check_zeroed_userRegular
4.4: Absent ⚠️
4.8: Absent ⚠️
4.10: Absent ⚠️
4.13: Absent ⚠️
4.15: Absent ⚠️
4.18: Absent ⚠️
5.0: Absent ⚠️
5.3: Absent ⚠️
5.4: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffff8152c1a0)
Location: lib/usercopy.c:50
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:sched_copy_attr
- kernel/seccomp.c:seccomp_notify_ioctl
- kernel/events/core.c:perf_copy_attr
Symbols:
ffffffff8152c1a0-ffffffff8152c261: check_zeroed_user (STB_GLOBAL)
5.8: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffff8158fa70)
Location: lib/usercopy.c:51
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:sched_copy_attr
- kernel/seccomp.c:seccomp_notify_recv
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:bpf_obj_get_info_by_fd
- kernel/events/core.c:perf_copy_attr
- fs/open.c:__ia32_sys_openat2
- fs/open.c:__x64_sys_openat2
Symbols:
ffffffff8158fa70-ffffffff8158fb31: check_zeroed_user (STB_GLOBAL)
5.11: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffff815ac5a0)
Location: lib/usercopy.c:54
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:sched_copy_attr
- kernel/seccomp.c:seccomp_notify_addfd
- kernel/seccomp.c:seccomp_notify_recv
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:bpf_obj_get_info_by_fd
- kernel/events/core.c:perf_copy_attr
- fs/open.c:__ia32_sys_openat2
- fs/open.c:__x64_sys_openat2
- fs/io_uring.c:io_req_prep
Symbols:
ffffffff815ac5a0-ffffffff815ac67a: check_zeroed_user (STB_GLOBAL)
5.13: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffff815b7270)
Location: lib/usercopy.c:54
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:sched_copy_attr
- kernel/seccomp.c:seccomp_notify_addfd
- kernel/seccomp.c:seccomp_notify_recv
- kernel/bpf/syscall.c:__do_sys_bpf
- kernel/bpf/syscall.c:bpf_obj_get_info_by_fd
- kernel/bpf/syscall.c:bpf_obj_get_info_by_fd
- kernel/bpf/syscall.c:bpf_obj_get_info_by_fd
- kernel/events/core.c:perf_copy_attr
- fs/open.c:__ia32_sys_openat2
- fs/open.c:__x64_sys_openat2
- fs/namespace.c:__do_sys_mount_setattr
- fs/io_uring.c:io_req_prep
- security/landlock/syscalls.c:__ia32_sys_landlock_create_ruleset
- security/landlock/syscalls.c:__x64_sys_landlock_create_ruleset
Symbols:
ffffffff815b7270-ffffffff815b732e: check_zeroed_user (STB_GLOBAL)
5.15: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffff8161d8a0)
Location: lib/usercopy.c:54
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:sched_copy_attr
- kernel/seccomp.c:seccomp_notify_addfd
- kernel/seccomp.c:seccomp_notify_recv
- kernel/bpf/syscall.c:bpf_check_uarg_tail_zero
- kernel/events/core.c:perf_copy_attr
- fs/open.c:__ia32_sys_openat2
- fs/open.c:__x64_sys_openat2
- fs/namespace.c:__do_sys_mount_setattr
- fs/io_uring.c:io_req_prep
- security/landlock/syscalls.c:__ia32_sys_landlock_create_ruleset
- security/landlock/syscalls.c:__x64_sys_landlock_create_ruleset
Symbols:
ffffffff8161d8a0-ffffffff8161d960: check_zeroed_user (STB_GLOBAL)
5.19: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffff816eb400)
Location: lib/usercopy.c:54
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:sched_copy_attr
- kernel/seccomp.c:seccomp_notify_addfd
- kernel/seccomp.c:seccomp_notify_recv
- kernel/bpf/syscall.c:bpf_check_uarg_tail_zero
- kernel/events/core.c:perf_copy_attr
- fs/open.c:__do_sys_openat2
- fs/namespace.c:__do_sys_mount_setattr
- security/landlock/syscalls.c:__ia32_sys_landlock_create_ruleset
- security/landlock/syscalls.c:__x64_sys_landlock_create_ruleset
- io_uring/io_uring.c:io_openat2_prep
Symbols:
ffffffff816eb400-ffffffff816eb4e6: check_zeroed_user (STB_GLOBAL)
6.2: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffff817dbad0)
Location: lib/usercopy.c:62
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:sched_copy_attr
- kernel/seccomp.c:seccomp_notify_addfd
- kernel/seccomp.c:seccomp_notify_recv
- kernel/bpf/syscall.c:bpf_check_uarg_tail_zero
- kernel/events/core.c:perf_copy_attr
- fs/open.c:__do_sys_openat2
- fs/namespace.c:__do_sys_mount_setattr
- security/landlock/syscalls.c:__ia32_sys_landlock_create_ruleset
- security/landlock/syscalls.c:__x64_sys_landlock_create_ruleset
- io_uring/openclose.c:io_openat2_prep
- net/ipv4/tcp.c:do_tcp_getsockopt
Symbols:
ffffffff817dbad0-ffffffff817dbba9: check_zeroed_user (STB_GLOBAL)
6.5: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffff8181ae80)
Location: lib/usercopy.c:62
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:sched_copy_attr
- kernel/seccomp.c:seccomp_notify_addfd
- kernel/seccomp.c:seccomp_notify_recv
- kernel/trace/trace_events_user.c:user_events_ioctl_unreg
- kernel/trace/trace_events_user.c:user_events_ioctl_reg
- kernel/bpf/syscall.c:bpf_check_uarg_tail_zero
- kernel/events/core.c:perf_copy_attr
- fs/open.c:__ia32_sys_openat2
- fs/open.c:__x64_sys_openat2
- fs/namespace.c:__ia32_sys_mount_setattr
- fs/namespace.c:__x64_sys_mount_setattr
- security/landlock/syscalls.c:__ia32_sys_landlock_create_ruleset
- security/landlock/syscalls.c:__x64_sys_landlock_create_ruleset
- io_uring/openclose.c:io_openat2_prep
- net/ipv4/tcp.c:do_tcp_getsockopt
Symbols:
ffffffff8181ae80-ffffffff8181af47: check_zeroed_user (STB_GLOBAL)
6.8: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffff818601d0)
Location: lib/usercopy.c:62
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:sched_copy_attr
- kernel/seccomp.c:seccomp_notify_addfd
- kernel/seccomp.c:seccomp_notify_recv
- kernel/trace/trace_events_user.c:user_events_ioctl_unreg
- kernel/trace/trace_events_user.c:user_events_ioctl_reg
- kernel/bpf/syscall.c:bpf_check_uarg_tail_zero
- kernel/events/core.c:perf_copy_attr
- fs/open.c:__ia32_sys_openat2
- fs/open.c:__x64_sys_openat2
- fs/namespace.c:copy_mnt_id_req
- fs/namespace.c:__ia32_sys_mount_setattr
- fs/namespace.c:__x64_sys_mount_setattr
- security/landlock/syscalls.c:__do_sys_landlock_create_ruleset
- io_uring/openclose.c:io_openat2_prep
- net/ipv4/tcp.c:do_tcp_getsockopt
Symbols:
ffffffff818601d0-ffffffff818602ac: check_zeroed_user (STB_GLOBAL)
arm64: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffff800010637e10)
Location: lib/usercopy.c:50
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:__arm64_sys_sched_setattr
- kernel/seccomp.c:seccomp_notify_ioctl
- kernel/events/core.c:perf_copy_attr
Symbols:
ffff800010637e10-ffff80001063812c: check_zeroed_user (STB_GLOBAL)
armhf: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (c07dd964)
Location: lib/usercopy.c:50
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:__se_sys_sched_setattr
- kernel/seccomp.c:seccomp_notify_ioctl
- kernel/events/core.c:perf_copy_attr
Symbols:
c07dd964-c07dda84: check_zeroed_user (STB_GLOBAL)
ppc64el: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (c0000000007de000)
Location: lib/usercopy.c:50
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:__se_sys_sched_setattr
- kernel/seccomp.c:seccomp_notify_ioctl
- kernel/events/core.c:perf_copy_attr
Symbols:
c0000000007de000-c0000000007de1a8: check_zeroed_user (STB_GLOBAL)
riscv64: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffe000464e74)
Location: lib/usercopy.c:50
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:__se_sys_sched_setattr
- kernel/seccomp.c:seccomp_notify_ioctl
- kernel/events/core.c:perf_copy_attr
Symbols:
ffffffe000464e74-ffffffe000464f08: check_zeroed_user (STB_GLOBAL)
aws: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffff81524780)
Location: lib/usercopy.c:50
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:sched_copy_attr
- kernel/seccomp.c:seccomp_notify_ioctl
- kernel/events/core.c:perf_copy_attr
Symbols:
ffffffff81524780-ffffffff81524841: check_zeroed_user (STB_GLOBAL)
azure: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffff81514a60)
Location: lib/usercopy.c:50
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:sched_copy_attr
- kernel/seccomp.c:seccomp_notify_ioctl
- kernel/events/core.c:perf_copy_attr
Symbols:
ffffffff81514a60-ffffffff81514b21: check_zeroed_user (STB_GLOBAL)
gcp: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffff81520810)
Location: lib/usercopy.c:50
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:sched_copy_attr
- kernel/seccomp.c:seccomp_notify_ioctl
- kernel/events/core.c:perf_copy_attr
Symbols:
ffffffff81520810-ffffffff815208d1: check_zeroed_user (STB_GLOBAL)
lowlatency: ✅int check_zeroed_user(const void *from, size_t size);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In lib/usercopy.c (ffffffff8153a190)
Location: lib/usercopy.c:50
Inline: False
Direct callers:
- kernel/fork.c:copy_clone_args_from_user
- kernel/sched/core.c:sched_copy_attr
- kernel/seccomp.c:seccomp_notify_ioctl
- kernel/events/core.c:perf_copy_attr
Symbols:
ffffffff8153a190-ffffffff8153a251: check_zeroed_user (STB_GLOBAL)
Regular
5.4 and 5.8 ✅
5.8 and 5.11 ✅
5.11 and 5.13 ✅
5.13 and 5.15 ✅
5.15 and 5.19 ✅
5.19 and 6.2 ✅
6.2 and 6.5 ✅
6.5 and 6.8 ✅
amd64 and arm64 ✅
amd64 and armhf ✅
amd64 and ppc64el ✅
amd64 and riscv64 ✅
generic and aws ✅
generic and azure ✅
generic and gcp ✅
generic and lowlatency ✅