Function report |
Source Code:kernel\bpf\verifier.c |
Create Date:2022-07-28 12:57:44 |
Last Modify:2022-05-19 20:02:10 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:check_stack_access
Proto:static int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size)
Type:int
Parameter:
Type | Parameter | Name |
---|---|---|
struct bpf_verifier_env * | env | |
const struct bpf_reg_state * | reg | |
int | off | |
int | size |
2178 | If Not Returns true if @a is a known constant Then |
2184 | Return -EACCES |
2187 | If off >= 0 || off < -BPF program can access up to 512 bytes of stack space. Then |
2192 | Return 0 |
Name | Describe |
---|---|
check_mem_access | heck whether memory at (regno + off) is accessible for t = (read | write)* if t==write, value_regno is a register which value is stored into memory* if t==read, value_regno is a register which will receive the value from memory* if t==write && |
adjust_ptr_min_max_vals | Handles arithmetic on a pointer and a scalar: computes new min/max and var_off.* Caller should also handle BPF_MOV case separately.* If we return -EACCES, caller may want to try again treating pointer as a* scalar |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |