函数逻辑报告

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:mm\kasan\common.c Create Date:2022-07-27 17:24:34
Last Modify:2020-03-12 14:18:49 Copyright©Brick
首页 函数Tree
注解内核,赢得工具下载SCCTEnglish

函数名称:memcpy

函数原型:void *memcpy(void *dest, const void *src, size_t len)

返回类型:void

参数:

类型参数名称
void *dest
const void *src
size_tlen
125  check_memory_region((unsignedlong)src, len, TSC's on different sockets may be reset asynchronously.* This may cause the TSC ADJUST value on socket 0 to be NOT 0., _RET_IP_)
126  check_memory_region((unsignedlong)dest, len, true, _RET_IP_)
128  返回:__memcpy(dest, src, len)
调用者
名称描述
strlcat长字符串拼接
ip6_compressed_string
vsnprintfvsnprintf - Format a string and place it in a buffer*@buf: The buffer to place the result into*@size: The size of the buffer, including the trailing null space*@fmt: The format string to use*@args: Arguments for the format string* This function generally
seq_buf_puts简单字符串序列打印
seq_buf_putmemseq_buf_putmem - write raw data into the sequenc buffer*@s: seq_buf descriptor*@mem: The raw memory to copy into the buffer*@len: The length of the raw memory to copy (in bytes)* There may be cases where raw memory needs to be written into the
fill_kobj_path
unlzo
match_strlcpymatch_strlcpy: - Copy the characters from a substring_t to a sized buffer*@dest: where to copy to*@src: &substring_t to copy*@size: size of destination buffer* Description: Copy the characters in &substring_t @src to the* c-style string @dest
sg_copy_buffersg_copy_buffer - Copy data between a linear buffer and an SG list*@sgl: The SG list*@nents: Number of SG entries*@buf: Where to copy from*@buflen: The number of bytes to copy*@skip: Number of bytes to skip before copying*@to_buffer: transfer direction
memcpy_from_page
memcpy_to_page
_copy_to_iter
ldt_dup_contextCalled on fork from arch_dup_mmap(). Just copy the current LDT state,* the new task is not running, so nothing can be installed.
write_ldt
setup_arch平台相关启动
__jump_label_set_jump_code
boot_params_data_read
setup_data_data_read
e820__update_table
e820__memory_setup_extendedBecause of the small fixed size of struct boot_params, only the first* 128 E820 memory entries are passed to the kernel via boot_params.e820_table,* the remaining (if any) entries are passed via the SETUP_E820_EXT node of
e820__memory_setupCalls e820__memory_setup_default() in essence to pick up the firmware/bootloader* E820 map - with an optional platform quirk available for virtual platforms* to override this method of boot environment processing:
add_nopsUse this to add nops to a buffer, then text_poke the whole buffer.
apply_alternativesReplace instructions with better alternatives for this CPU type. This runs* before SMP is initialized to avoid SMP problems with self modifying code.* This implies that asymmetric systems where APs have less capabilities than
text_poke_earlyxt_poke_early - Update instructions on a live kernel at boot time*@addr: address to modify*@opcode: source of the copy*@len: length to copy* When you use this code to patch more than one byte of an instruction
__text_poke
text_poke_loc_init
arch_dup_task_structhis gets called so that we can store lazy state into memory and copy the* current task into the new thread.
fpu__copy
xstateregs_get
convert_from_fxsrFXSR floating point environment conversions.
convert_to_fxsr
fpstate_sanitize_xstateWhen executing XSAVEOPT (or other optimized XSAVE instructions), if* a processor implementation detects that an FPU state component is still* (or is again) in its initialized state, it may clear the corresponding* bit in the header
__copy_xstate_to_kernelThis is similar to user_regset_copyout(), but will not add offset to* the source data pointer or increment pos, count, kbuf, and ubuf.
copy_kernel_to_xstateConvert from a ptrace standard-format kernel buffer to kernel XSAVES format* and copy to the target thread. This is called from xstateregs_set().
microcode_checkThe microcode loader calls this upon late microcode load to recheck features,* only when microcode has been updated. Caller holds microcode_mutex and CPU* hotplug lock.
