__check_map_accessRegular
4.4: Absent ⚠️
4.8: Absent ⚠️
4.10: Absent ⚠️
4.13: Absent ⚠️
4.15: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811a1680)
Location: kernel/bpf/verifier.c:801
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811a1680-ffffffff811a16d0: __check_map_access (STB_LOCAL)
4.18: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811b9720)
Location: kernel/bpf/verifier.c:1237
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811b9720-ffffffff811b977a: __check_map_access (STB_LOCAL)
5.0: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811c7c50)
Location: kernel/bpf/verifier.c:1419
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811c7c50-ffffffff811c7cae: __check_map_access (STB_LOCAL)
5.3: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811db370)
Location: kernel/bpf/verifier.c:2151
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811db370-ffffffff811db3d1: __check_map_access (STB_LOCAL)
5.4: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e7ac0)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811e7ac0-ffffffff811e7b21: __check_map_access (STB_LOCAL)
5.8: Absent ⚠️
5.11: Absent ⚠️
5.13: Absent ⚠️
5.15: Absent ⚠️
5.19: Absent ⚠️
6.2: Absent ⚠️
6.5: Absent ⚠️
6.8: Absent ⚠️
arm64: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffff80001026b4e8)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffff80001026b4e8-ffff80001026b598: __check_map_access (STB_LOCAL)
armhf: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c049d560)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
c049d560-c049d5f4: __check_map_access (STB_LOCAL)
ppc64el: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c000000000311500)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
c000000000311500-c0000000003115a0: __check_map_access (STB_LOCAL)
riscv64: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffe0001a5ace)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffe0001a5ace-ffffffe0001a5b5a: __check_map_access (STB_LOCAL)
aws: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e00e0)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811e00e0-ffffffff811e0141: __check_map_access (STB_LOCAL)
azure: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811d2ea0)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811d2ea0-ffffffff811d2f01: __check_map_access (STB_LOCAL)
gcp: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811ddeb0)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811ddeb0-ffffffff811ddf11: __check_map_access (STB_LOCAL)
lowlatency: ✅int __check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811ec2c0)
Location: kernel/bpf/verifier.c:2152
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_map_access
- kernel/bpf/verifier.c:check_map_access
Symbols:
ffffffff811ec2c0-ffffffff811ec321: __check_map_access (STB_LOCAL)
Regular
4.15 and 4.18 ✅
4.18 and 5.0 ✅
5.0 and 5.3 ✅
5.3 and 5.4 ✅
amd64 and arm64 ✅
amd64 and armhf ✅
amd64 and ppc64el ✅
amd64 and riscv64 ✅
generic and aws ✅
generic and azure ✅
generic and gcp ✅
generic and lowlatency ✅