summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 08:24:23 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 08:24:23 +0000
commit67c27783d7735af6ba22b9f031d97ca4ea56c29c (patch)
tree17770fad3c90bf420cb2470e6e51255fcbf31bf9
parentInitial commit. (diff)
downloadlibbpf-67c27783d7735af6ba22b9f031d97ca4ea56c29c.tar.xz
libbpf-67c27783d7735af6ba22b9f031d97ca4ea56c29c.zip
Adding upstream version 1.1.0.upstream/1.1.0upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
-rw-r--r--.github/actions/build-selftests/action.yml31
-rwxr-xr-x.github/actions/build-selftests/build_selftests.sh42
-rw-r--r--.github/actions/build-selftests/helpers.sh38
-rwxr-xr-x.github/actions/build-selftests/prepare_selftests-4.9.0.sh3
-rwxr-xr-x.github/actions/build-selftests/prepare_selftests-5.5.0.sh3
-rw-r--r--.github/actions/build-selftests/vmlinux.h98350
-rw-r--r--.github/actions/debian/action.yml16
-rw-r--r--.github/actions/setup/action.yml23
-rw-r--r--.github/actions/vmtest/action.yml99
-rw-r--r--.github/workflows/build.yml91
-rw-r--r--.github/workflows/cifuzz.yml40
-rw-r--r--.github/workflows/codeql.yml52
-rw-r--r--.github/workflows/coverity.yml32
-rw-r--r--.github/workflows/lint.yml19
-rw-r--r--.github/workflows/ondemand.yml36
-rw-r--r--.github/workflows/pahole.yml20
-rw-r--r--.github/workflows/test.yml42
-rw-r--r--.readthedocs.yaml22
-rw-r--r--BPF-CHECKPOINT-COMMIT1
-rw-r--r--CHECKPOINT-COMMIT1
-rw-r--r--LICENSE1
-rw-r--r--LICENSE.BSD-2-Clause32
-rw-r--r--LICENSE.LGPL-2.1503
-rw-r--r--README.md189
-rw-r--r--assets/libbpf-logo-compact-darkbg.pngbin0 -> 268011 bytes
-rw-r--r--assets/libbpf-logo-compact-mono.pngbin0 -> 131070 bytes
-rw-r--r--assets/libbpf-logo-compact.pngbin0 -> 118800 bytes
-rw-r--r--assets/libbpf-logo-sideways-darkbg.pngbin0 -> 290338 bytes
-rw-r--r--assets/libbpf-logo-sideways-mono.pngbin0 -> 145493 bytes
-rw-r--r--assets/libbpf-logo-sideways.pngbin0 -> 143605 bytes
-rw-r--r--assets/libbpf-logo-sparse-darkbg.pngbin0 -> 359945 bytes
-rw-r--r--assets/libbpf-logo-sparse-mono.pngbin0 -> 210481 bytes
-rw-r--r--assets/libbpf-logo-sparse.pngbin0 -> 241118 bytes
-rw-r--r--ci/diffs/.keep0
-rwxr-xr-xci/managers/debian.sh95
-rwxr-xr-xci/managers/test_compile.sh15
-rw-r--r--ci/managers/travis_wait.bash61
-rwxr-xr-xci/managers/ubuntu.sh24
-rw-r--r--ci/vmtest/configs/ALLOWLIST-4.9.08
-rw-r--r--ci/vmtest/configs/ALLOWLIST-5.5.055
-rw-r--r--ci/vmtest/configs/DENYLIST-5.5.0118
-rw-r--r--ci/vmtest/configs/DENYLIST-latest0
-rw-r--r--ci/vmtest/configs/DENYLIST-latest.s390x3
-rwxr-xr-xci/vmtest/helpers.sh38
-rwxr-xr-xci/vmtest/run_selftests.sh87
-rw-r--r--docs/.gitignore2
-rw-r--r--docs/api.rst93
-rw-r--r--docs/conf.py40
-rw-r--r--docs/index.rst24
-rw-r--r--docs/libbpf_build.rst37
-rw-r--r--docs/libbpf_naming_convention.rst193
-rw-r--r--docs/program_types.rst203
-rw-r--r--docs/sphinx/Makefile9
-rw-r--r--docs/sphinx/doxygen/Doxyfile277
-rw-r--r--docs/sphinx/requirements.txt1
-rw-r--r--fuzz/bpf-object-fuzzer.c23
-rw-r--r--fuzz/bpf-object-fuzzer_seed_corpus.zipbin0 -> 1091 bytes
-rw-r--r--include/asm/barrier.h7
-rw-r--r--include/linux/compiler.h70
-rw-r--r--include/linux/err.h38
-rw-r--r--include/linux/filter.h134
-rw-r--r--include/linux/kernel.h44
-rw-r--r--include/linux/list.h91
-rw-r--r--include/linux/overflow.h90
-rw-r--r--include/linux/ring_buffer.h18
-rw-r--r--include/linux/types.h33
-rw-r--r--include/uapi/linux/bpf.h7057
-rw-r--r--include/uapi/linux/bpf_common.h57
-rw-r--r--include/uapi/linux/btf.h200
-rw-r--r--include/uapi/linux/fcntl.h114
-rw-r--r--include/uapi/linux/if_link.h1283
-rw-r--r--include/uapi/linux/if_xdp.h111
-rw-r--r--include/uapi/linux/netlink.h252
-rw-r--r--include/uapi/linux/perf_event.h1445
-rw-r--r--include/uapi/linux/pkt_cls.h612
-rw-r--r--include/uapi/linux/pkt_sched.h1164
-rwxr-xr-xscripts/build-fuzzers.sh81
-rwxr-xr-xscripts/coverity.sh105
-rwxr-xr-xscripts/sync-kernel.sh353
-rw-r--r--src/.gitignore6
-rw-r--r--src/Makefile183
-rw-r--r--src/bpf.c1165
-rw-r--r--src/bpf.h461
-rw-r--r--src/bpf_core_read.h484
-rw-r--r--src/bpf_endian.h99
-rw-r--r--src/bpf_gen_internal.h72
-rw-r--r--src/bpf_helper_defs.h4718
-rw-r--r--src/bpf_helpers.h289
-rw-r--r--src/bpf_prog_linfo.c246
-rw-r--r--src/bpf_tracing.h670
-rw-r--r--src/btf.c5027
-rw-r--r--src/btf.h575
-rw-r--r--src/btf_dump.c2526
-rw-r--r--src/gen_loader.c1121
-rw-r--r--src/hashmap.c240
-rw-r--r--src/hashmap.h218
-rw-r--r--src/libbpf.c12490
-rw-r--r--src/libbpf.h1529
-rw-r--r--src/libbpf.map384
-rw-r--r--src/libbpf.pc.template12
-rw-r--r--src/libbpf_common.h73
-rw-r--r--src/libbpf_errno.c75
-rw-r--r--src/libbpf_internal.h579
-rw-r--r--src/libbpf_legacy.h140
-rw-r--r--src/libbpf_probes.c364
-rw-r--r--src/libbpf_version.h9
-rw-r--r--src/linker.c2900
-rw-r--r--src/netlink.c813
-rw-r--r--src/nlattr.c195
-rw-r--r--src/nlattr.h164
-rw-r--r--src/relo_core.c1690
-rw-r--r--src/relo_core.h99
-rw-r--r--src/ringbuf.c587
-rw-r--r--src/skel_internal.h374
-rw-r--r--src/str_error.c21
-rw-r--r--src/str_error.h6
-rw-r--r--src/strset.c177
-rw-r--r--src/strset.h21
-rw-r--r--src/usdt.bpf.h247
-rw-r--r--src/usdt.c1516
120 files changed, 157016 insertions, 0 deletions
diff --git a/.github/actions/build-selftests/action.yml b/.github/actions/build-selftests/action.yml
new file mode 100644
index 0000000..c677fe0
--- /dev/null
+++ b/.github/actions/build-selftests/action.yml
@@ -0,0 +1,31 @@
+name: 'build-selftests'
+description: 'Build BPF selftests'
+inputs:
+ repo-path:
+ description: 'where is the source code'
+ required: true
+ kernel:
+ description: 'kernel version or LATEST'
+ required: true
+ default: 'LATEST'
+ vmlinux:
+ description: 'where is vmlinux file'
+ required: true
+ default: '${{ github.workspace }}/vmlinux'
+
+runs:
+ using: "composite"
+ steps:
+ - shell: bash
+ run: |
+ source $GITHUB_ACTION_PATH/../../../ci/vmtest/helpers.sh
+ foldable start "Setup Env"
+ sudo apt-get install -y qemu-kvm zstd binutils-dev elfutils libcap-dev libelf-dev libdw-dev python3-docutils
+ foldable end
+ - shell: bash
+ run: |
+ export KERNEL=${{ inputs.kernel }}
+ export REPO_ROOT="${{ github.workspace }}"
+ export REPO_PATH="${{ inputs.repo-path }}"
+ export VMLINUX_BTF="${{ inputs.vmlinux }}"
+ ${{ github.action_path }}/build_selftests.sh
diff --git a/.github/actions/build-selftests/build_selftests.sh b/.github/actions/build-selftests/build_selftests.sh
new file mode 100755
index 0000000..0da1373
--- /dev/null
+++ b/.github/actions/build-selftests/build_selftests.sh
@@ -0,0 +1,42 @@
+#!/bin/bash
+
+set -euo pipefail
+
+THISDIR="$(cd $(dirname $0) && pwd)"
+
+source ${THISDIR}/helpers.sh
+
+foldable start prepare_selftests "Building selftests"
+
+LLVM_VER=16
+LIBBPF_PATH="${REPO_ROOT}"
+
+PREPARE_SELFTESTS_SCRIPT=${THISDIR}/prepare_selftests-${KERNEL}.sh
+if [ -f "${PREPARE_SELFTESTS_SCRIPT}" ]; then
+ (cd "${REPO_ROOT}/${REPO_PATH}/tools/testing/selftests/bpf" && ${PREPARE_SELFTESTS_SCRIPT})
+fi
+
+if [[ "${KERNEL}" = 'LATEST' ]]; then
+ VMLINUX_H=
+else
+ VMLINUX_H=${THISDIR}/vmlinux.h
+fi
+
+cd ${REPO_ROOT}/${REPO_PATH}
+make \
+ CLANG=clang-${LLVM_VER} \
+ LLC=llc-${LLVM_VER} \
+ LLVM_STRIP=llvm-strip-${LLVM_VER} \
+ VMLINUX_BTF="${VMLINUX_BTF}" \
+ VMLINUX_H=${VMLINUX_H} \
+ -C "${REPO_ROOT}/${REPO_PATH}/tools/testing/selftests/bpf" \
+ -j $((4*$(nproc))) > /dev/null
+cd -
+mkdir ${LIBBPF_PATH}/selftests
+cp -R "${REPO_ROOT}/${REPO_PATH}/tools/testing/selftests/bpf" \
+ ${LIBBPF_PATH}/selftests
+cd ${LIBBPF_PATH}
+rm selftests/bpf/.gitignore
+git add selftests
+
+foldable end prepare_selftests
diff --git a/.github/actions/build-selftests/helpers.sh b/.github/actions/build-selftests/helpers.sh
new file mode 100644
index 0000000..c44d098
--- /dev/null
+++ b/.github/actions/build-selftests/helpers.sh
@@ -0,0 +1,38 @@
+# shellcheck shell=bash
+
+# $1 - start or end
+# $2 - fold identifier, no spaces
+# $3 - fold section description
+foldable() {
+ local YELLOW='\033[1;33m'
+ local NOCOLOR='\033[0m'
+ if [ $1 = "start" ]; then
+ line="::group::$2"
+ if [ ! -z "${3:-}" ]; then
+ line="$line - ${YELLOW}$3${NOCOLOR}"
+ fi
+ else
+ line="::endgroup::"
+ fi
+ echo -e "$line"
+}
+
+__print() {
+ local TITLE=""
+ if [[ -n $2 ]]; then
+ TITLE=" title=$2"
+ fi
+ echo "::$1${TITLE}::$3"
+}
+
+# $1 - title
+# $2 - message
+print_error() {
+ __print error $1 $2
+}
+
+# $1 - title
+# $2 - message
+print_notice() {
+ __print notice $1 $2
+}
diff --git a/.github/actions/build-selftests/prepare_selftests-4.9.0.sh b/.github/actions/build-selftests/prepare_selftests-4.9.0.sh
new file mode 100755
index 0000000..cb55552
--- /dev/null
+++ b/.github/actions/build-selftests/prepare_selftests-4.9.0.sh
@@ -0,0 +1,3 @@
+#!/bin/bash
+
+printf "all:\n\ttouch bpf_testmod.ko\n\nclean:\n" > bpf_testmod/Makefile
diff --git a/.github/actions/build-selftests/prepare_selftests-5.5.0.sh b/.github/actions/build-selftests/prepare_selftests-5.5.0.sh
new file mode 100755
index 0000000..cb55552
--- /dev/null
+++ b/.github/actions/build-selftests/prepare_selftests-5.5.0.sh
@@ -0,0 +1,3 @@
+#!/bin/bash
+
+printf "all:\n\ttouch bpf_testmod.ko\n\nclean:\n" > bpf_testmod/Makefile
diff --git a/.github/actions/build-selftests/vmlinux.h b/.github/actions/build-selftests/vmlinux.h
new file mode 100644
index 0000000..a93de28
--- /dev/null
+++ b/.github/actions/build-selftests/vmlinux.h
@@ -0,0 +1,98350 @@
+#ifndef __VMLINUX_H__
+#define __VMLINUX_H__
+
+#ifndef BPF_NO_PRESERVE_ACCESS_INDEX
+#pragma clang attribute push (__attribute__((preserve_access_index)), apply_to = record)
+#endif
+
+typedef signed char __s8;
+
+typedef unsigned char __u8;
+
+typedef short int __s16;
+
+typedef short unsigned int __u16;
+
+typedef int __s32;
+
+typedef unsigned int __u32;
+
+typedef long long int __s64;
+
+typedef long long unsigned int __u64;
+
+typedef __s8 s8;
+
+typedef __u8 u8;
+
+typedef __s16 s16;
+
+typedef __u16 u16;
+
+typedef __s32 s32;
+
+typedef __u32 u32;
+
+typedef __s64 s64;
+
+typedef __u64 u64;
+
+enum {
+ false = 0,
+ true = 1,
+};
+
+typedef long int __kernel_long_t;
+
+typedef long unsigned int __kernel_ulong_t;
+
+typedef int __kernel_pid_t;
+
+typedef unsigned int __kernel_uid32_t;
+
+typedef unsigned int __kernel_gid32_t;
+
+typedef __kernel_ulong_t __kernel_size_t;
+
+typedef __kernel_long_t __kernel_ssize_t;
+
+typedef long long int __kernel_loff_t;
+
+typedef long long int __kernel_time64_t;
+
+typedef __kernel_long_t __kernel_clock_t;
+
+typedef int __kernel_timer_t;
+
+typedef int __kernel_clockid_t;
+
+typedef unsigned int __poll_t;
+
+typedef u32 __kernel_dev_t;
+
+typedef __kernel_dev_t dev_t;
+
+typedef short unsigned int umode_t;
+
+typedef __kernel_pid_t pid_t;
+
+typedef __kernel_clockid_t clockid_t;
+
+typedef _Bool bool;
+
+typedef __kernel_uid32_t uid_t;
+
+typedef __kernel_gid32_t gid_t;
+
+typedef __kernel_loff_t loff_t;
+
+typedef __kernel_size_t size_t;
+
+typedef __kernel_ssize_t ssize_t;
+
+typedef s32 int32_t;
+
+typedef u32 uint32_t;
+
+typedef u64 sector_t;
+
+typedef u64 blkcnt_t;
+
+typedef unsigned int gfp_t;
+
+typedef unsigned int fmode_t;
+
+typedef u64 phys_addr_t;
+
+typedef struct {
+ int counter;
+} atomic_t;
+
+typedef struct {
+ s64 counter;
+} atomic64_t;
+
+struct list_head {
+ struct list_head *next;
+ struct list_head *prev;
+};
+
+struct hlist_node;
+
+struct hlist_head {
+ struct hlist_node *first;
+};
+
+struct hlist_node {
+ struct hlist_node *next;
+ struct hlist_node **pprev;
+};
+
+struct callback_head {
+ struct callback_head *next;
+ void (*func)(struct callback_head *);
+};
+
+struct kernel_symbol {
+ int value_offset;
+ int name_offset;
+ int namespace_offset;
+};
+
+struct lockdep_subclass_key {
+ char __one_byte;
+};
+
+struct lock_class_key {
+ union {
+ struct hlist_node hash_entry;
+ struct lockdep_subclass_key subkeys[8];
+ };
+};
+
+struct fs_context;
+
+struct fs_parameter_spec;
+
+struct dentry;
+
+struct super_block;
+
+struct module;
+
+struct file_system_type {
+ const char *name;
+ int fs_flags;
+ int (*init_fs_context)(struct fs_context *);
+ const struct fs_parameter_spec *parameters;
+ struct dentry * (*mount)(struct file_system_type *, int, const char *, void *);
+ void (*kill_sb)(struct super_block *);
+ struct module *owner;
+ struct file_system_type *next;
+ struct hlist_head fs_supers;
+ struct lock_class_key s_lock_key;
+ struct lock_class_key s_umount_key;
+ struct lock_class_key s_vfs_rename_key;
+ struct lock_class_key s_writers_key[3];
+ struct lock_class_key i_lock_key;
+ struct lock_class_key i_mutex_key;
+ struct lock_class_key invalidate_lock_key;
+ struct lock_class_key i_mutex_dir_key;
+};
+
+struct qspinlock {
+ union {
+ atomic_t val;
+ struct {
+ u8 locked;
+ u8 pending;
+ };
+ struct {
+ u16 locked_pending;
+ u16 tail;
+ };
+ };
+};
+
+typedef struct qspinlock arch_spinlock_t;
+
+struct qrwlock {
+ union {
+ atomic_t cnts;
+ struct {
+ u8 wlocked;
+ u8 __lstate[3];
+ };
+ };
+ arch_spinlock_t wait_lock;
+};
+
+typedef struct qrwlock arch_rwlock_t;
+
+struct lock_trace;
+
+struct lock_class {
+ struct hlist_node hash_entry;
+ struct list_head lock_entry;
+ struct list_head locks_after;
+ struct list_head locks_before;
+ const struct lockdep_subclass_key *key;
+ unsigned int subclass;
+ unsigned int dep_gen_id;
+ long unsigned int usage_mask;
+ const struct lock_trace *usage_traces[10];
+ int name_version;
+ const char *name;
+ u8 wait_type_inner;
+ u8 wait_type_outer;
+ u8 lock_type;
+};
+
+struct lock_trace {
+ struct hlist_node hash_entry;
+ u32 hash;
+ u32 nr_entries;
+ long unsigned int entries[0];
+};
+
+struct lockdep_map {
+ struct lock_class_key *key;
+ struct lock_class *class_cache[2];
+ const char *name;
+ u8 wait_type_outer;
+ u8 wait_type_inner;
+ u8 lock_type;
+};
+
+struct raw_spinlock {
+ arch_spinlock_t raw_lock;
+ unsigned int magic;
+ unsigned int owner_cpu;
+ void *owner;
+ struct lockdep_map dep_map;
+};
+
+typedef struct raw_spinlock raw_spinlock_t;
+
+struct ratelimit_state {
+ raw_spinlock_t lock;
+ int interval;
+ int burst;
+ int printed;
+ int missed;
+ long unsigned int begin;
+ long unsigned int flags;
+};
+
+typedef void *fl_owner_t;
+
+struct file;
+
+struct kiocb;
+
+struct iov_iter;
+
+struct io_comp_batch;
+
+struct dir_context;
+
+struct poll_table_struct;
+
+struct vm_area_struct;
+
+struct inode;
+
+struct file_lock;
+
+struct page;
+
+struct pipe_inode_info;
+
+struct seq_file;
+
+struct io_uring_cmd;
+
+struct file_operations {
+ struct module *owner;
+ loff_t (*llseek)(struct file *, loff_t, int);
+ ssize_t (*read)(struct file *, char *, size_t, loff_t *);
+ ssize_t (*write)(struct file *, const char *, size_t, loff_t *);
+ ssize_t (*read_iter)(struct kiocb *, struct iov_iter *);
+ ssize_t (*write_iter)(struct kiocb *, struct iov_iter *);
+ int (*iopoll)(struct kiocb *, struct io_comp_batch *, unsigned int);
+ int (*iterate)(struct file *, struct dir_context *);
+ int (*iterate_shared)(struct file *, struct dir_context *);
+ __poll_t (*poll)(struct file *, struct poll_table_struct *);
+ long int (*unlocked_ioctl)(struct file *, unsigned int, long unsigned int);
+ long int (*compat_ioctl)(struct file *, unsigned int, long unsigned int);
+ int (*mmap)(struct file *, struct vm_area_struct *);
+ long unsigned int mmap_supported_flags;
+ int (*open)(struct inode *, struct file *);
+ int (*flush)(struct file *, fl_owner_t);
+ int (*release)(struct inode *, struct file *);
+ int (*fsync)(struct file *, loff_t, loff_t, int);
+ int (*fasync)(int, struct file *, int);
+ int (*lock)(struct file *, int, struct file_lock *);
+ ssize_t (*sendpage)(struct file *, struct page *, int, size_t, loff_t *, int);
+ long unsigned int (*get_unmapped_area)(struct file *, long unsigned int, long unsigned int, long unsigned int, long unsigned int);
+ int (*check_flags)(int);
+ int (*flock)(struct file *, int, struct file_lock *);
+ ssize_t (*splice_write)(struct pipe_inode_info *, struct file *, loff_t *, size_t, unsigned int);
+ ssize_t (*splice_read)(struct file *, loff_t *, struct pipe_inode_info *, size_t, unsigned int);
+ int (*setlease)(struct file *, long int, struct file_lock **, void **);
+ long int (*fallocate)(struct file *, int, loff_t, loff_t);
+ void (*show_fdinfo)(struct seq_file *, struct file *);
+ ssize_t (*copy_file_range)(struct file *, loff_t, struct file *, loff_t, size_t, unsigned int);
+ loff_t (*remap_file_range)(struct file *, loff_t, struct file *, loff_t, loff_t, unsigned int);
+ int (*fadvise)(struct file *, loff_t, loff_t, int);
+ int (*uring_cmd)(struct io_uring_cmd *, unsigned int);
+ int (*uring_cmd_iopoll)(struct io_uring_cmd *, struct io_comp_batch *, unsigned int);
+};
+
+struct static_call_site {
+ s32 addr;
+ s32 key;
+};
+
+struct static_call_mod {
+ struct static_call_mod *next;
+ struct module *mod;
+ struct static_call_site *sites;
+};
+
+struct static_call_key {
+ void *func;
+ union {
+ long unsigned int type;
+ struct static_call_mod *mods;
+ struct static_call_site *sites;
+ };
+};
+
+struct thread_info {
+ long unsigned int flags;
+ long unsigned int syscall_work;
+ u32 status;
+ u32 cpu;
+};
+
+struct refcount_struct {
+ atomic_t refs;
+};
+
+typedef struct refcount_struct refcount_t;
+
+struct llist_node {
+ struct llist_node *next;
+};
+
+struct __call_single_node {
+ struct llist_node llist;
+ union {
+ unsigned int u_flags;
+ atomic_t a_flags;
+ };
+ u16 src;
+ u16 dst;
+};
+
+struct load_weight {
+ long unsigned int weight;
+ u32 inv_weight;
+};
+
+struct rb_node {
+ long unsigned int __rb_parent_color;
+ struct rb_node *rb_right;
+ struct rb_node *rb_left;
+};
+
+struct util_est {
+ unsigned int enqueued;
+ unsigned int ewma;
+};
+
+struct sched_avg {
+ u64 last_update_time;
+ u64 load_sum;
+ u64 runnable_sum;
+ u32 util_sum;
+ u32 period_contrib;
+ long unsigned int load_avg;
+ long unsigned int runnable_avg;
+ long unsigned int util_avg;
+ struct util_est util_est;
+};
+
+struct cfs_rq;
+
+struct sched_entity {
+ struct load_weight load;
+ struct rb_node run_node;
+ struct list_head group_node;
+ unsigned int on_rq;
+ u64 exec_start;
+ u64 sum_exec_runtime;
+ u64 vruntime;
+ u64 prev_sum_exec_runtime;
+ u64 nr_migrations;
+ int depth;
+ struct sched_entity *parent;
+ struct cfs_rq *cfs_rq;
+ struct cfs_rq *my_q;
+ long unsigned int runnable_weight;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct sched_avg avg;
+};
+
+struct sched_rt_entity {
+ struct list_head run_list;
+ long unsigned int timeout;
+ long unsigned int watchdog_stamp;
+ unsigned int time_slice;
+ short unsigned int on_rq;
+ short unsigned int on_list;
+ struct sched_rt_entity *back;
+};
+
+typedef s64 ktime_t;
+
+struct timerqueue_node {
+ struct rb_node node;
+ ktime_t expires;
+};
+
+enum hrtimer_restart {
+ HRTIMER_NORESTART = 0,
+ HRTIMER_RESTART = 1,
+};
+
+struct hrtimer_clock_base;
+
+struct hrtimer {
+ struct timerqueue_node node;
+ ktime_t _softexpires;
+ enum hrtimer_restart (*function)(struct hrtimer *);
+ struct hrtimer_clock_base *base;
+ u8 state;
+ u8 is_rel;
+ u8 is_soft;
+ u8 is_hard;
+};
+
+struct sched_dl_entity {
+ struct rb_node rb_node;
+ u64 dl_runtime;
+ u64 dl_deadline;
+ u64 dl_period;
+ u64 dl_bw;
+ u64 dl_density;
+ s64 runtime;
+ u64 deadline;
+ unsigned int flags;
+ unsigned int dl_throttled: 1;
+ unsigned int dl_yielded: 1;
+ unsigned int dl_non_contending: 1;
+ unsigned int dl_overrun: 1;
+ struct hrtimer dl_timer;
+ struct hrtimer inactive_timer;
+ struct sched_dl_entity *pi_se;
+};
+
+struct sched_statistics {
+ u64 wait_start;
+ u64 wait_max;
+ u64 wait_count;
+ u64 wait_sum;
+ u64 iowait_count;
+ u64 iowait_sum;
+ u64 sleep_start;
+ u64 sleep_max;
+ s64 sum_sleep_runtime;
+ u64 block_start;
+ u64 block_max;
+ s64 sum_block_runtime;
+ u64 exec_max;
+ u64 slice_max;
+ u64 nr_migrations_cold;
+ u64 nr_failed_migrations_affine;
+ u64 nr_failed_migrations_running;
+ u64 nr_failed_migrations_hot;
+ u64 nr_forced_migrations;
+ u64 nr_wakeups;
+ u64 nr_wakeups_sync;
+ u64 nr_wakeups_migrate;
+ u64 nr_wakeups_local;
+ u64 nr_wakeups_remote;
+ u64 nr_wakeups_affine;
+ u64 nr_wakeups_affine_attempts;
+ u64 nr_wakeups_passive;
+ u64 nr_wakeups_idle;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct cpumask {
+ long unsigned int bits[2];
+};
+
+typedef struct cpumask cpumask_t;
+
+union rcu_special {
+ struct {
+ u8 blocked;
+ u8 need_qs;
+ u8 exp_hint;
+ u8 need_mb;
+ } b;
+ u32 s;
+};
+
+struct sched_info {
+ long unsigned int pcount;
+ long long unsigned int run_delay;
+ long long unsigned int last_arrival;
+ long long unsigned int last_queued;
+};
+
+struct plist_node {
+ int prio;
+ struct list_head prio_list;
+ struct list_head node_list;
+};
+
+struct task_rss_stat {
+ int events;
+ int count[4];
+};
+
+enum timespec_type {
+ TT_NONE = 0,
+ TT_NATIVE = 1,
+ TT_COMPAT = 2,
+};
+
+struct __kernel_timespec;
+
+struct old_timespec32;
+
+struct pollfd;
+
+struct restart_block {
+ long unsigned int arch_data;
+ long int (*fn)(struct restart_block *);
+ union {
+ struct {
+ u32 *uaddr;
+ u32 val;
+ u32 flags;
+ u32 bitset;
+ u64 time;
+ u32 *uaddr2;
+ } futex;
+ struct {
+ clockid_t clockid;
+ enum timespec_type type;
+ union {
+ struct __kernel_timespec *rmtp;
+ struct old_timespec32 *compat_rmtp;
+ };
+ u64 expires;
+ } nanosleep;
+ struct {
+ struct pollfd *ufds;
+ int nfds;
+ int has_timeout;
+ long unsigned int tv_sec;
+ long unsigned int tv_nsec;
+ } poll;
+ };
+};
+
+struct prev_cputime {
+ u64 utime;
+ u64 stime;
+ raw_spinlock_t lock;
+};
+
+struct rb_root {
+ struct rb_node *rb_node;
+};
+
+struct rb_root_cached {
+ struct rb_root rb_root;
+ struct rb_node *rb_leftmost;
+};
+
+struct timerqueue_head {
+ struct rb_root_cached rb_root;
+};
+
+struct posix_cputimer_base {
+ u64 nextevt;
+ struct timerqueue_head tqhead;
+};
+
+struct posix_cputimers {
+ struct posix_cputimer_base bases[3];
+ unsigned int timers_active;
+ unsigned int expiry_active;
+};
+
+struct posix_cputimers_work {
+ struct callback_head work;
+ unsigned int scheduled;
+};
+
+struct sem_undo_list;
+
+struct sysv_sem {
+ struct sem_undo_list *undo_list;
+};
+
+struct sysv_shm {
+ struct list_head shm_clist;
+};
+
+typedef struct {
+ long unsigned int sig[1];
+} sigset_t;
+
+struct sigpending {
+ struct list_head list;
+ sigset_t signal;
+};
+
+typedef struct {
+ uid_t val;
+} kuid_t;
+
+struct seccomp_filter;
+
+struct seccomp {
+ int mode;
+ atomic_t filter_count;
+ struct seccomp_filter *filter;
+};
+
+struct syscall_user_dispatch {
+ char *selector;
+ long unsigned int offset;
+ long unsigned int len;
+ bool on_dispatch;
+};
+
+struct spinlock {
+ union {
+ struct raw_spinlock rlock;
+ struct {
+ u8 __padding[24];
+ struct lockdep_map dep_map;
+ };
+ };
+};
+
+typedef struct spinlock spinlock_t;
+
+struct wake_q_node {
+ struct wake_q_node *next;
+};
+
+struct irqtrace_events {
+ unsigned int irq_events;
+ long unsigned int hardirq_enable_ip;
+ long unsigned int hardirq_disable_ip;
+ unsigned int hardirq_enable_event;
+ unsigned int hardirq_disable_event;
+ long unsigned int softirq_disable_ip;
+ long unsigned int softirq_enable_ip;
+ unsigned int softirq_disable_event;
+ unsigned int softirq_enable_event;
+};
+
+struct held_lock {
+ u64 prev_chain_key;
+ long unsigned int acquire_ip;
+ struct lockdep_map *instance;
+ struct lockdep_map *nest_lock;
+ unsigned int class_idx: 13;
+ unsigned int irq_context: 2;
+ unsigned int trylock: 1;
+ unsigned int read: 2;
+ unsigned int check: 1;
+ unsigned int hardirqs_off: 1;
+ unsigned int references: 12;
+ unsigned int pin_count;
+};
+
+struct task_io_accounting {
+ u64 rchar;
+ u64 wchar;
+ u64 syscr;
+ u64 syscw;
+ u64 read_bytes;
+ u64 write_bytes;
+ u64 cancelled_write_bytes;
+};
+
+typedef struct {
+ long unsigned int bits[1];
+} nodemask_t;
+
+struct seqcount {
+ unsigned int sequence;
+ struct lockdep_map dep_map;
+};
+
+typedef struct seqcount seqcount_t;
+
+struct seqcount_spinlock {
+ seqcount_t seqcount;
+ spinlock_t *lock;
+};
+
+typedef struct seqcount_spinlock seqcount_spinlock_t;
+
+typedef atomic64_t atomic_long_t;
+
+struct optimistic_spin_queue {
+ atomic_t tail;
+};
+
+struct mutex {
+ atomic_long_t owner;
+ raw_spinlock_t wait_lock;
+ struct optimistic_spin_queue osq;
+ struct list_head wait_list;
+ void *magic;
+ struct lockdep_map dep_map;
+};
+
+struct arch_tlbflush_unmap_batch {
+ struct cpumask cpumask;
+};
+
+struct tlbflush_unmap_batch {
+ struct arch_tlbflush_unmap_batch arch;
+ bool flush_required;
+ bool writable;
+};
+
+struct page_frag {
+ struct page *page;
+ __u32 offset;
+ __u32 size;
+};
+
+struct kmap_ctrl {};
+
+struct timer_list {
+ struct hlist_node entry;
+ long unsigned int expires;
+ void (*function)(struct timer_list *);
+ u32 flags;
+ struct lockdep_map lockdep_map;
+};
+
+struct llist_head {
+ struct llist_node *first;
+};
+
+struct desc_struct {
+ u16 limit0;
+ u16 base0;
+ u16 base1: 8;
+ u16 type: 4;
+ u16 s: 1;
+ u16 dpl: 2;
+ u16 p: 1;
+ u16 limit1: 4;
+ u16 avl: 1;
+ u16 l: 1;
+ u16 d: 1;
+ u16 g: 1;
+ u16 base2: 8;
+};
+
+struct fpu_state_perm {
+ u64 __state_perm;
+ unsigned int __state_size;
+ unsigned int __user_state_size;
+};
+
+struct fregs_state {
+ u32 cwd;
+ u32 swd;
+ u32 twd;
+ u32 fip;
+ u32 fcs;
+ u32 foo;
+ u32 fos;
+ u32 st_space[20];
+ u32 status;
+};
+
+struct fxregs_state {
+ u16 cwd;
+ u16 swd;
+ u16 twd;
+ u16 fop;
+ union {
+ struct {
+ u64 rip;
+ u64 rdp;
+ };
+ struct {
+ u32 fip;
+ u32 fcs;
+ u32 foo;
+ u32 fos;
+ };
+ };
+ u32 mxcsr;
+ u32 mxcsr_mask;
+ u32 st_space[32];
+ u32 xmm_space[64];
+ u32 padding[12];
+ union {
+ u32 padding1[12];
+ u32 sw_reserved[12];
+ };
+};
+
+struct math_emu_info;
+
+struct swregs_state {
+ u32 cwd;
+ u32 swd;
+ u32 twd;
+ u32 fip;
+ u32 fcs;
+ u32 foo;
+ u32 fos;
+ u32 st_space[20];
+ u8 ftop;
+ u8 changed;
+ u8 lookahead;
+ u8 no_update;
+ u8 rm;
+ u8 alimit;
+ struct math_emu_info *info;
+ u32 entry_eip;
+};
+
+struct xstate_header {
+ u64 xfeatures;
+ u64 xcomp_bv;
+ u64 reserved[6];
+};
+
+struct xregs_state {
+ struct fxregs_state i387;
+ struct xstate_header header;
+ u8 extended_state_area[0];
+};
+
+union fpregs_state {
+ struct fregs_state fsave;
+ struct fxregs_state fxsave;
+ struct swregs_state soft;
+ struct xregs_state xsave;
+ u8 __padding[4096];
+};
+
+struct fpstate {
+ unsigned int size;
+ unsigned int user_size;
+ u64 xfeatures;
+ u64 user_xfeatures;
+ u64 xfd;
+ unsigned int is_valloc: 1;
+ unsigned int is_guest: 1;
+ unsigned int is_confidential: 1;
+ unsigned int in_use: 1;
+ long: 60;
+ long: 64;
+ long: 64;
+ long: 64;
+ union fpregs_state regs;
+};
+
+struct fpu {
+ unsigned int last_cpu;
+ long unsigned int avx512_timestamp;
+ struct fpstate *fpstate;
+ struct fpstate *__task_fpstate;
+ struct fpu_state_perm perm;
+ struct fpu_state_perm guest_perm;
+ struct fpstate __fpstate;
+};
+
+struct perf_event;
+
+struct io_bitmap;
+
+struct thread_struct {
+ struct desc_struct tls_array[3];
+ long unsigned int sp;
+ short unsigned int es;
+ short unsigned int ds;
+ short unsigned int fsindex;
+ short unsigned int gsindex;
+ long unsigned int fsbase;
+ long unsigned int gsbase;
+ struct perf_event *ptrace_bps[4];
+ long unsigned int virtual_dr6;
+ long unsigned int ptrace_dr7;
+ long unsigned int cr2;
+ long unsigned int trap_nr;
+ long unsigned int error_code;
+ struct io_bitmap *io_bitmap;
+ long unsigned int iopl_emul;
+ unsigned int iopl_warn: 1;
+ unsigned int sig_on_uaccess_err: 1;
+ u32 pkru;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct fpu fpu;
+};
+
+struct sched_class;
+
+struct task_group;
+
+struct rcu_node;
+
+struct mm_struct;
+
+struct pid;
+
+struct completion;
+
+struct cred;
+
+struct key;
+
+struct nameidata;
+
+struct fs_struct;
+
+struct files_struct;
+
+struct io_uring_task;
+
+struct nsproxy;
+
+struct signal_struct;
+
+struct sighand_struct;
+
+struct audit_context;
+
+struct rt_mutex_waiter;
+
+struct mutex_waiter;
+
+struct bio_list;
+
+struct blk_plug;
+
+struct reclaim_state;
+
+struct backing_dev_info;
+
+struct io_context;
+
+struct capture_control;
+
+struct kernel_siginfo;
+
+typedef struct kernel_siginfo kernel_siginfo_t;
+
+struct css_set;
+
+struct robust_list_head;
+
+struct futex_pi_state;
+
+struct perf_event_context;
+
+struct mempolicy;
+
+struct numa_group;
+
+struct rseq;
+
+struct task_delay_info;
+
+struct ftrace_ret_stack;
+
+struct mem_cgroup;
+
+struct request_queue;
+
+struct uprobe_task;
+
+struct vm_struct;
+
+struct bpf_local_storage;
+
+struct bpf_run_ctx;
+
+struct task_struct {
+ struct thread_info thread_info;
+ unsigned int __state;
+ void *stack;
+ refcount_t usage;
+ unsigned int flags;
+ unsigned int ptrace;
+ int on_cpu;
+ struct __call_single_node wake_entry;
+ unsigned int wakee_flips;
+ long unsigned int wakee_flip_decay_ts;
+ struct task_struct *last_wakee;
+ int recent_used_cpu;
+ int wake_cpu;
+ int on_rq;
+ int prio;
+ int static_prio;
+ int normal_prio;
+ unsigned int rt_priority;
+ struct sched_entity se;
+ struct sched_rt_entity rt;
+ struct sched_dl_entity dl;
+ const struct sched_class *sched_class;
+ struct task_group *sched_task_group;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct sched_statistics stats;
+ unsigned int btrace_seq;
+ unsigned int policy;
+ int nr_cpus_allowed;
+ const cpumask_t *cpus_ptr;
+ cpumask_t *user_cpus_ptr;
+ cpumask_t cpus_mask;
+ void *migration_pending;
+ short unsigned int migration_disabled;
+ short unsigned int migration_flags;
+ int rcu_read_lock_nesting;
+ union rcu_special rcu_read_unlock_special;
+ struct list_head rcu_node_entry;
+ struct rcu_node *rcu_blocked_node;
+ long unsigned int rcu_tasks_nvcsw;
+ u8 rcu_tasks_holdout;
+ u8 rcu_tasks_idx;
+ int rcu_tasks_idle_cpu;
+ struct list_head rcu_tasks_holdout_list;
+ int trc_reader_nesting;
+ int trc_ipi_to_cpu;
+ union rcu_special trc_reader_special;
+ struct list_head trc_holdout_list;
+ struct list_head trc_blkd_node;
+ int trc_blkd_cpu;
+ struct sched_info sched_info;
+ struct list_head tasks;
+ struct plist_node pushable_tasks;
+ struct rb_node pushable_dl_tasks;
+ struct mm_struct *mm;
+ struct mm_struct *active_mm;
+ struct task_rss_stat rss_stat;
+ int exit_state;
+ int exit_code;
+ int exit_signal;
+ int pdeath_signal;
+ long unsigned int jobctl;
+ unsigned int personality;
+ unsigned int sched_reset_on_fork: 1;
+ unsigned int sched_contributes_to_load: 1;
+ unsigned int sched_migrated: 1;
+ int: 29;
+ unsigned int sched_remote_wakeup: 1;
+ unsigned int in_execve: 1;
+ unsigned int in_iowait: 1;
+ unsigned int restore_sigmask: 1;
+ unsigned int in_user_fault: 1;
+ unsigned int brk_randomized: 1;
+ unsigned int no_cgroup_migration: 1;
+ unsigned int frozen: 1;
+ unsigned int use_memdelay: 1;
+ unsigned int in_eventfd: 1;
+ unsigned int reported_split_lock: 1;
+ unsigned int in_thrashing: 1;
+ long unsigned int atomic_flags;
+ struct restart_block restart_block;
+ pid_t pid;
+ pid_t tgid;
+ long unsigned int stack_canary;
+ struct task_struct *real_parent;
+ struct task_struct *parent;
+ struct list_head children;
+ struct list_head sibling;
+ struct task_struct *group_leader;
+ struct list_head ptraced;
+ struct list_head ptrace_entry;
+ struct pid *thread_pid;
+ struct hlist_node pid_links[4];
+ struct list_head thread_group;
+ struct list_head thread_node;
+ struct completion *vfork_done;
+ int *set_child_tid;
+ int *clear_child_tid;
+ void *worker_private;
+ u64 utime;
+ u64 stime;
+ u64 gtime;
+ struct prev_cputime prev_cputime;
+ long unsigned int nvcsw;
+ long unsigned int nivcsw;
+ u64 start_time;
+ u64 start_boottime;
+ long unsigned int min_flt;
+ long unsigned int maj_flt;
+ struct posix_cputimers posix_cputimers;
+ struct posix_cputimers_work posix_cputimers_work;
+ const struct cred *ptracer_cred;
+ const struct cred *real_cred;
+ const struct cred *cred;
+ struct key *cached_requested_key;
+ char comm[16];
+ struct nameidata *nameidata;
+ struct sysv_sem sysvsem;
+ struct sysv_shm sysvshm;
+ long unsigned int last_switch_count;
+ long unsigned int last_switch_time;
+ struct fs_struct *fs;
+ struct files_struct *files;
+ struct io_uring_task *io_uring;
+ struct nsproxy *nsproxy;
+ struct signal_struct *signal;
+ struct sighand_struct *sighand;
+ sigset_t blocked;
+ sigset_t real_blocked;
+ sigset_t saved_sigmask;
+ struct sigpending pending;
+ long unsigned int sas_ss_sp;
+ size_t sas_ss_size;
+ unsigned int sas_ss_flags;
+ struct callback_head *task_works;
+ struct audit_context *audit_context;
+ kuid_t loginuid;
+ unsigned int sessionid;
+ struct seccomp seccomp;
+ struct syscall_user_dispatch syscall_dispatch;
+ u64 parent_exec_id;
+ u64 self_exec_id;
+ spinlock_t alloc_lock;
+ raw_spinlock_t pi_lock;
+ struct wake_q_node wake_q;
+ struct rb_root_cached pi_waiters;
+ struct task_struct *pi_top_task;
+ struct rt_mutex_waiter *pi_blocked_on;
+ struct mutex_waiter *blocked_on;
+ int non_block_count;
+ struct irqtrace_events irqtrace;
+ unsigned int hardirq_threaded;
+ u64 hardirq_chain_key;
+ int softirqs_enabled;
+ int softirq_context;
+ int irq_config;
+ u64 curr_chain_key;
+ int lockdep_depth;
+ unsigned int lockdep_recursion;
+ struct held_lock held_locks[48];
+ void *journal_info;
+ struct bio_list *bio_list;
+ struct blk_plug *plug;
+ struct reclaim_state *reclaim_state;
+ struct backing_dev_info *backing_dev_info;
+ struct io_context *io_context;
+ struct capture_control *capture_control;
+ long unsigned int ptrace_message;
+ kernel_siginfo_t *last_siginfo;
+ struct task_io_accounting ioac;
+ u64 acct_rss_mem1;
+ u64 acct_vm_mem1;
+ u64 acct_timexpd;
+ nodemask_t mems_allowed;
+ seqcount_spinlock_t mems_allowed_seq;
+ int cpuset_mem_spread_rotor;
+ int cpuset_slab_spread_rotor;
+ struct css_set *cgroups;
+ struct list_head cg_list;
+ struct robust_list_head *robust_list;
+ struct list_head pi_state_list;
+ struct futex_pi_state *pi_state_cache;
+ struct mutex futex_exit_mutex;
+ unsigned int futex_state;
+ struct perf_event_context *perf_event_ctxp[2];
+ struct mutex perf_event_mutex;
+ struct list_head perf_event_list;
+ long unsigned int preempt_disable_ip;
+ struct mempolicy *mempolicy;
+ short int il_prev;
+ short int pref_node_fork;
+ int numa_scan_seq;
+ unsigned int numa_scan_period;
+ unsigned int numa_scan_period_max;
+ int numa_preferred_nid;
+ long unsigned int numa_migrate_retry;
+ u64 node_stamp;
+ u64 last_task_numa_placement;
+ u64 last_sum_exec_runtime;
+ struct callback_head numa_work;
+ struct numa_group *numa_group;
+ long unsigned int *numa_faults;
+ long unsigned int total_numa_faults;
+ long unsigned int numa_faults_locality[3];
+ long unsigned int numa_pages_migrated;
+ struct rseq *rseq;
+ u32 rseq_sig;
+ long unsigned int rseq_event_mask;
+ struct tlbflush_unmap_batch tlb_ubc;
+ union {
+ refcount_t rcu_users;
+ struct callback_head rcu;
+ };
+ struct pipe_inode_info *splice_pipe;
+ struct page_frag task_frag;
+ struct task_delay_info *delays;
+ int make_it_fail;
+ unsigned int fail_nth;
+ int nr_dirtied;
+ int nr_dirtied_pause;
+ long unsigned int dirty_paused_when;
+ u64 timer_slack_ns;
+ u64 default_timer_slack_ns;
+ int curr_ret_stack;
+ int curr_ret_depth;
+ struct ftrace_ret_stack *ret_stack;
+ long long unsigned int ftrace_timestamp;
+ atomic_t trace_overrun;
+ atomic_t tracing_graph_pause;
+ long unsigned int trace_recursion;
+ struct mem_cgroup *memcg_in_oom;
+ gfp_t memcg_oom_gfp_mask;
+ int memcg_oom_order;
+ unsigned int memcg_nr_pages_over_high;
+ struct mem_cgroup *active_memcg;
+ struct request_queue *throttle_queue;
+ struct uprobe_task *utask;
+ struct kmap_ctrl kmap_ctrl;
+ long unsigned int task_state_change;
+ int pagefault_disabled;
+ struct task_struct *oom_reaper_list;
+ struct timer_list oom_reaper_timer;
+ struct vm_struct *stack_vm_area;
+ refcount_t stack_refcount;
+ void *security;
+ struct bpf_local_storage *bpf_storage;
+ struct bpf_run_ctx *bpf_ctx;
+ void *mce_vaddr;
+ __u64 mce_kflags;
+ u64 mce_addr;
+ __u64 mce_ripv: 1;
+ __u64 mce_whole_page: 1;
+ __u64 __mce_reserved: 62;
+ struct callback_head mce_kill_me;
+ int mce_count;
+ struct llist_head kretprobe_instances;
+ struct llist_head rethooks;
+ struct callback_head l1d_flush_kill;
+ long: 64;
+ long: 64;
+ struct thread_struct thread;
+};
+
+struct jump_entry {
+ s32 code;
+ s32 target;
+ long int key;
+};
+
+struct static_key_mod;
+
+struct static_key {
+ atomic_t enabled;
+ union {
+ long unsigned int type;
+ struct jump_entry *entries;
+ struct static_key_mod *next;
+ };
+};
+
+struct orc_entry {
+ s16 sp_offset;
+ s16 bp_offset;
+ unsigned int sp_reg: 4;
+ unsigned int bp_reg: 4;
+ unsigned int type: 2;
+ unsigned int end: 1;
+} __attribute__((packed));
+
+struct bug_entry {
+ int bug_addr_disp;
+ int file_disp;
+ short unsigned int line;
+ short unsigned int flags;
+};
+
+typedef __s64 time64_t;
+
+struct __kernel_timespec {
+ __kernel_time64_t tv_sec;
+ long long int tv_nsec;
+};
+
+struct timespec64 {
+ time64_t tv_sec;
+ long int tv_nsec;
+};
+
+typedef s32 old_time32_t;
+
+struct old_timespec32 {
+ old_time32_t tv_sec;
+ s32 tv_nsec;
+};
+
+struct pt_regs {
+ long unsigned int r15;
+ long unsigned int r14;
+ long unsigned int r13;
+ long unsigned int r12;
+ long unsigned int bp;
+ long unsigned int bx;
+ long unsigned int r11;
+ long unsigned int r10;
+ long unsigned int r9;
+ long unsigned int r8;
+ long unsigned int ax;
+ long unsigned int cx;
+ long unsigned int dx;
+ long unsigned int si;
+ long unsigned int di;
+ long unsigned int orig_ax;
+ long unsigned int ip;
+ long unsigned int cs;
+ long unsigned int flags;
+ long unsigned int sp;
+ long unsigned int ss;
+};
+
+struct math_emu_info {
+ long int ___orig_eip;
+ struct pt_regs *regs;
+};
+
+typedef long unsigned int pgdval_t;
+
+typedef long unsigned int pgprotval_t;
+
+struct pgprot {
+ pgprotval_t pgprot;
+};
+
+typedef struct pgprot pgprot_t;
+
+typedef struct {
+ pgdval_t pgd;
+} pgd_t;
+
+typedef struct page *pgtable_t;
+
+struct address_space;
+
+struct page_pool;
+
+struct dev_pagemap;
+
+struct page {
+ long unsigned int flags;
+ union {
+ struct {
+ union {
+ struct list_head lru;
+ struct {
+ void *__filler;
+ unsigned int mlock_count;
+ };
+ struct list_head buddy_list;
+ struct list_head pcp_list;
+ };
+ struct address_space *mapping;
+ long unsigned int index;
+ long unsigned int private;
+ };
+ struct {
+ long unsigned int pp_magic;
+ struct page_pool *pp;
+ long unsigned int _pp_mapping_pad;
+ long unsigned int dma_addr;
+ union {
+ long unsigned int dma_addr_upper;
+ atomic_long_t pp_frag_count;
+ };
+ };
+ struct {
+ long unsigned int compound_head;
+ unsigned char compound_dtor;
+ unsigned char compound_order;
+ atomic_t compound_mapcount;
+ atomic_t compound_pincount;
+ unsigned int compound_nr;
+ };
+ struct {
+ long unsigned int _compound_pad_1;
+ long unsigned int _compound_pad_2;
+ struct list_head deferred_list;
+ };
+ struct {
+ long unsigned int _pt_pad_1;
+ pgtable_t pmd_huge_pte;
+ long unsigned int _pt_pad_2;
+ union {
+ struct mm_struct *pt_mm;
+ atomic_t pt_frag_refcount;
+ };
+ spinlock_t *ptl;
+ };
+ struct {
+ struct dev_pagemap *pgmap;
+ void *zone_device_data;
+ };
+ struct callback_head callback_head;
+ };
+ union {
+ atomic_t _mapcount;
+ unsigned int page_type;
+ };
+ atomic_t _refcount;
+ long unsigned int memcg_data;
+};
+
+struct tracepoint_func {
+ void *func;
+ void *data;
+ int prio;
+};
+
+struct tracepoint {
+ const char *name;
+ struct static_key key;
+ struct static_call_key *static_call_key;
+ void *static_call_tramp;
+ void *iterator;
+ int (*regfunc)();
+ void (*unregfunc)();
+ struct tracepoint_func *funcs;
+};
+
+typedef const int tracepoint_ptr_t;
+
+struct bpf_raw_event_map {
+ struct tracepoint *tp;
+ void *bpf_func;
+ u32 num_args;
+ u32 writable_size;
+ long: 64;
+};
+
+enum xfeature {
+ XFEATURE_FP = 0,
+ XFEATURE_SSE = 1,
+ XFEATURE_YMM = 2,
+ XFEATURE_BNDREGS = 3,
+ XFEATURE_BNDCSR = 4,
+ XFEATURE_OPMASK = 5,
+ XFEATURE_ZMM_Hi256 = 6,
+ XFEATURE_Hi16_ZMM = 7,
+ XFEATURE_PT_UNIMPLEMENTED_SO_FAR = 8,
+ XFEATURE_PKRU = 9,
+ XFEATURE_PASID = 10,
+ XFEATURE_RSRVD_COMP_11 = 11,
+ XFEATURE_RSRVD_COMP_12 = 12,
+ XFEATURE_RSRVD_COMP_13 = 13,
+ XFEATURE_RSRVD_COMP_14 = 14,
+ XFEATURE_LBR = 15,
+ XFEATURE_RSRVD_COMP_16 = 16,
+ XFEATURE_XTILE_CFG = 17,
+ XFEATURE_XTILE_DATA = 18,
+ XFEATURE_MAX = 19,
+};
+
+struct fpu_state_config {
+ unsigned int max_size;
+ unsigned int default_size;
+ u64 max_features;
+ u64 default_features;
+ u64 legacy_features;
+};
+
+struct cpuinfo_x86 {
+ __u8 x86;
+ __u8 x86_vendor;
+ __u8 x86_model;
+ __u8 x86_stepping;
+ int x86_tlbsize;
+ __u32 vmx_capability[5];
+ __u8 x86_virt_bits;
+ __u8 x86_phys_bits;
+ __u8 x86_coreid_bits;
+ __u8 cu_id;
+ __u32 extended_cpuid_level;
+ int cpuid_level;
+ union {
+ __u32 x86_capability[21];
+ long unsigned int x86_capability_alignment;
+ };
+ char x86_vendor_id[16];
+ char x86_model_id[64];
+ unsigned int x86_cache_size;
+ int x86_cache_alignment;
+ int x86_cache_max_rmid;
+ int x86_cache_occ_scale;
+ int x86_cache_mbm_width_offset;
+ int x86_power;
+ long unsigned int loops_per_jiffy;
+ u64 ppin;
+ u16 x86_max_cores;
+ u16 apicid;
+ u16 initial_apicid;
+ u16 x86_clflush_size;
+ u16 booted_cores;
+ u16 phys_proc_id;
+ u16 logical_proc_id;
+ u16 cpu_core_id;
+ u16 cpu_die_id;
+ u16 logical_die_id;
+ u16 cpu_index;
+ bool smt_active;
+ u32 microcode;
+ u8 x86_cache_bits;
+ unsigned int initialized: 1;
+};
+
+typedef struct {
+ arch_rwlock_t raw_lock;
+ unsigned int magic;
+ unsigned int owner_cpu;
+ void *owner;
+ struct lockdep_map dep_map;
+} rwlock_t;
+
+struct wait_queue_head {
+ spinlock_t lock;
+ struct list_head head;
+};
+
+typedef struct wait_queue_head wait_queue_head_t;
+
+enum pid_type {
+ PIDTYPE_PID = 0,
+ PIDTYPE_TGID = 1,
+ PIDTYPE_PGID = 2,
+ PIDTYPE_SID = 3,
+ PIDTYPE_MAX = 4,
+};
+
+struct pid_namespace;
+
+struct upid {
+ int nr;
+ struct pid_namespace *ns;
+};
+
+struct pid {
+ refcount_t count;
+ unsigned int level;
+ spinlock_t lock;
+ struct hlist_head tasks[4];
+ struct hlist_head inodes;
+ wait_queue_head_t wait_pidfd;
+ struct callback_head rcu;
+ struct upid numbers[1];
+};
+
+typedef struct {
+ gid_t val;
+} kgid_t;
+
+struct work_struct;
+
+typedef void (*work_func_t)(struct work_struct *);
+
+struct work_struct {
+ atomic_long_t data;
+ struct list_head entry;
+ work_func_t func;
+ struct lockdep_map lockdep_map;
+};
+
+struct workqueue_struct;
+
+struct delayed_work {
+ struct work_struct work;
+ struct timer_list timer;
+ struct workqueue_struct *wq;
+ int cpu;
+};
+
+struct seqcount_raw_spinlock {
+ seqcount_t seqcount;
+ raw_spinlock_t *lock;
+};
+
+typedef struct seqcount_raw_spinlock seqcount_raw_spinlock_t;
+
+typedef struct {
+ seqcount_spinlock_t seqcount;
+ spinlock_t lock;
+} seqlock_t;
+
+struct hrtimer_cpu_base;
+
+struct hrtimer_clock_base {
+ struct hrtimer_cpu_base *cpu_base;
+ unsigned int index;
+ clockid_t clockid;
+ seqcount_raw_spinlock_t seq;
+ struct hrtimer *running;
+ struct timerqueue_head active;
+ ktime_t (*get_time)();
+ ktime_t offset;
+ long: 64;
+ long: 64;
+};
+
+struct hrtimer_cpu_base {
+ raw_spinlock_t lock;
+ unsigned int cpu;
+ unsigned int active_bases;
+ unsigned int clock_was_set_seq;
+ unsigned int hres_active: 1;
+ unsigned int in_hrtirq: 1;
+ unsigned int hang_detected: 1;
+ unsigned int softirq_activated: 1;
+ unsigned int nr_events;
+ short unsigned int nr_retries;
+ short unsigned int nr_hangs;
+ unsigned int max_hang_time;
+ ktime_t expires_next;
+ struct hrtimer *next_timer;
+ ktime_t softirq_expires_next;
+ struct hrtimer *softirq_next_timer;
+ struct hrtimer_clock_base clock_base[8];
+};
+
+struct rlimit {
+ __kernel_ulong_t rlim_cur;
+ __kernel_ulong_t rlim_max;
+};
+
+typedef void __signalfn_t(int);
+
+typedef __signalfn_t *__sighandler_t;
+
+typedef void __restorefn_t();
+
+typedef __restorefn_t *__sigrestore_t;
+
+union sigval {
+ int sival_int;
+ void *sival_ptr;
+};
+
+typedef union sigval sigval_t;
+
+union __sifields {
+ struct {
+ __kernel_pid_t _pid;
+ __kernel_uid32_t _uid;
+ } _kill;
+ struct {
+ __kernel_timer_t _tid;
+ int _overrun;
+ sigval_t _sigval;
+ int _sys_private;
+ } _timer;
+ struct {
+ __kernel_pid_t _pid;
+ __kernel_uid32_t _uid;
+ sigval_t _sigval;
+ } _rt;
+ struct {
+ __kernel_pid_t _pid;
+ __kernel_uid32_t _uid;
+ int _status;
+ __kernel_clock_t _utime;
+ __kernel_clock_t _stime;
+ } _sigchld;
+ struct {
+ void *_addr;
+ union {
+ int _trapno;
+ short int _addr_lsb;
+ struct {
+ char _dummy_bnd[8];
+ void *_lower;
+ void *_upper;
+ } _addr_bnd;
+ struct {
+ char _dummy_pkey[8];
+ __u32 _pkey;
+ } _addr_pkey;
+ struct {
+ long unsigned int _data;
+ __u32 _type;
+ __u32 _flags;
+ } _perf;
+ };
+ } _sigfault;
+ struct {
+ long int _band;
+ int _fd;
+ } _sigpoll;
+ struct {
+ void *_call_addr;
+ int _syscall;
+ unsigned int _arch;
+ } _sigsys;
+};
+
+struct kernel_siginfo {
+ struct {
+ int si_signo;
+ int si_errno;
+ int si_code;
+ union __sifields _sifields;
+ };
+};
+
+struct sigaction {
+ __sighandler_t sa_handler;
+ long unsigned int sa_flags;
+ __sigrestore_t sa_restorer;
+ sigset_t sa_mask;
+};
+
+struct k_sigaction {
+ struct sigaction sa;
+};
+
+struct mm_rss_stat {
+ atomic_long_t count[4];
+};
+
+struct cpu_itimer {
+ u64 expires;
+ u64 incr;
+};
+
+struct task_cputime_atomic {
+ atomic64_t utime;
+ atomic64_t stime;
+ atomic64_t sum_exec_runtime;
+};
+
+struct thread_group_cputimer {
+ struct task_cputime_atomic cputime_atomic;
+};
+
+struct pacct_struct {
+ int ac_flag;
+ long int ac_exitcode;
+ long unsigned int ac_mem;
+ u64 ac_utime;
+ u64 ac_stime;
+ long unsigned int ac_minflt;
+ long unsigned int ac_majflt;
+};
+
+struct rw_semaphore {
+ atomic_long_t count;
+ atomic_long_t owner;
+ struct optimistic_spin_queue osq;
+ raw_spinlock_t wait_lock;
+ struct list_head wait_list;
+ void *magic;
+ struct lockdep_map dep_map;
+};
+
+struct core_state;
+
+struct tty_struct;
+
+struct taskstats;
+
+struct tty_audit_buf;
+
+struct signal_struct {
+ refcount_t sigcnt;
+ atomic_t live;
+ int nr_threads;
+ int quick_threads;
+ struct list_head thread_head;
+ wait_queue_head_t wait_chldexit;
+ struct task_struct *curr_target;
+ struct sigpending shared_pending;
+ struct hlist_head multiprocess;
+ int group_exit_code;
+ int notify_count;
+ struct task_struct *group_exec_task;
+ int group_stop_count;
+ unsigned int flags;
+ struct core_state *core_state;
+ unsigned int is_child_subreaper: 1;
+ unsigned int has_child_subreaper: 1;
+ int posix_timer_id;
+ struct list_head posix_timers;
+ struct hrtimer real_timer;
+ ktime_t it_real_incr;
+ struct cpu_itimer it[2];
+ struct thread_group_cputimer cputimer;
+ struct posix_cputimers posix_cputimers;
+ struct pid *pids[4];
+ struct pid *tty_old_pgrp;
+ int leader;
+ struct tty_struct *tty;
+ seqlock_t stats_lock;
+ u64 utime;
+ u64 stime;
+ u64 cutime;
+ u64 cstime;
+ u64 gtime;
+ u64 cgtime;
+ struct prev_cputime prev_cputime;
+ long unsigned int nvcsw;
+ long unsigned int nivcsw;
+ long unsigned int cnvcsw;
+ long unsigned int cnivcsw;
+ long unsigned int min_flt;
+ long unsigned int maj_flt;
+ long unsigned int cmin_flt;
+ long unsigned int cmaj_flt;
+ long unsigned int inblock;
+ long unsigned int oublock;
+ long unsigned int cinblock;
+ long unsigned int coublock;
+ long unsigned int maxrss;
+ long unsigned int cmaxrss;
+ struct task_io_accounting ioac;
+ long long unsigned int sum_sched_runtime;
+ struct rlimit rlim[16];
+ struct pacct_struct pacct;
+ struct taskstats *stats;
+ unsigned int audit_tty;
+ struct tty_audit_buf *tty_audit_buf;
+ bool oom_flag_origin;
+ short int oom_score_adj;
+ short int oom_score_adj_min;
+ struct mm_struct *oom_mm;
+ struct mutex cred_guard_mutex;
+ struct rw_semaphore exec_update_lock;
+};
+
+struct rseq {
+ __u32 cpu_id_start;
+ __u32 cpu_id;
+ __u64 rseq_cs;
+ __u32 flags;
+ long: 32;
+ long: 64;
+};
+
+struct rq;
+
+struct rq_flags;
+
+struct sched_class {
+ void (*enqueue_task)(struct rq *, struct task_struct *, int);
+ void (*dequeue_task)(struct rq *, struct task_struct *, int);
+ void (*yield_task)(struct rq *);
+ bool (*yield_to_task)(struct rq *, struct task_struct *);
+ void (*check_preempt_curr)(struct rq *, struct task_struct *, int);
+ struct task_struct * (*pick_next_task)(struct rq *);
+ void (*put_prev_task)(struct rq *, struct task_struct *);
+ void (*set_next_task)(struct rq *, struct task_struct *, bool);
+ int (*balance)(struct rq *, struct task_struct *, struct rq_flags *);
+ int (*select_task_rq)(struct task_struct *, int, int);
+ struct task_struct * (*pick_task)(struct rq *);
+ void (*migrate_task_rq)(struct task_struct *, int);
+ void (*task_woken)(struct rq *, struct task_struct *);
+ void (*set_cpus_allowed)(struct task_struct *, const struct cpumask *, u32);
+ void (*rq_online)(struct rq *);
+ void (*rq_offline)(struct rq *);
+ struct rq * (*find_lock_rq)(struct task_struct *, struct rq *);
+ void (*task_tick)(struct rq *, struct task_struct *, int);
+ void (*task_fork)(struct task_struct *);
+ void (*task_dead)(struct task_struct *);
+ void (*switched_from)(struct rq *, struct task_struct *);
+ void (*switched_to)(struct rq *, struct task_struct *);
+ void (*prio_changed)(struct rq *, struct task_struct *, int);
+ unsigned int (*get_rr_interval)(struct rq *, struct task_struct *);
+ void (*update_curr)(struct rq *);
+ void (*task_change_group)(struct task_struct *);
+};
+
+typedef struct lockdep_map *lockdep_map_p;
+
+struct maple_tree {
+ union {
+ spinlock_t ma_lock;
+ lockdep_map_p ma_external_lock;
+ };
+ void *ma_root;
+ unsigned int ma_flags;
+};
+
+struct ldt_struct;
+
+struct vdso_image;
+
+typedef struct {
+ u64 ctx_id;
+ atomic64_t tlb_gen;
+ struct rw_semaphore ldt_usr_sem;
+ struct ldt_struct *ldt;
+ short unsigned int flags;
+ struct mutex lock;
+ void *vdso;
+ const struct vdso_image *vdso_image;
+ atomic_t perf_rdpmc_allowed;
+ u16 pkey_allocation_map;
+ s16 execute_only_pkey;
+} mm_context_t;
+
+struct xol_area;
+
+struct uprobes_state {
+ struct xol_area *xol_area;
+};
+
+struct linux_binfmt;
+
+struct kioctx_table;
+
+struct user_namespace;
+
+struct mm_struct {
+ struct {
+ struct maple_tree mm_mt;
+ long unsigned int (*get_unmapped_area)(struct file *, long unsigned int, long unsigned int, long unsigned int, long unsigned int);
+ long unsigned int mmap_base;
+ long unsigned int mmap_legacy_base;
+ long unsigned int task_size;
+ pgd_t *pgd;
+ atomic_t membarrier_state;
+ atomic_t mm_users;
+ atomic_t mm_count;
+ atomic_long_t pgtables_bytes;
+ int map_count;
+ spinlock_t page_table_lock;
+ struct rw_semaphore mmap_lock;
+ struct list_head mmlist;
+ long unsigned int hiwater_rss;
+ long unsigned int hiwater_vm;
+ long unsigned int total_vm;
+ long unsigned int locked_vm;
+ atomic64_t pinned_vm;
+ long unsigned int data_vm;
+ long unsigned int exec_vm;
+ long unsigned int stack_vm;
+ long unsigned int def_flags;
+ seqcount_t write_protect_seq;
+ spinlock_t arg_lock;
+ long unsigned int start_code;
+ long unsigned int end_code;
+ long unsigned int start_data;
+ long unsigned int end_data;
+ long unsigned int start_brk;
+ long unsigned int brk;
+ long unsigned int start_stack;
+ long unsigned int arg_start;
+ long unsigned int arg_end;
+ long unsigned int env_start;
+ long unsigned int env_end;
+ long unsigned int saved_auxv[46];
+ struct mm_rss_stat rss_stat;
+ struct linux_binfmt *binfmt;
+ mm_context_t context;
+ long unsigned int flags;
+ spinlock_t ioctx_lock;
+ struct kioctx_table *ioctx_table;
+ struct task_struct *owner;
+ struct user_namespace *user_ns;
+ struct file *exe_file;
+ long unsigned int numa_next_scan;
+ long unsigned int numa_scan_offset;
+ int numa_scan_seq;
+ atomic_t tlb_flush_pending;
+ atomic_t tlb_flush_batched;
+ struct uprobes_state uprobes_state;
+ atomic_long_t hugetlb_usage;
+ struct work_struct async_put_work;
+ long unsigned int ksm_merging_pages;
+ long unsigned int ksm_rmap_items;
+ };
+ long unsigned int cpu_bitmap[0];
+};
+
+struct swait_queue_head {
+ raw_spinlock_t lock;
+ struct list_head task_list;
+};
+
+struct completion {
+ unsigned int done;
+ struct swait_queue_head wait;
+};
+
+struct kernel_cap_struct {
+ __u32 cap[2];
+};
+
+typedef struct kernel_cap_struct kernel_cap_t;
+
+struct user_struct;
+
+struct ucounts;
+
+struct group_info;
+
+struct cred {
+ atomic_t usage;
+ atomic_t subscribers;
+ void *put_addr;
+ unsigned int magic;
+ kuid_t uid;
+ kgid_t gid;
+ kuid_t suid;
+ kgid_t sgid;
+ kuid_t euid;
+ kgid_t egid;
+ kuid_t fsuid;
+ kgid_t fsgid;
+ unsigned int securebits;
+ kernel_cap_t cap_inheritable;
+ kernel_cap_t cap_permitted;
+ kernel_cap_t cap_effective;
+ kernel_cap_t cap_bset;
+ kernel_cap_t cap_ambient;
+ unsigned char jit_keyring;
+ struct key *session_keyring;
+ struct key *process_keyring;
+ struct key *thread_keyring;
+ struct key *request_key_auth;
+ void *security;
+ struct user_struct *user;
+ struct user_namespace *user_ns;
+ struct ucounts *ucounts;
+ struct group_info *group_info;
+ union {
+ int non_rcu;
+ struct callback_head rcu;
+ };
+};
+
+typedef int32_t key_serial_t;
+
+typedef uint32_t key_perm_t;
+
+struct key_type;
+
+struct key_tag;
+
+struct keyring_index_key {
+ long unsigned int hash;
+ union {
+ struct {
+ u16 desc_len;
+ char desc[6];
+ };
+ long unsigned int x;
+ };
+ struct key_type *type;
+ struct key_tag *domain_tag;
+ const char *description;
+};
+
+union key_payload {
+ void *rcu_data0;
+ void *data[4];
+};
+
+struct assoc_array_ptr;
+
+struct assoc_array {
+ struct assoc_array_ptr *root;
+ long unsigned int nr_leaves_on_tree;
+};
+
+struct key_user;
+
+struct key_restriction;
+
+struct key {
+ refcount_t usage;
+ key_serial_t serial;
+ union {
+ struct list_head graveyard_link;
+ struct rb_node serial_node;
+ };
+ struct rw_semaphore sem;
+ struct key_user *user;
+ void *security;
+ union {
+ time64_t expiry;
+ time64_t revoked_at;
+ };
+ time64_t last_used_at;
+ kuid_t uid;
+ kgid_t gid;
+ key_perm_t perm;
+ short unsigned int quotalen;
+ short unsigned int datalen;
+ short int state;
+ long unsigned int flags;
+ union {
+ struct keyring_index_key index_key;
+ struct {
+ long unsigned int hash;
+ long unsigned int len_desc;
+ struct key_type *type;
+ struct key_tag *domain_tag;
+ char *description;
+ };
+ };
+ union {
+ union key_payload payload;
+ struct {
+ struct list_head name_link;
+ struct assoc_array keys;
+ };
+ };
+ struct key_restriction *restrict_link;
+};
+
+struct sighand_struct {
+ spinlock_t siglock;
+ refcount_t count;
+ wait_queue_head_t signalfd_wqh;
+ struct k_sigaction action[64];
+};
+
+struct io_context {
+ atomic_long_t refcount;
+ atomic_t active_ref;
+ short unsigned int ioprio;
+};
+
+enum uprobe_task_state {
+ UTASK_RUNNING = 0,
+ UTASK_SSTEP = 1,
+ UTASK_SSTEP_ACK = 2,
+ UTASK_SSTEP_TRAPPED = 3,
+};
+
+struct arch_uprobe_task {
+ long unsigned int saved_scratch_register;
+ unsigned int saved_trap_nr;
+ unsigned int saved_tf;
+};
+
+struct uprobe;
+
+struct return_instance;
+
+struct uprobe_task {
+ enum uprobe_task_state state;
+ union {
+ struct {
+ struct arch_uprobe_task autask;
+ long unsigned int vaddr;
+ };
+ struct {
+ struct callback_head dup_xol_work;
+ long unsigned int dup_xol_addr;
+ };
+ };
+ struct uprobe *active_uprobe;
+ long unsigned int xol_vaddr;
+ struct return_instance *return_instances;
+ unsigned int depth;
+};
+
+struct vm_struct {
+ struct vm_struct *next;
+ void *addr;
+ long unsigned int size;
+ long unsigned int flags;
+ struct page **pages;
+ unsigned int page_order;
+ unsigned int nr_pages;
+ phys_addr_t phys_addr;
+ const void *caller;
+};
+
+struct kstat {
+ u32 result_mask;
+ umode_t mode;
+ unsigned int nlink;
+ uint32_t blksize;
+ u64 attributes;
+ u64 attributes_mask;
+ u64 ino;
+ dev_t dev;
+ dev_t rdev;
+ kuid_t uid;
+ kgid_t gid;
+ loff_t size;
+ struct timespec64 atime;
+ struct timespec64 mtime;
+ struct timespec64 ctime;
+ struct timespec64 btime;
+ u64 blocks;
+ u64 mnt_id;
+ u32 dio_mem_align;
+ u32 dio_offset_align;
+};
+
+struct kref {
+ refcount_t refcount;
+};
+
+struct rcu_segcblist {
+ struct callback_head *head;
+ struct callback_head **tails[4];
+ long unsigned int gp_seq[4];
+ long int len;
+ long int seglen[4];
+ u8 flags;
+};
+
+struct srcu_node;
+
+struct srcu_struct;
+
+struct srcu_data {
+ long unsigned int srcu_lock_count[2];
+ long unsigned int srcu_unlock_count[2];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ spinlock_t lock;
+ struct rcu_segcblist srcu_cblist;
+ long unsigned int srcu_gp_seq_needed;
+ long unsigned int srcu_gp_seq_needed_exp;
+ bool srcu_cblist_invoking;
+ struct timer_list delay_work;
+ struct work_struct work;
+ struct callback_head srcu_barrier_head;
+ struct srcu_node *mynode;
+ long unsigned int grpmask;
+ int cpu;
+ struct srcu_struct *ssp;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct srcu_node {
+ spinlock_t lock;
+ long unsigned int srcu_have_cbs[4];
+ long unsigned int srcu_data_have_cbs[4];
+ long unsigned int srcu_gp_seq_needed_exp;
+ struct srcu_node *srcu_parent;
+ int grplo;
+ int grphi;
+};
+
+struct srcu_struct {
+ struct srcu_node *node;
+ struct srcu_node *level[3];
+ int srcu_size_state;
+ struct mutex srcu_cb_mutex;
+ spinlock_t lock;
+ struct mutex srcu_gp_mutex;
+ unsigned int srcu_idx;
+ long unsigned int srcu_gp_seq;
+ long unsigned int srcu_gp_seq_needed;
+ long unsigned int srcu_gp_seq_needed_exp;
+ long unsigned int srcu_gp_start;
+ long unsigned int srcu_last_gp_end;
+ long unsigned int srcu_size_jiffies;
+ long unsigned int srcu_n_lock_retries;
+ long unsigned int srcu_n_exp_nodelay;
+ struct srcu_data *sda;
+ bool sda_is_static;
+ long unsigned int srcu_barrier_seq;
+ struct mutex srcu_barrier_mutex;
+ struct completion srcu_barrier_completion;
+ atomic_t srcu_barrier_cpu_cnt;
+ long unsigned int reschedule_jiffies;
+ long unsigned int reschedule_count;
+ struct delayed_work work;
+ struct lockdep_map dep_map;
+};
+
+struct return_instance {
+ struct uprobe *uprobe;
+ long unsigned int func;
+ long unsigned int stack;
+ long unsigned int orig_ret_vaddr;
+ bool chained;
+ struct return_instance *next;
+};
+
+struct vdso_image {
+ void *data;
+ long unsigned int size;
+ long unsigned int alt;
+ long unsigned int alt_len;
+ long unsigned int extable_base;
+ long unsigned int extable_len;
+ const void *extable;
+ long int sym_vvar_start;
+ long int sym_vvar_page;
+ long int sym_pvclock_page;
+ long int sym_hvclock_page;
+ long int sym_timens_page;
+ long int sym_VDSO32_NOTE_MASK;
+ long int sym___kernel_sigreturn;
+ long int sym___kernel_rt_sigreturn;
+ long int sym___kernel_vsyscall;
+ long int sym_int80_landing_pad;
+ long int sym_vdso32_sigreturn_landing_pad;
+ long int sym_vdso32_rt_sigreturn_landing_pad;
+};
+
+struct xarray {
+ spinlock_t xa_lock;
+ gfp_t xa_flags;
+ void *xa_head;
+};
+
+typedef u32 errseq_t;
+
+struct address_space_operations;
+
+struct address_space {
+ struct inode *host;
+ struct xarray i_pages;
+ struct rw_semaphore invalidate_lock;
+ gfp_t gfp_mask;
+ atomic_t i_mmap_writable;
+ struct rb_root_cached i_mmap;
+ struct rw_semaphore i_mmap_rwsem;
+ long unsigned int nrpages;
+ long unsigned int writeback_index;
+ const struct address_space_operations *a_ops;
+ long unsigned int flags;
+ errseq_t wb_err;
+ spinlock_t private_lock;
+ struct list_head private_list;
+ void *private_data;
+};
+
+struct folio {
+ union {
+ struct {
+ long unsigned int flags;
+ union {
+ struct list_head lru;
+ struct {
+ void *__filler;
+ unsigned int mlock_count;
+ };
+ };
+ struct address_space *mapping;
+ long unsigned int index;
+ void *private;
+ atomic_t _mapcount;
+ atomic_t _refcount;
+ long unsigned int memcg_data;
+ };
+ struct page page;
+ };
+ long unsigned int _flags_1;
+ long unsigned int __head;
+ unsigned char _folio_dtor;
+ unsigned char _folio_order;
+ atomic_t _total_mapcount;
+ atomic_t _pincount;
+ unsigned int _folio_nr_pages;
+};
+
+struct vfsmount;
+
+struct path {
+ struct vfsmount *mnt;
+ struct dentry *dentry;
+};
+
+struct fown_struct {
+ rwlock_t lock;
+ struct pid *pid;
+ enum pid_type pid_type;
+ kuid_t uid;
+ kuid_t euid;
+ int signum;
+};
+
+struct file_ra_state {
+ long unsigned int start;
+ unsigned int size;
+ unsigned int async_size;
+ unsigned int ra_pages;
+ unsigned int mmap_miss;
+ loff_t prev_pos;
+};
+
+struct file {
+ union {
+ struct llist_node f_llist;
+ struct callback_head f_rcuhead;
+ unsigned int f_iocb_flags;
+ };
+ struct path f_path;
+ struct inode *f_inode;
+ const struct file_operations *f_op;
+ spinlock_t f_lock;
+ atomic_long_t f_count;
+ unsigned int f_flags;
+ fmode_t f_mode;
+ struct mutex f_pos_lock;
+ loff_t f_pos;
+ struct fown_struct f_owner;
+ const struct cred *f_cred;
+ struct file_ra_state f_ra;
+ u64 f_version;
+ void *f_security;
+ void *private_data;
+ struct hlist_head *f_ep;
+ struct address_space *f_mapping;
+ errseq_t f_wb_err;
+ errseq_t f_sb_err;
+};
+
+struct userfaultfd_ctx;
+
+struct vm_userfaultfd_ctx {
+ struct userfaultfd_ctx *ctx;
+};
+
+struct anon_vma_name {
+ struct kref kref;
+ char name[0];
+};
+
+struct anon_vma;
+
+struct vm_operations_struct;
+
+struct vm_area_struct {
+ long unsigned int vm_start;
+ long unsigned int vm_end;
+ struct mm_struct *vm_mm;
+ pgprot_t vm_page_prot;
+ long unsigned int vm_flags;
+ union {
+ struct {
+ struct rb_node rb;
+ long unsigned int rb_subtree_last;
+ } shared;
+ struct anon_vma_name *anon_name;
+ };
+ struct list_head anon_vma_chain;
+ struct anon_vma *anon_vma;
+ const struct vm_operations_struct *vm_ops;
+ long unsigned int vm_pgoff;
+ struct file *vm_file;
+ void *vm_private_data;
+ atomic_long_t swap_readahead_info;
+ struct mempolicy *vm_policy;
+ struct vm_userfaultfd_ctx vm_userfaultfd_ctx;
+};
+
+typedef unsigned int vm_fault_t;
+
+enum page_entry_size {
+ PE_SIZE_PTE = 0,
+ PE_SIZE_PMD = 1,
+ PE_SIZE_PUD = 2,
+};
+
+struct vm_fault;
+
+struct vm_operations_struct {
+ void (*open)(struct vm_area_struct *);
+ void (*close)(struct vm_area_struct *);
+ int (*may_split)(struct vm_area_struct *, long unsigned int);
+ int (*mremap)(struct vm_area_struct *);
+ int (*mprotect)(struct vm_area_struct *, long unsigned int, long unsigned int, long unsigned int);
+ vm_fault_t (*fault)(struct vm_fault *);
+ vm_fault_t (*huge_fault)(struct vm_fault *, enum page_entry_size);
+ vm_fault_t (*map_pages)(struct vm_fault *, long unsigned int, long unsigned int);
+ long unsigned int (*pagesize)(struct vm_area_struct *);
+ vm_fault_t (*page_mkwrite)(struct vm_fault *);
+ vm_fault_t (*pfn_mkwrite)(struct vm_fault *);
+ int (*access)(struct vm_area_struct *, long unsigned int, void *, int, int);
+ const char * (*name)(struct vm_area_struct *);
+ int (*set_policy)(struct vm_area_struct *, struct mempolicy *);
+ struct mempolicy * (*get_policy)(struct vm_area_struct *, long unsigned int);
+ struct page * (*find_special_page)(struct vm_area_struct *, long unsigned int);
+};
+
+struct iovec {
+ void *iov_base;
+ __kernel_size_t iov_len;
+};
+
+struct kvec {
+ void *iov_base;
+ size_t iov_len;
+};
+
+struct bio_vec {
+ struct page *bv_page;
+ unsigned int bv_len;
+ unsigned int bv_offset;
+};
+
+struct iov_iter {
+ u8 iter_type;
+ bool nofault;
+ bool data_source;
+ bool user_backed;
+ union {
+ size_t iov_offset;
+ int last_offset;
+ };
+ size_t count;
+ union {
+ const struct iovec *iov;
+ const struct kvec *kvec;
+ const struct bio_vec *bvec;
+ struct xarray *xarray;
+ struct pipe_inode_info *pipe;
+ void *ubuf;
+ };
+ union {
+ long unsigned int nr_segs;
+ struct {
+ unsigned int head;
+ unsigned int start_head;
+ };
+ loff_t xarray_start;
+ };
+};
+
+struct wait_page_queue;
+
+struct kiocb {
+ struct file *ki_filp;
+ loff_t ki_pos;
+ void (*ki_complete)(struct kiocb *, long int);
+ void *private;
+ int ki_flags;
+ u16 ki_ioprio;
+ struct wait_page_queue *ki_waitq;
+};
+
+struct hlist_bl_node;
+
+struct hlist_bl_head {
+ struct hlist_bl_node *first;
+};
+
+struct hlist_bl_node {
+ struct hlist_bl_node *next;
+ struct hlist_bl_node **pprev;
+};
+
+struct lockref {
+ union {
+ struct {
+ spinlock_t lock;
+ int count;
+ };
+ };
+};
+
+struct qstr {
+ union {
+ struct {
+ u32 hash;
+ u32 len;
+ };
+ u64 hash_len;
+ };
+ const unsigned char *name;
+};
+
+struct dentry_operations;
+
+struct dentry {
+ unsigned int d_flags;
+ seqcount_spinlock_t d_seq;
+ struct hlist_bl_node d_hash;
+ struct dentry *d_parent;
+ struct qstr d_name;
+ struct inode *d_inode;
+ unsigned char d_iname[32];
+ struct lockref d_lockref;
+ const struct dentry_operations *d_op;
+ struct super_block *d_sb;
+ long unsigned int d_time;
+ void *d_fsdata;
+ union {
+ struct list_head d_lru;
+ wait_queue_head_t *d_wait;
+ };
+ struct list_head d_child;
+ struct list_head d_subdirs;
+ union {
+ struct hlist_node d_alias;
+ struct hlist_bl_node d_in_lookup_hash;
+ struct callback_head d_rcu;
+ } d_u;
+};
+
+struct posix_acl;
+
+struct inode_operations;
+
+struct bdi_writeback;
+
+struct file_lock_context;
+
+struct cdev;
+
+struct fsnotify_mark_connector;
+
+struct inode {
+ umode_t i_mode;
+ short unsigned int i_opflags;
+ kuid_t i_uid;
+ kgid_t i_gid;
+ unsigned int i_flags;
+ struct posix_acl *i_acl;
+ struct posix_acl *i_default_acl;
+ const struct inode_operations *i_op;
+ struct super_block *i_sb;
+ struct address_space *i_mapping;
+ void *i_security;
+ long unsigned int i_ino;
+ union {
+ const unsigned int i_nlink;
+ unsigned int __i_nlink;
+ };
+ dev_t i_rdev;
+ loff_t i_size;
+ struct timespec64 i_atime;
+ struct timespec64 i_mtime;
+ struct timespec64 i_ctime;
+ spinlock_t i_lock;
+ short unsigned int i_bytes;
+ u8 i_blkbits;
+ u8 i_write_hint;
+ blkcnt_t i_blocks;
+ long unsigned int i_state;
+ struct rw_semaphore i_rwsem;
+ long unsigned int dirtied_when;
+ long unsigned int dirtied_time_when;
+ struct hlist_node i_hash;
+ struct list_head i_io_list;
+ struct bdi_writeback *i_wb;
+ int i_wb_frn_winner;
+ u16 i_wb_frn_avg_time;
+ u16 i_wb_frn_history;
+ struct list_head i_lru;
+ struct list_head i_sb_list;
+ struct list_head i_wb_list;
+ union {
+ struct hlist_head i_dentry;
+ struct callback_head i_rcu;
+ };
+ atomic64_t i_version;
+ atomic64_t i_sequence;
+ atomic_t i_count;
+ atomic_t i_dio_count;
+ atomic_t i_writecount;
+ atomic_t i_readcount;
+ union {
+ const struct file_operations *i_fop;
+ void (*free_inode)(struct inode *);
+ };
+ struct file_lock_context *i_flctx;
+ struct address_space i_data;
+ struct list_head i_devices;
+ union {
+ struct pipe_inode_info *i_pipe;
+ struct cdev *i_cdev;
+ char *i_link;
+ unsigned int i_dir_seq;
+ };
+ __u32 i_generation;
+ __u32 i_fsnotify_mask;
+ struct fsnotify_mark_connector *i_fsnotify_marks;
+ void *i_private;
+};
+
+struct dentry_operations {
+ int (*d_revalidate)(struct dentry *, unsigned int);
+ int (*d_weak_revalidate)(struct dentry *, unsigned int);
+ int (*d_hash)(const struct dentry *, struct qstr *);
+ int (*d_compare)(const struct dentry *, unsigned int, const char *, const struct qstr *);
+ int (*d_delete)(const struct dentry *);
+ int (*d_init)(struct dentry *);
+ void (*d_release)(struct dentry *);
+ void (*d_prune)(struct dentry *);
+ void (*d_iput)(struct dentry *, struct inode *);
+ char * (*d_dname)(struct dentry *, char *, int);
+ struct vfsmount * (*d_automount)(struct path *);
+ int (*d_manage)(const struct path *, bool);
+ struct dentry * (*d_real)(struct dentry *, const struct inode *);
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct mtd_info;
+
+typedef long long int qsize_t;
+
+struct quota_format_type;
+
+struct mem_dqinfo {
+ struct quota_format_type *dqi_format;
+ int dqi_fmt_id;
+ struct list_head dqi_dirty_list;
+ long unsigned int dqi_flags;
+ unsigned int dqi_bgrace;
+ unsigned int dqi_igrace;
+ qsize_t dqi_max_spc_limit;
+ qsize_t dqi_max_ino_limit;
+ void *dqi_priv;
+};
+
+struct quota_format_ops;
+
+struct quota_info {
+ unsigned int flags;
+ struct rw_semaphore dqio_sem;
+ struct inode *files[3];
+ struct mem_dqinfo info[3];
+ const struct quota_format_ops *ops[3];
+};
+
+struct rcu_sync {
+ int gp_state;
+ int gp_count;
+ wait_queue_head_t gp_wait;
+ struct callback_head cb_head;
+};
+
+struct rcuwait {
+ struct task_struct *task;
+};
+
+struct percpu_rw_semaphore {
+ struct rcu_sync rss;
+ unsigned int *read_count;
+ struct rcuwait writer;
+ wait_queue_head_t waiters;
+ atomic_t block;
+ struct lockdep_map dep_map;
+};
+
+struct sb_writers {
+ int frozen;
+ wait_queue_head_t wait_unfrozen;
+ struct percpu_rw_semaphore rw_sem[3];
+};
+
+typedef struct {
+ __u8 b[16];
+} uuid_t;
+
+struct shrink_control;
+
+struct shrinker {
+ long unsigned int (*count_objects)(struct shrinker *, struct shrink_control *);
+ long unsigned int (*scan_objects)(struct shrinker *, struct shrink_control *);
+ long int batch;
+ int seeks;
+ unsigned int flags;
+ struct list_head list;
+ int id;
+ atomic_long_t *nr_deferred;
+};
+
+struct list_lru_node;
+
+struct list_lru {
+ struct list_lru_node *node;
+ struct list_head list;
+ int shrinker_id;
+ bool memcg_aware;
+ struct xarray xa;
+};
+
+struct super_operations;
+
+struct dquot_operations;
+
+struct quotactl_ops;
+
+struct export_operations;
+
+struct xattr_handler;
+
+struct block_device;
+
+struct super_block {
+ struct list_head s_list;
+ dev_t s_dev;
+ unsigned char s_blocksize_bits;
+ long unsigned int s_blocksize;
+ loff_t s_maxbytes;
+ struct file_system_type *s_type;
+ const struct super_operations *s_op;
+ const struct dquot_operations *dq_op;
+ const struct quotactl_ops *s_qcop;
+ const struct export_operations *s_export_op;
+ long unsigned int s_flags;
+ long unsigned int s_iflags;
+ long unsigned int s_magic;
+ struct dentry *s_root;
+ struct rw_semaphore s_umount;
+ int s_count;
+ atomic_t s_active;
+ void *s_security;
+ const struct xattr_handler **s_xattr;
+ struct hlist_bl_head s_roots;
+ struct list_head s_mounts;
+ struct block_device *s_bdev;
+ struct backing_dev_info *s_bdi;
+ struct mtd_info *s_mtd;
+ struct hlist_node s_instances;
+ unsigned int s_quota_types;
+ struct quota_info s_dquot;
+ struct sb_writers s_writers;
+ void *s_fs_info;
+ u32 s_time_gran;
+ time64_t s_time_min;
+ time64_t s_time_max;
+ __u32 s_fsnotify_mask;
+ struct fsnotify_mark_connector *s_fsnotify_marks;
+ char s_id[32];
+ uuid_t s_uuid;
+ unsigned int s_max_links;
+ fmode_t s_mode;
+ struct mutex s_vfs_rename_mutex;
+ const char *s_subtype;
+ const struct dentry_operations *s_d_op;
+ struct shrinker s_shrink;
+ atomic_long_t s_remove_count;
+ atomic_long_t s_fsnotify_connectors;
+ int s_readonly_remount;
+ errseq_t s_wb_err;
+ struct workqueue_struct *s_dio_done_wq;
+ struct hlist_head s_pins;
+ struct user_namespace *s_user_ns;
+ struct list_lru s_dentry_lru;
+ struct list_lru s_inode_lru;
+ struct callback_head rcu;
+ struct work_struct destroy_work;
+ struct mutex s_sync_lock;
+ int s_stack_depth;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ spinlock_t s_inode_list_lock;
+ struct list_head s_inodes;
+ spinlock_t s_inode_wblist_lock;
+ struct list_head s_inodes_wb;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct vfsmount {
+ struct dentry *mnt_root;
+ struct super_block *mnt_sb;
+ int mnt_flags;
+ struct user_namespace *mnt_userns;
+};
+
+struct shrink_control {
+ gfp_t gfp_mask;
+ int nid;
+ long unsigned int nr_to_scan;
+ long unsigned int nr_scanned;
+ struct mem_cgroup *memcg;
+};
+
+struct list_lru_one {
+ struct list_head list;
+ long int nr_items;
+};
+
+struct list_lru_node {
+ spinlock_t lock;
+ struct list_lru_one lru;
+ long int nr_items;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+enum migrate_mode {
+ MIGRATE_ASYNC = 0,
+ MIGRATE_SYNC_LIGHT = 1,
+ MIGRATE_SYNC = 2,
+ MIGRATE_SYNC_NO_COPY = 3,
+};
+
+struct exception_table_entry {
+ int insn;
+ int fixup;
+ int data;
+};
+
+struct key_tag {
+ struct callback_head rcu;
+ refcount_t usage;
+ bool removed;
+};
+
+typedef int (*request_key_actor_t)(struct key *, void *);
+
+struct key_preparsed_payload;
+
+struct key_match_data;
+
+struct kernel_pkey_params;
+
+struct kernel_pkey_query;
+
+struct key_type {
+ const char *name;
+ size_t def_datalen;
+ unsigned int flags;
+ int (*vet_description)(const char *);
+ int (*preparse)(struct key_preparsed_payload *);
+ void (*free_preparse)(struct key_preparsed_payload *);
+ int (*instantiate)(struct key *, struct key_preparsed_payload *);
+ int (*update)(struct key *, struct key_preparsed_payload *);
+ int (*match_preparse)(struct key_match_data *);
+ void (*match_free)(struct key_match_data *);
+ void (*revoke)(struct key *);
+ void (*destroy)(struct key *);
+ void (*describe)(const struct key *, struct seq_file *);
+ long int (*read)(const struct key *, char *, size_t);
+ request_key_actor_t request_key;
+ struct key_restriction * (*lookup_restriction)(const char *);
+ int (*asym_query)(const struct kernel_pkey_params *, struct kernel_pkey_query *);
+ int (*asym_eds_op)(struct kernel_pkey_params *, const void *, void *);
+ int (*asym_verify_signature)(struct kernel_pkey_params *, const void *, const void *);
+ struct list_head link;
+ struct lock_class_key lock_class;
+};
+
+typedef int (*key_restrict_link_func_t)(struct key *, const struct key_type *, const union key_payload *, struct key *);
+
+struct key_restriction {
+ key_restrict_link_func_t check;
+ struct key *key;
+ struct key_type *keytype;
+};
+
+struct percpu_counter {
+ raw_spinlock_t lock;
+ s64 count;
+ struct list_head list;
+ s32 *counters;
+};
+
+struct user_struct {
+ refcount_t __count;
+ struct percpu_counter epoll_watches;
+ long unsigned int unix_inflight;
+ atomic_long_t pipe_bufs;
+ struct hlist_node uidhash_node;
+ kuid_t uid;
+ atomic_long_t locked_vm;
+ struct ratelimit_state ratelimit;
+};
+
+struct group_info {
+ atomic_t usage;
+ int ngroups;
+ kgid_t gid[0];
+};
+
+struct core_thread {
+ struct task_struct *task;
+ struct core_thread *next;
+};
+
+struct core_state {
+ atomic_t nr_threads;
+ struct core_thread dumper;
+ struct completion startup;
+};
+
+struct delayed_call {
+ void (*fn)(void *);
+ void *arg;
+};
+
+typedef struct {
+ uid_t val;
+} vfsuid_t;
+
+typedef struct {
+ gid_t val;
+} vfsgid_t;
+
+struct iattr {
+ unsigned int ia_valid;
+ umode_t ia_mode;
+ union {
+ kuid_t ia_uid;
+ vfsuid_t ia_vfsuid;
+ };
+ union {
+ kgid_t ia_gid;
+ vfsgid_t ia_vfsgid;
+ };
+ loff_t ia_size;
+ struct timespec64 ia_atime;
+ struct timespec64 ia_mtime;
+ struct timespec64 ia_ctime;
+ struct file *ia_file;
+};
+
+typedef __kernel_uid32_t projid_t;
+
+typedef struct {
+ projid_t val;
+} kprojid_t;
+
+enum quota_type {
+ USRQUOTA = 0,
+ GRPQUOTA = 1,
+ PRJQUOTA = 2,
+};
+
+struct kqid {
+ union {
+ kuid_t uid;
+ kgid_t gid;
+ kprojid_t projid;
+ };
+ enum quota_type type;
+};
+
+struct mem_dqblk {
+ qsize_t dqb_bhardlimit;
+ qsize_t dqb_bsoftlimit;
+ qsize_t dqb_curspace;
+ qsize_t dqb_rsvspace;
+ qsize_t dqb_ihardlimit;
+ qsize_t dqb_isoftlimit;
+ qsize_t dqb_curinodes;
+ time64_t dqb_btime;
+ time64_t dqb_itime;
+};
+
+struct dquot {
+ struct hlist_node dq_hash;
+ struct list_head dq_inuse;
+ struct list_head dq_free;
+ struct list_head dq_dirty;
+ struct mutex dq_lock;
+ spinlock_t dq_dqb_lock;
+ atomic_t dq_count;
+ struct super_block *dq_sb;
+ struct kqid dq_id;
+ loff_t dq_off;
+ long unsigned int dq_flags;
+ struct mem_dqblk dq_dqb;
+};
+
+struct quota_format_type {
+ int qf_fmt_id;
+ const struct quota_format_ops *qf_ops;
+ struct module *qf_owner;
+ struct quota_format_type *qf_next;
+};
+
+struct quota_format_ops {
+ int (*check_quota_file)(struct super_block *, int);
+ int (*read_file_info)(struct super_block *, int);
+ int (*write_file_info)(struct super_block *, int);
+ int (*free_file_info)(struct super_block *, int);
+ int (*read_dqblk)(struct dquot *);
+ int (*commit_dqblk)(struct dquot *);
+ int (*release_dqblk)(struct dquot *);
+ int (*get_next_id)(struct super_block *, struct kqid *);
+};
+
+struct dquot_operations {
+ int (*write_dquot)(struct dquot *);
+ struct dquot * (*alloc_dquot)(struct super_block *, int);
+ void (*destroy_dquot)(struct dquot *);
+ int (*acquire_dquot)(struct dquot *);
+ int (*release_dquot)(struct dquot *);
+ int (*mark_dirty)(struct dquot *);
+ int (*write_info)(struct super_block *, int);
+ qsize_t * (*get_reserved_space)(struct inode *);
+ int (*get_projid)(struct inode *, kprojid_t *);
+ int (*get_inode_usage)(struct inode *, qsize_t *);
+ int (*get_next_id)(struct super_block *, struct kqid *);
+};
+
+struct qc_dqblk {
+ int d_fieldmask;
+ u64 d_spc_hardlimit;
+ u64 d_spc_softlimit;
+ u64 d_ino_hardlimit;
+ u64 d_ino_softlimit;
+ u64 d_space;
+ u64 d_ino_count;
+ s64 d_ino_timer;
+ s64 d_spc_timer;
+ int d_ino_warns;
+ int d_spc_warns;
+ u64 d_rt_spc_hardlimit;
+ u64 d_rt_spc_softlimit;
+ u64 d_rt_space;
+ s64 d_rt_spc_timer;
+ int d_rt_spc_warns;
+};
+
+struct qc_type_state {
+ unsigned int flags;
+ unsigned int spc_timelimit;
+ unsigned int ino_timelimit;
+ unsigned int rt_spc_timelimit;
+ unsigned int spc_warnlimit;
+ unsigned int ino_warnlimit;
+ unsigned int rt_spc_warnlimit;
+ long long unsigned int ino;
+ blkcnt_t blocks;
+ blkcnt_t nextents;
+};
+
+struct qc_state {
+ unsigned int s_incoredqs;
+ struct qc_type_state s_state[3];
+};
+
+struct qc_info {
+ int i_fieldmask;
+ unsigned int i_flags;
+ unsigned int i_spc_timelimit;
+ unsigned int i_ino_timelimit;
+ unsigned int i_rt_spc_timelimit;
+ unsigned int i_spc_warnlimit;
+ unsigned int i_ino_warnlimit;
+ unsigned int i_rt_spc_warnlimit;
+};
+
+struct quotactl_ops {
+ int (*quota_on)(struct super_block *, int, int, const struct path *);
+ int (*quota_off)(struct super_block *, int);
+ int (*quota_enable)(struct super_block *, unsigned int);
+ int (*quota_disable)(struct super_block *, unsigned int);
+ int (*quota_sync)(struct super_block *, int);
+ int (*set_info)(struct super_block *, int, struct qc_info *);
+ int (*get_dqblk)(struct super_block *, struct kqid, struct qc_dqblk *);
+ int (*get_nextdqblk)(struct super_block *, struct kqid *, struct qc_dqblk *);
+ int (*set_dqblk)(struct super_block *, struct kqid, struct qc_dqblk *);
+ int (*get_state)(struct super_block *, struct qc_state *);
+ int (*rm_xquota)(struct super_block *, unsigned int);
+};
+
+enum module_state {
+ MODULE_STATE_LIVE = 0,
+ MODULE_STATE_COMING = 1,
+ MODULE_STATE_GOING = 2,
+ MODULE_STATE_UNFORMED = 3,
+};
+
+struct kset;
+
+struct kobj_type;
+
+struct kernfs_node;
+
+struct kobject {
+ const char *name;
+ struct list_head entry;
+ struct kobject *parent;
+ struct kset *kset;
+ const struct kobj_type *ktype;
+ struct kernfs_node *sd;
+ struct kref kref;
+ unsigned int state_initialized: 1;
+ unsigned int state_in_sysfs: 1;
+ unsigned int state_add_uevent_sent: 1;
+ unsigned int state_remove_uevent_sent: 1;
+ unsigned int uevent_suppress: 1;
+};
+
+struct module_param_attrs;
+
+struct module_kobject {
+ struct kobject kobj;
+ struct module *mod;
+ struct kobject *drivers_dir;
+ struct module_param_attrs *mp;
+ struct completion *kobj_completion;
+};
+
+struct latch_tree_node {
+ struct rb_node node[2];
+};
+
+struct mod_tree_node {
+ struct module *mod;
+ struct latch_tree_node node;
+};
+
+struct module_layout {
+ void *base;
+ unsigned int size;
+ unsigned int text_size;
+ unsigned int ro_size;
+ unsigned int ro_after_init_size;
+ struct mod_tree_node mtn;
+};
+
+struct mod_arch_specific {
+ unsigned int num_orcs;
+ int *orc_unwind_ip;
+ struct orc_entry *orc_unwind;
+};
+
+struct elf64_sym;
+
+typedef struct elf64_sym Elf64_Sym;
+
+struct mod_kallsyms {
+ Elf64_Sym *symtab;
+ unsigned int num_symtab;
+ char *strtab;
+ char *typetab;
+};
+
+struct module_attribute;
+
+struct kernel_param;
+
+struct module_sect_attrs;
+
+struct module_notes_attrs;
+
+struct trace_event_call;
+
+struct trace_eval_map;
+
+struct error_injection_entry;
+
+struct module {
+ enum module_state state;
+ struct list_head list;
+ char name[56];
+ struct module_kobject mkobj;
+ struct module_attribute *modinfo_attrs;
+ const char *version;
+ const char *srcversion;
+ struct kobject *holders_dir;
+ const struct kernel_symbol *syms;
+ const s32 *crcs;
+ unsigned int num_syms;
+ struct mutex param_lock;
+ struct kernel_param *kp;
+ unsigned int num_kp;
+ unsigned int num_gpl_syms;
+ const struct kernel_symbol *gpl_syms;
+ const s32 *gpl_crcs;
+ bool using_gplonly_symbols;
+ bool sig_ok;
+ bool async_probe_requested;
+ unsigned int num_exentries;
+ struct exception_table_entry *extable;
+ int (*init)();
+ long: 64;
+ long: 64;
+ struct module_layout core_layout;
+ struct module_layout init_layout;
+ struct mod_arch_specific arch;
+ long unsigned int taints;
+ unsigned int num_bugs;
+ struct list_head bug_list;
+ struct bug_entry *bug_table;
+ struct mod_kallsyms *kallsyms;
+ struct mod_kallsyms core_kallsyms;
+ struct module_sect_attrs *sect_attrs;
+ struct module_notes_attrs *notes_attrs;
+ char *args;
+ void *percpu;
+ unsigned int percpu_size;
+ void *noinstr_text_start;
+ unsigned int noinstr_text_size;
+ unsigned int num_tracepoints;
+ tracepoint_ptr_t *tracepoints_ptrs;
+ unsigned int num_srcu_structs;
+ struct srcu_struct **srcu_struct_ptrs;
+ unsigned int num_bpf_raw_events;
+ struct bpf_raw_event_map *bpf_raw_events;
+ unsigned int btf_data_size;
+ void *btf_data;
+ struct jump_entry *jump_entries;
+ unsigned int num_jump_entries;
+ unsigned int num_trace_bprintk_fmt;
+ const char **trace_bprintk_fmt_start;
+ struct trace_event_call **trace_events;
+ unsigned int num_trace_events;
+ struct trace_eval_map **trace_evals;
+ unsigned int num_trace_evals;
+ unsigned int num_ftrace_callsites;
+ long unsigned int *ftrace_callsites;
+ void *kprobes_text_start;
+ unsigned int kprobes_text_size;
+ long unsigned int *kprobe_blacklist;
+ unsigned int num_kprobe_blacklist;
+ int num_static_call_sites;
+ struct static_call_site *static_call_sites;
+ struct list_head source_list;
+ struct list_head target_list;
+ void (*exit)();
+ atomic_t refcnt;
+ struct error_injection_entry *ei_funcs;
+ unsigned int num_ei_funcs;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct writeback_control;
+
+struct readahead_control;
+
+struct swap_info_struct;
+
+struct address_space_operations {
+ int (*writepage)(struct page *, struct writeback_control *);
+ int (*read_folio)(struct file *, struct folio *);
+ int (*writepages)(struct address_space *, struct writeback_control *);
+ bool (*dirty_folio)(struct address_space *, struct folio *);
+ void (*readahead)(struct readahead_control *);
+ int (*write_begin)(struct file *, struct address_space *, loff_t, unsigned int, struct page **, void **);
+ int (*write_end)(struct file *, struct address_space *, loff_t, unsigned int, unsigned int, struct page *, void *);
+ sector_t (*bmap)(struct address_space *, sector_t);
+ void (*invalidate_folio)(struct folio *, size_t, size_t);
+ bool (*release_folio)(struct folio *, gfp_t);
+ void (*free_folio)(struct folio *);
+ ssize_t (*direct_IO)(struct kiocb *, struct iov_iter *);
+ int (*migrate_folio)(struct address_space *, struct folio *, struct folio *, enum migrate_mode);
+ int (*launder_folio)(struct folio *);
+ bool (*is_partially_uptodate)(struct folio *, size_t, size_t);
+ void (*is_dirty_writeback)(struct folio *, bool *, bool *);
+ int (*error_remove_page)(struct address_space *, struct page *);
+ int (*swap_activate)(struct swap_info_struct *, struct file *, sector_t *);
+ void (*swap_deactivate)(struct file *);
+ int (*swap_rw)(struct kiocb *, struct iov_iter *);
+};
+
+struct fiemap_extent_info;
+
+struct fileattr;
+
+struct inode_operations {
+ struct dentry * (*lookup)(struct inode *, struct dentry *, unsigned int);
+ const char * (*get_link)(struct dentry *, struct inode *, struct delayed_call *);
+ int (*permission)(struct user_namespace *, struct inode *, int);
+ struct posix_acl * (*get_acl)(struct inode *, int, bool);
+ int (*readlink)(struct dentry *, char *, int);
+ int (*create)(struct user_namespace *, struct inode *, struct dentry *, umode_t, bool);
+ int (*link)(struct dentry *, struct inode *, struct dentry *);
+ int (*unlink)(struct inode *, struct dentry *);
+ int (*symlink)(struct user_namespace *, struct inode *, struct dentry *, const char *);
+ int (*mkdir)(struct user_namespace *, struct inode *, struct dentry *, umode_t);
+ int (*rmdir)(struct inode *, struct dentry *);
+ int (*mknod)(struct user_namespace *, struct inode *, struct dentry *, umode_t, dev_t);
+ int (*rename)(struct user_namespace *, struct inode *, struct dentry *, struct inode *, struct dentry *, unsigned int);
+ int (*setattr)(struct user_namespace *, struct dentry *, struct iattr *);
+ int (*getattr)(struct user_namespace *, const struct path *, struct kstat *, u32, unsigned int);
+ ssize_t (*listxattr)(struct dentry *, char *, size_t);
+ int (*fiemap)(struct inode *, struct fiemap_extent_info *, u64, u64);
+ int (*update_time)(struct inode *, struct timespec64 *, int);
+ int (*atomic_open)(struct inode *, struct dentry *, struct file *, unsigned int, umode_t);
+ int (*tmpfile)(struct user_namespace *, struct inode *, struct file *, umode_t);
+ int (*set_acl)(struct user_namespace *, struct inode *, struct posix_acl *, int);
+ int (*fileattr_set)(struct user_namespace *, struct dentry *, struct fileattr *);
+ int (*fileattr_get)(struct dentry *, struct fileattr *);
+ long: 64;
+};
+
+struct file_lock_context {
+ spinlock_t flc_lock;
+ struct list_head flc_flock;
+ struct list_head flc_posix;
+ struct list_head flc_lease;
+};
+
+struct file_lock_operations {
+ void (*fl_copy_lock)(struct file_lock *, struct file_lock *);
+ void (*fl_release_private)(struct file_lock *);
+};
+
+struct nlm_lockowner;
+
+struct nfs_lock_info {
+ u32 state;
+ struct nlm_lockowner *owner;
+ struct list_head list;
+};
+
+struct nfs4_lock_state;
+
+struct nfs4_lock_info {
+ struct nfs4_lock_state *owner;
+};
+
+struct fasync_struct;
+
+struct lock_manager_operations;
+
+struct file_lock {
+ struct file_lock *fl_blocker;
+ struct list_head fl_list;
+ struct hlist_node fl_link;
+ struct list_head fl_blocked_requests;
+ struct list_head fl_blocked_member;
+ fl_owner_t fl_owner;
+ unsigned int fl_flags;
+ unsigned char fl_type;
+ unsigned int fl_pid;
+ int fl_link_cpu;
+ wait_queue_head_t fl_wait;
+ struct file *fl_file;
+ loff_t fl_start;
+ loff_t fl_end;
+ struct fasync_struct *fl_fasync;
+ long unsigned int fl_break_time;
+ long unsigned int fl_downgrade_time;
+ const struct file_lock_operations *fl_ops;
+ const struct lock_manager_operations *fl_lmops;
+ union {
+ struct nfs_lock_info nfs_fl;
+ struct nfs4_lock_info nfs4_fl;
+ struct {
+ struct list_head link;
+ int state;
+ unsigned int debug_id;
+ } afs;
+ } fl_u;
+};
+
+struct lock_manager_operations {
+ void *lm_mod_owner;
+ fl_owner_t (*lm_get_owner)(fl_owner_t);
+ void (*lm_put_owner)(fl_owner_t);
+ void (*lm_notify)(struct file_lock *);
+ int (*lm_grant)(struct file_lock *, int);
+ bool (*lm_break)(struct file_lock *);
+ int (*lm_change)(struct file_lock *, int, struct list_head *);
+ void (*lm_setup)(struct file_lock *, void **);
+ bool (*lm_breaker_owns_lease)(struct file_lock *);
+ bool (*lm_lock_expirable)(struct file_lock *);
+ void (*lm_expire_lock)();
+};
+
+struct fasync_struct {
+ rwlock_t fa_lock;
+ int magic;
+ int fa_fd;
+ struct fasync_struct *fa_next;
+ struct file *fa_file;
+ struct callback_head fa_rcu;
+};
+
+struct kstatfs;
+
+struct super_operations {
+ struct inode * (*alloc_inode)(struct super_block *);
+ void (*destroy_inode)(struct inode *);
+ void (*free_inode)(struct inode *);
+ void (*dirty_inode)(struct inode *, int);
+ int (*write_inode)(struct inode *, struct writeback_control *);
+ int (*drop_inode)(struct inode *);
+ void (*evict_inode)(struct inode *);
+ void (*put_super)(struct super_block *);
+ int (*sync_fs)(struct super_block *, int);
+ int (*freeze_super)(struct super_block *);
+ int (*freeze_fs)(struct super_block *);
+ int (*thaw_super)(struct super_block *);
+ int (*unfreeze_fs)(struct super_block *);
+ int (*statfs)(struct dentry *, struct kstatfs *);
+ int (*remount_fs)(struct super_block *, int *, char *);
+ void (*umount_begin)(struct super_block *);
+ int (*show_options)(struct seq_file *, struct dentry *);
+ int (*show_devname)(struct seq_file *, struct dentry *);
+ int (*show_path)(struct seq_file *, struct dentry *);
+ int (*show_stats)(struct seq_file *, struct dentry *);
+ long int (*nr_cached_objects)(struct super_block *, struct shrink_control *);
+ long int (*free_cached_objects)(struct super_block *, struct shrink_control *);
+};
+
+struct iomap;
+
+struct fid;
+
+struct export_operations {
+ int (*encode_fh)(struct inode *, __u32 *, int *, struct inode *);
+ struct dentry * (*fh_to_dentry)(struct super_block *, struct fid *, int, int);
+ struct dentry * (*fh_to_parent)(struct super_block *, struct fid *, int, int);
+ int (*get_name)(struct dentry *, char *, struct dentry *);
+ struct dentry * (*get_parent)(struct dentry *);
+ int (*commit_metadata)(struct inode *);
+ int (*get_uuid)(struct super_block *, u8 *, u32 *, u64 *);
+ int (*map_blocks)(struct inode *, loff_t, u64, struct iomap *, bool, u32 *);
+ int (*commit_blocks)(struct inode *, struct iomap *, int, struct iattr *);
+ u64 (*fetch_iversion)(struct inode *);
+ long unsigned int flags;
+};
+
+struct xattr_handler {
+ const char *name;
+ const char *prefix;
+ int flags;
+ bool (*list)(struct dentry *);
+ int (*get)(const struct xattr_handler *, struct dentry *, struct inode *, const char *, void *, size_t);
+ int (*set)(const struct xattr_handler *, struct user_namespace *, struct dentry *, struct inode *, const char *, const void *, size_t, int);
+};
+
+typedef bool (*filldir_t)(struct dir_context *, const char *, int, loff_t, u64, unsigned int);
+
+struct dir_context {
+ filldir_t actor;
+ loff_t pos;
+};
+
+struct p_log;
+
+struct fs_parameter;
+
+struct fs_parse_result;
+
+typedef int fs_param_type(struct p_log *, const struct fs_parameter_spec *, struct fs_parameter *, struct fs_parse_result *);
+
+struct fs_parameter_spec {
+ const char *name;
+ fs_param_type *type;
+ u8 opt;
+ short unsigned int flags;
+ const void *data;
+};
+
+struct membuf {
+ void *p;
+ size_t left;
+};
+
+struct user_regset;
+
+typedef int user_regset_active_fn(struct task_struct *, const struct user_regset *);
+
+typedef int user_regset_get2_fn(struct task_struct *, const struct user_regset *, struct membuf);
+
+typedef int user_regset_set_fn(struct task_struct *, const struct user_regset *, unsigned int, unsigned int, const void *, const void *);
+
+typedef int user_regset_writeback_fn(struct task_struct *, const struct user_regset *, int);
+
+struct user_regset {
+ user_regset_get2_fn *regset_get;
+ user_regset_set_fn *set;
+ user_regset_active_fn *active;
+ user_regset_writeback_fn *writeback;
+ unsigned int n;
+ unsigned int size;
+ unsigned int align;
+ unsigned int bias;
+ unsigned int core_note_type;
+};
+
+struct kernfs_root;
+
+struct kernfs_elem_dir {
+ long unsigned int subdirs;
+ struct rb_root children;
+ struct kernfs_root *root;
+ long unsigned int rev;
+};
+
+struct kernfs_elem_symlink {
+ struct kernfs_node *target_kn;
+};
+
+struct kernfs_ops;
+
+struct kernfs_open_node;
+
+struct kernfs_elem_attr {
+ const struct kernfs_ops *ops;
+ struct kernfs_open_node *open;
+ loff_t size;
+ struct kernfs_node *notify_next;
+};
+
+struct kernfs_iattrs;
+
+struct kernfs_node {
+ atomic_t count;
+ atomic_t active;
+ struct lockdep_map dep_map;
+ struct kernfs_node *parent;
+ const char *name;
+ struct rb_node rb;
+ const void *ns;
+ unsigned int hash;
+ union {
+ struct kernfs_elem_dir dir;
+ struct kernfs_elem_symlink symlink;
+ struct kernfs_elem_attr attr;
+ };
+ void *priv;
+ u64 id;
+ short unsigned int flags;
+ umode_t mode;
+ struct kernfs_iattrs *iattr;
+};
+
+struct kernfs_open_file;
+
+struct kernfs_ops {
+ int (*open)(struct kernfs_open_file *);
+ void (*release)(struct kernfs_open_file *);
+ int (*seq_show)(struct seq_file *, void *);
+ void * (*seq_start)(struct seq_file *, loff_t *);
+ void * (*seq_next)(struct seq_file *, void *, loff_t *);
+ void (*seq_stop)(struct seq_file *, void *);
+ ssize_t (*read)(struct kernfs_open_file *, char *, size_t, loff_t);
+ size_t atomic_write_len;
+ bool prealloc;
+ ssize_t (*write)(struct kernfs_open_file *, char *, size_t, loff_t);
+ __poll_t (*poll)(struct kernfs_open_file *, struct poll_table_struct *);
+ int (*mmap)(struct kernfs_open_file *, struct vm_area_struct *);
+};
+
+struct kernfs_open_file {
+ struct kernfs_node *kn;
+ struct file *file;
+ struct seq_file *seq_file;
+ void *priv;
+ struct mutex mutex;
+ struct mutex prealloc_mutex;
+ int event;
+ struct list_head list;
+ char *prealloc_buf;
+ size_t atomic_write_len;
+ bool mmapped: 1;
+ bool released: 1;
+ const struct vm_operations_struct *vm_ops;
+};
+
+enum kobj_ns_type {
+ KOBJ_NS_TYPE_NONE = 0,
+ KOBJ_NS_TYPE_NET = 1,
+ KOBJ_NS_TYPES = 2,
+};
+
+struct sock;
+
+struct kobj_ns_type_operations {
+ enum kobj_ns_type type;
+ bool (*current_may_mount)();
+ void * (*grab_current_ns)();
+ const void * (*netlink_ns)(struct sock *);
+ const void * (*initial_ns)();
+ void (*drop_ns)(void *);
+};
+
+struct attribute {
+ const char *name;
+ umode_t mode;
+ bool ignore_lockdep: 1;
+ struct lock_class_key *key;
+ struct lock_class_key skey;
+};
+
+struct bin_attribute;
+
+struct attribute_group {
+ const char *name;
+ umode_t (*is_visible)(struct kobject *, struct attribute *, int);
+ umode_t (*is_bin_visible)(struct kobject *, struct bin_attribute *, int);
+ struct attribute **attrs;
+ struct bin_attribute **bin_attrs;
+};
+
+struct bin_attribute {
+ struct attribute attr;
+ size_t size;
+ void *private;
+ struct address_space * (*f_mapping)();
+ ssize_t (*read)(struct file *, struct kobject *, struct bin_attribute *, char *, loff_t, size_t);
+ ssize_t (*write)(struct file *, struct kobject *, struct bin_attribute *, char *, loff_t, size_t);
+ int (*mmap)(struct file *, struct kobject *, struct bin_attribute *, struct vm_area_struct *);
+};
+
+struct sysfs_ops {
+ ssize_t (*show)(struct kobject *, struct attribute *, char *);
+ ssize_t (*store)(struct kobject *, struct attribute *, const char *, size_t);
+};
+
+struct kset_uevent_ops;
+
+struct kset {
+ struct list_head list;
+ spinlock_t list_lock;
+ struct kobject kobj;
+ const struct kset_uevent_ops *uevent_ops;
+};
+
+struct kobj_type {
+ void (*release)(struct kobject *);
+ const struct sysfs_ops *sysfs_ops;
+ const struct attribute_group **default_groups;
+ const struct kobj_ns_type_operations * (*child_ns_type)(struct kobject *);
+ const void * (*namespace)(struct kobject *);
+ void (*get_ownership)(struct kobject *, kuid_t *, kgid_t *);
+};
+
+struct kobj_uevent_env {
+ char *argv[3];
+ char *envp[64];
+ int envp_idx;
+ char buf[2048];
+ int buflen;
+};
+
+struct kset_uevent_ops {
+ int (* const filter)(struct kobject *);
+ const char * (* const name)(struct kobject *);
+ int (* const uevent)(struct kobject *, struct kobj_uevent_env *);
+};
+
+typedef __u64 Elf64_Addr;
+
+typedef __u16 Elf64_Half;
+
+typedef __u32 Elf64_Word;
+
+typedef __u64 Elf64_Xword;
+
+struct elf64_sym {
+ Elf64_Word st_name;
+ unsigned char st_info;
+ unsigned char st_other;
+ Elf64_Half st_shndx;
+ Elf64_Addr st_value;
+ Elf64_Xword st_size;
+};
+
+struct kernel_param_ops {
+ unsigned int flags;
+ int (*set)(const char *, const struct kernel_param *);
+ int (*get)(char *, const struct kernel_param *);
+ void (*free)(void *);
+};
+
+struct kparam_string;
+
+struct kparam_array;
+
+struct kernel_param {
+ const char *name;
+ struct module *mod;
+ const struct kernel_param_ops *ops;
+ const u16 perm;
+ s8 level;
+ u8 flags;
+ union {
+ void *arg;
+ const struct kparam_string *str;
+ const struct kparam_array *arr;
+ };
+};
+
+struct kparam_string {
+ unsigned int maxlen;
+ char *string;
+};
+
+struct kparam_array {
+ unsigned int max;
+ unsigned int elemsize;
+ unsigned int *num;
+ const struct kernel_param_ops *ops;
+ void *elem;
+};
+
+struct error_injection_entry {
+ long unsigned int addr;
+ int etype;
+};
+
+struct module_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct module_attribute *, struct module_kobject *, char *);
+ ssize_t (*store)(struct module_attribute *, struct module_kobject *, const char *, size_t);
+ void (*setup)(struct module *, const char *);
+ int (*test)(struct module *);
+ void (*free)(struct module *);
+};
+
+struct trace_eval_map {
+ const char *system;
+ const char *eval_string;
+ long unsigned int eval_value;
+};
+
+enum xstate_copy_mode {
+ XSTATE_COPY_FP = 0,
+ XSTATE_COPY_FX = 1,
+ XSTATE_COPY_XSAVE = 2,
+};
+
+typedef long unsigned int uintptr_t;
+
+typedef long unsigned int irq_hw_number_t;
+
+struct range {
+ u64 start;
+ u64 end;
+};
+
+typedef long unsigned int pteval_t;
+
+typedef long unsigned int pmdval_t;
+
+typedef long unsigned int pudval_t;
+
+typedef struct {
+ pteval_t pte;
+} pte_t;
+
+typedef struct {
+ pudval_t pud;
+} pud_t;
+
+typedef struct {
+ pmdval_t pmd;
+} pmd_t;
+
+enum {
+ UNAME26 = 131072,
+ ADDR_NO_RANDOMIZE = 262144,
+ FDPIC_FUNCPTRS = 524288,
+ MMAP_PAGE_ZERO = 1048576,
+ ADDR_COMPAT_LAYOUT = 2097152,
+ READ_IMPLIES_EXEC = 4194304,
+ ADDR_LIMIT_32BIT = 8388608,
+ SHORT_INODE = 16777216,
+ WHOLE_SECONDS = 33554432,
+ STICKY_TIMEOUTS = 67108864,
+ ADDR_LIMIT_3GB = 134217728,
+};
+
+enum tlb_infos {
+ ENTRIES = 0,
+ NR_INFO = 1,
+};
+
+enum pcpu_fc {
+ PCPU_FC_AUTO = 0,
+ PCPU_FC_EMBED = 1,
+ PCPU_FC_PAGE = 2,
+ PCPU_FC_NR = 3,
+};
+
+enum node_states {
+ N_POSSIBLE = 0,
+ N_ONLINE = 1,
+ N_NORMAL_MEMORY = 2,
+ N_HIGH_MEMORY = 2,
+ N_MEMORY = 3,
+ N_CPU = 4,
+ N_GENERIC_INITIATOR = 5,
+ NR_NODE_STATES = 6,
+};
+
+enum {
+ MM_FILEPAGES = 0,
+ MM_ANONPAGES = 1,
+ MM_SWAPENTS = 2,
+ MM_SHMEMPAGES = 3,
+ NR_MM_COUNTERS = 4,
+};
+
+struct vmem_altmap {
+ long unsigned int base_pfn;
+ const long unsigned int end_pfn;
+ const long unsigned int reserve;
+ long unsigned int free;
+ long unsigned int align;
+ long unsigned int alloc;
+};
+
+struct percpu_ref_data;
+
+struct percpu_ref {
+ long unsigned int percpu_count_ptr;
+ struct percpu_ref_data *data;
+};
+
+enum memory_type {
+ MEMORY_DEVICE_PRIVATE = 1,
+ MEMORY_DEVICE_COHERENT = 2,
+ MEMORY_DEVICE_FS_DAX = 3,
+ MEMORY_DEVICE_GENERIC = 4,
+ MEMORY_DEVICE_PCI_P2PDMA = 5,
+};
+
+struct dev_pagemap_ops;
+
+struct dev_pagemap {
+ struct vmem_altmap altmap;
+ struct percpu_ref ref;
+ struct completion done;
+ enum memory_type type;
+ unsigned int flags;
+ long unsigned int vmemmap_shift;
+ const struct dev_pagemap_ops *ops;
+ void *owner;
+ int nr_range;
+ union {
+ struct range range;
+ struct range ranges[0];
+ };
+};
+
+enum fault_flag {
+ FAULT_FLAG_WRITE = 1,
+ FAULT_FLAG_MKWRITE = 2,
+ FAULT_FLAG_ALLOW_RETRY = 4,
+ FAULT_FLAG_RETRY_NOWAIT = 8,
+ FAULT_FLAG_KILLABLE = 16,
+ FAULT_FLAG_TRIED = 32,
+ FAULT_FLAG_USER = 64,
+ FAULT_FLAG_REMOTE = 128,
+ FAULT_FLAG_INSTRUCTION = 256,
+ FAULT_FLAG_INTERRUPTIBLE = 512,
+ FAULT_FLAG_UNSHARE = 1024,
+ FAULT_FLAG_ORIG_PTE_VALID = 2048,
+};
+
+struct vm_fault {
+ const struct {
+ struct vm_area_struct *vma;
+ gfp_t gfp_mask;
+ long unsigned int pgoff;
+ long unsigned int address;
+ long unsigned int real_address;
+ };
+ enum fault_flag flags;
+ pmd_t *pmd;
+ pud_t *pud;
+ union {
+ pte_t orig_pte;
+ pmd_t orig_pmd;
+ };
+ struct page *cow_page;
+ struct page *page;
+ pte_t *pte;
+ spinlock_t *ptl;
+ pgtable_t prealloc_pte;
+};
+
+enum migratetype {
+ MIGRATE_UNMOVABLE = 0,
+ MIGRATE_MOVABLE = 1,
+ MIGRATE_RECLAIMABLE = 2,
+ MIGRATE_PCPTYPES = 3,
+ MIGRATE_HIGHATOMIC = 3,
+ MIGRATE_CMA = 4,
+ MIGRATE_ISOLATE = 5,
+ MIGRATE_TYPES = 6,
+};
+
+enum numa_stat_item {
+ NUMA_HIT = 0,
+ NUMA_MISS = 1,
+ NUMA_FOREIGN = 2,
+ NUMA_INTERLEAVE_HIT = 3,
+ NUMA_LOCAL = 4,
+ NUMA_OTHER = 5,
+ NR_VM_NUMA_EVENT_ITEMS = 6,
+};
+
+enum zone_stat_item {
+ NR_FREE_PAGES = 0,
+ NR_ZONE_LRU_BASE = 1,
+ NR_ZONE_INACTIVE_ANON = 1,
+ NR_ZONE_ACTIVE_ANON = 2,
+ NR_ZONE_INACTIVE_FILE = 3,
+ NR_ZONE_ACTIVE_FILE = 4,
+ NR_ZONE_UNEVICTABLE = 5,
+ NR_ZONE_WRITE_PENDING = 6,
+ NR_MLOCK = 7,
+ NR_BOUNCE = 8,
+ NR_FREE_CMA_PAGES = 9,
+ NR_VM_ZONE_STAT_ITEMS = 10,
+};
+
+enum node_stat_item {
+ NR_LRU_BASE = 0,
+ NR_INACTIVE_ANON = 0,
+ NR_ACTIVE_ANON = 1,
+ NR_INACTIVE_FILE = 2,
+ NR_ACTIVE_FILE = 3,
+ NR_UNEVICTABLE = 4,
+ NR_SLAB_RECLAIMABLE_B = 5,
+ NR_SLAB_UNRECLAIMABLE_B = 6,
+ NR_ISOLATED_ANON = 7,
+ NR_ISOLATED_FILE = 8,
+ WORKINGSET_NODES = 9,
+ WORKINGSET_REFAULT_BASE = 10,
+ WORKINGSET_REFAULT_ANON = 10,
+ WORKINGSET_REFAULT_FILE = 11,
+ WORKINGSET_ACTIVATE_BASE = 12,
+ WORKINGSET_ACTIVATE_ANON = 12,
+ WORKINGSET_ACTIVATE_FILE = 13,
+ WORKINGSET_RESTORE_BASE = 14,
+ WORKINGSET_RESTORE_ANON = 14,
+ WORKINGSET_RESTORE_FILE = 15,
+ WORKINGSET_NODERECLAIM = 16,
+ NR_ANON_MAPPED = 17,
+ NR_FILE_MAPPED = 18,
+ NR_FILE_PAGES = 19,
+ NR_FILE_DIRTY = 20,
+ NR_WRITEBACK = 21,
+ NR_WRITEBACK_TEMP = 22,
+ NR_SHMEM = 23,
+ NR_SHMEM_THPS = 24,
+ NR_SHMEM_PMDMAPPED = 25,
+ NR_FILE_THPS = 26,
+ NR_FILE_PMDMAPPED = 27,
+ NR_ANON_THPS = 28,
+ NR_VMSCAN_WRITE = 29,
+ NR_VMSCAN_IMMEDIATE = 30,
+ NR_DIRTIED = 31,
+ NR_WRITTEN = 32,
+ NR_THROTTLED_WRITTEN = 33,
+ NR_KERNEL_MISC_RECLAIMABLE = 34,
+ NR_FOLL_PIN_ACQUIRED = 35,
+ NR_FOLL_PIN_RELEASED = 36,
+ NR_KERNEL_STACK_KB = 37,
+ NR_PAGETABLE = 38,
+ NR_SECONDARY_PAGETABLE = 39,
+ NR_SWAPCACHE = 40,
+ PGPROMOTE_SUCCESS = 41,
+ PGPROMOTE_CANDIDATE = 42,
+ NR_VM_NODE_STAT_ITEMS = 43,
+};
+
+enum lru_list {
+ LRU_INACTIVE_ANON = 0,
+ LRU_ACTIVE_ANON = 1,
+ LRU_INACTIVE_FILE = 2,
+ LRU_ACTIVE_FILE = 3,
+ LRU_UNEVICTABLE = 4,
+ NR_LRU_LISTS = 5,
+};
+
+enum vmscan_throttle_state {
+ VMSCAN_THROTTLE_WRITEBACK = 0,
+ VMSCAN_THROTTLE_ISOLATED = 1,
+ VMSCAN_THROTTLE_NOPROGRESS = 2,
+ VMSCAN_THROTTLE_CONGESTED = 3,
+ NR_VMSCAN_THROTTLE = 4,
+};
+
+enum zone_watermarks {
+ WMARK_MIN = 0,
+ WMARK_LOW = 1,
+ WMARK_HIGH = 2,
+ WMARK_PROMO = 3,
+ NR_WMARK = 4,
+};
+
+enum {
+ ZONELIST_FALLBACK = 0,
+ ZONELIST_NOFALLBACK = 1,
+ MAX_ZONELISTS = 2,
+};
+
+struct x86_init_mpparse {
+ void (*setup_ioapic_ids)();
+ void (*find_smp_config)();
+ void (*get_smp_config)(unsigned int);
+};
+
+struct x86_init_resources {
+ void (*probe_roms)();
+ void (*reserve_resources)();
+ char * (*memory_setup)();
+};
+
+struct irq_domain;
+
+struct x86_init_irqs {
+ void (*pre_vector_init)();
+ void (*intr_init)();
+ void (*intr_mode_select)();
+ void (*intr_mode_init)();
+ struct irq_domain * (*create_pci_msi_domain)();
+};
+
+enum irq_domain_bus_token {
+ DOMAIN_BUS_ANY = 0,
+ DOMAIN_BUS_WIRED = 1,
+ DOMAIN_BUS_GENERIC_MSI = 2,
+ DOMAIN_BUS_PCI_MSI = 3,
+ DOMAIN_BUS_PLATFORM_MSI = 4,
+ DOMAIN_BUS_NEXUS = 5,
+ DOMAIN_BUS_IPI = 6,
+ DOMAIN_BUS_FSL_MC_MSI = 7,
+ DOMAIN_BUS_TI_SCI_INTA_MSI = 8,
+ DOMAIN_BUS_WAKEUP = 9,
+ DOMAIN_BUS_VMD_MSI = 10,
+};
+
+struct irq_domain_ops;
+
+struct fwnode_handle;
+
+struct irq_domain_chip_generic;
+
+struct device;
+
+struct irq_data;
+
+struct irq_domain {
+ struct list_head link;
+ const char *name;
+ const struct irq_domain_ops *ops;
+ void *host_data;
+ unsigned int flags;
+ unsigned int mapcount;
+ struct fwnode_handle *fwnode;
+ enum irq_domain_bus_token bus_token;
+ struct irq_domain_chip_generic *gc;
+ struct device *dev;
+ struct irq_domain *parent;
+ irq_hw_number_t hwirq_max;
+ unsigned int revmap_size;
+ struct xarray revmap_tree;
+ struct mutex revmap_mutex;
+ struct irq_data *revmap[0];
+};
+
+struct x86_init_oem {
+ void (*arch_setup)();
+ void (*banner)();
+};
+
+struct x86_init_paging {
+ void (*pagetable_init)();
+};
+
+struct x86_init_timers {
+ void (*setup_percpu_clockev)();
+ void (*timer_init)();
+ void (*wallclock_init)();
+};
+
+struct x86_init_iommu {
+ int (*iommu_init)();
+};
+
+struct x86_init_pci {
+ int (*arch_init)();
+ int (*init)();
+ void (*init_irq)();
+ void (*fixup_irqs)();
+};
+
+struct x86_hyper_init {
+ void (*init_platform)();
+ void (*guest_late_init)();
+ bool (*x2apic_available)();
+ bool (*msi_ext_dest_id)();
+ void (*init_mem_mapping)();
+ void (*init_after_bootmem)();
+};
+
+struct x86_init_acpi {
+ void (*set_root_pointer)(u64);
+ u64 (*get_root_pointer)();
+ void (*reduced_hw_early_init)();
+};
+
+struct x86_init_ops {
+ struct x86_init_resources resources;
+ struct x86_init_mpparse mpparse;
+ struct x86_init_irqs irqs;
+ struct x86_init_oem oem;
+ struct x86_init_paging paging;
+ struct x86_init_timers timers;
+ struct x86_init_iommu iommu;
+ struct x86_init_pci pci;
+ struct x86_hyper_init hyper;
+ struct x86_init_acpi acpi;
+};
+
+typedef void percpu_ref_func_t(struct percpu_ref *);
+
+struct percpu_ref_data {
+ atomic_long_t count;
+ percpu_ref_func_t *release;
+ percpu_ref_func_t *confirm_switch;
+ bool force_atomic: 1;
+ bool allow_reinit: 1;
+ struct callback_head rcu;
+ struct percpu_ref *ref;
+};
+
+enum hrtimer_base_type {
+ HRTIMER_BASE_MONOTONIC = 0,
+ HRTIMER_BASE_REALTIME = 1,
+ HRTIMER_BASE_BOOTTIME = 2,
+ HRTIMER_BASE_TAI = 3,
+ HRTIMER_BASE_MONOTONIC_SOFT = 4,
+ HRTIMER_BASE_REALTIME_SOFT = 5,
+ HRTIMER_BASE_BOOTTIME_SOFT = 6,
+ HRTIMER_BASE_TAI_SOFT = 7,
+ HRTIMER_MAX_CLOCK_BASES = 8,
+};
+
+enum rseq_cs_flags_bit {
+ RSEQ_CS_FLAG_NO_RESTART_ON_PREEMPT_BIT = 0,
+ RSEQ_CS_FLAG_NO_RESTART_ON_SIGNAL_BIT = 1,
+ RSEQ_CS_FLAG_NO_RESTART_ON_MIGRATE_BIT = 2,
+};
+
+enum {
+ TASK_COMM_LEN = 16,
+};
+
+enum perf_event_task_context {
+ perf_invalid_context = -1,
+ perf_hw_context = 0,
+ perf_sw_context = 1,
+ perf_nr_task_contexts = 2,
+};
+
+enum rseq_event_mask_bits {
+ RSEQ_EVENT_PREEMPT_BIT = 0,
+ RSEQ_EVENT_SIGNAL_BIT = 1,
+ RSEQ_EVENT_MIGRATE_BIT = 2,
+};
+
+struct dev_pagemap_ops {
+ void (*page_free)(struct page *);
+ vm_fault_t (*migrate_to_ram)(struct vm_fault *);
+ int (*memory_failure)(struct dev_pagemap *, long unsigned int, long unsigned int, int);
+};
+
+enum kmalloc_cache_type {
+ KMALLOC_NORMAL = 0,
+ KMALLOC_CGROUP = 1,
+ KMALLOC_RECLAIM = 2,
+ KMALLOC_DMA = 3,
+ NR_KMALLOC_TYPES = 4,
+};
+
+enum {
+ DQF_ROOT_SQUASH_B = 0,
+ DQF_SYS_FILE_B = 16,
+ DQF_PRIVATE = 17,
+};
+
+enum {
+ DQST_LOOKUPS = 0,
+ DQST_DROPS = 1,
+ DQST_READS = 2,
+ DQST_WRITES = 3,
+ DQST_CACHE_HITS = 4,
+ DQST_ALLOC_DQUOTS = 5,
+ DQST_FREE_DQUOTS = 6,
+ DQST_SYNCS = 7,
+ _DQST_DQSTAT_LAST = 8,
+};
+
+enum {
+ SB_UNFROZEN = 0,
+ SB_FREEZE_WRITE = 1,
+ SB_FREEZE_PAGEFAULT = 2,
+ SB_FREEZE_FS = 3,
+ SB_FREEZE_COMPLETE = 4,
+};
+
+enum compound_dtor_id {
+ NULL_COMPOUND_DTOR = 0,
+ COMPOUND_PAGE_DTOR = 1,
+ HUGETLB_PAGE_DTOR = 2,
+ TRANSHUGE_PAGE_DTOR = 3,
+ NR_COMPOUND_DTORS = 4,
+};
+
+enum vm_event_item {
+ PGPGIN = 0,
+ PGPGOUT = 1,
+ PSWPIN = 2,
+ PSWPOUT = 3,
+ PGALLOC_DMA = 4,
+ PGALLOC_DMA32 = 5,
+ PGALLOC_NORMAL = 6,
+ PGALLOC_MOVABLE = 7,
+ ALLOCSTALL_DMA = 8,
+ ALLOCSTALL_DMA32 = 9,
+ ALLOCSTALL_NORMAL = 10,
+ ALLOCSTALL_MOVABLE = 11,
+ PGSCAN_SKIP_DMA = 12,
+ PGSCAN_SKIP_DMA32 = 13,
+ PGSCAN_SKIP_NORMAL = 14,
+ PGSCAN_SKIP_MOVABLE = 15,
+ PGFREE = 16,
+ PGACTIVATE = 17,
+ PGDEACTIVATE = 18,
+ PGLAZYFREE = 19,
+ PGFAULT = 20,
+ PGMAJFAULT = 21,
+ PGLAZYFREED = 22,
+ PGREFILL = 23,
+ PGREUSE = 24,
+ PGSTEAL_KSWAPD = 25,
+ PGSTEAL_DIRECT = 26,
+ PGDEMOTE_KSWAPD = 27,
+ PGDEMOTE_DIRECT = 28,
+ PGSCAN_KSWAPD = 29,
+ PGSCAN_DIRECT = 30,
+ PGSCAN_DIRECT_THROTTLE = 31,
+ PGSCAN_ANON = 32,
+ PGSCAN_FILE = 33,
+ PGSTEAL_ANON = 34,
+ PGSTEAL_FILE = 35,
+ PGSCAN_ZONE_RECLAIM_FAILED = 36,
+ PGINODESTEAL = 37,
+ SLABS_SCANNED = 38,
+ KSWAPD_INODESTEAL = 39,
+ KSWAPD_LOW_WMARK_HIT_QUICKLY = 40,
+ KSWAPD_HIGH_WMARK_HIT_QUICKLY = 41,
+ PAGEOUTRUN = 42,
+ PGROTATED = 43,
+ DROP_PAGECACHE = 44,
+ DROP_SLAB = 45,
+ OOM_KILL = 46,
+ NUMA_PTE_UPDATES = 47,
+ NUMA_HUGE_PTE_UPDATES = 48,
+ NUMA_HINT_FAULTS = 49,
+ NUMA_HINT_FAULTS_LOCAL = 50,
+ NUMA_PAGE_MIGRATE = 51,
+ PGMIGRATE_SUCCESS = 52,
+ PGMIGRATE_FAIL = 53,
+ THP_MIGRATION_SUCCESS = 54,
+ THP_MIGRATION_FAIL = 55,
+ THP_MIGRATION_SPLIT = 56,
+ COMPACTMIGRATE_SCANNED = 57,
+ COMPACTFREE_SCANNED = 58,
+ COMPACTISOLATED = 59,
+ COMPACTSTALL = 60,
+ COMPACTFAIL = 61,
+ COMPACTSUCCESS = 62,
+ KCOMPACTD_WAKE = 63,
+ KCOMPACTD_MIGRATE_SCANNED = 64,
+ KCOMPACTD_FREE_SCANNED = 65,
+ HTLB_BUDDY_PGALLOC = 66,
+ HTLB_BUDDY_PGALLOC_FAIL = 67,
+ CMA_ALLOC_SUCCESS = 68,
+ CMA_ALLOC_FAIL = 69,
+ UNEVICTABLE_PGCULLED = 70,
+ UNEVICTABLE_PGSCANNED = 71,
+ UNEVICTABLE_PGRESCUED = 72,
+ UNEVICTABLE_PGMLOCKED = 73,
+ UNEVICTABLE_PGMUNLOCKED = 74,
+ UNEVICTABLE_PGCLEARED = 75,
+ UNEVICTABLE_PGSTRANDED = 76,
+ THP_FAULT_ALLOC = 77,
+ THP_FAULT_FALLBACK = 78,
+ THP_FAULT_FALLBACK_CHARGE = 79,
+ THP_COLLAPSE_ALLOC = 80,
+ THP_COLLAPSE_ALLOC_FAILED = 81,
+ THP_FILE_ALLOC = 82,
+ THP_FILE_FALLBACK = 83,
+ THP_FILE_FALLBACK_CHARGE = 84,
+ THP_FILE_MAPPED = 85,
+ THP_SPLIT_PAGE = 86,
+ THP_SPLIT_PAGE_FAILED = 87,
+ THP_DEFERRED_SPLIT_PAGE = 88,
+ THP_SPLIT_PMD = 89,
+ THP_SCAN_EXCEED_NONE_PTE = 90,
+ THP_SCAN_EXCEED_SWAP_PTE = 91,
+ THP_SCAN_EXCEED_SHARED_PTE = 92,
+ THP_SPLIT_PUD = 93,
+ THP_ZERO_PAGE_ALLOC = 94,
+ THP_ZERO_PAGE_ALLOC_FAILED = 95,
+ THP_SWPOUT = 96,
+ THP_SWPOUT_FALLBACK = 97,
+ BALLOON_INFLATE = 98,
+ BALLOON_DEFLATE = 99,
+ BALLOON_MIGRATE = 100,
+ SWAP_RA = 101,
+ SWAP_RA_HIT = 102,
+ KSM_SWPIN_COPY = 103,
+ COW_KSM = 104,
+ DIRECT_MAP_LEVEL2_SPLIT = 105,
+ DIRECT_MAP_LEVEL3_SPLIT = 106,
+ NR_VM_EVENT_ITEMS = 107,
+};
+
+struct fwnode_operations;
+
+struct fwnode_handle {
+ struct fwnode_handle *secondary;
+ const struct fwnode_operations *ops;
+ struct device *dev;
+ struct list_head suppliers;
+ struct list_head consumers;
+ u8 flags;
+};
+
+enum dev_dma_attr {
+ DEV_DMA_NOT_SUPPORTED = 0,
+ DEV_DMA_NON_COHERENT = 1,
+ DEV_DMA_COHERENT = 2,
+};
+
+struct fwnode_reference_args;
+
+struct fwnode_endpoint;
+
+struct fwnode_operations {
+ struct fwnode_handle * (*get)(struct fwnode_handle *);
+ void (*put)(struct fwnode_handle *);
+ bool (*device_is_available)(const struct fwnode_handle *);
+ const void * (*device_get_match_data)(const struct fwnode_handle *, const struct device *);
+ bool (*device_dma_supported)(const struct fwnode_handle *);
+ enum dev_dma_attr (*device_get_dma_attr)(const struct fwnode_handle *);
+ bool (*property_present)(const struct fwnode_handle *, const char *);
+ int (*property_read_int_array)(const struct fwnode_handle *, const char *, unsigned int, void *, size_t);
+ int (*property_read_string_array)(const struct fwnode_handle *, const char *, const char **, size_t);
+ const char * (*get_name)(const struct fwnode_handle *);
+ const char * (*get_name_prefix)(const struct fwnode_handle *);
+ struct fwnode_handle * (*get_parent)(const struct fwnode_handle *);
+ struct fwnode_handle * (*get_next_child_node)(const struct fwnode_handle *, struct fwnode_handle *);
+ struct fwnode_handle * (*get_named_child_node)(const struct fwnode_handle *, const char *);
+ int (*get_reference_args)(const struct fwnode_handle *, const char *, const char *, unsigned int, unsigned int, struct fwnode_reference_args *);
+ struct fwnode_handle * (*graph_get_next_endpoint)(const struct fwnode_handle *, struct fwnode_handle *);
+ struct fwnode_handle * (*graph_get_remote_endpoint)(const struct fwnode_handle *);
+ struct fwnode_handle * (*graph_get_port_parent)(struct fwnode_handle *);
+ int (*graph_parse_endpoint)(const struct fwnode_handle *, struct fwnode_endpoint *);
+ void * (*iomap)(struct fwnode_handle *, int);
+ int (*irq_get)(const struct fwnode_handle *, unsigned int);
+ int (*add_links)(struct fwnode_handle *);
+};
+
+enum dl_dev_state {
+ DL_DEV_NO_DRIVER = 0,
+ DL_DEV_PROBING = 1,
+ DL_DEV_DRIVER_BOUND = 2,
+ DL_DEV_UNBINDING = 3,
+};
+
+struct dev_links_info {
+ struct list_head suppliers;
+ struct list_head consumers;
+ struct list_head defer_sync;
+ enum dl_dev_state status;
+};
+
+struct pm_message {
+ int event;
+};
+
+typedef struct pm_message pm_message_t;
+
+enum rpm_request {
+ RPM_REQ_NONE = 0,
+ RPM_REQ_IDLE = 1,
+ RPM_REQ_SUSPEND = 2,
+ RPM_REQ_AUTOSUSPEND = 3,
+ RPM_REQ_RESUME = 4,
+};
+
+enum rpm_status {
+ RPM_INVALID = -1,
+ RPM_ACTIVE = 0,
+ RPM_RESUMING = 1,
+ RPM_SUSPENDED = 2,
+ RPM_SUSPENDING = 3,
+};
+
+struct wakeup_source;
+
+struct wake_irq;
+
+struct pm_subsys_data;
+
+struct dev_pm_qos;
+
+struct dev_pm_info {
+ pm_message_t power_state;
+ unsigned int can_wakeup: 1;
+ unsigned int async_suspend: 1;
+ bool in_dpm_list: 1;
+ bool is_prepared: 1;
+ bool is_suspended: 1;
+ bool is_noirq_suspended: 1;
+ bool is_late_suspended: 1;
+ bool no_pm: 1;
+ bool early_init: 1;
+ bool direct_complete: 1;
+ u32 driver_flags;
+ spinlock_t lock;
+ struct list_head entry;
+ struct completion completion;
+ struct wakeup_source *wakeup;
+ bool wakeup_path: 1;
+ bool syscore: 1;
+ bool no_pm_callbacks: 1;
+ unsigned int must_resume: 1;
+ unsigned int may_skip_resume: 1;
+ struct hrtimer suspend_timer;
+ u64 timer_expires;
+ struct work_struct work;
+ wait_queue_head_t wait_queue;
+ struct wake_irq *wakeirq;
+ atomic_t usage_count;
+ atomic_t child_count;
+ unsigned int disable_depth: 3;
+ unsigned int idle_notification: 1;
+ unsigned int request_pending: 1;
+ unsigned int deferred_resume: 1;
+ unsigned int needs_force_resume: 1;
+ unsigned int runtime_auto: 1;
+ bool ignore_children: 1;
+ unsigned int no_callbacks: 1;
+ unsigned int irq_safe: 1;
+ unsigned int use_autosuspend: 1;
+ unsigned int timer_autosuspends: 1;
+ unsigned int memalloc_noio: 1;
+ unsigned int links_count;
+ enum rpm_request request;
+ enum rpm_status runtime_status;
+ enum rpm_status last_status;
+ int runtime_error;
+ int autosuspend_delay;
+ u64 last_busy;
+ u64 active_time;
+ u64 suspended_time;
+ u64 accounting_timestamp;
+ struct pm_subsys_data *subsys_data;
+ void (*set_latency_tolerance)(struct device *, s32);
+ struct dev_pm_qos *qos;
+};
+
+struct msi_device_data;
+
+struct dev_msi_info {
+ struct irq_domain *domain;
+ struct msi_device_data *data;
+};
+
+struct dev_archdata {};
+
+enum device_removable {
+ DEVICE_REMOVABLE_NOT_SUPPORTED = 0,
+ DEVICE_REMOVABLE_UNKNOWN = 1,
+ DEVICE_FIXED = 2,
+ DEVICE_REMOVABLE = 3,
+};
+
+struct device_private;
+
+struct device_type;
+
+struct bus_type;
+
+struct device_driver;
+
+struct dev_pm_domain;
+
+struct dma_map_ops;
+
+struct bus_dma_region;
+
+struct device_dma_parameters;
+
+struct cma;
+
+struct io_tlb_mem;
+
+struct device_node;
+
+struct class;
+
+struct iommu_group;
+
+struct dev_iommu;
+
+struct device_physical_location;
+
+struct device {
+ struct kobject kobj;
+ struct device *parent;
+ struct device_private *p;
+ const char *init_name;
+ const struct device_type *type;
+ struct bus_type *bus;
+ struct device_driver *driver;
+ void *platform_data;
+ void *driver_data;
+ struct mutex mutex;
+ struct dev_links_info links;
+ struct dev_pm_info power;
+ struct dev_pm_domain *pm_domain;
+ struct dev_msi_info msi;
+ const struct dma_map_ops *dma_ops;
+ u64 *dma_mask;
+ u64 coherent_dma_mask;
+ u64 bus_dma_limit;
+ const struct bus_dma_region *dma_range_map;
+ struct device_dma_parameters *dma_parms;
+ struct list_head dma_pools;
+ struct cma *cma_area;
+ struct io_tlb_mem *dma_io_tlb_mem;
+ struct dev_archdata archdata;
+ struct device_node *of_node;
+ struct fwnode_handle *fwnode;
+ int numa_node;
+ dev_t devt;
+ u32 id;
+ spinlock_t devres_lock;
+ struct list_head devres_head;
+ struct class *class;
+ const struct attribute_group **groups;
+ void (*release)(struct device *);
+ struct iommu_group *iommu_group;
+ struct dev_iommu *iommu;
+ struct device_physical_location *physical_location;
+ enum device_removable removable;
+ bool offline_disabled: 1;
+ bool offline: 1;
+ bool of_node_reused: 1;
+ bool state_synced: 1;
+ bool can_match: 1;
+};
+
+struct fwnode_endpoint {
+ unsigned int port;
+ unsigned int id;
+ const struct fwnode_handle *local_fwnode;
+};
+
+struct fwnode_reference_args {
+ struct fwnode_handle *fwnode;
+ unsigned int nargs;
+ u64 args[8];
+};
+
+typedef long unsigned int kernel_ulong_t;
+
+struct acpi_device_id {
+ __u8 id[16];
+ kernel_ulong_t driver_data;
+ __u32 cls;
+ __u32 cls_msk;
+};
+
+struct of_device_id {
+ char name[32];
+ char type[32];
+ char compatible[128];
+ const void *data;
+};
+
+typedef u32 phandle;
+
+struct property {
+ char *name;
+ int length;
+ void *value;
+ struct property *next;
+};
+
+struct device_node {
+ const char *name;
+ phandle phandle;
+ const char *full_name;
+ struct fwnode_handle fwnode;
+ struct property *properties;
+ struct property *deadprops;
+ struct device_node *parent;
+ struct device_node *child;
+ struct device_node *sibling;
+ long unsigned int _flags;
+ void *data;
+};
+
+struct irq_fwspec {
+ struct fwnode_handle *fwnode;
+ int param_count;
+ u32 param[16];
+};
+
+struct irq_domain_ops {
+ int (*match)(struct irq_domain *, struct device_node *, enum irq_domain_bus_token);
+ int (*select)(struct irq_domain *, struct irq_fwspec *, enum irq_domain_bus_token);
+ int (*map)(struct irq_domain *, unsigned int, irq_hw_number_t);
+ void (*unmap)(struct irq_domain *, unsigned int);
+ int (*xlate)(struct irq_domain *, struct device_node *, const u32 *, unsigned int, long unsigned int *, unsigned int *);
+ int (*alloc)(struct irq_domain *, unsigned int, unsigned int, void *);
+ void (*free)(struct irq_domain *, unsigned int, unsigned int);
+ int (*activate)(struct irq_domain *, struct irq_data *, bool);
+ void (*deactivate)(struct irq_domain *, struct irq_data *);
+ int (*translate)(struct irq_domain *, struct irq_fwspec *, long unsigned int *, unsigned int *);
+};
+
+enum cpu_idle_type {
+ CPU_IDLE = 0,
+ CPU_NOT_IDLE = 1,
+ CPU_NEWLY_IDLE = 2,
+ CPU_MAX_IDLE_TYPES = 3,
+};
+
+enum {
+ __SD_BALANCE_NEWIDLE = 0,
+ __SD_BALANCE_EXEC = 1,
+ __SD_BALANCE_FORK = 2,
+ __SD_BALANCE_WAKE = 3,
+ __SD_WAKE_AFFINE = 4,
+ __SD_ASYM_CPUCAPACITY = 5,
+ __SD_ASYM_CPUCAPACITY_FULL = 6,
+ __SD_SHARE_CPUCAPACITY = 7,
+ __SD_SHARE_PKG_RESOURCES = 8,
+ __SD_SERIALIZE = 9,
+ __SD_ASYM_PACKING = 10,
+ __SD_PREFER_SIBLING = 11,
+ __SD_OVERLAP = 12,
+ __SD_NUMA = 13,
+ __SD_FLAG_CNT = 14,
+};
+
+struct dev_pm_ops {
+ int (*prepare)(struct device *);
+ void (*complete)(struct device *);
+ int (*suspend)(struct device *);
+ int (*resume)(struct device *);
+ int (*freeze)(struct device *);
+ int (*thaw)(struct device *);
+ int (*poweroff)(struct device *);
+ int (*restore)(struct device *);
+ int (*suspend_late)(struct device *);
+ int (*resume_early)(struct device *);
+ int (*freeze_late)(struct device *);
+ int (*thaw_early)(struct device *);
+ int (*poweroff_late)(struct device *);
+ int (*restore_early)(struct device *);
+ int (*suspend_noirq)(struct device *);
+ int (*resume_noirq)(struct device *);
+ int (*freeze_noirq)(struct device *);
+ int (*thaw_noirq)(struct device *);
+ int (*poweroff_noirq)(struct device *);
+ int (*restore_noirq)(struct device *);
+ int (*runtime_suspend)(struct device *);
+ int (*runtime_resume)(struct device *);
+ int (*runtime_idle)(struct device *);
+};
+
+struct pm_subsys_data {
+ spinlock_t lock;
+ unsigned int refcount;
+};
+
+struct wakeup_source {
+ const char *name;
+ int id;
+ struct list_head entry;
+ spinlock_t lock;
+ struct wake_irq *wakeirq;
+ struct timer_list timer;
+ long unsigned int timer_expires;
+ ktime_t total_time;
+ ktime_t max_time;
+ ktime_t last_time;
+ ktime_t start_prevent_time;
+ ktime_t prevent_sleep_time;
+ long unsigned int event_count;
+ long unsigned int active_count;
+ long unsigned int relax_count;
+ long unsigned int expire_count;
+ long unsigned int wakeup_count;
+ struct device *dev;
+ bool active: 1;
+ bool autosleep_enabled: 1;
+};
+
+struct dev_pm_domain {
+ struct dev_pm_ops ops;
+ int (*start)(struct device *);
+ void (*detach)(struct device *, bool);
+ int (*activate)(struct device *);
+ void (*sync)(struct device *);
+ void (*dismiss)(struct device *);
+};
+
+struct iommu_ops;
+
+struct subsys_private;
+
+struct bus_type {
+ const char *name;
+ const char *dev_name;
+ struct device *dev_root;
+ const struct attribute_group **bus_groups;
+ const struct attribute_group **dev_groups;
+ const struct attribute_group **drv_groups;
+ int (*match)(struct device *, struct device_driver *);
+ int (*uevent)(struct device *, struct kobj_uevent_env *);
+ int (*probe)(struct device *);
+ void (*sync_state)(struct device *);
+ void (*remove)(struct device *);
+ void (*shutdown)(struct device *);
+ int (*online)(struct device *);
+ int (*offline)(struct device *);
+ int (*suspend)(struct device *, pm_message_t);
+ int (*resume)(struct device *);
+ int (*num_vf)(struct device *);
+ int (*dma_configure)(struct device *);
+ void (*dma_cleanup)(struct device *);
+ const struct dev_pm_ops *pm;
+ const struct iommu_ops *iommu_ops;
+ struct subsys_private *p;
+ struct lock_class_key lock_key;
+ bool need_parent_lock;
+};
+
+enum probe_type {
+ PROBE_DEFAULT_STRATEGY = 0,
+ PROBE_PREFER_ASYNCHRONOUS = 1,
+ PROBE_FORCE_SYNCHRONOUS = 2,
+};
+
+struct driver_private;
+
+struct device_driver {
+ const char *name;
+ struct bus_type *bus;
+ struct module *owner;
+ const char *mod_name;
+ bool suppress_bind_attrs;
+ enum probe_type probe_type;
+ const struct of_device_id *of_match_table;
+ const struct acpi_device_id *acpi_match_table;
+ int (*probe)(struct device *);
+ void (*sync_state)(struct device *);
+ int (*remove)(struct device *);
+ void (*shutdown)(struct device *);
+ int (*suspend)(struct device *, pm_message_t);
+ int (*resume)(struct device *);
+ const struct attribute_group **groups;
+ const struct attribute_group **dev_groups;
+ const struct dev_pm_ops *pm;
+ void (*coredump)(struct device *);
+ struct driver_private *p;
+};
+
+enum iommu_cap {
+ IOMMU_CAP_CACHE_COHERENCY = 0,
+ IOMMU_CAP_INTR_REMAP = 1,
+ IOMMU_CAP_NOEXEC = 2,
+ IOMMU_CAP_PRE_BOOT_PROTECTION = 3,
+};
+
+enum iommu_dev_features {
+ IOMMU_DEV_FEAT_SVA = 0,
+ IOMMU_DEV_FEAT_IOPF = 1,
+};
+
+struct iommu_domain;
+
+struct iommu_device;
+
+struct of_phandle_args;
+
+struct iommu_sva;
+
+struct iommu_fault_event;
+
+struct iommu_page_response;
+
+struct iommu_domain_ops;
+
+struct iommu_ops {
+ bool (*capable)(struct device *, enum iommu_cap);
+ struct iommu_domain * (*domain_alloc)(unsigned int);
+ struct iommu_device * (*probe_device)(struct device *);
+ void (*release_device)(struct device *);
+ void (*probe_finalize)(struct device *);
+ struct iommu_group * (*device_group)(struct device *);
+ void (*get_resv_regions)(struct device *, struct list_head *);
+ int (*of_xlate)(struct device *, struct of_phandle_args *);
+ bool (*is_attach_deferred)(struct device *);
+ int (*dev_enable_feat)(struct device *, enum iommu_dev_features);
+ int (*dev_disable_feat)(struct device *, enum iommu_dev_features);
+ struct iommu_sva * (*sva_bind)(struct device *, struct mm_struct *, void *);
+ void (*sva_unbind)(struct iommu_sva *);
+ u32 (*sva_get_pasid)(struct iommu_sva *);
+ int (*page_response)(struct device *, struct iommu_fault_event *, struct iommu_page_response *);
+ int (*def_domain_type)(struct device *);
+ const struct iommu_domain_ops *default_domain_ops;
+ long unsigned int pgsize_bitmap;
+ struct module *owner;
+};
+
+struct device_type {
+ const char *name;
+ const struct attribute_group **groups;
+ int (*uevent)(struct device *, struct kobj_uevent_env *);
+ char * (*devnode)(struct device *, umode_t *, kuid_t *, kgid_t *);
+ void (*release)(struct device *);
+ const struct dev_pm_ops *pm;
+};
+
+struct class {
+ const char *name;
+ struct module *owner;
+ const struct attribute_group **class_groups;
+ const struct attribute_group **dev_groups;
+ struct kobject *dev_kobj;
+ int (*dev_uevent)(struct device *, struct kobj_uevent_env *);
+ char * (*devnode)(struct device *, umode_t *);
+ void (*class_release)(struct class *);
+ void (*dev_release)(struct device *);
+ int (*shutdown_pre)(struct device *);
+ const struct kobj_ns_type_operations *ns_type;
+ const void * (*namespace)(struct device *);
+ void (*get_ownership)(struct device *, kuid_t *, kgid_t *);
+ const struct dev_pm_ops *pm;
+ struct subsys_private *p;
+};
+
+struct device_dma_parameters {
+ unsigned int max_segment_size;
+ unsigned int min_align_mask;
+ long unsigned int segment_boundary_mask;
+};
+
+enum device_physical_location_panel {
+ DEVICE_PANEL_TOP = 0,
+ DEVICE_PANEL_BOTTOM = 1,
+ DEVICE_PANEL_LEFT = 2,
+ DEVICE_PANEL_RIGHT = 3,
+ DEVICE_PANEL_FRONT = 4,
+ DEVICE_PANEL_BACK = 5,
+ DEVICE_PANEL_UNKNOWN = 6,
+};
+
+enum device_physical_location_vertical_position {
+ DEVICE_VERT_POS_UPPER = 0,
+ DEVICE_VERT_POS_CENTER = 1,
+ DEVICE_VERT_POS_LOWER = 2,
+};
+
+enum device_physical_location_horizontal_position {
+ DEVICE_HORI_POS_LEFT = 0,
+ DEVICE_HORI_POS_CENTER = 1,
+ DEVICE_HORI_POS_RIGHT = 2,
+};
+
+struct device_physical_location {
+ enum device_physical_location_panel panel;
+ enum device_physical_location_vertical_position vertical_position;
+ enum device_physical_location_horizontal_position horizontal_position;
+ bool dock;
+ bool lid;
+};
+
+typedef u64 dma_addr_t;
+
+enum dma_data_direction {
+ DMA_BIDIRECTIONAL = 0,
+ DMA_TO_DEVICE = 1,
+ DMA_FROM_DEVICE = 2,
+ DMA_NONE = 3,
+};
+
+struct sg_table;
+
+struct scatterlist;
+
+struct dma_map_ops {
+ unsigned int flags;
+ void * (*alloc)(struct device *, size_t, dma_addr_t *, gfp_t, long unsigned int);
+ void (*free)(struct device *, size_t, void *, dma_addr_t, long unsigned int);
+ struct page * (*alloc_pages)(struct device *, size_t, dma_addr_t *, enum dma_data_direction, gfp_t);
+ void (*free_pages)(struct device *, size_t, struct page *, dma_addr_t, enum dma_data_direction);
+ struct sg_table * (*alloc_noncontiguous)(struct device *, size_t, enum dma_data_direction, gfp_t, long unsigned int);
+ void (*free_noncontiguous)(struct device *, size_t, struct sg_table *, enum dma_data_direction);
+ int (*mmap)(struct device *, struct vm_area_struct *, void *, dma_addr_t, size_t, long unsigned int);
+ int (*get_sgtable)(struct device *, struct sg_table *, void *, dma_addr_t, size_t, long unsigned int);
+ dma_addr_t (*map_page)(struct device *, struct page *, long unsigned int, size_t, enum dma_data_direction, long unsigned int);
+ void (*unmap_page)(struct device *, dma_addr_t, size_t, enum dma_data_direction, long unsigned int);
+ int (*map_sg)(struct device *, struct scatterlist *, int, enum dma_data_direction, long unsigned int);
+ void (*unmap_sg)(struct device *, struct scatterlist *, int, enum dma_data_direction, long unsigned int);
+ dma_addr_t (*map_resource)(struct device *, phys_addr_t, size_t, enum dma_data_direction, long unsigned int);
+ void (*unmap_resource)(struct device *, dma_addr_t, size_t, enum dma_data_direction, long unsigned int);
+ void (*sync_single_for_cpu)(struct device *, dma_addr_t, size_t, enum dma_data_direction);
+ void (*sync_single_for_device)(struct device *, dma_addr_t, size_t, enum dma_data_direction);
+ void (*sync_sg_for_cpu)(struct device *, struct scatterlist *, int, enum dma_data_direction);
+ void (*sync_sg_for_device)(struct device *, struct scatterlist *, int, enum dma_data_direction);
+ void (*cache_sync)(struct device *, void *, size_t, enum dma_data_direction);
+ int (*dma_supported)(struct device *, u64);
+ u64 (*get_required_mask)(struct device *);
+ size_t (*max_mapping_size)(struct device *);
+ size_t (*opt_mapping_size)();
+ long unsigned int (*get_merge_boundary)(struct device *);
+};
+
+struct bus_dma_region {
+ phys_addr_t cpu_start;
+ dma_addr_t dma_start;
+ u64 size;
+ u64 offset;
+};
+
+enum {
+ HI_SOFTIRQ = 0,
+ TIMER_SOFTIRQ = 1,
+ NET_TX_SOFTIRQ = 2,
+ NET_RX_SOFTIRQ = 3,
+ BLOCK_SOFTIRQ = 4,
+ IRQ_POLL_SOFTIRQ = 5,
+ TASKLET_SOFTIRQ = 6,
+ SCHED_SOFTIRQ = 7,
+ HRTIMER_SOFTIRQ = 8,
+ RCU_SOFTIRQ = 9,
+ NR_SOFTIRQS = 10,
+};
+
+enum {
+ PCI_STD_RESOURCES = 0,
+ PCI_STD_RESOURCE_END = 5,
+ PCI_ROM_RESOURCE = 6,
+ PCI_IOV_RESOURCES = 7,
+ PCI_IOV_RESOURCE_END = 12,
+ PCI_BRIDGE_RESOURCES = 13,
+ PCI_BRIDGE_RESOURCE_END = 16,
+ PCI_NUM_RESOURCES = 17,
+ DEVICE_COUNT_RESOURCE = 17,
+};
+
+typedef unsigned int pci_channel_state_t;
+
+typedef unsigned int pcie_reset_state_t;
+
+typedef short unsigned int pci_dev_flags_t;
+
+typedef short unsigned int pci_bus_flags_t;
+
+typedef unsigned int pci_ers_result_t;
+
+typedef bool (*stack_trace_consume_fn)(void *, long unsigned int);
+
+enum refcount_saturation_type {
+ REFCOUNT_ADD_NOT_ZERO_OVF = 0,
+ REFCOUNT_ADD_OVF = 1,
+ REFCOUNT_ADD_UAF = 2,
+ REFCOUNT_SUB_UAF = 3,
+ REFCOUNT_DEC_LEAK = 4,
+};
+
+struct stacktrace_cookie {
+ long unsigned int *store;
+ unsigned int size;
+ unsigned int skip;
+ unsigned int len;
+};
+
+enum lockdep_wait_type {
+ LD_WAIT_INV = 0,
+ LD_WAIT_FREE = 1,
+ LD_WAIT_SPIN = 2,
+ LD_WAIT_CONFIG = 2,
+ LD_WAIT_SLEEP = 3,
+ LD_WAIT_MAX = 4,
+};
+
+struct pollfd {
+ int fd;
+ short int events;
+ short int revents;
+};
+
+typedef struct cpumask cpumask_var_t[1];
+
+struct seq_operations {
+ void * (*start)(struct seq_file *, loff_t *);
+ void (*stop)(struct seq_file *, void *);
+ void * (*next)(struct seq_file *, void *, loff_t *);
+ int (*show)(struct seq_file *, void *);
+};
+
+enum perf_event_state {
+ PERF_EVENT_STATE_DEAD = -4,
+ PERF_EVENT_STATE_EXIT = -3,
+ PERF_EVENT_STATE_ERROR = -2,
+ PERF_EVENT_STATE_OFF = -1,
+ PERF_EVENT_STATE_INACTIVE = 0,
+ PERF_EVENT_STATE_ACTIVE = 1,
+};
+
+typedef struct {
+ atomic_long_t a;
+} local_t;
+
+typedef struct {
+ local_t a;
+} local64_t;
+
+struct perf_event_attr {
+ __u32 type;
+ __u32 size;
+ __u64 config;
+ union {
+ __u64 sample_period;
+ __u64 sample_freq;
+ };
+ __u64 sample_type;
+ __u64 read_format;
+ __u64 disabled: 1;
+ __u64 inherit: 1;
+ __u64 pinned: 1;
+ __u64 exclusive: 1;
+ __u64 exclude_user: 1;
+ __u64 exclude_kernel: 1;
+ __u64 exclude_hv: 1;
+ __u64 exclude_idle: 1;
+ __u64 mmap: 1;
+ __u64 comm: 1;
+ __u64 freq: 1;
+ __u64 inherit_stat: 1;
+ __u64 enable_on_exec: 1;
+ __u64 task: 1;
+ __u64 watermark: 1;
+ __u64 precise_ip: 2;
+ __u64 mmap_data: 1;
+ __u64 sample_id_all: 1;
+ __u64 exclude_host: 1;
+ __u64 exclude_guest: 1;
+ __u64 exclude_callchain_kernel: 1;
+ __u64 exclude_callchain_user: 1;
+ __u64 mmap2: 1;
+ __u64 comm_exec: 1;
+ __u64 use_clockid: 1;
+ __u64 context_switch: 1;
+ __u64 write_backward: 1;
+ __u64 namespaces: 1;
+ __u64 ksymbol: 1;
+ __u64 bpf_event: 1;
+ __u64 aux_output: 1;
+ __u64 cgroup: 1;
+ __u64 text_poke: 1;
+ __u64 build_id: 1;
+ __u64 inherit_thread: 1;
+ __u64 remove_on_exec: 1;
+ __u64 sigtrap: 1;
+ __u64 __reserved_1: 26;
+ union {
+ __u32 wakeup_events;
+ __u32 wakeup_watermark;
+ };
+ __u32 bp_type;
+ union {
+ __u64 bp_addr;
+ __u64 kprobe_func;
+ __u64 uprobe_path;
+ __u64 config1;
+ };
+ union {
+ __u64 bp_len;
+ __u64 kprobe_addr;
+ __u64 probe_offset;
+ __u64 config2;
+ };
+ __u64 branch_sample_type;
+ __u64 sample_regs_user;
+ __u32 sample_stack_user;
+ __s32 clockid;
+ __u64 sample_regs_intr;
+ __u32 aux_watermark;
+ __u16 sample_max_stack;
+ __u16 __reserved_2;
+ __u32 aux_sample_size;
+ __u32 __reserved_3;
+ __u64 sig_data;
+};
+
+struct hw_perf_event_extra {
+ u64 config;
+ unsigned int reg;
+ int alloc;
+ int idx;
+};
+
+struct arch_hw_breakpoint {
+ long unsigned int address;
+ long unsigned int mask;
+ u8 len;
+ u8 type;
+};
+
+struct rhash_head {
+ struct rhash_head *next;
+};
+
+struct rhlist_head {
+ struct rhash_head rhead;
+ struct rhlist_head *next;
+};
+
+struct hw_perf_event {
+ union {
+ struct {
+ u64 config;
+ u64 last_tag;
+ long unsigned int config_base;
+ long unsigned int event_base;
+ int event_base_rdpmc;
+ int idx;
+ int last_cpu;
+ int flags;
+ struct hw_perf_event_extra extra_reg;
+ struct hw_perf_event_extra branch_reg;
+ };
+ struct {
+ struct hrtimer hrtimer;
+ };
+ struct {
+ struct list_head tp_list;
+ };
+ struct {
+ u64 pwr_acc;
+ u64 ptsc;
+ };
+ struct {
+ struct arch_hw_breakpoint info;
+ struct rhlist_head bp_list;
+ };
+ struct {
+ u8 iommu_bank;
+ u8 iommu_cntr;
+ u16 padding;
+ u64 conf;
+ u64 conf1;
+ };
+ };
+ struct task_struct *target;
+ void *addr_filters;
+ long unsigned int addr_filters_gen;
+ int state;
+ local64_t prev_count;
+ u64 sample_period;
+ union {
+ struct {
+ u64 last_period;
+ local64_t period_left;
+ };
+ struct {
+ u64 saved_metric;
+ u64 saved_slots;
+ };
+ };
+ u64 interrupts_seq;
+ u64 interrupts;
+ u64 freq_time_stamp;
+ u64 freq_count_stamp;
+};
+
+struct irq_work {
+ struct __call_single_node node;
+ void (*func)(struct irq_work *);
+ struct rcuwait irqwait;
+};
+
+struct perf_addr_filters_head {
+ struct list_head list;
+ raw_spinlock_t lock;
+ unsigned int nr_file_filters;
+};
+
+struct perf_sample_data;
+
+typedef void (*perf_overflow_handler_t)(struct perf_event *, struct perf_sample_data *, struct pt_regs *);
+
+struct ftrace_ops;
+
+struct ftrace_regs;
+
+typedef void (*ftrace_func_t)(long unsigned int, long unsigned int, struct ftrace_ops *, struct ftrace_regs *);
+
+struct ftrace_hash;
+
+struct ftrace_ops_hash {
+ struct ftrace_hash *notrace_hash;
+ struct ftrace_hash *filter_hash;
+ struct mutex regex_lock;
+};
+
+enum ftrace_ops_cmd {
+ FTRACE_OPS_CMD_ENABLE_SHARE_IPMODIFY_SELF = 0,
+ FTRACE_OPS_CMD_ENABLE_SHARE_IPMODIFY_PEER = 1,
+ FTRACE_OPS_CMD_DISABLE_SHARE_IPMODIFY_PEER = 2,
+};
+
+typedef int (*ftrace_ops_func_t)(struct ftrace_ops *, enum ftrace_ops_cmd);
+
+struct ftrace_ops {
+ ftrace_func_t func;
+ struct ftrace_ops *next;
+ long unsigned int flags;
+ void *private;
+ ftrace_func_t saved_func;
+ struct ftrace_ops_hash local_hash;
+ struct ftrace_ops_hash *func_hash;
+ struct ftrace_ops_hash old_hash;
+ long unsigned int trampoline;
+ long unsigned int trampoline_size;
+ struct list_head list;
+ ftrace_ops_func_t ops_func;
+};
+
+struct pmu;
+
+struct perf_buffer;
+
+struct perf_addr_filter_range;
+
+struct bpf_prog;
+
+struct event_filter;
+
+struct perf_cgroup;
+
+struct perf_event {
+ struct list_head event_entry;
+ struct list_head sibling_list;
+ struct list_head active_list;
+ struct rb_node group_node;
+ u64 group_index;
+ struct list_head migrate_entry;
+ struct hlist_node hlist_entry;
+ struct list_head active_entry;
+ int nr_siblings;
+ int event_caps;
+ int group_caps;
+ struct perf_event *group_leader;
+ struct pmu *pmu;
+ void *pmu_private;
+ enum perf_event_state state;
+ unsigned int attach_state;
+ local64_t count;
+ atomic64_t child_count;
+ u64 total_time_enabled;
+ u64 total_time_running;
+ u64 tstamp;
+ struct perf_event_attr attr;
+ u16 header_size;
+ u16 id_header_size;
+ u16 read_size;
+ struct hw_perf_event hw;
+ struct perf_event_context *ctx;
+ atomic_long_t refcount;
+ atomic64_t child_total_time_enabled;
+ atomic64_t child_total_time_running;
+ struct mutex child_mutex;
+ struct list_head child_list;
+ struct perf_event *parent;
+ int oncpu;
+ int cpu;
+ struct list_head owner_entry;
+ struct task_struct *owner;
+ struct mutex mmap_mutex;
+ atomic_t mmap_count;
+ struct perf_buffer *rb;
+ struct list_head rb_entry;
+ long unsigned int rcu_batches;
+ int rcu_pending;
+ wait_queue_head_t waitq;
+ struct fasync_struct *fasync;
+ unsigned int pending_wakeup;
+ unsigned int pending_kill;
+ unsigned int pending_disable;
+ unsigned int pending_sigtrap;
+ long unsigned int pending_addr;
+ struct irq_work pending_irq;
+ struct callback_head pending_task;
+ unsigned int pending_work;
+ atomic_t event_limit;
+ struct perf_addr_filters_head addr_filters;
+ struct perf_addr_filter_range *addr_filter_ranges;
+ long unsigned int addr_filters_gen;
+ struct perf_event *aux_event;
+ void (*destroy)(struct perf_event *);
+ struct callback_head callback_head;
+ struct pid_namespace *ns;
+ u64 id;
+ atomic64_t lost_samples;
+ u64 (*clock)();
+ perf_overflow_handler_t overflow_handler;
+ void *overflow_handler_context;
+ perf_overflow_handler_t orig_overflow_handler;
+ struct bpf_prog *prog;
+ u64 bpf_cookie;
+ struct trace_event_call *tp_event;
+ struct event_filter *filter;
+ struct ftrace_ops ftrace_ops;
+ struct perf_cgroup *cgrp;
+ void *security;
+ struct list_head sb_list;
+};
+
+struct uid_gid_extent {
+ u32 first;
+ u32 lower_first;
+ u32 count;
+};
+
+struct uid_gid_map {
+ u32 nr_extents;
+ union {
+ struct uid_gid_extent extent[5];
+ struct {
+ struct uid_gid_extent *forward;
+ struct uid_gid_extent *reverse;
+ };
+ };
+};
+
+struct proc_ns_operations;
+
+struct ns_common {
+ atomic_long_t stashed;
+ const struct proc_ns_operations *ops;
+ unsigned int inum;
+ refcount_t count;
+};
+
+struct ctl_table;
+
+struct ctl_table_root;
+
+struct ctl_table_set;
+
+struct ctl_dir;
+
+struct ctl_node;
+
+struct ctl_table_header {
+ union {
+ struct {
+ struct ctl_table *ctl_table;
+ int used;
+ int count;
+ int nreg;
+ };
+ struct callback_head rcu;
+ };
+ struct completion *unregistering;
+ struct ctl_table *ctl_table_arg;
+ struct ctl_table_root *root;
+ struct ctl_table_set *set;
+ struct ctl_dir *parent;
+ struct ctl_node *node;
+ struct hlist_head inodes;
+};
+
+struct ctl_dir {
+ struct ctl_table_header header;
+ struct rb_root root;
+};
+
+struct ctl_table_set {
+ int (*is_seen)(struct ctl_table_set *);
+ struct ctl_dir dir;
+};
+
+struct user_namespace {
+ struct uid_gid_map uid_map;
+ struct uid_gid_map gid_map;
+ struct uid_gid_map projid_map;
+ struct user_namespace *parent;
+ int level;
+ kuid_t owner;
+ kgid_t group;
+ struct ns_common ns;
+ long unsigned int flags;
+ bool parent_could_setfcap;
+ struct list_head keyring_name_list;
+ struct key *user_keyring_register;
+ struct rw_semaphore keyring_sem;
+ struct work_struct work;
+ struct ctl_table_set set;
+ struct ctl_table_header *sysctls;
+ struct ucounts *ucounts;
+ long int ucount_max[10];
+ long int rlimit_max[4];
+};
+
+typedef int proc_handler(struct ctl_table *, int, void *, size_t *, loff_t *);
+
+struct ctl_table_poll;
+
+struct ctl_table {
+ const char *procname;
+ void *data;
+ int maxlen;
+ umode_t mode;
+ struct ctl_table *child;
+ proc_handler *proc_handler;
+ struct ctl_table_poll *poll;
+ void *extra1;
+ void *extra2;
+};
+
+struct ctl_table_poll {
+ atomic_t event;
+ wait_queue_head_t wait;
+};
+
+struct ctl_node {
+ struct rb_node node;
+ struct ctl_table_header *header;
+};
+
+struct ctl_table_root {
+ struct ctl_table_set default_set;
+ struct ctl_table_set * (*lookup)(struct ctl_table_root *);
+ void (*set_ownership)(struct ctl_table_header *, struct ctl_table *, kuid_t *, kgid_t *);
+ int (*permissions)(struct ctl_table_header *, struct ctl_table *);
+};
+
+struct rcu_work {
+ struct work_struct work;
+ struct callback_head rcu;
+ struct workqueue_struct *wq;
+};
+
+struct idr {
+ struct xarray idr_rt;
+ unsigned int idr_base;
+ unsigned int idr_next;
+};
+
+struct kmem_cache;
+
+struct fs_pin;
+
+struct pid_namespace {
+ struct idr idr;
+ struct callback_head rcu;
+ unsigned int pid_allocated;
+ struct task_struct *child_reaper;
+ struct kmem_cache *pid_cachep;
+ unsigned int level;
+ struct pid_namespace *parent;
+ struct fs_pin *bacct;
+ struct user_namespace *user_ns;
+ struct ucounts *ucounts;
+ int reboot;
+ struct ns_common ns;
+};
+
+struct task_cputime {
+ u64 stime;
+ u64 utime;
+ long long unsigned int sum_exec_runtime;
+};
+
+struct ucounts {
+ struct hlist_node node;
+ struct user_namespace *ns;
+ kuid_t uid;
+ atomic_t count;
+ atomic_long_t ucount[10];
+ atomic_long_t rlimit[4];
+};
+
+struct uts_namespace;
+
+struct ipc_namespace;
+
+struct mnt_namespace;
+
+struct net;
+
+struct time_namespace;
+
+struct cgroup_namespace;
+
+struct nsproxy {
+ atomic_t count;
+ struct uts_namespace *uts_ns;
+ struct ipc_namespace *ipc_ns;
+ struct mnt_namespace *mnt_ns;
+ struct pid_namespace *pid_ns_for_children;
+ struct net *net_ns;
+ struct time_namespace *time_ns;
+ struct time_namespace *time_ns_for_children;
+ struct cgroup_namespace *cgroup_ns;
+};
+
+struct cgroup_subsys_state;
+
+struct cgroup;
+
+struct css_set {
+ struct cgroup_subsys_state *subsys[10];
+ refcount_t refcount;
+ struct css_set *dom_cset;
+ struct cgroup *dfl_cgrp;
+ int nr_tasks;
+ struct list_head tasks;
+ struct list_head mg_tasks;
+ struct list_head dying_tasks;
+ struct list_head task_iters;
+ struct list_head e_cset_node[10];
+ struct list_head threaded_csets;
+ struct list_head threaded_csets_node;
+ struct hlist_node hlist;
+ struct list_head cgrp_links;
+ struct list_head mg_src_preload_node;
+ struct list_head mg_dst_preload_node;
+ struct list_head mg_node;
+ struct cgroup *mg_src_cgrp;
+ struct cgroup *mg_dst_cgrp;
+ struct css_set *mg_dst_cset;
+ bool dead;
+ struct callback_head callback_head;
+};
+
+struct perf_event_groups {
+ struct rb_root tree;
+ u64 index;
+};
+
+struct perf_event_context {
+ struct pmu *pmu;
+ raw_spinlock_t lock;
+ struct mutex mutex;
+ struct list_head active_ctx_list;
+ struct perf_event_groups pinned_groups;
+ struct perf_event_groups flexible_groups;
+ struct list_head event_list;
+ struct list_head pinned_active;
+ struct list_head flexible_active;
+ int nr_events;
+ int nr_active;
+ int nr_user;
+ int is_active;
+ int nr_stat;
+ int nr_freq;
+ int rotate_disable;
+ int rotate_necessary;
+ refcount_t refcount;
+ struct task_struct *task;
+ u64 time;
+ u64 timestamp;
+ u64 timeoffset;
+ struct perf_event_context *parent_ctx;
+ u64 parent_gen;
+ u64 generation;
+ int pin_count;
+ int nr_cgroups;
+ void *task_ctx_data;
+ struct callback_head callback_head;
+ local_t nr_pending;
+};
+
+struct ftrace_ret_stack {
+ long unsigned int ret;
+ long unsigned int func;
+ long long unsigned int calltime;
+ long unsigned int *retp;
+};
+
+struct cgroup_subsys;
+
+struct cgroup_subsys_state {
+ struct cgroup *cgroup;
+ struct cgroup_subsys *ss;
+ struct percpu_ref refcnt;
+ struct list_head sibling;
+ struct list_head children;
+ struct list_head rstat_css_node;
+ int id;
+ unsigned int flags;
+ u64 serial_nr;
+ atomic_t online_cnt;
+ struct work_struct destroy_work;
+ struct rcu_work destroy_rwork;
+ struct cgroup_subsys_state *parent;
+};
+
+struct cgroup_file {
+ struct kernfs_node *kn;
+ long unsigned int notified_at;
+ struct timer_list notify_timer;
+};
+
+struct cgroup_base_stat {
+ struct task_cputime cputime;
+};
+
+struct bpf_prog_array;
+
+struct cgroup_bpf {
+ struct bpf_prog_array *effective[33];
+ struct hlist_head progs[33];
+ u8 flags[33];
+ struct list_head storages;
+ struct bpf_prog_array *inactive;
+ struct percpu_ref refcnt;
+ struct work_struct release_work;
+};
+
+struct cgroup_freezer_state {
+ bool freeze;
+ int e_freeze;
+ int nr_frozen_descendants;
+ int nr_frozen_tasks;
+};
+
+struct cgroup_root;
+
+struct cgroup_rstat_cpu;
+
+struct psi_group;
+
+struct cgroup {
+ struct cgroup_subsys_state self;
+ long unsigned int flags;
+ int level;
+ int max_depth;
+ int nr_descendants;
+ int nr_dying_descendants;
+ int max_descendants;
+ int nr_populated_csets;
+ int nr_populated_domain_children;
+ int nr_populated_threaded_children;
+ int nr_threaded_children;
+ struct kernfs_node *kn;
+ struct cgroup_file procs_file;
+ struct cgroup_file events_file;
+ struct cgroup_file psi_files[0];
+ u16 subtree_control;
+ u16 subtree_ss_mask;
+ u16 old_subtree_control;
+ u16 old_subtree_ss_mask;
+ struct cgroup_subsys_state *subsys[10];
+ struct cgroup_root *root;
+ struct list_head cset_links;
+ struct list_head e_csets[10];
+ struct cgroup *dom_cgrp;
+ struct cgroup *old_dom_cgrp;
+ struct cgroup_rstat_cpu *rstat_cpu;
+ struct list_head rstat_css_list;
+ struct cgroup_base_stat last_bstat;
+ struct cgroup_base_stat bstat;
+ struct prev_cputime prev_cputime;
+ struct list_head pidlists;
+ struct mutex pidlist_mutex;
+ wait_queue_head_t offline_waitq;
+ struct work_struct release_agent_work;
+ struct psi_group *psi;
+ struct cgroup_bpf bpf;
+ atomic_t congestion_count;
+ struct cgroup_freezer_state freezer;
+ struct bpf_local_storage *bpf_cgrp_storage;
+ struct cgroup *ancestors[0];
+};
+
+struct taskstats {
+ __u16 version;
+ __u32 ac_exitcode;
+ __u8 ac_flag;
+ __u8 ac_nice;
+ __u64 cpu_count;
+ __u64 cpu_delay_total;
+ __u64 blkio_count;
+ __u64 blkio_delay_total;
+ __u64 swapin_count;
+ __u64 swapin_delay_total;
+ __u64 cpu_run_real_total;
+ __u64 cpu_run_virtual_total;
+ char ac_comm[32];
+ __u8 ac_sched;
+ __u8 ac_pad[3];
+ int: 32;
+ __u32 ac_uid;
+ __u32 ac_gid;
+ __u32 ac_pid;
+ __u32 ac_ppid;
+ __u32 ac_btime;
+ __u64 ac_etime;
+ __u64 ac_utime;
+ __u64 ac_stime;
+ __u64 ac_minflt;
+ __u64 ac_majflt;
+ __u64 coremem;
+ __u64 virtmem;
+ __u64 hiwater_rss;
+ __u64 hiwater_vm;
+ __u64 read_char;
+ __u64 write_char;
+ __u64 read_syscalls;
+ __u64 write_syscalls;
+ __u64 read_bytes;
+ __u64 write_bytes;
+ __u64 cancelled_write_bytes;
+ __u64 nvcsw;
+ __u64 nivcsw;
+ __u64 ac_utimescaled;
+ __u64 ac_stimescaled;
+ __u64 cpu_scaled_run_real_total;
+ __u64 freepages_count;
+ __u64 freepages_delay_total;
+ __u64 thrashing_count;
+ __u64 thrashing_delay_total;
+ __u64 ac_btime64;
+ __u64 compact_count;
+ __u64 compact_delay_total;
+ __u32 ac_tgid;
+ __u64 ac_tgetime;
+ __u64 ac_exe_dev;
+ __u64 ac_exe_inode;
+ __u64 wpcopy_count;
+ __u64 wpcopy_delay_total;
+};
+
+typedef void (*poll_queue_proc)(struct file *, wait_queue_head_t *, struct poll_table_struct *);
+
+struct poll_table_struct {
+ poll_queue_proc _qproc;
+ __poll_t _key;
+};
+
+struct seq_file {
+ char *buf;
+ size_t size;
+ size_t from;
+ size_t count;
+ size_t pad_until;
+ loff_t index;
+ loff_t read_pos;
+ struct mutex lock;
+ const struct seq_operations *op;
+ int poll_event;
+ const struct file *file;
+ void *private;
+};
+
+enum lockdown_reason {
+ LOCKDOWN_NONE = 0,
+ LOCKDOWN_MODULE_SIGNATURE = 1,
+ LOCKDOWN_DEV_MEM = 2,
+ LOCKDOWN_EFI_TEST = 3,
+ LOCKDOWN_KEXEC = 4,
+ LOCKDOWN_HIBERNATION = 5,
+ LOCKDOWN_PCI_ACCESS = 6,
+ LOCKDOWN_IOPORT = 7,
+ LOCKDOWN_MSR = 8,
+ LOCKDOWN_ACPI_TABLES = 9,
+ LOCKDOWN_DEVICE_TREE = 10,
+ LOCKDOWN_PCMCIA_CIS = 11,
+ LOCKDOWN_TIOCSSERIAL = 12,
+ LOCKDOWN_MODULE_PARAMETERS = 13,
+ LOCKDOWN_MMIOTRACE = 14,
+ LOCKDOWN_DEBUGFS = 15,
+ LOCKDOWN_XMON_WR = 16,
+ LOCKDOWN_BPF_WRITE_USER = 17,
+ LOCKDOWN_DBG_WRITE_KERNEL = 18,
+ LOCKDOWN_RTAS_ERROR_INJECTION = 19,
+ LOCKDOWN_INTEGRITY_MAX = 20,
+ LOCKDOWN_KCORE = 21,
+ LOCKDOWN_KPROBES = 22,
+ LOCKDOWN_BPF_READ_KERNEL = 23,
+ LOCKDOWN_DBG_READ_KERNEL = 24,
+ LOCKDOWN_PERF = 25,
+ LOCKDOWN_TRACEFS = 26,
+ LOCKDOWN_XMON_RW = 27,
+ LOCKDOWN_XFRM_SECRET = 28,
+ LOCKDOWN_CONFIDENTIALITY_MAX = 29,
+};
+
+struct trace_event_functions;
+
+struct trace_event {
+ struct hlist_node node;
+ struct list_head list;
+ int type;
+ struct trace_event_functions *funcs;
+};
+
+struct trace_event_class;
+
+struct trace_event_call {
+ struct list_head list;
+ struct trace_event_class *class;
+ union {
+ char *name;
+ struct tracepoint *tp;
+ };
+ struct trace_event event;
+ char *print_fmt;
+ struct event_filter *filter;
+ union {
+ void *module;
+ atomic_t refcnt;
+ };
+ void *data;
+ int flags;
+ int perf_refcount;
+ struct hlist_head *perf_events;
+ struct bpf_prog_array *prog_array;
+ int (*perf_perm)(struct trace_event_call *, struct perf_event *);
+};
+
+struct ring_buffer_event {
+ u32 type_len: 5;
+ u32 time_delta: 27;
+ u32 array[0];
+};
+
+struct cgroup_namespace {
+ struct ns_common ns;
+ struct user_namespace *user_ns;
+ struct ucounts *ucounts;
+ struct css_set *root_cset;
+};
+
+struct nsset;
+
+struct proc_ns_operations {
+ const char *name;
+ const char *real_ns_name;
+ int type;
+ struct ns_common * (*get)(struct task_struct *);
+ void (*put)(struct ns_common *);
+ int (*install)(struct nsset *, struct ns_common *);
+ struct user_namespace * (*owner)(struct ns_common *);
+ struct ns_common * (*get_parent)(struct ns_common *);
+};
+
+struct ftrace_regs {
+ struct pt_regs regs;
+};
+
+struct ftrace_hash {
+ long unsigned int size_bits;
+ struct hlist_head *buckets;
+ long unsigned int count;
+ long unsigned int flags;
+ struct callback_head rcu;
+};
+
+enum perf_sw_ids {
+ PERF_COUNT_SW_CPU_CLOCK = 0,
+ PERF_COUNT_SW_TASK_CLOCK = 1,
+ PERF_COUNT_SW_PAGE_FAULTS = 2,
+ PERF_COUNT_SW_CONTEXT_SWITCHES = 3,
+ PERF_COUNT_SW_CPU_MIGRATIONS = 4,
+ PERF_COUNT_SW_PAGE_FAULTS_MIN = 5,
+ PERF_COUNT_SW_PAGE_FAULTS_MAJ = 6,
+ PERF_COUNT_SW_ALIGNMENT_FAULTS = 7,
+ PERF_COUNT_SW_EMULATION_FAULTS = 8,
+ PERF_COUNT_SW_DUMMY = 9,
+ PERF_COUNT_SW_BPF_OUTPUT = 10,
+ PERF_COUNT_SW_CGROUP_SWITCHES = 11,
+ PERF_COUNT_SW_MAX = 12,
+};
+
+enum perf_branch_sample_type_shift {
+ PERF_SAMPLE_BRANCH_USER_SHIFT = 0,
+ PERF_SAMPLE_BRANCH_KERNEL_SHIFT = 1,
+ PERF_SAMPLE_BRANCH_HV_SHIFT = 2,
+ PERF_SAMPLE_BRANCH_ANY_SHIFT = 3,
+ PERF_SAMPLE_BRANCH_ANY_CALL_SHIFT = 4,
+ PERF_SAMPLE_BRANCH_ANY_RETURN_SHIFT = 5,
+ PERF_SAMPLE_BRANCH_IND_CALL_SHIFT = 6,
+ PERF_SAMPLE_BRANCH_ABORT_TX_SHIFT = 7,
+ PERF_SAMPLE_BRANCH_IN_TX_SHIFT = 8,
+ PERF_SAMPLE_BRANCH_NO_TX_SHIFT = 9,
+ PERF_SAMPLE_BRANCH_COND_SHIFT = 10,
+ PERF_SAMPLE_BRANCH_CALL_STACK_SHIFT = 11,
+ PERF_SAMPLE_BRANCH_IND_JUMP_SHIFT = 12,
+ PERF_SAMPLE_BRANCH_CALL_SHIFT = 13,
+ PERF_SAMPLE_BRANCH_NO_FLAGS_SHIFT = 14,
+ PERF_SAMPLE_BRANCH_NO_CYCLES_SHIFT = 15,
+ PERF_SAMPLE_BRANCH_TYPE_SAVE_SHIFT = 16,
+ PERF_SAMPLE_BRANCH_HW_INDEX_SHIFT = 17,
+ PERF_SAMPLE_BRANCH_PRIV_SAVE_SHIFT = 18,
+ PERF_SAMPLE_BRANCH_MAX_SHIFT = 19,
+};
+
+union perf_mem_data_src {
+ __u64 val;
+ struct {
+ __u64 mem_op: 5;
+ __u64 mem_lvl: 14;
+ __u64 mem_snoop: 5;
+ __u64 mem_lock: 2;
+ __u64 mem_dtlb: 7;
+ __u64 mem_lvl_num: 4;
+ __u64 mem_remote: 1;
+ __u64 mem_snoopx: 2;
+ __u64 mem_blk: 3;
+ __u64 mem_hops: 3;
+ __u64 mem_rsvd: 18;
+ };
+};
+
+struct perf_branch_entry {
+ __u64 from;
+ __u64 to;
+ __u64 mispred: 1;
+ __u64 predicted: 1;
+ __u64 in_tx: 1;
+ __u64 abort: 1;
+ __u64 cycles: 16;
+ __u64 type: 4;
+ __u64 spec: 2;
+ __u64 new_type: 4;
+ __u64 priv: 3;
+ __u64 reserved: 31;
+};
+
+union perf_sample_weight {
+ __u64 full;
+ struct {
+ __u32 var1_dw;
+ __u16 var2_w;
+ __u16 var3_w;
+ };
+};
+
+enum exception_stack_ordering {
+ ESTACK_DF = 0,
+ ESTACK_NMI = 1,
+ ESTACK_DB = 2,
+ ESTACK_MCE = 3,
+ ESTACK_VC = 4,
+ ESTACK_VC2 = 5,
+ N_EXCEPTION_STACKS = 6,
+};
+
+struct perf_cpu_context;
+
+struct perf_output_handle;
+
+struct pmu {
+ struct list_head entry;
+ struct module *module;
+ struct device *dev;
+ const struct attribute_group **attr_groups;
+ const struct attribute_group **attr_update;
+ const char *name;
+ int type;
+ int capabilities;
+ int *pmu_disable_count;
+ struct perf_cpu_context *pmu_cpu_context;
+ atomic_t exclusive_cnt;
+ int task_ctx_nr;
+ int hrtimer_interval_ms;
+ unsigned int nr_addr_filters;
+ void (*pmu_enable)(struct pmu *);
+ void (*pmu_disable)(struct pmu *);
+ int (*event_init)(struct perf_event *);
+ void (*event_mapped)(struct perf_event *, struct mm_struct *);
+ void (*event_unmapped)(struct perf_event *, struct mm_struct *);
+ int (*add)(struct perf_event *, int);
+ void (*del)(struct perf_event *, int);
+ void (*start)(struct perf_event *, int);
+ void (*stop)(struct perf_event *, int);
+ void (*read)(struct perf_event *);
+ void (*start_txn)(struct pmu *, unsigned int);
+ int (*commit_txn)(struct pmu *);
+ void (*cancel_txn)(struct pmu *);
+ int (*event_idx)(struct perf_event *);
+ void (*sched_task)(struct perf_event_context *, bool);
+ struct kmem_cache *task_ctx_cache;
+ void (*swap_task_ctx)(struct perf_event_context *, struct perf_event_context *);
+ void * (*setup_aux)(struct perf_event *, void **, int, bool);
+ void (*free_aux)(void *);
+ long int (*snapshot_aux)(struct perf_event *, struct perf_output_handle *, long unsigned int);
+ int (*addr_filters_validate)(struct list_head *);
+ void (*addr_filters_sync)(struct perf_event *);
+ int (*aux_output_match)(struct perf_event *);
+ int (*filter_match)(struct perf_event *);
+ int (*check_period)(struct perf_event *, u64);
+};
+
+struct perf_regs {
+ __u64 abi;
+ struct pt_regs *regs;
+};
+
+enum {
+ TASKSTATS_CMD_UNSPEC = 0,
+ TASKSTATS_CMD_GET = 1,
+ TASKSTATS_CMD_NEW = 2,
+ __TASKSTATS_CMD_MAX = 3,
+};
+
+enum ucount_type {
+ UCOUNT_USER_NAMESPACES = 0,
+ UCOUNT_PID_NAMESPACES = 1,
+ UCOUNT_UTS_NAMESPACES = 2,
+ UCOUNT_IPC_NAMESPACES = 3,
+ UCOUNT_NET_NAMESPACES = 4,
+ UCOUNT_MNT_NAMESPACES = 5,
+ UCOUNT_CGROUP_NAMESPACES = 6,
+ UCOUNT_TIME_NAMESPACES = 7,
+ UCOUNT_INOTIFY_INSTANCES = 8,
+ UCOUNT_INOTIFY_WATCHES = 9,
+ UCOUNT_COUNTS = 10,
+};
+
+enum rlimit_type {
+ UCOUNT_RLIMIT_NPROC = 0,
+ UCOUNT_RLIMIT_MSGQUEUE = 1,
+ UCOUNT_RLIMIT_SIGPENDING = 2,
+ UCOUNT_RLIMIT_MEMLOCK = 3,
+ UCOUNT_RLIMIT_COUNTS = 4,
+};
+
+enum cpu_usage_stat {
+ CPUTIME_USER = 0,
+ CPUTIME_NICE = 1,
+ CPUTIME_SYSTEM = 2,
+ CPUTIME_SOFTIRQ = 3,
+ CPUTIME_IRQ = 4,
+ CPUTIME_IDLE = 5,
+ CPUTIME_IOWAIT = 6,
+ CPUTIME_STEAL = 7,
+ CPUTIME_GUEST = 8,
+ CPUTIME_GUEST_NICE = 9,
+ NR_STATS = 10,
+};
+
+struct u64_stats_sync {};
+
+enum cgroup_bpf_attach_type {
+ CGROUP_BPF_ATTACH_TYPE_INVALID = -1,
+ CGROUP_INET_INGRESS = 0,
+ CGROUP_INET_EGRESS = 1,
+ CGROUP_INET_SOCK_CREATE = 2,
+ CGROUP_SOCK_OPS = 3,
+ CGROUP_DEVICE = 4,
+ CGROUP_INET4_BIND = 5,
+ CGROUP_INET6_BIND = 6,
+ CGROUP_INET4_CONNECT = 7,
+ CGROUP_INET6_CONNECT = 8,
+ CGROUP_INET4_POST_BIND = 9,
+ CGROUP_INET6_POST_BIND = 10,
+ CGROUP_UDP4_SENDMSG = 11,
+ CGROUP_UDP6_SENDMSG = 12,
+ CGROUP_SYSCTL = 13,
+ CGROUP_UDP4_RECVMSG = 14,
+ CGROUP_UDP6_RECVMSG = 15,
+ CGROUP_GETSOCKOPT = 16,
+ CGROUP_SETSOCKOPT = 17,
+ CGROUP_INET4_GETPEERNAME = 18,
+ CGROUP_INET6_GETPEERNAME = 19,
+ CGROUP_INET4_GETSOCKNAME = 20,
+ CGROUP_INET6_GETSOCKNAME = 21,
+ CGROUP_INET_SOCK_RELEASE = 22,
+ CGROUP_LSM_START = 23,
+ CGROUP_LSM_END = 32,
+ MAX_CGROUP_BPF_ATTACH_TYPE = 33,
+};
+
+struct psi_group {};
+
+enum cgroup_subsys_id {
+ cpuset_cgrp_id = 0,
+ cpu_cgrp_id = 1,
+ cpuacct_cgrp_id = 2,
+ io_cgrp_id = 3,
+ memory_cgrp_id = 4,
+ devices_cgrp_id = 5,
+ freezer_cgrp_id = 6,
+ net_cls_cgrp_id = 7,
+ perf_event_cgrp_id = 8,
+ hugetlb_cgrp_id = 9,
+ CGROUP_SUBSYS_COUNT = 10,
+};
+
+struct cgroup_taskset;
+
+struct cftype;
+
+struct cgroup_subsys {
+ struct cgroup_subsys_state * (*css_alloc)(struct cgroup_subsys_state *);
+ int (*css_online)(struct cgroup_subsys_state *);
+ void (*css_offline)(struct cgroup_subsys_state *);
+ void (*css_released)(struct cgroup_subsys_state *);
+ void (*css_free)(struct cgroup_subsys_state *);
+ void (*css_reset)(struct cgroup_subsys_state *);
+ void (*css_rstat_flush)(struct cgroup_subsys_state *, int);
+ int (*css_extra_stat_show)(struct seq_file *, struct cgroup_subsys_state *);
+ int (*can_attach)(struct cgroup_taskset *);
+ void (*cancel_attach)(struct cgroup_taskset *);
+ void (*attach)(struct cgroup_taskset *);
+ void (*post_attach)();
+ int (*can_fork)(struct task_struct *, struct css_set *);
+ void (*cancel_fork)(struct task_struct *, struct css_set *);
+ void (*fork)(struct task_struct *);
+ void (*exit)(struct task_struct *);
+ void (*release)(struct task_struct *);
+ void (*bind)(struct cgroup_subsys_state *);
+ bool early_init: 1;
+ bool implicit_on_dfl: 1;
+ bool threaded: 1;
+ int id;
+ const char *name;
+ const char *legacy_name;
+ struct cgroup_root *root;
+ struct idr css_idr;
+ struct list_head cfts;
+ struct cftype *dfl_cftypes;
+ struct cftype *legacy_cftypes;
+ unsigned int depends_on;
+};
+
+struct cgroup_rstat_cpu {
+ struct u64_stats_sync bsync;
+ struct cgroup_base_stat bstat;
+ struct cgroup_base_stat last_bstat;
+ struct cgroup *updated_children;
+ struct cgroup *updated_next;
+};
+
+struct cgroup_root {
+ struct kernfs_root *kf_root;
+ unsigned int subsys_mask;
+ int hierarchy_id;
+ struct cgroup cgrp;
+ struct cgroup *cgrp_ancestor_storage;
+ atomic_t nr_cgrps;
+ struct list_head root_list;
+ unsigned int flags;
+ char release_agent_path[4096];
+ char name[64];
+};
+
+struct cftype {
+ char name[64];
+ long unsigned int private;
+ size_t max_write_len;
+ unsigned int flags;
+ unsigned int file_offset;
+ struct cgroup_subsys *ss;
+ struct list_head node;
+ struct kernfs_ops *kf_ops;
+ int (*open)(struct kernfs_open_file *);
+ void (*release)(struct kernfs_open_file *);
+ u64 (*read_u64)(struct cgroup_subsys_state *, struct cftype *);
+ s64 (*read_s64)(struct cgroup_subsys_state *, struct cftype *);
+ int (*seq_show)(struct seq_file *, void *);
+ void * (*seq_start)(struct seq_file *, loff_t *);
+ void * (*seq_next)(struct seq_file *, void *, loff_t *);
+ void (*seq_stop)(struct seq_file *, void *);
+ int (*write_u64)(struct cgroup_subsys_state *, struct cftype *, u64);
+ int (*write_s64)(struct cgroup_subsys_state *, struct cftype *, s64);
+ ssize_t (*write)(struct kernfs_open_file *, char *, size_t, loff_t);
+ __poll_t (*poll)(struct kernfs_open_file *, struct poll_table_struct *);
+ struct lock_class_key lockdep_key;
+};
+
+struct perf_callchain_entry {
+ __u64 nr;
+ __u64 ip[0];
+};
+
+typedef long unsigned int (*perf_copy_f)(void *, const void *, long unsigned int, long unsigned int);
+
+struct perf_raw_frag {
+ union {
+ struct perf_raw_frag *next;
+ long unsigned int pad;
+ };
+ perf_copy_f copy;
+ void *data;
+ u32 size;
+} __attribute__((packed));
+
+struct perf_raw_record {
+ struct perf_raw_frag frag;
+ u32 size;
+};
+
+struct perf_branch_stack {
+ __u64 nr;
+ __u64 hw_idx;
+ struct perf_branch_entry entries[0];
+};
+
+struct perf_cpu_context {
+ struct perf_event_context ctx;
+ struct perf_event_context *task_ctx;
+ int active_oncpu;
+ int exclusive;
+ raw_spinlock_t hrtimer_lock;
+ struct hrtimer hrtimer;
+ ktime_t hrtimer_interval;
+ unsigned int hrtimer_active;
+ struct perf_cgroup *cgrp;
+ struct list_head cgrp_cpuctx_entry;
+ struct list_head sched_cb_entry;
+ int sched_cb_usage;
+ int online;
+ int heap_size;
+ struct perf_event **heap;
+ struct perf_event *heap_default[2];
+};
+
+struct perf_output_handle {
+ struct perf_event *event;
+ struct perf_buffer *rb;
+ long unsigned int wakeup;
+ long unsigned int size;
+ u64 aux_flags;
+ union {
+ void *addr;
+ long unsigned int head;
+ };
+ int page;
+};
+
+struct perf_addr_filter_range {
+ long unsigned int start;
+ long unsigned int size;
+};
+
+struct perf_sample_data {
+ u64 sample_flags;
+ u64 period;
+ struct perf_branch_stack *br_stack;
+ union perf_sample_weight weight;
+ union perf_mem_data_src data_src;
+ u64 txn;
+ u64 addr;
+ struct perf_raw_record *raw;
+ u64 type;
+ u64 ip;
+ struct {
+ u32 pid;
+ u32 tid;
+ } tid_entry;
+ u64 time;
+ u64 id;
+ u64 stream_id;
+ struct {
+ u32 cpu;
+ u32 reserved;
+ } cpu_entry;
+ struct perf_callchain_entry *callchain;
+ u64 aux_size;
+ struct perf_regs regs_user;
+ struct perf_regs regs_intr;
+ u64 stack_user_size;
+ u64 phys_addr;
+ u64 cgroup;
+ u64 data_page_size;
+ u64 code_page_size;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct prog_entry;
+
+struct event_filter {
+ struct prog_entry *prog;
+ char *filter_string;
+};
+
+struct perf_cgroup_info;
+
+struct perf_cgroup {
+ struct cgroup_subsys_state css;
+ struct perf_cgroup_info *info;
+};
+
+struct perf_cgroup_info {
+ u64 time;
+ u64 timestamp;
+ u64 timeoffset;
+ int active;
+};
+
+struct seq_buf {
+ char *buffer;
+ size_t size;
+ size_t len;
+ loff_t readpos;
+};
+
+struct trace_seq {
+ char buffer[4096];
+ struct seq_buf seq;
+ int full;
+};
+
+struct trace_entry {
+ short unsigned int type;
+ unsigned char flags;
+ unsigned char preempt_count;
+ int pid;
+};
+
+struct trace_array;
+
+struct tracer;
+
+struct array_buffer;
+
+struct ring_buffer_iter;
+
+struct trace_iterator {
+ struct trace_array *tr;
+ struct tracer *trace;
+ struct array_buffer *array_buffer;
+ void *private;
+ int cpu_file;
+ struct mutex mutex;
+ struct ring_buffer_iter **buffer_iter;
+ long unsigned int iter_flags;
+ void *temp;
+ unsigned int temp_size;
+ char *fmt;
+ unsigned int fmt_size;
+ long int wait_index;
+ struct trace_seq tmp_seq;
+ cpumask_var_t started;
+ bool snapshot;
+ struct trace_seq seq;
+ struct trace_entry *ent;
+ long unsigned int lost_events;
+ int leftover;
+ int ent_size;
+ int cpu;
+ u64 ts;
+ loff_t pos;
+ long int idx;
+};
+
+struct trace_buffer;
+
+struct trace_array_cpu;
+
+struct array_buffer {
+ struct trace_array *tr;
+ struct trace_buffer *buffer;
+ struct trace_array_cpu *data;
+ u64 time_start;
+ int cpu;
+};
+
+struct trace_pid_list;
+
+struct trace_event_file;
+
+struct trace_options;
+
+struct trace_func_repeats;
+
+struct trace_array {
+ struct list_head list;
+ char *name;
+ struct array_buffer array_buffer;
+ struct trace_pid_list *filtered_pids;
+ struct trace_pid_list *filtered_no_pids;
+ arch_spinlock_t max_lock;
+ int buffer_disabled;
+ int sys_refcount_enter;
+ int sys_refcount_exit;
+ struct trace_event_file *enter_syscall_files[451];
+ struct trace_event_file *exit_syscall_files[451];
+ int stop_count;
+ int clock_id;
+ int nr_topts;
+ bool clear_trace;
+ int buffer_percent;
+ unsigned int n_err_log_entries;
+ struct tracer *current_trace;
+ unsigned int trace_flags;
+ unsigned char trace_flags_index[32];
+ unsigned int flags;
+ raw_spinlock_t start_lock;
+ struct list_head err_log;
+ struct dentry *dir;
+ struct dentry *options;
+ struct dentry *percpu_dir;
+ struct dentry *event_dir;
+ struct trace_options *topts;
+ struct list_head systems;
+ struct list_head events;
+ struct trace_event_file *trace_marker_file;
+ cpumask_var_t tracing_cpumask;
+ int ref;
+ int trace_ref;
+ struct ftrace_ops *ops;
+ struct trace_pid_list *function_pids;
+ struct trace_pid_list *function_no_pids;
+ struct list_head func_probes;
+ struct list_head mod_trace;
+ struct list_head mod_notrace;
+ int function_enabled;
+ int no_filter_buffering_ref;
+ struct list_head hist_vars;
+ struct trace_func_repeats *last_func_repeats;
+};
+
+enum print_line_t {
+ TRACE_TYPE_PARTIAL_LINE = 0,
+ TRACE_TYPE_HANDLED = 1,
+ TRACE_TYPE_UNHANDLED = 2,
+ TRACE_TYPE_NO_CONSUME = 3,
+};
+
+struct tracer_flags;
+
+struct tracer {
+ const char *name;
+ int (*init)(struct trace_array *);
+ void (*reset)(struct trace_array *);
+ void (*start)(struct trace_array *);
+ void (*stop)(struct trace_array *);
+ int (*update_thresh)(struct trace_array *);
+ void (*open)(struct trace_iterator *);
+ void (*pipe_open)(struct trace_iterator *);
+ void (*close)(struct trace_iterator *);
+ void (*pipe_close)(struct trace_iterator *);
+ ssize_t (*read)(struct trace_iterator *, struct file *, char *, size_t, loff_t *);
+ ssize_t (*splice_read)(struct trace_iterator *, struct file *, loff_t *, struct pipe_inode_info *, size_t, unsigned int);
+ void (*print_header)(struct seq_file *);
+ enum print_line_t (*print_line)(struct trace_iterator *);
+ int (*set_flag)(struct trace_array *, u32, u32, int);
+ int (*flag_changed)(struct trace_array *, u32, int);
+ struct tracer *next;
+ struct tracer_flags *flags;
+ int enabled;
+ bool print_max;
+ bool allow_instances;
+ bool noboot;
+};
+
+typedef enum print_line_t (*trace_print_func)(struct trace_iterator *, int, struct trace_event *);
+
+struct trace_event_functions {
+ trace_print_func trace;
+ trace_print_func raw;
+ trace_print_func hex;
+ trace_print_func binary;
+};
+
+enum trace_flag_type {
+ TRACE_FLAG_IRQS_OFF = 1,
+ TRACE_FLAG_IRQS_NOSUPPORT = 2,
+ TRACE_FLAG_NEED_RESCHED = 4,
+ TRACE_FLAG_HARDIRQ = 8,
+ TRACE_FLAG_SOFTIRQ = 16,
+ TRACE_FLAG_PREEMPT_RESCHED = 32,
+ TRACE_FLAG_NMI = 64,
+ TRACE_FLAG_BH_OFF = 128,
+};
+
+enum trace_reg {
+ TRACE_REG_REGISTER = 0,
+ TRACE_REG_UNREGISTER = 1,
+ TRACE_REG_PERF_REGISTER = 2,
+ TRACE_REG_PERF_UNREGISTER = 3,
+ TRACE_REG_PERF_OPEN = 4,
+ TRACE_REG_PERF_CLOSE = 5,
+ TRACE_REG_PERF_ADD = 6,
+ TRACE_REG_PERF_DEL = 7,
+};
+
+struct trace_event_fields {
+ const char *type;
+ union {
+ struct {
+ const char *name;
+ const int size;
+ const int align;
+ const int is_signed;
+ const int filter_type;
+ };
+ int (*define_fields)(struct trace_event_call *);
+ };
+};
+
+struct trace_event_class {
+ const char *system;
+ void *probe;
+ void *perf_probe;
+ int (*reg)(struct trace_event_call *, enum trace_reg, void *);
+ struct trace_event_fields *fields_array;
+ struct list_head * (*get_fields)(struct trace_event_call *);
+ struct list_head fields;
+ int (*raw_init)(struct trace_event_call *);
+};
+
+struct trace_subsystem_dir;
+
+struct trace_event_file {
+ struct list_head list;
+ struct trace_event_call *event_call;
+ struct event_filter *filter;
+ struct dentry *dir;
+ struct trace_array *tr;
+ struct trace_subsystem_dir *system;
+ struct list_head triggers;
+ long unsigned int flags;
+ atomic_t sm_ref;
+ atomic_t tm_ref;
+};
+
+enum {
+ TRACE_EVENT_FL_FILTERED_BIT = 0,
+ TRACE_EVENT_FL_CAP_ANY_BIT = 1,
+ TRACE_EVENT_FL_NO_SET_FILTER_BIT = 2,
+ TRACE_EVENT_FL_IGNORE_ENABLE_BIT = 3,
+ TRACE_EVENT_FL_TRACEPOINT_BIT = 4,
+ TRACE_EVENT_FL_DYNAMIC_BIT = 5,
+ TRACE_EVENT_FL_KPROBE_BIT = 6,
+ TRACE_EVENT_FL_UPROBE_BIT = 7,
+ TRACE_EVENT_FL_EPROBE_BIT = 8,
+ TRACE_EVENT_FL_CUSTOM_BIT = 9,
+};
+
+enum {
+ TRACE_EVENT_FL_FILTERED = 1,
+ TRACE_EVENT_FL_CAP_ANY = 2,
+ TRACE_EVENT_FL_NO_SET_FILTER = 4,
+ TRACE_EVENT_FL_IGNORE_ENABLE = 8,
+ TRACE_EVENT_FL_TRACEPOINT = 16,
+ TRACE_EVENT_FL_DYNAMIC = 32,
+ TRACE_EVENT_FL_KPROBE = 64,
+ TRACE_EVENT_FL_UPROBE = 128,
+ TRACE_EVENT_FL_EPROBE = 256,
+ TRACE_EVENT_FL_CUSTOM = 512,
+};
+
+enum {
+ EVENT_FILE_FL_ENABLED_BIT = 0,
+ EVENT_FILE_FL_RECORDED_CMD_BIT = 1,
+ EVENT_FILE_FL_RECORDED_TGID_BIT = 2,
+ EVENT_FILE_FL_FILTERED_BIT = 3,
+ EVENT_FILE_FL_NO_SET_FILTER_BIT = 4,
+ EVENT_FILE_FL_SOFT_MODE_BIT = 5,
+ EVENT_FILE_FL_SOFT_DISABLED_BIT = 6,
+ EVENT_FILE_FL_TRIGGER_MODE_BIT = 7,
+ EVENT_FILE_FL_TRIGGER_COND_BIT = 8,
+ EVENT_FILE_FL_PID_FILTER_BIT = 9,
+ EVENT_FILE_FL_WAS_ENABLED_BIT = 10,
+};
+
+enum {
+ EVENT_FILE_FL_ENABLED = 1,
+ EVENT_FILE_FL_RECORDED_CMD = 2,
+ EVENT_FILE_FL_RECORDED_TGID = 4,
+ EVENT_FILE_FL_FILTERED = 8,
+ EVENT_FILE_FL_NO_SET_FILTER = 16,
+ EVENT_FILE_FL_SOFT_MODE = 32,
+ EVENT_FILE_FL_SOFT_DISABLED = 64,
+ EVENT_FILE_FL_TRIGGER_MODE = 128,
+ EVENT_FILE_FL_TRIGGER_COND = 256,
+ EVENT_FILE_FL_PID_FILTER = 512,
+ EVENT_FILE_FL_WAS_ENABLED = 1024,
+};
+
+struct event_subsystem;
+
+struct trace_subsystem_dir {
+ struct list_head list;
+ struct event_subsystem *subsystem;
+ struct trace_array *tr;
+ struct dentry *entry;
+ int ref_count;
+ int nr_events;
+};
+
+enum event_trigger_type {
+ ETT_NONE = 0,
+ ETT_TRACE_ONOFF = 1,
+ ETT_SNAPSHOT = 2,
+ ETT_STACKTRACE = 4,
+ ETT_EVENT_ENABLE = 8,
+ ETT_EVENT_HIST = 16,
+ ETT_HIST_ENABLE = 32,
+ ETT_EVENT_EPROBE = 64,
+};
+
+union lower_chunk {
+ union lower_chunk *next;
+ long unsigned int data[256];
+};
+
+union upper_chunk {
+ union upper_chunk *next;
+ union lower_chunk *data[256];
+};
+
+struct trace_pid_list {
+ raw_spinlock_t lock;
+ struct irq_work refill_irqwork;
+ union upper_chunk *upper[256];
+ union upper_chunk *upper_list;
+ union lower_chunk *lower_list;
+ int free_upper_chunks;
+ int free_lower_chunks;
+};
+
+struct trace_array_cpu {
+ atomic_t disabled;
+ void *buffer_page;
+ long unsigned int entries;
+ long unsigned int saved_latency;
+ long unsigned int critical_start;
+ long unsigned int critical_end;
+ long unsigned int critical_sequence;
+ long unsigned int nice;
+ long unsigned int policy;
+ long unsigned int rt_priority;
+ long unsigned int skipped_entries;
+ u64 preempt_timestamp;
+ pid_t pid;
+ kuid_t uid;
+ char comm[16];
+ int ftrace_ignore_pid;
+ bool ignore_pid;
+};
+
+struct trace_option_dentry;
+
+struct trace_options {
+ struct tracer *tracer;
+ struct trace_option_dentry *topts;
+};
+
+struct tracer_opt;
+
+struct trace_option_dentry {
+ struct tracer_opt *opt;
+ struct tracer_flags *flags;
+ struct trace_array *tr;
+ struct dentry *entry;
+};
+
+struct trace_func_repeats {
+ long unsigned int ip;
+ long unsigned int parent_ip;
+ long unsigned int count;
+ u64 ts_last_call;
+};
+
+struct tracer_opt {
+ const char *name;
+ u32 bit;
+};
+
+struct tracer_flags {
+ u32 val;
+ struct tracer_opt *opts;
+ struct tracer *trace;
+};
+
+enum trace_iterator_bits {
+ TRACE_ITER_PRINT_PARENT_BIT = 0,
+ TRACE_ITER_SYM_OFFSET_BIT = 1,
+ TRACE_ITER_SYM_ADDR_BIT = 2,
+ TRACE_ITER_VERBOSE_BIT = 3,
+ TRACE_ITER_RAW_BIT = 4,
+ TRACE_ITER_HEX_BIT = 5,
+ TRACE_ITER_BIN_BIT = 6,
+ TRACE_ITER_BLOCK_BIT = 7,
+ TRACE_ITER_PRINTK_BIT = 8,
+ TRACE_ITER_ANNOTATE_BIT = 9,
+ TRACE_ITER_USERSTACKTRACE_BIT = 10,
+ TRACE_ITER_SYM_USEROBJ_BIT = 11,
+ TRACE_ITER_PRINTK_MSGONLY_BIT = 12,
+ TRACE_ITER_CONTEXT_INFO_BIT = 13,
+ TRACE_ITER_LATENCY_FMT_BIT = 14,
+ TRACE_ITER_RECORD_CMD_BIT = 15,
+ TRACE_ITER_RECORD_TGID_BIT = 16,
+ TRACE_ITER_OVERWRITE_BIT = 17,
+ TRACE_ITER_STOP_ON_FREE_BIT = 18,
+ TRACE_ITER_IRQ_INFO_BIT = 19,
+ TRACE_ITER_MARKERS_BIT = 20,
+ TRACE_ITER_EVENT_FORK_BIT = 21,
+ TRACE_ITER_PAUSE_ON_TRACE_BIT = 22,
+ TRACE_ITER_HASH_PTR_BIT = 23,
+ TRACE_ITER_FUNCTION_BIT = 24,
+ TRACE_ITER_FUNC_FORK_BIT = 25,
+ TRACE_ITER_DISPLAY_GRAPH_BIT = 26,
+ TRACE_ITER_STACKTRACE_BIT = 27,
+ TRACE_ITER_LAST_BIT = 28,
+};
+
+struct event_subsystem {
+ struct list_head list;
+ const char *name;
+ struct event_filter *filter;
+ int ref_count;
+};
+
+enum {
+ EVENT_TRIGGER_FL_PROBE = 1,
+};
+
+struct event_trigger_ops;
+
+struct event_command;
+
+struct event_trigger_data {
+ long unsigned int count;
+ int ref;
+ int flags;
+ struct event_trigger_ops *ops;
+ struct event_command *cmd_ops;
+ struct event_filter *filter;
+ char *filter_str;
+ void *private_data;
+ bool paused;
+ bool paused_tmp;
+ struct list_head list;
+ char *name;
+ struct list_head named_list;
+ struct event_trigger_data *named_data;
+};
+
+struct event_trigger_ops {
+ void (*trigger)(struct event_trigger_data *, struct trace_buffer *, void *, struct ring_buffer_event *);
+ int (*init)(struct event_trigger_data *);
+ void (*free)(struct event_trigger_data *);
+ int (*print)(struct seq_file *, struct event_trigger_data *);
+};
+
+struct event_command {
+ struct list_head list;
+ char *name;
+ enum event_trigger_type trigger_type;
+ int flags;
+ int (*parse)(struct event_command *, struct trace_event_file *, char *, char *, char *);
+ int (*reg)(char *, struct event_trigger_data *, struct trace_event_file *);
+ void (*unreg)(char *, struct event_trigger_data *, struct trace_event_file *);
+ void (*unreg_all)(struct trace_event_file *);
+ int (*set_filter)(char *, struct event_trigger_data *, struct trace_event_file *);
+ struct event_trigger_ops * (*get_trigger_ops)(char *, char *);
+};
+
+struct enable_trigger_data {
+ struct trace_event_file *file;
+ bool enable;
+ bool hist;
+};
+
+enum event_command_flags {
+ EVENT_CMD_FL_POST_TRIGGER = 1,
+ EVENT_CMD_FL_NEEDS_REC = 2,
+};
+
+enum lockdep_lock_type {
+ LD_LOCK_NORMAL = 0,
+ LD_LOCK_PERCPU = 1,
+ LD_LOCK_MAX = 2,
+};
+
+struct cacheline_padding {
+ char x[0];
+};
+
+struct bio;
+
+struct bio_list {
+ struct bio *head;
+ struct bio *tail;
+};
+
+struct fprop_local_percpu {
+ struct percpu_counter events;
+ unsigned int period;
+ raw_spinlock_t lock;
+};
+
+enum wb_reason {
+ WB_REASON_BACKGROUND = 0,
+ WB_REASON_VMSCAN = 1,
+ WB_REASON_SYNC = 2,
+ WB_REASON_PERIODIC = 3,
+ WB_REASON_LAPTOP_TIMER = 4,
+ WB_REASON_FS_FREE_SPACE = 5,
+ WB_REASON_FORKER_THREAD = 6,
+ WB_REASON_FOREIGN_FLUSH = 7,
+ WB_REASON_MAX = 8,
+};
+
+struct bdi_writeback {
+ struct backing_dev_info *bdi;
+ long unsigned int state;
+ long unsigned int last_old_flush;
+ struct list_head b_dirty;
+ struct list_head b_io;
+ struct list_head b_more_io;
+ struct list_head b_dirty_time;
+ spinlock_t list_lock;
+ atomic_t writeback_inodes;
+ struct percpu_counter stat[4];
+ long unsigned int bw_time_stamp;
+ long unsigned int dirtied_stamp;
+ long unsigned int written_stamp;
+ long unsigned int write_bandwidth;
+ long unsigned int avg_write_bandwidth;
+ long unsigned int dirty_ratelimit;
+ long unsigned int balanced_dirty_ratelimit;
+ struct fprop_local_percpu completions;
+ int dirty_exceeded;
+ enum wb_reason start_all_reason;
+ spinlock_t work_lock;
+ struct list_head work_list;
+ struct delayed_work dwork;
+ struct delayed_work bw_dwork;
+ long unsigned int dirty_sleep;
+ struct list_head bdi_node;
+ struct percpu_ref refcnt;
+ struct fprop_local_percpu memcg_completions;
+ struct cgroup_subsys_state *memcg_css;
+ struct cgroup_subsys_state *blkcg_css;
+ struct list_head memcg_node;
+ struct list_head blkcg_node;
+ struct list_head b_attached;
+ struct list_head offline_node;
+ union {
+ struct work_struct release_work;
+ struct callback_head rcu;
+ };
+};
+
+struct backing_dev_info {
+ u64 id;
+ struct rb_node rb_node;
+ struct list_head bdi_list;
+ long unsigned int ra_pages;
+ long unsigned int io_pages;
+ struct kref refcnt;
+ unsigned int capabilities;
+ unsigned int min_ratio;
+ unsigned int max_ratio;
+ unsigned int max_prop_frac;
+ atomic_long_t tot_write_bandwidth;
+ struct bdi_writeback wb;
+ struct list_head wb_list;
+ struct xarray cgwb_tree;
+ struct mutex cgwb_release_mutex;
+ struct rw_semaphore wb_switch_rwsem;
+ wait_queue_head_t wb_waitq;
+ struct device *dev;
+ char dev_name[64];
+ struct device *owner;
+ struct timer_list laptop_mode_wb_timer;
+ struct dentry *debug_dir;
+};
+
+struct mem_cgroup_id {
+ int id;
+ refcount_t ref;
+};
+
+struct page_counter {
+ atomic_long_t usage;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct cacheline_padding _pad1_;
+ long unsigned int emin;
+ atomic_long_t min_usage;
+ atomic_long_t children_min_usage;
+ long unsigned int elow;
+ atomic_long_t low_usage;
+ atomic_long_t children_low_usage;
+ long unsigned int watermark;
+ long unsigned int failcnt;
+ struct cacheline_padding _pad2_;
+ long unsigned int min;
+ long unsigned int low;
+ long unsigned int high;
+ long unsigned int max;
+ struct page_counter *parent;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct vmpressure {
+ long unsigned int scanned;
+ long unsigned int reclaimed;
+ long unsigned int tree_scanned;
+ long unsigned int tree_reclaimed;
+ spinlock_t sr_lock;
+ struct list_head events;
+ struct mutex events_lock;
+ struct work_struct work;
+};
+
+struct mem_cgroup_threshold_ary;
+
+struct mem_cgroup_thresholds {
+ struct mem_cgroup_threshold_ary *primary;
+ struct mem_cgroup_threshold_ary *spare;
+};
+
+struct fprop_global {
+ struct percpu_counter events;
+ unsigned int period;
+ seqcount_t sequence;
+};
+
+struct wb_domain {
+ spinlock_t lock;
+ struct fprop_global completions;
+ struct timer_list period_timer;
+ long unsigned int period_time;
+ long unsigned int dirty_limit_tstamp;
+ long unsigned int dirty_limit;
+};
+
+struct wb_completion {
+ atomic_t cnt;
+ wait_queue_head_t *waitq;
+};
+
+struct memcg_cgwb_frn {
+ u64 bdi_id;
+ int memcg_id;
+ u64 at;
+ struct wb_completion done;
+};
+
+struct deferred_split {
+ spinlock_t split_queue_lock;
+ struct list_head split_queue;
+ long unsigned int split_queue_len;
+};
+
+struct memcg_vmstats;
+
+struct obj_cgroup;
+
+struct memcg_vmstats_percpu;
+
+struct mem_cgroup_per_node;
+
+struct mem_cgroup {
+ struct cgroup_subsys_state css;
+ struct mem_cgroup_id id;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct page_counter memory;
+ union {
+ struct page_counter swap;
+ struct page_counter memsw;
+ };
+ struct page_counter kmem;
+ struct page_counter tcpmem;
+ struct work_struct high_work;
+ long unsigned int soft_limit;
+ struct vmpressure vmpressure;
+ bool oom_group;
+ bool oom_lock;
+ int under_oom;
+ int swappiness;
+ int oom_kill_disable;
+ struct cgroup_file events_file;
+ struct cgroup_file events_local_file;
+ struct cgroup_file swap_events_file;
+ struct mutex thresholds_lock;
+ struct mem_cgroup_thresholds thresholds;
+ struct mem_cgroup_thresholds memsw_thresholds;
+ struct list_head oom_notify;
+ long unsigned int move_charge_at_immigrate;
+ spinlock_t move_lock;
+ long unsigned int move_lock_flags;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct cacheline_padding _pad1_;
+ struct memcg_vmstats *vmstats;
+ atomic_long_t memory_events[9];
+ atomic_long_t memory_events_local[9];
+ long unsigned int socket_pressure;
+ bool tcpmem_active;
+ int tcpmem_pressure;
+ int kmemcg_id;
+ struct obj_cgroup *objcg;
+ struct list_head objcg_list;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct cacheline_padding _pad2_;
+ atomic_t moving_account;
+ struct task_struct *move_lock_task;
+ struct memcg_vmstats_percpu *vmstats_percpu;
+ struct list_head cgwb_list;
+ struct wb_domain cgwb_domain;
+ struct memcg_cgwb_frn cgwb_frn[4];
+ struct list_head event_list;
+ spinlock_t event_list_lock;
+ struct deferred_split deferred_split_queue;
+ struct mem_cgroup_per_node *nodeinfo[0];
+ long: 64;
+ long: 64;
+};
+
+typedef struct {
+ struct lockdep_map dep_map;
+ struct task_struct *owner;
+} local_lock_t;
+
+struct free_area {
+ struct list_head free_list[6];
+ long unsigned int nr_free;
+};
+
+struct pglist_data;
+
+struct lruvec {
+ struct list_head lists[5];
+ spinlock_t lru_lock;
+ long unsigned int anon_cost;
+ long unsigned int file_cost;
+ atomic_long_t nonresident_age;
+ long unsigned int refaults[2];
+ long unsigned int flags;
+ struct pglist_data *pgdat;
+};
+
+struct per_cpu_pages;
+
+struct per_cpu_zonestat;
+
+struct zone {
+ long unsigned int _watermark[4];
+ long unsigned int watermark_boost;
+ long unsigned int nr_reserved_highatomic;
+ long int lowmem_reserve[4];
+ int node;
+ struct pglist_data *zone_pgdat;
+ struct per_cpu_pages *per_cpu_pageset;
+ struct per_cpu_zonestat *per_cpu_zonestats;
+ int pageset_high;
+ int pageset_batch;
+ long unsigned int zone_start_pfn;
+ atomic_long_t managed_pages;
+ long unsigned int spanned_pages;
+ long unsigned int present_pages;
+ long unsigned int cma_pages;
+ const char *name;
+ long unsigned int nr_isolate_pageblock;
+ int initialized;
+ long: 32;
+ long: 64;
+ struct cacheline_padding _pad1_;
+ struct free_area free_area[11];
+ long unsigned int flags;
+ spinlock_t lock;
+ struct cacheline_padding _pad2_;
+ long unsigned int percpu_drift_mark;
+ long unsigned int compact_cached_free_pfn;
+ long unsigned int compact_cached_migrate_pfn[2];
+ long unsigned int compact_init_migrate_pfn;
+ long unsigned int compact_init_free_pfn;
+ unsigned int compact_considered;
+ unsigned int compact_defer_shift;
+ int compact_order_failed;
+ bool compact_blockskip_flush;
+ bool contiguous;
+ short: 16;
+ struct cacheline_padding _pad3_;
+ atomic_long_t vm_stat[10];
+ atomic_long_t vm_numa_event[6];
+};
+
+struct zoneref {
+ struct zone *zone;
+ int zone_idx;
+};
+
+struct zonelist {
+ struct zoneref _zonerefs[257];
+};
+
+enum zone_type {
+ ZONE_DMA = 0,
+ ZONE_DMA32 = 1,
+ ZONE_NORMAL = 2,
+ ZONE_MOVABLE = 3,
+ __MAX_NR_ZONES = 4,
+};
+
+struct per_cpu_nodestat;
+
+struct memory_tier;
+
+struct pglist_data {
+ struct zone node_zones[4];
+ struct zonelist node_zonelists[2];
+ int nr_zones;
+ long unsigned int node_start_pfn;
+ long unsigned int node_present_pages;
+ long unsigned int node_spanned_pages;
+ int node_id;
+ wait_queue_head_t kswapd_wait;
+ wait_queue_head_t pfmemalloc_wait;
+ wait_queue_head_t reclaim_wait[4];
+ atomic_t nr_writeback_throttled;
+ long unsigned int nr_reclaim_start;
+ struct task_struct *kswapd;
+ int kswapd_order;
+ enum zone_type kswapd_highest_zoneidx;
+ int kswapd_failures;
+ int kcompactd_max_order;
+ enum zone_type kcompactd_highest_zoneidx;
+ wait_queue_head_t kcompactd_wait;
+ struct task_struct *kcompactd;
+ bool proactive_compact_trigger;
+ long unsigned int totalreserve_pages;
+ long unsigned int min_unmapped_pages;
+ long unsigned int min_slab_pages;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct cacheline_padding _pad1_;
+ struct deferred_split deferred_split_queue;
+ unsigned int nbp_rl_start;
+ long unsigned int nbp_rl_nr_cand;
+ unsigned int nbp_threshold;
+ unsigned int nbp_th_start;
+ long unsigned int nbp_th_nr_cand;
+ struct lruvec __lruvec;
+ long unsigned int flags;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct cacheline_padding _pad2_;
+ struct per_cpu_nodestat *per_cpu_nodestats;
+ atomic_long_t vm_stat[43];
+ struct memory_tier *memtier;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct per_cpu_pages {
+ spinlock_t lock;
+ int count;
+ int high;
+ int batch;
+ short int free_factor;
+ short int expire;
+ struct list_head lists[13];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct per_cpu_zonestat {
+ s8 vm_stat_diff[10];
+ s8 stat_threshold;
+ long unsigned int vm_numa_event[6];
+};
+
+struct per_cpu_nodestat {
+ s8 stat_threshold;
+ s8 vm_node_stat_diff[43];
+};
+
+enum {
+ __PERCPU_REF_ATOMIC = 1,
+ __PERCPU_REF_DEAD = 2,
+ __PERCPU_REF_ATOMIC_DEAD = 3,
+ __PERCPU_REF_FLAG_BITS = 2,
+};
+
+enum writeback_sync_modes {
+ WB_SYNC_NONE = 0,
+ WB_SYNC_ALL = 1,
+};
+
+struct swap_iocb;
+
+struct writeback_control {
+ long int nr_to_write;
+ long int pages_skipped;
+ loff_t range_start;
+ loff_t range_end;
+ enum writeback_sync_modes sync_mode;
+ unsigned int for_kupdate: 1;
+ unsigned int for_background: 1;
+ unsigned int tagged_writepages: 1;
+ unsigned int for_reclaim: 1;
+ unsigned int range_cyclic: 1;
+ unsigned int for_sync: 1;
+ unsigned int unpinned_fscache_wb: 1;
+ unsigned int no_cgroup_owner: 1;
+ unsigned int punt_to_cgroup: 1;
+ struct swap_iocb **swap_plug;
+ struct bdi_writeback *wb;
+ struct inode *inode;
+ int wb_id;
+ int wb_lcand_id;
+ int wb_tcand_id;
+ size_t wb_bytes;
+ size_t wb_lcand_bytes;
+ size_t wb_tcand_bytes;
+};
+
+struct disk_stats;
+
+struct gendisk;
+
+struct partition_meta_info;
+
+struct block_device {
+ sector_t bd_start_sect;
+ sector_t bd_nr_sectors;
+ struct disk_stats *bd_stats;
+ long unsigned int bd_stamp;
+ bool bd_read_only;
+ dev_t bd_dev;
+ atomic_t bd_openers;
+ struct inode *bd_inode;
+ struct super_block *bd_super;
+ void *bd_claiming;
+ struct device bd_device;
+ void *bd_holder;
+ int bd_holders;
+ bool bd_write_holder;
+ struct kobject *bd_holder_dir;
+ u8 bd_partno;
+ spinlock_t bd_size_lock;
+ struct gendisk *bd_disk;
+ struct request_queue *bd_queue;
+ int bd_fsfreeze_count;
+ struct mutex bd_fsfreeze_mutex;
+ struct super_block *bd_fsfreeze_sb;
+ struct partition_meta_info *bd_meta_info;
+};
+
+typedef __u32 blk_opf_t;
+
+typedef u8 blk_status_t;
+
+struct bvec_iter {
+ sector_t bi_sector;
+ unsigned int bi_size;
+ unsigned int bi_idx;
+ unsigned int bi_bvec_done;
+} __attribute__((packed));
+
+typedef unsigned int blk_qc_t;
+
+typedef void bio_end_io_t(struct bio *);
+
+struct bio_issue {
+ u64 value;
+};
+
+struct blkcg_gq;
+
+struct bio_set;
+
+struct bio {
+ struct bio *bi_next;
+ struct block_device *bi_bdev;
+ blk_opf_t bi_opf;
+ short unsigned int bi_flags;
+ short unsigned int bi_ioprio;
+ blk_status_t bi_status;
+ atomic_t __bi_remaining;
+ struct bvec_iter bi_iter;
+ blk_qc_t bi_cookie;
+ bio_end_io_t *bi_end_io;
+ void *bi_private;
+ struct blkcg_gq *bi_blkg;
+ struct bio_issue bi_issue;
+ union { };
+ short unsigned int bi_vcnt;
+ short unsigned int bi_max_vecs;
+ atomic_t __bi_cnt;
+ struct bio_vec *bi_io_vec;
+ struct bio_set *bi_pool;
+ struct bio_vec bi_inline_vecs[0];
+};
+
+enum {
+ CSS_NO_REF = 1,
+ CSS_ONLINE = 2,
+ CSS_RELEASED = 4,
+ CSS_VISIBLE = 8,
+ CSS_DYING = 16,
+};
+
+struct trace_event_buffer {
+ struct trace_buffer *buffer;
+ struct ring_buffer_event *event;
+ struct trace_event_file *trace_file;
+ void *entry;
+ unsigned int trace_ctx;
+ struct pt_regs *regs;
+};
+
+enum {
+ FILTER_OTHER = 0,
+ FILTER_STATIC_STRING = 1,
+ FILTER_DYN_STRING = 2,
+ FILTER_RDYN_STRING = 3,
+ FILTER_PTR_STRING = 4,
+ FILTER_TRACE_FN = 5,
+ FILTER_COMM = 6,
+ FILTER_CPU = 7,
+};
+
+struct trace_event_raw_mmap_lock {
+ struct trace_entry ent;
+ struct mm_struct *mm;
+ u32 __data_loc_memcg_path;
+ bool write;
+ char __data[0];
+};
+
+struct trace_event_raw_mmap_lock_acquire_returned {
+ struct trace_entry ent;
+ struct mm_struct *mm;
+ u32 __data_loc_memcg_path;
+ bool write;
+ bool success;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_mmap_lock {
+ u32 memcg_path;
+};
+
+struct trace_event_data_offsets_mmap_lock_acquire_returned {
+ u32 memcg_path;
+};
+
+typedef void (*btf_trace_mmap_lock_start_locking)(void *, struct mm_struct *, const char *, bool);
+
+typedef void (*btf_trace_mmap_lock_released)(void *, struct mm_struct *, const char *, bool);
+
+typedef void (*btf_trace_mmap_lock_acquire_returned)(void *, struct mm_struct *, const char *, bool, bool);
+
+enum wb_stat_item {
+ WB_RECLAIMABLE = 0,
+ WB_WRITEBACK = 1,
+ WB_DIRTIED = 2,
+ WB_WRITTEN = 3,
+ NR_WB_STAT_ITEMS = 4,
+};
+
+typedef void *mempool_alloc_t(gfp_t, void *);
+
+typedef void mempool_free_t(void *, void *);
+
+struct mempool_s {
+ spinlock_t lock;
+ int min_nr;
+ int curr_nr;
+ void **elements;
+ void *pool_data;
+ mempool_alloc_t *alloc;
+ mempool_free_t *free;
+ wait_queue_head_t wait;
+};
+
+typedef struct mempool_s mempool_t;
+
+struct bio_alloc_cache;
+
+struct bio_set {
+ struct kmem_cache *bio_slab;
+ unsigned int front_pad;
+ struct bio_alloc_cache *cache;
+ mempool_t bio_pool;
+ mempool_t bvec_pool;
+ unsigned int back_pad;
+ spinlock_t rescue_lock;
+ struct bio_list rescue_list;
+ struct work_struct rescue_work;
+ struct workqueue_struct *rescue_workqueue;
+ struct hlist_node cpuhp_dead;
+};
+
+enum memcg_memory_event {
+ MEMCG_LOW = 0,
+ MEMCG_HIGH = 1,
+ MEMCG_MAX = 2,
+ MEMCG_OOM = 3,
+ MEMCG_OOM_KILL = 4,
+ MEMCG_OOM_GROUP_KILL = 5,
+ MEMCG_SWAP_HIGH = 6,
+ MEMCG_SWAP_MAX = 7,
+ MEMCG_SWAP_FAIL = 8,
+ MEMCG_NR_MEMORY_EVENTS = 9,
+};
+
+struct mem_cgroup_reclaim_iter {
+ struct mem_cgroup *position;
+ unsigned int generation;
+};
+
+struct shrinker_info {
+ struct callback_head rcu;
+ atomic_long_t *nr_deferred;
+ long unsigned int *map;
+};
+
+struct lruvec_stats_percpu {
+ long int state[43];
+ long int state_prev[43];
+};
+
+struct lruvec_stats {
+ long int state[43];
+ long int state_pending[43];
+};
+
+struct mem_cgroup_per_node {
+ struct lruvec lruvec;
+ struct lruvec_stats_percpu *lruvec_stats_percpu;
+ struct lruvec_stats lruvec_stats;
+ long unsigned int lru_zone_size[20];
+ struct mem_cgroup_reclaim_iter iter;
+ struct shrinker_info *shrinker_info;
+ struct rb_node tree_node;
+ long unsigned int usage_in_excess;
+ bool on_tree;
+ struct mem_cgroup *memcg;
+};
+
+struct eventfd_ctx;
+
+struct mem_cgroup_threshold {
+ struct eventfd_ctx *eventfd;
+ long unsigned int threshold;
+};
+
+struct mem_cgroup_threshold_ary {
+ int current_threshold;
+ unsigned int size;
+ struct mem_cgroup_threshold entries[0];
+};
+
+struct obj_cgroup {
+ struct percpu_ref refcnt;
+ struct mem_cgroup *memcg;
+ atomic_t nr_charged_bytes;
+ union {
+ struct list_head list;
+ struct callback_head rcu;
+ };
+};
+
+struct memcg_path {
+ local_lock_t lock;
+ char *buf;
+ local_t buf_idx;
+};
+
+struct static_key_true {
+ struct static_key key;
+};
+
+struct wait_queue_entry;
+
+typedef int (*wait_queue_func_t)(struct wait_queue_entry *, unsigned int, int, void *);
+
+struct wait_queue_entry {
+ unsigned int flags;
+ void *private;
+ wait_queue_func_t func;
+ struct list_head entry;
+};
+
+typedef struct wait_queue_entry wait_queue_entry_t;
+
+enum {
+ WORK_STRUCT_PENDING_BIT = 0LL,
+ WORK_STRUCT_INACTIVE_BIT = 1LL,
+ WORK_STRUCT_PWQ_BIT = 2LL,
+ WORK_STRUCT_LINKED_BIT = 3LL,
+ WORK_STRUCT_COLOR_SHIFT = 4LL,
+ WORK_STRUCT_COLOR_BITS = 4LL,
+ WORK_STRUCT_PENDING = 1LL,
+ WORK_STRUCT_INACTIVE = 2LL,
+ WORK_STRUCT_PWQ = 4LL,
+ WORK_STRUCT_LINKED = 8LL,
+ WORK_STRUCT_STATIC = 0LL,
+ WORK_NR_COLORS = 16LL,
+ WORK_CPU_UNBOUND = 128LL,
+ WORK_STRUCT_FLAG_BITS = 8LL,
+ WORK_OFFQ_FLAG_BASE = 4LL,
+ __WORK_OFFQ_CANCELING = 4LL,
+ WORK_OFFQ_CANCELING = 16LL,
+ WORK_OFFQ_FLAG_BITS = 1LL,
+ WORK_OFFQ_POOL_SHIFT = 5LL,
+ WORK_OFFQ_LEFT = 59LL,
+ WORK_OFFQ_POOL_BITS = 31LL,
+ WORK_OFFQ_POOL_NONE = 2147483647LL,
+ WORK_STRUCT_FLAG_MASK = 255LL,
+ WORK_STRUCT_WQ_DATA_MASK = -256LL,
+ WORK_STRUCT_NO_POOL = 68719476704LL,
+ WORK_BUSY_PENDING = 1LL,
+ WORK_BUSY_RUNNING = 2LL,
+ WORKER_DESC_LEN = 24LL,
+};
+
+struct reclaim_state {
+ long unsigned int reclaimed_slab;
+};
+
+struct wait_page_queue {
+ struct folio *folio;
+ int bit_nr;
+ wait_queue_entry_t wait;
+};
+
+struct readahead_control {
+ struct file *file;
+ struct address_space *mapping;
+ struct file_ra_state *ra;
+ long unsigned int _index;
+ unsigned int _nr_pages;
+ unsigned int _batch_count;
+ bool _workingset;
+ long unsigned int _pflags;
+};
+
+struct swap_cluster_info {
+ spinlock_t lock;
+ unsigned int data: 24;
+ unsigned int flags: 8;
+};
+
+struct swap_cluster_list {
+ struct swap_cluster_info head;
+ struct swap_cluster_info tail;
+};
+
+struct percpu_cluster;
+
+struct swap_info_struct {
+ struct percpu_ref users;
+ long unsigned int flags;
+ short int prio;
+ struct plist_node list;
+ signed char type;
+ unsigned int max;
+ unsigned char *swap_map;
+ struct swap_cluster_info *cluster_info;
+ struct swap_cluster_list free_clusters;
+ unsigned int lowest_bit;
+ unsigned int highest_bit;
+ unsigned int pages;
+ unsigned int inuse_pages;
+ unsigned int cluster_next;
+ unsigned int cluster_nr;
+ unsigned int *cluster_next_cpu;
+ struct percpu_cluster *percpu_cluster;
+ struct rb_root swap_extent_root;
+ struct block_device *bdev;
+ struct file *swap_file;
+ unsigned int old_block_size;
+ struct completion comp;
+ spinlock_t lock;
+ spinlock_t cont_lock;
+ struct work_struct discard_work;
+ struct swap_cluster_list discard_clusters;
+ struct plist_node avail_lists[0];
+};
+
+struct percpu_cluster {
+ struct swap_cluster_info index;
+ unsigned int next;
+};
+
+enum vmpressure_levels {
+ VMPRESSURE_LOW = 0,
+ VMPRESSURE_MEDIUM = 1,
+ VMPRESSURE_CRITICAL = 2,
+ VMPRESSURE_NUM_LEVELS = 3,
+};
+
+enum vmpressure_modes {
+ VMPRESSURE_NO_PASSTHROUGH = 0,
+ VMPRESSURE_HIERARCHY = 1,
+ VMPRESSURE_LOCAL = 2,
+ VMPRESSURE_NUM_MODES = 3,
+};
+
+struct vmpressure_event {
+ struct eventfd_ctx *efd;
+ enum vmpressure_levels level;
+ enum vmpressure_modes mode;
+ struct list_head node;
+};
+
+struct fc_log;
+
+struct p_log {
+ const char *prefix;
+ struct fc_log *log;
+};
+
+enum fs_context_purpose {
+ FS_CONTEXT_FOR_MOUNT = 0,
+ FS_CONTEXT_FOR_SUBMOUNT = 1,
+ FS_CONTEXT_FOR_RECONFIGURE = 2,
+};
+
+enum fs_context_phase {
+ FS_CONTEXT_CREATE_PARAMS = 0,
+ FS_CONTEXT_CREATING = 1,
+ FS_CONTEXT_AWAITING_MOUNT = 2,
+ FS_CONTEXT_AWAITING_RECONF = 3,
+ FS_CONTEXT_RECONF_PARAMS = 4,
+ FS_CONTEXT_RECONFIGURING = 5,
+ FS_CONTEXT_FAILED = 6,
+};
+
+struct fs_context_operations;
+
+struct fs_context {
+ const struct fs_context_operations *ops;
+ struct mutex uapi_mutex;
+ struct file_system_type *fs_type;
+ void *fs_private;
+ void *sget_key;
+ struct dentry *root;
+ struct user_namespace *user_ns;
+ struct net *net_ns;
+ const struct cred *cred;
+ struct p_log log;
+ const char *source;
+ void *security;
+ void *s_fs_info;
+ unsigned int sb_flags;
+ unsigned int sb_flags_mask;
+ unsigned int s_iflags;
+ unsigned int lsm_flags;
+ enum fs_context_purpose purpose: 8;
+ enum fs_context_phase phase: 8;
+ bool need_free: 1;
+ bool global: 1;
+ bool oldapi: 1;
+};
+
+struct audit_names;
+
+struct filename {
+ const char *name;
+ const char *uptr;
+ int refcnt;
+ struct audit_names *aname;
+ const char iname[0];
+};
+
+enum fs_value_type {
+ fs_value_is_undefined = 0,
+ fs_value_is_flag = 1,
+ fs_value_is_string = 2,
+ fs_value_is_blob = 3,
+ fs_value_is_filename = 4,
+ fs_value_is_file = 5,
+};
+
+struct fs_parameter {
+ const char *key;
+ enum fs_value_type type: 8;
+ union {
+ char *string;
+ void *blob;
+ struct filename *name;
+ struct file *file;
+ };
+ size_t size;
+ int dirfd;
+};
+
+struct fc_log {
+ refcount_t usage;
+ u8 head;
+ u8 tail;
+ u8 need_free;
+ struct module *owner;
+ char *buffer[8];
+};
+
+struct fs_context_operations {
+ void (*free)(struct fs_context *);
+ int (*dup)(struct fs_context *, struct fs_context *);
+ int (*parse_param)(struct fs_context *, struct fs_parameter *);
+ int (*parse_monolithic)(struct fs_context *, void *);
+ int (*get_tree)(struct fs_context *);
+ int (*reconfigure)(struct fs_context *);
+};
+
+struct pseudo_fs_context {
+ const struct super_operations *ops;
+ const struct xattr_handler **xattr;
+ const struct dentry_operations *dops;
+ long unsigned int magic;
+};
+
+typedef __u16 __be16;
+
+typedef __u32 __be32;
+
+typedef __u32 __wsum;
+
+typedef __kernel_ulong_t ino_t;
+
+typedef u32 nlink_t;
+
+struct notifier_block;
+
+typedef int (*notifier_fn_t)(struct notifier_block *, long unsigned int, void *);
+
+struct notifier_block {
+ notifier_fn_t notifier_call;
+ struct notifier_block *next;
+ int priority;
+};
+
+struct blocking_notifier_head {
+ struct rw_semaphore rwsem;
+ struct notifier_block *head;
+};
+
+struct raw_notifier_head {
+ struct notifier_block *head;
+};
+
+struct page_pool_params {
+ unsigned int flags;
+ unsigned int order;
+ unsigned int pool_size;
+ int nid;
+ struct device *dev;
+ enum dma_data_direction dma_dir;
+ unsigned int max_len;
+ unsigned int offset;
+ void (*init_callback)(struct page *, void *);
+ void *init_arg;
+};
+
+struct pp_alloc_cache {
+ u32 count;
+ struct page *cache[128];
+};
+
+struct ptr_ring {
+ int producer;
+ spinlock_t producer_lock;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ int consumer_head;
+ int consumer_tail;
+ spinlock_t consumer_lock;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ int size;
+ int batch;
+ void **queue;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct page_pool {
+ struct page_pool_params p;
+ struct delayed_work release_dw;
+ void (*disconnect)(void *);
+ long unsigned int defer_start;
+ long unsigned int defer_warn;
+ u32 pages_state_hold_cnt;
+ unsigned int frag_offset;
+ struct page *frag_page;
+ long int frag_users;
+ u32 xdp_mem_id;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct pp_alloc_cache alloc;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct ptr_ring ring;
+ atomic_t pages_state_release_cnt;
+ refcount_t user_cnt;
+ u64 destroy_cnt;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct linux_binprm;
+
+struct coredump_params;
+
+struct linux_binfmt {
+ struct list_head lh;
+ struct module *module;
+ int (*load_binary)(struct linux_binprm *);
+ int (*load_shlib)(struct file *);
+ int (*core_dump)(struct coredump_params *);
+ long unsigned int min_coredump;
+};
+
+struct rhashtable;
+
+struct rhashtable_compare_arg {
+ struct rhashtable *ht;
+ const void *key;
+};
+
+typedef u32 (*rht_hashfn_t)(const void *, u32, u32);
+
+typedef u32 (*rht_obj_hashfn_t)(const void *, u32, u32);
+
+typedef int (*rht_obj_cmpfn_t)(struct rhashtable_compare_arg *, const void *);
+
+struct rhashtable_params {
+ u16 nelem_hint;
+ u16 key_len;
+ u16 key_offset;
+ u16 head_offset;
+ unsigned int max_size;
+ u16 min_size;
+ bool automatic_shrinking;
+ rht_hashfn_t hashfn;
+ rht_obj_hashfn_t obj_hashfn;
+ rht_obj_cmpfn_t obj_cmpfn;
+};
+
+struct bucket_table;
+
+struct rhashtable {
+ struct bucket_table *tbl;
+ unsigned int key_len;
+ unsigned int max_elems;
+ struct rhashtable_params p;
+ bool rhlist;
+ struct work_struct run_work;
+ struct mutex mutex;
+ spinlock_t lock;
+ atomic_t nelems;
+};
+
+struct pipe_buffer;
+
+struct pipe_inode_info {
+ struct mutex mutex;
+ wait_queue_head_t rd_wait;
+ wait_queue_head_t wr_wait;
+ unsigned int head;
+ unsigned int tail;
+ unsigned int max_usage;
+ unsigned int ring_size;
+ unsigned int nr_accounted;
+ unsigned int readers;
+ unsigned int writers;
+ unsigned int files;
+ unsigned int r_counter;
+ unsigned int w_counter;
+ bool poll_usage;
+ struct page *tmp_page;
+ struct fasync_struct *fasync_readers;
+ struct fasync_struct *fasync_writers;
+ struct pipe_buffer *bufs;
+ struct user_struct *user;
+};
+
+struct proc_ops {
+ unsigned int proc_flags;
+ int (*proc_open)(struct inode *, struct file *);
+ ssize_t (*proc_read)(struct file *, char *, size_t, loff_t *);
+ ssize_t (*proc_read_iter)(struct kiocb *, struct iov_iter *);
+ ssize_t (*proc_write)(struct file *, const char *, size_t, loff_t *);
+ loff_t (*proc_lseek)(struct file *, loff_t, int);
+ int (*proc_release)(struct inode *, struct file *);
+ __poll_t (*proc_poll)(struct file *, struct poll_table_struct *);
+ long int (*proc_ioctl)(struct file *, unsigned int, long unsigned int);
+ int (*proc_mmap)(struct file *, struct vm_area_struct *);
+ long unsigned int (*proc_get_unmapped_area)(struct file *, long unsigned int, long unsigned int, long unsigned int, long unsigned int);
+};
+
+typedef int (*proc_write_t)(struct file *, char *, size_t);
+
+struct new_utsname {
+ char sysname[65];
+ char nodename[65];
+ char release[65];
+ char version[65];
+ char machine[65];
+ char domainname[65];
+};
+
+struct uts_namespace {
+ struct new_utsname name;
+ struct user_namespace *user_ns;
+ struct ucounts *ucounts;
+ struct ns_common ns;
+};
+
+struct ipc_ids {
+ int in_use;
+ short unsigned int seq;
+ struct rw_semaphore rwsem;
+ struct idr ipcs_idr;
+ int max_idx;
+ int last_idx;
+ struct rhashtable key_ht;
+};
+
+struct ipc_namespace {
+ struct ipc_ids ids[3];
+ int sem_ctls[4];
+ int used_sems;
+ unsigned int msg_ctlmax;
+ unsigned int msg_ctlmnb;
+ unsigned int msg_ctlmni;
+ struct percpu_counter percpu_msg_bytes;
+ struct percpu_counter percpu_msg_hdrs;
+ size_t shm_ctlmax;
+ size_t shm_ctlall;
+ long unsigned int shm_tot;
+ int shm_ctlmni;
+ int shm_rmid_forced;
+ struct notifier_block ipcns_nb;
+ struct vfsmount *mq_mnt;
+ unsigned int mq_queues_count;
+ unsigned int mq_queues_max;
+ unsigned int mq_msg_max;
+ unsigned int mq_msgsize_max;
+ unsigned int mq_msg_default;
+ unsigned int mq_msgsize_default;
+ struct ctl_table_set mq_set;
+ struct ctl_table_header *mq_sysctls;
+ struct ctl_table_set ipc_set;
+ struct ctl_table_header *ipc_sysctls;
+ struct user_namespace *user_ns;
+ struct ucounts *ucounts;
+ struct llist_node mnt_llist;
+ struct ns_common ns;
+};
+
+struct ref_tracker_dir {};
+
+struct prot_inuse;
+
+struct netns_core {
+ struct ctl_table_header *sysctl_hdr;
+ int sysctl_somaxconn;
+ u8 sysctl_txrehash;
+ struct prot_inuse *prot_inuse;
+};
+
+struct ipstats_mib;
+
+struct tcp_mib;
+
+struct linux_mib;
+
+struct udp_mib;
+
+struct linux_tls_mib;
+
+struct mptcp_mib;
+
+struct icmp_mib;
+
+struct icmpmsg_mib;
+
+struct icmpv6_mib;
+
+struct icmpv6msg_mib;
+
+struct proc_dir_entry;
+
+struct netns_mib {
+ struct ipstats_mib *ip_statistics;
+ struct ipstats_mib *ipv6_statistics;
+ struct tcp_mib *tcp_statistics;
+ struct linux_mib *net_statistics;
+ struct udp_mib *udp_statistics;
+ struct udp_mib *udp_stats_in6;
+ struct linux_tls_mib *tls_statistics;
+ struct mptcp_mib *mptcp_statistics;
+ struct udp_mib *udplite_statistics;
+ struct udp_mib *udplite_stats_in6;
+ struct icmp_mib *icmp_statistics;
+ struct icmpmsg_mib *icmpmsg_statistics;
+ struct icmpv6_mib *icmpv6_statistics;
+ struct icmpv6msg_mib *icmpv6msg_statistics;
+ struct proc_dir_entry *proc_net_devsnmp6;
+};
+
+struct netns_packet {
+ struct mutex sklist_lock;
+ struct hlist_head sklist;
+};
+
+struct unix_table {
+ spinlock_t *locks;
+ struct hlist_head *buckets;
+};
+
+struct netns_unix {
+ struct unix_table table;
+ int sysctl_max_dgram_qlen;
+ struct ctl_table_header *ctl;
+};
+
+struct netns_nexthop {
+ struct rb_root rb_root;
+ struct hlist_head *devhash;
+ unsigned int seq;
+ u32 last_id_allocated;
+ struct blocking_notifier_head notifier_chain;
+};
+
+struct inet_hashinfo;
+
+struct inet_timewait_death_row {
+ refcount_t tw_refcount;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct inet_hashinfo *hashinfo;
+ int sysctl_max_tw_buckets;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct local_ports {
+ seqlock_t lock;
+ int range[2];
+ bool warned;
+};
+
+struct ping_group_range {
+ seqlock_t lock;
+ kgid_t range[2];
+};
+
+typedef struct {
+ u64 key[2];
+} siphash_key_t;
+
+struct udp_table;
+
+struct ipv4_devconf;
+
+struct ip_ra_chain;
+
+struct fib_rules_ops;
+
+struct fib_table;
+
+struct inet_peer_base;
+
+struct fqdir;
+
+struct tcp_congestion_ops;
+
+struct tcp_fastopen_context;
+
+struct mr_table;
+
+struct fib_notifier_ops;
+
+struct netns_ipv4 {
+ struct inet_timewait_death_row tcp_death_row;
+ struct udp_table *udp_table;
+ struct ctl_table_header *forw_hdr;
+ struct ctl_table_header *frags_hdr;
+ struct ctl_table_header *ipv4_hdr;
+ struct ctl_table_header *route_hdr;
+ struct ctl_table_header *xfrm4_hdr;
+ struct ipv4_devconf *devconf_all;
+ struct ipv4_devconf *devconf_dflt;
+ struct ip_ra_chain *ra_chain;
+ struct mutex ra_mutex;
+ struct fib_rules_ops *rules_ops;
+ struct fib_table *fib_main;
+ struct fib_table *fib_default;
+ unsigned int fib_rules_require_fldissect;
+ bool fib_has_custom_rules;
+ bool fib_has_custom_local_routes;
+ bool fib_offload_disabled;
+ struct hlist_head *fib_table_hash;
+ struct sock *fibnl;
+ struct sock *mc_autojoin_sk;
+ struct inet_peer_base *peers;
+ struct fqdir *fqdir;
+ u8 sysctl_icmp_echo_ignore_all;
+ u8 sysctl_icmp_echo_enable_probe;
+ u8 sysctl_icmp_echo_ignore_broadcasts;
+ u8 sysctl_icmp_ignore_bogus_error_responses;
+ u8 sysctl_icmp_errors_use_inbound_ifaddr;
+ int sysctl_icmp_ratelimit;
+ int sysctl_icmp_ratemask;
+ u32 ip_rt_min_pmtu;
+ int ip_rt_mtu_expires;
+ int ip_rt_min_advmss;
+ struct local_ports ip_local_ports;
+ u8 sysctl_tcp_ecn;
+ u8 sysctl_tcp_ecn_fallback;
+ u8 sysctl_ip_default_ttl;
+ u8 sysctl_ip_no_pmtu_disc;
+ u8 sysctl_ip_fwd_use_pmtu;
+ u8 sysctl_ip_fwd_update_priority;
+ u8 sysctl_ip_nonlocal_bind;
+ u8 sysctl_ip_autobind_reuse;
+ u8 sysctl_ip_dynaddr;
+ u8 sysctl_ip_early_demux;
+ u8 sysctl_raw_l3mdev_accept;
+ u8 sysctl_tcp_early_demux;
+ u8 sysctl_udp_early_demux;
+ u8 sysctl_nexthop_compat_mode;
+ u8 sysctl_fwmark_reflect;
+ u8 sysctl_tcp_fwmark_accept;
+ u8 sysctl_tcp_l3mdev_accept;
+ u8 sysctl_tcp_mtu_probing;
+ int sysctl_tcp_mtu_probe_floor;
+ int sysctl_tcp_base_mss;
+ int sysctl_tcp_min_snd_mss;
+ int sysctl_tcp_probe_threshold;
+ u32 sysctl_tcp_probe_interval;
+ int sysctl_tcp_keepalive_time;
+ int sysctl_tcp_keepalive_intvl;
+ u8 sysctl_tcp_keepalive_probes;
+ u8 sysctl_tcp_syn_retries;
+ u8 sysctl_tcp_synack_retries;
+ u8 sysctl_tcp_syncookies;
+ u8 sysctl_tcp_migrate_req;
+ u8 sysctl_tcp_comp_sack_nr;
+ int sysctl_tcp_reordering;
+ u8 sysctl_tcp_retries1;
+ u8 sysctl_tcp_retries2;
+ u8 sysctl_tcp_orphan_retries;
+ u8 sysctl_tcp_tw_reuse;
+ int sysctl_tcp_fin_timeout;
+ unsigned int sysctl_tcp_notsent_lowat;
+ u8 sysctl_tcp_sack;
+ u8 sysctl_tcp_window_scaling;
+ u8 sysctl_tcp_timestamps;
+ u8 sysctl_tcp_early_retrans;
+ u8 sysctl_tcp_recovery;
+ u8 sysctl_tcp_thin_linear_timeouts;
+ u8 sysctl_tcp_slow_start_after_idle;
+ u8 sysctl_tcp_retrans_collapse;
+ u8 sysctl_tcp_stdurg;
+ u8 sysctl_tcp_rfc1337;
+ u8 sysctl_tcp_abort_on_overflow;
+ u8 sysctl_tcp_fack;
+ int sysctl_tcp_max_reordering;
+ int sysctl_tcp_adv_win_scale;
+ u8 sysctl_tcp_dsack;
+ u8 sysctl_tcp_app_win;
+ u8 sysctl_tcp_frto;
+ u8 sysctl_tcp_nometrics_save;
+ u8 sysctl_tcp_no_ssthresh_metrics_save;
+ u8 sysctl_tcp_moderate_rcvbuf;
+ u8 sysctl_tcp_tso_win_divisor;
+ u8 sysctl_tcp_workaround_signed_windows;
+ int sysctl_tcp_limit_output_bytes;
+ int sysctl_tcp_challenge_ack_limit;
+ int sysctl_tcp_min_rtt_wlen;
+ u8 sysctl_tcp_min_tso_segs;
+ u8 sysctl_tcp_tso_rtt_log;
+ u8 sysctl_tcp_autocorking;
+ u8 sysctl_tcp_reflect_tos;
+ int sysctl_tcp_invalid_ratelimit;
+ int sysctl_tcp_pacing_ss_ratio;
+ int sysctl_tcp_pacing_ca_ratio;
+ int sysctl_tcp_wmem[3];
+ int sysctl_tcp_rmem[3];
+ unsigned int sysctl_tcp_child_ehash_entries;
+ long unsigned int sysctl_tcp_comp_sack_delay_ns;
+ long unsigned int sysctl_tcp_comp_sack_slack_ns;
+ int sysctl_max_syn_backlog;
+ int sysctl_tcp_fastopen;
+ const struct tcp_congestion_ops *tcp_congestion_control;
+ struct tcp_fastopen_context *tcp_fastopen_ctx;
+ unsigned int sysctl_tcp_fastopen_blackhole_timeout;
+ atomic_t tfo_active_disable_times;
+ long unsigned int tfo_active_disable_stamp;
+ u32 tcp_challenge_timestamp;
+ u32 tcp_challenge_count;
+ u8 sysctl_tcp_plb_enabled;
+ u8 sysctl_tcp_plb_idle_rehash_rounds;
+ u8 sysctl_tcp_plb_rehash_rounds;
+ u8 sysctl_tcp_plb_suspend_rto_sec;
+ int sysctl_tcp_plb_cong_thresh;
+ int sysctl_udp_wmem_min;
+ int sysctl_udp_rmem_min;
+ u8 sysctl_fib_notify_on_flag_change;
+ u8 sysctl_udp_l3mdev_accept;
+ u8 sysctl_igmp_llm_reports;
+ int sysctl_igmp_max_memberships;
+ int sysctl_igmp_max_msf;
+ int sysctl_igmp_qrv;
+ struct ping_group_range ping_group_range;
+ atomic_t dev_addr_genid;
+ unsigned int sysctl_udp_child_hash_entries;
+ long unsigned int *sysctl_local_reserved_ports;
+ int sysctl_ip_prot_sock;
+ struct mr_table *mrt;
+ u32 sysctl_fib_multipath_hash_fields;
+ u8 sysctl_fib_multipath_use_neigh;
+ u8 sysctl_fib_multipath_hash_policy;
+ struct fib_notifier_ops *notifier_ops;
+ unsigned int fib_seq;
+ struct fib_notifier_ops *ipmr_notifier_ops;
+ unsigned int ipmr_seq;
+ atomic_t rt_genid;
+ siphash_key_t ip_id_key;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct dst_entry;
+
+struct net_device;
+
+struct sk_buff;
+
+struct neighbour;
+
+struct dst_ops {
+ short unsigned int family;
+ unsigned int gc_thresh;
+ int (*gc)(struct dst_ops *);
+ struct dst_entry * (*check)(struct dst_entry *, __u32);
+ unsigned int (*default_advmss)(const struct dst_entry *);
+ unsigned int (*mtu)(const struct dst_entry *);
+ u32 * (*cow_metrics)(struct dst_entry *, long unsigned int);
+ void (*destroy)(struct dst_entry *);
+ void (*ifdown)(struct dst_entry *, struct net_device *, int);
+ struct dst_entry * (*negative_advice)(struct dst_entry *);
+ void (*link_failure)(struct sk_buff *);
+ void (*update_pmtu)(struct dst_entry *, struct sock *, struct sk_buff *, u32, bool);
+ void (*redirect)(struct dst_entry *, struct sock *, struct sk_buff *);
+ int (*local_out)(struct net *, struct sock *, struct sk_buff *);
+ struct neighbour * (*neigh_lookup)(const struct dst_entry *, struct sk_buff *, const void *);
+ void (*confirm_neigh)(const struct dst_entry *, const void *);
+ struct kmem_cache *kmem_cachep;
+ struct percpu_counter pcpuc_entries;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct netns_sysctl_ipv6 {
+ struct ctl_table_header *hdr;
+ struct ctl_table_header *route_hdr;
+ struct ctl_table_header *icmp_hdr;
+ struct ctl_table_header *frags_hdr;
+ struct ctl_table_header *xfrm6_hdr;
+ int flush_delay;
+ int ip6_rt_max_size;
+ int ip6_rt_gc_min_interval;
+ int ip6_rt_gc_timeout;
+ int ip6_rt_gc_interval;
+ int ip6_rt_gc_elasticity;
+ int ip6_rt_mtu_expires;
+ int ip6_rt_min_advmss;
+ u32 multipath_hash_fields;
+ u8 multipath_hash_policy;
+ u8 bindv6only;
+ u8 flowlabel_consistency;
+ u8 auto_flowlabels;
+ int icmpv6_time;
+ u8 icmpv6_echo_ignore_all;
+ u8 icmpv6_echo_ignore_multicast;
+ u8 icmpv6_echo_ignore_anycast;
+ long unsigned int icmpv6_ratemask[4];
+ long unsigned int *icmpv6_ratemask_ptr;
+ u8 anycast_src_echo_reply;
+ u8 ip_nonlocal_bind;
+ u8 fwmark_reflect;
+ u8 flowlabel_state_ranges;
+ int idgen_retries;
+ int idgen_delay;
+ int flowlabel_reflect;
+ int max_dst_opts_cnt;
+ int max_hbh_opts_cnt;
+ int max_dst_opts_len;
+ int max_hbh_opts_len;
+ int seg6_flowlabel;
+ u32 ioam6_id;
+ u64 ioam6_id_wide;
+ bool skip_notify_on_dev_down;
+ u8 fib_notify_on_flag_change;
+};
+
+struct ipv6_devconf;
+
+struct fib6_info;
+
+struct rt6_info;
+
+struct rt6_statistics;
+
+struct fib6_table;
+
+struct seg6_pernet_data;
+
+struct ioam6_pernet_data;
+
+struct netns_ipv6 {
+ struct dst_ops ip6_dst_ops;
+ struct netns_sysctl_ipv6 sysctl;
+ struct ipv6_devconf *devconf_all;
+ struct ipv6_devconf *devconf_dflt;
+ struct inet_peer_base *peers;
+ struct fqdir *fqdir;
+ struct fib6_info *fib6_null_entry;
+ struct rt6_info *ip6_null_entry;
+ struct rt6_statistics *rt6_stats;
+ struct timer_list ip6_fib_timer;
+ struct hlist_head *fib_table_hash;
+ struct fib6_table *fib6_main_tbl;
+ struct list_head fib6_walkers;
+ rwlock_t fib6_walker_lock;
+ spinlock_t fib6_gc_lock;
+ atomic_t ip6_rt_gc_expire;
+ long unsigned int ip6_rt_last_gc;
+ unsigned char flowlabel_has_excl;
+ bool fib6_has_custom_rules;
+ unsigned int fib6_rules_require_fldissect;
+ unsigned int fib6_routes_require_src;
+ struct rt6_info *ip6_prohibit_entry;
+ struct rt6_info *ip6_blk_hole_entry;
+ struct fib6_table *fib6_local_tbl;
+ struct fib_rules_ops *fib6_rules_ops;
+ struct sock *ndisc_sk;
+ struct sock *tcp_sk;
+ struct sock *igmp_sk;
+ struct sock *mc_autojoin_sk;
+ struct hlist_head *inet6_addr_lst;
+ spinlock_t addrconf_hash_lock;
+ struct delayed_work addr_chk_work;
+ atomic_t dev_addr_genid;
+ atomic_t fib6_sernum;
+ struct seg6_pernet_data *seg6_data;
+ struct fib_notifier_ops *notifier_ops;
+ struct fib_notifier_ops *ip6mr_notifier_ops;
+ unsigned int ipmr_seq;
+ struct {
+ struct hlist_head head;
+ spinlock_t lock;
+ u32 seq;
+ } ip6addrlbl_table;
+ struct ioam6_pernet_data *ioam6_data;
+ long: 64;
+ long: 64;
+};
+
+struct nf_logger;
+
+struct nf_hook_entries;
+
+struct netns_nf {
+ struct proc_dir_entry *proc_netfilter;
+ const struct nf_logger *nf_loggers[11];
+ struct ctl_table_header *nf_log_dir_header;
+ struct nf_hook_entries *hooks_ipv4[5];
+ struct nf_hook_entries *hooks_ipv6[5];
+ unsigned int defrag_ipv4_users;
+ unsigned int defrag_ipv6_users;
+};
+
+struct nf_ct_event_notifier;
+
+struct nf_generic_net {
+ unsigned int timeout;
+};
+
+struct nf_tcp_net {
+ unsigned int timeouts[14];
+ u8 tcp_loose;
+ u8 tcp_be_liberal;
+ u8 tcp_max_retrans;
+ u8 tcp_ignore_invalid_rst;
+};
+
+struct nf_udp_net {
+ unsigned int timeouts[2];
+};
+
+struct nf_icmp_net {
+ unsigned int timeout;
+};
+
+struct nf_dccp_net {
+ u8 dccp_loose;
+ unsigned int dccp_timeout[10];
+};
+
+struct nf_sctp_net {
+ unsigned int timeouts[10];
+};
+
+struct nf_ip_net {
+ struct nf_generic_net generic;
+ struct nf_tcp_net tcp;
+ struct nf_udp_net udp;
+ struct nf_icmp_net icmp;
+ struct nf_icmp_net icmpv6;
+ struct nf_dccp_net dccp;
+ struct nf_sctp_net sctp;
+};
+
+struct ip_conntrack_stat;
+
+struct netns_ct {
+ u8 sysctl_log_invalid;
+ u8 sysctl_events;
+ u8 sysctl_acct;
+ u8 sysctl_tstamp;
+ u8 sysctl_checksum;
+ struct ip_conntrack_stat *stat;
+ struct nf_ct_event_notifier *nf_conntrack_event_cb;
+ struct nf_ip_net nf_ct_proto;
+};
+
+struct netns_bpf {
+ struct bpf_prog_array *run_array[2];
+ struct bpf_prog *progs[2];
+ struct list_head links[2];
+};
+
+struct xfrm_policy_hash {
+ struct hlist_head *table;
+ unsigned int hmask;
+ u8 dbits4;
+ u8 sbits4;
+ u8 dbits6;
+ u8 sbits6;
+};
+
+struct xfrm_policy_hthresh {
+ struct work_struct work;
+ seqlock_t lock;
+ u8 lbits4;
+ u8 rbits4;
+ u8 lbits6;
+ u8 rbits6;
+};
+
+struct netns_xfrm {
+ struct list_head state_all;
+ struct hlist_head *state_bydst;
+ struct hlist_head *state_bysrc;
+ struct hlist_head *state_byspi;
+ struct hlist_head *state_byseq;
+ unsigned int state_hmask;
+ unsigned int state_num;
+ struct work_struct state_hash_work;
+ struct list_head policy_all;
+ struct hlist_head *policy_byidx;
+ unsigned int policy_idx_hmask;
+ struct hlist_head policy_inexact[3];
+ struct xfrm_policy_hash policy_bydst[3];
+ unsigned int policy_count[6];
+ struct work_struct policy_hash_work;
+ struct xfrm_policy_hthresh policy_hthresh;
+ struct list_head inexact_bins;
+ struct sock *nlsk;
+ struct sock *nlsk_stash;
+ u32 sysctl_aevent_etime;
+ u32 sysctl_aevent_rseqth;
+ int sysctl_larval_drop;
+ u32 sysctl_acq_expires;
+ u8 policy_default[3];
+ struct ctl_table_header *sysctl_hdr;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct dst_ops xfrm4_dst_ops;
+ struct dst_ops xfrm6_dst_ops;
+ spinlock_t xfrm_state_lock;
+ seqcount_spinlock_t xfrm_state_hash_generation;
+ seqcount_spinlock_t xfrm_policy_hash_generation;
+ spinlock_t xfrm_policy_lock;
+ struct mutex xfrm_cfg_mutex;
+};
+
+struct mpls_route;
+
+struct netns_mpls {
+ int ip_ttl_propagate;
+ int default_ttl;
+ size_t platform_labels;
+ struct mpls_route **platform_label;
+ struct ctl_table_header *ctl;
+};
+
+struct netns_xdp {
+ struct mutex lock;
+ struct hlist_head list;
+};
+
+struct uevent_sock;
+
+struct net_generic;
+
+struct net {
+ refcount_t passive;
+ spinlock_t rules_mod_lock;
+ atomic_t dev_unreg_count;
+ unsigned int dev_base_seq;
+ int ifindex;
+ spinlock_t nsid_lock;
+ atomic_t fnhe_genid;
+ struct list_head list;
+ struct list_head exit_list;
+ struct llist_node cleanup_list;
+ struct key_tag *key_domain;
+ struct user_namespace *user_ns;
+ struct ucounts *ucounts;
+ struct idr netns_ids;
+ struct ns_common ns;
+ struct ref_tracker_dir refcnt_tracker;
+ struct ref_tracker_dir notrefcnt_tracker;
+ struct list_head dev_base_head;
+ struct proc_dir_entry *proc_net;
+ struct proc_dir_entry *proc_net_stat;
+ struct ctl_table_set sysctls;
+ struct sock *rtnl;
+ struct sock *genl_sock;
+ struct uevent_sock *uevent_sock;
+ struct hlist_head *dev_name_head;
+ struct hlist_head *dev_index_head;
+ struct raw_notifier_head netdev_chain;
+ u32 hash_mix;
+ struct net_device *loopback_dev;
+ struct list_head rules_ops;
+ struct netns_core core;
+ struct netns_mib mib;
+ struct netns_packet packet;
+ struct netns_unix unx;
+ struct netns_nexthop nexthop;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct netns_ipv4 ipv4;
+ struct netns_ipv6 ipv6;
+ struct netns_nf nf;
+ struct netns_ct ct;
+ struct net_generic *gen;
+ struct netns_bpf bpf;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct netns_xfrm xfrm;
+ u64 net_cookie;
+ struct netns_mpls mpls;
+ struct netns_xdp xdp;
+ struct sock *diag_nlsk;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct nsset {
+ unsigned int flags;
+ struct nsproxy *nsproxy;
+ struct fs_struct *fs;
+ const struct cred *cred;
+};
+
+typedef unsigned int sk_buff_data_t;
+
+struct skb_ext;
+
+struct sk_buff {
+ union {
+ struct {
+ struct sk_buff *next;
+ struct sk_buff *prev;
+ union {
+ struct net_device *dev;
+ long unsigned int dev_scratch;
+ };
+ };
+ struct rb_node rbnode;
+ struct list_head list;
+ struct llist_node ll_node;
+ };
+ union {
+ struct sock *sk;
+ int ip_defrag_offset;
+ };
+ union {
+ ktime_t tstamp;
+ u64 skb_mstamp_ns;
+ };
+ char cb[48];
+ union {
+ struct {
+ long unsigned int _skb_refdst;
+ void (*destructor)(struct sk_buff *);
+ };
+ struct list_head tcp_tsorted_anchor;
+ long unsigned int _sk_redir;
+ };
+ long unsigned int _nfct;
+ unsigned int len;
+ unsigned int data_len;
+ __u16 mac_len;
+ __u16 hdr_len;
+ __u16 queue_mapping;
+ __u8 __cloned_offset[0];
+ __u8 cloned: 1;
+ __u8 nohdr: 1;
+ __u8 fclone: 2;
+ __u8 peeked: 1;
+ __u8 head_frag: 1;
+ __u8 pfmemalloc: 1;
+ __u8 pp_recycle: 1;
+ __u8 active_extensions;
+ union {
+ struct {
+ __u8 __pkt_type_offset[0];
+ __u8 pkt_type: 3;
+ __u8 ignore_df: 1;
+ __u8 nf_trace: 1;
+ __u8 ip_summed: 2;
+ __u8 ooo_okay: 1;
+ __u8 l4_hash: 1;
+ __u8 sw_hash: 1;
+ __u8 wifi_acked_valid: 1;
+ __u8 wifi_acked: 1;
+ __u8 no_fcs: 1;
+ __u8 encapsulation: 1;
+ __u8 encap_hdr_csum: 1;
+ __u8 csum_valid: 1;
+ __u8 __pkt_vlan_present_offset[0];
+ __u8 remcsum_offload: 1;
+ __u8 csum_complete_sw: 1;
+ __u8 csum_level: 2;
+ __u8 dst_pending_confirm: 1;
+ __u8 mono_delivery_time: 1;
+ __u8 tc_skip_classify: 1;
+ __u8 tc_at_ingress: 1;
+ __u8 ndisc_nodetype: 2;
+ __u8 ipvs_property: 1;
+ __u8 inner_protocol_type: 1;
+ __u8 redirected: 1;
+ __u8 nf_skip_egress: 1;
+ __u8 slow_gro: 1;
+ __u8 csum_not_inet: 1;
+ __u8 scm_io_uring: 1;
+ __u16 tc_index;
+ union {
+ __wsum csum;
+ struct {
+ __u16 csum_start;
+ __u16 csum_offset;
+ };
+ };
+ __u32 priority;
+ int skb_iif;
+ __u32 hash;
+ union {
+ u32 vlan_all;
+ struct {
+ __be16 vlan_proto;
+ __u16 vlan_tci;
+ };
+ };
+ union {
+ unsigned int napi_id;
+ unsigned int sender_cpu;
+ };
+ u16 alloc_cpu;
+ __u32 secmark;
+ union {
+ __u32 mark;
+ __u32 reserved_tailroom;
+ };
+ union {
+ __be16 inner_protocol;
+ __u8 inner_ipproto;
+ };
+ __u16 inner_transport_header;
+ __u16 inner_network_header;
+ __u16 inner_mac_header;
+ __be16 protocol;
+ __u16 transport_header;
+ __u16 network_header;
+ __u16 mac_header;
+ };
+ struct {
+ __u8 __pkt_type_offset[0];
+ __u8 pkt_type: 3;
+ __u8 ignore_df: 1;
+ __u8 nf_trace: 1;
+ __u8 ip_summed: 2;
+ __u8 ooo_okay: 1;
+ __u8 l4_hash: 1;
+ __u8 sw_hash: 1;
+ __u8 wifi_acked_valid: 1;
+ __u8 wifi_acked: 1;
+ __u8 no_fcs: 1;
+ __u8 encapsulation: 1;
+ __u8 encap_hdr_csum: 1;
+ __u8 csum_valid: 1;
+ __u8 __pkt_vlan_present_offset[0];
+ __u8 remcsum_offload: 1;
+ __u8 csum_complete_sw: 1;
+ __u8 csum_level: 2;
+ __u8 dst_pending_confirm: 1;
+ __u8 mono_delivery_time: 1;
+ __u8 tc_skip_classify: 1;
+ __u8 tc_at_ingress: 1;
+ __u8 ndisc_nodetype: 2;
+ __u8 ipvs_property: 1;
+ __u8 inner_protocol_type: 1;
+ __u8 redirected: 1;
+ __u8 nf_skip_egress: 1;
+ __u8 slow_gro: 1;
+ __u8 csum_not_inet: 1;
+ __u8 scm_io_uring: 1;
+ __u16 tc_index;
+ union {
+ __wsum csum;
+ struct {
+ __u16 csum_start;
+ __u16 csum_offset;
+ };
+ };
+ __u32 priority;
+ int skb_iif;
+ __u32 hash;
+ union {
+ u32 vlan_all;
+ struct {
+ __be16 vlan_proto;
+ __u16 vlan_tci;
+ };
+ };
+ union {
+ unsigned int napi_id;
+ unsigned int sender_cpu;
+ };
+ u16 alloc_cpu;
+ __u32 secmark;
+ union {
+ __u32 mark;
+ __u32 reserved_tailroom;
+ };
+ union {
+ __be16 inner_protocol;
+ __u8 inner_ipproto;
+ };
+ __u16 inner_transport_header;
+ __u16 inner_network_header;
+ __u16 inner_mac_header;
+ __be16 protocol;
+ __u16 transport_header;
+ __u16 network_header;
+ __u16 mac_header;
+ } headers;
+ };
+ sk_buff_data_t tail;
+ sk_buff_data_t end;
+ unsigned char *head;
+ unsigned char *data;
+ unsigned int truesize;
+ refcount_t users;
+ struct skb_ext *extensions;
+};
+
+struct in6_addr {
+ union {
+ __u8 u6_addr8[16];
+ __be16 u6_addr16[8];
+ __be32 u6_addr32[4];
+ } in6_u;
+};
+
+enum flow_dissector_key_id {
+ FLOW_DISSECTOR_KEY_CONTROL = 0,
+ FLOW_DISSECTOR_KEY_BASIC = 1,
+ FLOW_DISSECTOR_KEY_IPV4_ADDRS = 2,
+ FLOW_DISSECTOR_KEY_IPV6_ADDRS = 3,
+ FLOW_DISSECTOR_KEY_PORTS = 4,
+ FLOW_DISSECTOR_KEY_PORTS_RANGE = 5,
+ FLOW_DISSECTOR_KEY_ICMP = 6,
+ FLOW_DISSECTOR_KEY_ETH_ADDRS = 7,
+ FLOW_DISSECTOR_KEY_TIPC = 8,
+ FLOW_DISSECTOR_KEY_ARP = 9,
+ FLOW_DISSECTOR_KEY_VLAN = 10,
+ FLOW_DISSECTOR_KEY_FLOW_LABEL = 11,
+ FLOW_DISSECTOR_KEY_GRE_KEYID = 12,
+ FLOW_DISSECTOR_KEY_MPLS_ENTROPY = 13,
+ FLOW_DISSECTOR_KEY_ENC_KEYID = 14,
+ FLOW_DISSECTOR_KEY_ENC_IPV4_ADDRS = 15,
+ FLOW_DISSECTOR_KEY_ENC_IPV6_ADDRS = 16,
+ FLOW_DISSECTOR_KEY_ENC_CONTROL = 17,
+ FLOW_DISSECTOR_KEY_ENC_PORTS = 18,
+ FLOW_DISSECTOR_KEY_MPLS = 19,
+ FLOW_DISSECTOR_KEY_TCP = 20,
+ FLOW_DISSECTOR_KEY_IP = 21,
+ FLOW_DISSECTOR_KEY_CVLAN = 22,
+ FLOW_DISSECTOR_KEY_ENC_IP = 23,
+ FLOW_DISSECTOR_KEY_ENC_OPTS = 24,
+ FLOW_DISSECTOR_KEY_META = 25,
+ FLOW_DISSECTOR_KEY_CT = 26,
+ FLOW_DISSECTOR_KEY_HASH = 27,
+ FLOW_DISSECTOR_KEY_NUM_OF_VLANS = 28,
+ FLOW_DISSECTOR_KEY_PPPOE = 29,
+ FLOW_DISSECTOR_KEY_L2TPV3 = 30,
+ FLOW_DISSECTOR_KEY_MAX = 31,
+};
+
+enum {
+ IPSTATS_MIB_NUM = 0,
+ IPSTATS_MIB_INPKTS = 1,
+ IPSTATS_MIB_INOCTETS = 2,
+ IPSTATS_MIB_INDELIVERS = 3,
+ IPSTATS_MIB_OUTFORWDATAGRAMS = 4,
+ IPSTATS_MIB_OUTPKTS = 5,
+ IPSTATS_MIB_OUTOCTETS = 6,
+ IPSTATS_MIB_INHDRERRORS = 7,
+ IPSTATS_MIB_INTOOBIGERRORS = 8,
+ IPSTATS_MIB_INNOROUTES = 9,
+ IPSTATS_MIB_INADDRERRORS = 10,
+ IPSTATS_MIB_INUNKNOWNPROTOS = 11,
+ IPSTATS_MIB_INTRUNCATEDPKTS = 12,
+ IPSTATS_MIB_INDISCARDS = 13,
+ IPSTATS_MIB_OUTDISCARDS = 14,
+ IPSTATS_MIB_OUTNOROUTES = 15,
+ IPSTATS_MIB_REASMTIMEOUT = 16,
+ IPSTATS_MIB_REASMREQDS = 17,
+ IPSTATS_MIB_REASMOKS = 18,
+ IPSTATS_MIB_REASMFAILS = 19,
+ IPSTATS_MIB_FRAGOKS = 20,
+ IPSTATS_MIB_FRAGFAILS = 21,
+ IPSTATS_MIB_FRAGCREATES = 22,
+ IPSTATS_MIB_INMCASTPKTS = 23,
+ IPSTATS_MIB_OUTMCASTPKTS = 24,
+ IPSTATS_MIB_INBCASTPKTS = 25,
+ IPSTATS_MIB_OUTBCASTPKTS = 26,
+ IPSTATS_MIB_INMCASTOCTETS = 27,
+ IPSTATS_MIB_OUTMCASTOCTETS = 28,
+ IPSTATS_MIB_INBCASTOCTETS = 29,
+ IPSTATS_MIB_OUTBCASTOCTETS = 30,
+ IPSTATS_MIB_CSUMERRORS = 31,
+ IPSTATS_MIB_NOECTPKTS = 32,
+ IPSTATS_MIB_ECT1PKTS = 33,
+ IPSTATS_MIB_ECT0PKTS = 34,
+ IPSTATS_MIB_CEPKTS = 35,
+ IPSTATS_MIB_REASM_OVERLAPS = 36,
+ __IPSTATS_MIB_MAX = 37,
+};
+
+enum {
+ ICMP_MIB_NUM = 0,
+ ICMP_MIB_INMSGS = 1,
+ ICMP_MIB_INERRORS = 2,
+ ICMP_MIB_INDESTUNREACHS = 3,
+ ICMP_MIB_INTIMEEXCDS = 4,
+ ICMP_MIB_INPARMPROBS = 5,
+ ICMP_MIB_INSRCQUENCHS = 6,
+ ICMP_MIB_INREDIRECTS = 7,
+ ICMP_MIB_INECHOS = 8,
+ ICMP_MIB_INECHOREPS = 9,
+ ICMP_MIB_INTIMESTAMPS = 10,
+ ICMP_MIB_INTIMESTAMPREPS = 11,
+ ICMP_MIB_INADDRMASKS = 12,
+ ICMP_MIB_INADDRMASKREPS = 13,
+ ICMP_MIB_OUTMSGS = 14,
+ ICMP_MIB_OUTERRORS = 15,
+ ICMP_MIB_OUTDESTUNREACHS = 16,
+ ICMP_MIB_OUTTIMEEXCDS = 17,
+ ICMP_MIB_OUTPARMPROBS = 18,
+ ICMP_MIB_OUTSRCQUENCHS = 19,
+ ICMP_MIB_OUTREDIRECTS = 20,
+ ICMP_MIB_OUTECHOS = 21,
+ ICMP_MIB_OUTECHOREPS = 22,
+ ICMP_MIB_OUTTIMESTAMPS = 23,
+ ICMP_MIB_OUTTIMESTAMPREPS = 24,
+ ICMP_MIB_OUTADDRMASKS = 25,
+ ICMP_MIB_OUTADDRMASKREPS = 26,
+ ICMP_MIB_CSUMERRORS = 27,
+ __ICMP_MIB_MAX = 28,
+};
+
+enum {
+ ICMP6_MIB_NUM = 0,
+ ICMP6_MIB_INMSGS = 1,
+ ICMP6_MIB_INERRORS = 2,
+ ICMP6_MIB_OUTMSGS = 3,
+ ICMP6_MIB_OUTERRORS = 4,
+ ICMP6_MIB_CSUMERRORS = 5,
+ __ICMP6_MIB_MAX = 6,
+};
+
+enum {
+ TCP_MIB_NUM = 0,
+ TCP_MIB_RTOALGORITHM = 1,
+ TCP_MIB_RTOMIN = 2,
+ TCP_MIB_RTOMAX = 3,
+ TCP_MIB_MAXCONN = 4,
+ TCP_MIB_ACTIVEOPENS = 5,
+ TCP_MIB_PASSIVEOPENS = 6,
+ TCP_MIB_ATTEMPTFAILS = 7,
+ TCP_MIB_ESTABRESETS = 8,
+ TCP_MIB_CURRESTAB = 9,
+ TCP_MIB_INSEGS = 10,
+ TCP_MIB_OUTSEGS = 11,
+ TCP_MIB_RETRANSSEGS = 12,
+ TCP_MIB_INERRS = 13,
+ TCP_MIB_OUTRSTS = 14,
+ TCP_MIB_CSUMERRORS = 15,
+ __TCP_MIB_MAX = 16,
+};
+
+enum {
+ UDP_MIB_NUM = 0,
+ UDP_MIB_INDATAGRAMS = 1,
+ UDP_MIB_NOPORTS = 2,
+ UDP_MIB_INERRORS = 3,
+ UDP_MIB_OUTDATAGRAMS = 4,
+ UDP_MIB_RCVBUFERRORS = 5,
+ UDP_MIB_SNDBUFERRORS = 6,
+ UDP_MIB_CSUMERRORS = 7,
+ UDP_MIB_IGNOREDMULTI = 8,
+ UDP_MIB_MEMERRORS = 9,
+ __UDP_MIB_MAX = 10,
+};
+
+enum {
+ LINUX_MIB_NUM = 0,
+ LINUX_MIB_SYNCOOKIESSENT = 1,
+ LINUX_MIB_SYNCOOKIESRECV = 2,
+ LINUX_MIB_SYNCOOKIESFAILED = 3,
+ LINUX_MIB_EMBRYONICRSTS = 4,
+ LINUX_MIB_PRUNECALLED = 5,
+ LINUX_MIB_RCVPRUNED = 6,
+ LINUX_MIB_OFOPRUNED = 7,
+ LINUX_MIB_OUTOFWINDOWICMPS = 8,
+ LINUX_MIB_LOCKDROPPEDICMPS = 9,
+ LINUX_MIB_ARPFILTER = 10,
+ LINUX_MIB_TIMEWAITED = 11,
+ LINUX_MIB_TIMEWAITRECYCLED = 12,
+ LINUX_MIB_TIMEWAITKILLED = 13,
+ LINUX_MIB_PAWSACTIVEREJECTED = 14,
+ LINUX_MIB_PAWSESTABREJECTED = 15,
+ LINUX_MIB_DELAYEDACKS = 16,
+ LINUX_MIB_DELAYEDACKLOCKED = 17,
+ LINUX_MIB_DELAYEDACKLOST = 18,
+ LINUX_MIB_LISTENOVERFLOWS = 19,
+ LINUX_MIB_LISTENDROPS = 20,
+ LINUX_MIB_TCPHPHITS = 21,
+ LINUX_MIB_TCPPUREACKS = 22,
+ LINUX_MIB_TCPHPACKS = 23,
+ LINUX_MIB_TCPRENORECOVERY = 24,
+ LINUX_MIB_TCPSACKRECOVERY = 25,
+ LINUX_MIB_TCPSACKRENEGING = 26,
+ LINUX_MIB_TCPSACKREORDER = 27,
+ LINUX_MIB_TCPRENOREORDER = 28,
+ LINUX_MIB_TCPTSREORDER = 29,
+ LINUX_MIB_TCPFULLUNDO = 30,
+ LINUX_MIB_TCPPARTIALUNDO = 31,
+ LINUX_MIB_TCPDSACKUNDO = 32,
+ LINUX_MIB_TCPLOSSUNDO = 33,
+ LINUX_MIB_TCPLOSTRETRANSMIT = 34,
+ LINUX_MIB_TCPRENOFAILURES = 35,
+ LINUX_MIB_TCPSACKFAILURES = 36,
+ LINUX_MIB_TCPLOSSFAILURES = 37,
+ LINUX_MIB_TCPFASTRETRANS = 38,
+ LINUX_MIB_TCPSLOWSTARTRETRANS = 39,
+ LINUX_MIB_TCPTIMEOUTS = 40,
+ LINUX_MIB_TCPLOSSPROBES = 41,
+ LINUX_MIB_TCPLOSSPROBERECOVERY = 42,
+ LINUX_MIB_TCPRENORECOVERYFAIL = 43,
+ LINUX_MIB_TCPSACKRECOVERYFAIL = 44,
+ LINUX_MIB_TCPRCVCOLLAPSED = 45,
+ LINUX_MIB_TCPDSACKOLDSENT = 46,
+ LINUX_MIB_TCPDSACKOFOSENT = 47,
+ LINUX_MIB_TCPDSACKRECV = 48,
+ LINUX_MIB_TCPDSACKOFORECV = 49,
+ LINUX_MIB_TCPABORTONDATA = 50,
+ LINUX_MIB_TCPABORTONCLOSE = 51,
+ LINUX_MIB_TCPABORTONMEMORY = 52,
+ LINUX_MIB_TCPABORTONTIMEOUT = 53,
+ LINUX_MIB_TCPABORTONLINGER = 54,
+ LINUX_MIB_TCPABORTFAILED = 55,
+ LINUX_MIB_TCPMEMORYPRESSURES = 56,
+ LINUX_MIB_TCPMEMORYPRESSURESCHRONO = 57,
+ LINUX_MIB_TCPSACKDISCARD = 58,
+ LINUX_MIB_TCPDSACKIGNOREDOLD = 59,
+ LINUX_MIB_TCPDSACKIGNOREDNOUNDO = 60,
+ LINUX_MIB_TCPSPURIOUSRTOS = 61,
+ LINUX_MIB_TCPMD5NOTFOUND = 62,
+ LINUX_MIB_TCPMD5UNEXPECTED = 63,
+ LINUX_MIB_TCPMD5FAILURE = 64,
+ LINUX_MIB_SACKSHIFTED = 65,
+ LINUX_MIB_SACKMERGED = 66,
+ LINUX_MIB_SACKSHIFTFALLBACK = 67,
+ LINUX_MIB_TCPBACKLOGDROP = 68,
+ LINUX_MIB_PFMEMALLOCDROP = 69,
+ LINUX_MIB_TCPMINTTLDROP = 70,
+ LINUX_MIB_TCPDEFERACCEPTDROP = 71,
+ LINUX_MIB_IPRPFILTER = 72,
+ LINUX_MIB_TCPTIMEWAITOVERFLOW = 73,
+ LINUX_MIB_TCPREQQFULLDOCOOKIES = 74,
+ LINUX_MIB_TCPREQQFULLDROP = 75,
+ LINUX_MIB_TCPRETRANSFAIL = 76,
+ LINUX_MIB_TCPRCVCOALESCE = 77,
+ LINUX_MIB_TCPBACKLOGCOALESCE = 78,
+ LINUX_MIB_TCPOFOQUEUE = 79,
+ LINUX_MIB_TCPOFODROP = 80,
+ LINUX_MIB_TCPOFOMERGE = 81,
+ LINUX_MIB_TCPCHALLENGEACK = 82,
+ LINUX_MIB_TCPSYNCHALLENGE = 83,
+ LINUX_MIB_TCPFASTOPENACTIVE = 84,
+ LINUX_MIB_TCPFASTOPENACTIVEFAIL = 85,
+ LINUX_MIB_TCPFASTOPENPASSIVE = 86,
+ LINUX_MIB_TCPFASTOPENPASSIVEFAIL = 87,
+ LINUX_MIB_TCPFASTOPENLISTENOVERFLOW = 88,
+ LINUX_MIB_TCPFASTOPENCOOKIEREQD = 89,
+ LINUX_MIB_TCPFASTOPENBLACKHOLE = 90,
+ LINUX_MIB_TCPSPURIOUS_RTX_HOSTQUEUES = 91,
+ LINUX_MIB_BUSYPOLLRXPACKETS = 92,
+ LINUX_MIB_TCPAUTOCORKING = 93,
+ LINUX_MIB_TCPFROMZEROWINDOWADV = 94,
+ LINUX_MIB_TCPTOZEROWINDOWADV = 95,
+ LINUX_MIB_TCPWANTZEROWINDOWADV = 96,
+ LINUX_MIB_TCPSYNRETRANS = 97,
+ LINUX_MIB_TCPORIGDATASENT = 98,
+ LINUX_MIB_TCPHYSTARTTRAINDETECT = 99,
+ LINUX_MIB_TCPHYSTARTTRAINCWND = 100,
+ LINUX_MIB_TCPHYSTARTDELAYDETECT = 101,
+ LINUX_MIB_TCPHYSTARTDELAYCWND = 102,
+ LINUX_MIB_TCPACKSKIPPEDSYNRECV = 103,
+ LINUX_MIB_TCPACKSKIPPEDPAWS = 104,
+ LINUX_MIB_TCPACKSKIPPEDSEQ = 105,
+ LINUX_MIB_TCPACKSKIPPEDFINWAIT2 = 106,
+ LINUX_MIB_TCPACKSKIPPEDTIMEWAIT = 107,
+ LINUX_MIB_TCPACKSKIPPEDCHALLENGE = 108,
+ LINUX_MIB_TCPWINPROBE = 109,
+ LINUX_MIB_TCPKEEPALIVE = 110,
+ LINUX_MIB_TCPMTUPFAIL = 111,
+ LINUX_MIB_TCPMTUPSUCCESS = 112,
+ LINUX_MIB_TCPDELIVERED = 113,
+ LINUX_MIB_TCPDELIVEREDCE = 114,
+ LINUX_MIB_TCPACKCOMPRESSED = 115,
+ LINUX_MIB_TCPZEROWINDOWDROP = 116,
+ LINUX_MIB_TCPRCVQDROP = 117,
+ LINUX_MIB_TCPWQUEUETOOBIG = 118,
+ LINUX_MIB_TCPFASTOPENPASSIVEALTKEY = 119,
+ LINUX_MIB_TCPTIMEOUTREHASH = 120,
+ LINUX_MIB_TCPDUPLICATEDATAREHASH = 121,
+ LINUX_MIB_TCPDSACKRECVSEGS = 122,
+ LINUX_MIB_TCPDSACKIGNOREDDUBIOUS = 123,
+ LINUX_MIB_TCPMIGRATEREQSUCCESS = 124,
+ LINUX_MIB_TCPMIGRATEREQFAILURE = 125,
+ LINUX_MIB_TCPPLBREHASH = 126,
+ __LINUX_MIB_MAX = 127,
+};
+
+enum {
+ LINUX_MIB_XFRMNUM = 0,
+ LINUX_MIB_XFRMINERROR = 1,
+ LINUX_MIB_XFRMINBUFFERERROR = 2,
+ LINUX_MIB_XFRMINHDRERROR = 3,
+ LINUX_MIB_XFRMINNOSTATES = 4,
+ LINUX_MIB_XFRMINSTATEPROTOERROR = 5,
+ LINUX_MIB_XFRMINSTATEMODEERROR = 6,
+ LINUX_MIB_XFRMINSTATESEQERROR = 7,
+ LINUX_MIB_XFRMINSTATEEXPIRED = 8,
+ LINUX_MIB_XFRMINSTATEMISMATCH = 9,
+ LINUX_MIB_XFRMINSTATEINVALID = 10,
+ LINUX_MIB_XFRMINTMPLMISMATCH = 11,
+ LINUX_MIB_XFRMINNOPOLS = 12,
+ LINUX_MIB_XFRMINPOLBLOCK = 13,
+ LINUX_MIB_XFRMINPOLERROR = 14,
+ LINUX_MIB_XFRMOUTERROR = 15,
+ LINUX_MIB_XFRMOUTBUNDLEGENERROR = 16,
+ LINUX_MIB_XFRMOUTBUNDLECHECKERROR = 17,
+ LINUX_MIB_XFRMOUTNOSTATES = 18,
+ LINUX_MIB_XFRMOUTSTATEPROTOERROR = 19,
+ LINUX_MIB_XFRMOUTSTATEMODEERROR = 20,
+ LINUX_MIB_XFRMOUTSTATESEQERROR = 21,
+ LINUX_MIB_XFRMOUTSTATEEXPIRED = 22,
+ LINUX_MIB_XFRMOUTPOLBLOCK = 23,
+ LINUX_MIB_XFRMOUTPOLDEAD = 24,
+ LINUX_MIB_XFRMOUTPOLERROR = 25,
+ LINUX_MIB_XFRMFWDHDRERROR = 26,
+ LINUX_MIB_XFRMOUTSTATEINVALID = 27,
+ LINUX_MIB_XFRMACQUIREERROR = 28,
+ __LINUX_MIB_XFRMMAX = 29,
+};
+
+enum {
+ LINUX_MIB_TLSNUM = 0,
+ LINUX_MIB_TLSCURRTXSW = 1,
+ LINUX_MIB_TLSCURRRXSW = 2,
+ LINUX_MIB_TLSCURRTXDEVICE = 3,
+ LINUX_MIB_TLSCURRRXDEVICE = 4,
+ LINUX_MIB_TLSTXSW = 5,
+ LINUX_MIB_TLSRXSW = 6,
+ LINUX_MIB_TLSTXDEVICE = 7,
+ LINUX_MIB_TLSRXDEVICE = 8,
+ LINUX_MIB_TLSDECRYPTERROR = 9,
+ LINUX_MIB_TLSRXDEVICERESYNC = 10,
+ LINUX_MIB_TLSDECRYPTRETRY = 11,
+ LINUX_MIB_TLSRXNOPADVIOL = 12,
+ __LINUX_MIB_TLSMAX = 13,
+};
+
+struct ipstats_mib {
+ u64 mibs[37];
+ struct u64_stats_sync syncp;
+};
+
+struct icmp_mib {
+ long unsigned int mibs[28];
+};
+
+struct icmpmsg_mib {
+ atomic_long_t mibs[512];
+};
+
+struct icmpv6_mib {
+ long unsigned int mibs[6];
+};
+
+struct icmpv6msg_mib {
+ atomic_long_t mibs[512];
+};
+
+struct tcp_mib {
+ long unsigned int mibs[16];
+};
+
+struct udp_mib {
+ long unsigned int mibs[10];
+};
+
+struct linux_mib {
+ long unsigned int mibs[127];
+};
+
+struct linux_tls_mib {
+ long unsigned int mibs[13];
+};
+
+struct proc_dir_entry {
+ atomic_t in_use;
+ refcount_t refcnt;
+ struct list_head pde_openers;
+ spinlock_t pde_unload_lock;
+ struct completion *pde_unload_completion;
+ const struct inode_operations *proc_iops;
+ union {
+ const struct proc_ops *proc_ops;
+ const struct file_operations *proc_dir_ops;
+ };
+ const struct dentry_operations *proc_dops;
+ union {
+ const struct seq_operations *seq_ops;
+ int (*single_show)(struct seq_file *, void *);
+ };
+ proc_write_t write;
+ void *data;
+ unsigned int state_size;
+ unsigned int low_ino;
+ nlink_t nlink;
+ kuid_t uid;
+ kgid_t gid;
+ loff_t size;
+ struct proc_dir_entry *parent;
+ struct rb_root subdir;
+ struct rb_node subdir_node;
+ char *name;
+ umode_t mode;
+ u8 flags;
+ u8 namelen;
+ char inline_name[0];
+};
+
+struct inet_frags;
+
+struct fqdir {
+ long int high_thresh;
+ long int low_thresh;
+ int timeout;
+ int max_dist;
+ struct inet_frags *f;
+ struct net *net;
+ bool dead;
+ long: 56;
+ long: 64;
+ long: 64;
+ struct rhashtable rhashtable;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ atomic_long_t mem;
+ struct work_struct destroy_work;
+ struct llist_node free_list;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct inet_frag_queue;
+
+struct inet_frags {
+ unsigned int qsize;
+ void (*constructor)(struct inet_frag_queue *, const void *);
+ void (*destructor)(struct inet_frag_queue *);
+ void (*frag_expire)(struct timer_list *);
+ struct kmem_cache *frags_cachep;
+ const char *frags_cache_name;
+ struct rhashtable_params rhash_params;
+ refcount_t refcnt;
+ struct completion completion;
+};
+
+struct frag_v4_compare_key {
+ __be32 saddr;
+ __be32 daddr;
+ u32 user;
+ u32 vif;
+ __be16 id;
+ u16 protocol;
+};
+
+struct frag_v6_compare_key {
+ struct in6_addr saddr;
+ struct in6_addr daddr;
+ u32 user;
+ __be32 id;
+ u32 iif;
+};
+
+struct inet_frag_queue {
+ struct rhash_head node;
+ union {
+ struct frag_v4_compare_key v4;
+ struct frag_v6_compare_key v6;
+ } key;
+ struct timer_list timer;
+ spinlock_t lock;
+ refcount_t refcnt;
+ struct rb_root rb_fragments;
+ struct sk_buff *fragments_tail;
+ struct sk_buff *last_run_head;
+ ktime_t stamp;
+ int len;
+ int meat;
+ u8 mono_delivery_time;
+ __u8 flags;
+ u16 max_size;
+ struct fqdir *fqdir;
+ struct callback_head rcu;
+};
+
+enum tcp_ca_event {
+ CA_EVENT_TX_START = 0,
+ CA_EVENT_CWND_RESTART = 1,
+ CA_EVENT_COMPLETE_CWR = 2,
+ CA_EVENT_LOSS = 3,
+ CA_EVENT_ECN_NO_CE = 4,
+ CA_EVENT_ECN_IS_CE = 5,
+};
+
+struct ack_sample;
+
+struct rate_sample;
+
+union tcp_cc_info;
+
+struct tcp_congestion_ops {
+ u32 (*ssthresh)(struct sock *);
+ void (*cong_avoid)(struct sock *, u32, u32);
+ void (*set_state)(struct sock *, u8);
+ void (*cwnd_event)(struct sock *, enum tcp_ca_event);
+ void (*in_ack_event)(struct sock *, u32);
+ void (*pkts_acked)(struct sock *, const struct ack_sample *);
+ u32 (*min_tso_segs)(struct sock *);
+ void (*cong_control)(struct sock *, const struct rate_sample *);
+ u32 (*undo_cwnd)(struct sock *);
+ u32 (*sndbuf_expand)(struct sock *);
+ size_t (*get_info)(struct sock *, u32, int *, union tcp_cc_info *);
+ char name[16];
+ struct module *owner;
+ struct list_head list;
+ u32 key;
+ u32 flags;
+ void (*init)(struct sock *);
+ void (*release)(struct sock *);
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+typedef struct {} netdevice_tracker;
+
+struct xfrm_state;
+
+struct lwtunnel_state;
+
+struct dst_entry {
+ struct net_device *dev;
+ struct dst_ops *ops;
+ long unsigned int _metrics;
+ long unsigned int expires;
+ struct xfrm_state *xfrm;
+ int (*input)(struct sk_buff *);
+ int (*output)(struct net *, struct sock *, struct sk_buff *);
+ short unsigned int flags;
+ short int obsolete;
+ short unsigned int header_len;
+ short unsigned int trailer_len;
+ atomic_t __refcnt;
+ int __use;
+ long unsigned int lastuse;
+ struct lwtunnel_state *lwtstate;
+ struct callback_head callback_head;
+ short int error;
+ short int __pad;
+ __u32 tclassid;
+ netdevice_tracker dev_tracker;
+};
+
+enum nf_inet_hooks {
+ NF_INET_PRE_ROUTING = 0,
+ NF_INET_LOCAL_IN = 1,
+ NF_INET_FORWARD = 2,
+ NF_INET_LOCAL_OUT = 3,
+ NF_INET_POST_ROUTING = 4,
+ NF_INET_NUMHOOKS = 5,
+ NF_INET_INGRESS = 5,
+};
+
+enum {
+ NFPROTO_UNSPEC = 0,
+ NFPROTO_INET = 1,
+ NFPROTO_IPV4 = 2,
+ NFPROTO_ARP = 3,
+ NFPROTO_NETDEV = 5,
+ NFPROTO_BRIDGE = 7,
+ NFPROTO_IPV6 = 10,
+ NFPROTO_NUMPROTO = 11,
+};
+
+enum nf_log_type {
+ NF_LOG_TYPE_LOG = 0,
+ NF_LOG_TYPE_ULOG = 1,
+ NF_LOG_TYPE_MAX = 2,
+};
+
+typedef u8 u_int8_t;
+
+struct nf_loginfo;
+
+typedef void nf_logfn(struct net *, u_int8_t, unsigned int, const struct sk_buff *, const struct net_device *, const struct net_device *, const struct nf_loginfo *, const char *);
+
+struct nf_logger {
+ char *name;
+ enum nf_log_type type;
+ nf_logfn *logfn;
+ struct module *me;
+};
+
+enum tcp_conntrack {
+ TCP_CONNTRACK_NONE = 0,
+ TCP_CONNTRACK_SYN_SENT = 1,
+ TCP_CONNTRACK_SYN_RECV = 2,
+ TCP_CONNTRACK_ESTABLISHED = 3,
+ TCP_CONNTRACK_FIN_WAIT = 4,
+ TCP_CONNTRACK_CLOSE_WAIT = 5,
+ TCP_CONNTRACK_LAST_ACK = 6,
+ TCP_CONNTRACK_TIME_WAIT = 7,
+ TCP_CONNTRACK_CLOSE = 8,
+ TCP_CONNTRACK_LISTEN = 9,
+ TCP_CONNTRACK_MAX = 10,
+ TCP_CONNTRACK_IGNORE = 11,
+ TCP_CONNTRACK_RETRANS = 12,
+ TCP_CONNTRACK_UNACK = 13,
+ TCP_CONNTRACK_TIMEOUT_MAX = 14,
+};
+
+enum ct_dccp_states {
+ CT_DCCP_NONE = 0,
+ CT_DCCP_REQUEST = 1,
+ CT_DCCP_RESPOND = 2,
+ CT_DCCP_PARTOPEN = 3,
+ CT_DCCP_OPEN = 4,
+ CT_DCCP_CLOSEREQ = 5,
+ CT_DCCP_CLOSING = 6,
+ CT_DCCP_TIMEWAIT = 7,
+ CT_DCCP_IGNORE = 8,
+ CT_DCCP_INVALID = 9,
+ __CT_DCCP_MAX = 10,
+};
+
+struct ip_conntrack_stat {
+ unsigned int found;
+ unsigned int invalid;
+ unsigned int insert;
+ unsigned int insert_failed;
+ unsigned int clash_resolve;
+ unsigned int drop;
+ unsigned int early_drop;
+ unsigned int error;
+ unsigned int expect_new;
+ unsigned int expect_create;
+ unsigned int expect_delete;
+ unsigned int search_restart;
+ unsigned int chaintoolong;
+};
+
+enum ip_conntrack_dir {
+ IP_CT_DIR_ORIGINAL = 0,
+ IP_CT_DIR_REPLY = 1,
+ IP_CT_DIR_MAX = 2,
+};
+
+enum sctp_conntrack {
+ SCTP_CONNTRACK_NONE = 0,
+ SCTP_CONNTRACK_CLOSED = 1,
+ SCTP_CONNTRACK_COOKIE_WAIT = 2,
+ SCTP_CONNTRACK_COOKIE_ECHOED = 3,
+ SCTP_CONNTRACK_ESTABLISHED = 4,
+ SCTP_CONNTRACK_SHUTDOWN_SENT = 5,
+ SCTP_CONNTRACK_SHUTDOWN_RECD = 6,
+ SCTP_CONNTRACK_SHUTDOWN_ACK_SENT = 7,
+ SCTP_CONNTRACK_HEARTBEAT_SENT = 8,
+ SCTP_CONNTRACK_HEARTBEAT_ACKED = 9,
+ SCTP_CONNTRACK_MAX = 10,
+};
+
+enum udp_conntrack {
+ UDP_CT_UNREPLIED = 0,
+ UDP_CT_REPLIED = 1,
+ UDP_CT_MAX = 2,
+};
+
+enum {
+ XFRM_POLICY_IN = 0,
+ XFRM_POLICY_OUT = 1,
+ XFRM_POLICY_FWD = 2,
+ XFRM_POLICY_MASK = 3,
+ XFRM_POLICY_MAX = 3,
+};
+
+enum netns_bpf_attach_type {
+ NETNS_BPF_INVALID = -1,
+ NETNS_BPF_FLOW_DISSECTOR = 0,
+ NETNS_BPF_SK_LOOKUP = 1,
+ MAX_NETNS_BPF_ATTACH_TYPE = 2,
+};
+
+struct pipe_buf_operations;
+
+struct pipe_buffer {
+ struct page *page;
+ unsigned int offset;
+ unsigned int len;
+ const struct pipe_buf_operations *ops;
+ unsigned int flags;
+ long unsigned int private;
+};
+
+struct pipe_buf_operations {
+ int (*confirm)(struct pipe_inode_info *, struct pipe_buffer *);
+ void (*release)(struct pipe_inode_info *, struct pipe_buffer *);
+ bool (*try_steal)(struct pipe_inode_info *, struct pipe_buffer *);
+ bool (*get)(struct pipe_inode_info *, struct pipe_buffer *);
+};
+
+struct skb_ext {
+ refcount_t refcnt;
+ u8 offset[3];
+ u8 chunks;
+ char data[0];
+};
+
+enum skb_ext_id {
+ SKB_EXT_SEC_PATH = 0,
+ TC_SKB_EXT = 1,
+ SKB_EXT_MPTCP = 2,
+ SKB_EXT_NUM = 3,
+};
+
+struct linux_binprm {
+ struct vm_area_struct *vma;
+ long unsigned int vma_pages;
+ struct mm_struct *mm;
+ long unsigned int p;
+ long unsigned int argmin;
+ unsigned int have_execfd: 1;
+ unsigned int execfd_creds: 1;
+ unsigned int secureexec: 1;
+ unsigned int point_of_no_return: 1;
+ struct file *executable;
+ struct file *interpreter;
+ struct file *file;
+ struct cred *cred;
+ int unsafe;
+ unsigned int per_clear;
+ int argc;
+ int envc;
+ const char *filename;
+ const char *interp;
+ const char *fdpath;
+ unsigned int interp_flags;
+ int execfd;
+ long unsigned int loader;
+ long unsigned int exec;
+ struct rlimit rlim_stack;
+ char buf[256];
+};
+
+union proc_op {
+ int (*proc_get_link)(struct dentry *, struct path *);
+ int (*proc_show)(struct seq_file *, struct pid_namespace *, struct pid *, struct task_struct *);
+ const char *lsm;
+};
+
+struct proc_inode {
+ struct pid *pid;
+ unsigned int fd;
+ union proc_op op;
+ struct proc_dir_entry *pde;
+ struct ctl_table_header *sysctl;
+ struct ctl_table *sysctl_entry;
+ struct hlist_node sibling_inodes;
+ const struct proc_ns_operations *ns_ops;
+ struct inode vfs_inode;
+};
+
+typedef struct dentry *instantiate_t(struct dentry *, struct task_struct *, const void *);
+
+typedef __u16 __le16;
+
+typedef __u32 __le32;
+
+typedef __u64 __le64;
+
+typedef unsigned int slab_flags_t;
+
+struct wait_bit_key {
+ void *flags;
+ int bit_nr;
+ long unsigned int timeout;
+};
+
+struct wait_bit_queue_entry {
+ struct wait_bit_key key;
+ struct wait_queue_entry wq_entry;
+};
+
+struct request;
+
+struct blk_plug {
+ struct request *mq_list;
+ struct request *cached_rq;
+ short unsigned int nr_ios;
+ short unsigned int rq_count;
+ bool multiple_queues;
+ bool has_elevator;
+ bool nowait;
+ struct list_head cb_list;
+};
+
+enum blk_bounce {
+ BLK_BOUNCE_NONE = 0,
+ BLK_BOUNCE_HIGH = 1,
+};
+
+enum blk_zoned_model {
+ BLK_ZONED_NONE = 0,
+ BLK_ZONED_HA = 1,
+ BLK_ZONED_HM = 2,
+};
+
+struct queue_limits {
+ enum blk_bounce bounce;
+ long unsigned int seg_boundary_mask;
+ long unsigned int virt_boundary_mask;
+ unsigned int max_hw_sectors;
+ unsigned int max_dev_sectors;
+ unsigned int chunk_sectors;
+ unsigned int max_sectors;
+ unsigned int max_segment_size;
+ unsigned int physical_block_size;
+ unsigned int logical_block_size;
+ unsigned int alignment_offset;
+ unsigned int io_min;
+ unsigned int io_opt;
+ unsigned int max_discard_sectors;
+ unsigned int max_hw_discard_sectors;
+ unsigned int max_secure_erase_sectors;
+ unsigned int max_write_zeroes_sectors;
+ unsigned int max_zone_append_sectors;
+ unsigned int discard_granularity;
+ unsigned int discard_alignment;
+ unsigned int zone_write_granularity;
+ short unsigned int max_segments;
+ short unsigned int max_integrity_segments;
+ short unsigned int max_discard_segments;
+ unsigned char misaligned;
+ unsigned char discard_misaligned;
+ unsigned char raid_partial_stripes_expensive;
+ enum blk_zoned_model zoned;
+ unsigned int dma_alignment;
+};
+
+struct elevator_queue;
+
+struct blk_queue_stats;
+
+struct rq_qos;
+
+struct blk_mq_ops;
+
+struct blk_mq_ctx;
+
+struct blk_stat_callback;
+
+struct blk_rq_stat;
+
+struct blk_mq_tags;
+
+struct blk_trace;
+
+struct blk_flush_queue;
+
+struct throtl_data;
+
+struct blk_mq_tag_set;
+
+struct request_queue {
+ struct request *last_merge;
+ struct elevator_queue *elevator;
+ struct percpu_ref q_usage_counter;
+ struct blk_queue_stats *stats;
+ struct rq_qos *rq_qos;
+ const struct blk_mq_ops *mq_ops;
+ struct blk_mq_ctx *queue_ctx;
+ unsigned int queue_depth;
+ struct xarray hctx_table;
+ unsigned int nr_hw_queues;
+ void *queuedata;
+ long unsigned int queue_flags;
+ atomic_t pm_only;
+ int id;
+ spinlock_t queue_lock;
+ struct gendisk *disk;
+ struct kobject kobj;
+ struct kobject *mq_kobj;
+ struct device *dev;
+ enum rpm_status rpm_status;
+ long unsigned int nr_requests;
+ unsigned int dma_pad_mask;
+ unsigned int rq_timeout;
+ int poll_nsec;
+ struct blk_stat_callback *poll_cb;
+ struct blk_rq_stat *poll_stat;
+ struct timer_list timeout;
+ struct work_struct timeout_work;
+ atomic_t nr_active_requests_shared_tags;
+ struct blk_mq_tags *sched_shared_tags;
+ struct list_head icq_list;
+ long unsigned int blkcg_pols[1];
+ struct blkcg_gq *root_blkg;
+ struct list_head blkg_list;
+ struct queue_limits limits;
+ unsigned int required_elevator_features;
+ int node;
+ struct blk_trace *blk_trace;
+ struct blk_flush_queue *fq;
+ struct list_head requeue_list;
+ spinlock_t requeue_lock;
+ struct delayed_work requeue_work;
+ struct mutex sysfs_lock;
+ struct mutex sysfs_dir_lock;
+ struct list_head unused_hctx_list;
+ spinlock_t unused_hctx_lock;
+ int mq_freeze_depth;
+ struct throtl_data *td;
+ struct callback_head callback_head;
+ wait_queue_head_t mq_freeze_wq;
+ struct mutex mq_freeze_lock;
+ int quiesce_depth;
+ struct blk_mq_tag_set *tag_set;
+ struct list_head tag_set_list;
+ struct dentry *debugfs_dir;
+ struct dentry *sched_debugfs_dir;
+ struct dentry *rqos_debugfs_dir;
+ struct mutex debugfs_mutex;
+ bool mq_sysfs_init_done;
+ struct srcu_struct srcu[0];
+};
+
+struct buffer_head;
+
+typedef void bh_end_io_t(struct buffer_head *, int);
+
+struct buffer_head {
+ long unsigned int b_state;
+ struct buffer_head *b_this_page;
+ struct page *b_page;
+ sector_t b_blocknr;
+ size_t b_size;
+ char *b_data;
+ struct block_device *b_bdev;
+ bh_end_io_t *b_end_io;
+ void *b_private;
+ struct list_head b_assoc_buffers;
+ struct address_space *b_assoc_map;
+ atomic_t b_count;
+ spinlock_t b_uptodate_lock;
+};
+
+struct io_comp_batch {
+ struct request *req_list;
+ bool need_ts;
+ void (*complete)(struct io_comp_batch *);
+};
+
+struct fiemap_extent;
+
+struct fiemap_extent_info {
+ unsigned int fi_flags;
+ unsigned int fi_extents_mapped;
+ unsigned int fi_extents_max;
+ struct fiemap_extent *fi_extents_start;
+};
+
+struct block_device_operations;
+
+struct timer_rand_state;
+
+struct disk_events;
+
+struct badblocks;
+
+struct blk_independent_access_ranges;
+
+struct gendisk {
+ int major;
+ int first_minor;
+ int minors;
+ char disk_name[32];
+ short unsigned int events;
+ short unsigned int event_flags;
+ struct xarray part_tbl;
+ struct block_device *part0;
+ const struct block_device_operations *fops;
+ struct request_queue *queue;
+ void *private_data;
+ struct bio_set bio_split;
+ int flags;
+ long unsigned int state;
+ struct mutex open_mutex;
+ unsigned int open_partitions;
+ struct backing_dev_info *bdi;
+ struct kobject *slave_dir;
+ struct timer_rand_state *random;
+ atomic_t sync_io;
+ struct disk_events *ev;
+ int node_id;
+ struct badblocks *bb;
+ struct lockdep_map lockdep_map;
+ u64 diskseq;
+ struct blk_independent_access_ranges *ia_ranges;
+};
+
+struct partition_meta_info {
+ char uuid[37];
+ u8 volname[64];
+};
+
+enum req_op {
+ REQ_OP_READ = 0,
+ REQ_OP_WRITE = 1,
+ REQ_OP_FLUSH = 2,
+ REQ_OP_DISCARD = 3,
+ REQ_OP_SECURE_ERASE = 5,
+ REQ_OP_WRITE_ZEROES = 9,
+ REQ_OP_ZONE_OPEN = 10,
+ REQ_OP_ZONE_CLOSE = 11,
+ REQ_OP_ZONE_FINISH = 12,
+ REQ_OP_ZONE_APPEND = 13,
+ REQ_OP_ZONE_RESET = 15,
+ REQ_OP_ZONE_RESET_ALL = 17,
+ REQ_OP_DRV_IN = 34,
+ REQ_OP_DRV_OUT = 35,
+ REQ_OP_LAST = 36,
+};
+
+enum req_flag_bits {
+ __REQ_FAILFAST_DEV = 8,
+ __REQ_FAILFAST_TRANSPORT = 9,
+ __REQ_FAILFAST_DRIVER = 10,
+ __REQ_SYNC = 11,
+ __REQ_META = 12,
+ __REQ_PRIO = 13,
+ __REQ_NOMERGE = 14,
+ __REQ_IDLE = 15,
+ __REQ_INTEGRITY = 16,
+ __REQ_FUA = 17,
+ __REQ_PREFLUSH = 18,
+ __REQ_RAHEAD = 19,
+ __REQ_BACKGROUND = 20,
+ __REQ_NOWAIT = 21,
+ __REQ_CGROUP_PUNT = 22,
+ __REQ_POLLED = 23,
+ __REQ_ALLOC_CACHE = 24,
+ __REQ_SWAP = 25,
+ __REQ_DRV = 26,
+ __REQ_NOUNMAP = 27,
+ __REQ_NR_BITS = 28,
+};
+
+struct blk_rq_stat {
+ u64 mean;
+ u64 min;
+ u64 max;
+ u32 nr_samples;
+ u64 batch;
+};
+
+struct blk_zone {
+ __u64 start;
+ __u64 len;
+ __u64 wp;
+ __u8 type;
+ __u8 cond;
+ __u8 non_seq;
+ __u8 reset;
+ __u8 resv[4];
+ __u64 capacity;
+ __u8 reserved[24];
+};
+
+typedef int (*report_zones_cb)(struct blk_zone *, unsigned int, void *);
+
+enum blk_unique_id {
+ BLK_UID_T10 = 1,
+ BLK_UID_EUI64 = 2,
+ BLK_UID_NAA = 3,
+};
+
+struct hd_geometry;
+
+struct pr_ops;
+
+struct block_device_operations {
+ void (*submit_bio)(struct bio *);
+ int (*poll_bio)(struct bio *, struct io_comp_batch *, unsigned int);
+ int (*open)(struct block_device *, fmode_t);
+ void (*release)(struct gendisk *, fmode_t);
+ int (*rw_page)(struct block_device *, sector_t, struct page *, enum req_op);
+ int (*ioctl)(struct block_device *, fmode_t, unsigned int, long unsigned int);
+ int (*compat_ioctl)(struct block_device *, fmode_t, unsigned int, long unsigned int);
+ unsigned int (*check_events)(struct gendisk *, unsigned int);
+ void (*unlock_native_capacity)(struct gendisk *);
+ int (*getgeo)(struct block_device *, struct hd_geometry *);
+ int (*set_read_only)(struct block_device *, bool);
+ void (*free_disk)(struct gendisk *);
+ void (*swap_slot_free_notify)(struct block_device *, long unsigned int);
+ int (*report_zones)(struct gendisk *, sector_t, unsigned int, report_zones_cb, void *);
+ char * (*devnode)(struct gendisk *, umode_t *);
+ int (*get_unique_id)(struct gendisk *, u8 *, enum blk_unique_id);
+ struct module *owner;
+ const struct pr_ops *pr_ops;
+ int (*alternative_gpt_sector)(struct gendisk *, sector_t *);
+};
+
+struct blk_independent_access_range {
+ struct kobject kobj;
+ sector_t sector;
+ sector_t nr_sectors;
+};
+
+struct blk_independent_access_ranges {
+ struct kobject kobj;
+ bool sysfs_registered;
+ unsigned int nr_ia_ranges;
+ struct blk_independent_access_range ia_range[0];
+};
+
+enum blk_eh_timer_return {
+ BLK_EH_DONE = 0,
+ BLK_EH_RESET_TIMER = 1,
+};
+
+struct blk_mq_hw_ctx;
+
+struct blk_mq_queue_data;
+
+struct blk_mq_ops {
+ blk_status_t (*queue_rq)(struct blk_mq_hw_ctx *, const struct blk_mq_queue_data *);
+ void (*commit_rqs)(struct blk_mq_hw_ctx *);
+ void (*queue_rqs)(struct request **);
+ int (*get_budget)(struct request_queue *);
+ void (*put_budget)(struct request_queue *, int);
+ void (*set_rq_budget_token)(struct request *, int);
+ int (*get_rq_budget_token)(struct request *);
+ enum blk_eh_timer_return (*timeout)(struct request *);
+ int (*poll)(struct blk_mq_hw_ctx *, struct io_comp_batch *);
+ void (*complete)(struct request *);
+ int (*init_hctx)(struct blk_mq_hw_ctx *, void *, unsigned int);
+ void (*exit_hctx)(struct blk_mq_hw_ctx *, unsigned int);
+ int (*init_request)(struct blk_mq_tag_set *, struct request *, unsigned int, unsigned int);
+ void (*exit_request)(struct blk_mq_tag_set *, struct request *, unsigned int);
+ void (*cleanup_rq)(struct request *);
+ bool (*busy)(struct request_queue *);
+ void (*map_queues)(struct blk_mq_tag_set *);
+ void (*show_rq)(struct seq_file *, struct request *);
+};
+
+enum pr_type {
+ PR_WRITE_EXCLUSIVE = 1,
+ PR_EXCLUSIVE_ACCESS = 2,
+ PR_WRITE_EXCLUSIVE_REG_ONLY = 3,
+ PR_EXCLUSIVE_ACCESS_REG_ONLY = 4,
+ PR_WRITE_EXCLUSIVE_ALL_REGS = 5,
+ PR_EXCLUSIVE_ACCESS_ALL_REGS = 6,
+};
+
+struct pr_ops {
+ int (*pr_register)(struct block_device *, u64, u64, u32);
+ int (*pr_reserve)(struct block_device *, u64, enum pr_type, u32);
+ int (*pr_release)(struct block_device *, u64, enum pr_type);
+ int (*pr_preempt)(struct block_device *, u64, u64, enum pr_type, bool);
+ int (*pr_clear)(struct block_device *, u64);
+};
+
+enum bh_state_bits {
+ BH_Uptodate = 0,
+ BH_Dirty = 1,
+ BH_Lock = 2,
+ BH_Req = 3,
+ BH_Mapped = 4,
+ BH_New = 5,
+ BH_Async_Read = 6,
+ BH_Async_Write = 7,
+ BH_Delay = 8,
+ BH_Boundary = 9,
+ BH_Write_EIO = 10,
+ BH_Unwritten = 11,
+ BH_Quiet = 12,
+ BH_Meta = 13,
+ BH_Prio = 14,
+ BH_Defer_Completion = 15,
+ BH_PrivateStart = 16,
+};
+
+typedef unsigned int tid_t;
+
+struct transaction_chp_stats_s {
+ long unsigned int cs_chp_time;
+ __u32 cs_forced_to_close;
+ __u32 cs_written;
+ __u32 cs_dropped;
+};
+
+struct journal_s;
+
+typedef struct journal_s journal_t;
+
+struct journal_head;
+
+struct transaction_s;
+
+typedef struct transaction_s transaction_t;
+
+struct transaction_s {
+ journal_t *t_journal;
+ tid_t t_tid;
+ enum {
+ T_RUNNING = 0,
+ T_LOCKED = 1,
+ T_SWITCH = 2,
+ T_FLUSH = 3,
+ T_COMMIT = 4,
+ T_COMMIT_DFLUSH = 5,
+ T_COMMIT_JFLUSH = 6,
+ T_COMMIT_CALLBACK = 7,
+ T_FINISHED = 8,
+ } t_state;
+ long unsigned int t_log_start;
+ int t_nr_buffers;
+ struct journal_head *t_reserved_list;
+ struct journal_head *t_buffers;
+ struct journal_head *t_forget;
+ struct journal_head *t_checkpoint_list;
+ struct journal_head *t_checkpoint_io_list;
+ struct journal_head *t_shadow_list;
+ struct list_head t_inode_list;
+ spinlock_t t_handle_lock;
+ long unsigned int t_max_wait;
+ long unsigned int t_start;
+ long unsigned int t_requested;
+ struct transaction_chp_stats_s t_chp_stats;
+ atomic_t t_updates;
+ atomic_t t_outstanding_credits;
+ atomic_t t_outstanding_revokes;
+ atomic_t t_handle_count;
+ transaction_t *t_cpnext;
+ transaction_t *t_cpprev;
+ long unsigned int t_expires;
+ ktime_t t_start_time;
+ unsigned int t_synchronous_commit: 1;
+ int t_need_data_flush;
+ struct list_head t_private_list;
+};
+
+struct jbd2_buffer_trigger_type;
+
+struct journal_head {
+ struct buffer_head *b_bh;
+ spinlock_t b_state_lock;
+ int b_jcount;
+ unsigned int b_jlist;
+ unsigned int b_modified;
+ char *b_frozen_data;
+ char *b_committed_data;
+ transaction_t *b_transaction;
+ transaction_t *b_next_transaction;
+ struct journal_head *b_tnext;
+ struct journal_head *b_tprev;
+ transaction_t *b_cp_transaction;
+ struct journal_head *b_cpnext;
+ struct journal_head *b_cpprev;
+ struct jbd2_buffer_trigger_type *b_triggers;
+ struct jbd2_buffer_trigger_type *b_frozen_triggers;
+};
+
+struct jbd2_buffer_trigger_type {
+ void (*t_frozen)(struct jbd2_buffer_trigger_type *, struct buffer_head *, void *, size_t);
+ void (*t_abort)(struct jbd2_buffer_trigger_type *, struct buffer_head *);
+};
+
+struct crypto_alg;
+
+struct crypto_tfm {
+ u32 crt_flags;
+ int node;
+ void (*exit)(struct crypto_tfm *);
+ struct crypto_alg *__crt_alg;
+ void *__crt_ctx[0];
+};
+
+struct cipher_alg {
+ unsigned int cia_min_keysize;
+ unsigned int cia_max_keysize;
+ int (*cia_setkey)(struct crypto_tfm *, const u8 *, unsigned int);
+ void (*cia_encrypt)(struct crypto_tfm *, u8 *, const u8 *);
+ void (*cia_decrypt)(struct crypto_tfm *, u8 *, const u8 *);
+};
+
+struct compress_alg {
+ int (*coa_compress)(struct crypto_tfm *, const u8 *, unsigned int, u8 *, unsigned int *);
+ int (*coa_decompress)(struct crypto_tfm *, const u8 *, unsigned int, u8 *, unsigned int *);
+};
+
+struct crypto_type;
+
+struct crypto_alg {
+ struct list_head cra_list;
+ struct list_head cra_users;
+ u32 cra_flags;
+ unsigned int cra_blocksize;
+ unsigned int cra_ctxsize;
+ unsigned int cra_alignmask;
+ int cra_priority;
+ refcount_t cra_refcnt;
+ char cra_name[128];
+ char cra_driver_name[128];
+ const struct crypto_type *cra_type;
+ union {
+ struct cipher_alg cipher;
+ struct compress_alg compress;
+ } cra_u;
+ int (*cra_init)(struct crypto_tfm *);
+ void (*cra_exit)(struct crypto_tfm *);
+ void (*cra_destroy)(struct crypto_alg *);
+ struct module *cra_module;
+};
+
+struct crypto_instance;
+
+struct crypto_type {
+ unsigned int (*ctxsize)(struct crypto_alg *, u32, u32);
+ unsigned int (*extsize)(struct crypto_alg *);
+ int (*init)(struct crypto_tfm *, u32, u32);
+ int (*init_tfm)(struct crypto_tfm *);
+ void (*show)(struct seq_file *, struct crypto_alg *);
+ int (*report)(struct sk_buff *, struct crypto_alg *);
+ void (*free)(struct crypto_instance *);
+ unsigned int type;
+ unsigned int maskclear;
+ unsigned int maskset;
+ unsigned int tfmsize;
+};
+
+struct crypto_shash;
+
+struct shash_desc {
+ struct crypto_shash *tfm;
+ void *__ctx[0];
+};
+
+struct crypto_shash {
+ unsigned int descsize;
+ struct crypto_tfm base;
+};
+
+struct jbd2_journal_handle;
+
+typedef struct jbd2_journal_handle handle_t;
+
+struct jbd2_journal_handle {
+ union {
+ transaction_t *h_transaction;
+ journal_t *h_journal;
+ };
+ handle_t *h_rsv_handle;
+ int h_total_credits;
+ int h_revoke_credits;
+ int h_revoke_credits_requested;
+ int h_ref;
+ int h_err;
+ unsigned int h_sync: 1;
+ unsigned int h_jdata: 1;
+ unsigned int h_reserved: 1;
+ unsigned int h_aborted: 1;
+ unsigned int h_type: 8;
+ unsigned int h_line_no: 16;
+ long unsigned int h_start_jiffies;
+ unsigned int h_requested_credits;
+ unsigned int saved_alloc_context;
+};
+
+struct transaction_run_stats_s {
+ long unsigned int rs_wait;
+ long unsigned int rs_request_delay;
+ long unsigned int rs_running;
+ long unsigned int rs_locked;
+ long unsigned int rs_flushing;
+ long unsigned int rs_logging;
+ __u32 rs_handle_count;
+ __u32 rs_blocks;
+ __u32 rs_blocks_logged;
+};
+
+struct transaction_stats_s {
+ long unsigned int ts_tid;
+ long unsigned int ts_requested;
+ struct transaction_run_stats_s run;
+};
+
+enum passtype {
+ PASS_SCAN = 0,
+ PASS_REVOKE = 1,
+ PASS_REPLAY = 2,
+};
+
+struct journal_superblock_s;
+
+typedef struct journal_superblock_s journal_superblock_t;
+
+struct jbd2_revoke_table_s;
+
+struct jbd2_inode;
+
+struct journal_s {
+ long unsigned int j_flags;
+ long unsigned int j_atomic_flags;
+ int j_errno;
+ struct mutex j_abort_mutex;
+ struct buffer_head *j_sb_buffer;
+ journal_superblock_t *j_superblock;
+ int j_format_version;
+ rwlock_t j_state_lock;
+ int j_barrier_count;
+ struct mutex j_barrier;
+ transaction_t *j_running_transaction;
+ transaction_t *j_committing_transaction;
+ transaction_t *j_checkpoint_transactions;
+ wait_queue_head_t j_wait_transaction_locked;
+ wait_queue_head_t j_wait_done_commit;
+ wait_queue_head_t j_wait_commit;
+ wait_queue_head_t j_wait_updates;
+ wait_queue_head_t j_wait_reserved;
+ wait_queue_head_t j_fc_wait;
+ struct mutex j_checkpoint_mutex;
+ struct buffer_head *j_chkpt_bhs[64];
+ struct shrinker j_shrinker;
+ struct percpu_counter j_checkpoint_jh_count;
+ transaction_t *j_shrink_transaction;
+ long unsigned int j_head;
+ long unsigned int j_tail;
+ long unsigned int j_free;
+ long unsigned int j_first;
+ long unsigned int j_last;
+ long unsigned int j_fc_first;
+ long unsigned int j_fc_off;
+ long unsigned int j_fc_last;
+ struct block_device *j_dev;
+ int j_blocksize;
+ long long unsigned int j_blk_offset;
+ char j_devname[56];
+ struct block_device *j_fs_dev;
+ unsigned int j_total_len;
+ atomic_t j_reserved_credits;
+ spinlock_t j_list_lock;
+ struct inode *j_inode;
+ tid_t j_tail_sequence;
+ tid_t j_transaction_sequence;
+ tid_t j_commit_sequence;
+ tid_t j_commit_request;
+ __u8 j_uuid[16];
+ struct task_struct *j_task;
+ int j_max_transaction_buffers;
+ int j_revoke_records_per_block;
+ long unsigned int j_commit_interval;
+ struct timer_list j_commit_timer;
+ spinlock_t j_revoke_lock;
+ struct jbd2_revoke_table_s *j_revoke;
+ struct jbd2_revoke_table_s *j_revoke_table[2];
+ struct buffer_head **j_wbuf;
+ struct buffer_head **j_fc_wbuf;
+ int j_wbufsize;
+ int j_fc_wbufsize;
+ pid_t j_last_sync_writer;
+ u64 j_average_commit_time;
+ u32 j_min_batch_time;
+ u32 j_max_batch_time;
+ void (*j_commit_callback)(journal_t *, transaction_t *);
+ int (*j_submit_inode_data_buffers)(struct jbd2_inode *);
+ int (*j_finish_inode_data_buffers)(struct jbd2_inode *);
+ spinlock_t j_history_lock;
+ struct proc_dir_entry *j_proc_entry;
+ struct transaction_stats_s j_stats;
+ unsigned int j_failed_commit;
+ void *j_private;
+ struct crypto_shash *j_chksum_driver;
+ __u32 j_csum_seed;
+ struct lockdep_map j_trans_commit_map;
+ void (*j_fc_cleanup_callback)(struct journal_s *, int, tid_t);
+ int (*j_fc_replay_callback)(struct journal_s *, struct buffer_head *, enum passtype, int, tid_t);
+};
+
+struct journal_header_s {
+ __be32 h_magic;
+ __be32 h_blocktype;
+ __be32 h_sequence;
+};
+
+typedef struct journal_header_s journal_header_t;
+
+struct journal_superblock_s {
+ journal_header_t s_header;
+ __be32 s_blocksize;
+ __be32 s_maxlen;
+ __be32 s_first;
+ __be32 s_sequence;
+ __be32 s_start;
+ __be32 s_errno;
+ __be32 s_feature_compat;
+ __be32 s_feature_incompat;
+ __be32 s_feature_ro_compat;
+ __u8 s_uuid[16];
+ __be32 s_nr_users;
+ __be32 s_dynsuper;
+ __be32 s_max_transaction;
+ __be32 s_max_trans_data;
+ __u8 s_checksum_type;
+ __u8 s_padding2[3];
+ __be32 s_num_fc_blks;
+ __u32 s_padding[41];
+ __be32 s_checksum;
+ __u8 s_users[768];
+};
+
+struct jbd2_inode {
+ transaction_t *i_transaction;
+ transaction_t *i_next_transaction;
+ struct list_head i_list;
+ struct inode *i_vfs_inode;
+ long unsigned int i_flags;
+ loff_t i_dirty_start;
+ loff_t i_dirty_end;
+};
+
+struct bgl_lock {
+ spinlock_t lock;
+};
+
+struct blockgroup_lock {
+ struct bgl_lock locks[128];
+};
+
+struct fiemap_extent {
+ __u64 fe_logical;
+ __u64 fe_physical;
+ __u64 fe_length;
+ __u64 fe_reserved64[2];
+ __u32 fe_flags;
+ __u32 fe_reserved[3];
+};
+
+struct fscrypt_dummy_policy {};
+
+typedef int ext4_grpblk_t;
+
+typedef long long unsigned int ext4_fsblk_t;
+
+typedef __u32 ext4_lblk_t;
+
+typedef unsigned int ext4_group_t;
+
+struct ext4_map_blocks {
+ ext4_fsblk_t m_pblk;
+ ext4_lblk_t m_lblk;
+ unsigned int m_len;
+ unsigned int m_flags;
+};
+
+struct ext4_system_blocks {
+ struct rb_root root;
+ struct callback_head rcu;
+};
+
+struct flex_groups {
+ atomic64_t free_clusters;
+ atomic_t free_inodes;
+ atomic_t used_dirs;
+};
+
+enum {
+ EXT4_INODE_SECRM = 0,
+ EXT4_INODE_UNRM = 1,
+ EXT4_INODE_COMPR = 2,
+ EXT4_INODE_SYNC = 3,
+ EXT4_INODE_IMMUTABLE = 4,
+ EXT4_INODE_APPEND = 5,
+ EXT4_INODE_NODUMP = 6,
+ EXT4_INODE_NOATIME = 7,
+ EXT4_INODE_DIRTY = 8,
+ EXT4_INODE_COMPRBLK = 9,
+ EXT4_INODE_NOCOMPR = 10,
+ EXT4_INODE_ENCRYPT = 11,
+ EXT4_INODE_INDEX = 12,
+ EXT4_INODE_IMAGIC = 13,
+ EXT4_INODE_JOURNAL_DATA = 14,
+ EXT4_INODE_NOTAIL = 15,
+ EXT4_INODE_DIRSYNC = 16,
+ EXT4_INODE_TOPDIR = 17,
+ EXT4_INODE_HUGE_FILE = 18,
+ EXT4_INODE_EXTENTS = 19,
+ EXT4_INODE_VERITY = 20,
+ EXT4_INODE_EA_INODE = 21,
+ EXT4_INODE_DAX = 25,
+ EXT4_INODE_INLINE_DATA = 28,
+ EXT4_INODE_PROJINHERIT = 29,
+ EXT4_INODE_CASEFOLD = 30,
+ EXT4_INODE_RESERVED = 31,
+};
+
+struct ext4_inode {
+ __le16 i_mode;
+ __le16 i_uid;
+ __le32 i_size_lo;
+ __le32 i_atime;
+ __le32 i_ctime;
+ __le32 i_mtime;
+ __le32 i_dtime;
+ __le16 i_gid;
+ __le16 i_links_count;
+ __le32 i_blocks_lo;
+ __le32 i_flags;
+ union {
+ struct {
+ __le32 l_i_version;
+ } linux1;
+ struct {
+ __u32 h_i_translator;
+ } hurd1;
+ struct {
+ __u32 m_i_reserved1;
+ } masix1;
+ } osd1;
+ __le32 i_block[15];
+ __le32 i_generation;
+ __le32 i_file_acl_lo;
+ __le32 i_size_high;
+ __le32 i_obso_faddr;
+ union {
+ struct {
+ __le16 l_i_blocks_high;
+ __le16 l_i_file_acl_high;
+ __le16 l_i_uid_high;
+ __le16 l_i_gid_high;
+ __le16 l_i_checksum_lo;
+ __le16 l_i_reserved;
+ } linux2;
+ struct {
+ __le16 h_i_reserved1;
+ __u16 h_i_mode_high;
+ __u16 h_i_uid_high;
+ __u16 h_i_gid_high;
+ __u32 h_i_author;
+ } hurd2;
+ struct {
+ __le16 h_i_reserved1;
+ __le16 m_i_file_acl_high;
+ __u32 m_i_reserved2[2];
+ } masix2;
+ } osd2;
+ __le16 i_extra_isize;
+ __le16 i_checksum_hi;
+ __le32 i_ctime_extra;
+ __le32 i_mtime_extra;
+ __le32 i_atime_extra;
+ __le32 i_crtime;
+ __le32 i_crtime_extra;
+ __le32 i_version_hi;
+ __le32 i_projid;
+};
+
+struct extent_status {
+ struct rb_node rb_node;
+ ext4_lblk_t es_lblk;
+ ext4_lblk_t es_len;
+ ext4_fsblk_t es_pblk;
+};
+
+struct ext4_es_tree {
+ struct rb_root root;
+ struct extent_status *cache_es;
+};
+
+struct ext4_es_stats {
+ long unsigned int es_stats_shrunk;
+ struct percpu_counter es_stats_cache_hits;
+ struct percpu_counter es_stats_cache_misses;
+ u64 es_stats_scan_time;
+ u64 es_stats_max_scan_time;
+ struct percpu_counter es_stats_all_cnt;
+ struct percpu_counter es_stats_shk_cnt;
+};
+
+struct ext4_pending_tree {
+ struct rb_root root;
+};
+
+struct ext4_fc_tl {
+ __le16 fc_tag;
+ __le16 fc_len;
+};
+
+struct ext4_fc_head {
+ __le32 fc_features;
+ __le32 fc_tid;
+};
+
+struct ext4_fc_add_range {
+ __le32 fc_ino;
+ __u8 fc_ex[12];
+};
+
+struct ext4_fc_del_range {
+ __le32 fc_ino;
+ __le32 fc_lblk;
+ __le32 fc_len;
+};
+
+struct ext4_fc_dentry_info {
+ __le32 fc_parent_ino;
+ __le32 fc_ino;
+ __u8 fc_dname[0];
+};
+
+struct ext4_fc_inode {
+ __le32 fc_ino;
+ __u8 fc_raw_inode[0];
+};
+
+struct ext4_fc_tail {
+ __le32 fc_tid;
+ __le32 fc_crc;
+};
+
+enum {
+ EXT4_FC_STATUS_OK = 0,
+ EXT4_FC_STATUS_INELIGIBLE = 1,
+ EXT4_FC_STATUS_SKIPPED = 2,
+ EXT4_FC_STATUS_FAILED = 3,
+};
+
+enum {
+ EXT4_FC_REASON_XATTR = 0,
+ EXT4_FC_REASON_CROSS_RENAME = 1,
+ EXT4_FC_REASON_JOURNAL_FLAG_CHANGE = 2,
+ EXT4_FC_REASON_NOMEM = 3,
+ EXT4_FC_REASON_SWAP_BOOT = 4,
+ EXT4_FC_REASON_RESIZE = 5,
+ EXT4_FC_REASON_RENAME_DIR = 6,
+ EXT4_FC_REASON_FALLOC_RANGE = 7,
+ EXT4_FC_REASON_INODE_JOURNAL_DATA = 8,
+ EXT4_FC_REASON_MAX = 9,
+};
+
+struct ext4_fc_dentry_update {
+ int fcd_op;
+ int fcd_parent;
+ int fcd_ino;
+ struct qstr fcd_name;
+ unsigned char fcd_iname[32];
+ struct list_head fcd_list;
+ struct list_head fcd_dilist;
+};
+
+struct ext4_fc_stats {
+ unsigned int fc_ineligible_reason_count[9];
+ long unsigned int fc_num_commits;
+ long unsigned int fc_ineligible_commits;
+ long unsigned int fc_failed_commits;
+ long unsigned int fc_skipped_commits;
+ long unsigned int fc_numblks;
+ u64 s_fc_avg_commit_time;
+};
+
+struct ext4_fc_alloc_region {
+ ext4_lblk_t lblk;
+ ext4_fsblk_t pblk;
+ int ino;
+ int len;
+};
+
+struct ext4_fc_replay_state {
+ int fc_replay_num_tags;
+ int fc_replay_expected_off;
+ int fc_current_pass;
+ int fc_cur_tag;
+ int fc_crc;
+ struct ext4_fc_alloc_region *fc_regions;
+ int fc_regions_size;
+ int fc_regions_used;
+ int fc_regions_valid;
+ int *fc_modified_inodes;
+ int fc_modified_inodes_used;
+ int fc_modified_inodes_size;
+};
+
+struct ext4_inode_info {
+ __le32 i_data[15];
+ __u32 i_dtime;
+ ext4_fsblk_t i_file_acl;
+ ext4_group_t i_block_group;
+ ext4_lblk_t i_dir_start_lookup;
+ long unsigned int i_flags;
+ struct rw_semaphore xattr_sem;
+ union {
+ struct list_head i_orphan;
+ unsigned int i_orphan_idx;
+ };
+ struct list_head i_fc_dilist;
+ struct list_head i_fc_list;
+ ext4_lblk_t i_fc_lblk_start;
+ ext4_lblk_t i_fc_lblk_len;
+ atomic_t i_fc_updates;
+ wait_queue_head_t i_fc_wait;
+ struct mutex i_fc_lock;
+ loff_t i_disksize;
+ struct rw_semaphore i_data_sem;
+ struct inode vfs_inode;
+ struct jbd2_inode *jinode;
+ spinlock_t i_raw_lock;
+ struct timespec64 i_crtime;
+ atomic_t i_prealloc_active;
+ struct list_head i_prealloc_list;
+ spinlock_t i_prealloc_lock;
+ struct ext4_es_tree i_es_tree;
+ rwlock_t i_es_lock;
+ struct list_head i_es_list;
+ unsigned int i_es_all_nr;
+ unsigned int i_es_shk_nr;
+ ext4_lblk_t i_es_shrink_lblk;
+ ext4_group_t i_last_alloc_group;
+ unsigned int i_reserved_data_blocks;
+ struct ext4_pending_tree i_pending_tree;
+ __u16 i_extra_isize;
+ u16 i_inline_off;
+ u16 i_inline_size;
+ spinlock_t i_completed_io_lock;
+ struct list_head i_rsv_conversion_list;
+ struct work_struct i_rsv_conversion_work;
+ atomic_t i_unwritten;
+ spinlock_t i_block_reservation_lock;
+ tid_t i_sync_tid;
+ tid_t i_datasync_tid;
+ __u32 i_csum_seed;
+ kprojid_t i_projid;
+};
+
+struct ext4_super_block {
+ __le32 s_inodes_count;
+ __le32 s_blocks_count_lo;
+ __le32 s_r_blocks_count_lo;
+ __le32 s_free_blocks_count_lo;
+ __le32 s_free_inodes_count;
+ __le32 s_first_data_block;
+ __le32 s_log_block_size;
+ __le32 s_log_cluster_size;
+ __le32 s_blocks_per_group;
+ __le32 s_clusters_per_group;
+ __le32 s_inodes_per_group;
+ __le32 s_mtime;
+ __le32 s_wtime;
+ __le16 s_mnt_count;
+ __le16 s_max_mnt_count;
+ __le16 s_magic;
+ __le16 s_state;
+ __le16 s_errors;
+ __le16 s_minor_rev_level;
+ __le32 s_lastcheck;
+ __le32 s_checkinterval;
+ __le32 s_creator_os;
+ __le32 s_rev_level;
+ __le16 s_def_resuid;
+ __le16 s_def_resgid;
+ __le32 s_first_ino;
+ __le16 s_inode_size;
+ __le16 s_block_group_nr;
+ __le32 s_feature_compat;
+ __le32 s_feature_incompat;
+ __le32 s_feature_ro_compat;
+ __u8 s_uuid[16];
+ char s_volume_name[16];
+ char s_last_mounted[64];
+ __le32 s_algorithm_usage_bitmap;
+ __u8 s_prealloc_blocks;
+ __u8 s_prealloc_dir_blocks;
+ __le16 s_reserved_gdt_blocks;
+ __u8 s_journal_uuid[16];
+ __le32 s_journal_inum;
+ __le32 s_journal_dev;
+ __le32 s_last_orphan;
+ __le32 s_hash_seed[4];
+ __u8 s_def_hash_version;
+ __u8 s_jnl_backup_type;
+ __le16 s_desc_size;
+ __le32 s_default_mount_opts;
+ __le32 s_first_meta_bg;
+ __le32 s_mkfs_time;
+ __le32 s_jnl_blocks[17];
+ __le32 s_blocks_count_hi;
+ __le32 s_r_blocks_count_hi;
+ __le32 s_free_blocks_count_hi;
+ __le16 s_min_extra_isize;
+ __le16 s_want_extra_isize;
+ __le32 s_flags;
+ __le16 s_raid_stride;
+ __le16 s_mmp_update_interval;
+ __le64 s_mmp_block;
+ __le32 s_raid_stripe_width;
+ __u8 s_log_groups_per_flex;
+ __u8 s_checksum_type;
+ __u8 s_encryption_level;
+ __u8 s_reserved_pad;
+ __le64 s_kbytes_written;
+ __le32 s_snapshot_inum;
+ __le32 s_snapshot_id;
+ __le64 s_snapshot_r_blocks_count;
+ __le32 s_snapshot_list;
+ __le32 s_error_count;
+ __le32 s_first_error_time;
+ __le32 s_first_error_ino;
+ __le64 s_first_error_block;
+ __u8 s_first_error_func[32];
+ __le32 s_first_error_line;
+ __le32 s_last_error_time;
+ __le32 s_last_error_ino;
+ __le32 s_last_error_line;
+ __le64 s_last_error_block;
+ __u8 s_last_error_func[32];
+ __u8 s_mount_opts[64];
+ __le32 s_usr_quota_inum;
+ __le32 s_grp_quota_inum;
+ __le32 s_overhead_clusters;
+ __le32 s_backup_bgs[2];
+ __u8 s_encrypt_algos[4];
+ __u8 s_encrypt_pw_salt[16];
+ __le32 s_lpf_ino;
+ __le32 s_prj_quota_inum;
+ __le32 s_checksum_seed;
+ __u8 s_wtime_hi;
+ __u8 s_mtime_hi;
+ __u8 s_mkfs_time_hi;
+ __u8 s_lastcheck_hi;
+ __u8 s_first_error_time_hi;
+ __u8 s_last_error_time_hi;
+ __u8 s_first_error_errcode;
+ __u8 s_last_error_errcode;
+ __le16 s_encoding;
+ __le16 s_encoding_flags;
+ __le32 s_orphan_file_inum;
+ __le32 s_reserved[94];
+ __le32 s_checksum;
+};
+
+struct ext4_journal_trigger {
+ struct jbd2_buffer_trigger_type tr_triggers;
+ struct super_block *sb;
+};
+
+struct ext4_orphan_block {
+ atomic_t ob_free_entries;
+ struct buffer_head *ob_bh;
+};
+
+struct ext4_orphan_info {
+ int of_blocks;
+ __u32 of_csum_seed;
+ struct ext4_orphan_block *of_binfo;
+};
+
+struct mb_cache;
+
+struct dax_device;
+
+struct ext4_group_info;
+
+struct ext4_locality_group;
+
+struct ext4_li_request;
+
+struct ext4_sb_info {
+ long unsigned int s_desc_size;
+ long unsigned int s_inodes_per_block;
+ long unsigned int s_blocks_per_group;
+ long unsigned int s_clusters_per_group;
+ long unsigned int s_inodes_per_group;
+ long unsigned int s_itb_per_group;
+ long unsigned int s_gdb_count;
+ long unsigned int s_desc_per_block;
+ ext4_group_t s_groups_count;
+ ext4_group_t s_blockfile_groups;
+ long unsigned int s_overhead;
+ unsigned int s_cluster_ratio;
+ unsigned int s_cluster_bits;
+ loff_t s_bitmap_maxbytes;
+ struct buffer_head *s_sbh;
+ struct ext4_super_block *s_es;
+ struct buffer_head **s_group_desc;
+ unsigned int s_mount_opt;
+ unsigned int s_mount_opt2;
+ long unsigned int s_mount_flags;
+ unsigned int s_def_mount_opt;
+ ext4_fsblk_t s_sb_block;
+ atomic64_t s_resv_clusters;
+ kuid_t s_resuid;
+ kgid_t s_resgid;
+ short unsigned int s_mount_state;
+ short unsigned int s_pad;
+ int s_addr_per_block_bits;
+ int s_desc_per_block_bits;
+ int s_inode_size;
+ int s_first_ino;
+ unsigned int s_inode_readahead_blks;
+ unsigned int s_inode_goal;
+ u32 s_hash_seed[4];
+ int s_def_hash_version;
+ int s_hash_unsigned;
+ struct percpu_counter s_freeclusters_counter;
+ struct percpu_counter s_freeinodes_counter;
+ struct percpu_counter s_dirs_counter;
+ struct percpu_counter s_dirtyclusters_counter;
+ struct percpu_counter s_sra_exceeded_retry_limit;
+ struct blockgroup_lock *s_blockgroup_lock;
+ struct proc_dir_entry *s_proc;
+ struct kobject s_kobj;
+ struct completion s_kobj_unregister;
+ struct super_block *s_sb;
+ struct buffer_head *s_mmp_bh;
+ struct journal_s *s_journal;
+ long unsigned int s_ext4_flags;
+ struct mutex s_orphan_lock;
+ struct list_head s_orphan;
+ struct ext4_orphan_info s_orphan_info;
+ long unsigned int s_commit_interval;
+ u32 s_max_batch_time;
+ u32 s_min_batch_time;
+ struct block_device *s_journal_bdev;
+ unsigned int s_want_extra_isize;
+ struct ext4_system_blocks *s_system_blks;
+ struct ext4_group_info ***s_group_info;
+ struct inode *s_buddy_cache;
+ spinlock_t s_md_lock;
+ short unsigned int *s_mb_offsets;
+ unsigned int *s_mb_maxs;
+ unsigned int s_group_info_size;
+ unsigned int s_mb_free_pending;
+ struct list_head s_freed_data_list;
+ struct list_head s_discard_list;
+ struct work_struct s_discard_work;
+ atomic_t s_retry_alloc_pending;
+ struct list_head *s_mb_avg_fragment_size;
+ rwlock_t *s_mb_avg_fragment_size_locks;
+ struct list_head *s_mb_largest_free_orders;
+ rwlock_t *s_mb_largest_free_orders_locks;
+ long unsigned int s_stripe;
+ unsigned int s_mb_max_linear_groups;
+ unsigned int s_mb_stream_request;
+ unsigned int s_mb_max_to_scan;
+ unsigned int s_mb_min_to_scan;
+ unsigned int s_mb_stats;
+ unsigned int s_mb_order2_reqs;
+ unsigned int s_mb_group_prealloc;
+ unsigned int s_mb_max_inode_prealloc;
+ unsigned int s_max_dir_size_kb;
+ long unsigned int s_mb_last_group;
+ long unsigned int s_mb_last_start;
+ unsigned int s_mb_prefetch;
+ unsigned int s_mb_prefetch_limit;
+ atomic_t s_bal_reqs;
+ atomic_t s_bal_success;
+ atomic_t s_bal_allocated;
+ atomic_t s_bal_ex_scanned;
+ atomic_t s_bal_groups_scanned;
+ atomic_t s_bal_goals;
+ atomic_t s_bal_breaks;
+ atomic_t s_bal_2orders;
+ atomic_t s_bal_cr0_bad_suggestions;
+ atomic_t s_bal_cr1_bad_suggestions;
+ atomic64_t s_bal_cX_groups_considered[4];
+ atomic64_t s_bal_cX_hits[4];
+ atomic64_t s_bal_cX_failed[4];
+ atomic_t s_mb_buddies_generated;
+ atomic64_t s_mb_generation_time;
+ atomic_t s_mb_lost_chunks;
+ atomic_t s_mb_preallocated;
+ atomic_t s_mb_discarded;
+ atomic_t s_lock_busy;
+ struct ext4_locality_group *s_locality_groups;
+ long unsigned int s_sectors_written_start;
+ u64 s_kbytes_written;
+ unsigned int s_extent_max_zeroout_kb;
+ unsigned int s_log_groups_per_flex;
+ struct flex_groups **s_flex_groups;
+ ext4_group_t s_flex_groups_allocated;
+ struct workqueue_struct *rsv_conversion_wq;
+ struct timer_list s_err_report;
+ struct ext4_li_request *s_li_request;
+ unsigned int s_li_wait_mult;
+ struct task_struct *s_mmp_tsk;
+ long unsigned int s_last_trim_minblks;
+ struct crypto_shash *s_chksum_driver;
+ __u32 s_csum_seed;
+ struct shrinker s_es_shrinker;
+ struct list_head s_es_list;
+ long int s_es_nr_inode;
+ struct ext4_es_stats s_es_stats;
+ struct mb_cache *s_ea_block_cache;
+ struct mb_cache *s_ea_inode_cache;
+ spinlock_t s_es_lock;
+ struct ext4_journal_trigger s_journal_triggers[1];
+ struct ratelimit_state s_err_ratelimit_state;
+ struct ratelimit_state s_warning_ratelimit_state;
+ struct ratelimit_state s_msg_ratelimit_state;
+ atomic_t s_warning_count;
+ atomic_t s_msg_count;
+ struct fscrypt_dummy_policy s_dummy_enc_policy;
+ struct percpu_rw_semaphore s_writepages_rwsem;
+ struct dax_device *s_daxdev;
+ u64 s_dax_part_off;
+ errseq_t s_bdev_wb_err;
+ spinlock_t s_bdev_wb_lock;
+ spinlock_t s_error_lock;
+ int s_add_error_count;
+ int s_first_error_code;
+ __u32 s_first_error_line;
+ __u32 s_first_error_ino;
+ __u64 s_first_error_block;
+ const char *s_first_error_func;
+ time64_t s_first_error_time;
+ int s_last_error_code;
+ __u32 s_last_error_line;
+ __u32 s_last_error_ino;
+ __u64 s_last_error_block;
+ const char *s_last_error_func;
+ time64_t s_last_error_time;
+ struct work_struct s_error_work;
+ atomic_t s_fc_subtid;
+ struct list_head s_fc_q[2];
+ struct list_head s_fc_dentry_q[2];
+ unsigned int s_fc_bytes;
+ spinlock_t s_fc_lock;
+ struct buffer_head *s_fc_bh;
+ struct ext4_fc_stats s_fc_stats;
+ tid_t s_fc_ineligible_tid;
+ struct ext4_fc_replay_state s_fc_replay_state;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct ext4_group_info {
+ long unsigned int bb_state;
+ struct rb_root bb_free_root;
+ ext4_grpblk_t bb_first_free;
+ ext4_grpblk_t bb_free;
+ ext4_grpblk_t bb_fragments;
+ int bb_avg_fragment_size_order;
+ ext4_grpblk_t bb_largest_free_order;
+ ext4_group_t bb_group;
+ struct list_head bb_prealloc_list;
+ struct rw_semaphore alloc_sem;
+ struct list_head bb_avg_fragment_size_node;
+ struct list_head bb_largest_free_order_node;
+ ext4_grpblk_t bb_counters[0];
+};
+
+struct ext4_locality_group {
+ struct mutex lg_mutex;
+ struct list_head lg_prealloc_list[10];
+ spinlock_t lg_prealloc_lock;
+};
+
+enum ext4_li_mode {
+ EXT4_LI_MODE_PREFETCH_BBITMAP = 0,
+ EXT4_LI_MODE_ITABLE = 1,
+};
+
+struct ext4_li_request {
+ struct super_block *lr_super;
+ enum ext4_li_mode lr_mode;
+ ext4_group_t lr_first_not_zeroed;
+ ext4_group_t lr_next_group;
+ struct list_head lr_request;
+ long unsigned int lr_next_sched;
+ long unsigned int lr_timeout;
+};
+
+enum {
+ EXT4_MF_MNTDIR_SAMPLED = 0,
+ EXT4_MF_FS_ABORTED = 1,
+ EXT4_MF_FC_INELIGIBLE = 2,
+};
+
+enum {
+ EXT4_STATE_JDATA = 0,
+ EXT4_STATE_NEW = 1,
+ EXT4_STATE_XATTR = 2,
+ EXT4_STATE_NO_EXPAND = 3,
+ EXT4_STATE_DA_ALLOC_CLOSE = 4,
+ EXT4_STATE_EXT_MIGRATE = 5,
+ EXT4_STATE_NEWENTRY = 6,
+ EXT4_STATE_MAY_INLINE_DATA = 7,
+ EXT4_STATE_EXT_PRECACHED = 8,
+ EXT4_STATE_LUSTRE_EA_INODE = 9,
+ EXT4_STATE_VERITY_IN_PROGRESS = 10,
+ EXT4_STATE_FC_COMMITTING = 11,
+ EXT4_STATE_ORPHAN_FILE = 12,
+};
+
+struct ext4_iloc {
+ struct buffer_head *bh;
+ long unsigned int offset;
+ ext4_group_t block_group;
+};
+
+typedef enum {
+ EXT4_IGET_NORMAL = 0,
+ EXT4_IGET_SPECIAL = 1,
+ EXT4_IGET_HANDLE = 2,
+} ext4_iget_flags;
+
+struct ext4_extent {
+ __le32 ee_block;
+ __le16 ee_len;
+ __le16 ee_start_hi;
+ __le32 ee_start_lo;
+};
+
+struct ext4_extent_idx {
+ __le32 ei_block;
+ __le32 ei_leaf_lo;
+ __le16 ei_leaf_hi;
+ __u16 ei_unused;
+};
+
+struct ext4_extent_header {
+ __le16 eh_magic;
+ __le16 eh_entries;
+ __le16 eh_max;
+ __le16 eh_depth;
+ __le32 eh_generation;
+};
+
+struct ext4_ext_path {
+ ext4_fsblk_t p_block;
+ __u16 p_depth;
+ __u16 p_maxdepth;
+ struct ext4_extent *p_ext;
+ struct ext4_extent_idx *p_idx;
+ struct ext4_extent_header *p_hdr;
+ struct buffer_head *p_bh;
+};
+
+struct __track_dentry_update_args {
+ struct dentry *dentry;
+ int op;
+};
+
+struct __track_range_args {
+ ext4_lblk_t start;
+ ext4_lblk_t end;
+};
+
+struct dentry_info_args {
+ int parent_ino;
+ int dname_len;
+ int ino;
+ int inode_len;
+ char *dname;
+};
+
+typedef phys_addr_t resource_size_t;
+
+struct pci_device_id {
+ __u32 vendor;
+ __u32 device;
+ __u32 subvendor;
+ __u32 subdevice;
+ __u32 class;
+ __u32 class_mask;
+ kernel_ulong_t driver_data;
+ __u32 override_only;
+};
+
+struct resource {
+ resource_size_t start;
+ resource_size_t end;
+ const char *name;
+ long unsigned int flags;
+ long unsigned int desc;
+ struct resource *parent;
+ struct resource *sibling;
+ struct resource *child;
+};
+
+struct pci_bus;
+
+struct hotplug_slot;
+
+struct pci_slot {
+ struct pci_bus *bus;
+ struct list_head list;
+ struct hotplug_slot *hotplug;
+ unsigned char number;
+ struct kobject kobj;
+};
+
+struct pci_dev;
+
+struct pci_ops;
+
+struct pci_bus {
+ struct list_head node;
+ struct pci_bus *parent;
+ struct list_head children;
+ struct list_head devices;
+ struct pci_dev *self;
+ struct list_head slots;
+ struct resource *resource[4];
+ struct list_head resources;
+ struct resource busn_res;
+ struct pci_ops *ops;
+ void *sysdata;
+ struct proc_dir_entry *procdir;
+ unsigned char number;
+ unsigned char primary;
+ unsigned char max_bus_speed;
+ unsigned char cur_bus_speed;
+ char name[48];
+ short unsigned int bridge_ctl;
+ pci_bus_flags_t bus_flags;
+ struct device *bridge;
+ struct device dev;
+ struct bin_attribute *legacy_io;
+ struct bin_attribute *legacy_mem;
+ unsigned int is_added: 1;
+ unsigned int unsafe_warn: 1;
+};
+
+typedef int pci_power_t;
+
+struct pci_vpd {
+ struct mutex lock;
+ unsigned int len;
+ u8 cap;
+};
+
+struct pci_sriov {
+ int pos;
+ int nres;
+ u32 cap;
+ u16 ctrl;
+ u16 total_VFs;
+ u16 initial_VFs;
+ u16 num_VFs;
+ u16 offset;
+ u16 stride;
+ u16 vf_device;
+ u32 pgsz;
+ u8 link;
+ u8 max_VF_buses;
+ u16 driver_max_VFs;
+ struct pci_dev *dev;
+ struct pci_dev *self;
+ u32 class;
+ u8 hdr_type;
+ u16 subsystem_vendor;
+ u16 subsystem_device;
+ resource_size_t barsz[6];
+ bool drivers_autoprobe;
+};
+
+struct rcec_ea;
+
+struct pci_driver;
+
+struct pcie_link_state;
+
+struct pci_dev {
+ struct list_head bus_list;
+ struct pci_bus *bus;
+ struct pci_bus *subordinate;
+ void *sysdata;
+ struct proc_dir_entry *procent;
+ struct pci_slot *slot;
+ unsigned int devfn;
+ short unsigned int vendor;
+ short unsigned int device;
+ short unsigned int subsystem_vendor;
+ short unsigned int subsystem_device;
+ unsigned int class;
+ u8 revision;
+ u8 hdr_type;
+ struct rcec_ea *rcec_ea;
+ struct pci_dev *rcec;
+ u32 devcap;
+ u8 pcie_cap;
+ u8 msi_cap;
+ u8 msix_cap;
+ u8 pcie_mpss: 3;
+ u8 rom_base_reg;
+ u8 pin;
+ u16 pcie_flags_reg;
+ long unsigned int *dma_alias_mask;
+ struct pci_driver *driver;
+ u64 dma_mask;
+ struct device_dma_parameters dma_parms;
+ pci_power_t current_state;
+ unsigned int imm_ready: 1;
+ u8 pm_cap;
+ unsigned int pme_support: 5;
+ unsigned int pme_poll: 1;
+ unsigned int d1_support: 1;
+ unsigned int d2_support: 1;
+ unsigned int no_d1d2: 1;
+ unsigned int no_d3cold: 1;
+ unsigned int bridge_d3: 1;
+ unsigned int d3cold_allowed: 1;
+ unsigned int mmio_always_on: 1;
+ unsigned int wakeup_prepared: 1;
+ unsigned int skip_bus_pm: 1;
+ unsigned int ignore_hotplug: 1;
+ unsigned int hotplug_user_indicators: 1;
+ unsigned int clear_retrain_link: 1;
+ unsigned int d3hot_delay;
+ unsigned int d3cold_delay;
+ struct pcie_link_state *link_state;
+ unsigned int ltr_path: 1;
+ u16 l1ss;
+ unsigned int pasid_no_tlp: 1;
+ unsigned int eetlp_prefix_path: 1;
+ pci_channel_state_t error_state;
+ struct device dev;
+ int cfg_size;
+ unsigned int irq;
+ struct resource resource[17];
+ bool match_driver;
+ unsigned int transparent: 1;
+ unsigned int io_window: 1;
+ unsigned int pref_window: 1;
+ unsigned int pref_64_window: 1;
+ unsigned int multifunction: 1;
+ unsigned int is_busmaster: 1;
+ unsigned int no_msi: 1;
+ unsigned int no_64bit_msi: 1;
+ unsigned int block_cfg_access: 1;
+ unsigned int broken_parity_status: 1;
+ unsigned int irq_reroute_variant: 2;
+ unsigned int msi_enabled: 1;
+ unsigned int msix_enabled: 1;
+ unsigned int ari_enabled: 1;
+ unsigned int ats_enabled: 1;
+ unsigned int pasid_enabled: 1;
+ unsigned int pri_enabled: 1;
+ unsigned int is_managed: 1;
+ unsigned int is_msi_managed: 1;
+ unsigned int needs_freset: 1;
+ unsigned int state_saved: 1;
+ unsigned int is_physfn: 1;
+ unsigned int is_virtfn: 1;
+ unsigned int is_hotplug_bridge: 1;
+ unsigned int shpc_managed: 1;
+ unsigned int is_thunderbolt: 1;
+ unsigned int untrusted: 1;
+ unsigned int external_facing: 1;
+ unsigned int broken_intx_masking: 1;
+ unsigned int io_window_1k: 1;
+ unsigned int irq_managed: 1;
+ unsigned int non_compliant_bars: 1;
+ unsigned int is_probed: 1;
+ unsigned int link_active_reporting: 1;
+ unsigned int no_vf_scan: 1;
+ unsigned int no_command_memory: 1;
+ unsigned int rom_bar_overlap: 1;
+ pci_dev_flags_t dev_flags;
+ atomic_t enable_cnt;
+ u32 saved_config_space[16];
+ struct hlist_head saved_cap_space;
+ int rom_attr_enabled;
+ struct bin_attribute *res_attr[17];
+ struct bin_attribute *res_attr_wc[17];
+ void *msix_base;
+ raw_spinlock_t msi_lock;
+ struct pci_vpd vpd;
+ union {
+ struct pci_sriov *sriov;
+ struct pci_dev *physfn;
+ };
+ u16 ats_cap;
+ u8 ats_stu;
+ u16 acs_cap;
+ phys_addr_t rom;
+ size_t romlen;
+ const char *driver_override;
+ long unsigned int priv_flags;
+ u8 reset_methods[7];
+};
+
+struct rcec_ea {
+ u8 nextbusn;
+ u8 lastbusn;
+ u32 bitmap;
+};
+
+struct pci_dynids {
+ spinlock_t lock;
+ struct list_head list;
+};
+
+struct pci_error_handlers;
+
+struct pci_driver {
+ struct list_head node;
+ const char *name;
+ const struct pci_device_id *id_table;
+ int (*probe)(struct pci_dev *, const struct pci_device_id *);
+ void (*remove)(struct pci_dev *);
+ int (*suspend)(struct pci_dev *, pm_message_t);
+ int (*resume)(struct pci_dev *);
+ void (*shutdown)(struct pci_dev *);
+ int (*sriov_configure)(struct pci_dev *, int);
+ int (*sriov_set_msix_vec_count)(struct pci_dev *, int);
+ u32 (*sriov_get_vf_total_msix)(struct pci_dev *);
+ const struct pci_error_handlers *err_handler;
+ const struct attribute_group **groups;
+ const struct attribute_group **dev_groups;
+ struct device_driver driver;
+ struct pci_dynids dynids;
+ bool driver_managed_dma;
+};
+
+struct pci_host_bridge {
+ struct device dev;
+ struct pci_bus *bus;
+ struct pci_ops *ops;
+ struct pci_ops *child_ops;
+ void *sysdata;
+ int busnr;
+ int domain_nr;
+ struct list_head windows;
+ struct list_head dma_ranges;
+ u8 (*swizzle_irq)(struct pci_dev *, u8 *);
+ int (*map_irq)(const struct pci_dev *, u8, u8);
+ void (*release_fn)(struct pci_host_bridge *);
+ void *release_data;
+ unsigned int ignore_reset_delay: 1;
+ unsigned int no_ext_tags: 1;
+ unsigned int native_aer: 1;
+ unsigned int native_pcie_hotplug: 1;
+ unsigned int native_shpc_hotplug: 1;
+ unsigned int native_pme: 1;
+ unsigned int native_ltr: 1;
+ unsigned int native_dpc: 1;
+ unsigned int preserve_config: 1;
+ unsigned int size_windows: 1;
+ unsigned int msi_domain: 1;
+ resource_size_t (*align_resource)(struct pci_dev *, const struct resource *, resource_size_t, resource_size_t, resource_size_t);
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long unsigned int private[0];
+};
+
+struct pci_ops {
+ int (*add_bus)(struct pci_bus *);
+ void (*remove_bus)(struct pci_bus *);
+ void * (*map_bus)(struct pci_bus *, unsigned int, int);
+ int (*read)(struct pci_bus *, unsigned int, int, int, u32 *);
+ int (*write)(struct pci_bus *, unsigned int, int, int, u32);
+};
+
+struct pci_error_handlers {
+ pci_ers_result_t (*error_detected)(struct pci_dev *, pci_channel_state_t);
+ pci_ers_result_t (*mmio_enabled)(struct pci_dev *);
+ pci_ers_result_t (*slot_reset)(struct pci_dev *);
+ void (*reset_prepare)(struct pci_dev *);
+ void (*reset_done)(struct pci_dev *);
+ void (*resume)(struct pci_dev *);
+};
+
+typedef void (*exitcall_t)();
+
+struct ld_semaphore {
+ atomic_long_t count;
+ raw_spinlock_t wait_lock;
+ unsigned int wait_readers;
+ struct list_head read_wait;
+ struct list_head write_wait;
+ struct lockdep_map dep_map;
+};
+
+typedef unsigned int tcflag_t;
+
+typedef unsigned char cc_t;
+
+typedef unsigned int speed_t;
+
+struct ktermios {
+ tcflag_t c_iflag;
+ tcflag_t c_oflag;
+ tcflag_t c_cflag;
+ tcflag_t c_lflag;
+ cc_t c_line;
+ cc_t c_cc[19];
+ speed_t c_ispeed;
+ speed_t c_ospeed;
+};
+
+struct winsize {
+ short unsigned int ws_row;
+ short unsigned int ws_col;
+ short unsigned int ws_xpixel;
+ short unsigned int ws_ypixel;
+};
+
+struct tty_driver;
+
+struct tty_operations;
+
+struct tty_ldisc;
+
+struct tty_port;
+
+struct tty_struct {
+ struct kref kref;
+ struct device *dev;
+ struct tty_driver *driver;
+ const struct tty_operations *ops;
+ int index;
+ struct ld_semaphore ldisc_sem;
+ struct tty_ldisc *ldisc;
+ struct mutex atomic_write_lock;
+ struct mutex legacy_mutex;
+ struct mutex throttle_mutex;
+ struct rw_semaphore termios_rwsem;
+ struct mutex winsize_mutex;
+ struct ktermios termios;
+ struct ktermios termios_locked;
+ char name[64];
+ long unsigned int flags;
+ int count;
+ struct winsize winsize;
+ struct {
+ spinlock_t lock;
+ bool stopped;
+ bool tco_stopped;
+ long unsigned int unused[0];
+ } flow;
+ struct {
+ spinlock_t lock;
+ struct pid *pgrp;
+ struct pid *session;
+ unsigned char pktstatus;
+ bool packet;
+ long unsigned int unused[0];
+ } ctrl;
+ int hw_stopped;
+ unsigned int receive_room;
+ int flow_change;
+ struct tty_struct *link;
+ struct fasync_struct *fasync;
+ wait_queue_head_t write_wait;
+ wait_queue_head_t read_wait;
+ struct work_struct hangup_work;
+ void *disc_data;
+ void *driver_data;
+ spinlock_t files_lock;
+ struct list_head tty_files;
+ int closing;
+ unsigned char *write_buf;
+ int write_cnt;
+ struct work_struct SAK_work;
+ struct tty_port *port;
+};
+
+struct cdev {
+ struct kobject kobj;
+ struct module *owner;
+ const struct file_operations *ops;
+ struct list_head list;
+ dev_t dev;
+ unsigned int count;
+};
+
+struct tty_buffer {
+ union {
+ struct tty_buffer *next;
+ struct llist_node free;
+ };
+ int used;
+ int size;
+ int commit;
+ int lookahead;
+ int read;
+ int flags;
+ long unsigned int data[0];
+};
+
+struct tty_bufhead {
+ struct tty_buffer *head;
+ struct work_struct work;
+ struct mutex lock;
+ atomic_t priority;
+ struct tty_buffer sentinel;
+ struct llist_head free;
+ atomic_t mem_used;
+ int mem_limit;
+ struct tty_buffer *tail;
+};
+
+struct serial_icounter_struct;
+
+struct serial_struct;
+
+struct tty_operations {
+ struct tty_struct * (*lookup)(struct tty_driver *, struct file *, int);
+ int (*install)(struct tty_driver *, struct tty_struct *);
+ void (*remove)(struct tty_driver *, struct tty_struct *);
+ int (*open)(struct tty_struct *, struct file *);
+ void (*close)(struct tty_struct *, struct file *);
+ void (*shutdown)(struct tty_struct *);
+ void (*cleanup)(struct tty_struct *);
+ int (*write)(struct tty_struct *, const unsigned char *, int);
+ int (*put_char)(struct tty_struct *, unsigned char);
+ void (*flush_chars)(struct tty_struct *);
+ unsigned int (*write_room)(struct tty_struct *);
+ unsigned int (*chars_in_buffer)(struct tty_struct *);
+ int (*ioctl)(struct tty_struct *, unsigned int, long unsigned int);
+ long int (*compat_ioctl)(struct tty_struct *, unsigned int, long unsigned int);
+ void (*set_termios)(struct tty_struct *, const struct ktermios *);
+ void (*throttle)(struct tty_struct *);
+ void (*unthrottle)(struct tty_struct *);
+ void (*stop)(struct tty_struct *);
+ void (*start)(struct tty_struct *);
+ void (*hangup)(struct tty_struct *);
+ int (*break_ctl)(struct tty_struct *, int);
+ void (*flush_buffer)(struct tty_struct *);
+ void (*set_ldisc)(struct tty_struct *);
+ void (*wait_until_sent)(struct tty_struct *, int);
+ void (*send_xchar)(struct tty_struct *, char);
+ int (*tiocmget)(struct tty_struct *);
+ int (*tiocmset)(struct tty_struct *, unsigned int, unsigned int);
+ int (*resize)(struct tty_struct *, struct winsize *);
+ int (*get_icount)(struct tty_struct *, struct serial_icounter_struct *);
+ int (*get_serial)(struct tty_struct *, struct serial_struct *);
+ int (*set_serial)(struct tty_struct *, struct serial_struct *);
+ void (*show_fdinfo)(struct tty_struct *, struct seq_file *);
+ int (*proc_show)(struct seq_file *, void *);
+};
+
+struct tty_driver {
+ struct kref kref;
+ struct cdev **cdevs;
+ struct module *owner;
+ const char *driver_name;
+ const char *name;
+ int name_base;
+ int major;
+ int minor_start;
+ unsigned int num;
+ short int type;
+ short int subtype;
+ struct ktermios init_termios;
+ long unsigned int flags;
+ struct proc_dir_entry *proc_entry;
+ struct tty_driver *other;
+ struct tty_struct **ttys;
+ struct tty_port **ports;
+ struct ktermios **termios;
+ void *driver_state;
+ const struct tty_operations *ops;
+ struct list_head tty_drivers;
+};
+
+struct __kfifo {
+ unsigned int in;
+ unsigned int out;
+ unsigned int mask;
+ unsigned int esize;
+ void *data;
+};
+
+struct tty_port_operations;
+
+struct tty_port_client_operations;
+
+struct tty_port {
+ struct tty_bufhead buf;
+ struct tty_struct *tty;
+ struct tty_struct *itty;
+ const struct tty_port_operations *ops;
+ const struct tty_port_client_operations *client_ops;
+ spinlock_t lock;
+ int blocked_open;
+ int count;
+ wait_queue_head_t open_wait;
+ wait_queue_head_t delta_msr_wait;
+ long unsigned int flags;
+ long unsigned int iflags;
+ unsigned char console: 1;
+ struct mutex mutex;
+ struct mutex buf_mutex;
+ unsigned char *xmit_buf;
+ struct {
+ union {
+ struct __kfifo kfifo;
+ unsigned char *type;
+ const unsigned char *const_type;
+ char (*rectype)[0];
+ unsigned char *ptr;
+ const unsigned char *ptr_const;
+ };
+ unsigned char buf[0];
+ } xmit_fifo;
+ unsigned int close_delay;
+ unsigned int closing_wait;
+ int drain_delay;
+ struct kref kref;
+ void *client_data;
+};
+
+struct tty_ldisc_ops {
+ char *name;
+ int num;
+ int (*open)(struct tty_struct *);
+ void (*close)(struct tty_struct *);
+ void (*flush_buffer)(struct tty_struct *);
+ ssize_t (*read)(struct tty_struct *, struct file *, unsigned char *, size_t, void **, long unsigned int);
+ ssize_t (*write)(struct tty_struct *, struct file *, const unsigned char *, size_t);
+ int (*ioctl)(struct tty_struct *, unsigned int, long unsigned int);
+ int (*compat_ioctl)(struct tty_struct *, unsigned int, long unsigned int);
+ void (*set_termios)(struct tty_struct *, const struct ktermios *);
+ __poll_t (*poll)(struct tty_struct *, struct file *, struct poll_table_struct *);
+ void (*hangup)(struct tty_struct *);
+ void (*receive_buf)(struct tty_struct *, const unsigned char *, const char *, int);
+ void (*write_wakeup)(struct tty_struct *);
+ void (*dcd_change)(struct tty_struct *, unsigned int);
+ int (*receive_buf2)(struct tty_struct *, const unsigned char *, const char *, int);
+ void (*lookahead_buf)(struct tty_struct *, const unsigned char *, const unsigned char *, unsigned int);
+ struct module *owner;
+};
+
+struct tty_ldisc {
+ struct tty_ldisc_ops *ops;
+ struct tty_struct *tty;
+};
+
+struct tty_port_operations {
+ int (*carrier_raised)(struct tty_port *);
+ void (*dtr_rts)(struct tty_port *, int);
+ void (*shutdown)(struct tty_port *);
+ int (*activate)(struct tty_port *, struct tty_struct *);
+ void (*destruct)(struct tty_port *);
+};
+
+struct tty_port_client_operations {
+ int (*receive_buf)(struct tty_port *, const unsigned char *, const unsigned char *, size_t);
+ void (*lookahead_buf)(struct tty_port *, const unsigned char *, const unsigned char *, unsigned int);
+ void (*write_wakeup)(struct tty_port *);
+};
+
+typedef struct {
+ __u8 b[16];
+} guid_t;
+
+typedef long unsigned int efi_status_t;
+
+typedef u8 efi_bool_t;
+
+typedef u16 efi_char16_t;
+
+typedef guid_t efi_guid_t;
+
+typedef struct {
+ u64 signature;
+ u32 revision;
+ u32 headersize;
+ u32 crc32;
+ u32 reserved;
+} efi_table_hdr_t;
+
+typedef struct {
+ u32 type;
+ u32 pad;
+ u64 phys_addr;
+ u64 virt_addr;
+ u64 num_pages;
+ u64 attribute;
+} efi_memory_desc_t;
+
+typedef struct {
+ efi_guid_t guid;
+ u32 headersize;
+ u32 flags;
+ u32 imagesize;
+} efi_capsule_header_t;
+
+typedef struct {
+ u16 year;
+ u8 month;
+ u8 day;
+ u8 hour;
+ u8 minute;
+ u8 second;
+ u8 pad1;
+ u32 nanosecond;
+ s16 timezone;
+ u8 daylight;
+ u8 pad2;
+} efi_time_t;
+
+typedef struct {
+ u32 resolution;
+ u32 accuracy;
+ u8 sets_to_zero;
+} efi_time_cap_t;
+
+typedef struct {
+ efi_table_hdr_t hdr;
+ u32 get_time;
+ u32 set_time;
+ u32 get_wakeup_time;
+ u32 set_wakeup_time;
+ u32 set_virtual_address_map;
+ u32 convert_pointer;
+ u32 get_variable;
+ u32 get_next_variable;
+ u32 set_variable;
+ u32 get_next_high_mono_count;
+ u32 reset_system;
+ u32 update_capsule;
+ u32 query_capsule_caps;
+ u32 query_variable_info;
+} efi_runtime_services_32_t;
+
+typedef efi_status_t efi_get_time_t(efi_time_t *, efi_time_cap_t *);
+
+typedef efi_status_t efi_set_time_t(efi_time_t *);
+
+typedef efi_status_t efi_get_wakeup_time_t(efi_bool_t *, efi_bool_t *, efi_time_t *);
+
+typedef efi_status_t efi_set_wakeup_time_t(efi_bool_t, efi_time_t *);
+
+typedef efi_status_t efi_get_variable_t(efi_char16_t *, efi_guid_t *, u32 *, long unsigned int *, void *);
+
+typedef efi_status_t efi_get_next_variable_t(long unsigned int *, efi_char16_t *, efi_guid_t *);
+
+typedef efi_status_t efi_set_variable_t(efi_char16_t *, efi_guid_t *, u32, long unsigned int, void *);
+
+typedef efi_status_t efi_get_next_high_mono_count_t(u32 *);
+
+typedef void efi_reset_system_t(int, efi_status_t, long unsigned int, efi_char16_t *);
+
+typedef efi_status_t efi_query_variable_info_t(u32, u64 *, u64 *, u64 *);
+
+typedef efi_status_t efi_update_capsule_t(efi_capsule_header_t **, long unsigned int, long unsigned int);
+
+typedef efi_status_t efi_query_capsule_caps_t(efi_capsule_header_t **, long unsigned int, u64 *, int *);
+
+typedef union {
+ struct {
+ efi_table_hdr_t hdr;
+ efi_status_t (*get_time)(efi_time_t *, efi_time_cap_t *);
+ efi_status_t (*set_time)(efi_time_t *);
+ efi_status_t (*get_wakeup_time)(efi_bool_t *, efi_bool_t *, efi_time_t *);
+ efi_status_t (*set_wakeup_time)(efi_bool_t, efi_time_t *);
+ efi_status_t (*set_virtual_address_map)(long unsigned int, long unsigned int, u32, efi_memory_desc_t *);
+ void *convert_pointer;
+ efi_status_t (*get_variable)(efi_char16_t *, efi_guid_t *, u32 *, long unsigned int *, void *);
+ efi_status_t (*get_next_variable)(long unsigned int *, efi_char16_t *, efi_guid_t *);
+ efi_status_t (*set_variable)(efi_char16_t *, efi_guid_t *, u32, long unsigned int, void *);
+ efi_status_t (*get_next_high_mono_count)(u32 *);
+ void (*reset_system)(int, efi_status_t, long unsigned int, efi_char16_t *);
+ efi_status_t (*update_capsule)(efi_capsule_header_t **, long unsigned int, long unsigned int);
+ efi_status_t (*query_capsule_caps)(efi_capsule_header_t **, long unsigned int, u64 *, int *);
+ efi_status_t (*query_variable_info)(u32, u64 *, u64 *, u64 *);
+ };
+ efi_runtime_services_32_t mixed_mode;
+} efi_runtime_services_t;
+
+struct efi_memory_map {
+ phys_addr_t phys_map;
+ void *map;
+ void *map_end;
+ int nr_map;
+ long unsigned int desc_version;
+ long unsigned int desc_size;
+ long unsigned int flags;
+};
+
+struct efi {
+ const efi_runtime_services_t *runtime;
+ unsigned int runtime_version;
+ unsigned int runtime_supported_mask;
+ long unsigned int acpi;
+ long unsigned int acpi20;
+ long unsigned int smbios;
+ long unsigned int smbios3;
+ long unsigned int esrt;
+ long unsigned int tpm_log;
+ long unsigned int tpm_final_log;
+ long unsigned int mokvar_table;
+ long unsigned int coco_secret;
+ efi_get_time_t *get_time;
+ efi_set_time_t *set_time;
+ efi_get_wakeup_time_t *get_wakeup_time;
+ efi_set_wakeup_time_t *set_wakeup_time;
+ efi_get_variable_t *get_variable;
+ efi_get_next_variable_t *get_next_variable;
+ efi_set_variable_t *set_variable;
+ efi_set_variable_t *set_variable_nonblocking;
+ efi_query_variable_info_t *query_variable_info;
+ efi_query_variable_info_t *query_variable_info_nonblocking;
+ efi_update_capsule_t *update_capsule;
+ efi_query_capsule_caps_t *query_capsule_caps;
+ efi_get_next_high_mono_count_t *get_next_high_mono_count;
+ efi_reset_system_t *reset_system;
+ struct efi_memory_map memmap;
+ long unsigned int flags;
+};
+
+struct linux_efi_tpm_eventlog {
+ u32 size;
+ u32 final_events_preboot_size;
+ u8 version;
+ u8 log[0];
+};
+
+struct efi_tcg2_final_events_table {
+ u64 version;
+ u64 nr_events;
+ u8 events[0];
+};
+
+struct hwrng {
+ const char *name;
+ int (*init)(struct hwrng *);
+ void (*cleanup)(struct hwrng *);
+ int (*data_present)(struct hwrng *, int);
+ int (*data_read)(struct hwrng *, u32 *);
+ int (*read)(struct hwrng *, void *, size_t, bool);
+ long unsigned int priv;
+ short unsigned int quality;
+ struct list_head list;
+ struct kref ref;
+ struct completion cleanup_done;
+ struct completion dying;
+};
+
+typedef void *acpi_handle;
+
+enum {
+ MEMREMAP_WB = 1,
+ MEMREMAP_WT = 2,
+ MEMREMAP_WC = 4,
+ MEMREMAP_ENC = 8,
+ MEMREMAP_DEC = 16,
+};
+
+struct tpm_bank_info {
+ u16 alg_id;
+ u16 digest_size;
+ u16 crypto_id;
+};
+
+struct tpm_chip;
+
+struct tpm_class_ops {
+ unsigned int flags;
+ const u8 req_complete_mask;
+ const u8 req_complete_val;
+ bool (*req_canceled)(struct tpm_chip *, u8);
+ int (*recv)(struct tpm_chip *, u8 *, size_t);
+ int (*send)(struct tpm_chip *, u8 *, size_t);
+ void (*cancel)(struct tpm_chip *);
+ u8 (*status)(struct tpm_chip *);
+ void (*update_timeouts)(struct tpm_chip *, long unsigned int *);
+ void (*update_durations)(struct tpm_chip *, long unsigned int *);
+ int (*go_idle)(struct tpm_chip *);
+ int (*cmd_ready)(struct tpm_chip *);
+ int (*request_locality)(struct tpm_chip *, int);
+ int (*relinquish_locality)(struct tpm_chip *, int);
+ void (*clk_enable)(struct tpm_chip *, bool);
+};
+
+struct tpm_bios_log {
+ void *bios_event_log;
+ void *bios_event_log_end;
+};
+
+struct tpm_chip_seqops {
+ struct tpm_chip *chip;
+ const struct seq_operations *seqops;
+};
+
+struct tpm_space {
+ u32 context_tbl[3];
+ u8 *context_buf;
+ u32 session_tbl[3];
+ u8 *session_buf;
+ u32 buf_size;
+};
+
+struct tpm_chip {
+ struct device dev;
+ struct device devs;
+ struct cdev cdev;
+ struct cdev cdevs;
+ struct rw_semaphore ops_sem;
+ const struct tpm_class_ops *ops;
+ struct tpm_bios_log log;
+ struct tpm_chip_seqops bin_log_seqops;
+ struct tpm_chip_seqops ascii_log_seqops;
+ unsigned int flags;
+ int dev_num;
+ long unsigned int is_open;
+ char hwrng_name[64];
+ struct hwrng hwrng;
+ struct mutex tpm_mutex;
+ long unsigned int timeout_a;
+ long unsigned int timeout_b;
+ long unsigned int timeout_c;
+ long unsigned int timeout_d;
+ bool timeout_adjusted;
+ long unsigned int duration[4];
+ bool duration_adjusted;
+ struct dentry *bios_dir[3];
+ const struct attribute_group *groups[8];
+ unsigned int groups_cnt;
+ u32 nr_allocated_banks;
+ struct tpm_bank_info *allocated_banks;
+ acpi_handle acpi_dev_handle;
+ char ppi_version[4];
+ struct tpm_space work_space;
+ u32 last_cc;
+ u32 nr_commands;
+ u32 *cc_attrs_tbl;
+ int locality;
+};
+
+enum tpm_chip_flags {
+ TPM_CHIP_FLAG_TPM2 = 2,
+ TPM_CHIP_FLAG_IRQ = 4,
+ TPM_CHIP_FLAG_VIRTUAL = 8,
+ TPM_CHIP_FLAG_HAVE_TIMEOUTS = 16,
+ TPM_CHIP_FLAG_ALWAYS_POWERED = 32,
+ TPM_CHIP_FLAG_FIRMWARE_POWER_MANAGED = 64,
+ TPM_CHIP_FLAG_FIRMWARE_UPGRADE = 128,
+};
+
+struct dma_fence_ops;
+
+struct dma_fence {
+ spinlock_t *lock;
+ const struct dma_fence_ops *ops;
+ union {
+ struct list_head cb_list;
+ ktime_t timestamp;
+ struct callback_head rcu;
+ };
+ u64 context;
+ u64 seqno;
+ long unsigned int flags;
+ struct kref refcount;
+ int error;
+};
+
+struct dma_fence_ops {
+ bool use_64bit_seqno;
+ const char * (*get_driver_name)(struct dma_fence *);
+ const char * (*get_timeline_name)(struct dma_fence *);
+ bool (*enable_signaling)(struct dma_fence *);
+ bool (*signaled)(struct dma_fence *);
+ long int (*wait)(struct dma_fence *, bool, long int);
+ void (*release)(struct dma_fence *);
+ void (*fence_value_str)(struct dma_fence *, char *, int);
+ void (*timeline_value_str)(struct dma_fence *, char *, int);
+};
+
+struct dma_fence_cb;
+
+typedef void (*dma_fence_func_t)(struct dma_fence *, struct dma_fence_cb *);
+
+struct dma_fence_cb {
+ struct list_head node;
+ dma_fence_func_t func;
+};
+
+struct dma_fence_array;
+
+struct dma_fence_array_cb {
+ struct dma_fence_cb cb;
+ struct dma_fence_array *array;
+};
+
+struct dma_fence_array {
+ struct dma_fence base;
+ spinlock_t lock;
+ unsigned int num_fences;
+ atomic_t num_pending;
+ struct dma_fence **fences;
+ struct irq_work work;
+};
+
+typedef __u64 __be64;
+
+typedef __u16 __sum16;
+
+struct debugfs_u32_array {
+ u32 *array;
+ u32 n_elements;
+};
+
+typedef __u64 __addrpair;
+
+typedef __u32 __portpair;
+
+typedef struct {
+ struct net *net;
+} possible_net_t;
+
+struct hlist_nulls_node {
+ struct hlist_nulls_node *next;
+ struct hlist_nulls_node **pprev;
+};
+
+struct proto;
+
+struct sock_common {
+ union {
+ __addrpair skc_addrpair;
+ struct {
+ __be32 skc_daddr;
+ __be32 skc_rcv_saddr;
+ };
+ };
+ union {
+ unsigned int skc_hash;
+ __u16 skc_u16hashes[2];
+ };
+ union {
+ __portpair skc_portpair;
+ struct {
+ __be16 skc_dport;
+ __u16 skc_num;
+ };
+ };
+ short unsigned int skc_family;
+ volatile unsigned char skc_state;
+ unsigned char skc_reuse: 4;
+ unsigned char skc_reuseport: 1;
+ unsigned char skc_ipv6only: 1;
+ unsigned char skc_net_refcnt: 1;
+ int skc_bound_dev_if;
+ union {
+ struct hlist_node skc_bind_node;
+ struct hlist_node skc_portaddr_node;
+ };
+ struct proto *skc_prot;
+ possible_net_t skc_net;
+ struct in6_addr skc_v6_daddr;
+ struct in6_addr skc_v6_rcv_saddr;
+ atomic64_t skc_cookie;
+ union {
+ long unsigned int skc_flags;
+ struct sock *skc_listener;
+ struct inet_timewait_death_row *skc_tw_dr;
+ };
+ int skc_dontcopy_begin[0];
+ union {
+ struct hlist_node skc_node;
+ struct hlist_nulls_node skc_nulls_node;
+ };
+ short unsigned int skc_tx_queue_mapping;
+ short unsigned int skc_rx_queue_mapping;
+ union {
+ int skc_incoming_cpu;
+ u32 skc_rcv_wnd;
+ u32 skc_tw_rcv_nxt;
+ };
+ refcount_t skc_refcnt;
+ int skc_dontcopy_end[0];
+ union {
+ u32 skc_rxhash;
+ u32 skc_window_clamp;
+ u32 skc_tw_snd_nxt;
+ };
+};
+
+typedef struct {
+ spinlock_t slock;
+ int owned;
+ wait_queue_head_t wq;
+ struct lockdep_map dep_map;
+} socket_lock_t;
+
+struct sk_buff_list {
+ struct sk_buff *next;
+ struct sk_buff *prev;
+};
+
+struct sk_buff_head {
+ union {
+ struct {
+ struct sk_buff *next;
+ struct sk_buff *prev;
+ };
+ struct sk_buff_list list;
+ };
+ __u32 qlen;
+ spinlock_t lock;
+};
+
+typedef u64 netdev_features_t;
+
+struct sock_cgroup_data {
+ struct cgroup *cgroup;
+ u32 classid;
+};
+
+typedef struct {} netns_tracker;
+
+struct sk_filter;
+
+struct socket_wq;
+
+struct xfrm_policy;
+
+struct socket;
+
+struct sock_reuseport;
+
+struct sock {
+ struct sock_common __sk_common;
+ struct dst_entry *sk_rx_dst;
+ int sk_rx_dst_ifindex;
+ u32 sk_rx_dst_cookie;
+ socket_lock_t sk_lock;
+ atomic_t sk_drops;
+ int sk_rcvlowat;
+ struct sk_buff_head sk_error_queue;
+ struct sk_buff_head sk_receive_queue;
+ struct {
+ atomic_t rmem_alloc;
+ int len;
+ struct sk_buff *head;
+ struct sk_buff *tail;
+ } sk_backlog;
+ int sk_forward_alloc;
+ u32 sk_reserved_mem;
+ unsigned int sk_ll_usec;
+ unsigned int sk_napi_id;
+ int sk_rcvbuf;
+ struct sk_filter *sk_filter;
+ union {
+ struct socket_wq *sk_wq;
+ struct socket_wq *sk_wq_raw;
+ };
+ struct xfrm_policy *sk_policy[2];
+ struct dst_entry *sk_dst_cache;
+ atomic_t sk_omem_alloc;
+ int sk_sndbuf;
+ int sk_wmem_queued;
+ refcount_t sk_wmem_alloc;
+ long unsigned int sk_tsq_flags;
+ union {
+ struct sk_buff *sk_send_head;
+ struct rb_root tcp_rtx_queue;
+ };
+ struct sk_buff_head sk_write_queue;
+ __s32 sk_peek_off;
+ int sk_write_pending;
+ __u32 sk_dst_pending_confirm;
+ u32 sk_pacing_status;
+ long int sk_sndtimeo;
+ struct timer_list sk_timer;
+ __u32 sk_priority;
+ __u32 sk_mark;
+ long unsigned int sk_pacing_rate;
+ long unsigned int sk_max_pacing_rate;
+ struct page_frag sk_frag;
+ netdev_features_t sk_route_caps;
+ int sk_gso_type;
+ unsigned int sk_gso_max_size;
+ gfp_t sk_allocation;
+ __u32 sk_txhash;
+ u8 sk_gso_disabled: 1;
+ u8 sk_kern_sock: 1;
+ u8 sk_no_check_tx: 1;
+ u8 sk_no_check_rx: 1;
+ u8 sk_userlocks: 4;
+ u8 sk_pacing_shift;
+ u16 sk_type;
+ u16 sk_protocol;
+ u16 sk_gso_max_segs;
+ long unsigned int sk_lingertime;
+ struct proto *sk_prot_creator;
+ rwlock_t sk_callback_lock;
+ int sk_err;
+ int sk_err_soft;
+ u32 sk_ack_backlog;
+ u32 sk_max_ack_backlog;
+ kuid_t sk_uid;
+ u8 sk_txrehash;
+ u8 sk_prefer_busy_poll;
+ u16 sk_busy_poll_budget;
+ spinlock_t sk_peer_lock;
+ int sk_bind_phc;
+ struct pid *sk_peer_pid;
+ const struct cred *sk_peer_cred;
+ long int sk_rcvtimeo;
+ ktime_t sk_stamp;
+ u16 sk_tsflags;
+ u8 sk_shutdown;
+ atomic_t sk_tskey;
+ atomic_t sk_zckey;
+ u8 sk_clockid;
+ u8 sk_txtime_deadline_mode: 1;
+ u8 sk_txtime_report_errors: 1;
+ u8 sk_txtime_unused: 6;
+ struct socket *sk_socket;
+ void *sk_user_data;
+ void *sk_security;
+ struct sock_cgroup_data sk_cgrp_data;
+ struct mem_cgroup *sk_memcg;
+ void (*sk_state_change)(struct sock *);
+ void (*sk_data_ready)(struct sock *);
+ void (*sk_write_space)(struct sock *);
+ void (*sk_error_report)(struct sock *);
+ int (*sk_backlog_rcv)(struct sock *, struct sk_buff *);
+ void (*sk_destruct)(struct sock *);
+ struct sock_reuseport *sk_reuseport_cb;
+ struct bpf_local_storage *sk_bpf_storage;
+ struct callback_head sk_rcu;
+ netns_tracker ns_tracker;
+ struct hlist_node sk_bind2_node;
+};
+
+typedef short unsigned int __kernel_sa_family_t;
+
+typedef __kernel_sa_family_t sa_family_t;
+
+struct sockaddr {
+ sa_family_t sa_family;
+ union {
+ char sa_data_min[14];
+ struct {
+ struct { } __empty_sa_data;
+ char sa_data[0];
+ };
+ };
+};
+
+struct ubuf_info;
+
+struct msghdr {
+ void *msg_name;
+ int msg_namelen;
+ int msg_inq;
+ struct iov_iter msg_iter;
+ union {
+ void *msg_control;
+ void *msg_control_user;
+ };
+ bool msg_control_is_user: 1;
+ bool msg_get_inq: 1;
+ unsigned int msg_flags;
+ __kernel_size_t msg_controllen;
+ struct kiocb *msg_iocb;
+ struct ubuf_info *msg_ubuf;
+ int (*sg_from_iter)(struct sock *, struct sk_buff *, struct iov_iter *, size_t);
+};
+
+struct ubuf_info {
+ void (*callback)(struct sk_buff *, struct ubuf_info *, bool);
+ refcount_t refcnt;
+ u8 flags;
+};
+
+typedef struct {
+ union {
+ void *kernel;
+ void *user;
+ };
+ bool is_kernel: 1;
+} sockptr_t;
+
+typedef enum {
+ SS_FREE = 0,
+ SS_UNCONNECTED = 1,
+ SS_CONNECTING = 2,
+ SS_CONNECTED = 3,
+ SS_DISCONNECTING = 4,
+} socket_state;
+
+struct socket_wq {
+ wait_queue_head_t wait;
+ struct fasync_struct *fasync_list;
+ long unsigned int flags;
+ struct callback_head rcu;
+ long: 64;
+ long: 64;
+};
+
+struct proto_ops;
+
+struct socket {
+ socket_state state;
+ short int type;
+ long unsigned int flags;
+ struct file *file;
+ struct sock *sk;
+ const struct proto_ops *ops;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct socket_wq wq;
+};
+
+typedef struct {
+ size_t written;
+ size_t count;
+ union {
+ char *buf;
+ void *data;
+ } arg;
+ int error;
+} read_descriptor_t;
+
+typedef int (*sk_read_actor_t)(read_descriptor_t *, struct sk_buff *, unsigned int, size_t);
+
+typedef int (*skb_read_actor_t)(struct sock *, struct sk_buff *);
+
+struct proto_ops {
+ int family;
+ struct module *owner;
+ int (*release)(struct socket *);
+ int (*bind)(struct socket *, struct sockaddr *, int);
+ int (*connect)(struct socket *, struct sockaddr *, int, int);
+ int (*socketpair)(struct socket *, struct socket *);
+ int (*accept)(struct socket *, struct socket *, int, bool);
+ int (*getname)(struct socket *, struct sockaddr *, int);
+ __poll_t (*poll)(struct file *, struct socket *, struct poll_table_struct *);
+ int (*ioctl)(struct socket *, unsigned int, long unsigned int);
+ int (*gettstamp)(struct socket *, void *, bool, bool);
+ int (*listen)(struct socket *, int);
+ int (*shutdown)(struct socket *, int);
+ int (*setsockopt)(struct socket *, int, int, sockptr_t, unsigned int);
+ int (*getsockopt)(struct socket *, int, int, char *, int *);
+ void (*show_fdinfo)(struct seq_file *, struct socket *);
+ int (*sendmsg)(struct socket *, struct msghdr *, size_t);
+ int (*recvmsg)(struct socket *, struct msghdr *, size_t, int);
+ int (*mmap)(struct file *, struct socket *, struct vm_area_struct *);
+ ssize_t (*sendpage)(struct socket *, struct page *, int, size_t, int);
+ ssize_t (*splice_read)(struct socket *, loff_t *, struct pipe_inode_info *, size_t, unsigned int);
+ int (*set_peek_off)(struct sock *, int);
+ int (*peek_len)(struct socket *);
+ int (*read_sock)(struct sock *, read_descriptor_t *, sk_read_actor_t);
+ int (*read_skb)(struct sock *, skb_read_actor_t);
+ int (*sendpage_locked)(struct sock *, struct page *, int, size_t, int);
+ int (*sendmsg_locked)(struct sock *, struct msghdr *, size_t);
+ int (*set_rcvlowat)(struct sock *, int);
+};
+
+struct ethhdr {
+ unsigned char h_dest[6];
+ unsigned char h_source[6];
+ __be16 h_proto;
+};
+
+struct flowi_tunnel {
+ __be64 tun_id;
+};
+
+struct flowi_common {
+ int flowic_oif;
+ int flowic_iif;
+ int flowic_l3mdev;
+ __u32 flowic_mark;
+ __u8 flowic_tos;
+ __u8 flowic_scope;
+ __u8 flowic_proto;
+ __u8 flowic_flags;
+ __u32 flowic_secid;
+ kuid_t flowic_uid;
+ struct flowi_tunnel flowic_tun_key;
+ __u32 flowic_multipath_hash;
+};
+
+union flowi_uli {
+ struct {
+ __be16 dport;
+ __be16 sport;
+ } ports;
+ struct {
+ __u8 type;
+ __u8 code;
+ } icmpt;
+ __be32 gre_key;
+ struct {
+ __u8 type;
+ } mht;
+};
+
+struct flowi4 {
+ struct flowi_common __fl_common;
+ __be32 saddr;
+ __be32 daddr;
+ union flowi_uli uli;
+};
+
+struct flowi6 {
+ struct flowi_common __fl_common;
+ struct in6_addr daddr;
+ struct in6_addr saddr;
+ __be32 flowlabel;
+ union flowi_uli uli;
+ __u32 mp_hash;
+};
+
+struct flowi {
+ union {
+ struct flowi_common __fl_common;
+ struct flowi4 ip4;
+ struct flowi6 ip6;
+ } u;
+};
+
+struct skb_shared_hwtstamps {
+ union {
+ ktime_t hwtstamp;
+ void *netdev_data;
+ };
+};
+
+struct net_device_stats {
+ union {
+ long unsigned int rx_packets;
+ atomic_long_t __rx_packets;
+ };
+ union {
+ long unsigned int tx_packets;
+ atomic_long_t __tx_packets;
+ };
+ union {
+ long unsigned int rx_bytes;
+ atomic_long_t __rx_bytes;
+ };
+ union {
+ long unsigned int tx_bytes;
+ atomic_long_t __tx_bytes;
+ };
+ union {
+ long unsigned int rx_errors;
+ atomic_long_t __rx_errors;
+ };
+ union {
+ long unsigned int tx_errors;
+ atomic_long_t __tx_errors;
+ };
+ union {
+ long unsigned int rx_dropped;
+ atomic_long_t __rx_dropped;
+ };
+ union {
+ long unsigned int tx_dropped;
+ atomic_long_t __tx_dropped;
+ };
+ union {
+ long unsigned int multicast;
+ atomic_long_t __multicast;
+ };
+ union {
+ long unsigned int collisions;
+ atomic_long_t __collisions;
+ };
+ union {
+ long unsigned int rx_length_errors;
+ atomic_long_t __rx_length_errors;
+ };
+ union {
+ long unsigned int rx_over_errors;
+ atomic_long_t __rx_over_errors;
+ };
+ union {
+ long unsigned int rx_crc_errors;
+ atomic_long_t __rx_crc_errors;
+ };
+ union {
+ long unsigned int rx_frame_errors;
+ atomic_long_t __rx_frame_errors;
+ };
+ union {
+ long unsigned int rx_fifo_errors;
+ atomic_long_t __rx_fifo_errors;
+ };
+ union {
+ long unsigned int rx_missed_errors;
+ atomic_long_t __rx_missed_errors;
+ };
+ union {
+ long unsigned int tx_aborted_errors;
+ atomic_long_t __tx_aborted_errors;
+ };
+ union {
+ long unsigned int tx_carrier_errors;
+ atomic_long_t __tx_carrier_errors;
+ };
+ union {
+ long unsigned int tx_fifo_errors;
+ atomic_long_t __tx_fifo_errors;
+ };
+ union {
+ long unsigned int tx_heartbeat_errors;
+ atomic_long_t __tx_heartbeat_errors;
+ };
+ union {
+ long unsigned int tx_window_errors;
+ atomic_long_t __tx_window_errors;
+ };
+ union {
+ long unsigned int rx_compressed;
+ atomic_long_t __rx_compressed;
+ };
+ union {
+ long unsigned int tx_compressed;
+ atomic_long_t __tx_compressed;
+ };
+};
+
+struct netdev_hw_addr_list {
+ struct list_head list;
+ int count;
+ struct rb_root tree;
+};
+
+enum rx_handler_result {
+ RX_HANDLER_CONSUMED = 0,
+ RX_HANDLER_ANOTHER = 1,
+ RX_HANDLER_EXACT = 2,
+ RX_HANDLER_PASS = 3,
+};
+
+typedef enum rx_handler_result rx_handler_result_t;
+
+typedef rx_handler_result_t rx_handler_func_t(struct sk_buff **);
+
+enum netdev_ml_priv_type {
+ ML_PRIV_NONE = 0,
+ ML_PRIV_CAN = 1,
+};
+
+struct netdev_tc_txq {
+ u16 count;
+ u16 offset;
+};
+
+struct sfp_bus;
+
+struct bpf_xdp_link;
+
+struct bpf_xdp_entity {
+ struct bpf_prog *prog;
+ struct bpf_xdp_link *link;
+};
+
+struct netdev_name_node;
+
+struct dev_ifalias;
+
+struct net_device_ops;
+
+struct net_device_core_stats;
+
+struct ethtool_ops;
+
+struct l3mdev_ops;
+
+struct ndisc_ops;
+
+struct header_ops;
+
+struct in_device;
+
+struct inet6_dev;
+
+struct vlan_info;
+
+struct mpls_dev;
+
+struct netdev_rx_queue;
+
+struct mini_Qdisc;
+
+struct netdev_queue;
+
+struct cpu_rmap;
+
+struct Qdisc;
+
+struct xdp_dev_bulk_queue;
+
+struct xps_dev_maps;
+
+struct pcpu_lstats;
+
+struct pcpu_sw_netstats;
+
+struct pcpu_dstats;
+
+struct rtnl_link_ops;
+
+struct dcbnl_rtnl_ops;
+
+struct phy_device;
+
+struct udp_tunnel_nic_info;
+
+struct udp_tunnel_nic;
+
+struct rtnl_hw_stats64;
+
+struct devlink_port;
+
+struct net_device {
+ char name[16];
+ struct netdev_name_node *name_node;
+ struct dev_ifalias *ifalias;
+ long unsigned int mem_end;
+ long unsigned int mem_start;
+ long unsigned int base_addr;
+ long unsigned int state;
+ struct list_head dev_list;
+ struct list_head napi_list;
+ struct list_head unreg_list;
+ struct list_head close_list;
+ struct list_head ptype_all;
+ struct list_head ptype_specific;
+ struct {
+ struct list_head upper;
+ struct list_head lower;
+ } adj_list;
+ unsigned int flags;
+ long long unsigned int priv_flags;
+ const struct net_device_ops *netdev_ops;
+ int ifindex;
+ short unsigned int gflags;
+ short unsigned int hard_header_len;
+ unsigned int mtu;
+ short unsigned int needed_headroom;
+ short unsigned int needed_tailroom;
+ netdev_features_t features;
+ netdev_features_t hw_features;
+ netdev_features_t wanted_features;
+ netdev_features_t vlan_features;
+ netdev_features_t hw_enc_features;
+ netdev_features_t mpls_features;
+ netdev_features_t gso_partial_features;
+ unsigned int min_mtu;
+ unsigned int max_mtu;
+ short unsigned int type;
+ unsigned char min_header_len;
+ unsigned char name_assign_type;
+ int group;
+ struct net_device_stats stats;
+ struct net_device_core_stats *core_stats;
+ atomic_t carrier_up_count;
+ atomic_t carrier_down_count;
+ const struct ethtool_ops *ethtool_ops;
+ const struct l3mdev_ops *l3mdev_ops;
+ const struct ndisc_ops *ndisc_ops;
+ const struct header_ops *header_ops;
+ unsigned char operstate;
+ unsigned char link_mode;
+ unsigned char if_port;
+ unsigned char dma;
+ unsigned char perm_addr[32];
+ unsigned char addr_assign_type;
+ unsigned char addr_len;
+ unsigned char upper_level;
+ unsigned char lower_level;
+ short unsigned int neigh_priv_len;
+ short unsigned int dev_id;
+ short unsigned int dev_port;
+ short unsigned int padded;
+ spinlock_t addr_list_lock;
+ int irq;
+ struct netdev_hw_addr_list uc;
+ struct netdev_hw_addr_list mc;
+ struct netdev_hw_addr_list dev_addrs;
+ struct kset *queues_kset;
+ struct list_head unlink_list;
+ unsigned int promiscuity;
+ unsigned int allmulti;
+ bool uc_promisc;
+ unsigned char nested_level;
+ struct in_device *ip_ptr;
+ struct inet6_dev *ip6_ptr;
+ struct vlan_info *vlan_info;
+ struct mpls_dev *mpls_ptr;
+ const unsigned char *dev_addr;
+ struct netdev_rx_queue *_rx;
+ unsigned int num_rx_queues;
+ unsigned int real_num_rx_queues;
+ struct bpf_prog *xdp_prog;
+ long unsigned int gro_flush_timeout;
+ int napi_defer_hard_irqs;
+ unsigned int gro_max_size;
+ rx_handler_func_t *rx_handler;
+ void *rx_handler_data;
+ struct mini_Qdisc *miniq_ingress;
+ struct netdev_queue *ingress_queue;
+ struct nf_hook_entries *nf_hooks_ingress;
+ unsigned char broadcast[32];
+ struct cpu_rmap *rx_cpu_rmap;
+ struct hlist_node index_hlist;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct netdev_queue *_tx;
+ unsigned int num_tx_queues;
+ unsigned int real_num_tx_queues;
+ struct Qdisc *qdisc;
+ unsigned int tx_queue_len;
+ spinlock_t tx_global_lock;
+ struct xdp_dev_bulk_queue *xdp_bulkq;
+ struct xps_dev_maps *xps_maps[2];
+ struct mini_Qdisc *miniq_egress;
+ struct nf_hook_entries *nf_hooks_egress;
+ struct hlist_head qdisc_hash[16];
+ struct timer_list watchdog_timer;
+ int watchdog_timeo;
+ u32 proto_down_reason;
+ struct list_head todo_list;
+ int *pcpu_refcnt;
+ struct ref_tracker_dir refcnt_tracker;
+ struct list_head link_watch_list;
+ enum {
+ NETREG_UNINITIALIZED = 0,
+ NETREG_REGISTERED = 1,
+ NETREG_UNREGISTERING = 2,
+ NETREG_UNREGISTERED = 3,
+ NETREG_RELEASED = 4,
+ NETREG_DUMMY = 5,
+ } reg_state: 8;
+ bool dismantle;
+ enum {
+ RTNL_LINK_INITIALIZED = 0,
+ RTNL_LINK_INITIALIZING = 1,
+ } rtnl_link_state: 16;
+ bool needs_free_netdev;
+ void (*priv_destructor)(struct net_device *);
+ possible_net_t nd_net;
+ void *ml_priv;
+ enum netdev_ml_priv_type ml_priv_type;
+ union {
+ struct pcpu_lstats *lstats;
+ struct pcpu_sw_netstats *tstats;
+ struct pcpu_dstats *dstats;
+ };
+ struct device dev;
+ const struct attribute_group *sysfs_groups[4];
+ const struct attribute_group *sysfs_rx_queue_group;
+ const struct rtnl_link_ops *rtnl_link_ops;
+ unsigned int gso_max_size;
+ unsigned int tso_max_size;
+ u16 gso_max_segs;
+ u16 tso_max_segs;
+ const struct dcbnl_rtnl_ops *dcbnl_ops;
+ s16 num_tc;
+ struct netdev_tc_txq tc_to_txq[16];
+ u8 prio_tc_map[16];
+ struct phy_device *phydev;
+ struct sfp_bus *sfp_bus;
+ struct lock_class_key *qdisc_tx_busylock;
+ bool proto_down;
+ unsigned int wol_enabled: 1;
+ unsigned int threaded: 1;
+ struct list_head net_notifier_list;
+ const struct udp_tunnel_nic_info *udp_tunnel_nic_info;
+ struct udp_tunnel_nic *udp_tunnel_nic;
+ struct bpf_xdp_entity xdp_state[3];
+ u8 dev_addr_shadow[32];
+ netdevice_tracker linkwatch_dev_tracker;
+ netdevice_tracker watchdog_dev_tracker;
+ netdevice_tracker dev_registered_tracker;
+ struct rtnl_hw_stats64 *offload_xstats_l3;
+ struct devlink_port *devlink_port;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct dql {
+ unsigned int num_queued;
+ unsigned int adj_limit;
+ unsigned int last_obj_cnt;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ unsigned int limit;
+ unsigned int num_completed;
+ unsigned int prev_ovlimit;
+ unsigned int prev_num_queued;
+ unsigned int prev_last_obj_cnt;
+ unsigned int lowest_slack;
+ long unsigned int slack_start_time;
+ unsigned int max_limit;
+ unsigned int min_limit;
+ unsigned int slack_hold_time;
+ long: 32;
+ long: 64;
+ long: 64;
+};
+
+struct prot_inuse {
+ int all;
+ int val[64];
+};
+
+typedef struct {
+ local64_t v;
+} u64_stats_t;
+
+struct icmpv6_mib_device {
+ atomic_long_t mibs[6];
+};
+
+struct icmpv6msg_mib_device {
+ atomic_long_t mibs[512];
+};
+
+struct udp_hslot;
+
+struct udp_table {
+ struct udp_hslot *hash;
+ struct udp_hslot *hash2;
+ unsigned int mask;
+ unsigned int log;
+};
+
+struct ip_ra_chain {
+ struct ip_ra_chain *next;
+ struct sock *sk;
+ union {
+ void (*destructor)(struct sock *);
+ struct sock *saved_sk;
+ };
+ struct callback_head rcu;
+};
+
+struct fib_rule;
+
+struct fib_lookup_arg;
+
+struct fib_rule_hdr;
+
+struct nlattr;
+
+struct netlink_ext_ack;
+
+struct fib_rules_ops {
+ int family;
+ struct list_head list;
+ int rule_size;
+ int addr_size;
+ int unresolved_rules;
+ int nr_goto_rules;
+ unsigned int fib_rules_seq;
+ int (*action)(struct fib_rule *, struct flowi *, int, struct fib_lookup_arg *);
+ bool (*suppress)(struct fib_rule *, int, struct fib_lookup_arg *);
+ int (*match)(struct fib_rule *, struct flowi *, int);
+ int (*configure)(struct fib_rule *, struct sk_buff *, struct fib_rule_hdr *, struct nlattr **, struct netlink_ext_ack *);
+ int (*delete)(struct fib_rule *);
+ int (*compare)(struct fib_rule *, struct fib_rule_hdr *, struct nlattr **);
+ int (*fill)(struct fib_rule *, struct sk_buff *, struct fib_rule_hdr *);
+ size_t (*nlmsg_payload)(struct fib_rule *);
+ void (*flush_cache)(struct fib_rules_ops *);
+ int nlgroup;
+ struct list_head rules_list;
+ struct module *owner;
+ struct net *fro_net;
+ struct callback_head rcu;
+};
+
+struct fib_table {
+ struct hlist_node tb_hlist;
+ u32 tb_id;
+ int tb_num_default;
+ struct callback_head rcu;
+ long unsigned int *tb_data;
+ long unsigned int __data[0];
+};
+
+struct inet_peer_base {
+ struct rb_root rb_root;
+ seqlock_t lock;
+ int total;
+};
+
+struct fib_notifier_ops {
+ int family;
+ struct list_head list;
+ unsigned int (*fib_seq_read)(struct net *);
+ int (*fib_dump)(struct net *, struct notifier_block *, struct netlink_ext_ack *);
+ struct module *owner;
+ struct callback_head rcu;
+};
+
+struct hh_cache {
+ unsigned int hh_len;
+ seqlock_t hh_lock;
+ long unsigned int hh_data[12];
+};
+
+struct neigh_table;
+
+struct neigh_parms;
+
+struct neigh_ops;
+
+struct neighbour {
+ struct neighbour *next;
+ struct neigh_table *tbl;
+ struct neigh_parms *parms;
+ long unsigned int confirmed;
+ long unsigned int updated;
+ rwlock_t lock;
+ refcount_t refcnt;
+ unsigned int arp_queue_len_bytes;
+ struct sk_buff_head arp_queue;
+ struct timer_list timer;
+ long unsigned int used;
+ atomic_t probes;
+ u8 nud_state;
+ u8 type;
+ u8 dead;
+ u8 protocol;
+ u32 flags;
+ seqlock_t ha_lock;
+ unsigned char ha[32];
+ struct hh_cache hh;
+ int (*output)(struct neighbour *, struct sk_buff *);
+ const struct neigh_ops *ops;
+ struct list_head gc_list;
+ struct list_head managed_list;
+ struct callback_head rcu;
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ u8 primary_key[0];
+};
+
+struct ipv6_stable_secret {
+ bool initialized;
+ struct in6_addr secret;
+};
+
+struct ipv6_devconf {
+ __s32 forwarding;
+ __s32 hop_limit;
+ __s32 mtu6;
+ __s32 accept_ra;
+ __s32 accept_redirects;
+ __s32 autoconf;
+ __s32 dad_transmits;
+ __s32 rtr_solicits;
+ __s32 rtr_solicit_interval;
+ __s32 rtr_solicit_max_interval;
+ __s32 rtr_solicit_delay;
+ __s32 force_mld_version;
+ __s32 mldv1_unsolicited_report_interval;
+ __s32 mldv2_unsolicited_report_interval;
+ __s32 use_tempaddr;
+ __s32 temp_valid_lft;
+ __s32 temp_prefered_lft;
+ __s32 regen_max_retry;
+ __s32 max_desync_factor;
+ __s32 max_addresses;
+ __s32 accept_ra_defrtr;
+ __u32 ra_defrtr_metric;
+ __s32 accept_ra_min_hop_limit;
+ __s32 accept_ra_pinfo;
+ __s32 ignore_routes_with_linkdown;
+ __s32 accept_ra_rtr_pref;
+ __s32 rtr_probe_interval;
+ __s32 accept_ra_rt_info_min_plen;
+ __s32 accept_ra_rt_info_max_plen;
+ __s32 proxy_ndp;
+ __s32 accept_source_route;
+ __s32 accept_ra_from_local;
+ __s32 disable_ipv6;
+ __s32 drop_unicast_in_l2_multicast;
+ __s32 accept_dad;
+ __s32 force_tllao;
+ __s32 ndisc_notify;
+ __s32 suppress_frag_ndisc;
+ __s32 accept_ra_mtu;
+ __s32 drop_unsolicited_na;
+ __s32 accept_untracked_na;
+ struct ipv6_stable_secret stable_secret;
+ __s32 use_oif_addrs_only;
+ __s32 keep_addr_on_down;
+ __s32 seg6_enabled;
+ __u32 enhanced_dad;
+ __u32 addr_gen_mode;
+ __s32 disable_policy;
+ __s32 ndisc_tclass;
+ __s32 rpl_seg_enabled;
+ __u32 ioam6_id;
+ __u32 ioam6_id_wide;
+ __u8 ioam6_enabled;
+ __u8 ndisc_evict_nocarrier;
+ struct ctl_table_header *sysctl_header;
+};
+
+struct rt6key {
+ struct in6_addr addr;
+ int plen;
+};
+
+struct rtable;
+
+struct fnhe_hash_bucket;
+
+struct fib_nh_common {
+ struct net_device *nhc_dev;
+ netdevice_tracker nhc_dev_tracker;
+ int nhc_oif;
+ unsigned char nhc_scope;
+ u8 nhc_family;
+ u8 nhc_gw_family;
+ unsigned char nhc_flags;
+ struct lwtunnel_state *nhc_lwtstate;
+ union {
+ __be32 ipv4;
+ struct in6_addr ipv6;
+ } nhc_gw;
+ int nhc_weight;
+ atomic_t nhc_upper_bound;
+ struct rtable **nhc_pcpu_rth_output;
+ struct rtable *nhc_rth_input;
+ struct fnhe_hash_bucket *nhc_exceptions;
+};
+
+struct rt6_exception_bucket;
+
+struct fib6_nh {
+ struct fib_nh_common nh_common;
+ long unsigned int last_probe;
+ struct rt6_info **rt6i_pcpu;
+ struct rt6_exception_bucket *rt6i_exception_bucket;
+};
+
+struct fib6_node;
+
+struct dst_metrics;
+
+struct nexthop;
+
+struct fib6_info {
+ struct fib6_table *fib6_table;
+ struct fib6_info *fib6_next;
+ struct fib6_node *fib6_node;
+ union {
+ struct list_head fib6_siblings;
+ struct list_head nh_list;
+ };
+ unsigned int fib6_nsiblings;
+ refcount_t fib6_ref;
+ long unsigned int expires;
+ struct dst_metrics *fib6_metrics;
+ struct rt6key fib6_dst;
+ u32 fib6_flags;
+ struct rt6key fib6_src;
+ struct rt6key fib6_prefsrc;
+ u32 fib6_metric;
+ u8 fib6_protocol;
+ u8 fib6_type;
+ u8 offload;
+ u8 trap;
+ u8 offload_failed;
+ u8 should_flush: 1;
+ u8 dst_nocount: 1;
+ u8 dst_nopolicy: 1;
+ u8 fib6_destroying: 1;
+ u8 unused: 4;
+ struct callback_head rcu;
+ struct nexthop *nh;
+ struct fib6_nh fib6_nh[0];
+};
+
+struct uncached_list;
+
+struct rt6_info {
+ struct dst_entry dst;
+ struct fib6_info *from;
+ int sernum;
+ struct rt6key rt6i_dst;
+ struct rt6key rt6i_src;
+ struct in6_addr rt6i_gateway;
+ struct inet6_dev *rt6i_idev;
+ u32 rt6i_flags;
+ struct list_head rt6i_uncached;
+ struct uncached_list *rt6i_uncached_list;
+ short unsigned int rt6i_nfheader_len;
+};
+
+struct rt6_statistics {
+ __u32 fib_nodes;
+ __u32 fib_route_nodes;
+ __u32 fib_rt_entries;
+ __u32 fib_rt_cache;
+ __u32 fib_discarded_routes;
+ atomic_t fib_rt_alloc;
+};
+
+struct fib6_node {
+ struct fib6_node *parent;
+ struct fib6_node *left;
+ struct fib6_node *right;
+ struct fib6_node *subtree;
+ struct fib6_info *leaf;
+ __u16 fn_bit;
+ __u16 fn_flags;
+ int fn_sernum;
+ struct fib6_info *rr_ptr;
+ struct callback_head rcu;
+};
+
+struct fib6_table {
+ struct hlist_node tb6_hlist;
+ u32 tb6_id;
+ spinlock_t tb6_lock;
+ struct fib6_node tb6_root;
+ struct inet_peer_base tb6_peers;
+ unsigned int flags;
+ unsigned int fib_seq;
+};
+
+enum {
+ IPPROTO_IP = 0,
+ IPPROTO_ICMP = 1,
+ IPPROTO_IGMP = 2,
+ IPPROTO_IPIP = 4,
+ IPPROTO_TCP = 6,
+ IPPROTO_EGP = 8,
+ IPPROTO_PUP = 12,
+ IPPROTO_UDP = 17,
+ IPPROTO_IDP = 22,
+ IPPROTO_TP = 29,
+ IPPROTO_DCCP = 33,
+ IPPROTO_IPV6 = 41,
+ IPPROTO_RSVP = 46,
+ IPPROTO_GRE = 47,
+ IPPROTO_ESP = 50,
+ IPPROTO_AH = 51,
+ IPPROTO_MTP = 92,
+ IPPROTO_BEETPH = 94,
+ IPPROTO_ENCAP = 98,
+ IPPROTO_PIM = 103,
+ IPPROTO_COMP = 108,
+ IPPROTO_L2TP = 115,
+ IPPROTO_SCTP = 132,
+ IPPROTO_UDPLITE = 136,
+ IPPROTO_MPLS = 137,
+ IPPROTO_ETHERNET = 143,
+ IPPROTO_RAW = 255,
+ IPPROTO_MPTCP = 262,
+ IPPROTO_MAX = 263,
+};
+
+struct net_generic {
+ union {
+ struct {
+ unsigned int len;
+ struct callback_head rcu;
+ } s;
+ struct {
+ struct { } __empty_ptr;
+ void *ptr[0];
+ };
+ };
+};
+
+struct ieee_ets {
+ __u8 willing;
+ __u8 ets_cap;
+ __u8 cbs;
+ __u8 tc_tx_bw[8];
+ __u8 tc_rx_bw[8];
+ __u8 tc_tsa[8];
+ __u8 prio_tc[8];
+ __u8 tc_reco_bw[8];
+ __u8 tc_reco_tsa[8];
+ __u8 reco_prio_tc[8];
+};
+
+struct ieee_maxrate {
+ __u64 tc_maxrate[8];
+};
+
+struct ieee_qcn {
+ __u8 rpg_enable[8];
+ __u32 rppp_max_rps[8];
+ __u32 rpg_time_reset[8];
+ __u32 rpg_byte_reset[8];
+ __u32 rpg_threshold[8];
+ __u32 rpg_max_rate[8];
+ __u32 rpg_ai_rate[8];
+ __u32 rpg_hai_rate[8];
+ __u32 rpg_gd[8];
+ __u32 rpg_min_dec_fac[8];
+ __u32 rpg_min_rate[8];
+ __u32 cndd_state_machine[8];
+};
+
+struct ieee_qcn_stats {
+ __u64 rppp_rp_centiseconds[8];
+ __u32 rppp_created_rps[8];
+};
+
+struct ieee_pfc {
+ __u8 pfc_cap;
+ __u8 pfc_en;
+ __u8 mbc;
+ __u16 delay;
+ __u64 requests[8];
+ __u64 indications[8];
+};
+
+struct dcbnl_buffer {
+ __u8 prio2buffer[8];
+ __u32 buffer_size[8];
+ __u32 total_size;
+};
+
+struct cee_pg {
+ __u8 willing;
+ __u8 error;
+ __u8 pg_en;
+ __u8 tcs_supported;
+ __u8 pg_bw[8];
+ __u8 prio_pg[8];
+};
+
+struct cee_pfc {
+ __u8 willing;
+ __u8 error;
+ __u8 pfc_en;
+ __u8 tcs_supported;
+};
+
+struct dcb_app {
+ __u8 selector;
+ __u8 priority;
+ __u16 protocol;
+};
+
+struct dcb_peer_app_info {
+ __u8 willing;
+ __u8 error;
+};
+
+struct dcbnl_rtnl_ops {
+ int (*ieee_getets)(struct net_device *, struct ieee_ets *);
+ int (*ieee_setets)(struct net_device *, struct ieee_ets *);
+ int (*ieee_getmaxrate)(struct net_device *, struct ieee_maxrate *);
+ int (*ieee_setmaxrate)(struct net_device *, struct ieee_maxrate *);
+ int (*ieee_getqcn)(struct net_device *, struct ieee_qcn *);
+ int (*ieee_setqcn)(struct net_device *, struct ieee_qcn *);
+ int (*ieee_getqcnstats)(struct net_device *, struct ieee_qcn_stats *);
+ int (*ieee_getpfc)(struct net_device *, struct ieee_pfc *);
+ int (*ieee_setpfc)(struct net_device *, struct ieee_pfc *);
+ int (*ieee_getapp)(struct net_device *, struct dcb_app *);
+ int (*ieee_setapp)(struct net_device *, struct dcb_app *);
+ int (*ieee_delapp)(struct net_device *, struct dcb_app *);
+ int (*ieee_peer_getets)(struct net_device *, struct ieee_ets *);
+ int (*ieee_peer_getpfc)(struct net_device *, struct ieee_pfc *);
+ u8 (*getstate)(struct net_device *);
+ u8 (*setstate)(struct net_device *, u8);
+ void (*getpermhwaddr)(struct net_device *, u8 *);
+ void (*setpgtccfgtx)(struct net_device *, int, u8, u8, u8, u8);
+ void (*setpgbwgcfgtx)(struct net_device *, int, u8);
+ void (*setpgtccfgrx)(struct net_device *, int, u8, u8, u8, u8);
+ void (*setpgbwgcfgrx)(struct net_device *, int, u8);
+ void (*getpgtccfgtx)(struct net_device *, int, u8 *, u8 *, u8 *, u8 *);
+ void (*getpgbwgcfgtx)(struct net_device *, int, u8 *);
+ void (*getpgtccfgrx)(struct net_device *, int, u8 *, u8 *, u8 *, u8 *);
+ void (*getpgbwgcfgrx)(struct net_device *, int, u8 *);
+ void (*setpfccfg)(struct net_device *, int, u8);
+ void (*getpfccfg)(struct net_device *, int, u8 *);
+ u8 (*setall)(struct net_device *);
+ u8 (*getcap)(struct net_device *, int, u8 *);
+ int (*getnumtcs)(struct net_device *, int, u8 *);
+ int (*setnumtcs)(struct net_device *, int, u8);
+ u8 (*getpfcstate)(struct net_device *);
+ void (*setpfcstate)(struct net_device *, u8);
+ void (*getbcncfg)(struct net_device *, int, u32 *);
+ void (*setbcncfg)(struct net_device *, int, u32);
+ void (*getbcnrp)(struct net_device *, int, u8 *);
+ void (*setbcnrp)(struct net_device *, int, u8);
+ int (*setapp)(struct net_device *, u8, u16, u8);
+ int (*getapp)(struct net_device *, u8, u16);
+ u8 (*getfeatcfg)(struct net_device *, int, u8 *);
+ u8 (*setfeatcfg)(struct net_device *, int, u8);
+ u8 (*getdcbx)(struct net_device *);
+ u8 (*setdcbx)(struct net_device *, u8);
+ int (*peer_getappinfo)(struct net_device *, struct dcb_peer_app_info *, u16 *);
+ int (*peer_getapptable)(struct net_device *, struct dcb_app *);
+ int (*cee_peer_getpg)(struct net_device *, struct cee_pg *);
+ int (*cee_peer_getpfc)(struct net_device *, struct cee_pfc *);
+ int (*dcbnl_getbuffer)(struct net_device *, struct dcbnl_buffer *);
+ int (*dcbnl_setbuffer)(struct net_device *, struct dcbnl_buffer *);
+ int (*dcbnl_setapptrust)(struct net_device *, u8 *, int);
+ int (*dcbnl_getapptrust)(struct net_device *, u8 *, int *);
+};
+
+struct xdp_mem_info {
+ u32 type;
+ u32 id;
+};
+
+struct xdp_rxq_info {
+ struct net_device *dev;
+ u32 queue_index;
+ u32 reg_state;
+ struct xdp_mem_info mem;
+ unsigned int napi_id;
+ u32 frag_size;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct xdp_txq_info {
+ struct net_device *dev;
+};
+
+struct xdp_buff {
+ void *data;
+ void *data_end;
+ void *data_meta;
+ void *data_hard_start;
+ struct xdp_rxq_info *rxq;
+ struct xdp_txq_info *txq;
+ u32 frame_sz;
+ u32 flags;
+};
+
+struct xdp_frame {
+ void *data;
+ u16 len;
+ u16 headroom;
+ u32 metasize;
+ struct xdp_mem_info mem;
+ struct net_device *dev_rx;
+ u32 frame_sz;
+ u32 flags;
+};
+
+struct xdp_attachment_info {
+ struct bpf_prog *prog;
+ u32 flags;
+};
+
+struct nlmsghdr {
+ __u32 nlmsg_len;
+ __u16 nlmsg_type;
+ __u16 nlmsg_flags;
+ __u32 nlmsg_seq;
+ __u32 nlmsg_pid;
+};
+
+struct nlattr {
+ __u16 nla_len;
+ __u16 nla_type;
+};
+
+struct nla_policy;
+
+struct netlink_ext_ack {
+ const char *_msg;
+ const struct nlattr *bad_attr;
+ const struct nla_policy *policy;
+ const struct nlattr *miss_nest;
+ u16 miss_type;
+ u8 cookie[20];
+ u8 cookie_len;
+ char _msg_buf[80];
+};
+
+struct netlink_range_validation;
+
+struct netlink_range_validation_signed;
+
+struct nla_policy {
+ u8 type;
+ u8 validation_type;
+ u16 len;
+ union {
+ u16 strict_start_type;
+ const u32 bitfield32_valid;
+ const u32 mask;
+ const char *reject_message;
+ const struct nla_policy *nested_policy;
+ struct netlink_range_validation *range;
+ struct netlink_range_validation_signed *range_signed;
+ struct {
+ s16 min;
+ s16 max;
+ };
+ int (*validate)(const struct nlattr *, struct netlink_ext_ack *);
+ };
+};
+
+struct netlink_callback {
+ struct sk_buff *skb;
+ const struct nlmsghdr *nlh;
+ int (*dump)(struct sk_buff *, struct netlink_callback *);
+ int (*done)(struct netlink_callback *);
+ void *data;
+ struct module *module;
+ struct netlink_ext_ack *extack;
+ u16 family;
+ u16 answer_flags;
+ u32 min_dump_alloc;
+ unsigned int prev_seq;
+ unsigned int seq;
+ bool strict_check;
+ union {
+ u8 ctx[48];
+ long int args[6];
+ };
+};
+
+struct ndmsg {
+ __u8 ndm_family;
+ __u8 ndm_pad1;
+ __u16 ndm_pad2;
+ __s32 ndm_ifindex;
+ __u16 ndm_state;
+ __u8 ndm_flags;
+ __u8 ndm_type;
+};
+
+typedef struct {
+ unsigned int clock_rate;
+ unsigned int clock_type;
+ short unsigned int loopback;
+} sync_serial_settings;
+
+typedef struct {
+ unsigned int clock_rate;
+ unsigned int clock_type;
+ short unsigned int loopback;
+ unsigned int slot_map;
+} te1_settings;
+
+typedef struct {
+ short unsigned int encoding;
+ short unsigned int parity;
+} raw_hdlc_proto;
+
+typedef struct {
+ unsigned int t391;
+ unsigned int t392;
+ unsigned int n391;
+ unsigned int n392;
+ unsigned int n393;
+ short unsigned int lmi;
+ short unsigned int dce;
+} fr_proto;
+
+typedef struct {
+ unsigned int dlci;
+} fr_proto_pvc;
+
+typedef struct {
+ unsigned int dlci;
+ char master[16];
+} fr_proto_pvc_info;
+
+typedef struct {
+ unsigned int interval;
+ unsigned int timeout;
+} cisco_proto;
+
+typedef struct {
+ short unsigned int dce;
+ unsigned int modulo;
+ unsigned int window;
+ unsigned int t1;
+ unsigned int t2;
+ unsigned int n2;
+} x25_hdlc_proto;
+
+struct ifmap {
+ long unsigned int mem_start;
+ long unsigned int mem_end;
+ short unsigned int base_addr;
+ unsigned char irq;
+ unsigned char dma;
+ unsigned char port;
+};
+
+struct if_settings {
+ unsigned int type;
+ unsigned int size;
+ union {
+ raw_hdlc_proto *raw_hdlc;
+ cisco_proto *cisco;
+ fr_proto *fr;
+ fr_proto_pvc *fr_pvc;
+ fr_proto_pvc_info *fr_pvc_info;
+ x25_hdlc_proto *x25;
+ sync_serial_settings *sync;
+ te1_settings *te1;
+ } ifs_ifsu;
+};
+
+struct ifreq {
+ union {
+ char ifrn_name[16];
+ } ifr_ifrn;
+ union {
+ struct sockaddr ifru_addr;
+ struct sockaddr ifru_dstaddr;
+ struct sockaddr ifru_broadaddr;
+ struct sockaddr ifru_netmask;
+ struct sockaddr ifru_hwaddr;
+ short int ifru_flags;
+ int ifru_ivalue;
+ int ifru_mtu;
+ struct ifmap ifru_map;
+ char ifru_slave[16];
+ char ifru_newname[16];
+ void *ifru_data;
+ struct if_settings ifru_settings;
+ } ifr_ifru;
+};
+
+struct rtnl_link_stats64 {
+ __u64 rx_packets;
+ __u64 tx_packets;
+ __u64 rx_bytes;
+ __u64 tx_bytes;
+ __u64 rx_errors;
+ __u64 tx_errors;
+ __u64 rx_dropped;
+ __u64 tx_dropped;
+ __u64 multicast;
+ __u64 collisions;
+ __u64 rx_length_errors;
+ __u64 rx_over_errors;
+ __u64 rx_crc_errors;
+ __u64 rx_frame_errors;
+ __u64 rx_fifo_errors;
+ __u64 rx_missed_errors;
+ __u64 tx_aborted_errors;
+ __u64 tx_carrier_errors;
+ __u64 tx_fifo_errors;
+ __u64 tx_heartbeat_errors;
+ __u64 tx_window_errors;
+ __u64 rx_compressed;
+ __u64 tx_compressed;
+ __u64 rx_nohandler;
+ __u64 rx_otherhost_dropped;
+};
+
+struct rtnl_hw_stats64 {
+ __u64 rx_packets;
+ __u64 tx_packets;
+ __u64 rx_bytes;
+ __u64 tx_bytes;
+ __u64 rx_errors;
+ __u64 tx_errors;
+ __u64 rx_dropped;
+ __u64 tx_dropped;
+ __u64 multicast;
+};
+
+struct ifla_vf_guid {
+ __u32 vf;
+ __u64 guid;
+};
+
+struct ifla_vf_stats {
+ __u64 rx_packets;
+ __u64 tx_packets;
+ __u64 rx_bytes;
+ __u64 tx_bytes;
+ __u64 broadcast;
+ __u64 multicast;
+ __u64 rx_dropped;
+ __u64 tx_dropped;
+};
+
+struct ifla_vf_info {
+ __u32 vf;
+ __u8 mac[32];
+ __u32 vlan;
+ __u32 qos;
+ __u32 spoofchk;
+ __u32 linkstate;
+ __u32 min_tx_rate;
+ __u32 max_tx_rate;
+ __u32 rss_query_en;
+ __u32 trusted;
+ __be16 vlan_proto;
+};
+
+enum netdev_tx {
+ __NETDEV_TX_MIN = -2147483648,
+ NETDEV_TX_OK = 0,
+ NETDEV_TX_BUSY = 16,
+};
+
+typedef enum netdev_tx netdev_tx_t;
+
+struct net_device_core_stats {
+ long unsigned int rx_dropped;
+ long unsigned int tx_dropped;
+ long unsigned int rx_nohandler;
+ long unsigned int rx_otherhost_dropped;
+};
+
+struct header_ops {
+ int (*create)(struct sk_buff *, struct net_device *, short unsigned int, const void *, const void *, unsigned int);
+ int (*parse)(const struct sk_buff *, unsigned char *);
+ int (*cache)(const struct neighbour *, struct hh_cache *, __be16);
+ void (*cache_update)(struct hh_cache *, const struct net_device *, const unsigned char *);
+ bool (*validate)(const char *, unsigned int);
+ __be16 (*parse_protocol)(const struct sk_buff *);
+};
+
+enum netdev_state_t {
+ __LINK_STATE_START = 0,
+ __LINK_STATE_PRESENT = 1,
+ __LINK_STATE_NOCARRIER = 2,
+ __LINK_STATE_LINKWATCH_PENDING = 3,
+ __LINK_STATE_DORMANT = 4,
+ __LINK_STATE_TESTING = 5,
+};
+
+struct xsk_buff_pool;
+
+struct netdev_queue {
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ struct Qdisc *qdisc;
+ struct Qdisc *qdisc_sleeping;
+ struct kobject kobj;
+ int numa_node;
+ long unsigned int tx_maxrate;
+ atomic_long_t trans_timeout;
+ struct net_device *sb_dev;
+ struct xsk_buff_pool *pool;
+ spinlock_t _xmit_lock;
+ int xmit_lock_owner;
+ long unsigned int trans_start;
+ long unsigned int state;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct dql dql;
+};
+
+struct rps_map {
+ unsigned int len;
+ struct callback_head rcu;
+ u16 cpus[0];
+};
+
+struct rps_dev_flow {
+ u16 cpu;
+ u16 filter;
+ unsigned int last_qtail;
+};
+
+struct rps_dev_flow_table {
+ unsigned int mask;
+ struct callback_head rcu;
+ struct rps_dev_flow flows[0];
+};
+
+struct netdev_rx_queue {
+ struct xdp_rxq_info xdp_rxq;
+ struct rps_map *rps_map;
+ struct rps_dev_flow_table *rps_flow_table;
+ struct kobject kobj;
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ struct xsk_buff_pool *pool;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct xps_map {
+ unsigned int len;
+ unsigned int alloc_len;
+ struct callback_head rcu;
+ u16 queues[0];
+};
+
+struct xps_dev_maps {
+ struct callback_head rcu;
+ unsigned int nr_ids;
+ s16 num_tc;
+ struct xps_map *attr_map[0];
+};
+
+struct netdev_phys_item_id {
+ unsigned char id[32];
+ unsigned char id_len;
+};
+
+enum net_device_path_type {
+ DEV_PATH_ETHERNET = 0,
+ DEV_PATH_VLAN = 1,
+ DEV_PATH_BRIDGE = 2,
+ DEV_PATH_PPPOE = 3,
+ DEV_PATH_DSA = 4,
+ DEV_PATH_MTK_WDMA = 5,
+};
+
+struct net_device_path {
+ enum net_device_path_type type;
+ const struct net_device *dev;
+ union {
+ struct {
+ u16 id;
+ __be16 proto;
+ u8 h_dest[6];
+ } encap;
+ struct {
+ enum {
+ DEV_PATH_BR_VLAN_KEEP = 0,
+ DEV_PATH_BR_VLAN_TAG = 1,
+ DEV_PATH_BR_VLAN_UNTAG = 2,
+ DEV_PATH_BR_VLAN_UNTAG_HW = 3,
+ } vlan_mode;
+ u16 vlan_id;
+ __be16 vlan_proto;
+ } bridge;
+ struct {
+ int port;
+ u16 proto;
+ } dsa;
+ struct {
+ u8 wdma_idx;
+ u8 queue;
+ u16 wcid;
+ u8 bss;
+ } mtk_wdma;
+ };
+};
+
+struct net_device_path_ctx {
+ const struct net_device *dev;
+ u8 daddr[6];
+ int num_vlans;
+ struct {
+ u16 id;
+ __be16 proto;
+ } vlan[2];
+};
+
+enum tc_setup_type {
+ TC_QUERY_CAPS = 0,
+ TC_SETUP_QDISC_MQPRIO = 1,
+ TC_SETUP_CLSU32 = 2,
+ TC_SETUP_CLSFLOWER = 3,
+ TC_SETUP_CLSMATCHALL = 4,
+ TC_SETUP_CLSBPF = 5,
+ TC_SETUP_BLOCK = 6,
+ TC_SETUP_QDISC_CBS = 7,
+ TC_SETUP_QDISC_RED = 8,
+ TC_SETUP_QDISC_PRIO = 9,
+ TC_SETUP_QDISC_MQ = 10,
+ TC_SETUP_QDISC_ETF = 11,
+ TC_SETUP_ROOT_QDISC = 12,
+ TC_SETUP_QDISC_GRED = 13,
+ TC_SETUP_QDISC_TAPRIO = 14,
+ TC_SETUP_FT = 15,
+ TC_SETUP_QDISC_ETS = 16,
+ TC_SETUP_QDISC_TBF = 17,
+ TC_SETUP_QDISC_FIFO = 18,
+ TC_SETUP_QDISC_HTB = 19,
+ TC_SETUP_ACT = 20,
+};
+
+enum bpf_netdev_command {
+ XDP_SETUP_PROG = 0,
+ XDP_SETUP_PROG_HW = 1,
+ BPF_OFFLOAD_MAP_ALLOC = 2,
+ BPF_OFFLOAD_MAP_FREE = 3,
+ XDP_SETUP_XSK_POOL = 4,
+};
+
+struct bpf_offloaded_map;
+
+struct netdev_bpf {
+ enum bpf_netdev_command command;
+ union {
+ struct {
+ u32 flags;
+ struct bpf_prog *prog;
+ struct netlink_ext_ack *extack;
+ };
+ struct {
+ struct bpf_offloaded_map *offmap;
+ };
+ struct {
+ struct xsk_buff_pool *pool;
+ u16 queue_id;
+ } xsk;
+ };
+};
+
+struct dev_ifalias {
+ struct callback_head rcuhead;
+ char ifalias[0];
+};
+
+struct ip_tunnel_parm;
+
+struct net_device_ops {
+ int (*ndo_init)(struct net_device *);
+ void (*ndo_uninit)(struct net_device *);
+ int (*ndo_open)(struct net_device *);
+ int (*ndo_stop)(struct net_device *);
+ netdev_tx_t (*ndo_start_xmit)(struct sk_buff *, struct net_device *);
+ netdev_features_t (*ndo_features_check)(struct sk_buff *, struct net_device *, netdev_features_t);
+ u16 (*ndo_select_queue)(struct net_device *, struct sk_buff *, struct net_device *);
+ void (*ndo_change_rx_flags)(struct net_device *, int);
+ void (*ndo_set_rx_mode)(struct net_device *);
+ int (*ndo_set_mac_address)(struct net_device *, void *);
+ int (*ndo_validate_addr)(struct net_device *);
+ int (*ndo_do_ioctl)(struct net_device *, struct ifreq *, int);
+ int (*ndo_eth_ioctl)(struct net_device *, struct ifreq *, int);
+ int (*ndo_siocbond)(struct net_device *, struct ifreq *, int);
+ int (*ndo_siocwandev)(struct net_device *, struct if_settings *);
+ int (*ndo_siocdevprivate)(struct net_device *, struct ifreq *, void *, int);
+ int (*ndo_set_config)(struct net_device *, struct ifmap *);
+ int (*ndo_change_mtu)(struct net_device *, int);
+ int (*ndo_neigh_setup)(struct net_device *, struct neigh_parms *);
+ void (*ndo_tx_timeout)(struct net_device *, unsigned int);
+ void (*ndo_get_stats64)(struct net_device *, struct rtnl_link_stats64 *);
+ bool (*ndo_has_offload_stats)(const struct net_device *, int);
+ int (*ndo_get_offload_stats)(int, const struct net_device *, void *);
+ struct net_device_stats * (*ndo_get_stats)(struct net_device *);
+ int (*ndo_vlan_rx_add_vid)(struct net_device *, __be16, u16);
+ int (*ndo_vlan_rx_kill_vid)(struct net_device *, __be16, u16);
+ int (*ndo_set_vf_mac)(struct net_device *, int, u8 *);
+ int (*ndo_set_vf_vlan)(struct net_device *, int, u16, u8, __be16);
+ int (*ndo_set_vf_rate)(struct net_device *, int, int, int);
+ int (*ndo_set_vf_spoofchk)(struct net_device *, int, bool);
+ int (*ndo_set_vf_trust)(struct net_device *, int, bool);
+ int (*ndo_get_vf_config)(struct net_device *, int, struct ifla_vf_info *);
+ int (*ndo_set_vf_link_state)(struct net_device *, int, int);
+ int (*ndo_get_vf_stats)(struct net_device *, int, struct ifla_vf_stats *);
+ int (*ndo_set_vf_port)(struct net_device *, int, struct nlattr **);
+ int (*ndo_get_vf_port)(struct net_device *, int, struct sk_buff *);
+ int (*ndo_get_vf_guid)(struct net_device *, int, struct ifla_vf_guid *, struct ifla_vf_guid *);
+ int (*ndo_set_vf_guid)(struct net_device *, int, u64, int);
+ int (*ndo_set_vf_rss_query_en)(struct net_device *, int, bool);
+ int (*ndo_setup_tc)(struct net_device *, enum tc_setup_type, void *);
+ int (*ndo_rx_flow_steer)(struct net_device *, const struct sk_buff *, u16, u32);
+ int (*ndo_add_slave)(struct net_device *, struct net_device *, struct netlink_ext_ack *);
+ int (*ndo_del_slave)(struct net_device *, struct net_device *);
+ struct net_device * (*ndo_get_xmit_slave)(struct net_device *, struct sk_buff *, bool);
+ struct net_device * (*ndo_sk_get_lower_dev)(struct net_device *, struct sock *);
+ netdev_features_t (*ndo_fix_features)(struct net_device *, netdev_features_t);
+ int (*ndo_set_features)(struct net_device *, netdev_features_t);
+ int (*ndo_neigh_construct)(struct net_device *, struct neighbour *);
+ void (*ndo_neigh_destroy)(struct net_device *, struct neighbour *);
+ int (*ndo_fdb_add)(struct ndmsg *, struct nlattr **, struct net_device *, const unsigned char *, u16, u16, struct netlink_ext_ack *);
+ int (*ndo_fdb_del)(struct ndmsg *, struct nlattr **, struct net_device *, const unsigned char *, u16, struct netlink_ext_ack *);
+ int (*ndo_fdb_del_bulk)(struct ndmsg *, struct nlattr **, struct net_device *, u16, struct netlink_ext_ack *);
+ int (*ndo_fdb_dump)(struct sk_buff *, struct netlink_callback *, struct net_device *, struct net_device *, int *);
+ int (*ndo_fdb_get)(struct sk_buff *, struct nlattr **, struct net_device *, const unsigned char *, u16, u32, u32, struct netlink_ext_ack *);
+ int (*ndo_bridge_setlink)(struct net_device *, struct nlmsghdr *, u16, struct netlink_ext_ack *);
+ int (*ndo_bridge_getlink)(struct sk_buff *, u32, u32, struct net_device *, u32, int);
+ int (*ndo_bridge_dellink)(struct net_device *, struct nlmsghdr *, u16);
+ int (*ndo_change_carrier)(struct net_device *, bool);
+ int (*ndo_get_phys_port_id)(struct net_device *, struct netdev_phys_item_id *);
+ int (*ndo_get_port_parent_id)(struct net_device *, struct netdev_phys_item_id *);
+ int (*ndo_get_phys_port_name)(struct net_device *, char *, size_t);
+ void * (*ndo_dfwd_add_station)(struct net_device *, struct net_device *);
+ void (*ndo_dfwd_del_station)(struct net_device *, void *);
+ int (*ndo_set_tx_maxrate)(struct net_device *, int, u32);
+ int (*ndo_get_iflink)(const struct net_device *);
+ int (*ndo_fill_metadata_dst)(struct net_device *, struct sk_buff *);
+ void (*ndo_set_rx_headroom)(struct net_device *, int);
+ int (*ndo_bpf)(struct net_device *, struct netdev_bpf *);
+ int (*ndo_xdp_xmit)(struct net_device *, int, struct xdp_frame **, u32);
+ struct net_device * (*ndo_xdp_get_xmit_slave)(struct net_device *, struct xdp_buff *);
+ int (*ndo_xsk_wakeup)(struct net_device *, u32, u32);
+ int (*ndo_tunnel_ctl)(struct net_device *, struct ip_tunnel_parm *, int);
+ struct net_device * (*ndo_get_peer_dev)(struct net_device *);
+ int (*ndo_fill_forward_path)(struct net_device_path_ctx *, struct net_device_path *);
+ ktime_t (*ndo_get_tstamp)(struct net_device *, const struct skb_shared_hwtstamps *, bool);
+};
+
+struct neigh_parms {
+ possible_net_t net;
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ struct list_head list;
+ int (*neigh_setup)(struct neighbour *);
+ struct neigh_table *tbl;
+ void *sysctl_table;
+ int dead;
+ refcount_t refcnt;
+ struct callback_head callback_head;
+ int reachable_time;
+ u32 qlen;
+ int data[14];
+ long unsigned int data_state[1];
+};
+
+struct iphdr {
+ __u8 ihl: 4;
+ __u8 version: 4;
+ __u8 tos;
+ __be16 tot_len;
+ __be16 id;
+ __be16 frag_off;
+ __u8 ttl;
+ __u8 protocol;
+ __sum16 check;
+ union {
+ struct {
+ __be32 saddr;
+ __be32 daddr;
+ };
+ struct {
+ __be32 saddr;
+ __be32 daddr;
+ } addrs;
+ };
+};
+
+struct ip_tunnel_parm {
+ char name[16];
+ int link;
+ __be16 i_flags;
+ __be16 o_flags;
+ __be32 i_key;
+ __be32 o_key;
+ struct iphdr iph;
+};
+
+struct pcpu_lstats {
+ u64_stats_t packets;
+ u64_stats_t bytes;
+ struct u64_stats_sync syncp;
+};
+
+struct pcpu_sw_netstats {
+ u64_stats_t rx_packets;
+ u64_stats_t rx_bytes;
+ u64_stats_t tx_packets;
+ u64_stats_t tx_bytes;
+ struct u64_stats_sync syncp;
+};
+
+enum ethtool_phys_id_state {
+ ETHTOOL_ID_INACTIVE = 0,
+ ETHTOOL_ID_ACTIVE = 1,
+ ETHTOOL_ID_ON = 2,
+ ETHTOOL_ID_OFF = 3,
+};
+
+struct ethtool_drvinfo;
+
+struct ethtool_regs;
+
+struct ethtool_wolinfo;
+
+struct ethtool_link_ext_state_info;
+
+struct ethtool_link_ext_stats;
+
+struct ethtool_eeprom;
+
+struct ethtool_coalesce;
+
+struct kernel_ethtool_coalesce;
+
+struct ethtool_ringparam;
+
+struct kernel_ethtool_ringparam;
+
+struct ethtool_pause_stats;
+
+struct ethtool_pauseparam;
+
+struct ethtool_test;
+
+struct ethtool_stats;
+
+struct ethtool_rxnfc;
+
+struct ethtool_flash;
+
+struct ethtool_channels;
+
+struct ethtool_dump;
+
+struct ethtool_ts_info;
+
+struct ethtool_modinfo;
+
+struct ethtool_eee;
+
+struct ethtool_tunable;
+
+struct ethtool_link_ksettings;
+
+struct ethtool_fec_stats;
+
+struct ethtool_fecparam;
+
+struct ethtool_module_eeprom;
+
+struct ethtool_eth_phy_stats;
+
+struct ethtool_eth_mac_stats;
+
+struct ethtool_eth_ctrl_stats;
+
+struct ethtool_rmon_stats;
+
+struct ethtool_rmon_hist_range;
+
+struct ethtool_module_power_mode_params;
+
+struct ethtool_ops {
+ u32 cap_link_lanes_supported: 1;
+ u32 supported_coalesce_params;
+ u32 supported_ring_params;
+ void (*get_drvinfo)(struct net_device *, struct ethtool_drvinfo *);
+ int (*get_regs_len)(struct net_device *);
+ void (*get_regs)(struct net_device *, struct ethtool_regs *, void *);
+ void (*get_wol)(struct net_device *, struct ethtool_wolinfo *);
+ int (*set_wol)(struct net_device *, struct ethtool_wolinfo *);
+ u32 (*get_msglevel)(struct net_device *);
+ void (*set_msglevel)(struct net_device *, u32);
+ int (*nway_reset)(struct net_device *);
+ u32 (*get_link)(struct net_device *);
+ int (*get_link_ext_state)(struct net_device *, struct ethtool_link_ext_state_info *);
+ void (*get_link_ext_stats)(struct net_device *, struct ethtool_link_ext_stats *);
+ int (*get_eeprom_len)(struct net_device *);
+ int (*get_eeprom)(struct net_device *, struct ethtool_eeprom *, u8 *);
+ int (*set_eeprom)(struct net_device *, struct ethtool_eeprom *, u8 *);
+ int (*get_coalesce)(struct net_device *, struct ethtool_coalesce *, struct kernel_ethtool_coalesce *, struct netlink_ext_ack *);
+ int (*set_coalesce)(struct net_device *, struct ethtool_coalesce *, struct kernel_ethtool_coalesce *, struct netlink_ext_ack *);
+ void (*get_ringparam)(struct net_device *, struct ethtool_ringparam *, struct kernel_ethtool_ringparam *, struct netlink_ext_ack *);
+ int (*set_ringparam)(struct net_device *, struct ethtool_ringparam *, struct kernel_ethtool_ringparam *, struct netlink_ext_ack *);
+ void (*get_pause_stats)(struct net_device *, struct ethtool_pause_stats *);
+ void (*get_pauseparam)(struct net_device *, struct ethtool_pauseparam *);
+ int (*set_pauseparam)(struct net_device *, struct ethtool_pauseparam *);
+ void (*self_test)(struct net_device *, struct ethtool_test *, u64 *);
+ void (*get_strings)(struct net_device *, u32, u8 *);
+ int (*set_phys_id)(struct net_device *, enum ethtool_phys_id_state);
+ void (*get_ethtool_stats)(struct net_device *, struct ethtool_stats *, u64 *);
+ int (*begin)(struct net_device *);
+ void (*complete)(struct net_device *);
+ u32 (*get_priv_flags)(struct net_device *);
+ int (*set_priv_flags)(struct net_device *, u32);
+ int (*get_sset_count)(struct net_device *, int);
+ int (*get_rxnfc)(struct net_device *, struct ethtool_rxnfc *, u32 *);
+ int (*set_rxnfc)(struct net_device *, struct ethtool_rxnfc *);
+ int (*flash_device)(struct net_device *, struct ethtool_flash *);
+ int (*reset)(struct net_device *, u32 *);
+ u32 (*get_rxfh_key_size)(struct net_device *);
+ u32 (*get_rxfh_indir_size)(struct net_device *);
+ int (*get_rxfh)(struct net_device *, u32 *, u8 *, u8 *);
+ int (*set_rxfh)(struct net_device *, const u32 *, const u8 *, const u8);
+ int (*get_rxfh_context)(struct net_device *, u32 *, u8 *, u8 *, u32);
+ int (*set_rxfh_context)(struct net_device *, const u32 *, const u8 *, const u8, u32 *, bool);
+ void (*get_channels)(struct net_device *, struct ethtool_channels *);
+ int (*set_channels)(struct net_device *, struct ethtool_channels *);
+ int (*get_dump_flag)(struct net_device *, struct ethtool_dump *);
+ int (*get_dump_data)(struct net_device *, struct ethtool_dump *, void *);
+ int (*set_dump)(struct net_device *, struct ethtool_dump *);
+ int (*get_ts_info)(struct net_device *, struct ethtool_ts_info *);
+ int (*get_module_info)(struct net_device *, struct ethtool_modinfo *);
+ int (*get_module_eeprom)(struct net_device *, struct ethtool_eeprom *, u8 *);
+ int (*get_eee)(struct net_device *, struct ethtool_eee *);
+ int (*set_eee)(struct net_device *, struct ethtool_eee *);
+ int (*get_tunable)(struct net_device *, const struct ethtool_tunable *, void *);
+ int (*set_tunable)(struct net_device *, const struct ethtool_tunable *, const void *);
+ int (*get_per_queue_coalesce)(struct net_device *, u32, struct ethtool_coalesce *);
+ int (*set_per_queue_coalesce)(struct net_device *, u32, struct ethtool_coalesce *);
+ int (*get_link_ksettings)(struct net_device *, struct ethtool_link_ksettings *);
+ int (*set_link_ksettings)(struct net_device *, const struct ethtool_link_ksettings *);
+ void (*get_fec_stats)(struct net_device *, struct ethtool_fec_stats *);
+ int (*get_fecparam)(struct net_device *, struct ethtool_fecparam *);
+ int (*set_fecparam)(struct net_device *, struct ethtool_fecparam *);
+ void (*get_ethtool_phy_stats)(struct net_device *, struct ethtool_stats *, u64 *);
+ int (*get_phy_tunable)(struct net_device *, const struct ethtool_tunable *, void *);
+ int (*set_phy_tunable)(struct net_device *, const struct ethtool_tunable *, const void *);
+ int (*get_module_eeprom_by_page)(struct net_device *, const struct ethtool_module_eeprom *, struct netlink_ext_ack *);
+ void (*get_eth_phy_stats)(struct net_device *, struct ethtool_eth_phy_stats *);
+ void (*get_eth_mac_stats)(struct net_device *, struct ethtool_eth_mac_stats *);
+ void (*get_eth_ctrl_stats)(struct net_device *, struct ethtool_eth_ctrl_stats *);
+ void (*get_rmon_stats)(struct net_device *, struct ethtool_rmon_stats *, const struct ethtool_rmon_hist_range **);
+ int (*get_module_power_mode)(struct net_device *, struct ethtool_module_power_mode_params *, struct netlink_ext_ack *);
+ int (*set_module_power_mode)(struct net_device *, const struct ethtool_module_power_mode_params *, struct netlink_ext_ack *);
+};
+
+struct l3mdev_ops {
+ u32 (*l3mdev_fib_table)(const struct net_device *);
+ struct sk_buff * (*l3mdev_l3_rcv)(struct net_device *, struct sk_buff *, u16);
+ struct sk_buff * (*l3mdev_l3_out)(struct net_device *, struct sock *, struct sk_buff *, u16);
+ struct dst_entry * (*l3mdev_link_scope_lookup)(const struct net_device *, struct flowi6 *);
+};
+
+struct nd_opt_hdr;
+
+struct ndisc_options;
+
+struct prefix_info;
+
+struct ndisc_ops {
+ int (*is_useropt)(u8);
+ int (*parse_options)(const struct net_device *, struct nd_opt_hdr *, struct ndisc_options *);
+ void (*update)(const struct net_device *, struct neighbour *, u32, u8, const struct ndisc_options *);
+ int (*opt_addr_space)(const struct net_device *, u8, struct neighbour *, u8 *, u8 **);
+ void (*fill_addr_option)(const struct net_device *, struct sk_buff *, u8, const u8 *);
+ void (*prefix_rcv_add_addr)(struct net *, struct net_device *, const struct prefix_info *, struct inet6_dev *, struct in6_addr *, int, u32, bool, bool, __u32, u32, bool);
+};
+
+struct ipv6_devstat {
+ struct proc_dir_entry *proc_dir_entry;
+ struct ipstats_mib *ipv6;
+ struct icmpv6_mib_device *icmpv6dev;
+ struct icmpv6msg_mib_device *icmpv6msgdev;
+};
+
+struct ifmcaddr6;
+
+struct ifacaddr6;
+
+struct inet6_dev {
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ struct list_head addr_list;
+ struct ifmcaddr6 *mc_list;
+ struct ifmcaddr6 *mc_tomb;
+ unsigned char mc_qrv;
+ unsigned char mc_gq_running;
+ unsigned char mc_ifc_count;
+ unsigned char mc_dad_count;
+ long unsigned int mc_v1_seen;
+ long unsigned int mc_qi;
+ long unsigned int mc_qri;
+ long unsigned int mc_maxdelay;
+ struct delayed_work mc_gq_work;
+ struct delayed_work mc_ifc_work;
+ struct delayed_work mc_dad_work;
+ struct delayed_work mc_query_work;
+ struct delayed_work mc_report_work;
+ struct sk_buff_head mc_query_queue;
+ struct sk_buff_head mc_report_queue;
+ spinlock_t mc_query_lock;
+ spinlock_t mc_report_lock;
+ struct mutex mc_lock;
+ struct ifacaddr6 *ac_list;
+ rwlock_t lock;
+ refcount_t refcnt;
+ __u32 if_flags;
+ int dead;
+ u32 desync_factor;
+ struct list_head tempaddr_list;
+ struct in6_addr token;
+ struct neigh_parms *nd_parms;
+ struct ipv6_devconf cnf;
+ struct ipv6_devstat stats;
+ struct timer_list rs_timer;
+ __s32 rs_interval;
+ __u8 rs_probes;
+ long unsigned int tstamp;
+ struct callback_head rcu;
+ unsigned int ra_mtu;
+};
+
+struct rtnl_link_ops {
+ struct list_head list;
+ const char *kind;
+ size_t priv_size;
+ struct net_device * (*alloc)(struct nlattr **, const char *, unsigned char, unsigned int, unsigned int);
+ void (*setup)(struct net_device *);
+ bool netns_refund;
+ unsigned int maxtype;
+ const struct nla_policy *policy;
+ int (*validate)(struct nlattr **, struct nlattr **, struct netlink_ext_ack *);
+ int (*newlink)(struct net *, struct net_device *, struct nlattr **, struct nlattr **, struct netlink_ext_ack *);
+ int (*changelink)(struct net_device *, struct nlattr **, struct nlattr **, struct netlink_ext_ack *);
+ void (*dellink)(struct net_device *, struct list_head *);
+ size_t (*get_size)(const struct net_device *);
+ int (*fill_info)(struct sk_buff *, const struct net_device *);
+ size_t (*get_xstats_size)(const struct net_device *);
+ int (*fill_xstats)(struct sk_buff *, const struct net_device *);
+ unsigned int (*get_num_tx_queues)();
+ unsigned int (*get_num_rx_queues)();
+ unsigned int slave_maxtype;
+ const struct nla_policy *slave_policy;
+ int (*slave_changelink)(struct net_device *, struct net_device *, struct nlattr **, struct nlattr **, struct netlink_ext_ack *);
+ size_t (*get_slave_size)(const struct net_device *, const struct net_device *);
+ int (*fill_slave_info)(struct sk_buff *, const struct net_device *, const struct net_device *);
+ struct net * (*get_link_net)(const struct net_device *);
+ size_t (*get_linkxstats_size)(const struct net_device *, int);
+ int (*fill_linkxstats)(struct sk_buff *, const struct net_device *, int *, int);
+};
+
+struct udp_tunnel_nic_table_info {
+ unsigned int n_entries;
+ unsigned int tunnel_types;
+};
+
+struct udp_tunnel_info;
+
+struct udp_tunnel_nic_shared;
+
+struct udp_tunnel_nic_info {
+ int (*set_port)(struct net_device *, unsigned int, unsigned int, struct udp_tunnel_info *);
+ int (*unset_port)(struct net_device *, unsigned int, unsigned int, struct udp_tunnel_info *);
+ int (*sync_table)(struct net_device *, unsigned int);
+ struct udp_tunnel_nic_shared *shared;
+ unsigned int flags;
+ struct udp_tunnel_nic_table_info tables[4];
+};
+
+enum devlink_port_type {
+ DEVLINK_PORT_TYPE_NOTSET = 0,
+ DEVLINK_PORT_TYPE_AUTO = 1,
+ DEVLINK_PORT_TYPE_ETH = 2,
+ DEVLINK_PORT_TYPE_IB = 3,
+};
+
+enum devlink_port_flavour {
+ DEVLINK_PORT_FLAVOUR_PHYSICAL = 0,
+ DEVLINK_PORT_FLAVOUR_CPU = 1,
+ DEVLINK_PORT_FLAVOUR_DSA = 2,
+ DEVLINK_PORT_FLAVOUR_PCI_PF = 3,
+ DEVLINK_PORT_FLAVOUR_PCI_VF = 4,
+ DEVLINK_PORT_FLAVOUR_VIRTUAL = 5,
+ DEVLINK_PORT_FLAVOUR_UNUSED = 6,
+ DEVLINK_PORT_FLAVOUR_PCI_SF = 7,
+};
+
+struct devlink_port_phys_attrs {
+ u32 port_number;
+ u32 split_subport_number;
+};
+
+struct devlink_port_pci_pf_attrs {
+ u32 controller;
+ u16 pf;
+ u8 external: 1;
+};
+
+struct devlink_port_pci_vf_attrs {
+ u32 controller;
+ u16 pf;
+ u16 vf;
+ u8 external: 1;
+};
+
+struct devlink_port_pci_sf_attrs {
+ u32 controller;
+ u32 sf;
+ u16 pf;
+ u8 external: 1;
+};
+
+struct devlink_port_attrs {
+ u8 split: 1;
+ u8 splittable: 1;
+ u32 lanes;
+ enum devlink_port_flavour flavour;
+ struct netdev_phys_item_id switch_id;
+ union {
+ struct devlink_port_phys_attrs phys;
+ struct devlink_port_pci_pf_attrs pci_pf;
+ struct devlink_port_pci_vf_attrs pci_vf;
+ struct devlink_port_pci_sf_attrs pci_sf;
+ };
+};
+
+struct devlink;
+
+struct ib_device;
+
+struct devlink_rate;
+
+struct devlink_linecard;
+
+struct devlink_port {
+ struct list_head list;
+ struct list_head region_list;
+ struct devlink *devlink;
+ unsigned int index;
+ spinlock_t type_lock;
+ enum devlink_port_type type;
+ enum devlink_port_type desired_type;
+ union {
+ struct {
+ struct net_device *netdev;
+ int ifindex;
+ char ifname[16];
+ } type_eth;
+ struct {
+ struct ib_device *ibdev;
+ } type_ib;
+ };
+ struct devlink_port_attrs attrs;
+ u8 attrs_set: 1;
+ u8 switch_port: 1;
+ u8 registered: 1;
+ u8 initialized: 1;
+ struct delayed_work type_warn_dw;
+ struct list_head reporter_list;
+ struct mutex reporters_lock;
+ struct devlink_rate *devlink_rate;
+ struct devlink_linecard *linecard;
+};
+
+enum {
+ RTAX_UNSPEC = 0,
+ RTAX_LOCK = 1,
+ RTAX_MTU = 2,
+ RTAX_WINDOW = 3,
+ RTAX_RTT = 4,
+ RTAX_RTTVAR = 5,
+ RTAX_SSTHRESH = 6,
+ RTAX_CWND = 7,
+ RTAX_ADVMSS = 8,
+ RTAX_REORDERING = 9,
+ RTAX_HOPLIMIT = 10,
+ RTAX_INITCWND = 11,
+ RTAX_FEATURES = 12,
+ RTAX_RTO_MIN = 13,
+ RTAX_INITRWND = 14,
+ RTAX_QUICKACK = 15,
+ RTAX_CC_ALGO = 16,
+ RTAX_FASTOPEN_NO_COOKIE = 17,
+ __RTAX_MAX = 18,
+};
+
+enum flow_action_hw_stats_bit {
+ FLOW_ACTION_HW_STATS_IMMEDIATE_BIT = 0,
+ FLOW_ACTION_HW_STATS_DELAYED_BIT = 1,
+ FLOW_ACTION_HW_STATS_DISABLED_BIT = 2,
+ FLOW_ACTION_HW_STATS_NUM_BITS = 3,
+};
+
+struct flow_action_cookie {
+ u32 cookie_len;
+ u8 cookie[0];
+};
+
+enum devlink_sb_pool_type {
+ DEVLINK_SB_POOL_TYPE_INGRESS = 0,
+ DEVLINK_SB_POOL_TYPE_EGRESS = 1,
+};
+
+enum devlink_sb_threshold_type {
+ DEVLINK_SB_THRESHOLD_TYPE_STATIC = 0,
+ DEVLINK_SB_THRESHOLD_TYPE_DYNAMIC = 1,
+};
+
+enum devlink_eswitch_mode {
+ DEVLINK_ESWITCH_MODE_LEGACY = 0,
+ DEVLINK_ESWITCH_MODE_SWITCHDEV = 1,
+};
+
+enum devlink_eswitch_encap_mode {
+ DEVLINK_ESWITCH_ENCAP_MODE_NONE = 0,
+ DEVLINK_ESWITCH_ENCAP_MODE_BASIC = 1,
+};
+
+enum devlink_rate_type {
+ DEVLINK_RATE_TYPE_LEAF = 0,
+ DEVLINK_RATE_TYPE_NODE = 1,
+};
+
+enum devlink_param_cmode {
+ DEVLINK_PARAM_CMODE_RUNTIME = 0,
+ DEVLINK_PARAM_CMODE_DRIVERINIT = 1,
+ DEVLINK_PARAM_CMODE_PERMANENT = 2,
+ __DEVLINK_PARAM_CMODE_MAX = 3,
+ DEVLINK_PARAM_CMODE_MAX = 2,
+};
+
+enum devlink_selftest_status {
+ DEVLINK_SELFTEST_STATUS_SKIP = 0,
+ DEVLINK_SELFTEST_STATUS_PASS = 1,
+ DEVLINK_SELFTEST_STATUS_FAIL = 2,
+};
+
+enum devlink_trap_action {
+ DEVLINK_TRAP_ACTION_DROP = 0,
+ DEVLINK_TRAP_ACTION_TRAP = 1,
+ DEVLINK_TRAP_ACTION_MIRROR = 2,
+};
+
+enum devlink_trap_type {
+ DEVLINK_TRAP_TYPE_DROP = 0,
+ DEVLINK_TRAP_TYPE_EXCEPTION = 1,
+ DEVLINK_TRAP_TYPE_CONTROL = 2,
+};
+
+enum devlink_reload_action {
+ DEVLINK_RELOAD_ACTION_UNSPEC = 0,
+ DEVLINK_RELOAD_ACTION_DRIVER_REINIT = 1,
+ DEVLINK_RELOAD_ACTION_FW_ACTIVATE = 2,
+ __DEVLINK_RELOAD_ACTION_MAX = 3,
+ DEVLINK_RELOAD_ACTION_MAX = 2,
+};
+
+enum devlink_reload_limit {
+ DEVLINK_RELOAD_LIMIT_UNSPEC = 0,
+ DEVLINK_RELOAD_LIMIT_NO_RESET = 1,
+ __DEVLINK_RELOAD_LIMIT_MAX = 2,
+ DEVLINK_RELOAD_LIMIT_MAX = 1,
+};
+
+enum devlink_resource_unit {
+ DEVLINK_RESOURCE_UNIT_ENTRY = 0,
+};
+
+enum devlink_port_fn_state {
+ DEVLINK_PORT_FN_STATE_INACTIVE = 0,
+ DEVLINK_PORT_FN_STATE_ACTIVE = 1,
+};
+
+enum devlink_port_fn_opstate {
+ DEVLINK_PORT_FN_OPSTATE_DETACHED = 0,
+ DEVLINK_PORT_FN_OPSTATE_ATTACHED = 1,
+};
+
+struct firmware {
+ size_t size;
+ const u8 *data;
+ void *priv;
+};
+
+struct devlink_rate {
+ struct list_head list;
+ enum devlink_rate_type type;
+ struct devlink *devlink;
+ void *priv;
+ u64 tx_share;
+ u64 tx_max;
+ struct devlink_rate *parent;
+ union {
+ struct devlink_port *devlink_port;
+ struct {
+ char *name;
+ refcount_t refcnt;
+ };
+ };
+ u32 tx_priority;
+ u32 tx_weight;
+};
+
+struct devlink_dev_stats {
+ u32 reload_stats[6];
+ u32 remote_reload_stats[6];
+};
+
+struct devlink_dpipe_headers;
+
+struct devlink_ops;
+
+struct devlink {
+ u32 index;
+ struct list_head port_list;
+ struct list_head rate_list;
+ struct list_head sb_list;
+ struct list_head dpipe_table_list;
+ struct list_head resource_list;
+ struct list_head param_list;
+ struct list_head region_list;
+ struct list_head reporter_list;
+ struct mutex reporters_lock;
+ struct devlink_dpipe_headers *dpipe_headers;
+ struct list_head trap_list;
+ struct list_head trap_group_list;
+ struct list_head trap_policer_list;
+ struct list_head linecard_list;
+ struct mutex linecards_lock;
+ const struct devlink_ops *ops;
+ u64 features;
+ struct xarray snapshot_ids;
+ struct devlink_dev_stats stats;
+ struct device *dev;
+ possible_net_t _net;
+ struct mutex lock;
+ struct lock_class_key lock_key;
+ u8 reload_failed: 1;
+ refcount_t refcount;
+ struct completion comp;
+ struct callback_head rcu;
+ struct notifier_block netdevice_nb;
+ long: 64;
+ char priv[0];
+};
+
+struct devlink_port_new_attrs {
+ enum devlink_port_flavour flavour;
+ unsigned int port_index;
+ u32 controller;
+ u32 sfnum;
+ u16 pfnum;
+ u8 port_index_valid: 1;
+ u8 controller_valid: 1;
+ u8 sfnum_valid: 1;
+};
+
+struct devlink_sb_pool_info {
+ enum devlink_sb_pool_type pool_type;
+ u32 size;
+ enum devlink_sb_threshold_type threshold_type;
+ u32 cell_size;
+};
+
+struct devlink_resource_size_params {
+ u64 size_min;
+ u64 size_max;
+ u64 size_granularity;
+ enum devlink_resource_unit unit;
+};
+
+enum devlink_param_type {
+ DEVLINK_PARAM_TYPE_U8 = 0,
+ DEVLINK_PARAM_TYPE_U16 = 1,
+ DEVLINK_PARAM_TYPE_U32 = 2,
+ DEVLINK_PARAM_TYPE_STRING = 3,
+ DEVLINK_PARAM_TYPE_BOOL = 4,
+};
+
+union devlink_param_value {
+ u8 vu8;
+ u16 vu16;
+ u32 vu32;
+ char vstr[32];
+ bool vbool;
+};
+
+struct devlink_param_gset_ctx {
+ union devlink_param_value val;
+ enum devlink_param_cmode cmode;
+};
+
+struct devlink_param {
+ u32 id;
+ const char *name;
+ bool generic;
+ enum devlink_param_type type;
+ long unsigned int supported_cmodes;
+ int (*get)(struct devlink *, u32, struct devlink_param_gset_ctx *);
+ int (*set)(struct devlink *, u32, struct devlink_param_gset_ctx *);
+ int (*validate)(struct devlink *, u32, union devlink_param_value, struct netlink_ext_ack *);
+};
+
+enum devlink_param_generic_id {
+ DEVLINK_PARAM_GENERIC_ID_INT_ERR_RESET = 0,
+ DEVLINK_PARAM_GENERIC_ID_MAX_MACS = 1,
+ DEVLINK_PARAM_GENERIC_ID_ENABLE_SRIOV = 2,
+ DEVLINK_PARAM_GENERIC_ID_REGION_SNAPSHOT = 3,
+ DEVLINK_PARAM_GENERIC_ID_IGNORE_ARI = 4,
+ DEVLINK_PARAM_GENERIC_ID_MSIX_VEC_PER_PF_MAX = 5,
+ DEVLINK_PARAM_GENERIC_ID_MSIX_VEC_PER_PF_MIN = 6,
+ DEVLINK_PARAM_GENERIC_ID_FW_LOAD_POLICY = 7,
+ DEVLINK_PARAM_GENERIC_ID_RESET_DEV_ON_DRV_PROBE = 8,
+ DEVLINK_PARAM_GENERIC_ID_ENABLE_ROCE = 9,
+ DEVLINK_PARAM_GENERIC_ID_ENABLE_REMOTE_DEV_RESET = 10,
+ DEVLINK_PARAM_GENERIC_ID_ENABLE_ETH = 11,
+ DEVLINK_PARAM_GENERIC_ID_ENABLE_RDMA = 12,
+ DEVLINK_PARAM_GENERIC_ID_ENABLE_VNET = 13,
+ DEVLINK_PARAM_GENERIC_ID_ENABLE_IWARP = 14,
+ DEVLINK_PARAM_GENERIC_ID_IO_EQ_SIZE = 15,
+ DEVLINK_PARAM_GENERIC_ID_EVENT_EQ_SIZE = 16,
+ __DEVLINK_PARAM_GENERIC_ID_MAX = 17,
+ DEVLINK_PARAM_GENERIC_ID_MAX = 16,
+};
+
+struct devlink_flash_update_params {
+ const struct firmware *fw;
+ const char *component;
+ u32 overwrite_mask;
+};
+
+struct devlink_region_ops {
+ const char *name;
+ void (*destructor)(const void *);
+ int (*snapshot)(struct devlink *, const struct devlink_region_ops *, struct netlink_ext_ack *, u8 **);
+ void *priv;
+};
+
+struct devlink_trap_policer {
+ u32 id;
+ u64 init_rate;
+ u64 init_burst;
+ u64 max_rate;
+ u64 min_rate;
+ u64 max_burst;
+ u64 min_burst;
+};
+
+struct devlink_trap_group {
+ const char *name;
+ u16 id;
+ bool generic;
+ u32 init_policer_id;
+};
+
+struct devlink_trap {
+ enum devlink_trap_type type;
+ enum devlink_trap_action init_action;
+ bool generic;
+ u16 id;
+ const char *name;
+ u16 init_group_id;
+ u32 metadata_cap;
+};
+
+enum devlink_trap_generic_id {
+ DEVLINK_TRAP_GENERIC_ID_SMAC_MC = 0,
+ DEVLINK_TRAP_GENERIC_ID_VLAN_TAG_MISMATCH = 1,
+ DEVLINK_TRAP_GENERIC_ID_INGRESS_VLAN_FILTER = 2,
+ DEVLINK_TRAP_GENERIC_ID_INGRESS_STP_FILTER = 3,
+ DEVLINK_TRAP_GENERIC_ID_EMPTY_TX_LIST = 4,
+ DEVLINK_TRAP_GENERIC_ID_PORT_LOOPBACK_FILTER = 5,
+ DEVLINK_TRAP_GENERIC_ID_BLACKHOLE_ROUTE = 6,
+ DEVLINK_TRAP_GENERIC_ID_TTL_ERROR = 7,
+ DEVLINK_TRAP_GENERIC_ID_TAIL_DROP = 8,
+ DEVLINK_TRAP_GENERIC_ID_NON_IP_PACKET = 9,
+ DEVLINK_TRAP_GENERIC_ID_UC_DIP_MC_DMAC = 10,
+ DEVLINK_TRAP_GENERIC_ID_DIP_LB = 11,
+ DEVLINK_TRAP_GENERIC_ID_SIP_MC = 12,
+ DEVLINK_TRAP_GENERIC_ID_SIP_LB = 13,
+ DEVLINK_TRAP_GENERIC_ID_CORRUPTED_IP_HDR = 14,
+ DEVLINK_TRAP_GENERIC_ID_IPV4_SIP_BC = 15,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_MC_DIP_RESERVED_SCOPE = 16,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_MC_DIP_INTERFACE_LOCAL_SCOPE = 17,
+ DEVLINK_TRAP_GENERIC_ID_MTU_ERROR = 18,
+ DEVLINK_TRAP_GENERIC_ID_UNRESOLVED_NEIGH = 19,
+ DEVLINK_TRAP_GENERIC_ID_RPF = 20,
+ DEVLINK_TRAP_GENERIC_ID_REJECT_ROUTE = 21,
+ DEVLINK_TRAP_GENERIC_ID_IPV4_LPM_UNICAST_MISS = 22,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_LPM_UNICAST_MISS = 23,
+ DEVLINK_TRAP_GENERIC_ID_NON_ROUTABLE = 24,
+ DEVLINK_TRAP_GENERIC_ID_DECAP_ERROR = 25,
+ DEVLINK_TRAP_GENERIC_ID_OVERLAY_SMAC_MC = 26,
+ DEVLINK_TRAP_GENERIC_ID_INGRESS_FLOW_ACTION_DROP = 27,
+ DEVLINK_TRAP_GENERIC_ID_EGRESS_FLOW_ACTION_DROP = 28,
+ DEVLINK_TRAP_GENERIC_ID_STP = 29,
+ DEVLINK_TRAP_GENERIC_ID_LACP = 30,
+ DEVLINK_TRAP_GENERIC_ID_LLDP = 31,
+ DEVLINK_TRAP_GENERIC_ID_IGMP_QUERY = 32,
+ DEVLINK_TRAP_GENERIC_ID_IGMP_V1_REPORT = 33,
+ DEVLINK_TRAP_GENERIC_ID_IGMP_V2_REPORT = 34,
+ DEVLINK_TRAP_GENERIC_ID_IGMP_V3_REPORT = 35,
+ DEVLINK_TRAP_GENERIC_ID_IGMP_V2_LEAVE = 36,
+ DEVLINK_TRAP_GENERIC_ID_MLD_QUERY = 37,
+ DEVLINK_TRAP_GENERIC_ID_MLD_V1_REPORT = 38,
+ DEVLINK_TRAP_GENERIC_ID_MLD_V2_REPORT = 39,
+ DEVLINK_TRAP_GENERIC_ID_MLD_V1_DONE = 40,
+ DEVLINK_TRAP_GENERIC_ID_IPV4_DHCP = 41,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_DHCP = 42,
+ DEVLINK_TRAP_GENERIC_ID_ARP_REQUEST = 43,
+ DEVLINK_TRAP_GENERIC_ID_ARP_RESPONSE = 44,
+ DEVLINK_TRAP_GENERIC_ID_ARP_OVERLAY = 45,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_NEIGH_SOLICIT = 46,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_NEIGH_ADVERT = 47,
+ DEVLINK_TRAP_GENERIC_ID_IPV4_BFD = 48,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_BFD = 49,
+ DEVLINK_TRAP_GENERIC_ID_IPV4_OSPF = 50,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_OSPF = 51,
+ DEVLINK_TRAP_GENERIC_ID_IPV4_BGP = 52,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_BGP = 53,
+ DEVLINK_TRAP_GENERIC_ID_IPV4_VRRP = 54,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_VRRP = 55,
+ DEVLINK_TRAP_GENERIC_ID_IPV4_PIM = 56,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_PIM = 57,
+ DEVLINK_TRAP_GENERIC_ID_UC_LB = 58,
+ DEVLINK_TRAP_GENERIC_ID_LOCAL_ROUTE = 59,
+ DEVLINK_TRAP_GENERIC_ID_EXTERNAL_ROUTE = 60,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_UC_DIP_LINK_LOCAL_SCOPE = 61,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_DIP_ALL_NODES = 62,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_DIP_ALL_ROUTERS = 63,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_ROUTER_SOLICIT = 64,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_ROUTER_ADVERT = 65,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_REDIRECT = 66,
+ DEVLINK_TRAP_GENERIC_ID_IPV4_ROUTER_ALERT = 67,
+ DEVLINK_TRAP_GENERIC_ID_IPV6_ROUTER_ALERT = 68,
+ DEVLINK_TRAP_GENERIC_ID_PTP_EVENT = 69,
+ DEVLINK_TRAP_GENERIC_ID_PTP_GENERAL = 70,
+ DEVLINK_TRAP_GENERIC_ID_FLOW_ACTION_SAMPLE = 71,
+ DEVLINK_TRAP_GENERIC_ID_FLOW_ACTION_TRAP = 72,
+ DEVLINK_TRAP_GENERIC_ID_EARLY_DROP = 73,
+ DEVLINK_TRAP_GENERIC_ID_VXLAN_PARSING = 74,
+ DEVLINK_TRAP_GENERIC_ID_LLC_SNAP_PARSING = 75,
+ DEVLINK_TRAP_GENERIC_ID_VLAN_PARSING = 76,
+ DEVLINK_TRAP_GENERIC_ID_PPPOE_PPP_PARSING = 77,
+ DEVLINK_TRAP_GENERIC_ID_MPLS_PARSING = 78,
+ DEVLINK_TRAP_GENERIC_ID_ARP_PARSING = 79,
+ DEVLINK_TRAP_GENERIC_ID_IP_1_PARSING = 80,
+ DEVLINK_TRAP_GENERIC_ID_IP_N_PARSING = 81,
+ DEVLINK_TRAP_GENERIC_ID_GRE_PARSING = 82,
+ DEVLINK_TRAP_GENERIC_ID_UDP_PARSING = 83,
+ DEVLINK_TRAP_GENERIC_ID_TCP_PARSING = 84,
+ DEVLINK_TRAP_GENERIC_ID_IPSEC_PARSING = 85,
+ DEVLINK_TRAP_GENERIC_ID_SCTP_PARSING = 86,
+ DEVLINK_TRAP_GENERIC_ID_DCCP_PARSING = 87,
+ DEVLINK_TRAP_GENERIC_ID_GTP_PARSING = 88,
+ DEVLINK_TRAP_GENERIC_ID_ESP_PARSING = 89,
+ DEVLINK_TRAP_GENERIC_ID_BLACKHOLE_NEXTHOP = 90,
+ DEVLINK_TRAP_GENERIC_ID_DMAC_FILTER = 91,
+ DEVLINK_TRAP_GENERIC_ID_EAPOL = 92,
+ DEVLINK_TRAP_GENERIC_ID_LOCKED_PORT = 93,
+ __DEVLINK_TRAP_GENERIC_ID_MAX = 94,
+ DEVLINK_TRAP_GENERIC_ID_MAX = 93,
+};
+
+enum devlink_trap_group_generic_id {
+ DEVLINK_TRAP_GROUP_GENERIC_ID_L2_DROPS = 0,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_L3_DROPS = 1,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_L3_EXCEPTIONS = 2,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_BUFFER_DROPS = 3,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_TUNNEL_DROPS = 4,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_ACL_DROPS = 5,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_STP = 6,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_LACP = 7,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_LLDP = 8,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_MC_SNOOPING = 9,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_DHCP = 10,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_NEIGH_DISCOVERY = 11,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_BFD = 12,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_OSPF = 13,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_BGP = 14,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_VRRP = 15,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_PIM = 16,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_UC_LB = 17,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_LOCAL_DELIVERY = 18,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_EXTERNAL_DELIVERY = 19,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_IPV6 = 20,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_PTP_EVENT = 21,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_PTP_GENERAL = 22,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_ACL_SAMPLE = 23,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_ACL_TRAP = 24,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_PARSER_ERROR_DROPS = 25,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_EAPOL = 26,
+ __DEVLINK_TRAP_GROUP_GENERIC_ID_MAX = 27,
+ DEVLINK_TRAP_GROUP_GENERIC_ID_MAX = 26,
+};
+
+enum {
+ DEVLINK_F_RELOAD = 1,
+};
+
+struct devlink_info_req;
+
+struct devlink_ops {
+ u32 supported_flash_update_params;
+ long unsigned int reload_actions;
+ long unsigned int reload_limits;
+ int (*reload_down)(struct devlink *, bool, enum devlink_reload_action, enum devlink_reload_limit, struct netlink_ext_ack *);
+ int (*reload_up)(struct devlink *, enum devlink_reload_action, enum devlink_reload_limit, u32 *, struct netlink_ext_ack *);
+ int (*port_type_set)(struct devlink_port *, enum devlink_port_type);
+ int (*port_split)(struct devlink *, struct devlink_port *, unsigned int, struct netlink_ext_ack *);
+ int (*port_unsplit)(struct devlink *, struct devlink_port *, struct netlink_ext_ack *);
+ int (*sb_pool_get)(struct devlink *, unsigned int, u16, struct devlink_sb_pool_info *);
+ int (*sb_pool_set)(struct devlink *, unsigned int, u16, u32, enum devlink_sb_threshold_type, struct netlink_ext_ack *);
+ int (*sb_port_pool_get)(struct devlink_port *, unsigned int, u16, u32 *);
+ int (*sb_port_pool_set)(struct devlink_port *, unsigned int, u16, u32, struct netlink_ext_ack *);
+ int (*sb_tc_pool_bind_get)(struct devlink_port *, unsigned int, u16, enum devlink_sb_pool_type, u16 *, u32 *);
+ int (*sb_tc_pool_bind_set)(struct devlink_port *, unsigned int, u16, enum devlink_sb_pool_type, u16, u32, struct netlink_ext_ack *);
+ int (*sb_occ_snapshot)(struct devlink *, unsigned int);
+ int (*sb_occ_max_clear)(struct devlink *, unsigned int);
+ int (*sb_occ_port_pool_get)(struct devlink_port *, unsigned int, u16, u32 *, u32 *);
+ int (*sb_occ_tc_port_bind_get)(struct devlink_port *, unsigned int, u16, enum devlink_sb_pool_type, u32 *, u32 *);
+ int (*eswitch_mode_get)(struct devlink *, u16 *);
+ int (*eswitch_mode_set)(struct devlink *, u16, struct netlink_ext_ack *);
+ int (*eswitch_inline_mode_get)(struct devlink *, u8 *);
+ int (*eswitch_inline_mode_set)(struct devlink *, u8, struct netlink_ext_ack *);
+ int (*eswitch_encap_mode_get)(struct devlink *, enum devlink_eswitch_encap_mode *);
+ int (*eswitch_encap_mode_set)(struct devlink *, enum devlink_eswitch_encap_mode, struct netlink_ext_ack *);
+ int (*info_get)(struct devlink *, struct devlink_info_req *, struct netlink_ext_ack *);
+ int (*flash_update)(struct devlink *, struct devlink_flash_update_params *, struct netlink_ext_ack *);
+ int (*trap_init)(struct devlink *, const struct devlink_trap *, void *);
+ void (*trap_fini)(struct devlink *, const struct devlink_trap *, void *);
+ int (*trap_action_set)(struct devlink *, const struct devlink_trap *, enum devlink_trap_action, struct netlink_ext_ack *);
+ int (*trap_group_init)(struct devlink *, const struct devlink_trap_group *);
+ int (*trap_group_set)(struct devlink *, const struct devlink_trap_group *, const struct devlink_trap_policer *, struct netlink_ext_ack *);
+ int (*trap_group_action_set)(struct devlink *, const struct devlink_trap_group *, enum devlink_trap_action, struct netlink_ext_ack *);
+ int (*trap_drop_counter_get)(struct devlink *, const struct devlink_trap *, u64 *);
+ int (*trap_policer_init)(struct devlink *, const struct devlink_trap_policer *);
+ void (*trap_policer_fini)(struct devlink *, const struct devlink_trap_policer *);
+ int (*trap_policer_set)(struct devlink *, const struct devlink_trap_policer *, u64, u64, struct netlink_ext_ack *);
+ int (*trap_policer_counter_get)(struct devlink *, const struct devlink_trap_policer *, u64 *);
+ int (*port_function_hw_addr_get)(struct devlink_port *, u8 *, int *, struct netlink_ext_ack *);
+ int (*port_function_hw_addr_set)(struct devlink_port *, const u8 *, int, struct netlink_ext_ack *);
+ int (*port_new)(struct devlink *, const struct devlink_port_new_attrs *, struct netlink_ext_ack *, unsigned int *);
+ int (*port_del)(struct devlink *, unsigned int, struct netlink_ext_ack *);
+ int (*port_fn_state_get)(struct devlink_port *, enum devlink_port_fn_state *, enum devlink_port_fn_opstate *, struct netlink_ext_ack *);
+ int (*port_fn_state_set)(struct devlink_port *, enum devlink_port_fn_state, struct netlink_ext_ack *);
+ int (*rate_leaf_tx_share_set)(struct devlink_rate *, void *, u64, struct netlink_ext_ack *);
+ int (*rate_leaf_tx_max_set)(struct devlink_rate *, void *, u64, struct netlink_ext_ack *);
+ int (*rate_leaf_tx_priority_set)(struct devlink_rate *, void *, u32, struct netlink_ext_ack *);
+ int (*rate_leaf_tx_weight_set)(struct devlink_rate *, void *, u32, struct netlink_ext_ack *);
+ int (*rate_node_tx_share_set)(struct devlink_rate *, void *, u64, struct netlink_ext_ack *);
+ int (*rate_node_tx_max_set)(struct devlink_rate *, void *, u64, struct netlink_ext_ack *);
+ int (*rate_node_tx_priority_set)(struct devlink_rate *, void *, u32, struct netlink_ext_ack *);
+ int (*rate_node_tx_weight_set)(struct devlink_rate *, void *, u32, struct netlink_ext_ack *);
+ int (*rate_node_new)(struct devlink_rate *, void **, struct netlink_ext_ack *);
+ int (*rate_node_del)(struct devlink_rate *, void *, struct netlink_ext_ack *);
+ int (*rate_leaf_parent_set)(struct devlink_rate *, struct devlink_rate *, void *, void *, struct netlink_ext_ack *);
+ int (*rate_node_parent_set)(struct devlink_rate *, struct devlink_rate *, void *, void *, struct netlink_ext_ack *);
+ bool (*selftest_check)(struct devlink *, unsigned int, struct netlink_ext_ack *);
+ enum devlink_selftest_status (*selftest_run)(struct devlink *, unsigned int, struct netlink_ext_ack *);
+};
+
+enum devlink_info_version_type {
+ DEVLINK_INFO_VERSION_TYPE_NONE = 0,
+ DEVLINK_INFO_VERSION_TYPE_COMPONENT = 1,
+};
+
+struct netlink_range_validation {
+ u64 min;
+ u64 max;
+};
+
+struct netlink_range_validation_signed {
+ s64 min;
+ s64 max;
+};
+
+enum {
+ NEIGH_VAR_MCAST_PROBES = 0,
+ NEIGH_VAR_UCAST_PROBES = 1,
+ NEIGH_VAR_APP_PROBES = 2,
+ NEIGH_VAR_MCAST_REPROBES = 3,
+ NEIGH_VAR_RETRANS_TIME = 4,
+ NEIGH_VAR_BASE_REACHABLE_TIME = 5,
+ NEIGH_VAR_DELAY_PROBE_TIME = 6,
+ NEIGH_VAR_INTERVAL_PROBE_TIME_MS = 7,
+ NEIGH_VAR_GC_STALETIME = 8,
+ NEIGH_VAR_QUEUE_LEN_BYTES = 9,
+ NEIGH_VAR_PROXY_QLEN = 10,
+ NEIGH_VAR_ANYCAST_DELAY = 11,
+ NEIGH_VAR_PROXY_DELAY = 12,
+ NEIGH_VAR_LOCKTIME = 13,
+ NEIGH_VAR_QUEUE_LEN = 14,
+ NEIGH_VAR_RETRANS_TIME_MS = 15,
+ NEIGH_VAR_BASE_REACHABLE_TIME_MS = 16,
+ NEIGH_VAR_GC_INTERVAL = 17,
+ NEIGH_VAR_GC_THRESH1 = 18,
+ NEIGH_VAR_GC_THRESH2 = 19,
+ NEIGH_VAR_GC_THRESH3 = 20,
+ NEIGH_VAR_MAX = 21,
+};
+
+struct pneigh_entry;
+
+struct neigh_statistics;
+
+struct neigh_hash_table;
+
+struct neigh_table {
+ int family;
+ unsigned int entry_size;
+ unsigned int key_len;
+ __be16 protocol;
+ __u32 (*hash)(const void *, const struct net_device *, __u32 *);
+ bool (*key_eq)(const struct neighbour *, const void *);
+ int (*constructor)(struct neighbour *);
+ int (*pconstructor)(struct pneigh_entry *);
+ void (*pdestructor)(struct pneigh_entry *);
+ void (*proxy_redo)(struct sk_buff *);
+ int (*is_multicast)(const void *);
+ bool (*allow_add)(const struct net_device *, struct netlink_ext_ack *);
+ char *id;
+ struct neigh_parms parms;
+ struct list_head parms_list;
+ int gc_interval;
+ int gc_thresh1;
+ int gc_thresh2;
+ int gc_thresh3;
+ long unsigned int last_flush;
+ struct delayed_work gc_work;
+ struct delayed_work managed_work;
+ struct timer_list proxy_timer;
+ struct sk_buff_head proxy_queue;
+ atomic_t entries;
+ atomic_t gc_entries;
+ struct list_head gc_list;
+ struct list_head managed_list;
+ rwlock_t lock;
+ long unsigned int last_rand;
+ struct neigh_statistics *stats;
+ struct neigh_hash_table *nht;
+ struct pneigh_entry **phash_buckets;
+};
+
+struct neigh_statistics {
+ long unsigned int allocs;
+ long unsigned int destroys;
+ long unsigned int hash_grows;
+ long unsigned int res_failed;
+ long unsigned int lookups;
+ long unsigned int hits;
+ long unsigned int rcv_probes_mcast;
+ long unsigned int rcv_probes_ucast;
+ long unsigned int periodic_gc_runs;
+ long unsigned int forced_gc_runs;
+ long unsigned int unres_discards;
+ long unsigned int table_fulls;
+};
+
+struct neigh_ops {
+ int family;
+ void (*solicit)(struct neighbour *, struct sk_buff *);
+ void (*error_report)(struct neighbour *, struct sk_buff *);
+ int (*output)(struct neighbour *, struct sk_buff *);
+ int (*connected_output)(struct neighbour *, struct sk_buff *);
+};
+
+struct pneigh_entry {
+ struct pneigh_entry *next;
+ possible_net_t net;
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ u32 flags;
+ u8 protocol;
+ u8 key[0];
+};
+
+struct neigh_hash_table {
+ struct neighbour **hash_buckets;
+ unsigned int hash_shift;
+ __u32 hash_rnd[4];
+ struct callback_head rcu;
+};
+
+struct lwtunnel_state {
+ __u16 type;
+ __u16 flags;
+ __u16 headroom;
+ atomic_t refcnt;
+ int (*orig_output)(struct net *, struct sock *, struct sk_buff *);
+ int (*orig_input)(struct sk_buff *);
+ struct callback_head rcu;
+ __u8 data[0];
+};
+
+struct dst_metrics {
+ u32 metrics[17];
+ refcount_t refcnt;
+};
+
+enum {
+ TCP_ESTABLISHED = 1,
+ TCP_SYN_SENT = 2,
+ TCP_SYN_RECV = 3,
+ TCP_FIN_WAIT1 = 4,
+ TCP_FIN_WAIT2 = 5,
+ TCP_TIME_WAIT = 6,
+ TCP_CLOSE = 7,
+ TCP_CLOSE_WAIT = 8,
+ TCP_LAST_ACK = 9,
+ TCP_LISTEN = 10,
+ TCP_CLOSING = 11,
+ TCP_NEW_SYN_RECV = 12,
+ TCP_MAX_STATES = 13,
+};
+
+struct fib_rule_hdr {
+ __u8 family;
+ __u8 dst_len;
+ __u8 src_len;
+ __u8 tos;
+ __u8 table;
+ __u8 res1;
+ __u8 res2;
+ __u8 action;
+ __u32 flags;
+};
+
+struct fib_rule_port_range {
+ __u16 start;
+ __u16 end;
+};
+
+struct fib_kuid_range {
+ kuid_t start;
+ kuid_t end;
+};
+
+struct fib_rule {
+ struct list_head list;
+ int iifindex;
+ int oifindex;
+ u32 mark;
+ u32 mark_mask;
+ u32 flags;
+ u32 table;
+ u8 action;
+ u8 l3mdev;
+ u8 proto;
+ u8 ip_proto;
+ u32 target;
+ __be64 tun_id;
+ struct fib_rule *ctarget;
+ struct net *fr_net;
+ refcount_t refcnt;
+ u32 pref;
+ int suppress_ifgroup;
+ int suppress_prefixlen;
+ char iifname[16];
+ char oifname[16];
+ struct fib_kuid_range uid_range;
+ struct fib_rule_port_range sport_range;
+ struct fib_rule_port_range dport_range;
+ struct callback_head rcu;
+};
+
+struct fib_lookup_arg {
+ void *lookup_ptr;
+ const void *lookup_data;
+ void *result;
+ struct fib_rule *rule;
+ u32 table;
+ int flags;
+};
+
+struct smc_hashinfo;
+
+struct sk_psock;
+
+struct request_sock_ops;
+
+struct timewait_sock_ops;
+
+struct raw_hashinfo;
+
+struct proto {
+ void (*close)(struct sock *, long int);
+ int (*pre_connect)(struct sock *, struct sockaddr *, int);
+ int (*connect)(struct sock *, struct sockaddr *, int);
+ int (*disconnect)(struct sock *, int);
+ struct sock * (*accept)(struct sock *, int, int *, bool);
+ int (*ioctl)(struct sock *, int, long unsigned int);
+ int (*init)(struct sock *);
+ void (*destroy)(struct sock *);
+ void (*shutdown)(struct sock *, int);
+ int (*setsockopt)(struct sock *, int, int, sockptr_t, unsigned int);
+ int (*getsockopt)(struct sock *, int, int, char *, int *);
+ void (*keepalive)(struct sock *, int);
+ int (*sendmsg)(struct sock *, struct msghdr *, size_t);
+ int (*recvmsg)(struct sock *, struct msghdr *, size_t, int, int *);
+ int (*sendpage)(struct sock *, struct page *, int, size_t, int);
+ int (*bind)(struct sock *, struct sockaddr *, int);
+ int (*bind_add)(struct sock *, struct sockaddr *, int);
+ int (*backlog_rcv)(struct sock *, struct sk_buff *);
+ bool (*bpf_bypass_getsockopt)(int, int);
+ void (*release_cb)(struct sock *);
+ int (*hash)(struct sock *);
+ void (*unhash)(struct sock *);
+ void (*rehash)(struct sock *);
+ int (*get_port)(struct sock *, short unsigned int);
+ void (*put_port)(struct sock *);
+ int (*psock_update_sk_prot)(struct sock *, struct sk_psock *, bool);
+ unsigned int inuse_idx;
+ int (*forward_alloc_get)(const struct sock *);
+ bool (*stream_memory_free)(const struct sock *, int);
+ bool (*sock_is_readable)(struct sock *);
+ void (*enter_memory_pressure)(struct sock *);
+ void (*leave_memory_pressure)(struct sock *);
+ atomic_long_t *memory_allocated;
+ int *per_cpu_fw_alloc;
+ struct percpu_counter *sockets_allocated;
+ long unsigned int *memory_pressure;
+ long int *sysctl_mem;
+ int *sysctl_wmem;
+ int *sysctl_rmem;
+ u32 sysctl_wmem_offset;
+ u32 sysctl_rmem_offset;
+ int max_header;
+ bool no_autobind;
+ struct kmem_cache *slab;
+ unsigned int obj_size;
+ slab_flags_t slab_flags;
+ unsigned int useroffset;
+ unsigned int usersize;
+ unsigned int *orphan_count;
+ struct request_sock_ops *rsk_prot;
+ struct timewait_sock_ops *twsk_prot;
+ union {
+ struct inet_hashinfo *hashinfo;
+ struct udp_table *udp_table;
+ struct raw_hashinfo *raw_hash;
+ struct smc_hashinfo *smc_hash;
+ } h;
+ struct module *owner;
+ char name[32];
+ struct list_head node;
+ int (*diag_destroy)(struct sock *, int);
+};
+
+struct request_sock;
+
+struct request_sock_ops {
+ int family;
+ unsigned int obj_size;
+ struct kmem_cache *slab;
+ char *slab_name;
+ int (*rtx_syn_ack)(const struct sock *, struct request_sock *);
+ void (*send_ack)(const struct sock *, struct sk_buff *, struct request_sock *);
+ void (*send_reset)(const struct sock *, struct sk_buff *);
+ void (*destructor)(struct request_sock *);
+ void (*syn_ack_timeout)(const struct request_sock *);
+};
+
+struct timewait_sock_ops {
+ struct kmem_cache *twsk_slab;
+ char *twsk_slab_name;
+ unsigned int twsk_obj_size;
+ int (*twsk_unique)(struct sock *, struct sock *, void *);
+ void (*twsk_destructor)(struct sock *);
+};
+
+struct saved_syn;
+
+struct request_sock {
+ struct sock_common __req_common;
+ struct request_sock *dl_next;
+ u16 mss;
+ u8 num_retrans;
+ u8 syncookie: 1;
+ u8 num_timeout: 7;
+ u32 ts_recent;
+ struct timer_list rsk_timer;
+ const struct request_sock_ops *rsk_ops;
+ struct sock *sk;
+ struct saved_syn *saved_syn;
+ u32 secid;
+ u32 peer_secid;
+ u32 timeout;
+};
+
+struct saved_syn {
+ u32 mac_hdrlen;
+ u32 network_hdrlen;
+ u32 tcp_hdrlen;
+ u8 data[0];
+};
+
+enum tsq_enum {
+ TSQ_THROTTLED = 0,
+ TSQ_QUEUED = 1,
+ TCP_TSQ_DEFERRED = 2,
+ TCP_WRITE_TIMER_DEFERRED = 3,
+ TCP_DELACK_TIMER_DEFERRED = 4,
+ TCP_MTU_REDUCED_DEFERRED = 5,
+};
+
+struct udphdr {
+ __be16 source;
+ __be16 dest;
+ __be16 len;
+ __sum16 check;
+};
+
+struct ip6_sf_list {
+ struct ip6_sf_list *sf_next;
+ struct in6_addr sf_addr;
+ long unsigned int sf_count[2];
+ unsigned char sf_gsresp;
+ unsigned char sf_oldin;
+ unsigned char sf_crcount;
+ struct callback_head rcu;
+};
+
+struct ifmcaddr6 {
+ struct in6_addr mca_addr;
+ struct inet6_dev *idev;
+ struct ifmcaddr6 *next;
+ struct ip6_sf_list *mca_sources;
+ struct ip6_sf_list *mca_tomb;
+ unsigned int mca_sfmode;
+ unsigned char mca_crcount;
+ long unsigned int mca_sfcount[2];
+ struct delayed_work mca_work;
+ unsigned int mca_flags;
+ int mca_users;
+ refcount_t mca_refcnt;
+ long unsigned int mca_cstamp;
+ long unsigned int mca_tstamp;
+ struct callback_head rcu;
+};
+
+struct ifacaddr6 {
+ struct in6_addr aca_addr;
+ struct fib6_info *aca_rt;
+ struct ifacaddr6 *aca_next;
+ struct hlist_node aca_addr_lst;
+ int aca_users;
+ refcount_t aca_refcnt;
+ long unsigned int aca_cstamp;
+ long unsigned int aca_tstamp;
+ struct callback_head rcu;
+};
+
+struct fib_nh_exception {
+ struct fib_nh_exception *fnhe_next;
+ int fnhe_genid;
+ __be32 fnhe_daddr;
+ u32 fnhe_pmtu;
+ bool fnhe_mtu_locked;
+ __be32 fnhe_gw;
+ long unsigned int fnhe_expires;
+ struct rtable *fnhe_rth_input;
+ struct rtable *fnhe_rth_output;
+ long unsigned int fnhe_stamp;
+ struct callback_head rcu;
+};
+
+struct rtable {
+ struct dst_entry dst;
+ int rt_genid;
+ unsigned int rt_flags;
+ __u16 rt_type;
+ __u8 rt_is_input;
+ __u8 rt_uses_gateway;
+ int rt_iif;
+ u8 rt_gw_family;
+ union {
+ __be32 rt_gw4;
+ struct in6_addr rt_gw6;
+ };
+ u32 rt_mtu_locked: 1;
+ u32 rt_pmtu: 31;
+ struct list_head rt_uncached;
+ struct uncached_list *rt_uncached_list;
+};
+
+struct fnhe_hash_bucket {
+ struct fib_nh_exception *chain;
+};
+
+struct fib_info;
+
+struct fib_nh {
+ struct fib_nh_common nh_common;
+ struct hlist_node nh_hash;
+ struct fib_info *nh_parent;
+ __be32 nh_saddr;
+ int nh_saddr_genid;
+};
+
+struct fib_info {
+ struct hlist_node fib_hash;
+ struct hlist_node fib_lhash;
+ struct list_head nh_list;
+ struct net *fib_net;
+ refcount_t fib_treeref;
+ refcount_t fib_clntref;
+ unsigned int fib_flags;
+ unsigned char fib_dead;
+ unsigned char fib_protocol;
+ unsigned char fib_scope;
+ unsigned char fib_type;
+ __be32 fib_prefsrc;
+ u32 fib_tb_id;
+ u32 fib_priority;
+ struct dst_metrics *fib_metrics;
+ int fib_nhs;
+ bool fib_nh_is_v6;
+ bool nh_updated;
+ struct nexthop *nh;
+ struct callback_head rcu;
+ struct fib_nh fib_nh[0];
+};
+
+struct nh_info;
+
+struct nh_group;
+
+struct nexthop {
+ struct rb_node rb_node;
+ struct list_head fi_list;
+ struct list_head f6i_list;
+ struct list_head fdb_list;
+ struct list_head grp_list;
+ struct net *net;
+ u32 id;
+ u8 protocol;
+ u8 nh_flags;
+ bool is_group;
+ refcount_t refcnt;
+ struct callback_head rcu;
+ union {
+ struct nh_info *nh_info;
+ struct nh_group *nh_grp;
+ };
+};
+
+enum {
+ __ND_OPT_PREFIX_INFO_END = 0,
+ ND_OPT_SOURCE_LL_ADDR = 1,
+ ND_OPT_TARGET_LL_ADDR = 2,
+ ND_OPT_PREFIX_INFO = 3,
+ ND_OPT_REDIRECT_HDR = 4,
+ ND_OPT_MTU = 5,
+ ND_OPT_NONCE = 14,
+ __ND_OPT_ARRAY_MAX = 15,
+ ND_OPT_ROUTE_INFO = 24,
+ ND_OPT_RDNSS = 25,
+ ND_OPT_DNSSL = 31,
+ ND_OPT_6CO = 34,
+ ND_OPT_CAPTIVE_PORTAL = 37,
+ ND_OPT_PREF64 = 38,
+ __ND_OPT_MAX = 39,
+};
+
+struct nd_opt_hdr {
+ __u8 nd_opt_type;
+ __u8 nd_opt_len;
+};
+
+struct ndisc_options {
+ struct nd_opt_hdr *nd_opt_array[15];
+ struct nd_opt_hdr *nd_opts_ri;
+ struct nd_opt_hdr *nd_opts_ri_end;
+ struct nd_opt_hdr *nd_useropts;
+ struct nd_opt_hdr *nd_useropts_end;
+};
+
+struct prefix_info {
+ __u8 type;
+ __u8 length;
+ __u8 prefix_len;
+ __u8 reserved: 6;
+ __u8 autoconf: 1;
+ __u8 onlink: 1;
+ __be32 valid;
+ __be32 prefered;
+ __be32 reserved2;
+ struct in6_addr prefix;
+};
+
+struct ethtool_drvinfo {
+ __u32 cmd;
+ char driver[32];
+ char version[32];
+ char fw_version[32];
+ char bus_info[32];
+ char erom_version[32];
+ char reserved2[12];
+ __u32 n_priv_flags;
+ __u32 n_stats;
+ __u32 testinfo_len;
+ __u32 eedump_len;
+ __u32 regdump_len;
+};
+
+struct ethtool_wolinfo {
+ __u32 cmd;
+ __u32 supported;
+ __u32 wolopts;
+ __u8 sopass[6];
+};
+
+struct ethtool_tunable {
+ __u32 cmd;
+ __u32 id;
+ __u32 type_id;
+ __u32 len;
+ void *data[0];
+};
+
+struct ethtool_regs {
+ __u32 cmd;
+ __u32 version;
+ __u32 len;
+ __u8 data[0];
+};
+
+struct ethtool_eeprom {
+ __u32 cmd;
+ __u32 magic;
+ __u32 offset;
+ __u32 len;
+ __u8 data[0];
+};
+
+struct ethtool_eee {
+ __u32 cmd;
+ __u32 supported;
+ __u32 advertised;
+ __u32 lp_advertised;
+ __u32 eee_active;
+ __u32 eee_enabled;
+ __u32 tx_lpi_enabled;
+ __u32 tx_lpi_timer;
+ __u32 reserved[2];
+};
+
+struct ethtool_modinfo {
+ __u32 cmd;
+ __u32 type;
+ __u32 eeprom_len;
+ __u32 reserved[8];
+};
+
+struct ethtool_coalesce {
+ __u32 cmd;
+ __u32 rx_coalesce_usecs;
+ __u32 rx_max_coalesced_frames;
+ __u32 rx_coalesce_usecs_irq;
+ __u32 rx_max_coalesced_frames_irq;
+ __u32 tx_coalesce_usecs;
+ __u32 tx_max_coalesced_frames;
+ __u32 tx_coalesce_usecs_irq;
+ __u32 tx_max_coalesced_frames_irq;
+ __u32 stats_block_coalesce_usecs;
+ __u32 use_adaptive_rx_coalesce;
+ __u32 use_adaptive_tx_coalesce;
+ __u32 pkt_rate_low;
+ __u32 rx_coalesce_usecs_low;
+ __u32 rx_max_coalesced_frames_low;
+ __u32 tx_coalesce_usecs_low;
+ __u32 tx_max_coalesced_frames_low;
+ __u32 pkt_rate_high;
+ __u32 rx_coalesce_usecs_high;
+ __u32 rx_max_coalesced_frames_high;
+ __u32 tx_coalesce_usecs_high;
+ __u32 tx_max_coalesced_frames_high;
+ __u32 rate_sample_interval;
+};
+
+struct ethtool_ringparam {
+ __u32 cmd;
+ __u32 rx_max_pending;
+ __u32 rx_mini_max_pending;
+ __u32 rx_jumbo_max_pending;
+ __u32 tx_max_pending;
+ __u32 rx_pending;
+ __u32 rx_mini_pending;
+ __u32 rx_jumbo_pending;
+ __u32 tx_pending;
+};
+
+struct ethtool_channels {
+ __u32 cmd;
+ __u32 max_rx;
+ __u32 max_tx;
+ __u32 max_other;
+ __u32 max_combined;
+ __u32 rx_count;
+ __u32 tx_count;
+ __u32 other_count;
+ __u32 combined_count;
+};
+
+struct ethtool_pauseparam {
+ __u32 cmd;
+ __u32 autoneg;
+ __u32 rx_pause;
+ __u32 tx_pause;
+};
+
+enum ethtool_link_ext_state {
+ ETHTOOL_LINK_EXT_STATE_AUTONEG = 0,
+ ETHTOOL_LINK_EXT_STATE_LINK_TRAINING_FAILURE = 1,
+ ETHTOOL_LINK_EXT_STATE_LINK_LOGICAL_MISMATCH = 2,
+ ETHTOOL_LINK_EXT_STATE_BAD_SIGNAL_INTEGRITY = 3,
+ ETHTOOL_LINK_EXT_STATE_NO_CABLE = 4,
+ ETHTOOL_LINK_EXT_STATE_CABLE_ISSUE = 5,
+ ETHTOOL_LINK_EXT_STATE_EEPROM_ISSUE = 6,
+ ETHTOOL_LINK_EXT_STATE_CALIBRATION_FAILURE = 7,
+ ETHTOOL_LINK_EXT_STATE_POWER_BUDGET_EXCEEDED = 8,
+ ETHTOOL_LINK_EXT_STATE_OVERHEAT = 9,
+ ETHTOOL_LINK_EXT_STATE_MODULE = 10,
+};
+
+enum ethtool_link_ext_substate_autoneg {
+ ETHTOOL_LINK_EXT_SUBSTATE_AN_NO_PARTNER_DETECTED = 1,
+ ETHTOOL_LINK_EXT_SUBSTATE_AN_ACK_NOT_RECEIVED = 2,
+ ETHTOOL_LINK_EXT_SUBSTATE_AN_NEXT_PAGE_EXCHANGE_FAILED = 3,
+ ETHTOOL_LINK_EXT_SUBSTATE_AN_NO_PARTNER_DETECTED_FORCE_MODE = 4,
+ ETHTOOL_LINK_EXT_SUBSTATE_AN_FEC_MISMATCH_DURING_OVERRIDE = 5,
+ ETHTOOL_LINK_EXT_SUBSTATE_AN_NO_HCD = 6,
+};
+
+enum ethtool_link_ext_substate_link_training {
+ ETHTOOL_LINK_EXT_SUBSTATE_LT_KR_FRAME_LOCK_NOT_ACQUIRED = 1,
+ ETHTOOL_LINK_EXT_SUBSTATE_LT_KR_LINK_INHIBIT_TIMEOUT = 2,
+ ETHTOOL_LINK_EXT_SUBSTATE_LT_KR_LINK_PARTNER_DID_NOT_SET_RECEIVER_READY = 3,
+ ETHTOOL_LINK_EXT_SUBSTATE_LT_REMOTE_FAULT = 4,
+};
+
+enum ethtool_link_ext_substate_link_logical_mismatch {
+ ETHTOOL_LINK_EXT_SUBSTATE_LLM_PCS_DID_NOT_ACQUIRE_BLOCK_LOCK = 1,
+ ETHTOOL_LINK_EXT_SUBSTATE_LLM_PCS_DID_NOT_ACQUIRE_AM_LOCK = 2,
+ ETHTOOL_LINK_EXT_SUBSTATE_LLM_PCS_DID_NOT_GET_ALIGN_STATUS = 3,
+ ETHTOOL_LINK_EXT_SUBSTATE_LLM_FC_FEC_IS_NOT_LOCKED = 4,
+ ETHTOOL_LINK_EXT_SUBSTATE_LLM_RS_FEC_IS_NOT_LOCKED = 5,
+};
+
+enum ethtool_link_ext_substate_bad_signal_integrity {
+ ETHTOOL_LINK_EXT_SUBSTATE_BSI_LARGE_NUMBER_OF_PHYSICAL_ERRORS = 1,
+ ETHTOOL_LINK_EXT_SUBSTATE_BSI_UNSUPPORTED_RATE = 2,
+ ETHTOOL_LINK_EXT_SUBSTATE_BSI_SERDES_REFERENCE_CLOCK_LOST = 3,
+ ETHTOOL_LINK_EXT_SUBSTATE_BSI_SERDES_ALOS = 4,
+};
+
+enum ethtool_link_ext_substate_cable_issue {
+ ETHTOOL_LINK_EXT_SUBSTATE_CI_UNSUPPORTED_CABLE = 1,
+ ETHTOOL_LINK_EXT_SUBSTATE_CI_CABLE_TEST_FAILURE = 2,
+};
+
+enum ethtool_link_ext_substate_module {
+ ETHTOOL_LINK_EXT_SUBSTATE_MODULE_CMIS_NOT_READY = 1,
+};
+
+enum ethtool_module_power_mode_policy {
+ ETHTOOL_MODULE_POWER_MODE_POLICY_HIGH = 1,
+ ETHTOOL_MODULE_POWER_MODE_POLICY_AUTO = 2,
+};
+
+enum ethtool_module_power_mode {
+ ETHTOOL_MODULE_POWER_MODE_LOW = 1,
+ ETHTOOL_MODULE_POWER_MODE_HIGH = 2,
+};
+
+struct ethtool_test {
+ __u32 cmd;
+ __u32 flags;
+ __u32 reserved;
+ __u32 len;
+ __u64 data[0];
+};
+
+struct ethtool_stats {
+ __u32 cmd;
+ __u32 n_stats;
+ __u64 data[0];
+};
+
+struct ethtool_tcpip4_spec {
+ __be32 ip4src;
+ __be32 ip4dst;
+ __be16 psrc;
+ __be16 pdst;
+ __u8 tos;
+};
+
+struct ethtool_ah_espip4_spec {
+ __be32 ip4src;
+ __be32 ip4dst;
+ __be32 spi;
+ __u8 tos;
+};
+
+struct ethtool_usrip4_spec {
+ __be32 ip4src;
+ __be32 ip4dst;
+ __be32 l4_4_bytes;
+ __u8 tos;
+ __u8 ip_ver;
+ __u8 proto;
+};
+
+struct ethtool_tcpip6_spec {
+ __be32 ip6src[4];
+ __be32 ip6dst[4];
+ __be16 psrc;
+ __be16 pdst;
+ __u8 tclass;
+};
+
+struct ethtool_ah_espip6_spec {
+ __be32 ip6src[4];
+ __be32 ip6dst[4];
+ __be32 spi;
+ __u8 tclass;
+};
+
+struct ethtool_usrip6_spec {
+ __be32 ip6src[4];
+ __be32 ip6dst[4];
+ __be32 l4_4_bytes;
+ __u8 tclass;
+ __u8 l4_proto;
+};
+
+union ethtool_flow_union {
+ struct ethtool_tcpip4_spec tcp_ip4_spec;
+ struct ethtool_tcpip4_spec udp_ip4_spec;
+ struct ethtool_tcpip4_spec sctp_ip4_spec;
+ struct ethtool_ah_espip4_spec ah_ip4_spec;
+ struct ethtool_ah_espip4_spec esp_ip4_spec;
+ struct ethtool_usrip4_spec usr_ip4_spec;
+ struct ethtool_tcpip6_spec tcp_ip6_spec;
+ struct ethtool_tcpip6_spec udp_ip6_spec;
+ struct ethtool_tcpip6_spec sctp_ip6_spec;
+ struct ethtool_ah_espip6_spec ah_ip6_spec;
+ struct ethtool_ah_espip6_spec esp_ip6_spec;
+ struct ethtool_usrip6_spec usr_ip6_spec;
+ struct ethhdr ether_spec;
+ __u8 hdata[52];
+};
+
+struct ethtool_flow_ext {
+ __u8 padding[2];
+ unsigned char h_dest[6];
+ __be16 vlan_etype;
+ __be16 vlan_tci;
+ __be32 data[2];
+};
+
+struct ethtool_rx_flow_spec {
+ __u32 flow_type;
+ union ethtool_flow_union h_u;
+ struct ethtool_flow_ext h_ext;
+ union ethtool_flow_union m_u;
+ struct ethtool_flow_ext m_ext;
+ __u64 ring_cookie;
+ __u32 location;
+};
+
+struct ethtool_rxnfc {
+ __u32 cmd;
+ __u32 flow_type;
+ __u64 data;
+ struct ethtool_rx_flow_spec fs;
+ union {
+ __u32 rule_cnt;
+ __u32 rss_context;
+ };
+ __u32 rule_locs[0];
+};
+
+struct ethtool_flash {
+ __u32 cmd;
+ __u32 region;
+ char data[128];
+};
+
+struct ethtool_dump {
+ __u32 cmd;
+ __u32 version;
+ __u32 flag;
+ __u32 len;
+ __u8 data[0];
+};
+
+struct ethtool_ts_info {
+ __u32 cmd;
+ __u32 so_timestamping;
+ __s32 phc_index;
+ __u32 tx_types;
+ __u32 tx_reserved[3];
+ __u32 rx_filters;
+ __u32 rx_reserved[3];
+};
+
+struct ethtool_fecparam {
+ __u32 cmd;
+ __u32 active_fec;
+ __u32 fec;
+ __u32 reserved;
+};
+
+enum ethtool_link_mode_bit_indices {
+ ETHTOOL_LINK_MODE_10baseT_Half_BIT = 0,
+ ETHTOOL_LINK_MODE_10baseT_Full_BIT = 1,
+ ETHTOOL_LINK_MODE_100baseT_Half_BIT = 2,
+ ETHTOOL_LINK_MODE_100baseT_Full_BIT = 3,
+ ETHTOOL_LINK_MODE_1000baseT_Half_BIT = 4,
+ ETHTOOL_LINK_MODE_1000baseT_Full_BIT = 5,
+ ETHTOOL_LINK_MODE_Autoneg_BIT = 6,
+ ETHTOOL_LINK_MODE_TP_BIT = 7,
+ ETHTOOL_LINK_MODE_AUI_BIT = 8,
+ ETHTOOL_LINK_MODE_MII_BIT = 9,
+ ETHTOOL_LINK_MODE_FIBRE_BIT = 10,
+ ETHTOOL_LINK_MODE_BNC_BIT = 11,
+ ETHTOOL_LINK_MODE_10000baseT_Full_BIT = 12,
+ ETHTOOL_LINK_MODE_Pause_BIT = 13,
+ ETHTOOL_LINK_MODE_Asym_Pause_BIT = 14,
+ ETHTOOL_LINK_MODE_2500baseX_Full_BIT = 15,
+ ETHTOOL_LINK_MODE_Backplane_BIT = 16,
+ ETHTOOL_LINK_MODE_1000baseKX_Full_BIT = 17,
+ ETHTOOL_LINK_MODE_10000baseKX4_Full_BIT = 18,
+ ETHTOOL_LINK_MODE_10000baseKR_Full_BIT = 19,
+ ETHTOOL_LINK_MODE_10000baseR_FEC_BIT = 20,
+ ETHTOOL_LINK_MODE_20000baseMLD2_Full_BIT = 21,
+ ETHTOOL_LINK_MODE_20000baseKR2_Full_BIT = 22,
+ ETHTOOL_LINK_MODE_40000baseKR4_Full_BIT = 23,
+ ETHTOOL_LINK_MODE_40000baseCR4_Full_BIT = 24,
+ ETHTOOL_LINK_MODE_40000baseSR4_Full_BIT = 25,
+ ETHTOOL_LINK_MODE_40000baseLR4_Full_BIT = 26,
+ ETHTOOL_LINK_MODE_56000baseKR4_Full_BIT = 27,
+ ETHTOOL_LINK_MODE_56000baseCR4_Full_BIT = 28,
+ ETHTOOL_LINK_MODE_56000baseSR4_Full_BIT = 29,
+ ETHTOOL_LINK_MODE_56000baseLR4_Full_BIT = 30,
+ ETHTOOL_LINK_MODE_25000baseCR_Full_BIT = 31,
+ ETHTOOL_LINK_MODE_25000baseKR_Full_BIT = 32,
+ ETHTOOL_LINK_MODE_25000baseSR_Full_BIT = 33,
+ ETHTOOL_LINK_MODE_50000baseCR2_Full_BIT = 34,
+ ETHTOOL_LINK_MODE_50000baseKR2_Full_BIT = 35,
+ ETHTOOL_LINK_MODE_100000baseKR4_Full_BIT = 36,
+ ETHTOOL_LINK_MODE_100000baseSR4_Full_BIT = 37,
+ ETHTOOL_LINK_MODE_100000baseCR4_Full_BIT = 38,
+ ETHTOOL_LINK_MODE_100000baseLR4_ER4_Full_BIT = 39,
+ ETHTOOL_LINK_MODE_50000baseSR2_Full_BIT = 40,
+ ETHTOOL_LINK_MODE_1000baseX_Full_BIT = 41,
+ ETHTOOL_LINK_MODE_10000baseCR_Full_BIT = 42,
+ ETHTOOL_LINK_MODE_10000baseSR_Full_BIT = 43,
+ ETHTOOL_LINK_MODE_10000baseLR_Full_BIT = 44,
+ ETHTOOL_LINK_MODE_10000baseLRM_Full_BIT = 45,
+ ETHTOOL_LINK_MODE_10000baseER_Full_BIT = 46,
+ ETHTOOL_LINK_MODE_2500baseT_Full_BIT = 47,
+ ETHTOOL_LINK_MODE_5000baseT_Full_BIT = 48,
+ ETHTOOL_LINK_MODE_FEC_NONE_BIT = 49,
+ ETHTOOL_LINK_MODE_FEC_RS_BIT = 50,
+ ETHTOOL_LINK_MODE_FEC_BASER_BIT = 51,
+ ETHTOOL_LINK_MODE_50000baseKR_Full_BIT = 52,
+ ETHTOOL_LINK_MODE_50000baseSR_Full_BIT = 53,
+ ETHTOOL_LINK_MODE_50000baseCR_Full_BIT = 54,
+ ETHTOOL_LINK_MODE_50000baseLR_ER_FR_Full_BIT = 55,
+ ETHTOOL_LINK_MODE_50000baseDR_Full_BIT = 56,
+ ETHTOOL_LINK_MODE_100000baseKR2_Full_BIT = 57,
+ ETHTOOL_LINK_MODE_100000baseSR2_Full_BIT = 58,
+ ETHTOOL_LINK_MODE_100000baseCR2_Full_BIT = 59,
+ ETHTOOL_LINK_MODE_100000baseLR2_ER2_FR2_Full_BIT = 60,
+ ETHTOOL_LINK_MODE_100000baseDR2_Full_BIT = 61,
+ ETHTOOL_LINK_MODE_200000baseKR4_Full_BIT = 62,
+ ETHTOOL_LINK_MODE_200000baseSR4_Full_BIT = 63,
+ ETHTOOL_LINK_MODE_200000baseLR4_ER4_FR4_Full_BIT = 64,
+ ETHTOOL_LINK_MODE_200000baseDR4_Full_BIT = 65,
+ ETHTOOL_LINK_MODE_200000baseCR4_Full_BIT = 66,
+ ETHTOOL_LINK_MODE_100baseT1_Full_BIT = 67,
+ ETHTOOL_LINK_MODE_1000baseT1_Full_BIT = 68,
+ ETHTOOL_LINK_MODE_400000baseKR8_Full_BIT = 69,
+ ETHTOOL_LINK_MODE_400000baseSR8_Full_BIT = 70,
+ ETHTOOL_LINK_MODE_400000baseLR8_ER8_FR8_Full_BIT = 71,
+ ETHTOOL_LINK_MODE_400000baseDR8_Full_BIT = 72,
+ ETHTOOL_LINK_MODE_400000baseCR8_Full_BIT = 73,
+ ETHTOOL_LINK_MODE_FEC_LLRS_BIT = 74,
+ ETHTOOL_LINK_MODE_100000baseKR_Full_BIT = 75,
+ ETHTOOL_LINK_MODE_100000baseSR_Full_BIT = 76,
+ ETHTOOL_LINK_MODE_100000baseLR_ER_FR_Full_BIT = 77,
+ ETHTOOL_LINK_MODE_100000baseCR_Full_BIT = 78,
+ ETHTOOL_LINK_MODE_100000baseDR_Full_BIT = 79,
+ ETHTOOL_LINK_MODE_200000baseKR2_Full_BIT = 80,
+ ETHTOOL_LINK_MODE_200000baseSR2_Full_BIT = 81,
+ ETHTOOL_LINK_MODE_200000baseLR2_ER2_FR2_Full_BIT = 82,
+ ETHTOOL_LINK_MODE_200000baseDR2_Full_BIT = 83,
+ ETHTOOL_LINK_MODE_200000baseCR2_Full_BIT = 84,
+ ETHTOOL_LINK_MODE_400000baseKR4_Full_BIT = 85,
+ ETHTOOL_LINK_MODE_400000baseSR4_Full_BIT = 86,
+ ETHTOOL_LINK_MODE_400000baseLR4_ER4_FR4_Full_BIT = 87,
+ ETHTOOL_LINK_MODE_400000baseDR4_Full_BIT = 88,
+ ETHTOOL_LINK_MODE_400000baseCR4_Full_BIT = 89,
+ ETHTOOL_LINK_MODE_100baseFX_Half_BIT = 90,
+ ETHTOOL_LINK_MODE_100baseFX_Full_BIT = 91,
+ ETHTOOL_LINK_MODE_10baseT1L_Full_BIT = 92,
+ ETHTOOL_LINK_MODE_800000baseCR8_Full_BIT = 93,
+ ETHTOOL_LINK_MODE_800000baseKR8_Full_BIT = 94,
+ ETHTOOL_LINK_MODE_800000baseDR8_Full_BIT = 95,
+ ETHTOOL_LINK_MODE_800000baseDR8_2_Full_BIT = 96,
+ ETHTOOL_LINK_MODE_800000baseSR8_Full_BIT = 97,
+ ETHTOOL_LINK_MODE_800000baseVR8_Full_BIT = 98,
+ __ETHTOOL_LINK_MODE_MASK_NBITS = 99,
+};
+
+struct ethtool_link_settings {
+ __u32 cmd;
+ __u32 speed;
+ __u8 duplex;
+ __u8 port;
+ __u8 phy_address;
+ __u8 autoneg;
+ __u8 mdio_support;
+ __u8 eth_tp_mdix;
+ __u8 eth_tp_mdix_ctrl;
+ __s8 link_mode_masks_nwords;
+ __u8 transceiver;
+ __u8 master_slave_cfg;
+ __u8 master_slave_state;
+ __u8 rate_matching;
+ __u32 reserved[7];
+ __u32 link_mode_masks[0];
+};
+
+struct kernel_ethtool_ringparam {
+ u32 rx_buf_len;
+ u8 tcp_data_split;
+ u8 tx_push;
+ u32 cqe_size;
+};
+
+struct ethtool_link_ext_state_info {
+ enum ethtool_link_ext_state link_ext_state;
+ union {
+ enum ethtool_link_ext_substate_autoneg autoneg;
+ enum ethtool_link_ext_substate_link_training link_training;
+ enum ethtool_link_ext_substate_link_logical_mismatch link_logical_mismatch;
+ enum ethtool_link_ext_substate_bad_signal_integrity bad_signal_integrity;
+ enum ethtool_link_ext_substate_cable_issue cable_issue;
+ enum ethtool_link_ext_substate_module module;
+ u32 __link_ext_substate;
+ };
+};
+
+struct ethtool_link_ext_stats {
+ u64 link_down_events;
+};
+
+struct ethtool_link_ksettings {
+ struct ethtool_link_settings base;
+ struct {
+ long unsigned int supported[2];
+ long unsigned int advertising[2];
+ long unsigned int lp_advertising[2];
+ } link_modes;
+ u32 lanes;
+};
+
+struct kernel_ethtool_coalesce {
+ u8 use_cqe_mode_tx;
+ u8 use_cqe_mode_rx;
+};
+
+struct ethtool_eth_mac_stats {
+ u64 FramesTransmittedOK;
+ u64 SingleCollisionFrames;
+ u64 MultipleCollisionFrames;
+ u64 FramesReceivedOK;
+ u64 FrameCheckSequenceErrors;
+ u64 AlignmentErrors;
+ u64 OctetsTransmittedOK;
+ u64 FramesWithDeferredXmissions;
+ u64 LateCollisions;
+ u64 FramesAbortedDueToXSColls;
+ u64 FramesLostDueToIntMACXmitError;
+ u64 CarrierSenseErrors;
+ u64 OctetsReceivedOK;
+ u64 FramesLostDueToIntMACRcvError;
+ u64 MulticastFramesXmittedOK;
+ u64 BroadcastFramesXmittedOK;
+ u64 FramesWithExcessiveDeferral;
+ u64 MulticastFramesReceivedOK;
+ u64 BroadcastFramesReceivedOK;
+ u64 InRangeLengthErrors;
+ u64 OutOfRangeLengthField;
+ u64 FrameTooLongErrors;
+};
+
+struct ethtool_eth_phy_stats {
+ u64 SymbolErrorDuringCarrier;
+};
+
+struct ethtool_eth_ctrl_stats {
+ u64 MACControlFramesTransmitted;
+ u64 MACControlFramesReceived;
+ u64 UnsupportedOpcodesReceived;
+};
+
+struct ethtool_pause_stats {
+ u64 tx_pause_frames;
+ u64 rx_pause_frames;
+};
+
+struct ethtool_fec_stat {
+ u64 total;
+ u64 lanes[8];
+};
+
+struct ethtool_fec_stats {
+ struct ethtool_fec_stat corrected_blocks;
+ struct ethtool_fec_stat uncorrectable_blocks;
+ struct ethtool_fec_stat corrected_bits;
+};
+
+struct ethtool_rmon_hist_range {
+ u16 low;
+ u16 high;
+};
+
+struct ethtool_rmon_stats {
+ u64 undersize_pkts;
+ u64 oversize_pkts;
+ u64 fragments;
+ u64 jabbers;
+ u64 hist[10];
+ u64 hist_tx[10];
+};
+
+struct ethtool_module_eeprom {
+ u32 offset;
+ u32 length;
+ u8 page;
+ u8 bank;
+ u8 i2c_address;
+ u8 *data;
+};
+
+struct ethtool_module_power_mode_params {
+ enum ethtool_module_power_mode_policy policy;
+ enum ethtool_module_power_mode mode;
+};
+
+struct rt6_exception_bucket {
+ struct hlist_head chain;
+ int depth;
+};
+
+struct nh_info {
+ struct hlist_node dev_hash;
+ struct nexthop *nh_parent;
+ u8 family;
+ bool reject_nh;
+ bool fdb_nh;
+ union {
+ struct fib_nh_common fib_nhc;
+ struct fib_nh fib_nh;
+ struct fib6_nh fib6_nh;
+ };
+};
+
+struct nh_grp_entry;
+
+struct nh_res_bucket {
+ struct nh_grp_entry *nh_entry;
+ atomic_long_t used_time;
+ long unsigned int migrated_time;
+ bool occupied;
+ u8 nh_flags;
+};
+
+struct nh_grp_entry {
+ struct nexthop *nh;
+ u8 weight;
+ union {
+ struct {
+ atomic_t upper_bound;
+ } hthr;
+ struct {
+ struct list_head uw_nh_entry;
+ u16 count_buckets;
+ u16 wants_buckets;
+ } res;
+ };
+ struct list_head nh_list;
+ struct nexthop *nh_parent;
+};
+
+struct nh_res_table {
+ struct net *net;
+ u32 nhg_id;
+ struct delayed_work upkeep_dw;
+ struct list_head uw_nh_entries;
+ long unsigned int unbalanced_since;
+ u32 idle_timer;
+ u32 unbalanced_timer;
+ u16 num_nh_buckets;
+ struct nh_res_bucket nh_buckets[0];
+};
+
+struct nh_group {
+ struct nh_group *spare;
+ u16 num_nh;
+ bool is_multipath;
+ bool hash_threshold;
+ bool resilient;
+ bool fdb_nh;
+ bool has_v4;
+ struct nh_res_table *res_table;
+ struct nh_grp_entry nh_entries[0];
+};
+
+struct udp_hslot {
+ struct hlist_head head;
+ int count;
+ spinlock_t lock;
+};
+
+struct udp_tunnel_info {
+ short unsigned int type;
+ sa_family_t sa_family;
+ __be16 port;
+ u8 hw_priv;
+};
+
+struct udp_tunnel_nic_shared {
+ struct udp_tunnel_nic *udp_tunnel_nic_info;
+ struct list_head devices;
+};
+
+struct nsim_sa {
+ struct xfrm_state *xs;
+ __be32 ipaddr[4];
+ u32 key[4];
+ u32 salt;
+ bool used;
+ bool crypt;
+ bool rx;
+};
+
+struct nsim_ipsec {
+ struct nsim_sa sa[33];
+ struct dentry *pfile;
+ u32 count;
+ u32 tx;
+ u32 ok;
+};
+
+struct nsim_ethtool_pauseparam {
+ bool rx;
+ bool tx;
+ bool report_stats_rx;
+ bool report_stats_tx;
+};
+
+struct nsim_ethtool {
+ u32 get_err;
+ u32 set_err;
+ u32 channels;
+ struct nsim_ethtool_pauseparam pauseparam;
+ struct ethtool_coalesce coalesce;
+ struct ethtool_ringparam ring;
+ struct ethtool_fecparam fec;
+};
+
+struct nsim_dev;
+
+struct nsim_dev_port;
+
+struct nsim_bus_dev;
+
+struct netdevsim {
+ struct net_device *netdev;
+ struct nsim_dev *nsim_dev;
+ struct nsim_dev_port *nsim_dev_port;
+ u64 tx_packets;
+ u64 tx_bytes;
+ struct u64_stats_sync syncp;
+ struct nsim_bus_dev *nsim_bus_dev;
+ struct bpf_prog *bpf_offloaded;
+ u32 bpf_offloaded_id;
+ struct xdp_attachment_info xdp;
+ struct xdp_attachment_info xdp_hw;
+ bool bpf_tc_accept;
+ bool bpf_tc_non_bound_accept;
+ bool bpf_xdpdrv_accept;
+ bool bpf_xdpoffload_accept;
+ bool bpf_map_accept;
+ struct nsim_ipsec ipsec;
+ struct {
+ u32 inject_error;
+ u32 sleep;
+ u32 __ports[8];
+ u32 (*ports)[4];
+ struct debugfs_u32_array dfs_ports[2];
+ } udp_ports;
+ struct nsim_ethtool ethtool;
+};
+
+struct devlink_region;
+
+struct devlink_health_reporter;
+
+struct nsim_dev_health {
+ struct devlink_health_reporter *empty_reporter;
+ struct devlink_health_reporter *dummy_reporter;
+ struct dentry *ddir;
+ char *recovered_break_msg;
+ u32 binary_len;
+ bool fail_recover;
+};
+
+struct nsim_dev_hwstats {
+ struct dentry *ddir;
+ struct dentry *l3_ddir;
+ struct mutex hwsdev_list_lock;
+ struct list_head l3_list;
+ struct notifier_block netdevice_nb;
+ struct delayed_work traffic_dw;
+};
+
+struct nsim_dev_psample;
+
+struct nsim_fib_data;
+
+struct nsim_trap_data;
+
+struct nsim_vf_config;
+
+struct bpf_offload_dev;
+
+struct nsim_dev {
+ struct nsim_bus_dev *nsim_bus_dev;
+ struct nsim_fib_data *fib_data;
+ struct nsim_trap_data *trap_data;
+ struct dentry *ddir;
+ struct dentry *ports_ddir;
+ struct dentry *take_snapshot;
+ struct dentry *nodes_ddir;
+ struct nsim_vf_config *vfconfigs;
+ struct bpf_offload_dev *bpf_dev;
+ bool bpf_bind_accept;
+ bool bpf_bind_verifier_accept;
+ u32 bpf_bind_verifier_delay;
+ struct dentry *ddir_bpf_bound_progs;
+ u32 prog_id_gen;
+ struct list_head bpf_bound_progs;
+ struct list_head bpf_bound_maps;
+ struct netdev_phys_item_id switch_id;
+ struct list_head port_list;
+ bool fw_update_status;
+ u32 fw_update_overwrite_mask;
+ u32 max_macs;
+ bool test1;
+ bool dont_allow_reload;
+ bool fail_reload;
+ struct devlink_region *dummy_region;
+ struct nsim_dev_health health;
+ struct nsim_dev_hwstats hwstats;
+ struct flow_action_cookie *fa_cookie;
+ spinlock_t fa_cookie_lock;
+ bool fail_trap_group_set;
+ bool fail_trap_policer_set;
+ bool fail_trap_policer_counter_get;
+ bool fail_trap_drop_counter_get;
+ struct {
+ struct udp_tunnel_nic_shared utn_shared;
+ u32 __ports[8];
+ bool sync_all;
+ bool open_only;
+ bool ipv4_only;
+ bool shared;
+ bool static_iana_vxlan;
+ u32 sleep;
+ } udp_ports;
+ struct nsim_dev_psample *psample;
+ u16 esw_mode;
+};
+
+enum nsim_dev_port_type {
+ NSIM_DEV_PORT_TYPE_PF = 0,
+ NSIM_DEV_PORT_TYPE_VF = 1,
+};
+
+struct nsim_dev_port {
+ struct list_head list;
+ struct devlink_port devlink_port;
+ unsigned int port_index;
+ enum nsim_dev_port_type port_type;
+ struct dentry *ddir;
+ struct dentry *rate_parent;
+ char *parent_name;
+ struct netdevsim *ns;
+};
+
+struct nsim_bus_dev {
+ struct device dev;
+ struct list_head list;
+ unsigned int port_count;
+ unsigned int num_queues;
+ struct net *initial_net;
+ unsigned int max_vfs;
+ unsigned int num_vfs;
+ bool init;
+};
+
+enum nsim_resource_id {
+ NSIM_RESOURCE_NONE = 0,
+ NSIM_RESOURCE_IPV4 = 1,
+ NSIM_RESOURCE_IPV4_FIB = 2,
+ NSIM_RESOURCE_IPV4_FIB_RULES = 3,
+ NSIM_RESOURCE_IPV6 = 4,
+ NSIM_RESOURCE_IPV6_FIB = 5,
+ NSIM_RESOURCE_IPV6_FIB_RULES = 6,
+ NSIM_RESOURCE_NEXTHOPS = 7,
+};
+
+struct nsim_vf_config {
+ int link_state;
+ u16 min_tx_rate;
+ u16 max_tx_rate;
+ u16 vlan;
+ __be16 vlan_proto;
+ u16 qos;
+ u8 vf_mac[6];
+ bool spoofchk_enabled;
+ bool trusted;
+ bool rss_query_enabled;
+};
+
+struct nsim_trap_item;
+
+struct nsim_trap_data {
+ struct delayed_work trap_report_dw;
+ struct nsim_trap_item *trap_items_arr;
+ u64 *trap_policers_cnt_arr;
+ u64 trap_pkt_cnt;
+ struct nsim_dev *nsim_dev;
+ spinlock_t trap_lock;
+};
+
+enum nsim_devlink_param_id {
+ NSIM_DEVLINK_PARAM_ID_BASE = 16,
+ NSIM_DEVLINK_PARAM_ID_TEST1 = 17,
+};
+
+struct nsim_trap_item {
+ void *trap_ctx;
+ enum devlink_trap_action action;
+};
+
+enum {
+ NSIM_TRAP_ID_BASE = 93,
+ NSIM_TRAP_ID_FID_MISS = 94,
+};
+
+struct nsim_rate_node {
+ struct dentry *ddir;
+ struct dentry *rate_parent;
+ char *parent_name;
+ u16 tx_share;
+ u16 tx_max;
+};
+
+typedef void (*rcu_callback_t)(struct callback_head *);
+
+enum {
+ NETIF_F_SG_BIT = 0,
+ NETIF_F_IP_CSUM_BIT = 1,
+ __UNUSED_NETIF_F_1 = 2,
+ NETIF_F_HW_CSUM_BIT = 3,
+ NETIF_F_IPV6_CSUM_BIT = 4,
+ NETIF_F_HIGHDMA_BIT = 5,
+ NETIF_F_FRAGLIST_BIT = 6,
+ NETIF_F_HW_VLAN_CTAG_TX_BIT = 7,
+ NETIF_F_HW_VLAN_CTAG_RX_BIT = 8,
+ NETIF_F_HW_VLAN_CTAG_FILTER_BIT = 9,
+ NETIF_F_VLAN_CHALLENGED_BIT = 10,
+ NETIF_F_GSO_BIT = 11,
+ NETIF_F_LLTX_BIT = 12,
+ NETIF_F_NETNS_LOCAL_BIT = 13,
+ NETIF_F_GRO_BIT = 14,
+ NETIF_F_LRO_BIT = 15,
+ NETIF_F_GSO_SHIFT = 16,
+ NETIF_F_TSO_BIT = 16,
+ NETIF_F_GSO_ROBUST_BIT = 17,
+ NETIF_F_TSO_ECN_BIT = 18,
+ NETIF_F_TSO_MANGLEID_BIT = 19,
+ NETIF_F_TSO6_BIT = 20,
+ NETIF_F_FSO_BIT = 21,
+ NETIF_F_GSO_GRE_BIT = 22,
+ NETIF_F_GSO_GRE_CSUM_BIT = 23,
+ NETIF_F_GSO_IPXIP4_BIT = 24,
+ NETIF_F_GSO_IPXIP6_BIT = 25,
+ NETIF_F_GSO_UDP_TUNNEL_BIT = 26,
+ NETIF_F_GSO_UDP_TUNNEL_CSUM_BIT = 27,
+ NETIF_F_GSO_PARTIAL_BIT = 28,
+ NETIF_F_GSO_TUNNEL_REMCSUM_BIT = 29,
+ NETIF_F_GSO_SCTP_BIT = 30,
+ NETIF_F_GSO_ESP_BIT = 31,
+ NETIF_F_GSO_UDP_BIT = 32,
+ NETIF_F_GSO_UDP_L4_BIT = 33,
+ NETIF_F_GSO_FRAGLIST_BIT = 34,
+ NETIF_F_GSO_LAST = 34,
+ NETIF_F_FCOE_CRC_BIT = 35,
+ NETIF_F_SCTP_CRC_BIT = 36,
+ NETIF_F_FCOE_MTU_BIT = 37,
+ NETIF_F_NTUPLE_BIT = 38,
+ NETIF_F_RXHASH_BIT = 39,
+ NETIF_F_RXCSUM_BIT = 40,
+ NETIF_F_NOCACHE_COPY_BIT = 41,
+ NETIF_F_LOOPBACK_BIT = 42,
+ NETIF_F_RXFCS_BIT = 43,
+ NETIF_F_RXALL_BIT = 44,
+ NETIF_F_HW_VLAN_STAG_TX_BIT = 45,
+ NETIF_F_HW_VLAN_STAG_RX_BIT = 46,
+ NETIF_F_HW_VLAN_STAG_FILTER_BIT = 47,
+ NETIF_F_HW_L2FW_DOFFLOAD_BIT = 48,
+ NETIF_F_HW_TC_BIT = 49,
+ NETIF_F_HW_ESP_BIT = 50,
+ NETIF_F_HW_ESP_TX_CSUM_BIT = 51,
+ NETIF_F_RX_UDP_TUNNEL_PORT_BIT = 52,
+ NETIF_F_HW_TLS_TX_BIT = 53,
+ NETIF_F_HW_TLS_RX_BIT = 54,
+ NETIF_F_GRO_HW_BIT = 55,
+ NETIF_F_HW_TLS_RECORD_BIT = 56,
+ NETIF_F_GRO_FRAGLIST_BIT = 57,
+ NETIF_F_HW_MACSEC_BIT = 58,
+ NETIF_F_GRO_UDP_FWD_BIT = 59,
+ NETIF_F_HW_HSR_TAG_INS_BIT = 60,
+ NETIF_F_HW_HSR_TAG_RM_BIT = 61,
+ NETIF_F_HW_HSR_FWD_BIT = 62,
+ NETIF_F_HW_HSR_DUP_BIT = 63,
+ NETDEV_FEATURE_COUNT = 64,
+};
+
+enum skb_drop_reason {
+ SKB_NOT_DROPPED_YET = 0,
+ SKB_CONSUMED = 1,
+ SKB_DROP_REASON_NOT_SPECIFIED = 2,
+ SKB_DROP_REASON_NO_SOCKET = 3,
+ SKB_DROP_REASON_PKT_TOO_SMALL = 4,
+ SKB_DROP_REASON_TCP_CSUM = 5,
+ SKB_DROP_REASON_SOCKET_FILTER = 6,
+ SKB_DROP_REASON_UDP_CSUM = 7,
+ SKB_DROP_REASON_NETFILTER_DROP = 8,
+ SKB_DROP_REASON_OTHERHOST = 9,
+ SKB_DROP_REASON_IP_CSUM = 10,
+ SKB_DROP_REASON_IP_INHDR = 11,
+ SKB_DROP_REASON_IP_RPFILTER = 12,
+ SKB_DROP_REASON_UNICAST_IN_L2_MULTICAST = 13,
+ SKB_DROP_REASON_XFRM_POLICY = 14,
+ SKB_DROP_REASON_IP_NOPROTO = 15,
+ SKB_DROP_REASON_SOCKET_RCVBUFF = 16,
+ SKB_DROP_REASON_PROTO_MEM = 17,
+ SKB_DROP_REASON_TCP_MD5NOTFOUND = 18,
+ SKB_DROP_REASON_TCP_MD5UNEXPECTED = 19,
+ SKB_DROP_REASON_TCP_MD5FAILURE = 20,
+ SKB_DROP_REASON_SOCKET_BACKLOG = 21,
+ SKB_DROP_REASON_TCP_FLAGS = 22,
+ SKB_DROP_REASON_TCP_ZEROWINDOW = 23,
+ SKB_DROP_REASON_TCP_OLD_DATA = 24,
+ SKB_DROP_REASON_TCP_OVERWINDOW = 25,
+ SKB_DROP_REASON_TCP_OFOMERGE = 26,
+ SKB_DROP_REASON_TCP_RFC7323_PAWS = 27,
+ SKB_DROP_REASON_TCP_INVALID_SEQUENCE = 28,
+ SKB_DROP_REASON_TCP_RESET = 29,
+ SKB_DROP_REASON_TCP_INVALID_SYN = 30,
+ SKB_DROP_REASON_TCP_CLOSE = 31,
+ SKB_DROP_REASON_TCP_FASTOPEN = 32,
+ SKB_DROP_REASON_TCP_OLD_ACK = 33,
+ SKB_DROP_REASON_TCP_TOO_OLD_ACK = 34,
+ SKB_DROP_REASON_TCP_ACK_UNSENT_DATA = 35,
+ SKB_DROP_REASON_TCP_OFO_QUEUE_PRUNE = 36,
+ SKB_DROP_REASON_TCP_OFO_DROP = 37,
+ SKB_DROP_REASON_IP_OUTNOROUTES = 38,
+ SKB_DROP_REASON_BPF_CGROUP_EGRESS = 39,
+ SKB_DROP_REASON_IPV6DISABLED = 40,
+ SKB_DROP_REASON_NEIGH_CREATEFAIL = 41,
+ SKB_DROP_REASON_NEIGH_FAILED = 42,
+ SKB_DROP_REASON_NEIGH_QUEUEFULL = 43,
+ SKB_DROP_REASON_NEIGH_DEAD = 44,
+ SKB_DROP_REASON_TC_EGRESS = 45,
+ SKB_DROP_REASON_QDISC_DROP = 46,
+ SKB_DROP_REASON_CPU_BACKLOG = 47,
+ SKB_DROP_REASON_XDP = 48,
+ SKB_DROP_REASON_TC_INGRESS = 49,
+ SKB_DROP_REASON_UNHANDLED_PROTO = 50,
+ SKB_DROP_REASON_SKB_CSUM = 51,
+ SKB_DROP_REASON_SKB_GSO_SEG = 52,
+ SKB_DROP_REASON_SKB_UCOPY_FAULT = 53,
+ SKB_DROP_REASON_DEV_HDR = 54,
+ SKB_DROP_REASON_DEV_READY = 55,
+ SKB_DROP_REASON_FULL_RING = 56,
+ SKB_DROP_REASON_NOMEM = 57,
+ SKB_DROP_REASON_HDR_TRUNC = 58,
+ SKB_DROP_REASON_TAP_FILTER = 59,
+ SKB_DROP_REASON_TAP_TXFILTER = 60,
+ SKB_DROP_REASON_ICMP_CSUM = 61,
+ SKB_DROP_REASON_INVALID_PROTO = 62,
+ SKB_DROP_REASON_IP_INADDRERRORS = 63,
+ SKB_DROP_REASON_IP_INNOROUTES = 64,
+ SKB_DROP_REASON_PKT_TOO_BIG = 65,
+ SKB_DROP_REASON_DUP_FRAG = 66,
+ SKB_DROP_REASON_FRAG_REASM_TIMEOUT = 67,
+ SKB_DROP_REASON_FRAG_TOO_FAR = 68,
+ SKB_DROP_REASON_MAX = 69,
+};
+
+typedef struct bio_vec skb_frag_t;
+
+struct skb_shared_info {
+ __u8 flags;
+ __u8 meta_len;
+ __u8 nr_frags;
+ __u8 tx_flags;
+ short unsigned int gso_size;
+ short unsigned int gso_segs;
+ struct sk_buff *frag_list;
+ struct skb_shared_hwtstamps hwtstamps;
+ unsigned int gso_type;
+ u32 tskey;
+ atomic_t dataref;
+ unsigned int xdp_frags_size;
+ void *destructor_arg;
+ skb_frag_t frags[17];
+};
+
+enum net_device_flags {
+ IFF_UP = 1,
+ IFF_BROADCAST = 2,
+ IFF_DEBUG = 4,
+ IFF_LOOPBACK = 8,
+ IFF_POINTOPOINT = 16,
+ IFF_NOTRAILERS = 32,
+ IFF_RUNNING = 64,
+ IFF_NOARP = 128,
+ IFF_PROMISC = 256,
+ IFF_ALLMULTI = 512,
+ IFF_MASTER = 1024,
+ IFF_SLAVE = 2048,
+ IFF_MULTICAST = 4096,
+ IFF_PORTSEL = 8192,
+ IFF_AUTOMEDIA = 16384,
+ IFF_DYNAMIC = 32768,
+ IFF_LOWER_UP = 65536,
+ IFF_DORMANT = 131072,
+ IFF_ECHO = 262144,
+};
+
+struct gro_list {
+ struct list_head list;
+ int count;
+};
+
+struct napi_struct {
+ struct list_head poll_list;
+ long unsigned int state;
+ int weight;
+ int defer_hard_irqs_count;
+ long unsigned int gro_bitmask;
+ int (*poll)(struct napi_struct *, int);
+ struct net_device *dev;
+ struct gro_list gro_hash[8];
+ struct sk_buff *skb;
+ struct list_head rx_list;
+ int rx_count;
+ struct hrtimer timer;
+ struct list_head dev_list;
+ struct hlist_node napi_hash_node;
+ unsigned int napi_id;
+ struct task_struct *thread;
+};
+
+enum {
+ NAPI_STATE_SCHED = 0,
+ NAPI_STATE_MISSED = 1,
+ NAPI_STATE_DISABLE = 2,
+ NAPI_STATE_NPSVC = 3,
+ NAPI_STATE_LISTED = 4,
+ NAPI_STATE_NO_BUSY_POLL = 5,
+ NAPI_STATE_IN_BUSY_POLL = 6,
+ NAPI_STATE_PREFER_BUSY_POLL = 7,
+ NAPI_STATE_THREADED = 8,
+ NAPI_STATE_SCHED_THREADED = 9,
+};
+
+enum gro_result {
+ GRO_MERGED = 0,
+ GRO_MERGED_FREE = 1,
+ GRO_HELD = 2,
+ GRO_NORMAL = 3,
+ GRO_CONSUMED = 4,
+};
+
+typedef enum gro_result gro_result_t;
+
+enum xps_map_type {
+ XPS_CPUS = 0,
+ XPS_RXQS = 1,
+ XPS_MAPS_MAX = 2,
+};
+
+enum bpf_xdp_mode {
+ XDP_MODE_SKB = 0,
+ XDP_MODE_DRV = 1,
+ XDP_MODE_HW = 2,
+ __MAX_XDP_MODE = 3,
+};
+
+enum {
+ NETIF_MSG_DRV_BIT = 0,
+ NETIF_MSG_PROBE_BIT = 1,
+ NETIF_MSG_LINK_BIT = 2,
+ NETIF_MSG_TIMER_BIT = 3,
+ NETIF_MSG_IFDOWN_BIT = 4,
+ NETIF_MSG_IFUP_BIT = 5,
+ NETIF_MSG_RX_ERR_BIT = 6,
+ NETIF_MSG_TX_ERR_BIT = 7,
+ NETIF_MSG_TX_QUEUED_BIT = 8,
+ NETIF_MSG_INTR_BIT = 9,
+ NETIF_MSG_TX_DONE_BIT = 10,
+ NETIF_MSG_RX_STATUS_BIT = 11,
+ NETIF_MSG_PKTDATA_BIT = 12,
+ NETIF_MSG_HW_BIT = 13,
+ NETIF_MSG_WOL_BIT = 14,
+ NETIF_MSG_CLASS_COUNT = 15,
+};
+
+struct gro_cell;
+
+struct gro_cells {
+ struct gro_cell *cells;
+};
+
+struct gro_cell {
+ struct sk_buff_head napi_skbs;
+ struct napi_struct napi;
+};
+
+struct percpu_free_defer {
+ struct callback_head rcu;
+ void *ptr;
+};
+
+enum tunable_id {
+ ETHTOOL_ID_UNSPEC = 0,
+ ETHTOOL_RX_COPYBREAK = 1,
+ ETHTOOL_TX_COPYBREAK = 2,
+ ETHTOOL_PFC_PREVENTION_TOUT = 3,
+ ETHTOOL_TX_COPYBREAK_BUF_SIZE = 4,
+ __ETHTOOL_TUNABLE_COUNT = 5,
+};
+
+enum phy_tunable_id {
+ ETHTOOL_PHY_ID_UNSPEC = 0,
+ ETHTOOL_PHY_DOWNSHIFT = 1,
+ ETHTOOL_PHY_FAST_LINK_DOWN = 2,
+ ETHTOOL_PHY_EDPD = 3,
+ __ETHTOOL_PHY_TUNABLE_COUNT = 4,
+};
+
+enum ethtool_stringset {
+ ETH_SS_TEST = 0,
+ ETH_SS_STATS = 1,
+ ETH_SS_PRIV_FLAGS = 2,
+ ETH_SS_NTUPLE_FILTERS = 3,
+ ETH_SS_FEATURES = 4,
+ ETH_SS_RSS_HASH_FUNCS = 5,
+ ETH_SS_TUNABLES = 6,
+ ETH_SS_PHY_STATS = 7,
+ ETH_SS_PHY_TUNABLES = 8,
+ ETH_SS_LINK_MODES = 9,
+ ETH_SS_MSG_CLASSES = 10,
+ ETH_SS_WOL_MODES = 11,
+ ETH_SS_SOF_TIMESTAMPING = 12,
+ ETH_SS_TS_TX_TYPES = 13,
+ ETH_SS_TS_RX_FILTERS = 14,
+ ETH_SS_UDP_TUNNEL_TYPES = 15,
+ ETH_SS_STATS_STD = 16,
+ ETH_SS_STATS_ETH_PHY = 17,
+ ETH_SS_STATS_ETH_MAC = 18,
+ ETH_SS_STATS_ETH_CTRL = 19,
+ ETH_SS_STATS_RMON = 20,
+ ETH_SS_COUNT = 21,
+};
+
+enum {
+ ETH_RSS_HASH_TOP_BIT = 0,
+ ETH_RSS_HASH_XOR_BIT = 1,
+ ETH_RSS_HASH_CRC32_BIT = 2,
+ ETH_RSS_HASH_FUNCS_COUNT = 3,
+};
+
+enum {
+ ETHTOOL_MSG_USER_NONE = 0,
+ ETHTOOL_MSG_STRSET_GET = 1,
+ ETHTOOL_MSG_LINKINFO_GET = 2,
+ ETHTOOL_MSG_LINKINFO_SET = 3,
+ ETHTOOL_MSG_LINKMODES_GET = 4,
+ ETHTOOL_MSG_LINKMODES_SET = 5,
+ ETHTOOL_MSG_LINKSTATE_GET = 6,
+ ETHTOOL_MSG_DEBUG_GET = 7,
+ ETHTOOL_MSG_DEBUG_SET = 8,
+ ETHTOOL_MSG_WOL_GET = 9,
+ ETHTOOL_MSG_WOL_SET = 10,
+ ETHTOOL_MSG_FEATURES_GET = 11,
+ ETHTOOL_MSG_FEATURES_SET = 12,
+ ETHTOOL_MSG_PRIVFLAGS_GET = 13,
+ ETHTOOL_MSG_PRIVFLAGS_SET = 14,
+ ETHTOOL_MSG_RINGS_GET = 15,
+ ETHTOOL_MSG_RINGS_SET = 16,
+ ETHTOOL_MSG_CHANNELS_GET = 17,
+ ETHTOOL_MSG_CHANNELS_SET = 18,
+ ETHTOOL_MSG_COALESCE_GET = 19,
+ ETHTOOL_MSG_COALESCE_SET = 20,
+ ETHTOOL_MSG_PAUSE_GET = 21,
+ ETHTOOL_MSG_PAUSE_SET = 22,
+ ETHTOOL_MSG_EEE_GET = 23,
+ ETHTOOL_MSG_EEE_SET = 24,
+ ETHTOOL_MSG_TSINFO_GET = 25,
+ ETHTOOL_MSG_CABLE_TEST_ACT = 26,
+ ETHTOOL_MSG_CABLE_TEST_TDR_ACT = 27,
+ ETHTOOL_MSG_TUNNEL_INFO_GET = 28,
+ ETHTOOL_MSG_FEC_GET = 29,
+ ETHTOOL_MSG_FEC_SET = 30,
+ ETHTOOL_MSG_MODULE_EEPROM_GET = 31,
+ ETHTOOL_MSG_STATS_GET = 32,
+ ETHTOOL_MSG_PHC_VCLOCKS_GET = 33,
+ ETHTOOL_MSG_MODULE_GET = 34,
+ ETHTOOL_MSG_MODULE_SET = 35,
+ ETHTOOL_MSG_PSE_GET = 36,
+ ETHTOOL_MSG_PSE_SET = 37,
+ __ETHTOOL_MSG_USER_CNT = 38,
+ ETHTOOL_MSG_USER_MAX = 37,
+};
+
+enum {
+ ETHTOOL_MSG_KERNEL_NONE = 0,
+ ETHTOOL_MSG_STRSET_GET_REPLY = 1,
+ ETHTOOL_MSG_LINKINFO_GET_REPLY = 2,
+ ETHTOOL_MSG_LINKINFO_NTF = 3,
+ ETHTOOL_MSG_LINKMODES_GET_REPLY = 4,
+ ETHTOOL_MSG_LINKMODES_NTF = 5,
+ ETHTOOL_MSG_LINKSTATE_GET_REPLY = 6,
+ ETHTOOL_MSG_DEBUG_GET_REPLY = 7,
+ ETHTOOL_MSG_DEBUG_NTF = 8,
+ ETHTOOL_MSG_WOL_GET_REPLY = 9,
+ ETHTOOL_MSG_WOL_NTF = 10,
+ ETHTOOL_MSG_FEATURES_GET_REPLY = 11,
+ ETHTOOL_MSG_FEATURES_SET_REPLY = 12,
+ ETHTOOL_MSG_FEATURES_NTF = 13,
+ ETHTOOL_MSG_PRIVFLAGS_GET_REPLY = 14,
+ ETHTOOL_MSG_PRIVFLAGS_NTF = 15,
+ ETHTOOL_MSG_RINGS_GET_REPLY = 16,
+ ETHTOOL_MSG_RINGS_NTF = 17,
+ ETHTOOL_MSG_CHANNELS_GET_REPLY = 18,
+ ETHTOOL_MSG_CHANNELS_NTF = 19,
+ ETHTOOL_MSG_COALESCE_GET_REPLY = 20,
+ ETHTOOL_MSG_COALESCE_NTF = 21,
+ ETHTOOL_MSG_PAUSE_GET_REPLY = 22,
+ ETHTOOL_MSG_PAUSE_NTF = 23,
+ ETHTOOL_MSG_EEE_GET_REPLY = 24,
+ ETHTOOL_MSG_EEE_NTF = 25,
+ ETHTOOL_MSG_TSINFO_GET_REPLY = 26,
+ ETHTOOL_MSG_CABLE_TEST_NTF = 27,
+ ETHTOOL_MSG_CABLE_TEST_TDR_NTF = 28,
+ ETHTOOL_MSG_TUNNEL_INFO_GET_REPLY = 29,
+ ETHTOOL_MSG_FEC_GET_REPLY = 30,
+ ETHTOOL_MSG_FEC_NTF = 31,
+ ETHTOOL_MSG_MODULE_EEPROM_GET_REPLY = 32,
+ ETHTOOL_MSG_STATS_GET_REPLY = 33,
+ ETHTOOL_MSG_PHC_VCLOCKS_GET_REPLY = 34,
+ ETHTOOL_MSG_MODULE_GET_REPLY = 35,
+ ETHTOOL_MSG_MODULE_NTF = 36,
+ ETHTOOL_MSG_PSE_GET_REPLY = 37,
+ __ETHTOOL_MSG_KERNEL_CNT = 38,
+ ETHTOOL_MSG_KERNEL_MAX = 37,
+};
+
+enum {
+ ETHTOOL_A_HEADER_UNSPEC = 0,
+ ETHTOOL_A_HEADER_DEV_INDEX = 1,
+ ETHTOOL_A_HEADER_DEV_NAME = 2,
+ ETHTOOL_A_HEADER_FLAGS = 3,
+ __ETHTOOL_A_HEADER_CNT = 4,
+ ETHTOOL_A_HEADER_MAX = 3,
+};
+
+enum {
+ ETHTOOL_A_STRSET_UNSPEC = 0,
+ ETHTOOL_A_STRSET_HEADER = 1,
+ ETHTOOL_A_STRSET_STRINGSETS = 2,
+ ETHTOOL_A_STRSET_COUNTS_ONLY = 3,
+ __ETHTOOL_A_STRSET_CNT = 4,
+ ETHTOOL_A_STRSET_MAX = 3,
+};
+
+enum {
+ ETHTOOL_A_LINKINFO_UNSPEC = 0,
+ ETHTOOL_A_LINKINFO_HEADER = 1,
+ ETHTOOL_A_LINKINFO_PORT = 2,
+ ETHTOOL_A_LINKINFO_PHYADDR = 3,
+ ETHTOOL_A_LINKINFO_TP_MDIX = 4,
+ ETHTOOL_A_LINKINFO_TP_MDIX_CTRL = 5,
+ ETHTOOL_A_LINKINFO_TRANSCEIVER = 6,
+ __ETHTOOL_A_LINKINFO_CNT = 7,
+ ETHTOOL_A_LINKINFO_MAX = 6,
+};
+
+enum {
+ ETHTOOL_A_LINKMODES_UNSPEC = 0,
+ ETHTOOL_A_LINKMODES_HEADER = 1,
+ ETHTOOL_A_LINKMODES_AUTONEG = 2,
+ ETHTOOL_A_LINKMODES_OURS = 3,
+ ETHTOOL_A_LINKMODES_PEER = 4,
+ ETHTOOL_A_LINKMODES_SPEED = 5,
+ ETHTOOL_A_LINKMODES_DUPLEX = 6,
+ ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG = 7,
+ ETHTOOL_A_LINKMODES_MASTER_SLAVE_STATE = 8,
+ ETHTOOL_A_LINKMODES_LANES = 9,
+ ETHTOOL_A_LINKMODES_RATE_MATCHING = 10,
+ __ETHTOOL_A_LINKMODES_CNT = 11,
+ ETHTOOL_A_LINKMODES_MAX = 10,
+};
+
+enum {
+ ETHTOOL_A_LINKSTATE_UNSPEC = 0,
+ ETHTOOL_A_LINKSTATE_HEADER = 1,
+ ETHTOOL_A_LINKSTATE_LINK = 2,
+ ETHTOOL_A_LINKSTATE_SQI = 3,
+ ETHTOOL_A_LINKSTATE_SQI_MAX = 4,
+ ETHTOOL_A_LINKSTATE_EXT_STATE = 5,
+ ETHTOOL_A_LINKSTATE_EXT_SUBSTATE = 6,
+ ETHTOOL_A_LINKSTATE_EXT_DOWN_CNT = 7,
+ __ETHTOOL_A_LINKSTATE_CNT = 8,
+ ETHTOOL_A_LINKSTATE_MAX = 7,
+};
+
+enum {
+ ETHTOOL_A_DEBUG_UNSPEC = 0,
+ ETHTOOL_A_DEBUG_HEADER = 1,
+ ETHTOOL_A_DEBUG_MSGMASK = 2,
+ __ETHTOOL_A_DEBUG_CNT = 3,
+ ETHTOOL_A_DEBUG_MAX = 2,
+};
+
+enum {
+ ETHTOOL_A_WOL_UNSPEC = 0,
+ ETHTOOL_A_WOL_HEADER = 1,
+ ETHTOOL_A_WOL_MODES = 2,
+ ETHTOOL_A_WOL_SOPASS = 3,
+ __ETHTOOL_A_WOL_CNT = 4,
+ ETHTOOL_A_WOL_MAX = 3,
+};
+
+enum {
+ ETHTOOL_A_FEATURES_UNSPEC = 0,
+ ETHTOOL_A_FEATURES_HEADER = 1,
+ ETHTOOL_A_FEATURES_HW = 2,
+ ETHTOOL_A_FEATURES_WANTED = 3,
+ ETHTOOL_A_FEATURES_ACTIVE = 4,
+ ETHTOOL_A_FEATURES_NOCHANGE = 5,
+ __ETHTOOL_A_FEATURES_CNT = 6,
+ ETHTOOL_A_FEATURES_MAX = 5,
+};
+
+enum {
+ ETHTOOL_A_PRIVFLAGS_UNSPEC = 0,
+ ETHTOOL_A_PRIVFLAGS_HEADER = 1,
+ ETHTOOL_A_PRIVFLAGS_FLAGS = 2,
+ __ETHTOOL_A_PRIVFLAGS_CNT = 3,
+ ETHTOOL_A_PRIVFLAGS_MAX = 2,
+};
+
+enum {
+ ETHTOOL_A_RINGS_UNSPEC = 0,
+ ETHTOOL_A_RINGS_HEADER = 1,
+ ETHTOOL_A_RINGS_RX_MAX = 2,
+ ETHTOOL_A_RINGS_RX_MINI_MAX = 3,
+ ETHTOOL_A_RINGS_RX_JUMBO_MAX = 4,
+ ETHTOOL_A_RINGS_TX_MAX = 5,
+ ETHTOOL_A_RINGS_RX = 6,
+ ETHTOOL_A_RINGS_RX_MINI = 7,
+ ETHTOOL_A_RINGS_RX_JUMBO = 8,
+ ETHTOOL_A_RINGS_TX = 9,
+ ETHTOOL_A_RINGS_RX_BUF_LEN = 10,
+ ETHTOOL_A_RINGS_TCP_DATA_SPLIT = 11,
+ ETHTOOL_A_RINGS_CQE_SIZE = 12,
+ ETHTOOL_A_RINGS_TX_PUSH = 13,
+ __ETHTOOL_A_RINGS_CNT = 14,
+ ETHTOOL_A_RINGS_MAX = 13,
+};
+
+enum {
+ ETHTOOL_A_CHANNELS_UNSPEC = 0,
+ ETHTOOL_A_CHANNELS_HEADER = 1,
+ ETHTOOL_A_CHANNELS_RX_MAX = 2,
+ ETHTOOL_A_CHANNELS_TX_MAX = 3,
+ ETHTOOL_A_CHANNELS_OTHER_MAX = 4,
+ ETHTOOL_A_CHANNELS_COMBINED_MAX = 5,
+ ETHTOOL_A_CHANNELS_RX_COUNT = 6,
+ ETHTOOL_A_CHANNELS_TX_COUNT = 7,
+ ETHTOOL_A_CHANNELS_OTHER_COUNT = 8,
+ ETHTOOL_A_CHANNELS_COMBINED_COUNT = 9,
+ __ETHTOOL_A_CHANNELS_CNT = 10,
+ ETHTOOL_A_CHANNELS_MAX = 9,
+};
+
+enum {
+ ETHTOOL_A_COALESCE_UNSPEC = 0,
+ ETHTOOL_A_COALESCE_HEADER = 1,
+ ETHTOOL_A_COALESCE_RX_USECS = 2,
+ ETHTOOL_A_COALESCE_RX_MAX_FRAMES = 3,
+ ETHTOOL_A_COALESCE_RX_USECS_IRQ = 4,
+ ETHTOOL_A_COALESCE_RX_MAX_FRAMES_IRQ = 5,
+ ETHTOOL_A_COALESCE_TX_USECS = 6,
+ ETHTOOL_A_COALESCE_TX_MAX_FRAMES = 7,
+ ETHTOOL_A_COALESCE_TX_USECS_IRQ = 8,
+ ETHTOOL_A_COALESCE_TX_MAX_FRAMES_IRQ = 9,
+ ETHTOOL_A_COALESCE_STATS_BLOCK_USECS = 10,
+ ETHTOOL_A_COALESCE_USE_ADAPTIVE_RX = 11,
+ ETHTOOL_A_COALESCE_USE_ADAPTIVE_TX = 12,
+ ETHTOOL_A_COALESCE_PKT_RATE_LOW = 13,
+ ETHTOOL_A_COALESCE_RX_USECS_LOW = 14,
+ ETHTOOL_A_COALESCE_RX_MAX_FRAMES_LOW = 15,
+ ETHTOOL_A_COALESCE_TX_USECS_LOW = 16,
+ ETHTOOL_A_COALESCE_TX_MAX_FRAMES_LOW = 17,
+ ETHTOOL_A_COALESCE_PKT_RATE_HIGH = 18,
+ ETHTOOL_A_COALESCE_RX_USECS_HIGH = 19,
+ ETHTOOL_A_COALESCE_RX_MAX_FRAMES_HIGH = 20,
+ ETHTOOL_A_COALESCE_TX_USECS_HIGH = 21,
+ ETHTOOL_A_COALESCE_TX_MAX_FRAMES_HIGH = 22,
+ ETHTOOL_A_COALESCE_RATE_SAMPLE_INTERVAL = 23,
+ ETHTOOL_A_COALESCE_USE_CQE_MODE_TX = 24,
+ ETHTOOL_A_COALESCE_USE_CQE_MODE_RX = 25,
+ __ETHTOOL_A_COALESCE_CNT = 26,
+ ETHTOOL_A_COALESCE_MAX = 25,
+};
+
+enum {
+ ETHTOOL_A_PAUSE_UNSPEC = 0,
+ ETHTOOL_A_PAUSE_HEADER = 1,
+ ETHTOOL_A_PAUSE_AUTONEG = 2,
+ ETHTOOL_A_PAUSE_RX = 3,
+ ETHTOOL_A_PAUSE_TX = 4,
+ ETHTOOL_A_PAUSE_STATS = 5,
+ __ETHTOOL_A_PAUSE_CNT = 6,
+ ETHTOOL_A_PAUSE_MAX = 5,
+};
+
+enum {
+ ETHTOOL_A_EEE_UNSPEC = 0,
+ ETHTOOL_A_EEE_HEADER = 1,
+ ETHTOOL_A_EEE_MODES_OURS = 2,
+ ETHTOOL_A_EEE_MODES_PEER = 3,
+ ETHTOOL_A_EEE_ACTIVE = 4,
+ ETHTOOL_A_EEE_ENABLED = 5,
+ ETHTOOL_A_EEE_TX_LPI_ENABLED = 6,
+ ETHTOOL_A_EEE_TX_LPI_TIMER = 7,
+ __ETHTOOL_A_EEE_CNT = 8,
+ ETHTOOL_A_EEE_MAX = 7,
+};
+
+enum {
+ ETHTOOL_A_TSINFO_UNSPEC = 0,
+ ETHTOOL_A_TSINFO_HEADER = 1,
+ ETHTOOL_A_TSINFO_TIMESTAMPING = 2,
+ ETHTOOL_A_TSINFO_TX_TYPES = 3,
+ ETHTOOL_A_TSINFO_RX_FILTERS = 4,
+ ETHTOOL_A_TSINFO_PHC_INDEX = 5,
+ __ETHTOOL_A_TSINFO_CNT = 6,
+ ETHTOOL_A_TSINFO_MAX = 5,
+};
+
+enum {
+ ETHTOOL_A_PHC_VCLOCKS_UNSPEC = 0,
+ ETHTOOL_A_PHC_VCLOCKS_HEADER = 1,
+ ETHTOOL_A_PHC_VCLOCKS_NUM = 2,
+ ETHTOOL_A_PHC_VCLOCKS_INDEX = 3,
+ __ETHTOOL_A_PHC_VCLOCKS_CNT = 4,
+ ETHTOOL_A_PHC_VCLOCKS_MAX = 3,
+};
+
+enum {
+ ETHTOOL_A_CABLE_TEST_UNSPEC = 0,
+ ETHTOOL_A_CABLE_TEST_HEADER = 1,
+ __ETHTOOL_A_CABLE_TEST_CNT = 2,
+ ETHTOOL_A_CABLE_TEST_MAX = 1,
+};
+
+enum {
+ ETHTOOL_A_CABLE_TEST_TDR_UNSPEC = 0,
+ ETHTOOL_A_CABLE_TEST_TDR_HEADER = 1,
+ ETHTOOL_A_CABLE_TEST_TDR_CFG = 2,
+ __ETHTOOL_A_CABLE_TEST_TDR_CNT = 3,
+ ETHTOOL_A_CABLE_TEST_TDR_MAX = 2,
+};
+
+enum {
+ ETHTOOL_A_TUNNEL_INFO_UNSPEC = 0,
+ ETHTOOL_A_TUNNEL_INFO_HEADER = 1,
+ ETHTOOL_A_TUNNEL_INFO_UDP_PORTS = 2,
+ __ETHTOOL_A_TUNNEL_INFO_CNT = 3,
+ ETHTOOL_A_TUNNEL_INFO_MAX = 2,
+};
+
+enum {
+ ETHTOOL_A_FEC_UNSPEC = 0,
+ ETHTOOL_A_FEC_HEADER = 1,
+ ETHTOOL_A_FEC_MODES = 2,
+ ETHTOOL_A_FEC_AUTO = 3,
+ ETHTOOL_A_FEC_ACTIVE = 4,
+ ETHTOOL_A_FEC_STATS = 5,
+ __ETHTOOL_A_FEC_CNT = 6,
+ ETHTOOL_A_FEC_MAX = 5,
+};
+
+enum {
+ ETHTOOL_A_MODULE_EEPROM_UNSPEC = 0,
+ ETHTOOL_A_MODULE_EEPROM_HEADER = 1,
+ ETHTOOL_A_MODULE_EEPROM_OFFSET = 2,
+ ETHTOOL_A_MODULE_EEPROM_LENGTH = 3,
+ ETHTOOL_A_MODULE_EEPROM_PAGE = 4,
+ ETHTOOL_A_MODULE_EEPROM_BANK = 5,
+ ETHTOOL_A_MODULE_EEPROM_I2C_ADDRESS = 6,
+ ETHTOOL_A_MODULE_EEPROM_DATA = 7,
+ __ETHTOOL_A_MODULE_EEPROM_CNT = 8,
+ ETHTOOL_A_MODULE_EEPROM_MAX = 7,
+};
+
+enum {
+ ETHTOOL_A_STATS_UNSPEC = 0,
+ ETHTOOL_A_STATS_PAD = 1,
+ ETHTOOL_A_STATS_HEADER = 2,
+ ETHTOOL_A_STATS_GROUPS = 3,
+ ETHTOOL_A_STATS_GRP = 4,
+ __ETHTOOL_A_STATS_CNT = 5,
+ ETHTOOL_A_STATS_MAX = 4,
+};
+
+enum {
+ ETHTOOL_STATS_ETH_PHY = 0,
+ ETHTOOL_STATS_ETH_MAC = 1,
+ ETHTOOL_STATS_ETH_CTRL = 2,
+ ETHTOOL_STATS_RMON = 3,
+ __ETHTOOL_STATS_CNT = 4,
+};
+
+enum {
+ ETHTOOL_A_STATS_GRP_UNSPEC = 0,
+ ETHTOOL_A_STATS_GRP_PAD = 1,
+ ETHTOOL_A_STATS_GRP_ID = 2,
+ ETHTOOL_A_STATS_GRP_SS_ID = 3,
+ ETHTOOL_A_STATS_GRP_STAT = 4,
+ ETHTOOL_A_STATS_GRP_HIST_RX = 5,
+ ETHTOOL_A_STATS_GRP_HIST_TX = 6,
+ ETHTOOL_A_STATS_GRP_HIST_BKT_LOW = 7,
+ ETHTOOL_A_STATS_GRP_HIST_BKT_HI = 8,
+ ETHTOOL_A_STATS_GRP_HIST_VAL = 9,
+ __ETHTOOL_A_STATS_GRP_CNT = 10,
+ ETHTOOL_A_STATS_GRP_MAX = 4,
+};
+
+enum {
+ ETHTOOL_A_STATS_ETH_PHY_5_SYM_ERR = 0,
+ __ETHTOOL_A_STATS_ETH_PHY_CNT = 1,
+ ETHTOOL_A_STATS_ETH_PHY_MAX = 0,
+};
+
+enum {
+ ETHTOOL_A_STATS_ETH_MAC_2_TX_PKT = 0,
+ ETHTOOL_A_STATS_ETH_MAC_3_SINGLE_COL = 1,
+ ETHTOOL_A_STATS_ETH_MAC_4_MULTI_COL = 2,
+ ETHTOOL_A_STATS_ETH_MAC_5_RX_PKT = 3,
+ ETHTOOL_A_STATS_ETH_MAC_6_FCS_ERR = 4,
+ ETHTOOL_A_STATS_ETH_MAC_7_ALIGN_ERR = 5,
+ ETHTOOL_A_STATS_ETH_MAC_8_TX_BYTES = 6,
+ ETHTOOL_A_STATS_ETH_MAC_9_TX_DEFER = 7,
+ ETHTOOL_A_STATS_ETH_MAC_10_LATE_COL = 8,
+ ETHTOOL_A_STATS_ETH_MAC_11_XS_COL = 9,
+ ETHTOOL_A_STATS_ETH_MAC_12_TX_INT_ERR = 10,
+ ETHTOOL_A_STATS_ETH_MAC_13_CS_ERR = 11,
+ ETHTOOL_A_STATS_ETH_MAC_14_RX_BYTES = 12,
+ ETHTOOL_A_STATS_ETH_MAC_15_RX_INT_ERR = 13,
+ ETHTOOL_A_STATS_ETH_MAC_18_TX_MCAST = 14,
+ ETHTOOL_A_STATS_ETH_MAC_19_TX_BCAST = 15,
+ ETHTOOL_A_STATS_ETH_MAC_20_XS_DEFER = 16,
+ ETHTOOL_A_STATS_ETH_MAC_21_RX_MCAST = 17,
+ ETHTOOL_A_STATS_ETH_MAC_22_RX_BCAST = 18,
+ ETHTOOL_A_STATS_ETH_MAC_23_IR_LEN_ERR = 19,
+ ETHTOOL_A_STATS_ETH_MAC_24_OOR_LEN = 20,
+ ETHTOOL_A_STATS_ETH_MAC_25_TOO_LONG_ERR = 21,
+ __ETHTOOL_A_STATS_ETH_MAC_CNT = 22,
+ ETHTOOL_A_STATS_ETH_MAC_MAX = 21,
+};
+
+enum {
+ ETHTOOL_A_STATS_ETH_CTRL_3_TX = 0,
+ ETHTOOL_A_STATS_ETH_CTRL_4_RX = 1,
+ ETHTOOL_A_STATS_ETH_CTRL_5_RX_UNSUP = 2,
+ __ETHTOOL_A_STATS_ETH_CTRL_CNT = 3,
+ ETHTOOL_A_STATS_ETH_CTRL_MAX = 2,
+};
+
+enum {
+ ETHTOOL_A_STATS_RMON_UNDERSIZE = 0,
+ ETHTOOL_A_STATS_RMON_OVERSIZE = 1,
+ ETHTOOL_A_STATS_RMON_FRAG = 2,
+ ETHTOOL_A_STATS_RMON_JABBER = 3,
+ __ETHTOOL_A_STATS_RMON_CNT = 4,
+ ETHTOOL_A_STATS_RMON_MAX = 3,
+};
+
+enum {
+ ETHTOOL_A_MODULE_UNSPEC = 0,
+ ETHTOOL_A_MODULE_HEADER = 1,
+ ETHTOOL_A_MODULE_POWER_MODE_POLICY = 2,
+ ETHTOOL_A_MODULE_POWER_MODE = 3,
+ __ETHTOOL_A_MODULE_CNT = 4,
+ ETHTOOL_A_MODULE_MAX = 3,
+};
+
+enum {
+ ETHTOOL_A_PSE_UNSPEC = 0,
+ ETHTOOL_A_PSE_HEADER = 1,
+ ETHTOOL_A_PODL_PSE_ADMIN_STATE = 2,
+ ETHTOOL_A_PODL_PSE_ADMIN_CONTROL = 3,
+ ETHTOOL_A_PODL_PSE_PW_D_STATUS = 4,
+ __ETHTOOL_A_PSE_CNT = 5,
+ ETHTOOL_A_PSE_MAX = 4,
+};
+
+struct genlmsghdr {
+ __u8 cmd;
+ __u8 version;
+ __u16 reserved;
+};
+
+enum {
+ NLA_UNSPEC = 0,
+ NLA_U8 = 1,
+ NLA_U16 = 2,
+ NLA_U32 = 3,
+ NLA_U64 = 4,
+ NLA_STRING = 5,
+ NLA_FLAG = 6,
+ NLA_MSECS = 7,
+ NLA_NESTED = 8,
+ NLA_NESTED_ARRAY = 9,
+ NLA_NUL_STRING = 10,
+ NLA_BINARY = 11,
+ NLA_S8 = 12,
+ NLA_S16 = 13,
+ NLA_S32 = 14,
+ NLA_S64 = 15,
+ NLA_BITFIELD32 = 16,
+ NLA_REJECT = 17,
+ NLA_BE16 = 18,
+ NLA_BE32 = 19,
+ __NLA_TYPE_MAX = 20,
+};
+
+struct genl_info {
+ u32 snd_seq;
+ u32 snd_portid;
+ struct nlmsghdr *nlhdr;
+ struct genlmsghdr *genlhdr;
+ void *userhdr;
+ struct nlattr **attrs;
+ possible_net_t _net;
+ void *user_ptr[2];
+ struct netlink_ext_ack *extack;
+};
+
+struct ethnl_req_info {
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ u32 flags;
+};
+
+struct ethnl_reply_data {
+ struct net_device *dev;
+};
+
+struct ethnl_request_ops {
+ u8 request_cmd;
+ u8 reply_cmd;
+ u16 hdr_attr;
+ unsigned int req_info_size;
+ unsigned int reply_data_size;
+ bool allow_nodev_do;
+ int (*parse_request)(struct ethnl_req_info *, struct nlattr **, struct netlink_ext_ack *);
+ int (*prepare_data)(const struct ethnl_req_info *, struct ethnl_reply_data *, struct genl_info *);
+ int (*reply_size)(const struct ethnl_req_info *, const struct ethnl_reply_data *);
+ int (*fill_reply)(struct sk_buff *, const struct ethnl_req_info *, const struct ethnl_reply_data *);
+ void (*cleanup_data)(struct ethnl_reply_data *);
+};
+
+typedef const char (* const ethnl_string_array_t)[32];
+
+struct stats_req_info {
+ struct ethnl_req_info base;
+ long unsigned int stat_mask[1];
+};
+
+struct stats_reply_data {
+ struct ethnl_reply_data base;
+ union {
+ struct {
+ struct ethtool_eth_phy_stats phy_stats;
+ struct ethtool_eth_mac_stats mac_stats;
+ struct ethtool_eth_ctrl_stats ctrl_stats;
+ struct ethtool_rmon_stats rmon_stats;
+ };
+ struct {
+ struct ethtool_eth_phy_stats phy_stats;
+ struct ethtool_eth_mac_stats mac_stats;
+ struct ethtool_eth_ctrl_stats ctrl_stats;
+ struct ethtool_rmon_stats rmon_stats;
+ } stats;
+ };
+ const struct ethtool_rmon_hist_range *rmon_ranges;
+};
+
+typedef __kernel_clock_t clock_t;
+
+struct static_key_false {
+ struct static_key key;
+};
+
+struct bpf_run_ctx {};
+
+struct __kernel_sockaddr_storage {
+ union {
+ struct {
+ __kernel_sa_family_t ss_family;
+ char __data[126];
+ };
+ void *__align;
+ };
+};
+
+struct inet_ehash_bucket;
+
+struct inet_bind_hashbucket;
+
+struct inet_listen_hashbucket;
+
+struct inet_hashinfo {
+ struct inet_ehash_bucket *ehash;
+ spinlock_t *ehash_locks;
+ unsigned int ehash_mask;
+ unsigned int ehash_locks_mask;
+ struct kmem_cache *bind_bucket_cachep;
+ struct inet_bind_hashbucket *bhash;
+ struct kmem_cache *bind2_bucket_cachep;
+ struct inet_bind_hashbucket *bhash2;
+ unsigned int bhash_size;
+ unsigned int lhash2_mask;
+ struct inet_listen_hashbucket *lhash2;
+ bool pernet;
+};
+
+struct ipv4_devconf {
+ void *sysctl;
+ int data[33];
+ long unsigned int state[1];
+};
+
+struct tcp_fastopen_context {
+ siphash_key_t key[2];
+ int num;
+ struct callback_head rcu;
+};
+
+struct in_addr {
+ __be32 s_addr;
+};
+
+struct sockaddr_in {
+ __kernel_sa_family_t sin_family;
+ __be16 sin_port;
+ struct in_addr sin_addr;
+ unsigned char __pad[8];
+};
+
+struct hlist_nulls_head {
+ struct hlist_nulls_node *first;
+};
+
+struct nf_conntrack {
+ refcount_t use;
+};
+
+typedef union {
+ __be32 a4;
+ __be32 a6[4];
+ struct in6_addr in6;
+} xfrm_address_t;
+
+struct xfrm_id {
+ xfrm_address_t daddr;
+ __be32 spi;
+ __u8 proto;
+};
+
+struct xfrm_sec_ctx {
+ __u8 ctx_doi;
+ __u8 ctx_alg;
+ __u16 ctx_len;
+ __u32 ctx_sid;
+ char ctx_str[0];
+};
+
+struct xfrm_selector {
+ xfrm_address_t daddr;
+ xfrm_address_t saddr;
+ __be16 dport;
+ __be16 dport_mask;
+ __be16 sport;
+ __be16 sport_mask;
+ __u16 family;
+ __u8 prefixlen_d;
+ __u8 prefixlen_s;
+ __u8 proto;
+ int ifindex;
+ __kernel_uid32_t user;
+};
+
+struct xfrm_lifetime_cfg {
+ __u64 soft_byte_limit;
+ __u64 hard_byte_limit;
+ __u64 soft_packet_limit;
+ __u64 hard_packet_limit;
+ __u64 soft_add_expires_seconds;
+ __u64 hard_add_expires_seconds;
+ __u64 soft_use_expires_seconds;
+ __u64 hard_use_expires_seconds;
+};
+
+struct xfrm_lifetime_cur {
+ __u64 bytes;
+ __u64 packets;
+ __u64 add_time;
+ __u64 use_time;
+};
+
+struct xfrm_replay_state {
+ __u32 oseq;
+ __u32 seq;
+ __u32 bitmap;
+};
+
+struct xfrm_replay_state_esn {
+ unsigned int bmp_len;
+ __u32 oseq;
+ __u32 seq;
+ __u32 oseq_hi;
+ __u32 seq_hi;
+ __u32 replay_window;
+ __u32 bmp[0];
+};
+
+struct xfrm_algo {
+ char alg_name[64];
+ unsigned int alg_key_len;
+ char alg_key[0];
+};
+
+struct xfrm_algo_auth {
+ char alg_name[64];
+ unsigned int alg_key_len;
+ unsigned int alg_trunc_len;
+ char alg_key[0];
+};
+
+struct xfrm_algo_aead {
+ char alg_name[64];
+ unsigned int alg_key_len;
+ unsigned int alg_icv_len;
+ char alg_key[0];
+};
+
+struct xfrm_stats {
+ __u32 replay_window;
+ __u32 replay;
+ __u32 integrity_failed;
+};
+
+enum {
+ XFRM_POLICY_TYPE_MAIN = 0,
+ XFRM_POLICY_TYPE_SUB = 1,
+ XFRM_POLICY_TYPE_MAX = 2,
+ XFRM_POLICY_TYPE_ANY = 255,
+};
+
+enum {
+ XFRM_MSG_BASE = 16,
+ XFRM_MSG_NEWSA = 16,
+ XFRM_MSG_DELSA = 17,
+ XFRM_MSG_GETSA = 18,
+ XFRM_MSG_NEWPOLICY = 19,
+ XFRM_MSG_DELPOLICY = 20,
+ XFRM_MSG_GETPOLICY = 21,
+ XFRM_MSG_ALLOCSPI = 22,
+ XFRM_MSG_ACQUIRE = 23,
+ XFRM_MSG_EXPIRE = 24,
+ XFRM_MSG_UPDPOLICY = 25,
+ XFRM_MSG_UPDSA = 26,
+ XFRM_MSG_POLEXPIRE = 27,
+ XFRM_MSG_FLUSHSA = 28,
+ XFRM_MSG_FLUSHPOLICY = 29,
+ XFRM_MSG_NEWAE = 30,
+ XFRM_MSG_GETAE = 31,
+ XFRM_MSG_REPORT = 32,
+ XFRM_MSG_MIGRATE = 33,
+ XFRM_MSG_NEWSADINFO = 34,
+ XFRM_MSG_GETSADINFO = 35,
+ XFRM_MSG_NEWSPDINFO = 36,
+ XFRM_MSG_GETSPDINFO = 37,
+ XFRM_MSG_MAPPING = 38,
+ XFRM_MSG_SETDEFAULT = 39,
+ XFRM_MSG_GETDEFAULT = 40,
+ __XFRM_MSG_MAX = 41,
+};
+
+struct xfrm_encap_tmpl {
+ __u16 encap_type;
+ __be16 encap_sport;
+ __be16 encap_dport;
+ xfrm_address_t encap_oa;
+};
+
+enum xfrm_attr_type_t {
+ XFRMA_UNSPEC = 0,
+ XFRMA_ALG_AUTH = 1,
+ XFRMA_ALG_CRYPT = 2,
+ XFRMA_ALG_COMP = 3,
+ XFRMA_ENCAP = 4,
+ XFRMA_TMPL = 5,
+ XFRMA_SA = 6,
+ XFRMA_POLICY = 7,
+ XFRMA_SEC_CTX = 8,
+ XFRMA_LTIME_VAL = 9,
+ XFRMA_REPLAY_VAL = 10,
+ XFRMA_REPLAY_THRESH = 11,
+ XFRMA_ETIMER_THRESH = 12,
+ XFRMA_SRCADDR = 13,
+ XFRMA_COADDR = 14,
+ XFRMA_LASTUSED = 15,
+ XFRMA_POLICY_TYPE = 16,
+ XFRMA_MIGRATE = 17,
+ XFRMA_ALG_AEAD = 18,
+ XFRMA_KMADDRESS = 19,
+ XFRMA_ALG_AUTH_TRUNC = 20,
+ XFRMA_MARK = 21,
+ XFRMA_TFCPAD = 22,
+ XFRMA_REPLAY_ESN_VAL = 23,
+ XFRMA_SA_EXTRA_FLAGS = 24,
+ XFRMA_PROTO = 25,
+ XFRMA_ADDRESS_FILTER = 26,
+ XFRMA_PAD = 27,
+ XFRMA_OFFLOAD_DEV = 28,
+ XFRMA_SET_MARK = 29,
+ XFRMA_SET_MARK_MASK = 30,
+ XFRMA_IF_ID = 31,
+ XFRMA_MTIMER_THRESH = 32,
+ __XFRMA_MAX = 33,
+};
+
+struct xfrm_mark {
+ __u32 v;
+ __u32 m;
+};
+
+struct xfrm_address_filter {
+ xfrm_address_t saddr;
+ xfrm_address_t daddr;
+ __u16 family;
+ __u8 splen;
+ __u8 dplen;
+};
+
+struct bpf_cgroup_storage;
+
+struct bpf_prog_array_item {
+ struct bpf_prog *prog;
+ union {
+ struct bpf_cgroup_storage *cgroup_storage[2];
+ u64 bpf_cookie;
+ };
+};
+
+struct bpf_prog_array {
+ struct callback_head rcu;
+ struct bpf_prog_array_item items[0];
+};
+
+enum bpf_prog_type {
+ BPF_PROG_TYPE_UNSPEC = 0,
+ BPF_PROG_TYPE_SOCKET_FILTER = 1,
+ BPF_PROG_TYPE_KPROBE = 2,
+ BPF_PROG_TYPE_SCHED_CLS = 3,
+ BPF_PROG_TYPE_SCHED_ACT = 4,
+ BPF_PROG_TYPE_TRACEPOINT = 5,
+ BPF_PROG_TYPE_XDP = 6,
+ BPF_PROG_TYPE_PERF_EVENT = 7,
+ BPF_PROG_TYPE_CGROUP_SKB = 8,
+ BPF_PROG_TYPE_CGROUP_SOCK = 9,
+ BPF_PROG_TYPE_LWT_IN = 10,
+ BPF_PROG_TYPE_LWT_OUT = 11,
+ BPF_PROG_TYPE_LWT_XMIT = 12,
+ BPF_PROG_TYPE_SOCK_OPS = 13,
+ BPF_PROG_TYPE_SK_SKB = 14,
+ BPF_PROG_TYPE_CGROUP_DEVICE = 15,
+ BPF_PROG_TYPE_SK_MSG = 16,
+ BPF_PROG_TYPE_RAW_TRACEPOINT = 17,
+ BPF_PROG_TYPE_CGROUP_SOCK_ADDR = 18,
+ BPF_PROG_TYPE_LWT_SEG6LOCAL = 19,
+ BPF_PROG_TYPE_LIRC_MODE2 = 20,
+ BPF_PROG_TYPE_SK_REUSEPORT = 21,
+ BPF_PROG_TYPE_FLOW_DISSECTOR = 22,
+ BPF_PROG_TYPE_CGROUP_SYSCTL = 23,
+ BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE = 24,
+ BPF_PROG_TYPE_CGROUP_SOCKOPT = 25,
+ BPF_PROG_TYPE_TRACING = 26,
+ BPF_PROG_TYPE_STRUCT_OPS = 27,
+ BPF_PROG_TYPE_EXT = 28,
+ BPF_PROG_TYPE_LSM = 29,
+ BPF_PROG_TYPE_SK_LOOKUP = 30,
+ BPF_PROG_TYPE_SYSCALL = 31,
+};
+
+enum bpf_attach_type {
+ BPF_CGROUP_INET_INGRESS = 0,
+ BPF_CGROUP_INET_EGRESS = 1,
+ BPF_CGROUP_INET_SOCK_CREATE = 2,
+ BPF_CGROUP_SOCK_OPS = 3,
+ BPF_SK_SKB_STREAM_PARSER = 4,
+ BPF_SK_SKB_STREAM_VERDICT = 5,
+ BPF_CGROUP_DEVICE = 6,
+ BPF_SK_MSG_VERDICT = 7,
+ BPF_CGROUP_INET4_BIND = 8,
+ BPF_CGROUP_INET6_BIND = 9,
+ BPF_CGROUP_INET4_CONNECT = 10,
+ BPF_CGROUP_INET6_CONNECT = 11,
+ BPF_CGROUP_INET4_POST_BIND = 12,
+ BPF_CGROUP_INET6_POST_BIND = 13,
+ BPF_CGROUP_UDP4_SENDMSG = 14,
+ BPF_CGROUP_UDP6_SENDMSG = 15,
+ BPF_LIRC_MODE2 = 16,
+ BPF_FLOW_DISSECTOR = 17,
+ BPF_CGROUP_SYSCTL = 18,
+ BPF_CGROUP_UDP4_RECVMSG = 19,
+ BPF_CGROUP_UDP6_RECVMSG = 20,
+ BPF_CGROUP_GETSOCKOPT = 21,
+ BPF_CGROUP_SETSOCKOPT = 22,
+ BPF_TRACE_RAW_TP = 23,
+ BPF_TRACE_FENTRY = 24,
+ BPF_TRACE_FEXIT = 25,
+ BPF_MODIFY_RETURN = 26,
+ BPF_LSM_MAC = 27,
+ BPF_TRACE_ITER = 28,
+ BPF_CGROUP_INET4_GETPEERNAME = 29,
+ BPF_CGROUP_INET6_GETPEERNAME = 30,
+ BPF_CGROUP_INET4_GETSOCKNAME = 31,
+ BPF_CGROUP_INET6_GETSOCKNAME = 32,
+ BPF_XDP_DEVMAP = 33,
+ BPF_CGROUP_INET_SOCK_RELEASE = 34,
+ BPF_XDP_CPUMAP = 35,
+ BPF_SK_LOOKUP = 36,
+ BPF_XDP = 37,
+ BPF_SK_SKB_VERDICT = 38,
+ BPF_SK_REUSEPORT_SELECT = 39,
+ BPF_SK_REUSEPORT_SELECT_OR_MIGRATE = 40,
+ BPF_PERF_EVENT = 41,
+ BPF_TRACE_KPROBE_MULTI = 42,
+ BPF_LSM_CGROUP = 43,
+ __MAX_BPF_ATTACH_TYPE = 44,
+};
+
+struct sock_filter {
+ __u16 code;
+ __u8 jt;
+ __u8 jf;
+ __u32 k;
+};
+
+struct bpf_insn {
+ __u8 code;
+ __u8 dst_reg: 4;
+ __u8 src_reg: 4;
+ __s16 off;
+ __s32 imm;
+};
+
+struct bpf_prog_stats;
+
+struct bpf_prog_aux;
+
+struct sock_fprog_kern;
+
+struct bpf_prog {
+ u16 pages;
+ u16 jited: 1;
+ u16 jit_requested: 1;
+ u16 gpl_compatible: 1;
+ u16 cb_access: 1;
+ u16 dst_needed: 1;
+ u16 blinding_requested: 1;
+ u16 blinded: 1;
+ u16 is_func: 1;
+ u16 kprobe_override: 1;
+ u16 has_callchain_buf: 1;
+ u16 enforce_expected_attach_type: 1;
+ u16 call_get_stack: 1;
+ u16 call_get_func_ip: 1;
+ u16 tstamp_type_access: 1;
+ enum bpf_prog_type type;
+ enum bpf_attach_type expected_attach_type;
+ u32 len;
+ u32 jited_len;
+ u8 tag[8];
+ struct bpf_prog_stats *stats;
+ int *active;
+ unsigned int (*bpf_func)(const void *, const struct bpf_insn *);
+ struct bpf_prog_aux *aux;
+ struct sock_fprog_kern *orig_prog;
+ union {
+ struct {
+ struct { } __empty_insns;
+ struct sock_filter insns[0];
+ };
+ struct {
+ struct { } __empty_insnsi;
+ struct bpf_insn insnsi[0];
+ };
+ };
+};
+
+enum sock_type {
+ SOCK_STREAM = 1,
+ SOCK_DGRAM = 2,
+ SOCK_RAW = 3,
+ SOCK_RDM = 4,
+ SOCK_SEQPACKET = 5,
+ SOCK_DCCP = 6,
+ SOCK_PACKET = 10,
+};
+
+struct scatterlist {
+ long unsigned int page_link;
+ unsigned int offset;
+ unsigned int length;
+ dma_addr_t dma_address;
+ unsigned int dma_length;
+};
+
+enum {
+ SKB_GSO_TCPV4 = 1,
+ SKB_GSO_DODGY = 2,
+ SKB_GSO_TCP_ECN = 4,
+ SKB_GSO_TCP_FIXEDID = 8,
+ SKB_GSO_TCPV6 = 16,
+ SKB_GSO_FCOE = 32,
+ SKB_GSO_GRE = 64,
+ SKB_GSO_GRE_CSUM = 128,
+ SKB_GSO_IPXIP4 = 256,
+ SKB_GSO_IPXIP6 = 512,
+ SKB_GSO_UDP_TUNNEL = 1024,
+ SKB_GSO_UDP_TUNNEL_CSUM = 2048,
+ SKB_GSO_PARTIAL = 4096,
+ SKB_GSO_TUNNEL_REMCSUM = 8192,
+ SKB_GSO_SCTP = 16384,
+ SKB_GSO_ESP = 32768,
+ SKB_GSO_UDP = 65536,
+ SKB_GSO_UDP_L4 = 131072,
+ SKB_GSO_FRAGLIST = 262144,
+};
+
+struct seq_net_private {
+ struct net *net;
+ netns_tracker ns_tracker;
+};
+
+struct pernet_operations {
+ struct list_head list;
+ int (*init)(struct net *);
+ void (*pre_exit)(struct net *);
+ void (*exit)(struct net *);
+ void (*exit_batch)(struct list_head *);
+ unsigned int *id;
+ size_t size;
+};
+
+struct icmphdr {
+ __u8 type;
+ __u8 code;
+ __sum16 checksum;
+ union {
+ struct {
+ __be16 id;
+ __be16 sequence;
+ } echo;
+ __be32 gateway;
+ struct {
+ __be16 __unused;
+ __be16 mtu;
+ } frag;
+ __u8 reserved[4];
+ } un;
+};
+
+struct tc_stats {
+ __u64 bytes;
+ __u32 packets;
+ __u32 drops;
+ __u32 overlimits;
+ __u32 bps;
+ __u32 pps;
+ __u32 qlen;
+ __u32 backlog;
+};
+
+struct tc_sizespec {
+ unsigned char cell_log;
+ unsigned char size_log;
+ short int cell_align;
+ int overhead;
+ unsigned int linklayer;
+ unsigned int mpu;
+ unsigned int mtu;
+ unsigned int tsize;
+};
+
+struct net_rate_estimator;
+
+struct qdisc_skb_head {
+ struct sk_buff *head;
+ struct sk_buff *tail;
+ __u32 qlen;
+ spinlock_t lock;
+};
+
+struct gnet_stats_basic_sync {
+ u64_stats_t bytes;
+ u64_stats_t packets;
+ struct u64_stats_sync syncp;
+};
+
+struct gnet_stats_queue {
+ __u32 qlen;
+ __u32 backlog;
+ __u32 drops;
+ __u32 requeues;
+ __u32 overlimits;
+};
+
+struct Qdisc_ops;
+
+struct qdisc_size_table;
+
+struct Qdisc {
+ int (*enqueue)(struct sk_buff *, struct Qdisc *, struct sk_buff **);
+ struct sk_buff * (*dequeue)(struct Qdisc *);
+ unsigned int flags;
+ u32 limit;
+ const struct Qdisc_ops *ops;
+ struct qdisc_size_table *stab;
+ struct hlist_node hash;
+ u32 handle;
+ u32 parent;
+ struct netdev_queue *dev_queue;
+ struct net_rate_estimator *rate_est;
+ struct gnet_stats_basic_sync *cpu_bstats;
+ struct gnet_stats_queue *cpu_qstats;
+ int pad;
+ refcount_t refcnt;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct sk_buff_head gso_skb;
+ struct qdisc_skb_head q;
+ struct gnet_stats_basic_sync bstats;
+ struct gnet_stats_queue qstats;
+ long unsigned int state;
+ long unsigned int state2;
+ struct Qdisc *next_sched;
+ struct sk_buff_head skb_bad_txq;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ spinlock_t busylock;
+ spinlock_t seqlock;
+ struct callback_head rcu;
+ netdevice_tracker dev_tracker;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long int privdata[0];
+};
+
+enum bpf_map_type {
+ BPF_MAP_TYPE_UNSPEC = 0,
+ BPF_MAP_TYPE_HASH = 1,
+ BPF_MAP_TYPE_ARRAY = 2,
+ BPF_MAP_TYPE_PROG_ARRAY = 3,
+ BPF_MAP_TYPE_PERF_EVENT_ARRAY = 4,
+ BPF_MAP_TYPE_PERCPU_HASH = 5,
+ BPF_MAP_TYPE_PERCPU_ARRAY = 6,
+ BPF_MAP_TYPE_STACK_TRACE = 7,
+ BPF_MAP_TYPE_CGROUP_ARRAY = 8,
+ BPF_MAP_TYPE_LRU_HASH = 9,
+ BPF_MAP_TYPE_LRU_PERCPU_HASH = 10,
+ BPF_MAP_TYPE_LPM_TRIE = 11,
+ BPF_MAP_TYPE_ARRAY_OF_MAPS = 12,
+ BPF_MAP_TYPE_HASH_OF_MAPS = 13,
+ BPF_MAP_TYPE_DEVMAP = 14,
+ BPF_MAP_TYPE_SOCKMAP = 15,
+ BPF_MAP_TYPE_CPUMAP = 16,
+ BPF_MAP_TYPE_XSKMAP = 17,
+ BPF_MAP_TYPE_SOCKHASH = 18,
+ BPF_MAP_TYPE_CGROUP_STORAGE_DEPRECATED = 19,
+ BPF_MAP_TYPE_CGROUP_STORAGE = 19,
+ BPF_MAP_TYPE_REUSEPORT_SOCKARRAY = 20,
+ BPF_MAP_TYPE_PERCPU_CGROUP_STORAGE = 21,
+ BPF_MAP_TYPE_QUEUE = 22,
+ BPF_MAP_TYPE_STACK = 23,
+ BPF_MAP_TYPE_SK_STORAGE = 24,
+ BPF_MAP_TYPE_DEVMAP_HASH = 25,
+ BPF_MAP_TYPE_STRUCT_OPS = 26,
+ BPF_MAP_TYPE_RINGBUF = 27,
+ BPF_MAP_TYPE_INODE_STORAGE = 28,
+ BPF_MAP_TYPE_TASK_STORAGE = 29,
+ BPF_MAP_TYPE_BLOOM_FILTER = 30,
+ BPF_MAP_TYPE_USER_RINGBUF = 31,
+ BPF_MAP_TYPE_CGRP_STORAGE = 32,
+};
+
+struct bpf_map_ops;
+
+struct btf_record;
+
+struct btf;
+
+struct btf_field_offs;
+
+struct bpf_map {
+ const struct bpf_map_ops *ops;
+ struct bpf_map *inner_map_meta;
+ void *security;
+ enum bpf_map_type map_type;
+ u32 key_size;
+ u32 value_size;
+ u32 max_entries;
+ u64 map_extra;
+ u32 map_flags;
+ u32 id;
+ struct btf_record *record;
+ int numa_node;
+ u32 btf_key_type_id;
+ u32 btf_value_type_id;
+ u32 btf_vmlinux_value_type_id;
+ struct btf *btf;
+ struct obj_cgroup *objcg;
+ char name[16];
+ struct btf_field_offs *field_offs;
+ long: 64;
+ atomic64_t refcnt;
+ atomic64_t usercnt;
+ struct work_struct work;
+ struct mutex freeze_mutex;
+ atomic64_t writecnt;
+ struct {
+ spinlock_t lock;
+ enum bpf_prog_type type;
+ bool jited;
+ bool xdp_has_frags;
+ } owner;
+ bool bypass_spec_v1;
+ bool frozen;
+};
+
+struct bpf_map_dev_ops;
+
+struct bpf_offloaded_map {
+ struct bpf_map map;
+ struct net_device *netdev;
+ const struct bpf_map_dev_ops *dev_ops;
+ void *dev_priv;
+ struct list_head offloads;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+enum netdev_priv_flags {
+ IFF_802_1Q_VLAN = 1ULL,
+ IFF_EBRIDGE = 2ULL,
+ IFF_BONDING = 4ULL,
+ IFF_ISATAP = 8ULL,
+ IFF_WAN_HDLC = 16ULL,
+ IFF_XMIT_DST_RELEASE = 32ULL,
+ IFF_DONT_BRIDGE = 64ULL,
+ IFF_DISABLE_NETPOLL = 128ULL,
+ IFF_MACVLAN_PORT = 256ULL,
+ IFF_BRIDGE_PORT = 512ULL,
+ IFF_OVS_DATAPATH = 1024ULL,
+ IFF_TX_SKB_SHARING = 2048ULL,
+ IFF_UNICAST_FLT = 4096ULL,
+ IFF_TEAM_PORT = 8192ULL,
+ IFF_SUPP_NOFCS = 16384ULL,
+ IFF_LIVE_ADDR_CHANGE = 32768ULL,
+ IFF_MACVLAN = 65536ULL,
+ IFF_XMIT_DST_RELEASE_PERM = 131072ULL,
+ IFF_L3MDEV_MASTER = 262144ULL,
+ IFF_NO_QUEUE = 524288ULL,
+ IFF_OPENVSWITCH = 1048576ULL,
+ IFF_L3MDEV_SLAVE = 2097152ULL,
+ IFF_TEAM = 4194304ULL,
+ IFF_RXFH_CONFIGURED = 8388608ULL,
+ IFF_PHONY_HEADROOM = 16777216ULL,
+ IFF_MACSEC = 33554432ULL,
+ IFF_NO_RX_HANDLER = 67108864ULL,
+ IFF_FAILOVER = 134217728ULL,
+ IFF_FAILOVER_SLAVE = 268435456ULL,
+ IFF_L3MDEV_RX_HANDLER = 536870912ULL,
+ IFF_TX_SKB_NO_LINEAR = 2147483648ULL,
+ IFF_CHANGE_PROTO_DOWN = 4294967296ULL,
+};
+
+struct in_ifaddr;
+
+struct ip_mc_list;
+
+struct in_device {
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ refcount_t refcnt;
+ int dead;
+ struct in_ifaddr *ifa_list;
+ struct ip_mc_list *mc_list;
+ struct ip_mc_list **mc_hash;
+ int mc_count;
+ spinlock_t mc_tomb_lock;
+ struct ip_mc_list *mc_tomb;
+ long unsigned int mr_v1_seen;
+ long unsigned int mr_v2_seen;
+ long unsigned int mr_maxdelay;
+ long unsigned int mr_qi;
+ long unsigned int mr_qri;
+ unsigned char mr_qrv;
+ unsigned char mr_gq_running;
+ u32 mr_ifc_count;
+ struct timer_list mr_gq_timer;
+ struct timer_list mr_ifc_timer;
+ struct neigh_parms *arp_parms;
+ struct ipv4_devconf cnf;
+ struct callback_head callback_head;
+};
+
+struct tcf_proto;
+
+struct tcf_block;
+
+struct mini_Qdisc {
+ struct tcf_proto *filter_list;
+ struct tcf_block *block;
+ struct gnet_stats_basic_sync *cpu_bstats;
+ struct gnet_stats_queue *cpu_qstats;
+ long unsigned int rcu_state;
+};
+
+enum {
+ RTN_UNSPEC = 0,
+ RTN_UNICAST = 1,
+ RTN_LOCAL = 2,
+ RTN_BROADCAST = 3,
+ RTN_ANYCAST = 4,
+ RTN_MULTICAST = 5,
+ RTN_BLACKHOLE = 6,
+ RTN_UNREACHABLE = 7,
+ RTN_PROHIBIT = 8,
+ RTN_THROW = 9,
+ RTN_NAT = 10,
+ RTN_XRESOLVE = 11,
+ __RTN_MAX = 12,
+};
+
+enum rt_scope_t {
+ RT_SCOPE_UNIVERSE = 0,
+ RT_SCOPE_SITE = 200,
+ RT_SCOPE_LINK = 253,
+ RT_SCOPE_HOST = 254,
+ RT_SCOPE_NOWHERE = 255,
+};
+
+struct tcmsg {
+ unsigned char tcm_family;
+ unsigned char tcm__pad1;
+ short unsigned int tcm__pad2;
+ int tcm_ifindex;
+ __u32 tcm_handle;
+ __u32 tcm_parent;
+ __u32 tcm_info;
+};
+
+struct xfrm_state_walk {
+ struct list_head all;
+ u8 state;
+ u8 dying;
+ u8 proto;
+ u32 seq;
+ struct xfrm_address_filter *filter;
+};
+
+enum xfrm_replay_mode {
+ XFRM_REPLAY_MODE_LEGACY = 0,
+ XFRM_REPLAY_MODE_BMP = 1,
+ XFRM_REPLAY_MODE_ESN = 2,
+};
+
+struct xfrm_dev_offload {
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ struct net_device *real_dev;
+ long unsigned int offload_handle;
+ u8 dir: 2;
+};
+
+struct xfrm_mode {
+ u8 encap;
+ u8 family;
+ u8 flags;
+};
+
+struct xfrm_type;
+
+struct xfrm_type_offload;
+
+struct xfrm_state {
+ possible_net_t xs_net;
+ union {
+ struct hlist_node gclist;
+ struct hlist_node bydst;
+ };
+ struct hlist_node bysrc;
+ struct hlist_node byspi;
+ struct hlist_node byseq;
+ refcount_t refcnt;
+ spinlock_t lock;
+ struct xfrm_id id;
+ struct xfrm_selector sel;
+ struct xfrm_mark mark;
+ u32 if_id;
+ u32 tfcpad;
+ u32 genid;
+ struct xfrm_state_walk km;
+ struct {
+ u32 reqid;
+ u8 mode;
+ u8 replay_window;
+ u8 aalgo;
+ u8 ealgo;
+ u8 calgo;
+ u8 flags;
+ u16 family;
+ xfrm_address_t saddr;
+ int header_len;
+ int trailer_len;
+ u32 extra_flags;
+ struct xfrm_mark smark;
+ } props;
+ struct xfrm_lifetime_cfg lft;
+ struct xfrm_algo_auth *aalg;
+ struct xfrm_algo *ealg;
+ struct xfrm_algo *calg;
+ struct xfrm_algo_aead *aead;
+ const char *geniv;
+ __be16 new_mapping_sport;
+ u32 new_mapping;
+ u32 mapping_maxage;
+ struct xfrm_encap_tmpl *encap;
+ struct sock *encap_sk;
+ xfrm_address_t *coaddr;
+ struct xfrm_state *tunnel;
+ atomic_t tunnel_users;
+ struct xfrm_replay_state replay;
+ struct xfrm_replay_state_esn *replay_esn;
+ struct xfrm_replay_state preplay;
+ struct xfrm_replay_state_esn *preplay_esn;
+ enum xfrm_replay_mode repl_mode;
+ u32 xflags;
+ u32 replay_maxage;
+ u32 replay_maxdiff;
+ struct timer_list rtimer;
+ struct xfrm_stats stats;
+ struct xfrm_lifetime_cur curlft;
+ struct hrtimer mtimer;
+ struct xfrm_dev_offload xso;
+ long int saved_tmo;
+ time64_t lastused;
+ struct page_frag xfrag;
+ const struct xfrm_type *type;
+ struct xfrm_mode inner_mode;
+ struct xfrm_mode inner_mode_iaf;
+ struct xfrm_mode outer_mode;
+ const struct xfrm_type_offload *type_offload;
+ struct xfrm_sec_ctx *security;
+ void *data;
+};
+
+enum {
+ TCPF_ESTABLISHED = 2,
+ TCPF_SYN_SENT = 4,
+ TCPF_SYN_RECV = 8,
+ TCPF_FIN_WAIT1 = 16,
+ TCPF_FIN_WAIT2 = 32,
+ TCPF_TIME_WAIT = 64,
+ TCPF_CLOSE = 128,
+ TCPF_CLOSE_WAIT = 256,
+ TCPF_LAST_ACK = 512,
+ TCPF_LISTEN = 1024,
+ TCPF_CLOSING = 2048,
+ TCPF_NEW_SYN_RECV = 4096,
+};
+
+struct sk_filter {
+ refcount_t refcnt;
+ struct callback_head rcu;
+ struct bpf_prog *prog;
+};
+
+struct xfrm_policy_walk_entry {
+ struct list_head all;
+ u8 dead;
+};
+
+struct xfrm_policy_queue {
+ struct sk_buff_head hold_queue;
+ struct timer_list hold_timer;
+ long unsigned int timeout;
+};
+
+struct xfrm_tmpl {
+ struct xfrm_id id;
+ xfrm_address_t saddr;
+ short unsigned int encap_family;
+ u32 reqid;
+ u8 mode;
+ u8 share;
+ u8 optional;
+ u8 allalgs;
+ u32 aalgos;
+ u32 ealgos;
+ u32 calgos;
+};
+
+struct xfrm_policy {
+ possible_net_t xp_net;
+ struct hlist_node bydst;
+ struct hlist_node byidx;
+ rwlock_t lock;
+ refcount_t refcnt;
+ u32 pos;
+ struct timer_list timer;
+ atomic_t genid;
+ u32 priority;
+ u32 index;
+ u32 if_id;
+ struct xfrm_mark mark;
+ struct xfrm_selector selector;
+ struct xfrm_lifetime_cfg lft;
+ struct xfrm_lifetime_cur curlft;
+ struct xfrm_policy_walk_entry walk;
+ struct xfrm_policy_queue polq;
+ bool bydst_reinsert;
+ u8 type;
+ u8 action;
+ u8 flags;
+ u8 xfrm_nr;
+ u16 family;
+ struct xfrm_sec_ctx *security;
+ struct xfrm_tmpl xfrm_vec[6];
+ struct hlist_node bydst_inexact_list;
+ struct callback_head rcu;
+};
+
+struct sock_reuseport {
+ struct callback_head rcu;
+ u16 max_socks;
+ u16 num_socks;
+ u16 num_closed_socks;
+ u16 incoming_cpu;
+ unsigned int synq_overflow_ts;
+ unsigned int reuseport_id;
+ unsigned int bind_inany: 1;
+ unsigned int has_conns: 1;
+ struct bpf_prog *prog;
+ struct sock *socks[0];
+};
+
+enum sock_flags {
+ SOCK_DEAD = 0,
+ SOCK_DONE = 1,
+ SOCK_URGINLINE = 2,
+ SOCK_KEEPOPEN = 3,
+ SOCK_LINGER = 4,
+ SOCK_DESTROY = 5,
+ SOCK_BROADCAST = 6,
+ SOCK_TIMESTAMP = 7,
+ SOCK_ZAPPED = 8,
+ SOCK_USE_WRITE_QUEUE = 9,
+ SOCK_DBG = 10,
+ SOCK_RCVTSTAMP = 11,
+ SOCK_RCVTSTAMPNS = 12,
+ SOCK_LOCALROUTE = 13,
+ SOCK_MEMALLOC = 14,
+ SOCK_TIMESTAMPING_RX_SOFTWARE = 15,
+ SOCK_FASYNC = 16,
+ SOCK_RXQ_OVFL = 17,
+ SOCK_ZEROCOPY = 18,
+ SOCK_WIFI_STATUS = 19,
+ SOCK_NOFCS = 20,
+ SOCK_FILTER_LOCKED = 21,
+ SOCK_SELECT_ERR_QUEUE = 22,
+ SOCK_RCU_FREE = 23,
+ SOCK_TXTIME = 24,
+ SOCK_XDP = 25,
+ SOCK_TSTAMP_NEW = 26,
+ SOCK_RCVMARK = 27,
+};
+
+struct fastopen_queue {
+ struct request_sock *rskq_rst_head;
+ struct request_sock *rskq_rst_tail;
+ spinlock_t lock;
+ int qlen;
+ int max_qlen;
+ struct tcp_fastopen_context *ctx;
+};
+
+struct request_sock_queue {
+ spinlock_t rskq_lock;
+ u8 rskq_defer_accept;
+ u32 synflood_warned;
+ atomic_t qlen;
+ atomic_t young;
+ struct request_sock *rskq_accept_head;
+ struct request_sock *rskq_accept_tail;
+ struct fastopen_queue fastopenq;
+};
+
+struct ip_options {
+ __be32 faddr;
+ __be32 nexthop;
+ unsigned char optlen;
+ unsigned char srr;
+ unsigned char rr;
+ unsigned char ts;
+ unsigned char is_strictroute: 1;
+ unsigned char srr_is_hit: 1;
+ unsigned char is_changed: 1;
+ unsigned char rr_needaddr: 1;
+ unsigned char ts_needtime: 1;
+ unsigned char ts_needaddr: 1;
+ unsigned char router_alert;
+ unsigned char cipso;
+ unsigned char __pad2;
+ unsigned char __data[0];
+};
+
+struct ip_options_rcu {
+ struct callback_head rcu;
+ struct ip_options opt;
+};
+
+struct ipv6_opt_hdr;
+
+struct ipv6_rt_hdr;
+
+struct ipv6_txoptions {
+ refcount_t refcnt;
+ int tot_len;
+ __u16 opt_flen;
+ __u16 opt_nflen;
+ struct ipv6_opt_hdr *hopopt;
+ struct ipv6_opt_hdr *dst0opt;
+ struct ipv6_rt_hdr *srcrt;
+ struct ipv6_opt_hdr *dst1opt;
+ struct callback_head rcu;
+};
+
+struct inet_request_sock {
+ struct request_sock req;
+ u16 snd_wscale: 4;
+ u16 rcv_wscale: 4;
+ u16 tstamp_ok: 1;
+ u16 sack_ok: 1;
+ u16 wscale_ok: 1;
+ u16 ecn_ok: 1;
+ u16 acked: 1;
+ u16 no_srccheck: 1;
+ u16 smc_ok: 1;
+ u32 ir_mark;
+ union {
+ struct ip_options_rcu *ireq_opt;
+ struct {
+ struct ipv6_txoptions *ipv6_opt;
+ struct sk_buff *pktopts;
+ };
+ };
+};
+
+struct inet_cork {
+ unsigned int flags;
+ __be32 addr;
+ struct ip_options *opt;
+ unsigned int fragsize;
+ int length;
+ struct dst_entry *dst;
+ u8 tx_flags;
+ __u8 ttl;
+ __s16 tos;
+ char priority;
+ __u16 gso_size;
+ u64 transmit_time;
+ u32 mark;
+};
+
+struct inet_cork_full {
+ struct inet_cork base;
+ struct flowi fl;
+};
+
+struct ipv6_pinfo;
+
+struct ip_mc_socklist;
+
+struct inet_sock {
+ struct sock sk;
+ struct ipv6_pinfo *pinet6;
+ __be32 inet_saddr;
+ __s16 uc_ttl;
+ __u16 cmsg_flags;
+ struct ip_options_rcu *inet_opt;
+ __be16 inet_sport;
+ __u16 inet_id;
+ __u8 tos;
+ __u8 min_ttl;
+ __u8 mc_ttl;
+ __u8 pmtudisc;
+ __u8 recverr: 1;
+ __u8 is_icsk: 1;
+ __u8 freebind: 1;
+ __u8 hdrincl: 1;
+ __u8 mc_loop: 1;
+ __u8 transparent: 1;
+ __u8 mc_all: 1;
+ __u8 nodefrag: 1;
+ __u8 bind_address_no_port: 1;
+ __u8 recverr_rfc4884: 1;
+ __u8 defer_connect: 1;
+ __u8 rcv_tos;
+ __u8 convert_csum;
+ int uc_index;
+ int mc_index;
+ __be32 mc_addr;
+ struct ip_mc_socklist *mc_list;
+ struct inet_cork_full cork;
+};
+
+struct in6_pktinfo {
+ struct in6_addr ipi6_addr;
+ int ipi6_ifindex;
+};
+
+struct inet6_cork {
+ struct ipv6_txoptions *opt;
+ u8 hop_limit;
+ u8 tclass;
+};
+
+struct ipv6_mc_socklist;
+
+struct ipv6_ac_socklist;
+
+struct ipv6_fl_socklist;
+
+struct ipv6_pinfo {
+ struct in6_addr saddr;
+ struct in6_pktinfo sticky_pktinfo;
+ const struct in6_addr *daddr_cache;
+ const struct in6_addr *saddr_cache;
+ __be32 flow_label;
+ __u32 frag_size;
+ __u16 __unused_1: 7;
+ __s16 hop_limit: 9;
+ __u16 mc_loop: 1;
+ __u16 __unused_2: 6;
+ __s16 mcast_hops: 9;
+ int ucast_oif;
+ int mcast_oif;
+ union {
+ struct {
+ __u16 srcrt: 1;
+ __u16 osrcrt: 1;
+ __u16 rxinfo: 1;
+ __u16 rxoinfo: 1;
+ __u16 rxhlim: 1;
+ __u16 rxohlim: 1;
+ __u16 hopopts: 1;
+ __u16 ohopopts: 1;
+ __u16 dstopts: 1;
+ __u16 odstopts: 1;
+ __u16 rxflow: 1;
+ __u16 rxtclass: 1;
+ __u16 rxpmtu: 1;
+ __u16 rxorigdstaddr: 1;
+ __u16 recvfragsize: 1;
+ } bits;
+ __u16 all;
+ } rxopt;
+ __u16 recverr: 1;
+ __u16 sndflow: 1;
+ __u16 repflow: 1;
+ __u16 pmtudisc: 3;
+ __u16 padding: 1;
+ __u16 srcprefs: 3;
+ __u16 dontfrag: 1;
+ __u16 autoflowlabel: 1;
+ __u16 autoflowlabel_set: 1;
+ __u16 mc_all: 1;
+ __u16 recverr_rfc4884: 1;
+ __u16 rtalert_isolate: 1;
+ __u8 min_hopcount;
+ __u8 tclass;
+ __be32 rcv_flowinfo;
+ __u32 dst_cookie;
+ struct ipv6_mc_socklist *ipv6_mc_list;
+ struct ipv6_ac_socklist *ipv6_ac_list;
+ struct ipv6_fl_socklist *ipv6_fl_list;
+ struct ipv6_txoptions *opt;
+ struct sk_buff *pktoptions;
+ struct sk_buff *rxpmtu;
+ struct inet6_cork cork;
+};
+
+enum {
+ IPV4_DEVCONF_FORWARDING = 1,
+ IPV4_DEVCONF_MC_FORWARDING = 2,
+ IPV4_DEVCONF_PROXY_ARP = 3,
+ IPV4_DEVCONF_ACCEPT_REDIRECTS = 4,
+ IPV4_DEVCONF_SECURE_REDIRECTS = 5,
+ IPV4_DEVCONF_SEND_REDIRECTS = 6,
+ IPV4_DEVCONF_SHARED_MEDIA = 7,
+ IPV4_DEVCONF_RP_FILTER = 8,
+ IPV4_DEVCONF_ACCEPT_SOURCE_ROUTE = 9,
+ IPV4_DEVCONF_BOOTP_RELAY = 10,
+ IPV4_DEVCONF_LOG_MARTIANS = 11,
+ IPV4_DEVCONF_TAG = 12,
+ IPV4_DEVCONF_ARPFILTER = 13,
+ IPV4_DEVCONF_MEDIUM_ID = 14,
+ IPV4_DEVCONF_NOXFRM = 15,
+ IPV4_DEVCONF_NOPOLICY = 16,
+ IPV4_DEVCONF_FORCE_IGMP_VERSION = 17,
+ IPV4_DEVCONF_ARP_ANNOUNCE = 18,
+ IPV4_DEVCONF_ARP_IGNORE = 19,
+ IPV4_DEVCONF_PROMOTE_SECONDARIES = 20,
+ IPV4_DEVCONF_ARP_ACCEPT = 21,
+ IPV4_DEVCONF_ARP_NOTIFY = 22,
+ IPV4_DEVCONF_ACCEPT_LOCAL = 23,
+ IPV4_DEVCONF_SRC_VMARK = 24,
+ IPV4_DEVCONF_PROXY_ARP_PVLAN = 25,
+ IPV4_DEVCONF_ROUTE_LOCALNET = 26,
+ IPV4_DEVCONF_IGMPV2_UNSOLICITED_REPORT_INTERVAL = 27,
+ IPV4_DEVCONF_IGMPV3_UNSOLICITED_REPORT_INTERVAL = 28,
+ IPV4_DEVCONF_IGNORE_ROUTES_WITH_LINKDOWN = 29,
+ IPV4_DEVCONF_DROP_UNICAST_IN_L2_MULTICAST = 30,
+ IPV4_DEVCONF_DROP_GRATUITOUS_ARP = 31,
+ IPV4_DEVCONF_BC_FORWARDING = 32,
+ IPV4_DEVCONF_ARP_EVICT_NOCARRIER = 33,
+ __IPV4_DEVCONF_MAX = 34,
+};
+
+struct ipv6_rt_hdr {
+ __u8 nexthdr;
+ __u8 hdrlen;
+ __u8 type;
+ __u8 segments_left;
+};
+
+struct ipv6_opt_hdr {
+ __u8 nexthdr;
+ __u8 hdrlen;
+};
+
+struct minmax_sample {
+ u32 t;
+ u32 v;
+};
+
+struct minmax {
+ struct minmax_sample s[3];
+};
+
+struct inet_connection_sock_af_ops {
+ int (*queue_xmit)(struct sock *, struct sk_buff *, struct flowi *);
+ void (*send_check)(struct sock *, struct sk_buff *);
+ int (*rebuild_header)(struct sock *);
+ void (*sk_rx_dst_set)(struct sock *, const struct sk_buff *);
+ int (*conn_request)(struct sock *, struct sk_buff *);
+ struct sock * (*syn_recv_sock)(const struct sock *, struct sk_buff *, struct request_sock *, struct dst_entry *, struct request_sock *, bool *);
+ u16 net_header_len;
+ u16 net_frag_header_len;
+ u16 sockaddr_len;
+ int (*setsockopt)(struct sock *, int, int, sockptr_t, unsigned int);
+ int (*getsockopt)(struct sock *, int, int, char *, int *);
+ void (*addr2sockaddr)(struct sock *, struct sockaddr *);
+ void (*mtu_reduced)(struct sock *);
+};
+
+struct inet_bind_bucket;
+
+struct inet_bind2_bucket;
+
+struct tcp_ulp_ops;
+
+struct inet_connection_sock {
+ struct inet_sock icsk_inet;
+ struct request_sock_queue icsk_accept_queue;
+ struct inet_bind_bucket *icsk_bind_hash;
+ struct inet_bind2_bucket *icsk_bind2_hash;
+ long unsigned int icsk_timeout;
+ struct timer_list icsk_retransmit_timer;
+ struct timer_list icsk_delack_timer;
+ __u32 icsk_rto;
+ __u32 icsk_rto_min;
+ __u32 icsk_delack_max;
+ __u32 icsk_pmtu_cookie;
+ const struct tcp_congestion_ops *icsk_ca_ops;
+ const struct inet_connection_sock_af_ops *icsk_af_ops;
+ const struct tcp_ulp_ops *icsk_ulp_ops;
+ void *icsk_ulp_data;
+ void (*icsk_clean_acked)(struct sock *, u32);
+ unsigned int (*icsk_sync_mss)(struct sock *, u32);
+ __u8 icsk_ca_state: 5;
+ __u8 icsk_ca_initialized: 1;
+ __u8 icsk_ca_setsockopt: 1;
+ __u8 icsk_ca_dst_locked: 1;
+ __u8 icsk_retransmits;
+ __u8 icsk_pending;
+ __u8 icsk_backoff;
+ __u8 icsk_syn_retries;
+ __u8 icsk_probes_out;
+ __u16 icsk_ext_hdr_len;
+ struct {
+ __u8 pending;
+ __u8 quick;
+ __u8 pingpong;
+ __u8 retry;
+ __u32 ato;
+ long unsigned int timeout;
+ __u32 lrcvtime;
+ __u16 last_seg_size;
+ __u16 rcv_mss;
+ } icsk_ack;
+ struct {
+ int search_high;
+ int search_low;
+ u32 probe_size: 31;
+ u32 enabled: 1;
+ u32 probe_timestamp;
+ } icsk_mtup;
+ u32 icsk_probes_tstamp;
+ u32 icsk_user_timeout;
+ u64 icsk_ca_priv[13];
+};
+
+struct inet_bind_bucket {
+ possible_net_t ib_net;
+ int l3mdev;
+ short unsigned int port;
+ signed char fastreuse;
+ signed char fastreuseport;
+ kuid_t fastuid;
+ struct in6_addr fast_v6_rcv_saddr;
+ __be32 fast_rcv_saddr;
+ short unsigned int fast_sk_family;
+ bool fast_ipv6_only;
+ struct hlist_node node;
+ struct hlist_head owners;
+};
+
+struct inet_bind2_bucket {
+ possible_net_t ib_net;
+ int l3mdev;
+ short unsigned int port;
+ short unsigned int family;
+ union {
+ struct in6_addr v6_rcv_saddr;
+ __be32 rcv_saddr;
+ };
+ struct hlist_node node;
+ struct hlist_head owners;
+};
+
+struct tcp_ulp_ops {
+ struct list_head list;
+ int (*init)(struct sock *);
+ void (*update)(struct sock *, struct proto *, void (*)(struct sock *));
+ void (*release)(struct sock *);
+ int (*get_info)(const struct sock *, struct sk_buff *);
+ size_t (*get_info_size)(const struct sock *);
+ void (*clone)(const struct request_sock *, struct sock *, const gfp_t);
+ char name[16];
+ struct module *owner;
+};
+
+enum inet_csk_ack_state_t {
+ ICSK_ACK_SCHED = 1,
+ ICSK_ACK_TIMER = 2,
+ ICSK_ACK_PUSHED = 4,
+ ICSK_ACK_PUSHED2 = 8,
+ ICSK_ACK_NOW = 16,
+};
+
+struct inet_timewait_sock {
+ struct sock_common __tw_common;
+ __u32 tw_mark;
+ volatile unsigned char tw_substate;
+ unsigned char tw_rcv_wscale;
+ __be16 tw_sport;
+ unsigned int tw_transparent: 1;
+ unsigned int tw_flowlabel: 20;
+ unsigned int tw_pad: 3;
+ unsigned int tw_tos: 8;
+ u32 tw_txhash;
+ u32 tw_priority;
+ struct timer_list tw_timer;
+ struct inet_bind_bucket *tw_tb;
+};
+
+struct tcphdr {
+ __be16 source;
+ __be16 dest;
+ __be32 seq;
+ __be32 ack_seq;
+ __u16 res1: 4;
+ __u16 doff: 4;
+ __u16 fin: 1;
+ __u16 syn: 1;
+ __u16 rst: 1;
+ __u16 psh: 1;
+ __u16 ack: 1;
+ __u16 urg: 1;
+ __u16 ece: 1;
+ __u16 cwr: 1;
+ __be16 window;
+ __sum16 check;
+ __be16 urg_ptr;
+};
+
+struct tcp_md5sig {
+ struct __kernel_sockaddr_storage tcpm_addr;
+ __u8 tcpm_flags;
+ __u8 tcpm_prefixlen;
+ __u16 tcpm_keylen;
+ int tcpm_ifindex;
+ __u8 tcpm_key[80];
+};
+
+struct tcp_fastopen_cookie {
+ __le64 val[2];
+ s8 len;
+ bool exp;
+};
+
+struct tcp_sack_block {
+ u32 start_seq;
+ u32 end_seq;
+};
+
+struct tcp_options_received {
+ int ts_recent_stamp;
+ u32 ts_recent;
+ u32 rcv_tsval;
+ u32 rcv_tsecr;
+ u16 saw_tstamp: 1;
+ u16 tstamp_ok: 1;
+ u16 dsack: 1;
+ u16 wscale_ok: 1;
+ u16 sack_ok: 3;
+ u16 smc_ok: 1;
+ u16 snd_wscale: 4;
+ u16 rcv_wscale: 4;
+ u8 saw_unknown: 1;
+ u8 unused: 7;
+ u8 num_sacks;
+ u16 user_mss;
+ u16 mss_clamp;
+};
+
+struct tcp_request_sock_ops;
+
+struct tcp_request_sock {
+ struct inet_request_sock req;
+ const struct tcp_request_sock_ops *af_specific;
+ u64 snt_synack;
+ bool tfo_listener;
+ bool is_mptcp;
+ bool drop_req;
+ u32 txhash;
+ u32 rcv_isn;
+ u32 snt_isn;
+ u32 ts_off;
+ u32 last_oow_ack_time;
+ u32 rcv_nxt;
+ u8 syn_tos;
+};
+
+enum tcp_synack_type {
+ TCP_SYNACK_NORMAL = 0,
+ TCP_SYNACK_FASTOPEN = 1,
+ TCP_SYNACK_COOKIE = 2,
+};
+
+struct tcp_md5sig_key;
+
+struct tcp_request_sock_ops {
+ u16 mss_clamp;
+ struct tcp_md5sig_key * (*req_md5_lookup)(const struct sock *, const struct sock *);
+ int (*calc_md5_hash)(char *, const struct tcp_md5sig_key *, const struct sock *, const struct sk_buff *);
+ __u32 (*cookie_init_seq)(const struct sk_buff *, __u16 *);
+ struct dst_entry * (*route_req)(const struct sock *, struct sk_buff *, struct flowi *, struct request_sock *);
+ u32 (*init_seq)(const struct sk_buff *);
+ u32 (*init_ts_off)(const struct net *, const struct sk_buff *);
+ int (*send_synack)(const struct sock *, struct dst_entry *, struct flowi *, struct request_sock *, struct tcp_fastopen_cookie *, enum tcp_synack_type, struct sk_buff *);
+};
+
+struct tcp_rack {
+ u64 mstamp;
+ u32 rtt_us;
+ u32 end_seq;
+ u32 last_delivered;
+ u8 reo_wnd_steps;
+ u8 reo_wnd_persist: 5;
+ u8 dsack_seen: 1;
+ u8 advanced: 1;
+};
+
+struct tcp_sock_af_ops;
+
+struct tcp_md5sig_info;
+
+struct tcp_fastopen_request;
+
+struct tcp_sock {
+ struct inet_connection_sock inet_conn;
+ u16 tcp_header_len;
+ u16 gso_segs;
+ __be32 pred_flags;
+ u64 bytes_received;
+ u32 segs_in;
+ u32 data_segs_in;
+ u32 rcv_nxt;
+ u32 copied_seq;
+ u32 rcv_wup;
+ u32 snd_nxt;
+ u32 segs_out;
+ u32 data_segs_out;
+ u64 bytes_sent;
+ u64 bytes_acked;
+ u32 dsack_dups;
+ u32 snd_una;
+ u32 snd_sml;
+ u32 rcv_tstamp;
+ u32 lsndtime;
+ u32 last_oow_ack_time;
+ u32 compressed_ack_rcv_nxt;
+ u32 tsoffset;
+ struct list_head tsq_node;
+ struct list_head tsorted_sent_queue;
+ u32 snd_wl1;
+ u32 snd_wnd;
+ u32 max_window;
+ u32 mss_cache;
+ u32 window_clamp;
+ u32 rcv_ssthresh;
+ struct tcp_rack rack;
+ u16 advmss;
+ u8 compressed_ack;
+ u8 dup_ack_counter: 2;
+ u8 tlp_retrans: 1;
+ u8 unused: 5;
+ u32 chrono_start;
+ u32 chrono_stat[3];
+ u8 chrono_type: 2;
+ u8 rate_app_limited: 1;
+ u8 fastopen_connect: 1;
+ u8 fastopen_no_cookie: 1;
+ u8 is_sack_reneg: 1;
+ u8 fastopen_client_fail: 2;
+ u8 nonagle: 4;
+ u8 thin_lto: 1;
+ u8 recvmsg_inq: 1;
+ u8 repair: 1;
+ u8 frto: 1;
+ u8 repair_queue;
+ u8 save_syn: 2;
+ u8 syn_data: 1;
+ u8 syn_fastopen: 1;
+ u8 syn_fastopen_exp: 1;
+ u8 syn_fastopen_ch: 1;
+ u8 syn_data_acked: 1;
+ u8 is_cwnd_limited: 1;
+ u32 tlp_high_seq;
+ u32 tcp_tx_delay;
+ u64 tcp_wstamp_ns;
+ u64 tcp_clock_cache;
+ u64 tcp_mstamp;
+ u32 srtt_us;
+ u32 mdev_us;
+ u32 mdev_max_us;
+ u32 rttvar_us;
+ u32 rtt_seq;
+ struct minmax rtt_min;
+ u32 packets_out;
+ u32 retrans_out;
+ u32 max_packets_out;
+ u32 cwnd_usage_seq;
+ u16 urg_data;
+ u8 ecn_flags;
+ u8 keepalive_probes;
+ u32 reordering;
+ u32 reord_seen;
+ u32 snd_up;
+ struct tcp_options_received rx_opt;
+ u32 snd_ssthresh;
+ u32 snd_cwnd;
+ u32 snd_cwnd_cnt;
+ u32 snd_cwnd_clamp;
+ u32 snd_cwnd_used;
+ u32 snd_cwnd_stamp;
+ u32 prior_cwnd;
+ u32 prr_delivered;
+ u32 prr_out;
+ u32 delivered;
+ u32 delivered_ce;
+ u32 lost;
+ u32 app_limited;
+ u64 first_tx_mstamp;
+ u64 delivered_mstamp;
+ u32 rate_delivered;
+ u32 rate_interval_us;
+ u32 rcv_wnd;
+ u32 write_seq;
+ u32 notsent_lowat;
+ u32 pushed_seq;
+ u32 lost_out;
+ u32 sacked_out;
+ struct hrtimer pacing_timer;
+ struct hrtimer compressed_ack_timer;
+ struct sk_buff *lost_skb_hint;
+ struct sk_buff *retransmit_skb_hint;
+ struct rb_root out_of_order_queue;
+ struct sk_buff *ooo_last_skb;
+ struct tcp_sack_block duplicate_sack[1];
+ struct tcp_sack_block selective_acks[4];
+ struct tcp_sack_block recv_sack_cache[4];
+ struct sk_buff *highest_sack;
+ int lost_cnt_hint;
+ u32 prior_ssthresh;
+ u32 high_seq;
+ u32 retrans_stamp;
+ u32 undo_marker;
+ int undo_retrans;
+ u64 bytes_retrans;
+ u32 total_retrans;
+ u32 urg_seq;
+ unsigned int keepalive_time;
+ unsigned int keepalive_intvl;
+ int linger2;
+ u8 bpf_sock_ops_cb_flags;
+ u8 bpf_chg_cc_inprogress: 1;
+ u16 timeout_rehash;
+ u32 rcv_ooopack;
+ u32 rcv_rtt_last_tsecr;
+ struct {
+ u32 rtt_us;
+ u32 seq;
+ u64 time;
+ } rcv_rtt_est;
+ struct {
+ u32 space;
+ u32 seq;
+ u64 time;
+ } rcvq_space;
+ struct {
+ u32 probe_seq_start;
+ u32 probe_seq_end;
+ } mtu_probe;
+ u32 plb_rehash;
+ u32 mtu_info;
+ bool is_mptcp;
+ const struct tcp_sock_af_ops *af_specific;
+ struct tcp_md5sig_info *md5sig_info;
+ struct tcp_fastopen_request *fastopen_req;
+ struct request_sock *fastopen_rsk;
+ struct saved_syn *saved_syn;
+};
+
+struct tcp_sock_af_ops {
+ struct tcp_md5sig_key * (*md5_lookup)(const struct sock *, const struct sock *);
+ int (*calc_md5_hash)(char *, const struct tcp_md5sig_key *, const struct sock *, const struct sk_buff *);
+ int (*md5_parse)(struct sock *, int, sockptr_t, int);
+};
+
+struct tcp_md5sig_info {
+ struct hlist_head head;
+ struct callback_head rcu;
+};
+
+struct tcp_fastopen_request {
+ struct tcp_fastopen_cookie cookie;
+ struct msghdr *data;
+ size_t size;
+ int copied;
+ struct ubuf_info *uarg;
+};
+
+struct tcp_timewait_sock {
+ struct inet_timewait_sock tw_sk;
+ u32 tw_rcv_wnd;
+ u32 tw_ts_offset;
+ u32 tw_ts_recent;
+ u32 tw_last_oow_ack_time;
+ int tw_ts_recent_stamp;
+ u32 tw_tx_delay;
+ struct tcp_md5sig_key *tw_md5_key;
+};
+
+union tcp_md5_addr {
+ struct in_addr a4;
+ struct in6_addr a6;
+};
+
+struct tcp_md5sig_key {
+ struct hlist_node node;
+ u8 keylen;
+ u8 family;
+ u8 prefixlen;
+ u8 flags;
+ union tcp_md5_addr addr;
+ int l3index;
+ u8 key[80];
+ struct callback_head rcu;
+};
+
+struct inet6_skb_parm {
+ int iif;
+ __be16 ra;
+ __u16 dst0;
+ __u16 srcrt;
+ __u16 dst1;
+ __u16 lastopt;
+ __u16 nhoff;
+ __u16 flags;
+ __u16 dsthao;
+ __u16 frag_max_size;
+ __u16 srhoff;
+};
+
+struct ip6_sf_socklist;
+
+struct ipv6_mc_socklist {
+ struct in6_addr addr;
+ int ifindex;
+ unsigned int sfmode;
+ struct ipv6_mc_socklist *next;
+ struct ip6_sf_socklist *sflist;
+ struct callback_head rcu;
+};
+
+struct ipv6_ac_socklist {
+ struct in6_addr acl_addr;
+ int acl_ifindex;
+ struct ipv6_ac_socklist *acl_next;
+};
+
+struct ip6_flowlabel;
+
+struct ipv6_fl_socklist {
+ struct ipv6_fl_socklist *next;
+ struct ip6_flowlabel *fl;
+ struct callback_head rcu;
+};
+
+struct ip6_sf_socklist {
+ unsigned int sl_max;
+ unsigned int sl_count;
+ struct callback_head rcu;
+ struct in6_addr sl_addr[0];
+};
+
+struct ip6_flowlabel {
+ struct ip6_flowlabel *next;
+ __be32 label;
+ atomic_t users;
+ struct in6_addr dst;
+ struct ipv6_txoptions *opt;
+ long unsigned int linger;
+ struct callback_head rcu;
+ u8 share;
+ union {
+ struct pid *pid;
+ kuid_t uid;
+ } owner;
+ long unsigned int lastuse;
+ long unsigned int expires;
+ struct net *fl_net;
+};
+
+struct inet_skb_parm {
+ int iif;
+ struct ip_options opt;
+ u16 flags;
+ u16 frag_max_size;
+};
+
+struct ip_reply_arg {
+ struct kvec iov[1];
+ int flags;
+ __wsum csum;
+ int csumoffset;
+ int bound_dev_if;
+ u8 tos;
+ kuid_t uid;
+};
+
+struct icmp_err {
+ int errno;
+ unsigned int fatal: 1;
+};
+
+struct inet_ehash_bucket {
+ struct hlist_nulls_head chain;
+};
+
+struct inet_bind_hashbucket {
+ spinlock_t lock;
+ struct hlist_head chain;
+};
+
+struct inet_listen_hashbucket {
+ spinlock_t lock;
+ struct hlist_nulls_head nulls_head;
+};
+
+struct bpf_cgroup_storage_key {
+ __u64 cgroup_inode_id;
+ __u32 attach_type;
+};
+
+enum bpf_cgroup_iter_order {
+ BPF_CGROUP_ITER_ORDER_UNSPEC = 0,
+ BPF_CGROUP_ITER_SELF_ONLY = 1,
+ BPF_CGROUP_ITER_DESCENDANTS_PRE = 2,
+ BPF_CGROUP_ITER_DESCENDANTS_POST = 3,
+ BPF_CGROUP_ITER_ANCESTORS_UP = 4,
+};
+
+union bpf_iter_link_info {
+ struct {
+ __u32 map_fd;
+ } map;
+ struct {
+ enum bpf_cgroup_iter_order order;
+ __u32 cgroup_fd;
+ __u64 cgroup_id;
+ } cgroup;
+ struct {
+ __u32 tid;
+ __u32 pid;
+ __u32 pid_fd;
+ } task;
+};
+
+union bpf_attr {
+ struct {
+ __u32 map_type;
+ __u32 key_size;
+ __u32 value_size;
+ __u32 max_entries;
+ __u32 map_flags;
+ __u32 inner_map_fd;
+ __u32 numa_node;
+ char map_name[16];
+ __u32 map_ifindex;
+ __u32 btf_fd;
+ __u32 btf_key_type_id;
+ __u32 btf_value_type_id;
+ __u32 btf_vmlinux_value_type_id;
+ __u64 map_extra;
+ };
+ struct {
+ __u32 map_fd;
+ __u64 key;
+ union {
+ __u64 value;
+ __u64 next_key;
+ };
+ __u64 flags;
+ };
+ struct {
+ __u64 in_batch;
+ __u64 out_batch;
+ __u64 keys;
+ __u64 values;
+ __u32 count;
+ __u32 map_fd;
+ __u64 elem_flags;
+ __u64 flags;
+ } batch;
+ struct {
+ __u32 prog_type;
+ __u32 insn_cnt;
+ __u64 insns;
+ __u64 license;
+ __u32 log_level;
+ __u32 log_size;
+ __u64 log_buf;
+ __u32 kern_version;
+ __u32 prog_flags;
+ char prog_name[16];
+ __u32 prog_ifindex;
+ __u32 expected_attach_type;
+ __u32 prog_btf_fd;
+ __u32 func_info_rec_size;
+ __u64 func_info;
+ __u32 func_info_cnt;
+ __u32 line_info_rec_size;
+ __u64 line_info;
+ __u32 line_info_cnt;
+ __u32 attach_btf_id;
+ union {
+ __u32 attach_prog_fd;
+ __u32 attach_btf_obj_fd;
+ };
+ __u32 core_relo_cnt;
+ __u64 fd_array;
+ __u64 core_relos;
+ __u32 core_relo_rec_size;
+ };
+ struct {
+ __u64 pathname;
+ __u32 bpf_fd;
+ __u32 file_flags;
+ };
+ struct {
+ __u32 target_fd;
+ __u32 attach_bpf_fd;
+ __u32 attach_type;
+ __u32 attach_flags;
+ __u32 replace_bpf_fd;
+ };
+ struct {
+ __u32 prog_fd;
+ __u32 retval;
+ __u32 data_size_in;
+ __u32 data_size_out;
+ __u64 data_in;
+ __u64 data_out;
+ __u32 repeat;
+ __u32 duration;
+ __u32 ctx_size_in;
+ __u32 ctx_size_out;
+ __u64 ctx_in;
+ __u64 ctx_out;
+ __u32 flags;
+ __u32 cpu;
+ __u32 batch_size;
+ } test;
+ struct {
+ union {
+ __u32 start_id;
+ __u32 prog_id;
+ __u32 map_id;
+ __u32 btf_id;
+ __u32 link_id;
+ };
+ __u32 next_id;
+ __u32 open_flags;
+ };
+ struct {
+ __u32 bpf_fd;
+ __u32 info_len;
+ __u64 info;
+ } info;
+ struct {
+ __u32 target_fd;
+ __u32 attach_type;
+ __u32 query_flags;
+ __u32 attach_flags;
+ __u64 prog_ids;
+ __u32 prog_cnt;
+ __u64 prog_attach_flags;
+ } query;
+ struct {
+ __u64 name;
+ __u32 prog_fd;
+ } raw_tracepoint;
+ struct {
+ __u64 btf;
+ __u64 btf_log_buf;
+ __u32 btf_size;
+ __u32 btf_log_size;
+ __u32 btf_log_level;
+ };
+ struct {
+ __u32 pid;
+ __u32 fd;
+ __u32 flags;
+ __u32 buf_len;
+ __u64 buf;
+ __u32 prog_id;
+ __u32 fd_type;
+ __u64 probe_offset;
+ __u64 probe_addr;
+ } task_fd_query;
+ struct {
+ __u32 prog_fd;
+ union {
+ __u32 target_fd;
+ __u32 target_ifindex;
+ };
+ __u32 attach_type;
+ __u32 flags;
+ union {
+ __u32 target_btf_id;
+ struct {
+ __u64 iter_info;
+ __u32 iter_info_len;
+ };
+ struct {
+ __u64 bpf_cookie;
+ } perf_event;
+ struct {
+ __u32 flags;
+ __u32 cnt;
+ __u64 syms;
+ __u64 addrs;
+ __u64 cookies;
+ } kprobe_multi;
+ struct {
+ __u32 target_btf_id;
+ __u64 cookie;
+ } tracing;
+ };
+ } link_create;
+ struct {
+ __u32 link_fd;
+ __u32 new_prog_fd;
+ __u32 flags;
+ __u32 old_prog_fd;
+ } link_update;
+ struct {
+ __u32 link_fd;
+ } link_detach;
+ struct {
+ __u32 type;
+ } enable_stats;
+ struct {
+ __u32 link_fd;
+ __u32 flags;
+ } iter_create;
+ struct {
+ __u32 prog_fd;
+ __u32 map_fd;
+ __u32 flags;
+ } prog_bind_map;
+};
+
+enum bpf_func_id {
+ BPF_FUNC_unspec = 0,
+ BPF_FUNC_map_lookup_elem = 1,
+ BPF_FUNC_map_update_elem = 2,
+ BPF_FUNC_map_delete_elem = 3,
+ BPF_FUNC_probe_read = 4,
+ BPF_FUNC_ktime_get_ns = 5,
+ BPF_FUNC_trace_printk = 6,
+ BPF_FUNC_get_prandom_u32 = 7,
+ BPF_FUNC_get_smp_processor_id = 8,
+ BPF_FUNC_skb_store_bytes = 9,
+ BPF_FUNC_l3_csum_replace = 10,
+ BPF_FUNC_l4_csum_replace = 11,
+ BPF_FUNC_tail_call = 12,
+ BPF_FUNC_clone_redirect = 13,
+ BPF_FUNC_get_current_pid_tgid = 14,
+ BPF_FUNC_get_current_uid_gid = 15,
+ BPF_FUNC_get_current_comm = 16,
+ BPF_FUNC_get_cgroup_classid = 17,
+ BPF_FUNC_skb_vlan_push = 18,
+ BPF_FUNC_skb_vlan_pop = 19,
+ BPF_FUNC_skb_get_tunnel_key = 20,
+ BPF_FUNC_skb_set_tunnel_key = 21,
+ BPF_FUNC_perf_event_read = 22,
+ BPF_FUNC_redirect = 23,
+ BPF_FUNC_get_route_realm = 24,
+ BPF_FUNC_perf_event_output = 25,
+ BPF_FUNC_skb_load_bytes = 26,
+ BPF_FUNC_get_stackid = 27,
+ BPF_FUNC_csum_diff = 28,
+ BPF_FUNC_skb_get_tunnel_opt = 29,
+ BPF_FUNC_skb_set_tunnel_opt = 30,
+ BPF_FUNC_skb_change_proto = 31,
+ BPF_FUNC_skb_change_type = 32,
+ BPF_FUNC_skb_under_cgroup = 33,
+ BPF_FUNC_get_hash_recalc = 34,
+ BPF_FUNC_get_current_task = 35,
+ BPF_FUNC_probe_write_user = 36,
+ BPF_FUNC_current_task_under_cgroup = 37,
+ BPF_FUNC_skb_change_tail = 38,
+ BPF_FUNC_skb_pull_data = 39,
+ BPF_FUNC_csum_update = 40,
+ BPF_FUNC_set_hash_invalid = 41,
+ BPF_FUNC_get_numa_node_id = 42,
+ BPF_FUNC_skb_change_head = 43,
+ BPF_FUNC_xdp_adjust_head = 44,
+ BPF_FUNC_probe_read_str = 45,
+ BPF_FUNC_get_socket_cookie = 46,
+ BPF_FUNC_get_socket_uid = 47,
+ BPF_FUNC_set_hash = 48,
+ BPF_FUNC_setsockopt = 49,
+ BPF_FUNC_skb_adjust_room = 50,
+ BPF_FUNC_redirect_map = 51,
+ BPF_FUNC_sk_redirect_map = 52,
+ BPF_FUNC_sock_map_update = 53,
+ BPF_FUNC_xdp_adjust_meta = 54,
+ BPF_FUNC_perf_event_read_value = 55,
+ BPF_FUNC_perf_prog_read_value = 56,
+ BPF_FUNC_getsockopt = 57,
+ BPF_FUNC_override_return = 58,
+ BPF_FUNC_sock_ops_cb_flags_set = 59,
+ BPF_FUNC_msg_redirect_map = 60,
+ BPF_FUNC_msg_apply_bytes = 61,
+ BPF_FUNC_msg_cork_bytes = 62,
+ BPF_FUNC_msg_pull_data = 63,
+ BPF_FUNC_bind = 64,
+ BPF_FUNC_xdp_adjust_tail = 65,
+ BPF_FUNC_skb_get_xfrm_state = 66,
+ BPF_FUNC_get_stack = 67,
+ BPF_FUNC_skb_load_bytes_relative = 68,
+ BPF_FUNC_fib_lookup = 69,
+ BPF_FUNC_sock_hash_update = 70,
+ BPF_FUNC_msg_redirect_hash = 71,
+ BPF_FUNC_sk_redirect_hash = 72,
+ BPF_FUNC_lwt_push_encap = 73,
+ BPF_FUNC_lwt_seg6_store_bytes = 74,
+ BPF_FUNC_lwt_seg6_adjust_srh = 75,
+ BPF_FUNC_lwt_seg6_action = 76,
+ BPF_FUNC_rc_repeat = 77,
+ BPF_FUNC_rc_keydown = 78,
+ BPF_FUNC_skb_cgroup_id = 79,
+ BPF_FUNC_get_current_cgroup_id = 80,
+ BPF_FUNC_get_local_storage = 81,
+ BPF_FUNC_sk_select_reuseport = 82,
+ BPF_FUNC_skb_ancestor_cgroup_id = 83,
+ BPF_FUNC_sk_lookup_tcp = 84,
+ BPF_FUNC_sk_lookup_udp = 85,
+ BPF_FUNC_sk_release = 86,
+ BPF_FUNC_map_push_elem = 87,
+ BPF_FUNC_map_pop_elem = 88,
+ BPF_FUNC_map_peek_elem = 89,
+ BPF_FUNC_msg_push_data = 90,
+ BPF_FUNC_msg_pop_data = 91,
+ BPF_FUNC_rc_pointer_rel = 92,
+ BPF_FUNC_spin_lock = 93,
+ BPF_FUNC_spin_unlock = 94,
+ BPF_FUNC_sk_fullsock = 95,
+ BPF_FUNC_tcp_sock = 96,
+ BPF_FUNC_skb_ecn_set_ce = 97,
+ BPF_FUNC_get_listener_sock = 98,
+ BPF_FUNC_skc_lookup_tcp = 99,
+ BPF_FUNC_tcp_check_syncookie = 100,
+ BPF_FUNC_sysctl_get_name = 101,
+ BPF_FUNC_sysctl_get_current_value = 102,
+ BPF_FUNC_sysctl_get_new_value = 103,
+ BPF_FUNC_sysctl_set_new_value = 104,
+ BPF_FUNC_strtol = 105,
+ BPF_FUNC_strtoul = 106,
+ BPF_FUNC_sk_storage_get = 107,
+ BPF_FUNC_sk_storage_delete = 108,
+ BPF_FUNC_send_signal = 109,
+ BPF_FUNC_tcp_gen_syncookie = 110,
+ BPF_FUNC_skb_output = 111,
+ BPF_FUNC_probe_read_user = 112,
+ BPF_FUNC_probe_read_kernel = 113,
+ BPF_FUNC_probe_read_user_str = 114,
+ BPF_FUNC_probe_read_kernel_str = 115,
+ BPF_FUNC_tcp_send_ack = 116,
+ BPF_FUNC_send_signal_thread = 117,
+ BPF_FUNC_jiffies64 = 118,
+ BPF_FUNC_read_branch_records = 119,
+ BPF_FUNC_get_ns_current_pid_tgid = 120,
+ BPF_FUNC_xdp_output = 121,
+ BPF_FUNC_get_netns_cookie = 122,
+ BPF_FUNC_get_current_ancestor_cgroup_id = 123,
+ BPF_FUNC_sk_assign = 124,
+ BPF_FUNC_ktime_get_boot_ns = 125,
+ BPF_FUNC_seq_printf = 126,
+ BPF_FUNC_seq_write = 127,
+ BPF_FUNC_sk_cgroup_id = 128,
+ BPF_FUNC_sk_ancestor_cgroup_id = 129,
+ BPF_FUNC_ringbuf_output = 130,
+ BPF_FUNC_ringbuf_reserve = 131,
+ BPF_FUNC_ringbuf_submit = 132,
+ BPF_FUNC_ringbuf_discard = 133,
+ BPF_FUNC_ringbuf_query = 134,
+ BPF_FUNC_csum_level = 135,
+ BPF_FUNC_skc_to_tcp6_sock = 136,
+ BPF_FUNC_skc_to_tcp_sock = 137,
+ BPF_FUNC_skc_to_tcp_timewait_sock = 138,
+ BPF_FUNC_skc_to_tcp_request_sock = 139,
+ BPF_FUNC_skc_to_udp6_sock = 140,
+ BPF_FUNC_get_task_stack = 141,
+ BPF_FUNC_load_hdr_opt = 142,
+ BPF_FUNC_store_hdr_opt = 143,
+ BPF_FUNC_reserve_hdr_opt = 144,
+ BPF_FUNC_inode_storage_get = 145,
+ BPF_FUNC_inode_storage_delete = 146,
+ BPF_FUNC_d_path = 147,
+ BPF_FUNC_copy_from_user = 148,
+ BPF_FUNC_snprintf_btf = 149,
+ BPF_FUNC_seq_printf_btf = 150,
+ BPF_FUNC_skb_cgroup_classid = 151,
+ BPF_FUNC_redirect_neigh = 152,
+ BPF_FUNC_per_cpu_ptr = 153,
+ BPF_FUNC_this_cpu_ptr = 154,
+ BPF_FUNC_redirect_peer = 155,
+ BPF_FUNC_task_storage_get = 156,
+ BPF_FUNC_task_storage_delete = 157,
+ BPF_FUNC_get_current_task_btf = 158,
+ BPF_FUNC_bprm_opts_set = 159,
+ BPF_FUNC_ktime_get_coarse_ns = 160,
+ BPF_FUNC_ima_inode_hash = 161,
+ BPF_FUNC_sock_from_file = 162,
+ BPF_FUNC_check_mtu = 163,
+ BPF_FUNC_for_each_map_elem = 164,
+ BPF_FUNC_snprintf = 165,
+ BPF_FUNC_sys_bpf = 166,
+ BPF_FUNC_btf_find_by_name_kind = 167,
+ BPF_FUNC_sys_close = 168,
+ BPF_FUNC_timer_init = 169,
+ BPF_FUNC_timer_set_callback = 170,
+ BPF_FUNC_timer_start = 171,
+ BPF_FUNC_timer_cancel = 172,
+ BPF_FUNC_get_func_ip = 173,
+ BPF_FUNC_get_attach_cookie = 174,
+ BPF_FUNC_task_pt_regs = 175,
+ BPF_FUNC_get_branch_snapshot = 176,
+ BPF_FUNC_trace_vprintk = 177,
+ BPF_FUNC_skc_to_unix_sock = 178,
+ BPF_FUNC_kallsyms_lookup_name = 179,
+ BPF_FUNC_find_vma = 180,
+ BPF_FUNC_loop = 181,
+ BPF_FUNC_strncmp = 182,
+ BPF_FUNC_get_func_arg = 183,
+ BPF_FUNC_get_func_ret = 184,
+ BPF_FUNC_get_func_arg_cnt = 185,
+ BPF_FUNC_get_retval = 186,
+ BPF_FUNC_set_retval = 187,
+ BPF_FUNC_xdp_get_buff_len = 188,
+ BPF_FUNC_xdp_load_bytes = 189,
+ BPF_FUNC_xdp_store_bytes = 190,
+ BPF_FUNC_copy_from_user_task = 191,
+ BPF_FUNC_skb_set_tstamp = 192,
+ BPF_FUNC_ima_file_hash = 193,
+ BPF_FUNC_kptr_xchg = 194,
+ BPF_FUNC_map_lookup_percpu_elem = 195,
+ BPF_FUNC_skc_to_mptcp_sock = 196,
+ BPF_FUNC_dynptr_from_mem = 197,
+ BPF_FUNC_ringbuf_reserve_dynptr = 198,
+ BPF_FUNC_ringbuf_submit_dynptr = 199,
+ BPF_FUNC_ringbuf_discard_dynptr = 200,
+ BPF_FUNC_dynptr_read = 201,
+ BPF_FUNC_dynptr_write = 202,
+ BPF_FUNC_dynptr_data = 203,
+ BPF_FUNC_tcp_raw_gen_syncookie_ipv4 = 204,
+ BPF_FUNC_tcp_raw_gen_syncookie_ipv6 = 205,
+ BPF_FUNC_tcp_raw_check_syncookie_ipv4 = 206,
+ BPF_FUNC_tcp_raw_check_syncookie_ipv6 = 207,
+ BPF_FUNC_ktime_get_tai_ns = 208,
+ BPF_FUNC_user_ringbuf_drain = 209,
+ BPF_FUNC_cgrp_storage_get = 210,
+ BPF_FUNC_cgrp_storage_delete = 211,
+ __BPF_FUNC_MAX_ID = 212,
+};
+
+struct bpf_link_info {
+ __u32 type;
+ __u32 id;
+ __u32 prog_id;
+ union {
+ struct {
+ __u64 tp_name;
+ __u32 tp_name_len;
+ } raw_tracepoint;
+ struct {
+ __u32 attach_type;
+ __u32 target_obj_id;
+ __u32 target_btf_id;
+ } tracing;
+ struct {
+ __u64 cgroup_id;
+ __u32 attach_type;
+ } cgroup;
+ struct {
+ __u64 target_name;
+ __u32 target_name_len;
+ union {
+ struct {
+ __u32 map_id;
+ } map;
+ };
+ union {
+ struct {
+ __u64 cgroup_id;
+ __u32 order;
+ } cgroup;
+ struct {
+ __u32 tid;
+ __u32 pid;
+ } task;
+ };
+ } iter;
+ struct {
+ __u32 netns_ino;
+ __u32 attach_type;
+ } netns;
+ struct {
+ __u32 ifindex;
+ } xdp;
+ };
+};
+
+enum {
+ BPF_SOCK_OPS_VOID = 0,
+ BPF_SOCK_OPS_TIMEOUT_INIT = 1,
+ BPF_SOCK_OPS_RWND_INIT = 2,
+ BPF_SOCK_OPS_TCP_CONNECT_CB = 3,
+ BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB = 4,
+ BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB = 5,
+ BPF_SOCK_OPS_NEEDS_ECN = 6,
+ BPF_SOCK_OPS_BASE_RTT = 7,
+ BPF_SOCK_OPS_RTO_CB = 8,
+ BPF_SOCK_OPS_RETRANS_CB = 9,
+ BPF_SOCK_OPS_STATE_CB = 10,
+ BPF_SOCK_OPS_TCP_LISTEN_CB = 11,
+ BPF_SOCK_OPS_RTT_CB = 12,
+ BPF_SOCK_OPS_PARSE_HDR_OPT_CB = 13,
+ BPF_SOCK_OPS_HDR_OPT_LEN_CB = 14,
+ BPF_SOCK_OPS_WRITE_HDR_OPT_CB = 15,
+};
+
+struct bpf_func_info {
+ __u32 insn_off;
+ __u32 type_id;
+};
+
+struct bpf_line_info {
+ __u32 insn_off;
+ __u32 file_name_off;
+ __u32 line_off;
+ __u32 line_col;
+};
+
+enum {
+ BTF_SOCK_TYPE_INET = 0,
+ BTF_SOCK_TYPE_INET_CONN = 1,
+ BTF_SOCK_TYPE_INET_REQ = 2,
+ BTF_SOCK_TYPE_INET_TW = 3,
+ BTF_SOCK_TYPE_REQ = 4,
+ BTF_SOCK_TYPE_SOCK = 5,
+ BTF_SOCK_TYPE_SOCK_COMMON = 6,
+ BTF_SOCK_TYPE_TCP = 7,
+ BTF_SOCK_TYPE_TCP_REQ = 8,
+ BTF_SOCK_TYPE_TCP_TW = 9,
+ BTF_SOCK_TYPE_TCP6 = 10,
+ BTF_SOCK_TYPE_UDP = 11,
+ BTF_SOCK_TYPE_UDP6 = 12,
+ BTF_SOCK_TYPE_UNIX = 13,
+ BTF_SOCK_TYPE_MPTCP = 14,
+ BTF_SOCK_TYPE_SOCKET = 15,
+ MAX_BTF_SOCK_TYPE = 16,
+};
+
+struct btf_type {
+ __u32 name_off;
+ __u32 info;
+ union {
+ __u32 size;
+ __u32 type;
+ };
+};
+
+enum btf_field_type {
+ BPF_SPIN_LOCK = 1,
+ BPF_TIMER = 2,
+ BPF_KPTR_UNREF = 4,
+ BPF_KPTR_REF = 8,
+ BPF_KPTR = 12,
+ BPF_LIST_HEAD = 16,
+ BPF_LIST_NODE = 32,
+};
+
+typedef void (*btf_dtor_kfunc_t)(void *);
+
+struct btf_field_kptr {
+ struct btf *btf;
+ struct module *module;
+ btf_dtor_kfunc_t dtor;
+ u32 btf_id;
+};
+
+struct btf_field_list_head {
+ struct btf *btf;
+ u32 value_btf_id;
+ u32 node_offset;
+ struct btf_record *value_rec;
+};
+
+struct btf_field {
+ u32 offset;
+ enum btf_field_type type;
+ union {
+ struct btf_field_kptr kptr;
+ struct btf_field_list_head list_head;
+ };
+};
+
+struct btf_record {
+ u32 cnt;
+ u32 field_mask;
+ int spin_lock_off;
+ int timer_off;
+ struct btf_field fields[0];
+};
+
+struct btf_field_offs {
+ u32 cnt;
+ u32 field_off[10];
+ u8 field_sz[10];
+};
+
+typedef u64 (*bpf_callback_t)(u64, u64, u64, u64, u64);
+
+struct bpf_iter_aux_info;
+
+typedef int (*bpf_iter_init_seq_priv_t)(void *, struct bpf_iter_aux_info *);
+
+enum bpf_iter_task_type {
+ BPF_TASK_ITER_ALL = 0,
+ BPF_TASK_ITER_TID = 1,
+ BPF_TASK_ITER_TGID = 2,
+};
+
+struct bpf_iter_aux_info {
+ struct bpf_map *map;
+ struct {
+ struct cgroup *start;
+ enum bpf_cgroup_iter_order order;
+ } cgroup;
+ struct {
+ enum bpf_iter_task_type type;
+ u32 pid;
+ } task;
+};
+
+typedef void (*bpf_iter_fini_seq_priv_t)(void *);
+
+struct bpf_iter_seq_info {
+ const struct seq_operations *seq_ops;
+ bpf_iter_init_seq_priv_t init_seq_private;
+ bpf_iter_fini_seq_priv_t fini_seq_private;
+ u32 seq_priv_size;
+};
+
+struct bpf_local_storage_map;
+
+struct bpf_verifier_env;
+
+struct bpf_func_state;
+
+struct bpf_map_ops {
+ int (*map_alloc_check)(union bpf_attr *);
+ struct bpf_map * (*map_alloc)(union bpf_attr *);
+ void (*map_release)(struct bpf_map *, struct file *);
+ void (*map_free)(struct bpf_map *);
+ int (*map_get_next_key)(struct bpf_map *, void *, void *);
+ void (*map_release_uref)(struct bpf_map *);
+ void * (*map_lookup_elem_sys_only)(struct bpf_map *, void *);
+ int (*map_lookup_batch)(struct bpf_map *, const union bpf_attr *, union bpf_attr *);
+ int (*map_lookup_and_delete_elem)(struct bpf_map *, void *, void *, u64);
+ int (*map_lookup_and_delete_batch)(struct bpf_map *, const union bpf_attr *, union bpf_attr *);
+ int (*map_update_batch)(struct bpf_map *, struct file *, const union bpf_attr *, union bpf_attr *);
+ int (*map_delete_batch)(struct bpf_map *, const union bpf_attr *, union bpf_attr *);
+ void * (*map_lookup_elem)(struct bpf_map *, void *);
+ int (*map_update_elem)(struct bpf_map *, void *, void *, u64);
+ int (*map_delete_elem)(struct bpf_map *, void *);
+ int (*map_push_elem)(struct bpf_map *, void *, u64);
+ int (*map_pop_elem)(struct bpf_map *, void *);
+ int (*map_peek_elem)(struct bpf_map *, void *);
+ void * (*map_lookup_percpu_elem)(struct bpf_map *, void *, u32);
+ void * (*map_fd_get_ptr)(struct bpf_map *, struct file *, int);
+ void (*map_fd_put_ptr)(void *);
+ int (*map_gen_lookup)(struct bpf_map *, struct bpf_insn *);
+ u32 (*map_fd_sys_lookup_elem)(void *);
+ void (*map_seq_show_elem)(struct bpf_map *, void *, struct seq_file *);
+ int (*map_check_btf)(const struct bpf_map *, const struct btf *, const struct btf_type *, const struct btf_type *);
+ int (*map_poke_track)(struct bpf_map *, struct bpf_prog_aux *);
+ void (*map_poke_untrack)(struct bpf_map *, struct bpf_prog_aux *);
+ void (*map_poke_run)(struct bpf_map *, u32, struct bpf_prog *, struct bpf_prog *);
+ int (*map_direct_value_addr)(const struct bpf_map *, u64 *, u32);
+ int (*map_direct_value_meta)(const struct bpf_map *, u64, u32 *);
+ int (*map_mmap)(struct bpf_map *, struct vm_area_struct *);
+ __poll_t (*map_poll)(struct bpf_map *, struct file *, struct poll_table_struct *);
+ int (*map_local_storage_charge)(struct bpf_local_storage_map *, void *, u32);
+ void (*map_local_storage_uncharge)(struct bpf_local_storage_map *, void *, u32);
+ struct bpf_local_storage ** (*map_owner_storage_ptr)(void *);
+ int (*map_redirect)(struct bpf_map *, u64, u64);
+ bool (*map_meta_equal)(const struct bpf_map *, const struct bpf_map *);
+ int (*map_set_for_each_callback_args)(struct bpf_verifier_env *, struct bpf_func_state *, struct bpf_func_state *);
+ int (*map_for_each_callback)(struct bpf_map *, bpf_callback_t, void *, u64);
+ int *map_btf_id;
+ const struct bpf_iter_seq_info *iter_seq_info;
+};
+
+struct btf_header {
+ __u16 magic;
+ __u8 version;
+ __u8 flags;
+ __u32 hdr_len;
+ __u32 type_off;
+ __u32 type_len;
+ __u32 str_off;
+ __u32 str_len;
+};
+
+struct btf_kfunc_set_tab;
+
+struct btf_id_dtor_kfunc_tab;
+
+struct btf_struct_metas;
+
+struct btf {
+ void *data;
+ struct btf_type **types;
+ u32 *resolved_ids;
+ u32 *resolved_sizes;
+ const char *strings;
+ void *nohdr_data;
+ struct btf_header hdr;
+ u32 nr_types;
+ u32 types_size;
+ u32 data_size;
+ refcount_t refcnt;
+ u32 id;
+ struct callback_head rcu;
+ struct btf_kfunc_set_tab *kfunc_set_tab;
+ struct btf_id_dtor_kfunc_tab *dtor_kfunc_tab;
+ struct btf_struct_metas *struct_meta_tab;
+ struct btf *base_btf;
+ u32 start_id;
+ u32 start_str_off;
+ char name[56];
+ bool kernel_btf;
+};
+
+struct bpf_ksym {
+ long unsigned int start;
+ long unsigned int end;
+ char name[512];
+ struct list_head lnode;
+ struct latch_tree_node tnode;
+ bool prog;
+};
+
+struct bpf_ctx_arg_aux;
+
+struct bpf_trampoline;
+
+struct bpf_jit_poke_descriptor;
+
+struct bpf_kfunc_desc_tab;
+
+struct bpf_kfunc_btf_tab;
+
+struct bpf_prog_ops;
+
+struct btf_mod_pair;
+
+struct bpf_prog_offload;
+
+struct bpf_func_info_aux;
+
+struct bpf_prog_aux {
+ atomic64_t refcnt;
+ u32 used_map_cnt;
+ u32 used_btf_cnt;
+ u32 max_ctx_offset;
+ u32 max_pkt_offset;
+ u32 max_tp_access;
+ u32 stack_depth;
+ u32 id;
+ u32 func_cnt;
+ u32 func_idx;
+ u32 attach_btf_id;
+ u32 ctx_arg_info_size;
+ u32 max_rdonly_access;
+ u32 max_rdwr_access;
+ struct btf *attach_btf;
+ const struct bpf_ctx_arg_aux *ctx_arg_info;
+ struct mutex dst_mutex;
+ struct bpf_prog *dst_prog;
+ struct bpf_trampoline *dst_trampoline;
+ enum bpf_prog_type saved_dst_prog_type;
+ enum bpf_attach_type saved_dst_attach_type;
+ bool verifier_zext;
+ bool offload_requested;
+ bool attach_btf_trace;
+ bool func_proto_unreliable;
+ bool sleepable;
+ bool tail_call_reachable;
+ bool xdp_has_frags;
+ const struct btf_type *attach_func_proto;
+ const char *attach_func_name;
+ struct bpf_prog **func;
+ void *jit_data;
+ struct bpf_jit_poke_descriptor *poke_tab;
+ struct bpf_kfunc_desc_tab *kfunc_tab;
+ struct bpf_kfunc_btf_tab *kfunc_btf_tab;
+ u32 size_poke_tab;
+ struct bpf_ksym ksym;
+ const struct bpf_prog_ops *ops;
+ struct bpf_map **used_maps;
+ struct mutex used_maps_mutex;
+ struct btf_mod_pair *used_btfs;
+ struct bpf_prog *prog;
+ struct user_struct *user;
+ u64 load_time;
+ u32 verified_insns;
+ int cgroup_atype;
+ struct bpf_map *cgroup_storage[2];
+ char name[16];
+ void *security;
+ struct bpf_prog_offload *offload;
+ struct btf *btf;
+ struct bpf_func_info *func_info;
+ struct bpf_func_info_aux *func_info_aux;
+ struct bpf_line_info *linfo;
+ void **jited_linfo;
+ u32 func_info_cnt;
+ u32 nr_linfo;
+ u32 linfo_idx;
+ u32 num_exentries;
+ struct exception_table_entry *extable;
+ union {
+ struct work_struct work;
+ struct callback_head rcu;
+ };
+};
+
+struct bpf_map_dev_ops {
+ int (*map_get_next_key)(struct bpf_offloaded_map *, void *, void *);
+ int (*map_lookup_elem)(struct bpf_offloaded_map *, void *, void *);
+ int (*map_update_elem)(struct bpf_offloaded_map *, void *, void *, u64);
+ int (*map_delete_elem)(struct bpf_offloaded_map *, void *);
+};
+
+enum bpf_arg_type {
+ ARG_DONTCARE = 0,
+ ARG_CONST_MAP_PTR = 1,
+ ARG_PTR_TO_MAP_KEY = 2,
+ ARG_PTR_TO_MAP_VALUE = 3,
+ ARG_PTR_TO_MEM = 4,
+ ARG_CONST_SIZE = 5,
+ ARG_CONST_SIZE_OR_ZERO = 6,
+ ARG_PTR_TO_CTX = 7,
+ ARG_ANYTHING = 8,
+ ARG_PTR_TO_SPIN_LOCK = 9,
+ ARG_PTR_TO_SOCK_COMMON = 10,
+ ARG_PTR_TO_INT = 11,
+ ARG_PTR_TO_LONG = 12,
+ ARG_PTR_TO_SOCKET = 13,
+ ARG_PTR_TO_BTF_ID = 14,
+ ARG_PTR_TO_RINGBUF_MEM = 15,
+ ARG_CONST_ALLOC_SIZE_OR_ZERO = 16,
+ ARG_PTR_TO_BTF_ID_SOCK_COMMON = 17,
+ ARG_PTR_TO_PERCPU_BTF_ID = 18,
+ ARG_PTR_TO_FUNC = 19,
+ ARG_PTR_TO_STACK = 20,
+ ARG_PTR_TO_CONST_STR = 21,
+ ARG_PTR_TO_TIMER = 22,
+ ARG_PTR_TO_KPTR = 23,
+ ARG_PTR_TO_DYNPTR = 24,
+ __BPF_ARG_TYPE_MAX = 25,
+ ARG_PTR_TO_MAP_VALUE_OR_NULL = 259,
+ ARG_PTR_TO_MEM_OR_NULL = 260,
+ ARG_PTR_TO_CTX_OR_NULL = 263,
+ ARG_PTR_TO_SOCKET_OR_NULL = 269,
+ ARG_PTR_TO_STACK_OR_NULL = 276,
+ ARG_PTR_TO_BTF_ID_OR_NULL = 270,
+ ARG_PTR_TO_UNINIT_MEM = 32772,
+ ARG_PTR_TO_FIXED_SIZE_MEM = 262148,
+ __BPF_ARG_TYPE_LIMIT = 4194303,
+};
+
+enum bpf_return_type {
+ RET_INTEGER = 0,
+ RET_VOID = 1,
+ RET_PTR_TO_MAP_VALUE = 2,
+ RET_PTR_TO_SOCKET = 3,
+ RET_PTR_TO_TCP_SOCK = 4,
+ RET_PTR_TO_SOCK_COMMON = 5,
+ RET_PTR_TO_MEM = 6,
+ RET_PTR_TO_MEM_OR_BTF_ID = 7,
+ RET_PTR_TO_BTF_ID = 8,
