xref: /openbmc/linux/tools/lib/bpf/libbpf_legacy.h (revision 20eccf29)
15981881dSAndrii Nakryiko /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
25981881dSAndrii Nakryiko 
35981881dSAndrii Nakryiko /*
45981881dSAndrii Nakryiko  * Libbpf legacy APIs (either discouraged or deprecated, as mentioned in [0])
55981881dSAndrii Nakryiko  *
65981881dSAndrii Nakryiko  *   [0] https://docs.google.com/document/d/1UyjTZuPFWiPFyKk1tV5an11_iaRuec6U-ZESZ54nNTY
75981881dSAndrii Nakryiko  *
85981881dSAndrii Nakryiko  * Copyright (C) 2021 Facebook
95981881dSAndrii Nakryiko  */
105981881dSAndrii Nakryiko #ifndef __LIBBPF_LEGACY_BPF_H
115981881dSAndrii Nakryiko #define __LIBBPF_LEGACY_BPF_H
125981881dSAndrii Nakryiko 
135981881dSAndrii Nakryiko #include <linux/bpf.h>
145981881dSAndrii Nakryiko #include <stdbool.h>
155981881dSAndrii Nakryiko #include <stddef.h>
165981881dSAndrii Nakryiko #include <stdint.h>
175981881dSAndrii Nakryiko #include "libbpf_common.h"
185981881dSAndrii Nakryiko 
195981881dSAndrii Nakryiko #ifdef __cplusplus
205981881dSAndrii Nakryiko extern "C" {
215981881dSAndrii Nakryiko #endif
225981881dSAndrii Nakryiko 
235981881dSAndrii Nakryiko enum libbpf_strict_mode {
245981881dSAndrii Nakryiko 	/* Turn on all supported strict features of libbpf to simulate libbpf
255981881dSAndrii Nakryiko 	 * v1.0 behavior.
265981881dSAndrii Nakryiko 	 * This will be the default behavior in libbpf v1.0.
275981881dSAndrii Nakryiko 	 */
285981881dSAndrii Nakryiko 	LIBBPF_STRICT_ALL = 0xffffffff,
295981881dSAndrii Nakryiko 
305981881dSAndrii Nakryiko 	/*
315981881dSAndrii Nakryiko 	 * Disable any libbpf 1.0 behaviors. This is the default before libbpf
325981881dSAndrii Nakryiko 	 * v1.0. It won't be supported anymore in v1.0, please update your
335981881dSAndrii Nakryiko 	 * code so that it handles LIBBPF_STRICT_ALL mode before libbpf v1.0.
345981881dSAndrii Nakryiko 	 */
355981881dSAndrii Nakryiko 	LIBBPF_STRICT_NONE = 0x00,
36f12b6543SAndrii Nakryiko 	/*
37f12b6543SAndrii Nakryiko 	 * Return NULL pointers on error, not ERR_PTR(err).
38f12b6543SAndrii Nakryiko 	 * Additionally, libbpf also always sets errno to corresponding Exx
39f12b6543SAndrii Nakryiko 	 * (positive) error code.
40f12b6543SAndrii Nakryiko 	 */
41f12b6543SAndrii Nakryiko 	LIBBPF_STRICT_CLEAN_PTRS = 0x01,
42f12b6543SAndrii Nakryiko 	/*
43f12b6543SAndrii Nakryiko 	 * Return actual error codes from low-level APIs directly, not just -1.
44f12b6543SAndrii Nakryiko 	 * Additionally, libbpf also always sets errno to corresponding Exx
45f12b6543SAndrii Nakryiko 	 * (positive) error code.
46f12b6543SAndrii Nakryiko 	 */
47f12b6543SAndrii Nakryiko 	LIBBPF_STRICT_DIRECT_ERRS = 0x02,
48dd94d45cSAndrii Nakryiko 	/*
49dd94d45cSAndrii Nakryiko 	 * Enforce strict BPF program section (SEC()) names.
50dd94d45cSAndrii Nakryiko 	 * E.g., while prefiously SEC("xdp_whatever") or SEC("perf_event_blah") were
51dd94d45cSAndrii Nakryiko 	 * allowed, with LIBBPF_STRICT_SEC_PREFIX this will become
52dd94d45cSAndrii Nakryiko 	 * unrecognized by libbpf and would have to be just SEC("xdp") and
53dd94d45cSAndrii Nakryiko 	 * SEC("xdp") and SEC("perf_event").
54a77f879bSStanislav Fomichev 	 *
55a77f879bSStanislav Fomichev 	 * Note, in this mode the program pin path will be based on the
56a77f879bSStanislav Fomichev 	 * function name instead of section name.
57dd94d45cSAndrii Nakryiko 	 */
58dd94d45cSAndrii Nakryiko 	LIBBPF_STRICT_SEC_NAME = 0x04,
59689624f0SJoe Burton 	/*
60689624f0SJoe Burton 	 * Disable the global 'bpf_objects_list'. Maintaining this list adds
61689624f0SJoe Burton 	 * a race condition to bpf_object__open() and bpf_object__close().
62689624f0SJoe Burton 	 * Clients can maintain it on their own if it is valuable for them.
63689624f0SJoe Burton 	 */
64689624f0SJoe Burton 	LIBBPF_STRICT_NO_OBJECT_LIST = 0x08,
65e542f2c4SAndrii Nakryiko 	/*
66e542f2c4SAndrii Nakryiko 	 * Automatically bump RLIMIT_MEMLOCK using setrlimit() before the
67e542f2c4SAndrii Nakryiko 	 * first BPF program or map creation operation. This is done only if
68e542f2c4SAndrii Nakryiko 	 * kernel is too old to support memcg-based memory accounting for BPF
69e542f2c4SAndrii Nakryiko 	 * subsystem. By default, RLIMIT_MEMLOCK limit is set to RLIM_INFINITY,
70e542f2c4SAndrii Nakryiko 	 * but it can be overriden with libbpf_set_memlock_rlim_max() API.
71e542f2c4SAndrii Nakryiko 	 * Note that libbpf_set_memlock_rlim_max() needs to be called before
72e542f2c4SAndrii Nakryiko 	 * the very first bpf_prog_load(), bpf_map_create() or bpf_object__load()
73e542f2c4SAndrii Nakryiko 	 * operation.
74e542f2c4SAndrii Nakryiko 	 */
75e542f2c4SAndrii Nakryiko 	LIBBPF_STRICT_AUTO_RLIMIT_MEMLOCK = 0x10,
7693b8952dSAndrii Nakryiko 	/*
7793b8952dSAndrii Nakryiko 	 * Error out on any SEC("maps") map definition, which are deprecated
7893b8952dSAndrii Nakryiko 	 * in favor of BTF-defined map definitions in SEC(".maps").
7993b8952dSAndrii Nakryiko 	 */
8093b8952dSAndrii Nakryiko 	LIBBPF_STRICT_MAP_DEFINITIONS = 0x20,
81dd94d45cSAndrii Nakryiko 
825981881dSAndrii Nakryiko 	__LIBBPF_STRICT_LAST,
835981881dSAndrii Nakryiko };
845981881dSAndrii Nakryiko 
855981881dSAndrii Nakryiko LIBBPF_API int libbpf_set_strict_mode(enum libbpf_strict_mode mode);
865981881dSAndrii Nakryiko 
87be80e9cdSAndrii Nakryiko #define DECLARE_LIBBPF_OPTS LIBBPF_OPTS
885981881dSAndrii Nakryiko 
89*20eccf29SAndrii Nakryiko /* "Discouraged" APIs which don't follow consistent libbpf naming patterns.
90*20eccf29SAndrii Nakryiko  * They are normally a trivial aliases or wrappers for proper APIs and are
91*20eccf29SAndrii Nakryiko  * left to minimize unnecessary disruption for users of libbpf. But they
92*20eccf29SAndrii Nakryiko  * shouldn't be used going forward.
93*20eccf29SAndrii Nakryiko  */
94*20eccf29SAndrii Nakryiko 
95*20eccf29SAndrii Nakryiko struct bpf_program;
96*20eccf29SAndrii Nakryiko struct bpf_map;
97*20eccf29SAndrii Nakryiko struct btf;
98*20eccf29SAndrii Nakryiko struct btf_ext;
99*20eccf29SAndrii Nakryiko 
100*20eccf29SAndrii Nakryiko LIBBPF_API enum bpf_prog_type bpf_program__get_type(const struct bpf_program *prog);
101*20eccf29SAndrii Nakryiko LIBBPF_API enum bpf_attach_type bpf_program__get_expected_attach_type(const struct bpf_program *prog);
102*20eccf29SAndrii Nakryiko LIBBPF_API const char *bpf_map__get_pin_path(const struct bpf_map *map);
103*20eccf29SAndrii Nakryiko LIBBPF_API const void *btf__get_raw_data(const struct btf *btf, __u32 *size);
104*20eccf29SAndrii Nakryiko LIBBPF_API const void *btf_ext__get_raw_data(const struct btf_ext *btf_ext, __u32 *size);
105*20eccf29SAndrii Nakryiko 
1065981881dSAndrii Nakryiko #ifdef __cplusplus
1075981881dSAndrii Nakryiko } /* extern "C" */
1085981881dSAndrii Nakryiko #endif
1095981881dSAndrii Nakryiko 
1105981881dSAndrii Nakryiko #endif /* __LIBBPF_LEGACY_BPF_H */
111