xref: /linux/tools/lib/bpf/bpf.h (revision a3d63e85253b6c9b6aa34b99208e835358a91320)
11bc38b8fSAlexei Starovoitov /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
26061a3d6SEric Leblond 
3e3ed2fefSWang Nan /*
40a504fa1SIlya Leoshkevich  * Common BPF ELF operations.
5e3ed2fefSWang Nan  *
6e3ed2fefSWang Nan  * Copyright (C) 2013-2015 Alexei Starovoitov <ast@kernel.org>
7e3ed2fefSWang Nan  * Copyright (C) 2015 Wang Nan <wangnan0@huawei.com>
8e3ed2fefSWang Nan  * Copyright (C) 2015 Huawei Inc.
9203d1cacSWang Nan  *
10203d1cacSWang Nan  * This program is free software; you can redistribute it and/or
11203d1cacSWang Nan  * modify it under the terms of the GNU Lesser General Public
12203d1cacSWang Nan  * License as published by the Free Software Foundation;
13203d1cacSWang Nan  * version 2.1 of the License (not later!)
14203d1cacSWang Nan  *
15203d1cacSWang Nan  * This program is distributed in the hope that it will be useful,
16203d1cacSWang Nan  * but WITHOUT ANY WARRANTY; without even the implied warranty of
17203d1cacSWang Nan  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
18203d1cacSWang Nan  * GNU Lesser General Public License for more details.
19203d1cacSWang Nan  *
20203d1cacSWang Nan  * You should have received a copy of the GNU Lesser General Public
21203d1cacSWang Nan  * License along with this program; if not,  see <http://www.gnu.org/licenses>
22e3ed2fefSWang Nan  */
23eff81908SAndrey Ignatov #ifndef __LIBBPF_BPF_H
24eff81908SAndrey Ignatov #define __LIBBPF_BPF_H
25e3ed2fefSWang Nan 
26e3ed2fefSWang Nan #include <linux/bpf.h>
27878a4d32SBjörn Töpel #include <stdbool.h>
287a5980f9SMickaël Salaün #include <stddef.h>
2932e621e5SDaniel T. Lee #include <stdint.h>
30e3ed2fefSWang Nan 
31544402d4SAndrii Nakryiko #include "libbpf_common.h"
32be80e9cdSAndrii Nakryiko #include "libbpf_legacy.h"
33544402d4SAndrii Nakryiko 
348c4905b9SStanislav Fomichev #ifdef __cplusplus
358c4905b9SStanislav Fomichev extern "C" {
368c4905b9SStanislav Fomichev #endif
378c4905b9SStanislav Fomichev 
38e542f2c4SAndrii Nakryiko int libbpf_set_memlock_rlim(size_t memlock_bytes);
39e542f2c4SAndrii Nakryiko 
40992c4225SAndrii Nakryiko struct bpf_map_create_opts {
41992c4225SAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
42992c4225SAndrii Nakryiko 
43992c4225SAndrii Nakryiko 	__u32 btf_fd;
44992c4225SAndrii Nakryiko 	__u32 btf_key_type_id;
45992c4225SAndrii Nakryiko 	__u32 btf_value_type_id;
46992c4225SAndrii Nakryiko 	__u32 btf_vmlinux_value_type_id;
47992c4225SAndrii Nakryiko 
4874d98070SAndrii Nakryiko 	__u32 inner_map_fd;
4974d98070SAndrii Nakryiko 	__u32 map_flags;
50992c4225SAndrii Nakryiko 	__u64 map_extra;
51992c4225SAndrii Nakryiko 
5274d98070SAndrii Nakryiko 	__u32 numa_node;
5374d98070SAndrii Nakryiko 	__u32 map_ifindex;
549e926acdSKui-Feng Lee 	__s32 value_type_btf_obj_fd;
55364f8483SAndrii Nakryiko 
56364f8483SAndrii Nakryiko 	__u32 token_fd;
579e926acdSKui-Feng Lee 	size_t :0;
58992c4225SAndrii Nakryiko };
59364f8483SAndrii Nakryiko #define bpf_map_create_opts__last_field token_fd
60992c4225SAndrii Nakryiko 
61992c4225SAndrii Nakryiko LIBBPF_API int bpf_map_create(enum bpf_map_type map_type,
62992c4225SAndrii Nakryiko 			      const char *map_name,
63992c4225SAndrii Nakryiko 			      __u32 key_size,
64992c4225SAndrii Nakryiko 			      __u32 value_size,
65992c4225SAndrii Nakryiko 			      __u32 max_entries,
66992c4225SAndrii Nakryiko 			      const struct bpf_map_create_opts *opts);
67992c4225SAndrii Nakryiko 
68d10ef2b8SAndrii Nakryiko struct bpf_prog_load_opts {
69d10ef2b8SAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
70d10ef2b8SAndrii Nakryiko 
71d10ef2b8SAndrii Nakryiko 	/* libbpf can retry BPF_PROG_LOAD command if bpf() syscall returns
72d10ef2b8SAndrii Nakryiko 	 * -EAGAIN. This field determines how many attempts libbpf has to
73d10ef2b8SAndrii Nakryiko 	 *  make. If not specified, libbpf will use default value of 5.
74d10ef2b8SAndrii Nakryiko 	 */
75d10ef2b8SAndrii Nakryiko 	int attempts;
76d10ef2b8SAndrii Nakryiko 
77d10ef2b8SAndrii Nakryiko 	enum bpf_attach_type expected_attach_type;
78d10ef2b8SAndrii Nakryiko 	__u32 prog_btf_fd;
79d10ef2b8SAndrii Nakryiko 	__u32 prog_flags;
80d10ef2b8SAndrii Nakryiko 	__u32 prog_ifindex;
81d10ef2b8SAndrii Nakryiko 	__u32 kern_version;
82d10ef2b8SAndrii Nakryiko 
83d10ef2b8SAndrii Nakryiko 	__u32 attach_btf_id;
84d10ef2b8SAndrii Nakryiko 	__u32 attach_prog_fd;
85d10ef2b8SAndrii Nakryiko 	__u32 attach_btf_obj_fd;
86d10ef2b8SAndrii Nakryiko 
87d10ef2b8SAndrii Nakryiko 	const int *fd_array;
88d10ef2b8SAndrii Nakryiko 
89d10ef2b8SAndrii Nakryiko 	/* .BTF.ext func info data */
90d10ef2b8SAndrii Nakryiko 	const void *func_info;
91d10ef2b8SAndrii Nakryiko 	__u32 func_info_cnt;
92d10ef2b8SAndrii Nakryiko 	__u32 func_info_rec_size;
93d10ef2b8SAndrii Nakryiko 
94d10ef2b8SAndrii Nakryiko 	/* .BTF.ext line info data */
95d10ef2b8SAndrii Nakryiko 	const void *line_info;
96d10ef2b8SAndrii Nakryiko 	__u32 line_info_cnt;
97d10ef2b8SAndrii Nakryiko 	__u32 line_info_rec_size;
98d10ef2b8SAndrii Nakryiko 
99d10ef2b8SAndrii Nakryiko 	/* verifier log options */
100d10ef2b8SAndrii Nakryiko 	__u32 log_level;
101d10ef2b8SAndrii Nakryiko 	__u32 log_size;
102d10ef2b8SAndrii Nakryiko 	char *log_buf;
10394e55c0fSAndrii Nakryiko 	/* output: actual total log contents size (including termintaing zero).
10494e55c0fSAndrii Nakryiko 	 * It could be both larger than original log_size (if log was
10594e55c0fSAndrii Nakryiko 	 * truncated), or smaller (if log buffer wasn't filled completely).
10694e55c0fSAndrii Nakryiko 	 * If kernel doesn't support this feature, log_size is left unchanged.
10794e55c0fSAndrii Nakryiko 	 */
10894e55c0fSAndrii Nakryiko 	__u32 log_true_size;
10994e55c0fSAndrii Nakryiko 	size_t :0;
110d10ef2b8SAndrii Nakryiko };
11194e55c0fSAndrii Nakryiko #define bpf_prog_load_opts__last_field log_true_size
112d10ef2b8SAndrii Nakryiko 
113d10ef2b8SAndrii Nakryiko LIBBPF_API int bpf_prog_load(enum bpf_prog_type prog_type,
114d10ef2b8SAndrii Nakryiko 			     const char *prog_name, const char *license,
115d10ef2b8SAndrii Nakryiko 			     const struct bpf_insn *insns, size_t insn_cnt,
11694e55c0fSAndrii Nakryiko 			     struct bpf_prog_load_opts *opts);
117d7be143bSAndrey Ignatov 
118c034a177SJohn Fastabend /* Flags to direct loading requirements */
119c034a177SJohn Fastabend #define MAPS_RELAX_COMPAT	0x01
120c034a177SJohn Fastabend 
121e0e3ea88SAndrii Nakryiko /* Recommended log buffer size */
1224519efa6SMcCabe, Robert J #define BPF_LOG_BUF_SIZE (UINT32_MAX >> 8) /* verifier maximum in kernels <= 5.1 */
123e0e3ea88SAndrii Nakryiko 
1240ed08d67SAndrii Nakryiko struct bpf_btf_load_opts {
1250ed08d67SAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
1260ed08d67SAndrii Nakryiko 
1270ed08d67SAndrii Nakryiko 	/* kernel log options */
1280ed08d67SAndrii Nakryiko 	char *log_buf;
1290ed08d67SAndrii Nakryiko 	__u32 log_level;
1300ed08d67SAndrii Nakryiko 	__u32 log_size;
131097d8002SAndrii Nakryiko 	/* output: actual total log contents size (including termintaing zero).
132097d8002SAndrii Nakryiko 	 * It could be both larger than original log_size (if log was
133097d8002SAndrii Nakryiko 	 * truncated), or smaller (if log buffer wasn't filled completely).
134097d8002SAndrii Nakryiko 	 * If kernel doesn't support this feature, log_size is left unchanged.
135097d8002SAndrii Nakryiko 	 */
136097d8002SAndrii Nakryiko 	__u32 log_true_size;
137*a3d63e85SAndrii Nakryiko 
138*a3d63e85SAndrii Nakryiko 	__u32 btf_flags;
139*a3d63e85SAndrii Nakryiko 	__u32 token_fd;
140097d8002SAndrii Nakryiko 	size_t :0;
1410ed08d67SAndrii Nakryiko };
142*a3d63e85SAndrii Nakryiko #define bpf_btf_load_opts__last_field token_fd
1430ed08d67SAndrii Nakryiko 
1440ed08d67SAndrii Nakryiko LIBBPF_API int bpf_btf_load(const void *btf_data, size_t btf_size,
145097d8002SAndrii Nakryiko 			    struct bpf_btf_load_opts *opts);
1460ed08d67SAndrii Nakryiko 
147ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_update_elem(int fd, const void *key, const void *value,
14883d994d0SJoe Stringer 				   __u64 flags);
1499742da01SWang Nan 
150ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_lookup_elem(int fd, const void *key, void *value);
151df5d22faSAlexei Starovoitov LIBBPF_API int bpf_map_lookup_elem_flags(int fd, const void *key, void *value,
152df5d22faSAlexei Starovoitov 					 __u64 flags);
15343b987d2SMauricio Vasquez B LIBBPF_API int bpf_map_lookup_and_delete_elem(int fd, const void *key,
15443b987d2SMauricio Vasquez B 					      void *value);
155d59b9f2dSDenis Salopek LIBBPF_API int bpf_map_lookup_and_delete_elem_flags(int fd, const void *key,
156d59b9f2dSDenis Salopek 						    void *value, __u64 flags);
157ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_delete_elem(int fd, const void *key);
158737d0646SAndrii Nakryiko LIBBPF_API int bpf_map_delete_elem_flags(int fd, const void *key, __u64 flags);
159ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_get_next_key(int fd, const void *key, void *next_key);
160d859900cSDaniel Borkmann LIBBPF_API int bpf_map_freeze(int fd);
1612ab3d86eSYonghong Song 
1622ab3d86eSYonghong Song struct bpf_map_batch_opts {
1632ab3d86eSYonghong Song 	size_t sz; /* size of this struct for forward/backward compatibility */
1642ab3d86eSYonghong Song 	__u64 elem_flags;
1652ab3d86eSYonghong Song 	__u64 flags;
1662ab3d86eSYonghong Song };
1672ab3d86eSYonghong Song #define bpf_map_batch_opts__last_field flags
1682ab3d86eSYonghong Song 
169e59618f0SGrant Seltzer 
170e59618f0SGrant Seltzer /**
171e59618f0SGrant Seltzer  * @brief **bpf_map_delete_batch()** allows for batch deletion of multiple
172e59618f0SGrant Seltzer  * elements in a BPF map.
173e59618f0SGrant Seltzer  *
174e59618f0SGrant Seltzer  * @param fd BPF map file descriptor
175e59618f0SGrant Seltzer  * @param keys pointer to an array of *count* keys
176e59618f0SGrant Seltzer  * @param count input and output parameter; on input **count** represents the
177e59618f0SGrant Seltzer  * number of  elements in the map to delete in batch;
178e59618f0SGrant Seltzer  * on output if a non-EFAULT error is returned, **count** represents the number of deleted
179e59618f0SGrant Seltzer  * elements if the output **count** value is not equal to the input **count** value
180e59618f0SGrant Seltzer  * If EFAULT is returned, **count** should not be trusted to be correct.
181e59618f0SGrant Seltzer  * @param opts options for configuring the way the batch deletion works
182e59618f0SGrant Seltzer  * @return 0, on success; negative error code, otherwise (errno is also set to
183e59618f0SGrant Seltzer  * the error code)
184e59618f0SGrant Seltzer  */
185e59618f0SGrant Seltzer LIBBPF_API int bpf_map_delete_batch(int fd, const void *keys,
1862ab3d86eSYonghong Song 				    __u32 *count,
1872ab3d86eSYonghong Song 				    const struct bpf_map_batch_opts *opts);
188e59618f0SGrant Seltzer 
189e59618f0SGrant Seltzer /**
190e59618f0SGrant Seltzer  * @brief **bpf_map_lookup_batch()** allows for batch lookup of BPF map elements.
191e59618f0SGrant Seltzer  *
192e59618f0SGrant Seltzer  * The parameter *in_batch* is the address of the first element in the batch to read.
193e59618f0SGrant Seltzer  * *out_batch* is an output parameter that should be passed as *in_batch* to subsequent
194e59618f0SGrant Seltzer  * calls to **bpf_map_lookup_batch()**. NULL can be passed for *in_batch* to indicate
195e59618f0SGrant Seltzer  * that the batched lookup starts from the beginning of the map.
196e59618f0SGrant Seltzer  *
197e59618f0SGrant Seltzer  * The *keys* and *values* are output parameters which must point to memory large enough to
198e59618f0SGrant Seltzer  * hold *count* items based on the key and value size of the map *map_fd*. The *keys*
199e59618f0SGrant Seltzer  * buffer must be of *key_size* * *count*. The *values* buffer must be of
200e59618f0SGrant Seltzer  * *value_size* * *count*.
201e59618f0SGrant Seltzer  *
202e59618f0SGrant Seltzer  * @param fd BPF map file descriptor
203e59618f0SGrant Seltzer  * @param in_batch address of the first element in batch to read, can pass NULL to
204e59618f0SGrant Seltzer  * indicate that the batched lookup starts from the beginning of the map.
205e59618f0SGrant Seltzer  * @param out_batch output parameter that should be passed to next call as *in_batch*
206e59618f0SGrant Seltzer  * @param keys pointer to an array large enough for *count* keys
207e59618f0SGrant Seltzer  * @param values pointer to an array large enough for *count* values
208e59618f0SGrant Seltzer  * @param count input and output parameter; on input it's the number of elements
209e59618f0SGrant Seltzer  * in the map to read in batch; on output it's the number of elements that were
210e59618f0SGrant Seltzer  * successfully read.
211e59618f0SGrant Seltzer  * If a non-EFAULT error is returned, count will be set as the number of elements
212e59618f0SGrant Seltzer  * that were read before the error occurred.
213e59618f0SGrant Seltzer  * If EFAULT is returned, **count** should not be trusted to be correct.
214e59618f0SGrant Seltzer  * @param opts options for configuring the way the batch lookup works
215e59618f0SGrant Seltzer  * @return 0, on success; negative error code, otherwise (errno is also set to
216e59618f0SGrant Seltzer  * the error code)
217e59618f0SGrant Seltzer  */
2182ab3d86eSYonghong Song LIBBPF_API int bpf_map_lookup_batch(int fd, void *in_batch, void *out_batch,
2192ab3d86eSYonghong Song 				    void *keys, void *values, __u32 *count,
2202ab3d86eSYonghong Song 				    const struct bpf_map_batch_opts *opts);
221e59618f0SGrant Seltzer 
222e59618f0SGrant Seltzer /**
223e59618f0SGrant Seltzer  * @brief **bpf_map_lookup_and_delete_batch()** allows for batch lookup and deletion
224e59618f0SGrant Seltzer  * of BPF map elements where each element is deleted after being retrieved.
225e59618f0SGrant Seltzer  *
226e59618f0SGrant Seltzer  * @param fd BPF map file descriptor
227e59618f0SGrant Seltzer  * @param in_batch address of the first element in batch to read, can pass NULL to
228e59618f0SGrant Seltzer  * get address of the first element in *out_batch*
229e59618f0SGrant Seltzer  * @param out_batch output parameter that should be passed to next call as *in_batch*
230e59618f0SGrant Seltzer  * @param keys pointer to an array of *count* keys
231e59618f0SGrant Seltzer  * @param values pointer to an array large enough for *count* values
232e59618f0SGrant Seltzer  * @param count input and output parameter; on input it's the number of elements
233e59618f0SGrant Seltzer  * in the map to read and delete in batch; on output it represents the number of
234e59618f0SGrant Seltzer  * elements that were successfully read and deleted
235e59618f0SGrant Seltzer  * If a non-**EFAULT** error code is returned and if the output **count** value
236e59618f0SGrant Seltzer  * is not equal to the input **count** value, up to **count** elements may
237e59618f0SGrant Seltzer  * have been deleted.
238e59618f0SGrant Seltzer  * if **EFAULT** is returned up to *count* elements may have been deleted without
239e59618f0SGrant Seltzer  * being returned via the *keys* and *values* output parameters.
240e59618f0SGrant Seltzer  * @param opts options for configuring the way the batch lookup and delete works
241e59618f0SGrant Seltzer  * @return 0, on success; negative error code, otherwise (errno is also set to
242e59618f0SGrant Seltzer  * the error code)
243e59618f0SGrant Seltzer  */
2442ab3d86eSYonghong Song LIBBPF_API int bpf_map_lookup_and_delete_batch(int fd, void *in_batch,
2452ab3d86eSYonghong Song 					void *out_batch, void *keys,
2462ab3d86eSYonghong Song 					void *values, __u32 *count,
2472ab3d86eSYonghong Song 					const struct bpf_map_batch_opts *opts);
248e59618f0SGrant Seltzer 
249e59618f0SGrant Seltzer /**
250e59618f0SGrant Seltzer  * @brief **bpf_map_update_batch()** updates multiple elements in a map
251e59618f0SGrant Seltzer  * by specifying keys and their corresponding values.
252e59618f0SGrant Seltzer  *
253e59618f0SGrant Seltzer  * The *keys* and *values* parameters must point to memory large enough
254e59618f0SGrant Seltzer  * to hold *count* items based on the key and value size of the map.
255e59618f0SGrant Seltzer  *
256e59618f0SGrant Seltzer  * The *opts* parameter can be used to control how *bpf_map_update_batch()*
257e59618f0SGrant Seltzer  * should handle keys that either do or do not already exist in the map.
258e59618f0SGrant Seltzer  * In particular the *flags* parameter of *bpf_map_batch_opts* can be
259e59618f0SGrant Seltzer  * one of the following:
260e59618f0SGrant Seltzer  *
261e59618f0SGrant Seltzer  * Note that *count* is an input and output parameter, where on output it
262e59618f0SGrant Seltzer  * represents how many elements were successfully updated. Also note that if
263e59618f0SGrant Seltzer  * **EFAULT** then *count* should not be trusted to be correct.
264e59618f0SGrant Seltzer  *
265e59618f0SGrant Seltzer  * **BPF_ANY**
266e59618f0SGrant Seltzer  *    Create new elements or update existing.
267e59618f0SGrant Seltzer  *
268e59618f0SGrant Seltzer  * **BPF_NOEXIST**
269e59618f0SGrant Seltzer  *    Create new elements only if they do not exist.
270e59618f0SGrant Seltzer  *
271e59618f0SGrant Seltzer  * **BPF_EXIST**
272e59618f0SGrant Seltzer  *    Update existing elements.
273e59618f0SGrant Seltzer  *
274e59618f0SGrant Seltzer  * **BPF_F_LOCK**
275e59618f0SGrant Seltzer  *    Update spin_lock-ed map elements. This must be
276e59618f0SGrant Seltzer  *    specified if the map value contains a spinlock.
277e59618f0SGrant Seltzer  *
278e59618f0SGrant Seltzer  * @param fd BPF map file descriptor
279e59618f0SGrant Seltzer  * @param keys pointer to an array of *count* keys
280e59618f0SGrant Seltzer  * @param values pointer to an array of *count* values
281e59618f0SGrant Seltzer  * @param count input and output parameter; on input it's the number of elements
282e59618f0SGrant Seltzer  * in the map to update in batch; on output if a non-EFAULT error is returned,
283e59618f0SGrant Seltzer  * **count** represents the number of updated elements if the output **count**
284e59618f0SGrant Seltzer  * value is not equal to the input **count** value.
285e59618f0SGrant Seltzer  * If EFAULT is returned, **count** should not be trusted to be correct.
286e59618f0SGrant Seltzer  * @param opts options for configuring the way the batch update works
287e59618f0SGrant Seltzer  * @return 0, on success; negative error code, otherwise (errno is also set to
288e59618f0SGrant Seltzer  * the error code)
289e59618f0SGrant Seltzer  */
290e59618f0SGrant Seltzer LIBBPF_API int bpf_map_update_batch(int fd, const void *keys, const void *values,
2912ab3d86eSYonghong Song 				    __u32 *count,
2922ab3d86eSYonghong Song 				    const struct bpf_map_batch_opts *opts);
2932ab3d86eSYonghong Song 
294f1674dc7SAndrii Nakryiko struct bpf_obj_pin_opts {
295f1674dc7SAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
296f1674dc7SAndrii Nakryiko 
297f1674dc7SAndrii Nakryiko 	__u32 file_flags;
298f1674dc7SAndrii Nakryiko 	int path_fd;
299f1674dc7SAndrii Nakryiko 
300f1674dc7SAndrii Nakryiko 	size_t :0;
301f1674dc7SAndrii Nakryiko };
302f1674dc7SAndrii Nakryiko #define bpf_obj_pin_opts__last_field path_fd
303f1674dc7SAndrii Nakryiko 
304f1674dc7SAndrii Nakryiko LIBBPF_API int bpf_obj_pin(int fd, const char *pathname);
305f1674dc7SAndrii Nakryiko LIBBPF_API int bpf_obj_pin_opts(int fd, const char *pathname,
306f1674dc7SAndrii Nakryiko 				const struct bpf_obj_pin_opts *opts);
307f1674dc7SAndrii Nakryiko 
308395fc4faSJoe Burton struct bpf_obj_get_opts {
309395fc4faSJoe Burton 	size_t sz; /* size of this struct for forward/backward compatibility */
310395fc4faSJoe Burton 
311395fc4faSJoe Burton 	__u32 file_flags;
312f1674dc7SAndrii Nakryiko 	int path_fd;
313395fc4faSJoe Burton 
314395fc4faSJoe Burton 	size_t :0;
315395fc4faSJoe Burton };
316f1674dc7SAndrii Nakryiko #define bpf_obj_get_opts__last_field path_fd
317395fc4faSJoe Burton 
318ab9e0848SAndrey Ignatov LIBBPF_API int bpf_obj_get(const char *pathname);
319395fc4faSJoe Burton LIBBPF_API int bpf_obj_get_opts(const char *pathname,
320395fc4faSJoe Burton 				const struct bpf_obj_get_opts *opts);
321cdbee383SAndrey Ignatov 
322ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_attach(int prog_fd, int attachable_fd,
323ab9e0848SAndrey Ignatov 			       enum bpf_attach_type type, unsigned int flags);
324ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_detach(int attachable_fd, enum bpf_attach_type type);
325ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_detach2(int prog_fd, int attachable_fd,
326ab9e0848SAndrey Ignatov 				enum bpf_attach_type type);
32764a97591SLorenz Bauer 
328fe20ce3aSDaniel Borkmann struct bpf_prog_attach_opts {
329fe20ce3aSDaniel Borkmann 	size_t sz; /* size of this struct for forward/backward compatibility */
330fe20ce3aSDaniel Borkmann 	__u32 flags;
331fe20ce3aSDaniel Borkmann 	union {
332fe20ce3aSDaniel Borkmann 		int replace_prog_fd;
333fe20ce3aSDaniel Borkmann 		int replace_fd;
334fe20ce3aSDaniel Borkmann 	};
335fe20ce3aSDaniel Borkmann 	int relative_fd;
336fe20ce3aSDaniel Borkmann 	__u32 relative_id;
337fe20ce3aSDaniel Borkmann 	__u64 expected_revision;
338fe20ce3aSDaniel Borkmann 	size_t :0;
339fe20ce3aSDaniel Borkmann };
340fe20ce3aSDaniel Borkmann #define bpf_prog_attach_opts__last_field expected_revision
341fe20ce3aSDaniel Borkmann 
342fe20ce3aSDaniel Borkmann struct bpf_prog_detach_opts {
343fe20ce3aSDaniel Borkmann 	size_t sz; /* size of this struct for forward/backward compatibility */
344fe20ce3aSDaniel Borkmann 	__u32 flags;
345fe20ce3aSDaniel Borkmann 	int relative_fd;
346fe20ce3aSDaniel Borkmann 	__u32 relative_id;
347fe20ce3aSDaniel Borkmann 	__u64 expected_revision;
348fe20ce3aSDaniel Borkmann 	size_t :0;
349fe20ce3aSDaniel Borkmann };
350fe20ce3aSDaniel Borkmann #define bpf_prog_detach_opts__last_field expected_revision
351fe20ce3aSDaniel Borkmann 
352fe20ce3aSDaniel Borkmann /**
353fe20ce3aSDaniel Borkmann  * @brief **bpf_prog_attach_opts()** attaches the BPF program corresponding to
354fe20ce3aSDaniel Borkmann  * *prog_fd* to a *target* which can represent a file descriptor or netdevice
355fe20ce3aSDaniel Borkmann  * ifindex.
