push_stack
Regular
4.4
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811756f1)
Location: kernel/bpf/verifier.c:441
Inline: True
Inline callers:
- kernel/bpf/verifier.c:do_check
4.8
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811839ca)
Location: kernel/bpf/verifier.c:447
Inline: True
Inline callers:
- kernel/bpf/verifier.c:do_check
4.10
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811909d9)
Location: kernel/bpf/verifier.c:416
Inline: True
Inline callers:
- kernel/bpf/verifier.c:do_check
4.13
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8119713d)
Location: kernel/bpf/verifier.c:435
Inline: True
Inline callers:
- kernel/bpf/verifier.c:do_check
4.15
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811a4de1)
Location: kernel/bpf/verifier.c:394
Inline: True
Inline callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
4.18
: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811bb826)
Location: kernel/bpf/verifier.c:512
Inline: True
Inline callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
5.0
: Selective Inline ⚠️struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811c7870)
Location: kernel/bpf/verifier.c:757
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811c7870-ffffffff811c793d: push_stack (STB_LOCAL)
5.3
: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811daf50)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811daf50-ffffffff811db030: push_stack (STB_LOCAL)
5.4
: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e76a0)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811e76a0-ffffffff811e7780: push_stack (STB_LOCAL)
5.8
: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81207360)
Location: kernel/bpf/verifier.c:932
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
Symbols:
ffffffff81207360-ffffffff8120748d: push_stack (STB_LOCAL)
5.11
: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81207c20)
Location: kernel/bpf/verifier.c:958
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
Symbols:
ffffffff81207c20-ffffffff81207d4d: push_stack (STB_LOCAL)
5.13
: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81209380)
Location: kernel/bpf/verifier.c:1007
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_speculative_path
Symbols:
ffffffff81209380-ffffffff812094a7: push_stack (STB_LOCAL)
5.15
: Transformation ⚠️struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:1016
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_speculative_path
Symbols:
ffffffff8123d030-ffffffff8123d138: push_stack (STB_LOCAL)
ffffffff81cb81c8-ffffffff81cb81dd: push_stack.cold (STB_LOCAL)
5.19
: Transformation ⚠️struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:1243
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_speculative_path
Symbols:
ffffffff812823b0-ffffffff812824c4: push_stack (STB_LOCAL)
ffffffff81e693e7-ffffffff81e693fc: push_stack.cold (STB_LOCAL)
6.2
: Transformation ⚠️struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:1447
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_speculative_path
Symbols:
ffffffff812d9eb0-ffffffff812d9fca: push_stack (STB_LOCAL)
ffffffff820601e7-ffffffff820601fc: push_stack.cold (STB_LOCAL)
6.5
: Transformation ⚠️struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:1824
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_speculative_path
- kernel/bpf/verifier.c:check_kfunc_call
Symbols:
ffffffff813029c0-ffffffff81302b15: push_stack (STB_LOCAL)
ffffffff820df224-ffffffff820df239: push_stack.cold (STB_LOCAL)
6.8
: Transformation ⚠️struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:1674
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_speculative_path
- kernel/bpf/verifier.c:push_callback_call
Symbols:
ffffffff81320a30-ffffffff81320bb4: push_stack (STB_LOCAL)
ffffffff821bb1c5-ffffffff821bb1da: push_stack.cold (STB_LOCAL)
arm64
: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffff80001026b048)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
Symbols:
ffff80001026b048-ffff80001026b158: push_stack (STB_LOCAL)
armhf
: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c049d15c)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
c049d15c-c049d254: push_stack (STB_LOCAL)
ppc64el
: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c000000000310f70)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
Symbols:
c000000000310f70-c0000000003110e8: push_stack (STB_LOCAL)
riscv64
: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffe0001a571a)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
Symbols:
ffffffe0001a571a-ffffffe0001a57f0: push_stack (STB_LOCAL)
aws
: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811dfcc0)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811dfcc0-ffffffff811dfda0: push_stack (STB_LOCAL)
azure
: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811d2a80)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811d2a80-ffffffff811d2b60: push_stack (STB_LOCAL)
gcp
: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811dda90)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811dda90-ffffffff811ddb70: push_stack (STB_LOCAL)
lowlatency
: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811ebea0)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811ebea0-ffffffff811ebf80: push_stack (STB_LOCAL)
Regular
5.0
and 5.3
✅
5.3
and 5.4
✅
5.4
and 5.8
✅
5.8
and 5.11
✅
5.11
and 5.13
✅
5.13
and 5.15
✅
5.15
and 5.19
✅
5.19
and 6.2
✅
6.2
and 6.5
✅
6.5
and 6.8
✅
amd64
and arm64
✅
amd64
and armhf
✅
amd64
and ppc64el
✅
amd64
and riscv64
✅
generic
and aws
✅
generic
and azure
✅
generic
and gcp
✅
generic
and lowlatency
✅