The Attenuator acts as an intelligent filter that can analyze security events detected by Jibril and provide additional context.
New Feature!
Jibril
Jibril eBPF and Security DiscordGarnet Labs🐈‍⬛
  • Jibril
    • Jibril
      • New Era
      • Theory Behind
      • Architecture
      • Agent Dashboard
      • Compare
    • Install and Run
      • Requirements
      • Systemd Service
      • Command Line
      • Docker Container
      • Kubernetes
        • Kubernetes Script
      • Configuration File
      • Network Policy File
      • Systemd Config
    • Components
      • Features
      • Extensions
      • Plugins
      • Printers
      • Events
      • Network Policy
      • Attenuator
    • Mechanisms
      • File Access
      • Execution
      • File Access And Execution
      • Network Peers
      • Network eBPF Logic
      • Probes and Traces
      • Bigger eBPF Logic
      • Loader Interception
    • Detections
      • File Access
        • Auth Logs Tamper
        • Binary Self Deletion
        • Capabilities Modification
        • Code Modification Through Procfs
        • Core Pattern Access
        • CPU Fingerprint
        • Credentials Files Access
        • Crypto Miner Files
        • Environment Read From ProcFS
        • File Example
        • Filesystem Fingerprint
        • Global Shlib Modification
        • Java Debug Lib Load
        • Java Instrument Lib Load
        • Machine Fingerprint
        • OS Fingerprint
        • OS Network Fingerprint
        • OS Status Fingerprint
        • Package Repo Config Modification
        • PAM Config Modification
        • Sched Debug Access
        • Shell Config Modification
        • SSL Certificate Access
        • Sudoers Modification
        • Sysrq Access
        • Unprivileged Bpf Config Access
      • Execution
        • Binary Executed By Loader
        • Code On The Fly
        • Crypto Miner Execution
        • Data Encoder Exec
        • Denial Of Service Tools
        • Exec Example
        • Exec From Unusual Dir
        • File Attribute Change
        • Hidden Elf Exec
        • Interpreter Shell Spawn
        • Net Filecopy Tool Exec
        • Net MitM Tool Exec
        • Net Scan Tool Exec
        • Net Sniff Tool Exec
        • Net Suspicious Tool Exec
        • Net Suspicious Tool Shell
        • Passwd Usage
        • Runc Suspicious Exec
        • Webserver Exec
        • Webserver Shell Exec
      • Network Peers
        • Adult Domain Access
        • Badware Domain Access
        • Dynamic DNS Domain Access
        • Fake Domain Access
        • Gambling Domain Access
        • Peer Example
        • Piracy Domain Access
        • Plaintext Communication
        • Threat Domain Access
        • Tracking Domain Access
        • VPN Domain Access
    • Bugs and Requests
    • Banner
    • License
  • MITRE
    • Techniques
      • Reconnaissance
        • Active Scanning
          • Scanning IP Blocks
          • Vulnerability Scanning
          • Wordlist Scanning
        • Gather Victim Host Information
          • Hardware
          • Software
          • Firmware
          • Client Configurations
        • Gather Victim Identity Information
          • Credentials
          • Email Addresses
          • Employee Names
        • Gather Victim Network Information
          • Domain Properties
          • DNS
          • Network Trust Dependencies
          • Network Topology
          • IP Addresses
          • Network Security Appliances
        • Gather Victim Org Information
          • Determine Physical Locations
          • Business Relationships
          • Identify Business Tempo
          • Identify Roles
        • Phishing for Information
          • Spearphishing Service
          • Spearphishing Attachment
          • Spearphishing Link
          • Spearphishing Voice
        • Search Closed Sources
          • Threat Intel Vendors
          • Purchase Technical Data
        • Search Open Technical Databases
          • DNS/Passive DNS
          • WHOIS
          • Digital Certificates
          • CDNs
          • Scan Databases
        • Search Open Websites/Domains
          • Social Media
          • Search Engines
          • Code Repositories
        • Search Victim-Owned Websites
      • Resource Development
        • Acquire Access
        • Acquire Infrastructure
          • Domains
          • DNS Server
          • Virtual Private Server
          • Server
          • Botnet
          • Web Services
          • Serverless
          • Malvertising
        • Compromise Accounts
          • Social Media Accounts
          • Email Accounts
          • Cloud Accounts
        • Compromise Infrastructure
          • Domains
          • DNS Server
          • Virtual Private Server
          • Server
          • Botnet
          • Web Services
          • Serverless
          • Network Devices
        • Develop Capabilities
          • Malware
          • Code Signing Certificates
          • Digital Certificates
          • Exploits
        • Establish Accounts
          • Social Media Accounts
          • Email Accounts
          • Cloud Accounts
        • Obtain Capabilities
          • Malware
          • Tool
          • Code Signing Certificates
          • Digital Certificates
          • Exploits
          • Vulnerabilities
          • Artificial Intelligence
        • Stage Capabilities
          • Upload Malware
          • Upload Tool
          • Install Digital Certificate
          • Drive-by Target
          • Link Target
          • SEO Poisoning
      • Initial Access
        • Drive-by Compromise
        • Exploit Public-Facing Application
        • External Remote Services
        • Hardware Additions
        • Phishing
          • Spearphishing Attachment
          • Spearphishing Link
          • Spearphishing via Service
          • Spearphishing Voice
        • Replication Through Removable Media
        • Supply Chain Compromise
          • Compromise Software Dependencies and Development Tools
