bpf_prog
Regular
4.4
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u32 len;
enum bpf_prog_type type;
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const struct sk_buff *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
4.8
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u32 len;
enum bpf_prog_type type;
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const struct sk_buff *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
4.10
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 xdp_adjust_head;
enum bpf_prog_type type;
u32 len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
4.13
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 locked;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
enum bpf_prog_type type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
4.15
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 locked;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
enum bpf_prog_type type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
4.18
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 undo_set_mem;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.0
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 undo_set_mem;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.3
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.4
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.8
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.11
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.13
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_stats *stats;
int *active;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.15
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
u16 call_get_func_ip;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_stats *stats;
int *active;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.19
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinding_requested;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
u16 call_get_func_ip;
u16 tstamp_type_access;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_stats *stats;
int *active;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
struct (anon) __empty_insns;
struct sock_filter insns[0];
struct (anon) __empty_insnsi;
struct bpf_insn insnsi[0];
};
6.2
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinding_requested;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
u16 call_get_func_ip;
u16 tstamp_type_access;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_stats *stats;
int *active;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
struct (anon) __empty_insns;
struct sock_filter insns[0];
struct (anon) __empty_insnsi;
struct bpf_insn insnsi[0];
};
6.5
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinding_requested;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
u16 call_get_func_ip;
u16 tstamp_type_access;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_stats *stats;
int *active;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
struct (anon) __empty_insns;
struct sock_filter insns[0];
struct (anon) __empty_insnsi;
struct bpf_insn insnsi[0];
};
6.8
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinding_requested;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
u16 call_get_func_ip;
u16 tstamp_type_access;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_stats *stats;
int *active;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
struct (anon) __empty_insns;
struct sock_filter insns[0];
struct (anon) __empty_insnsi;
struct bpf_insn insnsi[0];
};
arm64
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
armhf
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
ppc64el
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
riscv64
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
aws
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
azure
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
gcp
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
lowlatency
: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
Regular
4.4
and 4.8
✅
4.8
and 4.10
⚠️u16 xdp_adjust_head
u8 tag[8]
unsigned int (*bpf_func)(const struct sk_buff *, const struct bpf_insn *)
➡️ unsigned int (*bpf_func)(const void *, const struct bpf_insn *)
4.10
and 4.13
⚠️u16 locked
u32 jited_len
u16 xdp_adjust_head
4.13
and 4.15
✅
4.15
and 4.18
⚠️u16 jit_requested
u16 undo_set_mem
u16 blinded
u16 is_func
u16 kprobe_override
u16 has_callchain_buf
enum bpf_attach_type expected_attach_type
u16 locked
4.18
and 5.0
✅
5.0
and 5.3
⚠️u16 enforce_expected_attach_type
u16 undo_set_mem
5.3
and 5.4
✅
5.4
and 5.8
✅
5.8
and 5.11
⚠️u16 call_get_stack
5.11
and 5.13
⚠️struct bpf_prog_stats *stats
int *active
5.13
and 5.15
⚠️u16 call_get_func_ip
5.15
and 5.19
⚠️u16 blinding_requested
u16 tstamp_type_access
struct (anon) __empty_insns
struct (anon) __empty_insnsi
5.19
and 6.2
✅
6.2
and 6.5
✅
6.5
and 6.8
✅
amd64
and arm64
✅
amd64
and armhf
✅
amd64
and ppc64el
✅
amd64
and riscv64
✅
generic
and aws
✅
generic
and azure
✅
generic
and gcp
✅
generic
and lowlatency
✅