函数逻辑报告

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:arch\x86\boot\boot.h Create Date:2022-07-27 08:25:25
Last Modify:2020-03-12 14:18:49 Copyright©Brick
首页 函数Tree
注解内核,赢得工具下载SCCTEnglish

函数名称:设置寄存器值(fs)

函数原型:static inline void set_fs(u16 seg)

返回类型:void

参数:

类型参数名称
u16seg
89  asm volatile
调用者
名称描述
__test_bitmap_parselist
__cmdline_find_option查找启动命令行参数
__cmdline_find_option_boolFind a boolean option (like quiet,noapic,nosmp....)* Returns the position of that option (starts counting with 1)* or 0 on not found
store_mode_params存储显示模式参数
save_screen提取保存屏幕参数
restore_screen重新保存屏幕信息
vga_recalc_verticalRecalculate the vertical video cutoff (hack!)
vesa_probe
bios_probe
snapshot_compat_ioctl
flush_module_icache
__cgroup_bpf_run_filter_sysctl__cgroup_bpf_run_filter_sysctl - Run a program on sysctl*@head: sysctl table header*@table: sysctl table*@write: sysctl is being read (= 0) or written (= 1)*@buf: pointer to buffer passed by user space*@pcount: value-result argument: value is size of
perf_output_sample_ustack
get_perf_callchain
__probe_kernel_read
__probe_user_read
__probe_kernel_write
__probe_user_write
__strncpy_from_unsafe
strncpy_from_unsafe_userstrncpy_from_unsafe_user: - Copy a NUL terminated string from unsafe user* address.*@dst: Destination address, in kernel space. This buffer must be at* least @count bytes long.*@unsafe_addr: Unsafe user address.
strnlen_unsafe_userstrnlen_unsafe_user: - Get the size of a user string INCLUDING final NUL.*@unsafe_addr: The string to measure.*@count: Maximum count (including NUL)* Get the size of a NUL-terminated string in user space without pagefault.
integrity_kernel_readgrity_kernel_read - read data from the file* This is a function for reading file content instead of kernel_read().* It does not perform locking checks to ensure it cannot be blocked.* It does not perform security checks because it is irrelevant for IMA.
kernel_read
__kernel_write
kernel_write
copy_strings_kernelLike copy_strings, but get argv and its values from kernel memory.
flush_old_execCalling this is the point of no return. None of the failures will be* seen by userspace since either the process is already taking a fatal* signal (via de_thread() or coredump), or will have SEGV raised
kernel_readv
ioctl_by_bdev
io_sq_thread
__io_worker_unuseNote: drops the wqe->lock if returning true! The caller must re-acquire* the lock in that case. Some callers need to restart handling if this* happens, so we can't just re-acquire the lock on behalf of the caller.
io_worker_handle_work
a20_test