mce_gen_pool_add
apei_write_mce
apei_read_mce
generic_load_microcode
apply_microcode_early_amdEarly load occurs before we can vmalloc()
install_equiv_cpu_table
load_microcode_amd
smp_check_mpcRead/parse the MPC
update_mp_table
setup_APIC_timerSetup the local APIC timer for this CPU. Copy the initialized values* of the boot CPU and register the clock event in the framework.
mp_save_irqWill be called in mpparse/acpi/sfi codes for saving IRQ info
machine_kexecDo not allocate memory (or fail in any way) in machine_kexec().* We are past the point of no return, committed to rebooting now.
add_e820_entry
setup_cmdline
setup_e820_entries
setup_boot_parameters
bzImage64_load
copy_oldmem_pagepy_oldmem_page - copy one page from "oldmem"*@pfn: page frame number to be copied*@buf: target memory address for the copy; this can be in kernel address* space or user address space (see @userbuf)*@csize: number of bytes to copy*@offset: offset in bytes
__recover_probed_insn
__recover_optprobed_insn
arch_prepare_optimized_kprobeCopy replacing target instructions* Target instructions MUST be relocatable (checked inside)* This is called when new aggr(opt)probe is allocated or reused.
arch_optimize_kprobesReplace breakpoints (int3) with relative jumps.* Caller must call with locking kprobe_mutex and text_mutex.
arch_unoptimize_kprobeReplace a relative jump with a breakpoint (int3).
dbg_set_reg
dbg_get_reg
save_v86_state
do_sys_vm86
paravirt_patch_insns
jailhouse_init_platform
emulate_umip_insnmulate_umip_insn() - Emulate UMIP instructions and return dummy values*@insn: Instruction structure with operands*@umip_inst: A constant indicating the instruction to emulate*@data: Buffer into which the dummy result is stored*@data_size: Size of the
fixup_umip_exceptionxup_umip_exception() - Fixup a general protection fault caused by UMIP*@regs: Registers as saved when entering the #GP handler* The instructions SGDT, SIDT, STR, SMSW and SLDT cause a general protection* fault if executed with CPL > 0 (i
copy_sighand复制信号句柄
copy_signal复制信号
proc_get_longproc_get_long - reads an ASCII formatted integer from a user buffer*@buf: a kernel buffer*@size: size of the kernel buffer*@val: this is where the number will be stored*@neg: set to %TRUE if number is negative*@perm_tr: a vector which contains the allowed
SYSCALL_DEFINE1
SYSCALL_DEFINE1Old cruft
SYSCALL_DEFINE1
SYSCALL_DEFINE2
SYSCALL_DEFINE2
SYSCALL_DEFINE2Only setdomainname; getdomainname can be implemented by calling* uname()
prctl_set_auxv
notes_read
prepare_credsprepare_creds - Prepare a new set of credentials for modification* Prepare a new set of task credentials for modification
get_recent_times
init_triggers
update_triggers
init_header_complete
mark_swapfilesSaving part
save_image_lzosave_image_lzo - Save the suspend image data compressed with LZO.*@handle: Swap map handle to use for saving the image.*@snapshot: Image to read data from.*@nr_to_write: Number of pages to save.
load_image_lzoload_image_lzo - Load compressed image data and decompress them with LZO.*@handle: Swap map handle to use for loading data.*@snapshot: Image to copy uncompressed data into.*@nr_to_read: Number of pages to load.
swsusp_checkswsusp_check - Check for swsusp signature in the resume device
log_storesert record into the buffer, discard old ones, update heads
setup_log_buf日志缓冲设置
msg_print_text
cont_add
swiotlb_bounceBounce: copy the swiotlb buffer from or back to the original dma location
update_fast_timekeeperpdate_fast_timekeeper - Update the fast and NMI safe monotonic timekeeper.*@tkr: Timekeeping readout base from which we take the update* We want to use this from any context including NMI and tracing /* instrumenting the timekeeping code itself.
halt_fast_timekeeperhalt_fast_timekeeper - Prevent fast timekeeper from accessing clocksource.*@tk: Timekeeper to snapshot.* It generally is unsafe to access the clocksource after timekeeping has been* suspended, so take a snapshot of the readout base of @tk and use it as the
timekeeping_updatemust hold timekeeper_lock
timekeeping_advancemekeeping_advance - Updates the timekeeper to the current time and* current NTP tick length
copy_module_elfPersist Elf information about a module. Copy the Elf header,* section header table, section string table, and symtab section* index from info to mod->klp_info.
