函数逻辑报告 | 
Source Code:lib\strncpy_from_user.c | 
Create Date:2022-07-27 08:18:51 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| 首页 | 函数Tree | 
| 注解内核,赢得工具 | 下载SCCT | English | 
函数名称:复制用户字符串
函数原型:long strncpy_from_user(char *dst, const char __user *src, long count)
返回类型:long
参数:
| 类型 | 参数 | 名称 | 
|---|---|---|
| char * | dst | |
| const char __user * | src | |
| long | count | 
| 101 | 如果此条件成立可能性小(为编译器优化)(count <= 0)则返回:0 | 
| 104 | max_addr等于user_addr_max() | 
| 106 | 如果此条件成立可能性大(为编译器优化)(src_addr < max_addr)则 | 
| 117 | kasan_check_write(dst, count) | 
| 118 | check_object_size(dst, count, false) | 
| 119 | 如果user_access_begin(src, max)则 | 
| 125 | 返回:负EFAULT | 
| 名称 | 描述 | 
|---|---|
| SYSCALL_DEFINE4 | Reboot system call: for obvious reasons only root may call it,* and even root needs to set up some magic numbers in the registers* so that some mistake won't make this reboot the whole machine.* You can also set the meaning of the ctrl-alt-del-key here. | 
| audit_log_execve_info | |
| fetch_store_string | Fetch a null-terminated string. Caller MUST set *(u32 *)dest with max* length and relative data location. | 
| bpf_prog_load | |
| bpf_raw_tracepoint_open | |
| kmemleak_write | File write operation to configure kmemleak at run-time | 
| getname_flags | |
| setxattr | Extended attribute SET operations | 
| getxattr | Extended attribute GET operations | 
| removexattr | Extended attribute REMOVE operations | 
| copy_user_test | |
| mtrr_write | seq_file can seek but we ignore it.* Format of control line:* "base=%Lx size=%Lx type=%s" or "disable=%d" | 
| SYSCALL_DEFINE5 | |
| strncpy_from_unsafe_user | strncpy_from_unsafe_user: - Copy a NUL terminated string from unsafe user* address.*@dst: Destination address, in kernel space. This buffer must be at* least @count bytes long.*@unsafe_addr: Unsafe user address. | 
| key_get_type_from_user | 
| 源代码转换工具 开放的插件接口  | X | 
|---|---|
| 支持:c/c++/esqlc/java Oracle/Informix/Mysql 插件可实现:逻辑报告 代码生成和批量转换代码  |