekeeper_lock |
timekeeping_advance | mekeeping_advance - Updates the timekeeper to the current time and* current NTP tick length |
copy_module_elf | Persist Elf information about a module. Copy the Elf header,* section header table, section string table, and symtab section* index from info to mod->klp_info. |
move_module | |
mod_verify_sig | Verify the signature on a module. |
append_elf_note | |
crash_update_vmcoreinfo_safecopy | |
vmcoreinfo_append_str | |
kimage_load_normal_segment | |
kimage_load_crash_segment | |
crash_prepare_elf64_headers | |
elf_read_ehdr | |
compat_sig_setmask | sys_sigprocmask SIG_SETMASK sets the first (compat) word of the* blocked set of signals to the supplied signal set |
find_css_set | d_css_set - return a new css_set with one cgroup updated*@old_cset: the baseline css_set*@cgrp: the cgroup to be updated* Return a new css_set that's equivalent to @old_cset, but with @cgrp* substituted into the appropriate hierarchy. |
clone_uts_ns | Clone a new ns copying an original utsname, setting refcount to 1*@old_ns: namespace to clone* Return ERR_PTR(-ENOMEM) on error (failure to allocate), new ns otherwise |
insert_extent | sert_extent - Safely insert a new idmap extent into struct uid_gid_map.* Takes care to allocate a 4K block of memory if the number of mappings exceeds* UID_GID_MAP_MAX_BASE_EXTENTS. |
map_write | |
audit_make_reply | |
audit_receive_msg | |
audit_log_n_string | Format a string of no more than slen characters into the audit buffer,* enclosed in quote marks. |
audit_unpack_string | Unpack a filter field's string representation from user-space* buffer. |
audit_pack_string | Pack a filter field's string representation into data block. |
audit_dupe_rule | Duplicate an audit rule. This will be a deep copy with the exception* of the watch - that pointer is carried over. The LSM specific fields* will be updated in the copy. The point is to be able to replace the old |
__audit_mq_open | __audit_mq_open - record audit data for a POSIX MQ open*@oflag: open flag*@mode: mode bits*@attr: queue attributes |
__audit_mq_sendrecv | __audit_mq_sendrecv - record audit data for a POSIX MQ timed send/receive*@mqdes: MQ descriptor*@msg_len: Message length*@msg_prio: Message priority*@abs_timeout: Message timeout in absolute time |
__audit_socketcall | __audit_socketcall - record audit data for sys_socketcall*@nargs: number of args, which should not be more than AUDITSC_ARGS.*@args: args array |
__audit_sockaddr | __audit_sockaddr - record audit data for sys_bind, sys_connect, sys_sendto*@len: data length in user space*@a: data address in kernel space* Returns 0 for success or NULL context or < 0 on error. |
__audit_ptrace | |
audit_signal_info_syscall | audit_signal_info_syscall - record signal info for syscalls*@t: task being signaled* If the audit subsystem is being terminated, record the task (pid)* and uid that is doing that. |
add_info | Associate a profiling data set with an existing node. Needs to be called* with node_lock held. |
gcov_info_dup | gcov_info_dup - duplicate profiling data set*@info: profiling data set to duplicate* Return newly allocated duplicate on success, %NULL on error. |
gcov_info_dup | gcov_info_dup - duplicate profiling data set*@info: profiling data set to duplicate* Return newly allocated duplicate on success, %NULL on error. |
llvm_gcda_start_file | |
gcov_fn_info_dup | |
kcov_move_area | |
copy_kprobe | Keep all fields in the kprobe consistent |
kdb_read | kdb_read* This function reads a string of characters, terminated by* a newline, or by reaching the end of the supplied buffer,* from the current kernel debugger console device.* Parameters:* Returns:* Returns a pointer to the buffer containing the received |
kdb_defcmd2 | |
kdb_defcmd | |
kdb_register_flags | |
kallsyms_symbol_complete | kallsyms_symbol_complete* Parameters:* prefix_name prefix of a symbol name to lookup* max_len maximum length that can be returned* Returns:* Number of symbols which match the given prefix |
kdb_getphys | kdb_getphys - Read data from a physical address |
proc_do_uts_string | Special case of dostring for the UTS structure. This has locks* to observe. Should this be in kernel/sys.c ???? |
fill_stats_for_tgid | |
taskstats_exit | Send pid data out on exit |
func_add | |
account_global_scheduler_latency | |
__account_scheduler_latency | __account_scheduler_latency - record an occurred latency*@tsk - the task struct of the task hitting the latency*@usecs - the duration of the latency in microseconds*@inter - 1 if the sleep was interruptible, 0 if uninterruptible* This function is the main |
ring_buffer_write | g_buffer_write - write data to the buffer without reserving*@buffer: The ring buffer to write to |
ring_buffer_read_page | g_buffer_read_page - extract a page from the ring buffer*@buffer: buffer to extract from*@data_page: the page to use allocated from ring_buffer_alloc_read_page*@len: amount to extract*@cpu: the cpu of the buffer to extract |
__trace_puts | __trace_puts - write a constant string into the trace buffer.*@ip: The address of the caller*@str: The constant string to write*@size: The size of the string. |
trace_seq_to_buffer | TODO add a seq_buf_to_buffer() |
__ftrace_trace_stack | |
trace_vbprintk | race_vbprintk - write binary msg to tracing buffer*@ip: The address of the caller*@fmt: The string format to write to the buffer*@args: Arguments for @fmt |
__trace_array_vprintk | |
tracing_mark_write | |
tracing_mark_raw_write | |
__tracing_map_insert | |
ftrace_syscall_enter | |
trace_inject_entry | |
parse_entry | Caller is responsible to free the *pentry. |
add_to_key | |
trace_kprobe_create | |
traceprobe_parse_probe_arg_body | String length checking wrapper |
__uprobe_trace_func | |
bpf_prog_realloc | |
bpf_prog_calc_tag | |
bpf_patch_insn_single | |
bpf_prog_get_info_by_fd | |
bpf_map_get_info_by_fd | |
do_collect | |
shrink_lruvec | |
kstrdup | kstrdup - allocate space for and copy an existing string*@s: the string to duplicate*@gfp: the GFP mask used in the kmalloc() call when allocating memory* Return: newly allocated copy of @s or %NULL in case of error |
kstrndup | kstrndup - allocate space for and copy an existing string*@s: the string to duplicate*@max: read at most @max chars from @s*@gfp: the GFP mask used in the kmalloc() call when allocating memory* Note: Use kmemdup_nul() instead if the size is known exactly |
kmemdup | kmemdup - duplicate region of memory*@src: memory region to duplicate*@len: memory region length*@gfp: GFP mask to use* Return: newly allocated copy of @src or %NULL in case of error |
kmemdup_nul | kmemdup_nul - Create a NUL-terminated string from unterminated data*@s: The data to stringify*@len: The size of the data*@gfp: the GFP mask used in the kmalloc() call when allocating memory* Return: newly allocated copy of @s with NUL-termination or %NULL |
__do_krealloc | |
vread | |
vwrite | |
aligned_vread | small helper routine , copy contents to buf from addr.* If the page is not present, fill zero. |
aligned_vwrite | |
memblock_double_array | |
zswap_frontswap_store | attempts to compress and store an single page |
transfer_objects | Transfer objects in one arraycache to another.* Locking must be handled by the caller.* Return the number of entries transferred. |
init_list | swap the static kmem_cache_node with kmalloced memory |
cache_flusharray | |
bootstrap | Used for early kmem_cache structures that were allocated using* the page allocator. Allocate them properly then fix up the pointers* that may be pointing to the wrong kmem_cache structure. |
proc_ipc_dointvec_minmax | |
proc_ipc_doulongvec_minmax | |
proc_ipc_auto_msgmni | |
proc_mq_dointvec | |
proc_mq_dointvec_minmax | |
bio_alloc_map_data | |
bio_copy_kern_endio_read | |
bio_copy_kern | _copy_kern - copy kernel address into bio*@q: the struct request_queue for the bio*@data: pointer to buffer to copy*@len: length in bytes*@gfp_mask: allocation flags for bio and page allocation*@reading: data direction is READ* copy the kernel address |
blk_mq_realloc_hw_ctxs | |
blk_mq_realloc_tag_set_tags | |
add_partition | Must be called either with bd_mutex held, before a disk can be opened or* after all disk users are gone. |
read_lba | ad_lba(): Read bytes from disk, starting at given LBA*@state*@lba*@buffer*@count* Description: Reads @count bytes from @state->bdev into @buffer.* Returns number of bytes read on success, 0 on error. |
