Function report |
Source Code:kernel\bpf\verifier.c |
Create Date:2022-07-28 13:05:02 |
Last Modify:2022-05-19 20:02:10 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:fixup_call_args
Proto:static int fixup_call_args(struct bpf_verifier_env *env)
Type:int
Parameter:
Type | Parameter | Name |
---|---|---|
struct bpf_verifier_env * | env |
9103 | prog = BPF program being verified |
9107 | err = 0 |
9109 | If archs need to JIT the prog && Not bpf_prog_is_dev_bound( Auxiliary fields ) Then |
9118 | When i < Number of filter blocks cycle |
9119 | If opcode != (BPF_JMP | unction call ) || source register != when bpf_call->src_reg == BPF_PSEUDO_CALL, bpf_call->imm == pc-relative* offset to another bpf function Then Continue |
9122 | depth = get_callee_stack_depth(env, insn, i) |
9125 | bpf_patch_call_args(insn, depth) |
9127 | err = 0 |
9129 | Return err |
Name | Describe |
---|---|
bpf_check |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |