| Function report | 
| Source Code: kernel\bpf\verifier.c | Create Date:2022-07-28 12:57:58 | 
| Last Modify:2022-05-19 20:02:10 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:heck access to 'struct bpf_context' fields. Supports fixed offsets only
Proto:static int check_ctx_access(struct bpf_verifier_env *env, int insn_idx, int off, int size, enum bpf_access_type t, enum bpf_reg_type *reg_type, u32 *btf_id)
Type:int
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| struct bpf_verifier_env * | env | |
| int | insn_idx | |
| int | off | |
| int | size | |
| enum bpf_access_type | t | |
| enum bpf_reg_type * | reg_type | |
| u32 * | btf_id | 
| 2404 | struct bpf_insn_access_aux info = {reg_type = * reg_type, r verbose logs = & log, } | 
| 2409 | If is_valid_access && is_valid_access(off, size, t, BPF program being verified , & info) Then | 
| 2420 | If reg_type == g points to kernel struct Then btf_id = btf_id | 
| 2425 | If max_ctx_offset < off + size Then max_ctx_offset = off + size | 
| 2427 | Return 0 | 
| 2431 | Return -EACCES | 
| Name | Describe | 
|---|---|
| check_mem_access | heck whether memory at (regno + off) is accessible for t = (read | write)* if t==write, value_regno is a register which value is stored into memory* if t==read, value_regno is a register which will receive the value from memory* if t==write && | 
| Source code conversion tool public plug-in interface | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |