Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:kernel\bpf\verifier.c Create Date:2022-07-28 12:57:44
Last Modify:2022-05-19 20:02:10 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:check_stack_access

Proto:static int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size)

Type:int

Parameter:

TypeParameterName
struct bpf_verifier_env *env
const struct bpf_reg_state *reg
intoff
intsize
2178  If Not Returns true if @a is a known constant Then
2181  Format a tnum as a pair of hex numbers (value; mask)
2182  verbose(env, "variable stack access var_off=%s off=%d size=%d\n", tn_buf, off, size)
2184  Return -EACCES
2187  If off >= 0 || off < -BPF program can access up to 512 bytes of stack space. Then
2188  verbose(env, "invalid stack off=%d size=%d\n", off, size)
2189  Return -EACCES
2192  Return 0
Caller
NameDescribe
check_mem_accessheck whether memory at (regno + off) is accessible for t = (read | write)* if t==write, value_regno is a register which value is stored into memory* if t==read, value_regno is a register which will receive the value from memory* if t==write &&
adjust_ptr_min_max_valsHandles arithmetic on a pointer and a scalar: computes new min/max and var_off.* Caller should also handle BPF_MOV case separately.* If we return -EACCES, caller may want to try again treating pointer as a* scalar