+ __BPF_RET_TYPE_MAX = 9,
+ RET_PTR_TO_MAP_VALUE_OR_NULL = 258,
+ RET_PTR_TO_SOCKET_OR_NULL = 259,
+ RET_PTR_TO_TCP_SOCK_OR_NULL = 260,
+ RET_PTR_TO_SOCK_COMMON_OR_NULL = 261,
+ RET_PTR_TO_RINGBUF_MEM_OR_NULL = 1286,
+ RET_PTR_TO_DYNPTR_MEM_OR_NULL = 262,
+ RET_PTR_TO_BTF_ID_OR_NULL = 264,
+ RET_PTR_TO_BTF_ID_TRUSTED = 1048584,
+ __BPF_RET_TYPE_LIMIT = 4194303,
+};
+
+struct bpf_func_proto {
+ u64 (*func)(u64, u64, u64, u64, u64);
+ bool gpl_only;
+ bool pkt_access;
+ bool might_sleep;
+ enum bpf_return_type ret_type;
+ union {
+ struct {
+ enum bpf_arg_type arg1_type;
+ enum bpf_arg_type arg2_type;
+ enum bpf_arg_type arg3_type;
+ enum bpf_arg_type arg4_type;
+ enum bpf_arg_type arg5_type;
+ };
+ enum bpf_arg_type arg_type[5];
+ };
+ union {
+ struct {
+ u32 *arg1_btf_id;
+ u32 *arg2_btf_id;
+ u32 *arg3_btf_id;
+ u32 *arg4_btf_id;
+ u32 *arg5_btf_id;
+ };
+ u32 *arg_btf_id[5];
+ struct {
+ size_t arg1_size;
+ size_t arg2_size;
+ size_t arg3_size;
+ size_t arg4_size;
+ size_t arg5_size;
+ };
+ size_t arg_size[5];
+ };
+ int *ret_btf_id;
+ bool (*allowed)(const struct bpf_prog *);
+};
+
+enum bpf_reg_type {
+ NOT_INIT = 0,
+ SCALAR_VALUE = 1,
+ PTR_TO_CTX = 2,
+ CONST_PTR_TO_MAP = 3,
+ PTR_TO_MAP_VALUE = 4,
+ PTR_TO_MAP_KEY = 5,
+ PTR_TO_STACK = 6,
+ PTR_TO_PACKET_META = 7,
+ PTR_TO_PACKET = 8,
+ PTR_TO_PACKET_END = 9,
+ PTR_TO_FLOW_KEYS = 10,
+ PTR_TO_SOCKET = 11,
+ PTR_TO_SOCK_COMMON = 12,
+ PTR_TO_TCP_SOCK = 13,
+ PTR_TO_TP_BUFFER = 14,
+ PTR_TO_XDP_SOCK = 15,
+ PTR_TO_BTF_ID = 16,
+ PTR_TO_MEM = 17,
+ PTR_TO_BUF = 18,
+ PTR_TO_FUNC = 19,
+ PTR_TO_DYNPTR = 20,
+ __BPF_REG_TYPE_MAX = 21,
+ PTR_TO_MAP_VALUE_OR_NULL = 260,
+ PTR_TO_SOCKET_OR_NULL = 267,
+ PTR_TO_SOCK_COMMON_OR_NULL = 268,
+ PTR_TO_TCP_SOCK_OR_NULL = 269,
+ PTR_TO_BTF_ID_OR_NULL = 272,
+ __BPF_REG_TYPE_LIMIT = 4194303,
+};
+
+struct bpf_prog_ops {
+ int (*test_run)(struct bpf_prog *, const union bpf_attr *, union bpf_attr *);
+};
+
+struct bpf_prog_offload {
+ struct bpf_prog *prog;
+ struct net_device *netdev;
+ struct bpf_offload_dev *offdev;
+ void *dev_priv;
+ struct list_head offloads;
+ bool dev_state;
+ bool opt_failed;
+ void *jited_image;
+ u32 jited_len;
+};
+
+enum bpf_cgroup_storage_type {
+ BPF_CGROUP_STORAGE_SHARED = 0,
+ BPF_CGROUP_STORAGE_PERCPU = 1,
+ __BPF_CGROUP_STORAGE_MAX = 2,
+};
+
+struct btf_func_model {
+ u8 ret_size;
+ u8 nr_args;
+ u8 arg_size[12];
+ u8 arg_flags[12];
+};
+
+struct bpf_tramp_image {
+ void *image;
+ struct bpf_ksym ksym;
+ struct percpu_ref pcref;
+ void *ip_after_call;
+ void *ip_epilogue;
+ union {
+ struct callback_head rcu;
+ struct work_struct work;
+ };
+};
+
+struct bpf_trampoline {
+ struct hlist_node hlist;
+ struct ftrace_ops *fops;
+ struct mutex mutex;
+ refcount_t refcnt;
+ u32 flags;
+ u64 key;
+ struct {
+ struct btf_func_model model;
+ void *addr;
+ bool ftrace_managed;
+ } func;
+ struct bpf_prog *extension_prog;
+ struct hlist_head progs_hlist[3];
+ int progs_cnt[3];
+ struct bpf_tramp_image *cur_image;
+ u64 selector;
+ struct module *mod;
+};
+
+struct bpf_func_info_aux {
+ u16 linkage;
+ bool unreliable;
+};
+
+struct bpf_jit_poke_descriptor {
+ void *tailcall_target;
+ void *tailcall_bypass;
+ void *bypass_addr;
+ void *aux;
+ union {
+ struct {
+ struct bpf_map *map;
+ u32 key;
+ } tail_call;
+ };
+ bool tailcall_target_stable;
+ u8 adj_off;
+ u16 reason;
+ u32 insn_idx;
+};
+
+struct bpf_ctx_arg_aux {
+ u32 offset;
+ enum bpf_reg_type reg_type;
+ u32 btf_id;
+};
+
+struct btf_mod_pair {
+ struct btf *btf;
+ struct module *module;
+};
+
+struct bpf_prog_stats {
+ u64_stats_t cnt;
+ u64_stats_t nsecs;
+ u64_stats_t misses;
+ struct u64_stats_sync syncp;
+ long: 64;
+};
+
+struct sock_fprog_kern {
+ u16 len;
+ struct sock_filter *filter;
+};
+
+struct bpf_storage_buffer;
+
+struct bpf_cgroup_storage_map;
+
+struct bpf_cgroup_storage {
+ union {
+ struct bpf_storage_buffer *buf;
+ void *percpu_buf;
+ };
+ struct bpf_cgroup_storage_map *map;
+ struct bpf_cgroup_storage_key key;
+ struct list_head list_map;
+ struct list_head list_cg;
+ struct rb_node node;
+ struct callback_head rcu;
+};
+
+typedef int (*bpf_iter_attach_target_t)(struct bpf_prog *, union bpf_iter_link_info *, struct bpf_iter_aux_info *);
+
+typedef void (*bpf_iter_detach_target_t)(struct bpf_iter_aux_info *);
+
+typedef void (*bpf_iter_show_fdinfo_t)(const struct bpf_iter_aux_info *, struct seq_file *);
+
+typedef int (*bpf_iter_fill_link_info_t)(const struct bpf_iter_aux_info *, struct bpf_link_info *);
+
+typedef const struct bpf_func_proto * (*bpf_iter_get_func_proto_t)(enum bpf_func_id, const struct bpf_prog *);
+
+struct bpf_iter_reg {
+ const char *target;
+ bpf_iter_attach_target_t attach_target;
+ bpf_iter_detach_target_t detach_target;
+ bpf_iter_show_fdinfo_t show_fdinfo;
+ bpf_iter_fill_link_info_t fill_link_info;
+ bpf_iter_get_func_proto_t get_func_proto;
+ u32 ctx_arg_info_size;
+ u32 feature;
+ struct bpf_ctx_arg_aux ctx_arg_info[2];
+ const struct bpf_iter_seq_info *seq_info;
+};
+
+struct bpf_iter_meta {
+ union {
+ struct seq_file *seq;
+ };
+ u64 session_id;
+ u64 seq_num;
+};
+
+struct gnet_dump {
+ spinlock_t *lock;
+ struct sk_buff *skb;
+ struct nlattr *tail;
+ int compat_tc_stats;
+ int compat_xstats;
+ int padattr;
+ void *xstats;
+ int xstats_len;
+ struct tc_stats tc_stats;
+};
+
+struct flow_block {
+ struct list_head cb_list;
+};
+
+typedef int flow_setup_cb_t(enum tc_setup_type, void *, void *);
+
+struct qdisc_size_table {
+ struct callback_head rcu;
+ struct list_head list;
+ struct tc_sizespec szopts;
+ int refcnt;
+ u16 data[0];
+};
+
+struct Qdisc_class_ops;
+
+struct Qdisc_ops {
+ struct Qdisc_ops *next;
+ const struct Qdisc_class_ops *cl_ops;
+ char id[16];
+ int priv_size;
+ unsigned int static_flags;
+ int (*enqueue)(struct sk_buff *, struct Qdisc *, struct sk_buff **);
+ struct sk_buff * (*dequeue)(struct Qdisc *);
+ struct sk_buff * (*peek)(struct Qdisc *);
+ int (*init)(struct Qdisc *, struct nlattr *, struct netlink_ext_ack *);
+ void (*reset)(struct Qdisc *);
+ void (*destroy)(struct Qdisc *);
+ int (*change)(struct Qdisc *, struct nlattr *, struct netlink_ext_ack *);
+ void (*attach)(struct Qdisc *);
+ int (*change_tx_queue_len)(struct Qdisc *, unsigned int);
+ void (*change_real_num_tx)(struct Qdisc *, unsigned int);
+ int (*dump)(struct Qdisc *, struct sk_buff *);
+ int (*dump_stats)(struct Qdisc *, struct gnet_dump *);
+ void (*ingress_block_set)(struct Qdisc *, u32);
+ void (*egress_block_set)(struct Qdisc *, u32);
+ u32 (*ingress_block_get)(struct Qdisc *);
+ u32 (*egress_block_get)(struct Qdisc *);
+ struct module *owner;
+};
+
+struct qdisc_walker;
+
+struct Qdisc_class_ops {
+ unsigned int flags;
+ struct netdev_queue * (*select_queue)(struct Qdisc *, struct tcmsg *);
+ int (*graft)(struct Qdisc *, long unsigned int, struct Qdisc *, struct Qdisc **, struct netlink_ext_ack *);
+ struct Qdisc * (*leaf)(struct Qdisc *, long unsigned int);
+ void (*qlen_notify)(struct Qdisc *, long unsigned int);
+ long unsigned int (*find)(struct Qdisc *, u32);
+ int (*change)(struct Qdisc *, u32, u32, struct nlattr **, long unsigned int *, struct netlink_ext_ack *);
+ int (*delete)(struct Qdisc *, long unsigned int, struct netlink_ext_ack *);
+ void (*walk)(struct Qdisc *, struct qdisc_walker *);
+ struct tcf_block * (*tcf_block)(struct Qdisc *, long unsigned int, struct netlink_ext_ack *);
+ long unsigned int (*bind_tcf)(struct Qdisc *, long unsigned int, u32);
+ void (*unbind_tcf)(struct Qdisc *, long unsigned int);
+ int (*dump)(struct Qdisc *, long unsigned int, struct sk_buff *, struct tcmsg *);
+ int (*dump_stats)(struct Qdisc *, long unsigned int, struct gnet_dump *);
+};
+
+struct tcf_chain;
+
+struct tcf_block {
+ struct mutex lock;
+ struct list_head chain_list;
+ u32 index;
+ u32 classid;
+ refcount_t refcnt;
+ struct net *net;
+ struct Qdisc *q;
+ struct rw_semaphore cb_lock;
+ struct flow_block flow_block;
+ struct list_head owner_list;
+ bool keep_dst;
+ atomic_t offloadcnt;
+ unsigned int nooffloaddevcnt;
+ unsigned int lockeddevcnt;
+ struct {
+ struct tcf_chain *chain;
+ struct list_head filter_chain_list;
+ } chain0;
+ struct callback_head rcu;
+ struct hlist_head proto_destroy_ht[128];
+ struct mutex proto_destroy_lock;
+};
+
+struct tcf_result;
+
+struct tcf_proto_ops;
+
+struct tcf_proto {
+ struct tcf_proto *next;
+ void *root;
+ int (*classify)(struct sk_buff *, const struct tcf_proto *, struct tcf_result *);
+ __be16 protocol;
+ u32 prio;
+ void *data;
+ const struct tcf_proto_ops *ops;
+ struct tcf_chain *chain;
+ spinlock_t lock;
+ bool deleting;
+ refcount_t refcnt;
+ struct callback_head rcu;
+ struct hlist_node destroy_ht_node;
+};
+
+struct tcf_result {
+ union {
+ struct {
+ long unsigned int class;
+ u32 classid;
+ };
+ const struct tcf_proto *goto_tp;
+ };
+};
+
+struct tcf_walker;
+
+struct tcf_proto_ops {
+ struct list_head head;
+ char kind[16];
+ int (*classify)(struct sk_buff *, const struct tcf_proto *, struct tcf_result *);
+ int (*init)(struct tcf_proto *);
+ void (*destroy)(struct tcf_proto *, bool, struct netlink_ext_ack *);
+ void * (*get)(struct tcf_proto *, u32);
+ void (*put)(struct tcf_proto *, void *);
+ int (*change)(struct net *, struct sk_buff *, struct tcf_proto *, long unsigned int, u32, struct nlattr **, void **, u32, struct netlink_ext_ack *);
+ int (*delete)(struct tcf_proto *, void *, bool *, bool, struct netlink_ext_ack *);
+ bool (*delete_empty)(struct tcf_proto *);
+ void (*walk)(struct tcf_proto *, struct tcf_walker *, bool);
+ int (*reoffload)(struct tcf_proto *, bool, flow_setup_cb_t *, void *, struct netlink_ext_ack *);
+ void (*hw_add)(struct tcf_proto *, void *);
+ void (*hw_del)(struct tcf_proto *, void *);
+ void (*bind_class)(void *, u32, long unsigned int, void *, long unsigned int);
+ void * (*tmplt_create)(struct net *, struct tcf_chain *, struct nlattr **, struct netlink_ext_ack *);
+ void (*tmplt_destroy)(void *);
+ int (*dump)(struct net *, struct tcf_proto *, void *, struct sk_buff *, struct tcmsg *, bool);
+ int (*terse_dump)(struct net *, struct tcf_proto *, void *, struct sk_buff *, struct tcmsg *, bool);
+ int (*tmplt_dump)(struct sk_buff *, struct net *, void *);
+ struct module *owner;
+ int flags;
+};
+
+struct tcf_chain {
+ struct mutex filter_chain_lock;
+ struct tcf_proto *filter_chain;
+ struct list_head list;
+ struct tcf_block *block;
+ u32 index;
+ unsigned int refcnt;
+ unsigned int action_refcnt;
+ bool explicitly_created;
+ bool flushing;
+ const struct tcf_proto_ops *tmplt_ops;
+ void *tmplt_priv;
+ struct callback_head rcu;
+};
+
+struct bpf_sock_ops_kern {
+ struct sock *sk;
+ union {
+ u32 args[4];
+ u32 reply;
+ u32 replylong[4];
+ };
+ struct sk_buff *syn_skb;
+ struct sk_buff *skb;
+ void *skb_data_end;
+ u8 op;
+ u8 is_fullsock;
+ u8 remaining_opt_len;
+ u64 temp;
+};
+
+enum {
+ INET_ECN_NOT_ECT = 0,
+ INET_ECN_ECT_1 = 1,
+ INET_ECN_ECT_0 = 2,
+ INET_ECN_CE = 3,
+ INET_ECN_MASK = 3,
+};
+
+struct bpf_storage_buffer {
+ struct callback_head rcu;
+ char data[0];
+};
+
+enum tcp_tw_status {
+ TCP_TW_SUCCESS = 0,
+ TCP_TW_RST = 1,
+ TCP_TW_ACK = 2,
+ TCP_TW_SYN = 3,
+};
+
+struct tcp_skb_cb {
+ __u32 seq;
+ __u32 end_seq;
+ union {
+ __u32 tcp_tw_isn;
+ struct {
+ u16 tcp_gso_segs;
+ u16 tcp_gso_size;
+ };
+ };
+ __u8 tcp_flags;
+ __u8 sacked;
+ __u8 ip_dsfield;
+ __u8 txstamp_ack: 1;
+ __u8 eor: 1;
+ __u8 has_rxtstamp: 1;
+ __u8 unused: 5;
+ __u32 ack_seq;
+ union {
+ struct {
+ __u32 is_app_limited: 1;
+ __u32 delivered_ce: 20;
+ __u32 unused: 11;
+ __u32 delivered;
+ u64 first_tx_mstamp;
+ u64 delivered_mstamp;
+ } tx;
+ union {
+ struct inet_skb_parm h4;
+ struct inet6_skb_parm h6;
+ } header;
+ };
+};
+
+struct ack_sample {
+ u32 pkts_acked;
+ s32 rtt_us;
+ u32 in_flight;
+};
+
+struct rate_sample {
+ u64 prior_mstamp;
+ u32 prior_delivered;
+ u32 prior_delivered_ce;
+ s32 delivered;
+ s32 delivered_ce;
+ long int interval_us;
+ u32 snd_interval_us;
+ u32 rcv_interval_us;
+ long int rtt_us;
+ int losses;
+ u32 acked_sacked;
+ u32 prior_in_flight;
+ u32 last_end_seq;
+ bool is_app_limited;
+ bool is_retrans;
+ bool is_ack_delayed;
+};
+
+struct tcp4_pseudohdr {
+ __be32 saddr;
+ __be32 daddr;
+ __u8 pad;
+ __u8 protocol;
+ __be16 len;
+};
+
+struct ahash_request;
+
+struct tcp_md5sig_pool {
+ struct ahash_request *md5_req;
+ void *scratch;
+};
+
+struct crypto_async_request;
+
+typedef void (*crypto_completion_t)(struct crypto_async_request *, int);
+
+struct crypto_async_request {
+ struct list_head list;
+ crypto_completion_t complete;
+ void *data;
+ struct crypto_tfm *tfm;
+ u32 flags;
+};
+
+struct ahash_request {
+ struct crypto_async_request base;
+ unsigned int nbytes;
+ struct scatterlist *src;
+ u8 *result;
+ void *priv;
+ void *__ctx[0];
+};
+
+enum tcp_seq_states {
+ TCP_SEQ_STATE_LISTENING = 0,
+ TCP_SEQ_STATE_ESTABLISHED = 1,
+};
+
+struct tcp_seq_afinfo {
+ sa_family_t family;
+};
+
+struct tcp_iter_state {
+ struct seq_net_private p;
+ enum tcp_seq_states state;
+ struct sock *syn_wait_sk;
+ int bucket;
+ int offset;
+ int sbucket;
+ int num;
+ loff_t last_pos;
+};
+
+enum audit_ntp_type {
+ AUDIT_NTP_OFFSET = 0,
+ AUDIT_NTP_FREQ = 1,
+ AUDIT_NTP_STATUS = 2,
+ AUDIT_NTP_TAI = 3,
+ AUDIT_NTP_TICK = 4,
+ AUDIT_NTP_ADJUST = 5,
+ AUDIT_NTP_NVALS = 6,
+};
+
+struct xfrm_type {
+ struct module *owner;
+ u8 proto;
+ u8 flags;
+ int (*init_state)(struct xfrm_state *, struct netlink_ext_ack *);
+ void (*destructor)(struct xfrm_state *);
+ int (*input)(struct xfrm_state *, struct sk_buff *);
+ int (*output)(struct xfrm_state *, struct sk_buff *);
+ int (*reject)(struct xfrm_state *, struct sk_buff *, const struct flowi *);
+};
+
+struct xfrm_type_offload {
+ struct module *owner;
+ u8 proto;
+ void (*encap)(struct xfrm_state *, struct sk_buff *);
+ int (*input_tail)(struct xfrm_state *, struct sk_buff *);
+ int (*xmit)(struct xfrm_state *, struct sk_buff *, netdev_features_t);
+};
+
+struct in_ifaddr {
+ struct hlist_node hash;
+ struct in_ifaddr *ifa_next;
+ struct in_device *ifa_dev;
+ struct callback_head callback_head;
+ __be32 ifa_local;
+ __be32 ifa_address;
+ __be32 ifa_mask;
+ __u32 ifa_rt_priority;
+ __be32 ifa_broadcast;
+ unsigned char ifa_scope;
+ unsigned char ifa_prefixlen;
+ unsigned char ifa_proto;
+ __u32 ifa_flags;
+ char ifa_label[16];
+ __u32 ifa_valid_lft;
+ __u32 ifa_preferred_lft;
+ long unsigned int ifa_cstamp;
+ long unsigned int ifa_tstamp;
+};
+
+struct crypto_ahash {
+ int (*init)(struct ahash_request *);
+ int (*update)(struct ahash_request *);
+ int (*final)(struct ahash_request *);
+ int (*finup)(struct ahash_request *);
+ int (*digest)(struct ahash_request *);
+ int (*export)(struct ahash_request *, void *);
+ int (*import)(struct ahash_request *, const void *);
+ int (*setkey)(struct crypto_ahash *, const u8 *, unsigned int);
+ unsigned int reqsize;
+ struct crypto_tfm base;
+};
+
+struct bpf_tcp_iter_state {
+ struct tcp_iter_state state;
+ unsigned int cur_sk;
+ unsigned int end_sk;
+ unsigned int max_sk;
+ struct sock **batch;
+ bool st_bucket_done;
+};
+
+struct bpf_iter__tcp {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct sock_common *sk_common;
+ };
+ uid_t uid;
+};
+
+struct x86_guest {
+ void (*enc_status_change_prepare)(long unsigned int, int, bool);
+ bool (*enc_status_change_finish)(long unsigned int, int, bool);
+ bool (*enc_tlb_flush_required)(bool);
+ bool (*enc_cache_flush_required)();
+};
+
+struct x86_legacy_devices {
+ int pnpbios;
+};
+
+enum x86_legacy_i8042_state {
+ X86_LEGACY_I8042_PLATFORM_ABSENT = 0,
+ X86_LEGACY_I8042_FIRMWARE_ABSENT = 1,
+ X86_LEGACY_I8042_EXPECTED_PRESENT = 2,
+};
+
+struct x86_legacy_features {
+ enum x86_legacy_i8042_state i8042;
+ int rtc;
+ int warm_reset;
+ int no_vga;
+ int reserve_bios_regions;
+ struct x86_legacy_devices devices;
+};
+
+struct ghcb;
+
+struct x86_hyper_runtime {
+ void (*pin_vcpu)(int);
+ void (*sev_es_hcall_prepare)(struct ghcb *, struct pt_regs *);
+ bool (*sev_es_hcall_finish)(struct ghcb *, struct pt_regs *);
+};
+
+struct x86_platform_ops {
+ long unsigned int (*calibrate_cpu)();
+ long unsigned int (*calibrate_tsc)();
+ void (*get_wallclock)(struct timespec64 *);
+ int (*set_wallclock)(const struct timespec64 *);
+ void (*iommu_shutdown)();
+ bool (*is_untracked_pat_range)(u64, u64);
+ void (*nmi_init)();
+ unsigned char (*get_nmi_reason)();
+ void (*save_sched_clock_state)();
+ void (*restore_sched_clock_state)();
+ void (*apic_post_init)();
+ struct x86_legacy_features legacy;
+ void (*set_legacy_features)();
+ struct x86_hyper_runtime hyper;
+ struct x86_guest guest;
+};
+
+struct io_bitmap {
+ u64 sequence;
+ refcount_t refcnt;
+ unsigned int max;
+ long unsigned int bitmap[1024];
+};
+
+enum perf_type_id {
+ PERF_TYPE_HARDWARE = 0,
+ PERF_TYPE_SOFTWARE = 1,
+ PERF_TYPE_TRACEPOINT = 2,
+ PERF_TYPE_HW_CACHE = 3,
+ PERF_TYPE_RAW = 4,
+ PERF_TYPE_BREAKPOINT = 5,
+ PERF_TYPE_MAX = 6,
+};
+
+struct user_regset_view {
+ const char *name;
+ const struct user_regset *regsets;
+ unsigned int n;
+ u32 e_flags;
+ u16 e_machine;
+ u8 ei_osabi;
+};
+
+enum x86_regset {
+ REGSET_GENERAL = 0,
+ REGSET_FP = 1,
+ REGSET_XFP = 2,
+ REGSET_IOPERM64 = 2,
+ REGSET_XSTATE = 3,
+ REGSET_TLS = 4,
+ REGSET_IOPERM32 = 5,
+};
+
+struct pt_regs_offset {
+ const char *name;
+ int offset;
+};
+
+enum bpf_link_type {
+ BPF_LINK_TYPE_UNSPEC = 0,
+ BPF_LINK_TYPE_RAW_TRACEPOINT = 1,
+ BPF_LINK_TYPE_TRACING = 2,
+ BPF_LINK_TYPE_CGROUP = 3,
+ BPF_LINK_TYPE_ITER = 4,
+ BPF_LINK_TYPE_NETNS = 5,
+ BPF_LINK_TYPE_XDP = 6,
+ BPF_LINK_TYPE_PERF_EVENT = 7,
+ BPF_LINK_TYPE_KPROBE_MULTI = 8,
+ BPF_LINK_TYPE_STRUCT_OPS = 9,
+ MAX_BPF_LINK_TYPE = 10,
+};
+
+struct bpf_link_ops;
+
+struct bpf_link {
+ atomic64_t refcnt;
+ u32 id;
+ enum bpf_link_type type;
+ const struct bpf_link_ops *ops;
+ struct bpf_prog *prog;
+ struct work_struct work;
+};
+
+struct bpf_link_ops {
+ void (*release)(struct bpf_link *);
+ void (*dealloc)(struct bpf_link *);
+ int (*detach)(struct bpf_link *);
+ int (*update_prog)(struct bpf_link *, struct bpf_prog *, struct bpf_prog *);
+ void (*show_fdinfo)(const struct bpf_link *, struct seq_file *);
+ int (*fill_link_info)(const struct bpf_link *, struct bpf_link_info *);
+};
+
+struct bpf_link_primer {
+ struct bpf_link *link;
+ struct file *file;
+ int fd;
+ u32 id;
+};
+
+struct bpf_netns_link {
+ struct bpf_link link;
+ enum bpf_attach_type type;
+ enum netns_bpf_attach_type netns_type;
+ struct net *net;
+ struct list_head node;
+};
+
+struct fs_struct {
+ int users;
+ spinlock_t lock;
+ seqcount_spinlock_t seq;
+ int umask;
+ int in_exec;
+ struct path root;
+ struct path pwd;
+};
+
+struct mount;
+
+struct mnt_namespace {
+ struct ns_common ns;
+ struct mount *root;
+ struct list_head list;
+ spinlock_t ns_lock;
+ struct user_namespace *user_ns;
+ struct ucounts *ucounts;
+ u64 seq;
+ wait_queue_head_t poll;
+ u64 event;
+ unsigned int mounts;
+ unsigned int pending_mounts;
+};
+
+typedef struct poll_table_struct poll_table;
+
+struct mnt_pcp;
+
+struct mountpoint;
+
+struct mount {
+ struct hlist_node mnt_hash;
+ struct mount *mnt_parent;
+ struct dentry *mnt_mountpoint;
+ struct vfsmount mnt;
+ union {
+ struct callback_head mnt_rcu;
+ struct llist_node mnt_llist;
+ };
+ struct mnt_pcp *mnt_pcp;
+ struct list_head mnt_mounts;
+ struct list_head mnt_child;
+ struct list_head mnt_instance;
+ const char *mnt_devname;
+ struct list_head mnt_list;
+ struct list_head mnt_expire;
+ struct list_head mnt_share;
+ struct list_head mnt_slave_list;
+ struct list_head mnt_slave;
+ struct mount *mnt_master;
+ struct mnt_namespace *mnt_ns;
+ struct mountpoint *mnt_mp;
+ union {
+ struct hlist_node mnt_mp_list;
+ struct hlist_node mnt_umount;
+ };
+ struct list_head mnt_umounting;
+ struct fsnotify_mark_connector *mnt_fsnotify_marks;
+ __u32 mnt_fsnotify_mask;
+ int mnt_id;
+ int mnt_group_id;
+ int mnt_expiry_mark;
+ struct hlist_head mnt_pins;
+ struct hlist_head mnt_stuck_children;
+};
+
+struct mnt_pcp {
+ int mnt_count;
+ int mnt_writers;
+};
+
+struct mountpoint {
+ struct hlist_node m_hash;
+ struct dentry *m_dentry;
+ struct hlist_head m_list;
+ int m_count;
+};
+
+struct proc_mounts {
+ struct mnt_namespace *ns;
+ struct path root;
+ int (*show)(struct seq_file *, struct vfsmount *);
+ struct mount cursor;
+};
+
+struct proc_fs_opts {
+ int flag;
+ const char *str;
+};
+
+struct vm_event_state {
+ long unsigned int event[107];
+};
+
+enum {
+ PROC_ENTRY_PERMANENT = 1,
+};
+
+typedef int __kernel_rwf_t;
+
+struct posix_acl_entry {
+ short int e_tag;
+ short unsigned int e_perm;
+ union {
+ kuid_t e_uid;
+ kgid_t e_gid;
+ };
+};
+
+struct posix_acl {
+ refcount_t a_refcount;
+ struct callback_head a_rcu;
+ unsigned int a_count;
+ struct posix_acl_entry a_entries[0];
+};
+
+struct iomap_page_ops;
+
+struct iomap {
+ u64 addr;
+ loff_t offset;
+ u64 length;
+ u16 type;
+ u16 flags;
+ struct block_device *bdev;
+ struct dax_device *dax_dev;
+ void *inline_data;
+ void *private;
+ const struct iomap_page_ops *page_ops;
+};
+
+struct iomap_page_ops {
+ int (*page_prepare)(struct inode *, loff_t, unsigned int);
+ void (*page_done)(struct inode *, loff_t, unsigned int, struct page *);
+};
+
+struct iomap_ops {
+ int (*iomap_begin)(struct inode *, loff_t, loff_t, unsigned int, struct iomap *, struct iomap *);
+ int (*iomap_end)(struct inode *, loff_t, loff_t, ssize_t, unsigned int, struct iomap *);
+};
+
+struct iomap_iter {
+ struct inode *inode;
+ loff_t pos;
+ u64 len;
+ s64 processed;
+ unsigned int flags;
+ struct iomap iomap;
+ struct iomap srcmap;
+ void *private;
+};
+
+struct iomap_dio_ops {
+ int (*end_io)(struct kiocb *, ssize_t, int, unsigned int);
+ void (*submit_io)(const struct iomap_iter *, struct bio *, loff_t);
+ struct bio_set *bio_set;
+};
+
+enum ext4_journal_trigger_type {
+ EXT4_JTR_ORPHAN_FILE = 0,
+ EXT4_JTR_NONE = 1,
+};
+
+struct fname;
+
+struct dir_private_info {
+ struct rb_root root;
+ struct rb_node *curr_node;
+ struct fname *extra_fname;
+ loff_t last_pos;
+ __u32 curr_hash;
+ __u32 curr_minor_hash;
+ __u32 next_hash;
+};
+
+typedef int __kernel_key_t;
+
+typedef unsigned int __kernel_mode_t;
+
+typedef int __kernel_ipc_pid_t;
+
+typedef unsigned int __kernel_uid_t;
+
+typedef unsigned int __kernel_gid_t;
+
+typedef __kernel_long_t __kernel_old_time_t;
+
+typedef __kernel_key_t key_t;
+
+typedef long unsigned int ulong;
+
+struct maple_alloc {
+ long unsigned int total;
+ unsigned char node_count;
+ unsigned int request_count;
+ struct maple_alloc *slot[30];
+};
+
+struct maple_enode;
+
+struct ma_state {
+ struct maple_tree *tree;
+ long unsigned int index;
+ long unsigned int last;
+ struct maple_enode *node;
+ long unsigned int min;
+ long unsigned int max;
+ struct maple_alloc *alloc;
+ unsigned char depth;
+ unsigned char offset;
+ unsigned char mas_flags;
+};
+
+typedef long unsigned int vm_flags_t;
+
+struct mempolicy {
+ atomic_t refcnt;
+ short unsigned int mode;
+ short unsigned int flags;
+ nodemask_t nodes;
+ int home_node;
+ union {
+ nodemask_t cpuset_mems_allowed;
+ nodemask_t user_nodemask;
+ } w;
+};
+
+struct vma_iterator {
+ struct ma_state mas;
+};
+
+struct rhash_lock_head;
+
+struct bucket_table {
+ unsigned int size;
+ unsigned int nest;
+ u32 hash_rnd;
+ struct list_head walkers;
+ struct callback_head rcu;
+ struct bucket_table *future_tbl;
+ struct lockdep_map dep_map;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct rhash_lock_head *buckets[0];
+};
+
+struct ipc_perm {
+ __kernel_key_t key;
+ __kernel_uid_t uid;
+ __kernel_gid_t gid;
+ __kernel_uid_t cuid;
+ __kernel_gid_t cgid;
+ __kernel_mode_t mode;
+ short unsigned int seq;
+};
+
+struct ipc64_perm {
+ __kernel_key_t key;
+ __kernel_uid32_t uid;
+ __kernel_gid32_t gid;
+ __kernel_uid32_t cuid;
+ __kernel_gid32_t cgid;
+ __kernel_mode_t mode;
+ unsigned char __pad1[0];
+ short unsigned int seq;
+ short unsigned int __pad2;
+ __kernel_ulong_t __unused1;
+ __kernel_ulong_t __unused2;
+};
+
+struct kern_ipc_perm {
+ spinlock_t lock;
+ bool deleted;
+ int id;
+ key_t key;
+ kuid_t uid;
+ kgid_t gid;
+ kuid_t cuid;
+ kgid_t cgid;
+ umode_t mode;
+ long unsigned int seq;
+ void *security;
+ struct rhash_head khtnode;
+ struct callback_head rcu;
+ refcount_t refcount;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct shmid_ds {
+ struct ipc_perm shm_perm;
+ int shm_segsz;
+ __kernel_old_time_t shm_atime;
+ __kernel_old_time_t shm_dtime;
+ __kernel_old_time_t shm_ctime;
+ __kernel_ipc_pid_t shm_cpid;
+ __kernel_ipc_pid_t shm_lpid;
+ short unsigned int shm_nattch;
+ short unsigned int shm_unused;
+ void *shm_unused2;
+ void *shm_unused3;
+};
+
+struct shmid64_ds {
+ struct ipc64_perm shm_perm;
+ __kernel_size_t shm_segsz;
+ long int shm_atime;
+ long int shm_dtime;
+ long int shm_ctime;
+ __kernel_pid_t shm_cpid;
+ __kernel_pid_t shm_lpid;
+ long unsigned int shm_nattch;
+ long unsigned int __unused4;
+ long unsigned int __unused5;
+};
+
+struct shminfo64 {
+ long unsigned int shmmax;
+ long unsigned int shmmin;
+ long unsigned int shmmni;
+ long unsigned int shmseg;
+ long unsigned int shmall;
+ long unsigned int __unused1;
+ long unsigned int __unused2;
+ long unsigned int __unused3;
+ long unsigned int __unused4;
+};
+
+struct shminfo {
+ int shmmax;
+ int shmmin;
+ int shmmni;
+ int shmseg;
+ int shmall;
+};
+
+struct shm_info {
+ int used_ids;
+ __kernel_ulong_t shm_tot;
+ __kernel_ulong_t shm_rss;
+ __kernel_ulong_t shm_swp;
+ __kernel_ulong_t swap_attempts;
+ __kernel_ulong_t swap_successes;
+};
+
+enum {
+ EI_ETYPE_NONE = 0,
+ EI_ETYPE_NULL = 1,
+ EI_ETYPE_ERRNO = 2,
+ EI_ETYPE_ERRNO_NULL = 3,
+ EI_ETYPE_TRUE = 4,
+};
+
+struct shared_policy {
+ struct rb_root root;
+ rwlock_t lock;
+};
+
+struct hstate;
+
+struct hugepage_subpool {
+ spinlock_t lock;
+ long int count;
+ long int max_hpages;
+ long int used_hpages;
+ struct hstate *hstate;
+ long int min_hpages;
+ long int rsv_hpages;
+};
+
+struct hstate {
+ struct mutex resize_lock;
+ int next_nid_to_alloc;
+ int next_nid_to_free;
+ unsigned int order;
+ unsigned int demote_order;
+ long unsigned int mask;
+ long unsigned int max_huge_pages;
+ long unsigned int nr_huge_pages;
+ long unsigned int free_huge_pages;
+ long unsigned int resv_huge_pages;
+ long unsigned int surplus_huge_pages;
+ long unsigned int nr_overcommit_huge_pages;
+ struct list_head hugepage_activelist;
+ struct list_head hugepage_freelists[64];
+ unsigned int max_huge_pages_node[64];
+ unsigned int nr_huge_pages_node[64];
+ unsigned int free_huge_pages_node[64];
+ unsigned int surplus_huge_pages_node[64];
+ struct cftype cgroup_files_dfl[8];
+ struct cftype cgroup_files_legacy[10];
+ char name[32];
+};
+
+enum {
+ HUGETLB_SHMFS_INODE = 1,
+ HUGETLB_ANONHUGE_INODE = 2,
+};
+
+struct hugetlbfs_sb_info {
+ long int max_inodes;
+ long int free_inodes;
+ spinlock_t stat_lock;
+ struct hstate *hstate;
+ struct hugepage_subpool *spool;
+ kuid_t uid;
+ kgid_t gid;
+ umode_t mode;
+};
+
+struct simple_xattrs {
+ struct list_head head;
+ spinlock_t lock;
+};
+
+struct fs_parse_result {
+ bool negated;
+ union {
+ bool boolean;
+ int int_32;
+ unsigned int uint_32;
+ u64 uint_64;
+ };
+};
+
+struct shmem_inode_info {
+ spinlock_t lock;
+ unsigned int seals;
+ long unsigned int flags;
+ long unsigned int alloced;
+ long unsigned int swapped;
+ long unsigned int fallocend;
+ struct list_head shrinklist;
+ struct list_head swaplist;
+ struct shared_policy policy;
+ struct simple_xattrs xattrs;
+ atomic_t stop_eviction;
+ struct timespec64 i_crtime;
+ unsigned int fsflags;
+ struct inode vfs_inode;
+};
+
+struct syscall_metadata {
+ const char *name;
+ int syscall_nr;
+ int nb_args;
+ const char **types;
+ const char **args;
+ struct list_head enter_fields;
+ struct trace_event_call *enter_event;
+ struct trace_event_call *exit_event;
+};
+
+struct rhash_lock_head {};
+
+struct ipc_params {
+ key_t key;
+ int flg;
+ union {
+ size_t size;
+ int nsems;
+ } u;
+};
+
+struct ipc_ops {
+ int (*getnew)(struct ipc_namespace *, struct ipc_params *);
+ int (*associate)(struct kern_ipc_perm *, int);
+ int (*more_checks)(struct kern_ipc_perm *, struct ipc_params *);
+};
+
+struct shmid_kernel {
+ struct kern_ipc_perm shm_perm;
+ struct file *shm_file;
+ long unsigned int shm_nattch;
+ long unsigned int shm_segsz;
+ time64_t shm_atim;
+ time64_t shm_dtim;
+ time64_t shm_ctim;
+ struct pid *shm_cprid;
+ struct pid *shm_lprid;
+ struct ucounts *mlock_ucounts;
+ struct task_struct *shm_creator;
+ struct list_head shm_clist;
+ struct ipc_namespace *ns;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct shm_file_data {
+ int id;
+ struct ipc_namespace *ns;
+ struct file *file;
+ const struct vm_operations_struct *vm_ops;
+};
+
+typedef long unsigned int mpi_limb_t;
+
+typedef mpi_limb_t *mpi_ptr_t;
+
+typedef int mpi_size_t;
+
+typedef mpi_limb_t UWtype;
+
+typedef unsigned int UHWtype;
+
+struct gcry_mpi {
+ int alloced;
+ int nlimbs;
+ int nbits;
+ int sign;
+ unsigned int flags;
+ mpi_limb_t *d;
+};
+
+typedef struct gcry_mpi *MPI;
+
+struct karatsuba_ctx {
+ struct karatsuba_ctx *next;
+ mpi_ptr_t tspace;
+ mpi_size_t tspace_size;
+ mpi_ptr_t tp;
+ mpi_size_t tp_size;
+};
+
+struct softirq_action {
+ void (*action)(struct softirq_action *);
+};
+
+enum cpuhp_state {
+ CPUHP_INVALID = -1,
+ CPUHP_OFFLINE = 0,
+ CPUHP_CREATE_THREADS = 1,
+ CPUHP_PERF_PREPARE = 2,
+ CPUHP_PERF_X86_PREPARE = 3,
+ CPUHP_PERF_X86_AMD_UNCORE_PREP = 4,
+ CPUHP_PERF_POWER = 5,
+ CPUHP_PERF_SUPERH = 6,
+ CPUHP_X86_HPET_DEAD = 7,
+ CPUHP_X86_APB_DEAD = 8,
+ CPUHP_X86_MCE_DEAD = 9,
+ CPUHP_VIRT_NET_DEAD = 10,
+ CPUHP_IBMVNIC_DEAD = 11,
+ CPUHP_SLUB_DEAD = 12,
+ CPUHP_DEBUG_OBJ_DEAD = 13,
+ CPUHP_MM_WRITEBACK_DEAD = 14,
+ CPUHP_MM_DEMOTION_DEAD = 15,
+ CPUHP_MM_VMSTAT_DEAD = 16,
+ CPUHP_SOFTIRQ_DEAD = 17,
+ CPUHP_NET_MVNETA_DEAD = 18,
+ CPUHP_CPUIDLE_DEAD = 19,
+ CPUHP_ARM64_FPSIMD_DEAD = 20,
+ CPUHP_ARM_OMAP_WAKE_DEAD = 21,
+ CPUHP_IRQ_POLL_DEAD = 22,
+ CPUHP_BLOCK_SOFTIRQ_DEAD = 23,
+ CPUHP_BIO_DEAD = 24,
+ CPUHP_ACPI_CPUDRV_DEAD = 25,
+ CPUHP_S390_PFAULT_DEAD = 26,
+ CPUHP_BLK_MQ_DEAD = 27,
+ CPUHP_FS_BUFF_DEAD = 28,
+ CPUHP_PRINTK_DEAD = 29,
+ CPUHP_MM_MEMCQ_DEAD = 30,
+ CPUHP_XFS_DEAD = 31,
+ CPUHP_PERCPU_CNT_DEAD = 32,
+ CPUHP_RADIX_DEAD = 33,
+ CPUHP_PAGE_ALLOC = 34,
+ CPUHP_NET_DEV_DEAD = 35,
+ CPUHP_PCI_XGENE_DEAD = 36,
+ CPUHP_IOMMU_IOVA_DEAD = 37,
+ CPUHP_LUSTRE_CFS_DEAD = 38,
+ CPUHP_AP_ARM_CACHE_B15_RAC_DEAD = 39,
+ CPUHP_PADATA_DEAD = 40,
+ CPUHP_AP_DTPM_CPU_DEAD = 41,
+ CPUHP_RANDOM_PREPARE = 42,
+ CPUHP_WORKQUEUE_PREP = 43,
+ CPUHP_POWER_NUMA_PREPARE = 44,
+ CPUHP_HRTIMERS_PREPARE = 45,
+ CPUHP_PROFILE_PREPARE = 46,
+ CPUHP_X2APIC_PREPARE = 47,
+ CPUHP_SMPCFD_PREPARE = 48,
+ CPUHP_RELAY_PREPARE = 49,
+ CPUHP_SLAB_PREPARE = 50,
+ CPUHP_MD_RAID5_PREPARE = 51,
+ CPUHP_RCUTREE_PREP = 52,
+ CPUHP_CPUIDLE_COUPLED_PREPARE = 53,
+ CPUHP_POWERPC_PMAC_PREPARE = 54,
+ CPUHP_POWERPC_MMU_CTX_PREPARE = 55,
+ CPUHP_XEN_PREPARE = 56,
+ CPUHP_XEN_EVTCHN_PREPARE = 57,
+ CPUHP_ARM_SHMOBILE_SCU_PREPARE = 58,
+ CPUHP_SH_SH3X_PREPARE = 59,
+ CPUHP_NET_FLOW_PREPARE = 60,
+ CPUHP_TOPOLOGY_PREPARE = 61,
+ CPUHP_NET_IUCV_PREPARE = 62,
+ CPUHP_ARM_BL_PREPARE = 63,
+ CPUHP_TRACE_RB_PREPARE = 64,
+ CPUHP_MM_ZS_PREPARE = 65,
+ CPUHP_MM_ZSWP_MEM_PREPARE = 66,
+ CPUHP_MM_ZSWP_POOL_PREPARE = 67,
+ CPUHP_KVM_PPC_BOOK3S_PREPARE = 68,
+ CPUHP_ZCOMP_PREPARE = 69,
+ CPUHP_TIMERS_PREPARE = 70,
+ CPUHP_MIPS_SOC_PREPARE = 71,
+ CPUHP_BP_PREPARE_DYN = 72,
+ CPUHP_BP_PREPARE_DYN_END = 92,
+ CPUHP_BRINGUP_CPU = 93,
+ CPUHP_AP_IDLE_DEAD = 94,
+ CPUHP_AP_OFFLINE = 95,
+ CPUHP_AP_SCHED_STARTING = 96,
+ CPUHP_AP_RCUTREE_DYING = 97,
+ CPUHP_AP_CPU_PM_STARTING = 98,
+ CPUHP_AP_IRQ_GIC_STARTING = 99,
+ CPUHP_AP_IRQ_HIP04_STARTING = 100,
+ CPUHP_AP_IRQ_APPLE_AIC_STARTING = 101,
+ CPUHP_AP_IRQ_ARMADA_XP_STARTING = 102,
+ CPUHP_AP_IRQ_BCM2836_STARTING = 103,
+ CPUHP_AP_IRQ_MIPS_GIC_STARTING = 104,
+ CPUHP_AP_IRQ_RISCV_STARTING = 105,
+ CPUHP_AP_IRQ_LOONGARCH_STARTING = 106,
+ CPUHP_AP_IRQ_SIFIVE_PLIC_STARTING = 107,
+ CPUHP_AP_ARM_MVEBU_COHERENCY = 108,
+ CPUHP_AP_MICROCODE_LOADER = 109,
+ CPUHP_AP_PERF_X86_AMD_UNCORE_STARTING = 110,
+ CPUHP_AP_PERF_X86_STARTING = 111,
+ CPUHP_AP_PERF_X86_AMD_IBS_STARTING = 112,
+ CPUHP_AP_PERF_X86_CQM_STARTING = 113,
+ CPUHP_AP_PERF_X86_CSTATE_STARTING = 114,
+ CPUHP_AP_PERF_XTENSA_STARTING = 115,
+ CPUHP_AP_MIPS_OP_LOONGSON3_STARTING = 116,
+ CPUHP_AP_ARM_SDEI_STARTING = 117,
+ CPUHP_AP_ARM_VFP_STARTING = 118,
+ CPUHP_AP_ARM64_DEBUG_MONITORS_STARTING = 119,
+ CPUHP_AP_PERF_ARM_HW_BREAKPOINT_STARTING = 120,
+ CPUHP_AP_PERF_ARM_ACPI_STARTING = 121,
+ CPUHP_AP_PERF_ARM_STARTING = 122,
+ CPUHP_AP_PERF_RISCV_STARTING = 123,
+ CPUHP_AP_ARM_L2X0_STARTING = 124,
+ CPUHP_AP_EXYNOS4_MCT_TIMER_STARTING = 125,
+ CPUHP_AP_ARM_ARCH_TIMER_STARTING = 126,
+ CPUHP_AP_ARM_GLOBAL_TIMER_STARTING = 127,
+ CPUHP_AP_JCORE_TIMER_STARTING = 128,
+ CPUHP_AP_ARM_TWD_STARTING = 129,
+ CPUHP_AP_QCOM_TIMER_STARTING = 130,
+ CPUHP_AP_TEGRA_TIMER_STARTING = 131,
+ CPUHP_AP_ARMADA_TIMER_STARTING = 132,
+ CPUHP_AP_MARCO_TIMER_STARTING = 133,
+ CPUHP_AP_MIPS_GIC_TIMER_STARTING = 134,
+ CPUHP_AP_ARC_TIMER_STARTING = 135,
+ CPUHP_AP_RISCV_TIMER_STARTING = 136,
+ CPUHP_AP_CLINT_TIMER_STARTING = 137,
+ CPUHP_AP_CSKY_TIMER_STARTING = 138,
+ CPUHP_AP_TI_GP_TIMER_STARTING = 139,
+ CPUHP_AP_HYPERV_TIMER_STARTING = 140,
+ CPUHP_AP_KVM_STARTING = 141,
+ CPUHP_AP_KVM_ARM_VGIC_INIT_STARTING = 142,
+ CPUHP_AP_KVM_ARM_VGIC_STARTING = 143,
+ CPUHP_AP_KVM_ARM_TIMER_STARTING = 144,
+ CPUHP_AP_DUMMY_TIMER_STARTING = 145,
+ CPUHP_AP_ARM_XEN_STARTING = 146,
+ CPUHP_AP_ARM_CORESIGHT_STARTING = 147,
+ CPUHP_AP_ARM_CORESIGHT_CTI_STARTING = 148,
+ CPUHP_AP_ARM64_ISNDEP_STARTING = 149,
+ CPUHP_AP_SMPCFD_DYING = 150,
+ CPUHP_AP_X86_TBOOT_DYING = 151,
+ CPUHP_AP_ARM_CACHE_B15_RAC_DYING = 152,
+ CPUHP_AP_ONLINE = 153,
+ CPUHP_TEARDOWN_CPU = 154,
+ CPUHP_AP_ONLINE_IDLE = 155,
+ CPUHP_AP_SCHED_WAIT_EMPTY = 156,
+ CPUHP_AP_SMPBOOT_THREADS = 157,
+ CPUHP_AP_X86_VDSO_VMA_ONLINE = 158,
+ CPUHP_AP_IRQ_AFFINITY_ONLINE = 159,
+ CPUHP_AP_BLK_MQ_ONLINE = 160,
+ CPUHP_AP_ARM_MVEBU_SYNC_CLOCKS = 161,
+ CPUHP_AP_X86_INTEL_EPB_ONLINE = 162,
+ CPUHP_AP_PERF_ONLINE = 163,
+ CPUHP_AP_PERF_X86_ONLINE = 164,
+ CPUHP_AP_PERF_X86_UNCORE_ONLINE = 165,
+ CPUHP_AP_PERF_X86_AMD_UNCORE_ONLINE = 166,
+ CPUHP_AP_PERF_X86_AMD_POWER_ONLINE = 167,
+ CPUHP_AP_PERF_X86_RAPL_ONLINE = 168,
+ CPUHP_AP_PERF_X86_CQM_ONLINE = 169,
+ CPUHP_AP_PERF_X86_CSTATE_ONLINE = 170,
+ CPUHP_AP_PERF_X86_IDXD_ONLINE = 171,
+ CPUHP_AP_PERF_S390_CF_ONLINE = 172,
+ CPUHP_AP_PERF_S390_SF_ONLINE = 173,
+ CPUHP_AP_PERF_ARM_CCI_ONLINE = 174,
+ CPUHP_AP_PERF_ARM_CCN_ONLINE = 175,
+ CPUHP_AP_PERF_ARM_HISI_CPA_ONLINE = 176,
+ CPUHP_AP_PERF_ARM_HISI_DDRC_ONLINE = 177,
+ CPUHP_AP_PERF_ARM_HISI_HHA_ONLINE = 178,
+ CPUHP_AP_PERF_ARM_HISI_L3_ONLINE = 179,
+ CPUHP_AP_PERF_ARM_HISI_PA_ONLINE = 180,
+ CPUHP_AP_PERF_ARM_HISI_SLLC_ONLINE = 181,
+ CPUHP_AP_PERF_ARM_HISI_PCIE_PMU_ONLINE = 182,
+ CPUHP_AP_PERF_ARM_HNS3_PMU_ONLINE = 183,
+ CPUHP_AP_PERF_ARM_L2X0_ONLINE = 184,
+ CPUHP_AP_PERF_ARM_QCOM_L2_ONLINE = 185,
+ CPUHP_AP_PERF_ARM_QCOM_L3_ONLINE = 186,
+ CPUHP_AP_PERF_ARM_APM_XGENE_ONLINE = 187,
+ CPUHP_AP_PERF_ARM_CAVIUM_TX2_UNCORE_ONLINE = 188,
+ CPUHP_AP_PERF_ARM_MARVELL_CN10K_DDR_ONLINE = 189,
+ CPUHP_AP_PERF_POWERPC_NEST_IMC_ONLINE = 190,
+ CPUHP_AP_PERF_POWERPC_CORE_IMC_ONLINE = 191,
+ CPUHP_AP_PERF_POWERPC_THREAD_IMC_ONLINE = 192,
+ CPUHP_AP_PERF_POWERPC_TRACE_IMC_ONLINE = 193,
+ CPUHP_AP_PERF_POWERPC_HV_24x7_ONLINE = 194,
+ CPUHP_AP_PERF_POWERPC_HV_GPCI_ONLINE = 195,
+ CPUHP_AP_PERF_CSKY_ONLINE = 196,
+ CPUHP_AP_WATCHDOG_ONLINE = 197,
+ CPUHP_AP_WORKQUEUE_ONLINE = 198,
+ CPUHP_AP_RANDOM_ONLINE = 199,
+ CPUHP_AP_RCUTREE_ONLINE = 200,
+ CPUHP_AP_BASE_CACHEINFO_ONLINE = 201,
+ CPUHP_AP_ONLINE_DYN = 202,
+ CPUHP_AP_ONLINE_DYN_END = 232,
+ CPUHP_AP_MM_DEMOTION_ONLINE = 233,
+ CPUHP_AP_X86_HPET_ONLINE = 234,
+ CPUHP_AP_X86_KVM_CLK_ONLINE = 235,
+ CPUHP_AP_ACTIVE = 236,
+ CPUHP_ONLINE = 237,
+};
+
+struct irq_poll;
+
+typedef int irq_poll_fn(struct irq_poll *, int);
+
+struct irq_poll {
+ struct list_head list;
+ long unsigned int state;
+ int weight;
+ irq_poll_fn *poll;
+};
+
+enum {
+ IRQ_POLL_F_SCHED = 0,
+ IRQ_POLL_F_DISABLE = 1,
+};
+
+struct __va_list_tag {
+ unsigned int gp_offset;
+ unsigned int fp_offset;
+ void *overflow_arg_area;
+ void *reg_save_area;
+};
+
+typedef __builtin_va_list va_list;
+
+enum irqreturn {
+ IRQ_NONE = 0,
+ IRQ_HANDLED = 1,
+ IRQ_WAKE_THREAD = 2,
+};
+
+typedef enum irqreturn irqreturn_t;
+
+typedef irqreturn_t (*irq_handler_t)(int, void *);
+
+struct obs_kernel_param {
+ const char *str;
+ int (*setup_func)(char *);
+ int early;
+};
+
+struct va_format {
+ const char *fmt;
+ va_list *va;
+};
+
+struct ida {
+ struct xarray xa;
+};
+
+typedef u64 acpi_size;
+
+typedef u64 acpi_io_address;
+
+typedef u32 acpi_status;
+
+typedef char *acpi_string;
+
+typedef u32 acpi_object_type;
+
+union acpi_object {
+ acpi_object_type type;
+ struct {
+ acpi_object_type type;
+ u64 value;
+ } integer;
+ struct {
+ acpi_object_type type;
+ u32 length;
+ char *pointer;
+ } string;
+ struct {
+ acpi_object_type type;
+ u32 length;
+ u8 *pointer;
+ } buffer;
+ struct {
+ acpi_object_type type;
+ u32 count;
+ union acpi_object *elements;
+ } package;
+ struct {
+ acpi_object_type type;
+ acpi_object_type actual_type;
+ acpi_handle handle;
+ } reference;
+ struct {
+ acpi_object_type type;
+ u32 proc_id;
+ acpi_io_address pblk_address;
+ u32 pblk_length;
+ } processor;
+ struct {
+ acpi_object_type type;
+ u32 system_level;
+ u32 resource_order;
+ } power_resource;
+};
+
+struct acpi_object_list {
+ u32 count;
+ union acpi_object *pointer;
+};
+
+struct acpi_buffer {
+ acpi_size length;
+ void *pointer;
+};
+
+struct acpi_table_header {
+ char signature[4];
+ u32 length;
+ u8 revision;
+ u8 checksum;
+ char oem_id[6];
+ char oem_table_id[8];
+ u32 oem_revision;
+ char asl_compiler_id[4];
+ u32 asl_compiler_revision;
+};
+
+struct acpi_pld_info {
+ u8 revision;
+ u8 ignore_color;
+ u8 red;
+ u8 green;
+ u8 blue;
+ u16 width;
+ u16 height;
+ u8 user_visible;
+ u8 dock;
+ u8 lid;
+ u8 panel;
+ u8 vertical_position;
+ u8 horizontal_position;
+ u8 shape;
+ u8 group_orientation;
+ u8 group_token;
+ u8 group_position;
+ u8 bay;
+ u8 ejectable;
+ u8 ospm_eject_required;
+ u8 cabinet_number;
+ u8 card_cage_number;
+ u8 reference;
+ u8 rotation;
+ u8 order;
+ u8 reserved;
+ u16 vertical_offset;
+ u16 horizontal_offset;
+};
+
+struct acpi_handle_list {
+ u32 count;
+ acpi_handle handles[10];
+};
+
+struct acpi_device;
+
+struct acpi_hotplug_profile {
+ struct kobject kobj;
+ int (*scan_dependent)(struct acpi_device *);
+ void (*notify_online)(struct acpi_device *);
+ bool enabled: 1;
+ bool demand_offline: 1;
+};
+
+struct acpi_device_status {
+ u32 present: 1;
+ u32 enabled: 1;
+ u32 show_in_ui: 1;
+ u32 functional: 1;
+ u32 battery_present: 1;
+ u32 reserved: 27;
+};
+
+struct acpi_device_flags {
+ u32 dynamic_status: 1;
+ u32 removable: 1;
+ u32 ejectable: 1;
+ u32 power_manageable: 1;
+ u32 match_driver: 1;
+ u32 initialized: 1;
+ u32 visited: 1;
+ u32 hotplug_notify: 1;
+ u32 is_dock_station: 1;
+ u32 of_compatible_ok: 1;
+ u32 coherent_dma: 1;
+ u32 cca_seen: 1;
+ u32 enumeration_by_parent: 1;
+ u32 honor_deps: 1;
+ u32 reserved: 18;
+};
+
+typedef char acpi_bus_id[8];
+
+struct acpi_pnp_type {
+ u32 hardware_id: 1;
+ u32 bus_address: 1;
+ u32 platform_id: 1;
+ u32 reserved: 29;
+};
+
+typedef u64 acpi_bus_address;
+
+typedef char acpi_device_name[40];
+
+typedef char acpi_device_class[20];
+
+struct acpi_device_pnp {
+ acpi_bus_id bus_id;
+ int instance_no;
+ struct acpi_pnp_type type;
+ acpi_bus_address bus_address;
+ char *unique_id;
+ struct list_head ids;
+ acpi_device_name device_name;
+ acpi_device_class device_class;
+ union acpi_object *str_obj;
+};
+
+struct acpi_device_power_flags {
+ u32 explicit_get: 1;
+ u32 power_resources: 1;
+ u32 inrush_current: 1;
+ u32 power_removed: 1;
+ u32 ignore_parent: 1;
+ u32 dsw_present: 1;
+ u32 reserved: 26;
+};
+
+struct acpi_device_power_state {
+ struct {
+ u8 valid: 1;
+ u8 explicit_set: 1;
+ u8 reserved: 6;
+ } flags;
+ int power;
+ int latency;
+ struct list_head resources;
+};
+
+struct acpi_device_power {
+ int state;
+ struct acpi_device_power_flags flags;
+ struct acpi_device_power_state states[5];
+ u8 state_for_enumeration;
+};
+
+struct acpi_device_wakeup_flags {
+ u8 valid: 1;
+ u8 notifier_present: 1;
+};
+
+struct acpi_device_wakeup_context {
+ void (*func)(struct acpi_device_wakeup_context *);
+ struct device *dev;
+};
+
+struct acpi_device_wakeup {
+ acpi_handle gpe_device;
+ u64 gpe_number;
+ u64 sleep_state;
+ struct list_head resources;
+ struct acpi_device_wakeup_flags flags;
+ struct acpi_device_wakeup_context context;
+ struct wakeup_source *ws;
+ int prepare_count;
+ int enable_count;
+};
+
+struct acpi_device_perf_flags {
+ u8 reserved: 8;
+};
+
+struct acpi_device_perf_state;
+
+struct acpi_device_perf {
+ int state;
+ struct acpi_device_perf_flags flags;
+ int state_count;
+ struct acpi_device_perf_state *states;
+};
+
+struct acpi_device_dir {
+ struct proc_dir_entry *entry;
+};
+
+struct acpi_device_data {
+ const union acpi_object *pointer;
+ struct list_head properties;
+ const union acpi_object *of_compatible;
+ struct list_head subnodes;
+};
+
+struct acpi_scan_handler;
+
+struct acpi_hotplug_context;
+
+struct acpi_gpio_mapping;
+
+struct acpi_device {
+ u32 pld_crc;
+ int device_type;
+ acpi_handle handle;
+ struct fwnode_handle fwnode;
+ struct list_head wakeup_list;
+ struct list_head del_list;
+ struct acpi_device_status status;
+ struct acpi_device_flags flags;
+ struct acpi_device_pnp pnp;
+ struct acpi_device_power power;
+ struct acpi_device_wakeup wakeup;
+ struct acpi_device_perf performance;
+ struct acpi_device_dir dir;
+ struct acpi_device_data data;
+ struct acpi_scan_handler *handler;
+ struct acpi_hotplug_context *hp;
+ const struct acpi_gpio_mapping *driver_gpios;
+ void *driver_data;
+ struct device dev;
+ unsigned int physical_node_count;
+ unsigned int dep_unmet;
+ struct list_head physical_node_list;
+ struct mutex physical_node_lock;
+ void (*remove)(struct acpi_device *);
+};
+
+struct acpi_scan_handler {
+ const struct acpi_device_id *ids;
+ struct list_head list_node;
+ bool (*match)(const char *, const struct acpi_device_id **);
+ int (*attach)(struct acpi_device *, const struct acpi_device_id *);
+ void (*detach)(struct acpi_device *);
+ void (*bind)(struct device *);
+ void (*unbind)(struct device *);
+ struct acpi_hotplug_profile hotplug;
+};
+
+struct acpi_hotplug_context {
+ struct acpi_device *self;
+ int (*notify)(struct acpi_device *, u32);
+ void (*uevent)(struct acpi_device *, u32);
+ void (*fixup)(struct acpi_device *);
+};
+
+struct acpi_device_perf_state {
+ struct {
+ u8 valid: 1;
+ u8 reserved: 7;
+ } flags;
+ u8 power;
+ u8 performance;
+ int latency;
+};
+
+struct acpi_gpio_params;
+
+struct acpi_gpio_mapping {
+ const char *name;
+ const struct acpi_gpio_params *data;
+ unsigned int size;
+ unsigned int quirks;
+};
+
+enum acpi_predicate {
+ all_versions = 0,
+ less_than_or_equal = 1,
+ equal = 2,
+ greater_than_or_equal = 3,
+};
+
+struct acpi_platform_list {
+ char oem_id[7];
+ char oem_table_id[9];
+ u32 oem_revision;
+ char *table;
+ enum acpi_predicate pred;
+ char *reason;
+ u32 data;
+};
+
+struct acpi_device_bus_id {
+ const char *bus_id;
+ struct ida instance_ida;
+ struct list_head node;
+};
+
+struct acpi_dev_match_info {
+ struct acpi_device_id hid[2];
+ const char *uid;
+ s64 hrv;
+};
+
+enum dmi_field {
+ DMI_NONE = 0,
+ DMI_BIOS_VENDOR = 1,
+ DMI_BIOS_VERSION = 2,
+ DMI_BIOS_DATE = 3,
+ DMI_BIOS_RELEASE = 4,
+ DMI_EC_FIRMWARE_RELEASE = 5,
+ DMI_SYS_VENDOR = 6,
+ DMI_PRODUCT_NAME = 7,
+ DMI_PRODUCT_VERSION = 8,
+ DMI_PRODUCT_SERIAL = 9,
+ DMI_PRODUCT_UUID = 10,
+ DMI_PRODUCT_SKU = 11,
+ DMI_PRODUCT_FAMILY = 12,
+ DMI_BOARD_VENDOR = 13,
+ DMI_BOARD_NAME = 14,
+ DMI_BOARD_VERSION = 15,
+ DMI_BOARD_SERIAL = 16,
+ DMI_BOARD_ASSET_TAG = 17,
+ DMI_CHASSIS_VENDOR = 18,
+ DMI_CHASSIS_TYPE = 19,
+ DMI_CHASSIS_VERSION = 20,
+ DMI_CHASSIS_SERIAL = 21,
+ DMI_CHASSIS_ASSET_TAG = 22,
+ DMI_STRING_MAX = 23,
+ DMI_OEM_STRING = 24,
+};
+
+struct dmi_strmatch {
+ unsigned char slot: 7;
+ unsigned char exact_match: 1;
+ char substr[79];
+};
+
+struct dmi_system_id {
+ int (*callback)(const struct dmi_system_id *);
+ const char *ident;
+ struct dmi_strmatch matches[4];
+ void *driver_data;
+};
+
+struct acpi_generic_address {
+ u8 space_id;
+ u8 bit_width;
+ u8 bit_offset;
+ u8 access_width;
+ u64 address;
+} __attribute__((packed));
+
+struct acpi_table_fadt {
+ struct acpi_table_header header;
+ u32 facs;
+ u32 dsdt;
+ u8 model;
+ u8 preferred_profile;
+ u16 sci_interrupt;
+ u32 smi_command;
+ u8 acpi_enable;
+ u8 acpi_disable;
+ u8 s4_bios_request;
+ u8 pstate_control;
+ u32 pm1a_event_block;
+ u32 pm1b_event_block;
+ u32 pm1a_control_block;
+ u32 pm1b_control_block;
+ u32 pm2_control_block;
+ u32 pm_timer_block;
+ u32 gpe0_block;
+ u32 gpe1_block;
+ u8 pm1_event_length;
+ u8 pm1_control_length;
+ u8 pm2_control_length;
+ u8 pm_timer_length;
+ u8 gpe0_block_length;
+ u8 gpe1_block_length;
+ u8 gpe1_base;
+ u8 cst_control;
+ u16 c2_latency;
+ u16 c3_latency;
+ u16 flush_size;
+ u16 flush_stride;
+ u8 duty_offset;
+ u8 duty_width;
+ u8 day_alarm;
+ u8 month_alarm;
+ u8 century;
+ u16 boot_flags;
+ u8 reserved;
+ u32 flags;
+ struct acpi_generic_address reset_register;
+ u8 reset_value;
+ u16 arm_boot_flags;
+ u8 minor_revision;
+ u64 Xfacs;
+ u64 Xdsdt;
+ struct acpi_generic_address xpm1a_event_block;
+ struct acpi_generic_address xpm1b_event_block;
+ struct acpi_generic_address xpm1a_control_block;
+ struct acpi_generic_address xpm1b_control_block;
+ struct acpi_generic_address xpm2_control_block;
+ struct acpi_generic_address xpm_timer_block;
+ struct acpi_generic_address xgpe0_block;
+ struct acpi_generic_address xgpe1_block;
+ struct acpi_generic_address sleep_control;
+ struct acpi_generic_address sleep_status;
+ u64 hypervisor_id;
+} __attribute__((packed));
+
+struct acpi_s2idle_dev_ops {
+ struct list_head list_node;
+ void (*prepare)();
+ void (*check)();
+ void (*restore)();
+};
+
+typedef int suspend_state_t;
+
+struct platform_s2idle_ops {
+ int (*begin)();
+ int (*prepare)();
+ int (*prepare_late)();
+ void (*check)();
+ bool (*wake)();
+ void (*restore_early)();
+ void (*restore)();
+ void (*end)();
+};
+
+struct lpi_device_info {
+ char *name;
+ int enabled;
+ union acpi_object *package;
+};
+
+struct lpi_device_constraint {
+ int uid;
+ int min_dstate;
+ int function_states;
+};
+
+struct lpi_constraints {
+ acpi_handle handle;
+ int min_dstate;
+};
+
+struct lpi_device_constraint_amd {
+ char *name;
+ int enabled;
+ int function_states;
+ int min_dstate;
+};
+
+struct amd_lps0_hid_device_data {
+ const unsigned int rev_id;
+ const bool check_off_by_one;
+ const bool prefer_amd_guid;
+};
+
+struct plist_head {
+ struct list_head node_list;
+};
+
+struct clk;
+
+enum pm_qos_type {
+ PM_QOS_UNITIALIZED = 0,
+ PM_QOS_MAX = 1,
+ PM_QOS_MIN = 2,
+};
+
+struct pm_qos_constraints {
+ struct plist_head list;
+ s32 target_value;
+ s32 default_value;
+ s32 no_constraint_value;
+ enum pm_qos_type type;
+ struct blocking_notifier_head *notifiers;
+};
+
+enum freq_qos_req_type {
+ FREQ_QOS_MIN = 1,
+ FREQ_QOS_MAX = 2,
+};
+
+struct freq_constraints {
+ struct pm_qos_constraints min_freq;
+ struct blocking_notifier_head min_freq_notifiers;
+ struct pm_qos_constraints max_freq;
+ struct blocking_notifier_head max_freq_notifiers;
+};
+
+struct freq_qos_request {
+ enum freq_qos_req_type type;
+ struct plist_node pnode;
+ struct freq_constraints *qos;
+};
+
+enum cpufreq_table_sorting {
+ CPUFREQ_TABLE_UNSORTED = 0,
+ CPUFREQ_TABLE_SORTED_ASCENDING = 1,
+ CPUFREQ_TABLE_SORTED_DESCENDING = 2,
+};
+
+struct cpufreq_cpuinfo {
+ unsigned int max_freq;
+ unsigned int min_freq;
+ unsigned int transition_latency;
+};
+
+struct cpufreq_governor;
+
+struct cpufreq_frequency_table;
+
+struct cpufreq_stats;
+
+struct thermal_cooling_device;
+
+struct cpufreq_policy {
+ cpumask_var_t cpus;
+ cpumask_var_t related_cpus;
+ cpumask_var_t real_cpus;
+ unsigned int shared_type;
+ unsigned int cpu;
+ struct clk *clk;
+ struct cpufreq_cpuinfo cpuinfo;
+ unsigned int min;
+ unsigned int max;
+ unsigned int cur;
+ unsigned int suspend_freq;
+ unsigned int policy;
+ unsigned int last_policy;
+ struct cpufreq_governor *governor;
+ void *governor_data;
+ char last_governor[16];
+ struct work_struct update;
+ struct freq_constraints constraints;
+ struct freq_qos_request *min_freq_req;
+ struct freq_qos_request *max_freq_req;
+ struct cpufreq_frequency_table *freq_table;
+ enum cpufreq_table_sorting freq_table_sorted;
+ struct list_head policy_list;
+ struct kobject kobj;
+ struct completion kobj_unregister;
+ struct rw_semaphore rwsem;
+ bool fast_switch_possible;
+ bool fast_switch_enabled;
+ bool strict_target;
+ bool efficiencies_available;
+ unsigned int transition_delay_us;
+ bool dvfs_possible_from_any_cpu;
+ unsigned int cached_target_freq;
+ unsigned int cached_resolved_idx;
+ bool transition_ongoing;
+ spinlock_t transition_lock;
+ wait_queue_head_t transition_wait;
+ struct task_struct *transition_task;
+ struct cpufreq_stats *stats;
+ void *driver_data;
+ struct thermal_cooling_device *cdev;
+ struct notifier_block nb_min;
+ struct notifier_block nb_max;
+};
+
+struct cpufreq_governor {
+ char name[16];
+ int (*init)(struct cpufreq_policy *);
+ void (*exit)(struct cpufreq_policy *);
+ int (*start)(struct cpufreq_policy *);
+ void (*stop)(struct cpufreq_policy *);
+ void (*limits)(struct cpufreq_policy *);
+ ssize_t (*show_setspeed)(struct cpufreq_policy *, char *);
+ int (*store_setspeed)(struct cpufreq_policy *, unsigned int);
+ struct list_head governor_list;
+ struct module *owner;
+ u8 flags;
+};
+
+struct cpufreq_frequency_table {
+ unsigned int flags;
+ unsigned int driver_data;
+ unsigned int frequency;
+};
+
+struct cpufreq_stats {
+ unsigned int total_trans;
+ long long unsigned int last_time;
+ unsigned int max_state;
+ unsigned int state_num;
+ unsigned int last_index;
+ u64 *time_in_state;
+ unsigned int *freq_table;
+ unsigned int *trans_table;
+ unsigned int reset_pending;
+ long long unsigned int reset_time;
+};
+
+struct freq_attr {
+ struct attribute attr;
+ ssize_t (*show)(struct cpufreq_policy *, char *);
+ ssize_t (*store)(struct cpufreq_policy *, const char *, size_t);
+};
+
+struct efi_memory_map_data {
+ phys_addr_t phys_map;
+ long unsigned int size;
+ long unsigned int desc_version;
+ long unsigned int desc_size;
+ long unsigned int flags;
+};
+
+struct efi_mem_range {
+ struct range range;
+ u64 attribute;
+};
+
+enum pageflags {
+ PG_locked = 0,
+ PG_referenced = 1,
+ PG_uptodate = 2,
+ PG_dirty = 3,
+ PG_lru = 4,
+ PG_active = 5,
+ PG_workingset = 6,
+ PG_waiters = 7,
+ PG_error = 8,
+ PG_slab = 9,
+ PG_owner_priv_1 = 10,
+ PG_arch_1 = 11,
+ PG_reserved = 12,
+ PG_private = 13,
+ PG_private_2 = 14,
+ PG_writeback = 15,
+ PG_head = 16,
+ PG_mappedtodisk = 17,
+ PG_reclaim = 18,
+ PG_swapbacked = 19,
+ PG_unevictable = 20,
+ PG_mlocked = 21,
+ PG_uncached = 22,
+ PG_hwpoison = 23,
+ PG_arch_2 = 24,
+ __NR_PAGEFLAGS = 25,
+ PG_readahead = 18,
+ PG_anon_exclusive = 17,
+ PG_checked = 10,
+ PG_swapcache = 10,
+ PG_fscache = 14,
+ PG_pinned = 10,
+ PG_savepinned = 3,
+ PG_foreign = 10,
+ PG_xen_remapped = 10,
+ PG_slob_free = 13,
+ PG_double_map = 6,
+ PG_has_hwpoisoned = 8,
+ PG_isolated = 18,
+ PG_reported = 2,
+};
+
+struct csum_state {
+ __wsum csum;
+ size_t off;
+};
+
+enum {
+ SKBFL_ZEROCOPY_ENABLE = 1,
+ SKBFL_SHARED_FRAG = 2,
+ SKBFL_PURE_ZEROCOPY = 4,
+ SKBFL_DONT_ORPHAN = 8,
+ SKBFL_MANAGED_FRAG_REFS = 16,
+};
+
+struct ahash_request;
+
+enum ethtool_fec_config_bits {
+ ETHTOOL_FEC_NONE_BIT = 0,
+ ETHTOOL_FEC_AUTO_BIT = 1,
+ ETHTOOL_FEC_OFF_BIT = 2,
+ ETHTOOL_FEC_RS_BIT = 3,
+ ETHTOOL_FEC_BASER_BIT = 4,
+ ETHTOOL_FEC_LLRS_BIT = 5,
+};
+
+enum {
+ ETHTOOL_A_FEC_STAT_UNSPEC = 0,
+ ETHTOOL_A_FEC_STAT_PAD = 1,
+ ETHTOOL_A_FEC_STAT_CORRECTED = 2,
+ ETHTOOL_A_FEC_STAT_UNCORR = 3,
+ ETHTOOL_A_FEC_STAT_CORR_BITS = 4,
+ __ETHTOOL_A_FEC_STAT_CNT = 5,
+ ETHTOOL_A_FEC_STAT_MAX = 4,
+};
+
+enum nla_policy_validation {
+ NLA_VALIDATE_NONE = 0,
+ NLA_VALIDATE_RANGE = 1,
+ NLA_VALIDATE_RANGE_WARN_TOO_LONG = 2,
+ NLA_VALIDATE_MIN = 3,
+ NLA_VALIDATE_MAX = 4,
+ NLA_VALIDATE_MASK = 5,
+ NLA_VALIDATE_RANGE_PTR = 6,
+ NLA_VALIDATE_FUNCTION = 7,
+};
+
+struct fec_stat_grp {
+ u64 stats[9];
+ u8 cnt;
+};
+
+struct fec_reply_data {
+ struct ethnl_reply_data base;
+ long unsigned int fec_link_modes[2];
+ u32 active_fec;
+ u8 fec_auto;
+ struct fec_stat_grp corr;
+ struct fec_stat_grp uncorr;
+ struct fec_stat_grp corr_bits;
+};
+
+struct rhltable {
+ struct rhashtable ht;
+};
+
+struct cmsghdr {
+ __kernel_size_t cmsg_len;
+ int cmsg_level;
+ int cmsg_type;
+};
+
+struct sock_ee_data_rfc4884 {
+ __u16 len;
+ __u8 flags;
+ __u8 reserved;
+};
+
+struct sock_extended_err {
+ __u32 ee_errno;
+ __u8 ee_origin;
+ __u8 ee_type;
+ __u8 ee_code;
+ __u8 ee_pad;
+ __u32 ee_info;
+ union {
+ __u32 ee_data;
+ struct sock_ee_data_rfc4884 ee_rfc4884;
+ };
+};
+
+struct mr_table_ops {
+ const struct rhashtable_params *rht_params;
+ void *cmparg_any;
+};
+
+struct vif_device {
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ long unsigned int bytes_in;
+ long unsigned int bytes_out;
+ long unsigned int pkt_in;
+ long unsigned int pkt_out;
+ long unsigned int rate_limit;
+ unsigned char threshold;
+ short unsigned int flags;
+ int link;
+ struct netdev_phys_item_id dev_parent_id;
+ __be32 local;
+ __be32 remote;
+};
+
+struct mr_table {
+ struct list_head list;
+ possible_net_t net;
+ struct mr_table_ops ops;
+ u32 id;
+ struct sock *mroute_sk;
+ struct timer_list ipmr_expire_timer;
+ struct list_head mfc_unres_queue;
+ struct vif_device vif_table[32];
+ struct rhltable mfc_hash;
+ struct list_head mfc_cache_list;
+ int maxvif;
+ atomic_t cache_resolve_queue_len;
+ bool mroute_do_assert;
+ bool mroute_do_pim;
+ bool mroute_do_wrvifwhole;
+ int mroute_reg_vif_num;
+};
+
+struct ip_mreqn {
+ struct in_addr imr_multiaddr;
+ struct in_addr imr_address;
+ int imr_ifindex;
+};
+
+struct ip_mreq_source {
+ __be32 imr_multiaddr;
+ __be32 imr_interface;
+ __be32 imr_sourceaddr;
+};
+
+struct ip_msfilter {
+ __be32 imsf_multiaddr;
+ __be32 imsf_interface;
+ __u32 imsf_fmode;
+ __u32 imsf_numsrc;
+ union {
+ __be32 imsf_slist[1];
+ struct {
+ struct { } __empty_imsf_slist_flex;
+ __be32 imsf_slist_flex[0];
+ };
+ };
+};
+
+struct group_req {
+ __u32 gr_interface;
+ struct __kernel_sockaddr_storage gr_group;
+};
+
+struct group_source_req {
+ __u32 gsr_interface;
+ struct __kernel_sockaddr_storage gsr_group;
+ struct __kernel_sockaddr_storage gsr_source;
+};
+
+struct group_filter {
+ union {
+ struct {
+ __u32 gf_interface_aux;
+ struct __kernel_sockaddr_storage gf_group_aux;
+ __u32 gf_fmode_aux;
+ __u32 gf_numsrc_aux;
+ struct __kernel_sockaddr_storage gf_slist[1];
+ };
+ struct {
+ __u32 gf_interface;
+ struct __kernel_sockaddr_storage gf_group;
+ __u32 gf_fmode;
+ __u32 gf_numsrc;
+ struct __kernel_sockaddr_storage gf_slist_flex[0];
+ };
+ };
+};
+
+struct in_pktinfo {
+ int ipi_ifindex;
+ struct in_addr ipi_spec_dst;
+ struct in_addr ipi_addr;
+};
+
+struct nf_hook_state;
+
+typedef unsigned int nf_hookfn(void *, struct sk_buff *, const struct nf_hook_state *);
+
+struct nf_hook_entry {
+ nf_hookfn *hook;
+ void *priv;
+};
+
+struct nf_hook_entries {
+ u16 num_hook_entries;
+ struct nf_hook_entry hooks[0];
+};
+
+struct ip_sf_list;
+
+struct ip_mc_list {
+ struct in_device *interface;
+ __be32 multiaddr;
+ unsigned int sfmode;
+ struct ip_sf_list *sources;
+ struct ip_sf_list *tomb;
+ long unsigned int sfcount[2];
+ union {
+ struct ip_mc_list *next;
+ struct ip_mc_list *next_rcu;
+ };
+ struct ip_mc_list *next_hash;
+ struct timer_list timer;
+ int users;
+ refcount_t refcnt;
+ spinlock_t lock;
+ char tm_running;
+ char reporter;
+ char unsolicit_count;
+ char loaded;
+ unsigned char gsquery;
+ unsigned char crcount;
+ struct callback_head rcu;
+};
+
+enum {
+ SOF_TIMESTAMPING_TX_HARDWARE = 1,
+ SOF_TIMESTAMPING_TX_SOFTWARE = 2,
+ SOF_TIMESTAMPING_RX_HARDWARE = 4,
+ SOF_TIMESTAMPING_RX_SOFTWARE = 8,
+ SOF_TIMESTAMPING_SOFTWARE = 16,
+ SOF_TIMESTAMPING_SYS_HARDWARE = 32,
+ SOF_TIMESTAMPING_RAW_HARDWARE = 64,
+ SOF_TIMESTAMPING_OPT_ID = 128,
+ SOF_TIMESTAMPING_TX_SCHED = 256,
+ SOF_TIMESTAMPING_TX_ACK = 512,
+ SOF_TIMESTAMPING_OPT_CMSG = 1024,
+ SOF_TIMESTAMPING_OPT_TSONLY = 2048,
+ SOF_TIMESTAMPING_OPT_STATS = 4096,
+ SOF_TIMESTAMPING_OPT_PKTINFO = 8192,
+ SOF_TIMESTAMPING_OPT_TX_SWHW = 16384,
+ SOF_TIMESTAMPING_BIND_PHC = 32768,
+ SOF_TIMESTAMPING_LAST = 32768,
+ SOF_TIMESTAMPING_MASK = 65535,
+};
+
+struct sockcm_cookie {
+ u64 transmit_time;
+ u32 mark;
+ u16 tsflags;
+};
+
+struct ip_sf_socklist;
+
+struct ip_mc_socklist {
+ struct ip_mc_socklist *next_rcu;
+ struct ip_mreqn multi;
+ unsigned int sfmode;
+ struct ip_sf_socklist *sflist;
+ struct callback_head rcu;
+};
+
+struct ipcm_cookie {
+ struct sockcm_cookie sockc;
+ __be32 addr;
+ int oif;
+ struct ip_options_rcu *opt;
+ __u8 ttl;
+ __s16 tos;
+ char priority;
+ __u16 gso_size;
+};
+
+struct ip_sf_socklist {
+ unsigned int sl_max;
+ unsigned int sl_count;
+ struct callback_head rcu;
+ __be32 sl_addr[0];
+};
+
+struct ip_sf_list {
+ struct ip_sf_list *sf_next;
+ long unsigned int sf_count[2];
+ __be32 sf_inaddr;
+ unsigned char sf_gsresp;
+ unsigned char sf_oldin;
+ unsigned char sf_crcount;
+};
+
+struct nf_hook_state {
+ u8 hook;
+ u8 pf;
+ struct net_device *in;
+ struct net_device *out;
+ struct sock *sk;
+ struct net *net;
+ int (*okfn)(struct net *, struct sock *, struct sk_buff *);
+};
+
+struct compat_group_req {
+ __u32 gr_interface;
+ struct __kernel_sockaddr_storage gr_group;
+} __attribute__((packed));
+
+struct compat_group_source_req {
+ __u32 gsr_interface;
+ struct __kernel_sockaddr_storage gsr_group;
+ struct __kernel_sockaddr_storage gsr_source;
+} __attribute__((packed));
+
+struct compat_group_filter {
+ union {
+ struct {
+ __u32 gf_interface_aux;
+ struct __kernel_sockaddr_storage gf_group_aux;
+ __u32 gf_fmode_aux;
+ __u32 gf_numsrc_aux;
+ struct __kernel_sockaddr_storage gf_slist[1];
+ } __attribute__((packed));
+ struct {
+ __u32 gf_interface;
+ struct __kernel_sockaddr_storage gf_group;
+ __u32 gf_fmode;
+ __u32 gf_numsrc;
+ struct __kernel_sockaddr_storage gf_slist_flex[0];
+ } __attribute__((packed));
+ };
+} __attribute__((packed));
+
+struct sock_exterr_skb {
+ union {
+ struct inet_skb_parm h4;
+ struct inet6_skb_parm h6;
+ } header;
+ struct sock_extended_err ee;
+ u16 addr_offset;
+ __be16 port;
+ u8 opt_stats: 1;
+ u8 unused: 7;
+};
+
+enum {
+ BPFILTER_IPT_SO_SET_REPLACE = 64,
+ BPFILTER_IPT_SO_SET_ADD_COUNTERS = 65,
+ BPFILTER_IPT_SET_MAX = 66,
+};
+
+enum {
+ BPFILTER_IPT_SO_GET_INFO = 64,
+ BPFILTER_IPT_SO_GET_ENTRIES = 65,
+ BPFILTER_IPT_SO_GET_REVISION_MATCH = 66,
+ BPFILTER_IPT_SO_GET_REVISION_TARGET = 67,
+ BPFILTER_IPT_GET_MAX = 68,
+};
+
+struct sockaddr_in6 {
+ short unsigned int sin6_family;
+ __be16 sin6_port;
+ __be32 sin6_flowinfo;
+ struct in6_addr sin6_addr;
+ __u32 sin6_scope_id;
+};
+
+enum pkt_hash_types {
+ PKT_HASH_TYPE_NONE = 0,
+ PKT_HASH_TYPE_L2 = 1,
+ PKT_HASH_TYPE_L3 = 2,
+ PKT_HASH_TYPE_L4 = 3,
+};
+
+struct ipv6hdr {
+ __u8 priority: 4;
+ __u8 version: 4;
+ __u8 flow_lbl[3];
+ __be16 payload_len;
+ __u8 nexthdr;
+ __u8 hop_limit;
+ union {
+ struct {
+ struct in6_addr saddr;
+ struct in6_addr daddr;
+ };
+ struct {
+ struct in6_addr saddr;
+ struct in6_addr daddr;
+ } addrs;
+ };
+};
+
+struct static_key_false_deferred {
+ struct static_key_false key;
+ long unsigned int timeout;
+ struct delayed_work work;
+};
+
+enum flowlabel_reflect {
+ FLOWLABEL_REFLECT_ESTABLISHED = 1,
+ FLOWLABEL_REFLECT_TCP_RESET = 2,
+ FLOWLABEL_REFLECT_ICMPV6_ECHO_REPLIES = 4,
+};
+
+struct tcp6_pseudohdr {
+ struct in6_addr saddr;
+ struct in6_addr daddr;
+ __be32 len;
+ __be32 protocol;
+};
+
+struct inet6_protocol {
+ int (*handler)(struct sk_buff *);
+ int (*err_handler)(struct sk_buff *, struct inet6_skb_parm *, u8, u8, int, __be32);
+ unsigned int flags;
+};
+
+struct inet_protosw {
+ struct list_head list;
+ short unsigned int type;
+ short unsigned int protocol;
+ struct proto *prot;
+ const struct proto_ops *ops;
+ unsigned char flags;
+};
+
+struct screen_info {
+ __u8 orig_x;
+ __u8 orig_y;
+ __u16 ext_mem_k;
+ __u16 orig_video_page;
+ __u8 orig_video_mode;
+ __u8 orig_video_cols;
+ __u8 flags;
+ __u8 unused2;
+ __u16 orig_video_ega_bx;
+ __u16 unused3;
+ __u8 orig_video_lines;
+ __u8 orig_video_isVGA;
+ __u16 orig_video_points;
+ __u16 lfb_width;
+ __u16 lfb_height;
+ __u16 lfb_depth;
+ __u32 lfb_base;
+ __u32 lfb_size;
+ __u16 cl_magic;
+ __u16 cl_offset;
+ __u16 lfb_linelength;
+ __u8 red_size;
+ __u8 red_pos;
+ __u8 green_size;
+ __u8 green_pos;
+ __u8 blue_size;
+ __u8 blue_pos;
+ __u8 rsvd_size;
+ __u8 rsvd_pos;
+ __u16 vesapm_seg;
+ __u16 vesapm_off;
+ __u16 pages;
+ __u16 vesa_attributes;
+ __u32 capabilities;
+ __u32 ext_lfb_base;
+ __u8 _reserved[2];
+} __attribute__((packed));
+
+struct apm_bios_info {
+ __u16 version;
+ __u16 cseg;
+ __u32 offset;
+ __u16 cseg_16;
+ __u16 dseg;
+ __u16 flags;
+ __u16 cseg_len;
+ __u16 cseg_16_len;
+ __u16 dseg_len;
+};
+
+struct edd_device_params {
+ __u16 length;
+ __u16 info_flags;
+ __u32 num_default_cylinders;
+ __u32 num_default_heads;
+ __u32 sectors_per_track;
+ __u64 number_of_sectors;
+ __u16 bytes_per_sector;
+ __u32 dpte_ptr;
+ __u16 key;
+ __u8 device_path_info_length;
+ __u8 reserved2;
+ __u16 reserved3;
+ __u8 host_bus_type[4];
+ __u8 interface_type[8];
+ union {
+ struct {
+ __u16 base_address;
+ __u16 reserved1;
+ __u32 reserved2;
+ } isa;
+ struct {
+ __u8 bus;
+ __u8 slot;
+ __u8 function;
+ __u8 channel;
+ __u32 reserved;
+ } pci;
+ struct {
+ __u64 reserved;
+ } ibnd;
+ struct {
+ __u64 reserved;
+ } xprs;
+ struct {
+ __u64 reserved;
+ } htpt;
+ struct {
+ __u64 reserved;
+ } unknown;
+ } interface_path;
+ union {
+ struct {
+ __u8 device;
+ __u8 reserved1;
+ __u16 reserved2;
+ __u32 reserved3;
+ __u64 reserved4;
+ } ata;
+ struct {
+ __u8 device;
+ __u8 lun;
+ __u8 reserved1;
+ __u8 reserved2;
+ __u32 reserved3;
+ __u64 reserved4;
+ } atapi;
+ struct {
+ __u16 id;
+ __u64 lun;
+ __u16 reserved1;
+ __u32 reserved2;
+ } __attribute__((packed)) scsi;
+ struct {
+ __u64 serial_number;
+ __u64 reserved;
+ } usb;
+ struct {
+ __u64 eui;
+ __u64 reserved;
+ } i1394;
+ struct {
+ __u64 wwid;
+ __u64 lun;
+ } fibre;
+ struct {
+ __u64 identity_tag;
+ __u64 reserved;
+ } i2o;
+ struct {
+ __u32 array_number;
+ __u32 reserved1;
+ __u64 reserved2;
+ } raid;
+ struct {
+ __u8 device;
+ __u8 reserved1;
+ __u16 reserved2;
+ __u32 reserved3;
+ __u64 reserved4;
+ } sata;
+ struct {
+ __u64 reserved1;
+ __u64 reserved2;
+ } unknown;
+ } device_path;
+ __u8 reserved4;
+ __u8 checksum;
+} __attribute__((packed));
+
+struct edd_info {
+ __u8 device;
+ __u8 version;
+ __u16 interface_support;
+ __u16 legacy_max_cylinder;
+ __u8 legacy_max_head;
+ __u8 legacy_sectors_per_track;
+ struct edd_device_params params;
+} __attribute__((packed));
+
+struct ist_info {
+ __u32 signature;
+ __u32 command;
+ __u32 event;
+ __u32 perf_level;
+};
+
+struct edid_info {
+ unsigned char dummy[128];
+};
+
+struct setup_header {
+ __u8 setup_sects;
+ __u16 root_flags;
+ __u32 syssize;
+ __u16 ram_size;
+ __u16 vid_mode;
+ __u16 root_dev;
+ __u16 boot_flag;
+ __u16 jump;
+ __u32 header;
+ __u16 version;
+ __u32 realmode_swtch;
+ __u16 start_sys_seg;
+ __u16 kernel_version;
+ __u8 type_of_loader;
+ __u8 loadflags;
+ __u16 setup_move_size;
+ __u32 code32_start;
+ __u32 ramdisk_image;
+ __u32 ramdisk_size;
+ __u32 bootsect_kludge;
+ __u16 heap_end_ptr;
+ __u8 ext_loader_ver;
+ __u8 ext_loader_type;
+ __u32 cmd_line_ptr;
+ __u32 initrd_addr_max;
+ __u32 kernel_alignment;
+ __u8 relocatable_kernel;
+ __u8 min_alignment;
+ __u16 xloadflags;
+ __u32 cmdline_size;
+ __u32 hardware_subarch;
+ __u64 hardware_subarch_data;
+ __u32 payload_offset;
+ __u32 payload_length;
+ __u64 setup_data;
+ __u64 pref_address;
+ __u32 init_size;
+ __u32 handover_offset;
+ __u32 kernel_info_offset;
+} __attribute__((packed));
+
+struct sys_desc_table {
+ __u16 length;
+ __u8 table[14];
+};
+
+struct olpc_ofw_header {
+ __u32 ofw_magic;
+ __u32 ofw_version;
+ __u32 cif_handler;
+ __u32 irq_desc_table;
+};
+
+struct efi_info {
+ __u32 efi_loader_signature;
+ __u32 efi_systab;
+ __u32 efi_memdesc_size;
+ __u32 efi_memdesc_version;
+ __u32 efi_memmap;
+ __u32 efi_memmap_size;
+ __u32 efi_systab_hi;
+ __u32 efi_memmap_hi;
+};
+
+struct boot_e820_entry {
+ __u64 addr;
+ __u64 size;
+ __u32 type;
+} __attribute__((packed));
+
+struct boot_params {
+ struct screen_info screen_info;
+ struct apm_bios_info apm_bios_info;
+ __u8 _pad2[4];
+ __u64 tboot_addr;
+ struct ist_info ist_info;
+ __u64 acpi_rsdp_addr;
+ __u8 _pad3[8];
+ __u8 hd0_info[16];
+ __u8 hd1_info[16];
+ struct sys_desc_table sys_desc_table;
+ struct olpc_ofw_header olpc_ofw_header;
+ __u32 ext_ramdisk_image;
+ __u32 ext_ramdisk_size;
+ __u32 ext_cmd_line_ptr;
+ __u8 _pad4[112];
+ __u32 cc_blob_address;
+ struct edid_info edid_info;
+ struct efi_info efi_info;
+ __u32 alt_mem_k;
+ __u32 scratch;
+ __u8 e820_entries;
+ __u8 eddbuf_entries;
+ __u8 edd_mbr_sig_buf_entries;
+ __u8 kbd_status;
+ __u8 secure_boot;
+ __u8 _pad5[2];
+ __u8 sentinel;
+ __u8 _pad6[1];
+ struct setup_header hdr;
+ __u8 _pad7[36];
+ __u32 edd_mbr_sig_buffer[16];
+ struct boot_e820_entry e820_table[128];
+ __u8 _pad8[48];
+ struct edd_info eddbuf[6];
+ __u8 _pad9[276];
+} __attribute__((packed));
+
+enum x86_hardware_subarch {
+ X86_SUBARCH_PC = 0,
+ X86_SUBARCH_LGUEST = 1,
+ X86_SUBARCH_XEN = 2,
+ X86_SUBARCH_INTEL_MID = 3,
+ X86_SUBARCH_CE4100 = 4,
+ X86_NR_SUBARCHS = 5,
+};
+
+typedef long unsigned int p4dval_t;
+
+typedef struct {
+ p4dval_t p4d;
+} p4d_t;
+
+struct idt_bits {
+ u16 ist: 3;
+ u16 zero: 5;
+ u16 type: 5;
+ u16 dpl: 2;
+ u16 p: 1;
+};
+
+struct gate_struct {
+ u16 offset_low;
+ u16 segment;
+ struct idt_bits bits;
+ u16 offset_middle;
+ u32 offset_high;
+ u32 reserved;
+};
+
+typedef struct gate_struct gate_desc;
+
+struct desc_ptr {
+ short unsigned int size;
+ long unsigned int address;
+} __attribute__((packed));
+
+enum fixed_addresses {
+ VSYSCALL_PAGE = 511,
+ FIX_DBGP_BASE = 512,
+ FIX_EARLYCON_MEM_BASE = 513,
+ FIX_APIC_BASE = 514,
+ FIX_IO_APIC_BASE_0 = 515,
+ FIX_IO_APIC_BASE_END = 642,
+ __end_of_permanent_fixed_addresses = 643,
+ FIX_BTMAP_END = 1024,
+ FIX_BTMAP_BEGIN = 1535,
+ __end_of_fixed_addresses = 1536,
+};
+
+struct tlb_context {
+ u64 ctx_id;
+ u64 tlb_gen;
+};
+
+struct tlb_state {
+ struct mm_struct *loaded_mm;
+ union {
+ struct mm_struct *last_user_mm;
+ long unsigned int last_user_mm_spec;
+ };
+ u16 loaded_mm_asid;
+ u16 next_asid;
+ bool invalidate_other;
+ short unsigned int user_pcid_flush_mask;
+ long unsigned int cr4;
+ struct tlb_context ctxs[6];
+};
+
+struct boot_params_to_save {
+ unsigned int start;
+ unsigned int len;
+};
+
+struct smp_ops {
+ void (*smp_prepare_boot_cpu)();
+ void (*smp_prepare_cpus)(unsigned int);
+ void (*smp_cpus_done)(unsigned int);
+ void (*stop_other_cpus)(int);
+ void (*crash_stop_other_cpus)();
+ void (*smp_send_reschedule)(int);
+ int (*cpu_up)(unsigned int, struct task_struct *);
+ int (*cpu_disable)();
+ void (*cpu_die)(unsigned int);
+ void (*play_dead)();
+ void (*send_call_func_ipi)(const struct cpumask *);
+ void (*send_call_func_single_ipi)(int);
+};
+
+struct ldt_struct {
+ struct desc_struct *entries;
+ unsigned int nr_entries;
+ int slot;
+};
+
+enum apic_delivery_modes {
+ APIC_DELIVERY_MODE_FIXED = 0,
+ APIC_DELIVERY_MODE_LOWESTPRIO = 1,
+ APIC_DELIVERY_MODE_SMI = 2,
+ APIC_DELIVERY_MODE_NMI = 4,
+ APIC_DELIVERY_MODE_INIT = 5,
+ APIC_DELIVERY_MODE_EXTINT = 7,
+};
+
+struct physid_mask {
+ long unsigned int mask[512];
+};
+
+typedef struct physid_mask physid_mask_t;
+
+typedef struct {
+ u16 __softirq_pending;
+ unsigned int __nmi_count;
+ unsigned int apic_timer_irqs;
+ unsigned int irq_spurious_count;
+ unsigned int icr_read_retry_count;
+ unsigned int kvm_posted_intr_ipis;
+ unsigned int kvm_posted_intr_wakeup_ipis;
+ unsigned int kvm_posted_intr_nested_ipis;
+ unsigned int x86_platform_ipis;
+ unsigned int apic_perf_irqs;
+ unsigned int apic_irq_work_irqs;
+ unsigned int irq_resched_count;
+ unsigned int irq_call_count;
+ unsigned int irq_tlb_count;
+ unsigned int irq_thermal_count;
+ unsigned int irq_threshold_count;
+ unsigned int irq_deferred_error_count;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+} irq_cpustat_t;
+
+struct apic {
+ void (*eoi_write)(u32, u32);
+ void (*native_eoi_write)(u32, u32);
+ void (*write)(u32, u32);
+ u32 (*read)(u32);
+ void (*wait_icr_idle)();
+ u32 (*safe_wait_icr_idle)();
+ void (*send_IPI)(int, int);
+ void (*send_IPI_mask)(const struct cpumask *, int);
+ void (*send_IPI_mask_allbutself)(const struct cpumask *, int);
+ void (*send_IPI_allbutself)(int);
+ void (*send_IPI_all)(int);
+ void (*send_IPI_self)(int);
+ u32 disable_esr;
+ enum apic_delivery_modes delivery_mode;
+ bool dest_mode_logical;
+ u32 (*calc_dest_apicid)(unsigned int);
+ u64 (*icr_read)();
+ void (*icr_write)(u32, u32);
+ int (*probe)();
+ int (*acpi_madt_oem_check)(char *, char *);
+ int (*apic_id_valid)(u32);
+ int (*apic_id_registered)();
+ bool (*check_apicid_used)(physid_mask_t *, int);
+ void (*init_apic_ldr)();
+ void (*ioapic_phys_id_map)(physid_mask_t *, physid_mask_t *);
+ void (*setup_apic_routing)();
+ int (*cpu_present_to_apicid)(int);
+ void (*apicid_to_cpu_present)(int, physid_mask_t *);
+ int (*check_phys_apicid_present)(int);
+ int (*phys_pkg_id)(int, int);
+ u32 (*get_apic_id)(long unsigned int);
+ u32 (*set_apic_id)(unsigned int);
+ int (*wakeup_secondary_cpu)(int, long unsigned int);
+ int (*wakeup_secondary_cpu_64)(int, long unsigned int);
+ void (*inquire_remote_apic)(int);
+ char *name;
+};
+
+struct irqentry_state {
+ union {
+ bool exit_rcu;
+ bool lockdep;
+ };
+};
+
+typedef struct irqentry_state irqentry_state_t;
+
+enum {
+ NMI_LOCAL = 0,
+ NMI_UNKNOWN = 1,
+ NMI_SERR = 2,
+ NMI_IO_CHECK = 3,
+ NMI_MAX = 4,
+};
+
+typedef int (*nmi_handler_t)(unsigned int, struct pt_regs *);
+
+struct nmiaction {
+ struct list_head list;
+ nmi_handler_t handler;
+ u64 max_duration;
+ long unsigned int flags;
+ const char *name;
+};
+
+enum intercept_words {
+ INTERCEPT_CR = 0,
+ INTERCEPT_DR = 1,
+ INTERCEPT_EXCEPTION = 2,
+ INTERCEPT_WORD3 = 3,
+ INTERCEPT_WORD4 = 4,
+ INTERCEPT_WORD5 = 5,
+ MAX_INTERCEPT = 6,
+};
+
+typedef u64 uint64_t;
+
+typedef s64 int64_t;
+
+typedef void (*smp_call_func_t)(void *);
+
+enum tick_device_mode {
+ TICKDEV_MODE_PERIODIC = 0,
+ TICKDEV_MODE_ONESHOT = 1,
+};
+
+struct clock_event_device;
+
+struct tick_device {
+ struct clock_event_device *evtdev;
+ enum tick_device_mode mode;
+};
+
+enum clock_event_state {
+ CLOCK_EVT_STATE_DETACHED = 0,
+ CLOCK_EVT_STATE_SHUTDOWN = 1,
+ CLOCK_EVT_STATE_PERIODIC = 2,
+ CLOCK_EVT_STATE_ONESHOT = 3,
+ CLOCK_EVT_STATE_ONESHOT_STOPPED = 4,
+};
+
+struct clock_event_device {
+ void (*event_handler)(struct clock_event_device *);
+ int (*set_next_event)(long unsigned int, struct clock_event_device *);
+ int (*set_next_ktime)(ktime_t, struct clock_event_device *);
+ ktime_t next_event;
+ u64 max_delta_ns;
+ u64 min_delta_ns;
+ u32 mult;
+ u32 shift;
+ enum clock_event_state state_use_accessors;
+ unsigned int features;
+ long unsigned int retries;
+ int (*set_state_periodic)(struct clock_event_device *);
+ int (*set_state_oneshot)(struct clock_event_device *);
+ int (*set_state_oneshot_stopped)(struct clock_event_device *);
+ int (*set_state_shutdown)(struct clock_event_device *);
+ int (*tick_resume)(struct clock_event_device *);
+ void (*broadcast)(const struct cpumask *);
+ void (*suspend)(struct clock_event_device *);
+ void (*resume)(struct clock_event_device *);
+ long unsigned int min_delta_ticks;
+ long unsigned int max_delta_ticks;
+ const char *name;
+ int rating;
+ int irq;
+ int bound_on;
+ const struct cpumask *cpumask;
+ struct list_head list;
+ struct module *owner;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct device_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct device *, struct device_attribute *, char *);
+ ssize_t (*store)(struct device *, struct device_attribute *, const char *, size_t);
+};
+
+struct ce_unbind {
+ struct clock_event_device *ce;
+ int res;
+};
+
+typedef void (*swap_func_t)(void *, void *, int);
+
+typedef int (*cmp_func_t)(const void *, const void *);
+
+struct task_delay_info {
+ raw_spinlock_t lock;
+ u64 blkio_start;
+ u64 blkio_delay;
+ u64 swapin_start;
+ u64 swapin_delay;
+ u32 blkio_count;
+ u32 swapin_count;
+ u64 freepages_start;
+ u64 freepages_delay;
+ u64 thrashing_start;
+ u64 thrashing_delay;
+ u64 compact_start;
+ u64 compact_delay;
+ u64 wpcopy_start;
+ u64 wpcopy_delay;
+ u32 freepages_count;
+ u32 thrashing_count;
+ u32 compact_count;
+ u32 wpcopy_count;
+};
+
+struct cgroupstats {
+ __u64 nr_sleeping;
+ __u64 nr_running;
+ __u64 nr_stopped;
+ __u64 nr_uninterruptible;
+ __u64 nr_io_wait;
+};
+
+enum kernfs_node_type {
+ KERNFS_DIR = 1,
+ KERNFS_FILE = 2,
+ KERNFS_LINK = 4,
+};
+
+struct kernfs_syscall_ops {
+ int (*show_options)(struct seq_file *, struct kernfs_root *);
+ int (*mkdir)(struct kernfs_node *, const char *, umode_t);
+ int (*rmdir)(struct kernfs_node *);
+ int (*rename)(struct kernfs_node *, struct kernfs_node *, const char *);
+ int (*show_path)(struct seq_file *, struct kernfs_node *, struct kernfs_root *);
+};
+
+struct kernfs_fs_context {
+ struct kernfs_root *root;
+ void *ns_tag;
+ long unsigned int magic;
+ bool new_sb_created;
+};
+
+enum {
+ CGRP_NOTIFY_ON_RELEASE = 0,
+ CGRP_CPUSET_CLONE_CHILDREN = 1,
+ CGRP_FREEZE = 2,
+ CGRP_FROZEN = 3,
+ CGRP_KILL = 4,
+};
+
+enum {
+ CGRP_ROOT_NOPREFIX = 2,
+ CGRP_ROOT_XATTR = 4,
+ CGRP_ROOT_NS_DELEGATE = 8,
+ CGRP_ROOT_FAVOR_DYNMODS = 16,
+ CGRP_ROOT_CPUSET_V2_MODE = 65536,
+ CGRP_ROOT_MEMORY_LOCAL_EVENTS = 131072,
+ CGRP_ROOT_MEMORY_RECURSIVE_PROT = 262144,
+};
+
+enum {
+ CFTYPE_ONLY_ON_ROOT = 1,
+ CFTYPE_NOT_ON_ROOT = 2,
+ CFTYPE_NS_DELEGATABLE = 4,
+ CFTYPE_NO_PREFIX = 8,
+ CFTYPE_WORLD_WRITABLE = 16,
+ CFTYPE_DEBUG = 32,
+ __CFTYPE_ONLY_ON_DFL = 65536,
+ __CFTYPE_NOT_ON_DFL = 131072,
+ __CFTYPE_ADDED = 262144,
+};
+
+struct cgroup_taskset {
+ struct list_head src_csets;
+ struct list_head dst_csets;
+ int nr_tasks;
+ int ssid;
+ struct list_head *csets;
+ struct css_set *cur_cset;
+ struct task_struct *cur_task;
+};
+
+struct css_task_iter {
+ struct cgroup_subsys *ss;
+ unsigned int flags;
+ struct list_head *cset_pos;
+ struct list_head *cset_head;
+ struct list_head *tcset_pos;
+ struct list_head *tcset_head;
+ struct list_head *task_pos;
+ struct list_head *cur_tasks_head;
+ struct css_set *cur_cset;
+ struct css_set *cur_dcset;
+ struct task_struct *cur_task;
+ struct list_head iters_node;
+};
+
+struct cgroup_fs_context {
+ struct kernfs_fs_context kfc;
+ struct cgroup_root *root;
+ struct cgroup_namespace *ns;
+ unsigned int flags;
+ bool cpuset_clone_children;
+ bool none;
+ bool all_ss;
+ u16 subsys_mask;
+ char *name;
+ char *release_agent;
+};
+
+enum cgroup_filetype {
+ CGROUP_FILE_PROCS = 0,
+ CGROUP_FILE_TASKS = 1,
+};
+
+struct cgroup_pidlist {
+ struct {
+ enum cgroup_filetype type;
+ struct pid_namespace *ns;
+ } key;
+ pid_t *list;
+ int length;
+ struct list_head links;
+ struct cgroup *owner;
+ struct delayed_work destroy_dwork;
+};
+
+struct cgroup_file_ctx {
+ struct cgroup_namespace *ns;
+ struct {
+ void *trigger;
+ } psi;
+ struct {
+ bool started;
+ struct css_task_iter iter;
+ } procs;
+ struct {
+ struct cgroup_pidlist *pidlist;
+ } procs1;
+};
+
+struct cgrp_cset_link {
+ struct cgroup *cgrp;
+ struct css_set *cset;
+ struct list_head cset_link;
+ struct list_head cgrp_link;
+};
+
+struct cgroup_mgctx {
+ struct list_head preloaded_src_csets;
+ struct list_head preloaded_dst_csets;
+ struct cgroup_taskset tset;
+ u16 ss_mask;
+};
+
+enum cgroup1_param {
+ Opt_all = 0,
+ Opt_clone_children = 1,
+ Opt_cpuset_v2_mode = 2,
+ Opt_name = 3,
+ Opt_none = 4,
+ Opt_noprefix = 5,
+ Opt_release_agent = 6,
+ Opt_xattr = 7,
+ Opt_favordynmods = 8,
+ Opt_nofavordynmods = 9,
+};
+
+struct fdtable {
+ unsigned int max_fds;
+ struct file **fd;
+ long unsigned int *close_on_exec;
+ long unsigned int *open_fds;
+ long unsigned int *full_fds_bits;
+ struct callback_head rcu;
+};
+
+struct files_struct {
+ atomic_t count;
+ bool resize_in_progress;
+ wait_queue_head_t resize_wait;
+ struct fdtable *fdt;
+ struct fdtable fdtab;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ spinlock_t file_lock;
+ unsigned int next_fd;
+ long unsigned int close_on_exec_init[1];
+ long unsigned int open_fds_init[1];
+ long unsigned int full_fds_bits_init[1];
+ struct file *fd_array[64];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct bpf_local_storage_data;
+
+struct bpf_local_storage {
+ struct bpf_local_storage_data *cache[16];
+ struct hlist_head list;
+ void *owner;
+ struct callback_head rcu;
+ raw_spinlock_t lock;
+};
+
+enum {
+ BPF_ANY = 0,
+ BPF_NOEXIST = 1,
+ BPF_EXIST = 2,
+ BPF_F_LOCK = 4,
+};
+
+enum {
+ BPF_LOCAL_STORAGE_GET_F_CREATE = 1,
+ BPF_SK_STORAGE_GET_F_CREATE = 1,
+};
+
+enum {
+ BTF_TRACING_TYPE_TASK = 0,
+ BTF_TRACING_TYPE_FILE = 1,
+ BTF_TRACING_TYPE_VMA = 2,
+ MAX_BTF_TRACING_TYPE = 3,
+};
+
+struct bpf_local_storage_map_bucket;
+
+struct bpf_local_storage_map {
+ struct bpf_map map;
+ struct bpf_local_storage_map_bucket *buckets;
+ u32 bucket_log;
+ u16 elem_size;
+ u16 cache_idx;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct bpf_local_storage_map_bucket {
+ struct hlist_head list;
+ raw_spinlock_t lock;
+};
+
+struct bpf_local_storage_data {
+ struct bpf_local_storage_map *smap;
+ u8 data[0];
+};
+
+struct bpf_local_storage_elem {
+ struct hlist_node map_node;
+ struct hlist_node snode;
+ struct bpf_local_storage *local_storage;
+ struct callback_head rcu;
+ long: 64;
+ struct bpf_local_storage_data sdata;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct bpf_local_storage_cache {
+ spinlock_t idx_lock;
+ u64 idx_usage_counts[16];
+};
+
+typedef u64 (*btf_bpf_task_storage_get_recur)(struct bpf_map *, struct task_struct *, void *, u64, gfp_t);
+
+typedef u64 (*btf_bpf_task_storage_get)(struct bpf_map *, struct task_struct *, void *, u64, gfp_t);
+
+typedef u64 (*btf_bpf_task_storage_delete_recur)(struct bpf_map *, struct task_struct *);
+
+typedef u64 (*btf_bpf_task_storage_delete)(struct bpf_map *, struct task_struct *);
+
+typedef struct {
+ int val[2];
+} __kernel_fsid_t;
+
+struct __large_struct {
+ long unsigned int buf[100];
+};
+
+typedef struct fsnotify_mark_connector *fsnotify_connp_t;
+
+struct fsnotify_mark_connector {
+ spinlock_t lock;
+ short unsigned int type;
+ short unsigned int flags;
+ __kernel_fsid_t fsid;
+ union {
+ fsnotify_connp_t *obj;
+ struct fsnotify_mark_connector *destroy_next;
+ };
+ struct hlist_head list;
+};
+
+struct fd {
+ struct file *file;
+ unsigned int flags;
+};
+
+enum fsnotify_data_type {
+ FSNOTIFY_EVENT_NONE = 0,
+ FSNOTIFY_EVENT_PATH = 1,
+ FSNOTIFY_EVENT_INODE = 2,
+ FSNOTIFY_EVENT_DENTRY = 3,
+ FSNOTIFY_EVENT_ERROR = 4,
+};
+
+struct linux_dirent64 {
+ u64 d_ino;
+ s64 d_off;
+ short unsigned int d_reclen;
+ unsigned char d_type;
+ char d_name[0];
+};
+
+struct old_linux_dirent {
+ long unsigned int d_ino;
+ long unsigned int d_offset;
+ short unsigned int d_namlen;
+ char d_name[1];
+};
+
+struct readdir_callback {
+ struct dir_context ctx;
+ struct old_linux_dirent *dirent;
+ int result;
+};
+
+struct linux_dirent {
+ long unsigned int d_ino;
+ long unsigned int d_off;
+ short unsigned int d_reclen;
+ char d_name[1];
+};
+
+struct getdents_callback {
+ struct dir_context ctx;
+ struct linux_dirent *current_dir;
+ int prev_reclen;
+ int count;
+ int error;
+};
+
+struct getdents_callback64 {
+ struct dir_context ctx;
+ struct linux_dirent64 *current_dir;
+ int prev_reclen;
+ int count;
+ int error;
+};
+
+typedef int get_block_t(struct inode *, sector_t, struct buffer_head *, int);
+
+struct bvec_iter_all {
+ struct bio_vec bv;
+ int idx;
+ unsigned int done;
+};
+
+enum mapping_flags {
+ AS_EIO = 0,
+ AS_ENOSPC = 1,
+ AS_MM_ALL_LOCKS = 2,
+ AS_UNEVICTABLE = 3,
+ AS_EXITING = 4,
+ AS_NO_WRITEBACK_TAGS = 5,
+ AS_LARGE_FOLIO_SUPPORT = 6,
+};
+
+typedef int (*writepage_t)(struct page *, struct writeback_control *, void *);
+
+struct mpage_readpage_args {
+ struct bio *bio;
+ struct folio *folio;
+ unsigned int nr_pages;
+ bool is_readahead;
+ sector_t last_block_in_bio;
+ struct buffer_head map_bh;
+ long unsigned int first_logical_block;
+ get_block_t *get_block;
+};
+
+struct mpage_data {
+ struct bio *bio;
+ sector_t last_block_in_bio;
+ get_block_t *get_block;
+};
+
+struct seccomp_data {
+ int nr;
+ __u32 arch;
+ __u64 instruction_pointer;
+ __u64 args[6];
+};
+
+enum proc_hidepid {
+ HIDEPID_OFF = 0,
+ HIDEPID_NO_ACCESS = 1,
+ HIDEPID_INVISIBLE = 2,
+ HIDEPID_NOT_PTRACEABLE = 4,
+};
+
+enum proc_pidonly {
+ PROC_PIDONLY_OFF = 0,
+ PROC_PIDONLY_ON = 1,
+};
+
+struct proc_fs_info {
+ struct pid_namespace *pid_ns;
+ struct dentry *proc_self;
+ struct dentry *proc_thread_self;
+ kgid_t pid_gid;
+ enum proc_hidepid hide_pid;
+ enum proc_pidonly pidonly;
+};
+
+struct genradix_root;
+
+struct __genradix {
+ struct genradix_root *root;
+};
+
+struct timens_offsets {
+ struct timespec64 monotonic;
+ struct timespec64 boottime;
+};
+
+struct time_namespace {
+ struct user_namespace *user_ns;
+ struct ucounts *ucounts;
+ struct ns_common ns;
+ struct timens_offsets offsets;
+ struct page *vvar_page;
+ bool frozen_offsets;
+};
+
+struct syscall_info {
+ __u64 sp;
+ struct seccomp_data data;
+};
+
+struct proc_timens_offset {
+ int clockid;
+ struct timespec64 val;
+};
+
+enum resctrl_conf_type {
+ CDP_NONE = 0,
+ CDP_CODE = 1,
+ CDP_DATA = 2,
+};
+
+struct pid_entry {
+ const char *name;
+ unsigned int len;
+ umode_t mode;
+ const struct inode_operations *iop;
+ const struct file_operations *fop;
+ union proc_op op;
+};
+
+struct limit_names {
+ const char *name;
+ const char *unit;
+};
+
+struct map_files_info {
+ long unsigned int start;
+ long unsigned int end;
+ fmode_t mode;
+};
+
+struct tgid_iter {
+ unsigned int tgid;
+ struct task_struct *task;
+};
+
+typedef unsigned int zap_flags_t;
+
+enum migrate_reason {
+ MR_COMPACTION = 0,
+ MR_MEMORY_FAILURE = 1,
+ MR_MEMORY_HOTPLUG = 2,
+ MR_SYSCALL = 3,
+ MR_MEMPOLICY_MBIND = 4,
+ MR_NUMA_MISPLACED = 5,
+ MR_CONTIG_RANGE = 6,
+ MR_LONGTERM_PIN = 7,
+ MR_DEMOTION = 8,
+ MR_TYPES = 9,
+};
+
+struct kstatfs {
+ long int f_type;
+ long int f_bsize;
+ u64 f_blocks;
+ u64 f_bfree;
+ u64 f_bavail;
+ u64 f_files;
+ u64 f_ffree;
+ __kernel_fsid_t f_fsid;
+ long int f_namelen;
+ long int f_frsize;
+ long int f_flags;
+ long int f_spare[4];
+};
+
+struct vm_unmapped_area_info {
+ long unsigned int flags;
+ long unsigned int length;
+ long unsigned int low_limit;
+ long unsigned int high_limit;
+ long unsigned int align_mask;
+ long unsigned int align_offset;
+};
+
+enum {
+ SUBPAGE_INDEX_SUBPOOL = 1,
+ SUBPAGE_INDEX_CGROUP = 2,
+ SUBPAGE_INDEX_CGROUP_RSVD = 3,
+ __MAX_CGROUP_SUBPAGE_INDEX = 3,
+ SUBPAGE_INDEX_HWPOISON = 4,
+ __NR_USED_SUBPAGE = 5,
+};
+
+struct resv_map {
+ struct kref refs;
+ spinlock_t lock;
+ struct list_head regions;
+ long int adds_in_progress;
+ struct list_head region_cache;
+ long int region_cache_count;
+ struct page_counter *reservation_counter;
+ long unsigned int pages_per_hpage;
+ struct cgroup_subsys_state *css;
+};
+
+struct hugetlb_vma_lock {
+ struct kref refs;
+ struct rw_semaphore rw_sema;
+ struct vm_area_struct *vma;
+};
+
+struct hugetlbfs_inode_info {
+ struct shared_policy policy;
+ struct inode vfs_inode;
+ unsigned int seals;
+};
+
+enum hugetlb_page_flags {
+ HPG_restore_reserve = 0,
+ HPG_migratable = 1,
+ HPG_temporary = 2,
+ HPG_freed = 3,
+ HPG_vmemmap_optimized = 4,
+ HPG_raw_hwp_unreliable = 5,
+ __NR_HPAGEFLAGS = 6,
+};
+
+struct pagevec {
+ unsigned char nr;
+ bool percpu_pvec_drained;
+ struct page *pages[15];
+};
+
+struct folio_batch {
+ unsigned char nr;
+ bool percpu_pvec_drained;
+ struct folio *folios[15];
+};
+
+enum hugetlbfs_size_type {
+ NO_SIZE = 0,
+ SIZE_STD = 1,
+ SIZE_PERCENT = 2,
+};
+
+struct hugetlbfs_fs_context {
+ struct hstate *hstate;
+ long long unsigned int max_size_opt;
+ long long unsigned int min_size_opt;
+ long int max_hpages;
+ long int nr_inodes;
+ long int min_hpages;
+ enum hugetlbfs_size_type max_val_type;
+ enum hugetlbfs_size_type min_val_type;
+ kuid_t uid;
+ kgid_t gid;
+ umode_t mode;
+};
+
+enum hugetlb_param {
+ Opt_gid = 0,
+ Opt_min_size = 1,
+ Opt_mode = 2,
+ Opt_nr_inodes = 3,
+ Opt_pagesize = 4,
+ Opt_size = 5,
+ Opt_uid = 6,
+};
+
+struct word_at_a_time {
+ const long unsigned int one_bits;
+ const long unsigned int high_bits;
+};
+
+typedef u16 uint16_t;
+
+enum con_scroll {
+ SM_UP = 0,
+ SM_DOWN = 1,
+};
+
+enum vc_intensity {
+ VCI_HALF_BRIGHT = 0,
+ VCI_NORMAL = 1,
+ VCI_BOLD = 2,
+ VCI_MASK = 3,
+};
+
+struct vc_data;
+
+struct console_font;
+
+struct consw {
+ struct module *owner;
+ const char * (*con_startup)();
+ void (*con_init)(struct vc_data *, int);
+ void (*con_deinit)(struct vc_data *);
+ void (*con_clear)(struct vc_data *, int, int, int, int);
+ void (*con_putc)(struct vc_data *, int, int, int);
+ void (*con_putcs)(struct vc_data *, const short unsigned int *, int, int, int);
+ void (*con_cursor)(struct vc_data *, int);
+ bool (*con_scroll)(struct vc_data *, unsigned int, unsigned int, enum con_scroll, unsigned int);
+ int (*con_switch)(struct vc_data *);
+ int (*con_blank)(struct vc_data *, int, int);
+ int (*con_font_set)(struct vc_data *, struct console_font *, unsigned int);
+ int (*con_font_get)(struct vc_data *, struct console_font *);
+ int (*con_font_default)(struct vc_data *, struct console_font *, char *);
+ int (*con_resize)(struct vc_data *, unsigned int, unsigned int, unsigned int);
+ void (*con_set_palette)(struct vc_data *, const unsigned char *);
+ void (*con_scrolldelta)(struct vc_data *, int);
+ int (*con_set_origin)(struct vc_data *);
+ void (*con_save_screen)(struct vc_data *);
+ u8 (*con_build_attr)(struct vc_data *, u8, enum vc_intensity, bool, bool, bool, bool);
+ void (*con_invert_region)(struct vc_data *, u16 *, int);
+ u16 * (*con_screen_pos)(const struct vc_data *, int);
+ long unsigned int (*con_getxy)(struct vc_data *, long unsigned int, int *, int *);
+ void (*con_flush_scrollback)(struct vc_data *);
+ int (*con_debug_enter)(struct vc_data *);
+ int (*con_debug_leave)(struct vc_data *);
+};
+
+struct vc_state {
+ unsigned int x;
+ unsigned int y;
+ unsigned char color;
+ unsigned char Gx_charset[2];
+ unsigned int charset: 1;
+ enum vc_intensity intensity;
+ bool italic;
+ bool underline;
+ bool blink;
+ bool reverse;
+};
+
+struct console_font {
+ unsigned int width;
+ unsigned int height;
+ unsigned int charcount;
+ unsigned char *data;
+};
+
+struct vt_mode {
+ char mode;
+ char waitv;
+ short int relsig;
+ short int acqsig;
+ short int frsig;
+};
+
+struct uni_pagedict;
+
+struct uni_screen;
+
+struct vc_data {
+ struct tty_port port;
+ struct vc_state state;
+ struct vc_state saved_state;
+ short unsigned int vc_num;
+ unsigned int vc_cols;
+ unsigned int vc_rows;
+ unsigned int vc_size_row;
+ unsigned int vc_scan_lines;
+ unsigned int vc_cell_height;
+ long unsigned int vc_origin;
+ long unsigned int vc_scr_end;
+ long unsigned int vc_visible_origin;
+ unsigned int vc_top;
+ unsigned int vc_bottom;
+ const struct consw *vc_sw;
+ short unsigned int *vc_screenbuf;
+ unsigned int vc_screenbuf_size;
+ unsigned char vc_mode;
+ unsigned char vc_attr;
+ unsigned char vc_def_color;
+ unsigned char vc_ulcolor;
+ unsigned char vc_itcolor;
+ unsigned char vc_halfcolor;
+ unsigned int vc_cursor_type;
+ short unsigned int vc_complement_mask;
+ short unsigned int vc_s_complement_mask;
+ long unsigned int vc_pos;
+ short unsigned int vc_hi_font_mask;
+ struct console_font vc_font;
+ short unsigned int vc_video_erase_char;
+ unsigned int vc_state;
+ unsigned int vc_npar;
+ unsigned int vc_par[16];
+ struct vt_mode vt_mode;
+ struct pid *vt_pid;
+ int vt_newvt;
+ wait_queue_head_t paste_wait;
+ unsigned int vc_disp_ctrl: 1;
+ unsigned int vc_toggle_meta: 1;
+ unsigned int vc_decscnm: 1;
+ unsigned int vc_decom: 1;
+ unsigned int vc_decawm: 1;
+ unsigned int vc_deccm: 1;
+ unsigned int vc_decim: 1;
+ unsigned int vc_priv: 3;
+ unsigned int vc_need_wrap: 1;
+ unsigned int vc_can_do_color: 1;
+ unsigned int vc_report_mouse: 2;
+ unsigned char vc_utf: 1;
+ unsigned char vc_utf_count;
+ int vc_utf_char;
+ long unsigned int vc_tab_stop[4];
+ unsigned char vc_palette[48];
+ short unsigned int *vc_translate;
+ unsigned int vc_resize_user;
+ unsigned int vc_bell_pitch;
+ unsigned int vc_bell_duration;
+ short unsigned int vc_cur_blink_ms;
+ struct vc_data **vc_display_fg;
+ struct uni_pagedict *uni_pagedict;
+ struct uni_pagedict **uni_pagedict_loc;
+ struct uni_screen *vc_uni_screen;
+};
+
+struct vc {
+ struct vc_data *d;
+ struct work_struct SAK_work;
+};
+
+struct vgastate {
+ void *vgabase;
+ long unsigned int membase;
+ __u32 memsize;
+ __u32 flags;
+ __u32 depth;
+ __u32 num_attr;
+ __u32 num_crtc;
+ __u32 num_gfx;
+ __u32 num_seq;
+ void *vidstate;
+};
+
+struct of_phandle_args {
+ struct device_node *np;
+ int args_count;
+ uint32_t args[16];
+};
+
+typedef u64 acpi_physical_address;
+
+typedef u64 acpi_integer;
+
+typedef u8 acpi_adr_space_type;
+
+typedef acpi_status (*acpi_adr_space_handler)(u32, acpi_physical_address, u32, u64 *, void *, void *);
+
+struct acpi_pcc_info {
+ u8 subspace_id;
+ u16 length;
+ u8 *internal_buffer;
+};
+
+typedef acpi_status (*acpi_adr_space_setup)(acpi_handle, u32, void *, void **);
+
+struct mbox_chan;
+
+struct mbox_chan_ops {
+ int (*send_data)(struct mbox_chan *, void *);
+ int (*flush)(struct mbox_chan *, long unsigned int);
+ int (*startup)(struct mbox_chan *);
+ void (*shutdown)(struct mbox_chan *);
+ bool (*last_tx_done)(struct mbox_chan *);
+ bool (*peek_data)(struct mbox_chan *);
+};
+
+struct mbox_controller;
+
+struct mbox_client;
+
+struct mbox_chan {
+ struct mbox_controller *mbox;
+ unsigned int txdone_method;
+ struct mbox_client *cl;
+ struct completion tx_complete;
+ void *active_req;
+ unsigned int msg_count;
+ unsigned int msg_free;
+ void *msg_data[20];
+ spinlock_t lock;
+ void *con_priv;
+};
+
+struct mbox_controller {
+ struct device *dev;
+ const struct mbox_chan_ops *ops;
+ struct mbox_chan *chans;
+ int num_chans;
+ bool txdone_irq;
+ bool txdone_poll;
+ unsigned int txpoll_period;
+ struct mbox_chan * (*of_xlate)(struct mbox_controller *, const struct of_phandle_args *);
+ struct hrtimer poll_hrt;
+ spinlock_t poll_hrt_lock;
+ struct list_head node;
+};
+
+struct mbox_client {
+ struct device *dev;
+ bool tx_block;
+ long unsigned int tx_tout;
+ bool knows_txdone;
+ void (*rx_callback)(struct mbox_client *, void *);
+ void (*tx_prepare)(struct mbox_client *, void *);
+ void (*tx_done)(struct mbox_client *, void *, int);
+};
+
+struct pcc_mbox_chan {
+ struct mbox_chan *mchan;
+ u64 shmem_base_addr;
+ u64 shmem_size;
+ u32 latency;
+ u32 max_access_rate;
+ u16 min_turnaround_time;
+};
+
+struct pcc_data {
+ struct pcc_mbox_chan *pcc_chan;
+ void *pcc_comm_addr;
+ struct completion done;
+ struct mbox_client cl;
+ struct acpi_pcc_info ctx;
+};
+
+struct acpi_rsconvert_info {
+ u8 opcode;
+ u8 resource_offset;
+ u8 aml_offset;
+ u8 value;
+};
+
+enum {
+ ACPI_RSC_INITGET = 0,
+ ACPI_RSC_INITSET = 1,
+ ACPI_RSC_FLAGINIT = 2,
+ ACPI_RSC_1BITFLAG = 3,
+ ACPI_RSC_2BITFLAG = 4,
+ ACPI_RSC_3BITFLAG = 5,
+ ACPI_RSC_6BITFLAG = 6,
+ ACPI_RSC_ADDRESS = 7,
+ ACPI_RSC_BITMASK = 8,
+ ACPI_RSC_BITMASK16 = 9,
+ ACPI_RSC_COUNT = 10,
+ ACPI_RSC_COUNT16 = 11,
+ ACPI_RSC_COUNT_GPIO_PIN = 12,
+ ACPI_RSC_COUNT_GPIO_RES = 13,
+ ACPI_RSC_COUNT_GPIO_VEN = 14,
+ ACPI_RSC_COUNT_SERIAL_RES = 15,
+ ACPI_RSC_COUNT_SERIAL_VEN = 16,
+ ACPI_RSC_DATA8 = 17,
+ ACPI_RSC_EXIT_EQ = 18,
+ ACPI_RSC_EXIT_LE = 19,
+ ACPI_RSC_EXIT_NE = 20,
+ ACPI_RSC_LENGTH = 21,
+ ACPI_RSC_MOVE_GPIO_PIN = 22,
+ ACPI_RSC_MOVE_GPIO_RES = 23,
+ ACPI_RSC_MOVE_SERIAL_RES = 24,
+ ACPI_RSC_MOVE_SERIAL_VEN = 25,
+ ACPI_RSC_MOVE8 = 26,
+ ACPI_RSC_MOVE16 = 27,
+ ACPI_RSC_MOVE32 = 28,
+ ACPI_RSC_MOVE64 = 29,
+ ACPI_RSC_SET8 = 30,
+ ACPI_RSC_SOURCE = 31,
+ ACPI_RSC_SOURCEX = 32,
+};
+
+typedef u16 acpi_owner_id;
+
+typedef u32 (*acpi_gpe_handler)(acpi_handle, u32, void *);
+
+typedef void (*acpi_notify_handler)(acpi_handle, u32, void *);
+
+typedef void (*acpi_object_handler)(acpi_handle, void *);
+
+union acpi_name_union {
+ u32 integer;
+ char ascii[4];
+};
+
+struct acpi_vendor_uuid {
+ u8 subtype;
+ u8 data[16];
+};
+
+struct acpi_resource_irq {
+ u8 descriptor_length;
+ u8 triggering;
+ u8 polarity;
+ u8 shareable;
+ u8 wake_capable;
+ u8 interrupt_count;
+ u8 interrupts[1];
+};
+
+struct acpi_resource_dma {
+ u8 type;
+ u8 bus_master;
+ u8 transfer;
+ u8 channel_count;
+ u8 channels[1];
+};
+
+struct acpi_resource_start_dependent {
+ u8 descriptor_length;
+ u8 compatibility_priority;
+ u8 performance_robustness;
+};
+
+struct acpi_resource_io {
+ u8 io_decode;
+ u8 alignment;
+ u8 address_length;
+ u16 minimum;
+ u16 maximum;
+} __attribute__((packed));
+
+struct acpi_resource_fixed_io {
+ u16 address;
+ u8 address_length;
+} __attribute__((packed));
+
+struct acpi_resource_fixed_dma {
+ u16 request_lines;
+ u16 channels;
+ u8 width;
+} __attribute__((packed));
+
+struct acpi_resource_vendor {
+ u16 byte_length;
+ u8 byte_data[1];
+} __attribute__((packed));
+
+struct acpi_resource_vendor_typed {
+ u16 byte_length;
+ u8 uuid_subtype;
+ u8 uuid[16];
+ u8 byte_data[1];
+};
+
+struct acpi_resource_end_tag {
+ u8 checksum;
+};
+
+struct acpi_resource_memory24 {
+ u8 write_protect;
+ u16 minimum;
+ u16 maximum;
+ u16 alignment;
+ u16 address_length;
+} __attribute__((packed));
+
+struct acpi_resource_memory32 {
+ u8 write_protect;
+ u32 minimum;
+ u32 maximum;
+ u32 alignment;
+ u32 address_length;
+} __attribute__((packed));
+
+struct acpi_resource_fixed_memory32 {
+ u8 write_protect;
+ u32 address;
+ u32 address_length;
+} __attribute__((packed));
+
+struct acpi_memory_attribute {
+ u8 write_protect;
+ u8 caching;
+ u8 range_type;
+ u8 translation;
+};
+
+struct acpi_io_attribute {
+ u8 range_type;
+ u8 translation;
+ u8 translation_type;
+ u8 reserved1;
+};
+
+union acpi_resource_attribute {
+ struct acpi_memory_attribute mem;
+ struct acpi_io_attribute io;
+ u8 type_specific;
+};
+
+struct acpi_resource_label {
+ u16 string_length;
+ char *string_ptr;
+} __attribute__((packed));
+
+struct acpi_resource_source {
+ u8 index;
+ u16 string_length;
+ char *string_ptr;
+} __attribute__((packed));
+
+struct acpi_address16_attribute {
+ u16 granularity;
+ u16 minimum;
+ u16 maximum;
+ u16 translation_offset;
+ u16 address_length;
+};
+
+struct acpi_address32_attribute {
+ u32 granularity;
+ u32 minimum;
+ u32 maximum;
+ u32 translation_offset;
+ u32 address_length;
+};
+
+struct acpi_address64_attribute {
+ u64 granularity;
+ u64 minimum;
+ u64 maximum;
+ u64 translation_offset;
+ u64 address_length;
+};
+
+struct acpi_resource_address {
+ u8 resource_type;
+ u8 producer_consumer;
+ u8 decode;
+ u8 min_address_fixed;
+ u8 max_address_fixed;
+ union acpi_resource_attribute info;
+};
+
+struct acpi_resource_address16 {
+ u8 resource_type;
+ u8 producer_consumer;
+ u8 decode;
+ u8 min_address_fixed;
+ u8 max_address_fixed;
+ union acpi_resource_attribute info;
+ struct acpi_address16_attribute address;
+ struct acpi_resource_source resource_source;
+} __attribute__((packed));
+
+struct acpi_resource_address32 {
+ u8 resource_type;
+ u8 producer_consumer;
+ u8 decode;
+ u8 min_address_fixed;
+ u8 max_address_fixed;
+ union acpi_resource_attribute info;
+ struct acpi_address32_attribute address;
+ struct acpi_resource_source resource_source;
+} __attribute__((packed));
+
+struct acpi_resource_address64 {
+ u8 resource_type;
+ u8 producer_consumer;
+ u8 decode;
+ u8 min_address_fixed;
+ u8 max_address_fixed;
+ union acpi_resource_attribute info;
+ struct acpi_address64_attribute address;
+ struct acpi_resource_source resource_source;
+} __attribute__((packed));
+
+struct acpi_resource_extended_address64 {
+ u8 resource_type;
+ u8 producer_consumer;
+ u8 decode;
+ u8 min_address_fixed;
+ u8 max_address_fixed;
+ union acpi_resource_attribute info;
+ u8 revision_ID;
+ struct acpi_address64_attribute address;
+ u64 type_specific;
+} __attribute__((packed));
+
+struct acpi_resource_extended_irq {
+ u8 producer_consumer;
+ u8 triggering;
+ u8 polarity;
+ u8 shareable;
+ u8 wake_capable;
+ u8 interrupt_count;
+ struct acpi_resource_source resource_source;
+ u32 interrupts[1];
+} __attribute__((packed));
+
+struct acpi_resource_generic_register {
+ u8 space_id;
+ u8 bit_width;
+ u8 bit_offset;
+ u8 access_size;
+ u64 address;
+} __attribute__((packed));
+
+struct acpi_resource_gpio {
+ u8 revision_id;
+ u8 connection_type;
+ u8 producer_consumer;
+ u8 pin_config;
+ u8 shareable;
+ u8 wake_capable;
+ u8 io_restriction;
+ u8 triggering;
+ u8 polarity;
+ u16 drive_strength;
+ u16 debounce_timeout;
+ u16 pin_table_length;
+ u16 vendor_length;
+ struct acpi_resource_source resource_source;
+ u16 *pin_table;
+ u8 *vendor_data;
+} __attribute__((packed));
+
+struct acpi_resource_common_serialbus {
+ u8 revision_id;
+ u8 type;
+ u8 producer_consumer;
+ u8 slave_mode;
+ u8 connection_sharing;
+ u8 type_revision_id;
+ u16 type_data_length;
+ u16 vendor_length;
+ struct acpi_resource_source resource_source;
+ u8 *vendor_data;
+} __attribute__((packed));
+
+struct acpi_resource_i2c_serialbus {
+ u8 revision_id;
+ u8 type;
+ u8 producer_consumer;
+ u8 slave_mode;
+ u8 connection_sharing;
+ u8 type_revision_id;
+ u16 type_data_length;
+ u16 vendor_length;
+ struct acpi_resource_source resource_source;
+ u8 *vendor_data;
+ u8 access_mode;
+ u16 slave_address;
+ u32 connection_speed;
+} __attribute__((packed));
+
+struct acpi_resource_spi_serialbus {
+ u8 revision_id;
+ u8 type;
+ u8 producer_consumer;
+ u8 slave_mode;
+ u8 connection_sharing;
+ u8 type_revision_id;
+ u16 type_data_length;
+ u16 vendor_length;
+ struct acpi_resource_source resource_source;
+ u8 *vendor_data;
+ u8 wire_mode;
+ u8 device_polarity;
+ u8 data_bit_length;
+ u8 clock_phase;
+ u8 clock_polarity;
+ u16 device_selection;
+ u32 connection_speed;
+} __attribute__((packed));
+
+struct acpi_resource_uart_serialbus {
+ u8 revision_id;
+ u8 type;
+ u8 producer_consumer;
+ u8 slave_mode;
+ u8 connection_sharing;
+ u8 type_revision_id;
+ u16 type_data_length;
+ u16 vendor_length;
+ struct acpi_resource_source resource_source;
+ u8 *vendor_data;
+ u8 endian;
+ u8 data_bits;
+ u8 stop_bits;
+ u8 flow_control;
+ u8 parity;
+ u8 lines_enabled;
+ u16 rx_fifo_size;
+ u16 tx_fifo_size;
+ u32 default_baud_rate;
+} __attribute__((packed));
+
+struct acpi_resource_csi2_serialbus {
+ u8 revision_id;
+ u8 type;
+ u8 producer_consumer;
+ u8 slave_mode;
+ u8 connection_sharing;
+ u8 type_revision_id;
+ u16 type_data_length;
+ u16 vendor_length;
+ struct acpi_resource_source resource_source;
+ u8 *vendor_data;
+ u8 local_port_instance;
+ u8 phy_type;
+} __attribute__((packed));
+
+struct acpi_resource_pin_function {
+ u8 revision_id;
+ u8 pin_config;
+ u8 shareable;
+ u16 function_number;
+ u16 pin_table_length;
+ u16 vendor_length;
+ struct acpi_resource_source resource_source;
+ u16 *pin_table;
+ u8 *vendor_data;
+} __attribute__((packed));
+
+struct acpi_resource_pin_config {
+ u8 revision_id;
+ u8 producer_consumer;
+ u8 shareable;
+ u8 pin_config_type;
+ u32 pin_config_value;
+ u16 pin_table_length;
+ u16 vendor_length;
+ struct acpi_resource_source resource_source;
+ u16 *pin_table;
+ u8 *vendor_data;
+} __attribute__((packed));
+
+struct acpi_resource_pin_group {
+ u8 revision_id;
+ u8 producer_consumer;
+ u16 pin_table_length;
+ u16 vendor_length;
+ u16 *pin_table;
+ struct acpi_resource_label resource_label;
+ u8 *vendor_data;
+} __attribute__((packed));
+
+struct acpi_resource_pin_group_function {
+ u8 revision_id;
+ u8 producer_consumer;
+ u8 shareable;
+ u16 function_number;
+ u16 vendor_length;
+ struct acpi_resource_source resource_source;
+ struct acpi_resource_label resource_source_label;
+ u8 *vendor_data;
+} __attribute__((packed));
+
+struct acpi_resource_pin_group_config {
+ u8 revision_id;
+ u8 producer_consumer;
+ u8 shareable;
+ u8 pin_config_type;
+ u32 pin_config_value;
+ u16 vendor_length;
+ struct acpi_resource_source resource_source;
+ struct acpi_resource_label resource_source_label;
+ u8 *vendor_data;
+} __attribute__((packed));
+
+union acpi_resource_data {
+ struct acpi_resource_irq irq;
+ struct acpi_resource_dma dma;
+ struct acpi_resource_start_dependent start_dpf;
+ struct acpi_resource_io io;
+ struct acpi_resource_fixed_io fixed_io;
+ struct acpi_resource_fixed_dma fixed_dma;
+ struct acpi_resource_vendor vendor;
+ struct acpi_resource_vendor_typed vendor_typed;
+ struct acpi_resource_end_tag end_tag;
+ struct acpi_resource_memory24 memory24;
+ struct acpi_resource_memory32 memory32;
+ struct acpi_resource_fixed_memory32 fixed_memory32;
+ struct acpi_resource_address16 address16;
+ struct acpi_resource_address32 address32;
+ struct acpi_resource_address64 address64;
+ struct acpi_resource_extended_address64 ext_address64;
+ struct acpi_resource_extended_irq extended_irq;
+ struct acpi_resource_generic_register generic_reg;
+ struct acpi_resource_gpio gpio;
+ struct acpi_resource_i2c_serialbus i2c_serial_bus;
+ struct acpi_resource_spi_serialbus spi_serial_bus;
+ struct acpi_resource_uart_serialbus uart_serial_bus;
+ struct acpi_resource_csi2_serialbus csi2_serial_bus;
+ struct acpi_resource_common_serialbus common_serial_bus;
+ struct acpi_resource_pin_function pin_function;
+ struct acpi_resource_pin_config pin_config;
+ struct acpi_resource_pin_group pin_group;
+ struct acpi_resource_pin_group_function pin_group_function;
+ struct acpi_resource_pin_group_config pin_group_config;
+ struct acpi_resource_address address;
+};
+
+struct acpi_resource {
+ u32 type;
+ u32 length;
+ union acpi_resource_data data;
+} __attribute__((packed));
+
+typedef acpi_status (*acpi_walk_resource_callback)(struct acpi_resource *, void *);
+
+union acpi_operand_object;
+
+struct acpi_namespace_node {
+ union acpi_operand_object *object;
+ u8 descriptor_type;
+ u8 type;
+ u16 flags;
+ union acpi_name_union name;
+ struct acpi_namespace_node *parent;
+ struct acpi_namespace_node *child;
+ struct acpi_namespace_node *peer;
+ acpi_owner_id owner_id;
+};
+
+struct acpi_object_common {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+};
+
+struct acpi_object_integer {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ u8 fill[3];
+ u64 value;
+};
+
+struct acpi_object_string {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ char *pointer;
+ u32 length;
+};
+
+struct acpi_object_buffer {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ u8 *pointer;
+ u32 length;
+ u32 aml_length;
+ u8 *aml_start;
+ struct acpi_namespace_node *node;
+};
+
+struct acpi_object_package {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ struct acpi_namespace_node *node;
+ union acpi_operand_object **elements;
+ u8 *aml_start;
+ u32 aml_length;
+ u32 count;
+};
+
+struct acpi_object_event {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ void *os_semaphore;
+};
+
+struct acpi_walk_state;
+
+typedef acpi_status (*acpi_internal_method)(struct acpi_walk_state *);
+
+struct acpi_object_method {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ u8 info_flags;
+ u8 param_count;
+ u8 sync_level;
+ union acpi_operand_object *mutex;
+ union acpi_operand_object *node;
+ u8 *aml_start;
+ union {
+ acpi_internal_method implementation;
+ union acpi_operand_object *handler;
+ } dispatch;
+ u32 aml_length;
+ acpi_owner_id owner_id;
+ u8 thread_count;
+};
+
+struct acpi_thread_state;
+
+struct acpi_object_mutex {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ u8 sync_level;
+ u16 acquisition_depth;
+ void *os_mutex;
+ u64 thread_id;
+ struct acpi_thread_state *owner_thread;
+ union acpi_operand_object *prev;
+ union acpi_operand_object *next;
+ struct acpi_namespace_node *node;
+ u8 original_sync_level;
+};
+
+struct acpi_object_region {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ u8 space_id;
+ struct acpi_namespace_node *node;
+ union acpi_operand_object *handler;
+ union acpi_operand_object *next;
+ acpi_physical_address address;
+ u32 length;
+ void *pointer;
+};
+
+struct acpi_object_notify_common {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ union acpi_operand_object *notify_list[2];
+ union acpi_operand_object *handler;
+};
+
+struct acpi_gpe_block_info;
+
+struct acpi_object_device {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ union acpi_operand_object *notify_list[2];
+ union acpi_operand_object *handler;
+ struct acpi_gpe_block_info *gpe_block;
+};
+
+struct acpi_object_power_resource {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ union acpi_operand_object *notify_list[2];
+ union acpi_operand_object *handler;
+ u32 system_level;
+ u32 resource_order;
+};
+
+struct acpi_object_processor {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ u8 proc_id;
+ u8 length;
+ union acpi_operand_object *notify_list[2];
+ union acpi_operand_object *handler;
+ acpi_io_address address;
+};
+
+struct acpi_object_thermal_zone {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ union acpi_operand_object *notify_list[2];
+ union acpi_operand_object *handler;
+};
+
+struct acpi_object_field_common {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ u8 field_flags;
+ u8 attribute;
+ u8 access_byte_width;
+ struct acpi_namespace_node *node;
+ u32 bit_length;
+ u32 base_byte_offset;
+ u32 value;
+ u8 start_field_bit_offset;
+ u8 access_length;
+ union acpi_operand_object *region_obj;
+};
+
+struct acpi_object_region_field {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ u8 field_flags;
+ u8 attribute;
+ u8 access_byte_width;
+ struct acpi_namespace_node *node;
+ u32 bit_length;
+ u32 base_byte_offset;
+ u32 value;
+ u8 start_field_bit_offset;
+ u8 access_length;
+ u16 resource_length;
+ union acpi_operand_object *region_obj;
+ u8 *resource_buffer;
+ u16 pin_number_index;
+ u8 *internal_pcc_buffer;
+};
+
+struct acpi_object_buffer_field {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ u8 field_flags;
+ u8 attribute;
+ u8 access_byte_width;
+ struct acpi_namespace_node *node;
+ u32 bit_length;
+ u32 base_byte_offset;
+ u32 value;
+ u8 start_field_bit_offset;
+ u8 access_length;
+ u8 is_create_field;
+ union acpi_operand_object *buffer_obj;
+};
+
+struct acpi_object_bank_field {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ u8 field_flags;
+ u8 attribute;
+ u8 access_byte_width;
+ struct acpi_namespace_node *node;
+ u32 bit_length;
+ u32 base_byte_offset;
+ u32 value;
+ u8 start_field_bit_offset;
+ u8 access_length;
+ union acpi_operand_object *region_obj;
+ union acpi_operand_object *bank_obj;
+};
+
+struct acpi_object_index_field {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ u8 field_flags;
+ u8 attribute;
+ u8 access_byte_width;
+ struct acpi_namespace_node *node;
+ u32 bit_length;
+ u32 base_byte_offset;
+ u32 value;
+ u8 start_field_bit_offset;
+ u8 access_length;
+ union acpi_operand_object *index_obj;
+ union acpi_operand_object *data_obj;
+};
+
+struct acpi_object_notify_handler {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ struct acpi_namespace_node *node;
+ u32 handler_type;
+ acpi_notify_handler handler;
+ void *context;
+ union acpi_operand_object *next[2];
+};
+
+struct acpi_object_addr_handler {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ u8 space_id;
+ u8 handler_flags;
+ acpi_adr_space_handler handler;
+ struct acpi_namespace_node *node;
+ void *context;
+ void *context_mutex;
+ acpi_adr_space_setup setup;
+ union acpi_operand_object *region_list;
+ union acpi_operand_object *next;
+};
+
+struct acpi_object_reference {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ u8 class;
+ u8 target_type;
+ u8 resolved;
+ void *object;
+ struct acpi_namespace_node *node;
+ union acpi_operand_object **where;
+ u8 *index_pointer;
+ u8 *aml;
+ u32 value;
+};
+
+struct acpi_object_extra {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ struct acpi_namespace_node *method_REG;
+ struct acpi_namespace_node *scope_node;
+ void *region_context;
+ u8 *aml_start;
+ u32 aml_length;
+};
+
+struct acpi_object_data {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ acpi_object_handler handler;
+ void *pointer;
+};
+
+struct acpi_object_cache_list {
+ union acpi_operand_object *next_object;
+ u8 descriptor_type;
+ u8 type;
+ u16 reference_count;
+ u8 flags;
+ union acpi_operand_object *next;
+};
+
+union acpi_operand_object {
+ struct acpi_object_common common;
+ struct acpi_object_integer integer;
+ struct acpi_object_string string;
+ struct acpi_object_buffer buffer;
+ struct acpi_object_package package;
+ struct acpi_object_event event;
+ struct acpi_object_method method;
+ struct acpi_object_mutex mutex;
+ struct acpi_object_region region;
+ struct acpi_object_notify_common common_notify;
+ struct acpi_object_device device;
+ struct acpi_object_power_resource power_resource;
+ struct acpi_object_processor processor;
+ struct acpi_object_thermal_zone thermal_zone;
+ struct acpi_object_field_common common_field;
+ struct acpi_object_region_field field;
+ struct acpi_object_buffer_field buffer_field;
+ struct acpi_object_bank_field bank_field;
+ struct acpi_object_index_field index_field;
+ struct acpi_object_notify_handler notify;
+ struct acpi_object_addr_handler address_space;
+ struct acpi_object_reference reference;
+ struct acpi_object_extra extra;
+ struct acpi_object_data data;
+ struct acpi_object_cache_list cache;
+ struct acpi_namespace_node node;
+};
+
+union acpi_parse_object;
+
+union acpi_generic_state;
+
+struct acpi_parse_state {
+ u8 *aml_start;
+ u8 *aml;
+ u8 *aml_end;
+ u8 *pkg_start;
+ u8 *pkg_end;
+ union acpi_parse_object *start_op;
+ struct acpi_namespace_node *start_node;
+ union acpi_generic_state *scope;
+ union acpi_parse_object *start_scope;
+ u32 aml_size;
+};
+
+typedef acpi_status (*acpi_parse_downwards)(struct acpi_walk_state *, union acpi_parse_object **);
+
+typedef acpi_status (*acpi_parse_upwards)(struct acpi_walk_state *);
+
+struct acpi_opcode_info;
+
+struct acpi_walk_state {
+ struct acpi_walk_state *next;
+ u8 descriptor_type;
+ u8 walk_type;
+ u16 opcode;
+ u8 next_op_info;
+ u8 num_operands;
+ u8 operand_index;
+ acpi_owner_id owner_id;
+ u8 last_predicate;
+ u8 current_result;
+ u8 return_used;
+ u8 scope_depth;
+ u8 pass_number;
+ u8 namespace_override;
+ u8 result_size;
+ u8 result_count;
+ u8 *aml;
+ u32 arg_types;
+ u32 method_breakpoint;
+ u32 user_breakpoint;
+ u32 parse_flags;
+ struct acpi_parse_state parser_state;
+ u32 prev_arg_types;
+ u32 arg_count;
+ u16 method_nesting_depth;
+ u8 method_is_nested;
+ struct acpi_namespace_node arguments[7];
+ struct acpi_namespace_node local_variables[8];
+ union acpi_operand_object *operands[9];
+ union acpi_operand_object **params;
+ u8 *aml_last_while;
+ union acpi_operand_object **caller_return_desc;
+ union acpi_generic_state *control_state;
+ struct acpi_namespace_node *deferred_node;
+ union acpi_operand_object *implicit_return_obj;
+ struct acpi_namespace_node *method_call_node;
+ union acpi_parse_object *method_call_op;
+ union acpi_operand_object *method_desc;
+ struct acpi_namespace_node *method_node;
+ char *method_pathname;
+ union acpi_parse_object *op;
+ const struct acpi_opcode_info *op_info;
+ union acpi_parse_object *origin;
+ union acpi_operand_object *result_obj;
+ union acpi_generic_state *results;
+ union acpi_operand_object *return_desc;
+ union acpi_generic_state *scope_info;
+ union acpi_parse_object *prev_op;
+ union acpi_parse_object *next_op;
+ struct acpi_thread_state *thread;
+ acpi_parse_downwards descending_callback;
+ acpi_parse_upwards ascending_callback;
+};
+
+struct acpi_gpe_handler_info {
+ acpi_gpe_handler address;
+ void *context;
+ struct acpi_namespace_node *method_node;
+ u8 original_flags;
+ u8 originally_enabled;
+};
+
+struct acpi_gpe_notify_info {
+ struct acpi_namespace_node *device_node;
+ struct acpi_gpe_notify_info *next;
+};
+
+union acpi_gpe_dispatch_info {
+ struct acpi_namespace_node *method_node;
+ struct acpi_gpe_handler_info *handler;
+ struct acpi_gpe_notify_info *notify_list;
+};
+
+struct acpi_gpe_register_info;
+
+struct acpi_gpe_event_info {
+ union acpi_gpe_dispatch_info dispatch;
+ struct acpi_gpe_register_info *register_info;
+ u8 flags;
+ u8 gpe_number;
+ u8 runtime_count;
+ u8 disable_for_dispatch;
+};
+
+struct acpi_gpe_address {
+ u8 space_id;
+ u64 address;
+};
+
+struct acpi_gpe_register_info {
+ struct acpi_gpe_address status_address;
+ struct acpi_gpe_address enable_address;
+ u16 base_gpe_number;
+ u8 enable_for_wake;
+ u8 enable_for_run;
+ u8 mask_for_run;
+ u8 enable_mask;
+};
+
+struct acpi_gpe_xrupt_info;
+
+struct acpi_gpe_block_info {
+ struct acpi_namespace_node *node;
+ struct acpi_gpe_block_info *previous;
+ struct acpi_gpe_block_info *next;
+ struct acpi_gpe_xrupt_info *xrupt_block;
+ struct acpi_gpe_register_info *register_info;
+ struct acpi_gpe_event_info *event_info;
+ u64 address;
+ u32 register_count;
+ u16 gpe_count;
+ u16 block_base_number;
+ u8 space_id;
+ u8 initialized;
+};
+
+struct acpi_gpe_xrupt_info {
+ struct acpi_gpe_xrupt_info *previous;
+ struct acpi_gpe_xrupt_info *next;
+ struct acpi_gpe_block_info *gpe_block_list_head;
+ u32 interrupt_number;
+};
+
+struct acpi_common_state {
+ void *next;
+ u8 descriptor_type;
+ u8 flags;
+ u16 value;
+ u16 state;
+};
+
+struct acpi_update_state {
+ void *next;
+ u8 descriptor_type;
+ u8 flags;
+ u16 value;
+ u16 state;
+ union acpi_operand_object *object;
+};
+
+struct acpi_pkg_state {
+ void *next;
+ u8 descriptor_type;
+ u8 flags;
+ u16 value;
+ u16 state;
+ u32 index;
+ union acpi_operand_object *source_object;
+ union acpi_operand_object *dest_object;
+ struct acpi_walk_state *walk_state;
+ void *this_target_obj;
+ u32 num_packages;
+};
+
+struct acpi_control_state {
+ void *next;
+ u8 descriptor_type;
+ u8 flags;
+ u16 value;
+ u16 state;
+ u16 opcode;
+ union acpi_parse_object *predicate_op;
+ u8 *aml_predicate_start;
+ u8 *package_end;
+ u64 loop_timeout;
+};
+
+union acpi_parse_value {
+ u64 integer;
+ u32 size;
+ char *string;
+ u8 *buffer;
+ char *name;
+ union acpi_parse_object *arg;
+};
+
+struct acpi_parse_obj_common {
+ union acpi_parse_object *parent;
+ u8 descriptor_type;
+ u8 flags;
+ u16 aml_opcode;
+ u8 *aml;
+ union acpi_parse_object *next;
+ struct acpi_namespace_node *node;
+ union acpi_parse_value value;
+ u8 arg_list_length;
+};
+
+struct acpi_parse_obj_named {
+ union acpi_parse_object *parent;
+ u8 descriptor_type;
+ u8 flags;
+ u16 aml_opcode;
+ u8 *aml;
+ union acpi_parse_object *next;
+ struct acpi_namespace_node *node;
+ union acpi_parse_value value;
+ u8 arg_list_length;
+ char *path;
+ u8 *data;
+ u32 length;
+ u32 name;
+};
+
+struct acpi_parse_obj_asl {
+ union acpi_parse_object *parent;
+ u8 descriptor_type;
+ u8 flags;
+ u16 aml_opcode;
+ u8 *aml;
+ union acpi_parse_object *next;
+ struct acpi_namespace_node *node;
+ union acpi_parse_value value;
+ u8 arg_list_length;
+ union acpi_parse_object *child;
+ union acpi_parse_object *parent_method;
+ char *filename;
+ u8 file_changed;
+ char *parent_filename;
+ char *external_name;
+ char *namepath;
+ char name_seg[4];
+ u32 extra_value;
+ u32 column;
+ u32 line_number;
+ u32 logical_line_number;
+ u32 logical_byte_offset;
+ u32 end_line;
+ u32 end_logical_line;
+ u32 acpi_btype;
+ u32 aml_length;
+ u32 aml_subtree_length;
+ u32 final_aml_length;
+ u32 final_aml_offset;
+ u32 compile_flags;
+ u16 parse_opcode;
+ u8 aml_opcode_length;
+ u8 aml_pkg_len_bytes;
+ u8 extra;
+ char parse_op_name[20];
+};
+
+union acpi_parse_object {
+ struct acpi_parse_obj_common common;
+ struct acpi_parse_obj_named named;
+ struct acpi_parse_obj_asl asl;
+};
+
+struct acpi_scope_state {
+ void *next;
+ u8 descriptor_type;
+ u8 flags;
+ u16 value;
+ u16 state;
+ struct acpi_namespace_node *node;
+};
+
+struct acpi_pscope_state {
+ void *next;
+ u8 descriptor_type;
+ u8 flags;
+ u16 value;
+ u16 state;
+ u32 arg_count;
+ union acpi_parse_object *op;
+ u8 *arg_end;
+ u8 *pkg_end;
+ u32 arg_list;
+};
+
+struct acpi_thread_state {
+ void *next;
+ u8 descriptor_type;
+ u8 flags;
+ u16 value;
+ u16 state;
+ u8 current_sync_level;
+ struct acpi_walk_state *walk_state_list;
+ union acpi_operand_object *acquired_mutex_list;
+ u64 thread_id;
+};
+
+struct acpi_result_values {
+ void *next;
+ u8 descriptor_type;
+ u8 flags;
+ u16 value;
+ u16 state;
+ union acpi_operand_object *obj_desc[8];
+};
+
+struct acpi_global_notify_handler {
+ acpi_notify_handler handler;
+ void *context;
+};
+
+struct acpi_notify_info {
+ void *next;
+ u8 descriptor_type;
+ u8 flags;
+ u16 value;
+ u16 state;
+ u8 handler_list_id;
+ struct acpi_namespace_node *node;
+ union acpi_operand_object *handler_list_head;
+ struct acpi_global_notify_handler *global;
+};
+
+union acpi_generic_state {
+ struct acpi_common_state common;
+ struct acpi_control_state control;
+ struct acpi_update_state update;
+ struct acpi_scope_state scope;
+ struct acpi_pscope_state parse_scope;
+ struct acpi_pkg_state pkg;
+ struct acpi_thread_state thread;
+ struct acpi_result_values results;
+ struct acpi_notify_info notify;
+};
+
+struct acpi_opcode_info {
+ u32 parse_args;
+ u32 runtime_args;
+ u16 flags;
+ u8 object_type;
+ u8 class;
+ u8 type;
+};
+
+struct acpi_vendor_walk_info {
+ struct acpi_vendor_uuid *uuid;
+ struct acpi_buffer *buffer;
+ acpi_status status;
+};
+
+struct pnp_device_id {
+ __u8 id[8];
+ kernel_ulong_t driver_data;
+};
+
+struct pnp_card_device_id {
+ __u8 id[8];
+ kernel_ulong_t driver_data;
+ struct {
+ __u8 id[8];
+ } devs[8];
+};
+
+typedef acpi_status (*acpi_walk_callback)(acpi_handle, u32, void *, void **);
+
+struct acpi_hardware_id {
+ struct list_head list;
+ const char *id;
+};
+
+struct pnp_protocol;
+
+struct pnp_id;
+
+struct pnp_card {
+ struct device dev;
+ unsigned char number;
+ struct list_head global_list;
+ struct list_head protocol_list;
+ struct list_head devices;
+ struct pnp_protocol *protocol;
+ struct pnp_id *id;
+ char name[50];
+ unsigned char pnpver;
+ unsigned char productver;
+ unsigned int serial;
+ unsigned char checksum;
+ struct proc_dir_entry *procdir;
+};
+
+struct pnp_dev;
+
+struct pnp_protocol {
+ struct list_head protocol_list;
+ char *name;
+ int (*get)(struct pnp_dev *);
+ int (*set)(struct pnp_dev *);
+ int (*disable)(struct pnp_dev *);
+ bool (*can_wakeup)(struct pnp_dev *);
+ int (*suspend)(struct pnp_dev *, pm_message_t);
+ int (*resume)(struct pnp_dev *);
+ unsigned char number;
+ struct device dev;
+ struct list_head cards;
+ struct list_head devices;
+};
+
+struct pnp_id {
+ char id[8];
+ struct pnp_id *next;
+};
+
+struct pnp_card_driver;
+
+struct pnp_card_link {
+ struct pnp_card *card;
+ struct pnp_card_driver *driver;
+ void *driver_data;
+ pm_message_t pm_state;
+};
+
+struct pnp_driver {
+ const char *name;
+ const struct pnp_device_id *id_table;
+ unsigned int flags;
+ int (*probe)(struct pnp_dev *, const struct pnp_device_id *);
+ void (*remove)(struct pnp_dev *);
+ void (*shutdown)(struct pnp_dev *);
+ int (*suspend)(struct pnp_dev *, pm_message_t);
+ int (*resume)(struct pnp_dev *);
+ struct device_driver driver;
+};
+
+struct pnp_card_driver {
+ struct list_head global_list;
+ char *name;
+ const struct pnp_card_device_id *id_table;
+ unsigned int flags;
+ int (*probe)(struct pnp_card_link *, const struct pnp_card_device_id *);
+ void (*remove)(struct pnp_card_link *);
+ int (*suspend)(struct pnp_card_link *, pm_message_t);
+ int (*resume)(struct pnp_card_link *);
+ struct pnp_driver link;
+};
+
+struct pnp_dev {
+ struct device dev;
+ u64 dma_mask;
+ unsigned int number;
+ int status;
+ struct list_head global_list;
+ struct list_head protocol_list;
+ struct list_head card_list;
+ struct list_head rdev_list;
+ struct pnp_protocol *protocol;
+ struct pnp_card *card;
+ struct pnp_driver *driver;
+ struct pnp_card_link *card_link;
+ struct pnp_id *id;
+ int active;
+ int capabilities;
+ unsigned int num_dependent_sets;
+ struct list_head resources;
+ struct list_head options;
+ char name[50];
+ int flags;
+ struct proc_dir_entry *procent;
+ void *data;
+};
+
+typedef __kernel_long_t __kernel_off_t;
+
+typedef __kernel_off_t off_t;
+
+typedef u64 pci_bus_addr_t;
+
+struct pci_bus_region {
+ pci_bus_addr_t start;
+ pci_bus_addr_t end;
+};
+
+enum chipset_type {
+ NOT_SUPPORTED = 0,
+ SUPPORTED = 1,
+};
+
+struct agp_version {
+ u16 major;
+ u16 minor;
+};
+
+struct agp_bridge_data;
+
+struct agp_memory {
+ struct agp_memory *next;
+ struct agp_memory *prev;
+ struct agp_bridge_data *bridge;
+ struct page **pages;
+ size_t page_count;
+ int key;
+ int num_scratch_pages;
+ off_t pg_start;
+ u32 type;
+ u32 physical;
+ bool is_bound;
+ bool is_flushed;
+ struct list_head mapped_list;
+ struct scatterlist *sg_list;
+ int num_sg;
+};
+
+struct agp_bridge_driver;
+
+struct agp_bridge_data {
+ const struct agp_version *version;
+ const struct agp_bridge_driver *driver;
+ const struct vm_operations_struct *vm_ops;
+ void *previous_size;
+ void *current_size;
+ void *dev_private_data;
+ struct pci_dev *dev;
+ u32 *gatt_table;
+ u32 *gatt_table_real;
+ long unsigned int scratch_page;
+ struct page *scratch_page_page;
+ dma_addr_t scratch_page_dma;
+ long unsigned int gart_bus_addr;
+ long unsigned int gatt_bus_addr;
+ u32 mode;
+ enum chipset_type type;
+ long unsigned int *key_list;
+ atomic_t current_memory_agp;
+ atomic_t agp_in_use;
+ int max_memory_agp;
+ int aperture_size_idx;
+ int capndx;
+ int flags;
+ char major_version;
+ char minor_version;
+ struct list_head list;
+ u32 apbase_config;
+ struct list_head mapped_list;
+ spinlock_t mapped_lock;
+};
+
+enum e820_type {
+ E820_TYPE_RAM = 1,
+ E820_TYPE_RESERVED = 2,
+ E820_TYPE_ACPI = 3,
+ E820_TYPE_NVS = 4,
+ E820_TYPE_UNUSABLE = 5,
+ E820_TYPE_PMEM = 7,
+ E820_TYPE_PRAM = 12,
+ E820_TYPE_SOFT_RESERVED = 4026531839,
+ E820_TYPE_RESERVED_KERN = 128,
+};
+
+struct amd_l3_cache {
+ unsigned int indices;
+ u8 subcaches[4];
+};
+
+struct threshold_block {
+ unsigned int block;
+ unsigned int bank;
+ unsigned int cpu;
+ u32 address;
+ u16 interrupt_enable;
+ bool interrupt_capable;
+ u16 threshold_limit;
+ struct kobject kobj;
+ struct list_head miscj;
+};
+
+struct threshold_bank {
+ struct kobject *kobj;
+ struct threshold_block *blocks;
+ refcount_t cpus;
+ unsigned int shared;
+};
+
+struct amd_northbridge {
+ struct pci_dev *root;
+ struct pci_dev *misc;
+ struct pci_dev *link;
+ struct amd_l3_cache l3_cache;
+ struct threshold_bank *bank4;
+};
+
+enum aper_size_type {
+ U8_APER_SIZE = 0,
+ U16_APER_SIZE = 1,
+ U32_APER_SIZE = 2,
+ LVL2_APER_SIZE = 3,
+ FIXED_APER_SIZE = 4,
+};
+
+struct gatt_mask {
+ long unsigned int mask;
+ u32 type;
+};
+
+struct aper_size_info_32 {
+ int size;
+ int num_entries;
+ int page_order;
+ u32 size_value;
+};
+
+struct agp_bridge_driver {
+ struct module *owner;
+ const void *aperture_sizes;
+ int num_aperture_sizes;
+ enum aper_size_type size_type;
+ bool cant_use_aperture;
+ bool needs_scratch_page;
+ const struct gatt_mask *masks;
+ int (*fetch_size)();
+ int (*configure)();
+ void (*agp_enable)(struct agp_bridge_data *, u32);
+ void (*cleanup)();
+ void (*tlb_flush)(struct agp_memory *);
+ long unsigned int (*mask_memory)(struct agp_bridge_data *, dma_addr_t, int);
+ void (*cache_flush)();
+ int (*create_gatt_table)(struct agp_bridge_data *);
+ int (*free_gatt_table)(struct agp_bridge_data *);
+ int (*insert_memory)(struct agp_memory *, off_t, int);
+ int (*remove_memory)(struct agp_memory *, off_t, int);
+ struct agp_memory * (*alloc_by_type)(size_t, int);
+ void (*free_by_type)(struct agp_memory *);
+ struct page * (*agp_alloc_page)(struct agp_bridge_data *);
+ int (*agp_alloc_pages)(struct agp_bridge_data *, struct agp_memory *, size_t);
+ void (*agp_destroy_page)(struct page *, int);
+ void (*agp_destroy_pages)(struct agp_memory *);
+ int (*agp_type_to_mask_type)(struct agp_bridge_data *, int);
+};
+
+enum kobject_action {
+ KOBJ_ADD = 0,
+ KOBJ_REMOVE = 1,
+ KOBJ_CHANGE = 2,
+ KOBJ_MOVE = 3,
+ KOBJ_ONLINE = 4,
+ KOBJ_OFFLINE = 5,
+ KOBJ_BIND = 6,
+ KOBJ_UNBIND = 7,
+};
+
+struct wake_irq {
+ struct device *dev;
+ unsigned int status;
+ int irq;
+ const char *name;
+};
+
+struct pm_qos_flags {
+ struct list_head list;
+ s32 effective_flags;
+};
+
+struct dev_pm_qos_request;
+
+struct dev_pm_qos {
+ struct pm_qos_constraints resume_latency;
+ struct pm_qos_constraints latency_tolerance;
+ struct freq_constraints freq;
+ struct pm_qos_flags flags;
+ struct dev_pm_qos_request *resume_latency_req;
+ struct dev_pm_qos_request *latency_tolerance_req;
+ struct dev_pm_qos_request *flags_req;
+};
+
+struct pm_qos_flags_request {
+ struct list_head node;
+ s32 flags;
+};
+
+enum dev_pm_qos_req_type {
+ DEV_PM_QOS_RESUME_LATENCY = 1,
+ DEV_PM_QOS_LATENCY_TOLERANCE = 2,
+ DEV_PM_QOS_MIN_FREQUENCY = 3,
+ DEV_PM_QOS_MAX_FREQUENCY = 4,
+ DEV_PM_QOS_FLAGS = 5,
+};
+
+struct dev_pm_qos_request {
+ enum dev_pm_qos_req_type type;
+ union {
+ struct plist_node pnode;
+ struct pm_qos_flags_request flr;
+ struct freq_qos_request freq;
+ } data;
+ struct device *dev;
+};
+
+enum {
+ IFLA_VF_LINK_STATE_AUTO = 0,
+ IFLA_VF_LINK_STATE_ENABLE = 1,
+ IFLA_VF_LINK_STATE_DISABLE = 2,
+ __IFLA_VF_LINK_STATE_MAX = 3,
+};
+
+enum flow_block_command {
+ FLOW_BLOCK_BIND = 0,
+ FLOW_BLOCK_UNBIND = 1,
+};
+
+enum flow_block_binder_type {
+ FLOW_BLOCK_BINDER_TYPE_UNSPEC = 0,
+ FLOW_BLOCK_BINDER_TYPE_CLSACT_INGRESS = 1,
+ FLOW_BLOCK_BINDER_TYPE_CLSACT_EGRESS = 2,
+ FLOW_BLOCK_BINDER_TYPE_RED_EARLY_DROP = 3,
+ FLOW_BLOCK_BINDER_TYPE_RED_MARK = 4,
+};
+
+struct flow_block_offload {
+ enum flow_block_command command;
+ enum flow_block_binder_type binder_type;
+ bool block_shared;
+ bool unlocked_driver_cb;
+ struct net *net;
+ struct flow_block *block;
+ struct list_head cb_list;
+ struct list_head *driver_block_list;
+ struct netlink_ext_ack *extack;
+ struct Qdisc *sch;
+ struct list_head *cb_list_head;
+};
+
+struct qdisc_walker {
+ int stop;
+ int skip;
+ int count;
+ int (*fn)(struct Qdisc *, long unsigned int, struct qdisc_walker *);
+};
+
+struct tcf_walker {
+ int stop;
+ int skip;
+ int count;
+ bool nonempty;
+ long unsigned int cookie;
+ int (*fn)(struct tcf_proto *, void *, struct tcf_walker *);
+};
+
+struct tc_ratespec {
+ unsigned char cell_log;
+ __u8 linklayer;
+ short unsigned int overhead;
+ short int cell_align;
+ short unsigned int mpu;
+ __u32 rate;
+};
+
+struct tc_prio_qopt {
+ int bands;
+ __u8 priomap[16];
+};
+
+enum netdev_queue_state_t {
+ __QUEUE_STATE_DRV_XOFF = 0,
+ __QUEUE_STATE_STACK_XOFF = 1,
+ __QUEUE_STATE_FROZEN = 2,
+};
+
+enum {
+ TCA_UNSPEC = 0,
+ TCA_KIND = 1,
+ TCA_OPTIONS = 2,
+ TCA_STATS = 3,
+ TCA_XSTATS = 4,
+ TCA_RATE = 5,
+ TCA_FCNT = 6,
+ TCA_STATS2 = 7,
+ TCA_STAB = 8,
+ TCA_PAD = 9,
+ TCA_DUMP_INVISIBLE = 10,
+ TCA_CHAIN = 11,
+ TCA_HW_OFFLOAD = 12,
+ TCA_INGRESS_BLOCK = 13,
+ TCA_EGRESS_BLOCK = 14,
+ TCA_DUMP_FLAGS = 15,
+ __TCA_MAX = 16,
+};
+
+struct skb_array {
+ struct ptr_ring ring;
+};
+
+enum qdisc_state_t {
+ __QDISC_STATE_SCHED = 0,
+ __QDISC_STATE_DEACTIVATED = 1,
+ __QDISC_STATE_MISSED = 2,
+ __QDISC_STATE_DRAINING = 3,
+};
+
+enum qdisc_state2_t {
+ __QDISC_STATE2_RUNNING = 0,
+};
+
+struct qdisc_skb_cb {
+ struct {
+ unsigned int pkt_len;
+ u16 slave_dev_queue_mapping;
+ u16 tc_classid;
+ };
+ unsigned char data[20];
+};
+
+struct psched_ratecfg {
+ u64 rate_bytes_ps;
+ u32 mult;
+ u16 overhead;
+ u16 mpu;
+ u8 linklayer;
+ u8 shift;
+};
+
+struct psched_pktrate {
+ u64 rate_pkts_ps;
+ u32 mult;
+ u8 shift;
+};
+
+struct mini_Qdisc_pair {
+ struct mini_Qdisc miniq1;
+ struct mini_Qdisc miniq2;
+ struct mini_Qdisc **p_miniq;
+};
+
+struct xfrm_offload {
+ struct {
+ __u32 low;
+ __u32 hi;
+ } seq;
+ __u32 flags;
+ __u32 status;
+ __u8 proto;
+ __u8 inner_ipproto;
+};
+
+struct sec_path {
+ int len;
+ int olen;
+ struct xfrm_state *xvec[6];
+ struct xfrm_offload ovec[1];
+};
+
+struct pfifo_fast_priv {
+ struct skb_array q[3];
+};
+
+struct udp_tunnel_nic_ops {
+ void (*get_port)(struct net_device *, unsigned int, unsigned int, struct udp_tunnel_info *);
+ void (*set_port_priv)(struct net_device *, unsigned int, unsigned int, u8);
+ void (*add_port)(struct net_device *, struct udp_tunnel_info *);
+ void (*del_port)(struct net_device *, struct udp_tunnel_info *);
+ void (*reset_ntf)(struct net_device *);
+ size_t (*dump_size)(struct net_device *, unsigned int);
+ int (*dump_write)(struct net_device *, unsigned int, struct sk_buff *);
+};
+
+struct __call_single_data {
+ struct __call_single_node node;
+ smp_call_func_t func;
+ void *info;
+};
+
+typedef struct __call_single_data call_single_data_t;
+
+struct sd_flow_limit;
+
+struct softnet_data {
+ struct list_head poll_list;
+ struct sk_buff_head process_queue;
+ unsigned int processed;
+ unsigned int time_squeeze;
+ struct softnet_data *rps_ipi_list;
+ struct sd_flow_limit *flow_limit;
+ struct Qdisc *output_queue;
+ struct Qdisc **output_queue_tailp;
+ struct sk_buff *completion_queue;
+ struct {
+ u16 recursion;
+ u8 more;
+ u8 skip_txqueue;
+ } xmit;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ unsigned int input_queue_head;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ call_single_data_t csd;
+ struct softnet_data *rps_ipi_next;
+ unsigned int cpu;
+ unsigned int input_queue_tail;
+ unsigned int received_rps;
+ unsigned int dropped;
+ struct sk_buff_head input_pkt_queue;
+ struct napi_struct backlog;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ spinlock_t defer_lock;
+ int defer_count;
+ int defer_ipi_scheduled;
+ struct sk_buff *defer_list;
+ long: 64;
+ long: 64;
+ call_single_data_t defer_csd;
+};
+
+struct nl_info {
+ struct nlmsghdr *nlh;
+ struct net *nl_net;
+ u32 portid;
+ u8 skip_notify: 1;
+ u8 skip_notify_kernel: 1;
+};
+
+struct ip_beet_phdr {
+ __u8 nexthdr;
+ __u8 hdrlen;
+ __u8 padlen;
+ __u8 reserved;
+};
+
+struct fib6_result;
+
+struct fib6_config;
+
+struct ipv6_stub {
+ int (*ipv6_sock_mc_join)(struct sock *, int, const struct in6_addr *);
+ int (*ipv6_sock_mc_drop)(struct sock *, int, const struct in6_addr *);
+ struct dst_entry * (*ipv6_dst_lookup_flow)(struct net *, const struct sock *, struct flowi6 *, const struct in6_addr *);
+ int (*ipv6_route_input)(struct sk_buff *);
+ struct fib6_table * (*fib6_get_table)(struct net *, u32);
+ int (*fib6_lookup)(struct net *, int, struct flowi6 *, struct fib6_result *, int);
+ int (*fib6_table_lookup)(struct net *, struct fib6_table *, int, struct flowi6 *, struct fib6_result *, int);
+ void (*fib6_select_path)(const struct net *, struct fib6_result *, struct flowi6 *, int, bool, const struct sk_buff *, int);
+ u32 (*ip6_mtu_from_fib6)(const struct fib6_result *, const struct in6_addr *, const struct in6_addr *);
+ int (*fib6_nh_init)(struct net *, struct fib6_nh *, struct fib6_config *, gfp_t, struct netlink_ext_ack *);
+ void (*fib6_nh_release)(struct fib6_nh *);
+ void (*fib6_nh_release_dsts)(struct fib6_nh *);
+ void (*fib6_update_sernum)(struct net *, struct fib6_info *);
+ int (*ip6_del_rt)(struct net *, struct fib6_info *, bool);
+ void (*fib6_rt_update)(struct net *, struct fib6_info *, struct nl_info *);
+ void (*udpv6_encap_enable)();
+ void (*ndisc_send_na)(struct net_device *, const struct in6_addr *, const struct in6_addr *, bool, bool, bool, bool);
+ void (*xfrm6_local_rxpmtu)(struct sk_buff *, u32);
+ int (*xfrm6_udp_encap_rcv)(struct sock *, struct sk_buff *);
+ int (*xfrm6_rcv_encap)(struct sk_buff *, int, __be32, int);
+ struct neigh_table *nd_tbl;
+ int (*ipv6_fragment)(struct net *, struct sock *, struct sk_buff *, int (*)(struct net *, struct sock *, struct sk_buff *));
+ struct net_device * (*ipv6_dev_find)(struct net *, const struct in6_addr *, struct net_device *);
+};
+
+struct fib6_result {
+ struct fib6_nh *nh;
+ struct fib6_info *f6i;
+ u32 fib6_flags;
+ u8 fib6_type;
+ struct rt6_info *rt6;
+};
+
+struct fib6_config {
+ u32 fc_table;
+ u32 fc_metric;
+ int fc_dst_len;
+ int fc_src_len;
+ int fc_ifindex;
+ u32 fc_flags;
+ u32 fc_protocol;
+ u16 fc_type;
+ u16 fc_delete_all_nh: 1;
+ u16 fc_ignore_dev_down: 1;
+ u16 __unused: 14;
+ u32 fc_nh_id;
+ struct in6_addr fc_dst;
+ struct in6_addr fc_src;
+ struct in6_addr fc_prefsrc;
+ struct in6_addr fc_gateway;
+ long unsigned int fc_expires;
+ struct nlattr *fc_mx;
+ int fc_mx_len;
+ int fc_mp_len;
+ struct nlattr *fc_mp;
+ struct nl_info fc_nlinfo;
+ struct nlattr *fc_encap;
+ u16 fc_encap_type;
+ bool fc_is_fdb;
+};
+
+enum {
+ XFRM_MODE_FLAG_TUNNEL = 1,
+};
+
+enum {
+ XFRM_STATE_VOID = 0,
+ XFRM_STATE_ACQ = 1,
+ XFRM_STATE_VALID = 2,
+ XFRM_STATE_ERROR = 3,
+ XFRM_STATE_EXPIRED = 4,
+ XFRM_STATE_DEAD = 5,
+};
+
+struct xfrm_dst {
+ union {
+ struct dst_entry dst;
+ struct rtable rt;
+ struct rt6_info rt6;
+ } u;
+ struct dst_entry *route;
+ struct dst_entry *child;
+ struct dst_entry *path;
+ struct xfrm_policy *pols[2];
+ int num_pols;
+ int num_xfrms;
+ u32 xfrm_genid;
+ u32 policy_genid;
+ u32 route_mtu_cached;
+ u32 child_mtu_cached;
+ u32 route_cookie;
+ u32 path_cookie;
+};
+
+struct xfrm_state_afinfo {
+ u8 family;
+ u8 proto;
+ const struct xfrm_type_offload *type_offload_esp;
+ const struct xfrm_type *type_esp;
+ const struct xfrm_type *type_ipip;
+ const struct xfrm_type *type_ipip6;
+ const struct xfrm_type *type_comp;
+ const struct xfrm_type *type_ah;
+ const struct xfrm_type *type_routing;
+ const struct xfrm_type *type_dstopts;
+ int (*output)(struct net *, struct sock *, struct sk_buff *);
+ int (*transport_finish)(struct sk_buff *, int);
+ void (*local_error)(struct sk_buff *, u32);
+};
+
+struct ip_tunnel;
+
+struct ip6_tnl;
+
+struct xfrm_tunnel_skb_cb {
+ union {
+ struct inet_skb_parm h4;
+ struct inet6_skb_parm h6;
+ } header;
+ union {
+ struct ip_tunnel *ip4;
+ struct ip6_tnl *ip6;
+ } tunnel;
+};
+
+struct xfrm_mode_skb_cb {
+ struct xfrm_tunnel_skb_cb header;
+ __be16 id;
+ __be16 frag_off;
+ u8 ihl;
+ u8 tos;
+ u8 ttl;
+ u8 protocol;
+ u8 optlen;
+ u8 flow_lbl[3];
+};
+
+struct rt2_hdr {
+ struct ipv6_rt_hdr rt_hdr;
+ __u32 reserved;
+ struct in6_addr addr;
+};
+
+struct ipv6_destopt_hao {
+ __u8 type;
+ __u8 length;
+ struct in6_addr addr;
+} __attribute__((packed));
+
+struct raw_hashinfo {
+ spinlock_t lock;
+ struct hlist_nulls_head ht[256];
+};
+
+struct ip6_mh {
+ __u8 ip6mh_proto;
+ __u8 ip6mh_hdrlen;
+ __u8 ip6mh_type;
+ __u8 ip6mh_reserved;
+ __u16 ip6mh_cksum;
+ __u8 data[0];
+};
+
+struct mip6_report_rate_limiter {
+ spinlock_t lock;
+ ktime_t stamp;
+ int iif;
+ struct in6_addr src;
+ struct in6_addr dst;
+};
+
+struct pci_hostbridge_probe {
+ u32 bus;
+ u32 slot;
+ u32 vendor;
+ u32 device;
+};
+
+enum page_cache_mode {
+ _PAGE_CACHE_MODE_WB = 0,
+ _PAGE_CACHE_MODE_WC = 1,
+ _PAGE_CACHE_MODE_UC_MINUS = 2,
+ _PAGE_CACHE_MODE_UC = 3,
+ _PAGE_CACHE_MODE_WT = 4,
+ _PAGE_CACHE_MODE_WP = 5,
+ _PAGE_CACHE_MODE_NUM = 8,
+};
+
+enum pg_level {
+ PG_LEVEL_NONE = 0,
+ PG_LEVEL_4K = 1,
+ PG_LEVEL_2M = 2,
+ PG_LEVEL_1G = 3,
+ PG_LEVEL_512G = 4,
+ PG_LEVEL_NUM = 5,
+};
+
+typedef struct pglist_data pg_data_t;
+
+struct mem_section_usage {
+ long unsigned int subsection_map[1];
+ long unsigned int pageblock_flags[0];
+};
+
+struct mem_section {
+ long unsigned int section_mem_map;
+ struct mem_section_usage *usage;
+};
+
+enum {
+ SECTION_MARKED_PRESENT_BIT = 0,
+ SECTION_HAS_MEM_MAP_BIT = 1,
+ SECTION_IS_ONLINE_BIT = 2,
+ SECTION_IS_EARLY_BIT = 3,
+ SECTION_MAP_LAST_BIT = 4,
+};
+
+enum kcore_type {
+ KCORE_TEXT = 0,
+ KCORE_VMALLOC = 1,
+ KCORE_RAM = 2,
+ KCORE_VMEMMAP = 3,
+ KCORE_USER = 4,
+};
+
+struct kcore_list {
+ struct list_head list;
+ long unsigned int addr;
+ size_t size;
+ int type;
+};
+
+struct x86_mapping_info {
+ void * (*alloc_pgt_page)(void *);
+ void *context;
+ long unsigned int page_flag;
+ long unsigned int offset;
+ bool direct_gbpages;
+ long unsigned int kernpg_flag;
+};
+
+struct anon_vma {
+ struct anon_vma *root;
+ struct rw_semaphore rwsem;
+ atomic_t refcount;
+ long unsigned int num_children;
+ long unsigned int num_active_vmas;
+ struct anon_vma *parent;
+ struct rb_root_cached rb_root;
+};
+
+typedef struct {
+ long unsigned int val;
+} swp_entry_t;
+
+struct compact_control;
+
+struct capture_control {
+ struct compact_control *cc;
+ struct page *page;
+};
+
+struct compact_control {
+ struct list_head freepages;
+ struct list_head migratepages;
+ unsigned int nr_freepages;
+ unsigned int nr_migratepages;
+ long unsigned int free_pfn;
+ long unsigned int migrate_pfn;
+ long unsigned int fast_start_pfn;
+ struct zone *zone;
+ long unsigned int total_migrate_scanned;
+ long unsigned int total_free_scanned;
+ short unsigned int fast_search_fail;
+ short int search_order;
+ const gfp_t gfp_mask;
+ int order;
+ int migratetype;
+ const unsigned int alloc_flags;
+ const int highest_zoneidx;
+ enum migrate_mode mode;
+ bool ignore_skip_hint;
+ bool no_set_skip_hint;
+ bool ignore_block_suitable;
+ bool direct_compaction;
+ bool proactive_compaction;
+ bool whole_zone;
+ bool contended;
+ bool rescan;
+ bool alloc_contig;
+};
+
+struct mmu_notifier_range {
+ long unsigned int start;
+ long unsigned int end;
+};
+
+enum pgt_entry {
+ NORMAL_PMD = 0,
+ HPAGE_PMD = 1,
+ NORMAL_PUD = 2,
+ HPAGE_PUD = 3,
+};
+
+enum vm_fault_reason {
+ VM_FAULT_OOM = 1,
+ VM_FAULT_SIGBUS = 2,
+ VM_FAULT_MAJOR = 4,
+ VM_FAULT_WRITE = 8,
+ VM_FAULT_HWPOISON = 16,
+ VM_FAULT_HWPOISON_LARGE = 32,
+ VM_FAULT_SIGSEGV = 64,
+ VM_FAULT_NOPAGE = 256,
+ VM_FAULT_LOCKED = 512,
+ VM_FAULT_RETRY = 1024,
+ VM_FAULT_FALLBACK = 2048,
+ VM_FAULT_DONE_COW = 4096,
+ VM_FAULT_NEEDDSYNC = 8192,
+ VM_FAULT_COMPLETED = 16384,
+ VM_FAULT_HINDEX_MASK = 983040,
+};
+
+typedef __kernel_rwf_t rwf_t;
+
+struct splice_desc {
+ size_t total_len;
+ unsigned int len;
+ unsigned int flags;
+ union {
+ void *userptr;
+ struct file *file;
+ void *data;
+ } u;
+ loff_t pos;
+ loff_t *opos;
+ size_t num_spliced;
+ bool need_wakeup;
+};
+
+struct partial_page {
+ unsigned int offset;
+ unsigned int len;
+ long unsigned int private;
+};
+
+struct splice_pipe_desc {
+ struct page **pages;
+ struct partial_page *partial;
+ int nr_pages;
+ unsigned int nr_pages_max;
+ const struct pipe_buf_operations *ops;
+ void (*spd_release)(struct splice_pipe_desc *, unsigned int);
+};
+
+typedef int splice_actor(struct pipe_inode_info *, struct pipe_buffer *, struct splice_desc *);
+
+typedef int splice_direct_actor(struct pipe_inode_info *, struct splice_desc *);
+
+typedef unsigned int xa_mark_t;
+
+enum xa_lock_type {
+ XA_LOCK_IRQ = 1,
+ XA_LOCK_BH = 2,
+};
+
+enum kernfs_root_flag {
+ KERNFS_ROOT_CREATE_DEACTIVATED = 1,
+ KERNFS_ROOT_EXTRA_OPEN_PERM_CHECK = 2,
+ KERNFS_ROOT_SUPPORT_EXPORTOP = 4,
+ KERNFS_ROOT_SUPPORT_USER_XATTR = 8,
+};
+
+struct msg_msgseg;
+
+struct msg_msg {
+ struct list_head m_list;
+ long int m_type;
+ size_t m_ts;
+ struct msg_msgseg *next;
+ void *security;
+};
+
+struct msg_msgseg {
+ struct msg_msgseg *next;
+};
+
+enum {
+ PROC_ROOT_INO = 1,
+ PROC_IPC_INIT_INO = 4026531839,
+ PROC_UTS_INIT_INO = 4026531838,
+ PROC_USER_INIT_INO = 4026531837,
+ PROC_PID_INIT_INO = 4026531836,
+ PROC_CGROUP_INIT_INO = 4026531835,
+ PROC_TIME_INIT_INO = 4026531834,
+};
+
+struct hashtab_key_params {
+ u32 (*hash)(const void *);
+ int (*cmp)(const void *, const void *);
+};
+
+struct hashtab_node {
+ void *key;
+ void *datum;
+ struct hashtab_node *next;
+};
+
+struct hashtab {
+ struct hashtab_node **htable;
+ u32 size;
+ u32 nel;
+};
+
+struct symtab {
+ struct hashtab table;
+ u32 nprim;
+};
+
+enum {
+ Audit_equal = 0,
+ Audit_not_equal = 1,
+ Audit_bitmask = 2,
+ Audit_bittest = 3,
+ Audit_lt = 4,
+ Audit_gt = 5,
+ Audit_le = 6,
+ Audit_ge = 7,
+ Audit_bad = 8,
+};
+
+struct audit_field;
+
+struct audit_watch;
+
+struct audit_tree;
+
+struct audit_fsnotify_mark;
+
+struct audit_krule {
+ u32 pflags;
+ u32 flags;
+ u32 listnr;
+ u32 action;
+ u32 mask[64];
+ u32 buflen;
+ u32 field_count;
+ char *filterkey;
+ struct audit_field *fields;
+ struct audit_field *arch_f;
+ struct audit_field *inode_f;
+ struct audit_watch *watch;
+ struct audit_tree *tree;
+ struct audit_fsnotify_mark *exe;
+ struct list_head rlist;
+ struct list_head list;
+ u64 prio;
+};
+
+struct audit_field {
+ u32 type;
+ union {
+ u32 val;
+ kuid_t uid;
+ kgid_t gid;
+ struct {
+ char *lsm_str;
+ void *lsm_rule;
+ };
+ };
+ u32 op;
+};
+
+struct lsm_blob_sizes {
+ int lbs_cred;
+ int lbs_file;
+ int lbs_inode;
+ int lbs_superblock;
+ int lbs_ipc;
+ int lbs_msg_msg;
+ int lbs_task;
+};
+
+struct netlbl_lsm_cache {
+ refcount_t refcount;
+ void (*free)(const void *);
+ void *data;
+};
+
+struct netlbl_lsm_catmap {
+ u32 startbit;
+ u64 bitmap[4];
+ struct netlbl_lsm_catmap *next;
+};
+
+struct netlbl_lsm_secattr {
+ u32 flags;
+ u32 type;
+ char *domain;
+ struct netlbl_lsm_cache *cache;
+ struct {
+ struct {
+ struct netlbl_lsm_catmap *cat;
+ u32 lvl;
+ } mls;
+ u32 secid;
+ } attr;
+};
+
+enum ib_uverbs_write_cmds {
+ IB_USER_VERBS_CMD_GET_CONTEXT = 0,
+ IB_USER_VERBS_CMD_QUERY_DEVICE = 1,
+ IB_USER_VERBS_CMD_QUERY_PORT = 2,
+ IB_USER_VERBS_CMD_ALLOC_PD = 3,
+ IB_USER_VERBS_CMD_DEALLOC_PD = 4,
+ IB_USER_VERBS_CMD_CREATE_AH = 5,
+ IB_USER_VERBS_CMD_MODIFY_AH = 6,
+ IB_USER_VERBS_CMD_QUERY_AH = 7,
+ IB_USER_VERBS_CMD_DESTROY_AH = 8,
+ IB_USER_VERBS_CMD_REG_MR = 9,
+ IB_USER_VERBS_CMD_REG_SMR = 10,
+ IB_USER_VERBS_CMD_REREG_MR = 11,
+ IB_USER_VERBS_CMD_QUERY_MR = 12,
+ IB_USER_VERBS_CMD_DEREG_MR = 13,
+ IB_USER_VERBS_CMD_ALLOC_MW = 14,
+ IB_USER_VERBS_CMD_BIND_MW = 15,
+ IB_USER_VERBS_CMD_DEALLOC_MW = 16,
+ IB_USER_VERBS_CMD_CREATE_COMP_CHANNEL = 17,
+ IB_USER_VERBS_CMD_CREATE_CQ = 18,
+ IB_USER_VERBS_CMD_RESIZE_CQ = 19,
+ IB_USER_VERBS_CMD_DESTROY_CQ = 20,
+ IB_USER_VERBS_CMD_POLL_CQ = 21,
+ IB_USER_VERBS_CMD_PEEK_CQ = 22,
+ IB_USER_VERBS_CMD_REQ_NOTIFY_CQ = 23,
+ IB_USER_VERBS_CMD_CREATE_QP = 24,
+ IB_USER_VERBS_CMD_QUERY_QP = 25,
+ IB_USER_VERBS_CMD_MODIFY_QP = 26,
+ IB_USER_VERBS_CMD_DESTROY_QP = 27,
+ IB_USER_VERBS_CMD_POST_SEND = 28,
+ IB_USER_VERBS_CMD_POST_RECV = 29,
+ IB_USER_VERBS_CMD_ATTACH_MCAST = 30,
+ IB_USER_VERBS_CMD_DETACH_MCAST = 31,
+ IB_USER_VERBS_CMD_CREATE_SRQ = 32,
+ IB_USER_VERBS_CMD_MODIFY_SRQ = 33,
+ IB_USER_VERBS_CMD_QUERY_SRQ = 34,
+ IB_USER_VERBS_CMD_DESTROY_SRQ = 35,
+ IB_USER_VERBS_CMD_POST_SRQ_RECV = 36,
+ IB_USER_VERBS_CMD_OPEN_XRCD = 37,
+ IB_USER_VERBS_CMD_CLOSE_XRCD = 38,
+ IB_USER_VERBS_CMD_CREATE_XSRQ = 39,
+ IB_USER_VERBS_CMD_OPEN_QP = 40,
+};
+
+enum ib_uverbs_wc_opcode {
+ IB_UVERBS_WC_SEND = 0,
+ IB_UVERBS_WC_RDMA_WRITE = 1,
+ IB_UVERBS_WC_RDMA_READ = 2,
+ IB_UVERBS_WC_COMP_SWAP = 3,
+ IB_UVERBS_WC_FETCH_ADD = 4,
+ IB_UVERBS_WC_BIND_MW = 5,
+ IB_UVERBS_WC_LOCAL_INV = 6,
+ IB_UVERBS_WC_TSO = 7,
+};
+
+enum ib_uverbs_create_qp_mask {
+ IB_UVERBS_CREATE_QP_MASK_IND_TABLE = 1,
+};
+
+enum ib_uverbs_wr_opcode {
+ IB_UVERBS_WR_RDMA_WRITE = 0,
+ IB_UVERBS_WR_RDMA_WRITE_WITH_IMM = 1,
+ IB_UVERBS_WR_SEND = 2,
+ IB_UVERBS_WR_SEND_WITH_IMM = 3,
+ IB_UVERBS_WR_RDMA_READ = 4,
+ IB_UVERBS_WR_ATOMIC_CMP_AND_SWP = 5,
+ IB_UVERBS_WR_ATOMIC_FETCH_AND_ADD = 6,
+ IB_UVERBS_WR_LOCAL_INV = 7,
+ IB_UVERBS_WR_BIND_MW = 8,
+ IB_UVERBS_WR_SEND_WITH_INV = 9,
+ IB_UVERBS_WR_TSO = 10,
+ IB_UVERBS_WR_RDMA_READ_WITH_INV = 11,
+ IB_UVERBS_WR_MASKED_ATOMIC_CMP_AND_SWP = 12,
+ IB_UVERBS_WR_MASKED_ATOMIC_FETCH_AND_ADD = 13,
+};
+
+enum ib_uverbs_device_cap_flags {
+ IB_UVERBS_DEVICE_RESIZE_MAX_WR = 1ULL,
+ IB_UVERBS_DEVICE_BAD_PKEY_CNTR = 2ULL,
+ IB_UVERBS_DEVICE_BAD_QKEY_CNTR = 4ULL,
+ IB_UVERBS_DEVICE_RAW_MULTI = 8ULL,
+ IB_UVERBS_DEVICE_AUTO_PATH_MIG = 16ULL,
+ IB_UVERBS_DEVICE_CHANGE_PHY_PORT = 32ULL,
+ IB_UVERBS_DEVICE_UD_AV_PORT_ENFORCE = 64ULL,
+ IB_UVERBS_DEVICE_CURR_QP_STATE_MOD = 128ULL,
+ IB_UVERBS_DEVICE_SHUTDOWN_PORT = 256ULL,
+ IB_UVERBS_DEVICE_PORT_ACTIVE_EVENT = 1024ULL,
+ IB_UVERBS_DEVICE_SYS_IMAGE_GUID = 2048ULL,
+ IB_UVERBS_DEVICE_RC_RNR_NAK_GEN = 4096ULL,
+ IB_UVERBS_DEVICE_SRQ_RESIZE = 8192ULL,
+ IB_UVERBS_DEVICE_N_NOTIFY_CQ = 16384ULL,
+ IB_UVERBS_DEVICE_MEM_WINDOW = 131072ULL,
+ IB_UVERBS_DEVICE_UD_IP_CSUM = 262144ULL,
+ IB_UVERBS_DEVICE_XRC = 1048576ULL,
+ IB_UVERBS_DEVICE_MEM_MGT_EXTENSIONS = 2097152ULL,
+ IB_UVERBS_DEVICE_MEM_WINDOW_TYPE_2A = 8388608ULL,
+ IB_UVERBS_DEVICE_MEM_WINDOW_TYPE_2B = 16777216ULL,
+ IB_UVERBS_DEVICE_RC_IP_CSUM = 33554432ULL,
+ IB_UVERBS_DEVICE_RAW_IP_CSUM = 67108864ULL,
+ IB_UVERBS_DEVICE_MANAGED_FLOW_STEERING = 536870912ULL,
+ IB_UVERBS_DEVICE_RAW_SCATTER_FCS = 17179869184ULL,
+ IB_UVERBS_DEVICE_PCI_WRITE_END_PADDING = 68719476736ULL,
+};
+
+enum ib_uverbs_raw_packet_caps {
+ IB_UVERBS_RAW_PACKET_CAP_CVLAN_STRIPPING = 1,
+ IB_UVERBS_RAW_PACKET_CAP_SCATTER_FCS = 2,
+ IB_UVERBS_RAW_PACKET_CAP_IP_CSUM = 4,
+ IB_UVERBS_RAW_PACKET_CAP_DELAY_DROP = 8,
+};
+
+enum ib_uverbs_access_flags {
+ IB_UVERBS_ACCESS_LOCAL_WRITE = 1,
+ IB_UVERBS_ACCESS_REMOTE_WRITE = 2,
+ IB_UVERBS_ACCESS_REMOTE_READ = 4,
+ IB_UVERBS_ACCESS_REMOTE_ATOMIC = 8,
+ IB_UVERBS_ACCESS_MW_BIND = 16,
+ IB_UVERBS_ACCESS_ZERO_BASED = 32,
+ IB_UVERBS_ACCESS_ON_DEMAND = 64,
+ IB_UVERBS_ACCESS_HUGETLB = 128,
+ IB_UVERBS_ACCESS_RELAXED_ORDERING = 1048576,
+ IB_UVERBS_ACCESS_OPTIONAL_RANGE = 1072693248,
+};
+
+enum ib_uverbs_srq_type {
+ IB_UVERBS_SRQT_BASIC = 0,
+ IB_UVERBS_SRQT_XRC = 1,
+ IB_UVERBS_SRQT_TM = 2,
+};
+
+enum ib_uverbs_wq_type {
+ IB_UVERBS_WQT_RQ = 0,
+};
+
+enum ib_uverbs_wq_flags {
+ IB_UVERBS_WQ_FLAGS_CVLAN_STRIPPING = 1,
+ IB_UVERBS_WQ_FLAGS_SCATTER_FCS = 2,
+ IB_UVERBS_WQ_FLAGS_DELAY_DROP = 4,
+ IB_UVERBS_WQ_FLAGS_PCI_WRITE_END_PADDING = 8,
+};
+
+enum ib_uverbs_qp_type {
+ IB_UVERBS_QPT_RC = 2,
+ IB_UVERBS_QPT_UC = 3,
+ IB_UVERBS_QPT_UD = 4,
+ IB_UVERBS_QPT_RAW_PACKET = 8,
+ IB_UVERBS_QPT_XRC_INI = 9,
+ IB_UVERBS_QPT_XRC_TGT = 10,
+ IB_UVERBS_QPT_DRIVER = 255,
+};
+
+enum ib_uverbs_qp_create_flags {
+ IB_UVERBS_QP_CREATE_BLOCK_MULTICAST_LOOPBACK = 2,
+ IB_UVERBS_QP_CREATE_SCATTER_FCS = 256,
+ IB_UVERBS_QP_CREATE_CVLAN_STRIPPING = 512,
+ IB_UVERBS_QP_CREATE_PCI_WRITE_END_PADDING = 2048,
+ IB_UVERBS_QP_CREATE_SQ_SIG_ALL = 4096,
+};
+
+enum ib_uverbs_gid_type {
+ IB_UVERBS_GID_TYPE_IB = 0,
+ IB_UVERBS_GID_TYPE_ROCE_V1 = 1,
+ IB_UVERBS_GID_TYPE_ROCE_V2 = 2,
+};
+
+enum ib_poll_context {
+ IB_POLL_SOFTIRQ = 0,
+ IB_POLL_WORKQUEUE = 1,
+ IB_POLL_UNBOUND_WORKQUEUE = 2,
+ IB_POLL_LAST_POOL_TYPE = 2,
+ IB_POLL_DIRECT = 3,
+};
+
+enum {
+ POLICYDB_CAP_NETPEER = 0,
+ POLICYDB_CAP_OPENPERM = 1,
+ POLICYDB_CAP_EXTSOCKCLASS = 2,
+ POLICYDB_CAP_ALWAYSNETWORK = 3,
+ POLICYDB_CAP_CGROUPSECLABEL = 4,
+ POLICYDB_CAP_NNP_NOSUID_TRANSITION = 5,
+ POLICYDB_CAP_GENFS_SECLABEL_SYMLINKS = 6,
+ POLICYDB_CAP_IOCTL_SKIP_CLOEXEC = 7,
+ __POLICYDB_CAP_MAX = 8,
+};
+
+struct selinux_avc;
+
+struct selinux_policy;
+
+struct selinux_state {
+ bool enforcing;
+ bool checkreqprot;
+ bool initialized;
+ bool policycap[8];
+ struct page *status_page;
+ struct mutex status_lock;
+ struct selinux_avc *avc;
+ struct selinux_policy *policy;
+ struct mutex policy_mutex;
+};
+
+struct avtab_node;
+
+struct avtab {
+ struct avtab_node **htable;
+ u32 nel;
+ u32 nslot;
+ u32 mask;
+};
+
+struct ebitmap_node;
+
+struct ebitmap {
+ struct ebitmap_node *node;
+ u32 highbit;
+};
+
+struct class_datum;
+
+struct role_datum;
+
+struct user_datum;
+
+struct type_datum;
+
+struct cond_bool_datum;
+
+struct cond_node;
+
+struct role_allow;
+
+struct ocontext;
+
+struct genfs;
+
+struct policydb {
+ int mls_enabled;
+ struct symtab symtab[8];
+ char **sym_val_to_name[8];
+ struct class_datum **class_val_to_struct;
+ struct role_datum **role_val_to_struct;
+ struct user_datum **user_val_to_struct;
+ struct type_datum **type_val_to_struct;
+ struct avtab te_avtab;
+ struct hashtab role_tr;
+ struct ebitmap filename_trans_ttypes;
+ struct hashtab filename_trans;
+ u32 compat_filename_trans_count;
+ struct cond_bool_datum **bool_val_to_struct;
+ struct avtab te_cond_avtab;
+ struct cond_node *cond_list;
+ u32 cond_list_len;
+ struct role_allow *role_allow;
+ struct ocontext *ocontexts[9];
+ struct genfs *genfs;
+ struct hashtab range_tr;
+ struct ebitmap *type_attr_map_array;
+ struct ebitmap policycaps;
+ struct ebitmap permissive_map;
+ size_t len;
+ unsigned int policyvers;
+ unsigned int reject_unknown: 1;
+ unsigned int allow_unknown: 1;
+ u16 process_class;
+ u32 process_trans_perms;
+};
+
+struct selinux_mapping;
+
+struct selinux_map {
+ struct selinux_mapping *mapping;
+ u16 size;
+};
+
+struct sidtab;
+
+struct selinux_policy {
+ struct sidtab *sidtab;
+ struct policydb policydb;
+ struct selinux_map map;
+ u32 latest_granting;
+};
+
+struct selinux_policy_convert_data;
+
+struct selinux_load_state {
+ struct selinux_policy *policy;
+ struct selinux_policy_convert_data *convert_data;
+};
+
+struct convert_context_args {
+ struct selinux_state *state;
+ struct policydb *oldp;
+ struct policydb *newp;
+};
+
+struct context;
+
+struct sidtab_convert_params {
+ int (*func)(struct context *, struct context *, void *, gfp_t);
+ void *args;
+ struct sidtab *target;
+};
+
+struct selinux_policy_convert_data {
+ struct convert_context_args args;
+ struct sidtab_convert_params sidtab_params;
+};
+
+struct av_decision {
+ u32 allowed;
+ u32 auditallow;
+ u32 auditdeny;
+ u32 seqno;
+ u32 flags;
+};
+
+struct extended_perms_data {
+ u32 p[8];
+};
+
+struct extended_perms_decision {
+ u8 used;
+ u8 driver;
+ struct extended_perms_data *allowed;
+ struct extended_perms_data *auditallow;
+ struct extended_perms_data *dontaudit;
+};
+
+struct extended_perms {
+ u16 len;
+ struct extended_perms_data drivers;
+};
+
+struct security_class_mapping {
+ const char *name;
+ const char *perms[33];
+};
+
+struct ebitmap_node {
+ struct ebitmap_node *next;
+ long unsigned int maps[6];
+ u32 startbit;
+};
+
+struct mls_level {
+ u32 sens;
+ struct ebitmap cat;
+};
+
+struct mls_range {
+ struct mls_level level[2];
+};
+
+struct context {
+ u32 user;
+ u32 role;
+ u32 type;
+ u32 len;
+ struct mls_range range;
+ char *str;
+};
+
+struct avtab_key {
+ u16 source_type;
+ u16 target_type;
+ u16 target_class;
+ u16 specified;
+};
+
+struct avtab_extended_perms {
+ u8 specified;
+ u8 driver;
+ struct extended_perms_data perms;
+};
+
+struct avtab_datum {
+ union {
+ u32 data;
+ struct avtab_extended_perms *xperms;
+ } u;
+};
+
+struct avtab_node {
+ struct avtab_key key;
+ struct avtab_datum datum;
+ struct avtab_node *next;
+};
+
+struct sidtab_str_cache;
+
+struct sidtab_entry {
+ u32 sid;
+ u32 hash;
+ struct context context;
+ struct sidtab_str_cache *cache;
+ struct hlist_node list;
+};
+
+struct sidtab_node_inner;
+
+struct sidtab_node_leaf;
+
+union sidtab_entry_inner {
+ struct sidtab_node_inner *ptr_inner;
+ struct sidtab_node_leaf *ptr_leaf;
+};
+
+struct sidtab_node_inner {
+ union sidtab_entry_inner entries[512];
+};
+
+struct sidtab_node_leaf {
+ struct sidtab_entry entries[39];
+};
+
+struct sidtab_isid_entry {
+ int set;
+ struct sidtab_entry entry;
+};
+
+struct sidtab {
+ union sidtab_entry_inner roots[4];
+ u32 count;
+ struct sidtab_convert_params *convert;
+ bool frozen;
+ spinlock_t lock;
+ u32 cache_free_slots;
+ struct list_head cache_lru_list;
+ spinlock_t cache_lock;
+ struct sidtab_isid_entry isids[27];
+ struct hlist_head context_to_sid[512];
+};
+
+struct type_set;
+
+struct constraint_expr {
+ u32 expr_type;
+ u32 attr;
+ u32 op;
+ struct ebitmap names;
+ struct type_set *type_names;
+ struct constraint_expr *next;
+};
+
+struct type_set {
+ struct ebitmap types;
+ struct ebitmap negset;
+ u32 flags;
+};
+
+struct constraint_node {
+ u32 permissions;
+ struct constraint_expr *expr;
+ struct constraint_node *next;
+};
+
+struct perm_datum {
+ u32 value;
+};
+
+struct common_datum {
+ u32 value;
+ struct symtab permissions;
+};
+
+struct class_datum {
+ u32 value;
+ char *comkey;
+ struct common_datum *comdatum;
+ struct symtab permissions;
+ struct constraint_node *constraints;
+ struct constraint_node *validatetrans;
+ char default_user;
+ char default_role;
+ char default_type;
+ char default_range;
+};
+
+struct role_datum {
+ u32 value;
+ u32 bounds;
+ struct ebitmap dominates;
+ struct ebitmap types;
+};
+
+struct role_trans_key {
+ u32 role;
+ u32 type;
+ u32 tclass;
+};
+
+struct role_trans_datum {
+ u32 new_role;
+};
+
+struct filename_trans_key {
+ u32 ttype;
+ u16 tclass;
+ const char *name;
+};
+
+struct filename_trans_datum {
+ struct ebitmap stypes;
+ u32 otype;
+ struct filename_trans_datum *next;
+};
+
+struct role_allow {
+ u32 role;
+ u32 new_role;
+ struct role_allow *next;
+};
+
+struct type_datum {
+ u32 value;
+ u32 bounds;
+ unsigned char primary;
+ unsigned char attribute;
+};
+
+struct user_datum {
+ u32 value;
+ u32 bounds;
+ struct ebitmap roles;
+ struct mls_range range;
+ struct mls_level dfltlevel;
+};
+
+struct cond_bool_datum {
+ __u32 value;
+ int state;
+};
+
+struct ocontext {
+ union {
+ char *name;
+ struct {
+ u8 protocol;
+ u16 low_port;
+ u16 high_port;
+ } port;
+ struct {
+ u32 addr;
+ u32 mask;
+ } node;
+ struct {
+ u32 addr[4];
+ u32 mask[4];
+ } node6;
+ struct {
+ u64 subnet_prefix;
+ u16 low_pkey;
+ u16 high_pkey;
+ } ibpkey;
+ struct {
+ char *dev_name;
+ u8 port;
+ } ibendport;
+ } u;
+ union {
+ u32 sclass;
+ u32 behavior;
+ } v;
+ struct context context[2];
+ u32 sid[2];
+ struct ocontext *next;
+};
+
+struct genfs {
+ char *fstype;
+ struct ocontext *head;
+ struct genfs *next;
+};
+
+struct cond_expr_node;
+
+struct cond_expr {
+ struct cond_expr_node *nodes;
+ u32 len;
+};
+
+struct cond_av_list {
+ struct avtab_node **nodes;
+ u32 len;
+};
+
+struct cond_node {
+ int cur_state;
+ struct cond_expr expr;
+ struct cond_av_list true_list;
+ struct cond_av_list false_list;
+};
+
+struct policy_file {
+ char *data;
+ size_t len;
+};
+
+struct selinux_mapping {
+ u16 value;
+ unsigned int num_perms;
+ u32 perms[32];
+};
+
+struct cond_expr_node {
+ u32 expr_type;
+ u32 bool;
+};
+
+struct superblock_security_struct {
+ u32 sid;
+ u32 def_sid;
+ u32 mntpoint_sid;
+ short unsigned int behavior;
+ short unsigned int flags;
+ struct mutex lock;
+ struct list_head isec_head;
+ spinlock_t isec_lock;
+};
+
+enum sctp_msg_flags {
+ MSG_NOTIFICATION = 32768,
+};
+
+enum sctp_cid {
+ SCTP_CID_DATA = 0,
+ SCTP_CID_INIT = 1,
+ SCTP_CID_INIT_ACK = 2,
+ SCTP_CID_SACK = 3,
+ SCTP_CID_HEARTBEAT = 4,
+ SCTP_CID_HEARTBEAT_ACK = 5,
+ SCTP_CID_ABORT = 6,
+ SCTP_CID_SHUTDOWN = 7,
+ SCTP_CID_SHUTDOWN_ACK = 8,
+ SCTP_CID_ERROR = 9,
+ SCTP_CID_COOKIE_ECHO = 10,
+ SCTP_CID_COOKIE_ACK = 11,
+ SCTP_CID_ECN_ECNE = 12,
+ SCTP_CID_ECN_CWR = 13,
+ SCTP_CID_SHUTDOWN_COMPLETE = 14,
+ SCTP_CID_AUTH = 15,
+ SCTP_CID_I_DATA = 64,
+ SCTP_CID_FWD_TSN = 192,
+ SCTP_CID_ASCONF = 193,
+ SCTP_CID_I_FWD_TSN = 194,
+ SCTP_CID_ASCONF_ACK = 128,
+ SCTP_CID_RECONF = 130,
+ SCTP_CID_PAD = 132,
+};
+
+enum {
+ SCTP_MAX_STREAM = 65535,
+};
+
+enum sctp_event_timeout {
+ SCTP_EVENT_TIMEOUT_NONE = 0,
+ SCTP_EVENT_TIMEOUT_T1_COOKIE = 1,
+ SCTP_EVENT_TIMEOUT_T1_INIT = 2,
+ SCTP_EVENT_TIMEOUT_T2_SHUTDOWN = 3,
+ SCTP_EVENT_TIMEOUT_T3_RTX = 4,
+ SCTP_EVENT_TIMEOUT_T4_RTO = 5,
+ SCTP_EVENT_TIMEOUT_T5_SHUTDOWN_GUARD = 6,
+ SCTP_EVENT_TIMEOUT_HEARTBEAT = 7,
+ SCTP_EVENT_TIMEOUT_RECONF = 8,
+ SCTP_EVENT_TIMEOUT_PROBE = 9,
+ SCTP_EVENT_TIMEOUT_SACK = 10,
+ SCTP_EVENT_TIMEOUT_AUTOCLOSE = 11,
+};
+
+enum {
+ SCTP_MAX_DUP_TSNS = 16,
+};
+
+enum {
+ SCTP_AUTH_HMAC_ID_RESERVED_0 = 0,
+ SCTP_AUTH_HMAC_ID_SHA1 = 1,
+ SCTP_AUTH_HMAC_ID_RESERVED_2 = 2,
+ SCTP_AUTH_HMAC_ID_SHA256 = 3,
+ __SCTP_AUTH_HMAC_MAX = 4,
+};
+
+struct selinux_audit_rule {
+ u32 au_seqno;
+ struct context au_ctxt;
+};
+
+struct audit_buffer;
+
+enum xt_statistic_mode {
+ XT_STATISTIC_MODE_RANDOM = 0,
+ XT_STATISTIC_MODE_NTH = 1,
+ __XT_STATISTIC_MODE_MAX = 2,
+};
+
+enum xt_statistic_flags {
+ XT_STATISTIC_INVERT = 1,
+};
+
+struct xt_statistic_priv;
+
+struct xt_statistic_info {
+ __u16 mode;
+ __u16 flags;
+ union {
+ struct {
+ __u32 probability;
+ } random;
+ struct {
+ __u32 every;
+ __u32 packet;
+ __u32 count;
+ } nth;
+ } u;
+ struct xt_statistic_priv *master;
+};
+
+struct xt_statistic_priv {
+ atomic_t count;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct xt_action_param;
+
+struct xt_mtchk_param;
+
+struct xt_mtdtor_param;
+
+struct xt_match {
+ struct list_head list;
+ const char name[29];
+ u_int8_t revision;
+ bool (*match)(const struct sk_buff *, struct xt_action_param *);
+ int (*checkentry)(const struct xt_mtchk_param *);
+ void (*destroy)(const struct xt_mtdtor_param *);
+ struct module *me;
+ const char *table;
+ unsigned int matchsize;
+ unsigned int usersize;
+ unsigned int hooks;
+ short unsigned int proto;
+ short unsigned int family;
+};
+
+struct xt_tgchk_param;
+
+struct xt_tgdtor_param;
+
+struct xt_target {
+ struct list_head list;
+ const char name[29];
+ u_int8_t revision;
+ unsigned int (*target)(struct sk_buff *, const struct xt_action_param *);
+ int (*checkentry)(const struct xt_tgchk_param *);
+ void (*destroy)(const struct xt_tgdtor_param *);
+ struct module *me;
+ const char *table;
+ unsigned int targetsize;
+ unsigned int usersize;
+ unsigned int hooks;
+ short unsigned int proto;
+ short unsigned int family;
+};
+
+struct xt_action_param {
+ union {
+ const struct xt_match *match;
+ const struct xt_target *target;
+ };
+ union {
+ const void *matchinfo;
+ const void *targinfo;
+ };
+ const struct nf_hook_state *state;
+ unsigned int thoff;
+ u16 fragoff;
+ bool hotdrop;
+};
+
+struct xt_mtchk_param {
+ struct net *net;
+ const char *table;
+ const void *entryinfo;
+ const struct xt_match *match;
+ void *matchinfo;
+ unsigned int hook_mask;
+ u_int8_t family;
+ bool nft_compat;
+};
+
+struct xt_mtdtor_param {
+ struct net *net;
+ const struct xt_match *match;
+ void *matchinfo;
+ u_int8_t family;
+};
+
+struct xt_tgchk_param {
+ struct net *net;
+ const char *table;
+ const void *entryinfo;
+ const struct xt_target *target;
+ void *targinfo;
+ unsigned int hook_mask;
+ u_int8_t family;
+ bool nft_compat;
+};
+
+struct xt_tgdtor_param {
+ struct net *net;
+ const struct xt_target *target;
+ void *targinfo;
+ u_int8_t family;
+};
+
+enum tk_offsets {
+ TK_OFFS_REAL = 0,
+ TK_OFFS_BOOT = 1,
+ TK_OFFS_TAI = 2,
+ TK_OFFS_MAX = 3,
+};
+
+enum {
+ IFLA_UNSPEC = 0,
+ IFLA_ADDRESS = 1,
+ IFLA_BROADCAST = 2,
+ IFLA_IFNAME = 3,
+ IFLA_MTU = 4,
+ IFLA_LINK = 5,
+ IFLA_QDISC = 6,
+ IFLA_STATS = 7,
+ IFLA_COST = 8,
+ IFLA_PRIORITY = 9,
+ IFLA_MASTER = 10,
+ IFLA_WIRELESS = 11,
+ IFLA_PROTINFO = 12,
+ IFLA_TXQLEN = 13,
+ IFLA_MAP = 14,
+ IFLA_WEIGHT = 15,
+ IFLA_OPERSTATE = 16,
+ IFLA_LINKMODE = 17,
+ IFLA_LINKINFO = 18,
+ IFLA_NET_NS_PID = 19,
+ IFLA_IFALIAS = 20,
+ IFLA_NUM_VF = 21,
+ IFLA_VFINFO_LIST = 22,
+ IFLA_STATS64 = 23,
+ IFLA_VF_PORTS = 24,
+ IFLA_PORT_SELF = 25,
+ IFLA_AF_SPEC = 26,
+ IFLA_GROUP = 27,
+ IFLA_NET_NS_FD = 28,
+ IFLA_EXT_MASK = 29,
+ IFLA_PROMISCUITY = 30,
+ IFLA_NUM_TX_QUEUES = 31,
+ IFLA_NUM_RX_QUEUES = 32,
+ IFLA_CARRIER = 33,
+ IFLA_PHYS_PORT_ID = 34,
+ IFLA_CARRIER_CHANGES = 35,
+ IFLA_PHYS_SWITCH_ID = 36,
+ IFLA_LINK_NETNSID = 37,
+ IFLA_PHYS_PORT_NAME = 38,
+ IFLA_PROTO_DOWN = 39,
+ IFLA_GSO_MAX_SEGS = 40,
+ IFLA_GSO_MAX_SIZE = 41,
+ IFLA_PAD = 42,
+ IFLA_XDP = 43,
+ IFLA_EVENT = 44,
+ IFLA_NEW_NETNSID = 45,
+ IFLA_IF_NETNSID = 46,
+ IFLA_TARGET_NETNSID = 46,
+ IFLA_CARRIER_UP_COUNT = 47,
+ IFLA_CARRIER_DOWN_COUNT = 48,
+ IFLA_NEW_IFINDEX = 49,
+ IFLA_MIN_MTU = 50,
+ IFLA_MAX_MTU = 51,
+ IFLA_PROP_LIST = 52,
+ IFLA_ALT_IFNAME = 53,
+ IFLA_PERM_ADDRESS = 54,
+ IFLA_PROTO_DOWN_REASON = 55,
+ IFLA_PARENT_DEV_NAME = 56,
+ IFLA_PARENT_DEV_BUS_NAME = 57,
+ IFLA_GRO_MAX_SIZE = 58,
+ IFLA_TSO_MAX_SIZE = 59,
+ IFLA_TSO_MAX_SEGS = 60,
+ IFLA_ALLMULTI = 61,
+ IFLA_DEVLINK_PORT = 62,
+ __IFLA_MAX = 63,
+};
+
+struct ifinfomsg {
+ unsigned char ifi_family;
+ unsigned char __ifi_pad;
+ short unsigned int ifi_type;
+ int ifi_index;
+ unsigned int ifi_flags;
+ unsigned int ifi_change;
+};
+
+enum lwtunnel_encap_types {
+ LWTUNNEL_ENCAP_NONE = 0,
+ LWTUNNEL_ENCAP_MPLS = 1,
+ LWTUNNEL_ENCAP_IP = 2,
+ LWTUNNEL_ENCAP_ILA = 3,
+ LWTUNNEL_ENCAP_IP6 = 4,
+ LWTUNNEL_ENCAP_SEG6 = 5,
+ LWTUNNEL_ENCAP_BPF = 6,
+ LWTUNNEL_ENCAP_SEG6_LOCAL = 7,
+ LWTUNNEL_ENCAP_RPL = 8,
+ LWTUNNEL_ENCAP_IOAM6 = 9,
+ LWTUNNEL_ENCAP_XFRM = 10,
+ __LWTUNNEL_ENCAP_MAX = 11,
+};
+
+enum tunnel_encap_types {
+ TUNNEL_ENCAP_NONE = 0,
+ TUNNEL_ENCAP_FOU = 1,
+ TUNNEL_ENCAP_GUE = 2,
+ TUNNEL_ENCAP_MPLS = 3,
+};
+
+enum {
+ IFLA_GRE_UNSPEC = 0,
+ IFLA_GRE_LINK = 1,
+ IFLA_GRE_IFLAGS = 2,
+ IFLA_GRE_OFLAGS = 3,
+ IFLA_GRE_IKEY = 4,
+ IFLA_GRE_OKEY = 5,
+ IFLA_GRE_LOCAL = 6,
+ IFLA_GRE_REMOTE = 7,
+ IFLA_GRE_TTL = 8,
+ IFLA_GRE_TOS = 9,
+ IFLA_GRE_PMTUDISC = 10,
+ IFLA_GRE_ENCAP_LIMIT = 11,
+ IFLA_GRE_FLOWINFO = 12,
+ IFLA_GRE_FLAGS = 13,
+ IFLA_GRE_ENCAP_TYPE = 14,
+ IFLA_GRE_ENCAP_FLAGS = 15,
+ IFLA_GRE_ENCAP_SPORT = 16,
+ IFLA_GRE_ENCAP_DPORT = 17,
+ IFLA_GRE_COLLECT_METADATA = 18,
+ IFLA_GRE_IGNORE_DF = 19,
+ IFLA_GRE_FWMARK = 20,
+ IFLA_GRE_ERSPAN_INDEX = 21,
+ IFLA_GRE_ERSPAN_VER = 22,
+ IFLA_GRE_ERSPAN_DIR = 23,
+ IFLA_GRE_ERSPAN_HWID = 24,
+ __IFLA_GRE_MAX = 25,
+};
+
+struct dst_cache_pcpu;
+
+struct dst_cache {
+ struct dst_cache_pcpu *cache;
+ long unsigned int reset_ts;
+};
+
+struct ip_tunnel_key {
+ __be64 tun_id;
+ union {
+ struct {
+ __be32 src;
+ __be32 dst;
+ } ipv4;
+ struct {
+ struct in6_addr src;
+ struct in6_addr dst;
+ } ipv6;
+ } u;
+ __be16 tun_flags;
+ u8 tos;
+ u8 ttl;
+ __be32 label;
+ __be16 tp_src;
+ __be16 tp_dst;
+ __u8 flow_flags;
+};
+
+struct ip_tunnel_info {
+ struct ip_tunnel_key key;
+ struct dst_cache dst_cache;
+ u8 options_len;
+ u8 mode;
+};
+
+struct ip_tunnel_encap {
+ u16 type;
+ u16 flags;
+ __be16 sport;
+ __be16 dport;
+};
+
+struct ip_tunnel_prl_entry {
+ struct ip_tunnel_prl_entry *next;
+ __be32 addr;
+ u16 flags;
+ struct callback_head callback_head;
+};
+
+struct ip_tunnel {
+ struct ip_tunnel *next;
+ struct hlist_node hash_node;
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ struct net *net;
+ long unsigned int err_time;
+ int err_count;
+ u32 i_seqno;
+ atomic_t o_seqno;
+ int tun_hlen;
+ u32 index;
+ u8 erspan_ver;
+ u8 dir;
+ u16 hwid;
+ struct dst_cache dst_cache;
+ struct ip_tunnel_parm parms;
+ int mlink;
+ int encap_hlen;
+ int hlen;
+ struct ip_tunnel_encap encap;
+ struct ip_tunnel_prl_entry *prl;
+ unsigned int prl_count;
+ unsigned int ip_tnl_net_id;
+ struct gro_cells gro_cells;
+ __u32 fwmark;
+ bool collect_md;
+ bool ignore_df;
+};
+
+struct tnl_ptk_info {
+ __be16 flags;
+ __be16 proto;
+ __be32 key;
+ __be32 seq;
+ int hdr_len;
+};
+
+struct ip_tunnel_net {
+ struct net_device *fb_tunnel_dev;
+ struct rtnl_link_ops *rtnl_link_ops;
+ struct hlist_head tunnels[128];
+ struct ip_tunnel *collect_md_tun;
+ int type;
+};
+
+struct gre_base_hdr {
+ __be16 flags;
+ __be16 protocol;
+};
+
+struct gre_protocol {
+ int (*handler)(struct sk_buff *);
+ void (*err_handler)(struct sk_buff *, u32);
+};
+
+typedef u64 sci_t;
+
+enum metadata_type {
+ METADATA_IP_TUNNEL = 0,
+ METADATA_HW_PORT_MUX = 1,
+ METADATA_MACSEC = 2,
+ METADATA_XFRM = 3,
+};
+
+struct hw_port_info {
+ struct net_device *lower_dev;
+ u32 port_id;
+};
+
+struct macsec_info {
+ sci_t sci;
+};
+
+struct xfrm_md_info {
+ u32 if_id;
+ int link;
+};
+
+struct metadata_dst {
+ struct dst_entry dst;
+ enum metadata_type type;
+ union {
+ struct ip_tunnel_info tun_info;
+ struct hw_port_info port_info;
+ struct macsec_info macsec_info;
+ struct xfrm_md_info xfrm_info;
+ } u;
+};
+
+struct erspan_md2 {
+ __be32 timestamp;
+ __be16 sgt;
+ __u8 hwid_upper: 2;
+ __u8 ft: 5;
+ __u8 p: 1;
+ __u8 o: 1;
+ __u8 gra: 2;
+ __u8 dir: 1;
+ __u8 hwid: 4;
+};
+
+struct erspan_metadata {
+ int version;
+ union {
+ __be32 index;
+ struct erspan_md2 md2;
+ } u;
+};
+
+enum erspan_encap_type {
+ ERSPAN_ENCAP_NOVLAN = 0,
+ ERSPAN_ENCAP_ISL = 1,
+ ERSPAN_ENCAP_8021Q = 2,
+ ERSPAN_ENCAP_INFRAME = 3,
+};
+
+struct erspan_base_hdr {
+ __u8 vlan_upper: 4;
+ __u8 ver: 4;
+ __u8 vlan: 8;
+ __u8 session_id_upper: 2;
+ __u8 t: 1;
+ __u8 en: 2;
+ __u8 cos: 3;
+ __u8 session_id: 8;
+};
+
+enum erspan_bso {
+ BSO_NOERROR = 0,
+ BSO_SHORT = 1,
+ BSO_OVERSIZED = 2,
+ BSO_BAD = 3,
+};
+
+struct qtag_prefix {
+ __be16 eth_type;
+ __be16 tci;
+};
+
+typedef u8 uint8_t;
+
+struct flow_dissector_key_control {
+ u16 thoff;
+ u16 addr_type;
+ u32 flags;
+};
+
+struct flow_dissector_key_basic {
+ __be16 n_proto;
+ u8 ip_proto;
+ u8 padding;
+};
+
+struct flow_dissector_key_tags {
+ u32 flow_label;
+};
+
+struct flow_dissector_key_vlan {
+ union {
+ struct {
+ u16 vlan_id: 12;
+ u16 vlan_dei: 1;
+ u16 vlan_priority: 3;
+ };
+ __be16 vlan_tci;
+ };
+ __be16 vlan_tpid;
+ __be16 vlan_eth_type;
+ u16 padding;
+};
+
+struct flow_dissector_key_keyid {
+ __be32 keyid;
+};
+
+struct flow_dissector_key_ipv4_addrs {
+ __be32 src;
+ __be32 dst;
+};
+
+struct flow_dissector_key_ipv6_addrs {
+ struct in6_addr src;
+ struct in6_addr dst;
+};
+
+struct flow_dissector_key_tipc {
+ __be32 key;
+};
+
+struct flow_dissector_key_addrs {
+ union {
+ struct flow_dissector_key_ipv4_addrs v4addrs;
+ struct flow_dissector_key_ipv6_addrs v6addrs;
+ struct flow_dissector_key_tipc tipckey;
+ };
+};
+
+struct flow_dissector_key_ports {
+ union {
+ __be32 ports;
+ struct {
+ __be16 src;
+ __be16 dst;
+ };
+ };
+};
+
+struct flow_dissector_key_icmp {
+ struct {
+ u8 type;
+ u8 code;
+ };
+ u16 id;
+};
+
+struct flow_keys {
+ struct flow_dissector_key_control control;
+ struct flow_dissector_key_basic basic;
+ struct flow_dissector_key_tags tags;
+ struct flow_dissector_key_vlan vlan;
+ struct flow_dissector_key_vlan cvlan;
+ struct flow_dissector_key_keyid keyid;
+ struct flow_dissector_key_ports ports;
+ struct flow_dissector_key_icmp icmp;
+ struct flow_dissector_key_addrs addrs;
+ int: 32;
+};
+
+struct icmpv6_echo {
+ __be16 identifier;
+ __be16 sequence;
+};
+
+struct icmpv6_nd_advt {
+ __u32 reserved: 5;
+ __u32 override: 1;
+ __u32 solicited: 1;
+ __u32 router: 1;
+ __u32 reserved2: 24;
+};
+
+struct icmpv6_nd_ra {
+ __u8 hop_limit;
+ __u8 reserved: 3;
+ __u8 router_pref: 2;
+ __u8 home_agent: 1;
+ __u8 other: 1;
+ __u8 managed: 1;
+ __be16 rt_lifetime;
+};
+
+struct icmp6hdr {
+ __u8 icmp6_type;
+ __u8 icmp6_code;
+ __sum16 icmp6_cksum;
+ union {
+ __be32 un_data32[1];
+ __be16 un_data16[2];
+ __u8 un_data8[4];
+ struct icmpv6_echo u_echo;
+ struct icmpv6_nd_advt u_nd_advt;
+ struct icmpv6_nd_ra u_nd_ra;
+ } icmp6_dataun;
+};
+
+struct seg6_pernet_data {
+ struct mutex lock;
+ struct in6_addr *tun_src;
+};
+
+enum {
+ XFRM_LOOKUP_ICMP = 1,
+ XFRM_LOOKUP_QUEUE = 2,
+ XFRM_LOOKUP_KEEP_DST_REF = 4,
+};
+
+typedef void ip6_icmp_send_t(struct sk_buff *, u8, u8, __u32, const struct in6_addr *, const struct inet6_skb_parm *);
+
+struct ipcm6_cookie {
+ struct sockcm_cookie sockc;
+ __s16 hlimit;
+ __s16 tclass;
+ __u16 gso_size;
+ __s8 dontfrag;
+ struct ipv6_txoptions *opt;
+};
+
+struct ipv4_addr_key {
+ __be32 addr;
+ int vif;
+};
+
+struct inetpeer_addr {
+ union {
+ struct ipv4_addr_key a4;
+ struct in6_addr a6;
+ u32 key[4];
+ };
+ __u16 family;
+};
+
+struct inet_peer {
+ struct rb_node rb_node;
+ struct inetpeer_addr daddr;
+ u32 metrics[17];
+ u32 rate_tokens;
+ u32 n_redirects;
+ long unsigned int rate_last;
+ union {
+ struct {
+ atomic_t rid;
+ };
+ struct callback_head rcu;
+ };
+ __u32 dtime;
+ refcount_t refcnt;
+};
+
+struct icmpv6_msg {
+ struct sk_buff *skb;
+ int offset;
+ uint8_t type;
+};
+
+struct icmp6_err {
+ int err;
+ int fatal;
+};
+
+struct xdp_desc {
+ __u64 addr;
+ __u32 len;
+ __u32 options;
+};
+
+struct scm_creds {
+ u32 pid;
+ kuid_t uid;
+ kgid_t gid;
+};
+
+struct netlink_skb_parms {
+ struct scm_creds creds;
+ __u32 portid;
+ __u32 dst_group;
+ __u32 flags;
+ struct sock *sk;
+ bool nsid_is_set;
+ int nsid;
+};
+
+struct netlink_dump_control {
+ int (*start)(struct netlink_callback *);
+ int (*dump)(struct sk_buff *, struct netlink_callback *);
+ int (*done)(struct netlink_callback *);
+ void *data;
+ struct module *module;
+ u32 min_dump_alloc;
+};
+
+struct xdp_umem;
+
+struct xsk_queue;
+
+struct xdp_buff_xsk;
+
+struct xsk_buff_pool {
+ struct device *dev;
+ struct net_device *netdev;
+ struct list_head xsk_tx_list;
+ spinlock_t xsk_tx_list_lock;
+ refcount_t users;
+ struct xdp_umem *umem;
+ struct work_struct work;
+ struct list_head free_list;
+ u32 heads_cnt;
+ u16 queue_id;
+ long: 16;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct xsk_queue *fq;
+ struct xsk_queue *cq;
+ dma_addr_t *dma_pages;
+ struct xdp_buff_xsk *heads;
+ struct xdp_desc *tx_descs;
+ u64 chunk_mask;
+ u64 addrs_cnt;
+ u32 free_list_cnt;
+ u32 dma_pages_cnt;
+ u32 free_heads_cnt;
+ u32 headroom;
+ u32 chunk_size;
+ u32 chunk_shift;
+ u32 frame_len;
+ u8 cached_need_wakeup;
+ bool uses_need_wakeup;
+ bool dma_need_sync;
+ bool unaligned;
+ void *addrs;
+ spinlock_t cq_lock;
+ struct xdp_buff_xsk *free_heads[0];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct xdp_umem {
+ void *addrs;
+ u64 size;
+ u32 headroom;
+ u32 chunk_size;
+ u32 chunks;
+ u32 npgs;
+ struct user_struct *user;
+ refcount_t users;
+ u8 flags;
+ bool zc;
+ struct page **pgs;
+ int id;
+ struct list_head xsk_dma_list;
+ struct work_struct work;
+};
+
+struct xdp_sock {
+ struct sock sk;
+ struct xsk_queue *rx;
+ struct net_device *dev;
+ struct xdp_umem *umem;
+ struct list_head flush_node;
+ struct xsk_buff_pool *pool;
+ u16 queue_id;
+ bool zc;
+ enum {
+ XSK_READY = 0,
+ XSK_BOUND = 1,
+ XSK_UNBOUND = 2,
+ } state;
+ long: 64;
+ struct xsk_queue *tx;
+ struct list_head tx_list;
+ spinlock_t rx_lock;
+ u64 rx_dropped;
+ u64 rx_queue_full;
+ struct list_head map_list;
+ spinlock_t map_list_lock;
+ struct mutex mutex;
+ struct xsk_queue *fq_tmp;
+ struct xsk_queue *cq_tmp;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct xdp_ring;
+
+struct xsk_queue {
+ u32 ring_mask;
+ u32 nentries;
+ u32 cached_prod;
+ u32 cached_cons;
+ struct xdp_ring *ring;
+ u64 invalid_descs;
+ u64 queue_empty_descs;
+};
+
+struct xdp_diag_req {
+ __u8 sdiag_family;
+ __u8 sdiag_protocol;
+ __u16 pad;
+ __u32 xdiag_ino;
+ __u32 xdiag_show;
+ __u32 xdiag_cookie[2];
+};
+
+struct xdp_diag_msg {
+ __u8 xdiag_family;
+ __u8 xdiag_type;
+ __u16 pad;
+ __u32 xdiag_ino;
+ __u32 xdiag_cookie[2];
+};
+
+enum {
+ XDP_DIAG_NONE = 0,
+ XDP_DIAG_INFO = 1,
+ XDP_DIAG_UID = 2,
+ XDP_DIAG_RX_RING = 3,
+ XDP_DIAG_TX_RING = 4,
+ XDP_DIAG_UMEM = 5,
+ XDP_DIAG_UMEM_FILL_RING = 6,
+ XDP_DIAG_UMEM_COMPLETION_RING = 7,
+ XDP_DIAG_MEMINFO = 8,
+ XDP_DIAG_STATS = 9,
+ __XDP_DIAG_MAX = 10,
+};
+
+struct xdp_diag_info {
+ __u32 ifindex;
+ __u32 queue_id;
+};
+
+struct xdp_diag_ring {
+ __u32 entries;
+};
+
+struct xdp_diag_umem {
+ __u64 size;
+ __u32 id;
+ __u32 num_pages;
+ __u32 chunk_size;
+ __u32 headroom;
+ __u32 ifindex;
+ __u32 queue_id;
+ __u32 flags;
+ __u32 refs;
+};
+
+struct xdp_diag_stats {
+ __u64 n_rx_dropped;
+ __u64 n_rx_invalid;
+ __u64 n_rx_full;
+ __u64 n_fill_ring_empty;
+ __u64 n_tx_invalid;
+ __u64 n_tx_ring_empty;
+};
+
+struct sock_diag_handler {
+ __u8 family;
+ int (*dump)(struct sk_buff *, struct nlmsghdr *);
+ int (*get_info)(struct sk_buff *, struct sock *);
+ int (*destroy)(struct sk_buff *, struct nlmsghdr *);
+};
+
+struct xdp_buff_xsk {
+ struct xdp_buff xdp;
+ dma_addr_t dma;
+ dma_addr_t frame_dma;
+ struct xsk_buff_pool *pool;
+ u64 orig_addr;
+ struct list_head free_list_node;
+};
+
+struct xdp_ring {
+ u32 producer;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ u32 pad1;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ u32 consumer;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ u32 pad2;
+ u32 flags;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ u32 pad3;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+typedef int (*initcall_t)();
+
+typedef int initcall_entry_t;
+
+enum system_states {
+ SYSTEM_BOOTING = 0,
+ SYSTEM_SCHEDULING = 1,
+ SYSTEM_FREEING_INITMEM = 2,
+ SYSTEM_RUNNING = 3,
+ SYSTEM_HALT = 4,
+ SYSTEM_POWER_OFF = 5,
+ SYSTEM_RESTART = 6,
+ SYSTEM_SUSPEND = 7,
+};
+
+struct fixed_percpu_data {
+ char gs_base[40];
+ long unsigned int stack_canary;
+};
+
+struct xbc_node {
+ uint16_t next;
+ uint16_t child;
+ uint16_t parent;
+ uint16_t data;
+};
+
+struct trace_event_raw_initcall_level {
+ struct trace_entry ent;
+ u32 __data_loc_level;
+ char __data[0];
+};
+
+struct trace_event_raw_initcall_start {
+ struct trace_entry ent;
+ initcall_t func;
+ char __data[0];
+};
+
+struct trace_event_raw_initcall_finish {
+ struct trace_entry ent;
+ initcall_t func;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_initcall_level {
+ u32 level;
+};
+
+struct trace_event_data_offsets_initcall_start {};
+
+struct trace_event_data_offsets_initcall_finish {};
+
+typedef void (*btf_trace_initcall_level)(void *, const char *);
+
+typedef void (*btf_trace_initcall_start)(void *, initcall_t);
+
+typedef void (*btf_trace_initcall_finish)(void *, initcall_t, int);
+
+struct blacklist_entry {
+ struct list_head next;
+ char *buf;
+};
+
+typedef __u64 Elf64_Off;
+
+struct elf64_hdr {
+ unsigned char e_ident[16];
+ Elf64_Half e_type;
+ Elf64_Half e_machine;
+ Elf64_Word e_version;
+ Elf64_Addr e_entry;
+ Elf64_Off e_phoff;
+ Elf64_Off e_shoff;
+ Elf64_Word e_flags;
+ Elf64_Half e_ehsize;
+ Elf64_Half e_phentsize;
+ Elf64_Half e_phnum;
+ Elf64_Half e_shentsize;
+ Elf64_Half e_shnum;
+ Elf64_Half e_shstrndx;
+};
+
+typedef struct elf64_hdr Elf64_Ehdr;
+
+struct elf64_shdr {
+ Elf64_Word sh_name;
+ Elf64_Word sh_type;
+ Elf64_Xword sh_flags;
+ Elf64_Addr sh_addr;
+ Elf64_Off sh_offset;
+ Elf64_Xword sh_size;
+ Elf64_Word sh_link;
+ Elf64_Word sh_info;
+ Elf64_Xword sh_addralign;
+ Elf64_Xword sh_entsize;
+};
+
+typedef struct elf64_shdr Elf64_Shdr;
+
+struct modversion_info {
+ long unsigned int crc;
+ char name[56];
+};
+
+struct _ddebug {
+ const char *modname;
+ const char *function;
+ const char *filename;
+ const char *format;
+ unsigned int lineno: 18;
+ unsigned int class_id: 6;
+ unsigned int flags: 8;
+ union {
+ struct static_key_true dd_key_true;
+ struct static_key_false dd_key_false;
+ } key;
+};
+
+enum class_map_type {
+ DD_CLASS_TYPE_DISJOINT_BITS = 0,
+ DD_CLASS_TYPE_LEVEL_NUM = 1,
+ DD_CLASS_TYPE_DISJOINT_NAMES = 2,
+ DD_CLASS_TYPE_LEVEL_NAMES = 3,
+};
+
+struct ddebug_class_map {
+ struct list_head link;
+ struct module *mod;
+ const char *mod_name;
+ const char **class_names;
+ const int length;
+ const int base;
+ enum class_map_type map_type;
+};
+
+struct _ddebug_info {
+ struct _ddebug *descs;
+ struct ddebug_class_map *classes;
+ unsigned int num_descs;
+ unsigned int num_classes;
+};
+
+struct load_info {
+ const char *name;
+ struct module *mod;
+ Elf64_Ehdr *hdr;
+ long unsigned int len;
+ Elf64_Shdr *sechdrs;
+ char *secstrings;
+ char *strtab;
+ long unsigned int symoffs;
+ long unsigned int stroffs;
+ long unsigned int init_typeoffs;
+ long unsigned int core_typeoffs;
+ struct _ddebug_info dyndbg;
+ bool sig_ok;
+ long unsigned int mod_kallsyms_init_off;
+ struct {
+ unsigned int sym;
+ unsigned int str;
+ unsigned int mod;
+ unsigned int vers;
+ unsigned int info;
+ unsigned int pcpu;
+ } index;
+};
+
+enum mod_license {
+ NOT_GPL_ONLY = 0,
+ GPL_ONLY = 1,
+};
+
+struct find_symbol_arg {
+ const char *name;
+ bool gplok;
+ bool warn;
+ struct module *owner;
+ const s32 *crc;
+ const struct kernel_symbol *sym;
+ enum mod_license license;
+};
+
+struct dma_chan {
+ int lock;
+ const char *device_id;
+};
+
+enum perf_hw_id {
+ PERF_COUNT_HW_CPU_CYCLES = 0,
+ PERF_COUNT_HW_INSTRUCTIONS = 1,
+ PERF_COUNT_HW_CACHE_REFERENCES = 2,
+ PERF_COUNT_HW_CACHE_MISSES = 3,
+ PERF_COUNT_HW_BRANCH_INSTRUCTIONS = 4,
+ PERF_COUNT_HW_BRANCH_MISSES = 5,
+ PERF_COUNT_HW_BUS_CYCLES = 6,
+ PERF_COUNT_HW_STALLED_CYCLES_FRONTEND = 7,
+ PERF_COUNT_HW_STALLED_CYCLES_BACKEND = 8,
+ PERF_COUNT_HW_REF_CPU_CYCLES = 9,
+ PERF_COUNT_HW_MAX = 10,
+};
+
+struct trace_print_flags {
+ long unsigned int mask;
+ const char *name;
+};
+
+enum pm_qos_req_action {
+ PM_QOS_ADD_REQ = 0,
+ PM_QOS_UPDATE_REQ = 1,
+ PM_QOS_REMOVE_REQ = 2,
+};
+
+struct trace_event_raw_cpu {
+ struct trace_entry ent;
+ u32 state;
+ u32 cpu_id;
+ char __data[0];
+};
+
+struct trace_event_raw_cpu_idle_miss {
+ struct trace_entry ent;
+ u32 cpu_id;
+ u32 state;
+ bool below;
+ char __data[0];
+};
+
+struct trace_event_raw_powernv_throttle {
+ struct trace_entry ent;
+ int chip_id;
+ u32 __data_loc_reason;
+ int pmax;
+ char __data[0];
+};
+
+struct trace_event_raw_pstate_sample {
+ struct trace_entry ent;
+ u32 core_busy;
+ u32 scaled_busy;
+ u32 from;
+ u32 to;
+ u64 mperf;
+ u64 aperf;
+ u64 tsc;
+ u32 freq;
+ u32 io_boost;
+ char __data[0];
+};
+
+struct trace_event_raw_cpu_frequency_limits {
+ struct trace_entry ent;
+ u32 min_freq;
+ u32 max_freq;
+ u32 cpu_id;
+ char __data[0];
+};
+
+struct trace_event_raw_device_pm_callback_start {
+ struct trace_entry ent;
+ u32 __data_loc_device;
+ u32 __data_loc_driver;
+ u32 __data_loc_parent;
+ u32 __data_loc_pm_ops;
+ int event;
+ char __data[0];
+};
+
+struct trace_event_raw_device_pm_callback_end {
+ struct trace_entry ent;
+ u32 __data_loc_device;
+ u32 __data_loc_driver;
+ int error;
+ char __data[0];
+};
+
+struct trace_event_raw_suspend_resume {
+ struct trace_entry ent;
+ const char *action;
+ int val;
+ bool start;
+ char __data[0];
+};
+
+struct trace_event_raw_wakeup_source {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ u64 state;
+ char __data[0];
+};
+
+struct trace_event_raw_clock {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ u64 state;
+ u64 cpu_id;
+ char __data[0];
+};
+
+struct trace_event_raw_power_domain {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ u64 state;
+ u64 cpu_id;
+ char __data[0];
+};
+
+struct trace_event_raw_cpu_latency_qos_request {
+ struct trace_entry ent;
+ s32 value;
+ char __data[0];
+};
+
+struct trace_event_raw_pm_qos_update {
+ struct trace_entry ent;
+ enum pm_qos_req_action action;
+ int prev_value;
+ int curr_value;
+ char __data[0];
+};
+
+struct trace_event_raw_dev_pm_qos_request {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ enum dev_pm_qos_req_type type;
+ s32 new_value;
+ char __data[0];
+};
+
+struct trace_event_raw_guest_halt_poll_ns {
+ struct trace_entry ent;
+ bool grow;
+ unsigned int new;
+ unsigned int old;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_cpu {};
+
+struct trace_event_data_offsets_cpu_idle_miss {};
+
+struct trace_event_data_offsets_powernv_throttle {
+ u32 reason;
+};
+
+struct trace_event_data_offsets_pstate_sample {};
+
+struct trace_event_data_offsets_cpu_frequency_limits {};
+
+struct trace_event_data_offsets_device_pm_callback_start {
+ u32 device;
+ u32 driver;
+ u32 parent;
+ u32 pm_ops;
+};
+
+struct trace_event_data_offsets_device_pm_callback_end {
+ u32 device;
+ u32 driver;
+};
+
+struct trace_event_data_offsets_suspend_resume {};
+
+struct trace_event_data_offsets_wakeup_source {
+ u32 name;
+};
+
+struct trace_event_data_offsets_clock {
+ u32 name;
+};
+
+struct trace_event_data_offsets_power_domain {
+ u32 name;
+};
+
+struct trace_event_data_offsets_cpu_latency_qos_request {};
+
+struct trace_event_data_offsets_pm_qos_update {};
+
+struct trace_event_data_offsets_dev_pm_qos_request {
+ u32 name;
+};
+
+struct trace_event_data_offsets_guest_halt_poll_ns {};
+
+typedef void (*btf_trace_cpu_idle)(void *, unsigned int, unsigned int);
+
+typedef void (*btf_trace_cpu_idle_miss)(void *, unsigned int, unsigned int, bool);
+
+typedef void (*btf_trace_powernv_throttle)(void *, int, const char *, int);
+
+typedef void (*btf_trace_pstate_sample)(void *, u32, u32, u32, u32, u64, u64, u64, u32, u32);
+
+typedef void (*btf_trace_cpu_frequency)(void *, unsigned int, unsigned int);
+
+typedef void (*btf_trace_cpu_frequency_limits)(void *, struct cpufreq_policy *);
+
+typedef void (*btf_trace_device_pm_callback_start)(void *, struct device *, const char *, int);
+
+typedef void (*btf_trace_device_pm_callback_end)(void *, struct device *, int);
+
+typedef void (*btf_trace_suspend_resume)(void *, const char *, int, bool);
+
+typedef void (*btf_trace_wakeup_source_activate)(void *, const char *, unsigned int);
+
+typedef void (*btf_trace_wakeup_source_deactivate)(void *, const char *, unsigned int);
+
+typedef void (*btf_trace_clock_enable)(void *, const char *, unsigned int, unsigned int);
+
+typedef void (*btf_trace_clock_disable)(void *, const char *, unsigned int, unsigned int);
+
+typedef void (*btf_trace_clock_set_rate)(void *, const char *, unsigned int, unsigned int);
+
+typedef void (*btf_trace_power_domain_target)(void *, const char *, unsigned int, unsigned int);
+
+typedef void (*btf_trace_pm_qos_add_request)(void *, s32);
+
+typedef void (*btf_trace_pm_qos_update_request)(void *, s32);
+
+typedef void (*btf_trace_pm_qos_remove_request)(void *, s32);
+
+typedef void (*btf_trace_pm_qos_update_target)(void *, enum pm_qos_req_action, int, int);
+
+typedef void (*btf_trace_pm_qos_update_flags)(void *, enum pm_qos_req_action, int, int);
+
+typedef void (*btf_trace_dev_pm_qos_add_request)(void *, const char *, enum dev_pm_qos_req_type, s32);
+
+typedef void (*btf_trace_dev_pm_qos_update_request)(void *, const char *, enum dev_pm_qos_req_type, s32);
+
+typedef void (*btf_trace_dev_pm_qos_remove_request)(void *, const char *, enum dev_pm_qos_req_type, s32);
+
+typedef void (*btf_trace_guest_halt_poll_ns)(void *, bool, unsigned int, unsigned int);
+
+enum {
+ BPF_F_NO_PREALLOC = 1,
+ BPF_F_NO_COMMON_LRU = 2,
+ BPF_F_NUMA_NODE = 4,
+ BPF_F_RDONLY = 8,
+ BPF_F_WRONLY = 16,
+ BPF_F_STACK_BUILD_ID = 32,
+ BPF_F_ZERO_SEED = 64,
+ BPF_F_RDONLY_PROG = 128,
+ BPF_F_WRONLY_PROG = 256,
+ BPF_F_CLONE = 512,
+ BPF_F_MMAPABLE = 1024,
+ BPF_F_PRESERVE_ELEMS = 2048,
+ BPF_F_INNER_MAP = 4096,
+};
+
+enum {
+ BTF_KIND_UNKN = 0,
+ BTF_KIND_INT = 1,
+ BTF_KIND_PTR = 2,
+ BTF_KIND_ARRAY = 3,
+ BTF_KIND_STRUCT = 4,
+ BTF_KIND_UNION = 5,
+ BTF_KIND_ENUM = 6,
+ BTF_KIND_FWD = 7,
+ BTF_KIND_TYPEDEF = 8,
+ BTF_KIND_VOLATILE = 9,
+ BTF_KIND_CONST = 10,
+ BTF_KIND_RESTRICT = 11,
+ BTF_KIND_FUNC = 12,
+ BTF_KIND_FUNC_PROTO = 13,
+ BTF_KIND_VAR = 14,
+ BTF_KIND_DATASEC = 15,
+ BTF_KIND_FLOAT = 16,
+ BTF_KIND_DECL_TAG = 17,
+ BTF_KIND_TYPE_TAG = 18,
+ BTF_KIND_ENUM64 = 19,
+ NR_BTF_KINDS = 20,
+ BTF_KIND_MAX = 19,
+};
+
+typedef int __kernel_daddr_t;
+
+struct ustat {
+ __kernel_daddr_t f_tfree;
+ long unsigned int f_tinode;
+ char f_fname[6];
+ char f_fpack[6];
+};
+
+struct statfs {
+ __kernel_long_t f_type;
+ __kernel_long_t f_bsize;
+ __kernel_long_t f_blocks;
+ __kernel_long_t f_bfree;
+ __kernel_long_t f_bavail;
+ __kernel_long_t f_files;
+ __kernel_long_t f_ffree;
+ __kernel_fsid_t f_fsid;
+ __kernel_long_t f_namelen;
+ __kernel_long_t f_frsize;
+ __kernel_long_t f_flags;
+ __kernel_long_t f_spare[4];
+};
+
+struct statfs64 {
+ __kernel_long_t f_type;
+ __kernel_long_t f_bsize;
+ __u64 f_blocks;
+ __u64 f_bfree;
+ __u64 f_bavail;
+ __u64 f_files;
+ __u64 f_ffree;
+ __kernel_fsid_t f_fsid;
+ __kernel_long_t f_namelen;
+ __kernel_long_t f_frsize;
+ __kernel_long_t f_flags;
+ __kernel_long_t f_spare[4];
+};
+
+typedef unsigned int uint;
+
+struct console {
+ char name[16];
+ void (*write)(struct console *, const char *, unsigned int);
+ int (*read)(struct console *, char *, unsigned int);
+ struct tty_driver * (*device)(struct console *, int *);
+ void (*unblank)();
+ int (*setup)(struct console *, char *);
+ int (*exit)(struct console *);
+ int (*match)(struct console *, char *, int, char *);
+ short int flags;
+ short int index;
+ int cflag;
+ uint ispeed;
+ uint ospeed;
+ u64 seq;
+ long unsigned int dropped;
+ void *data;
+ struct console *next;
+};
+
+struct rsa_key {
+ const u8 *n;
+ const u8 *e;
+ const u8 *d;
+ const u8 *p;
+ const u8 *q;
+ const u8 *dp;
+ const u8 *dq;
+ const u8 *qinv;
+ size_t n_sz;
+ size_t e_sz;
+ size_t d_sz;
+ size_t p_sz;
+ size_t q_sz;
+ size_t dp_sz;
+ size_t dq_sz;
+ size_t qinv_sz;
+};
+
+struct rtattr;
+
+struct crypto_template {
+ struct list_head list;
+ struct hlist_head instances;
+ struct module *module;
+ int (*create)(struct crypto_template *, struct rtattr **);
+ char name[128];
+};
+
+struct akcipher_request {
+ struct crypto_async_request base;
+ struct scatterlist *src;
+ struct scatterlist *dst;
+ unsigned int src_len;
+ unsigned int dst_len;
+ void *__ctx[0];
+};
+
+struct crypto_akcipher {
+ struct crypto_tfm base;
+};
+
+struct akcipher_alg {
+ int (*sign)(struct akcipher_request *);
+ int (*verify)(struct akcipher_request *);
+ int (*encrypt)(struct akcipher_request *);
+ int (*decrypt)(struct akcipher_request *);
+ int (*set_pub_key)(struct crypto_akcipher *, const void *, unsigned int);
+ int (*set_priv_key)(struct crypto_akcipher *, const void *, unsigned int);
+ unsigned int (*max_size)(struct crypto_akcipher *);
+ int (*init)(struct crypto_akcipher *);
+ void (*exit)(struct crypto_akcipher *);
+ unsigned int reqsize;
+ struct crypto_alg base;
+};
+
+struct crypto_spawn;
+
+struct crypto_instance {
+ struct crypto_alg alg;
+ struct crypto_template *tmpl;
+ union {
+ struct hlist_node list;
+ struct crypto_spawn *spawns;
+ };
+ void *__ctx[0];
+};
+
+struct crypto_spawn {
+ struct list_head list;
+ struct crypto_alg *alg;
+ union {
+ struct crypto_instance *inst;
+ struct crypto_spawn *next;
+ };
+ const struct crypto_type *frontend;
+ u32 mask;
+ bool dead;
+ bool registered;
+};
+
+struct rsa_mpi_key {
+ MPI n;
+ MPI e;
+ MPI d;
+ MPI p;
+ MPI q;
+ MPI dp;
+ MPI dq;
+ MPI qinv;
+};
+
+struct __key_reference_with_attributes;
+
+typedef struct __key_reference_with_attributes *key_ref_t;
+
+struct key_preparsed_payload {
+ const char *orig_description;
+ char *description;
+ union key_payload payload;
+ const void *data;
+ size_t datalen;
+ size_t quotalen;
+ time64_t expiry;
+};
+
+struct key_match_data {
+ bool (*cmp)(const struct key *, const struct key_match_data *);
+ const void *raw_data;
+ void *preparsed;
+ unsigned int lookup_type;
+};
+
+enum kernel_pkey_operation {
+ kernel_pkey_encrypt = 0,
+ kernel_pkey_decrypt = 1,
+ kernel_pkey_sign = 2,
+ kernel_pkey_verify = 3,
+};
+
+struct kernel_pkey_params {
+ struct key *key;
+ const char *encoding;
+ const char *hash_algo;
+ char *info;
+ __u32 in_len;
+ union {
+ __u32 out_len;
+ __u32 in2_len;
+ };
+ enum kernel_pkey_operation op: 8;
+};
+
+struct kernel_pkey_query {
+ __u32 supported_ops;
+ __u32 key_size;
+ __u16 max_data_size;
+ __u16 max_sig_size;
+ __u16 max_enc_size;
+ __u16 max_dec_size;
+};
+
+enum key_being_used_for {
+ VERIFYING_MODULE_SIGNATURE = 0,
+ VERIFYING_FIRMWARE_SIGNATURE = 1,
+ VERIFYING_KEXEC_PE_SIGNATURE = 2,
+ VERIFYING_KEY_SIGNATURE = 3,
+ VERIFYING_KEY_SELF_SIGNATURE = 4,
+ VERIFYING_UNSPECIFIED_SIGNATURE = 5,
+ NR__KEY_BEING_USED_FOR = 6,
+};
+
+enum asymmetric_payload_bits {
+ asym_crypto = 0,
+ asym_subtype = 1,
+ asym_key_ids = 2,
+ asym_auth = 3,
+};
+
+struct asymmetric_key_id {
+ short unsigned int len;
+ unsigned char data[0];
+};
+
+struct asymmetric_key_ids {
+ void *id[3];
+};
+
+struct public_key_signature;
+
+struct asymmetric_key_subtype {
+ struct module *owner;
+ const char *name;
+ short unsigned int name_len;
+ void (*describe)(const struct key *, struct seq_file *);
+ void (*destroy)(void *, void *);
+ int (*query)(const struct kernel_pkey_params *, struct kernel_pkey_query *);
+ int (*eds_op)(struct kernel_pkey_params *, const void *, void *);
+ int (*verify_signature)(const struct key *, const struct public_key_signature *);
+};
+
+struct public_key_signature {
+ struct asymmetric_key_id *auth_ids[3];
+ u8 *s;
+ u8 *digest;
+ u32 s_size;
+ u32 digest_size;
+ const char *pkey_algo;
+ const char *hash_algo;
+ const char *encoding;
+ const void *data;
+ unsigned int data_size;
+};
+
+struct asymmetric_key_parser {
+ struct list_head link;
+ struct module *owner;
+ const char *name;
+ int (*parse)(struct key_preparsed_payload *);
+};
+
+struct io_cq {
+ struct request_queue *q;
+ struct io_context *ioc;
+ union {
+ struct list_head q_node;
+ struct kmem_cache *__rcu_icq_cache;
+ };
+ union {
+ struct hlist_node ioc_node;
+ struct callback_head __rcu_head;
+ };
+ unsigned int flags;
+};
+
+typedef __u32 blk_mq_req_flags_t;
+
+struct sbitmap_word {
+ long unsigned int word;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long unsigned int cleared;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct sbitmap {
+ unsigned int depth;
+ unsigned int shift;
+ unsigned int map_nr;
+ bool round_robin;
+ struct sbitmap_word *map;
+ unsigned int *alloc_hint;
+};
+
+struct sbq_wait_state {
+ atomic_t wait_cnt;
+ wait_queue_head_t wait;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct sbitmap_queue {
+ struct sbitmap sb;
+ unsigned int wake_batch;
+ atomic_t wake_index;
+ struct sbq_wait_state *ws;
+ atomic_t ws_active;
+ unsigned int min_shallow_depth;
+};
+
+typedef bool (*sb_for_each_fn)(struct sbitmap *, unsigned int, void *);
+
+struct sbq_wait {
+ struct sbitmap_queue *sbq;
+ struct wait_queue_entry wait;
+};
+
+typedef __u32 req_flags_t;
+
+enum mq_rq_state {
+ MQ_RQ_IDLE = 0,
+ MQ_RQ_IN_FLIGHT = 1,
+ MQ_RQ_COMPLETE = 2,
+};
+
+enum rq_end_io_ret {
+ RQ_END_IO_NONE = 0,
+ RQ_END_IO_FREE = 1,
+};
+
+typedef enum rq_end_io_ret rq_end_io_fn(struct request *, blk_status_t);
+
+struct request {
+ struct request_queue *q;
+ struct blk_mq_ctx *mq_ctx;
+ struct blk_mq_hw_ctx *mq_hctx;
+ blk_opf_t cmd_flags;
+ req_flags_t rq_flags;
+ int tag;
+ int internal_tag;
+ unsigned int timeout;
+ unsigned int __data_len;
+ sector_t __sector;
+ struct bio *bio;
+ struct bio *biotail;
+ union {
+ struct list_head queuelist;
+ struct request *rq_next;
+ };
+ struct block_device *part;
+ u64 start_time_ns;
+ u64 io_start_time_ns;
+ short unsigned int stats_sectors;
+ short unsigned int nr_phys_segments;
+ short unsigned int write_hint;
+ short unsigned int ioprio;
+ enum mq_rq_state state;
+ atomic_t ref;
+ long unsigned int deadline;
+ union {
+ struct hlist_node hash;
+ struct llist_node ipi_list;
+ };
+ union {
+ struct rb_node rb_node;
+ struct bio_vec special_vec;
+ void *completion_data;
+ };
+ union {
+ struct {
+ struct io_cq *icq;
+ void *priv[2];
+ } elv;
+ struct {
+ unsigned int seq;
+ struct list_head list;
+ rq_end_io_fn *saved_end_io;
+ } flush;
+ };
+ union {
+ struct __call_single_data csd;
+ u64 fifo_time;
+ };
+ rq_end_io_fn *end_io;
+ void *end_io_data;
+};
+
+struct elevator_type;
+
+struct elevator_queue {
+ struct elevator_type *type;
+ void *elevator_data;
+ struct kobject kobj;
+ struct mutex sysfs_lock;
+ unsigned int registered: 1;
+ struct hlist_head hash[64];
+};
+
+struct blk_mq_ctxs;
+
+struct blk_mq_ctx {
+ struct {
+ spinlock_t lock;
+ struct list_head rq_lists[3];
+ long: 64;
+ long: 64;
+ };
+ unsigned int cpu;
+ short unsigned int index_hw[3];
+ struct blk_mq_hw_ctx *hctxs[3];
+ struct request_queue *queue;
+ struct blk_mq_ctxs *ctxs;
+ struct kobject kobj;
+ long: 64;
+};
+
+struct blk_stat_callback {
+ struct list_head list;
+ struct timer_list timer;
+ struct blk_rq_stat *cpu_stat;
+ int (*bucket_fn)(const struct request *);
+ unsigned int buckets;
+ struct blk_rq_stat *stat;
+ void (*timer_fn)(struct blk_stat_callback *);
+ void *data;
+ struct callback_head rcu;
+};
+
+struct blk_mq_tags {
+ unsigned int nr_tags;
+ unsigned int nr_reserved_tags;
+ atomic_t active_queues;
+ struct sbitmap_queue bitmap_tags;
+ struct sbitmap_queue breserved_tags;
+ struct request **rqs;
+ struct request **static_rqs;
+ struct list_head page_list;
+ spinlock_t lock;
+};
+
+struct blk_flush_queue {
+ unsigned int flush_pending_idx: 1;
+ unsigned int flush_running_idx: 1;
+ blk_status_t rq_status;
+ long unsigned int flush_pending_since;
+ struct list_head flush_queue[2];
+ struct list_head flush_data_in_flight;
+ struct request *flush_rq;
+ spinlock_t mq_flush_lock;
+};
+
+struct blk_mq_queue_map {
+ unsigned int *mq_map;
+ unsigned int nr_queues;
+ unsigned int queue_offset;
+};
+
+struct blk_mq_tag_set {
+ struct blk_mq_queue_map map[3];
+ unsigned int nr_maps;
+ const struct blk_mq_ops *ops;
+ unsigned int nr_hw_queues;
+ unsigned int queue_depth;
+ unsigned int reserved_tags;
+ unsigned int cmd_size;
+ int numa_node;
+ unsigned int timeout;
+ unsigned int flags;
+ void *driver_data;
+ struct blk_mq_tags **tags;
+ struct blk_mq_tags *shared_tags;
+ struct mutex tag_list_lock;
+ struct list_head tag_list;
+};
+
+struct blk_mq_hw_ctx {
+ struct {
+ spinlock_t lock;
+ struct list_head dispatch;
+ long unsigned int state;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ };
+ struct delayed_work run_work;
+ cpumask_var_t cpumask;
+ int next_cpu;
+ int next_cpu_batch;
+ long unsigned int flags;
+ void *sched_data;
+ struct request_queue *queue;
+ struct blk_flush_queue *fq;
+ void *driver_data;
+ struct sbitmap ctx_map;
+ struct blk_mq_ctx *dispatch_from;
+ unsigned int dispatch_busy;
+ short unsigned int type;
+ short unsigned int nr_ctx;
+ struct blk_mq_ctx **ctxs;
+ spinlock_t dispatch_wait_lock;
+ wait_queue_entry_t dispatch_wait;
+ atomic_t wait_index;
+ struct blk_mq_tags *tags;
+ struct blk_mq_tags *sched_tags;
+ long unsigned int queued;
+ long unsigned int run;
+ unsigned int numa_node;
+ unsigned int queue_num;
+ atomic_t nr_active;
+ struct hlist_node cpuhp_online;
+ struct hlist_node cpuhp_dead;
+ struct kobject kobj;
+ struct dentry *debugfs_dir;
+ struct dentry *sched_debugfs_dir;
+ struct list_head hctx_list;
+};
+
+enum hctx_type {
+ HCTX_TYPE_DEFAULT = 0,
+ HCTX_TYPE_READ = 1,
+ HCTX_TYPE_POLL = 2,
+ HCTX_MAX_TYPES = 3,
+};
+
+struct blk_mq_queue_data {
+ struct request *rq;
+ bool last;
+};
+
+typedef bool busy_tag_iter_fn(struct request *, void *);
+
+enum {
+ BLK_MQ_F_SHOULD_MERGE = 1,
+ BLK_MQ_F_TAG_QUEUE_SHARED = 2,
+ BLK_MQ_F_STACKING = 4,
+ BLK_MQ_F_TAG_HCTX_SHARED = 8,
+ BLK_MQ_F_BLOCKING = 32,
+ BLK_MQ_F_NO_SCHED = 64,
+ BLK_MQ_F_NO_SCHED_BY_DEFAULT = 128,
+ BLK_MQ_F_ALLOC_POLICY_START_BIT = 8,
+ BLK_MQ_F_ALLOC_POLICY_BITS = 1,
+ BLK_MQ_S_STOPPED = 0,
+ BLK_MQ_S_TAG_ACTIVE = 1,
+ BLK_MQ_S_SCHED_RESTART = 2,
+ BLK_MQ_S_INACTIVE = 3,
+ BLK_MQ_MAX_DEPTH = 10240,
+ BLK_MQ_CPU_WORK_BATCH = 8,
+};
+
+enum {
+ BLK_MQ_REQ_NOWAIT = 1,
+ BLK_MQ_REQ_RESERVED = 2,
+ BLK_MQ_REQ_PM = 4,
+};
+
+enum {
+ BLK_MQ_UNIQUE_TAG_BITS = 16,
+ BLK_MQ_UNIQUE_TAG_MASK = 65535,
+};
+
+enum {
+ BLK_MQ_NO_TAG = 4294967295,
+ BLK_MQ_TAG_MIN = 1,
+ BLK_MQ_TAG_MAX = 4294967294,
+};
+
+struct blk_mq_ctxs {
+ struct kobject kobj;
+ struct blk_mq_ctx *queue_ctx;
+};
+
+struct blk_mq_alloc_data {
+ struct request_queue *q;
+ blk_mq_req_flags_t flags;
+ unsigned int shallow_depth;
+ blk_opf_t cmd_flags;
+ req_flags_t rq_flags;
+ unsigned int nr_tags;
+ struct request **cached_rq;
+ struct blk_mq_ctx *ctx;
+ struct blk_mq_hw_ctx *hctx;
+};
+
+enum elv_merge {
+ ELEVATOR_NO_MERGE = 0,
+ ELEVATOR_FRONT_MERGE = 1,
+ ELEVATOR_BACK_MERGE = 2,
+ ELEVATOR_DISCARD_MERGE = 3,
+};
+
+struct elevator_mq_ops {
+ int (*init_sched)(struct request_queue *, struct elevator_type *);
+ void (*exit_sched)(struct elevator_queue *);
+ int (*init_hctx)(struct blk_mq_hw_ctx *, unsigned int);
+ void (*exit_hctx)(struct blk_mq_hw_ctx *, unsigned int);
+ void (*depth_updated)(struct blk_mq_hw_ctx *);
+ bool (*allow_merge)(struct request_queue *, struct request *, struct bio *);
+ bool (*bio_merge)(struct request_queue *, struct bio *, unsigned int);
+ int (*request_merge)(struct request_queue *, struct request **, struct bio *);
+ void (*request_merged)(struct request_queue *, struct request *, enum elv_merge);
+ void (*requests_merged)(struct request_queue *, struct request *, struct request *);
+ void (*limit_depth)(blk_opf_t, struct blk_mq_alloc_data *);
+ void (*prepare_request)(struct request *);
+ void (*finish_request)(struct request *);
+ void (*insert_requests)(struct blk_mq_hw_ctx *, struct list_head *, bool);
+ struct request * (*dispatch_request)(struct blk_mq_hw_ctx *);
+ bool (*has_work)(struct blk_mq_hw_ctx *);
+ void (*completed_request)(struct request *, u64);
+ void (*requeue_request)(struct request *);
+ struct request * (*former_request)(struct request_queue *, struct request *);
+ struct request * (*next_request)(struct request_queue *, struct request *);
+ void (*init_icq)(struct io_cq *);
+ void (*exit_icq)(struct io_cq *);
+};
+
+struct elv_fs_entry;
+
+struct blk_mq_debugfs_attr;
+
+struct elevator_type {
+ struct kmem_cache *icq_cache;
+ struct elevator_mq_ops ops;
+ size_t icq_size;
+ size_t icq_align;
+ struct elv_fs_entry *elevator_attrs;
+ const char *elevator_name;
+ const char *elevator_alias;
+ const unsigned int elevator_features;
+ struct module *elevator_owner;
+ const struct blk_mq_debugfs_attr *queue_debugfs_attrs;
+ const struct blk_mq_debugfs_attr *hctx_debugfs_attrs;
+ char icq_cache_name[22];
+ struct list_head list;
+};
+
+struct elv_fs_entry {
+ struct attribute attr;
+ ssize_t (*show)(struct elevator_queue *, char *);
+ ssize_t (*store)(struct elevator_queue *, const char *, size_t);
+};
+
+struct blk_mq_debugfs_attr {
+ const char *name;
+ umode_t mode;
+ int (*show)(void *, struct seq_file *);
+ ssize_t (*write)(void *, const char *, size_t, loff_t *);
+ const struct seq_operations *seq_ops;
+};
+
+struct bt_iter_data {
+ struct blk_mq_hw_ctx *hctx;
+ struct request_queue *q;
+ busy_tag_iter_fn *fn;
+ void *data;
+ bool reserved;
+};
+
+struct bt_tags_iter_data {
+ struct blk_mq_tags *tags;
+ busy_tag_iter_fn *fn;
+ void *data;
+ unsigned int flags;
+};
+
+struct xxh32_state {
+ uint32_t total_len_32;
+ uint32_t large_len;
+ uint32_t v1;
+ uint32_t v2;
+ uint32_t v3;
+ uint32_t v4;
+ uint32_t mem32[4];
+ uint32_t memsize;
+};
+
+struct xxh64_state {
+ uint64_t total_len;
+ uint64_t v1;
+ uint64_t v2;
+ uint64_t v3;
+ uint64_t v4;
+ uint64_t mem64[4];
+ uint32_t memsize;
+};
+
+typedef enum {
+ ZSTD_error_no_error = 0,
+ ZSTD_error_GENERIC = 1,
+ ZSTD_error_prefix_unknown = 10,
+ ZSTD_error_version_unsupported = 12,
+ ZSTD_error_frameParameter_unsupported = 14,
+ ZSTD_error_frameParameter_windowTooLarge = 16,
+ ZSTD_error_corruption_detected = 20,
+ ZSTD_error_checksum_wrong = 22,
+ ZSTD_error_dictionary_corrupted = 30,
+ ZSTD_error_dictionary_wrong = 32,
+ ZSTD_error_dictionaryCreation_failed = 34,
+ ZSTD_error_parameter_unsupported = 40,
+ ZSTD_error_parameter_outOfBound = 42,
+ ZSTD_error_tableLog_tooLarge = 44,
+ ZSTD_error_maxSymbolValue_tooLarge = 46,
+ ZSTD_error_maxSymbolValue_tooSmall = 48,
+ ZSTD_error_stage_wrong = 60,
+ ZSTD_error_init_missing = 62,
+ ZSTD_error_memory_allocation = 64,
+ ZSTD_error_workSpace_tooSmall = 66,
+ ZSTD_error_dstSize_tooSmall = 70,
+ ZSTD_error_srcSize_wrong = 72,
+ ZSTD_error_dstBuffer_null = 74,
+ ZSTD_error_frameIndex_tooLarge = 100,
+ ZSTD_error_seekableIO = 102,
+ ZSTD_error_dstBuffer_wrong = 104,
+ ZSTD_error_srcBuffer_wrong = 105,
+ ZSTD_error_maxCode = 120,
+} ZSTD_ErrorCode;
+
+typedef ZSTD_ErrorCode ERR_enum;
+
+struct module_version_attribute {
+ struct module_attribute mattr;
+ const char *module_name;
+ const char *version;
+};
+
+enum xz_mode {
+ XZ_SINGLE = 0,
+ XZ_PREALLOC = 1,
+ XZ_DYNALLOC = 2,
+};
+
+enum xz_ret {
+ XZ_OK = 0,
+ XZ_STREAM_END = 1,
+ XZ_UNSUPPORTED_CHECK = 2,
+ XZ_MEM_ERROR = 3,
+ XZ_MEMLIMIT_ERROR = 4,
+ XZ_FORMAT_ERROR = 5,
+ XZ_OPTIONS_ERROR = 6,
+ XZ_DATA_ERROR = 7,
+ XZ_BUF_ERROR = 8,
+};
+
+struct xz_buf {
+ const uint8_t *in;
+ size_t in_pos;
+ size_t in_size;
+ uint8_t *out;
+ size_t out_pos;
+ size_t out_size;
+};
+
+struct xz_dec;
+
+struct fb_fix_screeninfo {
+ char id[16];
+ long unsigned int smem_start;
+ __u32 smem_len;
+ __u32 type;
+ __u32 type_aux;
+ __u32 visual;
+ __u16 xpanstep;
+ __u16 ypanstep;
+ __u16 ywrapstep;
+ __u32 line_length;
+ long unsigned int mmio_start;
+ __u32 mmio_len;
+ __u32 accel;
+ __u16 capabilities;
+ __u16 reserved[2];
+};
+
+struct fb_bitfield {
+ __u32 offset;
+ __u32 length;
+ __u32 msb_right;
+};
+
+struct fb_var_screeninfo {
+ __u32 xres;
+ __u32 yres;
+ __u32 xres_virtual;
+ __u32 yres_virtual;
+ __u32 xoffset;
+ __u32 yoffset;
+ __u32 bits_per_pixel;
+ __u32 grayscale;
+ struct fb_bitfield red;
+ struct fb_bitfield green;
+ struct fb_bitfield blue;
+ struct fb_bitfield transp;
+ __u32 nonstd;
+ __u32 activate;
+ __u32 height;
+ __u32 width;
+ __u32 accel_flags;
+ __u32 pixclock;
+ __u32 left_margin;
+ __u32 right_margin;
+ __u32 upper_margin;
+ __u32 lower_margin;
+ __u32 hsync_len;
+ __u32 vsync_len;
+ __u32 sync;
+ __u32 vmode;
+ __u32 rotate;
+ __u32 colorspace;
+ __u32 reserved[4];
+};
+
+struct fb_cmap {
+ __u32 start;
+ __u32 len;
+ __u16 *red;
+ __u16 *green;
+ __u16 *blue;
+ __u16 *transp;
+};
+
+struct fb_copyarea {
+ __u32 dx;
+ __u32 dy;
+ __u32 width;
+ __u32 height;
+ __u32 sx;
+ __u32 sy;
+};
+
+struct fb_fillrect {
+ __u32 dx;
+ __u32 dy;
+ __u32 width;
+ __u32 height;
+ __u32 color;
+ __u32 rop;
+};
+
+struct fb_image {
+ __u32 dx;
+ __u32 dy;
+ __u32 width;
+ __u32 height;
+ __u32 fg_color;
+ __u32 bg_color;
+ __u8 depth;
+ const char *data;
+ struct fb_cmap cmap;
+};
+
+struct fbcurpos {
+ __u16 x;
+ __u16 y;
+};
+
+struct fb_cursor {
+ __u16 set;
+ __u16 enable;
+ __u16 rop;
+ const char *mask;
+ struct fbcurpos hot;
+ struct fb_image image;
+};
+
+struct fb_chroma {
+ __u32 redx;
+ __u32 greenx;
+ __u32 bluex;
+ __u32 whitex;
+ __u32 redy;
+ __u32 greeny;
+ __u32 bluey;
+ __u32 whitey;
+};
+
+struct fb_videomode;
+
+struct fb_monspecs {
+ struct fb_chroma chroma;
+ struct fb_videomode *modedb;
+ __u8 manufacturer[4];
+ __u8 monitor[14];
+ __u8 serial_no[14];
+ __u8 ascii[14];
+ __u32 modedb_len;
+ __u32 model;
+ __u32 serial;
+ __u32 year;
+ __u32 week;
+ __u32 hfmin;
+ __u32 hfmax;
+ __u32 dclkmin;
+ __u32 dclkmax;
+ __u16 input;
+ __u16 dpms;
+ __u16 signal;
+ __u16 vfmin;
+ __u16 vfmax;
+ __u16 gamma;
+ __u16 gtf: 1;
+ __u16 misc;
+ __u8 version;
+ __u8 revision;
+ __u8 max_x;
+ __u8 max_y;
+};
+
+struct fb_info;
+
+struct fb_pixmap {
+ u8 *addr;
+ u32 size;
+ u32 offset;
+ u32 buf_align;
+ u32 scan_align;
+ u32 access_align;
+ u32 flags;
+ u32 blit_x;
+ u32 blit_y;
+ void (*writeio)(struct fb_info *, void *, void *, unsigned int);
+ void (*readio)(struct fb_info *, void *, void *, unsigned int);
+};
+
+struct fb_ops;
+
+struct fb_tile_ops;
+
+struct apertures_struct;
+
+struct fb_info {
+ refcount_t count;
+ int node;
+ int flags;
+ int fbcon_rotate_hint;
+ struct mutex lock;
+ struct mutex mm_lock;
+ struct fb_var_screeninfo var;
+ struct fb_fix_screeninfo fix;
+ struct fb_monspecs monspecs;
+ struct fb_pixmap pixmap;
+ struct fb_pixmap sprite;
+ struct fb_cmap cmap;
+ struct list_head modelist;
+ struct fb_videomode *mode;
+ const struct fb_ops *fbops;
+ struct device *device;
+ struct device *dev;
+ int class_flag;
+ struct fb_tile_ops *tileops;
+ union {
+ char *screen_base;
+ char *screen_buffer;
+ };
+ long unsigned int screen_size;
+ void *pseudo_palette;
+ u32 state;
+ void *fbcon_par;
+ void *par;
+ struct apertures_struct *apertures;
+ bool skip_vt_switch;
+};
+
+struct fb_videomode {
+ const char *name;
+ u32 refresh;
+ u32 xres;
+ u32 yres;
+ u32 pixclock;
+ u32 left_margin;
+ u32 right_margin;
+ u32 upper_margin;
+ u32 lower_margin;
+ u32 hsync_len;
+ u32 vsync_len;
+ u32 sync;
+ u32 vmode;
+ u32 flag;
+};
+
+struct fb_blit_caps {
+ u32 x;
+ u32 y;
+ u32 len;
+ u32 flags;
+};
+
+struct fb_ops {
+ struct module *owner;
+ int (*fb_open)(struct fb_info *, int);
+ int (*fb_release)(struct fb_info *, int);
+ ssize_t (*fb_read)(struct fb_info *, char *, size_t, loff_t *);
+ ssize_t (*fb_write)(struct fb_info *, const char *, size_t, loff_t *);
+ int (*fb_check_var)(struct fb_var_screeninfo *, struct fb_info *);
+ int (*fb_set_par)(struct fb_info *);
+ int (*fb_setcolreg)(unsigned int, unsigned int, unsigned int, unsigned int, unsigned int, struct fb_info *);
+ int (*fb_setcmap)(struct fb_cmap *, struct fb_info *);
+ int (*fb_blank)(int, struct fb_info *);
+ int (*fb_pan_display)(struct fb_var_screeninfo *, struct fb_info *);
+ void (*fb_fillrect)(struct fb_info *, const struct fb_fillrect *);
+ void (*fb_copyarea)(struct fb_info *, const struct fb_copyarea *);
+ void (*fb_imageblit)(struct fb_info *, const struct fb_image *);
+ int (*fb_cursor)(struct fb_info *, struct fb_cursor *);
+ int (*fb_sync)(struct fb_info *);
+ int (*fb_ioctl)(struct fb_info *, unsigned int, long unsigned int);
+ int (*fb_compat_ioctl)(struct fb_info *, unsigned int, long unsigned int);
+ int (*fb_mmap)(struct fb_info *, struct vm_area_struct *);
+ void (*fb_get_caps)(struct fb_info *, struct fb_blit_caps *, struct fb_var_screeninfo *);
+ void (*fb_destroy)(struct fb_info *);
+ int (*fb_debug_enter)(struct fb_info *);
+ int (*fb_debug_leave)(struct fb_info *);
+};
+
+struct fb_tilemap {
+ __u32 width;
+ __u32 height;
+ __u32 depth;
+ __u32 length;
+ const __u8 *data;
+};
+
+struct fb_tilerect {
+ __u32 sx;
+ __u32 sy;
+ __u32 width;
+ __u32 height;
+ __u32 index;
+ __u32 fg;
+ __u32 bg;
+ __u32 rop;
+};
+
+struct fb_tilearea {
+ __u32 sx;
+ __u32 sy;
+ __u32 dx;
+ __u32 dy;
+ __u32 width;
+ __u32 height;
+};
+
+struct fb_tileblit {
+ __u32 sx;
+ __u32 sy;
+ __u32 width;
+ __u32 height;
+ __u32 fg;
+ __u32 bg;
+ __u32 length;
+ __u32 *indices;
+};
+
+struct fb_tilecursor {
+ __u32 sx;
+ __u32 sy;
+ __u32 mode;
+ __u32 shape;
+ __u32 fg;
+ __u32 bg;
+};
+
+struct fb_tile_ops {
+ void (*fb_settile)(struct fb_info *, struct fb_tilemap *);
+ void (*fb_tilecopy)(struct fb_info *, struct fb_tilearea *);
+ void (*fb_tilefill)(struct fb_info *, struct fb_tilerect *);
+ void (*fb_tileblit)(struct fb_info *, struct fb_tileblit *);
+ void (*fb_tilecursor)(struct fb_info *, struct fb_tilecursor *);
+ int (*fb_get_tilemax)(struct fb_info *);
+};
+
+struct aperture {
+ resource_size_t base;
+ resource_size_t size;
+};
+
+struct apertures_struct {
+ unsigned int count;
+ struct aperture ranges[0];
+};
+
+typedef u32 acpi_name;
+
+struct acpi_pnp_device_id {
+ u32 length;
+ char *string;
+};
+
+struct acpi_pnp_device_id_list {
+ u32 count;
+ u32 list_size;
+ struct acpi_pnp_device_id ids[0];
+};
+
+struct acpi_device_info {
+ u32 info_size;
+ u32 name;
+ acpi_object_type type;
+ u8 param_count;
+ u16 valid;
+ u8 flags;
+ u8 highest_dstates[4];
+ u8 lowest_dstates[5];
+ u64 address;
+ struct acpi_pnp_device_id hardware_id;
+ struct acpi_pnp_device_id unique_id;
+ struct acpi_pnp_device_id class_code;
+ struct acpi_pnp_device_id_list compatible_id_list;
+};
+
+typedef u32 acpi_mutex_handle;
+
+typedef enum {
+ ACPI_IMODE_LOAD_PASS1 = 1,
+ ACPI_IMODE_LOAD_PASS2 = 2,
+ ACPI_IMODE_EXECUTE = 3,
+} acpi_interpreter_mode;
+
+struct acpi_subtable_header {
+ u8 type;
+ u8 length;
+};
+
+struct acpi_cedt_header {
+ u8 type;
+ u8 reserved;
+ u16 length;
+};
+
+enum acpi_cedt_type {
+ ACPI_CEDT_TYPE_CHBS = 0,
+ ACPI_CEDT_TYPE_CFMWS = 1,
+ ACPI_CEDT_TYPE_RESERVED = 2,
+};
+
+struct acpi_cedt_cfmws {
+ struct acpi_cedt_header header;
+ u32 reserved1;
+ u64 base_hpa;
+ u64 window_size;
+ u8 interleave_ways;
+ u8 interleave_arithmetic;
+ u16 reserved2;
+ u32 granularity;
+ u16 restrictions;
+ u16 qtg_id;
+ u32 interleave_targets[0];
+} __attribute__((packed));
+
+struct acpi_hmat_structure {
+ u16 type;
+ u16 reserved;
+ u32 length;
+};
+
+struct acpi_prmt_module_header {
+ u16 revision;
+ u16 length;
+};
+
+struct acpi_table_slit {
+ struct acpi_table_header header;
+ u64 locality_count;
+ u8 entry[1];
+} __attribute__((packed));
+
+struct acpi_table_srat {
+ struct acpi_table_header header;
+ u32 table_revision;
+ u64 reserved;
+};
+
+enum acpi_srat_type {
+ ACPI_SRAT_TYPE_CPU_AFFINITY = 0,
+ ACPI_SRAT_TYPE_MEMORY_AFFINITY = 1,
+ ACPI_SRAT_TYPE_X2APIC_CPU_AFFINITY = 2,
+ ACPI_SRAT_TYPE_GICC_AFFINITY = 3,
+ ACPI_SRAT_TYPE_GIC_ITS_AFFINITY = 4,
+ ACPI_SRAT_TYPE_GENERIC_AFFINITY = 5,
+ ACPI_SRAT_TYPE_GENERIC_PORT_AFFINITY = 6,
+ ACPI_SRAT_TYPE_RESERVED = 7,
+};
+
+struct acpi_srat_cpu_affinity {
+ struct acpi_subtable_header header;
+ u8 proximity_domain_lo;
+ u8 apic_id;
+ u32 flags;
+ u8 local_sapic_eid;
+ u8 proximity_domain_hi[3];
+ u32 clock_domain;
+};
+
+struct acpi_srat_mem_affinity {
+ struct acpi_subtable_header header;
+ u32 proximity_domain;
+ u16 reserved;
+ u64 base_address;
+ u64 length;
+ u32 reserved1;
+ u32 flags;
+ u64 reserved2;
+} __attribute__((packed));
+
+struct acpi_srat_x2apic_cpu_affinity {
+ struct acpi_subtable_header header;
+ u16 reserved;
+ u32 proximity_domain;
+ u32 apic_id;
+ u32 flags;
+ u32 clock_domain;
+ u32 reserved2;
+};
+
+struct acpi_srat_gicc_affinity {
+ struct acpi_subtable_header header;
+ u32 proximity_domain;
+ u32 acpi_processor_uid;
+ u32 flags;
+ u32 clock_domain;
+} __attribute__((packed));
+
+struct acpi_srat_generic_affinity {
+ struct acpi_subtable_header header;
+ u8 reserved;
+ u8 device_handle_type;
+ u32 proximity_domain;
+ u8 device_handle[16];
+ u32 flags;
+ u32 reserved1;
+};
+
+union acpi_subtable_headers {
+ struct acpi_subtable_header common;
+ struct acpi_hmat_structure hmat;
+ struct acpi_prmt_module_header prmt;
+ struct acpi_cedt_header cedt;
+};
+
+typedef int (*acpi_tbl_table_handler)(struct acpi_table_header *);
+
+typedef int (*acpi_tbl_entry_handler)(union acpi_subtable_headers *, const long unsigned int);
+
+typedef int (*acpi_tbl_entry_handler_arg)(union acpi_subtable_headers *, void *, const long unsigned int);
+
+struct acpi_subtable_proc {
+ int id;
+ acpi_tbl_entry_handler handler;
+ acpi_tbl_entry_handler_arg handler_arg;
+ void *arg;
+ int count;
+};
+
+enum {
+ TTY_LOCK_NORMAL = 0,
+ TTY_LOCK_SLAVE = 1,
+};
+
+struct acpi_table_tpm2 {
+ struct acpi_table_header header;
+ u16 platform_class;
+ u16 reserved;
+ u64 control_address;
+ u32 start_method;
+} __attribute__((packed));
+
+struct acpi_tpm2_phy {
+ u8 start_method_specific[12];
+ u32 log_area_minimum_length;
+ u64 log_area_start_address;
+};
+
+enum bios_platform_class {
+ BIOS_CLIENT = 0,
+ BIOS_SERVER = 1,
+};
+
+struct tcg_efi_specid_event_algs {
+ u16 alg_id;
+ u16 digest_size;
+};
+
+struct tcg_efi_specid_event_head {
+ u8 signature[16];
+ u32 platform_class;
+ u8 spec_version_minor;
+ u8 spec_version_major;
+ u8 spec_errata;
+ u8 uintnsize;
+ u32 num_algs;
+ struct tcg_efi_specid_event_algs digest_sizes[0];
+};
+
+struct tcg_pcr_event {
+ u32 pcr_idx;
+ u32 event_type;
+ u8 digest[20];
+ u32 event_size;
+ u8 event[0];
+};
+
+struct client_hdr {
+ u32 log_max_len;
+ u64 log_start_addr;
+} __attribute__((packed));
+
+struct server_hdr {
+ u16 reserved;
+ u64 log_max_len;
+ u64 log_start_addr;
+} __attribute__((packed));
+
+struct acpi_tcpa {
+ struct acpi_table_header hdr;
+ u16 platform_class;
+ union {
+ struct client_hdr client;
+ struct server_hdr server;
+ };
+} __attribute__((packed));
+
+struct iosys_map {
+ union {
+ void *vaddr_iomem;
+ void *vaddr;
+ };
+ bool is_iomem;
+};
+
+struct sg_table {
+ struct scatterlist *sgl;
+ unsigned int nents;
+ unsigned int orig_nents;
+};
+
+struct dma_buf;
+
+struct dma_buf_attachment;
+
+struct dma_buf_ops {
+ bool cache_sgt_mapping;
+ int (*attach)(struct dma_buf *, struct dma_buf_attachment *);
+ void (*detach)(struct dma_buf *, struct dma_buf_attachment *);
+ int (*pin)(struct dma_buf_attachment *);
+ void (*unpin)(struct dma_buf_attachment *);
+ struct sg_table * (*map_dma_buf)(struct dma_buf_attachment *, enum dma_data_direction);
+ void (*unmap_dma_buf)(struct dma_buf_attachment *, struct sg_table *, enum dma_data_direction);
+ void (*release)(struct dma_buf *);
+ int (*begin_cpu_access)(struct dma_buf *, enum dma_data_direction);
+ int (*end_cpu_access)(struct dma_buf *, enum dma_data_direction);
+ int (*mmap)(struct dma_buf *, struct vm_area_struct *);
+ int (*vmap)(struct dma_buf *, struct iosys_map *);
+ void (*vunmap)(struct dma_buf *, struct iosys_map *);
+};
+
+struct dma_buf_poll_cb_t {
+ struct dma_fence_cb cb;
+ wait_queue_head_t *poll;
+ __poll_t active;
+};
+
+struct dma_resv;
+
+struct dma_buf {
+ size_t size;
+ struct file *file;
+ struct list_head attachments;
+ const struct dma_buf_ops *ops;
+ struct mutex lock;
+ unsigned int vmapping_counter;
+ struct iosys_map vmap_ptr;
+ const char *exp_name;
+ const char *name;
+ spinlock_t name_lock;
+ struct module *owner;
+ struct list_head list_node;
+ void *priv;
+ struct dma_resv *resv;
+ wait_queue_head_t poll;
+ struct dma_buf_poll_cb_t cb_in;
+ struct dma_buf_poll_cb_t cb_out;
+};
+
+struct dma_buf_attach_ops;
+
+struct dma_buf_attachment {
+ struct dma_buf *dmabuf;
+ struct device *dev;
+ struct list_head node;
+ struct sg_table *sgt;
+ enum dma_data_direction dir;
+ bool peer2peer;
+ const struct dma_buf_attach_ops *importer_ops;
+ void *importer_priv;
+ void *priv;
+};
+
+struct ww_acquire_ctx;
+
+struct ww_class;
+
+struct ww_mutex {
+ struct mutex base;
+ struct ww_acquire_ctx *ctx;
+ struct ww_class *ww_class;
+};
+
+struct dma_resv_list;
+
+struct dma_resv {
+ struct ww_mutex lock;
+ struct dma_resv_list *fences;
+};
+
+struct dma_buf_attach_ops {
+ bool allow_peer2peer;
+ void (*move_notify)(struct dma_buf_attachment *);
+};
+
+struct dma_buf_export_info {
+ const char *exp_name;
+ struct module *owner;
+ const struct dma_buf_ops *ops;
+ size_t size;
+ int flags;
+ struct dma_resv *resv;
+ void *priv;
+};
+
+struct dma_fence_unwrap {
+ struct dma_fence *chain;
+ struct dma_fence *array;
+ unsigned int index;
+};
+
+struct sync_file {
+ struct file *file;
+ char user_name[32];
+ struct list_head sync_file_list;
+ wait_queue_head_t wq;
+ long unsigned int flags;
+ struct dma_fence *fence;
+ struct dma_fence_cb cb;
+};
+
+struct ww_class {
+ atomic_long_t stamp;
+ struct lock_class_key acquire_key;
+ struct lock_class_key mutex_key;
+ const char *acquire_name;
+ const char *mutex_name;
+ unsigned int is_wait_die;
+};
+
+struct ww_acquire_ctx {
+ struct task_struct *task;
+ long unsigned int stamp;
+ unsigned int acquired;
+ short unsigned int wounded;
+ short unsigned int is_wait_die;
+ unsigned int done_acquire;
+ struct ww_class *ww_class;
+ void *contending_lock;
+ struct lockdep_map dep_map;
+ unsigned int deadlock_inject_interval;
+ unsigned int deadlock_inject_countdown;
+};
+
+enum dma_resv_usage {
+ DMA_RESV_USAGE_KERNEL = 0,
+ DMA_RESV_USAGE_WRITE = 1,
+ DMA_RESV_USAGE_READ = 2,
+ DMA_RESV_USAGE_BOOKKEEP = 3,
+};
+
+struct dma_resv_iter {
+ struct dma_resv *obj;
+ enum dma_resv_usage usage;
+ struct dma_fence *fence;
+ enum dma_resv_usage fence_usage;
+ unsigned int index;
+ struct dma_resv_list *fences;
+ unsigned int num_fences;
+ bool is_restarted;
+};
+
+struct dma_buf_sync {
+ __u64 flags;
+};
+
+struct dma_buf_export_sync_file {
+ __u32 flags;
+ __s32 fd;
+};
+
+struct dma_buf_import_sync_file {
+ __u32 flags;
+ __s32 fd;
+};
+
+struct dma_buf_list {
+ struct list_head head;
+ struct mutex lock;
+};
+
+struct hid_device_id {
+ __u16 bus;
+ __u16 group;
+ __u32 vendor;
+ __u32 product;
+ kernel_ulong_t driver_data;
+};
+
+struct input_device_id {
+ kernel_ulong_t flags;
+ __u16 bustype;
+ __u16 vendor;
+ __u16 product;
+ __u16 version;
+ kernel_ulong_t evbit[1];
+ kernel_ulong_t keybit[12];
+ kernel_ulong_t relbit[1];
+ kernel_ulong_t absbit[1];
+ kernel_ulong_t mscbit[1];
+ kernel_ulong_t ledbit[1];
+ kernel_ulong_t sndbit[1];
+ kernel_ulong_t ffbit[2];
+ kernel_ulong_t swbit[1];
+ kernel_ulong_t propbit[1];
+ kernel_ulong_t driver_info;
+};
+
+struct input_id {
+ __u16 bustype;
+ __u16 vendor;
+ __u16 product;
+ __u16 version;
+};
+
+struct input_absinfo {
+ __s32 value;
+ __s32 minimum;
+ __s32 maximum;
+ __s32 fuzz;
+ __s32 flat;
+ __s32 resolution;
+};
+
+struct input_keymap_entry {
+ __u8 flags;
+ __u8 len;
+ __u16 index;
+ __u32 keycode;
+ __u8 scancode[32];
+};
+
+struct ff_replay {
+ __u16 length;
+ __u16 delay;
+};
+
+struct ff_trigger {
+ __u16 button;
+ __u16 interval;
+};
+
+struct ff_envelope {
+ __u16 attack_length;
+ __u16 attack_level;
+ __u16 fade_length;
+ __u16 fade_level;
+};
+
+struct ff_constant_effect {
+ __s16 level;
+ struct ff_envelope envelope;
+};
+
+struct ff_ramp_effect {
+ __s16 start_level;
+ __s16 end_level;
+ struct ff_envelope envelope;
+};
+
+struct ff_condition_effect {
+ __u16 right_saturation;
+ __u16 left_saturation;
+ __s16 right_coeff;
+ __s16 left_coeff;
+ __u16 deadband;
+ __s16 center;
+};
+
+struct ff_periodic_effect {
+ __u16 waveform;
+ __u16 period;
+ __s16 magnitude;
+ __s16 offset;
+ __u16 phase;
+ struct ff_envelope envelope;
+ __u32 custom_len;
+ __s16 *custom_data;
+};
+
+struct ff_rumble_effect {
+ __u16 strong_magnitude;
+ __u16 weak_magnitude;
+};
+
+struct ff_effect {
+ __u16 type;
+ __s16 id;
+ __u16 direction;
+ struct ff_trigger trigger;
+ struct ff_replay replay;
+ union {
+ struct ff_constant_effect constant;
+ struct ff_ramp_effect ramp;
+ struct ff_periodic_effect periodic;
+ struct ff_condition_effect condition[2];
+ struct ff_rumble_effect rumble;
+ } u;
+};
+
+struct semaphore {
+ raw_spinlock_t lock;
+ unsigned int count;
+ struct list_head wait_list;
+};
+
+struct input_value {
+ __u16 type;
+ __u16 code;
+ __s32 value;
+};
+
+enum input_clock_type {
+ INPUT_CLK_REAL = 0,
+ INPUT_CLK_MONO = 1,
+ INPUT_CLK_BOOT = 2,
+ INPUT_CLK_MAX = 3,
+};
+
+struct ff_device;
+
+struct input_dev_poller;
+
+struct input_mt;
+
+struct input_handle;
+
+struct input_dev {
+ const char *name;
+ const char *phys;
+ const char *uniq;
+ struct input_id id;
+ long unsigned int propbit[1];
+ long unsigned int evbit[1];
+ long unsigned int keybit[12];
+ long unsigned int relbit[1];
+ long unsigned int absbit[1];
+ long unsigned int mscbit[1];
+ long unsigned int ledbit[1];
+ long unsigned int sndbit[1];
+ long unsigned int ffbit[2];
+ long unsigned int swbit[1];
+ unsigned int hint_events_per_packet;
+ unsigned int keycodemax;
+ unsigned int keycodesize;
+ void *keycode;
+ int (*setkeycode)(struct input_dev *, const struct input_keymap_entry *, unsigned int *);
+ int (*getkeycode)(struct input_dev *, struct input_keymap_entry *);
+ struct ff_device *ff;
+ struct input_dev_poller *poller;
+ unsigned int repeat_key;
+ struct timer_list timer;
+ int rep[2];
+ struct input_mt *mt;
+ struct input_absinfo *absinfo;
+ long unsigned int key[12];
+ long unsigned int led[1];
+ long unsigned int snd[1];
+ long unsigned int sw[1];
+ int (*open)(struct input_dev *);
+ void (*close)(struct input_dev *);
+ int (*flush)(struct input_dev *, struct file *);
+ int (*event)(struct input_dev *, unsigned int, unsigned int, int);
+ struct input_handle *grab;
+ spinlock_t event_lock;
+ struct mutex mutex;
+ unsigned int users;
+ bool going_away;
+ struct device dev;
+ struct list_head h_list;
+ struct list_head node;
+ unsigned int num_vals;
+ unsigned int max_vals;
+ struct input_value *vals;
+ bool devres_managed;
+ ktime_t timestamp[3];
+ bool inhibited;
+};
+
+struct ff_device {
+ int (*upload)(struct input_dev *, struct ff_effect *, struct ff_effect *);
+ int (*erase)(struct input_dev *, int);
+ int (*playback)(struct input_dev *, int, int);
+ void (*set_gain)(struct input_dev *, u16);
+ void (*set_autocenter)(struct input_dev *, u16);
+ void (*destroy)(struct ff_device *);
+ void *private;
+ long unsigned int ffbit[2];
+ struct mutex mutex;
+ int max_effects;
+ struct ff_effect *effects;
+ struct file *effect_owners[0];
+};
+
+struct input_handler;
+
+struct input_handle {
+ void *private;
+ int open;
+ const char *name;
+ struct input_dev *dev;
+ struct input_handler *handler;
+ struct list_head d_node;
+ struct list_head h_node;
+};
+
+struct input_handler {
+ void *private;
+ void (*event)(struct input_handle *, unsigned int, unsigned int, int);
+ void (*events)(struct input_handle *, const struct input_value *, unsigned int);
+ bool (*filter)(struct input_handle *, unsigned int, unsigned int, int);
+ bool (*match)(struct input_handler *, struct input_dev *);
+ int (*connect)(struct input_handler *, struct input_dev *, const struct input_device_id *);
+ void (*disconnect)(struct input_handle *);
+ void (*start)(struct input_handle *);
+ bool legacy_minors;
+ int minor;
+ const char *name;
+ const struct input_device_id *id_table;
+ struct list_head h_list;
+ struct list_head node;
+};
+
+enum hid_report_type {
+ HID_INPUT_REPORT = 0,
+ HID_OUTPUT_REPORT = 1,
+ HID_FEATURE_REPORT = 2,
+ HID_REPORT_TYPES = 3,
+};
+
+struct hid_collection {
+ int parent_idx;
+ unsigned int type;
+ unsigned int usage;
+ unsigned int level;
+};
+
+struct hid_usage {
+ unsigned int hid;
+ unsigned int collection_index;
+ unsigned int usage_index;
+ __s8 resolution_multiplier;
+ __s8 wheel_factor;
+ __u16 code;
+ __u8 type;
+ __s8 hat_min;
+ __s8 hat_max;
+ __s8 hat_dir;
+ __s16 wheel_accumulated;
+};
+
+struct hid_report;
+
+struct hid_input;
+
+struct hid_field {
+ unsigned int physical;
+ unsigned int logical;
+ unsigned int application;
+ struct hid_usage *usage;
+ unsigned int maxusage;
+ unsigned int flags;
+ unsigned int report_offset;
+ unsigned int report_size;
+ unsigned int report_count;
+ unsigned int report_type;
+ __s32 *value;
+ __s32 *new_value;
+ __s32 *usages_priorities;
+ __s32 logical_minimum;
+ __s32 logical_maximum;
+ __s32 physical_minimum;
+ __s32 physical_maximum;
+ __s32 unit_exponent;
+ unsigned int unit;
+ bool ignored;
+ struct hid_report *report;
+ unsigned int index;
+ struct hid_input *hidinput;
+ __u16 dpad;
+ unsigned int slot_idx;
+};
+
+struct hid_field_entry;
+
+struct hid_device;
+
+struct hid_report {
+ struct list_head list;
+ struct list_head hidinput_list;
+ struct list_head field_entry_list;
+ unsigned int id;
+ enum hid_report_type type;
+ unsigned int application;
+ struct hid_field *field[256];
+ struct hid_field_entry *field_entries;
+ unsigned int maxfield;
+ unsigned int size;
+ struct hid_device *device;
+ bool tool_active;
+ unsigned int tool;
+};
+
+struct hid_input {
+ struct list_head list;
+ struct hid_report *report;
+ struct input_dev *input;
+ const char *name;
+ bool registered;
+ struct list_head reports;
+ unsigned int application;
+};
+
+struct hid_field_entry {
+ struct list_head list;
+ struct hid_field *field;
+ unsigned int index;
+ __s32 priority;
+};
+
+enum hid_type {
+ HID_TYPE_OTHER = 0,
+ HID_TYPE_USBMOUSE = 1,
+ HID_TYPE_USBNONE = 2,
+};
+
+struct hid_report_enum {
+ unsigned int numbered;
+ struct list_head report_list;
+ struct hid_report *report_id_hash[256];
+};
+
+struct hid_driver;
+
+struct hid_ll_driver;
+
+struct hid_device {
+ __u8 *dev_rdesc;
+ unsigned int dev_rsize;
+ __u8 *rdesc;
+ unsigned int rsize;
+ struct hid_collection *collection;
+ unsigned int collection_size;
+ unsigned int maxcollection;
+ unsigned int maxapplication;
+ __u16 bus;
+ __u16 group;
+ __u32 vendor;
+ __u32 product;
+ __u32 version;
+ enum hid_type type;
+ unsigned int country;
+ struct hid_report_enum report_enum[3];
+ struct work_struct led_work;
+ struct semaphore driver_input_lock;
+ struct device dev;
+ struct hid_driver *driver;
+ struct hid_ll_driver *ll_driver;
+ struct mutex ll_open_lock;
+ unsigned int ll_open_count;
+ long unsigned int status;
+ unsigned int claimed;
+ unsigned int quirks;
+ bool io_started;
+ struct list_head inputs;
+ void *hiddev;
+ void *hidraw;
+ char name[128];
+ char phys[64];
+ char uniq[64];
+ void *driver_data;
+ int (*ff_init)(struct hid_device *);
+ int (*hiddev_connect)(struct hid_device *, unsigned int);
+ void (*hiddev_disconnect)(struct hid_device *);
+ void (*hiddev_hid_event)(struct hid_device *, struct hid_field *, struct hid_usage *, __s32);
+ void (*hiddev_report_event)(struct hid_device *, struct hid_report *);
+ short unsigned int debug;
+ struct dentry *debug_dir;
+ struct dentry *debug_rdesc;
+ struct dentry *debug_events;
+ struct list_head debug_list;
+ spinlock_t debug_list_lock;
+ wait_queue_head_t debug_wait;
+ unsigned int id;
+};
+
+struct hid_report_id;
+
+struct hid_usage_id;
+
+struct hid_driver {
+ char *name;
+ const struct hid_device_id *id_table;
+ struct list_head dyn_list;
+ spinlock_t dyn_lock;
+ bool (*match)(struct hid_device *, bool);
+ int (*probe)(struct hid_device *, const struct hid_device_id *);
+ void (*remove)(struct hid_device *);
+ const struct hid_report_id *report_table;
+ int (*raw_event)(struct hid_device *, struct hid_report *, u8 *, int);
+ const struct hid_usage_id *usage_table;
+ int (*event)(struct hid_device *, struct hid_field *, struct hid_usage *, __s32);
+ void (*report)(struct hid_device *, struct hid_report *);
+ __u8 * (*report_fixup)(struct hid_device *, __u8 *, unsigned int *);
+ int (*input_mapping)(struct hid_device *, struct hid_input *, struct hid_field *, struct hid_usage *, long unsigned int **, int *);
+ int (*input_mapped)(struct hid_device *, struct hid_input *, struct hid_field *, struct hid_usage *, long unsigned int **, int *);
+ int (*input_configured)(struct hid_device *, struct hid_input *);
+ void (*feature_mapping)(struct hid_device *, struct hid_field *, struct hid_usage *);
+ int (*suspend)(struct hid_device *, pm_message_t);
+ int (*resume)(struct hid_device *);
+ int (*reset_resume)(struct hid_device *);
+ struct device_driver driver;
+};
+
+struct hid_ll_driver {
+ int (*start)(struct hid_device *);
+ void (*stop)(struct hid_device *);
+ int (*open)(struct hid_device *);
+ void (*close)(struct hid_device *);
+ int (*power)(struct hid_device *, int);
+ int (*parse)(struct hid_device *);
+ void (*request)(struct hid_device *, struct hid_report *, int);
+ int (*wait)(struct hid_device *);
+ int (*raw_request)(struct hid_device *, unsigned char, __u8 *, size_t, unsigned char, int);
+ int (*output_report)(struct hid_device *, __u8 *, size_t);
+ int (*idle)(struct hid_device *, int, int, int);
+ bool (*may_wakeup)(struct hid_device *);
+};
+
+struct hid_report_id {
+ __u32 report_type;
+};
+
+struct hid_usage_id {
+ __u32 usage_hid;
+ __u32 usage_type;
+ __u32 usage_code;
+};
+
+enum netdev_cmd {
+ NETDEV_UP = 1,
+ NETDEV_DOWN = 2,
+ NETDEV_REBOOT = 3,
+ NETDEV_CHANGE = 4,
+ NETDEV_REGISTER = 5,
+ NETDEV_UNREGISTER = 6,
+ NETDEV_CHANGEMTU = 7,
+ NETDEV_CHANGEADDR = 8,
+ NETDEV_PRE_CHANGEADDR = 9,
+ NETDEV_GOING_DOWN = 10,
+ NETDEV_CHANGENAME = 11,
+ NETDEV_FEAT_CHANGE = 12,
+ NETDEV_BONDING_FAILOVER = 13,
+ NETDEV_PRE_UP = 14,
+ NETDEV_PRE_TYPE_CHANGE = 15,
+ NETDEV_POST_TYPE_CHANGE = 16,
+ NETDEV_POST_INIT = 17,
+ NETDEV_PRE_UNINIT = 18,
+ NETDEV_RELEASE = 19,
+ NETDEV_NOTIFY_PEERS = 20,
+ NETDEV_JOIN = 21,
+ NETDEV_CHANGEUPPER = 22,
+ NETDEV_RESEND_IGMP = 23,
+ NETDEV_PRECHANGEMTU = 24,
+ NETDEV_CHANGEINFODATA = 25,
+ NETDEV_BONDING_INFO = 26,
+ NETDEV_PRECHANGEUPPER = 27,
+ NETDEV_CHANGELOWERSTATE = 28,
+ NETDEV_UDP_TUNNEL_PUSH_INFO = 29,
+ NETDEV_UDP_TUNNEL_DROP_INFO = 30,
+ NETDEV_CHANGE_TX_QUEUE_LEN = 31,
+ NETDEV_CVLAN_FILTER_PUSH_INFO = 32,
+ NETDEV_CVLAN_FILTER_DROP_INFO = 33,
+ NETDEV_SVLAN_FILTER_PUSH_INFO = 34,
+ NETDEV_SVLAN_FILTER_DROP_INFO = 35,
+ NETDEV_OFFLOAD_XSTATS_ENABLE = 36,
+ NETDEV_OFFLOAD_XSTATS_DISABLE = 37,
+ NETDEV_OFFLOAD_XSTATS_REPORT_USED = 38,
+ NETDEV_OFFLOAD_XSTATS_REPORT_DELTA = 39,
+};
+
+struct netdev_notifier_info {
+ struct net_device *dev;
+ struct netlink_ext_ack *extack;
+};
+
+enum {
+ RTM_BASE = 16,
+ RTM_NEWLINK = 16,
+ RTM_DELLINK = 17,
+ RTM_GETLINK = 18,
+ RTM_SETLINK = 19,
+ RTM_NEWADDR = 20,
+ RTM_DELADDR = 21,
+ RTM_GETADDR = 22,
+ RTM_NEWROUTE = 24,
+ RTM_DELROUTE = 25,
+ RTM_GETROUTE = 26,
+ RTM_NEWNEIGH = 28,
+ RTM_DELNEIGH = 29,
+ RTM_GETNEIGH = 30,
+ RTM_NEWRULE = 32,
+ RTM_DELRULE = 33,
+ RTM_GETRULE = 34,
+ RTM_NEWQDISC = 36,
+ RTM_DELQDISC = 37,
+ RTM_GETQDISC = 38,
+ RTM_NEWTCLASS = 40,
+ RTM_DELTCLASS = 41,
+ RTM_GETTCLASS = 42,
+ RTM_NEWTFILTER = 44,
+ RTM_DELTFILTER = 45,
+ RTM_GETTFILTER = 46,
+ RTM_NEWACTION = 48,
+ RTM_DELACTION = 49,
+ RTM_GETACTION = 50,
+ RTM_NEWPREFIX = 52,
+ RTM_GETMULTICAST = 58,
+ RTM_GETANYCAST = 62,
+ RTM_NEWNEIGHTBL = 64,
+ RTM_GETNEIGHTBL = 66,
+ RTM_SETNEIGHTBL = 67,
+ RTM_NEWNDUSEROPT = 68,
+ RTM_NEWADDRLABEL = 72,
+ RTM_DELADDRLABEL = 73,
+ RTM_GETADDRLABEL = 74,
+ RTM_GETDCB = 78,
+ RTM_SETDCB = 79,
+ RTM_NEWNETCONF = 80,
+ RTM_DELNETCONF = 81,
+ RTM_GETNETCONF = 82,
+ RTM_NEWMDB = 84,
+ RTM_DELMDB = 85,
+ RTM_GETMDB = 86,
+ RTM_NEWNSID = 88,
+ RTM_DELNSID = 89,
+ RTM_GETNSID = 90,
+ RTM_NEWSTATS = 92,
+ RTM_GETSTATS = 94,
+ RTM_SETSTATS = 95,
+ RTM_NEWCACHEREPORT = 96,
+ RTM_NEWCHAIN = 100,
+ RTM_DELCHAIN = 101,
+ RTM_GETCHAIN = 102,
+ RTM_NEWNEXTHOP = 104,
+ RTM_DELNEXTHOP = 105,
+ RTM_GETNEXTHOP = 106,
+ RTM_NEWLINKPROP = 108,
+ RTM_DELLINKPROP = 109,
+ RTM_GETLINKPROP = 110,
+ RTM_NEWVLAN = 112,
+ RTM_DELVLAN = 113,
+ RTM_GETVLAN = 114,
+ RTM_NEWNEXTHOPBUCKET = 116,
+ RTM_DELNEXTHOPBUCKET = 117,
+ RTM_GETNEXTHOPBUCKET = 118,
+ RTM_NEWTUNNEL = 120,
+ RTM_DELTUNNEL = 121,
+ RTM_GETTUNNEL = 122,
+ __RTM_MAX = 123,
+};
+
+enum rt_class_t {
+ RT_TABLE_UNSPEC = 0,
+ RT_TABLE_COMPAT = 252,
+ RT_TABLE_DEFAULT = 253,
+ RT_TABLE_MAIN = 254,
+ RT_TABLE_LOCAL = 255,
+ RT_TABLE_MAX = 4294967295,
+};
+
+struct rtgenmsg {
+ unsigned char rtgen_family;
+};
+
+enum netlink_validation {
+ NL_VALIDATE_LIBERAL = 0,
+ NL_VALIDATE_TRAILING = 1,
+ NL_VALIDATE_MAXTYPE = 2,
+ NL_VALIDATE_UNSPEC = 4,
+ NL_VALIDATE_STRICT_ATTRS = 8,
+ NL_VALIDATE_NESTED = 16,
+};
+
+typedef int (*rtnl_doit_func)(struct sk_buff *, struct nlmsghdr *, struct netlink_ext_ack *);
+
+typedef int (*rtnl_dumpit_func)(struct sk_buff *, struct netlink_callback *);
+
+struct fib_rule_uid_range {
+ __u32 start;
+ __u32 end;
+};
+
+enum {
+ FRA_UNSPEC = 0,
+ FRA_DST = 1,
+ FRA_SRC = 2,
+ FRA_IIFNAME = 3,
+ FRA_GOTO = 4,
+ FRA_UNUSED2 = 5,
+ FRA_PRIORITY = 6,
+ FRA_UNUSED3 = 7,
+ FRA_UNUSED4 = 8,
+ FRA_UNUSED5 = 9,
+ FRA_FWMARK = 10,
+ FRA_FLOW = 11,
+ FRA_TUN_ID = 12,
+ FRA_SUPPRESS_IFGROUP = 13,
+ FRA_SUPPRESS_PREFIXLEN = 14,
+ FRA_TABLE = 15,
+ FRA_FWMASK = 16,
+ FRA_OIFNAME = 17,
+ FRA_PAD = 18,
+ FRA_L3MDEV = 19,
+ FRA_UID_RANGE = 20,
+ FRA_PROTOCOL = 21,
+ FRA_IP_PROTO = 22,
+ FRA_SPORT_RANGE = 23,
+ FRA_DPORT_RANGE = 24,
+ __FRA_MAX = 25,
+};
+
+enum {
+ FR_ACT_UNSPEC = 0,
+ FR_ACT_TO_TBL = 1,
+ FR_ACT_GOTO = 2,
+ FR_ACT_NOP = 3,
+ FR_ACT_RES3 = 4,
+ FR_ACT_RES4 = 5,
+ FR_ACT_BLACKHOLE = 6,
+ FR_ACT_UNREACHABLE = 7,
+ FR_ACT_PROHIBIT = 8,
+ __FR_ACT_MAX = 9,
+};
+
+struct fib_notifier_info {
+ int family;
+ struct netlink_ext_ack *extack;
+};
+
+enum fib_event_type {
+ FIB_EVENT_ENTRY_REPLACE = 0,
+ FIB_EVENT_ENTRY_APPEND = 1,
+ FIB_EVENT_ENTRY_ADD = 2,
+ FIB_EVENT_ENTRY_DEL = 3,
+ FIB_EVENT_RULE_ADD = 4,
+ FIB_EVENT_RULE_DEL = 5,
+ FIB_EVENT_NH_ADD = 6,
+ FIB_EVENT_NH_DEL = 7,
+ FIB_EVENT_VIF_ADD = 8,
+ FIB_EVENT_VIF_DEL = 9,
+};
+
+struct fib_rule_notifier_info {
+ struct fib_notifier_info info;
+ struct fib_rule *rule;
+};
+
+enum {
+ ETHTOOL_A_PAUSE_STAT_UNSPEC = 0,
+ ETHTOOL_A_PAUSE_STAT_PAD = 1,
+ ETHTOOL_A_PAUSE_STAT_TX_FRAMES = 2,
+ ETHTOOL_A_PAUSE_STAT_RX_FRAMES = 3,
+ __ETHTOOL_A_PAUSE_STAT_CNT = 4,
+ ETHTOOL_A_PAUSE_STAT_MAX = 3,
+};
+
+struct pause_reply_data {
+ struct ethnl_reply_data base;
+ struct ethtool_pauseparam pauseparam;
+ struct ethtool_pause_stats pausestat;
+};
+
+enum lwtunnel_ip_t {
+ LWTUNNEL_IP_UNSPEC = 0,
+ LWTUNNEL_IP_ID = 1,
+ LWTUNNEL_IP_DST = 2,
+ LWTUNNEL_IP_SRC = 3,
+ LWTUNNEL_IP_TTL = 4,
+ LWTUNNEL_IP_TOS = 5,
+ LWTUNNEL_IP_FLAGS = 6,
+ LWTUNNEL_IP_PAD = 7,
+ LWTUNNEL_IP_OPTS = 8,
+ __LWTUNNEL_IP_MAX = 9,
+};
+
+enum lwtunnel_ip6_t {
+ LWTUNNEL_IP6_UNSPEC = 0,
+ LWTUNNEL_IP6_ID = 1,
+ LWTUNNEL_IP6_DST = 2,
+ LWTUNNEL_IP6_SRC = 3,
+ LWTUNNEL_IP6_HOPLIMIT = 4,
+ LWTUNNEL_IP6_TC = 5,
+ LWTUNNEL_IP6_FLAGS = 6,
+ LWTUNNEL_IP6_PAD = 7,
+ LWTUNNEL_IP6_OPTS = 8,
+ __LWTUNNEL_IP6_MAX = 9,
+};
+
+enum {
+ LWTUNNEL_IP_OPTS_UNSPEC = 0,
+ LWTUNNEL_IP_OPTS_GENEVE = 1,
+ LWTUNNEL_IP_OPTS_VXLAN = 2,
+ LWTUNNEL_IP_OPTS_ERSPAN = 3,
+ __LWTUNNEL_IP_OPTS_MAX = 4,
+};
+
+enum {
+ LWTUNNEL_IP_OPT_GENEVE_UNSPEC = 0,
+ LWTUNNEL_IP_OPT_GENEVE_CLASS = 1,
+ LWTUNNEL_IP_OPT_GENEVE_TYPE = 2,
+ LWTUNNEL_IP_OPT_GENEVE_DATA = 3,
+ __LWTUNNEL_IP_OPT_GENEVE_MAX = 4,
+};
+
+enum {
+ LWTUNNEL_IP_OPT_VXLAN_UNSPEC = 0,
+ LWTUNNEL_IP_OPT_VXLAN_GBP = 1,
+ __LWTUNNEL_IP_OPT_VXLAN_MAX = 2,
+};
+
+enum {
+ LWTUNNEL_IP_OPT_ERSPAN_UNSPEC = 0,
+ LWTUNNEL_IP_OPT_ERSPAN_VER = 1,
+ LWTUNNEL_IP_OPT_ERSPAN_INDEX = 2,
+ LWTUNNEL_IP_OPT_ERSPAN_DIR = 3,
+ LWTUNNEL_IP_OPT_ERSPAN_HWID = 4,
+ __LWTUNNEL_IP_OPT_ERSPAN_MAX = 5,
+};
+
+struct lwtunnel_encap_ops {
+ int (*build_state)(struct net *, struct nlattr *, unsigned int, const void *, struct lwtunnel_state **, struct netlink_ext_ack *);
+ void (*destroy_state)(struct lwtunnel_state *);
+ int (*output)(struct net *, struct sock *, struct sk_buff *);
+ int (*input)(struct sk_buff *);
+ int (*fill_encap)(struct sk_buff *, struct lwtunnel_state *);
+ int (*get_encap_size)(struct lwtunnel_state *);
+ int (*cmp_encap)(struct lwtunnel_state *, struct lwtunnel_state *);
+ int (*xmit)(struct sk_buff *);
+ struct module *owner;
+};
+
+enum {
+ IFLA_IPTUN_UNSPEC = 0,
+ IFLA_IPTUN_LINK = 1,
+ IFLA_IPTUN_LOCAL = 2,
+ IFLA_IPTUN_REMOTE = 3,
+ IFLA_IPTUN_TTL = 4,
+ IFLA_IPTUN_TOS = 5,
+ IFLA_IPTUN_ENCAP_LIMIT = 6,
+ IFLA_IPTUN_FLOWINFO = 7,
+ IFLA_IPTUN_FLAGS = 8,
+ IFLA_IPTUN_PROTO = 9,
+ IFLA_IPTUN_PMTUDISC = 10,
+ IFLA_IPTUN_6RD_PREFIX = 11,
+ IFLA_IPTUN_6RD_RELAY_PREFIX = 12,
+ IFLA_IPTUN_6RD_PREFIXLEN = 13,
+ IFLA_IPTUN_6RD_RELAY_PREFIXLEN = 14,
+ IFLA_IPTUN_ENCAP_TYPE = 15,
+ IFLA_IPTUN_ENCAP_FLAGS = 16,
+ IFLA_IPTUN_ENCAP_SPORT = 17,
+ IFLA_IPTUN_ENCAP_DPORT = 18,
+ IFLA_IPTUN_COLLECT_METADATA = 19,
+ IFLA_IPTUN_FWMARK = 20,
+ __IFLA_IPTUN_MAX = 21,
+};
+
+struct ip_tunnel_encap_ops {
+ size_t (*encap_hlen)(struct ip_tunnel_encap *);
+ int (*build_header)(struct sk_buff *, struct ip_tunnel_encap *, u8 *, struct flowi4 *);
+ int (*err_handler)(struct sk_buff *, u32);
+};
+
+struct ip6_tnl_encap_ops {
+ size_t (*encap_hlen)(struct ip_tunnel_encap *);
+ int (*build_header)(struct sk_buff *, struct ip_tunnel_encap *, u8 *, struct flowi6 *);
+ int (*err_handler)(struct sk_buff *, struct inet6_skb_parm *, u8, u8, int, __be32);
+};
+
+struct geneve_opt {
+ __be16 opt_class;
+ u8 type;
+ u8 length: 5;
+ u8 r3: 1;
+ u8 r2: 1;
+ u8 r1: 1;
+ u8 opt_data[0];
+};
+
+struct vxlan_metadata {
+ u32 gbp;
+};
+
+struct sadb_alg {
+ __u8 sadb_alg_id;
+ __u8 sadb_alg_ivlen;
+ __u16 sadb_alg_minbits;
+ __u16 sadb_alg_maxbits;
+ __u16 sadb_alg_reserved;
+};
+
+struct xfrm_algo_aead_info {
+ char *geniv;
+ u16 icv_truncbits;
+};
+
+struct xfrm_algo_auth_info {
+ u16 icv_truncbits;
+ u16 icv_fullbits;
+};
+
+struct xfrm_algo_encr_info {
+ char *geniv;
+ u16 blockbits;
+ u16 defkeybits;
+};
+
+struct xfrm_algo_comp_info {
+ u16 threshold;
+};
+
+struct xfrm_algo_desc {
+ char *name;
+ char *compat;
+ u8 available: 1;
+ u8 pfkey_supported: 1;
+ union {
+ struct xfrm_algo_aead_info aead;
+ struct xfrm_algo_auth_info auth;
+ struct xfrm_algo_encr_info encr;
+ struct xfrm_algo_comp_info comp;
+ } uinfo;
+ struct sadb_alg desc;
+};
+
+struct xfrm_algo_list {
+ struct xfrm_algo_desc *algs;
+ int entries;
+ u32 type;
+ u32 mask;
+};
+
+struct xfrm_aead_name {
+ const char *name;
+ int icvbits;
+};
+
+struct bpf_flow_keys {
+ __u16 nhoff;
+ __u16 thoff;
+ __u16 addr_proto;
+ __u8 is_frag;
+ __u8 is_first_frag;
+ __u8 is_encap;
+ __u8 ip_proto;
+ __be16 n_proto;
+ __be16 sport;
+ __be16 dport;
+ union {
+ struct {
+ __be32 ipv4_src;
+ __be32 ipv4_dst;
+ };
+ struct {
+ __u32 ipv6_src[4];
+ __u32 ipv6_dst[4];
+ };
+ };
+ __u32 flags;
+ __be32 flow_label;
+};
+
+struct bpf_sock {
+ __u32 bound_dev_if;
+ __u32 family;
+ __u32 type;
+ __u32 protocol;
+ __u32 mark;
+ __u32 priority;
+ __u32 src_ip4;
+ __u32 src_ip6[4];
+ __u32 src_port;
+ __be16 dst_port;
+ __u32 dst_ip4;
+ __u32 dst_ip6[4];
+ __u32 state;
+ __s32 rx_queue_mapping;
+};
+
+struct __sk_buff {
+ __u32 len;
+ __u32 pkt_type;
+ __u32 mark;
+ __u32 queue_mapping;
+ __u32 protocol;
+ __u32 vlan_present;
+ __u32 vlan_tci;
+ __u32 vlan_proto;
+ __u32 priority;
+ __u32 ingress_ifindex;
+ __u32 ifindex;
+ __u32 tc_index;
+ __u32 cb[5];
+ __u32 hash;
+ __u32 tc_classid;
+ __u32 data;
+ __u32 data_end;
+ __u32 napi_id;
+ __u32 family;
+ __u32 remote_ip4;
+ __u32 local_ip4;
+ __u32 remote_ip6[4];
+ __u32 local_ip6[4];
+ __u32 remote_port;
+ __u32 local_port;
+ __u32 data_meta;
+ union {
+ struct bpf_flow_keys *flow_keys;
+ };
+ __u64 tstamp;
+ __u32 wire_len;
+ __u32 gso_segs;
+ union {
+ struct bpf_sock *sk;
+ };
+ __u32 gso_size;
+ __u8 tstamp_type;
+ __u64 hwtstamp;
+};
+
+enum bpf_ret_code {
+ BPF_OK = 0,
+ BPF_DROP = 2,
+ BPF_REDIRECT = 7,
+ BPF_LWT_REROUTE = 128,
+ BPF_FLOW_DISSECTOR_CONTINUE = 129,
+};
+
+typedef unsigned int (*bpf_func_t)(const void *, const struct bpf_insn *);
+
+typedef unsigned int (*bpf_dispatcher_fn)(const void *, const struct bpf_insn *, unsigned int (*)(const void *, const struct bpf_insn *));
+
+struct bpf_skb_data_end {
+ struct qdisc_skb_cb qdisc_cb;
+ void *data_meta;
+ void *data_end;
+};
+
+enum l3mdev_type {
+ L3MDEV_TYPE_UNSPEC = 0,
+ L3MDEV_TYPE_VRF = 1,
+ __L3MDEV_TYPE_MAX = 2,
+};
+
+enum {
+ IP6_FH_F_FRAG = 1,
+ IP6_FH_F_AUTH = 2,
+ IP6_FH_F_SKIP_RH = 4,
+};
+
+struct ipv6_sr_hdr {
+ __u8 nexthdr;
+ __u8 hdrlen;
+ __u8 type;
+ __u8 segments_left;
+ __u8 first_segment;
+ __u8 flags;
+ __u16 tag;
+ struct in6_addr segments[0];
+};
+
+enum {
+ SEG6_LOCAL_UNSPEC = 0,
+ SEG6_LOCAL_ACTION = 1,
+ SEG6_LOCAL_SRH = 2,
+ SEG6_LOCAL_TABLE = 3,
+ SEG6_LOCAL_NH4 = 4,
+ SEG6_LOCAL_NH6 = 5,
+ SEG6_LOCAL_IIF = 6,
+ SEG6_LOCAL_OIF = 7,
+ SEG6_LOCAL_BPF = 8,
+ SEG6_LOCAL_VRFTABLE = 9,
+ SEG6_LOCAL_COUNTERS = 10,
+ SEG6_LOCAL_FLAVORS = 11,
+ __SEG6_LOCAL_MAX = 12,
+};
+
+enum {
+ SEG6_LOCAL_ACTION_UNSPEC = 0,
+ SEG6_LOCAL_ACTION_END = 1,
+ SEG6_LOCAL_ACTION_END_X = 2,
+ SEG6_LOCAL_ACTION_END_T = 3,
+ SEG6_LOCAL_ACTION_END_DX2 = 4,
+ SEG6_LOCAL_ACTION_END_DX6 = 5,
+ SEG6_LOCAL_ACTION_END_DX4 = 6,
+ SEG6_LOCAL_ACTION_END_DT6 = 7,
+ SEG6_LOCAL_ACTION_END_DT4 = 8,
+ SEG6_LOCAL_ACTION_END_B6 = 9,
+ SEG6_LOCAL_ACTION_END_B6_ENCAP = 10,
+ SEG6_LOCAL_ACTION_END_BM = 11,
+ SEG6_LOCAL_ACTION_END_S = 12,
+ SEG6_LOCAL_ACTION_END_AS = 13,
+ SEG6_LOCAL_ACTION_END_AM = 14,
+ SEG6_LOCAL_ACTION_END_BPF = 15,
+ SEG6_LOCAL_ACTION_END_DT46 = 16,
+ __SEG6_LOCAL_ACTION_MAX = 17,
+};
+
+enum {
+ SEG6_LOCAL_BPF_PROG_UNSPEC = 0,
+ SEG6_LOCAL_BPF_PROG = 1,
+ SEG6_LOCAL_BPF_PROG_NAME = 2,
+ __SEG6_LOCAL_BPF_PROG_MAX = 3,
+};
+
+enum {
+ SEG6_LOCAL_CNT_UNSPEC = 0,
+ SEG6_LOCAL_CNT_PAD = 1,
+ SEG6_LOCAL_CNT_PACKETS = 2,
+ SEG6_LOCAL_CNT_BYTES = 3,
+ SEG6_LOCAL_CNT_ERRORS = 4,
+ __SEG6_LOCAL_CNT_MAX = 5,
+};
+
+enum {
+ SEG6_LOCAL_FLV_UNSPEC = 0,
+ SEG6_LOCAL_FLV_OPERATION = 1,
+ SEG6_LOCAL_FLV_LCBLOCK_BITS = 2,
+ SEG6_LOCAL_FLV_LCNODE_FN_BITS = 3,
+ __SEG6_LOCAL_FLV_MAX = 4,
+};
+
+enum {
+ SEG6_LOCAL_FLV_OP_UNSPEC = 0,
+ SEG6_LOCAL_FLV_OP_PSP = 1,
+ SEG6_LOCAL_FLV_OP_USP = 2,
+ SEG6_LOCAL_FLV_OP_USD = 3,
+ SEG6_LOCAL_FLV_OP_NEXT_CSID = 4,
+ __SEG6_LOCAL_FLV_OP_MAX = 5,
+};
+
+struct seg6_bpf_srh_state {
+ struct ipv6_sr_hdr *srh;
+ u16 hdrlen;
+ bool valid;
+};
+
+struct seg6_local_lwt;
+
+struct seg6_local_lwtunnel_ops {
+ int (*build_state)(struct seg6_local_lwt *, const void *, struct netlink_ext_ack *);
+ void (*destroy_state)(struct seg6_local_lwt *);
+};
+
+struct bpf_lwt_prog {
+ struct bpf_prog *prog;
+ char *name;
+};
+
+enum seg6_end_dt_mode {
+ DT_INVALID_MODE = -22,
+ DT_LEGACY_MODE = 0,
+ DT_VRF_MODE = 1,
+};
+
+struct seg6_end_dt_info {
+ enum seg6_end_dt_mode mode;
+ struct net *net;
+ int vrf_ifindex;
+ int vrf_table;
+ u16 family;
+};
+
+struct seg6_flavors_info {
+ __u32 flv_ops;
+ __u8 lcblock_bits;
+ __u8 lcnode_func_bits;
+};
+
+struct pcpu_seg6_local_counters;
+
+struct seg6_action_desc;
+
+struct seg6_local_lwt {
+ int action;
+ struct ipv6_sr_hdr *srh;
+ int table;
+ struct in_addr nh4;
+ struct in6_addr nh6;
+ int iif;
+ int oif;
+ struct bpf_lwt_prog bpf;
+ struct seg6_end_dt_info dt_info;
+ struct seg6_flavors_info flv_info;
+ struct pcpu_seg6_local_counters *pcpu_counters;
+ int headroom;
+ struct seg6_action_desc *desc;
+ long unsigned int parsed_optattrs;
+};
+
+struct seg6_action_desc {
+ int action;
+ long unsigned int attrs;
+ long unsigned int optattrs;
+ int (*input)(struct sk_buff *, struct seg6_local_lwt *);
+ int static_headroom;
+ struct seg6_local_lwtunnel_ops slwt_ops;
+};
+
+struct pcpu_seg6_local_counters {
+ u64_stats_t packets;
+ u64_stats_t bytes;
+ u64_stats_t errors;
+ struct u64_stats_sync syncp;
+};
+
+struct seg6_local_counters {
+ __u64 packets;
+ __u64 bytes;
+ __u64 errors;
+};
+
+struct seg6_action_param {
+ int (*parse)(struct nlattr **, struct seg6_local_lwt *, struct netlink_ext_ack *);
+ int (*put)(struct sk_buff *, struct seg6_local_lwt *);
+ int (*cmp)(struct seg6_local_lwt *, struct seg6_local_lwt *);
+ void (*destroy)(struct seg6_local_lwt *);
+};
+
+typedef __u32 Elf32_Word;
+
+struct elf32_note {
+ Elf32_Word n_namesz;
+ Elf32_Word n_descsz;
+ Elf32_Word n_type;
+};
+
+enum cpuid_leafs {
+ CPUID_1_EDX = 0,
+ CPUID_8000_0001_EDX = 1,
+ CPUID_8086_0001_EDX = 2,
+ CPUID_LNX_1 = 3,
+ CPUID_1_ECX = 4,
+ CPUID_C000_0001_EDX = 5,
+ CPUID_8000_0001_ECX = 6,
+ CPUID_LNX_2 = 7,
+ CPUID_LNX_3 = 8,
+ CPUID_7_0_EBX = 9,
+ CPUID_D_1_EAX = 10,
+ CPUID_LNX_4 = 11,
+ CPUID_7_1_EAX = 12,
+ CPUID_8000_0008_EBX = 13,
+ CPUID_6_EAX = 14,
+ CPUID_8000_000A_EDX = 15,
+ CPUID_7_ECX = 16,
+ CPUID_8000_0007_EBX = 17,
+ CPUID_7_EDX = 18,
+ CPUID_8000_001F_EAX = 19,
+};
+
+struct cpu_dev {
+ const char *c_vendor;
+ const char *c_ident[2];
+ void (*c_early_init)(struct cpuinfo_x86 *);
+ void (*c_bsp_init)(struct cpuinfo_x86 *);
+ void (*c_init)(struct cpuinfo_x86 *);
+ void (*c_identify)(struct cpuinfo_x86 *);
+ void (*c_detect_tlb)(struct cpuinfo_x86 *);
+ int c_x86_vendor;
+};
+
+typedef bool (*smp_cond_func_t)(int, void *);
+
+struct mce {
+ __u64 status;
+ __u64 misc;
+ __u64 addr;
+ __u64 mcgstatus;
+ __u64 ip;
+ __u64 tsc;
+ __u64 time;
+ __u8 cpuvendor;
+ __u8 inject_flags;
+ __u8 severity;
+ __u8 pad;
+ __u32 cpuid;
+ __u8 cs;
+ __u8 bank;
+ __u8 cpu;
+ __u8 finished;
+ __u32 extcpu;
+ __u32 socketid;
+ __u32 apicid;
+ __u64 mcgcap;
+ __u64 synd;
+ __u64 ipid;
+ __u64 ppin;
+ __u32 microcode;
+ __u64 kflags;
+};
+
+typedef long unsigned int mce_banks_t[1];
+
+enum mcp_flags {
+ MCP_TIMESTAMP = 1,
+ MCP_UC = 2,
+ MCP_DONTLOG = 4,
+ MCP_QUEUE_LOG = 8,
+};
+
+struct mca_config {
+ __u64 lmce_disabled: 1;
+ __u64 disabled: 1;
+ __u64 ser: 1;
+ __u64 recovery: 1;
+ __u64 bios_cmci_threshold: 1;
+ __u64 initialized: 1;
+ __u64 __reserved: 58;
+ bool dont_log_ce;
+ bool cmci_disabled;
+ bool ignore_ce;
+ bool print_all;
+ int monarch_timeout;
+ int panic_timeout;
+ u32 rip_msr;
+ s8 bootlog;
+};
+
+enum {
+ CMCI_STORM_NONE = 0,
+ CMCI_STORM_ACTIVE = 1,
+ CMCI_STORM_SUBSIDED = 2,
+};
+
+enum cc_attr {
+ CC_ATTR_MEM_ENCRYPT = 0,
+ CC_ATTR_HOST_MEM_ENCRYPT = 1,
+ CC_ATTR_GUEST_MEM_ENCRYPT = 2,
+ CC_ATTR_GUEST_STATE_ENCRYPT = 3,
+ CC_ATTR_GUEST_UNROLL_STRING_IO = 4,
+ CC_ATTR_GUEST_SEV_SNP = 5,
+ CC_ATTR_HOTPLUG_DISABLED = 6,
+};
+
+enum {
+ IORES_DESC_NONE = 0,
+ IORES_DESC_CRASH_KERNEL = 1,
+ IORES_DESC_ACPI_TABLES = 2,
+ IORES_DESC_ACPI_NV_STORAGE = 3,
+ IORES_DESC_PERSISTENT_MEMORY = 4,
+ IORES_DESC_PERSISTENT_MEMORY_LEGACY = 5,
+ IORES_DESC_DEVICE_PRIVATE_MEMORY = 6,
+ IORES_DESC_RESERVED = 7,
+ IORES_DESC_SOFT_RESERVED = 8,
+ IORES_DESC_CXL = 9,
+};
+
+struct kimage_arch {
+ p4d_t *p4d;
+ pud_t *pud;
+ pmd_t *pmd;
+ pte_t *pte;
+};
+
+typedef long unsigned int kimage_entry_t;
+
+struct kexec_segment {
+ union {
+ void *buf;
+ void *kbuf;
+ };
+ size_t bufsz;
+ long unsigned int mem;
+ size_t memsz;
+};
+
+struct kimage {
+ kimage_entry_t head;
+ kimage_entry_t *entry;
+ kimage_entry_t *last_entry;
+ long unsigned int start;
+ struct page *control_code_page;
+ struct page *swap_page;
+ void *vmcoreinfo_data_copy;
+ long unsigned int nr_segments;
+ struct kexec_segment segment[16];
+ struct list_head control_pages;
+ struct list_head dest_pages;
+ struct list_head unusable_pages;
+ long unsigned int control_page;
+ unsigned int type: 1;
+ unsigned int preserve_context: 1;
+ unsigned int file_mode: 1;
+ struct kimage_arch arch;
+ void *elf_headers;
+ long unsigned int elf_headers_sz;
+ long unsigned int elf_load_addr;
+};
+
+struct init_pgtable_data {
+ struct x86_mapping_info *info;
+ pgd_t *level4p;
+};
+
+enum {
+ BTF_FIELDS_MAX = 10,
+};
+
+enum bpf_type_flag {
+ PTR_MAYBE_NULL = 256,
+ MEM_RDONLY = 512,
+ MEM_RINGBUF = 1024,
+ MEM_USER = 2048,
+ MEM_PERCPU = 4096,
+ OBJ_RELEASE = 8192,
+ PTR_UNTRUSTED = 16384,
+ MEM_UNINIT = 32768,
+ DYNPTR_TYPE_LOCAL = 65536,
+ DYNPTR_TYPE_RINGBUF = 131072,
+ MEM_FIXED_SIZE = 262144,
+ MEM_ALLOC = 524288,
+ PTR_TRUSTED = 1048576,
+ MEM_RCU = 2097152,
+ __BPF_TYPE_FLAG_MAX = 2097153,
+ __BPF_TYPE_LAST_FLAG = 2097152,
+};
+
+enum bpf_tramp_prog_type {
+ BPF_TRAMP_FENTRY = 0,
+ BPF_TRAMP_FEXIT = 1,
+ BPF_TRAMP_MODIFY_RETURN = 2,
+ BPF_TRAMP_MAX = 3,
+ BPF_TRAMP_REPLACE = 4,
+};
+
+struct __una_u32 {
+ u32 x;
+};
+
+struct bpf_bloom_filter {
+ struct bpf_map map;
+ u32 bitset_mask;
+ u32 hash_seed;
+ u32 aligned_u32_count;
+ u32 nr_hash_funcs;
+ long unsigned int bitset[0];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+enum {
+ BPF_F_BROADCAST = 8,
+ BPF_F_EXCLUDE_INGRESS = 16,
+};
+
+enum xdp_action {
+ XDP_ABORTED = 0,
+ XDP_DROP = 1,
+ XDP_PASS = 2,
+ XDP_TX = 3,
+ XDP_REDIRECT = 4,
+};
+
+struct bpf_devmap_val {
+ __u32 ifindex;
+ union {
+ int fd;
+ __u32 id;
+ } bpf_prog;
+};
+
+enum xdp_buff_flags {
+ XDP_FLAGS_HAS_FRAGS = 1,
+ XDP_FLAGS_FRAGS_PF_MEMALLOC = 2,
+};
+
+struct xdp_dev_bulk_queue {
+ struct xdp_frame *q[16];
+ struct list_head flush_node;
+ struct net_device *dev;
+ struct net_device *dev_rx;
+ struct bpf_prog *xdp_prog;
+ unsigned int count;
+};
+
+struct bpf_nh_params {
+ u32 nh_family;
+ union {
+ u32 ipv4_nh;
+ struct in6_addr ipv6_nh;
+ };
+};
+
+struct bpf_redirect_info {
+ u64 tgt_index;
+ void *tgt_value;
+ struct bpf_map *map;
+ u32 flags;
+ u32 kern_flags;
+ u32 map_id;
+ enum bpf_map_type map_type;
+ struct bpf_nh_params nh;
+};
+
+struct bpf_dtab;
+
+struct bpf_dtab_netdev {
+ struct net_device *dev;
+ struct hlist_node index_hlist;
+ struct bpf_dtab *dtab;
+ struct bpf_prog *xdp_prog;
+ struct callback_head rcu;
+ unsigned int idx;
+ struct bpf_devmap_val val;
+};
+
+struct bpf_dtab {
+ struct bpf_map map;
+ struct bpf_dtab_netdev **netdev_map;
+ struct list_head list;
+ struct hlist_head *dev_index_head;
+ spinlock_t index_lock;
+ unsigned int items;
+ u32 n_buckets;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+enum {
+ BIO_NO_PAGE_REF = 0,
+ BIO_CLONED = 1,
+ BIO_BOUNCED = 2,
+ BIO_QUIET = 3,
+ BIO_CHAIN = 4,
+ BIO_REFFED = 5,
+ BIO_BPS_THROTTLED = 6,
+ BIO_TRACE_COMPLETION = 7,
+ BIO_CGROUP_ACCT = 8,
+ BIO_QOS_THROTTLED = 9,
+ BIO_QOS_MERGED = 10,
+ BIO_REMAPPED = 11,
+ BIO_ZONE_WRITE_LOCKED = 12,
+ BIO_FLAG_LAST = 13,
+};
+
+enum iter_type {
+ ITER_IOVEC = 0,
+ ITER_KVEC = 1,
+ ITER_BVEC = 2,
+ ITER_PIPE = 3,
+ ITER_XARRAY = 4,
+ ITER_DISCARD = 5,
+ ITER_UBUF = 6,
+};
+
+struct iomap_dio {
+ struct kiocb *iocb;
+ const struct iomap_dio_ops *dops;
+ loff_t i_size;
+ loff_t size;
+ atomic_t ref;
+ unsigned int flags;
+ int error;
+ size_t done_before;
+ bool wait_for_completion;
+ union {
+ struct {
+ struct iov_iter *iter;
+ struct task_struct *waiter;
+ struct bio *poll_bio;
+ } submit;
+ struct {
+ struct work_struct work;
+ } aio;
+ };
+};
+
+struct xa_node {
+ unsigned char shift;
+ unsigned char offset;
+ unsigned char count;
+ unsigned char nr_values;
+ struct xa_node *parent;
+ struct xarray *array;
+ union {
+ struct list_head private_list;
+ struct callback_head callback_head;
+ };
+ void *slots[64];
+ union {
+ long unsigned int tags[3];
+ long unsigned int marks[3];
+ };
+};
+
+typedef void (*xa_update_node_t)(struct xa_node *);
+
+struct xa_state {
+ struct xarray *xa;
+ long unsigned int xa_index;
+ unsigned char xa_shift;
+ unsigned char xa_sibs;
+ unsigned char xa_offset;
+ unsigned char xa_pad;
+ struct xa_node *xa_node;
+ struct xa_node *xa_alloc;
+ xa_update_node_t xa_update;
+ struct list_lru *xa_lru;
+};
+
+enum netfs_io_source {
+ NETFS_FILL_WITH_ZEROES = 0,
+ NETFS_DOWNLOAD_FROM_SERVER = 1,
+ NETFS_READ_FROM_CACHE = 2,
+ NETFS_INVALID_READ = 3,
+};
+
+typedef void (*netfs_io_terminated_t)(void *, ssize_t, bool);
+
+struct netfs_request_ops;
+
+struct netfs_inode {
+ struct inode inode;
+ const struct netfs_request_ops *ops;
+ loff_t remote_i_size;
+};
+
+struct netfs_io_request;
+
+struct netfs_io_subrequest;
+
+struct netfs_request_ops {
+ int (*init_request)(struct netfs_io_request *, struct file *);
+ void (*free_request)(struct netfs_io_request *);
+ int (*begin_cache_operation)(struct netfs_io_request *);
+ void (*expand_readahead)(struct netfs_io_request *);
+ bool (*clamp_length)(struct netfs_io_subrequest *);
+ void (*issue_read)(struct netfs_io_subrequest *);
+ bool (*is_still_valid)(struct netfs_io_request *);
+ int (*check_write_begin)(struct file *, loff_t, unsigned int, struct folio **, void **);
+ void (*done)(struct netfs_io_request *);
+};
+
+struct netfs_cache_ops;
+
+struct netfs_cache_resources {
+ const struct netfs_cache_ops *ops;
+ void *cache_priv;
+ void *cache_priv2;
+ unsigned int debug_id;
+ unsigned int inval_counter;
+};
+
+enum netfs_read_from_hole {
+ NETFS_READ_HOLE_IGNORE = 0,
+ NETFS_READ_HOLE_CLEAR = 1,
+ NETFS_READ_HOLE_FAIL = 2,
+};
+
+struct netfs_cache_ops {
+ void (*end_operation)(struct netfs_cache_resources *);
+ int (*read)(struct netfs_cache_resources *, loff_t, struct iov_iter *, enum netfs_read_from_hole, netfs_io_terminated_t, void *);
+ int (*write)(struct netfs_cache_resources *, loff_t, struct iov_iter *, netfs_io_terminated_t, void *);
+ void (*expand_readahead)(struct netfs_cache_resources *, loff_t *, size_t *, loff_t);
+ enum netfs_io_source (*prepare_read)(struct netfs_io_subrequest *, loff_t);
+ int (*prepare_write)(struct netfs_cache_resources *, loff_t *, size_t *, loff_t, bool);
+ int (*query_occupancy)(struct netfs_cache_resources *, loff_t, size_t, size_t, loff_t *, size_t *);
+};
+
+struct netfs_io_subrequest {
+ struct netfs_io_request *rreq;
+ struct list_head rreq_link;
+ loff_t start;
+ size_t len;
+ size_t transferred;
+ refcount_t ref;
+ short int error;
+ short unsigned int debug_index;
+ enum netfs_io_source source;
+ long unsigned int flags;
+};
+
+enum netfs_io_origin {
+ NETFS_READAHEAD = 0,
+ NETFS_READPAGE = 1,
+ NETFS_READ_FOR_WRITE = 2,
+};
+
+struct netfs_io_request {
+ struct work_struct work;
+ struct inode *inode;
+ struct address_space *mapping;
+ struct netfs_cache_resources cache_resources;
+ struct list_head subrequests;
+ void *netfs_priv;
+ unsigned int debug_id;
+ atomic_t nr_outstanding;
+ atomic_t nr_copy_ops;
+ size_t submitted;
+ size_t len;
+ short int error;
+ enum netfs_io_origin origin;
+ loff_t i_size;
+ loff_t start;
+ long unsigned int no_unlock_folio;
+ refcount_t ref;
+ long unsigned int flags;
+ const struct netfs_request_ops *netfs_ops;
+};
+
+enum netfs_read_trace {
+ netfs_read_trace_expanded = 0,
+ netfs_read_trace_readahead = 1,
+ netfs_read_trace_readpage = 2,
+ netfs_read_trace_write_begin = 3,
+};
+
+enum netfs_rreq_trace {
+ netfs_rreq_trace_assess = 0,
+ netfs_rreq_trace_copy = 1,
+ netfs_rreq_trace_done = 2,
+ netfs_rreq_trace_free = 3,
+ netfs_rreq_trace_resubmit = 4,
+ netfs_rreq_trace_unlock = 5,
+ netfs_rreq_trace_unmark = 6,
+};
+
+enum netfs_failure {
+ netfs_fail_check_write_begin = 0,
+ netfs_fail_copy_to_cache = 1,
+ netfs_fail_read = 2,
+ netfs_fail_short_read = 3,
+ netfs_fail_prepare_write = 4,
+};
+
+enum netfs_rreq_ref_trace {
+ netfs_rreq_trace_get_hold = 0,
+ netfs_rreq_trace_get_subreq = 1,
+ netfs_rreq_trace_put_complete = 2,
+ netfs_rreq_trace_put_discard = 3,
+ netfs_rreq_trace_put_failed = 4,
+ netfs_rreq_trace_put_hold = 5,
+ netfs_rreq_trace_put_subreq = 6,
+ netfs_rreq_trace_put_zero_len = 7,
+ netfs_rreq_trace_new = 8,
+};
+
+struct p9_qid {
+ u8 type;
+ u32 version;
+ u64 path;
+};
+
+enum p9_trans_status {
+ Connected = 0,
+ BeginDisconnect = 1,
+ Disconnected = 2,
+ Hung = 3,
+};
+
+struct p9_trans_module;
+
+struct p9_client {
+ spinlock_t lock;
+ unsigned int msize;
+ unsigned char proto_version;
+ struct p9_trans_module *trans_mod;
+ enum p9_trans_status status;
+ void *trans;
+ struct kmem_cache *fcall_cache;
+ union {
+ struct {
+ int rfd;
+ int wfd;
+ } fd;
+ struct {
+ u16 port;
+ bool privport;
+ } tcp;
+ } trans_opts;
+ struct idr fids;
+ struct idr reqs;
+ char name[65];
+};
+
+struct p9_fid {
+ struct p9_client *clnt;
+ u32 fid;
+ refcount_t count;
+ int mode;
+ struct p9_qid qid;
+ u32 iounit;
+ kuid_t uid;
+ void *rdir;
+ struct hlist_node dlist;
+ struct hlist_node ilist;
+};
+
+enum p9_session_flags {
+ V9FS_PROTO_2000U = 1,
+ V9FS_PROTO_2000L = 2,
+ V9FS_ACCESS_SINGLE = 4,
+ V9FS_ACCESS_USER = 8,
+ V9FS_ACCESS_CLIENT = 16,
+ V9FS_POSIX_ACL = 32,
+};
+
+struct v9fs_session_info {
+ unsigned char flags;
+ unsigned char nodev;
+ short unsigned int debug;
+ unsigned int afid;
+ unsigned int cache;
+ char *uname;
+ char *aname;
+ unsigned int maxdata;
+ kuid_t dfltuid;
+ kgid_t dfltgid;
+ kuid_t uid;
+ struct p9_client *clnt;
+ struct list_head slist;
+ struct rw_semaphore rename_sem;
+ long int session_lock_timeout;
+};
+
+struct v9fs_inode {
+ struct netfs_inode netfs;
+ struct p9_qid qid;
+ unsigned int cache_validity;
+ struct p9_fid *writeback_fid;
+ struct mutex v_mutex;
+};
+
+struct crypto_wait {
+ struct completion completion;
+ int err;
+};
+
+enum {
+ CRYPTO_MSG_ALG_REQUEST = 0,
+ CRYPTO_MSG_ALG_REGISTER = 1,
+ CRYPTO_MSG_ALG_LOADED = 2,
+};
+
+struct crypto_larval {
+ struct crypto_alg alg;
+ struct crypto_alg *adult;
+ struct completion completion;
+ u32 mask;
+ bool test_started;
+};
+
+struct font_desc {
+ int idx;
+ const char *name;
+ unsigned int width;
+ unsigned int height;
+ unsigned int charcount;
+ const void *data;
+ int pref;
+};
+
+enum OID {
+ OID_id_dsa_with_sha1 = 0,
+ OID_id_dsa = 1,
+ OID_id_ecPublicKey = 2,
+ OID_id_prime192v1 = 3,
+ OID_id_prime256v1 = 4,
+ OID_id_ecdsa_with_sha1 = 5,
+ OID_id_ecdsa_with_sha224 = 6,
+ OID_id_ecdsa_with_sha256 = 7,
+ OID_id_ecdsa_with_sha384 = 8,
+ OID_id_ecdsa_with_sha512 = 9,
+ OID_rsaEncryption = 10,
+ OID_md2WithRSAEncryption = 11,
+ OID_md3WithRSAEncryption = 12,
+ OID_md4WithRSAEncryption = 13,
+ OID_sha1WithRSAEncryption = 14,
+ OID_sha256WithRSAEncryption = 15,
+ OID_sha384WithRSAEncryption = 16,
+ OID_sha512WithRSAEncryption = 17,
+ OID_sha224WithRSAEncryption = 18,
+ OID_data = 19,
+ OID_signed_data = 20,
+ OID_email_address = 21,
+ OID_contentType = 22,
+ OID_messageDigest = 23,
+ OID_signingTime = 24,
+ OID_smimeCapabilites = 25,
+ OID_smimeAuthenticatedAttrs = 26,
+ OID_md2 = 27,
+ OID_md4 = 28,
+ OID_md5 = 29,
+ OID_mskrb5 = 30,
+ OID_krb5 = 31,
+ OID_krb5u2u = 32,
+ OID_msIndirectData = 33,
+ OID_msStatementType = 34,
+ OID_msSpOpusInfo = 35,
+ OID_msPeImageDataObjId = 36,
+ OID_msIndividualSPKeyPurpose = 37,
+ OID_msOutlookExpress = 38,
+ OID_ntlmssp = 39,
+ OID_spnego = 40,
+ OID_IAKerb = 41,
+ OID_PKU2U = 42,
+ OID_Scram = 43,
+ OID_certAuthInfoAccess = 44,
+ OID_sha1 = 45,
+ OID_id_ansip384r1 = 46,
+ OID_sha256 = 47,
+ OID_sha384 = 48,
+ OID_sha512 = 49,
+ OID_sha224 = 50,
+ OID_commonName = 51,
+ OID_surname = 52,
+ OID_countryName = 53,
+ OID_locality = 54,
+ OID_stateOrProvinceName = 55,
+ OID_organizationName = 56,
+ OID_organizationUnitName = 57,
+ OID_title = 58,
+ OID_description = 59,
+ OID_name = 60,
+ OID_givenName = 61,
+ OID_initials = 62,
+ OID_generationalQualifier = 63,
+ OID_subjectKeyIdentifier = 64,
+ OID_keyUsage = 65,
+ OID_subjectAltName = 66,
+ OID_issuerAltName = 67,
+ OID_basicConstraints = 68,
+ OID_crlDistributionPoints = 69,
+ OID_certPolicies = 70,
+ OID_authorityKeyIdentifier = 71,
+ OID_extKeyUsage = 72,
+ OID_NetlogonMechanism = 73,
+ OID_appleLocalKdcSupported = 74,
+ OID_gostCPSignA = 75,
+ OID_gostCPSignB = 76,
+ OID_gostCPSignC = 77,
+ OID_gost2012PKey256 = 78,
+ OID_gost2012PKey512 = 79,
+ OID_gost2012Digest256 = 80,
+ OID_gost2012Digest512 = 81,
+ OID_gost2012Signature256 = 82,
+ OID_gost2012Signature512 = 83,
+ OID_gostTC26Sign256A = 84,
+ OID_gostTC26Sign256B = 85,
+ OID_gostTC26Sign256C = 86,
+ OID_gostTC26Sign256D = 87,
+ OID_gostTC26Sign512A = 88,
+ OID_gostTC26Sign512B = 89,
+ OID_gostTC26Sign512C = 90,
+ OID_sm2 = 91,
+ OID_sm3 = 92,
+ OID_SM2_with_SM3 = 93,
+ OID_sm3WithRSAEncryption = 94,
+ OID_TPMLoadableKey = 95,
+ OID_TPMImportableKey = 96,
+ OID_TPMSealedData = 97,
+ OID__NR = 98,
+};
+
+enum asn1_tag {
+ ASN1_EOC = 0,
+ ASN1_BOOL = 1,
+ ASN1_INT = 2,
+ ASN1_BTS = 3,
+ ASN1_OTS = 4,
+ ASN1_NULL = 5,
+ ASN1_OID = 6,
+ ASN1_ODE = 7,
+ ASN1_EXT = 8,
+ ASN1_REAL = 9,
+ ASN1_ENUM = 10,
+ ASN1_EPDV = 11,
+ ASN1_UTF8STR = 12,
+ ASN1_RELOID = 13,
+ ASN1_SEQ = 16,
+ ASN1_SET = 17,
+ ASN1_NUMSTR = 18,
+ ASN1_PRNSTR = 19,
+ ASN1_TEXSTR = 20,
+ ASN1_VIDSTR = 21,
+ ASN1_IA5STR = 22,
+ ASN1_UNITIM = 23,
+ ASN1_GENTIM = 24,
+ ASN1_GRASTR = 25,
+ ASN1_VISSTR = 26,
+ ASN1_GENSTR = 27,
+ ASN1_UNISTR = 28,
+ ASN1_CHRSTR = 29,
+ ASN1_BMPSTR = 30,
+ ASN1_LONG_TAG = 31,
+};
+
+struct driver_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct device_driver *, char *);
+ ssize_t (*store)(struct device_driver *, const char *, size_t);
+};
+
+struct platform_msi_priv_data;
+
+struct msi_device_data {
+ long unsigned int properties;
+ struct platform_msi_priv_data *platform_data;
+ struct mutex mutex;
+ struct xarray __store;
+ long unsigned int __iter_idx;
+};
+
+struct iopf_device_param;
+
+struct iommu_fault_param;
+
+struct iommu_fwspec;
+
+struct dev_iommu {
+ struct mutex lock;
+ struct iommu_fault_param *fault_param;
+ struct iopf_device_param *iopf_param;
+ struct iommu_fwspec *fwspec;
+ struct iommu_device *iommu_dev;
+ void *priv;
+};
+
+enum pci_fixup_pass {
+ pci_fixup_early = 0,
+ pci_fixup_header = 1,
+ pci_fixup_final = 2,
+ pci_fixup_enable = 3,
+ pci_fixup_resume = 4,
+ pci_fixup_suspend = 5,
+ pci_fixup_resume_early = 6,
+ pci_fixup_suspend_late = 7,
+};
+
+enum hk_type {
+ HK_TYPE_TIMER = 0,
+ HK_TYPE_RCU = 1,
+ HK_TYPE_MISC = 2,
+ HK_TYPE_SCHED = 3,
+ HK_TYPE_TICK = 4,
+ HK_TYPE_DOMAIN = 5,
+ HK_TYPE_WQ = 6,
+ HK_TYPE_MANAGED_IRQ = 7,
+ HK_TYPE_KTHREAD = 8,
+ HK_TYPE_MAX = 9,
+};
+
+struct iommu_fault_unrecoverable {
+ __u32 reason;
+ __u32 flags;
+ __u32 pasid;
+ __u32 perm;
+ __u64 addr;
+ __u64 fetch_addr;
+};
+
+struct iommu_fault_page_request {
+ __u32 flags;
+ __u32 pasid;
+ __u32 grpid;
+ __u32 perm;
+ __u64 addr;
+ __u64 private_data[2];
+};
+
+struct iommu_fault {
+ __u32 type;
+ __u32 padding;
+ union {
+ struct iommu_fault_unrecoverable event;
+ struct iommu_fault_page_request prm;
+ __u8 padding2[56];
+ };
+};
+
+struct iommu_page_response {
+ __u32 argsz;
+ __u32 version;
+ __u32 flags;
+ __u32 pasid;
+ __u32 grpid;
+ __u32 code;
+};
+
+typedef int (*iommu_fault_handler_t)(struct iommu_domain *, struct device *, long unsigned int, int, void *);
+
+struct iommu_domain_geometry {
+ dma_addr_t aperture_start;
+ dma_addr_t aperture_end;
+ bool force_aperture;
+};
+
+struct iommu_dma_cookie;
+
+struct iommu_domain {
+ unsigned int type;
+ const struct iommu_domain_ops *ops;
+ long unsigned int pgsize_bitmap;
+ iommu_fault_handler_t handler;
+ void *handler_token;
+ struct iommu_domain_geometry geometry;
+ struct iommu_dma_cookie *iova_cookie;
+};
+
+typedef int (*iommu_dev_fault_handler_t)(struct iommu_fault *, void *);
+
+struct iommu_iotlb_gather;
+
+struct iommu_domain_ops {
+ int (*attach_dev)(struct iommu_domain *, struct device *);
+ void (*detach_dev)(struct iommu_domain *, struct device *);
+ int (*map)(struct iommu_domain *, long unsigned int, phys_addr_t, size_t, int, gfp_t);
+ int (*map_pages)(struct iommu_domain *, long unsigned int, phys_addr_t, size_t, size_t, int, gfp_t, size_t *);
+ size_t (*unmap)(struct iommu_domain *, long unsigned int, size_t, struct iommu_iotlb_gather *);
+ size_t (*unmap_pages)(struct iommu_domain *, long unsigned int, size_t, size_t, struct iommu_iotlb_gather *);
+ void (*flush_iotlb_all)(struct iommu_domain *);
+ void (*iotlb_sync_map)(struct iommu_domain *, long unsigned int, size_t);
+ void (*iotlb_sync)(struct iommu_domain *, struct iommu_iotlb_gather *);
+ phys_addr_t (*iova_to_phys)(struct iommu_domain *, dma_addr_t);
+ bool (*enforce_cache_coherency)(struct iommu_domain *);
+ int (*enable_nesting)(struct iommu_domain *);
+ int (*set_pgtable_quirks)(struct iommu_domain *, long unsigned int);
+ void (*free)(struct iommu_domain *);
+};
+
+struct iommu_iotlb_gather {
+ long unsigned int start;
+ long unsigned int end;
+ size_t pgsize;
+ struct list_head freelist;
+ bool queued;
+};
+
+struct iommu_device {
+ struct list_head list;
+ const struct iommu_ops *ops;
+ struct fwnode_handle *fwnode;
+ struct device *dev;
+};
+
+struct iommu_sva {
+ struct device *dev;
+};
+
+struct iommu_fault_event {
+ struct iommu_fault fault;
+ struct list_head list;
+};
+
+struct iommu_fault_param {
+ iommu_dev_fault_handler_t handler;
+ void *data;
+ struct list_head faults;
+ struct mutex lock;
+};
+
+struct iommu_fwspec {
+ const struct iommu_ops *ops;
+ struct fwnode_handle *iommu_fwnode;
+ u32 flags;
+ unsigned int num_ids;
+ u32 ids[0];
+};
+
+struct pcie_device {
+ int irq;
+ struct pci_dev *port;
+ u32 service;
+ void *priv_data;
+ struct device device;
+};
+
+struct pcie_port_service_driver {
+ const char *name;
+ int (*probe)(struct pcie_device *);
+ void (*remove)(struct pcie_device *);
+ int (*suspend)(struct pcie_device *);
+ int (*resume_noirq)(struct pcie_device *);
+ int (*resume)(struct pcie_device *);
+ int (*runtime_suspend)(struct pcie_device *);
+ int (*runtime_resume)(struct pcie_device *);
+ int (*slot_reset)(struct pcie_device *);
+ int port_type;
+ u32 service;
+ struct device_driver driver;
+};
+
+struct pci_dynid {
+ struct list_head node;
+ struct pci_device_id id;
+};
+
+struct drv_dev_and_id {
+ struct pci_driver *drv;
+ struct pci_dev *dev;
+ const struct pci_device_id *id;
+};
+
+struct acpi_gpio_params {
+ unsigned int crs_entry_index;
+ unsigned int line_index;
+ bool active_low;
+};
+
+enum rc_proto {
+ RC_PROTO_UNKNOWN = 0,
+ RC_PROTO_OTHER = 1,
+ RC_PROTO_RC5 = 2,
+ RC_PROTO_RC5X_20 = 3,
+ RC_PROTO_RC5_SZ = 4,
+ RC_PROTO_JVC = 5,
+ RC_PROTO_SONY12 = 6,
+ RC_PROTO_SONY15 = 7,
+ RC_PROTO_SONY20 = 8,
+ RC_PROTO_NEC = 9,
+ RC_PROTO_NECX = 10,
+ RC_PROTO_NEC32 = 11,
+ RC_PROTO_SANYO = 12,
+ RC_PROTO_MCIR2_KBD = 13,
+ RC_PROTO_MCIR2_MSE = 14,
+ RC_PROTO_RC6_0 = 15,
+ RC_PROTO_RC6_6A_20 = 16,
+ RC_PROTO_RC6_6A_24 = 17,
+ RC_PROTO_RC6_6A_32 = 18,
+ RC_PROTO_RC6_MCE = 19,
+ RC_PROTO_SHARP = 20,
+ RC_PROTO_XMP = 21,
+ RC_PROTO_CEC = 22,
+ RC_PROTO_IMON = 23,
+ RC_PROTO_RCMM12 = 24,
+ RC_PROTO_RCMM24 = 25,
+ RC_PROTO_RCMM32 = 26,
+ RC_PROTO_XBOX_DVD = 27,
+ RC_PROTO_MAX = 27,
+};
+
+struct rc_map_table {
+ u64 scancode;
+ u32 keycode;
+};
+
+struct rc_map {
+ struct rc_map_table *scan;
+ unsigned int size;
+ unsigned int len;
+ unsigned int alloc;
+ enum rc_proto rc_proto;
+ const char *name;
+ spinlock_t lock;
+};
+
+struct rc_map_list {
+ struct list_head list;
+ struct rc_map map;
+};
+
+enum thermal_device_mode {
+ THERMAL_DEVICE_DISABLED = 0,
+ THERMAL_DEVICE_ENABLED = 1,
+};
+
+enum thermal_trip_type {
+ THERMAL_TRIP_ACTIVE = 0,
+ THERMAL_TRIP_PASSIVE = 1,
+ THERMAL_TRIP_HOT = 2,
+ THERMAL_TRIP_CRITICAL = 3,
+};
+
+enum thermal_trend {
+ THERMAL_TREND_STABLE = 0,
+ THERMAL_TREND_RAISING = 1,
+ THERMAL_TREND_DROPPING = 2,
+};
+
+enum thermal_notify_event {
+ THERMAL_EVENT_UNSPECIFIED = 0,
+ THERMAL_EVENT_TEMP_SAMPLE = 1,
+ THERMAL_TRIP_VIOLATED = 2,
+ THERMAL_TRIP_CHANGED = 3,
+ THERMAL_DEVICE_DOWN = 4,
+ THERMAL_DEVICE_UP = 5,
+ THERMAL_DEVICE_POWER_CAPABILITY_CHANGED = 6,
+ THERMAL_TABLE_CHANGED = 7,
+ THERMAL_EVENT_KEEP_ALIVE = 8,
+};
+
+struct thermal_zone_device;
+
+struct thermal_zone_device_ops {
+ int (*bind)(struct thermal_zone_device *, struct thermal_cooling_device *);
+ int (*unbind)(struct thermal_zone_device *, struct thermal_cooling_device *);
+ int (*get_temp)(struct thermal_zone_device *, int *);
+ int (*set_trips)(struct thermal_zone_device *, int, int);
+ int (*change_mode)(struct thermal_zone_device *, enum thermal_device_mode);
+ int (*get_trip_type)(struct thermal_zone_device *, int, enum thermal_trip_type *);
+ int (*get_trip_temp)(struct thermal_zone_device *, int, int *);
+ int (*set_trip_temp)(struct thermal_zone_device *, int, int);
+ int (*get_trip_hyst)(struct thermal_zone_device *, int, int *);
+ int (*set_trip_hyst)(struct thermal_zone_device *, int, int);
+ int (*get_crit_temp)(struct thermal_zone_device *, int *);
+ int (*set_emul_temp)(struct thermal_zone_device *, int);
+ int (*get_trend)(struct thermal_zone_device *, int, enum thermal_trend *);
+ void (*hot)(struct thermal_zone_device *);
+ void (*critical)(struct thermal_zone_device *);
+};
+
+struct thermal_attr;
+
+struct thermal_trip;
+
+struct thermal_zone_params;
+
+struct thermal_governor;
+
+struct thermal_zone_device {
+ int id;
+ char type[20];
+ struct device device;
+ struct attribute_group trips_attribute_group;
+ struct thermal_attr *trip_temp_attrs;
+ struct thermal_attr *trip_type_attrs;
+ struct thermal_attr *trip_hyst_attrs;
+ enum thermal_device_mode mode;
+ void *devdata;
+ struct thermal_trip *trips;
+ int num_trips;
+ long unsigned int trips_disabled;
+ long unsigned int passive_delay_jiffies;
+ long unsigned int polling_delay_jiffies;
+ int temperature;
+ int last_temperature;
+ int emul_temperature;
+ int passive;
+ int prev_low_trip;
+ int prev_high_trip;
+ atomic_t need_update;
+ struct thermal_zone_device_ops *ops;
+ struct thermal_zone_params *tzp;
+ struct thermal_governor *governor;
+ void *governor_data;
+ struct list_head thermal_instances;
+ struct ida ida;
+ struct mutex lock;
+ struct list_head node;
+ struct delayed_work poll_queue;
+ enum thermal_notify_event notify_event;
+};
+
+struct thermal_cooling_device_ops;
+
+struct thermal_cooling_device {
+ int id;
+ char *type;
+ struct device device;
+ struct device_node *np;
+ void *devdata;
+ void *stats;
+ const struct thermal_cooling_device_ops *ops;
+ bool updated;
+ struct mutex lock;
+ struct list_head thermal_instances;
+ struct list_head node;
+};
+
+struct thermal_trip {
+ int temperature;
+ int hysteresis;
+ enum thermal_trip_type type;
+};
+
+struct thermal_cooling_device_ops {
+ int (*get_max_state)(struct thermal_cooling_device *, long unsigned int *);
+ int (*get_cur_state)(struct thermal_cooling_device *, long unsigned int *);
+ int (*set_cur_state)(struct thermal_cooling_device *, long unsigned int);
+ int (*get_requested_power)(struct thermal_cooling_device *, u32 *);
+ int (*state2power)(struct thermal_cooling_device *, long unsigned int, u32 *);
+ int (*power2state)(struct thermal_cooling_device *, u32, long unsigned int *);
+};
+
+struct thermal_attr {
+ struct device_attribute attr;
+ char name[20];
+};
+
+struct thermal_bind_params;
+
+struct thermal_zone_params {
+ char governor_name[20];
+ bool no_hwmon;
+ int num_tbps;
+ struct thermal_bind_params *tbp;
+ u32 sustainable_power;
+ s32 k_po;
+ s32 k_pu;
+ s32 k_i;
+ s32 k_d;
+ s32 integral_cutoff;
+ int slope;
+ int offset;
+};
+
+struct thermal_governor {
+ char name[20];
+ int (*bind_to_tz)(struct thermal_zone_device *);
+ void (*unbind_from_tz)(struct thermal_zone_device *);
+ int (*throttle)(struct thermal_zone_device *, int);
+ struct list_head governor_list;
+};
+
+struct thermal_bind_params {
+ struct thermal_cooling_device *cdev;
+ int weight;
+ int trip_mask;
+ long unsigned int *binding_limits;
+ int (*match)(struct thermal_zone_device *, struct thermal_cooling_device *);
+};
+
+enum {
+ WQ_UNBOUND = 2,
+ WQ_FREEZABLE = 4,
+ WQ_MEM_RECLAIM = 8,
+ WQ_HIGHPRI = 16,
+ WQ_CPU_INTENSIVE = 32,
+ WQ_SYSFS = 64,
+ WQ_POWER_EFFICIENT = 128,
+ __WQ_DRAINING = 65536,
+ __WQ_ORDERED = 131072,
+ __WQ_LEGACY = 262144,
+ __WQ_ORDERED_EXPLICIT = 524288,
+ WQ_MAX_ACTIVE = 512,
+ WQ_MAX_UNBOUND_PER_CPU = 4,
+ WQ_DFL_ACTIVE = 256,
+};
+
+struct kobj_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct kobject *, struct kobj_attribute *, char *);
+ ssize_t (*store)(struct kobject *, struct kobj_attribute *, const char *, size_t);
+};
+
+struct debugfs_blob_wrapper {
+ void *data;
+ long unsigned int size;
+};
+
+struct pdev_archdata {};
+
+typedef efi_status_t efi_query_variable_store_t(u32, long unsigned int, bool);
+
+typedef struct {
+ efi_guid_t guid;
+ u64 table;
+} efi_config_table_64_t;
+
+typedef struct {
+ efi_guid_t guid;
+ u32 table;
+} efi_config_table_32_t;
+
+typedef union {
+ struct {
+ efi_guid_t guid;
+ void *table;
+ };
+ efi_config_table_32_t mixed_mode;
+} efi_config_table_t;
+
+typedef struct {
+ efi_guid_t guid;
+ long unsigned int *ptr;
+ const char name[16];
+} efi_config_table_type_t;
+
+typedef struct {
+ u16 version;
+ u16 length;
+ u32 runtime_services_supported;
+} efi_rt_properties_table_t;
+
+struct efivar_operations {
+ efi_get_variable_t *get_variable;
+ efi_get_next_variable_t *get_next_variable;
+ efi_set_variable_t *set_variable;
+ efi_set_variable_t *set_variable_nonblocking;
+ efi_query_variable_store_t *query_variable_store;
+};
+
+struct efivars {
+ struct kset *kset;
+ struct kobject *kobject;
+ const struct efivar_operations *ops;
+};
+
+struct linux_efi_random_seed {
+ u32 size;
+ u8 bits[0];
+};
+
+struct linux_efi_memreserve {
+ int size;
+ atomic_t count;
+ phys_addr_t next;
+ struct {
+ phys_addr_t base;
+ phys_addr_t size;
+ } entry[0];
+};
+
+struct linux_efi_initrd {
+ long unsigned int base;
+ long unsigned int size;
+};
+
+struct platform_device_id {
+ char name[20];
+ kernel_ulong_t driver_data;
+};
+
+enum dev_prop_type {
+ DEV_PROP_U8 = 0,
+ DEV_PROP_U16 = 1,
+ DEV_PROP_U32 = 2,
+ DEV_PROP_U64 = 3,
+ DEV_PROP_STRING = 4,
+ DEV_PROP_REF = 5,
+};
+
+struct property_entry {
+ const char *name;
+ size_t length;
+ bool is_inline;
+ enum dev_prop_type type;
+ union {
+ const void *pointer;
+ union {
+ u8 u8_data[8];
+ u16 u16_data[4];
+ u32 u32_data[2];
+ u64 u64_data[1];
+ const char *str[1];
+ } value;
+ };
+};
+
+struct mfd_cell;
+
+struct platform_device {
+ const char *name;
+ int id;
+ bool id_auto;
+ struct device dev;
+ u64 platform_dma_mask;
+ struct device_dma_parameters dma_parms;
+ u32 num_resources;
+ struct resource *resource;
+ const struct platform_device_id *id_entry;
+ const char *driver_override;
+ struct mfd_cell *mfd_cell;
+ struct pdev_archdata archdata;
+};
+
+struct platform_device_info {
+ struct device *parent;
+ struct fwnode_handle *fwnode;
+ bool of_node_reused;
+ const char *name;
+ int id;
+ const struct resource *res;
+ unsigned int num_res;
+ const void *data;
+ size_t size_data;
+ u64 dma_mask;
+ const struct property_entry *properties;
+};
+
+typedef u16 ucs2_char_t;
+
+enum tca_id {
+ TCA_ID_UNSPEC = 0,
+ TCA_ID_POLICE = 1,
+ TCA_ID_GACT = 5,
+ TCA_ID_IPT = 6,
+ TCA_ID_PEDIT = 7,
+ TCA_ID_MIRRED = 8,
+ TCA_ID_NAT = 9,
+ TCA_ID_XT = 10,
+ TCA_ID_SKBEDIT = 11,
+ TCA_ID_VLAN = 12,
+ TCA_ID_BPF = 13,
+ TCA_ID_CONNMARK = 14,
+ TCA_ID_SKBMOD = 15,
+ TCA_ID_CSUM = 16,
+ TCA_ID_TUNNEL_KEY = 17,
+ TCA_ID_SIMP = 22,
+ TCA_ID_IFE = 25,
+ TCA_ID_SAMPLE = 26,
+ TCA_ID_CTINFO = 27,
+ TCA_ID_MPLS = 28,
+ TCA_ID_CT = 29,
+ TCA_ID_GATE = 30,
+ __TCA_ID_MAX = 255,
+};
+
+struct tcf_t {
+ __u64 install;
+ __u64 lastuse;
+ __u64 expires;
+ __u64 firstuse;
+};
+
+enum {
+ TCA_CGROUP_UNSPEC = 0,
+ TCA_CGROUP_ACT = 1,
+ TCA_CGROUP_POLICE = 2,
+ TCA_CGROUP_EMATCHES = 3,
+ __TCA_CGROUP_MAX = 4,
+};
+
+struct tcf_ematch_tree_hdr {
+ __u16 nmatches;
+ __u16 progid;
+};
+
+struct tcf_idrinfo {
+ struct mutex lock;
+ struct idr action_idr;
+ struct net *net;
+};
+
+struct tc_action_ops;
+
+struct tc_cookie;
+
+struct tc_action {
+ const struct tc_action_ops *ops;
+ __u32 type;
+ struct tcf_idrinfo *idrinfo;
+ u32 tcfa_index;
+ refcount_t tcfa_refcnt;
+ atomic_t tcfa_bindcnt;
+ int tcfa_action;
+ struct tcf_t tcfa_tm;
+ long: 64;
+ struct gnet_stats_basic_sync tcfa_bstats;
+ struct gnet_stats_basic_sync tcfa_bstats_hw;
+ struct gnet_stats_queue tcfa_qstats;
+ struct net_rate_estimator *tcfa_rate_est;
+ spinlock_t tcfa_lock;
+ struct gnet_stats_basic_sync *cpu_bstats;
+ struct gnet_stats_basic_sync *cpu_bstats_hw;
+ struct gnet_stats_queue *cpu_qstats;
+ struct tc_cookie *act_cookie;
+ struct tcf_chain *goto_chain;
+ u32 tcfa_flags;
+ u8 hw_stats;
+ u8 used_hw_stats;
+ bool used_hw_stats_valid;
+ u32 in_hw_count;
+ long: 32;
+ long: 64;
+};
+
+typedef void (*tc_action_priv_destructor)(void *);
+
+struct psample_group;
+
+struct tc_action_ops {
+ struct list_head head;
+ char kind[16];
+ enum tca_id id;
+ unsigned int net_id;
+ size_t size;
+ struct module *owner;
+ int (*act)(struct sk_buff *, const struct tc_action *, struct tcf_result *);
+ int (*dump)(struct sk_buff *, struct tc_action *, int, int);
+ void (*cleanup)(struct tc_action *);
+ int (*lookup)(struct net *, struct tc_action **, u32);
+ int (*init)(struct net *, struct nlattr *, struct nlattr *, struct tc_action **, struct tcf_proto *, u32, struct netlink_ext_ack *);
+ int (*walk)(struct net *, struct sk_buff *, struct netlink_callback *, int, const struct tc_action_ops *, struct netlink_ext_ack *);
+ void (*stats_update)(struct tc_action *, u64, u64, u64, u64, bool);
+ size_t (*get_fill_size)(const struct tc_action *);
+ struct net_device * (*get_dev)(const struct tc_action *, tc_action_priv_destructor *);
+ struct psample_group * (*get_psample_group)(const struct tc_action *, tc_action_priv_destructor *);
+ int (*offload_act_setup)(struct tc_action *, void *, u32 *, bool, struct netlink_ext_ack *);
+};
+
+struct tc_cookie {
+ u8 *data;
+ u32 len;
+ struct callback_head rcu;
+};
+
+struct tcf_exts {
+ __u32 type;
+ int nr_actions;
+ struct tc_action **actions;
+ struct net *net;
+ netns_tracker ns_tracker;
+ int action;
+ int police;
+};
+
+struct tcf_pkt_info {
+ unsigned char *ptr;
+ int nexthdr;
+};
+
+struct tcf_ematch_ops;
+
+struct tcf_ematch {
+ struct tcf_ematch_ops *ops;
+ long unsigned int data;
+ unsigned int datalen;
+ u16 matchid;
+ u16 flags;
+ struct net *net;
+};
+
+struct tcf_ematch_ops {
+ int kind;
+ int datalen;
+ int (*change)(struct net *, void *, int, struct tcf_ematch *);
+ int (*match)(struct sk_buff *, struct tcf_ematch *, struct tcf_pkt_info *);
+ void (*destroy)(struct tcf_ematch *);
+ int (*dump)(struct sk_buff *, struct tcf_ematch *);
+ struct module *owner;
+ struct list_head link;
+};
+
+struct tcf_ematch_tree {
+ struct tcf_ematch_tree_hdr hdr;
+ struct tcf_ematch *matches;
+};
+
+struct cgroup_cls_state {
+ struct cgroup_subsys_state css;
+ u32 classid;
+};
+
+struct cls_cgroup_head {
+ u32 handle;
+ struct tcf_exts exts;
+ struct tcf_ematch_tree ematches;
+ struct tcf_proto *tp;
+ struct rcu_work rwork;
+};
+
+struct module_reply_data {
+ struct ethnl_reply_data base;
+ struct ethtool_module_power_mode_params power;
+};
+
+struct flow_dissector {
+ unsigned int used_keys;
+ short unsigned int offset[31];
+};
+
+struct netlink_kernel_cfg {
+ unsigned int groups;
+ unsigned int flags;
+ void (*input)(struct sk_buff *);
+ struct mutex *cb_mutex;
+ int (*bind)(struct net *, int);
+ void (*unbind)(struct net *, int);
+ bool (*compare)(struct net *, struct sock *);
+};
+
+struct netdev_notifier_info_ext {
+ struct netdev_notifier_info info;
+ union {
+ u32 mtu;
+ } ext;
+};
+
+struct netdev_notifier_changeupper_info {
+ struct netdev_notifier_info info;
+ struct net_device *upper_dev;
+ bool master;
+ bool linking;
+ void *upper_info;
+};
+
+struct rtmsg {
+ unsigned char rtm_family;
+ unsigned char rtm_dst_len;
+ unsigned char rtm_src_len;
+ unsigned char rtm_tos;
+ unsigned char rtm_table;
+ unsigned char rtm_protocol;
+ unsigned char rtm_scope;
+ unsigned char rtm_type;
+ unsigned int rtm_flags;
+};
+
+enum rtattr_type_t {
+ RTA_UNSPEC = 0,
+ RTA_DST = 1,
+ RTA_SRC = 2,
+ RTA_IIF = 3,
+ RTA_OIF = 4,
+ RTA_GATEWAY = 5,
+ RTA_PRIORITY = 6,
+ RTA_PREFSRC = 7,
+ RTA_METRICS = 8,
+ RTA_MULTIPATH = 9,
+ RTA_PROTOINFO = 10,
+ RTA_FLOW = 11,
+ RTA_CACHEINFO = 12,
+ RTA_SESSION = 13,
+ RTA_MP_ALGO = 14,
+ RTA_TABLE = 15,
+ RTA_MARK = 16,
+ RTA_MFC_STATS = 17,
+ RTA_VIA = 18,
+ RTA_NEWDST = 19,
+ RTA_PREF = 20,
+ RTA_ENCAP_TYPE = 21,
+ RTA_ENCAP = 22,
+ RTA_EXPIRES = 23,
+ RTA_PAD = 24,
+ RTA_UID = 25,
+ RTA_TTL_PROPAGATE = 26,
+ RTA_IP_PROTO = 27,
+ RTA_SPORT = 28,
+ RTA_DPORT = 29,
+ RTA_NH_ID = 30,
+ __RTA_MAX = 31,
+};
+
+struct rtnexthop {
+ short unsigned int rtnh_len;
+ unsigned char rtnh_flags;
+ unsigned char rtnh_hops;
+ int rtnh_ifindex;
+};
+
+struct rtvia {
+ __kernel_sa_family_t rtvia_family;
+ __u8 rtvia_addr[0];
+};
+
+typedef u8 dscp_t;
+
+struct fib_config {
+ u8 fc_dst_len;
+ dscp_t fc_dscp;
+ u8 fc_protocol;
+ u8 fc_scope;
+ u8 fc_type;
+ u8 fc_gw_family;
+ u32 fc_table;
+ __be32 fc_dst;
+ union {
+ __be32 fc_gw4;
+ struct in6_addr fc_gw6;
+ };
+ int fc_oif;
+ u32 fc_flags;
+ u32 fc_priority;
+ __be32 fc_prefsrc;
+ u32 fc_nh_id;
+ struct nlattr *fc_mx;
+ struct rtnexthop *fc_mp;
+ int fc_mx_len;
+ int fc_mp_len;
+ u32 fc_flow;
+ u32 fc_nlflags;
+ struct nl_info fc_nlinfo;
+ struct nlattr *fc_encap;
+ u16 fc_encap_type;
+};
+
+struct fib_result {
+ __be32 prefix;
+ unsigned char prefixlen;
+ unsigned char nh_sel;
+ unsigned char type;
+ unsigned char scope;
+ u32 tclassid;
+ struct fib_nh_common *nhc;
+ struct fib_info *fi;
+ struct fib_table *table;
+ struct hlist_head *fa_head;
+};
+
+struct fib_result_nl {
+ __be32 fl_addr;
+ u32 fl_mark;
+ unsigned char fl_tos;
+ unsigned char fl_scope;
+ unsigned char tb_id_in;
+ unsigned char tb_id;
+ unsigned char prefixlen;
+ unsigned char nh_sel;
+ unsigned char type;
+ unsigned char scope;
+ int err;
+};
+
+struct fib_dump_filter {
+ u32 table_id;
+ bool filter_set;
+ bool dump_routes;
+ bool dump_exceptions;
+ unsigned char protocol;
+ unsigned char rt_type;
+ unsigned int flags;
+ struct net_device *dev;
+};
+
+struct rtentry {
+ long unsigned int rt_pad1;
+ struct sockaddr rt_dst;
+ struct sockaddr rt_gateway;
+ struct sockaddr rt_genmask;
+ short unsigned int rt_flags;
+ short int rt_pad2;
+ long unsigned int rt_pad3;
+ void *rt_pad4;
+ short int rt_metric;
+ char *rt_dev;
+ long unsigned int rt_mtu;
+ long unsigned int rt_window;
+ short unsigned int rt_irtt;
+};
+
+enum xfrm_ae_ftype_t {
+ XFRM_AE_UNSPEC = 0,
+ XFRM_AE_RTHR = 1,
+ XFRM_AE_RVAL = 2,
+ XFRM_AE_LVAL = 4,
+ XFRM_AE_ETHR = 8,
+ XFRM_AE_CR = 16,
+ XFRM_AE_CE = 32,
+ XFRM_AE_CU = 64,
+ __XFRM_AE_MAX = 65,
+};
+
+enum xfrm_nlgroups {
+ XFRMNLGRP_NONE = 0,
+ XFRMNLGRP_ACQUIRE = 1,
+ XFRMNLGRP_EXPIRE = 2,
+ XFRMNLGRP_SA = 3,
+ XFRMNLGRP_POLICY = 4,
+ XFRMNLGRP_AEVENTS = 5,
+ XFRMNLGRP_REPORT = 6,
+ XFRMNLGRP_MIGRATE = 7,
+ XFRMNLGRP_MAPPING = 8,
+ __XFRMNLGRP_MAX = 9,
+};
+
+struct km_event {
+ union {
+ u32 hard;
+ u32 proto;
+ u32 byid;
+ u32 aevent;
+ u32 type;
+ } data;
+ u32 seq;
+ u32 portid;
+ u32 event;
+ struct net *net;
+};
+
+struct xfrm_skb_cb {
+ struct xfrm_tunnel_skb_cb header;
+ union {
+ struct {
+ __u32 low;
+ __u32 hi;
+ } output;
+ struct {
+ __be32 low;
+ __be32 hi;
+ } input;
+ } seq;
+};
+
+struct errormap {
+ char *name;
+ int val;
+ int namelen;
+ struct hlist_node list;
+};
+
+struct irq_affinity {
+ unsigned int pre_vectors;
+ unsigned int post_vectors;
+ unsigned int nr_sets;
+ unsigned int set_size[4];
+ void (*calc_sets)(struct irq_affinity *, unsigned int);
+ void *priv;
+};
+
+enum p9_msg_t {
+ P9_TLERROR = 6,
+ P9_RLERROR = 7,
+ P9_TSTATFS = 8,
+ P9_RSTATFS = 9,
+ P9_TLOPEN = 12,
+ P9_RLOPEN = 13,
+ P9_TLCREATE = 14,
+ P9_RLCREATE = 15,
+ P9_TSYMLINK = 16,
+ P9_RSYMLINK = 17,
+ P9_TMKNOD = 18,
+ P9_RMKNOD = 19,
+ P9_TRENAME = 20,
+ P9_RRENAME = 21,
+ P9_TREADLINK = 22,
+ P9_RREADLINK = 23,
+ P9_TGETATTR = 24,
+ P9_RGETATTR = 25,
+ P9_TSETATTR = 26,
+ P9_RSETATTR = 27,
+ P9_TXATTRWALK = 30,
+ P9_RXATTRWALK = 31,
+ P9_TXATTRCREATE = 32,
+ P9_RXATTRCREATE = 33,
+ P9_TREADDIR = 40,
+ P9_RREADDIR = 41,
+ P9_TFSYNC = 50,
+ P9_RFSYNC = 51,
+ P9_TLOCK = 52,
+ P9_RLOCK = 53,
+ P9_TGETLOCK = 54,
+ P9_RGETLOCK = 55,
+ P9_TLINK = 70,
+ P9_RLINK = 71,
+ P9_TMKDIR = 72,
+ P9_RMKDIR = 73,
+ P9_TRENAMEAT = 74,
+ P9_RRENAMEAT = 75,
+ P9_TUNLINKAT = 76,
+ P9_RUNLINKAT = 77,
+ P9_TVERSION = 100,
+ P9_RVERSION = 101,
+ P9_TAUTH = 102,
+ P9_RAUTH = 103,
+ P9_TATTACH = 104,
+ P9_RATTACH = 105,
+ P9_TERROR = 106,
+ P9_RERROR = 107,
+ P9_TFLUSH = 108,
+ P9_RFLUSH = 109,
+ P9_TWALK = 110,
+ P9_RWALK = 111,
+ P9_TOPEN = 112,
+ P9_ROPEN = 113,
+ P9_TCREATE = 114,
+ P9_RCREATE = 115,
+ P9_TREAD = 116,
+ P9_RREAD = 117,
+ P9_TWRITE = 118,
+ P9_RWRITE = 119,
+ P9_TCLUNK = 120,
+ P9_RCLUNK = 121,
+ P9_TREMOVE = 122,
+ P9_RREMOVE = 123,
+ P9_TSTAT = 124,
+ P9_RSTAT = 125,
+ P9_TWSTAT = 126,
+ P9_RWSTAT = 127,
+};
+
+struct p9_fcall {
+ u32 size;
+ u8 id;
+ u16 tag;
+ size_t offset;
+ size_t capacity;
+ struct kmem_cache *cache;
+ u8 *sdata;
+};
+
+enum p9_req_status_t {
+ REQ_STATUS_ALLOC = 0,
+ REQ_STATUS_UNSENT = 1,
+ REQ_STATUS_SENT = 2,
+ REQ_STATUS_RCVD = 3,
+ REQ_STATUS_FLSHD = 4,
+ REQ_STATUS_ERROR = 5,
+};
+
+struct p9_req_t {
+ int status;
+ int t_err;
+ refcount_t refcount;
+ wait_queue_head_t wq;
+ struct p9_fcall tc;
+ struct p9_fcall rc;
+ struct list_head req_list;
+};
+
+struct p9_trans_module {
+ struct list_head list;
+ char *name;
+ int maxsize;
+ bool pooled_rbuffers;
+ int def;
+ struct module *owner;
+ int (*create)(struct p9_client *, const char *, char *);
+ void (*close)(struct p9_client *);
+ int (*request)(struct p9_client *, struct p9_req_t *);
+ int (*cancel)(struct p9_client *, struct p9_req_t *);
+ int (*cancelled)(struct p9_client *, struct p9_req_t *);
+ int (*zc_request)(struct p9_client *, struct p9_req_t *, struct iov_iter *, struct iov_iter *, int, int, int);
+ int (*show_options)(struct seq_file *, struct p9_client *);
+};
+
+struct virtio_device_id {
+ __u32 device;
+ __u32 vendor;
+};
+
+struct virtio_device;
+
+struct virtqueue {
+ struct list_head list;
+ void (*callback)(struct virtqueue *);
+ const char *name;
+ struct virtio_device *vdev;
+ unsigned int index;
+ unsigned int num_free;
+ unsigned int num_max;
+ void *priv;
+ bool reset;
+};
+
+struct vringh_config_ops;
+
+struct virtio_config_ops;
+
+struct virtio_device {
+ int index;
+ bool failed;
+ bool config_enabled;
+ bool config_change_pending;
+ spinlock_t config_lock;
+ spinlock_t vqs_list_lock;
+ struct device dev;
+ struct virtio_device_id id;
+ const struct virtio_config_ops *config;
+ const struct vringh_config_ops *vringh_config;
+ struct list_head vqs;
+ u64 features;
+ void *priv;
+};
+
+typedef void vq_callback_t(struct virtqueue *);
+
+struct virtio_shm_region;
+
+struct virtio_config_ops {
+ void (*get)(struct virtio_device *, unsigned int, void *, unsigned int);
+ void (*set)(struct virtio_device *, unsigned int, const void *, unsigned int);
+ u32 (*generation)(struct virtio_device *);
+ u8 (*get_status)(struct virtio_device *);
+ void (*set_status)(struct virtio_device *, u8);
+ void (*reset)(struct virtio_device *);
+ int (*find_vqs)(struct virtio_device *, unsigned int, struct virtqueue **, vq_callback_t **, const char * const *, const bool *, struct irq_affinity *);
+ void (*del_vqs)(struct virtio_device *);
+ void (*synchronize_cbs)(struct virtio_device *);
+ u64 (*get_features)(struct virtio_device *);
+ int (*finalize_features)(struct virtio_device *);
+ const char * (*bus_name)(struct virtio_device *);
+ int (*set_vq_affinity)(struct virtqueue *, const struct cpumask *);
+ const struct cpumask * (*get_vq_affinity)(struct virtio_device *, int);
+ bool (*get_shm_region)(struct virtio_device *, struct virtio_shm_region *, u8);
+ int (*disable_vq_and_reset)(struct virtqueue *);
+ int (*enable_vq_after_reset)(struct virtqueue *);
+};
+
+struct virtio_driver {
+ struct device_driver driver;
+ const struct virtio_device_id *id_table;
+ const unsigned int *feature_table;
+ unsigned int feature_table_size;
+ const unsigned int *feature_table_legacy;
+ unsigned int feature_table_size_legacy;
+ int (*validate)(struct virtio_device *);
+ int (*probe)(struct virtio_device *);
+ void (*scan)(struct virtio_device *);
+ void (*remove)(struct virtio_device *);
+ void (*config_changed)(struct virtio_device *);
+ int (*freeze)(struct virtio_device *);
+ int (*restore)(struct virtio_device *);
+};
+
+typedef __u16 __virtio16;
+
+struct virtio_shm_region {
+ u64 addr;
+ u64 len;
+};
+
+struct virtio_9p_config {
+ __virtio16 tag_len;
+ __u8 tag[0];
+};
+
+struct virtio_chan {
+ bool inuse;
+ spinlock_t lock;
+ struct p9_client *client;
+ struct virtio_device *vdev;
+ struct virtqueue *vq;
+ int ring_bufs_avail;
+ wait_queue_head_t *vc_wq;
+ long unsigned int p9_max_pages;
+ struct scatterlist sg[128];
+ char *tag;
+ struct list_head chan_list;
+};
+
+enum {
+ Root_NFS = 255,
+ Root_CIFS = 254,
+ Root_RAM0 = 1048576,
+ Root_RAM1 = 1048577,
+ Root_FD0 = 2097152,
+ Root_HDA1 = 3145729,
+ Root_HDA2 = 3145730,
+ Root_SDA1 = 8388609,
+ Root_SDA2 = 8388610,
+ Root_HDC1 = 23068673,
+ Root_SR0 = 11534336,
+};
+
+enum rpc_display_format_t {
+ RPC_DISPLAY_ADDR = 0,
+ RPC_DISPLAY_PORT = 1,
+ RPC_DISPLAY_PROTO = 2,
+ RPC_DISPLAY_HEX_ADDR = 3,
+ RPC_DISPLAY_HEX_PORT = 4,
+ RPC_DISPLAY_NETID = 5,
+ RPC_DISPLAY_MAX = 6,
+};
+
+enum nfs_opnum4 {
+ OP_ACCESS = 3,
+ OP_CLOSE = 4,
+ OP_COMMIT = 5,
+ OP_CREATE = 6,
+ OP_DELEGPURGE = 7,
+ OP_DELEGRETURN = 8,
+ OP_GETATTR = 9,
+ OP_GETFH = 10,
+ OP_LINK = 11,
+ OP_LOCK = 12,
+ OP_LOCKT = 13,
+ OP_LOCKU = 14,
+ OP_LOOKUP = 15,
+ OP_LOOKUPP = 16,
+ OP_NVERIFY = 17,
+ OP_OPEN = 18,
+ OP_OPENATTR = 19,
+ OP_OPEN_CONFIRM = 20,
+ OP_OPEN_DOWNGRADE = 21,
+ OP_PUTFH = 22,
+ OP_PUTPUBFH = 23,
+ OP_PUTROOTFH = 24,
+ OP_READ = 25,
+ OP_READDIR = 26,
+ OP_READLINK = 27,
+ OP_REMOVE = 28,
+ OP_RENAME = 29,
+ OP_RENEW = 30,
+ OP_RESTOREFH = 31,
+ OP_SAVEFH = 32,
+ OP_SECINFO = 33,
+ OP_SETATTR = 34,
+ OP_SETCLIENTID = 35,
+ OP_SETCLIENTID_CONFIRM = 36,
+ OP_VERIFY = 37,
+ OP_WRITE = 38,
+ OP_RELEASE_LOCKOWNER = 39,
+ OP_BACKCHANNEL_CTL = 40,
+ OP_BIND_CONN_TO_SESSION = 41,
+ OP_EXCHANGE_ID = 42,
+ OP_CREATE_SESSION = 43,
+ OP_DESTROY_SESSION = 44,
+ OP_FREE_STATEID = 45,
+ OP_GET_DIR_DELEGATION = 46,
+ OP_GETDEVICEINFO = 47,
+ OP_GETDEVICELIST = 48,
+ OP_LAYOUTCOMMIT = 49,
+ OP_LAYOUTGET = 50,
+ OP_LAYOUTRETURN = 51,
+ OP_SECINFO_NO_NAME = 52,
+ OP_SEQUENCE = 53,
+ OP_SET_SSV = 54,
+ OP_TEST_STATEID = 55,
+ OP_WANT_DELEGATION = 56,
+ OP_DESTROY_CLIENTID = 57,
+ OP_RECLAIM_COMPLETE = 58,
+ OP_ALLOCATE = 59,
+ OP_COPY = 60,
+ OP_COPY_NOTIFY = 61,
+ OP_DEALLOCATE = 62,
+ OP_IO_ADVISE = 63,
+ OP_LAYOUTERROR = 64,
+ OP_LAYOUTSTATS = 65,
+ OP_OFFLOAD_CANCEL = 66,
+ OP_OFFLOAD_STATUS = 67,
+ OP_READ_PLUS = 68,
+ OP_SEEK = 69,
+ OP_WRITE_SAME = 70,
+ OP_CLONE = 71,
+ OP_GETXATTR = 72,
+ OP_SETXATTR = 73,
+ OP_LISTXATTRS = 74,
+ OP_REMOVEXATTR = 75,
+ OP_ILLEGAL = 10044,
+};
+
+struct uuidcmp {
+ const char *uuid;
+ int len;
+};
+
+enum hrtimer_mode {
+ HRTIMER_MODE_ABS = 0,
+ HRTIMER_MODE_REL = 1,
+ HRTIMER_MODE_PINNED = 2,
+ HRTIMER_MODE_SOFT = 4,
+ HRTIMER_MODE_HARD = 8,
+ HRTIMER_MODE_ABS_PINNED = 2,
+ HRTIMER_MODE_REL_PINNED = 3,
+ HRTIMER_MODE_ABS_SOFT = 4,
+ HRTIMER_MODE_REL_SOFT = 5,
+ HRTIMER_MODE_ABS_PINNED_SOFT = 6,
+ HRTIMER_MODE_REL_PINNED_SOFT = 7,
+ HRTIMER_MODE_ABS_HARD = 8,
+ HRTIMER_MODE_REL_HARD = 9,
+ HRTIMER_MODE_ABS_PINNED_HARD = 10,
+ HRTIMER_MODE_REL_PINNED_HARD = 11,
+};
+
+enum tick_dep_bits {
+ TICK_DEP_BIT_POSIX_TIMER = 0,
+ TICK_DEP_BIT_PERF_EVENTS = 1,
+ TICK_DEP_BIT_SCHED = 2,
+ TICK_DEP_BIT_CLOCK_UNSTABLE = 3,
+ TICK_DEP_BIT_RCU = 4,
+ TICK_DEP_BIT_RCU_EXP = 5,
+};
+
+enum perf_event_sample_format {
+ PERF_SAMPLE_IP = 1,
+ PERF_SAMPLE_TID = 2,
+ PERF_SAMPLE_TIME = 4,
+ PERF_SAMPLE_ADDR = 8,
+ PERF_SAMPLE_READ = 16,
+ PERF_SAMPLE_CALLCHAIN = 32,
+ PERF_SAMPLE_ID = 64,
+ PERF_SAMPLE_CPU = 128,
+ PERF_SAMPLE_PERIOD = 256,
+ PERF_SAMPLE_STREAM_ID = 512,
+ PERF_SAMPLE_RAW = 1024,
+ PERF_SAMPLE_BRANCH_STACK = 2048,
+ PERF_SAMPLE_REGS_USER = 4096,
+ PERF_SAMPLE_STACK_USER = 8192,
+ PERF_SAMPLE_WEIGHT = 16384,
+ PERF_SAMPLE_DATA_SRC = 32768,
+ PERF_SAMPLE_IDENTIFIER = 65536,
+ PERF_SAMPLE_TRANSACTION = 131072,
+ PERF_SAMPLE_REGS_INTR = 262144,
+ PERF_SAMPLE_PHYS_ADDR = 524288,
+ PERF_SAMPLE_AUX = 1048576,
+ PERF_SAMPLE_CGROUP = 2097152,
+ PERF_SAMPLE_DATA_PAGE_SIZE = 4194304,
+ PERF_SAMPLE_CODE_PAGE_SIZE = 8388608,
+ PERF_SAMPLE_WEIGHT_STRUCT = 16777216,
+ PERF_SAMPLE_MAX = 33554432,
+};
+
+enum perf_branch_sample_type {
+ PERF_SAMPLE_BRANCH_USER = 1,
+ PERF_SAMPLE_BRANCH_KERNEL = 2,
+ PERF_SAMPLE_BRANCH_HV = 4,
+ PERF_SAMPLE_BRANCH_ANY = 8,
+ PERF_SAMPLE_BRANCH_ANY_CALL = 16,
+ PERF_SAMPLE_BRANCH_ANY_RETURN = 32,
+ PERF_SAMPLE_BRANCH_IND_CALL = 64,
+ PERF_SAMPLE_BRANCH_ABORT_TX = 128,
+ PERF_SAMPLE_BRANCH_IN_TX = 256,
+ PERF_SAMPLE_BRANCH_NO_TX = 512,
+ PERF_SAMPLE_BRANCH_COND = 1024,
+ PERF_SAMPLE_BRANCH_CALL_STACK = 2048,
+ PERF_SAMPLE_BRANCH_IND_JUMP = 4096,
+ PERF_SAMPLE_BRANCH_CALL = 8192,
+ PERF_SAMPLE_BRANCH_NO_FLAGS = 16384,
+ PERF_SAMPLE_BRANCH_NO_CYCLES = 32768,
+ PERF_SAMPLE_BRANCH_TYPE_SAVE = 65536,
+ PERF_SAMPLE_BRANCH_HW_INDEX = 131072,
+ PERF_SAMPLE_BRANCH_PRIV_SAVE = 262144,
+ PERF_SAMPLE_BRANCH_MAX = 524288,
+};
+
+enum perf_sample_regs_abi {
+ PERF_SAMPLE_REGS_ABI_NONE = 0,
+ PERF_SAMPLE_REGS_ABI_32 = 1,
+ PERF_SAMPLE_REGS_ABI_64 = 2,
+};
+
+enum perf_event_read_format {
+ PERF_FORMAT_TOTAL_TIME_ENABLED = 1,
+ PERF_FORMAT_TOTAL_TIME_RUNNING = 2,
+ PERF_FORMAT_ID = 4,
+ PERF_FORMAT_GROUP = 8,
+ PERF_FORMAT_LOST = 16,
+ PERF_FORMAT_MAX = 32,
+};
+
+enum perf_event_ioc_flags {
+ PERF_IOC_FLAG_GROUP = 1,
+};
+
+struct perf_event_mmap_page {
+ __u32 version;
+ __u32 compat_version;
+ __u32 lock;
+ __u32 index;
+ __s64 offset;
+ __u64 time_enabled;
+ __u64 time_running;
+ union {
+ __u64 capabilities;
+ struct {
+ __u64 cap_bit0: 1;
+ __u64 cap_bit0_is_deprecated: 1;
+ __u64 cap_user_rdpmc: 1;
+ __u64 cap_user_time: 1;
+ __u64 cap_user_time_zero: 1;
+ __u64 cap_user_time_short: 1;
+ __u64 cap_____res: 58;
+ };
+ };
+ __u16 pmc_width;
+ __u16 time_shift;
+ __u32 time_mult;
+ __u64 time_offset;
+ __u64 time_zero;
+ __u32 size;
+ __u32 __reserved_1;
+ __u64 time_cycles;
+ __u64 time_mask;
+ __u8 __reserved[928];
+ __u64 data_head;
+ __u64 data_tail;
+ __u64 data_offset;
+ __u64 data_size;
+ __u64 aux_head;
+ __u64 aux_tail;
+ __u64 aux_offset;
+ __u64 aux_size;
+};
+
+struct perf_event_header {
+ __u32 type;
+ __u16 misc;
+ __u16 size;
+};
+
+struct perf_ns_link_info {
+ __u64 dev;
+ __u64 ino;
+};
+
+enum {
+ NET_NS_INDEX = 0,
+ UTS_NS_INDEX = 1,
+ IPC_NS_INDEX = 2,
+ PID_NS_INDEX = 3,
+ USER_NS_INDEX = 4,
+ MNT_NS_INDEX = 5,
+ CGROUP_NS_INDEX = 6,
+ NR_NAMESPACES = 7,
+};
+
+enum perf_event_type {
+ PERF_RECORD_MMAP = 1,
+ PERF_RECORD_LOST = 2,
+ PERF_RECORD_COMM = 3,
+ PERF_RECORD_EXIT = 4,
+ PERF_RECORD_THROTTLE = 5,
+ PERF_RECORD_UNTHROTTLE = 6,
+ PERF_RECORD_FORK = 7,
+ PERF_RECORD_READ = 8,
+ PERF_RECORD_SAMPLE = 9,
+ PERF_RECORD_MMAP2 = 10,
+ PERF_RECORD_AUX = 11,
+ PERF_RECORD_ITRACE_START = 12,
+ PERF_RECORD_LOST_SAMPLES = 13,
+ PERF_RECORD_SWITCH = 14,
+ PERF_RECORD_SWITCH_CPU_WIDE = 15,
+ PERF_RECORD_NAMESPACES = 16,
+ PERF_RECORD_KSYMBOL = 17,
+ PERF_RECORD_BPF_EVENT = 18,
+ PERF_RECORD_CGROUP = 19,
+ PERF_RECORD_TEXT_POKE = 20,
+ PERF_RECORD_AUX_OUTPUT_HW_ID = 21,
+ PERF_RECORD_MAX = 22,
+};
+
+enum perf_record_ksymbol_type {
+ PERF_RECORD_KSYMBOL_TYPE_UNKNOWN = 0,
+ PERF_RECORD_KSYMBOL_TYPE_BPF = 1,
+ PERF_RECORD_KSYMBOL_TYPE_OOL = 2,
+ PERF_RECORD_KSYMBOL_TYPE_MAX = 3,
+};
+
+enum perf_bpf_event_type {
+ PERF_BPF_EVENT_UNKNOWN = 0,
+ PERF_BPF_EVENT_PROG_LOAD = 1,
+ PERF_BPF_EVENT_PROG_UNLOAD = 2,
+ PERF_BPF_EVENT_MAX = 3,
+};
+
+typedef struct pt_regs bpf_user_pt_regs_t;
+
+enum perf_event_x86_regs {
+ PERF_REG_X86_AX = 0,
+ PERF_REG_X86_BX = 1,
+ PERF_REG_X86_CX = 2,
+ PERF_REG_X86_DX = 3,
+ PERF_REG_X86_SI = 4,
+ PERF_REG_X86_DI = 5,
+ PERF_REG_X86_BP = 6,
+ PERF_REG_X86_SP = 7,
+ PERF_REG_X86_IP = 8,
+ PERF_REG_X86_FLAGS = 9,
+ PERF_REG_X86_CS = 10,
+ PERF_REG_X86_SS = 11,
+ PERF_REG_X86_DS = 12,
+ PERF_REG_X86_ES = 13,
+ PERF_REG_X86_FS = 14,
+ PERF_REG_X86_GS = 15,
+ PERF_REG_X86_R8 = 16,
+ PERF_REG_X86_R9 = 17,
+ PERF_REG_X86_R10 = 18,
+ PERF_REG_X86_R11 = 19,
+ PERF_REG_X86_R12 = 20,
+ PERF_REG_X86_R13 = 21,
+ PERF_REG_X86_R14 = 22,
+ PERF_REG_X86_R15 = 23,
+ PERF_REG_X86_32_MAX = 16,
+ PERF_REG_X86_64_MAX = 24,
+ PERF_REG_X86_XMM0 = 32,
+ PERF_REG_X86_XMM1 = 34,
+ PERF_REG_X86_XMM2 = 36,
+ PERF_REG_X86_XMM3 = 38,
+ PERF_REG_X86_XMM4 = 40,
+ PERF_REG_X86_XMM5 = 42,
+ PERF_REG_X86_XMM6 = 44,
+ PERF_REG_X86_XMM7 = 46,
+ PERF_REG_X86_XMM8 = 48,
+ PERF_REG_X86_XMM9 = 50,
+ PERF_REG_X86_XMM10 = 52,
+ PERF_REG_X86_XMM11 = 54,
+ PERF_REG_X86_XMM12 = 56,
+ PERF_REG_X86_XMM13 = 58,
+ PERF_REG_X86_XMM14 = 60,
+ PERF_REG_X86_XMM15 = 62,
+ PERF_REG_X86_XMM_MAX = 64,
+};
+
+enum perf_addr_filter_action_t {
+ PERF_ADDR_FILTER_ACTION_STOP = 0,
+ PERF_ADDR_FILTER_ACTION_START = 1,
+ PERF_ADDR_FILTER_ACTION_FILTER = 2,
+};
+
+struct perf_addr_filter {
+ struct list_head entry;
+ struct path path;
+ long unsigned int offset;
+ long unsigned int size;
+ enum perf_addr_filter_action_t action;
+};
+
+struct swevent_hlist {
+ struct hlist_head heads[256];
+ struct callback_head callback_head;
+};
+
+struct pmu_event_list {
+ raw_spinlock_t lock;
+ struct list_head list;
+};
+
+struct perf_buffer {
+ refcount_t refcount;
+ struct callback_head callback_head;
+ int nr_pages;
+ int overwrite;
+ int paused;
+ atomic_t poll;
+ local_t head;
+ unsigned int nest;
+ local_t events;
+ local_t wakeup;
+ local_t lost;
+ long int watermark;
+ long int aux_watermark;
+ spinlock_t event_lock;
+ struct list_head event_list;
+ atomic_t mmap_count;
+ long unsigned int mmap_locked;
+ struct user_struct *mmap_user;
+ long int aux_head;
+ unsigned int aux_nest;
+ long int aux_wakeup;
+ long unsigned int aux_pgoff;
+ int aux_nr_pages;
+ int aux_overwrite;
+ atomic_t aux_mmap_count;
+ long unsigned int aux_mmap_locked;
+ void (*free_aux)(void *);
+ refcount_t aux_refcount;
+ int aux_in_sampling;
+ void **aux_pages;
+ void *aux_priv;
+ struct perf_event_mmap_page *user_page;
+ void *data_pages[0];
+};
+
+struct bpf_perf_event_data_kern {
+ bpf_user_pt_regs_t *regs;
+ struct perf_sample_data *data;
+ struct perf_event *event;
+};
+
+struct perf_pmu_events_attr {
+ struct device_attribute attr;
+ u64 id;
+ const char *event_str;
+};
+
+struct match_token {
+ int token;
+ const char *pattern;
+};
+
+enum {
+ MAX_OPT_ARGS = 3,
+};
+
+typedef struct {
+ char *from;
+ char *to;
+} substring_t;
+
+struct min_heap {
+ void *data;
+ int nr;
+ int size;
+};
+
+struct min_heap_callbacks {
+ int elem_size;
+ bool (*less)(const void *, const void *);
+ void (*swp)(void *, void *);
+};
+
+typedef void (*task_work_func_t)(struct callback_head *);
+
+enum task_work_notify_mode {
+ TWA_NONE = 0,
+ TWA_RESUME = 1,
+ TWA_SIGNAL = 2,
+ TWA_SIGNAL_NO_IPI = 3,
+};
+
+typedef int (*remote_function_f)(void *);
+
+struct remote_function_call {
+ struct task_struct *p;
+ remote_function_f func;
+ void *info;
+ int ret;
+};
+
+typedef void (*event_f)(struct perf_event *, struct perf_cpu_context *, struct perf_event_context *, void *);
+
+struct event_function_struct {
+ struct perf_event *event;
+ event_f func;
+ void *data;
+};
+
+enum event_type_t {
+ EVENT_FLEXIBLE = 1,
+ EVENT_PINNED = 2,
+ EVENT_TIME = 4,
+ EVENT_CPU = 8,
+ EVENT_ALL = 3,
+};
+
+struct __group_key {
+ int cpu;
+ struct cgroup *cgroup;
+};
+
+struct stop_event_data {
+ struct perf_event *event;
+ unsigned int restart;
+};
+
+struct perf_read_data {
+ struct perf_event *event;
+ bool group;
+ int ret;
+};
+
+struct perf_read_event {
+ struct perf_event_header header;
+ u32 pid;
+ u32 tid;
+};
+
+typedef void perf_iterate_f(struct perf_event *, void *);
+
+struct remote_output {
+ struct perf_buffer *rb;
+ int err;
+};
+
+struct perf_task_event {
+ struct task_struct *task;
+ struct perf_event_context *task_ctx;
+ struct {
+ struct perf_event_header header;
+ u32 pid;
+ u32 ppid;
+ u32 tid;
+ u32 ptid;
+ u64 time;
+ } event_id;
+};
+
+struct perf_comm_event {
+ struct task_struct *task;
+ char *comm;
+ int comm_size;
+ struct {
+ struct perf_event_header header;
+ u32 pid;
+ u32 tid;
+ } event_id;
+};
+
+struct perf_namespaces_event {
+ struct task_struct *task;
+ struct {
+ struct perf_event_header header;
+ u32 pid;
+ u32 tid;
+ u64 nr_namespaces;
+ struct perf_ns_link_info link_info[7];
+ } event_id;
+};
+
+struct perf_cgroup_event {
+ char *path;
+ int path_size;
+ struct {
+ struct perf_event_header header;
+ u64 id;
+ char path[0];
+ } event_id;
+};
+
+struct perf_mmap_event {
+ struct vm_area_struct *vma;
+ const char *file_name;
+ int file_size;
+ int maj;
+ int min;
+ u64 ino;
+ u64 ino_generation;
+ u32 prot;
+ u32 flags;
+ u8 build_id[20];
+ u32 build_id_size;
+ struct {
+ struct perf_event_header header;
+ u32 pid;
+ u32 tid;
+ u64 start;
+ u64 len;
+ u64 pgoff;
+ } event_id;
+};
+
+struct perf_switch_event {
+ struct task_struct *task;
+ struct task_struct *next_prev;
+ struct {
+ struct perf_event_header header;
+ u32 next_prev_pid;
+ u32 next_prev_tid;
+ } event_id;
+};
+
+struct perf_ksymbol_event {
+ const char *name;
+ int name_len;
+ struct {
+ struct perf_event_header header;
+ u64 addr;
+ u32 len;
+ u16 ksym_type;
+ u16 flags;
+ } event_id;
+};
+
+struct perf_bpf_event {
+ struct bpf_prog *prog;
+ struct {
+ struct perf_event_header header;
+ u16 type;
+ u16 flags;
+ u32 id;
+ u8 tag[8];
+ } event_id;
+};
+
+struct perf_text_poke_event {
+ const void *old_bytes;
+ const void *new_bytes;
+ size_t pad;
+ u16 old_len;
+ u16 new_len;
+ struct {
+ struct perf_event_header header;
+ u64 addr;
+ } event_id;
+};
+
+struct swevent_htable {
+ struct swevent_hlist *swevent_hlist;
+ struct mutex hlist_mutex;
+ int hlist_refcount;
+ int recursion[4];
+};
+
+enum perf_probe_config {
+ PERF_PROBE_CONFIG_IS_RETPROBE = 1,
+ PERF_UPROBE_REF_CTR_OFFSET_BITS = 32,
+ PERF_UPROBE_REF_CTR_OFFSET_SHIFT = 32,
+};
+
+enum {
+ IF_ACT_NONE = -1,
+ IF_ACT_FILTER = 0,
+ IF_ACT_START = 1,
+ IF_ACT_STOP = 2,
+ IF_SRC_FILE = 3,
+ IF_SRC_KERNEL = 4,
+ IF_SRC_FILEADDR = 5,
+ IF_SRC_KERNELADDR = 6,
+};
+
+enum {
+ IF_STATE_ACTION = 0,
+ IF_STATE_SOURCE = 1,
+ IF_STATE_END = 2,
+};
+
+struct perf_aux_event {
+ struct perf_event_header header;
+ u64 hw_id;
+};
+
+struct perf_aux_event___2 {
+ struct perf_event_header header;
+ u32 pid;
+ u32 tid;
+};
+
+struct perf_aux_event___3 {
+ struct perf_event_header header;
+ u64 offset;
+ u64 size;
+ u64 flags;
+};
+
+typedef acpi_status (*acpi_exception_handler)(acpi_status, acpi_name, u16, u32, void *);
+
+struct acpi_name_info {
+ char name[4];
+ u16 argument_list;
+ u8 expected_btypes;
+} __attribute__((packed));
+
+struct acpi_package_info {
+ u8 type;
+ u8 object_type1;
+ u8 count1;
+ u8 object_type2;
+ u8 count2;
+ u16 reserved;
+} __attribute__((packed));
+
+struct acpi_package_info2 {
+ u8 type;
+ u8 count;
+ u8 object_type[4];
+ u8 reserved;
+};
+
+struct acpi_package_info3 {
+ u8 type;
+ u8 count;
+ u8 object_type[2];
+ u8 tail_object_type;
+ u16 reserved;
+} __attribute__((packed));
+
+struct acpi_package_info4 {
+ u8 type;
+ u8 object_type1;
+ u8 count1;
+ u8 sub_object_types;
+ u8 pkg_count;
+ u16 reserved;
+} __attribute__((packed));
+
+union acpi_predefined_info {
+ struct acpi_name_info info;
+ struct acpi_package_info ret_info;
+ struct acpi_package_info2 ret_info2;
+ struct acpi_package_info3 ret_info3;
+ struct acpi_package_info4 ret_info4;
+};
+
+struct acpi_evaluate_info {
+ struct acpi_namespace_node *prefix_node;
+ const char *relative_pathname;
+ union acpi_operand_object **parameters;
+ struct acpi_namespace_node *node;
+ union acpi_operand_object *obj_desc;
+ char *full_pathname;
+ const union acpi_predefined_info *predefined;
+ union acpi_operand_object *return_object;
+ union acpi_operand_object *parent_package;
+ u32 return_flags;
+ u32 return_btype;
+ u16 param_count;
+ u16 node_flags;
+ u8 pass_number;
+ u8 return_object_type;
+ u8 flags;
+};
+
+typedef u16 acpi_rs_length;
+
+enum {
+ ACPI_REFCLASS_LOCAL = 0,
+ ACPI_REFCLASS_ARG = 1,
+ ACPI_REFCLASS_REFOF = 2,
+ ACPI_REFCLASS_INDEX = 3,
+ ACPI_REFCLASS_TABLE = 4,
+ ACPI_REFCLASS_NAME = 5,
+ ACPI_REFCLASS_DEBUG = 6,
+ ACPI_REFCLASS_MAX = 6,
+};
+
+struct aml_resource_small_header {
+ u8 descriptor_type;
+};
+
+struct aml_resource_irq {
+ u8 descriptor_type;
+ u16 irq_mask;
+ u8 flags;
+} __attribute__((packed));
+
+struct aml_resource_dma {
+ u8 descriptor_type;
+ u8 dma_channel_mask;
+ u8 flags;
+};
+
+struct aml_resource_start_dependent {
+ u8 descriptor_type;
+ u8 flags;
+};
+
+struct aml_resource_end_dependent {
+ u8 descriptor_type;
+};
+
+struct aml_resource_io {
+ u8 descriptor_type;
+ u8 flags;
+ u16 minimum;
+ u16 maximum;
+ u8 alignment;
+ u8 address_length;
+};
+
+struct aml_resource_fixed_io {
+ u8 descriptor_type;
+ u16 address;
+ u8 address_length;
+} __attribute__((packed));
+
+struct aml_resource_vendor_small {
+ u8 descriptor_type;
+};
+
+struct aml_resource_end_tag {
+ u8 descriptor_type;
+ u8 checksum;
+};
+
+struct aml_resource_fixed_dma {
+ u8 descriptor_type;
+ u16 request_lines;
+ u16 channels;
+ u8 width;
+} __attribute__((packed));
+
+struct aml_resource_large_header {
+ u8 descriptor_type;
+ u16 resource_length;
+} __attribute__((packed));
+
+struct aml_resource_memory24 {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 flags;
+ u16 minimum;
+ u16 maximum;
+ u16 alignment;
+ u16 address_length;
+} __attribute__((packed));
+
+struct aml_resource_vendor_large {
+ u8 descriptor_type;
+ u16 resource_length;
+} __attribute__((packed));
+
+struct aml_resource_memory32 {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 flags;
+ u32 minimum;
+ u32 maximum;
+ u32 alignment;
+ u32 address_length;
+} __attribute__((packed));
+
+struct aml_resource_fixed_memory32 {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 flags;
+ u32 address;
+ u32 address_length;
+} __attribute__((packed));
+
+struct aml_resource_address {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 resource_type;
+ u8 flags;
+ u8 specific_flags;
+} __attribute__((packed));
+
+struct aml_resource_extended_address64 {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 resource_type;
+ u8 flags;
+ u8 specific_flags;
+ u8 revision_ID;
+ u8 reserved;
+ u64 granularity;
+ u64 minimum;
+ u64 maximum;
+ u64 translation_offset;
+ u64 address_length;
+ u64 type_specific;
+} __attribute__((packed));
+
+struct aml_resource_address64 {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 resource_type;
+ u8 flags;
+ u8 specific_flags;
+ u64 granularity;
+ u64 minimum;
+ u64 maximum;
+ u64 translation_offset;
+ u64 address_length;
+} __attribute__((packed));
+
+struct aml_resource_address32 {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 resource_type;
+ u8 flags;
+ u8 specific_flags;
+ u32 granularity;
+ u32 minimum;
+ u32 maximum;
+ u32 translation_offset;
+ u32 address_length;
+} __attribute__((packed));
+
+struct aml_resource_address16 {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 resource_type;
+ u8 flags;
+ u8 specific_flags;
+ u16 granularity;
+ u16 minimum;
+ u16 maximum;
+ u16 translation_offset;
+ u16 address_length;
+} __attribute__((packed));
+
+struct aml_resource_extended_irq {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 flags;
+ u8 interrupt_count;
+ u32 interrupts[1];
+} __attribute__((packed));
+
+struct aml_resource_generic_register {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 address_space_id;
+ u8 bit_width;
+ u8 bit_offset;
+ u8 access_size;
+ u64 address;
+} __attribute__((packed));
+
+struct aml_resource_gpio {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 revision_id;
+ u8 connection_type;
+ u16 flags;
+ u16 int_flags;
+ u8 pin_config;
+ u16 drive_strength;
+ u16 debounce_timeout;
+ u16 pin_table_offset;
+ u8 res_source_index;
+ u16 res_source_offset;
+ u16 vendor_offset;
+ u16 vendor_length;
+} __attribute__((packed));
+
+struct aml_resource_common_serialbus {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 revision_id;
+ u8 res_source_index;
+ u8 type;
+ u8 flags;
+ u16 type_specific_flags;
+ u8 type_revision_id;
+ u16 type_data_length;
+} __attribute__((packed));
+
+struct aml_resource_csi2_serialbus {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 revision_id;
+ u8 res_source_index;
+ u8 type;
+ u8 flags;
+ u16 type_specific_flags;
+ u8 type_revision_id;
+ u16 type_data_length;
+} __attribute__((packed));
+
+struct aml_resource_i2c_serialbus {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 revision_id;
+ u8 res_source_index;
+ u8 type;
+ u8 flags;
+ u16 type_specific_flags;
+ u8 type_revision_id;
+ u16 type_data_length;
+ u32 connection_speed;
+ u16 slave_address;
+} __attribute__((packed));
+
+struct aml_resource_spi_serialbus {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 revision_id;
+ u8 res_source_index;
+ u8 type;
+ u8 flags;
+ u16 type_specific_flags;
+ u8 type_revision_id;
+ u16 type_data_length;
+ u32 connection_speed;
+ u8 data_bit_length;
+ u8 clock_phase;
+ u8 clock_polarity;
+ u16 device_selection;
+} __attribute__((packed));
+
+struct aml_resource_uart_serialbus {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 revision_id;
+ u8 res_source_index;
+ u8 type;
+ u8 flags;
+ u16 type_specific_flags;
+ u8 type_revision_id;
+ u16 type_data_length;
+ u32 default_baud_rate;
+ u16 rx_fifo_size;
+ u16 tx_fifo_size;
+ u8 parity;
+ u8 lines_enabled;
+} __attribute__((packed));
+
+struct aml_resource_pin_function {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 revision_id;
+ u16 flags;
+ u8 pin_config;
+ u16 function_number;
+ u16 pin_table_offset;
+ u8 res_source_index;
+ u16 res_source_offset;
+ u16 vendor_offset;
+ u16 vendor_length;
+} __attribute__((packed));
+
+struct aml_resource_pin_config {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 revision_id;
+ u16 flags;
+ u8 pin_config_type;
+ u32 pin_config_value;
+ u16 pin_table_offset;
+ u8 res_source_index;
+ u16 res_source_offset;
+ u16 vendor_offset;
+ u16 vendor_length;
+} __attribute__((packed));
+
+struct aml_resource_pin_group {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 revision_id;
+ u16 flags;
+ u16 pin_table_offset;
+ u16 label_offset;
+ u16 vendor_offset;
+ u16 vendor_length;
+} __attribute__((packed));
+
+struct aml_resource_pin_group_function {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 revision_id;
+ u16 flags;
+ u16 function_number;
+ u8 res_source_index;
+ u16 res_source_offset;
+ u16 res_source_label_offset;
+ u16 vendor_offset;
+ u16 vendor_length;
+} __attribute__((packed));
+
+struct aml_resource_pin_group_config {
+ u8 descriptor_type;
+ u16 resource_length;
+ u8 revision_id;
+ u16 flags;
+ u8 pin_config_type;
+ u32 pin_config_value;
+ u8 res_source_index;
+ u16 res_source_offset;
+ u16 res_source_label_offset;
+ u16 vendor_offset;
+ u16 vendor_length;
+} __attribute__((packed));
+
+union aml_resource {
+ u8 descriptor_type;
+ struct aml_resource_small_header small_header;
+ struct aml_resource_large_header large_header;
+ struct aml_resource_irq irq;
+ struct aml_resource_dma dma;
+ struct aml_resource_start_dependent start_dpf;
+ struct aml_resource_end_dependent end_dpf;
+ struct aml_resource_io io;
+ struct aml_resource_fixed_io fixed_io;
+ struct aml_resource_fixed_dma fixed_dma;
+ struct aml_resource_vendor_small vendor_small;
+ struct aml_resource_end_tag end_tag;
+ struct aml_resource_memory24 memory24;
+ struct aml_resource_generic_register generic_reg;
+ struct aml_resource_vendor_large vendor_large;
+ struct aml_resource_memory32 memory32;
+ struct aml_resource_fixed_memory32 fixed_memory32;
+ struct aml_resource_address16 address16;
+ struct aml_resource_address32 address32;
+ struct aml_resource_address64 address64;
+ struct aml_resource_extended_address64 ext_address64;
+ struct aml_resource_extended_irq extended_irq;
+ struct aml_resource_gpio gpio;
+ struct aml_resource_i2c_serialbus i2c_serial_bus;
+ struct aml_resource_spi_serialbus spi_serial_bus;
+ struct aml_resource_uart_serialbus uart_serial_bus;
+ struct aml_resource_csi2_serialbus csi2_serial_bus;
+ struct aml_resource_common_serialbus common_serial_bus;
+ struct aml_resource_pin_function pin_function;
+ struct aml_resource_pin_config pin_config;
+ struct aml_resource_pin_group pin_group;
+ struct aml_resource_pin_group_function pin_group_function;
+ struct aml_resource_pin_group_config pin_group_config;
+ struct aml_resource_address address;
+ u32 dword_item;
+ u16 word_item;
+ u8 byte_item;
+};
+
+enum hash_algo {
+ HASH_ALGO_MD4 = 0,
+ HASH_ALGO_MD5 = 1,
+ HASH_ALGO_SHA1 = 2,
+ HASH_ALGO_RIPE_MD_160 = 3,
+ HASH_ALGO_SHA256 = 4,
+ HASH_ALGO_SHA384 = 5,
+ HASH_ALGO_SHA512 = 6,
+ HASH_ALGO_SHA224 = 7,
+ HASH_ALGO_RIPE_MD_128 = 8,
+ HASH_ALGO_RIPE_MD_256 = 9,
+ HASH_ALGO_RIPE_MD_320 = 10,
+ HASH_ALGO_WP_256 = 11,
+ HASH_ALGO_WP_384 = 12,
+ HASH_ALGO_WP_512 = 13,
+ HASH_ALGO_TGR_128 = 14,
+ HASH_ALGO_TGR_160 = 15,
+ HASH_ALGO_TGR_192 = 16,
+ HASH_ALGO_SM3_256 = 17,
+ HASH_ALGO_STREEBOG_256 = 18,
+ HASH_ALGO_STREEBOG_512 = 19,
+ HASH_ALGO__LAST = 20,
+};
+
+struct tpm_digest {
+ u16 alg_id;
+ u8 digest[64];
+};
+
+enum TPM_OPS_FLAGS {
+ TPM_OPS_AUTO_STARTUP = 1,
+};
+
+enum tpm_duration {
+ TPM_SHORT = 0,
+ TPM_MEDIUM = 1,
+ TPM_LONG = 2,
+ TPM_LONG_LONG = 3,
+ TPM_UNDEFINED = 4,
+ TPM_NUM_DURATIONS = 4,
+};
+
+enum tpm2_timeouts {
+ TPM2_TIMEOUT_A = 750,
+ TPM2_TIMEOUT_B = 2000,
+ TPM2_TIMEOUT_C = 200,
+ TPM2_TIMEOUT_D = 30,
+ TPM2_DURATION_SHORT = 20,
+ TPM2_DURATION_MEDIUM = 750,
+ TPM2_DURATION_LONG = 2000,
+ TPM2_DURATION_LONG_LONG = 300000,
+ TPM2_DURATION_DEFAULT = 120000,
+};
+
+enum tpm2_return_codes {
+ TPM2_RC_SUCCESS = 0,
+ TPM2_RC_HASH = 131,
+ TPM2_RC_HANDLE = 139,
+ TPM2_RC_INITIALIZE = 256,
+ TPM2_RC_FAILURE = 257,
+ TPM2_RC_DISABLED = 288,
+ TPM2_RC_UPGRADE = 301,
+ TPM2_RC_COMMAND_CODE = 323,
+ TPM2_RC_TESTING = 2314,
+ TPM2_RC_REFERENCE_H0 = 2320,
+ TPM2_RC_RETRY = 2338,
+};
+
+enum tpm2_command_codes {
+ TPM2_CC_FIRST = 287,
+ TPM2_CC_HIERARCHY_CONTROL = 289,
+ TPM2_CC_HIERARCHY_CHANGE_AUTH = 297,
+ TPM2_CC_CREATE_PRIMARY = 305,
+ TPM2_CC_SEQUENCE_COMPLETE = 318,
+ TPM2_CC_SELF_TEST = 323,
+ TPM2_CC_STARTUP = 324,
+ TPM2_CC_SHUTDOWN = 325,
+ TPM2_CC_NV_READ = 334,
+ TPM2_CC_CREATE = 339,
+ TPM2_CC_LOAD = 343,
+ TPM2_CC_SEQUENCE_UPDATE = 348,
+ TPM2_CC_UNSEAL = 350,
+ TPM2_CC_CONTEXT_LOAD = 353,
+ TPM2_CC_CONTEXT_SAVE = 354,
+ TPM2_CC_FLUSH_CONTEXT = 357,
+ TPM2_CC_VERIFY_SIGNATURE = 375,
+ TPM2_CC_GET_CAPABILITY = 378,
+ TPM2_CC_GET_RANDOM = 379,
+ TPM2_CC_PCR_READ = 382,
+ TPM2_CC_PCR_EXTEND = 386,
+ TPM2_CC_EVENT_SEQUENCE_COMPLETE = 389,
+ TPM2_CC_HASH_SEQUENCE_START = 390,
+ TPM2_CC_CREATE_LOADED = 401,
+ TPM2_CC_LAST = 403,
+};
+
+enum tpm2_startup_types {
+ TPM2_SU_CLEAR = 0,
+ TPM2_SU_STATE = 1,
+};
+
+struct tpm_header {
+ __be16 tag;
+ __be32 length;
+ union {
+ __be32 ordinal;
+ __be32 return_code;
+ };
+} __attribute__((packed));
+
+struct tpm_buf {
+ unsigned int flags;
+ u8 *data;
+};
+
+enum tpm_timeout {
+ TPM_TIMEOUT = 5,
+ TPM_TIMEOUT_RETRY = 100,
+ TPM_TIMEOUT_RANGE_US = 300,
+ TPM_TIMEOUT_POLL = 1,
+ TPM_TIMEOUT_USECS_MIN = 100,
+ TPM_TIMEOUT_USECS_MAX = 500,
+};
+
+struct reciprocal_value {
+ u32 m;
+ u8 sh1;
+ u8 sh2;
+};
+
+struct mac_addr {
+ u8 mac_addr_value[6];
+};
+
+enum {
+ BOND_AD_STABLE = 0,
+ BOND_AD_BANDWIDTH = 1,
+ BOND_AD_COUNT = 2,
+};
+
+typedef enum {
+ AD_RX_DUMMY = 0,
+ AD_RX_INITIALIZE = 1,
+ AD_RX_PORT_DISABLED = 2,
+ AD_RX_LACP_DISABLED = 3,
+ AD_RX_EXPIRED = 4,
+ AD_RX_DEFAULTED = 5,
+ AD_RX_CURRENT = 6,
+} rx_states_t;
+
+typedef enum {
+ AD_PERIODIC_DUMMY = 0,
+ AD_NO_PERIODIC = 1,
+ AD_FAST_PERIODIC = 2,
+ AD_SLOW_PERIODIC = 3,
+ AD_PERIODIC_TX = 4,
+} periodic_states_t;
+
+typedef enum {
+ AD_MUX_DUMMY = 0,
+ AD_MUX_DETACHED = 1,
+ AD_MUX_WAITING = 2,
+ AD_MUX_ATTACHED = 3,
+ AD_MUX_COLLECTING_DISTRIBUTING = 4,
+} mux_states_t;
+
+typedef enum {
+ AD_TX_DUMMY = 0,
+ AD_TRANSMIT = 1,
+} tx_states_t;
+
+typedef enum {
+ AD_CHURN_MONITOR = 0,
+ AD_CHURN = 1,
+ AD_NO_CHURN = 2,
+} churn_state_t;
+
+struct lacpdu {
+ u8 subtype;
+ u8 version_number;
+ u8 tlv_type_actor_info;
+ u8 actor_information_length;
+ __be16 actor_system_priority;
+ struct mac_addr actor_system;
+ __be16 actor_key;
+ __be16 actor_port_priority;
+ __be16 actor_port;
+ u8 actor_state;
+ u8 reserved_3_1[3];
+ u8 tlv_type_partner_info;
+ u8 partner_information_length;
+ __be16 partner_system_priority;
+ struct mac_addr partner_system;
+ __be16 partner_key;
+ __be16 partner_port_priority;
+ __be16 partner_port;
+ u8 partner_state;
+ u8 reserved_3_2[3];
+ u8 tlv_type_collector_info;
+ u8 collector_information_length;
+ __be16 collector_max_delay;
+ u8 reserved_12[12];
+ u8 tlv_type_terminator;
+ u8 terminator_length;
+ u8 reserved_50[50];
+};
+
+struct bond_3ad_stats {
+ atomic64_t lacpdu_rx;
+ atomic64_t lacpdu_tx;
+ atomic64_t lacpdu_unknown_rx;
+ atomic64_t lacpdu_illegal_rx;
+ atomic64_t marker_rx;
+ atomic64_t marker_tx;
+ atomic64_t marker_resp_rx;
+ atomic64_t marker_resp_tx;
+ atomic64_t marker_unknown_rx;
+};
+
+struct port;
+
+struct slave;
+
+struct aggregator {
+ struct mac_addr aggregator_mac_address;
+ u16 aggregator_identifier;
+ bool is_individual;
+ u16 actor_admin_aggregator_key;
+ u16 actor_oper_aggregator_key;
+ struct mac_addr partner_system;
+ u16 partner_system_priority;
+ u16 partner_oper_aggregator_key;
+ u16 receive_state;
+ u16 transmit_state;
+ struct port *lag_ports;
+ struct slave *slave;
+ u16 is_active;
+ u16 num_of_ports;
+};
+
+struct port_params {
+ struct mac_addr system;
+ u16 system_priority;
+ u16 key;
+ u16 port_number;
+ u16 port_priority;
+ u16 port_state;
+};
+
+struct port {
+ u16 actor_port_number;
+ u16 actor_port_priority;
+ struct mac_addr actor_system;
+ u16 actor_system_priority;
+ u16 actor_port_aggregator_identifier;
+ bool ntt;
+ u16 actor_admin_port_key;
+ u16 actor_oper_port_key;
+ u8 actor_admin_port_state;
+ u8 actor_oper_port_state;
+ struct port_params partner_admin;
+ struct port_params partner_oper;
+ bool is_enabled;
+ u16 sm_vars;
+ rx_states_t sm_rx_state;
+ u16 sm_rx_timer_counter;
+ periodic_states_t sm_periodic_state;
+ u16 sm_periodic_timer_counter;
+ mux_states_t sm_mux_state;
+ u16 sm_mux_timer_counter;
+ tx_states_t sm_tx_state;
+ u16 sm_tx_timer_counter;
+ u16 sm_churn_actor_timer_counter;
+ u16 sm_churn_partner_timer_counter;
+ u32 churn_actor_count;
+ u32 churn_partner_count;
+ churn_state_t sm_churn_actor_state;
+ churn_state_t sm_churn_partner_state;
+ struct slave *slave;
+ struct aggregator *aggregator;
+ struct port *next_port_in_aggregator;
+ u32 transaction_id;
+ struct lacpdu lacpdu;
+};
+
+struct tlb_slave_info {
+ u32 head;
+ u32 load;
+};
+
+struct bonding;
+
+struct ad_slave_info;
+
+struct slave {
+ struct net_device *dev;
+ struct bonding *bond;
+ int delay;
+ long unsigned int last_link_up;
+ long unsigned int last_tx;
+ long unsigned int last_rx;
+ long unsigned int target_last_arp_rx[16];
+ s8 link;
+ s8 link_new_state;
+ u8 backup: 1;
+ u8 inactive: 1;
+ u8 should_notify: 1;
+ u8 should_notify_link: 1;
+ u8 duplex;
+ u32 original_mtu;
+ u32 link_failure_count;
+ u32 speed;
+ u16 queue_id;
+ u8 perm_hwaddr[32];
+ int prio;
+ struct ad_slave_info *ad_info;
+ struct tlb_slave_info tlb_info;
+ struct delayed_work notify_work;
+ struct kobject kobj;
+ struct rtnl_link_stats64 slave_stats;
+};
+
+struct ad_system {
+ u16 sys_priority;
+ struct mac_addr sys_mac_addr;
+};
+
+struct ad_bond_info {
+ struct ad_system system;
+ struct bond_3ad_stats stats;
+ atomic_t agg_select_timer;
+ u16 aggregator_identifier;
+};
+
+struct ad_slave_info {
+ struct aggregator aggregator;
+ struct port port;
+ struct bond_3ad_stats stats;
+ u16 id;
+};
+
+struct tlb_client_info {
+ struct slave *tx_slave;
+ u32 tx_bytes;
+ u32 load_history;
+ u32 next;
+ u32 prev;
+};
+
+struct rlb_client_info {
+ __be32 ip_src;
+ __be32 ip_dst;
+ u8 mac_src[6];
+ u8 mac_dst[6];
+ u32 used_next;
+ u32 used_prev;
+ u32 src_next;
+ u32 src_prev;
+ u32 src_first;
+ u8 assigned;
+ u8 ntt;
+ struct slave *slave;
+ short unsigned int vlan_id;
+};
+
+struct alb_bond_info {
+ struct tlb_client_info *tx_hashtbl;
+ u32 unbalanced_load;
+ atomic_t tx_rebalance_counter;
+ int lp_counter;
+ int rlb_enabled;
+ struct rlb_client_info *rx_hashtbl;
+ u32 rx_hashtbl_used_head;
+ u8 rx_ntt;
+ struct slave *rx_slave;
+ u8 primary_is_promisc;
+ u32 rlb_promisc_timeout_counter;
+ u32 rlb_update_delay_counter;
+ u32 rlb_update_retry_counter;
+ u8 rlb_rebalance;
+};
+
+enum {
+ BOND_OPTFLAG_NOSLAVES = 1,
+ BOND_OPTFLAG_IFDOWN = 2,
+ BOND_OPTFLAG_RAWVAL = 4,
+};
+
+enum {
+ BOND_VALFLAG_DEFAULT = 1,
+ BOND_VALFLAG_MIN = 2,
+ BOND_VALFLAG_MAX = 4,
+};
+
+enum {
+ BOND_OPT_MODE = 0,
+ BOND_OPT_PACKETS_PER_SLAVE = 1,
+ BOND_OPT_XMIT_HASH = 2,
+ BOND_OPT_ARP_VALIDATE = 3,
+ BOND_OPT_ARP_ALL_TARGETS = 4,
+ BOND_OPT_FAIL_OVER_MAC = 5,
+ BOND_OPT_ARP_INTERVAL = 6,
+ BOND_OPT_ARP_TARGETS = 7,
+ BOND_OPT_DOWNDELAY = 8,
+ BOND_OPT_UPDELAY = 9,
+ BOND_OPT_LACP_RATE = 10,
+ BOND_OPT_MINLINKS = 11,
+ BOND_OPT_AD_SELECT = 12,
+ BOND_OPT_NUM_PEER_NOTIF = 13,
+ BOND_OPT_MIIMON = 14,
+ BOND_OPT_PRIMARY = 15,
+ BOND_OPT_PRIMARY_RESELECT = 16,
+ BOND_OPT_USE_CARRIER = 17,
+ BOND_OPT_ACTIVE_SLAVE = 18,
+ BOND_OPT_QUEUE_ID = 19,
+ BOND_OPT_ALL_SLAVES_ACTIVE = 20,
+ BOND_OPT_RESEND_IGMP = 21,
+ BOND_OPT_LP_INTERVAL = 22,
+ BOND_OPT_SLAVES = 23,
+ BOND_OPT_TLB_DYNAMIC_LB = 24,
+ BOND_OPT_AD_ACTOR_SYS_PRIO = 25,
+ BOND_OPT_AD_ACTOR_SYSTEM = 26,
+ BOND_OPT_AD_USER_PORT_KEY = 27,
+ BOND_OPT_NUM_PEER_NOTIF_ALIAS = 28,
+ BOND_OPT_PEER_NOTIF_DELAY = 29,
+ BOND_OPT_LACP_ACTIVE = 30,
+ BOND_OPT_MISSED_MAX = 31,
+ BOND_OPT_NS_TARGETS = 32,
+ BOND_OPT_PRIO = 33,
+ BOND_OPT_LAST = 34,
+};
+
+struct bond_opt_value {
+ char *string;
+ u64 value;
+ u32 flags;
+ union {
+ char extra[16];
+ struct net_device *slave_dev;
+ };
+};
+
+struct bond_option {
+ int id;
+ const char *name;
+ const char *desc;
+ u32 flags;
+ long unsigned int unsuppmodes;
+ const struct bond_opt_value *values;
+ int (*set)(struct bonding *, const struct bond_opt_value *);
+};
+
+struct bond_params {
+ int mode;
+ int xmit_policy;
+ int miimon;
+ u8 num_peer_notif;
+ u8 missed_max;
+ int arp_interval;
+ int arp_validate;
+ int arp_all_targets;
+ int use_carrier;
+ int fail_over_mac;
+ int updelay;
+ int downdelay;
+ int peer_notif_delay;
+ int lacp_active;
+ int lacp_fast;
+ unsigned int min_links;
+ int ad_select;
+ char primary[16];
+ int primary_reselect;
+ __be32 arp_targets[16];
+ int tx_queues;
+ int all_slaves_active;
+ int resend_igmp;
+ int lp_interval;
+ int packets_per_slave;
+ int tlb_dynamic_lb;
+ struct reciprocal_value reciprocal_packets_per_slave;
+ u16 ad_actor_sys_prio;
+ u16 ad_user_port_key;
+ struct in6_addr ns_targets[16];
+ u8 ad_actor_system[8];
+};
+
+struct bond_up_slave;
+
+struct bonding {
+ struct net_device *dev;
+ struct slave *curr_active_slave;
+ struct slave *current_arp_slave;
+ struct slave *primary_slave;
+ struct bond_up_slave *usable_slaves;
+ struct bond_up_slave *all_slaves;
+ bool force_primary;
+ s32 slave_cnt;
+ int (*recv_probe)(const struct sk_buff *, struct bonding *, struct slave *);
+ spinlock_t mode_lock;
+ spinlock_t stats_lock;
+ u8 send_peer_notif;
+ u8 igmp_retrans;
+ struct proc_dir_entry *proc_entry;
+ char proc_file_name[16];
+ struct list_head bond_list;
+ u32 *rr_tx_counter;
+ struct ad_bond_info ad_info;
+ struct alb_bond_info alb_info;
+ struct bond_params params;
+ struct workqueue_struct *wq;
+ struct delayed_work mii_work;
+ struct delayed_work arp_work;
+ struct delayed_work alb_work;
+ struct delayed_work ad_work;
+ struct delayed_work mcast_work;
+ struct delayed_work slave_arr_work;
+ struct dentry *debug_dir;
+ struct rtnl_link_stats64 bond_stats;
+ struct bpf_prog *xdp_prog;
+};
+
+struct bond_up_slave {
+ unsigned int count;
+ struct callback_head rcu;
+ struct slave *arr[0];
+};
+
+struct cpuidle_state_usage {
+ long long unsigned int disable;
+ long long unsigned int usage;
+ u64 time_ns;
+ long long unsigned int above;
+ long long unsigned int below;
+ long long unsigned int rejected;
+ long long unsigned int s2idle_usage;
+ long long unsigned int s2idle_time;
+};
+
+struct cpuidle_device;
+
+struct cpuidle_driver;
+
+struct cpuidle_state {
+ char name[16];
+ char desc[32];
+ s64 exit_latency_ns;
+ s64 target_residency_ns;
+ unsigned int flags;
+ unsigned int exit_latency;
+ int power_usage;
+ unsigned int target_residency;
+ int (*enter)(struct cpuidle_device *, struct cpuidle_driver *, int);
+ int (*enter_dead)(struct cpuidle_device *, int);
+ int (*enter_s2idle)(struct cpuidle_device *, struct cpuidle_driver *, int);
+};
+
+struct cpuidle_driver_kobj;
+
+struct cpuidle_state_kobj;
+
+struct cpuidle_device_kobj;
+
+struct cpuidle_device {
+ unsigned int registered: 1;
+ unsigned int enabled: 1;
+ unsigned int poll_time_limit: 1;
+ unsigned int cpu;
+ ktime_t next_hrtimer;
+ int last_state_idx;
+ u64 last_residency_ns;
+ u64 poll_limit_ns;
+ u64 forced_idle_latency_limit_ns;
+ struct cpuidle_state_usage states_usage[10];
+ struct cpuidle_state_kobj *kobjs[10];
+ struct cpuidle_driver_kobj *kobj_driver;
+ struct cpuidle_device_kobj *kobj_dev;
+ struct list_head device_list;
+};
+
+struct cpuidle_driver {
+ const char *name;
+ struct module *owner;
+ unsigned int bctimer: 1;
+ struct cpuidle_state states[10];
+ int state_count;
+ int safe_state_index;
+ struct cpumask *cpumask;
+ const char *governor;
+};
+
+struct cpuidle_governor {
+ char name[16];
+ struct list_head governor_list;
+ unsigned int rating;
+ int (*enable)(struct cpuidle_driver *, struct cpuidle_device *);
+ void (*disable)(struct cpuidle_driver *, struct cpuidle_device *);
+ int (*select)(struct cpuidle_driver *, struct cpuidle_device *, bool *);
+ void (*reflect)(struct cpuidle_device *, int);
+};
+
+struct menu_device {
+ int needs_update;
+ int tick_wakeup;
+ u64 next_timer_ns;
+ unsigned int bucket;
+ unsigned int correction_factor[12];
+ unsigned int intervals[8];
+ int interval_ptr;
+};
+
+struct dmi_device_attribute {
+ struct device_attribute dev_attr;
+ int field;
+};
+
+struct mafield {
+ const char *prefix;
+ int field;
+};
+
+struct tc_qopt_offload_stats {
+ struct gnet_stats_basic_sync *bstats;
+ struct gnet_stats_queue *qstats;
+};
+
+enum tc_mq_command {
+ TC_MQ_CREATE = 0,
+ TC_MQ_DESTROY = 1,
+ TC_MQ_STATS = 2,
+ TC_MQ_GRAFT = 3,
+};
+
+struct tc_mq_opt_offload_graft_params {
+ long unsigned int queue;
+ u32 child_handle;
+};
+
+struct tc_mq_qopt_offload {
+ enum tc_mq_command command;
+ u32 handle;
+ union {
+ struct tc_qopt_offload_stats stats;
+ struct tc_mq_opt_offload_graft_params graft_params;
+ };
+};
+
+struct mq_sched {
+ struct Qdisc **qdiscs;
+};
+
+struct debug_reply_data {
+ struct ethnl_reply_data base;
+ u32 msg_mask;
+};
+
+enum nf_ct_ext_id {
+ NF_CT_EXT_HELPER = 0,
+ NF_CT_EXT_NAT = 1,
+ NF_CT_EXT_SEQADJ = 2,
+ NF_CT_EXT_ACCT = 3,
+ NF_CT_EXT_SYNPROXY = 4,
+ NF_CT_EXT_NUM = 5,
+};
+
+struct udp_sock {
+ struct inet_sock inet;
+ int pending;
+ unsigned int corkflag;
+ __u8 encap_type;
+ unsigned char no_check6_tx: 1;
+ unsigned char no_check6_rx: 1;
+ unsigned char encap_enabled: 1;
+ unsigned char gro_enabled: 1;
+ unsigned char accept_udp_l4: 1;
+ unsigned char accept_udp_fraglist: 1;
+ __u16 len;
+ __u16 gso_size;
+ __u16 pcslen;
+ __u16 pcrlen;
+ __u8 pcflag;
+ __u8 unused[3];
+ int (*encap_rcv)(struct sock *, struct sk_buff *);
+ void (*encap_err_rcv)(struct sock *, struct sk_buff *, int, __be16, u32, u8 *);
+ int (*encap_err_lookup)(struct sock *, struct sk_buff *);
+ void (*encap_destroy)(struct sock *);
+ struct sk_buff * (*gro_receive)(struct sock *, struct list_head *, struct sk_buff *);
+ int (*gro_complete)(struct sock *, struct sk_buff *, int);
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct sk_buff_head reader_queue;
+ int forward_deficit;
+ int forward_threshold;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct udp_seq_afinfo {
+ sa_family_t family;
+ struct udp_table *udp_table;
+};
+
+struct net_protocol {
+ int (*handler)(struct sk_buff *);
+ int (*err_handler)(struct sk_buff *, u32);
+ unsigned int no_policy: 1;
+ unsigned int icmp_strict_tag_validation: 1;
+};
+
+struct netlbl_audit {
+ u32 secid;
+ kuid_t loginuid;
+ unsigned int sessionid;
+};
+
+struct cipso_v4_std_map_tbl {
+ struct {
+ u32 *cipso;
+ u32 *local;
+ u32 cipso_size;
+ u32 local_size;
+ } lvl;
+ struct {
+ u32 *cipso;
+ u32 *local;
+ u32 cipso_size;
+ u32 local_size;
+ } cat;
+};
+
+struct cipso_v4_doi {
+ u32 doi;
+ u32 type;
+ union {
+ struct cipso_v4_std_map_tbl *std;
+ } map;
+ u8 tags[5];
+ refcount_t refcount;
+ struct list_head list;
+ struct callback_head rcu;
+};
+
+struct cipso_v4_map_cache_bkt {
+ spinlock_t lock;
+ u32 size;
+ struct list_head list;
+};
+
+struct cipso_v4_map_cache_entry {
+ u32 hash;
+ unsigned char *key;
+ size_t key_len;
+ struct netlbl_lsm_cache *lsm_data;
+ u32 activity;
+ struct list_head list;
+};
+
+struct minix_super_block {
+ __u16 s_ninodes;
+ __u16 s_nzones;
+ __u16 s_imap_blocks;
+ __u16 s_zmap_blocks;
+ __u16 s_firstdatazone;
+ __u16 s_log_zone_size;
+ __u32 s_max_size;
+ __u16 s_magic;
+ __u16 s_state;
+ __u32 s_zones;
+};
+
+struct romfs_super_block {
+ __be32 word0;
+ __be32 word1;
+ __be32 size;
+ __be32 checksum;
+ char name[0];
+};
+
+struct cramfs_inode {
+ __u32 mode: 16;
+ __u32 uid: 16;
+ __u32 size: 24;
+ __u32 gid: 8;
+ __u32 namelen: 6;
+ __u32 offset: 26;
+};
+
+struct cramfs_info {
+ __u32 crc;
+ __u32 edition;
+ __u32 blocks;
+ __u32 files;
+};
+
+struct cramfs_super {
+ __u32 magic;
+ __u32 size;
+ __u32 flags;
+ __u32 future;
+ __u8 signature[16];
+ struct cramfs_info fsid;
+ __u8 name[16];
+ struct cramfs_inode root;
+};
+
+struct squashfs_super_block {
+ __le32 s_magic;
+ __le32 inodes;
+ __le32 mkfs_time;
+ __le32 block_size;
+ __le32 fragments;
+ __le16 compression;
+ __le16 block_log;
+ __le16 flags;
+ __le16 no_ids;
+ __le16 s_major;
+ __le16 s_minor;
+ __le64 root_inode;
+ __le64 bytes_used;
+ __le64 id_table_start;
+ __le64 xattr_id_table_start;
+ __le64 inode_table_start;
+ __le64 directory_table_start;
+ __le64 fragment_table_start;
+ __le64 lookup_table_start;
+};
+
+typedef int (*decompress_fn)(unsigned char *, long int, long int (*)(void *, long unsigned int), long int (*)(void *, long unsigned int), unsigned char *, long int *, void (*)(char *));
+
+struct pm_vt_switch {
+ struct list_head head;
+ struct device *dev;
+ bool required;
+};
+
+struct module_use {
+ struct list_head source_list;
+ struct list_head target_list;
+ struct module *source;
+ struct module *target;
+};
+
+struct module_sect_attr {
+ struct bin_attribute battr;
+ long unsigned int address;
+};
+
+struct module_sect_attrs {
+ struct attribute_group grp;
+ unsigned int nsections;
+ struct module_sect_attr attrs[0];
+};
+
+struct module_notes_attrs {
+ struct kobject *dir;
+ unsigned int notes;
+ struct bin_attribute attrs[0];
+};
+
+struct hrtimer_sleeper {
+ struct hrtimer timer;
+ struct task_struct *task;
+};
+
+struct rt_mutex_base;
+
+struct rt_mutex_waiter {
+ struct rb_node tree_entry;
+ struct rb_node pi_tree_entry;
+ struct task_struct *task;
+ struct rt_mutex_base *lock;
+ unsigned int wake_state;
+ int prio;
+ u64 deadline;
+ struct ww_acquire_ctx *ww_ctx;
+};
+
+struct robust_list {
+ struct robust_list *next;
+};
+
+struct robust_list_head {
+ struct robust_list list;
+ long int futex_offset;
+ struct robust_list *list_op_pending;
+};
+
+struct rt_mutex_base {
+ raw_spinlock_t wait_lock;
+ struct rb_root_cached waiters;
+ struct task_struct *owner;
+};
+
+union futex_key {
+ struct {
+ u64 i_seq;
+ long unsigned int pgoff;
+ unsigned int offset;
+ } shared;
+ struct {
+ union {
+ struct mm_struct *mm;
+ u64 __tmp;
+ };
+ long unsigned int address;
+ unsigned int offset;
+ } private;
+ struct {
+ u64 ptr;
+ long unsigned int word;
+ unsigned int offset;
+ } both;
+};
+
+struct futex_pi_state {
+ struct list_head list;
+ struct rt_mutex_base pi_mutex;
+ struct task_struct *owner;
+ refcount_t refcount;
+ union futex_key key;
+};
+
+enum {
+ FUTEX_STATE_OK = 0,
+ FUTEX_STATE_EXITING = 1,
+ FUTEX_STATE_DEAD = 2,
+};
+
+struct futex_hash_bucket {
+ atomic_t waiters;
+ spinlock_t lock;
+ struct plist_head chain;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct futex_q {
+ struct plist_node list;
+ struct task_struct *task;
+ spinlock_t *lock_ptr;
+ union futex_key key;
+ struct futex_pi_state *pi_state;
+ struct rt_mutex_waiter *rt_waiter;
+ union futex_key *requeue_pi_key;
+ u32 bitset;
+ atomic_t requeue_state;
+};
+
+enum futex_access {
+ FUTEX_READ = 0,
+ FUTEX_WRITE = 1,
+};
+
+enum ftrace_dump_mode {
+ DUMP_NONE = 0,
+ DUMP_ALL = 1,
+ DUMP_ORIG = 2,
+};
+
+enum {
+ TRACE_FTRACE_BIT = 0,
+ TRACE_FTRACE_NMI_BIT = 1,
+ TRACE_FTRACE_IRQ_BIT = 2,
+ TRACE_FTRACE_SIRQ_BIT = 3,
+ TRACE_FTRACE_TRANSITION_BIT = 4,
+ TRACE_INTERNAL_BIT = 5,
+ TRACE_INTERNAL_NMI_BIT = 6,
+ TRACE_INTERNAL_IRQ_BIT = 7,
+ TRACE_INTERNAL_SIRQ_BIT = 8,
+ TRACE_INTERNAL_TRANSITION_BIT = 9,
+ TRACE_BRANCH_BIT = 10,
+ TRACE_IRQ_BIT = 11,
+ TRACE_GRAPH_BIT = 12,
+ TRACE_GRAPH_DEPTH_START_BIT = 13,
+ TRACE_GRAPH_DEPTH_END_BIT = 14,
+ TRACE_GRAPH_NOTRACE_BIT = 15,
+ TRACE_RECORD_RECURSION_BIT = 16,
+};
+
+enum {
+ TRACE_CTX_NMI = 0,
+ TRACE_CTX_IRQ = 1,
+ TRACE_CTX_SOFTIRQ = 2,
+ TRACE_CTX_NORMAL = 3,
+ TRACE_CTX_TRANSITION = 4,
+};
+
+enum {
+ FTRACE_OPS_FL_ENABLED = 1,
+ FTRACE_OPS_FL_DYNAMIC = 2,
+ FTRACE_OPS_FL_SAVE_REGS = 4,
+ FTRACE_OPS_FL_SAVE_REGS_IF_SUPPORTED = 8,
+ FTRACE_OPS_FL_RECURSION = 16,
+ FTRACE_OPS_FL_STUB = 32,
+ FTRACE_OPS_FL_INITIALIZED = 64,
+ FTRACE_OPS_FL_DELETED = 128,
+ FTRACE_OPS_FL_ADDING = 256,
+ FTRACE_OPS_FL_REMOVING = 512,
+ FTRACE_OPS_FL_MODIFYING = 1024,
+ FTRACE_OPS_FL_ALLOC_TRAMP = 2048,
+ FTRACE_OPS_FL_IPMODIFY = 4096,
+ FTRACE_OPS_FL_PID = 8192,
+ FTRACE_OPS_FL_RCU = 16384,
+ FTRACE_OPS_FL_TRACE_ARRAY = 32768,
+ FTRACE_OPS_FL_PERMANENT = 65536,
+ FTRACE_OPS_FL_DIRECT = 131072,
+};
+
+enum {
+ TRACE_ARRAY_FL_GLOBAL = 1,
+};
+
+struct ftrace_func_command {
+ struct list_head list;
+ char *name;
+ int (*func)(struct trace_array *, struct ftrace_hash *, char *, char *, char *, int);
+};
+
+struct ftrace_probe_ops {
+ void (*func)(long unsigned int, long unsigned int, struct trace_array *, struct ftrace_probe_ops *, void *);
+ int (*init)(struct ftrace_probe_ops *, struct trace_array *, long unsigned int, void *, void **);
+ void (*free)(struct ftrace_probe_ops *, struct trace_array *, long unsigned int, void *);
+ int (*print)(struct seq_file *, long unsigned int, struct ftrace_probe_ops *, void *);
+};
+
+typedef int (*ftrace_mapper_func)(void *);
+
+enum {
+ TRACE_FUNC_NO_OPTS = 0,
+ TRACE_FUNC_OPT_STACK = 1,
+ TRACE_FUNC_OPT_NO_REPEATS = 2,
+ TRACE_FUNC_OPT_HIGHEST_BIT = 4,
+};
+
+struct ftrace_func_mapper;
+
+struct pcpu_group_info {
+ int nr_units;
+ long unsigned int base_offset;
+ unsigned int *cpu_map;
+};
+
+struct pcpu_alloc_info {
+ size_t static_size;
+ size_t reserved_size;
+ size_t dyn_size;
+ size_t unit_size;
+ size_t atom_size;
+ size_t alloc_size;
+ size_t __ai_size;
+ int nr_groups;
+ struct pcpu_group_info groups[0];
+};
+
+typedef int pcpu_fc_cpu_to_node_fn_t(int);
+
+typedef int pcpu_fc_cpu_distance_fn_t(unsigned int, unsigned int);
+
+enum memcg_stat_item {
+ MEMCG_SWAP = 43,
+ MEMCG_SOCK = 44,
+ MEMCG_PERCPU_B = 45,
+ MEMCG_VMALLOC = 46,
+ MEMCG_KMEM = 47,
+ MEMCG_ZSWAP_B = 48,
+ MEMCG_ZSWAPPED = 49,
+ MEMCG_NR_STAT = 50,
+};
+
+enum compact_priority {
+ COMPACT_PRIO_SYNC_FULL = 0,
+ MIN_COMPACT_PRIORITY = 0,
+ COMPACT_PRIO_SYNC_LIGHT = 1,
+ MIN_COMPACT_COSTLY_PRIORITY = 1,
+ DEF_COMPACT_PRIORITY = 1,
+ COMPACT_PRIO_ASYNC = 2,
+ INIT_COMPACT_PRIORITY = 2,
+};
+
+enum compact_result {
+ COMPACT_NOT_SUITABLE_ZONE = 0,
+ COMPACT_SKIPPED = 1,
+ COMPACT_DEFERRED = 2,
+ COMPACT_NO_SUITABLE_PAGE = 3,
+ COMPACT_CONTINUE = 4,
+ COMPACT_COMPLETE = 5,
+ COMPACT_PARTIAL_SKIPPED = 6,
+ COMPACT_CONTENDED = 7,
+ COMPACT_SUCCESS = 8,
+};
+
+struct trace_event_raw_percpu_alloc_percpu {
+ struct trace_entry ent;
+ long unsigned int call_site;
+ bool reserved;
+ bool is_atomic;
+ size_t size;
+ size_t align;
+ void *base_addr;
+ int off;
+ void *ptr;
+ size_t bytes_alloc;
+ long unsigned int gfp_flags;
+ char __data[0];
+};
+
+struct trace_event_raw_percpu_free_percpu {
+ struct trace_entry ent;
+ void *base_addr;
+ int off;
+ void *ptr;
+ char __data[0];
+};
+
+struct trace_event_raw_percpu_alloc_percpu_fail {
+ struct trace_entry ent;
+ bool reserved;
+ bool is_atomic;
+ size_t size;
+ size_t align;
+ char __data[0];
+};
+
+struct trace_event_raw_percpu_create_chunk {
+ struct trace_entry ent;
+ void *base_addr;
+ char __data[0];
+};
+
+struct trace_event_raw_percpu_destroy_chunk {
+ struct trace_entry ent;
+ void *base_addr;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_percpu_alloc_percpu {};
+
+struct trace_event_data_offsets_percpu_free_percpu {};
+
+struct trace_event_data_offsets_percpu_alloc_percpu_fail {};
+
+struct trace_event_data_offsets_percpu_create_chunk {};
+
+struct trace_event_data_offsets_percpu_destroy_chunk {};
+
+typedef void (*btf_trace_percpu_alloc_percpu)(void *, long unsigned int, bool, bool, size_t, size_t, void *, int, void *, size_t, gfp_t);
+
+typedef void (*btf_trace_percpu_free_percpu)(void *, void *, int, void *);
+
+typedef void (*btf_trace_percpu_alloc_percpu_fail)(void *, bool, bool, size_t, size_t);
+
+typedef void (*btf_trace_percpu_create_chunk)(void *, void *);
+
+typedef void (*btf_trace_percpu_destroy_chunk)(void *, void *);
+
+struct pcpu_block_md {
+ int scan_hint;
+ int scan_hint_start;
+ int contig_hint;
+ int contig_hint_start;
+ int left_free;
+ int right_free;
+ int first_free;
+ int nr_bits;
+};
+
+struct pcpu_chunk {
+ struct list_head list;
+ int free_bytes;
+ struct pcpu_block_md chunk_md;
+ void *base_addr;
+ long unsigned int *alloc_map;
+ long unsigned int *bound_map;
+ struct pcpu_block_md *md_blocks;
+ void *data;
+ bool immutable;
+ bool isolated;
+ int start_offset;
+ int end_offset;
+ struct obj_cgroup **obj_cgroups;
+ int nr_pages;
+ int nr_populated;
+ int nr_empty_pop_pages;
+ long unsigned int populated[0];
+};
+
+struct ext4_allocation_request {
+ struct inode *inode;
+ unsigned int len;
+ ext4_lblk_t logical;
+ ext4_lblk_t lleft;
+ ext4_lblk_t lright;
+ ext4_fsblk_t goal;
+ ext4_fsblk_t pleft;
+ ext4_fsblk_t pright;
+ unsigned int flags;
+};
+
+typedef struct {
+ __le32 *p;
+ __le32 key;
+ struct buffer_head *bh;
+} Indirect;
+
+struct lsm_network_audit {
+ int netif;
+ const struct sock *sk;
+ u16 family;
+ __be16 dport;
+ __be16 sport;
+ union {
+ struct {
+ __be32 daddr;
+ __be32 saddr;
+ } v4;
+ struct {
+ struct in6_addr daddr;
+ struct in6_addr saddr;
+ } v6;
+ } fam;
+};
+
+struct lsm_ioctlop_audit {
+ struct path path;
+ u16 cmd;
+};
+
+struct lsm_ibpkey_audit {
+ u64 subnet_prefix;
+ u16 pkey;
+};
+
+struct lsm_ibendport_audit {
+ const char *dev_name;
+ u8 port;
+};
+
+struct selinux_audit_data {
+ u32 ssid;
+ u32 tsid;
+ u16 tclass;
+ u32 requested;
+ u32 audited;
+ u32 denied;
+ int result;
+ struct selinux_state *state;
+};
+
+struct common_audit_data {
+ char type;
+ union {
+ struct path path;
+ struct dentry *dentry;
+ struct inode *inode;
+ struct lsm_network_audit *net;
+ int cap;
+ int ipc_id;
+ struct task_struct *tsk;
+ struct {
+ key_serial_t key;
+ char *key_desc;
+ } key_struct;
+ char *kmod_name;
+ struct lsm_ioctlop_audit *op;
+ struct file *file;
+ struct lsm_ibpkey_audit *ibpkey;
+ struct lsm_ibendport_audit *ibendport;
+ int reason;
+ const char *anonclass;
+ } u;
+ union {
+ struct selinux_audit_data *selinux_audit_data;
+ };
+};
+
+struct avc_cache {
+ struct hlist_head slots[512];
+ spinlock_t slots_lock[512];
+ atomic_t lru_hint;
+ atomic_t active_nodes;
+ u32 latest_notif;
+};
+
+struct selinux_avc {
+ unsigned int avc_cache_threshold;
+ struct avc_cache avc_cache;
+};
+
+struct avc_cache_stats {
+ unsigned int lookups;
+ unsigned int misses;
+ unsigned int allocations;
+ unsigned int reclaims;
+ unsigned int frees;
+};
+
+struct trace_event_raw_selinux_audited {
+ struct trace_entry ent;
+ u32 requested;
+ u32 denied;
+ u32 audited;
+ int result;
+ u32 __data_loc_scontext;
+ u32 __data_loc_tcontext;
+ u32 __data_loc_tclass;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_selinux_audited {
+ u32 scontext;
+ u32 tcontext;
+ u32 tclass;
+};
+
+typedef void (*btf_trace_selinux_audited)(void *, struct selinux_audit_data *, char *, char *, const char *);
+
+struct avc_xperms_node;
+
+struct avc_entry {
+ u32 ssid;
+ u32 tsid;
+ u16 tclass;
+ struct av_decision avd;
+ struct avc_xperms_node *xp_node;
+};
+
+struct avc_xperms_node {
+ struct extended_perms xp;
+ struct list_head xpd_head;
+};
+
+struct avc_node {
+ struct avc_entry ae;
+ struct hlist_node list;
+ struct callback_head rhead;
+};
+
+struct avc_xperms_decision_node {
+ struct extended_perms_decision xpd;
+ struct list_head xpd_list;
+};
+
+struct avc_callback_node {
+ int (*callback)(u32);
+ u32 events;
+ struct avc_callback_node *next;
+};
+
+enum {
+ MATCH_MTR = 0,
+ MATCH_MEQ = 1,
+ MATCH_MLE = 2,
+ MATCH_MLT = 3,
+ MATCH_MGE = 4,
+ MATCH_MGT = 5,
+};
+
+struct acpi_rw_lock {
+ void *writer_mutex;
+ void *reader_mutex;
+ u32 num_readers;
+};
+
+struct acpi_mutex_info {
+ void *mutex;
+ u32 use_count;
+ u64 thread_id;
+};
+
+enum kernel_load_data_id {
+ LOADING_UNKNOWN = 0,
+ LOADING_FIRMWARE = 1,
+ LOADING_MODULE = 2,
+ LOADING_KEXEC_IMAGE = 3,
+ LOADING_KEXEC_INITRAMFS = 4,
+ LOADING_POLICY = 5,
+ LOADING_X509_CERTIFICATE = 6,
+ LOADING_MAX_ID = 7,
+};
+
+enum fw_opt {
+ FW_OPT_UEVENT = 1,
+ FW_OPT_NOWAIT = 2,
+ FW_OPT_USERHELPER = 4,
+ FW_OPT_NO_WARN = 8,
+ FW_OPT_NOCACHE = 16,
+ FW_OPT_NOFALLBACK_SYSFS = 32,
+ FW_OPT_FALLBACK_PLATFORM = 64,
+ FW_OPT_PARTIAL = 128,
+};
+
+enum fw_status {
+ FW_STATUS_UNKNOWN = 0,
+ FW_STATUS_LOADING = 1,
+ FW_STATUS_DONE = 2,
+ FW_STATUS_ABORTED = 3,
+};
+
+struct fw_state {
+ struct completion completion;
+ enum fw_status status;
+};
+
+struct firmware_cache;
+
+struct fw_priv {
+ struct kref ref;
+ struct list_head list;
+ struct firmware_cache *fwc;
+ struct fw_state fw_st;
+ void *data;
+ size_t size;
+ size_t allocated_size;
+ size_t offset;
+ u32 opt_flags;
+ bool is_paged_buf;
+ struct page **pages;
+ int nr_pages;
+ int page_array_size;
+ bool need_uevent;
+ struct list_head pending_list;
+ const char *fw_name;
+};
+
+struct firmware_fallback_config {
+ unsigned int force_sysfs_fallback;
+ unsigned int ignore_sysfs_fallback;
+ int old_timeout;
+ int loading_timeout;
+};
+
+struct fw_sysfs {
+ bool nowait;
+ struct device dev;
+ struct fw_priv *fw_priv;
+ struct firmware *fw;
+ void *fw_upload_priv;
+};
+
+struct serio_device_id {
+ __u8 type;
+ __u8 extra;
+ __u8 id;
+ __u8 proto;
+};
+
+struct input_mt_slot {
+ int abs[14];
+ unsigned int frame;
+ unsigned int key;
+};
+
+struct input_mt {
+ int trkid;
+ int num_slots;
+ int slot;
+ unsigned int flags;
+ unsigned int frame;
+ int *red;
+ struct input_mt_slot slots[0];
+};
+
+struct input_mt_pos {
+ s16 x;
+ s16 y;
+};
+
+struct serio_driver;
+
+struct serio {
+ void *port_data;
+ char name[32];
+ char phys[32];
+ char firmware_id[128];
+ bool manual_bind;
+ struct serio_device_id id;
+ spinlock_t lock;
+ int (*write)(struct serio *, unsigned char);
+ int (*open)(struct serio *);
+ void (*close)(struct serio *);
+ int (*start)(struct serio *);
+ void (*stop)(struct serio *);
+ struct serio *parent;
+ struct list_head child_node;
+ struct list_head children;
+ unsigned int depth;
+ struct serio_driver *drv;
+ struct mutex drv_mutex;
+ struct device dev;
+ struct list_head node;
+ struct mutex *ps2_cmd_mutex;
+};
+
+struct serio_driver {
+ const char *description;
+ const struct serio_device_id *id_table;
+ bool manual_bind;
+ void (*write_wakeup)(struct serio *);
+ irqreturn_t (*interrupt)(struct serio *, unsigned char, unsigned int);
+ int (*connect)(struct serio *, struct serio_driver *);
+ int (*reconnect)(struct serio *);
+ int (*fast_reconnect)(struct serio *);
+ void (*disconnect)(struct serio *);
+ void (*cleanup)(struct serio *);
+ struct device_driver driver;
+};
+
+struct ps2dev {
+ struct serio *serio;
+ struct mutex cmd_mutex;
+ wait_queue_head_t wait;
+ long unsigned int flags;
+ u8 cmdbuf[8];
+ u8 cmdcnt;
+ u8 nak;
+};
+
+enum psmouse_state {
+ PSMOUSE_IGNORE = 0,
+ PSMOUSE_INITIALIZING = 1,
+ PSMOUSE_RESYNCING = 2,
+ PSMOUSE_CMD_MODE = 3,
+ PSMOUSE_ACTIVATED = 4,
+};
+
+typedef enum {
+ PSMOUSE_BAD_DATA = 0,
+ PSMOUSE_GOOD_DATA = 1,
+ PSMOUSE_FULL_PACKET = 2,
+} psmouse_ret_t;
+
+enum psmouse_scale {
+ PSMOUSE_SCALE11 = 0,
+ PSMOUSE_SCALE21 = 1,
+};
+
+enum psmouse_type {
+ PSMOUSE_NONE = 0,
+ PSMOUSE_PS2 = 1,
+ PSMOUSE_PS2PP = 2,
+ PSMOUSE_THINKPS = 3,
+ PSMOUSE_GENPS = 4,
+ PSMOUSE_IMPS = 5,
+ PSMOUSE_IMEX = 6,
+ PSMOUSE_SYNAPTICS = 7,
+ PSMOUSE_ALPS = 8,
+ PSMOUSE_LIFEBOOK = 9,
+ PSMOUSE_TRACKPOINT = 10,
+ PSMOUSE_TOUCHKIT_PS2 = 11,
+ PSMOUSE_CORTRON = 12,
+ PSMOUSE_HGPK = 13,
+ PSMOUSE_ELANTECH = 14,
+ PSMOUSE_FSP = 15,
+ PSMOUSE_SYNAPTICS_RELATIVE = 16,
+ PSMOUSE_CYPRESS = 17,
+ PSMOUSE_FOCALTECH = 18,
+ PSMOUSE_VMMOUSE = 19,
+ PSMOUSE_BYD = 20,
+ PSMOUSE_SYNAPTICS_SMBUS = 21,
+ PSMOUSE_ELANTECH_SMBUS = 22,
+ PSMOUSE_AUTO = 23,
+};
+
+struct psmouse;
+
+struct psmouse_protocol {
+ enum psmouse_type type;
+ bool maxproto;
+ bool ignore_parity;
+ bool try_passthru;
+ bool smbus_companion;
+ const char *name;
+ const char *alias;
+ int (*detect)(struct psmouse *, bool);
+ int (*init)(struct psmouse *);
+};
+
+struct psmouse {
+ void *private;
+ struct input_dev *dev;
+ struct ps2dev ps2dev;
+ struct delayed_work resync_work;
+ const char *vendor;
+ const char *name;
+ const struct psmouse_protocol *protocol;
+ unsigned char packet[8];
+ unsigned char badbyte;
+ unsigned char pktcnt;
+ unsigned char pktsize;
+ unsigned char oob_data_type;
+ unsigned char extra_buttons;
+ bool acks_disable_command;
+ unsigned int model;
+ long unsigned int last;
+ long unsigned int out_of_sync_cnt;
+ long unsigned int num_resyncs;
+ enum psmouse_state state;
+ char devname[64];
+ char phys[32];
+ unsigned int rate;
+ unsigned int resolution;
+ unsigned int resetafter;
+ unsigned int resync_time;
+ bool smartscroll;
+ psmouse_ret_t (*protocol_handler)(struct psmouse *);
+ void (*set_rate)(struct psmouse *, unsigned int);
+ void (*set_resolution)(struct psmouse *, unsigned int);
+ void (*set_scale)(struct psmouse *, enum psmouse_scale);
+ int (*reconnect)(struct psmouse *);
+ int (*fast_reconnect)(struct psmouse *);
+ void (*disconnect)(struct psmouse *);
+ void (*cleanup)(struct psmouse *);
+ int (*poll)(struct psmouse *);
+ void (*pt_activate)(struct psmouse *);
+ void (*pt_deactivate)(struct psmouse *);
+};
+
+enum SS4_PACKET_ID {
+ SS4_PACKET_ID_IDLE = 0,
+ SS4_PACKET_ID_ONE = 1,
+ SS4_PACKET_ID_TWO = 2,
+ SS4_PACKET_ID_MULTI = 3,
+ SS4_PACKET_ID_STICK = 4,
+};
+
+enum V7_PACKET_ID {
+ V7_PACKET_ID_IDLE = 0,
+ V7_PACKET_ID_TWO = 1,
+ V7_PACKET_ID_MULTI = 2,
+ V7_PACKET_ID_NEW = 3,
+ V7_PACKET_ID_UNKNOWN = 4,
+};
+
+struct alps_protocol_info {
+ u16 version;
+ u8 byte0;
+ u8 mask0;
+ unsigned int flags;
+};
+
+struct alps_model_info {
+ u8 signature[3];
+ struct alps_protocol_info protocol_info;
+};
+
+struct alps_nibble_commands {
+ int command;
+ unsigned char data;
+};
+
+struct alps_bitmap_point {
+ int start_bit;
+ int num_bits;
+};
+
+struct alps_fields {
+ unsigned int x_map;
+ unsigned int y_map;
+ unsigned int fingers;
+ int pressure;
+ struct input_mt_pos st;
+ struct input_mt_pos mt[4];
+ unsigned int first_mp: 1;
+ unsigned int is_mp: 1;
+ unsigned int left: 1;
+ unsigned int right: 1;
+ unsigned int middle: 1;
+ unsigned int ts_left: 1;
+ unsigned int ts_right: 1;
+ unsigned int ts_middle: 1;
+};
+
+struct alps_data {
+ struct psmouse *psmouse;
+ struct input_dev *dev2;
+ struct input_dev *dev3;
+ char phys2[32];
+ char phys3[32];
+ struct delayed_work dev3_register_work;
+ const struct alps_nibble_commands *nibble_commands;
+ int addr_command;
+ u16 proto_version;
+ u8 byte0;
+ u8 mask0;
+ u8 dev_id[3];
+ u8 fw_ver[3];
+ int flags;
+ int x_max;
+ int y_max;
+ int x_bits;
+ int y_bits;
+ unsigned int x_res;
+ unsigned int y_res;
+ int (*hw_init)(struct psmouse *);
+ void (*process_packet)(struct psmouse *);
+ int (*decode_fields)(struct alps_fields *, unsigned char *, struct psmouse *);
+ void (*set_abs_params)(struct alps_data *, struct input_dev *);
+ int prev_fin;
+ int multi_packet;
+ int second_touch;
+ unsigned char multi_data[6];
+ struct alps_fields f;
+ u8 quirks;
+ struct timer_list timer;
+};
+
+struct acpi_table_pcct {
+ struct acpi_table_header header;
+ u32 flags;
+ u64 reserved;
+};
+
+enum acpi_pcct_type {
+ ACPI_PCCT_TYPE_GENERIC_SUBSPACE = 0,
+ ACPI_PCCT_TYPE_HW_REDUCED_SUBSPACE = 1,
+ ACPI_PCCT_TYPE_HW_REDUCED_SUBSPACE_TYPE2 = 2,
+ ACPI_PCCT_TYPE_EXT_PCC_MASTER_SUBSPACE = 3,
+ ACPI_PCCT_TYPE_EXT_PCC_SLAVE_SUBSPACE = 4,
+ ACPI_PCCT_TYPE_HW_REG_COMM_SUBSPACE = 5,
+ ACPI_PCCT_TYPE_RESERVED = 6,
+};
+
+struct acpi_pcct_subspace {
+ struct acpi_subtable_header header;
+ u8 reserved[6];
+ u64 base_address;
+ u64 length;
+ struct acpi_generic_address doorbell_register;
+ u64 preserve_mask;
+ u64 write_mask;
+ u32 latency;
+ u32 max_access_rate;
+ u16 min_turnaround_time;
+} __attribute__((packed));
+
+struct acpi_pcct_hw_reduced {
+ struct acpi_subtable_header header;
+ u32 platform_interrupt;
+ u8 flags;
+ u8 reserved;
+ u64 base_address;
+ u64 length;
+ struct acpi_generic_address doorbell_register;
+ u64 preserve_mask;
+ u64 write_mask;
+ u32 latency;
+ u32 max_access_rate;
+ u16 min_turnaround_time;
+} __attribute__((packed));
+
+struct acpi_pcct_hw_reduced_type2 {
+ struct acpi_subtable_header header;
+ u32 platform_interrupt;
+ u8 flags;
+ u8 reserved;
+ u64 base_address;
+ u64 length;
+ struct acpi_generic_address doorbell_register;
+ u64 preserve_mask;
+ u64 write_mask;
+ u32 latency;
+ u32 max_access_rate;
+ u16 min_turnaround_time;
+ struct acpi_generic_address platform_ack_register;
+ u64 ack_preserve_mask;
+ u64 ack_write_mask;
+} __attribute__((packed));
+
+struct acpi_pcct_ext_pcc_master {
+ struct acpi_subtable_header header;
+ u32 platform_interrupt;
+ u8 flags;
+ u8 reserved1;
+ u64 base_address;
+ u32 length;
+ struct acpi_generic_address doorbell_register;
+ u64 preserve_mask;
+ u64 write_mask;
+ u32 latency;
+ u32 max_access_rate;
+ u32 min_turnaround_time;
+ struct acpi_generic_address platform_ack_register;
+ u64 ack_preserve_mask;
+ u64 ack_set_mask;
+ u64 reserved2;
+ struct acpi_generic_address cmd_complete_register;
+ u64 cmd_complete_mask;
+ struct acpi_generic_address cmd_update_register;
+ u64 cmd_update_preserve_mask;
+ u64 cmd_update_set_mask;
+ struct acpi_generic_address error_status_register;
+ u64 error_status_mask;
+} __attribute__((packed));
+
+struct platform_driver {
+ int (*probe)(struct platform_device *);
+ int (*remove)(struct platform_device *);
+ void (*shutdown)(struct platform_device *);
+ int (*suspend)(struct platform_device *, pm_message_t);
+ int (*resume)(struct platform_device *);
+ struct device_driver driver;
+ const struct platform_device_id *id_table;
+ bool prevent_deferred_probe;
+ bool driver_managed_dma;
+};
+
+struct pcc_chan_reg {
+ void *vaddr;
+ struct acpi_generic_address *gas;
+ u64 preserve_mask;
+ u64 set_mask;
+ u64 status_mask;
+};
+
+struct pcc_chan_info {
+ struct pcc_mbox_chan chan;
+ struct pcc_chan_reg db;
+ struct pcc_chan_reg plat_irq_ack;
+ struct pcc_chan_reg cmd_complete;
+ struct pcc_chan_reg cmd_update;
+ struct pcc_chan_reg error;
+ int plat_irq;
+};
+
+enum {
+ BPF_F_INGRESS = 1,
+};
+
+enum sk_action {
+ SK_DROP = 0,
+ SK_PASS = 1,
+};
+
+struct sk_psock_progs {
+ struct bpf_prog *msg_parser;
+ struct bpf_prog *stream_parser;
+ struct bpf_prog *stream_verdict;
+ struct bpf_prog *skb_verdict;
+};
+
+struct strp_stats {
+ long long unsigned int msgs;
+ long long unsigned int bytes;
+ unsigned int mem_fail;
+ unsigned int need_more_hdr;
+ unsigned int msg_too_big;
+ unsigned int msg_timeouts;
+ unsigned int bad_hdr_len;
+};
+
+struct strparser;
+
+struct strp_callbacks {
+ int (*parse_msg)(struct strparser *, struct sk_buff *);
+ void (*rcv_msg)(struct strparser *, struct sk_buff *);
+ int (*read_sock_done)(struct strparser *, int);
+ void (*abort_parser)(struct strparser *, int);
+ void (*lock)(struct strparser *);
+ void (*unlock)(struct strparser *);
+};
+
+struct strparser {
+ struct sock *sk;
+ u32 stopped: 1;
+ u32 paused: 1;
+ u32 aborted: 1;
+ u32 interrupted: 1;
+ u32 unrecov_intr: 1;
+ struct sk_buff **skb_nextp;
+ struct sk_buff *skb_head;
+ unsigned int need_bytes;
+ struct delayed_work msg_timer_work;
+ struct work_struct work;
+ struct strp_stats stats;
+ struct strp_callbacks cb;
+};
+
+struct sk_psock_work_state {
+ struct sk_buff *skb;
+ u32 len;
+ u32 off;
+};
+
+struct sk_msg;
+
+struct sk_psock {
+ struct sock *sk;
+ struct sock *sk_redir;
+ u32 apply_bytes;
+ u32 cork_bytes;
+ u32 eval;
+ bool redir_ingress;
+ struct sk_msg *cork;
+ struct sk_psock_progs progs;
+ struct strparser strp;
+ struct sk_buff_head ingress_skb;
+ struct list_head ingress_msg;
+ spinlock_t ingress_lock;
+ long unsigned int state;
+ struct list_head link;
+ spinlock_t link_lock;
+ refcount_t refcnt;
+ void (*saved_unhash)(struct sock *);
+ void (*saved_destroy)(struct sock *);
+ void (*saved_close)(struct sock *, long int);
+ void (*saved_write_space)(struct sock *);
+ void (*saved_data_ready)(struct sock *);
+ int (*psock_update_sk_prot)(struct sock *, struct sk_psock *, bool);
+ struct proto *sk_proto;
+ struct mutex work_mutex;
+ struct sk_psock_work_state work_state;
+ struct work_struct work;
+ struct rcu_work rwork;
+};
+
+struct sk_msg_sg {
+ u32 start;
+ u32 curr;
+ u32 end;
+ u32 size;
+ u32 copybreak;
+ long unsigned int copy[1];
+ struct scatterlist data[19];
+};
+
+struct sk_msg {
+ struct sk_msg_sg sg;
+ void *data;
+ void *data_end;
+ u32 apply_bytes;
+ u32 cork_bytes;
+ u32 flags;
+ struct sk_buff *skb;
+ struct sock *sk_redir;
+ struct sock *sk;
+ struct list_head list;
+};
+
+struct sk_psock_link {
+ struct list_head list;
+ struct bpf_map *map;
+ void *link_raw;
+};
+
+struct bpf_stab {
+ struct bpf_map map;
+ struct sock **sks;
+ struct sk_psock_progs progs;
+ raw_spinlock_t lock;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+typedef u64 (*btf_bpf_sock_map_update)(struct bpf_sock_ops_kern *, struct bpf_map *, void *, u64);
+
+typedef u64 (*btf_bpf_sk_redirect_map)(struct sk_buff *, struct bpf_map *, u32, u64);
+
+typedef u64 (*btf_bpf_msg_redirect_map)(struct sk_msg *, struct bpf_map *, u32, u64);
+
+struct sock_map_seq_info {
+ struct bpf_map *map;
+ struct sock *sk;
+ u32 index;
+};
+
+struct bpf_iter__sockmap {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct bpf_map *map;
+ };
+ union {
+ void *key;
+ };
+ union {
+ struct sock *sk;
+ };
+};
+
+struct bpf_shtab_elem {
+ struct callback_head rcu;
+ u32 hash;
+ struct sock *sk;
+ struct hlist_node node;
+ u8 key[0];
+};
+
+struct bpf_shtab_bucket {
+ struct hlist_head head;
+ raw_spinlock_t lock;
+};
+
+struct bpf_shtab {
+ struct bpf_map map;
+ struct bpf_shtab_bucket *buckets;
+ u32 buckets_num;
+ u32 elem_size;
+ struct sk_psock_progs progs;
+ atomic_t count;
+ long: 32;
+ long: 64;
+};
+
+typedef u64 (*btf_bpf_sock_hash_update)(struct bpf_sock_ops_kern *, struct bpf_map *, void *, u64);
+
+typedef u64 (*btf_bpf_sk_redirect_hash)(struct sk_buff *, struct bpf_map *, void *, u64);
+
+typedef u64 (*btf_bpf_msg_redirect_hash)(struct sk_msg *, struct bpf_map *, void *, u64);
+
+struct sock_hash_seq_info {
+ struct bpf_map *map;
+ struct bpf_shtab *htab;
+ u32 bucket_id;
+};
+
+enum {
+ ETHTOOL_UDP_TUNNEL_TYPE_VXLAN = 0,
+ ETHTOOL_UDP_TUNNEL_TYPE_GENEVE = 1,
+ ETHTOOL_UDP_TUNNEL_TYPE_VXLAN_GPE = 2,
+ __ETHTOOL_UDP_TUNNEL_TYPE_CNT = 3,
+};
+
+enum {
+ ETHTOOL_A_TUNNEL_UDP_ENTRY_UNSPEC = 0,
+ ETHTOOL_A_TUNNEL_UDP_ENTRY_PORT = 1,
+ ETHTOOL_A_TUNNEL_UDP_ENTRY_TYPE = 2,
+ __ETHTOOL_A_TUNNEL_UDP_ENTRY_CNT = 3,
+ ETHTOOL_A_TUNNEL_UDP_ENTRY_MAX = 2,
+};
+
+enum {
+ ETHTOOL_A_TUNNEL_UDP_TABLE_UNSPEC = 0,
+ ETHTOOL_A_TUNNEL_UDP_TABLE_SIZE = 1,
+ ETHTOOL_A_TUNNEL_UDP_TABLE_TYPES = 2,
+ ETHTOOL_A_TUNNEL_UDP_TABLE_ENTRY = 3,
+ __ETHTOOL_A_TUNNEL_UDP_TABLE_CNT = 4,
+ ETHTOOL_A_TUNNEL_UDP_TABLE_MAX = 3,
+};
+
+enum {
+ ETHTOOL_A_TUNNEL_UDP_UNSPEC = 0,
+ ETHTOOL_A_TUNNEL_UDP_TABLE = 1,
+ __ETHTOOL_A_TUNNEL_UDP_CNT = 2,
+ ETHTOOL_A_TUNNEL_UDP_MAX = 1,
+};
+
+enum udp_parsable_tunnel_type {
+ UDP_TUNNEL_TYPE_VXLAN = 1,
+ UDP_TUNNEL_TYPE_GENEVE = 2,
+ UDP_TUNNEL_TYPE_VXLAN_GPE = 4,
+};
+
+enum udp_tunnel_nic_info_flags {
+ UDP_TUNNEL_NIC_INFO_MAY_SLEEP = 1,
+ UDP_TUNNEL_NIC_INFO_OPEN_ONLY = 2,
+ UDP_TUNNEL_NIC_INFO_IPV4_ONLY = 4,
+ UDP_TUNNEL_NIC_INFO_STATIC_IANA_VXLAN = 8,
+};
+
+struct genl_multicast_group {
+ char name[16];
+ u8 flags;
+};
+
+struct genl_split_ops;
+
+struct genl_ops;
+
+struct genl_small_ops;
+
+struct genl_family {
+ unsigned int hdrsize;
+ char name[16];
+ unsigned int version;
+ unsigned int maxattr;
+ u8 netnsok: 1;
+ u8 parallel_ops: 1;
+ u8 n_ops;
+ u8 n_small_ops;
+ u8 n_split_ops;
+ u8 n_mcgrps;
+ u8 resv_start_op;
+ const struct nla_policy *policy;
+ int (*pre_doit)(const struct genl_split_ops *, struct sk_buff *, struct genl_info *);
+ void (*post_doit)(const struct genl_split_ops *, struct sk_buff *, struct genl_info *);
+ const struct genl_ops *ops;
+ const struct genl_small_ops *small_ops;
+ const struct genl_split_ops *split_ops;
+ const struct genl_multicast_group *mcgrps;
+ struct module *module;
+ int id;
+ unsigned int mcgrp_offset;
+};
+
+struct genl_split_ops {
+ union {
+ struct {
+ int (*pre_doit)(const struct genl_split_ops *, struct sk_buff *, struct genl_info *);
+ int (*doit)(struct sk_buff *, struct genl_info *);
+ void (*post_doit)(const struct genl_split_ops *, struct sk_buff *, struct genl_info *);
+ };
+ struct {
+ int (*start)(struct netlink_callback *);
+ int (*dumpit)(struct sk_buff *, struct netlink_callback *);
+ int (*done)(struct netlink_callback *);
+ };
+ };
+ const struct nla_policy *policy;
+ unsigned int maxattr;
+ u8 cmd;
+ u8 internal_flags;
+ u8 flags;
+ u8 validate;
+};
+
+struct genl_ops {
+ int (*doit)(struct sk_buff *, struct genl_info *);
+ int (*start)(struct netlink_callback *);
+ int (*dumpit)(struct sk_buff *, struct netlink_callback *);
+ int (*done)(struct netlink_callback *);
+ const struct nla_policy *policy;
+ unsigned int maxattr;
+ u8 cmd;
+ u8 internal_flags;
+ u8 flags;
+ u8 validate;
+};
+
+struct genl_small_ops {
+ int (*doit)(struct sk_buff *, struct genl_info *);
+ int (*dumpit)(struct sk_buff *, struct netlink_callback *);
+ u8 cmd;
+ u8 internal_flags;
+ u8 flags;
+ u8 validate;
+};
+
+struct genl_dumpit_info {
+ const struct genl_family *family;
+ struct genl_split_ops op;
+ struct nlattr **attrs;
+};
+
+struct ethnl_tunnel_info_dump_ctx {
+ struct ethnl_req_info req_info;
+ int pos_hash;
+ int pos_idx;
+};
+
+struct packet_type {
+ __be16 type;
+ bool ignore_outgoing;
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ int (*func)(struct sk_buff *, struct net_device *, struct packet_type *, struct net_device *);
+ void (*list_func)(struct list_head *, struct packet_type *, struct net_device *);
+ bool (*id_match)(struct packet_type *, struct sock *);
+ struct net *af_packet_net;
+ void *af_packet_priv;
+ struct list_head list;
+};
+
+struct netdev_notifier_change_info {
+ struct netdev_notifier_info info;
+ unsigned int flags_changed;
+};
+
+struct arpreq {
+ struct sockaddr arp_pa;
+ struct sockaddr arp_ha;
+ int arp_flags;
+ struct sockaddr arp_netmask;
+ char arp_dev[16];
+};
+
+struct arphdr {
+ __be16 ar_hrd;
+ __be16 ar_pro;
+ unsigned char ar_hln;
+ unsigned char ar_pln;
+ __be16 ar_op;
+};
+
+enum {
+ NEIGH_ARP_TABLE = 0,
+ NEIGH_ND_TABLE = 1,
+ NEIGH_DN_TABLE = 2,
+ NEIGH_NR_TABLES = 3,
+ NEIGH_LINK_TABLE = 3,
+};
+
+struct neigh_seq_state {
+ struct seq_net_private p;
+ struct neigh_table *tbl;
+ struct neigh_hash_table *nht;
+ void * (*neigh_sub_iter)(struct neigh_seq_state *, struct neighbour *, loff_t *);
+ unsigned int bucket;
+ unsigned int flags;
+};
+
+struct neighbour_cb {
+ long unsigned int sched_next;
+ unsigned int flags;
+};
+
+enum {
+ AX25_VALUES_IPDEFMODE = 0,
+ AX25_VALUES_AXDEFMODE = 1,
+ AX25_VALUES_BACKOFF = 2,
+ AX25_VALUES_CONMODE = 3,
+ AX25_VALUES_WINDOW = 4,
+ AX25_VALUES_EWINDOW = 5,
+ AX25_VALUES_T1 = 6,
+ AX25_VALUES_T2 = 7,
+ AX25_VALUES_T3 = 8,
+ AX25_VALUES_IDLE = 9,
+ AX25_VALUES_N2 = 10,
+ AX25_VALUES_PACLEN = 11,
+ AX25_VALUES_PROTOCOL = 12,
+ AX25_VALUES_DS_TIMEOUT = 13,
+ AX25_MAX_VALUES = 14,
+};
+
+struct pci_raw_ops {
+ int (*read)(unsigned int, unsigned int, unsigned int, int, int, u32 *);
+ int (*write)(unsigned int, unsigned int, unsigned int, int, int, u32);
+};
+
+struct irqaction {
+ irq_handler_t handler;
+ void *dev_id;
+ void *percpu_dev_id;
+ struct irqaction *next;
+ irq_handler_t thread_fn;
+ struct task_struct *thread;
+ struct irqaction *secondary;
+ unsigned int irq;
+ unsigned int flags;
+ long unsigned int thread_flags;
+ long unsigned int thread_mask;
+ const char *name;
+ struct proc_dir_entry *dir;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct irq_affinity_notify {
+ unsigned int irq;
+ struct kref kref;
+ struct work_struct work;
+ void (*notify)(struct irq_affinity_notify *, const cpumask_t *);
+ void (*release)(struct kref *);
+};
+
+enum irqchip_irq_state {
+ IRQCHIP_STATE_PENDING = 0,
+ IRQCHIP_STATE_ACTIVE = 1,
+ IRQCHIP_STATE_MASKED = 2,
+ IRQCHIP_STATE_LINE_LEVEL = 3,
+};
+
+struct irq_desc;
+
+typedef void (*irq_flow_handler_t)(struct irq_desc *);
+
+struct msi_desc;
+
+struct irq_common_data {
+ unsigned int state_use_accessors;
+ unsigned int node;
+ void *handler_data;
+ struct msi_desc *msi_desc;
+ cpumask_var_t affinity;
+ cpumask_var_t effective_affinity;
+};
+
+struct irq_chip;
+
+struct irq_data {
+ u32 mask;
+ unsigned int irq;
+ long unsigned int hwirq;
+ struct irq_common_data *common;
+ struct irq_chip *chip;
+ struct irq_domain *domain;
+ struct irq_data *parent_data;
+ void *chip_data;
+};
+
+struct irq_desc {
+ struct irq_common_data irq_common_data;
+ struct irq_data irq_data;
+ unsigned int *kstat_irqs;
+ irq_flow_handler_t handle_irq;
+ struct irqaction *action;
+ unsigned int status_use_accessors;
+ unsigned int core_internal_state__do_not_mess_with_it;
+ unsigned int depth;
+ unsigned int wake_depth;
+ unsigned int tot_count;
+ unsigned int irq_count;
+ long unsigned int last_unhandled;
+ unsigned int irqs_unhandled;
+ atomic_t threads_handled;
+ int threads_handled_last;
+ raw_spinlock_t lock;
+ struct cpumask *percpu_enabled;
+ const struct cpumask *percpu_affinity;
+ const struct cpumask *affinity_hint;
+ struct irq_affinity_notify *affinity_notify;
+ cpumask_var_t pending_mask;
+ long unsigned int threads_oneshot;
+ atomic_t threads_active;
+ wait_queue_head_t wait_for_threads;
+ unsigned int nr_actions;
+ unsigned int no_suspend_depth;
+ unsigned int cond_suspend_depth;
+ unsigned int force_resume_depth;
+ struct proc_dir_entry *dir;
+ struct callback_head rcu;
+ struct kobject kobj;
+ struct mutex request_mutex;
+ int parent_irq;
+ struct module *owner;
+ const char *name;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct msi_msg;
+
+struct irq_chip {
+ const char *name;
+ unsigned int (*irq_startup)(struct irq_data *);
+ void (*irq_shutdown)(struct irq_data *);
+ void (*irq_enable)(struct irq_data *);
+ void (*irq_disable)(struct irq_data *);
+ void (*irq_ack)(struct irq_data *);
+ void (*irq_mask)(struct irq_data *);
+ void (*irq_mask_ack)(struct irq_data *);
+ void (*irq_unmask)(struct irq_data *);
+ void (*irq_eoi)(struct irq_data *);
+ int (*irq_set_affinity)(struct irq_data *, const struct cpumask *, bool);
+ int (*irq_retrigger)(struct irq_data *);
+ int (*irq_set_type)(struct irq_data *, unsigned int);
+ int (*irq_set_wake)(struct irq_data *, unsigned int);
+ void (*irq_bus_lock)(struct irq_data *);
+ void (*irq_bus_sync_unlock)(struct irq_data *);
+ void (*irq_suspend)(struct irq_data *);
+ void (*irq_resume)(struct irq_data *);
+ void (*irq_pm_shutdown)(struct irq_data *);
+ void (*irq_calc_mask)(struct irq_data *);
+ void (*irq_print_chip)(struct irq_data *, struct seq_file *);
+ int (*irq_request_resources)(struct irq_data *);
+ void (*irq_release_resources)(struct irq_data *);
+ void (*irq_compose_msi_msg)(struct irq_data *, struct msi_msg *);
+ void (*irq_write_msi_msg)(struct irq_data *, struct msi_msg *);
+ int (*irq_get_irqchip_state)(struct irq_data *, enum irqchip_irq_state, bool *);
+ int (*irq_set_irqchip_state)(struct irq_data *, enum irqchip_irq_state, bool);
+ int (*irq_set_vcpu_affinity)(struct irq_data *, void *);
+ void (*ipi_send_single)(struct irq_data *, unsigned int);
+ void (*ipi_send_mask)(struct irq_data *, const struct cpumask *);
+ int (*irq_nmi_setup)(struct irq_data *);
+ void (*irq_nmi_teardown)(struct irq_data *);
+ long unsigned int flags;
+};
+
+struct irq_chip_regs {
+ long unsigned int enable;
+ long unsigned int disable;
+ long unsigned int mask;
+ long unsigned int ack;
+ long unsigned int eoi;
+ long unsigned int type;
+ long unsigned int polarity;
+};
+
+struct irq_chip_type {
+ struct irq_chip chip;
+ struct irq_chip_regs regs;
+ irq_flow_handler_t handler;
+ u32 type;
+ u32 mask_cache_priv;
+ u32 *mask_cache;
+};
+
+struct irq_chip_generic {
+ raw_spinlock_t lock;
+ void *reg_base;
+ u32 (*reg_readl)(void *);
+ void (*reg_writel)(u32, void *);
+ void (*suspend)(struct irq_chip_generic *);
+ void (*resume)(struct irq_chip_generic *);
+ unsigned int irq_base;
+ unsigned int irq_cnt;
+ u32 mask_cache;
+ u32 type_cache;
+ u32 polarity_cache;
+ u32 wake_enabled;
+ u32 wake_active;
+ unsigned int num_ct;
+ void *private;
+ long unsigned int installed;
+ long unsigned int unused;
+ struct irq_domain *domain;
+ struct list_head list;
+ struct irq_chip_type chip_types[0];
+};
+
+enum irq_gc_flags {
+ IRQ_GC_INIT_MASK_CACHE = 1,
+ IRQ_GC_INIT_NESTED_LOCK = 2,
+ IRQ_GC_MASK_CACHE_PER_TYPE = 4,
+ IRQ_GC_NO_MASK = 8,
+ IRQ_GC_BE_IO = 16,
+};
+
+struct irq_domain_chip_generic {
+ unsigned int irqs_per_chip;
+ unsigned int num_chips;
+ unsigned int irq_flags_to_clear;
+ unsigned int irq_flags_to_set;
+ enum irq_gc_flags gc_flags;
+ struct irq_chip_generic *gc[0];
+};
+
+struct irq_info {
+ u8 bus;
+ u8 devfn;
+ struct {
+ u8 link;
+ u16 bitmap;
+ } __attribute__((packed)) irq[4];
+ u8 slot;
+ u8 rfu;
+};
+
+struct irq_routing_table {
+ u32 signature;
+ u16 version;
+ u16 size;
+ u8 rtr_bus;
+ u8 rtr_devfn;
+ u16 exclusive_irqs;
+ u16 rtr_vendor;
+ u16 rtr_device;
+ u32 miniport_data;
+ u8 rfu[11];
+ u8 checksum;
+ struct irq_info slots[0];
+};
+
+struct irt_routing_table {
+ u32 signature;
+ u8 size;
+ u8 used;
+ u16 exclusive_irqs;
+ struct irq_info slots[0];
+};
+
+struct irq_router {
+ char *name;
+ u16 vendor;
+ u16 device;
+ int (*get)(struct pci_dev *, struct pci_dev *, int);
+ int (*set)(struct pci_dev *, struct pci_dev *, int, int);
+ int (*lvl)(struct pci_dev *, struct pci_dev *, int, int);
+};
+
+struct irq_router_handler {
+ u16 vendor;
+ int (*probe)(struct irq_router *, struct pci_dev *, u16);
+};
+
+struct subprocess_info {
+ struct work_struct work;
+ struct completion *complete;
+ const char *path;
+ char **argv;
+ char **envp;
+ int wait;
+ int retval;
+ int (*init)(struct subprocess_info *, struct cred *);
+ void (*cleanup)(struct subprocess_info *);
+ void *data;
+};
+
+struct x86_cpu_id {
+ __u16 vendor;
+ __u16 family;
+ __u16 model;
+ __u16 steppings;
+ __u16 feature;
+ kernel_ulong_t driver_data;
+};
+
+struct x86_cpu_desc {
+ u8 x86_family;
+ u8 x86_vendor;
+ u8 x86_model;
+ u8 x86_stepping;
+ u32 x86_microcode_rev;
+};
+
+struct cpuid_regs {
+ u32 eax;
+ u32 ebx;
+ u32 ecx;
+ u32 edx;
+};
+
+enum pconfig_target {
+ INVALID_TARGET = 0,
+ MKTME_TARGET = 1,
+ PCONFIG_TARGET_NR = 2,
+};
+
+enum {
+ PCONFIG_CPUID_SUBLEAF_INVALID = 0,
+ PCONFIG_CPUID_SUBLEAF_TARGETID = 1,
+};
+
+struct syscore_ops {
+ struct list_head node;
+ int (*suspend)();
+ void (*resume)();
+ void (*shutdown)();
+};
+
+enum energy_perf_value_index {
+ EPB_INDEX_PERFORMANCE = 0,
+ EPB_INDEX_BALANCE_PERFORMANCE = 1,
+ EPB_INDEX_NORMAL = 2,
+ EPB_INDEX_BALANCE_POWERSAVE = 3,
+ EPB_INDEX_POWERSAVE = 4,
+};
+
+enum bug_trap_type {
+ BUG_TRAP_TYPE_NONE = 0,
+ BUG_TRAP_TYPE_WARN = 1,
+ BUG_TRAP_TYPE_BUG = 2,
+};
+
+enum xen_domain_type {
+ XEN_NATIVE = 0,
+ XEN_PV_DOMAIN = 1,
+ XEN_HVM_DOMAIN = 2,
+};
+
+typedef unsigned int insn_attr_t;
+
+typedef unsigned char insn_byte_t;
+
+typedef int insn_value_t;
+
+struct insn_field {
+ union {
+ insn_value_t value;
+ insn_byte_t bytes[4];
+ };
+ unsigned char got;
+ unsigned char nbytes;
+};
+
+struct insn {
+ struct insn_field prefixes;
+ struct insn_field rex_prefix;
+ struct insn_field vex_prefix;
+ struct insn_field opcode;
+ struct insn_field modrm;
+ struct insn_field sib;
+ struct insn_field displacement;
+ union {
+ struct insn_field immediate;
+ struct insn_field moffset1;
+ struct insn_field immediate1;
+ };
+ union {
+ struct insn_field moffset2;
+ struct insn_field immediate2;
+ };
+ int emulate_prefix_size;
+ insn_attr_t attr;
+ unsigned char opnd_bytes;
+ unsigned char addr_bytes;
+ unsigned char length;
+ unsigned char x86_64;
+ const insn_byte_t *kaddr;
+ const insn_byte_t *end_kaddr;
+ const insn_byte_t *next_byte;
+};
+
+enum insn_mode {
+ INSN_MODE_32 = 0,
+ INSN_MODE_64 = 1,
+ INSN_MODE_KERN = 2,
+ INSN_NUM_MODES = 3,
+};
+
+typedef struct {
+ u64 val;
+} pfn_t;
+
+struct memtype {
+ u64 start;
+ u64 end;
+ u64 subtree_max_end;
+ enum page_cache_mode type;
+ struct rb_node rb;
+};
+
+enum {
+ PAT_UC = 0,
+ PAT_WC = 1,
+ PAT_WT = 4,
+ PAT_WP = 5,
+ PAT_WB = 6,
+ PAT_UC_MINUS = 7,
+};
+
+struct pagerange_state {
+ long unsigned int cur_pfn;
+ int ram;
+ int not_ram;
+};
+
+typedef int __kernel_mqd_t;
+
+typedef __kernel_mqd_t mqd_t;
+
+enum audit_state {
+ AUDIT_STATE_DISABLED = 0,
+ AUDIT_STATE_BUILD = 1,
+ AUDIT_STATE_RECORD = 2,
+};
+
+struct audit_cap_data {
+ kernel_cap_t permitted;
+ kernel_cap_t inheritable;
+ union {
+ unsigned int fE;
+ kernel_cap_t effective;
+ };
+ kernel_cap_t ambient;
+ kuid_t rootid;
+};
+
+struct audit_names {
+ struct list_head list;
+ struct filename *name;
+ int name_len;
+ bool hidden;
+ long unsigned int ino;
+ dev_t dev;
+ umode_t mode;
+ kuid_t uid;
+ kgid_t gid;
+ dev_t rdev;
+ u32 osid;
+ struct audit_cap_data fcap;
+ unsigned int fcap_ver;
+ unsigned char type;
+ bool should_free;
+};
+
+struct mq_attr {
+ __kernel_long_t mq_flags;
+ __kernel_long_t mq_maxmsg;
+ __kernel_long_t mq_msgsize;
+ __kernel_long_t mq_curmsgs;
+ __kernel_long_t __reserved[4];
+};
+
+struct open_how {
+ __u64 flags;
+ __u64 mode;
+ __u64 resolve;
+};
+
+struct audit_ntp_val {
+ long long int oldval;
+ long long int newval;
+};
+
+struct audit_ntp_data {
+ struct audit_ntp_val vals[6];
+};
+
+struct audit_proctitle {
+ int len;
+ char *value;
+};
+
+struct audit_aux_data;
+
+struct audit_tree_refs;
+
+struct audit_context {
+ int dummy;
+ enum {
+ AUDIT_CTX_UNUSED = 0,
+ AUDIT_CTX_SYSCALL = 1,
+ AUDIT_CTX_URING = 2,
+ } context;
+ enum audit_state state;
+ enum audit_state current_state;
+ unsigned int serial;
+ int major;
+ int uring_op;
+ struct timespec64 ctime;
+ long unsigned int argv[4];
+ long int return_code;
+ u64 prio;
+ int return_valid;
+ struct audit_names preallocated_names[5];
+ int name_count;
+ struct list_head names_list;
+ char *filterkey;
+ struct path pwd;
+ struct audit_aux_data *aux;
+ struct audit_aux_data *aux_pids;
+ struct __kernel_sockaddr_storage *sockaddr;
+ size_t sockaddr_len;
+ pid_t ppid;
+ kuid_t uid;
+ kuid_t euid;
+ kuid_t suid;
+ kuid_t fsuid;
+ kgid_t gid;
+ kgid_t egid;
+ kgid_t sgid;
+ kgid_t fsgid;
+ long unsigned int personality;
+ int arch;
+ pid_t target_pid;
+ kuid_t target_auid;
+ kuid_t target_uid;
+ unsigned int target_sessionid;
+ u32 target_sid;
+ char target_comm[16];
+ struct audit_tree_refs *trees;
+ struct audit_tree_refs *first_trees;
+ struct list_head killed_trees;
+ int tree_count;
+ int type;
+ union {
+ struct {
+ int nargs;
+ long int args[6];
+ } socketcall;
+ struct {
+ kuid_t uid;
+ kgid_t gid;
+ umode_t mode;
+ u32 osid;
+ int has_perm;
+ uid_t perm_uid;
+ gid_t perm_gid;
+ umode_t perm_mode;
+ long unsigned int qbytes;
+ } ipc;
+ struct {
+ mqd_t mqdes;
+ struct mq_attr mqstat;
+ } mq_getsetattr;
+ struct {
+ mqd_t mqdes;
+ int sigev_signo;
+ } mq_notify;
+ struct {
+ mqd_t mqdes;
+ size_t msg_len;
+ unsigned int msg_prio;
+ struct timespec64 abs_timeout;
+ } mq_sendrecv;
+ struct {
+ int oflag;
+ umode_t mode;
+ struct mq_attr attr;
+ } mq_open;
+ struct {
+ pid_t pid;
+ struct audit_cap_data cap;
+ } capset;
+ struct {
+ int fd;
+ int flags;
+ } mmap;
+ struct open_how openat2;
+ struct {
+ int argc;
+ } execve;
+ struct {
+ char *name;
+ } module;
+ struct {
+ struct audit_ntp_data ntp_data;
+ struct timespec64 tk_injoffset;
+ } time;
+ };
+ int fds[2];
+ struct audit_proctitle proctitle;
+};
+
+struct audit_rule_data {
+ __u32 flags;
+ __u32 action;
+ __u32 field_count;
+ __u32 mask[64];
+ __u32 fields[64];
+ __u32 values[64];
+ __u32 fieldflags[64];
+ __u32 buflen;
+ char buf[0];
+};
+
+struct audit_entry {
+ struct list_head list;
+ struct callback_head rcu;
+ struct audit_krule rule;
+};
+
+struct audit_netlink_list {
+ __u32 portid;
+ struct net *net;
+ struct sk_buff_head q;
+};
+
+struct __kernel_old_timeval {
+ __kernel_long_t tv_sec;
+ __kernel_long_t tv_usec;
+};
+
+typedef long unsigned int elf_greg_t;
+
+typedef elf_greg_t elf_gregset_t[27];
+
+struct elf64_phdr {
+ Elf64_Word p_type;
+ Elf64_Word p_flags;
+ Elf64_Off p_offset;
+ Elf64_Addr p_vaddr;
+ Elf64_Addr p_paddr;
+ Elf64_Xword p_filesz;
+ Elf64_Xword p_memsz;
+ Elf64_Xword p_align;
+};
+
+struct elf64_note {
+ Elf64_Word n_namesz;
+ Elf64_Word n_descsz;
+ Elf64_Word n_type;
+};
+
+struct elf_siginfo {
+ int si_signo;
+ int si_code;
+ int si_errno;
+};
+
+struct elf_prstatus_common {
+ struct elf_siginfo pr_info;
+ short int pr_cursig;
+ long unsigned int pr_sigpend;
+ long unsigned int pr_sighold;
+ pid_t pr_pid;
+ pid_t pr_ppid;
+ pid_t pr_pgrp;
+ pid_t pr_sid;
+ struct __kernel_old_timeval pr_utime;
+ struct __kernel_old_timeval pr_stime;
+ struct __kernel_old_timeval pr_cutime;
+ struct __kernel_old_timeval pr_cstime;
+};
+
+struct elf_prstatus {
+ struct elf_prstatus_common common;
+ elf_gregset_t pr_reg;
+ int pr_fpvalid;
+};
+
+struct elf_prpsinfo {
+ char pr_state;
+ char pr_sname;
+ char pr_zomb;
+ char pr_nice;
+ long unsigned int pr_flag;
+ __kernel_uid_t pr_uid;
+ __kernel_gid_t pr_gid;
+ pid_t pr_pid;
+ pid_t pr_ppid;
+ pid_t pr_pgrp;
+ pid_t pr_sid;
+ char pr_fname[16];
+ char pr_psargs[80];
+};
+
+enum {
+ I_DATA_SEM_NORMAL = 0,
+ I_DATA_SEM_OTHER = 1,
+ I_DATA_SEM_QUOTA = 2,
+};
+
+struct assoc_array_ops {
+ long unsigned int (*get_key_chunk)(const void *, int);
+ long unsigned int (*get_object_key_chunk)(const void *, int);
+ bool (*compare_object)(const void *, const void *);
+ int (*diff_objects)(const void *, const void *);
+ void (*free_object)(void *);
+};
+
+enum key_need_perm {
+ KEY_NEED_UNSPECIFIED = 0,
+ KEY_NEED_VIEW = 1,
+ KEY_NEED_READ = 2,
+ KEY_NEED_WRITE = 3,
+ KEY_NEED_SEARCH = 4,
+ KEY_NEED_LINK = 5,
+ KEY_NEED_SETATTR = 6,
+ KEY_NEED_UNLINK = 7,
+ KEY_SYSADMIN_OVERRIDE = 8,
+ KEY_AUTHTOKEN_OVERRIDE = 9,
+ KEY_DEFER_PERM_CHECK = 10,
+};
+
+enum key_state {
+ KEY_IS_UNINSTANTIATED = 0,
+ KEY_IS_POSITIVE = 1,
+};
+
+struct key_user {
+ struct rb_node node;
+ struct mutex cons_lock;
+ spinlock_t lock;
+ refcount_t usage;
+ atomic_t nkeys;
+ atomic_t nikeys;
+ kuid_t uid;
+ int qnkeys;
+ int qnbytes;
+};
+
+struct assoc_array_node {
+ struct assoc_array_ptr *back_pointer;
+ u8 parent_slot;
+ struct assoc_array_ptr *slots[16];
+ long unsigned int nr_leaves_on_branch;
+};
+
+struct assoc_array_shortcut {
+ struct assoc_array_ptr *back_pointer;
+ int parent_slot;
+ int skip_to_level;
+ struct assoc_array_ptr *next_node;
+ long unsigned int index_key[0];
+};
+
+struct assoc_array_edit {
+ struct callback_head rcu;
+ struct assoc_array *array;
+ const struct assoc_array_ops *ops;
+ const struct assoc_array_ops *ops_for_excised_subtree;
+ struct assoc_array_ptr *leaf;
+ struct assoc_array_ptr **leaf_p;
+ struct assoc_array_ptr *dead_leaf;
+ struct assoc_array_ptr *new_meta[3];
+ struct assoc_array_ptr *excised_meta[1];
+ struct assoc_array_ptr *excised_subtree;
+ struct assoc_array_ptr **set_backpointers[16];
+ struct assoc_array_ptr *set_backpointers_to;
+ struct assoc_array_node *adjust_count_on;
+ long int adjust_count_by;
+ struct {
+ struct assoc_array_ptr **ptr;
+ struct assoc_array_ptr *to;
+ } set[2];
+ struct {
+ u8 *p;
+ u8 to;
+ } set_parent_slot[1];
+ u8 segment_cache[17];
+};
+
+enum key_notification_subtype {
+ NOTIFY_KEY_INSTANTIATED = 0,
+ NOTIFY_KEY_UPDATED = 1,
+ NOTIFY_KEY_LINKED = 2,
+ NOTIFY_KEY_UNLINKED = 3,
+ NOTIFY_KEY_CLEARED = 4,
+ NOTIFY_KEY_REVOKED = 5,
+ NOTIFY_KEY_INVALIDATED = 6,
+ NOTIFY_KEY_SETATTR = 7,
+};
+
+struct keyring_search_context {
+ struct keyring_index_key index_key;
+ const struct cred *cred;
+ struct key_match_data match_data;
+ unsigned int flags;
+ int (*iterator)(const void *, void *);
+ int skipped_ret;
+ bool possessed;
+ key_ref_t result;
+ time64_t now;
+};
+
+struct keyring_read_iterator_context {
+ size_t buflen;
+ size_t count;
+ key_serial_t *buffer;
+};
+
+struct rchan;
+
+struct blk_trace {
+ int trace_state;
+ struct rchan *rchan;
+ long unsigned int *sequence;
+ unsigned char *msg_data;
+ u16 act_mask;
+ u64 start_lba;
+ u64 end_lba;
+ u32 pid;
+ u32 dev;
+ struct dentry *dir;
+ struct list_head running_list;
+ atomic_t dropped;
+};
+
+struct rchan_buf {
+ void *start;
+ void *data;
+ size_t offset;
+ size_t subbufs_produced;
+ size_t subbufs_consumed;
+ struct rchan *chan;
+ wait_queue_head_t read_wait;
+ struct irq_work wakeup_work;
+ struct dentry *dentry;
+ struct kref kref;
+ struct page **page_array;
+ unsigned int page_count;
+ unsigned int finalized;
+ size_t *padding;
+ size_t prev_padding;
+ size_t bytes_consumed;
+ size_t early_bytes;
+ unsigned int cpu;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct rchan_callbacks;
+
+struct rchan {
+ u32 version;
+ size_t subbuf_size;
+ size_t n_subbufs;
+ size_t alloc_size;
+ const struct rchan_callbacks *cb;
+ struct kref kref;
+ void *private_data;
+ size_t last_toobig;
+ struct rchan_buf **buf;
+ int is_global;
+ struct list_head list;
+ struct dentry *parent;
+ int has_base_filename;
+ char base_filename[255];
+};
+
+struct rchan_callbacks {
+ int (*subbuf_start)(struct rchan_buf *, void *, void *, size_t);
+ struct dentry * (*create_buf_file)(const char *, struct dentry *, umode_t, struct rchan_buf *, int *);
+ int (*remove_buf_file)(struct dentry *);
+};
+
+enum blktrace_act {
+ __BLK_TA_QUEUE = 1,
+ __BLK_TA_BACKMERGE = 2,
+ __BLK_TA_FRONTMERGE = 3,
+ __BLK_TA_GETRQ = 4,
+ __BLK_TA_SLEEPRQ = 5,
+ __BLK_TA_REQUEUE = 6,
+ __BLK_TA_ISSUE = 7,
+ __BLK_TA_COMPLETE = 8,
+ __BLK_TA_PLUG = 9,
+ __BLK_TA_UNPLUG_IO = 10,
+ __BLK_TA_UNPLUG_TIMER = 11,
+ __BLK_TA_INSERT = 12,
+ __BLK_TA_SPLIT = 13,
+ __BLK_TA_BOUNCE = 14,
+ __BLK_TA_REMAP = 15,
+ __BLK_TA_ABORT = 16,
+ __BLK_TA_DRV_DATA = 17,
+ __BLK_TA_CGROUP = 256,
+};
+
+struct trace_event_raw_kyber_latency {
+ struct trace_entry ent;
+ dev_t dev;
+ char domain[16];
+ char type[8];
+ u8 percentile;
+ u8 numerator;
+ u8 denominator;
+ unsigned int samples;
+ char __data[0];
+};
+
+struct trace_event_raw_kyber_adjust {
+ struct trace_entry ent;
+ dev_t dev;
+ char domain[16];
+ unsigned int depth;
+ char __data[0];
+};
+
+struct trace_event_raw_kyber_throttled {
+ struct trace_entry ent;
+ dev_t dev;
+ char domain[16];
+ char __data[0];
+};
+
+struct trace_event_data_offsets_kyber_latency {};
+
+struct trace_event_data_offsets_kyber_adjust {};
+
+struct trace_event_data_offsets_kyber_throttled {};
+
+typedef void (*btf_trace_kyber_latency)(void *, dev_t, const char *, const char *, unsigned int, unsigned int, unsigned int, unsigned int);
+
+typedef void (*btf_trace_kyber_adjust)(void *, dev_t, const char *, unsigned int);
+
+typedef void (*btf_trace_kyber_throttled)(void *, dev_t, const char *);
+
+enum {
+ KYBER_READ = 0,
+ KYBER_WRITE = 1,
+ KYBER_DISCARD = 2,
+ KYBER_OTHER = 3,
+ KYBER_NUM_DOMAINS = 4,
+};
+
+enum {
+ KYBER_ASYNC_PERCENT = 75,
+};
+
+enum {
+ KYBER_LATENCY_SHIFT = 2,
+ KYBER_GOOD_BUCKETS = 4,
+ KYBER_LATENCY_BUCKETS = 8,
+};
+
+enum {
+ KYBER_TOTAL_LATENCY = 0,
+ KYBER_IO_LATENCY = 1,
+};
+
+struct kyber_cpu_latency {
+ atomic_t buckets[48];
+};
+
+struct kyber_ctx_queue {
+ spinlock_t lock;
+ struct list_head rq_list[4];
+};
+
+struct kyber_queue_data {
+ struct request_queue *q;
+ dev_t dev;
+ struct sbitmap_queue domain_tokens[4];
+ unsigned int async_depth;
+ struct kyber_cpu_latency *cpu_latency;
+ struct timer_list timer;
+ unsigned int latency_buckets[48];
+ long unsigned int latency_timeout[3];
+ int domain_p99[3];
+ u64 latency_targets[3];
+};
+
+struct kyber_hctx_data {
+ spinlock_t lock;
+ struct list_head rqs[4];
+ unsigned int cur_domain;
+ unsigned int batching;
+ struct kyber_ctx_queue *kcqs;
+ struct sbitmap kcq_map[4];
+ struct sbq_wait domain_wait[4];
+ struct sbq_wait_state *domain_ws[4];
+ atomic_t wait_index[4];
+};
+
+struct flush_kcq_data {
+ struct kyber_hctx_data *khd;
+ unsigned int sched_domain;
+ struct list_head *list;
+};
+
+struct dmt_videomode {
+ u32 dmt_id;
+ u32 std_2byte_code;
+ u32 cvt_3byte_code;
+ const struct fb_videomode *mode;
+};
+
+struct fb_modelist {
+ struct list_head list;
+ struct fb_videomode mode;
+};
+
+typedef u32 (*acpi_osd_handler)(void *);
+
+struct acpi_gpe_device_info {
+ u32 index;
+ u32 next_block_base_index;
+ acpi_status status;
+ struct acpi_namespace_node *gpe_device;
+};
+
+typedef acpi_status (*acpi_gpe_callback)(struct acpi_gpe_xrupt_info *, struct acpi_gpe_block_info *, void *);
+
+struct acpi_port_info {
+ char *name;
+ u16 start;
+ u16 end;
+ u8 osi_dependency;
+};
+
+struct acpi_common_descriptor {
+ void *common_pointer;
+ u8 descriptor_type;
+};
+
+union acpi_descriptor {
+ struct acpi_common_descriptor common;
+ union acpi_operand_object object;
+ struct acpi_namespace_node node;
+ union acpi_parse_object op;
+};
+
+enum acpi_return_package_types {
+ ACPI_PTYPE1_FIXED = 1,
+ ACPI_PTYPE1_VAR = 2,
+ ACPI_PTYPE1_OPTION = 3,
+ ACPI_PTYPE2 = 4,
+ ACPI_PTYPE2_COUNT = 5,
+ ACPI_PTYPE2_PKG_COUNT = 6,
+ ACPI_PTYPE2_FIXED = 7,
+ ACPI_PTYPE2_MIN = 8,
+ ACPI_PTYPE2_REV_FIXED = 9,
+ ACPI_PTYPE2_FIX_VAR = 10,
+ ACPI_PTYPE2_VAR_VAR = 11,
+ ACPI_PTYPE2_UUID_PAIR = 12,
+ ACPI_PTYPE_CUSTOM = 13,
+};
+
+struct acpi_table_rsdp {
+ char signature[8];
+ u8 checksum;
+ char oem_id[6];
+ u8 revision;
+ u32 rsdt_physical_address;
+ u32 length;
+ u64 xsdt_physical_address;
+ u8 extended_checksum;
+ u8 reserved[3];
+} __attribute__((packed));
+
+struct acpi_table_facs {
+ char signature[4];
+ u32 length;
+ u32 hardware_signature;
+ u32 firmware_waking_vector;
+ u32 global_lock;
+ u32 flags;
+ u64 xfirmware_waking_vector;
+ u8 version;
+ u8 reserved[3];
+ u32 ospm_flags;
+ u8 reserved1[24];
+};
+
+struct acpi_table_desc {
+ acpi_physical_address address;
+ struct acpi_table_header *pointer;
+ u32 length;
+ union acpi_name_union signature;
+ acpi_owner_id owner_id;
+ u8 flags;
+ u16 validation_count;
+};
+
+struct acpi_table_list {
+ struct acpi_table_desc *tables;
+ u32 current_table_count;
+ u32 max_table_count;
+ u8 flags;
+};
+
+typedef u32 phys_cpuid_t;
+
+struct acpi_processor_cx {
+ u8 valid;
+ u8 type;
+ u32 address;
+ u8 entry_method;
+ u8 index;
+ u32 latency;
+ u8 bm_sts_skip;
+ char desc[32];
+};
+
+struct acpi_lpi_state {
+ u32 min_residency;
+ u32 wake_latency;
+ u32 flags;
+ u32 arch_flags;
+ u32 res_cnt_freq;
+ u32 enable_parent_state;
+ u64 address;
+ u8 index;
+ u8 entry_method;
+ char desc[32];
+};
+
+struct acpi_processor_power {
+ int count;
+ union {
+ struct acpi_processor_cx states[8];
+ struct acpi_lpi_state lpi_states[8];
+ };
+ int timer_broadcast_on_state;
+};
+
+struct acpi_psd_package {
+ u64 num_entries;
+ u64 revision;
+ u64 domain;
+ u64 coord_type;
+ u64 num_processors;
+};
+
+struct acpi_pct_register {
+ u8 descriptor;
+ u16 length;
+ u8 space_id;
+ u8 bit_width;
+ u8 bit_offset;
+ u8 reserved;
+ u64 address;
+} __attribute__((packed));
+
+struct acpi_processor_px {
+ u64 core_frequency;
+ u64 power;
+ u64 transition_latency;
+ u64 bus_master_latency;
+ u64 control;
+ u64 status;
+};
+
+struct acpi_processor_performance {
+ unsigned int state;
+ unsigned int platform_limit;
+ struct acpi_pct_register control_register;
+ struct acpi_pct_register status_register;
+ short: 16;
+ unsigned int state_count;
+ int: 32;
+ struct acpi_processor_px *states;
+ struct acpi_psd_package domain_info;
+ cpumask_var_t shared_cpu_map;
+ unsigned int shared_type;
+ int: 32;
+} __attribute__((packed));
+
+struct acpi_tsd_package {
+ u64 num_entries;
+ u64 revision;
+ u64 domain;
+ u64 coord_type;
+ u64 num_processors;
+};
+
+struct acpi_processor_tx_tss {
+ u64 freqpercentage;
+ u64 power;
+ u64 transition_latency;
+ u64 control;
+ u64 status;
+};
+
+struct acpi_processor_tx {
+ u16 power;
+ u16 performance;
+};
+
+struct acpi_processor;
+
+struct acpi_processor_throttling {
+ unsigned int state;
+ unsigned int platform_limit;
+ struct acpi_pct_register control_register;
+ struct acpi_pct_register status_register;
+ short: 16;
+ unsigned int state_count;
+ int: 32;
+ struct acpi_processor_tx_tss *states_tss;
+ struct acpi_tsd_package domain_info;
+ cpumask_var_t shared_cpu_map;
+ int (*acpi_processor_get_throttling)(struct acpi_processor *);
+ int (*acpi_processor_set_throttling)(struct acpi_processor *, int, bool);
+ u32 address;
+ u8 duty_offset;
+ u8 duty_width;
+ u8 tsd_valid_flag;
+ char: 8;
+ unsigned int shared_type;
+ struct acpi_processor_tx states[16];
+ int: 32;
+} __attribute__((packed));
+
+struct acpi_processor_flags {
+ u8 power: 1;
+ u8 performance: 1;
+ u8 throttling: 1;
+ u8 limit: 1;
+ u8 bm_control: 1;
+ u8 bm_check: 1;
+ u8 has_cst: 1;
+ u8 has_lpi: 1;
+ u8 power_setup_done: 1;
+ u8 bm_rld_set: 1;
+ u8 need_hotplug_init: 1;
+};
+
+struct acpi_processor_lx {
+ int px;
+ int tx;
+};
+
+struct acpi_processor_limit {
+ struct acpi_processor_lx state;
+ struct acpi_processor_lx thermal;
+ struct acpi_processor_lx user;
+};
+
+struct acpi_processor {
+ acpi_handle handle;
+ u32 acpi_id;
+ phys_cpuid_t phys_id;
+ u32 id;
+ u32 pblk;
+ int performance_platform_limit;
+ int throttling_platform_limit;
+ struct acpi_processor_flags flags;
+ struct acpi_processor_power power;
+ struct acpi_processor_performance *performance;
+ struct acpi_processor_throttling throttling;
+ struct acpi_processor_limit limit;
+ struct thermal_cooling_device *cdev;
+ struct device *dev;
+ struct freq_qos_request perflib_req;
+ struct freq_qos_request thermal_req;
+};
+
+struct acpi_processor_errata {
+ u8 smp;
+ struct {
+ u8 throttle: 1;
+ u8 fdma: 1;
+ u8 reserved: 6;
+ u32 bmisx;
+ } piix4;
+};
+
+struct throttling_tstate {
+ unsigned int cpu;
+ int target_state;
+};
+
+struct acpi_processor_throttling_arg {
+ struct acpi_processor *pr;
+ int target_state;
+ bool force;
+};
+
+struct component_ops {
+ int (*bind)(struct device *, struct device *, void *);
+ void (*unbind)(struct device *, struct device *, void *);
+};
+
+struct component_master_ops {
+ int (*bind)(struct device *);
+ void (*unbind)(struct device *);
+};
+
+typedef void (*dr_release_t)(struct device *, void *);
+
+struct component;
+
+struct component_match_array {
+ void *data;
+ int (*compare)(struct device *, void *);
+ int (*compare_typed)(struct device *, int, void *);
+ void (*release)(struct device *, void *);
+ struct component *component;
+ bool duplicate;
+};
+
+struct aggregate_device;
+
+struct component {
+ struct list_head node;
+ struct aggregate_device *adev;
+ bool bound;
+ const struct component_ops *ops;
+ int subcomponent;
+ struct device *dev;
+};
+
+struct component_match {
+ size_t alloc;
+ size_t num;
+ struct component_match_array *compare;
+};
+
+struct aggregate_device {
+ struct list_head node;
+ bool bound;
+ const struct component_master_ops *ops;
+ struct device *parent;
+ struct component_match *match;
+};
+
+enum {
+ SKBTX_HW_TSTAMP = 1,
+ SKBTX_SW_TSTAMP = 2,
+ SKBTX_IN_PROGRESS = 4,
+ SKBTX_HW_TSTAMP_USE_CYCLES = 8,
+ SKBTX_WIFI_STATUS = 16,
+ SKBTX_HW_TSTAMP_NETDEV = 32,
+ SKBTX_SCHED_TSTAMP = 64,
+};
+
+enum xdp_mem_type {
+ MEM_TYPE_PAGE_SHARED = 0,
+ MEM_TYPE_PAGE_ORDER0 = 1,
+ MEM_TYPE_PAGE_POOL = 2,
+ MEM_TYPE_XSK_BUFF_POOL = 3,
+ MEM_TYPE_MAX = 4,
+};
+
+enum skb_free_reason {
+ SKB_REASON_CONSUMED = 0,
+ SKB_REASON_DROPPED = 1,
+};
+
+enum {
+ VETH_INFO_UNSPEC = 0,
+ VETH_INFO_PEER = 1,
+ __VETH_INFO_MAX = 2,
+};
+
+struct veth_stats {
+ u64 rx_drops;
+ u64 xdp_packets;
+ u64 xdp_bytes;
+ u64 xdp_redirect;
+ u64 xdp_drops;
+ u64 xdp_tx;
+ u64 xdp_tx_err;
+ u64 peer_tq_xdp_xmit;
+ u64 peer_tq_xdp_xmit_err;
+};
+
+struct veth_rq_stats {
+ struct veth_stats vs;
+ struct u64_stats_sync syncp;
+};
+
+struct veth_rq {
+ struct napi_struct xdp_napi;
+ struct napi_struct *napi;
+ struct net_device *dev;
+ struct bpf_prog *xdp_prog;
+ struct xdp_mem_info xdp_mem;
+ struct veth_rq_stats stats;
+ bool rx_notify_masked;
+ long: 56;
+ long: 64;
+ struct ptr_ring xdp_ring;
+ struct xdp_rxq_info xdp_rxq;
+};
+
+struct veth_priv {
+ struct net_device *peer;
+ atomic64_t dropped;
+ struct bpf_prog *_xdp_prog;
+ struct veth_rq *rq;
+ unsigned int requested_headroom;
+};
+
+struct veth_xdp_tx_bq {
+ struct xdp_frame *q[16];
+ unsigned int count;
+};
+
+struct veth_q_stat_desc {
+ char desc[32];
+ size_t offset;
+};
+
+enum __sk_action {
+ __SK_DROP = 0,
+ __SK_PASS = 1,
+ __SK_REDIRECT = 2,
+ __SK_NONE = 3,
+};
+
+enum sk_psock_state_bits {
+ SK_PSOCK_TX_ENABLED = 0,
+};
+
+struct crypto_aead {
+ unsigned int authsize;
+ unsigned int reqsize;
+ struct crypto_tfm base;
+};
+
+struct tls_crypto_info {
+ __u16 version;
+ __u16 cipher_type;
+};
+
+struct tls12_crypto_info_aes_gcm_128 {
+ struct tls_crypto_info info;
+ unsigned char iv[8];
+ unsigned char key[16];
+ unsigned char salt[4];
+ unsigned char rec_seq[8];
+};
+
+struct tls12_crypto_info_aes_gcm_256 {
+ struct tls_crypto_info info;
+ unsigned char iv[8];
+ unsigned char key[32];
+ unsigned char salt[4];
+ unsigned char rec_seq[8];
+};
+
+struct tls12_crypto_info_chacha20_poly1305 {
+ struct tls_crypto_info info;
+ unsigned char iv[12];
+ unsigned char key[32];
+ unsigned char salt[0];
+ unsigned char rec_seq[8];
+};
+
+struct tls12_crypto_info_sm4_gcm {
+ struct tls_crypto_info info;
+ unsigned char iv[8];
+ unsigned char key[16];
+ unsigned char salt[4];
+ unsigned char rec_seq[8];
+};
+
+struct tls12_crypto_info_sm4_ccm {
+ struct tls_crypto_info info;
+ unsigned char iv[8];
+ unsigned char key[16];
+ unsigned char salt[4];
+ unsigned char rec_seq[8];
+};
+
+struct tx_work {
+ struct delayed_work work;
+ struct sock *sk;
+};
+
+struct tls_rec;
+
+struct tls_sw_context_tx {
+ struct crypto_aead *aead_send;
+ struct crypto_wait async_wait;
+ struct tx_work tx_work;
+ struct tls_rec *open_rec;
+ struct list_head tx_list;
+ atomic_t encrypt_pending;
+ spinlock_t encrypt_compl_lock;
+ int async_notify;
+ u8 async_capable: 1;
+ long unsigned int tx_bitmask;
+};
+
+struct tls_prot_info {
+ u16 version;
+ u16 cipher_type;
+ u16 prepend_size;
+ u16 tag_size;
+ u16 overhead_size;
+ u16 iv_size;
+ u16 salt_size;
+ u16 rec_seq_size;
+ u16 aad_size;
+ u16 tail_size;
+};
+
+struct cipher_context {
+ char *iv;
+ char *rec_seq;
+};
+
+union tls_crypto_context {
+ struct tls_crypto_info info;
+ union {
+ struct tls12_crypto_info_aes_gcm_128 aes_gcm_128;
+ struct tls12_crypto_info_aes_gcm_256 aes_gcm_256;
+ struct tls12_crypto_info_chacha20_poly1305 chacha20_poly1305;
+ struct tls12_crypto_info_sm4_gcm sm4_gcm;
+ struct tls12_crypto_info_sm4_ccm sm4_ccm;
+ };
+};
+
+struct tls_context {
+ struct tls_prot_info prot_info;
+ u8 tx_conf: 3;
+ u8 rx_conf: 3;
+ u8 zerocopy_sendfile: 1;
+ u8 rx_no_pad: 1;
+ int (*push_pending_record)(struct sock *, int);
+ void (*sk_write_space)(struct sock *);
+ void *priv_ctx_tx;
+ void *priv_ctx_rx;
+ struct net_device *netdev;
+ struct cipher_context tx;
+ struct cipher_context rx;
+ struct scatterlist *partially_sent_record;
+ u16 partially_sent_offset;
+ bool in_tcp_sendpages;
+ bool pending_open_record_frags;
+ struct mutex tx_lock;
+ long unsigned int flags;
+ struct proto *sk_proto;
+ struct sock *sk;
+ void (*sk_destruct)(struct sock *);
+ union tls_crypto_context crypto_send;
+ union tls_crypto_context crypto_recv;
+ struct list_head list;
+ refcount_t refcount;
+ struct callback_head rcu;
+};
+
+enum {
+ TCP_BPF_IPV4 = 0,
+ TCP_BPF_IPV6 = 1,
+ TCP_BPF_NUM_PROTS = 2,
+};
+
+enum {
+ TCP_BPF_BASE = 0,
+ TCP_BPF_TX = 1,
+ TCP_BPF_RX = 2,
+ TCP_BPF_TXRX = 3,
+ TCP_BPF_NUM_CFGS = 4,
+};
+
+struct skb_gso_cb {
+ union {
+ int mac_offset;
+ int data_offset;
+ };
+ int encap_level;
+ __wsum csum;
+ __u16 csum_start;
+};
+
+struct offload_callbacks {
+ struct sk_buff * (*gso_segment)(struct sk_buff *, netdev_features_t);
+ struct sk_buff * (*gro_receive)(struct list_head *, struct sk_buff *);
+ int (*gro_complete)(struct sk_buff *, int);
+};
+
+struct packet_offload {
+ __be16 type;
+ u16 priority;
+ struct offload_callbacks callbacks;
+ struct list_head list;
+};
+
+struct net_offload {
+ struct offload_callbacks callbacks;
+ unsigned int flags;
+};
+
+struct frag_hdr {
+ __u8 nexthdr;
+ __u8 reserved;
+ __be16 frag_off;
+ __be32 identification;
+};
+
+struct hop_jumbo_hdr {
+ u8 nexthdr;
+ u8 hdrlen;
+ u8 tlv_type;
+ u8 tlv_len;
+ __be32 jumbo_payload_len;
+};
+
+struct napi_gro_cb {
+ void *frag0;
+ unsigned int frag0_len;
+ int data_offset;
+ u16 flush;
+ u16 flush_id;
+ u16 count;
+ u16 proto;
+ long unsigned int age;
+ union {
+ struct {
+ u16 gro_remcsum_start;
+ u8 same_flow: 1;
+ u8 encap_mark: 1;
+ u8 csum_valid: 1;
+ u8 csum_cnt: 3;
+ u8 free: 2;
+ u8 is_ipv6: 1;
+ u8 is_fou: 1;
+ u8 is_atomic: 1;
+ u8 recursion_counter: 4;
+ u8 is_flist: 1;
+ };
+ struct {
+ u16 gro_remcsum_start;
+ u8 same_flow: 1;
+ u8 encap_mark: 1;
+ u8 csum_valid: 1;
+ u8 csum_cnt: 3;
+ u8 free: 2;
+ u8 is_ipv6: 1;
+ u8 is_fou: 1;
+ u8 is_atomic: 1;
+ u8 recursion_counter: 4;
+ u8 is_flist: 1;
+ } zeroed;
+ };
+ __wsum csum;
+ struct sk_buff *last;
+};
+
+struct compress_format {
+ unsigned char magic[2];
+ const char *name;
+ decompress_fn decompressor;
+};
+
+typedef unsigned char Byte;
+
+typedef long unsigned int uLong;
+
+struct internal_state;
+
+struct z_stream_s {
+ const Byte *next_in;
+ uLong avail_in;
+ uLong total_in;
+ Byte *next_out;
+ uLong avail_out;
+ uLong total_out;
+ char *msg;
+ struct internal_state *state;
+ void *workspace;
+ int data_type;
+ uLong adler;
+ uLong reserved;
+};
+
+typedef struct z_stream_s z_stream;
+
+typedef z_stream *z_streamp;
+
+typedef struct {
+ unsigned char op;
+ unsigned char bits;
+ short unsigned int val;
+} code;
+
+typedef enum {
+ HEAD = 0,
+ FLAGS = 1,
+ TIME = 2,
+ OS = 3,
+ EXLEN = 4,
+ EXTRA = 5,
+ NAME = 6,
+ COMMENT = 7,
+ HCRC = 8,
+ DICTID = 9,
+ DICT = 10,
+ TYPE = 11,
+ TYPEDO = 12,
+ STORED = 13,
+ COPY = 14,
+ TABLE = 15,
+ LENLENS = 16,
+ CODELENS = 17,
+ LEN = 18,
+ LENEXT = 19,
+ DIST = 20,
+ DISTEXT = 21,
+ MATCH = 22,
+ LIT = 23,
+ CHECK = 24,
+ LENGTH = 25,
+ DONE = 26,
+ BAD = 27,
+ MEM = 28,
+ SYNC = 29,
+} inflate_mode;
+
+struct inflate_state {
+ inflate_mode mode;
+ int last;
+ int wrap;
+ int havedict;
+ int flags;
+ unsigned int dmax;
+ long unsigned int check;
+ long unsigned int total;
+ unsigned int wbits;
+ unsigned int wsize;
+ unsigned int whave;
+ unsigned int write;
+ unsigned char *window;
+ long unsigned int hold;
+ unsigned int bits;
+ unsigned int length;
+ unsigned int offset;
+ unsigned int extra;
+ const code *lencode;
+ const code *distcode;
+ unsigned int lenbits;
+ unsigned int distbits;
+ unsigned int ncode;
+ unsigned int nlen;
+ unsigned int ndist;
+ unsigned int have;
+ code *next;
+ short unsigned int lens[320];
+ short unsigned int work[288];
+ code codes[2048];
+};
+
+struct inflate_workspace {
+ struct inflate_state inflate_state;
+ unsigned char working_window[32768];
+};
+
+struct ZSTD_DCtx_s;
+
+typedef struct ZSTD_DCtx_s ZSTD_DCtx;
+
+struct ZSTD_inBuffer_s {
+ const void *src;
+ size_t size;
+ size_t pos;
+};
+
+typedef struct ZSTD_inBuffer_s ZSTD_inBuffer;
+
+struct ZSTD_outBuffer_s {
+ void *dst;
+ size_t size;
+ size_t pos;
+};
+
+typedef struct ZSTD_outBuffer_s ZSTD_outBuffer;
+
+typedef ZSTD_DCtx ZSTD_DStream;
+
+typedef void * (*ZSTD_allocFunction)(void *, size_t);
+
+typedef void (*ZSTD_freeFunction)(void *, void *);
+
+typedef struct {
+ ZSTD_allocFunction customAlloc;
+ ZSTD_freeFunction customFree;
+ void *opaque;
+} ZSTD_customMem;
+
+typedef enum {
+ ZSTD_frame = 0,
+ ZSTD_skippableFrame = 1,
+} ZSTD_frameType_e;
+
+typedef struct {
+ long long unsigned int frameContentSize;
+ long long unsigned int windowSize;
+ unsigned int blockSizeMax;
+ ZSTD_frameType_e frameType;
+ unsigned int headerSize;
+ unsigned int dictID;
+ unsigned int checksumFlag;
+} ZSTD_frameHeader;
+
+typedef ZSTD_ErrorCode zstd_error_code;
+
+typedef ZSTD_DCtx zstd_dctx;
+
+typedef ZSTD_inBuffer zstd_in_buffer;
+
+typedef ZSTD_outBuffer zstd_out_buffer;
+
+typedef ZSTD_DStream zstd_dstream;
+
+typedef ZSTD_frameHeader zstd_frame_header;
+
+struct fprop_local_single {
+ long unsigned int events;
+ unsigned int period;
+ raw_spinlock_t lock;
+};
+
+struct x86_hw_tss {
+ u32 reserved1;
+ u64 sp0;
+ u64 sp1;
+ u64 sp2;
+ u64 reserved2;
+ u64 ist[7];
+ u32 reserved3;
+ u32 reserved4;
+ u16 reserved5;
+ u16 io_bitmap_base;
+} __attribute__((packed));
+
+struct x86_io_bitmap {
+ u64 prev_sequence;
+ unsigned int prev_max;
+ long unsigned int bitmap[1025];
+ long unsigned int mapall[1025];
+};
+
+struct tss_struct {
+ struct x86_hw_tss x86_tss;
+ struct x86_io_bitmap io_bitmap;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+enum umh_disable_depth {
+ UMH_ENABLED = 0,
+ UMH_FREEZING = 1,
+ UMH_DISABLED = 2,
+};
+
+typedef u64 async_cookie_t;
+
+typedef void (*async_func_t)(void *, async_cookie_t);
+
+struct async_domain {
+ struct list_head pending;
+ unsigned int registered: 1;
+};
+
+struct hash {
+ int ino;
+ int minor;
+ int major;
+ umode_t mode;
+ struct hash *next;
+ char name[4098];
+};
+
+struct dir_entry {
+ struct list_head list;
+ time64_t mtime;
+ char name[0];
+};
+
+enum state {
+ Start = 0,
+ Collect = 1,
+ GotHeader = 2,
+ SkipIt = 3,
+ GotName = 4,
+ CopyFile = 5,
+ GotSymlink = 6,
+ Reset = 7,
+};
+
+struct amd_nb_bus_dev_range {
+ u8 bus;
+ u8 dev_base;
+ u8 dev_limit;
+};
+
+struct pin_cookie {
+ unsigned int val;
+};
+
+struct dl_bw {
+ raw_spinlock_t lock;
+ u64 bw;
+ u64 total_bw;
+};
+
+struct cpudl_item;
+
+struct cpudl {
+ raw_spinlock_t lock;
+ int size;
+ cpumask_var_t free_cpus;
+ struct cpudl_item *elements;
+};
+
+struct cpupri_vec {
+ atomic_t count;
+ cpumask_var_t mask;
+};
+
+struct cpupri {
+ struct cpupri_vec pri_to_cpu[101];
+ int *cpu_to_pri;
+};
+
+struct perf_domain;
+
+struct root_domain {
+ atomic_t refcount;
+ atomic_t rto_count;
+ struct callback_head rcu;
+ cpumask_var_t span;
+ cpumask_var_t online;
+ int overload;
+ int overutilized;
+ cpumask_var_t dlo_mask;
+ atomic_t dlo_count;
+ struct dl_bw dl_bw;
+ struct cpudl cpudl;
+ u64 visit_gen;
+ struct irq_work rto_push_work;
+ raw_spinlock_t rto_lock;
+ int rto_loop;
+ int rto_cpu;
+ atomic_t rto_loop_next;
+ atomic_t rto_loop_start;
+ cpumask_var_t rto_mask;
+ struct cpupri cpupri;
+ long unsigned int max_cpu_capacity;
+ struct perf_domain *pd;
+};
+
+struct cfs_rq {
+ struct load_weight load;
+ unsigned int nr_running;
+ unsigned int h_nr_running;
+ unsigned int idle_nr_running;
+ unsigned int idle_h_nr_running;
+ u64 exec_clock;
+ u64 min_vruntime;
+ struct rb_root_cached tasks_timeline;
+ struct sched_entity *curr;
+ struct sched_entity *next;
+ struct sched_entity *last;
+ struct sched_entity *skip;
+ unsigned int nr_spread_over;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct sched_avg avg;
+ struct {
+ raw_spinlock_t lock;
+ int nr;
+ long unsigned int load_avg;
+ long unsigned int util_avg;
+ long unsigned int runnable_avg;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ } removed;
+ long unsigned int tg_load_avg_contrib;
+ long int propagate;
+ long int prop_runnable_sum;
+ long unsigned int h_load;
+ u64 last_h_load_update;
+ struct sched_entity *h_load_next;
+ struct rq *rq;
+ int on_list;
+ struct list_head leaf_cfs_rq_list;
+ struct task_group *tg;
+ int idle;
+ int runtime_enabled;
+ s64 runtime_remaining;
+ u64 throttled_pelt_idle;
+ u64 throttled_clock;
+ u64 throttled_clock_pelt;
+ u64 throttled_clock_pelt_time;
+ int throttled;
+ int throttle_count;
+ struct list_head throttled_list;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct cfs_bandwidth {
+ raw_spinlock_t lock;
+ ktime_t period;
+ u64 quota;
+ u64 runtime;
+ u64 burst;
+ u64 runtime_snap;
+ s64 hierarchical_quota;
+ u8 idle;
+ u8 period_active;
+ u8 slack_started;
+ struct hrtimer period_timer;
+ struct hrtimer slack_timer;
+ struct list_head throttled_cfs_rq;
+ int nr_periods;
+ int nr_throttled;
+ int nr_burst;
+ u64 throttled_time;
+ u64 burst_time;
+};
+
+struct task_group {
+ struct cgroup_subsys_state css;
+ struct sched_entity **se;
+ struct cfs_rq **cfs_rq;
+ long unsigned int shares;
+ int idle;
+ long: 32;
+ long: 64;
+ atomic_long_t load_avg;
+ struct callback_head rcu;
+ struct list_head list;
+ struct task_group *parent;
+ struct list_head siblings;
+ struct list_head children;
+ struct cfs_bandwidth cfs_bandwidth;
+ long: 64;
+};
+
+struct kernel_cpustat {
+ u64 cpustat[10];
+};
+
+struct update_util_data {
+ void (*func)(struct update_util_data *, u64, unsigned int);
+};
+
+enum {
+ SD_BALANCE_NEWIDLE = 1,
+ SD_BALANCE_EXEC = 2,
+ SD_BALANCE_FORK = 4,
+ SD_BALANCE_WAKE = 8,
+ SD_WAKE_AFFINE = 16,
+ SD_ASYM_CPUCAPACITY = 32,
+ SD_ASYM_CPUCAPACITY_FULL = 64,
+ SD_SHARE_CPUCAPACITY = 128,
+ SD_SHARE_PKG_RESOURCES = 256,
+ SD_SERIALIZE = 512,
+ SD_ASYM_PACKING = 1024,
+ SD_PREFER_SIBLING = 2048,
+ SD_OVERLAP = 4096,
+ SD_NUMA = 8192,
+};
+
+struct sched_domain_shared {
+ atomic_t ref;
+ atomic_t nr_busy_cpus;
+ int has_idle_cores;
+ int nr_idle_scan;
+};
+
+struct sched_group;
+
+struct sched_domain {
+ struct sched_domain *parent;
+ struct sched_domain *child;
+ struct sched_group *groups;
+ long unsigned int min_interval;
+ long unsigned int max_interval;
+ unsigned int busy_factor;
+ unsigned int imbalance_pct;
+ unsigned int cache_nice_tries;
+ unsigned int imb_numa_nr;
+ int nohz_idle;
+ int flags;
+ int level;
+ long unsigned int last_balance;
+ unsigned int balance_interval;
+ unsigned int nr_balance_failed;
+ u64 max_newidle_lb_cost;
+ long unsigned int last_decay_max_lb_cost;
+ u64 avg_scan_cost;
+ unsigned int lb_count[3];
+ unsigned int lb_failed[3];
+ unsigned int lb_balanced[3];
+ unsigned int lb_imbalance[3];
+ unsigned int lb_gained[3];
+ unsigned int lb_hot_gained[3];
+ unsigned int lb_nobusyg[3];
+ unsigned int lb_nobusyq[3];
+ unsigned int alb_count;
+ unsigned int alb_failed;
+ unsigned int alb_pushed;
+ unsigned int sbe_count;
+ unsigned int sbe_balanced;
+ unsigned int sbe_pushed;
+ unsigned int sbf_count;
+ unsigned int sbf_balanced;
+ unsigned int sbf_pushed;
+ unsigned int ttwu_wake_remote;
+ unsigned int ttwu_move_affine;
+ unsigned int ttwu_move_balance;
+ char *name;
+ union {
+ void *private;
+ struct callback_head rcu;
+ };
+ struct sched_domain_shared *shared;
+ unsigned int span_weight;
+ long unsigned int span[0];
+};
+
+struct sched_group_capacity;
+
+struct sched_group {
+ struct sched_group *next;
+ atomic_t ref;
+ unsigned int group_weight;
+ struct sched_group_capacity *sgc;
+ int asym_prefer_cpu;
+ int flags;
+ long unsigned int cpumask[0];
+};
+
+struct sched_group_capacity {
+ atomic_t ref;
+ long unsigned int capacity;
+ long unsigned int min_capacity;
+ long unsigned int max_capacity;
+ long unsigned int next_update;
+ int imbalance;
+ int id;
+ long unsigned int cpumask[0];
+};
+
+struct em_perf_state {
+ long unsigned int frequency;
+ long unsigned int power;
+ long unsigned int cost;
+ long unsigned int flags;
+};
+
+struct em_perf_domain {
+ struct em_perf_state *table;
+ int nr_perf_states;
+ long unsigned int flags;
+ long unsigned int cpus[0];
+};
+
+enum s2idle_states {
+ S2IDLE_STATE_NONE = 0,
+ S2IDLE_STATE_ENTER = 1,
+ S2IDLE_STATE_WAKE = 2,
+};
+
+struct sched_attr {
+ __u32 size;
+ __u32 sched_policy;
+ __u64 sched_flags;
+ __s32 sched_nice;
+ __u32 sched_priority;
+ __u64 sched_runtime;
+ __u64 sched_deadline;
+ __u64 sched_period;
+ __u32 sched_util_min;
+ __u32 sched_util_max;
+};
+
+typedef int (*cpu_stop_fn_t)(void *);
+
+struct cpu_stop_done;
+
+struct cpu_stop_work {
+ struct list_head list;
+ cpu_stop_fn_t fn;
+ long unsigned int caller;
+ void *arg;
+ struct cpu_stop_done *done;
+};
+
+struct cpudl_item {
+ u64 dl;
+ int cpu;
+ int idx;
+};
+
+struct rt_prio_array {
+ long unsigned int bitmap[2];
+ struct list_head queue[100];
+};
+
+struct rt_bandwidth {
+ raw_spinlock_t rt_runtime_lock;
+ ktime_t rt_period;
+ u64 rt_runtime;
+ struct hrtimer rt_period_timer;
+ unsigned int rt_period_active;
+};
+
+struct dl_bandwidth {
+ raw_spinlock_t dl_runtime_lock;
+ u64 dl_runtime;
+ u64 dl_period;
+};
+
+struct rt_rq {
+ struct rt_prio_array active;
+ unsigned int rt_nr_running;
+ unsigned int rr_nr_running;
+ struct {
+ int curr;
+ int next;
+ } highest_prio;
+ unsigned int rt_nr_migratory;
+ unsigned int rt_nr_total;
+ int overloaded;
+ struct plist_head pushable_tasks;
+ int rt_queued;
+ int rt_throttled;
+ u64 rt_time;
+ u64 rt_runtime;
+ raw_spinlock_t rt_runtime_lock;
+};
+
+struct dl_rq {
+ struct rb_root_cached root;
+ unsigned int dl_nr_running;
+ struct {
+ u64 curr;
+ u64 next;
+ } earliest_dl;
+ unsigned int dl_nr_migratory;
+ int overloaded;
+ struct rb_root_cached pushable_dl_tasks_root;
+ u64 running_bw;
+ u64 this_bw;
+ u64 extra_bw;
+ u64 bw_ratio;
+};
+
+struct balance_callback;
+
+struct rq {
+ raw_spinlock_t __lock;
+ unsigned int nr_running;
+ unsigned int nr_numa_running;
+ unsigned int nr_preferred_running;
+ unsigned int numa_migrate_on;
+ long unsigned int last_blocked_load_update_tick;
+ unsigned int has_blocked_load;
+ call_single_data_t nohz_csd;
+ unsigned int nohz_tick_stopped;
+ atomic_t nohz_flags;
+ unsigned int ttwu_pending;
+ u64 nr_switches;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct cfs_rq cfs;
+ struct rt_rq rt;
+ struct dl_rq dl;
+ struct list_head leaf_cfs_rq_list;
+ struct list_head *tmp_alone_branch;
+ unsigned int nr_uninterruptible;
+ struct task_struct *curr;
+ struct task_struct *idle;
+ struct task_struct *stop;
+ long unsigned int next_balance;
+ struct mm_struct *prev_mm;
+ unsigned int clock_update_flags;
+ u64 clock;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ u64 clock_task;
+ u64 clock_pelt;
+ long unsigned int lost_idle_time;
+ u64 clock_pelt_idle;
+ u64 clock_idle;
+ atomic_t nr_iowait;
+ u64 last_seen_need_resched_ns;
+ int ticks_without_resched;
+ int membarrier_state;
+ struct root_domain *rd;
+ struct sched_domain *sd;
+ long unsigned int cpu_capacity;
+ long unsigned int cpu_capacity_orig;
+ struct balance_callback *balance_callback;
+ unsigned char nohz_idle_balance;
+ unsigned char idle_balance;
+ long unsigned int misfit_task_load;
+ int active_balance;
+ int push_cpu;
+ struct cpu_stop_work active_balance_work;
+ int cpu;
+ int online;
+ struct list_head cfs_tasks;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct sched_avg avg_rt;
+ struct sched_avg avg_dl;
+ u64 idle_stamp;
+ u64 avg_idle;
+ long unsigned int wake_stamp;
+ u64 wake_avg_idle;
+ u64 max_idle_balance_cost;
+ struct rcuwait hotplug_wait;
+ long unsigned int calc_load_update;
+ long int calc_load_active;
+ call_single_data_t hrtick_csd;
+ struct hrtimer hrtick_timer;
+ ktime_t hrtick_time;
+ struct sched_info rq_sched_info;
+ long long unsigned int rq_cpu_time;
+ unsigned int yld_count;
+ unsigned int sched_count;
+ unsigned int sched_goidle;
+ unsigned int ttwu_count;
+ unsigned int ttwu_local;
+ struct cpuidle_state *idle_state;
+ unsigned int nr_pinned;
+ unsigned int push_busy;
+ struct cpu_stop_work push_work;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct perf_domain {
+ struct em_perf_domain *em_pd;
+ struct perf_domain *next;
+ struct callback_head rcu;
+};
+
+struct balance_callback {
+ struct balance_callback *next;
+ void (*func)(struct rq *);
+};
+
+struct rq_flags {
+ long unsigned int flags;
+ struct pin_cookie cookie;
+ unsigned int clock_update_flags;
+};
+
+enum {
+ __SCHED_FEAT_GENTLE_FAIR_SLEEPERS = 0,
+ __SCHED_FEAT_START_DEBIT = 1,
+ __SCHED_FEAT_NEXT_BUDDY = 2,
+ __SCHED_FEAT_LAST_BUDDY = 3,
+ __SCHED_FEAT_CACHE_HOT_BUDDY = 4,
+ __SCHED_FEAT_WAKEUP_PREEMPTION = 5,
+ __SCHED_FEAT_HRTICK = 6,
+ __SCHED_FEAT_HRTICK_DL = 7,
+ __SCHED_FEAT_DOUBLE_TICK = 8,
+ __SCHED_FEAT_NONTASK_CAPACITY = 9,
+ __SCHED_FEAT_TTWU_QUEUE = 10,
+ __SCHED_FEAT_SIS_PROP = 11,
+ __SCHED_FEAT_SIS_UTIL = 12,
+ __SCHED_FEAT_WARN_DOUBLE_CLOCK = 13,
+ __SCHED_FEAT_RT_PUSH_IPI = 14,
+ __SCHED_FEAT_RT_RUNTIME_SHARE = 15,
+ __SCHED_FEAT_LB_MIN = 16,
+ __SCHED_FEAT_ATTACH_AGE_LOAD = 17,
+ __SCHED_FEAT_WA_IDLE = 18,
+ __SCHED_FEAT_WA_WEIGHT = 19,
+ __SCHED_FEAT_WA_BIAS = 20,
+ __SCHED_FEAT_UTIL_EST = 21,
+ __SCHED_FEAT_UTIL_EST_FASTUP = 22,
+ __SCHED_FEAT_LATENCY_WARN = 23,
+ __SCHED_FEAT_ALT_PERIOD = 24,
+ __SCHED_FEAT_BASE_SLICE = 25,
+ __SCHED_FEAT_NR = 26,
+};
+
+struct idle_timer {
+ struct hrtimer timer;
+ int done;
+};
+
+typedef struct rt_rq *rt_rq_iter_t;
+
+struct sysinfo {
+ __kernel_long_t uptime;
+ __kernel_ulong_t loads[3];
+ __kernel_ulong_t totalram;
+ __kernel_ulong_t freeram;
+ __kernel_ulong_t sharedram;
+ __kernel_ulong_t bufferram;
+ __kernel_ulong_t totalswap;
+ __kernel_ulong_t freeswap;
+ __u16 procs;
+ __u16 pad;
+ __kernel_ulong_t totalhigh;
+ __kernel_ulong_t freehigh;
+ __u32 mem_unit;
+ char _f[0];
+};
+
+struct name_snapshot {
+ struct qstr name;
+ unsigned char inline_name[32];
+};
+
+struct epoll_event {
+ __poll_t events;
+ __u64 data;
+} __attribute__((packed));
+
+struct epoll_filefd {
+ struct file *file;
+ int fd;
+} __attribute__((packed));
+
+struct epitem;
+
+struct eppoll_entry {
+ struct eppoll_entry *next;
+ struct epitem *base;
+ wait_queue_entry_t wait;
+ wait_queue_head_t *whead;
+};
+
+struct eventpoll;
+
+struct epitem {
+ union {
+ struct rb_node rbn;
+ struct callback_head rcu;
+ };
+ struct list_head rdllink;
+ struct epitem *next;
+ struct epoll_filefd ffd;
+ struct eppoll_entry *pwqlist;
+ struct eventpoll *ep;
+ struct hlist_node fllink;
+ struct wakeup_source *ws;
+ struct epoll_event event;
+};
+
+struct eventpoll {
+ struct mutex mtx;
+ wait_queue_head_t wq;
+ wait_queue_head_t poll_wait;
+ struct list_head rdllist;
+ rwlock_t lock;
+ struct rb_root_cached rbr;
+ struct epitem *ovflist;
+ struct wakeup_source *ws;
+ struct user_struct *user;
+ struct file *file;
+ u64 gen;
+ struct hlist_head refs;
+ unsigned int napi_id;
+ u8 nests;
+};
+
+struct ep_pqueue {
+ poll_table pt;
+ struct epitem *epi;
+};
+
+struct epitems_head {
+ struct hlist_head epitems;
+ struct epitems_head *next;
+};
+
+enum jbd_state_bits {
+ BH_JBD = 16,
+ BH_JWrite = 17,
+ BH_Freed = 18,
+ BH_Revoked = 19,
+ BH_RevokeValid = 20,
+ BH_JBDDirty = 21,
+ BH_JournalHead = 22,
+ BH_Shadow = 23,
+ BH_Verified = 24,
+ BH_JBDPrivateStart = 25,
+};
+
+struct hash_alg_common {
+ unsigned int digestsize;
+ unsigned int statesize;
+ struct crypto_alg base;
+};
+
+struct shash_alg {
+ int (*init)(struct shash_desc *);
+ int (*update)(struct shash_desc *, const u8 *, unsigned int);
+ int (*final)(struct shash_desc *, u8 *);
+ int (*finup)(struct shash_desc *, const u8 *, unsigned int, u8 *);
+ int (*digest)(struct shash_desc *, const u8 *, unsigned int, u8 *);
+ int (*export)(struct shash_desc *, void *);
+ int (*import)(struct shash_desc *, const void *);
+ int (*setkey)(struct crypto_shash *, const u8 *, unsigned int);
+ int (*init_tfm)(struct crypto_shash *);
+ void (*exit_tfm)(struct crypto_shash *);
+ unsigned int descsize;
+ int: 32;
+ unsigned int digestsize;
+ unsigned int statesize;
+ struct crypto_alg base;
+};
+
+enum tpm_algorithms {
+ TPM_ALG_ERROR = 0,
+ TPM_ALG_SHA1 = 4,
+ TPM_ALG_KEYEDHASH = 8,
+ TPM_ALG_SHA256 = 11,
+ TPM_ALG_SHA384 = 12,
+ TPM_ALG_SHA512 = 13,
+ TPM_ALG_NULL = 16,
+ TPM_ALG_SM3_256 = 18,
+};
+
+enum integrity_status {
+ INTEGRITY_PASS = 0,
+ INTEGRITY_PASS_IMMUTABLE = 1,
+ INTEGRITY_FAIL = 2,
+ INTEGRITY_FAIL_IMMUTABLE = 3,
+ INTEGRITY_NOLABEL = 4,
+ INTEGRITY_NOXATTRS = 5,
+ INTEGRITY_UNKNOWN = 6,
+};
+
+struct evm_ima_xattr_data {
+ u8 type;
+ u8 data[0];
+};
+
+struct ima_digest_data {
+ u8 algo;
+ u8 length;
+ union {
+ struct {
+ u8 unused;
+ u8 type;
+ } sha1;
+ struct {
+ u8 type;
+ u8 algo;
+ } ng;
+ u8 data[2];
+ } xattr;
+ u8 digest[0];
+};
+
+struct integrity_iint_cache {
+ struct rb_node rb_node;
+ struct mutex mutex;
+ struct inode *inode;
+ u64 version;
+ long unsigned int flags;
+ long unsigned int measured_pcrs;
+ long unsigned int atomic_flags;
+ enum integrity_status ima_file_status: 4;
+ enum integrity_status ima_mmap_status: 4;
+ enum integrity_status ima_bprm_status: 4;
+ enum integrity_status ima_read_status: 4;
+ enum integrity_status ima_creds_status: 4;
+ enum integrity_status evm_status: 4;
+ struct ima_digest_data *ima_hash;
+};
+
+enum ima_show_type {
+ IMA_SHOW_BINARY = 0,
+ IMA_SHOW_BINARY_NO_FIELD_LEN = 1,
+ IMA_SHOW_BINARY_OLD_STRING_FMT = 2,
+ IMA_SHOW_ASCII = 3,
+};
+
+enum tpm_pcrs {
+ TPM_PCR0 = 0,
+ TPM_PCR8 = 8,
+ TPM_PCR10 = 10,
+};
+
+struct modsig;
+
+struct ima_event_data {
+ struct integrity_iint_cache *iint;
+ struct file *file;
+ const unsigned char *filename;
+ struct evm_ima_xattr_data *xattr_value;
+ int xattr_len;
+ const struct modsig *modsig;
+ const char *violation;
+ const void *buf;
+ int buf_len;
+};
+
+struct ima_field_data {
+ u8 *data;
+ u32 len;
+};
+
+struct ima_template_field {
+ const char field_id[16];
+ int (*field_init)(struct ima_event_data *, struct ima_field_data *);
+ void (*field_show)(struct seq_file *, enum ima_show_type, struct ima_field_data *);
+};
+
+struct ima_template_desc {
+ struct list_head list;
+ char *name;
+ char *fmt;
+ int num_fields;
+ const struct ima_template_field **fields;
+};
+
+struct ima_template_entry {
+ int pcr;
+ struct tpm_digest *digests;
+ struct ima_template_desc *template_desc;
+ u32 template_data_len;
+ struct ima_field_data template_data[0];
+};
+
+struct ima_algo_desc {
+ struct crypto_shash *tfm;
+ enum hash_algo algo;
+};
+
+enum {
+ IOPRIO_CLASS_NONE = 0,
+ IOPRIO_CLASS_RT = 1,
+ IOPRIO_CLASS_BE = 2,
+ IOPRIO_CLASS_IDLE = 3,
+};
+
+enum {
+ IOPRIO_WHO_PROCESS = 1,
+ IOPRIO_WHO_PGRP = 2,
+ IOPRIO_WHO_USER = 3,
+};
+
+struct io_ring_ctx;
+
+struct io_wq;
+
+struct io_uring_task {
+ int cached_refs;
+ const struct io_ring_ctx *last;
+ struct io_wq *io_wq;
+ struct file *registered_rings[16];
+ struct xarray xa;
+ struct wait_queue_head wait;
+ atomic_t in_idle;
+ atomic_t inflight_tracked;
+ struct percpu_counter inflight;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct {
+ struct llist_head task_list;
+ struct callback_head task_work;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ };
+};
+
+struct io_uring_cmd {
+ struct file *file;
+ const void *cmd;
+ union {
+ void (*task_work_cb)(struct io_uring_cmd *);
+ void *cookie;
+ };
+ u32 cmd_op;
+ u32 flags;
+ u8 pdu[32];
+};
+
+struct iov_iter_state {
+ size_t iov_offset;
+ size_t count;
+ long unsigned int nr_segs;
+};
+
+struct io_uring_sqe {
+ __u8 opcode;
+ __u8 flags;
+ __u16 ioprio;
+ __s32 fd;
+ union {
+ __u64 off;
+ __u64 addr2;
+ struct {
+ __u32 cmd_op;
+ __u32 __pad1;
+ };
+ };
+ union {
+ __u64 addr;
+ __u64 splice_off_in;
+ };
+ __u32 len;
+ union {
+ __kernel_rwf_t rw_flags;
+ __u32 fsync_flags;
+ __u16 poll_events;
+ __u32 poll32_events;
+ __u32 sync_range_flags;
+ __u32 msg_flags;
+ __u32 timeout_flags;
+ __u32 accept_flags;
+ __u32 cancel_flags;
+ __u32 open_flags;
+ __u32 statx_flags;
+ __u32 fadvise_advice;
+ __u32 splice_flags;
+ __u32 rename_flags;
+ __u32 unlink_flags;
+ __u32 hardlink_flags;
+ __u32 xattr_flags;
+ __u32 msg_ring_flags;
+ __u32 uring_cmd_flags;
+ };
+ __u64 user_data;
+ union {
+ __u16 buf_index;
+ __u16 buf_group;
+ };
+ __u16 personality;
+ union {
+ __s32 splice_fd_in;
+ __u32 file_index;
+ struct {
+ __u16 addr_len;
+ __u16 __pad3[1];
+ };
+ };
+ union {
+ struct {
+ __u64 addr3;
+ __u64 __pad2[1];
+ };
+ __u8 cmd[0];
+ };
+};
+
+enum io_uring_op {
+ IORING_OP_NOP = 0,
+ IORING_OP_READV = 1,
+ IORING_OP_WRITEV = 2,
+ IORING_OP_FSYNC = 3,
+ IORING_OP_READ_FIXED = 4,
+ IORING_OP_WRITE_FIXED = 5,
+ IORING_OP_POLL_ADD = 6,
+ IORING_OP_POLL_REMOVE = 7,
+ IORING_OP_SYNC_FILE_RANGE = 8,
+ IORING_OP_SENDMSG = 9,
+ IORING_OP_RECVMSG = 10,
+ IORING_OP_TIMEOUT = 11,
+ IORING_OP_TIMEOUT_REMOVE = 12,
+ IORING_OP_ACCEPT = 13,
+ IORING_OP_ASYNC_CANCEL = 14,
+ IORING_OP_LINK_TIMEOUT = 15,
+ IORING_OP_CONNECT = 16,
+ IORING_OP_FALLOCATE = 17,
+ IORING_OP_OPENAT = 18,
+ IORING_OP_CLOSE = 19,
+ IORING_OP_FILES_UPDATE = 20,
+ IORING_OP_STATX = 21,
+ IORING_OP_READ = 22,
+ IORING_OP_WRITE = 23,
+ IORING_OP_FADVISE = 24,
+ IORING_OP_MADVISE = 25,
+ IORING_OP_SEND = 26,
+ IORING_OP_RECV = 27,
+ IORING_OP_OPENAT2 = 28,
+ IORING_OP_EPOLL_CTL = 29,
+ IORING_OP_SPLICE = 30,
+ IORING_OP_PROVIDE_BUFFERS = 31,
+ IORING_OP_REMOVE_BUFFERS = 32,
+ IORING_OP_TEE = 33,
+ IORING_OP_SHUTDOWN = 34,
+ IORING_OP_RENAMEAT = 35,
+ IORING_OP_UNLINKAT = 36,
+ IORING_OP_MKDIRAT = 37,
+ IORING_OP_SYMLINKAT = 38,
+ IORING_OP_LINKAT = 39,
+ IORING_OP_MSG_RING = 40,
+ IORING_OP_FSETXATTR = 41,
+ IORING_OP_SETXATTR = 42,
+ IORING_OP_FGETXATTR = 43,
+ IORING_OP_GETXATTR = 44,
+ IORING_OP_SOCKET = 45,
+ IORING_OP_URING_CMD = 46,
+ IORING_OP_SEND_ZC = 47,
+ IORING_OP_SENDMSG_ZC = 48,
+ IORING_OP_LAST = 49,
+};
+
+struct io_uring_cqe {
+ __u64 user_data;
+ __s32 res;
+ __u32 flags;
+ __u64 big_cqe[0];
+};
+
+struct io_uring_buf {
+ __u64 addr;
+ __u32 len;
+ __u16 bid;
+ __u16 resv;
+};
+
+struct io_uring_buf_ring {
+ union {
+ struct {
+ __u64 resv1;
+ __u32 resv2;
+ __u16 resv3;
+ __u16 tail;
+ };
+ struct io_uring_buf bufs[0];
+ };
+};
+
+enum io_uring_cmd_flags {
+ IO_URING_F_COMPLETE_DEFER = 1,
+ IO_URING_F_UNLOCKED = 2,
+ IO_URING_F_NONBLOCK = -2147483648,
+ IO_URING_F_SQE128 = 4,
+ IO_URING_F_CQE32 = 8,
+ IO_URING_F_IOPOLL = 16,
+ IO_URING_F_MULTISHOT = 32,
+};
+
+struct io_wq_work_node {
+ struct io_wq_work_node *next;
+};
+
+struct io_wq_work_list {
+ struct io_wq_work_node *first;
+ struct io_wq_work_node *last;
+};
+
+struct io_wq_work {
+ struct io_wq_work_node list;
+ unsigned int flags;
+ int cancel_seq;
+};
+
+struct io_fixed_file {
+ long unsigned int file_ptr;
+};
+
+struct io_file_table {
+ struct io_fixed_file *files;
+ long unsigned int *bitmap;
+ unsigned int alloc_hint;
+};
+
+struct io_hash_bucket {
+ spinlock_t lock;
+ struct hlist_head list;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct io_hash_table {
+ struct io_hash_bucket *hbs;
+ unsigned int hash_bits;
+};
+
+struct io_kiocb;
+
+struct io_submit_link {
+ struct io_kiocb *head;
+ struct io_kiocb *last;
+};
+
+struct io_submit_state {
+ struct io_wq_work_node free_list;
+ struct io_wq_work_list compl_reqs;
+ struct io_submit_link link;
+ bool plug_started;
+ bool need_plug;
+ short unsigned int submit_nr;
+ struct blk_plug plug;
+};
+
+struct io_alloc_cache {
+ struct hlist_head list;
+ unsigned int nr_cached;
+};
+
+struct io_restriction {
+ long unsigned int register_op[1];
+ long unsigned int sqe_op[1];
+ u8 sqe_flags_allowed;
+ u8 sqe_flags_required;
+ bool registered;
+};
+
+struct io_rings;
+
+struct io_rsrc_node;
+
+struct io_mapped_ubuf;
+
+struct io_buffer_list;
+
+struct io_sq_data;
+
+struct io_ev_fd;
+
+struct io_rsrc_data;
+
+struct io_wq_hash;
+
+struct io_ring_ctx {
+ struct {
+ struct percpu_ref refs;
+ struct io_rings *rings;
+ unsigned int flags;
+ enum task_work_notify_mode notify_method;
+ unsigned int compat: 1;
+ unsigned int drain_next: 1;
+ unsigned int restricted: 1;
+ unsigned int off_timeout_used: 1;
+ unsigned int drain_active: 1;
+ unsigned int drain_disabled: 1;
+ unsigned int has_evfd: 1;
+ unsigned int syscall_iopoll: 1;
+ long: 56;
+ long: 64;
+ long: 64;
+ long: 64;
+ };
+ struct {
+ struct mutex uring_lock;
+ u32 *sq_array;
+ struct io_uring_sqe *sq_sqes;
+ unsigned int cached_sq_head;
+ unsigned int sq_entries;
+ struct io_rsrc_node *rsrc_node;
+ int rsrc_cached_refs;
+ atomic_t cancel_seq;
+ struct io_file_table file_table;
+ unsigned int nr_user_files;
+ unsigned int nr_user_bufs;
+ struct io_mapped_ubuf **user_bufs;
+ struct io_submit_state submit_state;
+ struct io_buffer_list *io_bl;
+ struct xarray io_bl_xa;
+ struct list_head io_buffers_cache;
+ struct io_hash_table cancel_table_locked;
+ struct list_head cq_overflow_list;
+ struct io_alloc_cache apoll_cache;
+ struct io_alloc_cache netmsg_cache;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ };
+ struct io_wq_work_list locked_free_list;
+ unsigned int locked_free_nr;
+ const struct cred *sq_creds;
+ struct io_sq_data *sq_data;
+ struct wait_queue_head sqo_sq_wait;
+ struct list_head sqd_list;
+ long unsigned int check_cq;
+ unsigned int file_alloc_start;
+ unsigned int file_alloc_end;
+ struct xarray personalities;
+ u32 pers_next;
+ long: 32;
+ long: 64;
+ long: 64;
+ struct {
+ struct io_uring_cqe *cqe_cached;
+ struct io_uring_cqe *cqe_sentinel;
+ unsigned int cached_cq_tail;
+ unsigned int cq_entries;
+ struct io_ev_fd *io_ev_fd;
+ struct wait_queue_head cq_wait;
+ unsigned int cq_extra;
+ long: 32;
+ long: 64;
+ };
+ struct {
+ spinlock_t completion_lock;
+ struct io_wq_work_list iopoll_list;
+ struct io_hash_table cancel_table;
+ bool poll_multi_queue;
+ struct llist_head work_llist;
+ struct list_head io_buffers_comp;
+ };
+ struct {
+ spinlock_t timeout_lock;
+ atomic_t cq_timeouts;
+ struct list_head timeout_list;
+ struct list_head ltimeout_list;
+ unsigned int cq_last_tm_flush;
+ long: 32;
+ long: 64;
+ long: 64;
+ };
+ struct io_restriction restrictions;
+ struct task_struct *submitter_task;
+ struct io_rsrc_node *rsrc_backup_node;
+ struct io_mapped_ubuf *dummy_ubuf;
+ struct io_rsrc_data *file_data;
+ struct io_rsrc_data *buf_data;
+ struct delayed_work rsrc_put_work;
+ struct llist_head rsrc_put_llist;
+ struct list_head rsrc_ref_list;
+ spinlock_t rsrc_ref_lock;
+ struct list_head io_buffers_pages;
+ struct socket *ring_sock;
+ struct io_wq_hash *hash_map;
+ struct user_struct *user;
+ struct mm_struct *mm_account;
+ struct llist_head fallback_llist;
+ struct delayed_work fallback_work;
+ struct work_struct exit_work;
+ struct list_head tctx_list;
+ struct completion ref_comp;
+ u32 iowq_limits[2];
+ bool iowq_limits_set;
+ struct list_head defer_list;
+ unsigned int sq_thread_idle;
+ unsigned int evfd_last_cq_tail;
+ long: 64;
+};
+
+struct io_uring {
+ u32 head;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ u32 tail;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct io_rings {
+ struct io_uring sq;
+ struct io_uring cq;
+ u32 sq_ring_mask;
+ u32 cq_ring_mask;
+ u32 sq_ring_entries;
+ u32 cq_ring_entries;
+ u32 sq_dropped;
+ atomic_t sq_flags;
+ u32 cq_flags;
+ u32 cq_overflow;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct io_uring_cqe cqes[0];
+};
+
+struct io_cmd_data {
+ struct file *file;
+ __u8 data[56];
+};
+
+struct io_cqe {
+ __u64 user_data;
+ __s32 res;
+ union {
+ __u32 flags;
+ int fd;
+ };
+};
+
+typedef void (*io_req_tw_func_t)(struct io_kiocb *, bool *);
+
+struct io_task_work {
+ struct llist_node node;
+ io_req_tw_func_t func;
+};
+
+struct io_buffer;
+
+struct async_poll;
+
+struct io_kiocb {
+ union {
+ struct file *file;
+ struct io_cmd_data cmd;
+ };
+ u8 opcode;
+ u8 iopoll_completed;
+ u16 buf_index;
+ unsigned int flags;
+ struct io_cqe cqe;
+ struct io_ring_ctx *ctx;
+ struct task_struct *task;
+ struct io_rsrc_node *rsrc_node;
+ union {
+ struct io_mapped_ubuf *imu;
+ struct io_buffer *kbuf;
+ struct io_buffer_list *buf_list;
+ };
+ union {
+ struct io_wq_work_node comp_list;
+ __poll_t apoll_events;
+ };
+ atomic_t refs;
+ atomic_t poll_refs;
+ struct io_task_work io_task_work;
+ union {
+ struct hlist_node hash_node;
+ struct {
+ u64 extra1;
+ u64 extra2;
+ };
+ };
+ struct async_poll *apoll;
+ void *async_data;
+ struct io_kiocb *link;
+ const struct cred *creds;
+ struct io_wq_work work;
+};
+
+struct io_ev_fd {
+ struct eventfd_ctx *cq_ev_fd;
+ unsigned int eventfd_async: 1;
+ struct callback_head rcu;
+ atomic_t refs;
+ atomic_t ops;
+};
+
+struct io_rsrc_node {
+ struct percpu_ref refs;
+ struct list_head node;
+ struct list_head rsrc_list;
+ struct io_rsrc_data *rsrc_data;
+ struct llist_node llist;
+ bool done;
+};
+
+struct io_mapped_ubuf {
+ u64 ubuf;
+ u64 ubuf_end;
+ unsigned int nr_bvecs;
+ long unsigned int acct_pages;
+ struct bio_vec bvec[0];
+};
+
+struct io_buffer_list {
+ union {
+ struct list_head buf_list;
+ struct {
+ struct page **buf_pages;
+ struct io_uring_buf_ring *buf_ring;
+ };
+ };
+ __u16 bgid;
+ __u16 buf_nr_pages;
+ __u16 nr_entries;
+ __u16 head;
+ __u16 mask;
+};
+
+struct io_rsrc_put;
+
+typedef void rsrc_put_fn(struct io_ring_ctx *, struct io_rsrc_put *);
+
+struct io_rsrc_data {
+ struct io_ring_ctx *ctx;
+ u64 **tags;
+ unsigned int nr;
+ rsrc_put_fn *do_put;
+ atomic_t refs;
+ struct completion done;
+ bool quiesce;
+};
+
+struct io_wq_hash {
+ refcount_t refs;
+ long unsigned int map;
+ struct wait_queue_head wait;
+};
+
+enum {
+ REQ_F_FIXED_FILE_BIT = 0,
+ REQ_F_IO_DRAIN_BIT = 1,
+ REQ_F_LINK_BIT = 2,
+ REQ_F_HARDLINK_BIT = 3,
+ REQ_F_FORCE_ASYNC_BIT = 4,
+ REQ_F_BUFFER_SELECT_BIT = 5,
+ REQ_F_CQE_SKIP_BIT = 6,
+ REQ_F_FAIL_BIT = 8,
+ REQ_F_INFLIGHT_BIT = 9,
+ REQ_F_CUR_POS_BIT = 10,
+ REQ_F_NOWAIT_BIT = 11,
+ REQ_F_LINK_TIMEOUT_BIT = 12,
+ REQ_F_NEED_CLEANUP_BIT = 13,
+ REQ_F_POLLED_BIT = 14,
+ REQ_F_BUFFER_SELECTED_BIT = 15,
+ REQ_F_BUFFER_RING_BIT = 16,
+ REQ_F_REISSUE_BIT = 17,
+ REQ_F_CREDS_BIT = 18,
+ REQ_F_REFCOUNT_BIT = 19,
+ REQ_F_ARM_LTIMEOUT_BIT = 20,
+ REQ_F_ASYNC_DATA_BIT = 21,
+ REQ_F_SKIP_LINK_CQES_BIT = 22,
+ REQ_F_SINGLE_POLL_BIT = 23,
+ REQ_F_DOUBLE_POLL_BIT = 24,
+ REQ_F_PARTIAL_IO_BIT = 25,
+ REQ_F_CQE32_INIT_BIT = 26,
+ REQ_F_APOLL_MULTISHOT_BIT = 27,
+ REQ_F_CLEAR_POLLIN_BIT = 28,
+ REQ_F_HASH_LOCKED_BIT = 29,
+ REQ_F_SUPPORT_NOWAIT_BIT = 30,
+ REQ_F_ISREG_BIT = 31,
+ __REQ_F_LAST_BIT = 32,
+};
+
+enum {
+ REQ_F_FIXED_FILE = 1,
+ REQ_F_IO_DRAIN = 2,
+ REQ_F_LINK = 4,
+ REQ_F_HARDLINK = 8,
+ REQ_F_FORCE_ASYNC = 16,
+ REQ_F_BUFFER_SELECT = 32,
+ REQ_F_CQE_SKIP = 64,
+ REQ_F_FAIL = 256,
+ REQ_F_INFLIGHT = 512,
+ REQ_F_CUR_POS = 1024,
+ REQ_F_NOWAIT = 2048,
+ REQ_F_LINK_TIMEOUT = 4096,
+ REQ_F_NEED_CLEANUP = 8192,
+ REQ_F_POLLED = 16384,
+ REQ_F_BUFFER_SELECTED = 32768,
+ REQ_F_BUFFER_RING = 65536,
+ REQ_F_REISSUE = 131072,
+ REQ_F_SUPPORT_NOWAIT = 1073741824,
+ REQ_F_ISREG = 2147483648,
+ REQ_F_CREDS = 262144,
+ REQ_F_REFCOUNT = 524288,
+ REQ_F_ARM_LTIMEOUT = 1048576,
+ REQ_F_ASYNC_DATA = 2097152,
+ REQ_F_SKIP_LINK_CQES = 4194304,
+ REQ_F_SINGLE_POLL = 8388608,
+ REQ_F_DOUBLE_POLL = 16777216,
+ REQ_F_PARTIAL_IO = 33554432,
+ REQ_F_APOLL_MULTISHOT = 134217728,
+ REQ_F_CQE32_INIT = 67108864,
+ REQ_F_CLEAR_POLLIN = 268435456,
+ REQ_F_HASH_LOCKED = 536870912,
+};
+
+struct io_buffer {
+ struct list_head list;
+ __u64 addr;
+ __u32 len;
+ __u16 bid;
+ __u16 bgid;
+};
+
+enum {
+ IOU_OK = 0,
+ IOU_ISSUE_SKIP_COMPLETE = -529,
+ IOU_STOP_MULTISHOT = -125,
+};
+
+struct io_op_def {
+ unsigned int needs_file: 1;
+ unsigned int plug: 1;
+ unsigned int hash_reg_file: 1;
+ unsigned int unbound_nonreg_file: 1;
+ unsigned int pollin: 1;
+ unsigned int pollout: 1;
+ unsigned int poll_exclusive: 1;
+ unsigned int buffer_select: 1;
+ unsigned int not_supported: 1;
+ unsigned int audit_skip: 1;
+ unsigned int ioprio: 1;
+ unsigned int iopoll: 1;
+ unsigned int manual_alloc: 1;
+ short unsigned int async_size;
+ const char *name;
+ int (*prep)(struct io_kiocb *, const struct io_uring_sqe *);
+ int (*issue)(struct io_kiocb *, unsigned int);
+ int (*prep_async)(struct io_kiocb *);
+ void (*cleanup)(struct io_kiocb *);
+ void (*fail)(struct io_kiocb *);
+};
+
+struct io_rsrc_put {
+ struct list_head list;
+ u64 tag;
+ union {
+ void *rsrc;
+ struct file *file;
+ struct io_mapped_ubuf *buf;
+ };
+};
+
+struct wait_page_key {
+ struct folio *folio;
+ int bit_nr;
+ int page_match;
+};
+
+struct io_rw_state {
+ struct iov_iter iter;
+ struct iov_iter_state iter_state;
+ struct iovec fast_iov[8];
+};
+
+struct io_async_rw {
+ struct io_rw_state s;
+ const struct iovec *free_iovec;
+ size_t bytes_done;
+ struct wait_page_queue wpq;
+};
+
+struct io_rw {
+ struct kiocb kiocb;
+ u64 addr;
+ u32 len;
+ rwf_t flags;
+};
+
+struct acpi_prmt_module_info {
+ u16 revision;
+ u16 length;
+ u8 module_guid[16];
+ u16 major_rev;
+ u16 minor_rev;
+ u16 handler_info_count;
+ u32 handler_info_offset;
+ u64 mmio_list_pointer;
+} __attribute__((packed));
+
+struct acpi_prmt_handler_info {
+ u16 revision;
+ u16 length;
+ u8 handler_guid[16];
+ u64 handler_address;
+ u64 static_data_buffer_address;
+ u64 acpi_param_buffer_address;
+} __attribute__((packed));
+
+struct prm_mmio_addr_range {
+ u64 phys_addr;
+ u64 virt_addr;
+ u32 length;
+} __attribute__((packed));
+
+struct prm_mmio_info {
+ u64 mmio_count;
+ struct prm_mmio_addr_range addr_ranges[0];
+};
+
+struct prm_buffer {
+ u8 prm_status;
+ u64 efi_status;
+ u8 prm_cmd;
+ guid_t handler_guid;
+} __attribute__((packed));
+
+struct prm_context_buffer {
+ char signature[4];
+ u16 revision;
+ u16 reserved;
+ guid_t identifier;
+ u64 static_data_buffer;
+ struct prm_mmio_info *mmio_ranges;
+};
+
+struct prm_handler_info {
+ guid_t guid;
+ void *handler_addr;
+ u64 static_data_buffer_addr;
+ u64 acpi_param_buffer_addr;
+ struct list_head handler_list;
+};
+
+struct prm_module_info {
+ guid_t guid;
+ u16 major_rev;
+ u16 minor_rev;
+ u16 handler_count;
+ struct prm_mmio_info *mmio_info;
+ bool updatable;
+ struct list_head module_list;
+ struct prm_handler_info handlers[0];
+};
+
+struct thermal_instance {
+ int id;
+ char name[20];
+ struct thermal_zone_device *tz;
+ struct thermal_cooling_device *cdev;
+ int trip;
+ bool initialized;
+ long unsigned int upper;
+ long unsigned int lower;
+ long unsigned int target;
+ char attr_name[20];
+ struct device_attribute attr;
+ char weight_attr_name[20];
+ struct device_attribute weight_attr;
+ struct list_head tz_node;
+ struct list_head cdev_node;
+ unsigned int weight;
+};
+
+struct kthread_work;
+
+typedef void (*kthread_work_func_t)(struct kthread_work *);
+
+struct kthread_worker;
+
+struct kthread_work {
+ struct list_head node;
+ kthread_work_func_t func;
+ struct kthread_worker *worker;
+ int canceling;
+};
+
+struct kthread_worker {
+ unsigned int flags;
+ raw_spinlock_t lock;
+ struct list_head work_list;
+ struct list_head delayed_work_list;
+ struct task_struct *task;
+ struct kthread_work *current_work;
+};
+
+struct crypto_queue {
+ struct list_head list;
+ struct list_head *backlog;
+ unsigned int qlen;
+ unsigned int max_qlen;
+};
+
+struct crypto_engine {
+ char name[30];
+ bool idling;
+ bool busy;
+ bool running;
+ bool retry_support;
+ struct list_head list;
+ spinlock_t queue_lock;
+ struct crypto_queue queue;
+ struct device *dev;
+ bool rt;
+ int (*prepare_crypt_hardware)(struct crypto_engine *);
+ int (*unprepare_crypt_hardware)(struct crypto_engine *);
+ int (*do_batch_requests)(struct crypto_engine *);
+ struct kthread_worker *kworker;
+ struct kthread_work pump_requests;
+ void *priv_data;
+ struct crypto_async_request *cur_req;
+};
+
+struct data_queue {
+ struct virtqueue *vq;
+ spinlock_t lock;
+ char name[32];
+ struct crypto_engine *engine;
+};
+
+struct virtio_crypto {
+ struct virtio_device *vdev;
+ struct virtqueue *ctrl_vq;
+ struct data_queue *data_vq;
+ spinlock_t ctrl_lock;
+ u32 max_data_queues;
+ u32 curr_queue;
+ u32 crypto_services;
+ u32 cipher_algo_l;
+ u32 cipher_algo_h;
+ u32 hash_algo;
+ u32 mac_algo_l;
+ u32 mac_algo_h;
+ u32 aead_algo;
+ u32 akcipher_algo;
+ u32 max_cipher_key_len;
+ u32 max_auth_key_len;
+ u64 max_size;
+ long unsigned int status;
+ atomic_t ref_count;
+ struct list_head list;
+ struct module *owner;
+ uint8_t dev_id;
+ bool affinity_hint_set;
+};
+
+enum {
+ NDA_UNSPEC = 0,
+ NDA_DST = 1,
+ NDA_LLADDR = 2,
+ NDA_CACHEINFO = 3,
+ NDA_PROBES = 4,
+ NDA_VLAN = 5,
+ NDA_PORT = 6,
+ NDA_VNI = 7,
+ NDA_IFINDEX = 8,
+ NDA_MASTER = 9,
+ NDA_LINK_NETNSID = 10,
+ NDA_SRC_VNI = 11,
+ NDA_PROTOCOL = 12,
+ NDA_NH_ID = 13,
+ NDA_FDB_EXT_ATTRS = 14,
+ NDA_FLAGS_EXT = 15,
+ NDA_NDM_STATE_MASK = 16,
+ NDA_NDM_FLAGS_MASK = 17,
+ __NDA_MAX = 18,
+};
+
+struct nda_cacheinfo {
+ __u32 ndm_confirmed;
+ __u32 ndm_used;
+ __u32 ndm_updated;
+ __u32 ndm_refcnt;
+};
+
+struct ndt_stats {
+ __u64 ndts_allocs;
+ __u64 ndts_destroys;
+ __u64 ndts_hash_grows;
+ __u64 ndts_res_failed;
+ __u64 ndts_lookups;
+ __u64 ndts_hits;
+ __u64 ndts_rcv_probes_mcast;
+ __u64 ndts_rcv_probes_ucast;
+ __u64 ndts_periodic_gc_runs;
+ __u64 ndts_forced_gc_runs;
+ __u64 ndts_table_fulls;
+};
+
+enum {
+ NDTPA_UNSPEC = 0,
+ NDTPA_IFINDEX = 1,
+ NDTPA_REFCNT = 2,
+ NDTPA_REACHABLE_TIME = 3,
+ NDTPA_BASE_REACHABLE_TIME = 4,
+ NDTPA_RETRANS_TIME = 5,
+ NDTPA_GC_STALETIME = 6,
+ NDTPA_DELAY_PROBE_TIME = 7,
+ NDTPA_QUEUE_LEN = 8,
+ NDTPA_APP_PROBES = 9,
+ NDTPA_UCAST_PROBES = 10,
+ NDTPA_MCAST_PROBES = 11,
+ NDTPA_ANYCAST_DELAY = 12,
+ NDTPA_PROXY_DELAY = 13,
+ NDTPA_PROXY_QLEN = 14,
+ NDTPA_LOCKTIME = 15,
+ NDTPA_QUEUE_LENBYTES = 16,
+ NDTPA_MCAST_REPROBES = 17,
+ NDTPA_PAD = 18,
+ NDTPA_INTERVAL_PROBE_TIME_MS = 19,
+ __NDTPA_MAX = 20,
+};
+
+struct ndtmsg {
+ __u8 ndtm_family;
+ __u8 ndtm_pad1;
+ __u16 ndtm_pad2;
+};
+
+struct ndt_config {
+ __u16 ndtc_key_len;
+ __u16 ndtc_entry_size;
+ __u32 ndtc_entries;
+ __u32 ndtc_last_flush;
+ __u32 ndtc_last_rand;
+ __u32 ndtc_hash_rnd;
+ __u32 ndtc_hash_mask;
+ __u32 ndtc_hash_chain_gc;
+ __u32 ndtc_proxy_qlen;
+};
+
+enum {
+ NDTA_UNSPEC = 0,
+ NDTA_NAME = 1,
+ NDTA_THRESH1 = 2,
+ NDTA_THRESH2 = 3,
+ NDTA_THRESH3 = 4,
+ NDTA_CONFIG = 5,
+ NDTA_PARMS = 6,
+ NDTA_STATS = 7,
+ NDTA_GC_INTERVAL = 8,
+ NDTA_PAD = 9,
+ __NDTA_MAX = 10,
+};
+
+enum rtnetlink_groups {
+ RTNLGRP_NONE = 0,
+ RTNLGRP_LINK = 1,
+ RTNLGRP_NOTIFY = 2,
+ RTNLGRP_NEIGH = 3,
+ RTNLGRP_TC = 4,
+ RTNLGRP_IPV4_IFADDR = 5,
+ RTNLGRP_IPV4_MROUTE = 6,
+ RTNLGRP_IPV4_ROUTE = 7,
+ RTNLGRP_IPV4_RULE = 8,
+ RTNLGRP_IPV6_IFADDR = 9,
+ RTNLGRP_IPV6_MROUTE = 10,
+ RTNLGRP_IPV6_ROUTE = 11,
+ RTNLGRP_IPV6_IFINFO = 12,
+ RTNLGRP_DECnet_IFADDR = 13,
+ RTNLGRP_NOP2 = 14,
+ RTNLGRP_DECnet_ROUTE = 15,
+ RTNLGRP_DECnet_RULE = 16,
+ RTNLGRP_NOP4 = 17,
+ RTNLGRP_IPV6_PREFIX = 18,
+ RTNLGRP_IPV6_RULE = 19,
+ RTNLGRP_ND_USEROPT = 20,
+ RTNLGRP_PHONET_IFADDR = 21,
+ RTNLGRP_PHONET_ROUTE = 22,
+ RTNLGRP_DCB = 23,
+ RTNLGRP_IPV4_NETCONF = 24,
+ RTNLGRP_IPV6_NETCONF = 25,
+ RTNLGRP_MDB = 26,
+ RTNLGRP_MPLS_ROUTE = 27,
+ RTNLGRP_NSID = 28,
+ RTNLGRP_MPLS_NETCONF = 29,
+ RTNLGRP_IPV4_MROUTE_R = 30,
+ RTNLGRP_IPV6_MROUTE_R = 31,
+ RTNLGRP_NEXTHOP = 32,
+ RTNLGRP_BRVLAN = 33,
+ RTNLGRP_MCTP_IFADDR = 34,
+ RTNLGRP_TUNNEL = 35,
+ RTNLGRP_STATS = 36,
+ __RTNLGRP_MAX = 37,
+};
+
+enum netevent_notif_type {
+ NETEVENT_NEIGH_UPDATE = 1,
+ NETEVENT_REDIRECT = 2,
+ NETEVENT_DELAY_PROBE_TIME_UPDATE = 3,
+ NETEVENT_IPV4_MPATH_HASH_UPDATE = 4,
+ NETEVENT_IPV6_MPATH_HASH_UPDATE = 5,
+ NETEVENT_IPV4_FWD_UPDATE_PRIORITY_UPDATE = 6,
+};
+
+struct neigh_dump_filter {
+ int master_idx;
+ int dev_idx;
+};
+
+struct neigh_sysctl_table {
+ struct ctl_table_header *sysctl_header;
+ struct ctl_table neigh_vars[22];
+};
+
+typedef u16 u_int16_t;
+
+typedef u32 u_int32_t;
+
+typedef u64 u_int64_t;
+
+enum {
+ BPF_REG_0 = 0,
+ BPF_REG_1 = 1,
+ BPF_REG_2 = 2,
+ BPF_REG_3 = 3,
+ BPF_REG_4 = 4,
+ BPF_REG_5 = 5,
+ BPF_REG_6 = 6,
+ BPF_REG_7 = 7,
+ BPF_REG_8 = 8,
+ BPF_REG_9 = 9,
+ BPF_REG_10 = 10,
+ __MAX_BPF_REG = 11,
+};
+
+enum {
+ BPF_F_CURRENT_NETNS = -1,
+};
+
+struct bpf_sock_tuple {
+ union {
+ struct {
+ __be32 saddr;
+ __be32 daddr;
+ __be16 sport;
+ __be16 dport;
+ } ipv4;
+ struct {
+ __be32 saddr[4];
+ __be32 daddr[4];
+ __be16 sport;
+ __be16 dport;
+ } ipv6;
+ };
+};
+
+struct xdp_md {
+ __u32 data;
+ __u32 data_end;
+ __u32 data_meta;
+ __u32 ingress_ifindex;
+ __u32 rx_queue_index;
+ __u32 egress_ifindex;
+};
+
+typedef sockptr_t bpfptr_t;
+
+struct btf_id_set8 {
+ u32 cnt;
+ u32 flags;
+ struct {
+ u32 id;
+ u32 flags;
+ } pairs[0];
+};
+
+struct btf_kfunc_id_set {
+ struct module *owner;
+ struct btf_id_set8 *set;
+};
+
+struct btf_struct_meta {
+ u32 btf_id;
+ struct btf_record *record;
+ struct btf_field_offs *field_offs;
+};
+
+struct bpf_verifier_log {
+ u32 level;
+ char kbuf[1024];
+ char *ubuf;
+ u32 len_used;
+ u32 len_total;
+};
+
+struct bpf_subprog_info {
+ u32 start;
+ u32 linfo_idx;
+ u16 stack_depth;
+ bool has_tail_call;
+ bool tail_call_reachable;
+ bool has_ld_abs;
+ bool is_async_cb;
+};
+
+struct bpf_id_pair {
+ u32 old;
+ u32 cur;
+};
+
+struct bpf_verifier_ops;
+
+struct bpf_verifier_stack_elem;
+
+struct bpf_verifier_state;
+
+struct bpf_verifier_state_list;
+
+struct bpf_insn_aux_data;
+
+struct bpf_verifier_env {
+ u32 insn_idx;
+ u32 prev_insn_idx;
+ struct bpf_prog *prog;
+ const struct bpf_verifier_ops *ops;
+ struct bpf_verifier_stack_elem *head;
+ int stack_size;
+ bool strict_alignment;
+ bool test_state_freq;
+ struct bpf_verifier_state *cur_state;
+ struct bpf_verifier_state_list **explored_states;
+ struct bpf_verifier_state_list *free_list;
+ struct bpf_map *used_maps[64];
+ struct btf_mod_pair used_btfs[64];
+ u32 used_map_cnt;
+ u32 used_btf_cnt;
+ u32 id_gen;
+ bool explore_alu_limits;
+ bool allow_ptr_leaks;
+ bool allow_uninit_stack;
+ bool bpf_capable;
+ bool bypass_spec_v1;
+ bool bypass_spec_v4;
+ bool seen_direct_write;
+ bool rcu_tag_supported;
+ struct bpf_insn_aux_data *insn_aux_data;
+ const struct bpf_line_info *prev_linfo;
+ struct bpf_verifier_log log;
+ struct bpf_subprog_info subprog_info[257];
+ struct bpf_id_pair idmap_scratch[75];
+ struct {
+ int *insn_state;
+ int *insn_stack;
+ int cur_stack;
+ } cfg;
+ u32 pass_cnt;
+ u32 subprog_cnt;
+ u32 prev_insn_processed;
+ u32 insn_processed;
+ u32 prev_jmps_processed;
+ u32 jmps_processed;
+ u64 verification_time;
+ u32 max_states_per_insn;
+ u32 total_states;
+ u32 peak_states;
+ u32 longest_mark_read_walk;
+ bpfptr_t fd_array;
+ u32 scratched_regs;
+ u64 scratched_stack_slots;
+ u32 prev_log_len;
+ u32 prev_insn_print_len;
+ char type_str_buf[128];
+};
+
+enum bpf_dynptr_type {
+ BPF_DYNPTR_TYPE_INVALID = 0,
+ BPF_DYNPTR_TYPE_LOCAL = 1,
+ BPF_DYNPTR_TYPE_RINGBUF = 2,
+};
+
+struct tnum {
+ u64 value;
+ u64 mask;
+};
+
+enum bpf_reg_liveness {
+ REG_LIVE_NONE = 0,
+ REG_LIVE_READ32 = 1,
+ REG_LIVE_READ64 = 2,
+ REG_LIVE_READ = 3,
+ REG_LIVE_WRITTEN = 4,
+ REG_LIVE_DONE = 8,
+};
+
+struct bpf_reg_state {
+ enum bpf_reg_type type;
+ s32 off;
+ union {
+ int range;
+ struct {
+ struct bpf_map *map_ptr;
+ u32 map_uid;
+ };
+ struct {
+ struct btf *btf;
+ u32 btf_id;
+ };
+ u32 mem_size;
+ struct {
+ enum bpf_dynptr_type type;
+ bool first_slot;
+ } dynptr;
+ struct {
+ long unsigned int raw1;
+ long unsigned int raw2;
+ } raw;
+ u32 subprogno;
+ };
+ u32 id;
+ u32 ref_obj_id;
+ struct tnum var_off;
+ s64 smin_value;
+ s64 smax_value;
+ u64 umin_value;
+ u64 umax_value;
+ s32 s32_min_value;
+ s32 s32_max_value;
+ u32 u32_min_value;
+ u32 u32_max_value;
+ struct bpf_reg_state *parent;
+ u32 frameno;
+ s32 subreg_def;
+ enum bpf_reg_liveness live;
+ bool precise;
+};
+
+struct bpf_reference_state;
+
+struct bpf_stack_state;
+
+struct bpf_func_state {
+ struct bpf_reg_state regs[11];
+ int callsite;
+ u32 frameno;
+ u32 subprogno;
+ u32 async_entry_cnt;
+ bool in_callback_fn;
+ struct tnum callback_ret_range;
+ bool in_async_callback_fn;
+ int acquired_refs;
+ struct bpf_reference_state *refs;
+ int allocated_stack;
+ struct bpf_stack_state *stack;
+};
+
+enum bpf_access_type {
+ BPF_READ = 1,
+ BPF_WRITE = 2,
+};
+
+struct bpf_insn_access_aux {
+ enum bpf_reg_type reg_type;
+ union {
+ int ctx_field_size;
+ struct {
+ struct btf *btf;
+ u32 btf_id;
+ };
+ };
+ struct bpf_verifier_log *log;
+};
+
+struct bpf_verifier_ops {
+ const struct bpf_func_proto * (*get_func_proto)(enum bpf_func_id, const struct bpf_prog *);
+ bool (*is_valid_access)(int, int, enum bpf_access_type, const struct bpf_prog *, struct bpf_insn_access_aux *);
+ int (*gen_prologue)(struct bpf_insn *, bool, const struct bpf_prog *);
+ int (*gen_ld_abs)(const struct bpf_insn *, struct bpf_insn *);
+ u32 (*convert_ctx_access)(enum bpf_access_type, const struct bpf_insn *, struct bpf_insn *, struct bpf_prog *, u32 *);
+ int (*btf_struct_access)(struct bpf_verifier_log *, const struct bpf_reg_state *, int, int, enum bpf_access_type, u32 *, enum bpf_type_flag *);
+};
+
+enum ip_conntrack_status {
+ IPS_EXPECTED_BIT = 0,
+ IPS_EXPECTED = 1,
+ IPS_SEEN_REPLY_BIT = 1,
+ IPS_SEEN_REPLY = 2,
+ IPS_ASSURED_BIT = 2,
+ IPS_ASSURED = 4,
+ IPS_CONFIRMED_BIT = 3,
+ IPS_CONFIRMED = 8,
+ IPS_SRC_NAT_BIT = 4,
+ IPS_SRC_NAT = 16,
+ IPS_DST_NAT_BIT = 5,
+ IPS_DST_NAT = 32,
+ IPS_NAT_MASK = 48,
+ IPS_SEQ_ADJUST_BIT = 6,
+ IPS_SEQ_ADJUST = 64,
+ IPS_SRC_NAT_DONE_BIT = 7,
+ IPS_SRC_NAT_DONE = 128,
+ IPS_DST_NAT_DONE_BIT = 8,
+ IPS_DST_NAT_DONE = 256,
+ IPS_NAT_DONE_MASK = 384,
+ IPS_DYING_BIT = 9,
+ IPS_DYING = 512,
+ IPS_FIXED_TIMEOUT_BIT = 10,
+ IPS_FIXED_TIMEOUT = 1024,
+ IPS_TEMPLATE_BIT = 11,
+ IPS_TEMPLATE = 2048,
+ IPS_UNTRACKED_BIT = 12,
+ IPS_UNTRACKED = 4096,
+ IPS_NAT_CLASH_BIT = 12,
+ IPS_NAT_CLASH = 4096,
+ IPS_HELPER_BIT = 13,
+ IPS_HELPER = 8192,
+ IPS_OFFLOAD_BIT = 14,
+ IPS_OFFLOAD = 16384,
+ IPS_HW_OFFLOAD_BIT = 15,
+ IPS_HW_OFFLOAD = 32768,
+ IPS_UNCHANGEABLE_MASK = 56313,
+ __IPS_MAX_BIT = 16,
+};
+
+union nf_inet_addr {
+ __u32 all[4];
+ __be32 ip;
+ __be32 ip6[4];
+ struct in_addr in;
+ struct in6_addr in6;
+};
+
+struct ip_ct_tcp_state {
+ u_int32_t td_end;
+ u_int32_t td_maxend;
+ u_int32_t td_maxwin;
+ u_int32_t td_maxack;
+ u_int8_t td_scale;
+ u_int8_t flags;
+};
+
+struct ip_ct_tcp {
+ struct ip_ct_tcp_state seen[2];
+ u_int8_t state;
+ u_int8_t last_dir;
+ u_int8_t retrans;
+ u_int8_t last_index;
+ u_int32_t last_seq;
+ u_int32_t last_ack;
+ u_int32_t last_end;
+ u_int16_t last_win;
+ u_int8_t last_wscale;
+ u_int8_t last_flags;
+};
+
+union nf_conntrack_man_proto {
+ __be16 all;
+ struct {
+ __be16 port;
+ } tcp;
+ struct {
+ __be16 port;
+ } udp;
+ struct {
+ __be16 id;
+ } icmp;
+ struct {
+ __be16 port;
+ } dccp;
+ struct {
+ __be16 port;
+ } sctp;
+ struct {
+ __be16 key;
+ } gre;
+};
+
+struct nf_ct_dccp {
+ u_int8_t role[2];
+ u_int8_t state;
+ u_int8_t last_pkt;
+ u_int8_t last_dir;
+ u_int64_t handshake_seq;
+};
+
+struct ip_ct_sctp {
+ enum sctp_conntrack state;
+ __be32 vtag[2];
+ u8 last_dir;
+ u8 flags;
+};
+
+struct bpf_stack_state {
+ struct bpf_reg_state spilled_ptr;
+ u8 slot_type[8];
+};
+
+struct bpf_reference_state {
+ int id;
+ int insn_idx;
+ int callback_ref;
+ bool release_on_unlock;
+};
+
+struct bpf_idx_pair {
+ u32 prev_idx;
+ u32 idx;
+};
+
+struct bpf_verifier_state {
+ struct bpf_func_state *frame[8];
+ struct bpf_verifier_state *parent;
+ u32 branches;
+ u32 insn_idx;
+ u32 curframe;
+ struct {
+ void *ptr;
+ u32 id;
+ } active_lock;
+ bool speculative;
+ bool active_rcu_lock;
+ u32 first_insn_idx;
+ u32 last_insn_idx;
+ struct bpf_idx_pair *jmp_history;
+ u32 jmp_history_cnt;
+};
+
+struct bpf_verifier_state_list {
+ struct bpf_verifier_state state;
+ struct bpf_verifier_state_list *next;
+ int miss_cnt;
+ int hit_cnt;
+};
+
+struct bpf_loop_inline_state {
+ unsigned int initialized: 1;
+ unsigned int fit_for_inline: 1;
+ u32 callback_subprogno;
+};
+
+struct bpf_insn_aux_data {
+ union {
+ enum bpf_reg_type ptr_type;
+ long unsigned int map_ptr_state;
+ s32 call_imm;
+ u32 alu_limit;
+ struct {
+ u32 map_index;
+ u32 map_off;
+ };
+ struct {
+ enum bpf_reg_type reg_type;
+ union {
+ struct {
+ struct btf *btf;
+ u32 btf_id;
+ };
+ u32 mem_size;
+ };
+ } btf_var;
+ struct bpf_loop_inline_state loop_inline_state;
+ };
+ u64 obj_new_size;
+ struct btf_struct_meta *kptr_struct_meta;
+ u64 map_key_state;
+ int ctx_field_size;
+ u32 seen;
+ bool sanitize_stack_spill;
+ bool zext_dst;
+ bool storage_get_func_atomic;
+ u8 alu_state;
+ unsigned int orig_idx;
+ bool prune_point;
+};
+
+struct nf_ct_gre {
+ unsigned int stream_timeout;
+ unsigned int timeout;
+};
+
+struct nf_conntrack_man {
+ union nf_inet_addr u3;
+ union nf_conntrack_man_proto u;
+ u_int16_t l3num;
+};
+
+struct nf_conntrack_tuple {
+ struct nf_conntrack_man src;
+ struct {
+ union nf_inet_addr u3;
+ union {
+ __be16 all;
+ struct {
+ __be16 port;
+ } tcp;
+ struct {
+ __be16 port;
+ } udp;
+ struct {
+ u_int8_t type;
+ u_int8_t code;
+ } icmp;
+ struct {
+ __be16 port;
+ } dccp;
+ struct {
+ __be16 port;
+ } sctp;
+ struct {
+ __be16 key;
+ } gre;
+ } u;
+ u_int8_t protonum;
+ u_int8_t dir;
+ } dst;
+};
+
+struct nf_conntrack_tuple_hash {
+ struct hlist_nulls_node hnnode;
+ struct nf_conntrack_tuple tuple;
+};
+
+struct nf_ct_udp {
+ long unsigned int stream_ts;
+};
+
+union nf_conntrack_proto {
+ struct nf_ct_dccp dccp;
+ struct ip_ct_sctp sctp;
+ struct ip_ct_tcp tcp;
+ struct nf_ct_udp udp;
+ struct nf_ct_gre gre;
+ unsigned int tmpl_padto;
+};
+
+struct nf_ct_ext;
+
+struct nf_conn {
+ struct nf_conntrack ct_general;
+ spinlock_t lock;
+ u32 timeout;
+ struct nf_conntrack_tuple_hash tuplehash[2];
+ long unsigned int status;
+ possible_net_t ct_net;
+ struct hlist_node nat_bysource;
+ struct { } __nfct_init_offset;
+ struct nf_conn *master;
+ u_int32_t mark;
+ struct nf_ct_ext *ext;
+ union nf_conntrack_proto proto;
+};
+
+struct nf_conntrack_zone {
+ u16 id;
+ u8 flags;
+ u8 dir;
+};
+
+struct nf_ct_ext {
+ u8 offset[5];
+ u8 len;
+ unsigned int gen_id;
+ int: 32;
+ char data[0];
+};
+
+struct nf_conn___init {
+ struct nf_conn ct;
+};
+
+struct bpf_ct_opts {
+ s32 netns_id;
+ s32 error;
+ u8 l4proto;
+ u8 dir;
+ u8 reserved[2];
+};
+
+enum {
+ NF_BPF_CT_OPTS_SZ = 12,
+};
+
+struct fib4_rule {
+ struct fib_rule common;
+ u8 dst_len;
+ u8 src_len;
+ dscp_t dscp;
+ __be32 src;
+ __be32 srcmask;
+ __be32 dst;
+ __be32 dstmask;
+};
+
+struct calipso_doi;
+
+struct netlbl_calipso_ops {
+ int (*doi_add)(struct calipso_doi *, struct netlbl_audit *);
+ void (*doi_free)(struct calipso_doi *);
+ int (*doi_remove)(u32, struct netlbl_audit *);
+ struct calipso_doi * (*doi_getdef)(u32);
+ void (*doi_putdef)(struct calipso_doi *);
+ int (*doi_walk)(u32 *, int (*)(struct calipso_doi *, void *), void *);
+ int (*sock_getattr)(struct sock *, struct netlbl_lsm_secattr *);
+ int (*sock_setattr)(struct sock *, const struct calipso_doi *, const struct netlbl_lsm_secattr *);
+ void (*sock_delattr)(struct sock *);
+ int (*req_setattr)(struct request_sock *, const struct calipso_doi *, const struct netlbl_lsm_secattr *);
+ void (*req_delattr)(struct request_sock *);
+ int (*opt_getattr)(const unsigned char *, struct netlbl_lsm_secattr *);
+ unsigned char * (*skbuff_optptr)(const struct sk_buff *);
+ int (*skbuff_setattr)(struct sk_buff *, const struct calipso_doi *, const struct netlbl_lsm_secattr *);
+ int (*skbuff_delattr)(struct sk_buff *);
+ void (*cache_invalidate)();
+ int (*cache_add)(const unsigned char *, const struct netlbl_lsm_secattr *);
+};
+
+struct calipso_doi {
+ u32 doi;
+ u32 type;
+ refcount_t refcount;
+ struct list_head list;
+ struct callback_head rcu;
+};
+
+struct calipso_map_cache_bkt {
+ spinlock_t lock;
+ u32 size;
+ struct list_head list;
+};
+
+struct calipso_map_cache_entry {
+ u32 hash;
+ unsigned char *key;
+ size_t key_len;
+ struct netlbl_lsm_cache *lsm_data;
+ u32 activity;
+ struct list_head list;
+};
+
+struct mptcp_mib {
+ long unsigned int mibs[52];
+};
+
+struct mptcp_rm_list {
+ u8 ids[8];
+ u8 nr;
+};
+
+struct mptcp_addr_info {
+ u8 id;
+ sa_family_t family;
+ __be16 port;
+ union {
+ struct in_addr addr;
+ struct in6_addr addr6;
+ };
+};
+
+enum {
+ MPTCP_PM_ATTR_UNSPEC = 0,
+ MPTCP_PM_ATTR_ADDR = 1,
+ MPTCP_PM_ATTR_RCV_ADD_ADDRS = 2,
+ MPTCP_PM_ATTR_SUBFLOWS = 3,
+ MPTCP_PM_ATTR_TOKEN = 4,
+ MPTCP_PM_ATTR_LOC_ID = 5,
+ MPTCP_PM_ATTR_ADDR_REMOTE = 6,
+ __MPTCP_PM_ATTR_MAX = 7,
+};
+
+enum mptcp_pm_type {
+ MPTCP_PM_TYPE_KERNEL = 0,
+ MPTCP_PM_TYPE_USERSPACE = 1,
+ __MPTCP_PM_TYPE_NR = 2,
+ __MPTCP_PM_TYPE_MAX = 1,
+};
+
+struct mptcp_pm_data {
+ struct mptcp_addr_info local;
+ struct mptcp_addr_info remote;
+ struct list_head anno_list;
+ struct list_head userspace_pm_local_addr_list;
+ spinlock_t lock;
+ u8 addr_signal;
+ bool server_side;
+ bool work_pending;
+ bool accept_addr;
+ bool accept_subflow;
+ bool remote_deny_join_id0;
+ u8 add_addr_signaled;
+ u8 add_addr_accepted;
+ u8 local_addr_used;
+ u8 pm_type;
+ u8 subflows;
+ u8 status;
+ long unsigned int id_avail_bitmap[4];
+ struct mptcp_rm_list rm_list_tx;
+ struct mptcp_rm_list rm_list_rx;
+};
+
+struct mptcp_pm_addr_entry {
+ struct list_head list;
+ struct mptcp_addr_info addr;
+ u8 flags;
+ int ifindex;
+ struct socket *lsk;
+};
+
+struct mptcp_data_frag {
+ struct list_head list;
+ u64 data_seq;
+ u16 data_len;
+ u16 offset;
+ u16 overhead;
+ u16 already_sent;
+ struct page *page;
+};
+
+struct mptcp_sock {
+ struct inet_connection_sock sk;
+ u64 local_key;
+ u64 remote_key;
+ u64 write_seq;
+ u64 snd_nxt;
+ u64 ack_seq;
+ atomic64_t rcv_wnd_sent;
+ u64 rcv_data_fin_seq;
+ int rmem_fwd_alloc;
+ struct sock *last_snd;
+ int snd_burst;
+ int old_wspace;
+ u64 recovery_snd_nxt;
+ u64 snd_una;
+ u64 wnd_end;
+ long unsigned int timer_ival;
+ u32 token;
+ int rmem_released;
+ long unsigned int flags;
+ long unsigned int cb_flags;
+ long unsigned int push_pending;
+ bool recovery;
+ bool can_ack;
+ bool fully_established;
+ bool rcv_data_fin;
+ bool snd_data_fin_enable;
+ bool rcv_fastclose;
+ bool use_64bit_ack;
+ bool csum_enabled;
+ bool allow_infinite_fallback;
+ u8 mpc_endpoint_id;
+ u8 recvmsg_inq: 1;
+ u8 cork: 1;
+ u8 nodelay: 1;
+ u8 is_sendmsg: 1;
+ int connect_flags;
+ struct work_struct work;
+ struct sk_buff *ooo_last_skb;
+ struct rb_root out_of_order_queue;
+ struct sk_buff_head receive_queue;
+ struct list_head conn_list;
+ struct list_head rtx_queue;
+ struct mptcp_data_frag *first_pending;
+ struct list_head join_list;
+ struct socket *subflow;
+ struct sock *first;
+ struct mptcp_pm_data pm;
+ struct {
+ u32 space;
+ u32 copied;
+ u64 time;
+ u64 rtt_us;
+ } rcvq_space;
+ u32 setsockopt_seq;
+ char ca_name[16];
+ struct mptcp_sock *dl_next;
+};
+
+enum mptcp_data_avail {
+ MPTCP_SUBFLOW_NODATA = 0,
+ MPTCP_SUBFLOW_DATA_AVAIL = 1,
+};
+
+struct mptcp_subflow_context {
+ struct list_head node;
+ union {
+ struct {
+ long unsigned int avg_pacing_rate;
+ u64 local_key;
+ u64 remote_key;
+ u64 idsn;
+ u64 map_seq;
+ u32 snd_isn;
+ u32 token;
+ u32 rel_write_seq;
+ u32 map_subflow_seq;
+ u32 ssn_offset;
+ u32 map_data_len;
+ __wsum map_data_csum;
+ u32 map_csum_len;
+ u32 request_mptcp: 1;
+ u32 request_join: 1;
+ u32 request_bkup: 1;
+ u32 mp_capable: 1;
+ u32 mp_join: 1;
+ u32 fully_established: 1;
+ u32 pm_notified: 1;
+ u32 conn_finished: 1;
+ u32 map_valid: 1;
+ u32 map_csum_reqd: 1;
+ u32 map_data_fin: 1;
+ u32 mpc_map: 1;
+ u32 backup: 1;
+ u32 send_mp_prio: 1;
+ u32 send_mp_fail: 1;
+ u32 send_fastclose: 1;
+ u32 send_infinite_map: 1;
+ u32 rx_eof: 1;
+ u32 remote_key_valid: 1;
+ u32 disposable: 1;
+ u32 stale: 1;
+ u32 local_id_valid: 1;
+ u32 valid_csum_seen: 1;
+ u32 is_mptfo: 1;
+ u32 __unused: 8;
+ enum mptcp_data_avail data_avail;
+ u32 remote_nonce;
+ u64 thmac;
+ u32 local_nonce;
+ u32 remote_token;
+ union {
+ u8 hmac[20];
+ u64 iasn;
+ };
+ u8 local_id;
+ u8 remote_id;
+ u8 reset_seen: 1;
+ u8 reset_transient: 1;
+ u8 reset_reason: 4;
+ u8 stale_count;
+ long int delegated_status;
+ long unsigned int fail_tout;
+ };
+ struct {
+ long unsigned int avg_pacing_rate;
+ u64 local_key;
+ u64 remote_key;
+ u64 idsn;
+ u64 map_seq;
+ u32 snd_isn;
+ u32 token;
+ u32 rel_write_seq;
+ u32 map_subflow_seq;
+ u32 ssn_offset;
+ u32 map_data_len;
+ __wsum map_data_csum;
+ u32 map_csum_len;
+ u32 request_mptcp: 1;
+ u32 request_join: 1;
+ u32 request_bkup: 1;
+ u32 mp_capable: 1;
+ u32 mp_join: 1;
+ u32 fully_established: 1;
+ u32 pm_notified: 1;
+ u32 conn_finished: 1;
+ u32 map_valid: 1;
+ u32 map_csum_reqd: 1;
+ u32 map_data_fin: 1;
+ u32 mpc_map: 1;
+ u32 backup: 1;
+ u32 send_mp_prio: 1;
+ u32 send_mp_fail: 1;
+ u32 send_fastclose: 1;
+ u32 send_infinite_map: 1;
+ u32 rx_eof: 1;
+ u32 remote_key_valid: 1;
+ u32 disposable: 1;
+ u32 stale: 1;
+ u32 local_id_valid: 1;
+ u32 valid_csum_seen: 1;
+ u32 is_mptfo: 1;
+ u32 __unused: 8;
+ enum mptcp_data_avail data_avail;
+ u32 remote_nonce;
+ u64 thmac;
+ u32 local_nonce;
+ u32 remote_token;
+ union {
+ u8 hmac[20];
+ u64 iasn;
+ };
+ u8 local_id;
+ u8 remote_id;
+ u8 reset_seen: 1;
+ u8 reset_transient: 1;
+ u8 reset_reason: 4;
+ u8 stale_count;
+ long int delegated_status;
+ long unsigned int fail_tout;
+ } reset;
+ };
+ struct list_head delegated_node;
+ u32 setsockopt_seq;
+ u32 stale_rcv_tstamp;
+ struct sock *tcp_sock;
+ struct sock *conn;
+ const struct inet_connection_sock_af_ops *icsk_af_ops;
+ void (*tcp_state_change)(struct sock *);
+ void (*tcp_error_report)(struct sock *);
+ struct callback_head rcu;
+};
+
+enum linux_mptcp_mib_field {
+ MPTCP_MIB_NUM = 0,
+ MPTCP_MIB_MPCAPABLEPASSIVE = 1,
+ MPTCP_MIB_MPCAPABLEACTIVE = 2,
+ MPTCP_MIB_MPCAPABLEACTIVEACK = 3,
+ MPTCP_MIB_MPCAPABLEPASSIVEACK = 4,
+ MPTCP_MIB_MPCAPABLEPASSIVEFALLBACK = 5,
+ MPTCP_MIB_MPCAPABLEACTIVEFALLBACK = 6,
+ MPTCP_MIB_TOKENFALLBACKINIT = 7,
+ MPTCP_MIB_RETRANSSEGS = 8,
+ MPTCP_MIB_JOINNOTOKEN = 9,
+ MPTCP_MIB_JOINSYNRX = 10,
+ MPTCP_MIB_JOINSYNACKRX = 11,
+ MPTCP_MIB_JOINSYNACKMAC = 12,
+ MPTCP_MIB_JOINACKRX = 13,
+ MPTCP_MIB_JOINACKMAC = 14,
+ MPTCP_MIB_DSSNOMATCH = 15,
+ MPTCP_MIB_INFINITEMAPTX = 16,
+ MPTCP_MIB_INFINITEMAPRX = 17,
+ MPTCP_MIB_DSSTCPMISMATCH = 18,
+ MPTCP_MIB_DATACSUMERR = 19,
+ MPTCP_MIB_OFOQUEUETAIL = 20,
+ MPTCP_MIB_OFOQUEUE = 21,
+ MPTCP_MIB_OFOMERGE = 22,
+ MPTCP_MIB_NODSSWINDOW = 23,
+ MPTCP_MIB_DUPDATA = 24,
+ MPTCP_MIB_ADDADDR = 25,
+ MPTCP_MIB_ECHOADD = 26,
+ MPTCP_MIB_PORTADD = 27,
+ MPTCP_MIB_ADDADDRDROP = 28,
+ MPTCP_MIB_JOINPORTSYNRX = 29,
+ MPTCP_MIB_JOINPORTSYNACKRX = 30,
+ MPTCP_MIB_JOINPORTACKRX = 31,
+ MPTCP_MIB_MISMATCHPORTSYNRX = 32,
+ MPTCP_MIB_MISMATCHPORTACKRX = 33,
+ MPTCP_MIB_RMADDR = 34,
+ MPTCP_MIB_RMADDRDROP = 35,
+ MPTCP_MIB_RMSUBFLOW = 36,
+ MPTCP_MIB_MPPRIOTX = 37,
+ MPTCP_MIB_MPPRIORX = 38,
+ MPTCP_MIB_MPFAILTX = 39,
+ MPTCP_MIB_MPFAILRX = 40,
+ MPTCP_MIB_MPFASTCLOSETX = 41,
+ MPTCP_MIB_MPFASTCLOSERX = 42,
+ MPTCP_MIB_MPRSTTX = 43,
+ MPTCP_MIB_MPRSTRX = 44,
+ MPTCP_MIB_RCVPRUNED = 45,
+ MPTCP_MIB_SUBFLOWSTALE = 46,
+ MPTCP_MIB_SUBFLOWRECOVER = 47,
+ MPTCP_MIB_SNDWNDSHARED = 48,
+ MPTCP_MIB_RCVWNDSHARED = 49,
+ MPTCP_MIB_RCVWNDCONFLICTUPDATE = 50,
+ MPTCP_MIB_RCVWNDCONFLICT = 51,
+ __MPTCP_MIB_MAX = 52,
+};
+
+struct x86_cpuinit_ops {
+ void (*setup_percpu_clockev)();
+ void (*early_percpu_clock_init)();
+ void (*fixup_cpu_id)(struct cpuinfo_x86 *, int);
+};
+
+struct mtrr_var_range {
+ __u32 base_lo;
+ __u32 base_hi;
+ __u32 mask_lo;
+ __u32 mask_hi;
+};
+
+typedef __u8 mtrr_type;
+
+struct mtrr_state_type {
+ struct mtrr_var_range var_ranges[256];
+ mtrr_type fixed_ranges[88];
+ unsigned char enabled;
+ unsigned char have_fixed;
+ mtrr_type def_type;
+};
+
+struct mtrr_ops {
+ u32 vendor;
+ u32 use_intel_if;
+ void (*set)(unsigned int, long unsigned int, long unsigned int, mtrr_type);
+ void (*set_all)();
+ void (*get)(unsigned int, long unsigned int *, long unsigned int *, mtrr_type *);
+ int (*get_free_region)(long unsigned int, long unsigned int, int);
+ int (*validate_add_page)(long unsigned int, long unsigned int, unsigned int);
+ int (*have_wrcomb)();
+};
+
+struct var_mtrr_range_state {
+ long unsigned int base_pfn;
+ long unsigned int size_pfn;
+ mtrr_type type;
+};
+
+struct var_mtrr_state {
+ long unsigned int range_startk;
+ long unsigned int range_sizek;
+ long unsigned int chunk_sizek;
+ long unsigned int gran_sizek;
+ unsigned int reg;
+};
+
+struct mtrr_cleanup_result {
+ long unsigned int gran_sizek;
+ long unsigned int chunk_sizek;
+ long unsigned int lose_cover_sizek;
+ unsigned int num_reg;
+ int bad;
+};
+
+struct mpc_ioapic {
+ unsigned char type;
+ unsigned char apicid;
+ unsigned char apicver;
+ unsigned char flags;
+ unsigned int apicaddr;
+};
+
+struct mpc_intsrc {
+ unsigned char type;
+ unsigned char irqtype;
+ short unsigned int irqflag;
+ unsigned char srcbus;
+ unsigned char srcbusirq;
+ unsigned char dstapic;
+ unsigned char dstirq;
+};
+
+enum mp_irq_source_types {
+ mp_INT = 0,
+ mp_NMI = 1,
+ mp_SMI = 2,
+ mp_ExtINT = 3,
+};
+
+struct x86_apic_ops {
+ unsigned int (*io_apic_read)(unsigned int, unsigned int);
+ void (*restore)();
+};
+
+struct irq_affinity_desc {
+ struct cpumask mask;
+ unsigned int is_managed: 1;
+};
+
+enum {
+ IRQ_TYPE_NONE = 0,
+ IRQ_TYPE_EDGE_RISING = 1,
+ IRQ_TYPE_EDGE_FALLING = 2,
+ IRQ_TYPE_EDGE_BOTH = 3,
+ IRQ_TYPE_LEVEL_HIGH = 4,
+ IRQ_TYPE_LEVEL_LOW = 8,
+ IRQ_TYPE_LEVEL_MASK = 12,
+ IRQ_TYPE_SENSE_MASK = 15,
+ IRQ_TYPE_DEFAULT = 15,
+ IRQ_TYPE_PROBE = 16,
+ IRQ_LEVEL = 256,
+ IRQ_PER_CPU = 512,
+ IRQ_NOPROBE = 1024,
+ IRQ_NOREQUEST = 2048,
+ IRQ_NOAUTOEN = 4096,
+ IRQ_NO_BALANCING = 8192,
+ IRQ_MOVE_PCNTXT = 16384,
+ IRQ_NESTED_THREAD = 32768,
+ IRQ_NOTHREAD = 65536,
+ IRQ_PER_CPU_DEVID = 131072,
+ IRQ_IS_POLLED = 262144,
+ IRQ_DISABLE_UNLAZY = 524288,
+ IRQ_HIDDEN = 1048576,
+ IRQ_NO_DEBUG = 2097152,
+};
+
+enum {
+ IRQ_SET_MASK_OK = 0,
+ IRQ_SET_MASK_OK_NOCOPY = 1,
+ IRQ_SET_MASK_OK_DONE = 2,
+};
+
+struct x86_msi_addr_lo {
+ union {
+ struct {
+ u32 reserved_0: 2;
+ u32 dest_mode_logical: 1;
+ u32 redirect_hint: 1;
+ u32 reserved_1: 1;
+ u32 virt_destid_8_14: 7;
+ u32 destid_0_7: 8;
+ u32 base_address: 12;
+ };
+ struct {
+ u32 dmar_reserved_0: 2;
+ u32 dmar_index_15: 1;
+ u32 dmar_subhandle_valid: 1;
+ u32 dmar_format: 1;
+ u32 dmar_index_0_14: 15;
+ u32 dmar_base_address: 12;
+ };
+ };
+};
+
+typedef struct x86_msi_addr_lo arch_msi_msg_addr_lo_t;
+
+struct x86_msi_addr_hi {
+ u32 reserved: 8;
+ u32 destid_8_31: 24;
+};
+
+typedef struct x86_msi_addr_hi arch_msi_msg_addr_hi_t;
+
+struct x86_msi_data {
+ union {
+ struct {
+ u32 vector: 8;
+ u32 delivery_mode: 3;
+ u32 dest_mode_logical: 1;
+ u32 reserved: 2;
+ u32 active_low: 1;
+ u32 is_level: 1;
+ };
+ u32 dmar_subhandle;
+ };
+};
+
+typedef struct x86_msi_data arch_msi_msg_data_t;
+
+struct msi_msg {
+ union {
+ u32 address_lo;
+ arch_msi_msg_addr_lo_t arch_addr_lo;
+ };
+ union {
+ u32 address_hi;
+ arch_msi_msg_addr_hi_t arch_addr_hi;
+ };
+ union {
+ u32 data;
+ arch_msi_msg_data_t arch_data;
+ };
+};
+
+struct pci_msi_desc {
+ union {
+ u32 msi_mask;
+ u32 msix_ctrl;
+ };
+ struct {
+ u8 is_msix: 1;
+ u8 multiple: 3;
+ u8 multi_cap: 3;
+ u8 can_mask: 1;
+ u8 is_64: 1;
+ u8 is_virtual: 1;
+ unsigned int default_irq;
+ } msi_attrib;
+ union {
+ u8 mask_pos;
+ void *mask_base;
+ };
+};
+
+struct msi_desc {
+ unsigned int irq;
+ unsigned int nvec_used;
+ struct device *dev;
+ struct msi_msg msg;
+ struct irq_affinity_desc *affinity;
+ const void *iommu_cookie;
+ struct device_attribute *sysfs_attrs;
+ void (*write_msi_msg)(struct msi_desc *, void *);
+ void *write_msi_msg_data;
+ u16 msi_index;
+ struct pci_msi_desc pci;
+};
+
+enum {
+ IRQD_TRIGGER_MASK = 15,
+ IRQD_SETAFFINITY_PENDING = 256,
+ IRQD_ACTIVATED = 512,
+ IRQD_NO_BALANCING = 1024,
+ IRQD_PER_CPU = 2048,
+ IRQD_AFFINITY_SET = 4096,
+ IRQD_LEVEL = 8192,
+ IRQD_WAKEUP_STATE = 16384,
+ IRQD_MOVE_PCNTXT = 32768,
+ IRQD_IRQ_DISABLED = 65536,
+ IRQD_IRQ_MASKED = 131072,
+ IRQD_IRQ_INPROGRESS = 262144,
+ IRQD_WAKEUP_ARMED = 524288,
+ IRQD_FORWARDED_TO_VCPU = 1048576,
+ IRQD_AFFINITY_MANAGED = 2097152,
+ IRQD_IRQ_STARTED = 4194304,
+ IRQD_MANAGED_SHUTDOWN = 8388608,
+ IRQD_SINGLE_TARGET = 16777216,
+ IRQD_DEFAULT_TRIGGER_SET = 33554432,
+ IRQD_CAN_RESERVE = 67108864,
+ IRQD_MSI_NOMASK_QUIRK = 134217728,
+ IRQD_HANDLE_ENFORCE_IRQCTX = 268435456,
+ IRQD_AFFINITY_ON_ACTIVATE = 536870912,
+ IRQD_IRQ_ENABLED_ON_SUSPEND = 1073741824,
+};
+
+enum {
+ IRQCHIP_SET_TYPE_MASKED = 1,
+ IRQCHIP_EOI_IF_HANDLED = 2,
+ IRQCHIP_MASK_ON_SUSPEND = 4,
+ IRQCHIP_ONOFFLINE_ENABLED = 8,
+ IRQCHIP_SKIP_SET_WAKE = 16,
+ IRQCHIP_ONESHOT_SAFE = 32,
+ IRQCHIP_EOI_THREADED = 64,
+ IRQCHIP_SUPPORTS_LEVEL_MSI = 128,
+ IRQCHIP_SUPPORTS_NMI = 256,
+ IRQCHIP_ENABLE_WAKEUP_ON_SUSPEND = 512,
+ IRQCHIP_AFFINITY_PRE_STARTUP = 1024,
+ IRQCHIP_IMMUTABLE = 2048,
+};
+
+enum irq_alloc_type {
+ X86_IRQ_ALLOC_TYPE_IOAPIC = 1,
+ X86_IRQ_ALLOC_TYPE_HPET = 2,
+ X86_IRQ_ALLOC_TYPE_PCI_MSI = 3,
+ X86_IRQ_ALLOC_TYPE_PCI_MSIX = 4,
+ X86_IRQ_ALLOC_TYPE_DMAR = 5,
+ X86_IRQ_ALLOC_TYPE_AMDVI = 6,
+ X86_IRQ_ALLOC_TYPE_UV = 7,
+};
+
+struct ioapic_alloc_info {
+ int pin;
+ int node;
+ u32 is_level: 1;
+ u32 active_low: 1;
+ u32 valid: 1;
+};
+
+struct uv_alloc_info {
+ int limit;
+ int blade;
+ long unsigned int offset;
+ char *name;
+};
+
+struct irq_alloc_info {
+ enum irq_alloc_type type;
+ u32 flags;
+ u32 devid;
+ irq_hw_number_t hwirq;
+ const struct cpumask *mask;
+ struct msi_desc *desc;
+ void *data;
+ union {
+ struct ioapic_alloc_info ioapic;
+ struct uv_alloc_info uv;
+ };
+};
+
+struct irq_cfg {
+ unsigned int dest_apicid;
+ unsigned int vector;
+};
+
+enum {
+ IRQCHIP_FWNODE_REAL = 0,
+ IRQCHIP_FWNODE_NAMED = 1,
+ IRQCHIP_FWNODE_NAMED_ID = 2,
+};
+
+enum {
+ X86_IRQ_ALLOC_CONTIGUOUS_VECTORS = 1,
+ X86_IRQ_ALLOC_LEGACY = 2,
+};
+
+enum ioapic_domain_type {
+ IOAPIC_DOMAIN_INVALID = 0,
+ IOAPIC_DOMAIN_LEGACY = 1,
+ IOAPIC_DOMAIN_STRICT = 2,
+ IOAPIC_DOMAIN_DYNAMIC = 3,
+};
+
+struct ioapic_domain_cfg {
+ enum ioapic_domain_type type;
+ const struct irq_domain_ops *ops;
+ struct device_node *dev;
+};
+
+struct clock_event_device;
+
+struct legacy_pic {
+ int nr_legacy_irqs;
+ struct irq_chip *chip;
+ void (*mask)(unsigned int);
+ void (*unmask)(unsigned int);
+ void (*mask_all)();
+ void (*restore_mask)();
+ void (*init)(int);
+ int (*probe)();
+ int (*irq_pending)(unsigned int);
+ void (*make_irq)(unsigned int);
+};
+
+union IO_APIC_reg_00 {
+ u32 raw;
+ struct {
+ u32 __reserved_2: 14;
+ u32 LTS: 1;
+ u32 delivery_type: 1;
+ u32 __reserved_1: 8;
+ u32 ID: 8;
+ } bits;
+};
+
+union IO_APIC_reg_01 {
+ u32 raw;
+ struct {
+ u32 version: 8;
+ u32 __reserved_2: 7;
+ u32 PRQ: 1;
+ u32 entries: 8;
+ u32 __reserved_1: 8;
+ } bits;
+};
+
+union IO_APIC_reg_02 {
+ u32 raw;
+ struct {
+ u32 __reserved_2: 24;
+ u32 arbitration: 4;
+ u32 __reserved_1: 4;
+ } bits;
+};
+
+union IO_APIC_reg_03 {
+ u32 raw;
+ struct {
+ u32 boot_DT: 1;
+ u32 __reserved_1: 31;
+ } bits;
+};
+
+struct IO_APIC_route_entry {
+ union {
+ struct {
+ u64 vector: 8;
+ u64 delivery_mode: 3;
+ u64 dest_mode_logical: 1;
+ u64 delivery_status: 1;
+ u64 active_low: 1;
+ u64 irr: 1;
+ u64 is_level: 1;
+ u64 masked: 1;
+ u64 reserved_0: 15;
+ u64 reserved_1: 17;
+ u64 virt_destid_8_14: 7;
+ u64 destid_0_7: 8;
+ };
+ struct {
+ u64 ir_shared_0: 8;
+ u64 ir_zero: 3;
+ u64 ir_index_15: 1;
+ u64 ir_shared_1: 5;
+ u64 ir_reserved_0: 31;
+ u64 ir_format: 1;
+ u64 ir_index_0_14: 15;
+ };
+ struct {
+ u64 w1: 32;
+ u64 w2: 32;
+ };
+ };
+};
+
+struct irq_pin_list {
+ struct list_head list;
+ int apic;
+ int pin;
+};
+
+struct mp_chip_data {
+ struct list_head irq_2_pin;
+ struct IO_APIC_route_entry entry;
+ bool is_level;
+ bool active_low;
+ bool isa_irq;
+ u32 count;
+};
+
+struct mp_ioapic_gsi {
+ u32 gsi_base;
+ u32 gsi_end;
+};
+
+struct ioapic {
+ int nr_registers;
+ struct IO_APIC_route_entry *saved_registers;
+ struct mpc_ioapic mp_config;
+ struct mp_ioapic_gsi gsi_config;
+ struct ioapic_domain_cfg irqdomain_cfg;
+ struct irq_domain *irqdomain;
+ struct resource *iomem_res;
+};
+
+struct io_apic {
+ unsigned int index;
+ unsigned int unused[3];
+ unsigned int data;
+ unsigned int unused2[11];
+ unsigned int eoi;
+};
+
+enum pageblock_bits {
+ PB_migrate = 0,
+ PB_migrate_end = 2,
+ PB_migrate_skip = 3,
+ NR_PAGEBLOCK_BITS = 4,
+};
+
+typedef unsigned int isolate_mode_t;
+
+struct node {
+ struct device dev;
+ struct list_head access_list;
+};
+
+enum page_memcg_data_flags {
+ MEMCG_DATA_OBJCGS = 1,
+ MEMCG_DATA_KMEM = 2,
+ __NR_MEMCG_DATA_FLAGS = 4,
+};
+
+typedef struct page *new_page_t(struct page *, long unsigned int);
+
+typedef void free_page_t(struct page *, long unsigned int);
+
+struct movable_operations {
+ bool (*isolate_page)(struct page *, isolate_mode_t);
+ int (*migrate_page)(struct page *, struct page *, enum migrate_mode);
+ void (*putback_page)(struct page *);
+};
+
+struct alloc_context {
+ struct zonelist *zonelist;
+ nodemask_t *nodemask;
+ struct zoneref *preferred_zoneref;
+ int migratetype;
+ enum zone_type highest_zoneidx;
+ bool spread_dirty_pages;
+};
+
+struct trace_event_raw_mm_compaction_isolate_template {
+ struct trace_entry ent;
+ long unsigned int start_pfn;
+ long unsigned int end_pfn;
+ long unsigned int nr_scanned;
+ long unsigned int nr_taken;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_compaction_migratepages {
+ struct trace_entry ent;
+ long unsigned int nr_migrated;
+ long unsigned int nr_failed;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_compaction_begin {
+ struct trace_entry ent;
+ long unsigned int zone_start;
+ long unsigned int migrate_pfn;
+ long unsigned int free_pfn;
+ long unsigned int zone_end;
+ bool sync;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_compaction_end {
+ struct trace_entry ent;
+ long unsigned int zone_start;
+ long unsigned int migrate_pfn;
+ long unsigned int free_pfn;
+ long unsigned int zone_end;
+ bool sync;
+ int status;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_compaction_try_to_compact_pages {
+ struct trace_entry ent;
+ int order;
+ long unsigned int gfp_mask;
+ int prio;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_compaction_suitable_template {
+ struct trace_entry ent;
+ int nid;
+ enum zone_type idx;
+ int order;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_compaction_defer_template {
+ struct trace_entry ent;
+ int nid;
+ enum zone_type idx;
+ int order;
+ unsigned int considered;
+ unsigned int defer_shift;
+ int order_failed;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_compaction_kcompactd_sleep {
+ struct trace_entry ent;
+ int nid;
+ char __data[0];
+};
+
+struct trace_event_raw_kcompactd_wake_template {
+ struct trace_entry ent;
+ int nid;
+ int order;
+ enum zone_type highest_zoneidx;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_mm_compaction_isolate_template {};
+
+struct trace_event_data_offsets_mm_compaction_migratepages {};
+
+struct trace_event_data_offsets_mm_compaction_begin {};
+
+struct trace_event_data_offsets_mm_compaction_end {};
+
+struct trace_event_data_offsets_mm_compaction_try_to_compact_pages {};
+
+struct trace_event_data_offsets_mm_compaction_suitable_template {};
+
+struct trace_event_data_offsets_mm_compaction_defer_template {};
+
+struct trace_event_data_offsets_mm_compaction_kcompactd_sleep {};
+
+struct trace_event_data_offsets_kcompactd_wake_template {};
+
+typedef void (*btf_trace_mm_compaction_isolate_migratepages)(void *, long unsigned int, long unsigned int, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_mm_compaction_isolate_freepages)(void *, long unsigned int, long unsigned int, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_mm_compaction_migratepages)(void *, struct compact_control *, unsigned int);
+
+typedef void (*btf_trace_mm_compaction_begin)(void *, struct compact_control *, long unsigned int, long unsigned int, bool);
+
+typedef void (*btf_trace_mm_compaction_end)(void *, struct compact_control *, long unsigned int, long unsigned int, bool, int);
+
+typedef void (*btf_trace_mm_compaction_try_to_compact_pages)(void *, int, gfp_t, int);
+
+typedef void (*btf_trace_mm_compaction_finished)(void *, struct zone *, int, int);
+
+typedef void (*btf_trace_mm_compaction_suitable)(void *, struct zone *, int, int);
+
+typedef void (*btf_trace_mm_compaction_deferred)(void *, struct zone *, int);
+
+typedef void (*btf_trace_mm_compaction_defer_compaction)(void *, struct zone *, int);
+
+typedef void (*btf_trace_mm_compaction_defer_reset)(void *, struct zone *, int);
+
+typedef void (*btf_trace_mm_compaction_kcompactd_sleep)(void *, int);
+
+typedef void (*btf_trace_mm_compaction_wakeup_kcompactd)(void *, int, int, enum zone_type);
+
+typedef void (*btf_trace_mm_compaction_kcompactd_wake)(void *, int, int, enum zone_type);
+
+typedef enum {
+ ISOLATE_ABORT = 0,
+ ISOLATE_NONE = 1,
+ ISOLATE_SUCCESS = 2,
+} isolate_migrate_t;
+
+struct sockaddr_un {
+ __kernel_sa_family_t sun_family;
+ char sun_path[108];
+};
+
+struct unix_address {
+ refcount_t refcnt;
+ int len;
+ struct sockaddr_un name[0];
+};
+
+struct scm_stat {
+ atomic_t nr_fds;
+};
+
+struct unix_sock {
+ struct sock sk;
+ struct unix_address *addr;
+ struct path path;
+ struct mutex iolock;
+ struct mutex bindlock;
+ struct sock *peer;
+ struct list_head link;
+ atomic_long_t inflight;
+ spinlock_t lock;
+ long unsigned int gc_flags;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct socket_wq peer_wq;
+ wait_queue_entry_t peer_wake;
+ struct scm_stat scm_stat;
+ struct sk_buff *oob_skb;
+ long: 64;
+};
+
+struct dccp_hdr {
+ __be16 dccph_sport;
+ __be16 dccph_dport;
+ __u8 dccph_doff;
+ __u8 dccph_cscov: 4;
+ __u8 dccph_ccval: 4;
+ __sum16 dccph_checksum;
+ __u8 dccph_x: 1;
+ __u8 dccph_type: 4;
+ __u8 dccph_reserved: 3;
+ __u8 dccph_seq2;
+ __be16 dccph_seq;
+};
+
+struct sctphdr {
+ __be16 source;
+ __be16 dest;
+ __be32 vtag;
+ __le32 checksum;
+};
+
+struct io_sync {
+ struct file *file;
+ loff_t len;
+ loff_t off;
+ int flags;
+ int mode;
+};
+
+struct pcie_link_state {
+ struct pci_dev *pdev;
+ struct pci_dev *downstream;
+ struct pcie_link_state *root;
+ struct pcie_link_state *parent;
+ struct list_head sibling;
+ u32 aspm_support: 7;
+ u32 aspm_enabled: 7;
+ u32 aspm_capable: 7;
+ u32 aspm_default: 7;
+ char: 4;
+ u32 aspm_disable: 7;
+ u32 clkpm_capable: 1;
+ u32 clkpm_enabled: 1;
+ u32 clkpm_default: 1;
+ u32 clkpm_disable: 1;
+};
+
+struct pci_cap_saved_data {
+ u16 cap_nr;
+ bool cap_extended;
+ unsigned int size;
+ u32 data[0];
+};
+
+struct pci_cap_saved_state {
+ struct hlist_node next;
+ struct pci_cap_saved_data cap;
+};
+
+struct apd_private_data;
+
+struct apd_device_desc {
+ unsigned int fixed_clk_rate;
+ struct property_entry *properties;
+ int (*setup)(struct apd_private_data *);
+};
+
+struct apd_private_data {
+ struct clk *clk;
+ struct acpi_device *adev;
+ const struct apd_device_desc *dev_desc;
+};
+
+struct acpi_connection_info {
+ u8 *connection;
+ u16 length;
+ u8 access_length;
+};
+
+struct acpi_reg_walk_info {
+ u32 function;
+ u32 reg_run_count;
+ acpi_adr_space_type space_id;
+};
+
+struct acpi_predefined_names {
+ const char *name;
+ u8 type;
+ char *val;
+};
+
+typedef u32 (*acpi_sci_handler)(void *);
+
+typedef void (*acpi_gbl_event_handler)(u32, acpi_handle, u32, void *);
+
+typedef u32 (*acpi_event_handler)(void *);
+
+typedef acpi_status (*acpi_init_handler)(acpi_handle, u32);
+
+typedef acpi_status (*acpi_table_handler)(u32, void *, void *);
+
+typedef u32 (*acpi_interface_handler)(acpi_string, u32);
+
+struct acpi_sci_handler_info {
+ struct acpi_sci_handler_info *next;
+ acpi_sci_handler address;
+ void *context;
+};
+
+struct acpi_fixed_event_handler {
+ acpi_event_handler handler;
+ void *context;
+};
+
+struct acpi_fixed_event_info {
+ u8 status_register_id;
+ u8 enable_register_id;
+ u16 status_bit_mask;
+ u16 enable_bit_mask;
+};
+
+struct acpi_address_range {
+ struct acpi_address_range *next;
+ struct acpi_namespace_node *region_node;
+ acpi_physical_address start_address;
+ acpi_physical_address end_address;
+};
+
+struct acpi_comment_node {
+ char *comment;
+ struct acpi_comment_node *next;
+};
+
+struct acpi_bit_register_info {
+ u8 parent_register;
+ u8 bit_position;
+ u16 access_bit_mask;
+};
+
+struct acpi_interface_info {
+ char *name;
+ struct acpi_interface_info *next;
+ u8 flags;
+ u8 value;
+};
+
+struct atomic_notifier_head {
+ spinlock_t lock;
+ struct notifier_block *head;
+};
+
+struct kbentry {
+ unsigned char kb_table;
+ unsigned char kb_index;
+ short unsigned int kb_value;
+};
+
+struct kbsentry {
+ unsigned char kb_func;
+ unsigned char kb_string[512];
+};
+
+struct kbdiacr {
+ unsigned char diacr;
+ unsigned char base;
+ unsigned char result;
+};
+
+struct kbdiacrs {
+ unsigned int kb_cnt;
+ struct kbdiacr kbdiacr[256];
+};
+
+struct kbdiacruc {
+ unsigned int diacr;
+ unsigned int base;
+ unsigned int result;
+};
+
+struct kbdiacrsuc {
+ unsigned int kb_cnt;
+ struct kbdiacruc kbdiacruc[256];
+};
+
+struct kbkeycode {
+ unsigned int scancode;
+ unsigned int keycode;
+};
+
+struct kbd_repeat {
+ int delay;
+ int period;
+};
+
+struct tasklet_struct {
+ struct tasklet_struct *next;
+ long unsigned int state;
+ atomic_t count;
+ bool use_callback;
+ union {
+ void (*func)(long unsigned int);
+ void (*callback)(struct tasklet_struct *);
+ };
+ long unsigned int data;
+};
+
+enum {
+ TASKLET_STATE_SCHED = 0,
+ TASKLET_STATE_RUN = 1,
+};
+
+struct keyboard_notifier_param {
+ struct vc_data *vc;
+ int down;
+ int shift;
+ int ledstate;
+ unsigned int value;
+};
+
+struct kbd_struct {
+ unsigned char lockstate;
+ unsigned char slockstate;
+ unsigned char ledmode: 1;
+ unsigned char ledflagstate: 4;
+ char: 3;
+ unsigned char default_ledflagstate: 4;
+ unsigned char kbdmode: 3;
+ char: 1;
+ unsigned char modeflags: 5;
+};
+
+struct vt_spawn_console {
+ spinlock_t lock;
+ struct pid *pid;
+ int sig;
+};
+
+typedef void k_handler_fn(struct vc_data *, unsigned char, char);
+
+typedef void fn_handler_fn(struct vc_data *);
+
+struct getset_keycode_data {
+ struct input_keymap_entry ke;
+ int error;
+};
+
+struct klist_node;
+
+struct klist {
+ spinlock_t k_lock;
+ struct list_head k_list;
+ void (*get)(struct klist_node *);
+ void (*put)(struct klist_node *);
+};
+
+struct klist_node {
+ void *n_klist;
+ struct list_head n_node;
+ struct kref n_ref;
+};
+
+struct subsys_private {
+ struct kset subsys;
+ struct kset *devices_kset;
+ struct list_head interfaces;
+ struct mutex mutex;
+ struct kset *drivers_kset;
+ struct klist klist_devices;
+ struct klist klist_drivers;
+ struct blocking_notifier_head bus_notifier;
+ unsigned int drivers_autoprobe: 1;
+ struct bus_type *bus;
+ struct kset glue_dirs;
+ struct class *class;
+};
+
+struct driver_private {
+ struct kobject kobj;
+ struct klist klist_devices;
+ struct klist_node knode_bus;
+ struct module_kobject *mkobj;
+ struct device_driver *driver;
+};
+
+typedef int (*dr_match_t)(struct device *, void *, void *);
+
+struct device_private {
+ struct klist klist_children;
+ struct klist_node knode_parent;
+ struct klist_node knode_driver;
+ struct klist_node knode_bus;
+ struct klist_node knode_class;
+ struct list_head deferred_probe;
+ struct device_driver *async_driver;
+ char *deferred_probe_reason;
+ struct device *device;
+ u8 dead: 1;
+};
+
+enum kernel_read_file_id {
+ READING_UNKNOWN = 0,
+ READING_FIRMWARE = 1,
+ READING_MODULE = 2,
+ READING_KEXEC_IMAGE = 3,
+ READING_KEXEC_INITRAMFS = 4,
+ READING_POLICY = 5,
+ READING_X509_CERTIFICATE = 6,
+ READING_MAX_ID = 7,
+};
+
+struct firmware_cache {
+ spinlock_t lock;
+ struct list_head head;
+ int state;
+ spinlock_t name_lock;
+ struct list_head fw_names;
+ struct delayed_work work;
+ struct notifier_block pm_notify;
+};
+
+struct fw_cache_entry {
+ struct list_head list;
+ const char *name;
+};
+
+struct fw_name_devm {
+ long unsigned int magic;
+ const char *name;
+};
+
+struct firmware_work {
+ struct work_struct work;
+ struct module *module;
+ const char *name;
+ struct device *device;
+ void *context;
+ void (*cont)(const struct firmware *, void *);
+ u32 opt_flags;
+};
+
+struct wol_reply_data {
+ struct ethnl_reply_data base;
+ struct ethtool_wolinfo wol;
+ bool show_sopass;
+};
+
+enum nf_nat_manip_type {
+ NF_NAT_MANIP_SRC = 0,
+ NF_NAT_MANIP_DST = 1,
+};
+
+struct nf_nat_range2 {
+ unsigned int flags;
+ union nf_inet_addr min_addr;
+ union nf_inet_addr max_addr;
+ union nf_conntrack_man_proto min_proto;
+ union nf_conntrack_man_proto max_proto;
+ union nf_conntrack_man_proto base_proto;
+};
+
+struct xfrm_policy_afinfo {
+ struct dst_ops *dst_ops;
+ struct dst_entry * (*dst_lookup)(struct net *, int, int, const xfrm_address_t *, const xfrm_address_t *, u32);
+ int (*get_saddr)(struct net *, int, xfrm_address_t *, xfrm_address_t *, u32);
+ int (*fill_dst)(struct xfrm_dst *, struct net_device *, const struct flowi *);
+ struct dst_entry * (*blackhole_route)(struct net *, struct dst_entry *);
+};
+
+struct ioam6_pernet_data {
+ struct mutex lock;
+ struct rhashtable namespaces;
+ struct rhashtable schemas;
+};
+
+struct rt0_hdr {
+ struct ipv6_rt_hdr rt_hdr;
+ __u32 reserved;
+ struct in6_addr addr[0];
+};
+
+struct ipv6_rpl_sr_hdr {
+ __u8 nexthdr;
+ __u8 hdrlen;
+ __u8 type;
+ __u8 segments_left;
+ __u32 cmpre: 4;
+ __u32 cmpri: 4;
+ __u32 reserved: 4;
+ __u32 pad: 4;
+ __u32 reserved1: 16;
+ union {
+ struct in6_addr addr[0];
+ __u8 data[0];
+ } segments;
+};
+
+struct ioam6_hdr {
+ __u8 opt_type;
+ __u8 opt_len;
+ char: 8;
+ __u8 type;
+};
+
+struct ioam6_trace_hdr {
+ __be16 namespace_id;
+ char: 2;
+ __u8 overflow: 1;
+ __u8 nodelen: 5;
+ __u8 remlen: 7;
+ union {
+ __be32 type_be32;
+ struct {
+ __u32 bit7: 1;
+ __u32 bit6: 1;
+ __u32 bit5: 1;
+ __u32 bit4: 1;
+ __u32 bit3: 1;
+ __u32 bit2: 1;
+ __u32 bit1: 1;
+ __u32 bit0: 1;
+ __u32 bit15: 1;
+ __u32 bit14: 1;
+ __u32 bit13: 1;
+ __u32 bit12: 1;
+ __u32 bit11: 1;
+ __u32 bit10: 1;
+ __u32 bit9: 1;
+ __u32 bit8: 1;
+ __u32 bit23: 1;
+ __u32 bit22: 1;
+ __u32 bit21: 1;
+ __u32 bit20: 1;
+ __u32 bit19: 1;
+ __u32 bit18: 1;
+ __u32 bit17: 1;
+ __u32 bit16: 1;
+ } type;
+ };
+ __u8 data[0];
+};
+
+struct ioam6_schema;
+
+struct ioam6_namespace {
+ struct rhash_head head;
+ struct callback_head rcu;
+ struct ioam6_schema *schema;
+ __be16 id;
+ __be32 data;
+ __be64 data_wide;
+};
+
+struct ioam6_schema {
+ struct rhash_head head;
+ struct callback_head rcu;
+ struct ioam6_namespace *ns;
+ u32 id;
+ int len;
+ __be32 hdr;
+ u8 data[0];
+};
+
+struct snmp_mib {
+ const char *name;
+ int entry;
+};
+
+typedef u8 kprobe_opcode_t;
+
+struct kprobe;
+
+struct arch_specific_insn {
+ kprobe_opcode_t *insn;
+ unsigned int boostable: 1;
+ unsigned char size;
+ union {
+ unsigned char opcode;
+ struct {
+ unsigned char type;
+ } jcc;
+ struct {
+ unsigned char type;
+ unsigned char asize;
+ } loop;
+ struct {
+ unsigned char reg;
+ } indirect;
+ };
+ s32 rel32;
+ void (*emulate_op)(struct kprobe *, struct pt_regs *);
+ int tp_len;
+};
+
+typedef int (*kprobe_pre_handler_t)(struct kprobe *, struct pt_regs *);
+
+typedef void (*kprobe_post_handler_t)(struct kprobe *, struct pt_regs *, long unsigned int);
+
+struct kprobe {
+ struct hlist_node hlist;
+ struct list_head list;
+ long unsigned int nmissed;
+ kprobe_opcode_t *addr;
+ const char *symbol_name;
+ unsigned int offset;
+ kprobe_pre_handler_t pre_handler;
+ kprobe_post_handler_t post_handler;
+ kprobe_opcode_t opcode;
+ struct arch_specific_insn ainsn;
+ u32 flags;
+};
+
+struct prev_kprobe {
+ struct kprobe *kp;
+ long unsigned int status;
+ long unsigned int old_flags;
+ long unsigned int saved_flags;
+};
+
+struct kprobe_ctlblk {
+ long unsigned int kprobe_status;
+ long unsigned int kprobe_old_flags;
+ long unsigned int kprobe_saved_flags;
+ struct prev_kprobe prev_kprobe;
+};
+
+struct rnd_state {
+ __u32 s1;
+ __u32 s2;
+ __u32 s3;
+ __u32 s4;
+};
+
+struct kaslr_memory_region {
+ long unsigned int *base;
+ long unsigned int size_tb;
+};
+
+enum what {
+ PROC_EVENT_NONE = 0,
+ PROC_EVENT_FORK = 1,
+ PROC_EVENT_EXEC = 2,
+ PROC_EVENT_UID = 4,
+ PROC_EVENT_GID = 64,
+ PROC_EVENT_SID = 128,
+ PROC_EVENT_PTRACE = 256,
+ PROC_EVENT_COMM = 512,
+ PROC_EVENT_COREDUMP = 1073741824,
+ PROC_EVENT_EXIT = 2147483648,
+};
+
+enum {
+ CSD_FLAG_LOCK = 1,
+ IRQ_WORK_PENDING = 1,
+ IRQ_WORK_BUSY = 2,
+ IRQ_WORK_LAZY = 4,
+ IRQ_WORK_HARD_IRQ = 8,
+ IRQ_WORK_CLAIMED = 3,
+ CSD_TYPE_ASYNC = 0,
+ CSD_TYPE_SYNC = 16,
+ CSD_TYPE_IRQ_WORK = 32,
+ CSD_TYPE_TTWU = 48,
+ CSD_FLAG_TYPE_MASK = 240,
+};
+
+struct smp_hotplug_thread {
+ struct task_struct **store;
+ struct list_head list;
+ int (*thread_should_run)(unsigned int);
+ void (*thread_fn)(unsigned int);
+ void (*create)(unsigned int);
+ void (*setup)(unsigned int);
+ void (*cleanup)(unsigned int, bool);
+ void (*park)(unsigned int);
+ void (*unpark)(unsigned int);
+ bool selfparking;
+ const char *thread_comm;
+};
+
+struct bpf_iter_seq_map_info {
+ u32 map_id;
+};
+
+struct bpf_iter__bpf_map {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct bpf_map *map;
+ };
+};
+
+struct open_flags {
+ int open_flag;
+ umode_t mode;
+ int acc_mode;
+ int intent;
+ int lookup_flags;
+};
+
+struct radix_tree_preload {
+ local_lock_t lock;
+ unsigned int nr;
+ struct xa_node *nodes;
+};
+
+struct fsnotify_group;
+
+struct fsnotify_iter_info;
+
+struct fsnotify_mark;
+
+struct fsnotify_event;
+
+struct fsnotify_ops {
+ int (*handle_event)(struct fsnotify_group *, u32, const void *, int, struct inode *, const struct qstr *, u32, struct fsnotify_iter_info *);
+ int (*handle_inode_event)(struct fsnotify_mark *, u32, struct inode *, struct inode *, const struct qstr *, u32);
+ void (*free_group_priv)(struct fsnotify_group *);
+ void (*freeing_mark)(struct fsnotify_mark *, struct fsnotify_group *);
+ void (*free_event)(struct fsnotify_group *, struct fsnotify_event *);
+ void (*free_mark)(struct fsnotify_mark *);
+};
+
+struct inotify_group_private_data {
+ spinlock_t idr_lock;
+ struct idr idr;
+ struct ucounts *ucounts;
+};
+
+struct fsnotify_group {
+ const struct fsnotify_ops *ops;
+ refcount_t refcnt;
+ spinlock_t notification_lock;
+ struct list_head notification_list;
+ wait_queue_head_t notification_waitq;
+ unsigned int q_len;
+ unsigned int max_events;
+ unsigned int priority;
+ bool shutdown;
+ int flags;
+ unsigned int owner_flags;
+ struct mutex mark_mutex;
+ atomic_t user_waits;
+ struct list_head marks_list;
+ struct fasync_struct *fsn_fa;
+ struct fsnotify_event *overflow_event;
+ struct mem_cgroup *memcg;
+ union {
+ void *private;
+ struct inotify_group_private_data inotify_data;
+ };
+};
+
+struct fsnotify_iter_info {
+ struct fsnotify_mark *marks[5];
+ struct fsnotify_group *current_group;
+ unsigned int report_mask;
+ int srcu_idx;
+};
+
+struct fsnotify_mark {
+ __u32 mask;
+ refcount_t refcnt;
+ struct fsnotify_group *group;
+ struct list_head g_list;
+ spinlock_t lock;
+ struct hlist_node obj_list;
+ struct fsnotify_mark_connector *connector;
+ __u32 ignore_mask;
+ unsigned int flags;
+};
+
+struct fsnotify_event {
+ struct list_head list;
+};
+
+enum fsnotify_obj_type {
+ FSNOTIFY_OBJ_TYPE_ANY = -1,
+ FSNOTIFY_OBJ_TYPE_INODE = 0,
+ FSNOTIFY_OBJ_TYPE_VFSMOUNT = 1,
+ FSNOTIFY_OBJ_TYPE_SB = 2,
+ FSNOTIFY_OBJ_TYPE_COUNT = 3,
+ FSNOTIFY_OBJ_TYPE_DETACHED = 3,
+};
+
+struct inotify_event {
+ __s32 wd;
+ __u32 mask;
+ __u32 cookie;
+ __u32 len;
+ char name[0];
+};
+
+struct inotify_event_info {
+ struct fsnotify_event fse;
+ u32 mask;
+ int wd;
+ u32 sync_cookie;
+ int name_len;
+ char name[0];
+};
+
+struct inotify_inode_mark {
+ struct fsnotify_mark fsn_mark;
+ int wd;
+};
+
+struct dx_hash_info {
+ u32 hash;
+ u32 minor_hash;
+ int hash_version;
+ u32 *seed;
+};
+
+struct fscrypt_info;
+
+enum fscache_cookie_state {
+ FSCACHE_COOKIE_STATE_QUIESCENT = 0,
+ FSCACHE_COOKIE_STATE_LOOKING_UP = 1,
+ FSCACHE_COOKIE_STATE_CREATING = 2,
+ FSCACHE_COOKIE_STATE_ACTIVE = 3,
+ FSCACHE_COOKIE_STATE_INVALIDATING = 4,
+ FSCACHE_COOKIE_STATE_FAILED = 5,
+ FSCACHE_COOKIE_STATE_LRU_DISCARDING = 6,
+ FSCACHE_COOKIE_STATE_WITHDRAWING = 7,
+ FSCACHE_COOKIE_STATE_RELINQUISHING = 8,
+ FSCACHE_COOKIE_STATE_DROPPED = 9,
+};
+
+struct fscache_cache;
+
+struct fscache_volume {
+ refcount_t ref;
+ atomic_t n_cookies;
+ atomic_t n_accesses;
+ unsigned int debug_id;
+ unsigned int key_hash;
+ u8 *key;
+ struct list_head proc_link;
+ struct hlist_bl_node hash_link;
+ struct work_struct work;
+ struct fscache_cache *cache;
+ void *cache_priv;
+ spinlock_t lock;
+ long unsigned int flags;
+ u8 coherency_len;
+ u8 coherency[0];
+};
+
+struct fscache_cookie {
+ refcount_t ref;
+ atomic_t n_active;
+ atomic_t n_accesses;
+ unsigned int debug_id;
+ unsigned int inval_counter;
+ spinlock_t lock;
+ struct fscache_volume *volume;
+ void *cache_priv;
+ struct hlist_bl_node hash_link;
+ struct list_head proc_link;
+ struct list_head commit_link;
+ struct work_struct work;
+ loff_t object_size;
+ long unsigned int unused_at;
+ long unsigned int flags;
+ enum fscache_cookie_state state;
+ u8 advice;
+ u8 key_len;
+ u8 aux_len;
+ u32 key_hash;
+ union {
+ void *key;
+ u8 inline_key[16];
+ };
+ union {
+ void *aux;
+ u8 inline_aux[8];
+ };
+};
+
+enum ima_hooks {
+ NONE = 0,
+ FILE_CHECK = 1,
+ MMAP_CHECK = 2,
+ BPRM_CHECK = 3,
+ CREDS_CHECK = 4,
+ POST_SETATTR = 5,
+ MODULE_CHECK = 6,
+ FIRMWARE_CHECK = 7,
+ KEXEC_KERNEL_CHECK = 8,
+ KEXEC_INITRAMFS_CHECK = 9,
+ POLICY_CHECK = 10,
+ KEXEC_CMDLINE = 11,
+ KEY_CHECK = 12,
+ CRITICAL_DATA = 13,
+ SETXATTR_CHECK = 14,
+ MAX_CHECK = 15,
+};
+
+struct blkg_iostat {
+ u64 bytes[3];
+ u64 ios[3];
+};
+
+struct blkg_iostat_set {
+ struct u64_stats_sync sync;
+ struct blkg_iostat cur;
+ struct blkg_iostat last;
+};
+
+struct blkcg;
+
+struct blkg_policy_data;
+
+struct blkcg_gq {
+ struct request_queue *q;
+ struct list_head q_node;
+ struct hlist_node blkcg_node;
+ struct blkcg *blkcg;
+ struct blkcg_gq *parent;
+ struct percpu_ref refcnt;
+ bool online;
+ struct blkg_iostat_set *iostat_cpu;
+ struct blkg_iostat_set iostat;
+ struct blkg_policy_data *pd[6];
+ spinlock_t async_bio_lock;
+ struct bio_list async_bios;
+ union {
+ struct work_struct async_bio_work;
+ struct work_struct free_work;
+ };
+ atomic_t use_delay;
+ atomic64_t delay_nsec;
+ atomic64_t delay_start;
+ u64 last_delay;
+ int last_use;
+ struct callback_head callback_head;
+};
+
+enum rq_qos_id {
+ RQ_QOS_WBT = 0,
+ RQ_QOS_LATENCY = 1,
+ RQ_QOS_COST = 2,
+};
+
+struct rq_qos_ops;
+
+struct rq_qos {
+ struct rq_qos_ops *ops;
+ struct request_queue *q;
+ enum rq_qos_id id;
+ struct rq_qos *next;
+ struct dentry *debugfs_dir;
+};
+
+struct rq_wait {
+ wait_queue_head_t wait;
+ atomic_t inflight;
+};
+
+struct rq_qos_ops {
+ void (*throttle)(struct rq_qos *, struct bio *);
+ void (*track)(struct rq_qos *, struct request *, struct bio *);
+ void (*merge)(struct rq_qos *, struct request *, struct bio *);
+ void (*issue)(struct rq_qos *, struct request *);
+ void (*requeue)(struct rq_qos *, struct request *);
+ void (*done)(struct rq_qos *, struct request *);
+ void (*done_bio)(struct rq_qos *, struct bio *);
+ void (*cleanup)(struct rq_qos *, struct bio *);
+ void (*queue_depth_changed)(struct rq_qos *);
+ void (*exit)(struct rq_qos *);
+ const struct blk_mq_debugfs_attr *debugfs_attrs;
+};
+
+struct rq_depth {
+ unsigned int max_depth;
+ int scale_step;
+ bool scaled_max;
+ unsigned int queue_depth;
+ unsigned int default_depth;
+};
+
+typedef bool acquire_inflight_cb_t(struct rq_wait *, void *);
+
+typedef void cleanup_cb_t(struct rq_wait *, void *);
+
+enum blkg_iostat_type {
+ BLKG_IOSTAT_READ = 0,
+ BLKG_IOSTAT_WRITE = 1,
+ BLKG_IOSTAT_DISCARD = 2,
+ BLKG_IOSTAT_NR = 3,
+};
+
+struct blkcg_policy_data;
+
+struct blkcg {
+ struct cgroup_subsys_state css;
+ spinlock_t lock;
+ refcount_t online_pin;
+ struct xarray blkg_tree;
+ struct blkcg_gq *blkg_hint;
+ struct hlist_head blkg_list;
+ struct blkcg_policy_data *cpd[6];
+ struct list_head all_blkcgs_node;
+ struct list_head cgwb_list;
+};
+
+struct blkg_policy_data {
+ struct blkcg_gq *blkg;
+ int plid;
+};
+
+struct blkcg_policy_data {
+ struct blkcg *blkcg;
+ int plid;
+};
+
+typedef struct blkcg_policy_data *blkcg_pol_alloc_cpd_fn(gfp_t);
+
+typedef void blkcg_pol_init_cpd_fn(struct blkcg_policy_data *);
+
+typedef void blkcg_pol_free_cpd_fn(struct blkcg_policy_data *);
+
+typedef void blkcg_pol_bind_cpd_fn(struct blkcg_policy_data *);
+
+typedef struct blkg_policy_data *blkcg_pol_alloc_pd_fn(gfp_t, struct request_queue *, struct blkcg *);
+
+typedef void blkcg_pol_init_pd_fn(struct blkg_policy_data *);
+
+typedef void blkcg_pol_online_pd_fn(struct blkg_policy_data *);
+
+typedef void blkcg_pol_offline_pd_fn(struct blkg_policy_data *);
+
+typedef void blkcg_pol_free_pd_fn(struct blkg_policy_data *);
+
+typedef void blkcg_pol_reset_pd_stats_fn(struct blkg_policy_data *);
+
+typedef void blkcg_pol_stat_pd_fn(struct blkg_policy_data *, struct seq_file *);
+
+struct blkcg_policy {
+ int plid;
+ struct cftype *dfl_cftypes;
+ struct cftype *legacy_cftypes;
+ blkcg_pol_alloc_cpd_fn *cpd_alloc_fn;
+ blkcg_pol_init_cpd_fn *cpd_init_fn;
+ blkcg_pol_free_cpd_fn *cpd_free_fn;
+ blkcg_pol_bind_cpd_fn *cpd_bind_fn;
+ blkcg_pol_alloc_pd_fn *pd_alloc_fn;
+ blkcg_pol_init_pd_fn *pd_init_fn;
+ blkcg_pol_online_pd_fn *pd_online_fn;
+ blkcg_pol_offline_pd_fn *pd_offline_fn;
+ blkcg_pol_free_pd_fn *pd_free_fn;
+ blkcg_pol_reset_pd_stats_fn *pd_reset_stats_fn;
+ blkcg_pol_stat_pd_fn *pd_stat_fn;
+};
+
+struct blkg_conf_ctx {
+ struct block_device *bdev;
+ struct blkcg_gq *blkg;
+ char *body;
+};
+
+struct blk_iolatency {
+ struct rq_qos rqos;
+ struct timer_list timer;
+ bool enabled;
+ atomic_t enable_cnt;
+ struct work_struct enable_work;
+};
+
+struct iolatency_grp;
+
+struct child_latency_info {
+ spinlock_t lock;
+ u64 last_scale_event;
+ u64 scale_lat;
+ u64 nr_samples;
+ struct iolatency_grp *scale_grp;
+ atomic_t scale_cookie;
+};
+
+struct percentile_stats {
+ u64 total;
+ u64 missed;
+};
+
+struct latency_stat {
+ union {
+ struct percentile_stats ps;
+ struct blk_rq_stat rqs;
+ };
+};
+
+struct iolatency_grp {
+ struct blkg_policy_data pd;
+ struct latency_stat *stats;
+ struct latency_stat cur_stat;
+ struct blk_iolatency *blkiolat;
+ struct rq_depth rq_depth;
+ struct rq_wait rq_wait;
+ atomic64_t window_start;
+ atomic_t scale_cookie;
+ u64 min_lat_nsec;
+ u64 cur_win_nsec;
+ u64 lat_avg;
+ u64 nr_samples;
+ bool ssd;
+ struct child_latency_info child_lat;
+};
+
+enum pci_dev_flags {
+ PCI_DEV_FLAGS_MSI_INTX_DISABLE_BUG = 1,
+ PCI_DEV_FLAGS_NO_D3 = 2,
+ PCI_DEV_FLAGS_ASSIGNED = 4,
+ PCI_DEV_FLAGS_ACS_ENABLED_QUIRK = 8,
+ PCI_DEV_FLAG_PCIE_BRIDGE_ALIAS = 32,
+ PCI_DEV_FLAGS_NO_BUS_RESET = 64,
+ PCI_DEV_FLAGS_NO_PM_RESET = 128,
+ PCI_DEV_FLAGS_VPD_REF_F0 = 256,
+ PCI_DEV_FLAGS_BRIDGE_XLATE_ROOT = 512,
+ PCI_DEV_FLAGS_NO_FLR_RESET = 1024,
+ PCI_DEV_FLAGS_NO_RELAXED_ORDERING = 2048,
+ PCI_DEV_FLAGS_HAS_MSI_MASKING = 4096,
+};
+
+struct pci_sysdata {
+ int domain;
+ int node;
+ struct acpi_device *companion;
+ void *iommu;
+ void *fwnode;
+};
+
+enum {
+ DUMP_PREFIX_NONE = 0,
+ DUMP_PREFIX_ADDRESS = 1,
+ DUMP_PREFIX_OFFSET = 2,
+};
+
+struct flow_keys_basic {
+ struct flow_dissector_key_control control;
+ struct flow_dissector_key_basic basic;
+};
+
+enum {
+ IFLA_TUN_UNSPEC = 0,
+ IFLA_TUN_OWNER = 1,
+ IFLA_TUN_GROUP = 2,
+ IFLA_TUN_TYPE = 3,
+ IFLA_TUN_PI = 4,
+ IFLA_TUN_VNET_HDR = 5,
+ IFLA_TUN_PERSIST = 6,
+ IFLA_TUN_MULTI_QUEUE = 7,
+ IFLA_TUN_NUM_QUEUES = 8,
+ IFLA_TUN_NUM_DISABLED_QUEUES = 9,
+ __IFLA_TUN_MAX = 10,
+};
+
+struct rps_sock_flow_table {
+ u32 mask;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ u32 ents[0];
+};
+
+struct miscdevice {
+ int minor;
+ const char *name;
+ const struct file_operations *fops;
+ struct list_head list;
+ struct device *parent;
+ struct device *this_device;
+ const struct attribute_group **groups;
+ const char *nodename;
+ umode_t mode;
+};
+
+struct sock_fprog {
+ short unsigned int len;
+ struct sock_filter *filter;
+};
+
+struct tun_pi {
+ __u16 flags;
+ __be16 proto;
+};
+
+struct tun_filter {
+ __u16 flags;
+ __u16 count;
+ __u8 addr[0];
+};
+
+struct virtio_net_hdr {
+ __u8 flags;
+ __u8 gso_type;
+ __virtio16 hdr_len;
+ __virtio16 gso_size;
+ __virtio16 csum_start;
+ __virtio16 csum_offset;
+};
+
+struct tun_msg_ctl {
+ short unsigned int type;
+ short unsigned int num;
+ void *ptr;
+};
+
+struct tun_xdp_hdr {
+ int buflen;
+ struct virtio_net_hdr gso;
+};
+
+struct tap_filter {
+ unsigned int count;
+ u32 mask[2];
+ unsigned char addr[48];
+};
+
+struct tun_struct;
+
+struct tun_file {
+ struct sock sk;
+ struct socket socket;
+ struct tun_struct *tun;
+ struct fasync_struct *fasync;
+ unsigned int flags;
+ union {
+ u16 queue_index;
+ unsigned int ifindex;
+ };
+ struct napi_struct napi;
+ bool napi_enabled;
+ bool napi_frags_enabled;
+ struct mutex napi_mutex;
+ struct list_head next;
+ struct tun_struct *detached;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct ptr_ring tx_ring;
+ struct xdp_rxq_info xdp_rxq;
+};
+
+struct tun_prog;
+
+struct tun_struct {
+ struct tun_file *tfiles[256];
+ unsigned int numqueues;
+ unsigned int flags;
+ kuid_t owner;
+ kgid_t group;
+ struct net_device *dev;
+ netdev_features_t set_features;
+ int align;
+ int vnet_hdr_sz;
+ int sndbuf;
+ struct tap_filter txflt;
+ struct sock_fprog fprog;
+ bool filter_attached;
+ u32 msg_enable;
+ spinlock_t lock;
+ struct hlist_head flows[1024];
+ struct timer_list flow_gc_timer;
+ long unsigned int ageing_time;
+ unsigned int numdisabled;
+ struct list_head disabled;
+ void *security;
+ u32 flow_count;
+ u32 rx_batched;
+ atomic_long_t rx_frame_errors;
+ struct bpf_prog *xdp_prog;
+ struct tun_prog *steering_prog;
+ struct tun_prog *filter_prog;
+ struct ethtool_link_ksettings link_ksettings;
+ struct file *file;
+ struct ifreq *ifr;
+};
+
+struct tun_page {
+ struct page *page;
+ int count;
+};
+
+struct tun_flow_entry {
+ struct hlist_node hash_link;
+ struct callback_head rcu;
+ struct tun_struct *tun;
+ u32 rxhash;
+ u32 rps_rxhash;
+ int queue_index;
+ long: 32;
+ long: 64;
+ long unsigned int updated;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct tun_prog {
+ struct callback_head rcu;
+ struct bpf_prog *prog;
+};
+
+struct veth {
+ __be16 h_vlan_proto;
+ __be16 h_vlan_TCI;
+};
+
+enum ip_conntrack_info {
+ IP_CT_ESTABLISHED = 0,
+ IP_CT_RELATED = 1,
+ IP_CT_NEW = 2,
+ IP_CT_IS_REPLY = 3,
+ IP_CT_ESTABLISHED_REPLY = 3,
+ IP_CT_RELATED_REPLY = 4,
+ IP_CT_NUMBER = 5,
+ IP_CT_UNTRACKED = 7,
+};
+
+struct nf_conntrack_tuple_mask {
+ struct {
+ union nf_inet_addr u3;
+ union nf_conntrack_man_proto u;
+ } src;
+};
+
+struct nf_conntrack_helper;
+
+struct nf_conntrack_expect {
+ struct hlist_node lnode;
+ struct hlist_node hnode;
+ struct nf_conntrack_tuple tuple;
+ struct nf_conntrack_tuple_mask mask;
+ void (*expectfn)(struct nf_conn *, struct nf_conntrack_expect *);
+ struct nf_conntrack_helper *helper;
+ struct nf_conn *master;
+ struct timer_list timeout;
+ refcount_t use;
+ unsigned int flags;
+ unsigned int class;
+ union nf_inet_addr saved_addr;
+ union nf_conntrack_man_proto saved_proto;
+ enum ip_conntrack_dir dir;
+ struct callback_head rcu;
+};
+
+struct nf_conntrack_expect_policy;
+
+struct nf_conntrack_helper {
+ struct hlist_node hnode;
+ char name[16];
+ refcount_t refcnt;
+ struct module *me;
+ const struct nf_conntrack_expect_policy *expect_policy;
+ struct nf_conntrack_tuple tuple;
+ int (*help)(struct sk_buff *, unsigned int, struct nf_conn *, enum ip_conntrack_info);
+ void (*destroy)(struct nf_conn *);
+ int (*from_nlattr)(struct nlattr *, struct nf_conn *);
+ int (*to_nlattr)(struct sk_buff *, const struct nf_conn *);
+ unsigned int expect_class_max;
+ unsigned int flags;
+ unsigned int queue_num;
+ u16 data_len;
+ char nat_mod_name[16];
+};
+
+struct nf_conntrack_expect_policy {
+ unsigned int max_expected;
+ unsigned int timeout;
+ char name[16];
+};
+
+struct xt_counters {
+ __u64 pcnt;
+ __u64 bcnt;
+};
+
+struct ipt_ip {
+ struct in_addr src;
+ struct in_addr dst;
+ struct in_addr smsk;
+ struct in_addr dmsk;
+ char iniface[16];
+ char outiface[16];
+ unsigned char iniface_mask[16];
+ unsigned char outiface_mask[16];
+ __u16 proto;
+ __u8 flags;
+ __u8 invflags;
+};
+
+struct ipt_entry {
+ struct ipt_ip ip;
+ unsigned int nfcache;
+ __u16 target_offset;
+ __u16 next_offset;
+ unsigned int comefrom;
+ struct xt_counters counters;
+ unsigned char elems[0];
+};
+
+struct nf_synproxy_info {
+ __u8 options;
+ __u8 wscale;
+ __u16 mss;
+};
+
+struct synproxy_stats {
+ unsigned int syn_received;
+ unsigned int cookie_invalid;
+ unsigned int cookie_valid;
+ unsigned int cookie_retrans;
+ unsigned int conn_reopened;
+};
+
+struct synproxy_net {
+ struct nf_conn *tmpl;
+ struct synproxy_stats *stats;
+ unsigned int hook_ref4;
+ unsigned int hook_ref6;
+};
+
+struct synproxy_options {
+ u8 options;
+ u8 wscale;
+ u16 mss_option;
+ u16 mss_encode;
+ u32 tsval;
+ u32 tsecr;
+};
+
+struct mld_msg {
+ struct icmp6hdr mld_hdr;
+ struct in6_addr mld_mca;
+};
+
+struct mld2_grec {
+ __u8 grec_type;
+ __u8 grec_auxwords;
+ __be16 grec_nsrcs;
+ struct in6_addr grec_mca;
+ struct in6_addr grec_src[0];
+};
+
+struct mld2_report {
+ struct icmp6hdr mld2r_hdr;
+ struct mld2_grec mld2r_grec[0];
+};
+
+struct mld2_query {
+ struct icmp6hdr mld2q_hdr;
+ struct in6_addr mld2q_mca;
+ __u8 mld2q_qrv: 3;
+ __u8 mld2q_suppress: 1;
+ __u8 mld2q_resv2: 4;
+ __u8 mld2q_qqic;
+ __be16 mld2q_nsrcs;
+ struct in6_addr mld2q_srcs[0];
+};
+
+struct igmp6_mc_iter_state {
+ struct seq_net_private p;
+ struct net_device *dev;
+ struct inet6_dev *idev;
+};
+
+struct igmp6_mcf_iter_state {
+ struct seq_net_private p;
+ struct net_device *dev;
+ struct inet6_dev *idev;
+ struct ifmcaddr6 *im;
+};
+
+enum efi_rts_ids {
+ EFI_NONE = 0,
+ EFI_GET_TIME = 1,
+ EFI_SET_TIME = 2,
+ EFI_GET_WAKEUP_TIME = 3,
+ EFI_SET_WAKEUP_TIME = 4,
+ EFI_GET_VARIABLE = 5,
+ EFI_GET_NEXT_VARIABLE = 6,
+ EFI_SET_VARIABLE = 7,
+ EFI_QUERY_VARIABLE_INFO = 8,
+ EFI_GET_NEXT_HIGH_MONO_COUNT = 9,
+ EFI_RESET_SYSTEM = 10,
+ EFI_UPDATE_CAPSULE = 11,
+ EFI_QUERY_CAPSULE_CAPS = 12,
+};
+
+struct efi_runtime_work {
+ void *arg1;
+ void *arg2;
+ void *arg3;
+ void *arg4;
+ void *arg5;
+ efi_status_t status;
+ struct work_struct work;
+ enum efi_rts_ids efi_rts_id;
+ struct completion efi_rts_comp;
+};
+
+struct e820_entry {
+ u64 addr;
+ u64 size;
+ enum e820_type type;
+} __attribute__((packed));
+
+struct e820_table {
+ __u32 nr_entries;
+ struct e820_entry entries[320];
+} __attribute__((packed));
+
+struct efi_setup_data {
+ u64 fw_vendor;
+ u64 __unused;
+ u64 tables;
+ u64 smbios;
+ u64 reserved[8];
+};
+
+struct real_mode_header {
+ u32 text_start;
+ u32 ro_end;
+ u32 trampoline_start;
+ u32 trampoline_header;
+ u32 trampoline_start64;
+ u32 trampoline_pgd;
+ u32 wakeup_start;
+ u32 wakeup_header;
+ u32 machine_real_restart_asm;
+ u32 machine_real_restart_seg;
+};
+
+enum writeback_stat_item {
+ NR_DIRTY_THRESHOLD = 0,
+ NR_DIRTY_BG_THRESHOLD = 1,
+ NR_VM_WRITEBACK_STAT_ITEMS = 2,
+};
+
+struct contig_page_info {
+ long unsigned int free_pages;
+ long unsigned int free_blocks_total;
+ long unsigned int free_blocks_suitable;
+};
+
+struct io_open {
+ struct file *file;
+ int dfd;
+ u32 file_slot;
+ struct filename *filename;
+ struct open_how how;
+ long unsigned int nofile;
+};
+
+struct io_close {
+ struct file *file;
+ int fd;
+ u32 file_slot;
+};
+
+struct acpi_signal_fatal_info {
+ u32 type;
+ u32 code;
+ u32 argument;
+};
+
+struct acpi_get_devices_info {
+ acpi_walk_callback user_function;
+ void *context;
+ const char *hid;
+};
+
+enum idle_boot_override {
+ IDLE_NO_OVERRIDE = 0,
+ IDLE_HALT = 1,
+ IDLE_NOMWAIT = 2,
+ IDLE_POLL = 3,
+};
+
+enum tick_broadcast_mode {
+ TICK_BROADCAST_OFF = 0,
+ TICK_BROADCAST_ON = 1,
+ TICK_BROADCAST_FORCE = 2,
+};
+
+struct acpi_power_register {
+ u8 descriptor;
+ u16 length;
+ u8 space_id;
+ u8 bit_width;
+ u8 bit_offset;
+ u8 access_size;
+ u64 address;
+} __attribute__((packed));
+
+struct acpi_lpi_states_array {
+ unsigned int size;
+ unsigned int composite_states_size;
+ struct acpi_lpi_state *entries;
+ struct acpi_lpi_state *composite_states[8];
+};
+
+struct klist_iter {
+ struct klist *i_klist;
+ struct klist_node *i_cur;
+};
+
+enum {
+ IF_OPER_UNKNOWN = 0,
+ IF_OPER_NOTPRESENT = 1,
+ IF_OPER_DOWN = 2,
+ IF_OPER_LOWERLAYERDOWN = 3,
+ IF_OPER_TESTING = 4,
+ IF_OPER_DORMANT = 5,
+ IF_OPER_UP = 6,
+};
+
+enum {
+ IFLA_VRF_UNSPEC = 0,
+ IFLA_VRF_TABLE = 1,
+ __IFLA_VRF_MAX = 2,
+};
+
+enum {
+ IFLA_VRF_PORT_UNSPEC = 0,
+ IFLA_VRF_PORT_TABLE = 1,
+ __IFLA_VRF_PORT_MAX = 2,
+};
+
+struct pcpu_dstats {
+ u64 tx_pkts;
+ u64 tx_bytes;
+ u64 tx_drps;
+ u64 rx_pkts;
+ u64 rx_bytes;
+ u64 rx_drps;
+ struct u64_stats_sync syncp;
+};
+
+typedef int (*lookup_by_table_id_t)(struct net *, u32);
+
+struct vrf_map {
+ struct hlist_head ht[16];
+ spinlock_t vmap_lock;
+ u32 shared_tables;
+ bool strict_mode;
+};
+
+struct vrf_map_elem {
+ struct hlist_node hnode;
+ struct list_head vrf_list;
+ u32 table_id;
+ int users;
+ int ifindex;
+};
+
+struct netns_vrf {
+ bool add_fib_rules;
+ struct vrf_map vmap;
+ struct ctl_table_header *ctl_hdr;
+};
+
+struct net_vrf {
+ struct rtable *rth;
+ struct rt6_info *rt6;
+ struct fib6_table *fib6_table;
+ u32 tb_id;
+ struct list_head me_list;
+ int ifindex;
+};
+
+struct xt_state_info {
+ unsigned int statemask;
+};
+
+enum syscall_work_bit {
+ SYSCALL_WORK_BIT_SECCOMP = 0,
+ SYSCALL_WORK_BIT_SYSCALL_TRACEPOINT = 1,
+ SYSCALL_WORK_BIT_SYSCALL_TRACE = 2,
+ SYSCALL_WORK_BIT_SYSCALL_EMU = 3,
+ SYSCALL_WORK_BIT_SYSCALL_AUDIT = 4,
+ SYSCALL_WORK_BIT_SYSCALL_USER_DISPATCH = 5,
+ SYSCALL_WORK_BIT_SYSCALL_EXIT_TRAP = 6,
+};
+
+struct tp_module {
+ struct list_head list;
+ struct module *mod;
+};
+
+enum tp_func_state {
+ TP_FUNC_0 = 0,
+ TP_FUNC_1 = 1,
+ TP_FUNC_2 = 2,
+ TP_FUNC_N = 3,
+};
+
+enum tp_transition_sync {
+ TP_TRANSITION_SYNC_1_0_1 = 0,
+ TP_TRANSITION_SYNC_N_2_1 = 1,
+ _NR_TP_TRANSITION_SYNC = 2,
+};
+
+struct tp_transition_snapshot {
+ long unsigned int rcu;
+ long unsigned int srcu;
+ bool ongoing;
+};
+
+struct tp_probes {
+ struct callback_head rcu;
+ struct tracepoint_func probes[0];
+};
+
+enum dynevent_type {
+ DYNEVENT_TYPE_SYNTH = 1,
+ DYNEVENT_TYPE_KPROBE = 2,
+ DYNEVENT_TYPE_NONE = 3,
+};
+
+struct dynevent_cmd;
+
+typedef int (*dynevent_create_fn_t)(struct dynevent_cmd *);
+
+struct dynevent_cmd {
+ struct seq_buf seq;
+ const char *event_name;
+ unsigned int n_fields;
+ enum dynevent_type type;
+ dynevent_create_fn_t run_command;
+ void *private_data;
+};
+
+struct dyn_event;
+
+struct dyn_event_operations {
+ struct list_head list;
+ int (*create)(const char *);
+ int (*show)(struct seq_file *, struct dyn_event *);
+ bool (*is_busy)(struct dyn_event *);
+ int (*free)(struct dyn_event *);
+ bool (*match)(const char *, const char *, int, const char **, struct dyn_event *);
+};
+
+struct dyn_event {
+ struct list_head list;
+ struct dyn_event_operations *ops;
+};
+
+typedef int (*dynevent_check_arg_fn_t)(void *);
+
+struct dynevent_arg {
+ const char *str;
+ char separator;
+};
+
+struct dynevent_arg_pair {
+ const char *lhs;
+ const char *rhs;
+ char operator;
+ char separator;
+};
+
+enum tlb_flush_reason {
+ TLB_FLUSH_ON_TASK_SWITCH = 0,
+ TLB_REMOTE_SHOOTDOWN = 1,
+ TLB_LOCAL_SHOOTDOWN = 2,
+ TLB_LOCAL_MM_SHOOTDOWN = 3,
+ TLB_REMOTE_SEND_IPI = 4,
+ NR_TLB_FLUSH_REASONS = 5,
+};
+
+typedef long unsigned int pte_marker;
+
+struct anon_vma_chain {
+ struct vm_area_struct *vma;
+ struct anon_vma *anon_vma;
+ struct list_head same_vma;
+ struct rb_node rb;
+ long unsigned int rb_subtree_last;
+};
+
+enum ttu_flags {
+ TTU_SPLIT_HUGE_PMD = 4,
+ TTU_IGNORE_MLOCK = 8,
+ TTU_SYNC = 16,
+ TTU_IGNORE_HWPOISON = 32,
+ TTU_BATCH_FLUSH = 64,
+ TTU_RMAP_LOCKED = 128,
+};
+
+typedef int rmap_t;
+
+struct page_vma_mapped_walk {
+ long unsigned int pfn;
+ long unsigned int nr_pages;
+ long unsigned int pgoff;
+ struct vm_area_struct *vma;
+ long unsigned int address;
+ pmd_t *pmd;
+ pte_t *pte;
+ spinlock_t *ptl;
+ unsigned int flags;
+};
+
+struct rmap_walk_control {
+ void *arg;
+ bool try_lock;
+ bool contended;
+ bool (*rmap_one)(struct folio *, struct vm_area_struct *, long unsigned int, void *);
+ int (*done)(struct folio *);
+ struct anon_vma * (*anon_lock)(struct folio *, struct rmap_walk_control *);
+ bool (*invalid_vma)(struct vm_area_struct *, void *);
+};
+
+struct trace_event_raw_tlb_flush {
+ struct trace_entry ent;
+ int reason;
+ long unsigned int pages;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_tlb_flush {};
+
+typedef void (*btf_trace_tlb_flush)(void *, int, long unsigned int);
+
+struct trace_event_raw_mm_migrate_pages {
+ struct trace_entry ent;
+ long unsigned int succeeded;
+ long unsigned int failed;
+ long unsigned int thp_succeeded;
+ long unsigned int thp_failed;
+ long unsigned int thp_split;
+ enum migrate_mode mode;
+ int reason;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_migrate_pages_start {
+ struct trace_entry ent;
+ enum migrate_mode mode;
+ int reason;
+ char __data[0];
+};
+
+struct trace_event_raw_migration_pte {
+ struct trace_entry ent;
+ long unsigned int addr;
+ long unsigned int pte;
+ int order;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_mm_migrate_pages {};
+
+struct trace_event_data_offsets_mm_migrate_pages_start {};
+
+struct trace_event_data_offsets_migration_pte {};
+
+typedef void (*btf_trace_mm_migrate_pages)(void *, long unsigned int, long unsigned int, long unsigned int, long unsigned int, long unsigned int, enum migrate_mode, int);
+
+typedef void (*btf_trace_mm_migrate_pages_start)(void *, enum migrate_mode, int);
+
+typedef void (*btf_trace_set_migration_pte)(void *, long unsigned int, long unsigned int, int);
+
+typedef void (*btf_trace_remove_migration_pte)(void *, long unsigned int, long unsigned int, int);
+
+struct folio_referenced_arg {
+ int mapcount;
+ int referenced;
+ long unsigned int vm_flags;
+ struct mem_cgroup *memcg;
+};
+
+typedef short unsigned int ushort;
+
+struct sem;
+
+struct sem_queue;
+
+struct sem_undo;
+
+struct semid_ds {
+ struct ipc_perm sem_perm;
+ __kernel_old_time_t sem_otime;
+ __kernel_old_time_t sem_ctime;
+ struct sem *sem_base;
+ struct sem_queue *sem_pending;
+ struct sem_queue **sem_pending_last;
+ struct sem_undo *undo;
+ short unsigned int sem_nsems;
+};
+
+struct sem {
+ int semval;
+ struct pid *sempid;
+ spinlock_t lock;
+ struct list_head pending_alter;
+ struct list_head pending_const;
+ time64_t sem_otime;
+ long: 64;
+};
+
+struct sembuf;
+
+struct sem_queue {
+ struct list_head list;
+ struct task_struct *sleeper;
+ struct sem_undo *undo;
+ struct pid *pid;
+ int status;
+ struct sembuf *sops;
+ struct sembuf *blocking;
+ int nsops;
+ bool alter;
+ bool dupsop;
+};
+
+struct sem_undo {
+ struct list_head list_proc;
+ struct callback_head rcu;
+ struct sem_undo_list *ulp;
+ struct list_head list_id;
+ int semid;
+ short int *semadj;
+};
+
+struct semid64_ds {
+ struct ipc64_perm sem_perm;
+ __kernel_long_t sem_otime;
+ __kernel_ulong_t __unused1;
+ __kernel_long_t sem_ctime;
+ __kernel_ulong_t __unused2;
+ __kernel_ulong_t sem_nsems;
+ __kernel_ulong_t __unused3;
+ __kernel_ulong_t __unused4;
+};
+
+struct sembuf {
+ short unsigned int sem_num;
+ short int sem_op;
+ short int sem_flg;
+};
+
+struct seminfo {
+ int semmap;
+ int semmni;
+ int semmns;
+ int semmnu;
+ int semmsl;
+ int semopm;
+ int semume;
+ int semusz;
+ int semvmx;
+ int semaem;
+};
+
+struct sem_undo_list {
+ refcount_t refcnt;
+ spinlock_t lock;
+ struct list_head list_proc;
+};
+
+struct wake_q_head {
+ struct wake_q_node *first;
+ struct wake_q_node **lastp;
+};
+
+struct sem_array {
+ struct kern_ipc_perm sem_perm;
+ time64_t sem_ctime;
+ struct list_head pending_alter;
+ struct list_head pending_const;
+ struct list_head list_id;
+ int sem_nsems;
+ int complex_count;
+ unsigned int use_global_lock;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct sem sems[0];
+};
+
+struct parsed_partitions {
+ struct gendisk *disk;
+ char name[32];
+ struct {
+ sector_t from;
+ sector_t size;
+ int flags;
+ bool has_info;
+ struct partition_meta_info info;
+ } *parts;
+ int next;
+ int limit;
+ bool access_beyond_eod;
+ char *pp_buf;
+};
+
+typedef struct {
+ struct folio *v;
+} Sector;
+
+struct _gpt_header {
+ __le64 signature;
+ __le32 revision;
+ __le32 header_size;
+ __le32 header_crc32;
+ __le32 reserved1;
+ __le64 my_lba;
+ __le64 alternate_lba;
+ __le64 first_usable_lba;
+ __le64 last_usable_lba;
+ efi_guid_t disk_guid;
+ __le64 partition_entry_lba;
+ __le32 num_partition_entries;
+ __le32 sizeof_partition_entry;
+ __le32 partition_entry_array_crc32;
+} __attribute__((packed));
+
+typedef struct _gpt_header gpt_header;
+
+struct _gpt_entry_attributes {
+ u64 required_to_function: 1;
+ u64 reserved: 47;
+ u64 type_guid_specific: 16;
+};
+
+typedef struct _gpt_entry_attributes gpt_entry_attributes;
+
+struct _gpt_entry {
+ efi_guid_t partition_type_guid;
+ efi_guid_t unique_partition_guid;
+ __le64 starting_lba;
+ __le64 ending_lba;
+ gpt_entry_attributes attributes;
+ __le16 partition_name[36];
+};
+
+typedef struct _gpt_entry gpt_entry;
+
+struct _gpt_mbr_record {
+ u8 boot_indicator;
+ u8 start_head;
+ u8 start_sector;
+ u8 start_track;
+ u8 os_type;
+ u8 end_head;
+ u8 end_sector;
+ u8 end_track;
+ __le32 starting_lba;
+ __le32 size_in_lba;
+};
+
+typedef struct _gpt_mbr_record gpt_mbr_record;
+
+struct _legacy_mbr {
+ u8 boot_code[440];
+ __le32 unique_mbr_signature;
+ __le16 unknown;
+ gpt_mbr_record partition_record[4];
+ __le16 signature;
+} __attribute__((packed));
+
+typedef struct _legacy_mbr legacy_mbr;
+
+struct io_notif_data {
+ struct file *file;
+ struct ubuf_info uarg;
+ long unsigned int account_pages;
+};
+
+struct acpi_device_properties {
+ const guid_t *guid;
+ union acpi_object *properties;
+ struct list_head list;
+ void **bufs;
+};
+
+struct acpi_data_node {
+ const char *name;
+ acpi_handle handle;
+ struct fwnode_handle fwnode;
+ struct fwnode_handle *parent;
+ struct acpi_device_data data;
+ struct list_head sibling;
+ struct kobject kobj;
+ struct completion kobj_done;
+};
+
+enum {
+ LDISC_SEM_NORMAL = 0,
+ LDISC_SEM_OTHER = 1,
+};
+
+struct stclear_flags_t {
+ __be16 tag;
+ u8 deactivated;
+ u8 disableForceClear;
+ u8 physicalPresence;
+ u8 physicalPresenceLock;
+ u8 bGlobalLock;
+} __attribute__((packed));
+
+struct tpm1_version {
+ u8 major;
+ u8 minor;
+ u8 rev_major;
+ u8 rev_minor;
+};
+
+struct tpm1_version2 {
+ __be16 tag;
+ struct tpm1_version version;
+};
+
+struct timeout_t {
+ __be32 a;
+ __be32 b;
+ __be32 c;
+ __be32 d;
+};
+
+struct duration_t {
+ __be32 tpm_short;
+ __be32 tpm_medium;
+ __be32 tpm_long;
+};
+
+struct permanent_flags_t {
+ __be16 tag;
+ u8 disable;
+ u8 ownership;
+ u8 deactivated;
+ u8 readPubek;
+ u8 disableOwnerClear;
+ u8 allowMaintenance;
+ u8 physicalPresenceLifetimeLock;
+ u8 physicalPresenceHWEnable;
+ u8 physicalPresenceCMDEnable;
+ u8 CEKPUsed;
+ u8 TPMpost;
+ u8 TPMpostLock;
+ u8 FIPS;
+ u8 operator;
+ u8 enableRevokeEK;
+ u8 nvLocked;
+ u8 readSRKPub;
+ u8 tpmEstablished;
+ u8 maintenanceDone;
+ u8 disableFullDALogicInfo;
+};
+
+typedef union {
+ struct permanent_flags_t perm_flags;
+ struct stclear_flags_t stclear_flags;
+ __u8 owned;
+ __be32 num_pcrs;
+ struct tpm1_version version1;
+ struct tpm1_version2 version2;
+ __be32 manufacturer_id;
+ struct timeout_t timeout;
+ struct duration_t duration;
+} cap_t;
+
+enum tpm_capabilities {
+ TPM_CAP_FLAG = 4,
+ TPM_CAP_PROP = 5,
+ TPM_CAP_VERSION_1_1 = 6,
+ TPM_CAP_VERSION_1_2 = 26,
+};
+
+enum tpm_sub_capabilities {
+ TPM_CAP_PROP_PCR = 257,
+ TPM_CAP_PROP_MANUFACTURER = 259,
+ TPM_CAP_FLAG_PERM = 264,
+ TPM_CAP_FLAG_VOL = 265,
+ TPM_CAP_PROP_OWNER = 273,
+ TPM_CAP_PROP_TIS_TIMEOUT = 277,
+ TPM_CAP_PROP_TIS_DURATION = 288,
+};
+
+enum tis_access {
+ TPM_ACCESS_VALID = 128,
+ TPM_ACCESS_ACTIVE_LOCALITY = 32,
+ TPM_ACCESS_REQUEST_PENDING = 4,
+ TPM_ACCESS_REQUEST_USE = 2,
+};
+
+enum tis_status {
+ TPM_STS_VALID = 128,
+ TPM_STS_COMMAND_READY = 64,
+ TPM_STS_GO = 32,
+ TPM_STS_DATA_AVAIL = 16,
+ TPM_STS_DATA_EXPECT = 8,
+ TPM_STS_READ_ZERO = 35,
+};
+
+enum tis_int_flags {
+ TPM_GLOBAL_INT_ENABLE = 2147483648,
+ TPM_INTF_BURST_COUNT_STATIC = 256,
+ TPM_INTF_CMD_READY_INT = 128,
+ TPM_INTF_INT_EDGE_FALLING = 64,
+ TPM_INTF_INT_EDGE_RISING = 32,
+ TPM_INTF_INT_LEVEL_LOW = 16,
+ TPM_INTF_INT_LEVEL_HIGH = 8,
+ TPM_INTF_LOCALITY_CHANGE_INT = 4,
+ TPM_INTF_STS_VALID_INT = 2,
+ TPM_INTF_DATA_AVAIL_INT = 1,
+};
+
+enum tis_defaults {
+ TIS_MEM_LEN = 20480,
+ TIS_SHORT_TIMEOUT = 750,
+ TIS_LONG_TIMEOUT = 2000,
+ TIS_TIMEOUT_MIN_ATML = 14700,
+ TIS_TIMEOUT_MAX_ATML = 15000,
+};
+
+enum tpm_tis_flags {
+ TPM_TIS_ITPM_WORKAROUND = 1,
+ TPM_TIS_INVALID_STATUS = 2,
+};
+
+struct tpm_tis_phy_ops;
+
+struct tpm_tis_data {
+ u16 manufacturer_id;
+ int locality;
+ int irq;
+ bool irq_tested;
+ long unsigned int flags;
+ void *ilb_base_addr;
+ u16 clkrun_enabled;
+ wait_queue_head_t int_queue;
+ wait_queue_head_t read_queue;
+ const struct tpm_tis_phy_ops *phy_ops;
+ short unsigned int rng_quality;
+ unsigned int timeout_min;
+ unsigned int timeout_max;
+};
+
+enum tpm_tis_io_mode {
+ TPM_TIS_PHYS_8 = 0,
+ TPM_TIS_PHYS_16 = 1,
+ TPM_TIS_PHYS_32 = 2,
+};
+
+struct tpm_tis_phy_ops {
+ int (*read_bytes)(struct tpm_tis_data *, u32, u16, u8 *, enum tpm_tis_io_mode);
+ int (*write_bytes)(struct tpm_tis_data *, u32, u16, const u8 *, enum tpm_tis_io_mode);
+ int (*verify_crc)(struct tpm_tis_data *, size_t, const u8 *);
+};
+
+struct tis_vendor_durations_override {
+ u32 did_vid;
+ struct tpm1_version version;
+ long unsigned int durations[3];
+};
+
+struct tis_vendor_timeout_override {
+ u32 did_vid;
+ long unsigned int timeout_us[4];
+};
+
+struct psmouse_attribute {
+ struct device_attribute dattr;
+ void *data;
+ ssize_t (*show)(struct psmouse *, void *, char *);
+ ssize_t (*set)(struct psmouse *, void *, const char *, size_t);
+ bool protect;
+};
+
+struct trackpoint_data {
+ u8 variant_id;
+ u8 firmware_id;
+ u8 sensitivity;
+ u8 speed;
+ u8 inertia;
+ u8 reach;
+ u8 draghys;
+ u8 mindrag;
+ u8 thresh;
+ u8 upthresh;
+ u8 ztime;
+ u8 jenks;
+ u8 drift_time;
+ bool press_to_select;
+ bool skipback;
+ bool ext_dev;
+};
+
+struct trackpoint_attr_data {
+ size_t field_offset;
+ u8 command;
+ u8 mask;
+ bool inverted;
+ u8 power_on_default;
+};
+
+struct strp_msg {
+ int full_len;
+ int offset;
+};
+
+struct tls_strparser {
+ struct sock *sk;
+ u32 mark: 8;
+ u32 stopped: 1;
+ u32 copy_mode: 1;
+ u32 msg_ready: 1;
+ struct strp_msg stm;
+ struct sk_buff *anchor;
+ struct work_struct work;
+};
+
+struct tls_sw_context_rx {
+ struct crypto_aead *aead_recv;
+ struct crypto_wait async_wait;
+ struct sk_buff_head rx_list;
+ void (*saved_data_ready)(struct sock *);
+ u8 reader_present;
+ u8 async_capable: 1;
+ u8 zc_capable: 1;
+ u8 reader_contended: 1;
+ struct tls_strparser strp;
+ atomic_t decrypt_pending;
+ spinlock_t decrypt_compl_lock;
+ struct sk_buff_head async_hold;
+ struct wait_queue_head wq;
+};
+
+enum dns_payload_content_type {
+ DNS_PAYLOAD_IS_SERVER_LIST = 0,
+};
+
+struct dns_payload_header {
+ __u8 zero;
+ __u8 content;
+ __u8 version;
+};
+
+struct user_key_payload {
+ struct callback_head rcu;
+ short unsigned int datalen;
+ long: 48;
+ char data[0];
+};
+
+enum {
+ dns_key_data = 0,
+ dns_key_error = 1,
+};
+
+struct acpi_table_mcfg {
+ struct acpi_table_header header;
+ u8 reserved[8];
+};
+
+struct acpi_mcfg_allocation {
+ u64 address;
+ u16 pci_segment;
+ u8 start_bus_number;
+ u8 end_bus_number;
+ u32 reserved;
+};
+
+struct pci_mmcfg_region {
+ struct list_head list;
+ struct resource res;
+ u64 address;
+ char *virt;
+ u16 segment;
+ u8 start_bus;
+ u8 end_bus;
+ char name[30];
+};
+
+struct pci_mmcfg_hostbridge_probe {
+ u32 bus;
+ u32 devfn;
+ u32 vendor;
+ u32 device;
+ const char * (*probe)();
+};
+
+typedef bool (*check_reserved_t)(u64, u64, enum e820_type);
+
+typedef long int (*sys_call_ptr_t)(const struct pt_regs *);
+
+struct dyn_arch_ftrace {};
+
+enum {
+ FTRACE_FL_ENABLED = 2147483648,
+ FTRACE_FL_REGS = 1073741824,
+ FTRACE_FL_REGS_EN = 536870912,
+ FTRACE_FL_TRAMP = 268435456,
+ FTRACE_FL_TRAMP_EN = 134217728,
+ FTRACE_FL_IPMODIFY = 67108864,
+ FTRACE_FL_DISABLED = 33554432,
+ FTRACE_FL_DIRECT = 16777216,
+ FTRACE_FL_DIRECT_EN = 8388608,
+};
+
+struct dyn_ftrace {
+ long unsigned int ip;
+ long unsigned int flags;
+ struct dyn_arch_ftrace arch;
+};
+
+enum {
+ FTRACE_UPDATE_IGNORE = 0,
+ FTRACE_UPDATE_MAKE_CALL = 1,
+ FTRACE_UPDATE_MODIFY_CALL = 2,
+ FTRACE_UPDATE_MAKE_NOP = 3,
+};
+
+union text_poke_insn {
+ u8 text[5];
+ struct {
+ u8 opcode;
+ s32 disp;
+ } __attribute__((packed));
+};
+
+union ftrace_op_code_union {
+ char code[7];
+ struct {
+ char op[3];
+ int offset;
+ } __attribute__((packed));
+};
+
+struct ftrace_rec_iter;
+
+enum bpf_iter_feature {
+ BPF_ITER_RESCHED = 1,
+};
+
+struct bpf_iter_target_info {
+ struct list_head list;
+ const struct bpf_iter_reg *reg_info;
+ u32 btf_id;
+};
+
+struct bpf_iter_link {
+ struct bpf_link link;
+ struct bpf_iter_aux_info aux;
+ struct bpf_iter_target_info *tinfo;
+};
+
+struct bpf_iter_priv_data {
+ struct bpf_iter_target_info *tinfo;
+ const struct bpf_iter_seq_info *seq_info;
+ struct bpf_prog *prog;
+ u64 session_id;
+ u64 seq_num;
+ bool done_stop;
+ long: 56;
+ u8 target_private[0];
+};
+
+typedef u64 (*btf_bpf_for_each_map_elem)(struct bpf_map *, void *, void *, u64);
+
+typedef u64 (*btf_bpf_loop)(u32, void *, void *, u64);
+
+struct eventfd_ctx {
+ struct kref kref;
+ wait_queue_head_t wqh;
+ __u64 count;
+ unsigned int flags;
+ int id;
+};
+
+enum netfs_sreq_trace {
+ netfs_sreq_trace_download_instead = 0,
+ netfs_sreq_trace_free = 1,
+ netfs_sreq_trace_prepare = 2,
+ netfs_sreq_trace_resubmit_short = 3,
+ netfs_sreq_trace_submit = 4,
+ netfs_sreq_trace_terminated = 5,
+ netfs_sreq_trace_write = 6,
+ netfs_sreq_trace_write_skip = 7,
+ netfs_sreq_trace_write_term = 8,
+};
+
+enum netfs_sreq_ref_trace {
+ netfs_sreq_trace_get_copy_to_cache = 0,
+ netfs_sreq_trace_get_resubmit = 1,
+ netfs_sreq_trace_get_short_read = 2,
+ netfs_sreq_trace_new = 3,
+ netfs_sreq_trace_put_clear = 4,
+ netfs_sreq_trace_put_failed = 5,
+ netfs_sreq_trace_put_merged = 6,
+ netfs_sreq_trace_put_no_copy = 7,
+ netfs_sreq_trace_put_terminated = 8,
+};
+
+enum p9_open_mode_t {
+ P9_OREAD = 0,
+ P9_OWRITE = 1,
+ P9_ORDWR = 2,
+ P9_OEXEC = 3,
+ P9_OTRUNC = 16,
+ P9_OREXEC = 32,
+ P9_ORCLOSE = 64,
+ P9_OAPPEND = 128,
+ P9_OEXCL = 4096,
+};
+
+enum p9_perm_t {
+ P9_DMDIR = 2147483648,
+ P9_DMAPPEND = 1073741824,
+ P9_DMEXCL = 536870912,
+ P9_DMMOUNT = 268435456,
+ P9_DMAUTH = 134217728,
+ P9_DMTMP = 67108864,
+ P9_DMSYMLINK = 33554432,
+ P9_DMLINK = 16777216,
+ P9_DMDEVICE = 8388608,
+ P9_DMNAMEDPIPE = 2097152,
+ P9_DMSOCKET = 1048576,
+ P9_DMSETUID = 524288,
+ P9_DMSETGID = 262144,
+ P9_DMSETVTX = 65536,
+};
+
+struct p9_wstat {
+ u16 size;
+ u16 type;
+ u32 dev;
+ struct p9_qid qid;
+ u32 mode;
+ u32 atime;
+ u32 mtime;
+ u64 length;
+ const char *name;
+ const char *uid;
+ const char *gid;
+ const char *muid;
+ char *extension;
+ kuid_t n_uid;
+ kgid_t n_gid;
+ kuid_t n_muid;
+};
+
+enum p9_cache_modes {
+ CACHE_NONE = 0,
+ CACHE_MMAP = 1,
+ CACHE_LOOSE = 2,
+ CACHE_FSCACHE = 3,
+ nr__p9_cache_modes = 4,
+};
+
+enum {
+ SUN_WHOLE_DISK = 5,
+ LINUX_RAID_PARTITION = 253,
+};
+
+struct sun_info {
+ __be16 id;
+ __be16 flags;
+};
+
+struct sun_vtoc {
+ __be32 version;
+ char volume[8];
+ __be16 nparts;
+ struct sun_info infos[8];
+ __be16 padding;
+ __be32 bootinfo[3];
+ __be32 sanity;
+ __be32 reserved[10];
+ __be32 timestamp[8];
+};
+
+struct sun_partition {
+ __be32 start_cylinder;
+ __be32 num_sectors;
+};
+
+struct sun_disklabel {
+ unsigned char info[128];
+ struct sun_vtoc vtoc;
+ __be32 write_reinstruct;
+ __be32 read_reinstruct;
+ unsigned char spare[148];
+ __be16 rspeed;
+ __be16 pcylcount;
+ __be16 sparecyl;
+ __be16 obs1;
+ __be16 obs2;
+ __be16 ilfact;
+ __be16 ncyl;
+ __be16 nacyl;
+ __be16 ntrks;
+ __be16 nsect;
+ __be16 obs3;
+ __be16 obs4;
+ struct sun_partition partitions[8];
+ __be16 magic;
+ __be16 csum;
+};
+
+struct io_uring_sync_cancel_reg {
+ __u64 addr;
+ __s32 fd;
+ __u32 flags;
+ struct __kernel_timespec timeout;
+ __u64 pad[4];
+};
+
+struct io_poll {
+ struct file *file;
+ struct wait_queue_head *head;
+ __poll_t events;
+ struct wait_queue_entry wait;
+};
+
+struct io_cache_entry {
+ struct hlist_node node;
+};
+
+struct async_poll {
+ union {
+ struct io_poll poll;
+ struct io_cache_entry cache;
+ };
+ struct io_poll *double_poll;
+};
+
+enum io_wq_cancel {
+ IO_WQ_CANCEL_OK = 0,
+ IO_WQ_CANCEL_RUNNING = 1,
+ IO_WQ_CANCEL_NOTFOUND = 2,
+};
+
+typedef bool work_cancel_fn(struct io_wq_work *, void *);
+
+struct io_tctx_node {
+ struct list_head ctx_node;
+ struct task_struct *task;
+ struct io_ring_ctx *ctx;
+};
+
+struct io_cancel_data {
+ struct io_ring_ctx *ctx;
+ union {
+ u64 data;
+ struct file *file;
+ };
+ u32 flags;
+ int seq;
+};
+
+struct io_cancel {
+ struct file *file;
+ u64 addr;
+ u32 flags;
+ s32 fd;
+};
+
+enum dmi_device_type {
+ DMI_DEV_TYPE_ANY = 0,
+ DMI_DEV_TYPE_OTHER = 1,
+ DMI_DEV_TYPE_UNKNOWN = 2,
+ DMI_DEV_TYPE_VIDEO = 3,
+ DMI_DEV_TYPE_SCSI = 4,
+ DMI_DEV_TYPE_ETHERNET = 5,
+ DMI_DEV_TYPE_TOKENRING = 6,
+ DMI_DEV_TYPE_SOUND = 7,
+ DMI_DEV_TYPE_PATA = 8,
+ DMI_DEV_TYPE_SATA = 9,
+ DMI_DEV_TYPE_SAS = 10,
+ DMI_DEV_TYPE_IPMI = -1,
+ DMI_DEV_TYPE_OEM_STRING = -2,
+ DMI_DEV_TYPE_DEV_ONBOARD = -3,
+ DMI_DEV_TYPE_DEV_SLOT = -4,
+};
+
+struct dmi_device {
+ struct list_head list;
+ int type;
+ const char *name;
+ void *device_data;
+};
+
+struct dmi_dev_onboard {
+ struct dmi_device dev;
+ int instance;
+ int segment;
+ int bus;
+ int devfn;
+};
+
+typedef u16 wchar_t;
+
+enum utf16_endian {
+ UTF16_HOST_ENDIAN = 0,
+ UTF16_LITTLE_ENDIAN = 1,
+ UTF16_BIG_ENDIAN = 2,
+};
+
+enum smbios_attr_enum {
+ SMBIOS_ATTR_NONE = 0,
+ SMBIOS_ATTR_LABEL_SHOW = 1,
+ SMBIOS_ATTR_INSTANCE_SHOW = 2,
+};
+
+enum acpi_attr_enum {
+ ACPI_ATTR_LABEL_SHOW = 0,
+ ACPI_ATTR_INDEX_SHOW = 1,
+};
+
+struct aper_size_info_8 {
+ int size;
+ int num_entries;
+ int page_order;
+ u8 size_value;
+};
+
+struct aper_size_info_16 {
+ int size;
+ int num_entries;
+ int page_order;
+ u16 size_value;
+};
+
+struct agp_device_ids {
+ short unsigned int device_id;
+ enum chipset_type chipset;
+ const char *chipset_name;
+ int (*chipset_setup)(struct pci_dev *);
+};
+
+enum pm_qos_flags_status {
+ PM_QOS_FLAGS_UNDEFINED = -1,
+ PM_QOS_FLAGS_NONE = 0,
+ PM_QOS_FLAGS_SOME = 1,
+ PM_QOS_FLAGS_ALL = 2,
+};
+
+struct gov_attr_set {
+ struct kobject kobj;
+ struct list_head policy_list;
+ struct mutex update_lock;
+ int usage_count;
+};
+
+struct governor_attr {
+ struct attribute attr;
+ ssize_t (*show)(struct gov_attr_set *, char *);
+ ssize_t (*store)(struct gov_attr_set *, const char *, size_t);
+};
+
+enum {
+ OD_NORMAL_SAMPLE = 0,
+ OD_SUB_SAMPLE = 1,
+};
+
+struct dbs_governor;
+
+struct dbs_data {
+ struct gov_attr_set attr_set;
+ struct dbs_governor *gov;
+ void *tuners;
+ unsigned int ignore_nice_load;
+ unsigned int sampling_rate;
+ unsigned int sampling_down_factor;
+ unsigned int up_threshold;
+ unsigned int io_is_busy;
+};
+
+struct policy_dbs_info;
+
+struct dbs_governor {
+ struct cpufreq_governor gov;
+ struct kobj_type kobj_type;
+ struct dbs_data *gdbs_data;
+ unsigned int (*gov_dbs_update)(struct cpufreq_policy *);
+ struct policy_dbs_info * (*alloc)();
+ void (*free)(struct policy_dbs_info *);
+ int (*init)(struct dbs_data *);
+ void (*exit)(struct dbs_data *);
+ void (*start)(struct cpufreq_policy *);
+};
+
+struct policy_dbs_info {
+ struct cpufreq_policy *policy;
+ struct mutex update_mutex;
+ u64 last_sample_time;
+ s64 sample_delay_ns;
+ atomic_t work_count;
+ struct irq_work irq_work;
+ struct work_struct work;
+ struct dbs_data *dbs_data;
+ struct list_head list;
+ unsigned int rate_mult;
+ unsigned int idle_periods;
+ bool is_shared;
+ bool work_in_progress;
+};
+
+struct od_ops {
+ unsigned int (*powersave_bias_target)(struct cpufreq_policy *, unsigned int, unsigned int);
+};
+
+struct od_policy_dbs_info {
+ struct policy_dbs_info policy_dbs;
+ unsigned int freq_lo;
+ unsigned int freq_lo_delay_us;
+ unsigned int freq_hi_delay_us;
+ unsigned int sample_type: 1;
+};
+
+struct od_dbs_tuners {
+ unsigned int powersave_bias;
+};
+
+struct quirks_list_struct {
+ struct hid_device_id hid_bl_item;
+ struct list_head node;
+};
+
+struct rtnl_link_stats {
+ __u32 rx_packets;
+ __u32 tx_packets;
+ __u32 rx_bytes;
+ __u32 tx_bytes;
+ __u32 rx_errors;
+ __u32 tx_errors;
+ __u32 rx_dropped;
+ __u32 tx_dropped;
+ __u32 multicast;
+ __u32 collisions;
+ __u32 rx_length_errors;
+ __u32 rx_over_errors;
+ __u32 rx_crc_errors;
+ __u32 rx_frame_errors;
+ __u32 rx_fifo_errors;
+ __u32 rx_missed_errors;
+ __u32 tx_aborted_errors;
+ __u32 tx_carrier_errors;
+ __u32 tx_fifo_errors;
+ __u32 tx_heartbeat_errors;
+ __u32 tx_window_errors;
+ __u32 rx_compressed;
+ __u32 tx_compressed;
+ __u32 rx_nohandler;
+};
+
+struct rtnl_link_ifmap {
+ __u64 mem_start;
+ __u64 mem_end;
+ __u64 base_addr;
+ __u16 irq;
+ __u8 dma;
+ __u8 port;
+};
+
+enum {
+ IFLA_PROTO_DOWN_REASON_UNSPEC = 0,
+ IFLA_PROTO_DOWN_REASON_MASK = 1,
+ IFLA_PROTO_DOWN_REASON_VALUE = 2,
+ __IFLA_PROTO_DOWN_REASON_CNT = 3,
+ IFLA_PROTO_DOWN_REASON_MAX = 2,
+};
+
+enum {
+ IFLA_BRPORT_UNSPEC = 0,
+ IFLA_BRPORT_STATE = 1,
+ IFLA_BRPORT_PRIORITY = 2,
+ IFLA_BRPORT_COST = 3,
+ IFLA_BRPORT_MODE = 4,
+ IFLA_BRPORT_GUARD = 5,
+ IFLA_BRPORT_PROTECT = 6,
+ IFLA_BRPORT_FAST_LEAVE = 7,
+ IFLA_BRPORT_LEARNING = 8,
+ IFLA_BRPORT_UNICAST_FLOOD = 9,
+ IFLA_BRPORT_PROXYARP = 10,
+ IFLA_BRPORT_LEARNING_SYNC = 11,
+ IFLA_BRPORT_PROXYARP_WIFI = 12,
+ IFLA_BRPORT_ROOT_ID = 13,
+ IFLA_BRPORT_BRIDGE_ID = 14,
+ IFLA_BRPORT_DESIGNATED_PORT = 15,
+ IFLA_BRPORT_DESIGNATED_COST = 16,
+ IFLA_BRPORT_ID = 17,
+ IFLA_BRPORT_NO = 18,
+ IFLA_BRPORT_TOPOLOGY_CHANGE_ACK = 19,
+ IFLA_BRPORT_CONFIG_PENDING = 20,
+ IFLA_BRPORT_MESSAGE_AGE_TIMER = 21,
+ IFLA_BRPORT_FORWARD_DELAY_TIMER = 22,
+ IFLA_BRPORT_HOLD_TIMER = 23,
+ IFLA_BRPORT_FLUSH = 24,
+ IFLA_BRPORT_MULTICAST_ROUTER = 25,
+ IFLA_BRPORT_PAD = 26,
+ IFLA_BRPORT_MCAST_FLOOD = 27,
+ IFLA_BRPORT_MCAST_TO_UCAST = 28,
+ IFLA_BRPORT_VLAN_TUNNEL = 29,
+ IFLA_BRPORT_BCAST_FLOOD = 30,
+ IFLA_BRPORT_GROUP_FWD_MASK = 31,
+ IFLA_BRPORT_NEIGH_SUPPRESS = 32,
+ IFLA_BRPORT_ISOLATED = 33,
+ IFLA_BRPORT_BACKUP_PORT = 34,
+ IFLA_BRPORT_MRP_RING_OPEN = 35,
+ IFLA_BRPORT_MRP_IN_OPEN = 36,
+ IFLA_BRPORT_MCAST_EHT_HOSTS_LIMIT = 37,
+ IFLA_BRPORT_MCAST_EHT_HOSTS_CNT = 38,
+ IFLA_BRPORT_LOCKED = 39,
+ IFLA_BRPORT_MAB = 40,
+ __IFLA_BRPORT_MAX = 41,
+};
+
+enum {
+ IFLA_INFO_UNSPEC = 0,
+ IFLA_INFO_KIND = 1,
+ IFLA_INFO_DATA = 2,
+ IFLA_INFO_XSTATS = 3,
+ IFLA_INFO_SLAVE_KIND = 4,
+ IFLA_INFO_SLAVE_DATA = 5,
+ __IFLA_INFO_MAX = 6,
+};
+
+enum {
+ IFLA_VF_INFO_UNSPEC = 0,
+ IFLA_VF_INFO = 1,
+ __IFLA_VF_INFO_MAX = 2,
+};
+
+enum {
+ IFLA_VF_UNSPEC = 0,
+ IFLA_VF_MAC = 1,
+ IFLA_VF_VLAN = 2,
+ IFLA_VF_TX_RATE = 3,
+ IFLA_VF_SPOOFCHK = 4,
+ IFLA_VF_LINK_STATE = 5,
+ IFLA_VF_RATE = 6,
+ IFLA_VF_RSS_QUERY_EN = 7,
+ IFLA_VF_STATS = 8,
+ IFLA_VF_TRUST = 9,
+ IFLA_VF_IB_NODE_GUID = 10,
+ IFLA_VF_IB_PORT_GUID = 11,
+ IFLA_VF_VLAN_LIST = 12,
+ IFLA_VF_BROADCAST = 13,
+ __IFLA_VF_MAX = 14,
+};
+
+struct ifla_vf_mac {
+ __u32 vf;
+ __u8 mac[32];
+};
+
+struct ifla_vf_broadcast {
+ __u8 broadcast[32];
+};
+
+struct ifla_vf_vlan {
+ __u32 vf;
+ __u32 vlan;
+ __u32 qos;
+};
+
+enum {
+ IFLA_VF_VLAN_INFO_UNSPEC = 0,
+ IFLA_VF_VLAN_INFO = 1,
+ __IFLA_VF_VLAN_INFO_MAX = 2,
+};
+
+struct ifla_vf_vlan_info {
+ __u32 vf;
+ __u32 vlan;
+ __u32 qos;
+ __be16 vlan_proto;
+};
+
+struct ifla_vf_tx_rate {
+ __u32 vf;
+ __u32 rate;
+};
+
+struct ifla_vf_rate {
+ __u32 vf;
+ __u32 min_tx_rate;
+ __u32 max_tx_rate;
+};
+
+struct ifla_vf_spoofchk {
+ __u32 vf;
+ __u32 setting;
+};
+
+struct ifla_vf_link_state {
+ __u32 vf;
+ __u32 link_state;
+};
+
+struct ifla_vf_rss_query_en {
+ __u32 vf;
+ __u32 setting;
+};
+
+enum {
+ IFLA_VF_STATS_RX_PACKETS = 0,
+ IFLA_VF_STATS_TX_PACKETS = 1,
+ IFLA_VF_STATS_RX_BYTES = 2,
+ IFLA_VF_STATS_TX_BYTES = 3,
+ IFLA_VF_STATS_BROADCAST = 4,
+ IFLA_VF_STATS_MULTICAST = 5,
+ IFLA_VF_STATS_PAD = 6,
+ IFLA_VF_STATS_RX_DROPPED = 7,
+ IFLA_VF_STATS_TX_DROPPED = 8,
+ __IFLA_VF_STATS_MAX = 9,
+};
+
+struct ifla_vf_trust {
+ __u32 vf;
+ __u32 setting;
+};
+
+enum {
+ IFLA_VF_PORT_UNSPEC = 0,
+ IFLA_VF_PORT = 1,
+ __IFLA_VF_PORT_MAX = 2,
+};
+
+enum {
+ IFLA_PORT_UNSPEC = 0,
+ IFLA_PORT_VF = 1,
+ IFLA_PORT_PROFILE = 2,
+ IFLA_PORT_VSI_TYPE = 3,
+ IFLA_PORT_INSTANCE_UUID = 4,
+ IFLA_PORT_HOST_UUID = 5,
+ IFLA_PORT_REQUEST = 6,
+ IFLA_PORT_RESPONSE = 7,
+ __IFLA_PORT_MAX = 8,
+};
+
+struct if_stats_msg {
+ __u8 family;
+ __u8 pad1;
+ __u16 pad2;
+ __u32 ifindex;
+ __u32 filter_mask;
+};
+
+enum {
+ IFLA_STATS_UNSPEC = 0,
+ IFLA_STATS_LINK_64 = 1,
+ IFLA_STATS_LINK_XSTATS = 2,
+ IFLA_STATS_LINK_XSTATS_SLAVE = 3,
+ IFLA_STATS_LINK_OFFLOAD_XSTATS = 4,
+ IFLA_STATS_AF_SPEC = 5,
+ __IFLA_STATS_MAX = 6,
+};
+
+enum {
+ IFLA_STATS_GETSET_UNSPEC = 0,
+ IFLA_STATS_GET_FILTERS = 1,
+ IFLA_STATS_SET_OFFLOAD_XSTATS_L3_STATS = 2,
+ __IFLA_STATS_GETSET_MAX = 3,
+};
+
+enum {
+ IFLA_OFFLOAD_XSTATS_UNSPEC = 0,
+ IFLA_OFFLOAD_XSTATS_CPU_HIT = 1,
+ IFLA_OFFLOAD_XSTATS_HW_S_INFO = 2,
+ IFLA_OFFLOAD_XSTATS_L3_STATS = 3,
+ __IFLA_OFFLOAD_XSTATS_MAX = 4,
+};
+
+enum {
+ IFLA_OFFLOAD_XSTATS_HW_S_INFO_UNSPEC = 0,
+ IFLA_OFFLOAD_XSTATS_HW_S_INFO_REQUEST = 1,
+ IFLA_OFFLOAD_XSTATS_HW_S_INFO_USED = 2,
+ __IFLA_OFFLOAD_XSTATS_HW_S_INFO_MAX = 3,
+};
+
+enum {
+ XDP_ATTACHED_NONE = 0,
+ XDP_ATTACHED_DRV = 1,
+ XDP_ATTACHED_SKB = 2,
+ XDP_ATTACHED_HW = 3,
+ XDP_ATTACHED_MULTI = 4,
+};
+
+enum {
+ IFLA_XDP_UNSPEC = 0,
+ IFLA_XDP_FD = 1,
+ IFLA_XDP_ATTACHED = 2,
+ IFLA_XDP_FLAGS = 3,
+ IFLA_XDP_PROG_ID = 4,
+ IFLA_XDP_DRV_PROG_ID = 5,
+ IFLA_XDP_SKB_PROG_ID = 6,
+ IFLA_XDP_HW_PROG_ID = 7,
+ IFLA_XDP_EXPECTED_FD = 8,
+ __IFLA_XDP_MAX = 9,
+};
+
+enum {
+ IFLA_EVENT_NONE = 0,
+ IFLA_EVENT_REBOOT = 1,
+ IFLA_EVENT_FEATURES = 2,
+ IFLA_EVENT_BONDING_FAILOVER = 3,
+ IFLA_EVENT_NOTIFY_PEERS = 4,
+ IFLA_EVENT_IGMP_RESEND = 5,
+ IFLA_EVENT_BONDING_OPTIONS = 6,
+};
+
+struct netdev_hw_addr {
+ struct list_head list;
+ struct rb_node node;
+ unsigned char addr[32];
+ unsigned char type;
+ bool global_use;
+ int sync_cnt;
+ int refcount;
+ int synced;
+ struct callback_head callback_head;
+};
+
+struct netdev_name_node {
+ struct hlist_node hlist;
+ struct list_head list;
+ struct net_device *dev;
+ const char *name;
+};
+
+enum netdev_offload_xstats_type {
+ NETDEV_OFFLOAD_XSTATS_TYPE_L3 = 1,
+};
+
+enum {
+ IFLA_BRIDGE_FLAGS = 0,
+ IFLA_BRIDGE_MODE = 1,
+ IFLA_BRIDGE_VLAN_INFO = 2,
+ IFLA_BRIDGE_VLAN_TUNNEL_INFO = 3,
+ IFLA_BRIDGE_MRP = 4,
+ IFLA_BRIDGE_CFM = 5,
+ IFLA_BRIDGE_MST = 6,
+ __IFLA_BRIDGE_MAX = 7,
+};
+
+enum {
+ BR_MCAST_DIR_RX = 0,
+ BR_MCAST_DIR_TX = 1,
+ BR_MCAST_DIR_SIZE = 2,
+};
+
+struct rta_cacheinfo {
+ __u32 rta_clntref;
+ __u32 rta_lastuse;
+ __s32 rta_expires;
+ __u32 rta_error;
+ __u32 rta_used;
+ __u32 rta_id;
+ __u32 rta_ts;
+ __u32 rta_tsage;
+};
+
+enum rtnl_link_flags {
+ RTNL_FLAG_DOIT_UNLOCKED = 1,
+ RTNL_FLAG_BULK_DEL_SUPPORTED = 2,
+};
+
+enum rtnl_kinds {
+ RTNL_KIND_NEW = 0,
+ RTNL_KIND_DEL = 1,
+ RTNL_KIND_GET = 2,
+ RTNL_KIND_SET = 3,
+};
+
+struct rtnl_af_ops {
+ struct list_head list;
+ int family;
+ int (*fill_link_af)(struct sk_buff *, const struct net_device *, u32);
+ size_t (*get_link_af_size)(const struct net_device *, u32);
+ int (*validate_link_af)(const struct net_device *, const struct nlattr *, struct netlink_ext_ack *);
+ int (*set_link_af)(struct net_device *, const struct nlattr *, struct netlink_ext_ack *);
+ int (*fill_stats_af)(struct sk_buff *, const struct net_device *);
+ size_t (*get_stats_af_size)(const struct net_device *);
+};
+
+struct rtnl_link {
+ rtnl_doit_func doit;
+ rtnl_dumpit_func dumpit;
+ struct module *owner;
+ unsigned int flags;
+ struct callback_head rcu;
+};
+
+struct rtnl_newlink_tbs {
+ struct nlattr *tb[63];
+ struct nlattr *attr[51];
+ struct nlattr *slave_attr[41];
+};
+
+struct rtnl_offload_xstats_request_used {
+ bool request;
+ bool used;
+};
+
+struct rtnl_stats_dump_filters {
+ u32 mask[6];
+};
+
+struct mm_walk;
+
+struct mm_walk_ops {
+ int (*pgd_entry)(pgd_t *, long unsigned int, long unsigned int, struct mm_walk *);
+ int (*p4d_entry)(p4d_t *, long unsigned int, long unsigned int, struct mm_walk *);
+ int (*pud_entry)(pud_t *, long unsigned int, long unsigned int, struct mm_walk *);
+ int (*pmd_entry)(pmd_t *, long unsigned int, long unsigned int, struct mm_walk *);
+ int (*pte_entry)(pte_t *, long unsigned int, long unsigned int, struct mm_walk *);
+ int (*pte_hole)(long unsigned int, long unsigned int, int, struct mm_walk *);
+ int (*hugetlb_entry)(pte_t *, long unsigned int, long unsigned int, long unsigned int, struct mm_walk *);
+ int (*test_walk)(long unsigned int, long unsigned int, struct mm_walk *);
+ int (*pre_vma)(long unsigned int, long unsigned int, struct mm_walk *);
+ void (*post_vma)(struct mm_walk *);
+};
+
+enum page_walk_action {
+ ACTION_SUBTREE = 0,
+ ACTION_CONTINUE = 1,
+ ACTION_AGAIN = 2,
+};
+
+struct mm_walk {
+ const struct mm_walk_ops *ops;
+ struct mm_struct *mm;
+ pgd_t *pgd;
+ struct vm_area_struct *vma;
+ enum page_walk_action action;
+ bool no_vma;
+ void *private;
+};
+
+enum lockdep_ok {
+ LOCKDEP_STILL_OK = 0,
+ LOCKDEP_NOW_UNRELIABLE = 1,
+};
+
+struct page_frag_cache {
+ void *va;
+ __u16 offset;
+ __u16 size;
+ unsigned int pagecnt_bias;
+ bool pfmemalloc;
+};
+
+enum zone_flags {
+ ZONE_BOOSTED_WATERMARK = 0,
+ ZONE_RECLAIM_ACTIVE = 1,
+};
+
+enum meminit_context {
+ MEMINIT_EARLY = 0,
+ MEMINIT_HOTPLUG = 1,
+};
+
+typedef void compound_page_dtor(struct page *);
+
+enum memblock_flags {
+ MEMBLOCK_NONE = 0,
+ MEMBLOCK_HOTPLUG = 1,
+ MEMBLOCK_MIRROR = 2,
+ MEMBLOCK_NOMAP = 4,
+ MEMBLOCK_DRIVER_MANAGED = 8,
+};
+
+struct memblock_region {
+ phys_addr_t base;
+ phys_addr_t size;
+ enum memblock_flags flags;
+ int nid;
+};
+
+struct memblock_type {
+ long unsigned int cnt;
+ long unsigned int max;
+ phys_addr_t total_size;
+ struct memblock_region *regions;
+ char *name;
+};
+
+struct memblock {
+ bool bottom_up;
+ phys_addr_t current_limit;
+ struct memblock_type memory;
+ struct memblock_type reserved;
+};
+
+enum oom_constraint {
+ CONSTRAINT_NONE = 0,
+ CONSTRAINT_CPUSET = 1,
+ CONSTRAINT_MEMORY_POLICY = 2,
+ CONSTRAINT_MEMCG = 3,
+};
+
+struct oom_control {
+ struct zonelist *zonelist;
+ nodemask_t *nodemask;
+ struct mem_cgroup *memcg;
+ const gfp_t gfp_mask;
+ const int order;
+ long unsigned int totalpages;
+ struct task_struct *chosen;
+ long int chosen_points;
+ enum oom_constraint constraint;
+};
+
+enum mminit_level {
+ MMINIT_WARNING = 0,
+ MMINIT_VERIFY = 1,
+ MMINIT_TRACE = 2,
+};
+
+struct migration_target_control {
+ int nid;
+ nodemask_t *nmask;
+ gfp_t gfp_mask;
+};
+
+typedef int fpi_t;
+
+struct mminit_pfnnid_cache {
+ long unsigned int last_start;
+ long unsigned int last_end;
+ int last_nid;
+};
+
+struct ahash_alg {
+ int (*init)(struct ahash_request *);
+ int (*update)(struct ahash_request *);
+ int (*final)(struct ahash_request *);
+ int (*finup)(struct ahash_request *);
+ int (*digest)(struct ahash_request *);
+ int (*export)(struct ahash_request *, void *);
+ int (*import)(struct ahash_request *, const void *);
+ int (*setkey)(struct crypto_ahash *, const u8 *, unsigned int);
+ int (*init_tfm)(struct crypto_ahash *);
+ void (*exit_tfm)(struct crypto_ahash *);
+ struct hash_alg_common halg;
+};
+
+struct crypto_hash_walk {
+ char *data;
+ unsigned int offset;
+ unsigned int alignmask;
+ struct page *pg;
+ unsigned int entrylen;
+ unsigned int total;
+ struct scatterlist *sg;
+ unsigned int flags;
+};
+
+struct ahash_instance {
+ void (*free)(struct ahash_instance *);
+ union {
+ struct {
+ char head[88];
+ struct crypto_instance base;
+ } s;
+ struct ahash_alg alg;
+ };
+};
+
+struct crypto_ahash_spawn {
+ struct crypto_spawn base;
+};
+
+enum crypto_attr_type_t {
+ CRYPTOCFGA_UNSPEC = 0,
+ CRYPTOCFGA_PRIORITY_VAL = 1,
+ CRYPTOCFGA_REPORT_LARVAL = 2,
+ CRYPTOCFGA_REPORT_HASH = 3,
+ CRYPTOCFGA_REPORT_BLKCIPHER = 4,
+ CRYPTOCFGA_REPORT_AEAD = 5,
+ CRYPTOCFGA_REPORT_COMPRESS = 6,
+ CRYPTOCFGA_REPORT_RNG = 7,
+ CRYPTOCFGA_REPORT_CIPHER = 8,
+ CRYPTOCFGA_REPORT_AKCIPHER = 9,
+ CRYPTOCFGA_REPORT_KPP = 10,
+ CRYPTOCFGA_REPORT_ACOMP = 11,
+ CRYPTOCFGA_STAT_LARVAL = 12,
+ CRYPTOCFGA_STAT_HASH = 13,
+ CRYPTOCFGA_STAT_BLKCIPHER = 14,
+ CRYPTOCFGA_STAT_AEAD = 15,
+ CRYPTOCFGA_STAT_COMPRESS = 16,
+ CRYPTOCFGA_STAT_RNG = 17,
+ CRYPTOCFGA_STAT_CIPHER = 18,
+ CRYPTOCFGA_STAT_AKCIPHER = 19,
+ CRYPTOCFGA_STAT_KPP = 20,
+ CRYPTOCFGA_STAT_ACOMP = 21,
+ __CRYPTOCFGA_MAX = 22,
+};
+
+struct crypto_report_hash {
+ char type[64];
+ unsigned int blocksize;
+ unsigned int digestsize;
+};
+
+struct ahash_request_priv {
+ crypto_completion_t complete;
+ void *data;
+ u8 *result;
+ u32 flags;
+ void *ubuf[0];
+};
+
+enum {
+ BIOSET_NEED_BVECS = 1,
+ BIOSET_NEED_RESCUER = 2,
+ BIOSET_PERCPU_CACHE = 4,
+};
+
+struct bio_alloc_cache {
+ struct bio *free_list;
+ unsigned int nr;
+};
+
+struct biovec_slab {
+ int nr_vecs;
+ char *name;
+ struct kmem_cache *slab;
+};
+
+struct bio_slab {
+ struct kmem_cache *slab;
+ unsigned int slab_ref;
+ unsigned int slab_size;
+ char name[8];
+};
+
+struct io_uring_rsrc_register {
+ __u32 nr;
+ __u32 flags;
+ __u64 resv2;
+ __u64 data;
+ __u64 tags;
+};
+
+struct io_uring_rsrc_update2 {
+ __u32 offset;
+ __u32 resv;
+ __u64 data;
+ __u64 tags;
+ __u32 nr;
+ __u32 resv2;
+};
+
+struct scm_fp_list {
+ short int count;
+ short int max;
+ struct user_struct *user;
+ struct file *fp[253];
+};
+
+struct unix_skb_parms {
+ struct pid *pid;
+ kuid_t uid;
+ kgid_t gid;
+ struct scm_fp_list *fp;
+ u32 secid;
+ u32 consumed;
+};
+
+enum {
+ IORING_RSRC_FILE = 0,
+ IORING_RSRC_BUFFER = 1,
+};
+
+struct io_rsrc_update {
+ struct file *file;
+ u64 arg;
+ u32 nr_args;
+ u32 offset;
+};
+
+enum dma_fence_flag_bits {
+ DMA_FENCE_FLAG_SIGNALED_BIT = 0,
+ DMA_FENCE_FLAG_TIMESTAMP_BIT = 1,
+ DMA_FENCE_FLAG_ENABLE_SIGNAL_BIT = 2,
+ DMA_FENCE_FLAG_USER_BITS = 3,
+};
+
+struct sync_merge_data {
+ char name[32];
+ __s32 fd2;
+ __s32 fence;
+ __u32 flags;
+ __u32 pad;
+};
+
+struct sync_fence_info {
+ char obj_name[32];
+ char driver_name[32];
+ __s32 status;
+ __u32 flags;
+ __u64 timestamp_ns;
+};
+
+struct sync_file_info {
+ char name[32];
+ __s32 status;
+ __u32 flags;
+ __u32 num_fences;
+ __u32 pad;
+ __u64 sync_fence_info;
+};
+
+struct byd_data {
+ struct timer_list timer;
+ struct psmouse *psmouse;
+ s32 abs_x;
+ s32 abs_y;
+ volatile long unsigned int last_touch_time;
+ bool btn_left;
+ bool btn_right;
+ bool touch;
+};
+
+struct ifconf {
+ int ifc_len;
+ union {
+ char *ifcu_buf;
+ struct ifreq *ifcu_req;
+ } ifc_ifcu;
+};
+
+struct gpio_desc;
+
+struct reset_control;
+
+struct mii_bus;
+
+struct mdio_device {
+ struct device dev;
+ struct mii_bus *bus;
+ char modalias[32];
+ int (*bus_match)(struct device *, struct device_driver *);
+ void (*device_free)(struct mdio_device *);
+ void (*device_remove)(struct mdio_device *);
+ int addr;
+ int flags;
+ struct gpio_desc *reset_gpio;
+ struct reset_control *reset_ctrl;
+ unsigned int reset_assert_delay;
+ unsigned int reset_deassert_delay;
+};
+
+struct phy_c45_device_ids {
+ u32 devices_in_package;
+ u32 mmds_present;
+ u32 device_ids[32];
+};
+
+enum phy_state {
+ PHY_DOWN = 0,
+ PHY_READY = 1,
+ PHY_HALTED = 2,
+ PHY_UP = 3,
+ PHY_RUNNING = 4,
+ PHY_NOLINK = 5,
+ PHY_CABLETEST = 6,
+};
+
+typedef enum {
+ PHY_INTERFACE_MODE_NA = 0,
+ PHY_INTERFACE_MODE_INTERNAL = 1,
+ PHY_INTERFACE_MODE_MII = 2,
+ PHY_INTERFACE_MODE_GMII = 3,
+ PHY_INTERFACE_MODE_SGMII = 4,
+ PHY_INTERFACE_MODE_TBI = 5,
+ PHY_INTERFACE_MODE_REVMII = 6,
+ PHY_INTERFACE_MODE_RMII = 7,
+ PHY_INTERFACE_MODE_REVRMII = 8,
+ PHY_INTERFACE_MODE_RGMII = 9,
+ PHY_INTERFACE_MODE_RGMII_ID = 10,
+ PHY_INTERFACE_MODE_RGMII_RXID = 11,
+ PHY_INTERFACE_MODE_RGMII_TXID = 12,
+ PHY_INTERFACE_MODE_RTBI = 13,
+ PHY_INTERFACE_MODE_SMII = 14,
+ PHY_INTERFACE_MODE_XGMII = 15,
+ PHY_INTERFACE_MODE_XLGMII = 16,
+ PHY_INTERFACE_MODE_MOCA = 17,
+ PHY_INTERFACE_MODE_QSGMII = 18,
+ PHY_INTERFACE_MODE_TRGMII = 19,
+ PHY_INTERFACE_MODE_100BASEX = 20,
+ PHY_INTERFACE_MODE_1000BASEX = 21,
+ PHY_INTERFACE_MODE_2500BASEX = 22,
+ PHY_INTERFACE_MODE_5GBASER = 23,
+ PHY_INTERFACE_MODE_RXAUI = 24,
+ PHY_INTERFACE_MODE_XAUI = 25,
+ PHY_INTERFACE_MODE_10GBASER = 26,
+ PHY_INTERFACE_MODE_25GBASER = 27,
+ PHY_INTERFACE_MODE_USXGMII = 28,
+ PHY_INTERFACE_MODE_10GKR = 29,
+ PHY_INTERFACE_MODE_QUSGMII = 30,
+ PHY_INTERFACE_MODE_1000BASEKX = 31,
+ PHY_INTERFACE_MODE_MAX = 32,
+} phy_interface_t;
+
+struct phylink;
+
+struct pse_control;
+
+struct phy_driver;
+
+struct phy_package_shared;
+
+struct mii_timestamper;
+
+struct phy_device {
+ struct mdio_device mdio;
+ struct phy_driver *drv;
+ u32 phy_id;
+ struct phy_c45_device_ids c45_ids;
+ unsigned int is_c45: 1;
+ unsigned int is_internal: 1;
+ unsigned int is_pseudo_fixed_link: 1;
+ unsigned int is_gigabit_capable: 1;
+ unsigned int has_fixups: 1;
+ unsigned int suspended: 1;
+ unsigned int suspended_by_mdio_bus: 1;
+ unsigned int sysfs_links: 1;
+ unsigned int loopback_enabled: 1;
+ unsigned int downshifted_rate: 1;
+ unsigned int is_on_sfp_module: 1;
+ unsigned int mac_managed_pm: 1;
+ unsigned int autoneg: 1;
+ unsigned int link: 1;
+ unsigned int autoneg_complete: 1;
+ unsigned int interrupts: 1;
+ unsigned int irq_suspended: 1;
+ unsigned int irq_rerun: 1;
+ int rate_matching;
+ enum phy_state state;
+ u32 dev_flags;
+ phy_interface_t interface;
+ int speed;
+ int duplex;
+ int port;
+ int pause;
+ int asym_pause;
+ u8 master_slave_get;
+ u8 master_slave_set;
+ u8 master_slave_state;
+ long unsigned int supported[2];
+ long unsigned int advertising[2];
+ long unsigned int lp_advertising[2];
+ long unsigned int adv_old[2];
+ long unsigned int host_interfaces[1];
+ u32 eee_broken_modes;
+ int irq;
+ void *priv;
+ struct phy_package_shared *shared;
+ struct sk_buff *skb;
+ void *ehdr;
+ struct nlattr *nest;
+ struct delayed_work state_queue;
+ struct mutex lock;
+ bool sfp_bus_attached;
+ struct sfp_bus *sfp_bus;
+ struct phylink *phylink;
+ struct net_device *attached_dev;
+ struct mii_timestamper *mii_ts;
+ struct pse_control *psec;
+ u8 mdix;
+ u8 mdix_ctrl;
+ int pma_extable;
+ unsigned int link_down_events;
+ void (*phy_link_change)(struct phy_device *, bool);
+ void (*adjust_link)(struct net_device *);
+};
+
+struct hwtstamp_config {
+ int flags;
+ int tx_type;
+ int rx_filter;
+};
+
+enum hwtstamp_flags {
+ HWTSTAMP_FLAG_BONDED_PHC_INDEX = 1,
+ HWTSTAMP_FLAG_LAST = 1,
+ HWTSTAMP_FLAG_MASK = 1,
+};
+
+enum hwtstamp_tx_types {
+ HWTSTAMP_TX_OFF = 0,
+ HWTSTAMP_TX_ON = 1,
+ HWTSTAMP_TX_ONESTEP_SYNC = 2,
+ HWTSTAMP_TX_ONESTEP_P2P = 3,
+ __HWTSTAMP_TX_CNT = 4,
+};
+
+enum hwtstamp_rx_filters {
+ HWTSTAMP_FILTER_NONE = 0,
+ HWTSTAMP_FILTER_ALL = 1,
+ HWTSTAMP_FILTER_SOME = 2,
+ HWTSTAMP_FILTER_PTP_V1_L4_EVENT = 3,
+ HWTSTAMP_FILTER_PTP_V1_L4_SYNC = 4,
+ HWTSTAMP_FILTER_PTP_V1_L4_DELAY_REQ = 5,
+ HWTSTAMP_FILTER_PTP_V2_L4_EVENT = 6,
+ HWTSTAMP_FILTER_PTP_V2_L4_SYNC = 7,
+ HWTSTAMP_FILTER_PTP_V2_L4_DELAY_REQ = 8,
+ HWTSTAMP_FILTER_PTP_V2_L2_EVENT = 9,
+ HWTSTAMP_FILTER_PTP_V2_L2_SYNC = 10,
+ HWTSTAMP_FILTER_PTP_V2_L2_DELAY_REQ = 11,
+ HWTSTAMP_FILTER_PTP_V2_EVENT = 12,
+ HWTSTAMP_FILTER_PTP_V2_SYNC = 13,
+ HWTSTAMP_FILTER_PTP_V2_DELAY_REQ = 14,
+ HWTSTAMP_FILTER_NTP_ALL = 15,
+ __HWTSTAMP_FILTER_CNT = 16,
+};
+
+typedef s32 compat_int_t;
+
+typedef u32 compat_ulong_t;
+
+typedef u32 compat_uptr_t;
+
+typedef u32 compat_caddr_t;
+
+struct compat_ifmap {
+ compat_ulong_t mem_start;
+ compat_ulong_t mem_end;
+ short unsigned int base_addr;
+ unsigned char irq;
+ unsigned char dma;
+ unsigned char port;
+};
+
+struct compat_ifconf {
+ compat_int_t ifc_len;
+ compat_caddr_t ifcbuf;
+};
+
+struct phy_tdr_config {
+ u32 first;
+ u32 last;
+ u32 step;
+ s8 pair;
+};
+
+struct mdio_bus_stats {
+ u64_stats_t transfers;
+ u64_stats_t errors;
+ u64_stats_t writes;
+ u64_stats_t reads;
+ struct u64_stats_sync syncp;
+};
+
+struct mii_bus {
+ struct module *owner;
+ const char *name;
+ char id[61];
+ void *priv;
+ int (*read)(struct mii_bus *, int, int);
+ int (*write)(struct mii_bus *, int, int, u16);
+ int (*reset)(struct mii_bus *);
+ struct mdio_bus_stats stats[32];
+ struct mutex mdio_lock;
+ struct device *parent;
+ enum {
+ MDIOBUS_ALLOCATED = 1,
+ MDIOBUS_REGISTERED = 2,
+ MDIOBUS_UNREGISTERED = 3,
+ MDIOBUS_RELEASED = 4,
+ } state;
+ struct device dev;
+ struct mdio_device *mdio_map[32];
+ u32 phy_mask;
+ u32 phy_ignore_ta_mask;
+ int irq[32];
+ int reset_delay_us;
+ int reset_post_delay_us;
+ struct gpio_desc *reset_gpiod;
+ enum {
+ MDIOBUS_NO_CAP = 0,
+ MDIOBUS_C22 = 1,
+ MDIOBUS_C45 = 2,
+ MDIOBUS_C22_C45 = 3,
+ } probe_capabilities;
+ struct mutex shared_lock;
+ struct phy_package_shared *shared[32];
+};
+
+struct mdio_driver_common {
+ struct device_driver driver;
+ int flags;
+};
+
+struct mii_timestamper {
+ bool (*rxtstamp)(struct mii_timestamper *, struct sk_buff *, int);
+ void (*txtstamp)(struct mii_timestamper *, struct sk_buff *, int);
+ int (*hwtstamp)(struct mii_timestamper *, struct ifreq *);
+ void (*link_state)(struct mii_timestamper *, struct phy_device *);
+ int (*ts_info)(struct mii_timestamper *, struct ethtool_ts_info *);
+ struct device *device;
+};
+
+struct phy_package_shared {
+ int addr;
+ refcount_t refcnt;
+ long unsigned int flags;
+ size_t priv_size;
+ void *priv;
+};
+
+struct phy_driver {
+ struct mdio_driver_common mdiodrv;
+ u32 phy_id;
+ char *name;
+ u32 phy_id_mask;
+ const long unsigned int * const features;
+ u32 flags;
+ const void *driver_data;
+ int (*soft_reset)(struct phy_device *);
+ int (*config_init)(struct phy_device *);
+ int (*probe)(struct phy_device *);
+ int (*get_features)(struct phy_device *);
+ int (*get_rate_matching)(struct phy_device *, phy_interface_t);
+ int (*suspend)(struct phy_device *);
+ int (*resume)(struct phy_device *);
+ int (*config_aneg)(struct phy_device *);
+ int (*aneg_done)(struct phy_device *);
+ int (*read_status)(struct phy_device *);
+ int (*config_intr)(struct phy_device *);
+ irqreturn_t (*handle_interrupt)(struct phy_device *);
+ void (*remove)(struct phy_device *);
+ int (*match_phy_device)(struct phy_device *);
+ int (*set_wol)(struct phy_device *, struct ethtool_wolinfo *);
+ void (*get_wol)(struct phy_device *, struct ethtool_wolinfo *);
+ void (*link_change_notify)(struct phy_device *);
+ int (*read_mmd)(struct phy_device *, int, u16);
+ int (*write_mmd)(struct phy_device *, int, u16, u16);
+ int (*read_page)(struct phy_device *);
+ int (*write_page)(struct phy_device *, int);
+ int (*module_info)(struct phy_device *, struct ethtool_modinfo *);
+ int (*module_eeprom)(struct phy_device *, struct ethtool_eeprom *, u8 *);
+ int (*cable_test_start)(struct phy_device *);
+ int (*cable_test_tdr_start)(struct phy_device *, const struct phy_tdr_config *);
+ int (*cable_test_get_status)(struct phy_device *, bool *);
+ int (*get_sset_count)(struct phy_device *);
+ void (*get_strings)(struct phy_device *, u8 *);
+ void (*get_stats)(struct phy_device *, struct ethtool_stats *, u64 *);
+ int (*get_tunable)(struct phy_device *, struct ethtool_tunable *, void *);
+ int (*set_tunable)(struct phy_device *, struct ethtool_tunable *, const void *);
+ int (*set_loopback)(struct phy_device *, bool);
+ int (*get_sqi)(struct phy_device *);
+ int (*get_sqi_max)(struct phy_device *);
+};
+
+struct net_bridge;
+
+struct nf_conntrack_net {
+ atomic_t count;
+ unsigned int expect_count;
+ unsigned int users4;
+ unsigned int users6;
+ unsigned int users_bridge;
+ struct ctl_table_header *sysctl_header;
+};
+
+enum nf_ct_sysctl_index {
+ NF_SYSCTL_CT_MAX = 0,
+ NF_SYSCTL_CT_COUNT = 1,
+ NF_SYSCTL_CT_BUCKETS = 2,
+ NF_SYSCTL_CT_CHECKSUM = 3,
+ NF_SYSCTL_CT_LOG_INVALID = 4,
+ NF_SYSCTL_CT_EXPECT_MAX = 5,
+ NF_SYSCTL_CT_ACCT = 6,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_GENERIC = 7,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_TCP_SYN_SENT = 8,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_TCP_SYN_RECV = 9,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_TCP_ESTABLISHED = 10,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_TCP_FIN_WAIT = 11,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_TCP_CLOSE_WAIT = 12,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_TCP_LAST_ACK = 13,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_TCP_TIME_WAIT = 14,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_TCP_CLOSE = 15,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_TCP_RETRANS = 16,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_TCP_UNACK = 17,
+ NF_SYSCTL_CT_PROTO_TCP_LOOSE = 18,
+ NF_SYSCTL_CT_PROTO_TCP_LIBERAL = 19,
+ NF_SYSCTL_CT_PROTO_TCP_IGNORE_INVALID_RST = 20,
+ NF_SYSCTL_CT_PROTO_TCP_MAX_RETRANS = 21,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_UDP = 22,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_UDP_STREAM = 23,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_ICMP = 24,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_ICMPV6 = 25,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_SCTP_CLOSED = 26,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_SCTP_COOKIE_WAIT = 27,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_SCTP_COOKIE_ECHOED = 28,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_SCTP_ESTABLISHED = 29,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_SCTP_SHUTDOWN_SENT = 30,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_SCTP_SHUTDOWN_RECD = 31,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_SCTP_SHUTDOWN_ACK_SENT = 32,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_SCTP_HEARTBEAT_SENT = 33,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_SCTP_HEARTBEAT_ACKED = 34,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_DCCP_REQUEST = 35,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_DCCP_RESPOND = 36,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_DCCP_PARTOPEN = 37,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_DCCP_OPEN = 38,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_DCCP_CLOSEREQ = 39,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_DCCP_CLOSING = 40,
+ NF_SYSCTL_CT_PROTO_TIMEOUT_DCCP_TIMEWAIT = 41,
+ NF_SYSCTL_CT_PROTO_DCCP_LOOSE = 42,
+ NF_SYSCTL_CT_LWTUNNEL = 43,
+ __NF_SYSCTL_CT_LAST_SYSCTL = 44,
+};
+
+struct tcp_plb_state {
+ u8 consec_cong_rounds: 5;
+ u8 unused: 3;
+ u32 pause_until;
+};
+
+struct fib6_gc_args {
+ int timeout;
+ int more;
+};
+
+enum fib6_walk_state {
+ FWS_S = 0,
+ FWS_L = 1,
+ FWS_R = 2,
+ FWS_C = 3,
+ FWS_U = 4,
+};
+
+struct fib6_walker {
+ struct list_head lh;
+ struct fib6_node *root;
+ struct fib6_node *node;
+ struct fib6_info *leaf;
+ enum fib6_walk_state state;
+ unsigned int skip;
+ unsigned int count;
+ unsigned int skip_in_node;
+ int (*func)(struct fib6_walker *);
+ void *args;
+};
+
+struct fib6_entry_notifier_info {
+ struct fib_notifier_info info;
+ struct fib6_info *rt;
+ unsigned int nsiblings;
+};
+
+struct ipv6_route_iter {
+ struct seq_net_private p;
+ struct fib6_walker w;
+ loff_t skip;
+ struct fib6_table *tbl;
+ int sernum;
+};
+
+struct bpf_iter__ipv6_route {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct fib6_info *rt;
+ };
+};
+
+struct rt6_rtnl_dump_arg {
+ struct sk_buff *skb;
+ struct netlink_callback *cb;
+ struct net *net;
+ struct fib_dump_filter filter;
+};
+
+struct fib6_cleaner {
+ struct fib6_walker w;
+ struct net *net;
+ int (*func)(struct fib6_info *, void *);
+ int sernum;
+ void *arg;
+ bool skip_notify;
+};
+
+enum {
+ FIB6_NO_SERNUM_CHANGE = 0,
+};
+
+struct fib6_dump_arg {
+ struct net *net;
+ struct notifier_block *nb;
+ struct netlink_ext_ack *extack;
+};
+
+struct fib6_nh_pcpu_arg {
+ struct fib6_info *from;
+ const struct fib6_table *table;
+};
+
+struct lookup_args {
+ int offset;
+ const struct in6_addr *addr;
+};
+
+struct vlan_group {
+ unsigned int nr_vlan_devs;
+ struct hlist_node hlist;
+ struct net_device **vlan_devices_arrays[16];
+};
+
+struct vlan_info {
+ struct net_device *real_dev;
+ struct vlan_group grp;
+ struct list_head vid_list;
+ unsigned int nr_vids;
+ struct callback_head rcu;
+};
+
+enum vlan_flags {
+ VLAN_FLAG_REORDER_HDR = 1,
+ VLAN_FLAG_GVRP = 2,
+ VLAN_FLAG_LOOSE_BINDING = 4,
+ VLAN_FLAG_MVRP = 8,
+ VLAN_FLAG_BRIDGE_BINDING = 16,
+};
+
+struct vlan_hdr {
+ __be16 h_vlan_TCI;
+ __be16 h_vlan_encapsulated_proto;
+};
+
+struct vlan_ethhdr {
+ union {
+ struct {
+ unsigned char h_dest[6];
+ unsigned char h_source[6];
+ };
+ struct {
+ unsigned char h_dest[6];
+ unsigned char h_source[6];
+ } addrs;
+ };
+ __be16 h_vlan_proto;
+ __be16 h_vlan_TCI;
+ __be16 h_vlan_encapsulated_proto;
+};
+
+struct vlan_pcpu_stats {
+ u64_stats_t rx_packets;
+ u64_stats_t rx_bytes;
+ u64_stats_t rx_multicast;
+ u64_stats_t tx_packets;
+ u64_stats_t tx_bytes;
+ struct u64_stats_sync syncp;
+ u32 rx_errors;
+ u32 tx_dropped;
+};
+
+struct vlan_priority_tci_mapping {
+ u32 priority;
+ u16 vlan_qos;
+ struct vlan_priority_tci_mapping *next;
+};
+
+struct vlan_dev_priv {
+ unsigned int nr_ingress_mappings;
+ u32 ingress_priority_map[8];
+ unsigned int nr_egress_mappings;
+ struct vlan_priority_tci_mapping *egress_priority_map[16];
+ __be16 vlan_proto;
+ u16 vlan_id;
+ u16 flags;
+ struct net_device *real_dev;
+ netdevice_tracker dev_tracker;
+ unsigned char real_dev_addr[6];
+ struct proc_dir_entry *dent;
+ struct vlan_pcpu_stats *vlan_pcpu_stats;
+};
+
+enum vlan_protos {
+ VLAN_PROTO_8021Q = 0,
+ VLAN_PROTO_8021AD = 1,
+ VLAN_PROTO_NUM = 2,
+};
+
+struct vlan_vid_info {
+ struct list_head list;
+ __be16 proto;
+ u16 vid;
+ int refcount;
+};
+
+struct alt_instr {
+ s32 instr_offset;
+ s32 repl_offset;
+ u16 cpuid;
+ u8 instrlen;
+ u8 replacementlen;
+};
+
+struct timens_offset {
+ s64 sec;
+ u64 nsec;
+};
+
+struct vm_special_mapping {
+ const char *name;
+ struct page **pages;
+ vm_fault_t (*fault)(const struct vm_special_mapping *, struct vm_area_struct *, struct vm_fault *);
+ int (*mremap)(const struct vm_special_mapping *, struct vm_area_struct *);
+};
+
+struct pvclock_vcpu_time_info {
+ u32 version;
+ u32 pad0;
+ u64 tsc_timestamp;
+ u64 system_time;
+ u32 tsc_to_system_mul;
+ s8 tsc_shift;
+ u8 flags;
+ u8 pad[2];
+};
+
+struct pvclock_vsyscall_time_info {
+ struct pvclock_vcpu_time_info pvti;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+enum vdso_clock_mode {
+ VDSO_CLOCKMODE_NONE = 0,
+ VDSO_CLOCKMODE_TSC = 1,
+ VDSO_CLOCKMODE_PVCLOCK = 2,
+ VDSO_CLOCKMODE_HVCLOCK = 3,
+ VDSO_CLOCKMODE_MAX = 4,
+ VDSO_CLOCKMODE_TIMENS = 2147483647,
+};
+
+struct arch_vdso_data {};
+
+struct vdso_timestamp {
+ u64 sec;
+ u64 nsec;
+};
+
+struct vdso_data {
+ u32 seq;
+ s32 clock_mode;
+ u64 cycle_last;
+ u64 mask;
+ u32 mult;
+ u32 shift;
+ union {
+ struct vdso_timestamp basetime[12];
+ struct timens_offset offset[12];
+ };
+ s32 tz_minuteswest;
+ s32 tz_dsttime;
+ u32 hrtimer_res;
+ u32 __unused;
+ struct arch_vdso_data arch_data;
+};
+
+struct ms_hyperv_tsc_page {
+ volatile u32 tsc_sequence;
+ u32 reserved1;
+ volatile u64 tsc_scale;
+ volatile s64 tsc_offset;
+};
+
+struct va_alignment {
+ int flags;
+ long unsigned int mask;
+ long unsigned int bits;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+enum {
+ FTRACE_UPDATE_CALLS = 1,
+ FTRACE_DISABLE_CALLS = 2,
+ FTRACE_UPDATE_TRACE_FUNC = 4,
+ FTRACE_START_FUNC_RET = 8,
+ FTRACE_STOP_FUNC_RET = 16,
+ FTRACE_MAY_SLEEP = 32,
+};
+
+struct ftrace_graph_ent {
+ long unsigned int func;
+ int depth;
+} __attribute__((packed));
+
+struct ftrace_graph_ret {
+ long unsigned int func;
+ int depth;
+ unsigned int overrun;
+ long long unsigned int calltime;
+ long long unsigned int rettime;
+};
+
+typedef void (*trace_func_graph_ret_t)(struct ftrace_graph_ret *);
+
+typedef int (*trace_func_graph_ent_t)(struct ftrace_graph_ent *);
+
+struct fgraph_ops {
+ trace_func_graph_ent_t entryfunc;
+ trace_func_graph_ret_t retfunc;
+};
+
+enum {
+ BPF_RB_NO_WAKEUP = 1,
+ BPF_RB_FORCE_WAKEUP = 2,
+};
+
+enum {
+ BPF_RB_AVAIL_DATA = 0,
+ BPF_RB_RING_SIZE = 1,
+ BPF_RB_CONS_POS = 2,
+ BPF_RB_PROD_POS = 3,
+};
+
+enum {
+ BPF_RINGBUF_BUSY_BIT = 2147483648,
+ BPF_RINGBUF_DISCARD_BIT = 1073741824,
+ BPF_RINGBUF_HDR_SZ = 8,
+};
+
+struct bpf_dynptr_kern {
+ void *data;
+ u32 size;
+ u32 offset;
+};
+
+struct bpf_ringbuf {
+ wait_queue_head_t waitq;
+ struct irq_work work;
+ u64 mask;
+ struct page **pages;
+ int nr_pages;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ spinlock_t spinlock;
+ atomic_t busy;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long unsigned int consumer_pos;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long unsigned int producer_pos;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ char data[0];
+};
+
+struct bpf_ringbuf_map {
+ struct bpf_map map;
+ struct bpf_ringbuf *rb;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct bpf_ringbuf_hdr {
+ u32 len;
+ u32 pg_off;
+};
+
+typedef u64 (*btf_bpf_ringbuf_reserve)(struct bpf_map *, u64, u64);
+
+typedef u64 (*btf_bpf_ringbuf_submit)(void *, u64);
+
+typedef u64 (*btf_bpf_ringbuf_discard)(void *, u64);
+
+typedef u64 (*btf_bpf_ringbuf_output)(struct bpf_map *, void *, u64, u64);
+
+typedef u64 (*btf_bpf_ringbuf_query)(struct bpf_map *, u64);
+
+typedef u64 (*btf_bpf_ringbuf_reserve_dynptr)(struct bpf_map *, u32, u64, struct bpf_dynptr_kern *);
+
+typedef u64 (*btf_bpf_ringbuf_submit_dynptr)(struct bpf_dynptr_kern *, u64);
+
+typedef u64 (*btf_bpf_ringbuf_discard_dynptr)(struct bpf_dynptr_kern *, u64);
+
+typedef u64 (*btf_bpf_user_ringbuf_drain)(struct bpf_map *, void *, void *, u64);
+
+enum dentry_d_lock_class {
+ DENTRY_D_LOCK_NORMAL = 0,
+ DENTRY_D_LOCK_NESTED = 1,
+};
+
+struct tree_descr {
+ const char *name;
+ const struct file_operations *ops;
+ int mode;
+};
+
+struct simple_transaction_argresp {
+ ssize_t size;
+ char data[0];
+};
+
+enum fid_type {
+ FILEID_ROOT = 0,
+ FILEID_INO32_GEN = 1,
+ FILEID_INO32_GEN_PARENT = 2,
+ FILEID_BTRFS_WITHOUT_PARENT = 77,
+ FILEID_BTRFS_WITH_PARENT = 78,
+ FILEID_BTRFS_WITH_PARENT_ROOT = 79,
+ FILEID_UDF_WITHOUT_PARENT = 81,
+ FILEID_UDF_WITH_PARENT = 82,
+ FILEID_NILFS_WITHOUT_PARENT = 97,
+ FILEID_NILFS_WITH_PARENT = 98,
+ FILEID_FAT_WITHOUT_PARENT = 113,
+ FILEID_FAT_WITH_PARENT = 114,
+ FILEID_LUSTRE = 151,
+ FILEID_KERNFS = 254,
+ FILEID_INVALID = 255,
+};
+
+struct fid {
+ union {
+ struct {
+ u32 ino;
+ u32 gen;
+ u32 parent_ino;
+ u32 parent_gen;
+ } i32;
+ struct {
+ u32 block;
+ u16 partref;
+ u16 parent_partref;
+ u32 generation;
+ u32 parent_block;
+ u32 parent_generation;
+ } udf;
+ __u32 raw[0];
+ };
+};
+
+enum fsnotify_iter_type {
+ FSNOTIFY_ITER_TYPE_INODE = 0,
+ FSNOTIFY_ITER_TYPE_VFSMOUNT = 1,
+ FSNOTIFY_ITER_TYPE_SB = 2,
+ FSNOTIFY_ITER_TYPE_PARENT = 3,
+ FSNOTIFY_ITER_TYPE_INODE2 = 4,
+ FSNOTIFY_ITER_TYPE_COUNT = 5,
+};
+
+enum utf8_normalization {
+ UTF8_NFDI = 0,
+ UTF8_NFDICF = 1,
+ UTF8_NMAX = 2,
+};
+
+struct simple_attr {
+ int (*get)(void *, u64 *);
+ int (*set)(void *, u64);
+ char get_buf[24];
+ char set_buf[24];
+ void *data;
+ const char *fmt;
+ struct mutex mutex;
+};
+
+struct fs_pin {
+ wait_queue_head_t wait;
+ int done;
+ struct hlist_node s_list;
+ struct hlist_node m_list;
+ void (*kill)(struct fs_pin *);
+};
+
+struct fd_data {
+ fmode_t mode;
+ unsigned int fd;
+};
+
+struct kernfs_global_locks {
+ struct mutex open_file_mutex[1024];
+};
+
+enum kernfs_node_flag {
+ KERNFS_ACTIVATED = 16,
+ KERNFS_NS = 32,
+ KERNFS_HAS_SEQ_SHOW = 64,
+ KERNFS_HAS_MMAP = 128,
+ KERNFS_LOCKDEP = 256,
+ KERNFS_HIDDEN = 512,
+ KERNFS_SUICIDAL = 1024,
+ KERNFS_SUICIDED = 2048,
+ KERNFS_EMPTY_DIR = 4096,
+ KERNFS_HAS_RELEASE = 8192,
+ KERNFS_REMOVING = 16384,
+};
+
+struct kernfs_root {
+ struct kernfs_node *kn;
+ unsigned int flags;
+ struct idr ino_idr;
+ u32 last_id_lowbits;
+ u32 id_highbits;
+ struct kernfs_syscall_ops *syscall_ops;
+ struct list_head supers;
+ wait_queue_head_t deactivate_waitq;
+ struct rw_semaphore kernfs_rwsem;
+};
+
+struct kernfs_open_node {
+ struct callback_head callback_head;
+ atomic_t event;
+ wait_queue_head_t poll;
+ struct list_head files;
+ unsigned int nr_mmapped;
+ unsigned int nr_to_release;
+};
+
+struct kernfs_iattrs {
+ kuid_t ia_uid;
+ kgid_t ia_gid;
+ struct timespec64 ia_atime;
+ struct timespec64 ia_mtime;
+ struct timespec64 ia_ctime;
+ struct simple_xattrs xattrs;
+ atomic_t nr_user_xattrs;
+ atomic_t user_xattr_size;
+};
+
+struct kernfs_super_info {
+ struct super_block *sb;
+ struct kernfs_root *root;
+ const void *ns;
+ struct list_head node;
+};
+
+struct ext4_orphan_block_tail {
+ __le32 ob_magic;
+ __le32 ob_checksum;
+};
+
+struct vfs_cap_data {
+ __le32 magic_etc;
+ struct {
+ __le32 permitted;
+ __le32 inheritable;
+ } data[2];
+};
+
+struct vfs_ns_cap_data {
+ __le32 magic_etc;
+ struct {
+ __le32 permitted;
+ __le32 inheritable;
+ } data[2];
+ __le32 rootid;
+};
+
+struct cpu_vfs_cap_data {
+ __u32 magic_etc;
+ kernel_cap_t permitted;
+ kernel_cap_t inheritable;
+ kuid_t rootid;
+};
+
+struct timezone {
+ int tz_minuteswest;
+ int tz_dsttime;
+};
+
+struct sctp_association;
+
+union security_list_options {
+ int (*binder_set_context_mgr)(const struct cred *);
+ int (*binder_transaction)(const struct cred *, const struct cred *);
+ int (*binder_transfer_binder)(const struct cred *, const struct cred *);
+ int (*binder_transfer_file)(const struct cred *, const struct cred *, struct file *);
+ int (*ptrace_access_check)(struct task_struct *, unsigned int);
+ int (*ptrace_traceme)(struct task_struct *);
+ int (*capget)(struct task_struct *, kernel_cap_t *, kernel_cap_t *, kernel_cap_t *);
+ int (*capset)(struct cred *, const struct cred *, const kernel_cap_t *, const kernel_cap_t *, const kernel_cap_t *);
+ int (*capable)(const struct cred *, struct user_namespace *, int, unsigned int);
+ int (*quotactl)(int, int, int, struct super_block *);
+ int (*quota_on)(struct dentry *);
+ int (*syslog)(int);
+ int (*settime)(const struct timespec64 *, const struct timezone *);
+ int (*vm_enough_memory)(struct mm_struct *, long int);
+ int (*bprm_creds_for_exec)(struct linux_binprm *);
+ int (*bprm_creds_from_file)(struct linux_binprm *, struct file *);
+ int (*bprm_check_security)(struct linux_binprm *);
+ void (*bprm_committing_creds)(struct linux_binprm *);
+ void (*bprm_committed_creds)(struct linux_binprm *);
+ int (*fs_context_dup)(struct fs_context *, struct fs_context *);
+ int (*fs_context_parse_param)(struct fs_context *, struct fs_parameter *);
+ int (*sb_alloc_security)(struct super_block *);
+ void (*sb_delete)(struct super_block *);
+ void (*sb_free_security)(struct super_block *);
+ void (*sb_free_mnt_opts)(void *);
+ int (*sb_eat_lsm_opts)(char *, void **);
+ int (*sb_mnt_opts_compat)(struct super_block *, void *);
+ int (*sb_remount)(struct super_block *, void *);
+ int (*sb_kern_mount)(struct super_block *);
+ int (*sb_show_options)(struct seq_file *, struct super_block *);
+ int (*sb_statfs)(struct dentry *);
+ int (*sb_mount)(const char *, const struct path *, const char *, long unsigned int, void *);
+ int (*sb_umount)(struct vfsmount *, int);
+ int (*sb_pivotroot)(const struct path *, const struct path *);
+ int (*sb_set_mnt_opts)(struct super_block *, void *, long unsigned int, long unsigned int *);
+ int (*sb_clone_mnt_opts)(const struct super_block *, struct super_block *, long unsigned int, long unsigned int *);
+ int (*move_mount)(const struct path *, const struct path *);
+ int (*dentry_init_security)(struct dentry *, int, const struct qstr *, const char **, void **, u32 *);
+ int (*dentry_create_files_as)(struct dentry *, int, struct qstr *, const struct cred *, struct cred *);
+ int (*path_notify)(const struct path *, u64, unsigned int);
+ int (*inode_alloc_security)(struct inode *);
+ void (*inode_free_security)(struct inode *);
+ int (*inode_init_security)(struct inode *, struct inode *, const struct qstr *, const char **, void **, size_t *);
+ int (*inode_init_security_anon)(struct inode *, const struct qstr *, const struct inode *);
+ int (*inode_create)(struct inode *, struct dentry *, umode_t);
+ int (*inode_link)(struct dentry *, struct inode *, struct dentry *);
+ int (*inode_unlink)(struct inode *, struct dentry *);
+ int (*inode_symlink)(struct inode *, struct dentry *, const char *);
+ int (*inode_mkdir)(struct inode *, struct dentry *, umode_t);
+ int (*inode_rmdir)(struct inode *, struct dentry *);
+ int (*inode_mknod)(struct inode *, struct dentry *, umode_t, dev_t);
+ int (*inode_rename)(struct inode *, struct dentry *, struct inode *, struct dentry *);
+ int (*inode_readlink)(struct dentry *);
+ int (*inode_follow_link)(struct dentry *, struct inode *, bool);
+ int (*inode_permission)(struct inode *, int);
+ int (*inode_setattr)(struct dentry *, struct iattr *);
+ int (*inode_getattr)(const struct path *);
+ int (*inode_setxattr)(struct user_namespace *, struct dentry *, const char *, const void *, size_t, int);
+ void (*inode_post_setxattr)(struct dentry *, const char *, const void *, size_t, int);
+ int (*inode_getxattr)(struct dentry *, const char *);
+ int (*inode_listxattr)(struct dentry *);
+ int (*inode_removexattr)(struct user_namespace *, struct dentry *, const char *);
+ int (*inode_need_killpriv)(struct dentry *);
+ int (*inode_killpriv)(struct user_namespace *, struct dentry *);
+ int (*inode_getsecurity)(struct user_namespace *, struct inode *, const char *, void **, bool);
+ int (*inode_setsecurity)(struct inode *, const char *, const void *, size_t, int);
+ int (*inode_listsecurity)(struct inode *, char *, size_t);
+ void (*inode_getsecid)(struct inode *, u32 *);
+ int (*inode_copy_up)(struct dentry *, struct cred **);
+ int (*inode_copy_up_xattr)(const char *);
+ int (*kernfs_init_security)(struct kernfs_node *, struct kernfs_node *);
+ int (*file_permission)(struct file *, int);
+ int (*file_alloc_security)(struct file *);
+ void (*file_free_security)(struct file *);
+ int (*file_ioctl)(struct file *, unsigned int, long unsigned int);
+ int (*mmap_addr)(long unsigned int);
+ int (*mmap_file)(struct file *, long unsigned int, long unsigned int, long unsigned int);
+ int (*file_mprotect)(struct vm_area_struct *, long unsigned int, long unsigned int);
+ int (*file_lock)(struct file *, unsigned int);
+ int (*file_fcntl)(struct file *, unsigned int, long unsigned int);
+ void (*file_set_fowner)(struct file *);
+ int (*file_send_sigiotask)(struct task_struct *, struct fown_struct *, int);
+ int (*file_receive)(struct file *);
+ int (*file_open)(struct file *);
+ int (*task_alloc)(struct task_struct *, long unsigned int);
+ void (*task_free)(struct task_struct *);
+ int (*cred_alloc_blank)(struct cred *, gfp_t);
+ void (*cred_free)(struct cred *);
+ int (*cred_prepare)(struct cred *, const struct cred *, gfp_t);
+ void (*cred_transfer)(struct cred *, const struct cred *);
+ void (*cred_getsecid)(const struct cred *, u32 *);
+ int (*kernel_act_as)(struct cred *, u32);
+ int (*kernel_create_files_as)(struct cred *, struct inode *);
+ int (*kernel_module_request)(char *);
+ int (*kernel_load_data)(enum kernel_load_data_id, bool);
+ int (*kernel_post_load_data)(char *, loff_t, enum kernel_load_data_id, char *);
+ int (*kernel_read_file)(struct file *, enum kernel_read_file_id, bool);
+ int (*kernel_post_read_file)(struct file *, char *, loff_t, enum kernel_read_file_id);
+ int (*task_fix_setuid)(struct cred *, const struct cred *, int);
+ int (*task_fix_setgid)(struct cred *, const struct cred *, int);
+ int (*task_fix_setgroups)(struct cred *, const struct cred *);
+ int (*task_setpgid)(struct task_struct *, pid_t);
+ int (*task_getpgid)(struct task_struct *);
+ int (*task_getsid)(struct task_struct *);
+ void (*current_getsecid_subj)(u32 *);
+ void (*task_getsecid_obj)(struct task_struct *, u32 *);
+ int (*task_setnice)(struct task_struct *, int);
+ int (*task_setioprio)(struct task_struct *, int);
+ int (*task_getioprio)(struct task_struct *);
+ int (*task_prlimit)(const struct cred *, const struct cred *, unsigned int);
+ int (*task_setrlimit)(struct task_struct *, unsigned int, struct rlimit *);
+ int (*task_setscheduler)(struct task_struct *);
+ int (*task_getscheduler)(struct task_struct *);
+ int (*task_movememory)(struct task_struct *);
+ int (*task_kill)(struct task_struct *, struct kernel_siginfo *, int, const struct cred *);
+ int (*task_prctl)(int, long unsigned int, long unsigned int, long unsigned int, long unsigned int);
+ void (*task_to_inode)(struct task_struct *, struct inode *);
+ int (*userns_create)(const struct cred *);
+ int (*ipc_permission)(struct kern_ipc_perm *, short int);
+ void (*ipc_getsecid)(struct kern_ipc_perm *, u32 *);
+ int (*msg_msg_alloc_security)(struct msg_msg *);
+ void (*msg_msg_free_security)(struct msg_msg *);
+ int (*msg_queue_alloc_security)(struct kern_ipc_perm *);
+ void (*msg_queue_free_security)(struct kern_ipc_perm *);
+ int (*msg_queue_associate)(struct kern_ipc_perm *, int);
+ int (*msg_queue_msgctl)(struct kern_ipc_perm *, int);
+ int (*msg_queue_msgsnd)(struct kern_ipc_perm *, struct msg_msg *, int);
+ int (*msg_queue_msgrcv)(struct kern_ipc_perm *, struct msg_msg *, struct task_struct *, long int, int);
+ int (*shm_alloc_security)(struct kern_ipc_perm *);
+ void (*shm_free_security)(struct kern_ipc_perm *);
+ int (*shm_associate)(struct kern_ipc_perm *, int);
+ int (*shm_shmctl)(struct kern_ipc_perm *, int);
+ int (*shm_shmat)(struct kern_ipc_perm *, char *, int);
+ int (*sem_alloc_security)(struct kern_ipc_perm *);
+ void (*sem_free_security)(struct kern_ipc_perm *);
+ int (*sem_associate)(struct kern_ipc_perm *, int);
+ int (*sem_semctl)(struct kern_ipc_perm *, int);
+ int (*sem_semop)(struct kern_ipc_perm *, struct sembuf *, unsigned int, int);
+ int (*netlink_send)(struct sock *, struct sk_buff *);
+ void (*d_instantiate)(struct dentry *, struct inode *);
+ int (*getprocattr)(struct task_struct *, const char *, char **);
+ int (*setprocattr)(const char *, void *, size_t);
+ int (*ismaclabel)(const char *);
+ int (*secid_to_secctx)(u32, char **, u32 *);
+ int (*secctx_to_secid)(const char *, u32, u32 *);
+ void (*release_secctx)(char *, u32);
+ void (*inode_invalidate_secctx)(struct inode *);
+ int (*inode_notifysecctx)(struct inode *, void *, u32);
+ int (*inode_setsecctx)(struct dentry *, void *, u32);
+ int (*inode_getsecctx)(struct inode *, void **, u32 *);
+ int (*unix_stream_connect)(struct sock *, struct sock *, struct sock *);
+ int (*unix_may_send)(struct socket *, struct socket *);
+ int (*socket_create)(int, int, int, int);
+ int (*socket_post_create)(struct socket *, int, int, int, int);
+ int (*socket_socketpair)(struct socket *, struct socket *);
+ int (*socket_bind)(struct socket *, struct sockaddr *, int);
+ int (*socket_connect)(struct socket *, struct sockaddr *, int);
+ int (*socket_listen)(struct socket *, int);
+ int (*socket_accept)(struct socket *, struct socket *);
+ int (*socket_sendmsg)(struct socket *, struct msghdr *, int);
+ int (*socket_recvmsg)(struct socket *, struct msghdr *, int, int);
+ int (*socket_getsockname)(struct socket *);
+ int (*socket_getpeername)(struct socket *);
+ int (*socket_getsockopt)(struct socket *, int, int);
+ int (*socket_setsockopt)(struct socket *, int, int);
+ int (*socket_shutdown)(struct socket *, int);
+ int (*socket_sock_rcv_skb)(struct sock *, struct sk_buff *);
+ int (*socket_getpeersec_stream)(struct socket *, char *, int *, unsigned int);
+ int (*socket_getpeersec_dgram)(struct socket *, struct sk_buff *, u32 *);
+ int (*sk_alloc_security)(struct sock *, int, gfp_t);
+ void (*sk_free_security)(struct sock *);
+ void (*sk_clone_security)(const struct sock *, struct sock *);
+ void (*sk_getsecid)(struct sock *, u32 *);
+ void (*sock_graft)(struct sock *, struct socket *);
+ int (*inet_conn_request)(const struct sock *, struct sk_buff *, struct request_sock *);
+ void (*inet_csk_clone)(struct sock *, const struct request_sock *);
+ void (*inet_conn_established)(struct sock *, struct sk_buff *);
+ int (*secmark_relabel_packet)(u32);
+ void (*secmark_refcount_inc)();
+ void (*secmark_refcount_dec)();
+ void (*req_classify_flow)(const struct request_sock *, struct flowi_common *);
+ int (*tun_dev_alloc_security)(void **);
+ void (*tun_dev_free_security)(void *);
+ int (*tun_dev_create)();
+ int (*tun_dev_attach_queue)(void *);
+ int (*tun_dev_attach)(struct sock *, void *);
+ int (*tun_dev_open)(void *);
+ int (*sctp_assoc_request)(struct sctp_association *, struct sk_buff *);
+ int (*sctp_bind_connect)(struct sock *, int, struct sockaddr *, int);
+ void (*sctp_sk_clone)(struct sctp_association *, struct sock *, struct sock *);
+ int (*sctp_assoc_established)(struct sctp_association *, struct sk_buff *);
+ int (*key_alloc)(struct key *, const struct cred *, long unsigned int);
+ void (*key_free)(struct key *);
+ int (*key_permission)(key_ref_t, const struct cred *, enum key_need_perm);
+ int (*key_getsecurity)(struct key *, char **);
+ int (*audit_rule_init)(u32, u32, char *, void **);
+ int (*audit_rule_known)(struct audit_krule *);
+ int (*audit_rule_match)(u32, u32, u32, void *);
+ void (*audit_rule_free)(void *);
+ int (*bpf)(int, union bpf_attr *, unsigned int);
+ int (*bpf_map)(struct bpf_map *, fmode_t);
+ int (*bpf_prog)(struct bpf_prog *);
+ int (*bpf_map_alloc_security)(struct bpf_map *);
+ void (*bpf_map_free_security)(struct bpf_map *);
+ int (*bpf_prog_alloc_security)(struct bpf_prog_aux *);
+ void (*bpf_prog_free_security)(struct bpf_prog_aux *);
+ int (*locked_down)(enum lockdown_reason);
+ int (*perf_event_open)(struct perf_event_attr *, int);
+ int (*perf_event_alloc)(struct perf_event *);
+ void (*perf_event_free)(struct perf_event *);
+ int (*perf_event_read)(struct perf_event *);
+ int (*perf_event_write)(struct perf_event *);
+ int (*uring_override_creds)(const struct cred *);
+ int (*uring_sqpoll)();
+ int (*uring_cmd)(struct io_uring_cmd *);
+};
+
+struct security_hook_heads {
+ struct hlist_head binder_set_context_mgr;
+ struct hlist_head binder_transaction;
+ struct hlist_head binder_transfer_binder;
+ struct hlist_head binder_transfer_file;
+ struct hlist_head ptrace_access_check;
+ struct hlist_head ptrace_traceme;
+ struct hlist_head capget;
+ struct hlist_head capset;
+ struct hlist_head capable;
+ struct hlist_head quotactl;
+ struct hlist_head quota_on;
+ struct hlist_head syslog;
+ struct hlist_head settime;
+ struct hlist_head vm_enough_memory;
+ struct hlist_head bprm_creds_for_exec;
+ struct hlist_head bprm_creds_from_file;
+ struct hlist_head bprm_check_security;
+ struct hlist_head bprm_committing_creds;
+ struct hlist_head bprm_committed_creds;
+ struct hlist_head fs_context_dup;
+ struct hlist_head fs_context_parse_param;
+ struct hlist_head sb_alloc_security;
+ struct hlist_head sb_delete;
+ struct hlist_head sb_free_security;
+ struct hlist_head sb_free_mnt_opts;
+ struct hlist_head sb_eat_lsm_opts;
+ struct hlist_head sb_mnt_opts_compat;
+ struct hlist_head sb_remount;
+ struct hlist_head sb_kern_mount;
+ struct hlist_head sb_show_options;
+ struct hlist_head sb_statfs;
+ struct hlist_head sb_mount;
+ struct hlist_head sb_umount;
+ struct hlist_head sb_pivotroot;
+ struct hlist_head sb_set_mnt_opts;
+ struct hlist_head sb_clone_mnt_opts;
+ struct hlist_head move_mount;
+ struct hlist_head dentry_init_security;
+ struct hlist_head dentry_create_files_as;
+ struct hlist_head path_notify;
+ struct hlist_head inode_alloc_security;
+ struct hlist_head inode_free_security;
+ struct hlist_head inode_init_security;
+ struct hlist_head inode_init_security_anon;
+ struct hlist_head inode_create;
+ struct hlist_head inode_link;
+ struct hlist_head inode_unlink;
+ struct hlist_head inode_symlink;
+ struct hlist_head inode_mkdir;
+ struct hlist_head inode_rmdir;
+ struct hlist_head inode_mknod;
+ struct hlist_head inode_rename;
+ struct hlist_head inode_readlink;
+ struct hlist_head inode_follow_link;
+ struct hlist_head inode_permission;
+ struct hlist_head inode_setattr;
+ struct hlist_head inode_getattr;
+ struct hlist_head inode_setxattr;
+ struct hlist_head inode_post_setxattr;
+ struct hlist_head inode_getxattr;
+ struct hlist_head inode_listxattr;
+ struct hlist_head inode_removexattr;
+ struct hlist_head inode_need_killpriv;
+ struct hlist_head inode_killpriv;
+ struct hlist_head inode_getsecurity;
+ struct hlist_head inode_setsecurity;
+ struct hlist_head inode_listsecurity;
+ struct hlist_head inode_getsecid;
+ struct hlist_head inode_copy_up;
+ struct hlist_head inode_copy_up_xattr;
+ struct hlist_head kernfs_init_security;
+ struct hlist_head file_permission;
+ struct hlist_head file_alloc_security;
+ struct hlist_head file_free_security;
+ struct hlist_head file_ioctl;
+ struct hlist_head mmap_addr;
+ struct hlist_head mmap_file;
+ struct hlist_head file_mprotect;
+ struct hlist_head file_lock;
+ struct hlist_head file_fcntl;
+ struct hlist_head file_set_fowner;
+ struct hlist_head file_send_sigiotask;
+ struct hlist_head file_receive;
+ struct hlist_head file_open;
+ struct hlist_head task_alloc;
+ struct hlist_head task_free;
+ struct hlist_head cred_alloc_blank;
+ struct hlist_head cred_free;
+ struct hlist_head cred_prepare;
+ struct hlist_head cred_transfer;
+ struct hlist_head cred_getsecid;
+ struct hlist_head kernel_act_as;
+ struct hlist_head kernel_create_files_as;
+ struct hlist_head kernel_module_request;
+ struct hlist_head kernel_load_data;
+ struct hlist_head kernel_post_load_data;
+ struct hlist_head kernel_read_file;
+ struct hlist_head kernel_post_read_file;
+ struct hlist_head task_fix_setuid;
+ struct hlist_head task_fix_setgid;
+ struct hlist_head task_fix_setgroups;
+ struct hlist_head task_setpgid;
+ struct hlist_head task_getpgid;
+ struct hlist_head task_getsid;
+ struct hlist_head current_getsecid_subj;
+ struct hlist_head task_getsecid_obj;
+ struct hlist_head task_setnice;
+ struct hlist_head task_setioprio;
+ struct hlist_head task_getioprio;
+ struct hlist_head task_prlimit;
+ struct hlist_head task_setrlimit;
+ struct hlist_head task_setscheduler;
+ struct hlist_head task_getscheduler;
+ struct hlist_head task_movememory;
+ struct hlist_head task_kill;
+ struct hlist_head task_prctl;
+ struct hlist_head task_to_inode;
+ struct hlist_head userns_create;
+ struct hlist_head ipc_permission;
+ struct hlist_head ipc_getsecid;
+ struct hlist_head msg_msg_alloc_security;
+ struct hlist_head msg_msg_free_security;
+ struct hlist_head msg_queue_alloc_security;
+ struct hlist_head msg_queue_free_security;
+ struct hlist_head msg_queue_associate;
+ struct hlist_head msg_queue_msgctl;
+ struct hlist_head msg_queue_msgsnd;
+ struct hlist_head msg_queue_msgrcv;
+ struct hlist_head shm_alloc_security;
+ struct hlist_head shm_free_security;
+ struct hlist_head shm_associate;
+ struct hlist_head shm_shmctl;
+ struct hlist_head shm_shmat;
+ struct hlist_head sem_alloc_security;
+ struct hlist_head sem_free_security;
+ struct hlist_head sem_associate;
+ struct hlist_head sem_semctl;
+ struct hlist_head sem_semop;
+ struct hlist_head netlink_send;
+ struct hlist_head d_instantiate;
+ struct hlist_head getprocattr;
+ struct hlist_head setprocattr;
+ struct hlist_head ismaclabel;
+ struct hlist_head secid_to_secctx;
+ struct hlist_head secctx_to_secid;
+ struct hlist_head release_secctx;
+ struct hlist_head inode_invalidate_secctx;
+ struct hlist_head inode_notifysecctx;
+ struct hlist_head inode_setsecctx;
+ struct hlist_head inode_getsecctx;
+ struct hlist_head unix_stream_connect;
+ struct hlist_head unix_may_send;
+ struct hlist_head socket_create;
+ struct hlist_head socket_post_create;
+ struct hlist_head socket_socketpair;
+ struct hlist_head socket_bind;
+ struct hlist_head socket_connect;
+ struct hlist_head socket_listen;
+ struct hlist_head socket_accept;
+ struct hlist_head socket_sendmsg;
+ struct hlist_head socket_recvmsg;
+ struct hlist_head socket_getsockname;
+ struct hlist_head socket_getpeername;
+ struct hlist_head socket_getsockopt;
+ struct hlist_head socket_setsockopt;
+ struct hlist_head socket_shutdown;
+ struct hlist_head socket_sock_rcv_skb;
+ struct hlist_head socket_getpeersec_stream;
+ struct hlist_head socket_getpeersec_dgram;
+ struct hlist_head sk_alloc_security;
+ struct hlist_head sk_free_security;
+ struct hlist_head sk_clone_security;
+ struct hlist_head sk_getsecid;
+ struct hlist_head sock_graft;
+ struct hlist_head inet_conn_request;
+ struct hlist_head inet_csk_clone;
+ struct hlist_head inet_conn_established;
+ struct hlist_head secmark_relabel_packet;
+ struct hlist_head secmark_refcount_inc;
+ struct hlist_head secmark_refcount_dec;
+ struct hlist_head req_classify_flow;
+ struct hlist_head tun_dev_alloc_security;
+ struct hlist_head tun_dev_free_security;
+ struct hlist_head tun_dev_create;
+ struct hlist_head tun_dev_attach_queue;
+ struct hlist_head tun_dev_attach;
+ struct hlist_head tun_dev_open;
+ struct hlist_head sctp_assoc_request;
+ struct hlist_head sctp_bind_connect;
+ struct hlist_head sctp_sk_clone;
+ struct hlist_head sctp_assoc_established;
+ struct hlist_head key_alloc;
+ struct hlist_head key_free;
+ struct hlist_head key_permission;
+ struct hlist_head key_getsecurity;
+ struct hlist_head audit_rule_init;
+ struct hlist_head audit_rule_known;
+ struct hlist_head audit_rule_match;
+ struct hlist_head audit_rule_free;
+ struct hlist_head bpf;
+ struct hlist_head bpf_map;
+ struct hlist_head bpf_prog;
+ struct hlist_head bpf_map_alloc_security;
+ struct hlist_head bpf_map_free_security;
+ struct hlist_head bpf_prog_alloc_security;
+ struct hlist_head bpf_prog_free_security;
+ struct hlist_head locked_down;
+ struct hlist_head perf_event_open;
+ struct hlist_head perf_event_alloc;
+ struct hlist_head perf_event_free;
+ struct hlist_head perf_event_read;
+ struct hlist_head perf_event_write;
+ struct hlist_head uring_override_creds;
+ struct hlist_head uring_sqpoll;
+ struct hlist_head uring_cmd;
+};
+
+struct security_hook_list {
+ struct hlist_node list;
+ struct hlist_head *head;
+ union security_list_options hook;
+ const char *lsm;
+};
+
+enum lsm_order {
+ LSM_ORDER_FIRST = -1,
+ LSM_ORDER_MUTABLE = 0,
+};
+
+struct lsm_info {
+ const char *name;
+ enum lsm_order order;
+ long unsigned int flags;
+ int *enabled;
+ int (*init)();
+ struct lsm_blob_sizes *blobs;
+};
+
+enum blkg_rwstat_type {
+ BLKG_RWSTAT_READ = 0,
+ BLKG_RWSTAT_WRITE = 1,
+ BLKG_RWSTAT_SYNC = 2,
+ BLKG_RWSTAT_ASYNC = 3,
+ BLKG_RWSTAT_DISCARD = 4,
+ BLKG_RWSTAT_NR = 5,
+ BLKG_RWSTAT_TOTAL = 5,
+};
+
+struct blkg_rwstat {
+ struct percpu_counter cpu_cnt[5];
+ atomic64_t aux_cnt[5];
+};
+
+struct blkg_rwstat_sample {
+ u64 cnt[5];
+};
+
+enum string_size_units {
+ STRING_UNITS_10 = 0,
+ STRING_UNITS_2 = 1,
+};
+
+struct strarray {
+ char **array;
+ size_t n;
+};
+
+struct pcie_pme_service_data {
+ spinlock_t lock;
+ struct pcie_device *srv;
+ struct work_struct work;
+ bool noirq;
+};
+
+struct netdev_lag_lower_state_info {
+ u8 link_up: 1;
+ u8 tx_enabled: 1;
+};
+
+struct failover_ops {
+ int (*slave_pre_register)(struct net_device *, struct net_device *);
+ int (*slave_register)(struct net_device *, struct net_device *);
+ int (*slave_pre_unregister)(struct net_device *, struct net_device *);
+ int (*slave_unregister)(struct net_device *, struct net_device *);
+ int (*slave_link_change)(struct net_device *, struct net_device *);
+ int (*slave_name_change)(struct net_device *, struct net_device *);
+ rx_handler_result_t (*slave_handle_frame)(struct sk_buff **);
+};
+
+struct failover {
+ struct list_head list;
+ struct net_device *failover_dev;
+ netdevice_tracker dev_tracker;
+ struct failover_ops *ops;
+};
+
+struct net_failover_info {
+ struct net_device *primary_dev;
+ struct net_device *standby_dev;
+ struct rtnl_link_stats64 primary_stats;
+ struct rtnl_link_stats64 standby_stats;
+ struct rtnl_link_stats64 failover_stats;
+ spinlock_t stats_lock;
+};
+
+enum hid_class_request {
+ HID_REQ_GET_REPORT = 1,
+ HID_REQ_GET_IDLE = 2,
+ HID_REQ_GET_PROTOCOL = 3,
+ HID_REQ_SET_REPORT = 9,
+ HID_REQ_SET_IDLE = 10,
+ HID_REQ_SET_PROTOCOL = 11,
+};
+
+struct hid_item {
+ unsigned int format;
+ __u8 size;
+ __u8 type;
+ __u8 tag;
+ union {
+ __u8 u8;
+ __s8 s8;
+ __u16 u16;
+ __s16 s16;
+ __u32 u32;
+ __s32 s32;
+ __u8 *longdata;
+ } data;
+};
+
+struct hid_global {
+ unsigned int usage_page;
+ __s32 logical_minimum;
+ __s32 logical_maximum;
+ __s32 physical_minimum;
+ __s32 physical_maximum;
+ __s32 unit_exponent;
+ unsigned int unit;
+ unsigned int report_id;
+ unsigned int report_size;
+ unsigned int report_count;
+};
+
+struct hid_local {
+ unsigned int usage[12288];
+ u8 usage_size[12288];
+ unsigned int collection_index[12288];
+ unsigned int usage_index;
+ unsigned int usage_minimum;
+ unsigned int delimiter_depth;
+ unsigned int delimiter_branch;
+};
+
+struct hid_parser {
+ struct hid_global global;
+ struct hid_global global_stack[4];
+ unsigned int global_stack_ptr;
+ struct hid_local local;
+ unsigned int *collection_stack;
+ unsigned int collection_stack_ptr;
+ unsigned int collection_stack_size;
+ struct hid_device *device;
+ unsigned int scan_flags;
+};
+
+struct hiddev {
+ int minor;
+ int exist;
+ int open;
+ struct mutex existancelock;
+ wait_queue_head_t wait;
+ struct hid_device *hid;
+ struct list_head list;
+ spinlock_t list_lock;
+ bool initialized;
+};
+
+struct hidraw {
+ unsigned int minor;
+ int exist;
+ int open;
+ wait_queue_head_t wait;
+ struct hid_device *hid;
+ struct device *dev;
+ spinlock_t list_lock;
+ struct list_head list;
+};
+
+struct hid_dynid {
+ struct list_head list;
+ struct hid_device_id id;
+};
+
+struct tc_skb_ext {
+ __u32 chain;
+ __u16 mru;
+ __u16 zone;
+ u8 post_ct: 1;
+ u8 post_ct_snat: 1;
+ u8 post_ct_dnat: 1;
+};
+
+struct nla_bitfield32 {
+ __u32 value;
+ __u32 selector;
+};
+
+enum {
+ TCA_ACT_UNSPEC = 0,
+ TCA_ACT_KIND = 1,
+ TCA_ACT_OPTIONS = 2,
+ TCA_ACT_INDEX = 3,
+ TCA_ACT_STATS = 4,
+ TCA_ACT_PAD = 5,
+ TCA_ACT_COOKIE = 6,
+ TCA_ACT_FLAGS = 7,
+ TCA_ACT_HW_STATS = 8,
+ TCA_ACT_USED_HW_STATS = 9,
+ TCA_ACT_IN_HW_COUNT = 10,
+ __TCA_ACT_MAX = 11,
+};
+
+enum flow_action_id {
+ FLOW_ACTION_ACCEPT = 0,
+ FLOW_ACTION_DROP = 1,
+ FLOW_ACTION_TRAP = 2,
+ FLOW_ACTION_GOTO = 3,
+ FLOW_ACTION_REDIRECT = 4,
+ FLOW_ACTION_MIRRED = 5,
+ FLOW_ACTION_REDIRECT_INGRESS = 6,
+ FLOW_ACTION_MIRRED_INGRESS = 7,
+ FLOW_ACTION_VLAN_PUSH = 8,
+ FLOW_ACTION_VLAN_POP = 9,
+ FLOW_ACTION_VLAN_MANGLE = 10,
+ FLOW_ACTION_TUNNEL_ENCAP = 11,
+ FLOW_ACTION_TUNNEL_DECAP = 12,
+ FLOW_ACTION_MANGLE = 13,
+ FLOW_ACTION_ADD = 14,
+ FLOW_ACTION_CSUM = 15,
+ FLOW_ACTION_MARK = 16,
+ FLOW_ACTION_PTYPE = 17,
+ FLOW_ACTION_PRIORITY = 18,
+ FLOW_ACTION_RX_QUEUE_MAPPING = 19,
+ FLOW_ACTION_WAKE = 20,
+ FLOW_ACTION_QUEUE = 21,
+ FLOW_ACTION_SAMPLE = 22,
+ FLOW_ACTION_POLICE = 23,
+ FLOW_ACTION_CT = 24,
+ FLOW_ACTION_CT_METADATA = 25,
+ FLOW_ACTION_MPLS_PUSH = 26,
+ FLOW_ACTION_MPLS_POP = 27,
+ FLOW_ACTION_MPLS_MANGLE = 28,
+ FLOW_ACTION_GATE = 29,
+ FLOW_ACTION_PPPOE_PUSH = 30,
+ FLOW_ACTION_JUMP = 31,
+ FLOW_ACTION_PIPE = 32,
+ FLOW_ACTION_VLAN_PUSH_ETH = 33,
+ FLOW_ACTION_VLAN_POP_ETH = 34,
+ FLOW_ACTION_CONTINUE = 35,
+ NUM_FLOW_ACTIONS = 36,
+};
+
+enum flow_action_mangle_base {
+ FLOW_ACT_MANGLE_UNSPEC = 0,
+ FLOW_ACT_MANGLE_HDR_TYPE_ETH = 1,
+ FLOW_ACT_MANGLE_HDR_TYPE_IP4 = 2,
+ FLOW_ACT_MANGLE_HDR_TYPE_IP6 = 3,
+ FLOW_ACT_MANGLE_HDR_TYPE_TCP = 4,
+ FLOW_ACT_MANGLE_HDR_TYPE_UDP = 5,
+};
+
+enum flow_action_hw_stats {
+ FLOW_ACTION_HW_STATS_IMMEDIATE = 1,
+ FLOW_ACTION_HW_STATS_DELAYED = 2,
+ FLOW_ACTION_HW_STATS_ANY = 3,
+ FLOW_ACTION_HW_STATS_DISABLED = 4,
+ FLOW_ACTION_HW_STATS_DONT_CARE = 7,
+};
+
+typedef void (*action_destr)(void *);
+
+struct psample_group {
+ struct list_head list;
+ struct net *net;
+ u32 group_num;
+ u32 refcount;
+ u32 seq;
+ struct callback_head rcu;
+};
+
+struct nf_flowtable;
+
+struct action_gate_entry {
+ u8 gate_state;
+ u32 interval;
+ s32 ipv;
+ s32 maxoctets;
+};
+
+struct flow_action_entry {
+ enum flow_action_id id;
+ u32 hw_index;
+ enum flow_action_hw_stats hw_stats;
+ action_destr destructor;
+ void *destructor_priv;
+ union {
+ u32 chain_index;
+ struct net_device *dev;
+ struct {
+ u16 vid;
+ __be16 proto;
+ u8 prio;
+ } vlan;
+ struct {
+ unsigned char dst[6];
+ unsigned char src[6];
+ } vlan_push_eth;
+ struct {
+ enum flow_action_mangle_base htype;
+ u32 offset;
+ u32 mask;
+ u32 val;
+ } mangle;
+ struct ip_tunnel_info *tunnel;
+ u32 csum_flags;
+ u32 mark;
+ u16 ptype;
+ u16 rx_queue;
+ u32 priority;
+ struct {
+ u32 ctx;
+ u32 index;
+ u8 vf;
+ } queue;
+ struct {
+ struct psample_group *psample_group;
+ u32 rate;
+ u32 trunc_size;
+ bool truncate;
+ } sample;
+ struct {
+ u32 burst;
+ u64 rate_bytes_ps;
+ u64 peakrate_bytes_ps;
+ u32 avrate;
+ u16 overhead;
+ u64 burst_pkt;
+ u64 rate_pkt_ps;
+ u32 mtu;
+ struct {
+ enum flow_action_id act_id;
+ u32 extval;
+ } exceed;
+ struct {
+ enum flow_action_id act_id;
+ u32 extval;
+ } notexceed;
+ } police;
+ struct {
+ int action;
+ u16 zone;
+ struct nf_flowtable *flow_table;
+ } ct;
+ struct {
+ long unsigned int cookie;
+ u32 mark;
+ u32 labels[4];
+ bool orig_dir;
+ } ct_metadata;
+ struct {
+ u32 label;
+ __be16 proto;
+ u8 tc;
+ u8 bos;
+ u8 ttl;
+ } mpls_push;
+ struct {
+ __be16 proto;
+ } mpls_pop;
+ struct {
+ u32 label;
+ u8 tc;
+ u8 bos;
+ u8 ttl;
+ } mpls_mangle;
+ struct {
+ s32 prio;
+ u64 basetime;
+ u64 cycletime;
+ u64 cycletimeext;
+ u32 num_entries;
+ struct action_gate_entry *entries;
+ } gate;
+ struct {
+ u16 sid;
+ } pppoe;
+ };
+ struct flow_action_cookie *cookie;
+};
+
+struct flow_action {
+ unsigned int num_entries;
+ struct flow_action_entry entries[0];
+};
+
+struct flow_block_cb;
+
+struct flow_block_indr {
+ struct list_head list;
+ struct net_device *dev;
+ struct Qdisc *sch;
+ enum flow_block_binder_type binder_type;
+ void *data;
+ void *cb_priv;
+ void (*cleanup)(struct flow_block_cb *);
+};
+
+struct flow_block_cb {
+ struct list_head driver_list;
+ struct list_head list;
+ flow_setup_cb_t *cb;
+ void *cb_ident;
+ void *cb_priv;
+ void (*release)(void *);
+ struct flow_block_indr indr;
+ unsigned int refcnt;
+};
+
+enum qdisc_class_ops_flags {
+ QDISC_CLASS_OPS_DOIT_UNLOCKED = 1,
+};
+
+enum tcf_proto_ops_flags {
+ TCF_PROTO_OPS_DOIT_UNLOCKED = 1,
+};
+
+typedef void tcf_chain_head_change_t(struct tcf_proto *, void *);
+
+enum net_xmit_qdisc_t {
+ __NET_XMIT_STOLEN = 65536,
+ __NET_XMIT_BYPASS = 131072,
+};
+
+struct tc_skb_cb {
+ struct qdisc_skb_cb qdisc_cb;
+ u16 mru;
+ u8 post_ct: 1;
+ u8 post_ct_snat: 1;
+ u8 post_ct_dnat: 1;
+ u16 zone;
+};
+
+struct tcf_block_ext_info {
+ enum flow_block_binder_type binder_type;
+ tcf_chain_head_change_t *chain_head_change;
+ void *chain_head_change_priv;
+ u32 block_index;
+};
+
+struct tcf_qevent {
+ struct tcf_block *block;
+ struct tcf_block_ext_info info;
+ struct tcf_proto *filter_chain;
+};
+
+enum pedit_header_type {
+ TCA_PEDIT_KEY_EX_HDR_TYPE_NETWORK = 0,
+ TCA_PEDIT_KEY_EX_HDR_TYPE_ETH = 1,
+ TCA_PEDIT_KEY_EX_HDR_TYPE_IP4 = 2,
+ TCA_PEDIT_KEY_EX_HDR_TYPE_IP6 = 3,
+ TCA_PEDIT_KEY_EX_HDR_TYPE_TCP = 4,
+ TCA_PEDIT_KEY_EX_HDR_TYPE_UDP = 5,
+ __PEDIT_HDR_TYPE_MAX = 6,
+};
+
+enum pedit_cmd {
+ TCA_PEDIT_KEY_EX_CMD_SET = 0,
+ TCA_PEDIT_KEY_EX_CMD_ADD = 1,
+ __PEDIT_CMD_MAX = 2,
+};
+
+struct tc_pedit_key {
+ __u32 mask;
+ __u32 val;
+ __u32 off;
+ __u32 at;
+ __u32 offmask;
+ __u32 shift;
+};
+
+struct tcf_pedit_key_ex {
+ enum pedit_header_type htype;
+ enum pedit_cmd cmd;
+};
+
+struct tcf_pedit {
+ struct tc_action common;
+ unsigned char tcfp_nkeys;
+ unsigned char tcfp_flags;
+ u32 tcfp_off_max_hint;
+ struct tc_pedit_key *tcfp_keys;
+ struct tcf_pedit_key_ex *tcfp_keys_ex;
+ long: 64;
+};
+
+struct tcf_filter_chain_list_item {
+ struct list_head list;
+ tcf_chain_head_change_t *chain_head_change;
+ void *chain_head_change_priv;
+};
+
+struct tcf_net {
+ spinlock_t idr_lock;
+ struct idr idr;
+};
+
+struct tcf_block_owner_item {
+ struct list_head list;
+ struct Qdisc *q;
+ enum flow_block_binder_type binder_type;
+};
+
+struct tcf_chain_info {
+ struct tcf_proto **pprev;
+ struct tcf_proto *next;
+};
+
+struct tcf_dump_args {
+ struct tcf_walker w;
+ struct sk_buff *skb;
+ struct netlink_callback *cb;
+ struct tcf_block *block;
+ struct Qdisc *q;
+ u32 parent;
+ bool terse_dump;
+};
+
+enum {
+ SKB_FCLONE_UNAVAILABLE = 0,
+ SKB_FCLONE_ORIG = 1,
+ SKB_FCLONE_CLONE = 2,
+};
+
+struct sk_buff_fclones {
+ struct sk_buff skb1;
+ struct sk_buff skb2;
+ refcount_t fclone_ref;
+};
+
+enum sk_pacing {
+ SK_PACING_NONE = 0,
+ SK_PACING_NEEDED = 1,
+ SK_PACING_FQ = 2,
+};
+
+enum {
+ TCP_NO_QUEUE = 0,
+ TCP_RECV_QUEUE = 1,
+ TCP_SEND_QUEUE = 2,
+ TCP_QUEUES_NR = 3,
+};
+
+enum tcp_ca_state {
+ TCP_CA_Open = 0,
+ TCP_CA_Disorder = 1,
+ TCP_CA_CWR = 2,
+ TCP_CA_Recovery = 3,
+ TCP_CA_Loss = 4,
+};
+
+enum tsq_flags {
+ TSQF_THROTTLED = 1,
+ TSQF_QUEUED = 2,
+ TCPF_TSQ_DEFERRED = 4,
+ TCPF_WRITE_TIMER_DEFERRED = 8,
+ TCPF_DELACK_TIMER_DEFERRED = 16,
+ TCPF_MTU_REDUCED_DEFERRED = 32,
+};
+
+enum {
+ BPF_SOCK_OPS_RTO_CB_FLAG = 1,
+ BPF_SOCK_OPS_RETRANS_CB_FLAG = 2,
+ BPF_SOCK_OPS_STATE_CB_FLAG = 4,
+ BPF_SOCK_OPS_RTT_CB_FLAG = 8,
+ BPF_SOCK_OPS_PARSE_ALL_HDR_OPT_CB_FLAG = 16,
+ BPF_SOCK_OPS_PARSE_UNKNOWN_HDR_OPT_CB_FLAG = 32,
+ BPF_SOCK_OPS_WRITE_HDR_OPT_CB_FLAG = 64,
+ BPF_SOCK_OPS_ALL_CB_FLAGS = 127,
+};
+
+enum {
+ BPF_WRITE_HDR_TCP_CURRENT_MSS = 1,
+ BPF_WRITE_HDR_TCP_SYNACK_COOKIE = 2,
+};
+
+struct mptcp_ext {
+ union {
+ u64 data_ack;
+ u32 data_ack32;
+ };
+ u64 data_seq;
+ u32 subflow_seq;
+ u16 data_len;
+ __sum16 csum;
+ u8 use_map: 1;
+ u8 dsn64: 1;
+ u8 data_fin: 1;
+ u8 use_ack: 1;
+ u8 ack64: 1;
+ u8 mpc_map: 1;
+ u8 frozen: 1;
+ u8 reset_transient: 1;
+ u8 reset_reason: 4;
+ u8 csum_reqd: 1;
+ u8 infinite_map: 1;
+};
+
+struct mptcp_out_options {
+ u16 suboptions;
+ struct mptcp_rm_list rm_list;
+ u8 join_id;
+ u8 backup;
+ u8 reset_reason: 4;
+ u8 reset_transient: 1;
+ u8 csum_reqd: 1;
+ u8 allow_join_id0: 1;
+ union {
+ struct {
+ u64 sndr_key;
+ u64 rcvr_key;
+ u64 data_seq;
+ u32 subflow_seq;
+ u16 data_len;
+ __sum16 csum;
+ };
+ struct {
+ struct mptcp_addr_info addr;
+ u64 ahmac;
+ };
+ struct {
+ struct mptcp_ext ext_copy;
+ u64 fail_seq;
+ };
+ struct {
+ u32 nonce;
+ u32 token;
+ u64 thmac;
+ u8 hmac[20];
+ };
+ };
+};
+
+enum tcp_queue {
+ TCP_FRAG_IN_WRITE_QUEUE = 0,
+ TCP_FRAG_IN_RTX_QUEUE = 1,
+};
+
+enum tcp_chrono {
+ TCP_CHRONO_UNSPEC = 0,
+ TCP_CHRONO_BUSY = 1,
+ TCP_CHRONO_RWND_LIMITED = 2,
+ TCP_CHRONO_SNDBUF_LIMITED = 3,
+ __TCP_CHRONO_MAX = 4,
+};
+
+struct tcp_out_options {
+ u16 options;
+ u16 mss;
+ u8 ws;
+ u8 num_sack_blocks;
+ u8 hash_size;
+ u8 bpf_opt_len;
+ __u8 *hash_location;
+ __u32 tsval;
+ __u32 tsecr;
+ struct tcp_fastopen_cookie *fastopen_cookie;
+ struct mptcp_out_options mptcp;
+};
+
+struct tsq_tasklet {
+ struct tasklet_struct tasklet;
+ struct list_head head;
+};
+
+struct vdso_exception_table_entry {
+ int insn;
+ int fixup;
+};
+
+struct rcu_synchronize {
+ struct callback_head head;
+ struct completion completion;
+};
+
+struct rcu_cblist {
+ struct callback_head *head;
+ struct callback_head **tail;
+ long int len;
+};
+
+enum rcutorture_type {
+ RCU_FLAVOR = 0,
+ RCU_TASKS_FLAVOR = 1,
+ RCU_TASKS_RUDE_FLAVOR = 2,
+ RCU_TASKS_TRACING_FLAVOR = 3,
+ RCU_TRIVIAL_FLAVOR = 4,
+ SRCU_FLAVOR = 5,
+ INVALID_RCU_FLAVOR = 6,
+};
+
+enum clocksource_ids {
+ CSID_GENERIC = 0,
+ CSID_ARM_ARCH_COUNTER = 1,
+ CSID_MAX = 2,
+};
+
+struct clocksource {
+ u64 (*read)(struct clocksource *);
+ u64 mask;
+ u32 mult;
+ u32 shift;
+ u64 max_idle_ns;
+ u32 maxadj;
+ u32 uncertainty_margin;
+ u64 max_cycles;
+ const char *name;
+ struct list_head list;
+ int rating;
+ enum clocksource_ids id;
+ enum vdso_clock_mode vdso_clock_mode;
+ long unsigned int flags;
+ int (*enable)(struct clocksource *);
+ void (*disable)(struct clocksource *);
+ void (*suspend)(struct clocksource *);
+ void (*resume)(struct clocksource *);
+ void (*mark_unstable)(struct clocksource *);
+ void (*tick_stable)(struct clocksource *);
+ struct list_head wd_list;
+ u64 cs_last;
+ u64 wd_last;
+ struct module *owner;
+};
+
+enum wd_read_status {
+ WD_READ_SUCCESS = 0,
+ WD_READ_UNSTABLE = 1,
+ WD_READ_SKIP = 2,
+};
+
+enum uts_proc {
+ UTS_PROC_ARCH = 0,
+ UTS_PROC_OSTYPE = 1,
+ UTS_PROC_OSRELEASE = 2,
+ UTS_PROC_VERSION = 3,
+ UTS_PROC_HOSTNAME = 4,
+ UTS_PROC_DOMAINNAME = 5,
+};
+
+enum trace_iter_flags {
+ TRACE_FILE_LAT_FMT = 1,
+ TRACE_FILE_ANNOTATE = 2,
+ TRACE_FILE_TIME_IN_NS = 4,
+};
+
+enum trace_type {
+ __TRACE_FIRST_TYPE = 0,
+ TRACE_FN = 1,
+ TRACE_CTX = 2,
+ TRACE_WAKE = 3,
+ TRACE_STACK = 4,
+ TRACE_PRINT = 5,
+ TRACE_BPRINT = 6,
+ TRACE_MMIO_RW = 7,
+ TRACE_MMIO_MAP = 8,
+ TRACE_BRANCH = 9,
+ TRACE_GRAPH_RET = 10,
+ TRACE_GRAPH_ENT = 11,
+ TRACE_USER_STACK = 12,
+ TRACE_BLK = 13,
+ TRACE_BPUTS = 14,
+ TRACE_HWLAT = 15,
+ TRACE_OSNOISE = 16,
+ TRACE_TIMERLAT = 17,
+ TRACE_RAW_DATA = 18,
+ TRACE_FUNC_REPEATS = 19,
+ __TRACE_LAST_TYPE = 20,
+};
+
+struct ftrace_entry {
+ struct trace_entry ent;
+ long unsigned int ip;
+ long unsigned int parent_ip;
+};
+
+struct ctx_switch_entry {
+ struct trace_entry ent;
+ unsigned int prev_pid;
+ unsigned int next_pid;
+ unsigned int next_cpu;
+ unsigned char prev_prio;
+ unsigned char prev_state;
+ unsigned char next_prio;
+ unsigned char next_state;
+};
+
+struct stack_entry {
+ struct trace_entry ent;
+ int size;
+ long unsigned int caller[8];
+};
+
+struct userstack_entry {
+ struct trace_entry ent;
+ unsigned int tgid;
+ long unsigned int caller[8];
+};
+
+struct bprint_entry {
+ struct trace_entry ent;
+ long unsigned int ip;
+ const char *fmt;
+ u32 buf[0];
+};
+
+struct print_entry {
+ struct trace_entry ent;
+ long unsigned int ip;
+ char buf[0];
+};
+
+struct raw_data_entry {
+ struct trace_entry ent;
+ unsigned int id;
+ char buf[0];
+};
+
+struct bputs_entry {
+ struct trace_entry ent;
+ long unsigned int ip;
+ const char *str;
+};
+
+struct hwlat_entry {
+ struct trace_entry ent;
+ u64 duration;
+ u64 outer_duration;
+ u64 nmi_total_ts;
+ struct timespec64 timestamp;
+ unsigned int nmi_count;
+ unsigned int seqnum;
+ unsigned int count;
+};
+
+struct func_repeats_entry {
+ struct trace_entry ent;
+ long unsigned int ip;
+ long unsigned int parent_ip;
+ u16 count;
+ u16 top_delta_ts;
+ u32 bottom_delta_ts;
+};
+
+struct osnoise_entry {
+ struct trace_entry ent;
+ u64 noise;
+ u64 runtime;
+ u64 max_sample;
+ unsigned int hw_count;
+ unsigned int nmi_count;
+ unsigned int irq_count;
+ unsigned int softirq_count;
+ unsigned int thread_count;
+};
+
+struct timerlat_entry {
+ struct trace_entry ent;
+ unsigned int seqnum;
+ int context;
+ u64 timer_latency;
+};
+
+enum trace_iterator_flags {
+ TRACE_ITER_PRINT_PARENT = 1,
+ TRACE_ITER_SYM_OFFSET = 2,
+ TRACE_ITER_SYM_ADDR = 4,
+ TRACE_ITER_VERBOSE = 8,
+ TRACE_ITER_RAW = 16,
+ TRACE_ITER_HEX = 32,
+ TRACE_ITER_BIN = 64,
+ TRACE_ITER_BLOCK = 128,
+ TRACE_ITER_PRINTK = 256,
+ TRACE_ITER_ANNOTATE = 512,
+ TRACE_ITER_USERSTACKTRACE = 1024,
+ TRACE_ITER_SYM_USEROBJ = 2048,
+ TRACE_ITER_PRINTK_MSGONLY = 4096,
+ TRACE_ITER_CONTEXT_INFO = 8192,
+ TRACE_ITER_LATENCY_FMT = 16384,
+ TRACE_ITER_RECORD_CMD = 32768,
+ TRACE_ITER_RECORD_TGID = 65536,
+ TRACE_ITER_OVERWRITE = 131072,
+ TRACE_ITER_STOP_ON_FREE = 262144,
+ TRACE_ITER_IRQ_INFO = 524288,
+ TRACE_ITER_MARKERS = 1048576,
+ TRACE_ITER_EVENT_FORK = 2097152,
+ TRACE_ITER_PAUSE_ON_TRACE = 4194304,
+ TRACE_ITER_HASH_PTR = 8388608,
+ TRACE_ITER_FUNCTION = 16777216,
+ TRACE_ITER_FUNC_FORK = 33554432,
+ TRACE_ITER_DISPLAY_GRAPH = 67108864,
+ TRACE_ITER_STACKTRACE = 134217728,
+};
+
+struct trace_mark {
+ long long unsigned int val;
+ char sym;
+};
+
+typedef void (*swap_r_func_t)(void *, void *, int, const void *);
+
+typedef int (*cmp_r_func_t)(const void *, const void *, const void *);
+
+typedef long long unsigned int cycles_t;
+
+typedef u32 depot_stack_handle_t;
+
+struct kmem_cache_order_objects {
+ unsigned int x;
+};
+
+struct kmem_cache_cpu;
+
+struct kmem_cache_node;
+
+struct kmem_cache {
+ struct kmem_cache_cpu *cpu_slab;
+ slab_flags_t flags;
+ long unsigned int min_partial;
+ unsigned int size;
+ unsigned int object_size;
+ struct reciprocal_value reciprocal_size;
+ unsigned int offset;
+ unsigned int cpu_partial;
+ unsigned int cpu_partial_slabs;
+ struct kmem_cache_order_objects oo;
+ struct kmem_cache_order_objects min;
+ gfp_t allocflags;
+ int refcount;
+ void (*ctor)(void *);
+ unsigned int inuse;
+ unsigned int align;
+ unsigned int red_left_pad;
+ const char *name;
+ struct list_head list;
+ struct kobject kobj;
+ unsigned int remote_node_defrag_ratio;
+ unsigned int useroffset;
+ unsigned int usersize;
+ struct kmem_cache_node *node[64];
+};
+
+struct slab {
+ long unsigned int __page_flags;
+ union {
+ struct list_head slab_list;
+ struct callback_head callback_head;
+ struct {
+ struct slab *next;
+ int slabs;
+ };
+ };
+ struct kmem_cache *slab_cache;
+ void *freelist;
+ union {
+ long unsigned int counters;
+ struct {
+ unsigned int inuse: 16;
+ unsigned int objects: 15;
+ unsigned int frozen: 1;
+ };
+ };
+ unsigned int __unused;
+ atomic_t __page_refcount;
+ long unsigned int memcg_data;
+};
+
+enum stat_item {
+ ALLOC_FASTPATH = 0,
+ ALLOC_SLOWPATH = 1,
+ FREE_FASTPATH = 2,
+ FREE_SLOWPATH = 3,
+ FREE_FROZEN = 4,
+ FREE_ADD_PARTIAL = 5,
+ FREE_REMOVE_PARTIAL = 6,
+ ALLOC_FROM_PARTIAL = 7,
+ ALLOC_SLAB = 8,
+ ALLOC_REFILL = 9,
+ ALLOC_NODE_MISMATCH = 10,
+ FREE_SLAB = 11,
+ CPUSLAB_FLUSH = 12,
+ DEACTIVATE_FULL = 13,
+ DEACTIVATE_EMPTY = 14,
+ DEACTIVATE_TO_HEAD = 15,
+ DEACTIVATE_TO_TAIL = 16,
+ DEACTIVATE_REMOTE_FREES = 17,
+ DEACTIVATE_BYPASS = 18,
+ ORDER_FALLBACK = 19,
+ CMPXCHG_DOUBLE_CPU_FAIL = 20,
+ CMPXCHG_DOUBLE_FAIL = 21,
+ CPU_PARTIAL_ALLOC = 22,
+ CPU_PARTIAL_FREE = 23,
+ CPU_PARTIAL_NODE = 24,
+ CPU_PARTIAL_DRAIN = 25,
+ NR_SLUB_STAT_ITEMS = 26,
+};
+
+struct kmem_cache_cpu {
+ void **freelist;
+ long unsigned int tid;
+ struct slab *slab;
+ struct slab *partial;
+ local_lock_t lock;
+};
+
+struct kmem_cache_node {
+ spinlock_t list_lock;
+ long unsigned int nr_partial;
+ struct list_head partial;
+ atomic_long_t nr_slabs;
+ atomic_long_t total_objects;
+ struct list_head full;
+};
+
+enum slab_state {
+ DOWN = 0,
+ PARTIAL = 1,
+ PARTIAL_NODE = 2,
+ UP = 3,
+ FULL = 4,
+};
+
+struct slabinfo {
+ long unsigned int active_objs;
+ long unsigned int num_objs;
+ long unsigned int active_slabs;
+ long unsigned int num_slabs;
+ long unsigned int shared_avail;
+ unsigned int limit;
+ unsigned int batchcount;
+ unsigned int shared;
+ unsigned int objects_per_slab;
+ unsigned int cache_order;
+};
+
+struct kmem_obj_info {
+ void *kp_ptr;
+ struct slab *kp_slab;
+ void *kp_objp;
+ long unsigned int kp_data_offset;
+ struct kmem_cache *kp_slab_cache;
+ void *kp_ret;
+ void *kp_stack[16];
+ void *kp_free_stack[16];
+};
+
+struct partial_context {
+ struct slab **slab;
+ gfp_t flags;
+ unsigned int orig_size;
+};
+
+struct track {
+ long unsigned int addr;
+ depot_stack_handle_t handle;
+ int cpu;
+ int pid;
+ long unsigned int when;
+};
+
+enum track_item {
+ TRACK_ALLOC = 0,
+ TRACK_FREE = 1,
+};
+
+struct slub_flush_work {
+ struct work_struct work;
+ struct kmem_cache *s;
+ bool skip;
+};
+
+struct detached_freelist {
+ struct slab *slab;
+ void *tail;
+ void *freelist;
+ int cnt;
+ struct kmem_cache *s;
+};
+
+struct location {
+ depot_stack_handle_t handle;
+ long unsigned int count;
+ long unsigned int addr;
+ long unsigned int waste;
+ long long int sum_time;
+ long int min_time;
+ long int max_time;
+ long int min_pid;
+ long int max_pid;
+ long unsigned int cpus[2];
+ nodemask_t nodes;
+};
+
+struct loc_track {
+ long unsigned int max;
+ long unsigned int count;
+ struct location *loc;
+ loff_t idx;
+};
+
+enum slab_stat_type {
+ SL_ALL = 0,
+ SL_PARTIAL = 1,
+ SL_CPU = 2,
+ SL_OBJECTS = 3,
+ SL_TOTAL = 4,
+};
+
+struct slab_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct kmem_cache *, char *);
+ ssize_t (*store)(struct kmem_cache *, const char *, size_t);
+};
+
+struct saved_alias {
+ struct kmem_cache *s;
+ const char *name;
+ struct saved_alias *next;
+};
+
+enum slab_modes {
+ M_NONE = 0,
+ M_PARTIAL = 1,
+ M_FULL = 2,
+ M_FREE = 3,
+ M_FULL_NOLIST = 4,
+};
+
+struct aead_request {
+ struct crypto_async_request base;
+ unsigned int assoclen;
+ unsigned int cryptlen;
+ u8 *iv;
+ struct scatterlist *src;
+ struct scatterlist *dst;
+ void *__ctx[0];
+};
+
+struct aead_alg {
+ int (*setkey)(struct crypto_aead *, const u8 *, unsigned int);
+ int (*setauthsize)(struct crypto_aead *, unsigned int);
+ int (*encrypt)(struct aead_request *);
+ int (*decrypt)(struct aead_request *);
+ int (*init)(struct crypto_aead *);
+ void (*exit)(struct crypto_aead *);
+ unsigned int ivsize;
+ unsigned int maxauthsize;
+ unsigned int chunksize;
+ struct crypto_alg base;
+};
+
+struct rtattr {
+ short unsigned int rta_len;
+ short unsigned int rta_type;
+};
+
+struct scatter_walk {
+ struct scatterlist *sg;
+ unsigned int offset;
+};
+
+struct crypto_cipher {
+ struct crypto_tfm base;
+};
+
+struct crypto_cipher_spawn {
+ struct crypto_spawn base;
+};
+
+struct skcipher_request {
+ unsigned int cryptlen;
+ u8 *iv;
+ struct scatterlist *src;
+ struct scatterlist *dst;
+ struct crypto_async_request base;
+ void *__ctx[0];
+};
+
+struct crypto_skcipher {
+ unsigned int reqsize;
+ struct crypto_tfm base;
+};
+
+struct crypto_sync_skcipher {
+ struct crypto_skcipher base;
+};
+
+struct skcipher_alg {
+ int (*setkey)(struct crypto_skcipher *, const u8 *, unsigned int);
+ int (*encrypt)(struct skcipher_request *);
+ int (*decrypt)(struct skcipher_request *);
+ int (*init)(struct crypto_skcipher *);
+ void (*exit)(struct crypto_skcipher *);
+ unsigned int min_keysize;
+ unsigned int max_keysize;
+ unsigned int ivsize;
+ unsigned int chunksize;
+ unsigned int walksize;
+ struct crypto_alg base;
+};
+
+struct skcipher_instance {
+ void (*free)(struct skcipher_instance *);
+ union {
+ struct {
+ char head[64];
+ struct crypto_instance base;
+ } s;
+ struct skcipher_alg alg;
+ };
+};
+
+struct crypto_skcipher_spawn {
+ struct crypto_spawn base;
+};
+
+struct skcipher_walk {
+ union {
+ struct {
+ struct page *page;
+ long unsigned int offset;
+ } phys;
+ struct {
+ u8 *page;
+ void *addr;
+ } virt;
+ } src;
+ union {
+ struct {
+ struct page *page;
+ long unsigned int offset;
+ } phys;
+ struct {
+ u8 *page;
+ void *addr;
+ } virt;
+ } dst;
+ struct scatter_walk in;
+ unsigned int nbytes;
+ struct scatter_walk out;
+ unsigned int total;
+ struct list_head buffers;
+ u8 *page;
+ u8 *buffer;
+ u8 *oiv;
+ void *iv;
+ unsigned int ivsize;
+ int flags;
+ unsigned int blocksize;
+ unsigned int stride;
+ unsigned int alignmask;
+};
+
+struct skcipher_ctx_simple {
+ struct crypto_cipher *cipher;
+};
+
+struct crypto_report_blkcipher {
+ char type[64];
+ char geniv[64];
+ unsigned int blocksize;
+ unsigned int min_keysize;
+ unsigned int max_keysize;
+ unsigned int ivsize;
+};
+
+enum {
+ SKCIPHER_WALK_PHYS = 1,
+ SKCIPHER_WALK_SLOW = 2,
+ SKCIPHER_WALK_COPY = 4,
+ SKCIPHER_WALK_DIFF = 8,
+ SKCIPHER_WALK_SLEEP = 16,
+};
+
+struct skcipher_walk_buffer {
+ struct list_head entry;
+ struct scatter_walk dst;
+ unsigned int len;
+ u8 *data;
+ u8 buffer[0];
+};
+
+struct public_key {
+ void *key;
+ u32 keylen;
+ enum OID algo;
+ void *params;
+ u32 paramlen;
+ bool key_is_private;
+ const char *id_type;
+ const char *pkey_algo;
+};
+
+struct x509_certificate {
+ struct x509_certificate *next;
+ struct x509_certificate *signer;
+ struct public_key *pub;
+ struct public_key_signature *sig;
+ char *issuer;
+ char *subject;
+ struct asymmetric_key_id *id;
+ struct asymmetric_key_id *skid;
+ time64_t valid_from;
+ time64_t valid_to;
+ const void *tbs;
+ unsigned int tbs_size;
+ unsigned int raw_sig_size;
+ const void *raw_sig;
+ const void *raw_serial;
+ unsigned int raw_serial_size;
+ unsigned int raw_issuer_size;
+ const void *raw_issuer;
+ const void *raw_subject;
+ unsigned int raw_subject_size;
+ unsigned int raw_skid_size;
+ const void *raw_skid;
+ unsigned int index;
+ bool seen;
+ bool verified;
+ bool self_signed;
+ bool unsupported_sig;
+ bool blacklisted;
+};
+
+struct pkcs7_signed_info {
+ struct pkcs7_signed_info *next;
+ struct x509_certificate *signer;
+ unsigned int index;
+ bool unsupported_crypto;
+ bool blacklisted;
+ const void *msgdigest;
+ unsigned int msgdigest_len;
+ unsigned int authattrs_len;
+ const void *authattrs;
+ long unsigned int aa_set;
+ time64_t signing_time;
+ struct public_key_signature *sig;
+};
+
+struct pkcs7_message {
+ struct x509_certificate *certs;
+ struct x509_certificate *crl;
+ struct pkcs7_signed_info *signed_infos;
+ u8 version;
+ bool have_authattrs;
+ enum OID data_type;
+ size_t data_len;
+ size_t data_hdrlen;
+ const void *data;
+};
+
+enum blk_default_limits {
+ BLK_MAX_SEGMENTS = 128,
+ BLK_SAFE_MAX_SECTORS = 255,
+ BLK_DEF_MAX_SECTORS = 2560,
+ BLK_MAX_SEGMENT_SIZE = 65536,
+ BLK_SEG_BOUNDARY_MASK = 4294967295,
+};
+
+enum {
+ WBT_RWQ_BG = 0,
+ WBT_RWQ_KSWAPD = 1,
+ WBT_RWQ_DISCARD = 2,
+ WBT_NUM_RWQ = 3,
+};
+
+struct io_timeout_data {
+ struct io_kiocb *req;
+ struct hrtimer timer;
+ struct timespec64 ts;
+ enum hrtimer_mode mode;
+ u32 flags;
+};
+
+struct io_timeout {
+ struct file *file;
+ u32 off;
+ u32 target_seq;
+ struct list_head list;
+ struct io_kiocb *head;
+ struct io_kiocb *prev;
+};
+
+struct io_timeout_rem {
+ struct file *file;
+ u64 addr;
+ struct timespec64 ts;
+ u32 flags;
+ bool ltimeout;
+};
+
+struct portdrv_service_data {
+ struct pcie_port_service_driver *drv;
+ struct device *dev;
+ u32 service;
+};
+
+typedef int (*pcie_callback_t)(struct pcie_device *);
+
+struct circ_buf {
+ char *buf;
+ int head;
+ int tail;
+};
+
+struct serial_icounter_struct {
+ int cts;
+ int dsr;
+ int rng;
+ int dcd;
+ int rx;
+ int tx;
+ int frame;
+ int overrun;
+ int parity;
+ int brk;
+ int buf_overrun;
+ int reserved[9];
+};
+
+struct serial_struct {
+ int type;
+ int line;
+ unsigned int port;
+ int irq;
+ int flags;
+ int xmit_fifo_size;
+ int custom_divisor;
+ int baud_base;
+ short unsigned int close_delay;
+ char io_type;
+ char reserved_char[1];
+ int hub6;
+ short unsigned int closing_wait;
+ short unsigned int closing_wait2;
+ unsigned char *iomem_base;
+ short unsigned int iomem_reg_shift;
+ unsigned int port_high;
+ long unsigned int iomap_base;
+};
+
+struct serial_rs485 {
+ __u32 flags;
+ __u32 delay_rts_before_send;
+ __u32 delay_rts_after_send;
+ union {
+ __u32 padding[5];
+ struct {
+ __u8 addr_recv;
+ __u8 addr_dest;
+ __u8 padding0[2];
+ __u32 padding1[4];
+ };
+ };
+};
+
+struct serial_iso7816 {
+ __u32 flags;
+ __u32 tg;
+ __u32 sc_fi;
+ __u32 sc_di;
+ __u32 clk;
+ __u32 reserved[5];
+};
+
+struct uart_port;
+
+struct uart_ops {
+ unsigned int (*tx_empty)(struct uart_port *);
+ void (*set_mctrl)(struct uart_port *, unsigned int);
+ unsigned int (*get_mctrl)(struct uart_port *);
+ void (*stop_tx)(struct uart_port *);
+ void (*start_tx)(struct uart_port *);
+ void (*throttle)(struct uart_port *);
+ void (*unthrottle)(struct uart_port *);
+ void (*send_xchar)(struct uart_port *, char);
+ void (*stop_rx)(struct uart_port *);
+ void (*start_rx)(struct uart_port *);
+ void (*enable_ms)(struct uart_port *);
+ void (*break_ctl)(struct uart_port *, int);
+ int (*startup)(struct uart_port *);
+ void (*shutdown)(struct uart_port *);
+ void (*flush_buffer)(struct uart_port *);
+ void (*set_termios)(struct uart_port *, struct ktermios *, const struct ktermios *);
+ void (*set_ldisc)(struct uart_port *, struct ktermios *);
+ void (*pm)(struct uart_port *, unsigned int, unsigned int);
+ const char * (*type)(struct uart_port *);
+ void (*release_port)(struct uart_port *);
+ int (*request_port)(struct uart_port *);
+ void (*config_port)(struct uart_port *, int);
+ int (*verify_port)(struct uart_port *, struct serial_struct *);
+ int (*ioctl)(struct uart_port *, unsigned int, long unsigned int);
+};
+
+struct uart_icount {
+ __u32 cts;
+ __u32 dsr;
+ __u32 rng;
+ __u32 dcd;
+ __u32 rx;
+ __u32 tx;
+ __u32 frame;
+ __u32 overrun;
+ __u32 parity;
+ __u32 brk;
+ __u32 buf_overrun;
+};
+
+typedef u64 upf_t;
+
+typedef unsigned int upstat_t;
+
+struct uart_state;
+
+struct uart_port {
+ spinlock_t lock;
+ long unsigned int iobase;
+ unsigned char *membase;
+ unsigned int (*serial_in)(struct uart_port *, int);
+ void (*serial_out)(struct uart_port *, int, int);
+ void (*set_termios)(struct uart_port *, struct ktermios *, const struct ktermios *);
+ void (*set_ldisc)(struct uart_port *, struct ktermios *);
+ unsigned int (*get_mctrl)(struct uart_port *);
+ void (*set_mctrl)(struct uart_port *, unsigned int);
+ unsigned int (*get_divisor)(struct uart_port *, unsigned int, unsigned int *);
+ void (*set_divisor)(struct uart_port *, unsigned int, unsigned int, unsigned int);
+ int (*startup)(struct uart_port *);
+ void (*shutdown)(struct uart_port *);
+ void (*throttle)(struct uart_port *);
+ void (*unthrottle)(struct uart_port *);
+ int (*handle_irq)(struct uart_port *);
+ void (*pm)(struct uart_port *, unsigned int, unsigned int);
+ void (*handle_break)(struct uart_port *);
+ int (*rs485_config)(struct uart_port *, struct ktermios *, struct serial_rs485 *);
+ int (*iso7816_config)(struct uart_port *, struct serial_iso7816 *);
+ unsigned int irq;
+ long unsigned int irqflags;
+ unsigned int uartclk;
+ unsigned int fifosize;
+ unsigned char x_char;
+ unsigned char regshift;
+ unsigned char iotype;
+ unsigned char quirks;
+ unsigned int read_status_mask;
+ unsigned int ignore_status_mask;
+ struct uart_state *state;
+ struct uart_icount icount;
+ struct console *cons;
+ upf_t flags;
+ upstat_t status;
+ int hw_stopped;
+ unsigned int mctrl;
+ unsigned int frame_time;
+ unsigned int type;
+ const struct uart_ops *ops;
+ unsigned int custom_divisor;
+ unsigned int line;
+ unsigned int minor;
+ resource_size_t mapbase;
+ resource_size_t mapsize;
+ struct device *dev;
+ long unsigned int sysrq;
+ unsigned int sysrq_ch;
+ unsigned char has_sysrq;
+ unsigned char sysrq_seq;
+ unsigned char hub6;
+ unsigned char suspended;
+ unsigned char console_reinit;
+ const char *name;
+ struct attribute_group *attr_group;
+ const struct attribute_group **tty_groups;
+ struct serial_rs485 rs485;
+ struct serial_rs485 rs485_supported;
+ struct gpio_desc *rs485_term_gpio;
+ struct serial_iso7816 iso7816;
+ void *private_data;
+};
+
+enum uart_pm_state {
+ UART_PM_STATE_ON = 0,
+ UART_PM_STATE_OFF = 3,
+ UART_PM_STATE_UNDEFINED = 4,
+};
+
+struct uart_state {
+ struct tty_port port;
+ enum uart_pm_state pm_state;
+ struct circ_buf xmit;
+ atomic_t refcount;
+ wait_queue_head_t remove_wait;
+ struct uart_port *uart_port;
+};
+
+struct earlycon_device {
+ struct console *con;
+ struct uart_port port;
+ char options[16];
+ unsigned int baud;
+};
+
+struct earlycon_id {
+ char name[15];
+ char name_term;
+ char compatible[128];
+ int (*setup)(struct earlycon_device *, const char *);
+};
+
+struct attribute_container {
+ struct list_head node;
+ struct klist containers;
+ struct class *class;
+ const struct attribute_group *grp;
+ struct device_attribute **attrs;
+ int (*match)(struct attribute_container *, struct device *);
+ long unsigned int flags;
+};
+
+struct transport_container;
+
+struct transport_class {
+ struct class class;
+ int (*setup)(struct transport_container *, struct device *, struct device *);
+ int (*configure)(struct transport_container *, struct device *, struct device *);
+ int (*remove)(struct transport_container *, struct device *, struct device *);
+};
+
+struct transport_container {
+ struct attribute_container ac;
+ const struct attribute_group *statistics;
+};
+
+struct anon_transport_class {
+ struct transport_class tclass;
+ struct attribute_container container;
+};
+
+struct cper_sec_proc_arm {
+ u32 validation_bits;
+ u16 err_info_num;
+ u16 context_info_num;
+ u32 section_length;
+ u8 affinity_level;
+ u8 reserved[3];
+ u64 mpidr;
+ u64 midr;
+ u32 running_state;
+ u32 psci_state;
+};
+
+enum hw_event_mc_err_type {
+ HW_EVENT_ERR_CORRECTED = 0,
+ HW_EVENT_ERR_UNCORRECTED = 1,
+ HW_EVENT_ERR_DEFERRED = 2,
+ HW_EVENT_ERR_FATAL = 3,
+ HW_EVENT_ERR_INFO = 4,
+};
+
+enum mf_result {
+ MF_IGNORED = 0,
+ MF_FAILED = 1,
+ MF_DELAYED = 2,
+ MF_RECOVERED = 3,
+};
+
+enum mf_action_page_type {
+ MF_MSG_KERNEL = 0,
+ MF_MSG_KERNEL_HIGH_ORDER = 1,
+ MF_MSG_SLAB = 2,
+ MF_MSG_DIFFERENT_COMPOUND = 3,
+ MF_MSG_HUGE = 4,
+ MF_MSG_FREE_HUGE = 5,
+ MF_MSG_UNMAP_FAILED = 6,
+ MF_MSG_DIRTY_SWAPCACHE = 7,
+ MF_MSG_CLEAN_SWAPCACHE = 8,
+ MF_MSG_DIRTY_MLOCKED_LRU = 9,
+ MF_MSG_CLEAN_MLOCKED_LRU = 10,
+ MF_MSG_DIRTY_UNEVICTABLE_LRU = 11,
+ MF_MSG_CLEAN_UNEVICTABLE_LRU = 12,
+ MF_MSG_DIRTY_LRU = 13,
+ MF_MSG_CLEAN_LRU = 14,
+ MF_MSG_TRUNCATED_LRU = 15,
+ MF_MSG_BUDDY = 16,
+ MF_MSG_DAX = 17,
+ MF_MSG_UNSPLIT_THP = 18,
+ MF_MSG_UNKNOWN = 19,
+};
+
+struct aer_header_log_regs {
+ unsigned int dw0;
+ unsigned int dw1;
+ unsigned int dw2;
+ unsigned int dw3;
+};
+
+struct trace_event_raw_mc_event {
+ struct trace_entry ent;
+ unsigned int error_type;
+ u32 __data_loc_msg;
+ u32 __data_loc_label;
+ u16 error_count;
+ u8 mc_index;
+ s8 top_layer;
+ s8 middle_layer;
+ s8 lower_layer;
+ long int address;
+ u8 grain_bits;
+ long int syndrome;
+ u32 __data_loc_driver_detail;
+ char __data[0];
+};
+
+struct trace_event_raw_arm_event {
+ struct trace_entry ent;
+ u64 mpidr;
+ u64 midr;
+ u32 running_state;
+ u32 psci_state;
+ u8 affinity;
+ char __data[0];
+};
+
+struct trace_event_raw_non_standard_event {
+ struct trace_entry ent;
+ char sec_type[16];
+ char fru_id[16];
+ u32 __data_loc_fru_text;
+ u8 sev;
+ u32 len;
+ u32 __data_loc_buf;
+ char __data[0];
+};
+
+struct trace_event_raw_aer_event {
+ struct trace_entry ent;
+ u32 __data_loc_dev_name;
+ u32 status;
+ u8 severity;
+ u8 tlp_header_valid;
+ u32 tlp_header[4];
+ char __data[0];
+};
+
+struct trace_event_raw_memory_failure_event {
+ struct trace_entry ent;
+ long unsigned int pfn;
+ int type;
+ int result;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_mc_event {
+ u32 msg;
+ u32 label;
+ u32 driver_detail;
+};
+
+struct trace_event_data_offsets_arm_event {};
+
+struct trace_event_data_offsets_non_standard_event {
+ u32 fru_text;
+ u32 buf;
+};
+
+struct trace_event_data_offsets_aer_event {
+ u32 dev_name;
+};
+
+struct trace_event_data_offsets_memory_failure_event {};
+
+typedef void (*btf_trace_mc_event)(void *, const unsigned int, const char *, const char *, const int, const u8, const s8, const s8, const s8, long unsigned int, const u8, long unsigned int, const char *);
+
+typedef void (*btf_trace_arm_event)(void *, const struct cper_sec_proc_arm *);
+
+typedef void (*btf_trace_non_standard_event)(void *, const guid_t *, const guid_t *, const char *, const u8, const u8 *, const u32);
+
+typedef void (*btf_trace_aer_event)(void *, const char *, const u32, const u8, const u8, struct aer_header_log_regs *);
+
+typedef void (*btf_trace_memory_failure_event)(void *, long unsigned int, int, int);
+
+enum {
+ TCA_EMATCH_TREE_UNSPEC = 0,
+ TCA_EMATCH_TREE_HDR = 1,
+ TCA_EMATCH_TREE_LIST = 2,
+ __TCA_EMATCH_TREE_MAX = 3,
+};
+
+struct tcf_ematch_hdr {
+ __u16 matchid;
+ __u16 kind;
+ __u16 flags;
+ __u16 pad;
+};
+
+enum ip_conntrack_events {
+ IPCT_NEW = 0,
+ IPCT_RELATED = 1,
+ IPCT_DESTROY = 2,
+ IPCT_REPLY = 3,
+ IPCT_ASSURED = 4,
+ IPCT_PROTOINFO = 5,
+ IPCT_HELPER = 6,
+ IPCT_MARK = 7,
+ IPCT_SEQADJ = 8,
+ IPCT_NATSEQADJ = 8,
+ IPCT_SECMARK = 9,
+ IPCT_LABEL = 10,
+ IPCT_SYNPROXY = 11,
+ __IPCT_MAX = 12,
+};
+
+struct nf_conntrack_l4proto {
+ u_int8_t l4proto;
+ bool allow_clash;
+ u16 nlattr_size;
+ bool (*can_early_drop)(const struct nf_conn *);
+ int (*to_nlattr)(struct sk_buff *, struct nlattr *, struct nf_conn *, bool);
+ int (*from_nlattr)(struct nlattr **, struct nf_conn *);
+ int (*tuple_to_nlattr)(struct sk_buff *, const struct nf_conntrack_tuple *);
+ unsigned int (*nlattr_tuple_size)();
+ int (*nlattr_to_tuple)(struct nlattr **, struct nf_conntrack_tuple *, u_int32_t);
+ const struct nla_policy *nla_policy;
+ struct {
+ int (*nlattr_to_obj)(struct nlattr **, struct net *, void *);
+ int (*obj_to_nlattr)(struct sk_buff *, const void *);
+ u16 obj_size;
+ u16 nlattr_max;
+ const struct nla_policy *nla_policy;
+ } ctnl_timeout;
+};
+
+struct nf_loginfo {
+ u_int8_t type;
+ union {
+ struct {
+ u_int32_t copy_len;
+ u_int16_t group;
+ u_int16_t qthreshold;
+ u_int16_t flags;
+ } ulog;
+ struct {
+ u_int8_t level;
+ u_int8_t logflags;
+ } log;
+ } u;
+};
+
+struct fib_rt_info {
+ struct fib_info *fi;
+ u32 tb_id;
+ __be32 dst;
+ int dst_len;
+ dscp_t dscp;
+ u8 type;
+ u8 offload: 1;
+ u8 trap: 1;
+ u8 offload_failed: 1;
+ u8 unused: 5;
+};
+
+struct fib_entry_notifier_info {
+ struct fib_notifier_info info;
+ u32 dst;
+ int dst_len;
+ struct fib_info *fi;
+ dscp_t dscp;
+ u8 type;
+ u32 tb_id;
+};
+
+struct fib_alias {
+ struct hlist_node fa_list;
+ struct fib_info *fa_info;
+ dscp_t fa_dscp;
+ u8 fa_type;
+ u8 fa_state;
+ u8 fa_slen;
+ u32 tb_id;
+ s16 fa_default;
+ u8 offload;
+ u8 trap;
+ u8 offload_failed;
+ struct callback_head rcu;
+};
+
+struct fib_prop {
+ int error;
+ u8 scope;
+};
+
+typedef unsigned int t_key;
+
+struct key_vector {
+ t_key key;
+ unsigned char pos;
+ unsigned char bits;
+ unsigned char slen;
+ union {
+ struct hlist_head leaf;
+ struct {
+ struct { } __empty_tnode;
+ struct key_vector *tnode[0];
+ };
+ };
+};
+
+struct tnode {
+ struct callback_head rcu;
+ t_key empty_children;
+ t_key full_children;
+ struct key_vector *parent;
+ struct key_vector kv[1];
+};
+
+struct trie_stat {
+ unsigned int totdepth;
+ unsigned int maxdepth;
+ unsigned int tnodes;
+ unsigned int leaves;
+ unsigned int nullpointers;
+ unsigned int prefixes;
+ unsigned int nodesizes[32];
+};
+
+struct trie {
+ struct key_vector kv[1];
+};
+
+struct fib_trie_iter {
+ struct seq_net_private p;
+ struct fib_table *tb;
+ struct key_vector *tnode;
+ unsigned int index;
+ unsigned int depth;
+};
+
+struct fib_route_iter {
+ struct seq_net_private p;
+ struct fib_table *main_tb;
+ struct key_vector *tnode;
+ loff_t pos;
+ t_key key;
+};
+
+typedef struct rt6_info * (*pol_lookup_t)(struct net *, struct fib6_table *, struct flowi6 *, const struct sk_buff *, int);
+
+struct fib6_rule {
+ struct fib_rule common;
+ struct rt6key src;
+ struct rt6key dst;
+ dscp_t dscp;
+};
+
+typedef s8 int8_t;
+
+typedef s16 int16_t;
+
+struct p9_fd_opts {
+ int rfd;
+ int wfd;
+ u16 port;
+ bool privport;
+};
+
+enum {
+ Opt_port = 0,
+ Opt_rfdno = 1,
+ Opt_wfdno = 2,
+ Opt_err = 3,
+ Opt_privport = 4,
+};
+
+enum {
+ Rworksched = 1,
+ Rpending = 2,
+ Wworksched = 4,
+ Wpending = 8,
+};
+
+struct p9_conn;
+
+struct p9_poll_wait {
+ struct p9_conn *conn;
+ wait_queue_entry_t wait;
+ wait_queue_head_t *wait_addr;
+};
+
+struct p9_conn {
+ struct list_head mux_list;
+ struct p9_client *client;
+ int err;
+ spinlock_t req_lock;
+ struct list_head req_list;
+ struct list_head unsent_req_list;
+ struct p9_req_t *rreq;
+ struct p9_req_t *wreq;
+ char tmp_buf[7];
+ struct p9_fcall rc;
+ int wpos;
+ int wsize;
+ char *wbuf;
+ struct list_head poll_pending_link;
+ struct p9_poll_wait poll_wait[2];
+ poll_table pt;
+ struct work_struct rq;
+ struct work_struct wq;
+ long unsigned int wsched;
+};
+
+struct p9_trans_fd {
+ struct file *rd;
+ struct file *wr;
+ struct p9_conn conn;
+};
+
+enum {
+ GP_IDLE = 0,
+ GP_ENTER = 1,
+ GP_PASSED = 2,
+ GP_EXIT = 3,
+ GP_REPLAY = 4,
+};
+
+struct ksignal {
+ struct k_sigaction ka;
+ kernel_siginfo_t info;
+ int sig;
+};
+
+struct trace_event_raw_sys_enter {
+ struct trace_entry ent;
+ long int id;
+ long unsigned int args[6];
+ char __data[0];
+};
+
+struct trace_event_raw_sys_exit {
+ struct trace_entry ent;
+ long int id;
+ long int ret;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_sys_enter {};
+
+struct trace_event_data_offsets_sys_exit {};
+
+typedef void (*btf_trace_sys_enter)(void *, struct pt_regs *, long int);
+
+typedef void (*btf_trace_sys_exit)(void *, struct pt_regs *, long int);
+
+struct swap_slots_cache {
+ bool lock_initialized;
+ struct mutex alloc_lock;
+ swp_entry_t *slots;
+ int nr;
+ int cur;
+ spinlock_t free_lock;
+ swp_entry_t *slots_ret;
+ int n_ret;
+};
+
+struct files_stat_struct {
+ long unsigned int nr_files;
+ long unsigned int nr_free_files;
+ long unsigned int max_files;
+};
+
+typedef int wait_bit_action_f(struct wait_bit_key *, int);
+
+enum lru_status {
+ LRU_REMOVED = 0,
+ LRU_REMOVED_RETRY = 1,
+ LRU_ROTATE = 2,
+ LRU_SKIP = 3,
+ LRU_RETRY = 4,
+};
+
+typedef enum lru_status (*list_lru_walk_cb)(struct list_head *, struct list_lru_one *, spinlock_t *, void *);
+
+struct inodes_stat_t {
+ long int nr_inodes;
+ long int nr_unused;
+ long int dummy[5];
+};
+
+enum rw_hint {
+ WRITE_LIFE_NOT_SET = 0,
+ WRITE_LIFE_NONE = 1,
+ WRITE_LIFE_SHORT = 2,
+ WRITE_LIFE_MEDIUM = 3,
+ WRITE_LIFE_LONG = 4,
+ WRITE_LIFE_EXTREME = 5,
+};
+
+enum inode_i_mutex_lock_class {
+ I_MUTEX_NORMAL = 0,
+ I_MUTEX_PARENT = 1,
+ I_MUTEX_CHILD = 2,
+ I_MUTEX_XATTR = 3,
+ I_MUTEX_NONDIR2 = 4,
+ I_MUTEX_PARENT2 = 5,
+};
+
+enum file_time_flags {
+ S_ATIME = 1,
+ S_MTIME = 2,
+ S_CTIME = 4,
+ S_VERSION = 8,
+};
+
+struct p9_dirent {
+ struct p9_qid qid;
+ u64 d_off;
+ unsigned char d_type;
+ char d_name[256];
+};
+
+struct p9_rdir {
+ int head;
+ int tail;
+ uint8_t buf[0];
+};
+
+struct blk_queue_stats {
+ struct list_head callbacks;
+ spinlock_t lock;
+ int accounting;
+};
+
+struct io_uring_file_index_range {
+ __u32 off;
+ __u32 len;
+ __u64 resv;
+};
+
+enum gpiod_flags {
+ GPIOD_ASIS = 0,
+ GPIOD_IN = 1,
+ GPIOD_OUT_LOW = 3,
+ GPIOD_OUT_HIGH = 7,
+ GPIOD_OUT_LOW_OPEN_DRAIN = 11,
+ GPIOD_OUT_HIGH_OPEN_DRAIN = 15,
+};
+
+struct uart_driver {
+ struct module *owner;
+ const char *driver_name;
+ const char *dev_name;
+ int major;
+ int minor;
+ int nr;
+ struct console *cons;
+ struct uart_state *state;
+ struct tty_driver *tty_driver;
+};
+
+struct uart_match {
+ struct uart_port *port;
+ struct uart_driver *driver;
+};
+
+struct lifebook_data {
+ struct input_dev *dev2;
+ char phys[32];
+};
+
+struct class_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct class *, struct class_attribute *, char *);
+ ssize_t (*store)(struct class *, struct class_attribute *, const char *, size_t);
+};
+
+struct rx_queue_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct netdev_rx_queue *, char *);
+ ssize_t (*store)(struct netdev_rx_queue *, const char *, size_t);
+};
+
+struct netdev_queue_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct netdev_queue *, char *);
+ ssize_t (*store)(struct netdev_queue *, const char *, size_t);
+};
+
+enum nf_hook_ops_type {
+ NF_HOOK_OP_UNDEFINED = 0,
+ NF_HOOK_OP_NF_TABLES = 1,
+};
+
+struct nf_hook_ops {
+ nf_hookfn *hook;
+ struct net_device *dev;
+ void *priv;
+ u8 pf;
+ enum nf_hook_ops_type hook_ops_type: 8;
+ unsigned int hooknum;
+ int priority;
+};
+
+struct nf_nat_hook {
+ int (*parse_nat_setup)(struct nf_conn *, enum nf_nat_manip_type, const struct nlattr *);
+ void (*decode_session)(struct sk_buff *, struct flowi *);
+ unsigned int (*manip_pkt)(struct sk_buff *, struct nf_conn *, enum nf_nat_manip_type, enum ip_conntrack_dir);
+ void (*remove_nat_bysrc)(struct nf_conn *);
+};
+
+struct nf_conn_help {
+ struct nf_conntrack_helper *helper;
+ struct hlist_head expectations;
+ u8 expecting[4];
+ int: 32;
+ char data[32];
+};
+
+struct nf_ct_helper_expectfn {
+ struct list_head head;
+ const char *name;
+ void (*expectfn)(struct nf_conn *, struct nf_conntrack_expect *);
+};
+
+struct nf_ct_seqadj {
+ u32 correction_pos;
+ s32 offset_before;
+ s32 offset_after;
+};
+
+struct nf_conn_seqadj {
+ struct nf_ct_seqadj seq[2];
+};
+
+union nf_conntrack_nat_help {};
+
+struct nf_conn_nat {
+ union nf_conntrack_nat_help help;
+};
+
+struct nf_nat_lookup_hook_priv {
+ struct nf_hook_entries *entries;
+ struct callback_head callback_head;
+};
+
+struct nf_nat_hooks_net {
+ struct nf_hook_ops *nat_hook_ops;
+ unsigned int users;
+};
+
+struct nat_net {
+ struct nf_nat_hooks_net nat_proto_net[11];
+};
+
+struct nf_nat_proto_clean {
+ u8 l3proto;
+ u8 l4proto;
+};
+
+struct xfrm_spi_skb_cb {
+ struct xfrm_tunnel_skb_cb header;
+ unsigned int daddroff;
+ unsigned int family;
+ __be32 seq;
+};
+
+struct rhashtable_walker {
+ struct list_head list;
+ struct bucket_table *tbl;
+};
+
+struct rhashtable_iter {
+ struct rhashtable *ht;
+ struct rhash_head *p;
+ struct rhlist_head *list;
+ struct rhashtable_walker walker;
+ unsigned int slot;
+ unsigned int skip;
+ bool end_of_table;
+};
+
+enum {
+ IOAM6_ATTR_UNSPEC = 0,
+ IOAM6_ATTR_NS_ID = 1,
+ IOAM6_ATTR_NS_DATA = 2,
+ IOAM6_ATTR_NS_DATA_WIDE = 3,
+ IOAM6_ATTR_SC_ID = 4,
+ IOAM6_ATTR_SC_DATA = 5,
+ IOAM6_ATTR_SC_NONE = 6,
+ IOAM6_ATTR_PAD = 7,
+ __IOAM6_ATTR_MAX = 8,
+};
+
+enum {
+ IOAM6_CMD_UNSPEC = 0,
+ IOAM6_CMD_ADD_NAMESPACE = 1,
+ IOAM6_CMD_DEL_NAMESPACE = 2,
+ IOAM6_CMD_DUMP_NAMESPACES = 3,
+ IOAM6_CMD_ADD_SCHEMA = 4,
+ IOAM6_CMD_DEL_SCHEMA = 5,
+ IOAM6_CMD_DUMP_SCHEMAS = 6,
+ IOAM6_CMD_NS_SET_SCHEMA = 7,
+ __IOAM6_CMD_MAX = 8,
+};
+
+enum genl_validate_flags {
+ GENL_DONT_VALIDATE_STRICT = 1,
+ GENL_DONT_VALIDATE_DUMP = 2,
+ GENL_DONT_VALIDATE_DUMP_STRICT = 4,
+};
+
+struct dcbmsg {
+ __u8 dcb_family;
+ __u8 cmd;
+ __u16 dcb_pad;
+};
+
+enum dcbnl_commands {
+ DCB_CMD_UNDEFINED = 0,
+ DCB_CMD_GSTATE = 1,
+ DCB_CMD_SSTATE = 2,
+ DCB_CMD_PGTX_GCFG = 3,
+ DCB_CMD_PGTX_SCFG = 4,
+ DCB_CMD_PGRX_GCFG = 5,
+ DCB_CMD_PGRX_SCFG = 6,
+ DCB_CMD_PFC_GCFG = 7,
+ DCB_CMD_PFC_SCFG = 8,
+ DCB_CMD_SET_ALL = 9,
+ DCB_CMD_GPERM_HWADDR = 10,
+ DCB_CMD_GCAP = 11,
+ DCB_CMD_GNUMTCS = 12,
+ DCB_CMD_SNUMTCS = 13,
+ DCB_CMD_PFC_GSTATE = 14,
+ DCB_CMD_PFC_SSTATE = 15,
+ DCB_CMD_BCN_GCFG = 16,
+ DCB_CMD_BCN_SCFG = 17,
+ DCB_CMD_GAPP = 18,
+ DCB_CMD_SAPP = 19,
+ DCB_CMD_IEEE_SET = 20,
+ DCB_CMD_IEEE_GET = 21,
+ DCB_CMD_GDCBX = 22,
+ DCB_CMD_SDCBX = 23,
+ DCB_CMD_GFEATCFG = 24,
+ DCB_CMD_SFEATCFG = 25,
+ DCB_CMD_CEE_GET = 26,
+ DCB_CMD_IEEE_DEL = 27,
+ __DCB_CMD_ENUM_MAX = 28,
+ DCB_CMD_MAX = 27,
+};
+
+enum dcbnl_attrs {
+ DCB_ATTR_UNDEFINED = 0,
+ DCB_ATTR_IFNAME = 1,
+ DCB_ATTR_STATE = 2,
+ DCB_ATTR_PFC_STATE = 3,
+ DCB_ATTR_PFC_CFG = 4,
+ DCB_ATTR_NUM_TC = 5,
+ DCB_ATTR_PG_CFG = 6,
+ DCB_ATTR_SET_ALL = 7,
+ DCB_ATTR_PERM_HWADDR = 8,
+ DCB_ATTR_CAP = 9,
+ DCB_ATTR_NUMTCS = 10,
+ DCB_ATTR_BCN = 11,
+ DCB_ATTR_APP = 12,
+ DCB_ATTR_IEEE = 13,
+ DCB_ATTR_DCBX = 14,
+ DCB_ATTR_FEATCFG = 15,
+ DCB_ATTR_CEE = 16,
+ __DCB_ATTR_ENUM_MAX = 17,
+ DCB_ATTR_MAX = 16,
+};
+
+enum ieee_attrs {
+ DCB_ATTR_IEEE_UNSPEC = 0,
+ DCB_ATTR_IEEE_ETS = 1,
+ DCB_ATTR_IEEE_PFC = 2,
+ DCB_ATTR_IEEE_APP_TABLE = 3,
+ DCB_ATTR_IEEE_PEER_ETS = 4,
+ DCB_ATTR_IEEE_PEER_PFC = 5,
+ DCB_ATTR_IEEE_PEER_APP = 6,
+ DCB_ATTR_IEEE_MAXRATE = 7,
+ DCB_ATTR_IEEE_QCN = 8,
+ DCB_ATTR_IEEE_QCN_STATS = 9,
+ DCB_ATTR_DCB_BUFFER = 10,
+ DCB_ATTR_DCB_APP_TRUST_TABLE = 11,
+ __DCB_ATTR_IEEE_MAX = 12,
+};
+
+enum ieee_attrs_app {
+ DCB_ATTR_IEEE_APP_UNSPEC = 0,
+ DCB_ATTR_IEEE_APP = 1,
+ DCB_ATTR_DCB_APP = 2,
+ __DCB_ATTR_IEEE_APP_MAX = 3,
+};
+
+enum cee_attrs {
+ DCB_ATTR_CEE_UNSPEC = 0,
+ DCB_ATTR_CEE_PEER_PG = 1,
+ DCB_ATTR_CEE_PEER_PFC = 2,
+ DCB_ATTR_CEE_PEER_APP_TABLE = 3,
+ DCB_ATTR_CEE_TX_PG = 4,
+ DCB_ATTR_CEE_RX_PG = 5,
+ DCB_ATTR_CEE_PFC = 6,
+ DCB_ATTR_CEE_APP_TABLE = 7,
+ DCB_ATTR_CEE_FEAT = 8,
+ __DCB_ATTR_CEE_MAX = 9,
+};
+
+enum peer_app_attr {
+ DCB_ATTR_CEE_PEER_APP_UNSPEC = 0,
+ DCB_ATTR_CEE_PEER_APP_INFO = 1,
+ DCB_ATTR_CEE_PEER_APP = 2,
+ __DCB_ATTR_CEE_PEER_APP_MAX = 3,
+};
+
+enum dcbnl_pfc_up_attrs {
+ DCB_PFC_UP_ATTR_UNDEFINED = 0,
+ DCB_PFC_UP_ATTR_0 = 1,
+ DCB_PFC_UP_ATTR_1 = 2,
+ DCB_PFC_UP_ATTR_2 = 3,
+ DCB_PFC_UP_ATTR_3 = 4,
+ DCB_PFC_UP_ATTR_4 = 5,
+ DCB_PFC_UP_ATTR_5 = 6,
+ DCB_PFC_UP_ATTR_6 = 7,
+ DCB_PFC_UP_ATTR_7 = 8,
+ DCB_PFC_UP_ATTR_ALL = 9,
+ __DCB_PFC_UP_ATTR_ENUM_MAX = 10,
+ DCB_PFC_UP_ATTR_MAX = 9,
+};
+
+enum dcbnl_pg_attrs {
+ DCB_PG_ATTR_UNDEFINED = 0,
+ DCB_PG_ATTR_TC_0 = 1,
+ DCB_PG_ATTR_TC_1 = 2,
+ DCB_PG_ATTR_TC_2 = 3,
+ DCB_PG_ATTR_TC_3 = 4,
+ DCB_PG_ATTR_TC_4 = 5,
+ DCB_PG_ATTR_TC_5 = 6,
+ DCB_PG_ATTR_TC_6 = 7,
+ DCB_PG_ATTR_TC_7 = 8,
+ DCB_PG_ATTR_TC_MAX = 9,
+ DCB_PG_ATTR_TC_ALL = 10,
+ DCB_PG_ATTR_BW_ID_0 = 11,
+ DCB_PG_ATTR_BW_ID_1 = 12,
+ DCB_PG_ATTR_BW_ID_2 = 13,
+ DCB_PG_ATTR_BW_ID_3 = 14,
+ DCB_PG_ATTR_BW_ID_4 = 15,
+ DCB_PG_ATTR_BW_ID_5 = 16,
+ DCB_PG_ATTR_BW_ID_6 = 17,
+ DCB_PG_ATTR_BW_ID_7 = 18,
+ DCB_PG_ATTR_BW_ID_MAX = 19,
+ DCB_PG_ATTR_BW_ID_ALL = 20,
+ __DCB_PG_ATTR_ENUM_MAX = 21,
+ DCB_PG_ATTR_MAX = 20,
+};
+
+enum dcbnl_tc_attrs {
+ DCB_TC_ATTR_PARAM_UNDEFINED = 0,
+ DCB_TC_ATTR_PARAM_PGID = 1,
+ DCB_TC_ATTR_PARAM_UP_MAPPING = 2,
+ DCB_TC_ATTR_PARAM_STRICT_PRIO = 3,
+ DCB_TC_ATTR_PARAM_BW_PCT = 4,
+ DCB_TC_ATTR_PARAM_ALL = 5,
+ __DCB_TC_ATTR_PARAM_ENUM_MAX = 6,
+ DCB_TC_ATTR_PARAM_MAX = 5,
+};
+
+enum dcbnl_cap_attrs {
+ DCB_CAP_ATTR_UNDEFINED = 0,
+ DCB_CAP_ATTR_ALL = 1,
+ DCB_CAP_ATTR_PG = 2,
+ DCB_CAP_ATTR_PFC = 3,
+ DCB_CAP_ATTR_UP2TC = 4,
+ DCB_CAP_ATTR_PG_TCS = 5,
+ DCB_CAP_ATTR_PFC_TCS = 6,
+ DCB_CAP_ATTR_GSP = 7,
+ DCB_CAP_ATTR_BCN = 8,
+ DCB_CAP_ATTR_DCBX = 9,
+ __DCB_CAP_ATTR_ENUM_MAX = 10,
+ DCB_CAP_ATTR_MAX = 9,
+};
+
+enum dcbnl_numtcs_attrs {
+ DCB_NUMTCS_ATTR_UNDEFINED = 0,
+ DCB_NUMTCS_ATTR_ALL = 1,
+ DCB_NUMTCS_ATTR_PG = 2,
+ DCB_NUMTCS_ATTR_PFC = 3,
+ __DCB_NUMTCS_ATTR_ENUM_MAX = 4,
+ DCB_NUMTCS_ATTR_MAX = 3,
+};
+
+enum dcbnl_bcn_attrs {
+ DCB_BCN_ATTR_UNDEFINED = 0,
+ DCB_BCN_ATTR_RP_0 = 1,
+ DCB_BCN_ATTR_RP_1 = 2,
+ DCB_BCN_ATTR_RP_2 = 3,
+ DCB_BCN_ATTR_RP_3 = 4,
+ DCB_BCN_ATTR_RP_4 = 5,
+ DCB_BCN_ATTR_RP_5 = 6,
+ DCB_BCN_ATTR_RP_6 = 7,
+ DCB_BCN_ATTR_RP_7 = 8,
+ DCB_BCN_ATTR_RP_ALL = 9,
+ DCB_BCN_ATTR_BCNA_0 = 10,
+ DCB_BCN_ATTR_BCNA_1 = 11,
+ DCB_BCN_ATTR_ALPHA = 12,
+ DCB_BCN_ATTR_BETA = 13,
+ DCB_BCN_ATTR_GD = 14,
+ DCB_BCN_ATTR_GI = 15,
+ DCB_BCN_ATTR_TMAX = 16,
+ DCB_BCN_ATTR_TD = 17,
+ DCB_BCN_ATTR_RMIN = 18,
+ DCB_BCN_ATTR_W = 19,
+ DCB_BCN_ATTR_RD = 20,
+ DCB_BCN_ATTR_RU = 21,
+ DCB_BCN_ATTR_WRTT = 22,
+ DCB_BCN_ATTR_RI = 23,
+ DCB_BCN_ATTR_C = 24,
+ DCB_BCN_ATTR_ALL = 25,
+ __DCB_BCN_ATTR_ENUM_MAX = 26,
+ DCB_BCN_ATTR_MAX = 25,
+};
+
+enum dcb_general_attr_values {
+ DCB_ATTR_VALUE_UNDEFINED = 255,
+};
+
+enum dcbnl_app_attrs {
+ DCB_APP_ATTR_UNDEFINED = 0,
+ DCB_APP_ATTR_IDTYPE = 1,
+ DCB_APP_ATTR_ID = 2,
+ DCB_APP_ATTR_PRIORITY = 3,
+ __DCB_APP_ATTR_ENUM_MAX = 4,
+ DCB_APP_ATTR_MAX = 3,
+};
+
+enum dcbnl_featcfg_attrs {
+ DCB_FEATCFG_ATTR_UNDEFINED = 0,
+ DCB_FEATCFG_ATTR_ALL = 1,
+ DCB_FEATCFG_ATTR_PG = 2,
+ DCB_FEATCFG_ATTR_PFC = 3,
+ DCB_FEATCFG_ATTR_APP = 4,
+ __DCB_FEATCFG_ATTR_ENUM_MAX = 5,
+ DCB_FEATCFG_ATTR_MAX = 4,
+};
+
+struct dcb_app_type {
+ int ifindex;
+ struct dcb_app app;
+ struct list_head list;
+ u8 dcbx;
+};
+
+struct dcb_ieee_app_prio_map {
+ u64 map[8];
+};
+
+struct dcb_ieee_app_dscp_map {
+ u8 map[64];
+};
+
+enum dcbevent_notif_type {
+ DCB_APP_EVENT = 1,
+};
+
+struct reply_func {
+ int type;
+ int (*cb)(struct net_device *, struct nlmsghdr *, u32, struct nlattr **, struct sk_buff *);
+};
+
+enum x86_pf_error_code {
+ X86_PF_PROT = 1,
+ X86_PF_WRITE = 2,
+ X86_PF_USER = 4,
+ X86_PF_RSVD = 8,
+ X86_PF_INSTR = 16,
+ X86_PF_PK = 32,
+ X86_PF_SGX = 32768,
+};
+
+struct trace_event_raw_emulate_vsyscall {
+ struct trace_entry ent;
+ int nr;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_emulate_vsyscall {};
+
+typedef void (*btf_trace_emulate_vsyscall)(void *, int);
+
+enum {
+ EMULATE = 0,
+ XONLY = 1,
+ NONE___2 = 2,
+};
+
+struct swait_queue {
+ struct task_struct *task;
+ struct list_head task_list;
+};
+
+enum {
+ MEMBARRIER_STATE_PRIVATE_EXPEDITED_READY = 1,
+ MEMBARRIER_STATE_PRIVATE_EXPEDITED = 2,
+ MEMBARRIER_STATE_GLOBAL_EXPEDITED_READY = 4,
+ MEMBARRIER_STATE_GLOBAL_EXPEDITED = 8,
+ MEMBARRIER_STATE_PRIVATE_EXPEDITED_SYNC_CORE_READY = 16,
+ MEMBARRIER_STATE_PRIVATE_EXPEDITED_SYNC_CORE = 32,
+ MEMBARRIER_STATE_PRIVATE_EXPEDITED_RSEQ_READY = 64,
+ MEMBARRIER_STATE_PRIVATE_EXPEDITED_RSEQ = 128,
+};
+
+enum {
+ MEMBARRIER_FLAG_SYNC_CORE = 1,
+ MEMBARRIER_FLAG_RSEQ = 2,
+};
+
+struct sd_flag_debug {
+ unsigned int meta_flags;
+ char *name;
+};
+
+struct sched_domain_attr {
+ int relax_domain_level;
+};
+
+typedef const struct cpumask * (*sched_domain_mask_f)(int);
+
+typedef int (*sched_domain_flags_f)();
+
+struct sd_data {
+ struct sched_domain **sd;
+ struct sched_domain_shared **sds;
+ struct sched_group **sg;
+ struct sched_group_capacity **sgc;
+};
+
+struct sched_domain_topology_level {
+ sched_domain_mask_f mask;
+ sched_domain_flags_f sd_flags;
+ int flags;
+ int numa_level;
+ struct sd_data data;
+ char *name;
+};
+
+enum membarrier_cmd {
+ MEMBARRIER_CMD_QUERY = 0,
+ MEMBARRIER_CMD_GLOBAL = 1,
+ MEMBARRIER_CMD_GLOBAL_EXPEDITED = 2,
+ MEMBARRIER_CMD_REGISTER_GLOBAL_EXPEDITED = 4,
+ MEMBARRIER_CMD_PRIVATE_EXPEDITED = 8,
+ MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED = 16,
+ MEMBARRIER_CMD_PRIVATE_EXPEDITED_SYNC_CORE = 32,
+ MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_SYNC_CORE = 64,
+ MEMBARRIER_CMD_PRIVATE_EXPEDITED_RSEQ = 128,
+ MEMBARRIER_CMD_REGISTER_PRIVATE_EXPEDITED_RSEQ = 256,
+ MEMBARRIER_CMD_SHARED = 1,
+};
+
+enum membarrier_cmd_flag {
+ MEMBARRIER_CMD_FLAG_CPU = 1,
+};
+
+enum sched_tunable_scaling {
+ SCHED_TUNABLESCALING_NONE = 0,
+ SCHED_TUNABLESCALING_LOG = 1,
+ SCHED_TUNABLESCALING_LINEAR = 2,
+ SCHED_TUNABLESCALING_END = 3,
+};
+
+enum numa_topology_type {
+ NUMA_DIRECT = 0,
+ NUMA_GLUELESS_MESH = 1,
+ NUMA_BACKPLANE = 2,
+};
+
+struct sched_entity_stats {
+ struct sched_entity se;
+ struct sched_statistics stats;
+};
+
+enum cpu_util_type {
+ FREQUENCY_UTIL = 0,
+ ENERGY_UTIL = 1,
+};
+
+struct sched_clock_data {
+ u64 tick_raw;
+ u64 tick_gtod;
+ u64 clock;
+};
+
+enum cpuacct_stat_index {
+ CPUACCT_STAT_USER = 0,
+ CPUACCT_STAT_SYSTEM = 1,
+ CPUACCT_STAT_NSTATS = 2,
+};
+
+struct cpuacct {
+ struct cgroup_subsys_state css;
+ u64 *cpuusage;
+ struct kernel_cpustat *cpustat;
+};
+
+struct sugov_tunables {
+ struct gov_attr_set attr_set;
+ unsigned int rate_limit_us;
+};
+
+struct sugov_policy {
+ struct cpufreq_policy *policy;
+ struct sugov_tunables *tunables;
+ struct list_head tunables_hook;
+ raw_spinlock_t update_lock;
+ u64 last_freq_update_time;
+ s64 freq_update_delay_ns;
+ unsigned int next_freq;
+ unsigned int cached_raw_freq;
+ struct irq_work irq_work;
+ struct kthread_work work;
+ struct mutex work_lock;
+ struct kthread_worker worker;
+ struct task_struct *thread;
+ bool work_in_progress;
+ bool limits_changed;
+ bool need_freq_update;
+};
+
+struct sugov_cpu {
+ struct update_util_data update_util;
+ struct sugov_policy *sg_policy;
+ unsigned int cpu;
+ bool iowait_boost_pending;
+ unsigned int iowait_boost;
+ u64 last_update;
+ long unsigned int util;
+ long unsigned int bw_dl;
+ long unsigned int max;
+ long unsigned int saved_idle_calls;
+};
+
+struct s_data {
+ struct sched_domain **sd;
+ struct root_domain *rd;
+};
+
+enum s_alloc {
+ sa_rootdomain = 0,
+ sa_sd = 1,
+ sa_sd_storage = 2,
+ sa_none = 3,
+};
+
+struct asym_cap_data {
+ struct list_head link;
+ long unsigned int capacity;
+ long unsigned int cpus[0];
+};
+
+enum hk_flags {
+ HK_FLAG_TIMER = 1,
+ HK_FLAG_RCU = 2,
+ HK_FLAG_MISC = 4,
+ HK_FLAG_SCHED = 8,
+ HK_FLAG_TICK = 16,
+ HK_FLAG_DOMAIN = 32,
+ HK_FLAG_WQ = 64,
+ HK_FLAG_MANAGED_IRQ = 128,
+ HK_FLAG_KTHREAD = 256,
+};
+
+struct housekeeping {
+ struct cpumask cpumasks[9];
+ long unsigned int flags;
+};
+
+struct kioctx;
+
+struct kioctx_table {
+ struct callback_head rcu;
+ unsigned int nr;
+ struct kioctx *table[0];
+};
+
+typedef __kernel_ulong_t aio_context_t;
+
+enum {
+ IOCB_CMD_PREAD = 0,
+ IOCB_CMD_PWRITE = 1,
+ IOCB_CMD_FSYNC = 2,
+ IOCB_CMD_FDSYNC = 3,
+ IOCB_CMD_POLL = 5,
+ IOCB_CMD_NOOP = 6,
+ IOCB_CMD_PREADV = 7,
+ IOCB_CMD_PWRITEV = 8,
+};
+
+struct io_event {
+ __u64 data;
+ __u64 obj;
+ __s64 res;
+ __s64 res2;
+};
+
+struct iocb {
+ __u64 aio_data;
+ __u32 aio_key;
+ __kernel_rwf_t aio_rw_flags;
+ __u16 aio_lio_opcode;
+ __s16 aio_reqprio;
+ __u32 aio_fildes;
+ __u64 aio_buf;
+ __u64 aio_nbytes;
+ __s64 aio_offset;
+ __u64 aio_reserved2;
+ __u32 aio_flags;
+ __u32 aio_resfd;
+};
+
+typedef int kiocb_cancel_fn(struct kiocb *);
+
+struct aio_ring {
+ unsigned int id;
+ unsigned int nr;
+ unsigned int head;
+ unsigned int tail;
+ unsigned int magic;
+ unsigned int compat_features;
+ unsigned int incompat_features;
+ unsigned int header_length;
+ struct io_event io_events[0];
+};
+
+struct kioctx_cpu;
+
+struct ctx_rq_wait;
+
+struct kioctx {
+ struct percpu_ref users;
+ atomic_t dead;
+ struct percpu_ref reqs;
+ long unsigned int user_id;
+ struct kioctx_cpu *cpu;
+ unsigned int req_batch;
+ unsigned int max_reqs;
+ unsigned int nr_events;
+ long unsigned int mmap_base;
+ long unsigned int mmap_size;
+ struct page **ring_pages;
+ long int nr_pages;
+ struct rcu_work free_rwork;
+ struct ctx_rq_wait *rq_wait;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct {
+ atomic_t reqs_available;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ };
+ struct {
+ spinlock_t ctx_lock;
+ struct list_head active_reqs;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ };
+ struct {
+ struct mutex ring_lock;
+ wait_queue_head_t wait;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ };
+ struct {
+ unsigned int tail;
+ unsigned int completed_events;
+ spinlock_t completion_lock;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ };
+ struct page *internal_pages[8];
+ struct file *aio_ring_file;
+ unsigned int id;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct kioctx_cpu {
+ unsigned int reqs_available;
+};
+
+struct ctx_rq_wait {
+ struct completion comp;
+ atomic_t count;
+};
+
+struct fsync_iocb {
+ struct file *file;
+ struct work_struct work;
+ bool datasync;
+ struct cred *creds;
+};
+
+struct poll_iocb {
+ struct file *file;
+ struct wait_queue_head *head;
+ __poll_t events;
+ bool cancelled;
+ bool work_scheduled;
+ bool work_need_resched;
+ struct wait_queue_entry wait;
+ struct work_struct work;
+};
+
+struct aio_kiocb {
+ union {
+ struct file *ki_filp;
+ struct kiocb rw;
+ struct fsync_iocb fsync;
+ struct poll_iocb poll;
+ };
+ struct kioctx *ki_ctx;
+ kiocb_cancel_fn *ki_cancel;
+ struct io_event ki_res;
+ struct list_head ki_list;
+ refcount_t ki_refcnt;
+ struct eventfd_ctx *ki_eventfd;
+};
+
+struct aio_poll_table {
+ struct poll_table_struct pt;
+ struct aio_kiocb *iocb;
+ bool queued;
+ int error;
+};
+
+struct __aio_sigset {
+ const sigset_t *sigmask;
+ size_t sigsetsize;
+};
+
+typedef short unsigned int __kernel_uid16_t;
+
+typedef short unsigned int __kernel_gid16_t;
+
+typedef __kernel_uid16_t uid16_t;
+
+typedef __kernel_gid16_t gid16_t;
+
+struct ext4_io_end_vec {
+ struct list_head list;
+ loff_t offset;
+ ssize_t size;
+};
+
+struct ext4_io_end {
+ struct list_head list;
+ handle_t *handle;
+ struct inode *inode;
+ struct bio *bio;
+ unsigned int flag;
+ refcount_t count;
+ struct list_head list_vec;
+};
+
+typedef struct ext4_io_end ext4_io_end_t;
+
+struct ext4_io_submit {
+ struct writeback_control *io_wbc;
+ struct bio *io_bio;
+ ext4_io_end_t *io_end;
+ sector_t io_next_block;
+};
+
+struct ext4_group_desc {
+ __le32 bg_block_bitmap_lo;
+ __le32 bg_inode_bitmap_lo;
+ __le32 bg_inode_table_lo;
+ __le16 bg_free_blocks_count_lo;
+ __le16 bg_free_inodes_count_lo;
+ __le16 bg_used_dirs_count_lo;
+ __le16 bg_flags;
+ __le32 bg_exclude_bitmap_lo;
+ __le16 bg_block_bitmap_csum_lo;
+ __le16 bg_inode_bitmap_csum_lo;
+ __le16 bg_itable_unused_lo;
+ __le16 bg_checksum;
+ __le32 bg_block_bitmap_hi;
+ __le32 bg_inode_bitmap_hi;
+ __le32 bg_inode_table_hi;
+ __le16 bg_free_blocks_count_hi;
+ __le16 bg_free_inodes_count_hi;
+ __le16 bg_used_dirs_count_hi;
+ __le16 bg_itable_unused_hi;
+ __le32 bg_exclude_bitmap_hi;
+ __le16 bg_block_bitmap_csum_hi;
+ __le16 bg_inode_bitmap_csum_hi;
+ __u32 bg_reserved;
+};
+
+enum {
+ ES_WRITTEN_B = 0,
+ ES_UNWRITTEN_B = 1,
+ ES_DELAYED_B = 2,
+ ES_HOLE_B = 3,
+ ES_REFERENCED_B = 4,
+ ES_FLAGS = 5,
+};
+
+struct ext4_xattr_ibody_header {
+ __le32 h_magic;
+};
+
+struct ext4_xattr_inode_array {
+ unsigned int count;
+ struct inode *inodes[0];
+};
+
+struct mpage_da_data {
+ struct inode *inode;
+ struct writeback_control *wbc;
+ long unsigned int first_page;
+ long unsigned int next_page;
+ long unsigned int last_page;
+ struct ext4_map_blocks map;
+ struct ext4_io_submit io_submit;
+ unsigned int do_map: 1;
+ unsigned int scanned_until_end: 1;
+};
+
+struct fsverity_info;
+
+enum {
+ PERCPU_REF_INIT_ATOMIC = 1,
+ PERCPU_REF_INIT_DEAD = 2,
+ PERCPU_REF_ALLOW_REINIT = 4,
+};
+
+typedef unsigned char u_char;
+
+typedef short unsigned int u_short;
+
+struct fbcon_display {
+ const u_char *fontdata;
+ int userfont;
+ u_short inverse;
+ short int yscroll;
+ int vrows;
+ int cursor_shape;
+ int con_rotate;
+ u32 xres_virtual;
+ u32 yres_virtual;
+ u32 height;
+ u32 width;
+ u32 bits_per_pixel;
+ u32 grayscale;
+ u32 nonstd;
+ u32 accel_flags;
+ u32 rotate;
+ struct fb_bitfield red;
+ struct fb_bitfield green;
+ struct fb_bitfield blue;
+ struct fb_bitfield transp;
+ const struct fb_videomode *mode;
+};
+
+struct fbcon_ops {
+ void (*bmove)(struct vc_data *, struct fb_info *, int, int, int, int, int, int);
+ void (*clear)(struct vc_data *, struct fb_info *, int, int, int, int);
+ void (*putcs)(struct vc_data *, struct fb_info *, const short unsigned int *, int, int, int, int, int);
+ void (*clear_margins)(struct vc_data *, struct fb_info *, int, int);
+ void (*cursor)(struct vc_data *, struct fb_info *, int, int, int);
+ int (*update_start)(struct fb_info *);
+ int (*rotate_font)(struct fb_info *, struct vc_data *);
+ struct fb_var_screeninfo var;
+ struct delayed_work cursor_work;
+ struct fb_cursor cursor_state;
+ struct fbcon_display *p;
+ struct fb_info *info;
+ int currcon;
+ int cur_blink_jiffies;
+ int cursor_flash;
+ int cursor_reset;
+ int blank_state;
+ int graphics;
+ int save_graphics;
+ bool initialized;
+ int rotate;
+ int cur_rotate;
+ char *cursor_data;
+ u8 *fontbuffer;
+ u8 *fontdata;
+ u8 *cursor_src;
+ u32 cursor_size;
+ u32 fd_size;
+};
+
+struct acpi_pci_id {
+ u16 segment;
+ u16 bus;
+ u16 device;
+ u16 function;
+};
+
+struct acpi_pci_device {
+ acpi_handle device;
+ struct acpi_pci_device *next;
+};
+
+typedef acpi_status (*acpi_walk_aml_callback)(u8 *, u32, u32, u8, void **);
+
+struct virtio_pci_common_cfg {
+ __le32 device_feature_select;
+ __le32 device_feature;
+ __le32 guest_feature_select;
+ __le32 guest_feature;
+ __le16 msix_config;
+ __le16 num_queues;
+ __u8 device_status;
+ __u8 config_generation;
+ __le16 queue_select;
+ __le16 queue_size;
+ __le16 queue_msix_vector;
+ __le16 queue_enable;
+ __le16 queue_notify_off;
+ __le32 queue_desc_lo;
+ __le32 queue_desc_hi;
+ __le32 queue_avail_lo;
+ __le32 queue_avail_hi;
+ __le32 queue_used_lo;
+ __le32 queue_used_hi;
+};
+
+struct virtio_pci_modern_common_cfg {
+ struct virtio_pci_common_cfg cfg;
+ __le16 queue_notify_data;
+ __le16 queue_reset;
+};
+
+struct virtio_pci_modern_device {
+ struct pci_dev *pci_dev;
+ struct virtio_pci_common_cfg *common;
+ void *device;
+ void *notify_base;
+ resource_size_t notify_pa;
+ u8 *isr;
+ size_t notify_len;
+ size_t device_len;
+ int notify_map_cap;
+ u32 notify_offset_multiplier;
+ int modern_bars;
+ struct virtio_device_id id;
+};
+
+struct phc_vclocks_reply_data {
+ struct ethnl_reply_data base;
+ int num;
+ int *index;
+};
+
+struct uncached_list {
+ spinlock_t lock;
+ struct list_head head;
+ struct list_head quarantine;
+};
+
+struct rt_cache_stat {
+ unsigned int in_slow_tot;
+ unsigned int in_slow_mc;
+ unsigned int in_no_route;
+ unsigned int in_brd;
+ unsigned int in_martian_dst;
+ unsigned int in_martian_src;
+ unsigned int out_slow_tot;
+ unsigned int out_slow_mc;
+};
+
+enum mmio_type {
+ MMIO_DECODE_FAILED = 0,
+ MMIO_WRITE = 1,
+ MMIO_WRITE_IMM = 2,
+ MMIO_READ = 3,
+ MMIO_READ_ZERO_EXTEND = 4,
+ MMIO_READ_SIGN_EXTEND = 5,
+ MMIO_MOVS = 6,
+};
+
+enum reg_type {
+ REG_TYPE_RM = 0,
+ REG_TYPE_REG = 1,
+ REG_TYPE_INDEX = 2,
+ REG_TYPE_BASE = 3,
+};
+
+union efi_boot_services;
+
+typedef union efi_boot_services efi_boot_services_t;
+
+typedef struct {
+ efi_table_hdr_t hdr;
+ u32 fw_vendor;
+ u32 fw_revision;
+ u32 con_in_handle;
+ u32 con_in;
+ u32 con_out_handle;
+ u32 con_out;
+ u32 stderr_handle;
+ u32 stderr;
+ u32 runtime;
+ u32 boottime;
+ u32 nr_tables;
+ u32 tables;
+} efi_system_table_32_t;
+
+union efi_simple_text_input_protocol;
+
+typedef union efi_simple_text_input_protocol efi_simple_text_input_protocol_t;
+
+union efi_simple_text_output_protocol;
+
+typedef union efi_simple_text_output_protocol efi_simple_text_output_protocol_t;
+
+typedef union {
+ struct {
+ efi_table_hdr_t hdr;
+ long unsigned int fw_vendor;
+ u32 fw_revision;
+ long unsigned int con_in_handle;
+ efi_simple_text_input_protocol_t *con_in;
+ long unsigned int con_out_handle;
+ efi_simple_text_output_protocol_t *con_out;
+ long unsigned int stderr_handle;
+ long unsigned int stderr;
+ efi_runtime_services_t *runtime;
+ efi_boot_services_t *boottime;
+ long unsigned int nr_tables;
+ long unsigned int tables;
+ };
+ efi_system_table_32_t mixed_mode;
+} efi_system_table_t;
+
+typedef int (*efi_memattr_perm_setter)(struct mm_struct *, efi_memory_desc_t *);
+
+struct mmu_gather_batch {
+ struct mmu_gather_batch *next;
+ unsigned int nr;
+ unsigned int max;
+ struct page *pages[0];
+};
+
+struct mmu_gather {
+ struct mm_struct *mm;
+ long unsigned int start;
+ long unsigned int end;
+ unsigned int fullmm: 1;
+ unsigned int need_flush_all: 1;
+ unsigned int freed_tables: 1;
+ unsigned int cleared_ptes: 1;
+ unsigned int cleared_pmds: 1;
+ unsigned int cleared_puds: 1;
+ unsigned int cleared_p4ds: 1;
+ unsigned int vma_exec: 1;
+ unsigned int vma_huge: 1;
+ unsigned int vma_pfn: 1;
+ unsigned int batch_count;
+ struct mmu_gather_batch *active;
+ struct mmu_gather_batch local;
+ struct page *__pages[8];
+};
+
+enum wb_state {
+ WB_registered = 0,
+ WB_writeback_running = 1,
+ WB_has_dirty_io = 2,
+ WB_start_all = 3,
+};
+
+struct wb_writeback_work {
+ long int nr_pages;
+ struct super_block *sb;
+ enum writeback_sync_modes sync_mode;
+ unsigned int tagged_writepages: 1;
+ unsigned int for_kupdate: 1;
+ unsigned int range_cyclic: 1;
+ unsigned int for_background: 1;
+ unsigned int for_sync: 1;
+ unsigned int auto_free: 1;
+ enum wb_reason reason;
+ struct list_head list;
+ struct wb_completion *done;
+};
+
+struct trace_event_raw_writeback_folio_template {
+ struct trace_entry ent;
+ char name[32];
+ ino_t ino;
+ long unsigned int index;
+ char __data[0];
+};
+
+struct trace_event_raw_writeback_dirty_inode_template {
+ struct trace_entry ent;
+ char name[32];
+ ino_t ino;
+ long unsigned int state;
+ long unsigned int flags;
+ char __data[0];
+};
+
+struct trace_event_raw_inode_foreign_history {
+ struct trace_entry ent;
+ char name[32];
+ ino_t ino;
+ ino_t cgroup_ino;
+ unsigned int history;
+ char __data[0];
+};
+
+struct trace_event_raw_inode_switch_wbs {
+ struct trace_entry ent;
+ char name[32];
+ ino_t ino;
+ ino_t old_cgroup_ino;
+ ino_t new_cgroup_ino;
+ char __data[0];
+};
+
+struct trace_event_raw_track_foreign_dirty {
+ struct trace_entry ent;
+ char name[32];
+ u64 bdi_id;
+ ino_t ino;
+ unsigned int memcg_id;
+ ino_t cgroup_ino;
+ ino_t page_cgroup_ino;
+ char __data[0];
+};
+
+struct trace_event_raw_flush_foreign {
+ struct trace_entry ent;
+ char name[32];
+ ino_t cgroup_ino;
+ unsigned int frn_bdi_id;
+ unsigned int frn_memcg_id;
+ char __data[0];
+};
+
+struct trace_event_raw_writeback_write_inode_template {
+ struct trace_entry ent;
+ char name[32];
+ ino_t ino;
+ int sync_mode;
+ ino_t cgroup_ino;
+ char __data[0];
+};
+
+struct trace_event_raw_writeback_work_class {
+ struct trace_entry ent;
+ char name[32];
+ long int nr_pages;
+ dev_t sb_dev;
+ int sync_mode;
+ int for_kupdate;
+ int range_cyclic;
+ int for_background;
+ int reason;
+ ino_t cgroup_ino;
+ char __data[0];
+};
+
+struct trace_event_raw_writeback_pages_written {
+ struct trace_entry ent;
+ long int pages;
+ char __data[0];
+};
+
+struct trace_event_raw_writeback_class {
+ struct trace_entry ent;
+ char name[32];
+ ino_t cgroup_ino;
+ char __data[0];
+};
+
+struct trace_event_raw_writeback_bdi_register {
+ struct trace_entry ent;
+ char name[32];
+ char __data[0];
+};
+
+struct trace_event_raw_wbc_class {
+ struct trace_entry ent;
+ char name[32];
+ long int nr_to_write;
+ long int pages_skipped;
+ int sync_mode;
+ int for_kupdate;
+ int for_background;
+ int for_reclaim;
+ int range_cyclic;
+ long int range_start;
+ long int range_end;
+ ino_t cgroup_ino;
+ char __data[0];
+};
+
+struct trace_event_raw_writeback_queue_io {
+ struct trace_entry ent;
+ char name[32];
+ long unsigned int older;
+ long int age;
+ int moved;
+ int reason;
+ ino_t cgroup_ino;
+ char __data[0];
+};
+
+struct trace_event_raw_global_dirty_state {
+ struct trace_entry ent;
+ long unsigned int nr_dirty;
+ long unsigned int nr_writeback;
+ long unsigned int background_thresh;
+ long unsigned int dirty_thresh;
+ long unsigned int dirty_limit;
+ long unsigned int nr_dirtied;
+ long unsigned int nr_written;
+ char __data[0];
+};
+
+struct trace_event_raw_bdi_dirty_ratelimit {
+ struct trace_entry ent;
+ char bdi[32];
+ long unsigned int write_bw;
+ long unsigned int avg_write_bw;
+ long unsigned int dirty_rate;
+ long unsigned int dirty_ratelimit;
+ long unsigned int task_ratelimit;
+ long unsigned int balanced_dirty_ratelimit;
+ ino_t cgroup_ino;
+ char __data[0];
+};
+
+struct trace_event_raw_balance_dirty_pages {
+ struct trace_entry ent;
+ char bdi[32];
+ long unsigned int limit;
+ long unsigned int setpoint;
+ long unsigned int dirty;
+ long unsigned int bdi_setpoint;
+ long unsigned int bdi_dirty;
+ long unsigned int dirty_ratelimit;
+ long unsigned int task_ratelimit;
+ unsigned int dirtied;
+ unsigned int dirtied_pause;
+ long unsigned int paused;
+ long int pause;
+ long unsigned int period;
+ long int think;
+ ino_t cgroup_ino;
+ char __data[0];
+};
+
+struct trace_event_raw_writeback_sb_inodes_requeue {
+ struct trace_entry ent;
+ char name[32];
+ ino_t ino;
+ long unsigned int state;
+ long unsigned int dirtied_when;
+ ino_t cgroup_ino;
+ char __data[0];
+};
+
+struct trace_event_raw_writeback_single_inode_template {
+ struct trace_entry ent;
+ char name[32];
+ ino_t ino;
+ long unsigned int state;
+ long unsigned int dirtied_when;
+ long unsigned int writeback_index;
+ long int nr_to_write;
+ long unsigned int wrote;
+ ino_t cgroup_ino;
+ char __data[0];
+};
+
+struct trace_event_raw_writeback_inode_template {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ long unsigned int state;
+ __u16 mode;
+ long unsigned int dirtied_when;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_writeback_folio_template {};
+
+struct trace_event_data_offsets_writeback_dirty_inode_template {};
+
+struct trace_event_data_offsets_inode_foreign_history {};
+
+struct trace_event_data_offsets_inode_switch_wbs {};
+
+struct trace_event_data_offsets_track_foreign_dirty {};
+
+struct trace_event_data_offsets_flush_foreign {};
+
+struct trace_event_data_offsets_writeback_write_inode_template {};
+
+struct trace_event_data_offsets_writeback_work_class {};
+
+struct trace_event_data_offsets_writeback_pages_written {};
+
+struct trace_event_data_offsets_writeback_class {};
+
+struct trace_event_data_offsets_writeback_bdi_register {};
+
+struct trace_event_data_offsets_wbc_class {};
+
+struct trace_event_data_offsets_writeback_queue_io {};
+
+struct trace_event_data_offsets_global_dirty_state {};
+
+struct trace_event_data_offsets_bdi_dirty_ratelimit {};
+
+struct trace_event_data_offsets_balance_dirty_pages {};
+
+struct trace_event_data_offsets_writeback_sb_inodes_requeue {};
+
+struct trace_event_data_offsets_writeback_single_inode_template {};
+
+struct trace_event_data_offsets_writeback_inode_template {};
+
+typedef void (*btf_trace_writeback_dirty_folio)(void *, struct folio *, struct address_space *);
+
+typedef void (*btf_trace_folio_wait_writeback)(void *, struct folio *, struct address_space *);
+
+typedef void (*btf_trace_writeback_mark_inode_dirty)(void *, struct inode *, int);
+
+typedef void (*btf_trace_writeback_dirty_inode_start)(void *, struct inode *, int);
+
+typedef void (*btf_trace_writeback_dirty_inode)(void *, struct inode *, int);
+
+typedef void (*btf_trace_inode_foreign_history)(void *, struct inode *, struct writeback_control *, unsigned int);
+
+typedef void (*btf_trace_inode_switch_wbs)(void *, struct inode *, struct bdi_writeback *, struct bdi_writeback *);
+
+typedef void (*btf_trace_track_foreign_dirty)(void *, struct folio *, struct bdi_writeback *);
+
+typedef void (*btf_trace_flush_foreign)(void *, struct bdi_writeback *, unsigned int, unsigned int);
+
+typedef void (*btf_trace_writeback_write_inode_start)(void *, struct inode *, struct writeback_control *);
+
+typedef void (*btf_trace_writeback_write_inode)(void *, struct inode *, struct writeback_control *);
+
+typedef void (*btf_trace_writeback_queue)(void *, struct bdi_writeback *, struct wb_writeback_work *);
+
+typedef void (*btf_trace_writeback_exec)(void *, struct bdi_writeback *, struct wb_writeback_work *);
+
+typedef void (*btf_trace_writeback_start)(void *, struct bdi_writeback *, struct wb_writeback_work *);
+
+typedef void (*btf_trace_writeback_written)(void *, struct bdi_writeback *, struct wb_writeback_work *);
+
+typedef void (*btf_trace_writeback_wait)(void *, struct bdi_writeback *, struct wb_writeback_work *);
+
+typedef void (*btf_trace_writeback_pages_written)(void *, long int);
+
+typedef void (*btf_trace_writeback_wake_background)(void *, struct bdi_writeback *);
+
+typedef void (*btf_trace_writeback_bdi_register)(void *, struct backing_dev_info *);
+
+typedef void (*btf_trace_wbc_writepage)(void *, struct writeback_control *, struct backing_dev_info *);
+
+typedef void (*btf_trace_writeback_queue_io)(void *, struct bdi_writeback *, struct wb_writeback_work *, long unsigned int, int);
+
+typedef void (*btf_trace_global_dirty_state)(void *, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_bdi_dirty_ratelimit)(void *, struct bdi_writeback *, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_balance_dirty_pages)(void *, struct bdi_writeback *, long unsigned int, long unsigned int, long unsigned int, long unsigned int, long unsigned int, long unsigned int, long unsigned int, long unsigned int, long unsigned int, long int, long unsigned int);
+
+typedef void (*btf_trace_writeback_sb_inodes_requeue)(void *, struct inode *);
+
+typedef void (*btf_trace_writeback_single_inode_start)(void *, struct inode *, struct writeback_control *, long unsigned int);
+
+typedef void (*btf_trace_writeback_single_inode)(void *, struct inode *, struct writeback_control *, long unsigned int);
+
+typedef void (*btf_trace_writeback_lazytime)(void *, struct inode *);
+
+typedef void (*btf_trace_writeback_lazytime_iput)(void *, struct inode *);
+
+typedef void (*btf_trace_writeback_dirty_inode_enqueue)(void *, struct inode *);
+
+typedef void (*btf_trace_sb_mark_inode_writeback)(void *, struct inode *);
+
+typedef void (*btf_trace_sb_clear_inode_writeback)(void *, struct inode *);
+
+struct inode_switch_wbs_context {
+ struct rcu_work work;
+ struct bdi_writeback *new_wb;
+ struct inode *inodes[0];
+};
+
+enum dmi_entry_type {
+ DMI_ENTRY_BIOS = 0,
+ DMI_ENTRY_SYSTEM = 1,
+ DMI_ENTRY_BASEBOARD = 2,
+ DMI_ENTRY_CHASSIS = 3,
+ DMI_ENTRY_PROCESSOR = 4,
+ DMI_ENTRY_MEM_CONTROLLER = 5,
+ DMI_ENTRY_MEM_MODULE = 6,
+ DMI_ENTRY_CACHE = 7,
+ DMI_ENTRY_PORT_CONNECTOR = 8,
+ DMI_ENTRY_SYSTEM_SLOT = 9,
+ DMI_ENTRY_ONBOARD_DEVICE = 10,
+ DMI_ENTRY_OEMSTRINGS = 11,
+ DMI_ENTRY_SYSCONF = 12,
+ DMI_ENTRY_BIOS_LANG = 13,
+ DMI_ENTRY_GROUP_ASSOC = 14,
+ DMI_ENTRY_SYSTEM_EVENT_LOG = 15,
+ DMI_ENTRY_PHYS_MEM_ARRAY = 16,
+ DMI_ENTRY_MEM_DEVICE = 17,
+ DMI_ENTRY_32_MEM_ERROR = 18,
+ DMI_ENTRY_MEM_ARRAY_MAPPED_ADDR = 19,
+ DMI_ENTRY_MEM_DEV_MAPPED_ADDR = 20,
+ DMI_ENTRY_BUILTIN_POINTING_DEV = 21,
+ DMI_ENTRY_PORTABLE_BATTERY = 22,
+ DMI_ENTRY_SYSTEM_RESET = 23,
+ DMI_ENTRY_HW_SECURITY = 24,
+ DMI_ENTRY_SYSTEM_POWER_CONTROLS = 25,
+ DMI_ENTRY_VOLTAGE_PROBE = 26,
+ DMI_ENTRY_COOLING_DEV = 27,
+ DMI_ENTRY_TEMP_PROBE = 28,
+ DMI_ENTRY_ELECTRICAL_CURRENT_PROBE = 29,
+ DMI_ENTRY_OOB_REMOTE_ACCESS = 30,
+ DMI_ENTRY_BIS_ENTRY = 31,
+ DMI_ENTRY_SYSTEM_BOOT = 32,
+ DMI_ENTRY_MGMT_DEV = 33,
+ DMI_ENTRY_MGMT_DEV_COMPONENT = 34,
+ DMI_ENTRY_MGMT_DEV_THRES = 35,
+ DMI_ENTRY_MEM_CHANNEL = 36,
+ DMI_ENTRY_IPMI_DEV = 37,
+ DMI_ENTRY_SYS_POWER_SUPPLY = 38,
+ DMI_ENTRY_ADDITIONAL = 39,
+ DMI_ENTRY_ONBOARD_DEV_EXT = 40,
+ DMI_ENTRY_MGMT_CONTROLLER_HOST = 41,
+ DMI_ENTRY_INACTIVE = 126,
+ DMI_ENTRY_END_OF_TABLE = 127,
+};
+
+struct dmi_header {
+ u8 type;
+ u8 length;
+ u16 handle;
+};
+
+typedef int (*acpi_op_add)(struct acpi_device *);
+
+typedef int (*acpi_op_remove)(struct acpi_device *);
+
+typedef void (*acpi_op_notify)(struct acpi_device *, u32);
+
+struct acpi_device_ops {
+ acpi_op_add add;
+ acpi_op_remove remove;
+ acpi_op_notify notify;
+};
+
+struct acpi_driver {
+ char name[80];
+ char class[80];
+ const struct acpi_device_id *ids;
+ unsigned int flags;
+ struct acpi_device_ops ops;
+ struct device_driver drv;
+ struct module *owner;
+};
+
+enum {
+ POWER_SUPPLY_STATUS_UNKNOWN = 0,
+ POWER_SUPPLY_STATUS_CHARGING = 1,
+ POWER_SUPPLY_STATUS_DISCHARGING = 2,
+ POWER_SUPPLY_STATUS_NOT_CHARGING = 3,
+ POWER_SUPPLY_STATUS_FULL = 4,
+};
+
+enum {
+ POWER_SUPPLY_TECHNOLOGY_UNKNOWN = 0,
+ POWER_SUPPLY_TECHNOLOGY_NiMH = 1,
+ POWER_SUPPLY_TECHNOLOGY_LION = 2,
+ POWER_SUPPLY_TECHNOLOGY_LIPO = 3,
+ POWER_SUPPLY_TECHNOLOGY_LiFe = 4,
+ POWER_SUPPLY_TECHNOLOGY_NiCd = 5,
+ POWER_SUPPLY_TECHNOLOGY_LiMn = 6,
+};
+
+enum {
+ POWER_SUPPLY_CAPACITY_LEVEL_UNKNOWN = 0,
+ POWER_SUPPLY_CAPACITY_LEVEL_CRITICAL = 1,
+ POWER_SUPPLY_CAPACITY_LEVEL_LOW = 2,
+ POWER_SUPPLY_CAPACITY_LEVEL_NORMAL = 3,
+ POWER_SUPPLY_CAPACITY_LEVEL_HIGH = 4,
+ POWER_SUPPLY_CAPACITY_LEVEL_FULL = 5,
+};
+
+enum power_supply_property {
+ POWER_SUPPLY_PROP_STATUS = 0,
+ POWER_SUPPLY_PROP_CHARGE_TYPE = 1,
+ POWER_SUPPLY_PROP_HEALTH = 2,
+ POWER_SUPPLY_PROP_PRESENT = 3,
+ POWER_SUPPLY_PROP_ONLINE = 4,
+ POWER_SUPPLY_PROP_AUTHENTIC = 5,
+ POWER_SUPPLY_PROP_TECHNOLOGY = 6,
+ POWER_SUPPLY_PROP_CYCLE_COUNT = 7,
+ POWER_SUPPLY_PROP_VOLTAGE_MAX = 8,
+ POWER_SUPPLY_PROP_VOLTAGE_MIN = 9,
+ POWER_SUPPLY_PROP_VOLTAGE_MAX_DESIGN = 10,
+ POWER_SUPPLY_PROP_VOLTAGE_MIN_DESIGN = 11,
+ POWER_SUPPLY_PROP_VOLTAGE_NOW = 12,
+ POWER_SUPPLY_PROP_VOLTAGE_AVG = 13,
+ POWER_SUPPLY_PROP_VOLTAGE_OCV = 14,
+ POWER_SUPPLY_PROP_VOLTAGE_BOOT = 15,
+ POWER_SUPPLY_PROP_CURRENT_MAX = 16,
+ POWER_SUPPLY_PROP_CURRENT_NOW = 17,
+ POWER_SUPPLY_PROP_CURRENT_AVG = 18,
+ POWER_SUPPLY_PROP_CURRENT_BOOT = 19,
+ POWER_SUPPLY_PROP_POWER_NOW = 20,
+ POWER_SUPPLY_PROP_POWER_AVG = 21,
+ POWER_SUPPLY_PROP_CHARGE_FULL_DESIGN = 22,
+ POWER_SUPPLY_PROP_CHARGE_EMPTY_DESIGN = 23,
+ POWER_SUPPLY_PROP_CHARGE_FULL = 24,
+ POWER_SUPPLY_PROP_CHARGE_EMPTY = 25,
+ POWER_SUPPLY_PROP_CHARGE_NOW = 26,
+ POWER_SUPPLY_PROP_CHARGE_AVG = 27,
+ POWER_SUPPLY_PROP_CHARGE_COUNTER = 28,
+ POWER_SUPPLY_PROP_CONSTANT_CHARGE_CURRENT = 29,
+ POWER_SUPPLY_PROP_CONSTANT_CHARGE_CURRENT_MAX = 30,
+ POWER_SUPPLY_PROP_CONSTANT_CHARGE_VOLTAGE = 31,
+ POWER_SUPPLY_PROP_CONSTANT_CHARGE_VOLTAGE_MAX = 32,
+ POWER_SUPPLY_PROP_CHARGE_CONTROL_LIMIT = 33,
+ POWER_SUPPLY_PROP_CHARGE_CONTROL_LIMIT_MAX = 34,
+ POWER_SUPPLY_PROP_CHARGE_CONTROL_START_THRESHOLD = 35,
+ POWER_SUPPLY_PROP_CHARGE_CONTROL_END_THRESHOLD = 36,
+ POWER_SUPPLY_PROP_CHARGE_BEHAVIOUR = 37,
+ POWER_SUPPLY_PROP_INPUT_CURRENT_LIMIT = 38,
+ POWER_SUPPLY_PROP_INPUT_VOLTAGE_LIMIT = 39,
+ POWER_SUPPLY_PROP_INPUT_POWER_LIMIT = 40,
+ POWER_SUPPLY_PROP_ENERGY_FULL_DESIGN = 41,
+ POWER_SUPPLY_PROP_ENERGY_EMPTY_DESIGN = 42,
+ POWER_SUPPLY_PROP_ENERGY_FULL = 43,
+ POWER_SUPPLY_PROP_ENERGY_EMPTY = 44,
+ POWER_SUPPLY_PROP_ENERGY_NOW = 45,
+ POWER_SUPPLY_PROP_ENERGY_AVG = 46,
+ POWER_SUPPLY_PROP_CAPACITY = 47,
+ POWER_SUPPLY_PROP_CAPACITY_ALERT_MIN = 48,
+ POWER_SUPPLY_PROP_CAPACITY_ALERT_MAX = 49,
+ POWER_SUPPLY_PROP_CAPACITY_ERROR_MARGIN = 50,
+ POWER_SUPPLY_PROP_CAPACITY_LEVEL = 51,
+ POWER_SUPPLY_PROP_TEMP = 52,
+ POWER_SUPPLY_PROP_TEMP_MAX = 53,
+ POWER_SUPPLY_PROP_TEMP_MIN = 54,
+ POWER_SUPPLY_PROP_TEMP_ALERT_MIN = 55,
+ POWER_SUPPLY_PROP_TEMP_ALERT_MAX = 56,
+ POWER_SUPPLY_PROP_TEMP_AMBIENT = 57,
+ POWER_SUPPLY_PROP_TEMP_AMBIENT_ALERT_MIN = 58,
+ POWER_SUPPLY_PROP_TEMP_AMBIENT_ALERT_MAX = 59,
+ POWER_SUPPLY_PROP_TIME_TO_EMPTY_NOW = 60,
+ POWER_SUPPLY_PROP_TIME_TO_EMPTY_AVG = 61,
+ POWER_SUPPLY_PROP_TIME_TO_FULL_NOW = 62,
+ POWER_SUPPLY_PROP_TIME_TO_FULL_AVG = 63,
+ POWER_SUPPLY_PROP_TYPE = 64,
+ POWER_SUPPLY_PROP_USB_TYPE = 65,
+ POWER_SUPPLY_PROP_SCOPE = 66,
+ POWER_SUPPLY_PROP_PRECHARGE_CURRENT = 67,
+ POWER_SUPPLY_PROP_CHARGE_TERM_CURRENT = 68,
+ POWER_SUPPLY_PROP_CALIBRATE = 69,
+ POWER_SUPPLY_PROP_MANUFACTURE_YEAR = 70,
+ POWER_SUPPLY_PROP_MANUFACTURE_MONTH = 71,
+ POWER_SUPPLY_PROP_MANUFACTURE_DAY = 72,
+ POWER_SUPPLY_PROP_MODEL_NAME = 73,
+ POWER_SUPPLY_PROP_MANUFACTURER = 74,
+ POWER_SUPPLY_PROP_SERIAL_NUMBER = 75,
+};
+
+enum power_supply_type {
+ POWER_SUPPLY_TYPE_UNKNOWN = 0,
+ POWER_SUPPLY_TYPE_BATTERY = 1,
+ POWER_SUPPLY_TYPE_UPS = 2,
+ POWER_SUPPLY_TYPE_MAINS = 3,
+ POWER_SUPPLY_TYPE_USB = 4,
+ POWER_SUPPLY_TYPE_USB_DCP = 5,
+ POWER_SUPPLY_TYPE_USB_CDP = 6,
+ POWER_SUPPLY_TYPE_USB_ACA = 7,
+ POWER_SUPPLY_TYPE_USB_TYPE_C = 8,
+ POWER_SUPPLY_TYPE_USB_PD = 9,
+ POWER_SUPPLY_TYPE_USB_PD_DRP = 10,
+ POWER_SUPPLY_TYPE_APPLE_BRICK_ID = 11,
+ POWER_SUPPLY_TYPE_WIRELESS = 12,
+};
+
+enum power_supply_usb_type {
+ POWER_SUPPLY_USB_TYPE_UNKNOWN = 0,
+ POWER_SUPPLY_USB_TYPE_SDP = 1,
+ POWER_SUPPLY_USB_TYPE_DCP = 2,
+ POWER_SUPPLY_USB_TYPE_CDP = 3,
+ POWER_SUPPLY_USB_TYPE_ACA = 4,
+ POWER_SUPPLY_USB_TYPE_C = 5,
+ POWER_SUPPLY_USB_TYPE_PD = 6,
+ POWER_SUPPLY_USB_TYPE_PD_DRP = 7,
+ POWER_SUPPLY_USB_TYPE_PD_PPS = 8,
+ POWER_SUPPLY_USB_TYPE_APPLE_BRICK_ID = 9,
+};
+
+union power_supply_propval {
+ int intval;
+ const char *strval;
+};
+
+struct power_supply_config {
+ struct device_node *of_node;
+ struct fwnode_handle *fwnode;
+ void *drv_data;
+ const struct attribute_group **attr_grp;
+ char **supplied_to;
+ size_t num_supplicants;
+};
+
+struct power_supply;
+
+struct power_supply_desc {
+ const char *name;
+ enum power_supply_type type;
+ const enum power_supply_usb_type *usb_types;
+ size_t num_usb_types;
+ const enum power_supply_property *properties;
+ size_t num_properties;
+ int (*get_property)(struct power_supply *, enum power_supply_property, union power_supply_propval *);
+ int (*set_property)(struct power_supply *, enum power_supply_property, const union power_supply_propval *);
+ int (*property_is_writeable)(struct power_supply *, enum power_supply_property);
+ void (*external_power_changed)(struct power_supply *);
+ void (*set_charged)(struct power_supply *);
+ bool no_thermal;
+ int use_for_apm;
+};
+
+struct power_supply {
+ const struct power_supply_desc *desc;
+ char **supplied_to;
+ size_t num_supplicants;
+ char **supplied_from;
+ size_t num_supplies;
+ struct device_node *of_node;
+ void *drv_data;
+ struct device dev;
+ struct work_struct changed_work;
+ struct delayed_work deferred_register_work;
+ spinlock_t changed_lock;
+ bool changed;
+ bool initialized;
+ bool removing;
+ atomic_t use_cnt;
+ struct thermal_zone_device *tzd;
+ struct thermal_cooling_device *tcd;
+};
+
+struct acpi_battery_hook {
+ const char *name;
+ int (*add_battery)(struct power_supply *);
+ int (*remove_battery)(struct power_supply *);
+ struct list_head list;
+};
+
+enum {
+ ACPI_BATTERY_ALARM_PRESENT = 0,
+ ACPI_BATTERY_XINFO_PRESENT = 1,
+ ACPI_BATTERY_QUIRK_PERCENTAGE_CAPACITY = 2,
+ ACPI_BATTERY_QUIRK_THINKPAD_MAH = 3,
+ ACPI_BATTERY_QUIRK_DEGRADED_FULL_CHARGE = 4,
+};
+
+struct acpi_battery {
+ struct mutex lock;
+ struct mutex sysfs_lock;
+ struct power_supply *bat;
+ struct power_supply_desc bat_desc;
+ struct acpi_device *device;
+ struct notifier_block pm_nb;
+ struct list_head list;
+ long unsigned int update_time;
+ int revision;
+ int rate_now;
+ int capacity_now;
+ int voltage_now;
+ int design_capacity;
+ int full_charge_capacity;
+ int technology;
+ int design_voltage;
+ int design_capacity_warning;
+ int design_capacity_low;
+ int cycle_count;
+ int measurement_accuracy;
+ int max_sampling_time;
+ int min_sampling_time;
+ int max_averaging_interval;
+ int min_averaging_interval;
+ int capacity_granularity_1;
+ int capacity_granularity_2;
+ int alarm;
+ char model_number[32];
+ char serial_number[32];
+ char type[32];
+ char oem_info[32];
+ int state;
+ int power_unit;
+ long unsigned int flags;
+};
+
+struct acpi_offsets {
+ size_t offset;
+ u8 mode;
+};
+
+struct class_dev_iter {
+ struct klist_iter ki;
+ const struct device_type *type;
+};
+
+struct class_attribute_string {
+ struct class_attribute attr;
+ char *str;
+};
+
+struct class_interface {
+ struct list_head node;
+ struct class *class;
+ int (*add_dev)(struct device *, struct class_interface *);
+ void (*remove_dev)(struct device *, struct class_interface *);
+};
+
+struct class_compat {
+ struct kobject *kobj;
+};
+
+struct input_event {
+ __kernel_ulong_t __sec;
+ __kernel_ulong_t __usec;
+ __u16 type;
+ __u16 code;
+ __s32 value;
+};
+
+struct touchscreen_properties {
+ unsigned int max_x;
+ unsigned int max_y;
+ bool invert_x;
+ bool invert_y;
+ bool swap_x_y;
+};
+
+enum reboot_mode {
+ REBOOT_UNDEFINED = -1,
+ REBOOT_COLD = 0,
+ REBOOT_WARM = 1,
+ REBOOT_HARD = 2,
+ REBOOT_SOFT = 3,
+ REBOOT_GPIO = 4,
+};
+
+enum sys_off_mode {
+ SYS_OFF_MODE_POWER_OFF_PREPARE = 0,
+ SYS_OFF_MODE_POWER_OFF = 1,
+ SYS_OFF_MODE_RESTART_PREPARE = 2,
+ SYS_OFF_MODE_RESTART = 3,
+};
+
+struct sys_off_data {
+ int mode;
+ void *cb_data;
+ const char *cmd;
+};
+
+struct sys_off_handler;
+
+struct linkstate_reply_data {
+ struct ethnl_reply_data base;
+ int link;
+ int sqi;
+ int sqi_max;
+ struct ethtool_link_ext_stats link_stats;
+ bool link_ext_state_provided;
+ struct ethtool_link_ext_state_info ethtool_link_ext_state_info;
+};
+
+enum nf_ip_hook_priorities {
+ NF_IP_PRI_FIRST = -2147483648,
+ NF_IP_PRI_RAW_BEFORE_DEFRAG = -450,
+ NF_IP_PRI_CONNTRACK_DEFRAG = -400,
+ NF_IP_PRI_RAW = -300,
+ NF_IP_PRI_SELINUX_FIRST = -225,
+ NF_IP_PRI_CONNTRACK = -200,
+ NF_IP_PRI_MANGLE = -150,
+ NF_IP_PRI_NAT_DST = -100,
+ NF_IP_PRI_FILTER = 0,
+ NF_IP_PRI_SECURITY = 50,
+ NF_IP_PRI_NAT_SRC = 100,
+ NF_IP_PRI_SELINUX_LAST = 225,
+ NF_IP_PRI_CONNTRACK_HELPER = 300,
+ NF_IP_PRI_CONNTRACK_CONFIRM = 2147483647,
+ NF_IP_PRI_LAST = 2147483647,
+};
+
+struct xt_entry_target {
+ union {
+ struct {
+ __u16 target_size;
+ char name[29];
+ __u8 revision;
+ } user;
+ struct {
+ __u16 target_size;
+ struct xt_target *target;
+ } kernel;
+ __u16 target_size;
+ } u;
+ unsigned char data[0];
+};
+
+struct xt_standard_target {
+ struct xt_entry_target target;
+ int verdict;
+};
+
+struct xt_table_info;
+
+struct xt_table {
+ struct list_head list;
+ unsigned int valid_hooks;
+ struct xt_table_info *private;
+ struct nf_hook_ops *ops;
+ struct module *me;
+ u_int8_t af;
+ int priority;
+ const char name[32];
+};
+
+struct xt_table_info {
+ unsigned int size;
+ unsigned int number;
+ unsigned int initial_entries;
+ unsigned int hook_entry[5];
+ unsigned int underflow[5];
+ unsigned int stacksize;
+ void ***jumpstack;
+ unsigned char entries[0];
+};
+
+struct ipt_replace {
+ char name[32];
+ unsigned int valid_hooks;
+ unsigned int num_entries;
+ unsigned int size;
+ unsigned int hook_entry[5];
+ unsigned int underflow[5];
+ unsigned int num_counters;
+ struct xt_counters *counters;
+ struct ipt_entry entries[0];
+};
+
+struct ipt_standard {
+ struct ipt_entry entry;
+ struct xt_standard_target target;
+};
+
+struct mpls_nh {
+ struct net_device *nh_dev;
+ unsigned int nh_flags;
+ u8 nh_labels;
+ u8 nh_via_alen;
+ u8 nh_via_table;
+ u8 nh_reserved1;
+ u32 nh_label[0];
+};
+
+struct mpls_route {
+ struct callback_head rt_rcu;
+ u8 rt_protocol;
+ u8 rt_payload_type;
+ u8 rt_max_alen;
+ u8 rt_ttl_propagate;
+ u8 rt_nhn;
+ u8 rt_nhn_alive;
+ u8 rt_nh_size;
+ u8 rt_via_offset;
+ u8 rt_reserved1;
+ struct mpls_nh rt_nh[0];
+};
+
+struct mpls_pcpu_stats;
+
+struct mpls_dev {
+ int input_enabled;
+ struct net_device *dev;
+ struct mpls_pcpu_stats *stats;
+ struct ctl_table_header *sysctl;
+ struct callback_head rcu;
+};
+
+enum {
+ MPLS_STATS_UNSPEC = 0,
+ MPLS_STATS_LINK = 1,
+ __MPLS_STATS_MAX = 2,
+};
+
+struct mpls_link_stats {
+ __u64 rx_packets;
+ __u64 tx_packets;
+ __u64 rx_bytes;
+ __u64 tx_bytes;
+ __u64 rx_errors;
+ __u64 tx_errors;
+ __u64 rx_dropped;
+ __u64 tx_dropped;
+ __u64 rx_noroute;
+};
+
+struct netconfmsg {
+ __u8 ncm_family;
+};
+
+enum {
+ NETCONFA_UNSPEC = 0,
+ NETCONFA_IFINDEX = 1,
+ NETCONFA_FORWARDING = 2,
+ NETCONFA_RP_FILTER = 3,
+ NETCONFA_MC_FORWARDING = 4,
+ NETCONFA_PROXY_NEIGH = 5,
+ NETCONFA_IGNORE_ROUTES_WITH_LINKDOWN = 6,
+ NETCONFA_INPUT = 7,
+ NETCONFA_BC_FORWARDING = 8,
+ __NETCONFA_MAX = 9,
+};
+
+struct mpls_shim_hdr {
+ __be32 label_stack_entry;
+};
+
+struct mpls_entry_decoded {
+ u32 label;
+ u8 ttl;
+ u8 tc;
+ u8 bos;
+};
+
+struct mpls_pcpu_stats {
+ struct mpls_link_stats stats;
+ struct u64_stats_sync syncp;
+};
+
+enum mpls_payload_type {
+ MPT_UNSPEC = 0,
+ MPT_IPV4 = 4,
+ MPT_IPV6 = 6,
+};
+
+enum mpls_ttl_propagation {
+ MPLS_TTL_PROP_DEFAULT = 0,
+ MPLS_TTL_PROP_ENABLED = 1,
+ MPLS_TTL_PROP_DISABLED = 2,
+};
+
+struct mpls_route_config {
+ u32 rc_protocol;
+ u32 rc_ifindex;
+ u8 rc_via_table;
+ u8 rc_via_alen;
+ u8 rc_via[32];
+ u32 rc_label;
+ u8 rc_ttl_propagate;
+ u8 rc_output_labels;
+ u32 rc_output_label[30];
+ u32 rc_nlflags;
+ enum mpls_payload_type rc_payload_type;
+ struct nl_info rc_nlinfo;
+ struct rtnexthop *rc_mp;
+ int rc_mp_len;
+};
+
+enum perf_hw_cache_id {
+ PERF_COUNT_HW_CACHE_L1D = 0,
+ PERF_COUNT_HW_CACHE_L1I = 1,
+ PERF_COUNT_HW_CACHE_LL = 2,
+ PERF_COUNT_HW_CACHE_DTLB = 3,
+ PERF_COUNT_HW_CACHE_ITLB = 4,
+ PERF_COUNT_HW_CACHE_BPU = 5,
+ PERF_COUNT_HW_CACHE_NODE = 6,
+ PERF_COUNT_HW_CACHE_MAX = 7,
+};
+
+enum perf_hw_cache_op_id {
+ PERF_COUNT_HW_CACHE_OP_READ = 0,
+ PERF_COUNT_HW_CACHE_OP_WRITE = 1,
+ PERF_COUNT_HW_CACHE_OP_PREFETCH = 2,
+ PERF_COUNT_HW_CACHE_OP_MAX = 3,
+};
+
+enum perf_hw_cache_op_result_id {
+ PERF_COUNT_HW_CACHE_RESULT_ACCESS = 0,
+ PERF_COUNT_HW_CACHE_RESULT_MISS = 1,
+ PERF_COUNT_HW_CACHE_RESULT_MAX = 2,
+};
+
+struct x86_pmu_capability {
+ int version;
+ int num_counters_gp;
+ int num_counters_fixed;
+ int bit_width_gp;
+ int bit_width_fixed;
+ unsigned int events_mask;
+ int events_mask_len;
+ unsigned int pebs_ept: 1;
+};
+
+struct debug_store {
+ u64 bts_buffer_base;
+ u64 bts_index;
+ u64 bts_absolute_maximum;
+ u64 bts_interrupt_threshold;
+ u64 pebs_buffer_base;
+ u64 pebs_index;
+ u64 pebs_absolute_maximum;
+ u64 pebs_interrupt_threshold;
+ u64 pebs_event_reset[48];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+enum stack_type {
+ STACK_TYPE_UNKNOWN = 0,
+ STACK_TYPE_TASK = 1,
+ STACK_TYPE_IRQ = 2,
+ STACK_TYPE_SOFTIRQ = 3,
+ STACK_TYPE_ENTRY = 4,
+ STACK_TYPE_EXCEPTION = 5,
+ STACK_TYPE_EXCEPTION_LAST = 10,
+};
+
+struct stack_info {
+ enum stack_type type;
+ long unsigned int *begin;
+ long unsigned int *end;
+ long unsigned int *next_sp;
+};
+
+struct stack_frame {
+ struct stack_frame *next_frame;
+ long unsigned int return_address;
+};
+
+struct perf_guest_switch_msr {
+ unsigned int msr;
+ u64 host;
+ u64 guest;
+};
+
+struct perf_callchain_entry_ctx {
+ struct perf_callchain_entry *entry;
+ u32 max_stack;
+ u32 nr;
+ short int contexts;
+ bool contexts_maxed;
+};
+
+struct perf_pmu_events_ht_attr {
+ struct device_attribute attr;
+ u64 id;
+ const char *event_str_ht;
+ const char *event_str_noht;
+};
+
+struct perf_pmu_events_hybrid_attr {
+ struct device_attribute attr;
+ u64 id;
+ const char *event_str;
+ u64 pmu_type;
+};
+
+struct gdt_page {
+ struct desc_struct gdt[16];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct cyc2ns_data {
+ u32 cyc2ns_mul;
+ u32 cyc2ns_shift;
+ u64 cyc2ns_offset;
+};
+
+struct unwind_state {
+ struct stack_info stack_info;
+ long unsigned int stack_mask;
+ struct task_struct *task;
+ int graph_idx;
+ struct llist_node *kr_cur;
+ bool error;
+ bool signal;
+ bool full_regs;
+ long unsigned int sp;
+ long unsigned int bp;
+ long unsigned int ip;
+ struct pt_regs *regs;
+ struct pt_regs *prev_regs;
+};
+
+enum extra_reg_type {
+ EXTRA_REG_NONE = -1,
+ EXTRA_REG_RSP_0 = 0,
+ EXTRA_REG_RSP_1 = 1,
+ EXTRA_REG_LBR = 2,
+ EXTRA_REG_LDLAT = 3,
+ EXTRA_REG_FE = 4,
+ EXTRA_REG_MAX = 5,
+};
+
+struct event_constraint {
+ union {
+ long unsigned int idxmsk[1];
+ u64 idxmsk64;
+ };
+ u64 code;
+ u64 cmask;
+ int weight;
+ int overlap;
+ int flags;
+ unsigned int size;
+};
+
+enum {
+ PERF_X86_EVENT_PEBS_LDLAT = 1,
+ PERF_X86_EVENT_PEBS_ST = 2,
+ PERF_X86_EVENT_PEBS_ST_HSW = 4,
+ PERF_X86_EVENT_PEBS_LD_HSW = 8,
+ PERF_X86_EVENT_PEBS_NA_HSW = 16,
+ PERF_X86_EVENT_EXCL = 32,
+ PERF_X86_EVENT_DYNAMIC = 64,
+ PERF_X86_EVENT_EXCL_ACCT = 256,
+ PERF_X86_EVENT_AUTO_RELOAD = 512,
+ PERF_X86_EVENT_LARGE_PEBS = 1024,
+ PERF_X86_EVENT_PEBS_VIA_PT = 2048,
+ PERF_X86_EVENT_PAIR = 4096,
+ PERF_X86_EVENT_LBR_SELECT = 8192,
+ PERF_X86_EVENT_TOPDOWN = 16384,
+ PERF_X86_EVENT_PEBS_STLAT = 32768,
+ PERF_X86_EVENT_AMD_BRS = 65536,
+ PERF_X86_EVENT_PEBS_LAT_HYBRID = 131072,
+};
+
+struct amd_nb {
+ int nb_id;
+ int refcnt;
+ struct perf_event *owners[64];
+ struct event_constraint event_constraints[64];
+};
+
+struct er_account {
+ raw_spinlock_t lock;
+ u64 config;
+ u64 reg;
+ atomic_t ref;
+};
+
+struct intel_shared_regs {
+ struct er_account regs[5];
+ int refcnt;
+ unsigned int core_id;
+};
+
+enum intel_excl_state_type {
+ INTEL_EXCL_UNUSED = 0,
+ INTEL_EXCL_SHARED = 1,
+ INTEL_EXCL_EXCLUSIVE = 2,
+};
+
+struct intel_excl_states {
+ enum intel_excl_state_type state[64];
+ bool sched_started;
+};
+
+struct intel_excl_cntrs {
+ raw_spinlock_t lock;
+ struct intel_excl_states states[2];
+ union {
+ u16 has_exclusive[2];
+ u32 exclusive_present;
+ };
+ int refcnt;
+ unsigned int core_id;
+};
+
+enum {
+ X86_PERF_KFREE_SHARED = 0,
+ X86_PERF_KFREE_EXCL = 1,
+ X86_PERF_KFREE_MAX = 2,
+};
+
+struct cpu_hw_events {
+ struct perf_event *events[64];
+ long unsigned int active_mask[1];
+ long unsigned int dirty[1];
+ int enabled;
+ int n_events;
+ int n_added;
+ int n_txn;
+ int n_txn_pair;
+ int n_txn_metric;
+ int assign[64];
+ u64 tags[64];
+ struct perf_event *event_list[64];
+ struct event_constraint *event_constraint[64];
+ int n_excl;
+ unsigned int txn_flags;
+ int is_fake;
+ struct debug_store *ds;
+ void *ds_pebs_vaddr;
+ void *ds_bts_vaddr;
+ u64 pebs_enabled;
+ int n_pebs;
+ int n_large_pebs;
+ int n_pebs_via_pt;
+ int pebs_output;
+ u64 pebs_data_cfg;
+ u64 active_pebs_data_cfg;
+ int pebs_record_size;
+ u64 fixed_ctrl_val;
+ u64 active_fixed_ctrl_val;
+ int lbr_users;
+ int lbr_pebs_users;
+ struct perf_branch_stack lbr_stack;
+ struct perf_branch_entry lbr_entries[32];
+ union {
+ struct er_account *lbr_sel;
+ struct er_account *lbr_ctl;
+ };
+ u64 br_sel;
+ void *last_task_ctx;
+ int last_log_id;
+ int lbr_select;
+ void *lbr_xsave;
+ u64 intel_ctrl_guest_mask;
+ u64 intel_ctrl_host_mask;
+ struct perf_guest_switch_msr guest_switch_msrs[64];
+ u64 intel_cp_status;
+ struct intel_shared_regs *shared_regs;
+ struct event_constraint *constraint_list;
+ struct intel_excl_cntrs *excl_cntrs;
+ int excl_thread_id;
+ u64 tfa_shadow;
+ int n_metric;
+ struct amd_nb *amd_nb;
+ int brs_active;
+ u64 perf_ctr_virt_mask;
+ int n_pair;
+ void *kfree_on_online[2];
+ struct pmu *pmu;
+};
+
+struct extra_reg {
+ unsigned int event;
+ unsigned int msr;
+ u64 config_mask;
+ u64 valid_mask;
+ int idx;
+ bool extra_msr_access;
+};
+
+union perf_capabilities {
+ struct {
+ u64 lbr_format: 6;
+ u64 pebs_trap: 1;
+ u64 pebs_arch_reg: 1;
+ u64 pebs_format: 4;
+ u64 smm_freeze: 1;
+ u64 full_width_write: 1;
+ u64 pebs_baseline: 1;
+ u64 perf_metrics: 1;
+ u64 pebs_output_pt_available: 1;
+ u64 anythread_deprecated: 1;
+ };
+ u64 capabilities;
+};
+
+struct x86_pmu_quirk {
+ struct x86_pmu_quirk *next;
+ void (*func)();
+};
+
+enum {
+ x86_lbr_exclusive_lbr = 0,
+ x86_lbr_exclusive_bts = 1,
+ x86_lbr_exclusive_pt = 2,
+ x86_lbr_exclusive_max = 3,
+};
+
+struct x86_hybrid_pmu {
+ struct pmu pmu;
+ const char *name;
+ u8 cpu_type;
+ cpumask_t supported_cpus;
+ union perf_capabilities intel_cap;
+ u64 intel_ctrl;
+ int max_pebs_events;
+ int num_counters;
+ int num_counters_fixed;
+ struct event_constraint unconstrained;
+ u64 hw_cache_event_ids[42];
+ u64 hw_cache_extra_regs[42];
+ struct event_constraint *event_constraints;
+ struct event_constraint *pebs_constraints;
+ struct extra_reg *extra_regs;
+ unsigned int late_ack: 1;
+ unsigned int mid_ack: 1;
+ unsigned int enabled_ack: 1;
+ u64 pebs_data_source[16];
+};
+
+enum hybrid_pmu_type {
+ hybrid_big = 64,
+ hybrid_small = 32,
+ hybrid_big_small = 96,
+};
+
+struct x86_pmu {
+ const char *name;
+ int version;
+ int (*handle_irq)(struct pt_regs *);
+ void (*disable_all)();
+ void (*enable_all)(int);
+ void (*enable)(struct perf_event *);
+ void (*disable)(struct perf_event *);
+ void (*assign)(struct perf_event *, int);
+ void (*add)(struct perf_event *);
+ void (*del)(struct perf_event *);
+ void (*read)(struct perf_event *);
+ int (*set_period)(struct perf_event *);
+ u64 (*update)(struct perf_event *);
+ int (*hw_config)(struct perf_event *);
+ int (*schedule_events)(struct cpu_hw_events *, int, int *);
+ unsigned int eventsel;
+ unsigned int perfctr;
+ int (*addr_offset)(int, bool);
+ int (*rdpmc_index)(int);
+ u64 (*event_map)(int);
+ int max_events;
+ int num_counters;
+ int num_counters_fixed;
+ int cntval_bits;
+ u64 cntval_mask;
+ union {
+ long unsigned int events_maskl;
+ long unsigned int events_mask[1];
+ };
+ int events_mask_len;
+ int apic;
+ u64 max_period;
+ struct event_constraint * (*get_event_constraints)(struct cpu_hw_events *, int, struct perf_event *);
+ void (*put_event_constraints)(struct cpu_hw_events *, struct perf_event *);
+ void (*start_scheduling)(struct cpu_hw_events *);
+ void (*commit_scheduling)(struct cpu_hw_events *, int, int);
+ void (*stop_scheduling)(struct cpu_hw_events *);
+ struct event_constraint *event_constraints;
+ struct x86_pmu_quirk *quirks;
+ void (*limit_period)(struct perf_event *, s64 *);
+ unsigned int late_ack: 1;
+ unsigned int mid_ack: 1;
+ unsigned int enabled_ack: 1;
+ int attr_rdpmc_broken;
+ int attr_rdpmc;
+ struct attribute **format_attrs;
+ ssize_t (*events_sysfs_show)(char *, u64);
+ const struct attribute_group **attr_update;
+ long unsigned int attr_freeze_on_smi;
+ int (*cpu_prepare)(int);
+ void (*cpu_starting)(int);
+ void (*cpu_dying)(int);
+ void (*cpu_dead)(int);
+ void (*check_microcode)();
+ void (*sched_task)(struct perf_event_context *, bool);
+ u64 intel_ctrl;
+ union perf_capabilities intel_cap;
+ unsigned int bts: 1;
+ unsigned int bts_active: 1;
+ unsigned int pebs: 1;
+ unsigned int pebs_active: 1;
+ unsigned int pebs_broken: 1;
+ unsigned int pebs_prec_dist: 1;
+ unsigned int pebs_no_tlb: 1;
+ unsigned int pebs_no_isolation: 1;
+ unsigned int pebs_block: 1;
+ unsigned int pebs_ept: 1;
+ int pebs_record_size;
+ int pebs_buffer_size;
+ int max_pebs_events;
+ void (*drain_pebs)(struct pt_regs *, struct perf_sample_data *);
+ struct event_constraint *pebs_constraints;
+ void (*pebs_aliases)(struct perf_event *);
+ u64 (*pebs_latency_data)(struct perf_event *, u64);
+ long unsigned int large_pebs_flags;
+ u64 rtm_abort_event;
+ u64 pebs_capable;
+ unsigned int lbr_tos;
+ unsigned int lbr_from;
+ unsigned int lbr_to;
+ unsigned int lbr_info;
+ unsigned int lbr_nr;
+ union {
+ u64 lbr_sel_mask;
+ u64 lbr_ctl_mask;
+ };
+ union {
+ const int *lbr_sel_map;
+ int *lbr_ctl_map;
+ };
+ bool lbr_double_abort;
+ bool lbr_pt_coexist;
+ unsigned int lbr_has_info: 1;
+ unsigned int lbr_has_tsx: 1;
+ unsigned int lbr_from_flags: 1;
+ unsigned int lbr_to_cycles: 1;
+ unsigned int lbr_depth_mask: 8;
+ unsigned int lbr_deep_c_reset: 1;
+ unsigned int lbr_lip: 1;
+ unsigned int lbr_cpl: 1;
+ unsigned int lbr_filter: 1;
+ unsigned int lbr_call_stack: 1;
+ unsigned int lbr_mispred: 1;
+ unsigned int lbr_timed_lbr: 1;
+ unsigned int lbr_br_type: 1;
+ void (*lbr_reset)();
+ void (*lbr_read)(struct cpu_hw_events *);
+ void (*lbr_save)(void *);
+ void (*lbr_restore)(void *);
+ atomic_t lbr_exclusive[3];
+ int num_topdown_events;
+ void (*swap_task_ctx)(struct perf_event_context *, struct perf_event_context *);
+ unsigned int amd_nb_constraints: 1;
+ u64 perf_ctr_pair_en;
+ struct extra_reg *extra_regs;
+ unsigned int flags;
+ struct perf_guest_switch_msr * (*guest_get_msrs)(int *, void *);
+ int (*check_period)(struct perf_event *, u64);
+ int (*aux_output_match)(struct perf_event *);
+ int (*filter_match)(struct perf_event *);
+ int num_hybrid_pmus;
+ struct x86_hybrid_pmu *hybrid_pmu;
+ u8 (*get_hybrid_cpu_type)();
+};
+
+struct sched_state {
+ int weight;
+ int event;
+ int counter;
+ int unassigned;
+ int nr_gp;
+ u64 used;
+};
+
+struct perf_sched {
+ int max_weight;
+ int max_events;
+ int max_gp;
+ int saved_states;
+ struct event_constraint **constraints;
+ struct sched_state state;
+ struct sched_state saved[2];
+};
+
+struct itimerspec64 {
+ struct timespec64 it_interval;
+ struct timespec64 it_value;
+};
+
+struct trace_event_raw_timer_class {
+ struct trace_entry ent;
+ void *timer;
+ char __data[0];
+};
+
+struct trace_event_raw_timer_start {
+ struct trace_entry ent;
+ void *timer;
+ void *function;
+ long unsigned int expires;
+ long unsigned int now;
+ unsigned int flags;
+ char __data[0];
+};
+
+struct trace_event_raw_timer_expire_entry {
+ struct trace_entry ent;
+ void *timer;
+ long unsigned int now;
+ void *function;
+ long unsigned int baseclk;
+ char __data[0];
+};
+
+struct trace_event_raw_hrtimer_init {
+ struct trace_entry ent;
+ void *hrtimer;
+ clockid_t clockid;
+ enum hrtimer_mode mode;
+ char __data[0];
+};
+
+struct trace_event_raw_hrtimer_start {
+ struct trace_entry ent;
+ void *hrtimer;
+ void *function;
+ s64 expires;
+ s64 softexpires;
+ enum hrtimer_mode mode;
+ char __data[0];
+};
+
+struct trace_event_raw_hrtimer_expire_entry {
+ struct trace_entry ent;
+ void *hrtimer;
+ s64 now;
+ void *function;
+ char __data[0];
+};
+
+struct trace_event_raw_hrtimer_class {
+ struct trace_entry ent;
+ void *hrtimer;
+ char __data[0];
+};
+
+struct trace_event_raw_itimer_state {
+ struct trace_entry ent;
+ int which;
+ long long unsigned int expires;
+ long int value_sec;
+ long int value_nsec;
+ long int interval_sec;
+ long int interval_nsec;
+ char __data[0];
+};
+
+struct trace_event_raw_itimer_expire {
+ struct trace_entry ent;
+ int which;
+ pid_t pid;
+ long long unsigned int now;
+ char __data[0];
+};
+
+struct trace_event_raw_tick_stop {
+ struct trace_entry ent;
+ int success;
+ int dependency;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_timer_class {};
+
+struct trace_event_data_offsets_timer_start {};
+
+struct trace_event_data_offsets_timer_expire_entry {};
+
+struct trace_event_data_offsets_hrtimer_init {};
+
+struct trace_event_data_offsets_hrtimer_start {};
+
+struct trace_event_data_offsets_hrtimer_expire_entry {};
+
+struct trace_event_data_offsets_hrtimer_class {};
+
+struct trace_event_data_offsets_itimer_state {};
+
+struct trace_event_data_offsets_itimer_expire {};
+
+struct trace_event_data_offsets_tick_stop {};
+
+typedef void (*btf_trace_timer_init)(void *, struct timer_list *);
+
+typedef void (*btf_trace_timer_start)(void *, struct timer_list *, long unsigned int, unsigned int);
+
+typedef void (*btf_trace_timer_expire_entry)(void *, struct timer_list *, long unsigned int);
+
+typedef void (*btf_trace_timer_expire_exit)(void *, struct timer_list *);
+
+typedef void (*btf_trace_timer_cancel)(void *, struct timer_list *);
+
+typedef void (*btf_trace_hrtimer_init)(void *, struct hrtimer *, clockid_t, enum hrtimer_mode);
+
+typedef void (*btf_trace_hrtimer_start)(void *, struct hrtimer *, enum hrtimer_mode);
+
+typedef void (*btf_trace_hrtimer_expire_entry)(void *, struct hrtimer *, ktime_t *);
+
+typedef void (*btf_trace_hrtimer_expire_exit)(void *, struct hrtimer *);
+
+typedef void (*btf_trace_hrtimer_cancel)(void *, struct hrtimer *);
+
+typedef void (*btf_trace_itimer_state)(void *, int, const struct itimerspec64 * const, long long unsigned int);
+
+typedef void (*btf_trace_itimer_expire)(void *, int, struct pid *, long long unsigned int);
+
+typedef void (*btf_trace_tick_stop)(void *, int, int);
+
+struct timer_base {
+ raw_spinlock_t lock;
+ struct timer_list *running_timer;
+ long unsigned int clk;
+ long unsigned int next_expiry;
+ unsigned int cpu;
+ bool next_expiry_recalc;
+ bool is_idle;
+ bool timers_pending;
+ long unsigned int pending_map[9];
+ struct hlist_head vectors[576];
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct process_timer {
+ struct timer_list timer;
+ struct task_struct *task;
+};
+
+struct ftrace_func_entry {
+ struct hlist_node hlist;
+ long unsigned int ip;
+ long unsigned int direct;
+};
+
+struct ftrace_graph_ent_entry {
+ struct trace_entry ent;
+ struct ftrace_graph_ent graph_ent;
+} __attribute__((packed));
+
+struct ftrace_graph_ret_entry {
+ struct trace_entry ent;
+ struct ftrace_graph_ret ret;
+};
+
+enum {
+ FTRACE_HASH_FL_MOD = 1,
+};
+
+struct fgraph_cpu_data {
+ pid_t last_pid;
+ int depth;
+ int depth_irq;
+ int ignore;
+ long unsigned int enter_funcs[50];
+};
+
+struct fgraph_data {
+ struct fgraph_cpu_data *cpu_data;
+ struct ftrace_graph_ent_entry ent;
+ struct ftrace_graph_ret_entry ret;
+ int failed;
+ int cpu;
+ int: 32;
+} __attribute__((packed));
+
+enum {
+ FLAGS_FILL_FULL = 268435456,
+ FLAGS_FILL_START = 536870912,
+ FLAGS_FILL_END = 805306368,
+};
+
+struct bpf_iter_seq_link_info {
+ u32 link_id;
+};
+
+struct bpf_iter__bpf_link {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct bpf_link *link;
+ };
+};
+
+typedef int filler_t(struct file *, struct folio *);
+
+union swap_header {
+ struct {
+ char reserved[4086];
+ char magic[10];
+ } magic;
+ struct {
+ char bootbits[1024];
+ __u32 version;
+ __u32 last_page;
+ __u32 nr_badpages;
+ unsigned char sws_uuid[16];
+ unsigned char sws_volume[16];
+ __u32 padding[117];
+ __u32 badpages[1];
+ } info;
+};
+
+struct swap_extent {
+ struct rb_node rb_node;
+ long unsigned int start_page;
+ long unsigned int nr_pages;
+ sector_t start_block;
+};
+
+enum {
+ SWP_USED = 1,
+ SWP_WRITEOK = 2,
+ SWP_DISCARDABLE = 4,
+ SWP_DISCARDING = 8,
+ SWP_SOLIDSTATE = 16,
+ SWP_CONTINUED = 32,
+ SWP_BLKDEV = 64,
+ SWP_ACTIVATED = 128,
+ SWP_FS_OPS = 256,
+ SWP_AREA_DISCARD = 512,
+ SWP_PAGE_DISCARD = 1024,
+ SWP_STABLE_WRITES = 2048,
+ SWP_SYNCHRONOUS_IO = 4096,
+ SWP_SCANNING = 16384,
+};
+
+enum positive_aop_returns {
+ AOP_WRITEPAGE_ACTIVATE = 524288,
+ AOP_TRUNCATED_PAGE = 524289,
+};
+
+struct disk_stats {
+ u64 nsecs[4];
+ long unsigned int sectors[4];
+ long unsigned int ios[4];
+ long unsigned int merges[4];
+ long unsigned int io_ticks;
+ local_t in_flight[2];
+};
+
+enum stat_group {
+ STAT_READ = 0,
+ STAT_WRITE = 1,
+ STAT_DISCARD = 2,
+ STAT_FLUSH = 3,
+ NR_STAT_GROUPS = 4,
+};
+
+struct dax_holder_operations {
+ int (*notify_failure)(struct dax_device *, u64, u64, int);
+};
+
+struct fs_error_report {
+ int error;
+ struct inode *inode;
+ struct super_block *sb;
+};
+
+struct constant_table {
+ const char *name;
+ int value;
+};
+
+struct ext4_lazy_init {
+ long unsigned int li_state;
+ struct list_head li_request_list;
+ struct mutex li_list_mtx;
+};
+
+struct partial_cluster {
+ ext4_fsblk_t pclu;
+ ext4_lblk_t lblk;
+ enum {
+ initial = 0,
+ tofree = 1,
+ nofree = 2,
+ } state;
+};
+
+struct ext4_journal_cb_entry {
+ struct list_head jce_list;
+ void (*jce_func)(struct super_block *, struct ext4_journal_cb_entry *, int);
+};
+
+struct ext4_prealloc_space {
+ struct list_head pa_inode_list;
+ struct list_head pa_group_list;
+ union {
+ struct list_head pa_tmp_list;
+ struct callback_head pa_rcu;
+ } u;
+ spinlock_t pa_lock;
+ atomic_t pa_count;
+ unsigned int pa_deleted;
+ ext4_fsblk_t pa_pstart;
+ ext4_lblk_t pa_lstart;
+ ext4_grpblk_t pa_len;
+ ext4_grpblk_t pa_free;
+ short unsigned int pa_type;
+ spinlock_t *pa_obj_lock;
+ struct inode *pa_inode;
+};
+
+struct ext4_free_extent {
+ ext4_lblk_t fe_logical;
+ ext4_grpblk_t fe_start;
+ ext4_group_t fe_group;
+ ext4_grpblk_t fe_len;
+};
+
+struct ext4_allocation_context {
+ struct inode *ac_inode;
+ struct super_block *ac_sb;
+ struct ext4_free_extent ac_o_ex;
+ struct ext4_free_extent ac_g_ex;
+ struct ext4_free_extent ac_b_ex;
+ struct ext4_free_extent ac_f_ex;
+ __u32 ac_groups_considered;
+ __u32 ac_flags;
+ __u16 ac_groups_scanned;
+ __u16 ac_groups_linear_remaining;
+ __u16 ac_found;
+ __u16 ac_tail;
+ __u16 ac_buddy;
+ __u8 ac_status;
+ __u8 ac_criteria;
+ __u8 ac_2order;
+ __u8 ac_op;
+ struct page *ac_bitmap_page;
+ struct page *ac_buddy_page;
+ struct ext4_prealloc_space *ac_pa;
+ struct ext4_locality_group *ac_lg;
+};
+
+struct ext4_fsmap {
+ struct list_head fmr_list;
+ dev_t fmr_device;
+ uint32_t fmr_flags;
+ uint64_t fmr_physical;
+ uint64_t fmr_owner;
+ uint64_t fmr_length;
+};
+
+struct trace_event_raw_ext4_other_inode_update_time {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ino_t orig_ino;
+ uid_t uid;
+ gid_t gid;
+ __u16 mode;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_free_inode {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ uid_t uid;
+ gid_t gid;
+ __u64 blocks;
+ __u16 mode;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_request_inode {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t dir;
+ __u16 mode;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_allocate_inode {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ino_t dir;
+ __u16 mode;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_evict_inode {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ int nlink;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_drop_inode {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ int drop;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_nfs_commit_metadata {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_mark_inode_dirty {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ long unsigned int ip;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_begin_ordered_truncate {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ loff_t new_size;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4__write_begin {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ loff_t pos;
+ unsigned int len;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4__write_end {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ loff_t pos;
+ unsigned int len;
+ unsigned int copied;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_writepages {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ long int nr_to_write;
+ long int pages_skipped;
+ loff_t range_start;
+ loff_t range_end;
+ long unsigned int writeback_index;
+ int sync_mode;
+ char for_kupdate;
+ char range_cyclic;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_da_write_pages {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ long unsigned int first_page;
+ long int nr_to_write;
+ int sync_mode;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_da_write_pages_extent {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ __u64 lblk;
+ __u32 len;
+ __u32 flags;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_writepages_result {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ int ret;
+ int pages_written;
+ long int pages_skipped;
+ long unsigned int writeback_index;
+ int sync_mode;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4__page_op {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ long unsigned int index;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_invalidate_folio_op {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ long unsigned int index;
+ size_t offset;
+ size_t length;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_discard_blocks {
+ struct trace_entry ent;
+ dev_t dev;
+ __u64 blk;
+ __u64 count;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4__mb_new_pa {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ __u64 pa_pstart;
+ __u64 pa_lstart;
+ __u32 pa_len;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_mb_release_inode_pa {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ __u64 block;
+ __u32 count;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_mb_release_group_pa {
+ struct trace_entry ent;
+ dev_t dev;
+ __u64 pa_pstart;
+ __u32 pa_len;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_discard_preallocations {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ unsigned int len;
+ unsigned int needed;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_mb_discard_preallocations {
+ struct trace_entry ent;
+ dev_t dev;
+ int needed;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_request_blocks {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ unsigned int len;
+ __u32 logical;
+ __u32 lleft;
+ __u32 lright;
+ __u64 goal;
+ __u64 pleft;
+ __u64 pright;
+ unsigned int flags;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_allocate_blocks {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ __u64 block;
+ unsigned int len;
+ __u32 logical;
+ __u32 lleft;
+ __u32 lright;
+ __u64 goal;
+ __u64 pleft;
+ __u64 pright;
+ unsigned int flags;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_free_blocks {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ __u64 block;
+ long unsigned int count;
+ int flags;
+ __u16 mode;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_sync_file_enter {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ino_t parent;
+ int datasync;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_sync_file_exit {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_sync_fs {
+ struct trace_entry ent;
+ dev_t dev;
+ int wait;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_alloc_da_blocks {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ unsigned int data_blocks;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_mballoc_alloc {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ __u32 orig_logical;
+ int orig_start;
+ __u32 orig_group;
+ int orig_len;
+ __u32 goal_logical;
+ int goal_start;
+ __u32 goal_group;
+ int goal_len;
+ __u32 result_logical;
+ int result_start;
+ __u32 result_group;
+ int result_len;
+ __u16 found;
+ __u16 groups;
+ __u16 buddy;
+ __u16 flags;
+ __u16 tail;
+ __u8 cr;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_mballoc_prealloc {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ __u32 orig_logical;
+ int orig_start;
+ __u32 orig_group;
+ int orig_len;
+ __u32 result_logical;
+ int result_start;
+ __u32 result_group;
+ int result_len;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4__mballoc {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ int result_start;
+ __u32 result_group;
+ int result_len;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_forget {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ __u64 block;
+ int is_metadata;
+ __u16 mode;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_da_update_reserve_space {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ __u64 i_blocks;
+ int used_blocks;
+ int reserved_data_blocks;
+ int quota_claim;
+ __u16 mode;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_da_reserve_space {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ __u64 i_blocks;
+ int reserved_data_blocks;
+ __u16 mode;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_da_release_space {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ __u64 i_blocks;
+ int freed_blocks;
+ int reserved_data_blocks;
+ __u16 mode;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4__bitmap_load {
+ struct trace_entry ent;
+ dev_t dev;
+ __u32 group;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_read_block_bitmap_load {
+ struct trace_entry ent;
+ dev_t dev;
+ __u32 group;
+ bool prefetch;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4__fallocate_mode {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ loff_t offset;
+ loff_t len;
+ int mode;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_fallocate_exit {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ loff_t pos;
+ unsigned int blocks;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_unlink_enter {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ino_t parent;
+ loff_t size;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_unlink_exit {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4__truncate {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ __u64 blocks;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_ext_convert_to_initialized_enter {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_lblk_t m_lblk;
+ unsigned int m_len;
+ ext4_lblk_t u_lblk;
+ unsigned int u_len;
+ ext4_fsblk_t u_pblk;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_ext_convert_to_initialized_fastpath {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_lblk_t m_lblk;
+ unsigned int m_len;
+ ext4_lblk_t u_lblk;
+ unsigned int u_len;
+ ext4_fsblk_t u_pblk;
+ ext4_lblk_t i_lblk;
+ unsigned int i_len;
+ ext4_fsblk_t i_pblk;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4__map_blocks_enter {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_lblk_t lblk;
+ unsigned int len;
+ unsigned int flags;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4__map_blocks_exit {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ unsigned int flags;
+ ext4_fsblk_t pblk;
+ ext4_lblk_t lblk;
+ unsigned int len;
+ unsigned int mflags;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_ext_load_extent {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_fsblk_t pblk;
+ ext4_lblk_t lblk;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_load_inode {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_journal_start {
+ struct trace_entry ent;
+ dev_t dev;
+ long unsigned int ip;
+ int blocks;
+ int rsv_blocks;
+ int revoke_creds;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_journal_start_reserved {
+ struct trace_entry ent;
+ dev_t dev;
+ long unsigned int ip;
+ int blocks;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4__trim {
+ struct trace_entry ent;
+ int dev_major;
+ int dev_minor;
+ __u32 group;
+ int start;
+ int len;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_ext_handle_unwritten_extents {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ int flags;
+ ext4_lblk_t lblk;
+ ext4_fsblk_t pblk;
+ unsigned int len;
+ unsigned int allocated;
+ ext4_fsblk_t newblk;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_get_implied_cluster_alloc_exit {
+ struct trace_entry ent;
+ dev_t dev;
+ unsigned int flags;
+ ext4_lblk_t lblk;
+ ext4_fsblk_t pblk;
+ unsigned int len;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_ext_show_extent {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_fsblk_t pblk;
+ ext4_lblk_t lblk;
+ short unsigned int len;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_remove_blocks {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_lblk_t from;
+ ext4_lblk_t to;
+ ext4_fsblk_t ee_pblk;
+ ext4_lblk_t ee_lblk;
+ short unsigned int ee_len;
+ ext4_fsblk_t pc_pclu;
+ ext4_lblk_t pc_lblk;
+ int pc_state;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_ext_rm_leaf {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_lblk_t start;
+ ext4_lblk_t ee_lblk;
+ ext4_fsblk_t ee_pblk;
+ short int ee_len;
+ ext4_fsblk_t pc_pclu;
+ ext4_lblk_t pc_lblk;
+ int pc_state;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_ext_rm_idx {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_fsblk_t pblk;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_ext_remove_space {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_lblk_t start;
+ ext4_lblk_t end;
+ int depth;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_ext_remove_space_done {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_lblk_t start;
+ ext4_lblk_t end;
+ int depth;
+ ext4_fsblk_t pc_pclu;
+ ext4_lblk_t pc_lblk;
+ int pc_state;
+ short unsigned int eh_entries;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4__es_extent {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_lblk_t lblk;
+ ext4_lblk_t len;
+ ext4_fsblk_t pblk;
+ char status;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_es_remove_extent {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ loff_t lblk;
+ loff_t len;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_es_find_extent_range_enter {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_lblk_t lblk;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_es_find_extent_range_exit {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_lblk_t lblk;
+ ext4_lblk_t len;
+ ext4_fsblk_t pblk;
+ char status;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_es_lookup_extent_enter {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_lblk_t lblk;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_es_lookup_extent_exit {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_lblk_t lblk;
+ ext4_lblk_t len;
+ ext4_fsblk_t pblk;
+ char status;
+ int found;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4__es_shrink_enter {
+ struct trace_entry ent;
+ dev_t dev;
+ int nr_to_scan;
+ int cache_cnt;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_es_shrink_scan_exit {
+ struct trace_entry ent;
+ dev_t dev;
+ int nr_shrunk;
+ int cache_cnt;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_collapse_range {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ loff_t offset;
+ loff_t len;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_insert_range {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ loff_t offset;
+ loff_t len;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_es_shrink {
+ struct trace_entry ent;
+ dev_t dev;
+ int nr_shrunk;
+ long long unsigned int scan_time;
+ int nr_skipped;
+ int retried;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_es_insert_delayed_block {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ ext4_lblk_t lblk;
+ ext4_lblk_t len;
+ ext4_fsblk_t pblk;
+ char status;
+ bool allocated;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_fsmap_class {
+ struct trace_entry ent;
+ dev_t dev;
+ dev_t keydev;
+ u32 agno;
+ u64 bno;
+ u64 len;
+ u64 owner;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_getfsmap_class {
+ struct trace_entry ent;
+ dev_t dev;
+ dev_t keydev;
+ u64 block;
+ u64 len;
+ u64 owner;
+ u64 flags;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_shutdown {
+ struct trace_entry ent;
+ dev_t dev;
+ unsigned int flags;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_error {
+ struct trace_entry ent;
+ dev_t dev;
+ const char *function;
+ unsigned int line;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_prefetch_bitmaps {
+ struct trace_entry ent;
+ dev_t dev;
+ __u32 group;
+ __u32 next;
+ __u32 ios;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_lazy_itable_init {
+ struct trace_entry ent;
+ dev_t dev;
+ __u32 group;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_fc_replay_scan {
+ struct trace_entry ent;
+ dev_t dev;
+ int error;
+ int off;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_fc_replay {
+ struct trace_entry ent;
+ dev_t dev;
+ int tag;
+ int ino;
+ int priv1;
+ int priv2;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_fc_commit_start {
+ struct trace_entry ent;
+ dev_t dev;
+ tid_t tid;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_fc_commit_stop {
+ struct trace_entry ent;
+ dev_t dev;
+ int nblks;
+ int reason;
+ int num_fc;
+ int num_fc_ineligible;
+ int nblks_agg;
+ tid_t tid;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_fc_stats {
+ struct trace_entry ent;
+ dev_t dev;
+ unsigned int fc_ineligible_rc[9];
+ long unsigned int fc_commits;
+ long unsigned int fc_ineligible_commits;
+ long unsigned int fc_numblks;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_fc_track_dentry {
+ struct trace_entry ent;
+ dev_t dev;
+ tid_t t_tid;
+ ino_t i_ino;
+ tid_t i_sync_tid;
+ int error;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_fc_track_inode {
+ struct trace_entry ent;
+ dev_t dev;
+ tid_t t_tid;
+ ino_t i_ino;
+ tid_t i_sync_tid;
+ int error;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_fc_track_range {
+ struct trace_entry ent;
+ dev_t dev;
+ tid_t t_tid;
+ ino_t i_ino;
+ tid_t i_sync_tid;
+ long int start;
+ long int end;
+ int error;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_fc_cleanup {
+ struct trace_entry ent;
+ dev_t dev;
+ int j_fc_off;
+ int full;
+ tid_t tid;
+ char __data[0];
+};
+
+struct trace_event_raw_ext4_update_sb {
+ struct trace_entry ent;
+ dev_t dev;
+ ext4_fsblk_t fsblk;
+ unsigned int flags;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_ext4_other_inode_update_time {};
+
+struct trace_event_data_offsets_ext4_free_inode {};
+
+struct trace_event_data_offsets_ext4_request_inode {};
+
+struct trace_event_data_offsets_ext4_allocate_inode {};
+
+struct trace_event_data_offsets_ext4_evict_inode {};
+
+struct trace_event_data_offsets_ext4_drop_inode {};
+
+struct trace_event_data_offsets_ext4_nfs_commit_metadata {};
+
+struct trace_event_data_offsets_ext4_mark_inode_dirty {};
+
+struct trace_event_data_offsets_ext4_begin_ordered_truncate {};
+
+struct trace_event_data_offsets_ext4__write_begin {};
+
+struct trace_event_data_offsets_ext4__write_end {};
+
+struct trace_event_data_offsets_ext4_writepages {};
+
+struct trace_event_data_offsets_ext4_da_write_pages {};
+
+struct trace_event_data_offsets_ext4_da_write_pages_extent {};
+
+struct trace_event_data_offsets_ext4_writepages_result {};
+
+struct trace_event_data_offsets_ext4__page_op {};
+
+struct trace_event_data_offsets_ext4_invalidate_folio_op {};
+
+struct trace_event_data_offsets_ext4_discard_blocks {};
+
+struct trace_event_data_offsets_ext4__mb_new_pa {};
+
+struct trace_event_data_offsets_ext4_mb_release_inode_pa {};
+
+struct trace_event_data_offsets_ext4_mb_release_group_pa {};
+
+struct trace_event_data_offsets_ext4_discard_preallocations {};
+
+struct trace_event_data_offsets_ext4_mb_discard_preallocations {};
+
+struct trace_event_data_offsets_ext4_request_blocks {};
+
+struct trace_event_data_offsets_ext4_allocate_blocks {};
+
+struct trace_event_data_offsets_ext4_free_blocks {};
+
+struct trace_event_data_offsets_ext4_sync_file_enter {};
+
+struct trace_event_data_offsets_ext4_sync_file_exit {};
+
+struct trace_event_data_offsets_ext4_sync_fs {};
+
+struct trace_event_data_offsets_ext4_alloc_da_blocks {};
+
+struct trace_event_data_offsets_ext4_mballoc_alloc {};
+
+struct trace_event_data_offsets_ext4_mballoc_prealloc {};
+
+struct trace_event_data_offsets_ext4__mballoc {};
+
+struct trace_event_data_offsets_ext4_forget {};
+
+struct trace_event_data_offsets_ext4_da_update_reserve_space {};
+
+struct trace_event_data_offsets_ext4_da_reserve_space {};
+
+struct trace_event_data_offsets_ext4_da_release_space {};
+
+struct trace_event_data_offsets_ext4__bitmap_load {};
+
+struct trace_event_data_offsets_ext4_read_block_bitmap_load {};
+
+struct trace_event_data_offsets_ext4__fallocate_mode {};
+
+struct trace_event_data_offsets_ext4_fallocate_exit {};
+
+struct trace_event_data_offsets_ext4_unlink_enter {};
+
+struct trace_event_data_offsets_ext4_unlink_exit {};
+
+struct trace_event_data_offsets_ext4__truncate {};
+
+struct trace_event_data_offsets_ext4_ext_convert_to_initialized_enter {};
+
+struct trace_event_data_offsets_ext4_ext_convert_to_initialized_fastpath {};
+
+struct trace_event_data_offsets_ext4__map_blocks_enter {};
+
+struct trace_event_data_offsets_ext4__map_blocks_exit {};
+
+struct trace_event_data_offsets_ext4_ext_load_extent {};
+
+struct trace_event_data_offsets_ext4_load_inode {};
+
+struct trace_event_data_offsets_ext4_journal_start {};
+
+struct trace_event_data_offsets_ext4_journal_start_reserved {};
+
+struct trace_event_data_offsets_ext4__trim {};
+
+struct trace_event_data_offsets_ext4_ext_handle_unwritten_extents {};
+
+struct trace_event_data_offsets_ext4_get_implied_cluster_alloc_exit {};
+
+struct trace_event_data_offsets_ext4_ext_show_extent {};
+
+struct trace_event_data_offsets_ext4_remove_blocks {};
+
+struct trace_event_data_offsets_ext4_ext_rm_leaf {};
+
+struct trace_event_data_offsets_ext4_ext_rm_idx {};
+
+struct trace_event_data_offsets_ext4_ext_remove_space {};
+
+struct trace_event_data_offsets_ext4_ext_remove_space_done {};
+
+struct trace_event_data_offsets_ext4__es_extent {};
+
+struct trace_event_data_offsets_ext4_es_remove_extent {};
+
+struct trace_event_data_offsets_ext4_es_find_extent_range_enter {};
+
+struct trace_event_data_offsets_ext4_es_find_extent_range_exit {};
+
+struct trace_event_data_offsets_ext4_es_lookup_extent_enter {};
+
+struct trace_event_data_offsets_ext4_es_lookup_extent_exit {};
+
+struct trace_event_data_offsets_ext4__es_shrink_enter {};
+
+struct trace_event_data_offsets_ext4_es_shrink_scan_exit {};
+
+struct trace_event_data_offsets_ext4_collapse_range {};
+
+struct trace_event_data_offsets_ext4_insert_range {};
+
+struct trace_event_data_offsets_ext4_es_shrink {};
+
+struct trace_event_data_offsets_ext4_es_insert_delayed_block {};
+
+struct trace_event_data_offsets_ext4_fsmap_class {};
+
+struct trace_event_data_offsets_ext4_getfsmap_class {};
+
+struct trace_event_data_offsets_ext4_shutdown {};
+
+struct trace_event_data_offsets_ext4_error {};
+
+struct trace_event_data_offsets_ext4_prefetch_bitmaps {};
+
+struct trace_event_data_offsets_ext4_lazy_itable_init {};
+
+struct trace_event_data_offsets_ext4_fc_replay_scan {};
+
+struct trace_event_data_offsets_ext4_fc_replay {};
+
+struct trace_event_data_offsets_ext4_fc_commit_start {};
+
+struct trace_event_data_offsets_ext4_fc_commit_stop {};
+
+struct trace_event_data_offsets_ext4_fc_stats {};
+
+struct trace_event_data_offsets_ext4_fc_track_dentry {};
+
+struct trace_event_data_offsets_ext4_fc_track_inode {};
+
+struct trace_event_data_offsets_ext4_fc_track_range {};
+
+struct trace_event_data_offsets_ext4_fc_cleanup {};
+
+struct trace_event_data_offsets_ext4_update_sb {};
+
+typedef void (*btf_trace_ext4_other_inode_update_time)(void *, struct inode *, ino_t);
+
+typedef void (*btf_trace_ext4_free_inode)(void *, struct inode *);
+
+typedef void (*btf_trace_ext4_request_inode)(void *, struct inode *, int);
+
+typedef void (*btf_trace_ext4_allocate_inode)(void *, struct inode *, struct inode *, int);
+
+typedef void (*btf_trace_ext4_evict_inode)(void *, struct inode *);
+
+typedef void (*btf_trace_ext4_drop_inode)(void *, struct inode *, int);
+
+typedef void (*btf_trace_ext4_nfs_commit_metadata)(void *, struct inode *);
+
+typedef void (*btf_trace_ext4_mark_inode_dirty)(void *, struct inode *, long unsigned int);
+
+typedef void (*btf_trace_ext4_begin_ordered_truncate)(void *, struct inode *, loff_t);
+
+typedef void (*btf_trace_ext4_write_begin)(void *, struct inode *, loff_t, unsigned int);
+
+typedef void (*btf_trace_ext4_da_write_begin)(void *, struct inode *, loff_t, unsigned int);
+
+typedef void (*btf_trace_ext4_write_end)(void *, struct inode *, loff_t, unsigned int, unsigned int);
+
+typedef void (*btf_trace_ext4_journalled_write_end)(void *, struct inode *, loff_t, unsigned int, unsigned int);
+
+typedef void (*btf_trace_ext4_da_write_end)(void *, struct inode *, loff_t, unsigned int, unsigned int);
+
+typedef void (*btf_trace_ext4_writepages)(void *, struct inode *, struct writeback_control *);
+
+typedef void (*btf_trace_ext4_da_write_pages)(void *, struct inode *, long unsigned int, struct writeback_control *);
+
+typedef void (*btf_trace_ext4_da_write_pages_extent)(void *, struct inode *, struct ext4_map_blocks *);
+
+typedef void (*btf_trace_ext4_writepages_result)(void *, struct inode *, struct writeback_control *, int, int);
+
+typedef void (*btf_trace_ext4_writepage)(void *, struct page *);
+
+typedef void (*btf_trace_ext4_readpage)(void *, struct page *);
+
+typedef void (*btf_trace_ext4_releasepage)(void *, struct page *);
+
+typedef void (*btf_trace_ext4_invalidate_folio)(void *, struct folio *, size_t, size_t);
+
+typedef void (*btf_trace_ext4_journalled_invalidate_folio)(void *, struct folio *, size_t, size_t);
+
+typedef void (*btf_trace_ext4_discard_blocks)(void *, struct super_block *, long long unsigned int, long long unsigned int);
+
+typedef void (*btf_trace_ext4_mb_new_inode_pa)(void *, struct ext4_allocation_context *, struct ext4_prealloc_space *);
+
+typedef void (*btf_trace_ext4_mb_new_group_pa)(void *, struct ext4_allocation_context *, struct ext4_prealloc_space *);
+
+typedef void (*btf_trace_ext4_mb_release_inode_pa)(void *, struct ext4_prealloc_space *, long long unsigned int, unsigned int);
+
+typedef void (*btf_trace_ext4_mb_release_group_pa)(void *, struct super_block *, struct ext4_prealloc_space *);
+
+typedef void (*btf_trace_ext4_discard_preallocations)(void *, struct inode *, unsigned int, unsigned int);
+
+typedef void (*btf_trace_ext4_mb_discard_preallocations)(void *, struct super_block *, int);
+
+typedef void (*btf_trace_ext4_request_blocks)(void *, struct ext4_allocation_request *);
+
+typedef void (*btf_trace_ext4_allocate_blocks)(void *, struct ext4_allocation_request *, long long unsigned int);
+
+typedef void (*btf_trace_ext4_free_blocks)(void *, struct inode *, __u64, long unsigned int, int);
+
+typedef void (*btf_trace_ext4_sync_file_enter)(void *, struct file *, int);
+
+typedef void (*btf_trace_ext4_sync_file_exit)(void *, struct inode *, int);
+
+typedef void (*btf_trace_ext4_sync_fs)(void *, struct super_block *, int);
+
+typedef void (*btf_trace_ext4_alloc_da_blocks)(void *, struct inode *);
+
+typedef void (*btf_trace_ext4_mballoc_alloc)(void *, struct ext4_allocation_context *);
+
+typedef void (*btf_trace_ext4_mballoc_prealloc)(void *, struct ext4_allocation_context *);
+
+typedef void (*btf_trace_ext4_mballoc_discard)(void *, struct super_block *, struct inode *, ext4_group_t, ext4_grpblk_t, ext4_grpblk_t);
+
+typedef void (*btf_trace_ext4_mballoc_free)(void *, struct super_block *, struct inode *, ext4_group_t, ext4_grpblk_t, ext4_grpblk_t);
+
+typedef void (*btf_trace_ext4_forget)(void *, struct inode *, int, __u64);
+
+typedef void (*btf_trace_ext4_da_update_reserve_space)(void *, struct inode *, int, int);
+
+typedef void (*btf_trace_ext4_da_reserve_space)(void *, struct inode *);
+
+typedef void (*btf_trace_ext4_da_release_space)(void *, struct inode *, int);
+
+typedef void (*btf_trace_ext4_mb_bitmap_load)(void *, struct super_block *, long unsigned int);
+
+typedef void (*btf_trace_ext4_mb_buddy_bitmap_load)(void *, struct super_block *, long unsigned int);
+
+typedef void (*btf_trace_ext4_load_inode_bitmap)(void *, struct super_block *, long unsigned int);
+
+typedef void (*btf_trace_ext4_read_block_bitmap_load)(void *, struct super_block *, long unsigned int, bool);
+
+typedef void (*btf_trace_ext4_fallocate_enter)(void *, struct inode *, loff_t, loff_t, int);
+
+typedef void (*btf_trace_ext4_punch_hole)(void *, struct inode *, loff_t, loff_t, int);
+
+typedef void (*btf_trace_ext4_zero_range)(void *, struct inode *, loff_t, loff_t, int);
+
+typedef void (*btf_trace_ext4_fallocate_exit)(void *, struct inode *, loff_t, unsigned int, int);
+
+typedef void (*btf_trace_ext4_unlink_enter)(void *, struct inode *, struct dentry *);
+
+typedef void (*btf_trace_ext4_unlink_exit)(void *, struct dentry *, int);
+
+typedef void (*btf_trace_ext4_truncate_enter)(void *, struct inode *);
+
+typedef void (*btf_trace_ext4_truncate_exit)(void *, struct inode *);
+
+typedef void (*btf_trace_ext4_ext_convert_to_initialized_enter)(void *, struct inode *, struct ext4_map_blocks *, struct ext4_extent *);
+
+typedef void (*btf_trace_ext4_ext_convert_to_initialized_fastpath)(void *, struct inode *, struct ext4_map_blocks *, struct ext4_extent *, struct ext4_extent *);
+
+typedef void (*btf_trace_ext4_ext_map_blocks_enter)(void *, struct inode *, ext4_lblk_t, unsigned int, unsigned int);
+
+typedef void (*btf_trace_ext4_ind_map_blocks_enter)(void *, struct inode *, ext4_lblk_t, unsigned int, unsigned int);
+
+typedef void (*btf_trace_ext4_ext_map_blocks_exit)(void *, struct inode *, unsigned int, struct ext4_map_blocks *, int);
+
+typedef void (*btf_trace_ext4_ind_map_blocks_exit)(void *, struct inode *, unsigned int, struct ext4_map_blocks *, int);
+
+typedef void (*btf_trace_ext4_ext_load_extent)(void *, struct inode *, ext4_lblk_t, ext4_fsblk_t);
+
+typedef void (*btf_trace_ext4_load_inode)(void *, struct super_block *, long unsigned int);
+
+typedef void (*btf_trace_ext4_journal_start)(void *, struct super_block *, int, int, int, long unsigned int);
+
+typedef void (*btf_trace_ext4_journal_start_reserved)(void *, struct super_block *, int, long unsigned int);
+
+typedef void (*btf_trace_ext4_trim_extent)(void *, struct super_block *, ext4_group_t, ext4_grpblk_t, ext4_grpblk_t);
+
+typedef void (*btf_trace_ext4_trim_all_free)(void *, struct super_block *, ext4_group_t, ext4_grpblk_t, ext4_grpblk_t);
+
+typedef void (*btf_trace_ext4_ext_handle_unwritten_extents)(void *, struct inode *, struct ext4_map_blocks *, int, unsigned int, ext4_fsblk_t);
+
+typedef void (*btf_trace_ext4_get_implied_cluster_alloc_exit)(void *, struct super_block *, struct ext4_map_blocks *, int);
+
+typedef void (*btf_trace_ext4_ext_show_extent)(void *, struct inode *, ext4_lblk_t, ext4_fsblk_t, short unsigned int);
+
+typedef void (*btf_trace_ext4_remove_blocks)(void *, struct inode *, struct ext4_extent *, ext4_lblk_t, ext4_fsblk_t, struct partial_cluster *);
+
+typedef void (*btf_trace_ext4_ext_rm_leaf)(void *, struct inode *, ext4_lblk_t, struct ext4_extent *, struct partial_cluster *);
+
+typedef void (*btf_trace_ext4_ext_rm_idx)(void *, struct inode *, ext4_fsblk_t);
+
+typedef void (*btf_trace_ext4_ext_remove_space)(void *, struct inode *, ext4_lblk_t, ext4_lblk_t, int);
+
+typedef void (*btf_trace_ext4_ext_remove_space_done)(void *, struct inode *, ext4_lblk_t, ext4_lblk_t, int, struct partial_cluster *, __le16);
+
+typedef void (*btf_trace_ext4_es_insert_extent)(void *, struct inode *, struct extent_status *);
+
+typedef void (*btf_trace_ext4_es_cache_extent)(void *, struct inode *, struct extent_status *);
+
+typedef void (*btf_trace_ext4_es_remove_extent)(void *, struct inode *, ext4_lblk_t, ext4_lblk_t);
+
+typedef void (*btf_trace_ext4_es_find_extent_range_enter)(void *, struct inode *, ext4_lblk_t);
+
+typedef void (*btf_trace_ext4_es_find_extent_range_exit)(void *, struct inode *, struct extent_status *);
+
+typedef void (*btf_trace_ext4_es_lookup_extent_enter)(void *, struct inode *, ext4_lblk_t);
+
+typedef void (*btf_trace_ext4_es_lookup_extent_exit)(void *, struct inode *, struct extent_status *, int);
+
+typedef void (*btf_trace_ext4_es_shrink_count)(void *, struct super_block *, int, int);
+
+typedef void (*btf_trace_ext4_es_shrink_scan_enter)(void *, struct super_block *, int, int);
+
+typedef void (*btf_trace_ext4_es_shrink_scan_exit)(void *, struct super_block *, int, int);
+
+typedef void (*btf_trace_ext4_collapse_range)(void *, struct inode *, loff_t, loff_t);
+
+typedef void (*btf_trace_ext4_insert_range)(void *, struct inode *, loff_t, loff_t);
+
+typedef void (*btf_trace_ext4_es_shrink)(void *, struct super_block *, int, u64, int, int);
+
+typedef void (*btf_trace_ext4_es_insert_delayed_block)(void *, struct inode *, struct extent_status *, bool);
+
+typedef void (*btf_trace_ext4_fsmap_low_key)(void *, struct super_block *, u32, u32, u64, u64, u64);
+
+typedef void (*btf_trace_ext4_fsmap_high_key)(void *, struct super_block *, u32, u32, u64, u64, u64);
+
+typedef void (*btf_trace_ext4_fsmap_mapping)(void *, struct super_block *, u32, u32, u64, u64, u64);
+
+typedef void (*btf_trace_ext4_getfsmap_low_key)(void *, struct super_block *, struct ext4_fsmap *);
+
+typedef void (*btf_trace_ext4_getfsmap_high_key)(void *, struct super_block *, struct ext4_fsmap *);
+
+typedef void (*btf_trace_ext4_getfsmap_mapping)(void *, struct super_block *, struct ext4_fsmap *);
+
+typedef void (*btf_trace_ext4_shutdown)(void *, struct super_block *, long unsigned int);
+
+typedef void (*btf_trace_ext4_error)(void *, struct super_block *, const char *, unsigned int);
+
+typedef void (*btf_trace_ext4_prefetch_bitmaps)(void *, struct super_block *, ext4_group_t, ext4_group_t, unsigned int);
+
+typedef void (*btf_trace_ext4_lazy_itable_init)(void *, struct super_block *, ext4_group_t);
+
+typedef void (*btf_trace_ext4_fc_replay_scan)(void *, struct super_block *, int, int);
+
+typedef void (*btf_trace_ext4_fc_replay)(void *, struct super_block *, int, int, int, int);
+
+typedef void (*btf_trace_ext4_fc_commit_start)(void *, struct super_block *, tid_t);
+
+typedef void (*btf_trace_ext4_fc_commit_stop)(void *, struct super_block *, int, int, tid_t);
+
+typedef void (*btf_trace_ext4_fc_stats)(void *, struct super_block *);
+
+typedef void (*btf_trace_ext4_fc_track_create)(void *, handle_t *, struct inode *, struct dentry *, int);
+
+typedef void (*btf_trace_ext4_fc_track_link)(void *, handle_t *, struct inode *, struct dentry *, int);
+
+typedef void (*btf_trace_ext4_fc_track_unlink)(void *, handle_t *, struct inode *, struct dentry *, int);
+
+typedef void (*btf_trace_ext4_fc_track_inode)(void *, handle_t *, struct inode *, int);
+
+typedef void (*btf_trace_ext4_fc_track_range)(void *, handle_t *, struct inode *, long int, long int, int);
+
+typedef void (*btf_trace_ext4_fc_cleanup)(void *, journal_t *, int, tid_t);
+
+typedef void (*btf_trace_ext4_update_sb)(void *, struct super_block *, ext4_fsblk_t, unsigned int);
+
+struct ext4_err_translation {
+ int code;
+ int errno;
+};
+
+enum {
+ Opt_bsd_df = 0,
+ Opt_minix_df = 1,
+ Opt_grpid = 2,
+ Opt_nogrpid = 3,
+ Opt_resgid = 4,
+ Opt_resuid = 5,
+ Opt_sb = 6,
+ Opt_nouid32 = 7,
+ Opt_debug = 8,
+ Opt_removed = 9,
+ Opt_user_xattr = 10,
+ Opt_acl = 11,
+ Opt_auto_da_alloc = 12,
+ Opt_noauto_da_alloc = 13,
+ Opt_noload = 14,
+ Opt_commit = 15,
+ Opt_min_batch_time = 16,
+ Opt_max_batch_time = 17,
+ Opt_journal_dev = 18,
+ Opt_journal_path = 19,
+ Opt_journal_checksum = 20,
+ Opt_journal_async_commit = 21,
+ Opt_abort = 22,
+ Opt_data_journal = 23,
+ Opt_data_ordered = 24,
+ Opt_data_writeback = 25,
+ Opt_data_err_abort = 26,
+ Opt_data_err_ignore = 27,
+ Opt_test_dummy_encryption = 28,
+ Opt_inlinecrypt = 29,
+ Opt_usrjquota = 30,
+ Opt_grpjquota = 31,
+ Opt_quota = 32,
+ Opt_noquota = 33,
+ Opt_barrier = 34,
+ Opt_nobarrier = 35,
+ Opt_err___2 = 36,
+ Opt_usrquota = 37,
+ Opt_grpquota = 38,
+ Opt_prjquota = 39,
+ Opt_dax = 40,
+ Opt_dax_always = 41,
+ Opt_dax_inode = 42,
+ Opt_dax_never = 43,
+ Opt_stripe = 44,
+ Opt_delalloc = 45,
+ Opt_nodelalloc = 46,
+ Opt_warn_on_error = 47,
+ Opt_nowarn_on_error = 48,
+ Opt_mblk_io_submit = 49,
+ Opt_debug_want_extra_isize = 50,
+ Opt_nomblk_io_submit = 51,
+ Opt_block_validity = 52,
+ Opt_noblock_validity = 53,
+ Opt_inode_readahead_blks = 54,
+ Opt_journal_ioprio = 55,
+ Opt_dioread_nolock = 56,
+ Opt_dioread_lock = 57,
+ Opt_discard = 58,
+ Opt_nodiscard = 59,
+ Opt_init_itable = 60,
+ Opt_noinit_itable = 61,
+ Opt_max_dir_size_kb = 62,
+ Opt_nojournal_checksum = 63,
+ Opt_nombcache = 64,
+ Opt_no_prefetch_block_bitmaps = 65,
+ Opt_mb_optimize_scan = 66,
+ Opt_errors = 67,
+ Opt_data = 68,
+ Opt_data_err = 69,
+ Opt_jqfmt = 70,
+ Opt_dax_type = 71,
+};
+
+struct mount_opts {
+ int token;
+ int mount_opt;
+ int flags;
+};
+
+struct ext4_fs_context {
+ char *s_qf_names[3];
+ struct fscrypt_dummy_policy dummy_enc_policy;
+ int s_jquota_fmt;
+ short unsigned int qname_spec;
+ long unsigned int vals_s_flags;
+ long unsigned int mask_s_flags;
+ long unsigned int journal_devnum;
+ long unsigned int s_commit_interval;
+ long unsigned int s_stripe;
+ unsigned int s_inode_readahead_blks;
+ unsigned int s_want_extra_isize;
+ unsigned int s_li_wait_mult;
+ unsigned int s_max_dir_size_kb;
+ unsigned int journal_ioprio;
+ unsigned int vals_s_mount_opt;
+ unsigned int mask_s_mount_opt;
+ unsigned int vals_s_mount_opt2;
+ unsigned int mask_s_mount_opt2;
+ long unsigned int vals_s_mount_flags;
+ long unsigned int mask_s_mount_flags;
+ unsigned int opt_flags;
+ unsigned int spec;
+ u32 s_max_batch_time;
+ u32 s_min_batch_time;
+ kuid_t s_resuid;
+ kgid_t s_resgid;
+ ext4_fsblk_t s_sb_block;
+};
+
+struct ext4_mount_options {
+ long unsigned int s_mount_opt;
+ long unsigned int s_mount_opt2;
+ kuid_t s_resuid;
+ kgid_t s_resgid;
+ long unsigned int s_commit_interval;
+ u32 s_min_batch_time;
+ u32 s_max_batch_time;
+};
+
+struct sockaddr_xdp {
+ __u16 sxdp_family;
+ __u16 sxdp_flags;
+ __u32 sxdp_ifindex;
+ __u32 sxdp_queue_id;
+ __u32 sxdp_shared_umem_fd;
+};
+
+struct xdp_ring_offset {
+ __u64 producer;
+ __u64 consumer;
+ __u64 desc;
+ __u64 flags;
+};
+
+struct xdp_mmap_offsets {
+ struct xdp_ring_offset rx;
+ struct xdp_ring_offset tx;
+ struct xdp_ring_offset fr;
+ struct xdp_ring_offset cr;
+};
+
+struct xdp_umem_reg {
+ __u64 addr;
+ __u64 len;
+ __u32 chunk_size;
+ __u32 headroom;
+ __u32 flags;
+};
+
+struct xdp_statistics {
+ __u64 rx_dropped;
+ __u64 rx_invalid_descs;
+ __u64 tx_invalid_descs;
+ __u64 rx_ring_full;
+ __u64 rx_fill_ring_empty_descs;
+ __u64 tx_ring_empty_descs;
+};
+
+struct xdp_options {
+ __u32 flags;
+};
+
+struct net_proto_family {
+ int family;
+ int (*create)(struct net *, struct socket *, int, int);
+ struct module *owner;
+};
+
+struct xsk_map {
+ struct bpf_map map;
+ spinlock_t lock;
+ struct xdp_sock *xsk_map[0];
+};
+
+struct xdp_ring_offset_v1 {
+ __u64 producer;
+ __u64 consumer;
+ __u64 desc;
+};
+
+struct xdp_mmap_offsets_v1 {
+ struct xdp_ring_offset_v1 rx;
+ struct xdp_ring_offset_v1 tx;
+ struct xdp_ring_offset_v1 fr;
+ struct xdp_ring_offset_v1 cr;
+};
+
+struct xsk_map_node {
+ struct list_head node;
+ struct xsk_map *map;
+ struct xdp_sock **map_entry;
+};
+
+struct xdp_rxtx_ring {
+ struct xdp_ring ptrs;
+ struct xdp_desc desc[0];
+};
+
+struct xdp_umem_ring {
+ struct xdp_ring ptrs;
+ u64 desc[0];
+};
+
+struct perf_msr {
+ u64 msr;
+ struct attribute_group *grp;
+ bool (*test)(int, void *);
+ bool no_check;
+ u64 mask;
+};
+
+struct mpf_intel {
+ char signature[4];
+ unsigned int physptr;
+ unsigned char length;
+ unsigned char specification;
+ unsigned char checksum;
+ unsigned char feature1;
+ unsigned char feature2;
+ unsigned char feature3;
+ unsigned char feature4;
+ unsigned char feature5;
+};
+
+struct mpc_table {
+ char signature[4];
+ short unsigned int length;
+ char spec;
+ char checksum;
+ char oem[8];
+ char productid[12];
+ unsigned int oemptr;
+ short unsigned int oemsize;
+ short unsigned int oemcount;
+ unsigned int lapic;
+ unsigned int reserved;
+};
+
+struct mpc_cpu {
+ unsigned char type;
+ unsigned char apicid;
+ unsigned char apicver;
+ unsigned char cpuflag;
+ unsigned int cpufeature;
+ unsigned int featureflag;
+ unsigned int reserved[2];
+};
+
+struct mpc_bus {
+ unsigned char type;
+ unsigned char busid;
+ unsigned char bustype[6];
+};
+
+struct mpc_lintsrc {
+ unsigned char type;
+ unsigned char irqtype;
+ short unsigned int irqflag;
+ unsigned char srcbusid;
+ unsigned char srcbusirq;
+ unsigned char destapic;
+ unsigned char destapiclint;
+};
+
+struct __kernel_timex_timeval {
+ __kernel_time64_t tv_sec;
+ long long int tv_usec;
+};
+
+struct __kernel_timex {
+ unsigned int modes;
+ long long int offset;
+ long long int freq;
+ long long int maxerror;
+ long long int esterror;
+ int status;
+ long long int constant;
+ long long int precision;
+ long long int tolerance;
+ struct __kernel_timex_timeval time;
+ long long int tick;
+ long long int ppsfreq;
+ long long int jitter;
+ int shift;
+ long long int stabil;
+ long long int jitcnt;
+ long long int calcnt;
+ long long int errcnt;
+ long long int stbcnt;
+ int tai;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct ktime_timestamps {
+ u64 mono;
+ u64 boot;
+ u64 real;
+};
+
+struct system_time_snapshot {
+ u64 cycles;
+ ktime_t real;
+ ktime_t raw;
+ enum clocksource_ids cs_id;
+ unsigned int clock_was_set_seq;
+ u8 cs_was_changed_seq;
+};
+
+struct system_device_crosststamp {
+ ktime_t device;
+ ktime_t sys_realtime;
+ ktime_t sys_monoraw;
+};
+
+struct system_counterval_t {
+ u64 cycles;
+ struct clocksource *cs;
+};
+
+typedef struct {
+ seqcount_t seqcount;
+} seqcount_latch_t;
+
+struct tk_read_base {
+ struct clocksource *clock;
+ u64 mask;
+ u64 cycle_last;
+ u32 mult;
+ u32 shift;
+ u64 xtime_nsec;
+ ktime_t base;
+ u64 base_real;
+};
+
+struct timekeeper {
+ struct tk_read_base tkr_mono;
+ struct tk_read_base tkr_raw;
+ u64 xtime_sec;
+ long unsigned int ktime_sec;
+ struct timespec64 wall_to_monotonic;
+ ktime_t offs_real;
+ ktime_t offs_boot;
+ ktime_t offs_tai;
+ s32 tai_offset;
+ unsigned int clock_was_set_seq;
+ u8 cs_was_changed_seq;
+ ktime_t next_leap_ktime;
+ u64 raw_sec;
+ struct timespec64 monotonic_to_boot;
+ u64 cycle_interval;
+ u64 xtime_interval;
+ s64 xtime_remainder;
+ u64 raw_interval;
+ u64 ntp_tick;
+ s64 ntp_error;
+ u32 ntp_error_shift;
+ u32 ntp_err_mult;
+ u32 skip_second_overflow;
+};
+
+enum timekeeping_adv_mode {
+ TK_ADV_TICK = 0,
+ TK_ADV_FREQ = 1,
+};
+
+struct tk_fast {
+ seqcount_latch_t seq;
+ struct tk_read_base base[2];
+};
+
+struct bpf_iter__cgroup {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct cgroup *cgroup;
+ };
+};
+
+struct cgroup_iter_priv {
+ struct cgroup_subsys_state *start_css;
+ bool visited_all;
+ bool terminate;
+ int order;
+};
+
+struct trace_event_raw_mm_filemap_op_page_cache {
+ struct trace_entry ent;
+ long unsigned int pfn;
+ long unsigned int i_ino;
+ long unsigned int index;
+ dev_t s_dev;
+ unsigned char order;
+ char __data[0];
+};
+
+struct trace_event_raw_filemap_set_wb_err {
+ struct trace_entry ent;
+ long unsigned int i_ino;
+ dev_t s_dev;
+ errseq_t errseq;
+ char __data[0];
+};
+
+struct trace_event_raw_file_check_and_advance_wb_err {
+ struct trace_entry ent;
+ struct file *file;
+ long unsigned int i_ino;
+ dev_t s_dev;
+ errseq_t old;
+ errseq_t new;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_mm_filemap_op_page_cache {};
+
+struct trace_event_data_offsets_filemap_set_wb_err {};
+
+struct trace_event_data_offsets_file_check_and_advance_wb_err {};
+
+typedef void (*btf_trace_mm_filemap_delete_from_page_cache)(void *, struct folio *);
+
+typedef void (*btf_trace_mm_filemap_add_to_page_cache)(void *, struct folio *);
+
+typedef void (*btf_trace_filemap_set_wb_err)(void *, struct address_space *, errseq_t);
+
+typedef void (*btf_trace_file_check_and_advance_wb_err)(void *, struct file *, errseq_t);
+
+enum behavior {
+ EXCLUSIVE = 0,
+ SHARED = 1,
+ DROP = 2,
+};
+
+struct req_iterator {
+ struct bvec_iter iter;
+ struct bio *bio;
+};
+
+enum {
+ LIMIT_LOW = 0,
+ LIMIT_MAX = 1,
+ LIMIT_CNT = 2,
+};
+
+enum bio_merge_status {
+ BIO_MERGE_OK = 0,
+ BIO_MERGE_NONE = 1,
+ BIO_MERGE_FAILED = 2,
+};
+
+struct user_msghdr {
+ void *msg_name;
+ int msg_namelen;
+ struct iovec *msg_iov;
+ __kernel_size_t msg_iovlen;
+ void *msg_control;
+ __kernel_size_t msg_controllen;
+ unsigned int msg_flags;
+};
+
+typedef u32 compat_size_t;
+
+typedef u32 compat_uint_t;
+
+struct compat_msghdr {
+ compat_uptr_t msg_name;
+ compat_int_t msg_namelen;
+ compat_uptr_t msg_iov;
+ compat_size_t msg_iovlen;
+ compat_uptr_t msg_control;
+ compat_size_t msg_controllen;
+ compat_uint_t msg_flags;
+};
+
+struct io_uring_recvmsg_out {
+ __u32 namelen;
+ __u32 controllen;
+ __u32 payloadlen;
+ __u32 flags;
+};
+
+struct io_async_msghdr {
+ union {
+ struct iovec fast_iov[8];
+ struct {
+ struct iovec fast_iov_one;
+ __kernel_size_t controllen;
+ int namelen;
+ __kernel_size_t payloadlen;
+ };
+ struct io_cache_entry cache;
+ };
+ struct iovec *free_iov;
+ struct sockaddr *uaddr;
+ struct msghdr msg;
+ struct __kernel_sockaddr_storage addr;
+};
+
+struct io_async_connect {
+ struct __kernel_sockaddr_storage address;
+};
+
+struct io_shutdown {
+ struct file *file;
+ int how;
+};
+
+struct io_accept {
+ struct file *file;
+ struct sockaddr *addr;
+ int *addr_len;
+ int flags;
+ u32 file_slot;
+ long unsigned int nofile;
+};
+
+struct io_socket {
+ struct file *file;
+ int domain;
+ int type;
+ int protocol;
+ int flags;
+ u32 file_slot;
+ long unsigned int nofile;
+};
+
+struct io_connect {
+ struct file *file;
+ struct sockaddr *addr;
+ int addr_len;
+ bool in_progress;
+};
+
+struct io_sr_msg {
+ struct file *file;
+ union {
+ struct compat_msghdr *umsg_compat;
+ struct user_msghdr *umsg;
+ void *buf;
+ };
+ unsigned int len;
+ unsigned int done_io;
+ unsigned int msg_flags;
+ u16 flags;
+ u16 addr_len;
+ void *addr;
+ struct io_kiocb *notif;
+};
+
+struct io_recvmsg_multishot_hdr {
+ struct io_uring_recvmsg_out msg;
+ struct __kernel_sockaddr_storage addr;
+};
+
+struct resource_win {
+ struct resource res;
+ resource_size_t offset;
+};
+
+enum crb_defaults {
+ CRB_ACPI_START_REVISION_ID = 1,
+ CRB_ACPI_START_INDEX = 1,
+};
+
+enum crb_loc_ctrl {
+ CRB_LOC_CTRL_REQUEST_ACCESS = 1,
+ CRB_LOC_CTRL_RELINQUISH = 2,
+};
+
+enum crb_loc_state {
+ CRB_LOC_STATE_LOC_ASSIGNED = 2,
+ CRB_LOC_STATE_TPM_REG_VALID_STS = 128,
+};
+
+enum crb_ctrl_req {
+ CRB_CTRL_REQ_CMD_READY = 1,
+ CRB_CTRL_REQ_GO_IDLE = 2,
+};
+
+enum crb_ctrl_sts {
+ CRB_CTRL_STS_ERROR = 1,
+ CRB_CTRL_STS_TPM_IDLE = 2,
+};
+
+enum crb_start {
+ CRB_START_INVOKE = 1,
+};
+
+enum crb_cancel {
+ CRB_CANCEL_INVOKE = 1,
+};
+
+struct crb_regs_head {
+ u32 loc_state;
+ u32 reserved1;
+ u32 loc_ctrl;
+ u32 loc_sts;
+ u8 reserved2[32];
+ u64 intf_id;
+ u64 ctrl_ext;
+};
+
+struct crb_regs_tail {
+ u32 ctrl_req;
+ u32 ctrl_sts;
+ u32 ctrl_cancel;
+ u32 ctrl_start;
+ u32 ctrl_int_enable;
+ u32 ctrl_int_sts;
+ u32 ctrl_cmd_size;
+ u32 ctrl_cmd_pa_low;
+ u32 ctrl_cmd_pa_high;
+ u32 ctrl_rsp_size;
+ u64 ctrl_rsp_pa;
+};
+
+enum crb_status {
+ CRB_DRV_STS_COMPLETE = 1,
+};
+
+struct crb_priv {
+ u32 sm;
+ const char *hid;
+ struct crb_regs_head *regs_h;
+ struct crb_regs_tail *regs_t;
+ u8 *cmd;
+ u8 *rsp;
+ u32 cmd_size;
+ u32 smc_func_id;
+};
+
+struct tpm2_crb_smc {
+ u32 interrupt;
+ u8 interrupt_flags;
+ u8 op_flags;
+ u16 reserved2;
+ u32 smc_func_id;
+};
+
+struct kthread_delayed_work {
+ struct kthread_work work;
+ struct timer_list timer;
+};
+
+struct posix_clock;
+
+struct posix_clock_operations {
+ struct module *owner;
+ int (*clock_adjtime)(struct posix_clock *, struct __kernel_timex *);
+ int (*clock_gettime)(struct posix_clock *, struct timespec64 *);
+ int (*clock_getres)(struct posix_clock *, struct timespec64 *);
+ int (*clock_settime)(struct posix_clock *, const struct timespec64 *);
+ long int (*ioctl)(struct posix_clock *, unsigned int, long unsigned int);
+ int (*open)(struct posix_clock *, fmode_t);
+ __poll_t (*poll)(struct posix_clock *, struct file *, poll_table *);
+ int (*release)(struct posix_clock *);
+ ssize_t (*read)(struct posix_clock *, uint, char *, size_t);
+};
+
+struct posix_clock {
+ struct posix_clock_operations ops;
+ struct cdev cdev;
+ struct device *dev;
+ struct rw_semaphore rwsem;
+ bool zombie;
+};
+
+struct ptp_clock_time {
+ __s64 sec;
+ __u32 nsec;
+ __u32 reserved;
+};
+
+struct ptp_extts_request {
+ unsigned int index;
+ unsigned int flags;
+ unsigned int rsv[2];
+};
+
+struct ptp_perout_request {
+ union {
+ struct ptp_clock_time start;
+ struct ptp_clock_time phase;
+ };
+ struct ptp_clock_time period;
+ unsigned int index;
+ unsigned int flags;
+ union {
+ struct ptp_clock_time on;
+ unsigned int rsv[4];
+ };
+};
+
+enum ptp_pin_function {
+ PTP_PF_NONE = 0,
+ PTP_PF_EXTTS = 1,
+ PTP_PF_PEROUT = 2,
+ PTP_PF_PHYSYNC = 3,
+};
+
+struct ptp_pin_desc {
+ char name[64];
+ unsigned int index;
+ unsigned int func;
+ unsigned int chan;
+ unsigned int rsv[5];
+};
+
+struct ptp_extts_event {
+ struct ptp_clock_time t;
+ unsigned int index;
+ unsigned int flags;
+ unsigned int rsv[2];
+};
+
+struct pps_ktime {
+ __s64 sec;
+ __s32 nsec;
+ __u32 flags;
+};
+
+struct pps_kparams {
+ int api_version;
+ int mode;
+ struct pps_ktime assert_off_tu;
+ struct pps_ktime clear_off_tu;
+};
+
+struct pps_device;
+
+struct pps_source_info {
+ char name[32];
+ char path[32];
+ int mode;
+ void (*echo)(struct pps_device *, int, void *);
+ struct module *owner;
+ struct device *dev;
+};
+
+struct pps_device {
+ struct pps_source_info info;
+ struct pps_kparams params;
+ __u32 assert_sequence;
+ __u32 clear_sequence;
+ struct pps_ktime assert_tu;
+ struct pps_ktime clear_tu;
+ int current_mode;
+ unsigned int last_ev;
+ wait_queue_head_t queue;
+ unsigned int id;
+ const void *lookup_cookie;
+ struct cdev cdev;
+ struct device *dev;
+ struct fasync_struct *async_queue;
+ spinlock_t lock;
+};
+
+struct cyclecounter {
+ u64 (*read)(const struct cyclecounter *);
+ u64 mask;
+ u32 mult;
+ u32 shift;
+};
+
+struct timecounter {
+ const struct cyclecounter *cc;
+ u64 cycle_last;
+ u64 nsec;
+ u64 mask;
+ u64 frac;
+};
+
+struct ptp_clock_request {
+ enum {
+ PTP_CLK_REQ_EXTTS = 0,
+ PTP_CLK_REQ_PEROUT = 1,
+ PTP_CLK_REQ_PPS = 2,
+ } type;
+ union {
+ struct ptp_extts_request extts;
+ struct ptp_perout_request perout;
+ };
+};
+
+struct ptp_system_timestamp {
+ struct timespec64 pre_ts;
+ struct timespec64 post_ts;
+};
+
+struct ptp_clock_info {
+ struct module *owner;
+ char name[32];
+ s32 max_adj;
+ int n_alarm;
+ int n_ext_ts;
+ int n_per_out;
+ int n_pins;
+ int pps;
+ struct ptp_pin_desc *pin_config;
+ int (*adjfine)(struct ptp_clock_info *, long int);
+ int (*adjphase)(struct ptp_clock_info *, s32);
+ int (*adjtime)(struct ptp_clock_info *, s64);
+ int (*gettime64)(struct ptp_clock_info *, struct timespec64 *);
+ int (*gettimex64)(struct ptp_clock_info *, struct timespec64 *, struct ptp_system_timestamp *);
+ int (*getcrosststamp)(struct ptp_clock_info *, struct system_device_crosststamp *);
+ int (*settime64)(struct ptp_clock_info *, const struct timespec64 *);
+ int (*getcycles64)(struct ptp_clock_info *, struct timespec64 *);
+ int (*getcyclesx64)(struct ptp_clock_info *, struct timespec64 *, struct ptp_system_timestamp *);
+ int (*getcrosscycles)(struct ptp_clock_info *, struct system_device_crosststamp *);
+ int (*enable)(struct ptp_clock_info *, struct ptp_clock_request *, int);
+ int (*verify)(struct ptp_clock_info *, unsigned int, enum ptp_pin_function, unsigned int);
+ long int (*do_aux_work)(struct ptp_clock_info *);
+};
+
+struct timestamp_event_queue {
+ struct ptp_extts_event buf[128];
+ int head;
+ int tail;
+ spinlock_t lock;
+};
+
+struct ptp_clock {
+ struct posix_clock clock;
+ struct device dev;
+ struct ptp_clock_info *info;
+ dev_t devid;
+ int index;
+ struct pps_device *pps_source;
+ long int dialed_frequency;
+ struct timestamp_event_queue tsevq;
+ struct mutex tsevq_mux;
+ struct mutex pincfg_mux;
+ wait_queue_head_t tsev_wq;
+ int defunct;
+ struct device_attribute *pin_dev_attr;
+ struct attribute **pin_attr;
+ struct attribute_group pin_attr_group;
+ const struct attribute_group *pin_attr_groups[2];
+ struct kthread_worker *kworker;
+ struct kthread_delayed_work aux_work;
+ unsigned int max_vclocks;
+ unsigned int n_vclocks;
+ int *vclock_index;
+ struct mutex n_vclocks_mux;
+ bool is_virtual_clock;
+ bool has_cycles;
+};
+
+struct ptp_vclock {
+ struct ptp_clock *pclock;
+ struct ptp_clock_info info;
+ struct ptp_clock *clock;
+ struct hlist_node vclock_hash_node;
+ struct cyclecounter cc;
+ struct timecounter tc;
+ spinlock_t lock;
+};
+
+struct ucred {
+ __u32 pid;
+ __u32 uid;
+ __u32 gid;
+};
+
+struct scm_cookie {
+ struct pid *pid;
+ struct scm_fp_list *fp;
+ struct scm_creds creds;
+ u32 secid;
+};
+
+struct sockaddr_nl {
+ __kernel_sa_family_t nl_family;
+ short unsigned int nl_pad;
+ __u32 nl_pid;
+ __u32 nl_groups;
