bpf_prog_load_check_attachRegular
4.4: Absent ⚠️
4.8: Absent ⚠️
4.10: Absent ⚠️
4.13: Absent ⚠️
4.15: Absent ⚠️
4.18: Absent ⚠️
5.0: Absent ⚠️
5.3: Absent ⚠️
5.4: Absent ⚠️
5.8: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff81200090)
Location: kernel/bpf/syscall.c:1957
Inline: True
Inline callers:
- kernel/bpf/syscall.c:bpf_prog_load
5.11: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff811ffa06)
Location: kernel/bpf/syscall.c:1931
Inline: True
Inline callers:
- kernel/bpf/syscall.c:bpf_prog_load
5.13: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff812003b1)
Location: kernel/bpf/syscall.c:1939
Inline: True
Inline callers:
- kernel/bpf/syscall.c:bpf_prog_load
5.15: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff81231c07)
Location: kernel/bpf/syscall.c:2038
Inline: True
Inline callers:
- kernel/bpf/syscall.c:bpf_prog_load
5.19: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff812753a8)
Location: kernel/bpf/syscall.c:2284
Inline: True
Inline callers:
- kernel/bpf/syscall.c:bpf_prog_load
6.2: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff812ca2ba)
Location: kernel/bpf/syscall.c:2318
Inline: True
Inline callers:
- kernel/bpf/syscall.c:bpf_prog_load
6.5: ✅int bpf_prog_load_check_attach(enum bpf_prog_type prog_type, enum bpf_attach_type expected_attach_type, struct btf *attach_btf, u32 btf_id, struct bpf_prog *dst_prog);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff812eb730)
Location: kernel/bpf/syscall.c:2397
Inline: False
Direct callers:
- kernel/bpf/syscall.c:bpf_prog_load
Symbols:
ffffffff812eb730-ffffffff812eb8d5: bpf_prog_load_check_attach (STB_LOCAL)
6.8: ✅int bpf_prog_load_check_attach(enum bpf_prog_type prog_type, enum bpf_attach_type expected_attach_type, struct btf *attach_btf, u32 btf_id, struct bpf_prog *dst_prog);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/syscall.c (ffffffff81309c80)
Location: kernel/bpf/syscall.c:2437
Inline: False
Direct callers:
- kernel/bpf/syscall.c:bpf_prog_load
Symbols:
ffffffff81309c80-ffffffff81309e25: bpf_prog_load_check_attach (STB_LOCAL)
arm64: Absent ⚠️
armhf: Absent ⚠️
ppc64el: Absent ⚠️
riscv64: Absent ⚠️
aws: Absent ⚠️
azure: Absent ⚠️
gcp: Absent ⚠️
lowlatency: Absent ⚠️
Regular
6.5 and 6.8 ✅