ldm_get_vstr | ldm_get_vstr - Read a length-prefixed string into a buffer*@block: Pointer to the length marker*@buffer: Location to copy string to*@buflen: Size of the output buffer* Many of the strings in the LDM Database are not NULL terminated. Instead |
ldm_parse_vol5 | ldm_parse_vol5 - Read a raw VBLK Volume object into a vblk structure*@buffer: Block of data being worked on*@buflen: Size of the block of data*@vb: In-memory vblk in which to return information |
ldm_frag_add | ldm_frag_add - Add a VBLK fragment to a list*@data: Raw fragment to be added to the list*@size: Size of the raw fragment*@frags: Linked list of VBLK fragments* Fragmented VBLKs may not be consecutive in the database, so they are placed |
find_label | |
find_vol1_partitions | |
read_lba | ad_lba(): Read bytes from disk, starting at given LBA*@state: disk parsed partitions*@lba: the Logical Block Address of the partition table*@buffer: destination buffer*@count: bytes to read* Description: Reads @count bytes from @state->bdev into @buffer. |
__blk_queue_bounce | |
ioc_refresh_params | |
ioc_qos_write | |
ioc_cost_model_write | |
bio_integrity_clone | _integrity_clone - Callback for cloning bios with integrity metadata*@bio: New bio*@bio_src: Original bio*@gfp_mask: Memory allocation mask* Description: Called to allocate a bip when cloning a bio |
add_token_bytestring | |
build_locking_range | |
build_locking_user | |
generic_get_table_info | see TCG SAS 5.3.2.3 for a description of the available columns* the result is provided in dev->resp->tok[4] |
gen_key | |
start_auth_opal_session | |
internal_activate_user | |
set_new_pw | |
set_sid_cpin_pin | |
add_user_to_lr | |
key_set_index_key | Finalise an index key to include a part of the description actually in the* index key, to set the domain tag and to calculate the hash. |
user_preparse | Preparse a user defined key payload |
compat_keyctl_dh_compute | Perform the DH computation or DH based key derivation.* If successful, 0 will be returned. |
proc_keys_show | |
big_key_preparse | Preparse a big key |
osap | Create an object specific authorisation protocol (OSAP) session |
oiap | Create an object independent authorisation protocol (oiap) session |
tpm_seal | Have the TPM seal(encrypt) the trusted key, possibly based on* Platform Configuration Registers (PCRs). AUTH1 for sealing key. |
tpm_unseal | se the AUTH2_COMMAND form of unseal, to authorize both key and blob |
trusted_instantiate | rusted_instantiate - create a new trusted key* Unseal an existing trusted blob or, for a new key, get a* random key, then seal and create a trusted key-type key,* adding it to the specified keyring.* On success, return 0. Otherwise return errno. |
trusted_update | rusted_update - reseal an existing key with new PCR values |
tpm2_seal_trusted | pm2_seal_trusted() - seal the payload of a trusted key*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options* Return: < 0 on error and 0 on success. |
tpm2_unseal_cmd | pm2_unseal_cmd() - execute a TPM2_Unload command*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options*@blob_handle: blob handle* Return: 0 on success* -EPERM on tpm error status* < 0 |
get_derived_key | Derive authentication/encryption key from trusted key |
derived_key_encrypt | Before returning data to userspace, encrypt decrypted data. |
derived_key_decrypt | |
__ekey_init | |
encrypted_instantiate | rypted_instantiate - instantiate an encrypted key* Decrypt an existing encrypted datablob or create a new encrypted key* based on a kernel random number.* On success, return 0. Otherwise return errno. |
encrypted_update | rypted_update - update the master key description* Change the master key description for an existing encrypted key.* The next read will return an encrypted datablob using the new* master key description.* On success, return 0. Otherwise return errno. |
cap_inode_getsecurity | getsecurity: We are called for security |
cap_convert_nscap | User requested a write of security.capability. If needed, update the* xattr to change from v2 to v3, or to fixup the v3 rootid.* If all is ok, we return the new size, on error return < 0. |
avc_copy_xperms_decision | |
avc_xperms_populate | |
avc_node_populate | |
avc_has_extended_perms | The avc extended permissions logic adds an additional 256 bits of* permissions to an avc node when extended permissions for that node are* specified in the avtab |