move_module
mod_verify_sigVerify the signature on a module.
append_elf_note
crash_update_vmcoreinfo_safecopy
vmcoreinfo_append_str
kimage_load_normal_segment
kimage_load_crash_segment
crash_prepare_elf64_headers
elf_read_ehdr
compat_sig_setmasksys_sigprocmask SIG_SETMASK sets the first (compat) word of the* blocked set of signals to the supplied signal set
find_css_setd_css_set - return a new css_set with one cgroup updated*@old_cset: the baseline css_set*@cgrp: the cgroup to be updated* Return a new css_set that's equivalent to @old_cset, but with @cgrp* substituted into the appropriate hierarchy.
clone_uts_nsClone a new ns copying an original utsname, setting refcount to 1*@old_ns: namespace to clone* Return ERR_PTR(-ENOMEM) on error (failure to allocate), new ns otherwise
insert_extentsert_extent - Safely insert a new idmap extent into struct uid_gid_map.* Takes care to allocate a 4K block of memory if the number of mappings exceeds* UID_GID_MAP_MAX_BASE_EXTENTS.
map_write
audit_make_reply
audit_receive_msg
audit_log_n_stringFormat a string of no more than slen characters into the audit buffer,* enclosed in quote marks.
audit_unpack_stringUnpack a filter field's string representation from user-space* buffer.
audit_pack_stringPack a filter field's string representation into data block.
audit_dupe_ruleDuplicate an audit rule. This will be a deep copy with the exception* of the watch - that pointer is carried over. The LSM specific fields* will be updated in the copy. The point is to be able to replace the old
__audit_mq_open__audit_mq_open - record audit data for a POSIX MQ open*@oflag: open flag*@mode: mode bits*@attr: queue attributes
__audit_mq_sendrecv__audit_mq_sendrecv - record audit data for a POSIX MQ timed send/receive*@mqdes: MQ descriptor*@msg_len: Message length*@msg_prio: Message priority*@abs_timeout: Message timeout in absolute time
__audit_socketcall__audit_socketcall - record audit data for sys_socketcall*@nargs: number of args, which should not be more than AUDITSC_ARGS.*@args: args array
__audit_sockaddr__audit_sockaddr - record audit data for sys_bind, sys_connect, sys_sendto*@len: data length in user space*@a: data address in kernel space* Returns 0 for success or NULL context or < 0 on error.
__audit_ptrace
audit_signal_info_syscallaudit_signal_info_syscall - record signal info for syscalls*@t: task being signaled* If the audit subsystem is being terminated, record the task (pid)* and uid that is doing that.
add_infoAssociate a profiling data set with an existing node. Needs to be called* with node_lock held.
gcov_info_dupgcov_info_dup - duplicate profiling data set*@info: profiling data set to duplicate* Return newly allocated duplicate on success, %NULL on error.
gcov_info_dupgcov_info_dup - duplicate profiling data set*@info: profiling data set to duplicate* Return newly allocated duplicate on success, %NULL on error.
llvm_gcda_start_file
gcov_fn_info_dup
kcov_move_area
copy_kprobeKeep all fields in the kprobe consistent
kdb_readkdb_read* This function reads a string of characters, terminated by* a newline, or by reaching the end of the supplied buffer,* from the current kernel debugger console device.* Parameters:* Returns:* Returns a pointer to the buffer containing the received
kdb_defcmd2
kdb_defcmd
kdb_register_flags
kallsyms_symbol_completekallsyms_symbol_complete* Parameters:* prefix_name prefix of a symbol name to lookup* max_len maximum length that can be returned* Returns:* Number of symbols which match the given prefix
kdb_getphyskdb_getphys - Read data from a physical address
proc_do_uts_stringSpecial case of dostring for the UTS structure. This has locks* to observe. Should this be in kernel/sys.c ????
