11bc38b8fSAlexei Starovoitov /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ 26061a3d6SEric Leblond 3e3ed2fefSWang Nan /* 40a504fa1SIlya Leoshkevich * Common BPF ELF operations. 5e3ed2fefSWang Nan * 6e3ed2fefSWang Nan * Copyright (C) 2013-2015 Alexei Starovoitov <ast@kernel.org> 7e3ed2fefSWang Nan * Copyright (C) 2015 Wang Nan <wangnan0@huawei.com> 8e3ed2fefSWang Nan * Copyright (C) 2015 Huawei Inc. 9203d1cacSWang Nan * 10203d1cacSWang Nan * This program is free software; you can redistribute it and/or 11203d1cacSWang Nan * modify it under the terms of the GNU Lesser General Public 12203d1cacSWang Nan * License as published by the Free Software Foundation; 13203d1cacSWang Nan * version 2.1 of the License (not later!) 14203d1cacSWang Nan * 15203d1cacSWang Nan * This program is distributed in the hope that it will be useful, 16203d1cacSWang Nan * but WITHOUT ANY WARRANTY; without even the implied warranty of 17203d1cacSWang Nan * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 18203d1cacSWang Nan * GNU Lesser General Public License for more details. 19203d1cacSWang Nan * 20203d1cacSWang Nan * You should have received a copy of the GNU Lesser General Public 21203d1cacSWang Nan * License along with this program; if not, see <http://www.gnu.org/licenses> 22e3ed2fefSWang Nan */ 23eff81908SAndrey Ignatov #ifndef __LIBBPF_BPF_H 24eff81908SAndrey Ignatov #define __LIBBPF_BPF_H 25e3ed2fefSWang Nan 26e3ed2fefSWang Nan #include <linux/bpf.h> 27878a4d32SBjörn Töpel #include <stdbool.h> 287a5980f9SMickaël Salaün #include <stddef.h> 2932e621e5SDaniel T. Lee #include <stdint.h> 30e3ed2fefSWang Nan 31544402d4SAndrii Nakryiko #include "libbpf_common.h" 32be80e9cdSAndrii Nakryiko #include "libbpf_legacy.h" 33544402d4SAndrii Nakryiko 348c4905b9SStanislav Fomichev #ifdef __cplusplus 358c4905b9SStanislav Fomichev extern "C" { 368c4905b9SStanislav Fomichev #endif 378c4905b9SStanislav Fomichev 38e542f2c4SAndrii Nakryiko int libbpf_set_memlock_rlim(size_t memlock_bytes); 39e542f2c4SAndrii Nakryiko 40992c4225SAndrii Nakryiko struct bpf_map_create_opts { 41992c4225SAndrii Nakryiko size_t sz; /* size of this struct for forward/backward compatibility */ 42992c4225SAndrii Nakryiko 43992c4225SAndrii Nakryiko __u32 btf_fd; 44992c4225SAndrii Nakryiko __u32 btf_key_type_id; 45992c4225SAndrii Nakryiko __u32 btf_value_type_id; 46992c4225SAndrii Nakryiko __u32 btf_vmlinux_value_type_id; 47992c4225SAndrii Nakryiko 4874d98070SAndrii Nakryiko __u32 inner_map_fd; 4974d98070SAndrii Nakryiko __u32 map_flags; 50992c4225SAndrii Nakryiko __u64 map_extra; 51992c4225SAndrii Nakryiko 5274d98070SAndrii Nakryiko __u32 numa_node; 5374d98070SAndrii Nakryiko __u32 map_ifindex; 549e926acdSKui-Feng Lee __s32 value_type_btf_obj_fd; 55364f8483SAndrii Nakryiko 56364f8483SAndrii Nakryiko __u32 token_fd; 579e926acdSKui-Feng Lee size_t :0; 58992c4225SAndrii Nakryiko }; 59364f8483SAndrii Nakryiko #define bpf_map_create_opts__last_field token_fd 60992c4225SAndrii Nakryiko 61992c4225SAndrii Nakryiko LIBBPF_API int bpf_map_create(enum bpf_map_type map_type, 62992c4225SAndrii Nakryiko const char *map_name, 63992c4225SAndrii Nakryiko __u32 key_size, 64992c4225SAndrii Nakryiko __u32 value_size, 65992c4225SAndrii Nakryiko __u32 max_entries, 66992c4225SAndrii Nakryiko const struct bpf_map_create_opts *opts); 67992c4225SAndrii Nakryiko 68d10ef2b8SAndrii Nakryiko struct bpf_prog_load_opts { 69d10ef2b8SAndrii Nakryiko size_t sz; /* size of this struct for forward/backward compatibility */ 70d10ef2b8SAndrii Nakryiko 71d10ef2b8SAndrii Nakryiko /* libbpf can retry BPF_PROG_LOAD command if bpf() syscall returns 72d10ef2b8SAndrii Nakryiko * -EAGAIN. This field determines how many attempts libbpf has to 73d10ef2b8SAndrii Nakryiko * make. If not specified, libbpf will use default value of 5. 74d10ef2b8SAndrii Nakryiko */ 75d10ef2b8SAndrii Nakryiko int attempts; 76d10ef2b8SAndrii Nakryiko 77d10ef2b8SAndrii Nakryiko enum bpf_attach_type expected_attach_type; 78d10ef2b8SAndrii Nakryiko __u32 prog_btf_fd; 79d10ef2b8SAndrii Nakryiko __u32 prog_flags; 80d10ef2b8SAndrii Nakryiko __u32 prog_ifindex; 81d10ef2b8SAndrii Nakryiko __u32 kern_version; 82d10ef2b8SAndrii Nakryiko 83d10ef2b8SAndrii Nakryiko __u32 attach_btf_id; 84d10ef2b8SAndrii Nakryiko __u32 attach_prog_fd; 85d10ef2b8SAndrii Nakryiko __u32 attach_btf_obj_fd; 86d10ef2b8SAndrii Nakryiko 87d10ef2b8SAndrii Nakryiko const int *fd_array; 88d10ef2b8SAndrii Nakryiko 89d10ef2b8SAndrii Nakryiko /* .BTF.ext func info data */ 90d10ef2b8SAndrii Nakryiko const void *func_info; 91d10ef2b8SAndrii Nakryiko __u32 func_info_cnt; 92d10ef2b8SAndrii Nakryiko __u32 func_info_rec_size; 93d10ef2b8SAndrii Nakryiko 94d10ef2b8SAndrii Nakryiko /* .BTF.ext line info data */ 95d10ef2b8SAndrii Nakryiko const void *line_info; 96d10ef2b8SAndrii Nakryiko __u32 line_info_cnt; 97d10ef2b8SAndrii Nakryiko __u32 line_info_rec_size; 98d10ef2b8SAndrii Nakryiko 99d10ef2b8SAndrii Nakryiko /* verifier log options */ 100d10ef2b8SAndrii Nakryiko __u32 log_level; 101d10ef2b8SAndrii Nakryiko __u32 log_size; 102d10ef2b8SAndrii Nakryiko char *log_buf; 10394e55c0fSAndrii Nakryiko /* output: actual total log contents size (including termintaing zero). 