check_map_access
Regular
4.4
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8117416b)
Location: kernel/bpf/verifier.c:636
Inline: True
Inline callers:
- kernel/bpf/verifier.c:check_mem_access
4.8
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811826f7)
Location: kernel/bpf/verifier.c:642
Inline: True
Inline callers:
- kernel/bpf/verifier.c:check_mem_access
4.10
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8118ecd4)
Location: kernel/bpf/verifier.c:625
Inline: True
Inline callers:
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
4.13
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81193f40)
Location: kernel/bpf/verifier.c:647
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_map_access_adj
- kernel/bpf/verifier.c:check_map_access_adj
Symbols:
ffffffff81193f40-ffffffff81193f83: check_map_access (STB_LOCAL)
4.15
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811a1bb0)
Location: kernel/bpf/verifier.c:817
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811a1bb0-ffffffff811a1d00: check_map_access (STB_LOCAL)
4.18
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811b9780)
Location: kernel/bpf/verifier.c:1253
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811b9780-ffffffff811b98d3: check_map_access (STB_LOCAL)
5.0
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811c7cb0)
Location: kernel/bpf/verifier.c:1435
Inline: False
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811c7cb0-ffffffff811c7e3c: check_map_access (STB_LOCAL)
5.3
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811db3e0)
Location: kernel/bpf/verifier.c:2167
Inline: False
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811db3e0-ffffffff811db5ac: check_map_access (STB_LOCAL)
5.4
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e7b30)
Location: kernel/bpf/verifier.c:2168
Inline: False
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811e7b30-ffffffff811e7cfc: check_map_access (STB_LOCAL)
5.8
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8120c880)
Location: kernel/bpf/verifier.c:2572
Inline: False
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff8120c880-ffffffff8120c915: check_map_access (STB_LOCAL)
5.11
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81208370)
Location: kernel/bpf/verifier.c:2645
Inline: False
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff81208370-ffffffff81208405: check_map_access (STB_LOCAL)
5.13
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81206890)
Location: kernel/bpf/verifier.c:3190
Inline: False
Direct callers:
- kernel/bpf/verifier.c:sanitize_check_bounds
- kernel/bpf/verifier.c:check_func_arg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff81206890-ffffffff81206926: check_map_access (STB_LOCAL)
5.15
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff812399e0)
Location: kernel/bpf/verifier.c:3256
Inline: False
Direct callers:
- kernel/bpf/verifier.c:sanitize_check_bounds
- kernel/bpf/verifier.c:check_func_arg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff812399e0-ffffffff81239b4a: check_map_access (STB_LOCAL)
5.19
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed, enum bpf_access_src src);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8127d8c0)
Location: kernel/bpf/verifier.c:3781
Inline: False
Direct callers:
- kernel/bpf/verifier.c:sanitize_check_bounds
- kernel/bpf/verifier.c:check_func_arg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff8127d8c0-ffffffff8127db37: check_map_access (STB_LOCAL)
6.2
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed, enum bpf_access_src src);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff812d5f50)
Location: kernel/bpf/verifier.c:4223
Inline: False
Direct callers:
- kernel/bpf/verifier.c:sanitize_check_bounds
- kernel/bpf/verifier.c:check_func_arg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff812d5f50-ffffffff812d6209: check_map_access (STB_LOCAL)
6.5
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed, enum bpf_access_src src);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81309580)
Location: kernel/bpf/verifier.c:5143
Inline: False
Direct callers:
- kernel/bpf/verifier.c:sanitize_check_bounds
- kernel/bpf/verifier.c:check_func_arg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff81309580-ffffffff81309877: check_map_access (STB_LOCAL)
6.8
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed, enum bpf_access_src src);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8132d8d0)
Location: kernel/bpf/verifier.c:5344
Inline: False
Direct callers:
- kernel/bpf/verifier.c:sanitize_check_bounds
- kernel/bpf/verifier.c:check_reg_const_str
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff8132d8d0-ffffffff8132dbea: check_map_access (STB_LOCAL)
arm64
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffff80001026b598)
Location: kernel/bpf/verifier.c:2168
Inline: False
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffff80001026b598-ffff80001026b79c: check_map_access (STB_LOCAL)
armhf
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c049d5f4)
Location: kernel/bpf/verifier.c:2168
Inline: False
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
c049d5f4-c049d81c: check_map_access (STB_LOCAL)
ppc64el
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c0000000003115a0)
Location: kernel/bpf/verifier.c:2168
Inline: False
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
c0000000003115a0-c000000000311808: check_map_access (STB_LOCAL)
riscv64
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffe0001a5b5a)
Location: kernel/bpf/verifier.c:2168
Inline: False
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffe0001a5b5a-ffffffe0001a5cee: check_map_access (STB_LOCAL)
aws
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e0150)
Location: kernel/bpf/verifier.c:2168
Inline: False
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811e0150-ffffffff811e031c: check_map_access (STB_LOCAL)
azure
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811d2f10)
Location: kernel/bpf/verifier.c:2168
Inline: False
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811d2f10-ffffffff811d30dc: check_map_access (STB_LOCAL)
gcp
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811ddf20)
Location: kernel/bpf/verifier.c:2168
Inline: False
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811ddf20-ffffffff811de0ec: check_map_access (STB_LOCAL)
lowlatency
: ✅int check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811ec330)
Location: kernel/bpf/verifier.c:2168
Inline: False
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811ec330-ffffffff811ec4fc: check_map_access (STB_LOCAL)
Regular
4.13
and 4.15
⚠️bool zero_size_allowed
4.15
and 4.18
✅
4.18
and 5.0
✅
5.0
and 5.3
✅
5.3
and 5.4
✅
5.4
and 5.8
✅
5.8
and 5.11
✅
5.11
and 5.13
✅
5.13
and 5.15
✅
5.15
and 5.19
⚠️enum bpf_access_src src
5.19
and 6.2
✅
6.2
and 6.5
✅
6.5
and 6.8
✅
amd64
and arm64
✅
amd64
and armhf
✅
amd64
and ppc64el
✅
amd64
and riscv64
✅
generic
and aws
✅
generic
and azure
✅
generic
and gcp
✅
generic
and lowlatency
✅