fill_stats_for_tgid
taskstats_exitSend pid data out on exit
func_add
account_global_scheduler_latency
__account_scheduler_latency__account_scheduler_latency - record an occurred latency*@tsk - the task struct of the task hitting the latency*@usecs - the duration of the latency in microseconds*@inter - 1 if the sleep was interruptible, 0 if uninterruptible* This function is the main
ring_buffer_writeg_buffer_write - write data to the buffer without reserving*@buffer: The ring buffer to write to
ring_buffer_read_pageg_buffer_read_page - extract a page from the ring buffer*@buffer: buffer to extract from*@data_page: the page to use allocated from ring_buffer_alloc_read_page*@len: amount to extract*@cpu: the cpu of the buffer to extract
__trace_puts__trace_puts - write a constant string into the trace buffer.*@ip: The address of the caller*@str: The constant string to write*@size: The size of the string.
trace_seq_to_bufferTODO add a seq_buf_to_buffer()
__ftrace_trace_stack
trace_vbprintkrace_vbprintk - write binary msg to tracing buffer*@ip: The address of the caller*@fmt: The string format to write to the buffer*@args: Arguments for @fmt
__trace_array_vprintk
tracing_mark_write
tracing_mark_raw_write
__tracing_map_insert
ftrace_syscall_enter
trace_inject_entry
parse_entryCaller is responsible to free the *pentry.
add_to_key
trace_kprobe_create
traceprobe_parse_probe_arg_bodyString length checking wrapper
__uprobe_trace_func
bpf_prog_realloc
bpf_prog_calc_tag
bpf_patch_insn_single
bpf_prog_get_info_by_fd
bpf_map_get_info_by_fd
do_collect
shrink_lruvec
kstrdupkstrdup - allocate space for and copy an existing string*@s: the string to duplicate*@gfp: the GFP mask used in the kmalloc() call when allocating memory* Return: newly allocated copy of @s or %NULL in case of error
kstrndupkstrndup - allocate space for and copy an existing string*@s: the string to duplicate*@max: read at most @max chars from @s*@gfp: the GFP mask used in the kmalloc() call when allocating memory* Note: Use kmemdup_nul() instead if the size is known exactly
kmemdupkmemdup - duplicate region of memory*@src: memory region to duplicate*@len: memory region length*@gfp: GFP mask to use* Return: newly allocated copy of @src or %NULL in case of error
kmemdup_nulkmemdup_nul - Create a NUL-terminated string from unterminated data*@s: The data to stringify*@len: The size of the data*@gfp: the GFP mask used in the kmalloc() call when allocating memory* Return: newly allocated copy of @s with NUL-termination or %NULL
__do_krealloc
vread
vwrite
aligned_vreadsmall helper routine , copy contents to buf from addr.* If the page is not present, fill zero.
aligned_vwrite
memblock_double_array
zswap_frontswap_storeattempts to compress and store an single page
transfer_objectsTransfer objects in one arraycache to another.* Locking must be handled by the caller.* Return the number of entries transferred.
init_listswap the static kmem_cache_node with kmalloced memory
cache_flusharray
bootstrapUsed for early kmem_cache structures that were allocated using* the page allocator. Allocate them properly then fix up the pointers* that may be pointing to the wrong kmem_cache structure.
proc_ipc_dointvec_minmax
proc_ipc_doulongvec_minmax
proc_ipc_auto_msgmni
proc_mq_dointvec
proc_mq_dointvec_minmax
bio_alloc_map_data
bio_copy_kern_endio_read
bio_copy_kern_copy_kern - copy kernel address into bio*@q: the struct request_queue for the bio*@data: pointer to buffer to copy*@len: length in bytes*@gfp_mask: allocation flags for bio and page allocation*@reading: data direction is READ* copy the kernel address
blk_mq_realloc_hw_ctxs
blk_mq_realloc_tag_set_tags
add_partitionMust be called either with bd_mutex held, before a disk can be opened or* after all disk users are gone.
read_lbaad_lba(): Read bytes from disk, starting at given LBA*@state*@lba*@buffer*@count* Description: Reads @count bytes from @state->bdev into @buffer.* Returns number of bytes read on success, 0 on error.