10494e55c0fSAndrii Nakryiko * It could be both larger than original log_size (if log was 10594e55c0fSAndrii Nakryiko * truncated), or smaller (if log buffer wasn't filled completely). 10694e55c0fSAndrii Nakryiko * If kernel doesn't support this feature, log_size is left unchanged. 10794e55c0fSAndrii Nakryiko */ 10894e55c0fSAndrii Nakryiko __u32 log_true_size; 10994e55c0fSAndrii Nakryiko size_t :0; 110d10ef2b8SAndrii Nakryiko }; 11194e55c0fSAndrii Nakryiko #define bpf_prog_load_opts__last_field log_true_size 112d10ef2b8SAndrii Nakryiko 113d10ef2b8SAndrii Nakryiko LIBBPF_API int bpf_prog_load(enum bpf_prog_type prog_type, 114d10ef2b8SAndrii Nakryiko const char *prog_name, const char *license, 115d10ef2b8SAndrii Nakryiko const struct bpf_insn *insns, size_t insn_cnt, 11694e55c0fSAndrii Nakryiko struct bpf_prog_load_opts *opts); 117d7be143bSAndrey Ignatov 118c034a177SJohn Fastabend /* Flags to direct loading requirements */ 119c034a177SJohn Fastabend #define MAPS_RELAX_COMPAT 0x01 120c034a177SJohn Fastabend 121e0e3ea88SAndrii Nakryiko /* Recommended log buffer size */ 1224519efa6SMcCabe, Robert J #define BPF_LOG_BUF_SIZE (UINT32_MAX >> 8) /* verifier maximum in kernels <= 5.1 */ 123e0e3ea88SAndrii Nakryiko 1240ed08d67SAndrii Nakryiko struct bpf_btf_load_opts { 1250ed08d67SAndrii Nakryiko size_t sz; /* size of this struct for forward/backward compatibility */ 1260ed08d67SAndrii Nakryiko 1270ed08d67SAndrii Nakryiko /* kernel log options */ 1280ed08d67SAndrii Nakryiko char *log_buf; 1290ed08d67SAndrii Nakryiko __u32 log_level; 1300ed08d67SAndrii Nakryiko __u32 log_size; 131097d8002SAndrii Nakryiko /* output: actual total log contents size (including termintaing zero). 132097d8002SAndrii Nakryiko * It could be both larger than original log_size (if log was 133097d8002SAndrii Nakryiko * truncated), or smaller (if log buffer wasn't filled completely). 134097d8002SAndrii Nakryiko * If kernel doesn't support this feature, log_size is left unchanged. 135097d8002SAndrii Nakryiko */ 136097d8002SAndrii Nakryiko __u32 log_true_size; 137*a3d63e85SAndrii Nakryiko 138*a3d63e85SAndrii Nakryiko __u32 btf_flags; 139*a3d63e85SAndrii Nakryiko __u32 token_fd; 140097d8002SAndrii Nakryiko size_t :0; 1410ed08d67SAndrii Nakryiko }; 142*a3d63e85SAndrii Nakryiko #define bpf_btf_load_opts__last_field token_fd 1430ed08d67SAndrii Nakryiko 1440ed08d67SAndrii Nakryiko LIBBPF_API int bpf_btf_load(const void *btf_data, size_t btf_size, 145097d8002SAndrii Nakryiko struct bpf_btf_load_opts *opts); 1460ed08d67SAndrii Nakryiko 147ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_update_elem(int fd, const void *key, const void *value, 14883d994d0SJoe Stringer __u64 flags); 1499742da01SWang Nan 150ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_lookup_elem(int fd, const void *key, void *value); 151df5d22faSAlexei Starovoitov LIBBPF_API int bpf_map_lookup_elem_flags(int fd, const void *key, void *value, 152df5d22faSAlexei Starovoitov __u64 flags); 15343b987d2SMauricio Vasquez B LIBBPF_API int bpf_map_lookup_and_delete_elem(int fd, const void *key, 15443b987d2SMauricio Vasquez B void *value); 155d59b9f2dSDenis Salopek LIBBPF_API int bpf_map_lookup_and_delete_elem_flags(int fd, const void *key, 156d59b9f2dSDenis Salopek void *value, __u64 flags); 157ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_delete_elem(int fd, const void *key); 158737d0646SAndrii Nakryiko LIBBPF_API int bpf_map_delete_elem_flags(int fd, const void *key, __u64 flags); 159ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_get_next_key(int fd, const void *key, void *next_key); 160d859900cSDaniel Borkmann LIBBPF_API int bpf_map_freeze(int fd); 1612ab3d86eSYonghong Song 1622ab3d86eSYonghong Song struct bpf_map_batch_opts { 1632ab3d86eSYonghong Song size_t sz; /* size of this struct for forward/backward compatibility */ 1642ab3d86eSYonghong Song __u64 elem_flags; 1652ab3d86eSYonghong Song __u64 flags; 1662ab3d86eSYonghong Song }; 1672ab3d86eSYonghong Song #define bpf_map_batch_opts__last_field flags 1682ab3d86eSYonghong Song 169e59618f0SGrant Seltzer 170e59618f0SGrant Seltzer /** 171e59618f0SGrant Seltzer * @brief **bpf_map_delete_batch()** allows for batch deletion of multiple 172e59618f0SGrant Seltzer * elements in a BPF map. 173e59618f0SGrant Seltzer * 174e59618f0SGrant Seltzer * @param fd BPF map file descriptor 175e59618f0SGrant Seltzer * @param keys pointer to an array of *count* keys 176e59618f0SGrant Seltzer * @param count input and output parameter; on input **count** represents the 177e59618f0SGrant Seltzer * number of elements in the map to delete in batch; 178e59618f0SGrant Seltzer * on output if a non-EFAULT error is returned, **count** represents the number of deleted 179e59618f0SGrant Seltzer * elements if the output **count** value is not equal to the input **count** value 180e59618f0SGrant Seltzer * If EFAULT is returned, **count** should not be trusted to be correct. 181e59618f0SGrant Seltzer * @param opts options for configuring the way the batch deletion works 182e59618f0SGrant Seltzer * @return 0, on success; negative error code, otherwise (errno is also set to 183e59618f0SGrant Seltzer * the error code) 184e59618f0SGrant Seltzer */ 185e59618f0SGrant Seltzer LIBBPF_API int bpf_map_delete_batch(int fd, const void *keys, 1862ab3d86eSYonghong Song __u32 *count, 1872ab3d86eSYonghong Song const struct bpf_map_batch_opts *opts); 188e59618f0SGrant Seltzer 189e59618f0SGrant Seltzer /** 190e59618f0SGrant Seltzer * @brief **bpf_map_lookup_batch()** allows for batch lookup of BPF map elements. 191e59618f0SGrant Seltzer * 192e59618f0SGrant Seltzer * The parameter *in_batch* is the address of the first element in the batch to read. 193e59618f0SGrant Seltzer * *out_batch* is an output parameter that should be passed as *in_batch* to subsequent 194e59618f0SGrant Seltzer * calls to **bpf_map_lookup_batch()**. NULL can be passed for *in_batch* to indicate 195e59618f0SGrant Seltzer * that the batched lookup starts from the beginning of the map. 196e59618f0SGrant Seltzer * 197e59618f0SGrant Seltzer * The *keys* and *values* are output parameters which must point to memory large enough to 198e59618f0SGrant Seltzer * hold *count* items based on the key and value size of the map *map_fd*. The *keys* 199e59618f0SGrant Seltzer * buffer must be of *key_size* * *count*. The *values* buffer must be of 200e59618f0SGrant Seltzer * *value_size* * *count*. 201e59618f0SGrant Seltzer * 202e59618f0SGrant Seltzer * @param fd BPF map file descriptor 203e59618f0SGrant Seltzer * @param in_batch address of the first element in batch to read, can pass NULL to 204e59618f0SGrant Seltzer * indicate that the batched lookup starts from the beginning of the map. 205e59618f0SGrant Seltzer * @param out_batch output parameter that should be passed to next call as *in_batch* 206e59618f0SGrant Seltzer * @param keys pointer to an array large enough for *count* keys 207e59618f0SGrant Seltzer * @param values pointer to an array large enough for *count* values 208e59618f0SGrant Seltzer * @param count input and output parameter; on input it's the number of elements 209e59618f0SGrant Seltzer * in the map to read in batch; on output it's the number of elements that were 210e59618f0SGrant Seltzer * successfully read. 211e59618f0SGrant Seltzer * If a non-EFAULT error is returned, count will be set as the number of elements 212e59618f0SGrant Seltzer * that were read before the error occurred. 213e59618f0SGrant Seltzer * If EFAULT is returned, **count** should not be trusted to be correct. 214e59618f0SGrant Seltzer * @param opts options for configuring the way the batch lookup works 215e59618f0SGrant Seltzer * @return 0, on success; negative error code, otherwise (errno is also set to 216e59618f0SGrant Seltzer * the error code) 217e59618f0SGrant Seltzer */ 2182ab3d86eSYonghong Song LIBBPF_API int bpf_map_lookup_batch(int fd, void *in_batch, void *out_batch, 2192ab3d86eSYonghong Song void *keys, void *values, __u32 *count, 2202ab3d86eSYonghong Song const struct bpf_map_batch_opts *opts); 221e59618f0SGrant Seltzer 222e59618f0SGrant Seltzer /** 223e59618f0SGrant Seltzer * @brief **bpf_map_lookup_and_delete_batch()** allows for batch lookup and deletion 224e59618f0SGrant Seltzer * of BPF map elements where each element is deleted after being retrieved. 225e59618f0SGrant Seltzer * 226e59618f0SGrant Seltzer * @param fd BPF map file descriptor 227e59618f0SGrant Seltzer * @param in_batch address of the first element in batch to read, can pass NULL to 228e59618f0SGrant Seltzer * get address of the first element in *out_batch* 229e59618f0SGrant Seltzer * @param out_batch output parameter that should be passed to next call as *in_batch* 230e59618f0SGrant Seltzer * @param keys pointer to an array of *count* keys 231e59618f0SGrant Seltzer * @param values pointer to an array large enough for *count* values 232e59618f0SGrant Seltzer * @param count input and output parameter; on input it's the number of elements 233e59618f0SGrant Seltzer * in the map to read and delete in batch; on output it represents the number of 234e59618f0SGrant Seltzer * elements that were successfully read and deleted 235e59618f0SGrant Seltzer * If a non-**EFAULT** error code is returned and if the output **count** value 236e59618f0SGrant Seltzer * is not equal to the input **count** value, up to **count** elements may 237e59618f0SGrant Seltzer * have been deleted. 238e59618f0SGrant Seltzer * if **EFAULT** is returned up to *count* elements may have been deleted without 239e59618f0SGrant Seltzer * being returned via the *keys* and *values* output parameters. 240e59618f0SGrant Seltzer * @param opts options for configuring the way the batch lookup and delete works 241e59618f0SGrant Seltzer * @return 0, on success; negative error code, otherwise (errno is also set to 242e59618f0SGrant Seltzer * the error code) 243e59618f0SGrant Seltzer */ 2442ab3d86eSYonghong Song LIBBPF_API int bpf_map_lookup_and_delete_batch(int fd, void *in_batch, 2452ab3d86eSYonghong Song void *out_batch, void *keys, 2462ab3d86eSYonghong Song void *values, __u32 *count, 2472ab3d86eSYonghong Song const struct bpf_map_batch_opts *opts); 248e59618f0SGrant Seltzer 249e59618f0SGrant Seltzer /** 250e59618f0SGrant Seltzer * @brief **bpf_map_update_batch()** updates multiple elements in a map 251e59618f0SGrant Seltzer * by specifying keys and their corresponding values. 252e59618f0SGrant Seltzer * 253e59618f0SGrant Seltzer * The *keys* and *values* parameters must point to memory large enough 254e59618f0SGrant Seltzer * to hold *count* items based on the key and value size of the map. 255e59618f0SGrant Seltzer * 256e59618f0SGrant Seltzer * The *opts* parameter can be used to control how *bpf_map_update_batch()* 257e59618f0SGrant Seltzer * should handle keys that either do or do not already exist in the map. 258e59618f0SGrant Seltzer * In particular the *flags* parameter of *bpf_map_batch_opts* can be 259e59618f0SGrant Seltzer * one of the following: 260e59618f0SGrant Seltzer * 261e59618f0SGrant Seltzer * Note that *count* is an input and output parameter, where on output it 262e59618f0SGrant Seltzer * represents how many elements were successfully updated. Also note that if 263e59618f0SGrant Seltzer * **EFAULT** then *count* should not be trusted to be correct. 264e59618f0SGrant Seltzer * 265e59618f0SGrant Seltzer * **BPF_ANY** 266e59618f0SGrant Seltzer * Create new elements or update existing. 267e59618f0SGrant Seltzer * 268e59618f0SGrant Seltzer * **BPF_NOEXIST** 269e59618f0SGrant Seltzer * Create new elements only if they do not exist. 270e59618f0SGrant Seltzer * 271e59618f0SGrant Seltzer * **BPF_EXIST** 272e59618f0SGrant Seltzer * Update existing elements. 273e59618f0SGrant Seltzer * 274e59618f0SGrant Seltzer * **BPF_F_LOCK** 275e59618f0SGrant Seltzer * Update spin_lock-ed map elements. This must be 276e59618f0SGrant Seltzer * specified if the map value contains a spinlock. 277e59618f0SGrant Seltzer * 278e59618f0SGrant Seltzer * @param fd BPF map file descriptor 279e59618f0SGrant Seltzer * @param keys pointer to an array of *count* keys 280e59618f0SGrant Seltzer * @param values pointer to an array of *count* values 281e59618f0SGrant Seltzer * @param count input and output parameter; on input it's the number of elements 282e59618f0SGrant Seltzer * in the map to update in batch; on output if a non-EFAULT error is returned, 283e59618f0SGrant Seltzer * **count** represents the number of updated elements if the output **count** 284e59618f0SGrant Seltzer * value is not equal to the input **count** value. 285e59618f0SGrant Seltzer * If EFAULT is returned, **count** should not be trusted to be correct. 286e59618f0SGrant Seltzer * @param opts options for configuring the way the batch update works 287e59618f0SGrant Seltzer * @return 0, on success; negative error code, otherwise (errno is also set to 288e59618f0SGrant Seltzer * the error code) 289e59618f0SGrant Seltzer */ 290e59618f0SGrant Seltzer LIBBPF_API int bpf_map_update_batch(int fd, const void *keys, const void *values, 2912ab3d86eSYonghong Song __u32 *count, 2922ab3d86eSYonghong Song const struct bpf_map_batch_opts *opts); 2932ab3d86eSYonghong Song 294f1674dc7SAndrii Nakryiko struct bpf_obj_pin_opts { 295f1674dc7SAndrii Nakryiko size_t sz; /* size of this struct for forward/backward compatibility */ 296f1674dc7SAndrii Nakryiko 297f1674dc7SAndrii Nakryiko __u32 file_flags; 298f1674dc7SAndrii Nakryiko int path_fd; 299f1674dc7SAndrii Nakryiko 300f1674dc7SAndrii Nakryiko size_t :0; 301f1674dc7SAndrii Nakryiko }; 302f1674dc7SAndrii Nakryiko #define bpf_obj_pin_opts__last_field path_fd 303f1674dc7SAndrii Nakryiko 304f1674dc7SAndrii Nakryiko LIBBPF_API int bpf_obj_pin(int fd, const char *pathname); 305f1674dc7SAndrii Nakryiko LIBBPF_API int bpf_obj_pin_opts(int fd, const char *pathname, 306f1674dc7SAndrii Nakryiko const struct bpf_obj_pin_opts *opts); 307f1674dc7SAndrii Nakryiko 308395fc4faSJoe Burton struct bpf_obj_get_opts { 309395fc4faSJoe Burton size_t sz; /* size of this struct for forward/backward compatibility */ 310395fc4faSJoe Burton 311395fc4faSJoe Burton __u32 file_flags; 312f1674dc7SAndrii Nakryiko int path_fd; 313395fc4faSJoe Burton 314395fc4faSJoe Burton size_t :0; 315395fc4faSJoe Burton }; 316f1674dc7SAndrii Nakryiko #define bpf_obj_get_opts__last_field path_fd 317395fc4faSJoe Burton 318ab9e0848SAndrey Ignatov LIBBPF_API int bpf_obj_get(const char *pathname); 319395fc4faSJoe Burton LIBBPF_API int bpf_obj_get_opts(const char *pathname, 320395fc4faSJoe Burton const struct bpf_obj_get_opts *opts); 321cdbee383SAndrey Ignatov 322ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_attach(int prog_fd, int attachable_fd, 323ab9e0848SAndrey Ignatov enum bpf_attach_type type, unsigned int flags); 324ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_detach(int attachable_fd, enum bpf_attach_type type); 325ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_detach2(int prog_fd, int attachable_fd, 326ab9e0848SAndrey Ignatov enum bpf_attach_type type); 32764a97591SLorenz Bauer 328fe20ce3aSDaniel Borkmann struct bpf_prog_attach_opts { 329fe20ce3aSDaniel Borkmann size_t sz; /* size of this struct for forward/backward compatibility */ 330fe20ce3aSDaniel Borkmann __u32 flags; 331fe20ce3aSDaniel Borkmann union { 332fe20ce3aSDaniel Borkmann int replace_prog_fd; 333fe20ce3aSDaniel Borkmann int replace_fd; 334fe20ce3aSDaniel Borkmann }; 335fe20ce3aSDaniel Borkmann int relative_fd; 336fe20ce3aSDaniel Borkmann __u32 relative_id; 337fe20ce3aSDaniel Borkmann __u64 expected_revision; 338fe20ce3aSDaniel Borkmann size_t :0; 339fe20ce3aSDaniel Borkmann }; 340fe20ce3aSDaniel Borkmann #define bpf_prog_attach_opts__last_field expected_revision 341fe20ce3aSDaniel Borkmann 342fe20ce3aSDaniel Borkmann struct bpf_prog_detach_opts { 343fe20ce3aSDaniel Borkmann size_t sz; /* size of this struct for forward/backward compatibility */ 344fe20ce3aSDaniel Borkmann __u32 flags; 345fe20ce3aSDaniel Borkmann int relative_fd; 346fe20ce3aSDaniel Borkmann __u32 relative_id; 347fe20ce3aSDaniel Borkmann __u64 expected_revision; 348fe20ce3aSDaniel Borkmann size_t :0; 349fe20ce3aSDaniel Borkmann }; 350fe20ce3aSDaniel Borkmann #define bpf_prog_detach_opts__last_field expected_revision 351fe20ce3aSDaniel Borkmann 352fe20ce3aSDaniel Borkmann /** 353fe20ce3aSDaniel Borkmann * @brief **bpf_prog_attach_opts()** attaches the BPF program corresponding to 354fe20ce3aSDaniel Borkmann * *prog_fd* to a *target* which can represent a file descriptor or netdevice 355fe20ce3aSDaniel Borkmann * ifindex. 356fe20ce3aSDaniel Borkmann * 357fe20ce3aSDaniel Borkmann * @param prog_fd BPF program file descriptor 358fe20ce3aSDaniel Borkmann * @param target attach location file descriptor or ifindex 359fe20ce3aSDaniel Borkmann * @param type attach type for the BPF program 360fe20ce3aSDaniel Borkmann * @param opts options for configuring the attachment 361fe20ce3aSDaniel Borkmann * @return 0, on success; negative error code, otherwise (errno is also set to 362fe20ce3aSDaniel Borkmann * the error code) 363fe20ce3aSDaniel Borkmann */ 364fe20ce3aSDaniel Borkmann LIBBPF_API int bpf_prog_attach_opts(int prog_fd, int target, 365fe20ce3aSDaniel Borkmann enum bpf_attach_type type, 366fe20ce3aSDaniel Borkmann const struct bpf_prog_attach_opts *opts); 367fe20ce3aSDaniel Borkmann 368fe20ce3aSDaniel Borkmann /** 369fe20ce3aSDaniel Borkmann * @brief **bpf_prog_detach_opts()** detaches the BPF program corresponding to 370fe20ce3aSDaniel Borkmann * *prog_fd* from a *target* which can represent a file descriptor or netdevice 371fe20ce3aSDaniel Borkmann * ifindex. 372fe20ce3aSDaniel Borkmann * 373fe20ce3aSDaniel Borkmann * @param prog_fd BPF program file descriptor 374fe20ce3aSDaniel Borkmann * @param target detach location file descriptor or ifindex 375fe20ce3aSDaniel Borkmann * @param type detach type for the BPF program 376fe20ce3aSDaniel Borkmann * @param opts options for configuring the detachment 377fe20ce3aSDaniel Borkmann * @return 0, on success; negative error code, otherwise (errno is also set to 378fe20ce3aSDaniel Borkmann * the error code) 379fe20ce3aSDaniel Borkmann */ 380fe20ce3aSDaniel Borkmann LIBBPF_API int bpf_prog_detach_opts(int prog_fd, int target, 381fe20ce3aSDaniel Borkmann enum bpf_attach_type type, 382fe20ce3aSDaniel Borkmann const struct bpf_prog_detach_opts *opts); 383fe20ce3aSDaniel Borkmann 38474fc097dSYonghong Song union bpf_iter_link_info; /* defined in up-to-date linux/bpf.h */ 385cc4f864bSAndrii Nakryiko struct bpf_link_create_opts { 386cc4f864bSAndrii Nakryiko size_t sz; /* size of this struct for forward/backward compatibility */ 387cd31039aSYonghong Song __u32 flags; 38874fc097dSYonghong Song union bpf_iter_link_info *iter_info; 38974fc097dSYonghong Song __u32 iter_info_len; 390a5359091SToke Høiland-Jørgensen __u32 target_btf_id; 3913ec84f4bSAndrii Nakryiko union { 3923ec84f4bSAndrii Nakryiko struct { 3933ec84f4bSAndrii Nakryiko __u64 bpf_cookie; 3943ec84f4bSAndrii Nakryiko } perf_event; 3955117c26eSJiri Olsa struct { 3965117c26eSJiri Olsa __u32 flags; 3975117c26eSJiri Olsa __u32 cnt; 3985117c26eSJiri Olsa const char **syms; 3995117c26eSJiri Olsa const unsigned long *addrs; 4005117c26eSJiri Olsa const __u64 *cookies; 4015117c26eSJiri Olsa } kprobe_multi; 402129b9c5eSKui-Feng Lee struct { 4035054a303SJiri Olsa __u32 flags; 4045054a303SJiri Olsa __u32 cnt; 4055054a303SJiri Olsa const char *path; 4065054a303SJiri Olsa const unsigned long *offsets; 4075054a303SJiri Olsa const unsigned long *ref_ctr_offsets; 4085054a303SJiri Olsa const __u64 *cookies; 4095054a303SJiri Olsa __u32 pid; 4105054a303SJiri Olsa } uprobe_multi; 4115054a303SJiri Olsa struct { 412129b9c5eSKui-Feng Lee __u64 cookie; 413129b9c5eSKui-Feng Lee } tracing; 41452364abbSFlorian Westphal struct { 41552364abbSFlorian Westphal __u32 pf; 41652364abbSFlorian Westphal __u32 hooknum; 41752364abbSFlorian Westphal __s32 priority; 41852364abbSFlorian Westphal __u32 flags; 41952364abbSFlorian Westphal } netfilter; 42055cc3768SDaniel Borkmann struct { 42155cc3768SDaniel Borkmann __u32 relative_fd; 42255cc3768SDaniel Borkmann __u32 relative_id; 42355cc3768SDaniel Borkmann __u64 expected_revision; 42455cc3768SDaniel Borkmann } tcx; 42505c31b4aSDaniel Borkmann struct { 42605c31b4aSDaniel Borkmann __u32 relative_fd; 42705c31b4aSDaniel Borkmann __u32 relative_id; 42805c31b4aSDaniel Borkmann __u64 expected_revision; 42905c31b4aSDaniel Borkmann } netkit; 