          • Compromise Software Supply Chain
          • Compromise Hardware Supply Chain
        • Trusted Relationship
        • Valid Accounts
          • Default Accounts
          • Domain Accounts
          • Local Accounts
          • Cloud Accounts
      • Execution
        • Cloud Administration Command
        • Command and Scripting Interpreter
          • PowerShell
          • AppleScript
          • Windows Command Shell
          • Unix Shell
          • Visual Basic
          • Python
          • JavaScript
          • Network Device CLI
          • Cloud API
          • AutoHotkey & AutoIt
          • Lua
        • Container Administration Command
          • Deploy Container
        • Exploitation for Client Execution
        • Inter-Process Communication
          • Component Object Model
          • Dynamic Data Exchange
          • XPC Services
        • Native API
        • Scheduled Task/Job
          • At
          • Cron
          • Scheduled Task
          • Systemd Timers
          • Container Orchestration Job
        • Serverless Execution
        • Shared Modules
        • Software Deployment Tools
        • System Services
          • Launchctl
          • Service Execution
        • User Execution
          • Malicious Link
          • Malicious File
          • Malicious Image
        • Windows Management Instrumentation
      • Persistence
        • Account Manipulation
          • Additional Cloud Credentials
          • Additional Email Delegate Permissions
          • Additional Cloud Roles
          • SSH Authorized Keys
          • Device Registration
          • Additional Container Cluster Roles
          • Additional Local or Domain Groups
        • BITS Jobs
        • Boot or Logon Autostart Execution
          • Registry Run Keys / Startup Folder
          • Authentication Package
          • Time Providers
          • Winlogon Helper DLL
          • Security Support Provider
          • Kernel Modules and Extensions
          • Re-opened Applications
          • LSASS Driver
          • Shortcut Modification
          • Port Monitors
          • Print Processors
          • XDG Autostart Entries
          • Active Setup
          • Login Items
        • Boot or Logon Initialization Scripts
          • Logon Script (Windows)
          • Login Hook
          • Network Logon Script
          • RC Scripts
          • Startup Items
        • Browser Extensions
        • Compromise Host Software Binary
        • Create Account
          • Local Account
          • Domain Account
          • Cloud Account
        • Create or Modify System Process
          • Launch Agent
          • Systemd Service
          • Windows Service
          • Launch Daemon
          • Container Service
        • Event Triggered Execution
          • Change Default File Association
          • Screensaver
          • Windows Management Instrumentation Event Subscription
          • Unix Shell Configuration Modification
          • Trap
          • LC_LOAD_DYLIB Addition
          • Netsh Helper DLL
          • Accessibility Features
          • AppCert DLLs
          • AppInit DLLs
          • Application Shimming
          • Image File Execution Options Injection
          • PowerShell Profile
          • Emond
          • Component Object Model Hijacking
          • Installer Packages
          • Udev Rules
        • External Remote Services
        • Hijack Execution Flow
          • DLL Search Order Hijacking
          • DLL Side-Loading
          • Dylib Hijacking
          • Executable Installer File Permissions Weakness
          • Dynamic Linker Hijacking
          • Path Interception by PATH Environment Variable
          • Path Interception by Search Order Hijacking
          • Path Interception by Unquoted Path
          • Services File Permissions Weakness
          • Services Registry Permissions Weakness
          • COR_PROFILER
          • KernelCallbackTable
          • AppDomainManager
        • Implant Internal Image
        • Modify Authentication Process
          • Domain Controller Authentication
          • Password Filter DLL
          • Pluggable Authentication Modules
          • Network Device Authentication
          • Reverse Encryption
          • Multi-Factor Authentication
          • Hybrid Identity
          • Network Provider DLL
          • Conditional Access Policies
        • Office Application Startup
          • Office Template Macros
          • Office Test
          • Outlook Forms
          • Outlook Home Page
          • Outlook Rules
          • Add-ins
        • Pre-OS Boot
          • System Firmware
          • Component Firmware
          • Bootkit
          • ROMMONkit
          • TFTP Boot
        • Scheduled Task/Job
        • Server Software Component
          • SQL Stored Procedures
          • Transport Agent
          • Web Shell
          • IIS Components
          • Terminal Services DLL
        • Traffic Signaling
          • Port Knocking
          • Socket Filters
        • Valid Accounts
      • Privilege Escalation
        • Abuse Elevation Control Mechanism
          • Setuid and Setgid
          • Bypass User Account Control
          • Sudo and Sudo Caching
          • Elevated Execution with Prompt
          • Temporary Elevated Cloud Access
          • TCC Manipulation
        • Access Token Manipulation
          • Token Impersonation/Theft
          • Create Process with Token
          • Make and Impersonate Token
          • Parent PID Spoofing
          • SID-History Injection
        • Account Manipulation
        • Boot or Logon Autostart Execution
        • Boot or Logon Initialization Scripts
        • Create or Modify System Process
        • Domain or Group Policy Modification
          • Group Policy Modification
          • Trust Modification
        • Escape to Host
        • Event Triggered Execution
        • Exploitation for Privilege Escalation
        • Hijack Execution Flow
        • Process Injection
