reg_type_str
Regular
4.4
: Absent ⚠️
4.8
: Absent ⚠️
4.10
: Absent ⚠️
4.13
: Absent ⚠️
4.15
: Absent ⚠️
4.18
: Absent ⚠️
5.0
: Absent ⚠️
5.3
: Absent ⚠️
5.4
: Absent ⚠️
5.8
: Absent ⚠️
5.11
: Absent ⚠️
5.13
: Absent ⚠️
5.15
: Absent ⚠️
5.19
: Selective Inline ⚠️const char *reg_type_str(struct bpf_verifier_env *env, enum bpf_reg_type type);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8129361f)
Location: kernel/bpf/verifier.c:533
Inline: True
Inline callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
Direct callers:
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:mark_reg_read
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff81278a20-ffffffff81278c4c: reg_type_str (STB_LOCAL)
6.2
: ✅const char *reg_type_str(struct bpf_verifier_env *env, enum bpf_reg_type type);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff812cf030)
Location: kernel/bpf/verifier.c:570
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_kfunc_args
- kernel/bpf/verifier.c:check_kfunc_args
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:mark_reg_read
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff812cf030-ffffffff812cf1da: reg_type_str (STB_LOCAL)
6.5
: ✅const char *reg_type_str(struct bpf_verifier_env *env, enum bpf_reg_type type);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff812f7010)
Location: kernel/bpf/verifier.c:594
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_kfunc_args
- kernel/bpf/verifier.c:check_kfunc_args
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:mark_reg_read
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff812f7010-ffffffff812f71b6: reg_type_str (STB_LOCAL)
6.8
: ✅const char *reg_type_str(struct bpf_verifier_env *env, enum bpf_reg_type type);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/log.c (ffffffff81345990)
Location: kernel/bpf/log.c:398
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_kfunc_args
- kernel/bpf/verifier.c:check_kfunc_args
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:mark_reg_read
- kernel/bpf/log.c:print_reg_state
- kernel/bpf/log.c:print_reg_state
Symbols:
ffffffff81345990-ffffffff81345b36: reg_type_str (STB_GLOBAL)
arm64
: Absent ⚠️
armhf
: Absent ⚠️
ppc64el
: Absent ⚠️
riscv64
: Absent ⚠️
aws
: Absent ⚠️
azure
: Absent ⚠️
gcp
: Absent ⚠️
lowlatency
: Absent ⚠️
Regular
5.19
and 6.2
✅
6.2
and 6.5
✅
6.5
and 6.8
✅