mark_reg_read
Regular
4.4
: Absent ⚠️
4.8
: Absent ⚠️
4.10
: Absent ⚠️
4.13
: Absent ⚠️
4.15
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811a36c0)
Location: kernel/bpf/verifier.c:623
Inline: True
Inline callers:
- kernel/bpf/verifier.c:check_reg_arg
4.18
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_verifier_state *state, struct bpf_verifier_state *parent, u32 regno);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811b7f40)
Location: kernel/bpf/verifier.c:927
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811b7f40-ffffffff811b807f: mark_reg_read (STB_LOCAL)
5.0
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811c72d0)
Location: kernel/bpf/verifier.c:1130
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811c72d0-ffffffff811c7331: mark_reg_read (STB_LOCAL)
5.3
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811da0a0)
Location: kernel/bpf/verifier.c:1195
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811da0a0-ffffffff811da147: mark_reg_read (STB_LOCAL)
5.4
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e6840)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811e6840-ffffffff811e68e7: mark_reg_read (STB_LOCAL)
5.8
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81206cd0)
Location: kernel/bpf/verifier.c:1505
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff81206cd0-ffffffff81206d78: mark_reg_read (STB_LOCAL)
5.11
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81206aa0)
Location: kernel/bpf/verifier.c:1557
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff81206aa0-ffffffff81206b48: mark_reg_read (STB_LOCAL)
5.13
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81206ab0)
Location: kernel/bpf/verifier.c:1828
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff81206ab0-ffffffff81206b5d: mark_reg_read (STB_LOCAL)
5.15
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81239d60)
Location: kernel/bpf/verifier.c:1896
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff81239d60-ffffffff81239e4c: mark_reg_read (STB_LOCAL)
5.19
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8127de60)
Location: kernel/bpf/verifier.c:2239
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff8127de60-ffffffff8127df51: mark_reg_read (STB_LOCAL)
6.2
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff812d6560)
Location: kernel/bpf/verifier.c:2454
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff812d6560-ffffffff812d6651: mark_reg_read (STB_LOCAL)
6.5
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff812f71d0)
Location: kernel/bpf/verifier.c:2885
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:process_iter_arg
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff812f71d0-ffffffff812f72c1: mark_reg_read (STB_LOCAL)
6.8
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff813166f0)
Location: kernel/bpf/verifier.c:2983
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:prepare_func_exit
- kernel/bpf/verifier.c:process_iter_arg
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:__check_reg_arg
Symbols:
ffffffff813166f0-ffffffff813167e1: mark_reg_read (STB_LOCAL)
arm64
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffff80001026a008)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffff80001026a008-ffff80001026a104: mark_reg_read (STB_LOCAL)
armhf
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c049c040)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
c049c040-c049c128: mark_reg_read (STB_LOCAL)
ppc64el
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c00000000030fbd0)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
c00000000030fbd0-c00000000030fce0: mark_reg_read (STB_LOCAL)
riscv64
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffe0001a48be)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffe0001a48be-ffffffe0001a4990: mark_reg_read (STB_LOCAL)
aws
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811dee60)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811dee60-ffffffff811def07: mark_reg_read (STB_LOCAL)
azure
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811d1c20)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811d1c20-ffffffff811d1cc7: mark_reg_read (STB_LOCAL)
gcp
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811dcc30)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811dcc30-ffffffff811dccd7: mark_reg_read (STB_LOCAL)
lowlatency
: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811eb040)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811eb040-ffffffff811eb0e7: mark_reg_read (STB_LOCAL)
Regular
4.18
and 5.0
⚠️u32 regno
const struct bpf_verifier_state *state
➡️ const struct bpf_reg_state *state
struct bpf_verifier_state *parent
➡️ struct bpf_reg_state *parent
5.0
and 5.3
⚠️u8 flag
5.3
and 5.4
✅
5.4
and 5.8
✅
5.8
and 5.11
✅
5.11
and 5.13
✅
5.13
and 5.15
✅
5.15
and 5.19
✅
5.19
and 6.2
✅
6.2
and 6.5
✅
6.5
and 6.8
✅
amd64
and arm64
✅
amd64
and armhf
✅
amd64
and ppc64el
✅
amd64
and riscv64
✅
generic
and aws
✅
generic
and azure
✅
generic
and gcp
✅
generic
and lowlatency
✅