356fe20ce3aSDaniel Borkmann  *
357fe20ce3aSDaniel Borkmann  * @param prog_fd BPF program file descriptor
358fe20ce3aSDaniel Borkmann  * @param target attach location file descriptor or ifindex
359fe20ce3aSDaniel Borkmann  * @param type attach type for the BPF program
360fe20ce3aSDaniel Borkmann  * @param opts options for configuring the attachment
361fe20ce3aSDaniel Borkmann  * @return 0, on success; negative error code, otherwise (errno is also set to
362fe20ce3aSDaniel Borkmann  * the error code)
363fe20ce3aSDaniel Borkmann  */
364fe20ce3aSDaniel Borkmann LIBBPF_API int bpf_prog_attach_opts(int prog_fd, int target,
365fe20ce3aSDaniel Borkmann 				    enum bpf_attach_type type,
366fe20ce3aSDaniel Borkmann 				    const struct bpf_prog_attach_opts *opts);
367fe20ce3aSDaniel Borkmann 
368fe20ce3aSDaniel Borkmann /**
369fe20ce3aSDaniel Borkmann  * @brief **bpf_prog_detach_opts()** detaches the BPF program corresponding to
370fe20ce3aSDaniel Borkmann  * *prog_fd* from a *target* which can represent a file descriptor or netdevice
371fe20ce3aSDaniel Borkmann  * ifindex.
372fe20ce3aSDaniel Borkmann  *
373fe20ce3aSDaniel Borkmann  * @param prog_fd BPF program file descriptor
374fe20ce3aSDaniel Borkmann  * @param target detach location file descriptor or ifindex
375fe20ce3aSDaniel Borkmann  * @param type detach type for the BPF program
376fe20ce3aSDaniel Borkmann  * @param opts options for configuring the detachment
377fe20ce3aSDaniel Borkmann  * @return 0, on success; negative error code, otherwise (errno is also set to
378fe20ce3aSDaniel Borkmann  * the error code)
379fe20ce3aSDaniel Borkmann  */
380fe20ce3aSDaniel Borkmann LIBBPF_API int bpf_prog_detach_opts(int prog_fd, int target,
381fe20ce3aSDaniel Borkmann 				    enum bpf_attach_type type,
382fe20ce3aSDaniel Borkmann 				    const struct bpf_prog_detach_opts *opts);
383fe20ce3aSDaniel Borkmann 
38474fc097dSYonghong Song union bpf_iter_link_info; /* defined in up-to-date linux/bpf.h */
385cc4f864bSAndrii Nakryiko struct bpf_link_create_opts {
386cc4f864bSAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
387cd31039aSYonghong Song 	__u32 flags;
38874fc097dSYonghong Song 	union bpf_iter_link_info *iter_info;
38974fc097dSYonghong Song 	__u32 iter_info_len;
390a5359091SToke Høiland-Jørgensen 	__u32 target_btf_id;
3913ec84f4bSAndrii Nakryiko 	union {
3923ec84f4bSAndrii Nakryiko 		struct {
3933ec84f4bSAndrii Nakryiko 			__u64 bpf_cookie;
3943ec84f4bSAndrii Nakryiko 		} perf_event;
3955117c26eSJiri Olsa 		struct {
3965117c26eSJiri Olsa 			__u32 flags;
3975117c26eSJiri Olsa 			__u32 cnt;
3985117c26eSJiri Olsa 			const char **syms;
3995117c26eSJiri Olsa 			const unsigned long *addrs;
4005117c26eSJiri Olsa 			const __u64 *cookies;
4015117c26eSJiri Olsa 		} kprobe_multi;
402129b9c5eSKui-Feng Lee 		struct {
4035054a303SJiri Olsa 			__u32 flags;
4045054a303SJiri Olsa 			__u32 cnt;
4055054a303SJiri Olsa 			const char *path;
4065054a303SJiri Olsa 			const unsigned long *offsets;
4075054a303SJiri Olsa 			const unsigned long *ref_ctr_offsets;
4085054a303SJiri Olsa 			const __u64 *cookies;
4095054a303SJiri Olsa 			__u32 pid;
4105054a303SJiri Olsa 		} uprobe_multi;
4115054a303SJiri Olsa 		struct {
412129b9c5eSKui-Feng Lee 			__u64 cookie;
413129b9c5eSKui-Feng Lee 		} tracing;
41452364abbSFlorian Westphal 		struct {
41552364abbSFlorian Westphal 			__u32 pf;
41652364abbSFlorian Westphal 			__u32 hooknum;
41752364abbSFlorian Westphal 			__s32 priority;
41852364abbSFlorian Westphal 			__u32 flags;
41952364abbSFlorian Westphal 		} netfilter;
42055cc3768SDaniel Borkmann 		struct {
42155cc3768SDaniel Borkmann 			__u32 relative_fd;
42255cc3768SDaniel Borkmann 			__u32 relative_id;
42355cc3768SDaniel Borkmann 			__u64 expected_revision;
42455cc3768SDaniel Borkmann 		} tcx;
42505c31b4aSDaniel Borkmann 		struct {
42605c31b4aSDaniel Borkmann 			__u32 relative_fd;
42705c31b4aSDaniel Borkmann 			__u32 relative_id;
42805c31b4aSDaniel Borkmann 			__u64 expected_revision;
42905c31b4aSDaniel Borkmann 		} netkit;
430cc4f864bSAndrii Nakryiko 	};
4313ec84f4bSAndrii Nakryiko 	size_t :0;
4323ec84f4bSAndrii Nakryiko };
4335054a303SJiri Olsa #define bpf_link_create_opts__last_field uprobe_multi.pid
434cc4f864bSAndrii Nakryiko 
435cc4f864bSAndrii Nakryiko LIBBPF_API int bpf_link_create(int prog_fd, int target_fd,
436cc4f864bSAndrii Nakryiko 			       enum bpf_attach_type attach_type,
437cc4f864bSAndrii Nakryiko 			       const struct bpf_link_create_opts *opts);
438cc4f864bSAndrii Nakryiko 
4392e49527eSAndrii Nakryiko LIBBPF_API int bpf_link_detach(int link_fd);
4402e49527eSAndrii Nakryiko 
441cc4f864bSAndrii Nakryiko struct bpf_link_update_opts {
442cc4f864bSAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
443cc4f864bSAndrii Nakryiko 	__u32 flags;	   /* extra flags */
444cc4f864bSAndrii Nakryiko 	__u32 old_prog_fd; /* expected old program FD */
445912dd4b0SKui-Feng Lee 	__u32 old_map_fd;  /* expected old map FD */
446cc4f864bSAndrii Nakryiko };
447912dd4b0SKui-Feng Lee #define bpf_link_update_opts__last_field old_map_fd
448cc4f864bSAndrii Nakryiko 
449cc4f864bSAndrii Nakryiko LIBBPF_API int bpf_link_update(int link_fd, int new_prog_fd,
450cc4f864bSAndrii Nakryiko 			       const struct bpf_link_update_opts *opts);
451cc4f864bSAndrii Nakryiko 
452c09add2fSYonghong Song LIBBPF_API int bpf_iter_create(int link_fd);
453c09add2fSYonghong Song 
45464a97591SLorenz Bauer struct bpf_prog_test_run_attr {
45564a97591SLorenz Bauer 	int prog_fd;
45664a97591SLorenz Bauer 	int repeat;
45764a97591SLorenz Bauer 	const void *data_in;
45864a97591SLorenz Bauer 	__u32 data_size_in;
45964a97591SLorenz Bauer 	void *data_out;      /* optional */
46064a97591SLorenz Bauer 	__u32 data_size_out; /* in: max length of data_out
46164a97591SLorenz Bauer 			      * out: length of data_out */
46264a97591SLorenz Bauer 	__u32 retval;        /* out: return code of the BPF program */
46364a97591SLorenz Bauer 	__u32 duration;      /* out: average per repetition in ns */
4645e903c65SStanislav Fomichev 	const void *ctx_in; /* optional */
4655e903c65SStanislav Fomichev 	__u32 ctx_size_in;
4665e903c65SStanislav Fomichev 	void *ctx_out;      /* optional */
4675e903c65SStanislav Fomichev 	__u32 ctx_size_out; /* in: max length of ctx_out
4685e903c65SStanislav Fomichev 			     * out: length of cxt_out */
46964a97591SLorenz Bauer };
47064a97591SLorenz Bauer 
471ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_get_next_id(__u32 start_id, __u32 *next_id);
472ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_get_next_id(__u32 start_id, __u32 *next_id);
47309d7c2e3SQuentin Monnet LIBBPF_API int bpf_btf_get_next_id(__u32 start_id, __u32 *next_id);
4740dbc8668SAndrii Nakryiko LIBBPF_API int bpf_link_get_next_id(__u32 start_id, __u32 *next_id);
475243e3005SRoberto Sassu 
476243e3005SRoberto Sassu struct bpf_get_fd_by_id_opts {
477243e3005SRoberto Sassu 	size_t sz; /* size of this struct for forward/backward compatibility */
478243e3005SRoberto Sassu 	__u32 open_flags; /* permissions requested for the operation on fd */
479243e3005SRoberto Sassu 	size_t :0;
480243e3005SRoberto Sassu };
481243e3005SRoberto Sassu #define bpf_get_fd_by_id_opts__last_field open_flags
482243e3005SRoberto Sassu 
483ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_get_fd_by_id(__u32 id);
4848f13f168SRoberto Sassu LIBBPF_API int bpf_prog_get_fd_by_id_opts(__u32 id,
4858f13f168SRoberto Sassu 				const struct bpf_get_fd_by_id_opts *opts);
486ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_get_fd_by_id(__u32 id);
487243e3005SRoberto Sassu LIBBPF_API int bpf_map_get_fd_by_id_opts(__u32 id,
488243e3005SRoberto Sassu 				const struct bpf_get_fd_by_id_opts *opts);
489ab9e0848SAndrey Ignatov LIBBPF_API int bpf_btf_get_fd_by_id(__u32 id);
4902ce7cbf2SRoberto Sassu LIBBPF_API int bpf_btf_get_fd_by_id_opts(__u32 id,
4912ce7cbf2SRoberto Sassu 				const struct bpf_get_fd_by_id_opts *opts);
4920dbc8668SAndrii Nakryiko LIBBPF_API int bpf_link_get_fd_by_id(__u32 id);
49397c8f9ddSRoberto Sassu LIBBPF_API int bpf_link_get_fd_by_id_opts(__u32 id,
49497c8f9ddSRoberto Sassu 				const struct bpf_get_fd_by_id_opts *opts);
4950dbc8668SAndrii Nakryiko LIBBPF_API int bpf_obj_get_info_by_fd(int bpf_fd, void *info, __u32 *info_len);
4960a504fa1SIlya Leoshkevich 
4970a504fa1SIlya Leoshkevich /**
4980a504fa1SIlya Leoshkevich  * @brief **bpf_prog_get_info_by_fd()** obtains information about the BPF
4990a504fa1SIlya Leoshkevich  * program corresponding to *prog_fd*.
5000a504fa1SIlya Leoshkevich  *
5010a504fa1SIlya Leoshkevich  * Populates up to *info_len* bytes of *info* and updates *info_len* with the
5020a504fa1SIlya Leoshkevich  * actual number of bytes written to *info*.
5030a504fa1SIlya Leoshkevich  *
5040a504fa1SIlya Leoshkevich  * @param prog_fd BPF program file descriptor
5050a504fa1SIlya Leoshkevich  * @param info pointer to **struct bpf_prog_info** that will be populated with
5060a504fa1SIlya Leoshkevich  * BPF program information
5070a504fa1SIlya Leoshkevich  * @param info_len pointer to the size of *info*; on success updated with the
5080a504fa1SIlya Leoshkevich  * number of bytes written to *info*
5090a504fa1SIlya Leoshkevich  * @return 0, on success; negative error code, otherwise (errno is also set to
5100a504fa1SIlya Leoshkevich  * the error code)
51155a9ed0eSIlya Leoshkevich  */
51255a9ed0eSIlya Leoshkevich LIBBPF_API int bpf_prog_get_info_by_fd(int prog_fd, struct bpf_prog_info *info, __u32 *info_len);
5130a504fa1SIlya Leoshkevich 
5140a504fa1SIlya Leoshkevich /**
5150a504fa1SIlya Leoshkevich  * @brief **bpf_map_get_info_by_fd()** obtains information about the BPF
5160a504fa1SIlya Leoshkevich  * map corresponding to *map_fd*.
