Kernel version | Commit |
---|---|
3.15 | bd4cf0ed331a |
The list of supported architectures for your kernel can be retrieved with:
git grep HAVE_EBPF_JIT arch/
Feature / Architecture | Kernel version | Commit |
---|---|---|
x86_64 | 3.16 | 622582786c9e |
ARM64 | 3.18 | e54bcde3d69d |
s390 | 4.1 | 054623105728 |
Constant blinding for JIT machines | 4.7 | 4f3446bb809f |
PowerPC64 | 4.8 | 156d0e290e96 |
Constant blinding - PowerPC64 | 4.9 | b7b7013cac55 |
Sparc64 | 4.12 | 7a12b5031c6b |
MIPS | 4.13 | f381bf6d82f0 |
ARM32 | 4.14 | 39c13c204bb1 |
x86_32 | 4.18 | 03f5781be2c7 |
Several (but not all) of these main features translate to an eBPF program type. The list of such program types supported in your kernel can be found in file include/uapi/linux/bpf.h
:
git grep -W 'bpf_prog_type {' include/uapi/linux/bpf.h
Feature | Kernel version | Commit |
---|---|---|
AF_PACKET (libpcap/tcpdump, cls_bpf classifier, netfilter's xt_bpf , team driver's load-balancing mode…) | 3.15 | bd4cf0ed331a |
Kernel helpers | 3.15 | bd4cf0ed331a |
bpf() syscall | 3.18 | 99c55f7d47c0 |
Tables (a.k.a. Maps; details below) | 3.18 | 99c55f7d47c0 |
BPF attached to sockets | 3.19 | 89aa075832b0 |
BPF attached to kprobes | 4.1 | 2541517c32be |
cls_bpf / act_bpf for tc | 4.1 | e2e9b6541dd4 |
Tail calls | 4.2 | 04fd61ab36ec |
Non-root programs on sockets | 4.4 | 1be7f75d1668 |
Persistent maps and programs (virtual FS) | 4.4 | b2197755b263 |
tc 's direct-action (da ) mode | 4.4 | 045efa82ff56 |
tc 's clsact qdisc | 4.5 | 1f211a1b929c |
BPF attached to tracepoints | 4.7 | 98b5c2c65c29 |
Direct packet access | 4.7 | 969bf05eb3ce |
XDP (see below) | 4.8 | 6a773a15a1e8 |
BPF attached to perf events | 4.9 | 0515e5999a46 |
Hardware offload for tc 's cls_bpf | 4.9 | 332ae8e2f6ec |
Verifier exposure and internal hooks | 4.9 | 13a27dfc6697 |
BPF attached to cgroups for socket filtering | 4.10 | 0e33661de493 |
Lightweight tunnel encapsulation | 4.10 | 3a0af8fd61f9 |
eBPF support for xt_bpf module (iptables) | 4.10 | 2c16d6033264 |
BPF program tag | 4.10 | 7bd509e311f4 |
Tracepoints to debug BPF | 4.11 (removed in 4.18) | a67edbf4fb6d 4d220ed0f814 |
Testing / benchmarking BPF programs | 4.12 | 1cf1cae963c2 |
BPF programs and maps IDs | 4.13 | dc4bb0e23561 |
BPF support for sock_ops | 4.13 | 40304b2a1567 |
BPF support for skbs on sockets | 4.14 | b005fd189cec |
bpftool utility in kernel sources | 4.15 | 71bb428fe2c1 |
BPF attached to cgroups as device controller | 4.15 | ebc614f68736 |
BPF used for monitoring socket RX/TX data | 4.17 | 4f738adba30a |
BPF attached to raw tracepoints | 4.17 | c4f6699dfcb8 |
BPF attached to bind() system call | 4.17 | 4fbac77d2d09 |
BPF Type Format (BTF) | 4.18 | 69b693f0aefa |
AF_XDP | 4.18 | fbfc504a24f5 |
bpfilter | 4.18 | d2ba09c17a06 |
End.BPF action for seg6local LWT | 4.18 | 004d4b274e2a |
BPF attached to LIRC devices | 4.18 | f4364dcfc86d |
The list of map types supported in your kernel can be found in file include/uapi/linux/bpf.h
:
git grep -W 'bpf_map_type {' include/uapi/linux/bpf.h
