__bpf_prog_get
Regular
4.4
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811729ca)
Location: kernel/bpf/syscall.c:571
Inline: True
Inline callers:
- kernel/bpf/syscall.c:bpf_prog_get
4.8
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *type);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff81180c30)
Location: kernel/bpf/syscall.c:688
Inline: False
Direct callers:
- kernel/bpf/syscall.c:bpf_prog_get_type
- kernel/bpf/syscall.c:bpf_prog_get
Symbols:
ffffffff81180c30-ffffffff81180cb6: __bpf_prog_get (STB_LOCAL)
4.10
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *type);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff8118c970)
Location: kernel/bpf/syscall.c:785
Inline: False
Direct callers:
- kernel/bpf/syscall.c:SyS_bpf
- kernel/bpf/syscall.c:bpf_prog_get
Symbols:
ffffffff8118c970-ffffffff8118c9f6: __bpf_prog_get (STB_LOCAL)
4.13
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *type);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811918c0)
Location: kernel/bpf/syscall.c:890
Inline: False
Direct callers:
- kernel/bpf/syscall.c:SyS_bpf
- kernel/bpf/syscall.c:SyS_bpf
Symbols:
ffffffff811918c0-ffffffff8119194a: __bpf_prog_get (STB_LOCAL)
4.15
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff8119f0f0)
Location: kernel/bpf/syscall.c:1075
Inline: False
Direct callers:
- kernel/bpf/syscall.c:SyS_bpf
- kernel/bpf/syscall.c:SyS_bpf
- kernel/bpf/syscall.c:SyS_bpf
- kernel/bpf/syscall.c:sockmap_get_from_fd
Symbols:
ffffffff8119f0f0-ffffffff8119f190: __bpf_prog_get (STB_LOCAL)
4.18
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811b3c20)
Location: kernel/bpf/syscall.c:1176
Inline: False
Direct callers:
- kernel/bpf/syscall.c:bpf_prog_test_run
- kernel/bpf/syscall.c:bpf_prog_attach
Symbols:
ffffffff811b3c20-ffffffff811b3ccd: __bpf_prog_get (STB_LOCAL)
5.0
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811c2120)
Location: kernel/bpf/syscall.c:1362
Inline: False
Direct callers:
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:__do_sys_bpf
Symbols:
ffffffff811c2120-ffffffff811c21cd: __bpf_prog_get (STB_LOCAL)
5.3
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811d2880)
Location: kernel/bpf/syscall.c:1499
Inline: False
Direct callers:
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:__do_sys_bpf
Symbols:
ffffffff811d2880-ffffffff811d2941: __bpf_prog_get (STB_LOCAL)
5.4
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811decd0)
Location: kernel/bpf/syscall.c:1520
Inline: False
Direct callers:
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:__do_sys_bpf
Symbols:
ffffffff811decd0-ffffffff811ded91: __bpf_prog_get (STB_LOCAL)
5.8
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811fc8c0)
Location: kernel/bpf/syscall.c:1898
Inline: False
Direct callers:
- kernel/bpf/syscall.c:link_update
- kernel/bpf/syscall.c:link_update
- kernel/bpf/syscall.c:link_create
- kernel/bpf/syscall.c:bpf_prog_test_run
- kernel/bpf/syscall.c:bpf_prog_attach
- kernel/bpf/syscall.c:bpf_raw_tracepoint_open
- kernel/bpf/syscall.c:bpf_prog_load
Symbols:
ffffffff811fc8c0-ffffffff811fc95e: __bpf_prog_get (STB_LOCAL)
5.11
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811fbc10)
Location: kernel/bpf/syscall.c:1872
Inline: False
Direct callers:
- kernel/bpf/syscall.c:bpf_prog_bind_map
- kernel/bpf/syscall.c:link_update
- kernel/bpf/syscall.c:link_update
- kernel/bpf/syscall.c:link_create
- kernel/bpf/syscall.c:bpf_prog_test_run
- kernel/bpf/syscall.c:bpf_prog_attach
- kernel/bpf/syscall.c:bpf_raw_tracepoint_open
- kernel/bpf/syscall.c:bpf_tracing_prog_attach
- kernel/bpf/syscall.c:bpf_prog_load
Symbols:
ffffffff811fbc10-ffffffff811fbcb1: __bpf_prog_get (STB_LOCAL)
5.13
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811fc930)
Location: kernel/bpf/syscall.c:1880
Inline: False
Direct callers:
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:bpf_prog_bind_map
- kernel/bpf/syscall.c:link_create
- kernel/bpf/syscall.c:bpf_prog_attach
- kernel/bpf/syscall.c:bpf_raw_tracepoint_open
- kernel/bpf/syscall.c:bpf_tracing_prog_attach
- kernel/bpf/syscall.c:bpf_prog_load
Symbols:
ffffffff811fc930-ffffffff811fc9d1: __bpf_prog_get (STB_LOCAL)
5.15
: Transformation ⚠️struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/syscall.c (0)
Location: kernel/bpf/syscall.c:1974
Inline: False
Direct callers:
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:bpf_prog_bind_map
- kernel/bpf/syscall.c:link_create
- kernel/bpf/syscall.c:bpf_prog_attach
- kernel/bpf/syscall.c:bpf_raw_tracepoint_open
- kernel/bpf/syscall.c:bpf_tracing_prog_attach
- kernel/bpf/syscall.c:bpf_prog_load
Symbols:
ffffffff8122e2b0-ffffffff8122e383: __bpf_prog_get (STB_LOCAL)
ffffffff81cb79de-ffffffff81cb79fa: __bpf_prog_get.cold (STB_LOCAL)
5.19
: Transformation ⚠️struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/syscall.c (0)
Location: kernel/bpf/syscall.c:2220
Inline: False
Direct callers:
- kernel/bpf/syscall.c:kern_sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:bpf_prog_bind_map
- kernel/bpf/syscall.c:link_create
- kernel/bpf/syscall.c:bpf_prog_attach
- kernel/bpf/syscall.c:bpf_tracing_prog_attach
- kernel/bpf/syscall.c:bpf_prog_load
Symbols:
ffffffff81270920-ffffffff81270a2c: __bpf_prog_get (STB_LOCAL)
ffffffff81e68b35-ffffffff81e68b51: __bpf_prog_get.cold (STB_LOCAL)
6.2
: Transformation ⚠️struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/syscall.c (0)
Location: kernel/bpf/syscall.c:2254
Inline: False
Direct callers:
- kernel/bpf/syscall.c:kern_sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:bpf_prog_bind_map
- kernel/bpf/syscall.c:link_create
- kernel/bpf/syscall.c:bpf_prog_attach
- kernel/bpf/syscall.c:bpf_tracing_prog_attach
- kernel/bpf/syscall.c:bpf_prog_load
Symbols:
ffffffff812c6450-ffffffff812c655c: __bpf_prog_get (STB_LOCAL)
ffffffff8205f821-ffffffff8205f83d: __bpf_prog_get.cold (STB_LOCAL)
6.5
: Transformation ⚠️struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/syscall.c (0)
Location: kernel/bpf/syscall.c:2333
Inline: False
Direct callers:
- kernel/bpf/syscall.c:kern_sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:bpf_prog_bind_map
- kernel/bpf/syscall.c:link_update
- kernel/bpf/syscall.c:link_update
- kernel/bpf/syscall.c:link_create
- kernel/bpf/syscall.c:bpf_prog_attach
- kernel/bpf/syscall.c:bpf_tracing_prog_attach
- kernel/bpf/syscall.c:bpf_prog_load
Symbols:
ffffffff812ed750-ffffffff812ed85f: __bpf_prog_get (STB_LOCAL)
ffffffff820de75d-ffffffff820de779: __bpf_prog_get.cold (STB_LOCAL)
6.8
: Transformation ⚠️struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/syscall.c (0)
Location: kernel/bpf/syscall.c:2373
Inline: False
Direct callers:
- kernel/bpf/syscall.c:kern_sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:__sys_bpf
- kernel/bpf/syscall.c:bpf_prog_bind_map
- kernel/bpf/syscall.c:link_update
- kernel/bpf/syscall.c:link_update
- kernel/bpf/syscall.c:link_create
- kernel/bpf/syscall.c:bpf_prog_detach
- kernel/bpf/syscall.c:bpf_prog_attach
- kernel/bpf/syscall.c:bpf_tracing_prog_attach
- kernel/bpf/syscall.c:bpf_prog_load
Symbols:
ffffffff8130c300-ffffffff8130c40f: __bpf_prog_get (STB_LOCAL)
ffffffff821ba63c-ffffffff821ba658: __bpf_prog_get.cold (STB_LOCAL)
arm64
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffff80001025ff70)
Location: kernel/bpf/syscall.c:1520
Inline: False
Direct callers:
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:__do_sys_bpf
Symbols:
ffff80001025ff70-ffff800010260068: __bpf_prog_get (STB_LOCAL)
armhf
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (c0493488)
Location: kernel/bpf/syscall.c:1520
Inline: False
Direct callers:
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:bpf_raw_tracepoint_open
Symbols:
c0493488-c049355c: __bpf_prog_get (STB_LOCAL)
ppc64el
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (c000000000304f30)
Location: kernel/bpf/syscall.c:1520
Inline: False
Direct callers:
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:__do_sys_bpf
Symbols:
c000000000304f30-c000000000305098: __bpf_prog_get (STB_LOCAL)
riscv64
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffe00019dd74)
Location: kernel/bpf/syscall.c:1520
Inline: False
Direct callers:
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:__do_sys_bpf
Symbols:
ffffffe00019dd74-ffffffe00019de46: __bpf_prog_get (STB_LOCAL)
aws
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811d72f0)
Location: kernel/bpf/syscall.c:1520
Inline: False
Direct callers:
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:__do_sys_bpf
Symbols:
ffffffff811d72f0-ffffffff811d73b1: __bpf_prog_get (STB_LOCAL)
azure
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811ca0b0)
Location: kernel/bpf/syscall.c:1520
Inline: False
Direct callers:
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:__do_sys_bpf
Symbols:
ffffffff811ca0b0-ffffffff811ca171: __bpf_prog_get (STB_LOCAL)
gcp
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811d50c0)
Location: kernel/bpf/syscall.c:1520
Inline: False
Direct callers:
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:__do_sys_bpf
Symbols:
ffffffff811d50c0-ffffffff811d5181: __bpf_prog_get (STB_LOCAL)
lowlatency
: ✅struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type *attach_type, bool attach_drv);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811e33f0)
Location: kernel/bpf/syscall.c:1520
Inline: False
Direct callers:
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:__do_sys_bpf
Symbols:
ffffffff811e33f0-ffffffff811e34b1: __bpf_prog_get (STB_LOCAL)
Regular
4.8
and 4.10
✅
4.10
and 4.13
✅
4.13
and 4.15
⚠️enum bpf_prog_type *attach_type
bool attach_drv
enum bpf_prog_type *type
4.15
and 4.18
✅
4.18
and 5.0
✅
5.0
and 5.3
✅
5.3
and 5.4
✅
5.4
and 5.8
✅
5.8
and 5.11
✅
5.11
and 5.13
✅
5.13
and 5.15
✅
5.15
and 5.19
✅
5.19
and 6.2
✅
6.2
and 6.5
✅
6.5
and 6.8
✅
amd64
and arm64
✅
amd64
and armhf
✅
amd64
and ppc64el
✅
amd64
and riscv64
✅
generic
and aws
✅
generic
and azure
✅
generic
and gcp
✅
generic
and lowlatency
✅