kprobe_prog_is_valid_access
Regular
4.4
: ✅bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff81166b80)
Location: kernel/trace/bpf_trace.c:302
Inline: False
Symbols:
ffffffff81166b80-ffffffff81166ba1: kprobe_prog_is_valid_access (STB_LOCAL)
4.8
: ✅bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, enum bpf_reg_type *reg_type);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff81173d70)
Location: kernel/trace/bpf_trace.c:428
Inline: False
Symbols:
ffffffff81173d70-ffffffff81173d91: kprobe_prog_is_valid_access (STB_LOCAL)
4.10
: ✅bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, enum bpf_reg_type *reg_type);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff8117f540)
Location: kernel/trace/bpf_trace.c:453
Inline: False
Symbols:
ffffffff8117f540-ffffffff8117f561: kprobe_prog_is_valid_access (STB_LOCAL)
4.13
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff81182cf0)
Location: kernel/trace/bpf_trace.c:519
Inline: True
Symbols:
ffffffff81182cf0-ffffffff81182d1d: kprobe_prog_is_valid_access (STB_LOCAL)
4.15
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff81190780)
Location: kernel/trace/bpf_trace.c:565
Inline: True
Symbols:
ffffffff81190780-ffffffff811907ad: kprobe_prog_is_valid_access (STB_LOCAL)
4.18
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811a5650)
Location: kernel/trace/bpf_trace.c:598
Inline: True
Symbols:
ffffffff811a5650-ffffffff811a5677: kprobe_prog_is_valid_access (STB_LOCAL)
5.0
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811b3770)
Location: kernel/trace/bpf_trace.c:634
Inline: True
Symbols:
ffffffff811b3770-ffffffff811b379f: kprobe_prog_is_valid_access (STB_LOCAL)
5.3
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811c24b0)
Location: kernel/trace/bpf_trace.c:739
Inline: True
Symbols:
ffffffff811c24b0-ffffffff811c24e5: kprobe_prog_is_valid_access (STB_LOCAL)
5.4
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811cdc20)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
ffffffff811cdc20-ffffffff811cdc55: kprobe_prog_is_valid_access (STB_LOCAL)
5.8
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811e9940)
Location: kernel/trace/bpf_trace.c:1162
Inline: True
Symbols:
ffffffff811e9940-ffffffff811e9975: kprobe_prog_is_valid_access (STB_LOCAL)
5.11
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811e6d40)
Location: kernel/trace/bpf_trace.c:1391
Inline: True
Symbols:
ffffffff811e6d40-ffffffff811e6d75: kprobe_prog_is_valid_access (STB_LOCAL)
5.13
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811e7fe0)
Location: kernel/trace/bpf_trace.c:1085
Inline: True
Symbols:
ffffffff811e7fe0-ffffffff811e8016: kprobe_prog_is_valid_access (STB_LOCAL)
5.15
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff81218c60)
Location: kernel/trace/bpf_trace.c:1162
Inline: True
Symbols:
ffffffff81218c60-ffffffff81218c96: kprobe_prog_is_valid_access (STB_LOCAL)
5.19
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff81257270)
Location: kernel/trace/bpf_trace.c:1340
Inline: True
Symbols:
ffffffff81257270-ffffffff812572b9: kprobe_prog_is_valid_access (STB_LOCAL)
6.2
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff812a68a0)
Location: kernel/trace/bpf_trace.c:1554
Inline: True
Symbols:
ffffffff812a68a0-ffffffff812a68e9: kprobe_prog_is_valid_access (STB_LOCAL)
6.5
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff812c89c0)
Location: kernel/trace/bpf_trace.c:1563
Inline: True
Symbols:
ffffffff812c89c0-ffffffff812c8a09: kprobe_prog_is_valid_access (STB_LOCAL)
6.8
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff812e5990)
Location: kernel/trace/bpf_trace.c:1668
Inline: True
Symbols:
ffffffff812e5990-ffffffff812e59d9: kprobe_prog_is_valid_access (STB_LOCAL)
arm64
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffff80001024cca8)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
ffff80001024cca8-ffff80001024cce8: kprobe_prog_is_valid_access (STB_LOCAL)
armhf
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (c04807b4)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
c04807b4-c048080c: kprobe_prog_is_valid_access (STB_LOCAL)
ppc64el
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (c0000000002e97b0)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
c0000000002e97b0-c0000000002e97f8: kprobe_prog_is_valid_access (STB_LOCAL)
riscv64
: Absent ⚠️
aws
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811c6240)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
ffffffff811c6240-ffffffff811c6275: kprobe_prog_is_valid_access (STB_LOCAL)
azure
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811b9020)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
ffffffff811b9020-ffffffff811b9055: kprobe_prog_is_valid_access (STB_LOCAL)
gcp
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811c4010)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
ffffffff811c4010-ffffffff811c4045: kprobe_prog_is_valid_access (STB_LOCAL)
lowlatency
: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811d18f0)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
ffffffff811d18f0-ffffffff811d1925: kprobe_prog_is_valid_access (STB_LOCAL)
Regular
4.4
and 4.8
⚠️enum bpf_reg_type *reg_type
4.8
and 4.10
✅
4.10
and 4.13
⚠️struct bpf_insn_access_aux *info
enum bpf_reg_type *reg_type
4.13
and 4.15
✅
4.15
and 4.18
⚠️const struct bpf_prog *prog
off, size, type, info
➡️ off, size, type, prog, info
4.18
and 5.0
✅
5.0
and 5.3
✅
5.3
and 5.4
✅
5.4
and 5.8
✅
5.8
and 5.11
✅
5.11
and 5.13
✅
5.13
and 5.15
✅
5.15
and 5.19
✅
5.19
and 6.2
✅
6.2
and 6.5
✅
6.5
and 6.8
✅
amd64
and arm64
✅
amd64
and armhf
✅
amd64
and ppc64el
✅
generic
and aws
✅
generic
and azure
✅
generic
and gcp
✅
generic
and lowlatency
✅