Table type | Kernel version | Commit |
---|---|---|
Hash | 3.19 | 0f8e4bd8a1fc |
Array | 3.19 | 28fbcfa08d8e |
Tail call (PROG_ARRAY ) | 4.2 | 04fd61ab36ec |
Perf events | 4.3 | ea317b267e9d |
Per-CPU hash | 4.6 | 824bd0ce6c7c |
Per-CPU array | 4.6 | a10423b87a7e |
Stack trace | 4.6 | d5a3b1f69186 |
Pre-alloc maps memory | 4.6 | 6c9059817432 |
cgroup array | 4.8 | 4ed8ec521ed5 |
LRU hash | 4.10 | 29ba732acbee 3a08c2fd7634 |
LRU per-CPU hash | 4.10 | 8f8449384ec3 961578b63474 |
LPM trie (longest-prefix match) | 4.11 | b95a5c4db09b |
Array of maps | 4.12 | 56f668dfe00d |
Hash of maps | 4.12 | bcc6b1b7ebf8 |
Netdevice references | 4.14 | 546ac1ffb70d |
Socket references (array) | 4.14 | 174a79ff9515 |
CPU references | 4.15 | 6710e1126934 |
AF_XDP socket (XSK) references | 4.18 | fbfc504a24f5 |
Socket references (hashmap) | 4.18 | 81110384441a |
An approximate list of drivers or components supporting XDP programs for your kernel can be retrieved with:
git grep -l XDP_SETUP_PROG drivers/
Feature / Driver | Kernel version | Commit |
---|---|---|
XDP core architecture | 4.8 | 6a773a15a1e8 |
Action: drop | 4.8 | 6a773a15a1e8 |
Action: pass on to stack | 4.8 | 6a773a15a1e8 |
Action: direct forwarding (on same port) | 4.8 | 6ce96ca348a9 |
Direct packet data write | 4.8 | 4acf6c0b84c9 |
Mellanox mlx4 driver | 4.8 | 47a38e155037 |
Mellanox mlx5 driver | 4.9 | 86994156c736 |
Netronome nfp driver | 4.10 | ecd63a0217d5 |
QLogic (Cavium) qed* drivers | 4.10 | 496e05170958 |
virtio_net driver | 4.10 | f600b6905015 |
Broadcom bnxt_en driver | 4.11 | c6d30e8391b8 |
Intel ixgbe* drivers | 4.12 | 924708081629 |
Cavium thunderx driver | 4.12 | 05c773f52b96 |
Generic XDP | 4.12 | b5cdae3291f7 |
Intel i40e driver | 4.13 | 0c8493d90b6b |
Action: redirect | 4.14 | 6453073987ba |
Support for tap | 4.14 | 761876c857cb |
Support for veth | 4.14 | d445516966dc |
Intel e1000 driver | Not upstream yet | |
Intel e1000e driver | Not planned for upstream at this time |
The list of helpers supported in your kernel can be found in file include/uapi/linux/bpf.h
:
git grep ' FN(' include/uapi/linux/bpf.h
Alphabetical order
Helper | Kernel version | Commit |
---|---|---|
BPF_FUNC_bind() | 4.17 | d74bad4e74ee |
BPF_FUNC_clone_redirect() | 4.2 | 3896d655f4d4 |
BPF_FUNC_csum_diff() | 4.6 | 7d672345ed29 |
BPF_FUNC_csum_update() | 4.9 | 36bbef52c7eb |
BPF_FUNC_current_task_under_cgroup() | 4.9 | 60d20f9195b2 |
BPF_FUNC_fib_lookup() | 4.18 | 87f5fc7e48dd |
BPF_FUNC_get_cgroup_classid() | 4.3 | 8d20aabe1c76 |
BPF_FUNC_get_current_comm() | 4.2 | ffeedafbf023 |
BPF_FUNC_get_current_pid_tgid() | 4.2 | ffeedafbf023 |
BPF_FUNC_get_current_task() | 4.8 | 606274c5abd8 |
BPF_FUNC_get_current_uid_gid() | 4.2 | ffeedafbf023 |
BPF_FUNC_get_hash_recalc() | 4.8 | 13c5c240f789 |
BPF_FUNC_get_numa_node_id() | 4.10 | 2d0e30c30f84 |
BPF_FUNC_get_prandom_u32() | 4.1 | 03e69b508b6f |
BPF_FUNC_get_route_realm() | 4.4 | c46646d0484f |
BPF_FUNC_get_smp_processor_id() | 4.1 | c04167ce2ca0 |
BPF_FUNC_get_socket_cookie() | 4.12 | 91b8270f2a4d |
