Function report | 
Source Code:kernel\bpf\verifier.c | 
Create Date:2022-07-28 12:58:14 | 
| Last Modify:2022-05-19 20:02:10 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:starting from main bpf function walk all instructions of the function* and recursively walk all callees that given function can call
Proto:static int check_max_stack_depth(struct bpf_verifier_env *env)
Type:int
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| struct bpf_verifier_env * | env | 
| 2671 | subprog = subprog_info | 
| 2676 | process_func : | 
| 2681 | If depth > BPF program can access up to 512 bytes of stack space. Then | 
| 2684 | Return -EACCES | 
| 2686 | continue_func : | 
| 2688 | When i < subprog_end cycle | 
| 2689 | If opcode != (BPF_JMP | unction call ) Then Continue | 
| 2691 | If source register != when bpf_call->src_reg == BPF_PSEUDO_CALL, bpf_call->imm == pc-relative* offset to another bpf function Then Continue | 
| 2698 | i = i + signed immediate constant + 1 | 
| 2699 | idx = find_subprog(env, i) | 
| 2700 | If idx < 0 Then | 
| 2705 | frame++ | 
| 2706 | If frame >= MAX_CALL_FRAMES Then | 
| 2711 | Go to process_func | 
| 2716 | If frame == 0 Then Return 0 | 
| 2719 | frame-- | 
| 2722 | Go to continue_func | 
| Name | Describe | 
|---|---|
| bpf_check | 
| Source code conversion tool public plug-in interface  | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion  |