5170a504fa1SIlya Leoshkevich  *
5180a504fa1SIlya Leoshkevich  * Populates up to *info_len* bytes of *info* and updates *info_len* with the
5190a504fa1SIlya Leoshkevich  * actual number of bytes written to *info*.
5200a504fa1SIlya Leoshkevich  *
5210a504fa1SIlya Leoshkevich  * @param map_fd BPF map file descriptor
5220a504fa1SIlya Leoshkevich  * @param info pointer to **struct bpf_map_info** that will be populated with
5230a504fa1SIlya Leoshkevich  * BPF map information
5240a504fa1SIlya Leoshkevich  * @param info_len pointer to the size of *info*; on success updated with the
5250a504fa1SIlya Leoshkevich  * number of bytes written to *info*
5260a504fa1SIlya Leoshkevich  * @return 0, on success; negative error code, otherwise (errno is also set to
5270a504fa1SIlya Leoshkevich  * the error code)
5280a504fa1SIlya Leoshkevich  */
52955a9ed0eSIlya Leoshkevich LIBBPF_API int bpf_map_get_info_by_fd(int map_fd, struct bpf_map_info *info, __u32 *info_len);
5300a504fa1SIlya Leoshkevich 
5310a504fa1SIlya Leoshkevich /**
5320a504fa1SIlya Leoshkevich  * @brief **bpf_btf_get_info_by_fd()** obtains information about the
5330a504fa1SIlya Leoshkevich  * BTF object corresponding to *btf_fd*.
5340a504fa1SIlya Leoshkevich  *
5350a504fa1SIlya Leoshkevich  * Populates up to *info_len* bytes of *info* and updates *info_len* with the
5360a504fa1SIlya Leoshkevich  * actual number of bytes written to *info*.
5370a504fa1SIlya Leoshkevich  *
5380a504fa1SIlya Leoshkevich  * @param btf_fd BTF object file descriptor
5390a504fa1SIlya Leoshkevich  * @param info pointer to **struct bpf_btf_info** that will be populated with
5400a504fa1SIlya Leoshkevich  * BTF object information
5410a504fa1SIlya Leoshkevich  * @param info_len pointer to the size of *info*; on success updated with the
5420a504fa1SIlya Leoshkevich  * number of bytes written to *info*
5430a504fa1SIlya Leoshkevich  * @return 0, on success; negative error code, otherwise (errno is also set to
5440a504fa1SIlya Leoshkevich  * the error code)
5450a504fa1SIlya Leoshkevich  */
54655a9ed0eSIlya Leoshkevich LIBBPF_API int bpf_btf_get_info_by_fd(int btf_fd, struct bpf_btf_info *info, __u32 *info_len);
5470a504fa1SIlya Leoshkevich 
5480a504fa1SIlya Leoshkevich /**
5490a504fa1SIlya Leoshkevich  * @brief **bpf_btf_get_info_by_fd()** obtains information about the BPF
5500a504fa1SIlya Leoshkevich  * link corresponding to *link_fd*.
5510a504fa1SIlya Leoshkevich  *
5520a504fa1SIlya Leoshkevich  * Populates up to *info_len* bytes of *info* and updates *info_len* with the
5530a504fa1SIlya Leoshkevich  * actual number of bytes written to *info*.
5540a504fa1SIlya Leoshkevich  *
5550a504fa1SIlya Leoshkevich  * @param link_fd BPF link file descriptor
5560a504fa1SIlya Leoshkevich  * @param info pointer to **struct bpf_link_info** that will be populated with
5570a504fa1SIlya Leoshkevich  * BPF link information
5580a504fa1SIlya Leoshkevich  * @param info_len pointer to the size of *info*; on success updated with the
5590a504fa1SIlya Leoshkevich  * number of bytes written to *info*
5600a504fa1SIlya Leoshkevich  * @return 0, on success; negative error code, otherwise (errno is also set to
5610a504fa1SIlya Leoshkevich  * the error code)
5620a504fa1SIlya Leoshkevich  */
56355a9ed0eSIlya Leoshkevich LIBBPF_API int bpf_link_get_info_by_fd(int link_fd, struct bpf_link_info *info, __u32 *info_len);
564a4b2f3cfSStanislav Fomichev 
565a4b2f3cfSStanislav Fomichev struct bpf_prog_query_opts {
566a4b2f3cfSStanislav Fomichev 	size_t sz; /* size of this struct for forward/backward compatibility */
567a4b2f3cfSStanislav Fomichev 	__u32 query_flags;
568a4b2f3cfSStanislav Fomichev 	__u32 attach_flags; /* output argument */
569a4b2f3cfSStanislav Fomichev 	__u32 *prog_ids;
570fe20ce3aSDaniel Borkmann 	union {
571fe20ce3aSDaniel Borkmann 		/* input+output argument */
572fe20ce3aSDaniel Borkmann 		__u32 prog_cnt;
573fe20ce3aSDaniel Borkmann 		__u32 count;
574a4b2f3cfSStanislav Fomichev 	};
575fe20ce3aSDaniel Borkmann 	__u32 *prog_attach_flags;
576fe20ce3aSDaniel Borkmann 	__u32 *link_ids;
577fe20ce3aSDaniel Borkmann 	__u32 *link_attach_flags;
578fe20ce3aSDaniel Borkmann 	__u64 revision;
579fe20ce3aSDaniel Borkmann 	size_t :0;
580fe20ce3aSDaniel Borkmann };
581fe20ce3aSDaniel Borkmann #define bpf_prog_query_opts__last_field revision
582a4b2f3cfSStanislav Fomichev 
583fe20ce3aSDaniel Borkmann /**
584fe20ce3aSDaniel Borkmann  * @brief **bpf_prog_query_opts()** queries the BPF programs and BPF links
585fe20ce3aSDaniel Borkmann  * which are attached to *target* which can represent a file descriptor or
586fe20ce3aSDaniel Borkmann  * netdevice ifindex.