          • Dynamic-link Library Injection
          • Portable Executable Injection
          • Thread Execution Hijacking
          • Asynchronous Procedure Call
          • Thread Local Storage
          • Ptrace System Calls
          • Proc Memory
          • Extra Window Memory Injection
          • Process Hollowing
          • Process Doppelgänging
          • VDSO Hijacking
          • ListPlanting
        • Scheduled Task/Job
        • Valid Accounts
      • Defense Evasion
        • Abuse Elevation Control Mechanism
        • Access Token Manipulation
        • BITS Jobs
        • Build Image on Host
        • Deobfuscate/Decode Files or Information
        • Direct Volume Access
        • Domain Policy Modification
        • Execution Guardrails
          • Environmental Keying
          • Geofencing
          • Time Based Evasion
        • Exploitation for Defense Evasion
        • File and Directory Permissions Modification
          • Windows File and Directory Permissions Modification
          • Linux and Mac File and Directory Permissions Modification
        • Hide Artifacts
          • Hidden Files and Directories
          • Hidden Users
          • Hidden Window
          • NTFS File Attributes
          • Hidden File System
        • Hijack Execution Flow
        • Impair Defenses
          • Disable or Modify Tools
          • Disable Windows Event Logging
          • Disable or Modify System Firewall
          • Disable or Modify Cloud Logs
        • Indicator Removal
          • Clear Windows Event Logs
          • Clear Command History
          • Clear Network Connection History and Logs
          • File Deletion
          • Timestomp
        • Indirect Command Execution
        • Masquerading
          • Match Legitimate Name or Location
          • Rename System Utilities
          • Masquerade Task or Service
          • Double File Extension
          • Right-to-Left Override
          • Space after Filename
          • Compiled HTML File
        • Modify Authentication Process
        • Modify Cloud Environment
          • Add Resources or Services
          • Modify Permissions
        • Modify Registry
        • Modify System Image
          • Patch System Image
          • Downgrade System Image
        • Network Boundary Bridging
          • Network Address Translation Traversal
        • Obfuscated Files or Information
          • Software Packing
          • Steganography
          • Compile After Delivery
          • Binary Padding
          • HTML Smuggling
        • Pre-OS Boot
        • Process Injection
        • Reflective Code Loading
        • Rogue Domain Controller
        • Rootkit
        • Subvert Trust Controls
          • Mark-of-the-Web Bypass
          • SIP and Trust Provider Hijacking
          • Code Signing
          • Install Root Certificate
          • Gatekeeper Bypass
        • System Binary Proxy Execution
          • Compiled HTML File
          • Control Panel
          • CMSTP
          • InstallUtil
          • Mshta
          • Msiexec
          • Odbcconf
          • Regsvcs/Regasm
          • Regsvr32
          • Rundll32
          • Verclsid
          • Mavinject
          • MMC
        • System Script Proxy Execution
          • PubPrn
        • Template Injection
        • Traffic Signaling
        • Use Alternate Authentication Material
          • Application Access Token
          • Pass the Hash
          • Pass the Ticket
          • Web Session Cookie
        • Valid Accounts
        • Virtualization/Sandbox Evasion
          • System Checks
          • User Activity Based Checks
          • Time Based Evasion
        • Weaken Encryption
          • Reduce Key Space
          • Disable or Remove Encryption
        • XSL Script Processing
        • Credential Access
          • Adversary-in-the-Middle
            • LLMNR/NBT-NS Poisoning and SMB Relay
            • ARP Cache Poisoning
            • DHCP Spoofing
            • Evil Twin
          • Brute Force
            • Password Guessing
            • Password Cracking
            • Password Spraying
            • Credential Stuffing
          • Credentials from Password Stores
            • Credentials from Web Browsers
            • Windows Credential Manager
            • Credentials from Password Managers
          • Exploitation for Credential Access
          • Forced Authentication
          • Forge Web Credentials
            • Web Cookies
            • SAML Tokens
          • Input Capture
            • Keylogging
            • GUI Input Capture
            • Web Portal Capture
          • Modify Authentication Process
          • Multi-Factor Authentication Interception
          • Multi-Factor Authentication Request Generation
          • Network Sniffing
          • OS Credential Dumping
            • LSASS Memory
            • Security Account Manager
            • NTDS
            • LSA Secrets
            • Cached Domain Credentials
            • DCSync
            • Proc Filesystem
          • Steal Application Access Token
          • Steal or Forge Authentication Certificates
          • Steal or Forge Kerberos Tickets
            • Golden Ticket
            • Silver Ticket
            • Kerberoasting
          • Steal Web Session Cookie
          • Unsecured Credentials
            • Credentials in Files
            • Credentials in Registry
            • Bash History
            • Credentials in Configuration Files
        • Discovery
          • Account Discovery
            • Local Account
            • Domain Account
            • Cloud Account
          • Application Window Discovery
          • Browser Bookmark Discovery
          • Cloud Infrastructure Discovery
            • Cloud Storage Object Discovery
          • Cloud Service Dashboard
          • Cloud Service Discovery
          • Container and Resource Discovery
          • Domain Trust Discovery
          • File and Directory Discovery
          • Group Policy Discovery
          • Network Service Discovery
          • Network Share Discovery
          • Network Sniffing
          • Password Policy Discovery
          • Peripheral Device Discovery
          • Permission Groups Discovery
            • Local Groups
            • Domain Groups
            • Cloud Groups
          • Process Discovery
          • Query Registry
          • Remote System Discovery
          • Software Discovery
            • Security Software Discovery
            • Installed Services Discovery
          • System Information Discovery
          • System Location Discovery
            • System Language Discovery
          • System Network Configuration Discovery
            • Internet Connection Discovery
            • Domain Generation Algorithm Discovery
          • System Network Connections Discovery
          • System Owner/User Discovery
          • System Service Discovery
          • System Time Discovery
          • Virtualization/Sandbox Evasion
          • Wireless Network Discovery
        • Lateral Movement
          • Exploitation of Remote Services
          • Internal Spearphishing
          • Lateral Tool Transfer
          • Remote Service Session Hijacking
            • RDP Hijacking
          • Remote Services
            • Remote Desktop Protocol
            • Windows Admin Shares
            • Distributed Component Object Model
            • SSH
            • VNC
            • Apple Remote Desktop
            • Cloud Services
          • Replication Through Removable Media
          • Software Deployment Tools
          • Taint Shared Content
          • Use Alternate Authentication Material
        • Collection
          • Adversary-in-the-Middle
          • Archive Collected Data
            • Archive via Utility
            • Archive via Library
            • Archive via Custom Method
          • Audio Capture
          • Automated Collection
          • Browser Session Hijacking
          • Clipboard Data
          • Data from Cloud Storage
            • Cloud Storage Object
          • Data from Configuration Repository
            • SNMP MIB Dump
            • Network Device Configuration Dump
          • Data from Information Repositories
            • SharePoint
            • Code Repositories
            • Customer Relationship Management Software
            • Messaging Applications
          • Data from Local System
          • Data from Network Shared Drive
          • Data from Removable Media
          • Data Staged
            • Local Data Staging
            • Remote Data Staging
          • Email Collection
            • Local Email Collection
            • Remote Email Collection
            • Email Forwarding Rule
          • Input Capture
          • Screen Capture
          • Video Capture
        • Command and Control
          • Application Layer Protocol
            • Web Protocols
            • File Transfer Protocols
            • Mail Protocols
            • DNS
          • Communication Through Removable Media
          • Data Encoding
            • Standard Encoding
            • Non-Standard Encoding
          • Data Obfuscation
            • Junk Data
            • Steganography
            • Protocol Impersonation
          • Dynamic Resolution
            • Fast Flux DNS
            • Domain Generation Algorithms
            • DNS Calculation
          • Encrypted Channel
            • Symmetric Cryptography
            • Asymmetric Cryptography
          • Fallback Channels
          • Ingress Tool Transfer
          • Multi-Stage Channels
          • Non-Application Layer Protocol
          • Non-Standard Port
          • Protocol Tunneling
          • Proxy
            • Internal Proxy
            • External Proxy
            • Multi-hop Proxy
            • Domain Fronting
          • Remote Access Software
          • Traffic Signaling
          • Web Service
            • Dead Drop Resolver
            • Bidirectional Communication
            • One-Way Communication
        • Exfiltration
          • Automated Exfiltration
            • Traffic Duplication
          • Data Transfer Size Limits
          • Exfiltration Over Alternative Protocol
            • Exfiltration Over Symmetric Encrypted Non-C2 Protocol
            • Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
            • Exfiltration Over Unencrypted Non-C2 Protocol
          • Exfiltration Over C2 Channel
          • Exfiltration Over Other Network Medium
            • Exfiltration Over Bluetooth
          • Exfiltration Over Physical Medium
            • Exfiltration over USB
          • Exfiltration Over Web Service
            • Exfiltration to Cloud Storage
            • Exfiltration to Code Repository
            • Exfiltration to Text Storage Sites
            • Exfiltration Over Webhook
          • Scheduled Transfer
        • Impact
          • Account Access Removal
          • Data Destruction
            • Lifecycle/Trigger Deletion
          • Data Encrypted for Impact
          • Data Manipulation
            • Stored Data Manipulation
            • Transmitted Data Manipulation
            • Runtime Data Manipulation
          • Defacement
            • Internal Defacement
            • External Defacement
          • Disk Wipe
            • Disk Structure Wipe
            • Disk Content Wipe
          • Endpoint Denial of Service
            • OS Exhaustion Flood
            • Service Exhaustion Flood
            • Application Exhaustion Flood
            • Application or System Exploitation
          • Firmware Corruption
          • Inhibit System Recovery
          • Network Denial of Service
            • Direct Network Flood
            • Reflection Amplification
          • Resource Hijacking
            • SMS Pumping
          • Service Stop
          • System Shutdown/Reboot
  • Knowledge
    • eBPF
      • eBPF Helpers
        • map_xxx_elem (v3.19)
        • get_prandom_u32 (v4.1)
        • get_smp_processor_id (v4.1)
  • Research
    • Runtime Security
      • Valkyrie Response
Powered by GitBook