+};
+
+struct nlmsgerr {
+ int error;
+ struct nlmsghdr msg;
+};
+
+enum nlmsgerr_attrs {
+ NLMSGERR_ATTR_UNUSED = 0,
+ NLMSGERR_ATTR_MSG = 1,
+ NLMSGERR_ATTR_OFFS = 2,
+ NLMSGERR_ATTR_COOKIE = 3,
+ NLMSGERR_ATTR_POLICY = 4,
+ NLMSGERR_ATTR_MISS_TYPE = 5,
+ NLMSGERR_ATTR_MISS_NEST = 6,
+ __NLMSGERR_ATTR_MAX = 7,
+ NLMSGERR_ATTR_MAX = 6,
+};
+
+struct nl_pktinfo {
+ __u32 group;
+};
+
+enum {
+ NETLINK_UNCONNECTED = 0,
+ NETLINK_CONNECTED = 1,
+};
+
+enum netlink_skb_flags {
+ NETLINK_SKB_DST = 8,
+};
+
+struct netlink_notify {
+ struct net *net;
+ u32 portid;
+ int protocol;
+};
+
+struct netlink_tap {
+ struct net_device *dev;
+ struct module *module;
+ struct list_head list;
+};
+
+struct socket_alloc {
+ struct socket socket;
+ struct inode vfs_inode;
+ long: 64;
+};
+
+struct trace_event_raw_netlink_extack {
+ struct trace_entry ent;
+ u32 __data_loc_msg;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_netlink_extack {
+ u32 msg;
+};
+
+typedef void (*btf_trace_netlink_extack)(void *, const char *);
+
+struct netlink_sock {
+ struct sock sk;
+ u32 portid;
+ u32 dst_portid;
+ u32 dst_group;
+ u32 flags;
+ u32 subscriptions;
+ u32 ngroups;
+ long unsigned int *groups;
+ long unsigned int state;
+ size_t max_recvmsg_len;
+ wait_queue_head_t wait;
+ bool bound;
+ bool cb_running;
+ int dump_done_errno;
+ struct netlink_callback cb;
+ struct mutex *cb_mutex;
+ struct mutex cb_def_mutex;
+ void (*netlink_rcv)(struct sk_buff *);
+ int (*netlink_bind)(struct net *, int);
+ void (*netlink_unbind)(struct net *, int);
+ struct module *module;
+ struct rhash_head node;
+ struct callback_head rcu;
+ struct work_struct work;
+};
+
+struct listeners;
+
+struct netlink_table {
+ struct rhashtable hash;
+ struct hlist_head mc_list;
+ struct listeners *listeners;
+ unsigned int flags;
+ unsigned int groups;
+ struct mutex *cb_mutex;
+ struct module *module;
+ int (*bind)(struct net *, int);
+ void (*unbind)(struct net *, int);
+ bool (*compare)(struct net *, struct sock *);
+ int registered;
+};
+
+struct listeners {
+ struct callback_head rcu;
+ long unsigned int masks[0];
+};
+
+struct netlink_tap_net {
+ struct list_head netlink_tap_all;
+ struct mutex netlink_tap_lock;
+};
+
+struct netlink_compare_arg {
+ possible_net_t pnet;
+ u32 portid;
+};
+
+struct netlink_broadcast_data {
+ struct sock *exclude_sk;
+ struct net *net;
+ u32 portid;
+ u32 group;
+ int failure;
+ int delivery_failure;
+ int congested;
+ int delivered;
+ gfp_t allocation;
+ struct sk_buff *skb;
+ struct sk_buff *skb2;
+};
+
+struct netlink_set_err_data {
+ struct sock *exclude_sk;
+ u32 portid;
+ u32 group;
+ int code;
+};
+
+struct nl_seq_iter {
+ struct seq_net_private p;
+ struct rhashtable_iter hti;
+ int link;
+};
+
+struct bpf_iter__netlink {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct netlink_sock *sk;
+ };
+};
+
+enum sock_shutdown_cmd {
+ SHUT_RD = 0,
+ SHUT_WR = 1,
+ SHUT_RDWR = 2,
+};
+
+struct udp_port_cfg {
+ u8 family;
+ union {
+ struct in_addr local_ip;
+ struct in6_addr local_ip6;
+ };
+ union {
+ struct in_addr peer_ip;
+ struct in6_addr peer_ip6;
+ };
+ __be16 local_udp_port;
+ __be16 peer_udp_port;
+ int bind_ifindex;
+ unsigned int use_udp_checksums: 1;
+ unsigned int use_udp6_tx_checksums: 1;
+ unsigned int use_udp6_rx_checksums: 1;
+ unsigned int ipv6_v6only: 1;
+};
+
+typedef int (*udp_tunnel_encap_rcv_t)(struct sock *, struct sk_buff *);
+
+typedef int (*udp_tunnel_encap_err_lookup_t)(struct sock *, struct sk_buff *);
+
+typedef void (*udp_tunnel_encap_err_rcv_t)(struct sock *, struct sk_buff *, int, __be16, u32, u8 *);
+
+typedef void (*udp_tunnel_encap_destroy_t)(struct sock *);
+
+typedef struct sk_buff * (*udp_tunnel_gro_receive_t)(struct sock *, struct list_head *, struct sk_buff *);
+
+typedef int (*udp_tunnel_gro_complete_t)(struct sock *, struct sk_buff *, int);
+
+struct udp_tunnel_sock_cfg {
+ void *sk_user_data;
+ __u8 encap_type;
+ udp_tunnel_encap_rcv_t encap_rcv;
+ udp_tunnel_encap_err_lookup_t encap_err_lookup;
+ udp_tunnel_encap_err_rcv_t encap_err_rcv;
+ udp_tunnel_encap_destroy_t encap_destroy;
+ udp_tunnel_gro_receive_t gro_receive;
+ udp_tunnel_gro_complete_t gro_complete;
+};
+
+struct xfrm6_tunnel {
+ int (*handler)(struct sk_buff *);
+ int (*cb_handler)(struct sk_buff *, int);
+ int (*err_handler)(struct sk_buff *, struct inet6_skb_parm *, u8, u8, int, __be32);
+ struct xfrm6_tunnel *next;
+ int priority;
+};
+
+enum {
+ PERF_BR_UNKNOWN = 0,
+ PERF_BR_COND = 1,
+ PERF_BR_UNCOND = 2,
+ PERF_BR_IND = 3,
+ PERF_BR_CALL = 4,
+ PERF_BR_IND_CALL = 5,
+ PERF_BR_RET = 6,
+ PERF_BR_SYSCALL = 7,
+ PERF_BR_SYSRET = 8,
+ PERF_BR_COND_CALL = 9,
+ PERF_BR_COND_RET = 10,
+ PERF_BR_ERET = 11,
+ PERF_BR_IRQ = 12,
+ PERF_BR_SERROR = 13,
+ PERF_BR_NO_TX = 14,
+ PERF_BR_EXTEND_ABI = 15,
+ PERF_BR_MAX = 16,
+};
+
+enum {
+ X86_BR_NONE = 0,
+ X86_BR_USER = 1,
+ X86_BR_KERNEL = 2,
+ X86_BR_CALL = 4,
+ X86_BR_RET = 8,
+ X86_BR_SYSCALL = 16,
+ X86_BR_SYSRET = 32,
+ X86_BR_INT = 64,
+ X86_BR_IRET = 128,
+ X86_BR_JCC = 256,
+ X86_BR_JMP = 512,
+ X86_BR_IRQ = 1024,
+ X86_BR_IND_CALL = 2048,
+ X86_BR_ABORT = 4096,
+ X86_BR_IN_TX = 8192,
+ X86_BR_NO_TX = 16384,
+ X86_BR_ZERO_CALL = 32768,
+ X86_BR_CALL_STACK = 65536,
+ X86_BR_IND_JMP = 131072,
+ X86_BR_TYPE_SAVE = 262144,
+};
+
+struct kretprobe_blackpoint {
+ const char *name;
+ void *addr;
+};
+
+struct kprobe_insn_cache {
+ struct mutex mutex;
+ void * (*alloc)();
+ void (*free)(void *);
+ const char *sym;
+ struct list_head pages;
+ size_t insn_size;
+ int nr_garbage;
+};
+
+struct __arch_relative_insn {
+ u8 op;
+ s32 raddr;
+} __attribute__((packed));
+
+enum {
+ PER_LINUX = 0,
+ PER_LINUX_32BIT = 8388608,
+ PER_LINUX_FDPIC = 524288,
+ PER_SVR4 = 68157441,
+ PER_SVR3 = 83886082,
+ PER_SCOSVR3 = 117440515,
+ PER_OSR5 = 100663299,
+ PER_WYSEV386 = 83886084,
+ PER_ISCR4 = 67108869,
+ PER_BSD = 6,
+ PER_SUNOS = 67108870,
+ PER_XENIX = 83886087,
+ PER_LINUX32 = 8,
+ PER_LINUX32_3GB = 134217736,
+ PER_IRIX32 = 67108873,
+ PER_IRIXN32 = 67108874,
+ PER_IRIX64 = 67108875,
+ PER_RISCOS = 12,
+ PER_SOLARIS = 67108877,
+ PER_UW7 = 68157454,
+ PER_OSF4 = 15,
+ PER_HPUX = 16,
+ PER_MASK = 255,
+};
+
+struct rusage {
+ struct __kernel_old_timeval ru_utime;
+ struct __kernel_old_timeval ru_stime;
+ __kernel_long_t ru_maxrss;
+ __kernel_long_t ru_ixrss;
+ __kernel_long_t ru_idrss;
+ __kernel_long_t ru_isrss;
+ __kernel_long_t ru_minflt;
+ __kernel_long_t ru_majflt;
+ __kernel_long_t ru_nswap;
+ __kernel_long_t ru_inblock;
+ __kernel_long_t ru_oublock;
+ __kernel_long_t ru_msgsnd;
+ __kernel_long_t ru_msgrcv;
+ __kernel_long_t ru_nsignals;
+ __kernel_long_t ru_nvcsw;
+ __kernel_long_t ru_nivcsw;
+};
+
+struct rlimit64 {
+ __u64 rlim_cur;
+ __u64 rlim_max;
+};
+
+typedef int (*proc_visitor)(struct task_struct *, void *);
+
+struct oldold_utsname {
+ char sysname[9];
+ char nodename[9];
+ char release[9];
+ char version[9];
+ char machine[9];
+};
+
+struct old_utsname {
+ char sysname[65];
+ char nodename[65];
+ char release[65];
+ char version[65];
+ char machine[65];
+};
+
+struct prctl_mm_map {
+ __u64 start_code;
+ __u64 end_code;
+ __u64 start_data;
+ __u64 end_data;
+ __u64 start_brk;
+ __u64 brk;
+ __u64 start_stack;
+ __u64 arg_start;
+ __u64 arg_end;
+ __u64 env_start;
+ __u64 env_end;
+ __u64 *auxv;
+ __u32 auxv_size;
+ __u32 exe_fd;
+};
+
+struct tms {
+ __kernel_clock_t tms_utime;
+ __kernel_clock_t tms_stime;
+ __kernel_clock_t tms_cutime;
+ __kernel_clock_t tms_cstime;
+};
+
+struct getcpu_cache {
+ long unsigned int blob[16];
+};
+
+struct mem_cgroup_reclaim_cookie {
+ pg_data_t *pgdat;
+ unsigned int generation;
+};
+
+enum mem_cgroup_events_target {
+ MEM_CGROUP_TARGET_THRESH = 0,
+ MEM_CGROUP_TARGET_SOFTLIMIT = 1,
+ MEM_CGROUP_NTARGETS = 2,
+};
+
+struct memcg_vmstats {
+ long int state[50];
+ long unsigned int events[15];
+ long int state_pending[50];
+ long unsigned int events_pending[15];
+};
+
+struct memcg_vmstats_percpu {
+ long int state[50];
+ long unsigned int events[15];
+ long int state_prev[50];
+ long unsigned int events_prev[15];
+ long unsigned int nr_page_events;
+ long unsigned int targets[2];
+};
+
+struct mem_cgroup_tree_per_node {
+ struct rb_root rb_root;
+ struct rb_node *rb_rightmost;
+ spinlock_t lock;
+};
+
+struct mem_cgroup_tree {
+ struct mem_cgroup_tree_per_node *rb_tree_per_node[64];
+};
+
+struct mem_cgroup_eventfd_list {
+ struct list_head list;
+ struct eventfd_ctx *eventfd;
+};
+
+struct mem_cgroup_event {
+ struct mem_cgroup *memcg;
+ struct eventfd_ctx *eventfd;
+ struct list_head list;
+ int (*register_event)(struct mem_cgroup *, struct eventfd_ctx *, const char *);
+ void (*unregister_event)(struct mem_cgroup *, struct eventfd_ctx *);
+ poll_table pt;
+ wait_queue_head_t *wqh;
+ wait_queue_entry_t wait;
+ struct work_struct remove;
+};
+
+struct move_charge_struct {
+ spinlock_t lock;
+ struct mm_struct *mm;
+ struct mem_cgroup *from;
+ struct mem_cgroup *to;
+ long unsigned int flags;
+ long unsigned int precharge;
+ long unsigned int moved_charge;
+ long unsigned int moved_swap;
+ struct task_struct *moving_task;
+ wait_queue_head_t waitq;
+};
+
+enum res_type {
+ _MEM = 0,
+ _MEMSWAP = 1,
+ _KMEM = 2,
+ _TCP = 3,
+};
+
+struct memory_stat {
+ const char *name;
+ unsigned int idx;
+};
+
+struct oom_wait_info {
+ struct mem_cgroup *memcg;
+ wait_queue_entry_t wait;
+};
+
+struct memcg_stock_pcp {
+ local_lock_t stock_lock;
+ struct mem_cgroup *cached;
+ unsigned int nr_pages;
+ struct obj_cgroup *cached_objcg;
+ struct pglist_data *cached_pgdat;
+ unsigned int nr_bytes;
+ int nr_slab_reclaimable_b;
+ int nr_slab_unreclaimable_b;
+ struct work_struct work;
+ long unsigned int flags;
+};
+
+enum {
+ RES_USAGE = 0,
+ RES_LIMIT = 1,
+ RES_MAX_USAGE = 2,
+ RES_FAILCNT = 3,
+ RES_SOFT_LIMIT = 4,
+};
+
+union mc_target {
+ struct page *page;
+ swp_entry_t ent;
+};
+
+enum mc_target_type {
+ MC_TARGET_NONE = 0,
+ MC_TARGET_PAGE = 1,
+ MC_TARGET_SWAP = 2,
+ MC_TARGET_DEVICE = 3,
+};
+
+struct uncharge_gather {
+ struct mem_cgroup *memcg;
+ long unsigned int nr_memory;
+ long unsigned int pgpgout;
+ long unsigned int nr_kmem;
+ int nid;
+};
+
+struct numa_stat {
+ const char *name;
+ unsigned int lru_mask;
+};
+
+enum {
+ POWER_SUPPLY_CHARGE_TYPE_UNKNOWN = 0,
+ POWER_SUPPLY_CHARGE_TYPE_NONE = 1,
+ POWER_SUPPLY_CHARGE_TYPE_TRICKLE = 2,
+ POWER_SUPPLY_CHARGE_TYPE_FAST = 3,
+ POWER_SUPPLY_CHARGE_TYPE_STANDARD = 4,
+ POWER_SUPPLY_CHARGE_TYPE_ADAPTIVE = 5,
+ POWER_SUPPLY_CHARGE_TYPE_CUSTOM = 6,
+ POWER_SUPPLY_CHARGE_TYPE_LONGLIFE = 7,
+ POWER_SUPPLY_CHARGE_TYPE_BYPASS = 8,
+};
+
+enum {
+ POWER_SUPPLY_HEALTH_UNKNOWN = 0,
+ POWER_SUPPLY_HEALTH_GOOD = 1,
+ POWER_SUPPLY_HEALTH_OVERHEAT = 2,
+ POWER_SUPPLY_HEALTH_DEAD = 3,
+ POWER_SUPPLY_HEALTH_OVERVOLTAGE = 4,
+ POWER_SUPPLY_HEALTH_UNSPEC_FAILURE = 5,
+ POWER_SUPPLY_HEALTH_COLD = 6,
+ POWER_SUPPLY_HEALTH_WATCHDOG_TIMER_EXPIRE = 7,
+ POWER_SUPPLY_HEALTH_SAFETY_TIMER_EXPIRE = 8,
+ POWER_SUPPLY_HEALTH_OVERCURRENT = 9,
+ POWER_SUPPLY_HEALTH_CALIBRATION_REQUIRED = 10,
+ POWER_SUPPLY_HEALTH_WARM = 11,
+ POWER_SUPPLY_HEALTH_COOL = 12,
+ POWER_SUPPLY_HEALTH_HOT = 13,
+ POWER_SUPPLY_HEALTH_NO_BATTERY = 14,
+};
+
+enum {
+ POWER_SUPPLY_SCOPE_UNKNOWN = 0,
+ POWER_SUPPLY_SCOPE_SYSTEM = 1,
+ POWER_SUPPLY_SCOPE_DEVICE = 2,
+};
+
+enum power_supply_charge_behaviour {
+ POWER_SUPPLY_CHARGE_BEHAVIOUR_AUTO = 0,
+ POWER_SUPPLY_CHARGE_BEHAVIOUR_INHIBIT_CHARGE = 1,
+ POWER_SUPPLY_CHARGE_BEHAVIOUR_FORCE_DISCHARGE = 2,
+};
+
+struct power_supply_attr {
+ const char *prop_name;
+ char attr_name[31];
+ struct device_attribute dev_attr;
+ const char * const *text_values;
+ int text_values_len;
+};
+
+typedef struct {
+ u32 version;
+ u32 num_entries;
+ u32 desc_size;
+ u32 reserved;
+ efi_memory_desc_t entry[0];
+} efi_memory_attributes_table_t;
+
+struct gnet_stats_rate_est64 {
+ __u64 bps;
+ __u64 pps;
+};
+
+struct gnet_estimator {
+ signed char interval;
+ unsigned char ewma_log;
+};
+
+struct net_rate_estimator {
+ struct gnet_stats_basic_sync *bstats;
+ spinlock_t *stats_lock;
+ bool running;
+ struct gnet_stats_basic_sync *cpu_bstats;
+ u8 ewma_log;
+ u8 intvl_log;
+ seqcount_t seq;
+ u64 last_packets;
+ u64 last_bytes;
+ u64 avpps;
+ u64 avbps;
+ long unsigned int next_jiffies;
+ struct timer_list timer;
+ struct callback_head rcu;
+};
+
+struct nfnl_ct_hook {
+ size_t (*build_size)(const struct nf_conn *);
+ int (*build)(struct sk_buff *, struct nf_conn *, enum ip_conntrack_info, u_int16_t, u_int16_t);
+ int (*parse)(const struct nlattr *, struct nf_conn *);
+ int (*attach_expect)(const struct nlattr *, struct nf_conn *, u32, u32);
+ void (*seq_adjust)(struct sk_buff *, struct nf_conn *, enum ip_conntrack_info, s32);
+};
+
+enum l2tp_debug_flags {
+ L2TP_MSG_DEBUG = 1,
+ L2TP_MSG_CONTROL = 2,
+ L2TP_MSG_SEQ = 4,
+ L2TP_MSG_DATA = 8,
+};
+
+struct nfgenmsg {
+ __u8 nfgen_family;
+ __u8 version;
+ __be16 res_id;
+};
+
+struct nfnl_info {
+ struct net *net;
+ struct sock *sk;
+ const struct nlmsghdr *nlh;
+ const struct nfgenmsg *nfmsg;
+ struct netlink_ext_ack *extack;
+};
+
+enum nfnl_callback_type {
+ NFNL_CB_UNSPEC = 0,
+ NFNL_CB_MUTEX = 1,
+ NFNL_CB_RCU = 2,
+ NFNL_CB_BATCH = 3,
+};
+
+struct nfnl_callback {
+ int (*call)(struct sk_buff *, const struct nfnl_info *, const struct nlattr * const *);
+ const struct nla_policy *policy;
+ enum nfnl_callback_type type;
+ __u16 attr_count;
+};
+
+enum nfnl_abort_action {
+ NFNL_ABORT_NONE = 0,
+ NFNL_ABORT_AUTOLOAD = 1,
+ NFNL_ABORT_VALIDATE = 2,
+};
+
+struct nfnetlink_subsystem {
+ const char *name;
+ __u8 subsys_id;
+ __u8 cb_count;
+ const struct nfnl_callback *cb;
+ struct module *owner;
+ int (*commit)(struct net *, struct sk_buff *);
+ int (*abort)(struct net *, struct sk_buff *, enum nfnl_abort_action);
+ void (*cleanup)(struct net *);
+ bool (*valid_genid)(struct net *, u32);
+};
+
+enum nfulnl_msg_types {
+ NFULNL_MSG_PACKET = 0,
+ NFULNL_MSG_CONFIG = 1,
+ NFULNL_MSG_MAX = 2,
+};
+
+struct nfulnl_msg_packet_hdr {
+ __be16 hw_protocol;
+ __u8 hook;
+ __u8 _pad;
+};
+
+struct nfulnl_msg_packet_hw {
+ __be16 hw_addrlen;
+ __u16 _pad;
+ __u8 hw_addr[8];
+};
+
+struct nfulnl_msg_packet_timestamp {
+ __be64 sec;
+ __be64 usec;
+};
+
+enum nfulnl_vlan_attr {
+ NFULA_VLAN_UNSPEC = 0,
+ NFULA_VLAN_PROTO = 1,
+ NFULA_VLAN_TCI = 2,
+ __NFULA_VLAN_MAX = 3,
+};
+
+enum nfulnl_attr_type {
+ NFULA_UNSPEC = 0,
+ NFULA_PACKET_HDR = 1,
+ NFULA_MARK = 2,
+ NFULA_TIMESTAMP = 3,
+ NFULA_IFINDEX_INDEV = 4,
+ NFULA_IFINDEX_OUTDEV = 5,
+ NFULA_IFINDEX_PHYSINDEV = 6,
+ NFULA_IFINDEX_PHYSOUTDEV = 7,
+ NFULA_HWADDR = 8,
+ NFULA_PAYLOAD = 9,
+ NFULA_PREFIX = 10,
+ NFULA_UID = 11,
+ NFULA_SEQ = 12,
+ NFULA_SEQ_GLOBAL = 13,
+ NFULA_GID = 14,
+ NFULA_HWTYPE = 15,
+ NFULA_HWHEADER = 16,
+ NFULA_HWLEN = 17,
+ NFULA_CT = 18,
+ NFULA_CT_INFO = 19,
+ NFULA_VLAN = 20,
+ NFULA_L2HDR = 21,
+ __NFULA_MAX = 22,
+};
+
+enum nfulnl_msg_config_cmds {
+ NFULNL_CFG_CMD_NONE = 0,
+ NFULNL_CFG_CMD_BIND = 1,
+ NFULNL_CFG_CMD_UNBIND = 2,
+ NFULNL_CFG_CMD_PF_BIND = 3,
+ NFULNL_CFG_CMD_PF_UNBIND = 4,
+};
+
+struct nfulnl_msg_config_cmd {
+ __u8 command;
+};
+
+struct nfulnl_msg_config_mode {
+ __be32 copy_range;
+ __u8 copy_mode;
+ __u8 _pad;
+} __attribute__((packed));
+
+enum nfulnl_attr_config {
+ NFULA_CFG_UNSPEC = 0,
+ NFULA_CFG_CMD = 1,
+ NFULA_CFG_MODE = 2,
+ NFULA_CFG_NLBUFSIZ = 3,
+ NFULA_CFG_TIMEOUT = 4,
+ NFULA_CFG_QTHRESH = 5,
+ NFULA_CFG_FLAGS = 6,
+ __NFULA_CFG_MAX = 7,
+};
+
+struct nfulnl_instance {
+ struct hlist_node hlist;
+ spinlock_t lock;
+ refcount_t use;
+ unsigned int qlen;
+ struct sk_buff *skb;
+ struct timer_list timer;
+ struct net *net;
+ netns_tracker ns_tracker;
+ struct user_namespace *peer_user_ns;
+ u32 peer_portid;
+ unsigned int flushtimeout;
+ unsigned int nlbufsiz;
+ unsigned int qthreshold;
+ u_int32_t copy_range;
+ u_int32_t seq;
+ u_int16_t group_num;
+ u_int16_t flags;
+ u_int8_t copy_mode;
+ struct callback_head rcu;
+};
+
+struct nfnl_log_net {
+ spinlock_t instances_lock;
+ struct hlist_head instance_table[16];
+ atomic_t global_seq;
+};
+
+struct iter_state {
+ struct seq_net_private p;
+ unsigned int bucket;
+};
+
+struct nhmsg {
+ unsigned char nh_family;
+ unsigned char nh_scope;
+ unsigned char nh_protocol;
+ unsigned char resvd;
+ unsigned int nh_flags;
+};
+
+struct nexthop_grp {
+ __u32 id;
+ __u8 weight;
+ __u8 resvd1;
+ __u16 resvd2;
+};
+
+enum {
+ NEXTHOP_GRP_TYPE_MPATH = 0,
+ NEXTHOP_GRP_TYPE_RES = 1,
+ __NEXTHOP_GRP_TYPE_MAX = 2,
+};
+
+enum {
+ NHA_UNSPEC = 0,
+ NHA_ID = 1,
+ NHA_GROUP = 2,
+ NHA_GROUP_TYPE = 3,
+ NHA_BLACKHOLE = 4,
+ NHA_OIF = 5,
+ NHA_GATEWAY = 6,
+ NHA_ENCAP_TYPE = 7,
+ NHA_ENCAP = 8,
+ NHA_GROUPS = 9,
+ NHA_MASTER = 10,
+ NHA_FDB = 11,
+ NHA_RES_GROUP = 12,
+ NHA_RES_BUCKET = 13,
+ __NHA_MAX = 14,
+};
+
+enum {
+ NHA_RES_GROUP_UNSPEC = 0,
+ NHA_RES_GROUP_PAD = 0,
+ NHA_RES_GROUP_BUCKETS = 1,
+ NHA_RES_GROUP_IDLE_TIMER = 2,
+ NHA_RES_GROUP_UNBALANCED_TIMER = 3,
+ NHA_RES_GROUP_UNBALANCED_TIME = 4,
+ __NHA_RES_GROUP_MAX = 5,
+};
+
+enum {
+ NHA_RES_BUCKET_UNSPEC = 0,
+ NHA_RES_BUCKET_PAD = 0,
+ NHA_RES_BUCKET_INDEX = 1,
+ NHA_RES_BUCKET_IDLE_TIME = 2,
+ NHA_RES_BUCKET_NH_ID = 3,
+ __NHA_RES_BUCKET_MAX = 4,
+};
+
+struct nh_config {
+ u32 nh_id;
+ u8 nh_family;
+ u8 nh_protocol;
+ u8 nh_blackhole;
+ u8 nh_fdb;
+ u32 nh_flags;
+ int nh_ifindex;
+ struct net_device *dev;
+ union {
+ __be32 ipv4;
+ struct in6_addr ipv6;
+ } gw;
+ struct nlattr *nh_grp;
+ u16 nh_grp_type;
+ u16 nh_grp_res_num_buckets;
+ long unsigned int nh_grp_res_idle_timer;
+ long unsigned int nh_grp_res_unbalanced_timer;
+ bool nh_grp_res_has_num_buckets;
+ bool nh_grp_res_has_idle_timer;
+ bool nh_grp_res_has_unbalanced_timer;
+ struct nlattr *nh_encap;
+ u16 nh_encap_type;
+ u32 nlflags;
+ struct nl_info nlinfo;
+};
+
+enum nexthop_event_type {
+ NEXTHOP_EVENT_DEL = 0,
+ NEXTHOP_EVENT_REPLACE = 1,
+ NEXTHOP_EVENT_RES_TABLE_PRE_REPLACE = 2,
+ NEXTHOP_EVENT_BUCKET_REPLACE = 3,
+};
+
+enum nh_notifier_info_type {
+ NH_NOTIFIER_INFO_TYPE_SINGLE = 0,
+ NH_NOTIFIER_INFO_TYPE_GRP = 1,
+ NH_NOTIFIER_INFO_TYPE_RES_TABLE = 2,
+ NH_NOTIFIER_INFO_TYPE_RES_BUCKET = 3,
+};
+
+struct nh_notifier_single_info {
+ struct net_device *dev;
+ u8 gw_family;
+ union {
+ __be32 ipv4;
+ struct in6_addr ipv6;
+ };
+ u8 is_reject: 1;
+ u8 is_fdb: 1;
+ u8 has_encap: 1;
+};
+
+struct nh_notifier_grp_entry_info {
+ u8 weight;
+ u32 id;
+ struct nh_notifier_single_info nh;
+};
+
+struct nh_notifier_grp_info {
+ u16 num_nh;
+ bool is_fdb;
+ struct nh_notifier_grp_entry_info nh_entries[0];
+};
+
+struct nh_notifier_res_bucket_info {
+ u16 bucket_index;
+ unsigned int idle_timer_ms;
+ bool force;
+ struct nh_notifier_single_info old_nh;
+ struct nh_notifier_single_info new_nh;
+};
+
+struct nh_notifier_res_table_info {
+ u16 num_nh_buckets;
+ struct nh_notifier_single_info nhs[0];
+};
+
+struct nh_notifier_info {
+ struct net *net;
+ struct netlink_ext_ack *extack;
+ u32 id;
+ enum nh_notifier_info_type type;
+ union {
+ struct nh_notifier_single_info *nh;
+ struct nh_notifier_grp_info *nh_grp;
+ struct nh_notifier_res_table_info *nh_res_table;
+ struct nh_notifier_res_bucket_info *nh_res_bucket;
+ };
+};
+
+struct nh_dump_filter {
+ u32 nh_id;
+ int dev_idx;
+ int master_idx;
+ bool group_filter;
+ bool fdb_filter;
+ u32 res_bucket_nh_id;
+};
+
+struct rtm_dump_nh_ctx {
+ u32 idx;
+};
+
+struct rtm_dump_res_bucket_ctx {
+ struct rtm_dump_nh_ctx nh;
+ u16 bucket_index;
+ u32 done_nh_idx;
+};
+
+struct rtm_dump_nexthop_bucket_data {
+ struct rtm_dump_res_bucket_ctx *ctx;
+ struct nh_dump_filter filter;
+};
+
+enum perf_rapl_events {
+ PERF_RAPL_PP0 = 0,
+ PERF_RAPL_PKG = 1,
+ PERF_RAPL_RAM = 2,
+ PERF_RAPL_PP1 = 3,
+ PERF_RAPL_PSYS = 4,
+ PERF_RAPL_MAX = 5,
+ NR_RAPL_DOMAINS = 5,
+};
+
+struct rapl_pmu {
+ raw_spinlock_t lock;
+ int n_active;
+ int cpu;
+ struct list_head active_list;
+ struct pmu *pmu;
+ ktime_t timer_interval;
+ struct hrtimer hrtimer;
+};
+
+struct rapl_pmus {
+ struct pmu pmu;
+ unsigned int maxdie;
+ struct rapl_pmu *pmus[0];
+};
+
+enum rapl_unit_quirk {
+ RAPL_UNIT_QUIRK_NONE = 0,
+ RAPL_UNIT_QUIRK_INTEL_HSW = 1,
+ RAPL_UNIT_QUIRK_INTEL_SPR = 2,
+};
+
+struct rapl_model {
+ struct perf_msr *rapl_msrs;
+ long unsigned int events;
+ unsigned int msr_power_unit;
+ enum rapl_unit_quirk unit_quirk;
+};
+
+struct cstate_entry {
+ struct {
+ unsigned int eax;
+ unsigned int ecx;
+ } states[8];
+};
+
+struct amd_northbridge_info {
+ u16 num;
+ u64 flags;
+ struct amd_northbridge *nb;
+};
+
+struct siginfo {
+ union {
+ struct {
+ int si_signo;
+ int si_errno;
+ int si_code;
+ union __sifields _sifields;
+ };
+ int _si_pad[32];
+ };
+};
+
+typedef struct siginfo siginfo_t;
+
+struct sigqueue {
+ struct list_head list;
+ int flags;
+ kernel_siginfo_t info;
+ struct ucounts *ucounts;
+};
+
+struct ptrace_peeksiginfo_args {
+ __u64 off;
+ __u32 flags;
+ __s32 nr;
+};
+
+struct ptrace_syscall_info {
+ __u8 op;
+ __u8 pad[3];
+ __u32 arch;
+ __u64 instruction_pointer;
+ __u64 stack_pointer;
+ union {
+ struct {
+ __u64 nr;
+ __u64 args[6];
+ } entry;
+ struct {
+ __s64 rval;
+ __u8 is_error;
+ } exit;
+ struct {
+ __u64 nr;
+ __u64 args[6];
+ __u32 ret_data;
+ } seccomp;
+ };
+};
+
+struct ptrace_rseq_configuration {
+ __u64 rseq_abi_pointer;
+ __u32 rseq_abi_size;
+ __u32 signature;
+ __u32 flags;
+ __u32 pad;
+};
+
+enum {
+ Q_REQUEUE_PI_NONE = 0,
+ Q_REQUEUE_PI_IGNORE = 1,
+ Q_REQUEUE_PI_IN_PROGRESS = 2,
+ Q_REQUEUE_PI_WAIT = 3,
+ Q_REQUEUE_PI_DONE = 4,
+ Q_REQUEUE_PI_LOCKED = 5,
+};
+
+enum audit_nlgrps {
+ AUDIT_NLGRP_NONE = 0,
+ AUDIT_NLGRP_READLOG = 1,
+ __AUDIT_NLGRP_MAX = 2,
+};
+
+struct audit_status {
+ __u32 mask;
+ __u32 enabled;
+ __u32 failure;
+ __u32 pid;
+ __u32 rate_limit;
+ __u32 backlog_limit;
+ __u32 lost;
+ __u32 backlog;
+ union {
+ __u32 version;
+ __u32 feature_bitmap;
+ };
+ __u32 backlog_wait_time;
+ __u32 backlog_wait_time_actual;
+};
+
+struct audit_features {
+ __u32 vers;
+ __u32 mask;
+ __u32 features;
+ __u32 lock;
+};
+
+struct audit_tty_status {
+ __u32 enabled;
+ __u32 log_passwd;
+};
+
+struct audit_sig_info {
+ uid_t uid;
+ pid_t pid;
+ char ctx[0];
+};
+
+struct audit_net {
+ struct sock *sk;
+};
+
+struct auditd_connection {
+ struct pid *pid;
+ u32 portid;
+ struct net *net;
+ struct callback_head rcu;
+};
+
+struct audit_ctl_mutex {
+ struct mutex lock;
+ void *owner;
+};
+
+struct audit_buffer {
+ struct sk_buff *skb;
+ struct audit_context *ctx;
+ gfp_t gfp_mask;
+};
+
+struct audit_reply {
+ __u32 portid;
+ struct net *net;
+ struct sk_buff *skb;
+};
+
+struct crypto_report_kpp {
+ char type[64];
+};
+
+struct kpp_request {
+ struct crypto_async_request base;
+ struct scatterlist *src;
+ struct scatterlist *dst;
+ unsigned int src_len;
+ unsigned int dst_len;
+ void *__ctx[0];
+};
+
+struct crypto_kpp {
+ struct crypto_tfm base;
+};
+
+struct kpp_alg {
+ int (*set_secret)(struct crypto_kpp *, const void *, unsigned int);
+ int (*generate_public_key)(struct kpp_request *);
+ int (*compute_shared_secret)(struct kpp_request *);
+ unsigned int (*max_size)(struct crypto_kpp *);
+ int (*init)(struct crypto_kpp *);
+ void (*exit)(struct crypto_kpp *);
+ unsigned int reqsize;
+ struct crypto_alg base;
+};
+
+struct kpp_instance {
+ void (*free)(struct kpp_instance *);
+ union {
+ struct {
+ char head[56];
+ struct crypto_instance base;
+ } s;
+ struct kpp_alg alg;
+ };
+};
+
+struct crypto_kpp_spawn {
+ struct crypto_spawn base;
+};
+
+struct crypto_rng;
+
+struct rng_alg {
+ int (*generate)(struct crypto_rng *, const u8 *, unsigned int, u8 *, unsigned int);
+ int (*seed)(struct crypto_rng *, const u8 *, unsigned int);
+ void (*set_ent)(struct crypto_rng *, const u8 *, unsigned int);
+ unsigned int seedsize;
+ struct crypto_alg base;
+};
+
+struct crypto_rng {
+ struct crypto_tfm base;
+};
+
+struct drbg_string {
+ const unsigned char *buf;
+ size_t len;
+ struct list_head list;
+};
+
+typedef uint32_t drbg_flag_t;
+
+struct drbg_core {
+ drbg_flag_t flags;
+ __u8 statelen;
+ __u8 blocklen_bytes;
+ char cra_name[128];
+ char backend_cra_name[128];
+};
+
+struct drbg_state;
+
+struct drbg_state_ops {
+ int (*update)(struct drbg_state *, struct list_head *, int);
+ int (*generate)(struct drbg_state *, unsigned char *, unsigned int, struct list_head *);
+ int (*crypto_init)(struct drbg_state *);
+ int (*crypto_fini)(struct drbg_state *);
+};
+
+enum drbg_seed_state {
+ DRBG_SEED_STATE_UNSEEDED = 0,
+ DRBG_SEED_STATE_PARTIAL = 1,
+ DRBG_SEED_STATE_FULL = 2,
+};
+
+struct drbg_state {
+ struct mutex drbg_mutex;
+ unsigned char *V;
+ unsigned char *Vbuf;
+ unsigned char *C;
+ unsigned char *Cbuf;
+ size_t reseed_ctr;
+ size_t reseed_threshold;
+ unsigned char *scratchpad;
+ unsigned char *scratchpadbuf;
+ void *priv_data;
+ struct crypto_skcipher *ctr_handle;
+ struct skcipher_request *ctr_req;
+ __u8 *outscratchpadbuf;
+ __u8 *outscratchpad;
+ struct crypto_wait ctr_wait;
+ struct scatterlist sg_in;
+ struct scatterlist sg_out;
+ enum drbg_seed_state seeded;
+ long unsigned int last_seed_time;
+ bool pr;
+ bool fips_primed;
+ unsigned char *prev;
+ struct crypto_rng *jent;
+ const struct drbg_state_ops *d_ops;
+ const struct drbg_core *core;
+ struct drbg_string test_data;
+};
+
+enum drbg_prefixes {
+ DRBG_PREFIX0 = 0,
+ DRBG_PREFIX1 = 1,
+ DRBG_PREFIX2 = 2,
+ DRBG_PREFIX3 = 3,
+};
+
+struct sdesc {
+ struct shash_desc shash;
+ char ctx[0];
+};
+
+struct mq_inflight {
+ struct block_device *part;
+ unsigned int inflight[2];
+};
+
+struct blk_rq_wait {
+ struct completion done;
+ blk_status_t ret;
+};
+
+struct flush_busy_ctx_data {
+ struct blk_mq_hw_ctx *hctx;
+ struct list_head *list;
+};
+
+struct dispatch_rq_data {
+ struct blk_mq_hw_ctx *hctx;
+ struct request *rq;
+};
+
+enum prep_dispatch {
+ PREP_DISPATCH_OK = 0,
+ PREP_DISPATCH_NO_TAG = 1,
+ PREP_DISPATCH_NO_BUDGET = 2,
+};
+
+struct rq_iter_data {
+ struct blk_mq_hw_ctx *hctx;
+ bool has_rq;
+};
+
+struct blk_mq_qe_pair {
+ struct list_head node;
+ struct request_queue *q;
+ struct elevator_type *type;
+};
+
+struct font_data {
+ unsigned int extra[4];
+ const unsigned char data[0];
+};
+
+struct msr {
+ union {
+ struct {
+ u32 l;
+ u32 h;
+ };
+ u64 q;
+ };
+};
+
+struct trace_event_raw_msr_trace_class {
+ struct trace_entry ent;
+ unsigned int msr;
+ u64 val;
+ int failed;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_msr_trace_class {};
+
+typedef void (*btf_trace_read_msr)(void *, unsigned int, u64, int);
+
+typedef void (*btf_trace_write_msr)(void *, unsigned int, u64, int);
+
+typedef void (*btf_trace_rdpmc)(void *, unsigned int, u64, int);
+
+struct unipair {
+ short unsigned int unicode;
+ short unsigned int fontpos;
+};
+
+struct unimapdesc {
+ short unsigned int entry_ct;
+ struct unipair *entries;
+};
+
+struct console_font_op {
+ unsigned int op;
+ unsigned int flags;
+ unsigned int width;
+ unsigned int height;
+ unsigned int charcount;
+ unsigned char *data;
+};
+
+struct vt_stat {
+ short unsigned int v_active;
+ short unsigned int v_signal;
+ short unsigned int v_state;
+};
+
+struct vt_sizes {
+ short unsigned int v_rows;
+ short unsigned int v_cols;
+ short unsigned int v_scrollsize;
+};
+
+struct vt_consize {
+ short unsigned int v_rows;
+ short unsigned int v_cols;
+ short unsigned int v_vlin;
+ short unsigned int v_clin;
+ short unsigned int v_vcol;
+ short unsigned int v_ccol;
+};
+
+struct vt_event {
+ unsigned int event;
+ unsigned int oldev;
+ unsigned int newev;
+ unsigned int pad[4];
+};
+
+struct vt_setactivate {
+ unsigned int console;
+ struct vt_mode mode;
+};
+
+struct vt_event_wait {
+ struct list_head list;
+ struct vt_event event;
+ int done;
+};
+
+struct req {
+ struct req *next;
+ struct completion done;
+ int err;
+ const char *name;
+ umode_t mode;
+ kuid_t uid;
+ kgid_t gid;
+ struct device *dev;
+};
+
+struct cpufreq_policy_data {
+ struct cpufreq_cpuinfo cpuinfo;
+ struct cpufreq_frequency_table *freq_table;
+ unsigned int cpu;
+ unsigned int min;
+ unsigned int max;
+};
+
+struct cpufreq_driver {
+ char name[16];
+ u16 flags;
+ void *driver_data;
+ int (*init)(struct cpufreq_policy *);
+ int (*verify)(struct cpufreq_policy_data *);
+ int (*setpolicy)(struct cpufreq_policy *);
+ int (*target)(struct cpufreq_policy *, unsigned int, unsigned int);
+ int (*target_index)(struct cpufreq_policy *, unsigned int);
+ unsigned int (*fast_switch)(struct cpufreq_policy *, unsigned int);
+ void (*adjust_perf)(unsigned int, long unsigned int, long unsigned int, long unsigned int);
+ unsigned int (*get_intermediate)(struct cpufreq_policy *, unsigned int);
+ int (*target_intermediate)(struct cpufreq_policy *, unsigned int);
+ unsigned int (*get)(unsigned int);
+ void (*update_limits)(unsigned int);
+ int (*bios_limit)(int, unsigned int *);
+ int (*online)(struct cpufreq_policy *);
+ int (*offline)(struct cpufreq_policy *);
+ int (*exit)(struct cpufreq_policy *);
+ int (*suspend)(struct cpufreq_policy *);
+ int (*resume)(struct cpufreq_policy *);
+ void (*ready)(struct cpufreq_policy *);
+ struct freq_attr **attr;
+ bool boost_enabled;
+ int (*set_boost)(struct cpufreq_policy *, int);
+ void (*register_em)(struct cpufreq_policy *);
+};
+
+struct cppc_perf_caps {
+ u32 guaranteed_perf;
+ u32 highest_perf;
+ u32 nominal_perf;
+ u32 lowest_perf;
+ u32 lowest_nonlinear_perf;
+ u32 lowest_freq;
+ u32 nominal_freq;
+};
+
+enum {
+ UNDEFINED_CAPABLE = 0,
+ SYSTEM_INTEL_MSR_CAPABLE = 1,
+ SYSTEM_AMD_MSR_CAPABLE = 2,
+ SYSTEM_IO_CAPABLE = 3,
+};
+
+struct acpi_cpufreq_data {
+ unsigned int resume;
+ unsigned int cpu_feature;
+ unsigned int acpi_perf_cpu;
+ cpumask_var_t freqdomain_cpus;
+ void (*cpu_freq_write)(struct acpi_pct_register *, u32);
+ u32 (*cpu_freq_read)(struct acpi_pct_register *);
+};
+
+struct drv_cmd {
+ struct acpi_pct_register *reg;
+ u32 val;
+ union {
+ void (*write)(struct acpi_pct_register *, u32);
+ u32 (*read)(struct acpi_pct_register *);
+ } func;
+};
+
+enum ip_conntrack_expect_events {
+ IPEXP_NEW = 0,
+ IPEXP_DESTROY = 1,
+};
+
+struct ip_options_data {
+ struct ip_options_rcu opt;
+ char data[40];
+};
+
+struct icmp_filter {
+ __u32 data;
+};
+
+struct raw_iter_state {
+ struct seq_net_private p;
+ int bucket;
+};
+
+struct raw_sock {
+ struct inet_sock inet;
+ struct icmp_filter filter;
+ u32 ipmr_table;
+};
+
+struct raw_frag_vec {
+ struct msghdr *msg;
+ union {
+ struct icmphdr icmph;
+ char c[1];
+ } hdr;
+ int hlen;
+};
+
+enum vlan_ioctl_cmds {
+ ADD_VLAN_CMD = 0,
+ DEL_VLAN_CMD = 1,
+ SET_VLAN_INGRESS_PRIORITY_CMD = 2,
+ SET_VLAN_EGRESS_PRIORITY_CMD = 3,
+ GET_VLAN_INGRESS_PRIORITY_CMD = 4,
+ GET_VLAN_EGRESS_PRIORITY_CMD = 5,
+ SET_VLAN_NAME_TYPE_CMD = 6,
+ SET_VLAN_FLAG_CMD = 7,
+ GET_VLAN_REALDEV_NAME_CMD = 8,
+ GET_VLAN_VID_CMD = 9,
+};
+
+enum vlan_name_types {
+ VLAN_NAME_TYPE_PLUS_VID = 0,
+ VLAN_NAME_TYPE_RAW_PLUS_VID = 1,
+ VLAN_NAME_TYPE_PLUS_VID_NO_PAD = 2,
+ VLAN_NAME_TYPE_RAW_PLUS_VID_NO_PAD = 3,
+ VLAN_NAME_TYPE_HIGHEST = 4,
+};
+
+struct vlan_ioctl_args {
+ int cmd;
+ char device1[24];
+ union {
+ char device2[24];
+ int VID;
+ unsigned int skb_priority;
+ unsigned int name_type;
+ unsigned int bind_type;
+ unsigned int flag;
+ } u;
+ short int vlan_qos;
+};
+
+struct vlan_net {
+ struct proc_dir_entry *proc_vlan_dir;
+ struct proc_dir_entry *proc_vlan_conf;
+ short unsigned int name_type;
+};
+
+union cpuid_0x80000022_ebx {
+ struct {
+ unsigned int num_core_pmc: 4;
+ unsigned int lbr_v2_stack_sz: 6;
+ unsigned int num_df_pmc: 6;
+ } split;
+ unsigned int full;
+};
+
+typedef void amd_pmu_branch_reset_t();
+
+typedef struct irq_desc *vector_irq_t[256];
+
+enum {
+ IRQ_DOMAIN_FLAG_HIERARCHY = 1,
+ IRQ_DOMAIN_NAME_ALLOCATED = 2,
+ IRQ_DOMAIN_FLAG_IPI_PER_CPU = 4,
+ IRQ_DOMAIN_FLAG_IPI_SINGLE = 8,
+ IRQ_DOMAIN_FLAG_MSI = 16,
+ IRQ_DOMAIN_FLAG_MSI_REMAP = 32,
+ IRQ_DOMAIN_MSI_NOMASK_QUIRK = 64,
+ IRQ_DOMAIN_FLAG_NO_MAP = 128,
+ IRQ_DOMAIN_FLAG_NONCORE = 65536,
+};
+
+typedef struct irq_alloc_info msi_alloc_info_t;
+
+struct msi_domain_info;
+
+struct msi_domain_ops {
+ irq_hw_number_t (*get_hwirq)(struct msi_domain_info *, msi_alloc_info_t *);
+ int (*msi_init)(struct irq_domain *, struct msi_domain_info *, unsigned int, irq_hw_number_t, msi_alloc_info_t *);
+ void (*msi_free)(struct irq_domain *, struct msi_domain_info *, unsigned int);
+ int (*msi_check)(struct irq_domain *, struct msi_domain_info *, struct device *);
+ int (*msi_prepare)(struct irq_domain *, struct device *, int, msi_alloc_info_t *);
+ void (*set_desc)(msi_alloc_info_t *, struct msi_desc *);
+ int (*domain_alloc_irqs)(struct irq_domain *, struct device *, int);
+ void (*domain_free_irqs)(struct irq_domain *, struct device *);
+};
+
+struct msi_domain_info {
+ u32 flags;
+ struct msi_domain_ops *ops;
+ struct irq_chip *chip;
+ void *chip_data;
+ irq_flow_handler_t handler;
+ void *handler_data;
+ const char *handler_name;
+ void *data;
+};
+
+enum {
+ MSI_FLAG_USE_DEF_DOM_OPS = 1,
+ MSI_FLAG_USE_DEF_CHIP_OPS = 2,
+ MSI_FLAG_MULTI_PCI_MSI = 4,
+ MSI_FLAG_PCI_MSIX = 8,
+ MSI_FLAG_ACTIVATE_EARLY = 16,
+ MSI_FLAG_MUST_REACTIVATE = 32,
+ MSI_FLAG_LEVEL_CAPABLE = 64,
+ MSI_FLAG_DEV_SYSFS = 128,
+ MSI_FLAG_MSIX_CONTIGUOUS = 256,
+ MSI_FLAG_ALLOC_SIMPLE_MSI_DESCS = 512,
+ MSI_FLAG_FREE_MSI_DESCS = 1024,
+};
+
+typedef long unsigned int old_sigset_t;
+
+struct sigaltstack {
+ void *ss_sp;
+ int ss_flags;
+ __kernel_size_t ss_size;
+};
+
+typedef struct sigaltstack stack_t;
+
+enum siginfo_layout {
+ SIL_KILL = 0,
+ SIL_TIMER = 1,
+ SIL_POLL = 2,
+ SIL_FAULT = 3,
+ SIL_FAULT_TRAPNO = 4,
+ SIL_FAULT_MCEERR = 5,
+ SIL_FAULT_BNDERR = 6,
+ SIL_FAULT_PKUERR = 7,
+ SIL_FAULT_PERF_EVENT = 8,
+ SIL_CHLD = 9,
+ SIL_RT = 10,
+ SIL_SYS = 11,
+};
+
+struct multiprocess_signals {
+ sigset_t signal;
+ struct hlist_node node;
+};
+
+struct core_vma_metadata;
+
+struct coredump_params {
+ const kernel_siginfo_t *siginfo;
+ struct pt_regs *regs;
+ struct file *file;
+ long unsigned int limit;
+ long unsigned int mm_flags;
+ loff_t written;
+ loff_t pos;
+ loff_t to_skip;
+ int vma_count;
+ size_t vma_data_size;
+ struct core_vma_metadata *vma_meta;
+};
+
+struct core_vma_metadata {
+ long unsigned int start;
+ long unsigned int end;
+ long unsigned int flags;
+ long unsigned int dump_size;
+ long unsigned int pgoff;
+ struct file *file;
+};
+
+enum {
+ TRACE_SIGNAL_DELIVERED = 0,
+ TRACE_SIGNAL_IGNORED = 1,
+ TRACE_SIGNAL_ALREADY_PENDING = 2,
+ TRACE_SIGNAL_OVERFLOW_FAIL = 3,
+ TRACE_SIGNAL_LOSE_INFO = 4,
+};
+
+struct trace_event_raw_signal_generate {
+ struct trace_entry ent;
+ int sig;
+ int errno;
+ int code;
+ char comm[16];
+ pid_t pid;
+ int group;
+ int result;
+ char __data[0];
+};
+
+struct trace_event_raw_signal_deliver {
+ struct trace_entry ent;
+ int sig;
+ int errno;
+ int code;
+ long unsigned int sa_handler;
+ long unsigned int sa_flags;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_signal_generate {};
+
+struct trace_event_data_offsets_signal_deliver {};
+
+typedef void (*btf_trace_signal_generate)(void *, int, struct kernel_siginfo *, struct task_struct *, int, int);
+
+typedef void (*btf_trace_signal_deliver)(void *, int, struct kernel_siginfo *, struct k_sigaction *);
+
+enum sig_handler {
+ HANDLER_CURRENT = 0,
+ HANDLER_SIG_DFL = 1,
+ HANDLER_EXIT = 2,
+};
+
+struct mm_slot {
+ struct hlist_node hash;
+ struct list_head mm_node;
+ struct mm_struct *mm;
+};
+
+struct ksm_rmap_item;
+
+struct ksm_mm_slot {
+ struct mm_slot slot;
+ struct ksm_rmap_item *rmap_list;
+};
+
+struct ksm_stable_node;
+
+struct ksm_rmap_item {
+ struct ksm_rmap_item *rmap_list;
+ union {
+ struct anon_vma *anon_vma;
+ int nid;
+ };
+ struct mm_struct *mm;
+ long unsigned int address;
+ unsigned int oldchecksum;
+ union {
+ struct rb_node node;
+ struct {
+ struct ksm_stable_node *head;
+ struct hlist_node hlist;
+ };
+ };
+};
+
+struct ksm_scan {
+ struct ksm_mm_slot *mm_slot;
+ long unsigned int address;
+ struct ksm_rmap_item **rmap_list;
+ long unsigned int seqnr;
+};
+
+struct ksm_stable_node {
+ union {
+ struct rb_node node;
+ struct {
+ struct list_head *head;
+ struct {
+ struct hlist_node hlist_dup;
+ struct list_head list;
+ };
+ };
+ };
+ struct hlist_head hlist;
+ union {
+ long unsigned int kpfn;
+ long unsigned int chain_prune_time;
+ };
+ int rmap_hlist_len;
+ int nid;
+};
+
+enum get_ksm_page_flags {
+ GET_KSM_PAGE_NOLOCK = 0,
+ GET_KSM_PAGE_LOCK = 1,
+ GET_KSM_PAGE_TRYLOCK = 2,
+};
+
+enum {
+ XA_CHECK_SCHED = 4096,
+};
+
+struct iomap_swapfile_info {
+ struct iomap iomap;
+ struct swap_info_struct *sis;
+ uint64_t lowest_ppage;
+ uint64_t highest_ppage;
+ long unsigned int nr_pages;
+ int nr_extents;
+ struct file *file;
+};
+
+struct resource_entry {
+ struct list_head node;
+ struct resource *res;
+ resource_size_t offset;
+ struct resource __res;
+};
+
+struct hotplug_slot_ops;
+
+struct hotplug_slot {
+ const struct hotplug_slot_ops *ops;
+ struct list_head slot_list;
+ struct pci_slot *pci_slot;
+ struct module *owner;
+ const char *mod_name;
+};
+
+enum {
+ pci_channel_io_normal = 1,
+ pci_channel_io_frozen = 2,
+ pci_channel_io_perm_failure = 3,
+};
+
+enum pci_bus_flags {
+ PCI_BUS_FLAGS_NO_MSI = 1,
+ PCI_BUS_FLAGS_NO_MMRBC = 2,
+ PCI_BUS_FLAGS_NO_AERSID = 4,
+ PCI_BUS_FLAGS_NO_EXTCFG = 8,
+};
+
+enum pci_bus_speed {
+ PCI_SPEED_33MHz = 0,
+ PCI_SPEED_66MHz = 1,
+ PCI_SPEED_66MHz_PCIX = 2,
+ PCI_SPEED_100MHz_PCIX = 3,
+ PCI_SPEED_133MHz_PCIX = 4,
+ PCI_SPEED_66MHz_PCIX_ECC = 5,
+ PCI_SPEED_100MHz_PCIX_ECC = 6,
+ PCI_SPEED_133MHz_PCIX_ECC = 7,
+ PCI_SPEED_66MHz_PCIX_266 = 9,
+ PCI_SPEED_100MHz_PCIX_266 = 10,
+ PCI_SPEED_133MHz_PCIX_266 = 11,
+ AGP_UNKNOWN = 12,
+ AGP_1X = 13,
+ AGP_2X = 14,
+ AGP_4X = 15,
+ AGP_8X = 16,
+ PCI_SPEED_66MHz_PCIX_533 = 17,
+ PCI_SPEED_100MHz_PCIX_533 = 18,
+ PCI_SPEED_133MHz_PCIX_533 = 19,
+ PCIE_SPEED_2_5GT = 20,
+ PCIE_SPEED_5_0GT = 21,
+ PCIE_SPEED_8_0GT = 22,
+ PCIE_SPEED_16_0GT = 23,
+ PCIE_SPEED_32_0GT = 24,
+ PCIE_SPEED_64_0GT = 25,
+ PCI_SPEED_UNKNOWN = 255,
+};
+
+enum {
+ PCI_REASSIGN_ALL_RSRC = 1,
+ PCI_REASSIGN_ALL_BUS = 2,
+ PCI_PROBE_ONLY = 4,
+ PCI_CAN_SKIP_ISA_ALIGN = 8,
+ PCI_ENABLE_PROC_DOMAINS = 16,
+ PCI_COMPAT_DOMAIN_0 = 32,
+ PCI_SCAN_ALL_PCIE_DEVS = 64,
+};
+
+enum pcie_bus_config_types {
+ PCIE_BUS_TUNE_OFF = 0,
+ PCIE_BUS_DEFAULT = 1,
+ PCIE_BUS_SAFE = 2,
+ PCIE_BUS_PERFORMANCE = 3,
+ PCIE_BUS_PEER2PEER = 4,
+};
+
+struct hotplug_slot_ops {
+ int (*enable_slot)(struct hotplug_slot *);
+ int (*disable_slot)(struct hotplug_slot *);
+ int (*set_attention_status)(struct hotplug_slot *, u8);
+ int (*hardware_test)(struct hotplug_slot *, u32);
+ int (*get_power_status)(struct hotplug_slot *, u8 *);
+ int (*get_attention_status)(struct hotplug_slot *, u8 *);
+ int (*get_latch_status)(struct hotplug_slot *, u8 *);
+ int (*get_adapter_status)(struct hotplug_slot *, u8 *);
+ int (*reset_slot)(struct hotplug_slot *, bool);
+};
+
+enum pci_bar_type {
+ pci_bar_unknown = 0,
+ pci_bar_io = 1,
+ pci_bar_mem32 = 2,
+ pci_bar_mem64 = 3,
+};
+
+struct pci_domain_busn_res {
+ struct list_head list;
+ struct resource res;
+ int domain_nr;
+};
+
+typedef acpi_status (*acpi_pkg_callback)(u8, union acpi_operand_object *, union acpi_generic_state *, void *);
+
+struct acpi_pkg_info {
+ u8 *free_space;
+ acpi_size length;
+ u32 object_space;
+ u32 num_packages;
+};
+
+struct virtio_pci_legacy_device {
+ struct pci_dev *pci_dev;
+ u8 *isr;
+ void *ioaddr;
+ struct virtio_device_id id;
+};
+
+struct virtio_pci_vq_info {
+ struct virtqueue *vq;
+ struct list_head node;
+ unsigned int msix_vector;
+};
+
+struct virtio_pci_device {
+ struct virtio_device vdev;
+ struct pci_dev *pci_dev;
+ struct virtio_pci_legacy_device ldev;
+ struct virtio_pci_modern_device mdev;
+ bool is_legacy;
+ u8 *isr;
+ spinlock_t lock;
+ struct list_head virtqueues;
+ struct virtio_pci_vq_info **vqs;
+ int msix_enabled;
+ int intx_enabled;
+ cpumask_var_t *msix_affinity_masks;
+ char (*msix_names)[256];
+ unsigned int msix_vectors;
+ unsigned int msix_used_vectors;
+ bool per_vq_vectors;
+ struct virtqueue * (*setup_vq)(struct virtio_pci_device *, struct virtio_pci_vq_info *, unsigned int, void (*)(struct virtqueue *), const char *, bool, u16);
+ void (*del_vq)(struct virtio_pci_vq_info *);
+ u16 (*config_vector)(struct virtio_pci_device *, u16);
+};
+
+enum {
+ VP_MSIX_CONFIG_VECTOR = 0,
+ VP_MSIX_VQ_VECTOR = 1,
+};
+
+struct dma_fence_chain {
+ struct dma_fence base;
+ struct dma_fence *prev;
+ u64 prev_seqno;
+ struct dma_fence *fence;
+ union {
+ struct dma_fence_cb cb;
+ struct irq_work work;
+ };
+ spinlock_t lock;
+};
+
+struct devlink_fmsg;
+
+struct devlink_health_reporter_ops {
+ char *name;
+ int (*recover)(struct devlink_health_reporter *, void *, struct netlink_ext_ack *);
+ int (*dump)(struct devlink_health_reporter *, struct devlink_fmsg *, void *, struct netlink_ext_ack *);
+ int (*diagnose)(struct devlink_health_reporter *, struct devlink_fmsg *, struct netlink_ext_ack *);
+ int (*test)(struct devlink_health_reporter *, struct netlink_ext_ack *);
+};
+
+struct nsim_dev_dummy_reporter_ctx {
+ char *break_msg;
+};
+
+struct flow_dissector_mpls_lse {
+ u32 mpls_ttl: 8;
+ u32 mpls_bos: 1;
+ u32 mpls_tc: 3;
+ u32 mpls_label: 20;
+};
+
+struct flow_dissector_key_mpls {
+ struct flow_dissector_mpls_lse ls[7];
+ u8 used_lses;
+};
+
+struct flow_dissector_key_enc_opts {
+ u8 data[255];
+ u8 len;
+ __be16 dst_opt_type;
+};
+
+struct flow_dissector_key_arp {
+ __u32 sip;
+ __u32 tip;
+ __u8 op;
+ unsigned char sha[6];
+ unsigned char tha[6];
+};
+
+struct flow_dissector_key_ports_range {
+ union {
+ struct flow_dissector_key_ports tp;
+ struct {
+ struct flow_dissector_key_ports tp_min;
+ struct flow_dissector_key_ports tp_max;
+ };
+ };
+};
+
+struct flow_dissector_key_eth_addrs {
+ unsigned char dst[6];
+ unsigned char src[6];
+};
+
+struct flow_dissector_key_tcp {
+ __be16 flags;
+};
+
+struct flow_dissector_key_ip {
+ __u8 tos;
+ __u8 ttl;
+};
+
+struct flow_dissector_key_meta {
+ int ingress_ifindex;
+ u16 ingress_iftype;
+};
+
+struct flow_dissector_key_ct {
+ u16 ct_state;
+ u16 ct_zone;
+ u32 ct_mark;
+ u32 ct_labels[4];
+};
+
+struct flow_dissector_key_pppoe {
+ __be16 session_id;
+ __be16 ppp_proto;
+ __be16 type;
+};
+
+struct flow_dissector_key_l2tpv3 {
+ __be32 session_id;
+};
+
+struct flow_match {
+ struct flow_dissector *dissector;
+ void *mask;
+ void *key;
+};
+
+struct flow_match_meta {
+ struct flow_dissector_key_meta *key;
+ struct flow_dissector_key_meta *mask;
+};
+
+struct flow_match_basic {
+ struct flow_dissector_key_basic *key;
+ struct flow_dissector_key_basic *mask;
+};
+
+struct flow_match_control {
+ struct flow_dissector_key_control *key;
+ struct flow_dissector_key_control *mask;
+};
+
+struct flow_match_eth_addrs {
+ struct flow_dissector_key_eth_addrs *key;
+ struct flow_dissector_key_eth_addrs *mask;
+};
+
+struct flow_match_vlan {
+ struct flow_dissector_key_vlan *key;
+ struct flow_dissector_key_vlan *mask;
+};
+
+struct flow_match_arp {
+ struct flow_dissector_key_arp *key;
+ struct flow_dissector_key_arp *mask;
+};
+
+struct flow_match_ipv4_addrs {
+ struct flow_dissector_key_ipv4_addrs *key;
+ struct flow_dissector_key_ipv4_addrs *mask;
+};
+
+struct flow_match_ipv6_addrs {
+ struct flow_dissector_key_ipv6_addrs *key;
+ struct flow_dissector_key_ipv6_addrs *mask;
+};
+
+struct flow_match_ip {
+ struct flow_dissector_key_ip *key;
+ struct flow_dissector_key_ip *mask;
+};
+
+struct flow_match_ports {
+ struct flow_dissector_key_ports *key;
+ struct flow_dissector_key_ports *mask;
+};
+
+struct flow_match_ports_range {
+ struct flow_dissector_key_ports_range *key;
+ struct flow_dissector_key_ports_range *mask;
+};
+
+struct flow_match_icmp {
+ struct flow_dissector_key_icmp *key;
+ struct flow_dissector_key_icmp *mask;
+};
+
+struct flow_match_tcp {
+ struct flow_dissector_key_tcp *key;
+ struct flow_dissector_key_tcp *mask;
+};
+
+struct flow_match_mpls {
+ struct flow_dissector_key_mpls *key;
+ struct flow_dissector_key_mpls *mask;
+};
+
+struct flow_match_enc_keyid {
+ struct flow_dissector_key_keyid *key;
+ struct flow_dissector_key_keyid *mask;
+};
+
+struct flow_match_enc_opts {
+ struct flow_dissector_key_enc_opts *key;
+ struct flow_dissector_key_enc_opts *mask;
+};
+
+struct flow_match_ct {
+ struct flow_dissector_key_ct *key;
+ struct flow_dissector_key_ct *mask;
+};
+
+struct flow_match_pppoe {
+ struct flow_dissector_key_pppoe *key;
+ struct flow_dissector_key_pppoe *mask;
+};
+
+struct flow_match_l2tpv3 {
+ struct flow_dissector_key_l2tpv3 *key;
+ struct flow_dissector_key_l2tpv3 *mask;
+};
+
+struct flow_rule {
+ struct flow_match match;
+ struct flow_action action;
+};
+
+struct flow_stats {
+ u64 pkts;
+ u64 bytes;
+ u64 drops;
+ u64 lastused;
+ enum flow_action_hw_stats used_hw_stats;
+ bool used_hw_stats_valid;
+};
+
+enum offload_act_command {
+ FLOW_ACT_REPLACE = 0,
+ FLOW_ACT_DESTROY = 1,
+ FLOW_ACT_STATS = 2,
+};
+
+struct flow_offload_action {
+ struct netlink_ext_ack *extack;
+ enum offload_act_command command;
+ enum flow_action_id id;
+ u32 index;
+ struct flow_stats stats;
+ struct flow_action action;
+};
+
+typedef int flow_indr_block_bind_cb_t(struct net_device *, struct Qdisc *, void *, enum tc_setup_type, void *, void *, void (*)(struct flow_block_cb *));
+
+struct flow_indr_dev {
+ struct list_head list;
+ flow_indr_block_bind_cb_t *cb;
+ void *cb_priv;
+ refcount_t refcnt;
+};
+
+struct flow_indir_dev_info {
+ void *data;
+ struct net_device *dev;
+ struct Qdisc *sch;
+ enum tc_setup_type type;
+ void (*cleanup)(struct flow_block_cb *);
+ struct list_head list;
+ enum flow_block_command command;
+ enum flow_block_binder_type binder_type;
+ struct list_head *cb_list;
+};
+
+struct features_reply_data {
+ struct ethnl_reply_data base;
+ u32 hw[2];
+ u32 wanted[2];
+ u32 active[2];
+ u32 nochange[2];
+ u32 all[2];
+};
+
+enum tcp_fastopen_client_fail {
+ TFO_STATUS_UNSPEC = 0,
+ TFO_COOKIE_UNAVAILABLE = 1,
+ TFO_DATA_NOT_ACKED = 2,
+ TFO_SYN_RETRANSMITTED = 3,
+};
+
+struct cpio_data {
+ void *data;
+ size_t size;
+ char name[18];
+};
+
+enum cpio_fields {
+ C_MAGIC = 0,
+ C_INO = 1,
+ C_MODE = 2,
+ C_UID = 3,
+ C_GID = 4,
+ C_NLINK = 5,
+ C_MTIME = 6,
+ C_FILESIZE = 7,
+ C_MAJ = 8,
+ C_MIN = 9,
+ C_RMAJ = 10,
+ C_RMIN = 11,
+ C_NAMESIZE = 12,
+ C_CHKSUM = 13,
+ C_NFIELDS = 14,
+};
+
+struct radix_tree_iter {
+ long unsigned int index;
+ long unsigned int next_index;
+ long unsigned int tags;
+ struct xa_node *node;
+};
+
+enum {
+ RADIX_TREE_ITER_TAG_MASK = 15,
+ RADIX_TREE_ITER_TAGGED = 16,
+ RADIX_TREE_ITER_CONTIG = 32,
+};
+
+struct ida_bitmap {
+ long unsigned int bitmap[16];
+};
+
+enum {
+ PERF_BR_SPEC_NA = 0,
+ PERF_BR_SPEC_WRONG_PATH = 1,
+ PERF_BR_NON_SPEC_CORRECT_PATH = 2,
+ PERF_BR_SPEC_CORRECT_PATH = 3,
+ PERF_BR_SPEC_MAX = 4,
+};
+
+struct branch_entry {
+ union {
+ struct {
+ u64 ip: 58;
+ u64 ip_sign_ext: 5;
+ u64 mispredict: 1;
+ } split;
+ u64 full;
+ } from;
+ union {
+ struct {
+ u64 ip: 58;
+ u64 ip_sign_ext: 3;
+ u64 reserved: 1;
+ u64 spec: 1;
+ u64 valid: 1;
+ } split;
+ u64 full;
+ } to;
+};
+
+enum suspend_stat_step {
+ SUSPEND_FREEZE = 1,
+ SUSPEND_PREPARE = 2,
+ SUSPEND_SUSPEND = 3,
+ SUSPEND_SUSPEND_LATE = 4,
+ SUSPEND_SUSPEND_NOIRQ = 5,
+ SUSPEND_RESUME_NOIRQ = 6,
+ SUSPEND_RESUME_EARLY = 7,
+ SUSPEND_RESUME = 8,
+};
+
+struct suspend_stats {
+ int success;
+ int fail;
+ int failed_freeze;
+ int failed_prepare;
+ int failed_suspend;
+ int failed_suspend_late;
+ int failed_suspend_noirq;
+ int failed_resume;
+ int failed_resume_early;
+ int failed_resume_noirq;
+ int last_failed_dev;
+ char failed_devs[80];
+ int last_failed_errno;
+ int errno[2];
+ int last_failed_step;
+ enum suspend_stat_step failed_steps[2];
+};
+
+struct platform_suspend_ops {
+ int (*valid)(suspend_state_t);
+ int (*begin)(suspend_state_t);
+ int (*prepare)();
+ int (*prepare_late)();
+ int (*enter)(suspend_state_t);
+ void (*wake)();
+ void (*finish)();
+ bool (*suspend_again)();
+ void (*end)();
+ void (*recover)();
+};
+
+enum {
+ TEST_NONE = 0,
+ TEST_CORE = 1,
+ TEST_CPUS = 2,
+ TEST_PLATFORM = 3,
+ TEST_DEVICES = 4,
+ TEST_FREEZER = 5,
+ __TEST_AFTER_LAST = 6,
+};
+
+struct bpf_iter_seq_prog_info {
+ u32 prog_id;
+};
+
+struct bpf_iter__bpf_prog {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct bpf_prog *prog;
+ };
+};
+
+struct file_handle {
+ __u32 handle_bytes;
+ int handle_type;
+ unsigned char f_handle[0];
+};
+
+struct simple_xattr {
+ struct list_head list;
+ char *name;
+ size_t size;
+ char value[0];
+};
+
+struct acpi_pci_root {
+ struct acpi_device *device;
+ struct pci_bus *bus;
+ u16 segment;
+ int bridge_type;
+ struct resource secondary;
+ u32 osc_support_set;
+ u32 osc_control_set;
+ u32 osc_ext_support_set;
+ u32 osc_ext_control_set;
+ phys_addr_t mcfg_addr;
+};
+
+struct hpx_type0 {
+ u32 revision;
+ u8 cache_line_size;
+ u8 latency_timer;
+ u8 enable_serr;
+ u8 enable_perr;
+};
+
+struct hpx_type1 {
+ u32 revision;
+ u8 max_mem_read;
+ u8 avg_max_split;
+ u16 tot_max_split;
+};
+
+struct hpx_type2 {
+ u32 revision;
+ u32 unc_err_mask_and;
+ u32 unc_err_mask_or;
+ u32 unc_err_sever_and;
+ u32 unc_err_sever_or;
+ u32 cor_err_mask_and;
+ u32 cor_err_mask_or;
+ u32 adv_err_cap_and;
+ u32 adv_err_cap_or;
+ u16 pci_exp_devctl_and;
+ u16 pci_exp_devctl_or;
+ u16 pci_exp_lnkctl_and;
+ u16 pci_exp_lnkctl_or;
+ u32 sec_unc_err_sever_and;
+ u32 sec_unc_err_sever_or;
+ u32 sec_unc_err_mask_and;
+ u32 sec_unc_err_mask_or;
+};
+
+struct hpx_type3 {
+ u16 device_type;
+ u16 function_type;
+ u16 config_space_location;
+ u16 pci_exp_cap_id;
+ u16 pci_exp_cap_ver;
+ u16 pci_exp_vendor_id;
+ u16 dvsec_id;
+ u16 dvsec_rev;
+ u16 match_offset;
+ u32 match_mask_and;
+ u32 match_value;
+ u16 reg_offset;
+ u32 reg_mask_and;
+ u32 reg_mask_or;
+};
+
+enum hpx_type3_dev_type {
+ HPX_TYPE_ENDPOINT = 1,
+ HPX_TYPE_LEG_END = 2,
+ HPX_TYPE_RC_END = 4,
+ HPX_TYPE_RC_EC = 8,
+ HPX_TYPE_ROOT_PORT = 16,
+ HPX_TYPE_UPSTREAM = 32,
+ HPX_TYPE_DOWNSTREAM = 64,
+ HPX_TYPE_PCI_BRIDGE = 128,
+ HPX_TYPE_PCIE_BRIDGE = 256,
+};
+
+enum hpx_type3_fn_type {
+ HPX_FN_NORMAL = 1,
+ HPX_FN_SRIOV_PHYS = 2,
+ HPX_FN_SRIOV_VIRT = 4,
+};
+
+enum hpx_type3_cfg_loc {
+ HPX_CFG_PCICFG = 0,
+ HPX_CFG_PCIE_CAP = 1,
+ HPX_CFG_PCIE_CAP_EXT = 2,
+ HPX_CFG_VEND_CAP = 3,
+ HPX_CFG_DVSEC = 4,
+ HPX_CFG_MAX = 5,
+};
+
+struct acpi_init_walk_info {
+ u32 table_index;
+ u32 object_count;
+ u32 method_count;
+ u32 serial_method_count;
+ u32 non_serial_method_count;
+ u32 serialized_method_count;
+ u32 device_count;
+ u32 op_region_count;
+ u32 field_count;
+ u32 buffer_count;
+ u32 package_count;
+ u32 op_region_init;
+ u32 field_init;
+ u32 buffer_init;
+ u32 package_init;
+ acpi_owner_id owner_id;
+};
+
+struct acpi_device_walk_info {
+ struct acpi_table_desc *table_desc;
+ struct acpi_evaluate_info *evaluate_info;
+ u32 device_count;
+ u32 num_STA;
+ u32 num_INI;
+};
+
+enum tpm2_structures {
+ TPM2_ST_NO_SESSIONS = 32769,
+ TPM2_ST_SESSIONS = 32770,
+};
+
+enum tpm2_capabilities {
+ TPM2_CAP_HANDLES = 1,
+ TPM2_CAP_COMMANDS = 2,
+ TPM2_CAP_PCRS = 5,
+ TPM2_CAP_TPM_PROPERTIES = 6,
+};
+
+enum tpm2_cc_attrs {
+ TPM2_CC_ATTR_CHANDLES = 25,
+ TPM2_CC_ATTR_RHANDLE = 28,
+};
+
+enum tpm_buf_flags {
+ TPM_BUF_OVERFLOW = 1,
+};
+
+enum tpm2_handle_types {
+ TPM2_HT_HMAC_SESSION = 33554432,
+ TPM2_HT_POLICY_SESSION = 50331648,
+ TPM2_HT_TRANSIENT = 2147483648,
+};
+
+struct tpm2_context {
+ __be64 sequence;
+ __be32 saved_handle;
+ __be32 hierarchy;
+ __be16 blob_size;
+} __attribute__((packed));
+
+struct tpm2_cap_handles {
+ u8 more_data;
+ __be32 capability;
+ __be32 count;
+ __be32 handles[0];
+} __attribute__((packed));
+
+struct dma_resv_list {
+ struct callback_head rcu;
+ u32 num_fences;
+ u32 max_fences;
+ struct dma_fence *table[0];
+};
+
+struct trace_event_raw_thermal_temperature {
+ struct trace_entry ent;
+ u32 __data_loc_thermal_zone;
+ int id;
+ int temp_prev;
+ int temp;
+ char __data[0];
+};
+
+struct trace_event_raw_cdev_update {
+ struct trace_entry ent;
+ u32 __data_loc_type;
+ long unsigned int target;
+ char __data[0];
+};
+
+struct trace_event_raw_thermal_zone_trip {
+ struct trace_entry ent;
+ u32 __data_loc_thermal_zone;
+ int id;
+ int trip;
+ enum thermal_trip_type trip_type;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_thermal_temperature {
+ u32 thermal_zone;
+};
+
+struct trace_event_data_offsets_cdev_update {
+ u32 type;
+};
+
+struct trace_event_data_offsets_thermal_zone_trip {
+ u32 thermal_zone;
+};
+
+typedef void (*btf_trace_thermal_temperature)(void *, struct thermal_zone_device *);
+
+typedef void (*btf_trace_cdev_update)(void *, struct thermal_cooling_device *, long unsigned int);
+
+typedef void (*btf_trace_thermal_zone_trip)(void *, struct thermal_zone_device *, int, enum thermal_trip_type);
+
+struct skb_checksum_ops {
+ __wsum (*update)(const void *, int, __wsum);
+ __wsum (*combine)(__wsum, __wsum, int, int);
+};
+
+enum nf_dev_hooks {
+ NF_NETDEV_INGRESS = 0,
+ NF_NETDEV_EGRESS = 1,
+ NF_NETDEV_NUMHOOKS = 2,
+};
+
+struct ifbond {
+ __s32 bond_mode;
+ __s32 num_slaves;
+ __s32 miimon;
+};
+
+typedef struct ifbond ifbond;
+
+struct ifslave {
+ __s32 slave_id;
+ char slave_name[16];
+ __s8 link;
+ __s8 state;
+ __u32 link_failure_count;
+};
+
+typedef struct ifslave ifslave;
+
+enum {
+ NAPIF_STATE_SCHED = 1,
+ NAPIF_STATE_MISSED = 2,
+ NAPIF_STATE_DISABLE = 4,
+ NAPIF_STATE_NPSVC = 8,
+ NAPIF_STATE_LISTED = 16,
+ NAPIF_STATE_NO_BUSY_POLL = 32,
+ NAPIF_STATE_IN_BUSY_POLL = 64,
+ NAPIF_STATE_PREFER_BUSY_POLL = 128,
+ NAPIF_STATE_THREADED = 256,
+ NAPIF_STATE_SCHED_THREADED = 512,
+};
+
+struct net_device_path_stack {
+ int num_paths;
+ struct net_device_path path[5];
+};
+
+struct bpf_xdp_link {
+ struct bpf_link link;
+ struct net_device *dev;
+ int flags;
+};
+
+struct netdev_net_notifier {
+ struct list_head list;
+ struct notifier_block *nb;
+};
+
+struct cpu_rmap {
+ struct kref refcount;
+ u16 size;
+ u16 used;
+ void **obj;
+ struct {
+ u16 index;
+ u16 dist;
+ } near[0];
+};
+
+struct netdev_notifier_changelowerstate_info {
+ struct netdev_notifier_info info;
+ void *lower_state_info;
+};
+
+struct netdev_notifier_pre_changeaddr_info {
+ struct netdev_notifier_info info;
+ const unsigned char *dev_addr;
+};
+
+struct netdev_notifier_offload_xstats_rd {
+ struct rtnl_hw_stats64 stats;
+ bool used;
+};
+
+struct netdev_notifier_offload_xstats_ru {
+ bool used;
+};
+
+struct netdev_notifier_offload_xstats_info {
+ struct netdev_notifier_info info;
+ enum netdev_offload_xstats_type type;
+ union {
+ struct netdev_notifier_offload_xstats_rd *report_delta;
+ struct netdev_notifier_offload_xstats_ru *report_used;
+ };
+};
+
+struct sd_flow_limit {
+ u64 count;
+ unsigned int num_buckets;
+ unsigned int history_head;
+ u16 history[128];
+ u8 buckets[0];
+};
+
+enum {
+ NESTED_SYNC_IMM_BIT = 0,
+ NESTED_SYNC_TODO_BIT = 1,
+};
+
+struct netdev_nested_priv {
+ unsigned char flags;
+ void *data;
+};
+
+struct netdev_bonding_info {
+ ifslave slave;
+ ifbond master;
+};
+
+struct netdev_notifier_bonding_info {
+ struct netdev_notifier_info info;
+ struct netdev_bonding_info bonding_info;
+};
+
+enum dma_transaction_type {
+ DMA_MEMCPY = 0,
+ DMA_XOR = 1,
+ DMA_PQ = 2,
+ DMA_XOR_VAL = 3,
+ DMA_PQ_VAL = 4,
+ DMA_MEMSET = 5,
+ DMA_MEMSET_SG = 6,
+ DMA_INTERRUPT = 7,
+ DMA_PRIVATE = 8,
+ DMA_ASYNC_TX = 9,
+ DMA_SLAVE = 10,
+ DMA_CYCLIC = 11,
+ DMA_INTERLEAVE = 12,
+ DMA_COMPLETION_NO_ORDER = 13,
+ DMA_REPEAT = 14,
+ DMA_LOAD_EOT = 15,
+ DMA_TX_TYPE_END = 16,
+};
+
+enum sum_check_bits {
+ SUM_CHECK_P = 0,
+ SUM_CHECK_Q = 1,
+};
+
+enum {
+ SCM_TSTAMP_SND = 0,
+ SCM_TSTAMP_SCHED = 1,
+ SCM_TSTAMP_ACK = 2,
+};
+
+typedef int (*bpf_op_t)(struct net_device *, struct netdev_bpf *);
+
+struct dev_kfree_skb_cb {
+ enum skb_free_reason reason;
+};
+
+struct netdev_adjacent {
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ bool master;
+ bool ignore;
+ u16 ref_nr;
+ void *private;
+ struct list_head list;
+ struct callback_head rcu;
+};
+
+union ibs_fetch_ctl {
+ __u64 val;
+ struct {
+ __u64 fetch_maxcnt: 16;
+ __u64 fetch_cnt: 16;
+ __u64 fetch_lat: 16;
+ __u64 fetch_en: 1;
+ __u64 fetch_val: 1;
+ __u64 fetch_comp: 1;
+ __u64 ic_miss: 1;
+ __u64 phy_addr_valid: 1;
+ __u64 l1tlb_pgsz: 2;
+ __u64 l1tlb_miss: 1;
+ __u64 l2tlb_miss: 1;
+ __u64 rand_en: 1;
+ __u64 fetch_l2_miss: 1;
+ __u64 l3_miss_only: 1;
+ __u64 fetch_oc_miss: 1;
+ __u64 fetch_l3_miss: 1;
+ __u64 reserved: 2;
+ };
+};
+
+union ibs_op_ctl {
+ __u64 val;
+ struct {
+ __u64 opmaxcnt: 16;
+ __u64 l3_miss_only: 1;
+ __u64 op_en: 1;
+ __u64 op_val: 1;
+ __u64 cnt_ctl: 1;
+ __u64 opmaxcnt_ext: 7;
+ __u64 reserved0: 5;
+ __u64 opcurcnt: 27;
+ __u64 reserved1: 5;
+ };
+};
+
+union ibs_op_data {
+ __u64 val;
+ struct {
+ __u64 comp_to_ret_ctr: 16;
+ __u64 tag_to_ret_ctr: 16;
+ __u64 reserved1: 2;
+ __u64 op_return: 1;
+ __u64 op_brn_taken: 1;
+ __u64 op_brn_misp: 1;
+ __u64 op_brn_ret: 1;
+ __u64 op_rip_invalid: 1;
+ __u64 op_brn_fuse: 1;
+ __u64 op_microcode: 1;
+ __u64 reserved2: 23;
+ };
+};
+
+union ibs_op_data2 {
+ __u64 val;
+ struct {
+ __u64 data_src_lo: 3;
+ __u64 reserved0: 1;
+ __u64 rmt_node: 1;
+ __u64 cache_hit_st: 1;
+ __u64 data_src_hi: 2;
+ __u64 reserved1: 56;
+ };
+};
+
+union ibs_op_data3 {
+ __u64 val;
+ struct {
+ __u64 ld_op: 1;
+ __u64 st_op: 1;
+ __u64 dc_l1tlb_miss: 1;
+ __u64 dc_l2tlb_miss: 1;
+ __u64 dc_l1tlb_hit_2m: 1;
+ __u64 dc_l1tlb_hit_1g: 1;
+ __u64 dc_l2tlb_hit_2m: 1;
+ __u64 dc_miss: 1;
+ __u64 dc_mis_acc: 1;
+ __u64 reserved: 4;
+ __u64 dc_wc_mem_acc: 1;
+ __u64 dc_uc_mem_acc: 1;
+ __u64 dc_locked_op: 1;
+ __u64 dc_miss_no_mab_alloc: 1;
+ __u64 dc_lin_addr_valid: 1;
+ __u64 dc_phy_addr_valid: 1;
+ __u64 dc_l2_tlb_hit_1g: 1;
+ __u64 l2_miss: 1;
+ __u64 sw_pf: 1;
+ __u64 op_mem_width: 4;
+ __u64 op_dc_miss_open_mem_reqs: 6;
+ __u64 dc_miss_lat: 16;
+ __u64 tlb_refill_lat: 16;
+ };
+};
+
+struct perf_ibs_data {
+ u32 size;
+ union {
+ u32 data[0];
+ u32 caps;
+ };
+ u64 regs[8];
+};
+
+enum ibs_states {
+ IBS_ENABLED = 0,
+ IBS_STARTED = 1,
+ IBS_STOPPING = 2,
+ IBS_STOPPED = 3,
+ IBS_MAX_STATES = 4,
+};
+
+struct cpu_perf_ibs {
+ struct perf_event *event;
+ long unsigned int state[1];
+};
+
+struct perf_ibs {
+ struct pmu pmu;
+ unsigned int msr;
+ u64 config_mask;
+ u64 cnt_mask;
+ u64 enable_mask;
+ u64 valid_mask;
+ u64 max_period;
+ long unsigned int offset_mask[1];
+ int offset_max;
+ unsigned int fetch_count_reset_broken: 1;
+ unsigned int fetch_ignore_if_zero_rip: 1;
+ struct cpu_perf_ibs *pcpu;
+ u64 (*get_count)(u64);
+};
+
+typedef void crash_vmclear_fn();
+
+typedef void (*nmi_shootdown_cb)(int, struct pt_regs *);
+
+struct bpf_tramp_link;
+
+struct bpf_tramp_links {
+ struct bpf_tramp_link *links[38];
+ int nr_links;
+};
+
+struct bpf_tramp_link {
+ struct bpf_link link;
+ struct hlist_node tramp_hlist;
+ u64 cookie;
+};
+
+struct bpf_tramp_run_ctx;
+
+typedef u64 (*bpf_trampoline_enter_t)(struct bpf_prog *, struct bpf_tramp_run_ctx *);
+
+struct bpf_tramp_run_ctx {
+ struct bpf_run_ctx run_ctx;
+ u64 bpf_cookie;
+ struct bpf_run_ctx *saved_run_ctx;
+};
+
+typedef void (*bpf_trampoline_exit_t)(struct bpf_prog *, u64, struct bpf_tramp_run_ctx *);
+
+enum bpf_jit_poke_reason {
+ BPF_POKE_REASON_TAIL_CALL = 0,
+};
+
+struct bpf_array_aux {
+ struct list_head poke_progs;
+ struct bpf_map *map;
+ struct mutex poke_mutex;
+ struct work_struct work;
+};
+
+struct bpf_array {
+ struct bpf_map map;
+ u32 elem_size;
+ u32 index_mask;
+ struct bpf_array_aux *aux;
+ union {
+ char value[0];
+ void *ptrs[0];
+ void *pptrs[0];
+ };
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+enum bpf_text_poke_type {
+ BPF_MOD_CALL = 0,
+ BPF_MOD_JUMP = 1,
+};
+
+struct bpf_binary_header {
+ u32 size;
+ int: 32;
+ u8 image[0];
+};
+
+typedef void (*bpf_jit_fill_hole_t)(void *, unsigned int);
+
+struct jit_context {
+ int cleanup_addr;
+ int tail_call_direct_label;
+ int tail_call_indirect_label;
+};
+
+struct x64_jit_data {
+ struct bpf_binary_header *rw_header;
+ struct bpf_binary_header *header;
+ int *addrs;
+ u8 *image;
+ int proglen;
+ struct jit_context ctx;
+};
+
+enum {
+ HW_BREAKPOINT_EMPTY = 0,
+ HW_BREAKPOINT_R = 1,
+ HW_BREAKPOINT_W = 2,
+ HW_BREAKPOINT_RW = 3,
+ HW_BREAKPOINT_X = 4,
+ HW_BREAKPOINT_INVALID = 7,
+};
+
+enum bp_type_idx {
+ TYPE_INST = 0,
+ TYPE_DATA = 0,
+ TYPE_MAX = 1,
+};
+
+struct bp_slots_histogram {
+ atomic_t count[4];
+};
+
+struct bp_cpuinfo {
+ unsigned int cpu_pinned;
+ struct bp_slots_histogram tsk_pinned;
+};
+
+struct trace_event_raw_mm_lru_insertion {
+ struct trace_entry ent;
+ struct folio *folio;
+ long unsigned int pfn;
+ enum lru_list lru;
+ long unsigned int flags;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_lru_activate {
+ struct trace_entry ent;
+ struct folio *folio;
+ long unsigned int pfn;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_mm_lru_insertion {};
+
+struct trace_event_data_offsets_mm_lru_activate {};
+
+typedef void (*btf_trace_mm_lru_insertion)(void *, struct folio *);
+
+typedef void (*btf_trace_mm_lru_activate)(void *, struct folio *);
+
+struct lru_rotate {
+ local_lock_t lock;
+ struct folio_batch fbatch;
+};
+
+struct cpu_fbatches {
+ local_lock_t lock;
+ struct folio_batch lru_add;
+ struct folio_batch lru_deactivate_file;
+ struct folio_batch lru_deactivate;
+ struct folio_batch lru_lazyfree;
+ struct folio_batch activate;
+};
+
+typedef void (*move_fn_t)(struct lruvec *, struct folio *);
+
+struct dentry_stat_t {
+ long int nr_dentry;
+ long int nr_unused;
+ long int age_limit;
+ long int want_pages;
+ long int nr_negative;
+ long int dummy;
+};
+
+struct external_name {
+ union {
+ atomic_t count;
+ struct callback_head head;
+ } u;
+ unsigned char name[0];
+};
+
+enum d_walk_ret {
+ D_WALK_CONTINUE = 0,
+ D_WALK_QUIT = 1,
+ D_WALK_NORETRY = 2,
+ D_WALK_SKIP = 3,
+};
+
+struct check_mount {
+ struct vfsmount *mnt;
+ unsigned int mounted;
+};
+
+struct select_data {
+ struct dentry *start;
+ union {
+ long int found;
+ struct dentry *victim;
+ };
+ struct list_head dispose;
+};
+
+enum fsconfig_command {
+ FSCONFIG_SET_FLAG = 0,
+ FSCONFIG_SET_STRING = 1,
+ FSCONFIG_SET_BINARY = 2,
+ FSCONFIG_SET_PATH = 3,
+ FSCONFIG_SET_PATH_EMPTY = 4,
+ FSCONFIG_SET_FD = 5,
+ FSCONFIG_CMD_CREATE = 6,
+ FSCONFIG_CMD_RECONFIGURE = 7,
+};
+
+struct fstrim_range {
+ __u64 start;
+ __u64 len;
+ __u64 minlen;
+};
+
+struct fileattr {
+ u32 flags;
+ u32 fsx_xflags;
+ u32 fsx_extsize;
+ u32 fsx_nextents;
+ u32 fsx_projid;
+ u32 fsx_cowextsize;
+ bool flags_valid: 1;
+ bool fsx_valid: 1;
+};
+
+struct fiemap {
+ __u64 fm_start;
+ __u64 fm_length;
+ __u32 fm_flags;
+ __u32 fm_mapped_extents;
+ __u32 fm_extent_count;
+ __u32 fm_reserved;
+ struct fiemap_extent fm_extents[0];
+};
+
+struct ext4_new_group_input {
+ __u32 group;
+ __u64 block_bitmap;
+ __u64 inode_bitmap;
+ __u64 inode_table;
+ __u32 blocks_count;
+ __u16 reserved_blocks;
+ __u16 unused;
+};
+
+struct ext4_new_group_data {
+ __u32 group;
+ __u64 block_bitmap;
+ __u64 inode_bitmap;
+ __u64 inode_table;
+ __u32 blocks_count;
+ __u16 reserved_blocks;
+ __u16 mdata_blocks;
+ __u32 free_clusters_count;
+};
+
+struct fsuuid {
+ __u32 fsu_len;
+ __u32 fsu_flags;
+ __u8 fsu_uuid[0];
+};
+
+struct move_extent {
+ __u32 reserved;
+ __u32 donor_fd;
+ __u64 orig_start;
+ __u64 donor_start;
+ __u64 len;
+ __u64 moved_len;
+};
+
+struct fsmap {
+ __u32 fmr_device;
+ __u32 fmr_flags;
+ __u64 fmr_physical;
+ __u64 fmr_owner;
+ __u64 fmr_offset;
+ __u64 fmr_length;
+ __u64 fmr_reserved[3];
+};
+
+struct fsmap_head {
+ __u32 fmh_iflags;
+ __u32 fmh_oflags;
+ __u32 fmh_count;
+ __u32 fmh_entries;
+ __u64 fmh_reserved[6];
+ struct fsmap fmh_keys[2];
+ struct fsmap fmh_recs[0];
+};
+
+struct ext4_fsmap_head {
+ uint32_t fmh_iflags;
+ uint32_t fmh_oflags;
+ unsigned int fmh_count;
+ unsigned int fmh_entries;
+ struct ext4_fsmap fmh_keys[2];
+};
+
+typedef int (*ext4_fsmap_format_t)(struct ext4_fsmap *, void *);
+
+typedef void ext4_update_sb_callback(struct ext4_super_block *, const void *);
+
+struct getfsmap_info {
+ struct super_block *gi_sb;
+ struct fsmap_head *gi_data;
+ unsigned int gi_idx;
+ __u32 gi_last_flags;
+};
+
+enum {
+ INET_DIAG_REQ_NONE = 0,
+ INET_DIAG_REQ_BYTECODE = 1,
+ INET_DIAG_REQ_SK_BPF_STORAGES = 2,
+ INET_DIAG_REQ_PROTOCOL = 3,
+ __INET_DIAG_REQ_MAX = 4,
+};
+
+struct nlmsg_perm {
+ u16 nlmsg_type;
+ u32 perm;
+};
+
+struct netport_security_struct {
+ u32 sid;
+ u16 port;
+ u8 protocol;
+};
+
+struct sel_netport_bkt {
+ int size;
+ struct list_head list;
+};
+
+struct sel_netport {
+ struct netport_security_struct psec;
+ struct list_head list;
+ struct callback_head rcu;
+};
+
+enum {
+ AML_FIELD_ACCESS_ANY = 0,
+ AML_FIELD_ACCESS_BYTE = 1,
+ AML_FIELD_ACCESS_WORD = 2,
+ AML_FIELD_ACCESS_DWORD = 3,
+ AML_FIELD_ACCESS_QWORD = 4,
+ AML_FIELD_ACCESS_BUFFER = 5,
+};
+
+struct tiocl_selection {
+ short unsigned int xs;
+ short unsigned int ys;
+ short unsigned int xe;
+ short unsigned int ye;
+ short unsigned int sel_mode;
+};
+
+struct vc_selection {
+ struct mutex lock;
+ struct vc_data *cons;
+ char *buffer;
+ unsigned int buf_len;
+ volatile int start;
+ int end;
+};
+
+enum {
+ KERNEL_PARAM_OPS_FL_NOARG = 1,
+};
+
+enum i8042_controller_reset_mode {
+ I8042_RESET_NEVER = 0,
+ I8042_RESET_ALWAYS = 1,
+ I8042_RESET_ON_S2RAM = 2,
+};
+
+struct i8042_port {
+ struct serio *serio;
+ int irq;
+ bool exists;
+ bool driver_bound;
+ signed char mux;
+};
+
+struct net_device_devres {
+ struct net_device *ndev;
+};
+
+struct bpf_sk_lookup {
+ union {
+ union {
+ struct bpf_sock *sk;
+ };
+ __u64 cookie;
+ };
+ __u32 family;
+ __u32 protocol;
+ __u32 remote_ip4;
+ __u32 remote_ip6[4];
+ __be16 remote_port;
+ __u32 local_ip4;
+ __u32 local_ip6[4];
+ __u32 local_port;
+ __u32 ingress_ifindex;
+};
+
+struct btf_id_dtor_kfunc {
+ u32 btf_id;
+ u32 kfunc_btf_id;
+};
+
+struct bpf_cg_run_ctx {
+ struct bpf_run_ctx run_ctx;
+ const struct bpf_prog_array_item *prog_item;
+ int retval;
+};
+
+struct bpf_flow_dissector {
+ struct bpf_flow_keys *flow_keys;
+ const struct sk_buff *skb;
+ const void *data;
+ const void *data_end;
+};
+
+struct bpf_sk_lookup_kern {
+ u16 family;
+ u16 protocol;
+ __be16 sport;
+ u16 dport;
+ struct {
+ __be32 saddr;
+ __be32 daddr;
+ } v4;
+ struct {
+ const struct in6_addr *saddr;
+ const struct in6_addr *daddr;
+ } v6;
+ struct sock *selected_sk;
+ u32 ingress_ifindex;
+ bool no_reuseport;
+};
+
+struct trace_event_raw_bpf_test_finish {
+ struct trace_entry ent;
+ int err;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_bpf_test_finish {};
+
+typedef void (*btf_trace_bpf_test_finish)(void *, int *);
+
+struct bpf_test_timer {
+ enum {
+ NO_PREEMPT = 0,
+ NO_MIGRATE = 1,
+ } mode;
+ u32 i;
+ u64 time_start;
+ u64 time_spent;
+};
+
+struct xdp_page_head {
+ struct xdp_buff orig_ctx;
+ struct xdp_buff ctx;
+ struct xdp_frame frm;
+ u8 data[0];
+};
+
+struct xdp_test_data {
+ struct xdp_buff *orig_ctx;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct xdp_rxq_info rxq;
+ struct net_device *dev;
+ struct page_pool *pp;
+ struct xdp_frame **frames;
+ struct sk_buff **skbs;
+ struct xdp_mem_info mem;
+ u32 batch_size;
+ u32 frame_cnt;
+ long: 64;
+ long: 64;
+};
+
+struct bpf_fentry_test_t {
+ struct bpf_fentry_test_t *a;
+};
+
+struct prog_test_member1 {
+ int a;
+};
+
+struct prog_test_member {
+ struct prog_test_member1 m;
+ int c;
+};
+
+struct prog_test_ref_kfunc {
+ int a;
+ int b;
+ struct prog_test_member memb;
+ struct prog_test_ref_kfunc *next;
+ refcount_t cnt;
+};
+
+struct prog_test_pass1 {
+ int x0;
+ struct {
+ int x1;
+ struct {
+ int x2;
+ struct {
+ int x3;
+ };
+ };
+ };
+};
+
+struct prog_test_pass2 {
+ int len;
+ short int arr1[4];
+ struct {
+ char arr2[4];
+ long unsigned int arr3[8];
+ } x;
+};
+
+struct prog_test_fail1 {
+ void *p;
+ int x;
+};
+
+struct prog_test_fail2 {
+ int x8;
+ struct prog_test_pass1 x;
+};
+
+struct prog_test_fail3 {
+ int len;
+ char arr1[2];
+ char arr2[0];
+};
+
+struct bpf_raw_tp_test_run_info {
+ struct bpf_prog *prog;
+ void *ctx;
+ u32 retval;
+};
+
+struct xfrm_if_decode_session_result {
+ struct net *net;
+ u32 if_id;
+};
+
+struct xfrm_if_cb {
+ bool (*decode_session)(struct sk_buff *, short unsigned int, struct xfrm_if_decode_session_result *);
+};
+
+struct xfrm_policy_walk {
+ struct xfrm_policy_walk_entry walk;
+ u8 type;
+ u32 seq;
+};
+
+struct xfrmk_spdinfo {
+ u32 incnt;
+ u32 outcnt;
+ u32 fwdcnt;
+ u32 inscnt;
+ u32 outscnt;
+ u32 fwdscnt;
+ u32 spdhcnt;
+ u32 spdhmcnt;
+};
+
+struct xfrm_flo {
+ struct dst_entry *dst_orig;
+ u8 flags;
+};
+
+struct xfrm_pol_inexact_node {
+ struct rb_node node;
+ union {
+ xfrm_address_t addr;
+ struct callback_head rcu;
+ };
+ u8 prefixlen;
+ struct rb_root root;
+ struct hlist_head hhead;
+};
+
+struct xfrm_pol_inexact_key {
+ possible_net_t net;
+ u32 if_id;
+ u16 family;
+ u8 dir;
+ u8 type;
+};
+
+struct xfrm_pol_inexact_bin {
+ struct xfrm_pol_inexact_key k;
+ struct rhash_head head;
+ struct hlist_head hhead;
+ seqcount_spinlock_t count;
+ struct rb_root root_d;
+ struct rb_root root_s;
+ struct list_head inexact_bins;
+ struct callback_head rcu;
+};
+
+enum xfrm_pol_inexact_candidate_type {
+ XFRM_POL_CAND_BOTH = 0,
+ XFRM_POL_CAND_SADDR = 1,
+ XFRM_POL_CAND_DADDR = 2,
+ XFRM_POL_CAND_ANY = 3,
+ XFRM_POL_CAND_MAX = 4,
+};
+
+struct xfrm_pol_inexact_candidates {
+ struct hlist_head *res[4];
+};
+
+struct amd_uncore {
+ int id;
+ int refcnt;
+ int cpu;
+ int num_counters;
+ int rdpmc_base;
+ u32 msr_base;
+ cpumask_t *active_mask;
+ struct pmu *pmu;
+ struct perf_event **events;
+ struct hlist_node node;
+};
+
+struct set_mtrr_data {
+ long unsigned int smp_base;
+ long unsigned int smp_size;
+ unsigned int smp_reg;
+ mtrr_type smp_type;
+};
+
+struct mtrr_value {
+ mtrr_type ltype;
+ long unsigned int lbase;
+ long unsigned int lsize;
+};
+
+struct entry_stack {
+ char stack[4096];
+};
+
+struct entry_stack_page {
+ struct entry_stack stack;
+};
+
+struct debug_store_buffers {
+ char bts_buffer[65536];
+ char pebs_buffer[65536];
+};
+
+struct exception_stacks {
+ char DF_stack_guard[0];
+ char DF_stack[8192];
+ char NMI_stack_guard[0];
+ char NMI_stack[8192];
+ char DB_stack_guard[0];
+ char DB_stack[8192];
+ char MCE_stack_guard[0];
+ char MCE_stack[8192];
+ char VC_stack_guard[0];
+ char VC_stack[0];
+ char VC2_stack_guard[0];
+ char VC2_stack[0];
+ char IST_top_guard[0];
+};
+
+struct cea_exception_stacks {
+ char DF_stack_guard[4096];
+ char DF_stack[8192];
+ char NMI_stack_guard[4096];
+ char NMI_stack[8192];
+ char DB_stack_guard[4096];
+ char DB_stack[8192];
+ char MCE_stack_guard[4096];
+ char MCE_stack[8192];
+ char VC_stack_guard[4096];
+ char VC_stack[8192];
+ char VC2_stack_guard[4096];
+ char VC2_stack[8192];
+ char IST_top_guard[4096];
+};
+
+struct cpu_entry_area {
+ char gdt[4096];
+ struct entry_stack_page entry_stack_page;
+ struct tss_struct tss;
+ struct cea_exception_stacks estacks;
+ struct debug_store cpu_debug_store;
+ struct debug_store_buffers cpu_debug_buffers;
+};
+
+enum x86_hypervisor_type {
+ X86_HYPER_NATIVE = 0,
+ X86_HYPER_VMWARE = 1,
+ X86_HYPER_MS_HYPERV = 2,
+ X86_HYPER_XEN_PV = 3,
+ X86_HYPER_XEN_HVM = 4,
+ X86_HYPER_KVM = 5,
+ X86_HYPER_JAILHOUSE = 6,
+ X86_HYPER_ACRN = 7,
+};
+
+enum pti_mode {
+ PTI_AUTO = 0,
+ PTI_FORCE_OFF = 1,
+ PTI_FORCE_ON = 2,
+};
+
+enum pti_clone_level {
+ PTI_CLONE_PMD = 0,
+ PTI_CLONE_PTE = 1,
+};
+
+struct mutex_waiter {
+ struct list_head list;
+ struct task_struct *task;
+ struct ww_acquire_ctx *ww_ctx;
+ void *magic;
+};
+
+struct trace_event_raw_lock_acquire {
+ struct trace_entry ent;
+ unsigned int flags;
+ u32 __data_loc_name;
+ void *lockdep_addr;
+ char __data[0];
+};
+
+struct trace_event_raw_lock {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ void *lockdep_addr;
+ char __data[0];
+};
+
+struct trace_event_raw_contention_begin {
+ struct trace_entry ent;
+ void *lock_addr;
+ unsigned int flags;
+ char __data[0];
+};
+
+struct trace_event_raw_contention_end {
+ struct trace_entry ent;
+ void *lock_addr;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_lock_acquire {
+ u32 name;
+};
+
+struct trace_event_data_offsets_lock {
+ u32 name;
+};
+
+struct trace_event_data_offsets_contention_begin {};
+
+struct trace_event_data_offsets_contention_end {};
+
+typedef void (*btf_trace_lock_acquire)(void *, struct lockdep_map *, unsigned int, int, int, int, struct lockdep_map *, long unsigned int);
+
+typedef void (*btf_trace_lock_release)(void *, struct lockdep_map *, long unsigned int);
+
+typedef void (*btf_trace_contention_begin)(void *, void *, unsigned int);
+
+typedef void (*btf_trace_contention_end)(void *, void *, int);
+
+typedef u64 (*btf_bpf_cgrp_storage_get)(struct bpf_map *, struct cgroup *, void *, u64, gfp_t);
+
+typedef u64 (*btf_bpf_cgrp_storage_delete)(struct bpf_map *, struct cgroup *);
+
+typedef struct ns_common *ns_get_path_helper_t(void *);
+
+struct ns_get_path_task_args {
+ const struct proc_ns_operations *ns_ops;
+ struct task_struct *task;
+};
+
+struct proc_fs_context {
+ struct pid_namespace *pid_ns;
+ unsigned int mask;
+ enum proc_hidepid hidepid;
+ int gid;
+ enum proc_pidonly pidonly;
+};
+
+enum proc_param {
+ Opt_gid___2 = 0,
+ Opt_hidepid = 1,
+ Opt_subset = 2,
+};
+
+struct p9_stat_dotl {
+ u64 st_result_mask;
+ struct p9_qid qid;
+ u32 st_mode;
+ kuid_t st_uid;
+ kgid_t st_gid;
+ u64 st_nlink;
+ u64 st_rdev;
+ u64 st_size;
+ u64 st_blksize;
+ u64 st_blocks;
+ u64 st_atime_sec;
+ u64 st_atime_nsec;
+ u64 st_mtime_sec;
+ u64 st_mtime_nsec;
+ u64 st_ctime_sec;
+ u64 st_ctime_nsec;
+ u64 st_btime_sec;
+ u64 st_btime_nsec;
+ u64 st_gen;
+ u64 st_data_version;
+};
+
+struct p9_rstatfs {
+ u32 type;
+ u32 bsize;
+ u64 blocks;
+ u64 bfree;
+ u64 bavail;
+ u64 files;
+ u64 ffree;
+ u64 fsid;
+ u32 namelen;
+};
+
+enum evm_ima_xattr_type {
+ IMA_XATTR_DIGEST = 1,
+ EVM_XATTR_HMAC = 2,
+ EVM_IMA_XATTR_DIGSIG = 3,
+ IMA_XATTR_DIGEST_NG = 4,
+ EVM_XATTR_PORTABLE_DIGSIG = 5,
+ IMA_VERITY_DIGSIG = 6,
+ IMA_XATTR_LAST = 7,
+};
+
+struct ima_max_digest_data {
+ struct ima_digest_data hdr;
+ u8 digest[64];
+};
+
+enum data_formats {
+ DATA_FMT_DIGEST = 0,
+ DATA_FMT_DIGEST_WITH_ALGO = 1,
+ DATA_FMT_DIGEST_WITH_TYPE_AND_ALGO = 2,
+ DATA_FMT_STRING = 3,
+ DATA_FMT_HEX = 4,
+ DATA_FMT_UINT = 5,
+};
+
+enum digest_type {
+ DIGEST_TYPE_IMA = 0,
+ DIGEST_TYPE_VERITY = 1,
+ DIGEST_TYPE__LAST = 2,
+};
+
+enum {
+ DISK_EVENT_MEDIA_CHANGE = 1,
+ DISK_EVENT_EJECT_REQUEST = 2,
+};
+
+enum {
+ DISK_EVENT_FLAG_POLL = 1,
+ DISK_EVENT_FLAG_UEVENT = 2,
+ DISK_EVENT_FLAG_BLOCK_ON_EXCL_WRITE = 4,
+};
+
+struct disk_events {
+ struct list_head node;
+ struct gendisk *disk;
+ spinlock_t lock;
+ struct mutex block_mutex;
+ int block;
+ unsigned int pending;
+ unsigned int clearing;
+ long int poll_msecs;
+ struct delayed_work dwork;
+};
+
+struct io_sqring_offsets {
+ __u32 head;
+ __u32 tail;
+ __u32 ring_mask;
+ __u32 ring_entries;
+ __u32 flags;
+ __u32 dropped;
+ __u32 array;
+ __u32 resv1;
+ __u64 resv2;
+};
+
+struct io_cqring_offsets {
+ __u32 head;
+ __u32 tail;
+ __u32 ring_mask;
+ __u32 ring_entries;
+ __u32 overflow;
+ __u32 cqes;
+ __u32 flags;
+ __u32 resv1;
+ __u64 resv2;
+};
+
+struct io_uring_params {
+ __u32 sq_entries;
+ __u32 cq_entries;
+ __u32 flags;
+ __u32 sq_thread_cpu;
+ __u32 sq_thread_idle;
+ __u32 features;
+ __u32 wq_fd;
+ __u32 resv[3];
+ struct io_sqring_offsets sq_off;
+ struct io_cqring_offsets cq_off;
+};
+
+struct io_sq_data {
+ refcount_t refs;
+ atomic_t park_pending;
+ struct mutex lock;
+ struct list_head ctx_list;
+ struct task_struct *thread;
+ struct wait_queue_head wait;
+ unsigned int sq_thread_idle;
+ int sq_cpu;
+ pid_t task_pid;
+ pid_t task_tgid;
+ long unsigned int state;
+ struct completion exited;
+};
+
+enum {
+ IO_SQ_THREAD_SHOULD_STOP = 0,
+ IO_SQ_THREAD_SHOULD_PARK = 1,
+};
+
+enum {
+ IFLA_GENEVE_UNSPEC = 0,
+ IFLA_GENEVE_ID = 1,
+ IFLA_GENEVE_REMOTE = 2,
+ IFLA_GENEVE_TTL = 3,
+ IFLA_GENEVE_TOS = 4,
+ IFLA_GENEVE_PORT = 5,
+ IFLA_GENEVE_COLLECT_METADATA = 6,
+ IFLA_GENEVE_REMOTE6 = 7,
+ IFLA_GENEVE_UDP_CSUM = 8,
+ IFLA_GENEVE_UDP_ZERO_CSUM6_TX = 9,
+ IFLA_GENEVE_UDP_ZERO_CSUM6_RX = 10,
+ IFLA_GENEVE_LABEL = 11,
+ IFLA_GENEVE_TTL_INHERIT = 12,
+ IFLA_GENEVE_DF = 13,
+ IFLA_GENEVE_INNER_PROTO_INHERIT = 14,
+ __IFLA_GENEVE_MAX = 15,
+};
+
+enum ifla_geneve_df {
+ GENEVE_DF_UNSET = 0,
+ GENEVE_DF_SET = 1,
+ GENEVE_DF_INHERIT = 2,
+ __GENEVE_DF_END = 3,
+ GENEVE_DF_MAX = 2,
+};
+
+struct genevehdr {
+ u8 opt_len: 6;
+ u8 ver: 2;
+ u8 rsvd1: 6;
+ u8 critical: 1;
+ u8 oam: 1;
+ __be16 proto_type;
+ u8 vni[3];
+ u8 rsvd2;
+ u8 options[0];
+};
+
+typedef struct sk_buff * (*gro_receive_t)(struct list_head *, struct sk_buff *);
+
+struct geneve_net {
+ struct list_head geneve_list;
+ struct list_head sock_list;
+};
+
+struct geneve_dev;
+
+struct geneve_dev_node {
+ struct hlist_node hlist;
+ struct geneve_dev *geneve;
+};
+
+struct geneve_config {
+ struct ip_tunnel_info info;
+ bool collect_md;
+ bool use_udp6_rx_checksums;
+ bool ttl_inherit;
+ enum ifla_geneve_df df;
+ bool inner_proto_inherit;
+};
+
+struct geneve_sock;
+
+struct geneve_dev {
+ struct geneve_dev_node hlist4;
+ struct geneve_dev_node hlist6;
+ struct net *net;
+ struct net_device *dev;
+ struct geneve_sock *sock4;
+ struct geneve_sock *sock6;
+ struct list_head next;
+ struct gro_cells gro_cells;
+ struct geneve_config cfg;
+};
+
+struct geneve_sock {
+ bool collect_md;
+ struct list_head list;
+ struct socket *sock;
+ struct callback_head rcu;
+ int refcnt;
+ struct hlist_head vni_list[1024];
+};
+
+struct eee_reply_data {
+ struct ethnl_reply_data base;
+ struct ethtool_eee eee;
+};
+
+enum ip_defrag_users {
+ IP_DEFRAG_LOCAL_DELIVER = 0,
+ IP_DEFRAG_CALL_RA_CHAIN = 1,
+ IP_DEFRAG_CONNTRACK_IN = 2,
+ __IP_DEFRAG_CONNTRACK_IN_END = 65537,
+ IP_DEFRAG_CONNTRACK_OUT = 65538,
+ __IP_DEFRAG_CONNTRACK_OUT_END = 131073,
+ IP_DEFRAG_CONNTRACK_BRIDGE_IN = 131074,
+ __IP_DEFRAG_CONNTRACK_BRIDGE_IN = 196609,
+ IP_DEFRAG_VS_IN = 196610,
+ IP_DEFRAG_VS_OUT = 196611,
+ IP_DEFRAG_VS_FWD = 196612,
+ IP_DEFRAG_AF_PACKET = 196613,
+ IP_DEFRAG_MACVLAN = 196614,
+};
+
+struct nf_sockopt_ops {
+ struct list_head list;
+ u_int8_t pf;
+ int set_optmin;
+ int set_optmax;
+ int (*set)(struct sock *, int, sockptr_t, unsigned int);
+ int get_optmin;
+ int get_optmax;
+ int (*get)(struct sock *, int, void *, int *);
+ struct module *owner;
+};
+
+struct xt_entry_match {
+ union {
+ struct {
+ __u16 match_size;
+ char name[29];
+ __u8 revision;
+ } user;
+ struct {
+ __u16 match_size;
+ struct xt_match *match;
+ } kernel;
+ __u16 match_size;
+ } u;
+ unsigned char data[0];
+};
+
+struct xt_error_target {
+ struct xt_entry_target target;
+ char errorname[30];
+};
+
+struct xt_get_revision {
+ char name[29];
+ __u8 revision;
+};
+
+struct xt_counters_info {
+ char name[32];
+ unsigned int num_counters;
+ struct xt_counters counters[0];
+};
+
+struct xt_percpu_counter_alloc_state {
+ unsigned int off;
+ const char *mem;
+};
+
+struct ip6t_ip6 {
+ struct in6_addr src;
+ struct in6_addr dst;
+ struct in6_addr smsk;
+ struct in6_addr dmsk;
+ char iniface[16];
+ char outiface[16];
+ unsigned char iniface_mask[16];
+ unsigned char outiface_mask[16];
+ __u16 proto;
+ __u8 tos;
+ __u8 flags;
+ __u8 invflags;
+};
+
+struct ip6t_entry {
+ struct ip6t_ip6 ipv6;
+ unsigned int nfcache;
+ __u16 target_offset;
+ __u16 next_offset;
+ unsigned int comefrom;
+ struct xt_counters counters;
+ unsigned char elems[0];
+};
+
+struct ip6t_standard {
+ struct ip6t_entry entry;
+ struct xt_standard_target target;
+};
+
+struct ip6t_error {
+ struct ip6t_entry entry;
+ struct xt_error_target target;
+};
+
+struct ip6t_icmp {
+ __u8 type;
+ __u8 code[2];
+ __u8 invflags;
+};
+
+struct ip6t_getinfo {
+ char name[32];
+ unsigned int valid_hooks;
+ unsigned int hook_entry[5];
+ unsigned int underflow[5];
+ unsigned int num_entries;
+ unsigned int size;
+};
+
+struct ip6t_replace {
+ char name[32];
+ unsigned int valid_hooks;
+ unsigned int num_entries;
+ unsigned int size;
+ unsigned int hook_entry[5];
+ unsigned int underflow[5];
+ unsigned int num_counters;
+ struct xt_counters *counters;
+ struct ip6t_entry entries[0];
+};
+
+struct ip6t_get_entries {
+ char name[32];
+ unsigned int size;
+ struct ip6t_entry entrytable[0];
+};
+
+struct mptcp_skb_cb {
+ u64 map_seq;
+ u64 end_seq;
+ u32 offset;
+ u8 has_rxtstamp: 1;
+};
+
+struct mptcp_options_received {
+ u64 sndr_key;
+ u64 rcvr_key;
+ u64 data_ack;
+ u64 data_seq;
+ u32 subflow_seq;
+ u16 data_len;
+ __sum16 csum;
+ u16 suboptions;
+ u32 token;
+ u32 nonce;
+ u16 use_map: 1;
+ u16 dsn64: 1;
+ u16 data_fin: 1;
+ u16 use_ack: 1;
+ u16 ack64: 1;
+ u16 mpc_map: 1;
+ u16 reset_reason: 4;
+ u16 reset_transient: 1;
+ u16 echo: 1;
+ u16 backup: 1;
+ u16 deny_join_id0: 1;
+ u16 __unused: 2;
+ u8 join_id;
+ u64 thmac;
+ u8 hmac[20];
+ struct mptcp_addr_info addr;
+ struct mptcp_rm_list rm_list;
+ u64 ahmac;
+ u64 fail_seq;
+};
+
+enum perf_msr_id {
+ PERF_MSR_TSC = 0,
+ PERF_MSR_APERF = 1,
+ PERF_MSR_MPERF = 2,
+ PERF_MSR_PPERF = 3,
+ PERF_MSR_SMI = 4,
+ PERF_MSR_PTSC = 5,
+ PERF_MSR_IRPERF = 6,
+ PERF_MSR_THERM = 7,
+ PERF_MSR_EVENT_MAX = 8,
+};
+
+struct rb_augment_callbacks {
+ void (*propagate)(struct rb_node *, struct rb_node *);
+ void (*copy)(struct rb_node *, struct rb_node *);
+ void (*rotate)(struct rb_node *, struct rb_node *);
+};
+
+enum {
+ MEMTYPE_EXACT_MATCH = 0,
+ MEMTYPE_END_MATCH = 1,
+};
+
+struct srcu_notifier_head {
+ struct mutex mutex;
+ struct srcu_struct srcu;
+ struct notifier_block *head;
+};
+
+enum die_val {
+ DIE_OOPS = 1,
+ DIE_INT3 = 2,
+ DIE_DEBUG = 3,
+ DIE_PANIC = 4,
+ DIE_NMI = 5,
+ DIE_DIE = 6,
+ DIE_KERNELDEBUG = 7,
+ DIE_TRAP = 8,
+ DIE_GPF = 9,
+ DIE_CALL = 10,
+ DIE_PAGE_FAULT = 11,
+ DIE_NMIUNKNOWN = 12,
+};
+
+struct die_args {
+ struct pt_regs *regs;
+ const char *str;
+ long int err;
+ int trapnr;
+ int signr;
+};
+
+struct lock_list {
+ struct list_head entry;
+ struct lock_class *class;
+ struct lock_class *links_to;
+ const struct lock_trace *trace;
+ u16 distance;
+ u8 dep;
+ u8 only_xr;
+ struct lock_list *parent;
+};
+
+struct lock_chain {
+ unsigned int irq_context: 2;
+ unsigned int depth: 6;
+ unsigned int base: 24;
+ struct hlist_node entry;
+ u64 chain_key;
+};
+
+enum lock_usage_bit {
+ LOCK_USED_IN_HARDIRQ = 0,
+ LOCK_USED_IN_HARDIRQ_READ = 1,
+ LOCK_ENABLED_HARDIRQ = 2,
+ LOCK_ENABLED_HARDIRQ_READ = 3,
+ LOCK_USED_IN_SOFTIRQ = 4,
+ LOCK_USED_IN_SOFTIRQ_READ = 5,
+ LOCK_ENABLED_SOFTIRQ = 6,
+ LOCK_ENABLED_SOFTIRQ_READ = 7,
+ LOCK_USED = 8,
+ LOCK_USED_READ = 9,
+ LOCK_USAGE_STATES = 10,
+};
+
+enum {
+ LOCKF_USED_IN_HARDIRQ = 1,
+ LOCKF_USED_IN_HARDIRQ_READ = 2,
+ LOCKF_ENABLED_HARDIRQ = 4,
+ LOCKF_ENABLED_HARDIRQ_READ = 8,
+ LOCKF_USED_IN_SOFTIRQ = 16,
+ LOCKF_USED_IN_SOFTIRQ_READ = 32,
+ LOCKF_ENABLED_SOFTIRQ = 64,
+ LOCKF_ENABLED_SOFTIRQ_READ = 128,
+ LOCKF_USED = 256,
+ LOCKF_USED_READ = 512,
+};
+
+struct pending_free {
+ struct list_head zapped;
+ long unsigned int lock_chains_being_freed[1024];
+};
+
+struct delayed_free {
+ struct callback_head callback_head;
+ int index;
+ int scheduled;
+ struct pending_free pf[2];
+};
+
+struct circular_queue {
+ struct lock_list *element[4096];
+ unsigned int front;
+ unsigned int rear;
+};
+
+enum bfs_result {
+ BFS_EINVALIDNODE = -2,
+ BFS_EQUEUEFULL = -1,
+ BFS_RMATCH = 0,
+ BFS_RNOMATCH = 1,
+};
+
+typedef unsigned int pgtbl_mod_mask;
+
+typedef int (*pte_fn_t)(pte_t *, long unsigned int, void *);
+
+struct zap_details {
+ struct folio *single_folio;
+ bool even_cows;
+ zap_flags_t zap_flags;
+};
+
+struct copy_subpage_arg {
+ struct page *dst;
+ struct page *src;
+ struct vm_area_struct *vma;
+};
+
+enum lsm_event {
+ LSM_POLICY_CHANGE = 0,
+};
+
+struct xattr;
+
+typedef int (*initxattrs)(struct inode *, const struct xattr *, void *);
+
+struct xattr {
+ const char *name;
+ void *value;
+ size_t value_len;
+};
+
+struct statx_timestamp {
+ __s64 tv_sec;
+ __u32 tv_nsec;
+ __s32 __reserved;
+};
+
+struct statx {
+ __u32 stx_mask;
+ __u32 stx_blksize;
+ __u64 stx_attributes;
+ __u32 stx_nlink;
+ __u32 stx_uid;
+ __u32 stx_gid;
+ __u16 stx_mode;
+ __u16 __spare0[1];
+ __u64 stx_ino;
+ __u64 stx_size;
+ __u64 stx_blocks;
+ __u64 stx_attributes_mask;
+ struct statx_timestamp stx_atime;
+ struct statx_timestamp stx_btime;
+ struct statx_timestamp stx_ctime;
+ struct statx_timestamp stx_mtime;
+ __u32 stx_rdev_major;
+ __u32 stx_rdev_minor;
+ __u32 stx_dev_major;
+ __u32 stx_dev_minor;
+ __u64 stx_mnt_id;
+ __u32 stx_dio_mem_align;
+ __u32 stx_dio_offset_align;
+ __u64 __spare3[12];
+};
+
+struct io_statx {
+ struct file *file;
+ int dfd;
+ unsigned int mask;
+ unsigned int flags;
+ struct filename *filename;
+ struct statx *buffer;
+};
+
+struct acpi_device_physical_node {
+ unsigned int node_id;
+ struct list_head node;
+ struct device *dev;
+ bool put_online: 1;
+};
+
+struct input_dev_poller {
+ void (*poll)(struct input_dev *);
+ unsigned int poll_interval;
+ unsigned int poll_interval_max;
+ unsigned int poll_interval_min;
+ struct input_dev *input;
+ struct delayed_work work;
+};
+
+enum power_supply_notifier_events {
+ PSY_EVENT_PROP_CHANGED = 0,
+};
+
+struct power_supply_battery_ocv_table {
+ int ocv;
+ int capacity;
+};
+
+struct power_supply_resistance_temp_table {
+ int temp;
+ int resistance;
+};
+
+struct power_supply_vbat_ri_table {
+ int vbat_uv;
+ int ri_uohm;
+};
+
+struct power_supply_maintenance_charge_table {
+ int charge_current_max_ua;
+ int charge_voltage_max_uv;
+ int charge_safety_timer_minutes;
+};
+
+struct power_supply_battery_info {
+ unsigned int technology;
+ int energy_full_design_uwh;
+ int charge_full_design_uah;
+ int voltage_min_design_uv;
+ int voltage_max_design_uv;
+ int tricklecharge_current_ua;
+ int precharge_current_ua;
+ int precharge_voltage_max_uv;
+ int charge_term_current_ua;
+ int charge_restart_voltage_uv;
+ int overvoltage_limit_uv;
+ int constant_charge_current_max_ua;
+ int constant_charge_voltage_max_uv;
+ struct power_supply_maintenance_charge_table *maintenance_charge;
+ int maintenance_charge_size;
+ int alert_low_temp_charge_current_ua;
+ int alert_low_temp_charge_voltage_uv;
+ int alert_high_temp_charge_current_ua;
+ int alert_high_temp_charge_voltage_uv;
+ int factory_internal_resistance_uohm;
+ int factory_internal_resistance_charging_uohm;
+ int ocv_temp[20];
+ int temp_ambient_alert_min;
+ int temp_ambient_alert_max;
+ int temp_alert_min;
+ int temp_alert_max;
+ int temp_min;
+ int temp_max;
+ struct power_supply_battery_ocv_table *ocv_table[20];
+ int ocv_table_size[20];
+ struct power_supply_resistance_temp_table *resist_table;
+ int resist_table_size;
+ struct power_supply_vbat_ri_table *vbat2ri_discharging;
+ int vbat2ri_discharging_size;
+ struct power_supply_vbat_ri_table *vbat2ri_charging;
+ int vbat2ri_charging_size;
+ int bti_resistance_ohm;
+ int bti_resistance_tolerance;
+};
+
+struct psy_am_i_supplied_data {
+ struct power_supply *psy;
+ unsigned int count;
+};
+
+struct psy_get_supplier_prop_data {
+ struct power_supply *psy;
+ enum power_supply_property psp;
+ union power_supply_propval *val;
+};
+
+struct pcibios_fwaddrmap {
+ struct list_head list;
+ struct pci_dev *dev;
+ resource_size_t fw_addr[17];
+};
+
+struct pci_check_idx_range {
+ int start;
+ int end;
+};
+
+struct fpu_guest {
+ u64 xfeatures;
+ u64 perm;
+ u64 xfd_err;
+ unsigned int uabi_size;
+ struct fpstate *fpstate;
+};
+
+struct interval_tree_node {
+ struct rb_node rb;
+ long unsigned int start;
+ long unsigned int last;
+ long unsigned int __subtree_last;
+};
+
+struct kvm_regs {
+ __u64 rax;
+ __u64 rbx;
+ __u64 rcx;
+ __u64 rdx;
+ __u64 rsi;
+ __u64 rdi;
+ __u64 rsp;
+ __u64 rbp;
+ __u64 r8;
+ __u64 r9;
+ __u64 r10;
+ __u64 r11;
+ __u64 r12;
+ __u64 r13;
+ __u64 r14;
+ __u64 r15;
+ __u64 rip;
+ __u64 rflags;
+};
+
+struct kvm_segment {
+ __u64 base;
+ __u32 limit;
+ __u16 selector;
+ __u8 type;
+ __u8 present;
+ __u8 dpl;
+ __u8 db;
+ __u8 s;
+ __u8 l;
+ __u8 g;
+ __u8 avl;
+ __u8 unusable;
+ __u8 padding;
+};
+
+struct kvm_dtable {
+ __u64 base;
+ __u16 limit;
+ __u16 padding[3];
+};
+
+struct kvm_sregs {
+ struct kvm_segment cs;
+ struct kvm_segment ds;
+ struct kvm_segment es;
+ struct kvm_segment fs;
+ struct kvm_segment gs;
+ struct kvm_segment ss;
+ struct kvm_segment tr;
+ struct kvm_segment ldt;
+ struct kvm_dtable gdt;
+ struct kvm_dtable idt;
+ __u64 cr0;
+ __u64 cr2;
+ __u64 cr3;
+ __u64 cr4;
+ __u64 cr8;
+ __u64 efer;
+ __u64 apic_base;
+ __u64 interrupt_bitmap[4];
+};
+
+struct kvm_msr_entry {
+ __u32 index;
+ __u32 reserved;
+ __u64 data;
+};
+
+struct kvm_cpuid_entry2 {
+ __u32 function;
+ __u32 index;
+ __u32 flags;
+ __u32 eax;
+ __u32 ebx;
+ __u32 ecx;
+ __u32 edx;
+ __u32 padding[3];
+};
+
+struct kvm_debug_exit_arch {
+ __u32 exception;
+ __u32 pad;
+ __u64 pc;
+ __u64 dr6;
+ __u64 dr7;
+};
+
+struct kvm_vcpu_events {
+ struct {
+ __u8 injected;
+ __u8 nr;
+ __u8 has_error_code;
+ __u8 pending;
+ __u32 error_code;
+ } exception;
+ struct {
+ __u8 injected;
+ __u8 nr;
+ __u8 soft;
+ __u8 shadow;
+ } interrupt;
+ struct {
+ __u8 injected;
+ __u8 pending;
+ __u8 masked;
+ __u8 pad;
+ } nmi;
+ __u32 sipi_vector;
+ __u32 flags;
+ struct {
+ __u8 smm;
+ __u8 pending;
+ __u8 smm_inside_nmi;
+ __u8 latched_init;
+ } smi;
+ struct {
+ __u8 pending;
+ } triple_fault;
+ __u8 reserved[26];
+ __u8 exception_has_payload;
+ __u64 exception_payload;
+};
+
+struct kvm_sync_regs {
+ struct kvm_regs regs;
+ struct kvm_sregs sregs;
+ struct kvm_vcpu_events events;
+};
+
+struct kvm_vmx_nested_state_data {
+ __u8 vmcs12[4096];
+ __u8 shadow_vmcs12[4096];
+};
+
+struct kvm_vmx_nested_state_hdr {
+ __u64 vmxon_pa;
+ __u64 vmcs12_pa;
+ struct {
+ __u16 flags;
+ } smm;
+ __u16 pad;
+ __u32 flags;
+ __u64 preemption_timer_deadline;
+};
+
+struct kvm_svm_nested_state_data {
+ __u8 vmcb12[4096];
+};
+
+struct kvm_svm_nested_state_hdr {
+ __u64 vmcb_pa;
+};
+
+struct kvm_nested_state {
+ __u16 flags;
+ __u16 format;
+ __u32 size;
+ union {
+ struct kvm_vmx_nested_state_hdr vmx;
+ struct kvm_svm_nested_state_hdr svm;
+ __u8 pad[120];
+ } hdr;
+ union {
+ struct kvm_vmx_nested_state_data vmx[0];
+ struct kvm_svm_nested_state_data svm[0];
+ } data;
+};
+
+struct kvm_pmu_event_filter {
+ __u32 action;
+ __u32 nevents;
+ __u32 fixed_counter_bitmap;
+ __u32 flags;
+ __u32 pad[4];
+ __u64 events[0];
+};
+
+struct kvm_hyperv_exit {
+ __u32 type;
+ __u32 pad1;
+ union {
+ struct {
+ __u32 msr;
+ __u32 pad2;
+ __u64 control;
+ __u64 evt_page;
+ __u64 msg_page;
+ } synic;
+ struct {
+ __u64 input;
+ __u64 result;
+ __u64 params[2];
+ } hcall;
+ struct {
+ __u32 msr;
+ __u32 pad2;
+ __u64 control;
+ __u64 status;
+ __u64 send_page;
+ __u64 recv_page;
+ __u64 pending_page;
+ } syndbg;
+ } u;
+};
+
+struct kvm_xen_exit {
+ __u32 type;
+ union {
+ struct {
+ __u32 longmode;
+ __u32 cpl;
+ __u64 input;
+ __u64 result;
+ __u64 params[6];
+ } hcall;
+ } u;
+};
+
+struct kvm_run {
+ __u8 request_interrupt_window;
+ __u8 immediate_exit;
+ __u8 padding1[6];
+ __u32 exit_reason;
+ __u8 ready_for_interrupt_injection;
+ __u8 if_flag;
+ __u16 flags;
+ __u64 cr8;
+ __u64 apic_base;
+ union {
+ struct {
+ __u64 hardware_exit_reason;
+ } hw;
+ struct {
+ __u64 hardware_entry_failure_reason;
+ __u32 cpu;
+ } fail_entry;
+ struct {
+ __u32 exception;
+ __u32 error_code;
+ } ex;
+ struct {
+ __u8 direction;
+ __u8 size;
+ __u16 port;
+ __u32 count;
+ __u64 data_offset;
+ } io;
+ struct {
+ struct kvm_debug_exit_arch arch;
+ } debug;
+ struct {
+ __u64 phys_addr;
+ __u8 data[8];
+ __u32 len;
+ __u8 is_write;
+ } mmio;
+ struct {
+ __u64 nr;
+ __u64 args[6];
+ __u64 ret;
+ __u32 longmode;
+ __u32 pad;
+ } hypercall;
+ struct {
+ __u64 rip;
+ __u32 is_write;
+ __u32 pad;
+ } tpr_access;
+ struct {
+ __u8 icptcode;
+ __u16 ipa;
+ __u32 ipb;
+ } s390_sieic;
+ __u64 s390_reset_flags;
+ struct {
+ __u64 trans_exc_code;
+ __u32 pgm_code;
+ } s390_ucontrol;
+ struct {
+ __u32 dcrn;
+ __u32 data;
+ __u8 is_write;
+ } dcr;
+ struct {
+ __u32 suberror;
+ __u32 ndata;
+ __u64 data[16];
+ } internal;
+ struct {
+ __u32 suberror;
+ __u32 ndata;
+ __u64 flags;
+ union {
+ struct {
+ __u8 insn_size;
+ __u8 insn_bytes[15];
+ };
+ };
+ } emulation_failure;
+ struct {
+ __u64 gprs[32];
+ } osi;
+ struct {
+ __u64 nr;
+ __u64 ret;
+ __u64 args[9];
+ } papr_hcall;
+ struct {
+ __u16 subchannel_id;
+ __u16 subchannel_nr;
+ __u32 io_int_parm;
+ __u32 io_int_word;
+ __u32 ipb;
+ __u8 dequeued;
+ } s390_tsch;
+ struct {
+ __u32 epr;
+ } epr;
+ struct {
+ __u32 type;
+ __u32 ndata;
+ union {
+ __u64 data[16];
+ };
+ } system_event;
+ struct {
+ __u64 addr;
+ __u8 ar;
+ __u8 reserved;
+ __u8 fc;
+ __u8 sel1;
+ __u16 sel2;
+ } s390_stsi;
+ struct {
+ __u8 vector;
+ } eoi;
+ struct kvm_hyperv_exit hyperv;
+ struct {
+ __u64 esr_iss;
+ __u64 fault_ipa;
+ } arm_nisv;
+ struct {
+ __u8 error;
+ __u8 pad[7];
+ __u32 reason;
+ __u32 index;
+ __u64 data;
+ } msr;
+ struct kvm_xen_exit xen;
+ struct {
+ long unsigned int extension_id;
+ long unsigned int function_id;
+ long unsigned int args[6];
+ long unsigned int ret[2];
+ } riscv_sbi;
+ struct {
+ long unsigned int csr_num;
+ long unsigned int new_value;
+ long unsigned int write_mask;
+ long unsigned int ret_value;
+ } riscv_csr;
+ struct {
+ __u32 flags;
+ } notify;
+ char padding[256];
+ };
+ __u64 kvm_valid_regs;
+ __u64 kvm_dirty_regs;
+ union {
+ struct kvm_sync_regs regs;
+ char padding[2048];
+ } s;
+};
+
+struct kvm_xen_hvm_config {
+ __u32 flags;
+ __u32 msr;
+ __u64 blob_addr_32;
+ __u64 blob_addr_64;
+ __u8 blob_size_32;
+ __u8 blob_size_64;
+ __u8 pad2[30];
+};
+
+struct kvm_enc_region {
+ __u64 addr;
+ __u64 size;
+};
+
+struct kvm_dirty_gfn {
+ __u32 flags;
+ __u32 slot;
+ __u64 offset;
+};
+
+struct kvm_stats_desc {
+ __u32 flags;
+ __s16 exponent;
+ __u16 size;
+ __u32 offset;
+ __u32 bucket_size;
+ char name[0];
+};
+
+typedef long unsigned int gva_t;
+
+typedef u64 gpa_t;
+
+typedef u64 gfn_t;
+
+typedef u64 hpa_t;
+
+typedef u64 hfn_t;
+
+typedef hfn_t kvm_pfn_t;
+
+enum pfn_cache_usage {
+ KVM_GUEST_USES_PFN = 1,
+ KVM_HOST_USES_PFN = 2,
+ KVM_GUEST_AND_HOST_USE_PFN = 3,
+};
+
+struct kvm_memory_slot;
+
+struct gfn_to_hva_cache {
+ u64 generation;
+ gpa_t gpa;
+ long unsigned int hva;
+ long unsigned int len;
+ struct kvm_memory_slot *memslot;
+};
+
+struct kvm_rmap_head;
+
+struct kvm_lpage_info;
+
+struct kvm_arch_memory_slot {
+ struct kvm_rmap_head *rmap[3];
+ struct kvm_lpage_info *lpage_info[2];
+ short unsigned int *gfn_track[1];
+};
+
+struct kvm_memory_slot {
+ struct hlist_node id_node[2];
+ struct interval_tree_node hva_node[2];
+ struct rb_node gfn_node[2];
+ gfn_t base_gfn;
+ long unsigned int npages;
+ long unsigned int *dirty_bitmap;
+ struct kvm_arch_memory_slot arch;
+ long unsigned int userspace_addr;
+ u32 flags;
+ short int id;
+ u16 as_id;
+};
+
+struct kvm_vcpu;
+
+struct gfn_to_pfn_cache {
+ u64 generation;
+ gpa_t gpa;
+ long unsigned int uhva;
+ struct kvm_memory_slot *memslot;
+ struct kvm_vcpu *vcpu;
+ struct list_head list;
+ rwlock_t lock;
+ struct mutex refresh_lock;
+ void *khva;
+ kvm_pfn_t pfn;
+ enum pfn_cache_usage usage;
+ bool active;
+ bool valid;
+};
+
+struct kvm_mmio_fragment {
+ gpa_t gpa;
+ void *data;
+ unsigned int len;
+};
+
+struct kvm_lapic;
+
+struct kvm_page_fault;
+
+struct x86_exception;
+
+struct kvm_mmu_page;
+
+struct kvm_mmu_root_info {
+ gpa_t pgd;
+ hpa_t hpa;
+};
+
+union kvm_mmu_page_role {
+ u32 word;
+ struct {
+ unsigned int level: 4;
+ unsigned int has_4_byte_gpte: 1;
+ unsigned int quadrant: 2;
+ unsigned int direct: 1;
+ unsigned int access: 3;
+ unsigned int invalid: 1;
+ unsigned int efer_nx: 1;
+ unsigned int cr0_wp: 1;
+ unsigned int smep_andnot_wp: 1;
+ unsigned int smap_andnot_wp: 1;
+ unsigned int ad_disabled: 1;
+ unsigned int guest_mode: 1;
+ unsigned int passthrough: 1;
+ char: 5;
+ unsigned int smm: 8;
+ };
+};
+
+union kvm_mmu_extended_role {
+ u32 word;
+ struct {
+ unsigned int valid: 1;
+ unsigned int execonly: 1;
+ unsigned int cr4_pse: 1;
+ unsigned int cr4_pke: 1;
+ unsigned int cr4_smap: 1;
+ unsigned int cr4_smep: 1;
+ unsigned int cr4_la57: 1;
+ unsigned int efer_lma: 1;
+ };
+};
+
+union kvm_cpu_role {
+ u64 as_u64;
+ struct {
+ union kvm_mmu_page_role base;
+ union kvm_mmu_extended_role ext;
+ };
+};
+
+struct rsvd_bits_validate {
+ u64 rsvd_bits_mask[10];
+ u64 bad_mt_xwr;
+};
+
+struct kvm_mmu {
+ long unsigned int (*get_guest_pgd)(struct kvm_vcpu *);
+ u64 (*get_pdptr)(struct kvm_vcpu *, int);
+ int (*page_fault)(struct kvm_vcpu *, struct kvm_page_fault *);
+ void (*inject_page_fault)(struct kvm_vcpu *, struct x86_exception *);
+ gpa_t (*gva_to_gpa)(struct kvm_vcpu *, struct kvm_mmu *, gpa_t, u64, struct x86_exception *);
+ int (*sync_page)(struct kvm_vcpu *, struct kvm_mmu_page *);
+ void (*invlpg)(struct kvm_vcpu *, gva_t, hpa_t);
+ struct kvm_mmu_root_info root;
+ union kvm_cpu_role cpu_role;
+ union kvm_mmu_page_role root_role;
+ u32 pkru_mask;
+ struct kvm_mmu_root_info prev_roots[3];
+ u8 permissions[16];
+ u64 *pae_root;
+ u64 *pml4_root;
+ u64 *pml5_root;
+ struct rsvd_bits_validate shadow_zero_check;
+ struct rsvd_bits_validate guest_rsvd_check;
+ u64 pdptrs[4];
+};
+
+struct kvm_mmu_memory_cache {
+ int nobjs;
+ gfp_t gfp_zero;
+ gfp_t gfp_custom;
+ struct kmem_cache *kmem_cache;
+ int capacity;
+ void **objects;
+};
+
+struct kvm_pio_request {
+ long unsigned int linear_rip;
+ long unsigned int count;
+ int in;
+ int port;
+ int size;
+};
+
+struct kvm_queued_exception {
+ bool pending;
+ bool injected;
+ bool has_error_code;
+ u8 vector;
+ u32 error_code;
+ long unsigned int payload;
+ bool has_payload;
+};
+
+struct kvm_queued_interrupt {
+ bool injected;
+ bool soft;
+ u8 nr;
+};
+
+struct x86_emulate_ctxt;
+
+struct kvm_mtrr_range {
+ u64 base;
+ u64 mask;
+ struct list_head node;
+};
+
+struct kvm_mtrr {
+ struct kvm_mtrr_range var_ranges[8];
+ mtrr_type fixed_ranges[88];
+ u64 deftype;
+ struct list_head head;
+};
+
+enum pmc_type {
+ KVM_PMC_GP = 0,
+ KVM_PMC_FIXED = 1,
+};
+
+struct kvm_pmc {
+ enum pmc_type type;
+ u8 idx;
+ u64 counter;
+ u64 eventsel;
+ struct perf_event *perf_event;
+ struct kvm_vcpu *vcpu;
+ u64 current_config;
+ bool is_paused;
+ bool intr;
+};
+
+struct kvm_pmu {
+ unsigned int nr_arch_gp_counters;
+ unsigned int nr_arch_fixed_counters;
+ unsigned int available_event_types;
+ u64 fixed_ctr_ctrl;
+ u64 fixed_ctr_ctrl_mask;
+ u64 global_ctrl;
+ u64 global_status;
+ u64 counter_bitmask[2];
+ u64 global_ctrl_mask;
+ u64 global_ovf_ctrl_mask;
+ u64 reserved_bits;
+ u64 raw_event_mask;
+ u8 version;
+ struct kvm_pmc gp_counters[8];
+ struct kvm_pmc fixed_counters[3];
+ struct irq_work irq_work;
+ long unsigned int reprogram_pmi[1];
+ long unsigned int all_valid_pmc_idx[1];
+ long unsigned int pmc_in_use[1];
+ u64 ds_area;
+ u64 pebs_enable;
+ u64 pebs_enable_mask;
+ u64 pebs_data_cfg;
+ u64 pebs_data_cfg_mask;
+ u64 host_cross_mapped_mask;
+ bool need_cleanup;
+ u8 event_count;
+};
+
+struct kvm_vcpu_xen {
+ u64 hypercall_rip;
+ u32 current_runstate;
+ u8 upcall_vector;
+ struct gfn_to_pfn_cache vcpu_info_cache;
+ struct gfn_to_pfn_cache vcpu_time_info_cache;
+ struct gfn_to_pfn_cache runstate_cache;
+ u64 last_steal;
+ u64 runstate_entry_time;
+ u64 runstate_times[4];
+ long unsigned int evtchn_pending_sel;
+ u32 vcpu_id;
+ u32 timer_virq;
+ u64 timer_expires;
+ atomic_t timer_pending;
+ struct hrtimer timer;
+ int poll_evtchn;
+ struct timer_list poll_timer;
+};
+
+struct kvm_vcpu_hv;
+
+struct kvm_vcpu_arch {
+ long unsigned int regs[17];
+ u32 regs_avail;
+ u32 regs_dirty;
+ long unsigned int cr0;
+ long unsigned int cr0_guest_owned_bits;
+ long unsigned int cr2;
+ long unsigned int cr3;
+ long unsigned int cr4;
+ long unsigned int cr4_guest_owned_bits;
+ long unsigned int cr4_guest_rsvd_bits;
+ long unsigned int cr8;
+ u32 host_pkru;
+ u32 pkru;
+ u32 hflags;
+ u64 efer;
+ u64 apic_base;
+ struct kvm_lapic *apic;
+ bool load_eoi_exitmap_pending;
+ long unsigned int ioapic_handled_vectors[4];
+ long unsigned int apic_attention;
+ int32_t apic_arb_prio;
+ int mp_state;
+ u64 ia32_misc_enable_msr;
+ u64 smbase;
+ u64 smi_count;
+ bool at_instruction_boundary;
+ bool tpr_access_reporting;
+ bool xsaves_enabled;
+ bool xfd_no_write_intercept;
+ u64 ia32_xss;
+ u64 microcode_version;
+ u64 arch_capabilities;
+ u64 perf_capabilities;
+ struct kvm_mmu *mmu;
+ struct kvm_mmu root_mmu;
+ struct kvm_mmu guest_mmu;
+ struct kvm_mmu nested_mmu;
+ struct kvm_mmu *walk_mmu;
+ struct kvm_mmu_memory_cache mmu_pte_list_desc_cache;
+ struct kvm_mmu_memory_cache mmu_shadow_page_cache;
+ struct kvm_mmu_memory_cache mmu_shadowed_info_cache;
+ struct kvm_mmu_memory_cache mmu_page_header_cache;
+ struct fpu_guest guest_fpu;
+ u64 xcr0;
+ u64 guest_supported_xcr0;
+ struct kvm_pio_request pio;
+ void *pio_data;
+ void *sev_pio_data;
+ unsigned int sev_pio_count;
+ u8 event_exit_inst_len;
+ bool exception_from_userspace;
+ struct kvm_queued_exception exception;
+ struct kvm_queued_exception exception_vmexit;
+ struct kvm_queued_interrupt interrupt;
+ int halt_request;
+ int cpuid_nent;
+ struct kvm_cpuid_entry2 *cpuid_entries;
+ u32 kvm_cpuid_base;
+ u64 reserved_gpa_bits;
+ int maxphyaddr;
+ struct x86_emulate_ctxt *emulate_ctxt;
+ bool emulate_regs_need_sync_to_vcpu;
+ bool emulate_regs_need_sync_from_vcpu;
+ int (*complete_userspace_io)(struct kvm_vcpu *);
+ gpa_t time;
+ struct pvclock_vcpu_time_info hv_clock;
+ unsigned int hw_tsc_khz;
+ struct gfn_to_pfn_cache pv_time;
+ bool pvclock_set_guest_stopped_request;
+ struct {
+ u8 preempted;
+ u64 msr_val;
+ u64 last_steal;
+ struct gfn_to_hva_cache cache;
+ } st;
+ u64 l1_tsc_offset;
+ u64 tsc_offset;
+ u64 last_guest_tsc;
+ u64 last_host_tsc;
+ u64 tsc_offset_adjustment;
+ u64 this_tsc_nsec;
+ u64 this_tsc_write;
+ u64 this_tsc_generation;
+ bool tsc_catchup;
+ bool tsc_always_catchup;
+ s8 virtual_tsc_shift;
+ u32 virtual_tsc_mult;
+ u32 virtual_tsc_khz;
+ s64 ia32_tsc_adjust_msr;
+ u64 msr_ia32_power_ctl;
+ u64 l1_tsc_scaling_ratio;
+ u64 tsc_scaling_ratio;
+ atomic_t nmi_queued;
+ unsigned int nmi_pending;
+ bool nmi_injected;
+ bool smi_pending;
+ u8 handling_intr_from_guest;
+ struct kvm_mtrr mtrr_state;
+ u64 pat;
+ unsigned int switch_db_regs;
+ long unsigned int db[4];
+ long unsigned int dr6;
+ long unsigned int dr7;
+ long unsigned int eff_db[4];
+ long unsigned int guest_debug_dr7;
+ u64 msr_platform_info;
+ u64 msr_misc_features_enables;
+ u64 mcg_cap;
+ u64 mcg_status;
+ u64 mcg_ctl;
+ u64 mcg_ext_ctl;
+ u64 *mce_banks;
+ u64 *mci_ctl2_banks;
+ u64 mmio_gva;
+ unsigned int mmio_access;
+ gfn_t mmio_gfn;
+ u64 mmio_gen;
+ struct kvm_pmu pmu;
+ long unsigned int singlestep_rip;
+ bool hyperv_enabled;
+ struct kvm_vcpu_hv *hyperv;
+ struct kvm_vcpu_xen xen;
+ cpumask_var_t wbinvd_dirty_mask;
+ long unsigned int last_retry_eip;
+ long unsigned int last_retry_addr;
+ struct {
+ bool halted;
+ gfn_t gfns[64];
+ struct gfn_to_hva_cache data;
+ u64 msr_en_val;
+ u64 msr_int_val;
+ u16 vec;
+ u32 id;
+ bool send_user_only;
+ u32 host_apf_flags;
+ bool delivery_as_pf_vmexit;
+ bool pageready_pending;
+ } apf;
+ struct {
+ u64 length;
+ u64 status;
+ } osvw;
+ struct {
+ u64 msr_val;
+ struct gfn_to_hva_cache data;
+ } pv_eoi;
+ u64 msr_kvm_poll_control;
+ bool write_fault_to_shadow_pgtable;
+ long unsigned int exit_qualification;
+ struct {
+ bool pv_unhalted;
+ } pv;
+ int pending_ioapic_eoi;
+ int pending_external_vector;
+ bool preempted_in_kernel;
+ bool l1tf_flush_l1d;
+ int last_vmentry_cpu;
+ u64 msr_hwcr;
+ struct {
+ u32 features;
+ bool enforce;
+ } pv_cpuid;
+ bool guest_state_protected;
+ bool pdptrs_from_userspace;
+};
+
+struct kvm_vcpu_stat_generic {
+ u64 halt_successful_poll;
+ u64 halt_attempted_poll;
+ u64 halt_poll_invalid;
+ u64 halt_wakeup;
+ u64 halt_poll_success_ns;
+ u64 halt_poll_fail_ns;
+ u64 halt_wait_ns;
+ u64 halt_poll_success_hist[32];
+ u64 halt_poll_fail_hist[32];
+ u64 halt_wait_hist[32];
+ u64 blocking;
+};
+
+struct kvm_vcpu_stat {
+ struct kvm_vcpu_stat_generic generic;
+ u64 pf_taken;
+ u64 pf_fixed;
+ u64 pf_emulate;
+ u64 pf_spurious;
+ u64 pf_fast;
+ u64 pf_mmio_spte_created;
+ u64 pf_guest;
+ u64 tlb_flush;
+ u64 invlpg;
+ u64 exits;
+ u64 io_exits;
+ u64 mmio_exits;
+ u64 signal_exits;
+ u64 irq_window_exits;
+ u64 nmi_window_exits;
+ u64 l1d_flush;
+ u64 halt_exits;
+ u64 request_irq_exits;
+ u64 irq_exits;
+ u64 host_state_reload;
+ u64 fpu_reload;
+ u64 insn_emulation;
+ u64 insn_emulation_fail;
+ u64 hypercalls;
+ u64 irq_injections;
+ u64 nmi_injections;
+ u64 req_event;
+ u64 nested_run;
+ u64 directed_yield_attempted;
+ u64 directed_yield_successful;
+ u64 preemption_reported;
+ u64 preemption_other;
+ u64 guest_mode;
+ u64 notify_window_exits;
+};
+
+struct kvm_dirty_ring {
+ u32 dirty_index;
+ u32 reset_index;
+ u32 size;
+ u32 soft_limit;
+ struct kvm_dirty_gfn *dirty_gfns;
+ int index;
+};
+
+struct kvm;
+
+struct kvm_vcpu {
+ struct kvm *kvm;
+ int cpu;
+ int vcpu_id;
+ int vcpu_idx;
+ int ____srcu_idx;
+ int srcu_depth;
+ int mode;
+ u64 requests;
+ long unsigned int guest_debug;
+ struct mutex mutex;
+ struct kvm_run *run;
+ struct rcuwait wait;
+ struct pid *pid;
+ int sigset_active;
+ sigset_t sigset;
+ unsigned int halt_poll_ns;
+ bool valid_wakeup;
+ int mmio_needed;
+ int mmio_read_completed;
+ int mmio_is_write;
+ int mmio_cur_fragment;
+ int mmio_nr_fragments;
+ struct kvm_mmio_fragment mmio_fragments[2];
+ bool preempted;
+ bool ready;
+ struct kvm_vcpu_arch arch;
+ struct kvm_vcpu_stat stat;
+ char stats_id[48];
+ struct kvm_dirty_ring dirty_ring;
+ struct kvm_memory_slot *last_used_slot;
+ u64 last_used_slot_gen;
+};
+
+struct kvm_vm_stat_generic {
+ u64 remote_tlb_flush;
+ u64 remote_tlb_flush_requests;
+};
+
+union cpuid10_eax {
+ struct {
+ unsigned int version_id: 8;
+ unsigned int num_counters: 8;
+ unsigned int bit_width: 8;
+ unsigned int mask_length: 8;
+ } split;
+ unsigned int full;
+};
+
+union cpuid10_ebx {
+ struct {
+ unsigned int no_unhalted_core_cycles: 1;
+ unsigned int no_instructions_retired: 1;
+ unsigned int no_unhalted_reference_cycles: 1;
+ unsigned int no_llc_reference: 1;
+ unsigned int no_llc_misses: 1;
+ unsigned int no_branch_instruction_retired: 1;
+ unsigned int no_branch_misses_retired: 1;
+ } split;
+ unsigned int full;
+};
+
+union cpuid10_edx {
+ struct {
+ unsigned int num_counters_fixed: 5;
+ unsigned int bit_width_fixed: 8;
+ unsigned int reserved1: 2;
+ unsigned int anythread_deprecated: 1;
+ unsigned int reserved2: 16;
+ } split;
+ unsigned int full;
+};
+
+struct perf_pmu_format_hybrid_attr {
+ struct device_attribute attr;
+ u64 pmu_type;
+};
+
+typedef int perf_snapshot_branch_stack_t(struct perf_branch_entry *, unsigned int);
+
+struct hv_partition_assist_pg {
+ u32 tlb_lock_count;
+};
+
+union hv_message_flags {
+ __u8 asu8;
+ struct {
+ __u8 msg_pending: 1;
+ __u8 reserved: 7;
+ };
+};
+
+union hv_port_id {
+ __u32 asu32;
+ struct {
+ __u32 id: 24;
+ __u32 reserved: 8;
+ } u;
+};
+
+struct hv_message_header {
+ __u32 message_type;
+ __u8 payload_size;
+ union hv_message_flags message_flags;
+ __u8 reserved[2];
+ union {
+ __u64 sender;
+ union hv_port_id port;
+ };
+};
+
+struct hv_message {
+ struct hv_message_header header;
+ union {
+ __u64 payload[30];
+ } u;
+};
+
+union hv_stimer_config {
+ u64 as_uint64;
+ struct {
+ u64 enable: 1;
+ u64 periodic: 1;
+ u64 lazy: 1;
+ u64 auto_enable: 1;
+ u64 apic_vector: 8;
+ u64 direct_mode: 1;
+ u64 reserved_z0: 3;
+ u64 sintx: 4;
+ u64 reserved_z1: 44;
+ };
+};
+
+enum kvm_page_track_mode {
+ KVM_PAGE_TRACK_WRITE = 0,
+ KVM_PAGE_TRACK_MAX = 1,
+};
+
+struct kvm_page_track_notifier_head {
+ struct srcu_struct track_srcu;
+ struct hlist_head track_notifier_list;
+};
+
+struct kvm_page_track_notifier_node {
+ struct hlist_node node;
+ void (*track_write)(struct kvm_vcpu *, gpa_t, const u8 *, int, struct kvm_page_track_notifier_node *);
+ void (*track_flush_slot)(struct kvm *, struct kvm_memory_slot *, struct kvm_page_track_notifier_node *);
+};
+
+struct kvm_memslots {
+ u64 generation;
+ atomic_long_t last_used_slot;
+ struct rb_root_cached hva_tree;
+ struct rb_root gfn_tree;
+ struct hlist_head id_hash[128];
+ int node_idx;
+};
+
+struct kvm_vm_stat {
+ struct kvm_vm_stat_generic generic;
+ u64 mmu_shadow_zapped;
+ u64 mmu_pte_write;
+ u64 mmu_pde_zapped;
+ u64 mmu_flooded;
+ u64 mmu_recycled;
+ u64 mmu_cache_miss;
+ u64 mmu_unsync;
+ union {
+ struct {
+ atomic64_t pages_4k;
+ atomic64_t pages_2m;
+ atomic64_t pages_1g;
+ };
+ atomic64_t pages[3];
+ };
+ u64 nx_lpage_splits;
+ u64 max_mmu_page_hash_collisions;
+ u64 max_mmu_rmap_size;
+};
+
+struct iommu_domain;
+
+struct kvm_pic;
+
+struct kvm_ioapic;
+
+struct kvm_pit;
+
+enum hv_tsc_page_status {
+ HV_TSC_PAGE_UNSET = 0,
+ HV_TSC_PAGE_GUEST_CHANGED = 1,
+ HV_TSC_PAGE_HOST_CHANGED = 2,
+ HV_TSC_PAGE_SET = 3,
+ HV_TSC_PAGE_BROKEN = 4,
+};
+
+struct kvm_hv_syndbg {
+ struct {
+ u64 control;
+ u64 status;
+ u64 send_page;
+ u64 recv_page;
+ u64 pending_page;
+ } control;
+ u64 options;
+};
+
+struct kvm_hv {
+ struct mutex hv_lock;
+ u64 hv_guest_os_id;
+ u64 hv_hypercall;
+ u64 hv_tsc_page;
+ enum hv_tsc_page_status hv_tsc_page_status;
+ u64 hv_crash_param[5];
+ u64 hv_crash_ctl;
+ struct ms_hyperv_tsc_page tsc_ref;
+ struct idr conn_to_evt;
+ u64 hv_reenlightenment_control;
+ u64 hv_tsc_emulation_control;
+ u64 hv_tsc_emulation_status;
+ atomic_t num_mismatched_vp_indexes;
+ unsigned int synic_auto_eoi_used;
+ struct hv_partition_assist_pg *hv_pa_pg;
+ struct kvm_hv_syndbg hv_syndbg;
+};
+
+struct kvm_xen {
+ u32 xen_version;
+ bool long_mode;
+ u8 upcall_vector;
+ struct gfn_to_pfn_cache shinfo_cache;
+ struct idr evtchn_ports;
+ long unsigned int poll_mask[16];
+};
+
+enum kvm_irqchip_mode {
+ KVM_IRQCHIP_NONE = 0,
+ KVM_IRQCHIP_KERNEL = 1,
+ KVM_IRQCHIP_SPLIT = 2,
+};
+
+struct kvm_apic_map;
+
+struct kvm_x86_msr_filter;
+
+struct kvm_arch {
+ long unsigned int n_used_mmu_pages;
+ long unsigned int n_requested_mmu_pages;
+ long unsigned int n_max_mmu_pages;
+ unsigned int indirect_shadow_pages;
+ u8 mmu_valid_gen;
+ struct hlist_head mmu_page_hash[4096];
+ struct list_head active_mmu_pages;
+ struct list_head zapped_obsolete_pages;
+ struct list_head lpage_disallowed_mmu_pages;
+ struct kvm_page_track_notifier_node mmu_sp_tracker;
+ struct kvm_page_track_notifier_head track_notifier_head;
+ spinlock_t mmu_unsync_pages_lock;
+ struct list_head assigned_dev_head;
+ struct iommu_domain *iommu_domain;
+ bool iommu_noncoherent;
+ atomic_t noncoherent_dma_count;
+ atomic_t assigned_device_count;
+ struct kvm_pic *vpic;
+ struct kvm_ioapic *vioapic;
+ struct kvm_pit *vpit;
+ atomic_t vapics_in_nmi_mode;
+ struct mutex apic_map_lock;
+ struct kvm_apic_map *apic_map;
+ atomic_t apic_map_dirty;
+ struct rw_semaphore apicv_update_lock;
+ bool apic_access_memslot_enabled;
+ long unsigned int apicv_inhibit_reasons;
+ gpa_t wall_clock;
+ bool mwait_in_guest;
+ bool hlt_in_guest;
+ bool pause_in_guest;
+ bool cstate_in_guest;
+ long unsigned int irq_sources_bitmap;
+ s64 kvmclock_offset;
+ raw_spinlock_t tsc_write_lock;
+ u64 last_tsc_nsec;
+ u64 last_tsc_write;
+ u32 last_tsc_khz;
+ u64 last_tsc_offset;
+ u64 cur_tsc_nsec;
+ u64 cur_tsc_write;
+ u64 cur_tsc_offset;
+ u64 cur_tsc_generation;
+ int nr_vcpus_matched_tsc;
+ u32 default_tsc_khz;
+ seqcount_raw_spinlock_t pvclock_sc;
+ bool use_master_clock;
+ u64 master_kernel_ns;
+ u64 master_cycle_now;
+ struct delayed_work kvmclock_update_work;
+ struct delayed_work kvmclock_sync_work;
+ struct kvm_xen_hvm_config xen_hvm_config;
+ struct hlist_head mask_notifier_list;
+ struct kvm_hv hyperv;
+ struct kvm_xen xen;
+ bool backwards_tsc_observed;
+ bool boot_vcpu_runs_old_kvmclock;
+ u32 bsp_vcpu_id;
+ u64 disabled_quirks;
+ int cpu_dirty_logging_count;
+ enum kvm_irqchip_mode irqchip_mode;
+ u8 nr_reserved_ioapic_pins;
+ bool disabled_lapic_found;
+ bool x2apic_format;
+ bool x2apic_broadcast_quirk_disabled;
+ bool guest_can_read_msr_platform_info;
+ bool exception_payload_enabled;
+ bool triple_fault_event;
+ bool bus_lock_detection_enabled;
+ bool enable_pmu;
+ u32 notify_window;
+ u32 notify_vmexit_flags;
+ bool exit_on_emulation_error;
+ u32 user_space_msr_mask;
+ struct kvm_x86_msr_filter *msr_filter;
+ u32 hypercall_exit_enabled;
+ bool sgx_provisioning_allowed;
+ struct kvm_pmu_event_filter *pmu_event_filter;
+ struct task_struct *nx_lpage_recovery_thread;
+ bool tdp_mmu_enabled;
+ struct list_head tdp_mmu_roots;
+ struct list_head tdp_mmu_pages;
+ spinlock_t tdp_mmu_pages_lock;
+ struct workqueue_struct *tdp_mmu_zap_wq;
+ bool shadow_root_allocated;
+ u32 max_vcpu_ids;
+ bool disable_nx_huge_pages;
+ struct kvm_mmu_memory_cache split_shadow_page_cache;
+ struct kvm_mmu_memory_cache split_page_header_cache;
+ struct kvm_mmu_memory_cache split_desc_cache;
+};
+
+struct kvm_io_bus;
+
+struct kvm_stat_data;
+
+struct kvm {
+ rwlock_t mmu_lock;
+ struct mutex slots_lock;
+ struct mutex slots_arch_lock;
+ struct mm_struct *mm;
+ long unsigned int nr_memslot_pages;
+ struct kvm_memslots __memslots[4];
+ struct kvm_memslots *memslots[2];
+ struct xarray vcpu_array;
+ spinlock_t mn_invalidate_lock;
+ long unsigned int mn_active_invalidate_count;
+ struct rcuwait mn_memslots_update_rcuwait;
+ spinlock_t gpc_lock;
+ struct list_head gpc_list;
+ atomic_t online_vcpus;
+ int max_vcpus;
+ int created_vcpus;
+ int last_boosted_vcpu;
+ struct list_head vm_list;
+ struct mutex lock;
+ struct kvm_io_bus *buses[4];
+ struct kvm_vm_stat stat;
+ struct kvm_arch arch;
+ refcount_t users_count;
+ struct mutex irq_lock;
+ struct list_head devices;
+ u64 manual_dirty_log_protect;
+ struct dentry *debugfs_dentry;
+ struct kvm_stat_data **debugfs_stat_data;
+ struct srcu_struct srcu;
+ struct srcu_struct irq_srcu;
+ pid_t userspace_pid;
+ bool override_halt_poll_ns;
+ unsigned int max_halt_poll_ns;
+ u32 dirty_ring_size;
+ bool vm_bugged;
+ bool vm_dead;
+ char stats_id[48];
+};
+
+enum kvm_reg {
+ VCPU_REGS_RAX = 0,
+ VCPU_REGS_RCX = 1,
+ VCPU_REGS_RDX = 2,
+ VCPU_REGS_RBX = 3,
+ VCPU_REGS_RSP = 4,
+ VCPU_REGS_RBP = 5,
+ VCPU_REGS_RSI = 6,
+ VCPU_REGS_RDI = 7,
+ VCPU_REGS_R8 = 8,
+ VCPU_REGS_R9 = 9,
+ VCPU_REGS_R10 = 10,
+ VCPU_REGS_R11 = 11,
+ VCPU_REGS_R12 = 12,
+ VCPU_REGS_R13 = 13,
+ VCPU_REGS_R14 = 14,
+ VCPU_REGS_R15 = 15,
+ VCPU_REGS_RIP = 16,
+ NR_VCPU_REGS = 17,
+ VCPU_EXREG_PDPTR = 17,
+ VCPU_EXREG_CR0 = 18,
+ VCPU_EXREG_CR3 = 19,
+ VCPU_EXREG_CR4 = 20,
+ VCPU_EXREG_RFLAGS = 21,
+ VCPU_EXREG_SEGMENTS = 22,
+ VCPU_EXREG_EXIT_INFO_1 = 23,
+ VCPU_EXREG_EXIT_INFO_2 = 24,
+};
+
+enum exit_fastpath_completion {
+ EXIT_FASTPATH_NONE = 0,
+ EXIT_FASTPATH_REENTER_GUEST = 1,
+ EXIT_FASTPATH_EXIT_HANDLED = 2,
+};
+
+struct kvm_rmap_head {
+ long unsigned int val;
+};
+
+struct kvm_tlb_range {
+ u64 start_gfn;
+ u64 pages;
+};
+
+struct kvm_vcpu_hv_stimer {
+ struct hrtimer timer;
+ int index;
+ union hv_stimer_config config;
+ u64 count;
+ u64 exp_time;
+ struct hv_message msg;
+ bool msg_pending;
+};
+
+struct kvm_vcpu_hv_synic {
+ u64 version;
+ u64 control;
+ u64 msg_page;
+ u64 evt_page;
+ atomic64_t sint[16];
+ atomic_t sint_to_gsi[16];
+ long unsigned int auto_eoi_bitmap[4];
+ long unsigned int vec_bitmap[4];
+ bool active;
+ bool dont_zero_synic_pages;
+};
+
+struct kvm_vcpu_hv {
+ struct kvm_vcpu *vcpu;
+ u32 vp_index;
+ u64 hv_vapic;
+ s64 runtime_offset;
+ struct kvm_vcpu_hv_synic synic;
+ struct kvm_hyperv_exit exit;
+ struct kvm_vcpu_hv_stimer stimer[4];
+ long unsigned int stimer_pending_bitmap[1];
+ bool enforce_cpuid;
+ struct {
+ u32 features_eax;
+ u32 features_ebx;
+ u32 features_edx;
+ u32 enlightenments_eax;
+ u32 enlightenments_ebx;
+ u32 syndbg_cap_eax;
+ u32 nested_eax;
+ u32 nested_ebx;
+ } cpuid_cache;
+};
+
+struct kvm_lpage_info {
+ int disallow_lpage;
+};
+
+struct kvm_apic_map {
+ struct callback_head rcu;
+ u8 mode;
+ u32 max_apic_id;
+ union {
+ struct kvm_lapic *xapic_flat_map[8];
+ struct kvm_lapic *xapic_cluster_map[64];
+ };
+ struct kvm_lapic *phys_map[0];
+};
+
+struct msr_bitmap_range {
+ u32 flags;
+ u32 nmsrs;
+ u32 base;
+ long unsigned int *bitmap;
+};
+
+struct kvm_x86_msr_filter {
+ u8 count;
+ bool default_allow: 1;
+ struct msr_bitmap_range ranges[16];
+};
+
+enum kvm_apicv_inhibit {
+ APICV_INHIBIT_REASON_DISABLE = 0,
+ APICV_INHIBIT_REASON_HYPERV = 1,
+ APICV_INHIBIT_REASON_ABSENT = 2,
+ APICV_INHIBIT_REASON_BLOCKIRQ = 3,
+ APICV_INHIBIT_REASON_APIC_ID_MODIFIED = 4,
+ APICV_INHIBIT_REASON_APIC_BASE_MODIFIED = 5,
+ APICV_INHIBIT_REASON_NESTED = 6,
+ APICV_INHIBIT_REASON_IRQWIN = 7,
+ APICV_INHIBIT_REASON_PIT_REINJ = 8,
+ APICV_INHIBIT_REASON_SEV = 9,
+};
+
+struct msr_data {
+ bool host_initiated;
+ u32 index;
+ u64 data;
+};
+
+struct x86_instruction_info;
+
+enum x86_intercept_stage;
+
+struct kvm_x86_nested_ops;
+
+struct kvm_x86_ops {
+ const char *name;
+ int (*hardware_enable)();
+ void (*hardware_disable)();
+ void (*hardware_unsetup)();
+ bool (*has_emulated_msr)(struct kvm *, u32);
+ void (*vcpu_after_set_cpuid)(struct kvm_vcpu *);
+ unsigned int vm_size;
+ int (*vm_init)(struct kvm *);
+ void (*vm_destroy)(struct kvm *);
+ int (*vcpu_precreate)(struct kvm *);
+ int (*vcpu_create)(struct kvm_vcpu *);
+ void (*vcpu_free)(struct kvm_vcpu *);
+ void (*vcpu_reset)(struct kvm_vcpu *, bool);
+ void (*prepare_switch_to_guest)(struct kvm_vcpu *);
+ void (*vcpu_load)(struct kvm_vcpu *, int);
+ void (*vcpu_put)(struct kvm_vcpu *);
+ void (*update_exception_bitmap)(struct kvm_vcpu *);
+ int (*get_msr)(struct kvm_vcpu *, struct msr_data *);
+ int (*set_msr)(struct kvm_vcpu *, struct msr_data *);
+ u64 (*get_segment_base)(struct kvm_vcpu *, int);
+ void (*get_segment)(struct kvm_vcpu *, struct kvm_segment *, int);
+ int (*get_cpl)(struct kvm_vcpu *);
+ void (*set_segment)(struct kvm_vcpu *, struct kvm_segment *, int);
+ void (*get_cs_db_l_bits)(struct kvm_vcpu *, int *, int *);
+ void (*set_cr0)(struct kvm_vcpu *, long unsigned int);
+ void (*post_set_cr3)(struct kvm_vcpu *, long unsigned int);
+ bool (*is_valid_cr4)(struct kvm_vcpu *, long unsigned int);
+ void (*set_cr4)(struct kvm_vcpu *, long unsigned int);
+ int (*set_efer)(struct kvm_vcpu *, u64);
+ void (*get_idt)(struct kvm_vcpu *, struct desc_ptr *);
+ void (*set_idt)(struct kvm_vcpu *, struct desc_ptr *);
+ void (*get_gdt)(struct kvm_vcpu *, struct desc_ptr *);
+ void (*set_gdt)(struct kvm_vcpu *, struct desc_ptr *);
+ void (*sync_dirty_debug_regs)(struct kvm_vcpu *);
+ void (*set_dr7)(struct kvm_vcpu *, long unsigned int);
+ void (*cache_reg)(struct kvm_vcpu *, enum kvm_reg);
+ long unsigned int (*get_rflags)(struct kvm_vcpu *);
+ void (*set_rflags)(struct kvm_vcpu *, long unsigned int);
+ bool (*get_if_flag)(struct kvm_vcpu *);
+ void (*flush_tlb_all)(struct kvm_vcpu *);
+ void (*flush_tlb_current)(struct kvm_vcpu *);
+ int (*tlb_remote_flush)(struct kvm *);
+ int (*tlb_remote_flush_with_range)(struct kvm *, struct kvm_tlb_range *);
+ void (*flush_tlb_gva)(struct kvm_vcpu *, gva_t);
+ void (*flush_tlb_guest)(struct kvm_vcpu *);
+ int (*vcpu_pre_run)(struct kvm_vcpu *);
+ enum exit_fastpath_completion (*vcpu_run)(struct kvm_vcpu *);
+ int (*handle_exit)(struct kvm_vcpu *, enum exit_fastpath_completion);
+ int (*skip_emulated_instruction)(struct kvm_vcpu *);
+ void (*update_emulated_instruction)(struct kvm_vcpu *);
+ void (*set_interrupt_shadow)(struct kvm_vcpu *, int);
+ u32 (*get_interrupt_shadow)(struct kvm_vcpu *);
+ void (*patch_hypercall)(struct kvm_vcpu *, unsigned char *);
+ void (*inject_irq)(struct kvm_vcpu *, bool);
+ void (*inject_nmi)(struct kvm_vcpu *);
+ void (*inject_exception)(struct kvm_vcpu *);
+ void (*cancel_injection)(struct kvm_vcpu *);
+ int (*interrupt_allowed)(struct kvm_vcpu *, bool);
+ int (*nmi_allowed)(struct kvm_vcpu *, bool);
+ bool (*get_nmi_mask)(struct kvm_vcpu *);
+ void (*set_nmi_mask)(struct kvm_vcpu *, bool);
+ void (*enable_nmi_window)(struct kvm_vcpu *);
+ void (*enable_irq_window)(struct kvm_vcpu *);
+ void (*update_cr8_intercept)(struct kvm_vcpu *, int, int);
+ bool (*check_apicv_inhibit_reasons)(enum kvm_apicv_inhibit);
+ void (*refresh_apicv_exec_ctrl)(struct kvm_vcpu *);
+ void (*hwapic_irr_update)(struct kvm_vcpu *, int);
+ void (*hwapic_isr_update)(int);
+ bool (*guest_apic_has_interrupt)(struct kvm_vcpu *);
+ void (*load_eoi_exitmap)(struct kvm_vcpu *, u64 *);
+ void (*set_virtual_apic_mode)(struct kvm_vcpu *);
+ void (*set_apic_access_page_addr)(struct kvm_vcpu *);
+ void (*deliver_interrupt)(struct kvm_lapic *, int, int, int);
+ int (*sync_pir_to_irr)(struct kvm_vcpu *);
+ int (*set_tss_addr)(struct kvm *, unsigned int);
+ int (*set_identity_map_addr)(struct kvm *, u64);
+ u8 (*get_mt_mask)(struct kvm_vcpu *, gfn_t, bool);
+ void (*load_mmu_pgd)(struct kvm_vcpu *, hpa_t, int);
+ bool (*has_wbinvd_exit)();
+ u64 (*get_l2_tsc_offset)(struct kvm_vcpu *);
+ u64 (*get_l2_tsc_multiplier)(struct kvm_vcpu *);
+ void (*write_tsc_offset)(struct kvm_vcpu *, u64);
+ void (*write_tsc_multiplier)(struct kvm_vcpu *, u64);
+ void (*get_exit_info)(struct kvm_vcpu *, u32 *, u64 *, u64 *, u32 *, u32 *);
+ int (*check_intercept)(struct kvm_vcpu *, struct x86_instruction_info *, enum x86_intercept_stage, struct x86_exception *);
+ void (*handle_exit_irqoff)(struct kvm_vcpu *);
+ void (*request_immediate_exit)(struct kvm_vcpu *);
+ void (*sched_in)(struct kvm_vcpu *, int);
+ int cpu_dirty_log_size;
+ void (*update_cpu_dirty_logging)(struct kvm_vcpu *);
+ const struct kvm_x86_nested_ops *nested_ops;
+ void (*vcpu_blocking)(struct kvm_vcpu *);
+ void (*vcpu_unblocking)(struct kvm_vcpu *);
+ int (*pi_update_irte)(struct kvm *, unsigned int, uint32_t, bool);
+ void (*pi_start_assignment)(struct kvm *);
+ void (*apicv_post_state_restore)(struct kvm_vcpu *);
+ bool (*dy_apicv_has_pending_interrupt)(struct kvm_vcpu *);
+ int (*set_hv_timer)(struct kvm_vcpu *, u64, bool *);
+ void (*cancel_hv_timer)(struct kvm_vcpu *);
+ void (*setup_mce)(struct kvm_vcpu *);
+ int (*smi_allowed)(struct kvm_vcpu *, bool);
+ int (*enter_smm)(struct kvm_vcpu *, char *);
+ int (*leave_smm)(struct kvm_vcpu *, const char *);
+ void (*enable_smi_window)(struct kvm_vcpu *);
+ int (*mem_enc_ioctl)(struct kvm *, void *);
+ int (*mem_enc_register_region)(struct kvm *, struct kvm_enc_region *);
+ int (*mem_enc_unregister_region)(struct kvm *, struct kvm_enc_region *);
+ int (*vm_copy_enc_context_from)(struct kvm *, unsigned int);
+ int (*vm_move_enc_context_from)(struct kvm *, unsigned int);
+ void (*guest_memory_reclaimed)(struct kvm *);
+ int (*get_msr_feature)(struct kvm_msr_entry *);
+ bool (*can_emulate_instruction)(struct kvm_vcpu *, int, void *, int);
+ bool (*apic_init_signal_blocked)(struct kvm_vcpu *);
+ int (*enable_direct_tlbflush)(struct kvm_vcpu *);
+ void (*migrate_timers)(struct kvm_vcpu *);
+ void (*msr_filter_changed)(struct kvm_vcpu *);
+ int (*complete_emulated_msr)(struct kvm_vcpu *, int);
+ void (*vcpu_deliver_sipi_vector)(struct kvm_vcpu *, u8);
+ long unsigned int (*vcpu_get_apicv_inhibit_reasons)(struct kvm_vcpu *);
+};
+
+struct kvm_x86_nested_ops {
+ void (*leave_nested)(struct kvm_vcpu *);
+ bool (*is_exception_vmexit)(struct kvm_vcpu *, u8, u32);
+ int (*check_events)(struct kvm_vcpu *);
+ bool (*has_events)(struct kvm_vcpu *);
+ void (*triple_fault)(struct kvm_vcpu *);
+ int (*get_state)(struct kvm_vcpu *, struct kvm_nested_state *, unsigned int);
+ int (*set_state)(struct kvm_vcpu *, struct kvm_nested_state *, struct kvm_nested_state *);
+ bool (*get_nested_state_pages)(struct kvm_vcpu *);
+ int (*write_log_dirty)(struct kvm_vcpu *, gpa_t);
+ int (*enable_evmcs)(struct kvm_vcpu *, uint16_t *);
+ uint16_t (*get_evmcs_version)(struct kvm_vcpu *);
+};
+
+struct kvm_io_device;
+
+struct kvm_io_range {
+ gpa_t addr;
+ int len;
+ struct kvm_io_device *dev;
+};
+
+struct kvm_io_bus {
+ int dev_count;
+ int ioeventfd_count;
+ struct kvm_io_range range[0];
+};
+
+enum kvm_bus {
+ KVM_MMIO_BUS = 0,
+ KVM_PIO_BUS = 1,
+ KVM_VIRTIO_CCW_NOTIFY_BUS = 2,
+ KVM_FAST_MMIO_BUS = 3,
+ KVM_NR_BUSES = 4,
+};
+
+enum kvm_stat_kind {
+ KVM_STAT_VM = 0,
+ KVM_STAT_VCPU = 1,
+};
+
+struct _kvm_stats_desc;
+
+struct kvm_stat_data {
+ struct kvm *kvm;
+ const struct _kvm_stats_desc *desc;
+ enum kvm_stat_kind kind;
+};
+
+struct _kvm_stats_desc {
+ struct kvm_stats_desc desc;
+ char name[48];
+};
+
+enum {
+ LBR_FORMAT_32 = 0,
+ LBR_FORMAT_LIP = 1,
+ LBR_FORMAT_EIP = 2,
+ LBR_FORMAT_EIP_FLAGS = 3,
+ LBR_FORMAT_EIP_FLAGS2 = 4,
+ LBR_FORMAT_INFO = 5,
+ LBR_FORMAT_TIME = 6,
+ LBR_FORMAT_INFO2 = 7,
+ LBR_FORMAT_MAX_KNOWN = 7,
+};
+
+union x86_pmu_config {
+ struct {
+ u64 event: 8;
+ u64 umask: 8;
+ u64 usr: 1;
+ u64 os: 1;
+ u64 edge: 1;
+ u64 pc: 1;
+ u64 interrupt: 1;
+ u64 __reserved1: 1;
+ u64 en: 1;
+ u64 inv: 1;
+ u64 cmask: 8;
+ u64 event2: 4;
+ u64 __reserved2: 4;
+ u64 go: 1;
+ u64 ho: 1;
+ } bits;
+ u64 value;
+};
+
+struct page_reporting_dev_info {
+ int (*report)(struct page_reporting_dev_info *, struct scatterlist *, unsigned int);
+ struct delayed_work work;
+ atomic_t state;
+ unsigned int order;
+};
+
+enum {
+ PAGE_REPORTING_IDLE = 0,
+ PAGE_REPORTING_REQUESTED = 1,
+ PAGE_REPORTING_ACTIVE = 2,
+};
+
+struct f_owner_ex {
+ int type;
+ __kernel_pid_t pid;
+};
+
+struct flock {
+ short int l_type;
+ short int l_whence;
+ __kernel_off_t l_start;
+ __kernel_off_t l_len;
+ __kernel_pid_t l_pid;
+};
+
+struct arch_elf_state {};
+
+struct memelfnote {
+ const char *name;
+ int type;
+ unsigned int datasz;
+ void *data;
+};
+
+struct elf_thread_core_info {
+ struct elf_thread_core_info *next;
+ struct task_struct *task;
+ struct elf_prstatus prstatus;
+ struct memelfnote notes[0];
+};
+
+struct elf_note_info {
+ struct elf_thread_core_info *thread;
+ struct memelfnote psinfo;
+ struct memelfnote signote;
+ struct memelfnote auxv;
+ struct memelfnote files;
+ siginfo_t csigdata;
+ size_t size;
+ int thread_notes;
+};
+
+struct mb_cache_entry {
+ struct list_head e_list;
+ struct hlist_bl_node e_hash_list;
+ atomic_t e_refcnt;
+ u32 e_key;
+ u32 e_referenced: 1;
+ u32 e_reusable: 1;
+ u64 e_value;
+};
+
+struct ext4_xattr_header {
+ __le32 h_magic;
+ __le32 h_refcount;
+ __le32 h_blocks;
+ __le32 h_hash;
+ __le32 h_checksum;
+ __u32 h_reserved[3];
+};
+
+struct ext4_xattr_entry {
+ __u8 e_name_len;
+ __u8 e_name_index;
+ __le16 e_value_offs;
+ __le32 e_value_inum;
+ __le32 e_value_size;
+ __le32 e_hash;
+ char e_name[0];
+};
+
+struct ext4_xattr_info {
+ const char *name;
+ const void *value;
+ size_t value_len;
+ int name_index;
+ int in_inode;
+};
+
+struct ext4_xattr_search {
+ struct ext4_xattr_entry *first;
+ void *base;
+ void *end;
+ struct ext4_xattr_entry *here;
+ int not_found;
+};
+
+struct ext4_xattr_ibody_find {
+ struct ext4_xattr_search s;
+ struct ext4_iloc iloc;
+};
+
+struct ext4_xattr_block_find {
+ struct ext4_xattr_search s;
+ struct buffer_head *bh;
+};
+
+struct shash_instance {
+ void (*free)(struct shash_instance *);
+ union {
+ struct {
+ char head[96];
+ struct crypto_instance base;
+ } s;
+ struct shash_alg alg;
+ };
+};
+
+struct crypto_shash_spawn {
+ struct crypto_spawn base;
+};
+
+struct hmac_ctx {
+ struct crypto_shash *hash;
+};
+
+struct RigidDiskBlock {
+ __u32 rdb_ID;
+ __be32 rdb_SummedLongs;
+ __s32 rdb_ChkSum;
+ __u32 rdb_HostID;
+ __be32 rdb_BlockBytes;
+ __u32 rdb_Flags;
+ __u32 rdb_BadBlockList;
+ __be32 rdb_PartitionList;
+ __u32 rdb_FileSysHeaderList;
+ __u32 rdb_DriveInit;
+ __u32 rdb_Reserved1[6];
+ __u32 rdb_Cylinders;
+ __u32 rdb_Sectors;
+ __u32 rdb_Heads;
+ __u32 rdb_Interleave;
+ __u32 rdb_Park;
+ __u32 rdb_Reserved2[3];
+ __u32 rdb_WritePreComp;
+ __u32 rdb_ReducedWrite;
+ __u32 rdb_StepRate;
+ __u32 rdb_Reserved3[5];
+ __u32 rdb_RDBBlocksLo;
+ __u32 rdb_RDBBlocksHi;
+ __u32 rdb_LoCylinder;
+ __u32 rdb_HiCylinder;
+ __u32 rdb_CylBlocks;
+ __u32 rdb_AutoParkSeconds;
+ __u32 rdb_HighRDSKBlock;
+ __u32 rdb_Reserved4;
+ char rdb_DiskVendor[8];
+ char rdb_DiskProduct[16];
+ char rdb_DiskRevision[4];
+ char rdb_ControllerVendor[8];
+ char rdb_ControllerProduct[16];
+ char rdb_ControllerRevision[4];
+ __u32 rdb_Reserved5[10];
+};
+
+struct PartitionBlock {
+ __be32 pb_ID;
+ __be32 pb_SummedLongs;
+ __s32 pb_ChkSum;
+ __u32 pb_HostID;
+ __be32 pb_Next;
+ __u32 pb_Flags;
+ __u32 pb_Reserved1[2];
+ __u32 pb_DevFlags;
+ __u8 pb_DriveName[32];
+ __u32 pb_Reserved2[15];
+ __be32 pb_Environment[17];
+ __u32 pb_EReserved[15];
+};
+
+struct io_epoll {
+ struct file *file;
+ int epfd;
+ int op;
+ int fd;
+ struct epoll_event event;
+} __attribute__((packed));
+
+struct acpi_bus_event {
+ struct list_head node;
+ acpi_device_class device_class;
+ acpi_bus_id bus_id;
+ u32 type;
+ u32 data;
+};
+
+struct acpi_genl_event {
+ acpi_device_class device_class;
+ char bus_id[15];
+ u32 type;
+ u32 data;
+};
+
+enum {
+ ACPI_GENL_ATTR_UNSPEC = 0,
+ ACPI_GENL_ATTR_EVENT = 1,
+ __ACPI_GENL_ATTR_MAX = 2,
+};
+
+enum {
+ ACPI_GENL_CMD_UNSPEC = 0,
+ ACPI_GENL_CMD_EVENT = 1,
+ __ACPI_GENL_CMD_MAX = 2,
+};
+
+struct pnp_fixup {
+ char id[7];
+ void (*quirk_function)(struct pnp_dev *);
+};
+
+struct pnp_port {
+ resource_size_t min;
+ resource_size_t max;
+ resource_size_t align;
+ resource_size_t size;
+ unsigned char flags;
+};
+
+typedef struct {
+ long unsigned int bits[4];
+} pnp_irq_mask_t;
+
+struct pnp_irq {
+ pnp_irq_mask_t map;
+ unsigned char flags;
+};
+
+struct pnp_dma {
+ unsigned char map;
+ unsigned char flags;
+};
+
+struct pnp_mem {
+ resource_size_t min;
+ resource_size_t max;
+ resource_size_t align;
+ resource_size_t size;
+ unsigned char flags;
+};
+
+struct pnp_option {
+ struct list_head list;
+ unsigned int flags;
+ long unsigned int type;
+ union {
+ struct pnp_port port;
+ struct pnp_irq irq;
+ struct pnp_dma dma;
+ struct pnp_mem mem;
+ } u;
+};
+
+struct pnp_resource {
+ struct list_head list;
+ struct resource res;
+};
+
+struct ad_info {
+ __u16 aggregator_id;
+ __u16 ports;
+ __u16 actor_key;
+ __u16 partner_key;
+ __u8 partner_system[6];
+};
+
+enum {
+ BOND_3AD_STAT_LACPDU_RX = 0,
+ BOND_3AD_STAT_LACPDU_TX = 1,
+ BOND_3AD_STAT_LACPDU_UNKNOWN_RX = 2,
+ BOND_3AD_STAT_LACPDU_ILLEGAL_RX = 3,
+ BOND_3AD_STAT_MARKER_RX = 4,
+ BOND_3AD_STAT_MARKER_TX = 5,
+ BOND_3AD_STAT_MARKER_RESP_RX = 6,
+ BOND_3AD_STAT_MARKER_RESP_TX = 7,
+ BOND_3AD_STAT_MARKER_UNKNOWN_RX = 8,
+ BOND_3AD_STAT_PAD = 9,
+ __BOND_3AD_STAT_MAX = 10,
+};
+
+enum {
+ AD_TYPE_LACPDU = 1,
+ AD_TYPE_MARKER = 2,
+};
+
+enum {
+ AD_MARKER_INFORMATION_SUBTYPE = 1,
+ AD_MARKER_RESPONSE_SUBTYPE = 2,
+};
+
+enum {
+ AD_CURRENT_WHILE_TIMER = 0,
+ AD_ACTOR_CHURN_TIMER = 1,
+ AD_PERIODIC_TIMER = 2,
+ AD_PARTNER_CHURN_TIMER = 3,
+ AD_WAIT_WHILE_TIMER = 4,
+};
+
+struct lacpdu_header {
+ struct ethhdr hdr;
+ struct lacpdu lacpdu;
+};
+
+struct bond_marker {
+ u8 subtype;
+ u8 version_number;
+ u8 tlv_type;
+ u8 marker_length;
+ u16 requester_port;
+ struct mac_addr requester_system;
+ u32 requester_transaction_id;
+ u16 pad;
+ u8 tlv_type_terminator;
+ u8 terminator_length;
+ u8 reserved_90[90];
+} __attribute__((packed));
+
+struct bond_marker_header {
+ struct ethhdr hdr;
+ struct bond_marker marker;
+} __attribute__((packed));
+
+enum ad_link_speed_type {
+ AD_LINK_SPEED_1MBPS = 1,
+ AD_LINK_SPEED_10MBPS = 2,
+ AD_LINK_SPEED_100MBPS = 3,
+ AD_LINK_SPEED_1000MBPS = 4,
+ AD_LINK_SPEED_2500MBPS = 5,
+ AD_LINK_SPEED_5000MBPS = 6,
+ AD_LINK_SPEED_10000MBPS = 7,
+ AD_LINK_SPEED_14000MBPS = 8,
+ AD_LINK_SPEED_20000MBPS = 9,
+ AD_LINK_SPEED_25000MBPS = 10,
+ AD_LINK_SPEED_40000MBPS = 11,
+ AD_LINK_SPEED_50000MBPS = 12,
+ AD_LINK_SPEED_56000MBPS = 13,
+ AD_LINK_SPEED_100000MBPS = 14,
+ AD_LINK_SPEED_200000MBPS = 15,
+ AD_LINK_SPEED_400000MBPS = 16,
+ AD_LINK_SPEED_800000MBPS = 17,
+};
+
+struct btf_member {
+ __u32 name_off;
+ __u32 type;
+ __u32 offset;
+};
+
+struct bpf_struct_ops {
+ const struct bpf_verifier_ops *verifier_ops;
+ int (*init)(struct btf *);
+ int (*check_member)(const struct btf_type *, const struct btf_member *);
+ int (*init_member)(const struct btf_type *, const struct btf_member *, void *, const void *);
+ int (*reg)(void *);
+ void (*unreg)(void *);
+ const struct btf_type *type;
+ const struct btf_type *value_type;
+ const char *name;
+ struct btf_func_model func_models[64];
+ u32 type_id;
+ u32 value_id;
+};
+
+struct bpf_dummy_ops_state {
+ int val;
+};
+
+typedef int (*dummy_ops_test_ret_fn)(struct bpf_dummy_ops_state *, ...);
+
+struct bpf_dummy_ops_test_args {
+ u64 args[12];
+ struct bpf_dummy_ops_state state;
+};
+
+struct ip6_fraglist_iter {
+ struct ipv6hdr *tmp_hdr;
+ struct sk_buff *frag;
+ int offset;
+ unsigned int hlen;
+ __be32 frag_id;
+ u8 nexthdr;
+};
+
+struct ip6_frag_state {
+ u8 *prevhdr;
+ unsigned int hlen;
+ unsigned int mtu;
+ unsigned int left;
+ int offset;
+ int ptr;
+ int hroom;
+ int troom;
+ __be32 frag_id;
+ u8 nexthdr;
+};
+
+struct ip6_rt_info {
+ struct in6_addr daddr;
+ struct in6_addr saddr;
+ u_int32_t mark;
+};
+
+struct nf_queue_entry;
+
+struct nf_ipv6_ops {
+ void (*route_input)(struct sk_buff *);
+ int (*fragment)(struct net *, struct sock *, struct sk_buff *, int (*)(struct net *, struct sock *, struct sk_buff *));
+ int (*reroute)(struct sk_buff *, const struct nf_queue_entry *);
+};
+
+struct nf_queue_entry {
+ struct list_head list;
+ struct sk_buff *skb;
+ unsigned int id;
+ unsigned int hook_index;
+ struct nf_hook_state state;
+ u16 size;
+};
+
+struct br_input_skb_cb {
+ struct net_device *brdev;
+ u16 frag_max_size;
+ u8 proxyarp_replied: 1;
+ u8 src_port_isolated: 1;
+};
+
+struct nf_bridge_frag_data;
+
+struct in6_addr;
+
+struct bts_ctx {
+ struct perf_output_handle handle;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct debug_store ds_back;
+ int state;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+enum {
+ BTS_STATE_STOPPED = 0,
+ BTS_STATE_INACTIVE = 1,
+ BTS_STATE_ACTIVE = 2,
+};
+
+struct bts_phys {
+ struct page *page;
+ long unsigned int size;
+ long unsigned int offset;
+ long unsigned int displacement;
+};
+
+struct bts_buffer {
+ size_t real_size;
+ unsigned int nr_pages;
+ unsigned int nr_bufs;
+ unsigned int cur_buf;
+ bool snapshot;
+ local_t data_size;
+ local_t head;
+ long unsigned int end;
+ void **data_pages;
+ struct bts_phys buf[0];
+};
+
+struct cpuid_regs_done {
+ struct cpuid_regs regs;
+ struct completion done;
+};
+
+struct tlb_state_shared {
+ bool is_lazy;
+};
+
+struct flush_tlb_info {
+ struct mm_struct *mm;
+ long unsigned int start;
+ long unsigned int end;
+ u64 new_tlb_gen;
+ unsigned int initiating_cpu;
+ u8 stride_shift;
+ u8 freed_tables;
+};
+
+struct semaphore_waiter {
+ struct list_head list;
+ struct task_struct *task;
+ bool up;
+};
+
+enum {
+ IRQS_AUTODETECT = 1,
+ IRQS_SPURIOUS_DISABLED = 2,
+ IRQS_POLL_INPROGRESS = 8,
+ IRQS_ONESHOT = 32,
+ IRQS_REPLAY = 64,
+ IRQS_WAITING = 128,
+ IRQS_PENDING = 512,
+ IRQS_SUSPENDED = 2048,
+ IRQS_TIMINGS = 4096,
+ IRQS_NMI = 8192,
+};
+
+enum {
+ _IRQ_DEFAULT_INIT_FLAGS = 0,
+ _IRQ_PER_CPU = 512,
+ _IRQ_LEVEL = 256,
+ _IRQ_NOPROBE = 1024,
+ _IRQ_NOREQUEST = 2048,
+ _IRQ_NOTHREAD = 65536,
+ _IRQ_NOAUTOEN = 4096,
+ _IRQ_MOVE_PCNTXT = 16384,
+ _IRQ_NO_BALANCING = 8192,
+ _IRQ_NESTED_THREAD = 32768,
+ _IRQ_PER_CPU_DEVID = 131072,
+ _IRQ_IS_POLLED = 262144,
+ _IRQ_DISABLE_UNLAZY = 524288,
+ _IRQ_HIDDEN = 1048576,
+ _IRQ_NO_DEBUG = 2097152,
+ _IRQF_MODIFY_MASK = 2096911,
+};
+
+struct io_tlb_area;
+
+struct io_tlb_slot;
+
+struct io_tlb_mem {
+ phys_addr_t start;
+ phys_addr_t end;
+ void *vaddr;
+ long unsigned int nslabs;
+ long unsigned int used;
+ struct dentry *debugfs;
+ bool late_alloc;
+ bool force_bounce;
+ bool for_alloc;
+ unsigned int nareas;
+ unsigned int area_nslabs;
+ struct io_tlb_area *areas;
+ struct io_tlb_slot *slots;
+};
+
+struct io_tlb_area {
+ long unsigned int used;
+ unsigned int index;
+ spinlock_t lock;
+};
+
+struct io_tlb_slot {
+ phys_addr_t orig_addr;
+ size_t alloc_size;
+ unsigned int list;
+};
+
+struct trace_event_raw_swiotlb_bounced {
+ struct trace_entry ent;
+ u32 __data_loc_dev_name;
+ u64 dma_mask;
+ dma_addr_t dev_addr;
+ size_t size;
+ bool force;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_swiotlb_bounced {
+ u32 dev_name;
+};
+
+typedef void (*btf_trace_swiotlb_bounced)(void *, struct device *, dma_addr_t, size_t);
+
+struct bpf_dummy_ops {
+ int (*test_1)(struct bpf_dummy_ops_state *);
+ int (*test_2)(struct bpf_dummy_ops_state *, int, short unsigned int, char, long unsigned int);
+};
+
+enum bpf_struct_ops_state {
+ BPF_STRUCT_OPS_STATE_INIT = 0,
+ BPF_STRUCT_OPS_STATE_INUSE = 1,
+ BPF_STRUCT_OPS_STATE_TOBEFREE = 2,
+};
+
+struct bpf_struct_ops_value {
+ refcount_t refcnt;
+ enum bpf_struct_ops_state state;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ char data[0];
+};
+
+struct bpf_struct_ops_map {
+ struct bpf_map map;
+ struct callback_head rcu;
+ const struct bpf_struct_ops *st_ops;
+ struct mutex lock;
+ struct bpf_link **links;
+ void *image;
+ struct bpf_struct_ops_value *uvalue;
+ struct bpf_struct_ops_value kvalue;
+};
+
+struct bpf_struct_ops_bpf_dummy_ops {
+ refcount_t refcnt;
+ enum bpf_struct_ops_state state;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct bpf_dummy_ops data;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct bpf_struct_ops_tcp_congestion_ops {
+ refcount_t refcnt;
+ enum bpf_struct_ops_state state;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct tcp_congestion_ops data;
+};
+
+enum {
+ BPF_STRUCT_OPS_TYPE_bpf_dummy_ops = 0,
+ BPF_STRUCT_OPS_TYPE_tcp_congestion_ops = 1,
+ __NR_BPF_STRUCT_OPS_TYPE = 2,
+};
+
+enum {
+ attr_noop = 0,
+ attr_delayed_allocation_blocks = 1,
+ attr_session_write_kbytes = 2,
+ attr_lifetime_write_kbytes = 3,
+ attr_reserved_clusters = 4,
+ attr_sra_exceeded_retry_limit = 5,
+ attr_inode_readahead = 6,
+ attr_trigger_test_error = 7,
+ attr_first_error_time = 8,
+ attr_last_error_time = 9,
+ attr_feature = 10,
+ attr_pointer_ui = 11,
+ attr_pointer_ul = 12,
+ attr_pointer_u64 = 13,
+ attr_pointer_u8 = 14,
+ attr_pointer_string = 15,
+ attr_pointer_atomic = 16,
+ attr_journal_task = 17,
+};
+
+enum {
+ ptr_explicit = 0,
+ ptr_ext4_sb_info_offset = 1,
+ ptr_ext4_super_block_offset = 2,
+};
+
+struct ext4_attr {
+ struct attribute attr;
+ short int attr_id;
+ short int attr_ptr;
+ short unsigned int attr_size;
+ union {
+ int offset;
+ void *explicit_ptr;
+ } u;
+};
+
+struct crypto_report_akcipher {
+ char type[64];
+};
+
+struct akcipher_instance {
+ void (*free)(struct akcipher_instance *);
+ union {
+ struct {
+ char head[80];
+ struct crypto_instance base;
+ } s;
+ struct akcipher_alg alg;
+ };
+};
+
+struct crypto_akcipher_spawn {
+ struct crypto_spawn base;
+};
+
+struct chksum_desc_ctx {
+ __u16 crc;
+};
+
+struct execute_work {
+ struct work_struct work;
+};
+
+struct timer_rand_state {
+ long unsigned int last_time;
+ long int last_delta;
+ long int last_delta2;
+};
+
+enum chacha_constants {
+ CHACHA_CONSTANT_EXPA = 1634760805,
+ CHACHA_CONSTANT_ND_3 = 857760878,
+ CHACHA_CONSTANT_2_BY = 2036477234,
+ CHACHA_CONSTANT_TE_K = 1797285236,
+};
+
+enum blake2s_lengths {
+ BLAKE2S_BLOCK_SIZE = 64,
+ BLAKE2S_HASH_SIZE = 32,
+ BLAKE2S_KEY_SIZE = 32,
+ BLAKE2S_128_HASH_SIZE = 16,
+ BLAKE2S_160_HASH_SIZE = 20,
+ BLAKE2S_224_HASH_SIZE = 28,
+ BLAKE2S_256_HASH_SIZE = 32,
+};
+
+struct blake2s_state {
+ u32 h[8];
+ u32 t[2];
+ u32 f[2];
+ u8 buf[64];
+ unsigned int buflen;
+ unsigned int outlen;
+};
+
+enum blake2s_iv {
+ BLAKE2S_IV0 = 1779033703,
+ BLAKE2S_IV1 = 3144134277,
+ BLAKE2S_IV2 = 1013904242,
+ BLAKE2S_IV3 = 2773480762,
+ BLAKE2S_IV4 = 1359893119,
+ BLAKE2S_IV5 = 2600822924,
+ BLAKE2S_IV6 = 528734635,
+ BLAKE2S_IV7 = 1541459225,
+};
+
+enum {
+ CRNG_EMPTY = 0,
+ CRNG_EARLY = 1,
+ CRNG_READY = 2,
+};
+
+enum {
+ CRNG_RESEED_START_INTERVAL = 1000,
+ CRNG_RESEED_INTERVAL = 60000,
+};
+
+struct crng {
+ u8 key[32];
+ long unsigned int generation;
+ local_lock_t lock;
+};
+
+struct batch_u8 {
+ u8 entropy[96];
+ local_lock_t lock;
+ long unsigned int generation;
+ unsigned int position;
+};
+
+struct batch_u16 {
+ u16 entropy[48];
+ local_lock_t lock;
+ long unsigned int generation;
+ unsigned int position;
+};
+
+struct batch_u32 {
+ u32 entropy[24];
+ local_lock_t lock;
+ long unsigned int generation;
+ unsigned int position;
+};
+
+struct batch_u64 {
+ u64 entropy[12];
+ local_lock_t lock;
+ long unsigned int generation;
+ unsigned int position;
+};
+
+enum {
+ POOL_BITS = 256,
+ POOL_READY_BITS = 256,
+ POOL_EARLY_BITS = 128,
+};
+
+struct fast_pool {
+ long unsigned int pool[4];
+ long unsigned int last;
+ unsigned int count;
+ struct timer_list mix;
+};
+
+struct entropy_timer_state {
+ long unsigned int entropy;
+ struct timer_list timer;
+ unsigned int samples;
+ unsigned int samples_per_bit;
+};
+
+enum {
+ NUM_TRIAL_SAMPLES = 8192,
+ MAX_SAMPLES_PER_BIT = 66,
+};
+
+enum {
+ MIX_INFLIGHT = 2147483648,
+};
+
+struct ptp_clock_caps {
+ int max_adj;
+ int n_alarm;
+ int n_ext_ts;
+ int n_per_out;
+ int pps;
+ int n_pins;
+ int cross_timestamping;
+ int adjust_phase;
+ int rsv[12];
+};
+
+struct ptp_sys_offset {
+ unsigned int n_samples;
+ unsigned int rsv[3];
+ struct ptp_clock_time ts[51];
+};
+
+struct ptp_sys_offset_extended {
+ unsigned int n_samples;
+ unsigned int rsv[3];
+ struct ptp_clock_time ts[75];
+};
+
+struct ptp_sys_offset_precise {
+ struct ptp_clock_time device;
+ struct ptp_clock_time sys_realtime;
+ struct ptp_clock_time sys_monoraw;
+ unsigned int rsv[4];
+};
+
+struct dst_cache_pcpu {
+ long unsigned int refresh_ts;
+ struct dst_entry *dst;
+ u32 cookie;
+ union {
+ struct in_addr in_saddr;
+ struct in6_addr in6_saddr;
+ };
+};
+
+struct nf_ct_hook {
+ int (*update)(struct net *, struct sk_buff *);
+ void (*destroy)(struct nf_conntrack *);
+ bool (*get_tuple_skb)(struct nf_conntrack_tuple *, const struct sk_buff *);
+ void (*attach)(struct sk_buff *, const struct sk_buff *);
+};
+
+struct nf_ct_iter_data {
+ struct net *net;
+ void *data;
+ u32 portid;
+ int report;
+};
+
+enum nf_ct_helper_flags {
+ NF_CT_HELPER_F_USERSPACE = 1,
+ NF_CT_HELPER_F_CONFIGURED = 2,
+};
+
+enum nf_ct_ecache_state {
+ NFCT_ECACHE_DESTROY_FAIL = 0,
+ NFCT_ECACHE_DESTROY_SENT = 1,
+};
+
+struct nf_conn_counter {
+ atomic64_t packets;
+ atomic64_t bytes;
+};
+
+struct nf_conn_acct {
+ struct nf_conn_counter counter[2];
+};
+
+struct nf_conn_tstamp {
+ u_int64_t start;
+ u_int64_t stop;
+};
+
+struct nf_ct_timeout {
+ __u16 l3num;
+ const struct nf_conntrack_l4proto *l4proto;
+ char data[0];
+};
+
+struct nf_conn_timeout {
+ struct nf_ct_timeout *timeout;
+};
+
+struct nf_conn_labels {
+ long unsigned int bits[2];
+};
+
+struct nf_conn_synproxy {
+ u32 isn;
+ u32 its;
+ u32 tsoff;
+};
+
+struct conntrack_gc_work {
+ struct delayed_work dwork;
+ u32 next_bucket;
+ u32 avg_timeout;
+ u32 count;
+ u32 start_time;
+ bool exiting;
+ bool early_drop;
+};
+
+enum ip6_defrag_users {
+ IP6_DEFRAG_LOCAL_DELIVER = 0,
+ IP6_DEFRAG_CONNTRACK_IN = 1,
+ __IP6_DEFRAG_CONNTRACK_IN = 65536,
+ IP6_DEFRAG_CONNTRACK_OUT = 65537,
+ __IP6_DEFRAG_CONNTRACK_OUT = 131072,
+ IP6_DEFRAG_CONNTRACK_BRIDGE_IN = 131073,
+ __IP6_DEFRAG_CONNTRACK_BRIDGE_IN = 196608,
+};
+
+enum nf_ip6_hook_priorities {
+ NF_IP6_PRI_FIRST = -2147483648,
+ NF_IP6_PRI_RAW_BEFORE_DEFRAG = -450,
+ NF_IP6_PRI_CONNTRACK_DEFRAG = -400,
+ NF_IP6_PRI_RAW = -300,
+ NF_IP6_PRI_SELINUX_FIRST = -225,
+ NF_IP6_PRI_CONNTRACK = -200,
+ NF_IP6_PRI_MANGLE = -150,
+ NF_IP6_PRI_NAT_DST = -100,
+ NF_IP6_PRI_FILTER = 0,
+ NF_IP6_PRI_SECURITY = 50,
+ NF_IP6_PRI_NAT_SRC = 100,
+ NF_IP6_PRI_SELINUX_LAST = 225,
+ NF_IP6_PRI_CONNTRACK_HELPER = 300,
+ NF_IP6_PRI_LAST = 2147483647,
+};
+
+struct linger {
+ int l_onoff;
+ int l_linger;
+};
+
+struct so_timestamping {
+ int flags;
+ int bind_phc;
+};
+
+struct tcp_info {
+ __u8 tcpi_state;
+ __u8 tcpi_ca_state;
+ __u8 tcpi_retransmits;
+ __u8 tcpi_probes;
+ __u8 tcpi_backoff;
+ __u8 tcpi_options;
+ __u8 tcpi_snd_wscale: 4;
+ __u8 tcpi_rcv_wscale: 4;
+ __u8 tcpi_delivery_rate_app_limited: 1;
+ __u8 tcpi_fastopen_client_fail: 2;
+ __u32 tcpi_rto;
+ __u32 tcpi_ato;
+ __u32 tcpi_snd_mss;
+ __u32 tcpi_rcv_mss;
+ __u32 tcpi_unacked;
+ __u32 tcpi_sacked;
+ __u32 tcpi_lost;
+ __u32 tcpi_retrans;
+ __u32 tcpi_fackets;
+ __u32 tcpi_last_data_sent;
+ __u32 tcpi_last_ack_sent;
+ __u32 tcpi_last_data_recv;
+ __u32 tcpi_last_ack_recv;
+ __u32 tcpi_pmtu;
+ __u32 tcpi_rcv_ssthresh;
+ __u32 tcpi_rtt;
+ __u32 tcpi_rttvar;
+ __u32 tcpi_snd_ssthresh;
+ __u32 tcpi_snd_cwnd;
+ __u32 tcpi_advmss;
+ __u32 tcpi_reordering;
+ __u32 tcpi_rcv_rtt;
+ __u32 tcpi_rcv_space;
+ __u32 tcpi_total_retrans;
+ __u64 tcpi_pacing_rate;
+ __u64 tcpi_max_pacing_rate;
+ __u64 tcpi_bytes_acked;
+ __u64 tcpi_bytes_received;
+ __u32 tcpi_segs_out;
+ __u32 tcpi_segs_in;
+ __u32 tcpi_notsent_bytes;
+ __u32 tcpi_min_rtt;
+ __u32 tcpi_data_segs_in;
+ __u32 tcpi_data_segs_out;
+ __u64 tcpi_delivery_rate;
+ __u64 tcpi_busy_time;
+ __u64 tcpi_rwnd_limited;
+ __u64 tcpi_sndbuf_limited;
+ __u32 tcpi_delivered;
+ __u32 tcpi_delivered_ce;
+ __u64 tcpi_bytes_sent;
+ __u64 tcpi_bytes_retrans;
+ __u32 tcpi_dsack_dups;
+ __u32 tcpi_reord_seen;
+ __u32 tcpi_rcv_ooopack;
+ __u32 tcpi_snd_wnd;
+ __u32 tcpi_rcv_wnd;
+ __u32 tcpi_rehash;
+};
+
+struct mptcp_info {
+ __u8 mptcpi_subflows;
+ __u8 mptcpi_add_addr_signal;
+ __u8 mptcpi_add_addr_accepted;
+ __u8 mptcpi_subflows_max;
+ __u8 mptcpi_add_addr_signal_max;
+ __u8 mptcpi_add_addr_accepted_max;
+ __u32 mptcpi_flags;
+ __u32 mptcpi_token;
+ __u64 mptcpi_write_seq;
+ __u64 mptcpi_snd_una;
+ __u64 mptcpi_rcv_nxt;
+ __u8 mptcpi_local_addr_used;
+ __u8 mptcpi_local_addr_max;
+ __u8 mptcpi_csum_enabled;
+};
+
+struct mptcp_subflow_data {
+ __u32 size_subflow_data;
+ __u32 num_subflows;
+ __u32 size_kernel;
+ __u32 size_user;
+};
+
+struct mptcp_subflow_addrs {
+ union {
+ __kernel_sa_family_t sa_family;
+ struct sockaddr sa_local;
+ struct sockaddr_in sin_local;
+ struct sockaddr_in6 sin6_local;
+ struct __kernel_sockaddr_storage ss_local;
+ };
+ union {
+ struct sockaddr sa_remote;
+ struct sockaddr_in sin_remote;
+ struct sockaddr_in6 sin6_remote;
+ struct __kernel_sockaddr_storage ss_remote;
+ };
+};
+
+struct lbr_entry {
+ u64 from;
+ u64 to;
+ u64 info;
+};
+
+struct pebs_basic {
+ u64 format_size;
+ u64 ip;
+ u64 applicable_counters;
+ u64 tsc;
+};
+
+struct pebs_meminfo {
+ u64 address;
+ u64 aux;
+ u64 latency;
+ u64 tsx_tuning;
+};
+
+struct pebs_gprs {
+ u64 flags;
+ u64 ip;
+ u64 ax;
+ u64 cx;
+ u64 dx;
+ u64 bx;
+ u64 sp;
+ u64 bp;
+ u64 si;
+ u64 di;
+ u64 r8;
+ u64 r9;
+ u64 r10;
+ u64 r11;
+ u64 r12;
+ u64 r13;
+ u64 r14;
+ u64 r15;
+};
+
+struct pebs_xmm {
+ u64 xmm[32];
+};
+
+struct x86_perf_regs {
+ struct pt_regs regs;
+ u64 *xmm_regs;
+};
+
+enum {
+ PERF_TXN_ELISION = 1ULL,
+ PERF_TXN_TRANSACTION = 2ULL,
+ PERF_TXN_SYNC = 4ULL,
+ PERF_TXN_ASYNC = 8ULL,
+ PERF_TXN_RETRY = 16ULL,
+ PERF_TXN_CONFLICT = 32ULL,
+ PERF_TXN_CAPACITY_WRITE = 64ULL,
+ PERF_TXN_CAPACITY_READ = 128ULL,
+ PERF_TXN_MAX = 256ULL,
+ PERF_TXN_ABORT_MASK = 18446744069414584320ULL,
+ PERF_TXN_ABORT_SHIFT = 32ULL,
+};
+
+union intel_x86_pebs_dse {
+ u64 val;
+ struct {
+ unsigned int ld_dse: 4;
+ unsigned int ld_stlb_miss: 1;
+ unsigned int ld_locked: 1;
+ unsigned int ld_data_blk: 1;
+ unsigned int ld_addr_blk: 1;
+ unsigned int ld_reserved: 24;
+ };
+ struct {
+ unsigned int st_l1d_hit: 1;
+ unsigned int st_reserved1: 3;
+ unsigned int st_stlb_miss: 1;
+ unsigned int st_locked: 1;
+ unsigned int st_reserved2: 26;
+ };
+ struct {
+ unsigned int st_lat_dse: 4;
+ unsigned int st_lat_stlb_miss: 1;
+ unsigned int st_lat_locked: 1;
+ unsigned int ld_reserved3: 26;
+ };
+};
+
+struct pebs_record_core {
+ u64 flags;
+ u64 ip;
+ u64 ax;
+ u64 bx;
+ u64 cx;
+ u64 dx;
+ u64 si;
+ u64 di;
+ u64 bp;
+ u64 sp;
+ u64 r8;
+ u64 r9;
+ u64 r10;
+ u64 r11;
+ u64 r12;
+ u64 r13;
+ u64 r14;
+ u64 r15;
+};
+
+struct pebs_record_nhm {
+ u64 flags;
+ u64 ip;
+ u64 ax;
+ u64 bx;
+ u64 cx;
+ u64 dx;
+ u64 si;
+ u64 di;
+ u64 bp;
+ u64 sp;
+ u64 r8;
+ u64 r9;
+ u64 r10;
+ u64 r11;
+ u64 r12;
+ u64 r13;
+ u64 r14;
+ u64 r15;
+ u64 status;
+ u64 dla;
+ u64 dse;
+ u64 lat;
+};
+
+union hsw_tsx_tuning {
+ struct {
+ u32 cycles_last_block: 32;
+ u32 hle_abort: 1;
+ u32 rtm_abort: 1;
+ u32 instruction_abort: 1;
+ u32 non_instruction_abort: 1;
+ u32 retry: 1;
+ u32 data_conflict: 1;
+ u32 capacity_writes: 1;
+ u32 capacity_reads: 1;
+ };
+ u64 value;
+};
+
+struct pebs_record_skl {
+ u64 flags;
+ u64 ip;
+ u64 ax;
+ u64 bx;
+ u64 cx;
+ u64 dx;
+ u64 si;
+ u64 di;
+ u64 bp;
+ u64 sp;
+ u64 r8;
+ u64 r9;
+ u64 r10;
+ u64 r11;
+ u64 r12;
+ u64 r13;
+ u64 r14;
+ u64 r15;
+ u64 status;
+ u64 dla;
+ u64 dse;
+ u64 lat;
+ u64 real_ip;
+ u64 tsx_tuning;
+ u64 tsc;
+};
+
+struct bts_record {
+ u64 from;
+ u64 to;
+ u64 flags;
+};
+
+struct numa_memblk {
+ u64 start;
+ u64 end;
+ int nid;
+};
+
+struct numa_meminfo {
+ int nr_blks;
+ struct numa_memblk blk[128];
+};
+
+struct dma_sgt_handle {
+ struct sg_table sgt;
+ struct page **pages;
+};
+
+struct dma_devres {
+ size_t size;
+ void *vaddr;
+ dma_addr_t dma_handle;
+ long unsigned int attrs;
+};
+
+enum tick_broadcast_state {
+ TICK_BROADCAST_EXIT = 0,
+ TICK_BROADCAST_ENTER = 1,
+};
+
+struct trace_event_raw_preemptirq_template {
+ struct trace_entry ent;
+ s32 caller_offs;
+ s32 parent_offs;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_preemptirq_template {};
+
+typedef void (*btf_trace_irq_disable)(void *, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_irq_enable)(void *, long unsigned int, long unsigned int);
+
+struct bpf_mem_caches;
+
+struct bpf_mem_cache;
+
+struct bpf_mem_alloc {
+ struct bpf_mem_caches *caches;
+ struct bpf_mem_cache *cache;
+ struct work_struct work;
+};
+
+struct bpf_iter__bpf_map_elem {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct bpf_map *map;
+ };
+ union {
+ void *key;
+ };
+ union {
+ void *value;
+ };
+};
+
+struct pcpu_freelist_node;
+
+struct pcpu_freelist_head {
+ struct pcpu_freelist_node *first;
+ raw_spinlock_t lock;
+};
+
+struct pcpu_freelist_node {
+ struct pcpu_freelist_node *next;
+};
+
+struct pcpu_freelist {
+ struct pcpu_freelist_head *freelist;
+ struct pcpu_freelist_head extralist;
+};
+
+struct bpf_lru_node {
+ struct list_head list;
+ u16 cpu;
+ u8 type;
+ u8 ref;
+};
+
+struct bpf_lru_list {
+ struct list_head lists[3];
+ unsigned int counts[2];
+ struct list_head *next_inactive_rotation;
+ raw_spinlock_t lock;
+};
+
+struct bpf_lru_locallist {
+ struct list_head lists[2];
+ u16 next_steal;
+ raw_spinlock_t lock;
+};
+
+struct bpf_common_lru {
+ struct bpf_lru_list lru_list;
+ struct bpf_lru_locallist *local_list;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+typedef bool (*del_from_htab_func)(void *, struct bpf_lru_node *);
+
+struct bpf_lru {
+ union {
+ struct bpf_common_lru common_lru;
+ struct bpf_lru_list *percpu_lru;
+ };
+ del_from_htab_func del_from_htab;
+ void *del_arg;
+ unsigned int hash_offset;
+ unsigned int nr_scans;
+ bool percpu;
+ long: 56;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct bucket {
+ struct hlist_nulls_head head;
+ raw_spinlock_t raw_lock;
+};
+
+struct htab_elem;
+
+struct bpf_htab {
+ struct bpf_map map;
+ struct bpf_mem_alloc ma;
+ struct bpf_mem_alloc pcpu_ma;
+ struct bucket *buckets;
+ void *elems;
+ union {
+ struct pcpu_freelist freelist;
+ struct bpf_lru lru;
+ };
+ struct htab_elem **extra_elems;
+ struct percpu_counter pcount;
+ atomic_t count;
+ bool use_percpu_counter;
+ u32 n_buckets;
+ u32 elem_size;
+ u32 hashrnd;
+ struct lock_class_key lockdep_key;
+ int *map_locked[8];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct htab_elem {
+ union {
+ struct hlist_nulls_node hash_node;
+ struct {
+ void *padding;
+ union {
+ struct pcpu_freelist_node fnode;
+ struct htab_elem *batch_flink;
+ };
+ };
+ };
+ union {
+ void *ptr_to_pptr;
+ struct bpf_lru_node lru_node;
+ };
+ u32 hash;
+ int: 32;
+ char key[0];
+};
+
+struct bpf_iter_seq_hash_map_info {
+ struct bpf_map *map;
+ struct bpf_htab *htab;
+ void *percpu_value_buf;
+ u32 bucket_id;
+ u32 skip_elems;
+};
+
+struct migrate_struct {
+ ext4_lblk_t first_block;
+ ext4_lblk_t last_block;
+ ext4_lblk_t curr_block;
+ ext4_fsblk_t first_pblock;
+ ext4_fsblk_t last_pblock;
+};
+
+typedef u32 acpi_event_status;
+
+typedef acpi_status (*acpi_object_converter)(struct acpi_namespace_node *, union acpi_operand_object *, union acpi_operand_object **);
+
+struct acpi_simple_repair_info {
+ char name[4];
+ u32 unexpected_btypes;
+ u32 package_index;
+ acpi_object_converter object_converter;
+};
+
+struct vt_notifier_param {
+ struct vc_data *vc;
+ unsigned int c;
+};
+
+struct vcs_poll_data {
+ struct notifier_block notifier;
+ unsigned int cons_num;
+ int event;
+ wait_queue_head_t waitq;
+ struct fasync_struct *fasync;
+};
+
+struct input_mask {
+ __u32 type;
+ __u32 codes_size;
+ __u64 codes_ptr;
+};
+
+struct evdev_client;
+
+struct evdev {
+ int open;
+ struct input_handle handle;
+ struct evdev_client *grab;
+ struct list_head client_list;
+ spinlock_t client_lock;
+ struct mutex mutex;
+ struct device dev;
+ struct cdev cdev;
+ bool exist;
+};
+
+struct evdev_client {
+ unsigned int head;
+ unsigned int tail;
+ unsigned int packet_head;
+ spinlock_t buffer_lock;
+ wait_queue_head_t wait;
+ struct fasync_struct *fasync;
+ struct evdev *evdev;
+ struct list_head node;
+ enum input_clock_type clk_type;
+ bool revoked;
+ long unsigned int *evmasks[32];
+ unsigned int bufsize;
+ struct input_event buffer[0];
+};
+
+struct cpu_dbs_info {
+ u64 prev_cpu_idle;
+ u64 prev_update_time;
+ u64 prev_cpu_nice;
+ unsigned int prev_load;
+ struct update_util_data update_util;
+ struct policy_dbs_info *policy_dbs;
+};
+
+struct usage_priority {
+ __u32 usage;
+ bool global;
+ unsigned int slot_overwrite;
+};
+
+typedef bool (*hid_usage_cmp_t)(struct hid_usage *, unsigned int, unsigned int);
+
+enum netdev_lag_tx_type {
+ NETDEV_LAG_TX_TYPE_UNKNOWN = 0,
+ NETDEV_LAG_TX_TYPE_RANDOM = 1,
+ NETDEV_LAG_TX_TYPE_BROADCAST = 2,
+ NETDEV_LAG_TX_TYPE_ROUNDROBIN = 3,
+ NETDEV_LAG_TX_TYPE_ACTIVEBACKUP = 4,
+ NETDEV_LAG_TX_TYPE_HASH = 5,
+};
+
+enum netdev_lag_hash {
+ NETDEV_LAG_HASH_NONE = 0,
+ NETDEV_LAG_HASH_L2 = 1,
+ NETDEV_LAG_HASH_L34 = 2,
+ NETDEV_LAG_HASH_L23 = 3,
+ NETDEV_LAG_HASH_E23 = 4,
+ NETDEV_LAG_HASH_E34 = 5,
+ NETDEV_LAG_HASH_VLAN_SRCMAC = 6,
+ NETDEV_LAG_HASH_UNKNOWN = 7,
+};
+
+struct netdev_lag_upper_info {
+ enum netdev_lag_tx_type tx_type;
+ enum netdev_lag_hash hash_type;
+};
+
+struct ip_rt_info {
+ __be32 daddr;
+ __be32 saddr;
+ u_int8_t tos;
+ u_int32_t mark;
+};
+
+struct nf_queue_handler {
+ int (*outfn)(struct nf_queue_entry *, unsigned int);
+ void (*nf_hook_drop)(struct net *);
+};
+
+struct icmp6_filter {
+ __u32 data[8];
+};
+
+struct raw6_sock {
+ struct inet_sock inet;
+ __u32 checksum;
+ __u32 offset;
+ struct icmp6_filter filter;
+ __u32 ip6mr_table;
+ struct ipv6_pinfo inet6;
+};
+
+typedef int mh_filter_t(struct sock *, struct sk_buff *);
+
+struct raw6_frag_vec {
+ struct msghdr *msg;
+ int hlen;
+ char c[4];
+};
+
+enum {
+ MPTCP_PM_ADDR_ATTR_UNSPEC = 0,
+ MPTCP_PM_ADDR_ATTR_FAMILY = 1,
+ MPTCP_PM_ADDR_ATTR_ID = 2,
+ MPTCP_PM_ADDR_ATTR_ADDR4 = 3,
+ MPTCP_PM_ADDR_ATTR_ADDR6 = 4,
+ MPTCP_PM_ADDR_ATTR_PORT = 5,
+ MPTCP_PM_ADDR_ATTR_FLAGS = 6,
+ MPTCP_PM_ADDR_ATTR_IF_IDX = 7,
+ __MPTCP_PM_ADDR_ATTR_MAX = 8,
+};
+
+enum {
+ MPTCP_PM_CMD_UNSPEC = 0,
+ MPTCP_PM_CMD_ADD_ADDR = 1,
+ MPTCP_PM_CMD_DEL_ADDR = 2,
+ MPTCP_PM_CMD_GET_ADDR = 3,
+ MPTCP_PM_CMD_FLUSH_ADDRS = 4,
+ MPTCP_PM_CMD_SET_LIMITS = 5,
+ MPTCP_PM_CMD_GET_LIMITS = 6,
+ MPTCP_PM_CMD_SET_FLAGS = 7,
+ MPTCP_PM_CMD_ANNOUNCE = 8,
+ MPTCP_PM_CMD_REMOVE = 9,
+ MPTCP_PM_CMD_SUBFLOW_CREATE = 10,
+ MPTCP_PM_CMD_SUBFLOW_DESTROY = 11,
+ __MPTCP_PM_CMD_AFTER_LAST = 12,
+};
+
+enum mptcp_event_type {
+ MPTCP_EVENT_UNSPEC = 0,
+ MPTCP_EVENT_CREATED = 1,
+ MPTCP_EVENT_ESTABLISHED = 2,
+ MPTCP_EVENT_CLOSED = 3,
+ MPTCP_EVENT_ANNOUNCED = 6,
+ MPTCP_EVENT_REMOVED = 7,
+ MPTCP_EVENT_SUB_ESTABLISHED = 10,
+ MPTCP_EVENT_SUB_CLOSED = 11,
+ MPTCP_EVENT_SUB_PRIORITY = 13,
+};
+
+enum mptcp_event_attr {
+ MPTCP_ATTR_UNSPEC = 0,
+ MPTCP_ATTR_TOKEN = 1,
+ MPTCP_ATTR_FAMILY = 2,
+ MPTCP_ATTR_LOC_ID = 3,
+ MPTCP_ATTR_REM_ID = 4,
+ MPTCP_ATTR_SADDR4 = 5,
+ MPTCP_ATTR_SADDR6 = 6,
+ MPTCP_ATTR_DADDR4 = 7,
+ MPTCP_ATTR_DADDR6 = 8,
+ MPTCP_ATTR_SPORT = 9,
+ MPTCP_ATTR_DPORT = 10,
+ MPTCP_ATTR_BACKUP = 11,
+ MPTCP_ATTR_ERROR = 12,
+ MPTCP_ATTR_FLAGS = 13,
+ MPTCP_ATTR_TIMEOUT = 14,
+ MPTCP_ATTR_IF_IDX = 15,
+ MPTCP_ATTR_RESET_REASON = 16,
+ MPTCP_ATTR_RESET_FLAGS = 17,
+ MPTCP_ATTR_SERVER_SIDE = 18,
+ __MPTCP_ATTR_AFTER_LAST = 19,
+};
+
+enum mptcp_pm_status {
+ MPTCP_PM_ADD_ADDR_RECEIVED = 0,
+ MPTCP_PM_ADD_ADDR_SEND_ACK = 1,
+ MPTCP_PM_RM_ADDR_RECEIVED = 2,
+ MPTCP_PM_ESTABLISHED = 3,
+ MPTCP_PM_SUBFLOW_ESTABLISHED = 4,
+ MPTCP_PM_ALREADY_ESTABLISHED = 5,
+ MPTCP_PM_MPC_ENDPOINT_ACCOUNTED = 6,
+};
+
+enum mptcp_addr_signal_status {
+ MPTCP_ADD_ADDR_SIGNAL = 0,
+ MPTCP_ADD_ADDR_ECHO = 1,
+ MPTCP_RM_ADDR_SIGNAL = 2,
+};
+
+struct mptcp_pm_add_entry {
+ struct list_head list;
+ struct mptcp_addr_info addr;
+ struct timer_list add_timer;
+ struct mptcp_sock *sock;
+ u8 retrans_times;
+};
+
+struct pm_nl_pernet {
+ spinlock_t lock;
+ struct list_head local_addr_list;
+ unsigned int addrs;
+ unsigned int stale_loss_cnt;
+ unsigned int add_addr_signal_max;
+ unsigned int add_addr_accept_max;
+ unsigned int local_addr_max;
+ unsigned int subflows_max;
+ unsigned int next_id;
+ long unsigned int id_bitmap[4];
+};
+
+struct fixed_range_block {
+ int base_msr;
+ int ranges;
+};
+
+enum apic_intr_mode_id {
+ APIC_PIC = 0,
+ APIC_VIRTUAL_WIRE = 1,
+ APIC_VIRTUAL_WIRE_NO_CONFIG = 2,
+ APIC_SYMMETRIC_IO = 3,
+ APIC_SYMMETRIC_IO_NO_ROUTING = 4,
+};
+
+typedef int (*wakeup_cpu_handler)(int, long unsigned int);
+
+union apic_ir {
+ long unsigned int map[4];
+ u32 regs[8];
+};
+
+struct rchan_percpu_buf_dispatcher {
+ struct rchan_buf *buf;
+ struct dentry *dentry;
+};
+
+struct trace_event_raw_rpm_internal {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ int flags;
+ int usage_count;
+ int disable_depth;
+ int runtime_auto;
+ int request_pending;
+ int irq_safe;
+ int child_count;
+ char __data[0];
+};
+
+struct trace_event_raw_rpm_return_int {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ long unsigned int ip;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_rpm_internal {
+ u32 name;
+};
+
+struct trace_event_data_offsets_rpm_return_int {
+ u32 name;
+};
+
+typedef void (*btf_trace_rpm_suspend)(void *, struct device *, int);
+
+typedef void (*btf_trace_rpm_resume)(void *, struct device *, int);
+
+typedef void (*btf_trace_rpm_idle)(void *, struct device *, int);
+
+typedef void (*btf_trace_rpm_usage)(void *, struct device *, int);
+
+typedef void (*btf_trace_rpm_return_int)(void *, struct device *, long unsigned int, int);
+
+struct bpf_queue_stack {
+ struct bpf_map map;
+ raw_spinlock_t lock;
+ u32 head;
+ u32 tail;
+ u32 size;
+ int: 32;
+ char elements[0];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+enum ctx_state {
+ CONTEXT_DISABLED = -1,
+ CONTEXT_KERNEL = 0,
+ CONTEXT_IDLE = 1,
+ CONTEXT_USER = 2,
+ CONTEXT_GUEST = 3,
+ CONTEXT_MAX = 4,
+};
+
+struct context_tracking {
+ atomic_t state;
+ long int dynticks_nesting;
+ long int dynticks_nmi_nesting;
+};
+
+enum mf_flags {
+ MF_COUNT_INCREASED = 1,
+ MF_ACTION_REQUIRED = 2,
+ MF_MUST_KILL = 4,
+ MF_SOFT_OFFLINE = 8,
+ MF_UNPOISON = 16,
+ MF_SW_SIMULATED = 32,
+ MF_NO_RETRY = 64,
+};
+
+typedef long unsigned int dax_entry_t;
+
+struct to_kill {
+ struct list_head nd;
+ struct task_struct *tsk;
+ long unsigned int addr;
+ short int size_shift;
+};
+
+struct hwp_walk {
+ struct to_kill tk;
+ long unsigned int pfn;
+ int flags;
+};
+
+struct page_state {
+ long unsigned int mask;
+ long unsigned int res;
+ enum mf_action_page_type type;
+ int (*action)(struct page_state *, struct page *);
+};
+
+struct raw_hwp_page {
+ struct llist_node node;
+ struct page *page;
+};
+
+struct memory_failure_entry {
+ long unsigned int pfn;
+ int flags;
+};
+
+struct memory_failure_cpu {
+ struct {
+ union {
+ struct __kfifo kfifo;
+ struct memory_failure_entry *type;
+ const struct memory_failure_entry *const_type;
+ char (*rectype)[0];
+ struct memory_failure_entry *ptr;
+ const struct memory_failure_entry *ptr_const;
+ };
+ struct memory_failure_entry buf[16];
+ } fifo;
+ spinlock_t lock;
+ struct work_struct work;
+};
+
+struct ima_h_table {
+ atomic_long_t len;
+ atomic_long_t violations;
+ struct hlist_head queue[1024];
+};
+
+struct xxhash64_tfm_ctx {
+ u64 seed;
+};
+
+struct xxhash64_desc_ctx {
+ struct xxh64_state xxhstate;
+};
+
+enum asn1_class {
+ ASN1_UNIV = 0,
+ ASN1_APPL = 1,
+ ASN1_CONT = 2,
+ ASN1_PRIV = 3,
+};
+
+enum asn1_method {
+ ASN1_PRIM = 0,
+ ASN1_CONS = 1,
+};
+
+typedef int (*asn1_action_t)(void *, size_t, unsigned char, const void *, size_t);
+
+struct asn1_decoder {
+ const unsigned char *machine;
+ size_t machlen;
+ const asn1_action_t *actions;
+};
+
+enum asn1_opcode {
+ ASN1_OP_MATCH = 0,
+ ASN1_OP_MATCH_OR_SKIP = 1,
+ ASN1_OP_MATCH_ACT = 2,
+ ASN1_OP_MATCH_ACT_OR_SKIP = 3,
+ ASN1_OP_MATCH_JUMP = 4,
+ ASN1_OP_MATCH_JUMP_OR_SKIP = 5,
+ ASN1_OP_MATCH_ANY = 8,
+ ASN1_OP_MATCH_ANY_OR_SKIP = 9,
+ ASN1_OP_MATCH_ANY_ACT = 10,
+ ASN1_OP_MATCH_ANY_ACT_OR_SKIP = 11,
+ ASN1_OP_COND_MATCH_OR_SKIP = 17,
+ ASN1_OP_COND_MATCH_ACT_OR_SKIP = 19,
+ ASN1_OP_COND_MATCH_JUMP_OR_SKIP = 21,
+ ASN1_OP_COND_MATCH_ANY = 24,
+ ASN1_OP_COND_MATCH_ANY_OR_SKIP = 25,
+ ASN1_OP_COND_MATCH_ANY_ACT = 26,
+ ASN1_OP_COND_MATCH_ANY_ACT_OR_SKIP = 27,
+ ASN1_OP_COND_FAIL = 28,
+ ASN1_OP_COMPLETE = 29,
+ ASN1_OP_ACT = 30,
+ ASN1_OP_MAYBE_ACT = 31,
+ ASN1_OP_END_SEQ = 32,
+ ASN1_OP_END_SET = 33,
+ ASN1_OP_END_SEQ_OF = 34,
+ ASN1_OP_END_SET_OF = 35,
+ ASN1_OP_END_SEQ_ACT = 36,
+ ASN1_OP_END_SET_ACT = 37,
+ ASN1_OP_END_SEQ_OF_ACT = 38,
+ ASN1_OP_END_SET_OF_ACT = 39,
+ ASN1_OP_RETURN = 40,
+ ASN1_OP__NR = 41,
+};
+
+enum x509_actions {
+ ACT_x509_extract_key_data = 0,
+ ACT_x509_extract_name_segment = 1,
+ ACT_x509_note_OID = 2,
+ ACT_x509_note_issuer = 3,
+ ACT_x509_note_not_after = 4,
+ ACT_x509_note_not_before = 5,
+ ACT_x509_note_params = 6,
+ ACT_x509_note_serial = 7,
+ ACT_x509_note_sig_algo = 8,
+ ACT_x509_note_signature = 9,
+ ACT_x509_note_subject = 10,
+ ACT_x509_note_tbs_certificate = 11,
+ ACT_x509_process_extension = 12,
+ NR__x509_actions = 13,
+};
+
+enum x509_akid_actions {
+ ACT_x509_akid_note_kid = 0,
+ ACT_x509_akid_note_name = 1,
+ ACT_x509_akid_note_serial = 2,
+ ACT_x509_extract_name_segment___2 = 3,
+ ACT_x509_note_OID___2 = 4,
+ NR__x509_akid_actions = 5,
+};
+
+struct asn1_decoder;
+
+struct x509_parse_context {
+ struct x509_certificate *cert;
+ long unsigned int data;
+ const void *key;
+ size_t key_size;
+ const void *params;
+ size_t params_size;
+ enum OID key_algo;
+ enum OID last_oid;
+ enum OID sig_algo;
+ u8 o_size;
+ u8 cn_size;
+ u8 email_size;
+ u16 o_offset;
+ u16 cn_offset;
+ u16 email_offset;
+ unsigned int raw_akid_size;
+ const void *raw_akid;
+ const void *akid_raw_issuer;
+ unsigned int akid_raw_issuer_size;
+};
+
+enum {
+ DIO_SHOULD_DIRTY = 1,
+ DIO_IS_SYNC = 2,
+};
+
+struct blkdev_dio {
+ union {
+ struct kiocb *iocb;
+ struct task_struct *waiter;
+ };
+ size_t size;
+ atomic_t ref;
+ unsigned int flags;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct bio bio;
+ long: 64;
+ long: 64;
+};
+
+struct reciprocal_value_adv {
+ u32 m;
+ u8 sh;
+ u8 exp;
+ bool is_wide_m;
+};
+
+struct crypto_aes_ctx {
+ u32 key_enc[60];
+ u32 key_dec[60];
+ u32 key_length;
+};
+
+typedef enum {
+ CODES = 0,
+ LENS = 1,
+ DISTS = 2,
+} codetype;
+
+typedef struct {
+ const uint8_t *externalDict;
+ size_t extDictSize;
+ const uint8_t *prefixEnd;
+ size_t prefixSize;
+} LZ4_streamDecode_t_internal;
+
+typedef union {
+ long long unsigned int table[4];
+ LZ4_streamDecode_t_internal internal_donotuse;
+} LZ4_streamDecode_t;
+
+typedef uint8_t BYTE;
+
+typedef uint16_t U16;
+
+typedef uint32_t U32;
+
+typedef uint64_t U64;
+
+typedef uintptr_t uptrval;
+
+typedef enum {
+ noDict = 0,
+ withPrefix64k = 1,
+ usingExtDict = 2,
+} dict_directive;
+
+typedef enum {
+ endOnOutputSize = 0,
+ endOnInputSize = 1,
+} endCondition_directive;
+
+typedef enum {
+ decode_full_block = 0,
+ partial_decode = 1,
+} earlyEnd_directive;
+
+struct barrett_ctx_s;
+
+typedef struct barrett_ctx_s *mpi_barrett_t;
+
+struct barrett_ctx_s {
+ MPI m;
+ int m_copied;
+ int k;
+ MPI y;
+ MPI r1;
+ MPI r2;
+ MPI r3;
+};
+
+enum acpi_reconfig_event {
+ ACPI_RECONFIG_DEVICE_ADD = 0,
+ ACPI_RECONFIG_DEVICE_REMOVE = 1,
+};
+
+enum acpi_irq_model_id {
+ ACPI_IRQ_MODEL_PIC = 0,
+ ACPI_IRQ_MODEL_IOAPIC = 1,
+ ACPI_IRQ_MODEL_IOSAPIC = 2,
+ ACPI_IRQ_MODEL_PLATFORM = 3,
+ ACPI_IRQ_MODEL_GIC = 4,
+ ACPI_IRQ_MODEL_LPIC = 5,
+ ACPI_IRQ_MODEL_COUNT = 6,
+};
+
+struct hpet_info {
+ long unsigned int hi_ireqfreq;
+ long unsigned int hi_flags;
+ short unsigned int hi_hpet;
+ short unsigned int hi_timer;
+};
+
+struct hpet_timer {
+ u64 hpet_config;
+ union {
+ u64 _hpet_hc64;
+ u32 _hpet_hc32;
+ long unsigned int _hpet_compare;
+ } _u1;
+ u64 hpet_fsb[2];
+};
+
+struct hpet {
+ u64 hpet_cap;
+ u64 res0;
+ u64 hpet_config;
+ u64 res1;
+ u64 hpet_isr;
+ u64 res2[25];
+ union {
+ u64 _hpet_mc64;
+ u32 _hpet_mc32;
+ long unsigned int _hpet_mc;
+ } _u0;
+ u64 res3;
+ struct hpet_timer hpet_timers[1];
+};
+
+struct hpet_data {
+ long unsigned int hd_phys_address;
+ void *hd_address;
+ short unsigned int hd_nirqs;
+ unsigned int hd_state;
+ unsigned int hd_irq[32];
+};
+
+struct hpets;
+
+struct hpet_dev {
+ struct hpets *hd_hpets;
+ struct hpet *hd_hpet;
+ struct hpet_timer *hd_timer;
+ long unsigned int hd_ireqfreq;
+ long unsigned int hd_irqdata;
+ wait_queue_head_t hd_waitqueue;
+ struct fasync_struct *hd_async_queue;
+ unsigned int hd_flags;
+ unsigned int hd_irq;
+ unsigned int hd_hdwirq;
+ char hd_name[7];
+};
+
+struct hpets {
+ struct hpets *hp_next;
+ struct hpet *hp_hpet;
+ long unsigned int hp_hpet_phys;
+ struct clocksource *hp_clocksource;
+ long long unsigned int hp_tick_freq;
+ long unsigned int hp_delta;
+ unsigned int hp_ntimer;
+ unsigned int hp_which;
+ struct hpet_dev hp_dev[0];
+};
+
+typedef void (*irq_write_msi_msg_t)(struct msi_desc *, struct msi_msg *);
+
+enum msi_desc_filter {
+ MSI_DESC_ALL = 0,
+ MSI_DESC_NOTASSOCIATED = 1,
+ MSI_DESC_ASSOCIATED = 2,
+};
+
+struct platform_msi_priv_data {
+ struct device *dev;
+ void *host_data;
+ msi_alloc_info_t arg;
+ irq_write_msi_msg_t write_msg;
+ int devid;
+};
+
+struct powerclamp_worker_data {
+ struct kthread_worker *worker;
+ struct kthread_work balancing_work;
+ struct kthread_delayed_work idle_injection_work;
+ unsigned int cpu;
+ unsigned int count;
+ unsigned int guard;
+ unsigned int window_size_now;
+ unsigned int target_ratio;
+ unsigned int duration_jiffies;
+ bool clamping;
+};
+
+struct powerclamp_calibration_data {
+ long unsigned int confidence;
+ long unsigned int steady_comp;
+ long unsigned int dynamic_comp;
+};
+
+struct pkg_cstate_info {
+ bool skip;
+ int msr_index;
+ int cstate_id;
+};
+
+enum tc_link_layer {
+ TC_LINKLAYER_UNAWARE = 0,
+ TC_LINKLAYER_ETHERNET = 1,
+ TC_LINKLAYER_ATM = 2,
+};
+
+enum {
+ TCA_STAB_UNSPEC = 0,
+ TCA_STAB_BASE = 1,
+ TCA_STAB_DATA = 2,
+ __TCA_STAB_MAX = 3,
+};
+
+struct qdisc_rate_table {
+ struct tc_ratespec rate;
+ u32 data[256];
+ struct qdisc_rate_table *next;
+ int refcnt;
+};
+
+struct Qdisc_class_common {
+ u32 classid;
+ struct hlist_node hnode;
+};
+
+struct Qdisc_class_hash {
+ struct hlist_head *hash;
+ unsigned int hashsize;
+ unsigned int hashmask;
+ unsigned int hashelems;
+};
+
+struct qdisc_watchdog {
+ u64 last_expires;
+ struct hrtimer timer;
+ struct Qdisc *qdisc;
+};
+
+struct tc_query_caps_base {
+ enum tc_setup_type type;
+ void *caps;
+};
+
+enum tc_root_command {
+ TC_ROOT_GRAFT = 0,
+};
+
+struct tc_root_qopt_offload {
+ enum tc_root_command command;
+ u32 handle;
+ bool ingress;
+};
+
+struct check_loop_arg {
+ struct qdisc_walker w;
+ struct Qdisc *p;
+ int depth;
+};
+
+struct tcf_bind_args {
+ struct tcf_walker w;
+ long unsigned int base;
+ long unsigned int cl;
+ u32 classid;
+};
+
+struct tc_bind_class_args {
+ struct qdisc_walker w;
+ long unsigned int new_cl;
+ u32 portid;
+ u32 clid;
+};
+
+struct qdisc_dump_args {
+ struct qdisc_walker w;
+ struct sk_buff *skb;
+ struct netlink_callback *cb;
+};
+
+struct xfrm_input_afinfo {
+ u8 family;
+ bool is_ipip;
+ int (*callback)(struct sk_buff *, u8, int);
+};
+
+struct xfrm4_protocol {
+ int (*handler)(struct sk_buff *);
+ int (*input_handler)(struct sk_buff *, int, __be32, int);
+ int (*cb_handler)(struct sk_buff *, int);
+ int (*err_handler)(struct sk_buff *, u32);
+ struct xfrm4_protocol *next;
+ int priority;
+};
+
+struct arch_lbr_state {
+ u64 lbr_ctl;
+ u64 lbr_depth;
+ u64 ler_from;
+ u64 ler_to;
+ u64 ler_info;
+ struct lbr_entry entries[0];
+};
+
+union cpuid28_eax {
+ struct {
+ unsigned int lbr_depth_mask: 8;
+ unsigned int reserved: 22;
+ unsigned int lbr_deep_c_reset: 1;
+ unsigned int lbr_lip: 1;
+ } split;
+ unsigned int full;
+};
+
+union cpuid28_ebx {
+ struct {
+ unsigned int lbr_cpl: 1;
+ unsigned int lbr_filter: 1;
+ unsigned int lbr_call_stack: 1;
+ } split;
+ unsigned int full;
+};
+
+union cpuid28_ecx {
+ struct {
+ unsigned int lbr_mispred: 1;
+ unsigned int lbr_timed_lbr: 1;
+ unsigned int lbr_br_type: 1;
+ } split;
+ unsigned int full;
+};
+
+struct x86_pmu_lbr {
+ unsigned int nr;
+ unsigned int from;
+ unsigned int to;
+ unsigned int info;
+};
+
+struct x86_perf_task_context_opt {
+ int lbr_callstack_users;
+ int lbr_stack_state;
+ int log_id;
+};
+
+struct x86_perf_task_context {
+ u64 lbr_sel;
+ int tos;
+ int valid_lbrs;
+ struct x86_perf_task_context_opt opt;
+ struct lbr_entry lbr[32];
+};
+
+struct x86_perf_task_context_arch_lbr {
+ struct x86_perf_task_context_opt opt;
+ struct lbr_entry entries[0];
+};
+
+struct x86_perf_task_context_arch_lbr_xsave {
+ struct x86_perf_task_context_opt opt;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ union {
+ struct xregs_state xsave;
+ struct {
+ struct fxregs_state i387;
+ struct xstate_header header;
+ struct arch_lbr_state lbr;
+ long: 64;
+ long: 64;
+ long: 64;
+ };
+ };
+};
+
+enum {
+ LBR_NONE = 0,
+ LBR_VALID = 1,
+};
+
+enum {
+ ARCH_LBR_BR_TYPE_JCC = 0,
+ ARCH_LBR_BR_TYPE_NEAR_IND_JMP = 1,
+ ARCH_LBR_BR_TYPE_NEAR_REL_JMP = 2,
+ ARCH_LBR_BR_TYPE_NEAR_IND_CALL = 3,
+ ARCH_LBR_BR_TYPE_NEAR_REL_CALL = 4,
+ ARCH_LBR_BR_TYPE_NEAR_RET = 5,
+ ARCH_LBR_BR_TYPE_KNOWN_MAX = 5,
+ ARCH_LBR_BR_TYPE_MAP_MAX = 16,
+};
+
+struct kallsym_iter {
+ loff_t pos;
+ loff_t pos_arch_end;
+ loff_t pos_mod_end;
+ loff_t pos_ftrace_mod_end;
+ loff_t pos_bpf_end;
+ long unsigned int value;
+ unsigned int nameoff;
+ char type;
+ char name[512];
+ char module_name[56];
+ int exported;
+ int show_value;
+};
+
+struct bpf_iter__ksym {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct kallsym_iter *ksym;
+ };
+};
+
+enum lruvec_flags {
+ LRUVEC_CONGESTED = 0,
+};
+
+enum pgdat_flags {
+ PGDAT_DIRTY = 0,
+ PGDAT_WRITEBACK = 1,
+ PGDAT_RECLAIM_LOCKED = 2,
+};
+
+struct reclaim_stat {
+ unsigned int nr_dirty;
+ unsigned int nr_unqueued_dirty;
+ unsigned int nr_congested;
+ unsigned int nr_writeback;
+ unsigned int nr_immediate;
+ unsigned int nr_pageout;
+ unsigned int nr_activate[2];
+ unsigned int nr_ref_keep;
+ unsigned int nr_unmap_fail;
+ unsigned int nr_lazyfree_fail;
+};
+
+struct trace_event_raw_mm_vmscan_kswapd_sleep {
+ struct trace_entry ent;
+ int nid;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_vmscan_kswapd_wake {
+ struct trace_entry ent;
+ int nid;
+ int zid;
+ int order;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_vmscan_wakeup_kswapd {
+ struct trace_entry ent;
+ int nid;
+ int zid;
+ int order;
+ long unsigned int gfp_flags;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_vmscan_direct_reclaim_begin_template {
+ struct trace_entry ent;
+ int order;
+ long unsigned int gfp_flags;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_vmscan_direct_reclaim_end_template {
+ struct trace_entry ent;
+ long unsigned int nr_reclaimed;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_shrink_slab_start {
+ struct trace_entry ent;
+ struct shrinker *shr;
+ void *shrink;
+ int nid;
+ long int nr_objects_to_shrink;
+ long unsigned int gfp_flags;
+ long unsigned int cache_items;
+ long long unsigned int delta;
+ long unsigned int total_scan;
+ int priority;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_shrink_slab_end {
+ struct trace_entry ent;
+ struct shrinker *shr;
+ int nid;
+ void *shrink;
+ long int unused_scan;
+ long int new_scan;
+ int retval;
+ long int total_scan;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_vmscan_lru_isolate {
+ struct trace_entry ent;
+ int highest_zoneidx;
+ int order;
+ long unsigned int nr_requested;
+ long unsigned int nr_scanned;
+ long unsigned int nr_skipped;
+ long unsigned int nr_taken;
+ unsigned int isolate_mode;
+ int lru;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_vmscan_write_folio {
+ struct trace_entry ent;
+ long unsigned int pfn;
+ int reclaim_flags;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_vmscan_lru_shrink_inactive {
+ struct trace_entry ent;
+ int nid;
+ long unsigned int nr_scanned;
+ long unsigned int nr_reclaimed;
+ long unsigned int nr_dirty;
+ long unsigned int nr_writeback;
+ long unsigned int nr_congested;
+ long unsigned int nr_immediate;
+ unsigned int nr_activate0;
+ unsigned int nr_activate1;
+ long unsigned int nr_ref_keep;
+ long unsigned int nr_unmap_fail;
+ int priority;
+ int reclaim_flags;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_vmscan_lru_shrink_active {
+ struct trace_entry ent;
+ int nid;
+ long unsigned int nr_taken;
+ long unsigned int nr_active;
+ long unsigned int nr_deactivated;
+ long unsigned int nr_referenced;
+ int priority;
+ int reclaim_flags;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_vmscan_node_reclaim_begin {
+ struct trace_entry ent;
+ int nid;
+ int order;
+ long unsigned int gfp_flags;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_vmscan_throttled {
+ struct trace_entry ent;
+ int nid;
+ int usec_timeout;
+ int usec_delayed;
+ int reason;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_mm_vmscan_kswapd_sleep {};
+
+struct trace_event_data_offsets_mm_vmscan_kswapd_wake {};
+
+struct trace_event_data_offsets_mm_vmscan_wakeup_kswapd {};
+
+struct trace_event_data_offsets_mm_vmscan_direct_reclaim_begin_template {};
+
+struct trace_event_data_offsets_mm_vmscan_direct_reclaim_end_template {};
+
+struct trace_event_data_offsets_mm_shrink_slab_start {};
+
+struct trace_event_data_offsets_mm_shrink_slab_end {};
+
+struct trace_event_data_offsets_mm_vmscan_lru_isolate {};
+
+struct trace_event_data_offsets_mm_vmscan_write_folio {};
+
+struct trace_event_data_offsets_mm_vmscan_lru_shrink_inactive {};
+
+struct trace_event_data_offsets_mm_vmscan_lru_shrink_active {};
+
+struct trace_event_data_offsets_mm_vmscan_node_reclaim_begin {};
+
+struct trace_event_data_offsets_mm_vmscan_throttled {};
+
+typedef void (*btf_trace_mm_vmscan_kswapd_sleep)(void *, int);
+
+typedef void (*btf_trace_mm_vmscan_kswapd_wake)(void *, int, int, int);
+
+typedef void (*btf_trace_mm_vmscan_wakeup_kswapd)(void *, int, int, int, gfp_t);
+
+typedef void (*btf_trace_mm_vmscan_direct_reclaim_begin)(void *, int, gfp_t);
+
+typedef void (*btf_trace_mm_vmscan_memcg_reclaim_begin)(void *, int, gfp_t);
+
+typedef void (*btf_trace_mm_vmscan_memcg_softlimit_reclaim_begin)(void *, int, gfp_t);
+
+typedef void (*btf_trace_mm_vmscan_direct_reclaim_end)(void *, long unsigned int);
+
+typedef void (*btf_trace_mm_vmscan_memcg_reclaim_end)(void *, long unsigned int);
+
+typedef void (*btf_trace_mm_vmscan_memcg_softlimit_reclaim_end)(void *, long unsigned int);
+
+typedef void (*btf_trace_mm_shrink_slab_start)(void *, struct shrinker *, struct shrink_control *, long int, long unsigned int, long long unsigned int, long unsigned int, int);
+
+typedef void (*btf_trace_mm_shrink_slab_end)(void *, struct shrinker *, int, int, long int, long int, long int);
+
+typedef void (*btf_trace_mm_vmscan_lru_isolate)(void *, int, int, long unsigned int, long unsigned int, long unsigned int, long unsigned int, isolate_mode_t, int);
+
+typedef void (*btf_trace_mm_vmscan_write_folio)(void *, struct folio *);
+
+typedef void (*btf_trace_mm_vmscan_lru_shrink_inactive)(void *, int, long unsigned int, long unsigned int, struct reclaim_stat *, int, int);
+
+typedef void (*btf_trace_mm_vmscan_lru_shrink_active)(void *, int, long unsigned int, long unsigned int, long unsigned int, long unsigned int, int, int);
+
+typedef void (*btf_trace_mm_vmscan_node_reclaim_begin)(void *, int, int, gfp_t);
+
+typedef void (*btf_trace_mm_vmscan_node_reclaim_end)(void *, long unsigned int);
+
+typedef void (*btf_trace_mm_vmscan_throttled)(void *, int, int, int, int);
+
+struct scan_control {
+ long unsigned int nr_to_reclaim;
+ nodemask_t *nodemask;
+ struct mem_cgroup *target_mem_cgroup;
+ long unsigned int anon_cost;
+ long unsigned int file_cost;
+ unsigned int may_deactivate: 2;
+ unsigned int force_deactivate: 1;
+ unsigned int skipped_deactivate: 1;
+ unsigned int may_writepage: 1;
+ unsigned int may_unmap: 1;
+ unsigned int may_swap: 1;
+ unsigned int proactive: 1;
+ unsigned int memcg_low_reclaim: 1;
+ unsigned int memcg_low_skipped: 1;
+ unsigned int hibernation_mode: 1;
+ unsigned int compaction_ready: 1;
+ unsigned int cache_trim_mode: 1;
+ unsigned int file_is_tiny: 1;
+ unsigned int no_demotion: 1;
+ s8 order;
+ s8 priority;
+ s8 reclaim_idx;
+ gfp_t gfp_mask;
+ long unsigned int nr_scanned;
+ long unsigned int nr_reclaimed;
+ struct {
+ unsigned int dirty;
+ unsigned int unqueued_dirty;
+ unsigned int congested;
+ unsigned int writeback;
+ unsigned int immediate;
+ unsigned int file_taken;
+ unsigned int taken;
+ } nr;
+ struct reclaim_state reclaim_state;
+};
+
+typedef enum {
+ PAGE_KEEP = 0,
+ PAGE_ACTIVATE = 1,
+ PAGE_SUCCESS = 2,
+ PAGE_CLEAN = 3,
+} pageout_t;
+
+enum folio_references {
+ FOLIOREF_RECLAIM = 0,
+ FOLIOREF_RECLAIM_CLEAN = 1,
+ FOLIOREF_KEEP = 2,
+ FOLIOREF_ACTIVATE = 3,
+};
+
+enum scan_balance {
+ SCAN_EQUAL = 0,
+ SCAN_FRACT = 1,
+ SCAN_ANON = 2,
+ SCAN_FILE = 3,
+};
+
+struct badblocks {
+ struct device *dev;
+ int count;
+ int unacked_exist;
+ int shift;
+ u64 *page;
+ int changed;
+ seqlock_t lock;
+ sector_t sector;
+ sector_t size;
+};
+
+struct io_splice {
+ struct file *file_out;
+ loff_t off_out;
+ loff_t off_in;
+ u64 len;
+ int splice_fd_in;
+ unsigned int flags;
+};
+
+union uu {
+ short unsigned int us;
+ unsigned char b[2];
+};
+
+struct bus_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct bus_type *, char *);
+ ssize_t (*store)(struct bus_type *, const char *, size_t);
+};
+
+enum pcie_reset_state {
+ pcie_deassert_reset = 1,
+ pcie_warm_reset = 2,
+ pcie_hot_reset = 3,
+};
+
+enum pcie_link_width {
+ PCIE_LNK_WIDTH_RESRV = 0,
+ PCIE_LNK_X1 = 1,
+ PCIE_LNK_X2 = 2,
+ PCIE_LNK_X4 = 4,
+ PCIE_LNK_X8 = 8,
+ PCIE_LNK_X12 = 12,
+ PCIE_LNK_X16 = 16,
+ PCIE_LNK_X32 = 32,
+ PCIE_LNK_WIDTH_UNKNOWN = 255,
+};
+
+typedef int (*arch_set_vga_state_t)(struct pci_dev *, bool, unsigned int, u32);
+
+struct pci_reset_fn_method {
+ int (*reset_fn)(struct pci_dev *, bool);
+ char *name;
+};
+
+struct pci_pme_device {
+ struct list_head list;
+ struct pci_dev *dev;
+};
+
+struct pci_saved_state {
+ u32 config_space[16];
+ struct pci_cap_saved_data cap[0];
+};
+
+struct pci_devres {
+ unsigned int enabled: 1;
+ unsigned int pinned: 1;
+ unsigned int orig_intx: 1;
+ unsigned int restore_intx: 1;
+ unsigned int mwi: 1;
+ u32 region_mask;
+};
+
+struct software_node {
+ const char *name;
+ const struct software_node *parent;
+ const struct property_entry *properties;
+};
+
+struct irq_affinity_devres {
+ unsigned int count;
+ unsigned int irq[0];
+};
+
+struct platform_object {
+ struct platform_device pdev;
+ char name[0];
+};
+
+enum netlink_attribute_type {
+ NL_ATTR_TYPE_INVALID = 0,
+ NL_ATTR_TYPE_FLAG = 1,
+ NL_ATTR_TYPE_U8 = 2,
+ NL_ATTR_TYPE_U16 = 3,
+ NL_ATTR_TYPE_U32 = 4,
+ NL_ATTR_TYPE_U64 = 5,
+ NL_ATTR_TYPE_S8 = 6,
+ NL_ATTR_TYPE_S16 = 7,
+ NL_ATTR_TYPE_S32 = 8,
+ NL_ATTR_TYPE_S64 = 9,
+ NL_ATTR_TYPE_BINARY = 10,
+ NL_ATTR_TYPE_STRING = 11,
+ NL_ATTR_TYPE_NUL_STRING = 12,
+ NL_ATTR_TYPE_NESTED = 13,
+ NL_ATTR_TYPE_NESTED_ARRAY = 14,
+ NL_ATTR_TYPE_BITFIELD32 = 15,
+};
+
+enum netlink_policy_type_attr {
+ NL_POLICY_TYPE_ATTR_UNSPEC = 0,
+ NL_POLICY_TYPE_ATTR_TYPE = 1,
+ NL_POLICY_TYPE_ATTR_MIN_VALUE_S = 2,
+ NL_POLICY_TYPE_ATTR_MAX_VALUE_S = 3,
+ NL_POLICY_TYPE_ATTR_MIN_VALUE_U = 4,
+ NL_POLICY_TYPE_ATTR_MAX_VALUE_U = 5,
+ NL_POLICY_TYPE_ATTR_MIN_LENGTH = 6,
+ NL_POLICY_TYPE_ATTR_MAX_LENGTH = 7,
+ NL_POLICY_TYPE_ATTR_POLICY_IDX = 8,
+ NL_POLICY_TYPE_ATTR_POLICY_MAXTYPE = 9,
+ NL_POLICY_TYPE_ATTR_BITFIELD32_MASK = 10,
+ NL_POLICY_TYPE_ATTR_PAD = 11,
+ NL_POLICY_TYPE_ATTR_MASK = 12,
+ __NL_POLICY_TYPE_ATTR_MAX = 13,
+ NL_POLICY_TYPE_ATTR_MAX = 12,
+};
+
+struct netlink_policy_dump_state {
+ unsigned int policy_idx;
+ unsigned int attr_idx;
+ unsigned int n_alloc;
+ struct {
+ const struct nla_policy *policy;
+ unsigned int maxtype;
+ } policies[0];
+};
+
+struct ethtool_cmd {
+ __u32 cmd;
+ __u32 supported;
+ __u32 advertising;
+ __u16 speed;
+ __u8 duplex;
+ __u8 port;
+ __u8 phy_address;
+ __u8 transceiver;
+ __u8 autoneg;
+ __u8 mdio_support;
+ __u32 maxtxpkt;
+ __u32 maxrxpkt;
+ __u16 speed_hi;
+ __u8 eth_tp_mdix;
+ __u8 eth_tp_mdix_ctrl;
+ __u32 lp_advertising;
+ __u32 reserved[2];
+};
+
+struct ethtool_phy_ops {
+ int (*get_sset_count)(struct phy_device *);
+ int (*get_strings)(struct phy_device *, u8 *);
+ int (*get_stats)(struct phy_device *, struct ethtool_stats *, u64 *);
+ int (*start_cable_test)(struct phy_device *, struct netlink_ext_ack *);
+ int (*start_cable_test_tdr)(struct phy_device *, struct netlink_ext_ack *, const struct phy_tdr_config *);
+};
+
+struct link_mode_info {
+ int speed;
+ u8 lanes;
+ u8 duplex;
+};
+
+struct nf_log_buf {
+ unsigned int count;
+ char buf[1020];
+};
+
+struct nduseroptmsg {
+ unsigned char nduseropt_family;
+ unsigned char nduseropt_pad1;
+ short unsigned int nduseropt_opts_len;
+ int nduseropt_ifindex;
+ __u8 nduseropt_icmp_type;
+ __u8 nduseropt_icmp_code;
+ short unsigned int nduseropt_pad2;
+ unsigned int nduseropt_pad3;
+};
+
+enum {
+ NDUSEROPT_UNSPEC = 0,
+ NDUSEROPT_SRCADDR = 1,
+ __NDUSEROPT_MAX = 2,
+};
+
+struct inet6_ifaddr {
+ struct in6_addr addr;
+ __u32 prefix_len;
+ __u32 rt_priority;
+ __u32 valid_lft;
+ __u32 prefered_lft;
+ refcount_t refcnt;
+ spinlock_t lock;
+ int state;
+ __u32 flags;
+ __u8 dad_probes;
+ __u8 stable_privacy_retry;
+ __u16 scope;
+ __u64 dad_nonce;
+ long unsigned int cstamp;
+ long unsigned int tstamp;
+ struct delayed_work dad_work;
+ struct inet6_dev *idev;
+ struct fib6_info *rt;
+ struct hlist_node addr_lst;
+ struct list_head if_list;
+ struct list_head if_list_aux;
+ struct list_head tmp_list;
+ struct inet6_ifaddr *ifpub;
+ int regen_count;
+ bool tokenized;
+ u8 ifa_proto;
+ struct callback_head rcu;
+ struct in6_addr peer_addr;
+};
+
+struct nd_msg {
+ struct icmp6hdr icmph;
+ struct in6_addr target;
+ __u8 opt[0];
+};
+
+struct rs_msg {
+ struct icmp6hdr icmph;
+ __u8 opt[0];
+};
+
+struct ra_msg {
+ struct icmp6hdr icmph;
+ __be32 reachable_time;
+ __be32 retrans_timer;
+};
+
+struct rd_msg {
+ struct icmp6hdr icmph;
+ struct in6_addr target;
+ struct in6_addr dest;
+ __u8 opt[0];
+};
+
+struct route_info {
+ __u8 type;
+ __u8 length;
+ __u8 prefix_len;
+ __u8 reserved_l: 3;
+ __u8 route_pref: 2;
+ __u8 reserved_h: 3;
+ __be32 lifetime;
+ __u8 prefix[0];
+};
+
+enum {
+ LWTUNNEL_XMIT_DONE = 0,
+ LWTUNNEL_XMIT_CONTINUE = 1,
+};
+
+struct mpls_iptunnel_encap {
+ u8 labels;
+ u8 ttl_propagate;
+ u8 default_ttl;
+ u8 reserved1;
+ u32 label[0];
+};
+
+enum {
+ MPLS_IPTUNNEL_UNSPEC = 0,
+ MPLS_IPTUNNEL_DST = 1,
+ MPLS_IPTUNNEL_TTL = 2,
+ __MPLS_IPTUNNEL_MAX = 3,
+};
+
+enum P4_EVENTS {
+ P4_EVENT_TC_DELIVER_MODE = 0,
+ P4_EVENT_BPU_FETCH_REQUEST = 1,
+ P4_EVENT_ITLB_REFERENCE = 2,
+ P4_EVENT_MEMORY_CANCEL = 3,
+ P4_EVENT_MEMORY_COMPLETE = 4,
+ P4_EVENT_LOAD_PORT_REPLAY = 5,
+ P4_EVENT_STORE_PORT_REPLAY = 6,
+ P4_EVENT_MOB_LOAD_REPLAY = 7,
+ P4_EVENT_PAGE_WALK_TYPE = 8,
+ P4_EVENT_BSQ_CACHE_REFERENCE = 9,
+ P4_EVENT_IOQ_ALLOCATION = 10,
+ P4_EVENT_IOQ_ACTIVE_ENTRIES = 11,
+ P4_EVENT_FSB_DATA_ACTIVITY = 12,
+ P4_EVENT_BSQ_ALLOCATION = 13,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES = 14,
+ P4_EVENT_SSE_INPUT_ASSIST = 15,
+ P4_EVENT_PACKED_SP_UOP = 16,
+ P4_EVENT_PACKED_DP_UOP = 17,
+ P4_EVENT_SCALAR_SP_UOP = 18,
+ P4_EVENT_SCALAR_DP_UOP = 19,
+ P4_EVENT_64BIT_MMX_UOP = 20,
+ P4_EVENT_128BIT_MMX_UOP = 21,
+ P4_EVENT_X87_FP_UOP = 22,
+ P4_EVENT_TC_MISC = 23,
+ P4_EVENT_GLOBAL_POWER_EVENTS = 24,
+ P4_EVENT_TC_MS_XFER = 25,
+ P4_EVENT_UOP_QUEUE_WRITES = 26,
+ P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE = 27,
+ P4_EVENT_RETIRED_BRANCH_TYPE = 28,
+ P4_EVENT_RESOURCE_STALL = 29,
+ P4_EVENT_WC_BUFFER = 30,
+ P4_EVENT_B2B_CYCLES = 31,
+ P4_EVENT_BNR = 32,
+ P4_EVENT_SNOOP = 33,
+ P4_EVENT_RESPONSE = 34,
+ P4_EVENT_FRONT_END_EVENT = 35,
+ P4_EVENT_EXECUTION_EVENT = 36,
+ P4_EVENT_REPLAY_EVENT = 37,
+ P4_EVENT_INSTR_RETIRED = 38,
+ P4_EVENT_UOPS_RETIRED = 39,
+ P4_EVENT_UOP_TYPE = 40,
+ P4_EVENT_BRANCH_RETIRED = 41,
+ P4_EVENT_MISPRED_BRANCH_RETIRED = 42,
+ P4_EVENT_X87_ASSIST = 43,
+ P4_EVENT_MACHINE_CLEAR = 44,
+ P4_EVENT_INSTR_COMPLETED = 45,
+};
+
+enum P4_EVENT_OPCODES {
+ P4_EVENT_TC_DELIVER_MODE_OPCODE = 257,
+ P4_EVENT_BPU_FETCH_REQUEST_OPCODE = 768,
+ P4_EVENT_ITLB_REFERENCE_OPCODE = 6147,
+ P4_EVENT_MEMORY_CANCEL_OPCODE = 517,
+ P4_EVENT_MEMORY_COMPLETE_OPCODE = 2050,
+ P4_EVENT_LOAD_PORT_REPLAY_OPCODE = 1026,
+ P4_EVENT_STORE_PORT_REPLAY_OPCODE = 1282,
+ P4_EVENT_MOB_LOAD_REPLAY_OPCODE = 770,
+ P4_EVENT_PAGE_WALK_TYPE_OPCODE = 260,
+ P4_EVENT_BSQ_CACHE_REFERENCE_OPCODE = 3079,
+ P4_EVENT_IOQ_ALLOCATION_OPCODE = 774,
+ P4_EVENT_IOQ_ACTIVE_ENTRIES_OPCODE = 6662,
+ P4_EVENT_FSB_DATA_ACTIVITY_OPCODE = 5894,
+ P4_EVENT_BSQ_ALLOCATION_OPCODE = 1287,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES_OPCODE = 1543,
+ P4_EVENT_SSE_INPUT_ASSIST_OPCODE = 13313,
+ P4_EVENT_PACKED_SP_UOP_OPCODE = 2049,
+ P4_EVENT_PACKED_DP_UOP_OPCODE = 3073,
+ P4_EVENT_SCALAR_SP_UOP_OPCODE = 2561,
+ P4_EVENT_SCALAR_DP_UOP_OPCODE = 3585,
+ P4_EVENT_64BIT_MMX_UOP_OPCODE = 513,
+ P4_EVENT_128BIT_MMX_UOP_OPCODE = 6657,
+ P4_EVENT_X87_FP_UOP_OPCODE = 1025,
+ P4_EVENT_TC_MISC_OPCODE = 1537,
+ P4_EVENT_GLOBAL_POWER_EVENTS_OPCODE = 4870,
+ P4_EVENT_TC_MS_XFER_OPCODE = 1280,
+ P4_EVENT_UOP_QUEUE_WRITES_OPCODE = 2304,
+ P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE_OPCODE = 1282,
+ P4_EVENT_RETIRED_BRANCH_TYPE_OPCODE = 1026,
+ P4_EVENT_RESOURCE_STALL_OPCODE = 257,
+ P4_EVENT_WC_BUFFER_OPCODE = 1285,
+ P4_EVENT_B2B_CYCLES_OPCODE = 5635,
+ P4_EVENT_BNR_OPCODE = 2051,
+ P4_EVENT_SNOOP_OPCODE = 1539,
+ P4_EVENT_RESPONSE_OPCODE = 1027,
+ P4_EVENT_FRONT_END_EVENT_OPCODE = 2053,
+ P4_EVENT_EXECUTION_EVENT_OPCODE = 3077,
+ P4_EVENT_REPLAY_EVENT_OPCODE = 2309,
+ P4_EVENT_INSTR_RETIRED_OPCODE = 516,
+ P4_EVENT_UOPS_RETIRED_OPCODE = 260,
+ P4_EVENT_UOP_TYPE_OPCODE = 514,
+ P4_EVENT_BRANCH_RETIRED_OPCODE = 1541,
+ P4_EVENT_MISPRED_BRANCH_RETIRED_OPCODE = 772,
+ P4_EVENT_X87_ASSIST_OPCODE = 773,
+ P4_EVENT_MACHINE_CLEAR_OPCODE = 517,
+ P4_EVENT_INSTR_COMPLETED_OPCODE = 1796,
+};
+
+enum P4_ESCR_EMASKS {
+ P4_EVENT_TC_DELIVER_MODE__DD = 512,
+ P4_EVENT_TC_DELIVER_MODE__DB = 1024,
+ P4_EVENT_TC_DELIVER_MODE__DI = 2048,
+ P4_EVENT_TC_DELIVER_MODE__BD = 4096,
+ P4_EVENT_TC_DELIVER_MODE__BB = 8192,
+ P4_EVENT_TC_DELIVER_MODE__BI = 16384,
+ P4_EVENT_TC_DELIVER_MODE__ID = 32768,
+ P4_EVENT_BPU_FETCH_REQUEST__TCMISS = 512,
+ P4_EVENT_ITLB_REFERENCE__HIT = 512,
+ P4_EVENT_ITLB_REFERENCE__MISS = 1024,
+ P4_EVENT_ITLB_REFERENCE__HIT_UK = 2048,
+ P4_EVENT_MEMORY_CANCEL__ST_RB_FULL = 2048,
+ P4_EVENT_MEMORY_CANCEL__64K_CONF = 4096,
+ P4_EVENT_MEMORY_COMPLETE__LSC = 512,
+ P4_EVENT_MEMORY_COMPLETE__SSC = 1024,
+ P4_EVENT_LOAD_PORT_REPLAY__SPLIT_LD = 1024,
+ P4_EVENT_STORE_PORT_REPLAY__SPLIT_ST = 1024,
+ P4_EVENT_MOB_LOAD_REPLAY__NO_STA = 1024,
+ P4_EVENT_MOB_LOAD_REPLAY__NO_STD = 4096,
+ P4_EVENT_MOB_LOAD_REPLAY__PARTIAL_DATA = 8192,
+ P4_EVENT_MOB_LOAD_REPLAY__UNALGN_ADDR = 16384,
+ P4_EVENT_PAGE_WALK_TYPE__DTMISS = 512,
+ P4_EVENT_PAGE_WALK_TYPE__ITMISS = 1024,
+ P4_EVENT_BSQ_CACHE_REFERENCE__RD_2ndL_HITS = 512,
+ P4_EVENT_BSQ_CACHE_REFERENCE__RD_2ndL_HITE = 1024,
+ P4_EVENT_BSQ_CACHE_REFERENCE__RD_2ndL_HITM = 2048,
+ P4_EVENT_BSQ_CACHE_REFERENCE__RD_3rdL_HITS = 4096,
+ P4_EVENT_BSQ_CACHE_REFERENCE__RD_3rdL_HITE = 8192,
+ P4_EVENT_BSQ_CACHE_REFERENCE__RD_3rdL_HITM = 16384,
+ P4_EVENT_BSQ_CACHE_REFERENCE__RD_2ndL_MISS = 131072,
+ P4_EVENT_BSQ_CACHE_REFERENCE__RD_3rdL_MISS = 262144,
+ P4_EVENT_BSQ_CACHE_REFERENCE__WR_2ndL_MISS = 524288,
+ P4_EVENT_IOQ_ALLOCATION__DEFAULT = 512,
+ P4_EVENT_IOQ_ALLOCATION__ALL_READ = 16384,
+ P4_EVENT_IOQ_ALLOCATION__ALL_WRITE = 32768,
+ P4_EVENT_IOQ_ALLOCATION__MEM_UC = 65536,
+ P4_EVENT_IOQ_ALLOCATION__MEM_WC = 131072,
+ P4_EVENT_IOQ_ALLOCATION__MEM_WT = 262144,
+ P4_EVENT_IOQ_ALLOCATION__MEM_WP = 524288,
+ P4_EVENT_IOQ_ALLOCATION__MEM_WB = 1048576,
+ P4_EVENT_IOQ_ALLOCATION__OWN = 4194304,
+ P4_EVENT_IOQ_ALLOCATION__OTHER = 8388608,
+ P4_EVENT_IOQ_ALLOCATION__PREFETCH = 16777216,
+ P4_EVENT_IOQ_ACTIVE_ENTRIES__DEFAULT = 512,
+ P4_EVENT_IOQ_ACTIVE_ENTRIES__ALL_READ = 16384,
+ P4_EVENT_IOQ_ACTIVE_ENTRIES__ALL_WRITE = 32768,
+ P4_EVENT_IOQ_ACTIVE_ENTRIES__MEM_UC = 65536,
+ P4_EVENT_IOQ_ACTIVE_ENTRIES__MEM_WC = 131072,
+ P4_EVENT_IOQ_ACTIVE_ENTRIES__MEM_WT = 262144,
+ P4_EVENT_IOQ_ACTIVE_ENTRIES__MEM_WP = 524288,
+ P4_EVENT_IOQ_ACTIVE_ENTRIES__MEM_WB = 1048576,
+ P4_EVENT_IOQ_ACTIVE_ENTRIES__OWN = 4194304,
+ P4_EVENT_IOQ_ACTIVE_ENTRIES__OTHER = 8388608,
+ P4_EVENT_IOQ_ACTIVE_ENTRIES__PREFETCH = 16777216,
+ P4_EVENT_FSB_DATA_ACTIVITY__DRDY_DRV = 512,
+ P4_EVENT_FSB_DATA_ACTIVITY__DRDY_OWN = 1024,
+ P4_EVENT_FSB_DATA_ACTIVITY__DRDY_OTHER = 2048,
+ P4_EVENT_FSB_DATA_ACTIVITY__DBSY_DRV = 4096,
+ P4_EVENT_FSB_DATA_ACTIVITY__DBSY_OWN = 8192,
+ P4_EVENT_FSB_DATA_ACTIVITY__DBSY_OTHER = 16384,
+ P4_EVENT_BSQ_ALLOCATION__REQ_TYPE0 = 512,
+ P4_EVENT_BSQ_ALLOCATION__REQ_TYPE1 = 1024,
+ P4_EVENT_BSQ_ALLOCATION__REQ_LEN0 = 2048,
+ P4_EVENT_BSQ_ALLOCATION__REQ_LEN1 = 4096,
+ P4_EVENT_BSQ_ALLOCATION__REQ_IO_TYPE = 16384,
+ P4_EVENT_BSQ_ALLOCATION__REQ_LOCK_TYPE = 32768,
+ P4_EVENT_BSQ_ALLOCATION__REQ_CACHE_TYPE = 65536,
+ P4_EVENT_BSQ_ALLOCATION__REQ_SPLIT_TYPE = 131072,
+ P4_EVENT_BSQ_ALLOCATION__REQ_DEM_TYPE = 262144,
+ P4_EVENT_BSQ_ALLOCATION__REQ_ORD_TYPE = 524288,
+ P4_EVENT_BSQ_ALLOCATION__MEM_TYPE0 = 1048576,
+ P4_EVENT_BSQ_ALLOCATION__MEM_TYPE1 = 2097152,
+ P4_EVENT_BSQ_ALLOCATION__MEM_TYPE2 = 4194304,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES__REQ_TYPE0 = 512,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES__REQ_TYPE1 = 1024,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES__REQ_LEN0 = 2048,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES__REQ_LEN1 = 4096,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES__REQ_IO_TYPE = 16384,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES__REQ_LOCK_TYPE = 32768,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES__REQ_CACHE_TYPE = 65536,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES__REQ_SPLIT_TYPE = 131072,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES__REQ_DEM_TYPE = 262144,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES__REQ_ORD_TYPE = 524288,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES__MEM_TYPE0 = 1048576,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES__MEM_TYPE1 = 2097152,
+ P4_EVENT_BSQ_ACTIVE_ENTRIES__MEM_TYPE2 = 4194304,
+ P4_EVENT_SSE_INPUT_ASSIST__ALL = 16777216,
+ P4_EVENT_PACKED_SP_UOP__ALL = 16777216,
+ P4_EVENT_PACKED_DP_UOP__ALL = 16777216,
+ P4_EVENT_SCALAR_SP_UOP__ALL = 16777216,
+ P4_EVENT_SCALAR_DP_UOP__ALL = 16777216,
+ P4_EVENT_64BIT_MMX_UOP__ALL = 16777216,
+ P4_EVENT_128BIT_MMX_UOP__ALL = 16777216,
+ P4_EVENT_X87_FP_UOP__ALL = 16777216,
+ P4_EVENT_TC_MISC__FLUSH = 8192,
+ P4_EVENT_GLOBAL_POWER_EVENTS__RUNNING = 512,
+ P4_EVENT_TC_MS_XFER__CISC = 512,
+ P4_EVENT_UOP_QUEUE_WRITES__FROM_TC_BUILD = 512,
+ P4_EVENT_UOP_QUEUE_WRITES__FROM_TC_DELIVER = 1024,
+ P4_EVENT_UOP_QUEUE_WRITES__FROM_ROM = 2048,
+ P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE__CONDITIONAL = 1024,
+ P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE__CALL = 2048,
+ P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE__RETURN = 4096,
+ P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE__INDIRECT = 8192,
+ P4_EVENT_RETIRED_BRANCH_TYPE__CONDITIONAL = 1024,
+ P4_EVENT_RETIRED_BRANCH_TYPE__CALL = 2048,
+ P4_EVENT_RETIRED_BRANCH_TYPE__RETURN = 4096,
+ P4_EVENT_RETIRED_BRANCH_TYPE__INDIRECT = 8192,
+ P4_EVENT_RESOURCE_STALL__SBFULL = 16384,
+ P4_EVENT_WC_BUFFER__WCB_EVICTS = 512,
+ P4_EVENT_WC_BUFFER__WCB_FULL_EVICTS = 1024,
+ P4_EVENT_FRONT_END_EVENT__NBOGUS = 512,
+ P4_EVENT_FRONT_END_EVENT__BOGUS = 1024,
+ P4_EVENT_EXECUTION_EVENT__NBOGUS0 = 512,
+ P4_EVENT_EXECUTION_EVENT__NBOGUS1 = 1024,
+ P4_EVENT_EXECUTION_EVENT__NBOGUS2 = 2048,
+ P4_EVENT_EXECUTION_EVENT__NBOGUS3 = 4096,
+ P4_EVENT_EXECUTION_EVENT__BOGUS0 = 8192,
+ P4_EVENT_EXECUTION_EVENT__BOGUS1 = 16384,
+ P4_EVENT_EXECUTION_EVENT__BOGUS2 = 32768,
+ P4_EVENT_EXECUTION_EVENT__BOGUS3 = 65536,
+ P4_EVENT_REPLAY_EVENT__NBOGUS = 512,
+ P4_EVENT_REPLAY_EVENT__BOGUS = 1024,
+ P4_EVENT_INSTR_RETIRED__NBOGUSNTAG = 512,
+ P4_EVENT_INSTR_RETIRED__NBOGUSTAG = 1024,
+ P4_EVENT_INSTR_RETIRED__BOGUSNTAG = 2048,
+ P4_EVENT_INSTR_RETIRED__BOGUSTAG = 4096,
+ P4_EVENT_UOPS_RETIRED__NBOGUS = 512,
+ P4_EVENT_UOPS_RETIRED__BOGUS = 1024,
+ P4_EVENT_UOP_TYPE__TAGLOADS = 1024,
+ P4_EVENT_UOP_TYPE__TAGSTORES = 2048,
+ P4_EVENT_BRANCH_RETIRED__MMNP = 512,
+ P4_EVENT_BRANCH_RETIRED__MMNM = 1024,
+ P4_EVENT_BRANCH_RETIRED__MMTP = 2048,
+ P4_EVENT_BRANCH_RETIRED__MMTM = 4096,
+ P4_EVENT_MISPRED_BRANCH_RETIRED__NBOGUS = 512,
+ P4_EVENT_X87_ASSIST__FPSU = 512,
+ P4_EVENT_X87_ASSIST__FPSO = 1024,
+ P4_EVENT_X87_ASSIST__POAO = 2048,
+ P4_EVENT_X87_ASSIST__POAU = 4096,
+ P4_EVENT_X87_ASSIST__PREA = 8192,
+ P4_EVENT_MACHINE_CLEAR__CLEAR = 512,
+ P4_EVENT_MACHINE_CLEAR__MOCLEAR = 1024,
+ P4_EVENT_MACHINE_CLEAR__SMCLEAR = 2048,
+ P4_EVENT_INSTR_COMPLETED__NBOGUS = 512,
+ P4_EVENT_INSTR_COMPLETED__BOGUS = 1024,
+};
+
+enum P4_PEBS_METRIC {
+ P4_PEBS_METRIC__none = 0,
+ P4_PEBS_METRIC__1stl_cache_load_miss_retired = 1,
+ P4_PEBS_METRIC__2ndl_cache_load_miss_retired = 2,
+ P4_PEBS_METRIC__dtlb_load_miss_retired = 3,
+ P4_PEBS_METRIC__dtlb_store_miss_retired = 4,
+ P4_PEBS_METRIC__dtlb_all_miss_retired = 5,
+ P4_PEBS_METRIC__tagged_mispred_branch = 6,
+ P4_PEBS_METRIC__mob_load_replay_retired = 7,
+ P4_PEBS_METRIC__split_load_retired = 8,
+ P4_PEBS_METRIC__split_store_retired = 9,
+ P4_PEBS_METRIC__max = 10,
+};
+
+struct p4_event_bind {
+ unsigned int opcode;
+ unsigned int escr_msr[2];
+ unsigned int escr_emask;
+ unsigned int shared;
+ char cntr[6];
+};
+
+struct p4_pebs_bind {
+ unsigned int metric_pebs;
+ unsigned int metric_vert;
+};
+
+struct p4_event_alias {
+ u64 original;
+ u64 alternative;
+};
+
+struct freelist_node {
+ atomic_t refs;
+ struct freelist_node *next;
+};
+
+struct freelist_head {
+ struct freelist_node *head;
+};
+
+struct rethook_node;
+
+typedef void (*rethook_handler_t)(struct rethook_node *, void *, struct pt_regs *);
+
+struct rethook;
+
+struct rethook_node {
+ union {
+ struct freelist_node freelist;
+ struct callback_head rcu;
+ };
+ struct llist_node llist;
+ struct rethook *rethook;
+ long unsigned int ret_addr;
+ long unsigned int frame;
+};
+
+struct rethook {
+ void *data;
+ rethook_handler_t handler;
+ struct freelist_head pool;
+ refcount_t ref;
+ struct callback_head rcu;
+};
+
+typedef __s64 Elf64_Sxword;
+
+struct elf64_rela {
+ Elf64_Addr r_offset;
+ Elf64_Xword r_info;
+ Elf64_Sxword r_addend;
+};
+
+typedef struct elf64_rela Elf64_Rela;
+
+struct paravirt_patch_site;
+
+enum {
+ REGION_INTERSECTS = 0,
+ REGION_DISJOINT = 1,
+ REGION_MIXED = 2,
+};
+
+struct resource_constraint {
+ resource_size_t min;
+ resource_size_t max;
+ resource_size_t align;
+ resource_size_t (*alignf)(void *, const struct resource *, resource_size_t, resource_size_t);
+ void *alignf_data;
+};
+
+enum {
+ MAX_IORES_LEVEL = 5,
+};
+
+struct region_devres {
+ struct resource *parent;
+ resource_size_t start;
+ resource_size_t n;
+};
+
+struct dev_printk_info;
+
+struct kernel_stat {
+ long unsigned int irqs_sum;
+ unsigned int softirqs[10];
+};
+
+struct latch_tree_root {
+ seqcount_latch_t seq;
+ struct rb_root tree[2];
+};
+
+struct latch_tree_ops {
+ bool (*less)(struct latch_tree_node *, struct latch_tree_node *);
+ int (*comp)(void *, struct latch_tree_node *);
+};
+
+struct mod_tree_root {
+ struct latch_tree_root root;
+ long unsigned int addr_min;
+ long unsigned int addr_max;
+};
+
+typedef long unsigned int perf_trace_t[1024];
+
+struct bpf_attach_target_info {
+ struct btf_func_model fmodel;
+ long int tgt_addr;
+ const char *tgt_name;
+ const struct btf_type *tgt_type;
+};
+
+struct bpf_shim_tramp_link {
+ struct bpf_tramp_link link;
+ struct bpf_trampoline *trampoline;
+};
+
+struct trace_event_raw_netfs_read {
+ struct trace_entry ent;
+ unsigned int rreq;
+ unsigned int cookie;
+ loff_t start;
+ size_t len;
+ enum netfs_read_trace what;
+ unsigned int netfs_inode;
+ char __data[0];
+};
+
+struct trace_event_raw_netfs_rreq {
+ struct trace_entry ent;
+ unsigned int rreq;
+ unsigned int flags;
+ enum netfs_io_origin origin;
+ enum netfs_rreq_trace what;
+ char __data[0];
+};
+
+struct trace_event_raw_netfs_sreq {
+ struct trace_entry ent;
+ unsigned int rreq;
+ short unsigned int index;
+ short int error;
+ short unsigned int flags;
+ enum netfs_io_source source;
+ enum netfs_sreq_trace what;
+ size_t len;
+ size_t transferred;
+ loff_t start;
+ char __data[0];
+};
+
+struct trace_event_raw_netfs_failure {
+ struct trace_entry ent;
+ unsigned int rreq;
+ short int index;
+ short int error;
+ short unsigned int flags;
+ enum netfs_io_source source;
+ enum netfs_failure what;
+ size_t len;
+ size_t transferred;
+ loff_t start;
+ char __data[0];
+};
+
+struct trace_event_raw_netfs_rreq_ref {
+ struct trace_entry ent;
+ unsigned int rreq;
+ int ref;
+ enum netfs_rreq_ref_trace what;
+ char __data[0];
+};
+
+struct trace_event_raw_netfs_sreq_ref {
+ struct trace_entry ent;
+ unsigned int rreq;
+ unsigned int subreq;
+ int ref;
+ enum netfs_sreq_ref_trace what;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_netfs_read {};
+
+struct trace_event_data_offsets_netfs_rreq {};
+
+struct trace_event_data_offsets_netfs_sreq {};
+
+struct trace_event_data_offsets_netfs_failure {};
+
+struct trace_event_data_offsets_netfs_rreq_ref {};
+
+struct trace_event_data_offsets_netfs_sreq_ref {};
+
+typedef void (*btf_trace_netfs_read)(void *, struct netfs_io_request *, loff_t, size_t, enum netfs_read_trace);
+
+typedef void (*btf_trace_netfs_rreq)(void *, struct netfs_io_request *, enum netfs_rreq_trace);
+
+typedef void (*btf_trace_netfs_sreq)(void *, struct netfs_io_subrequest *, enum netfs_sreq_trace);
+
+typedef void (*btf_trace_netfs_failure)(void *, struct netfs_io_request *, struct netfs_io_subrequest *, int, enum netfs_failure);
+
+typedef void (*btf_trace_netfs_rreq_ref)(void *, unsigned int, int, enum netfs_rreq_ref_trace);
+
+typedef void (*btf_trace_netfs_sreq_ref)(void *, unsigned int, unsigned int, int, enum netfs_sreq_ref_trace);
+
+struct netnode_security_struct {
+ union {
+ __be32 ipv4;
+ struct in6_addr ipv6;
+ } addr;
+ u32 sid;
+ u16 family;
+};
+
+struct sel_netnode_bkt {
+ unsigned int size;
+ struct list_head list;
+};
+
+struct sel_netnode {
+ struct netnode_security_struct nsec;
+ struct list_head list;
+ struct callback_head rcu;
+};
+
+struct nvs_region {
+ __u64 phys_start;
+ __u64 size;
+ struct list_head node;
+};
+
+struct nvs_page {
+ long unsigned int phys_start;
+ unsigned int size;
+ void *kaddr;
+ void *data;
+ bool unmap;
+ struct list_head node;
+};
+
+enum acpi_madt_type {
+ ACPI_MADT_TYPE_LOCAL_APIC = 0,
+ ACPI_MADT_TYPE_IO_APIC = 1,
+ ACPI_MADT_TYPE_INTERRUPT_OVERRIDE = 2,
+ ACPI_MADT_TYPE_NMI_SOURCE = 3,
+ ACPI_MADT_TYPE_LOCAL_APIC_NMI = 4,
+ ACPI_MADT_TYPE_LOCAL_APIC_OVERRIDE = 5,
+ ACPI_MADT_TYPE_IO_SAPIC = 6,
+ ACPI_MADT_TYPE_LOCAL_SAPIC = 7,
+ ACPI_MADT_TYPE_INTERRUPT_SOURCE = 8,
+ ACPI_MADT_TYPE_LOCAL_X2APIC = 9,
+ ACPI_MADT_TYPE_LOCAL_X2APIC_NMI = 10,
+ ACPI_MADT_TYPE_GENERIC_INTERRUPT = 11,
+ ACPI_MADT_TYPE_GENERIC_DISTRIBUTOR = 12,
+ ACPI_MADT_TYPE_GENERIC_MSI_FRAME = 13,
+ ACPI_MADT_TYPE_GENERIC_REDISTRIBUTOR = 14,
+ ACPI_MADT_TYPE_GENERIC_TRANSLATOR = 15,
+ ACPI_MADT_TYPE_MULTIPROC_WAKEUP = 16,
+ ACPI_MADT_TYPE_RESERVED = 17,
+ ACPI_MADT_TYPE_OEM_RESERVED = 128,
+};
+
+struct acpi_table_spcr {
+ struct acpi_table_header header;
+ u8 interface_type;
+ u8 reserved[3];
+ struct acpi_generic_address serial_port;
+ u8 interrupt_type;
+ u8 pc_interrupt;
+ u32 interrupt;
+ u8 baud_rate;
+ u8 parity;
+ u8 stop_bits;
+ u8 flow_control;
+ u8 terminal_type;
+ u8 reserved1;
+ u16 pci_device_id;
+ u16 pci_vendor_id;
+ u8 pci_bus;
+ u8 pci_device;
+ u8 pci_function;
+ u32 pci_flags;
+ u8 pci_segment;
+ u32 reserved2;
+} __attribute__((packed));
+
+struct acpi_table_stao {
+ struct acpi_table_header header;
+ u8 ignore_uart;
+} __attribute__((packed));
+
+enum acpi_bus_device_type {
+ ACPI_BUS_TYPE_DEVICE = 0,
+ ACPI_BUS_TYPE_POWER = 1,
+ ACPI_BUS_TYPE_PROCESSOR = 2,
+ ACPI_BUS_TYPE_THERMAL = 3,
+ ACPI_BUS_TYPE_POWER_BUTTON = 4,
+ ACPI_BUS_TYPE_SLEEP_BUTTON = 5,
+ ACPI_BUS_TYPE_ECDT_EC = 6,
+ ACPI_BUS_DEVICE_TYPE_COUNT = 7,
+};
+
+struct acpi_dep_data {
+ struct list_head node;
+ acpi_handle supplier;
+ acpi_handle consumer;
+ bool honor_dep;
+};
+
+struct acpi_probe_entry;
+
+typedef bool (*acpi_probe_entry_validate_subtbl)(struct acpi_subtable_header *, struct acpi_probe_entry *);
+
+struct acpi_probe_entry {
+ __u8 id[5];
+ __u8 type;
+ acpi_probe_entry_validate_subtbl subtable_valid;
+ union {
+ acpi_tbl_table_handler probe_table;
+ acpi_tbl_entry_handler probe_subtbl;
+ };
+ kernel_ulong_t driver_data;
+};
+
+struct acpi_scan_clear_dep_work {
+ struct work_struct work;
+ struct acpi_device *adev;
+};
+
+struct platform_device;
+
+enum pci_ers_result {
+ PCI_ERS_RESULT_NONE = 1,
+ PCI_ERS_RESULT_CAN_RECOVER = 2,
+ PCI_ERS_RESULT_NEED_RESET = 3,
+ PCI_ERS_RESULT_DISCONNECT = 4,
+ PCI_ERS_RESULT_RECOVERED = 5,
+ PCI_ERS_RESULT_NO_AER_DRIVER = 6,
+};
+
+struct pciserial_board {
+ unsigned int flags;
+ unsigned int num_ports;
+ unsigned int base_baud;
+ unsigned int uart_offset;
+ unsigned int reg_shift;
+ unsigned int first_offset;
+};
+
+struct uart_8250_port;
+
+struct uart_8250_ops {
+ int (*setup_irq)(struct uart_8250_port *);
+ void (*release_irq)(struct uart_8250_port *);
+ void (*setup_timer)(struct uart_8250_port *);
+};
+
+struct mctrl_gpios;
+
+struct uart_8250_dma;
+
+struct uart_8250_em485;
+
+struct uart_8250_port {
+ struct uart_port port;
+ struct timer_list timer;
+ struct list_head list;
+ u32 capabilities;
+ short unsigned int bugs;
+ bool fifo_bug;
+ unsigned int tx_loadsz;
+ unsigned char acr;
+ unsigned char fcr;
+ unsigned char ier;
+ unsigned char lcr;
+ unsigned char mcr;
+ unsigned char cur_iotype;
+ unsigned int rpm_tx_active;
+ unsigned char canary;
+ unsigned char probe;
+ struct mctrl_gpios *gpios;
+ u16 lsr_saved_flags;
+ u16 lsr_save_mask;
+ unsigned char msr_saved_flags;
+ struct uart_8250_dma *dma;
+ const struct uart_8250_ops *ops;
+ int (*dl_read)(struct uart_8250_port *);
+ void (*dl_write)(struct uart_8250_port *, int);
+ struct uart_8250_em485 *em485;
+ void (*rs485_start_tx)(struct uart_8250_port *);
+ void (*rs485_stop_tx)(struct uart_8250_port *);
+ struct delayed_work overrun_backoff;
+ u32 overrun_backoff_time_ms;
+};
+
+struct uart_8250_em485 {
+ struct hrtimer start_tx_timer;
+ struct hrtimer stop_tx_timer;
+ struct hrtimer *active_timer;
+ struct uart_8250_port *port;
+ unsigned int tx_stopped: 1;
+};
+
+struct dma_chan___2;
+
+typedef bool (*dma_filter_fn)(struct dma_chan___2 *, void *);
+
+enum dma_transfer_direction {
+ DMA_MEM_TO_MEM = 0,
+ DMA_MEM_TO_DEV = 1,
+ DMA_DEV_TO_MEM = 2,
+ DMA_DEV_TO_DEV = 3,
+ DMA_TRANS_NONE = 4,
+};
+
+enum dma_slave_buswidth {
+ DMA_SLAVE_BUSWIDTH_UNDEFINED = 0,
+ DMA_SLAVE_BUSWIDTH_1_BYTE = 1,
+ DMA_SLAVE_BUSWIDTH_2_BYTES = 2,
+ DMA_SLAVE_BUSWIDTH_3_BYTES = 3,
+ DMA_SLAVE_BUSWIDTH_4_BYTES = 4,
+ DMA_SLAVE_BUSWIDTH_8_BYTES = 8,
+ DMA_SLAVE_BUSWIDTH_16_BYTES = 16,
+ DMA_SLAVE_BUSWIDTH_32_BYTES = 32,
+ DMA_SLAVE_BUSWIDTH_64_BYTES = 64,
+ DMA_SLAVE_BUSWIDTH_128_BYTES = 128,
+};
+
+struct dma_slave_config {
+ enum dma_transfer_direction direction;
+ phys_addr_t src_addr;
+ phys_addr_t dst_addr;
+ enum dma_slave_buswidth src_addr_width;
+ enum dma_slave_buswidth dst_addr_width;
+ u32 src_maxburst;
+ u32 dst_maxburst;
+ u32 src_port_window_size;
+ u32 dst_port_window_size;
+ bool device_fc;
+ void *peripheral_config;
+ size_t peripheral_size;
+};
+
+typedef s32 dma_cookie_t;
+
+struct uart_8250_dma {
+ int (*tx_dma)(struct uart_8250_port *);
+ int (*rx_dma)(struct uart_8250_port *);
+ void (*prepare_tx_dma)(struct uart_8250_port *);
+ void (*prepare_rx_dma)(struct uart_8250_port *);
+ dma_filter_fn fn;
+ void *rx_param;
+ void *tx_param;
+ struct dma_slave_config rxconf;
+ struct dma_slave_config txconf;
+ struct dma_chan___2 *rxchan;
+ struct dma_chan___2 *txchan;
+ phys_addr_t rx_dma_addr;
+ phys_addr_t tx_dma_addr;
+ dma_addr_t rx_addr;
+ dma_addr_t tx_addr;
+ dma_cookie_t rx_cookie;
+ dma_cookie_t tx_cookie;
+ void *rx_buf;
+ size_t rx_size;
+ size_t tx_size;
+ unsigned char tx_running;
+ unsigned char tx_err;
+ unsigned char rx_running;
+};
+
+enum dma_status {
+ DMA_COMPLETE = 0,
+ DMA_IN_PROGRESS = 1,
+ DMA_PAUSED = 2,
+ DMA_ERROR = 3,
+ DMA_OUT_OF_ORDER = 4,
+};
+
+struct data_chunk {
+ size_t size;
+ size_t icg;
+ size_t dst_icg;
+ size_t src_icg;
+};
+
+struct dma_interleaved_template {
+ dma_addr_t src_start;
+ dma_addr_t dst_start;
+ enum dma_transfer_direction dir;
+ bool src_inc;
+ bool dst_inc;
+ bool src_sgl;
+ bool dst_sgl;
+ size_t numf;
+ size_t frame_size;
+ struct data_chunk sgl[0];
+};
+
+enum dma_ctrl_flags {
+ DMA_PREP_INTERRUPT = 1,
+ DMA_CTRL_ACK = 2,
+ DMA_PREP_PQ_DISABLE_P = 4,
+ DMA_PREP_PQ_DISABLE_Q = 8,
+ DMA_PREP_CONTINUE = 16,
+ DMA_PREP_FENCE = 32,
+ DMA_CTRL_REUSE = 64,
+ DMA_PREP_CMD = 128,
+ DMA_PREP_REPEAT = 256,
+ DMA_PREP_LOAD_EOT = 512,
+};
+
+enum sum_check_flags {
+ SUM_CHECK_P_RESULT = 1,
+ SUM_CHECK_Q_RESULT = 2,
+};
+
+typedef struct {
+ long unsigned int bits[1];
+} dma_cap_mask_t;
+
+enum dma_desc_metadata_mode {
+ DESC_METADATA_NONE = 0,
+ DESC_METADATA_CLIENT = 1,
+ DESC_METADATA_ENGINE = 2,
+};
+
+struct dma_chan_percpu {
+ long unsigned int memcpy_count;
+ long unsigned int bytes_transferred;
+};
+
+struct dma_router {
+ struct device *dev;
+ void (*route_free)(struct device *, void *);
+};
+
+struct dma_device;
+
+struct dma_chan_dev;
+
+struct dma_chan___2 {
+ struct dma_device *device;
+ struct device *slave;
+ dma_cookie_t cookie;
+ dma_cookie_t completed_cookie;
+ int chan_id;
+ struct dma_chan_dev *dev;
+ const char *name;
+ char *dbg_client_name;
+ struct list_head device_node;
+ struct dma_chan_percpu *local;
+ int client_count;
+ int table_count;
+ struct dma_router *router;
+ void *route_data;
+ void *private;
+};
+
+struct dma_slave_map;
+
+struct dma_filter {
+ dma_filter_fn fn;
+ int mapcnt;
+ const struct dma_slave_map *map;
+};
+
+enum dmaengine_alignment {
+ DMAENGINE_ALIGN_1_BYTE = 0,
+ DMAENGINE_ALIGN_2_BYTES = 1,
+ DMAENGINE_ALIGN_4_BYTES = 2,
+ DMAENGINE_ALIGN_8_BYTES = 3,
+ DMAENGINE_ALIGN_16_BYTES = 4,
+ DMAENGINE_ALIGN_32_BYTES = 5,
+ DMAENGINE_ALIGN_64_BYTES = 6,
+ DMAENGINE_ALIGN_128_BYTES = 7,
+ DMAENGINE_ALIGN_256_BYTES = 8,
+};
+
+enum dma_residue_granularity {
+ DMA_RESIDUE_GRANULARITY_DESCRIPTOR = 0,
+ DMA_RESIDUE_GRANULARITY_SEGMENT = 1,
+ DMA_RESIDUE_GRANULARITY_BURST = 2,
+};
+
+struct dma_async_tx_descriptor;
+
+struct dma_slave_caps;
+
+struct dma_tx_state;
+
+struct dma_device {
+ struct kref ref;
+ unsigned int chancnt;
+ unsigned int privatecnt;
+ struct list_head channels;
+ struct list_head global_node;
+ struct dma_filter filter;
+ dma_cap_mask_t cap_mask;
+ enum dma_desc_metadata_mode desc_metadata_modes;
+ short unsigned int max_xor;
+ short unsigned int max_pq;
+ enum dmaengine_alignment copy_align;
+ enum dmaengine_alignment xor_align;
+ enum dmaengine_alignment pq_align;
+ enum dmaengine_alignment fill_align;
+ int dev_id;
+ struct device *dev;
+ struct module *owner;
+ struct ida chan_ida;
+ u32 src_addr_widths;
+ u32 dst_addr_widths;
+ u32 directions;
+ u32 min_burst;
+ u32 max_burst;
+ u32 max_sg_burst;
+ bool descriptor_reuse;
+ enum dma_residue_granularity residue_granularity;
+ int (*device_alloc_chan_resources)(struct dma_chan___2 *);
+ int (*device_router_config)(struct dma_chan___2 *);
+ void (*device_free_chan_resources)(struct dma_chan___2 *);
+ struct dma_async_tx_descriptor * (*device_prep_dma_memcpy)(struct dma_chan___2 *, dma_addr_t, dma_addr_t, size_t, long unsigned int);
+ struct dma_async_tx_descriptor * (*device_prep_dma_xor)(struct dma_chan___2 *, dma_addr_t, dma_addr_t *, unsigned int, size_t, long unsigned int);
+ struct dma_async_tx_descriptor * (*device_prep_dma_xor_val)(struct dma_chan___2 *, dma_addr_t *, unsigned int, size_t, enum sum_check_flags *, long unsigned int);
+ struct dma_async_tx_descriptor * (*device_prep_dma_pq)(struct dma_chan___2 *, dma_addr_t *, dma_addr_t *, unsigned int, const unsigned char *, size_t, long unsigned int);
+ struct dma_async_tx_descriptor * (*device_prep_dma_pq_val)(struct dma_chan___2 *, dma_addr_t *, dma_addr_t *, unsigned int, const unsigned char *, size_t, enum sum_check_flags *, long unsigned int);
+ struct dma_async_tx_descriptor * (*device_prep_dma_memset)(struct dma_chan___2 *, dma_addr_t, int, size_t, long unsigned int);
+ struct dma_async_tx_descriptor * (*device_prep_dma_memset_sg)(struct dma_chan___2 *, struct scatterlist *, unsigned int, int, long unsigned int);
+ struct dma_async_tx_descriptor * (*device_prep_dma_interrupt)(struct dma_chan___2 *, long unsigned int);
+ struct dma_async_tx_descriptor * (*device_prep_slave_sg)(struct dma_chan___2 *, struct scatterlist *, unsigned int, enum dma_transfer_direction, long unsigned int, void *);
+ struct dma_async_tx_descriptor * (*device_prep_dma_cyclic)(struct dma_chan___2 *, dma_addr_t, size_t, size_t, enum dma_transfer_direction, long unsigned int);
+ struct dma_async_tx_descriptor * (*device_prep_interleaved_dma)(struct dma_chan___2 *, struct dma_interleaved_template *, long unsigned int);
+ struct dma_async_tx_descriptor * (*device_prep_dma_imm_data)(struct dma_chan___2 *, dma_addr_t, u64, long unsigned int);
+ void (*device_caps)(struct dma_chan___2 *, struct dma_slave_caps *);
+ int (*device_config)(struct dma_chan___2 *, struct dma_slave_config *);
+ int (*device_pause)(struct dma_chan___2 *);
+ int (*device_resume)(struct dma_chan___2 *);
+ int (*device_terminate_all)(struct dma_chan___2 *);
+ void (*device_synchronize)(struct dma_chan___2 *);
+ enum dma_status (*device_tx_status)(struct dma_chan___2 *, dma_cookie_t, struct dma_tx_state *);
+ void (*device_issue_pending)(struct dma_chan___2 *);
+ void (*device_release)(struct dma_device *);
+ void (*dbg_summary_show)(struct seq_file *, struct dma_device *);
+ struct dentry *dbg_dev_root;
+};
+
+struct dma_chan_dev {
+ struct dma_chan___2 *chan;
+ struct device device;
+ int dev_id;
+ bool chan_dma_dev;
+};
+
+struct dma_slave_caps {
+ u32 src_addr_widths;
+ u32 dst_addr_widths;
+ u32 directions;
+ u32 min_burst;
+ u32 max_burst;
+ u32 max_sg_burst;
+ bool cmd_pause;
+ bool cmd_resume;
+ bool cmd_terminate;
+ enum dma_residue_granularity residue_granularity;
+ bool descriptor_reuse;
+};
+
+typedef void (*dma_async_tx_callback)(void *);
+
+enum dmaengine_tx_result {
+ DMA_TRANS_NOERROR = 0,
+ DMA_TRANS_READ_FAILED = 1,
+ DMA_TRANS_WRITE_FAILED = 2,
+ DMA_TRANS_ABORTED = 3,
+};
+
+struct dmaengine_result {
+ enum dmaengine_tx_result result;
+ u32 residue;
+};
+
+typedef void (*dma_async_tx_callback_result)(void *, const struct dmaengine_result *);
+
+struct dmaengine_unmap_data {
+ u8 map_cnt;
+ u8 to_cnt;
+ u8 from_cnt;
+ u8 bidi_cnt;
+ struct device *dev;
+ struct kref kref;
+ size_t len;
+ dma_addr_t addr[0];
+};
+
+struct dma_descriptor_metadata_ops {
+ int (*attach)(struct dma_async_tx_descriptor *, void *, size_t);
+ void * (*get_ptr)(struct dma_async_tx_descriptor *, size_t *, size_t *);
+ int (*set_len)(struct dma_async_tx_descriptor *, size_t);
+};
+
+struct dma_async_tx_descriptor {
+ dma_cookie_t cookie;
+ enum dma_ctrl_flags flags;
+ dma_addr_t phys;
+ struct dma_chan___2 *chan;
+ dma_cookie_t (*tx_submit)(struct dma_async_tx_descriptor *);
+ int (*desc_free)(struct dma_async_tx_descriptor *);
+ dma_async_tx_callback callback;
+ dma_async_tx_callback_result callback_result;
+ void *callback_param;
+ struct dmaengine_unmap_data *unmap;
+ enum dma_desc_metadata_mode desc_metadata_mode;
+ struct dma_descriptor_metadata_ops *metadata_ops;
+};
+
+struct dma_tx_state {
+ dma_cookie_t last;
+ dma_cookie_t used;
+ u32 residue;
+ u32 in_flight_bytes;
+};
+
+struct dma_slave_map {
+ const char *devname;
+ const char *slave;
+ void *param;
+};
+
+struct serial_private;
+
+struct pci_serial_quirk {
+ u32 vendor;
+ u32 device;
+ u32 subvendor;
+ u32 subdevice;
+ int (*probe)(struct pci_dev *);
+ int (*init)(struct pci_dev *);
+ int (*setup)(struct serial_private *, const struct pciserial_board *, struct uart_8250_port *, int);
+ void (*exit)(struct pci_dev *);
+};
+
+struct serial_private {
+ struct pci_dev *dev;
+ unsigned int nr;
+ struct pci_serial_quirk *quirk;
+ const struct pciserial_board *board;
+ int line[0];
+};
+
+struct f815xxa_data {
+ spinlock_t lock;
+ int idx;
+};
+
+struct timedia_struct {
+ int num;
+ const short unsigned int *ids;
+};
+
+enum pci_board_num_t {
+ pbn_default = 0,
+ pbn_b0_1_115200 = 1,
+ pbn_b0_2_115200 = 2,
+ pbn_b0_4_115200 = 3,
+ pbn_b0_5_115200 = 4,
+ pbn_b0_8_115200 = 5,
+ pbn_b0_1_921600 = 6,
+ pbn_b0_2_921600 = 7,
+ pbn_b0_4_921600 = 8,
+ pbn_b0_2_1130000 = 9,
+ pbn_b0_4_1152000 = 10,
+ pbn_b0_4_1250000 = 11,
+ pbn_b0_2_1843200 = 12,
+ pbn_b0_4_1843200 = 13,
+ pbn_b0_1_15625000 = 14,
+ pbn_b0_bt_1_115200 = 15,
+ pbn_b0_bt_2_115200 = 16,
+ pbn_b0_bt_4_115200 = 17,
+ pbn_b0_bt_8_115200 = 18,
+ pbn_b0_bt_1_460800 = 19,
+ pbn_b0_bt_2_460800 = 20,
+ pbn_b0_bt_4_460800 = 21,
+ pbn_b0_bt_1_921600 = 22,
+ pbn_b0_bt_2_921600 = 23,
+ pbn_b0_bt_4_921600 = 24,
+ pbn_b0_bt_8_921600 = 25,
+ pbn_b1_1_115200 = 26,
+ pbn_b1_2_115200 = 27,
+ pbn_b1_4_115200 = 28,
+ pbn_b1_8_115200 = 29,
+ pbn_b1_16_115200 = 30,
+ pbn_b1_1_921600 = 31,
+ pbn_b1_2_921600 = 32,
+ pbn_b1_4_921600 = 33,
+ pbn_b1_8_921600 = 34,
+ pbn_b1_2_1250000 = 35,
+ pbn_b1_bt_1_115200 = 36,
+ pbn_b1_bt_2_115200 = 37,
+ pbn_b1_bt_4_115200 = 38,
+ pbn_b1_bt_2_921600 = 39,
+ pbn_b1_1_1382400 = 40,
+ pbn_b1_2_1382400 = 41,
+ pbn_b1_4_1382400 = 42,
+ pbn_b1_8_1382400 = 43,
+ pbn_b2_1_115200 = 44,
+ pbn_b2_2_115200 = 45,
+ pbn_b2_4_115200 = 46,
+ pbn_b2_8_115200 = 47,
+ pbn_b2_1_460800 = 48,
+ pbn_b2_4_460800 = 49,
+ pbn_b2_8_460800 = 50,
+ pbn_b2_16_460800 = 51,
+ pbn_b2_1_921600 = 52,
+ pbn_b2_4_921600 = 53,
+ pbn_b2_8_921600 = 54,
+ pbn_b2_8_1152000 = 55,
+ pbn_b2_bt_1_115200 = 56,
+ pbn_b2_bt_2_115200 = 57,
+ pbn_b2_bt_4_115200 = 58,
+ pbn_b2_bt_2_921600 = 59,
+ pbn_b2_bt_4_921600 = 60,
+ pbn_b3_2_115200 = 61,
+ pbn_b3_4_115200 = 62,
+ pbn_b3_8_115200 = 63,
+ pbn_b4_bt_2_921600 = 64,
+ pbn_b4_bt_4_921600 = 65,
+ pbn_b4_bt_8_921600 = 66,
+ pbn_panacom = 67,
+ pbn_panacom2 = 68,
+ pbn_panacom4 = 69,
+ pbn_plx_romulus = 70,
+ pbn_oxsemi = 71,
+ pbn_oxsemi_1_15625000 = 72,
+ pbn_oxsemi_2_15625000 = 73,
+ pbn_oxsemi_4_15625000 = 74,
+ pbn_oxsemi_8_15625000 = 75,
+ pbn_intel_i960 = 76,
+ pbn_sgi_ioc3 = 77,
+ pbn_computone_4 = 78,
+ pbn_computone_6 = 79,
+ pbn_computone_8 = 80,
+ pbn_sbsxrsio = 81,
+ pbn_pasemi_1682M = 82,
+ pbn_ni8430_2 = 83,
+ pbn_ni8430_4 = 84,
+ pbn_ni8430_8 = 85,
+ pbn_ni8430_16 = 86,
+ pbn_ADDIDATA_PCIe_1_3906250 = 87,
+ pbn_ADDIDATA_PCIe_2_3906250 = 88,
+ pbn_ADDIDATA_PCIe_4_3906250 = 89,
+ pbn_ADDIDATA_PCIe_8_3906250 = 90,
+ pbn_ce4100_1_115200 = 91,
+ pbn_omegapci = 92,
+ pbn_NETMOS9900_2s_115200 = 93,
+ pbn_brcm_trumanage = 94,
+ pbn_fintek_4 = 95,
+ pbn_fintek_8 = 96,
+ pbn_fintek_12 = 97,
+ pbn_fintek_F81504A = 98,
+ pbn_fintek_F81508A = 99,
+ pbn_fintek_F81512A = 100,
+ pbn_wch382_2 = 101,
+ pbn_wch384_4 = 102,
+ pbn_wch384_8 = 103,
+ pbn_sunix_pci_1s = 104,
+ pbn_sunix_pci_2s = 105,
+ pbn_sunix_pci_4s = 106,
+ pbn_sunix_pci_8s = 107,
+ pbn_sunix_pci_16s = 108,
+ pbn_titan_1_4000000 = 109,
+ pbn_titan_2_4000000 = 110,
+ pbn_titan_4_4000000 = 111,
+ pbn_titan_8_4000000 = 112,
+ pbn_moxa8250_2p = 113,
+ pbn_moxa8250_4p = 114,
+ pbn_moxa8250_8p = 115,
+};
+
+struct trace_event_raw_dma_fence {
+ struct trace_entry ent;
+ u32 __data_loc_driver;
+ u32 __data_loc_timeline;
+ unsigned int context;
+ unsigned int seqno;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_dma_fence {
+ u32 driver;
+ u32 timeline;
+};
+
+typedef void (*btf_trace_dma_fence_emit)(void *, struct dma_fence *);
+
+typedef void (*btf_trace_dma_fence_init)(void *, struct dma_fence *);
+
+typedef void (*btf_trace_dma_fence_destroy)(void *, struct dma_fence *);
+
+typedef void (*btf_trace_dma_fence_enable_signal)(void *, struct dma_fence *);
+
+typedef void (*btf_trace_dma_fence_signaled)(void *, struct dma_fence *);
+
+typedef void (*btf_trace_dma_fence_wait_start)(void *, struct dma_fence *);
+
+typedef void (*btf_trace_dma_fence_wait_end)(void *, struct dma_fence *);
+
+struct default_wait_cb {
+ struct dma_fence_cb base;
+ struct task_struct *task;
+};
+
+enum rc_driver_type {
+ RC_DRIVER_SCANCODE = 0,
+ RC_DRIVER_IR_RAW = 1,
+ RC_DRIVER_IR_RAW_TX = 2,
+};
+
+struct rc_scancode_filter {
+ u32 data;
+ u32 mask;
+};
+
+struct ir_raw_event_ctrl;
+
+struct rc_dev {
+ struct device dev;
+ bool managed_alloc;
+ const struct attribute_group *sysfs_groups[5];
+ const char *device_name;
+ const char *input_phys;
+ struct input_id input_id;
+ const char *driver_name;
+ const char *map_name;
+ struct rc_map rc_map;
+ struct mutex lock;
+ unsigned int minor;
+ struct ir_raw_event_ctrl *raw;
+ struct input_dev *input_dev;
+ enum rc_driver_type driver_type;
+ bool idle;
+ bool encode_wakeup;
+ u64 allowed_protocols;
+ u64 enabled_protocols;
+ u64 allowed_wakeup_protocols;
+ enum rc_proto wakeup_protocol;
+ struct rc_scancode_filter scancode_filter;
+ struct rc_scancode_filter scancode_wakeup_filter;
+ u32 scancode_mask;
+ u32 users;
+ void *priv;
+ spinlock_t keylock;
+ bool keypressed;
+ long unsigned int keyup_jiffies;
+ struct timer_list timer_keyup;
+ struct timer_list timer_repeat;
+ u32 last_keycode;
+ enum rc_proto last_protocol;
+ u64 last_scancode;
+ u8 last_toggle;
+ u32 timeout;
+ u32 min_timeout;
+ u32 max_timeout;
+ u32 rx_resolution;
+ u32 tx_resolution;
+ struct device lirc_dev;
+ struct cdev lirc_cdev;
+ ktime_t gap_start;
+ spinlock_t lirc_fh_lock;
+ struct list_head lirc_fh;
+ bool registered;
+ int (*change_protocol)(struct rc_dev *, u64 *);
+ int (*open)(struct rc_dev *);
+ void (*close)(struct rc_dev *);
+ int (*s_tx_mask)(struct rc_dev *, u32);
+ int (*s_tx_carrier)(struct rc_dev *, u32);
+ int (*s_tx_duty_cycle)(struct rc_dev *, u32);
+ int (*s_rx_carrier_range)(struct rc_dev *, u32, u32);
+ int (*tx_ir)(struct rc_dev *, unsigned int *, unsigned int);
+ void (*s_idle)(struct rc_dev *, bool);
+ int (*s_wideband_receiver)(struct rc_dev *, int);
+ int (*s_carrier_report)(struct rc_dev *, int);
+ int (*s_filter)(struct rc_dev *, struct rc_scancode_filter *);
+ int (*s_wakeup_filter)(struct rc_dev *, struct rc_scancode_filter *);
+ int (*s_timeout)(struct rc_dev *, unsigned int);
+};
+
+struct ir_raw_event {
+ union {
+ u32 duration;
+ u32 carrier;
+ };
+ u8 duty_cycle;
+ unsigned int pulse: 1;
+ unsigned int overflow: 1;
+ unsigned int timeout: 1;
+ unsigned int carrier_report: 1;
+};
+
+struct ir_raw_event_ctrl {
+ struct list_head list;
+ struct task_struct *thread;
+ struct {
+ union {
+ struct __kfifo kfifo;
+ struct ir_raw_event *type;
+ const struct ir_raw_event *const_type;
+ char (*rectype)[0];
+ struct ir_raw_event *ptr;
+ const struct ir_raw_event *ptr_const;
+ };
+ struct ir_raw_event buf[512];
+ } kfifo;
+ ktime_t last_event;
+ struct rc_dev *dev;
+ spinlock_t edge_spinlock;
+ struct timer_list edge_handle;
+ struct ir_raw_event prev_ev;
+ struct ir_raw_event this_ev;
+ u32 bpf_sample;
+ struct bpf_prog_array *progs;
+};
+
+struct ir_raw_handler {
+ struct list_head list;
+ u64 protocols;
+ int (*decode)(struct rc_dev *, struct ir_raw_event);
+ int (*encode)(enum rc_proto, u32, struct ir_raw_event *, unsigned int);
+ u32 carrier;
+ u32 min_timeout;
+ int (*raw_register)(struct rc_dev *);
+ int (*raw_unregister)(struct rc_dev *);
+};
+
+struct ir_raw_timings_manchester {
+ unsigned int leader_pulse;
+ unsigned int leader_space;
+ unsigned int clock;
+ unsigned int invert: 1;
+ unsigned int trailer_space;
+};
+
+struct ir_raw_timings_pd {
+ unsigned int header_pulse;
+ unsigned int header_space;
+ unsigned int bit_pulse;
+ unsigned int bit_space[2];
+ unsigned int trailer_pulse;
+ unsigned int trailer_space;
+ unsigned int msb_first: 1;
+};
+
+struct ir_raw_timings_pl {
+ unsigned int header_pulse;
+ unsigned int bit_space;
+ unsigned int bit_pulse[2];
+ unsigned int trailer_space;
+ unsigned int msb_first: 1;
+};
+
+enum {
+ ETHTOOL_A_STRING_UNSPEC = 0,
+ ETHTOOL_A_STRING_INDEX = 1,
+ ETHTOOL_A_STRING_VALUE = 2,
+ __ETHTOOL_A_STRING_CNT = 3,
+ ETHTOOL_A_STRING_MAX = 2,
+};
+
+enum {
+ ETHTOOL_A_STRINGS_UNSPEC = 0,
+ ETHTOOL_A_STRINGS_STRING = 1,
+ __ETHTOOL_A_STRINGS_CNT = 2,
+ ETHTOOL_A_STRINGS_MAX = 1,
+};
+
+enum {
+ ETHTOOL_A_STRINGSET_UNSPEC = 0,
+ ETHTOOL_A_STRINGSET_ID = 1,
+ ETHTOOL_A_STRINGSET_COUNT = 2,
+ ETHTOOL_A_STRINGSET_STRINGS = 3,
+ __ETHTOOL_A_STRINGSET_CNT = 4,
+ ETHTOOL_A_STRINGSET_MAX = 3,
+};
+
+enum {
+ ETHTOOL_A_STRINGSETS_UNSPEC = 0,
+ ETHTOOL_A_STRINGSETS_STRINGSET = 1,
+ __ETHTOOL_A_STRINGSETS_CNT = 2,
+ ETHTOOL_A_STRINGSETS_MAX = 1,
+};
+
+struct strset_info {
+ bool per_dev;
+ bool free_strings;
+ unsigned int count;
+ const char (*strings)[32];
+};
+
+struct strset_req_info {
+ struct ethnl_req_info base;
+ u32 req_ids;
+ bool counts_only;
+};
+
+struct strset_reply_data {
+ struct ethnl_reply_data base;
+ struct strset_info sets[21];
+};
+
+enum ct_dccp_roles {
+ CT_DCCP_ROLE_CLIENT = 0,
+ CT_DCCP_ROLE_SERVER = 1,
+ __CT_DCCP_ROLE_MAX = 2,
+};
+
+struct dccp_hdr_ext {
+ __be32 dccph_seq_low;
+};
+
+struct dccp_hdr_ack_bits {
+ __be16 dccph_reserved1;
+ __be16 dccph_ack_nr_high;
+ __be32 dccph_ack_nr_low;
+};
+
+enum dccp_pkt_type {
+ DCCP_PKT_REQUEST = 0,
+ DCCP_PKT_RESPONSE = 1,
+ DCCP_PKT_DATA = 2,
+ DCCP_PKT_ACK = 3,
+ DCCP_PKT_DATAACK = 4,
+ DCCP_PKT_CLOSEREQ = 5,
+ DCCP_PKT_CLOSE = 6,
+ DCCP_PKT_RESET = 7,
+ DCCP_PKT_SYNC = 8,
+ DCCP_PKT_SYNCACK = 9,
+ DCCP_PKT_INVALID = 10,
+};
+
+struct inet_diag_sockid {
+ __be16 idiag_sport;
+ __be16 idiag_dport;
+ __be32 idiag_src[4];
+ __be32 idiag_dst[4];
+ __u32 idiag_if;
+ __u32 idiag_cookie[2];
+};
+
+struct inet_diag_req_v2 {
+ __u8 sdiag_family;
+ __u8 sdiag_protocol;
+ __u8 idiag_ext;
+ __u8 pad;
+ __u32 idiag_states;
+ struct inet_diag_sockid id;
+};
+
+struct inet_diag_msg {
+ __u8 idiag_family;
+ __u8 idiag_state;
+ __u8 idiag_timer;
+ __u8 idiag_retrans;
+ struct inet_diag_sockid id;
+ __u32 idiag_expires;
+ __u32 idiag_rqueue;
+ __u32 idiag_wqueue;
+ __u32 idiag_uid;
+ __u32 idiag_inode;
+};
+
+enum {
+ INET_DIAG_NONE = 0,
+ INET_DIAG_MEMINFO = 1,
+ INET_DIAG_INFO = 2,
+ INET_DIAG_VEGASINFO = 3,
+ INET_DIAG_CONG = 4,
+ INET_DIAG_TOS = 5,
+ INET_DIAG_TCLASS = 6,
+ INET_DIAG_SKMEMINFO = 7,
+ INET_DIAG_SHUTDOWN = 8,
+ INET_DIAG_DCTCPINFO = 9,
+ INET_DIAG_PROTOCOL = 10,
+ INET_DIAG_SKV6ONLY = 11,
+ INET_DIAG_LOCALS = 12,
+ INET_DIAG_PEERS = 13,
+ INET_DIAG_PAD = 14,
+ INET_DIAG_MARK = 15,
+ INET_DIAG_BBRINFO = 16,
+ INET_DIAG_CLASS_ID = 17,
+ INET_DIAG_MD5SIG = 18,
+ INET_DIAG_ULP_INFO = 19,
+ INET_DIAG_SK_BPF_STORAGES = 20,
+ INET_DIAG_CGROUP_ID = 21,
+ INET_DIAG_SOCKOPT = 22,
+ __INET_DIAG_MAX = 23,
+};
+
+enum {
+ INET_ULP_INFO_UNSPEC = 0,
+ INET_ULP_INFO_NAME = 1,
+ INET_ULP_INFO_TLS = 2,
+ INET_ULP_INFO_MPTCP = 3,
+ __INET_ULP_INFO_MAX = 4,
+};
+
+struct tcpvegas_info {
+ __u32 tcpv_enabled;
+ __u32 tcpv_rttcnt;
+ __u32 tcpv_rtt;
+ __u32 tcpv_minrtt;
+};
+
+struct tcp_dctcp_info {
+ __u16 dctcp_enabled;
+ __u16 dctcp_ce_state;
+ __u32 dctcp_alpha;
+ __u32 dctcp_ab_ecn;
+ __u32 dctcp_ab_tot;
+};
+
+struct tcp_bbr_info {
+ __u32 bbr_bw_lo;
+ __u32 bbr_bw_hi;
+ __u32 bbr_min_rtt;
+ __u32 bbr_pacing_gain;
+ __u32 bbr_cwnd_gain;
+};
+
+union tcp_cc_info {
+ struct tcpvegas_info vegas;
+ struct tcp_dctcp_info dctcp;
+ struct tcp_bbr_info bbr;
+};
+
+struct inet_diag_handler {
+ void (*dump)(struct sk_buff *, struct netlink_callback *, const struct inet_diag_req_v2 *);
+ int (*dump_one)(struct netlink_callback *, const struct inet_diag_req_v2 *);
+ void (*idiag_get_info)(struct sock *, struct inet_diag_msg *, void *);
+ int (*idiag_get_aux)(struct sock *, bool, struct sk_buff *);
+ size_t (*idiag_get_aux_size)(struct sock *, bool);
+ int (*destroy)(struct sk_buff *, const struct inet_diag_req_v2 *);
+ __u16 idiag_type;
+ __u16 idiag_info_size;
+};
+
+struct tcp_diag_md5sig {
+ __u8 tcpm_family;
+ __u8 tcpm_prefixlen;
+ __u16 tcpm_keylen;
+ __be32 tcpm_addr[4];
+ __u8 tcpm_key[80];
+};
+
+struct in6_flowlabel_req {
+ struct in6_addr flr_dst;
+ __be32 flr_label;
+ __u8 flr_action;
+ __u8 flr_share;
+ __u16 flr_flags;
+ __u16 flr_expires;
+ __u16 flr_linger;
+ __u32 __flr_pad;
+};
+
+struct ip6fl_iter_state {
+ struct seq_net_private p;
+ struct pid_namespace *pid_ns;
+ int bucket;
+};
+
+enum {
+ NLBL_CIPSOV4_C_UNSPEC = 0,
+ NLBL_CIPSOV4_C_ADD = 1,
+ NLBL_CIPSOV4_C_REMOVE = 2,
+ NLBL_CIPSOV4_C_LIST = 3,
+ NLBL_CIPSOV4_C_LISTALL = 4,
+ __NLBL_CIPSOV4_C_MAX = 5,
+};
+
+enum {
+ NLBL_CIPSOV4_A_UNSPEC = 0,
+ NLBL_CIPSOV4_A_DOI = 1,
+ NLBL_CIPSOV4_A_MTYPE = 2,
+ NLBL_CIPSOV4_A_TAG = 3,
+ NLBL_CIPSOV4_A_TAGLST = 4,
+ NLBL_CIPSOV4_A_MLSLVLLOC = 5,
+ NLBL_CIPSOV4_A_MLSLVLREM = 6,
+ NLBL_CIPSOV4_A_MLSLVL = 7,
+ NLBL_CIPSOV4_A_MLSLVLLST = 8,
+ NLBL_CIPSOV4_A_MLSCATLOC = 9,
+ NLBL_CIPSOV4_A_MLSCATREM = 10,
+ NLBL_CIPSOV4_A_MLSCAT = 11,
+ NLBL_CIPSOV4_A_MLSCATLST = 12,
+ __NLBL_CIPSOV4_A_MAX = 13,
+};
+
+struct netlbl_domaddr_map {
+ struct list_head list4;
+ struct list_head list6;
+};
+
+struct netlbl_dommap_def {
+ u32 type;
+ union {
+ struct netlbl_domaddr_map *addrsel;
+ struct cipso_v4_doi *cipso;
+ struct calipso_doi *calipso;
+ };
+};
+
+struct netlbl_dom_map {
+ char *domain;
+ u16 family;
+ struct netlbl_dommap_def def;
+ u32 valid;
+ struct list_head list;
+ struct callback_head rcu;
+};
+
+struct netlbl_cipsov4_doiwalk_arg {
+ struct netlink_callback *nl_cb;
+ struct sk_buff *skb;
+ u32 seq;
+};
+
+struct netlbl_domhsh_walk_arg {
+ struct netlbl_audit *audit_info;
+ u32 doi;
+};
+
+struct apic_chip_data {
+ struct irq_cfg hw_irq_cfg;
+ unsigned int vector;
+ unsigned int prev_vector;
+ unsigned int cpu;
+ unsigned int prev_cpu;
+ unsigned int irq;
+ struct hlist_node clist;
+ unsigned int move_in_progress: 1;
+ unsigned int is_managed: 1;
+ unsigned int can_reserve: 1;
+ unsigned int has_reserved: 1;
+};
+
+struct irq_matrix;
+
+struct idmap_key {
+ bool map_up;
+ u32 id;
+ u32 count;
+};
+
+enum {
+ TRACE_NOP_OPT_ACCEPT = 1,
+ TRACE_NOP_OPT_REFUSE = 2,
+};
+
+typedef int (*print_type_func_t)(struct trace_seq *, void *, void *);
+
+enum fetch_op {
+ FETCH_OP_NOP = 0,
+ FETCH_OP_REG = 1,
+ FETCH_OP_STACK = 2,
+ FETCH_OP_STACKP = 3,
+ FETCH_OP_RETVAL = 4,
+ FETCH_OP_IMM = 5,
+ FETCH_OP_COMM = 6,
+ FETCH_OP_ARG = 7,
+ FETCH_OP_FOFFS = 8,
+ FETCH_OP_DATA = 9,
+ FETCH_OP_DEREF = 10,
+ FETCH_OP_UDEREF = 11,
+ FETCH_OP_ST_RAW = 12,
+ FETCH_OP_ST_MEM = 13,
+ FETCH_OP_ST_UMEM = 14,
+ FETCH_OP_ST_STRING = 15,
+ FETCH_OP_ST_USTRING = 16,
+ FETCH_OP_MOD_BF = 17,
+ FETCH_OP_LP_ARRAY = 18,
+ FETCH_OP_TP_ARG = 19,
+ FETCH_OP_END = 20,
+ FETCH_NOP_SYMBOL = 21,
+};
+
+struct fetch_insn {
+ enum fetch_op op;
+ union {
+ unsigned int param;
+ struct {
+ unsigned int size;
+ int offset;
+ };
+ struct {
+ unsigned char basesize;
+ unsigned char lshift;
+ unsigned char rshift;
+ };
+ long unsigned int immediate;
+ void *data;
+ };
+};
+
+struct fetch_type {
+ const char *name;
+ size_t size;
+ int is_signed;
+ print_type_func_t print;
+ const char *fmt;
+ const char *fmttype;
+};
+
+struct probe_arg {
+ struct fetch_insn *code;
+ bool dynamic;
+ unsigned int offset;
+ unsigned int count;
+ const char *name;
+ const char *comm;
+ char *fmt;
+ const struct fetch_type *type;
+};
+
+struct trace_uprobe_filter {
+ rwlock_t rwlock;
+ int nr_systemwide;
+ struct list_head perf_events;
+};
+
+struct trace_probe_event {
+ unsigned int flags;
+ struct trace_event_class class;
+ struct trace_event_call call;
+ struct list_head files;
+ struct list_head probes;
+ struct trace_uprobe_filter filter[0];
+};
+
+struct trace_probe {
+ struct list_head list;
+ struct trace_probe_event *event;
+ ssize_t size;
+ unsigned int nr_args;
+ struct probe_arg args[0];
+};
+
+struct event_file_link {
+ struct trace_event_file *file;
+ struct list_head list;
+};
+
+enum probe_print_type {
+ PROBE_PRINT_NORMAL = 0,
+ PROBE_PRINT_RETURN = 1,
+ PROBE_PRINT_EVENT = 2,
+};
+
+enum {
+ TP_ERR_FILE_NOT_FOUND = 0,
+ TP_ERR_NO_REGULAR_FILE = 1,
+ TP_ERR_BAD_REFCNT = 2,
+ TP_ERR_REFCNT_OPEN_BRACE = 3,
+ TP_ERR_BAD_REFCNT_SUFFIX = 4,
+ TP_ERR_BAD_UPROBE_OFFS = 5,
+ TP_ERR_MAXACT_NO_KPROBE = 6,
+ TP_ERR_BAD_MAXACT = 7,
+ TP_ERR_MAXACT_TOO_BIG = 8,
+ TP_ERR_BAD_PROBE_ADDR = 9,
+ TP_ERR_BAD_RETPROBE = 10,
+ TP_ERR_BAD_ADDR_SUFFIX = 11,
+ TP_ERR_NO_GROUP_NAME = 12,
+ TP_ERR_GROUP_TOO_LONG = 13,
+ TP_ERR_BAD_GROUP_NAME = 14,
+ TP_ERR_NO_EVENT_NAME = 15,
+ TP_ERR_EVENT_TOO_LONG = 16,
+ TP_ERR_BAD_EVENT_NAME = 17,
+ TP_ERR_EVENT_EXIST = 18,
+ TP_ERR_RETVAL_ON_PROBE = 19,
+ TP_ERR_BAD_STACK_NUM = 20,
+ TP_ERR_BAD_ARG_NUM = 21,
+ TP_ERR_BAD_VAR = 22,
+ TP_ERR_BAD_REG_NAME = 23,
+ TP_ERR_BAD_MEM_ADDR = 24,
+ TP_ERR_BAD_IMM = 25,
+ TP_ERR_IMMSTR_NO_CLOSE = 26,
+ TP_ERR_FILE_ON_KPROBE = 27,
+ TP_ERR_BAD_FILE_OFFS = 28,
+ TP_ERR_SYM_ON_UPROBE = 29,
+ TP_ERR_TOO_MANY_OPS = 30,
+ TP_ERR_DEREF_NEED_BRACE = 31,
+ TP_ERR_BAD_DEREF_OFFS = 32,
+ TP_ERR_DEREF_OPEN_BRACE = 33,
+ TP_ERR_COMM_CANT_DEREF = 34,
+ TP_ERR_BAD_FETCH_ARG = 35,
+ TP_ERR_ARRAY_NO_CLOSE = 36,
+ TP_ERR_BAD_ARRAY_SUFFIX = 37,
+ TP_ERR_BAD_ARRAY_NUM = 38,
+ TP_ERR_ARRAY_TOO_BIG = 39,
+ TP_ERR_BAD_TYPE = 40,
+ TP_ERR_BAD_STRING = 41,
+ TP_ERR_BAD_BITFIELD = 42,
+ TP_ERR_ARG_NAME_TOO_LONG = 43,
+ TP_ERR_NO_ARG_NAME = 44,
+ TP_ERR_BAD_ARG_NAME = 45,
+ TP_ERR_USED_ARG_NAME = 46,
+ TP_ERR_ARG_TOO_LONG = 47,
+ TP_ERR_NO_ARG_BODY = 48,
+ TP_ERR_BAD_INSN_BNDRY = 49,
+ TP_ERR_FAIL_REG_PROBE = 50,
+ TP_ERR_DIFF_PROBE_TYPE = 51,
+ TP_ERR_DIFF_ARG_TYPE = 52,
+ TP_ERR_SAME_PROBE = 53,
+ TP_ERR_NO_EVENT_INFO = 54,
+ TP_ERR_BAD_ATTACH_EVENT = 55,
+ TP_ERR_BAD_ATTACH_ARG = 56,
+ TP_ERR_NO_EP_FILTER = 57,
+};
+
+struct trace_probe_log {
+ const char *subsystem;
+ const char **argv;
+ int argc;
+ int index;
+};
+
+enum perf_callchain_context {
+ PERF_CONTEXT_HV = 18446744073709551584ULL,
+ PERF_CONTEXT_KERNEL = 18446744073709551488ULL,
+ PERF_CONTEXT_USER = 18446744073709551104ULL,
+ PERF_CONTEXT_GUEST = 18446744073709549568ULL,
+ PERF_CONTEXT_GUEST_KERNEL = 18446744073709549440ULL,
+ PERF_CONTEXT_GUEST_USER = 18446744073709549056ULL,
+ PERF_CONTEXT_MAX = 18446744073709547521ULL,
+};
+
+struct callchain_cpus_entries {
+ struct callback_head callback_head;
+ struct perf_callchain_entry *cpu_entries[0];
+};
+
+typedef struct {
+ long unsigned int fds_bits[16];
+} __kernel_fd_set;
+
+typedef __kernel_fd_set fd_set;
+
+struct old_timeval32 {
+ old_time32_t tv_sec;
+ s32 tv_usec;
+};
+
+struct poll_table_entry {
+ struct file *filp;
+ __poll_t key;
+ wait_queue_entry_t wait;
+ wait_queue_head_t *wait_address;
+};
+
+struct poll_table_page;
+
+struct poll_wqueues {
+ poll_table pt;
+ struct poll_table_page *table;
+ struct task_struct *polling_task;
+ int triggered;
+ int error;
+ int inline_index;
+ struct poll_table_entry inline_entries[9];
+};
+
+struct poll_table_page {
+ struct poll_table_page *next;
+ struct poll_table_entry *entry;
+ struct poll_table_entry entries[0];
+};
+
+enum poll_time_type {
+ PT_TIMEVAL = 0,
+ PT_OLD_TIMEVAL = 1,
+ PT_TIMESPEC = 2,
+ PT_OLD_TIMESPEC = 3,
+};
+
+typedef struct {
+ long unsigned int *in;
+ long unsigned int *out;
+ long unsigned int *ex;
+ long unsigned int *res_in;
+ long unsigned int *res_out;
+ long unsigned int *res_ex;
+} fd_set_bits;
+
+struct sigset_argpack {
+ sigset_t *p;
+ size_t size;
+};
+
+struct poll_list {
+ struct poll_list *next;
+ int len;
+ struct pollfd entries[0];
+};
+
+struct fault_attr {
+ long unsigned int probability;
+ long unsigned int interval;
+ atomic_t times;
+ atomic_t space;
+ long unsigned int verbose;
+ bool task_filter;
+ long unsigned int stacktrace_depth;
+ long unsigned int require_start;
+ long unsigned int require_end;
+ long unsigned int reject_start;
+ long unsigned int reject_end;
+ long unsigned int count;
+ struct ratelimit_state ratelimit_state;
+ struct dentry *dname;
+};
+
+enum fault_flags {
+ FAULT_NOWARN = 1,
+};
+
+enum pci_mmap_state {
+ pci_mmap_io = 0,
+ pci_mmap_mem = 1,
+};
+
+enum pci_mmap_api {
+ PCI_MMAP_SYSFS = 0,
+ PCI_MMAP_PROCFS = 1,
+};
+
+struct pci_filp_private {
+ enum pci_mmap_state mmap_state;
+ int write_combine;
+};
+
+struct acpi_data_node_attr {
+ struct attribute attr;
+ ssize_t (*show)(struct acpi_data_node *, char *);
+ ssize_t (*store)(struct acpi_data_node *, const char *, size_t);
+};
+
+struct pts_fs_info;
+
+struct fwnode_link {
+ struct fwnode_handle *supplier;
+ struct list_head s_hook;
+ struct fwnode_handle *consumer;
+ struct list_head c_hook;
+};
+
+struct dev_printk_info {
+ char subsystem[16];
+ char device[48];
+};
+
+enum dpm_order {
+ DPM_ORDER_NONE = 0,
+ DPM_ORDER_DEV_AFTER_PARENT = 1,
+ DPM_ORDER_PARENT_BEFORE_DEV = 2,
+ DPM_ORDER_DEV_LAST = 3,
+};
+
+struct dev_ext_attribute {
+ struct device_attribute attr;
+ void *var;
+};
+
+enum device_link_state {
+ DL_STATE_NONE = -1,
+ DL_STATE_DORMANT = 0,
+ DL_STATE_AVAILABLE = 1,
+ DL_STATE_CONSUMER_PROBE = 2,
+ DL_STATE_ACTIVE = 3,
+ DL_STATE_SUPPLIER_UNBIND = 4,
+};
+
+struct device_link {
+ struct device *supplier;
+ struct list_head s_node;
+ struct device *consumer;
+ struct list_head c_node;
+ struct device link_dev;
+ enum device_link_state status;
+ u32 flags;
+ refcount_t rpm_active;
+ struct kref kref;
+ struct work_struct rm_work;
+ bool supplier_preactivated;
+};
+
+union device_attr_group_devres {
+ const struct attribute_group *group;
+ const struct attribute_group **groups;
+};
+
+struct class_dir {
+ struct kobject kobj;
+ struct class *class;
+};
+
+struct root_device {
+ struct device dev;
+ struct module *owner;
+};
+
+struct a4tech_sc {
+ long unsigned int quirks;
+ unsigned int hw_wheel;
+ __s32 delayed_value;
+};
+
+enum {
+ BPF_F_RECOMPUTE_CSUM = 1,
+ BPF_F_INVALIDATE_HASH = 2,
+};
+
+enum {
+ BPF_F_HDR_FIELD_MASK = 15,
+};
+
+enum {
+ BPF_F_PSEUDO_HDR = 16,
+ BPF_F_MARK_MANGLED_0 = 32,
+ BPF_F_MARK_ENFORCE = 64,
+};
+
+enum {
+ BPF_F_TUNINFO_IPV6 = 1,
+};
+
+enum {
+ BPF_F_ZERO_CSUM_TX = 2,
+ BPF_F_DONT_FRAGMENT = 4,
+ BPF_F_SEQ_NUMBER = 8,
+};
+
+enum {
+ BPF_F_TUNINFO_FLAGS = 16,
+};
+
+enum {
+ BPF_F_INDEX_MASK = 4294967295ULL,
+ BPF_F_CURRENT_CPU = 4294967295ULL,
+ BPF_F_CTXLEN_MASK = 4503595332403200ULL,
+};
+
+enum {
+ BPF_CSUM_LEVEL_QUERY = 0,
+ BPF_CSUM_LEVEL_INC = 1,
+ BPF_CSUM_LEVEL_DEC = 2,
+ BPF_CSUM_LEVEL_RESET = 3,
+};
+
+enum {
+ BPF_F_ADJ_ROOM_FIXED_GSO = 1,
+ BPF_F_ADJ_ROOM_ENCAP_L3_IPV4 = 2,
+ BPF_F_ADJ_ROOM_ENCAP_L3_IPV6 = 4,
+ BPF_F_ADJ_ROOM_ENCAP_L4_GRE = 8,
+ BPF_F_ADJ_ROOM_ENCAP_L4_UDP = 16,
+ BPF_F_ADJ_ROOM_NO_CSUM_RESET = 32,
+ BPF_F_ADJ_ROOM_ENCAP_L2_ETH = 64,
+};
+
+enum {
+ BPF_ADJ_ROOM_ENCAP_L2_MASK = 255,
+ BPF_ADJ_ROOM_ENCAP_L2_SHIFT = 56,
+};
+
+enum {
+ BPF_SK_LOOKUP_F_REPLACE = 1,
+ BPF_SK_LOOKUP_F_NO_REUSEPORT = 2,
+};
+
+enum bpf_adj_room_mode {
+ BPF_ADJ_ROOM_NET = 0,
+ BPF_ADJ_ROOM_MAC = 1,
+};
+
+enum bpf_hdr_start_off {
+ BPF_HDR_START_MAC = 0,
+ BPF_HDR_START_NET = 1,
+};
+
+enum bpf_lwt_encap_mode {
+ BPF_LWT_ENCAP_SEG6 = 0,
+ BPF_LWT_ENCAP_SEG6_INLINE = 1,
+ BPF_LWT_ENCAP_IP = 2,
+};
+
+enum {
+ BPF_SKB_TSTAMP_UNSPEC = 0,
+ BPF_SKB_TSTAMP_DELIVERY_MONO = 1,
+};
+
+struct bpf_tunnel_key {
+ __u32 tunnel_id;
+ union {
+ __u32 remote_ipv4;
+ __u32 remote_ipv6[4];
+ };
+ __u8 tunnel_tos;
+ __u8 tunnel_ttl;
+ union {
+ __u16 tunnel_ext;
+ __be16 tunnel_flags;
+ };
+ __u32 tunnel_label;
+ union {
+ __u32 local_ipv4;
+ __u32 local_ipv6[4];
+ };
+};
+
+struct bpf_xfrm_state {
+ __u32 reqid;
+ __u32 spi;
+ __u16 family;
+ __u16 ext;
+ union {
+ __u32 remote_ipv4;
+ __u32 remote_ipv6[4];
+ };
+};
+
+struct bpf_tcp_sock {
+ __u32 snd_cwnd;
+ __u32 srtt_us;
+ __u32 rtt_min;
+ __u32 snd_ssthresh;
+ __u32 rcv_nxt;
+ __u32 snd_nxt;
+ __u32 snd_una;
+ __u32 mss_cache;
+ __u32 ecn_flags;
+ __u32 rate_delivered;
+ __u32 rate_interval_us;
+ __u32 packets_out;
+ __u32 retrans_out;
+ __u32 total_retrans;
+ __u32 segs_in;
+ __u32 data_segs_in;
+ __u32 segs_out;
+ __u32 data_segs_out;
+ __u32 lost_out;
+ __u32 sacked_out;
+ __u64 bytes_received;
+ __u64 bytes_acked;
+ __u32 dsack_dups;
+ __u32 delivered;
+ __u32 delivered_ce;
+ __u32 icsk_retransmits;
+};
+
+struct bpf_xdp_sock {
+ __u32 queue_id;
+};
+
+struct sk_msg_md {
+ union {
+ void *data;
+ };
+ union {
+ void *data_end;
+ };
+ __u32 family;
+ __u32 remote_ip4;
+ __u32 local_ip4;
+ __u32 remote_ip6[4];
+ __u32 local_ip6[4];
+ __u32 remote_port;
+ __u32 local_port;
+ __u32 size;
+ union {
+ struct bpf_sock *sk;
+ };
+};
+
+struct sk_reuseport_md {
+ union {
+ void *data;
+ };
+ union {
+ void *data_end;
+ };
+ __u32 len;
+ __u32 eth_protocol;
+ __u32 ip_protocol;
+ __u32 bind_inany;
+ __u32 hash;
+ union {
+ struct bpf_sock *sk;
+ };
+ union {
+ struct bpf_sock *migrating_sk;
+ };
+};
+
+struct bpf_sock_addr {
+ __u32 user_family;
+ __u32 user_ip4;
+ __u32 user_ip6[4];
+ __u32 user_port;
+ __u32 family;
+ __u32 type;
+ __u32 protocol;
+ __u32 msg_src_ip4;
+ __u32 msg_src_ip6[4];
+ union {
+ struct bpf_sock *sk;
+ };
+};
+
+struct bpf_sock_ops {
+ __u32 op;
+ union {
+ __u32 args[4];
+ __u32 reply;
+ __u32 replylong[4];
+ };
+ __u32 family;
+ __u32 remote_ip4;
+ __u32 local_ip4;
+ __u32 remote_ip6[4];
+ __u32 local_ip6[4];
+ __u32 remote_port;
+ __u32 local_port;
+ __u32 is_fullsock;
+ __u32 snd_cwnd;
+ __u32 srtt_us;
+ __u32 bpf_sock_ops_cb_flags;
+ __u32 state;
+ __u32 rtt_min;
+ __u32 snd_ssthresh;
+ __u32 rcv_nxt;
+ __u32 snd_nxt;
+ __u32 snd_una;
+ __u32 mss_cache;
+ __u32 ecn_flags;
+ __u32 rate_delivered;
+ __u32 rate_interval_us;
+ __u32 packets_out;
+ __u32 retrans_out;
+ __u32 total_retrans;
+ __u32 segs_in;
+ __u32 data_segs_in;
+ __u32 segs_out;
+ __u32 data_segs_out;
+ __u32 lost_out;
+ __u32 sacked_out;
+ __u32 sk_txhash;
+ __u64 bytes_received;
+ __u64 bytes_acked;
+ union {
+ struct bpf_sock *sk;
+ };
+ union {
+ void *skb_data;
+ };
+ union {
+ void *skb_data_end;
+ };
+ __u32 skb_len;
+ __u32 skb_tcp_flags;
+ __u64 skb_hwtstamp;
+};
+
+enum {
+ TCP_BPF_IW = 1001,
+ TCP_BPF_SNDCWND_CLAMP = 1002,
+ TCP_BPF_DELACK_MAX = 1003,
+ TCP_BPF_RTO_MIN = 1004,
+ TCP_BPF_SYN = 1005,
+ TCP_BPF_SYN_IP = 1006,
+ TCP_BPF_SYN_MAC = 1007,
+};
+
+enum {
+ BPF_LOAD_HDR_OPT_TCP_SYN = 1,
+};
+
+enum {
+ BPF_FIB_LOOKUP_DIRECT = 1,
+ BPF_FIB_LOOKUP_OUTPUT = 2,
+};
+
+enum {
+ BPF_FIB_LKUP_RET_SUCCESS = 0,
+ BPF_FIB_LKUP_RET_BLACKHOLE = 1,
+ BPF_FIB_LKUP_RET_UNREACHABLE = 2,
+ BPF_FIB_LKUP_RET_PROHIBIT = 3,
+ BPF_FIB_LKUP_RET_NOT_FWDED = 4,
+ BPF_FIB_LKUP_RET_FWD_DISABLED = 5,
+ BPF_FIB_LKUP_RET_UNSUPP_LWT = 6,
+ BPF_FIB_LKUP_RET_NO_NEIGH = 7,
+ BPF_FIB_LKUP_RET_FRAG_NEEDED = 8,
+};
+
+struct bpf_fib_lookup {
+ __u8 family;
+ __u8 l4_protocol;
+ __be16 sport;
+ __be16 dport;
+ union {
+ __u16 tot_len;
+ __u16 mtu_result;
+ };
+ __u32 ifindex;
+ union {
+ __u8 tos;
+ __be32 flowinfo;
+ __u32 rt_metric;
+ };
+ union {
+ __be32 ipv4_src;
+ __u32 ipv6_src[4];
+ };
+ union {
+ __be32 ipv4_dst;
+ __u32 ipv6_dst[4];
+ };
+ __be16 h_vlan_proto;
+ __be16 h_vlan_TCI;
+ __u8 smac[6];
+ __u8 dmac[6];
+};
+
+struct bpf_redir_neigh {
+ __u32 nh_family;
+ union {
+ __be32 ipv4_nh;
+ __u32 ipv6_nh[4];
+ };
+};
+
+enum bpf_check_mtu_flags {
+ BPF_MTU_CHK_SEGS = 1,
+};
+
+enum bpf_check_mtu_ret {
+ BPF_MTU_CHK_RET_SUCCESS = 0,
+ BPF_MTU_CHK_RET_FRAG_NEEDED = 1,
+ BPF_MTU_CHK_RET_SEGS_TOOBIG = 2,
+};
+
+struct bpf_dispatcher_prog {
+ struct bpf_prog *prog;
+ refcount_t users;
+};
+
+struct bpf_dispatcher {
+ struct mutex mutex;
+ void *func;
+ struct bpf_dispatcher_prog progs[48];
+ int num_progs;
+ void *image;
+ void *rw_image;
+ u32 image_off;
+ struct bpf_ksym ksym;
+ struct static_call_key *sc_key;
+ void *sc_tramp;
+};
+
+typedef long unsigned int (*bpf_ctx_copy_t)(void *, const void *, long unsigned int, long unsigned int);
+
+struct bpf_empty_prog_array {
+ struct bpf_prog_array hdr;
+ struct bpf_prog *null_prog;
+};
+
+struct sk_reuseport_kern {
+ struct sk_buff *skb;
+ struct sock *sk;
+ struct sock *selected_sk;
+ struct sock *migrating_sk;
+ void *data_end;
+ u32 hash;
+ u32 reuseport_id;
+ bool bind_inany;
+};
+
+struct compat_sock_fprog {
+ u16 len;
+ compat_uptr_t filter;
+};
+
+typedef int (*bpf_aux_classic_check_t)(struct sock_filter *, unsigned int);
+
+struct bpf_sock_addr_kern {
+ struct sock *sk;
+ struct sockaddr *uaddr;
+ u64 tmp_reg;
+ void *t_ctx;
+};
+
+struct udp6_sock {
+ struct udp_sock udp;
+ struct ipv6_pinfo inet6;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct tcp6_sock {
+ struct tcp_sock tcp;
+ struct ipv6_pinfo inet6;
+};
+
+struct ipv6_bpf_stub {
+ int (*inet6_bind)(struct sock *, struct sockaddr *, int, u32);
+ struct sock * (*udp6_lib_lookup)(struct net *, const struct in6_addr *, __be16, const struct in6_addr *, __be16, int, int, struct udp_table *, struct sk_buff *);
+ int (*ipv6_setsockopt)(struct sock *, int, int, sockptr_t, unsigned int);
+ int (*ipv6_getsockopt)(struct sock *, int, int, sockptr_t, sockptr_t);
+};
+
+struct _strp_msg {
+ struct strp_msg strp;
+ int accum_len;
+};
+
+struct tls_msg {
+ u8 control;
+};
+
+struct sk_skb_cb {
+ unsigned char data[20];
+ unsigned char pad[4];
+ struct _strp_msg strp;
+ struct tls_msg tls;
+ u64 temp_reg;
+};
+
+typedef u64 (*btf_bpf_skb_get_pay_offset)(struct sk_buff *);
+
+typedef u64 (*btf_bpf_skb_get_nlattr)(struct sk_buff *, u32, u32);
+
+typedef u64 (*btf_bpf_skb_get_nlattr_nest)(struct sk_buff *, u32, u32);
+
+typedef u64 (*btf_bpf_skb_load_helper_8)(const struct sk_buff *, const void *, int, int);
+
+typedef u64 (*btf_bpf_skb_load_helper_8_no_cache)(const struct sk_buff *, int);
+
+typedef u64 (*btf_bpf_skb_load_helper_16)(const struct sk_buff *, const void *, int, int);
+
+typedef u64 (*btf_bpf_skb_load_helper_16_no_cache)(const struct sk_buff *, int);
+
+typedef u64 (*btf_bpf_skb_load_helper_32)(const struct sk_buff *, const void *, int, int);
+
+typedef u64 (*btf_bpf_skb_load_helper_32_no_cache)(const struct sk_buff *, int);
+
+struct bpf_scratchpad {
+ union {
+ __be32 diff[128];
+ u8 buff[512];
+ };
+};
+
+typedef u64 (*btf_bpf_skb_store_bytes)(struct sk_buff *, u32, const void *, u32, u64);
+
+typedef u64 (*btf_bpf_skb_load_bytes)(const struct sk_buff *, u32, void *, u32);
+
+typedef u64 (*btf_bpf_flow_dissector_load_bytes)(const struct bpf_flow_dissector *, u32, void *, u32);
+
+typedef u64 (*btf_bpf_skb_load_bytes_relative)(const struct sk_buff *, u32, void *, u32, u32);
+
+typedef u64 (*btf_bpf_skb_pull_data)(struct sk_buff *, u32);
+
+typedef u64 (*btf_bpf_sk_fullsock)(struct sock *);
+
+typedef u64 (*btf_sk_skb_pull_data)(struct sk_buff *, u32);
+
+typedef u64 (*btf_bpf_l3_csum_replace)(struct sk_buff *, u32, u64, u64, u64);
+
+typedef u64 (*btf_bpf_l4_csum_replace)(struct sk_buff *, u32, u64, u64, u64);
+
+typedef u64 (*btf_bpf_csum_diff)(__be32 *, u32, __be32 *, u32, __wsum);
+
+typedef u64 (*btf_bpf_csum_update)(struct sk_buff *, __wsum);
+
+typedef u64 (*btf_bpf_csum_level)(struct sk_buff *, u64);
+
+enum {
+ BPF_F_NEIGH = 2,
+ BPF_F_PEER = 4,
+ BPF_F_NEXTHOP = 8,
+};
+
+typedef u64 (*btf_bpf_clone_redirect)(struct sk_buff *, u32, u64);
+
+typedef u64 (*btf_bpf_redirect)(u32, u64);
+
+typedef u64 (*btf_bpf_redirect_peer)(u32, u64);
+
+typedef u64 (*btf_bpf_redirect_neigh)(u32, struct bpf_redir_neigh *, int, u64);
+
+typedef u64 (*btf_bpf_msg_apply_bytes)(struct sk_msg *, u32);
+
+typedef u64 (*btf_bpf_msg_cork_bytes)(struct sk_msg *, u32);
+
+typedef u64 (*btf_bpf_msg_pull_data)(struct sk_msg *, u32, u32, u64);
+
+typedef u64 (*btf_bpf_msg_push_data)(struct sk_msg *, u32, u32, u64);
+
+typedef u64 (*btf_bpf_msg_pop_data)(struct sk_msg *, u32, u32, u64);
+
+typedef u64 (*btf_bpf_get_cgroup_classid_curr)();
+
+typedef u64 (*btf_bpf_skb_cgroup_classid)(const struct sk_buff *);
+
+typedef u64 (*btf_bpf_get_cgroup_classid)(const struct sk_buff *);
+
+typedef u64 (*btf_bpf_get_route_realm)(const struct sk_buff *);
+
+typedef u64 (*btf_bpf_get_hash_recalc)(struct sk_buff *);
+
+typedef u64 (*btf_bpf_set_hash_invalid)(struct sk_buff *);
+
+typedef u64 (*btf_bpf_set_hash)(struct sk_buff *, u32);
+
+typedef u64 (*btf_bpf_skb_vlan_push)(struct sk_buff *, __be16, u16);
+
+typedef u64 (*btf_bpf_skb_vlan_pop)(struct sk_buff *);
+
+typedef u64 (*btf_bpf_skb_change_proto)(struct sk_buff *, __be16, u64);
+
+typedef u64 (*btf_bpf_skb_change_type)(struct sk_buff *, u32);
+
+typedef u64 (*btf_sk_skb_adjust_room)(struct sk_buff *, s32, u32, u64);
+
+typedef u64 (*btf_bpf_skb_adjust_room)(struct sk_buff *, s32, u32, u64);
+
+typedef u64 (*btf_bpf_skb_change_tail)(struct sk_buff *, u32, u64);
+
+typedef u64 (*btf_sk_skb_change_tail)(struct sk_buff *, u32, u64);
+
+typedef u64 (*btf_bpf_skb_change_head)(struct sk_buff *, u32, u64);
+
+typedef u64 (*btf_sk_skb_change_head)(struct sk_buff *, u32, u64);
+
+typedef u64 (*btf_bpf_xdp_get_buff_len)(struct xdp_buff *);
+
+typedef u64 (*btf_bpf_xdp_adjust_head)(struct xdp_buff *, int);
+
+typedef u64 (*btf_bpf_xdp_load_bytes)(struct xdp_buff *, u32, void *, u32);
+
+typedef u64 (*btf_bpf_xdp_store_bytes)(struct xdp_buff *, u32, void *, u32);
+
+typedef u64 (*btf_bpf_xdp_adjust_tail)(struct xdp_buff *, int);
+
+typedef u64 (*btf_bpf_xdp_adjust_meta)(struct xdp_buff *, int);
+
+typedef u64 (*btf_bpf_xdp_redirect)(u32, u64);
+
+typedef u64 (*btf_bpf_xdp_redirect_map)(struct bpf_map *, u64, u64);
+
+typedef u64 (*btf_bpf_skb_event_output)(struct sk_buff *, struct bpf_map *, u64, void *, u64);
