tnum_strnRegular
4.4: Absent ⚠️
4.8: Absent ⚠️
4.10: Absent ⚠️
4.13: Absent ⚠️
4.15: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff811a96e0)
Location: kernel/bpf/tnum.c:156
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff811a96e0-ffffffff811a9701: tnum_strn (STB_GLOBAL)
4.18: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff811c0bf0)
Location: kernel/bpf/tnum.c:166
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff811c0bf0-ffffffff811c0c0d: tnum_strn (STB_GLOBAL)
5.0: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff811d20f0)
Location: kernel/bpf/tnum.c:166
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff811d20f0-ffffffff811d210d: tnum_strn (STB_GLOBAL)
5.3: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff811e6850)
Location: kernel/bpf/tnum.c:167
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:__check_stack_boundary
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff811e6850-ffffffff811e686d: tnum_strn (STB_GLOBAL)
5.4: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff811f2fa0)
Location: kernel/bpf/tnum.c:172
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:__check_stack_boundary
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff811f2fa0-ffffffff811f2fbd: tnum_strn (STB_GLOBAL)
5.8: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff81215210)
Location: kernel/bpf/tnum.c:172
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:__check_stack_boundary
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_ptr_to_btf_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff81215210-ffffffff8121522d: tnum_strn (STB_GLOBAL)
5.11: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff81216eb0)
Location: kernel/bpf/tnum.c:172
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:check_stack_boundary
- kernel/bpf/verifier.c:__check_stack_boundary
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_ptr_to_btf_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff81216eb0-ffffffff81216ecd: tnum_strn (STB_GLOBAL)
5.13: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff8121a300)
Location: kernel/bpf/tnum.c:172
Inline: False
Direct callers:
- kernel/bpf/verifier.c:sanitize_check_bounds
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_stack_access_within_bounds
- kernel/bpf/verifier.c:check_ptr_to_btf_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff8121a300-ffffffff8121a31d: tnum_strn (STB_GLOBAL)
5.15: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff81251060)
Location: kernel/bpf/tnum.c:175
Inline: False
Direct callers:
- kernel/bpf/verifier.c:sanitize_check_bounds
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_stack_access_within_bounds
- kernel/bpf/verifier.c:check_ptr_to_btf_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff81251060-ffffffff8125107d: tnum_strn (STB_GLOBAL)
5.19: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff81298a50)
Location: kernel/bpf/tnum.c:175
Inline: False
Direct callers:
- kernel/bpf/verifier.c:sanitize_check_bounds
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_stack_access_within_bounds
- kernel/bpf/verifier.c:check_ptr_to_btf_access
- kernel/bpf/verifier.c:__check_buffer_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff81298a50-ffffffff81298a7c: tnum_strn (STB_GLOBAL)
6.2: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff812f4650)
Location: kernel/bpf/tnum.c:175
Inline: False
Direct callers:
- kernel/bpf/verifier.c:sanitize_check_bounds
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_stack_access_within_bounds
- kernel/bpf/verifier.c:check_ptr_to_btf_access
- kernel/bpf/verifier.c:__check_buffer_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:check_stack_read
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff812f4650-ffffffff812f467c: tnum_strn (STB_GLOBAL)
6.5: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff81321b00)
Location: kernel/bpf/tnum.c:175
Inline: False
Direct callers:
- kernel/bpf/verifier.c:sanitize_check_bounds
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_stack_access_within_bounds
- kernel/bpf/verifier.c:check_ptr_to_btf_access
- kernel/bpf/verifier.c:__check_buffer_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff81321b00-ffffffff81321b2c: tnum_strn (STB_GLOBAL)
6.8: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/log.c (ffffffff81344ab0)
Location: kernel/bpf/log.c:542
Inline: False
Direct callers:
- kernel/bpf/verifier.c:sanitize_check_bounds
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_stack_range_initialized
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_stack_access_within_bounds
- kernel/bpf/verifier.c:check_ptr_to_btf_access
- kernel/bpf/verifier.c:__check_buffer_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:__check_ptr_off_reg
- kernel/bpf/log.c:print_reg_state
Symbols:
ffffffff81344ab0-ffffffff81344b27: tnum_strn (STB_GLOBAL)
arm64: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffff800010276b08)
Location: kernel/bpf/tnum.c:172
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:__check_stack_boundary
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffff800010276b08-ffff800010276b5c: tnum_strn (STB_GLOBAL)
armhf: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (c04a9080)
Location: kernel/bpf/tnum.c:172
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:__check_stack_boundary
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
c04a9080-c04a90c4: tnum_strn (STB_GLOBAL)
ppc64el: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (c00000000031f090)
Location: kernel/bpf/tnum.c:172
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:__check_stack_boundary
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
c00000000031f090-c00000000031f0d8: tnum_strn (STB_GLOBAL)
riscv64: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffe0001aee08)
Location: kernel/bpf/tnum.c:172
Inline: False
Direct callers:
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_return_code
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:__check_stack_boundary
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffe0001aee08-ffffffe0001aee52: tnum_strn (STB_GLOBAL)
aws: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff811eb5c0)
Location: kernel/bpf/tnum.c:172
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:__check_stack_boundary
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff811eb5c0-ffffffff811eb5dd: tnum_strn (STB_GLOBAL)
azure: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff811de350)
Location: kernel/bpf/tnum.c:172
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:__check_stack_boundary
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff811de350-ffffffff811de36d: tnum_strn (STB_GLOBAL)
gcp: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff811e9390)
Location: kernel/bpf/tnum.c:172
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:__check_stack_boundary
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff811e9390-ffffffff811e93ad: tnum_strn (STB_GLOBAL)
lowlatency: ✅int tnum_strn(char *str, size_t size, struct tnum a);
Collision: Unique Global
Inline: No
Transformation: False
Instances:
In kernel/bpf/tnum.c (ffffffff811f7760)
Location: kernel/bpf/tnum.c:172
Inline: False
Direct callers:
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:do_check
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:check_helper_mem_access
- kernel/bpf/verifier.c:__check_stack_boundary
- kernel/bpf/verifier.c:check_mem_access
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:check_ptr_alignment
- kernel/bpf/verifier.c:print_verifier_state
Symbols:
ffffffff811f7760-ffffffff811f777d: tnum_strn (STB_GLOBAL)
Regular
4.15 and 4.18 ✅
4.18 and 5.0 ✅
5.0 and 5.3 ✅
5.3 and 5.4 ✅
5.4 and 5.8 ✅
5.8 and 5.11 ✅
5.11 and 5.13 ✅
5.13 and 5.15 ✅
5.15 and 5.19 ✅
5.19 and 6.2 ✅
6.2 and 6.5 ✅
6.5 and 6.8 ✅
amd64 and arm64 ✅
amd64 and armhf ✅
amd64 and ppc64el ✅
amd64 and riscv64 ✅
generic and aws ✅
generic and azure ✅
generic and gcp ✅
generic and lowlatency ✅