© 2025 • Jibril • by Garnet Labs

On this page
  1. Knowledge
  2. eBPF

eBPF Helpers

eBPF Helpers sorted by Release Date

The following table provides a comprehensive overview of eBPF helper functions, organized by the Linux kernel version in which they were introduced, from 3.19 to 6.2. Each entry includes the helper’s name, the kernel version, a link to the corresponding commit in the Linux kernel Git repository, and a brief description of its functionality.

These helpers are critical for BPF programs, enabling tasks such as network packet manipulation, system tracing, and security policy enforcement. Sorted in ascending order by kernel version, the table highlights the evolution of BPF capabilities.

HELPER
KERNEL
COMMIT ID
DESCRIPTION

map_delete_elem

3.19

Deletes an element from a BPF map by key.

map_lookup_elem

3.19

Looks up an element in a BPF map by key, returning a pointer to the value.

map_update_elem

3.19

Updates or inserts an element in a BPF map.

get_prandom_u32

4.1

Returns a pseudo-random 32-bit integer.

get_smp_processor_id

4.1

Returns the ID of the current CPU.

ktime_get_ns

4.1

Returns the current time in nanoseconds since boot.

l3_csum_replace

4.1

Replaces the layer 3 checksum in a packet.

l4_csum_replace

4.1

Replaces the layer 4 checksum in a packet.

probe_read

4.1

Safely reads kernel or user memory into a buffer.

skb_store_bytes

4.1

Stores bytes into a packet at a specified offset.

trace_printk

4.1

Prints formatted debug output to the trace buffer.

clone_redirect

4.2

Clones a packet and redirects it to an interface.

get_current_comm

4.2

Returns the name of the current process.

get_current_pid_tgid

4.2

Returns the PID and TGID of the current task.

get_current_uid_gid

4.2

Returns the UID and GID of the current task.

tail_call

4.2

Jumps to another BPF program in the same map.

get_cgroup_classid

4.3

Returns the class ID of the current cgroup.

perf_event_read

4.3

Reads a performance counter value.

skb_get_tunnel_key

4.3

Retrieves the tunnel key from a packet.

skb_set_tunnel_key

4.3

Sets the tunnel key for a packet.

skb_vlan_pop

4.3

Removes a VLAN tag from a packet.

skb_vlan_push

4.3

Adds a VLAN tag to a packet.

get_route_realm

4.4

Returns the routing realm of a packet.

perf_event_output

4.4

Outputs data to a perf event buffer.

redirect

4.4

Redirects a packet to a specified interface.

skb_load_bytes

4.5

Loads bytes from a packet into a buffer.

csum_diff

4.6

Computes checksum difference between two buffers.

get_stackid

4.6

Returns a unique ID for the current stack trace.

skb_get_tunnel_opt

4.6

Retrieves tunnel options from a packet.

skb_set_tunnel_opt

4.6

Sets tunnel options for a packet.

get_current_task

4.8

Returns a pointer to the current task structure.

get_hash_recalc

4.8

Recalculates the hash for a socket buffer.

probe_write_user

4.8

Safely writes data to user space memory.

skb_change_proto

4.8

Changes the protocol of a packet.

skb_change_type

4.8

Changes the type of a packet.

skb_under_cgroup

4.8

Checks if a packet belongs to a cgroup.

csum_update

4.9

Updates the checksum of a packet.

current_task_under_cgroup

4.9

Checks if the current task is in a specified cgroup.

set_hash_invalid

4.9

Invalidates the hash of a socket buffer.

skb_change_tail

4.9

Adjusts the tail pointer of a packet.

skb_pull_data

4.9

Pulls data from a packet, adjusting pointers.

get_numa_node_id

4.10

Returns the NUMA node ID of the current CPU.

skb_change_head

4.10

Adjusts the head pointer of a packet.

xdp_adjust_head

4.10

Adjusts the head of an XDP buffer.

probe_read_str

4.11

Safely reads a null-terminated string from memory.

get_socket_cookie

4.12

Returns a unique cookie for a socket.

get_socket_uid

4.12

Returns the UID of a socket’s owner.

set_hash

4.13

Sets the hash value for a socket buffer.

skb_adjust_room

4.13

Adjusts the room in a packet for data.

setsockopt

4.13

Sets socket options for a socket.

redirect_map

4.14

Redirects a packet using a BPF map.

sock_map_update

4.14

Updates a socket map with a socket.

getsockopt

4.15

Retrieves socket options from a socket.

perf_event_read_value

4.15

Reads a performance counter with additional metadata.

perf_prog_read_value

4.15

Reads performance program-specific values.

xdp_adjust_meta

4.15

Adjusts the metadata of an XDP buffer.

override_return

4.16

Overrides the return value of a function.

sock_ops_cb_flags_set

4.16

Sets callback flags for socket operations.

bind

4.17

Binds a socket to an address.

msg_apply_bytes

4.17

Applies bytes to a socket message.

