mark_reg_readRegular
4.4: Absent ⚠️
4.8: Absent ⚠️
4.10: Absent ⚠️
4.13: Absent ⚠️
4.15: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811a36c0)
Location: kernel/bpf/verifier.c:623
Inline: True
Inline callers:
- kernel/bpf/verifier.c:check_reg_arg
4.18: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_verifier_state *state, struct bpf_verifier_state *parent, u32 regno);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811b7f40)
Location: kernel/bpf/verifier.c:927
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811b7f40-ffffffff811b807f: mark_reg_read (STB_LOCAL)
5.0: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811c72d0)
Location: kernel/bpf/verifier.c:1130
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811c72d0-ffffffff811c7331: mark_reg_read (STB_LOCAL)
5.3: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811da0a0)
Location: kernel/bpf/verifier.c:1195
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811da0a0-ffffffff811da147: mark_reg_read (STB_LOCAL)
5.4: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e6840)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811e6840-ffffffff811e68e7: mark_reg_read (STB_LOCAL)
5.8: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81206cd0)
Location: kernel/bpf/verifier.c:1505
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff81206cd0-ffffffff81206d78: mark_reg_read (STB_LOCAL)
5.11: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81206aa0)
Location: kernel/bpf/verifier.c:1557
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff81206aa0-ffffffff81206b48: mark_reg_read (STB_LOCAL)
5.13: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81206ab0)
Location: kernel/bpf/verifier.c:1828
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff81206ab0-ffffffff81206b5d: mark_reg_read (STB_LOCAL)
5.15: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81239d60)
Location: kernel/bpf/verifier.c:1896
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff81239d60-ffffffff81239e4c: mark_reg_read (STB_LOCAL)
5.19: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8127de60)
Location: kernel/bpf/verifier.c:2239
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff8127de60-ffffffff8127df51: mark_reg_read (STB_LOCAL)
6.2: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff812d6560)
Location: kernel/bpf/verifier.c:2454
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff812d6560-ffffffff812d6651: mark_reg_read (STB_LOCAL)
6.5: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff812f71d0)
Location: kernel/bpf/verifier.c:2885
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:process_iter_arg
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff812f71d0-ffffffff812f72c1: mark_reg_read (STB_LOCAL)
6.8: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff813166f0)
Location: kernel/bpf/verifier.c:2983
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:propagate_liveness
- kernel/bpf/verifier.c:prepare_func_exit
- kernel/bpf/verifier.c:process_iter_arg
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:process_dynptr_func
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:check_stack_read_fixed_off
- kernel/bpf/verifier.c:__check_reg_arg
Symbols:
ffffffff813166f0-ffffffff813167e1: mark_reg_read (STB_LOCAL)
arm64: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffff80001026a008)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffff80001026a008-ffff80001026a104: mark_reg_read (STB_LOCAL)
armhf: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c049c040)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
c049c040-c049c128: mark_reg_read (STB_LOCAL)
ppc64el: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c00000000030fbd0)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
c00000000030fbd0-c00000000030fce0: mark_reg_read (STB_LOCAL)
riscv64: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffe0001a48be)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffe0001a48be-ffffffe0001a4990: mark_reg_read (STB_LOCAL)
aws: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811dee60)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811dee60-ffffffff811def07: mark_reg_read (STB_LOCAL)
azure: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811d1c20)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811d1c20-ffffffff811d1cc7: mark_reg_read (STB_LOCAL)
gcp: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811dcc30)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811dcc30-ffffffff811dccd7: mark_reg_read (STB_LOCAL)
lowlatency: ✅int mark_reg_read(struct bpf_verifier_env *env, const struct bpf_reg_state *state, struct bpf_reg_state *parent, u8 flag);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811eb040)
Location: kernel/bpf/verifier.c:1196
Inline: False
Direct callers:
- kernel/bpf/verifier.c:propagate_liveness_reg
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_reg_arg
Symbols:
ffffffff811eb040-ffffffff811eb0e7: mark_reg_read (STB_LOCAL)
Regular
4.18 and 5.0 ⚠️u32 regno
const struct bpf_verifier_state *state ➡️ const struct bpf_reg_state *state
struct bpf_verifier_state *parent ➡️ struct bpf_reg_state *parent
5.0 and 5.3 ⚠️u8 flag
5.3 and 5.4 ✅
5.4 and 5.8 ✅
5.8 and 5.11 ✅
5.11 and 5.13 ✅
5.13 and 5.15 ✅
5.15 and 5.19 ✅
5.19 and 6.2 ✅
6.2 and 6.5 ✅
6.5 and 6.8 ✅
amd64 and arm64 ✅
amd64 and armhf ✅
amd64 and ppc64el ✅
amd64 and riscv64 ✅
generic and aws ✅
generic and azure ✅
generic and gcp ✅
generic and lowlatency ✅