Function report |
Source Code:kernel\bpf\verifier.c |
Create Date:2022-07-28 12:58:14 |
| Last Modify:2022-05-19 20:02:10 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:starting from main bpf function walk all instructions of the function* and recursively walk all callees that given function can call
Proto:static int check_max_stack_depth(struct bpf_verifier_env *env)
Type:int
Parameter:
| Type | Parameter | Name |
|---|---|---|
| struct bpf_verifier_env * | env |
| 2671 | subprog = subprog_info |
| 2676 | process_func : |
| 2681 | If depth > BPF program can access up to 512 bytes of stack space. Then |
| 2684 | Return -EACCES |
| 2686 | continue_func : |
| 2688 | When i < subprog_end cycle |
| 2689 | If opcode != (BPF_JMP | unction call ) Then Continue |
| 2691 | If source register != when bpf_call->src_reg == BPF_PSEUDO_CALL, bpf_call->imm == pc-relative* offset to another bpf function Then Continue |
| 2698 | i = i + signed immediate constant + 1 |
| 2699 | idx = find_subprog(env, i) |
| 2700 | If idx < 0 Then |
| 2705 | frame++ |
| 2706 | If frame >= MAX_CALL_FRAMES Then |
| 2711 | Go to process_func |
| 2716 | If frame == 0 Then Return 0 |
| 2719 | frame-- |
| 2722 | Go to continue_func |
| Name | Describe |
|---|---|
| bpf_check |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |