xref: /linux/tools/lib/bpf/bpf.h (revision 621cde16e49b3ecf7d59a8106a20aaebfb4a59a9)
11bc38b8fSAlexei Starovoitov /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
26061a3d6SEric Leblond 
3e3ed2fefSWang Nan /*
40a504fa1SIlya Leoshkevich  * Common BPF ELF operations.
5e3ed2fefSWang Nan  *
6e3ed2fefSWang Nan  * Copyright (C) 2013-2015 Alexei Starovoitov <ast@kernel.org>
7e3ed2fefSWang Nan  * Copyright (C) 2015 Wang Nan <wangnan0@huawei.com>
8e3ed2fefSWang Nan  * Copyright (C) 2015 Huawei Inc.
9203d1cacSWang Nan  *
10203d1cacSWang Nan  * This program is free software; you can redistribute it and/or
11203d1cacSWang Nan  * modify it under the terms of the GNU Lesser General Public
12203d1cacSWang Nan  * License as published by the Free Software Foundation;
13203d1cacSWang Nan  * version 2.1 of the License (not later!)
14203d1cacSWang Nan  *
15203d1cacSWang Nan  * This program is distributed in the hope that it will be useful,
16203d1cacSWang Nan  * but WITHOUT ANY WARRANTY; without even the implied warranty of
17203d1cacSWang Nan  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
18203d1cacSWang Nan  * GNU Lesser General Public License for more details.
19203d1cacSWang Nan  *
20203d1cacSWang Nan  * You should have received a copy of the GNU Lesser General Public
21203d1cacSWang Nan  * License along with this program; if not,  see <http://www.gnu.org/licenses>
22e3ed2fefSWang Nan  */
23eff81908SAndrey Ignatov #ifndef __LIBBPF_BPF_H
24eff81908SAndrey Ignatov #define __LIBBPF_BPF_H
25e3ed2fefSWang Nan 
26e3ed2fefSWang Nan #include <linux/bpf.h>
27878a4d32SBjörn Töpel #include <stdbool.h>
287a5980f9SMickaël Salaün #include <stddef.h>
2932e621e5SDaniel T. Lee #include <stdint.h>
30e3ed2fefSWang Nan 
31544402d4SAndrii Nakryiko #include "libbpf_common.h"
32be80e9cdSAndrii Nakryiko #include "libbpf_legacy.h"
33544402d4SAndrii Nakryiko 
348c4905b9SStanislav Fomichev #ifdef __cplusplus
358c4905b9SStanislav Fomichev extern "C" {
368c4905b9SStanislav Fomichev #endif
378c4905b9SStanislav Fomichev 
3893ee1eb8SAndrii Nakryiko LIBBPF_API int libbpf_set_memlock_rlim(size_t memlock_bytes);
39e542f2c4SAndrii Nakryiko 
40992c4225SAndrii Nakryiko struct bpf_map_create_opts {
41992c4225SAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
42992c4225SAndrii Nakryiko 
43992c4225SAndrii Nakryiko 	__u32 btf_fd;
44992c4225SAndrii Nakryiko 	__u32 btf_key_type_id;
45992c4225SAndrii Nakryiko 	__u32 btf_value_type_id;
46992c4225SAndrii Nakryiko 	__u32 btf_vmlinux_value_type_id;
47992c4225SAndrii Nakryiko 
4874d98070SAndrii Nakryiko 	__u32 inner_map_fd;
4974d98070SAndrii Nakryiko 	__u32 map_flags;
50992c4225SAndrii Nakryiko 	__u64 map_extra;
51992c4225SAndrii Nakryiko 
5274d98070SAndrii Nakryiko 	__u32 numa_node;
5374d98070SAndrii Nakryiko 	__u32 map_ifindex;
549e926acdSKui-Feng Lee 	__s32 value_type_btf_obj_fd;
55364f8483SAndrii Nakryiko 
56364f8483SAndrii Nakryiko 	__u32 token_fd;
579e926acdSKui-Feng Lee 	size_t :0;
58992c4225SAndrii Nakryiko };
59364f8483SAndrii Nakryiko #define bpf_map_create_opts__last_field token_fd
60992c4225SAndrii Nakryiko 
61992c4225SAndrii Nakryiko LIBBPF_API int bpf_map_create(enum bpf_map_type map_type,
62992c4225SAndrii Nakryiko 			      const char *map_name,
63992c4225SAndrii Nakryiko 			      __u32 key_size,
64992c4225SAndrii Nakryiko 			      __u32 value_size,
65992c4225SAndrii Nakryiko 			      __u32 max_entries,
66992c4225SAndrii Nakryiko 			      const struct bpf_map_create_opts *opts);
67992c4225SAndrii Nakryiko 
68d10ef2b8SAndrii Nakryiko struct bpf_prog_load_opts {
69d10ef2b8SAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
70d10ef2b8SAndrii Nakryiko 
71d10ef2b8SAndrii Nakryiko 	/* libbpf can retry BPF_PROG_LOAD command if bpf() syscall returns
72d10ef2b8SAndrii Nakryiko 	 * -EAGAIN. This field determines how many attempts libbpf has to
73d10ef2b8SAndrii Nakryiko 	 *  make. If not specified, libbpf will use default value of 5.
74d10ef2b8SAndrii Nakryiko 	 */
75d10ef2b8SAndrii Nakryiko 	int attempts;
76d10ef2b8SAndrii Nakryiko 
77d10ef2b8SAndrii Nakryiko 	enum bpf_attach_type expected_attach_type;
78d10ef2b8SAndrii Nakryiko 	__u32 prog_btf_fd;
79d10ef2b8SAndrii Nakryiko 	__u32 prog_flags;
80d10ef2b8SAndrii Nakryiko 	__u32 prog_ifindex;
81d10ef2b8SAndrii Nakryiko 	__u32 kern_version;
82d10ef2b8SAndrii Nakryiko 
83d10ef2b8SAndrii Nakryiko 	__u32 attach_btf_id;
84d10ef2b8SAndrii Nakryiko 	__u32 attach_prog_fd;
85d10ef2b8SAndrii Nakryiko 	__u32 attach_btf_obj_fd;
86d10ef2b8SAndrii Nakryiko 
87d10ef2b8SAndrii Nakryiko 	const int *fd_array;
88d10ef2b8SAndrii Nakryiko 
89d10ef2b8SAndrii Nakryiko 	/* .BTF.ext func info data */
90d10ef2b8SAndrii Nakryiko 	const void *func_info;
91d10ef2b8SAndrii Nakryiko 	__u32 func_info_cnt;
92d10ef2b8SAndrii Nakryiko 	__u32 func_info_rec_size;
93d10ef2b8SAndrii Nakryiko 
94d10ef2b8SAndrii Nakryiko 	/* .BTF.ext line info data */
95d10ef2b8SAndrii Nakryiko 	const void *line_info;
96d10ef2b8SAndrii Nakryiko 	__u32 line_info_cnt;
97d10ef2b8SAndrii Nakryiko 	__u32 line_info_rec_size;
98d10ef2b8SAndrii Nakryiko 
99d10ef2b8SAndrii Nakryiko 	/* verifier log options */
100d10ef2b8SAndrii Nakryiko 	__u32 log_level;
101d10ef2b8SAndrii Nakryiko 	__u32 log_size;
102d10ef2b8SAndrii Nakryiko 	char *log_buf;
10394e55c0fSAndrii Nakryiko 	/* output: actual total log contents size (including termintaing zero).
10494e55c0fSAndrii Nakryiko 	 * It could be both larger than original log_size (if log was
10594e55c0fSAndrii Nakryiko 	 * truncated), or smaller (if log buffer wasn't filled completely).
10694e55c0fSAndrii Nakryiko 	 * If kernel doesn't support this feature, log_size is left unchanged.
10794e55c0fSAndrii Nakryiko 	 */
10894e55c0fSAndrii Nakryiko 	__u32 log_true_size;
109404cbc14SAndrii Nakryiko 	__u32 token_fd;
11094e55c0fSAndrii Nakryiko 	size_t :0;
111d10ef2b8SAndrii Nakryiko };
112404cbc14SAndrii Nakryiko #define bpf_prog_load_opts__last_field token_fd
113d10ef2b8SAndrii Nakryiko 
114d10ef2b8SAndrii Nakryiko LIBBPF_API int bpf_prog_load(enum bpf_prog_type prog_type,
115d10ef2b8SAndrii Nakryiko 			     const char *prog_name, const char *license,
116d10ef2b8SAndrii Nakryiko 			     const struct bpf_insn *insns, size_t insn_cnt,
11794e55c0fSAndrii Nakryiko 			     struct bpf_prog_load_opts *opts);
118d7be143bSAndrey Ignatov 
119c034a177SJohn Fastabend /* Flags to direct loading requirements */
120c034a177SJohn Fastabend #define MAPS_RELAX_COMPAT	0x01
121c034a177SJohn Fastabend 
122e0e3ea88SAndrii Nakryiko /* Recommended log buffer size */
1234519efa6SMcCabe, Robert J #define BPF_LOG_BUF_SIZE (UINT32_MAX >> 8) /* verifier maximum in kernels <= 5.1 */
124e0e3ea88SAndrii Nakryiko 
1250ed08d67SAndrii Nakryiko struct bpf_btf_load_opts {
1260ed08d67SAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
1270ed08d67SAndrii Nakryiko 
1280ed08d67SAndrii Nakryiko 	/* kernel log options */
1290ed08d67SAndrii Nakryiko 	char *log_buf;
1300ed08d67SAndrii Nakryiko 	__u32 log_level;
1310ed08d67SAndrii Nakryiko 	__u32 log_size;
132097d8002SAndrii Nakryiko 	/* output: actual total log contents size (including termintaing zero).
133097d8002SAndrii Nakryiko 	 * It could be both larger than original log_size (if log was
134097d8002SAndrii Nakryiko 	 * truncated), or smaller (if log buffer wasn't filled completely).
135097d8002SAndrii Nakryiko 	 * If kernel doesn't support this feature, log_size is left unchanged.
136097d8002SAndrii Nakryiko 	 */
137097d8002SAndrii Nakryiko 	__u32 log_true_size;
138a3d63e85SAndrii Nakryiko 
139a3d63e85SAndrii Nakryiko 	__u32 btf_flags;
140a3d63e85SAndrii Nakryiko 	__u32 token_fd;
141097d8002SAndrii Nakryiko 	size_t :0;
1420ed08d67SAndrii Nakryiko };
143a3d63e85SAndrii Nakryiko #define bpf_btf_load_opts__last_field token_fd
1440ed08d67SAndrii Nakryiko 
1450ed08d67SAndrii Nakryiko LIBBPF_API int bpf_btf_load(const void *btf_data, size_t btf_size,
146097d8002SAndrii Nakryiko 			    struct bpf_btf_load_opts *opts);
1470ed08d67SAndrii Nakryiko 
148ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_update_elem(int fd, const void *key, const void *value,
14983d994d0SJoe Stringer 				   __u64 flags);
1509742da01SWang Nan 
151ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_lookup_elem(int fd, const void *key, void *value);
152df5d22faSAlexei Starovoitov LIBBPF_API int bpf_map_lookup_elem_flags(int fd, const void *key, void *value,
153df5d22faSAlexei Starovoitov 					 __u64 flags);
15443b987d2SMauricio Vasquez B LIBBPF_API int bpf_map_lookup_and_delete_elem(int fd, const void *key,
15543b987d2SMauricio Vasquez B 					      void *value);
156d59b9f2dSDenis Salopek LIBBPF_API int bpf_map_lookup_and_delete_elem_flags(int fd, const void *key,
157d59b9f2dSDenis Salopek 						    void *value, __u64 flags);
158ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_delete_elem(int fd, const void *key);
159737d0646SAndrii Nakryiko LIBBPF_API int bpf_map_delete_elem_flags(int fd, const void *key, __u64 flags);
160ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_get_next_key(int fd, const void *key, void *next_key);
161d859900cSDaniel Borkmann LIBBPF_API int bpf_map_freeze(int fd);
1622ab3d86eSYonghong Song 
1632ab3d86eSYonghong Song struct bpf_map_batch_opts {
1642ab3d86eSYonghong Song 	size_t sz; /* size of this struct for forward/backward compatibility */
1652ab3d86eSYonghong Song 	__u64 elem_flags;
1662ab3d86eSYonghong Song 	__u64 flags;
1672ab3d86eSYonghong Song };
1682ab3d86eSYonghong Song #define bpf_map_batch_opts__last_field flags
1692ab3d86eSYonghong Song 
170e59618f0SGrant Seltzer 
171e59618f0SGrant Seltzer /**
172e59618f0SGrant Seltzer  * @brief **bpf_map_delete_batch()** allows for batch deletion of multiple
173e59618f0SGrant Seltzer  * elements in a BPF map.
174e59618f0SGrant Seltzer  *
175e59618f0SGrant Seltzer  * @param fd BPF map file descriptor
176e59618f0SGrant Seltzer  * @param keys pointer to an array of *count* keys
177e59618f0SGrant Seltzer  * @param count input and output parameter; on input **count** represents the
178e59618f0SGrant Seltzer  * number of  elements in the map to delete in batch;
179e59618f0SGrant Seltzer  * on output if a non-EFAULT error is returned, **count** represents the number of deleted
180e59618f0SGrant Seltzer  * elements if the output **count** value is not equal to the input **count** value
181e59618f0SGrant Seltzer  * If EFAULT is returned, **count** should not be trusted to be correct.
182e59618f0SGrant Seltzer  * @param opts options for configuring the way the batch deletion works
183e59618f0SGrant Seltzer  * @return 0, on success; negative error code, otherwise (errno is also set to
184e59618f0SGrant Seltzer  * the error code)
185e59618f0SGrant Seltzer  */
186e59618f0SGrant Seltzer LIBBPF_API int bpf_map_delete_batch(int fd, const void *keys,
1872ab3d86eSYonghong Song 				    __u32 *count,
1882ab3d86eSYonghong Song 				    const struct bpf_map_batch_opts *opts);
189e59618f0SGrant Seltzer 
190e59618f0SGrant Seltzer /**
191e59618f0SGrant Seltzer  * @brief **bpf_map_lookup_batch()** allows for batch lookup of BPF map elements.
192e59618f0SGrant Seltzer  *
19358fd62e0SMartin Kelly  * The parameter *in_batch* is the address of the first element in the batch to
19458fd62e0SMartin Kelly  * read. *out_batch* is an output parameter that should be passed as *in_batch*
19558fd62e0SMartin Kelly  * to subsequent calls to **bpf_map_lookup_batch()**. NULL can be passed for
19658fd62e0SMartin Kelly  * *in_batch* to indicate that the batched lookup starts from the beginning of
19758fd62e0SMartin Kelly  * the map. Both *in_batch* and *out_batch* must point to memory large enough to
19858fd62e0SMartin Kelly  * hold a single key, except for maps of type **BPF_MAP_TYPE_{HASH, PERCPU_HASH,
19958fd62e0SMartin Kelly  * LRU_HASH, LRU_PERCPU_HASH}**, for which the memory size must be at
20058fd62e0SMartin Kelly  * least 4 bytes wide regardless of key size.
201e59618f0SGrant Seltzer  *
202e59618f0SGrant Seltzer  * The *keys* and *values* are output parameters which must point to memory large enough to
203e59618f0SGrant Seltzer  * hold *count* items based on the key and value size of the map *map_fd*. The *keys*
204e59618f0SGrant Seltzer  * buffer must be of *key_size* * *count*. The *values* buffer must be of
205e59618f0SGrant Seltzer  * *value_size* * *count*.
206e59618f0SGrant Seltzer  *
207e59618f0SGrant Seltzer  * @param fd BPF map file descriptor
208e59618f0SGrant Seltzer  * @param in_batch address of the first element in batch to read, can pass NULL to
209e59618f0SGrant Seltzer  * indicate that the batched lookup starts from the beginning of the map.
210e59618f0SGrant Seltzer  * @param out_batch output parameter that should be passed to next call as *in_batch*
211e59618f0SGrant Seltzer  * @param keys pointer to an array large enough for *count* keys
212e59618f0SGrant Seltzer  * @param values pointer to an array large enough for *count* values
213e59618f0SGrant Seltzer  * @param count input and output parameter; on input it's the number of elements
214e59618f0SGrant Seltzer  * in the map to read in batch; on output it's the number of elements that were
215e59618f0SGrant Seltzer  * successfully read.
216e59618f0SGrant Seltzer  * If a non-EFAULT error is returned, count will be set as the number of elements
217e59618f0SGrant Seltzer  * that were read before the error occurred.
218e59618f0SGrant Seltzer  * If EFAULT is returned, **count** should not be trusted to be correct.
219e59618f0SGrant Seltzer  * @param opts options for configuring the way the batch lookup works
220e59618f0SGrant Seltzer  * @return 0, on success; negative error code, otherwise (errno is also set to
221e59618f0SGrant Seltzer  * the error code)
222e59618f0SGrant Seltzer  */
2232ab3d86eSYonghong Song LIBBPF_API int bpf_map_lookup_batch(int fd, void *in_batch, void *out_batch,
2242ab3d86eSYonghong Song 				    void *keys, void *values, __u32 *count,
2252ab3d86eSYonghong Song 				    const struct bpf_map_batch_opts *opts);
226e59618f0SGrant Seltzer 
227e59618f0SGrant Seltzer /**
228e59618f0SGrant Seltzer  * @brief **bpf_map_lookup_and_delete_batch()** allows for batch lookup and deletion
229e59618f0SGrant Seltzer  * of BPF map elements where each element is deleted after being retrieved.
230e59618f0SGrant Seltzer  *
231e59618f0SGrant Seltzer  * @param fd BPF map file descriptor
232e59618f0SGrant Seltzer  * @param in_batch address of the first element in batch to read, can pass NULL to
23358fd62e0SMartin Kelly  * get address of the first element in *out_batch*. If not NULL, must be large
23458fd62e0SMartin Kelly  * enough to hold a key. For **BPF_MAP_TYPE_{HASH, PERCPU_HASH, LRU_HASH,
23558fd62e0SMartin Kelly  * LRU_PERCPU_HASH}**, the memory size must be at least 4 bytes wide regardless
23658fd62e0SMartin Kelly  * of key size.
237e59618f0SGrant Seltzer  * @param out_batch output parameter that should be passed to next call as *in_batch*
238e59618f0SGrant Seltzer  * @param keys pointer to an array of *count* keys
239e59618f0SGrant Seltzer  * @param values pointer to an array large enough for *count* values
240e59618f0SGrant Seltzer  * @param count input and output parameter; on input it's the number of elements
241e59618f0SGrant Seltzer  * in the map to read and delete in batch; on output it represents the number of
242e59618f0SGrant Seltzer  * elements that were successfully read and deleted
243e59618f0SGrant Seltzer  * If a non-**EFAULT** error code is returned and if the output **count** value
244e59618f0SGrant Seltzer  * is not equal to the input **count** value, up to **count** elements may
245e59618f0SGrant Seltzer  * have been deleted.
246e59618f0SGrant Seltzer  * if **EFAULT** is returned up to *count* elements may have been deleted without
247e59618f0SGrant Seltzer  * being returned via the *keys* and *values* output parameters.
248e59618f0SGrant Seltzer  * @param opts options for configuring the way the batch lookup and delete works
249e59618f0SGrant Seltzer  * @return 0, on success; negative error code, otherwise (errno is also set to
250e59618f0SGrant Seltzer  * the error code)
251e59618f0SGrant Seltzer  */
2522ab3d86eSYonghong Song LIBBPF_API int bpf_map_lookup_and_delete_batch(int fd, void *in_batch,
2532ab3d86eSYonghong Song 					void *out_batch, void *keys,
2542ab3d86eSYonghong Song 					void *values, __u32 *count,
2552ab3d86eSYonghong Song 					const struct bpf_map_batch_opts *opts);
256e59618f0SGrant Seltzer 
257e59618f0SGrant Seltzer /**
258e59618f0SGrant Seltzer  * @brief **bpf_map_update_batch()** updates multiple elements in a map
259e59618f0SGrant Seltzer  * by specifying keys and their corresponding values.
260e59618f0SGrant Seltzer  *
261e59618f0SGrant Seltzer  * The *keys* and *values* parameters must point to memory large enough
262e59618f0SGrant Seltzer  * to hold *count* items based on the key and value size of the map.
263e59618f0SGrant Seltzer  *
264e59618f0SGrant Seltzer  * The *opts* parameter can be used to control how *bpf_map_update_batch()*
265e59618f0SGrant Seltzer  * should handle keys that either do or do not already exist in the map.
266e59618f0SGrant Seltzer  * In particular the *flags* parameter of *bpf_map_batch_opts* can be
267e59618f0SGrant Seltzer  * one of the following:
268e59618f0SGrant Seltzer  *
269e59618f0SGrant Seltzer  * Note that *count* is an input and output parameter, where on output it
270e59618f0SGrant Seltzer  * represents how many elements were successfully updated. Also note that if
271e59618f0SGrant Seltzer  * **EFAULT** then *count* should not be trusted to be correct.
272e59618f0SGrant Seltzer  *
273e59618f0SGrant Seltzer  * **BPF_ANY**
274e59618f0SGrant Seltzer  *    Create new elements or update existing.
275e59618f0SGrant Seltzer  *
276e59618f0SGrant Seltzer  * **BPF_NOEXIST**
277e59618f0SGrant Seltzer  *    Create new elements only if they do not exist.
278e59618f0SGrant Seltzer  *
279e59618f0SGrant Seltzer  * **BPF_EXIST**
280e59618f0SGrant Seltzer  *    Update existing elements.
281e59618f0SGrant Seltzer  *
282e59618f0SGrant Seltzer  * **BPF_F_LOCK**
283e59618f0SGrant Seltzer  *    Update spin_lock-ed map elements. This must be
284e59618f0SGrant Seltzer  *    specified if the map value contains a spinlock.
285e59618f0SGrant Seltzer  *
286e59618f0SGrant Seltzer  * @param fd BPF map file descriptor
287e59618f0SGrant Seltzer  * @param keys pointer to an array of *count* keys
288e59618f0SGrant Seltzer  * @param values pointer to an array of *count* values
289e59618f0SGrant Seltzer  * @param count input and output parameter; on input it's the number of elements
290e59618f0SGrant Seltzer  * in the map to update in batch; on output if a non-EFAULT error is returned,
291e59618f0SGrant Seltzer  * **count** represents the number of updated elements if the output **count**
292e59618f0SGrant Seltzer  * value is not equal to the input **count** value.
293e59618f0SGrant Seltzer  * If EFAULT is returned, **count** should not be trusted to be correct.
294e59618f0SGrant Seltzer  * @param opts options for configuring the way the batch update works
295e59618f0SGrant Seltzer  * @return 0, on success; negative error code, otherwise (errno is also set to
296e59618f0SGrant Seltzer  * the error code)
297e59618f0SGrant Seltzer  */
298e59618f0SGrant Seltzer LIBBPF_API int bpf_map_update_batch(int fd, const void *keys, const void *values,
2992ab3d86eSYonghong Song 				    __u32 *count,
3002ab3d86eSYonghong Song 				    const struct bpf_map_batch_opts *opts);
3012ab3d86eSYonghong Song 
302f1674dc7SAndrii Nakryiko struct bpf_obj_pin_opts {
303f1674dc7SAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
304f1674dc7SAndrii Nakryiko 
305f1674dc7SAndrii Nakryiko 	__u32 file_flags;
306f1674dc7SAndrii Nakryiko 	int path_fd;
307f1674dc7SAndrii Nakryiko 
308f1674dc7SAndrii Nakryiko 	size_t :0;
309f1674dc7SAndrii Nakryiko };
310f1674dc7SAndrii Nakryiko #define bpf_obj_pin_opts__last_field path_fd
311f1674dc7SAndrii Nakryiko 
312f1674dc7SAndrii Nakryiko LIBBPF_API int bpf_obj_pin(int fd, const char *pathname);
313f1674dc7SAndrii Nakryiko LIBBPF_API int bpf_obj_pin_opts(int fd, const char *pathname,
314f1674dc7SAndrii Nakryiko 				const struct bpf_obj_pin_opts *opts);
315f1674dc7SAndrii Nakryiko 
316395fc4faSJoe Burton struct bpf_obj_get_opts {
317395fc4faSJoe Burton 	size_t sz; /* size of this struct for forward/backward compatibility */
318395fc4faSJoe Burton 
319395fc4faSJoe Burton 	__u32 file_flags;
320f1674dc7SAndrii Nakryiko 	int path_fd;
321395fc4faSJoe Burton 
322395fc4faSJoe Burton 	size_t :0;
323395fc4faSJoe Burton };
324f1674dc7SAndrii Nakryiko #define bpf_obj_get_opts__last_field path_fd
325395fc4faSJoe Burton 
326ab9e0848SAndrey Ignatov LIBBPF_API int bpf_obj_get(const char *pathname);
327395fc4faSJoe Burton LIBBPF_API int bpf_obj_get_opts(const char *pathname,
328395fc4faSJoe Burton 				const struct bpf_obj_get_opts *opts);
329cdbee383SAndrey Ignatov 
330ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_attach(int prog_fd, int attachable_fd,
331ab9e0848SAndrey Ignatov 			       enum bpf_attach_type type, unsigned int flags);
332ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_detach(int attachable_fd, enum bpf_attach_type type);
333ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_detach2(int prog_fd, int attachable_fd,
334ab9e0848SAndrey Ignatov 				enum bpf_attach_type type);
33564a97591SLorenz Bauer 
336fe20ce3aSDaniel Borkmann struct bpf_prog_attach_opts {
337fe20ce3aSDaniel Borkmann 	size_t sz; /* size of this struct for forward/backward compatibility */
338fe20ce3aSDaniel Borkmann 	__u32 flags;
339fe20ce3aSDaniel Borkmann 	union {
340fe20ce3aSDaniel Borkmann 		int replace_prog_fd;
341fe20ce3aSDaniel Borkmann 		int replace_fd;
342fe20ce3aSDaniel Borkmann 	};
343fe20ce3aSDaniel Borkmann 	int relative_fd;
344fe20ce3aSDaniel Borkmann 	__u32 relative_id;
345fe20ce3aSDaniel Borkmann 	__u64 expected_revision;
346fe20ce3aSDaniel Borkmann 	size_t :0;
347fe20ce3aSDaniel Borkmann };
348fe20ce3aSDaniel Borkmann #define bpf_prog_attach_opts__last_field expected_revision
349fe20ce3aSDaniel Borkmann 
350fe20ce3aSDaniel Borkmann struct bpf_prog_detach_opts {
351fe20ce3aSDaniel Borkmann 	size_t sz; /* size of this struct for forward/backward compatibility */
352fe20ce3aSDaniel Borkmann 	__u32 flags;
353fe20ce3aSDaniel Borkmann 	int relative_fd;
354fe20ce3aSDaniel Borkmann 	__u32 relative_id;
355fe20ce3aSDaniel Borkmann 	__u64 expected_revision;
356fe20ce3aSDaniel Borkmann 	size_t :0;
357fe20ce3aSDaniel Borkmann };
358fe20ce3aSDaniel Borkmann #define bpf_prog_detach_opts__last_field expected_revision
359fe20ce3aSDaniel Borkmann 
360fe20ce3aSDaniel Borkmann /**
361fe20ce3aSDaniel Borkmann  * @brief **bpf_prog_attach_opts()** attaches the BPF program corresponding to
362fe20ce3aSDaniel Borkmann  * *prog_fd* to a *target* which can represent a file descriptor or netdevice
363fe20ce3aSDaniel Borkmann  * ifindex.
364fe20ce3aSDaniel Borkmann  *
365fe20ce3aSDaniel Borkmann  * @param prog_fd BPF program file descriptor
366fe20ce3aSDaniel Borkmann  * @param target attach location file descriptor or ifindex
367fe20ce3aSDaniel Borkmann  * @param type attach type for the BPF program
368fe20ce3aSDaniel Borkmann  * @param opts options for configuring the attachment
369fe20ce3aSDaniel Borkmann  * @return 0, on success; negative error code, otherwise (errno is also set to
370fe20ce3aSDaniel Borkmann  * the error code)
371fe20ce3aSDaniel Borkmann  */
372fe20ce3aSDaniel Borkmann LIBBPF_API int bpf_prog_attach_opts(int prog_fd, int target,
373fe20ce3aSDaniel Borkmann 				    enum bpf_attach_type type,
374fe20ce3aSDaniel Borkmann 				    const struct bpf_prog_attach_opts *opts);
375fe20ce3aSDaniel Borkmann 
376fe20ce3aSDaniel Borkmann /**
377fe20ce3aSDaniel Borkmann  * @brief **bpf_prog_detach_opts()** detaches the BPF program corresponding to
378fe20ce3aSDaniel Borkmann  * *prog_fd* from a *target* which can represent a file descriptor or netdevice
379fe20ce3aSDaniel Borkmann  * ifindex.
380fe20ce3aSDaniel Borkmann  *
381fe20ce3aSDaniel Borkmann  * @param prog_fd BPF program file descriptor
382fe20ce3aSDaniel Borkmann  * @param target detach location file descriptor or ifindex
383fe20ce3aSDaniel Borkmann  * @param type detach type for the BPF program
384fe20ce3aSDaniel Borkmann  * @param opts options for configuring the detachment
385fe20ce3aSDaniel Borkmann  * @return 0, on success; negative error code, otherwise (errno is also set to
386fe20ce3aSDaniel Borkmann  * the error code)
387fe20ce3aSDaniel Borkmann  */
388fe20ce3aSDaniel Borkmann LIBBPF_API int bpf_prog_detach_opts(int prog_fd, int target,
389fe20ce3aSDaniel Borkmann 				    enum bpf_attach_type type,
390fe20ce3aSDaniel Borkmann 				    const struct bpf_prog_detach_opts *opts);
391fe20ce3aSDaniel Borkmann 
39274fc097dSYonghong Song union bpf_iter_link_info; /* defined in up-to-date linux/bpf.h */
393cc4f864bSAndrii Nakryiko struct bpf_link_create_opts {
394cc4f864bSAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
395cd31039aSYonghong Song 	__u32 flags;
39674fc097dSYonghong Song 	union bpf_iter_link_info *iter_info;
39774fc097dSYonghong Song 	__u32 iter_info_len;
398a5359091SToke Høiland-Jørgensen 	__u32 target_btf_id;
3993ec84f4bSAndrii Nakryiko 	union {
4003ec84f4bSAndrii Nakryiko 		struct {
4013ec84f4bSAndrii Nakryiko 			__u64 bpf_cookie;
4023ec84f4bSAndrii Nakryiko 		} perf_event;
4035117c26eSJiri Olsa 		struct {
4045117c26eSJiri Olsa 			__u32 flags;
4055117c26eSJiri Olsa 			__u32 cnt;
4065117c26eSJiri Olsa 			const char **syms;
4075117c26eSJiri Olsa 			const unsigned long *addrs;
4085117c26eSJiri Olsa 			const __u64 *cookies;
4095117c26eSJiri Olsa 		} kprobe_multi;
410129b9c5eSKui-Feng Lee 		struct {
4115054a303SJiri Olsa 			__u32 flags;
4125054a303SJiri Olsa 			__u32 cnt;
4135054a303SJiri Olsa 			const char *path;
4145054a303SJiri Olsa 			const unsigned long *offsets;
4155054a303SJiri Olsa 			const unsigned long *ref_ctr_offsets;
4165054a303SJiri Olsa 			const __u64 *cookies;
4175054a303SJiri Olsa 			__u32 pid;
4185054a303SJiri Olsa 		} uprobe_multi;
4195054a303SJiri Olsa 		struct {
420129b9c5eSKui-Feng Lee 			__u64 cookie;
421129b9c5eSKui-Feng Lee 		} tracing;
42252364abbSFlorian Westphal 		struct {
42352364abbSFlorian Westphal 			__u32 pf;
42452364abbSFlorian Westphal 			__u32 hooknum;
42552364abbSFlorian Westphal 			__s32 priority;
42652364abbSFlorian Westphal 			__u32 flags;
42752364abbSFlorian Westphal 		} netfilter;
42855cc3768SDaniel Borkmann 		struct {
42955cc3768SDaniel Borkmann 			__u32 relative_fd;
43055cc3768SDaniel Borkmann 			__u32 relative_id;
43155cc3768SDaniel Borkmann 			__u64 expected_revision;
43255cc3768SDaniel Borkmann 		} tcx;
43305c31b4aSDaniel Borkmann 		struct {
43405c31b4aSDaniel Borkmann 			__u32 relative_fd;
43505c31b4aSDaniel Borkmann 			__u32 relative_id;
43605c31b4aSDaniel Borkmann 			__u64 expected_revision;
43705c31b4aSDaniel Borkmann 		} netkit;
438cc4f864bSAndrii Nakryiko 	};
4393ec84f4bSAndrii Nakryiko 	size_t :0;
4403ec84f4bSAndrii Nakryiko };
4415054a303SJiri Olsa #define bpf_link_create_opts__last_field uprobe_multi.pid
442cc4f864bSAndrii Nakryiko 
443cc4f864bSAndrii Nakryiko LIBBPF_API int bpf_link_create(int prog_fd, int target_fd,
444cc4f864bSAndrii Nakryiko 			       enum bpf_attach_type attach_type,
445cc4f864bSAndrii Nakryiko 			       const struct bpf_link_create_opts *opts);
446cc4f864bSAndrii Nakryiko 
4472e49527eSAndrii Nakryiko LIBBPF_API int bpf_link_detach(int link_fd);
4482e49527eSAndrii Nakryiko 
449cc4f864bSAndrii Nakryiko struct bpf_link_update_opts {
450cc4f864bSAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
451cc4f864bSAndrii Nakryiko 	__u32 flags;	   /* extra flags */
452cc4f864bSAndrii Nakryiko 	__u32 old_prog_fd; /* expected old program FD */
453912dd4b0SKui-Feng Lee 	__u32 old_map_fd;  /* expected old map FD */
454cc4f864bSAndrii Nakryiko };
455912dd4b0SKui-Feng Lee #define bpf_link_update_opts__last_field old_map_fd
456cc4f864bSAndrii Nakryiko 
457cc4f864bSAndrii Nakryiko LIBBPF_API int bpf_link_update(int link_fd, int new_prog_fd,
458cc4f864bSAndrii Nakryiko 			       const struct bpf_link_update_opts *opts);
459cc4f864bSAndrii Nakryiko 
460c09add2fSYonghong Song LIBBPF_API int bpf_iter_create(int link_fd);
461c09add2fSYonghong Song 
46264a97591SLorenz Bauer struct bpf_prog_test_run_attr {
46364a97591SLorenz Bauer 	int prog_fd;
46464a97591SLorenz Bauer 	int repeat;
46564a97591SLorenz Bauer 	const void *data_in;
46664a97591SLorenz Bauer 	__u32 data_size_in;
46764a97591SLorenz Bauer 	void *data_out;      /* optional */
46864a97591SLorenz Bauer 	__u32 data_size_out; /* in: max length of data_out
46964a97591SLorenz Bauer 			      * out: length of data_out */
47064a97591SLorenz Bauer 	__u32 retval;        /* out: return code of the BPF program */
47164a97591SLorenz Bauer 	__u32 duration;      /* out: average per repetition in ns */
4725e903c65SStanislav Fomichev 	const void *ctx_in; /* optional */
4735e903c65SStanislav Fomichev 	__u32 ctx_size_in;
4745e903c65SStanislav Fomichev 	void *ctx_out;      /* optional */
4755e903c65SStanislav Fomichev 	__u32 ctx_size_out; /* in: max length of ctx_out
4765e903c65SStanislav Fomichev 			     * out: length of cxt_out */
47764a97591SLorenz Bauer };
47864a97591SLorenz Bauer 
479ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_get_next_id(__u32 start_id, __u32 *next_id);
480ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_get_next_id(__u32 start_id, __u32 *next_id);
48109d7c2e3SQuentin Monnet LIBBPF_API int bpf_btf_get_next_id(__u32 start_id, __u32 *next_id);
4820dbc8668SAndrii Nakryiko LIBBPF_API int bpf_link_get_next_id(__u32 start_id, __u32 *next_id);
483243e3005SRoberto Sassu 
484243e3005SRoberto Sassu struct bpf_get_fd_by_id_opts {
485243e3005SRoberto Sassu 	size_t sz; /* size of this struct for forward/backward compatibility */
486243e3005SRoberto Sassu 	__u32 open_flags; /* permissions requested for the operation on fd */
487243e3005SRoberto Sassu 	size_t :0;
488243e3005SRoberto Sassu };
489243e3005SRoberto Sassu #define bpf_get_fd_by_id_opts__last_field open_flags
490243e3005SRoberto Sassu 
491ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_get_fd_by_id(__u32 id);
4928f13f168SRoberto Sassu LIBBPF_API int bpf_prog_get_fd_by_id_opts(__u32 id,
4938f13f168SRoberto Sassu 				const struct bpf_get_fd_by_id_opts *opts);
494ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_get_fd_by_id(__u32 id);
495243e3005SRoberto Sassu LIBBPF_API int bpf_map_get_fd_by_id_opts(__u32 id,
496243e3005SRoberto Sassu 				const struct bpf_get_fd_by_id_opts *opts);
497ab9e0848SAndrey Ignatov LIBBPF_API int bpf_btf_get_fd_by_id(__u32 id);
4982ce7cbf2SRoberto Sassu LIBBPF_API int bpf_btf_get_fd_by_id_opts(__u32 id,
4992ce7cbf2SRoberto Sassu 				const struct bpf_get_fd_by_id_opts *opts);
5000dbc8668SAndrii Nakryiko LIBBPF_API int bpf_link_get_fd_by_id(__u32 id);
50197c8f9ddSRoberto Sassu LIBBPF_API int bpf_link_get_fd_by_id_opts(__u32 id,
50297c8f9ddSRoberto Sassu 				const struct bpf_get_fd_by_id_opts *opts);
5030dbc8668SAndrii Nakryiko LIBBPF_API int bpf_obj_get_info_by_fd(int bpf_fd, void *info, __u32 *info_len);
5040a504fa1SIlya Leoshkevich 
5050a504fa1SIlya Leoshkevich /**
5060a504fa1SIlya Leoshkevich  * @brief **bpf_prog_get_info_by_fd()** obtains information about the BPF
5070a504fa1SIlya Leoshkevich  * program corresponding to *prog_fd*.
5080a504fa1SIlya Leoshkevich  *
5090a504fa1SIlya Leoshkevich  * Populates up to *info_len* bytes of *info* and updates *info_len* with the
5101159d278SMatt Bobrowski  * actual number of bytes written to *info*. Note that *info* should be
5111159d278SMatt Bobrowski  * zero-initialized or initialized as expected by the requested *info*
5121159d278SMatt Bobrowski  * type. Failing to (zero-)initialize *info* under certain circumstances can
5131159d278SMatt Bobrowski  * result in this helper returning an error.
5140a504fa1SIlya Leoshkevich  *
5150a504fa1SIlya Leoshkevich  * @param prog_fd BPF program file descriptor
5160a504fa1SIlya Leoshkevich  * @param info pointer to **struct bpf_prog_info** that will be populated with
5170a504fa1SIlya Leoshkevich  * BPF program information
5180a504fa1SIlya Leoshkevich  * @param info_len pointer to the size of *info*; on success updated with the
5190a504fa1SIlya Leoshkevich  * number of bytes written to *info*
5200a504fa1SIlya Leoshkevich  * @return 0, on success; negative error code, otherwise (errno is also set to
5210a504fa1SIlya Leoshkevich  * the error code)
52255a9ed0eSIlya Leoshkevich  */
52355a9ed0eSIlya Leoshkevich LIBBPF_API int bpf_prog_get_info_by_fd(int prog_fd, struct bpf_prog_info *info, __u32 *info_len);
5240a504fa1SIlya Leoshkevich 
5250a504fa1SIlya Leoshkevich /**
5260a504fa1SIlya Leoshkevich  * @brief **bpf_map_get_info_by_fd()** obtains information about the BPF
5270a504fa1SIlya Leoshkevich  * map corresponding to *map_fd*.
5280a504fa1SIlya Leoshkevich  *
5290a504fa1SIlya Leoshkevich  * Populates up to *info_len* bytes of *info* and updates *info_len* with the
5301159d278SMatt Bobrowski  * actual number of bytes written to *info*. Note that *info* should be
5311159d278SMatt Bobrowski  * zero-initialized or initialized as expected by the requested *info*
5321159d278SMatt Bobrowski  * type. Failing to (zero-)initialize *info* under certain circumstances can
5331159d278SMatt Bobrowski  * result in this helper returning an error.
5340a504fa1SIlya Leoshkevich  *
5350a504fa1SIlya Leoshkevich  * @param map_fd BPF map file descriptor
5360a504fa1SIlya Leoshkevich  * @param info pointer to **struct bpf_map_info** that will be populated with
5370a504fa1SIlya Leoshkevich  * BPF map information
5380a504fa1SIlya Leoshkevich  * @param info_len pointer to the size of *info*; on success updated with the
5390a504fa1SIlya Leoshkevich  * number of bytes written to *info*
5400a504fa1SIlya Leoshkevich  * @return 0, on success; negative error code, otherwise (errno is also set to
5410a504fa1SIlya Leoshkevich  * the error code)
5420a504fa1SIlya Leoshkevich  */
54355a9ed0eSIlya Leoshkevich LIBBPF_API int bpf_map_get_info_by_fd(int map_fd, struct bpf_map_info *info, __u32 *info_len);
5440a504fa1SIlya Leoshkevich 
5450a504fa1SIlya Leoshkevich /**
5460a504fa1SIlya Leoshkevich  * @brief **bpf_btf_get_info_by_fd()** obtains information about the
5470a504fa1SIlya Leoshkevich  * BTF object corresponding to *btf_fd*.
5480a504fa1SIlya Leoshkevich  *
5490a504fa1SIlya Leoshkevich  * Populates up to *info_len* bytes of *info* and updates *info_len* with the
5501159d278SMatt Bobrowski  * actual number of bytes written to *info*. Note that *info* should be
5511159d278SMatt Bobrowski  * zero-initialized or initialized as expected by the requested *info*
5521159d278SMatt Bobrowski  * type. Failing to (zero-)initialize *info* under certain circumstances can
5531159d278SMatt Bobrowski  * result in this helper returning an error.
5540a504fa1SIlya Leoshkevich  *
5550a504fa1SIlya Leoshkevich  * @param btf_fd BTF object file descriptor
5560a504fa1SIlya Leoshkevich  * @param info pointer to **struct bpf_btf_info** that will be populated with
5570a504fa1SIlya Leoshkevich  * BTF object information
5580a504fa1SIlya Leoshkevich  * @param info_len pointer to the size of *info*; on success updated with the
5590a504fa1SIlya Leoshkevich  * number of bytes written to *info*
5600a504fa1SIlya Leoshkevich  * @return 0, on success; negative error code, otherwise (errno is also set to
5610a504fa1SIlya Leoshkevich  * the error code)
5620a504fa1SIlya Leoshkevich  */
56355a9ed0eSIlya Leoshkevich LIBBPF_API int bpf_btf_get_info_by_fd(int btf_fd, struct bpf_btf_info *info, __u32 *info_len);
5640a504fa1SIlya Leoshkevich 
5650a504fa1SIlya Leoshkevich /**
5660a504fa1SIlya Leoshkevich  * @brief **bpf_btf_get_info_by_fd()** obtains information about the BPF
5670a504fa1SIlya Leoshkevich  * link corresponding to *link_fd*.
5680a504fa1SIlya Leoshkevich  *
5690a504fa1SIlya Leoshkevich  * Populates up to *info_len* bytes of *info* and updates *info_len* with the
5701159d278SMatt Bobrowski  * actual number of bytes written to *info*. Note that *info* should be
5711159d278SMatt Bobrowski  * zero-initialized or initialized as expected by the requested *info*
5721159d278SMatt Bobrowski  * type. Failing to (zero-)initialize *info* under certain circumstances can
5731159d278SMatt Bobrowski  * result in this helper returning an error.
5740a504fa1SIlya Leoshkevich  *
5750a504fa1SIlya Leoshkevich  * @param link_fd BPF link file descriptor
5760a504fa1SIlya Leoshkevich  * @param info pointer to **struct bpf_link_info** that will be populated with
5770a504fa1SIlya Leoshkevich  * BPF link information
5780a504fa1SIlya Leoshkevich  * @param info_len pointer to the size of *info*; on success updated with the
5790a504fa1SIlya Leoshkevich  * number of bytes written to *info*
5800a504fa1SIlya Leoshkevich  * @return 0, on success; negative error code, otherwise (errno is also set to
5810a504fa1SIlya Leoshkevich  * the error code)
5820a504fa1SIlya Leoshkevich  */
58355a9ed0eSIlya Leoshkevich LIBBPF_API int bpf_link_get_info_by_fd(int link_fd, struct bpf_link_info *info, __u32 *info_len);
584a4b2f3cfSStanislav Fomichev 
585a4b2f3cfSStanislav Fomichev struct bpf_prog_query_opts {
586a4b2f3cfSStanislav Fomichev 	size_t sz; /* size of this struct for forward/backward compatibility */
587a4b2f3cfSStanislav Fomichev 	__u32 query_flags;
588a4b2f3cfSStanislav Fomichev 	__u32 attach_flags; /* output argument */
589a4b2f3cfSStanislav Fomichev 	__u32 *prog_ids;
590fe20ce3aSDaniel Borkmann 	union {
591fe20ce3aSDaniel Borkmann 		/* input+output argument */
592fe20ce3aSDaniel Borkmann 		__u32 prog_cnt;
593fe20ce3aSDaniel Borkmann 		__u32 count;
594a4b2f3cfSStanislav Fomichev 	};
595fe20ce3aSDaniel Borkmann 	__u32 *prog_attach_flags;
596fe20ce3aSDaniel Borkmann 	__u32 *link_ids;
597fe20ce3aSDaniel Borkmann 	__u32 *link_attach_flags;
598fe20ce3aSDaniel Borkmann 	__u64 revision;
599fe20ce3aSDaniel Borkmann 	size_t :0;
600fe20ce3aSDaniel Borkmann };
601fe20ce3aSDaniel Borkmann #define bpf_prog_query_opts__last_field revision
602a4b2f3cfSStanislav Fomichev 
603fe20ce3aSDaniel Borkmann /**
604fe20ce3aSDaniel Borkmann  * @brief **bpf_prog_query_opts()** queries the BPF programs and BPF links
605fe20ce3aSDaniel Borkmann  * which are attached to *target* which can represent a file descriptor or
606fe20ce3aSDaniel Borkmann  * netdevice ifindex.