msg_cork_bytes

4.17

Corks bytes for a socket message.

msg_pull_data

4.17

Pulls data from a socket message.

msg_redirect_map

4.17

Redirects a socket message using a BPF map.

fib_lookup

4.18

Performs a FIB (Forwarding Information Base) lookup.

get_current_cgroup_id

4.18

Returns the ID of the current cgroup.

get_stack

4.18

Captures the current stack trace.

lwt_push_encap

4.18

Pushes encapsulation headers for LWT (Lightweight Tunneling).

lwt_seg6_action

4.18

Performs Segment Routing v6 actions.

lwt_seg6_adjust_srh

4.18

Adjusts the Segment Routing Header (SRH).

lwt_seg6_store_bytes

4.18

Stores bytes in a Segment Routing v6 packet.

rc_keydown

4.18

Sends a remote control key press event.

rc_repeat

4.18

Sends a remote control repeat event.

sk_redirect_hash

4.18

Redirects a socket using a hash-based map.

skb_cgroup_id

4.18

Returns the cgroup ID of a packet.

skb_get_xfrm_state

4.18

Retrieves the XFRM (IPsec) state of a packet.

skb_load_bytes_relative

4.18

Loads bytes from a packet relative to a header.

sock_hash_update

4.18

Updates a socket hash map.

xdp_adjust_tail

4.18

Adjusts the tail of an XDP buffer.

get_local_storage

4.19

Retrieves per-CPU local storage for a task.

sk_select_reuseport

4.19

Selects a reuseport socket for load balancing.

skb_ancestor_cgroup_id

4.19

Returns the cgroup ID of a packet’s ancestor.

map_peek_elem

4.20

Peeks at an element in a queue or stack map.

map_pop_elem

4.20

Pops an element from a queue or stack map.

map_push_elem

4.20

Pushes an element onto a queue or stack map.

msg_push_data

4.20

Pushes data into a socket message.

sk_lookup_tcp

4.20

Looks up a TCP socket by address and port.

sk_lookup_udp

4.20

Looks up a UDP socket by address and port.

sk_release

4.20

Releases a socket reference.

msg_pop_data

5.0

Pops data from a socket message.

rc_pointer_rel

5.0

Adjusts the pointer for a remote control event.

get_listener_sock

5.1

Retrieves the listener socket for a connection.

sk_fullsock

5.1

Returns the full socket structure.

skb_ecn_set_ce

5.1

Sets the ECN Congestion Experienced flag.

spin_lock

5.1

Acquires a spinlock for synchronization.

spin_unlock

5.1

Releases a spinlock.

tcp_sock

5.1

Returns the TCP socket structure.

sk_storage_delete

5.2

Deletes storage associated with a socket.

sk_storage_get

5.2

Retrieves storage associated with a socket.

skc_lookup_tcp

5.2

Looks up a TCP socket in a specific context.

strtol

5.2

Converts a string to a long integer.

strtoul

5.2

Converts a string to an unsigned long integer.

sysctl_get_current_value

5.2

Retrieves the current sysctl value.

sysctl_get_name

5.2

Retrieves the name of a sysctl.

sysctl_get_new_value

5.2

Retrieves the new sysctl value during a change.

sysctl_set_new_value

5.2

Sets a new sysctl value.

tcp_check_syncookie

5.2

Checks a TCP SYN cookie for validity.

send_signal

5.3

Sends a signal to a process.

tcp_gen_syncookie

5.3

Generates a TCP SYN cookie.

jiffies64

5.5

Returns the 64-bit jiffies counter.

probe_read_kernel

5.5

Safely reads kernel memory.

probe_read_kernel_str

5.5

Safely reads a kernel string.

probe_read_user

5.5

Safely reads user space memory.

probe_read_user_str

5.5

Safely reads a user space string.

send_signal_thread

5.5

Sends a signal to a specific thread.

skb_output

5.5

Outputs a packet to a network device.

tcp_send_ack

5.5

Sends a TCP ACK packet.

get_current_ancestor_cgroup_id

5.6

Returns the ID of an ancestor cgroup.

read_branch_records

5.6

Reads branch records for profiling.

sk_assign

5.6

Assigns a socket to a specific context.

xdp_output

5.6

Outputs an XDP buffer to a network device.

csum_level

5.7

Updates checksums for a specific protocol level.

get_netns_cookie

5.7

Returns a cookie for the current network namespace.

get_ns_current_pid_tgid

5.7

Returns PID and TGID in a specific namespace.

seq_printf

5.7

Prints formatted output to a seq_file.

seq_write

5.7

Writes raw data to a seq_file.

sk_ancestor_cgroup_id

5.7

Returns the ID of a socket’s ancestor cgroup.

sk_cgroup_id

5.7

Returns the cgroup ID of a socket.

ktime_get_boot_ns

5.8

Returns boot time in nanoseconds.

ringbuf_discard

5.8

Discards a reserved ring buffer entry.

ringbuf_output

5.8

Outputs data to a ring buffer.

ringbuf_query

5.8

Queries ring buffer status.

ringbuf_reserve

5.8

Reserves space in a ring buffer.

ringbuf_submit

5.8

Submits a ring buffer entry.

