Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:kernel\bpf\verifier.c Create Date:2022-07-28 13:05:02
Last Modify:2022-05-19 20:02:10 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:fixup_call_args

Proto:static int fixup_call_args(struct bpf_verifier_env *env)

Type:int

Parameter:

TypeParameterName
struct bpf_verifier_env *env
9103  prog = BPF program being verified
9104  insn = insnsi
9107  err = 0
9109  If archs need to JIT the prog && Not bpf_prog_is_dev_bound( Auxiliary fields ) Then
9111  err = jit_subprogs(env)
9112  If err == 0 Then Return 0
9114  If err == -EFAULT Then Return err
9118  When i < Number of filter blocks cycle
9119  If opcode != (BPF_JMP | unction call ) || source register != when bpf_call->src_reg == BPF_PSEUDO_CALL, bpf_call->imm == pc-relative* offset to another bpf function Then Continue
9122  depth = get_callee_stack_depth(env, insn, i)
9123  If depth < 0 Then Return depth
9125  bpf_patch_call_args(insn, depth)
9127  err = 0
9129  Return err
Caller
NameDescribe
bpf_check