Function report | 
Source Code:kernel\bpf\verifier.c | 
Create Date:2022-07-28 12:58:17 | 
| Last Modify:2022-05-19 20:02:10 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:check_ctx_reg
Proto:static int check_ctx_reg(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int regno)
Type:int
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| struct bpf_verifier_env * | env | |
| const struct bpf_reg_state * | reg | |
| int | regno | 
| 2748 | If Fixed part of pointer offset, pointer types only Then | 
| 2749 | verbose(env, "dereference of modified ctx ptr R%d off=%d disallowed\n", regno, Fixed part of pointer offset, pointer types only ) | 
| 2751 | Return -EACCES | 
| 2754 | If Not Returns true if @a is a known constant || value Then | 
| 2759 | Return -EACCES | 
| 2762 | Return 0 | 
| Name | Describe | 
|---|---|
| check_mem_access | heck whether memory at (regno + off) is accessible for t = (read | write)* if t==write, value_regno is a register which value is stored into memory* if t==read, value_regno is a register which will receive the value from memory* if t==write && | 
| check_func_arg | |
| check_ld_abs | verify safety of LD_ABS|LD_IND instructions:* - they can only appear in the programs where ctx == skb* - since they are wrappers of function calls, they scratch R1-R5 registers,* preserve R6-R9, and store return value into R0* Implicit input:* ctx == skb | 
| Source code conversion tool public plug-in interface  | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion  |