430cc4f864bSAndrii Nakryiko }; 4313ec84f4bSAndrii Nakryiko size_t :0; 4323ec84f4bSAndrii Nakryiko }; 4335054a303SJiri Olsa #define bpf_link_create_opts__last_field uprobe_multi.pid 434cc4f864bSAndrii Nakryiko 435cc4f864bSAndrii Nakryiko LIBBPF_API int bpf_link_create(int prog_fd, int target_fd, 436cc4f864bSAndrii Nakryiko enum bpf_attach_type attach_type, 437cc4f864bSAndrii Nakryiko const struct bpf_link_create_opts *opts); 438cc4f864bSAndrii Nakryiko 4392e49527eSAndrii Nakryiko LIBBPF_API int bpf_link_detach(int link_fd); 4402e49527eSAndrii Nakryiko 441cc4f864bSAndrii Nakryiko struct bpf_link_update_opts { 442cc4f864bSAndrii Nakryiko size_t sz; /* size of this struct for forward/backward compatibility */ 443cc4f864bSAndrii Nakryiko __u32 flags; /* extra flags */ 444cc4f864bSAndrii Nakryiko __u32 old_prog_fd; /* expected old program FD */ 445912dd4b0SKui-Feng Lee __u32 old_map_fd; /* expected old map FD */ 446cc4f864bSAndrii Nakryiko }; 447912dd4b0SKui-Feng Lee #define bpf_link_update_opts__last_field old_map_fd 448cc4f864bSAndrii Nakryiko 449cc4f864bSAndrii Nakryiko LIBBPF_API int bpf_link_update(int link_fd, int new_prog_fd, 450cc4f864bSAndrii Nakryiko const struct bpf_link_update_opts *opts); 451cc4f864bSAndrii Nakryiko 452c09add2fSYonghong Song LIBBPF_API int bpf_iter_create(int link_fd); 453c09add2fSYonghong Song 45464a97591SLorenz Bauer struct bpf_prog_test_run_attr { 45564a97591SLorenz Bauer int prog_fd; 45664a97591SLorenz Bauer int repeat; 45764a97591SLorenz Bauer const void *data_in; 45864a97591SLorenz Bauer __u32 data_size_in; 45964a97591SLorenz Bauer void *data_out; /* optional */ 46064a97591SLorenz Bauer __u32 data_size_out; /* in: max length of data_out 46164a97591SLorenz Bauer * out: length of data_out */ 46264a97591SLorenz Bauer __u32 retval; /* out: return code of the BPF program */ 46364a97591SLorenz Bauer __u32 duration; /* out: average per repetition in ns */ 4645e903c65SStanislav Fomichev const void *ctx_in; /* optional */ 4655e903c65SStanislav Fomichev __u32 ctx_size_in; 4665e903c65SStanislav Fomichev void *ctx_out; /* optional */ 4675e903c65SStanislav Fomichev __u32 ctx_size_out; /* in: max length of ctx_out 4685e903c65SStanislav Fomichev * out: length of cxt_out */ 46964a97591SLorenz Bauer }; 47064a97591SLorenz Bauer 471ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_get_next_id(__u32 start_id, __u32 *next_id); 472ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_get_next_id(__u32 start_id, __u32 *next_id); 47309d7c2e3SQuentin Monnet LIBBPF_API int bpf_btf_get_next_id(__u32 start_id, __u32 *next_id); 4740dbc8668SAndrii Nakryiko LIBBPF_API int bpf_link_get_next_id(__u32 start_id, __u32 *next_id); 475243e3005SRoberto Sassu 476243e3005SRoberto Sassu struct bpf_get_fd_by_id_opts { 477243e3005SRoberto Sassu size_t sz; /* size of this struct for forward/backward compatibility */ 478243e3005SRoberto Sassu __u32 open_flags; /* permissions requested for the operation on fd */ 479243e3005SRoberto Sassu size_t :0; 480243e3005SRoberto Sassu }; 481243e3005SRoberto Sassu #define bpf_get_fd_by_id_opts__last_field open_flags 482243e3005SRoberto Sassu 483ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_get_fd_by_id(__u32 id); 4848f13f168SRoberto Sassu LIBBPF_API int bpf_prog_get_fd_by_id_opts(__u32 id, 4858f13f168SRoberto Sassu const struct bpf_get_fd_by_id_opts *opts); 486ab9e0848SAndrey Ignatov LIBBPF_API int bpf_map_get_fd_by_id(__u32 id); 487243e3005SRoberto Sassu LIBBPF_API int bpf_map_get_fd_by_id_opts(__u32 id, 488243e3005SRoberto Sassu const struct bpf_get_fd_by_id_opts *opts); 489ab9e0848SAndrey Ignatov LIBBPF_API int bpf_btf_get_fd_by_id(__u32 id); 4902ce7cbf2SRoberto Sassu LIBBPF_API int bpf_btf_get_fd_by_id_opts(__u32 id, 4912ce7cbf2SRoberto Sassu const struct bpf_get_fd_by_id_opts *opts); 4920dbc8668SAndrii Nakryiko LIBBPF_API int bpf_link_get_fd_by_id(__u32 id); 49397c8f9ddSRoberto Sassu LIBBPF_API int bpf_link_get_fd_by_id_opts(__u32 id, 49497c8f9ddSRoberto Sassu const struct bpf_get_fd_by_id_opts *opts); 4950dbc8668SAndrii Nakryiko LIBBPF_API int bpf_obj_get_info_by_fd(int bpf_fd, void *info, __u32 *info_len); 4960a504fa1SIlya Leoshkevich 4970a504fa1SIlya Leoshkevich /** 4980a504fa1SIlya Leoshkevich * @brief **bpf_prog_get_info_by_fd()** obtains information about the BPF 4990a504fa1SIlya Leoshkevich * program corresponding to *prog_fd*. 5000a504fa1SIlya Leoshkevich * 5010a504fa1SIlya Leoshkevich * Populates up to *info_len* bytes of *info* and updates *info_len* with the 5020a504fa1SIlya Leoshkevich * actual number of bytes written to *info*. 5030a504fa1SIlya Leoshkevich * 5040a504fa1SIlya Leoshkevich * @param prog_fd BPF program file descriptor 5050a504fa1SIlya Leoshkevich * @param info pointer to **struct bpf_prog_info** that will be populated with 5060a504fa1SIlya Leoshkevich * BPF program information 5070a504fa1SIlya Leoshkevich * @param info_len pointer to the size of *info*; on success updated with the 5080a504fa1SIlya Leoshkevich * number of bytes written to *info* 5090a504fa1SIlya Leoshkevich * @return 0, on success; negative error code, otherwise (errno is also set to 5100a504fa1SIlya Leoshkevich * the error code) 51155a9ed0eSIlya Leoshkevich */ 51255a9ed0eSIlya Leoshkevich LIBBPF_API int bpf_prog_get_info_by_fd(int prog_fd, struct bpf_prog_info *info, __u32 *info_len); 5130a504fa1SIlya Leoshkevich 5140a504fa1SIlya Leoshkevich /** 5150a504fa1SIlya Leoshkevich * @brief **bpf_map_get_info_by_fd()** obtains information about the BPF 5160a504fa1SIlya Leoshkevich * map corresponding to *map_fd*. 5170a504fa1SIlya Leoshkevich * 5180a504fa1SIlya Leoshkevich * Populates up to *info_len* bytes of *info* and updates *info_len* with the 5190a504fa1SIlya Leoshkevich * actual number of bytes written to *info*. 5200a504fa1SIlya Leoshkevich * 5210a504fa1SIlya Leoshkevich * @param map_fd BPF map file descriptor 5220a504fa1SIlya Leoshkevich * @param info pointer to **struct bpf_map_info** that will be populated with 5230a504fa1SIlya Leoshkevich * BPF map information 5240a504fa1SIlya Leoshkevich * @param info_len pointer to the size of *info*; on success updated with the 5250a504fa1SIlya Leoshkevich * number of bytes written to *info* 5260a504fa1SIlya Leoshkevich * @return 0, on success; negative error code, otherwise (errno is also set to 5270a504fa1SIlya Leoshkevich * the error code) 5280a504fa1SIlya Leoshkevich */ 52955a9ed0eSIlya Leoshkevich LIBBPF_API int bpf_map_get_info_by_fd(int map_fd, struct bpf_map_info *info, __u32 *info_len); 5300a504fa1SIlya Leoshkevich 5310a504fa1SIlya Leoshkevich /** 5320a504fa1SIlya Leoshkevich * @brief **bpf_btf_get_info_by_fd()** obtains information about the 5330a504fa1SIlya Leoshkevich * BTF object corresponding to *btf_fd*. 5340a504fa1SIlya Leoshkevich * 5350a504fa1SIlya Leoshkevich * Populates up to *info_len* bytes of *info* and updates *info_len* with the 5360a504fa1SIlya Leoshkevich * actual number of bytes written to *info*. 5370a504fa1SIlya Leoshkevich * 5380a504fa1SIlya Leoshkevich * @param btf_fd BTF object file descriptor 5390a504fa1SIlya Leoshkevich * @param info pointer to **struct bpf_btf_info** that will be populated with 5400a504fa1SIlya Leoshkevich * BTF object information 5410a504fa1SIlya Leoshkevich * @param info_len pointer to the size of *info*; on success updated with the 5420a504fa1SIlya Leoshkevich * number of bytes written to *info* 5430a504fa1SIlya Leoshkevich * @return 0, on success; negative error code, otherwise (errno is also set to 5440a504fa1SIlya Leoshkevich * the error code) 5450a504fa1SIlya Leoshkevich */ 54655a9ed0eSIlya Leoshkevich LIBBPF_API int bpf_btf_get_info_by_fd(int btf_fd, struct bpf_btf_info *info, __u32 *info_len); 5470a504fa1SIlya Leoshkevich 5480a504fa1SIlya Leoshkevich /** 5490a504fa1SIlya Leoshkevich * @brief **bpf_btf_get_info_by_fd()** obtains information about the BPF 5500a504fa1SIlya Leoshkevich * link corresponding to *link_fd*. 5510a504fa1SIlya Leoshkevich * 5520a504fa1SIlya Leoshkevich * Populates up to *info_len* bytes of *info* and updates *info_len* with the 5530a504fa1SIlya Leoshkevich * actual number of bytes written to *info*. 5540a504fa1SIlya Leoshkevich * 5550a504fa1SIlya Leoshkevich * @param link_fd BPF link file descriptor 5560a504fa1SIlya Leoshkevich * @param info pointer to **struct bpf_link_info** that will be populated with 5570a504fa1SIlya Leoshkevich * BPF link information 5580a504fa1SIlya Leoshkevich * @param info_len pointer to the size of *info*; on success updated with the 5590a504fa1SIlya Leoshkevich * number of bytes written to *info* 5600a504fa1SIlya Leoshkevich * @return 0, on success; negative error code, otherwise (errno is also set to 5610a504fa1SIlya Leoshkevich * the error code) 5620a504fa1SIlya Leoshkevich */ 56355a9ed0eSIlya Leoshkevich LIBBPF_API int bpf_link_get_info_by_fd(int link_fd, struct bpf_link_info *info, __u32 *info_len); 564a4b2f3cfSStanislav Fomichev 565a4b2f3cfSStanislav Fomichev struct bpf_prog_query_opts { 566a4b2f3cfSStanislav Fomichev size_t sz; /* size of this struct for forward/backward compatibility */ 567a4b2f3cfSStanislav Fomichev __u32 query_flags; 568a4b2f3cfSStanislav Fomichev __u32 attach_flags; /* output argument */ 569a4b2f3cfSStanislav Fomichev __u32 *prog_ids; 570fe20ce3aSDaniel Borkmann union { 571fe20ce3aSDaniel Borkmann /* input+output argument */ 572fe20ce3aSDaniel Borkmann __u32 prog_cnt; 573fe20ce3aSDaniel Borkmann __u32 count; 574a4b2f3cfSStanislav Fomichev }; 575fe20ce3aSDaniel Borkmann __u32 *prog_attach_flags; 576fe20ce3aSDaniel Borkmann __u32 *link_ids; 577fe20ce3aSDaniel Borkmann __u32 *link_attach_flags; 578fe20ce3aSDaniel Borkmann __u64 revision; 579fe20ce3aSDaniel Borkmann size_t :0; 580fe20ce3aSDaniel Borkmann }; 581fe20ce3aSDaniel Borkmann #define bpf_prog_query_opts__last_field revision 582a4b2f3cfSStanislav Fomichev 583fe20ce3aSDaniel Borkmann /** 584fe20ce3aSDaniel Borkmann * @brief **bpf_prog_query_opts()** queries the BPF programs and BPF links 585fe20ce3aSDaniel Borkmann * which are attached to *target* which can represent a file descriptor or 586fe20ce3aSDaniel Borkmann * netdevice ifindex. 