check_stack_range_initialized
Regular
4.4
: Absent ⚠️
4.8
: Absent ⚠️
4.10
: Absent ⚠️
4.13
: Absent ⚠️
4.15
: Absent ⚠️
4.18
: Absent ⚠️
5.0
: Absent ⚠️
5.3
: Absent ⚠️
5.4
: Absent ⚠️
5.8
: Absent ⚠️
5.11
: Absent ⚠️
5.13
: ✅int check_stack_range_initialized(struct bpf_verifier_env *env, int regno, int off, int access_size, bool zero_size_allowed, enum stack_access_src type, struct bpf_call_arg_meta *meta);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81206dd0)
Location: kernel/bpf/verifier.c:4349
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_stack_read
Symbols:
ffffffff81206dd0-ffffffff81207184: check_stack_range_initialized (STB_LOCAL)
5.15
: Transformation ⚠️int check_stack_range_initialized(struct bpf_verifier_env *env, int regno, int off, int access_size, bool zero_size_allowed, enum stack_access_src type, struct bpf_call_arg_meta *meta);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:4463
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_stack_read
Symbols:
ffffffff8123a170-ffffffff8123a646: check_stack_range_initialized (STB_LOCAL)
ffffffff81cb7dd6-ffffffff81cb7ea3: check_stack_range_initialized.cold (STB_LOCAL)
5.19
: Transformation ⚠️int check_stack_range_initialized(struct bpf_verifier_env *env, int regno, int off, int access_size, bool zero_size_allowed, enum bpf_access_src type, struct bpf_call_arg_meta *meta);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:5041
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_stack_read
Symbols:
ffffffff8127e2f0-ffffffff8127e7e5: check_stack_range_initialized (STB_LOCAL)
ffffffff81e68f03-ffffffff81e68fd4: check_stack_range_initialized.cold (STB_LOCAL)
6.2
: Transformation ⚠️int check_stack_range_initialized(struct bpf_verifier_env *env, int regno, int off, int access_size, bool zero_size_allowed, enum bpf_access_src type, struct bpf_call_arg_meta *meta);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:5546
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_stack_read
Symbols:
ffffffff812d6a10-ffffffff812d6fb8: check_stack_range_initialized (STB_LOCAL)
ffffffff8205ff3b-ffffffff82060049: check_stack_range_initialized.cold (STB_LOCAL)
6.5
: Transformation ⚠️int check_stack_range_initialized(struct bpf_verifier_env *env, int regno, int off, int access_size, bool zero_size_allowed, enum bpf_access_src type, struct bpf_call_arg_meta *meta);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:6626
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff812f8fe0-ffffffff812f96a2: check_stack_range_initialized (STB_LOCAL)
ffffffff820deaa8-ffffffff820debfb: check_stack_range_initialized.cold (STB_LOCAL)
6.8
: Transformation ⚠️int check_stack_range_initialized(struct bpf_verifier_env *env, int regno, int off, int access_size, bool zero_size_allowed, enum bpf_access_src type, struct bpf_call_arg_meta *meta);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:6997
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff81318c70-ffffffff8131927d: check_stack_range_initialized (STB_LOCAL)
ffffffff821bab91-ffffffff821baccb: check_stack_range_initialized.cold (STB_LOCAL)
arm64
: Absent ⚠️
armhf
: Absent ⚠️
ppc64el
: Absent ⚠️
riscv64
: Absent ⚠️
aws
: Absent ⚠️
azure
: Absent ⚠️
gcp
: Absent ⚠️
lowlatency
: Absent ⚠️
Regular
5.13
and 5.15
✅
5.15
and 5.19
⚠️enum stack_access_src type
➡️ enum bpf_access_src type
5.19
and 6.2
✅
6.2
and 6.5
✅
6.5
and 6.8
✅