+
+typedef u64 (*btf_bpf_skb_get_tunnel_key)(struct sk_buff *, struct bpf_tunnel_key *, u32, u64);
+
+typedef u64 (*btf_bpf_skb_get_tunnel_opt)(struct sk_buff *, u8 *, u32);
+
+typedef u64 (*btf_bpf_skb_set_tunnel_key)(struct sk_buff *, const struct bpf_tunnel_key *, u32, u64);
+
+typedef u64 (*btf_bpf_skb_set_tunnel_opt)(struct sk_buff *, const u8 *, u32);
+
+typedef u64 (*btf_bpf_skb_under_cgroup)(struct sk_buff *, struct bpf_map *, u32);
+
+typedef u64 (*btf_bpf_skb_cgroup_id)(const struct sk_buff *);
+
+typedef u64 (*btf_bpf_skb_ancestor_cgroup_id)(const struct sk_buff *, int);
+
+typedef u64 (*btf_bpf_sk_cgroup_id)(struct sock *);
+
+typedef u64 (*btf_bpf_sk_ancestor_cgroup_id)(struct sock *, int);
+
+typedef u64 (*btf_bpf_xdp_event_output)(struct xdp_buff *, struct bpf_map *, u64, void *, u64);
+
+typedef u64 (*btf_bpf_get_socket_cookie)(struct sk_buff *);
+
+typedef u64 (*btf_bpf_get_socket_cookie_sock_addr)(struct bpf_sock_addr_kern *);
+
+typedef u64 (*btf_bpf_get_socket_cookie_sock)(struct sock *);
+
+typedef u64 (*btf_bpf_get_socket_ptr_cookie)(struct sock *);
+
+typedef u64 (*btf_bpf_get_socket_cookie_sock_ops)(struct bpf_sock_ops_kern *);
+
+typedef u64 (*btf_bpf_get_netns_cookie_sock)(struct sock *);
+
+typedef u64 (*btf_bpf_get_netns_cookie_sock_addr)(struct bpf_sock_addr_kern *);
+
+typedef u64 (*btf_bpf_get_netns_cookie_sock_ops)(struct bpf_sock_ops_kern *);
+
+typedef u64 (*btf_bpf_get_netns_cookie_sk_msg)(struct sk_msg *);
+
+typedef u64 (*btf_bpf_get_socket_uid)(struct sk_buff *);
+
+typedef u64 (*btf_bpf_sk_setsockopt)(struct sock *, int, int, char *, int);
+
+typedef u64 (*btf_bpf_sk_getsockopt)(struct sock *, int, int, char *, int);
+
+typedef u64 (*btf_bpf_unlocked_sk_setsockopt)(struct sock *, int, int, char *, int);
+
+typedef u64 (*btf_bpf_unlocked_sk_getsockopt)(struct sock *, int, int, char *, int);
+
+typedef u64 (*btf_bpf_sock_addr_setsockopt)(struct bpf_sock_addr_kern *, int, int, char *, int);
+
+typedef u64 (*btf_bpf_sock_addr_getsockopt)(struct bpf_sock_addr_kern *, int, int, char *, int);
+
+typedef u64 (*btf_bpf_sock_ops_setsockopt)(struct bpf_sock_ops_kern *, int, int, char *, int);
+
+typedef u64 (*btf_bpf_sock_ops_getsockopt)(struct bpf_sock_ops_kern *, int, int, char *, int);
+
+typedef u64 (*btf_bpf_sock_ops_cb_flags_set)(struct bpf_sock_ops_kern *, int);
+
+typedef u64 (*btf_bpf_bind)(struct bpf_sock_addr_kern *, struct sockaddr *, int);
+
+typedef u64 (*btf_bpf_skb_get_xfrm_state)(struct sk_buff *, u32, struct bpf_xfrm_state *, u32, u64);
+
+typedef u64 (*btf_bpf_xdp_fib_lookup)(struct xdp_buff *, struct bpf_fib_lookup *, int, u32);
+
+typedef u64 (*btf_bpf_skb_fib_lookup)(struct sk_buff *, struct bpf_fib_lookup *, int, u32);
+
+typedef u64 (*btf_bpf_skb_check_mtu)(struct sk_buff *, u32, u32 *, s32, u64);
+
+typedef u64 (*btf_bpf_xdp_check_mtu)(struct xdp_buff *, u32, u32 *, s32, u64);
+
+typedef u64 (*btf_bpf_lwt_in_push_encap)(struct sk_buff *, u32, void *, u32);
+
+typedef u64 (*btf_bpf_lwt_xmit_push_encap)(struct sk_buff *, u32, void *, u32);
+
+typedef u64 (*btf_bpf_lwt_seg6_store_bytes)(struct sk_buff *, u32, const void *, u32);
+
+typedef u64 (*btf_bpf_lwt_seg6_action)(struct sk_buff *, u32, void *, u32);
+
+typedef u64 (*btf_bpf_lwt_seg6_adjust_srh)(struct sk_buff *, u32, s32);
+
+typedef u64 (*btf_bpf_skc_lookup_tcp)(struct sk_buff *, struct bpf_sock_tuple *, u32, u64, u64);
+
+typedef u64 (*btf_bpf_sk_lookup_tcp)(struct sk_buff *, struct bpf_sock_tuple *, u32, u64, u64);
+
+typedef u64 (*btf_bpf_sk_lookup_udp)(struct sk_buff *, struct bpf_sock_tuple *, u32, u64, u64);
+
+typedef u64 (*btf_bpf_sk_release)(struct sock *);
+
+typedef u64 (*btf_bpf_xdp_sk_lookup_udp)(struct xdp_buff *, struct bpf_sock_tuple *, u32, u32, u64);
+
+typedef u64 (*btf_bpf_xdp_skc_lookup_tcp)(struct xdp_buff *, struct bpf_sock_tuple *, u32, u32, u64);
+
+typedef u64 (*btf_bpf_xdp_sk_lookup_tcp)(struct xdp_buff *, struct bpf_sock_tuple *, u32, u32, u64);
+
+typedef u64 (*btf_bpf_sock_addr_skc_lookup_tcp)(struct bpf_sock_addr_kern *, struct bpf_sock_tuple *, u32, u64, u64);
+
+typedef u64 (*btf_bpf_sock_addr_sk_lookup_tcp)(struct bpf_sock_addr_kern *, struct bpf_sock_tuple *, u32, u64, u64);
+
+typedef u64 (*btf_bpf_sock_addr_sk_lookup_udp)(struct bpf_sock_addr_kern *, struct bpf_sock_tuple *, u32, u64, u64);
+
+typedef u64 (*btf_bpf_tcp_sock)(struct sock *);
+
+typedef u64 (*btf_bpf_get_listener_sock)(struct sock *);
+
+typedef u64 (*btf_bpf_skb_ecn_set_ce)(struct sk_buff *);
+
+typedef u64 (*btf_bpf_tcp_check_syncookie)(struct sock *, void *, u32, struct tcphdr *, u32);
+
+typedef u64 (*btf_bpf_tcp_gen_syncookie)(struct sock *, void *, u32, struct tcphdr *, u32);
+
+typedef u64 (*btf_bpf_sk_assign)(struct sk_buff *, struct sock *, u64);
+
+typedef u64 (*btf_bpf_sock_ops_load_hdr_opt)(struct bpf_sock_ops_kern *, void *, u32, u64);
+
+typedef u64 (*btf_bpf_sock_ops_store_hdr_opt)(struct bpf_sock_ops_kern *, const void *, u32, u64);
+
+typedef u64 (*btf_bpf_sock_ops_reserve_hdr_opt)(struct bpf_sock_ops_kern *, u32, u64);
+
+typedef u64 (*btf_bpf_skb_set_tstamp)(struct sk_buff *, u64, u32);
+
+typedef u64 (*btf_bpf_tcp_raw_gen_syncookie_ipv4)(struct iphdr *, struct tcphdr *, u32);
+
+typedef u64 (*btf_bpf_tcp_raw_gen_syncookie_ipv6)(struct ipv6hdr *, struct tcphdr *, u32);
+
+typedef u64 (*btf_bpf_tcp_raw_check_syncookie_ipv4)(struct iphdr *, struct tcphdr *);
+
+typedef u64 (*btf_bpf_tcp_raw_check_syncookie_ipv6)(struct ipv6hdr *, struct tcphdr *);
+
+typedef u64 (*btf_sk_select_reuseport)(struct sk_reuseport_kern *, struct bpf_map *, void *, u32);
+
+typedef u64 (*btf_sk_reuseport_load_bytes)(const struct sk_reuseport_kern *, u32, void *, u32);
+
+typedef u64 (*btf_sk_reuseport_load_bytes_relative)(const struct sk_reuseport_kern *, u32, void *, u32, u32);
+
+typedef u64 (*btf_bpf_sk_lookup_assign)(struct bpf_sk_lookup_kern *, struct sock *, u64);
+
+typedef u64 (*btf_bpf_skc_to_tcp6_sock)(struct sock *);
+
+typedef u64 (*btf_bpf_skc_to_tcp_sock)(struct sock *);
+
+typedef u64 (*btf_bpf_skc_to_tcp_timewait_sock)(struct sock *);
+
+typedef u64 (*btf_bpf_skc_to_tcp_request_sock)(struct sock *);
+
+typedef u64 (*btf_bpf_skc_to_udp6_sock)(struct sock *);
+
+typedef u64 (*btf_bpf_skc_to_unix_sock)(struct sock *);
+
+typedef u64 (*btf_bpf_skc_to_mptcp_sock)(struct sock *);
+
+typedef u64 (*btf_bpf_sock_from_file)(struct file *);
+
+struct mptcp_sock;
+
+struct bpf_cpu_map_entry;
+
+struct bpf_dtab_netdev;
+
+struct unix_sock;
+
+enum cpuid_regs_idx {
+ CPUID_EAX = 0,
+ CPUID_EBX = 1,
+ CPUID_ECX = 2,
+ CPUID_EDX = 3,
+};
+
+enum pt_capabilities {
+ PT_CAP_max_subleaf = 0,
+ PT_CAP_cr3_filtering = 1,
+ PT_CAP_psb_cyc = 2,
+ PT_CAP_ip_filtering = 3,
+ PT_CAP_mtc = 4,
+ PT_CAP_ptwrite = 5,
+ PT_CAP_power_event_trace = 6,
+ PT_CAP_event_trace = 7,
+ PT_CAP_tnt_disable = 8,
+ PT_CAP_topa_output = 9,
+ PT_CAP_topa_multiple_entries = 10,
+ PT_CAP_single_range_output = 11,
+ PT_CAP_output_subsys = 12,
+ PT_CAP_payloads_lip = 13,
+ PT_CAP_num_address_ranges = 14,
+ PT_CAP_mtc_periods = 15,
+ PT_CAP_cycle_thresholds = 16,
+ PT_CAP_psb_periods = 17,
+};
+
+struct topa_entry {
+ u64 end: 1;
+ u64 rsvd0: 1;
+ u64 intr: 1;
+ u64 rsvd1: 1;
+ u64 stop: 1;
+ u64 rsvd2: 1;
+ u64 size: 4;
+ u64 rsvd3: 2;
+ u64 base: 36;
+ u64 rsvd4: 16;
+};
+
+struct pt_pmu {
+ struct pmu pmu;
+ u32 caps[8];
+ bool vmx;
+ bool branch_en_always_on;
+ long unsigned int max_nonturbo_ratio;
+ unsigned int tsc_art_num;
+ unsigned int tsc_art_den;
+};
+
+struct topa;
+
+struct pt_buffer {
+ struct list_head tables;
+ struct topa *first;
+ struct topa *last;
+ struct topa *cur;
+ unsigned int cur_idx;
+ size_t output_off;
+ long unsigned int nr_pages;
+ local_t data_size;
+ local64_t head;
+ bool snapshot;
+ bool single;
+ long int stop_pos;
+ long int intr_pos;
+ struct topa_entry *stop_te;
+ struct topa_entry *intr_te;
+ void **data_pages;
+};
+
+struct topa {
+ struct list_head list;
+ u64 offset;
+ size_t size;
+ int last;
+ unsigned int z_count;
+};
+
+struct pt_filter {
+ long unsigned int msr_a;
+ long unsigned int msr_b;
+ long unsigned int config;
+};
+
+struct pt_filters {
+ struct pt_filter filter[4];
+ unsigned int nr_filters;
+};
+
+struct pt {
+ struct perf_output_handle handle;
+ struct pt_filters filters;
+ int handle_nmi;
+ int vmx_on;
+ u64 output_base;
+ u64 output_mask;
+};
+
+struct pt_cap_desc {
+ const char *name;
+ u32 leaf;
+ u8 reg;
+ u32 mask;
+};
+
+struct pt_address_range {
+ long unsigned int msr_a;
+ long unsigned int msr_b;
+ unsigned int reg_off;
+};
+
+struct topa_page {
+ struct topa_entry table[507];
+ struct topa topa;
+};
+
+enum {
+ IORES_MAP_SYSTEM_RAM = 1,
+ IORES_MAP_ENCRYPTED = 2,
+};
+
+struct ioremap_desc {
+ unsigned int flags;
+};
+
+struct cpumap {
+ unsigned int available;
+ unsigned int allocated;
+ unsigned int managed;
+ unsigned int managed_allocated;
+ bool initialized;
+ bool online;
+ long unsigned int alloc_map[4];
+ long unsigned int managed_map[4];
+};
+
+struct irq_matrix {
+ unsigned int matrix_bits;
+ unsigned int alloc_start;
+ unsigned int alloc_end;
+ unsigned int alloc_size;
+ unsigned int global_available;
+ unsigned int global_reserved;
+ unsigned int systembits_inalloc;
+ unsigned int total_allocated;
+ unsigned int online_maps;
+ struct cpumap *maps;
+ long unsigned int scratch_map[4];
+ long unsigned int system_map[4];
+};
+
+struct trace_event_raw_irq_matrix_global {
+ struct trace_entry ent;
+ unsigned int online_maps;
+ unsigned int global_available;
+ unsigned int global_reserved;
+ unsigned int total_allocated;
+ char __data[0];
+};
+
+struct trace_event_raw_irq_matrix_global_update {
+ struct trace_entry ent;
+ int bit;
+ unsigned int online_maps;
+ unsigned int global_available;
+ unsigned int global_reserved;
+ unsigned int total_allocated;
+ char __data[0];
+};
+
+struct trace_event_raw_irq_matrix_cpu {
+ struct trace_entry ent;
+ int bit;
+ unsigned int cpu;
+ bool online;
+ unsigned int available;
+ unsigned int allocated;
+ unsigned int managed;
+ unsigned int online_maps;
+ unsigned int global_available;
+ unsigned int global_reserved;
+ unsigned int total_allocated;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_irq_matrix_global {};
+
+struct trace_event_data_offsets_irq_matrix_global_update {};
+
+struct trace_event_data_offsets_irq_matrix_cpu {};
+
+typedef void (*btf_trace_irq_matrix_online)(void *, struct irq_matrix *);
+
+typedef void (*btf_trace_irq_matrix_offline)(void *, struct irq_matrix *);
+
+typedef void (*btf_trace_irq_matrix_reserve)(void *, struct irq_matrix *);
+
+typedef void (*btf_trace_irq_matrix_remove_reserved)(void *, struct irq_matrix *);
+
+typedef void (*btf_trace_irq_matrix_assign_system)(void *, int, struct irq_matrix *);
+
+typedef void (*btf_trace_irq_matrix_alloc_reserved)(void *, int, unsigned int, struct irq_matrix *, struct cpumap *);
+
+typedef void (*btf_trace_irq_matrix_reserve_managed)(void *, int, unsigned int, struct irq_matrix *, struct cpumap *);
+
+typedef void (*btf_trace_irq_matrix_remove_managed)(void *, int, unsigned int, struct irq_matrix *, struct cpumap *);
+
+typedef void (*btf_trace_irq_matrix_alloc_managed)(void *, int, unsigned int, struct irq_matrix *, struct cpumap *);
+
+typedef void (*btf_trace_irq_matrix_assign)(void *, int, unsigned int, struct irq_matrix *, struct cpumap *);
+
+typedef void (*btf_trace_irq_matrix_alloc)(void *, int, unsigned int, struct irq_matrix *, struct cpumap *);
+
+typedef void (*btf_trace_irq_matrix_free)(void *, int, unsigned int, struct irq_matrix *, struct cpumap *);
+
+struct bpf_lpm_trie_key {
+ __u32 prefixlen;
+ __u8 data[0];
+};
+
+struct lpm_trie_node {
+ struct callback_head rcu;
+ struct lpm_trie_node *child[2];
+ u32 prefixlen;
+ u32 flags;
+ u8 data[0];
+};
+
+struct lpm_trie {
+ struct bpf_map map;
+ struct lpm_trie_node *root;
+ size_t n_entries;
+ size_t max_prefixlen;
+ size_t data_size;
+ spinlock_t lock;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct xattr_name {
+ char name[256];
+};
+
+struct xattr_ctx {
+ union {
+ const void *cvalue;
+ void *value;
+ };
+ void *kvalue;
+ size_t size;
+ struct xattr_name *kname;
+ unsigned int flags;
+};
+
+struct p9_iattr_dotl {
+ u32 valid;
+ u32 mode;
+ kuid_t uid;
+ kgid_t gid;
+ u64 size;
+ u64 atime_sec;
+ u64 atime_nsec;
+ u64 mtime_sec;
+ u64 mtime_nsec;
+};
+
+struct dotl_openflag_map {
+ int open_flag;
+ int dotl_flag;
+};
+
+struct dotl_iattr_map {
+ int iattr_valid;
+ int p9_iattr_valid;
+};
+
+struct aead_instance {
+ void (*free)(struct aead_instance *);
+ union {
+ struct {
+ char head[64];
+ struct crypto_instance base;
+ } s;
+ struct aead_alg alg;
+ };
+};
+
+struct crypto_aead_spawn {
+ struct crypto_spawn base;
+};
+
+struct aead_geniv_ctx {
+ spinlock_t lock;
+ struct crypto_aead *child;
+ struct crypto_sync_skcipher *sknull;
+ u8 salt[0];
+};
+
+struct pci_dev_resource {
+ struct list_head list;
+ struct resource *res;
+ struct pci_dev *dev;
+ resource_size_t start;
+ resource_size_t end;
+ resource_size_t add_size;
+ resource_size_t min_align;
+ long unsigned int flags;
+};
+
+enum release_type {
+ leaf_only = 0,
+ whole_subtree = 1,
+};
+
+enum enable_type {
+ undefined = -1,
+ user_disabled = 0,
+ auto_disabled = 1,
+ user_enabled = 2,
+ auto_enabled = 3,
+};
+
+struct acpi_ged_device {
+ struct device *dev;
+ struct list_head event_list;
+};
+
+struct acpi_ged_event {
+ struct list_head node;
+ struct device *dev;
+ unsigned int gsi;
+ unsigned int irq;
+ acpi_handle handle;
+};
+
+struct trace_event_raw_iommu_group_event {
+ struct trace_entry ent;
+ int gid;
+ u32 __data_loc_device;
+ char __data[0];
+};
+
+struct trace_event_raw_iommu_device_event {
+ struct trace_entry ent;
+ u32 __data_loc_device;
+ char __data[0];
+};
+
+struct trace_event_raw_map {
+ struct trace_entry ent;
+ u64 iova;
+ u64 paddr;
+ size_t size;
+ char __data[0];
+};
+
+struct trace_event_raw_unmap {
+ struct trace_entry ent;
+ u64 iova;
+ size_t size;
+ size_t unmapped_size;
+ char __data[0];
+};
+
+struct trace_event_raw_iommu_error {
+ struct trace_entry ent;
+ u32 __data_loc_device;
+ u32 __data_loc_driver;
+ u64 iova;
+ int flags;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_iommu_group_event {
+ u32 device;
+};
+
+struct trace_event_data_offsets_iommu_device_event {
+ u32 device;
+};
+
+struct trace_event_data_offsets_map {};
+
+struct trace_event_data_offsets_unmap {};
+
+struct trace_event_data_offsets_iommu_error {
+ u32 device;
+ u32 driver;
+};
+
+typedef void (*btf_trace_add_device_to_group)(void *, int, struct device *);
+
+typedef void (*btf_trace_remove_device_from_group)(void *, int, struct device *);
+
+typedef void (*btf_trace_attach_device_to_domain)(void *, struct device *);
+
+typedef void (*btf_trace_detach_device_from_domain)(void *, struct device *);
+
+typedef void (*btf_trace_map)(void *, long unsigned int, phys_addr_t, size_t);
+
+typedef void (*btf_trace_unmap)(void *, long unsigned int, size_t, size_t);
+
+typedef void (*btf_trace_io_page_fault)(void *, struct device *, long unsigned int, int);
+
+enum serio_event_type {
+ SERIO_RESCAN_PORT = 0,
+ SERIO_RECONNECT_PORT = 1,
+ SERIO_RECONNECT_SUBTREE = 2,
+ SERIO_REGISTER_PORT = 3,
+ SERIO_ATTACH_DRIVER = 4,
+};
+
+struct serio_event {
+ enum serio_event_type type;
+ void *object;
+ struct module *owner;
+ struct list_head node;
+};
+
+struct xdp_frame_bulk {
+ int count;
+ void *xa;
+ void *q[16];
+};
+
+struct xdp_mem_allocator {
+ struct xdp_mem_info mem;
+ union {
+ void *allocator;
+ struct page_pool *page_pool;
+ };
+ struct rhash_head node;
+ struct callback_head rcu;
+};
+
+struct coalesce_reply_data {
+ struct ethnl_reply_data base;
+ struct ethtool_coalesce coalesce;
+ struct kernel_ethtool_coalesce kernel_coalesce;
+ u32 supported_params;
+};
+
+struct sock_skb_cb {
+ u32 dropcount;
+};
+
+struct udp_skb_cb {
+ union {
+ struct inet_skb_parm h4;
+ struct inet6_skb_parm h6;
+ } header;
+ __u16 cscov;
+ __u8 partial_cov;
+};
+
+struct udp_dev_scratch {
+ u32 _tsize_state;
+ u16 len;
+ bool is_linear;
+ bool csum_unnecessary;
+};
+
+struct udp_iter_state {
+ struct seq_net_private p;
+ int bucket;
+ struct udp_seq_afinfo *bpf_seq_afinfo;
+};
+
+struct bpf_iter__udp {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct udp_sock *udp_sk;
+ };
+ uid_t uid;
+ int: 32;
+ int bucket;
+};
+
+struct pci_extra_dev {
+ struct pci_dev *dev[4];
+};
+
+struct intel_uncore_pmu;
+
+struct intel_uncore_ops;
+
+struct uncore_event_desc;
+
+struct freerunning_counters;
+
+struct intel_uncore_topology;
+
+struct intel_uncore_type {
+ const char *name;
+ int num_counters;
+ int num_boxes;
+ int perf_ctr_bits;
+ int fixed_ctr_bits;
+ int num_freerunning_types;
+ int type_id;
+ unsigned int perf_ctr;
+ unsigned int event_ctl;
+ unsigned int event_mask;
+ unsigned int event_mask_ext;
+ unsigned int fixed_ctr;
+ unsigned int fixed_ctl;
+ unsigned int box_ctl;
+ u64 *box_ctls;
+ union {
+ unsigned int msr_offset;
+ unsigned int mmio_offset;
+ };
+ unsigned int mmio_map_size;
+ unsigned int num_shared_regs: 8;
+ unsigned int single_fixed: 1;
+ unsigned int pair_ctr_ctl: 1;
+ union {
+ unsigned int *msr_offsets;
+ unsigned int *pci_offsets;
+ unsigned int *mmio_offsets;
+ };
+ unsigned int *box_ids;
+ struct event_constraint unconstrainted;
+ struct event_constraint *constraints;
+ struct intel_uncore_pmu *pmus;
+ struct intel_uncore_ops *ops;
+ struct uncore_event_desc *event_descs;
+ struct freerunning_counters *freerunning;
+ const struct attribute_group *attr_groups[4];
+ const struct attribute_group **attr_update;
+ struct pmu *pmu;
+ struct intel_uncore_topology *topology;
+ int (*get_topology)(struct intel_uncore_type *);
+ int (*set_mapping)(struct intel_uncore_type *);
+ void (*cleanup_mapping)(struct intel_uncore_type *);
+};
+
+struct intel_uncore_box;
+
+struct intel_uncore_pmu {
+ struct pmu pmu;
+ char name[32];
+ int pmu_idx;
+ int func_id;
+ bool registered;
+ atomic_t activeboxes;
+ struct intel_uncore_type *type;
+ struct intel_uncore_box **boxes;
+};
+
+struct intel_uncore_ops {
+ void (*init_box)(struct intel_uncore_box *);
+ void (*exit_box)(struct intel_uncore_box *);
+ void (*disable_box)(struct intel_uncore_box *);
+ void (*enable_box)(struct intel_uncore_box *);
+ void (*disable_event)(struct intel_uncore_box *, struct perf_event *);
+ void (*enable_event)(struct intel_uncore_box *, struct perf_event *);
+ u64 (*read_counter)(struct intel_uncore_box *, struct perf_event *);
+ int (*hw_config)(struct intel_uncore_box *, struct perf_event *);
+ struct event_constraint * (*get_constraint)(struct intel_uncore_box *, struct perf_event *);
+ void (*put_constraint)(struct intel_uncore_box *, struct perf_event *);
+};
+
+struct uncore_event_desc {
+ struct device_attribute attr;
+ const char *config;
+};
+
+struct freerunning_counters {
+ unsigned int counter_base;
+ unsigned int counter_offset;
+ unsigned int box_offset;
+ unsigned int num_counters;
+ unsigned int bits;
+ unsigned int *box_offsets;
+};
+
+struct intel_uncore_topology {
+ u64 configuration;
+ int segment;
+};
+
+struct intel_uncore_extra_reg {
+ raw_spinlock_t lock;
+ u64 config;
+ u64 config1;
+ u64 config2;
+ atomic_t ref;
+};
+
+struct intel_uncore_box {
+ int dieid;
+ int n_active;
+ int n_events;
+ int cpu;
+ long unsigned int flags;
+ atomic_t refcnt;
+ struct perf_event *events[10];
+ struct perf_event *event_list[10];
+ struct event_constraint *event_constraint[10];
+ long unsigned int active_mask[1];
+ u64 tags[10];
+ struct pci_dev *pci_dev;
+ struct intel_uncore_pmu *pmu;
+ u64 hrtimer_duration;
+ struct hrtimer hrtimer;
+ struct list_head list;
+ struct list_head active_list;
+ void *io_addr;
+ struct intel_uncore_extra_reg shared_regs[0];
+};
+
+struct pci2phy_map {
+ struct list_head list;
+ int segment;
+ int pbus_to_dieid[256];
+};
+
+struct intel_uncore_init_fun {
+ void (*cpu_init)();
+ int (*pci_init)();
+ void (*mmio_init)();
+ bool use_discovery;
+};
+
+enum {
+ IRQC_IS_HARDIRQ = 0,
+ IRQC_IS_NESTED = 1,
+};
+
+enum {
+ IRQTF_RUNTHREAD = 0,
+ IRQTF_WARNED = 1,
+ IRQTF_AFFINITY = 2,
+ IRQTF_FORCED_THREAD = 3,
+ IRQTF_READY = 4,
+};
+
+struct seccomp_notif_sizes {
+ __u16 seccomp_notif;
+ __u16 seccomp_notif_resp;
+ __u16 seccomp_data;
+};
+
+struct seccomp_notif {
+ __u64 id;
+ __u32 pid;
+ __u32 flags;
+ struct seccomp_data data;
+};
+
+struct seccomp_notif_resp {
+ __u64 id;
+ __s64 val;
+ __s32 error;
+ __u32 flags;
+};
+
+struct seccomp_notif_addfd {
+ __u64 id;
+ __u32 flags;
+ __u32 srcfd;
+ __u32 newfd;
+ __u32 newfd_flags;
+};
+
+struct action_cache {
+ long unsigned int allow_native[8];
+};
+
+struct notification;
+
+struct seccomp_filter {
+ refcount_t refs;
+ refcount_t users;
+ bool log;
+ bool wait_killable_recv;
+ struct action_cache cache;
+ struct seccomp_filter *prev;
+ struct bpf_prog *prog;
+ struct notification *notif;
+ struct mutex notify_lock;
+ wait_queue_head_t wqh;
+};
+
+struct ctl_path {
+ const char *procname;
+};
+
+enum notify_state {
+ SECCOMP_NOTIFY_INIT = 0,
+ SECCOMP_NOTIFY_SENT = 1,
+ SECCOMP_NOTIFY_REPLIED = 2,
+};
+
+struct seccomp_knotif {
+ struct task_struct *task;
+ u64 id;
+ const struct seccomp_data *data;
+ enum notify_state state;
+ int error;
+ long int val;
+ u32 flags;
+ struct completion ready;
+ struct list_head list;
+ struct list_head addfd;
+};
+
+struct seccomp_kaddfd {
+ struct file *file;
+ int fd;
+ unsigned int flags;
+ __u32 ioctl_flags;
+ union {
+ bool setfd;
+ int ret;
+ };
+ struct completion completion;
+ struct list_head list;
+};
+
+struct notification {
+ struct semaphore request;
+ u64 next_id;
+ struct list_head notifications;
+};
+
+struct seccomp_log_name {
+ u32 log;
+ const char *name;
+};
+
+struct stat {
+ __kernel_ulong_t st_dev;
+ __kernel_ulong_t st_ino;
+ __kernel_ulong_t st_nlink;
+ unsigned int st_mode;
+ unsigned int st_uid;
+ unsigned int st_gid;
+ unsigned int __pad0;
+ __kernel_ulong_t st_rdev;
+ __kernel_long_t st_size;
+ __kernel_long_t st_blksize;
+ __kernel_long_t st_blocks;
+ __kernel_ulong_t st_atime;
+ __kernel_ulong_t st_atime_nsec;
+ __kernel_ulong_t st_mtime;
+ __kernel_ulong_t st_mtime_nsec;
+ __kernel_ulong_t st_ctime;
+ __kernel_ulong_t st_ctime_nsec;
+ __kernel_long_t __unused[3];
+};
+
+struct __old_kernel_stat {
+ short unsigned int st_dev;
+ short unsigned int st_ino;
+ short unsigned int st_mode;
+ short unsigned int st_nlink;
+ short unsigned int st_uid;
+ short unsigned int st_gid;
+ short unsigned int st_rdev;
+ unsigned int st_size;
+ unsigned int st_atime;
+ unsigned int st_mtime;
+ unsigned int st_ctime;
+};
+
+struct commit_header {
+ __be32 h_magic;
+ __be32 h_blocktype;
+ __be32 h_sequence;
+ unsigned char h_chksum_type;
+ unsigned char h_chksum_size;
+ unsigned char h_padding[2];
+ __be32 h_chksum[8];
+ __be64 h_commit_sec;
+ __be32 h_commit_nsec;
+};
+
+struct journal_block_tag3_s {
+ __be32 t_blocknr;
+ __be32 t_flags;
+ __be32 t_blocknr_high;
+ __be32 t_checksum;
+};
+
+typedef struct journal_block_tag3_s journal_block_tag3_t;
+
+struct journal_block_tag_s {
+ __be32 t_blocknr;
+ __be16 t_checksum;
+ __be16 t_flags;
+ __be32 t_blocknr_high;
+};
+
+typedef struct journal_block_tag_s journal_block_tag_t;
+
+struct level_datum {
+ struct mls_level *level;
+ unsigned char isalias;
+};
+
+struct cat_datum {
+ u32 value;
+ unsigned char isalias;
+};
+
+struct range_trans {
+ u32 source_type;
+ u32 target_type;
+ u32 target_class;
+};
+
+struct policy_data {
+ struct policydb *p;
+ void *fp;
+};
+
+struct policydb_compat_info {
+ int version;
+ int sym_num;
+ int ocon_num;
+};
+
+enum {
+ GENHD_FL_REMOVABLE = 1,
+ GENHD_FL_HIDDEN = 2,
+ GENHD_FL_NO_PART = 4,
+};
+
+struct blk_major_name {
+ struct blk_major_name *next;
+ int major;
+ char name[16];
+ void (*probe)(dev_t);
+};
+
+typedef int16_t S16;
+
+typedef U32 HUF_DTable;
+
+typedef struct {
+ U16 nextState;
+ BYTE nbAdditionalBits;
+ BYTE nbBits;
+ U32 baseValue;
+} ZSTD_seqSymbol;
+
+typedef struct {
+ ZSTD_seqSymbol LLTable[513];
+ ZSTD_seqSymbol OFTable[257];
+ ZSTD_seqSymbol MLTable[513];
+ HUF_DTable hufTable[4097];
+ U32 rep[3];
+ U32 workspace[157];
+} ZSTD_entropyDTables_t;
+
+typedef enum {
+ bt_raw = 0,
+ bt_rle = 1,
+ bt_compressed = 2,
+ bt_reserved = 3,
+} blockType_e;
+
+typedef enum {
+ ZSTDds_getFrameHeaderSize = 0,
+ ZSTDds_decodeFrameHeader = 1,
+ ZSTDds_decodeBlockHeader = 2,
+ ZSTDds_decompressBlock = 3,
+ ZSTDds_decompressLastBlock = 4,
+ ZSTDds_checkChecksum = 5,
+ ZSTDds_decodeSkippableHeader = 6,
+ ZSTDds_skipFrame = 7,
+} ZSTD_dStage;
+
+typedef enum {
+ ZSTD_f_zstd1 = 0,
+ ZSTD_f_zstd1_magicless = 1,
+} ZSTD_format_e;
+
+typedef enum {
+ ZSTD_d_validateChecksum = 0,
+ ZSTD_d_ignoreChecksum = 1,
+} ZSTD_forceIgnoreChecksum_e;
+
+typedef enum {
+ ZSTD_use_indefinitely = -1,
+ ZSTD_dont_use = 0,
+ ZSTD_use_once = 1,
+} ZSTD_dictUses_e;
+
+struct ZSTD_DDict_s;
+
+typedef struct ZSTD_DDict_s ZSTD_DDict;
+
+typedef struct {
+ const ZSTD_DDict **ddictPtrTable;
+ size_t ddictPtrTableSize;
+ size_t ddictPtrCount;
+} ZSTD_DDictHashSet;
+
+typedef enum {
+ ZSTD_rmd_refSingleDDict = 0,
+ ZSTD_rmd_refMultipleDDicts = 1,
+} ZSTD_refMultipleDDicts_e;
+
+typedef enum {
+ zdss_init = 0,
+ zdss_loadHeader = 1,
+ zdss_read = 2,
+ zdss_load = 3,
+ zdss_flush = 4,
+} ZSTD_dStreamStage;
+
+typedef enum {
+ ZSTD_bm_buffered = 0,
+ ZSTD_bm_stable = 1,
+} ZSTD_bufferMode_e;
+
+struct ZSTD_DCtx_s {
+ const ZSTD_seqSymbol *LLTptr;
+ const ZSTD_seqSymbol *MLTptr;
+ const ZSTD_seqSymbol *OFTptr;
+ const HUF_DTable *HUFptr;
+ ZSTD_entropyDTables_t entropy;
+ U32 workspace[640];
+ const void *previousDstEnd;
+ const void *prefixStart;
+ const void *virtualStart;
+ const void *dictEnd;
+ size_t expected;
+ ZSTD_frameHeader fParams;
+ U64 processedCSize;
+ U64 decodedSize;
+ blockType_e bType;
+ ZSTD_dStage stage;
+ U32 litEntropy;
+ U32 fseEntropy;
+ struct xxh64_state xxhState;
+ size_t headerSize;
+ ZSTD_format_e format;
+ ZSTD_forceIgnoreChecksum_e forceIgnoreChecksum;
+ U32 validateChecksum;
+ const BYTE *litPtr;
+ ZSTD_customMem customMem;
+ size_t litSize;
+ size_t rleSize;
+ size_t staticSize;
+ int bmi2;
+ ZSTD_DDict *ddictLocal;
+ const ZSTD_DDict *ddict;
+ U32 dictID;
+ int ddictIsCold;
+ ZSTD_dictUses_e dictUses;
+ ZSTD_DDictHashSet *ddictSet;
+ ZSTD_refMultipleDDicts_e refMultipleDDicts;
+ ZSTD_dStreamStage streamStage;
+ char *inBuff;
+ size_t inBuffSize;
+ size_t inPos;
+ size_t maxWindowSize;
+ char *outBuff;
+ size_t outBuffSize;
+ size_t outStart;
+ size_t outEnd;
+ size_t lhSize;
+ void *legacyContext;
+ U32 previousLegacyVersion;
+ U32 legacyVersion;
+ U32 hostageByte;
+ int noForwardProgress;
+ ZSTD_bufferMode_e outBufferMode;
+ ZSTD_outBuffer expectedOutBuffer;
+ BYTE litBuffer[131104];
+ BYTE headerBuffer[18];
+ size_t oversizedDuration;
+};
+
+typedef struct ZSTD_DCtx_s ZSTD_DCtx___2;
+
+struct ZSTD_DDict_s {
+ void *dictBuffer;
+ const void *dictContent;
+ size_t dictSize;
+ ZSTD_entropyDTables_t entropy;
+ U32 dictID;
+ U32 entropyPresent;
+ ZSTD_customMem cMem;
+};
+
+typedef enum {
+ ZSTD_dct_auto = 0,
+ ZSTD_dct_rawContent = 1,
+ ZSTD_dct_fullDict = 2,
+} ZSTD_dictContentType_e;
+
+typedef enum {
+ ZSTD_dlm_byCopy = 0,
+ ZSTD_dlm_byRef = 1,
+} ZSTD_dictLoadMethod_e;
+
+struct ei_entry {
+ struct list_head list;
+ long unsigned int start_addr;
+ long unsigned int end_addr;
+ int etype;
+ void *priv;
+};
+
+struct acpi_osi_entry {
+ char string[64];
+ bool enable;
+};
+
+struct acpi_osi_config {
+ u8 default_disabling;
+ unsigned int linux_enable: 1;
+ unsigned int linux_dmi: 1;
+ unsigned int linux_cmdline: 1;
+ unsigned int darwin_enable: 1;
+ unsigned int darwin_dmi: 1;
+ unsigned int darwin_cmdline: 1;
+};
+
+struct container_dev {
+ struct device dev;
+ int (*offline)(struct container_dev *);
+};
+
+struct exar8250_platform {
+ int (*rs485_config)(struct uart_port *, struct ktermios *, struct serial_rs485 *);
+ const struct serial_rs485 *rs485_supported;
+ int (*register_gpio)(struct pci_dev *, struct uart_8250_port *);
+ void (*unregister_gpio)(struct uart_8250_port *);
+};
+
+struct exar8250;
+
+struct exar8250_board {
+ unsigned int num_ports;
+ unsigned int reg_shift;
+ int (*setup)(struct exar8250 *, struct pci_dev *, struct uart_8250_port *, int);
+ void (*exit)(struct pci_dev *);
+};
+
+struct exar8250 {
+ unsigned int nr;
+ struct exar8250_board *board;
+ void *virt;
+ int line[0];
+};
+
+struct ps2pp_info {
+ u8 model;
+ u8 kind;
+ u16 features;
+};
+
+enum hwmon_sensor_types {
+ hwmon_chip = 0,
+ hwmon_temp = 1,
+ hwmon_in = 2,
+ hwmon_curr = 3,
+ hwmon_power = 4,
+ hwmon_energy = 5,
+ hwmon_humidity = 6,
+ hwmon_fan = 7,
+ hwmon_pwm = 8,
+ hwmon_intrusion = 9,
+ hwmon_max = 10,
+};
+
+enum hwmon_temp_attributes {
+ hwmon_temp_enable = 0,
+ hwmon_temp_input = 1,
+ hwmon_temp_type = 2,
+ hwmon_temp_lcrit = 3,
+ hwmon_temp_lcrit_hyst = 4,
+ hwmon_temp_min = 5,
+ hwmon_temp_min_hyst = 6,
+ hwmon_temp_max = 7,
+ hwmon_temp_max_hyst = 8,
+ hwmon_temp_crit = 9,
+ hwmon_temp_crit_hyst = 10,
+ hwmon_temp_emergency = 11,
+ hwmon_temp_emergency_hyst = 12,
+ hwmon_temp_alarm = 13,
+ hwmon_temp_lcrit_alarm = 14,
+ hwmon_temp_min_alarm = 15,
+ hwmon_temp_max_alarm = 16,
+ hwmon_temp_crit_alarm = 17,
+ hwmon_temp_emergency_alarm = 18,
+ hwmon_temp_fault = 19,
+ hwmon_temp_offset = 20,
+ hwmon_temp_label = 21,
+ hwmon_temp_lowest = 22,
+ hwmon_temp_highest = 23,
+ hwmon_temp_reset_history = 24,
+ hwmon_temp_rated_min = 25,
+ hwmon_temp_rated_max = 26,
+};
+
+enum hwmon_in_attributes {
+ hwmon_in_enable = 0,
+ hwmon_in_input = 1,
+ hwmon_in_min = 2,
+ hwmon_in_max = 3,
+ hwmon_in_lcrit = 4,
+ hwmon_in_crit = 5,
+ hwmon_in_average = 6,
+ hwmon_in_lowest = 7,
+ hwmon_in_highest = 8,
+ hwmon_in_reset_history = 9,
+ hwmon_in_label = 10,
+ hwmon_in_alarm = 11,
+ hwmon_in_min_alarm = 12,
+ hwmon_in_max_alarm = 13,
+ hwmon_in_lcrit_alarm = 14,
+ hwmon_in_crit_alarm = 15,
+ hwmon_in_rated_min = 16,
+ hwmon_in_rated_max = 17,
+};
+
+enum hwmon_curr_attributes {
+ hwmon_curr_enable = 0,
+ hwmon_curr_input = 1,
+ hwmon_curr_min = 2,
+ hwmon_curr_max = 3,
+ hwmon_curr_lcrit = 4,
+ hwmon_curr_crit = 5,
+ hwmon_curr_average = 6,
+ hwmon_curr_lowest = 7,
+ hwmon_curr_highest = 8,
+ hwmon_curr_reset_history = 9,
+ hwmon_curr_label = 10,
+ hwmon_curr_alarm = 11,
+ hwmon_curr_min_alarm = 12,
+ hwmon_curr_max_alarm = 13,
+ hwmon_curr_lcrit_alarm = 14,
+ hwmon_curr_crit_alarm = 15,
+ hwmon_curr_rated_min = 16,
+ hwmon_curr_rated_max = 17,
+};
+
+struct hwmon_ops {
+ umode_t (*is_visible)(const void *, enum hwmon_sensor_types, u32, int);
+ int (*read)(struct device *, enum hwmon_sensor_types, u32, int, long int *);
+ int (*read_string)(struct device *, enum hwmon_sensor_types, u32, int, const char **);
+ int (*write)(struct device *, enum hwmon_sensor_types, u32, int, long int);
+};
+
+struct hwmon_channel_info {
+ enum hwmon_sensor_types type;
+ const u32 *config;
+};
+
+struct hwmon_chip_info {
+ const struct hwmon_ops *ops;
+ const struct hwmon_channel_info **info;
+};
+
+struct power_supply_hwmon {
+ struct power_supply *psy;
+ long unsigned int *props;
+};
+
+struct hwmon_type_attr_list {
+ const u32 *attrs;
+ size_t n_attrs;
+};
+
+struct dmi_memdev_info {
+ const char *device;
+ const char *bank;
+ u64 size;
+ u16 handle;
+ u8 type;
+};
+
+enum {
+ INET_FRAG_FIRST_IN = 1,
+ INET_FRAG_LAST_IN = 2,
+ INET_FRAG_COMPLETE = 4,
+ INET_FRAG_HASH_DEAD = 8,
+ INET_FRAG_DROP = 16,
+};
+
+struct frag_queue {
+ struct inet_frag_queue q;
+ int iif;
+ __u16 nhoffset;
+ u8 ecn;
+};
+
+enum {
+ EXTRA_REG_NHMEX_M_FILTER = 0,
+ EXTRA_REG_NHMEX_M_DSP = 1,
+ EXTRA_REG_NHMEX_M_ISS = 2,
+ EXTRA_REG_NHMEX_M_MAP = 3,
+ EXTRA_REG_NHMEX_M_MSC_THR = 4,
+ EXTRA_REG_NHMEX_M_PGT = 5,
+ EXTRA_REG_NHMEX_M_PLD = 6,
+ EXTRA_REG_NHMEX_M_ZDP_CTL_FVC = 7,
+};
+
+struct acpi_table_boot {
+ struct acpi_table_header header;
+ u8 cmos_index;
+ u8 reserved[3];
+};
+
+struct acpi_table_hpet {
+ struct acpi_table_header header;
+ u32 id;
+ struct acpi_generic_address address;
+ u8 sequence;
+ u16 minimum_tick;
+ u8 flags;
+} __attribute__((packed));
+
+struct acpi_table_madt {
+ struct acpi_table_header header;
+ u32 address;
+ u32 flags;
+};
+
+struct acpi_madt_local_apic {
+ struct acpi_subtable_header header;
+ u8 processor_id;
+ u8 id;
+ u32 lapic_flags;
+};
+
+struct acpi_madt_io_apic {
+ struct acpi_subtable_header header;
+ u8 id;
+ u8 reserved;
+ u32 address;
+ u32 global_irq_base;
+};
+
+struct acpi_madt_interrupt_override {
+ struct acpi_subtable_header header;
+ u8 bus;
+ u8 source_irq;
+ u32 global_irq;
+ u16 inti_flags;
+} __attribute__((packed));
+
+struct acpi_madt_nmi_source {
+ struct acpi_subtable_header header;
+ u16 inti_flags;
+ u32 global_irq;
+};
+
+struct acpi_madt_local_apic_nmi {
+ struct acpi_subtable_header header;
+ u8 processor_id;
+ u16 inti_flags;
+ u8 lint;
+} __attribute__((packed));
+
+struct acpi_madt_local_apic_override {
+ struct acpi_subtable_header header;
+ u16 reserved;
+ u64 address;
+} __attribute__((packed));
+
+struct acpi_madt_local_sapic {
+ struct acpi_subtable_header header;
+ u8 processor_id;
+ u8 id;
+ u8 eid;
+ u8 reserved[3];
+ u32 lapic_flags;
+ u32 uid;
+ char uid_string[1];
+} __attribute__((packed));
+
+struct acpi_madt_local_x2apic {
+ struct acpi_subtable_header header;
+ u16 reserved;
+ u32 local_apic_id;
+ u32 lapic_flags;
+ u32 uid;
+};
+
+struct acpi_madt_local_x2apic_nmi {
+ struct acpi_subtable_header header;
+ u16 inti_flags;
+ u32 uid;
+ u8 lint;
+ u8 reserved[3];
+};
+
+struct acpi_madt_multiproc_wakeup {
+ struct acpi_subtable_header header;
+ u16 mailbox_version;
+ u32 reserved;
+ u64 base_address;
+};
+
+struct acpi_madt_multiproc_wakeup_mailbox {
+ u16 command;
+ u16 reserved;
+ u32 apic_id;
+ u64 wakeup_vector;
+ u8 reserved_os[2032];
+ u8 reserved_firmware[2048];
+};
+
+struct profile_hit {
+ u32 pc;
+ u32 hits;
+};
+
+struct rt_wake_q_head {
+ struct wake_q_head head;
+ struct task_struct *rtlock_task;
+};
+
+typedef u32 note_buf_t[92];
+
+enum kmsg_dump_reason {
+ KMSG_DUMP_UNDEF = 0,
+ KMSG_DUMP_PANIC = 1,
+ KMSG_DUMP_OOPS = 2,
+ KMSG_DUMP_EMERG = 3,
+ KMSG_DUMP_SHUTDOWN = 4,
+ KMSG_DUMP_MAX = 5,
+};
+
+struct bpf_preload_info {
+ char link_name[16];
+ struct bpf_link *link;
+};
+
+struct bpf_preload_ops {
+ int (*preload)(struct bpf_preload_info *);
+ struct module *owner;
+};
+
+enum bpf_cmd {
+ BPF_MAP_CREATE = 0,
+ BPF_MAP_LOOKUP_ELEM = 1,
+ BPF_MAP_UPDATE_ELEM = 2,
+ BPF_MAP_DELETE_ELEM = 3,
+ BPF_MAP_GET_NEXT_KEY = 4,
+ BPF_PROG_LOAD = 5,
+ BPF_OBJ_PIN = 6,
+ BPF_OBJ_GET = 7,
+ BPF_PROG_ATTACH = 8,
+ BPF_PROG_DETACH = 9,
+ BPF_PROG_TEST_RUN = 10,
+ BPF_PROG_RUN = 10,
+ BPF_PROG_GET_NEXT_ID = 11,
+ BPF_MAP_GET_NEXT_ID = 12,
+ BPF_PROG_GET_FD_BY_ID = 13,
+ BPF_MAP_GET_FD_BY_ID = 14,
+ BPF_OBJ_GET_INFO_BY_FD = 15,
+ BPF_PROG_QUERY = 16,
+ BPF_RAW_TRACEPOINT_OPEN = 17,
+ BPF_BTF_LOAD = 18,
+ BPF_BTF_GET_FD_BY_ID = 19,
+ BPF_TASK_FD_QUERY = 20,
+ BPF_MAP_LOOKUP_AND_DELETE_ELEM = 21,
+ BPF_MAP_FREEZE = 22,
+ BPF_BTF_GET_NEXT_ID = 23,
+ BPF_MAP_LOOKUP_BATCH = 24,
+ BPF_MAP_LOOKUP_AND_DELETE_BATCH = 25,
+ BPF_MAP_UPDATE_BATCH = 26,
+ BPF_MAP_DELETE_BATCH = 27,
+ BPF_LINK_CREATE = 28,
+ BPF_LINK_UPDATE = 29,
+ BPF_LINK_GET_FD_BY_ID = 30,
+ BPF_LINK_GET_NEXT_ID = 31,
+ BPF_ENABLE_STATS = 32,
+ BPF_ITER_CREATE = 33,
+ BPF_LINK_DETACH = 34,
+ BPF_PROG_BIND_MAP = 35,
+};
+
+struct bpf_map_desc {
+ int map_fd;
+ __u32 max_entries;
+ __u64 initial_value;
+};
+
+struct bpf_prog_desc {
+ int prog_fd;
+};
+
+enum {
+ BPF_SKEL_KERNEL = 1,
+};
+
+struct bpf_loader_ctx {
+ __u32 sz;
+ __u32 flags;
+ __u32 log_level;
+ __u32 log_size;
+ __u64 log_buf;
+};
+
+struct bpf_load_and_run_opts {
+ struct bpf_loader_ctx *ctx;
+ const void *data;
+ const void *insns;
+ __u32 data_sz;
+ __u32 insns_sz;
+ const char *errstr;
+};
+
+struct iterators_bpf__rodata {};
+
+struct iterators_bpf {
+ struct bpf_loader_ctx ctx;
+ struct {
+ struct bpf_map_desc rodata;
+ } maps;
+ struct {
+ struct bpf_prog_desc dump_bpf_map;
+ struct bpf_prog_desc dump_bpf_prog;
+ } progs;
+ struct {
+ int dump_bpf_map_fd;
+ int dump_bpf_prog_fd;
+ } links;
+ struct iterators_bpf__rodata *rodata;
+};
+
+struct static_key_mod {
+ struct static_key_mod *next;
+ struct jump_entry *entries;
+ struct module *mod;
+};
+
+enum jump_label_type {
+ JUMP_LABEL_NOP = 0,
+ JUMP_LABEL_JMP = 1,
+};
+
+struct static_key_deferred {
+ struct static_key key;
+ long unsigned int timeout;
+ struct delayed_work work;
+};
+
+struct pkcs7_message;
+
+struct trace_event_raw_oom_score_adj_update {
+ struct trace_entry ent;
+ pid_t pid;
+ char comm[16];
+ short int oom_score_adj;
+ char __data[0];
+};
+
+struct trace_event_raw_reclaim_retry_zone {
+ struct trace_entry ent;
+ int node;
+ int zone_idx;
+ int order;
+ long unsigned int reclaimable;
+ long unsigned int available;
+ long unsigned int min_wmark;
+ int no_progress_loops;
+ bool wmark_check;
+ char __data[0];
+};
+
+struct trace_event_raw_mark_victim {
+ struct trace_entry ent;
+ int pid;
+ char __data[0];
+};
+
+struct trace_event_raw_wake_reaper {
+ struct trace_entry ent;
+ int pid;
+ char __data[0];
+};
+
+struct trace_event_raw_start_task_reaping {
+ struct trace_entry ent;
+ int pid;
+ char __data[0];
+};
+
+struct trace_event_raw_finish_task_reaping {
+ struct trace_entry ent;
+ int pid;
+ char __data[0];
+};
+
+struct trace_event_raw_skip_task_reaping {
+ struct trace_entry ent;
+ int pid;
+ char __data[0];
+};
+
+struct trace_event_raw_compact_retry {
+ struct trace_entry ent;
+ int order;
+ int priority;
+ int result;
+ int retries;
+ int max_retries;
+ bool ret;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_oom_score_adj_update {};
+
+struct trace_event_data_offsets_reclaim_retry_zone {};
+
+struct trace_event_data_offsets_mark_victim {};
+
+struct trace_event_data_offsets_wake_reaper {};
+
+struct trace_event_data_offsets_start_task_reaping {};
+
+struct trace_event_data_offsets_finish_task_reaping {};
+
+struct trace_event_data_offsets_skip_task_reaping {};
+
+struct trace_event_data_offsets_compact_retry {};
+
+typedef void (*btf_trace_oom_score_adj_update)(void *, struct task_struct *);
+
+typedef void (*btf_trace_reclaim_retry_zone)(void *, struct zoneref *, int, long unsigned int, long unsigned int, long unsigned int, int, bool);
+
+typedef void (*btf_trace_mark_victim)(void *, int);
+
+typedef void (*btf_trace_wake_reaper)(void *, int);
+
+typedef void (*btf_trace_start_task_reaping)(void *, int);
+
+typedef void (*btf_trace_finish_task_reaping)(void *, int);
+
+typedef void (*btf_trace_skip_task_reaping)(void *, int);
+
+typedef void (*btf_trace_compact_retry)(void *, int, enum compact_priority, enum compact_result, int, int, bool);
+
+struct zap_details;
+
+struct sysctl_alias {
+ const char *kernel_param;
+ const char *sysctl_param;
+};
+
+struct gen_pool;
+
+typedef long unsigned int (*genpool_algo_t)(long unsigned int *, long unsigned int, long unsigned int, unsigned int, void *, struct gen_pool *, long unsigned int);
+
+struct gen_pool {
+ spinlock_t lock;
+ struct list_head chunks;
+ int min_alloc_order;
+ genpool_algo_t algo;
+ void *data;
+ const char *name;
+};
+
+struct gen_pool_chunk {
+ struct list_head next_chunk;
+ atomic_long_t avail;
+ phys_addr_t phys_addr;
+ void *owner;
+ long unsigned int start_addr;
+ long unsigned int end_addr;
+ long unsigned int bits[0];
+};
+
+struct genpool_data_align {
+ int align;
+};
+
+struct genpool_data_fixed {
+ long unsigned int offset;
+};
+
+struct memdev {
+ const char *name;
+ umode_t mode;
+ const struct file_operations *fops;
+ fmode_t fmode;
+};
+
+struct flow_dissector_key {
+ enum flow_dissector_key_id key_id;
+ size_t offset;
+};
+
+struct mii_ioctl_data {
+ __u16 phy_id;
+ __u16 reg_num;
+ __u16 val_in;
+ __u16 val_out;
+};
+
+struct bond_vlan_tag {
+ __be16 vlan_proto;
+ short unsigned int vlan_id;
+};
+
+struct bond_net {
+ struct net *net;
+ struct list_head dev_list;
+ struct proc_dir_entry *proc_dir;
+ struct class_attribute class_attr_bonding_masters;
+};
+
+struct ip6_tnl_parm {
+ char name[16];
+ int link;
+ __u8 proto;
+ __u8 encap_limit;
+ __u8 hop_limit;
+ __be32 flowinfo;
+ __u32 flags;
+ struct in6_addr laddr;
+ struct in6_addr raddr;
+};
+
+struct __ip6_tnl_parm {
+ char name[16];
+ int link;
+ __u8 proto;
+ __u8 encap_limit;
+ __u8 hop_limit;
+ bool collect_md;
+ __be32 flowinfo;
+ __u32 flags;
+ struct in6_addr laddr;
+ struct in6_addr raddr;
+ __be16 i_flags;
+ __be16 o_flags;
+ __be32 i_key;
+ __be32 o_key;
+ __u32 fwmark;
+ __u32 index;
+ __u8 erspan_ver;
+ __u8 dir;
+ __u16 hwid;
+};
+
+struct ip6_tnl {
+ struct ip6_tnl *next;
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+ struct net *net;
+ struct __ip6_tnl_parm parms;
+ struct flowi fl;
+ struct dst_cache dst_cache;
+ struct gro_cells gro_cells;
+ int err_count;
+ long unsigned int err_time;
+ __u32 i_seqno;
+ atomic_t o_seqno;
+ int hlen;
+ int tun_hlen;
+ int encap_hlen;
+ struct ip_tunnel_encap encap;
+ int mlink;
+};
+
+struct ipv6_tlv_tnl_enc_lim {
+ __u8 type;
+ __u8 length;
+ __u8 encap_limit;
+};
+
+struct ip6_tnl_net {
+ struct net_device *fb_tnl_dev;
+ struct ip6_tnl *tnls_r_l[32];
+ struct ip6_tnl *tnls_wc[1];
+ struct ip6_tnl **tnls[2];
+ struct ip6_tnl *collect_md_tun;
+};
+
+struct ipv6_tel_txoption {
+ struct ipv6_txoptions ops;
+ __u8 dst_opt[8];
+};
+
+struct maple_metadata {
+ unsigned char end;
+ unsigned char gap;
+};
+
+struct maple_pnode;
+
+struct maple_range_64 {
+ struct maple_pnode *parent;
+ long unsigned int pivot[15];
+ union {
+ void *slot[16];
+ struct {
+ void *pad[15];
+ struct maple_metadata meta;
+ };
+ };
+};
+
+struct maple_arange_64 {
+ struct maple_pnode *parent;
+ long unsigned int pivot[9];
+ void *slot[10];
+ long unsigned int gap[10];
+ struct maple_metadata meta;
+};
+
+struct maple_topiary {
+ struct maple_pnode *parent;
+ struct maple_enode *next;
+};
+
+enum maple_type {
+ maple_dense = 0,
+ maple_leaf_64 = 1,
+ maple_range_64 = 2,
+ maple_arange_64 = 3,
+};
+
+struct maple_node {
+ union {
+ struct {
+ struct maple_pnode *parent;
+ void *slot[31];
+ };
+ struct {
+ void *pad;
+ struct callback_head rcu;
+ struct maple_enode *piv_parent;
+ unsigned char parent_slot;
+ enum maple_type type;
+ unsigned char slot_len;
+ unsigned int ma_flags;
+ };
+ struct maple_range_64 mr64;
+ struct maple_arange_64 ma64;
+ struct maple_alloc alloc;
+ };
+};
+
+struct ma_topiary {
+ struct maple_enode *head;
+ struct maple_enode *tail;
+ struct maple_tree *mtree;
+};
+
+struct ma_wr_state {
+ struct ma_state *mas;
+ struct maple_node *node;
+ long unsigned int r_min;
+ long unsigned int r_max;
+ enum maple_type type;
+ unsigned char offset_end;
+ unsigned char node_end;
+ long unsigned int *pivots;
+ long unsigned int end_piv;
+ void **slots;
+ void *entry;
+ void *content;
+};
+
+struct trace_event_raw_ma_op {
+ struct trace_entry ent;
+ const char *fn;
+ long unsigned int min;
+ long unsigned int max;
+ long unsigned int index;
+ long unsigned int last;
+ void *node;
+ char __data[0];
+};
+
+struct trace_event_raw_ma_read {
+ struct trace_entry ent;
+ const char *fn;
+ long unsigned int min;
+ long unsigned int max;
+ long unsigned int index;
+ long unsigned int last;
+ void *node;
+ char __data[0];
+};
+
+struct trace_event_raw_ma_write {
+ struct trace_entry ent;
+ const char *fn;
+ long unsigned int min;
+ long unsigned int max;
+ long unsigned int index;
+ long unsigned int last;
+ long unsigned int piv;
+ void *val;
+ void *node;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_ma_op {};
+
+struct trace_event_data_offsets_ma_read {};
+
+struct trace_event_data_offsets_ma_write {};
+
+typedef void (*btf_trace_ma_op)(void *, const char *, struct ma_state *);
+
+typedef void (*btf_trace_ma_read)(void *, const char *, struct ma_state *);
+
+typedef void (*btf_trace_ma_write)(void *, const char *, struct ma_state *, long unsigned int, void *);
+
+struct maple_big_node {
+ struct maple_pnode *parent;
+ long unsigned int pivot[33];
+ union {
+ struct maple_enode *slot[34];
+ struct {
+ long unsigned int padding[21];
+ long unsigned int gap[21];
+ };
+ };
+ unsigned char b_end;
+ enum maple_type type;
+};
+
+struct maple_subtree_state {
+ struct ma_state *orig_l;
+ struct ma_state *orig_r;
+ struct ma_state *l;
+ struct ma_state *m;
+ struct ma_state *r;
+ struct ma_topiary *free;
+ struct ma_topiary *destroy;
+ struct maple_big_node *bn;
+};
+
+enum {
+ SNB_PCI_UNCORE_IMC = 0,
+};
+
+enum perf_snb_uncore_imc_freerunning_types {
+ SNB_PCI_UNCORE_IMC_DATA_READS = 0,
+ SNB_PCI_UNCORE_IMC_DATA_WRITES = 1,
+ SNB_PCI_UNCORE_IMC_GT_REQUESTS = 2,
+ SNB_PCI_UNCORE_IMC_IA_REQUESTS = 3,
+ SNB_PCI_UNCORE_IMC_IO_REQUESTS = 4,
+ SNB_PCI_UNCORE_IMC_FREERUNNING_TYPE_MAX = 5,
+};
+
+struct imc_uncore_pci_dev {
+ __u32 pci_id;
+ struct pci_driver *driver;
+};
+
+enum perf_tgl_uncore_imc_freerunning_types {
+ TGL_MMIO_UNCORE_IMC_DATA_TOTAL = 0,
+ TGL_MMIO_UNCORE_IMC_DATA_READ = 1,
+ TGL_MMIO_UNCORE_IMC_DATA_WRITE = 2,
+ TGL_MMIO_UNCORE_IMC_FREERUNNING_TYPE_MAX = 3,
+};
+
+enum perf_adl_uncore_imc_freerunning_types {
+ ADL_MMIO_UNCORE_IMC_DATA_TOTAL = 0,
+ ADL_MMIO_UNCORE_IMC_DATA_READ = 1,
+ ADL_MMIO_UNCORE_IMC_DATA_WRITE = 2,
+ ADL_MMIO_UNCORE_IMC_FREERUNNING_TYPE_MAX = 3,
+};
+
+struct rt_mutex {
+ struct rt_mutex_base rtmutex;
+ struct lockdep_map dep_map;
+};
+
+enum rtmutex_chainwalk {
+ RT_MUTEX_MIN_CHAINWALK = 0,
+ RT_MUTEX_FULL_CHAINWALK = 1,
+};
+
+enum tick_nohz_mode {
+ NOHZ_MODE_INACTIVE = 0,
+ NOHZ_MODE_LOWRES = 1,
+ NOHZ_MODE_HIGHRES = 2,
+};
+
+struct tick_sched {
+ struct hrtimer sched_timer;
+ long unsigned int check_clocks;
+ enum tick_nohz_mode nohz_mode;
+ unsigned int inidle: 1;
+ unsigned int tick_stopped: 1;
+ unsigned int idle_active: 1;
+ unsigned int do_timer_last: 1;
+ unsigned int got_idle_tick: 1;
+ ktime_t last_tick;
+ ktime_t next_tick;
+ long unsigned int idle_jiffies;
+ long unsigned int idle_calls;
+ long unsigned int idle_sleeps;
+ ktime_t idle_entrytime;
+ ktime_t idle_waketime;
+ ktime_t idle_exittime;
+ ktime_t idle_sleeptime;
+ ktime_t iowait_sleeptime;
+ long unsigned int last_jiffies;
+ u64 timer_expires;
+ u64 timer_expires_base;
+ u64 next_timer;
+ ktime_t idle_expires;
+ atomic_t tick_dep_mask;
+ long unsigned int last_tick_jiffies;
+ unsigned int stalled_jiffies;
+};
+
+struct timer_list_iter {
+ int cpu;
+ bool second_pass;
+ u64 now;
+};
+
+struct cpu_stop_done {
+ atomic_t nr_todo;
+ int ret;
+ struct completion completion;
+};
+
+struct cpu_stopper {
+ struct task_struct *thread;
+ raw_spinlock_t lock;
+ bool enabled;
+ struct list_head works;
+ struct cpu_stop_work stop_work;
+ long unsigned int caller;
+ cpu_stop_fn_t fn;
+};
+
+enum multi_stop_state {
+ MULTI_STOP_NONE = 0,
+ MULTI_STOP_PREPARE = 1,
+ MULTI_STOP_DISABLE_IRQ = 2,
+ MULTI_STOP_RUN = 3,
+ MULTI_STOP_EXIT = 4,
+};
+
+struct multi_stop_data {
+ cpu_stop_fn_t fn;
+ void *data;
+ unsigned int num_threads;
+ const struct cpumask *active_cpus;
+ enum multi_stop_state state;
+ atomic_t thread_ack;
+};
+
+struct mmap_unlock_irq_work {
+ struct irq_work irq_work;
+ struct mm_struct *mm;
+};
+
+struct bpf_iter_seq_task_common {
+ struct pid_namespace *ns;
+ enum bpf_iter_task_type type;
+ u32 pid;
+ u32 pid_visiting;
+};
+
+struct bpf_iter_seq_task_info {
+ struct bpf_iter_seq_task_common common;
+ u32 tid;
+};
+
+struct bpf_iter__task {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct task_struct *task;
+ };
+};
+
+struct bpf_iter_seq_task_file_info {
+ struct bpf_iter_seq_task_common common;
+ struct task_struct *task;
+ u32 tid;
+ u32 fd;
+};
+
+struct bpf_iter__task_file {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct task_struct *task;
+ };
+ u32 fd;
+ union {
+ struct file *file;
+ };
+};
+
+struct bpf_iter_seq_task_vma_info {
+ struct bpf_iter_seq_task_common common;
+ struct task_struct *task;
+ struct vm_area_struct *vma;
+ u32 tid;
+ long unsigned int prev_vm_start;
+ long unsigned int prev_vm_end;
+};
+
+enum bpf_task_vma_iter_find_op {
+ task_vma_iter_first_vma = 0,
+ task_vma_iter_next_vma = 1,
+ task_vma_iter_find_vma = 2,
+};
+
+struct bpf_iter__task_vma {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct task_struct *task;
+ };
+ union {
+ struct vm_area_struct *vma;
+ };
+};
+
+typedef u64 (*btf_bpf_find_vma)(struct task_struct *, u64, bpf_callback_t, void *, u64);
+
+struct proc_maps_private {
+ struct inode *inode;
+ struct task_struct *task;
+ struct mm_struct *mm;
+ struct vma_iterator iter;
+ struct mempolicy *task_mempolicy;
+};
+
+struct mem_size_stats {
+ long unsigned int resident;
+ long unsigned int shared_clean;
+ long unsigned int shared_dirty;
+ long unsigned int private_clean;
+ long unsigned int private_dirty;
+ long unsigned int referenced;
+ long unsigned int anonymous;
+ long unsigned int lazyfree;
+ long unsigned int anonymous_thp;
+ long unsigned int shmem_thp;
+ long unsigned int file_thp;
+ long unsigned int swap;
+ long unsigned int shared_hugetlb;
+ long unsigned int private_hugetlb;
+ u64 pss;
+ u64 pss_anon;
+ u64 pss_file;
+ u64 pss_shmem;
+ u64 pss_dirty;
+ u64 pss_locked;
+ u64 swap_pss;
+};
+
+enum clear_refs_types {
+ CLEAR_REFS_ALL = 1,
+ CLEAR_REFS_ANON = 2,
+ CLEAR_REFS_MAPPED = 3,
+ CLEAR_REFS_SOFT_DIRTY = 4,
+ CLEAR_REFS_MM_HIWATER_RSS = 5,
+ CLEAR_REFS_LAST = 6,
+};
+
+struct clear_refs_private {
+ enum clear_refs_types type;
+};
+
+typedef struct {
+ u64 pme;
+} pagemap_entry_t;
+
+struct pagemapread {
+ int pos;
+ int len;
+ pagemap_entry_t *buffer;
+ bool show_pfn;
+};
+
+struct numa_maps {
+ long unsigned int pages;
+ long unsigned int anon;
+ long unsigned int active;
+ long unsigned int writeback;
+ long unsigned int mapcount_max;
+ long unsigned int dirty;
+ long unsigned int swapcache;
+ long unsigned int node[64];
+};
+
+struct numa_maps_private {
+ struct proc_maps_private proc_maps;
+ struct numa_maps md;
+};
+
+struct sha1_state {
+ u32 state[5];
+ u64 count;
+ u8 buffer[64];
+};
+
+typedef void sha1_block_fn(struct sha1_state *, const u8 *, int);
+
+enum blacklist_hash_type {
+ BLACKLIST_HASH_X509_TBS = 1,
+ BLACKLIST_HASH_BINARY = 2,
+};
+
+struct mac_partition {
+ __be16 signature;
+ __be16 res1;
+ __be32 map_count;
+ __be32 start_block;
+ __be32 block_count;
+ char name[32];
+ char type[32];
+ __be32 data_start;
+ __be32 data_count;
+ __be32 status;
+ __be32 boot_start;
+ __be32 boot_size;
+ __be32 boot_load;
+ __be32 boot_load2;
+ __be32 boot_entry;
+ __be32 boot_entry2;
+ __be32 boot_cksum;
+ char processor[16];
+};
+
+struct mac_driver_desc {
+ __be16 signature;
+ __be16 block_size;
+ __be32 block_count;
+};
+
+enum {
+ IOSQE_FIXED_FILE_BIT = 0,
+ IOSQE_IO_DRAIN_BIT = 1,
+ IOSQE_IO_LINK_BIT = 2,
+ IOSQE_IO_HARDLINK_BIT = 3,
+ IOSQE_ASYNC_BIT = 4,
+ IOSQE_BUFFER_SELECT_BIT = 5,
+ IOSQE_CQE_SKIP_SUCCESS_BIT = 6,
+};
+
+enum {
+ IORING_REGISTER_BUFFERS = 0,
+ IORING_UNREGISTER_BUFFERS = 1,
+ IORING_REGISTER_FILES = 2,
+ IORING_UNREGISTER_FILES = 3,
+ IORING_REGISTER_EVENTFD = 4,
+ IORING_UNREGISTER_EVENTFD = 5,
+ IORING_REGISTER_FILES_UPDATE = 6,
+ IORING_REGISTER_EVENTFD_ASYNC = 7,
+ IORING_REGISTER_PROBE = 8,
+ IORING_REGISTER_PERSONALITY = 9,
+ IORING_UNREGISTER_PERSONALITY = 10,
+ IORING_REGISTER_RESTRICTIONS = 11,
+ IORING_REGISTER_ENABLE_RINGS = 12,
+ IORING_REGISTER_FILES2 = 13,
+ IORING_REGISTER_FILES_UPDATE2 = 14,
+ IORING_REGISTER_BUFFERS2 = 15,
+ IORING_REGISTER_BUFFERS_UPDATE = 16,
+ IORING_REGISTER_IOWQ_AFF = 17,
+ IORING_UNREGISTER_IOWQ_AFF = 18,
+ IORING_REGISTER_IOWQ_MAX_WORKERS = 19,
+ IORING_REGISTER_RING_FDS = 20,
+ IORING_UNREGISTER_RING_FDS = 21,
+ IORING_REGISTER_PBUF_RING = 22,
+ IORING_UNREGISTER_PBUF_RING = 23,
+ IORING_REGISTER_SYNC_CANCEL = 24,
+ IORING_REGISTER_FILE_ALLOC_RANGE = 25,
+ IORING_REGISTER_LAST = 26,
+};
+
+struct hv_ops;
+
+struct hvc_struct {
+ struct tty_port port;
+ spinlock_t lock;
+ int index;
+ int do_wakeup;
+ char *outbuf;
+ int outbuf_size;
+ int n_outbuf;
+ uint32_t vtermno;
+ const struct hv_ops *ops;
+ int irq_requested;
+ int data;
+ struct winsize ws;
+ struct work_struct tty_resize;
+ struct list_head next;
+ long unsigned int flags;
+};
+
+struct hv_ops {
+ int (*get_chars)(uint32_t, char *, int);
+ int (*put_chars)(uint32_t, const char *, int);
+ int (*flush)(uint32_t, bool);
+ int (*notifier_add)(struct hvc_struct *, int);
+ void (*notifier_del)(struct hvc_struct *, int);
+ void (*notifier_hangup)(struct hvc_struct *, int);
+ int (*tiocmget)(struct hvc_struct *);
+ int (*tiocmset)(struct hvc_struct *, unsigned int, unsigned int);
+ void (*dtr_rts)(struct hvc_struct *, int);
+};
+
+struct internal_container {
+ struct klist_node node;
+ struct attribute_container *cont;
+ struct device classdev;
+};
+
+struct rtc_time {
+ int tm_sec;
+ int tm_min;
+ int tm_hour;
+ int tm_mday;
+ int tm_mon;
+ int tm_year;
+ int tm_wday;
+ int tm_yday;
+ int tm_isdst;
+};
+
+struct pps_event_time {
+ struct timespec64 ts_real;
+};
+
+struct of_bus;
+
+struct of_pci_range_parser {
+ struct device_node *node;
+ struct of_bus *bus;
+ const __be32 *range;
+ const __be32 *end;
+ int na;
+ int ns;
+ int pna;
+ bool dma;
+};
+
+struct of_pci_range {
+ union {
+ u64 pci_addr;
+ u64 bus_addr;
+ };
+ u64 cpu_addr;
+ u64 size;
+ u32 flags;
+};
+
+enum {
+ M_I17 = 0,
+ M_I20 = 1,
+ M_I20_SR = 2,
+ M_I24 = 3,
+ M_I24_8_1 = 4,
+ M_I24_10_1 = 5,
+ M_I27_11_1 = 6,
+ M_MINI = 7,
+ M_MINI_3_1 = 8,
+ M_MINI_4_1 = 9,
+ M_MB = 10,
+ M_MB_2 = 11,
+ M_MB_3 = 12,
+ M_MB_5_1 = 13,
+ M_MB_6_1 = 14,
+ M_MB_7_1 = 15,
+ M_MB_SR = 16,
+ M_MBA = 17,
+ M_MBA_3 = 18,
+ M_MBP = 19,
+ M_MBP_2 = 20,
+ M_MBP_2_2 = 21,
+ M_MBP_SR = 22,
+ M_MBP_4 = 23,
+ M_MBP_5_1 = 24,
+ M_MBP_5_2 = 25,
+ M_MBP_5_3 = 26,
+ M_MBP_6_1 = 27,
+ M_MBP_6_2 = 28,
+ M_MBP_7_1 = 29,
+ M_MBP_8_2 = 30,
+ M_UNKNOWN = 31,
+};
+
+struct efifb_dmi_info {
+ char *optname;
+ long unsigned int base;
+ int stride;
+ int width;
+ int height;
+ int flags;
+};
+
+enum {
+ OVERRIDE_NONE = 0,
+ OVERRIDE_BASE = 1,
+ OVERRIDE_STRIDE = 2,
+ OVERRIDE_HEIGHT = 4,
+ OVERRIDE_WIDTH = 8,
+};
+
+struct sr6_tlv {
+ __u8 type;
+ __u8 len;
+ __u8 data[0];
+};
+
+enum {
+ SEG6_ATTR_UNSPEC = 0,
+ SEG6_ATTR_DST = 1,
+ SEG6_ATTR_DSTLEN = 2,
+ SEG6_ATTR_HMACKEYID = 3,
+ SEG6_ATTR_SECRET = 4,
+ SEG6_ATTR_SECRETLEN = 5,
+ SEG6_ATTR_ALGID = 6,
+ SEG6_ATTR_HMACINFO = 7,
+ __SEG6_ATTR_MAX = 8,
+};
+
+enum {
+ SEG6_CMD_UNSPEC = 0,
+ SEG6_CMD_SETHMAC = 1,
+ SEG6_CMD_DUMPHMAC = 2,
+ SEG6_CMD_SET_TUNSRC = 3,
+ SEG6_CMD_GET_TUNSRC = 4,
+ __SEG6_CMD_MAX = 5,
+};
+
+struct msr_info {
+ u32 msr_no;
+ struct msr reg;
+ struct msr *msrs;
+ int err;
+};
+
+struct saved_msr {
+ bool valid;
+ struct msr_info info;
+};
+
+struct saved_msrs {
+ unsigned int num;
+ struct saved_msr *array;
+};
+
+enum {
+ DESC_TSS = 9,
+ DESC_LDT = 2,
+ DESCTYPE_S = 16,
+};
+
+struct ldttss_desc {
+ u16 limit0;
+ u16 base0;
+ u16 base1: 8;
+ u16 type: 5;
+ u16 dpl: 2;
+ u16 p: 1;
+ u16 limit1: 4;
+ u16 zero0: 3;
+ u16 g: 1;
+ u16 base2: 8;
+ u32 base3;
+ u32 zero1;
+};
+
+typedef struct ldttss_desc tss_desc;
+
+struct saved_context {
+ struct pt_regs regs;
+ u16 ds;
+ u16 es;
+ u16 fs;
+ u16 gs;
+ long unsigned int kernelmode_gs_base;
+ long unsigned int usermode_gs_base;
+ long unsigned int fs_base;
+ long unsigned int cr0;
+ long unsigned int cr2;
+ long unsigned int cr3;
+ long unsigned int cr4;
+ u64 misc_enable;
+ struct saved_msrs saved_msrs;
+ long unsigned int efer;
+ u16 gdt_pad;
+ struct desc_ptr gdt_desc;
+ u16 idt_pad;
+ struct desc_ptr idt;
+ u16 ldt;
+ u16 tss;
+ long unsigned int tr;
+ long unsigned int safety;
+ long unsigned int return_address;
+ bool misc_enable_saved;
+} __attribute__((packed));
+
+typedef int (*pm_cpu_match_t)(const struct x86_cpu_id *);
+
+struct msr_enumeration {
+ u32 msr_no;
+ u32 feature;
+};
+
+enum uncore_access_type {
+ UNCORE_ACCESS_MSR = 0,
+ UNCORE_ACCESS_MMIO = 1,
+ UNCORE_ACCESS_PCI = 2,
+ UNCORE_ACCESS_MAX = 3,
+};
+
+enum {
+ SNBEP_PCI_QPI_PORT0_FILTER = 0,
+ SNBEP_PCI_QPI_PORT1_FILTER = 1,
+ BDX_PCI_QPI_PORT2_FILTER = 2,
+};
+
+enum {
+ SNBEP_PCI_UNCORE_HA = 0,
+ SNBEP_PCI_UNCORE_IMC = 1,
+ SNBEP_PCI_UNCORE_QPI = 2,
+ SNBEP_PCI_UNCORE_R2PCIE = 3,
+ SNBEP_PCI_UNCORE_R3QPI = 4,
+};
+
+enum {
+ IVBEP_PCI_UNCORE_HA = 0,
+ IVBEP_PCI_UNCORE_IMC = 1,
+ IVBEP_PCI_UNCORE_IRP = 2,
+ IVBEP_PCI_UNCORE_QPI = 3,
+ IVBEP_PCI_UNCORE_R2PCIE = 4,
+ IVBEP_PCI_UNCORE_R3QPI = 5,
+};
+
+enum {
+ KNL_PCI_UNCORE_MC_UCLK = 0,
+ KNL_PCI_UNCORE_MC_DCLK = 1,
+ KNL_PCI_UNCORE_EDC_UCLK = 2,
+ KNL_PCI_UNCORE_EDC_ECLK = 3,
+ KNL_PCI_UNCORE_M2PCIE = 4,
+ KNL_PCI_UNCORE_IRP = 5,
+};
+
+enum {
+ HSWEP_PCI_UNCORE_HA = 0,
+ HSWEP_PCI_UNCORE_IMC = 1,
+ HSWEP_PCI_UNCORE_IRP = 2,
+ HSWEP_PCI_UNCORE_QPI = 3,
+ HSWEP_PCI_UNCORE_R2PCIE = 4,
+ HSWEP_PCI_UNCORE_R3QPI = 5,
+};
+
+enum {
+ BDX_PCI_UNCORE_HA = 0,
+ BDX_PCI_UNCORE_IMC = 1,
+ BDX_PCI_UNCORE_IRP = 2,
+ BDX_PCI_UNCORE_QPI = 3,
+ BDX_PCI_UNCORE_R2PCIE = 4,
+ BDX_PCI_UNCORE_R3QPI = 5,
+};
+
+enum perf_uncore_iio_freerunning_type_id {
+ SKX_IIO_MSR_IOCLK = 0,
+ SKX_IIO_MSR_BW = 1,
+ SKX_IIO_MSR_UTIL = 2,
+ SKX_IIO_FREERUNNING_TYPE_MAX = 3,
+};
+
+enum {
+ SKX_PCI_UNCORE_IMC = 0,
+ SKX_PCI_UNCORE_M2M = 1,
+ SKX_PCI_UNCORE_UPI = 2,
+ SKX_PCI_UNCORE_M2PCIE = 3,
+ SKX_PCI_UNCORE_M3UPI = 4,
+};
+
+enum {
+ SNR_QAT_PMON_ID = 0,
+ SNR_CBDMA_DMI_PMON_ID = 1,
+ SNR_NIS_PMON_ID = 2,
+ SNR_DLB_PMON_ID = 3,
+ SNR_PCIE_GEN3_PMON_ID = 4,
+};
+
+enum perf_uncore_snr_iio_freerunning_type_id {
+ SNR_IIO_MSR_IOCLK = 0,
+ SNR_IIO_MSR_BW_IN = 1,
+ SNR_IIO_FREERUNNING_TYPE_MAX = 2,
+};
+
+enum {
+ SNR_PCI_UNCORE_M2M = 0,
+ SNR_PCI_UNCORE_PCIE3 = 1,
+};
+
+enum perf_uncore_snr_imc_freerunning_type_id {
+ SNR_IMC_DCLK = 0,
+ SNR_IMC_DDR = 1,
+ SNR_IMC_FREERUNNING_TYPE_MAX = 2,
+};
+
+enum {
+ ICX_PCIE1_PMON_ID = 0,
+ ICX_PCIE2_PMON_ID = 1,
+ ICX_PCIE3_PMON_ID = 2,
+ ICX_PCIE4_PMON_ID = 3,
+ ICX_PCIE5_PMON_ID = 4,
+ ICX_CBDMA_DMI_PMON_ID = 5,
+};
+
+enum perf_uncore_icx_iio_freerunning_type_id {
+ ICX_IIO_MSR_IOCLK = 0,
+ ICX_IIO_MSR_BW_IN = 1,
+ ICX_IIO_FREERUNNING_TYPE_MAX = 2,
+};
+
+enum {
+ ICX_PCI_UNCORE_M2M = 0,
+ ICX_PCI_UNCORE_UPI = 1,
+ ICX_PCI_UNCORE_M3UPI = 2,
+};
+
+enum perf_uncore_icx_imc_freerunning_type_id {
+ ICX_IMC_DCLK = 0,
+ ICX_IMC_DDR = 1,
+ ICX_IMC_DDRT = 2,
+ ICX_IMC_FREERUNNING_TYPE_MAX = 3,
+};
+
+enum perf_uncore_spr_iio_freerunning_type_id {
+ SPR_IIO_MSR_IOCLK = 0,
+ SPR_IIO_MSR_BW_IN = 1,
+ SPR_IIO_MSR_BW_OUT = 2,
+ SPR_IIO_FREERUNNING_TYPE_MAX = 3,
+};
+
+enum perf_uncore_spr_imc_freerunning_type_id {
+ SPR_IMC_DCLK = 0,
+ SPR_IMC_PQ_CYCLES = 1,
+ SPR_IMC_FREERUNNING_TYPE_MAX = 2,
+};
+
+struct sigevent {
+ sigval_t sigev_value;
+ int sigev_signo;
+ int sigev_notify;
+ union {
+ int _pad[12];
+ int _tid;
+ struct {
+ void (*_function)(sigval_t);
+ void *_attribute;
+ } _sigev_thread;
+ } _sigev_un;
+};
+
+enum auditsc_class_t {
+ AUDITSC_NATIVE = 0,
+ AUDITSC_COMPAT = 1,
+ AUDITSC_OPEN = 2,
+ AUDITSC_OPENAT = 3,
+ AUDITSC_SOCKETCALL = 4,
+ AUDITSC_EXECVE = 5,
+ AUDITSC_OPENAT2 = 6,
+ AUDITSC_NVALS = 7,
+};
+
+enum audit_nfcfgop {
+ AUDIT_XT_OP_REGISTER = 0,
+ AUDIT_XT_OP_REPLACE = 1,
+ AUDIT_XT_OP_UNREGISTER = 2,
+ AUDIT_NFT_OP_TABLE_REGISTER = 3,
+ AUDIT_NFT_OP_TABLE_UNREGISTER = 4,
+ AUDIT_NFT_OP_CHAIN_REGISTER = 5,
+ AUDIT_NFT_OP_CHAIN_UNREGISTER = 6,
+ AUDIT_NFT_OP_RULE_REGISTER = 7,
+ AUDIT_NFT_OP_RULE_UNREGISTER = 8,
+ AUDIT_NFT_OP_SET_REGISTER = 9,
+ AUDIT_NFT_OP_SET_UNREGISTER = 10,
+ AUDIT_NFT_OP_SETELEM_REGISTER = 11,
+ AUDIT_NFT_OP_SETELEM_UNREGISTER = 12,
+ AUDIT_NFT_OP_GEN_REGISTER = 13,
+ AUDIT_NFT_OP_OBJ_REGISTER = 14,
+ AUDIT_NFT_OP_OBJ_UNREGISTER = 15,
+ AUDIT_NFT_OP_OBJ_RESET = 16,
+ AUDIT_NFT_OP_FLOWTABLE_REGISTER = 17,
+ AUDIT_NFT_OP_FLOWTABLE_UNREGISTER = 18,
+ AUDIT_NFT_OP_INVALID = 19,
+};
+
+struct audit_aux_data {
+ struct audit_aux_data *next;
+ int type;
+};
+
+struct audit_chunk;
+
+struct audit_tree_refs {
+ struct audit_tree_refs *next;
+ struct audit_chunk *c[31];
+};
+
+struct audit_aux_data_pids {
+ struct audit_aux_data d;
+ pid_t target_pid[16];
+ kuid_t target_auid[16];
+ kuid_t target_uid[16];
+ unsigned int target_sessionid[16];
+ u32 target_sid[16];
+ char target_comm[256];
+ int pid_count;
+};
+
+struct audit_aux_data_bprm_fcaps {
+ struct audit_aux_data d;
+ struct audit_cap_data fcap;
+ unsigned int fcap_ver;
+ struct audit_cap_data old_pcap;
+ struct audit_cap_data new_pcap;
+};
+
+struct audit_nfcfgop_tab {
+ enum audit_nfcfgop op;
+ const char *s;
+};
+
+struct bpf_mem_cache {
+ struct llist_head free_llist;
+ local_t active;
+ struct llist_head free_llist_extra;
+ struct irq_work refill_work;
+ struct obj_cgroup *objcg;
+ int unit_size;
+ int free_cnt;
+ int low_watermark;
+ int high_watermark;
+ int batch;
+ int percpu_size;
+ struct callback_head rcu;
+ struct llist_head free_by_rcu;
+ struct llist_head waiting_for_gp;
+ atomic_t call_rcu_in_progress;
+};
+
+struct bpf_mem_caches {
+ struct bpf_mem_cache cache[11];
+};
+
+struct static_call_tramp_key {
+ s32 tramp;
+ s32 key;
+};
+
+enum uprobe_filter_ctx {
+ UPROBE_FILTER_REGISTER = 0,
+ UPROBE_FILTER_UNREGISTER = 1,
+ UPROBE_FILTER_MMAP = 2,
+};
+
+struct uprobe_consumer {
+ int (*handler)(struct uprobe_consumer *, struct pt_regs *);
+ int (*ret_handler)(struct uprobe_consumer *, long unsigned int, struct pt_regs *);
+ bool (*filter)(struct uprobe_consumer *, enum uprobe_filter_ctx, struct mm_struct *);
+ struct uprobe_consumer *next;
+};
+
+typedef u8 uprobe_opcode_t;
+
+struct uprobe_xol_ops;
+
+struct arch_uprobe {
+ union {
+ u8 insn[16];
+ u8 ixol[16];
+ };
+ const struct uprobe_xol_ops *ops;
+ union {
+ struct {
+ s32 offs;
+ u8 ilen;
+ u8 opc1;
+ } branch;
+ struct {
+ u8 fixups;
+ u8 ilen;
+ } defparam;
+ struct {
+ u8 reg_offset;
+ u8 ilen;
+ } push;
+ };
+};
+
+struct uprobe_xol_ops {
+ bool (*emulate)(struct arch_uprobe *, struct pt_regs *);
+ int (*pre_xol)(struct arch_uprobe *, struct pt_regs *);
+ int (*post_xol)(struct arch_uprobe *, struct pt_regs *);
+ void (*abort)(struct arch_uprobe *, struct pt_regs *);
+};
+
+struct uprobe {
+ struct rb_node rb_node;
+ refcount_t ref;
+ struct rw_semaphore register_rwsem;
+ struct rw_semaphore consumer_rwsem;
+ struct list_head pending_list;
+ struct uprobe_consumer *consumers;
+ struct inode *inode;
+ loff_t offset;
+ loff_t ref_ctr_offset;
+ long unsigned int flags;
+ struct arch_uprobe arch;
+};
+
+enum rp_check {
+ RP_CHECK_CALL = 0,
+ RP_CHECK_CHAIN_CALL = 1,
+ RP_CHECK_RET = 2,
+};
+
+struct xol_area {
+ wait_queue_head_t wq;
+ atomic_t slot_count;
+ long unsigned int *bitmap;
+ struct vm_special_mapping xol_mapping;
+ struct page *pages[2];
+ long unsigned int vaddr;
+};
+
+struct delayed_uprobe {
+ struct list_head list;
+ struct uprobe *uprobe;
+ struct mm_struct *mm;
+};
+
+struct __uprobe_key {
+ struct inode *inode;
+ loff_t offset;
+};
+
+struct map_info {
+ struct map_info *next;
+ struct mm_struct *mm;
+ long unsigned int vaddr;
+};
+
+struct saved {
+ struct path link;
+ struct delayed_call done;
+ const char *name;
+ unsigned int seq;
+};
+
+struct nameidata {
+ struct path path;
+ struct qstr last;
+ struct path root;
+ struct inode *inode;
+ unsigned int flags;
+ unsigned int state;
+ unsigned int seq;
+ unsigned int next_seq;
+ unsigned int m_seq;
+ unsigned int r_seq;
+ int last_type;
+ unsigned int depth;
+ int total_link_count;
+ struct saved *stack;
+ struct saved internal[2];
+ struct filename *name;
+ struct nameidata *saved;
+ unsigned int root_seq;
+ int dfd;
+ kuid_t dir_uid;
+ umode_t dir_mode;
+};
+
+struct renamedata {
+ struct user_namespace *old_mnt_userns;
+ struct inode *old_dir;
+ struct dentry *old_dentry;
+ struct user_namespace *new_mnt_userns;
+ struct inode *new_dir;
+ struct dentry *new_dentry;
+ struct inode **delegated_inode;
+ unsigned int flags;
+};
+
+enum {
+ LAST_NORM = 0,
+ LAST_ROOT = 1,
+ LAST_DOT = 2,
+ LAST_DOTDOT = 3,
+};
+
+enum {
+ WALK_TRAILING = 1,
+ WALK_MORE = 2,
+ WALK_NOFOLLOW = 4,
+};
+
+enum rsapubkey_actions {
+ ACT_rsa_get_e = 0,
+ ACT_rsa_get_n = 1,
+ NR__rsapubkey_actions = 2,
+};
+
+struct crypto_report_acomp {
+ char type[64];
+};
+
+struct acomp_req {
+ struct crypto_async_request base;
+ struct scatterlist *src;
+ struct scatterlist *dst;
+ unsigned int slen;
+ unsigned int dlen;
+ u32 flags;
+ void *__ctx[0];
+};
+
+struct crypto_acomp {
+ int (*compress)(struct acomp_req *);
+ int (*decompress)(struct acomp_req *);
+ void (*dst_free)(struct scatterlist *);
+ unsigned int reqsize;
+ struct crypto_tfm base;
+};
+
+struct acomp_alg {
+ int (*compress)(struct acomp_req *);
+ int (*decompress)(struct acomp_req *);
+ void (*dst_free)(struct scatterlist *);
+ int (*init)(struct crypto_acomp *);
+ void (*exit)(struct crypto_acomp *);
+ unsigned int reqsize;
+ struct crypto_alg base;
+};
+
+struct af_alg_type;
+
+struct alg_sock {
+ struct sock sk;
+ struct sock *parent;
+ atomic_t refcnt;
+ atomic_t nokey_refcnt;
+ const struct af_alg_type *type;
+ void *private;
+};
+
+struct af_alg_type {
+ void * (*bind)(const char *, u32, u32);
+ void (*release)(void *);
+ int (*setkey)(void *, const u8 *, unsigned int);
+ int (*setentropy)(void *, sockptr_t, unsigned int);
+ int (*accept)(void *, struct sock *);
+ int (*accept_nokey)(void *, struct sock *);
+ int (*setauthsize)(void *, unsigned int);
+ struct proto_ops *ops;
+ struct proto_ops *ops_nokey;
+ struct module *owner;
+ char name[14];
+};
+
+struct af_alg_sgl {
+ struct scatterlist sg[17];
+ struct page *pages[16];
+ unsigned int npages;
+};
+
+struct hash_ctx {
+ struct af_alg_sgl sgl;
+ u8 *result;
+ struct crypto_wait wait;
+ unsigned int len;
+ bool more;
+ struct ahash_request req;
+};
+
+struct sg_append_table {
+ struct sg_table sgt;
+ struct scatterlist *prv;
+ unsigned int total_nents;
+};
+
+typedef struct scatterlist *sg_alloc_fn(unsigned int, gfp_t);
+
+typedef void sg_free_fn(struct scatterlist *, unsigned int);
+
+struct sg_page_iter {
+ struct scatterlist *sg;
+ unsigned int sg_pgoffset;
+ unsigned int __nents;
+ int __pg_advance;
+};
+
+struct sg_dma_page_iter {
+ struct sg_page_iter base;
+};
+
+struct sg_mapping_iter {
+ struct page *page;
+ void *addr;
+ size_t length;
+ size_t consumed;
+ struct sg_page_iter piter;
+ unsigned int __offset;
+ unsigned int __remaining;
+ unsigned int __flags;
+};
+
+struct tcpa_event {
+ u32 pcr_index;
+ u32 event_type;
+ u8 pcr_value[20];
+ u32 event_size;
+ u8 event_data[0];
+};
+
+enum tcpa_event_types {
+ PREBOOT = 0,
+ POST_CODE = 1,
+ UNUSED = 2,
+ NO_ACTION = 3,
+ SEPARATOR = 4,
+ ACTION = 5,
+ EVENT_TAG = 6,
+ SCRTM_CONTENTS = 7,
+ SCRTM_VERSION = 8,
+ CPU_MICROCODE = 9,
+ PLATFORM_CONFIG_FLAGS = 10,
+ TABLE_OF_DEVICES = 11,
+ COMPACT_HASH = 12,
+ IPL = 13,
+ IPL_PARTITION_DATA = 14,
+ NONHOST_CODE = 15,
+ NONHOST_CONFIG = 16,
+ NONHOST_INFO = 17,
+};
+
+struct tcpa_pc_event {
+ u32 event_id;
+ u32 event_size;
+ u8 event_data[0];
+};
+
+enum tcpa_pc_event_ids {
+ SMBIOS = 1,
+ BIS_CERT = 2,
+ POST_BIOS_ROM = 3,
+ ESCD = 4,
+ CMOS = 5,
+ NVRAM = 6,
+ OPTION_ROM_EXEC = 7,
+ OPTION_ROM_CONFIG = 8,
+ OPTION_ROM_MICROCODE = 10,
+ S_CRTM_VERSION = 11,
+ S_CRTM_CONTENTS = 12,
+ POST_CONTENTS = 13,
+ HOST_TABLE_OF_DEVICES = 14,
+};
+
+struct hd_geometry {
+ unsigned char heads;
+ unsigned char sectors;
+ short unsigned int cylinders;
+ long unsigned int start;
+};
+
+typedef __u32 __virtio32;
+
+typedef __u64 __virtio64;
+
+struct virtio_blk_geometry {
+ __virtio16 cylinders;
+ __u8 heads;
+ __u8 sectors;
+};
+
+struct virtio_blk_config {
+ __virtio64 capacity;
+ __virtio32 size_max;
+ __virtio32 seg_max;
+ struct virtio_blk_geometry geometry;
+ __virtio32 blk_size;
+ __u8 physical_block_exp;
+ __u8 alignment_offset;
+ __virtio16 min_io_size;
+ __virtio32 opt_io_size;
+ __u8 wce;
+ __u8 unused;
+ __virtio16 num_queues;
+ __virtio32 max_discard_sectors;
+ __virtio32 max_discard_seg;
+ __virtio32 discard_sector_alignment;
+ __virtio32 max_write_zeroes_sectors;
+ __virtio32 max_write_zeroes_seg;
+ __u8 write_zeroes_may_unmap;
+ __u8 unused1[3];
+ __virtio32 max_secure_erase_sectors;
+ __virtio32 max_secure_erase_seg;
+ __virtio32 secure_erase_sector_alignment;
+};
+
+struct virtio_blk_outhdr {
+ __virtio32 type;
+ __virtio32 ioprio;
+ __virtio64 sector;
+};
+
+struct virtio_blk_discard_write_zeroes {
+ __le64 sector;
+ __le32 num_sectors;
+ __le32 flags;
+};
+
+struct virtio_blk_vq {
+ struct virtqueue *vq;
+ spinlock_t lock;
+ char name[16];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct virtio_blk {
+ struct mutex vdev_mutex;
+ struct virtio_device *vdev;
+ struct gendisk *disk;
+ struct blk_mq_tag_set tag_set;
+ struct work_struct config_work;
+ int index;
+ int num_vqs;
+ int io_queues[3];
+ struct virtio_blk_vq *vqs;
+};
+
+struct virtblk_req {
+ struct virtio_blk_outhdr out_hdr;
+ u8 status;
+ struct sg_table sg_table;
+ struct scatterlist sg[0];
+};
+
+struct virtio_crypto_ctrl_header {
+ __le32 opcode;
+ __le32 algo;
+ __le32 flag;
+ __le32 queue_id;
+};
+
+struct virtio_crypto_cipher_session_para {
+ __le32 algo;
+ __le32 keylen;
+ __le32 op;
+ __le32 padding;
+};
+
+struct virtio_crypto_session_input {
+ __le64 session_id;
+ __le32 status;
+ __le32 padding;
+};
+
+struct virtio_crypto_cipher_session_req {
+ struct virtio_crypto_cipher_session_para para;
+ __u8 padding[32];
+};
+
+struct virtio_crypto_hash_session_para {
+ __le32 algo;
+ __le32 hash_result_len;
+ __u8 padding[8];
+};
+
+struct virtio_crypto_hash_create_session_req {
+ struct virtio_crypto_hash_session_para para;
+ __u8 padding[40];
+};
+
+struct virtio_crypto_mac_session_para {
+ __le32 algo;
+ __le32 hash_result_len;
+ __le32 auth_key_len;
+ __le32 padding;
+};
+
+struct virtio_crypto_mac_create_session_req {
+ struct virtio_crypto_mac_session_para para;
+ __u8 padding[40];
+};
+
+struct virtio_crypto_aead_session_para {
+ __le32 algo;
+ __le32 key_len;
+ __le32 hash_result_len;
+ __le32 aad_len;
+ __le32 op;
+ __le32 padding;
+};
+
+struct virtio_crypto_aead_create_session_req {
+ struct virtio_crypto_aead_session_para para;
+ __u8 padding[32];
+};
+
+struct virtio_crypto_rsa_session_para {
+ __le32 padding_algo;
+ __le32 hash_algo;
+};
+
+struct virtio_crypto_ecdsa_session_para {
+ __le32 curve_id;
+ __le32 padding;
+};
+
+struct virtio_crypto_akcipher_session_para {
+ __le32 algo;
+ __le32 keytype;
+ __le32 keylen;
+ union {
+ struct virtio_crypto_rsa_session_para rsa;
+ struct virtio_crypto_ecdsa_session_para ecdsa;
+ } u;
+};
+
+struct virtio_crypto_akcipher_create_session_req {
+ struct virtio_crypto_akcipher_session_para para;
+ __u8 padding[36];
+};
+
+struct virtio_crypto_alg_chain_session_para {
+ __le32 alg_chain_order;
+ __le32 hash_mode;
+ struct virtio_crypto_cipher_session_para cipher_param;
+ union {
+ struct virtio_crypto_hash_session_para hash_param;
+ struct virtio_crypto_mac_session_para mac_param;
+ __u8 padding[16];
+ } u;
+ __le32 aad_len;
+ __le32 padding;
+};
+
+struct virtio_crypto_alg_chain_session_req {
+ struct virtio_crypto_alg_chain_session_para para;
+};
+
+struct virtio_crypto_sym_create_session_req {
+ union {
+ struct virtio_crypto_cipher_session_req cipher;
+ struct virtio_crypto_alg_chain_session_req chain;
+ __u8 padding[48];
+ } u;
+ __le32 op_type;
+ __le32 padding;
+};
+
+struct virtio_crypto_destroy_session_req {
+ __le64 session_id;
+ __u8 padding[48];
+};
+
+struct virtio_crypto_op_ctrl_req {
+ struct virtio_crypto_ctrl_header header;
+ union {
+ struct virtio_crypto_sym_create_session_req sym_create_session;
+ struct virtio_crypto_hash_create_session_req hash_create_session;
+ struct virtio_crypto_mac_create_session_req mac_create_session;
+ struct virtio_crypto_aead_create_session_req aead_create_session;
+ struct virtio_crypto_akcipher_create_session_req akcipher_create_session;
+ struct virtio_crypto_destroy_session_req destroy_session;
+ __u8 padding[56];
+ } u;
+};
+
+struct virtio_crypto_op_header {
+ __le32 opcode;
+ __le32 algo;
+ __le64 session_id;
+ __le32 flag;
+ __le32 padding;
+};
+
+struct virtio_crypto_cipher_para {
+ __le32 iv_len;
+ __le32 src_data_len;
+ __le32 dst_data_len;
+ __le32 padding;
+};
+
+struct virtio_crypto_hash_para {
+ __le32 src_data_len;
+ __le32 hash_result_len;
+};
+
+struct virtio_crypto_mac_para {
+ struct virtio_crypto_hash_para hash;
+};
+
+struct virtio_crypto_aead_para {
+ __le32 iv_len;
+ __le32 aad_len;
+ __le32 src_data_len;
+ __le32 dst_data_len;
+};
+
+struct virtio_crypto_cipher_data_req {
+ struct virtio_crypto_cipher_para para;
+ __u8 padding[24];
+};
+
+struct virtio_crypto_hash_data_req {
+ struct virtio_crypto_hash_para para;
+ __u8 padding[40];
+};
+
+struct virtio_crypto_mac_data_req {
+ struct virtio_crypto_mac_para para;
+ __u8 padding[40];
+};
+
+struct virtio_crypto_alg_chain_data_para {
+ __le32 iv_len;
+ __le32 src_data_len;
+ __le32 dst_data_len;
+ __le32 cipher_start_src_offset;
+ __le32 len_to_cipher;
+ __le32 hash_start_src_offset;
+ __le32 len_to_hash;
+ __le32 aad_len;
+ __le32 hash_result_len;
+ __le32 reserved;
+};
+
+struct virtio_crypto_alg_chain_data_req {
+ struct virtio_crypto_alg_chain_data_para para;
+};
+
+struct virtio_crypto_sym_data_req {
+ union {
+ struct virtio_crypto_cipher_data_req cipher;
+ struct virtio_crypto_alg_chain_data_req chain;
+ __u8 padding[40];
+ } u;
+ __le32 op_type;
+ __le32 padding;
+};
+
+struct virtio_crypto_aead_data_req {
+ struct virtio_crypto_aead_para para;
+ __u8 padding[32];
+};
+
+struct virtio_crypto_akcipher_para {
+ __le32 src_data_len;
+ __le32 dst_data_len;
+};
+
+struct virtio_crypto_akcipher_data_req {
+ struct virtio_crypto_akcipher_para para;
+ __u8 padding[40];
+};
+
+struct virtio_crypto_op_data_req {
+ struct virtio_crypto_op_header header;
+ union {
+ struct virtio_crypto_sym_data_req sym_req;
+ struct virtio_crypto_hash_data_req hash_req;
+ struct virtio_crypto_mac_data_req mac_req;
+ struct virtio_crypto_aead_data_req aead_req;
+ struct virtio_crypto_akcipher_data_req akcipher_req;
+ __u8 padding[48];
+ } u;
+};
+
+struct virtio_crypto_inhdr {
+ __u8 status;
+};
+
+struct crypto_engine_op {
+ int (*prepare_request)(struct crypto_engine *, void *);
+ int (*unprepare_request)(struct crypto_engine *, void *);
+ int (*do_one_request)(struct crypto_engine *, void *);
+};
+
+struct crypto_engine_ctx {
+ struct crypto_engine_op op;
+};
+
+struct virtio_crypto_sym_session_info {
+ __u64 session_id;
+};
+
+struct virtio_crypto_ctrl_request {
+ struct virtio_crypto_op_ctrl_req ctrl;
+ struct virtio_crypto_session_input input;
+ struct virtio_crypto_inhdr ctrl_status;
+ struct completion compl;
+};
+
+struct virtio_crypto_request;
+
+typedef void (*virtio_crypto_data_callback)(struct virtio_crypto_request *, int);
+
+struct virtio_crypto_request {
+ uint8_t status;
+ struct virtio_crypto_op_data_req *req_data;
+ struct scatterlist **sgs;
+ struct data_queue *dataq;
+ virtio_crypto_data_callback alg_cb;
+};
+
+struct virtio_crypto_skcipher_ctx {
+ struct crypto_engine_ctx enginectx;
+ struct virtio_crypto *vcrypto;
+ struct crypto_skcipher *tfm;
+ struct virtio_crypto_sym_session_info enc_sess_info;
+ struct virtio_crypto_sym_session_info dec_sess_info;
+};
+
+struct virtio_crypto_sym_request {
+ struct virtio_crypto_request base;
+ uint32_t type;
+ struct virtio_crypto_skcipher_ctx *skcipher_ctx;
+ struct skcipher_request *skcipher_req;
+ uint8_t *iv;
+ bool encrypt;
+};
+
+struct virtio_crypto_algo {
+ uint32_t algonum;
+ uint32_t service;
+ unsigned int active_devs;
+ struct skcipher_alg algo;
+};
+
+struct fib_notifier_net {
+ struct list_head fib_notifier_ops;
+ struct atomic_notifier_head fib_chain;
+};
+
+enum {
+ ETHTOOL_A_BITSET_BIT_UNSPEC = 0,
+ ETHTOOL_A_BITSET_BIT_INDEX = 1,
+ ETHTOOL_A_BITSET_BIT_NAME = 2,
+ ETHTOOL_A_BITSET_BIT_VALUE = 3,
+ __ETHTOOL_A_BITSET_BIT_CNT = 4,
+ ETHTOOL_A_BITSET_BIT_MAX = 3,
+};
+
+enum {
+ ETHTOOL_A_BITSET_BITS_UNSPEC = 0,
+ ETHTOOL_A_BITSET_BITS_BIT = 1,
+ __ETHTOOL_A_BITSET_BITS_CNT = 2,
+ ETHTOOL_A_BITSET_BITS_MAX = 1,
+};
+
+enum {
+ ETHTOOL_A_BITSET_UNSPEC = 0,
+ ETHTOOL_A_BITSET_NOMASK = 1,
+ ETHTOOL_A_BITSET_SIZE = 2,
+ ETHTOOL_A_BITSET_BITS = 3,
+ ETHTOOL_A_BITSET_VALUE = 4,
+ ETHTOOL_A_BITSET_MASK = 5,
+ __ETHTOOL_A_BITSET_CNT = 6,
+ ETHTOOL_A_BITSET_MAX = 5,
+};
+
+enum {
+ SK_MEMINFO_RMEM_ALLOC = 0,
+ SK_MEMINFO_RCVBUF = 1,
+ SK_MEMINFO_WMEM_ALLOC = 2,
+ SK_MEMINFO_SNDBUF = 3,
+ SK_MEMINFO_FWD_ALLOC = 4,
+ SK_MEMINFO_WMEM_QUEUED = 5,
+ SK_MEMINFO_OPTMEM = 6,
+ SK_MEMINFO_BACKLOG = 7,
+ SK_MEMINFO_DROPS = 8,
+ SK_MEMINFO_VARS = 9,
+};
+
+struct inet_diag_req {
+ __u8 idiag_family;
+ __u8 idiag_src_len;
+ __u8 idiag_dst_len;
+ __u8 idiag_ext;
+ struct inet_diag_sockid id;
+ __u32 idiag_states;
+ __u32 idiag_dbs;
+};
+
+struct inet_diag_bc_op {
+ unsigned char code;
+ unsigned char yes;
+ short unsigned int no;
+};
+
+enum {
+ INET_DIAG_BC_NOP = 0,
+ INET_DIAG_BC_JMP = 1,
+ INET_DIAG_BC_S_GE = 2,
+ INET_DIAG_BC_S_LE = 3,
+ INET_DIAG_BC_D_GE = 4,
+ INET_DIAG_BC_D_LE = 5,
+ INET_DIAG_BC_AUTO = 6,
+ INET_DIAG_BC_S_COND = 7,
+ INET_DIAG_BC_D_COND = 8,
+ INET_DIAG_BC_DEV_COND = 9,
+ INET_DIAG_BC_MARK_COND = 10,
+ INET_DIAG_BC_S_EQ = 11,
+ INET_DIAG_BC_D_EQ = 12,
+ INET_DIAG_BC_CGROUP_COND = 13,
+};
+
+struct inet_diag_hostcond {
+ __u8 family;
+ __u8 prefix_len;
+ int port;
+ __be32 addr[0];
+};
+
+struct inet_diag_markcond {
+ __u32 mark;
+ __u32 mask;
+};
+
+struct inet_diag_meminfo {
+ __u32 idiag_rmem;
+ __u32 idiag_wmem;
+ __u32 idiag_fmem;
+ __u32 idiag_tmem;
+};
+
+struct inet_diag_sockopt {
+ __u8 recverr: 1;
+ __u8 is_icsk: 1;
+ __u8 freebind: 1;
+ __u8 hdrincl: 1;
+ __u8 mc_loop: 1;
+ __u8 transparent: 1;
+ __u8 mc_all: 1;
+ __u8 nodefrag: 1;
+ __u8 bind_address_no_port: 1;
+ __u8 recverr_rfc4884: 1;
+ __u8 defer_connect: 1;
+ __u8 unused: 5;
+};
+
+struct bpf_sk_storage_diag;
+
+struct inet_diag_dump_data {
+ struct nlattr *req_nlas[4];
+ struct bpf_sk_storage_diag *bpf_stg_diag;
+};
+
+struct inet_diag_entry {
+ const __be32 *saddr;
+ const __be32 *daddr;
+ u16 sport;
+ u16 dport;
+ u16 family;
+ u16 userlocks;
+ u32 ifindex;
+ u32 mark;
+ u64 cgroup_id;
+};
+
+struct pci_root_res {
+ struct list_head list;
+ struct resource res;
+};
+
+struct pci_root_info {
+ struct list_head list;
+ char name[12];
+ struct list_head resources;
+ struct resource busn;
+ int node;
+ int link;
+};
+
+struct amd_hostbridge {
+ u32 bus;
+ u32 slot;
+ u32 device;
+};
+
+struct group_data {
+ int limit[21];
+ int base[20];
+ int permute[258];
+ int minLen;
+ int maxLen;
+};
+
+struct bunzip_data {
+ int writeCopies;
+ int writePos;
+ int writeRunCountdown;
+ int writeCount;
+ int writeCurrent;
+ long int (*fill)(void *, long unsigned int);
+ long int inbufCount;
+ long int inbufPos;
+ unsigned char *inbuf;
+ unsigned int inbufBitCount;
+ unsigned int inbufBits;
+ unsigned int crc32Table[256];
+ unsigned int headerCRC;
+ unsigned int totalCRC;
+ unsigned int writeCRC;
+ unsigned int *dbuf;
+ unsigned int dbufSize;
+ unsigned char selectors[32768];
+ struct group_data groups[6];
+ int io_error;
+ int byteCount[256];
+ unsigned char symToByte[256];
+ unsigned char mtfSymbol[256];
+};
+
+struct uncore_global_discovery {
+ union {
+ u64 table1;
+ struct {
+ u64 type: 8;
+ u64 stride: 8;
+ u64 max_units: 10;
+ u64 __reserved_1: 36;
+ u64 access_type: 2;
+ };
+ };
+ u64 ctl;
+ union {
+ u64 table3;
+ struct {
+ u64 status_offset: 8;
+ u64 num_status: 16;
+ u64 __reserved_2: 40;
+ };
+ };
+};
+
+struct uncore_unit_discovery {
+ union {
+ u64 table1;
+ struct {
+ u64 num_regs: 8;
+ u64 ctl_offset: 8;
+ u64 bit_width: 8;
+ u64 ctr_offset: 8;
+ u64 status_offset: 8;
+ u64 __reserved_1: 22;
+ u64 access_type: 2;
+ };
+ };
+ u64 ctl;
+ union {
+ u64 table3;
+ struct {
+ u64 box_type: 16;
+ u64 box_id: 16;
+ u64 __reserved_2: 32;
+ };
+ };
+};
+
+struct intel_uncore_discovery_type {
+ struct rb_node node;
+ enum uncore_access_type access_type;
+ u64 box_ctrl;
+ u64 *box_ctrl_die;
+ u16 type;
+ u8 num_counters;
+ u8 counter_width;
+ u8 ctl_offset;
+ u8 ctr_offset;
+ u16 num_boxes;
+ unsigned int *ids;
+ unsigned int *box_offset;
+};
+
+enum {
+ AFFINITY = 0,
+ AFFINITY_LIST = 1,
+ EFFECTIVE = 2,
+ EFFECTIVE_LIST = 3,
+};
+
+struct module_signature {
+ u8 algo;
+ u8 hash;
+ u8 id_type;
+ u8 signer_len;
+ u8 key_id_len;
+ u8 __pad[3];
+ __be32 sig_len;
+};
+
+struct __kernel_old_itimerval {
+ struct __kernel_old_timeval it_interval;
+ struct __kernel_old_timeval it_value;
+};
+
+struct trace_bprintk_fmt {
+ struct list_head list;
+ const char *fmt;
+};
+
+enum {
+ MPOL_DEFAULT = 0,
+ MPOL_PREFERRED = 1,
+ MPOL_BIND = 2,
+ MPOL_INTERLEAVE = 3,
+ MPOL_LOCAL = 4,
+ MPOL_PREFERRED_MANY = 5,
+ MPOL_MAX = 6,
+};
+
+enum mcopy_atomic_mode {
+ MCOPY_ATOMIC_NORMAL = 0,
+ MCOPY_ATOMIC_ZEROPAGE = 1,
+ MCOPY_ATOMIC_CONTINUE = 2,
+};
+
+typedef struct {
+ long unsigned int pd;
+} hugepd_t;
+
+struct file_region {
+ struct list_head link;
+ long int from;
+ long int to;
+ struct page_counter *reservation_counter;
+ struct cgroup_subsys_state *css;
+};
+
+struct huge_bootmem_page {
+ struct list_head list;
+ struct hstate *hstate;
+};
+
+enum hugetlb_memory_event {
+ HUGETLB_MAX = 0,
+ HUGETLB_NR_MEMORY_EVENTS = 1,
+};
+
+struct hugetlb_cgroup_per_node {
+ long unsigned int usage[2];
+};
+
+struct hugetlb_cgroup {
+ struct cgroup_subsys_state css;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct page_counter hugepage[2];
+ struct page_counter rsvd_hugepage[2];
+ atomic_long_t events[2];
+ atomic_long_t events_local[2];
+ struct cgroup_file events_file[2];
+ struct cgroup_file events_local_file[2];
+ struct hugetlb_cgroup_per_node *nodeinfo[0];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+enum vma_resv_mode {
+ VMA_NEEDS_RESV = 0,
+ VMA_COMMIT_RESV = 1,
+ VMA_END_RESV = 2,
+ VMA_ADD_RESV = 3,
+ VMA_DEL_RESV = 4,
+};
+
+struct node_hstate {
+ struct kobject *hugepages_kobj;
+ struct kobject *hstate_kobjs[2];
+};
+
+struct throtl_service_queue {
+ struct throtl_service_queue *parent_sq;
+ struct list_head queued[2];
+ unsigned int nr_queued[2];
+ struct rb_root_cached pending_tree;
+ unsigned int nr_pending;
+ long unsigned int first_pending_disptime;
+ struct timer_list pending_timer;
+};
+
+struct latency_bucket {
+ long unsigned int total_latency;
+ int samples;
+};
+
+struct avg_latency_bucket {
+ long unsigned int latency;
+ bool valid;
+};
+
+struct throtl_data {
+ struct throtl_service_queue service_queue;
+ struct request_queue *queue;
+ unsigned int nr_queued[2];
+ unsigned int throtl_slice;
+ struct work_struct dispatch_work;
+ unsigned int limit_index;
+ bool limit_valid[2];
+ long unsigned int low_upgrade_time;
+ long unsigned int low_downgrade_time;
+ unsigned int scale;
+ struct latency_bucket tmp_buckets[18];
+ struct avg_latency_bucket avg_buckets[18];
+ struct latency_bucket *latency_buckets[2];
+ long unsigned int last_calculate_time;
+ long unsigned int filtered_latency;
+ bool track_bio_latency;
+};
+
+enum blktrace_cat {
+ BLK_TC_READ = 1,
+ BLK_TC_WRITE = 2,
+ BLK_TC_FLUSH = 4,
+ BLK_TC_SYNC = 8,
+ BLK_TC_SYNCIO = 8,
+ BLK_TC_QUEUE = 16,
+ BLK_TC_REQUEUE = 32,
+ BLK_TC_ISSUE = 64,
+ BLK_TC_COMPLETE = 128,
+ BLK_TC_FS = 256,
+ BLK_TC_PC = 512,
+ BLK_TC_NOTIFY = 1024,
+ BLK_TC_AHEAD = 2048,
+ BLK_TC_META = 4096,
+ BLK_TC_DISCARD = 8192,
+ BLK_TC_DRV_DATA = 16384,
+ BLK_TC_FUA = 32768,
+ BLK_TC_END = 32768,
+};
+
+struct throtl_grp;
+
+struct throtl_qnode {
+ struct list_head node;
+ struct bio_list bios;
+ struct throtl_grp *tg;
+};
+
+struct throtl_grp {
+ struct blkg_policy_data pd;
+ struct rb_node rb_node;
+ struct throtl_data *td;
+ struct throtl_service_queue service_queue;
+ struct throtl_qnode qnode_on_self[2];
+ struct throtl_qnode qnode_on_parent[2];
+ long unsigned int disptime;
+ unsigned int flags;
+ bool has_rules_bps[2];
+ bool has_rules_iops[2];
+ uint64_t bps[4];
+ uint64_t bps_conf[4];
+ unsigned int iops[4];
+ unsigned int iops_conf[4];
+ uint64_t bytes_disp[2];
+ unsigned int io_disp[2];
+ long unsigned int last_low_overflow_time[2];
+ uint64_t last_bytes_disp[2];
+ unsigned int last_io_disp[2];
+ uint64_t carryover_bytes[2];
+ unsigned int carryover_ios[2];
+ long unsigned int last_check_time;
+ long unsigned int latency_target;
+ long unsigned int latency_target_conf;
+ long unsigned int slice_start[2];
+ long unsigned int slice_end[2];
+ long unsigned int last_finish_time;
+ long unsigned int checked_last_finish_time;
+ long unsigned int avg_idletime;
+ long unsigned int idletime_threshold;
+ long unsigned int idletime_threshold_conf;
+ unsigned int bio_cnt;
+ unsigned int bad_bio_cnt;
+ long unsigned int bio_cnt_reset_time;
+ struct blkg_rwstat stat_bytes;
+ struct blkg_rwstat stat_ios;
+};
+
+enum tg_state_flags {
+ THROTL_TG_PENDING = 1,
+ THROTL_TG_WAS_EMPTY = 2,
+ THROTL_TG_CANCELING = 4,
+};
+
+struct xz_dec_bcj {
+ enum {
+ BCJ_X86 = 4,
+ BCJ_POWERPC = 5,
+ BCJ_IA64 = 6,
+ BCJ_ARM = 7,
+ BCJ_ARMTHUMB = 8,
+ BCJ_SPARC = 9,
+ } type;
+ enum xz_ret ret;
+ bool single_call;
+ uint32_t pos;
+ uint32_t x86_prev_mask;
+ uint8_t *out;
+ size_t out_pos;
+ size_t out_size;
+ struct {
+ size_t filtered;
+ size_t size;
+ uint8_t buf[16];
+ } temp;
+};
+
+struct xz_dec_lzma2;
+
+enum gcry_mpi_format {
+ GCRYMPI_FMT_NONE = 0,
+ GCRYMPI_FMT_STD = 1,
+ GCRYMPI_FMT_PGP = 2,
+ GCRYMPI_FMT_SSH = 3,
+ GCRYMPI_FMT_HEX = 4,
+ GCRYMPI_FMT_USG = 5,
+ GCRYMPI_FMT_OPAQUE = 8,
+};
+
+struct aperture_range {
+ struct device *dev;
+ resource_size_t base;
+ resource_size_t size;
+ struct list_head lh;
+ void (*detach)(struct device *);
+};
+
+struct devres_node {
+ struct list_head entry;
+ dr_release_t release;
+ const char *name;
+ size_t size;
+};
+
+struct devres {
+ struct devres_node node;
+ u8 data[0];
+};
+
+struct devres_group {
+ struct devres_node node[2];
+ void *id;
+ int color;
+};
+
+struct action_devres {
+ void *data;
+ void (*action)(void *);
+};
+
+struct pages_devres {
+ long unsigned int addr;
+ unsigned int order;
+};
+
+typedef u64 devlink_resource_occ_get_t(void *);
+
+struct nsim_fib_entry {
+ u64 max;
+ atomic64_t num;
+};
+
+struct nsim_per_fib_data {
+ struct nsim_fib_entry fib;
+ struct nsim_fib_entry rules;
+};
+
+struct nsim_fib_data {
+ struct notifier_block fib_nb;
+ struct nsim_per_fib_data ipv4;
+ struct nsim_per_fib_data ipv6;
+ struct nsim_fib_entry nexthops;
+ struct rhashtable fib_rt_ht;
+ struct list_head fib_rt_list;
+ struct mutex fib_lock;
+ struct notifier_block nexthop_nb;
+ struct rhashtable nexthop_ht;
+ struct devlink *devlink;
+ struct work_struct fib_event_work;
+ struct work_struct fib_flush_work;
+ struct list_head fib_event_queue;
+ spinlock_t fib_event_queue_lock;
+ struct mutex nh_lock;
+ struct dentry *ddir;
+ bool fail_route_offload;
+ bool fail_res_nexthop_group_replace;
+ bool fail_nexthop_bucket_replace;
+ bool fail_route_delete;
+};
+
+struct nsim_fib_rt_key {
+ unsigned char addr[16];
+ unsigned char prefix_len;
+ int family;
+ u32 tb_id;
+};
+
+struct nsim_fib_rt {
+ struct nsim_fib_rt_key key;
+ struct rhash_head ht_node;
+ struct list_head list;
+};
+
+struct nsim_fib4_rt {
+ struct nsim_fib_rt common;
+ struct fib_info *fi;
+ dscp_t dscp;
+ u8 type;
+};
+
+struct nsim_fib6_rt {
+ struct nsim_fib_rt common;
+ struct list_head nh_list;
+ unsigned int nhs;
+};
+
+struct nsim_fib6_rt_nh {
+ struct list_head list;
+ struct fib6_info *rt;
+};
+
+struct nsim_fib6_event {
+ struct fib6_info **rt_arr;
+ unsigned int nrt6;
+};
+
+struct nsim_fib_event {
+ struct list_head list;
+ union {
+ struct fib_entry_notifier_info fen_info;
+ struct nsim_fib6_event fib6_event;
+ };
+ struct nsim_fib_data *data;
+ long unsigned int event;
+ int family;
+};
+
+struct nsim_nexthop {
+ struct rhash_head ht_node;
+ u64 occ;
+ u32 id;
+ bool is_resilient;
+};
+
+enum {
+ TCA_FQ_CODEL_UNSPEC = 0,
+ TCA_FQ_CODEL_TARGET = 1,
+ TCA_FQ_CODEL_LIMIT = 2,
+ TCA_FQ_CODEL_INTERVAL = 3,
+ TCA_FQ_CODEL_ECN = 4,
+ TCA_FQ_CODEL_FLOWS = 5,
+ TCA_FQ_CODEL_QUANTUM = 6,
+ TCA_FQ_CODEL_CE_THRESHOLD = 7,
+ TCA_FQ_CODEL_DROP_BATCH_SIZE = 8,
+ TCA_FQ_CODEL_MEMORY_LIMIT = 9,
+ TCA_FQ_CODEL_CE_THRESHOLD_SELECTOR = 10,
+ TCA_FQ_CODEL_CE_THRESHOLD_MASK = 11,
+ __TCA_FQ_CODEL_MAX = 12,
+};
+
+enum {
+ TCA_FQ_CODEL_XSTATS_QDISC = 0,
+ TCA_FQ_CODEL_XSTATS_CLASS = 1,
+};
+
+struct tc_fq_codel_qd_stats {
+ __u32 maxpacket;
+ __u32 drop_overlimit;
+ __u32 ecn_mark;
+ __u32 new_flow_count;
+ __u32 new_flows_len;
+ __u32 old_flows_len;
+ __u32 ce_mark;
+ __u32 memory_usage;
+ __u32 drop_overmemory;
+};
+
+struct tc_fq_codel_cl_stats {
+ __s32 deficit;
+ __u32 ldelay;
+ __u32 count;
+ __u32 lastcount;
+ __u32 dropping;
+ __s32 drop_next;
+};
+
+struct tc_fq_codel_xstats {
+ __u32 type;
+ union {
+ struct tc_fq_codel_qd_stats qdisc_stats;
+ struct tc_fq_codel_cl_stats class_stats;
+ };
+};
+
+typedef u32 codel_time_t;
+
+typedef s32 codel_tdiff_t;
+
+struct codel_params {
+ codel_time_t target;
+ codel_time_t ce_threshold;
+ codel_time_t interval;
+ u32 mtu;
+ bool ecn;
+ u8 ce_threshold_selector;
+ u8 ce_threshold_mask;
+};
+
+struct codel_vars {
+ u32 count;
+ u32 lastcount;
+ bool dropping;
+ u16 rec_inv_sqrt;
+ codel_time_t first_above_time;
+ codel_time_t drop_next;
+ codel_time_t ldelay;
+};
+
+struct codel_stats {
+ u32 maxpacket;
+ u32 drop_count;
+ u32 drop_len;
+ u32 ecn_mark;
+ u32 ce_mark;
+};
+
+typedef u32 (*codel_skb_len_t)(const struct sk_buff *);
+
+typedef codel_time_t (*codel_skb_time_t)(const struct sk_buff *);
+
+typedef void (*codel_skb_drop_t)(struct sk_buff *, void *);
+
+typedef struct sk_buff * (*codel_skb_dequeue_t)(struct codel_vars *, void *);
+
+struct codel_skb_cb {
+ codel_time_t enqueue_time;
+ unsigned int mem_usage;
+};
+
+struct fq_codel_flow {
+ struct sk_buff *head;
+ struct sk_buff *tail;
+ struct list_head flowchain;
+ int deficit;
+ struct codel_vars cvars;
+};
+
+struct fq_codel_sched_data {
+ struct tcf_proto *filter_list;
+ struct tcf_block *block;
+ struct fq_codel_flow *flows;
+ u32 *backlogs;
+ u32 flows_cnt;
+ u32 quantum;
+ u32 drop_batch_size;
+ u32 memory_limit;
+ struct codel_params cparams;
+ struct codel_stats cstats;
+ u32 memory_usage;
+ u32 drop_overmemory;
+ u32 drop_overlimit;
+ u32 new_flow_count;
+ struct list_head new_flows;
+ struct list_head old_flows;
+};
+
+struct nf_hook_entries_rcu_head {
+ struct callback_head head;
+ void *allocation;
+};
+
+struct gro_remcsum {
+ int offset;
+ __wsum delta;
+};
+
+struct guehdr {
+ union {
+ struct {
+ __u8 hlen: 5;
+ __u8 control: 1;
+ __u8 version: 2;
+ __u8 proto_ctype;
+ __be16 flags;
+ };
+ __be32 word;
+ };
+};
+
+enum {
+ FOU_ATTR_UNSPEC = 0,
+ FOU_ATTR_PORT = 1,
+ FOU_ATTR_AF = 2,
+ FOU_ATTR_IPPROTO = 3,
+ FOU_ATTR_TYPE = 4,
+ FOU_ATTR_REMCSUM_NOPARTIAL = 5,
+ FOU_ATTR_LOCAL_V4 = 6,
+ FOU_ATTR_LOCAL_V6 = 7,
+ FOU_ATTR_PEER_V4 = 8,
+ FOU_ATTR_PEER_V6 = 9,
+ FOU_ATTR_PEER_PORT = 10,
+ FOU_ATTR_IFINDEX = 11,
+ __FOU_ATTR_MAX = 12,
+};
+
+enum {
+ FOU_CMD_UNSPEC = 0,
+ FOU_CMD_ADD = 1,
+ FOU_CMD_DEL = 2,
+ FOU_CMD_GET = 3,
+ __FOU_CMD_MAX = 4,
+};
+
+enum {
+ FOU_ENCAP_UNSPEC = 0,
+ FOU_ENCAP_DIRECT = 1,
+ FOU_ENCAP_GUE = 2,
+};
+
+struct fou {
+ struct socket *sock;
+ u8 protocol;
+ u8 flags;
+ __be16 port;
+ u8 family;
+ u16 type;
+ struct list_head list;
+ struct callback_head rcu;
+};
+
+struct fou_cfg {
+ u16 type;
+ u8 protocol;
+ u8 flags;
+ struct udp_port_cfg udp_config;
+};
+
+struct fou_net {
+ struct list_head fou_list;
+ struct mutex fou_lock;
+};
+
+struct in6_rtmsg {
+ struct in6_addr rtmsg_dst;
+ struct in6_addr rtmsg_src;
+ struct in6_addr rtmsg_gateway;
+ __u32 rtmsg_type;
+ __u16 rtmsg_dst_len;
+ __u16 rtmsg_src_len;
+ __u32 rtmsg_metric;
+ long unsigned int rtmsg_info;
+ __u32 rtmsg_flags;
+ int rtmsg_ifindex;
+};
+
+struct rt6_exception {
+ struct hlist_node hlist;
+ struct rt6_info *rt6i;
+ long unsigned int stamp;
+ struct callback_head rcu;
+};
+
+struct netevent_redirect {
+ struct dst_entry *old;
+ struct dst_entry *new;
+ struct neighbour *neigh;
+ const void *daddr;
+};
+
+struct trace_event_raw_fib6_table_lookup {
+ struct trace_entry ent;
+ u32 tb_id;
+ int err;
+ int oif;
+ int iif;
+ __u8 tos;
+ __u8 scope;
+ __u8 flags;
+ __u8 src[16];
+ __u8 dst[16];
+ u16 sport;
+ u16 dport;
+ u8 proto;
+ u8 rt_type;
+ char name[16];
+ __u8 gw[16];
+ char __data[0];
+};
+
+struct trace_event_data_offsets_fib6_table_lookup {};
+
+typedef void (*btf_trace_fib6_table_lookup)(void *, const struct net *, const struct fib6_result *, struct fib6_table *, const struct flowi6 *);
+
+enum rt6_nud_state {
+ RT6_NUD_FAIL_HARD = -3,
+ RT6_NUD_FAIL_PROBE = -2,
+ RT6_NUD_FAIL_DO_RR = -1,
+ RT6_NUD_SUCCEED = 1,
+};
+
+struct fib6_nh_dm_arg {
+ struct net *net;
+ const struct in6_addr *saddr;
+ int oif;
+ int flags;
+ struct fib6_nh *nh;
+};
+
+struct __rt6_probe_work {
+ struct work_struct work;
+ struct in6_addr target;
+ struct net_device *dev;
+ netdevice_tracker dev_tracker;
+};
+
+struct fib6_nh_frl_arg {
+ u32 flags;
+ int oif;
+ int strict;
+ int *mpri;
+ bool *do_rr;
+ struct fib6_nh *nh;
+};
+
+struct fib6_nh_excptn_arg {
+ struct rt6_info *rt;
+ int plen;
+};
+
+struct fib6_nh_match_arg {
+ const struct net_device *dev;
+ const struct in6_addr *gw;
+ struct fib6_nh *match;
+};
+
+struct fib6_nh_age_excptn_arg {
+ struct fib6_gc_args *gc_args;
+ long unsigned int now;
+};
+
+struct fib6_nh_rd_arg {
+ struct fib6_result *res;
+ struct flowi6 *fl6;
+ const struct in6_addr *gw;
+ struct rt6_info **ret;
+};
+
+struct ip6rd_flowi {
+ struct flowi6 fl6;
+ struct in6_addr gateway;
+};
+
+struct fib6_nh_del_cached_rt_arg {
+ struct fib6_config *cfg;
+ struct fib6_info *f6i;
+};
+
+struct arg_dev_net_ip {
+ struct net_device *dev;
+ struct net *net;
+ struct in6_addr *addr;
+};
+
+struct arg_netdev_event {
+ const struct net_device *dev;
+ union {
+ unsigned char nh_flags;
+ long unsigned int event;
+ };
+};
+
+struct rt6_mtu_change_arg {
+ struct net_device *dev;
+ unsigned int mtu;
+ struct fib6_info *f6i;
+};
+
+struct rt6_nh {
+ struct fib6_info *fib6_info;
+ struct fib6_config r_cfg;
+ struct list_head next;
+};
+
+struct fib6_nh_exception_dump_walker {
+ struct rt6_rtnl_dump_arg *dump;
+ struct fib6_info *rt;
+ unsigned int flags;
+ unsigned int skip;
+ unsigned int count;
+};
+
+struct cstate_model {
+ long unsigned int core_events;
+ long unsigned int pkg_events;
+ long unsigned int quirks;
+};
+
+enum perf_cstate_core_events {
+ PERF_CSTATE_CORE_C1_RES = 0,
+ PERF_CSTATE_CORE_C3_RES = 1,
+ PERF_CSTATE_CORE_C6_RES = 2,
+ PERF_CSTATE_CORE_C7_RES = 3,
+ PERF_CSTATE_CORE_EVENT_MAX = 4,
+};
+
+enum perf_cstate_pkg_events {
+ PERF_CSTATE_PKG_C2_RES = 0,
+ PERF_CSTATE_PKG_C3_RES = 1,
+ PERF_CSTATE_PKG_C6_RES = 2,
+ PERF_CSTATE_PKG_C7_RES = 3,
+ PERF_CSTATE_PKG_C8_RES = 4,
+ PERF_CSTATE_PKG_C9_RES = 5,
+ PERF_CSTATE_PKG_C10_RES = 6,
+ PERF_CSTATE_PKG_EVENT_MAX = 7,
+};
+
+struct wq_flusher;
+
+struct worker;
+
+struct workqueue_attrs;
+
+struct pool_workqueue;
+
+struct wq_device;
+
+struct workqueue_struct {
+ struct list_head pwqs;
+ struct list_head list;
+ struct mutex mutex;
+ int work_color;
+ int flush_color;
+ atomic_t nr_pwqs_to_flush;
+ struct wq_flusher *first_flusher;
+ struct list_head flusher_queue;
+ struct list_head flusher_overflow;
+ struct list_head maydays;
+ struct worker *rescuer;
+ int nr_drainers;
+ int saved_max_active;
+ struct workqueue_attrs *unbound_attrs;
+ struct pool_workqueue *dfl_pwq;
+ struct wq_device *wq_dev;
+ char *lock_name;
+ struct lock_class_key key;
+ struct lockdep_map lockdep_map;
+ char name[24];
+ struct callback_head rcu;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ unsigned int flags;
+ struct pool_workqueue *cpu_pwqs;
+ struct pool_workqueue *numa_pwq_tbl[0];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct workqueue_attrs {
+ int nice;
+ cpumask_var_t cpumask;
+ bool no_numa;
+};
+
+struct worker_pool;
+
+struct worker {
+ union {
+ struct list_head entry;
+ struct hlist_node hentry;
+ };
+ struct work_struct *current_work;
+ work_func_t current_func;
+ struct pool_workqueue *current_pwq;
+ unsigned int current_color;
+ struct list_head scheduled;
+ struct task_struct *task;
+ struct worker_pool *pool;
+ struct list_head node;
+ long unsigned int last_active;
+ unsigned int flags;
+ int id;
+ int sleeping;
+ char desc[24];
+ struct workqueue_struct *rescue_wq;
+ work_func_t last_func;
+};
+
+struct pool_workqueue {
+ struct worker_pool *pool;
+ struct workqueue_struct *wq;
+ int work_color;
+ int flush_color;
+ int refcnt;
+ int nr_in_flight[16];
+ int nr_active;
+ int max_active;
+ struct list_head inactive_works;
+ struct list_head pwqs_node;
+ struct list_head mayday_node;
+ struct work_struct unbound_release_work;
+ struct callback_head rcu;
+ long: 64;
+ long: 64;
+};
+
+struct worker_pool {
+ raw_spinlock_t lock;
+ int cpu;
+ int node;
+ int id;
+ unsigned int flags;
+ long unsigned int watchdog_ts;
+ int nr_running;
+ struct list_head worklist;
+ int nr_workers;
+ int nr_idle;
+ struct list_head idle_list;
+ struct timer_list idle_timer;
+ struct timer_list mayday_timer;
+ struct hlist_head busy_hash[64];
+ struct worker *manager;
+ struct list_head workers;
+ struct completion *detach_completion;
+ struct ida worker_ida;
+ struct workqueue_attrs *attrs;
+ struct hlist_node hash_node;
+ int refcnt;
+ struct callback_head rcu;
+};
+
+enum {
+ POOL_MANAGER_ACTIVE = 1,
+ POOL_DISASSOCIATED = 4,
+ WORKER_DIE = 2,
+ WORKER_IDLE = 4,
+ WORKER_PREP = 8,
+ WORKER_CPU_INTENSIVE = 64,
+ WORKER_UNBOUND = 128,
+ WORKER_REBOUND = 256,
+ WORKER_NOT_RUNNING = 456,
+ NR_STD_WORKER_POOLS = 2,
+ UNBOUND_POOL_HASH_ORDER = 6,
+ BUSY_WORKER_HASH_ORDER = 6,
+ MAX_IDLE_WORKERS_RATIO = 4,
+ IDLE_WORKER_TIMEOUT = 300000,
+ MAYDAY_INITIAL_TIMEOUT = 10,
+ MAYDAY_INTERVAL = 100,
+ CREATE_COOLDOWN = 1000,
+ RESCUER_NICE_LEVEL = -20,
+ HIGHPRI_NICE_LEVEL = -20,
+ WQ_NAME_LEN = 24,
+};
+
+struct wq_flusher {
+ struct list_head list;
+ int flush_color;
+ struct completion done;
+};
+
+struct wq_device {
+ struct workqueue_struct *wq;
+ struct device dev;
+};
+
+struct trace_event_raw_workqueue_queue_work {
+ struct trace_entry ent;
+ void *work;
+ void *function;
+ u32 __data_loc_workqueue;
+ int req_cpu;
+ int cpu;
+ char __data[0];
+};
+
+struct trace_event_raw_workqueue_activate_work {
+ struct trace_entry ent;
+ void *work;
+ char __data[0];
+};
+
+struct trace_event_raw_workqueue_execute_start {
+ struct trace_entry ent;
+ void *work;
+ void *function;
+ char __data[0];
+};
+
+struct trace_event_raw_workqueue_execute_end {
+ struct trace_entry ent;
+ void *work;
+ void *function;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_workqueue_queue_work {
+ u32 workqueue;
+};
+
+struct trace_event_data_offsets_workqueue_activate_work {};
+
+struct trace_event_data_offsets_workqueue_execute_start {};
+
+struct trace_event_data_offsets_workqueue_execute_end {};
+
+typedef void (*btf_trace_workqueue_queue_work)(void *, int, struct pool_workqueue *, struct work_struct *);
+
+typedef void (*btf_trace_workqueue_activate_work)(void *, struct work_struct *);
+
+typedef void (*btf_trace_workqueue_execute_start)(void *, struct work_struct *);
+
+typedef void (*btf_trace_workqueue_execute_end)(void *, struct work_struct *, work_func_t);
+
+struct wq_barrier {
+ struct work_struct work;
+ struct completion done;
+ struct task_struct *task;
+};
+
+struct cwt_wait {
+ wait_queue_entry_t wait;
+ struct work_struct *work;
+};
+
+struct apply_wqattrs_ctx {
+ struct workqueue_struct *wq;
+ struct workqueue_attrs *attrs;
+ struct list_head list;
+ struct pool_workqueue *dfl_pwq;
+ struct pool_workqueue *pwq_tbl[0];
+};
+
+struct work_for_cpu {
+ struct work_struct work;
+ long int (*fn)(void *);
+ void *arg;
+ long int ret;
+};
+
+struct mlock_pvec {
+ local_lock_t lock;
+ struct pagevec vec;
+};
+
+enum transparent_hugepage_flag {
+ TRANSPARENT_HUGEPAGE_NEVER_DAX = 0,
+ TRANSPARENT_HUGEPAGE_FLAG = 1,
+ TRANSPARENT_HUGEPAGE_REQ_MADV_FLAG = 2,
+ TRANSPARENT_HUGEPAGE_DEFRAG_DIRECT_FLAG = 3,
+ TRANSPARENT_HUGEPAGE_DEFRAG_KSWAPD_FLAG = 4,
+ TRANSPARENT_HUGEPAGE_DEFRAG_KSWAPD_OR_MADV_FLAG = 5,
+ TRANSPARENT_HUGEPAGE_DEFRAG_REQ_MADV_FLAG = 6,
+ TRANSPARENT_HUGEPAGE_DEFRAG_KHUGEPAGED_FLAG = 7,
+ TRANSPARENT_HUGEPAGE_USE_ZERO_PAGE_FLAG = 8,
+};
+
+struct trace_event_raw_hugepage_set_pmd {
+ struct trace_entry ent;
+ long unsigned int addr;
+ long unsigned int pmd;
+ char __data[0];
+};
+
+struct trace_event_raw_hugepage_update {
+ struct trace_entry ent;
+ long unsigned int addr;
+ long unsigned int pte;
+ long unsigned int clr;
+ long unsigned int set;
+ char __data[0];
+};
+
+struct trace_event_raw_migration_pmd {
+ struct trace_entry ent;
+ long unsigned int addr;
+ long unsigned int pmd;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_hugepage_set_pmd {};
+
+struct trace_event_data_offsets_hugepage_update {};
+
+struct trace_event_data_offsets_migration_pmd {};
+
+typedef void (*btf_trace_hugepage_set_pmd)(void *, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_hugepage_update)(void *, long unsigned int, long unsigned int, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_set_migration_pmd)(void *, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_remove_migration_pmd)(void *, long unsigned int, long unsigned int);
+
+enum lsm_rule_types {
+ LSM_OBJ_USER = 0,
+ LSM_OBJ_ROLE = 1,
+ LSM_OBJ_TYPE = 2,
+ LSM_SUBJ_USER = 3,
+ LSM_SUBJ_ROLE = 4,
+ LSM_SUBJ_TYPE = 5,
+};
+
+enum policy_types {
+ ORIGINAL_TCB = 1,
+ DEFAULT_TCB = 2,
+};
+
+enum policy_rule_list {
+ IMA_DEFAULT_POLICY = 1,
+ IMA_CUSTOM_POLICY = 2,
+};
+
+struct ima_rule_opt_list {
+ size_t count;
+ char *items[0];
+};
+
+struct ima_rule_entry {
+ struct list_head list;
+ int action;
+ unsigned int flags;
+ enum ima_hooks func;
+ int mask;
+ long unsigned int fsmagic;
+ uuid_t fsuuid;
+ kuid_t uid;
+ kgid_t gid;
+ kuid_t fowner;
+ kgid_t fgroup;
+ bool (*uid_op)(kuid_t, kuid_t);
+ bool (*gid_op)(kgid_t, kgid_t);
+ bool (*fowner_op)(kuid_t, kuid_t);
+ bool (*fgroup_op)(kgid_t, kgid_t);
+ int pcr;
+ unsigned int allowed_algos;
+ struct {
+ void *rule;
+ char *args_p;
+ int type;
+ } lsm[6];
+ char *fsname;
+ struct ima_rule_opt_list *keyrings;
+ struct ima_rule_opt_list *label;
+ struct ima_template_desc *template;
+};
+
+enum policy_opt {
+ Opt_measure = 0,
+ Opt_dont_measure = 1,
+ Opt_appraise = 2,
+ Opt_dont_appraise = 3,
+ Opt_audit = 4,
+ Opt_hash = 5,
+ Opt_dont_hash = 6,
+ Opt_obj_user = 7,
+ Opt_obj_role = 8,
+ Opt_obj_type = 9,
+ Opt_subj_user = 10,
+ Opt_subj_role = 11,
+ Opt_subj_type = 12,
+ Opt_func = 13,
+ Opt_mask = 14,
+ Opt_fsmagic = 15,
+ Opt_fsname = 16,
+ Opt_fsuuid = 17,
+ Opt_uid_eq = 18,
+ Opt_euid_eq = 19,
+ Opt_gid_eq = 20,
+ Opt_egid_eq = 21,
+ Opt_fowner_eq = 22,
+ Opt_fgroup_eq = 23,
+ Opt_uid_gt = 24,
+ Opt_euid_gt = 25,
+ Opt_gid_gt = 26,
+ Opt_egid_gt = 27,
+ Opt_fowner_gt = 28,
+ Opt_fgroup_gt = 29,
+ Opt_uid_lt = 30,
+ Opt_euid_lt = 31,
+ Opt_gid_lt = 32,
+ Opt_egid_lt = 33,
+ Opt_fowner_lt = 34,
+ Opt_fgroup_lt = 35,
+ Opt_digest_type = 36,
+ Opt_appraise_type = 37,
+ Opt_appraise_flag = 38,
+ Opt_appraise_algos = 39,
+ Opt_permit_directio = 40,
+ Opt_pcr = 41,
+ Opt_template = 42,
+ Opt_keyrings = 43,
+ Opt_label = 44,
+ Opt_err___3 = 45,
+};
+
+enum {
+ mask_exec = 0,
+ mask_write = 1,
+ mask_read = 2,
+ mask_append = 3,
+};
+
+struct rq_map_data {
+ struct page **pages;
+ long unsigned int offset;
+ short unsigned int page_order;
+ short unsigned int nr_entries;
+ bool null_mapped;
+ bool from_user;
+};
+
+struct bio_map_data {
+ bool is_our_pages: 1;
+ bool is_null_mapped: 1;
+ struct iov_iter iter;
+ struct iovec iov[0];
+};
+
+struct xa_limit {
+ u32 max;
+ u32 min;
+};
+
+enum {
+ IORING_CQE_BUFFER_SHIFT = 16,
+};
+
+struct io_uring_probe_op {
+ __u8 op;
+ __u8 resv;
+ __u16 flags;
+ __u32 resv2;
+};
+
+struct io_uring_probe {
+ __u8 last_op;
+ __u8 ops_len;
+ __u16 resv;
+ __u32 resv2[3];
+ struct io_uring_probe_op ops[0];
+};
+
+struct io_uring_restriction {
+ __u16 opcode;
+ union {
+ __u8 register_op;
+ __u8 sqe_op;
+ __u8 sqe_flags;
+ };
+ __u8 resv;
+ __u32 resv2[3];
+};
+
+enum {
+ IORING_RESTRICTION_REGISTER_OP = 0,
+ IORING_RESTRICTION_SQE_OP = 1,
+ IORING_RESTRICTION_SQE_FLAGS_ALLOWED = 2,
+ IORING_RESTRICTION_SQE_FLAGS_REQUIRED = 3,
+ IORING_RESTRICTION_LAST = 4,
+};
+
+struct io_uring_getevents_arg {
+ __u64 sigmask;
+ __u32 sigmask_sz;
+ __u32 pad;
+ __u64 ts;
+};
+
+struct io_overflow_cqe {
+ struct list_head list;
+ struct io_uring_cqe cqe;
+};
+
+struct trace_event_raw_io_uring_create {
+ struct trace_entry ent;
+ int fd;
+ void *ctx;
+ u32 sq_entries;
+ u32 cq_entries;
+ u32 flags;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_register {
+ struct trace_entry ent;
+ void *ctx;
+ unsigned int opcode;
+ unsigned int nr_files;
+ unsigned int nr_bufs;
+ long int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_file_get {
+ struct trace_entry ent;
+ void *ctx;
+ void *req;
+ u64 user_data;
+ int fd;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_queue_async_work {
+ struct trace_entry ent;
+ void *ctx;
+ void *req;
+ u64 user_data;
+ u8 opcode;
+ unsigned int flags;
+ struct io_wq_work *work;
+ int rw;
+ u32 __data_loc_op_str;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_defer {
+ struct trace_entry ent;
+ void *ctx;
+ void *req;
+ long long unsigned int data;
+ u8 opcode;
+ u32 __data_loc_op_str;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_link {
+ struct trace_entry ent;
+ void *ctx;
+ void *req;
+ void *target_req;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_cqring_wait {
+ struct trace_entry ent;
+ void *ctx;
+ int min_events;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_fail_link {
+ struct trace_entry ent;
+ void *ctx;
+ void *req;
+ long long unsigned int user_data;
+ u8 opcode;
+ void *link;
+ u32 __data_loc_op_str;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_complete {
+ struct trace_entry ent;
+ void *ctx;
+ void *req;
+ u64 user_data;
+ int res;
+ unsigned int cflags;
+ u64 extra1;
+ u64 extra2;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_submit_sqe {
+ struct trace_entry ent;
+ void *ctx;
+ void *req;
+ long long unsigned int user_data;
+ u8 opcode;
+ u32 flags;
+ bool force_nonblock;
+ bool sq_thread;
+ u32 __data_loc_op_str;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_poll_arm {
+ struct trace_entry ent;
+ void *ctx;
+ void *req;
+ long long unsigned int user_data;
+ u8 opcode;
+ int mask;
+ int events;
+ u32 __data_loc_op_str;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_task_add {
+ struct trace_entry ent;
+ void *ctx;
+ void *req;
+ long long unsigned int user_data;
+ u8 opcode;
+ int mask;
+ u32 __data_loc_op_str;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_req_failed {
+ struct trace_entry ent;
+ void *ctx;
+ void *req;
+ long long unsigned int user_data;
+ u8 opcode;
+ u8 flags;
+ u8 ioprio;
+ u64 off;
+ u64 addr;
+ u32 len;
+ u32 op_flags;
+ u16 buf_index;
+ u16 personality;
+ u32 file_index;
+ u64 pad1;
+ u64 addr3;
+ int error;
+ u32 __data_loc_op_str;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_cqe_overflow {
+ struct trace_entry ent;
+ void *ctx;
+ long long unsigned int user_data;
+ s32 res;
+ u32 cflags;
+ void *ocqe;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_task_work_run {
+ struct trace_entry ent;
+ void *tctx;
+ unsigned int count;
+ unsigned int loops;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_short_write {
+ struct trace_entry ent;
+ void *ctx;
+ u64 fpos;
+ u64 wanted;
+ u64 got;
+ char __data[0];
+};
+
+struct trace_event_raw_io_uring_local_work_run {
+ struct trace_entry ent;
+ void *ctx;
+ int count;
+ unsigned int loops;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_io_uring_create {};
+
+struct trace_event_data_offsets_io_uring_register {};
+
+struct trace_event_data_offsets_io_uring_file_get {};
+
+struct trace_event_data_offsets_io_uring_queue_async_work {
+ u32 op_str;
+};
+
+struct trace_event_data_offsets_io_uring_defer {
+ u32 op_str;
+};
+
+struct trace_event_data_offsets_io_uring_link {};
+
+struct trace_event_data_offsets_io_uring_cqring_wait {};
+
+struct trace_event_data_offsets_io_uring_fail_link {
+ u32 op_str;
+};
+
+struct trace_event_data_offsets_io_uring_complete {};
+
+struct trace_event_data_offsets_io_uring_submit_sqe {
+ u32 op_str;
+};
+
+struct trace_event_data_offsets_io_uring_poll_arm {
+ u32 op_str;
+};
+
+struct trace_event_data_offsets_io_uring_task_add {
+ u32 op_str;
+};
+
+struct trace_event_data_offsets_io_uring_req_failed {
+ u32 op_str;
+};
+
+struct trace_event_data_offsets_io_uring_cqe_overflow {};
+
+struct trace_event_data_offsets_io_uring_task_work_run {};
+
+struct trace_event_data_offsets_io_uring_short_write {};
+
+struct trace_event_data_offsets_io_uring_local_work_run {};
+
+typedef void (*btf_trace_io_uring_create)(void *, int, void *, u32, u32, u32);
+
+typedef void (*btf_trace_io_uring_register)(void *, void *, unsigned int, unsigned int, unsigned int, long int);
+
+typedef void (*btf_trace_io_uring_file_get)(void *, struct io_kiocb *, int);
+
+typedef void (*btf_trace_io_uring_queue_async_work)(void *, struct io_kiocb *, int);
+
+typedef void (*btf_trace_io_uring_defer)(void *, struct io_kiocb *);
+
+typedef void (*btf_trace_io_uring_link)(void *, struct io_kiocb *, struct io_kiocb *);
+
+typedef void (*btf_trace_io_uring_cqring_wait)(void *, void *, int);
+
+typedef void (*btf_trace_io_uring_fail_link)(void *, struct io_kiocb *, struct io_kiocb *);
+
+typedef void (*btf_trace_io_uring_complete)(void *, void *, void *, u64, int, unsigned int, u64, u64);
+
+typedef void (*btf_trace_io_uring_submit_sqe)(void *, struct io_kiocb *, bool);
+
+typedef void (*btf_trace_io_uring_poll_arm)(void *, struct io_kiocb *, int, int);
+
+typedef void (*btf_trace_io_uring_task_add)(void *, struct io_kiocb *, int);
+
+typedef void (*btf_trace_io_uring_req_failed)(void *, const struct io_uring_sqe *, struct io_kiocb *, int);
+
+typedef void (*btf_trace_io_uring_cqe_overflow)(void *, void *, long long unsigned int, s32, u32, void *);
+
+typedef void (*btf_trace_io_uring_task_work_run)(void *, void *, unsigned int, unsigned int);
+
+typedef void (*btf_trace_io_uring_short_write)(void *, void *, u64, u64, u64);
+
+typedef void (*btf_trace_io_uring_local_work_run)(void *, void *, int, unsigned int);
+
+enum {
+ IO_WQ_WORK_CANCEL = 1,
+ IO_WQ_WORK_HASHED = 2,
+ IO_WQ_WORK_UNBOUND = 4,
+ IO_WQ_WORK_CONCURRENT = 16,
+ IO_WQ_HASH_SHIFT = 24,
+};
+
+enum {
+ IO_APOLL_OK = 0,
+ IO_APOLL_ABORTED = 1,
+ IO_APOLL_READY = 2,
+};
+
+enum {
+ IO_CHECK_CQ_OVERFLOW_BIT = 0,
+ IO_CHECK_CQ_DROPPED_BIT = 1,
+};
+
+enum {
+ IO_EVENTFD_OP_SIGNAL_BIT = 0,
+ IO_EVENTFD_OP_FREE_BIT = 1,
+};
+
+struct io_defer_entry {
+ struct list_head list;
+ struct io_kiocb *req;
+ u32 seq;
+};
+
+struct io_wait_queue {
+ struct wait_queue_entry wq;
+ struct io_ring_ctx *ctx;
+ unsigned int cq_tail;
+ unsigned int nr_timeouts;
+};
+
+struct io_tctx_exit {
+ struct callback_head task_work;
+ struct completion completion;
+ struct io_ring_ctx *ctx;
+};
+
+struct io_task_cancel {
+ struct task_struct *task;
+ bool all;
+};
+
+struct creds;
+
+struct ifaddrmsg {
+ __u8 ifa_family;
+ __u8 ifa_prefixlen;
+ __u8 ifa_flags;
+ __u8 ifa_scope;
+ __u32 ifa_index;
+};
+
+enum {
+ IFA_UNSPEC = 0,
+ IFA_ADDRESS = 1,
+ IFA_LOCAL = 2,
+ IFA_LABEL = 3,
+ IFA_BROADCAST = 4,
+ IFA_ANYCAST = 5,
+ IFA_CACHEINFO = 6,
+ IFA_MULTICAST = 7,
+ IFA_FLAGS = 8,
+ IFA_RT_PRIORITY = 9,
+ IFA_TARGET_NETNSID = 10,
+ IFA_PROTO = 11,
+ __IFA_MAX = 12,
+};
+
+struct ifa_cacheinfo {
+ __u32 ifa_prefered;
+ __u32 ifa_valid;
+ __u32 cstamp;
+ __u32 tstamp;
+};
+
+enum {
+ IFLA_INET_UNSPEC = 0,
+ IFLA_INET_CONF = 1,
+ __IFLA_INET_MAX = 2,
+};
+
+struct in_validator_info {
+ __be32 ivi_addr;
+ struct in_device *ivi_dev;
+ struct netlink_ext_ack *extack;
+};
+
+struct inet_fill_args {
+ u32 portid;
+ u32 seq;
+ int event;
+ unsigned int flags;
+ int netnsid;
+ int ifindex;
+};
+
+struct devinet_sysctl_table {
+ struct ctl_table_header *sysctl_header;
+ struct ctl_table devinet_vars[34];
+};
+
+struct trace_event_raw_x86_exceptions {
+ struct trace_entry ent;
+ long unsigned int address;
+ long unsigned int ip;
+ long unsigned int error_code;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_x86_exceptions {};
+
+typedef void (*btf_trace_page_fault_user)(void *, long unsigned int, struct pt_regs *, long unsigned int);
+
+typedef void (*btf_trace_page_fault_kernel)(void *, long unsigned int, struct pt_regs *, long unsigned int);
+
+enum ring_buffer_type {
+ RINGBUF_TYPE_DATA_TYPE_LEN_MAX = 28,
+ RINGBUF_TYPE_PADDING = 29,
+ RINGBUF_TYPE_TIME_EXTEND = 30,
+ RINGBUF_TYPE_TIME_STAMP = 31,
+};
+
+enum ring_buffer_flags {
+ RB_FL_OVERWRITE = 1,
+};
+
+struct ring_buffer_per_cpu;
+
+struct buffer_page;
+
+struct ring_buffer_iter {
+ struct ring_buffer_per_cpu *cpu_buffer;
+ long unsigned int head;
+ long unsigned int next_event;
+ struct buffer_page *head_page;
+ struct buffer_page *cache_reader_page;
+ long unsigned int cache_read;
+ u64 read_stamp;
+ u64 page_stamp;
+ struct ring_buffer_event *event;
+ int missed_events;
+};
+
+struct rb_irq_work {
+ struct irq_work work;
+ wait_queue_head_t waiters;
+ wait_queue_head_t full_waiters;
+ long int wait_index;
+ bool waiters_pending;
+ bool full_waiters_pending;
+ bool wakeup_full;
+};
+
+struct trace_buffer {
+ unsigned int flags;
+ int cpus;
+ atomic_t record_disabled;
+ cpumask_var_t cpumask;
+ struct lock_class_key *reader_lock_key;
+ struct mutex mutex;
+ struct ring_buffer_per_cpu **buffers;
+ struct hlist_node node;
+ u64 (*clock)();
+ struct rb_irq_work irq_work;
+ bool time_stamp_abs;
+};
+
+enum {
+ RB_LEN_TIME_EXTEND = 8,
+ RB_LEN_TIME_STAMP = 8,
+};
+
+struct buffer_data_page {
+ u64 time_stamp;
+ local_t commit;
+ unsigned char data[0];
+};
+
+struct buffer_page {
+ struct list_head list;
+ local_t write;
+ unsigned int read;
+ local_t entries;
+ long unsigned int real_end;
+ struct buffer_data_page *page;
+};
+
+struct rb_event_info {
+ u64 ts;
+ u64 delta;
+ u64 before;
+ u64 after;
+ long unsigned int length;
+ struct buffer_page *tail_page;
+ int add_timestamp;
+};
+
+enum {
+ RB_ADD_STAMP_NONE = 0,
+ RB_ADD_STAMP_EXTEND = 2,
+ RB_ADD_STAMP_ABSOLUTE = 4,
+ RB_ADD_STAMP_FORCE = 8,
+};
+
+enum {
+ RB_CTX_TRANSITION = 0,
+ RB_CTX_NMI = 1,
+ RB_CTX_IRQ = 2,
+ RB_CTX_SOFTIRQ = 3,
+ RB_CTX_NORMAL = 4,
+ RB_CTX_MAX = 5,
+};
+
+struct rb_time_struct {
+ local64_t time;
+};
+
+typedef struct rb_time_struct rb_time_t;
+
+struct ring_buffer_per_cpu {
+ int cpu;
+ atomic_t record_disabled;
+ atomic_t resize_disabled;
+ struct trace_buffer *buffer;
+ raw_spinlock_t reader_lock;
+ arch_spinlock_t lock;
+ struct lock_class_key lock_key;
+ struct buffer_data_page *free_page;
+ long unsigned int nr_pages;
+ unsigned int current_context;
+ struct list_head *pages;
+ struct buffer_page *head_page;
+ struct buffer_page *tail_page;
+ struct buffer_page *commit_page;
+ struct buffer_page *reader_page;
+ long unsigned int lost_events;
+ long unsigned int last_overrun;
+ long unsigned int nest;
+ local_t entries_bytes;
+ local_t entries;
+ local_t overrun;
+ local_t commit_overrun;
+ local_t dropped_events;
+ local_t committing;
+ local_t commits;
+ local_t pages_touched;
+ local_t pages_lost;
+ local_t pages_read;
+ long int last_pages_touch;
+ size_t shortest_full;
+ long unsigned int read;
+ long unsigned int read_bytes;
+ rb_time_t write_stamp;
+ rb_time_t before_stamp;
+ u64 event_stamp[5];
+ u64 read_stamp;
+ long int nr_pages_to_update;
+ struct list_head new_pages;
+ struct work_struct update_pages_work;
+ struct completion update_done;
+ struct rb_irq_work irq_work;
+};
+
+struct dma_pool {
+ struct list_head page_list;
+ spinlock_t lock;
+ size_t size;
+ struct device *dev;
+ size_t allocation;
+ size_t boundary;
+ char name[32];
+ struct list_head pools;
+};
+
+struct dma_page {
+ struct list_head page_list;
+ void *vaddr;
+ dma_addr_t dma;
+ unsigned int in_use;
+ unsigned int offset;
+};
+
+enum sgp_type {
+ SGP_READ = 0,
+ SGP_NOALLOC = 1,
+ SGP_CACHE = 2,
+ SGP_WRITE = 3,
+ SGP_FALLOC = 4,
+};
+
+enum scan_result {
+ SCAN_FAIL = 0,
+ SCAN_SUCCEED = 1,
+ SCAN_PMD_NULL = 2,
+ SCAN_PMD_NONE = 3,
+ SCAN_PMD_MAPPED = 4,
+ SCAN_EXCEED_NONE_PTE = 5,
+ SCAN_EXCEED_SWAP_PTE = 6,
+ SCAN_EXCEED_SHARED_PTE = 7,
+ SCAN_PTE_NON_PRESENT = 8,
+ SCAN_PTE_UFFD_WP = 9,
+ SCAN_PTE_MAPPED_HUGEPAGE = 10,
+ SCAN_PAGE_RO = 11,
+ SCAN_LACK_REFERENCED_PAGE = 12,
+ SCAN_PAGE_NULL = 13,
+ SCAN_SCAN_ABORT = 14,
+ SCAN_PAGE_COUNT = 15,
+ SCAN_PAGE_LRU = 16,
+ SCAN_PAGE_LOCK = 17,
+ SCAN_PAGE_ANON = 18,
+ SCAN_PAGE_COMPOUND = 19,
+ SCAN_ANY_PROCESS = 20,
+ SCAN_VMA_NULL = 21,
+ SCAN_VMA_CHECK = 22,
+ SCAN_ADDRESS_RANGE = 23,
+ SCAN_DEL_PAGE_LRU = 24,
+ SCAN_ALLOC_HUGE_PAGE_FAIL = 25,
+ SCAN_CGROUP_CHARGE_FAIL = 26,
+ SCAN_TRUNCATED = 27,
+ SCAN_PAGE_HAS_PRIVATE = 28,
+};
+
+struct trace_event_raw_mm_khugepaged_scan_pmd {
+ struct trace_entry ent;
+ struct mm_struct *mm;
+ long unsigned int pfn;
+ bool writable;
+ int referenced;
+ int none_or_zero;
+ int status;
+ int unmapped;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_collapse_huge_page {
+ struct trace_entry ent;
+ struct mm_struct *mm;
+ int isolated;
+ int status;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_collapse_huge_page_isolate {
+ struct trace_entry ent;
+ long unsigned int pfn;
+ int none_or_zero;
+ int referenced;
+ bool writable;
+ int status;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_collapse_huge_page_swapin {
+ struct trace_entry ent;
+ struct mm_struct *mm;
+ int swapped_in;
+ int referenced;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_khugepaged_scan_file {
+ struct trace_entry ent;
+ struct mm_struct *mm;
+ long unsigned int pfn;
+ u32 __data_loc_filename;
+ int present;
+ int swap;
+ int result;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_mm_khugepaged_scan_pmd {};
+
+struct trace_event_data_offsets_mm_collapse_huge_page {};
+
+struct trace_event_data_offsets_mm_collapse_huge_page_isolate {};
+
+struct trace_event_data_offsets_mm_collapse_huge_page_swapin {};
+
+struct trace_event_data_offsets_mm_khugepaged_scan_file {
+ u32 filename;
+};
+
+typedef void (*btf_trace_mm_khugepaged_scan_pmd)(void *, struct mm_struct *, struct page *, bool, int, int, int, int);
+
+typedef void (*btf_trace_mm_collapse_huge_page)(void *, struct mm_struct *, int, int);
+
+typedef void (*btf_trace_mm_collapse_huge_page_isolate)(void *, struct page *, int, int, bool, int);
+
+typedef void (*btf_trace_mm_collapse_huge_page_swapin)(void *, struct mm_struct *, int, int, int);
+
+typedef void (*btf_trace_mm_khugepaged_scan_file)(void *, struct mm_struct *, struct page *, struct file *, int, int, int);
+
+struct collapse_control {
+ bool is_khugepaged;
+ u32 node_load[64];
+ nodemask_t alloc_nmask;
+};
+
+struct khugepaged_mm_slot {
+ struct mm_slot slot;
+ int nr_pte_mapped_thp;
+ long unsigned int pte_mapped_thp[8];
+};
+
+struct khugepaged_scan {
+ struct list_head mm_head;
+ struct khugepaged_mm_slot *mm_slot;
+ long unsigned int address;
+};
+
+enum {
+ Opt_debug___2 = 0,
+ Opt_dfltuid = 1,
+ Opt_dfltgid = 2,
+ Opt_afid = 3,
+ Opt_uname = 4,
+ Opt_remotename = 5,
+ Opt_cache = 6,
+ Opt_cachetag = 7,
+ Opt_nodevmap = 8,
+ Opt_cache_loose = 9,
+ Opt_fscache = 10,
+ Opt_mmap = 11,
+ Opt_access = 12,
+ Opt_posixacl = 13,
+ Opt_locktimeout = 14,
+ Opt_err___4 = 15,
+};
+
+struct io_rename {
+ struct file *file;
+ int old_dfd;
+ int new_dfd;
+ struct filename *oldpath;
+ struct filename *newpath;
+ int flags;
+};
+
+struct io_unlink {
+ struct file *file;
+ int dfd;
+ int flags;
+ struct filename *filename;
+};
+
+struct io_mkdir {
+ struct file *file;
+ int dfd;
+ umode_t mode;
+ struct filename *filename;
+};
+
+struct io_link {
+ struct file *file;
+ int old_dfd;
+ int new_dfd;
+ struct filename *oldpath;
+ struct filename *newpath;
+ int flags;
+};
+
+typedef unsigned int uInt;
+
+typedef struct {
+ U32 f1c;
+ U32 f1d;
+ U32 f7b;
+ U32 f7c;
+} ZSTD_cpuid_t;
+
+typedef struct {
+ size_t error;
+ int lowerBound;
+ int upperBound;
+} ZSTD_bounds;
+
+typedef enum {
+ ZSTD_reset_session_only = 1,
+ ZSTD_reset_parameters = 2,
+ ZSTD_reset_session_and_parameters = 3,
+} ZSTD_ResetDirective;
+
+typedef enum {
+ ZSTD_d_windowLogMax = 100,
+ ZSTD_d_experimentalParam1 = 1000,
+ ZSTD_d_experimentalParam2 = 1001,
+ ZSTD_d_experimentalParam3 = 1002,
+ ZSTD_d_experimentalParam4 = 1003,
+} ZSTD_dParameter;
+
+typedef ZSTD_DCtx___2 ZSTD_DStream___2;
+
+typedef enum {
+ ZSTDnit_frameHeader = 0,
+ ZSTDnit_blockHeader = 1,
+ ZSTDnit_block = 2,
+ ZSTDnit_lastBlock = 3,
+ ZSTDnit_checksum = 4,
+ ZSTDnit_skippableFrame = 5,
+} ZSTD_nextInputType_e;
+
+typedef struct {
+ size_t compressedSize;
+ long long unsigned int decompressedBound;
+} ZSTD_frameSizeInfo;
+
+typedef struct {
+ blockType_e blockType;
+ U32 lastBlock;
+ U32 origSize;
+} blockProperties_t;
+
+typedef unsigned int u_int;
+
+struct fb_cmap_user {
+ __u32 start;
+ __u32 len;
+ __u16 *red;
+ __u16 *green;
+ __u16 *blue;
+ __u16 *transp;
+};
+
+struct acpi_table_lpit {
+ struct acpi_table_header header;
+};
+
+struct acpi_lpit_header {
+ u32 type;
+ u32 length;
+ u16 unique_id;
+ u16 reserved;
+ u32 flags;
+};
+
+struct acpi_lpit_native {
+ struct acpi_lpit_header header;
+ struct acpi_generic_address entry_trigger;
+ u32 residency;
+ u32 latency;
+ struct acpi_generic_address residency_counter;
+ u64 counter_frequency;
+} __attribute__((packed));
+
+struct lpit_residency_info {
+ struct acpi_generic_address gaddr;
+ u64 frequency;
+ void *iomem_addr;
+};
+
+enum {
+ AML_FIELD_ATTRIB_QUICK = 2,
+ AML_FIELD_ATTRIB_SEND_RECEIVE = 4,
+ AML_FIELD_ATTRIB_BYTE = 6,
+ AML_FIELD_ATTRIB_WORD = 8,
+ AML_FIELD_ATTRIB_BLOCK = 10,
+ AML_FIELD_ATTRIB_BYTES = 11,
+ AML_FIELD_ATTRIB_PROCESS_CALL = 12,
+ AML_FIELD_ATTRIB_BLOCK_PROCESS_CALL = 13,
+ AML_FIELD_ATTRIB_RAW_BYTES = 14,
+ AML_FIELD_ATTRIB_RAW_PROCESS_BYTES = 15,
+};
+
+struct acpi_fan_fps {
+ u64 control;
+ u64 trip_point;
+ u64 speed;
+ u64 noise_level;
+ u64 power;
+ char name[20];
+ struct device_attribute dev_attr;
+};
+
+struct acpi_fan_fif {
+ u8 revision;
+ u8 fine_grain_ctrl;
+ u8 step_size;
+ u8 low_speed_notification;
+};
+
+struct acpi_fan_fst {
+ u64 revision;
+ u64 control;
+ u64 speed;
+};
+
+struct acpi_fan {
+ bool acpi4;
+ struct acpi_fan_fif fif;
+ struct acpi_fan_fps *fps;
+ int fps_count;
+ struct thermal_cooling_device *cdev;
+ struct device_attribute fst_speed;
+ struct device_attribute fine_grain_control;
+};
+
+struct vivaldi_data {
+ u32 function_row_physmap[24];
+ unsigned int num_function_row_keys;
+};
+
+struct atkbd {
+ struct ps2dev ps2dev;
+ struct input_dev *dev;
+ char name[64];
+ char phys[32];
+ short unsigned int id;
+ short unsigned int keycode[512];
+ long unsigned int force_release_mask[8];
+ unsigned char set;
+ bool translated;
+ bool extra;
+ bool write;
+ bool softrepeat;
+ bool softraw;
+ bool scroll;
+ bool enabled;
+ unsigned char emul;
+ bool resend;
+ bool release;
+ long unsigned int xl_bit;
+ unsigned int last;
+ long unsigned int time;
+ long unsigned int err_count;
+ struct delayed_work event_work;
+ long unsigned int event_jiffies;
+ long unsigned int event_mask;
+ struct mutex mutex;
+ struct vivaldi_data vdata;
+};
+
+struct subsys_interface {
+ const char *name;
+ struct bus_type *subsys;
+ struct list_head node;
+ int (*add_dev)(struct device *, struct subsys_interface *);
+ void (*remove_dev)(struct device *, struct subsys_interface *);
+};
+
+struct cpufreq_freqs {
+ struct cpufreq_policy *policy;
+ unsigned int old;
+ unsigned int new;
+ u8 flags;
+};
+
+union tcp_word_hdr {
+ struct tcphdr hdr;
+ __be32 words[5];
+};
+
+enum {
+ TCP_FLAG_CWR = 32768,
+ TCP_FLAG_ECE = 16384,
+ TCP_FLAG_URG = 8192,
+ TCP_FLAG_ACK = 4096,
+ TCP_FLAG_PSH = 2048,
+ TCP_FLAG_RST = 1024,
+ TCP_FLAG_SYN = 512,
+ TCP_FLAG_FIN = 256,
+ TCP_RESERVED_BITS = 15,
+ TCP_DATA_OFFSET = 240,
+};
+
+struct tls12_crypto_info_aes_ccm_128 {
+ struct tls_crypto_info info;
+ unsigned char iv[8];
+ unsigned char key[16];
+ unsigned char salt[4];
+ unsigned char rec_seq[8];
+};
+
+struct tls12_crypto_info_aria_gcm_128 {
+ struct tls_crypto_info info;
+ unsigned char iv[8];
+ unsigned char key[16];
+ unsigned char salt[4];
+ unsigned char rec_seq[8];
+};
+
+struct tls12_crypto_info_aria_gcm_256 {
+ struct tls_crypto_info info;
+ unsigned char iv[8];
+ unsigned char key[32];
+ unsigned char salt[4];
+ unsigned char rec_seq[8];
+};
+
+enum {
+ TLS_INFO_UNSPEC = 0,
+ TLS_INFO_VERSION = 1,
+ TLS_INFO_CIPHER = 2,
+ TLS_INFO_TXCONF = 3,
+ TLS_INFO_RXCONF = 4,
+ TLS_INFO_ZC_RO_TX = 5,
+ TLS_INFO_RX_NO_PAD = 6,
+ __TLS_INFO_MAX = 7,
+};
+
+struct tls_cipher_size_desc {
+ unsigned int iv;
+ unsigned int key;
+ unsigned int salt;
+ unsigned int tag;
+ unsigned int rec_seq;
+};
+
+enum {
+ TLS_BASE = 0,
+ TLS_SW = 1,
+ TLS_HW = 2,
+ TLS_HW_RECORD = 3,
+ TLS_NUM_CONFIG = 4,
+};
+
+enum {
+ TLSV4 = 0,
+ TLSV6 = 1,
+ TLS_NUM_PROTS = 2,
+};
+
+enum {
+ st_wordstart = 0,
+ st_wordcmp = 1,
+ st_wordskip = 2,
+ st_bufcpy = 3,
+};
+
+enum {
+ st_wordstart___2 = 0,
+ st_wordcmp___2 = 1,
+ st_wordskip___2 = 2,
+};
+
+struct trampoline_header {
+ u64 start;
+ u64 efer;
+ u32 cr4;
+ u32 flags;
+};
+
+struct pkru_state {
+ u32 pkru;
+ u32 pad;
+};
+
+struct bpf_event_entry {
+ struct perf_event *event;
+ struct file *perf_file;
+ struct file *map_file;
+ struct callback_head rcu;
+};
+
+struct bpf_iter_seq_array_map_info {
+ struct bpf_map *map;
+ void *percpu_value_buf;
+ u32 index;
+};
+
+struct prog_poke_elem {
+ struct list_head list;
+ struct bpf_prog_aux *aux;
+};
+
+struct userfaultfd_ctx {
+ wait_queue_head_t fault_pending_wqh;
+ wait_queue_head_t fault_wqh;
+ wait_queue_head_t fd_wqh;
+ wait_queue_head_t event_wqh;
+ seqcount_spinlock_t refile_seq;
+ refcount_t refcount;
+ unsigned int flags;
+ unsigned int features;
+ bool released;
+ atomic_t mmap_changing;
+ struct mm_struct *mm;
+};
+
+struct uffd_msg {
+ __u8 event;
+ __u8 reserved1;
+ __u16 reserved2;
+ __u32 reserved3;
+ union {
+ struct {
+ __u64 flags;
+ __u64 address;
+ union {
+ __u32 ptid;
+ } feat;
+ } pagefault;
+ struct {
+ __u32 ufd;
+ } fork;
+ struct {
+ __u64 from;
+ __u64 to;
+ __u64 len;
+ } remap;
+ struct {
+ __u64 start;
+ __u64 end;
+ } remove;
+ struct {
+ __u64 reserved1;
+ __u64 reserved2;
+ __u64 reserved3;
+ } reserved;
+ } arg;
+};
+
+struct uffdio_api {
+ __u64 api;
+ __u64 features;
+ __u64 ioctls;
+};
+
+struct uffdio_range {
+ __u64 start;
+ __u64 len;
+};
+
+struct uffdio_register {
+ struct uffdio_range range;
+ __u64 mode;
+ __u64 ioctls;
+};
+
+struct uffdio_copy {
+ __u64 dst;
+ __u64 src;
+ __u64 len;
+ __u64 mode;
+ __s64 copy;
+};
+
+struct uffdio_zeropage {
+ struct uffdio_range range;
+ __u64 mode;
+ __s64 zeropage;
+};
+
+struct uffdio_writeprotect {
+ struct uffdio_range range;
+ __u64 mode;
+};
+
+struct uffdio_continue {
+ struct uffdio_range range;
+ __u64 mode;
+ __s64 mapped;
+};
+
+struct userfaultfd_fork_ctx {
+ struct userfaultfd_ctx *orig;
+ struct userfaultfd_ctx *new;
+ struct list_head list;
+};
+
+struct userfaultfd_unmap_ctx {
+ struct userfaultfd_ctx *ctx;
+ long unsigned int start;
+ long unsigned int end;
+ struct list_head list;
+};
+
+struct userfaultfd_wait_queue {
+ struct uffd_msg msg;
+ wait_queue_entry_t wq;
+ struct userfaultfd_ctx *ctx;
+ bool waken;
+};
+
+struct userfaultfd_wake_range {
+ long unsigned int start;
+ long unsigned int len;
+};
+
+typedef struct {
+ __be64 a;
+ __be64 b;
+} be128;
+
+struct gcm_instance_ctx {
+ struct crypto_skcipher_spawn ctr;
+ struct crypto_ahash_spawn ghash;
+};
+
+struct crypto_gcm_ctx {
+ struct crypto_skcipher *ctr;
+ struct crypto_ahash *ghash;
+};
+
+struct crypto_rfc4106_ctx {
+ struct crypto_aead *child;
+ u8 nonce[4];
+};
+
+struct crypto_rfc4106_req_ctx {
+ struct scatterlist src[3];
+ struct scatterlist dst[3];
+ struct aead_request subreq;
+};
+
+struct crypto_rfc4543_instance_ctx {
+ struct crypto_aead_spawn aead;
+};
+
+struct crypto_rfc4543_ctx {
+ struct crypto_aead *child;
+ struct crypto_sync_skcipher *null;
+ u8 nonce[4];
+};
+
+struct crypto_rfc4543_req_ctx {
+ struct aead_request subreq;
+};
+
+struct crypto_gcm_ghash_ctx {
+ unsigned int cryptlen;
+ struct scatterlist *src;
+ int (*complete)(struct aead_request *, u32);
+};
+
+struct crypto_gcm_req_priv_ctx {
+ u8 iv[16];
+ u8 auth_tag[16];
+ u8 iauth_tag[16];
+ struct scatterlist src[3];
+ struct scatterlist dst[3];
+ struct scatterlist sg;
+ struct crypto_gcm_ghash_ctx ghash_ctx;
+ union {
+ struct ahash_request ahreq;
+ struct skcipher_request skreq;
+ } u;
+};
+
+enum {
+ LINUX_RAID_PARTITION___2 = 253,
+};
+
+struct sgi_volume {
+ s8 name[8];
+ __be32 block_num;
+ __be32 num_bytes;
+};
+
+struct sgi_partition {
+ __be32 num_blocks;
+ __be32 first_block;
+ __be32 type;
+};
+
+struct sgi_disklabel {
+ __be32 magic_mushroom;
+ __be16 root_part_num;
+ __be16 swap_part_num;
+ s8 boot_file[16];
+ u8 _unused0[48];
+ struct sgi_volume volume[15];
+ struct sgi_partition partitions[16];
+ __be32 csum;
+ __be32 _unused1;
+};
+
+enum {
+ IORING_MSG_DATA = 0,
+ IORING_MSG_SEND_FD = 1,
+};
+
+struct io_msg {
+ struct file *file;
+ u64 user_data;
+ u32 len;
+ u32 cmd;
+ u32 src_fd;
+ u32 dst_fd;
+ u32 flags;
+};
+
+enum {
+ KERNEL_PARAM_FL_UNSAFE = 1,
+ KERNEL_PARAM_FL_HWPARAM = 2,
+};
+
+enum hwparam_type {
+ hwparam_ioport = 0,
+ hwparam_iomem = 1,
+ hwparam_ioport_or_iomem = 2,
+ hwparam_irq = 3,
+ hwparam_dma = 4,
+ hwparam_dma_addr = 5,
+ hwparam_other = 6,
+};
+
+struct plat_serial8250_port {
+ long unsigned int iobase;
+ void *membase;
+ resource_size_t mapbase;
+ unsigned int irq;
+ long unsigned int irqflags;
+ unsigned int uartclk;
+ void *private_data;
+ unsigned char regshift;
+ unsigned char iotype;
+ unsigned char hub6;
+ unsigned char has_sysrq;
+ upf_t flags;
+ unsigned int type;
+ unsigned int (*serial_in)(struct uart_port *, int);
+ void (*serial_out)(struct uart_port *, int, int);
+ void (*set_termios)(struct uart_port *, struct ktermios *, const struct ktermios *);
+ void (*set_ldisc)(struct uart_port *, struct ktermios *);
+ unsigned int (*get_mctrl)(struct uart_port *);
+ int (*handle_irq)(struct uart_port *);
+ void (*pm)(struct uart_port *, unsigned int, unsigned int);
+ void (*handle_break)(struct uart_port *);
+};
+
+enum {
+ PLAT8250_DEV_LEGACY = -1,
+ PLAT8250_DEV_PLATFORM = 0,
+ PLAT8250_DEV_PLATFORM1 = 1,
+ PLAT8250_DEV_PLATFORM2 = 2,
+ PLAT8250_DEV_FOURPORT = 3,
+ PLAT8250_DEV_ACCENT = 4,
+ PLAT8250_DEV_BOCA = 5,
+ PLAT8250_DEV_EXAR_ST16C554 = 6,
+ PLAT8250_DEV_HUB6 = 7,
+ PLAT8250_DEV_AU1X00 = 8,
+ PLAT8250_DEV_SM501 = 9,
+};
+
+struct old_serial_port {
+ unsigned int uart;
+ unsigned int baud_base;
+ unsigned int port;
+ unsigned int irq;
+ upf_t flags;
+ unsigned char io_type;
+ unsigned char *iomem_base;
+ short unsigned int iomem_reg_shift;
+};
+
+struct irq_info___2 {
+ struct hlist_node node;
+ int irq;
+ spinlock_t lock;
+ struct list_head *head;
+};
+
+struct __kernel_old_timespec {
+ __kernel_old_time_t tv_sec;
+ long int tv_nsec;
+};
+
+struct scm_timestamping_internal {
+ struct timespec64 ts[3];
+};
+
+struct scm_timestamping {
+ struct __kernel_old_timespec ts[3];
+};
+
+struct scm_timestamping64 {
+ struct __kernel_timespec ts[3];
+};
+
+enum {
+ ETHTOOL_A_CABLE_PAIR_A = 0,
+ ETHTOOL_A_CABLE_PAIR_B = 1,
+ ETHTOOL_A_CABLE_PAIR_C = 2,
+ ETHTOOL_A_CABLE_PAIR_D = 3,
+};
+
+enum {
+ ETHTOOL_A_CABLE_RESULT_UNSPEC = 0,
+ ETHTOOL_A_CABLE_RESULT_PAIR = 1,
+ ETHTOOL_A_CABLE_RESULT_CODE = 2,
+ __ETHTOOL_A_CABLE_RESULT_CNT = 3,
+ ETHTOOL_A_CABLE_RESULT_MAX = 2,
+};
+
+enum {
+ ETHTOOL_A_CABLE_FAULT_LENGTH_UNSPEC = 0,
+ ETHTOOL_A_CABLE_FAULT_LENGTH_PAIR = 1,
+ ETHTOOL_A_CABLE_FAULT_LENGTH_CM = 2,
+ __ETHTOOL_A_CABLE_FAULT_LENGTH_CNT = 3,
+ ETHTOOL_A_CABLE_FAULT_LENGTH_MAX = 2,
+};
+
+enum {
+ ETHTOOL_A_CABLE_TEST_NTF_STATUS_UNSPEC = 0,
+ ETHTOOL_A_CABLE_TEST_NTF_STATUS_STARTED = 1,
+ ETHTOOL_A_CABLE_TEST_NTF_STATUS_COMPLETED = 2,
+};
+
+enum {
+ ETHTOOL_A_CABLE_NEST_UNSPEC = 0,
+ ETHTOOL_A_CABLE_NEST_RESULT = 1,
+ ETHTOOL_A_CABLE_NEST_FAULT_LENGTH = 2,
+ __ETHTOOL_A_CABLE_NEST_CNT = 3,
+ ETHTOOL_A_CABLE_NEST_MAX = 2,
+};
+
+enum {
+ ETHTOOL_A_CABLE_TEST_NTF_UNSPEC = 0,
+ ETHTOOL_A_CABLE_TEST_NTF_HEADER = 1,
+ ETHTOOL_A_CABLE_TEST_NTF_STATUS = 2,
+ ETHTOOL_A_CABLE_TEST_NTF_NEST = 3,
+ __ETHTOOL_A_CABLE_TEST_NTF_CNT = 4,
+ ETHTOOL_A_CABLE_TEST_NTF_MAX = 3,
+};
+
+enum {
+ ETHTOOL_A_CABLE_TEST_TDR_CFG_UNSPEC = 0,
+ ETHTOOL_A_CABLE_TEST_TDR_CFG_FIRST = 1,
+ ETHTOOL_A_CABLE_TEST_TDR_CFG_LAST = 2,
+ ETHTOOL_A_CABLE_TEST_TDR_CFG_STEP = 3,
+ ETHTOOL_A_CABLE_TEST_TDR_CFG_PAIR = 4,
+ __ETHTOOL_A_CABLE_TEST_TDR_CFG_CNT = 5,
+ ETHTOOL_A_CABLE_TEST_TDR_CFG_MAX = 4,
+};
+
+enum {
+ ETHTOOL_A_CABLE_AMPLITUDE_UNSPEC = 0,
+ ETHTOOL_A_CABLE_AMPLITUDE_PAIR = 1,
+ ETHTOOL_A_CABLE_AMPLITUDE_mV = 2,
+ __ETHTOOL_A_CABLE_AMPLITUDE_CNT = 3,
+ ETHTOOL_A_CABLE_AMPLITUDE_MAX = 2,
+};
+
+enum {
+ ETHTOOL_A_CABLE_PULSE_UNSPEC = 0,
+ ETHTOOL_A_CABLE_PULSE_mV = 1,
+ __ETHTOOL_A_CABLE_PULSE_CNT = 2,
+ ETHTOOL_A_CABLE_PULSE_MAX = 1,
+};
+
+enum {
+ ETHTOOL_A_CABLE_STEP_UNSPEC = 0,
+ ETHTOOL_A_CABLE_STEP_FIRST_DISTANCE = 1,
+ ETHTOOL_A_CABLE_STEP_LAST_DISTANCE = 2,
+ ETHTOOL_A_CABLE_STEP_STEP_DISTANCE = 3,
+ __ETHTOOL_A_CABLE_STEP_CNT = 4,
+ ETHTOOL_A_CABLE_STEP_MAX = 3,
+};
+
+enum {
+ ETHTOOL_A_CABLE_TDR_NEST_UNSPEC = 0,
+ ETHTOOL_A_CABLE_TDR_NEST_STEP = 1,
+ ETHTOOL_A_CABLE_TDR_NEST_AMPLITUDE = 2,
+ ETHTOOL_A_CABLE_TDR_NEST_PULSE = 3,
+ __ETHTOOL_A_CABLE_TDR_NEST_CNT = 4,
+ ETHTOOL_A_CABLE_TDR_NEST_MAX = 3,
+};
+
+enum {
+ XT_CT_NOTRACK = 1,
+ XT_CT_NOTRACK_ALIAS = 2,
+ XT_CT_ZONE_DIR_ORIG = 4,
+ XT_CT_ZONE_DIR_REPL = 8,
+ XT_CT_ZONE_MARK = 16,
+ XT_CT_MASK = 31,
+};
+
+struct xt_ct_target_info {
+ __u16 flags;
+ __u16 zone;
+ __u32 ct_events;
+ __u32 exp_events;
+ char helper[16];
+ struct nf_conn *ct;
+};
+
+struct xt_ct_target_info_v1 {
+ __u16 flags;
+ __u16 zone;
+ __u32 ct_events;
+ __u32 exp_events;
+ char helper[16];
+ char timeout[32];
+ struct nf_conn *ct;
+};
+
+typedef u64 (*btf_bpf_tcp_send_ack)(struct tcp_sock *, u32);
+
+enum show_regs_mode {
+ SHOW_REGS_SHORT = 0,
+ SHOW_REGS_USER = 1,
+ SHOW_REGS_ALL = 2,
+};
+
+enum which_selector {
+ FS = 0,
+ GS = 1,
+};
+
+struct trace_event_raw_irq_handler_entry {
+ struct trace_entry ent;
+ int irq;
+ u32 __data_loc_name;
+ char __data[0];
+};
+
+struct trace_event_raw_irq_handler_exit {
+ struct trace_entry ent;
+ int irq;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_softirq {
+ struct trace_entry ent;
+ unsigned int vec;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_irq_handler_entry {
+ u32 name;
+};
+
+struct trace_event_data_offsets_irq_handler_exit {};
+
+struct trace_event_data_offsets_softirq {};
+
+typedef void (*btf_trace_irq_handler_entry)(void *, int, struct irqaction *);
+
+typedef void (*btf_trace_irq_handler_exit)(void *, int, struct irqaction *, int);
+
+typedef void (*btf_trace_softirq_entry)(void *, unsigned int);
+
+typedef void (*btf_trace_softirq_exit)(void *, unsigned int);
+
+typedef void (*btf_trace_softirq_raise)(void *, unsigned int);
+
+struct tasklet_head {
+ struct tasklet_struct *head;
+ struct tasklet_struct **tail;
+};
+
+struct kernel_clone_args {
+ u64 flags;
+ int *pidfd;
+ int *child_tid;
+ int *parent_tid;
+ int exit_signal;
+ long unsigned int stack;
+ long unsigned int stack_size;
+ long unsigned int tls;
+ pid_t *set_tid;
+ size_t set_tid_size;
+ int cgroup;
+ int io_thread;
+ int kthread;
+ int idle;
+ int (*fn)(void *);
+ void *fn_arg;
+ struct cgroup *cgrp;
+ struct css_set *cset;
+};
+
+struct trace_event_raw_cgroup_root {
+ struct trace_entry ent;
+ int root;
+ u16 ss_mask;
+ u32 __data_loc_name;
+ char __data[0];
+};
+
+struct trace_event_raw_cgroup {
+ struct trace_entry ent;
+ int root;
+ int level;
+ u64 id;
+ u32 __data_loc_path;
+ char __data[0];
+};
+
+struct trace_event_raw_cgroup_migrate {
+ struct trace_entry ent;
+ int dst_root;
+ int dst_level;
+ u64 dst_id;
+ int pid;
+ u32 __data_loc_dst_path;
+ u32 __data_loc_comm;
+ char __data[0];
+};
+
+struct trace_event_raw_cgroup_event {
+ struct trace_entry ent;
+ int root;
+ int level;
+ u64 id;
+ u32 __data_loc_path;
+ int val;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_cgroup_root {
+ u32 name;
+};
+
+struct trace_event_data_offsets_cgroup {
+ u32 path;
+};
+
+struct trace_event_data_offsets_cgroup_migrate {
+ u32 dst_path;
+ u32 comm;
+};
+
+struct trace_event_data_offsets_cgroup_event {
+ u32 path;
+};
+
+typedef void (*btf_trace_cgroup_setup_root)(void *, struct cgroup_root *);
+
+typedef void (*btf_trace_cgroup_destroy_root)(void *, struct cgroup_root *);
+
+typedef void (*btf_trace_cgroup_remount)(void *, struct cgroup_root *);
+
+typedef void (*btf_trace_cgroup_mkdir)(void *, struct cgroup *, const char *);
+
+typedef void (*btf_trace_cgroup_rmdir)(void *, struct cgroup *, const char *);
+
+typedef void (*btf_trace_cgroup_release)(void *, struct cgroup *, const char *);
+
+typedef void (*btf_trace_cgroup_rename)(void *, struct cgroup *, const char *);
+
+typedef void (*btf_trace_cgroup_freeze)(void *, struct cgroup *, const char *);
+
+typedef void (*btf_trace_cgroup_unfreeze)(void *, struct cgroup *, const char *);
+
+typedef void (*btf_trace_cgroup_attach_task)(void *, struct cgroup *, const char *, struct task_struct *, bool);
+
+typedef void (*btf_trace_cgroup_transfer_tasks)(void *, struct cgroup *, const char *, struct task_struct *, bool);
+
+typedef void (*btf_trace_cgroup_notify_populated)(void *, struct cgroup *, const char *, int);
+
+typedef void (*btf_trace_cgroup_notify_frozen)(void *, struct cgroup *, const char *, int);
+
+enum cgroup_opt_features {
+ OPT_FEATURE_COUNT = 0,
+};
+
+enum cgroup2_param {
+ Opt_nsdelegate = 0,
+ Opt_favordynmods___2 = 1,
+ Opt_memory_localevents = 2,
+ Opt_memory_recursiveprot = 3,
+ nr__cgroup2_params = 4,
+};
+
+struct acpi_fadt_info {
+ const char *name;
+ u16 address64;
+ u16 address32;
+ u16 length;
+ u8 default_length;
+ u8 flags;
+};
+
+struct acpi_fadt_pm_info {
+ struct acpi_generic_address *target;
+ u16 source;
+ u8 register_num;
+};
+
+struct hsu_dma_slave {
+ struct device *dma_dev;
+ int chan_id;
+};
+
+struct hsu_dma;
+
+struct hsu_dma_chip {
+ struct device *dev;
+ int irq;
+ void *regs;
+ unsigned int length;
+ unsigned int offset;
+ struct hsu_dma *hsu;
+};
+
+struct mid8250;
+
+struct mid8250_board {
+ unsigned int flags;
+ long unsigned int freq;
+ unsigned int base_baud;
+ int (*setup)(struct mid8250 *, struct uart_port *);
+ void (*exit)(struct mid8250 *);
+};
+
+struct mid8250 {
+ int line;
+ int dma_index;
+ struct pci_dev *dma_dev;
+ struct uart_8250_dma dma;
+ struct mid8250_board *board;
+ struct hsu_dma_chip dma_chip;
+};
+
+typedef int (*pm_callback_t)(struct device *);
+
+struct pps_kinfo {
+ __u32 assert_sequence;
+ __u32 clear_sequence;
+ struct pps_ktime assert_tu;
+ struct pps_ktime clear_tu;
+ int current_mode;
+};
+
+struct pps_fdata {
+ struct pps_kinfo info;
+ struct pps_ktime timeout;
+};
+
+struct pps_bind_args {
+ int tsformat;
+ int edge;
+ int consumer;
+};
+
+struct igmphdr {
+ __u8 type;
+ __u8 code;
+ __sum16 csum;
+ __be32 group;
+};
+
+struct igmpv3_grec {
+ __u8 grec_type;
+ __u8 grec_auxwords;
+ __be16 grec_nsrcs;
+ __be32 grec_mca;
+ __be32 grec_src[0];
+};
+
+struct igmpv3_report {
+ __u8 type;
+ __u8 resv1;
+ __sum16 csum;
+ __be16 resv2;
+ __be16 ngrec;
+ struct igmpv3_grec grec[0];
+};
+
+struct igmpv3_query {
+ __u8 type;
+ __u8 code;
+ __sum16 csum;
+ __be32 group;
+ __u8 qrv: 3;
+ __u8 suppress: 1;
+ __u8 resv: 4;
+ __u8 qqic;
+ __be16 nsrcs;
+ __be32 srcs[0];
+};
+
+struct igmp_mc_iter_state {
+ struct seq_net_private p;
+ struct net_device *dev;
+ struct in_device *in_dev;
+};
+
+struct igmp_mcf_iter_state {
+ struct seq_net_private p;
+ struct net_device *dev;
+ struct in_device *idev;
+ struct ip_mc_list *im;
+};
+
+typedef struct sock * (*udp_lookup_t)(const struct sk_buff *, __be16, __be16);
+
+struct sockaddr_pkt {
+ short unsigned int spkt_family;
+ unsigned char spkt_device[14];
+ __be16 spkt_protocol;
+};
+
+struct sockaddr_ll {
+ short unsigned int sll_family;
+ __be16 sll_protocol;
+ int sll_ifindex;
+ short unsigned int sll_hatype;
+ unsigned char sll_pkttype;
+ unsigned char sll_halen;
+ unsigned char sll_addr[8];
+};
+
+struct tpacket_stats {
+ unsigned int tp_packets;
+ unsigned int tp_drops;
+};
+
+struct tpacket_stats_v3 {
+ unsigned int tp_packets;
+ unsigned int tp_drops;
+ unsigned int tp_freeze_q_cnt;
+};
+
+struct tpacket_rollover_stats {
+ __u64 tp_all;
+ __u64 tp_huge;
+ __u64 tp_failed;
+};
+
+union tpacket_stats_u {
+ struct tpacket_stats stats1;
+ struct tpacket_stats_v3 stats3;
+};
+
+struct tpacket_auxdata {
+ __u32 tp_status;
+ __u32 tp_len;
+ __u32 tp_snaplen;
+ __u16 tp_mac;
+ __u16 tp_net;
+ __u16 tp_vlan_tci;
+ __u16 tp_vlan_tpid;
+};
+
+struct tpacket_hdr {
+ long unsigned int tp_status;
+ unsigned int tp_len;
+ unsigned int tp_snaplen;
+ short unsigned int tp_mac;
+ short unsigned int tp_net;
+ unsigned int tp_sec;
+ unsigned int tp_usec;
+};
+
+struct tpacket2_hdr {
+ __u32 tp_status;
+ __u32 tp_len;
+ __u32 tp_snaplen;
+ __u16 tp_mac;
+ __u16 tp_net;
+ __u32 tp_sec;
+ __u32 tp_nsec;
+ __u16 tp_vlan_tci;
+ __u16 tp_vlan_tpid;
+ __u8 tp_padding[4];
+};
+
+struct tpacket_hdr_variant1 {
+ __u32 tp_rxhash;
+ __u32 tp_vlan_tci;
+ __u16 tp_vlan_tpid;
+ __u16 tp_padding;
+};
+
+struct tpacket3_hdr {
+ __u32 tp_next_offset;
+ __u32 tp_sec;
+ __u32 tp_nsec;
+ __u32 tp_snaplen;
+ __u32 tp_len;
+ __u32 tp_status;
+ __u16 tp_mac;
+ __u16 tp_net;
+ union {
+ struct tpacket_hdr_variant1 hv1;
+ };
+ __u8 tp_padding[8];
+};
+
+struct tpacket_bd_ts {
+ unsigned int ts_sec;
+ union {
+ unsigned int ts_usec;
+ unsigned int ts_nsec;
+ };
+};
+
+struct tpacket_hdr_v1 {
+ __u32 block_status;
+ __u32 num_pkts;
+ __u32 offset_to_first_pkt;
+ __u32 blk_len;
+ __u64 seq_num;
+ struct tpacket_bd_ts ts_first_pkt;
+ struct tpacket_bd_ts ts_last_pkt;
+};
+
+union tpacket_bd_header_u {
+ struct tpacket_hdr_v1 bh1;
+};
+
+struct tpacket_block_desc {
+ __u32 version;
+ __u32 offset_to_priv;
+ union tpacket_bd_header_u hdr;
+};
+
+enum tpacket_versions {
+ TPACKET_V1 = 0,
+ TPACKET_V2 = 1,
+ TPACKET_V3 = 2,
+};
+
+struct tpacket_req {
+ unsigned int tp_block_size;
+ unsigned int tp_block_nr;
+ unsigned int tp_frame_size;
+ unsigned int tp_frame_nr;
+};
+
+struct tpacket_req3 {
+ unsigned int tp_block_size;
+ unsigned int tp_block_nr;
+ unsigned int tp_frame_size;
+ unsigned int tp_frame_nr;
+ unsigned int tp_retire_blk_tov;
+ unsigned int tp_sizeof_priv;
+ unsigned int tp_feature_req_word;
+};
+
+union tpacket_req_u {
+ struct tpacket_req req;
+ struct tpacket_req3 req3;
+};
+
+struct fanout_args {
+ __u16 id;
+ __u16 type_flags;
+ __u32 max_num_members;
+};
+
+struct packet_mclist {
+ struct packet_mclist *next;
+ int ifindex;
+ int count;
+ short unsigned int type;
+ short unsigned int alen;
+ unsigned char addr[32];
+};
+
+struct pgv;
+
+struct tpacket_kbdq_core {
+ struct pgv *pkbdq;
+ unsigned int feature_req_word;
+ unsigned int hdrlen;
+ unsigned char reset_pending_on_curr_blk;
+ unsigned char delete_blk_timer;
+ short unsigned int kactive_blk_num;
+ short unsigned int blk_sizeof_priv;
+ short unsigned int last_kactive_blk_num;
+ char *pkblk_start;
+ char *pkblk_end;
+ int kblk_size;
+ unsigned int max_frame_len;
+ unsigned int knum_blocks;
+ uint64_t knxt_seq_num;
+ char *prev;
+ char *nxt_offset;
+ struct sk_buff *skb;
+ rwlock_t blk_fill_in_prog_lock;
+ short unsigned int retire_blk_tov;
+ short unsigned int version;
+ long unsigned int tov_in_jiffies;
+ struct timer_list retire_blk_timer;
+};
+
+struct pgv {
+ char *buffer;
+};
+
+struct packet_ring_buffer {
+ struct pgv *pg_vec;
+ unsigned int head;
+ unsigned int frames_per_block;
+ unsigned int frame_size;
+ unsigned int frame_max;
+ unsigned int pg_vec_order;
+ unsigned int pg_vec_pages;
+ unsigned int pg_vec_len;
+ unsigned int *pending_refcnt;
+ union {
+ long unsigned int *rx_owner_map;
+ struct tpacket_kbdq_core prb_bdqc;
+ };
+};
+
+struct packet_fanout {
+ possible_net_t net;
+ unsigned int num_members;
+ u32 max_num_members;
+ u16 id;
+ u8 type;
+ u8 flags;
+ union {
+ atomic_t rr_cur;
+ struct bpf_prog *bpf_prog;
+ };
+ struct list_head list;
+ spinlock_t lock;
+ refcount_t sk_ref;
+ long: 32;
+ long: 64;
+ struct packet_type prot_hook;
+ struct sock *arr[0];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct packet_rollover {
+ int sock;
+ atomic_long_t num;
+ atomic_long_t num_huge;
+ atomic_long_t num_failed;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ u32 history[16];
+};
+
+struct packet_sock {
+ struct sock sk;
+ struct packet_fanout *fanout;
+ union tpacket_stats_u stats;
+ struct packet_ring_buffer rx_ring;
+ struct packet_ring_buffer tx_ring;
+ int copy_thresh;
+ spinlock_t bind_lock;
+ struct mutex pg_vec_lock;
+ unsigned int running;
+ unsigned int auxdata: 1;
+ unsigned int origdev: 1;
+ unsigned int has_vnet_hdr: 1;
+ unsigned int tp_loss: 1;
+ unsigned int tp_tx_has_off: 1;
+ int pressure;
+ int ifindex;
+ __be16 num;
+ struct packet_rollover *rollover;
+ struct packet_mclist *mclist;
+ atomic_t mapped;
+ enum tpacket_versions tp_version;
+ unsigned int tp_hdrlen;
+ unsigned int tp_reserve;
+ unsigned int tp_tstamp;
+ struct completion skb_completion;
+ struct net_device *cached_dev;
+ int (*xmit)(struct sk_buff *);
+ long: 64;
+ long: 64;
+ long: 64;
+ struct packet_type prot_hook;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ atomic_t tp_drops;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct packet_mreq_max {
+ int mr_ifindex;
+ short unsigned int mr_type;
+ short unsigned int mr_alen;
+ unsigned char mr_address[32];
+};
+
+union tpacket_uhdr {
+ struct tpacket_hdr *h1;
+ struct tpacket2_hdr *h2;
+ struct tpacket3_hdr *h3;
+ void *raw;
+};
+
+struct packet_skb_cb {
+ union {
+ struct sockaddr_pkt pkt;
+ union {
+ unsigned int origlen;
+ struct sockaddr_ll ll;
+ };
+ } sa;
+};
+
+struct sigcontext_64 {
+ __u64 r8;
+ __u64 r9;
+ __u64 r10;
+ __u64 r11;
+ __u64 r12;
+ __u64 r13;
+ __u64 r14;
+ __u64 r15;
+ __u64 di;
+ __u64 si;
+ __u64 bp;
+ __u64 bx;
+ __u64 dx;
+ __u64 ax;
+ __u64 cx;
+ __u64 sp;
+ __u64 ip;
+ __u64 flags;
+ __u16 cs;
+ __u16 gs;
+ __u16 fs;
+ __u16 ss;
+ __u64 err;
+ __u64 trapno;
+ __u64 oldmask;
+ __u64 cr2;
+ __u64 fpstate;
+ __u64 reserved1[8];
+};
+
+typedef sigset_t compat_sigset_t;
+
+struct ucontext {
+ long unsigned int uc_flags;
+ struct ucontext *uc_link;
+ stack_t uc_stack;
+ struct sigcontext_64 uc_mcontext;
+ sigset_t uc_sigmask;
+};
+
+struct kernel_vm86_regs {
+ struct pt_regs pt;
+ short unsigned int es;
+ short unsigned int __esh;
+ short unsigned int ds;
+ short unsigned int __dsh;
+ short unsigned int fs;
+ short unsigned int __fsh;
+ short unsigned int gs;
+ short unsigned int __gsh;
+};
+
+struct rt_sigframe {
+ char *pretcode;
+ struct ucontext uc;
+ struct siginfo info;
+};
+
+struct async_entry {
+ struct list_head domain_list;
+ struct list_head global_list;
+ struct work_struct work;
+ async_cookie_t cookie;
+ async_func_t func;
+ void *data;
+ struct async_domain *domain;
+};
+
+struct cma {
+ long unsigned int base_pfn;
+ long unsigned int count;
+ long unsigned int *bitmap;
+ unsigned int order_per_bit;
+ spinlock_t lock;
+ char name[64];
+ bool reserve_pages_on_error;
+};
+
+struct root_domain;
+
+struct fmeter {
+ int cnt;
+ int val;
+ time64_t time;
+ spinlock_t lock;
+};
+
+enum prs_errcode {
+ PERR_NONE = 0,
+ PERR_INVCPUS = 1,
+ PERR_INVPARENT = 2,
+ PERR_NOTPART = 3,
+ PERR_NOTEXCL = 4,
+ PERR_NOCPUS = 5,
+ PERR_HOTPLUG = 6,
+ PERR_CPUSEMPTY = 7,
+};
+
+struct cpuset {
+ struct cgroup_subsys_state css;
+ long unsigned int flags;
+ cpumask_var_t cpus_allowed;
+ nodemask_t mems_allowed;
+ cpumask_var_t effective_cpus;
+ nodemask_t effective_mems;
+ cpumask_var_t subparts_cpus;
+ nodemask_t old_mems_allowed;
+ struct fmeter fmeter;
+ int attach_in_progress;
+ int pn;
+ int relax_domain_level;
+ int nr_subparts_cpus;
+ int partition_root_state;
+ int use_parent_ecpus;
+ int child_ecpus_count;
+ enum prs_errcode prs_err;
+ struct cgroup_file partition_file;
+};
+
+struct tmpmasks {
+ cpumask_var_t addmask;
+ cpumask_var_t delmask;
+ cpumask_var_t new_cpus;
+};
+
+typedef enum {
+ CS_ONLINE = 0,
+ CS_CPU_EXCLUSIVE = 1,
+ CS_MEM_EXCLUSIVE = 2,
+ CS_MEM_HARDWALL = 3,
+ CS_MEMORY_MIGRATE = 4,
+ CS_SCHED_LOAD_BALANCE = 5,
+ CS_SPREAD_PAGE = 6,
+ CS_SPREAD_SLAB = 7,
+} cpuset_flagbits_t;
+
+enum subparts_cmd {
+ partcmd_enable = 0,
+ partcmd_disable = 1,
+ partcmd_update = 2,
+ partcmd_invalidate = 3,
+};
+
+struct cpuset_migrate_mm_work {
+ struct work_struct work;
+ struct mm_struct *mm;
+ nodemask_t from;
+ nodemask_t to;
+};
+
+typedef enum {
+ FILE_MEMORY_MIGRATE = 0,
+ FILE_CPULIST = 1,
+ FILE_MEMLIST = 2,
+ FILE_EFFECTIVE_CPULIST = 3,
+ FILE_EFFECTIVE_MEMLIST = 4,
+ FILE_SUBPARTS_CPULIST = 5,
+ FILE_CPU_EXCLUSIVE = 6,
+ FILE_MEM_EXCLUSIVE = 7,
+ FILE_MEM_HARDWALL = 8,
+ FILE_SCHED_LOAD_BALANCE = 9,
+ FILE_PARTITION_ROOT = 10,
+ FILE_SCHED_RELAX_DOMAIN_LEVEL = 11,
+ FILE_MEMORY_PRESSURE_ENABLED = 12,
+ FILE_MEMORY_PRESSURE = 13,
+ FILE_SPREAD_PAGE = 14,
+ FILE_SPREAD_SLAB = 15,
+} cpuset_filetype_t;
+
+struct nodemask_scratch {
+ nodemask_t mask1;
+ nodemask_t mask2;
+};
+
+struct sp_node {
+ struct rb_node nd;
+ long unsigned int start;
+ long unsigned int end;
+ struct mempolicy *policy;
+};
+
+struct mempolicy_operations {
+ int (*create)(struct mempolicy *, const nodemask_t *);
+ void (*rebind)(struct mempolicy *, const nodemask_t *);
+};
+
+struct queue_pages {
+ struct list_head *pagelist;
+ long unsigned int flags;
+ nodemask_t *nmask;
+ long unsigned int start;
+ long unsigned int end;
+ struct vm_area_struct *first;
+};
+
+struct assoc_array_edit;
+
+enum blake2b_lengths {
+ BLAKE2B_BLOCK_SIZE = 128,
+ BLAKE2B_HASH_SIZE = 64,
+ BLAKE2B_KEY_SIZE = 64,
+ BLAKE2B_160_HASH_SIZE = 20,
+ BLAKE2B_256_HASH_SIZE = 32,
+ BLAKE2B_384_HASH_SIZE = 48,
+ BLAKE2B_512_HASH_SIZE = 64,
+};
+
+struct blake2b_state {
+ u64 h[8];
+ u64 t[2];
+ u64 f[2];
+ u8 buf[128];
+ unsigned int buflen;
+ unsigned int outlen;
+};
+
+enum blake2b_iv {
+ BLAKE2B_IV0 = 7640891576956012808ULL,
+ BLAKE2B_IV1 = 13503953896175478587ULL,
+ BLAKE2B_IV2 = 4354685564936845355ULL,
+ BLAKE2B_IV3 = 11912009170470909681ULL,
+ BLAKE2B_IV4 = 5840696475078001361ULL,
+ BLAKE2B_IV5 = 11170449401992604703ULL,
+ BLAKE2B_IV6 = 2270897969802886507ULL,
+ BLAKE2B_IV7 = 6620516959819538809ULL,
+};
+
+typedef void (*blake2b_compress_t)(struct blake2b_state *, const u8 *, size_t, u32);
+
+struct blake2b_tfm_ctx {
+ u8 key[64];
+ unsigned int keylen;
+};
+
+struct sg_io_v4 {
+ __s32 guard;
+ __u32 protocol;
+ __u32 subprotocol;
+ __u32 request_len;
+ __u64 request;
+ __u64 request_tag;
+ __u32 request_attr;
+ __u32 request_priority;
+ __u32 request_extra;
+ __u32 max_response_len;
+ __u64 response;
+ __u32 dout_iovec_count;
+ __u32 dout_xfer_len;
+ __u32 din_iovec_count;
+ __u32 din_xfer_len;
+ __u64 dout_xferp;
+ __u64 din_xferp;
+ __u32 timeout;
+ __u32 flags;
+ __u64 usr_ptr;
+ __u32 spare_in;
+ __u32 driver_status;
+ __u32 transport_status;
+ __u32 device_status;
+ __u32 retry_delay;
+ __u32 info;
+ __u32 duration;
+ __u32 response_len;
+ __s32 din_resid;
+ __s32 dout_resid;
+ __u64 generated_tag;
+ __u32 spare_out;
+ __u32 padding;
+};
+
+typedef int bsg_sg_io_fn(struct request_queue *, struct sg_io_v4 *, fmode_t, unsigned int);
+
+struct bsg_device {
+ struct request_queue *queue;
+ struct device device;
+ struct cdev cdev;
+ int max_queue;
+ unsigned int timeout;
+ unsigned int reserved_size;
+ bsg_sg_io_fn *sg_io_fn;
+};
+
+union nested_table {
+ union nested_table *table;
+ struct rhash_lock_head *bucket;
+};
+
+enum gcry_mpi_constants {
+ MPI_C_ZERO = 0,
+ MPI_C_ONE = 1,
+ MPI_C_TWO = 2,
+ MPI_C_THREE = 3,
+ MPI_C_FOUR = 4,
+ MPI_C_EIGHT = 5,
+};
+
+struct barrett_ctx_s;
+
+typedef struct barrett_ctx_s *mpi_barrett_t___2;
+
+struct gcry_mpi_point {
+ MPI x;
+ MPI y;
+ MPI z;
+};
+
+typedef struct gcry_mpi_point *MPI_POINT;
+
+enum gcry_mpi_ec_models {
+ MPI_EC_WEIERSTRASS = 0,
+ MPI_EC_MONTGOMERY = 1,
+ MPI_EC_EDWARDS = 2,
+};
+
+enum ecc_dialects {
+ ECC_DIALECT_STANDARD = 0,
+ ECC_DIALECT_ED25519 = 1,
+ ECC_DIALECT_SAFECURVE = 2,
+};
+
+struct mpi_ec_ctx {
+ enum gcry_mpi_ec_models model;
+ enum ecc_dialects dialect;
+ int flags;
+ unsigned int nbits;
+ MPI p;
+ MPI a;
+ MPI b;
+ MPI_POINT G;
+ MPI n;
+ unsigned int h;
+ MPI_POINT Q;
+ MPI d;
+ const char *name;
+ struct {
+ struct {
+ unsigned int a_is_pminus3: 1;
+ unsigned int two_inv_p: 1;
+ } valid;
+ int a_is_pminus3;
+ MPI two_inv_p;
+ mpi_barrett_t___2 p_barrett;
+ MPI scratch[11];
+ } t;
+ void (*addm)(MPI, MPI, MPI, struct mpi_ec_ctx *);
+ void (*subm)(MPI, MPI, MPI, struct mpi_ec_ctx *);
+ void (*mulm)(MPI, MPI, MPI, struct mpi_ec_ctx *);
+ void (*pow2)(MPI, const MPI, struct mpi_ec_ctx *);
+ void (*mul2)(MPI, MPI, struct mpi_ec_ctx *);
+};
+
+struct field_table {
+ const char *p;
+ void (*addm)(MPI, MPI, MPI, struct mpi_ec_ctx *);
+ void (*subm)(MPI, MPI, MPI, struct mpi_ec_ctx *);
+ void (*mulm)(MPI, MPI, MPI, struct mpi_ec_ctx *);
+ void (*mul2)(MPI, MPI, struct mpi_ec_ctx *);
+ void (*pow2)(MPI, const MPI, struct mpi_ec_ctx *);
+};
+
+struct regulator;
+
+struct phy_configure_opts_dp {
+ unsigned int link_rate;
+ unsigned int lanes;
+ unsigned int voltage[4];
+ unsigned int pre[4];
+ u8 ssc: 1;
+ u8 set_rate: 1;
+ u8 set_lanes: 1;
+ u8 set_voltages: 1;
+};
+
+struct phy_configure_opts_lvds {
+ unsigned int bits_per_lane_and_dclk_cycle;
+ long unsigned int differential_clk_rate;
+ unsigned int lanes;
+ bool is_slave;
+};
+
+struct phy_configure_opts_mipi_dphy {
+ unsigned int clk_miss;
+ unsigned int clk_post;
+ unsigned int clk_pre;
+ unsigned int clk_prepare;
+ unsigned int clk_settle;
+ unsigned int clk_term_en;
+ unsigned int clk_trail;
+ unsigned int clk_zero;
+ unsigned int d_term_en;
+ unsigned int eot;
+ unsigned int hs_exit;
+ unsigned int hs_prepare;
+ unsigned int hs_settle;
+ unsigned int hs_skip;
+ unsigned int hs_trail;
+ unsigned int hs_zero;
+ unsigned int init;
+ unsigned int lpx;
+ unsigned int ta_get;
+ unsigned int ta_go;
+ unsigned int ta_sure;
+ unsigned int wakeup;
+ long unsigned int hs_clk_rate;
+ long unsigned int lp_clk_rate;
+ unsigned char lanes;
+};
+
+enum phy_mode {
+ PHY_MODE_INVALID = 0,
+ PHY_MODE_USB_HOST = 1,
+ PHY_MODE_USB_HOST_LS = 2,
+ PHY_MODE_USB_HOST_FS = 3,
+ PHY_MODE_USB_HOST_HS = 4,
+ PHY_MODE_USB_HOST_SS = 5,
+ PHY_MODE_USB_DEVICE = 6,
+ PHY_MODE_USB_DEVICE_LS = 7,
+ PHY_MODE_USB_DEVICE_FS = 8,
+ PHY_MODE_USB_DEVICE_HS = 9,
+ PHY_MODE_USB_DEVICE_SS = 10,
+ PHY_MODE_USB_OTG = 11,
+ PHY_MODE_UFS_HS_A = 12,
+ PHY_MODE_UFS_HS_B = 13,
+ PHY_MODE_PCIE = 14,
+ PHY_MODE_ETHERNET = 15,
+ PHY_MODE_MIPI_DPHY = 16,
+ PHY_MODE_SATA = 17,
+ PHY_MODE_LVDS = 18,
+ PHY_MODE_DP = 19,
+};
+
+enum phy_media {
+ PHY_MEDIA_DEFAULT = 0,
+ PHY_MEDIA_SR = 1,
+ PHY_MEDIA_DAC = 2,
+};
+
+union phy_configure_opts {
+ struct phy_configure_opts_mipi_dphy mipi_dphy;
+ struct phy_configure_opts_dp dp;
+ struct phy_configure_opts_lvds lvds;
+};
+
+struct phy;
+
+struct phy_ops {
+ int (*init)(struct phy *);
+ int (*exit)(struct phy *);
+ int (*power_on)(struct phy *);
+ int (*power_off)(struct phy *);
+ int (*set_mode)(struct phy *, enum phy_mode, int);
+ int (*set_media)(struct phy *, enum phy_media);
+ int (*set_speed)(struct phy *, int);
+ int (*configure)(struct phy *, union phy_configure_opts *);
+ int (*validate)(struct phy *, enum phy_mode, int, union phy_configure_opts *);
+ int (*reset)(struct phy *);
+ int (*calibrate)(struct phy *);
+ void (*release)(struct phy *);
+ struct module *owner;
+};
+
+struct phy_attrs {
+ u32 bus_width;
+ u32 max_link_rate;
+ enum phy_mode mode;
+};
+
+struct phy {
+ struct device dev;
+ int id;
+ const struct phy_ops *ops;
+ struct mutex mutex;
+ int init_count;
+ int power_count;
+ struct phy_attrs attrs;
+ struct regulator *pwr;
+};
+
+struct phy_provider {
+ struct device *dev;
+ struct device_node *children;
+ struct module *owner;
+ struct list_head list;
+ struct phy * (*of_xlate)(struct device *, struct of_phandle_args *);
+};
+
+struct phy_lookup {
+ struct list_head node;
+ const char *dev_id;
+ const char *con_id;
+ struct phy *phy;
+};
+
+enum pci_irq_reroute_variant {
+ INTEL_IRQ_REROUTE_VARIANT = 1,
+ MAX_IRQ_REROUTE_VARIANTS = 3,
+};
+
+struct acpi_pci_routing_table {
+ u32 length;
+ u32 pin;
+ u64 address;
+ u32 source_index;
+ char source[4];
+};
+
+struct acpi_prt_entry {
+ struct acpi_pci_id id;
+ u8 pin;
+ acpi_handle link;
+ u32 index;
+};
+
+struct prt_quirk {
+ const struct dmi_system_id *system;
+ unsigned int segment;
+ unsigned int bus;
+ unsigned int device;
+ unsigned char pin;
+ const char *source;
+ const char *actual_source;
+};
+
+struct ipq {
+ struct inet_frag_queue q;
+ u8 ecn;
+ u16 max_df_size;
+ int iif;
+ unsigned int rid;
+ struct inet_peer *peer;
+};
+
+enum {
+ MPTCP_SUBFLOW_ATTR_UNSPEC = 0,
+ MPTCP_SUBFLOW_ATTR_TOKEN_REM = 1,
+ MPTCP_SUBFLOW_ATTR_TOKEN_LOC = 2,
+ MPTCP_SUBFLOW_ATTR_RELWRITE_SEQ = 3,
+ MPTCP_SUBFLOW_ATTR_MAP_SEQ = 4,
+ MPTCP_SUBFLOW_ATTR_MAP_SFSEQ = 5,
+ MPTCP_SUBFLOW_ATTR_SSN_OFFSET = 6,
+ MPTCP_SUBFLOW_ATTR_MAP_DATALEN = 7,
+ MPTCP_SUBFLOW_ATTR_FLAGS = 8,
+ MPTCP_SUBFLOW_ATTR_ID_REM = 9,
+ MPTCP_SUBFLOW_ATTR_ID_LOC = 10,
+ MPTCP_SUBFLOW_ATTR_PAD = 11,
+ __MPTCP_SUBFLOW_ATTR_MAX = 12,
+};
+
+enum kernel_gp_hint {
+ GP_NO_HINT = 0,
+ GP_NON_CANONICAL = 1,
+ GP_CANONICAL = 2,
+};
+
+enum cpuhp_smt_control {
+ CPU_SMT_ENABLED = 0,
+ CPU_SMT_DISABLED = 1,
+ CPU_SMT_FORCE_DISABLED = 2,
+ CPU_SMT_NOT_SUPPORTED = 3,
+ CPU_SMT_NOT_IMPLEMENTED = 4,
+};
+
+struct trace_event_raw_cpuhp_enter {
+ struct trace_entry ent;
+ unsigned int cpu;
+ int target;
+ int idx;
+ void *fun;
+ char __data[0];
+};
+
+struct trace_event_raw_cpuhp_multi_enter {
+ struct trace_entry ent;
+ unsigned int cpu;
+ int target;
+ int idx;
+ void *fun;
+ char __data[0];
+};
+
+struct trace_event_raw_cpuhp_exit {
+ struct trace_entry ent;
+ unsigned int cpu;
+ int state;
+ int idx;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_cpuhp_enter {};
+
+struct trace_event_data_offsets_cpuhp_multi_enter {};
+
+struct trace_event_data_offsets_cpuhp_exit {};
+
+typedef void (*btf_trace_cpuhp_enter)(void *, unsigned int, int, int, int (*)(unsigned int));
+
+typedef void (*btf_trace_cpuhp_multi_enter)(void *, unsigned int, int, int, int (*)(unsigned int, struct hlist_node *), struct hlist_node *);
+
+typedef void (*btf_trace_cpuhp_exit)(void *, unsigned int, int, int, int);
+
+struct cpuhp_cpu_state {
+ enum cpuhp_state state;
+ enum cpuhp_state target;
+ enum cpuhp_state fail;
+ struct task_struct *thread;
+ bool should_run;
+ bool rollback;
+ bool single;
+ bool bringup;
+ struct hlist_node *node;
+ struct hlist_node *last;
+ enum cpuhp_state cb_state;
+ int result;
+ struct completion done_up;
+ struct completion done_down;
+};
+
+struct cpuhp_step {
+ const char *name;
+ union {
+ int (*single)(unsigned int);
+ int (*multi)(unsigned int, struct hlist_node *);
+ } startup;
+ union {
+ int (*single)(unsigned int);
+ int (*multi)(unsigned int, struct hlist_node *);
+ } teardown;
+ struct hlist_head list;
+ bool cant_stop;
+ bool multi_instance;
+};
+
+enum cpu_mitigations {
+ CPU_MITIGATIONS_OFF = 0,
+ CPU_MITIGATIONS_AUTO = 1,
+ CPU_MITIGATIONS_AUTO_NOSMT = 2,
+};
+
+struct fprobe {
+ struct ftrace_ops ops;
+ long unsigned int nmissed;
+ unsigned int flags;
+ struct rethook *rethook;
+ void (*entry_handler)(struct fprobe *, long unsigned int, struct pt_regs *);
+ void (*exit_handler)(struct fprobe *, long unsigned int, struct pt_regs *);
+};
+
+struct fprobe_rethook_node {
+ struct rethook_node node;
+ long unsigned int entry_ip;
+};
+
+enum bpf_core_relo_kind {
+ BPF_CORE_FIELD_BYTE_OFFSET = 0,
+ BPF_CORE_FIELD_BYTE_SIZE = 1,
+ BPF_CORE_FIELD_EXISTS = 2,
+ BPF_CORE_FIELD_SIGNED = 3,
+ BPF_CORE_FIELD_LSHIFT_U64 = 4,
+ BPF_CORE_FIELD_RSHIFT_U64 = 5,
+ BPF_CORE_TYPE_ID_LOCAL = 6,
+ BPF_CORE_TYPE_ID_TARGET = 7,
+ BPF_CORE_TYPE_EXISTS = 8,
+ BPF_CORE_TYPE_SIZE = 9,
+ BPF_CORE_ENUMVAL_EXISTS = 10,
+ BPF_CORE_ENUMVAL_VALUE = 11,
+ BPF_CORE_TYPE_MATCHES = 12,
+};
+
+struct bpf_core_relo {
+ __u32 insn_off;
+ __u32 type_id;
+ __u32 access_str_off;
+ enum bpf_core_relo_kind kind;
+};
+
+struct btf_enum {
+ __u32 name_off;
+ __s32 val;
+};
+
+struct btf_array {
+ __u32 type;
+ __u32 index_type;
+ __u32 nelems;
+};
+
+struct btf_param {
+ __u32 name_off;
+ __u32 type;
+};
+
+struct btf_enum64 {
+ __u32 name_off;
+ __u32 val_lo32;
+ __u32 val_hi32;
+};
+
+struct bpf_core_cand {
+ const struct btf *btf;
+ __u32 id;
+};
+
+struct bpf_core_cand_list {
+ struct bpf_core_cand *cands;
+ int len;
+};
+
+struct bpf_core_accessor {
+ __u32 type_id;
+ __u32 idx;
+ const char *name;
+};
+
+struct bpf_core_spec {
+ const struct btf *btf;
+ struct bpf_core_accessor spec[64];
+ __u32 root_type_id;
+ enum bpf_core_relo_kind relo_kind;
+ int len;
+ int raw_spec[64];
+ int raw_len;
+ __u32 bit_offset;
+};
+
+struct bpf_core_relo_res {
+ __u64 orig_val;
+ __u64 new_val;
+ bool poison;
+ bool validate;
+ bool fail_memsz_adjust;
+ __u32 orig_sz;
+ __u32 orig_type_id;
+ __u32 new_sz;
+ __u32 new_type_id;
+};
+
+struct follow_page_context {
+ struct dev_pagemap *pgmap;
+ unsigned int page_mask;
+};
+
+struct trace_event_raw_cma_alloc_class {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ long unsigned int pfn;
+ const struct page *page;
+ long unsigned int count;
+ unsigned int align;
+ char __data[0];
+};
+
+struct trace_event_raw_cma_release {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ long unsigned int pfn;
+ const struct page *page;
+ long unsigned int count;
+ char __data[0];
+};
+
+struct trace_event_raw_cma_alloc_start {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ long unsigned int count;
+ unsigned int align;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_cma_alloc_class {
+ u32 name;
+};
+
+struct trace_event_data_offsets_cma_release {
+ u32 name;
+};
+
+struct trace_event_data_offsets_cma_alloc_start {
+ u32 name;
+};
+
+typedef void (*btf_trace_cma_release)(void *, const char *, long unsigned int, const struct page *, long unsigned int);
+
+typedef void (*btf_trace_cma_alloc_start)(void *, const char *, long unsigned int, unsigned int);
+
+typedef void (*btf_trace_cma_alloc_finish)(void *, const char *, long unsigned int, const struct page *, long unsigned int, unsigned int);
+
+typedef void (*btf_trace_cma_alloc_busy_retry)(void *, const char *, long unsigned int, const struct page *, long unsigned int, unsigned int);
+
+struct getdents_callback___2 {
+ struct dir_context ctx;
+ char *name;
+ u64 ino;
+ int found;
+ int sequence;
+};
+
+struct msix_entry {
+ u32 vector;
+ u16 entry;
+};
+
+struct acpi_power_dependent_device {
+ struct device *dev;
+ struct list_head node;
+};
+
+struct acpi_power_resource {
+ struct acpi_device device;
+ struct list_head list_node;
+ u32 system_level;
+ u32 order;
+ unsigned int ref_count;
+ u8 state;
+ struct mutex resource_lock;
+ struct list_head dependents;
+};
+
+struct acpi_power_resource_entry {
+ struct list_head node;
+ struct acpi_power_resource *resource;
+};
+
+struct n_tty_data {
+ size_t read_head;
+ size_t commit_head;
+ size_t canon_head;
+ size_t echo_head;
+ size_t echo_commit;
+ size_t echo_mark;
+ long unsigned int char_map[4];
+ long unsigned int overrun_time;
+ int num_overrun;
+ bool no_room;
+ unsigned char lnext: 1;
+ unsigned char erasing: 1;
+ unsigned char raw: 1;
+ unsigned char real_raw: 1;
+ unsigned char icanon: 1;
+ unsigned char push: 1;
+ char read_buf[4096];
+ long unsigned int read_flags[64];
+ unsigned char echo_buf[4096];
+ size_t read_tail;
+ size_t line_start;
+ size_t lookahead_count;
+ unsigned int column;
+ unsigned int canon_column;
+ size_t echo_tail;
+ struct mutex atomic_read_lock;
+ struct mutex output_lock;
+};
+
+enum {
+ ERASE = 0,
+ WERASE = 1,
+ KILL = 2,
+};
+
+struct hid_debug_list {
+ struct {
+ union {
+ struct __kfifo kfifo;
+ char *type;
+ const char *const_type;
+ char (*rectype)[0];
+ char *ptr;
+ const char *ptr_const;
+ };
+ char buf[0];
+ } hid_debug_fifo;
+ struct fasync_struct *fasync;
+ struct hid_device *hdev;
+ struct list_head node;
+ struct mutex read_mutex;
+};
+
+struct hid_usage_entry {
+ unsigned int page;
+ unsigned int usage;
+ const char *description;
+};
+
+struct ethtool_value {
+ __u32 cmd;
+ __u32 data;
+};
+
+enum tunable_type_id {
+ ETHTOOL_TUNABLE_UNSPEC = 0,
+ ETHTOOL_TUNABLE_U8 = 1,
+ ETHTOOL_TUNABLE_U16 = 2,
+ ETHTOOL_TUNABLE_U32 = 3,
+ ETHTOOL_TUNABLE_U64 = 4,
+ ETHTOOL_TUNABLE_STRING = 5,
+ ETHTOOL_TUNABLE_S8 = 6,
+ ETHTOOL_TUNABLE_S16 = 7,
+ ETHTOOL_TUNABLE_S32 = 8,
+ ETHTOOL_TUNABLE_S64 = 9,
+};
+
+struct ethtool_gstrings {
+ __u32 cmd;
+ __u32 string_set;
+ __u32 len;
+ __u8 data[0];
+};
+
+struct ethtool_sset_info {
+ __u32 cmd;
+ __u32 reserved;
+ __u64 sset_mask;
+ __u32 data[0];
+};
+
+struct ethtool_perm_addr {
+ __u32 cmd;
+ __u32 size;
+ __u8 data[0];
+};
+
+enum ethtool_flags {
+ ETH_FLAG_TXVLAN = 128,
+ ETH_FLAG_RXVLAN = 256,
+ ETH_FLAG_LRO = 32768,
+ ETH_FLAG_NTUPLE = 134217728,
+ ETH_FLAG_RXHASH = 268435456,
+};
+
+struct ethtool_rxfh {
+ __u32 cmd;
+ __u32 rss_context;
+ __u32 indir_size;
+ __u32 key_size;
+ __u8 hfunc;
+ __u8 rsvd8[3];
+ __u32 rsvd32;
+ __u32 rss_config[0];
+};
+
+struct ethtool_get_features_block {
+ __u32 available;
+ __u32 requested;
+ __u32 active;
+ __u32 never_changed;
+};
+
+struct ethtool_gfeatures {
+ __u32 cmd;
+ __u32 size;
+ struct ethtool_get_features_block features[0];
+};
+
+struct ethtool_set_features_block {
+ __u32 valid;
+ __u32 requested;
+};
+
+struct ethtool_sfeatures {
+ __u32 cmd;
+ __u32 size;
+ struct ethtool_set_features_block features[0];
+};
+
+enum ethtool_sfeatures_retval_bits {
+ ETHTOOL_F_UNSUPPORTED__BIT = 0,
+ ETHTOOL_F_WISH__BIT = 1,
+ ETHTOOL_F_COMPAT__BIT = 2,
+};
+
+struct ethtool_per_queue_op {
+ __u32 cmd;
+ __u32 sub_command;
+ __u32 queue_mask[128];
+ char data[0];
+};
+
+struct ethtool_rx_flow_rule {
+ struct flow_rule *rule;
+ long unsigned int priv[0];
+};
+
+struct ethtool_rx_flow_spec_input {
+ const struct ethtool_rx_flow_spec *fs;
+ u32 rss_ctx;
+};
+
+struct ethtool_devlink_compat {
+ struct devlink *devlink;
+ union {
+ struct ethtool_flash efl;
+ struct ethtool_drvinfo info;
+ };
+};
+
+struct ethtool_link_usettings {
+ struct ethtool_link_settings base;
+ struct {
+ __u32 supported[4];
+ __u32 advertising[4];
+ __u32 lp_advertising[4];
+ } link_modes;
+};
+
+struct ethtool_rx_flow_key {
+ struct flow_dissector_key_basic basic;
+ union {
+ struct flow_dissector_key_ipv4_addrs ipv4;
+ struct flow_dissector_key_ipv6_addrs ipv6;
+ };
+ struct flow_dissector_key_ports tp;
+ struct flow_dissector_key_ip ip;
+ struct flow_dissector_key_vlan vlan;
+ struct flow_dissector_key_eth_addrs eth_addrs;
+};
+
+struct ethtool_rx_flow_match {
+ struct flow_dissector dissector;
+ int: 32;
+ struct ethtool_rx_flow_key key;
+ struct ethtool_rx_flow_key mask;
+};
+
+enum {
+ XT_CONNMARK_SET = 0,
+ XT_CONNMARK_SAVE = 1,
+ XT_CONNMARK_RESTORE = 2,
+};
+
+enum {
+ D_SHIFT_LEFT = 0,
+ D_SHIFT_RIGHT = 1,
+};
+
+struct xt_connmark_tginfo1 {
+ __u32 ctmark;
+ __u32 ctmask;
+ __u32 nfmask;
+ __u8 mode;
+};
+
+struct xt_connmark_tginfo2 {
+ __u32 ctmark;
+ __u32 ctmask;
+ __u32 nfmask;
+ __u8 shift_dir;
+ __u8 shift_bits;
+ __u8 mode;
+};
+
+struct xt_connmark_mtinfo1 {
+ __u32 mark;
+ __u32 mask;
+ __u8 invert;
+};
+
+struct bictcp {
+ u32 cnt;
+ u32 last_max_cwnd;
+ u32 last_cwnd;
+ u32 last_time;
+ u32 bic_origin_point;
+ u32 bic_K;
+ u32 delay_min;
+ u32 epoch_start;
+ u32 ack_cnt;
+ u32 tcp_cwnd;
+ u16 unused;
+ u8 sample_cnt;
+ u8 found;
+ u32 round_start;
+ u32 end_seq;
+ u32 last_ack;
+ u32 curr_rtt;
+};
+
+enum {
+ GATE_INTERRUPT = 14,
+ GATE_TRAP = 15,
+ GATE_CALL = 12,
+ GATE_TASK = 5,
+};
+
+struct idt_data {
+ unsigned int vector;
+ unsigned int segment;
+ struct idt_bits bits;
+ const void *addr;
+};
+
+struct wakeup_header {
+ u16 video_mode;
+ u32 pmode_entry;
+ u16 pmode_cs;
+ u32 pmode_cr0;
+ u32 pmode_cr3;
+ u32 pmode_cr4;
+ u32 pmode_efer_low;
+ u32 pmode_efer_high;
+ u64 pmode_gdt;
+ u32 pmode_misc_en_low;
+ u32 pmode_misc_en_high;
+ u32 pmode_behavior;
+ u32 realmode_flags;
+ u32 real_magic;
+ u32 signature;
+} __attribute__((packed));
+
+struct audit_chunk;
+
+struct audit_tree {
+ refcount_t count;
+ int goner;
+ struct audit_chunk *root;
+ struct list_head chunks;
+ struct list_head rules;
+ struct list_head list;
+ struct list_head same_root;
+ struct callback_head head;
+ char pathname[0];
+};
+
+struct audit_node {
+ struct list_head list;
+ struct audit_tree *owner;
+ unsigned int index;
+};
+
+struct audit_chunk {
+ struct list_head hash;
+ long unsigned int key;
+ struct fsnotify_mark *mark;
+ struct list_head trees;
+ int count;
+ atomic_long_t refs;
+ struct callback_head head;
+ struct audit_node owners[0];
+};
+
+struct audit_tree_mark {
+ struct fsnotify_mark mark;
+ struct audit_chunk *chunk;
+};
+
+enum {
+ HASH_SIZE = 128,
+};
+
+struct vmap_area {
+ long unsigned int va_start;
+ long unsigned int va_end;
+ struct rb_node rb_node;
+ struct list_head list;
+ union {
+ long unsigned int subtree_max_size;
+ struct vm_struct *vm;
+ };
+};
+
+typedef unsigned int kasan_vmalloc_flags_t;
+
+struct vfree_deferred {
+ struct llist_head list;
+ struct work_struct wq;
+};
+
+enum fit_type {
+ NOTHING_FIT = 0,
+ FL_FIT_TYPE = 1,
+ LE_FIT_TYPE = 2,
+ RE_FIT_TYPE = 3,
+ NE_FIT_TYPE = 4,
+};
+
+struct vmap_block_queue {
+ spinlock_t lock;
+ struct list_head free;
+};
+
+struct vmap_block {
+ spinlock_t lock;
+ struct vmap_area *va;
+ long unsigned int free;
+ long unsigned int dirty;
+ long unsigned int dirty_min;
+ long unsigned int dirty_max;
+ struct list_head free_list;
+ struct callback_head callback_head;
+ struct list_head purge;
+};
+
+struct ext4_system_zone {
+ struct rb_node node;
+ ext4_fsblk_t start_blk;
+ unsigned int count;
+ u32 ino;
+};
+
+enum key_lookup_flag {
+ KEY_LOOKUP_CREATE = 1,
+ KEY_LOOKUP_PARTIAL = 2,
+ KEY_LOOKUP_ALL = 3,
+};
+
+struct keyctl_dh_params {
+ union {
+ __s32 private;
+ __s32 priv;
+ };
+ __s32 prime;
+ __s32 base;
+};
+
+struct keyctl_kdf_params {
+ char *hashname;
+ char *otherinfo;
+ __u32 otherinfolen;
+ __u32 __spare[8];
+};
+
+struct keyctl_pkey_query {
+ __u32 supported_ops;
+ __u32 key_size;
+ __u16 max_data_size;
+ __u16 max_sig_size;
+ __u16 max_enc_size;
+ __u16 max_dec_size;
+ __u32 __spare[10];
+};
+
+struct keyctl_pkey_params {
+ __s32 key_id;
+ __u32 in_len;
+ union {
+ __u32 out_len;
+ __u32 in2_len;
+ };
+ __u32 __spare[7];
+};
+
+struct request_key_auth {
+ struct callback_head rcu;
+ struct key *target_key;
+ struct key *dest_keyring;
+ const struct cred *cred;
+ void *callout_info;
+ size_t callout_len;
+ pid_t pid;
+ char op[8];
+};
+
+struct crypto_report_comp {
+ char type[64];
+};
+
+struct crypto_scomp {
+ struct crypto_tfm base;
+};
+
+struct scomp_alg {
+ void * (*alloc_ctx)(struct crypto_scomp *);
+ void (*free_ctx)(struct crypto_scomp *, void *);
+ int (*compress)(struct crypto_scomp *, const u8 *, unsigned int, u8 *, unsigned int *, void *);
+ int (*decompress)(struct crypto_scomp *, const u8 *, unsigned int, u8 *, unsigned int *, void *);
+ struct crypto_alg base;
+};
+
+struct scomp_scratch {
+ spinlock_t lock;
+ void *src;
+ void *dst;
+};
+
+struct d_partition {
+ __le32 p_size;
+ __le32 p_offset;
+ __le32 p_fsize;
+ u8 p_fstype;
+ u8 p_frag;
+ __le16 p_cpg;
+};
+
+struct disklabel {
+ __le32 d_magic;
+ __le16 d_type;
+ __le16 d_subtype;
+ u8 d_typename[16];
+ u8 d_packname[16];
+ __le32 d_secsize;
+ __le32 d_nsectors;
+ __le32 d_ntracks;
+ __le32 d_ncylinders;
+ __le32 d_secpercyl;
+ __le32 d_secprtunit;
+ __le16 d_sparespertrack;
+ __le16 d_sparespercyl;
+ __le32 d_acylinders;
+ __le16 d_rpm;
+ __le16 d_interleave;
+ __le16 d_trackskew;
+ __le16 d_cylskew;
+ __le32 d_headswitch;
+ __le32 d_trkseek;
+ __le32 d_flags;
+ __le32 d_drivedata[5];
+ __le32 d_spare[5];
+ __le32 d_magic2;
+ __le16 d_checksum;
+ __le16 d_npartitions;
+ __le32 d_bbsize;
+ __le32 d_sbsize;
+ struct d_partition d_partitions[18];
+};
+
+struct tcg_event_field {
+ u32 event_size;
+ u8 event[0];
+};
+
+struct tcg_pcr_event2_head {
+ u32 pcr_idx;
+ u32 event_type;
+ u32 count;
+ struct tpm_digest digests[0];
+};
+
+struct virtio_crypto_config {
+ __le32 status;
+ __le32 max_dataqueues;
+ __le32 crypto_services;
+ __le32 cipher_algo_l;
+ __le32 cipher_algo_h;
+ __le32 hash_algo;
+ __le32 mac_algo_l;
+ __le32 mac_algo_h;
+ __le32 aead_algo;
+ __le32 max_cipher_key_len;
+ __le32 max_auth_key_len;
+ __le32 akcipher_algo;
+ __le64 max_size;
+};
+
+enum {
+ CTRL_CMD_UNSPEC = 0,
+ CTRL_CMD_NEWFAMILY = 1,
+ CTRL_CMD_DELFAMILY = 2,
+ CTRL_CMD_GETFAMILY = 3,
+ CTRL_CMD_NEWOPS = 4,
+ CTRL_CMD_DELOPS = 5,
+ CTRL_CMD_GETOPS = 6,
+ CTRL_CMD_NEWMCAST_GRP = 7,
+ CTRL_CMD_DELMCAST_GRP = 8,
+ CTRL_CMD_GETMCAST_GRP = 9,
+ CTRL_CMD_GETPOLICY = 10,
+ __CTRL_CMD_MAX = 11,
+};
+
+enum {
+ CTRL_ATTR_UNSPEC = 0,
+ CTRL_ATTR_FAMILY_ID = 1,
+ CTRL_ATTR_FAMILY_NAME = 2,
+ CTRL_ATTR_VERSION = 3,
+ CTRL_ATTR_HDRSIZE = 4,
+ CTRL_ATTR_MAXATTR = 5,
+ CTRL_ATTR_OPS = 6,
+ CTRL_ATTR_MCAST_GROUPS = 7,
+ CTRL_ATTR_POLICY = 8,
+ CTRL_ATTR_OP_POLICY = 9,
+ CTRL_ATTR_OP = 10,
+ __CTRL_ATTR_MAX = 11,
+};
+
+enum {
+ CTRL_ATTR_OP_UNSPEC = 0,
+ CTRL_ATTR_OP_ID = 1,
+ CTRL_ATTR_OP_FLAGS = 2,
+ __CTRL_ATTR_OP_MAX = 3,
+};
+
+enum {
+ CTRL_ATTR_MCAST_GRP_UNSPEC = 0,
+ CTRL_ATTR_MCAST_GRP_NAME = 1,
+ CTRL_ATTR_MCAST_GRP_ID = 2,
+ __CTRL_ATTR_MCAST_GRP_MAX = 3,
+};
+
+enum {
+ CTRL_ATTR_POLICY_UNSPEC = 0,
+ CTRL_ATTR_POLICY_DO = 1,
+ CTRL_ATTR_POLICY_DUMP = 2,
+ __CTRL_ATTR_POLICY_DUMP_MAX = 3,
+ CTRL_ATTR_POLICY_DUMP_MAX = 2,
+};
+
+struct genl_op_iter {
+ const struct genl_family *family;
+ struct genl_split_ops doit;
+ struct genl_split_ops dumpit;
+ int cmd_idx;
+ int entry_idx;
+ u32 cmd;
+ u8 flags;
+};
+
+struct genl_start_context {
+ const struct genl_family *family;
+ struct nlmsghdr *nlh;
+ struct netlink_ext_ack *extack;
+ const struct genl_split_ops *ops;
+ int hdrlen;
+};
+
+struct netlink_policy_dump_state;
+
+struct ctrl_dump_policy_ctx {
+ struct netlink_policy_dump_state *state;
+ const struct genl_family *rt;
+ struct genl_op_iter *op_iter;
+ u32 op;
+ u16 fam_id;
+ u8 dump_map: 1;
+ u8 single_op: 1;
+};
+
+struct ip6_tnl_parm2 {
+ char name[16];
+ int link;
+ __u8 proto;
+ __u8 encap_limit;
+ __u8 hop_limit;
+ __be32 flowinfo;
+ __u32 flags;
+ struct in6_addr laddr;
+ struct in6_addr raddr;
+ __be16 i_flags;
+ __be16 o_flags;
+ __be32 i_key;
+ __be32 o_key;
+};
+
+struct ip6gre_net {
+ struct ip6_tnl *tunnels[128];
+ struct ip6_tnl *collect_md_tun;
+ struct ip6_tnl *collect_md_tun_erspan;
+ struct net_device *fb_tunnel_dev;
+};
+
+struct trace_event_raw_x86_irq_vector {
+ struct trace_entry ent;
+ int vector;
+ char __data[0];
+};
+
+struct trace_event_raw_vector_config {
+ struct trace_entry ent;
+ unsigned int irq;
+ unsigned int vector;
+ unsigned int cpu;
+ unsigned int apicdest;
+ char __data[0];
+};
+
+struct trace_event_raw_vector_mod {
+ struct trace_entry ent;
+ unsigned int irq;
+ unsigned int vector;
+ unsigned int cpu;
+ unsigned int prev_vector;
+ unsigned int prev_cpu;
+ char __data[0];
+};
+
+struct trace_event_raw_vector_reserve {
+ struct trace_entry ent;
+ unsigned int irq;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_vector_alloc {
+ struct trace_entry ent;
+ unsigned int irq;
+ unsigned int vector;
+ bool reserved;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_vector_alloc_managed {
+ struct trace_entry ent;
+ unsigned int irq;
+ unsigned int vector;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_vector_activate {
+ struct trace_entry ent;
+ unsigned int irq;
+ bool is_managed;
+ bool can_reserve;
+ bool reserve;
+ char __data[0];
+};
+
+struct trace_event_raw_vector_teardown {
+ struct trace_entry ent;
+ unsigned int irq;
+ bool is_managed;
+ bool has_reserved;
+ char __data[0];
+};
+
+struct trace_event_raw_vector_setup {
+ struct trace_entry ent;
+ unsigned int irq;
+ bool is_legacy;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_vector_free_moved {
+ struct trace_entry ent;
+ unsigned int irq;
+ unsigned int cpu;
+ unsigned int vector;
+ bool is_managed;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_x86_irq_vector {};
+
+struct trace_event_data_offsets_vector_config {};
+
+struct trace_event_data_offsets_vector_mod {};
+
+struct trace_event_data_offsets_vector_reserve {};
+
+struct trace_event_data_offsets_vector_alloc {};
+
+struct trace_event_data_offsets_vector_alloc_managed {};
+
+struct trace_event_data_offsets_vector_activate {};
+
+struct trace_event_data_offsets_vector_teardown {};
+
+struct trace_event_data_offsets_vector_setup {};
+
+struct trace_event_data_offsets_vector_free_moved {};
+
+typedef void (*btf_trace_local_timer_entry)(void *, int);
+
+typedef void (*btf_trace_local_timer_exit)(void *, int);
+
+typedef void (*btf_trace_spurious_apic_entry)(void *, int);
+
+typedef void (*btf_trace_spurious_apic_exit)(void *, int);
+
+typedef void (*btf_trace_error_apic_entry)(void *, int);
+
+typedef void (*btf_trace_error_apic_exit)(void *, int);
+
+typedef void (*btf_trace_x86_platform_ipi_entry)(void *, int);
+
+typedef void (*btf_trace_x86_platform_ipi_exit)(void *, int);
+
+typedef void (*btf_trace_irq_work_entry)(void *, int);
+
+typedef void (*btf_trace_irq_work_exit)(void *, int);
+
+typedef void (*btf_trace_reschedule_entry)(void *, int);
+
+typedef void (*btf_trace_reschedule_exit)(void *, int);
+
+typedef void (*btf_trace_call_function_entry)(void *, int);
+
+typedef void (*btf_trace_call_function_exit)(void *, int);
+
+typedef void (*btf_trace_call_function_single_entry)(void *, int);
+
+typedef void (*btf_trace_call_function_single_exit)(void *, int);
+
+typedef void (*btf_trace_threshold_apic_entry)(void *, int);
+
+typedef void (*btf_trace_threshold_apic_exit)(void *, int);
+
+typedef void (*btf_trace_deferred_error_apic_entry)(void *, int);
+
+typedef void (*btf_trace_deferred_error_apic_exit)(void *, int);
+
+typedef void (*btf_trace_thermal_apic_entry)(void *, int);
+
+typedef void (*btf_trace_thermal_apic_exit)(void *, int);
+
+typedef void (*btf_trace_vector_config)(void *, unsigned int, unsigned int, unsigned int, unsigned int);
+
+typedef void (*btf_trace_vector_update)(void *, unsigned int, unsigned int, unsigned int, unsigned int, unsigned int);
+
+typedef void (*btf_trace_vector_clear)(void *, unsigned int, unsigned int, unsigned int, unsigned int, unsigned int);
+
+typedef void (*btf_trace_vector_reserve_managed)(void *, unsigned int, int);
+
+typedef void (*btf_trace_vector_reserve)(void *, unsigned int, int);
+
+typedef void (*btf_trace_vector_alloc)(void *, unsigned int, unsigned int, bool, int);
+
+typedef void (*btf_trace_vector_alloc_managed)(void *, unsigned int, unsigned int, int);
+
+typedef void (*btf_trace_vector_activate)(void *, unsigned int, bool, bool, bool);
+
+typedef void (*btf_trace_vector_deactivate)(void *, unsigned int, bool, bool, bool);
+
+typedef void (*btf_trace_vector_teardown)(void *, unsigned int, bool, bool);
+
+typedef void (*btf_trace_vector_setup)(void *, unsigned int, bool, int);
+
+typedef void (*btf_trace_vector_free_moved)(void *, unsigned int, unsigned int, unsigned int, bool);
+
+struct xdp_cpumap_stats {
+ unsigned int redirect;
+ unsigned int pass;
+ unsigned int drop;
+};
+
+struct bpf_prog_pack {
+ struct list_head list;
+ void *ptr;
+ long unsigned int bitmap[0];
+};
+
+struct bpf_prog_dummy {
+ struct bpf_prog prog;
+};
+
+typedef u64 (*btf_bpf_user_rnd_u32)();
+
+typedef u64 (*btf_bpf_get_raw_cpu_id)();
+
+struct _bpf_dtab_netdev {
+ struct net_device *dev;
+};
+
+struct trace_event_raw_xdp_exception {
+ struct trace_entry ent;
+ int prog_id;
+ u32 act;
+ int ifindex;
+ char __data[0];
+};
+
+struct trace_event_raw_xdp_bulk_tx {
+ struct trace_entry ent;
+ int ifindex;
+ u32 act;
+ int drops;
+ int sent;
+ int err;
+ char __data[0];
+};
+
+struct trace_event_raw_xdp_redirect_template {
+ struct trace_entry ent;
+ int prog_id;
+ u32 act;
+ int ifindex;
+ int err;
+ int to_ifindex;
+ u32 map_id;
+ int map_index;
+ char __data[0];
+};
+
+struct trace_event_raw_xdp_cpumap_kthread {
+ struct trace_entry ent;
+ int map_id;
+ u32 act;
+ int cpu;
+ unsigned int drops;
+ unsigned int processed;
+ int sched;
+ unsigned int xdp_pass;
+ unsigned int xdp_drop;
+ unsigned int xdp_redirect;
+ char __data[0];
+};
+
+struct trace_event_raw_xdp_cpumap_enqueue {
+ struct trace_entry ent;
+ int map_id;
+ u32 act;
+ int cpu;
+ unsigned int drops;
+ unsigned int processed;
+ int to_cpu;
+ char __data[0];
+};
+
+struct trace_event_raw_xdp_devmap_xmit {
+ struct trace_entry ent;
+ int from_ifindex;
+ u32 act;
+ int to_ifindex;
+ int drops;
+ int sent;
+ int err;
+ char __data[0];
+};
+
+struct trace_event_raw_mem_disconnect {
+ struct trace_entry ent;
+ const struct xdp_mem_allocator *xa;
+ u32 mem_id;
+ u32 mem_type;
+ const void *allocator;
+ char __data[0];
+};
+
+struct trace_event_raw_mem_connect {
+ struct trace_entry ent;
+ const struct xdp_mem_allocator *xa;
+ u32 mem_id;
+ u32 mem_type;
+ const void *allocator;
+ const struct xdp_rxq_info *rxq;
+ int ifindex;
+ char __data[0];
+};
+
+struct trace_event_raw_mem_return_failed {
+ struct trace_entry ent;
+ const struct page *page;
+ u32 mem_id;
+ u32 mem_type;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_xdp_exception {};
+
+struct trace_event_data_offsets_xdp_bulk_tx {};
+
+struct trace_event_data_offsets_xdp_redirect_template {};
+
+struct trace_event_data_offsets_xdp_cpumap_kthread {};
+
+struct trace_event_data_offsets_xdp_cpumap_enqueue {};
+
+struct trace_event_data_offsets_xdp_devmap_xmit {};
+
+struct trace_event_data_offsets_mem_disconnect {};
+
+struct trace_event_data_offsets_mem_connect {};
+
+struct trace_event_data_offsets_mem_return_failed {};
+
+typedef void (*btf_trace_xdp_exception)(void *, const struct net_device *, const struct bpf_prog *, u32);
+
+typedef void (*btf_trace_xdp_bulk_tx)(void *, const struct net_device *, int, int, int);
+
+typedef void (*btf_trace_xdp_redirect)(void *, const struct net_device *, const struct bpf_prog *, const void *, int, enum bpf_map_type, u32, u32);
+
+typedef void (*btf_trace_xdp_redirect_err)(void *, const struct net_device *, const struct bpf_prog *, const void *, int, enum bpf_map_type, u32, u32);
+
+typedef void (*btf_trace_xdp_redirect_map)(void *, const struct net_device *, const struct bpf_prog *, const void *, int, enum bpf_map_type, u32, u32);
+
+typedef void (*btf_trace_xdp_redirect_map_err)(void *, const struct net_device *, const struct bpf_prog *, const void *, int, enum bpf_map_type, u32, u32);
+
+typedef void (*btf_trace_xdp_cpumap_kthread)(void *, int, unsigned int, unsigned int, int, struct xdp_cpumap_stats *);
+
+typedef void (*btf_trace_xdp_cpumap_enqueue)(void *, int, unsigned int, unsigned int, int);
+
+typedef void (*btf_trace_xdp_devmap_xmit)(void *, const struct net_device *, const struct net_device *, int, int, int);
+
+typedef void (*btf_trace_mem_disconnect)(void *, const struct xdp_mem_allocator *);
+
+typedef void (*btf_trace_mem_connect)(void *, const struct xdp_mem_allocator *, const struct xdp_rxq_info *);
+
+typedef void (*btf_trace_mem_return_failed)(void *, const struct xdp_mem_info *, const struct page *);
+
+struct mb_cache {
+ struct hlist_bl_head *c_hash;
+ int c_bucket_bits;
+ long unsigned int c_max_entries;
+ spinlock_t c_list_lock;
+ struct list_head c_list;
+ long unsigned int c_entry_count;
+ struct shrinker c_shrink;
+ struct work_struct c_shrink_work;
+};
+
+struct mmp_struct {
+ __le32 mmp_magic;
+ __le32 mmp_seq;
+ __le64 mmp_time;
+ char mmp_nodename[64];
+ char mmp_bdevname[32];
+ __le16 mmp_check_interval;
+ __le16 mmp_pad1;
+ __le32 mmp_pad2[226];
+ __le32 mmp_checksum;
+};
+
+struct debugfs_reg32 {
+ char *name;
+ long unsigned int offset;
+};
+
+struct debugfs_regset32 {
+ const struct debugfs_reg32 *regs;
+ int nregs;
+ void *base;
+ struct device *dev;
+};
+
+struct debugfs_fsdata {
+ const struct file_operations *real_fops;
+ refcount_t active_users;
+ struct completion active_users_drained;
+};
+
+struct debugfs_devm_entry {
+ int (*read)(struct seq_file *, void *);
+ struct device *dev;
+};
+
+typedef struct {
+ u64 a;
+ u64 b;
+} u128;
+
+typedef struct {
+ __le64 b;
+ __le64 a;
+} le128;
+
+struct gf128mul_4k {
+ be128 t[256];
+};
+
+struct gf128mul_64k {
+ struct gf128mul_4k *t[16];
+};
+
+struct blk_integrity_profile;
+
+struct blk_integrity {
+ const struct blk_integrity_profile *profile;
+ unsigned char flags;
+ unsigned char tuple_size;
+ unsigned char interval_exp;
+ unsigned char tag_size;
+};
+
+struct blk_integrity_iter;
+
+typedef blk_status_t integrity_processing_fn(struct blk_integrity_iter *);
+
+typedef void integrity_prepare_fn(struct request *);
+
+typedef void integrity_complete_fn(struct request *, unsigned int);
+
+struct blk_integrity_profile {
+ integrity_processing_fn *generate_fn;
+ integrity_processing_fn *verify_fn;
+ integrity_prepare_fn *prepare_fn;
+ integrity_complete_fn *complete_fn;
+ const char *name;
+};
+
+struct blk_integrity_iter {
+ void *prot_buf;
+ void *data_buf;
+ sector_t seed;
+ unsigned int data_size;
+ short unsigned int interval;
+ unsigned char tuple_size;
+ const char *disk_name;
+};
+
+struct bdev_inode {
+ struct block_device bdev;
+ struct inode vfs_inode;
+};
+
+typedef u32 acpi_rsdesc_size;
+
+struct acpipnp_parse_option_s {
+ struct pnp_dev *dev;
+ unsigned int option_flags;
+};
+
+struct iova {
+ struct rb_node node;
+ long unsigned int pfn_hi;
+ long unsigned int pfn_lo;
+};
+
+struct iova_rcache;
+
+struct iova_domain {
+ spinlock_t iova_rbtree_lock;
+ struct rb_root rbroot;
+ struct rb_node *cached_node;
+ struct rb_node *cached32_node;
+ long unsigned int granule;
+ long unsigned int start_pfn;
+ long unsigned int dma_32bit_pfn;
+ long unsigned int max32_alloc_size;
+ struct iova anchor;
+ struct iova_rcache *rcaches;
+ struct hlist_node cpuhp_dead;
+};
+
+struct iova_magazine;
+
+struct iova_cpu_rcache;
+
+struct iova_rcache {
+ spinlock_t lock;
+ long unsigned int depot_size;
+ struct iova_magazine *depot[32];
+ struct iova_cpu_rcache *cpu_rcaches;
+};
+
+struct iova_magazine {
+ long unsigned int size;
+ long unsigned int pfns[127];
+};
+
+struct iova_cpu_rcache {
+ spinlock_t lock;
+ struct iova_magazine *loaded;
+ struct iova_magazine *prev;
+};
+
+typedef struct kobject *kobj_probe_t(dev_t, int *, void *);
+
+struct probe {
+ struct probe *next;
+ dev_t dev;
+ long unsigned int range;
+ struct module *owner;
+ kobj_probe_t *get;
+ int (*lock)(dev_t, void *);
+ void *data;
+};
+
+struct kobj_map {
+ struct probe *probes[255];
+ struct mutex *lock;
+};
+
+struct trace_event_raw_devres {
+ struct trace_entry ent;
+ u32 __data_loc_devname;
+ struct device *dev;
+ const char *op;
+ void *node;
+ const char *name;
+ size_t size;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_devres {
+ u32 devname;
+};
+
+typedef void (*btf_trace_devres_log)(void *, struct device *, const char *, void *, const char *, size_t);
+
+enum acpi_preferred_pm_profiles {
+ PM_UNSPECIFIED = 0,
+ PM_DESKTOP = 1,
+ PM_MOBILE = 2,
+ PM_WORKSTATION = 3,
+ PM_ENTERPRISE_SERVER = 4,
+ PM_SOHO_SERVER = 5,
+ PM_APPLIANCE_PC = 6,
+ PM_PERFORMANCE_SERVER = 7,
+ PM_TABLET = 8,
+};
+
+struct sample {
+ int32_t core_avg_perf;
+ int32_t busy_scaled;
+ u64 aperf;
+ u64 mperf;
+ u64 tsc;
+ u64 time;
+};
+
+struct pstate_data {
+ int current_pstate;
+ int min_pstate;
+ int max_pstate;
+ int max_pstate_physical;
+ int perf_ctl_scaling;
+ int scaling;
+ int turbo_pstate;
+ unsigned int min_freq;
+ unsigned int max_freq;
+ unsigned int turbo_freq;
+};
+
+struct vid_data {
+ int min;
+ int max;
+ int turbo;
+ int32_t ratio;
+};
+
+struct global_params {
+ bool no_turbo;
+ bool turbo_disabled;
+ bool turbo_disabled_mf;
+ int max_perf_pct;
+ int min_perf_pct;
+};
+
+struct cpudata {
+ int cpu;
+ unsigned int policy;
+ struct update_util_data update_util;
+ bool update_util_set;
+ struct pstate_data pstate;
+ struct vid_data vid;
+ u64 last_update;
+ u64 last_sample_time;
+ u64 aperf_mperf_shift;
+ u64 prev_aperf;
+ u64 prev_mperf;
+ u64 prev_tsc;
+ u64 prev_cummulative_iowait;
+ struct sample sample;
+ int32_t min_perf_ratio;
+ int32_t max_perf_ratio;
+ struct acpi_processor_performance acpi_perf_data;
+ bool valid_pss_table;
+ unsigned int iowait_boost;
+ s16 epp_powersave;
+ s16 epp_policy;
+ s16 epp_default;
+ s16 epp_cached;
+ u64 hwp_req_cached;
+ u64 hwp_cap_cached;
+ u64 last_io_update;
+ unsigned int sched_flags;
+ u32 hwp_boost_min;
+ bool suspended;
+ struct delayed_work hwp_notify_work;
+};
+
+struct pstate_funcs {
+ int (*get_max)(int);
+ int (*get_max_physical)(int);
+ int (*get_min)(int);
+ int (*get_turbo)(int);
+ int (*get_scaling)();
+ int (*get_cpu_scaling)(int);
+ int (*get_aperf_mperf_shift)();
+ u64 (*get_val)(struct cpudata *, int);
+ void (*get_vid)(struct cpudata *);
+};
+
+enum energy_perf_value_index___2 {
+ EPP_INDEX_DEFAULT = 0,
+ EPP_INDEX_PERFORMANCE = 1,
+ EPP_INDEX_BALANCE_PERFORMANCE = 2,
+ EPP_INDEX_BALANCE_POWERSAVE = 3,
+ EPP_INDEX_POWERSAVE = 4,
+};
+
+enum {
+ PSS = 0,
+ PPC = 1,
+};
+
+struct tcamsg {
+ unsigned char tca_family;
+ unsigned char tca__pad1;
+ short unsigned int tca__pad2;
+};
+
+enum {
+ TCA_ROOT_UNSPEC = 0,
+ TCA_ROOT_TAB = 1,
+ TCA_ROOT_FLAGS = 2,
+ TCA_ROOT_COUNT = 3,
+ TCA_ROOT_TIME_DELTA = 4,
+ __TCA_ROOT_MAX = 5,
+};
+
+struct tc_action_net {
+ struct tcf_idrinfo *idrinfo;
+ const struct tc_action_ops *ops;
+};
+
+struct tc_act_pernet_id {
+ struct list_head list;
+ unsigned int id;
+};
+
+enum dccp_state {
+ DCCP_OPEN = 1,
+ DCCP_REQUESTING = 2,
+ DCCP_LISTEN = 10,
+ DCCP_RESPOND = 3,
+ DCCP_ACTIVE_CLOSEREQ = 4,
+ DCCP_PASSIVE_CLOSE = 8,
+ DCCP_CLOSING = 11,
+ DCCP_TIME_WAIT = 6,
+ DCCP_CLOSED = 7,
+ DCCP_NEW_SYN_RECV = 12,
+ DCCP_PARTOPEN = 13,
+ DCCP_PASSIVE_CLOSEREQ = 14,
+ DCCP_MAX_STATES = 15,
+};
+
+enum {
+ LOGIC_PIO_INDIRECT = 0,
+ LOGIC_PIO_CPU_MMIO = 1,
+};
+
+struct logic_pio_host_ops;
+
+struct logic_pio_hwaddr {
+ struct list_head list;
+ struct fwnode_handle *fwnode;
+ resource_size_t hw_start;
+ resource_size_t io_start;
+ resource_size_t size;
+ long unsigned int flags;
+ void *hostdata;
+ const struct logic_pio_host_ops *ops;
+};
+
+struct logic_pio_host_ops {
+ u32 (*in)(void *, long unsigned int, size_t);
+ void (*out)(void *, long unsigned int, u32, size_t);
+ u32 (*ins)(void *, long unsigned int, void *, size_t, unsigned int);
+ void (*outs)(void *, long unsigned int, const void *, size_t, unsigned int);
+};
+
+struct irq_stack {
+ char stack[16384];
+};
+
+struct cpuid_dep {
+ unsigned int feature;
+ unsigned int depends;
+};
+
+enum tsx_ctrl_states {
+ TSX_CTRL_ENABLE = 0,
+ TSX_CTRL_DISABLE = 1,
+ TSX_CTRL_RTM_ALWAYS_ABORT = 2,
+ TSX_CTRL_NOT_SUPPORTED = 3,
+};
+
+enum smca_bank_types {
+ SMCA_LS = 0,
+ SMCA_LS_V2 = 1,
+ SMCA_IF = 2,
+ SMCA_L2_CACHE = 3,
+ SMCA_DE = 4,
+ SMCA_RESERVED = 5,
+ SMCA_EX = 6,
+ SMCA_FP = 7,
+ SMCA_L3_CACHE = 8,
+ SMCA_CS = 9,
+ SMCA_CS_V2 = 10,
+ SMCA_PIE = 11,
+ SMCA_UMC = 12,
+ SMCA_UMC_V2 = 13,
+ SMCA_PB = 14,
+ SMCA_PSP = 15,
+ SMCA_PSP_V2 = 16,
+ SMCA_SMU = 17,
+ SMCA_SMU_V2 = 18,
+ SMCA_MP5 = 19,
+ SMCA_MPDMA = 20,
+ SMCA_NBIO = 21,
+ SMCA_PCIE = 22,
+ SMCA_PCIE_V2 = 23,
+ SMCA_XGMI_PCS = 24,
+ SMCA_NBIF = 25,
+ SMCA_SHUB = 26,
+ SMCA_SATA = 27,
+ SMCA_USB = 28,
+ SMCA_GMI_PCS = 29,
+ SMCA_XGMI_PHY = 30,
+ SMCA_WAFL_PHY = 31,
+ SMCA_GMI_PHY = 32,
+ N_SMCA_BANK_TYPES = 33,
+};
+
+struct mce_vendor_flags {
+ __u64 overflow_recov: 1;
+ __u64 succor: 1;
+ __u64 smca: 1;
+ __u64 amd_threshold: 1;
+ __u64 p5: 1;
+ __u64 winchip: 1;
+ __u64 snb_ifu_quirk: 1;
+ __u64 skx_repmov_quirk: 1;
+ __u64 __reserved_0: 56;
+};
+
+enum mca_msr {
+ MCA_CTL = 0,
+ MCA_STATUS = 1,
+ MCA_ADDR = 2,
+ MCA_MISC = 3,
+};
+
+struct smca_hwid {
+ unsigned int bank_type;
+ u32 hwid_mcatype;
+};
+
+struct smca_bank {
+ const struct smca_hwid *hwid;
+ u32 id;
+ u8 sysfs_id;
+};
+
+struct smca_bank_name {
+ const char *name;
+ const char *long_name;
+};
+
+struct thresh_restart {
+ struct threshold_block *b;
+ int reset;
+ int set_lvt_off;
+ int lvt_off;
+ u16 old_limit;
+};
+
+struct threshold_attr {
+ struct attribute attr;
+ ssize_t (*show)(struct threshold_block *, char *);
+ ssize_t (*store)(struct threshold_block *, const char *, size_t);
+};
+
+enum bpf_task_fd_type {
+ BPF_FD_TYPE_RAW_TRACEPOINT = 0,
+ BPF_FD_TYPE_TRACEPOINT = 1,
+ BPF_FD_TYPE_KPROBE = 2,
+ BPF_FD_TYPE_KRETPROBE = 3,
+ BPF_FD_TYPE_UPROBE = 4,
+ BPF_FD_TYPE_URETPROBE = 5,
+};
+
+struct bpf_trace_run_ctx {
+ struct bpf_run_ctx run_ctx;
+ u64 bpf_cookie;
+};
+
+typedef u32 (*bpf_prog_run_fn)(const struct bpf_prog *, const void *);
+
+struct uprobe_trace_entry_head {
+ struct trace_entry ent;
+ long unsigned int vaddr[0];
+};
+
+struct trace_uprobe {
+ struct dyn_event devent;
+ struct uprobe_consumer consumer;
+ struct path path;
+ struct inode *inode;
+ char *filename;
+ long unsigned int offset;
+ long unsigned int ref_ctr_offset;
+ long unsigned int nhit;
+ struct trace_probe tp;
+};
+
+struct uprobe_dispatch_data {
+ struct trace_uprobe *tu;
+ long unsigned int bp_addr;
+};
+
+struct uprobe_cpu_buffer {
+ struct mutex mutex;
+ void *buf;
+};
+
+typedef bool (*filter_func_t)(struct uprobe_consumer *, enum uprobe_filter_ctx, struct mm_struct *);
+
+struct task_security_struct {
+ u32 osid;
+ u32 sid;
+ u32 exec_sid;
+ u32 create_sid;
+ u32 keycreate_sid;
+ u32 sockcreate_sid;
+};
+
+enum label_initialized {
+ LABEL_INVALID = 0,
+ LABEL_INITIALIZED = 1,
+ LABEL_PENDING = 2,
+};
+
+struct inode_security_struct {
+ struct inode *inode;
+ struct list_head list;
+ u32 task_sid;
+ u32 sid;
+ u16 sclass;
+ unsigned char initialized;
+ spinlock_t lock;
+};
+
+enum sel_inos {
+ SEL_ROOT_INO = 2,
+ SEL_LOAD = 3,
+ SEL_ENFORCE = 4,
+ SEL_CONTEXT = 5,
+ SEL_ACCESS = 6,
+ SEL_CREATE = 7,
+ SEL_RELABEL = 8,
+ SEL_USER = 9,
+ SEL_POLICYVERS = 10,
+ SEL_COMMIT_BOOLS = 11,
+ SEL_MLS = 12,
+ SEL_DISABLE = 13,
+ SEL_MEMBER = 14,
+ SEL_CHECKREQPROT = 15,
+ SEL_COMPAT_NET = 16,
+ SEL_REJECT_UNKNOWN = 17,
+ SEL_DENY_UNKNOWN = 18,
+ SEL_STATUS = 19,
+ SEL_POLICY = 20,
+ SEL_VALIDATE_TRANS = 21,
+ SEL_INO_NEXT = 22,
+};
+
+struct selinux_fs_info {
+ struct dentry *bool_dir;
+ unsigned int bool_num;
+ char **bool_pending_names;
+ int *bool_pending_values;
+ struct dentry *class_dir;
+ long unsigned int last_class_ino;
+ bool policy_opened;
+ struct dentry *policycap_dir;
+ long unsigned int last_ino;
+ struct selinux_state *state;
+ struct super_block *sb;
+};
+
+struct policy_load_memory {
+ size_t len;
+ void *data;
+};
+
+enum dd_data_dir {
+ DD_READ = 0,
+ DD_WRITE = 1,
+};
+
+enum {
+ DD_DIR_COUNT = 2,
+};
+
+enum dd_prio {
+ DD_RT_PRIO = 0,
+ DD_BE_PRIO = 1,
+ DD_IDLE_PRIO = 2,
+ DD_PRIO_MAX = 2,
+};
+
+enum {
+ DD_PRIO_COUNT = 3,
+};
+
+struct io_stats_per_prio {
+ uint32_t inserted;
+ uint32_t merged;
+ uint32_t dispatched;
+ atomic_t completed;
+};
+
+struct dd_per_prio {
+ struct list_head dispatch;
+ struct rb_root sort_list[2];
+ struct list_head fifo_list[2];
+ struct request *next_rq[2];
+ struct io_stats_per_prio stats;
+};
+
+struct deadline_data {
+ struct dd_per_prio per_prio[3];
+ enum dd_data_dir last_dir;
+ unsigned int batching;
+ unsigned int starved;
+ int fifo_expire[2];
+ int fifo_batch;
+ int writes_starved;
+ int front_merges;
+ u32 async_depth;
+ int prio_aging_expire;
+ spinlock_t lock;
+ spinlock_t zone_lock;
+};
+
+enum lzma_state {
+ STATE_LIT_LIT = 0,
+ STATE_MATCH_LIT_LIT = 1,
+ STATE_REP_LIT_LIT = 2,
+ STATE_SHORTREP_LIT_LIT = 3,
+ STATE_MATCH_LIT = 4,
+ STATE_REP_LIT = 5,
+ STATE_SHORTREP_LIT = 6,
+ STATE_LIT_MATCH = 7,
+ STATE_LIT_LONGREP = 8,
+ STATE_LIT_SHORTREP = 9,
+ STATE_NONLIT_MATCH = 10,
+ STATE_NONLIT_REP = 11,
+};
+
+struct dictionary {
+ uint8_t *buf;
+ size_t start;
+ size_t pos;
+ size_t full;
+ size_t limit;
+ size_t end;
+ uint32_t size;
+ uint32_t size_max;
+ uint32_t allocated;
+ enum xz_mode mode;
+};
+
+struct rc_dec {
+ uint32_t range;
+ uint32_t code;
+ uint32_t init_bytes_left;
+ const uint8_t *in;
+ size_t in_pos;
+ size_t in_limit;
+};
+
+struct lzma_len_dec {
+ uint16_t choice;
+ uint16_t choice2;
+ uint16_t low[128];
+ uint16_t mid[128];
+ uint16_t high[256];
+};
+
+struct lzma_dec {
+ uint32_t rep0;
+ uint32_t rep1;
+ uint32_t rep2;
+ uint32_t rep3;
+ enum lzma_state state;
+ uint32_t len;
+ uint32_t lc;
+ uint32_t literal_pos_mask;
+ uint32_t pos_mask;
+ uint16_t is_match[192];
+ uint16_t is_rep[12];
+ uint16_t is_rep0[12];
+ uint16_t is_rep1[12];
+ uint16_t is_rep2[12];
+ uint16_t is_rep0_long[192];
+ uint16_t dist_slot[256];
+ uint16_t dist_special[114];
+ uint16_t dist_align[16];
+ struct lzma_len_dec match_len_dec;
+ struct lzma_len_dec rep_len_dec;
+ uint16_t literal[12288];
+};
+
+enum lzma2_seq {
+ SEQ_CONTROL = 0,
+ SEQ_UNCOMPRESSED_1 = 1,
+ SEQ_UNCOMPRESSED_2 = 2,
+ SEQ_COMPRESSED_0 = 3,
+ SEQ_COMPRESSED_1 = 4,
+ SEQ_PROPERTIES = 5,
+ SEQ_LZMA_PREPARE = 6,
+ SEQ_LZMA_RUN = 7,
+ SEQ_COPY = 8,
+};
+
+struct lzma2_dec {
+ enum lzma2_seq sequence;
+ enum lzma2_seq next_sequence;
+ uint32_t uncompressed;
+ uint32_t compressed;
+ bool need_dict_reset;
+ bool need_props;
+};
+
+struct xz_dec_lzma2 {
+ struct rc_dec rc;
+ struct dictionary dict;
+ struct lzma2_dec lzma2;
+ struct lzma_dec lzma;
+ struct {
+ uint32_t size;
+ uint8_t buf[63];
+ } temp;
+};
+
+typedef long int mpi_limb_signed_t;
+
+union handle_parts {
+ depot_stack_handle_t handle;
+ struct {
+ u32 slabindex: 16;
+ u32 offset: 10;
+ u32 valid: 1;
+ u32 extra: 5;
+ };
+};
+
+struct stack_record {
+ struct stack_record *next;
+ u32 hash;
+ u32 size;
+ union handle_parts handle;
+ long unsigned int entries[0];
+};
+
+enum {
+ ACPI_BUTTON_LID_INIT_IGNORE = 0,
+ ACPI_BUTTON_LID_INIT_OPEN = 1,
+ ACPI_BUTTON_LID_INIT_METHOD = 2,
+ ACPI_BUTTON_LID_INIT_DISABLED = 3,
+};
+
+struct acpi_button {
+ unsigned int type;
+ struct input_dev *input;
+ char phys[32];
+ long unsigned int pushed;
+ int last_state;
+ ktime_t last_time;
+ bool suspended;
+ bool lid_state_initialized;
+};
+
+enum tpm2_const {
+ TPM2_PLATFORM_PCR = 24,
+ TPM2_PCR_SELECT_MIN = 3,
+};
+
+enum tpm2_permanent_handles {
+ TPM2_RS_PW = 1073741833,
+};
+
+enum tpm2_properties {
+ TPM_PT_TOTAL_COMMANDS = 297,
+};
+
+struct tpm2_hash {
+ unsigned int crypto_id;
+ unsigned int tpm_id;
+};
+
+struct tpm2_pcr_read_out {
+ __be32 update_cnt;
+ __be32 pcr_selects_cnt;
+ __be16 hash_alg;
+ u8 pcr_select_size;
+ u8 pcr_select[3];
+ __be32 digests_cnt;
+ __be16 digest_size;
+ u8 digest[0];
+} __attribute__((packed));
+
+struct tpm2_null_auth_area {
+ __be32 handle;
+ __be16 nonce_size;
+ u8 attributes;
+ __be16 auth_size;
+} __attribute__((packed));
+
+struct tpm2_get_random_out {
+ __be16 size;
+ u8 buffer[128];
+};
+
+struct tpm2_get_cap_out {
+ u8 more_data;
+ __be32 subcap_id;
+ __be32 property_cnt;
+ __be32 property_id;
+ __be32 value;
+} __attribute__((packed));
+
+struct tpm2_pcr_selection {
+ __be16 hash_alg;
+ u8 size_of_select;
+ u8 pcr_select[3];
+};
+
+struct loopback_dev {
+ struct rc_dev *dev;
+ u32 txmask;
+ u32 txcarrier;
+ u32 txduty;
+ bool idle;
+ bool wideband;
+ bool carrierreport;
+ u32 rxcarriermin;
+ u32 rxcarriermax;
+};
+
+struct tso_t {
+ int next_frag_idx;
+ int size;
+ void *data;
+ u16 ip_id;
+ u8 tlen;
+ bool ipv6;
+ u32 tcp_seq;
+};
+
+enum ethtool_podl_pse_admin_state {
+ ETHTOOL_PODL_PSE_ADMIN_STATE_UNKNOWN = 1,
+ ETHTOOL_PODL_PSE_ADMIN_STATE_DISABLED = 2,
+ ETHTOOL_PODL_PSE_ADMIN_STATE_ENABLED = 3,
+};
+
+enum ethtool_podl_pse_pw_d_status {
+ ETHTOOL_PODL_PSE_PW_D_STATUS_UNKNOWN = 1,
+ ETHTOOL_PODL_PSE_PW_D_STATUS_DISABLED = 2,
+ ETHTOOL_PODL_PSE_PW_D_STATUS_SEARCHING = 3,
+ ETHTOOL_PODL_PSE_PW_D_STATUS_DELIVERING = 4,
+ ETHTOOL_PODL_PSE_PW_D_STATUS_SLEEP = 5,
+ ETHTOOL_PODL_PSE_PW_D_STATUS_IDLE = 6,
+ ETHTOOL_PODL_PSE_PW_D_STATUS_ERROR = 7,
+};
+
+struct pse_control_config {
+ enum ethtool_podl_pse_admin_state admin_cotrol;
+};
+
+struct pse_control_status {
+ enum ethtool_podl_pse_admin_state podl_admin_state;
+ enum ethtool_podl_pse_pw_d_status podl_pw_status;
+};
+
+struct pse_reply_data {
+ struct ethnl_reply_data base;
+ struct pse_control_status status;
+};
+
+struct __kernel_sock_timeval {
+ __s64 tv_sec;
+ __s64 tv_usec;
+};
+
+struct mmpin {
+ struct user_struct *user;
+ unsigned int num_pg;
+};
+
+struct ubuf_info_msgzc {
+ struct ubuf_info ubuf;
+ union {
+ struct {
+ long unsigned int desc;
+ void *ctx;
+ };
+ struct {
+ u32 id;
+ u16 len;
+ u16 zerocopy: 1;
+ u32 bytelen;
+ };
+ };
+ struct mmpin mmp;
+};
+
+struct tcp_repair_opt {
+ __u32 opt_code;
+ __u32 opt_val;
+};
+
+struct tcp_repair_window {
+ __u32 snd_wl1;
+ __u32 snd_wnd;
+ __u32 max_window;
+ __u32 rcv_wnd;
+ __u32 rcv_wup;
+};
+
+enum {
+ TCP_NLA_PAD = 0,
+ TCP_NLA_BUSY = 1,
+ TCP_NLA_RWND_LIMITED = 2,
+ TCP_NLA_SNDBUF_LIMITED = 3,
+ TCP_NLA_DATA_SEGS_OUT = 4,
+ TCP_NLA_TOTAL_RETRANS = 5,
+ TCP_NLA_PACING_RATE = 6,
+ TCP_NLA_DELIVERY_RATE = 7,
+ TCP_NLA_SND_CWND = 8,
+ TCP_NLA_REORDERING = 9,
+ TCP_NLA_MIN_RTT = 10,
+ TCP_NLA_RECUR_RETRANS = 11,
+ TCP_NLA_DELIVERY_RATE_APP_LMT = 12,
+ TCP_NLA_SNDQ_SIZE = 13,
+ TCP_NLA_CA_STATE = 14,
+ TCP_NLA_SND_SSTHRESH = 15,
+ TCP_NLA_DELIVERED = 16,
+ TCP_NLA_DELIVERED_CE = 17,
+ TCP_NLA_BYTES_SENT = 18,
+ TCP_NLA_BYTES_RETRANS = 19,
+ TCP_NLA_DSACK_DUPS = 20,
+ TCP_NLA_REORD_SEEN = 21,
+ TCP_NLA_SRTT = 22,
+ TCP_NLA_TIMEOUT_REHASH = 23,
+ TCP_NLA_BYTES_NOTSENT = 24,
+ TCP_NLA_EDT = 25,
+ TCP_NLA_TTL = 26,
+ TCP_NLA_REHASH = 27,
+};
+
+struct tcp_zerocopy_receive {
+ __u64 address;
+ __u32 length;
+ __u32 recv_skip_hint;
+ __u32 inq;
+ __s32 err;
+ __u64 copybuf_address;
+ __s32 copybuf_len;
+ __u32 flags;
+ __u64 msg_control;
+ __u64 msg_controllen;
+ __u32 msg_flags;
+ __u32 reserved;
+};
+
+enum {
+ BPF_TCP_ESTABLISHED = 1,
+ BPF_TCP_SYN_SENT = 2,
+ BPF_TCP_SYN_RECV = 3,
+ BPF_TCP_FIN_WAIT1 = 4,
+ BPF_TCP_FIN_WAIT2 = 5,
+ BPF_TCP_TIME_WAIT = 6,
+ BPF_TCP_CLOSE = 7,
+ BPF_TCP_CLOSE_WAIT = 8,
+ BPF_TCP_LAST_ACK = 9,
+ BPF_TCP_LISTEN = 10,
+ BPF_TCP_CLOSING = 11,
+ BPF_TCP_NEW_SYN_RECV = 12,
+ BPF_TCP_MAX_STATES = 13,
+};
+
+enum {
+ TCP_CMSG_INQ = 1,
+ TCP_CMSG_TS = 2,
+};
+
+struct tcp_splice_state {
+ struct pipe_inode_info *pipe;
+ size_t len;
+ unsigned int flags;
+};
+
+struct estack_pages {
+ u32 offs;
+ u16 size;
+ u16 type;
+};
+
+struct optimistic_spin_node {
+ struct optimistic_spin_node *next;
+ struct optimistic_spin_node *prev;
+ int locked;
+ int cpu;
+};
+
+struct syscall_trace_enter {
+ struct trace_entry ent;
+ int nr;
+ long unsigned int args[0];
+};
+
+struct syscall_trace_exit {
+ struct trace_entry ent;
+ int nr;
+ long int ret;
+};
+
+struct syscall_tp_t {
+ long long unsigned int regs;
+ long unsigned int syscall_nr;
+ long unsigned int ret;
+};
+
+struct syscall_tp_t___2 {
+ long long unsigned int regs;
+ long unsigned int syscall_nr;
+ long unsigned int args[6];
+};
+
+struct bpf_cgroup_storage_map {
+ struct bpf_map map;
+ spinlock_t lock;
+ struct rb_root root;
+ struct list_head list;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct jbd2_journal_revoke_header_s {
+ journal_header_t r_header;
+ __be32 r_count;
+};
+
+typedef struct jbd2_journal_revoke_header_s jbd2_journal_revoke_header_t;
+
+struct jbd2_revoke_table_s {
+ int hash_size;
+ int hash_shift;
+ struct list_head *hash_table;
+};
+
+struct jbd2_revoke_record_s {
+ struct list_head hash;
+ tid_t sequence;
+ long long unsigned int blocknr;
+};
+
+enum sctp_endpoint_type {
+ SCTP_EP_TYPE_SOCKET = 0,
+ SCTP_EP_TYPE_ASSOCIATION = 1,
+};
+
+struct sctp_chunk;
+
+struct sctp_inq {
+ struct list_head in_chunk_list;
+ struct sctp_chunk *in_progress;
+ struct work_struct immediate;
+};
+
+struct sctp_bind_addr {
+ __u16 port;
+ struct list_head address_list;
+};
+
+struct sctp_ep_common {
+ enum sctp_endpoint_type type;
+ refcount_t refcnt;
+ bool dead;
+ struct sock *sk;
+ struct net *net;
+ struct sctp_inq inqueue;
+ struct sctp_bind_addr bind_addr;
+};
+
+typedef __s32 sctp_assoc_t;
+
+union sctp_addr {
+ struct sockaddr_in v4;
+ struct sockaddr_in6 v6;
+ struct sockaddr sa;
+};
+
+struct sctp_chunkhdr {
+ __u8 type;
+ __u8 flags;
+ __be16 length;
+};
+
+struct sctp_inithdr {
+ __be32 init_tag;
+ __be32 a_rwnd;
+ __be16 num_outbound_streams;
+ __be16 num_inbound_streams;
+ __be32 initial_tsn;
+ __u8 params[0];
+};
+
+struct sctp_init_chunk {
+ struct sctp_chunkhdr chunk_hdr;
+ struct sctp_inithdr init_hdr;
+};
+
+struct sctp_cookie {
+ __u32 my_vtag;
+ __u32 peer_vtag;
+ __u32 my_ttag;
+ __u32 peer_ttag;
+ ktime_t expiration;
+ __u16 sinit_num_ostreams;
+ __u16 sinit_max_instreams;
+ __u32 initial_tsn;
+ union sctp_addr peer_addr;
+ __u16 my_port;
+ __u8 prsctp_capable;
+ __u8 padding;
+ __u32 adaptation_ind;
+ __u8 auth_random[36];
+ __u8 auth_hmacs[10];
+ __u8 auth_chunks[20];
+ __u32 raw_addr_list_len;
+ struct sctp_init_chunk peer_init[0];
+};
+
+struct sctp_tsnmap {
+ long unsigned int *tsn_map;
+ __u32 base_tsn;
+ __u32 cumulative_tsn_ack_point;
+ __u32 max_tsn_seen;
+ __u16 len;
+ __u16 pending_data;
+ __u16 num_dup_tsns;
+ __be32 dup_tsns[16];
+};
+
+struct sctp_inithdr_host {
+ __u32 init_tag;
+ __u32 a_rwnd;
+ __u16 num_outbound_streams;
+ __u16 num_inbound_streams;
+ __u32 initial_tsn;
+};
+
+enum sctp_state {
+ SCTP_STATE_CLOSED = 0,
+ SCTP_STATE_COOKIE_WAIT = 1,
+ SCTP_STATE_COOKIE_ECHOED = 2,
+ SCTP_STATE_ESTABLISHED = 3,
+ SCTP_STATE_SHUTDOWN_PENDING = 4,
+ SCTP_STATE_SHUTDOWN_SENT = 5,
+ SCTP_STATE_SHUTDOWN_RECEIVED = 6,
+ SCTP_STATE_SHUTDOWN_ACK_SENT = 7,
+};
+
+struct sctp_stream_out_ext;
+
+struct sctp_stream_out {
+ union {
+ __u32 mid;
+ __u16 ssn;
+ };
+ __u32 mid_uo;
+ struct sctp_stream_out_ext *ext;
+ __u8 state;
+};
+
+struct sctp_stream_in {
+ union {
+ __u32 mid;
+ __u16 ssn;
+ };
+ __u32 mid_uo;
+ __u32 fsn;
+ __u32 fsn_uo;
+ char pd_mode;
+ char pd_mode_uo;
+};
+
+struct sctp_stream_interleave;
+
+struct sctp_stream {
+ struct {
+ struct __genradix tree;
+ struct sctp_stream_out type[0];
+ } out;
+ struct {
+ struct __genradix tree;
+ struct sctp_stream_in type[0];
+ } in;
+ __u16 outcnt;
+ __u16 incnt;
+ struct sctp_stream_out *out_curr;
+ union {
+ struct {
+ struct list_head prio_list;
+ };
+ struct {
+ struct list_head rr_list;
+ struct sctp_stream_out_ext *rr_next;
+ };
+ };
+ struct sctp_stream_interleave *si;
+};
+
+struct sctp_sched_ops;
+
+struct sctp_outq {
+ struct sctp_association *asoc;
+ struct list_head out_chunk_list;
+ struct sctp_sched_ops *sched;
+ unsigned int out_qlen;
+ unsigned int error;
+ struct list_head control_chunk_list;
+ struct list_head sacked;
+ struct list_head retransmit;
+ struct list_head abandoned;
+ __u32 outstanding_bytes;
+ char fast_rtx;
+ char cork;
+};
+
+struct sctp_ulpq {
+ char pd_mode;
+ struct sctp_association *asoc;
+ struct sk_buff_head reasm;
+ struct sk_buff_head reasm_uo;
+ struct sk_buff_head lobby;
+};
+
+struct sctp_priv_assoc_stats {
+ struct __kernel_sockaddr_storage obs_rto_ipaddr;
+ __u64 max_obs_rto;
+ __u64 isacks;
+ __u64 osacks;
+ __u64 opackets;
+ __u64 ipackets;
+ __u64 rtxchunks;
+ __u64 outofseqtsns;
+ __u64 idupchunks;
+ __u64 gapcnt;
+ __u64 ouodchunks;
+ __u64 iuodchunks;
+ __u64 oodchunks;
+ __u64 iodchunks;
+ __u64 octrlchunks;
+ __u64 ictrlchunks;
+};
+
+struct sctp_endpoint;
+
+struct sctp_transport;
+
+struct sctp_random_param;
+
+struct sctp_chunks_param;
+
+struct sctp_hmac_algo_param;
+
+struct sctp_auth_bytes;
+
+struct sctp_shared_key;
+
+struct sctp_association {
+ struct sctp_ep_common base;
+ struct list_head asocs;
+ sctp_assoc_t assoc_id;
+ struct sctp_endpoint *ep;
+ struct sctp_cookie c;
+ struct {
+ struct list_head transport_addr_list;
+ __u32 rwnd;
+ __u16 transport_count;
+ __u16 port;
+ struct sctp_transport *primary_path;
+ union sctp_addr primary_addr;
+ struct sctp_transport *active_path;
+ struct sctp_transport *retran_path;
+ struct sctp_transport *last_sent_to;
+ struct sctp_transport *last_data_from;
+ struct sctp_tsnmap tsn_map;
+ __be16 addip_disabled_mask;
+ __u16 ecn_capable: 1;
+ __u16 ipv4_address: 1;
+ __u16 ipv6_address: 1;
+ __u16 hostname_address: 1;
+ __u16 asconf_capable: 1;
+ __u16 prsctp_capable: 1;
+ __u16 reconf_capable: 1;
+ __u16 intl_capable: 1;
+ __u16 auth_capable: 1;
+ __u16 sack_needed: 1;
+ __u16 sack_generation: 1;
+ __u16 zero_window_announced: 1;
+ __u32 sack_cnt;
+ __u32 adaptation_ind;
+ struct sctp_inithdr_host i;
+ void *cookie;
+ int cookie_len;
+ __u32 addip_serial;
+ struct sctp_random_param *peer_random;
+ struct sctp_chunks_param *peer_chunks;
+ struct sctp_hmac_algo_param *peer_hmacs;
+ } peer;
+ enum sctp_state state;
+ int overall_error_count;
+ ktime_t cookie_life;
+ long unsigned int rto_initial;
+ long unsigned int rto_max;
+ long unsigned int rto_min;
+ int max_burst;
+ int max_retrans;
+ __u16 pf_retrans;
+ __u16 ps_retrans;
+ __u16 max_init_attempts;
+ __u16 init_retries;
+ long unsigned int max_init_timeo;
+ long unsigned int hbinterval;
+ long unsigned int probe_interval;
+ __be16 encap_port;
+ __u16 pathmaxrxt;
+ __u32 flowlabel;
+ __u8 dscp;
+ __u8 pmtu_pending;
+ __u32 pathmtu;
+ __u32 param_flags;
+ __u32 sackfreq;
+ long unsigned int sackdelay;
+ long unsigned int timeouts[12];
+ struct timer_list timers[12];
+ struct sctp_transport *shutdown_last_sent_to;
+ struct sctp_transport *init_last_sent_to;
+ int shutdown_retries;
+ __u32 next_tsn;
+ __u32 ctsn_ack_point;
+ __u32 adv_peer_ack_point;
+ __u32 highest_sacked;
+ __u32 fast_recovery_exit;
+ __u8 fast_recovery;
+ __u16 unack_data;
+ __u32 rtx_data_chunks;
+ __u32 rwnd;
+ __u32 a_rwnd;
+ __u32 rwnd_over;
+ __u32 rwnd_press;
+ int sndbuf_used;
+ atomic_t rmem_alloc;
+ wait_queue_head_t wait;
+ __u32 frag_point;
+ __u32 user_frag;
+ int init_err_counter;
+ int init_cycle;
+ __u16 default_stream;
+ __u16 default_flags;
+ __u32 default_ppid;
+ __u32 default_context;
+ __u32 default_timetolive;
+ __u32 default_rcv_context;
+ struct sctp_stream stream;
+ struct sctp_outq outqueue;
+ struct sctp_ulpq ulpq;
+ __u32 last_ecne_tsn;
+ __u32 last_cwr_tsn;
+ int numduptsns;
+ struct sctp_chunk *addip_last_asconf;
+ struct list_head asconf_ack_list;
+ struct list_head addip_chunk_list;
+ __u32 addip_serial;
+ int src_out_of_asoc_ok;
+ union sctp_addr *asconf_addr_del_pending;
+ struct sctp_transport *new_transport;
+ struct list_head endpoint_shared_keys;
+ struct sctp_auth_bytes *asoc_shared_key;
+ struct sctp_shared_key *shkey;
+ __u16 default_hmac_id;
+ __u16 active_key_id;
+ __u8 need_ecne: 1;
+ __u8 temp: 1;
+ __u8 pf_expose: 2;
+ __u8 force_delay: 1;
+ __u8 strreset_enable;
+ __u8 strreset_outstanding;
+ __u32 strreset_outseq;
+ __u32 strreset_inseq;
+ __u32 strreset_result[2];
+ struct sctp_chunk *strreset_chunk;
+ struct sctp_priv_assoc_stats stats;
+ int sent_cnt_removable;
+ __u16 subscribe;
+ __u64 abandoned_unsent[3];
+ __u64 abandoned_sent[3];
+ u32 secid;
+ u32 peer_secid;
+ struct callback_head rcu;
+};
+
+struct tty_file_private {
+ struct tty_struct *tty;
+ struct file *file;
+ struct list_head list;
+};
+
+struct sctp_initmsg {
+ __u16 sinit_num_ostreams;
+ __u16 sinit_max_instreams;
+ __u16 sinit_max_attempts;
+ __u16 sinit_max_init_timeo;
+};
+
+struct sctp_sndrcvinfo {
+ __u16 sinfo_stream;
+ __u16 sinfo_ssn;
+ __u16 sinfo_flags;
+ __u32 sinfo_ppid;
+ __u32 sinfo_context;
+ __u32 sinfo_timetolive;
+ __u32 sinfo_tsn;
+ __u32 sinfo_cumtsn;
+ sctp_assoc_t sinfo_assoc_id;
+};
+
+struct sctp_rtoinfo {
+ sctp_assoc_t srto_assoc_id;
+ __u32 srto_initial;
+ __u32 srto_max;
+ __u32 srto_min;
+};
+
+struct sctp_assocparams {
+ sctp_assoc_t sasoc_assoc_id;
+ __u16 sasoc_asocmaxrxt;
+ __u16 sasoc_number_peer_destinations;
+ __u32 sasoc_peer_rwnd;
+ __u32 sasoc_local_rwnd;
+ __u32 sasoc_cookie_life;
+};
+
+struct sctp_paddrparams {
+ sctp_assoc_t spp_assoc_id;
+ struct __kernel_sockaddr_storage spp_address;
+ __u32 spp_hbinterval;
+ __u16 spp_pathmaxrxt;
+ __u32 spp_pathmtu;
+ __u32 spp_sackdelay;
+ __u32 spp_flags;
+ __u32 spp_ipv6_flowlabel;
+ __u8 spp_dscp;
+ char: 8;
+} __attribute__((packed));
+
+struct sctp_paramhdr {
+ __be16 type;
+ __be16 length;
+};
+
+enum sctp_param {
+ SCTP_PARAM_HEARTBEAT_INFO = 256,
+ SCTP_PARAM_IPV4_ADDRESS = 1280,
+ SCTP_PARAM_IPV6_ADDRESS = 1536,
+ SCTP_PARAM_STATE_COOKIE = 1792,
+ SCTP_PARAM_UNRECOGNIZED_PARAMETERS = 2048,
+ SCTP_PARAM_COOKIE_PRESERVATIVE = 2304,
+ SCTP_PARAM_HOST_NAME_ADDRESS = 2816,
+ SCTP_PARAM_SUPPORTED_ADDRESS_TYPES = 3072,
+ SCTP_PARAM_ECN_CAPABLE = 128,
+ SCTP_PARAM_RANDOM = 640,
+ SCTP_PARAM_CHUNKS = 896,
+ SCTP_PARAM_HMAC_ALGO = 1152,
+ SCTP_PARAM_SUPPORTED_EXT = 2176,
+ SCTP_PARAM_FWD_TSN_SUPPORT = 192,
+ SCTP_PARAM_ADD_IP = 448,
+ SCTP_PARAM_DEL_IP = 704,
+ SCTP_PARAM_ERR_CAUSE = 960,
+ SCTP_PARAM_SET_PRIMARY = 1216,
+ SCTP_PARAM_SUCCESS_REPORT = 1472,
+ SCTP_PARAM_ADAPTATION_LAYER_IND = 1728,
+ SCTP_PARAM_RESET_OUT_REQUEST = 3328,
+ SCTP_PARAM_RESET_IN_REQUEST = 3584,
+ SCTP_PARAM_RESET_TSN_REQUEST = 3840,
+ SCTP_PARAM_RESET_RESPONSE = 4096,
+ SCTP_PARAM_RESET_ADD_OUT_STREAMS = 4352,
+ SCTP_PARAM_RESET_ADD_IN_STREAMS = 4608,
+};
+
+struct sctp_datahdr {
+ __be32 tsn;
+ __be16 stream;
+ __be16 ssn;
+ __u32 ppid;
+ __u8 payload[0];
+};
+
+struct sctp_idatahdr {
+ __be32 tsn;
+ __be16 stream;
+ __be16 reserved;
+ __be32 mid;
+ union {
+ __u32 ppid;
+ __be32 fsn;
+ };
+ __u8 payload[0];
+};
+
+struct sctp_ipv4addr_param {
+ struct sctp_paramhdr param_hdr;
+ struct in_addr addr;
+};
+
+struct sctp_ipv6addr_param {
+ struct sctp_paramhdr param_hdr;
+ struct in6_addr addr;
+};
+
+struct sctp_cookie_preserve_param {
+ struct sctp_paramhdr param_hdr;
+ __be32 lifespan_increment;
+};
+
+struct sctp_hostname_param {
+ struct sctp_paramhdr param_hdr;
+ uint8_t hostname[0];
+};
+
+struct sctp_supported_addrs_param {
+ struct sctp_paramhdr param_hdr;
+ __be16 types[0];
+};
+
+struct sctp_adaptation_ind_param {
+ struct sctp_paramhdr param_hdr;
+ __be32 adaptation_ind;
+};
+
+struct sctp_supported_ext_param {
+ struct sctp_paramhdr param_hdr;
+ __u8 chunks[0];
+};
+
+struct sctp_random_param {
+ struct sctp_paramhdr param_hdr;
+ __u8 random_val[0];
+};
+
+struct sctp_chunks_param {
+ struct sctp_paramhdr param_hdr;
+ __u8 chunks[0];
+};
+
+struct sctp_hmac_algo_param {
+ struct sctp_paramhdr param_hdr;
+ __be16 hmac_ids[0];
+};
+
+struct sctp_cookie_param {
+ struct sctp_paramhdr p;
+ __u8 body[0];
+};
+
+struct sctp_gap_ack_block {
+ __be16 start;
+ __be16 end;
+};
+
+union sctp_sack_variable {
+ struct sctp_gap_ack_block gab;
+ __be32 dup;
+};
+
+struct sctp_sackhdr {
+ __be32 cum_tsn_ack;
+ __be32 a_rwnd;
+ __be16 num_gap_ack_blocks;
+ __be16 num_dup_tsns;
+ union sctp_sack_variable variable[0];
+};
+
+struct sctp_heartbeathdr {
+ struct sctp_paramhdr info;
+};
+
+struct sctp_shutdownhdr {
+ __be32 cum_tsn_ack;
+};
+
+struct sctp_errhdr {
+ __be16 cause;
+ __be16 length;
+ __u8 variable[0];
+};
+
+struct sctp_ecnehdr {
+ __be32 lowest_tsn;
+};
+
+struct sctp_cwrhdr {
+ __be32 lowest_tsn;
+};
+
+struct sctp_fwdtsn_skip {
+ __be16 stream;
+ __be16 ssn;
+};
+
+struct sctp_fwdtsn_hdr {
+ __be32 new_cum_tsn;
+ struct sctp_fwdtsn_skip skip[0];
+};
+
+struct sctp_ifwdtsn_skip {
+ __be16 stream;
+ __u8 reserved;
+ __u8 flags;
+ __be32 mid;
+};
+
+struct sctp_ifwdtsn_hdr {
+ __be32 new_cum_tsn;
+ struct sctp_ifwdtsn_skip skip[0];
+};
+
+struct sctp_addip_param {
+ struct sctp_paramhdr param_hdr;
+ __be32 crr_id;
+};
+
+struct sctp_addiphdr {
+ __be32 serial;
+ __u8 params[0];
+};
+
+struct sctp_authhdr {
+ __be16 shkey_id;
+ __be16 hmac_id;
+ __u8 hmac[0];
+};
+
+struct sctp_auth_bytes {
+ refcount_t refcnt;
+ __u32 len;
+ __u8 data[0];
+};
+
+struct sctp_shared_key {
+ struct list_head key_list;
+ struct sctp_auth_bytes *key;
+ refcount_t refcnt;
+ __u16 key_id;
+ __u8 deactivated;
+};
+
+enum sctp_scope {
+ SCTP_SCOPE_GLOBAL = 0,
+ SCTP_SCOPE_PRIVATE = 1,
+ SCTP_SCOPE_LINK = 2,
+ SCTP_SCOPE_LOOPBACK = 3,
+ SCTP_SCOPE_UNUSABLE = 4,
+};
+
+struct sctp_ulpevent {
+ struct sctp_association *asoc;
+ struct sctp_chunk *chunk;
+ unsigned int rmem_len;
+ union {
+ __u32 mid;
+ __u16 ssn;
+ };
+ union {
+ __u32 ppid;
+ __u32 fsn;
+ };
+ __u32 tsn;
+ __u32 cumtsn;
+ __u16 stream;
+ __u16 flags;
+ __u16 msg_flags;
+} __attribute__((packed));
+
+union sctp_addr_param;
+
+union sctp_params {
+ void *v;
+ struct sctp_paramhdr *p;
+ struct sctp_cookie_preserve_param *life;
+ struct sctp_hostname_param *dns;
+ struct sctp_cookie_param *cookie;
+ struct sctp_supported_addrs_param *sat;
+ struct sctp_ipv4addr_param *v4;
+ struct sctp_ipv6addr_param *v6;
+ union sctp_addr_param *addr;
+ struct sctp_adaptation_ind_param *aind;
+ struct sctp_supported_ext_param *ext;
+ struct sctp_random_param *random;
+ struct sctp_chunks_param *chunks;
+ struct sctp_hmac_algo_param *hmac_algo;
+ struct sctp_addip_param *addip;
+};
+
+struct sctp_sender_hb_info;
+
+struct sctp_signed_cookie;
+
+struct sctp_datamsg;
+
+struct sctp_chunk {
+ struct list_head list;
+ refcount_t refcnt;
+ int sent_count;
+ union {
+ struct list_head transmitted_list;
+ struct list_head stream_list;
+ };
+ struct list_head frag_list;
+ struct sk_buff *skb;
+ union {
+ struct sk_buff *head_skb;
+ struct sctp_shared_key *shkey;
+ };
+ union sctp_params param_hdr;
+ union {
+ __u8 *v;
+ struct sctp_datahdr *data_hdr;
+ struct sctp_inithdr *init_hdr;
+ struct sctp_sackhdr *sack_hdr;
+ struct sctp_heartbeathdr *hb_hdr;
+ struct sctp_sender_hb_info *hbs_hdr;
+ struct sctp_shutdownhdr *shutdown_hdr;
+ struct sctp_signed_cookie *cookie_hdr;
+ struct sctp_ecnehdr *ecne_hdr;
+ struct sctp_cwrhdr *ecn_cwr_hdr;
+ struct sctp_errhdr *err_hdr;
+ struct sctp_addiphdr *addip_hdr;
+ struct sctp_fwdtsn_hdr *fwdtsn_hdr;
+ struct sctp_authhdr *auth_hdr;
+ struct sctp_idatahdr *idata_hdr;
+ struct sctp_ifwdtsn_hdr *ifwdtsn_hdr;
+ } subh;
+ __u8 *chunk_end;
+ struct sctp_chunkhdr *chunk_hdr;
+ struct sctphdr *sctp_hdr;
+ struct sctp_sndrcvinfo sinfo;
+ struct sctp_association *asoc;
+ struct sctp_ep_common *rcvr;
+ long unsigned int sent_at;
+ union sctp_addr source;
+ union sctp_addr dest;
+ struct sctp_datamsg *msg;
+ struct sctp_transport *transport;
+ struct sk_buff *auth_chunk;
+ __u16 rtt_in_progress: 1;
+ __u16 has_tsn: 1;
+ __u16 has_ssn: 1;
+ __u16 singleton: 1;
+ __u16 end_of_packet: 1;
+ __u16 ecn_ce_done: 1;
+ __u16 pdiscard: 1;
+ __u16 tsn_gap_acked: 1;
+ __u16 data_accepted: 1;
+ __u16 auth: 1;
+ __u16 has_asconf: 1;
+ __u16 pmtu_probe: 1;
+ __u16 tsn_missing_report: 2;
+ __u16 fast_retransmit: 2;
+};
+
+struct sctp_stream_interleave {
+ __u16 data_chunk_len;
+ __u16 ftsn_chunk_len;
+ struct sctp_chunk * (*make_datafrag)(const struct sctp_association *, const struct sctp_sndrcvinfo *, int, __u8, gfp_t);
+ void (*assign_number)(struct sctp_chunk *);
+ bool (*validate_data)(struct sctp_chunk *);
+ int (*ulpevent_data)(struct sctp_ulpq *, struct sctp_chunk *, gfp_t);
+ int (*enqueue_event)(struct sctp_ulpq *, struct sctp_ulpevent *);
+ void (*renege_events)(struct sctp_ulpq *, struct sctp_chunk *, gfp_t);
+ void (*start_pd)(struct sctp_ulpq *, gfp_t);
+ void (*abort_pd)(struct sctp_ulpq *, gfp_t);
+ void (*generate_ftsn)(struct sctp_outq *, __u32);
+ bool (*validate_ftsn)(struct sctp_chunk *);
+ void (*report_ftsn)(struct sctp_ulpq *, __u32);
+ void (*handle_ftsn)(struct sctp_ulpq *, struct sctp_chunk *);
+};
+
+struct sctp_bind_bucket {
+ short unsigned int port;
+ signed char fastreuse;
+ signed char fastreuseport;
+ kuid_t fastuid;
+ struct hlist_node node;
+ struct hlist_head owner;
+ struct net *net;
+};
+
+enum sctp_socket_type {
+ SCTP_SOCKET_UDP = 0,
+ SCTP_SOCKET_UDP_HIGH_BANDWIDTH = 1,
+ SCTP_SOCKET_TCP = 2,
+};
+
+struct crypto_shash;
+
+struct sctp_pf;
+
+struct sctp_sock {
+ struct inet_sock inet;
+ enum sctp_socket_type type;
+ int: 32;
+ struct sctp_pf *pf;
+ struct crypto_shash *hmac;
+ char *sctp_hmac_alg;
+ struct sctp_endpoint *ep;
+ struct sctp_bind_bucket *bind_hash;
+ __u16 default_stream;
+ short: 16;
+ __u32 default_ppid;
+ __u16 default_flags;
+ short: 16;
+ __u32 default_context;
+ __u32 default_timetolive;
+ __u32 default_rcv_context;
+ int max_burst;
+ __u32 hbinterval;
+ __u32 probe_interval;
+ __be16 udp_port;
+ __be16 encap_port;
+ __u16 pathmaxrxt;
+ short: 16;
+ __u32 flowlabel;
+ __u8 dscp;
+ char: 8;
+ __u16 pf_retrans;
+ __u16 ps_retrans;
+ short: 16;
+ __u32 pathmtu;
+ __u32 sackdelay;
+ __u32 sackfreq;
+ __u32 param_flags;
+ __u32 default_ss;
+ struct sctp_rtoinfo rtoinfo;
+ struct sctp_paddrparams paddrparam;
+ struct sctp_assocparams assocparams;
+ __u16 subscribe;
+ struct sctp_initmsg initmsg;
+ short: 16;
+ int user_frag;
+ __u32 autoclose;
+ __u32 adaptation_ind;
+ __u32 pd_point;
+ __u16 nodelay: 1;
+ __u16 pf_expose: 2;
+ __u16 reuse: 1;
+ __u16 disable_fragments: 1;
+ __u16 v4mapped: 1;
+ __u16 frag_interleave: 1;
+ __u16 recvrcvinfo: 1;
+ __u16 recvnxtinfo: 1;
+ __u16 data_ready_signalled: 1;
+ int: 22;
+ atomic_t pd_mode;
+ struct sk_buff_head pd_lobby;
+ struct list_head auto_asconf_list;
+ int do_auto_asconf;
+ int: 32;
+} __attribute__((packed));
+
+struct sctp_af;
+
+struct sctp_pf {
+ void (*event_msgname)(struct sctp_ulpevent *, char *, int *);
+ void (*skb_msgname)(struct sk_buff *, char *, int *);
+ int (*af_supported)(sa_family_t, struct sctp_sock *);
+ int (*cmp_addr)(const union sctp_addr *, const union sctp_addr *, struct sctp_sock *);
+ int (*bind_verify)(struct sctp_sock *, union sctp_addr *);
+ int (*send_verify)(struct sctp_sock *, union sctp_addr *);
+ int (*supported_addrs)(const struct sctp_sock *, __be16 *);
+ struct sock * (*create_accept_sk)(struct sock *, struct sctp_association *, bool);
+ int (*addr_to_user)(struct sctp_sock *, union sctp_addr *);
+ void (*to_sk_saddr)(union sctp_addr *, struct sock *);
+ void (*to_sk_daddr)(union sctp_addr *, struct sock *);
+ void (*copy_ip_options)(struct sock *, struct sock *);
+ struct sctp_af *af;
+};
+
+struct sctp_endpoint {
+ struct sctp_ep_common base;
+ struct hlist_node node;
+ int hashent;
+ struct list_head asocs;
+ __u8 secret_key[32];
+ __u8 *digest;
+ __u32 sndbuf_policy;
+ __u32 rcvbuf_policy;
+ struct crypto_shash **auth_hmacs;
+ struct sctp_hmac_algo_param *auth_hmacs_list;
+ struct sctp_chunks_param *auth_chunk_list;
+ struct list_head endpoint_shared_keys;
+ __u16 active_key_id;
+ __u8 ecn_enable: 1;
+ __u8 auth_enable: 1;
+ __u8 intl_enable: 1;
+ __u8 prsctp_enable: 1;
+ __u8 asconf_enable: 1;
+ __u8 reconf_enable: 1;
+ __u8 strreset_enable;
+ struct callback_head rcu;
+};
+
+struct sctp_signed_cookie {
+ __u8 signature[32];
+ __u32 __pad;
+ struct sctp_cookie c;
+} __attribute__((packed));
+
+union sctp_addr_param {
+ struct sctp_paramhdr p;
+ struct sctp_ipv4addr_param v4;
+ struct sctp_ipv6addr_param v6;
+};
+
+struct sctp_sender_hb_info {
+ struct sctp_paramhdr param_hdr;
+ union sctp_addr daddr;
+ long unsigned int sent_at;
+ __u64 hb_nonce;
+ __u32 probe_size;
+};
+
+struct sctp_af {
+ int (*sctp_xmit)(struct sk_buff *, struct sctp_transport *);
+ int (*setsockopt)(struct sock *, int, int, sockptr_t, unsigned int);
+ int (*getsockopt)(struct sock *, int, int, char *, int *);
+ void (*get_dst)(struct sctp_transport *, union sctp_addr *, struct flowi *, struct sock *);
+ void (*get_saddr)(struct sctp_sock *, struct sctp_transport *, struct flowi *);
+ void (*copy_addrlist)(struct list_head *, struct net_device *);
+ int (*cmp_addr)(const union sctp_addr *, const union sctp_addr *);
+ void (*addr_copy)(union sctp_addr *, union sctp_addr *);
+ void (*from_skb)(union sctp_addr *, struct sk_buff *, int);
+ void (*from_sk)(union sctp_addr *, struct sock *);
+ bool (*from_addr_param)(union sctp_addr *, union sctp_addr_param *, __be16, int);
+ int (*to_addr_param)(const union sctp_addr *, union sctp_addr_param *);
+ int (*addr_valid)(union sctp_addr *, struct sctp_sock *, const struct sk_buff *);
+ enum sctp_scope (*scope)(union sctp_addr *);
+ void (*inaddr_any)(union sctp_addr *, __be16);
+ int (*is_any)(const union sctp_addr *);
+ int (*available)(union sctp_addr *, struct sctp_sock *);
+ int (*skb_iif)(const struct sk_buff *);
+ int (*skb_sdif)(const struct sk_buff *);
+ int (*is_ce)(const struct sk_buff *);
+ void (*seq_dump_addr)(struct seq_file *, union sctp_addr *);
+ void (*ecn_capable)(struct sock *);
+ __u16 net_header_len;
+ int sockaddr_len;
+ int (*ip_options_len)(struct sock *);
+ sa_family_t sa_family;
+ struct list_head list;
+};
+
+struct sctp_packet {
+ __u16 source_port;
+ __u16 destination_port;
+ __u32 vtag;
+ struct list_head chunk_list;
+ size_t overhead;
+ size_t size;
+ size_t max_size;
+ struct sctp_transport *transport;
+ struct sctp_chunk *auth;
+ u8 has_cookie_echo: 1;
+ u8 has_sack: 1;
+ u8 has_auth: 1;
+ u8 has_data: 1;
+ u8 ipfragok: 1;
+};
+
+struct sctp_transport {
+ struct list_head transports;
+ struct rhlist_head node;
+ refcount_t refcnt;
+ __u32 rto_pending: 1;
+ __u32 hb_sent: 1;
+ __u32 pmtu_pending: 1;
+ __u32 dst_pending_confirm: 1;
+ __u32 sack_generation: 1;
+ u32 dst_cookie;
+ struct flowi fl;
+ union sctp_addr ipaddr;
+ struct sctp_af *af_specific;
+ struct sctp_association *asoc;
+ long unsigned int rto;
+ __u32 rtt;
+ __u32 rttvar;
+ __u32 srtt;
+ __u32 cwnd;
+ __u32 ssthresh;
+ __u32 partial_bytes_acked;
+ __u32 flight_size;
+ __u32 burst_limited;
+ struct dst_entry *dst;
+ union sctp_addr saddr;
+ long unsigned int hbinterval;
+ long unsigned int probe_interval;
+ long unsigned int sackdelay;
+ __u32 sackfreq;
+ atomic_t mtu_info;
+ ktime_t last_time_heard;
+ long unsigned int last_time_sent;
+ long unsigned int last_time_ecne_reduced;
+ __be16 encap_port;
+ __u16 pathmaxrxt;
+ __u32 flowlabel;
+ __u8 dscp;
+ __u16 pf_retrans;
+ __u16 ps_retrans;
+ __u32 pathmtu;
+ __u32 param_flags;
+ int init_sent_count;
+ int state;
+ short unsigned int error_count;
+ struct timer_list T3_rtx_timer;
+ struct timer_list hb_timer;
+ struct timer_list proto_unreach_timer;
+ struct timer_list reconf_timer;
+ struct timer_list probe_timer;
+ struct list_head transmitted;
+ struct sctp_packet packet;
+ struct list_head send_ready;
+ struct {
+ __u32 next_tsn_at_change;
+ char changeover_active;
+ char cycling_changeover;
+ char cacc_saw_newack;
+ } cacc;
+ struct {
+ __u16 pmtu;
+ __u16 probe_size;
+ __u16 probe_high;
+ __u8 probe_count;
+ __u8 state;
+ } pl;
+ __u64 hb_nonce;
+ struct callback_head rcu;
+};
+
+struct sctp_datamsg {
+ struct list_head chunks;
+ refcount_t refcnt;
+ long unsigned int expires_at;
+ int send_error;
+ u8 send_failed: 1;
+ u8 can_delay: 1;
+ u8 abandoned: 1;
+};
+
+struct sctp_stream_priorities {
+ struct list_head prio_sched;
+ struct list_head active;
+ struct sctp_stream_out_ext *next;
+ __u16 prio;
+};
+
+struct sctp_stream_out_ext {
+ __u64 abandoned_unsent[3];
+ __u64 abandoned_sent[3];
+ struct list_head outq;
+ union {
+ struct {
+ struct list_head prio_list;
+ struct sctp_stream_priorities *prio_head;
+ };
+ struct {
+ struct list_head rr_list;
+ };
+ };
+};
+
+struct file_security_struct {
+ u32 sid;
+ u32 fown_sid;
+ u32 isid;
+ u32 pseqno;
+};
+
+struct msg_security_struct {
+ u32 sid;
+};
+
+struct ipc_security_struct {
+ u16 sclass;
+ u32 sid;
+};
+
+struct sk_security_struct {
+ enum {
+ NLBL_UNSET = 0,
+ NLBL_REQUIRE = 1,
+ NLBL_LABELED = 2,
+ NLBL_REQSKB = 3,
+ NLBL_CONNLABELED = 4,
+ } nlbl_state;
+ struct netlbl_lsm_secattr *nlbl_secattr;
+ u32 sid;
+ u32 peer_sid;
+ u16 sclass;
+ enum {
+ SCTP_ASSOC_UNSET = 0,
+ SCTP_ASSOC_SET = 1,
+ } sctp_assoc_state;
+};
+
+struct tun_security_struct {
+ u32 sid;
+};
+
+struct key_security_struct {
+ u32 sid;
+};
+
+struct bpf_security_struct {
+ u32 sid;
+};
+
+struct perf_event_security_struct {
+ u32 sid;
+};
+
+struct selinux_mnt_opts {
+ u32 fscontext_sid;
+ u32 context_sid;
+ u32 rootcontext_sid;
+ u32 defcontext_sid;
+};
+
+enum {
+ Opt_error = -1,
+ Opt_context = 0,
+ Opt_defcontext = 1,
+ Opt_fscontext = 2,
+ Opt_rootcontext = 3,
+ Opt_seclabel = 4,
+};
+
+struct xfrm_tunnel {
+ int (*handler)(struct sk_buff *);
+ int (*cb_handler)(struct sk_buff *, int);
+ int (*err_handler)(struct sk_buff *, u32);
+ struct xfrm_tunnel *next;
+ int priority;
+};
+
+enum {
+ IFLA_INET6_UNSPEC = 0,
+ IFLA_INET6_FLAGS = 1,
+ IFLA_INET6_CONF = 2,
+ IFLA_INET6_STATS = 3,
+ IFLA_INET6_MCAST = 4,
+ IFLA_INET6_CACHEINFO = 5,
+ IFLA_INET6_ICMP6STATS = 6,
+ IFLA_INET6_TOKEN = 7,
+ IFLA_INET6_ADDR_GEN_MODE = 8,
+ IFLA_INET6_RA_MTU = 9,
+ __IFLA_INET6_MAX = 10,
+};
+
+enum in6_addr_gen_mode {
+ IN6_ADDR_GEN_MODE_EUI64 = 0,
+ IN6_ADDR_GEN_MODE_NONE = 1,
+ IN6_ADDR_GEN_MODE_STABLE_PRIVACY = 2,
+ IN6_ADDR_GEN_MODE_RANDOM = 3,
+};
+
+struct ifla_cacheinfo {
+ __u32 max_reasm_len;
+ __u32 tstamp;
+ __u32 reachable_time;
+ __u32 retrans_time;
+};
+
+struct prefixmsg {
+ unsigned char prefix_family;
+ unsigned char prefix_pad1;
+ short unsigned int prefix_pad2;
+ int prefix_ifindex;
+ unsigned char prefix_type;
+ unsigned char prefix_len;
+ unsigned char prefix_flags;
+ unsigned char prefix_pad3;
+};
+
+enum {
+ PREFIX_UNSPEC = 0,
+ PREFIX_ADDRESS = 1,
+ PREFIX_CACHEINFO = 2,
+ __PREFIX_MAX = 3,
+};
+
+struct prefix_cacheinfo {
+ __u32 preferred_time;
+ __u32 valid_time;
+};
+
+struct in6_ifreq {
+ struct in6_addr ifr6_addr;
+ __u32 ifr6_prefixlen;
+ int ifr6_ifindex;
+};
+
+enum {
+ DEVCONF_FORWARDING = 0,
+ DEVCONF_HOPLIMIT = 1,
+ DEVCONF_MTU6 = 2,
+ DEVCONF_ACCEPT_RA = 3,
+ DEVCONF_ACCEPT_REDIRECTS = 4,
+ DEVCONF_AUTOCONF = 5,
+ DEVCONF_DAD_TRANSMITS = 6,
+ DEVCONF_RTR_SOLICITS = 7,
+ DEVCONF_RTR_SOLICIT_INTERVAL = 8,
+ DEVCONF_RTR_SOLICIT_DELAY = 9,
+ DEVCONF_USE_TEMPADDR = 10,
+ DEVCONF_TEMP_VALID_LFT = 11,
+ DEVCONF_TEMP_PREFERED_LFT = 12,
+ DEVCONF_REGEN_MAX_RETRY = 13,
+ DEVCONF_MAX_DESYNC_FACTOR = 14,
+ DEVCONF_MAX_ADDRESSES = 15,
+ DEVCONF_FORCE_MLD_VERSION = 16,
+ DEVCONF_ACCEPT_RA_DEFRTR = 17,
+ DEVCONF_ACCEPT_RA_PINFO = 18,
+ DEVCONF_ACCEPT_RA_RTR_PREF = 19,
+ DEVCONF_RTR_PROBE_INTERVAL = 20,
+ DEVCONF_ACCEPT_RA_RT_INFO_MAX_PLEN = 21,
+ DEVCONF_PROXY_NDP = 22,
+ DEVCONF_OPTIMISTIC_DAD = 23,
+ DEVCONF_ACCEPT_SOURCE_ROUTE = 24,
+ DEVCONF_MC_FORWARDING = 25,
+ DEVCONF_DISABLE_IPV6 = 26,
+ DEVCONF_ACCEPT_DAD = 27,
+ DEVCONF_FORCE_TLLAO = 28,
+ DEVCONF_NDISC_NOTIFY = 29,
+ DEVCONF_MLDV1_UNSOLICITED_REPORT_INTERVAL = 30,
+ DEVCONF_MLDV2_UNSOLICITED_REPORT_INTERVAL = 31,
+ DEVCONF_SUPPRESS_FRAG_NDISC = 32,
+ DEVCONF_ACCEPT_RA_FROM_LOCAL = 33,
+ DEVCONF_USE_OPTIMISTIC = 34,
+ DEVCONF_ACCEPT_RA_MTU = 35,
+ DEVCONF_STABLE_SECRET = 36,
+ DEVCONF_USE_OIF_ADDRS_ONLY = 37,
+ DEVCONF_ACCEPT_RA_MIN_HOP_LIMIT = 38,
+ DEVCONF_IGNORE_ROUTES_WITH_LINKDOWN = 39,
+ DEVCONF_DROP_UNICAST_IN_L2_MULTICAST = 40,
+ DEVCONF_DROP_UNSOLICITED_NA = 41,
+ DEVCONF_KEEP_ADDR_ON_DOWN = 42,
+ DEVCONF_RTR_SOLICIT_MAX_INTERVAL = 43,
+ DEVCONF_SEG6_ENABLED = 44,
+ DEVCONF_SEG6_REQUIRE_HMAC = 45,
+ DEVCONF_ENHANCED_DAD = 46,
+ DEVCONF_ADDR_GEN_MODE = 47,
+ DEVCONF_DISABLE_POLICY = 48,
+ DEVCONF_ACCEPT_RA_RT_INFO_MIN_PLEN = 49,
+ DEVCONF_NDISC_TCLASS = 50,
+ DEVCONF_RPL_SEG_ENABLED = 51,
+ DEVCONF_RA_DEFRTR_METRIC = 52,
+ DEVCONF_IOAM6_ENABLED = 53,
+ DEVCONF_IOAM6_ID = 54,
+ DEVCONF_IOAM6_ID_WIDE = 55,
+ DEVCONF_NDISC_EVICT_NOCARRIER = 56,
+ DEVCONF_ACCEPT_UNTRACKED_NA = 57,
+ DEVCONF_MAX = 58,
+};
+
+struct ipv6_params {
+ __s32 disable_ipv6;
+ __s32 autoconf;
+};
+
+enum {
+ INET6_IFADDR_STATE_PREDAD = 0,
+ INET6_IFADDR_STATE_DAD = 1,
+ INET6_IFADDR_STATE_POSTDAD = 2,
+ INET6_IFADDR_STATE_ERRDAD = 3,
+ INET6_IFADDR_STATE_DEAD = 4,
+};
+
+union fwnet_hwaddr {
+ u8 u[16];
+ struct {
+ __be64 uniq_id;
+ u8 max_rec;
+ u8 sspd;
+ u8 fifo[6];
+ } uc;
+};
+
+struct in6_validator_info {
+ struct in6_addr i6vi_addr;
+ struct inet6_dev *i6vi_dev;
+ struct netlink_ext_ack *extack;
+};
+
+struct ifa6_config {
+ const struct in6_addr *pfx;
+ unsigned int plen;
+ u8 ifa_proto;
+ const struct in6_addr *peer_pfx;
+ u32 rt_priority;
+ u32 ifa_flags;
+ u32 preferred_lft;
+ u32 valid_lft;
+ u16 scope;
+};
+
+enum cleanup_prefix_rt_t {
+ CLEANUP_PREFIX_RT_NOP = 0,
+ CLEANUP_PREFIX_RT_DEL = 1,
+ CLEANUP_PREFIX_RT_EXPIRE = 2,
+};
+
+enum {
+ IPV6_SADDR_RULE_INIT = 0,
+ IPV6_SADDR_RULE_LOCAL = 1,
+ IPV6_SADDR_RULE_SCOPE = 2,
+ IPV6_SADDR_RULE_PREFERRED = 3,
+ IPV6_SADDR_RULE_HOA = 4,
+ IPV6_SADDR_RULE_OIF = 5,
+ IPV6_SADDR_RULE_LABEL = 6,
+ IPV6_SADDR_RULE_PRIVACY = 7,
+ IPV6_SADDR_RULE_ORCHID = 8,
+ IPV6_SADDR_RULE_PREFIX = 9,
+ IPV6_SADDR_RULE_MAX = 10,
+};
+
+struct ipv6_saddr_score {
+ int rule;
+ int addr_type;
+ struct inet6_ifaddr *ifa;
+ long unsigned int scorebits[1];
+ int scopedist;
+ int matchlen;
+};
+
+struct ipv6_saddr_dst {
+ const struct in6_addr *addr;
+ int ifindex;
+ int scope;
+ int label;
+ unsigned int prefs;
+};
+
+struct if6_iter_state {
+ struct seq_net_private p;
+ int bucket;
+ int offset;
+};
+
+enum addr_type_t {
+ UNICAST_ADDR = 0,
+ MULTICAST_ADDR = 1,
+ ANYCAST_ADDR = 2,
+};
+
+struct inet6_fill_args {
+ u32 portid;
+ u32 seq;
+ int event;
+ unsigned int flags;
+ int netnsid;
+ int ifindex;
+ enum addr_type_t type;
+};
+
+enum {
+ DAD_PROCESS = 0,
+ DAD_BEGIN = 1,
+ DAD_ABORT = 2,
+};
+
+typedef __u32 Elf32_Addr;
+
+typedef __u16 Elf32_Half;
+
+typedef __u32 Elf32_Off;
+
+struct elf32_hdr {
+ unsigned char e_ident[16];
+ Elf32_Half e_type;
+ Elf32_Half e_machine;
+ Elf32_Word e_version;
+ Elf32_Addr e_entry;
+ Elf32_Off e_phoff;
+ Elf32_Off e_shoff;
+ Elf32_Word e_flags;
+ Elf32_Half e_ehsize;
+ Elf32_Half e_phentsize;
+ Elf32_Half e_phnum;
+ Elf32_Half e_shentsize;
+ Elf32_Half e_shnum;
+ Elf32_Half e_shstrndx;
+};
+
+typedef struct elf32_hdr Elf32_Ehdr;
+
+struct elf32_phdr {
+ Elf32_Word p_type;
+ Elf32_Off p_offset;
+ Elf32_Addr p_vaddr;
+ Elf32_Addr p_paddr;
+ Elf32_Word p_filesz;
+ Elf32_Word p_memsz;
+ Elf32_Word p_flags;
+ Elf32_Word p_align;
+};
+
+typedef struct elf32_phdr Elf32_Phdr;
+
+typedef struct elf64_phdr Elf64_Phdr;
+
+typedef struct elf32_note Elf32_Nhdr;
+
+struct tsc_adjust {
+ s64 bootval;
+ s64 adjusted;
+ long unsigned int nextcheck;
+ bool warned;
+};
+
+struct agp_kern_info {
+ struct agp_version version;
+ struct pci_dev *device;
+ enum chipset_type chipset;
+ long unsigned int mode;
+ long unsigned int aper_base;
+ size_t aper_size;
+ int max_memory;
+ int current_memory;
+ bool cant_use_aperture;
+ long unsigned int page_mask;
+ const struct vm_operations_struct *vm_ops;
+};
+
+struct agp_bridge_data;
+
+typedef struct vfsmount * (*debugfs_automount_t)(struct dentry *, void *);
+
+struct trace_export {
+ struct trace_export *next;
+ void (*write)(struct trace_export *, const void *, unsigned int);
+ int flags;
+};
+
+typedef bool (*cond_update_fn_t)(struct trace_array *, void *);
+
+struct trace_parser {
+ bool cont;
+ char *buffer;
+ unsigned int idx;
+ unsigned int size;
+};
+
+struct trace_min_max_param {
+ struct mutex *lock;
+ u64 *val;
+ u64 *min;
+ u64 *max;
+};
+
+struct saved_cmdlines_buffer {
+ unsigned int map_pid_to_cmdline[32769];
+ unsigned int *map_cmdline_to_pid;
+ unsigned int cmdline_num;
+ int cmdline_idx;
+ char *saved_cmdlines;
+};
+
+struct ftrace_stack {
+ long unsigned int calls[1024];
+};
+
+struct ftrace_stacks {
+ struct ftrace_stack stacks[4];
+};
+
+struct trace_buffer_struct {
+ int nesting;
+ char buffer[4096];
+};
+
+struct ftrace_buffer_info {
+ struct trace_iterator iter;
+ void *spare;
+ unsigned int spare_cpu;
+ unsigned int read;
+};
+
+struct err_info {
+ const char **errs;
+ u8 type;
+ u16 pos;
+ u64 ts;
+};
+
+struct tracing_log_err {
+ struct list_head list;
+ struct err_info info;
+ char loc[128];
+ char *cmd;
+};
+
+struct buffer_ref {
+ struct trace_buffer *buffer;
+ void *page;
+ int cpu;
+ refcount_t refcount;
+};
+
+typedef __kernel_mode_t mode_t;
+
+struct orlov_stats {
+ __u64 free_clusters;
+ __u32 free_inodes;
+ __u32 used_dirs;
+};
+
+enum devcg_behavior {
+ DEVCG_DEFAULT_NONE = 0,
+ DEVCG_DEFAULT_ALLOW = 1,
+ DEVCG_DEFAULT_DENY = 2,
+};
+
+struct dev_exception_item {
+ u32 major;
+ u32 minor;
+ short int type;
+ short int access;
+ struct list_head list;
+ struct callback_head rcu;
+};
+
+struct dev_cgroup {
+ struct cgroup_subsys_state css;
+ struct list_head exceptions;
+ enum devcg_behavior behavior;
+};
+
+struct io_fadvise {
+ struct file *file;
+ u64 offset;
+ u32 len;
+ u32 advice;
+};
+
+struct io_madvise {
+ struct file *file;
+ u64 addr;
+ u32 len;
+ u32 advice;
+};
+
+struct linux_logo {
+ int type;
+ unsigned int width;
+ unsigned int height;
+ unsigned int clutsize;
+ const unsigned char *clut;
+ const unsigned char *data;
+};
+
+enum {
+ FB_BLANK_UNBLANK = 0,
+ FB_BLANK_NORMAL = 1,
+ FB_BLANK_VSYNC_SUSPEND = 2,
+ FB_BLANK_HSYNC_SUSPEND = 3,
+ FB_BLANK_POWERDOWN = 4,
+};
+
+struct fb_event {
+ struct fb_info *info;
+ void *data;
+};
+
+enum backlight_update_reason {
+ BACKLIGHT_UPDATE_HOTKEY = 0,
+ BACKLIGHT_UPDATE_SYSFS = 1,
+};
+
+enum backlight_type {
+ BACKLIGHT_RAW = 1,
+ BACKLIGHT_PLATFORM = 2,
+ BACKLIGHT_FIRMWARE = 3,
+ BACKLIGHT_TYPE_MAX = 4,
+};
+
+enum backlight_notification {
+ BACKLIGHT_REGISTERED = 0,
+ BACKLIGHT_UNREGISTERED = 1,
+};
+
+enum backlight_scale {
+ BACKLIGHT_SCALE_UNKNOWN = 0,
+ BACKLIGHT_SCALE_LINEAR = 1,
+ BACKLIGHT_SCALE_NON_LINEAR = 2,
+};
+
+struct backlight_device;
+
+struct backlight_ops {
+ unsigned int options;
+ int (*update_status)(struct backlight_device *);
+ int (*get_brightness)(struct backlight_device *);
+ int (*check_fb)(struct backlight_device *, struct fb_info *);
+};
+
+struct backlight_properties {
+ int brightness;
+ int max_brightness;
+ int power;
+ int fb_blank;
+ enum backlight_type type;
+ unsigned int state;
+ enum backlight_scale scale;
+};
+
+struct backlight_device {
+ struct backlight_properties props;
+ struct mutex update_lock;
+ struct mutex ops_lock;
+ const struct backlight_ops *ops;
+ struct notifier_block fb_notif;
+ struct list_head entry;
+ struct device dev;
+ bool fb_bl_on[32];
+ int use_count;
+};
+
+struct aper_size_info_fixed {
+ int size;
+ int num_entries;
+ int page_order;
+};
+
+struct intel_gtt_driver {
+ unsigned int gen: 8;
+ unsigned int is_g33: 1;
+ unsigned int is_pineview: 1;
+ unsigned int is_ironlake: 1;
+ unsigned int has_pgtbl_enable: 1;
+ unsigned int dma_mask_size: 8;
+ int (*setup)();
+ void (*cleanup)();
+ void (*write_entry)(dma_addr_t, unsigned int, unsigned int);
+ bool (*check_flags)(unsigned int);
+ void (*chipset_flush)();
+};
+
+struct _intel_private {
+ const struct intel_gtt_driver *driver;
+ struct pci_dev *pcidev;
+ struct pci_dev *bridge_dev;
+ u8 *registers;
+ phys_addr_t gtt_phys_addr;
+ u32 PGETBL_save;
+ u32 *gtt;
+ bool clear_fake_agp;
+ int num_dcache_entries;
+ void *i9xx_flush_page;
+ char *i81x_gtt_table;
+ struct resource ifp_resource;
+ int resource_valid;
+ struct page *scratch_page;
+ phys_addr_t scratch_page_dma;
+ int refcount;
+ unsigned int needs_dmar: 1;
+ phys_addr_t gma_bus_addr;
+ resource_size_t stolen_size;
+ unsigned int gtt_total_entries;
+ unsigned int gtt_mappable_entries;
+};
+
+struct intel_gtt_driver_description {
+ unsigned int gmch_chip_id;
+ char *name;
+ const struct intel_gtt_driver *gtt_driver;
+};
+
+struct builtin_fw {
+ char *name;
+ void *data;
+ long unsigned int size;
+};
+
+struct cs_policy_dbs_info {
+ struct policy_dbs_info policy_dbs;
+ unsigned int down_skip;
+ unsigned int requested_freq;
+};
+
+struct cs_dbs_tuners {
+ unsigned int down_threshold;
+ unsigned int freq_step;
+};
+
+enum {
+ LWT_BPF_PROG_UNSPEC = 0,
+ LWT_BPF_PROG_FD = 1,
+ LWT_BPF_PROG_NAME = 2,
+ __LWT_BPF_PROG_MAX = 3,
+};
+
+enum {
+ LWT_BPF_UNSPEC = 0,
+ LWT_BPF_IN = 1,
+ LWT_BPF_OUT = 2,
+ LWT_BPF_XMIT = 3,
+ LWT_BPF_XMIT_HEADROOM = 4,
+ __LWT_BPF_MAX = 5,
+};
+
+struct bpf_lwt {
+ struct bpf_lwt_prog in;
+ struct bpf_lwt_prog out;
+ struct bpf_lwt_prog xmit;
+ int family;
+};
+
+struct tls_rec {
+ struct list_head list;
+ int tx_ready;
+ int tx_flags;
+ struct sk_msg msg_plaintext;
+ struct sk_msg msg_encrypted;
+ struct scatterlist sg_aead_in[2];
+ struct scatterlist sg_aead_out[2];
+ char content_type;
+ struct scatterlist sg_content_type;
+ char aad_space[13];
+ u8 iv_data[16];
+ struct aead_request aead_req;
+ u8 aead_req_ctx[0];
+};
+
+struct tls_decrypt_arg {
+ union {
+ struct {
+ bool zc;
+ bool async;
+ u8 tail;
+ };
+ struct {
+ bool zc;
+ bool async;
+ u8 tail;
+ } inargs;
+ };
+ struct sk_buff *skb;
+};
+
+struct tls_decrypt_ctx {
+ u8 iv[16];
+ u8 aad[13];
+ u8 tail;
+ struct scatterlist sg[0];
+};
+
+struct mce_evt_llist {
+ struct llist_node llnode;
+ struct mce mce;
+};
+
+struct intel_early_ops {
+ resource_size_t (*stolen_size)(int, int, int);
+ resource_size_t (*stolen_base)(int, int, int, resource_size_t);
+};
+
+struct chipset {
+ u32 vendor;
+ u32 device;
+ u32 class;
+ u32 class_mask;
+ u32 flags;
+ void (*f)(int, int, int);
+};
+
+struct arch_optimized_insn {
+ kprobe_opcode_t copied_insn[4];
+ kprobe_opcode_t *insn;
+ size_t size;
+};
+
+struct optimized_kprobe {
+ struct kprobe kp;
+ struct list_head list;
+ struct arch_optimized_insn optinsn;
+};
+
+struct sched_param {
+ int sched_priority;
+};
+
+enum {
+ KTW_FREEZABLE = 1,
+};
+
+struct kthread_create_info {
+ int (*threadfn)(void *);
+ void *data;
+ int node;
+ struct task_struct *result;
+ struct completion *done;
+ struct list_head list;
+};
+
+struct kthread {
+ long unsigned int flags;
+ unsigned int cpu;
+ int result;
+ int (*threadfn)(void *);
+ void *data;
+ struct completion parked;
+ struct completion exited;
+ struct cgroup_subsys_state *blkcg_css;
+ char *full_name;
+};
+
+enum KTHREAD_BITS {
+ KTHREAD_IS_PER_CPU = 0,
+ KTHREAD_SHOULD_STOP = 1,
+ KTHREAD_SHOULD_PARK = 2,
+};
+
+struct kthread_flush_work {
+ struct kthread_work work;
+ struct completion done;
+};
+
+struct fei_attr {
+ struct list_head list;
+ struct kprobe kp;
+ long unsigned int retval;
+};
+
+struct bpf_storage_blob {
+ struct bpf_local_storage *storage;
+};
+
+typedef u64 (*btf_bpf_inode_storage_get)(struct bpf_map *, struct inode *, void *, u64, gfp_t);
+
+typedef u64 (*btf_bpf_inode_storage_delete)(struct bpf_map *, struct inode *);
+
+typedef int dio_iodone_t(struct kiocb *, loff_t, ssize_t, void *);
+
+typedef void dio_submit_t(struct bio *, struct inode *, loff_t);
+
+enum {
+ DIO_LOCKING = 1,
+ DIO_SKIP_HOLES = 2,
+};
+
+struct dio_submit {
+ struct bio *bio;
+ unsigned int blkbits;
+ unsigned int blkfactor;
+ unsigned int start_zero_done;
+ int pages_in_io;
+ sector_t block_in_file;
+ unsigned int blocks_available;
+ int reap_counter;
+ sector_t final_block_in_request;
+ int boundary;
+ get_block_t *get_block;
+ dio_submit_t *submit_io;
+ loff_t logical_offset_in_bio;
+ sector_t final_block_in_bio;
+ sector_t next_block_for_io;
+ struct page *cur_page;
+ unsigned int cur_page_offset;
+ unsigned int cur_page_len;
+ sector_t cur_page_block;
+ loff_t cur_page_fs_offset;
+ struct iov_iter *iter;
+ unsigned int head;
+ unsigned int tail;
+ size_t from;
+ size_t to;
+};
+
+struct dio {
+ int flags;
+ blk_opf_t opf;
+ struct gendisk *bio_disk;
+ struct inode *inode;
+ loff_t i_size;
+ dio_iodone_t *end_io;
+ void *private;
+ spinlock_t bio_lock;
+ int page_errors;
+ int is_async;
+ bool defer_completion;
+ bool should_dirty;
+ int io_error;
+ long unsigned int refcount;
+ struct bio *bio_list;
+ struct task_struct *waiter;
+ struct kiocb *iocb;
+ ssize_t result;
+ union {
+ struct page *pages[64];
+ struct work_struct complete_work;
+ };
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct pts_mount_opts {
+ int setuid;
+ int setgid;
+ kuid_t uid;
+ kgid_t gid;
+ umode_t mode;
+ umode_t ptmxmode;
+ int reserve;
+ int max;
+};
+
+enum {
+ Opt_uid___2 = 0,
+ Opt_gid___3 = 1,
+ Opt_mode___2 = 2,
+ Opt_ptmxmode = 3,
+ Opt_newinstance = 4,
+ Opt_max = 5,
+ Opt_err___5 = 6,
+};
+
+struct pts_fs_info {
+ struct ida allocated_ptys;
+ struct pts_mount_opts mount_opts;
+ struct super_block *sb;
+ struct dentry *ptmx_dentry;
+};
+
+struct ramfs_mount_opts {
+ umode_t mode;
+};
+
+struct ramfs_fs_info {
+ struct ramfs_mount_opts mount_opts;
+};
+
+enum ramfs_param {
+ Opt_mode___3 = 0,
+};
+
+struct ima_kexec_hdr {
+ u16 version;
+ u16 _reserved0;
+ u32 _reserved1;
+ u64 buffer_size;
+ u64 count;
+};
+
+enum header_fields {
+ HDR_PCR = 0,
+ HDR_DIGEST = 1,
+ HDR_TEMPLATE_NAME = 2,
+ HDR_TEMPLATE_DATA = 3,
+ HDR__LAST = 4,
+};
+
+struct chksum_ctx {
+ u32 key;
+};
+
+struct chksum_desc_ctx___2 {
+ u32 crc;
+};
+
+enum {
+ REQ_FSEQ_PREFLUSH = 1,
+ REQ_FSEQ_DATA = 2,
+ REQ_FSEQ_POSTFLUSH = 4,
+ REQ_FSEQ_DONE = 8,
+ REQ_FSEQ_ACTIONS = 7,
+ FLUSH_PENDING_TIMEOUT = 5000,
+};
+
+struct ms_data {
+ long unsigned int quirks;
+ struct hid_device *hdev;
+ struct work_struct ff_worker;
+ __u8 strong;
+ __u8 weak;
+ void *output_report_dmabuf;
+};
+
+enum {
+ MAGNITUDE_STRONG = 2,
+ MAGNITUDE_WEAK = 3,
+ MAGNITUDE_NUM = 4,
+};
+
+struct xb1s_ff_report {
+ __u8 report_id;
+ __u8 enable;
+ __u8 magnitude[4];
+ __u8 duration_10ms;
+ __u8 start_delay_10ms;
+ __u8 loop_count;
+};
+
+struct nvmem_cell;
+
+struct tcp_sack_block_wire {
+ __be32 start_seq;
+ __be32 end_seq;
+};
+
+struct ipfrag_skb_cb {
+ union {
+ struct inet_skb_parm h4;
+ struct inet6_skb_parm h6;
+ };
+ struct sk_buff *next_frag;
+ int frag_run_len;
+};
+
+struct xfrm_kmaddress {
+ xfrm_address_t local;
+ xfrm_address_t remote;
+ u32 reserved;
+ u16 family;
+};
+
+struct xfrm_migrate {
+ xfrm_address_t old_daddr;
+ xfrm_address_t old_saddr;
+ xfrm_address_t new_daddr;
+ xfrm_address_t new_saddr;
+ u8 proto;
+ u8 mode;
+ u16 reserved;
+ u32 reqid;
+ u16 old_family;
+ u16 new_family;
+};
+
+struct xfrm_mgr {
+ struct list_head list;
+ int (*notify)(struct xfrm_state *, const struct km_event *);
+ int (*acquire)(struct xfrm_state *, struct xfrm_tmpl *, struct xfrm_policy *);
+ struct xfrm_policy * (*compile_policy)(struct sock *, int, u8 *, int, int *);
+ int (*new_mapping)(struct xfrm_state *, xfrm_address_t *, __be16);
+ int (*notify_policy)(struct xfrm_policy *, int, const struct km_event *);
+ int (*report)(struct net *, u8, struct xfrm_selector *, xfrm_address_t *);
+ int (*migrate)(const struct xfrm_selector *, u8, u8, const struct xfrm_migrate *, int, const struct xfrm_kmaddress *, const struct xfrm_encap_tmpl *);
+ bool (*is_alive)(const struct km_event *);
+};
+
+struct xfrmk_sadinfo {
+ u32 sadhcnt;
+ u32 sadhmcnt;
+ u32 sadcnt;
+};
+
+struct xfrm_translator {
+ int (*alloc_compat)(struct sk_buff *, const struct nlmsghdr *);
+ struct nlmsghdr * (*rcv_msg_compat)(const struct nlmsghdr *, int, const struct nla_policy *, struct netlink_ext_ack *);
+ int (*xlate_user_policy_sockptr)(u8 **, int);
+ struct module *owner;
+};
+
+struct xsk_dma_map {
+ dma_addr_t *dma_pages;
+ struct device *dev;
+ struct net_device *netdev;
+ refcount_t users;
+ struct list_head list;
+ u32 dma_pages_cnt;
+ bool dma_need_sync;
+};
+
+struct ucode_patch {
+ struct list_head plist;
+ void *data;
+ unsigned int size;
+ u32 patch_id;
+ u16 equiv_cpu;
+};
+
+struct cpu_signature {
+ unsigned int sig;
+ unsigned int pf;
+ unsigned int rev;
+};
+
+enum ucode_state {
+ UCODE_OK = 0,
+ UCODE_NEW = 1,
+ UCODE_UPDATED = 2,
+ UCODE_NFOUND = 3,
