2017-11-18 17:09:20 +01:00
|
|
|
/* SPDX-License-Identifier: LGPL-2.1+ */
|
2016-10-18 17:57:10 +02:00
|
|
|
#pragma once
|
|
|
|
|
|
|
|
/***
|
|
|
|
This file is part of systemd.
|
|
|
|
|
|
|
|
Copyright 2016 Daniel Mack
|
|
|
|
|
|
|
|
[Except for the stuff copy/pasted from the kernel sources, see below]
|
|
|
|
***/
|
|
|
|
|
|
|
|
#include <linux/bpf.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <sys/syscall.h>
|
|
|
|
|
|
|
|
#include "list.h"
|
|
|
|
#include "macro.h"
|
|
|
|
|
|
|
|
typedef struct BPFProgram BPFProgram;
|
|
|
|
|
|
|
|
struct BPFProgram {
|
2018-02-20 19:28:24 +01:00
|
|
|
unsigned n_ref;
|
|
|
|
|
2016-10-18 17:57:10 +02:00
|
|
|
int kernel_fd;
|
|
|
|
uint32_t prog_type;
|
|
|
|
|
|
|
|
size_t n_instructions;
|
|
|
|
size_t allocated;
|
|
|
|
struct bpf_insn *instructions;
|
2018-02-20 19:28:24 +01:00
|
|
|
|
|
|
|
char *attached_path;
|
|
|
|
int attached_type;
|
|
|
|
uint32_t attached_flags;
|
2016-10-18 17:57:10 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
int bpf_program_new(uint32_t prog_type, BPFProgram **ret);
|
|
|
|
BPFProgram *bpf_program_unref(BPFProgram *p);
|
2018-02-20 19:28:24 +01:00
|
|
|
BPFProgram *bpf_program_ref(BPFProgram *p);
|
2016-10-18 17:57:10 +02:00
|
|
|
|
|
|
|
int bpf_program_add_instructions(BPFProgram *p, const struct bpf_insn *insn, size_t count);
|
|
|
|
int bpf_program_load_kernel(BPFProgram *p, char *log_buf, size_t log_size);
|
|
|
|
|
2017-09-21 20:38:07 +02:00
|
|
|
int bpf_program_cgroup_attach(BPFProgram *p, int type, const char *path, uint32_t flags);
|
2018-02-20 19:28:24 +01:00
|
|
|
int bpf_program_cgroup_detach(BPFProgram *p);
|
2016-10-18 17:57:10 +02:00
|
|
|
|
|
|
|
int bpf_map_new(enum bpf_map_type type, size_t key_size, size_t value_size, size_t max_entries, uint32_t flags);
|
|
|
|
int bpf_map_update_element(int fd, const void *key, void *value);
|
|
|
|
int bpf_map_lookup_element(int fd, const void *key, void *value);
|
|
|
|
|
|
|
|
DEFINE_TRIVIAL_CLEANUP_FUNC(BPFProgram*, bpf_program_unref);
|