ldm_get_vstrldm_get_vstr - Read a length-prefixed string into a buffer*@block: Pointer to the length marker*@buffer: Location to copy string to*@buflen: Size of the output buffer* Many of the strings in the LDM Database are not NULL terminated. Instead
ldm_parse_vol5ldm_parse_vol5 - Read a raw VBLK Volume object into a vblk structure*@buffer: Block of data being worked on*@buflen: Size of the block of data*@vb: In-memory vblk in which to return information
ldm_frag_addldm_frag_add - Add a VBLK fragment to a list*@data: Raw fragment to be added to the list*@size: Size of the raw fragment*@frags: Linked list of VBLK fragments* Fragmented VBLKs may not be consecutive in the database, so they are placed
find_label
find_vol1_partitions
read_lbaad_lba(): Read bytes from disk, starting at given LBA*@state: disk parsed partitions*@lba: the Logical Block Address of the partition table*@buffer: destination buffer*@count: bytes to read* Description: Reads @count bytes from @state->bdev into @buffer.
__blk_queue_bounce
ioc_refresh_params
ioc_qos_write
ioc_cost_model_write
bio_integrity_clone_integrity_clone - Callback for cloning bios with integrity metadata*@bio: New bio*@bio_src: Original bio*@gfp_mask: Memory allocation mask* Description: Called to allocate a bip when cloning a bio
add_token_bytestring
build_locking_range
build_locking_user
generic_get_table_infosee TCG SAS 5.3.2.3 for a description of the available columns* the result is provided in dev->resp->tok[4]
gen_key
start_auth_opal_session
internal_activate_user
set_new_pw
set_sid_cpin_pin
add_user_to_lr
key_set_index_keyFinalise an index key to include a part of the description actually in the* index key, to set the domain tag and to calculate the hash.
user_preparsePreparse a user defined key payload
compat_keyctl_dh_computePerform the DH computation or DH based key derivation.* If successful, 0 will be returned.
proc_keys_show
big_key_preparsePreparse a big key
osapCreate an object specific authorisation protocol (OSAP) session
oiapCreate an object independent authorisation protocol (oiap) session
tpm_sealHave the TPM seal(encrypt) the trusted key, possibly based on* Platform Configuration Registers (PCRs). AUTH1 for sealing key.
tpm_unsealse the AUTH2_COMMAND form of unseal, to authorize both key and blob
trusted_instantiaterusted_instantiate - create a new trusted key* Unseal an existing trusted blob or, for a new key, get a* random key, then seal and create a trusted key-type key,* adding it to the specified keyring.* On success, return 0. Otherwise return errno.
trusted_updaterusted_update - reseal an existing key with new PCR values
tpm2_seal_trustedpm2_seal_trusted() - seal the payload of a trusted key*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options* Return: < 0 on error and 0 on success.
tpm2_unseal_cmdpm2_unseal_cmd() - execute a TPM2_Unload command*@chip: TPM chip to use*@payload: the key data in clear and encrypted form*@options: authentication values and other options*@blob_handle: blob handle* Return: 0 on success* -EPERM on tpm error status* < 0
get_derived_keyDerive authentication/encryption key from trusted key
derived_key_encryptBefore returning data to userspace, encrypt decrypted data.
derived_key_decrypt
__ekey_init
encrypted_instantiaterypted_instantiate - instantiate an encrypted key* Decrypt an existing encrypted datablob or create a new encrypted key* based on a kernel random number.* On success, return 0. Otherwise return errno.
encrypted_updaterypted_update - update the master key description* Change the master key description for an existing encrypted key.* The next read will return an encrypted datablob using the new* master key description.* On success, return 0. Otherwise return errno.
cap_inode_getsecuritygetsecurity: We are called for security
cap_convert_nscapUser requested a write of security.capability. If needed, update the* xattr to change from v2 to v3, or to fixup the v3 rootid.* If all is ok, we return the new size, on error return < 0.
avc_copy_xperms_decision
avc_xperms_populate
avc_node_populate
avc_has_extended_permsThe avc extended permissions logic adds an additional 256 bits of* permissions to an avc node when extended permissions for that node are* specified in the avtab
avc_has_perm_noauditavc_has_perm_noaudit - Check permissions but perform no auditing
selinux_inode_listsecurity
sel_write_context
sel_write_create
sel_write_relabel
sel_write_user
sel_write_member
selinux_xfrm_alloc_userAllocates a xfrm_sec_state and populates it using the supplied security* xfrm_user_sec_ctx context.
