On Thu, Jul 17, 2014 at 9:20 PM, Alexei Starovoitov <[email protected]> wrote:
> Safety of eBPF programs is statically determined by the verifier, which 
> detects:
> - loops
> - out of range jumps
> - unreachable instructions
> - invalid instructions
> - uninitialized register access
> - uninitialized stack access
> - misaligned stack access
> - out of range stack access
> - invalid calling convention

Is there something that documents exactly what conditions an eBPF
program must satisfy in order to be considered valid?

--Andy
--
To unsubscribe from this list: send the line "unsubscribe linux-api" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to