check_stack_access
Regular
4.4
: Absent ⚠️
4.8
: Absent ⚠️
4.10
: Absent ⚠️
4.13
: Absent ⚠️
4.15
: Absent ⚠️
4.18
: Absent ⚠️
5.0
: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811c7e40)
Location: kernel/bpf/verifier.c:1393
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811c7e40-ffffffff811c7ee6: check_stack_access (STB_LOCAL)
5.3
: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811db5b0)
Location: kernel/bpf/verifier.c:2103
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811db5b0-ffffffff811db660: check_stack_access (STB_LOCAL)
5.4
: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e7d00)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811e7d00-ffffffff811e7db0: check_stack_access (STB_LOCAL)
5.8
: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8120d7d0)
Location: kernel/bpf/verifier.c:2433
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff8120d7d0-ffffffff8120d880: check_stack_access (STB_LOCAL)
5.11
: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8120dfa0)
Location: kernel/bpf/verifier.c:2506
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff8120dfa0-ffffffff8120e050: check_stack_access (STB_LOCAL)
5.13
: Absent ⚠️
5.15
: Absent ⚠️
5.19
: Absent ⚠️
6.2
: Absent ⚠️
6.5
: Absent ⚠️
6.8
: Absent ⚠️
arm64
: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffff80001026b7a0)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffff80001026b7a0-ffff80001026b874: check_stack_access (STB_LOCAL)
armhf
: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (c049d81c)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
c049d81c-c049d8e4: check_stack_access (STB_LOCAL)
ppc64el
: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (c000000000311810)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
c000000000311810-c000000000311918: check_stack_access (STB_LOCAL)
riscv64
: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffe0001a5cee)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffe0001a5cee-ffffffe0001a5d7c: check_stack_access (STB_LOCAL)
aws
: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e0320)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811e0320-ffffffff811e03d0: check_stack_access (STB_LOCAL)
azure
: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811d30e0)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811d30e0-ffffffff811d3190: check_stack_access (STB_LOCAL)
gcp
: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811de0f0)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811de0f0-ffffffff811de1a0: check_stack_access (STB_LOCAL)
lowlatency
: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811ec500)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811ec500-ffffffff811ec5b0: check_stack_access (STB_LOCAL)
Regular
5.0
and 5.3
✅
5.3
and 5.4
✅
5.4
and 5.8
✅
5.8
and 5.11
✅
amd64
and arm64
✅
amd64
and armhf
✅
amd64
and ppc64el
✅
amd64
and riscv64
✅
generic
and aws
✅
generic
and azure
✅
generic
and gcp
✅
generic
and lowlatency
✅