[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.22.240.163: ~ $
/* Copyright (c) 2011-2014 PLUMgrid, http://plumgrid.com
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 */
#ifndef __LINUX_BPF_H__
#define __LINUX_BPF_H__

#include <linux/types.h>
#include <linux/bpf_common.h>

/* Extended instruction set based on top of classic BPF */

/* instruction classes */
#define BPF_ALU64	0x07	/* alu mode in double word width */

/* ld/ldx fields */
#define BPF_DW		0x18	/* double word */
#define BPF_XADD	0xc0	/* exclusive add */

/* alu/jmp fields */
#define BPF_MOV		0xb0	/* mov reg to reg */
#define BPF_ARSH	0xc0	/* sign extending arithmetic shift right */

/* change endianness of a register */
#define BPF_END		0xd0	/* flags for endianness conversion: */
#define BPF_TO_LE	0x00	/* convert to little-endian */
#define BPF_TO_BE	0x08	/* convert to big-endian */
#define BPF_FROM_LE	BPF_TO_LE
#define BPF_FROM_BE	BPF_TO_BE

/* jmp encodings */
#define BPF_JNE		0x50	/* jump != */
#define BPF_JLT		0xa0	/* LT is unsigned, '<' */
#define BPF_JLE		0xb0	/* LE is unsigned, '<=' */
#define BPF_JSGT	0x60	/* SGT is signed '>', GT in x86 */
#define BPF_JSGE	0x70	/* SGE is signed '>=', GE in x86 */
#define BPF_JSLT	0xc0	/* SLT is signed, '<' */
#define BPF_JSLE	0xd0	/* SLE is signed, '<=' */
#define BPF_CALL	0x80	/* function call */
#define BPF_EXIT	0x90	/* function return */

/* Register numbers */
enum {
	BPF_REG_0 = 0,
	BPF_REG_1,
	BPF_REG_2,
	BPF_REG_3,
	BPF_REG_4,
	BPF_REG_5,
	BPF_REG_6,
	BPF_REG_7,
	BPF_REG_8,
	BPF_REG_9,
	BPF_REG_10,
	__MAX_BPF_REG,
};

/* BPF has 10 general purpose 64-bit registers and stack frame. */
#define MAX_BPF_REG	__MAX_BPF_REG

struct bpf_insn {
	__u8	code;		/* opcode */
	__u8	dst_reg:4;	/* dest register */
	__u8	src_reg:4;	/* source register */
	__s16	off;		/* signed offset */
	__s32	imm;		/* signed immediate constant */
};

/* Key of an a BPF_MAP_TYPE_LPM_TRIE entry */
struct bpf_lpm_trie_key {
	__u32	prefixlen;	/* up to 32 for AF_INET, 128 for AF_INET6 */
	__u8	data[0];	/* Arbitrary size */
};

/* BPF syscall commands, see bpf(2) man-page for details. */
enum bpf_cmd {
	BPF_MAP_CREATE,
	BPF_MAP_LOOKUP_ELEM,
	BPF_MAP_UPDATE_ELEM,
	BPF_MAP_DELETE_ELEM,
	BPF_MAP_GET_NEXT_KEY,
	BPF_PROG_LOAD,
	BPF_OBJ_PIN,
	BPF_OBJ_GET,
	BPF_PROG_ATTACH,
	BPF_PROG_DETACH,
	BPF_PROG_TEST_RUN,
	BPF_PROG_GET_NEXT_ID,
	BPF_MAP_GET_NEXT_ID,
	BPF_PROG_GET_FD_BY_ID,
	BPF_MAP_GET_FD_BY_ID,
	BPF_OBJ_GET_INFO_BY_FD,
	BPF_PROG_QUERY,
};

enum bpf_map_type {
	BPF_MAP_TYPE_UNSPEC,
	BPF_MAP_TYPE_HASH,
	BPF_MAP_TYPE_ARRAY,
	BPF_MAP_TYPE_PROG_ARRAY,
	BPF_MAP_TYPE_PERF_EVENT_ARRAY,
	BPF_MAP_TYPE_PERCPU_HASH,
	BPF_MAP_TYPE_PERCPU_ARRAY,
	BPF_MAP_TYPE_STACK_TRACE,
	BPF_MAP_TYPE_CGROUP_ARRAY,
	BPF_MAP_TYPE_LRU_HASH,
	BPF_MAP_TYPE_LRU_PERCPU_HASH,
	BPF_MAP_TYPE_LPM_TRIE,
	BPF_MAP_TYPE_ARRAY_OF_MAPS,
	BPF_MAP_TYPE_HASH_OF_MAPS,
	BPF_MAP_TYPE_DEVMAP,
};

enum bpf_prog_type {
	BPF_PROG_TYPE_UNSPEC,
	BPF_PROG_TYPE_SOCKET_FILTER,
	BPF_PROG_TYPE_KPROBE,
	BPF_PROG_TYPE_SCHED_CLS,
	BPF_PROG_TYPE_SCHED_ACT,
	BPF_PROG_TYPE_TRACEPOINT,
	BPF_PROG_TYPE_XDP,
	BPF_PROG_TYPE_PERF_EVENT,
	BPF_PROG_TYPE_CGROUP_SKB,
	BPF_PROG_TYPE_CGROUP_SOCK,
	BPF_PROG_TYPE_LWT_IN,
	BPF_PROG_TYPE_LWT_OUT,
	BPF_PROG_TYPE_LWT_XMIT,
	BPF_PROG_TYPE_SOCK_OPS,
};

enum bpf_attach_type {
	BPF_CGROUP_INET_INGRESS,
	BPF_CGROUP_INET_EGRESS,
	BPF_CGROUP_INET_SOCK_CREATE,
	BPF_CGROUP_SOCK_OPS,
	__MAX_BPF_ATTACH_TYPE
};