avc_has_perm_noaudit | avc_has_perm_noaudit - Check permissions but perform no auditing |
selinux_inode_listsecurity | |
sel_write_context | |
sel_write_create | |
sel_write_relabel | |
sel_write_user | |
sel_write_member | |
selinux_xfrm_alloc_user | Allocates a xfrm_sec_state and populates it using the supplied security* xfrm_user_sec_ctx context. |
selinux_xfrm_state_alloc_acquire | LSM hook implementation that allocates a xfrm_sec_state and populates based* on a secid. |
smack_inode_listsecurity | smack_inode_listsecurity - list the Smack attributes*@inode: the object*@buffer: where they go*@buffer_size: size of buffer |
dump_common_audit_data | dump_common_audit_data - helper to dump common audit data*@a : common audit data |
tomoyo_assign_domain | moyo_assign_domain - Create a domain or a namespace.*@domainname: The name of domain.*@transit: True if transit to domain found or created.* Returns pointer to "struct tomoyo_domain_info" on success, NULL otherwise.* Caller holds tomoyo_read_lock(). |
tomoyo_dump_page | moyo_dump_page - Dump a page to buffer.*@bprm: Pointer to "struct linux_binprm".*@pos: Location to dump.*@dump: Poiner to "struct tomoyo_page_dump".* Returns true on success, false otherwise. |
query_data | query_data - queries a policy and writes its data to buf*@buf: the resulting data is stored here (NOT NULL)*@buf_len: size of buf*@query: query string used to retrieve data*@query_len: size of query including second NUL byte |
deflate_decompress | |
prepend | modified from dcache.c |
kvmemdup | |
deflate_compress | |
apparmor_setprocattr | |
param_set_aaintbool | |
param_get_aaintbool | |
parse_efi_signature_list | parse_efi_signature_list - Parse an EFI signature list for certificates*@source: The source of the key*@data: The data blob to parse*@size: The size of the data blob*@get_handler_for_guid: Get the handler func for the sig type (or NULL) |
uefi_blacklist_hash | Blacklist a hash. |
ima_pcr_extend | Return the amount of memory required for serializing the* entire binary_runtime_measurement list, including the ima_kexec_hdr* structure. |
ima_add_template_entry | Add template entry to the measurement list and hash table, and* extend the pcr.* On systems which support carrying the IMA measurement list across* kexec, maintain the total memory size required for serializing the* binary_runtime_measurements. |
ima_calc_field_array_hash_tfm | Calculate the hash of template data |
ima_store_template | ma_store_template - store ima template measurements* Calculate the hash of a template entry, add the template entry* to an ordered list of measurement entries maintained inside the kernel,* and also update the aggregate integrity value (maintained inside |
ima_collect_measurement | ma_collect_measurement - collect file measurement* Calculate the file hash, if it doesn't already exist,* storing the measurement and i_version in the iint.* Must be called with iint->mutex held.* Return 0 on success, error code otherwise |
ima_lsm_copy_rule | |
template_desc_init_fields | |
ima_restore_template_data | |
ima_restore_measurement_list | Restore the serialized binary measurement list without extending PCRs. |
ima_write_template_field_data | |
ima_eventdigest_init_common | |
ima_read_modsig | ma_read_modsig - Read modsig from buf.* Return: 0 on success, error code otherwise. |
evm_set_key | vm_set_key() - set EVM HMAC key from the kernel*@key: pointer to a buffer with the key data*@size: length of the key data* This function allows setting the EVM HMAC key from the kernel* without using the "encrypted" key subsystem keys |
pipe_set_size | Allocate a new array of pipe buffers and copy the info over. Returns the* pipe size if successful, or return -ERROR on error. |
getname_kernel | |
__nd_alloc_stack | |
__page_symlink | The nofs argument instructs pagecache_write_begin to pass AOP_FLAG_NOFS |
take_dentry_name_snapshot | |
__d_alloc | __d_alloc - allocate a dcache entry*@sb: filesystem it will belong to*@name: qstr of the name* Allocates a dentry. It returns %NULL if there is insufficient memory* available. On a success the dentry is returned. The name passed in is |
swap_names | |
copy_name | |
