check_stack_range_initializedRegular
4.4: Absent ⚠️
4.8: Absent ⚠️
4.10: Absent ⚠️
4.13: Absent ⚠️
4.15: Absent ⚠️
4.18: Absent ⚠️
5.0: Absent ⚠️
5.3: Absent ⚠️
5.4: Absent ⚠️
5.8: Absent ⚠️
5.11: Absent ⚠️
5.13: ✅int check_stack_range_initialized(struct bpf_verifier_env *env, int regno, int off, int access_size, bool zero_size_allowed, enum stack_access_src type, struct bpf_call_arg_meta *meta);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81206dd0)
Location: kernel/bpf/verifier.c:4349
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_stack_read
Symbols:
ffffffff81206dd0-ffffffff81207184: check_stack_range_initialized (STB_LOCAL)
5.15: Transformation ⚠️int check_stack_range_initialized(struct bpf_verifier_env *env, int regno, int off, int access_size, bool zero_size_allowed, enum stack_access_src type, struct bpf_call_arg_meta *meta);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:4463
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_stack_read
Symbols:
ffffffff8123a170-ffffffff8123a646: check_stack_range_initialized (STB_LOCAL)
ffffffff81cb7dd6-ffffffff81cb7ea3: check_stack_range_initialized.cold (STB_LOCAL)
5.19: Transformation ⚠️int check_stack_range_initialized(struct bpf_verifier_env *env, int regno, int off, int access_size, bool zero_size_allowed, enum bpf_access_src type, struct bpf_call_arg_meta *meta);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:5041
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_stack_read
Symbols:
ffffffff8127e2f0-ffffffff8127e7e5: check_stack_range_initialized (STB_LOCAL)
ffffffff81e68f03-ffffffff81e68fd4: check_stack_range_initialized.cold (STB_LOCAL)
6.2: Transformation ⚠️int check_stack_range_initialized(struct bpf_verifier_env *env, int regno, int off, int access_size, bool zero_size_allowed, enum bpf_access_src type, struct bpf_call_arg_meta *meta);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:5546
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_stack_read
Symbols:
ffffffff812d6a10-ffffffff812d6fb8: check_stack_range_initialized (STB_LOCAL)
ffffffff8205ff3b-ffffffff82060049: check_stack_range_initialized.cold (STB_LOCAL)
6.5: Transformation ⚠️int check_stack_range_initialized(struct bpf_verifier_env *env, int regno, int off, int access_size, bool zero_size_allowed, enum bpf_access_src type, struct bpf_call_arg_meta *meta);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:6626
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff812f8fe0-ffffffff812f96a2: check_stack_range_initialized (STB_LOCAL)
ffffffff820deaa8-ffffffff820debfb: check_stack_range_initialized.cold (STB_LOCAL)
6.8: Transformation ⚠️int check_stack_range_initialized(struct bpf_verifier_env *env, int regno, int off, int access_size, bool zero_size_allowed, enum bpf_access_src type, struct bpf_call_arg_meta *meta);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:6997
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
Symbols:
ffffffff81318c70-ffffffff8131927d: check_stack_range_initialized (STB_LOCAL)
ffffffff821bab91-ffffffff821baccb: check_stack_range_initialized.cold (STB_LOCAL)
arm64: Absent ⚠️
armhf: Absent ⚠️
ppc64el: Absent ⚠️
riscv64: Absent ⚠️
aws: Absent ⚠️
azure: Absent ⚠️
gcp: Absent ⚠️
lowlatency: Absent ⚠️
Regular
5.13 and 5.15 ✅
5.15 and 5.19 ⚠️enum stack_access_src type ➡️ enum bpf_access_src type
5.19 and 6.2 ✅
6.2 and 6.5 ✅
6.5 and 6.8 ✅