#define MAX_BPF_ATTACH_TYPE __MAX_BPF_ATTACH_TYPE

/* cgroup-bpf attach flags used in BPF_PROG_ATTACH command
 *
 * NONE(default): No further bpf programs allowed in the subtree.
 *
 * BPF_F_ALLOW_OVERRIDE: If a sub-cgroup installs some bpf program,
 * the program in this cgroup yields to sub-cgroup program.
 *
 * BPF_F_ALLOW_MULTI: If a sub-cgroup installs some bpf program,
 * that cgroup program gets run in addition to the program in this cgroup.
 *
 * Only one program is allowed to be attached to a cgroup with
 * NONE or BPF_F_ALLOW_OVERRIDE flag.
 * Attaching another program on top of NONE or BPF_F_ALLOW_OVERRIDE will
 * release old program and attach the new one. Attach flags has to match.
 *
 * Multiple programs are allowed to be attached to a cgroup with
 * BPF_F_ALLOW_MULTI flag. They are executed in FIFO order
 * (those that were attached first, run first)
 * The programs of sub-cgroup are executed first, then programs of
 * this cgroup and then programs of parent cgroup.
 * When children program makes decision (like picking TCP CA or sock bind)
 * parent program has a chance to override it.
 *
 * A cgroup with MULTI or OVERRIDE flag allows any attach flags in sub-cgroups.
 * A cgroup with NONE doesn't allow any programs in sub-cgroups.
 * Ex1:
 * cgrp1 (MULTI progs A, B) ->
 *    cgrp2 (OVERRIDE prog C) ->
 *      cgrp3 (MULTI prog D) ->
 *        cgrp4 (OVERRIDE prog E) ->
 *          cgrp5 (NONE prog F)
 * the event in cgrp5 triggers execution of F,D,A,B in that order.
 * if prog F is detached, the execution is E,D,A,B
 * if prog F and D are detached, the execution is E,A,B
 * if prog F, E and D are detached, the execution is C,A,B
 *
 * All eligible programs are executed regardless of return code from
 * earlier programs.
 */
#define BPF_F_ALLOW_OVERRIDE	(1U << 0)
#define BPF_F_ALLOW_MULTI	(1U << 1)

/* If BPF_F_STRICT_ALIGNMENT is used in BPF_PROG_LOAD command, the
 * verifier will perform strict alignment checking as if the kernel
 * has been built with CONFIG_EFFICIENT_UNALIGNED_ACCESS not set,
 * and NET_IP_ALIGN defined to 2.
 */
#define BPF_F_STRICT_ALIGNMENT	(1U << 0)

/* when bpf_ldimm64->src_reg == BPF_PSEUDO_MAP_FD, bpf_ldimm64->imm == fd */
#define BPF_PSEUDO_MAP_FD	1

/* when bpf_call->src_reg == BPF_PSEUDO_CALL, bpf_call->imm == pc-relative
 * offset to another bpf function
 */
#define BPF_PSEUDO_CALL		1

/* flags for BPF_MAP_UPDATE_ELEM command */
#define BPF_ANY		0 /* create new element or update existing */
#define BPF_NOEXIST	1 /* create new element if it didn't exist */
#define BPF_EXIST	2 /* update existing element */

/* flags for BPF_MAP_CREATE command */
#define BPF_F_NO_PREALLOC	(1U << 0)
/* Instead of having one common LRU list in the
 * BPF_MAP_TYPE_LRU_[PERCPU_]HASH map, use a percpu LRU list
 * which can scale and perform better.
 * Note, the LRU nodes (including free nodes) cannot be moved
 * across different LRU lists.
 */
#define BPF_F_NO_COMMON_LRU	(1U << 1)
/* Specify numa node during map creation */
#define BPF_F_NUMA_NODE		(1U << 2)

/* flags for BPF_PROG_QUERY */
#define BPF_F_QUERY_EFFECTIVE	(1U << 0)

#define BPF_OBJ_NAME_LEN 16U

/* Flags for accessing BPF object */
#define BPF_F_RDONLY		(1U << 3)
#define BPF_F_WRONLY		(1U << 4)

/* Flag for stack_map, store build_id+offset instead of pointer */
#define BPF_F_STACK_BUILD_ID	(1U << 5)

enum bpf_stack_build_id_status {
	/* user space need an empty entry to identify end of a trace */
	BPF_STACK_BUILD_ID_EMPTY = 0,
	/* with valid build_id and offset */
	BPF_STACK_BUILD_ID_VALID = 1,
	/* couldn't get build_id, fallback to ip */
	BPF_STACK_BUILD_ID_IP = 2,
};

#define BPF_BUILD_ID_SIZE 20
struct bpf_stack_build_id {
	__s32		status;
	unsigned char	build_id[BPF_BUILD_ID_SIZE];
	union {
		__u64	offset;
		__u64	ip;
	};
};

union bpf_attr {
	struct { /* anonymous struct used by BPF_MAP_CREATE command */
		__u32	map_type;	/* one of enum bpf_map_type */
		__u32	key_size;	/* size of key in bytes */
		__u32	value_size;	/* size of value in bytes */
		__u32	max_entries;	/* max number of entries in a map */
		__u32	map_flags;	/* BPF_MAP_CREATE related
					 * flags defined above.
					 */
		__u32	inner_map_fd;	/* fd pointing to the inner map */
		__u32	numa_node;	/* numa node (effective only if
					 * BPF_F_NUMA_NODE is set).
					 */
		char	map_name[BPF_OBJ_NAME_LEN];
	};

	struct { /* anonymous struct used by BPF_MAP_*_ELEM commands */
		__u32		map_fd;
		__aligned_u64	key;
		union {
			__aligned_u64 value;
			__aligned_u64 next_key;
		};
		__u64		flags;
	};
	struct { /* anonymous struct used by BPF_PROG_LOAD command */
		__u32		prog_type;	/* one of enum bpf_prog_type */
		__u32		insn_cnt;
		__aligned_u64	insns;
		__aligned_u64	license;
		__u32		log_level;	/* verbosity level of verifier */
		__u32		log_size;	/* size of user buffer */
		__aligned_u64	log_buf;	/* user supplied buffer */
		__u32		kern_version;	/* checked when prog_type=kprobe */
		__u32		prog_flags;
		char		prog_name[BPF_OBJ_NAME_LEN];
		__u32		prog_ifindex;	/* ifindex of netdev to prep for */
		/* For some prog types expected attach type must be known at
		 * load time to verify attach type specific parts of prog
		 * (context accesses, allowed helpers, etc).
		 */
		__u32		expected_attach_type;
	};

	struct { /* anonymous struct used by BPF_OBJ_* commands */
		__aligned_u64	pathname;
		__u32		bpf_fd;
		__u32		file_flags;
	};

	struct { /* anonymous struct used by BPF_PROG_ATTACH/DETACH commands */
		__u32		target_fd;	/* container object to attach to */
		__u32		attach_bpf_fd;	/* eBPF program to attach */
		__u32		attach_type;
		__u32		attach_flags;
	};

	struct { /* anonymous struct used by BPF_PROG_TEST_RUN command */
		__u32		prog_fd;
		__u32		retval;
		__u32		data_size_in;
		__u32		data_size_out;
		__aligned_u64	data_in;
		__aligned_u64	data_out;
		__u32		repeat;
		__u32		duration;
	} test;

	struct { /* anonymous struct used by BPF_*_GET_*_ID */
		union {
			__u32		start_id;
			__u32		prog_id;
			__u32		map_id;
		};
		__u32		next_id;
		__u32		open_flags;
	};

	struct { /* anonymous struct used by BPF_OBJ_GET_INFO_BY_FD */
		__u32		bpf_fd;
		__u32		info_len;
		__aligned_u64	info;
	} info;

	struct { /* anonymous struct used by BPF_PROG_QUERY command */
		__u32		target_fd;	/* container object to query */
		__u32		attach_type;
		__u32		query_flags;
		__u32		attach_flags;
		__aligned_u64	prog_ids;
		__u32		prog_cnt;
	} query;
} __attribute__((aligned(8)));

/* User return codes for XDP prog type.
 * A valid XDP program must return one of these defined values. All other
 * return codes are reserved for future use. Unknown return codes will result
 * in packet drop.
 */
enum xdp_action {
	XDP_ABORTED = 0,
	XDP_DROP,
	XDP_PASS,
	XDP_TX,
	XDP_REDIRECT,
};

/* user accessible metadata for XDP packet hook
 * new fields must be added to the end of this structure
 */
struct xdp_md {
	__u32 data;
	__u32 data_end;
};

#define XDP_PACKET_HEADROOM 256

/* BPF helper function descriptions:
 *
 * void *bpf_map_lookup_elem(&map, &key)
 *     Return: Map value or NULL
 *
 * int bpf_map_update_elem(&map, &key, &value, flags)
 *     Return: 0 on success or negative error
 *
 * int bpf_map_delete_elem(&map, &key)
 *     Return: 0 on success or negative error
 *
 * int bpf_probe_read(void *dst, int size, void *src)
 *     Return: 0 on success or negative error
 *
 * u64 bpf_ktime_get_ns(void)
 *     Return: current ktime
 *
 * int bpf_trace_printk(const char *fmt, int fmt_size, ...)
 *     Return: length of buffer written or negative error
 *
 * u32 bpf_prandom_u32(void)
 *     Return: random value
 *
 * u32 bpf_raw_smp_processor_id(void)
 *     Return: SMP processor ID
 *
 * int bpf_skb_store_bytes(skb, offset, from, len, flags)
 *     store bytes into packet
 *     @skb: pointer to skb
 *     @offset: offset within packet from skb->mac_header
 *     @from: pointer where to copy bytes from
 *     @len: number of bytes to store into packet
 *     @flags: bit 0 - if true, recompute skb->csum
 *             other bits - reserved
 *     Return: 0 on success or negative error
 *
 * int bpf_l3_csum_replace(skb, offset, from, to, flags)
 *     recompute IP checksum
 *     @skb: pointer to skb
 *     @offset: offset within packet where IP checksum is located
 *     @from: old value of header field
 *     @to: new value of header field
 *     @flags: bits 0-3 - size of header field
 *             other bits - reserved
 *     Return: 0 on success or negative error
 *
 * int bpf_l4_csum_replace(skb, offset, from, to, flags)
 *     recompute TCP/UDP checksum
 *     @skb: pointer to skb
 *     @offset: offset within packet where TCP/UDP checksum is located
 *     @from: old value of header field
 *     @to: new value of header field
 *     @flags: bits 0-3 - size of header field
 *             bit 4 - is pseudo header
 *             other bits - reserved
 *     Return: 0 on success or negative error
 *
 * int bpf_tail_call(ctx, prog_array_map, index)
 *     jump into another BPF program
 *     @ctx: context pointer passed to next program
 *     @prog_array_map: pointer to map which type is BPF_MAP_TYPE_PROG_ARRAY
 *     @index: 32-bit index inside array that selects specific program to run
 *     Return: 0 on success or negative error
 *
 * int bpf_clone_redirect(skb, ifindex, flags)
 *     redirect to another netdev
 *     @skb: pointer to skb
 *     @ifindex: ifindex of the net device
 *     @flags: bit 0 - if set, redirect to ingress instead of egress
 *             other bits - reserved
 *     Return: 0 on success or negative error
 *
 * u64 bpf_get_current_pid_tgid(void)
 *     Return: current->tgid << 32 | current->pid
 *
 * u64 bpf_get_current_uid_gid(void)
 *     Return: current_gid << 32 | current_uid
 *
 * int bpf_get_current_comm(char *buf, int size_of_buf)
 *     stores current->comm into buf
 *     Return: 0 on success or negative error
 *
 * u32 bpf_get_cgroup_classid(skb)
 *     retrieve a proc's classid
 *     @skb: pointer to skb
 *     Return: classid if != 0
 *
 * int bpf_skb_vlan_push(skb, vlan_proto, vlan_tci)
 *     Return: 0 on success or negative error
 *
 * int bpf_skb_vlan_pop(skb)
 *     Return: 0 on success or negative error
 *
 * int bpf_skb_get_tunnel_key(skb, key, size, flags)
 * int bpf_skb_set_tunnel_key(skb, key, size, flags)
 *     retrieve or populate tunnel metadata
 *     @skb: pointer to skb
 *     @key: pointer to 'struct bpf_tunnel_key'
 *     @size: size of 'struct bpf_tunnel_key'
 *     @flags: room for future extensions
 *     Return: 0 on success or negative error
 *
 * u64 bpf_perf_event_read(map, flags)
 *     read perf event counter value
 *     @map: pointer to perf_event_array map
 *     @flags: index of event in the map or bitmask flags
 *     Return: value of perf event counter read or error code
 *
 * int bpf_redirect(ifindex, flags)
 *     redirect to another netdev
 *     @ifindex: ifindex of the net device
 *     @flags: bit 0 - if set, redirect to ingress instead of egress
 *             other bits - reserved
 *     Return: TC_ACT_REDIRECT
 *
 * u32 bpf_get_route_realm(skb)
 *     retrieve a dst's tclassid
 *     @skb: pointer to skb
 *     Return: realm if != 0
 *
 * int bpf_perf_event_output(ctx, map, flags, data, size)
 *     output perf raw sample
 *     @ctx: struct pt_regs*
 *     @map: pointer to perf_event_array map
 *     @flags: index of event in the map or bitmask flags
 *     @data: data on stack to be output as raw data
 *     @size: size of data
 *     Return: 0 on success or negative error
 *
 * int bpf_get_stackid(ctx, map, flags)
 *     walk user or kernel stack and return id
 *     @ctx: struct pt_regs*
 *     @map: pointer to stack_trace map
 *     @flags: bits 0-7 - numer of stack frames to skip
 *             bit 8 - collect user stack instead of kernel
 *             bit 9 - compare stacks by hash only
 *             bit 10 - if two different stacks hash into the same stackid
 *                      discard old
 *             other bits - reserved
 *     Return: >= 0 stackid on success or negative error
 *
 * u64 bpf_get_current_task(void)
 *     Returns current task_struct
 *     Return: current
 *
 * int bpf_probe_write_user(void *dst, void *src, int len)
 *     safely attempt to write to a location
 *     @dst: destination address in userspace
 *     @src: source address on stack
 *     @len: number of bytes to copy
 *     Return: 0 on success or negative error
 *
 * int bpf_get_numa_node_id()
 *     Return: Id of current NUMA node.
 *
 * int bpf_probe_read_str(void *dst, int size, const void *unsafe_ptr)
 *     Copy a NUL terminated string from unsafe address. In case the string
 *     length is smaller than size, the target is not padded with further NUL
 *     bytes. In case the string length is larger than size, just count-1
 *     bytes are copied and the last byte is set to NUL.
 *     @dst: destination address
 *     @size: maximum number of bytes to copy, including the trailing NUL
 *     @unsafe_ptr: unsafe address
 *     Return:
 *       > 0 length of the string including the trailing NUL on success
 *       < 0 error
 *
 * int bpf_perf_event_read_value(map, flags, buf, buf_size)
 *     read perf event counter value and perf event enabled/running time
 *     @map: pointer to perf_event_array map
 *     @flags: index of event in the map or bitmask flags
 *     @buf: buf to fill
 *     @buf_size: size of the buf
 *     Return: 0 on success or negative error code
 *
 * int bpf_perf_prog_read_value(ctx, buf, buf_size)
 *     read perf prog attached perf event counter and enabled/running time
 *     @ctx: pointer to ctx
 *     @buf: buf to fill
 *     @buf_size: size of the buf
 *     Return : 0 on success or negative error code
 *
 * int bpf_override_return(pt_regs, rc)
 *	@pt_regs: pointer to struct pt_regs
 *	@rc: the return value to set
 *
 * int bpf_get_stack(struct pt_regs *regs, void *buf, u32 size, u64 flags)
 * 	Description
 *		Return a user or a kernel stack in bpf program provided buffer.
 *		To achieve this, the helper needs *ctx*, which is a pointer
 *		to the context on which the tracing program is executed.
 *		To store the stacktrace, the bpf program provides *buf* with
 *		a nonnegative *size*.
 *
 *		The last argument, *flags*, holds the number of stack frames to
 *		skip (from 0 to 255), masked with
 *		**BPF_F_SKIP_FIELD_MASK**. The next bits can be used to set
 *		the following flags:
 *
 *		**BPF_F_USER_STACK**
 *			Collect a user space stack instead of a kernel stack.
 *		**BPF_F_USER_BUILD_ID**
 *			Collect buildid+offset instead of ips for user stack,
 *			only valid if **BPF_F_USER_STACK** is also specified.
 *
 *		**bpf_get_stack**\ () can collect up to
 *		**PERF_MAX_STACK_DEPTH** both kernel and user frames, subject
 *		to sufficient large buffer size. Note that
 *		this limit can be controlled with the **sysctl** program, and
 *		that it should be manually increased in order to profile long
 *		user stacks (such as stacks for Java programs). To do so, use:
 *
 *	::
 *
 *		# sysctl kernel.perf_event_max_stack=<new value>
 *
 * 	Return
 * 		a non-negative value equal to or less than size on success, or
 * 		a negative error in case of failure.
 */
#define __BPF_FUNC_MAPPER(FN)		\
	FN(unspec),			\
	FN(map_lookup_elem),		\
	FN(map_update_elem),		\
	FN(map_delete_elem),		\
	FN(probe_read),			\
	FN(ktime_get_ns),		\
	FN(trace_printk),		\
	FN(get_prandom_u32),		\
	FN(get_smp_processor_id),	\
	FN(skb_store_bytes),		\
	FN(l3_csum_replace),		\
	FN(l4_csum_replace),		\
	FN(tail_call),			\
	FN(clone_redirect),		\
	FN(get_current_pid_tgid),	\
	FN(get_current_uid_gid),	\
	FN(get_current_comm),		\
	FN(get_cgroup_classid),		\
	FN(skb_vlan_push),		\
	FN(skb_vlan_pop),		\
	FN(skb_get_tunnel_key),		\
	FN(skb_set_tunnel_key),		\
	FN(perf_event_read),		\
	FN(redirect),			\
	FN(get_route_realm),		\
	FN(perf_event_output),		\
	FN(skb_load_bytes),		\
	FN(get_stackid),		\
	FN(csum_diff),			\
	FN(skb_get_tunnel_opt),		\
	FN(skb_set_tunnel_opt),		\
	FN(skb_change_proto),		\
	FN(skb_change_type),		\
	FN(skb_under_cgroup),		\
	FN(get_hash_recalc),		\
	FN(get_current_task),		\
	FN(probe_write_user),		\
	FN(current_task_under_cgroup),	\
	FN(skb_change_tail),		\
	FN(skb_pull_data),		\
	FN(csum_update),		\
	FN(set_hash_invalid),		\
	FN(get_numa_node_id),		\
	FN(skb_change_head),		\
	FN(xdp_adjust_head),		\
	FN(probe_read_str),		\
	FN(get_socket_cookie),		\
	FN(get_socket_uid),		\
	FN(set_hash),			\
	FN(setsockopt),			\
	FN(skb_adjust_room),		\
	FN(redirect_map),		\
	FN(sk_redirect_map),		\
	FN(sock_map_update),		\
	FN(xdp_adjust_meta),		\
	FN(perf_event_read_value),	\
	FN(perf_prog_read_value),	\
	FN(getsockopt),			\
	FN(override_return),		\
	FN(sock_ops_cb_flags_set),	\
	FN(msg_redirect_map),		\
	FN(msg_apply_bytes),		\
	FN(msg_cork_bytes),		\
	FN(msg_pull_data),		\
	FN(bind),			\
	FN(xdp_adjust_tail),		\
	FN(skb_get_xfrm_state),		\
	FN(get_stack),

/* integer value in 'imm' field of BPF_CALL instruction selects which helper
 * function eBPF program intends to call
 */
#define __BPF_ENUM_FN(x) BPF_FUNC_ ## x
enum bpf_func_id {
	__BPF_FUNC_MAPPER(__BPF_ENUM_FN)
	__BPF_FUNC_MAX_ID,
};
#undef __BPF_ENUM_FN

/* flags for both BPF_FUNC_get_stackid and BPF_FUNC_get_stack. */
#define BPF_F_SKIP_FIELD_MASK		0xffULL
#define BPF_F_USER_STACK		(1ULL << 8)
/* flags used by BPF_FUNC_get_stackid only. */
#define BPF_F_FAST_STACK_CMP		(1ULL << 9)
#define BPF_F_REUSE_STACKID		(1ULL << 10)
/* flags used by BPF_FUNC_get_stack only. */
#define BPF_F_USER_BUILD_ID		(1ULL << 11)

/* BPF_FUNC_perf_event_output, BPF_FUNC_perf_event_read and
 * BPF_FUNC_perf_event_read_value flags.
 */
#define BPF_F_INDEX_MASK		0xffffffffULL
#define BPF_F_CURRENT_CPU		BPF_F_INDEX_MASK
/* BPF_FUNC_perf_event_output for sk_buff input context. */
#define BPF_F_CTXLEN_MASK		(0xfffffULL << 32)

/* user accessible mirror of in-kernel sk_buff.
 * new fields can only be added to the end of this structure
 */
struct __sk_buff {
	__u32 len;
	__u32 pkt_type;
	__u32 mark;
	__u32 queue_mapping;
	__u32 protocol;
	__u32 vlan_present;
	__u32 vlan_tci;
	__u32 vlan_proto;
	__u32 priority;
	__u32 ingress_ifindex;
	__u32 ifindex;
	__u32 tc_index;
	__u32 cb[5];
	__u32 hash;
	__u32 tc_classid;
	__u32 data;
	__u32 data_end;
};

#define BPF_TAG_SIZE	8

struct bpf_prog_info {
	__u32 type;
	__u32 id;
	__u8  tag[BPF_TAG_SIZE];
	__u32 jited_prog_len;
	__u32 xlated_prog_len;
	__aligned_u64 jited_prog_insns;
	__aligned_u64 xlated_prog_insns;
	__u64 load_time;	/* ns since boottime */
	__u32 created_by_uid;
	__u32 nr_map_ids;
	__aligned_u64 map_ids;
	char name[BPF_OBJ_NAME_LEN];
	__u32 ifindex;
	__u32 gpl_compatible:1;
	__u64 netns_dev;
	__u64 netns_ino;
	__u32 nr_jited_ksyms;
	__u32 nr_jited_func_lens;
	__aligned_u64 jited_ksyms;
	__aligned_u64 jited_func_lens;
} __attribute__((aligned(8)));

struct bpf_map_info {
	__u32 type;
	__u32 id;
	__u32 key_size;
	__u32 value_size;
	__u32 max_entries;
	__u32 map_flags;
	char  name[BPF_OBJ_NAME_LEN];
} __attribute__((aligned(8)));

struct bpf_perf_event_value {
	__u64 counter;
	__u64 enabled;
	__u64 running;
};

#endif /* __LINUX_BPF_H__ */

Filemanager

Name Type Size Permission Actions
byteorder Folder 0755
caif Folder 0755
can Folder 0755
dvb Folder 0755
hdlc Folder 0755
hsi Folder 0755
iio Folder 0755
isdn Folder 0755
mmc Folder 0755
netfilter Folder 0755
netfilter_arp Folder 0755
netfilter_bridge Folder 0755
netfilter_ipv4 Folder 0755
netfilter_ipv6 Folder 0755
nfsd Folder 0755
raid Folder 0755
spi Folder 0755
sunrpc Folder 0755
tc_act Folder 0755
tc_ematch Folder 0755
usb Folder 0755
wimax Folder 0755
a.out.h File 7.15 KB 0644
acct.h File 3.58 KB 0644
adb.h File 1.05 KB 0644
adfs_fs.h File 873 B 0644
affs_hardblocks.h File 1.45 KB 0644
agpgart.h File 3.83 KB 0644
aio_abi.h File 3.1 KB 0644
apm_bios.h File 3.46 KB 0644
arcfb.h File 150 B 0644
atalk.h File 960 B 0644
atm.h File 7.64 KB 0644
atm_eni.h File 585 B 0644
atm_he.h File 343 B 0644
atm_idt77105.h File 892 B 0644
atm_nicstar.h File 1.19 KB 0644
atm_tcp.h File 1.52 KB 0644
atm_zatm.h File 1.57 KB 0644
atmapi.h File 889 B 0644
atmarp.h File 1.2 KB 0644
atmbr2684.h File 3.13 KB 0644
atmclip.h File 513 B 0644
atmdev.h File 7.44 KB 0644
atmioc.h File 1.55 KB 0644
atmlec.h File 2.26 KB 0644
atmmpc.h File 4.07 KB 0644
atmppp.h File 576 B 0644
atmsap.h File 4.79 KB 0644
atmsvc.h File 1.75 KB 0644
audit.h File 18.03 KB 0644
auto_fs.h File 2.53 KB 0644
auto_fs4.h File 4.3 KB 0644
auxvec.h File 1.4 KB 0644
ax25.h File 2.7 KB 0644
b1lli.h File 1.62 KB 0644
baycom.h File 820 B 0644
bfs_fs.h File 1.79 KB 0644
binfmts.h File 565 B 0644
blkpg.h File 1.53 KB 0644
blktrace_api.h File 4.38 KB 0644
bpf.h File 22.04 KB 0644
bpf_common.h File 1.2 KB 0644
bpf_perf_event.h File 453 B 0644
bpqether.h File 952 B 0644
bsg.h File 2.37 KB 0644
bt-bmc.h File 508 B 0644
btrfs.h File 25.07 KB 0644
can.h File 5.46 KB 0644
capability.h File 11.25 KB 0644
capi.h File 2.99 KB 0644
cciss_defs.h File 3.14 KB 0644
cciss_ioctl.h File 2.63 KB 0644
cdrom.h File 28.12 KB 0644
cgroupstats.h File 2.1 KB 0644
chio.h File 5.16 KB 0644
cm4000_cs.h File 1.68 KB 0644
cn_proc.h File 3.19 KB 0644
coda.h File 17.09 KB 0644
coda_psdev.h File 720 B 0644
coff.h File 12.12 KB 0644
connector.h File 2.14 KB 0644
const.h File 673 B 0644
cramfs_fs.h File 2.68 KB 0644
cuda.h File 842 B 0644
cyclades.h File 16.65 KB 0644
cycx_cfm.h File 2.86 KB 0644
dcbnl.h File 24.5 KB 0644
dccp.h File 6.22 KB 0644
devlink.h File 9.66 KB 0644
dlm.h File 2.43 KB 0644
dlm_device.h File 2.42 KB 0644
dlm_netlink.h File 1.04 KB 0644
dlm_plock.h File 831 B 0644
dlmconstants.h File 4.9 KB 0644
dm-ioctl.h File 10.55 KB 0644
dm-log-userspace.h File 14.82 KB 0644
dn.h File 4.42 KB 0644
dqblk_xfs.h File 8.72 KB 0644
edd.h File 5.41 KB 0644
efs_fs_sb.h File 2.11 KB 0644
elf-em.h File 1.83 KB 0644
elf-fdpic.h File 1.04 KB 0644
elf.h File 12.69 KB 0644
elfcore.h File 2.86 KB 0644
errno.h File 23 B 0644
errqueue.h File 1.1 KB 0644
ethtool.h File 71.11 KB 0644
eventpoll.h File 1.76 KB 0644
fadvise.h File 779 B 0644
falloc.h File 2.72 KB 0644
fanotify.h File 3.52 KB 0644
fb.h File 16 KB 0644
fcntl.h File 2.16 KB 0644
fd.h File 11.31 KB 0644
fdreg.h File 5.23 KB 0644
fib_rules.h File 1.58 KB 0644
fiemap.h File 2.65 KB 0644
filter.h File 1.99 KB 0644
firewire-cdev.h File 42.86 KB 0644
firewire-constants.h File 3.16 KB 0644
flat.h File 2.04 KB 0644
fou.h File 617 B 0644
fs.h File 8.47 KB 0644
fsl_hypervisor.h File 7.05 KB 0644
fuse.h File 16.41 KB 0644
futex.h File 4.81 KB 0644
gameport.h File 834 B 0644
gen_stats.h File 1.5 KB 0644
genetlink.h File 1.82 KB 0644
gfs2_ondisk.h File 12 KB 0644
gigaset_dev.h File 1.35 KB 0644
hdlc.h File 574 B 0644
hdlcdrv.h File 2.78 KB 0644
hdreg.h File 22.11 KB 0644
hid.h File 1.79 KB 0644
hiddev.h File 6.13 KB 0644
hidraw.h File 1.41 KB 0644
hpet.h File 680 B 0644
hw_breakpoint.h File 679 B 0644
hyperv.h File 10.22 KB 0644
hysdn_if.h File 1.29 KB 0644
i2c-dev.h File 2.37 KB 0644
i2c.h File 6.66 KB 0644
i2o-dev.h File 11.22 KB 0644
i8k.h File 1.4 KB 0644
icmp.h File 2.82 KB 0644
icmpv6.h File 3.82 KB 0644
if.h File 9.26 KB 0644
if_addr.h File 1.7 KB 0644
if_addrlabel.h File 658 B 0644
if_alg.h File 816 B 0644
if_arcnet.h File 3.63 KB 0644
if_arp.h File 6.3 KB 0644
if_bonding.h File 4.66 KB 0644
if_bridge.h File 6.46 KB 0644
if_cablemodem.h File 922 B 0644
if_eql.h File 1.26 KB 0644
if_ether.h File 7.25 KB 0644
if_fc.h File 1.63 KB 0644
if_fddi.h File 3.6 KB 0644
if_frad.h File 2.89 KB 0644
if_hippi.h File 4.07 KB 0644
if_infiniband.h File 1.13 KB 0644
if_link.h File 19.58 KB 0644
if_ltalk.h File 147 B 0644
if_macsec.h File 5.42 KB 0644
if_packet.h File 7.15 KB 0644
if_phonet.h File 361 B 0644
if_plip.h File 596 B 0644
if_ppp.h File 29 B 0644
if_pppol2tp.h File 3.18 KB 0644
if_pppox.h File 4.64 KB 0644
if_slip.h File 809 B 0644
if_team.h File 2.48 KB 0644
if_tun.h File 3.71 KB 0644
if_tunnel.h File 3.03 KB 0644
if_vlan.h File 1.69 KB 0644
if_x25.h File 817 B 0644
ife.h File 288 B 0644
igmp.h File 2.88 KB 0644
in.h File 9.36 KB 0644
in6.h File 6.97 KB 0644
in_route.h File 873 B 0644
inet_diag.h File 2.77 KB 0644
inotify.h File 2.85 KB 0644
input.h File 32.52 KB 0644
ioctl.h File 100 B 0644
ip.h File 3.47 KB 0644
ip6_tunnel.h File 1.67 KB 0644
ip_vs.h File 12.77 KB 0644
ipc.h File 1.99 KB 0644
ipmi.h File 14.63 KB 0644
ipmi_msgdefs.h File 3.21 KB 0644
ipsec.h File 884 B 0644
ipv6.h File 3.66 KB 0644
ipv6_route.h File 1.73 KB 0644
ipx.h File 1.79 KB 0644
irda.h File 7.31 KB 0644
irqnr.h File 104 B 0644
isdn.h File 5.58 KB 0644
isdn_divertif.h File 1.11 KB 0644
isdn_ppp.h File 1.82 KB 0644
isdnif.h File 2.25 KB 0644
iso_fs.h File 6.29 KB 0644
ivtv.h File 2.89 KB 0644
ivtvfb.h File 1.12 KB 0644
ixjuser.h File 24.53 KB 0644
jffs2.h File 6.85 KB 0644
joystick.h File 3.5 KB 0644
kd.h File 6.04 KB 0644
kdev_t.h File 320 B 0644
kernel-page-flags.h File 788 B 0644
kernel.h File 375 B 0644
kernelcapi.h File 956 B 0644
kexec.h File 1.92 KB 0644
keyboard.h File 12.42 KB 0644
keyctl.h File 2.98 KB 0644
kvm.h File 33.89 KB 0644
kvm_para.h File 819 B 0644
l2tp.h File 4.98 KB 0644
libc-compat.h File 4.03 KB 0644
limits.h File 874 B 0644
llc.h File 2.98 KB 0644
loop.h File 2.31 KB 0644
lp.h File 3.72 KB 0644
lwtunnel.h File 839 B 0644
magic.h File 2.9 KB 0644
major.h File 4.48 KB 0644
map_to_7segment.h File 7.02 KB 0644
matroxfb.h File 1.37 KB 0644
mdio.h File 13.74 KB 0644
media.h File 3.5 KB 0644
mei.h File 4.62 KB 0644
membarrier.h File 7.71 KB 0644
memfd.h File 186 B 0644
mempolicy.h File 2.35 KB 0644
meye.h File 2.41 KB 0644
mii.h File 7.76 KB 0644
minix_fs.h File 2.01 KB 0644
mman.h File 230 B 0644
mmtimer.h File 2.01 KB 0644
mpls.h File 1.33 KB 0644
mqueue.h File 2.01 KB 0644
mroute.h File 4.06 KB 0644
mroute6.h File 4.08 KB 0644
msdos_fs.h File 6.28 KB 0644
msg.h File 3.21 KB 0644
mtio.h File 7.92 KB 0644
n_r3964.h File 2.29 KB 0644
nbd.h File 2.34 KB 0644
ncp.h File 4.94 KB 0644
ncp_fs.h File 3.27 KB 0644
ncp_mount.h File 2.06 KB 0644
ncp_no.h File 651 B 0644
ndctl.h File 6.6 KB 0644
neighbour.h File 4.17 KB 0644
net.h File 1.97 KB 0644
net_dropmon.h File 1.07 KB 0644
net_namespace.h File 609 B 0644
net_tstamp.h File 4.06 KB 0644
netconf.h File 423 B 0644
netdevice.h File 1.46 KB 0644
netfilter.h File 1.6 KB 0644
netfilter_arp.h File 380 B 0644
netfilter_bridge.h File 768 B 0644
netfilter_decnet.h File 1.83 KB 0644
netfilter_ipv4.h File 2.02 KB 0644
netfilter_ipv6.h File 2.04 KB 0644
netlink.h File 6.13 KB 0644
netlink_diag.h File 1005 B 0644
netrom.h File 744 B 0644
nfc.h File 7.72 KB 0644
nfs.h File 4.31 KB 0644
nfs2.h File 1.37 KB 0644
nfs3.h File 2.24 KB 0644
nfs4.h File 5.95 KB 0644
nfs4_mount.h File 1.83 KB 0644
nfs_fs.h File 1.51 KB 0644
nfs_idmap.h File 2.19 KB 0644
nfs_mount.h File 2.32 KB 0644
nfsacl.h File 605 B 0644
nl80211.h File 270.89 KB 0644
nubus.h File 8.17 KB 0644
nvme_ioctl.h File 1.55 KB 0644
nvram.h File 469 B 0644
omap3isp.h File 20.19 KB 0644
omapfb.h File 5.72 KB 0644
oom.h File 448 B 0644
openvswitch.h File 31.79 KB 0644
packet_diag.h File 1.5 KB 0644
param.h File 78 B 0644
parport.h File 3.56 KB 0644
patchkey.h File 829 B 0644
pci.h File 1.29 KB 0644
pci_regs.h File 50.79 KB 0644
perf_event.h File 31.96 KB 0644
personality.h File 1.99 KB 0644
pfkeyv2.h File 9.91 KB 0644
pg.h File 2.23 KB 0644
phantom.h File 1.55 KB 0644
phonet.h File 4.51 KB 0644
pkt_cls.h File 12.49 KB 0644
pkt_sched.h File 20.63 KB 0644
pktcdvd.h File 2.56 KB 0644
pmu.h File 5.13 KB 0644
poll.h File 22 B 0644
posix_types.h File 1.01 KB 0644
ppdev.h File 3.07 KB 0644
ppp-comp.h File 2.41 KB 0644
ppp-ioctl.h File 5.29 KB 0644
ppp_defs.h File 4.93 KB 0644
pps.h File 4.06 KB 0644
prctl.h File 6.75 KB 0644
psample.h File 735 B 0644
ptp_clock.h File 5.09 KB 0644
ptrace.h File 3.08 KB 0644
qnx4_fs.h File 2.21 KB 0644
qnxtypes.h File 561 B 0644
quota.h File 5.78 KB 0644
radeonfb.h File 297 B 0644
random.h File 1.2 KB 0644
raw.h File 302 B 0644
rds.h File 7.9 KB 0644
reboot.h File 1.25 KB 0644
reiserfs_fs.h File 712 B 0644
reiserfs_xattr.h File 470 B 0644
resource.h File 2.09 KB 0644
rfkill.h File 3.5 KB 0644
romfs_fs.h File 1.15 KB 0644
rose.h File 2.12 KB 0644
route.h File 2.21 KB 0644
rtc.h File 3.85 KB 0644
rtnetlink.h File 17.02 KB 0644
scc.h File 4.43 KB 0644
sched.h File 2.26 KB 0644
screen_info.h File 2.36 KB 0644
sctp.h File 29.53 KB 0644
sdla.h File 2.71 KB 0644
seccomp.h File 1.83 KB 0644
securebits.h File 2.58 KB 0644
selinux_netlink.h File 1.11 KB 0644
sem.h File 2.54 KB 0644
serial.h File 3.04 KB 0644
serial_core.h File 5.11 KB 0644
serial_reg.h File 15.66 KB 0644
serio.h File 1.81 KB 0644
shm.h File 2.19 KB 0644
signal.h File 171 B 0644
signalfd.h File 1.07 KB 0644
snmp.h File 12.42 KB 0644
sock_diag.h File 431 B 0644
socket.h File 738 B 0644
sockios.h File 5.83 KB 0644
som.h File 5.35 KB 0644
sonet.h File 2.17 KB 0644
sonypi.h File 5.12 KB 0644
sound.h File 1.15 KB 0644
soundcard.h File 44.96 KB 0644
stat.h File 1 KB 0644
stddef.h File 1 B 0644
string.h File 175 B 0644
suspend_ioctls.h File 1.34 KB 0644
swab.h File 6.36 KB 0644
synclink.h File 8.71 KB 0644
sysctl.h File 25.46 KB 0644
sysinfo.h File 986 B 0644
target_core_user.h File 3.65 KB 0644
taskstats.h File 6.83 KB 0644
tcp.h File 5.93 KB 0644
tcp_metrics.h File 1.45 KB 0644
telephony.h File 8.84 KB 0644
termios.h File 443 B 0644
time.h File 1.54 KB 0644
times.h File 215 B 0644
timex.h File 6.17 KB 0644
tiocl.h File 1.63 KB 0644
tipc.h File 5.44 KB 0644
tipc_config.h File 14.1 KB 0644
toshiba.h File 1.24 KB 0644
tty.h File 1.33 KB 0644
tty_flags.h File 3.66 KB 0644
types.h File 1.4 KB 0644
udf_fs_i.h File 634 B 0644
udp.h File 1.28 KB 0644
uhid.h File 2.15 KB 0644
uinput.h File 5 KB 0644
uio.h File 668 B 0644
ultrasound.h File 4.39 KB 0644
un.h File 239 B 0644
unistd.h File 157 B 0644
unix_diag.h File 1.1 KB 0644
usbdevice_fs.h File 6.78 KB 0644
userfaultfd.h File 6.59 KB 0644
utime.h File 152 B 0644
utsname.h File 606 B 0644
uuid.h File 1.5 KB 0644
uvcvideo.h File 1.6 KB 0644
v4l2-common.h File 2.38 KB 0644
v4l2-controls.h File 37.34 KB 0644
v4l2-dv-timings.h File 25.75 KB 0644
v4l2-mediabus.h File 4.55 KB 0644
v4l2-subdev.h File 5.27 KB 0644
version.h File 332 B 0644
veth.h File 161 B 0644
vfio.h File 26.54 KB 0644
vhost.h File 7.13 KB 0644
videodev2.h File 67.36 KB 0644
virtio_9p.h File 1.99 KB 0644
virtio_balloon.h File 3.71 KB 0644
virtio_blk.h File 5.2 KB 0644
virtio_config.h File 3.34 KB 0644
virtio_console.h File 2.94 KB 0644
virtio_gpu.h File 8.23 KB 0644
virtio_ids.h File 2.32 KB 0644
virtio_input.h File 2.45 KB 0644
virtio_net.h File 9.5 KB 0644
virtio_pci.h File 6.63 KB 0644
virtio_ring.h File 6.18 KB 0644
virtio_rng.h File 265 B 0644
virtio_scsi.h File 5.13 KB 0644
virtio_types.h File 2.11 KB 0644
virtio_vsock.h File 3.01 KB 0644
vm_sockets.h File 5.13 KB 0644
vsockmon.h File 1.78 KB 0644
vt.h File 2.98 KB 0644
vtpm_proxy.h File 1.62 KB 0644
wait.h File 600 B 0644
wanrouter.h File 390 B 0644
watchdog.h File 2.22 KB 0644
wimax.h File 8.17 KB 0644
wireless.h File 41.65 KB 0644
wmi.h File 1.84 KB 0644
x25.h File 3.42 KB 0644
xattr.h File 2.53 KB 0644
xfrm.h File 11 KB 0644