bpf_sock_is_valid_accessRegular
4.4: Absent ⚠️
4.8: Absent ⚠️
4.10: Absent ⚠️
4.13: Absent ⚠️
4.15: Absent ⚠️
4.18: Absent ⚠️
5.0: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff818d8ab5)
Location: net/core/filter.c:5941
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff818df260-ffffffff818df2a8: bpf_sock_is_valid_access (STB_GLOBAL)
5.3: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff8192d6e0)
Location: net/core/filter.c:6607
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff8192d6e0-ffffffff8192d748: bpf_sock_is_valid_access (STB_GLOBAL)
5.4: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff8195f9e0)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff8195f9e0-ffffffff8195fa48: bpf_sock_is_valid_access (STB_GLOBAL)
5.8: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81a32f75)
Location: net/core/filter.c:6907
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_sock_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81a2b7d0-ffffffff81a2b82e: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81a32fb0-ffffffff81a3302c: bpf_sock_is_valid_access (STB_GLOBAL)
5.11: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81a35335)
Location: net/core/filter.c:7713
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_sock_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81a2c620-ffffffff81a2c67e: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81a35370-ffffffff81a353ec: bpf_sock_is_valid_access (STB_GLOBAL)
5.13: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81a1c495)
Location: net/core/filter.c:7835
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81a13bd0-ffffffff81a13c28: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81a1c4d0-ffffffff81a1c542: bpf_sock_is_valid_access (STB_GLOBAL)
5.15: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81acfc55)
Location: net/core/filter.c:7965
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81ac5380-ffffffff81ac53d8: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81acfc90-ffffffff81acfd02: bpf_sock_is_valid_access (STB_GLOBAL)
5.19: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81c4d395)
Location: net/core/filter.c:8360
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81c408f0-ffffffff81c409ac: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81c4d3f0-ffffffff81c4d499: bpf_sock_is_valid_access (STB_GLOBAL)
6.2: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81e02245)
Location: net/core/filter.c:8499
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81df5fd0-ffffffff81df608c: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81e022b0-ffffffff81e02359: bpf_sock_is_valid_access (STB_GLOBAL)
6.5: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81e745d5)
Location: net/core/filter.c:8651
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81e67bb0-ffffffff81e67c5e: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81e74640-ffffffff81e74702: bpf_sock_is_valid_access (STB_GLOBAL)
6.8: Selective Inline, Transformation ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: True
Instances:
In net/core/filter.c (ffffffff81f33d95)
Location: net/core/filter.c:8742
Inline: True
Inline callers:
- net/core/filter.c:bpf_sock_common_is_valid_access
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff81f26d80-ffffffff81f26e2e: bpf_sock_is_valid_access.part.0 (STB_LOCAL)
ffffffff81f33e00-ffffffff81f33ec2: bpf_sock_is_valid_access (STB_GLOBAL)
arm64: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffff800010c02d68)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffff800010c02d68-ffff800010c02e2c: bpf_sock_is_valid_access (STB_GLOBAL)
armhf: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (c0d1c340)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
c0d1c340-c0d1c490: bpf_sock_is_valid_access (STB_GLOBAL)
ppc64el: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (c000000000cec440)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
c000000000cec440-c000000000cec5b8: bpf_sock_is_valid_access (STB_GLOBAL)
riscv64: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffe0007821da)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffe0007821da-ffffffe00078228c: bpf_sock_is_valid_access (STB_GLOBAL)
aws: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff818ff9b0)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff818ff9b0-ffffffff818ffa18: bpf_sock_is_valid_access (STB_GLOBAL)
azure: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff818b97e0)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff818b97e0-ffffffff818b9848: bpf_sock_is_valid_access (STB_GLOBAL)
gcp: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff819509e0)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff819509e0-ffffffff81950a48: bpf_sock_is_valid_access (STB_GLOBAL)
lowlatency: Selective Inline ⚠️bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Global
Inline: Selective
Transformation: False
Instances:
In net/core/filter.c (ffffffff819723b0)
Location: net/core/filter.c:6694
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- net/core/filter.c:bpf_sock_common_is_valid_access
Symbols:
ffffffff819723b0-ffffffff81972418: bpf_sock_is_valid_access (STB_GLOBAL)
Regular
5.0 and 5.3 ✅
5.3 and 5.4 ✅
5.4 and 5.8 ✅
5.8 and 5.11 ✅
5.11 and 5.13 ✅
5.13 and 5.15 ✅
5.15 and 5.19 ✅
5.19 and 6.2 ✅
6.2 and 6.5 ✅
6.5 and 6.8 ✅
amd64 and arm64 ✅
amd64 and armhf ✅
amd64 and ppc64el ✅
amd64 and riscv64 ✅
generic and aws ✅
generic and azure ✅
generic and gcp ✅
generic and lowlatency ✅