push_stackRegular
4.4: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811756f1)
Location: kernel/bpf/verifier.c:441
Inline: True
Inline callers:
- kernel/bpf/verifier.c:do_check
4.8: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811839ca)
Location: kernel/bpf/verifier.c:447
Inline: True
Inline callers:
- kernel/bpf/verifier.c:do_check
4.10: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811909d9)
Location: kernel/bpf/verifier.c:416
Inline: True
Inline callers:
- kernel/bpf/verifier.c:do_check
4.13: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8119713d)
Location: kernel/bpf/verifier.c:435
Inline: True
Inline callers:
- kernel/bpf/verifier.c:do_check
4.15: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811a4de1)
Location: kernel/bpf/verifier.c:394
Inline: True
Inline callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
4.18: Full Inline ⚠️Collision: Unique Static
Inline: Full
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811bb826)
Location: kernel/bpf/verifier.c:512
Inline: True
Inline callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
5.0: Selective Inline ⚠️struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811c7870)
Location: kernel/bpf/verifier.c:757
Inline: True
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811c7870-ffffffff811c793d: push_stack (STB_LOCAL)
5.3: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811daf50)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811daf50-ffffffff811db030: push_stack (STB_LOCAL)
5.4: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811e76a0)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811e76a0-ffffffff811e7780: push_stack (STB_LOCAL)
5.8: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81207360)
Location: kernel/bpf/verifier.c:932
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
Symbols:
ffffffff81207360-ffffffff8120748d: push_stack (STB_LOCAL)
5.11: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81207c20)
Location: kernel/bpf/verifier.c:958
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
Symbols:
ffffffff81207c20-ffffffff81207d4d: push_stack (STB_LOCAL)
5.13: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff81209380)
Location: kernel/bpf/verifier.c:1007
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_speculative_path
Symbols:
ffffffff81209380-ffffffff812094a7: push_stack (STB_LOCAL)
5.15: Transformation ⚠️struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:1016
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_speculative_path
Symbols:
ffffffff8123d030-ffffffff8123d138: push_stack (STB_LOCAL)
ffffffff81cb81c8-ffffffff81cb81dd: push_stack.cold (STB_LOCAL)
5.19: Transformation ⚠️struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:1243
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_speculative_path
Symbols:
ffffffff812823b0-ffffffff812824c4: push_stack (STB_LOCAL)
ffffffff81e693e7-ffffffff81e693fc: push_stack.cold (STB_LOCAL)
6.2: Transformation ⚠️struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:1447
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_speculative_path
Symbols:
ffffffff812d9eb0-ffffffff812d9fca: push_stack (STB_LOCAL)
ffffffff820601e7-ffffffff820601fc: push_stack.cold (STB_LOCAL)
6.5: Transformation ⚠️struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:1824
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_speculative_path
- kernel/bpf/verifier.c:check_kfunc_call
Symbols:
ffffffff813029c0-ffffffff81302b15: push_stack (STB_LOCAL)
ffffffff820df224-ffffffff820df239: push_stack.cold (STB_LOCAL)
6.8: Transformation ⚠️struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: True
Instances:
In kernel/bpf/verifier.c (0)
Location: kernel/bpf/verifier.c:1674
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_speculative_path
- kernel/bpf/verifier.c:push_callback_call
Symbols:
ffffffff81320a30-ffffffff81320bb4: push_stack (STB_LOCAL)
ffffffff821bb1c5-ffffffff821bb1da: push_stack.cold (STB_LOCAL)
arm64: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffff80001026b048)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
Symbols:
ffff80001026b048-ffff80001026b158: push_stack (STB_LOCAL)
armhf: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c049d15c)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
c049d15c-c049d254: push_stack (STB_LOCAL)
ppc64el: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (c000000000310f70)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
Symbols:
c000000000310f70-c0000000003110e8: push_stack (STB_LOCAL)
riscv64: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffe0001a571a)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
Symbols:
ffffffe0001a571a-ffffffe0001a57f0: push_stack (STB_LOCAL)
aws: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811dfcc0)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811dfcc0-ffffffff811dfda0: push_stack (STB_LOCAL)
azure: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811d2a80)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811d2a80-ffffffff811d2b60: push_stack (STB_LOCAL)
gcp: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811dda90)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811dda90-ffffffff811ddb70: push_stack (STB_LOCAL)
lowlatency: ✅struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff811ebea0)
Location: kernel/bpf/verifier.c:803
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_cond_jmp_op
- kernel/bpf/verifier.c:sanitize_ptr_alu
- kernel/bpf/verifier.c:sanitize_ptr_alu
Symbols:
ffffffff811ebea0-ffffffff811ebf80: push_stack (STB_LOCAL)
Regular
5.0 and 5.3 ✅
5.3 and 5.4 ✅
5.4 and 5.8 ✅
5.8 and 5.11 ✅
5.11 and 5.13 ✅
5.13 and 5.15 ✅
5.15 and 5.19 ✅
5.19 and 6.2 ✅
6.2 and 6.5 ✅
6.5 and 6.8 ✅
amd64 and arm64 ✅
amd64 and armhf ✅
amd64 and ppc64el ✅
amd64 and riscv64 ✅
generic and aws ✅
generic and azure ✅
generic and gcp ✅
generic and lowlatency ✅