__check_stack_boundaryRegular
4.4: Absent ⚠️
4.8: Absent ⚠️
4.10: Absent ⚠️
4.13: Absent ⚠️
4.15: Absent ⚠️
4.18: Absent ⚠️
5.0: Absent ⚠️
5.3: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811dd080)
Location: kernel/bpf/verifier.c:2933
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffff811dd080-ffffffff811dd168: __check_stack_boundary (STB_LOCAL)
5.4: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e9820)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffff811e9820-ffffffff811e9908: __check_stack_boundary (STB_LOCAL)
5.8: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81209060)
Location: kernel/bpf/verifier.c:3425
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_boundary
Symbols:
ffffffff81209060-ffffffff8120914a: __check_stack_boundary (STB_LOCAL)
5.11: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8120a530)
Location: kernel/bpf/verifier.c:3655
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_boundary
Symbols:
ffffffff8120a530-ffffffff8120a61a: __check_stack_boundary (STB_LOCAL)
5.13: Absent ⚠️
5.15: Absent ⚠️
5.19: Absent ⚠️
6.2: Absent ⚠️
6.5: Absent ⚠️
6.8: Absent ⚠️
arm64: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffff80001026d008)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffff80001026d008-ffff80001026d118: __check_stack_boundary (STB_LOCAL)
armhf: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c049f59c)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
c049f59c-c049f6b8: __check_stack_boundary (STB_LOCAL)
ppc64el: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c000000000313770)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
c000000000313770-c0000000003138c4: __check_stack_boundary (STB_LOCAL)
riscv64: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffe0001a71ac)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffe0001a71ac-ffffffe0001a726e: __check_stack_boundary (STB_LOCAL)
aws: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e1e40)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffff811e1e40-ffffffff811e1f28: __check_stack_boundary (STB_LOCAL)
azure: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811d4c00)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffff811d4c00-ffffffff811d4ce8: __check_stack_boundary (STB_LOCAL)
gcp: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811dfc10)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffff811dfc10-ffffffff811dfcf8: __check_stack_boundary (STB_LOCAL)
lowlatency: ✅int __check_stack_boundary(struct bpf_verifier_env *env, u32 regno, int off, int access_size, bool zero_size_allowed);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811ee020)
Location: kernel/bpf/verifier.c:2934
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
Symbols:
ffffffff811ee020-ffffffff811ee108: __check_stack_boundary (STB_LOCAL)
Regular
5.3 and 5.4 ✅
5.4 and 5.8 ✅
5.8 and 5.11 ✅
amd64 and arm64 ✅
amd64 and armhf ✅
amd64 and ppc64el ✅
amd64 and riscv64 ✅
generic and aws ✅
generic and azure ✅
generic and gcp ✅
generic and lowlatency ✅