587fe20ce3aSDaniel Borkmann  *
588fe20ce3aSDaniel Borkmann  * @param target query location file descriptor or ifindex
589fe20ce3aSDaniel Borkmann  * @param type attach type for the BPF program
590fe20ce3aSDaniel Borkmann  * @param opts options for configuring the query
591fe20ce3aSDaniel Borkmann  * @return 0, on success; negative error code, otherwise (errno is also set to
592fe20ce3aSDaniel Borkmann  * the error code)
593fe20ce3aSDaniel Borkmann  */
594fe20ce3aSDaniel Borkmann LIBBPF_API int bpf_prog_query_opts(int target, enum bpf_attach_type type,
595a4b2f3cfSStanislav Fomichev 				   struct bpf_prog_query_opts *opts);
596ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_query(int target_fd, enum bpf_attach_type type,
597ab9e0848SAndrey Ignatov 			      __u32 query_flags, __u32 *attach_flags,
598ab9e0848SAndrey Ignatov 			      __u32 *prog_ids, __u32 *prog_cnt);
599a4b2f3cfSStanislav Fomichev 
600ab9e0848SAndrey Ignatov LIBBPF_API int bpf_raw_tracepoint_open(const char *name, int prog_fd);
601ab9e0848SAndrey Ignatov LIBBPF_API int bpf_task_fd_query(int pid, int fd, __u32 flags, char *buf,
602ab9e0848SAndrey Ignatov 				 __u32 *buf_len, __u32 *prog_id, __u32 *fd_type,
603ab9e0848SAndrey Ignatov 				 __u64 *probe_offset, __u64 *probe_addr);
6044e15507fSAndrii Nakryiko 
605b4269341SAndrii Nakryiko #ifdef __cplusplus
606b4269341SAndrii Nakryiko /* forward-declaring enums in C++ isn't compatible with pure C enums, so
607b4269341SAndrii Nakryiko  * instead define bpf_enable_stats() as accepting int as an input
608b4269341SAndrii Nakryiko  */
609b4269341SAndrii Nakryiko LIBBPF_API int bpf_enable_stats(int type);
610b4269341SAndrii Nakryiko #else
6114e15507fSAndrii Nakryiko enum bpf_stats_type; /* defined in up-to-date linux/bpf.h */
6120bee1067SSong Liu LIBBPF_API int bpf_enable_stats(enum bpf_stats_type type);
613b4269341SAndrii Nakryiko #endif
6148c4905b9SStanislav Fomichev 
6155d23328dSYiFei Zhu struct bpf_prog_bind_opts {
6165d23328dSYiFei Zhu 	size_t sz; /* size of this struct for forward/backward compatibility */
6175d23328dSYiFei Zhu 	__u32 flags;
6185d23328dSYiFei Zhu };
6195d23328dSYiFei Zhu #define bpf_prog_bind_opts__last_field flags
6205d23328dSYiFei Zhu 
6215d23328dSYiFei Zhu LIBBPF_API int bpf_prog_bind_map(int prog_fd, int map_fd,
6225d23328dSYiFei Zhu 				 const struct bpf_prog_bind_opts *opts);
62388f7fe72SSong Liu 
62488f7fe72SSong Liu struct bpf_test_run_opts {
62588f7fe72SSong Liu 	size_t sz; /* size of this struct for forward/backward compatibility */
62688f7fe72SSong Liu 	const void *data_in; /* optional */
62788f7fe72SSong Liu 	void *data_out;      /* optional */
62888f7fe72SSong Liu 	__u32 data_size_in;
62988f7fe72SSong Liu 	__u32 data_size_out; /* in: max length of data_out
63088f7fe72SSong Liu 			      * out: length of data_out
63188f7fe72SSong Liu 			      */
63288f7fe72SSong Liu 	const void *ctx_in; /* optional */
63388f7fe72SSong Liu 	void *ctx_out;      /* optional */
63488f7fe72SSong Liu 	__u32 ctx_size_in;
63588f7fe72SSong Liu 	__u32 ctx_size_out; /* in: max length of ctx_out
63688f7fe72SSong Liu 			     * out: length of cxt_out
63788f7fe72SSong Liu 			     */
63888f7fe72SSong Liu 	__u32 retval;        /* out: return code of the BPF program */
63988f7fe72SSong Liu 	int repeat;
64088f7fe72SSong Liu 	__u32 duration;      /* out: average per repetition in ns */
64188f7fe72SSong Liu 	__u32 flags;
64288f7fe72SSong Liu 	__u32 cpu;
64324592ad1SToke Høiland-Jørgensen 	__u32 batch_size;
64488f7fe72SSong Liu };
64524592ad1SToke Høiland-Jørgensen #define bpf_test_run_opts__last_field batch_size
64688f7fe72SSong Liu 
64788f7fe72SSong Liu LIBBPF_API int bpf_prog_test_run_opts(int prog_fd,
64888f7fe72SSong Liu 				      struct bpf_test_run_opts *opts);
64988f7fe72SSong Liu 
650639ecd7dSAndrii Nakryiko struct bpf_token_create_opts {
651639ecd7dSAndrii Nakryiko 	size_t sz; /* size of this struct for forward/backward compatibility */
652639ecd7dSAndrii Nakryiko 	__u32 flags;
653639ecd7dSAndrii Nakryiko 	size_t :0;
654639ecd7dSAndrii Nakryiko };
655639ecd7dSAndrii Nakryiko #define bpf_token_create_opts__last_field flags
656639ecd7dSAndrii Nakryiko 
657639ecd7dSAndrii Nakryiko /**
658639ecd7dSAndrii Nakryiko  * @brief **bpf_token_create()** creates a new instance of BPF token derived
659639ecd7dSAndrii Nakryiko  * from specified BPF FS mount point.
660639ecd7dSAndrii Nakryiko  *
661639ecd7dSAndrii Nakryiko  * BPF token created with this API can be passed to bpf() syscall for
662639ecd7dSAndrii Nakryiko  * commands like BPF_PROG_LOAD, BPF_MAP_CREATE, etc.
663639ecd7dSAndrii Nakryiko  *
664639ecd7dSAndrii Nakryiko  * @param bpffs_fd FD for BPF FS instance from which to derive a BPF token
665639ecd7dSAndrii Nakryiko  * instance.
666639ecd7dSAndrii Nakryiko  * @param opts optional BPF token creation options, can be NULL
667639ecd7dSAndrii Nakryiko  *
668639ecd7dSAndrii Nakryiko  * @return BPF token FD > 0, on success; negative error code, otherwise (errno
669639ecd7dSAndrii Nakryiko  * is also set to the error code)
670639ecd7dSAndrii Nakryiko  */
671639ecd7dSAndrii Nakryiko LIBBPF_API int bpf_token_create(int bpffs_fd,
672639ecd7dSAndrii Nakryiko 				struct bpf_token_create_opts *opts);
673639ecd7dSAndrii Nakryiko 
6748c4905b9SStanislav Fomichev #ifdef __cplusplus
6758c4905b9SStanislav Fomichev } /* extern "C" */
6768c4905b9SStanislav Fomichev #endif
6778c4905b9SStanislav Fomichev 
678eff81908SAndrey Ignatov #endif /* __LIBBPF_BPF_H */
679