Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:kernel\bpf\verifier.c Create Date:2022-07-28 12:58:17
Last Modify:2022-05-19 20:02:10 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:check_ctx_reg

Proto:static int check_ctx_reg(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int regno)

Type:int

Parameter:

TypeParameterName
struct bpf_verifier_env *env
const struct bpf_reg_state *reg
intregno
2748  If Fixed part of pointer offset, pointer types only Then
2749  verbose(env, "dereference of modified ctx ptr R%d off=%d disallowed\n", regno, Fixed part of pointer offset, pointer types only )
2751  Return -EACCES
2754  If Not Returns true if @a is a known constant || value Then
2757  Format a tnum as a pair of hex numbers (value; mask)
2758  verbose(env, "variable ctx access var_off=%s disallowed\n", tn_buf)
2759  Return -EACCES
2762  Return 0
Caller
NameDescribe
check_mem_accessheck whether memory at (regno + off) is accessible for t = (read | write)* if t==write, value_regno is a register which value is stored into memory* if t==read, value_regno is a register which will receive the value from memory* if t==write &&
check_func_arg
check_ld_absverify safety of LD_ABS|LD_IND instructions:* - they can only appear in the programs where ctx == skb* - since they are wrappers of function calls, they scratch R1-R5 registers,* preserve R6-R9, and store return value into R0* Implicit input:* ctx == skb