BPF_FUNC_get_socket_uid() | 4.12 | 6acc5c291068 |
BPF_FUNC_get_stack() | 4.18 | de2ff05f48af |
BPF_FUNC_get_stackid() | 4.6 | d5a3b1f69186 |
BPF_FUNC_getsockopt() | 4.15 | cd86d1fd2102 |
BPF_FUNC_ktime_get_ns() | 4.1 | d9847d310ab4 |
BPF_FUNC_l3_csum_replace() | 4.1 | 91bc4822c3d6 |
BPF_FUNC_l4_csum_replace() | 4.1 | 91bc4822c3d6 |
BPF_FUNC_lwt_push_encap() | 4.18 | fe94cc290f53 |
BPF_FUNC_lwt_seg6_action() | 4.18 | fe94cc290f53 |
BPF_FUNC_lwt_seg6_adjust_srh() | 4.18 | fe94cc290f53 |
BPF_FUNC_lwt_seg6_store_bytes() | 4.18 | fe94cc290f53 |
BPF_FUNC_map_delete_elem() | 3.19 | d0003ec01c66 |
BPF_FUNC_map_lookup_elem() | 3.19 | d0003ec01c66 |
BPF_FUNC_map_update_elem() | 3.19 | d0003ec01c66 |
BPF_FUNC_msg_apply_bytes() | 4.17 | 2a100317c9eb |
BPF_FUNC_msg_cork_bytes() | 4.17 | 91843d540a13 |
BPF_FUNC_msg_pull_data() | 4.17 | 015632bb30da |
BPF_FUNC_msg_redirect_hash() | 4.18 | 81110384441a |
BPF_FUNC_msg_redirect_map() | 4.17 | 4f738adba30a |
BPF_FUNC_perf_event_output() | 4.4 | a43eec304259 |
BPF_FUNC_perf_event_read() | 4.3 | 35578d798400 |
BPF_FUNC_perf_event_read_value() | 4.15 | 908432ca84fc |
BPF_FUNC_perf_prog_read_value() | 4.15 | 4bebdc7a85aa |
BPF_FUNC_probe_read() | 4.1 | 2541517c32be |
BPF_FUNC_probe_read_str() | 4.11 | a5e8c07059d0 |
BPF_FUNC_probe_write_user() | 4.8 | 96ae52279594 |
BPF_FUNC_rc_keydown() | 4.18 | f4364dcfc86d |
BPF_FUNC_rc_repeat() | 4.18 | f4364dcfc86d |
BPF_FUNC_redirect() | 4.4 | 27b29f63058d |
BPF_FUNC_redirect_map() | 4.14 | 97f91a7cf04f |
BPF_FUNC_set_hash() | 4.13 | ded092cd73c2 |
BPF_FUNC_set_hash_invalid() | 4.9 | 7a4b28c6cc9f |
BPF_FUNC_setsockopt() | 4.13 | 8c4b4c7e9ff0 |
BPF_FUNC_sk_redirect_hash() | 4.18 | 81110384441a |
BPF_FUNC_sk_redirect_map() | 4.14 | 174a79ff9515 |
BPF_FUNC_skb_adjust_room() | 4.13 | 2be7e212d541 |
BPF_FUNC_skb_change_head() | 4.10 | 3a0af8fd61f9 |
BPF_FUNC_skb_change_proto() | 4.8 | 6578171a7ff0 |
BPF_FUNC_skb_change_tail() | 4.9 | 5293efe62df8 |
BPF_FUNC_skb_change_type() | 4.8 | d2485c4242a8 |
BPF_FUNC_skb_get_tunnel_key() | 4.3 | d3aa45ce6b94 |
BPF_FUNC_skb_get_tunnel_opt() | 4.6 | 14ca0751c96f |
BPF_FUNC_skb_get_xfrm_state() | 4.18 | 12bed760a78d |
BPF_FUNC_skb_load_bytes() | 4.5 | 05c74e5e53f6 |
BPF_FUNC_skb_load_bytes_relative() | 4.18 | 4e1ec56cdc59 |
BPF_FUNC_skb_pull_data() | 4.9 | 36bbef52c7eb |
BPF_FUNC_skb_set_tunnel_key() | 4.3 | d3aa45ce6b94 |
BPF_FUNC_skb_set_tunnel_opt() | 4.6 | 14ca0751c96f |
BPF_FUNC_skb_store_bytes() | 4.1 | 91bc4822c3d6 |
BPF_FUNC_skb_under_cgroup() | 4.8 | 4a482f34afcc |
BPF_FUNC_skb_vlan_pop() | 4.3 | 4e10df9a60d9 |
BPF_FUNC_skb_vlan_push() | 4.3 | 4e10df9a60d9 |
BPF_FUNC_sock_hash_update() | 4.18 | 81110384441a |
BPF_FUNC_sock_map_update() | 4.14 | 174a79ff9515 |
BPF_FUNC_tail_call() | 4.2 | 04fd61ab36ec |
BPF_FUNC_trace_printk() | 4.1 | 9c959c863f82 |
BPF_FUNC_xdp_adjust_head() | 4.10 | 17bedab27231 |
BPF_FUNC_xdp_adjust_meta() | 4.15 | de8f3a83b0a0 |
BPF_FUNC_xdp_adjust_tail() | 4.18 | b32cc5b9a346 |
BPF_FUNC_override_return() | 4.16 | 9802d86585db |
BPF_FUNC_sock_ops_cb_flags_set() | 4.16 | b13d88072172 |