kprobe_prog_is_valid_accessRegular
4.4: ✅bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff81166b80)
Location: kernel/trace/bpf_trace.c:302
Inline: False
Symbols:
ffffffff81166b80-ffffffff81166ba1: kprobe_prog_is_valid_access (STB_LOCAL)
4.8: ✅bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, enum bpf_reg_type *reg_type);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff81173d70)
Location: kernel/trace/bpf_trace.c:428
Inline: False
Symbols:
ffffffff81173d70-ffffffff81173d91: kprobe_prog_is_valid_access (STB_LOCAL)
4.10: ✅bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, enum bpf_reg_type *reg_type);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff8117f540)
Location: kernel/trace/bpf_trace.c:453
Inline: False
Symbols:
ffffffff8117f540-ffffffff8117f561: kprobe_prog_is_valid_access (STB_LOCAL)
4.13: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff81182cf0)
Location: kernel/trace/bpf_trace.c:519
Inline: True
Symbols:
ffffffff81182cf0-ffffffff81182d1d: kprobe_prog_is_valid_access (STB_LOCAL)
4.15: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff81190780)
Location: kernel/trace/bpf_trace.c:565
Inline: True
Symbols:
ffffffff81190780-ffffffff811907ad: kprobe_prog_is_valid_access (STB_LOCAL)
4.18: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811a5650)
Location: kernel/trace/bpf_trace.c:598
Inline: True
Symbols:
ffffffff811a5650-ffffffff811a5677: kprobe_prog_is_valid_access (STB_LOCAL)
5.0: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811b3770)
Location: kernel/trace/bpf_trace.c:634
Inline: True
Symbols:
ffffffff811b3770-ffffffff811b379f: kprobe_prog_is_valid_access (STB_LOCAL)
5.3: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811c24b0)
Location: kernel/trace/bpf_trace.c:739
Inline: True
Symbols:
ffffffff811c24b0-ffffffff811c24e5: kprobe_prog_is_valid_access (STB_LOCAL)
5.4: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811cdc20)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
ffffffff811cdc20-ffffffff811cdc55: kprobe_prog_is_valid_access (STB_LOCAL)
5.8: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811e9940)
Location: kernel/trace/bpf_trace.c:1162
Inline: True
Symbols:
ffffffff811e9940-ffffffff811e9975: kprobe_prog_is_valid_access (STB_LOCAL)
5.11: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811e6d40)
Location: kernel/trace/bpf_trace.c:1391
Inline: True
Symbols:
ffffffff811e6d40-ffffffff811e6d75: kprobe_prog_is_valid_access (STB_LOCAL)
5.13: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811e7fe0)
Location: kernel/trace/bpf_trace.c:1085
Inline: True
Symbols:
ffffffff811e7fe0-ffffffff811e8016: kprobe_prog_is_valid_access (STB_LOCAL)
5.15: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff81218c60)
Location: kernel/trace/bpf_trace.c:1162
Inline: True
Symbols:
ffffffff81218c60-ffffffff81218c96: kprobe_prog_is_valid_access (STB_LOCAL)
5.19: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff81257270)
Location: kernel/trace/bpf_trace.c:1340
Inline: True
Symbols:
ffffffff81257270-ffffffff812572b9: kprobe_prog_is_valid_access (STB_LOCAL)
6.2: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff812a68a0)
Location: kernel/trace/bpf_trace.c:1554
Inline: True
Symbols:
ffffffff812a68a0-ffffffff812a68e9: kprobe_prog_is_valid_access (STB_LOCAL)
6.5: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff812c89c0)
Location: kernel/trace/bpf_trace.c:1563
Inline: True
Symbols:
ffffffff812c89c0-ffffffff812c8a09: kprobe_prog_is_valid_access (STB_LOCAL)
6.8: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff812e5990)
Location: kernel/trace/bpf_trace.c:1668
Inline: True
Symbols:
ffffffff812e5990-ffffffff812e59d9: kprobe_prog_is_valid_access (STB_LOCAL)
arm64: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffff80001024cca8)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
ffff80001024cca8-ffff80001024cce8: kprobe_prog_is_valid_access (STB_LOCAL)
armhf: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (c04807b4)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
c04807b4-c048080c: kprobe_prog_is_valid_access (STB_LOCAL)
ppc64el: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (c0000000002e97b0)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
c0000000002e97b0-c0000000002e97f8: kprobe_prog_is_valid_access (STB_LOCAL)
riscv64: Absent ⚠️
aws: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811c6240)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
ffffffff811c6240-ffffffff811c6275: kprobe_prog_is_valid_access (STB_LOCAL)
azure: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811b9020)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
ffffffff811b9020-ffffffff811b9055: kprobe_prog_is_valid_access (STB_LOCAL)
gcp: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811c4010)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
ffffffff811c4010-ffffffff811c4045: kprobe_prog_is_valid_access (STB_LOCAL)
lowlatency: Selective Inline ⚠️bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/trace/bpf_trace.c (ffffffff811d18f0)
Location: kernel/trace/bpf_trace.c:763
Inline: True
Symbols:
ffffffff811d18f0-ffffffff811d1925: kprobe_prog_is_valid_access (STB_LOCAL)
Regular
4.4 and 4.8 ⚠️enum bpf_reg_type *reg_type
4.8 and 4.10 ✅
4.10 and 4.13 ⚠️struct bpf_insn_access_aux *info
enum bpf_reg_type *reg_type
4.13 and 4.15 ✅
4.15 and 4.18 ⚠️const struct bpf_prog *prog
off, size, type, info ➡️ off, size, type, prog, info
4.18 and 5.0 ✅
5.0 and 5.3 ✅
5.3 and 5.4 ✅
5.4 and 5.8 ✅
5.8 and 5.11 ✅
5.11 and 5.13 ✅
5.13 and 5.15 ✅
5.15 and 5.19 ✅
5.19 and 6.2 ✅
6.2 and 6.5 ✅
6.5 and 6.8 ✅
amd64 and arm64 ✅
amd64 and armhf ✅
amd64 and ppc64el ✅
generic and aws ✅
generic and azure ✅
generic and gcp ✅
generic and lowlatency ✅