Function report |
Source Code:kernel\bpf\verifier.c |
Create Date:2022-07-28 12:58:14 |
Last Modify:2022-05-19 20:02:10 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:starting from main bpf function walk all instructions of the function* and recursively walk all callees that given function can call
Proto:static int check_max_stack_depth(struct bpf_verifier_env *env)
Type:int
Parameter:
Type | Parameter | Name |
---|---|---|
struct bpf_verifier_env * | env |
2671 | subprog = subprog_info |
2676 | process_func : |
2681 | If depth > BPF program can access up to 512 bytes of stack space. Then |
2684 | Return -EACCES |
2686 | continue_func : |
2688 | When i < subprog_end cycle |
2689 | If opcode != (BPF_JMP | unction call ) Then Continue |
2691 | If source register != when bpf_call->src_reg == BPF_PSEUDO_CALL, bpf_call->imm == pc-relative* offset to another bpf function Then Continue |
2698 | i = i + signed immediate constant + 1 |
2699 | idx = find_subprog(env, i) |
2700 | If idx < 0 Then |
2705 | frame++ |
2706 | If frame >= MAX_CALL_FRAMES Then |
2711 | Go to process_func |
2716 | If frame == 0 Then Return 0 |
2719 | frame-- |
2722 | Go to continue_func |
Name | Describe |
---|---|
bpf_check |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |