reg_type_strRegular
4.4: Absent ⚠️
4.8: Absent ⚠️
4.10: Absent ⚠️
4.13: Absent ⚠️
4.15: Absent ⚠️
4.18: Absent ⚠️
5.0: Absent ⚠️
5.3: Absent ⚠️
5.4: Absent ⚠️
5.8: Absent ⚠️
5.11: Absent ⚠️
5.13: Absent ⚠️
5.15: Absent ⚠️
5.19: Selective Inline ⚠️const char *reg_type_str(struct bpf_verifier_env *env, enum bpf_reg_type type);
Collision: Unique Static
Inline: Selective
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff8129361f)
Location: kernel/bpf/verifier.c:533
Inline: True
Inline callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
Direct callers:
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:mark_reg_read
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff81278a20-ffffffff81278c4c: reg_type_str (STB_LOCAL)
6.2: ✅const char *reg_type_str(struct bpf_verifier_env *env, enum bpf_reg_type type);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff812cf030)
Location: kernel/bpf/verifier.c:570
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_kfunc_args
- kernel/bpf/verifier.c:check_kfunc_args
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:mark_reg_read
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff812cf030-ffffffff812cf1da: reg_type_str (STB_LOCAL)
6.5: ✅const char *reg_type_str(struct bpf_verifier_env *env, enum bpf_reg_type type);
Collision: Unique Static
Inline: No
Transformation: False
Instances:
In kernel/bpf/verifier.c (ffffffff812f7010)
Location: kernel/bpf/verifier.c:594
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_kfunc_args
- kernel/bpf/verifier.c:check_kfunc_args
- kernel/bpf/verifier.c:check_helper_call
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:mark_reg_read
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff812f7010-ffffffff812f71b6: reg_type_str (STB_LOCAL)
6.8: ✅const char *reg_type_str(struct bpf_verifier_env *env, enum bpf_reg_type type);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/log.c (ffffffff81345990)
Location: kernel/bpf/log.c:398
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:adjust_ptr_min_max_vals
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_reg_sane_offset
- kernel/bpf/verifier.c:check_kfunc_args
- kernel/bpf/verifier.c:check_kfunc_args
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_reg_type
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_atomic
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:map_kptr_match_type
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:mark_reg_read
- kernel/bpf/log.c:print_reg_state
- kernel/bpf/log.c:print_reg_state
Symbols:
ffffffff81345990-ffffffff81345b36: reg_type_str (STB_GLOBAL)
arm64: Absent ⚠️
armhf: Absent ⚠️
ppc64el: Absent ⚠️
riscv64: Absent ⚠️
aws: Absent ⚠️
azure: Absent ⚠️
gcp: Absent ⚠️
lowlatency: Absent ⚠️
Regular
5.19 and 6.2 ✅
6.2 and 6.5 ✅
6.5 and 6.8 ✅