587fe20ce3aSDaniel Borkmann * 588fe20ce3aSDaniel Borkmann * @param target query location file descriptor or ifindex 589fe20ce3aSDaniel Borkmann * @param type attach type for the BPF program 590fe20ce3aSDaniel Borkmann * @param opts options for configuring the query 591fe20ce3aSDaniel Borkmann * @return 0, on success; negative error code, otherwise (errno is also set to 592fe20ce3aSDaniel Borkmann * the error code) 593fe20ce3aSDaniel Borkmann */ 594fe20ce3aSDaniel Borkmann LIBBPF_API int bpf_prog_query_opts(int target, enum bpf_attach_type type, 595a4b2f3cfSStanislav Fomichev struct bpf_prog_query_opts *opts); 596ab9e0848SAndrey Ignatov LIBBPF_API int bpf_prog_query(int target_fd, enum bpf_attach_type type, 597ab9e0848SAndrey Ignatov __u32 query_flags, __u32 *attach_flags, 598ab9e0848SAndrey Ignatov __u32 *prog_ids, __u32 *prog_cnt); 599a4b2f3cfSStanislav Fomichev 600ab9e0848SAndrey Ignatov LIBBPF_API int bpf_raw_tracepoint_open(const char *name, int prog_fd); 601ab9e0848SAndrey Ignatov LIBBPF_API int bpf_task_fd_query(int pid, int fd, __u32 flags, char *buf, 602ab9e0848SAndrey Ignatov __u32 *buf_len, __u32 *prog_id, __u32 *fd_type, 603ab9e0848SAndrey Ignatov __u64 *probe_offset, __u64 *probe_addr); 6044e15507fSAndrii Nakryiko 605b4269341SAndrii Nakryiko #ifdef __cplusplus 606b4269341SAndrii Nakryiko /* forward-declaring enums in C++ isn't compatible with pure C enums, so 607b4269341SAndrii Nakryiko * instead define bpf_enable_stats() as accepting int as an input 608b4269341SAndrii Nakryiko */ 609b4269341SAndrii Nakryiko LIBBPF_API int bpf_enable_stats(int type); 610b4269341SAndrii Nakryiko #else 6114e15507fSAndrii Nakryiko enum bpf_stats_type; /* defined in up-to-date linux/bpf.h */ 6120bee1067SSong Liu LIBBPF_API int bpf_enable_stats(enum bpf_stats_type type); 613b4269341SAndrii Nakryiko #endif 6148c4905b9SStanislav Fomichev 6155d23328dSYiFei Zhu struct bpf_prog_bind_opts { 6165d23328dSYiFei Zhu size_t sz; /* size of this struct for forward/backward compatibility */ 6175d23328dSYiFei Zhu __u32 flags; 6185d23328dSYiFei Zhu }; 6195d23328dSYiFei Zhu #define bpf_prog_bind_opts__last_field flags 6205d23328dSYiFei Zhu 6215d23328dSYiFei Zhu LIBBPF_API int bpf_prog_bind_map(int prog_fd, int map_fd, 6225d23328dSYiFei Zhu const struct bpf_prog_bind_opts *opts); 62388f7fe72SSong Liu 62488f7fe72SSong Liu struct bpf_test_run_opts { 62588f7fe72SSong Liu size_t sz; /* size of this struct for forward/backward compatibility */ 62688f7fe72SSong Liu const void *data_in; /* optional */ 62788f7fe72SSong Liu void *data_out; /* optional */ 62888f7fe72SSong Liu __u32 data_size_in; 62988f7fe72SSong Liu __u32 data_size_out; /* in: max length of data_out 63088f7fe72SSong Liu * out: length of data_out 63188f7fe72SSong Liu */ 63288f7fe72SSong Liu const void *ctx_in; /* optional */ 63388f7fe72SSong Liu void *ctx_out; /* optional */ 63488f7fe72SSong Liu __u32 ctx_size_in; 63588f7fe72SSong Liu __u32 ctx_size_out; /* in: max length of ctx_out 63688f7fe72SSong Liu * out: length of cxt_out 63788f7fe72SSong Liu */ 63888f7fe72SSong Liu __u32 retval; /* out: return code of the BPF program */ 63988f7fe72SSong Liu int repeat; 64088f7fe72SSong Liu __u32 duration; /* out: average per repetition in ns */ 64188f7fe72SSong Liu __u32 flags; 64288f7fe72SSong Liu __u32 cpu; 64324592ad1SToke Høiland-Jørgensen __u32 batch_size; 64488f7fe72SSong Liu }; 64524592ad1SToke Høiland-Jørgensen #define bpf_test_run_opts__last_field batch_size 64688f7fe72SSong Liu 64788f7fe72SSong Liu LIBBPF_API int bpf_prog_test_run_opts(int prog_fd, 64888f7fe72SSong Liu struct bpf_test_run_opts *opts); 64988f7fe72SSong Liu 650639ecd7dSAndrii Nakryiko struct bpf_token_create_opts { 651639ecd7dSAndrii Nakryiko size_t sz; /* size of this struct for forward/backward compatibility */ 652639ecd7dSAndrii Nakryiko __u32 flags; 653639ecd7dSAndrii Nakryiko size_t :0; 654639ecd7dSAndrii Nakryiko }; 655639ecd7dSAndrii Nakryiko #define bpf_token_create_opts__last_field flags 656639ecd7dSAndrii Nakryiko 657639ecd7dSAndrii Nakryiko /** 658639ecd7dSAndrii Nakryiko * @brief **bpf_token_create()** creates a new instance of BPF token derived 659639ecd7dSAndrii Nakryiko * from specified BPF FS mount point. 660639ecd7dSAndrii Nakryiko * 661639ecd7dSAndrii Nakryiko * BPF token created with this API can be passed to bpf() syscall for 662639ecd7dSAndrii Nakryiko * commands like BPF_PROG_LOAD, BPF_MAP_CREATE, etc. 663639ecd7dSAndrii Nakryiko * 664639ecd7dSAndrii Nakryiko * @param bpffs_fd FD for BPF FS instance from which to derive a BPF token 665639ecd7dSAndrii Nakryiko * instance. 666639ecd7dSAndrii Nakryiko * @param opts optional BPF token creation options, can be NULL 667639ecd7dSAndrii Nakryiko * 668639ecd7dSAndrii Nakryiko * @return BPF token FD > 0, on success; negative error code, otherwise (errno 669639ecd7dSAndrii Nakryiko * is also set to the error code) 670639ecd7dSAndrii Nakryiko */ 671639ecd7dSAndrii Nakryiko LIBBPF_API int bpf_token_create(int bpffs_fd, 672639ecd7dSAndrii Nakryiko struct bpf_token_create_opts *opts); 673639ecd7dSAndrii Nakryiko 6748c4905b9SStanislav Fomichev #ifdef __cplusplus 6758c4905b9SStanislav Fomichev } /* extern "C" */ 6768c4905b9SStanislav Fomichev #endif 6778c4905b9SStanislav Fomichev 678eff81908SAndrey Ignatov #endif /* __LIBBPF_BPF_H */ 679