Function report |
Source Code:kernel\bpf\verifier.c |
Create Date:2022-07-28 12:55:37 |
Last Modify:2022-05-19 20:02:10 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:bpf_map_ptr_poisoned
Proto:static bool bpf_map_ptr_poisoned(const struct bpf_insn_aux_data *aux)
Type:bool
Parameter:
Type | Parameter | Name |
---|---|---|
const struct bpf_insn_aux_data * | aux |
184 | Return BPF_MAP_PTR( pointer/poison value for maps ) == BPF_MAP_PTR_POISON |
Name | Describe |
---|---|
fixup_bpf_calls | xup insn->imm field of bpf_call instructions* and inline eligible helpers as explicit sequence of BPF instructions* this function is called after eBPF program passed verification |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |