函数逻辑报告

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:kernel\bpf\verifier.c Create Date:2022-07-27 14:11:55
Last Modify:2022-05-19 20:02:10 Copyright©Brick
首页 函数Tree
注解内核,赢得工具下载SCCTEnglish

函数名称:check_ctx_reg

函数原型:static int check_ctx_reg(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int regno)

返回类型:int

参数:

类型参数名称
struct bpf_verifier_env *env
const struct bpf_reg_state *reg
intregno
2748  如果 Fixed part of pointer offset, pointer types only
2749  verbose(env, "dereference of modified ctx ptr R%d off=%d disallowed\n", regno, Fixed part of pointer offset, pointer types only )
2751  返回:负EACCES
2754  如果非Returns true if @a is a known constant value
2757  Format a tnum as a pair of hex numbers (value; mask)
2758  verbose(env, "variable ctx access var_off=%s disallowed\n", tn_buf)
2759  返回:负EACCES
2762  返回:0
调用者
名称描述
check_mem_accessheck whether memory at (regno + off) is accessible for t = (read | write)* if t==write, value_regno is a register which value is stored into memory* if t==read, value_regno is a register which will receive the value from memory* if t==write &&
check_func_arg
check_ld_absverify safety of LD_ABS|LD_IND instructions:* - they can only appear in the programs where ctx == skb* - since they are wrappers of function calls, they scratch R1-R5 registers,* preserve R6-R9, and store return value into R0* Implicit input:* ctx == skb