Function report |
Source Code:kernel\bpf\verifier.c |
Create Date:2022-07-28 13:05:02 |
| Last Modify:2022-05-19 20:02:10 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:fixup_call_args
Proto:static int fixup_call_args(struct bpf_verifier_env *env)
Type:int
Parameter:
| Type | Parameter | Name |
|---|---|---|
| struct bpf_verifier_env * | env |
| 9103 | prog = BPF program being verified |
| 9107 | err = 0 |
| 9109 | If archs need to JIT the prog && Not bpf_prog_is_dev_bound( Auxiliary fields ) Then |
| 9118 | When i < Number of filter blocks cycle |
| 9119 | If opcode != (BPF_JMP | unction call ) || source register != when bpf_call->src_reg == BPF_PSEUDO_CALL, bpf_call->imm == pc-relative* offset to another bpf function Then Continue |
| 9122 | depth = get_callee_stack_depth(env, insn, i) |
| 9125 | bpf_patch_call_args(insn, depth) |
| 9127 | err = 0 |
| 9129 | Return err |
| Name | Describe |
|---|---|
| bpf_check |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |