bpf_prog_load_check_attach
Regular
4.4
: Absent ⚠️
4.8
: Absent ⚠️
4.10
: Absent ⚠️
4.13
: Absent ⚠️
4.15
: Absent ⚠️
4.18
: Absent ⚠️
5.0
: Absent ⚠️
5.3
: Absent ⚠️
5.4
: Absent ⚠️
5.8
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff81200090)
Location: kernel/bpf/syscall.c:1957
Inline: True
Inline callers:
- kernel/bpf/syscall.c:bpf_prog_load
5.11
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811ffa06)
Location: kernel/bpf/syscall.c:1931
Inline: True
Inline callers:
- kernel/bpf/syscall.c:bpf_prog_load
5.13
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff812003b1)
Location: kernel/bpf/syscall.c:1939
Inline: True
Inline callers:
- kernel/bpf/syscall.c:bpf_prog_load
5.15
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff81231c07)
Location: kernel/bpf/syscall.c:2038
Inline: True
Inline callers:
- kernel/bpf/syscall.c:bpf_prog_load
5.19
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff812753a8)
Location: kernel/bpf/syscall.c:2284
Inline: True
Inline callers:
- kernel/bpf/syscall.c:bpf_prog_load
6.2
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff812ca2ba)
Location: kernel/bpf/syscall.c:2318
Inline: True
Inline callers:
- kernel/bpf/syscall.c:bpf_prog_load
6.5
: ✅int bpf_prog_load_check_attach(enum bpf_prog_type prog_type, enum bpf_attach_type expected_attach_type, struct btf *attach_btf, u32 btf_id, struct bpf_prog *dst_prog);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff812eb730)
Location: kernel/bpf/syscall.c:2397
Inline: False
Direct callers:
- kernel/bpf/syscall.c:bpf_prog_load
Symbols:
ffffffff812eb730-ffffffff812eb8d5: bpf_prog_load_check_attach (STB_LOCAL)
6.8
: ✅int bpf_prog_load_check_attach(enum bpf_prog_type prog_type, enum bpf_attach_type expected_attach_type, struct btf *attach_btf, u32 btf_id, struct bpf_prog *dst_prog);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff81309c80)
Location: kernel/bpf/syscall.c:2437
Inline: False
Direct callers:
- kernel/bpf/syscall.c:bpf_prog_load
Symbols:
ffffffff81309c80-ffffffff81309e25: bpf_prog_load_check_attach (STB_LOCAL)
arm64
: Absent ⚠️
armhf
: Absent ⚠️
ppc64el
: Absent ⚠️
riscv64
: Absent ⚠️
aws
: Absent ⚠️
azure
: Absent ⚠️
gcp
: Absent ⚠️
lowlatency
: Absent ⚠️
Regular
6.5
and 6.8
✅