bpf.h revision 525ce914edf136d2bd02ac8c404d56c52e737f4d
1/****************************************************************************
2 ****************************************************************************
3 ***
4 ***   This header was automatically generated from a Linux kernel header
5 ***   of the same name, to make information necessary for userspace to
6 ***   call into the kernel available to libc.  It contains only constants,
7 ***   structures, and macros generated from the original header, and thus,
8 ***   contains no copyrightable information.
9 ***
10 ***   To edit the content of this header, modify the corresponding
11 ***   source file (e.g. under external/kernel-headers/original/) then
12 ***   run bionic/libc/kernel/tools/update_all.py
13 ***
14 ***   Any manual change here will be lost the next time this script will
15 ***   be run. You've been warned!
16 ***
17 ****************************************************************************
18 ****************************************************************************/
19#ifndef _UAPI__LINUX_BPF_H__
20#define _UAPI__LINUX_BPF_H__
21#include <linux/types.h>
22#include <linux/bpf_common.h>
23#define BPF_ALU64 0x07
24#define BPF_DW 0x18
25#define BPF_XADD 0xc0
26#define BPF_MOV 0xb0
27#define BPF_ARSH 0xc0
28#define BPF_END 0xd0
29#define BPF_TO_LE 0x00
30#define BPF_TO_BE 0x08
31#define BPF_FROM_LE BPF_TO_LE
32#define BPF_FROM_BE BPF_TO_BE
33#define BPF_JNE 0x50
34#define BPF_JSGT 0x60
35#define BPF_JSGE 0x70
36#define BPF_CALL 0x80
37#define BPF_EXIT 0x90
38enum {
39  BPF_REG_0 = 0,
40  BPF_REG_1,
41  BPF_REG_2,
42  BPF_REG_3,
43  BPF_REG_4,
44  BPF_REG_5,
45  BPF_REG_6,
46  BPF_REG_7,
47  BPF_REG_8,
48  BPF_REG_9,
49  BPF_REG_10,
50  __MAX_BPF_REG,
51};
52#define MAX_BPF_REG __MAX_BPF_REG
53struct bpf_insn {
54  __u8 code;
55  __u8 dst_reg : 4;
56  __u8 src_reg : 4;
57  __s16 off;
58  __s32 imm;
59};
60struct bpf_lpm_trie_key {
61  __u32 prefixlen;
62  __u8 data[0];
63};
64enum bpf_cmd {
65  BPF_MAP_CREATE,
66  BPF_MAP_LOOKUP_ELEM,
67  BPF_MAP_UPDATE_ELEM,
68  BPF_MAP_DELETE_ELEM,
69  BPF_MAP_GET_NEXT_KEY,
70  BPF_PROG_LOAD,
71  BPF_OBJ_PIN,
72  BPF_OBJ_GET,
73  BPF_PROG_ATTACH,
74  BPF_PROG_DETACH,
75  BPF_PROG_TEST_RUN,
76};
77enum bpf_map_type {
78  BPF_MAP_TYPE_UNSPEC,
79  BPF_MAP_TYPE_HASH,
80  BPF_MAP_TYPE_ARRAY,
81  BPF_MAP_TYPE_PROG_ARRAY,
82  BPF_MAP_TYPE_PERF_EVENT_ARRAY,
83  BPF_MAP_TYPE_PERCPU_HASH,
84  BPF_MAP_TYPE_PERCPU_ARRAY,
85  BPF_MAP_TYPE_STACK_TRACE,
86  BPF_MAP_TYPE_CGROUP_ARRAY,
87  BPF_MAP_TYPE_LRU_HASH,
88  BPF_MAP_TYPE_LRU_PERCPU_HASH,
89  BPF_MAP_TYPE_LPM_TRIE,
90  BPF_MAP_TYPE_ARRAY_OF_MAPS,
91  BPF_MAP_TYPE_HASH_OF_MAPS,
92};
93enum bpf_prog_type {
94  BPF_PROG_TYPE_UNSPEC,
95  BPF_PROG_TYPE_SOCKET_FILTER,
96  BPF_PROG_TYPE_KPROBE,
97  BPF_PROG_TYPE_SCHED_CLS,
98  BPF_PROG_TYPE_SCHED_ACT,
99  BPF_PROG_TYPE_TRACEPOINT,
100  BPF_PROG_TYPE_XDP,
101  BPF_PROG_TYPE_PERF_EVENT,
102  BPF_PROG_TYPE_CGROUP_SKB,
103  BPF_PROG_TYPE_CGROUP_SOCK,
104  BPF_PROG_TYPE_LWT_IN,
105  BPF_PROG_TYPE_LWT_OUT,
106  BPF_PROG_TYPE_LWT_XMIT,
107};
108enum bpf_attach_type {
109  BPF_CGROUP_INET_INGRESS,
110  BPF_CGROUP_INET_EGRESS,
111  BPF_CGROUP_INET_SOCK_CREATE,
112  __MAX_BPF_ATTACH_TYPE
113};
114#define MAX_BPF_ATTACH_TYPE __MAX_BPF_ATTACH_TYPE
115#define BPF_F_ALLOW_OVERRIDE (1U << 0)
116#define BPF_F_STRICT_ALIGNMENT (1U << 0)
117#define BPF_PSEUDO_MAP_FD 1
118#define BPF_ANY 0
119#define BPF_NOEXIST 1
120#define BPF_EXIST 2
121#define BPF_F_NO_PREALLOC (1U << 0)
122#define BPF_F_NO_COMMON_LRU (1U << 1)
123union bpf_attr {
124  struct {
125    __u32 map_type;
126    __u32 key_size;
127    __u32 value_size;
128    __u32 max_entries;
129    __u32 map_flags;
130    __u32 inner_map_fd;
131  };
132  struct {
133    __u32 map_fd;
134    __aligned_u64 key;
135    union {
136      __aligned_u64 value;
137      __aligned_u64 next_key;
138    };
139    __u64 flags;
140  };
141  struct {
142    __u32 prog_type;
143    __u32 insn_cnt;
144    __aligned_u64 insns;
145    __aligned_u64 license;
146    __u32 log_level;
147    __u32 log_size;
148    __aligned_u64 log_buf;
149    __u32 kern_version;
150    __u32 prog_flags;
151  };
152  struct {
153    __aligned_u64 pathname;
154    __u32 bpf_fd;
155  };
156  struct {
157    __u32 target_fd;
158    __u32 attach_bpf_fd;
159    __u32 attach_type;
160    __u32 attach_flags;
161  };
162  struct {
163    __u32 prog_fd;
164    __u32 retval;
165    __u32 data_size_in;
166    __u32 data_size_out;
167    __aligned_u64 data_in;
168    __aligned_u64 data_out;
169    __u32 repeat;
170    __u32 duration;
171  } test;
172} __attribute__((aligned(8)));
173#define __BPF_FUNC_MAPPER(FN) FN(unspec), FN(map_lookup_elem), FN(map_update_elem), FN(map_delete_elem), FN(probe_read), FN(ktime_get_ns), FN(trace_printk), FN(get_prandom_u32), FN(get_smp_processor_id), FN(skb_store_bytes), FN(l3_csum_replace), FN(l4_csum_replace), FN(tail_call), FN(clone_redirect), FN(get_current_pid_tgid), FN(get_current_uid_gid), FN(get_current_comm), FN(get_cgroup_classid), FN(skb_vlan_push), FN(skb_vlan_pop), FN(skb_get_tunnel_key), FN(skb_set_tunnel_key), FN(perf_event_read), FN(redirect), FN(get_route_realm), FN(perf_event_output), FN(skb_load_bytes), FN(get_stackid), FN(csum_diff), FN(skb_get_tunnel_opt), FN(skb_set_tunnel_opt), FN(skb_change_proto), FN(skb_change_type), FN(skb_under_cgroup), FN(get_hash_recalc), FN(get_current_task), FN(probe_write_user), FN(current_task_under_cgroup), FN(skb_change_tail), FN(skb_pull_data), FN(csum_update), FN(set_hash_invalid), FN(get_numa_node_id), FN(skb_change_head), FN(xdp_adjust_head), FN(probe_read_str), FN(get_socket_cookie), FN(get_socket_uid),
174#define __BPF_ENUM_FN(x) BPF_FUNC_ ##x
175enum bpf_func_id {
176  __BPF_FUNC_MAPPER(__BPF_ENUM_FN) __BPF_FUNC_MAX_ID,
177};
178#undef __BPF_ENUM_FN
179#define BPF_F_RECOMPUTE_CSUM (1ULL << 0)
180#define BPF_F_INVALIDATE_HASH (1ULL << 1)
181#define BPF_F_HDR_FIELD_MASK 0xfULL
182#define BPF_F_PSEUDO_HDR (1ULL << 4)
183#define BPF_F_MARK_MANGLED_0 (1ULL << 5)
184#define BPF_F_MARK_ENFORCE (1ULL << 6)
185#define BPF_F_INGRESS (1ULL << 0)
186#define BPF_F_TUNINFO_IPV6 (1ULL << 0)
187#define BPF_F_SKIP_FIELD_MASK 0xffULL
188#define BPF_F_USER_STACK (1ULL << 8)
189#define BPF_F_FAST_STACK_CMP (1ULL << 9)
190#define BPF_F_REUSE_STACKID (1ULL << 10)
191#define BPF_F_ZERO_CSUM_TX (1ULL << 1)
192#define BPF_F_DONT_FRAGMENT (1ULL << 2)
193#define BPF_F_INDEX_MASK 0xffffffffULL
194#define BPF_F_CURRENT_CPU BPF_F_INDEX_MASK
195#define BPF_F_CTXLEN_MASK (0xfffffULL << 32)
196struct __sk_buff {
197  __u32 len;
198  __u32 pkt_type;
199  __u32 mark;
200  __u32 queue_mapping;
201  __u32 protocol;
202  __u32 vlan_present;
203  __u32 vlan_tci;
204  __u32 vlan_proto;
205  __u32 priority;
206  __u32 ingress_ifindex;
207  __u32 ifindex;
208  __u32 tc_index;
209  __u32 cb[5];
210  __u32 hash;
211  __u32 tc_classid;
212  __u32 data;
213  __u32 data_end;
214  __u32 napi_id;
215};
216struct bpf_tunnel_key {
217  __u32 tunnel_id;
218  union {
219    __u32 remote_ipv4;
220    __u32 remote_ipv6[4];
221  };
222  __u8 tunnel_tos;
223  __u8 tunnel_ttl;
224  __u16 tunnel_ext;
225  __u32 tunnel_label;
226};
227enum bpf_ret_code {
228  BPF_OK = 0,
229  BPF_DROP = 2,
230  BPF_REDIRECT = 7,
231};
232struct bpf_sock {
233  __u32 bound_dev_if;
234  __u32 family;
235  __u32 type;
236  __u32 protocol;
237};
238#define XDP_PACKET_HEADROOM 256
239enum xdp_action {
240  XDP_ABORTED = 0,
241  XDP_DROP,
242  XDP_PASS,
243  XDP_TX,
244};
245struct xdp_md {
246  __u32 data;
247  __u32 data_end;
248};
249#endif
250