| Function report | 
| Source Code: kernel\bpf\verifier.c | Create Date:2022-07-28 13:04:10 | 
| Last Modify:2022-05-19 20:02:10 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:bpf_patch_insn_data
Proto:static struct bpf_prog *bpf_patch_insn_data(struct bpf_verifier_env *env, u32 off, const struct bpf_insn *patch, u32 len)
Type:struct bpf_prog
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| struct bpf_verifier_env * | env | |
| u32 | off | |
| const struct bpf_insn * | patch | |
| u32 | len | 
| 8391 | new_prog = bpf_patch_insn_single(BPF program being verified , off, patch, len) | 
| 8393 | If PTR_ERR(new_prog) == -ERANGE Then verbose(env, "insn %d cannot be patched due to 16-bit range\n", original instruction index ) | 
| 8397 | Return NULL | 
| 8401 | adjust_subprog_starts(env, off, len) | 
| 8402 | Return new_prog | 
| Name | Describe | 
|---|---|
| opt_subreg_zext_lo32_rnd_hi32 | |
| convert_ctx_accesses | vert load instructions that access fields of a context type into a* sequence of instructions that access fields of the underlying structure:* struct __sk_buff -> struct sk_buff* struct bpf_sock_ops -> struct sock | 
| fixup_bpf_calls | xup insn->imm field of bpf_call instructions* and inline eligible helpers as explicit sequence of BPF instructions* this function is called after eBPF program passed verification | 
| Source code conversion tool public plug-in interface | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |