bpf_sock_is_valid_access
Regular
4.4
: Absent ⚠️
4.8
: Absent ⚠️
4.10
: Absent ⚠️
4.13
: Absent ⚠️
4.15
: Absent ⚠️
4.18
: Absent ⚠️
5.0
: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff818d8ab5)
Location: net/core/filter.c:5941
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff818df260-ffffffff818df2a8: bpf_sock_is_valid_access (STB_GLOBAL)
5.3
: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff8192d6e0)
Location: net/core/filter.c:6607
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff8192d6e0-ffffffff8192d748: bpf_sock_is_valid_access (STB_GLOBAL)
5.4
: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff8195f9e0)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff8195f9e0-ffffffff8195fa48: bpf_sock_is_valid_access (STB_GLOBAL)
5.8
: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81a32f75)
Location: net/core/filter.c:6907
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_sock_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81a2b7d0-ffffffff81a2b82e: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81a32fb0-ffffffff81a3302c: bpf_sock_is_valid_access (STB_GLOBAL)
5.11
: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81a35335)
Location: net/core/filter.c:7713
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_sock_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81a2c620-ffffffff81a2c67e: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81a35370-ffffffff81a353ec: bpf_sock_is_valid_access (STB_GLOBAL)
5.13
: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81a1c495)
Location: net/core/filter.c:7835
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81a13bd0-ffffffff81a13c28: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81a1c4d0-ffffffff81a1c542: bpf_sock_is_valid_access (STB_GLOBAL)
5.15
: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81acfc55)
Location: net/core/filter.c:7965
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81ac5380-ffffffff81ac53d8: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81acfc90-ffffffff81acfd02: bpf_sock_is_valid_access (STB_GLOBAL)
5.19
: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81c4d395)
Location: net/core/filter.c:8360
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81c408f0-ffffffff81c409ac: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81c4d3f0-ffffffff81c4d499: bpf_sock_is_valid_access (STB_GLOBAL)
6.2
: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81e02245)
Location: net/core/filter.c:8499
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81df5fd0-ffffffff81df608c: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81e022b0-ffffffff81e02359: bpf_sock_is_valid_access (STB_GLOBAL)
6.5
: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81e745d5)
Location: net/core/filter.c:8651
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81e67bb0-ffffffff81e67c5e: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81e74640-ffffffff81e74702: bpf_sock_is_valid_access (STB_GLOBAL)
6.8
: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81f33d95)
Location: net/core/filter.c:8742
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81f26d80-ffffffff81f26e2e: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81f33e00-ffffffff81f33ec2: bpf_sock_is_valid_access (STB_GLOBAL)
arm64
: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffff800010c02d68)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffff800010c02d68-ffff800010c02e2c: bpf_sock_is_valid_access (STB_GLOBAL)
armhf
: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (c0d1c340)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
c0d1c340-c0d1c490: bpf_sock_is_valid_access (STB_GLOBAL)
ppc64el
: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (c000000000cec440)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
c000000000cec440-c000000000cec5b8: bpf_sock_is_valid_access (STB_GLOBAL)
riscv64
: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffe0007821da)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffe0007821da-ffffffe00078228c: bpf_sock_is_valid_access (STB_GLOBAL)
aws
: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff818ff9b0)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff818ff9b0-ffffffff818ffa18: bpf_sock_is_valid_access (STB_GLOBAL)
azure
: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff818b97e0)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff818b97e0-ffffffff818b9848: bpf_sock_is_valid_access (STB_GLOBAL)
gcp
: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff819509e0)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff819509e0-ffffffff81950a48: bpf_sock_is_valid_access (STB_GLOBAL)
lowlatency
: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff819723b0)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff819723b0-ffffffff81972418: bpf_sock_is_valid_access (STB_GLOBAL)
Regular
5.0
and 5.3
✅
5.3
and 5.4
✅
5.4
and 5.8
✅
5.8
and 5.11
✅
5.11
and 5.13
✅
5.13
and 5.15
✅
5.15
and 5.19
✅
5.19
and 6.2
✅
6.2
and 6.5
✅
6.5
and 6.8
✅
amd64
and arm64
✅
amd64
and armhf
✅
amd64
and ppc64el
✅
amd64
and riscv64
✅
generic
and aws
✅
generic
and azure
✅
generic
and gcp
✅
generic
and lowlatency
✅