selinux_xfrm_state_alloc_acquireLSM hook implementation that allocates a xfrm_sec_state and populates based* on a secid.
smack_inode_listsecuritysmack_inode_listsecurity - list the Smack attributes*@inode: the object*@buffer: where they go*@buffer_size: size of buffer
dump_common_audit_datadump_common_audit_data - helper to dump common audit data*@a : common audit data
tomoyo_assign_domainmoyo_assign_domain - Create a domain or a namespace.*@domainname: The name of domain.*@transit: True if transit to domain found or created.* Returns pointer to "struct tomoyo_domain_info" on success, NULL otherwise.* Caller holds tomoyo_read_lock().
tomoyo_dump_pagemoyo_dump_page - Dump a page to buffer.*@bprm: Pointer to "struct linux_binprm".*@pos: Location to dump.*@dump: Poiner to "struct tomoyo_page_dump".* Returns true on success, false otherwise.
query_dataquery_data - queries a policy and writes its data to buf*@buf: the resulting data is stored here (NOT NULL)*@buf_len: size of buf*@query: query string used to retrieve data*@query_len: size of query including second NUL byte
deflate_decompress
prependmodified from dcache.c
kvmemdup
deflate_compress
apparmor_setprocattr
param_set_aaintbool
param_get_aaintbool
parse_efi_signature_listparse_efi_signature_list - Parse an EFI signature list for certificates*@source: The source of the key*@data: The data blob to parse*@size: The size of the data blob*@get_handler_for_guid: Get the handler func for the sig type (or NULL)
uefi_blacklist_hashBlacklist a hash.
ima_pcr_extendReturn the amount of memory required for serializing the* entire binary_runtime_measurement list, including the ima_kexec_hdr* structure.
ima_add_template_entryAdd template entry to the measurement list and hash table, and* extend the pcr.* On systems which support carrying the IMA measurement list across* kexec, maintain the total memory size required for serializing the* binary_runtime_measurements.
ima_calc_field_array_hash_tfmCalculate the hash of template data
ima_store_templatema_store_template - store ima template measurements* Calculate the hash of a template entry, add the template entry* to an ordered list of measurement entries maintained inside the kernel,* and also update the aggregate integrity value (maintained inside
ima_collect_measurementma_collect_measurement - collect file measurement* Calculate the file hash, if it doesn't already exist,* storing the measurement and i_version in the iint.* Must be called with iint->mutex held.* Return 0 on success, error code otherwise
ima_lsm_copy_rule
template_desc_init_fields
ima_restore_template_data
ima_restore_measurement_listRestore the serialized binary measurement list without extending PCRs.
ima_write_template_field_data
ima_eventdigest_init_common
ima_read_modsigma_read_modsig - Read modsig from buf.* Return: 0 on success, error code otherwise.
evm_set_keyvm_set_key() - set EVM HMAC key from the kernel*@key: pointer to a buffer with the key data*@size: length of the key data* This function allows setting the EVM HMAC key from the kernel* without using the "encrypted" key subsystem keys
pipe_set_sizeAllocate a new array of pipe buffers and copy the info over. Returns the* pipe size if successful, or return -ERROR on error.
getname_kernel
__nd_alloc_stack
__page_symlinkThe nofs argument instructs pagecache_write_begin to pass AOP_FLAG_NOFS
take_dentry_name_snapshot
__d_alloc__d_alloc - allocate a dcache entry*@sb: filesystem it will belong to*@name: qstr of the name* Allocates a dentry. It returns %NULL if there is insufficient memory* available. On a success the dentry is returned. The name passed in is
swap_names
copy_name
copy_fd_bitmapsCopy 'count' fd bits from the old table to the new table and clear the extra* space if any. This does not copy the file pointers. Called with the files* spinlock held for write.
copy_fdtableCopy all file descriptors from the old table to the new, expanded table and* clear the extra space. Called with the files spinlock held for write.
seq_puts
seq_writeseq_write - write arbitrary data to buffer*@seq: seq_file identifying the buffer to which data should be written*@data: data address*@len: number of bytes* Return 0 on success, non-zero otherwise.
