mark_reg_stack_readRegular
4.4: Absent ⚠️
4.8: Absent ⚠️
4.10: Absent ⚠️
4.13: Absent ⚠️
4.15: Absent ⚠️
4.18: Absent ⚠️
5.0: Absent ⚠️
5.3: Absent ⚠️
5.4: Absent ⚠️
5.8: Absent ⚠️
5.11: Absent ⚠️
5.13: ✅void mark_reg_stack_read(struct bpf_verifier_env *env, struct bpf_func_state *ptr_state, int min_off, int max_off, int dst_regno);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81208770)
Location: kernel/bpf/verifier.c:2802
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_stack_read_fixed_off
Symbols:
ffffffff81208770-ffffffff81208847: mark_reg_stack_read (STB_LOCAL)
5.15: ✅void mark_reg_stack_read(struct bpf_verifier_env *env, struct bpf_func_state *ptr_state, int min_off, int max_off, int dst_regno);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8123c170)
Location: kernel/bpf/verifier.c:2868
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_stack_read_fixed_off
Symbols:
ffffffff8123c170-ffffffff8123c320: mark_reg_stack_read (STB_LOCAL)
5.19: ✅void mark_reg_stack_read(struct bpf_verifier_env *env, struct bpf_func_state *ptr_state, int min_off, int max_off, int dst_regno);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81281cd0)
Location: kernel/bpf/verifier.c:3212
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_stack_read_fixed_off
Symbols:
ffffffff81281cd0-ffffffff81281e94: mark_reg_stack_read (STB_LOCAL)
6.2: ✅void mark_reg_stack_read(struct bpf_verifier_env *env, struct bpf_func_state *ptr_state, int min_off, int max_off, int dst_regno);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff812d7720)
Location: kernel/bpf/verifier.c:3654
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_stack_read_fixed_off
Symbols:
ffffffff812d7720-ffffffff812d78e4: mark_reg_stack_read (STB_LOCAL)
6.5: Transformation ⚠️void mark_reg_stack_read(struct bpf_verifier_env *env, struct bpf_func_state *ptr_state, int min_off, int max_off, int dst_regno);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:4536
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_stack_read_fixed_off
Symbols:
ffffffff81308210-ffffffff813084af: mark_reg_stack_read (STB_LOCAL)
ffffffff820df675-ffffffff820df6b9: mark_reg_stack_read.cold (STB_LOCAL)
6.8: Transformation ⚠️void mark_reg_stack_read(struct bpf_verifier_env *env, struct bpf_func_state *ptr_state, int min_off, int max_off, int dst_regno);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:4684
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_stack_read_fixed_off
Symbols:
ffffffff81321470-ffffffff81321685: mark_reg_stack_read (STB_LOCAL)
ffffffff821bb2e9-ffffffff821bb349: mark_reg_stack_read.cold (STB_LOCAL)
arm64: Absent ⚠️
armhf: Absent ⚠️
ppc64el: Absent ⚠️
riscv64: Absent ⚠️
aws: Absent ⚠️
azure: Absent ⚠️
gcp: Absent ⚠️
lowlatency: Absent ⚠️
Regular
5.13 and 5.15 ✅
5.15 and 5.19 ✅
5.19 and 6.2 ✅
6.2 and 6.5 ✅
6.5 and 6.8 ✅