check_mem_accessRegular
4.4: ✅int check_mem_access(struct verifier_env *env, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81173fd0)
Location: kernel/bpf/verifier.c:681
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
Symbols:
ffffffff81173fd0-ffffffff811744d0: check_mem_access (STB_LOCAL)
4.8: ✅int check_mem_access(struct verifier_env *env, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81182350)
Location: kernel/bpf/verifier.c:758
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
Symbols:
ffffffff81182350-ffffffff81182ad3: check_mem_access (STB_LOCAL)
4.10: ✅int check_mem_access(struct bpf_verifier_env *env, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8118ebf0)
Location: kernel/bpf/verifier.c:751
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
Symbols:
ffffffff8118ebf0-ffffffff8118f4fa: check_mem_access (STB_LOCAL)
4.13: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81194e50)
Location: kernel/bpf/verifier.c:878
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
Symbols:
ffffffff81194e50-ffffffff811956a0: check_mem_access (STB_LOCAL)
4.15: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811a5800)
Location: kernel/bpf/verifier.c:1118
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
Symbols:
ffffffff811a5800-ffffffff811a61a5: check_mem_access (STB_LOCAL)
4.18: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811b9a40)
Location: kernel/bpf/verifier.c:1673
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
Symbols:
ffffffff811b9a40-ffffffff811ba6c2: check_mem_access (STB_LOCAL)
5.0: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811c93f0)
Location: kernel/bpf/verifier.c:1932
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
Symbols:
ffffffff811c93f0-ffffffff811ca212: check_mem_access (STB_LOCAL)
5.3: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e0ba0)
Location: kernel/bpf/verifier.c:2748
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
Symbols:
ffffffff811e0ba0-ffffffff811e1b5a: check_mem_access (STB_LOCAL)
5.4: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811ed3a0)
Location: kernel/bpf/verifier.c:2749
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
Symbols:
ffffffff811ed3a0-ffffffff811ee35a: check_mem_access (STB_LOCAL)
5.8: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81210260)
Location: kernel/bpf/verifier.c:3203
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_xadd
- kernel/bpf/verifier.c:check_xadd
Symbols:
ffffffff81210260-ffffffff81210d65: check_mem_access (STB_LOCAL)
5.11: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81210f10)
Location: kernel/bpf/verifier.c:3410
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_xadd
- kernel/bpf/verifier.c:check_xadd
Symbols:
ffffffff81210f10-ffffffff81211a88: check_mem_access (STB_LOCAL)
5.13: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81212b60)
Location: kernel/bpf/verifier.c:4038
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_atomic
Symbols:
ffffffff81212b60-ffffffff8121394e: check_mem_access (STB_LOCAL)
5.15: Transformation ⚠️int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:4139
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_atomic
Symbols:
ffffffff81248460-ffffffff8124972d: check_mem_access (STB_LOCAL)
ffffffff81cb8c24-ffffffff81cb8d79: check_mem_access.cold (STB_LOCAL)
5.19: Transformation ⚠️int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:4688
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_atomic
Symbols:
ffffffff8128e610-ffffffff8128faea: check_mem_access (STB_LOCAL)
ffffffff81e69f35-ffffffff81e6a06f: check_mem_access.cold (STB_LOCAL)
6.2: Transformation ⚠️int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:5194
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_atomic
Symbols:
ffffffff812e6e20-ffffffff812e82f5: check_mem_access (STB_LOCAL)
ffffffff82060d7f-ffffffff82060eb9: check_mem_access.cold (STB_LOCAL)
6.5: Transformation ⚠️int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:6274
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:process_iter_arg
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_atomic
Symbols:
ffffffff81312180-ffffffff813136a9: check_mem_access (STB_LOCAL)
ffffffff820e0192-ffffffff820e02da: check_mem_access.cold (STB_LOCAL)
6.8: Transformation ⚠️int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once, bool is_ldsx);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:6648
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:process_iter_arg
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_atomic
Symbols:
ffffffff81332090-ffffffff8133353e: check_mem_access (STB_LOCAL)
ffffffff821bc4a0-ffffffff821bc5e8: check_mem_access.cold (STB_LOCAL)
arm64: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffff800010271248)
Location: kernel/bpf/verifier.c:2749
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
Symbols:
ffff800010271248-ffff800010271d30: check_mem_access (STB_LOCAL)
armhf: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c04a3514)
Location: kernel/bpf/verifier.c:2749
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
Symbols:
c04a3514-c04a4090: check_mem_access (STB_LOCAL)
ppc64el: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c0000000003185f0)
Location: kernel/bpf/verifier.c:2749
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
Symbols:
c0000000003185f0-c00000000031922c: check_mem_access (STB_LOCAL)
riscv64: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffe0001aa68a)
Location: kernel/bpf/verifier.c:2749
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
Symbols:
ffffffe0001aa68a-ffffffe0001aaf4c: check_mem_access (STB_LOCAL)
aws: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e59c0)
Location: kernel/bpf/verifier.c:2749
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
Symbols:
ffffffff811e59c0-ffffffff811e697a: check_mem_access (STB_LOCAL)
azure: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811d8780)
Location: kernel/bpf/verifier.c:2749
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
Symbols:
ffffffff811d8780-ffffffff811d973a: check_mem_access (STB_LOCAL)
gcp: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e3790)
Location: kernel/bpf/verifier.c:2749
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
Symbols:
ffffffff811e3790-ffffffff811e474a: check_mem_access (STB_LOCAL)
lowlatency: ✅int check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811f1b60)
Location: kernel/bpf/verifier.c:2749
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_call
Symbols:
ffffffff811f1b60-ffffffff811f2b1a: check_mem_access (STB_LOCAL)
Regular
4.4 and 4.8 ✅
4.8 and 4.10 ⚠️struct verifier_env *env ➡️ struct bpf_verifier_env *env
4.10 and 4.13 ⚠️int insn_idx
env, regno, off, bpf_size, t, value_regno ➡️ env, insn_idx, regno, off, bpf_size, t, value_regno
4.13 and 4.15 ⚠️bool strict_alignment_once
4.15 and 4.18 ✅
4.18 and 5.0 ✅
5.0 and 5.3 ✅
5.3 and 5.4 ✅
5.4 and 5.8 ✅
5.8 and 5.11 ✅
5.11 and 5.13 ✅
5.13 and 5.15 ✅
5.15 and 5.19 ✅
5.19 and 6.2 ✅
6.2 and 6.5 ✅
6.5 and 6.8 ⚠️bool is_ldsx
amd64 and arm64 ✅
amd64 and armhf ✅
amd64 and ppc64el ✅
amd64 and riscv64 ✅
generic and aws ✅
generic and azure ✅
generic and gcp ✅
generic and lowlatency ✅