bpf_progRegular
4.4: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u32 len;
enum bpf_prog_type type;
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const struct sk_buff *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
4.8: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u32 len;
enum bpf_prog_type type;
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const struct sk_buff *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
4.10: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 xdp_adjust_head;
enum bpf_prog_type type;
u32 len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
4.13: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 locked;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
enum bpf_prog_type type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
4.15: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 locked;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
enum bpf_prog_type type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
4.18: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 undo_set_mem;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.0: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 undo_set_mem;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.3: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.4: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.8: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.11: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.13: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_stats *stats;
int *active;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.15: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
u16 call_get_func_ip;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_stats *stats;
int *active;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
5.19: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinding_requested;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
u16 call_get_func_ip;
u16 tstamp_type_access;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_stats *stats;
int *active;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
struct (anon) __empty_insns;
struct sock_filter insns[0];
struct (anon) __empty_insnsi;
struct bpf_insn insnsi[0];
};
6.2: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinding_requested;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
u16 call_get_func_ip;
u16 tstamp_type_access;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_stats *stats;
int *active;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
struct (anon) __empty_insns;
struct sock_filter insns[0];
struct (anon) __empty_insnsi;
struct bpf_insn insnsi[0];
};
6.5: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinding_requested;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
u16 call_get_func_ip;
u16 tstamp_type_access;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_stats *stats;
int *active;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
struct (anon) __empty_insns;
struct sock_filter insns[0];
struct (anon) __empty_insnsi;
struct bpf_insn insnsi[0];
};
6.8: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinding_requested;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
u16 call_get_stack;
u16 call_get_func_ip;
u16 tstamp_type_access;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_stats *stats;
int *active;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
struct (anon) __empty_insns;
struct sock_filter insns[0];
struct (anon) __empty_insnsi;
struct bpf_insn insnsi[0];
};
arm64: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
armhf: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
ppc64el: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
riscv64: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
aws: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
azure: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
gcp: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
lowlatency: ✅struct bpf_prog {
u16 pages;
u16 jited;
u16 jit_requested;
u16 gpl_compatible;
u16 cb_access;
u16 dst_needed;
u16 blinded;
u16 is_func;
u16 kprobe_override;
u16 has_callchain_buf;
u16 enforce_expected_attach_type;
enum bpf_prog_type type;
enum bpf_attach_type expected_attach_type;
u32 len;
u32 jited_len;
u8 tag[8];
struct bpf_prog_aux *aux;
struct sock_fprog_kern *orig_prog;
unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
struct sock_filter insns[0];
struct bpf_insn insnsi[0];
};
Regular
4.4 and 4.8 ✅
4.8 and 4.10 ⚠️u16 xdp_adjust_head
u8 tag[8]
unsigned int (*bpf_func)(const struct sk_buff *, const struct bpf_insn *) ➡️ unsigned int (*bpf_func)(const void *, const struct bpf_insn *)
4.10 and 4.13 ⚠️u16 locked
u32 jited_len
u16 xdp_adjust_head
4.13 and 4.15 ✅
4.15 and 4.18 ⚠️u16 jit_requested
u16 undo_set_mem
u16 blinded
u16 is_func
u16 kprobe_override
u16 has_callchain_buf
enum bpf_attach_type expected_attach_type
u16 locked
4.18 and 5.0 ✅
5.0 and 5.3 ⚠️u16 enforce_expected_attach_type
u16 undo_set_mem
5.3 and 5.4 ✅
5.4 and 5.8 ✅
5.8 and 5.11 ⚠️u16 call_get_stack
5.11 and 5.13 ⚠️struct bpf_prog_stats *stats
int *active
5.13 and 5.15 ⚠️u16 call_get_func_ip
5.15 and 5.19 ⚠️u16 blinding_requested
u16 tstamp_type_access
struct (anon) __empty_insns
struct (anon) __empty_insnsi
5.19 and 6.2 ✅
6.2 and 6.5 ✅
6.5 and 6.8 ✅
amd64 and arm64 ✅
amd64 and armhf ✅
amd64 and ppc64el ✅
amd64 and riscv64 ✅
generic and aws ✅
generic and azure ✅
generic and gcp ✅
generic and lowlatency ✅