get_task_stack

5.9

Retrieves the stack of a specified task.

skc_to_tcp_sock

5.9

Converts a socket context to a TCP socket.

skc_to_tcp_request_sock

5.9

Converts a socket context to a TCP request socket.

skc_to_tcp_timewait_sock

5.9

Converts a socket context to a TCP timewait socket.

skc_to_tcp6_sock

5.9

Converts a socket context to a TCPv6 socket.

skc_to_udp6_sock

5.9

Converts a socket context to a UDPv6 socket.

copy_from_user

5.10

Copies data from user space to kernel space.

d_path

5.10

Returns the path of a dentry.

inode_storage_delete

5.10

Deletes storage associated with an inode.

inode_storage_get

5.10

Retrieves storage associated with an inode.

load_hdr_opt

5.10

Loads header options for a packet.

per_cpu_ptr

5.10

Returns a pointer to per-CPU data.

redirect_neigh

5.10

Redirects a packet to a neighbor.

redirect_peer

5.10

Redirects a packet to a peer.

reserve_hdr_opt

5.10

Reserves space for header options.

seq_printf_btf

5.10

Prints BTF-formatted data to a seq_file.

skb_cgroup_classid

5.10

Returns the class ID of a packet’s cgroup.

snprintf_btf

5.10

Formats BTF data into a string.

store_hdr_opt

5.10

Stores header options for a packet.

this_cpu_ptr

5.10

Returns a pointer to data on the current CPU.

bprm_opts_set

5.11

Sets options for a binary process.

get_current_task_btf

5.11

Returns the current task in BTF format.

ima_inode_hash

5.11

Computes the IMA hash of an inode.

ktime_get_coarse_ns

5.11

Returns coarse-grained time in nanoseconds.

sock_from_file

5.11

Retrieves a socket from a file descriptor.

task_storage_delete

5.11

Deletes storage associated with a task.

task_storage_get

5.11

Retrieves storage associated with a task.

check_mtu

5.12

Checks the MTU for a network device.

for_each_map_elem

5.13

Iterates over elements in a BPF map.

snprintf

5.13

Formats a string with a specified buffer size.

btf_find_by_name_kind

5.14

Finds a BTF type by name and kind.

sys_bpf

5.14

Executes a BPF system call from a program.

sys_close

5.14

Closes a file descriptor.

get_attach_cookie

5.15

Retrieves a cookie for a BPF attachment.

get_func_ip

5.15

Returns the instruction pointer of a function.

task_pt_regs

5.15

Returns the registers of a task.

timer_cancel

5.15

Cancels a BPF timer.

timer_init

5.15

Initializes a BPF timer.

timer_set_callback

5.15

Sets the callback for a BPF timer.

timer_start

5.15

Starts a BPF timer.

get_branch_snapshot

5.16

Captures a snapshot of branch records.

kallsyms_lookup_name

5.16

Looks up a kernel symbol by name.

skc_to_unix_sock

5.16

Converts a socket context to a UNIX socket.

trace_vprintk

5.16

Prints variable arguments to the trace buffer.

find_vma

5.17

Finds a virtual memory area for an address.

get_func_arg

5.17

Retrieves a function argument by index.

get_func_arg_cnt

5.17

Returns the number of function arguments.

get_func_ret

5.17

Retrieves the return value of a function.

loop

5.17

Executes a bounded loop in a BPF program.

strncmp

5.17

Compares two strings up to a specified length.

copy_from_user_task

5.18

Copies data from a task’s user space.

get_retval

5.18

Retrieves the return value of a program.

ima_file_hash

5.18

Computes the IMA hash of a file.

set_retval

5.18

Sets the return value of a program.

skb_set_tstamp

5.18

Sets the timestamp of a packet.

xdp_get_buff_len

5.18

Returns the length of an XDP buffer.

xdp_load_bytes

5.18

Loads bytes from an XDP buffer.

xdp_store_bytes

5.18

Stores bytes in an XDP buffer.

dynptr_data

5.19

Retrieves data from a dynamic pointer.

dynptr_from_mem

5.19

Creates a dynamic pointer from memory.

dynptr_read

5.19

Reads data from a dynamic pointer.

dynptr_write

5.19

Writes data to a dynamic pointer.

kptr_xchg

5.19

Exchanges a kernel pointer atomically.

map_lookup_percpu_elem

5.19

Looks up a per-CPU element in a map.

ringbuf_discard_dynptr

5.19

Discards a ring buffer entry via a dynamic pointer.

ringbuf_reserve_dynptr

5.19

Reserves a ring buffer entry via a dynamic pointer.

ringbuf_submit_dynptr

5.19

Submits a ring buffer entry via a dynamic pointer.

skc_to_mctcp_sock

5.19

Converts a socket context to an MCTCP socket.

tcp_raw_check_syncookie_ipv4

6.0

Checks an IPv4 TCP SYN cookie in raw mode.

tcp_raw_check_syncookie_ipv6

6.0

Checks an IPv6 TCP SYN cookie in raw mode.

tcp_raw_gen_syncookie_ipv4

6.0

Generates an IPv4 TCP SYN cookie in raw mode.

tcp_raw_gen_syncookie_ipv6

6.0

Generates an IPv6 TCP SYN cookie in raw mode.

ktime_get_tai_ns

6.1

Returns TAI time in nanoseconds.

user_ringbuf_drain

6.1

Drains a user-space ring buffer.

cgrp_storage_delete

6.2

Deletes storage associated with a cgroup.

cgrp_storage_get

6.2

Retrieves storage associated with a cgroup.