copy_fd_bitmaps | Copy 'count' fd bits from the old table to the new table and clear the extra* space if any. This does not copy the file pointers. Called with the files* spinlock held for write. |
copy_fdtable | Copy all file descriptors from the old table to the new, expanded table and* clear the extra space. Called with the files spinlock held for write. |
seq_puts | |
seq_write | seq_write - write arbitrary data to buffer*@seq: seq_file identifying the buffer to which data should be written*@data: data address*@len: number of bytes* Return 0 on success, non-zero otherwise. |
xattr_getsecurity | |
generic_listxattr | Combine the results of the list() operation from every xattr_handler in the* list. |
simple_xattr_alloc | Allocate new xattr and copy in the value; but leave the name to callers. |
simple_xattr_get | xattr GET operation for in-memory/pseudo filesystems |
xattr_list_one | |
memory_read_from_buffer | memory_read_from_buffer - copy data from the buffer*@to: the kernel space buffer to read to*@count: the maximum number of bytes to read*@ppos: the current position in the buffer*@from: the buffer to read from*@available: the size of the buffer* The |
prepend | |
dynamic_dname | Helper function for dentry_operations.d_dname() members |
do_statfs_native | |
do_statfs64 | |
legacy_parse_param | Add a parameter to a legacy config. We build up a comma-separated list of* options. |
copy_fid_to_user | |
ioctx_add_table | |
io_req_map_rw | |
io_sendmsg | |
io_recvmsg | |
io_connect | |
fscrypt_generate_iv | |
fname_encrypt | ame_encrypt() - encrypt a filename* The output buffer must be at least as large as the input buffer.* Any extra space is filled with NUL padding before encryption.* Return: 0 on success, -errno on failure |
fscrypt_fname_disk_to_usr | scrypt_fname_disk_to_usr() - converts a filename from disk space to user* space* The caller must have allocated sufficient memory for the @oname string.* If the key is available, we'll decrypt the disk name; otherwise, we'll encode* it for presentation |
fscrypt_hkdf_expand | HKDF-Expand (RFC 5869 section 2 |
move_master_key_secret | |
fscrypt_verify_key_added | Verify that the current user has added a master key with the given identifier* (returns -ENOKEY if not) |
setup_per_mode_key | |
setup_file_encryption_key | Find the master key, then set up the inode's actual encryption key.* If the master key is found in the filesystem-level keyring, then the* corresponding 'struct key' is returned in *master_key_ret with* ->mk_secret_sem read-locked |
fscrypt_get_encryption_info | |
find_or_insert_direct_key | Find/insert the given key into the fscrypt_direct_keys table. If found, it* is returned with elevated refcount, and 'to_insert' is freed if non-NULL. If* not found, 'to_insert' is inserted and returned if it's non-NULL; otherwise* NULL is returned. |
fscrypt_get_direct_key | Prepare to encrypt directly using the master key in the given mode |
fscrypt_new_context_from_policy | |
fscrypt_policy_from_context | |
build_merkle_tree | Build the Merkle tree for the given inode using the given parameters, and* return the root hash in @root_hash.* The tree is written to a filesystem-specific location as determined by the* ->write_merkle_tree_block() method |
fsverity_prepare_hash_state | sverity_prepare_hash_state() - precompute the initial hash state*@alg: hash algorithm*@salt: a salt which is to be prepended to all data to be hashed*@salt_size: salt size in bytes, possibly 0* Return: NULL if the salt is empty, otherwise the kmalloc()'ed |
fsverity_create_info | Validate the given fsverity_descriptor and create a new fsverity_info from* it. The signature (if present) is also checked. |
extract_hash | Extract a hash from a hash page |
fsverity_verify_signature | sverity_verify_signature() - check a verity file's signature* If the file's fs-verity descriptor includes a signature of the file* measurement, verify it against the certificates in the fs-verity keyring |
iomap_read_inline_data | |
iomap_write_end_inline | |
iomap_swapfile_activate_actor | Accumulate iomaps for this swap file. We have to accumulate iomaps because* swap only cares about contiguous page-aligned physical extents and makes no* distinction between written and unwritten extents. |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |