__check_map_access
Regular
4.4
: Absent ⚠️
4.8
: Absent ⚠️
4.10
: Absent ⚠️
4.13
: Absent ⚠️
4.15
: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811a1680)
Location: kernel/bpf/verifier.c:801
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811a1680-ffffffff811a16d0: __check_map_access (STB_LOCAL)
4.18
: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811b9720)
Location: kernel/bpf/verifier.c:1237
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811b9720-ffffffff811b977a: __check_map_access (STB_LOCAL)
5.0
: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811c7c50)
Location: kernel/bpf/verifier.c:1419
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811c7c50-ffffffff811c7cae: __check_map_access (STB_LOCAL)
5.3
: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811db370)
Location: kernel/bpf/verifier.c:2151
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811db370-ffffffff811db3d1: __check_map_access (STB_LOCAL)
5.4
: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e7ac0)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811e7ac0-ffffffff811e7b21: __check_map_access (STB_LOCAL)
5.8
: Absent ⚠️
5.11
: Absent ⚠️
5.13
: Absent ⚠️
5.15
: Absent ⚠️
5.19
: Absent ⚠️
6.2
: Absent ⚠️
6.5
: Absent ⚠️
6.8
: Absent ⚠️
arm64
: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffff80001026b4e8)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffff80001026b4e8-ffff80001026b598: __check_map_access (STB_LOCAL)
armhf
: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c049d560)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
c049d560-c049d5f4: __check_map_access (STB_LOCAL)
ppc64el
: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c000000000311500)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
c000000000311500-c0000000003115a0: __check_map_access (STB_LOCAL)
riscv64
: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffe0001a5ace)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffe0001a5ace-ffffffe0001a5b5a: __check_map_access (STB_LOCAL)
aws
: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e00e0)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811e00e0-ffffffff811e0141: __check_map_access (STB_LOCAL)
azure
: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811d2ea0)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811d2ea0-ffffffff811d2f01: __check_map_access (STB_LOCAL)
gcp
: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811ddeb0)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811ddeb0-ffffffff811ddf11: __check_map_access (STB_LOCAL)
lowlatency
: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811ec2c0)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811ec2c0-ffffffff811ec321: __check_map_access (STB_LOCAL)
Regular
4.15
and 4.18
✅
4.18
and 5.0
✅
5.0
and 5.3
✅
5.3
and 5.4
✅
amd64
and arm64
✅
amd64
and armhf
✅
amd64
and ppc64el
✅
amd64
and riscv64
✅
generic
and aws
✅
generic
and azure
✅
generic
and gcp
✅
generic
and lowlatency
✅