15981881dSAndrii Nakryiko /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ 25981881dSAndrii Nakryiko 35981881dSAndrii Nakryiko /* 45981881dSAndrii Nakryiko * Libbpf legacy APIs (either discouraged or deprecated, as mentioned in [0]) 55981881dSAndrii Nakryiko * 65981881dSAndrii Nakryiko * [0] https://docs.google.com/document/d/1UyjTZuPFWiPFyKk1tV5an11_iaRuec6U-ZESZ54nNTY 75981881dSAndrii Nakryiko * 85981881dSAndrii Nakryiko * Copyright (C) 2021 Facebook 95981881dSAndrii Nakryiko */ 105981881dSAndrii Nakryiko #ifndef __LIBBPF_LEGACY_BPF_H 115981881dSAndrii Nakryiko #define __LIBBPF_LEGACY_BPF_H 125981881dSAndrii Nakryiko 135981881dSAndrii Nakryiko #include <linux/bpf.h> 145981881dSAndrii Nakryiko #include <stdbool.h> 155981881dSAndrii Nakryiko #include <stddef.h> 165981881dSAndrii Nakryiko #include <stdint.h> 175981881dSAndrii Nakryiko #include "libbpf_common.h" 185981881dSAndrii Nakryiko 195981881dSAndrii Nakryiko #ifdef __cplusplus 205981881dSAndrii Nakryiko extern "C" { 215981881dSAndrii Nakryiko #endif 225981881dSAndrii Nakryiko 23bd054102SAndrii Nakryiko /* As of libbpf 1.0 libbpf_set_strict_mode() and enum libbpf_struct_mode have 24bd054102SAndrii Nakryiko * no effect. But they are left in libbpf_legacy.h so that applications that 25bd054102SAndrii Nakryiko * prepared for libbpf 1.0 before final release by using 26bd054102SAndrii Nakryiko * libbpf_set_strict_mode() still work with libbpf 1.0+ without any changes. 27bd054102SAndrii Nakryiko */ 285981881dSAndrii Nakryiko enum libbpf_strict_mode { 295981881dSAndrii Nakryiko /* Turn on all supported strict features of libbpf to simulate libbpf 305981881dSAndrii Nakryiko * v1.0 behavior. 315981881dSAndrii Nakryiko * This will be the default behavior in libbpf v1.0. 325981881dSAndrii Nakryiko */ 335981881dSAndrii Nakryiko LIBBPF_STRICT_ALL = 0xffffffff, 345981881dSAndrii Nakryiko 355981881dSAndrii Nakryiko /* 365981881dSAndrii Nakryiko * Disable any libbpf 1.0 behaviors. This is the default before libbpf 375981881dSAndrii Nakryiko * v1.0. It won't be supported anymore in v1.0, please update your 385981881dSAndrii Nakryiko * code so that it handles LIBBPF_STRICT_ALL mode before libbpf v1.0. 395981881dSAndrii Nakryiko */ 405981881dSAndrii Nakryiko LIBBPF_STRICT_NONE = 0x00, 41f12b6543SAndrii Nakryiko /* 42f12b6543SAndrii Nakryiko * Return NULL pointers on error, not ERR_PTR(err). 43f12b6543SAndrii Nakryiko * Additionally, libbpf also always sets errno to corresponding Exx 44f12b6543SAndrii Nakryiko * (positive) error code. 45f12b6543SAndrii Nakryiko */ 46f12b6543SAndrii Nakryiko LIBBPF_STRICT_CLEAN_PTRS = 0x01, 47f12b6543SAndrii Nakryiko /* 48f12b6543SAndrii Nakryiko * Return actual error codes from low-level APIs directly, not just -1. 49f12b6543SAndrii Nakryiko * Additionally, libbpf also always sets errno to corresponding Exx 50f12b6543SAndrii Nakryiko * (positive) error code. 51f12b6543SAndrii Nakryiko */ 52f12b6543SAndrii Nakryiko LIBBPF_STRICT_DIRECT_ERRS = 0x02, 53dd94d45cSAndrii Nakryiko /* 54dd94d45cSAndrii Nakryiko * Enforce strict BPF program section (SEC()) names. 55dd94d45cSAndrii Nakryiko * E.g., while prefiously SEC("xdp_whatever") or SEC("perf_event_blah") were 56dd94d45cSAndrii Nakryiko * allowed, with LIBBPF_STRICT_SEC_PREFIX this will become 57dd94d45cSAndrii Nakryiko * unrecognized by libbpf and would have to be just SEC("xdp") and 58dd94d45cSAndrii Nakryiko * SEC("xdp") and SEC("perf_event"). 59a77f879bSStanislav Fomichev * 60a77f879bSStanislav Fomichev * Note, in this mode the program pin path will be based on the 61a77f879bSStanislav Fomichev * function name instead of section name. 62bc380eb9SDelyan Kratunov * 63bc380eb9SDelyan Kratunov * Additionally, routines in the .text section are always considered 64bc380eb9SDelyan Kratunov * sub-programs. Legacy behavior allows for a single routine in .text 65bc380eb9SDelyan Kratunov * to be a program. 66dd94d45cSAndrii Nakryiko */ 67dd94d45cSAndrii Nakryiko LIBBPF_STRICT_SEC_NAME = 0x04, 68689624f0SJoe Burton /* 69689624f0SJoe Burton * Disable the global 'bpf_objects_list'. Maintaining this list adds 70689624f0SJoe Burton * a race condition to bpf_object__open() and bpf_object__close(). 71689624f0SJoe Burton * Clients can maintain it on their own if it is valuable for them. 72689624f0SJoe Burton */ 73689624f0SJoe Burton LIBBPF_STRICT_NO_OBJECT_LIST = 0x08, 74e542f2c4SAndrii Nakryiko /* 75e542f2c4SAndrii Nakryiko * Automatically bump RLIMIT_MEMLOCK using setrlimit() before the 76e542f2c4SAndrii Nakryiko * first BPF program or map creation operation. This is done only if 77e542f2c4SAndrii Nakryiko * kernel is too old to support memcg-based memory accounting for BPF 78e542f2c4SAndrii Nakryiko * subsystem. By default, RLIMIT_MEMLOCK limit is set to RLIM_INFINITY, 79ab9a5a05SAndrii Nakryiko * but it can be overriden with libbpf_set_memlock_rlim() API. 80ab9a5a05SAndrii Nakryiko * Note that libbpf_set_memlock_rlim() needs to be called before 81e542f2c4SAndrii Nakryiko * the very first bpf_prog_load(), bpf_map_create() or bpf_object__load() 82e542f2c4SAndrii Nakryiko * operation. 83e542f2c4SAndrii Nakryiko */ 84e542f2c4SAndrii Nakryiko LIBBPF_STRICT_AUTO_RLIMIT_MEMLOCK = 0x10, 8593b8952dSAndrii Nakryiko /* 8693b8952dSAndrii Nakryiko * Error out on any SEC("maps") map definition, which are deprecated 8793b8952dSAndrii Nakryiko * in favor of BTF-defined map definitions in SEC(".maps"). 8893b8952dSAndrii Nakryiko */ 8993b8952dSAndrii Nakryiko LIBBPF_STRICT_MAP_DEFINITIONS = 0x20, 90dd94d45cSAndrii Nakryiko 915981881dSAndrii Nakryiko __LIBBPF_STRICT_LAST, 925981881dSAndrii Nakryiko }; 935981881dSAndrii Nakryiko 945981881dSAndrii Nakryiko LIBBPF_API int libbpf_set_strict_mode(enum libbpf_strict_mode mode); 955981881dSAndrii Nakryiko 96bd054102SAndrii Nakryiko /** 97bd054102SAndrii Nakryiko * @brief **libbpf_get_error()** extracts the error code from the passed 98bd054102SAndrii Nakryiko * pointer 99bd054102SAndrii Nakryiko * @param ptr pointer returned from libbpf API function 100bd054102SAndrii Nakryiko * @return error code; or 0 if no error occured 101bd054102SAndrii Nakryiko * 102bd054102SAndrii Nakryiko * Note, as of libbpf 1.0 this function is not necessary and not recommended 103bd054102SAndrii Nakryiko * to be used. Libbpf doesn't return error code embedded into the pointer 104bd054102SAndrii Nakryiko * itself. Instead, NULL is returned on error and error code is passed through 105bd054102SAndrii Nakryiko * thread-local errno variable. **libbpf_get_error()** is just returning -errno 106bd054102SAndrii Nakryiko * value if it receives NULL, which is correct only if errno hasn't been 107bd054102SAndrii Nakryiko * modified between libbpf API call and corresponding **libbpf_get_error()** 108bd054102SAndrii Nakryiko * call. Prefer to check return for NULL and use errno directly. 109bd054102SAndrii Nakryiko * 110bd054102SAndrii Nakryiko * This API is left in libbpf 1.0 to allow applications that were 1.0-ready 111bd054102SAndrii Nakryiko * before final libbpf 1.0 without needing to change them. 112bd054102SAndrii Nakryiko */ 113bd054102SAndrii Nakryiko LIBBPF_API long libbpf_get_error(const void *ptr); 114bd054102SAndrii Nakryiko 115be80e9cdSAndrii Nakryiko #define DECLARE_LIBBPF_OPTS LIBBPF_OPTS 1165981881dSAndrii Nakryiko 11720eccf29SAndrii Nakryiko /* "Discouraged" APIs which don't follow consistent libbpf naming patterns. 11820eccf29SAndrii Nakryiko * They are normally a trivial aliases or wrappers for proper APIs and are 11920eccf29SAndrii Nakryiko * left to minimize unnecessary disruption for users of libbpf. But they 12020eccf29SAndrii Nakryiko * shouldn't be used going forward. 12120eccf29SAndrii Nakryiko */ 12220eccf29SAndrii Nakryiko 12320eccf29SAndrii Nakryiko struct bpf_program; 12420eccf29SAndrii Nakryiko struct bpf_map; 12520eccf29SAndrii Nakryiko struct btf; 12620eccf29SAndrii Nakryiko struct btf_ext; 12720eccf29SAndrii Nakryiko 128*abf84b64SAndrii Nakryiko LIBBPF_API struct btf *libbpf_find_kernel_btf(void); 129*abf84b64SAndrii Nakryiko 13020eccf29SAndrii Nakryiko LIBBPF_API enum bpf_prog_type bpf_program__get_type(const struct bpf_program *prog); 13120eccf29SAndrii Nakryiko LIBBPF_API enum bpf_attach_type bpf_program__get_expected_attach_type(const struct bpf_program *prog); 13220eccf29SAndrii Nakryiko LIBBPF_API const char *bpf_map__get_pin_path(const struct bpf_map *map); 13320eccf29SAndrii Nakryiko LIBBPF_API const void *btf__get_raw_data(const struct btf *btf, __u32 *size); 13420eccf29SAndrii Nakryiko LIBBPF_API const void *btf_ext__get_raw_data(const struct btf_ext *btf_ext, __u32 *size); 13520eccf29SAndrii Nakryiko 1365981881dSAndrii Nakryiko #ifdef __cplusplus 1375981881dSAndrii Nakryiko } /* extern "C" */ 1385981881dSAndrii Nakryiko #endif 1395981881dSAndrii Nakryiko 1405981881dSAndrii Nakryiko #endif /* __LIBBPF_LEGACY_BPF_H */ 141