__check_stack_boundary
Regular
4.4
: Absent ⚠️
4.8
: Absent ⚠️
4.10
: Absent ⚠️
4.13
: Absent ⚠️
4.15
: Absent ⚠️
4.18
: Absent ⚠️
5.0
: Absent ⚠️
5.3
: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811dd080)
Location: kernel/bpf/verifier.c:2933
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffff811dd080-ffffffff811dd168: __check_stack_boundary (STB_LOCAL)
5.4
: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e9820)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffff811e9820-ffffffff811e9908: __check_stack_boundary (STB_LOCAL)
5.8
: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81209060)
Location: kernel/bpf/verifier.c:3425
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_boundary
Symbols:
ffffffff81209060-ffffffff8120914a: __check_stack_boundary (STB_LOCAL)
5.11
: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8120a530)
Location: kernel/bpf/verifier.c:3655
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_boundary
Symbols:
ffffffff8120a530-ffffffff8120a61a: __check_stack_boundary (STB_LOCAL)
5.13
: Absent ⚠️
5.15
: Absent ⚠️
5.19
: Absent ⚠️
6.2
: Absent ⚠️
6.5
: Absent ⚠️
6.8
: Absent ⚠️
arm64
: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffff80001026d008)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffff80001026d008-ffff80001026d118: __check_stack_boundary (STB_LOCAL)
armhf
: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c049f59c)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
c049f59c-c049f6b8: __check_stack_boundary (STB_LOCAL)
ppc64el
: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c000000000313770)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
c000000000313770-c0000000003138c4: __check_stack_boundary (STB_LOCAL)
riscv64
: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffe0001a71ac)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffe0001a71ac-ffffffe0001a726e: __check_stack_boundary (STB_LOCAL)
aws
: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e1e40)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffff811e1e40-ffffffff811e1f28: __check_stack_boundary (STB_LOCAL)
azure
: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811d4c00)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffff811d4c00-ffffffff811d4ce8: __check_stack_boundary (STB_LOCAL)
gcp
: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811dfc10)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffff811dfc10-ffffffff811dfcf8: __check_stack_boundary (STB_LOCAL)
lowlatency
: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811ee020)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffff811ee020-ffffffff811ee108: __check_stack_boundary (STB_LOCAL)
Regular
5.3
and 5.4
✅
5.4
and 5.8
✅
5.8
and 5.11
✅
amd64
and arm64
✅
amd64
and armhf
✅
amd64
and ppc64el
✅
amd64
and riscv64
✅
generic
and aws
✅
generic
and azure
✅
generic
and gcp
✅
generic
and lowlatency
✅