bpf.h revision 1308ad3ab33294c3abfd96da12b6df58b381ce52
1/**************************************************************************** 2 **************************************************************************** 3 *** 4 *** This header was automatically generated from a Linux kernel header 5 *** of the same name, to make information necessary for userspace to 6 *** call into the kernel available to libc. It contains only constants, 7 *** structures, and macros generated from the original header, and thus, 8 *** contains no copyrightable information. 9 *** 10 *** To edit the content of this header, modify the corresponding 11 *** source file (e.g. under external/kernel-headers/original/) then 12 *** run bionic/libc/kernel/tools/update_all.py 13 *** 14 *** Any manual change here will be lost the next time this script will 15 *** be run. You've been warned! 16 *** 17 **************************************************************************** 18 ****************************************************************************/ 19#ifndef _UAPI__LINUX_BPF_H__ 20#define _UAPI__LINUX_BPF_H__ 21#include <linux/types.h> 22#include <linux/bpf_common.h> 23#define BPF_ALU64 0x07 24#define BPF_DW 0x18 25#define BPF_XADD 0xc0 26#define BPF_MOV 0xb0 27#define BPF_ARSH 0xc0 28#define BPF_END 0xd0 29#define BPF_TO_LE 0x00 30#define BPF_TO_BE 0x08 31#define BPF_FROM_LE BPF_TO_LE 32#define BPF_FROM_BE BPF_TO_BE 33#define BPF_JNE 0x50 34#define BPF_JLT 0xa0 35#define BPF_JLE 0xb0 36#define BPF_JSGT 0x60 37#define BPF_JSGE 0x70 38#define BPF_JSLT 0xc0 39#define BPF_JSLE 0xd0 40#define BPF_CALL 0x80 41#define BPF_EXIT 0x90 42enum { 43 BPF_REG_0 = 0, 44 BPF_REG_1, 45 BPF_REG_2, 46 BPF_REG_3, 47 BPF_REG_4, 48 BPF_REG_5, 49 BPF_REG_6, 50 BPF_REG_7, 51 BPF_REG_8, 52 BPF_REG_9, 53 BPF_REG_10, 54 __MAX_BPF_REG, 55}; 56#define MAX_BPF_REG __MAX_BPF_REG 57struct bpf_insn { 58 __u8 code; 59 __u8 dst_reg : 4; 60 __u8 src_reg : 4; 61 __s16 off; 62 __s32 imm; 63}; 64struct bpf_lpm_trie_key { 65 __u32 prefixlen; 66 __u8 data[0]; 67}; 68enum bpf_cmd { 69 BPF_MAP_CREATE, 70 BPF_MAP_LOOKUP_ELEM, 71 BPF_MAP_UPDATE_ELEM, 72 BPF_MAP_DELETE_ELEM, 73 BPF_MAP_GET_NEXT_KEY, 74 BPF_PROG_LOAD, 75 BPF_OBJ_PIN, 76 BPF_OBJ_GET, 77 BPF_PROG_ATTACH, 78 BPF_PROG_DETACH, 79 BPF_PROG_TEST_RUN, 80 BPF_PROG_GET_NEXT_ID, 81 BPF_MAP_GET_NEXT_ID, 82 BPF_PROG_GET_FD_BY_ID, 83 BPF_MAP_GET_FD_BY_ID, 84 BPF_OBJ_GET_INFO_BY_FD, 85}; 86enum bpf_map_type { 87 BPF_MAP_TYPE_UNSPEC, 88 BPF_MAP_TYPE_HASH, 89 BPF_MAP_TYPE_ARRAY, 90 BPF_MAP_TYPE_PROG_ARRAY, 91 BPF_MAP_TYPE_PERF_EVENT_ARRAY, 92 BPF_MAP_TYPE_PERCPU_HASH, 93 BPF_MAP_TYPE_PERCPU_ARRAY, 94 BPF_MAP_TYPE_STACK_TRACE, 95 BPF_MAP_TYPE_CGROUP_ARRAY, 96 BPF_MAP_TYPE_LRU_HASH, 97 BPF_MAP_TYPE_LRU_PERCPU_HASH, 98 BPF_MAP_TYPE_LPM_TRIE, 99 BPF_MAP_TYPE_ARRAY_OF_MAPS, 100 BPF_MAP_TYPE_HASH_OF_MAPS, 101 BPF_MAP_TYPE_DEVMAP, 102 BPF_MAP_TYPE_SOCKMAP, 103}; 104enum bpf_prog_type { 105 BPF_PROG_TYPE_UNSPEC, 106 BPF_PROG_TYPE_SOCKET_FILTER, 107 BPF_PROG_TYPE_KPROBE, 108 BPF_PROG_TYPE_SCHED_CLS, 109 BPF_PROG_TYPE_SCHED_ACT, 110 BPF_PROG_TYPE_TRACEPOINT, 111 BPF_PROG_TYPE_XDP, 112 BPF_PROG_TYPE_PERF_EVENT, 113 BPF_PROG_TYPE_CGROUP_SKB, 114 BPF_PROG_TYPE_CGROUP_SOCK, 115 BPF_PROG_TYPE_LWT_IN, 116 BPF_PROG_TYPE_LWT_OUT, 117 BPF_PROG_TYPE_LWT_XMIT, 118 BPF_PROG_TYPE_SOCK_OPS, 119 BPF_PROG_TYPE_SK_SKB, 120}; 121enum bpf_attach_type { 122 BPF_CGROUP_INET_INGRESS, 123 BPF_CGROUP_INET_EGRESS, 124 BPF_CGROUP_INET_SOCK_CREATE, 125 BPF_CGROUP_SOCK_OPS, 126 BPF_SK_SKB_STREAM_PARSER, 127 BPF_SK_SKB_STREAM_VERDICT, 128 __MAX_BPF_ATTACH_TYPE 129}; 130#define MAX_BPF_ATTACH_TYPE __MAX_BPF_ATTACH_TYPE 131#define BPF_F_ALLOW_OVERRIDE (1U << 0) 132#define BPF_F_STRICT_ALIGNMENT (1U << 0) 133#define BPF_PSEUDO_MAP_FD 1 134#define BPF_ANY 0 135#define BPF_NOEXIST 1 136#define BPF_EXIST 2 137#define BPF_F_NO_PREALLOC (1U << 0) 138#define BPF_F_NO_COMMON_LRU (1U << 1) 139#define BPF_F_NUMA_NODE (1U << 2) 140union bpf_attr { 141 struct { 142 __u32 map_type; 143 __u32 key_size; 144 __u32 value_size; 145 __u32 max_entries; 146 __u32 map_flags; 147 __u32 inner_map_fd; 148 __u32 numa_node; 149 }; 150 struct { 151 __u32 map_fd; 152 __aligned_u64 key; 153 union { 154 __aligned_u64 value; 155 __aligned_u64 next_key; 156 }; 157 __u64 flags; 158 }; 159 struct { 160 __u32 prog_type; 161 __u32 insn_cnt; 162 __aligned_u64 insns; 163 __aligned_u64 license; 164 __u32 log_level; 165 __u32 log_size; 166 __aligned_u64 log_buf; 167 __u32 kern_version; 168 __u32 prog_flags; 169 }; 170 struct { 171 __aligned_u64 pathname; 172 __u32 bpf_fd; 173 }; 174 struct { 175 __u32 target_fd; 176 __u32 attach_bpf_fd; 177 __u32 attach_type; 178 __u32 attach_flags; 179 }; 180 struct { 181 __u32 prog_fd; 182 __u32 retval; 183 __u32 data_size_in; 184 __u32 data_size_out; 185 __aligned_u64 data_in; 186 __aligned_u64 data_out; 187 __u32 repeat; 188 __u32 duration; 189 } test; 190 struct { 191 union { 192 __u32 start_id; 193 __u32 prog_id; 194 __u32 map_id; 195 }; 196 __u32 next_id; 197 }; 198 struct { 199 __u32 bpf_fd; 200 __u32 info_len; 201 __aligned_u64 info; 202 } info; 203} __attribute__((aligned(8))); 204#define __BPF_FUNC_MAPPER(FN) FN(unspec), FN(map_lookup_elem), FN(map_update_elem), FN(map_delete_elem), FN(probe_read), FN(ktime_get_ns), FN(trace_printk), FN(get_prandom_u32), FN(get_smp_processor_id), FN(skb_store_bytes), FN(l3_csum_replace), FN(l4_csum_replace), FN(tail_call), FN(clone_redirect), FN(get_current_pid_tgid), FN(get_current_uid_gid), FN(get_current_comm), FN(get_cgroup_classid), FN(skb_vlan_push), FN(skb_vlan_pop), FN(skb_get_tunnel_key), FN(skb_set_tunnel_key), FN(perf_event_read), FN(redirect), FN(get_route_realm), FN(perf_event_output), FN(skb_load_bytes), FN(get_stackid), FN(csum_diff), FN(skb_get_tunnel_opt), FN(skb_set_tunnel_opt), FN(skb_change_proto), FN(skb_change_type), FN(skb_under_cgroup), FN(get_hash_recalc), FN(get_current_task), FN(probe_write_user), FN(current_task_under_cgroup), FN(skb_change_tail), FN(skb_pull_data), FN(csum_update), FN(set_hash_invalid), FN(get_numa_node_id), FN(skb_change_head), FN(xdp_adjust_head), FN(probe_read_str), FN(get_socket_cookie), FN(get_socket_uid), FN(set_hash), FN(setsockopt), FN(skb_adjust_room), FN(redirect_map), FN(sk_redirect_map), FN(sock_map_update), 205#define __BPF_ENUM_FN(x) BPF_FUNC_ ##x 206enum bpf_func_id { 207 __BPF_FUNC_MAPPER(__BPF_ENUM_FN) __BPF_FUNC_MAX_ID, 208}; 209#undef __BPF_ENUM_FN 210#define BPF_F_RECOMPUTE_CSUM (1ULL << 0) 211#define BPF_F_INVALIDATE_HASH (1ULL << 1) 212#define BPF_F_HDR_FIELD_MASK 0xfULL 213#define BPF_F_PSEUDO_HDR (1ULL << 4) 214#define BPF_F_MARK_MANGLED_0 (1ULL << 5) 215#define BPF_F_MARK_ENFORCE (1ULL << 6) 216#define BPF_F_INGRESS (1ULL << 0) 217#define BPF_F_TUNINFO_IPV6 (1ULL << 0) 218#define BPF_F_SKIP_FIELD_MASK 0xffULL 219#define BPF_F_USER_STACK (1ULL << 8) 220#define BPF_F_FAST_STACK_CMP (1ULL << 9) 221#define BPF_F_REUSE_STACKID (1ULL << 10) 222#define BPF_F_ZERO_CSUM_TX (1ULL << 1) 223#define BPF_F_DONT_FRAGMENT (1ULL << 2) 224#define BPF_F_INDEX_MASK 0xffffffffULL 225#define BPF_F_CURRENT_CPU BPF_F_INDEX_MASK 226#define BPF_F_CTXLEN_MASK (0xfffffULL << 32) 227enum bpf_adj_room_mode { 228 BPF_ADJ_ROOM_NET, 229}; 230struct __sk_buff { 231 __u32 len; 232 __u32 pkt_type; 233 __u32 mark; 234 __u32 queue_mapping; 235 __u32 protocol; 236 __u32 vlan_present; 237 __u32 vlan_tci; 238 __u32 vlan_proto; 239 __u32 priority; 240 __u32 ingress_ifindex; 241 __u32 ifindex; 242 __u32 tc_index; 243 __u32 cb[5]; 244 __u32 hash; 245 __u32 tc_classid; 246 __u32 data; 247 __u32 data_end; 248 __u32 napi_id; 249 __u32 family; 250 __u32 remote_ip4; 251 __u32 local_ip4; 252 __u32 remote_ip6[4]; 253 __u32 local_ip6[4]; 254 __u32 remote_port; 255 __u32 local_port; 256}; 257struct bpf_tunnel_key { 258 __u32 tunnel_id; 259 union { 260 __u32 remote_ipv4; 261 __u32 remote_ipv6[4]; 262 }; 263 __u8 tunnel_tos; 264 __u8 tunnel_ttl; 265 __u16 tunnel_ext; 266 __u32 tunnel_label; 267}; 268enum bpf_ret_code { 269 BPF_OK = 0, 270 BPF_DROP = 2, 271 BPF_REDIRECT = 7, 272}; 273struct bpf_sock { 274 __u32 bound_dev_if; 275 __u32 family; 276 __u32 type; 277 __u32 protocol; 278 __u32 mark; 279 __u32 priority; 280}; 281#define XDP_PACKET_HEADROOM 256 282enum xdp_action { 283 XDP_ABORTED = 0, 284 XDP_DROP, 285 XDP_PASS, 286 XDP_TX, 287 XDP_REDIRECT, 288}; 289struct xdp_md { 290 __u32 data; 291 __u32 data_end; 292}; 293enum sk_action { 294 SK_DROP = 0, 295 SK_PASS, 296}; 297#define BPF_TAG_SIZE 8 298struct bpf_prog_info { 299 __u32 type; 300 __u32 id; 301 __u8 tag[BPF_TAG_SIZE]; 302 __u32 jited_prog_len; 303 __u32 xlated_prog_len; 304 __aligned_u64 jited_prog_insns; 305 __aligned_u64 xlated_prog_insns; 306} __attribute__((aligned(8))); 307struct bpf_map_info { 308 __u32 type; 309 __u32 id; 310 __u32 key_size; 311 __u32 value_size; 312 __u32 max_entries; 313 __u32 map_flags; 314} __attribute__((aligned(8))); 315struct bpf_sock_ops { 316 __u32 op; 317 union { 318 __u32 reply; 319 __u32 replylong[4]; 320 }; 321 __u32 family; 322 __u32 remote_ip4; 323 __u32 local_ip4; 324 __u32 remote_ip6[4]; 325 __u32 local_ip6[4]; 326 __u32 remote_port; 327 __u32 local_port; 328}; 329enum { 330 BPF_SOCK_OPS_VOID, 331 BPF_SOCK_OPS_TIMEOUT_INIT, 332 BPF_SOCK_OPS_RWND_INIT, 333 BPF_SOCK_OPS_TCP_CONNECT_CB, 334 BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB, 335 BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB, 336 BPF_SOCK_OPS_NEEDS_ECN, 337}; 338#define TCP_BPF_IW 1001 339#define TCP_BPF_SNDCWND_CLAMP 1002 340#endif 341