xattr_getsecurity
generic_listxattrCombine the results of the list() operation from every xattr_handler in the* list.
simple_xattr_allocAllocate new xattr and copy in the value; but leave the name to callers.
simple_xattr_getxattr GET operation for in-memory/pseudo filesystems
xattr_list_one
memory_read_from_buffermemory_read_from_buffer - copy data from the buffer*@to: the kernel space buffer to read to*@count: the maximum number of bytes to read*@ppos: the current position in the buffer*@from: the buffer to read from*@available: the size of the buffer* The
prepend
dynamic_dnameHelper function for dentry_operations.d_dname() members
do_statfs_native
do_statfs64
legacy_parse_paramAdd a parameter to a legacy config. We build up a comma-separated list of* options.
copy_fid_to_user
ioctx_add_table
io_req_map_rw
io_sendmsg
io_recvmsg
io_connect
fscrypt_generate_iv
fname_encryptame_encrypt() - encrypt a filename* The output buffer must be at least as large as the input buffer.* Any extra space is filled with NUL padding before encryption.* Return: 0 on success, -errno on failure
fscrypt_fname_disk_to_usrscrypt_fname_disk_to_usr() - converts a filename from disk space to user* space* The caller must have allocated sufficient memory for the @oname string.* If the key is available, we'll decrypt the disk name; otherwise, we'll encode* it for presentation
fscrypt_hkdf_expandHKDF-Expand (RFC 5869 section 2
move_master_key_secret
fscrypt_verify_key_addedVerify that the current user has added a master key with the given identifier* (returns -ENOKEY if not)
setup_per_mode_key
setup_file_encryption_keyFind the master key, then set up the inode's actual encryption key.* If the master key is found in the filesystem-level keyring, then the* corresponding 'struct key' is returned in *master_key_ret with* ->mk_secret_sem read-locked
fscrypt_get_encryption_info
find_or_insert_direct_keyFind/insert the given key into the fscrypt_direct_keys table. If found, it* is returned with elevated refcount, and 'to_insert' is freed if non-NULL. If* not found, 'to_insert' is inserted and returned if it's non-NULL; otherwise* NULL is returned.
fscrypt_get_direct_keyPrepare to encrypt directly using the master key in the given mode
fscrypt_new_context_from_policy
fscrypt_policy_from_context
build_merkle_treeBuild the Merkle tree for the given inode using the given parameters, and* return the root hash in @root_hash.* The tree is written to a filesystem-specific location as determined by the* ->write_merkle_tree_block() method
fsverity_prepare_hash_statesverity_prepare_hash_state() - precompute the initial hash state*@alg: hash algorithm*@salt: a salt which is to be prepended to all data to be hashed*@salt_size: salt size in bytes, possibly 0* Return: NULL if the salt is empty, otherwise the kmalloc()'ed
fsverity_create_infoValidate the given fsverity_descriptor and create a new fsverity_info from* it. The signature (if present) is also checked.
extract_hashExtract a hash from a hash page
fsverity_verify_signaturesverity_verify_signature() - check a verity file's signature* If the file's fs-verity descriptor includes a signature of the file* measurement, verify it against the certificates in the fs-verity keyring
iomap_read_inline_data
iomap_write_end_inline
iomap_swapfile_activate_actorAccumulate iomaps for this swap file. We have to accumulate iomaps because* swap only cares about contiguous page-aligned physical extents and makes no* distinction between written and unwritten extents.
print_shadow_for_address
__mem_cgroup_usage_register_event
__zs_map_object
__zs_unmap_object
zs_object_copy
zs_pool_stats
compact_single_buddy
z3fold_page_migrate
copy_from_early_mem
tpm_buf_append
xfrm_flowi_addr_get
xfrm_mark_get
fscrypt_new_context_from_policyscrypt_new_context_from_policy - create a new fscrypt_context from a policy* Create an fscrypt_context for an inode that is being assigned the given* encryption policy. A new nonce is randomly generated.* Return: the size of the new context in bytes.
fscrypt_policy_from_contextscrypt_policy_from_context - convert an fscrypt_context to an fscrypt_policy* Given an fscrypt_context, build the corresponding fscrypt_policy.* Return: 0 on success, or -EINVAL if the fscrypt_context has an unrecognized* version number or size.