Last updated 7 days ago

d0003ec01c66
d0003ec01c66
d0003ec01c66
03e69b508b6f
c04167ce2ca0
d9847d310ab4
91bc4822c3d6
91bc4822c3d6
2541517c32be
91bc4822c3d6
9c959c863f82
3896d655f4d4
ffeedafbf023
ffeedafbf023
ffeedafbf023
04fd61ab36ec
8d20aabe1c76
35578d798400
d3aa45ce6b94
d3aa45ce6b94
4e10df9a60d9
4e10df9a60d9
c46646d0484f
a43eec304259
27b29f63058d
05c74e5e53f6
7d672345ed29
d5a3b1f69186
14ca0751c96f
14ca0751c96f
606274c5abd8
13c5c240f789
96ae52279594
6578171a7ff0
d2485c4242a8
4a482f34afcc
36bbef52c7eb
60d20f9195b2
7a4b28c6cc9f
5293efe62df8
36bbef52c7eb
2d0e30c30f84
3a0af8fd61f9
17bedab27231
a5e8c07059d0
91b8270f2a4d
6acc5c291068
ded092cd73c2
2be7e212d541
8c4b4c7e9ff0
97f91a7cf04f
174a79ff9515
cd86d1fd2102
908432ca84fc
4bebdc7a85aa
de8f3a83b0a0
9802d86585db
b13d88072172
d74bad4e74ee
2a100317c9eb
91843d540a13
015632bb30da
4f738adba30a
87f5fc7e48dd
bf6fa2c893c5
de2ff05f48af
fe94cc290f53
fe94cc290f53
fe94cc290f53
fe94cc290f53
f4364dcfc86d
f4364dcfc86d
81110384441a
cb20b08ead40
12bed760a78d
4e1ec56cdc59
81110384441a
b32cc5b9a346
cd3394317653
2dbb9b9e6df6
7723628101aa
f1a2e44a3aec
f1a2e44a3aec
f1a2e44a3aec
6fff607e2f14
6acc9b432e67
6acc9b432e67
6acc9b432e67
7246d8ed4dcc
01d3240a04f4
dbafd7ddd623
46f8bc92758c
f7c917ba11a6
d83525ca62cf
d83525ca62cf
655a51e536c0
6ac99e8f23d4
6ac99e8f23d4
edbf8c01de5a
d7a4cb9b6705
d7a4cb9b6705
1d11b3016cec
808649fb787d
4e63acdff864
4e63acdff864
399040847084
8b401f9ed244
70d66244317e
5576b991e9c1
6ae08ae3dea2
6ae08ae3dea2
6ae08ae3dea2
6ae08ae3dea2
8482941f0906
a7658e1a4164
206057fe020a
b4490c5c4e02
fff7b64355ea
cf7fbe660f2d
d831ee84bfc9
7cdec54f9713
f318903c0bf4
b4490c5c4e02
492e639f0c22
492e639f0c22
f307fa2cb4c9
f307fa2cb4c9
71d19214776e
457f44363a88
457f44363a88
457f44363a88
457f44363a88
457f44363a88
fa28dcb82a38
478cfbdf5f13
478cfbdf5f13
478cfbdf5f13
af7ec1383361
0d4fad3e57df
07be4c4a3e7a
6e22ab9da793
8ea636848aca
8ea636848aca
0813a841566f
eaa6bcb71ef6
b4ab31414970
9aa1206e8f48
0813a841566f
eb411377aed9
b426ce83baa7
c4d0bfb45068
0813a841566f
63d9b80dcf2c
3f6719c7b62f
3ca1032ab7ab
27672f0d280a
d05512618056
4f19cab76136
4cf1bc1f1045
4cf1bc1f1045
34b2021cc616
69c087ba6225
7b15523a989b
3d78417b60fb
79a7f8bdb159
3abea089246f
7adfc6c9b315
5d8b583d04ae
dd6e10fbd9f
b00628b1c7d5
b00628b1c7d5
b00628b1c7d5
b00628b1c7d5
856c02dbce4f
d6aef08a872b
9eeb3aa33ae0
10aceb629e19
7c7e3d31e785
f92c1e183604
f92c1e183604
f92c1e183604
e6f2dd0f8067
c5fb19937455
376040e47334
b44123b4a3dc
174b16946e39
b44123b4a3dc
9bb984f28d5b
0165cc817075
3f364222d032
3f364222d032
34d4ef5775f7
263ae152e962
13bbbfbea759
13bbbfbea759
c0a5a21c25f3
07343110b293
bc34dee65a65
bc34dee65a65
bc34dee65a65
3bc253c2e652
33bf9885040c
33bf9885040c
33bf9885040c
33bf9885040c
c8996c98f703
205715673844
c4bcfb38a95e
c4bcfb38a95e