check_stack_accessRegular
4.4: Absent ⚠️
4.8: Absent ⚠️
4.10: Absent ⚠️
4.13: Absent ⚠️
4.15: Absent ⚠️
4.18: Absent ⚠️
5.0: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811c7e40)
Location: kernel/bpf/verifier.c:1393
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811c7e40-ffffffff811c7ee6: check_stack_access (STB_LOCAL)
5.3: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811db5b0)
Location: kernel/bpf/verifier.c:2103
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811db5b0-ffffffff811db660: check_stack_access (STB_LOCAL)
5.4: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e7d00)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811e7d00-ffffffff811e7db0: check_stack_access (STB_LOCAL)
5.8: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8120d7d0)
Location: kernel/bpf/verifier.c:2433
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff8120d7d0-ffffffff8120d880: check_stack_access (STB_LOCAL)
5.11: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8120dfa0)
Location: kernel/bpf/verifier.c:2506
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff8120dfa0-ffffffff8120e050: check_stack_access (STB_LOCAL)
5.13: Absent ⚠️
5.15: Absent ⚠️
5.19: Absent ⚠️
6.2: Absent ⚠️
6.5: Absent ⚠️
6.8: Absent ⚠️
arm64: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffff80001026b7a0)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffff80001026b7a0-ffff80001026b874: check_stack_access (STB_LOCAL)
armhf: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (c049d81c)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
c049d81c-c049d8e4: check_stack_access (STB_LOCAL)
ppc64el: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (c000000000311810)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
c000000000311810-c000000000311918: check_stack_access (STB_LOCAL)
riscv64: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffe0001a5cee)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffe0001a5cee-ffffffe0001a5d7c: check_stack_access (STB_LOCAL)
aws: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e0320)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811e0320-ffffffff811e03d0: check_stack_access (STB_LOCAL)
azure: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811d30e0)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811d30e0-ffffffff811d3190: check_stack_access (STB_LOCAL)
gcp: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811de0f0)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811de0f0-ffffffff811de1a0: check_stack_access (STB_LOCAL)
lowlatency: Selective Inline ⚠️int check_stack_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811ec500)
Location: kernel/bpf/verifier.c:2104
Inline: True
Direct callers:
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff811ec500-ffffffff811ec5b0: check_stack_access (STB_LOCAL)
Regular
5.0 and 5.3 ✅
5.3 and 5.4 ✅
5.4 and 5.8 ✅
5.8 and 5.11 ✅
amd64 and arm64 ✅
amd64 and armhf ✅
amd64 and ppc64el ✅
amd64 and riscv64 ✅
generic and aws ✅
generic and azure ✅
generic and gcp ✅
generic and lowlatency ✅