607fe20ce3aSDaniel Borkmann  *
608fe20ce3aSDaniel Borkmann  * @param target query location file descriptor or ifindex
609fe20ce3aSDaniel Borkmann  * @param type attach type for the BPF program
610fe20ce3aSDaniel Borkmann  * @param opts options for configuring the query
611fe20ce3aSDaniel Borkmann  * @return 0, on success; negative error code, otherwise (errno is also set to
612fe20ce3aSDaniel Borkmann  * the error code)
613fe20ce3aSDaniel Borkmann  */
614fe20ce3aSDaniel Borkmann LIBBPF_API int bpf_prog_query_opts(int target, enum bpf_attach_type type,
615a4b2f3cfSStanislav Fomichev 				   struct bpf_prog_query_opts *opts);
616ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_query(int target_fd, enum bpf_attach_type type,
617ab9e0848SAndrey Ignatov 			      __u32 query_flags, __u32 *attach_flags,
618ab9e0848SAndrey Ignatov 			      __u32 *prog_ids, __u32 *prog_cnt);
619a4b2f3cfSStanislav Fomichev 
620*36ffb202SAndrii Nakryiko struct bpf_raw_tp_opts {
621*36ffb202SAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
622*36ffb202SAndrii Nakryiko 	const char *tp_name;
623*36ffb202SAndrii Nakryiko 	__u64 cookie;
624*36ffb202SAndrii Nakryiko 	size_t :0;
625*36ffb202SAndrii Nakryiko };
626*36ffb202SAndrii Nakryiko #define bpf_raw_tp_opts__last_field cookie
627*36ffb202SAndrii Nakryiko 
628*36ffb202SAndrii Nakryiko LIBBPF_API int bpf_raw_tracepoint_open_opts(int prog_fd, struct bpf_raw_tp_opts *opts);
629ab9e0848SAndrey Ignatov LIBBPF_API int bpf_raw_tracepoint_open(const char *name, int prog_fd);
630ab9e0848SAndrey Ignatov LIBBPF_API int bpf_task_fd_query(int pid, int fd, __u32 flags, char *buf,
631ab9e0848SAndrey Ignatov 				 __u32 *buf_len, __u32 *prog_id, __u32 *fd_type,
632ab9e0848SAndrey Ignatov 				 __u64 *probe_offset, __u64 *probe_addr);
6334e15507fSAndrii Nakryiko 
634b4269341SAndrii Nakryiko #ifdef __cplusplus
635b4269341SAndrii Nakryiko /* forward-declaring enums in C++ isn't compatible with pure C enums, so
636b4269341SAndrii Nakryiko  * instead define bpf_enable_stats() as accepting int as an input
637b4269341SAndrii Nakryiko  */
638b4269341SAndrii Nakryiko LIBBPF_API int bpf_enable_stats(int type);
639b4269341SAndrii Nakryiko #else
6404e15507fSAndrii Nakryiko enum bpf_stats_type; /* defined in up-to-date linux/bpf.h */
6410bee1067SSong Liu LIBBPF_API int bpf_enable_stats(enum bpf_stats_type type);
642b4269341SAndrii Nakryiko #endif
6438c4905b9SStanislav Fomichev 
6445d23328dSYiFei Zhu struct bpf_prog_bind_opts {
6455d23328dSYiFei Zhu 	size_t sz; /* size of this struct for forward/backward compatibility */
6465d23328dSYiFei Zhu 	__u32 flags;
6475d23328dSYiFei Zhu };
6485d23328dSYiFei Zhu #define bpf_prog_bind_opts__last_field flags
6495d23328dSYiFei Zhu 
6505d23328dSYiFei Zhu LIBBPF_API int bpf_prog_bind_map(int prog_fd, int map_fd,
6515d23328dSYiFei Zhu 				 const struct bpf_prog_bind_opts *opts);
65288f7fe72SSong Liu 
65388f7fe72SSong Liu struct bpf_test_run_opts {
65488f7fe72SSong Liu 	size_t sz; /* size of this struct for forward/backward compatibility */
65588f7fe72SSong Liu 	const void *data_in; /* optional */
65688f7fe72SSong Liu 	void *data_out;      /* optional */
65788f7fe72SSong Liu 	__u32 data_size_in;
65888f7fe72SSong Liu 	__u32 data_size_out; /* in: max length of data_out
65988f7fe72SSong Liu 			      * out: length of data_out
66088f7fe72SSong Liu 			      */
66188f7fe72SSong Liu 	const void *ctx_in; /* optional */
66288f7fe72SSong Liu 	void *ctx_out;      /* optional */
66388f7fe72SSong Liu 	__u32 ctx_size_in;
66488f7fe72SSong Liu 	__u32 ctx_size_out; /* in: max length of ctx_out
66588f7fe72SSong Liu 			     * out: length of cxt_out
66688f7fe72SSong Liu 			     */
66788f7fe72SSong Liu 	__u32 retval;        /* out: return code of the BPF program */
66888f7fe72SSong Liu 	int repeat;
66988f7fe72SSong Liu 	__u32 duration;      /* out: average per repetition in ns */
67088f7fe72SSong Liu 	__u32 flags;
67188f7fe72SSong Liu 	__u32 cpu;
67224592ad1SToke Høiland-Jørgensen 	__u32 batch_size;
67388f7fe72SSong Liu };
67424592ad1SToke Høiland-Jørgensen #define bpf_test_run_opts__last_field batch_size
67588f7fe72SSong Liu 
67688f7fe72SSong Liu LIBBPF_API int bpf_prog_test_run_opts(int prog_fd,
67788f7fe72SSong Liu 				      struct bpf_test_run_opts *opts);
67888f7fe72SSong Liu 
679639ecd7dSAndrii Nakryiko struct bpf_token_create_opts {
680639ecd7dSAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
681639ecd7dSAndrii Nakryiko 	__u32 flags;
682639ecd7dSAndrii Nakryiko 	size_t :0;
683639ecd7dSAndrii Nakryiko };
684639ecd7dSAndrii Nakryiko #define bpf_token_create_opts__last_field flags
685639ecd7dSAndrii Nakryiko 
686639ecd7dSAndrii Nakryiko /**
687639ecd7dSAndrii Nakryiko  * @brief **bpf_token_create()** creates a new instance of BPF token derived
688639ecd7dSAndrii Nakryiko  * from specified BPF FS mount point.
689639ecd7dSAndrii Nakryiko  *
690639ecd7dSAndrii Nakryiko  * BPF token created with this API can be passed to bpf() syscall for
691639ecd7dSAndrii Nakryiko  * commands like BPF_PROG_LOAD, BPF_MAP_CREATE, etc.
692639ecd7dSAndrii Nakryiko  *
693639ecd7dSAndrii Nakryiko  * @param bpffs_fd FD for BPF FS instance from which to derive a BPF token
694639ecd7dSAndrii Nakryiko  * instance.
695639ecd7dSAndrii Nakryiko  * @param opts optional BPF token creation options, can be NULL
696639ecd7dSAndrii Nakryiko  *
697639ecd7dSAndrii Nakryiko  * @return BPF token FD > 0, on success; negative error code, otherwise (errno
698639ecd7dSAndrii Nakryiko  * is also set to the error code)
699639ecd7dSAndrii Nakryiko  */
700639ecd7dSAndrii Nakryiko LIBBPF_API int bpf_token_create(int bpffs_fd,
701639ecd7dSAndrii Nakryiko 				struct bpf_token_create_opts *opts);
702639ecd7dSAndrii Nakryiko 
7038c4905b9SStanislav Fomichev #ifdef __cplusplus
7048c4905b9SStanislav Fomichev } /* extern "C" */
7058c4905b9SStanislav Fomichev #endif
7068c4905b9SStanislav Fomichev 
707eff81908SAndrey Ignatov #endif /* __LIBBPF_BPF_H */
708