+ UCODE_ERROR = 4,
+};
+
+struct microcode_ops {
+ enum ucode_state (*request_microcode_fw)(int, struct device *, bool);
+ void (*microcode_fini_cpu)(int);
+ enum ucode_state (*apply_microcode)(int);
+ int (*collect_cpu_info)(int, struct cpu_signature *);
+};
+
+struct ucode_cpu_info {
+ struct cpu_signature cpu_sig;
+ int valid;
+ void *mc;
+};
+
+struct microcode_header_intel {
+ unsigned int hdrver;
+ unsigned int rev;
+ unsigned int date;
+ unsigned int sig;
+ unsigned int cksum;
+ unsigned int ldrver;
+ unsigned int pf;
+ unsigned int datasize;
+ unsigned int totalsize;
+ unsigned int reserved[3];
+};
+
+struct microcode_intel {
+ struct microcode_header_intel hdr;
+ unsigned int bits[0];
+};
+
+struct extended_signature {
+ unsigned int sig;
+ unsigned int pf;
+ unsigned int cksum;
+};
+
+struct extended_sigtable {
+ unsigned int count;
+ unsigned int cksum;
+ unsigned int reserved[3];
+ struct extended_signature sigs[0];
+};
+
+struct clone_args {
+ __u64 flags;
+ __u64 pidfd;
+ __u64 child_tid;
+ __u64 parent_tid;
+ __u64 exit_signal;
+ __u64 stack;
+ __u64 stack_size;
+ __u64 tls;
+ __u64 set_tid;
+ __u64 set_tid_size;
+ __u64 cgroup;
+};
+
+struct trace_event_raw_task_newtask {
+ struct trace_entry ent;
+ pid_t pid;
+ char comm[16];
+ long unsigned int clone_flags;
+ short int oom_score_adj;
+ char __data[0];
+};
+
+struct trace_event_raw_task_rename {
+ struct trace_entry ent;
+ pid_t pid;
+ char oldcomm[16];
+ char newcomm[16];
+ short int oom_score_adj;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_task_newtask {};
+
+struct trace_event_data_offsets_task_rename {};
+
+typedef void (*btf_trace_task_newtask)(void *, struct task_struct *, long unsigned int);
+
+typedef void (*btf_trace_task_rename)(void *, struct task_struct *, const char *);
+
+struct vm_stack {
+ struct callback_head rcu;
+ struct vm_struct *stack_vm_area;
+};
+
+struct debugfs_mount_opts {
+ kuid_t uid;
+ kgid_t gid;
+ umode_t mode;
+ unsigned int opts;
+};
+
+enum {
+ Opt_uid___3 = 0,
+ Opt_gid___4 = 1,
+ Opt_mode___4 = 2,
+ Opt_err___6 = 3,
+};
+
+struct debugfs_fs_info {
+ struct debugfs_mount_opts mount_opts;
+};
+
+struct sha256_state {
+ u32 state[8];
+ u64 count;
+ u8 buf[64];
+};
+
+struct blk_mq_hw_ctx_sysfs_entry {
+ struct attribute attr;
+ ssize_t (*show)(struct blk_mq_hw_ctx *, char *);
+ ssize_t (*store)(struct blk_mq_hw_ctx *, const char *, size_t);
+};
+
+struct serial8250_config {
+ const char *name;
+ short unsigned int fifo_size;
+ short unsigned int tx_loadsz;
+ unsigned char fcr;
+ unsigned char rxtrig_bytes[4];
+ unsigned int flags;
+};
+
+enum {
+ IFLA_VXLAN_UNSPEC = 0,
+ IFLA_VXLAN_ID = 1,
+ IFLA_VXLAN_GROUP = 2,
+ IFLA_VXLAN_LINK = 3,
+ IFLA_VXLAN_LOCAL = 4,
+ IFLA_VXLAN_TTL = 5,
+ IFLA_VXLAN_TOS = 6,
+ IFLA_VXLAN_LEARNING = 7,
+ IFLA_VXLAN_AGEING = 8,
+ IFLA_VXLAN_LIMIT = 9,
+ IFLA_VXLAN_PORT_RANGE = 10,
+ IFLA_VXLAN_PROXY = 11,
+ IFLA_VXLAN_RSC = 12,
+ IFLA_VXLAN_L2MISS = 13,
+ IFLA_VXLAN_L3MISS = 14,
+ IFLA_VXLAN_PORT = 15,
+ IFLA_VXLAN_GROUP6 = 16,
+ IFLA_VXLAN_LOCAL6 = 17,
+ IFLA_VXLAN_UDP_CSUM = 18,
+ IFLA_VXLAN_UDP_ZERO_CSUM6_TX = 19,
+ IFLA_VXLAN_UDP_ZERO_CSUM6_RX = 20,
+ IFLA_VXLAN_REMCSUM_TX = 21,
+ IFLA_VXLAN_REMCSUM_RX = 22,
+ IFLA_VXLAN_GBP = 23,
+ IFLA_VXLAN_REMCSUM_NOPARTIAL = 24,
+ IFLA_VXLAN_COLLECT_METADATA = 25,
+ IFLA_VXLAN_LABEL = 26,
+ IFLA_VXLAN_GPE = 27,
+ IFLA_VXLAN_TTL_INHERIT = 28,
+ IFLA_VXLAN_DF = 29,
+ IFLA_VXLAN_VNIFILTER = 30,
+ __IFLA_VXLAN_MAX = 31,
+};
+
+struct ifla_vxlan_port_range {
+ __be16 low;
+ __be16 high;
+};
+
+enum ifla_vxlan_df {
+ VXLAN_DF_UNSET = 0,
+ VXLAN_DF_SET = 1,
+ VXLAN_DF_INHERIT = 2,
+ __VXLAN_DF_END = 3,
+ VXLAN_DF_MAX = 2,
+};
+
+enum switchdev_notifier_type {
+ SWITCHDEV_FDB_ADD_TO_BRIDGE = 1,
+ SWITCHDEV_FDB_DEL_TO_BRIDGE = 2,
+ SWITCHDEV_FDB_ADD_TO_DEVICE = 3,
+ SWITCHDEV_FDB_DEL_TO_DEVICE = 4,
+ SWITCHDEV_FDB_OFFLOADED = 5,
+ SWITCHDEV_FDB_FLUSH_TO_BRIDGE = 6,
+ SWITCHDEV_PORT_OBJ_ADD = 7,
+ SWITCHDEV_PORT_OBJ_DEL = 8,
+ SWITCHDEV_PORT_ATTR_SET = 9,
+ SWITCHDEV_VXLAN_FDB_ADD_TO_BRIDGE = 10,
+ SWITCHDEV_VXLAN_FDB_DEL_TO_BRIDGE = 11,
+ SWITCHDEV_VXLAN_FDB_ADD_TO_DEVICE = 12,
+ SWITCHDEV_VXLAN_FDB_DEL_TO_DEVICE = 13,
+ SWITCHDEV_VXLAN_FDB_OFFLOADED = 14,
+ SWITCHDEV_BRPORT_OFFLOADED = 15,
+ SWITCHDEV_BRPORT_UNOFFLOADED = 16,
+};
+
+struct switchdev_notifier_info {
+ struct net_device *dev;
+ struct netlink_ext_ack *extack;
+ const void *ctx;
+};
+
+struct vxlanhdr {
+ __be32 vx_flags;
+ __be32 vx_vni;
+};
+
+struct vxlanhdr_gbp {
+ u8 vx_flags;
+ u8 reserved_flags1: 3;
+ u8 policy_applied: 1;
+ u8 reserved_flags2: 2;
+ u8 dont_learn: 1;
+ u8 reserved_flags3: 1;
+ __be16 policy_id;
+ __be32 vx_vni;
+};
+
+struct vxlanhdr_gpe {
+ u8 oam_flag: 1;
+ u8 reserved_flags1: 1;
+ u8 np_applied: 1;
+ u8 instance_applied: 1;
+ u8 version: 2;
+ u8 reserved_flags2: 2;
+ u8 reserved_flags3;
+ u8 reserved_flags4;
+ u8 next_protocol;
+ __be32 vx_vni;
+};
+
+struct vxlan_sock {
+ struct hlist_node hlist;
+ struct socket *sock;
+ struct hlist_head vni_list[1024];
+ refcount_t refcnt;
+ u32 flags;
+};
+
+union vxlan_addr {
+ struct sockaddr_in sin;
+ struct sockaddr_in6 sin6;
+ struct sockaddr sa;
+};
+
+struct vxlan_rdst {
+ union vxlan_addr remote_ip;
+ __be16 remote_port;
+ u8 offloaded: 1;
+ __be32 remote_vni;
+ u32 remote_ifindex;
+ struct net_device *remote_dev;
+ struct list_head list;
+ struct callback_head rcu;
+ struct dst_cache dst_cache;
+};
+
+struct vxlan_config {
+ union vxlan_addr remote_ip;
+ union vxlan_addr saddr;
+ __be32 vni;
+ int remote_ifindex;
+ int mtu;
+ __be16 dst_port;
+ u16 port_min;
+ u16 port_max;
+ u8 tos;
+ u8 ttl;
+ __be32 label;
+ u32 flags;
+ long unsigned int age_interval;
+ unsigned int addrmax;
+ bool no_share;
+ enum ifla_vxlan_df df;
+};
+
+enum {
+ VXLAN_VNI_STATS_RX = 0,
+ VXLAN_VNI_STATS_RX_DROPS = 1,
+ VXLAN_VNI_STATS_RX_ERRORS = 2,
+ VXLAN_VNI_STATS_TX = 3,
+ VXLAN_VNI_STATS_TX_DROPS = 4,
+ VXLAN_VNI_STATS_TX_ERRORS = 5,
+};
+
+struct vxlan_vni_stats {
+ u64 rx_packets;
+ u64 rx_bytes;
+ u64 rx_drops;
+ u64 rx_errors;
+ u64 tx_packets;
+ u64 tx_bytes;
+ u64 tx_drops;
+ u64 tx_errors;
+};
+
+struct vxlan_vni_stats_pcpu {
+ struct vxlan_vni_stats stats;
+ struct u64_stats_sync syncp;
+};
+
+struct vxlan_dev;
+
+struct vxlan_dev_node {
+ struct hlist_node hlist;
+ struct vxlan_dev *vxlan;
+};
+
+struct vxlan_vni_group;
+
+struct vxlan_dev {
+ struct vxlan_dev_node hlist4;
+ struct vxlan_dev_node hlist6;
+ struct list_head next;
+ struct vxlan_sock *vn4_sock;
+ struct vxlan_sock *vn6_sock;
+ struct net_device *dev;
+ struct net *net;
+ struct vxlan_rdst default_dst;
+ struct timer_list age_timer;
+ spinlock_t hash_lock[256];
+ unsigned int addrcnt;
+ struct gro_cells gro_cells;
+ struct vxlan_config cfg;
+ struct vxlan_vni_group *vnigrp;
+ struct hlist_head fdb_head[256];
+};
+
+struct vxlan_vni_node {
+ struct rhash_head vnode;
+ struct vxlan_dev_node hlist4;
+ struct vxlan_dev_node hlist6;
+ struct list_head vlist;
+ __be32 vni;
+ union vxlan_addr remote_ip;
+ struct vxlan_vni_stats_pcpu *stats;
+ struct callback_head rcu;
+};
+
+struct vxlan_vni_group {
+ struct rhashtable vni_hash;
+ struct list_head vni_list;
+ u32 num_vnis;
+};
+
+struct switchdev_notifier_vxlan_fdb_info {
+ struct switchdev_notifier_info info;
+ union vxlan_addr remote_ip;
+ __be16 remote_port;
+ __be32 remote_vni;
+ u32 remote_ifindex;
+ u8 eth_addr[6];
+ __be32 vni;
+ bool offloaded;
+ bool added_by_user;
+};
+
+struct vxlan_net {
+ struct list_head vxlan_list;
+ struct hlist_head sock_list[256];
+ spinlock_t sock_lock;
+ struct notifier_block nexthop_notifier_block;
+};
+
+struct vxlan_fdb {
+ struct hlist_node hlist;
+ struct callback_head rcu;
+ long unsigned int updated;
+ long unsigned int used;
+ struct list_head remotes;
+ u8 eth_addr[6];
+ u16 state;
+ __be32 vni;
+ u16 flags;
+ struct list_head nh_list;
+ struct nexthop *nh;
+ struct vxlan_dev *vdev;
+};
+
+struct netlbl_af4list {
+ __be32 addr;
+ __be32 mask;
+ u32 valid;
+ struct list_head list;
+};
+
+struct netlbl_af6list {
+ struct in6_addr addr;
+ struct in6_addr mask;
+ u32 valid;
+ struct list_head list;
+};
+
+struct netlbl_domaddr4_map {
+ struct netlbl_dommap_def def;
+ struct netlbl_af4list list;
+};
+
+struct netlbl_domaddr6_map {
+ struct netlbl_dommap_def def;
+ struct netlbl_af6list list;
+};
+
+struct netlbl_domhsh_tbl {
+ struct list_head *tbl;
+ u32 size;
+};
+
+enum p9_proto_versions {
+ p9_proto_legacy = 0,
+ p9_proto_2000u = 1,
+ p9_proto_2000L = 2,
+};
+
+struct mptcp_subflow_request_sock {
+ struct tcp_request_sock sk;
+ u16 mp_capable: 1;
+ u16 mp_join: 1;
+ u16 backup: 1;
+ u16 csum_reqd: 1;
+ u16 allow_join_id0: 1;
+ u8 local_id;
+ u8 remote_id;
+ u64 local_key;
+ u64 idsn;
+ u32 token;
+ u32 ssn_offset;
+ u64 thmac;
+ u32 local_nonce;
+ u32 remote_nonce;
+ struct mptcp_sock *msk;
+ struct hlist_nulls_node token_node;
+};
+
+struct token_bucket {
+ spinlock_t lock;
+ int chain_len;
+ struct hlist_nulls_head req_chain;
+ struct hlist_nulls_head msk_chain;
+};
+
+struct trace_event_raw_nmi_handler {
+ struct trace_entry ent;
+ void *handler;
+ s64 delta_ns;
+ int handled;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_nmi_handler {};
+
+typedef void (*btf_trace_nmi_handler)(void *, void *, s64, int);
+
+struct nmi_desc {
+ raw_spinlock_t lock;
+ struct list_head head;
+};
+
+struct nmi_stats {
+ unsigned int normal;
+ unsigned int unknown;
+ unsigned int external;
+ unsigned int swallow;
+};
+
+enum nmi_states {
+ NMI_NOT_RUNNING = 0,
+ NMI_EXECUTING = 1,
+ NMI_LATCHED = 2,
+};
+
+typedef __kernel_timer_t timer_t;
+
+enum alarmtimer_type {
+ ALARM_REALTIME = 0,
+ ALARM_BOOTTIME = 1,
+ ALARM_NUMTYPE = 2,
+ ALARM_REALTIME_FREEZER = 3,
+ ALARM_BOOTTIME_FREEZER = 4,
+};
+
+enum alarmtimer_restart {
+ ALARMTIMER_NORESTART = 0,
+ ALARMTIMER_RESTART = 1,
+};
+
+struct alarm {
+ struct timerqueue_node node;
+ struct hrtimer timer;
+ enum alarmtimer_restart (*function)(struct alarm *, ktime_t);
+ enum alarmtimer_type type;
+ int state;
+ void *data;
+};
+
+struct cpu_timer {
+ struct timerqueue_node node;
+ struct timerqueue_head *head;
+ struct pid *pid;
+ struct list_head elist;
+ int firing;
+};
+
+struct k_clock;
+
+struct k_itimer {
+ struct list_head list;
+ struct hlist_node t_hash;
+ spinlock_t it_lock;
+ const struct k_clock *kclock;
+ clockid_t it_clock;
+ timer_t it_id;
+ int it_active;
+ s64 it_overrun;
+ s64 it_overrun_last;
+ int it_requeue_pending;
+ int it_sigev_notify;
+ ktime_t it_interval;
+ struct signal_struct *it_signal;
+ union {
+ struct pid *it_pid;
+ struct task_struct *it_process;
+ };
+ struct sigqueue *sigq;
+ union {
+ struct {
+ struct hrtimer timer;
+ } real;
+ struct cpu_timer cpu;
+ struct {
+ struct alarm alarmtimer;
+ } alarm;
+ } it;
+ struct callback_head rcu;
+};
+
+struct k_clock {
+ int (*clock_getres)(const clockid_t, struct timespec64 *);
+ int (*clock_set)(const clockid_t, const struct timespec64 *);
+ int (*clock_get_timespec)(const clockid_t, struct timespec64 *);
+ ktime_t (*clock_get_ktime)(const clockid_t);
+ int (*clock_adj)(const clockid_t, struct __kernel_timex *);
+ int (*timer_create)(struct k_itimer *);
+ int (*nsleep)(const clockid_t, int, const struct timespec64 *);
+ int (*timer_set)(struct k_itimer *, int, struct itimerspec64 *, struct itimerspec64 *);
+ int (*timer_del)(struct k_itimer *);
+ void (*timer_get)(struct k_itimer *, struct itimerspec64 *);
+ void (*timer_rearm)(struct k_itimer *);
+ s64 (*timer_forward)(struct k_itimer *, ktime_t);
+ ktime_t (*timer_remaining)(struct k_itimer *, ktime_t);
+ int (*timer_try_to_cancel)(struct k_itimer *);
+ void (*timer_arm)(struct k_itimer *, ktime_t, bool, bool);
+ void (*timer_wait_running)(struct k_itimer *);
+};
+
+struct posix_clock_desc {
+ struct file *fp;
+ struct posix_clock *clk;
+};
+
+struct eprobe_trace_entry_head {
+ struct trace_entry ent;
+};
+
+struct ftrace_event_field {
+ struct list_head link;
+ const char *name;
+ const char *type;
+ int filter_type;
+ int offset;
+ int size;
+ int is_signed;
+};
+
+struct trace_eprobe {
+ const char *event_system;
+ const char *event_name;
+ char *filter_str;
+ struct trace_event_call *event;
+ struct dyn_event devent;
+ struct trace_probe tp;
+};
+
+struct eprobe_data {
+ struct trace_event_file *file;
+ struct trace_eprobe *ep;
+};
+
+struct kmalloc_info_struct {
+ const char *name[4];
+ unsigned int size;
+};
+
+struct trace_event_raw_kmem_cache_alloc {
+ struct trace_entry ent;
+ long unsigned int call_site;
+ const void *ptr;
+ size_t bytes_req;
+ size_t bytes_alloc;
+ long unsigned int gfp_flags;
+ int node;
+ bool accounted;
+ char __data[0];
+};
+
+struct trace_event_raw_kmalloc {
+ struct trace_entry ent;
+ long unsigned int call_site;
+ const void *ptr;
+ size_t bytes_req;
+ size_t bytes_alloc;
+ long unsigned int gfp_flags;
+ int node;
+ char __data[0];
+};
+
+struct trace_event_raw_kfree {
+ struct trace_entry ent;
+ long unsigned int call_site;
+ const void *ptr;
+ char __data[0];
+};
+
+struct trace_event_raw_kmem_cache_free {
+ struct trace_entry ent;
+ long unsigned int call_site;
+ const void *ptr;
+ u32 __data_loc_name;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_page_free {
+ struct trace_entry ent;
+ long unsigned int pfn;
+ unsigned int order;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_page_free_batched {
+ struct trace_entry ent;
+ long unsigned int pfn;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_page_alloc {
+ struct trace_entry ent;
+ long unsigned int pfn;
+ unsigned int order;
+ long unsigned int gfp_flags;
+ int migratetype;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_page {
+ struct trace_entry ent;
+ long unsigned int pfn;
+ unsigned int order;
+ int migratetype;
+ int percpu_refill;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_page_pcpu_drain {
+ struct trace_entry ent;
+ long unsigned int pfn;
+ unsigned int order;
+ int migratetype;
+ char __data[0];
+};
+
+struct trace_event_raw_mm_page_alloc_extfrag {
+ struct trace_entry ent;
+ long unsigned int pfn;
+ int alloc_order;
+ int fallback_order;
+ int alloc_migratetype;
+ int fallback_migratetype;
+ int change_ownership;
+ char __data[0];
+};
+
+struct trace_event_raw_rss_stat {
+ struct trace_entry ent;
+ unsigned int mm_id;
+ unsigned int curr;
+ int member;
+ long int size;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_kmem_cache_alloc {};
+
+struct trace_event_data_offsets_kmalloc {};
+
+struct trace_event_data_offsets_kfree {};
+
+struct trace_event_data_offsets_kmem_cache_free {
+ u32 name;
+};
+
+struct trace_event_data_offsets_mm_page_free {};
+
+struct trace_event_data_offsets_mm_page_free_batched {};
+
+struct trace_event_data_offsets_mm_page_alloc {};
+
+struct trace_event_data_offsets_mm_page {};
+
+struct trace_event_data_offsets_mm_page_pcpu_drain {};
+
+struct trace_event_data_offsets_mm_page_alloc_extfrag {};
+
+struct trace_event_data_offsets_rss_stat {};
+
+typedef void (*btf_trace_kmem_cache_alloc)(void *, long unsigned int, const void *, struct kmem_cache *, gfp_t, int);
+
+typedef void (*btf_trace_kmalloc)(void *, long unsigned int, const void *, size_t, size_t, gfp_t, int);
+
+typedef void (*btf_trace_kfree)(void *, long unsigned int, const void *);
+
+typedef void (*btf_trace_kmem_cache_free)(void *, long unsigned int, const void *, const struct kmem_cache *);
+
+typedef void (*btf_trace_mm_page_free)(void *, struct page *, unsigned int);
+
+typedef void (*btf_trace_mm_page_free_batched)(void *, struct page *);
+
+typedef void (*btf_trace_mm_page_alloc)(void *, struct page *, unsigned int, gfp_t, int);
+
+typedef void (*btf_trace_mm_page_alloc_zone_locked)(void *, struct page *, unsigned int, int, int);
+
+typedef void (*btf_trace_mm_page_pcpu_drain)(void *, struct page *, unsigned int, int);
+
+typedef void (*btf_trace_mm_page_alloc_extfrag)(void *, struct page *, int, int, int, int);
+
+typedef void (*btf_trace_rss_stat)(void *, struct mm_struct *, int, long int);
+
+struct flock64 {
+ short int l_type;
+ short int l_whence;
+ __kernel_loff_t l_start;
+ __kernel_loff_t l_len;
+ __kernel_pid_t l_pid;
+};
+
+struct trace_event_raw_locks_get_lock_context {
+ struct trace_entry ent;
+ long unsigned int i_ino;
+ dev_t s_dev;
+ unsigned char type;
+ struct file_lock_context *ctx;
+ char __data[0];
+};
+
+struct trace_event_raw_filelock_lock {
+ struct trace_entry ent;
+ struct file_lock *fl;
+ long unsigned int i_ino;
+ dev_t s_dev;
+ struct file_lock *fl_blocker;
+ fl_owner_t fl_owner;
+ unsigned int fl_pid;
+ unsigned int fl_flags;
+ unsigned char fl_type;
+ loff_t fl_start;
+ loff_t fl_end;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_filelock_lease {
+ struct trace_entry ent;
+ struct file_lock *fl;
+ long unsigned int i_ino;
+ dev_t s_dev;
+ struct file_lock *fl_blocker;
+ fl_owner_t fl_owner;
+ unsigned int fl_flags;
+ unsigned char fl_type;
+ long unsigned int fl_break_time;
+ long unsigned int fl_downgrade_time;
+ char __data[0];
+};
+
+struct trace_event_raw_generic_add_lease {
+ struct trace_entry ent;
+ long unsigned int i_ino;
+ int wcount;
+ int rcount;
+ int icount;
+ dev_t s_dev;
+ fl_owner_t fl_owner;
+ unsigned int fl_flags;
+ unsigned char fl_type;
+ char __data[0];
+};
+
+struct trace_event_raw_leases_conflict {
+ struct trace_entry ent;
+ void *lease;
+ void *breaker;
+ unsigned int l_fl_flags;
+ unsigned int b_fl_flags;
+ unsigned char l_fl_type;
+ unsigned char b_fl_type;
+ bool conflict;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_locks_get_lock_context {};
+
+struct trace_event_data_offsets_filelock_lock {};
+
+struct trace_event_data_offsets_filelock_lease {};
+
+struct trace_event_data_offsets_generic_add_lease {};
+
+struct trace_event_data_offsets_leases_conflict {};
+
+typedef void (*btf_trace_locks_get_lock_context)(void *, struct inode *, int, struct file_lock_context *);
+
+typedef void (*btf_trace_posix_lock_inode)(void *, struct inode *, struct file_lock *, int);
+
+typedef void (*btf_trace_fcntl_setlk)(void *, struct inode *, struct file_lock *, int);
+
+typedef void (*btf_trace_locks_remove_posix)(void *, struct inode *, struct file_lock *, int);
+
+typedef void (*btf_trace_flock_lock_inode)(void *, struct inode *, struct file_lock *, int);
+
+typedef void (*btf_trace_break_lease_noblock)(void *, struct inode *, struct file_lock *);
+
+typedef void (*btf_trace_break_lease_block)(void *, struct inode *, struct file_lock *);
+
+typedef void (*btf_trace_break_lease_unblock)(void *, struct inode *, struct file_lock *);
+
+typedef void (*btf_trace_generic_delete_lease)(void *, struct inode *, struct file_lock *);
+
+typedef void (*btf_trace_time_out_leases)(void *, struct inode *, struct file_lock *);
+
+typedef void (*btf_trace_generic_add_lease)(void *, struct inode *, struct file_lock *);
+
+typedef void (*btf_trace_leases_conflict)(void *, bool, struct file_lock *, struct file_lock *);
+
+struct file_lock_list_struct {
+ spinlock_t lock;
+ struct hlist_head hlist;
+};
+
+struct locks_iterator {
+ int li_cpu;
+ loff_t li_pos;
+};
+
+struct nls_table {
+ const char *charset;
+ const char *alias;
+ int (*uni2char)(wchar_t, unsigned char *, int);
+ int (*char2uni)(const unsigned char *, int, wchar_t *);
+ const unsigned char *charset2lower;
+ const unsigned char *charset2upper;
+ struct module *owner;
+ struct nls_table *next;
+};
+
+struct netif_security_struct {
+ struct net *ns;
+ int ifindex;
+ u32 sid;
+};
+
+struct sel_netif {
+ struct list_head list;
+ struct netif_security_struct nsec;
+ struct callback_head callback_head;
+};
+
+typedef void (*acpi_osd_exec_callback)(void *);
+
+typedef enum {
+ OSL_GLOBAL_LOCK_HANDLER = 0,
+ OSL_NOTIFY_HANDLER = 1,
+ OSL_GPE_HANDLER = 2,
+ OSL_DEBUGGER_MAIN_THREAD = 3,
+ OSL_DEBUGGER_EXEC_THREAD = 4,
+ OSL_EC_POLL_HANDLER = 5,
+ OSL_EC_BURST_HANDLER = 6,
+} acpi_execute_type;
+
+struct acpi_os_dpc {
+ acpi_osd_exec_callback function;
+ void *context;
+ struct work_struct work;
+};
+
+struct acpi_ioremap {
+ struct list_head list;
+ void *virt;
+ acpi_physical_address phys;
+ acpi_size size;
+ union {
+ long unsigned int refcount;
+ struct rcu_work rwork;
+ } track;
+};
+
+struct acpi_hp_work {
+ struct work_struct work;
+ struct acpi_device *adev;
+ u32 src;
+};
+
+struct tty_audit_buf {
+ struct mutex mutex;
+ dev_t dev;
+ unsigned int icanon: 1;
+ size_t valid;
+ unsigned char *data;
+};
+
+enum {
+ NETNSA_NONE = 0,
+ NETNSA_NSID = 1,
+ NETNSA_PID = 2,
+ NETNSA_FD = 3,
+ NETNSA_TARGET_NSID = 4,
+ NETNSA_CURRENT_NSID = 5,
+ __NETNSA_MAX = 6,
+};
+
+struct pcpu_gen_cookie {
+ local_t nesting;
+ u64 last;
+};
+
+struct gen_cookie {
+ struct pcpu_gen_cookie *local;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ atomic64_t forward_last;
+ atomic64_t reverse_last;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct net_fill_args {
+ u32 portid;
+ u32 seq;
+ int flags;
+ int cmd;
+ int nsid;
+ bool add_ref;
+ int ref_nsid;
+};
+
+struct rtnl_net_dump_cb {
+ struct net *tgt_net;
+ struct net *ref_net;
+ struct sk_buff *skb;
+ struct net_fill_args fillargs;
+ int idx;
+ int s_idx;
+};
+
+struct privflags_reply_data {
+ struct ethnl_reply_data base;
+ const char (*priv_flag_names)[32];
+ unsigned int n_priv_flags;
+ u32 priv_flags;
+};
+
+enum tcp_metric_index {
+ TCP_METRIC_RTT = 0,
+ TCP_METRIC_RTTVAR = 1,
+ TCP_METRIC_SSTHRESH = 2,
+ TCP_METRIC_CWND = 3,
+ TCP_METRIC_REORDERING = 4,
+ TCP_METRIC_RTT_US = 5,
+ TCP_METRIC_RTTVAR_US = 6,
+ __TCP_METRIC_MAX = 7,
+};
+
+enum {
+ TCP_METRICS_ATTR_UNSPEC = 0,
+ TCP_METRICS_ATTR_ADDR_IPV4 = 1,
+ TCP_METRICS_ATTR_ADDR_IPV6 = 2,
+ TCP_METRICS_ATTR_AGE = 3,
+ TCP_METRICS_ATTR_TW_TSVAL = 4,
+ TCP_METRICS_ATTR_TW_TS_STAMP = 5,
+ TCP_METRICS_ATTR_VALS = 6,
+ TCP_METRICS_ATTR_FOPEN_MSS = 7,
+ TCP_METRICS_ATTR_FOPEN_SYN_DROPS = 8,
+ TCP_METRICS_ATTR_FOPEN_SYN_DROP_TS = 9,
+ TCP_METRICS_ATTR_FOPEN_COOKIE = 10,
+ TCP_METRICS_ATTR_SADDR_IPV4 = 11,
+ TCP_METRICS_ATTR_SADDR_IPV6 = 12,
+ TCP_METRICS_ATTR_PAD = 13,
+ __TCP_METRICS_ATTR_MAX = 14,
+};
+
+enum {
+ TCP_METRICS_CMD_UNSPEC = 0,
+ TCP_METRICS_CMD_GET = 1,
+ TCP_METRICS_CMD_DEL = 2,
+ __TCP_METRICS_CMD_MAX = 3,
+};
+
+struct tcp_fastopen_metrics {
+ u16 mss;
+ u16 syn_loss: 10;
+ u16 try_exp: 2;
+ long unsigned int last_syn_loss;
+ struct tcp_fastopen_cookie cookie;
+};
+
+struct tcp_metrics_block {
+ struct tcp_metrics_block *tcpm_next;
+ possible_net_t tcpm_net;
+ struct inetpeer_addr tcpm_saddr;
+ struct inetpeer_addr tcpm_daddr;
+ long unsigned int tcpm_stamp;
+ u32 tcpm_lock;
+ u32 tcpm_vals[5];
+ struct tcp_fastopen_metrics tcpm_fastopen;
+ struct callback_head callback_head;
+};
+
+struct tcpm_hash_bucket {
+ struct tcp_metrics_block *chain;
+};
+
+struct ip6_ra_chain {
+ struct ip6_ra_chain *next;
+ struct sock *sk;
+ int sel;
+ void (*destructor)(struct sock *);
+};
+
+struct user_desc {
+ unsigned int entry_number;
+ unsigned int base_addr;
+ unsigned int limit;
+ unsigned int seg_32bit: 1;
+ unsigned int contents: 2;
+ unsigned int read_exec_only: 1;
+ unsigned int limit_in_pages: 1;
+ unsigned int seg_not_present: 1;
+ unsigned int useable: 1;
+ unsigned int lm: 1;
+};
+
+typedef struct ldttss_desc ldt_desc;
+
+typedef void (*call_rcu_func_t)(struct callback_head *, rcu_callback_t);
+
+struct rcu_gp_oldstate {
+ long unsigned int rgos_norm;
+ long unsigned int rgos_exp;
+};
+
+typedef int (*task_call_f)(struct task_struct *, void *);
+
+struct rcu_exp_work {
+ long unsigned int rew_s;
+ struct work_struct rew_work;
+};
+
+struct rcu_node {
+ raw_spinlock_t lock;
+ long unsigned int gp_seq;
+ long unsigned int gp_seq_needed;
+ long unsigned int completedqs;
+ long unsigned int qsmask;
+ long unsigned int rcu_gp_init_mask;
+ long unsigned int qsmaskinit;
+ long unsigned int qsmaskinitnext;
+ long unsigned int expmask;
+ long unsigned int expmaskinit;
+ long unsigned int expmaskinitnext;
+ long unsigned int cbovldmask;
+ long unsigned int ffmask;
+ long unsigned int grpmask;
+ int grplo;
+ int grphi;
+ u8 grpnum;
+ u8 level;
+ bool wait_blkd_tasks;
+ struct rcu_node *parent;
+ struct list_head blkd_tasks;
+ struct list_head *gp_tasks;
+ struct list_head *exp_tasks;
+ struct list_head *boost_tasks;
+ struct rt_mutex boost_mtx;
+ long unsigned int boost_time;
+ struct mutex boost_kthread_mutex;
+ struct task_struct *boost_kthread_task;
+ unsigned int boost_kthread_status;
+ long unsigned int n_boosts;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ raw_spinlock_t fqslock;
+ spinlock_t exp_lock;
+ long unsigned int exp_seq_rq;
+ wait_queue_head_t exp_wq[4];
+ struct rcu_exp_work rew;
+ bool exp_need_flush;
+ raw_spinlock_t exp_poll_lock;
+ long unsigned int exp_seq_poll_rq;
+ struct work_struct exp_poll_wq;
+ long: 64;
+ long: 64;
+};
+
+struct sysrq_key_op {
+ void (* const handler)(int);
+ const char * const help_msg;
+ const char * const action_msg;
+ const int enable_mask;
+};
+
+union rcu_noqs {
+ struct {
+ u8 norm;
+ u8 exp;
+ } b;
+ u16 s;
+};
+
+struct rcu_data {
+ long unsigned int gp_seq;
+ long unsigned int gp_seq_needed;
+ union rcu_noqs cpu_no_qs;
+ bool core_needs_qs;
+ bool beenonline;
+ bool gpwrap;
+ bool cpu_started;
+ struct rcu_node *mynode;
+ long unsigned int grpmask;
+ long unsigned int ticks_this_gp;
+ struct irq_work defer_qs_iw;
+ bool defer_qs_iw_pending;
+ struct work_struct strict_work;
+ struct rcu_segcblist cblist;
+ long int qlen_last_fqs_check;
+ long unsigned int n_cbs_invoked;
+ long unsigned int n_force_qs_snap;
+ long int blimit;
+ int dynticks_snap;
+ bool rcu_need_heavy_qs;
+ bool rcu_urgent_qs;
+ bool rcu_forced_tick;
+ bool rcu_forced_tick_exp;
+ long unsigned int barrier_seq_snap;
+ struct callback_head barrier_head;
+ int exp_dynticks_snap;
+ struct task_struct *rcu_cpu_kthread_task;
+ unsigned int rcu_cpu_kthread_status;
+ char rcu_cpu_has_work;
+ long unsigned int rcuc_activity;
+ unsigned int softirq_snap;
+ struct irq_work rcu_iw;
+ bool rcu_iw_pending;
+ long unsigned int rcu_iw_gp_seq;
+ long unsigned int rcu_ofl_gp_seq;
+ short int rcu_ofl_gp_flags;
+ long unsigned int rcu_onl_gp_seq;
+ short int rcu_onl_gp_flags;
+ long unsigned int last_fqs_resched;
+ long unsigned int last_sched_clock;
+ int cpu;
+};
+
+struct rcu_state {
+ struct rcu_node node[9];
+ struct rcu_node *level[3];
+ int ncpus;
+ int n_online_cpus;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long unsigned int gp_seq;
+ long unsigned int gp_max;
+ struct task_struct *gp_kthread;
+ struct swait_queue_head gp_wq;
+ short int gp_flags;
+ short int gp_state;
+ long unsigned int gp_wake_time;
+ long unsigned int gp_wake_seq;
+ long unsigned int gp_seq_polled;
+ long unsigned int gp_seq_polled_snap;
+ long unsigned int gp_seq_polled_exp_snap;
+ struct mutex barrier_mutex;
+ atomic_t barrier_cpu_count;
+ struct completion barrier_completion;
+ long unsigned int barrier_sequence;
+ raw_spinlock_t barrier_lock;
+ struct mutex exp_mutex;
+ struct mutex exp_wake_mutex;
+ long unsigned int expedited_sequence;
+ atomic_t expedited_need_qs;
+ struct swait_queue_head expedited_wq;
+ int ncpus_snap;
+ u8 cbovld;
+ u8 cbovldnext;
+ long unsigned int jiffies_force_qs;
+ long unsigned int jiffies_kick_kthreads;
+ long unsigned int n_force_qs;
+ long unsigned int gp_start;
+ long unsigned int gp_end;
+ long unsigned int gp_activity;
+ long unsigned int gp_req_activity;
+ long unsigned int jiffies_stall;
+ long unsigned int jiffies_resched;
+ long unsigned int n_force_qs_gpstart;
+ const char *name;
+ char abbr;
+ long: 56;
+ long: 64;
+ arch_spinlock_t ofl_lock;
+ int nocb_is_setup;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct kvfree_rcu_bulk_data {
+ long unsigned int nr_records;
+ struct kvfree_rcu_bulk_data *next;
+ void *records[0];
+};
+
+struct kfree_rcu_cpu;
+
+struct kfree_rcu_cpu_work {
+ struct rcu_work rcu_work;
+ struct callback_head *head_free;
+ struct kvfree_rcu_bulk_data *bkvhead_free[2];
+ struct kfree_rcu_cpu *krcp;
+};
+
+struct kfree_rcu_cpu {
+ struct callback_head *head;
+ struct kvfree_rcu_bulk_data *bkvhead[2];
+ struct kfree_rcu_cpu_work krw_arr[2];
+ raw_spinlock_t lock;
+ struct delayed_work monitor_work;
+ bool initialized;
+ int count;
+ struct delayed_work page_cache_work;
+ atomic_t backoff_page_cache_fill;
+ atomic_t work_in_progress;
+ struct hrtimer hrtimer;
+ struct llist_head bkvcache;
+ int nr_bkv_objs;
+};
+
+struct rcu_stall_chk_rdr {
+ int nesting;
+ union rcu_special rs;
+ bool on_blkd_list;
+};
+
+struct rq_qos_wait_data {
+ struct wait_queue_entry wq;
+ struct task_struct *task;
+ struct rq_wait *rqw;
+ acquire_inflight_cb_t *cb;
+ void *private_data;
+ bool got_token;
+};
+
+typedef s32 compat_ssize_t;
+
+struct compat_iovec {
+ compat_uptr_t iov_base;
+ compat_size_t iov_len;
+};
+
+struct logo_data {
+ int depth;
+ int needs_directpalette;
+ int needs_truepalette;
+ int needs_cmapreset;
+ const struct linux_logo *logo;
+};
+
+struct acpi_create_field_info {
+ struct acpi_namespace_node *region_node;
+ struct acpi_namespace_node *field_node;
+ struct acpi_namespace_node *register_node;
+ struct acpi_namespace_node *data_register_node;
+ struct acpi_namespace_node *connection_node;
+ u8 *resource_buffer;
+ u32 bank_value;
+ u32 field_bit_position;
+ u32 field_bit_length;
+ u16 resource_length;
+ u16 pin_number_index;
+ u8 field_flags;
+ u8 attribute;
+ u8 field_type;
+ u8 access_length;
+};
+
+typedef enum {
+ ACPI_TRACE_AML_METHOD = 0,
+ ACPI_TRACE_AML_OPCODE = 1,
+ ACPI_TRACE_AML_REGION = 2,
+} acpi_trace_event_type;
+
+struct vring_desc {
+ __virtio64 addr;
+ __virtio32 len;
+ __virtio16 flags;
+ __virtio16 next;
+};
+
+struct vring_avail {
+ __virtio16 flags;
+ __virtio16 idx;
+ __virtio16 ring[0];
+};
+
+struct vring_used_elem {
+ __virtio32 id;
+ __virtio32 len;
+};
+
+typedef struct vring_used_elem vring_used_elem_t;
+
+struct vring_used {
+ __virtio16 flags;
+ __virtio16 idx;
+ vring_used_elem_t ring[0];
+};
+
+typedef struct vring_desc vring_desc_t;
+
+typedef struct vring_avail vring_avail_t;
+
+typedef struct vring_used vring_used_t;
+
+struct vring {
+ unsigned int num;
+ vring_desc_t *desc;
+ vring_avail_t *avail;
+ vring_used_t *used;
+};
+
+struct vring_packed_desc_event {
+ __le16 off_wrap;
+ __le16 flags;
+};
+
+struct vring_packed_desc {
+ __le64 addr;
+ __le32 len;
+ __le16 id;
+ __le16 flags;
+};
+
+struct vring_desc_state_split {
+ void *data;
+ struct vring_desc *indir_desc;
+};
+
+struct vring_desc_state_packed {
+ void *data;
+ struct vring_packed_desc *indir_desc;
+ u16 num;
+ u16 last;
+};
+
+struct vring_desc_extra {
+ dma_addr_t addr;
+ u32 len;
+ u16 flags;
+ u16 next;
+};
+
+struct vring_virtqueue_split {
+ struct vring vring;
+ u16 avail_flags_shadow;
+ u16 avail_idx_shadow;
+ struct vring_desc_state_split *desc_state;
+ struct vring_desc_extra *desc_extra;
+ dma_addr_t queue_dma_addr;
+ size_t queue_size_in_bytes;
+ u32 vring_align;
+ bool may_reduce_num;
+};
+
+struct vring_virtqueue_packed {
+ struct {
+ unsigned int num;
+ struct vring_packed_desc *desc;
+ struct vring_packed_desc_event *driver;
+ struct vring_packed_desc_event *device;
+ } vring;
+ bool avail_wrap_counter;
+ u16 avail_used_flags;
+ u16 next_avail_idx;
+ u16 event_flags_shadow;
+ struct vring_desc_state_packed *desc_state;
+ struct vring_desc_extra *desc_extra;
+ dma_addr_t ring_dma_addr;
+ dma_addr_t driver_event_dma_addr;
+ dma_addr_t device_event_dma_addr;
+ size_t ring_size_in_bytes;
+ size_t event_size_in_bytes;
+};
+
+struct vring_virtqueue {
+ struct virtqueue vq;
+ bool packed_ring;
+ bool use_dma_api;
+ bool weak_barriers;
+ bool broken;
+ bool indirect;
+ bool event;
+ unsigned int free_head;
+ unsigned int num_added;
+ u16 last_used_idx;
+ bool event_triggered;
+ union {
+ struct vring_virtqueue_split split;
+ struct vring_virtqueue_packed packed;
+ };
+ bool (*notify)(struct virtqueue *);
+ bool we_own_ring;
+};
+
+struct subsys_dev_iter {
+ struct klist_iter ki;
+ const struct device_type *type;
+};
+
+struct learning_pkt {
+ u8 mac_dst[6];
+ u8 mac_src[6];
+ __be16 type;
+ u8 padding[46];
+};
+
+struct arp_pkt {
+ __be16 hw_addr_space;
+ __be16 prot_addr_space;
+ u8 hw_addr_len;
+ u8 prot_addr_len;
+ __be16 op_code;
+ u8 mac_src[6];
+ __be32 ip_src;
+ u8 mac_dst[6];
+ __be32 ip_dst;
+} __attribute__((packed));
+
+struct alb_walk_data {
+ struct bonding *bond;
+ struct slave *slave;
+ const u8 *mac_addr;
+ bool strict_match;
+};
+
+enum ethtool_multicast_groups {
+ ETHNL_MCGRP_MONITOR = 0,
+};
+
+struct ethnl_dump_ctx {
+ const struct ethnl_request_ops *ops;
+ struct ethnl_req_info *req_info;
+ struct ethnl_reply_data *reply_data;
+ int pos_hash;
+ int pos_idx;
+};
+
+typedef void (*ethnl_notify_handler_t)(struct net_device *, unsigned int, const void *);
+
+struct xt_template {
+ struct list_head list;
+ int (*table_init)(struct net *);
+ struct module *me;
+ char name[32];
+};
+
+struct xt_pernet {
+ struct list_head tables[11];
+};
+
+struct xt_af {
+ struct mutex mutex;
+ struct list_head match;
+ struct list_head target;
+};
+
+struct nf_mttg_trav {
+ struct list_head *head;
+ struct list_head *curr;
+ uint8_t class;
+};
+
+enum {
+ MTTG_TRAV_INIT = 0,
+ MTTG_TRAV_NFP_UNSPEC = 1,
+ MTTG_TRAV_NFP_SPEC = 2,
+ MTTG_TRAV_DONE = 3,
+};
+
+struct rta_mfc_stats {
+ __u64 mfcs_packets;
+ __u64 mfcs_bytes;
+ __u64 mfcs_wrong_if;
+};
+
+struct vif_entry_notifier_info {
+ struct fib_notifier_info info;
+ struct net_device *dev;
+ short unsigned int vif_index;
+ short unsigned int vif_flags;
+ u32 tb_id;
+};
+
+enum {
+ MFC_STATIC = 1,
+ MFC_OFFLOAD = 2,
+};
+
+struct mr_mfc {
+ struct rhlist_head mnode;
+ short unsigned int mfc_parent;
+ int mfc_flags;
+ union {
+ struct {
+ long unsigned int expires;
+ struct sk_buff_head unresolved;
+ } unres;
+ struct {
+ long unsigned int last_assert;
+ int minvif;
+ int maxvif;
+ long unsigned int bytes;
+ long unsigned int pkt;
+ long unsigned int wrong_if;
+ long unsigned int lastuse;
+ unsigned char ttls[32];
+ refcount_t refcount;
+ } res;
+ } mfc_un;
+ struct list_head list;
+ struct callback_head rcu;
+ void (*free)(struct callback_head *);
+};
+
+struct mfc_entry_notifier_info {
+ struct fib_notifier_info info;
+ struct mr_mfc *mfc;
+ u32 tb_id;
+};
+
+struct mr_vif_iter {
+ struct seq_net_private p;
+ struct mr_table *mrt;
+ int ct;
+};
+
+struct mr_mfc_iter {
+ struct seq_net_private p;
+ struct mr_table *mrt;
+ struct list_head *cache;
+ spinlock_t *lock;
+};
+
+enum {
+ NLBL_UNLABEL_C_UNSPEC = 0,
+ NLBL_UNLABEL_C_ACCEPT = 1,
+ NLBL_UNLABEL_C_LIST = 2,
+ NLBL_UNLABEL_C_STATICADD = 3,
+ NLBL_UNLABEL_C_STATICREMOVE = 4,
+ NLBL_UNLABEL_C_STATICLIST = 5,
+ NLBL_UNLABEL_C_STATICADDDEF = 6,
+ NLBL_UNLABEL_C_STATICREMOVEDEF = 7,
+ NLBL_UNLABEL_C_STATICLISTDEF = 8,
+ __NLBL_UNLABEL_C_MAX = 9,
+};
+
+enum {
+ NLBL_UNLABEL_A_UNSPEC = 0,
+ NLBL_UNLABEL_A_ACPTFLG = 1,
+ NLBL_UNLABEL_A_IPV6ADDR = 2,
+ NLBL_UNLABEL_A_IPV6MASK = 3,
+ NLBL_UNLABEL_A_IPV4ADDR = 4,
+ NLBL_UNLABEL_A_IPV4MASK = 5,
+ NLBL_UNLABEL_A_IFACE = 6,
+ NLBL_UNLABEL_A_SECCTX = 7,
+ __NLBL_UNLABEL_A_MAX = 8,
+};
+
+struct netlbl_unlhsh_tbl {
+ struct list_head *tbl;
+ u32 size;
+};
+
+struct netlbl_unlhsh_addr4 {
+ u32 secid;
+ struct netlbl_af4list list;
+ struct callback_head rcu;
+};
+
+struct netlbl_unlhsh_addr6 {
+ u32 secid;
+ struct netlbl_af6list list;
+ struct callback_head rcu;
+};
+
+struct netlbl_unlhsh_iface {
+ int ifindex;
+ struct list_head addr4_list;
+ struct list_head addr6_list;
+ u32 valid;
+ struct list_head list;
+ struct callback_head rcu;
+};
+
+struct netlbl_unlhsh_walk_arg {
+ struct netlink_callback *nl_cb;
+ struct sk_buff *skb;
+ u32 seq;
+};
+
+struct setup_data {
+ __u64 next;
+ __u32 type;
+ __u32 len;
+ __u8 data[0];
+};
+
+struct setup_indirect {
+ __u32 type;
+ __u32 reserved;
+ __u64 len;
+ __u64 addr;
+};
+
+struct ima_setup_data {
+ __u64 addr;
+ __u64 size;
+};
+
+enum efi_secureboot_mode {
+ efi_secureboot_mode_unset = 0,
+ efi_secureboot_mode_unknown = 1,
+ efi_secureboot_mode_disabled = 2,
+ efi_secureboot_mode_enabled = 3,
+};
+
+struct printk_info {
+ u64 seq;
+ u64 ts_nsec;
+ u16 text_len;
+ u8 facility;
+ u8 flags: 5;
+ u8 level: 3;
+ u32 caller_id;
+ struct dev_printk_info dev_info;
+};
+
+struct printk_record {
+ struct printk_info *info;
+ char *text_buf;
+ unsigned int text_buf_size;
+};
+
+struct prb_data_blk_lpos {
+ long unsigned int begin;
+ long unsigned int next;
+};
+
+struct prb_desc {
+ atomic_long_t state_var;
+ struct prb_data_blk_lpos text_blk_lpos;
+};
+
+struct prb_data_ring {
+ unsigned int size_bits;
+ char *data;
+ atomic_long_t head_lpos;
+ atomic_long_t tail_lpos;
+};
+
+struct prb_desc_ring {
+ unsigned int count_bits;
+ struct prb_desc *descs;
+ struct printk_info *infos;
+ atomic_long_t head_id;
+ atomic_long_t tail_id;
+ atomic_long_t last_finalized_id;
+};
+
+struct printk_ringbuffer {
+ struct prb_desc_ring desc_ring;
+ struct prb_data_ring text_data_ring;
+ atomic_long_t fail;
+};
+
+struct prb_reserved_entry {
+ struct printk_ringbuffer *rb;
+ long unsigned int irqflags;
+ long unsigned int id;
+ unsigned int text_space;
+};
+
+enum desc_state {
+ desc_miss = -1,
+ desc_reserved = 0,
+ desc_committed = 1,
+ desc_finalized = 2,
+ desc_reusable = 3,
+};
+
+struct prb_data_block {
+ long unsigned int id;
+ char data[0];
+};
+
+struct irqchip_fwid {
+ struct fwnode_handle fwnode;
+ unsigned int type;
+ char *name;
+ phys_addr_t *pa;
+};
+
+struct cfd_percpu {
+ call_single_data_t csd;
+};
+
+struct call_function_data {
+ struct cfd_percpu *pcpu;
+ cpumask_var_t cpumask;
+ cpumask_var_t cpumask_ipi;
+};
+
+struct smp_call_on_cpu_struct {
+ struct work_struct work;
+ struct completion done;
+ int (*func)(void *);
+ void *data;
+ int ret;
+ int cpu;
+};
+
+struct kretprobe_instance;
+
+typedef int (*kretprobe_handler_t)(struct kretprobe_instance *, struct pt_regs *);
+
+struct kretprobe_instance {
+ struct rethook_node node;
+ char data[0];
+};
+
+struct kretprobe {
+ struct kprobe kp;
+ kretprobe_handler_t handler;
+ kretprobe_handler_t entry_handler;
+ int maxactive;
+ int nmissed;
+ size_t data_size;
+ struct rethook *rh;
+};
+
+struct kprobe_blacklist_entry {
+ struct list_head list;
+ long unsigned int start_addr;
+ long unsigned int end_addr;
+};
+
+struct kprobe_insn_page {
+ struct list_head list;
+ kprobe_opcode_t *insns;
+ struct kprobe_insn_cache *cache;
+ int nused;
+ int ngarbage;
+ char slot_used[0];
+};
+
+enum kprobe_slot_state {
+ SLOT_CLEAN = 0,
+ SLOT_DIRTY = 1,
+ SLOT_USED = 2,
+};
+
+struct shmem_sb_info {
+ long unsigned int max_blocks;
+ struct percpu_counter used_blocks;
+ long unsigned int max_inodes;
+ long unsigned int free_inodes;
+ raw_spinlock_t stat_lock;
+ umode_t mode;
+ unsigned char huge;
+ kuid_t uid;
+ kgid_t gid;
+ bool full_inums;
+ ino_t next_ino;
+ ino_t *ino_batch;
+ struct mempolicy *mpol;
+ spinlock_t shrinklist_lock;
+ struct list_head shrinklist;
+ long unsigned int shrinklist_len;
+};
+
+struct shmem_falloc {
+ wait_queue_head_t *waitq;
+ long unsigned int start;
+ long unsigned int next;
+ long unsigned int nr_falloced;
+ long unsigned int nr_unswapped;
+};
+
+struct shmem_options {
+ long long unsigned int blocks;
+ long long unsigned int inodes;
+ struct mempolicy *mpol;
+ kuid_t uid;
+ kgid_t gid;
+ umode_t mode;
+ bool full_inums;
+ int huge;
+ int seen;
+};
+
+enum shmem_param {
+ Opt_gid___5 = 0,
+ Opt_huge = 1,
+ Opt_mode___5 = 2,
+ Opt_mpol = 3,
+ Opt_nr_blocks = 4,
+ Opt_nr_inodes___2 = 5,
+ Opt_size___2 = 6,
+ Opt_uid___4 = 7,
+ Opt_inode32 = 8,
+ Opt_inode64 = 9,
+};
+
+struct blkpg_ioctl_arg {
+ int op;
+ int flags;
+ int datalen;
+ void *data;
+};
+
+struct blkpg_partition {
+ long long int start;
+ long long int length;
+ int pno;
+ char devname[64];
+ char volname[64];
+};
+
+struct pr_reservation {
+ __u64 key;
+ __u32 type;
+ __u32 flags;
+};
+
+struct pr_registration {
+ __u64 old_key;
+ __u64 new_key;
+ __u32 flags;
+ __u32 __pad;
+};
+
+struct pr_preempt {
+ __u64 old_key;
+ __u64 new_key;
+ __u32 type;
+ __u32 flags;
+};
+
+struct pr_clear {
+ __u64 key;
+ __u32 flags;
+ __u32 __pad;
+};
+
+struct io_uring_rsrc_update {
+ __u32 offset;
+ __u32 resv;
+ __u64 data;
+};
+
+typedef struct io_wq_work *free_work_fn(struct io_wq_work *);
+
+typedef void io_wq_work_fn(struct io_wq_work *);
+
+struct io_wq_data {
+ struct io_wq_hash *hash;
+ struct task_struct *task;
+ io_wq_work_fn *do_work;
+ free_work_fn *free_work;
+};
+
+struct file_priv {
+ struct tpm_chip *chip;
+ struct tpm_space *space;
+ struct mutex buffer_mutex;
+ struct timer_list user_read_timer;
+ struct work_struct timeout_work;
+ struct work_struct async_work;
+ wait_queue_head_t async_wait;
+ ssize_t response_length;
+ bool response_read;
+ bool command_enqueued;
+ u8 data_buffer[4096];
+};
+
+struct tpmrm_priv {
+ struct file_priv priv;
+ struct tpm_space space;
+};
+
+typedef long unsigned int __kernel_old_dev_t;
+
+enum {
+ LO_FLAGS_READ_ONLY = 1,
+ LO_FLAGS_AUTOCLEAR = 4,
+ LO_FLAGS_PARTSCAN = 8,
+ LO_FLAGS_DIRECT_IO = 16,
+};
+
+struct loop_info {
+ int lo_number;
+ __kernel_old_dev_t lo_device;
+ long unsigned int lo_inode;
+ __kernel_old_dev_t lo_rdevice;
+ int lo_offset;
+ int lo_encrypt_type;
+ int lo_encrypt_key_size;
+ int lo_flags;
+ char lo_name[64];
+ unsigned char lo_encrypt_key[32];
+ long unsigned int lo_init[2];
+ char reserved[4];
+};
+
+struct loop_info64 {
+ __u64 lo_device;
+ __u64 lo_inode;
+ __u64 lo_rdevice;
+ __u64 lo_offset;
+ __u64 lo_sizelimit;
+ __u32 lo_number;
+ __u32 lo_encrypt_type;
+ __u32 lo_encrypt_key_size;
+ __u32 lo_flags;
+ __u8 lo_file_name[64];
+ __u8 lo_crypt_name[64];
+ __u8 lo_encrypt_key[32];
+ __u64 lo_init[2];
+};
+
+struct loop_config {
+ __u32 fd;
+ __u32 block_size;
+ struct loop_info64 info;
+ __u64 __reserved[8];
+};
+
+enum {
+ Lo_unbound = 0,
+ Lo_bound = 1,
+ Lo_rundown = 2,
+ Lo_deleting = 3,
+};
+
+struct loop_device {
+ int lo_number;
+ loff_t lo_offset;
+ loff_t lo_sizelimit;
+ int lo_flags;
+ char lo_file_name[64];
+ struct file *lo_backing_file;
+ struct block_device *lo_device;
+ gfp_t old_gfp_mask;
+ spinlock_t lo_lock;
+ int lo_state;
+ spinlock_t lo_work_lock;
+ struct workqueue_struct *workqueue;
+ struct work_struct rootcg_work;
+ struct list_head rootcg_cmd_list;
+ struct list_head idle_worker_list;
+ struct rb_root worker_tree;
+ struct timer_list timer;
+ bool use_dio;
+ bool sysfs_inited;
+ struct request_queue *lo_queue;
+ struct blk_mq_tag_set tag_set;
+ struct gendisk *lo_disk;
+ struct mutex lo_mutex;
+ bool idr_visible;
+};
+
+struct loop_cmd {
+ struct list_head list_entry;
+ bool use_aio;
+ atomic_t ref;
+ long int ret;
+ struct kiocb iocb;
+ struct bio_vec *bvec;
+ struct cgroup_subsys_state *blkcg_css;
+ struct cgroup_subsys_state *memcg_css;
+};
+
+struct loop_worker {
+ struct rb_node rb_node;
+ struct work_struct work;
+ struct list_head cmd_list;
+ struct list_head idle_list;
+ struct loop_device *lo;
+ struct cgroup_subsys_state *blkcg_css;
+ long unsigned int last_ran_at;
+};
+
+enum ptp_clock_events {
+ PTP_CLOCK_ALARM = 0,
+ PTP_CLOCK_EXTTS = 1,
+ PTP_CLOCK_PPS = 2,
+ PTP_CLOCK_PPSUSR = 3,
+};
+
+struct ptp_clock_event {
+ int type;
+ int index;
+ union {
+ u64 timestamp;
+ struct pps_event_time pps_times;
+ };
+};
+
+struct xfrm_trans_tasklet {
+ struct work_struct work;
+ spinlock_t queue_lock;
+ struct sk_buff_head queue;
+};
+
+struct xfrm_trans_cb {
+ union {
+ struct inet_skb_parm h4;
+ struct inet6_skb_parm h6;
+ } header;
+ int (*finish)(struct net *, struct sock *, struct sk_buff *);
+ struct net *net;
+};
+
+enum {
+ NLBL_MGMT_C_UNSPEC = 0,
+ NLBL_MGMT_C_ADD = 1,
+ NLBL_MGMT_C_REMOVE = 2,
+ NLBL_MGMT_C_LISTALL = 3,
+ NLBL_MGMT_C_ADDDEF = 4,
+ NLBL_MGMT_C_REMOVEDEF = 5,
+ NLBL_MGMT_C_LISTDEF = 6,
+ NLBL_MGMT_C_PROTOCOLS = 7,
+ NLBL_MGMT_C_VERSION = 8,
+ __NLBL_MGMT_C_MAX = 9,
+};
+
+enum {
+ NLBL_MGMT_A_UNSPEC = 0,
+ NLBL_MGMT_A_DOMAIN = 1,
+ NLBL_MGMT_A_PROTOCOL = 2,
+ NLBL_MGMT_A_VERSION = 3,
+ NLBL_MGMT_A_CV4DOI = 4,
+ NLBL_MGMT_A_IPV6ADDR = 5,
+ NLBL_MGMT_A_IPV6MASK = 6,
+ NLBL_MGMT_A_IPV4ADDR = 7,
+ NLBL_MGMT_A_IPV4MASK = 8,
+ NLBL_MGMT_A_ADDRSELECTOR = 9,
+ NLBL_MGMT_A_SELECTORLIST = 10,
+ NLBL_MGMT_A_FAMILY = 11,
+ NLBL_MGMT_A_CLPDOI = 12,
+ __NLBL_MGMT_A_MAX = 13,
+};
+
+struct netlbl_domhsh_walk_arg___2 {
+ struct netlink_callback *nl_cb;
+ struct sk_buff *skb;
+ u32 seq;
+};
+
+enum blktrace_notify {
+ __BLK_TN_PROCESS = 0,
+ __BLK_TN_TIMESTAMP = 1,
+ __BLK_TN_MESSAGE = 2,
+ __BLK_TN_CGROUP = 256,
+};
+
+struct blk_io_trace {
+ __u32 magic;
+ __u32 sequence;
+ __u64 time;
+ __u64 sector;
+ __u32 bytes;
+ __u32 action;
+ __u32 pid;
+ __u32 device;
+ __u32 cpu;
+ __u16 error;
+ __u16 pdu_len;
+};
+
+struct blk_io_trace_remap {
+ __be32 device_from;
+ __be32 device_to;
+ __be64 sector_from;
+};
+
+enum {
+ Blktrace_setup = 1,
+ Blktrace_running = 2,
+ Blktrace_stopped = 3,
+};
+
+struct blk_user_trace_setup {
+ char name[32];
+ __u16 act_mask;
+ __u32 buf_size;
+ __u32 buf_nr;
+ __u64 start_lba;
+ __u64 end_lba;
+ __u32 pid;
+};
+
+typedef void blk_log_action_t(struct trace_iterator *, const char *, bool);
+
+struct fscrypt_str {
+ unsigned char *name;
+ u32 len;
+};
+
+struct fscrypt_name {
+ const struct qstr *usr_fname;
+ struct fscrypt_str disk_name;
+ u32 hash;
+ u32 minor_hash;
+ struct fscrypt_str crypto_buf;
+ bool is_nokey_name;
+};
+
+struct ext4_dir_entry {
+ __le32 inode;
+ __le16 rec_len;
+ __le16 name_len;
+ char name[255];
+};
+
+struct ext4_dir_entry_hash {
+ __le32 hash;
+ __le32 minor_hash;
+};
+
+struct ext4_dir_entry_2 {
+ __le32 inode;
+ __le16 rec_len;
+ __u8 name_len;
+ __u8 file_type;
+ char name[255];
+};
+
+struct ext4_dir_entry_tail {
+ __le32 det_reserved_zero1;
+ __le16 det_rec_len;
+ __u8 det_reserved_zero2;
+ __u8 det_reserved_ft;
+ __le32 det_checksum;
+};
+
+struct ext4_filename {
+ const struct qstr *usr_fname;
+ struct fscrypt_str disk_name;
+ struct dx_hash_info hinfo;
+};
+
+typedef enum {
+ EITHER = 0,
+ INDEX = 1,
+ DIRENT = 2,
+ DIRENT_HTREE = 3,
+} dirblock_type_t;
+
+struct fake_dirent {
+ __le32 inode;
+ __le16 rec_len;
+ u8 name_len;
+ u8 file_type;
+};
+
+struct dx_countlimit {
+ __le16 limit;
+ __le16 count;
+};
+
+struct dx_entry {
+ __le32 hash;
+ __le32 block;
+};
+
+struct dx_root_info {
+ __le32 reserved_zero;
+ u8 hash_version;
+ u8 info_length;
+ u8 indirect_levels;
+ u8 unused_flags;
+};
+
+struct dx_root {
+ struct fake_dirent dot;
+ char dot_name[4];
+ struct fake_dirent dotdot;
+ char dotdot_name[4];
+ struct dx_root_info info;
+ struct dx_entry entries[0];
+};
+
+struct dx_node {
+ struct fake_dirent fake;
+ struct dx_entry entries[0];
+};
+
+struct dx_frame {
+ struct buffer_head *bh;
+ struct dx_entry *entries;
+ struct dx_entry *at;
+};
+
+struct dx_map_entry {
+ u32 hash;
+ u16 offs;
+ u16 size;
+};
+
+struct dx_tail {
+ u32 dt_reserved;
+ __le32 dt_checksum;
+};
+
+struct ext4_renament {
+ struct inode *dir;
+ struct dentry *dentry;
+ struct inode *inode;
+ bool is_dir;
+ int dir_nlink_delta;
+ struct buffer_head *bh;
+ struct ext4_dir_entry_2 *de;
+ int inlined;
+ struct buffer_head *dir_bh;
+ struct ext4_dir_entry_2 *parent_de;
+ int dir_inlined;
+};
+
+struct ima_queue_entry {
+ struct hlist_node hnext;
+ struct list_head later;
+ struct ima_template_entry *entry;
+};
+
+enum ima_fs_flags {
+ IMA_FS_BUSY = 0,
+};
+
+struct md5_state {
+ u32 hash[4];
+ u32 block[16];
+ u64 byte_count;
+};
+
+struct sockaddr_alg_new {
+ __u16 salg_family;
+ __u8 salg_type[14];
+ __u32 salg_feat;
+ __u32 salg_mask;
+ __u8 salg_name[0];
+};
+
+struct af_alg_iv {
+ __u32 ivlen;
+ __u8 iv[0];
+};
+
+enum {
+ SOCK_WAKE_IO = 0,
+ SOCK_WAKE_WAITD = 1,
+ SOCK_WAKE_SPACE = 2,
+ SOCK_WAKE_URG = 3,
+};
+
+struct af_alg_control {
+ struct af_alg_iv *iv;
+ int op;
+ unsigned int aead_assoclen;
+};
+
+struct af_alg_tsgl {
+ struct list_head list;
+ unsigned int cur;
+ struct scatterlist sg[0];
+};
+
+struct af_alg_rsgl {
+ struct af_alg_sgl sgl;
+ struct list_head list;
+ size_t sg_num_bytes;
+};
+
+struct af_alg_async_req {
+ struct kiocb *iocb;
+ struct sock *sk;
+ struct af_alg_rsgl first_rsgl;
+ struct af_alg_rsgl *last_rsgl;
+ struct list_head rsgl_list;
+ struct scatterlist *tsgl;
+ unsigned int tsgl_entries;
+ unsigned int outlen;
+ unsigned int areqlen;
+ union {
+ struct aead_request aead_req;
+ struct skcipher_request skcipher_req;
+ } cra_u;
+};
+
+struct af_alg_ctx {
+ struct list_head tsgl_list;
+ void *iv;
+ size_t aead_assoclen;
+ struct crypto_wait wait;
+ size_t used;
+ atomic_t rcvused;
+ bool more;
+ bool merge;
+ bool enc;
+ bool init;
+ unsigned int len;
+};
+
+struct alg_type_list {
+ const struct af_alg_type *type;
+ struct list_head list;
+};
+
+struct acpi_osc_context {
+ char *uuid_str;
+ int rev;
+ struct acpi_buffer cap;
+ struct acpi_buffer ret;
+};
+
+struct sysrq_state {
+ struct input_handle handle;
+ struct work_struct reinject_work;
+ long unsigned int key_down[12];
+ unsigned int alt;
+ unsigned int alt_use;
+ unsigned int shift;
+ unsigned int shift_use;
+ bool active;
+ bool need_reinject;
+ bool reinjecting;
+ bool reset_canceled;
+ bool reset_requested;
+ long unsigned int reset_keybit[12];
+ int reset_seq_len;
+ int reset_seq_cnt;
+ int reset_seq_version;
+ struct timer_list keyreset_timer;
+};
+
+struct node_access_nodes {
+ struct device dev;
+ struct list_head list_node;
+ unsigned int access;
+};
+
+struct node_attr {
+ struct device_attribute attr;
+ enum node_states state;
+};
+
+struct update_classid_context {
+ u32 classid;
+ unsigned int batch;
+};
+
+struct linkinfo_reply_data {
+ struct ethnl_reply_data base;
+ struct ethtool_link_ksettings ksettings;
+ struct ethtool_link_settings *lsettings;
+};
+
+struct ip_fraglist_iter {
+ struct sk_buff *frag;
+ struct iphdr *iph;
+ int offset;
+ unsigned int hlen;
+};
+
+struct ip_frag_state {
+ bool DF;
+ unsigned int hlen;
+ unsigned int ll_rs;
+ unsigned int mtu;
+ unsigned int left;
+ int offset;
+ int ptr;
+ __be16 not_last_frag;
+};
+
+struct numa_group {
+ refcount_t refcount;
+ spinlock_t lock;
+ int nr_tasks;
+ pid_t gid;
+ int active_nodes;
+ struct callback_head rcu;
+ long unsigned int total_faults;
+ long unsigned int max_faults_cpu;
+ long unsigned int faults[0];
+};
+
+typedef int (*tg_visitor)(struct task_group *, void *);
+
+enum numa_faults_stats {
+ NUMA_MEM = 0,
+ NUMA_CPU = 1,
+ NUMA_MEMBUF = 2,
+ NUMA_CPUBUF = 3,
+};
+
+enum numa_type {
+ node_has_spare = 0,
+ node_fully_busy = 1,
+ node_overloaded = 2,
+};
+
+struct numa_stats {
+ long unsigned int load;
+ long unsigned int runnable;
+ long unsigned int util;
+ long unsigned int compute_capacity;
+ unsigned int nr_running;
+ unsigned int weight;
+ enum numa_type node_type;
+ int idle_cpu;
+};
+
+struct task_numa_env {
+ struct task_struct *p;
+ int src_cpu;
+ int src_nid;
+ int dst_cpu;
+ int dst_nid;
+ int imb_numa_nr;
+ struct numa_stats src_stats;
+ struct numa_stats dst_stats;
+ int imbalance_pct;
+ int dist;
+ struct task_struct *best_task;
+ long int best_imp;
+ int best_cpu;
+};
+
+struct energy_env {
+ long unsigned int task_busy_time;
+ long unsigned int pd_busy_time;
+ long unsigned int cpu_cap;
+ long unsigned int pd_cap;
+};
+
+enum fbq_type {
+ regular = 0,
+ remote = 1,
+ all = 2,
+};
+
+enum group_type {
+ group_has_spare = 0,
+ group_fully_busy = 1,
+ group_misfit_task = 2,
+ group_asym_packing = 3,
+ group_imbalanced = 4,
+ group_overloaded = 5,
+};
+
+enum migration_type {
+ migrate_load = 0,
+ migrate_util = 1,
+ migrate_task = 2,
+ migrate_misfit = 3,
+};
+
+struct lb_env {
+ struct sched_domain *sd;
+ struct rq *src_rq;
+ int src_cpu;
+ int dst_cpu;
+ struct rq *dst_rq;
+ struct cpumask *dst_grpmask;
+ int new_dst_cpu;
+ enum cpu_idle_type idle;
+ long int imbalance;
+ struct cpumask *cpus;
+ unsigned int flags;
+ unsigned int loop;
+ unsigned int loop_break;
+ unsigned int loop_max;
+ enum fbq_type fbq_type;
+ enum migration_type migration_type;
+ struct list_head tasks;
+};
+
+struct sg_lb_stats {
+ long unsigned int avg_load;
+ long unsigned int group_load;
+ long unsigned int group_capacity;
+ long unsigned int group_util;
+ long unsigned int group_runnable;
+ unsigned int sum_nr_running;
+ unsigned int sum_h_nr_running;
+ unsigned int idle_cpus;
+ unsigned int group_weight;
+ enum group_type group_type;
+ unsigned int group_asym_packing;
+ long unsigned int group_misfit_task_load;
+ unsigned int nr_numa_running;
+ unsigned int nr_preferred_running;
+};
+
+struct sd_lb_stats {
+ struct sched_group *busiest;
+ struct sched_group *local;
+ long unsigned int total_load;
+ long unsigned int total_capacity;
+ long unsigned int avg_load;
+ unsigned int prefer_sibling;
+ struct sg_lb_stats busiest_stat;
+ struct sg_lb_stats local_stat;
+};
+
+typedef int (*list_cmp_func_t)(void *, const struct list_head *, const struct list_head *);
+
+struct io_poll_update {
+ struct file *file;
+ u64 old_user_data;
+ u64 new_user_data;
+ __poll_t events;
+ bool update_events;
+ bool update_user_data;
+};
+
+struct io_poll_table {
+ struct poll_table_struct pt;
+ struct io_kiocb *req;
+ int nr_entries;
+ int error;
+ bool owning;
+ __poll_t result_mask;
+};
+
+enum {
+ IOU_POLL_DONE = 0,
+ IOU_POLL_NO_ACTION = 1,
+ IOU_POLL_REMOVE_POLL_USE_RES = 2,
+};
+
+struct pci_slot_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct pci_slot *, char *);
+ ssize_t (*store)(struct pci_slot *, const char *, size_t);
+};
+
+struct acpi_table_ecdt {
+ struct acpi_table_header header;
+ struct acpi_generic_address control;
+ struct acpi_generic_address data;
+ u32 uid;
+ u8 gpe;
+ u8 id[1];
+} __attribute__((packed));
+
+enum acpi_ec_event_state {
+ EC_EVENT_READY = 0,
+ EC_EVENT_IN_PROGRESS = 1,
+ EC_EVENT_COMPLETE = 2,
+};
+
+struct transaction;
+
+struct acpi_ec {
+ acpi_handle handle;
+ int gpe;
+ int irq;
+ long unsigned int command_addr;
+ long unsigned int data_addr;
+ bool global_lock;
+ long unsigned int flags;
+ long unsigned int reference_count;
+ struct mutex mutex;
+ wait_queue_head_t wait;
+ struct list_head list;
+ struct transaction *curr;
+ spinlock_t lock;
+ struct work_struct work;
+ long unsigned int timestamp;
+ enum acpi_ec_event_state event_state;
+ unsigned int events_to_process;
+ unsigned int events_in_progress;
+ unsigned int queries_in_progress;
+ bool busy_polling;
+ unsigned int polling_guard;
+};
+
+struct transaction {
+ const u8 *wdata;
+ u8 *rdata;
+ short unsigned int irq_count;
+ u8 command;
+ u8 wi;
+ u8 ri;
+ u8 wlen;
+ u8 rlen;
+ u8 flags;
+};
+
+typedef int (*acpi_ec_query_func)(void *);
+
+enum ec_command {
+ ACPI_EC_COMMAND_READ = 128,
+ ACPI_EC_COMMAND_WRITE = 129,
+ ACPI_EC_BURST_ENABLE = 130,
+ ACPI_EC_BURST_DISABLE = 131,
+ ACPI_EC_COMMAND_QUERY = 132,
+};
+
+enum {
+ EC_FLAGS_QUERY_ENABLED = 0,
+ EC_FLAGS_EVENT_HANDLER_INSTALLED = 1,
+ EC_FLAGS_EC_HANDLER_INSTALLED = 2,
+ EC_FLAGS_QUERY_METHODS_INSTALLED = 3,
+ EC_FLAGS_STARTED = 4,
+ EC_FLAGS_STOPPED = 5,
+ EC_FLAGS_EVENTS_MASKED = 6,
+};
+
+struct acpi_ec_query_handler {
+ struct list_head node;
+ acpi_ec_query_func func;
+ acpi_handle handle;
+ void *data;
+ u8 query_bit;
+ struct kref kref;
+};
+
+struct acpi_ec_query {
+ struct transaction transaction;
+ struct work_struct work;
+ struct acpi_ec_query_handler *handler;
+ struct acpi_ec *ec;
+};
+
+struct ldsem_waiter {
+ struct list_head list;
+ struct task_struct *task;
+};
+
+struct iommu_group {
+ struct kobject kobj;
+ struct kobject *devices_kobj;
+ struct list_head devices;
+ struct mutex mutex;
+ void *iommu_data;
+ void (*iommu_data_release)(void *);
+ char *name;
+ int id;
+ struct iommu_domain *default_domain;
+ struct iommu_domain *blocking_domain;
+ struct iommu_domain *domain;
+ struct list_head entry;
+ unsigned int owner_cnt;
+ void *owner;
+};
+
+enum iommu_fault_type {
+ IOMMU_FAULT_DMA_UNRECOV = 1,
+ IOMMU_FAULT_PAGE_REQ = 2,
+};
+
+enum iommu_resv_type {
+ IOMMU_RESV_DIRECT = 0,
+ IOMMU_RESV_DIRECT_RELAXABLE = 1,
+ IOMMU_RESV_RESERVED = 2,
+ IOMMU_RESV_MSI = 3,
+ IOMMU_RESV_SW_MSI = 4,
+};
+
+struct iommu_resv_region {
+ struct list_head list;
+ phys_addr_t start;
+ size_t length;
+ int prot;
+ enum iommu_resv_type type;
+ void (*free)(struct device *, struct iommu_resv_region *);
+};
+
+struct fsl_mc_obj_desc {
+ char type[16];
+ int id;
+ u16 vendor;
+ u16 ver_major;
+ u16 ver_minor;
+ u8 irq_count;
+ u8 region_count;
+ u32 state;
+ char label[16];
+ u16 flags;
+};
+
+struct fsl_mc_io;
+
+struct fsl_mc_device_irq;
+
+struct fsl_mc_resource;
+
+struct fsl_mc_device {
+ struct device dev;
+ u64 dma_mask;
+ u16 flags;
+ u32 icid;
+ u16 mc_handle;
+ struct fsl_mc_io *mc_io;
+ struct fsl_mc_obj_desc obj_desc;
+ struct resource *regions;
+ struct fsl_mc_device_irq **irqs;
+ struct fsl_mc_resource *resource;
+ struct device_link *consumer_link;
+ const char *driver_override;
+};
+
+enum fsl_mc_pool_type {
+ FSL_MC_POOL_DPMCP = 0,
+ FSL_MC_POOL_DPBP = 1,
+ FSL_MC_POOL_DPCON = 2,
+ FSL_MC_POOL_IRQ = 3,
+ FSL_MC_NUM_POOL_TYPES = 4,
+};
+
+struct fsl_mc_resource_pool;
+
+struct fsl_mc_resource {
+ enum fsl_mc_pool_type type;
+ s32 id;
+ void *data;
+ struct fsl_mc_resource_pool *parent_pool;
+ struct list_head node;
+};
+
+struct fsl_mc_device_irq {
+ unsigned int virq;
+ struct fsl_mc_device *mc_dev;
+ u8 dev_irq_index;
+ struct fsl_mc_resource resource;
+};
+
+struct fsl_mc_io {
+ struct device *dev;
+ u16 flags;
+ u32 portal_size;
+ phys_addr_t portal_phys_addr;
+ void *portal_virt_addr;
+ struct fsl_mc_device *dpmcp_dev;
+ union {
+ struct mutex mutex;
+ raw_spinlock_t spinlock;
+ };
+};
+
+struct group_device {
+ struct list_head list;
+ struct device *dev;
+ char *name;
+};
+
+struct iommu_group_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct iommu_group *, char *);
+ ssize_t (*store)(struct iommu_group *, const char *, size_t);
+};
+
+struct group_for_pci_data {
+ struct pci_dev *pdev;
+ struct iommu_group *group;
+};
+
+struct __group_domain_type {
+ struct device *dev;
+ unsigned int type;
+};
+
+struct thermal_hwmon_device {
+ char type[20];
+ struct device *device;
+ int count;
+ struct list_head tz_list;
+ struct list_head node;
+};
+
+struct thermal_hwmon_attr {
+ struct device_attribute attr;
+ char name[16];
+};
+
+struct thermal_hwmon_temp {
+ struct list_head hwmon_node;
+ struct thermal_zone_device *tz;
+ struct thermal_hwmon_attr temp_input;
+ struct thermal_hwmon_attr temp_crit;
+};
+
+struct simplefb_platform_data {
+ u32 width;
+ u32 height;
+ u32 stride;
+ const char *format;
+};
+
+struct pingv6_ops {
+ int (*ipv6_recv_error)(struct sock *, struct msghdr *, int, int *);
+ void (*ip6_datagram_recv_common_ctl)(struct sock *, struct msghdr *, struct sk_buff *);
+ void (*ip6_datagram_recv_specific_ctl)(struct sock *, struct msghdr *, struct sk_buff *);
+ int (*icmpv6_err_convert)(u8, u8, int *);
+ void (*ipv6_icmp_error)(struct sock *, struct sk_buff *, int, __be16, u32, u8 *);
+ int (*ipv6_chk_addr)(struct net *, const struct in6_addr *, const struct net_device *, int);
+};
+
+struct ac6_iter_state {
+ struct seq_net_private p;
+ struct net_device *dev;
+ struct inet6_dev *idev;
+};
+
+enum {
+ IFLA_VLAN_UNSPEC = 0,
+ IFLA_VLAN_ID = 1,
+ IFLA_VLAN_FLAGS = 2,
+ IFLA_VLAN_EGRESS_QOS = 3,
+ IFLA_VLAN_INGRESS_QOS = 4,
+ IFLA_VLAN_PROTOCOL = 5,
+ __IFLA_VLAN_MAX = 6,
+};
+
+struct ifla_vlan_flags {
+ __u32 flags;
+ __u32 mask;
+};
+
+enum {
+ IFLA_VLAN_QOS_UNSPEC = 0,
+ IFLA_VLAN_QOS_MAPPING = 1,
+ __IFLA_VLAN_QOS_MAX = 2,
+};
+
+struct ifla_vlan_qos_mapping {
+ __u32 from;
+ __u32 to;
+};
+
+struct pci_setup_rom {
+ struct setup_data data;
+ uint16_t vendor;
+ uint16_t devid;
+ uint64_t pcilen;
+ long unsigned int segment;
+ long unsigned int bus;
+ long unsigned int device;
+ long unsigned int function;
+ uint8_t romdata[0];
+};
+
+enum pci_bf_sort_state {
+ pci_bf_sort_default = 0,
+ pci_force_nobf = 1,
+ pci_force_bf = 2,
+ pci_dmi_bf = 3,
+};
+
+struct cpc_reg {
+ u8 descriptor;
+ u16 length;
+ u8 space_id;
+ u8 bit_width;
+ u8 bit_offset;
+ u8 access_width;
+ u64 address;
+} __attribute__((packed));
+
+struct futex_waitv {
+ __u64 val;
+ __u64 uaddr;
+ __u32 flags;
+ __u32 __reserved;
+};
+
+struct futex_vector {
+ struct futex_waitv w;
+ struct futex_q q;
+};
+
+enum {
+ TRACE_PIDS = 1,
+ TRACE_NO_PIDS = 2,
+};
+
+struct module_string {
+ struct list_head next;
+ struct module *module;
+ char *str;
+};
+
+enum {
+ FORMAT_HEADER = 1,
+ FORMAT_FIELD_SEPERATOR = 2,
+ FORMAT_PRINTFMT = 3,
+};
+
+struct event_probe_data {
+ struct trace_event_file *file;
+ long unsigned int count;
+ int ref;
+ bool enable;
+};
+
+struct swap_iocb {
+ struct kiocb iocb;
+ struct bio_vec bvec[32];
+ int pages;
+ int len;
+};
+
+struct prepend_buffer {
+ char *buf;
+ int len;
+};
+
+struct signalfd_siginfo {
+ __u32 ssi_signo;
+ __s32 ssi_errno;
+ __s32 ssi_code;
+ __u32 ssi_pid;
+ __u32 ssi_uid;
+ __s32 ssi_fd;
+ __u32 ssi_tid;
+ __u32 ssi_band;
+ __u32 ssi_overrun;
+ __u32 ssi_trapno;
+ __s32 ssi_status;
+ __s32 ssi_int;
+ __u64 ssi_ptr;
+ __u64 ssi_utime;
+ __u64 ssi_stime;
+ __u64 ssi_addr;
+ __u16 ssi_addr_lsb;
+ __u16 __pad2;
+ __s32 ssi_syscall;
+ __u64 ssi_call_addr;
+ __u32 ssi_arch;
+ __u8 __pad[28];
+};
+
+struct signalfd_ctx {
+ sigset_t sigmask;
+};
+
+struct msgbuf {
+ __kernel_long_t mtype;
+ char mtext[1];
+};
+
+struct msg;
+
+struct msqid_ds {
+ struct ipc_perm msg_perm;
+ struct msg *msg_first;
+ struct msg *msg_last;
+ __kernel_old_time_t msg_stime;
+ __kernel_old_time_t msg_rtime;
+ __kernel_old_time_t msg_ctime;
+ long unsigned int msg_lcbytes;
+ long unsigned int msg_lqbytes;
+ short unsigned int msg_cbytes;
+ short unsigned int msg_qnum;
+ short unsigned int msg_qbytes;
+ __kernel_ipc_pid_t msg_lspid;
+ __kernel_ipc_pid_t msg_lrpid;
+};
+
+struct msqid64_ds {
+ struct ipc64_perm msg_perm;
+ long int msg_stime;
+ long int msg_rtime;
+ long int msg_ctime;
+ long unsigned int msg_cbytes;
+ long unsigned int msg_qnum;
+ long unsigned int msg_qbytes;
+ __kernel_pid_t msg_lspid;
+ __kernel_pid_t msg_lrpid;
+ long unsigned int __unused4;
+ long unsigned int __unused5;
+};
+
+struct msginfo {
+ int msgpool;
+ int msgmap;
+ int msgmax;
+ int msgmnb;
+ int msgmni;
+ int msgssz;
+ int msgtql;
+ short unsigned int msgseg;
+};
+
+struct msg_queue {
+ struct kern_ipc_perm q_perm;
+ time64_t q_stime;
+ time64_t q_rtime;
+ time64_t q_ctime;
+ long unsigned int q_cbytes;
+ long unsigned int q_qnum;
+ long unsigned int q_qbytes;
+ struct pid *q_lspid;
+ struct pid *q_lrpid;
+ struct list_head q_messages;
+ struct list_head q_receivers;
+ struct list_head q_senders;
+ long: 64;
+ long: 64;
+};
+
+struct msg_receiver {
+ struct list_head r_list;
+ struct task_struct *r_tsk;
+ int r_mode;
+ long int r_msgtype;
+ long int r_maxsize;
+ struct msg_msg *r_msg;
+};
+
+struct msg_sender {
+ struct list_head list;
+ struct task_struct *tsk;
+ size_t msgsz;
+};
+
+struct acpi_gpe_walk_info {
+ struct acpi_namespace_node *gpe_device;
+ struct acpi_gpe_block_info *gpe_block;
+ u16 count;
+ acpi_owner_id owner_id;
+ u8 execute_by_owner_id;
+};
+
+struct acpi_namestring_info {
+ const char *external_name;
+ const char *next_external_char;
+ char *internal_name;
+ u32 length;
+ u32 num_segments;
+ u32 num_carats;
+ u8 fully_qualified;
+};
+
+struct acpi_thermal_state {
+ u8 critical: 1;
+ u8 hot: 1;
+ u8 passive: 1;
+ u8 active: 1;
+ u8 reserved: 4;
+ int active_index;
+};
+
+struct acpi_thermal_state_flags {
+ u8 valid: 1;
+ u8 enabled: 1;
+ u8 reserved: 6;
+};
+
+struct acpi_thermal_critical {
+ struct acpi_thermal_state_flags flags;
+ long unsigned int temperature;
+};
+
+struct acpi_thermal_hot {
+ struct acpi_thermal_state_flags flags;
+ long unsigned int temperature;
+};
+
+struct acpi_thermal_passive {
+ struct acpi_thermal_state_flags flags;
+ long unsigned int temperature;
+ long unsigned int tc1;
+ long unsigned int tc2;
+ long unsigned int tsp;
+ struct acpi_handle_list devices;
+};
+
+struct acpi_thermal_active {
+ struct acpi_thermal_state_flags flags;
+ long unsigned int temperature;
+ struct acpi_handle_list devices;
+};
+
+struct acpi_thermal_trips {
+ struct acpi_thermal_critical critical;
+ struct acpi_thermal_hot hot;
+ struct acpi_thermal_passive passive;
+ struct acpi_thermal_active active[10];
+};
+
+struct acpi_thermal_flags {
+ u8 cooling_mode: 1;
+ u8 devices: 1;
+ u8 reserved: 6;
+};
+
+struct acpi_thermal {
+ struct acpi_device *device;
+ acpi_bus_id name;
+ long unsigned int temperature;
+ long unsigned int last_temperature;
+ long unsigned int polling_frequency;
+ volatile u8 zombie;
+ struct acpi_thermal_flags flags;
+ struct acpi_thermal_state state;
+ struct acpi_thermal_trips trips;
+ struct acpi_handle_list devices;
+ struct thermal_zone_device *thermal_zone;
+ int kelvin_offset;
+ struct work_struct thermal_check_work;
+ struct mutex thermal_check_lock;
+ refcount_t thermal_check_count;
+};
+
+struct cytp_contact {
+ int x;
+ int y;
+ int z;
+};
+
+struct cytp_report_data {
+ int contact_cnt;
+ struct cytp_contact contacts[2];
+ unsigned int left: 1;
+ unsigned int right: 1;
+ unsigned int middle: 1;
+ unsigned int tap: 1;
+};
+
+struct cytp_data {
+ int fw_version;
+ int pkt_size;
+ int mode;
+ int tp_min_pressure;
+ int tp_max_pressure;
+ int tp_width;
+ int tp_high;
+ int tp_max_abs_x;
+ int tp_max_abs_y;
+ int tp_res_x;
+ int tp_res_y;
+ int tp_metrics_supported;
+};
+
+struct _thermal_state {
+ u64 next_check;
+ u64 last_interrupt_time;
+ struct delayed_work therm_work;
+ long unsigned int count;
+ long unsigned int last_count;
+ long unsigned int max_time_ms;
+ long unsigned int total_time_ms;
+ bool rate_control_active;
+ bool new_event;
+ u8 level;
+ u8 sample_index;
+ u8 sample_count;
+ u8 average;
+ u8 baseline_temp;
+ u8 temp_samples[3];
+};
+
+struct thermal_state {
+ struct _thermal_state core_throttle;
+ struct _thermal_state core_power_limit;
+ struct _thermal_state package_throttle;
+ struct _thermal_state package_power_limit;
+ struct _thermal_state core_thresh0;
+ struct _thermal_state core_thresh1;
+ struct _thermal_state pkg_thresh0;
+ struct _thermal_state pkg_thresh1;
+};
+
+struct mmsghdr {
+ struct user_msghdr msg_hdr;
+ unsigned int msg_len;
+};
+
+struct scm_ts_pktinfo {
+ __u32 if_index;
+ __u32 pkt_length;
+ __u32 reserved[2];
+};
+
+struct compat_if_settings {
+ unsigned int type;
+ unsigned int size;
+ compat_uptr_t ifs_ifsu;
+};
+
+struct compat_ifreq {
+ union {
+ char ifrn_name[16];
+ } ifr_ifrn;
+ union {
+ struct sockaddr ifru_addr;
+ struct sockaddr ifru_dstaddr;
+ struct sockaddr ifru_broadaddr;
+ struct sockaddr ifru_netmask;
+ struct sockaddr ifru_hwaddr;
+ short int ifru_flags;
+ compat_int_t ifru_ivalue;
+ compat_int_t ifru_mtu;
+ struct compat_ifmap ifru_map;
+ char ifru_slave[16];
+ char ifru_newname[16];
+ compat_caddr_t ifru_data;
+ struct compat_if_settings ifru_settings;
+ } ifr_ifru;
+};
+
+struct compat_mmsghdr {
+ struct compat_msghdr msg_hdr;
+ compat_uint_t msg_len;
+};
+
+struct used_address {
+ struct __kernel_sockaddr_storage name;
+ unsigned int name_len;
+};
+
+struct trace_event_raw_tls_device_offload_set {
+ struct trace_entry ent;
+ struct sock *sk;
+ u64 rec_no;
+ int dir;
+ u32 tcp_seq;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_tls_device_decrypted {
+ struct trace_entry ent;
+ struct sock *sk;
+ u64 rec_no;
+ u32 tcp_seq;
+ u32 rec_len;
+ bool encrypted;
+ bool decrypted;
+ char __data[0];
+};
+
+struct trace_event_raw_tls_device_rx_resync_send {
+ struct trace_entry ent;
+ struct sock *sk;
+ u64 rec_no;
+ u32 tcp_seq;
+ int sync_type;
+ char __data[0];
+};
+
+struct trace_event_raw_tls_device_rx_resync_nh_schedule {
+ struct trace_entry ent;
+ struct sock *sk;
+ char __data[0];
+};
+
+struct trace_event_raw_tls_device_rx_resync_nh_delay {
+ struct trace_entry ent;
+ struct sock *sk;
+ u32 sock_data;
+ u32 rec_len;
+ char __data[0];
+};
+
+struct trace_event_raw_tls_device_tx_resync_req {
+ struct trace_entry ent;
+ struct sock *sk;
+ u32 tcp_seq;
+ u32 exp_tcp_seq;
+ char __data[0];
+};
+
+struct trace_event_raw_tls_device_tx_resync_send {
+ struct trace_entry ent;
+ struct sock *sk;
+ u64 rec_no;
+ u32 tcp_seq;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_tls_device_offload_set {};
+
+struct trace_event_data_offsets_tls_device_decrypted {};
+
+struct trace_event_data_offsets_tls_device_rx_resync_send {};
+
+struct trace_event_data_offsets_tls_device_rx_resync_nh_schedule {};
+
+struct trace_event_data_offsets_tls_device_rx_resync_nh_delay {};
+
+struct trace_event_data_offsets_tls_device_tx_resync_req {};
+
+struct trace_event_data_offsets_tls_device_tx_resync_send {};
+
+typedef void (*btf_trace_tls_device_offload_set)(void *, struct sock *, int, u32, u8 *, int);
+
+typedef void (*btf_trace_tls_device_decrypted)(void *, struct sock *, u32, u8 *, u32, bool, bool);
+
+typedef void (*btf_trace_tls_device_rx_resync_send)(void *, struct sock *, u32, u8 *, int);
+
+typedef void (*btf_trace_tls_device_rx_resync_nh_schedule)(void *, struct sock *);
+
+typedef void (*btf_trace_tls_device_rx_resync_nh_delay)(void *, struct sock *, u32, u32);
+
+typedef void (*btf_trace_tls_device_tx_resync_req)(void *, struct sock *, u32, u32);
+
+typedef void (*btf_trace_tls_device_tx_resync_send)(void *, struct sock *, u32, u8 *);
+
+struct jump_label_patch {
+ const void *code;
+ int size;
+};
+
+struct cpu_info_ctx {
+ struct cpu_signature *cpu_sig;
+ int err;
+};
+
+struct filter_pred;
+
+struct prog_entry {
+ int target;
+ int when_to_branch;
+ struct filter_pred *pred;
+};
+
+struct regex;
+
+typedef int (*regex_match_func)(char *, struct regex *, int);
+
+struct regex {
+ char pattern[256];
+ int len;
+ int field_len;
+ regex_match_func match;
+};
+
+enum regex_type {
+ MATCH_FULL = 0,
+ MATCH_FRONT_ONLY = 1,
+ MATCH_MIDDLE_ONLY = 2,
+ MATCH_END_ONLY = 3,
+ MATCH_GLOB = 4,
+ MATCH_INDEX = 5,
+};
+
+enum filter_op_ids {
+ OP_GLOB = 0,
+ OP_NE = 1,
+ OP_EQ = 2,
+ OP_LE = 3,
+ OP_LT = 4,
+ OP_GE = 5,
+ OP_GT = 6,
+ OP_BAND = 7,
+ OP_MAX = 8,
+};
+
+enum filter_pred_fn {
+ FILTER_PRED_FN_NOP = 0,
+ FILTER_PRED_FN_64 = 1,
+ FILTER_PRED_FN_S64 = 2,
+ FILTER_PRED_FN_U64 = 3,
+ FILTER_PRED_FN_32 = 4,
+ FILTER_PRED_FN_S32 = 5,
+ FILTER_PRED_FN_U32 = 6,
+ FILTER_PRED_FN_16 = 7,
+ FILTER_PRED_FN_S16 = 8,
+ FILTER_PRED_FN_U16 = 9,
+ FILTER_PRED_FN_8 = 10,
+ FILTER_PRED_FN_S8 = 11,
+ FILTER_PRED_FN_U8 = 12,
+ FILTER_PRED_FN_COMM = 13,
+ FILTER_PRED_FN_STRING = 14,
+ FILTER_PRED_FN_STRLOC = 15,
+ FILTER_PRED_FN_STRRELLOC = 16,
+ FILTER_PRED_FN_PCHAR_USER = 17,
+ FILTER_PRED_FN_PCHAR = 18,
+ FILTER_PRED_FN_CPU = 19,
+ FILTER_PRED_FN_ = 20,
+ FILTER_PRED_TEST_VISITED = 21,
+};
+
+struct filter_pred {
+ enum filter_pred_fn fn_num;
+ u64 val;
+ struct regex regex;
+ short unsigned int *ops;
+ struct ftrace_event_field *field;
+ int offset;
+ int not;
+ int op;
+};
+
+enum {
+ FILT_ERR_NONE = 0,
+ FILT_ERR_INVALID_OP = 1,
+ FILT_ERR_TOO_MANY_OPEN = 2,
+ FILT_ERR_TOO_MANY_CLOSE = 3,
+ FILT_ERR_MISSING_QUOTE = 4,
+ FILT_ERR_OPERAND_TOO_LONG = 5,
+ FILT_ERR_EXPECT_STRING = 6,
+ FILT_ERR_EXPECT_DIGIT = 7,
+ FILT_ERR_ILLEGAL_FIELD_OP = 8,
+ FILT_ERR_FIELD_NOT_FOUND = 9,
+ FILT_ERR_ILLEGAL_INTVAL = 10,
+ FILT_ERR_BAD_SUBSYS_FILTER = 11,
+ FILT_ERR_TOO_MANY_PREDS = 12,
+ FILT_ERR_INVALID_FILTER = 13,
+ FILT_ERR_IP_FIELD_ONLY = 14,
+ FILT_ERR_INVALID_VALUE = 15,
+ FILT_ERR_ERRNO = 16,
+ FILT_ERR_NO_FILTER = 17,
+};
+
+struct filter_parse_error {
+ int lasterr;
+ int lasterr_pos;
+};
+
+typedef int (*parse_pred_fn)(const char *, void *, int, struct filter_parse_error *, struct filter_pred **);
+
+enum {
+ INVERT = 1,
+ PROCESS_AND = 2,
+ PROCESS_OR = 4,
+};
+
+struct ustring_buffer {
+ char buffer[1024];
+};
+
+enum {
+ TOO_MANY_CLOSE = -1,
+ TOO_MANY_OPEN = -2,
+ MISSING_QUOTE = -3,
+};
+
+struct filter_list {
+ struct list_head list;
+ struct event_filter *filter;
+};
+
+struct function_filter_data {
+ struct ftrace_ops *ops;
+ int first_filter;
+ int first_notrace;
+};
+
+struct trace_event_raw_test_pages_isolated {
+ struct trace_entry ent;
+ long unsigned int start_pfn;
+ long unsigned int end_pfn;
+ long unsigned int fin_pfn;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_test_pages_isolated {};
+
+typedef void (*btf_trace_test_pages_isolated)(void *, long unsigned int, long unsigned int, long unsigned int);
+
+struct tm {
+ int tm_sec;
+ int tm_min;
+ int tm_hour;
+ int tm_mday;
+ int tm_mon;
+ long int tm_year;
+ int tm_wday;
+ int tm_yday;
+};
+
+struct mount_attr {
+ __u64 attr_set;
+ __u64 attr_clr;
+ __u64 propagation;
+ __u64 userns_fd;
+};
+
+struct mount_kattr {
+ unsigned int attr_set;
+ unsigned int attr_clr;
+ unsigned int propagation;
+ unsigned int lookup_flags;
+ bool recurse;
+ struct user_namespace *mnt_userns;
+};
+
+enum umount_tree_flags {
+ UMOUNT_SYNC = 1,
+ UMOUNT_PROPAGATE = 2,
+ UMOUNT_CONNECTED = 4,
+};
+
+struct pci_bus_resource {
+ struct list_head list;
+ struct resource *res;
+ unsigned int flags;
+};
+
+struct acpi_mem_mapping {
+ acpi_physical_address physical_address;
+ u8 *logical_address;
+ acpi_size length;
+ struct acpi_mem_mapping *next_mm;
+};
+
+struct acpi_mem_space_context {
+ u32 length;
+ acpi_physical_address address;
+ struct acpi_mem_mapping *cur_mm;
+ struct acpi_mem_mapping *first_mm;
+};
+
+struct acpi_data_table_space_context {
+ void *pointer;
+};
+
+struct tpm_info {
+ struct resource res;
+ int irq;
+};
+
+struct tpm_tis_tcg_phy {
+ struct tpm_tis_data priv;
+ void *iobase;
+};
+
+struct ipv6_mreq {
+ struct in6_addr ipv6mr_multiaddr;
+ int ipv6mr_ifindex;
+};
+
+struct ip6_mtuinfo {
+ struct sockaddr_in6 ip6m_addr;
+ __u32 ip6m_mtu;
+};
+
+struct p9_flock {
+ u8 type;
+ u32 flags;
+ u64 start;
+ u64 length;
+ u32 proc_id;
+ char *client_id;
+};
+
+struct p9_getlock {
+ u8 type;
+ u64 start;
+ u64 length;
+ u32 proc_id;
+ char *client_id;
+};
+
+enum p9_fid_reftype {
+ P9_FID_REF_CREATE = 0,
+ P9_FID_REF_GET = 1,
+ P9_FID_REF_PUT = 2,
+ P9_FID_REF_DESTROY = 3,
+};
+
+struct trace_event_raw_9p_client_req {
+ struct trace_entry ent;
+ void *clnt;
+ __u8 type;
+ __u32 tag;
+ char __data[0];
+};
+
+struct trace_event_raw_9p_client_res {
+ struct trace_entry ent;
+ void *clnt;
+ __u8 type;
+ __u32 tag;
+ __u32 err;
+ char __data[0];
+};
+
+struct trace_event_raw_9p_protocol_dump {
+ struct trace_entry ent;
+ void *clnt;
+ __u8 type;
+ __u16 tag;
+ unsigned char line[32];
+ char __data[0];
+};
+
+struct trace_event_raw_9p_fid_ref {
+ struct trace_entry ent;
+ int fid;
+ int refcount;
+ __u8 type;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_9p_client_req {};
+
+struct trace_event_data_offsets_9p_client_res {};
+
+struct trace_event_data_offsets_9p_protocol_dump {};
+
+struct trace_event_data_offsets_9p_fid_ref {};
+
+typedef void (*btf_trace_9p_client_req)(void *, struct p9_client *, int8_t, int);
+
+typedef void (*btf_trace_9p_client_res)(void *, struct p9_client *, int8_t, int, int);
+
+typedef void (*btf_trace_9p_protocol_dump)(void *, struct p9_client *, struct p9_fcall *);
+
+typedef void (*btf_trace_9p_fid_ref)(void *, struct p9_fid *, __u8);
+
+enum {
+ Opt_msize = 0,
+ Opt_trans = 1,
+ Opt_legacy = 2,
+ Opt_version = 3,
+ Opt_err___7 = 4,
+};
+
+struct klist_waiter {
+ struct list_head list;
+ struct klist_node *node;
+ struct task_struct *process;
+ int woken;
+};
+
+struct umd_info {
+ const char *driver_name;
+ struct file *pipe_to_umh;
+ struct file *pipe_from_umh;
+ struct path wd;
+ struct pid *tgid;
+};
+
+typedef __u64 timeu64_t;
+
+struct rtc_wkalrm {
+ unsigned char enabled;
+ unsigned char pending;
+ struct rtc_time time;
+};
+
+struct rtc_param {
+ __u64 param;
+ union {
+ __u64 uvalue;
+ __s64 svalue;
+ __u64 ptr;
+ };
+ __u32 index;
+ __u32 __pad;
+};
+
+struct rtc_class_ops {
+ int (*ioctl)(struct device *, unsigned int, long unsigned int);
+ int (*read_time)(struct device *, struct rtc_time *);
+ int (*set_time)(struct device *, struct rtc_time *);
+ int (*read_alarm)(struct device *, struct rtc_wkalrm *);
+ int (*set_alarm)(struct device *, struct rtc_wkalrm *);
+ int (*proc)(struct device *, struct seq_file *);
+ int (*alarm_irq_enable)(struct device *, unsigned int);
+ int (*read_offset)(struct device *, long int *);
+ int (*set_offset)(struct device *, long int);
+ int (*param_get)(struct device *, struct rtc_param *);
+ int (*param_set)(struct device *, struct rtc_param *);
+};
+
+struct rtc_device;
+
+struct rtc_timer {
+ struct timerqueue_node node;
+ ktime_t period;
+ void (*func)(struct rtc_device *);
+ struct rtc_device *rtc;
+ int enabled;
+};
+
+struct rtc_device {
+ struct device dev;
+ struct module *owner;
+ int id;
+ const struct rtc_class_ops *ops;
+ struct mutex ops_lock;
+ struct cdev char_dev;
+ long unsigned int flags;
+ long unsigned int irq_data;
+ spinlock_t irq_lock;
+ wait_queue_head_t irq_queue;
+ struct fasync_struct *async_queue;
+ int irq_freq;
+ int max_user_freq;
+ struct timerqueue_head timerqueue;
+ struct rtc_timer aie_timer;
+ struct rtc_timer uie_rtctimer;
+ struct hrtimer pie_timer;
+ int pie_enabled;
+ struct work_struct irqwork;
+ long unsigned int set_offset_nsec;
+ long unsigned int features[1];
+ time64_t range_min;
+ timeu64_t range_max;
+ time64_t start_secs;
+ time64_t offset_secs;
+ bool set_start_time;
+};
+
+struct trace_event_raw_alarmtimer_suspend {
+ struct trace_entry ent;
+ s64 expires;
+ unsigned char alarm_type;
+ char __data[0];
+};
+
+struct trace_event_raw_alarm_class {
+ struct trace_entry ent;
+ void *alarm;
+ unsigned char alarm_type;
+ s64 expires;
+ s64 now;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_alarmtimer_suspend {};
+
+struct trace_event_data_offsets_alarm_class {};
+
+typedef void (*btf_trace_alarmtimer_suspend)(void *, ktime_t, int);
+
+typedef void (*btf_trace_alarmtimer_fired)(void *, struct alarm *, ktime_t);
+
+typedef void (*btf_trace_alarmtimer_start)(void *, struct alarm *, ktime_t);
+
+typedef void (*btf_trace_alarmtimer_cancel)(void *, struct alarm *, ktime_t);
+
+struct alarm_base {
+ spinlock_t lock;
+ struct timerqueue_head timerqueue;
+ ktime_t (*get_ktime)();
+ void (*get_timespec)(struct timespec64 *);
+ clockid_t base_clockid;
+};
+
+enum bpf_stack_build_id_status {
+ BPF_STACK_BUILD_ID_EMPTY = 0,
+ BPF_STACK_BUILD_ID_VALID = 1,
+ BPF_STACK_BUILD_ID_IP = 2,
+};
+
+struct bpf_stack_build_id {
+ __s32 status;
+ unsigned char build_id[20];
+ union {
+ __u64 offset;
+ __u64 ip;
+ };
+};
+
+enum {
+ BPF_F_SKIP_FIELD_MASK = 255,
+ BPF_F_USER_STACK = 256,
+ BPF_F_FAST_STACK_CMP = 512,
+ BPF_F_REUSE_STACKID = 1024,
+ BPF_F_USER_BUILD_ID = 2048,
+};
+
+struct stack_map_bucket {
+ struct pcpu_freelist_node fnode;
+ u32 hash;
+ u32 nr;
+ u64 data[0];
+};
+
+struct bpf_stack_map {
+ struct bpf_map map;
+ void *elems;
+ struct pcpu_freelist freelist;
+ u32 n_buckets;
+ struct stack_map_bucket *buckets[0];
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+typedef u64 (*btf_bpf_get_stackid)(struct pt_regs *, struct bpf_map *, u64);
+
+typedef u64 (*btf_bpf_get_stackid_pe)(struct bpf_perf_event_data_kern *, struct bpf_map *, u64);
+
+typedef u64 (*btf_bpf_get_stack)(struct pt_regs *, void *, u32, u64);
+
+typedef u64 (*btf_bpf_get_task_stack)(struct task_struct *, void *, u32, u64);
+
+typedef u64 (*btf_bpf_get_stack_pe)(struct bpf_perf_event_data_kern *, void *, u32, u64);
+
+struct crypto_attr_alg {
+ char name[128];
+};
+
+struct crypto_attr_type {
+ u32 type;
+ u32 mask;
+};
+
+enum {
+ CRYPTOA_UNSPEC = 0,
+ CRYPTOA_ALG = 1,
+ CRYPTOA_TYPE = 2,
+ __CRYPTOA_MAX = 3,
+};
+
+struct vesafb_par {
+ u32 pseudo_palette[256];
+ int wc_cookie;
+ struct resource *region;
+};
+
+enum synaptics_pkt_type {
+ SYN_NEWABS = 0,
+ SYN_NEWABS_STRICT = 1,
+ SYN_NEWABS_RELAXED = 2,
+ SYN_OLDABS = 3,
+};
+
+struct synaptics_hw_state {
+ int x;
+ int y;
+ int z;
+ int w;
+ unsigned int left: 1;
+ unsigned int right: 1;
+ unsigned int middle: 1;
+ unsigned int up: 1;
+ unsigned int down: 1;
+ u8 ext_buttons;
+ s8 scroll;
+};
+
+struct synaptics_device_info {
+ u32 model_id;
+ u32 firmware_id;
+ u32 board_id;
+ u32 capabilities;
+ u32 ext_cap;
+ u32 ext_cap_0c;
+ u32 ext_cap_10;
+ u32 identity;
+ u32 x_res;
+ u32 y_res;
+ u32 x_max;
+ u32 y_max;
+ u32 x_min;
+ u32 y_min;
+};
+
+struct synaptics_data {
+ struct synaptics_device_info info;
+ enum synaptics_pkt_type pkt_type;
+ u8 mode;
+ int scroll;
+ bool absolute_mode;
+ bool disable_gesture;
+ struct serio *pt_port;
+ struct synaptics_hw_state agm;
+ unsigned int agm_count;
+ long unsigned int press_start;
+ bool press;
+ bool report_press;
+ bool is_forcepad;
+};
+
+struct min_max_quirk {
+ const char * const *pnp_ids;
+ struct {
+ u32 min;
+ u32 max;
+ } board_id;
+ u32 x_min;
+ u32 x_max;
+ u32 y_min;
+ u32 y_max;
+};
+
+struct efi_runtime_map_entry {
+ efi_memory_desc_t md;
+ struct kobject kobj;
+};
+
+struct map_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct efi_runtime_map_entry *, char *);
+};
+
+enum {
+ TCA_STATS_UNSPEC = 0,
+ TCA_STATS_BASIC = 1,
+ TCA_STATS_RATE_EST = 2,
+ TCA_STATS_QUEUE = 3,
+ TCA_STATS_APP = 4,
+ TCA_STATS_RATE_EST64 = 5,
+ TCA_STATS_PAD = 6,
+ TCA_STATS_BASIC_HW = 7,
+ TCA_STATS_PKT64 = 8,
+ __TCA_STATS_MAX = 9,
+};
+
+struct gnet_stats_basic {
+ __u64 bytes;
+ __u32 packets;
+};
+
+struct gnet_stats_rate_est {
+ __u32 bps;
+ __u32 pps;
+};
+
+struct eeprom_req_info {
+ struct ethnl_req_info base;
+ u32 offset;
+ u32 length;
+ u8 page;
+ u8 bank;
+ u8 i2c_address;
+};
+
+struct eeprom_reply_data {
+ struct ethnl_reply_data base;
+ u32 length;
+ u8 *data;
+};
+
+enum psc_op {
+ SNP_PAGE_STATE_PRIVATE = 1,
+ SNP_PAGE_STATE_SHARED = 2,
+};
+
+struct aperfmperf {
+ seqcount_t seq;
+ long unsigned int last_update;
+ u64 acnt;
+ u64 mcnt;
+ u64 aperf;
+ u64 mperf;
+};
+
+struct kprobe_trace_entry_head {
+ struct trace_entry ent;
+ long unsigned int ip;
+};
+
+struct kretprobe_trace_entry_head {
+ struct trace_entry ent;
+ long unsigned int func;
+ long unsigned int ret_ip;
+};
+
+struct trace_kprobe {
+ struct dyn_event devent;
+ struct kretprobe rp;
+ long unsigned int *nhit;
+ const char *symbol;
+ struct trace_probe tp;
+};
+
+enum {
+ BLOCK_BITMAP = 0,
+ INODE_BITMAP = 1,
+ INODE_TABLE = 2,
+ GROUP_TABLE_COUNT = 3,
+};
+
+struct ext4_rcu_ptr {
+ struct callback_head rcu;
+ void *ptr;
+};
+
+struct ext4_new_flex_group_data {
+ struct ext4_new_group_data *groups;
+ __u16 *bg_flags;
+ ext4_group_t count;
+};
+
+struct crypto_report_aead {
+ char type[64];
+ char geniv[64];
+ unsigned int blocksize;
+ unsigned int maxauthsize;
+ unsigned int ivsize;
+};
+
+struct crypto_rfc3686_ctx {
+ struct crypto_skcipher *child;
+ u8 nonce[4];
+};
+
+struct crypto_rfc3686_req_ctx {
+ u8 iv[16];
+ struct skcipher_request subreq;
+};
+
+struct acpi_madt_generic_interrupt {
+ struct acpi_subtable_header header;
+ u16 reserved;
+ u32 cpu_interface_number;
+ u32 uid;
+ u32 flags;
+ u32 parking_version;
+ u32 performance_interrupt;
+ u64 parked_address;
+ u64 base_address;
+ u64 gicv_base_address;
+ u64 gich_base_address;
+ u32 vgic_interrupt;
+ u64 gicr_base_address;
+ u64 arm_mpidr;
+ u8 efficiency_class;
+ u8 reserved2[1];
+ u16 spe_interrupt;
+} __attribute__((packed));
+
+struct acpi_pci_link_irq {
+ u32 active;
+ u8 triggering;
+ u8 polarity;
+ u8 resource_type;
+ u8 possible_count;
+ u32 possible[16];
+ u8 initialized: 1;
+ u8 reserved: 7;
+};
+
+struct acpi_pci_link {
+ struct list_head list;
+ struct acpi_device *device;
+ struct acpi_pci_link_irq irq;
+ int refcnt;
+};
+
+struct mc146818_get_time_callback_param {
+ struct rtc_time *time;
+ unsigned char ctrl;
+ unsigned char century;
+};
+
+typedef u64 (*btf_bpf_rc_repeat)(u32 *);
+
+typedef u64 (*btf_bpf_rc_keydown)(u32 *, u32, u64, u32);
+
+typedef u64 (*btf_bpf_rc_pointer_rel)(u32 *, s32, s32);
+
+enum mapping_status {
+ MAPPING_OK = 0,
+ MAPPING_INVALID = 1,
+ MAPPING_EMPTY = 2,
+ MAPPING_DATA_FIN = 3,
+ MAPPING_DUMMY = 4,
+ MAPPING_BAD_CSUM = 5,
+};
+
+enum align_flags {
+ ALIGN_VA_32 = 1,
+ ALIGN_VA_64 = 2,
+};
+
+enum vmx_feature_leafs {
+ MISC_FEATURES = 0,
+ PRIMARY_CTLS = 1,
+ SECONDARY_CTLS = 2,
+ TERTIARY_CTLS_LOW = 3,
+ TERTIARY_CTLS_HIGH = 4,
+ NR_VMX_FEATURE_WORDS = 5,
+};
+
+enum severity_level {
+ MCE_NO_SEVERITY = 0,
+ MCE_DEFERRED_SEVERITY = 1,
+ MCE_UCNA_SEVERITY = 1,
+ MCE_KEEP_SEVERITY = 2,
+ MCE_SOME_SEVERITY = 3,
+ MCE_AO_SEVERITY = 4,
+ MCE_UC_SEVERITY = 5,
+ MCE_AR_SEVERITY = 6,
+ MCE_PANIC_SEVERITY = 7,
+};
+
+enum context___2 {
+ IN_KERNEL = 1,
+ IN_USER = 2,
+ IN_KERNEL_RECOV = 3,
+};
+
+enum ser {
+ SER_REQUIRED = 1,
+ NO_SER = 2,
+};
+
+enum exception {
+ EXCP_CONTEXT = 1,
+ NO_EXCP = 2,
+};
+
+struct severity {
+ u64 mask;
+ u64 result;
+ unsigned char sev;
+ unsigned char mcgmask;
+ unsigned char mcgres;
+ unsigned char ser;
+ unsigned char context;
+ unsigned char excp;
+ unsigned char covered;
+ unsigned char cpu_model;
+ unsigned char cpu_minstepping;
+ unsigned char bank_lo;
+ unsigned char bank_hi;
+ char *msg;
+};
+
+enum uv_system_type {
+ UV_NONE = 0,
+ UV_LEGACY_APIC = 1,
+ UV_X2APIC = 2,
+};
+
+typedef struct {
+ efi_table_hdr_t hdr;
+ u64 fw_vendor;
+ u32 fw_revision;
+ u32 __pad1;
+ u64 con_in_handle;
+ u64 con_in;
+ u64 con_out_handle;
+ u64 con_out;
+ u64 stderr_handle;
+ u64 stderr;
+ u64 runtime;
+ u64 boottime;
+ u32 nr_tables;
+ u32 __pad2;
+ u64 tables;
+} efi_system_table_64_t;
+
+typedef struct {
+ u32 version;
+ u32 length;
+ u64 memory_protection_attribute;
+} efi_properties_table_t;
+
+enum error_detector {
+ ERROR_DETECTOR_KFENCE = 0,
+ ERROR_DETECTOR_KASAN = 1,
+ ERROR_DETECTOR_WARN = 2,
+};
+
+struct trace_event_raw_error_report_template {
+ struct trace_entry ent;
+ enum error_detector error_detector;
+ long unsigned int id;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_error_report_template {};
+
+typedef void (*btf_trace_error_report_end)(void *, enum error_detector, long unsigned int);
+
+typedef void (*bpf_insn_print_t)(void *, const char *, ...);
+
+typedef const char * (*bpf_insn_revmap_call_t)(void *, const struct bpf_insn *);
+
+typedef const char * (*bpf_insn_print_imm_t)(void *, const struct bpf_insn *, __u64);
+
+struct bpf_insn_cbs {
+ bpf_insn_print_t cb_print;
+ bpf_insn_revmap_call_t cb_call;
+ bpf_insn_print_imm_t cb_imm;
+ void *private_data;
+};
+
+enum {
+ BTF_VAR_STATIC = 0,
+ BTF_VAR_GLOBAL_ALLOCATED = 1,
+ BTF_VAR_GLOBAL_EXTERN = 2,
+};
+
+enum btf_func_linkage {
+ BTF_FUNC_STATIC = 0,
+ BTF_FUNC_GLOBAL = 1,
+ BTF_FUNC_EXTERN = 2,
+};
+
+struct btf_var {
+ __u32 linkage;
+};
+
+struct btf_var_secinfo {
+ __u32 type;
+ __u32 offset;
+ __u32 size;
+};
+
+struct btf_decl_tag {
+ __s32 component_idx;
+};
+
+struct bpf_btf_info {
+ __u64 btf;
+ __u32 btf_size;
+ __u32 id;
+ __u64 name;
+ __u32 name_len;
+ __u32 kernel_btf;
+};
+
+struct bpf_cgroup_dev_ctx {
+ __u32 access_type;
+ __u32 major;
+ __u32 minor;
+};
+
+struct bpf_raw_tracepoint_args {
+ __u64 args[0];
+};
+
+struct bpf_sysctl {
+ __u32 write;
+ __u32 file_pos;
+};
+
+struct bpf_sockopt {
+ union {
+ struct bpf_sock *sk;
+ };
+ union {
+ void *optval;
+ };
+ union {
+ void *optval_end;
+ };
+ __s32 level;
+ __s32 optname;
+ __s32 optlen;
+ __s32 retval;
+};
+
+enum {
+ BTF_F_COMPACT = 1,
+ BTF_F_NONAME = 2,
+ BTF_F_PTR_RAW = 4,
+ BTF_F_ZERO = 8,
+};
+
+struct bpf_perf_event_data {
+ bpf_user_pt_regs_t regs;
+ __u64 sample_period;
+ __u64 addr;
+};
+
+struct btf_id_set {
+ u32 cnt;
+ u32 ids[0];
+};
+
+struct btf_struct_metas {
+ u32 cnt;
+ struct btf_struct_meta types[0];
+};
+
+struct bpf_core_ctx {
+ struct bpf_verifier_log *log;
+ const struct btf *btf;
+};
+
+struct bpf_sysctl_kern {
+ struct ctl_table_header *head;
+ struct ctl_table *table;
+ void *cur_val;
+ size_t cur_len;
+ void *new_val;
+ size_t new_len;
+ int new_updated;
+ int write;
+ loff_t *ppos;
+ u64 tmp_reg;
+};
+
+struct bpf_sockopt_kern {
+ struct sock *sk;
+ u8 *optval;
+ u8 *optval_end;
+ s32 level;
+ s32 optname;
+ s32 optlen;
+ struct task_struct *current_task;
+ u64 tmp_reg;
+};
+
+enum btf_kfunc_hook {
+ BTF_KFUNC_HOOK_COMMON = 0,
+ BTF_KFUNC_HOOK_XDP = 1,
+ BTF_KFUNC_HOOK_TC = 2,
+ BTF_KFUNC_HOOK_STRUCT_OPS = 3,
+ BTF_KFUNC_HOOK_TRACING = 4,
+ BTF_KFUNC_HOOK_SYSCALL = 5,
+ BTF_KFUNC_HOOK_MAX = 6,
+};
+
+enum {
+ BTF_KFUNC_SET_MAX_CNT = 256,
+ BTF_DTOR_KFUNC_MAX_CNT = 256,
+};
+
+struct btf_kfunc_set_tab {
+ struct btf_id_set8 *sets[6];
+};
+
+struct btf_id_dtor_kfunc_tab {
+ u32 cnt;
+ struct btf_id_dtor_kfunc dtors[0];
+};
+
+enum verifier_phase {
+ CHECK_META = 0,
+ CHECK_TYPE = 1,
+};
+
+struct resolve_vertex {
+ const struct btf_type *t;
+ u32 type_id;
+ u16 next_member;
+};
+
+enum visit_state {
+ NOT_VISITED = 0,
+ VISITED = 1,
+ RESOLVED = 2,
+};
+
+enum resolve_mode {
+ RESOLVE_TBD = 0,
+ RESOLVE_PTR = 1,
+ RESOLVE_STRUCT_OR_ARRAY = 2,
+};
+
+struct btf_sec_info {
+ u32 off;
+ u32 len;
+};
+
+struct btf_verifier_env {
+ struct btf *btf;
+ u8 *visit_states;
+ struct resolve_vertex stack[32];
+ struct bpf_verifier_log log;
+ u32 log_type_id;
+ u32 top_stack;
+ enum verifier_phase phase;
+ enum resolve_mode resolve_mode;
+};
+
+struct btf_show {
+ u64 flags;
+ void *target;
+ void (*showfn)(struct btf_show *, const char *, struct __va_list_tag *);
+ const struct btf *btf;
+ struct {
+ u8 depth;
+ u8 depth_to_show;
+ u8 depth_check;
+ u8 array_member: 1;
+ u8 array_terminated: 1;
+ u16 array_encoding;
+ u32 type_id;
+ int status;
+ const struct btf_type *type;
+ const struct btf_member *member;
+ char name[80];
+ } state;
+ struct {
+ u32 size;
+ void *head;
+ void *data;
+ u8 safe[32];
+ } obj;
+};
+
+struct btf_kind_operations {
+ s32 (*check_meta)(struct btf_verifier_env *, const struct btf_type *, u32);
+ int (*resolve)(struct btf_verifier_env *, const struct resolve_vertex *);
+ int (*check_member)(struct btf_verifier_env *, const struct btf_type *, const struct btf_member *, const struct btf_type *);
+ int (*check_kflag_member)(struct btf_verifier_env *, const struct btf_type *, const struct btf_member *, const struct btf_type *);
+ void (*log_details)(struct btf_verifier_env *, const struct btf_type *);
+ void (*show)(const struct btf *, const struct btf_type *, u32, void *, u8, struct btf_show *);
+};
+
+enum {
+ BTF_FIELD_IGNORE = 0,
+ BTF_FIELD_FOUND = 1,
+};
+
+struct btf_field_info {
+ enum btf_field_type type;
+ u32 off;
+ union {
+ struct {
+ u32 type_id;
+ } kptr;
+ struct {
+ const char *node_name;
+ u32 value_btf_id;
+ } list_head;
+ };
+};
+
+struct bpf_ctx_convert {
+ struct __sk_buff BPF_PROG_TYPE_SOCKET_FILTER_prog;
+ struct sk_buff BPF_PROG_TYPE_SOCKET_FILTER_kern;
+ struct __sk_buff BPF_PROG_TYPE_SCHED_CLS_prog;
+ struct sk_buff BPF_PROG_TYPE_SCHED_CLS_kern;
+ struct __sk_buff BPF_PROG_TYPE_SCHED_ACT_prog;
+ struct sk_buff BPF_PROG_TYPE_SCHED_ACT_kern;
+ struct xdp_md BPF_PROG_TYPE_XDP_prog;
+ struct xdp_buff BPF_PROG_TYPE_XDP_kern;
+ struct __sk_buff BPF_PROG_TYPE_CGROUP_SKB_prog;
+ struct sk_buff BPF_PROG_TYPE_CGROUP_SKB_kern;
+ struct bpf_sock BPF_PROG_TYPE_CGROUP_SOCK_prog;
+ struct sock BPF_PROG_TYPE_CGROUP_SOCK_kern;
+ struct bpf_sock_addr BPF_PROG_TYPE_CGROUP_SOCK_ADDR_prog;
+ struct bpf_sock_addr_kern BPF_PROG_TYPE_CGROUP_SOCK_ADDR_kern;
+ struct __sk_buff BPF_PROG_TYPE_LWT_IN_prog;
+ struct sk_buff BPF_PROG_TYPE_LWT_IN_kern;
+ struct __sk_buff BPF_PROG_TYPE_LWT_OUT_prog;
+ struct sk_buff BPF_PROG_TYPE_LWT_OUT_kern;
+ struct __sk_buff BPF_PROG_TYPE_LWT_XMIT_prog;
+ struct sk_buff BPF_PROG_TYPE_LWT_XMIT_kern;
+ struct __sk_buff BPF_PROG_TYPE_LWT_SEG6LOCAL_prog;
+ struct sk_buff BPF_PROG_TYPE_LWT_SEG6LOCAL_kern;
+ struct bpf_sock_ops BPF_PROG_TYPE_SOCK_OPS_prog;
+ struct bpf_sock_ops_kern BPF_PROG_TYPE_SOCK_OPS_kern;
+ struct __sk_buff BPF_PROG_TYPE_SK_SKB_prog;
+ struct sk_buff BPF_PROG_TYPE_SK_SKB_kern;
+ struct sk_msg_md BPF_PROG_TYPE_SK_MSG_prog;
+ struct sk_msg BPF_PROG_TYPE_SK_MSG_kern;
+ struct __sk_buff BPF_PROG_TYPE_FLOW_DISSECTOR_prog;
+ struct bpf_flow_dissector BPF_PROG_TYPE_FLOW_DISSECTOR_kern;
+ bpf_user_pt_regs_t BPF_PROG_TYPE_KPROBE_prog;
+ struct pt_regs BPF_PROG_TYPE_KPROBE_kern;
+ __u64 BPF_PROG_TYPE_TRACEPOINT_prog;
+ u64 BPF_PROG_TYPE_TRACEPOINT_kern;
+ struct bpf_perf_event_data BPF_PROG_TYPE_PERF_EVENT_prog;
+ struct bpf_perf_event_data_kern BPF_PROG_TYPE_PERF_EVENT_kern;
+ struct bpf_raw_tracepoint_args BPF_PROG_TYPE_RAW_TRACEPOINT_prog;
+ u64 BPF_PROG_TYPE_RAW_TRACEPOINT_kern;
+ struct bpf_raw_tracepoint_args BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE_prog;
+ u64 BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE_kern;
+ void *BPF_PROG_TYPE_TRACING_prog;
+ void *BPF_PROG_TYPE_TRACING_kern;
+ struct bpf_cgroup_dev_ctx BPF_PROG_TYPE_CGROUP_DEVICE_prog;
+ struct bpf_cgroup_dev_ctx BPF_PROG_TYPE_CGROUP_DEVICE_kern;
+ struct bpf_sysctl BPF_PROG_TYPE_CGROUP_SYSCTL_prog;
+ struct bpf_sysctl_kern BPF_PROG_TYPE_CGROUP_SYSCTL_kern;
+ struct bpf_sockopt BPF_PROG_TYPE_CGROUP_SOCKOPT_prog;
+ struct bpf_sockopt_kern BPF_PROG_TYPE_CGROUP_SOCKOPT_kern;
+ __u32 BPF_PROG_TYPE_LIRC_MODE2_prog;
+ u32 BPF_PROG_TYPE_LIRC_MODE2_kern;
+ struct sk_reuseport_md BPF_PROG_TYPE_SK_REUSEPORT_prog;
+ struct sk_reuseport_kern BPF_PROG_TYPE_SK_REUSEPORT_kern;
+ struct bpf_sk_lookup BPF_PROG_TYPE_SK_LOOKUP_prog;
+ struct bpf_sk_lookup_kern BPF_PROG_TYPE_SK_LOOKUP_kern;
+ void *BPF_PROG_TYPE_STRUCT_OPS_prog;
+ void *BPF_PROG_TYPE_STRUCT_OPS_kern;
+ void *BPF_PROG_TYPE_EXT_prog;
+ void *BPF_PROG_TYPE_EXT_kern;
+ void *BPF_PROG_TYPE_LSM_prog;
+ void *BPF_PROG_TYPE_LSM_kern;
+ void *BPF_PROG_TYPE_SYSCALL_prog;
+ void *BPF_PROG_TYPE_SYSCALL_kern;
+};
+
+enum {
+ __ctx_convertBPF_PROG_TYPE_SOCKET_FILTER = 0,
+ __ctx_convertBPF_PROG_TYPE_SCHED_CLS = 1,
+ __ctx_convertBPF_PROG_TYPE_SCHED_ACT = 2,
+ __ctx_convertBPF_PROG_TYPE_XDP = 3,
+ __ctx_convertBPF_PROG_TYPE_CGROUP_SKB = 4,
+ __ctx_convertBPF_PROG_TYPE_CGROUP_SOCK = 5,
+ __ctx_convertBPF_PROG_TYPE_CGROUP_SOCK_ADDR = 6,
+ __ctx_convertBPF_PROG_TYPE_LWT_IN = 7,
+ __ctx_convertBPF_PROG_TYPE_LWT_OUT = 8,
+ __ctx_convertBPF_PROG_TYPE_LWT_XMIT = 9,
+ __ctx_convertBPF_PROG_TYPE_LWT_SEG6LOCAL = 10,
+ __ctx_convertBPF_PROG_TYPE_SOCK_OPS = 11,
+ __ctx_convertBPF_PROG_TYPE_SK_SKB = 12,
+ __ctx_convertBPF_PROG_TYPE_SK_MSG = 13,
+ __ctx_convertBPF_PROG_TYPE_FLOW_DISSECTOR = 14,
+ __ctx_convertBPF_PROG_TYPE_KPROBE = 15,
+ __ctx_convertBPF_PROG_TYPE_TRACEPOINT = 16,
+ __ctx_convertBPF_PROG_TYPE_PERF_EVENT = 17,
+ __ctx_convertBPF_PROG_TYPE_RAW_TRACEPOINT = 18,
+ __ctx_convertBPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE = 19,
+ __ctx_convertBPF_PROG_TYPE_TRACING = 20,
+ __ctx_convertBPF_PROG_TYPE_CGROUP_DEVICE = 21,
+ __ctx_convertBPF_PROG_TYPE_CGROUP_SYSCTL = 22,
+ __ctx_convertBPF_PROG_TYPE_CGROUP_SOCKOPT = 23,
+ __ctx_convertBPF_PROG_TYPE_LIRC_MODE2 = 24,
+ __ctx_convertBPF_PROG_TYPE_SK_REUSEPORT = 25,
+ __ctx_convertBPF_PROG_TYPE_SK_LOOKUP = 26,
+ __ctx_convertBPF_PROG_TYPE_STRUCT_OPS = 27,
+ __ctx_convertBPF_PROG_TYPE_EXT = 28,
+ __ctx_convertBPF_PROG_TYPE_LSM = 29,
+ __ctx_convertBPF_PROG_TYPE_SYSCALL = 30,
+ __ctx_convert_unused = 31,
+};
+
+enum bpf_struct_walk_result {
+ WALK_SCALAR = 0,
+ WALK_PTR = 1,
+ WALK_STRUCT = 2,
+};
+
+struct btf_show_snprintf {
+ struct btf_show show;
+ int len_left;
+ int len;
+};
+
+enum {
+ BTF_MODULE_F_LIVE = 1,
+};
+
+struct btf_module {
+ struct list_head list;
+ struct module *module;
+ struct btf *btf;
+ struct bin_attribute *sysfs_attr;
+ int flags;
+};
+
+typedef u64 (*btf_bpf_btf_find_by_name_kind)(char *, int, u32, int);
+
+struct bpf_cand_cache {
+ const char *name;
+ u32 name_len;
+ u16 kind;
+ u16 cnt;
+ struct {
+ const struct btf *btf;
+ u32 id;
+ } cands[0];
+};
+
+struct acpi_dev_walk_context {
+ int (*fn)(struct acpi_device *, void *);
+ void *data;
+};
+
+enum translation_map {
+ LAT1_MAP = 0,
+ GRAF_MAP = 1,
+ IBMPC_MAP = 2,
+ USER_MAP = 3,
+ FIRST_MAP = 0,
+ LAST_MAP = 3,
+};
+
+struct uni_pagedict {
+ u16 **uni_pgdir[32];
+ long unsigned int refcount;
+ long unsigned int sum;
+ unsigned char *inverse_translations[4];
+ u16 *inverse_trans_unicode;
+};
+
+struct cpu {
+ int node_id;
+ int hotpluggable;
+ struct device dev;
+};
+
+struct cpu_attr {
+ struct device_attribute attr;
+ const struct cpumask * const map;
+};
+
+union input_seq_state {
+ struct {
+ short unsigned int pos;
+ bool mutex_acquired;
+ };
+ void *p;
+};
+
+struct input_devres {
+ struct input_dev *input;
+};
+
+struct zpff_device {
+ struct hid_report *report;
+};
+
+struct tc_act_bpf {
+ __u32 index;
+ __u32 capab;
+ int action;
+ int refcnt;
+ int bindcnt;
+};
+
+enum {
+ TCA_ACT_BPF_UNSPEC = 0,
+ TCA_ACT_BPF_TM = 1,
+ TCA_ACT_BPF_PARMS = 2,
+ TCA_ACT_BPF_OPS_LEN = 3,
+ TCA_ACT_BPF_OPS = 4,
+ TCA_ACT_BPF_FD = 5,
+ TCA_ACT_BPF_NAME = 6,
+ TCA_ACT_BPF_PAD = 7,
+ TCA_ACT_BPF_TAG = 8,
+ TCA_ACT_BPF_ID = 9,
+ __TCA_ACT_BPF_MAX = 10,
+};
+
+struct tcf_bpf {
+ struct tc_action common;
+ struct bpf_prog *filter;
+ union {
+ u32 bpf_fd;
+ u16 bpf_num_ops;
+ };
+ struct sock_filter *bpf_ops;
+ const char *bpf_name;
+};
+
+struct tcf_bpf_cfg {
+ struct bpf_prog *filter;
+ struct sock_filter *bpf_ops;
+ const char *bpf_name;
+ u16 bpf_num_ops;
+ bool is_ebpf;
+};
+
+struct mptcp_delegated_action {
+ struct napi_struct napi;
+ struct list_head head;
+};
+
+struct trace_event_raw_mptcp_subflow_get_send {
+ struct trace_entry ent;
+ bool active;
+ bool free;
+ u32 snd_wnd;
+ u32 pace;
+ u8 backup;
+ u64 ratio;
+ char __data[0];
+};
+
+struct trace_event_raw_mptcp_dump_mpext {
+ struct trace_entry ent;
+ u64 data_ack;
+ u64 data_seq;
+ u32 subflow_seq;
+ u16 data_len;
+ u16 csum;
+ u8 use_map;
+ u8 dsn64;
+ u8 data_fin;
+ u8 use_ack;
+ u8 ack64;
+ u8 mpc_map;
+ u8 frozen;
+ u8 reset_transient;
+ u8 reset_reason;
+ u8 csum_reqd;
+ u8 infinite_map;
+ char __data[0];
+};
+
+struct trace_event_raw_ack_update_msk {
+ struct trace_entry ent;
+ u64 data_ack;
+ u64 old_snd_una;
+ u64 new_snd_una;
+ u64 new_wnd_end;
+ u64 msk_wnd_end;
+ char __data[0];
+};
+
+struct trace_event_raw_subflow_check_data_avail {
+ struct trace_entry ent;
+ u8 status;
+ const void *skb;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_mptcp_subflow_get_send {};
+
+struct trace_event_data_offsets_mptcp_dump_mpext {};
+
+struct trace_event_data_offsets_ack_update_msk {};
+
+struct trace_event_data_offsets_subflow_check_data_avail {};
+
+typedef void (*btf_trace_mptcp_subflow_get_send)(void *, struct mptcp_subflow_context *);
+
+typedef void (*btf_trace_mptcp_sendmsg_frag)(void *, struct mptcp_ext *);
+
+typedef void (*btf_trace_get_mapping_status)(void *, struct mptcp_ext *);
+
+typedef void (*btf_trace_ack_update_msk)(void *, u64, u64, u64, u64, u64);
+
+typedef void (*btf_trace_subflow_check_data_avail)(void *, __u8, struct sk_buff *);
+
+enum {
+ MPTCP_CMSG_TS = 1,
+ MPTCP_CMSG_INQ = 2,
+};
+
+struct mptcp_sendmsg_info {
+ int mss_now;
+ int size_goal;
+ u16 limit;
+ u16 sent;
+ unsigned int flags;
+ bool data_lock_held;
+};
+
+struct subflow_send_info {
+ struct sock *ssk;
+ u64 linger_time;
+};
+
+struct waitid_info {
+ pid_t pid;
+ uid_t uid;
+ int status;
+ int cause;
+};
+
+struct wait_opts {
+ enum pid_type wo_type;
+ int wo_flags;
+ struct pid *wo_pid;
+ struct waitid_info *wo_info;
+ int wo_stat;
+ struct rusage *wo_rusage;
+ wait_queue_entry_t child_wait;
+ int notask_error;
+};
+
+struct bpf_cpumap_val {
+ __u32 qsize;
+ union {
+ int fd;
+ __u32 id;
+ } bpf_prog;
+};
+
+struct bpf_cpu_map_entry;
+
+struct xdp_bulk_queue {
+ void *q[8];
+ struct list_head flush_node;
+ struct bpf_cpu_map_entry *obj;
+ unsigned int count;
+};
+
+struct bpf_cpu_map;
+
+struct bpf_cpu_map_entry {
+ u32 cpu;
+ int map_id;
+ struct xdp_bulk_queue *bulkq;
+ struct bpf_cpu_map *cmap;
+ struct ptr_ring *queue;
+ struct task_struct *kthread;
+ struct bpf_cpumap_val value;
+ struct bpf_prog *prog;
+ atomic_t refcnt;
+ struct callback_head rcu;
+ struct work_struct kthread_stop_wq;
+};
+
+struct bpf_cpu_map {
+ struct bpf_map map;
+ struct bpf_cpu_map_entry **cpu_map;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct madvise_walk_private {
+ struct mmu_gather *tlb;
+ bool pageout;
+};
+
+struct kobj_map;
+
+struct char_device_struct {
+ struct char_device_struct *next;
+ unsigned int major;
+ unsigned int baseminor;
+ int minorct;
+ char name[64];
+ struct cdev *cdev;
+};
+
+struct __kernel_itimerspec {
+ struct __kernel_timespec it_interval;
+ struct __kernel_timespec it_value;
+};
+
+struct old_itimerspec32 {
+ struct old_timespec32 it_interval;
+ struct old_timespec32 it_value;
+};
+
+struct timerfd_ctx {
+ union {
+ struct hrtimer tmr;
+ struct alarm alarm;
+ } t;
+ ktime_t tintv;
+ ktime_t moffs;
+ wait_queue_head_t wqh;
+ u64 ticks;
+ int clockid;
+ short unsigned int expired;
+ short unsigned int settime_flags;
+ struct callback_head rcu;
+ struct list_head clist;
+ spinlock_t cancel_lock;
+ bool might_cancel;
+};
+
+struct pending_reservation {
+ struct rb_node rb_node;
+ ext4_lblk_t lclu;
+};
+
+struct rsvd_count {
+ int ndelonly;
+ bool first_do_lblk_found;
+ ext4_lblk_t first_do_lblk;
+ ext4_lblk_t last_do_lblk;
+ struct extent_status *left_es;
+ bool partial;
+ ext4_lblk_t lclu;
+};
+
+struct wrapper {
+ cmp_func_t cmp;
+ swap_func_t swap;
+};
+
+struct once_work {
+ struct work_struct work;
+ struct static_key_true *key;
+ struct module *module;
+};
+
+struct sg_pool {
+ size_t size;
+ char *name;
+ struct kmem_cache *slab;
+ mempool_t *pool;
+};
+
+struct msr_regs_info {
+ u32 *regs;
+ int err;
+};
+
+struct msr_info_completion {
+ struct msr_info msr;
+ struct completion done;
+};
+
+struct tpm_readpubek_out {
+ u8 algorithm[4];
+ u8 encscheme[2];
+ u8 sigscheme[2];
+ __be32 paramsize;
+ u8 parameters[12];
+ __be32 keysize;
+ u8 modulus[256];
+ u8 checksum[20];
+};
+
+struct tpm_pcr_attr {
+ int alg_id;
+ int pcr;
+ struct device_attribute attr;
+};
+
+struct lirc_scancode {
+ __u64 timestamp;
+ __u16 flags;
+ __u16 rc_proto;
+ __u32 keycode;
+ __u64 scancode;
+};
+
+struct lirc_fh {
+ struct list_head list;
+ struct rc_dev *rc;
+ int carrier_low;
+ struct {
+ union {
+ struct __kfifo kfifo;
+ unsigned int *type;
+ const unsigned int *const_type;
+ char (*rectype)[0];
+ unsigned int *ptr;
+ const unsigned int *ptr_const;
+ };
+ unsigned int buf[0];
+ } rawir;
+ struct {
+ union {
+ struct __kfifo kfifo;
+ struct lirc_scancode *type;
+ const struct lirc_scancode *const_type;
+ char (*rectype)[0];
+ struct lirc_scancode *ptr;
+ const struct lirc_scancode *ptr_const;
+ };
+ struct lirc_scancode buf[0];
+ } scancodes;
+ wait_queue_head_t wait_poll;
+ u8 send_mode;
+ u8 rec_mode;
+};
+
+enum {
+ SCTP_CHUNK_FLAG_T = 1,
+};
+
+struct ping_iter_state {
+ struct seq_net_private p;
+ int bucket;
+ sa_family_t family;
+};
+
+struct pingfakehdr {
+ struct icmphdr icmph;
+ struct msghdr *msg;
+ sa_family_t family;
+ __wsum wcheck;
+};
+
+struct ping_table {
+ struct hlist_nulls_head hash[64];
+ spinlock_t lock;
+};
+
+enum hpet_mode {
+ HPET_MODE_UNUSED = 0,
+ HPET_MODE_LEGACY = 1,
+ HPET_MODE_CLOCKEVT = 2,
+ HPET_MODE_DEVICE = 3,
+};
+
+struct hpet_channel {
+ struct clock_event_device evt;
+ unsigned int num;
+ unsigned int cpu;
+ unsigned int irq;
+ unsigned int in_use;
+ enum hpet_mode mode;
+ unsigned int boot_cfg;
+ char name[10];
+ long: 48;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct hpet_base {
+ unsigned int nr_channels;
+ unsigned int nr_clockevents;
+ unsigned int boot_cfg;
+ struct hpet_channel *channels;
+};
+
+union hpet_lock {
+ struct {
+ arch_spinlock_t lock;
+ u32 value;
+ };
+ u64 lockval;
+};
+
+enum reboot_type {
+ BOOT_TRIPLE = 116,
+ BOOT_KBD = 107,
+ BOOT_BIOS = 98,
+ BOOT_ACPI = 97,
+ BOOT_EFI = 101,
+ BOOT_CF9_FORCE = 112,
+ BOOT_CF9_SAFE = 113,
+};
+
+struct sys_off_handler {
+ struct notifier_block nb;
+ int (*sys_off_cb)(struct sys_off_data *);
+ void *cb_data;
+ enum sys_off_mode mode;
+ bool blocking;
+ void *list;
+};
+
+struct bpf_kfunc_desc {
+ struct btf_func_model func_model;
+ u32 func_id;
+ s32 imm;
+ u16 offset;
+};
+
+struct bpf_kfunc_desc_tab {
+ struct bpf_kfunc_desc descs[256];
+ u32 nr_descs;
+};
+
+struct bpf_kfunc_btf {
+ struct btf *btf;
+ struct module *module;
+ u16 offset;
+};
+
+struct bpf_kfunc_btf_tab {
+ struct bpf_kfunc_btf descs[256];
+ u32 nr_descs;
+};
+
+typedef u32 (*bpf_convert_ctx_access_t)(enum bpf_access_type, const struct bpf_insn *, struct bpf_insn *, struct bpf_prog *, u32 *);
+
+enum bpf_stack_slot_type {
+ STACK_INVALID = 0,
+ STACK_SPILL = 1,
+ STACK_MISC = 2,
+ STACK_ZERO = 3,
+ STACK_DYNPTR = 4,
+};
+
+struct bpf_verifier_stack_elem {
+ struct bpf_verifier_state st;
+ int insn_idx;
+ int prev_insn_idx;
+ struct bpf_verifier_stack_elem *next;
+ u32 log_pos;
+};
+
+struct bpf_call_arg_meta {
+ struct bpf_map *map_ptr;
+ bool raw_mode;
+ bool pkt_access;
+ u8 release_regno;
+ int regno;
+ int access_size;
+ int mem_size;
+ u64 msize_max_value;
+ int ref_obj_id;
+ int map_uid;
+ int func_id;
+ struct btf *btf;
+ u32 btf_id;
+ struct btf *ret_btf;
+ u32 ret_btf_id;
+ u32 subprogno;
+ struct btf_field *kptr_field;
+ u8 uninit_dynptr_regno;
+};
+
+enum reg_arg_type {
+ SRC_OP = 0,
+ DST_OP = 1,
+ DST_OP_NO_MARK = 2,
+};
+
+enum bpf_access_src {
+ ACCESS_DIRECT = 1,
+ ACCESS_HELPER = 2,
+};
+
+struct bpf_reg_types {
+ const enum bpf_reg_type types[10];
+ u32 *btf_id;
+};
+
+enum {
+ AT_PKT_END = -1,
+ BEYOND_PKT_END = -2,
+};
+
+typedef int (*set_callee_state_fn)(struct bpf_verifier_env *, struct bpf_func_state *, struct bpf_func_state *, int);
+
+struct bpf_kfunc_call_arg_meta {
+ struct btf *btf;
+ u32 func_id;
+ u32 kfunc_flags;
+ const struct btf_type *func_proto;
+ const char *func_name;
+ u32 ref_obj_id;
+ u8 release_regno;
+ bool r0_rdonly;
+ u32 ret_btf_id;
+ u64 r0_size;
+ struct {
+ u64 value;
+ bool found;
+ } arg_constant;
+ struct {
+ struct btf *btf;
+ u32 btf_id;
+ } arg_obj_drop;
+ struct {
+ struct btf_field *field;
+ } arg_list_head;
+};
+
+enum {
+ KF_ARG_DYNPTR_ID = 0,
+ KF_ARG_LIST_HEAD_ID = 1,
+ KF_ARG_LIST_NODE_ID = 2,
+};
+
+enum kfunc_ptr_arg_type {
+ KF_ARG_PTR_TO_CTX = 0,
+ KF_ARG_PTR_TO_ALLOC_BTF_ID = 1,
+ KF_ARG_PTR_TO_KPTR = 2,
+ KF_ARG_PTR_TO_DYNPTR = 3,
+ KF_ARG_PTR_TO_LIST_HEAD = 4,
+ KF_ARG_PTR_TO_LIST_NODE = 5,
+ KF_ARG_PTR_TO_BTF_ID = 6,
+ KF_ARG_PTR_TO_MEM = 7,
+ KF_ARG_PTR_TO_MEM_SIZE = 8,
+};
+
+enum special_kfunc_type {
+ KF_bpf_obj_new_impl = 0,
+ KF_bpf_obj_drop_impl = 1,
+ KF_bpf_list_push_front = 2,
+ KF_bpf_list_push_back = 3,
+ KF_bpf_list_pop_front = 4,
+ KF_bpf_list_pop_back = 5,
+ KF_bpf_cast_to_kern_ctx = 6,
+ KF_bpf_rdonly_cast = 7,
+ KF_bpf_rcu_read_lock = 8,
+ KF_bpf_rcu_read_unlock = 9,
+};
+
+enum {
+ REASON_BOUNDS = -1,
+ REASON_TYPE = -2,
+ REASON_PATHS = -3,
+ REASON_LIMIT = -4,
+ REASON_STACK = -5,
+};
+
+struct bpf_sanitize_info {
+ struct bpf_insn_aux_data aux;
+ bool mask_to_left;
+};
+
+enum {
+ DISCOVERED = 16,
+ EXPLORED = 32,
+ FALLTHROUGH = 1,
+ BRANCH = 2,
+};
+
+enum {
+ DONE_EXPLORING = 0,
+ KEEP_EXPLORING = 1,
+};
+
+struct acpi_exception_info {
+ char *name;
+};
+
+struct intel_agp_driver_description {
+ unsigned int chip_id;
+ char *name;
+ const struct agp_bridge_driver *driver;
+};
+
+struct bpf_prog_offload_ops {
+ int (*insn_hook)(struct bpf_verifier_env *, int, int);
+ int (*finalize)(struct bpf_verifier_env *);
+ int (*replace_insn)(struct bpf_verifier_env *, u32, struct bpf_insn *);
+ int (*remove_insns)(struct bpf_verifier_env *, u32, u32);
+ int (*prepare)(struct bpf_prog *);
+ int (*translate)(struct bpf_prog *);
+ void (*destroy)(struct bpf_prog *);
+};
+
+struct flow_cls_common_offload {
+ u32 chain_index;
+ __be16 protocol;
+ u32 prio;
+ struct netlink_ext_ack *extack;
+};
+
+enum tc_clsbpf_command {
+ TC_CLSBPF_OFFLOAD = 0,
+ TC_CLSBPF_STATS = 1,
+};
+
+struct tc_cls_bpf_offload {
+ struct flow_cls_common_offload common;
+ enum tc_clsbpf_command command;
+ struct tcf_exts *exts;
+ struct bpf_prog *prog;
+ struct bpf_prog *oldprog;
+ const char *name;
+ bool exts_integrated;
+};
+
+struct nsim_bpf_bound_prog {
+ struct nsim_dev *nsim_dev;
+ struct bpf_prog *prog;
+ struct dentry *ddir;
+ const char *state;
+ bool is_loaded;
+ struct list_head l;
+};
+
+struct nsim_map_entry {
+ void *key;
+ void *value;
+};
+
+struct nsim_bpf_bound_map {
+ struct netdevsim *ns;
+ struct bpf_offloaded_map *map;
+ struct mutex mutex;
+ struct nsim_map_entry entry[2];
+ struct list_head l;
+};
+
+enum {
+ IF_LINK_MODE_DEFAULT = 0,
+ IF_LINK_MODE_DORMANT = 1,
+ IF_LINK_MODE_TESTING = 2,
+};
+
+enum lw_bits {
+ LW_URGENT = 0,
+};
+
+struct fib_nh_notifier_info {
+ struct fib_notifier_info info;
+ struct fib_nh *fib_nh;
+};
+
+typedef __kernel_long_t __kernel_ptrdiff_t;
+
+typedef __kernel_ptrdiff_t ptrdiff_t;
+
+enum format_type {
+ FORMAT_TYPE_NONE = 0,
+ FORMAT_TYPE_WIDTH = 1,
+ FORMAT_TYPE_PRECISION = 2,
+ FORMAT_TYPE_CHAR = 3,
+ FORMAT_TYPE_STR = 4,
+ FORMAT_TYPE_PTR = 5,
+ FORMAT_TYPE_PERCENT_CHAR = 6,
+ FORMAT_TYPE_INVALID = 7,
+ FORMAT_TYPE_LONG_LONG = 8,
+ FORMAT_TYPE_ULONG = 9,
+ FORMAT_TYPE_LONG = 10,
+ FORMAT_TYPE_UBYTE = 11,
+ FORMAT_TYPE_BYTE = 12,
+ FORMAT_TYPE_USHORT = 13,
+ FORMAT_TYPE_SHORT = 14,
+ FORMAT_TYPE_UINT = 15,
+ FORMAT_TYPE_INT = 16,
+ FORMAT_TYPE_SIZE_T = 17,
+ FORMAT_TYPE_PTRDIFF = 18,
+};
+
+struct printf_spec {
+ unsigned int type: 8;
+ int field_width: 24;
+ unsigned int flags: 8;
+ unsigned int base: 8;
+ int precision: 16;
+};
+
+struct page_flags_fields {
+ int width;
+ int shift;
+ int mask;
+ const struct printf_spec *spec;
+ const char *name;
+};
+
+enum cache_type {
+ CACHE_TYPE_NOCACHE = 0,
+ CACHE_TYPE_INST = 1,
+ CACHE_TYPE_DATA = 2,
+ CACHE_TYPE_SEPARATE = 3,
+ CACHE_TYPE_UNIFIED = 4,
+};
+
+struct cacheinfo {
+ unsigned int id;
+ enum cache_type type;
+ unsigned int level;
+ unsigned int coherency_line_size;
+ unsigned int number_of_sets;
+ unsigned int ways_of_associativity;
+ unsigned int physical_line_partition;
+ unsigned int size;
+ cpumask_t shared_cpu_map;
+ unsigned int attributes;
+ void *fw_token;
+ bool disable_sysfs;
+ void *priv;
+};
+
+struct cpu_cacheinfo {
+ struct cacheinfo *info_list;
+ unsigned int num_levels;
+ unsigned int num_leaves;
+ bool cpu_map_populated;
+};
+
+struct _cache_table {
+ unsigned char descriptor;
+ char cache_type;
+ short int size;
+};
+
+enum _cache_type {
+ CTYPE_NULL = 0,
+ CTYPE_DATA = 1,
+ CTYPE_INST = 2,
+ CTYPE_UNIFIED = 3,
+};
+
+union _cpuid4_leaf_eax {
+ struct {
+ enum _cache_type type: 5;
+ unsigned int level: 3;
+ unsigned int is_self_initializing: 1;
+ unsigned int is_fully_associative: 1;
+ unsigned int reserved: 4;
+ unsigned int num_threads_sharing: 12;
+ unsigned int num_cores_on_die: 6;
+ } split;
+ u32 full;
+};
+
+union _cpuid4_leaf_ebx {
+ struct {
+ unsigned int coherency_line_size: 12;
+ unsigned int physical_line_partition: 10;
+ unsigned int ways_of_associativity: 10;
+ } split;
+ u32 full;
+};
+
+union _cpuid4_leaf_ecx {
+ struct {
+ unsigned int number_of_sets: 32;
+ } split;
+ u32 full;
+};
+
+struct _cpuid4_info_regs {
+ union _cpuid4_leaf_eax eax;
+ union _cpuid4_leaf_ebx ebx;
+ union _cpuid4_leaf_ecx ecx;
+ unsigned int id;
+ long unsigned int size;
+ struct amd_northbridge *nb;
+};
+
+union l1_cache {
+ struct {
+ unsigned int line_size: 8;
+ unsigned int lines_per_tag: 8;
+ unsigned int assoc: 8;
+ unsigned int size_in_kb: 8;
+ };
+ unsigned int val;
+};
+
+union l2_cache {
+ struct {
+ unsigned int line_size: 8;
+ unsigned int lines_per_tag: 4;
+ unsigned int assoc: 4;
+ unsigned int size_in_kb: 16;
+ };
+ unsigned int val;
+};
+
+union l3_cache {
+ struct {
+ unsigned int line_size: 8;
+ unsigned int lines_per_tag: 4;
+ unsigned int assoc: 4;
+ unsigned int res: 2;
+ unsigned int size_encoded: 14;
+ };
+ unsigned int val;
+};
+
+enum bpf_type {
+ BPF_TYPE_UNSPEC = 0,
+ BPF_TYPE_PROG = 1,
+ BPF_TYPE_MAP = 2,
+ BPF_TYPE_LINK = 3,
+};
+
+struct map_iter {
+ void *key;
+ bool done;
+};
+
+enum {
+ OPT_MODE = 0,
+};
+
+struct bpf_mount_opts {
+ umode_t mode;
+};
+
+struct fname {
+ __u32 hash;
+ __u32 minor_hash;
+ struct rb_node rb_hash;
+ struct fname *next;
+ __u32 inode;
+ __u8 name_len;
+ __u8 file_type;
+ char name[0];
+};
+
+struct io_uring_buf_reg {
+ __u64 ring_addr;
+ __u32 ring_entries;
+ __u16 bgid;
+ __u16 pad;
+ __u64 resv[3];
+};
+
+struct io_provide_buf {
+ struct file *file;
+ __u64 addr;
+ __u32 len;
+ __u32 bgid;
+ __u16 nbufs;
+ __u16 bid;
+};
+
+struct software_node_ref_args {
+ const struct software_node *node;
+ unsigned int nargs;
+ u64 args[8];
+};
+
+struct swnode {
+ struct kobject kobj;
+ struct fwnode_handle fwnode;
+ const struct software_node *node;
+ int id;
+ struct ida child_ids;
+ struct list_head entry;
+ struct list_head children;
+ struct swnode *parent;
+ unsigned int allocated: 1;
+ unsigned int managed: 1;
+};
+
+enum amd_chipset_gen {
+ NOT_AMD_CHIPSET = 0,
+ AMD_CHIPSET_SB600 = 1,
+ AMD_CHIPSET_SB700 = 2,
+ AMD_CHIPSET_SB800 = 3,
+ AMD_CHIPSET_HUDSON2 = 4,
+ AMD_CHIPSET_BOLTON = 5,
+ AMD_CHIPSET_YANGTZE = 6,
+ AMD_CHIPSET_TAISHAN = 7,
+ AMD_CHIPSET_UNKNOWN = 8,
+};
+
+struct amd_chipset_type {
+ enum amd_chipset_gen gen;
+ u8 rev;
+};
+
+struct amd_chipset_info {
+ struct pci_dev *nb_dev;
+ struct pci_dev *smbus_dev;
+ int nb_type;
+ struct amd_chipset_type sb_type;
+ int isoc_reqs;
+ int probe_count;
+ bool need_pll_quirk;
+};
+
+enum {
+ SK_DIAG_BPF_STORAGE_REQ_NONE = 0,
+ SK_DIAG_BPF_STORAGE_REQ_MAP_FD = 1,
+ __SK_DIAG_BPF_STORAGE_REQ_MAX = 2,
+};
+
+enum {
+ SK_DIAG_BPF_STORAGE_REP_NONE = 0,
+ SK_DIAG_BPF_STORAGE = 1,
+ __SK_DIAG_BPF_STORAGE_REP_MAX = 2,
+};
+
+enum {
+ SK_DIAG_BPF_STORAGE_NONE = 0,
+ SK_DIAG_BPF_STORAGE_PAD = 1,
+ SK_DIAG_BPF_STORAGE_MAP_ID = 2,
+ SK_DIAG_BPF_STORAGE_MAP_VALUE = 3,
+ __SK_DIAG_BPF_STORAGE_MAX = 4,
+};
+
+typedef u64 (*btf_bpf_sk_storage_get)(struct bpf_map *, struct sock *, void *, u64, gfp_t);
+
+typedef u64 (*btf_bpf_sk_storage_delete)(struct bpf_map *, struct sock *);
+
+typedef u64 (*btf_bpf_sk_storage_get_tracing)(struct bpf_map *, struct sock *, void *, u64, gfp_t);
+
+typedef u64 (*btf_bpf_sk_storage_delete_tracing)(struct bpf_map *, struct sock *);
+
+struct bpf_sk_storage_diag {
+ u32 nr_maps;
+ struct bpf_map *maps[0];
+};
+
+struct bpf_iter_seq_sk_storage_map_info {
+ struct bpf_map *map;
+ unsigned int bucket_id;
+ unsigned int skip_elems;
+};
+
+struct bpf_iter__bpf_sk_storage_map {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct bpf_map *map;
+ };
+ union {
+ struct sock *sk;
+ };
+ union {
+ void *value;
+ };
+};
+
+enum nfqnl_msg_types {
+ NFQNL_MSG_PACKET = 0,
+ NFQNL_MSG_VERDICT = 1,
+ NFQNL_MSG_CONFIG = 2,
+ NFQNL_MSG_VERDICT_BATCH = 3,
+ NFQNL_MSG_MAX = 4,
+};
+
+struct nfqnl_msg_packet_hdr {
+ __be32 packet_id;
+ __be16 hw_protocol;
+ __u8 hook;
+} __attribute__((packed));
+
+struct nfqnl_msg_packet_hw {
+ __be16 hw_addrlen;
+ __u16 _pad;
+ __u8 hw_addr[8];
+};
+
+struct nfqnl_msg_packet_timestamp {
+ __be64 sec;
+ __be64 usec;
+};
+
+enum nfqnl_vlan_attr {
+ NFQA_VLAN_UNSPEC = 0,
+ NFQA_VLAN_PROTO = 1,
+ NFQA_VLAN_TCI = 2,
+ __NFQA_VLAN_MAX = 3,
+};
+
+enum nfqnl_attr_type {
+ NFQA_UNSPEC = 0,
+ NFQA_PACKET_HDR = 1,
+ NFQA_VERDICT_HDR = 2,
+ NFQA_MARK = 3,
+ NFQA_TIMESTAMP = 4,
+ NFQA_IFINDEX_INDEV = 5,
+ NFQA_IFINDEX_OUTDEV = 6,
+ NFQA_IFINDEX_PHYSINDEV = 7,
+ NFQA_IFINDEX_PHYSOUTDEV = 8,
+ NFQA_HWADDR = 9,
+ NFQA_PAYLOAD = 10,
+ NFQA_CT = 11,
+ NFQA_CT_INFO = 12,
+ NFQA_CAP_LEN = 13,
+ NFQA_SKB_INFO = 14,
+ NFQA_EXP = 15,
+ NFQA_UID = 16,
+ NFQA_GID = 17,
+ NFQA_SECCTX = 18,
+ NFQA_VLAN = 19,
+ NFQA_L2HDR = 20,
+ NFQA_PRIORITY = 21,
+ __NFQA_MAX = 22,
+};
+
+struct nfqnl_msg_verdict_hdr {
+ __be32 verdict;
+ __be32 id;
+};
+
+enum nfqnl_msg_config_cmds {
+ NFQNL_CFG_CMD_NONE = 0,
+ NFQNL_CFG_CMD_BIND = 1,
+ NFQNL_CFG_CMD_UNBIND = 2,
+ NFQNL_CFG_CMD_PF_BIND = 3,
+ NFQNL_CFG_CMD_PF_UNBIND = 4,
+};
+
+struct nfqnl_msg_config_cmd {
+ __u8 command;
+ __u8 _pad;
+ __be16 pf;
+};
+
+enum nfqnl_config_mode {
+ NFQNL_COPY_NONE = 0,
+ NFQNL_COPY_META = 1,
+ NFQNL_COPY_PACKET = 2,
+};
+
+struct nfqnl_msg_config_params {
+ __be32 copy_range;
+ __u8 copy_mode;
+} __attribute__((packed));
+
+enum nfqnl_attr_config {
+ NFQA_CFG_UNSPEC = 0,
+ NFQA_CFG_CMD = 1,
+ NFQA_CFG_PARAMS = 2,
+ NFQA_CFG_QUEUE_MAXLEN = 3,
+ NFQA_CFG_MASK = 4,
+ NFQA_CFG_FLAGS = 5,
+ __NFQA_CFG_MAX = 6,
+};
+
+struct nfqnl_instance {
+ struct hlist_node hlist;
+ struct callback_head rcu;
+ u32 peer_portid;
+ unsigned int queue_maxlen;
+ unsigned int copy_range;
+ unsigned int queue_dropped;
+ unsigned int queue_user_dropped;
+ u_int16_t queue_num;
+ u_int8_t copy_mode;
+ u_int32_t flags;
+ spinlock_t lock;
+ unsigned int queue_total;
+ unsigned int id_sequence;
+ struct list_head queue_list;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+typedef int (*nfqnl_cmpfn)(struct nf_queue_entry *, long unsigned int);
+
+struct nfnl_queue_net {
+ spinlock_t instances_lock;
+ struct hlist_head instance_table[16];
+};
+
+enum {
+ SEG6_IPTUNNEL_UNSPEC = 0,
+ SEG6_IPTUNNEL_SRH = 1,
+ __SEG6_IPTUNNEL_MAX = 2,
+};
+
+struct seg6_iptunnel_encap {
+ int mode;
+ struct ipv6_sr_hdr srh[0];
+};
+
+enum {
+ SEG6_IPTUN_MODE_INLINE = 0,
+ SEG6_IPTUN_MODE_ENCAP = 1,
+ SEG6_IPTUN_MODE_L2ENCAP = 2,
+ SEG6_IPTUN_MODE_ENCAP_RED = 3,
+ SEG6_IPTUN_MODE_L2ENCAP_RED = 4,
+};
+
+struct seg6_lwt {
+ struct dst_cache cache;
+ struct seg6_iptunnel_encap tuninfo[0];
+};
+
+struct rc {
+ long int (*fill)(void *, long unsigned int);
+ uint8_t *ptr;
+ uint8_t *buffer;
+ uint8_t *buffer_end;
+ long int buffer_size;
+ uint32_t code;
+ uint32_t range;
+ uint32_t bound;
+ void (*error)(char *);
+};
+
+struct lzma_header {
+ uint8_t pos;
+ uint32_t dict_size;
+ uint64_t dst_size;
+} __attribute__((packed));
+
+struct writer {
+ uint8_t *buffer;
+ uint8_t previous_byte;
+ size_t buffer_pos;
+ int bufsize;
+ size_t global_pos;
+ long int (*flush)(void *, long unsigned int);
+ struct lzma_header *header;
+};
+
+struct cstate {
+ int state;
+ uint32_t rep0;
+ uint32_t rep1;
+ uint32_t rep2;
+ uint32_t rep3;
+};
+
+struct uevent_sock {
+ struct list_head list;
+ struct sock *sk;
+};
+
+struct change_member {
+ struct e820_entry *entry;
+ long long unsigned int addr;
+};
+
+struct param_attribute {
+ struct module_attribute mattr;
+ const struct kernel_param *param;
+};
+
+struct module_param_attrs {
+ unsigned int num;
+ struct attribute_group grp;
+ struct param_attribute attrs[0];
+};
+
+struct kmalloced_param {
+ struct list_head list;
+ char val[0];
+};
+
+struct audit_fsnotify_mark {
+ dev_t dev;
+ long unsigned int ino;
+ char *path;
+ struct fsnotify_mark mark;
+ struct audit_krule *rule;
+};
+
+enum bpf_stats_type {
+ BPF_STATS_RUN_TIME = 0,
+};
+
+struct bpf_prog_info {
+ __u32 type;
+ __u32 id;
+ __u8 tag[8];
+ __u32 jited_prog_len;
+ __u32 xlated_prog_len;
+ __u64 jited_prog_insns;
+ __u64 xlated_prog_insns;
+ __u64 load_time;
+ __u32 created_by_uid;
+ __u32 nr_map_ids;
+ __u64 map_ids;
+ char name[16];
+ __u32 ifindex;
+ __u32 gpl_compatible: 1;
+ __u64 netns_dev;
+ __u64 netns_ino;
+ __u32 nr_jited_ksyms;
+ __u32 nr_jited_func_lens;
+ __u64 jited_ksyms;
+ __u64 jited_func_lens;
+ __u32 btf_id;
+ __u32 func_info_rec_size;
+ __u64 func_info;
+ __u32 nr_func_info;
+ __u32 nr_line_info;
+ __u64 line_info;
+ __u64 jited_line_info;
+ __u32 nr_jited_line_info;
+ __u32 line_info_rec_size;
+ __u32 jited_line_info_rec_size;
+ __u32 nr_prog_tags;
+ __u64 prog_tags;
+ __u64 run_time_ns;
+ __u64 run_cnt;
+ __u64 recursion_misses;
+ __u32 verified_insns;
+ __u32 attach_btf_obj_id;
+ __u32 attach_btf_id;
+};
+
+struct bpf_map_info {
+ __u32 type;
+ __u32 id;
+ __u32 key_size;
+ __u32 value_size;
+ __u32 max_entries;
+ __u32 map_flags;
+ char name[16];
+ __u32 ifindex;
+ __u32 btf_vmlinux_value_type_id;
+ __u64 netns_dev;
+ __u64 netns_ino;
+ __u32 btf_id;
+ __u32 btf_key_type_id;
+ __u32 btf_value_type_id;
+ __u64 map_extra;
+};
+
+struct bpf_spin_lock {
+ __u32 val;
+};
+
+struct bpf_tracing_link {
+ struct bpf_tramp_link link;
+ enum bpf_attach_type attach_type;
+ struct bpf_trampoline *trampoline;
+ struct bpf_prog *tgt_prog;
+};
+
+enum bpf_audit {
+ BPF_AUDIT_LOAD = 0,
+ BPF_AUDIT_UNLOAD = 1,
+ BPF_AUDIT_MAX = 2,
+};
+
+struct bpf_prog_kstats {
+ u64 nsecs;
+ u64 cnt;
+ u64 misses;
+};
+
+struct bpf_raw_tp_link {
+ struct bpf_link link;
+ struct bpf_raw_event_map *btp;
+};
+
+struct bpf_perf_link {
+ struct bpf_link link;
+ struct file *perf_file;
+};
+
+typedef u64 (*btf_bpf_sys_bpf)(int, union bpf_attr *, u32);
+
+typedef u64 (*btf_bpf_sys_close)(u32);
+
+typedef u64 (*btf_bpf_kallsyms_lookup_name)(const char *, int, int, u64 *);
+
+struct fb_con2fbmap {
+ __u32 console;
+ __u32 framebuffer;
+};
+
+enum {
+ FBCON_LOGO_CANSHOW = -1,
+ FBCON_LOGO_DRAW = -2,
+ FBCON_LOGO_DONTSHOW = -3,
+};
+
+struct nsim_dev_hwstats_netdev {
+ struct list_head list;
+ struct net_device *netdev;
+ struct rtnl_hw_stats64 stats;
+ bool enabled;
+ bool fail_enable;
+};
+
+enum nsim_dev_hwstats_do {
+ NSIM_DEV_HWSTATS_DO_DISABLE = 0,
+ NSIM_DEV_HWSTATS_DO_ENABLE = 1,
+ NSIM_DEV_HWSTATS_DO_FAIL = 2,
+};
+
+struct nsim_dev_hwstats_fops {
+ const struct file_operations fops;
+ enum nsim_dev_hwstats_do action;
+ enum netdev_offload_xstats_type type;
+};
+
+typedef struct {
+ long unsigned int key[2];
+} hsiphash_key_t;
+
+struct __user_cap_header_struct {
+ __u32 version;
+ int pid;
+};
+
+typedef struct __user_cap_header_struct *cap_user_header_t;
+
+struct __user_cap_data_struct {
+ __u32 effective;
+ __u32 permitted;
+ __u32 inheritable;
+};
+
+typedef struct __user_cap_data_struct *cap_user_data_t;
+
+enum con_flush_mode {
+ CONSOLE_FLUSH_PENDING = 0,
+ CONSOLE_REPLAY_ALL = 1,
+};
+
+struct kmsg_dump_iter {
+ u64 cur_seq;
+ u64 next_seq;
+};
+
+struct kmsg_dumper {
+ struct list_head list;
+ void (*dump)(struct kmsg_dumper *, enum kmsg_dump_reason);
+ enum kmsg_dump_reason max_reason;
+ bool registered;
+};
+
+struct trace_event_raw_console {
+ struct trace_entry ent;
+ u32 __data_loc_msg;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_console {
+ u32 msg;
+};
+
+typedef void (*btf_trace_console)(void *, const char *, size_t);
+
+struct console_cmdline {
+ char name[16];
+ int index;
+ bool user_specified;
+ char *options;
+};
+
+enum printk_info_flags {
+ LOG_NEWLINE = 2,
+ LOG_CONT = 8,
+};
+
+enum devkmsg_log_bits {
+ __DEVKMSG_LOG_BIT_ON = 0,
+ __DEVKMSG_LOG_BIT_OFF = 1,
+ __DEVKMSG_LOG_BIT_LOCK = 2,
+};
+
+enum devkmsg_log_masks {
+ DEVKMSG_LOG_MASK_ON = 1,
+ DEVKMSG_LOG_MASK_OFF = 2,
+ DEVKMSG_LOG_MASK_LOCK = 4,
+};
+
+enum con_msg_format_flags {
+ MSG_FORMAT_DEFAULT = 0,
+ MSG_FORMAT_SYSLOG = 1,
+};
+
+struct latched_seq {
+ seqcount_latch_t latch;
+ u64 val[2];
+};
+
+struct devkmsg_user {
+ atomic64_t seq;
+ struct ratelimit_state rs;
+ struct mutex lock;
+ char buf[8192];
+ struct printk_info info;
+ char text_buf[8192];
+ struct printk_record record;
+};
+
+struct list_lru_memcg {
+ struct callback_head rcu;
+ struct list_lru_one node[0];
+};
+
+struct list_lru_memcg_table {
+ struct list_lru_memcg *mlru;
+ struct mem_cgroup *memcg;
+};
+
+struct vmemmap_remap_walk {
+ void (*remap_pte)(pte_t *, long unsigned int, struct vmemmap_remap_walk *);
+ long unsigned int nr_walked;
+ struct page *reuse_page;
+ long unsigned int reuse_addr;
+ struct list_head *vmemmap_pages;
+};
+
+enum legacy_fs_param {
+ LEGACY_FS_UNSET_PARAMS = 0,
+ LEGACY_FS_MONOLITHIC_PARAMS = 1,
+ LEGACY_FS_INDIVIDUAL_PARAMS = 2,
+};
+
+struct legacy_fs_context {
+ char *legacy_data;
+ size_t data_size;
+ enum legacy_fs_param param_type;
+};
+
+struct fat_boot_sector {
+ __u8 ignored[3];
+ __u8 system_id[8];
+ __u8 sector_size[2];
+ __u8 sec_per_clus;
+ __le16 reserved;
+ __u8 fats;
+ __u8 dir_entries[2];
+ __u8 sectors[2];
+ __u8 media;
+ __le16 fat_length;
+ __le16 secs_track;
+ __le16 heads;
+ __le32 hidden;
+ __le32 total_sect;
+ union {
+ struct {
+ __u8 drive_number;
+ __u8 state;
+ __u8 signature;
+ __u8 vol_id[4];
+ __u8 vol_label[11];
+ __u8 fs_type[8];
+ } fat16;
+ struct {
+ __le32 length;
+ __le16 flags;
+ __u8 version[2];
+ __le32 root_cluster;
+ __le16 info_sector;
+ __le16 backup_boot;
+ __le16 reserved2[6];
+ __u8 drive_number;
+ __u8 state;
+ __u8 signature;
+ __u8 vol_id[4];
+ __u8 vol_label[11];
+ __u8 fs_type[8];
+ } fat32;
+ };
+};
+
+struct msdos_partition {
+ u8 boot_ind;
+ u8 head;
+ u8 sector;
+ u8 cyl;
+ u8 sys_ind;
+ u8 end_head;
+ u8 end_sector;
+ u8 end_cyl;
+ __le32 start_sect;
+ __le32 nr_sects;
+};
+
+enum msdos_sys_ind {
+ DOS_EXTENDED_PARTITION = 5,
+ LINUX_EXTENDED_PARTITION = 133,
+ WIN98_EXTENDED_PARTITION = 15,
+ LINUX_DATA_PARTITION = 131,
+ LINUX_LVM_PARTITION = 142,
+ LINUX_RAID_PARTITION___3 = 253,
+ SOLARIS_X86_PARTITION = 130,
+ NEW_SOLARIS_X86_PARTITION = 191,
+ DM6_AUX1PARTITION = 81,
+ DM6_AUX3PARTITION = 83,
+ DM6_PARTITION = 84,
+ EZD_PARTITION = 85,
+ FREEBSD_PARTITION = 165,
+ OPENBSD_PARTITION = 166,
+ NETBSD_PARTITION = 169,
+ BSDI_PARTITION = 183,
+ MINIX_PARTITION = 129,
+ UNIXWARE_PARTITION = 99,
+};
+
+struct solaris_x86_slice {
+ __le16 s_tag;
+ __le16 s_flag;
+ __le32 s_start;
+ __le32 s_size;
+};
+
+struct solaris_x86_vtoc {
+ unsigned int v_bootinfo[3];
+ __le32 v_sanity;
+ __le32 v_version;
+ char v_volume[8];
+ __le16 v_sectorsz;
+ __le16 v_nparts;
+ unsigned int v_reserved[10];
+ struct solaris_x86_slice v_slice[16];
+ unsigned int timestamp[16];
+ char v_asciilabel[128];
+};
+
+struct bsd_partition {
+ __le32 p_size;
+ __le32 p_offset;
+ __le32 p_fsize;
+ __u8 p_fstype;
+ __u8 p_frag;
+ __le16 p_cpg;
+};
+
+struct bsd_disklabel {
+ __le32 d_magic;
+ __s16 d_type;
+ __s16 d_subtype;
+ char d_typename[16];
+ char d_packname[16];
+ __u32 d_secsize;
+ __u32 d_nsectors;
+ __u32 d_ntracks;
+ __u32 d_ncylinders;
+ __u32 d_secpercyl;
+ __u32 d_secperunit;
+ __u16 d_sparespertrack;
+ __u16 d_sparespercyl;
+ __u32 d_acylinders;
+ __u16 d_rpm;
+ __u16 d_interleave;
+ __u16 d_trackskew;
+ __u16 d_cylskew;
+ __u32 d_headswitch;
+ __u32 d_trkseek;
+ __u32 d_flags;
+ __u32 d_drivedata[5];
+ __u32 d_spare[5];
+ __le32 d_magic2;
+ __le16 d_checksum;
+ __le16 d_npartitions;
+ __le32 d_bbsize;
+ __le32 d_sbsize;
+ struct bsd_partition d_partitions[16];
+};
+
+struct unixware_slice {
+ __le16 s_label;
+ __le16 s_flags;
+ __le32 start_sect;
+ __le32 nr_sects;
+};
+
+struct unixware_vtoc {
+ __le32 v_magic;
+ __le32 v_version;
+ char v_name[8];
+ __le16 v_nslices;
+ __le16 v_unknown1;
+ __le32 v_reserved[10];
+ struct unixware_slice v_slice[16];
+};
+
+struct unixware_disklabel {
+ __le32 d_type;
+ __le32 d_magic;
+ __le32 d_version;
+ char d_serial[12];
+ __le32 d_ncylinders;
+ __le32 d_ntracks;
+ __le32 d_nsectors;
+ __le32 d_secsize;
+ __le32 d_part_start;
+ __le32 d_unknown1[12];
+ __le32 d_alt_tbl;
+ __le32 d_alt_len;
+ __le32 d_phys_cyl;
+ __le32 d_phys_trk;
+ __le32 d_phys_sec;
+ __le32 d_phys_bytes;
+ __le32 d_unknown2;
+ __le32 d_unknown3;
+ __le32 d_pad[8];
+ struct unixware_vtoc vtoc;
+};
+
+struct region {
+ unsigned int start;
+ unsigned int off;
+ unsigned int group_len;
+ unsigned int end;
+ unsigned int nbits;
+};
+
+enum {
+ REG_OP_ISFREE = 0,
+ REG_OP_ALLOC = 1,
+ REG_OP_RELEASE = 2,
+};
+
+struct walk_rcec_data {
+ struct pci_dev *rcec;
+ int (*user_callback)(struct pci_dev *, void *);
+ void *user_data;
+};
+
+enum hwmon_chip_attributes {
+ hwmon_chip_temp_reset_history = 0,
+ hwmon_chip_in_reset_history = 1,
+ hwmon_chip_curr_reset_history = 2,
+ hwmon_chip_power_reset_history = 3,
+ hwmon_chip_register_tz = 4,
+ hwmon_chip_update_interval = 5,
+ hwmon_chip_alarms = 6,
+ hwmon_chip_samples = 7,
+ hwmon_chip_curr_samples = 8,
+ hwmon_chip_in_samples = 9,
+ hwmon_chip_power_samples = 10,
+ hwmon_chip_temp_samples = 11,
+};
+
+enum hwmon_power_attributes {
+ hwmon_power_enable = 0,
+ hwmon_power_average = 1,
+ hwmon_power_average_interval = 2,
+ hwmon_power_average_interval_max = 3,
+ hwmon_power_average_interval_min = 4,
+ hwmon_power_average_highest = 5,
+ hwmon_power_average_lowest = 6,
+ hwmon_power_average_max = 7,
+ hwmon_power_average_min = 8,
+ hwmon_power_input = 9,
+ hwmon_power_input_highest = 10,
+ hwmon_power_input_lowest = 11,
+ hwmon_power_reset_history = 12,
+ hwmon_power_accuracy = 13,
+ hwmon_power_cap = 14,
+ hwmon_power_cap_hyst = 15,
+ hwmon_power_cap_max = 16,
+ hwmon_power_cap_min = 17,
+ hwmon_power_min = 18,
+ hwmon_power_max = 19,
+ hwmon_power_crit = 20,
+ hwmon_power_lcrit = 21,
+ hwmon_power_label = 22,
+ hwmon_power_alarm = 23,
+ hwmon_power_cap_alarm = 24,
+ hwmon_power_min_alarm = 25,
+ hwmon_power_max_alarm = 26,
+ hwmon_power_lcrit_alarm = 27,
+ hwmon_power_crit_alarm = 28,
+ hwmon_power_rated_min = 29,
+ hwmon_power_rated_max = 30,
+};
+
+enum hwmon_energy_attributes {
+ hwmon_energy_enable = 0,
+ hwmon_energy_input = 1,
+ hwmon_energy_label = 2,
+};
+
+enum hwmon_humidity_attributes {
+ hwmon_humidity_enable = 0,
+ hwmon_humidity_input = 1,
+ hwmon_humidity_label = 2,
+ hwmon_humidity_min = 3,
+ hwmon_humidity_min_hyst = 4,
+ hwmon_humidity_max = 5,
+ hwmon_humidity_max_hyst = 6,
+ hwmon_humidity_alarm = 7,
+ hwmon_humidity_fault = 8,
+ hwmon_humidity_rated_min = 9,
+ hwmon_humidity_rated_max = 10,
+};
+
+enum hwmon_fan_attributes {
+ hwmon_fan_enable = 0,
+ hwmon_fan_input = 1,
+ hwmon_fan_label = 2,
+ hwmon_fan_min = 3,
+ hwmon_fan_max = 4,
+ hwmon_fan_div = 5,
+ hwmon_fan_pulses = 6,
+ hwmon_fan_target = 7,
+ hwmon_fan_alarm = 8,
+ hwmon_fan_min_alarm = 9,
+ hwmon_fan_max_alarm = 10,
+ hwmon_fan_fault = 11,
+};
+
+enum hwmon_pwm_attributes {
+ hwmon_pwm_input = 0,
+ hwmon_pwm_enable = 1,
+ hwmon_pwm_mode = 2,
+ hwmon_pwm_freq = 3,
+ hwmon_pwm_auto_channels_temp = 4,
+};
+
+enum hwmon_intrusion_attributes {
+ hwmon_intrusion_alarm = 0,
+ hwmon_intrusion_beep = 1,
+};
+
+struct trace_event_raw_hwmon_attr_class {
+ struct trace_entry ent;
+ int index;
+ u32 __data_loc_attr_name;
+ long int val;
+ char __data[0];
+};
+
+struct trace_event_raw_hwmon_attr_show_string {
+ struct trace_entry ent;
+ int index;
+ u32 __data_loc_attr_name;
+ u32 __data_loc_label;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_hwmon_attr_class {
+ u32 attr_name;
+};
+
+struct trace_event_data_offsets_hwmon_attr_show_string {
+ u32 attr_name;
+ u32 label;
+};
+
+typedef void (*btf_trace_hwmon_attr_show)(void *, int, const char *, long int);
+
+typedef void (*btf_trace_hwmon_attr_store)(void *, int, const char *, long int);
+
+typedef void (*btf_trace_hwmon_attr_show_string)(void *, int, const char *, const char *);
+
+struct hwmon_device {
+ const char *name;
+ const char *label;
+ struct device dev;
+ const struct hwmon_chip_info *chip;
+ struct list_head tzdata;
+ struct attribute_group group;
+ const struct attribute_group **groups;
+};
+
+struct hwmon_device_attribute {
+ struct device_attribute dev_attr;
+ const struct hwmon_ops *ops;
+ enum hwmon_sensor_types type;
+ u32 attr;
+ int index;
+ char name[32];
+};
+
+struct nf_ct_bridge_info {
+ struct nf_hook_ops *ops;
+ unsigned int ops_size;
+ struct module *me;
+};
+
+enum {
+ NONE_FORCE_HPET_RESUME = 0,
+ OLD_ICH_FORCE_HPET_RESUME = 1,
+ ICH_FORCE_HPET_RESUME = 2,
+ VT8237_FORCE_HPET_RESUME = 3,
+ NVIDIA_FORCE_HPET_RESUME = 4,
+ ATI_FORCE_HPET_RESUME = 5,
+};
+
+enum allow_write_msrs {
+ MSR_WRITES_ON = 0,
+ MSR_WRITES_OFF = 1,
+ MSR_WRITES_DEFAULT = 2,
+};
+
+struct smpboot_thread_data {
+ unsigned int cpu;
+ unsigned int status;
+ struct smp_hotplug_thread *ht;
+};
+
+enum {
+ HP_THREAD_NONE = 0,
+ HP_THREAD_ACTIVE = 1,
+ HP_THREAD_PARKED = 2,
+};
+
+struct mcs_spinlock {
+ struct mcs_spinlock *next;
+ int locked;
+ int count;
+};
+
+struct qnode {
+ struct mcs_spinlock mcs;
+};
+
+enum {
+ IRQ_STARTUP_NORMAL = 0,
+ IRQ_STARTUP_MANAGED = 1,
+ IRQ_STARTUP_ABORT = 2,
+};
+
+typedef __kernel_long_t __kernel_suseconds_t;
+
+typedef __kernel_suseconds_t suseconds_t;
+
+struct old_timex32 {
+ u32 modes;
+ s32 offset;
+ s32 freq;
+ s32 maxerror;
+ s32 esterror;
+ s32 status;
+ s32 constant;
+ s32 precision;
+ s32 tolerance;
+ struct old_timeval32 time;
+ s32 tick;
+ s32 ppsfreq;
+ s32 jitter;
+ s32 shift;
+ s32 stabil;
+ s32 jitcnt;
+ s32 calcnt;
+ s32 errcnt;
+ s32 stbcnt;
+ s32 tai;
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+};
+
+struct file_clone_range {
+ __s64 src_fd;
+ __u64 src_offset;
+ __u64 src_length;
+ __u64 dest_offset;
+};
+
+struct file_dedupe_range_info {
+ __s64 dest_fd;
+ __u64 dest_offset;
+ __u64 bytes_deduped;
+ __s32 status;
+ __u32 reserved;
+};
+
+struct file_dedupe_range {
+ __u64 src_offset;
+ __u64 src_length;
+ __u16 dest_count;
+ __u16 reserved1;
+ __u32 reserved2;
+ struct file_dedupe_range_info info[0];
+};
+
+struct fsxattr {
+ __u32 fsx_xflags;
+ __u32 fsx_extsize;
+ __u32 fsx_nextents;
+ __u32 fsx_projid;
+ __u32 fsx_cowextsize;
+ unsigned char fsx_pad[8];
+};
+
+struct space_resv {
+ __s16 l_type;
+ __s16 l_whence;
+ __s64 l_start;
+ __s64 l_len;
+ __s32 l_sysid;
+ __u32 l_pid;
+ __s32 l_pad[4];
+};
+
+struct dnotify_struct {
+ struct dnotify_struct *dn_next;
+ __u32 dn_mask;
+ int dn_fd;
+ struct file *dn_filp;
+ fl_owner_t dn_owner;
+};
+
+struct dnotify_mark {
+ struct fsnotify_mark fsn_mark;
+ struct dnotify_struct *dn;
+};
+
+struct folio_iter {
+ struct folio *folio;
+ size_t offset;
+ size_t length;
+ struct folio *_next;
+ size_t _seg_count;
+ int _i;
+};
+
+struct iomap_ioend {
+ struct list_head io_list;
+ u16 io_type;
+ u16 io_flags;
+ u32 io_folios;
+ struct inode *io_inode;
+ size_t io_size;
+ loff_t io_offset;
+ sector_t io_sector;
+ struct bio *io_bio;
+ struct bio io_inline_bio;
+};
+
+struct iomap_writepage_ctx;
+
+struct iomap_writeback_ops {
+ int (*map_blocks)(struct iomap_writepage_ctx *, struct inode *, loff_t);
+ int (*prepare_ioend)(struct iomap_ioend *, int);
+ void (*discard_folio)(struct folio *, loff_t);
+};
+
+struct iomap_writepage_ctx {
+ struct iomap iomap;
+ struct iomap_ioend *ioend;
+ const struct iomap_writeback_ops *ops;
+};
+
+struct iomap_page {
+ atomic_t read_bytes_pending;
+ atomic_t write_bytes_pending;
+ spinlock_t uptodate_lock;
+ long unsigned int uptodate[0];
+};
+
+struct iomap_readpage_ctx {
+ struct folio *cur_folio;
+ bool cur_folio_in_bio;
+ struct bio *bio;
+ struct readahead_control *rac;
+};
+
+struct jbd2_journal_block_tail {
+ __be32 t_checksum;
+};
+
+struct recovery_info {
+ tid_t start_transaction;
+ tid_t end_transaction;
+ int nr_replays;
+ int nr_revokes;
+ int nr_revoke_hits;
+};
+
+enum {
+ Opt_err___8 = 0,
+ Opt_enc = 1,
+ Opt_hash___2 = 2,
+};
+
+struct ima_key_entry {
+ struct list_head list;
+ void *payload;
+ size_t payload_len;
+ char *keyring_name;
+};
+
+struct slave_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct slave *, char *);
+};
+
+struct nf_conntrack_nat_helper {
+ struct list_head list;
+ char mod_name[16];
+ struct module *module;
+};
+
+typedef struct sk_buff * (*gro_receive_sk_t)(struct sock *, struct list_head *, struct sk_buff *);
+
+struct x86_cpu {
+ struct cpu cpu;
+};
+
+struct cpuid_bit {
+ u16 feature;
+ u8 reg;
+ u8 bit;
+ u32 level;
+ u32 sub_leaf;
+};
+
+enum {
+ SAMPLES = 8,
+ MIN_CHANGE = 5,
+};
+
+enum spectre_v2_mitigation {
+ SPECTRE_V2_NONE = 0,
+ SPECTRE_V2_RETPOLINE = 1,
+ SPECTRE_V2_LFENCE = 2,
+ SPECTRE_V2_EIBRS = 3,
+ SPECTRE_V2_EIBRS_RETPOLINE = 4,
+ SPECTRE_V2_EIBRS_LFENCE = 5,
+ SPECTRE_V2_IBRS = 6,
+};
+
+enum spectre_v2_user_mitigation {
+ SPECTRE_V2_USER_NONE = 0,
+ SPECTRE_V2_USER_STRICT = 1,
+ SPECTRE_V2_USER_STRICT_PREFERRED = 2,
+ SPECTRE_V2_USER_PRCTL = 3,
+ SPECTRE_V2_USER_SECCOMP = 4,
+};
+
+enum ssb_mitigation {
+ SPEC_STORE_BYPASS_NONE = 0,
+ SPEC_STORE_BYPASS_DISABLE = 1,
+ SPEC_STORE_BYPASS_PRCTL = 2,
+ SPEC_STORE_BYPASS_SECCOMP = 3,
+};
+
+enum l1tf_mitigations {
+ L1TF_MITIGATION_OFF = 0,
+ L1TF_MITIGATION_FLUSH_NOWARN = 1,
+ L1TF_MITIGATION_FLUSH = 2,
+ L1TF_MITIGATION_FLUSH_NOSMT = 3,
+ L1TF_MITIGATION_FULL = 4,
+ L1TF_MITIGATION_FULL_FORCE = 5,
+};
+
+enum mds_mitigations {
+ MDS_MITIGATION_OFF = 0,
+ MDS_MITIGATION_FULL = 1,
+ MDS_MITIGATION_VMWERV = 2,
+};
+
+enum vmx_l1d_flush_state {
+ VMENTER_L1D_FLUSH_AUTO = 0,
+ VMENTER_L1D_FLUSH_NEVER = 1,
+ VMENTER_L1D_FLUSH_COND = 2,
+ VMENTER_L1D_FLUSH_ALWAYS = 3,
+ VMENTER_L1D_FLUSH_EPT_DISABLED = 4,
+ VMENTER_L1D_FLUSH_NOT_REQUIRED = 5,
+};
+
+enum taa_mitigations {
+ TAA_MITIGATION_OFF = 0,
+ TAA_MITIGATION_UCODE_NEEDED = 1,
+ TAA_MITIGATION_VERW = 2,
+ TAA_MITIGATION_TSX_DISABLED = 3,
+};
+
+enum mmio_mitigations {
+ MMIO_MITIGATION_OFF = 0,
+ MMIO_MITIGATION_UCODE_NEEDED = 1,
+ MMIO_MITIGATION_VERW = 2,
+};
+
+enum srbds_mitigations {
+ SRBDS_MITIGATION_OFF = 0,
+ SRBDS_MITIGATION_UCODE_NEEDED = 1,
+ SRBDS_MITIGATION_FULL = 2,
+ SRBDS_MITIGATION_TSX_OFF = 3,
+ SRBDS_MITIGATION_HYPERVISOR = 4,
+};
+
+enum l1d_flush_mitigations {
+ L1D_FLUSH_OFF = 0,
+ L1D_FLUSH_ON = 1,
+};
+
+enum spectre_v1_mitigation {
+ SPECTRE_V1_MITIGATION_NONE = 0,
+ SPECTRE_V1_MITIGATION_AUTO = 1,
+};
+
+enum retbleed_mitigation {
+ RETBLEED_MITIGATION_NONE = 0,
+ RETBLEED_MITIGATION_UNRET = 1,
+ RETBLEED_MITIGATION_IBPB = 2,
+ RETBLEED_MITIGATION_IBRS = 3,
+ RETBLEED_MITIGATION_EIBRS = 4,
+};
+
+enum retbleed_mitigation_cmd {
+ RETBLEED_CMD_OFF = 0,
+ RETBLEED_CMD_AUTO = 1,
+ RETBLEED_CMD_UNRET = 2,
+ RETBLEED_CMD_IBPB = 3,
+};
+
+enum spectre_v2_mitigation_cmd {
+ SPECTRE_V2_CMD_NONE = 0,
+ SPECTRE_V2_CMD_AUTO = 1,
+ SPECTRE_V2_CMD_FORCE = 2,
+ SPECTRE_V2_CMD_RETPOLINE = 3,
+ SPECTRE_V2_CMD_RETPOLINE_GENERIC = 4,
+ SPECTRE_V2_CMD_RETPOLINE_LFENCE = 5,
+ SPECTRE_V2_CMD_EIBRS = 6,
+ SPECTRE_V2_CMD_EIBRS_RETPOLINE = 7,
+ SPECTRE_V2_CMD_EIBRS_LFENCE = 8,
+ SPECTRE_V2_CMD_IBRS = 9,
+};
+
+enum spectre_v2_user_cmd {
+ SPECTRE_V2_USER_CMD_NONE = 0,
+ SPECTRE_V2_USER_CMD_AUTO = 1,
+ SPECTRE_V2_USER_CMD_FORCE = 2,
+ SPECTRE_V2_USER_CMD_PRCTL = 3,
+ SPECTRE_V2_USER_CMD_PRCTL_IBPB = 4,
+ SPECTRE_V2_USER_CMD_SECCOMP = 5,
+ SPECTRE_V2_USER_CMD_SECCOMP_IBPB = 6,
+};
+
+enum ssb_mitigation_cmd {
+ SPEC_STORE_BYPASS_CMD_NONE = 0,
+ SPEC_STORE_BYPASS_CMD_AUTO = 1,
+ SPEC_STORE_BYPASS_CMD_ON = 2,
+ SPEC_STORE_BYPASS_CMD_PRCTL = 3,
+ SPEC_STORE_BYPASS_CMD_SECCOMP = 4,
+};
+
+struct audit_parent;
+
+struct audit_watch {
+ refcount_t count;
+ dev_t dev;
+ char *path;
+ long unsigned int ino;
+ struct audit_parent *parent;
+ struct list_head wlist;
+ struct list_head rules;
+};
+
+struct audit_parent {
+ struct list_head watches;
+ struct fsnotify_mark mark;
+};
+
+struct reuseport_array {
+ struct bpf_map map;
+ struct sock *ptrs[0];
+};
+
+struct selinux_kernel_status {
+ u32 version;
+ u32 sequence;
+ u32 enforcing;
+ u32 policyload;
+ u32 deny_unknown;
+};
+
+enum assoc_array_walk_status {
+ assoc_array_walk_tree_empty = 0,
+ assoc_array_walk_found_terminal_node = 1,
+ assoc_array_walk_found_wrong_shortcut = 2,
+};
+
+struct assoc_array_walk_result {
+ struct {
+ struct assoc_array_node *node;
+ int level;
+ int slot;
+ } terminal_node;
+ struct {
+ struct assoc_array_shortcut *shortcut;
+ int level;
+ int sc_level;
+ long unsigned int sc_segments;
+ long unsigned int dissimilarity;
+ } wrong_shortcut;
+};
+
+struct assoc_array_delete_collapse_context {
+ struct assoc_array_node *node;
+ const void *skip_leaf;
+ int slot;
+};
+
+typedef uint64_t vli_type;
+
+enum xz_check {
+ XZ_CHECK_NONE = 0,
+ XZ_CHECK_CRC32 = 1,
+ XZ_CHECK_CRC64 = 4,
+ XZ_CHECK_SHA256 = 10,
+};
+
+struct xz_dec_hash {
+ vli_type unpadded;
+ vli_type uncompressed;
+ uint32_t crc32;
+};
+
+struct xz_dec_bcj;
+
+struct xz_dec {
+ enum {
+ SEQ_STREAM_HEADER = 0,
+ SEQ_BLOCK_START = 1,
+ SEQ_BLOCK_HEADER = 2,
+ SEQ_BLOCK_UNCOMPRESS = 3,
+ SEQ_BLOCK_PADDING = 4,
+ SEQ_BLOCK_CHECK = 5,
+ SEQ_INDEX = 6,
+ SEQ_INDEX_PADDING = 7,
+ SEQ_INDEX_CRC32 = 8,
+ SEQ_STREAM_FOOTER = 9,
+ } sequence;
+ uint32_t pos;
+ vli_type vli;
+ size_t in_start;
+ size_t out_start;
+ uint32_t crc32;
+ enum xz_check check_type;
+ enum xz_mode mode;
+ bool allow_buf_error;
+ struct {
+ vli_type compressed;
+ vli_type uncompressed;
+ uint32_t size;
+ } block_header;
+ struct {
+ vli_type compressed;
+ vli_type uncompressed;
+ vli_type count;
+ struct xz_dec_hash hash;
+ } block;
+ struct {
+ enum {
+ SEQ_INDEX_COUNT = 0,
+ SEQ_INDEX_UNPADDED = 1,
+ SEQ_INDEX_UNCOMPRESSED = 2,
+ } sequence;
+ vli_type size;
+ vli_type count;
+ struct xz_dec_hash hash;
+ } index;
+ struct {
+ size_t pos;
+ size_t size;
+ uint8_t buf[1024];
+ } temp;
+ struct xz_dec_lzma2 *lzma2;
+ struct xz_dec_bcj *bcj;
+ bool bcj_active;
+};
+
+struct pci_fixup {
+ u16 vendor;
+ u16 device;
+ u32 class;
+ unsigned int class_shift;
+ int hook_offset;
+};
+
+enum {
+ NVME_REG_CAP = 0,
+ NVME_REG_VS = 8,
+ NVME_REG_INTMS = 12,
+ NVME_REG_INTMC = 16,
+ NVME_REG_CC = 20,
+ NVME_REG_CSTS = 28,
+ NVME_REG_NSSR = 32,
+ NVME_REG_AQA = 36,
+ NVME_REG_ASQ = 40,
+ NVME_REG_ACQ = 48,
+ NVME_REG_CMBLOC = 56,
+ NVME_REG_CMBSZ = 60,
+ NVME_REG_BPINFO = 64,
+ NVME_REG_BPRSEL = 68,
+ NVME_REG_BPMBL = 72,
+ NVME_REG_CMBMSC = 80,
+ NVME_REG_CRTO = 104,
+ NVME_REG_PMRCAP = 3584,
+ NVME_REG_PMRCTL = 3588,
+ NVME_REG_PMRSTS = 3592,
+ NVME_REG_PMREBS = 3596,
+ NVME_REG_PMRSWTP = 3600,
+ NVME_REG_DBS = 4096,
+};
+
+enum {
+ NVME_CC_ENABLE = 1,
+ NVME_CC_EN_SHIFT = 0,
+ NVME_CC_CSS_SHIFT = 4,
+ NVME_CC_MPS_SHIFT = 7,
+ NVME_CC_AMS_SHIFT = 11,
+ NVME_CC_SHN_SHIFT = 14,
+ NVME_CC_IOSQES_SHIFT = 16,
+ NVME_CC_IOCQES_SHIFT = 20,
+ NVME_CC_CSS_NVM = 0,
+ NVME_CC_CSS_CSI = 96,
+ NVME_CC_CSS_MASK = 112,
+ NVME_CC_AMS_RR = 0,
+ NVME_CC_AMS_WRRU = 2048,
+ NVME_CC_AMS_VS = 14336,
+ NVME_CC_SHN_NONE = 0,
+ NVME_CC_SHN_NORMAL = 16384,
+ NVME_CC_SHN_ABRUPT = 32768,
+ NVME_CC_SHN_MASK = 49152,
+ NVME_CC_IOSQES = 393216,
+ NVME_CC_IOCQES = 4194304,
+ NVME_CC_CRIME = 16777216,
+};
+
+enum {
+ NVME_CSTS_RDY = 1,
+ NVME_CSTS_CFS = 2,
+ NVME_CSTS_NSSRO = 16,
+ NVME_CSTS_PP = 32,
+ NVME_CSTS_SHST_NORMAL = 0,
+ NVME_CSTS_SHST_OCCUR = 4,
+ NVME_CSTS_SHST_CMPLT = 8,
+ NVME_CSTS_SHST_MASK = 12,
+};
+
+enum {
+ NVME_AEN_BIT_NS_ATTR = 8,
+ NVME_AEN_BIT_FW_ACT = 9,
+ NVME_AEN_BIT_ANA_CHANGE = 11,
+ NVME_AEN_BIT_DISC_CHANGE = 31,
+};
+
+enum {
+ SWITCHTEC_GAS_MRPC_OFFSET = 0,
+ SWITCHTEC_GAS_TOP_CFG_OFFSET = 4096,
+ SWITCHTEC_GAS_SW_EVENT_OFFSET = 6144,
+ SWITCHTEC_GAS_SYS_INFO_OFFSET = 8192,
+ SWITCHTEC_GAS_FLASH_INFO_OFFSET = 8704,
+ SWITCHTEC_GAS_PART_CFG_OFFSET = 16384,
+ SWITCHTEC_GAS_NTB_OFFSET = 65536,
+ SWITCHTEC_GAS_PFF_CSR_OFFSET = 1261568,
+};
+
+enum {
+ SWITCHTEC_NTB_REG_INFO_OFFSET = 0,
+ SWITCHTEC_NTB_REG_CTRL_OFFSET = 16384,
+ SWITCHTEC_NTB_REG_DBMSG_OFFSET = 409600,
+};
+
+struct nt_partition_info {
+ u32 xlink_enabled;
+ u32 target_part_low;
+ u32 target_part_high;
+ u32 reserved;
+};
+
+struct ntb_info_regs {
+ u8 partition_count;
+ u8 partition_id;
+ u16 reserved1;
+ u64 ep_map;
+ u16 requester_id;
+ u16 reserved2;
+ u32 reserved3[4];
+ struct nt_partition_info ntp_info[48];
+} __attribute__((packed));
+
+struct ntb_ctrl_regs {
+ u32 partition_status;
+ u32 partition_op;
+ u32 partition_ctrl;
+ u32 bar_setup;
+ u32 bar_error;
+ u16 lut_table_entries;
+ u16 lut_table_offset;
+ u32 lut_error;
+ u16 req_id_table_size;
+ u16 req_id_table_offset;
+ u32 req_id_error;
+ u32 reserved1[7];
+ struct {
+ u32 ctl;
+ u32 win_size;
+ u64 xlate_addr;
+ } bar_entry[6];
+ struct {
+ u32 win_size;
+ u32 reserved[3];
+ } bar_ext_entry[6];
+ u32 reserved2[192];
+ u32 req_id_table[512];
+ u32 reserved3[256];
+ u64 lut_entry[512];
+};
+
+struct pci_dev_reset_methods {
+ u16 vendor;
+ u16 device;
+ int (*reset)(struct pci_dev *, bool);
+};
+
+struct pci_dev_acs_enabled {
+ u16 vendor;
+ u16 device;
+ int (*acs_enabled)(struct pci_dev *, u16);
+};
+
+struct pci_dev_acs_ops {
+ u16 vendor;
+ u16 device;
+ int (*enable_acs)(struct pci_dev *);
+ int (*disable_acs_redir)(struct pci_dev *);
+};
+
+enum {
+ AML_FIELD_UPDATE_PRESERVE = 0,
+ AML_FIELD_UPDATE_WRITE_AS_ONES = 32,
+ AML_FIELD_UPDATE_WRITE_AS_ZEROS = 64,
+};
+
+enum pci_p2pdma_map_type {
+ PCI_P2PDMA_MAP_UNKNOWN = 0,
+ PCI_P2PDMA_MAP_NOT_SUPPORTED = 1,
+ PCI_P2PDMA_MAP_BUS_ADDR = 2,
+ PCI_P2PDMA_MAP_THRU_HOST_BRIDGE = 3,
+};
+
+struct pci_p2pdma_map_state {
+ struct dev_pagemap *pgmap;
+ int map;
+ u64 bus_off;
+};
+
+enum iommu_dma_cookie_type {
+ IOMMU_DMA_IOVA_COOKIE = 0,
+ IOMMU_DMA_MSI_COOKIE = 1,
+};
+
+struct iova_fq;
+
+struct iommu_dma_cookie {
+ enum iommu_dma_cookie_type type;
+ union {
+ struct {
+ struct iova_domain iovad;
+ struct iova_fq *fq;
+ atomic64_t fq_flush_start_cnt;
+ atomic64_t fq_flush_finish_cnt;
+ struct timer_list fq_timer;
+ atomic_t fq_timer_on;
+ };
+ dma_addr_t msi_iova;
+ };
+ struct list_head msi_page_list;
+ struct iommu_domain *fq_domain;
+ struct mutex mutex;
+};
+
+struct iommu_dma_msi_page {
+ struct list_head list;
+ dma_addr_t iova;
+ phys_addr_t phys;
+};
+
+struct iova_fq_entry {
+ long unsigned int iova_pfn;
+ long unsigned int pages;
+ struct list_head freelist;
+ u64 counter;
+};
+
+struct iova_fq {
+ struct iova_fq_entry entries[256];
+ unsigned int head;
+ unsigned int tail;
+ spinlock_t lock;
+};
+
+struct focaltech_finger_state {
+ bool active;
+ bool valid;
+ unsigned int x;
+ unsigned int y;
+};
+
+struct focaltech_hw_state {
+ struct focaltech_finger_state fingers[5];
+ unsigned int width;
+ bool pressed;
+};
+
+struct focaltech_data {
+ unsigned int x_max;
+ unsigned int y_max;
+ struct focaltech_hw_state state;
+};
+
+struct firmware_map_entry {
+ u64 start;
+ u64 end;
+ const char *type;
+ struct list_head list;
+ struct kobject kobj;
+};
+
+struct memmap_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct firmware_map_entry *, char *);
+};
+
+struct nvmem_cell_info {
+ const char *name;
+ unsigned int offset;
+ unsigned int bytes;
+ unsigned int bit_offset;
+ unsigned int nbits;
+ struct device_node *np;
+};
+
+struct nvmem_cell_lookup {
+ const char *nvmem_name;
+ const char *cell_name;
+ const char *dev_id;
+ const char *con_id;
+ struct list_head node;
+};
+
+enum {
+ NVMEM_ADD = 1,
+ NVMEM_REMOVE = 2,
+ NVMEM_CELL_ADD = 3,
+ NVMEM_CELL_REMOVE = 4,
+};
+
+typedef int (*nvmem_reg_read_t)(void *, unsigned int, void *, size_t);
+
+typedef int (*nvmem_reg_write_t)(void *, unsigned int, void *, size_t);
+
+typedef int (*nvmem_cell_post_process_t)(void *, const char *, unsigned int, void *, size_t);
+
+enum nvmem_type {
+ NVMEM_TYPE_UNKNOWN = 0,
+ NVMEM_TYPE_EEPROM = 1,
+ NVMEM_TYPE_OTP = 2,
+ NVMEM_TYPE_BATTERY_BACKED = 3,
+ NVMEM_TYPE_FRAM = 4,
+};
+
+struct nvmem_keepout {
+ unsigned int start;
+ unsigned int end;
+ unsigned char value;
+};
+
+struct nvmem_config {
+ struct device *dev;
+ const char *name;
+ int id;
+ struct module *owner;
+ struct gpio_desc *wp_gpio;
+ const struct nvmem_cell_info *cells;
+ int ncells;
+ const struct nvmem_keepout *keepout;
+ unsigned int nkeepout;
+ enum nvmem_type type;
+ bool read_only;
+ bool root_only;
+ bool ignore_wp;
+ struct device_node *of_node;
+ bool no_of_node;
+ nvmem_reg_read_t reg_read;
+ nvmem_reg_write_t reg_write;
+ nvmem_cell_post_process_t cell_post_process;
+ int size;
+ int word_size;
+ int stride;
+ void *priv;
+ bool compat;
+ struct device *base_dev;
+};
+
+struct nvmem_cell_table {
+ const char *nvmem_name;
+ const struct nvmem_cell_info *cells;
+ size_t ncells;
+ struct list_head node;
+};
+
+struct nvmem_device {
+ struct module *owner;
+ struct device dev;
+ int stride;
+ int word_size;
+ int id;
+ struct kref refcnt;
+ size_t size;
+ bool read_only;
+ bool root_only;
+ int flags;
+ enum nvmem_type type;
+ struct bin_attribute eeprom;
+ struct device *base_dev;
+ struct list_head cells;
+ const struct nvmem_keepout *keepout;
+ unsigned int nkeepout;
+ nvmem_reg_read_t reg_read;
+ nvmem_reg_write_t reg_write;
+ nvmem_cell_post_process_t cell_post_process;
+ struct gpio_desc *wp_gpio;
+ void *priv;
+};
+
+struct nvmem_cell_entry {
+ const char *name;
+ int offset;
+ int bytes;
+ int bit_offset;
+ int nbits;
+ struct device_node *np;
+ struct nvmem_device *nvmem;
+ struct list_head node;
+};
+
+struct nvmem_cell {
+ struct nvmem_cell_entry *entry;
+ const char *id;
+};
+
+struct ingress_sched_data {
+ struct tcf_block *block;
+ struct tcf_block_ext_info block_info;
+ struct mini_Qdisc_pair miniqp;
+};
+
+struct clsact_sched_data {
+ struct tcf_block *ingress_block;
+ struct tcf_block *egress_block;
+ struct tcf_block_ext_info ingress_block_info;
+ struct tcf_block_ext_info egress_block_info;
+ struct mini_Qdisc_pair miniqp_ingress;
+ struct mini_Qdisc_pair miniqp_egress;
+};
+
+enum {
+ UDP_BPF_IPV4 = 0,
+ UDP_BPF_IPV6 = 1,
+ UDP_BPF_NUM_PROTS = 2,
+};
+
+struct stack_frame_user {
+ const void *next_fp;
+ long unsigned int ret_addr;
+};
+
+struct irq_devres {
+ unsigned int irq;
+ void *dev_id;
+};
+
+struct irq_desc_devres {
+ unsigned int from;
+ unsigned int cnt;
+};
+
+struct taint_flag {
+ char c_true;
+ char c_false;
+ bool module;
+};
+
+struct trace_event_raw_module_load {
+ struct trace_entry ent;
+ unsigned int taints;
+ u32 __data_loc_name;
+ char __data[0];
+};
+
+struct trace_event_raw_module_free {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ char __data[0];
+};
+
+struct trace_event_raw_module_refcnt {
+ struct trace_entry ent;
+ long unsigned int ip;
+ int refcnt;
+ u32 __data_loc_name;
+ char __data[0];
+};
+
+struct trace_event_raw_module_request {
+ struct trace_entry ent;
+ long unsigned int ip;
+ bool wait;
+ u32 __data_loc_name;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_module_load {
+ u32 name;
+};
+
+struct trace_event_data_offsets_module_free {
+ u32 name;
+};
+
+struct trace_event_data_offsets_module_refcnt {
+ u32 name;
+};
+
+struct trace_event_data_offsets_module_request {
+ u32 name;
+};
+
+typedef void (*btf_trace_module_load)(void *, struct module *);
+
+typedef void (*btf_trace_module_free)(void *, struct module *);
+
+typedef void (*btf_trace_module_get)(void *, struct module *, long unsigned int);
+
+typedef void (*btf_trace_module_put)(void *, struct module *, long unsigned int);
+
+typedef void (*btf_trace_module_request)(void *, char *, bool, long unsigned int);
+
+struct symsearch {
+ const struct kernel_symbol *start;
+ const struct kernel_symbol *stop;
+ const s32 *crcs;
+ enum mod_license license;
+};
+
+struct mod_initfree {
+ struct llist_node node;
+ void *module_init;
+};
+
+enum {
+ RES_USAGE___2 = 0,
+ RES_RSVD_USAGE = 1,
+ RES_LIMIT___2 = 2,
+ RES_RSVD_LIMIT = 3,
+ RES_MAX_USAGE___2 = 4,
+ RES_RSVD_MAX_USAGE = 5,
+ RES_FAILCNT___2 = 6,
+ RES_RSVD_FAILCNT = 7,
+};
+
+struct pde_opener {
+ struct list_head lh;
+ struct file *file;
+ bool closing;
+ struct completion *c;
+};
+
+enum {
+ BIAS = 2147483648,
+};
+
+enum bio_post_read_step {
+ STEP_INITIAL = 0,
+ STEP_DECRYPT = 1,
+ STEP_VERITY = 2,
+ STEP_MAX = 3,
+};
+
+struct bio_post_read_ctx {
+ struct bio *bio;
+ struct work_struct work;
+ unsigned int cur_step;
+ unsigned int enabled_steps;
+};
+
+struct bsg_job;
+
+typedef int bsg_job_fn(struct bsg_job *);
+
+struct bsg_buffer {
+ unsigned int payload_len;
+ int sg_cnt;
+ struct scatterlist *sg_list;
+};
+
+struct bsg_job {
+ struct device *dev;
+ struct kref kref;
+ unsigned int timeout;
+ void *request;
+ void *reply;
+ unsigned int request_len;
+ unsigned int reply_len;
+ struct bsg_buffer request_payload;
+ struct bsg_buffer reply_payload;
+ int result;
+ unsigned int reply_payload_rcv_len;
+ struct request *bidi_rq;
+ struct bio *bidi_bio;
+ void *dd_data;
+};
+
+typedef enum blk_eh_timer_return bsg_timeout_fn(struct request *);
+
+enum scsi_device_event {
+ SDEV_EVT_MEDIA_CHANGE = 1,
+ SDEV_EVT_INQUIRY_CHANGE_REPORTED = 2,
+ SDEV_EVT_CAPACITY_CHANGE_REPORTED = 3,
+ SDEV_EVT_SOFT_THRESHOLD_REACHED_REPORTED = 4,
+ SDEV_EVT_MODE_PARAMETER_CHANGE_REPORTED = 5,
+ SDEV_EVT_LUN_CHANGE_REPORTED = 6,
+ SDEV_EVT_ALUA_STATE_CHANGE_REPORTED = 7,
+ SDEV_EVT_POWER_ON_RESET_OCCURRED = 8,
+ SDEV_EVT_FIRST = 1,
+ SDEV_EVT_LAST = 8,
+ SDEV_EVT_MAXBITS = 9,
+};
+
+struct bsg_device;
+
+struct bsg_set {
+ struct blk_mq_tag_set tag_set;
+ struct bsg_device *bd;
+ bsg_job_fn *job_fn;
+ bsg_timeout_fn *timeout_fn;
+};
+
+struct genradix_iter {
+ size_t offset;
+ size_t pos;
+};
+
+struct genradix_node {
+ union {
+ struct genradix_node *children[512];
+ u8 data[4096];
+ };
+};
+
+struct internal_state {
+ int dummy;
+};
+
+typedef struct {
+ size_t bitContainer;
+ unsigned int bitsConsumed;
+ const char *ptr;
+ const char *start;
+ const char *limitPtr;
+} BIT_DStream_t;
+
+typedef enum {
+ BIT_DStream_unfinished = 0,
+ BIT_DStream_endOfBuffer = 1,
+ BIT_DStream_completed = 2,
+ BIT_DStream_overflow = 3,
+} BIT_DStream_status;
+
+typedef enum {
+ set_basic = 0,
+ set_rle = 1,
+ set_compressed = 2,
+ set_repeat = 3,
+} symbolEncodingType_e;
+
+typedef enum {
+ ZSTD_no_overlap = 0,
+ ZSTD_overlap_src_before_dst = 1,
+} ZSTD_overlap_e;
+
+typedef struct {
+ U32 fastMode;
+ U32 tableLog;
+} ZSTD_seqSymbol_header;
+
+typedef struct {
+ size_t litLength;
+ size_t matchLength;
+ size_t offset;
+ const BYTE *match;
+} seq_t;
+
+typedef struct {
+ size_t state;
+ const ZSTD_seqSymbol *table;
+} ZSTD_fseState;
+
+typedef struct {
+ BIT_DStream_t DStream;
+ ZSTD_fseState stateLL;
+ ZSTD_fseState stateOffb;
+ ZSTD_fseState stateML;
+ size_t prevOffset[3];
+ const BYTE *prefixStart;
+ const BYTE *dictEnd;
+ size_t pos;
+} seqState_t;
+
+typedef enum {
+ ZSTD_lo_isRegularOffset = 0,
+ ZSTD_lo_isLongOffset = 1,
+} ZSTD_longOffset_e;
+
+typedef enum {
+ ZSTD_p_noPrefetch = 0,
+ ZSTD_p_prefetch = 1,
+} ZSTD_prefetch_e;
+
+struct clock_identity {
+ u8 id[8];
+};
+
+struct port_identity {
+ struct clock_identity clock_identity;
+ __be16 port_number;
+};
+
+struct ptp_header {
+ u8 tsmt;
+ u8 ver;
+ __be16 message_length;
+ u8 domain_number;
+ u8 reserved1;
+ u8 flag_field[2];
+ __be64 correction;
+ __be32 reserved2;
+ struct port_identity source_port_identity;
+ __be16 sequence_id;
+ u8 control;
+ u8 log_message_interval;
+} __attribute__((packed));
+
+struct linkmodes_reply_data {
+ struct ethnl_reply_data base;
+ struct ethtool_link_ksettings ksettings;
+ struct ethtool_link_settings *lsettings;
+ bool peer_empty;
+};
+
+struct xfrm6_protocol {
+ int (*handler)(struct sk_buff *);
+ int (*input_handler)(struct sk_buff *, int, __be32, int);
+ int (*cb_handler)(struct sk_buff *, int);
+ int (*err_handler)(struct sk_buff *, struct inet6_skb_parm *, u8, u8, int, __be32);
+ struct xfrm6_protocol *next;
+ int priority;
+};
+
+typedef u8 retpoline_thunk_t[32];
+
+struct smp_alt_module {
+ struct module *mod;
+ char *name;
+ const s32 *locks;
+ const s32 *locks_end;
+ u8 *text;
+ u8 *text_end;
+ struct list_head next;
+};
+
+typedef struct {
+ struct mm_struct *mm;
+} temp_mm_state_t;
+
+typedef void text_poke_f(void *, const void *, size_t);
+
+struct text_poke_loc {
+ s32 rel_addr;
+ s32 disp;
+ u8 len;
+ u8 opcode;
+ const u8 text[5];
+ u8 old;
+};
+
+struct bp_patching_desc {
+ struct text_poke_loc *vec;
+ int nr_entries;
+ atomic_t refs;
+};
+
+struct _tlb_table {
+ unsigned char descriptor;
+ char tlb_type;
+ unsigned int entries;
+ char info[128];
+};
+
+enum split_lock_detect_state {
+ sld_off = 0,
+ sld_warn = 1,
+ sld_fatal = 2,
+ sld_ratelimit = 3,
+};
+
+struct sku_microcode {
+ u8 model;
+ u8 stepping;
+ u32 microcode;
+};
+
+struct warn_args {
+ const char *fmt;
+ va_list args;
+};
+
+typedef struct sigevent sigevent_t;
+
+struct wb_lock_cookie {
+ bool locked;
+ long unsigned int flags;
+};
+
+struct dirty_throttle_control {
+ struct wb_domain *dom;
+ struct dirty_throttle_control *gdtc;
+ struct bdi_writeback *wb;
+ struct fprop_local_percpu *wb_completions;
+ long unsigned int avail;
+ long unsigned int dirty;
+ long unsigned int thresh;
+ long unsigned int bg_thresh;
+ long unsigned int wb_dirty;
+ long unsigned int wb_thresh;
+ long unsigned int wb_bg_thresh;
+ long unsigned int pos_ratio;
+};
+
+enum SHIFT_DIRECTION {
+ SHIFT_LEFT = 0,
+ SHIFT_RIGHT = 1,
+};
+
+struct ext4_extent_tail {
+ __le32 et_checksum;
+};
+
+enum devm_ioremap_type {
+ DEVM_IOREMAP = 0,
+ DEVM_IOREMAP_UC = 1,
+ DEVM_IOREMAP_WC = 2,
+ DEVM_IOREMAP_NP = 3,
+};
+
+struct pcim_iomap_devres {
+ void *table[6];
+};
+
+struct arch_io_reserve_memtype_wc_devres {
+ resource_size_t start;
+ resource_size_t size;
+};
+
+struct vga_device {
+ struct list_head list;
+ struct pci_dev *pdev;
+ unsigned int decodes;
+ unsigned int owns;
+ unsigned int locks;
+ unsigned int io_lock_cnt;
+ unsigned int mem_lock_cnt;
+ unsigned int io_norm_cnt;
+ unsigned int mem_norm_cnt;
+ bool bridge_has_one_vga;
+ bool is_firmware_default;
+ unsigned int (*set_decode)(struct pci_dev *, bool);
+};
+
+struct vga_arb_user_card {
+ struct pci_dev *pdev;
+ unsigned int mem_cnt;
+ unsigned int io_cnt;
+};
+
+struct vga_arb_private {
+ struct list_head list;
+ struct pci_dev *target;
+ struct vga_arb_user_card cards[16];
+ spinlock_t lock;
+};
+
+struct agp_3_5_dev {
+ struct list_head list;
+ u8 capndx;
+ u32 maxbw;
+ struct pci_dev *dev;
+};
+
+struct isoch_data {
+ u32 maxbw;
+ u32 n;
+ u32 y;
+ u32 l;
+ u32 rq;
+ struct agp_3_5_dev *dev;
+};
+
+typedef void * (*devcon_match_fn_t)(struct fwnode_handle *, const char *, void *);
+
+struct ladder_device_state {
+ struct {
+ u32 promotion_count;
+ u32 demotion_count;
+ u64 promotion_time_ns;
+ u64 demotion_time_ns;
+ } threshold;
+ struct {
+ int promotion_count;
+ int demotion_count;
+ } stats;
+};
+
+struct ladder_device {
+ struct ladder_device_state states[10];
+};
+
+struct virtio_crypto_rsa_ctx {
+ MPI n;
+};
+
+struct virtio_crypto_akcipher_ctx {
+ struct crypto_engine_ctx enginectx;
+ struct virtio_crypto *vcrypto;
+ struct crypto_akcipher *tfm;
+ bool session_valid;
+ __u64 session_id;
+ union {
+ struct virtio_crypto_rsa_ctx rsa_ctx;
+ };
+};
+
+struct virtio_crypto_akcipher_request {
+ struct virtio_crypto_request base;
+ struct virtio_crypto_akcipher_ctx *akcipher_ctx;
+ struct akcipher_request *akcipher_req;
+ void *src_buf;
+ void *dst_buf;
+ uint32_t opcode;
+};
+
+struct virtio_crypto_akcipher_algo {
+ uint32_t algonum;
+ uint32_t service;
+ unsigned int active_devs;
+ struct akcipher_alg algo;
+};
+
+struct sock_diag_req {
+ __u8 sdiag_family;
+ __u8 sdiag_protocol;
+};
+
+enum sknetlink_groups {
+ SKNLGRP_NONE = 0,
+ SKNLGRP_INET_TCP_DESTROY = 1,
+ SKNLGRP_INET_UDP_DESTROY = 2,
+ SKNLGRP_INET6_TCP_DESTROY = 3,
+ SKNLGRP_INET6_UDP_DESTROY = 4,
+ __SKNLGRP_MAX = 5,
+};
+
+struct broadcast_sk {
+ struct sock *sk;
+ struct work_struct work;
+};
+
+enum nf_ct_tcp_action {
+ NFCT_TCP_IGNORE = 0,
+ NFCT_TCP_INVALID = 1,
+ NFCT_TCP_ACCEPT = 2,
+};
+
+enum tcp_bit_set {
+ TCP_SYN_SET = 0,
+ TCP_SYNACK_SET = 1,
+ TCP_FIN_SET = 2,
+ TCP_ACK_SET = 3,
+ TCP_RST_SET = 4,
+ TCP_NONE_SET = 5,
+};
+
+struct trace_event_raw_sched_kthread_stop {
+ struct trace_entry ent;
+ char comm[16];
+ pid_t pid;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_kthread_stop_ret {
+ struct trace_entry ent;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_kthread_work_queue_work {
+ struct trace_entry ent;
+ void *work;
+ void *function;
+ void *worker;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_kthread_work_execute_start {
+ struct trace_entry ent;
+ void *work;
+ void *function;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_kthread_work_execute_end {
+ struct trace_entry ent;
+ void *work;
+ void *function;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_wakeup_template {
+ struct trace_entry ent;
+ char comm[16];
+ pid_t pid;
+ int prio;
+ int target_cpu;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_switch {
+ struct trace_entry ent;
+ char prev_comm[16];
+ pid_t prev_pid;
+ int prev_prio;
+ long int prev_state;
+ char next_comm[16];
+ pid_t next_pid;
+ int next_prio;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_migrate_task {
+ struct trace_entry ent;
+ char comm[16];
+ pid_t pid;
+ int prio;
+ int orig_cpu;
+ int dest_cpu;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_process_template {
+ struct trace_entry ent;
+ char comm[16];
+ pid_t pid;
+ int prio;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_process_wait {
+ struct trace_entry ent;
+ char comm[16];
+ pid_t pid;
+ int prio;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_process_fork {
+ struct trace_entry ent;
+ char parent_comm[16];
+ pid_t parent_pid;
+ char child_comm[16];
+ pid_t child_pid;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_process_exec {
+ struct trace_entry ent;
+ u32 __data_loc_filename;
+ pid_t pid;
+ pid_t old_pid;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_stat_template {
+ struct trace_entry ent;
+ char comm[16];
+ pid_t pid;
+ u64 delay;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_stat_runtime {
+ struct trace_entry ent;
+ char comm[16];
+ pid_t pid;
+ u64 runtime;
+ u64 vruntime;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_pi_setprio {
+ struct trace_entry ent;
+ char comm[16];
+ pid_t pid;
+ int oldprio;
+ int newprio;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_process_hang {
+ struct trace_entry ent;
+ char comm[16];
+ pid_t pid;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_move_numa {
+ struct trace_entry ent;
+ pid_t pid;
+ pid_t tgid;
+ pid_t ngid;
+ int src_cpu;
+ int src_nid;
+ int dst_cpu;
+ int dst_nid;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_numa_pair_template {
+ struct trace_entry ent;
+ pid_t src_pid;
+ pid_t src_tgid;
+ pid_t src_ngid;
+ int src_cpu;
+ int src_nid;
+ pid_t dst_pid;
+ pid_t dst_tgid;
+ pid_t dst_ngid;
+ int dst_cpu;
+ int dst_nid;
+ char __data[0];
+};
+
+struct trace_event_raw_sched_wake_idle_without_ipi {
+ struct trace_entry ent;
+ int cpu;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_sched_kthread_stop {};
+
+struct trace_event_data_offsets_sched_kthread_stop_ret {};
+
+struct trace_event_data_offsets_sched_kthread_work_queue_work {};
+
+struct trace_event_data_offsets_sched_kthread_work_execute_start {};
+
+struct trace_event_data_offsets_sched_kthread_work_execute_end {};
+
+struct trace_event_data_offsets_sched_wakeup_template {};
+
+struct trace_event_data_offsets_sched_switch {};
+
+struct trace_event_data_offsets_sched_migrate_task {};
+
+struct trace_event_data_offsets_sched_process_template {};
+
+struct trace_event_data_offsets_sched_process_wait {};
+
+struct trace_event_data_offsets_sched_process_fork {};
+
+struct trace_event_data_offsets_sched_process_exec {
+ u32 filename;
+};
+
+struct trace_event_data_offsets_sched_stat_template {};
+
+struct trace_event_data_offsets_sched_stat_runtime {};
+
+struct trace_event_data_offsets_sched_pi_setprio {};
+
+struct trace_event_data_offsets_sched_process_hang {};
+
+struct trace_event_data_offsets_sched_move_numa {};
+
+struct trace_event_data_offsets_sched_numa_pair_template {};
+
+struct trace_event_data_offsets_sched_wake_idle_without_ipi {};
+
+typedef void (*btf_trace_sched_kthread_stop)(void *, struct task_struct *);
+
+typedef void (*btf_trace_sched_kthread_stop_ret)(void *, int);
+
+typedef void (*btf_trace_sched_kthread_work_queue_work)(void *, struct kthread_worker *, struct kthread_work *);
+
+typedef void (*btf_trace_sched_kthread_work_execute_start)(void *, struct kthread_work *);
+
+typedef void (*btf_trace_sched_kthread_work_execute_end)(void *, struct kthread_work *, kthread_work_func_t);
+
+typedef void (*btf_trace_sched_waking)(void *, struct task_struct *);
+
+typedef void (*btf_trace_sched_wakeup)(void *, struct task_struct *);
+
+typedef void (*btf_trace_sched_wakeup_new)(void *, struct task_struct *);
+
+typedef void (*btf_trace_sched_switch)(void *, bool, struct task_struct *, struct task_struct *, unsigned int);
+
+typedef void (*btf_trace_sched_migrate_task)(void *, struct task_struct *, int);
+
+typedef void (*btf_trace_sched_process_free)(void *, struct task_struct *);
+
+typedef void (*btf_trace_sched_process_exit)(void *, struct task_struct *);
+
+typedef void (*btf_trace_sched_wait_task)(void *, struct task_struct *);
+
+typedef void (*btf_trace_sched_process_wait)(void *, struct pid *);
+
+typedef void (*btf_trace_sched_process_fork)(void *, struct task_struct *, struct task_struct *);
+
+typedef void (*btf_trace_sched_process_exec)(void *, struct task_struct *, pid_t, struct linux_binprm *);
+
+typedef void (*btf_trace_sched_stat_wait)(void *, struct task_struct *, u64);
+
+typedef void (*btf_trace_sched_stat_sleep)(void *, struct task_struct *, u64);
+
+typedef void (*btf_trace_sched_stat_iowait)(void *, struct task_struct *, u64);
+
+typedef void (*btf_trace_sched_stat_blocked)(void *, struct task_struct *, u64);
+
+typedef void (*btf_trace_sched_stat_runtime)(void *, struct task_struct *, u64, u64);
+
+typedef void (*btf_trace_sched_pi_setprio)(void *, struct task_struct *, struct task_struct *);
+
+typedef void (*btf_trace_sched_process_hang)(void *, struct task_struct *);
+
+typedef void (*btf_trace_sched_move_numa)(void *, struct task_struct *, int, int);
+
+typedef void (*btf_trace_sched_stick_numa)(void *, struct task_struct *, int, struct task_struct *, int);
+
+typedef void (*btf_trace_sched_swap_numa)(void *, struct task_struct *, int, struct task_struct *, int);
+
+typedef void (*btf_trace_sched_wake_idle_without_ipi)(void *, int);
+
+typedef void (*btf_trace_pelt_cfs_tp)(void *, struct cfs_rq *);
+
+typedef void (*btf_trace_pelt_rt_tp)(void *, struct rq *);
+
+typedef void (*btf_trace_pelt_dl_tp)(void *, struct rq *);
+
+typedef void (*btf_trace_pelt_thermal_tp)(void *, struct rq *);
+
+typedef void (*btf_trace_pelt_irq_tp)(void *, struct rq *);
+
+typedef void (*btf_trace_pelt_se_tp)(void *, struct sched_entity *);
+
+typedef void (*btf_trace_sched_cpu_capacity_tp)(void *, struct rq *);
+
+typedef void (*btf_trace_sched_overutilized_tp)(void *, struct root_domain *, bool);
+
+typedef void (*btf_trace_sched_util_est_cfs_tp)(void *, struct cfs_rq *);
+
+typedef void (*btf_trace_sched_util_est_se_tp)(void *, struct sched_entity *);
+
+typedef void (*btf_trace_sched_update_nr_running_tp)(void *, struct rq *, int);
+
+struct set_affinity_pending;
+
+struct migration_arg {
+ struct task_struct *task;
+ int dest_cpu;
+ struct set_affinity_pending *pending;
+};
+
+struct set_affinity_pending {
+ refcount_t refs;
+ unsigned int stop_pending;
+ struct completion done;
+ struct cpu_stop_work stop_work;
+ struct migration_arg arg;
+};
+
+struct migration_swap_arg {
+ struct task_struct *src_task;
+ struct task_struct *dst_task;
+ int src_cpu;
+ int dst_cpu;
+};
+
+enum {
+ preempt_dynamic_undefined = -1,
+ preempt_dynamic_none = 0,
+ preempt_dynamic_voluntary = 1,
+ preempt_dynamic_full = 2,
+};
+
+struct cfs_schedulable_data {
+ struct task_group *tg;
+ u64 period;
+ u64 quota;
+};
+
+enum {
+ cpuset = 0,
+ possible = 1,
+ fail = 2,
+};
+
+enum tcp_ca_ack_event_flags {
+ CA_ACK_SLOWPATH = 1,
+ CA_ACK_WIN_UPDATE = 2,
+ CA_ACK_ECE = 4,
+};
+
+struct tcp_sacktag_state {
+ u64 first_sackt;
+ u64 last_sackt;
+ u32 reord;
+ u32 sack_delivered;
+ int flag;
+ unsigned int mss_now;
+ struct rate_sample *rate;
+};
+
+struct l3mdev_handler {
+ lookup_by_table_id_t dev_lookup;
+};
+
+enum {
+ HW_BREAKPOINT_LEN_1 = 1,
+ HW_BREAKPOINT_LEN_2 = 2,
+ HW_BREAKPOINT_LEN_3 = 3,
+ HW_BREAKPOINT_LEN_4 = 4,
+ HW_BREAKPOINT_LEN_5 = 5,
+ HW_BREAKPOINT_LEN_6 = 6,
+ HW_BREAKPOINT_LEN_7 = 7,
+ HW_BREAKPOINT_LEN_8 = 8,
+};
+
+struct ghcb_save_area {
+ u8 reserved_1[203];
+ u8 cpl;
+ u8 reserved_2[116];
+ u64 xss;
+ u8 reserved_3[24];
+ u64 dr7;
+ u8 reserved_4[16];
+ u64 rip;
+ u8 reserved_5[88];
+ u64 rsp;
+ u8 reserved_6[24];
+ u64 rax;
+ u8 reserved_7[264];
+ u64 rcx;
+ u64 rdx;
+ u64 rbx;
+ u8 reserved_8[8];
+ u64 rbp;
+ u64 rsi;
+ u64 rdi;
+ u64 r8;
+ u64 r9;
+ u64 r10;
+ u64 r11;
+ u64 r12;
+ u64 r13;
+ u64 r14;
+ u64 r15;
+ u8 reserved_9[16];
+ u64 sw_exit_code;
+ u64 sw_exit_info_1;
+ u64 sw_exit_info_2;
+ u64 sw_scratch;
+ u8 reserved_10[56];
+ u64 xcr0;
+ u8 valid_bitmap[16];
+ u64 x87_state_gpa;
+};
+
+struct ghcb {
+ struct ghcb_save_area save;
+ u8 reserved_save[1016];
+ u8 shared_buffer[2032];
+ u8 reserved_1[10];
+ u16 protocol_version;
+ u32 ghcb_usage;
+};
+
+struct machine_ops {
+ void (*restart)(char *);
+ void (*halt)();
+ void (*power_off)();
+ void (*shutdown)();
+ void (*crash_shutdown)(struct pt_regs *);
+ void (*emergency_restart)();
+};
+
+enum {
+ BPF_F_SYSCTL_BASE_NAME = 1,
+};
+
+struct bpf_sockopt_buf {
+ u8 data[32];
+};
+
+struct bpf_cgroup_link {
+ struct bpf_link link;
+ struct cgroup *cgroup;
+ enum bpf_attach_type type;
+};
+
+struct bpf_prog_list {
+ struct hlist_node node;
+ struct bpf_prog *prog;
+ struct bpf_cgroup_link *link;
+ struct bpf_cgroup_storage *storage[2];
+};
+
+struct cgroup_lsm_atype {
+ u32 attach_btf_id;
+ int refcnt;
+};
+
+typedef u64 (*btf_bpf_get_local_storage)(struct bpf_map *, u64);
+
+typedef u64 (*btf_bpf_get_retval)();
+
+typedef u64 (*btf_bpf_set_retval)(int);
+
+typedef u64 (*btf_bpf_sysctl_get_name)(struct bpf_sysctl_kern *, char *, size_t, u64);
+
+typedef u64 (*btf_bpf_sysctl_get_current_value)(struct bpf_sysctl_kern *, char *, size_t);
+
+typedef u64 (*btf_bpf_sysctl_get_new_value)(struct bpf_sysctl_kern *, char *, size_t);
+
+typedef u64 (*btf_bpf_sysctl_set_new_value)(struct bpf_sysctl_kern *, const char *, size_t);
+
+typedef u64 (*btf_bpf_get_netns_cookie_sockopt)(struct bpf_sockopt_kern *);
+
+struct crypto_report_rng {
+ char type[64];
+ unsigned int seedsize;
+};
+
+struct d_partition___2 {
+ __le32 p_res;
+ u8 p_fstype;
+ u8 p_res2[3];
+ __le32 p_offset;
+ __le32 p_size;
+};
+
+struct disklabel___2 {
+ u8 d_reserved[270];
+ struct d_partition___2 d_partitions[2];
+ u8 d_blank[208];
+ __le16 d_magic;
+} __attribute__((packed));
+
+struct acpi_table_bert {
+ struct acpi_table_header header;
+ u32 region_length;
+ u64 address;
+};
+
+struct acpi_table_attr {
+ struct bin_attribute attr;
+ char name[4];
+ int instance;
+ char filename[8];
+ struct list_head node;
+};
+
+struct acpi_data_attr {
+ struct bin_attribute attr;
+ u64 addr;
+};
+
+struct acpi_data_obj {
+ char *name;
+ int (*fn)(void *, struct acpi_data_attr *);
+};
+
+struct event_counter {
+ u32 count;
+ u32 flags;
+};
+
+struct acpi_gpe_block_status_context {
+ struct acpi_gpe_register_info *gpe_skip_register_info;
+ u8 gpe_skip_mask;
+ u8 retval;
+};
+
+struct pnp_info_buffer {
+ char *buffer;
+ char *curr;
+ long unsigned int size;
+ long unsigned int len;
+ int stop;
+ int error;
+};
+
+typedef struct pnp_info_buffer pnp_info_buffer_t;
+
+struct flow_dissector_key_hash {
+ u32 hash;
+};
+
+struct flow_dissector_key_num_of_vlans {
+ u8 num_of_vlans;
+};
+
+enum {
+ TCA_FLOWER_UNSPEC = 0,
+ TCA_FLOWER_CLASSID = 1,
+ TCA_FLOWER_INDEV = 2,
+ TCA_FLOWER_ACT = 3,
+ TCA_FLOWER_KEY_ETH_DST = 4,
+ TCA_FLOWER_KEY_ETH_DST_MASK = 5,
+ TCA_FLOWER_KEY_ETH_SRC = 6,
+ TCA_FLOWER_KEY_ETH_SRC_MASK = 7,
+ TCA_FLOWER_KEY_ETH_TYPE = 8,
+ TCA_FLOWER_KEY_IP_PROTO = 9,
+ TCA_FLOWER_KEY_IPV4_SRC = 10,
+ TCA_FLOWER_KEY_IPV4_SRC_MASK = 11,
+ TCA_FLOWER_KEY_IPV4_DST = 12,
+ TCA_FLOWER_KEY_IPV4_DST_MASK = 13,
+ TCA_FLOWER_KEY_IPV6_SRC = 14,
+ TCA_FLOWER_KEY_IPV6_SRC_MASK = 15,
+ TCA_FLOWER_KEY_IPV6_DST = 16,
+ TCA_FLOWER_KEY_IPV6_DST_MASK = 17,
+ TCA_FLOWER_KEY_TCP_SRC = 18,
+ TCA_FLOWER_KEY_TCP_DST = 19,
+ TCA_FLOWER_KEY_UDP_SRC = 20,
+ TCA_FLOWER_KEY_UDP_DST = 21,
+ TCA_FLOWER_FLAGS = 22,
+ TCA_FLOWER_KEY_VLAN_ID = 23,
+ TCA_FLOWER_KEY_VLAN_PRIO = 24,
+ TCA_FLOWER_KEY_VLAN_ETH_TYPE = 25,
+ TCA_FLOWER_KEY_ENC_KEY_ID = 26,
+ TCA_FLOWER_KEY_ENC_IPV4_SRC = 27,
+ TCA_FLOWER_KEY_ENC_IPV4_SRC_MASK = 28,
+ TCA_FLOWER_KEY_ENC_IPV4_DST = 29,
+ TCA_FLOWER_KEY_ENC_IPV4_DST_MASK = 30,
+ TCA_FLOWER_KEY_ENC_IPV6_SRC = 31,
+ TCA_FLOWER_KEY_ENC_IPV6_SRC_MASK = 32,
+ TCA_FLOWER_KEY_ENC_IPV6_DST = 33,
+ TCA_FLOWER_KEY_ENC_IPV6_DST_MASK = 34,
+ TCA_FLOWER_KEY_TCP_SRC_MASK = 35,
+ TCA_FLOWER_KEY_TCP_DST_MASK = 36,
+ TCA_FLOWER_KEY_UDP_SRC_MASK = 37,
+ TCA_FLOWER_KEY_UDP_DST_MASK = 38,
+ TCA_FLOWER_KEY_SCTP_SRC_MASK = 39,
+ TCA_FLOWER_KEY_SCTP_DST_MASK = 40,
+ TCA_FLOWER_KEY_SCTP_SRC = 41,
+ TCA_FLOWER_KEY_SCTP_DST = 42,
+ TCA_FLOWER_KEY_ENC_UDP_SRC_PORT = 43,
+ TCA_FLOWER_KEY_ENC_UDP_SRC_PORT_MASK = 44,
+ TCA_FLOWER_KEY_ENC_UDP_DST_PORT = 45,
+ TCA_FLOWER_KEY_ENC_UDP_DST_PORT_MASK = 46,
+ TCA_FLOWER_KEY_FLAGS = 47,
+ TCA_FLOWER_KEY_FLAGS_MASK = 48,
+ TCA_FLOWER_KEY_ICMPV4_CODE = 49,
+ TCA_FLOWER_KEY_ICMPV4_CODE_MASK = 50,
+ TCA_FLOWER_KEY_ICMPV4_TYPE = 51,
+ TCA_FLOWER_KEY_ICMPV4_TYPE_MASK = 52,
+ TCA_FLOWER_KEY_ICMPV6_CODE = 53,
+ TCA_FLOWER_KEY_ICMPV6_CODE_MASK = 54,
+ TCA_FLOWER_KEY_ICMPV6_TYPE = 55,
+ TCA_FLOWER_KEY_ICMPV6_TYPE_MASK = 56,
+ TCA_FLOWER_KEY_ARP_SIP = 57,
+ TCA_FLOWER_KEY_ARP_SIP_MASK = 58,
+ TCA_FLOWER_KEY_ARP_TIP = 59,
+ TCA_FLOWER_KEY_ARP_TIP_MASK = 60,
+ TCA_FLOWER_KEY_ARP_OP = 61,
+ TCA_FLOWER_KEY_ARP_OP_MASK = 62,
+ TCA_FLOWER_KEY_ARP_SHA = 63,
+ TCA_FLOWER_KEY_ARP_SHA_MASK = 64,
+ TCA_FLOWER_KEY_ARP_THA = 65,
+ TCA_FLOWER_KEY_ARP_THA_MASK = 66,
+ TCA_FLOWER_KEY_MPLS_TTL = 67,
+ TCA_FLOWER_KEY_MPLS_BOS = 68,
+ TCA_FLOWER_KEY_MPLS_TC = 69,
+ TCA_FLOWER_KEY_MPLS_LABEL = 70,
+ TCA_FLOWER_KEY_TCP_FLAGS = 71,
+ TCA_FLOWER_KEY_TCP_FLAGS_MASK = 72,
+ TCA_FLOWER_KEY_IP_TOS = 73,
+ TCA_FLOWER_KEY_IP_TOS_MASK = 74,
+ TCA_FLOWER_KEY_IP_TTL = 75,
+ TCA_FLOWER_KEY_IP_TTL_MASK = 76,
+ TCA_FLOWER_KEY_CVLAN_ID = 77,
+ TCA_FLOWER_KEY_CVLAN_PRIO = 78,
+ TCA_FLOWER_KEY_CVLAN_ETH_TYPE = 79,
+ TCA_FLOWER_KEY_ENC_IP_TOS = 80,
+ TCA_FLOWER_KEY_ENC_IP_TOS_MASK = 81,
+ TCA_FLOWER_KEY_ENC_IP_TTL = 82,
+ TCA_FLOWER_KEY_ENC_IP_TTL_MASK = 83,
+ TCA_FLOWER_KEY_ENC_OPTS = 84,
+ TCA_FLOWER_KEY_ENC_OPTS_MASK = 85,
+ TCA_FLOWER_IN_HW_COUNT = 86,
+ TCA_FLOWER_KEY_PORT_SRC_MIN = 87,
+ TCA_FLOWER_KEY_PORT_SRC_MAX = 88,
+ TCA_FLOWER_KEY_PORT_DST_MIN = 89,
+ TCA_FLOWER_KEY_PORT_DST_MAX = 90,
+ TCA_FLOWER_KEY_CT_STATE = 91,
+ TCA_FLOWER_KEY_CT_STATE_MASK = 92,
+ TCA_FLOWER_KEY_CT_ZONE = 93,
+ TCA_FLOWER_KEY_CT_ZONE_MASK = 94,
+ TCA_FLOWER_KEY_CT_MARK = 95,
+ TCA_FLOWER_KEY_CT_MARK_MASK = 96,
+ TCA_FLOWER_KEY_CT_LABELS = 97,
+ TCA_FLOWER_KEY_CT_LABELS_MASK = 98,
+ TCA_FLOWER_KEY_MPLS_OPTS = 99,
+ TCA_FLOWER_KEY_HASH = 100,
+ TCA_FLOWER_KEY_HASH_MASK = 101,
+ TCA_FLOWER_KEY_NUM_OF_VLANS = 102,
+ TCA_FLOWER_KEY_PPPOE_SID = 103,
+ TCA_FLOWER_KEY_PPP_PROTO = 104,
+ TCA_FLOWER_KEY_L2TPV3_SID = 105,
+ __TCA_FLOWER_MAX = 106,
+};
+
+enum {
+ TCA_FLOWER_KEY_CT_FLAGS_NEW = 1,
+ TCA_FLOWER_KEY_CT_FLAGS_ESTABLISHED = 2,
+ TCA_FLOWER_KEY_CT_FLAGS_RELATED = 4,
+ TCA_FLOWER_KEY_CT_FLAGS_TRACKED = 8,
+ TCA_FLOWER_KEY_CT_FLAGS_INVALID = 16,
+ TCA_FLOWER_KEY_CT_FLAGS_REPLY = 32,
+ __TCA_FLOWER_KEY_CT_FLAGS_MAX = 33,
+};
+
+enum {
+ TCA_FLOWER_KEY_ENC_OPTS_UNSPEC = 0,
+ TCA_FLOWER_KEY_ENC_OPTS_GENEVE = 1,
+ TCA_FLOWER_KEY_ENC_OPTS_VXLAN = 2,
+ TCA_FLOWER_KEY_ENC_OPTS_ERSPAN = 3,
+ TCA_FLOWER_KEY_ENC_OPTS_GTP = 4,
+ __TCA_FLOWER_KEY_ENC_OPTS_MAX = 5,
+};
+
+enum {
+ TCA_FLOWER_KEY_ENC_OPT_GENEVE_UNSPEC = 0,
+ TCA_FLOWER_KEY_ENC_OPT_GENEVE_CLASS = 1,
+ TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE = 2,
+ TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA = 3,
+ __TCA_FLOWER_KEY_ENC_OPT_GENEVE_MAX = 4,
+};
+
+enum {
+ TCA_FLOWER_KEY_ENC_OPT_VXLAN_UNSPEC = 0,
+ TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP = 1,
+ __TCA_FLOWER_KEY_ENC_OPT_VXLAN_MAX = 2,
+};
+
+enum {
+ TCA_FLOWER_KEY_ENC_OPT_ERSPAN_UNSPEC = 0,
+ TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER = 1,
+ TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX = 2,
+ TCA_FLOWER_KEY_ENC_OPT_ERSPAN_DIR = 3,
+ TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID = 4,
+ __TCA_FLOWER_KEY_ENC_OPT_ERSPAN_MAX = 5,
+};
+
+enum {
+ TCA_FLOWER_KEY_ENC_OPT_GTP_UNSPEC = 0,
+ TCA_FLOWER_KEY_ENC_OPT_GTP_PDU_TYPE = 1,
+ TCA_FLOWER_KEY_ENC_OPT_GTP_QFI = 2,
+ __TCA_FLOWER_KEY_ENC_OPT_GTP_MAX = 3,
+};
+
+enum {
+ TCA_FLOWER_KEY_MPLS_OPTS_UNSPEC = 0,
+ TCA_FLOWER_KEY_MPLS_OPTS_LSE = 1,
+ __TCA_FLOWER_KEY_MPLS_OPTS_MAX = 2,
+};
+
+enum {
+ TCA_FLOWER_KEY_MPLS_OPT_LSE_UNSPEC = 0,
+ TCA_FLOWER_KEY_MPLS_OPT_LSE_DEPTH = 1,
+ TCA_FLOWER_KEY_MPLS_OPT_LSE_TTL = 2,
+ TCA_FLOWER_KEY_MPLS_OPT_LSE_BOS = 3,
+ TCA_FLOWER_KEY_MPLS_OPT_LSE_TC = 4,
+ TCA_FLOWER_KEY_MPLS_OPT_LSE_LABEL = 5,
+ __TCA_FLOWER_KEY_MPLS_OPT_LSE_MAX = 6,
+};
+
+enum {
+ TCA_FLOWER_KEY_FLAGS_IS_FRAGMENT = 1,
+ TCA_FLOWER_KEY_FLAGS_FRAG_IS_FIRST = 2,
+};
+
+enum flow_cls_command {
+ FLOW_CLS_REPLACE = 0,
+ FLOW_CLS_DESTROY = 1,
+ FLOW_CLS_STATS = 2,
+ FLOW_CLS_TMPLT_CREATE = 3,
+ FLOW_CLS_TMPLT_DESTROY = 4,
+};
+
+struct flow_cls_offload {
+ struct flow_cls_common_offload common;
+ enum flow_cls_command command;
+ long unsigned int cookie;
+ struct flow_rule *rule;
+ struct flow_stats stats;
+ u32 classid;
+};
+
+struct gtp_pdu_session_info {
+ u8 pdu_type;
+ u8 qfi;
+};
+
+struct fl_flow_key {
+ struct flow_dissector_key_meta meta;
+ struct flow_dissector_key_control control;
+ struct flow_dissector_key_control enc_control;
+ struct flow_dissector_key_basic basic;
+ struct flow_dissector_key_eth_addrs eth;
+ struct flow_dissector_key_vlan vlan;
+ struct flow_dissector_key_vlan cvlan;
+ union {
+ struct flow_dissector_key_ipv4_addrs ipv4;
+ struct flow_dissector_key_ipv6_addrs ipv6;
+ };
+ struct flow_dissector_key_ports tp;
+ struct flow_dissector_key_icmp icmp;
+ struct flow_dissector_key_arp arp;
+ struct flow_dissector_key_keyid enc_key_id;
+ union {
+ struct flow_dissector_key_ipv4_addrs enc_ipv4;
+ struct flow_dissector_key_ipv6_addrs enc_ipv6;
+ };
+ struct flow_dissector_key_ports enc_tp;
+ struct flow_dissector_key_mpls mpls;
+ struct flow_dissector_key_tcp tcp;
+ struct flow_dissector_key_ip ip;
+ struct flow_dissector_key_ip enc_ip;
+ struct flow_dissector_key_enc_opts enc_opts;
+ struct flow_dissector_key_ports_range tp_range;
+ struct flow_dissector_key_ct ct;
+ struct flow_dissector_key_hash hash;
+ struct flow_dissector_key_num_of_vlans num_of_vlans;
+ struct flow_dissector_key_pppoe pppoe;
+ struct flow_dissector_key_l2tpv3 l2tpv3;
+};
+
+struct fl_flow_mask_range {
+ short unsigned int start;
+ short unsigned int end;
+};
+
+struct fl_flow_mask {
+ struct fl_flow_key key;
+ struct fl_flow_mask_range range;
+ u32 flags;
+ struct rhash_head ht_node;
+ struct rhashtable ht;
+ struct rhashtable_params filter_ht_params;
+ struct flow_dissector dissector;
+ struct list_head filters;
+ struct rcu_work rwork;
+ struct list_head list;
+ refcount_t refcnt;
+};
+
+struct fl_flow_tmplt {
+ struct fl_flow_key dummy_key;
+ struct fl_flow_key mask;
+ struct flow_dissector dissector;
+ struct tcf_chain *chain;
+};
+
+struct cls_fl_head {
+ struct rhashtable ht;
+ spinlock_t masks_lock;
+ struct list_head masks;
+ struct list_head hw_filters;
+ struct rcu_work rwork;
+ struct idr handle_idr;
+};
+
+struct cls_fl_filter {
+ struct fl_flow_mask *mask;
+ struct rhash_head ht_node;
+ struct fl_flow_key mkey;
+ struct tcf_exts exts;
+ struct tcf_result res;
+ struct fl_flow_key key;
+ struct list_head list;
+ struct list_head hw_list;
+ u32 handle;
+ u32 flags;
+ u32 in_hw_count;
+ struct rcu_work rwork;
+ struct net_device *hw_dev;
+ refcount_t refcnt;
+ bool deleted;
+};
+
+struct mptcp_pm_add_entry;
+
+struct cyc2ns {
+ struct cyc2ns_data data[2];
+ seqcount_latch_t seq;
+};
+
+struct cpa_data {
+ long unsigned int *vaddr;
+ pgd_t *pgd;
+ pgprot_t mask_set;
+ pgprot_t mask_clr;
+ long unsigned int numpages;
+ long unsigned int curpage;
+ long unsigned int pfn;
+ unsigned int flags;
+ unsigned int force_split: 1;
+ unsigned int force_static_prot: 1;
+ unsigned int force_flush_all: 1;
+ struct page **pages;
+};
+
+enum cpa_warn {
+ CPA_CONFLICT = 0,
+ CPA_PROTECT = 1,
+ CPA_DETECT = 2,
+};
+
+enum pkey_id_type {
+ PKEY_ID_PGP = 0,
+ PKEY_ID_X509 = 1,
+ PKEY_ID_PKCS7 = 2,
+};
+
+typedef __u16 comp_t;
+
+typedef __u32 comp2_t;
+
+struct acct {
+ char ac_flag;
+ char ac_version;
+ __u16 ac_uid16;
+ __u16 ac_gid16;
+ __u16 ac_tty;
+ __u32 ac_btime;
+ comp_t ac_utime;
+ comp_t ac_stime;
+ comp_t ac_etime;
+ comp_t ac_mem;
+ comp_t ac_io;
+ comp_t ac_rw;
+ comp_t ac_minflt;
+ comp_t ac_majflt;
+ comp_t ac_swaps;
+ __u16 ac_ahz;
+ __u32 ac_exitcode;
+ char ac_comm[17];
+ __u8 ac_etime_hi;
+ __u16 ac_etime_lo;
+ __u32 ac_uid;
+ __u32 ac_gid;
+};
+
+typedef struct acct acct_t;
+
+struct bsd_acct_struct {
+ struct fs_pin pin;
+ atomic_long_t count;
+ struct callback_head rcu;
+ struct mutex lock;
+ int active;
+ long unsigned int needcheck;
+ struct file *file;
+ struct pid_namespace *ns;
+ struct work_struct work;
+ struct completion done;
+};
+
+struct bpf_offload_dev {
+ const struct bpf_prog_offload_ops *ops;
+ struct list_head netdevs;
+ void *priv;
+};
+
+struct bpf_offload_netdev {
+ struct rhash_head l;
+ struct net_device *netdev;
+ struct bpf_offload_dev *offdev;
+ struct list_head progs;
+ struct list_head maps;
+ struct list_head offdev_netdevs;
+};
+
+struct ns_get_path_bpf_prog_args {
+ struct bpf_prog *prog;
+ struct bpf_prog_info *info;
+};
+
+struct ns_get_path_bpf_map_args {
+ struct bpf_offloaded_map *offmap;
+ struct bpf_map_info *info;
+};
+
+struct core_name {
+ char *corename;
+ int used;
+ int size;
+};
+
+struct ext4_free_data {
+ struct list_head efd_list;
+ struct rb_node efd_node;
+ ext4_group_t efd_group;
+ ext4_grpblk_t efd_start_cluster;
+ ext4_grpblk_t efd_count;
+ tid_t efd_tid;
+};
+
+enum {
+ MB_INODE_PA = 0,
+ MB_GROUP_PA = 1,
+};
+
+struct ext4_buddy {
+ struct page *bd_buddy_page;
+ void *bd_buddy;
+ struct page *bd_bitmap_page;
+ void *bd_bitmap;
+ struct ext4_group_info *bd_info;
+ struct super_block *bd_sb;
+ __u16 bd_blkbits;
+ ext4_group_t bd_group;
+};
+
+typedef int (*ext4_mballoc_query_range_fn)(struct super_block *, ext4_group_t, ext4_grpblk_t, ext4_grpblk_t, void *);
+
+struct sg {
+ struct ext4_group_info info;
+ ext4_grpblk_t counters[18];
+};
+
+struct broken_edid {
+ u8 manufacturer[4];
+ u32 model;
+ u32 fix;
+};
+
+struct __fb_timings {
+ u32 dclk;
+ u32 hfreq;
+ u32 vfreq;
+ u32 hactive;
+ u32 vactive;
+ u32 hblank;
+ u32 vblank;
+ u32 htotal;
+ u32 vtotal;
+};
+
+enum {
+ ATA_MAX_DEVICES = 2,
+ ATA_MAX_PRD = 256,
+ ATA_SECT_SIZE = 512,
+ ATA_MAX_SECTORS_128 = 128,
+ ATA_MAX_SECTORS = 256,
+ ATA_MAX_SECTORS_1024 = 1024,
+ ATA_MAX_SECTORS_LBA48 = 65535,
+ ATA_MAX_SECTORS_TAPE = 65535,
+ ATA_MAX_TRIM_RNUM = 64,
+ ATA_ID_WORDS = 256,
+ ATA_ID_CONFIG = 0,
+ ATA_ID_CYLS = 1,
+ ATA_ID_HEADS = 3,
+ ATA_ID_SECTORS = 6,
+ ATA_ID_SERNO = 10,
+ ATA_ID_BUF_SIZE = 21,
+ ATA_ID_FW_REV = 23,
+ ATA_ID_PROD = 27,
+ ATA_ID_MAX_MULTSECT = 47,
+ ATA_ID_DWORD_IO = 48,
+ ATA_ID_TRUSTED = 48,
+ ATA_ID_CAPABILITY = 49,
+ ATA_ID_OLD_PIO_MODES = 51,
+ ATA_ID_OLD_DMA_MODES = 52,
+ ATA_ID_FIELD_VALID = 53,
+ ATA_ID_CUR_CYLS = 54,
+ ATA_ID_CUR_HEADS = 55,
+ ATA_ID_CUR_SECTORS = 56,
+ ATA_ID_MULTSECT = 59,
+ ATA_ID_LBA_CAPACITY = 60,
+ ATA_ID_SWDMA_MODES = 62,
+ ATA_ID_MWDMA_MODES = 63,
+ ATA_ID_PIO_MODES = 64,
+ ATA_ID_EIDE_DMA_MIN = 65,
+ ATA_ID_EIDE_DMA_TIME = 66,
+ ATA_ID_EIDE_PIO = 67,
+ ATA_ID_EIDE_PIO_IORDY = 68,
+ ATA_ID_ADDITIONAL_SUPP = 69,
+ ATA_ID_QUEUE_DEPTH = 75,
+ ATA_ID_SATA_CAPABILITY = 76,
+ ATA_ID_SATA_CAPABILITY_2 = 77,
+ ATA_ID_FEATURE_SUPP = 78,
+ ATA_ID_MAJOR_VER = 80,
+ ATA_ID_COMMAND_SET_1 = 82,
+ ATA_ID_COMMAND_SET_2 = 83,
+ ATA_ID_CFSSE = 84,
+ ATA_ID_CFS_ENABLE_1 = 85,
+ ATA_ID_CFS_ENABLE_2 = 86,
+ ATA_ID_CSF_DEFAULT = 87,
+ ATA_ID_UDMA_MODES = 88,
+ ATA_ID_HW_CONFIG = 93,
+ ATA_ID_SPG = 98,
+ ATA_ID_LBA_CAPACITY_2 = 100,
+ ATA_ID_SECTOR_SIZE = 106,
+ ATA_ID_WWN = 108,
+ ATA_ID_LOGICAL_SECTOR_SIZE = 117,
+ ATA_ID_COMMAND_SET_3 = 119,
+ ATA_ID_COMMAND_SET_4 = 120,
+ ATA_ID_LAST_LUN = 126,
+ ATA_ID_DLF = 128,
+ ATA_ID_CSFO = 129,
+ ATA_ID_CFA_POWER = 160,
+ ATA_ID_CFA_KEY_MGMT = 162,
+ ATA_ID_CFA_MODES = 163,
+ ATA_ID_DATA_SET_MGMT = 169,
+ ATA_ID_SCT_CMD_XPORT = 206,
+ ATA_ID_ROT_SPEED = 217,
+ ATA_ID_PIO4 = 2,
+ ATA_ID_SERNO_LEN = 20,
+ ATA_ID_FW_REV_LEN = 8,
+ ATA_ID_PROD_LEN = 40,
+ ATA_ID_WWN_LEN = 8,
+ ATA_PCI_CTL_OFS = 2,
+ ATA_PIO0 = 1,
+ ATA_PIO1 = 3,
+ ATA_PIO2 = 7,
+ ATA_PIO3 = 15,
+ ATA_PIO4 = 31,
+ ATA_PIO5 = 63,
+ ATA_PIO6 = 127,
+ ATA_PIO4_ONLY = 16,
+ ATA_SWDMA0 = 1,
+ ATA_SWDMA1 = 3,
+ ATA_SWDMA2 = 7,
+ ATA_SWDMA2_ONLY = 4,
+ ATA_MWDMA0 = 1,
+ ATA_MWDMA1 = 3,
+ ATA_MWDMA2 = 7,
+ ATA_MWDMA3 = 15,
+ ATA_MWDMA4 = 31,
+ ATA_MWDMA12_ONLY = 6,
+ ATA_MWDMA2_ONLY = 4,
+ ATA_UDMA0 = 1,
+ ATA_UDMA1 = 3,
+ ATA_UDMA2 = 7,
+ ATA_UDMA3 = 15,
+ ATA_UDMA4 = 31,
+ ATA_UDMA5 = 63,
+ ATA_UDMA6 = 127,
+ ATA_UDMA7 = 255,
+ ATA_UDMA24_ONLY = 20,
+ ATA_UDMA_MASK_40C = 7,
+ ATA_PRD_SZ = 8,
+ ATA_PRD_TBL_SZ = 2048,
+ ATA_PRD_EOT = -2147483648,
+ ATA_DMA_TABLE_OFS = 4,
+ ATA_DMA_STATUS = 2,
+ ATA_DMA_CMD = 0,
+ ATA_DMA_WR = 8,
+ ATA_DMA_START = 1,
+ ATA_DMA_INTR = 4,
+ ATA_DMA_ERR = 2,
+ ATA_DMA_ACTIVE = 1,
+ ATA_HOB = 128,
+ ATA_NIEN = 2,
+ ATA_LBA = 64,
+ ATA_DEV1 = 16,
+ ATA_DEVICE_OBS = 160,
+ ATA_DEVCTL_OBS = 8,
+ ATA_BUSY = 128,
+ ATA_DRDY = 64,
+ ATA_DF = 32,
+ ATA_DSC = 16,
+ ATA_DRQ = 8,
+ ATA_CORR = 4,
+ ATA_SENSE = 2,
+ ATA_ERR = 1,
+ ATA_SRST = 4,
+ ATA_ICRC = 128,
+ ATA_BBK = 128,
+ ATA_UNC = 64,
+ ATA_MC = 32,
+ ATA_IDNF = 16,
+ ATA_MCR = 8,
+ ATA_ABORTED = 4,
+ ATA_TRK0NF = 2,
+ ATA_AMNF = 1,
+ ATAPI_LFS = 240,
+ ATAPI_EOM = 2,
+ ATAPI_ILI = 1,
+ ATAPI_IO = 2,
+ ATAPI_COD = 1,
+ ATA_REG_DATA = 0,
+ ATA_REG_ERR = 1,
+ ATA_REG_NSECT = 2,
+ ATA_REG_LBAL = 3,
+ ATA_REG_LBAM = 4,
+ ATA_REG_LBAH = 5,
+ ATA_REG_DEVICE = 6,
+ ATA_REG_STATUS = 7,
+ ATA_REG_FEATURE = 1,
+ ATA_REG_CMD = 7,
+ ATA_REG_BYTEL = 4,
+ ATA_REG_BYTEH = 5,
+ ATA_REG_DEVSEL = 6,
+ ATA_REG_IRQ = 2,
+ ATA_CMD_DEV_RESET = 8,
+ ATA_CMD_CHK_POWER = 229,
+ ATA_CMD_STANDBY = 226,
+ ATA_CMD_IDLE = 227,
+ ATA_CMD_EDD = 144,
+ ATA_CMD_DOWNLOAD_MICRO = 146,
+ ATA_CMD_DOWNLOAD_MICRO_DMA = 147,
+ ATA_CMD_NOP = 0,
+ ATA_CMD_FLUSH = 231,
+ ATA_CMD_FLUSH_EXT = 234,
+ ATA_CMD_ID_ATA = 236,
+ ATA_CMD_ID_ATAPI = 161,
+ ATA_CMD_SERVICE = 162,
+ ATA_CMD_READ = 200,
+ ATA_CMD_READ_EXT = 37,
+ ATA_CMD_READ_QUEUED = 38,
+ ATA_CMD_READ_STREAM_EXT = 43,
+ ATA_CMD_READ_STREAM_DMA_EXT = 42,
+ ATA_CMD_WRITE = 202,
+ ATA_CMD_WRITE_EXT = 53,
+ ATA_CMD_WRITE_QUEUED = 54,
+ ATA_CMD_WRITE_STREAM_EXT = 59,
+ ATA_CMD_WRITE_STREAM_DMA_EXT = 58,
+ ATA_CMD_WRITE_FUA_EXT = 61,
+ ATA_CMD_WRITE_QUEUED_FUA_EXT = 62,
+ ATA_CMD_FPDMA_READ = 96,
+ ATA_CMD_FPDMA_WRITE = 97,
+ ATA_CMD_NCQ_NON_DATA = 99,
+ ATA_CMD_FPDMA_SEND = 100,
+ ATA_CMD_FPDMA_RECV = 101,
+ ATA_CMD_PIO_READ = 32,
+ ATA_CMD_PIO_READ_EXT = 36,
+ ATA_CMD_PIO_WRITE = 48,
+ ATA_CMD_PIO_WRITE_EXT = 52,
+ ATA_CMD_READ_MULTI = 196,
+ ATA_CMD_READ_MULTI_EXT = 41,
+ ATA_CMD_WRITE_MULTI = 197,
+ ATA_CMD_WRITE_MULTI_EXT = 57,
+ ATA_CMD_WRITE_MULTI_FUA_EXT = 206,
+ ATA_CMD_SET_FEATURES = 239,
+ ATA_CMD_SET_MULTI = 198,
+ ATA_CMD_PACKET = 160,
+ ATA_CMD_VERIFY = 64,
+ ATA_CMD_VERIFY_EXT = 66,
+ ATA_CMD_WRITE_UNCORR_EXT = 69,
+ ATA_CMD_STANDBYNOW1 = 224,
+ ATA_CMD_IDLEIMMEDIATE = 225,
+ ATA_CMD_SLEEP = 230,
+ ATA_CMD_INIT_DEV_PARAMS = 145,
+ ATA_CMD_READ_NATIVE_MAX = 248,
+ ATA_CMD_READ_NATIVE_MAX_EXT = 39,
+ ATA_CMD_SET_MAX = 249,
+ ATA_CMD_SET_MAX_EXT = 55,
+ ATA_CMD_READ_LOG_EXT = 47,
+ ATA_CMD_WRITE_LOG_EXT = 63,
+ ATA_CMD_READ_LOG_DMA_EXT = 71,
+ ATA_CMD_WRITE_LOG_DMA_EXT = 87,
+ ATA_CMD_TRUSTED_NONDATA = 91,
+ ATA_CMD_TRUSTED_RCV = 92,
+ ATA_CMD_TRUSTED_RCV_DMA = 93,
+ ATA_CMD_TRUSTED_SND = 94,
+ ATA_CMD_TRUSTED_SND_DMA = 95,
+ ATA_CMD_PMP_READ = 228,
+ ATA_CMD_PMP_READ_DMA = 233,
+ ATA_CMD_PMP_WRITE = 232,
+ ATA_CMD_PMP_WRITE_DMA = 235,
+ ATA_CMD_CONF_OVERLAY = 177,
+ ATA_CMD_SEC_SET_PASS = 241,
+ ATA_CMD_SEC_UNLOCK = 242,
+ ATA_CMD_SEC_ERASE_PREP = 243,
+ ATA_CMD_SEC_ERASE_UNIT = 244,
+ ATA_CMD_SEC_FREEZE_LOCK = 245,
+ ATA_CMD_SEC_DISABLE_PASS = 246,
+ ATA_CMD_CONFIG_STREAM = 81,
+ ATA_CMD_SMART = 176,
+ ATA_CMD_MEDIA_LOCK = 222,
+ ATA_CMD_MEDIA_UNLOCK = 223,
+ ATA_CMD_DSM = 6,
+ ATA_CMD_CHK_MED_CRD_TYP = 209,
+ ATA_CMD_CFA_REQ_EXT_ERR = 3,
+ ATA_CMD_CFA_WRITE_NE = 56,
+ ATA_CMD_CFA_TRANS_SECT = 135,
+ ATA_CMD_CFA_ERASE = 192,
+ ATA_CMD_CFA_WRITE_MULT_NE = 205,
+ ATA_CMD_REQ_SENSE_DATA = 11,
+ ATA_CMD_SANITIZE_DEVICE = 180,
+ ATA_CMD_ZAC_MGMT_IN = 74,
+ ATA_CMD_ZAC_MGMT_OUT = 159,
+ ATA_CMD_RESTORE = 16,
+ ATA_SUBCMD_FPDMA_RECV_RD_LOG_DMA_EXT = 1,
+ ATA_SUBCMD_FPDMA_RECV_ZAC_MGMT_IN = 2,
+ ATA_SUBCMD_FPDMA_SEND_DSM = 0,
+ ATA_SUBCMD_FPDMA_SEND_WR_LOG_DMA_EXT = 2,
+ ATA_SUBCMD_NCQ_NON_DATA_ABORT_QUEUE = 0,
+ ATA_SUBCMD_NCQ_NON_DATA_SET_FEATURES = 5,
+ ATA_SUBCMD_NCQ_NON_DATA_ZERO_EXT = 6,
+ ATA_SUBCMD_NCQ_NON_DATA_ZAC_MGMT_OUT = 7,
+ ATA_SUBCMD_ZAC_MGMT_IN_REPORT_ZONES = 0,
+ ATA_SUBCMD_ZAC_MGMT_OUT_CLOSE_ZONE = 1,
+ ATA_SUBCMD_ZAC_MGMT_OUT_FINISH_ZONE = 2,
+ ATA_SUBCMD_ZAC_MGMT_OUT_OPEN_ZONE = 3,
+ ATA_SUBCMD_ZAC_MGMT_OUT_RESET_WRITE_POINTER = 4,
+ ATA_LOG_DIRECTORY = 0,
+ ATA_LOG_SATA_NCQ = 16,
+ ATA_LOG_NCQ_NON_DATA = 18,
+ ATA_LOG_NCQ_SEND_RECV = 19,
+ ATA_LOG_IDENTIFY_DEVICE = 48,
+ ATA_LOG_CONCURRENT_POSITIONING_RANGES = 71,
+ ATA_LOG_SECURITY = 6,
+ ATA_LOG_SATA_SETTINGS = 8,
+ ATA_LOG_ZONED_INFORMATION = 9,
+ ATA_LOG_DEVSLP_OFFSET = 48,
+ ATA_LOG_DEVSLP_SIZE = 8,
+ ATA_LOG_DEVSLP_MDAT = 0,
+ ATA_LOG_DEVSLP_MDAT_MASK = 31,
+ ATA_LOG_DEVSLP_DETO = 1,
+ ATA_LOG_DEVSLP_VALID = 7,
+ ATA_LOG_DEVSLP_VALID_MASK = 128,
+ ATA_LOG_NCQ_PRIO_OFFSET = 9,
+ ATA_LOG_NCQ_SEND_RECV_SUBCMDS_OFFSET = 0,
+ ATA_LOG_NCQ_SEND_RECV_SUBCMDS_DSM = 1,
+ ATA_LOG_NCQ_SEND_RECV_DSM_OFFSET = 4,
+ ATA_LOG_NCQ_SEND_RECV_DSM_TRIM = 1,
+ ATA_LOG_NCQ_SEND_RECV_RD_LOG_OFFSET = 8,
+ ATA_LOG_NCQ_SEND_RECV_RD_LOG_SUPPORTED = 1,
+ ATA_LOG_NCQ_SEND_RECV_WR_LOG_OFFSET = 12,
+ ATA_LOG_NCQ_SEND_RECV_WR_LOG_SUPPORTED = 1,
+ ATA_LOG_NCQ_SEND_RECV_ZAC_MGMT_OFFSET = 16,
+ ATA_LOG_NCQ_SEND_RECV_ZAC_MGMT_OUT_SUPPORTED = 1,
+ ATA_LOG_NCQ_SEND_RECV_ZAC_MGMT_IN_SUPPORTED = 2,
+ ATA_LOG_NCQ_SEND_RECV_SIZE = 20,
+ ATA_LOG_NCQ_NON_DATA_SUBCMDS_OFFSET = 0,
+ ATA_LOG_NCQ_NON_DATA_ABORT_OFFSET = 0,
+ ATA_LOG_NCQ_NON_DATA_ABORT_NCQ = 1,
+ ATA_LOG_NCQ_NON_DATA_ABORT_ALL = 2,
+ ATA_LOG_NCQ_NON_DATA_ABORT_STREAMING = 4,
+ ATA_LOG_NCQ_NON_DATA_ABORT_NON_STREAMING = 8,
+ ATA_LOG_NCQ_NON_DATA_ABORT_SELECTED = 16,
+ ATA_LOG_NCQ_NON_DATA_ZAC_MGMT_OFFSET = 28,
+ ATA_LOG_NCQ_NON_DATA_ZAC_MGMT_OUT = 1,
+ ATA_LOG_NCQ_NON_DATA_SIZE = 64,
+ ATA_CMD_READ_LONG = 34,
+ ATA_CMD_READ_LONG_ONCE = 35,
+ ATA_CMD_WRITE_LONG = 50,
+ ATA_CMD_WRITE_LONG_ONCE = 51,
+ SETFEATURES_XFER = 3,
+ XFER_UDMA_7 = 71,
+ XFER_UDMA_6 = 70,
+ XFER_UDMA_5 = 69,
+ XFER_UDMA_4 = 68,
+ XFER_UDMA_3 = 67,
+ XFER_UDMA_2 = 66,
+ XFER_UDMA_1 = 65,
+ XFER_UDMA_0 = 64,
+ XFER_MW_DMA_4 = 36,
+ XFER_MW_DMA_3 = 35,
+ XFER_MW_DMA_2 = 34,
+ XFER_MW_DMA_1 = 33,
+ XFER_MW_DMA_0 = 32,
+ XFER_SW_DMA_2 = 18,
+ XFER_SW_DMA_1 = 17,
+ XFER_SW_DMA_0 = 16,
+ XFER_PIO_6 = 14,
+ XFER_PIO_5 = 13,
+ XFER_PIO_4 = 12,
+ XFER_PIO_3 = 11,
+ XFER_PIO_2 = 10,
+ XFER_PIO_1 = 9,
+ XFER_PIO_0 = 8,
+ XFER_PIO_SLOW = 0,
+ SETFEATURES_WC_ON = 2,
+ SETFEATURES_WC_OFF = 130,
+ SETFEATURES_RA_ON = 170,
+ SETFEATURES_RA_OFF = 85,
+ SETFEATURES_AAM_ON = 66,
+ SETFEATURES_AAM_OFF = 194,
+ SETFEATURES_SPINUP = 7,
+ SETFEATURES_SPINUP_TIMEOUT = 30000,
+ SETFEATURES_SATA_ENABLE = 16,
+ SETFEATURES_SATA_DISABLE = 144,
+ SATA_FPDMA_OFFSET = 1,
+ SATA_FPDMA_AA = 2,
+ SATA_DIPM = 3,
+ SATA_FPDMA_IN_ORDER = 4,
+ SATA_AN = 5,
+ SATA_SSP = 6,
+ SATA_DEVSLP = 9,
+ SETFEATURE_SENSE_DATA = 195,
+ ATA_SET_MAX_ADDR = 0,
+ ATA_SET_MAX_PASSWD = 1,
+ ATA_SET_MAX_LOCK = 2,
+ ATA_SET_MAX_UNLOCK = 3,
+ ATA_SET_MAX_FREEZE_LOCK = 4,
+ ATA_SET_MAX_PASSWD_DMA = 5,
+ ATA_SET_MAX_UNLOCK_DMA = 6,
+ ATA_DCO_RESTORE = 192,
+ ATA_DCO_FREEZE_LOCK = 193,
+ ATA_DCO_IDENTIFY = 194,
+ ATA_DCO_SET = 195,
+ ATA_SMART_ENABLE = 216,
+ ATA_SMART_READ_VALUES = 208,
+ ATA_SMART_READ_THRESHOLDS = 209,
+ ATA_DSM_TRIM = 1,
+ ATA_SMART_LBAM_PASS = 79,
+ ATA_SMART_LBAH_PASS = 194,
+ ATAPI_PKT_DMA = 1,
+ ATAPI_DMADIR = 4,
+ ATAPI_CDB_LEN = 16,
+ SATA_PMP_MAX_PORTS = 15,
+ SATA_PMP_CTRL_PORT = 15,
+ SATA_PMP_GSCR_DWORDS = 128,
+ SATA_PMP_GSCR_PROD_ID = 0,
+ SATA_PMP_GSCR_REV = 1,
+ SATA_PMP_GSCR_PORT_INFO = 2,
+ SATA_PMP_GSCR_ERROR = 32,
+ SATA_PMP_GSCR_ERROR_EN = 33,
+ SATA_PMP_GSCR_FEAT = 64,
+ SATA_PMP_GSCR_FEAT_EN = 96,
+ SATA_PMP_PSCR_STATUS = 0,
+ SATA_PMP_PSCR_ERROR = 1,
+ SATA_PMP_PSCR_CONTROL = 2,
+ SATA_PMP_FEAT_BIST = 1,
+ SATA_PMP_FEAT_PMREQ = 2,
+ SATA_PMP_FEAT_DYNSSC = 4,
+ SATA_PMP_FEAT_NOTIFY = 8,
+ ATA_CBL_NONE = 0,
+ ATA_CBL_PATA40 = 1,
+ ATA_CBL_PATA80 = 2,
+ ATA_CBL_PATA40_SHORT = 3,
+ ATA_CBL_PATA_UNK = 4,
+ ATA_CBL_PATA_IGN = 5,
+ ATA_CBL_SATA = 6,
+ SCR_STATUS = 0,
+ SCR_ERROR = 1,
+ SCR_CONTROL = 2,
+ SCR_ACTIVE = 3,
+ SCR_NOTIFICATION = 4,
+ SERR_DATA_RECOVERED = 1,
+ SERR_COMM_RECOVERED = 2,
+ SERR_DATA = 256,
+ SERR_PERSISTENT = 512,
+ SERR_PROTOCOL = 1024,
+ SERR_INTERNAL = 2048,
+ SERR_PHYRDY_CHG = 65536,
+ SERR_PHY_INT_ERR = 131072,
+ SERR_COMM_WAKE = 262144,
+ SERR_10B_8B_ERR = 524288,
+ SERR_DISPARITY = 1048576,
+ SERR_CRC = 2097152,
+ SERR_HANDSHAKE = 4194304,
+ SERR_LINK_SEQ_ERR = 8388608,
+ SERR_TRANS_ST_ERROR = 16777216,
+ SERR_UNRECOG_FIS = 33554432,
+ SERR_DEV_XCHG = 67108864,
+};
+
+enum {
+ LIBATA_MAX_PRD = 128,
+ LIBATA_DUMB_MAX_PRD = 64,
+ ATA_DEF_QUEUE = 1,
+ ATA_MAX_QUEUE = 32,
+ ATA_TAG_INTERNAL = 32,
+ ATA_SHORT_PAUSE = 16,
+ ATAPI_MAX_DRAIN = 16384,
+ ATA_ALL_DEVICES = 3,
+ ATA_SHT_EMULATED = 1,
+ ATA_SHT_THIS_ID = -1,
+ ATA_TFLAG_LBA48 = 1,
+ ATA_TFLAG_ISADDR = 2,
+ ATA_TFLAG_DEVICE = 4,
+ ATA_TFLAG_WRITE = 8,
+ ATA_TFLAG_LBA = 16,
+ ATA_TFLAG_FUA = 32,
+ ATA_TFLAG_POLLING = 64,
+ ATA_DFLAG_LBA = 1,
+ ATA_DFLAG_LBA48 = 2,
+ ATA_DFLAG_CDB_INTR = 4,
+ ATA_DFLAG_NCQ = 8,
+ ATA_DFLAG_FLUSH_EXT = 16,
+ ATA_DFLAG_ACPI_PENDING = 32,
+ ATA_DFLAG_ACPI_FAILED = 64,
+ ATA_DFLAG_AN = 128,
+ ATA_DFLAG_TRUSTED = 256,
+ ATA_DFLAG_DMADIR = 1024,
+ ATA_DFLAG_CFG_MASK = 4095,
+ ATA_DFLAG_PIO = 4096,
+ ATA_DFLAG_NCQ_OFF = 8192,
+ ATA_DFLAG_SLEEPING = 32768,
+ ATA_DFLAG_DUBIOUS_XFER = 65536,
+ ATA_DFLAG_NO_UNLOAD = 131072,
+ ATA_DFLAG_UNLOCK_HPA = 262144,
+ ATA_DFLAG_NCQ_SEND_RECV = 524288,
+ ATA_DFLAG_NCQ_PRIO = 1048576,
+ ATA_DFLAG_NCQ_PRIO_ENABLED = 2097152,
+ ATA_DFLAG_INIT_MASK = 16777215,
+ ATA_DFLAG_DETACH = 16777216,
+ ATA_DFLAG_DETACHED = 33554432,
+ ATA_DFLAG_DA = 67108864,
+ ATA_DFLAG_DEVSLP = 134217728,
+ ATA_DFLAG_ACPI_DISABLED = 268435456,
+ ATA_DFLAG_D_SENSE = 536870912,
+ ATA_DFLAG_ZAC = 1073741824,
+ ATA_DFLAG_FEATURES_MASK = 202899712,
+ ATA_DEV_UNKNOWN = 0,
+ ATA_DEV_ATA = 1,
+ ATA_DEV_ATA_UNSUP = 2,
+ ATA_DEV_ATAPI = 3,
+ ATA_DEV_ATAPI_UNSUP = 4,
+ ATA_DEV_PMP = 5,
+ ATA_DEV_PMP_UNSUP = 6,
+ ATA_DEV_SEMB = 7,
+ ATA_DEV_SEMB_UNSUP = 8,
+ ATA_DEV_ZAC = 9,
+ ATA_DEV_ZAC_UNSUP = 10,
+ ATA_DEV_NONE = 11,
+ ATA_LFLAG_NO_HRST = 2,
+ ATA_LFLAG_NO_SRST = 4,
+ ATA_LFLAG_ASSUME_ATA = 8,
+ ATA_LFLAG_ASSUME_SEMB = 16,
+ ATA_LFLAG_ASSUME_CLASS = 24,
+ ATA_LFLAG_NO_RETRY = 32,
+ ATA_LFLAG_DISABLED = 64,
+ ATA_LFLAG_SW_ACTIVITY = 128,
+ ATA_LFLAG_NO_LPM = 256,
+ ATA_LFLAG_RST_ONCE = 512,
+ ATA_LFLAG_CHANGED = 1024,
+ ATA_LFLAG_NO_DEBOUNCE_DELAY = 2048,
+ ATA_FLAG_SLAVE_POSS = 1,
+ ATA_FLAG_SATA = 2,
+ ATA_FLAG_NO_LPM = 4,
+ ATA_FLAG_NO_LOG_PAGE = 32,
+ ATA_FLAG_NO_ATAPI = 64,
+ ATA_FLAG_PIO_DMA = 128,
+ ATA_FLAG_PIO_LBA48 = 256,
+ ATA_FLAG_PIO_POLLING = 512,
+ ATA_FLAG_NCQ = 1024,
+ ATA_FLAG_NO_POWEROFF_SPINDOWN = 2048,
+ ATA_FLAG_NO_HIBERNATE_SPINDOWN = 4096,
+ ATA_FLAG_DEBUGMSG = 8192,
+ ATA_FLAG_FPDMA_AA = 16384,
+ ATA_FLAG_IGN_SIMPLEX = 32768,
+ ATA_FLAG_NO_IORDY = 65536,
+ ATA_FLAG_ACPI_SATA = 131072,
+ ATA_FLAG_AN = 262144,
+ ATA_FLAG_PMP = 524288,
+ ATA_FLAG_FPDMA_AUX = 1048576,
+ ATA_FLAG_EM = 2097152,
+ ATA_FLAG_SW_ACTIVITY = 4194304,
+ ATA_FLAG_NO_DIPM = 8388608,
+ ATA_FLAG_SAS_HOST = 16777216,
+ ATA_PFLAG_EH_PENDING = 1,
+ ATA_PFLAG_EH_IN_PROGRESS = 2,
+ ATA_PFLAG_FROZEN = 4,
+ ATA_PFLAG_RECOVERED = 8,
+ ATA_PFLAG_LOADING = 16,
+ ATA_PFLAG_SCSI_HOTPLUG = 64,
+ ATA_PFLAG_INITIALIZING = 128,
+ ATA_PFLAG_RESETTING = 256,
+ ATA_PFLAG_UNLOADING = 512,
+ ATA_PFLAG_UNLOADED = 1024,
+ ATA_PFLAG_SUSPENDED = 131072,
+ ATA_PFLAG_PM_PENDING = 262144,
+ ATA_PFLAG_INIT_GTM_VALID = 524288,
+ ATA_PFLAG_PIO32 = 1048576,
+ ATA_PFLAG_PIO32CHANGE = 2097152,
+ ATA_PFLAG_EXTERNAL = 4194304,
+ ATA_QCFLAG_ACTIVE = 1,
+ ATA_QCFLAG_DMAMAP = 2,
+ ATA_QCFLAG_IO = 8,
+ ATA_QCFLAG_RESULT_TF = 16,
+ ATA_QCFLAG_CLEAR_EXCL = 32,
+ ATA_QCFLAG_QUIET = 64,
+ ATA_QCFLAG_RETRY = 128,
+ ATA_QCFLAG_FAILED = 65536,
+ ATA_QCFLAG_SENSE_VALID = 131072,
+ ATA_QCFLAG_EH_SCHEDULED = 262144,
+ ATA_HOST_SIMPLEX = 1,
+ ATA_HOST_STARTED = 2,
+ ATA_HOST_PARALLEL_SCAN = 4,
+ ATA_HOST_IGNORE_ATA = 8,
+ ATA_TMOUT_BOOT = 30000,
+ ATA_TMOUT_BOOT_QUICK = 7000,
+ ATA_TMOUT_INTERNAL_QUICK = 5000,
+ ATA_TMOUT_MAX_PARK = 30000,
+ ATA_TMOUT_FF_WAIT_LONG = 2000,
+ ATA_TMOUT_FF_WAIT = 800,
+ ATA_WAIT_AFTER_RESET = 150,
+ ATA_TMOUT_PMP_SRST_WAIT = 5000,
+ ATA_TMOUT_SPURIOUS_PHY = 10000,
+ BUS_UNKNOWN = 0,
+ BUS_DMA = 1,
+ BUS_IDLE = 2,
+ BUS_NOINTR = 3,
+ BUS_NODATA = 4,
+ BUS_TIMER = 5,
+ BUS_PIO = 6,
+ BUS_EDD = 7,
+ BUS_IDENTIFY = 8,
+ BUS_PACKET = 9,
+ PORT_UNKNOWN = 0,
+ PORT_ENABLED = 1,
+ PORT_DISABLED = 2,
+ ATA_NR_PIO_MODES = 7,
+ ATA_NR_MWDMA_MODES = 5,
+ ATA_NR_UDMA_MODES = 8,
+ ATA_SHIFT_PIO = 0,
+ ATA_SHIFT_MWDMA = 7,
+ ATA_SHIFT_UDMA = 12,
+ ATA_SHIFT_PRIO = 6,
+ ATA_PRIO_HIGH = 2,
+ ATA_DMA_PAD_SZ = 4,
+ ATA_ERING_SIZE = 32,
+ ATA_DEFER_LINK = 1,
+ ATA_DEFER_PORT = 2,
+ ATA_EH_DESC_LEN = 80,
+ ATA_EH_REVALIDATE = 1,
+ ATA_EH_SOFTRESET = 2,
+ ATA_EH_HARDRESET = 4,
+ ATA_EH_RESET = 6,
+ ATA_EH_ENABLE_LINK = 8,
+ ATA_EH_PARK = 32,
+ ATA_EH_PERDEV_MASK = 33,
+ ATA_EH_ALL_ACTIONS = 15,
+ ATA_EHI_HOTPLUGGED = 1,
+ ATA_EHI_NO_AUTOPSY = 4,
+ ATA_EHI_QUIET = 8,
+ ATA_EHI_NO_RECOVERY = 16,
+ ATA_EHI_DID_SOFTRESET = 65536,
+ ATA_EHI_DID_HARDRESET = 131072,
+ ATA_EHI_PRINTINFO = 262144,
+ ATA_EHI_SETMODE = 524288,
+ ATA_EHI_POST_SETMODE = 1048576,
+ ATA_EHI_DID_RESET = 196608,
+ ATA_EHI_TO_SLAVE_MASK = 12,
+ ATA_EH_MAX_TRIES = 5,
+ ATA_LINK_RESUME_TRIES = 5,
+ ATA_PROBE_MAX_TRIES = 3,
+ ATA_EH_DEV_TRIES = 3,
+ ATA_EH_PMP_TRIES = 5,
+ ATA_EH_PMP_LINK_TRIES = 3,
+ SATA_PMP_RW_TIMEOUT = 3000,
+ ATA_EH_CMD_TIMEOUT_TABLE_SIZE = 7,
+ ATA_HORKAGE_DIAGNOSTIC = 1,
+ ATA_HORKAGE_NODMA = 2,
+ ATA_HORKAGE_NONCQ = 4,
+ ATA_HORKAGE_MAX_SEC_128 = 8,
+ ATA_HORKAGE_BROKEN_HPA = 16,
+ ATA_HORKAGE_DISABLE = 32,
+ ATA_HORKAGE_HPA_SIZE = 64,
+ ATA_HORKAGE_IVB = 256,
+ ATA_HORKAGE_STUCK_ERR = 512,
+ ATA_HORKAGE_BRIDGE_OK = 1024,
+ ATA_HORKAGE_ATAPI_MOD16_DMA = 2048,
+ ATA_HORKAGE_FIRMWARE_WARN = 4096,
+ ATA_HORKAGE_1_5_GBPS = 8192,
+ ATA_HORKAGE_NOSETXFER = 16384,
+ ATA_HORKAGE_BROKEN_FPDMA_AA = 32768,
+ ATA_HORKAGE_DUMP_ID = 65536,
+ ATA_HORKAGE_MAX_SEC_LBA48 = 131072,
+ ATA_HORKAGE_ATAPI_DMADIR = 262144,
+ ATA_HORKAGE_NO_NCQ_TRIM = 524288,
+ ATA_HORKAGE_NOLPM = 1048576,
+ ATA_HORKAGE_WD_BROKEN_LPM = 2097152,
+ ATA_HORKAGE_ZERO_AFTER_TRIM = 4194304,
+ ATA_HORKAGE_NO_DMA_LOG = 8388608,
+ ATA_HORKAGE_NOTRIM = 16777216,
+ ATA_HORKAGE_MAX_SEC_1024 = 33554432,
+ ATA_HORKAGE_MAX_TRIM_128M = 67108864,
+ ATA_HORKAGE_NO_NCQ_ON_ATI = 134217728,
+ ATA_HORKAGE_NO_ID_DEV_LOG = 268435456,
+ ATA_HORKAGE_NO_LOG_DIR = 536870912,
+ ATA_DMA_MASK_ATA = 1,
+ ATA_DMA_MASK_ATAPI = 2,
+ ATA_DMA_MASK_CFA = 4,
+ ATAPI_READ = 0,
+ ATAPI_WRITE = 1,
+ ATAPI_READ_CD = 2,
+ ATAPI_PASS_THRU = 3,
+ ATAPI_MISC = 4,
+ ATA_TIMING_SETUP = 1,
+ ATA_TIMING_ACT8B = 2,
+ ATA_TIMING_REC8B = 4,
+ ATA_TIMING_CYC8B = 8,
+ ATA_TIMING_8BIT = 14,
+ ATA_TIMING_ACTIVE = 16,
+ ATA_TIMING_RECOVER = 32,
+ ATA_TIMING_DMACK_HOLD = 64,
+ ATA_TIMING_CYCLE = 128,
+ ATA_TIMING_UDMA = 256,
+ ATA_TIMING_ALL = 511,
+ ATA_ACPI_FILTER_SETXFER = 1,
+ ATA_ACPI_FILTER_LOCK = 2,
+ ATA_ACPI_FILTER_DIPM = 4,
+ ATA_ACPI_FILTER_FPDMA_OFFSET = 8,
+ ATA_ACPI_FILTER_FPDMA_AA = 16,
+ ATA_ACPI_FILTER_DEFAULT = 7,
+};
+
+struct device_attach_data {
+ struct device *dev;
+ bool check_async;
+ bool want_async;
+ bool have_async;
+};
+
+struct serport {
+ struct tty_struct *tty;
+ wait_queue_head_t wait;
+ struct serio *serio;
+ struct serio_device_id id;
+ spinlock_t lock;
+ long unsigned int flags;
+};
+
+enum rc_filter_type {
+ RC_FILTER_NORMAL = 0,
+ RC_FILTER_WAKEUP = 1,
+ RC_FILTER_MAX = 2,
+};
+
+enum led_brightness {
+ LED_OFF = 0,
+ LED_ON = 1,
+ LED_HALF = 127,
+ LED_FULL = 255,
+};
+
+struct led_trigger {};
+
+struct rc_filter_attribute {
+ struct device_attribute attr;
+ enum rc_filter_type type;
+ bool mask;
+};
+
+struct ts_state {
+ unsigned int offset;
+ char cb[48];
+};
+
+struct ts_config;
+
+struct ts_ops {
+ const char *name;
+ struct ts_config * (*init)(const void *, unsigned int, gfp_t, int);
+ unsigned int (*find)(struct ts_config *, struct ts_state *);
+ void (*destroy)(struct ts_config *);
+ void * (*get_pattern)(struct ts_config *);
+ unsigned int (*get_pattern_len)(struct ts_config *);
+ struct module *owner;
+ struct list_head list;
+};
+
+struct ts_config {
+ struct ts_ops *ops;
+ int flags;
+ unsigned int (*get_next_block)(unsigned int, const u8 **, struct ts_config *, struct ts_state *);
+ void (*finish)(struct ts_config *, struct ts_state *);
+};
+
+struct skb_seq_state {
+ __u32 lower_offset;
+ __u32 upper_offset;
+ __u32 frag_idx;
+ __u32 stepped_offset;
+ struct sk_buff *root_skb;
+ struct sk_buff *cur_skb;
+ __u8 *frag_data;
+ __u32 frag_off;
+};
+
+struct ip_auth_hdr {
+ __u8 nexthdr;
+ __u8 hdrlen;
+ __be16 reserved;
+ __be32 spi;
+ __be32 seq_no;
+ __u8 auth_data[0];
+};
+
+struct page_frag_1k {
+ void *va;
+ u16 offset;
+ bool pfmemalloc;
+};
+
+struct napi_alloc_cache {
+ struct page_frag_cache page;
+ struct page_frag_1k page_small;
+ unsigned int skb_count;
+ void *skb_cache[64];
+};
+
+typedef int (*sendmsg_func)(struct sock *, struct msghdr *, struct kvec *, size_t, size_t);
+
+typedef int (*sendpage_func)(struct sock *, struct page *, int, size_t, int);
+
+struct muldiv {
+ u32 multiplier;
+ u32 divider;
+};
+
+struct freq_desc {
+ bool use_msr_plat;
+ struct muldiv muldiv[16];
+ u32 freqs[16];
+ u32 mask;
+};
+
+enum sysctl_writes_mode {
+ SYSCTL_WRITES_LEGACY = -1,
+ SYSCTL_WRITES_WARN = 0,
+ SYSCTL_WRITES_STRICT = 1,
+};
+
+struct do_proc_dointvec_minmax_conv_param {
+ int *min;
+ int *max;
+};
+
+struct do_proc_douintvec_minmax_conv_param {
+ unsigned int *min;
+ unsigned int *max;
+};
+
+struct ipc_proc_iface {
+ const char *path;
+ const char *header;
+ int ids;
+ int (*show)(struct seq_file *, void *);
+};
+
+struct ipc_proc_iter {
+ struct ipc_namespace *ns;
+ struct pid_namespace *pid_ns;
+ struct ipc_proc_iface *iface;
+};
+
+enum rsaprivkey_actions {
+ ACT_rsa_get_d = 0,
+ ACT_rsa_get_dp = 1,
+ ACT_rsa_get_dq = 2,
+ ACT_rsa_get_e___2 = 3,
+ ACT_rsa_get_n___2 = 4,
+ ACT_rsa_get_p = 5,
+ ACT_rsa_get_q = 6,
+ ACT_rsa_get_qinv = 7,
+ NR__rsaprivkey_actions = 8,
+};
+
+struct rsa_asn1_template {
+ const char *name;
+ const u8 *data;
+ size_t size;
+};
+
+struct pkcs1pad_ctx {
+ struct crypto_akcipher *child;
+ unsigned int key_size;
+};
+
+struct pkcs1pad_inst_ctx {
+ struct crypto_akcipher_spawn spawn;
+ const struct rsa_asn1_template *digest_info;
+};
+
+struct pkcs1pad_request {
+ struct scatterlist in_sg[2];
+ struct scatterlist out_sg[1];
+ uint8_t *in_buf;
+ uint8_t *out_buf;
+ struct akcipher_request child_req;
+};
+
+struct ghash_ctx {
+ struct gf128mul_4k *gf128;
+};
+
+struct ghash_desc_ctx {
+ u8 buffer[16];
+ u32 bytes;
+};
+
+struct blk_plug_cb;
+
+typedef void (*blk_plug_cb_fn)(struct blk_plug_cb *, bool);
+
+struct blk_plug_cb {
+ struct list_head list;
+ blk_plug_cb_fn callback;
+ void *data;
+};
+
+struct trace_event_raw_block_buffer {
+ struct trace_entry ent;
+ dev_t dev;
+ sector_t sector;
+ size_t size;
+ char __data[0];
+};
+
+struct trace_event_raw_block_rq_requeue {
+ struct trace_entry ent;
+ dev_t dev;
+ sector_t sector;
+ unsigned int nr_sector;
+ char rwbs[8];
+ u32 __data_loc_cmd;
+ char __data[0];
+};
+
+struct trace_event_raw_block_rq_completion {
+ struct trace_entry ent;
+ dev_t dev;
+ sector_t sector;
+ unsigned int nr_sector;
+ int error;
+ char rwbs[8];
+ u32 __data_loc_cmd;
+ char __data[0];
+};
+
+struct trace_event_raw_block_rq {
+ struct trace_entry ent;
+ dev_t dev;
+ sector_t sector;
+ unsigned int nr_sector;
+ unsigned int bytes;
+ char rwbs[8];
+ char comm[16];
+ u32 __data_loc_cmd;
+ char __data[0];
+};
+
+struct trace_event_raw_block_bio_complete {
+ struct trace_entry ent;
+ dev_t dev;
+ sector_t sector;
+ unsigned int nr_sector;
+ int error;
+ char rwbs[8];
+ char __data[0];
+};
+
+struct trace_event_raw_block_bio {
+ struct trace_entry ent;
+ dev_t dev;
+ sector_t sector;
+ unsigned int nr_sector;
+ char rwbs[8];
+ char comm[16];
+ char __data[0];
+};
+
+struct trace_event_raw_block_plug {
+ struct trace_entry ent;
+ char comm[16];
+ char __data[0];
+};
+
+struct trace_event_raw_block_unplug {
+ struct trace_entry ent;
+ int nr_rq;
+ char comm[16];
+ char __data[0];
+};
+
+struct trace_event_raw_block_split {
+ struct trace_entry ent;
+ dev_t dev;
+ sector_t sector;
+ sector_t new_sector;
+ char rwbs[8];
+ char comm[16];
+ char __data[0];
+};
+
+struct trace_event_raw_block_bio_remap {
+ struct trace_entry ent;
+ dev_t dev;
+ sector_t sector;
+ unsigned int nr_sector;
+ dev_t old_dev;
+ sector_t old_sector;
+ char rwbs[8];
+ char __data[0];
+};
+
+struct trace_event_raw_block_rq_remap {
+ struct trace_entry ent;
+ dev_t dev;
+ sector_t sector;
+ unsigned int nr_sector;
+ dev_t old_dev;
+ sector_t old_sector;
+ unsigned int nr_bios;
+ char rwbs[8];
+ char __data[0];
+};
+
+struct trace_event_data_offsets_block_buffer {};
+
+struct trace_event_data_offsets_block_rq_requeue {
+ u32 cmd;
+};
+
+struct trace_event_data_offsets_block_rq_completion {
+ u32 cmd;
+};
+
+struct trace_event_data_offsets_block_rq {
+ u32 cmd;
+};
+
+struct trace_event_data_offsets_block_bio_complete {};
+
+struct trace_event_data_offsets_block_bio {};
+
+struct trace_event_data_offsets_block_plug {};
+
+struct trace_event_data_offsets_block_unplug {};
+
+struct trace_event_data_offsets_block_split {};
+
+struct trace_event_data_offsets_block_bio_remap {};
+
+struct trace_event_data_offsets_block_rq_remap {};
+
+typedef void (*btf_trace_block_touch_buffer)(void *, struct buffer_head *);
+
+typedef void (*btf_trace_block_dirty_buffer)(void *, struct buffer_head *);
+
+typedef void (*btf_trace_block_rq_requeue)(void *, struct request *);
+
+typedef void (*btf_trace_block_rq_complete)(void *, struct request *, blk_status_t, unsigned int);
+
+typedef void (*btf_trace_block_rq_error)(void *, struct request *, blk_status_t, unsigned int);
+
+typedef void (*btf_trace_block_rq_insert)(void *, struct request *);
+
+typedef void (*btf_trace_block_rq_issue)(void *, struct request *);
+
+typedef void (*btf_trace_block_rq_merge)(void *, struct request *);
+
+typedef void (*btf_trace_block_bio_complete)(void *, struct request_queue *, struct bio *);
+
+typedef void (*btf_trace_block_bio_bounce)(void *, struct bio *);
+
+typedef void (*btf_trace_block_bio_backmerge)(void *, struct bio *);
+
+typedef void (*btf_trace_block_bio_frontmerge)(void *, struct bio *);
+
+typedef void (*btf_trace_block_bio_queue)(void *, struct bio *);
+
+typedef void (*btf_trace_block_getrq)(void *, struct bio *);
+
+typedef void (*btf_trace_block_plug)(void *, struct request_queue *);
+
+typedef void (*btf_trace_block_unplug)(void *, struct request_queue *, unsigned int, bool);
+
+typedef void (*btf_trace_block_split)(void *, struct bio *, unsigned int);
+
+typedef void (*btf_trace_block_bio_remap)(void *, struct bio *, dev_t, sector_t);
+
+typedef void (*btf_trace_block_rq_remap)(void *, struct request *, dev_t, sector_t);
+
+struct acpi_pci_ioapic {
+ acpi_handle root_handle;
+ acpi_handle handle;
+ u32 gsi_base;
+ struct resource res;
+ struct pci_dev *pdev;
+ struct list_head list;
+};
+
+struct ml_effect_state {
+ struct ff_effect *effect;
+ long unsigned int flags;
+ int count;
+ long unsigned int play_at;
+ long unsigned int stop_at;
+ long unsigned int adj_at;
+};
+
+struct ml_device {
+ void *private;
+ struct ml_effect_state states[16];
+ int gain;
+ struct timer_list timer;
+ struct input_dev *dev;
+ int (*play_effect)(struct input_dev *, void *, struct ff_effect *);
+};
+
+struct efi_system_resource_entry_v1 {
+ efi_guid_t fw_class;
+ u32 fw_type;
+ u32 fw_version;
+ u32 lowest_supported_fw_version;
+ u32 capsule_flags;
+ u32 last_attempt_version;
+ u32 last_attempt_status;
+};
+
+struct efi_system_resource_table {
+ u32 fw_resource_count;
+ u32 fw_resource_count_max;
+ u64 fw_resource_version;
+ u8 entries[0];
+};
+
+struct esre_entry {
+ union {
+ struct efi_system_resource_entry_v1 *esre1;
+ } esre;
+ struct kobject kobj;
+ struct list_head list;
+};
+
+struct esre_attribute {
+ struct attribute attr;
+ ssize_t (*show)(struct esre_entry *, char *);
+ ssize_t (*store)(struct esre_entry *, const char *, size_t);
+};
+
+enum flow_dissect_ret {
+ FLOW_DISSECT_RET_OUT_GOOD = 0,
+ FLOW_DISSECT_RET_OUT_BAD = 1,
+ FLOW_DISSECT_RET_PROTO_AGAIN = 2,
+ FLOW_DISSECT_RET_IPPROTO_AGAIN = 3,
+ FLOW_DISSECT_RET_CONTINUE = 4,
+};
+
+struct flow_keys_digest {
+ u8 data[16];
+};
+
+enum {
+ BPF_FLOW_DISSECTOR_F_PARSE_1ST_FRAG = 1,
+ BPF_FLOW_DISSECTOR_F_STOP_AT_FLOW_LABEL = 2,
+ BPF_FLOW_DISSECTOR_F_STOP_AT_ENCAP = 4,
+};
+
+struct gre_full_hdr {
+ struct gre_base_hdr fixed_header;
+ __be16 csum;
+ __be16 reserved1;
+ __be32 key;
+ __be32 seq;
+};
+
+struct pptp_gre_header {
+ struct gre_base_hdr gre_hd;
+ __be16 payload_len;
+ __be16 call_id;
+ __be32 seq;
+ __be32 ack;
+};
+
+struct tipc_basic_hdr {
+ __be32 w[4];
+};
+
+struct pppoe_tag {
+ __be16 tag_type;
+ __be16 tag_len;
+ char tag_data[0];
+};
+
+struct pppoe_hdr {
+ __u8 type: 4;
+ __u8 ver: 4;
+ __u8 code;
+ __be16 sid;
+ __be16 length;
+ struct pppoe_tag tag[0];
+};
+
+struct hsr_tag {
+ __be16 path_and_LSDU_size;
+ __be16 sequence_nr;
+ __be16 encap_proto;
+};
+
+struct mpls_label {
+ __be32 entry;
+};
+
+enum batadv_packettype {
+ BATADV_IV_OGM = 0,
+ BATADV_BCAST = 1,
+ BATADV_CODED = 2,
+ BATADV_ELP = 3,
+ BATADV_OGM2 = 4,
+ BATADV_UNICAST = 64,
+ BATADV_UNICAST_FRAG = 65,
+ BATADV_UNICAST_4ADDR = 66,
+ BATADV_ICMP = 67,
+ BATADV_UNICAST_TVLV = 68,
+};
+
+struct batadv_unicast_packet {
+ __u8 packet_type;
+ __u8 version;
+ __u8 ttl;
+ __u8 ttvn;
+ __u8 dest[6];
+};
+
+struct _flow_keys_digest_data {
+ __be16 n_proto;
+ u8 ip_proto;
+ u8 padding;
+ __be32 ports;
+ __be32 src;
+ __be32 dst;
+};
+
+enum mce_notifier_prios {
+ MCE_PRIO_LOWEST = 0,
+ MCE_PRIO_MCELOG = 1,
+ MCE_PRIO_EDAC = 2,
+ MCE_PRIO_NFIT = 3,
+ MCE_PRIO_EXTLOG = 4,
+ MCE_PRIO_UC = 5,
+ MCE_PRIO_EARLY = 6,
+ MCE_PRIO_CEC = 7,
+ MCE_PRIO_HIGHEST = 7,
+};
+
+struct trace_event_raw_mce_record {
+ struct trace_entry ent;
+ u64 mcgcap;
+ u64 mcgstatus;
+ u64 status;
+ u64 addr;
+ u64 misc;
+ u64 synd;
+ u64 ipid;
+ u64 ip;
+ u64 tsc;
+ u64 walltime;
+ u32 cpu;
+ u32 cpuid;
+ u32 apicid;
+ u32 socketid;
+ u8 cs;
+ u8 bank;
+ u8 cpuvendor;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_mce_record {};
+
+typedef void (*btf_trace_mce_record)(void *, struct mce *);
+
+struct mce_bank {
+ u64 ctl;
+ __u64 init: 1;
+ __u64 __reserved_1: 63;
+};
+
+struct mce_bank_dev {
+ struct device_attribute attr;
+ char attrname[16];
+ u8 bank;
+};
+
+struct vma_swap_readahead {
+ short unsigned int win;
+ short unsigned int offset;
+ short unsigned int nr_pte;
+ pte_t *ptes;
+};
+
+struct swap_cgroup_ctrl {
+ struct page **map;
+ long unsigned int length;
+ spinlock_t lock;
+};
+
+struct swap_cgroup {
+ short unsigned int id;
+};
+
+struct balloon_dev_info {
+ long unsigned int isolated_pages;
+ spinlock_t pages_lock;
+ struct list_head pages;
+ int (*migratepage)(struct balloon_dev_info *, struct page *, struct page *, enum migrate_mode);
+};
+
+struct iomap_ops;
+
+struct trace_event_raw_iomap_readpage_class {
+ struct trace_entry ent;
+ dev_t dev;
+ u64 ino;
+ int nr_pages;
+ char __data[0];
+};
+
+struct trace_event_raw_iomap_range_class {
+ struct trace_entry ent;
+ dev_t dev;
+ u64 ino;
+ loff_t size;
+ loff_t offset;
+ u64 length;
+ char __data[0];
+};
+
+struct trace_event_raw_iomap_class {
+ struct trace_entry ent;
+ dev_t dev;
+ u64 ino;
+ u64 addr;
+ loff_t offset;
+ u64 length;
+ u16 type;
+ u16 flags;
+ dev_t bdev;
+ char __data[0];
+};
+
+struct trace_event_raw_iomap_iter {
+ struct trace_entry ent;
+ dev_t dev;
+ u64 ino;
+ loff_t pos;
+ u64 length;
+ unsigned int flags;
+ const void *ops;
+ long unsigned int caller;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_iomap_readpage_class {};
+
+struct trace_event_data_offsets_iomap_range_class {};
+
+struct trace_event_data_offsets_iomap_class {};
+
+struct trace_event_data_offsets_iomap_iter {};
+
+typedef void (*btf_trace_iomap_readpage)(void *, struct inode *, int);
+
+typedef void (*btf_trace_iomap_readahead)(void *, struct inode *, int);
+
+typedef void (*btf_trace_iomap_writepage)(void *, struct inode *, loff_t, u64);
+
+typedef void (*btf_trace_iomap_release_folio)(void *, struct inode *, loff_t, u64);
+
+typedef void (*btf_trace_iomap_invalidate_folio)(void *, struct inode *, loff_t, u64);
+
+typedef void (*btf_trace_iomap_dio_invalidate_fail)(void *, struct inode *, loff_t, u64);
+
+typedef void (*btf_trace_iomap_iter_dstmap)(void *, struct inode *, struct iomap *);
+
+typedef void (*btf_trace_iomap_iter_srcmap)(void *, struct inode *, struct iomap *);
+
+typedef void (*btf_trace_iomap_writepage_map)(void *, struct inode *, struct iomap *);
+
+typedef void (*btf_trace_iomap_iter)(void *, struct iomap_iter *, const void *, long unsigned int);
+
+typedef struct {
+ __le16 e_tag;
+ __le16 e_perm;
+ __le32 e_id;
+} ext4_acl_entry;
+
+typedef struct {
+ __le32 a_version;
+} ext4_acl_header;
+
+enum {
+ SELNL_MSG_SETENFORCE = 16,
+ SELNL_MSG_POLICYLOAD = 17,
+ SELNL_MSG_MAX = 18,
+};
+
+enum selinux_nlgroups {
+ SELNLGRP_NONE = 0,
+ SELNLGRP_AVC = 1,
+ __SELNLGRP_MAX = 2,
+};
+
+struct selnl_msg_setenforce {
+ __s32 val;
+};
+
+struct selnl_msg_policyload {
+ __u32 seqno;
+};
+
+struct blk_ia_range_sysfs_entry {
+ struct attribute attr;
+ ssize_t (*show)(struct blk_independent_access_range *, char *);
+};
+
+enum {
+ IO_WQ_BOUND = 0,
+ IO_WQ_UNBOUND = 1,
+};
+
+struct io_wqe;
+
+struct io_wq {
+ long unsigned int state;
+ free_work_fn *free_work;
+ io_wq_work_fn *do_work;
+ struct io_wq_hash *hash;
+ atomic_t worker_refs;
+ struct completion worker_done;
+ struct hlist_node cpuhp_node;
+ struct task_struct *task;
+ struct io_wqe *wqes[0];
+};
+
+enum {
+ IO_WORKER_F_UP = 1,
+ IO_WORKER_F_RUNNING = 2,
+ IO_WORKER_F_FREE = 4,
+ IO_WORKER_F_BOUND = 8,
+};
+
+enum {
+ IO_WQ_BIT_EXIT = 0,
+};
+
+enum {
+ IO_ACCT_STALLED_BIT = 0,
+};
+
+struct io_worker {
+ refcount_t ref;
+ unsigned int flags;
+ struct hlist_nulls_node nulls_node;
+ struct list_head all_list;
+ struct task_struct *task;
+ struct io_wqe *wqe;
+ struct io_wq_work *cur_work;
+ struct io_wq_work *next_work;
+ raw_spinlock_t lock;
+ struct completion ref_done;
+ long unsigned int create_state;
+ struct callback_head create_work;
+ int create_index;
+ union {
+ struct callback_head rcu;
+ struct work_struct work;
+ };
+};
+
+struct io_wqe_acct {
+ unsigned int nr_workers;
+ unsigned int max_workers;
+ int index;
+ atomic_t nr_running;
+ raw_spinlock_t lock;
+ struct io_wq_work_list work_list;
+ long unsigned int flags;
+};
+
+struct io_wqe {
+ raw_spinlock_t lock;
+ struct io_wqe_acct acct[2];
+ int node;
+ struct hlist_nulls_head free_list;
+ struct list_head all_list;
+ struct wait_queue_entry wait;
+ struct io_wq *wq;
+ struct io_wq_work *hash_tail[64];
+ cpumask_var_t cpu_mask;
+};
+
+enum {
+ IO_WQ_ACCT_BOUND = 0,
+ IO_WQ_ACCT_UNBOUND = 1,
+ IO_WQ_ACCT_NR = 2,
+};
+
+struct io_cb_cancel_data {
+ work_cancel_fn *fn;
+ void *data;
+ int nr_running;
+ int nr_pending;
+ bool cancel_all;
+};
+
+struct online_data {
+ unsigned int cpu;
+ bool online;
+};
+
+struct acpi_lpat {
+ int temp;
+ int raw;
+};
+
+struct acpi_lpat_conversion_table {
+ struct acpi_lpat *lpat;
+ int lpat_count;
+};
+
+typedef acpi_status (*acpi_execute_op)(struct acpi_walk_state *);
+
+typedef acpi_status (*acpi_repair_function)(struct acpi_evaluate_info *, union acpi_operand_object **);
+
+struct acpi_repair_info {
+ char name[4];
+ acpi_repair_function repair_function;
+};
+
+struct acpi_ac {
+ struct power_supply *charger;
+ struct power_supply_desc charger_desc;
+ struct acpi_device *device;
+ long long unsigned int state;
+ struct notifier_block battery_nb;
+};
+
+struct pericom8250 {
+ void *virt;
+ unsigned int nr;
+ int line[0];
+};
+
+struct tc_fifo_qopt {
+ __u32 limit;
+};
+
+enum tc_fifo_command {
+ TC_FIFO_REPLACE = 0,
+ TC_FIFO_DESTROY = 1,
+ TC_FIFO_STATS = 2,
+};
+
+struct tc_fifo_qopt_offload {
+ enum tc_fifo_command command;
+ u32 handle;
+ u32 parent;
+ union {
+ struct tc_qopt_offload_stats stats;
+ };
+};
+
+struct channels_reply_data {
+ struct ethnl_reply_data base;
+ struct ethtool_channels channels;
+};
+
+struct mptcp_diag_ctx {
+ long int s_slot;
+ long int s_num;
+ unsigned int l_slot;
+ unsigned int l_num;
+};
+
+struct inactive_task_frame {
+ long unsigned int r15;
+ long unsigned int r14;
+ long unsigned int r13;
+ long unsigned int r12;
+ long unsigned int bx;
+ long unsigned int bp;
+ long unsigned int ret_addr;
+};
+
+struct pm_qos_request {
+ struct plist_node node;
+ struct pm_qos_constraints *qos;
+};
+
+enum bpf_lru_list_type {
+ BPF_LRU_LIST_T_ACTIVE = 0,
+ BPF_LRU_LIST_T_INACTIVE = 1,
+ BPF_LRU_LIST_T_FREE = 2,
+ BPF_LRU_LOCAL_LIST_T_FREE = 3,
+ BPF_LRU_LOCAL_LIST_T_PENDING = 4,
+};
+
+enum {
+ BPF_F_BPRM_SECUREEXEC = 1,
+};
+
+typedef u64 (*btf_bpf_bprm_opts_set)(struct linux_binprm *, u64);
+
+typedef u64 (*btf_bpf_ima_inode_hash)(struct inode *, void *, u32);
+
+typedef u64 (*btf_bpf_ima_file_hash)(struct file *, void *, u32);
+
+typedef u64 (*btf_bpf_get_attach_cookie)(void *);
+
+struct crypto_comp {
+ struct crypto_tfm base;
+};
+
+struct acpi_madt_io_sapic {
+ struct acpi_subtable_header header;
+ u8 id;
+ u8 reserved;
+ u32 global_irq_base;
+ u64 address;
+};
+
+struct acpi_madt_interrupt_source {
+ struct acpi_subtable_header header;
+ u16 inti_flags;
+ u8 type;
+ u8 id;
+ u8 eid;
+ u8 io_sapic_vector;
+ u32 global_irq;
+ u32 flags;
+};
+
+struct acpi_madt_generic_distributor {
+ struct acpi_subtable_header header;
+ u16 reserved;
+ u32 gic_id;
+ u64 base_address;
+ u32 global_irq_base;
+ u8 version;
+ u8 reserved2[3];
+};
+
+enum acpi_subtable_type {
+ ACPI_SUBTABLE_COMMON = 0,
+ ACPI_SUBTABLE_HMAT = 1,
+ ACPI_SUBTABLE_PRMT = 2,
+ ACPI_SUBTABLE_CEDT = 3,
+};
+
+struct acpi_subtable_entry {
+ union acpi_subtable_headers *hdr;
+ enum acpi_subtable_type type;
+};
+
+struct acpi_bus_type {
+ struct list_head list;
+ const char *name;
+ bool (*match)(struct device *);
+ struct acpi_device * (*find_companion)(struct device *);
+ void (*setup)(struct device *);
+};
+
+struct find_child_walk_data {
+ struct acpi_device *adev;
+ u64 address;
+ int score;
+ bool check_sta;
+ bool check_children;
+};
+
+struct virtio_console_config {
+ __virtio16 cols;
+ __virtio16 rows;
+ __virtio32 max_nr_ports;
+ __virtio32 emerg_wr;
+};
+
+struct virtio_console_control {
+ __virtio32 id;
+ __virtio16 event;
+ __virtio16 value;
+};
+
+struct ports_driver_data {
+ struct class *class;
+ struct dentry *debugfs_dir;
+ struct list_head portdevs;
+ unsigned int next_vtermno;
+ struct list_head consoles;
+};
+
+struct console___2 {
+ struct list_head list;
+ struct hvc_struct *hvc;
+ struct winsize ws;
+ u32 vtermno;
+};
+
+struct port_buffer {
+ char *buf;
+ size_t size;
+ size_t len;
+ size_t offset;
+ dma_addr_t dma;
+ struct device *dev;
+ struct list_head list;
+ unsigned int sgpages;
+ struct scatterlist sg[0];
+};
+
+struct ports_device {
+ struct list_head list;
+ struct work_struct control_work;
+ struct work_struct config_work;
+ struct list_head ports;
+ spinlock_t ports_lock;
+ spinlock_t c_ivq_lock;
+ spinlock_t c_ovq_lock;
+ u32 max_nr_ports;
+ struct virtio_device *vdev;
+ struct virtqueue *c_ivq;
+ struct virtqueue *c_ovq;
+ struct virtio_console_control cpkt;
+ struct virtqueue **in_vqs;
+ struct virtqueue **out_vqs;
+ int chr_major;
+};
+
+struct port_stats {
+ long unsigned int bytes_sent;
+ long unsigned int bytes_received;
+ long unsigned int bytes_discarded;
+};
+
+struct port___2 {
+ struct list_head list;
+ struct ports_device *portdev;
+ struct port_buffer *inbuf;
+ spinlock_t inbuf_lock;
+ spinlock_t outvq_lock;
+ struct virtqueue *in_vq;
+ struct virtqueue *out_vq;
+ struct dentry *debugfs_file;
+ struct port_stats stats;
+ struct console___2 cons;
+ struct cdev *cdev;
+ struct device *dev;
+ struct kref kref;
+ wait_queue_head_t waitqueue;
+ char *name;
+ struct fasync_struct *async_queue;
+ u32 id;
+ bool outvq_full;
+ bool host_connected;
+ bool guest_connected;
+};
+
+struct sg_list {
+ unsigned int n;
+ unsigned int size;
+ size_t len;
+ struct scatterlist *sg;
+};
+
+struct tunnel_msg {
+ __u8 family;
+ __u8 flags;
+ __u16 reserved2;
+ __u32 ifindex;
+};
+
+enum {
+ VNIFILTER_ENTRY_STATS_UNSPEC = 0,
+ VNIFILTER_ENTRY_STATS_RX_BYTES = 1,
+ VNIFILTER_ENTRY_STATS_RX_PKTS = 2,
+ VNIFILTER_ENTRY_STATS_RX_DROPS = 3,
+ VNIFILTER_ENTRY_STATS_RX_ERRORS = 4,
+ VNIFILTER_ENTRY_STATS_TX_BYTES = 5,
+ VNIFILTER_ENTRY_STATS_TX_PKTS = 6,
+ VNIFILTER_ENTRY_STATS_TX_DROPS = 7,
+ VNIFILTER_ENTRY_STATS_TX_ERRORS = 8,
+ VNIFILTER_ENTRY_STATS_PAD = 9,
+ __VNIFILTER_ENTRY_STATS_MAX = 10,
+};
+
+enum {
+ VXLAN_VNIFILTER_ENTRY_UNSPEC = 0,
+ VXLAN_VNIFILTER_ENTRY_START = 1,
+ VXLAN_VNIFILTER_ENTRY_END = 2,
+ VXLAN_VNIFILTER_ENTRY_GROUP = 3,
+ VXLAN_VNIFILTER_ENTRY_GROUP6 = 4,
+ VXLAN_VNIFILTER_ENTRY_STATS = 5,
+ __VXLAN_VNIFILTER_ENTRY_MAX = 6,
+};
+
+enum {
+ VXLAN_VNIFILTER_UNSPEC = 0,
+ VXLAN_VNIFILTER_ENTRY = 1,
+ __VXLAN_VNIFILTER_MAX = 2,
+};
+
+struct trace_event_raw_kfree_skb {
+ struct trace_entry ent;
+ void *skbaddr;
+ void *location;
+ short unsigned int protocol;
+ enum skb_drop_reason reason;
+ char __data[0];
+};
+
+struct trace_event_raw_consume_skb {
+ struct trace_entry ent;
+ void *skbaddr;
+ char __data[0];
+};
+
+struct trace_event_raw_skb_copy_datagram_iovec {
+ struct trace_entry ent;
+ const void *skbaddr;
+ int len;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_kfree_skb {};
+
+struct trace_event_data_offsets_consume_skb {};
+
+struct trace_event_data_offsets_skb_copy_datagram_iovec {};
+
+typedef void (*btf_trace_kfree_skb)(void *, struct sk_buff *, void *, enum skb_drop_reason);
+
+typedef void (*btf_trace_consume_skb)(void *, struct sk_buff *);
+
+typedef void (*btf_trace_skb_copy_datagram_iovec)(void *, const struct sk_buff *, int);
+
+struct trace_event_raw_net_dev_start_xmit {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ u16 queue_mapping;
+ const void *skbaddr;
+ bool vlan_tagged;
+ u16 vlan_proto;
+ u16 vlan_tci;
+ u16 protocol;
+ u8 ip_summed;
+ unsigned int len;
+ unsigned int data_len;
+ int network_offset;
+ bool transport_offset_valid;
+ int transport_offset;
+ u8 tx_flags;
+ u16 gso_size;
+ u16 gso_segs;
+ u16 gso_type;
+ char __data[0];
+};
+
+struct trace_event_raw_net_dev_xmit {
+ struct trace_entry ent;
+ void *skbaddr;
+ unsigned int len;
+ int rc;
+ u32 __data_loc_name;
+ char __data[0];
+};
+
+struct trace_event_raw_net_dev_xmit_timeout {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ u32 __data_loc_driver;
+ int queue_index;
+ char __data[0];
+};
+
+struct trace_event_raw_net_dev_template {
+ struct trace_entry ent;
+ void *skbaddr;
+ unsigned int len;
+ u32 __data_loc_name;
+ char __data[0];
+};
+
+struct trace_event_raw_net_dev_rx_verbose_template {
+ struct trace_entry ent;
+ u32 __data_loc_name;
+ unsigned int napi_id;
+ u16 queue_mapping;
+ const void *skbaddr;
+ bool vlan_tagged;
+ u16 vlan_proto;
+ u16 vlan_tci;
+ u16 protocol;
+ u8 ip_summed;
+ u32 hash;
+ bool l4_hash;
+ unsigned int len;
+ unsigned int data_len;
+ unsigned int truesize;
+ bool mac_header_valid;
+ int mac_header;
+ unsigned char nr_frags;
+ u16 gso_size;
+ u16 gso_type;
+ char __data[0];
+};
+
+struct trace_event_raw_net_dev_rx_exit_template {
+ struct trace_entry ent;
+ int ret;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_net_dev_start_xmit {
+ u32 name;
+};
+
+struct trace_event_data_offsets_net_dev_xmit {
+ u32 name;
+};
+
+struct trace_event_data_offsets_net_dev_xmit_timeout {
+ u32 name;
+ u32 driver;
+};
+
+struct trace_event_data_offsets_net_dev_template {
+ u32 name;
+};
+
+struct trace_event_data_offsets_net_dev_rx_verbose_template {
+ u32 name;
+};
+
+struct trace_event_data_offsets_net_dev_rx_exit_template {};
+
+typedef void (*btf_trace_net_dev_start_xmit)(void *, const struct sk_buff *, const struct net_device *);
+
+typedef void (*btf_trace_net_dev_xmit)(void *, struct sk_buff *, int, struct net_device *, unsigned int);
+
+typedef void (*btf_trace_net_dev_xmit_timeout)(void *, struct net_device *, int);
+
+typedef void (*btf_trace_net_dev_queue)(void *, struct sk_buff *);
+
+typedef void (*btf_trace_netif_receive_skb)(void *, struct sk_buff *);
+
+typedef void (*btf_trace_netif_rx)(void *, struct sk_buff *);
+
+typedef void (*btf_trace_napi_gro_frags_entry)(void *, const struct sk_buff *);
+
+typedef void (*btf_trace_napi_gro_receive_entry)(void *, const struct sk_buff *);
+
+typedef void (*btf_trace_netif_receive_skb_entry)(void *, const struct sk_buff *);
+
+typedef void (*btf_trace_netif_receive_skb_list_entry)(void *, const struct sk_buff *);
+
+typedef void (*btf_trace_netif_rx_entry)(void *, const struct sk_buff *);
+
+typedef void (*btf_trace_napi_gro_frags_exit)(void *, int);
+
+typedef void (*btf_trace_napi_gro_receive_exit)(void *, int);
+
+typedef void (*btf_trace_netif_receive_skb_exit)(void *, int);
+
+typedef void (*btf_trace_netif_rx_exit)(void *, int);
+
+typedef void (*btf_trace_netif_receive_skb_list_exit)(void *, int);
+
+struct trace_event_raw_napi_poll {
+ struct trace_entry ent;
+ struct napi_struct *napi;
+ u32 __data_loc_dev_name;
+ int work;
+ int budget;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_napi_poll {
+ u32 dev_name;
+};
+
+typedef void (*btf_trace_napi_poll)(void *, struct napi_struct *, int, int);
+
+struct trace_event_raw_sock_rcvqueue_full {
+ struct trace_entry ent;
+ int rmem_alloc;
+ unsigned int truesize;
+ int sk_rcvbuf;
+ char __data[0];
+};
+
+struct trace_event_raw_sock_exceed_buf_limit {
+ struct trace_entry ent;
+ char name[32];
+ long int sysctl_mem[3];
+ long int allocated;
+ int sysctl_rmem;
+ int rmem_alloc;
+ int sysctl_wmem;
+ int wmem_alloc;
+ int wmem_queued;
+ int kind;
+ char __data[0];
+};
+
+struct trace_event_raw_inet_sock_set_state {
+ struct trace_entry ent;
+ const void *skaddr;
+ int oldstate;
+ int newstate;
+ __u16 sport;
+ __u16 dport;
+ __u16 family;
+ __u16 protocol;
+ __u8 saddr[4];
+ __u8 daddr[4];
+ __u8 saddr_v6[16];
+ __u8 daddr_v6[16];
+ char __data[0];
+};
+
+struct trace_event_raw_inet_sk_error_report {
+ struct trace_entry ent;
+ int error;
+ __u16 sport;
+ __u16 dport;
+ __u16 family;
+ __u16 protocol;
+ __u8 saddr[4];
+ __u8 daddr[4];
+ __u8 saddr_v6[16];
+ __u8 daddr_v6[16];
+ char __data[0];
+};
+
+struct trace_event_data_offsets_sock_rcvqueue_full {};
+
+struct trace_event_data_offsets_sock_exceed_buf_limit {};
+
+struct trace_event_data_offsets_inet_sock_set_state {};
+
+struct trace_event_data_offsets_inet_sk_error_report {};
+
+typedef void (*btf_trace_sock_rcvqueue_full)(void *, struct sock *, struct sk_buff *);
+
+typedef void (*btf_trace_sock_exceed_buf_limit)(void *, struct sock *, struct proto *, long int, int);
+
+typedef void (*btf_trace_inet_sock_set_state)(void *, const struct sock *, const int, const int);
+
+typedef void (*btf_trace_inet_sk_error_report)(void *, const struct sock *);
+
+struct trace_event_raw_udp_fail_queue_rcv_skb {
+ struct trace_entry ent;
+ int rc;
+ __u16 lport;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_udp_fail_queue_rcv_skb {};
+
+typedef void (*btf_trace_udp_fail_queue_rcv_skb)(void *, int, struct sock *);
+
+struct trace_event_raw_tcp_event_sk_skb {
+ struct trace_entry ent;
+ const void *skbaddr;
+ const void *skaddr;
+ int state;
+ __u16 sport;
+ __u16 dport;
+ __u16 family;
+ __u8 saddr[4];
+ __u8 daddr[4];
+ __u8 saddr_v6[16];
+ __u8 daddr_v6[16];
+ char __data[0];
+};
+
+struct trace_event_raw_tcp_event_sk {
+ struct trace_entry ent;
+ const void *skaddr;
+ __u16 sport;
+ __u16 dport;
+ __u16 family;
+ __u8 saddr[4];
+ __u8 daddr[4];
+ __u8 saddr_v6[16];
+ __u8 daddr_v6[16];
+ __u64 sock_cookie;
+ char __data[0];
+};
+
+struct trace_event_raw_tcp_retransmit_synack {
+ struct trace_entry ent;
+ const void *skaddr;
+ const void *req;
+ __u16 sport;
+ __u16 dport;
+ __u16 family;
+ __u8 saddr[4];
+ __u8 daddr[4];
+ __u8 saddr_v6[16];
+ __u8 daddr_v6[16];
+ char __data[0];
+};
+
+struct trace_event_raw_tcp_probe {
+ struct trace_entry ent;
+ __u8 saddr[28];
+ __u8 daddr[28];
+ __u16 sport;
+ __u16 dport;
+ __u16 family;
+ __u32 mark;
+ __u16 data_len;
+ __u32 snd_nxt;
+ __u32 snd_una;
+ __u32 snd_cwnd;
+ __u32 ssthresh;
+ __u32 snd_wnd;
+ __u32 srtt;
+ __u32 rcv_wnd;
+ __u64 sock_cookie;
+ char __data[0];
+};
+
+struct trace_event_raw_tcp_event_skb {
+ struct trace_entry ent;
+ const void *skbaddr;
+ __u8 saddr[28];
+ __u8 daddr[28];
+ char __data[0];
+};
+
+struct trace_event_raw_tcp_cong_state_set {
+ struct trace_entry ent;
+ const void *skaddr;
+ __u16 sport;
+ __u16 dport;
+ __u8 saddr[4];
+ __u8 daddr[4];
+ __u8 saddr_v6[16];
+ __u8 daddr_v6[16];
+ __u8 cong_state;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_tcp_event_sk_skb {};
+
+struct trace_event_data_offsets_tcp_event_sk {};
+
+struct trace_event_data_offsets_tcp_retransmit_synack {};
+
+struct trace_event_data_offsets_tcp_probe {};
+
+struct trace_event_data_offsets_tcp_event_skb {};
+
+struct trace_event_data_offsets_tcp_cong_state_set {};
+
+typedef void (*btf_trace_tcp_retransmit_skb)(void *, const struct sock *, const struct sk_buff *);
+
+typedef void (*btf_trace_tcp_send_reset)(void *, const struct sock *, const struct sk_buff *);
+
+typedef void (*btf_trace_tcp_receive_reset)(void *, struct sock *);
+
+typedef void (*btf_trace_tcp_destroy_sock)(void *, struct sock *);
+
+typedef void (*btf_trace_tcp_rcv_space_adjust)(void *, struct sock *);
+
+typedef void (*btf_trace_tcp_retransmit_synack)(void *, const struct sock *, const struct request_sock *);
+
+typedef void (*btf_trace_tcp_probe)(void *, struct sock *, struct sk_buff *);
+
+typedef void (*btf_trace_tcp_bad_csum)(void *, const struct sk_buff *);
+
+typedef void (*btf_trace_tcp_cong_state_set)(void *, struct sock *, const u8);
+
+struct trace_event_raw_fib_table_lookup {
+ struct trace_entry ent;
+ u32 tb_id;
+ int err;
+ int oif;
+ int iif;
+ u8 proto;
+ __u8 tos;
+ __u8 scope;
+ __u8 flags;
+ __u8 src[4];
+ __u8 dst[4];
+ __u8 gw4[4];
+ __u8 gw6[16];
+ u16 sport;
+ u16 dport;
+ char name[16];
+ char __data[0];
+};
+
+struct trace_event_data_offsets_fib_table_lookup {};
+
+typedef void (*btf_trace_fib_table_lookup)(void *, u32, const struct flowi4 *, const struct fib_nh_common *, int);
+
+struct trace_event_raw_qdisc_dequeue {
+ struct trace_entry ent;
+ struct Qdisc *qdisc;
+ const struct netdev_queue *txq;
+ int packets;
+ void *skbaddr;
+ int ifindex;
+ u32 handle;
+ u32 parent;
+ long unsigned int txq_state;
+ char __data[0];
+};
+
+struct trace_event_raw_qdisc_enqueue {
+ struct trace_entry ent;
+ struct Qdisc *qdisc;
+ const struct netdev_queue *txq;
+ void *skbaddr;
+ int ifindex;
+ u32 handle;
+ u32 parent;
+ char __data[0];
+};
+
+struct trace_event_raw_qdisc_reset {
+ struct trace_entry ent;
+ u32 __data_loc_dev;
+ u32 __data_loc_kind;
+ u32 parent;
+ u32 handle;
+ char __data[0];
+};
+
+struct trace_event_raw_qdisc_destroy {
+ struct trace_entry ent;
+ u32 __data_loc_dev;
+ u32 __data_loc_kind;
+ u32 parent;
+ u32 handle;
+ char __data[0];
+};
+
+struct trace_event_raw_qdisc_create {
+ struct trace_entry ent;
+ u32 __data_loc_dev;
+ u32 __data_loc_kind;
+ u32 parent;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_qdisc_dequeue {};
+
+struct trace_event_data_offsets_qdisc_enqueue {};
+
+struct trace_event_data_offsets_qdisc_reset {
+ u32 dev;
+ u32 kind;
+};
+
+struct trace_event_data_offsets_qdisc_destroy {
+ u32 dev;
+ u32 kind;
+};
+
+struct trace_event_data_offsets_qdisc_create {
+ u32 dev;
+ u32 kind;
+};
+
+typedef void (*btf_trace_qdisc_dequeue)(void *, struct Qdisc *, const struct netdev_queue *, int, struct sk_buff *);
+
+typedef void (*btf_trace_qdisc_enqueue)(void *, struct Qdisc *, const struct netdev_queue *, struct sk_buff *);
+
+typedef void (*btf_trace_qdisc_reset)(void *, struct Qdisc *);
+
+typedef void (*btf_trace_qdisc_destroy)(void *, struct Qdisc *);
+
+typedef void (*btf_trace_qdisc_create)(void *, const struct Qdisc_ops *, struct net_device *, u32);
+
+struct trace_event_raw_page_pool_release {
+ struct trace_entry ent;
+ const struct page_pool *pool;
+ s32 inflight;
+ u32 hold;
+ u32 release;
+ u64 cnt;
+ char __data[0];
+};
+
+struct trace_event_raw_page_pool_state_release {
+ struct trace_entry ent;
+ const struct page_pool *pool;
+ const struct page *page;
+ u32 release;
+ long unsigned int pfn;
+ char __data[0];
+};
+
+struct trace_event_raw_page_pool_state_hold {
+ struct trace_entry ent;
+ const struct page_pool *pool;
+ const struct page *page;
+ u32 hold;
+ long unsigned int pfn;
+ char __data[0];
+};
+
+struct trace_event_raw_page_pool_update_nid {
+ struct trace_entry ent;
+ const struct page_pool *pool;
+ int pool_nid;
+ int new_nid;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_page_pool_release {};
+
+struct trace_event_data_offsets_page_pool_state_release {};
+
+struct trace_event_data_offsets_page_pool_state_hold {};
+
+struct trace_event_data_offsets_page_pool_update_nid {};
+
+typedef void (*btf_trace_page_pool_release)(void *, const struct page_pool *, s32, u32, u32);
+
+typedef void (*btf_trace_page_pool_state_release)(void *, const struct page_pool *, const struct page *, u32);
+
+typedef void (*btf_trace_page_pool_state_hold)(void *, const struct page_pool *, const struct page *, u32);
+
+typedef void (*btf_trace_page_pool_update_nid)(void *, const struct page_pool *, int);
+
+struct trace_event_raw_neigh_create {
+ struct trace_entry ent;
+ u32 family;
+ u32 __data_loc_dev;
+ int entries;
+ u8 created;
+ u8 gc_exempt;
+ u8 primary_key4[4];
+ u8 primary_key6[16];
+ char __data[0];
+};
+
+struct trace_event_raw_neigh_update {
+ struct trace_entry ent;
+ u32 family;
+ u32 __data_loc_dev;
+ u8 lladdr[32];
+ u8 lladdr_len;
+ u8 flags;
+ u8 nud_state;
+ u8 type;
+ u8 dead;
+ int refcnt;
+ __u8 primary_key4[4];
+ __u8 primary_key6[16];
+ long unsigned int confirmed;
+ long unsigned int updated;
+ long unsigned int used;
+ u8 new_lladdr[32];
+ u8 new_state;
+ u32 update_flags;
+ u32 pid;
+ char __data[0];
+};
+
+struct trace_event_raw_neigh__update {
+ struct trace_entry ent;
+ u32 family;
+ u32 __data_loc_dev;
+ u8 lladdr[32];
+ u8 lladdr_len;
+ u8 flags;
+ u8 nud_state;
+ u8 type;
+ u8 dead;
+ int refcnt;
+ __u8 primary_key4[4];
+ __u8 primary_key6[16];
+ long unsigned int confirmed;
+ long unsigned int updated;
+ long unsigned int used;
+ u32 err;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_neigh_create {
+ u32 dev;
+};
+
+struct trace_event_data_offsets_neigh_update {
+ u32 dev;
+};
+
+struct trace_event_data_offsets_neigh__update {
+ u32 dev;
+};
+
+typedef void (*btf_trace_neigh_create)(void *, struct neigh_table *, struct net_device *, const void *, const struct neighbour *, bool);
+
+typedef void (*btf_trace_neigh_update)(void *, struct neighbour *, const u8 *, u8, u32, u32);
+
+typedef void (*btf_trace_neigh_update_done)(void *, struct neighbour *, int);
+
+typedef void (*btf_trace_neigh_timer_handler)(void *, struct neighbour *, int);
+
+typedef void (*btf_trace_neigh_event_send_done)(void *, struct neighbour *, int);
+
+typedef void (*btf_trace_neigh_event_send_dead)(void *, struct neighbour *, int);
+
+typedef void (*btf_trace_neigh_cleanup_and_release)(void *, struct neighbour *, int);
+
+struct unix_stream_read_state {
+ int (*recv_actor)(struct sk_buff *, int, int, struct unix_stream_read_state *);
+ struct socket *socket;
+ struct msghdr *msg;
+ struct pipe_inode_info *pipe;
+ size_t size;
+ int flags;
+ unsigned int splice_flags;
+};
+
+struct bpf_unix_iter_state {
+ struct seq_net_private p;
+ unsigned int cur_sk;
+ unsigned int end_sk;
+ unsigned int max_sk;
+ struct sock **batch;
+ bool st_bucket_done;
+};
+
+struct bpf_iter__unix {
+ union {
+ struct bpf_iter_meta *meta;
+ };
+ union {
+ struct unix_sock *unix_sk;
+ };
+ uid_t uid;
+};
+
+struct acpi_pci_root_ops;
+
+struct acpi_pci_root_info {
+ struct acpi_pci_root *root;
+ struct acpi_device *bridge;
+ struct acpi_pci_root_ops *ops;
+ struct list_head resources;
+ char name[16];
+};
+
+struct acpi_pci_root_ops {
+ struct pci_ops *pci_ops;
+ int (*init_info)(struct acpi_pci_root_info *);
+ void (*release_info)(struct acpi_pci_root_info *);
+ int (*prepare_resources)(struct acpi_pci_root_info *);
+};
+
+struct pci_root_info___2 {
+ struct acpi_pci_root_info common;
+ struct pci_sysdata sd;
+ bool mcfg_added;
+ u8 start_bus;
+ u8 end_bus;
+};
+
+struct mtrr_sentry {
+ __u64 base;
+ __u32 size;
+ __u32 type;
+};
+
+struct mtrr_gentry {
+ __u64 base;
+ __u32 size;
+ __u32 regnum;
+ __u32 type;
+ __u32 _pad;
+};
+
+enum rwsem_waiter_type {
+ RWSEM_WAITING_FOR_WRITE = 0,
+ RWSEM_WAITING_FOR_READ = 1,
+};
+
+struct rwsem_waiter {
+ struct list_head list;
+ struct task_struct *task;
+ enum rwsem_waiter_type type;
+ long unsigned int timeout;
+ bool handoff_set;
+};
+
+enum rwsem_wake_type {
+ RWSEM_WAKE_ANY = 0,
+ RWSEM_WAKE_READERS = 1,
+ RWSEM_WAKE_READ_OWNED = 2,
+};
+
+enum owner_state {
+ OWNER_NULL = 1,
+ OWNER_WRITER = 2,
+ OWNER_READER = 4,
+ OWNER_NONSPINNABLE = 8,
+};
+
+enum ftrace_bug_type {
+ FTRACE_BUG_UNKNOWN = 0,
+ FTRACE_BUG_INIT = 1,
+ FTRACE_BUG_NOP = 2,
+ FTRACE_BUG_CALL = 3,
+ FTRACE_BUG_UPDATE = 4,
+};
+
+enum {
+ FTRACE_ITER_FILTER = 1,
+ FTRACE_ITER_NOTRACE = 2,
+ FTRACE_ITER_PRINTALL = 4,
+ FTRACE_ITER_DO_PROBES = 8,
+ FTRACE_ITER_PROBE = 16,
+ FTRACE_ITER_MOD = 32,
+ FTRACE_ITER_ENABLED = 64,
+};
+
+struct ftrace_mod_load {
+ struct list_head list;
+ char *func;
+ char *module;
+ int enable;
+};
+
+enum {
+ FTRACE_MODIFY_ENABLE_FL = 1,
+ FTRACE_MODIFY_MAY_SLEEP_FL = 2,
+};
+
+struct ftrace_func_probe {
+ struct ftrace_probe_ops *probe_ops;
+ struct ftrace_ops ops;
+ struct trace_array *tr;
+ struct list_head list;
+ void *data;
+ int ref;
+};
+
+struct ftrace_page {
+ struct ftrace_page *next;
+ struct dyn_ftrace *records;
+ int index;
+ int order;
+};
+
+struct ftrace_rec_iter {
+ struct ftrace_page *pg;
+ int index;
+};
+
+struct ftrace_iterator {
+ loff_t pos;
+ loff_t func_pos;
+ loff_t mod_pos;
+ struct ftrace_page *pg;
+ struct dyn_ftrace *func;
+ struct ftrace_func_probe *probe;
+ struct ftrace_func_entry *probe_entry;
+ struct trace_parser parser;
+ struct ftrace_hash *hash;
+ struct ftrace_ops *ops;
+ struct trace_array *tr;
+ struct list_head *mod_list;
+ int pidx;
+ int idx;
+ unsigned int flags;
+};
+
+struct ftrace_glob {
+ char *search;
+ unsigned int len;
+ int type;
+};
+
+struct ftrace_func_map {
+ struct ftrace_func_entry entry;
+ void *data;
+};
+
+struct ftrace_func_mapper {
+ struct ftrace_hash hash;
+};
+
+struct ftrace_direct_func {
+ struct list_head next;
+ long unsigned int addr;
+ int count;
+};
+
+enum graph_filter_type {
+ GRAPH_FILTER_NOTRACE = 0,
+ GRAPH_FILTER_FUNCTION = 1,
+};
+
+struct ftrace_graph_data {
+ struct ftrace_hash *hash;
+ struct ftrace_func_entry *entry;
+ int idx;
+ enum graph_filter_type type;
+ struct ftrace_hash *new_hash;
+ const struct seq_operations *seq_ops;
+ struct trace_parser parser;
+};
+
+struct ftrace_mod_func {
+ struct list_head list;
+ char *name;
+ long unsigned int ip;
+ unsigned int size;
+};
+
+struct ftrace_mod_map {
+ struct callback_head rcu;
+ struct list_head list;
+ struct module *mod;
+ long unsigned int start_addr;
+ long unsigned int end_addr;
+ struct list_head funcs;
+ unsigned int num_funcs;
+};
+
+struct ftrace_init_func {
+ struct list_head list;
+ long unsigned int ip;
+};
+
+struct kallsyms_data {
+ long unsigned int *addrs;
+ const char **syms;
+ size_t cnt;
+ size_t found;
+};
+
+struct posix_acl_xattr_entry {
+ __le16 e_tag;
+ __le16 e_perm;
+ __le32 e_id;
+};
+
+struct posix_acl_xattr_header {
+ __le32 a_version;
+};
+
+struct ext4_getfsmap_info {
+ struct ext4_fsmap_head *gfi_head;
+ ext4_fsmap_format_t gfi_formatter;
+ void *gfi_format_arg;
+ ext4_fsblk_t gfi_next_fsblk;
+ u32 gfi_dev;
+ ext4_group_t gfi_agno;
+ struct ext4_fsmap gfi_low;
+ struct ext4_fsmap gfi_high;
+ struct ext4_fsmap gfi_lastfree;
+ struct list_head gfi_meta_list;
+ bool gfi_last;
+};
+
+struct ext4_getfsmap_dev {
+ int (*gfd_fn)(struct super_block *, struct ext4_fsmap *, struct ext4_getfsmap_info *);
+ u32 gfd_dev;
+};
+
+struct dw_dma_slave {
+ struct device *dma_dev;
+ u8 src_id;
+ u8 dst_id;
+ u8 m_master;
+ u8 p_master;
+ u8 channels;
+ bool hs_polarity;
+};
+
+struct dw_dma_platform_data {
+ u32 nr_masters;
+ u32 nr_channels;
+ u32 chan_allocation_order;
+ u32 chan_priority;
+ u32 block_size;
+ u32 data_width[4];
+ u32 multi_block[8];
+ u32 max_burst[8];
+ u32 protctl;
+ u32 quirks;
+};
+
+struct dw_dma;
+
+struct dw_dma_chip {
+ struct device *dev;
+ int id;
+ int irq;
+ void *regs;
+ struct clk *clk;
+ struct dw_dma *dw;
+ const struct dw_dma_platform_data *pdata;
+};
+
+struct dw8250_port_data {
+ int line;
+ struct uart_8250_dma dma;
+ u8 dlf_size;
+ bool hw_rs485_support;
+};
+
+struct lpss8250;
+
+struct lpss8250_board {
+ long unsigned int freq;
+ unsigned int base_baud;
+ int (*setup)(struct lpss8250 *, struct uart_port *);
+ void (*exit)(struct lpss8250 *);
+};
+
+struct lpss8250 {
+ struct dw8250_port_data data;
+ struct lpss8250_board *board;
+ struct dw_dma_chip dma_chip;
+ struct dw_dma_slave dma_param;
+ u8 dma_maxburst;
+};
+
+struct powernow_k8_data {
+ unsigned int cpu;
+ u32 numps;
+ u32 batps;
+ u32 rvo;
+ u32 irt;
+ u32 vidmvs;
+ u32 vstable;
+ u32 plllock;
+ u32 exttype;
+ u32 currvid;
+ u32 currfid;
+ struct cpufreq_frequency_table *powernow_table;
+ struct acpi_processor_performance acpi_data;
+ struct cpumask *available_cores;
+};
+
+struct psb_s {
+ u8 signature[10];
+ u8 tableversion;
+ u8 flags1;
+ u16 vstable;
+ u8 flags2;
+ u8 num_tables;
+ u32 cpuid;
+ u8 plllocktime;
+ u8 maxfid;
+ u8 maxvid;
+ u8 numps;
+};
+
+struct pst_s {
+ u8 fid;
+ u8 vid;
+};
+
+struct powernowk8_target_arg {
+ struct cpufreq_policy *pol;
+ unsigned int newstate;
+};
+
+struct init_on_cpu {
+ struct powernow_k8_data *data;
+ int rc;
+};
+
+enum ethtool_supported_ring_param {
+ ETHTOOL_RING_USE_RX_BUF_LEN = 1,
+ ETHTOOL_RING_USE_CQE_SIZE = 2,
+ ETHTOOL_RING_USE_TX_PUSH = 4,
+};
+
+enum {
+ ETHTOOL_TCP_DATA_SPLIT_UNKNOWN = 0,
+ ETHTOOL_TCP_DATA_SPLIT_DISABLED = 1,
+ ETHTOOL_TCP_DATA_SPLIT_ENABLED = 2,
+};
+
+struct rings_reply_data {
+ struct ethnl_reply_data base;
+ struct ethtool_ringparam ringparam;
+ struct kernel_ethtool_ringparam kernel_ringparam;
+};
+
+struct xt_tcp {
+ __u16 spts[2];
+ __u16 dpts[2];
+ __u8 option;
+ __u8 flg_mask;
+ __u8 flg_cmp;
+ __u8 invflags;
+};
+
+struct xt_udp {
+ __u16 spts[2];
+ __u16 dpts[2];
+ __u8 invflags;
+};
+
+enum {
+ NLBL_CALIPSO_C_UNSPEC = 0,
+ NLBL_CALIPSO_C_ADD = 1,
+ NLBL_CALIPSO_C_REMOVE = 2,
+ NLBL_CALIPSO_C_LIST = 3,
+ NLBL_CALIPSO_C_LISTALL = 4,
+ __NLBL_CALIPSO_C_MAX = 5,
+};
+
+enum {
+ NLBL_CALIPSO_A_UNSPEC = 0,
+ NLBL_CALIPSO_A_DOI = 1,
+ NLBL_CALIPSO_A_MTYPE = 2,
+ __NLBL_CALIPSO_A_MAX = 3,
+};
+
+struct netlbl_calipso_doiwalk_arg {
+ struct netlink_callback *nl_cb;
+ struct sk_buff *skb;
+ u32 seq;
+};
+
+struct map_range {
+ long unsigned int start;
+ long unsigned int end;
+ unsigned int page_size_mask;
+};
+
+struct memory_tier {
+ struct list_head list;
+ struct list_head memory_types;
+ int adistance_start;
+ struct device dev;
+ nodemask_t lower_tier_mask;
+};
+
+struct memory_notify {
+ long unsigned int start_pfn;
+ long unsigned int nr_pages;
+ int status_change_nid_normal;
+ int status_change_nid;
+};
+
+struct memory_dev_type {
+ struct list_head tier_sibiling;
+ int adistance;
+ nodemask_t nodes;
+ struct kref kref;
+};
+
+struct demotion_nodes {
+ nodemask_t preferred;
+};
+
+struct node_memory_type_map {
+ struct memory_dev_type *memtype;
+ int map_count;
+};
+
+enum vfs_get_super_keying {
+ vfs_get_single_super = 0,
+ vfs_get_single_reconf_super = 1,
+ vfs_get_keyed_super = 2,
+ vfs_get_independent_super = 3,
+};
+
+struct decrypt_bh_ctx {
+ struct work_struct work;
+ struct buffer_head *bh;
+};
+
+struct bh_lru {
+ struct buffer_head *bhs[16];
+};
+
+struct bh_accounting {
+ int nr;
+ int ratelimit;
+};
+
+enum acpi_bridge_type {
+ ACPI_BRIDGE_TYPE_PCIE = 1,
+ ACPI_BRIDGE_TYPE_CXL = 2,
+};
+
+struct pci_osc_bit_struct {
+ u32 bit;
+ char *desc;
+};
+
+struct aper_size_info_lvl2 {
+ int size;
+ int num_entries;
+ u32 size_value;
+};
+
+enum {
+ VMGENID_SIZE = 16,
+};
+
+struct vmgenid_state {
+ u8 *next_id;
+ u8 this_id[16];
+};
+
+struct dim_sample {
+ ktime_t time;
+ u32 pkt_ctr;
+ u32 byte_ctr;
+ u16 event_ctr;
+ u32 comp_ctr;
+};
+
+struct dim_stats {
+ int ppms;
+ int bpms;
+ int epms;
+ int cpms;
+ int cpe_ratio;
+};
+
+struct dim {
+ u8 state;
+ struct dim_stats prev_stats;
+ struct dim_sample start_sample;
+ struct dim_sample measuring_sample;
+ struct work_struct work;
+ void *priv;
+ u8 profile_ix;
+ u8 mode;
+ u8 tune_state;
+ u8 steps_right;
+ u8 steps_left;
+ u8 tired;
+};
+
+enum rdma_nl_counter_mode {
+ RDMA_COUNTER_MODE_NONE = 0,
+ RDMA_COUNTER_MODE_AUTO = 1,
+ RDMA_COUNTER_MODE_MANUAL = 2,
+ RDMA_COUNTER_MODE_MAX = 3,
+};
+
+enum rdma_nl_counter_mask {
+ RDMA_COUNTER_MASK_QP_TYPE = 1,
+ RDMA_COUNTER_MASK_PID = 2,
+};
+
+enum rdma_restrack_type {
+ RDMA_RESTRACK_PD = 0,
+ RDMA_RESTRACK_CQ = 1,
+ RDMA_RESTRACK_QP = 2,
+ RDMA_RESTRACK_CM_ID = 3,
+ RDMA_RESTRACK_MR = 4,
+ RDMA_RESTRACK_CTX = 5,
+ RDMA_RESTRACK_COUNTER = 6,
+ RDMA_RESTRACK_SRQ = 7,
+ RDMA_RESTRACK_MAX = 8,
+};
+
+struct rdma_restrack_entry {
+ bool valid;
+ u8 no_track: 1;
+ struct kref kref;
+ struct completion comp;
+ struct task_struct *task;
+ const char *kern_name;
+ enum rdma_restrack_type type;
+ bool user;
+ u32 id;
+};
+
+struct rdma_link_ops {
+ struct list_head list;
+ const char *type;
+ int (*newlink)(const char *, struct net_device *);
+};
+
+struct auto_mode_param {
+ int qp_type;
+};
+
+struct rdma_counter_mode {
+ enum rdma_nl_counter_mode mode;
+ enum rdma_nl_counter_mask mask;
+ struct auto_mode_param param;
+};
+
+struct rdma_hw_stats;
+
+struct rdma_port_counter {
+ struct rdma_counter_mode mode;
+ struct rdma_hw_stats *hstats;
+ unsigned int num_counters;
+ struct mutex lock;
+};
+
+struct rdma_stat_desc;
+
+struct rdma_hw_stats {
+ struct mutex lock;
+ long unsigned int timestamp;
+ long unsigned int lifespan;
+ const struct rdma_stat_desc *descs;
+ long unsigned int *is_disabled;
+ int num_counters;
+ u64 value[0];
+};
+
+struct rdma_counter {
+ struct rdma_restrack_entry res;
+ struct ib_device *device;
+ uint32_t id;
+ struct kref kref;
+ struct rdma_counter_mode mode;
+ struct mutex lock;
+ struct rdma_hw_stats *stats;
+ u32 port;
+};
+
+enum rdma_driver_id {
+ RDMA_DRIVER_UNKNOWN = 0,
+ RDMA_DRIVER_MLX5 = 1,
+ RDMA_DRIVER_MLX4 = 2,
+ RDMA_DRIVER_CXGB3 = 3,
+ RDMA_DRIVER_CXGB4 = 4,
+ RDMA_DRIVER_MTHCA = 5,
+ RDMA_DRIVER_BNXT_RE = 6,
+ RDMA_DRIVER_OCRDMA = 7,
+ RDMA_DRIVER_NES = 8,
+ RDMA_DRIVER_I40IW = 9,
+ RDMA_DRIVER_IRDMA = 9,
+ RDMA_DRIVER_VMW_PVRDMA = 10,
+ RDMA_DRIVER_QEDR = 11,
+ RDMA_DRIVER_HNS = 12,
+ RDMA_DRIVER_USNIC = 13,
+ RDMA_DRIVER_RXE = 14,
+ RDMA_DRIVER_HFI1 = 15,
+ RDMA_DRIVER_QIB = 16,
+ RDMA_DRIVER_EFA = 17,
+ RDMA_DRIVER_SIW = 18,
+ RDMA_DRIVER_ERDMA = 19,
+};
+
+enum ib_cq_notify_flags {
+ IB_CQ_SOLICITED = 1,
+ IB_CQ_NEXT_COMP = 2,
+ IB_CQ_SOLICITED_MASK = 3,
+ IB_CQ_REPORT_MISSED_EVENTS = 4,
+};
+
+struct ib_mad;
+
+enum rdma_link_layer {
+ IB_LINK_LAYER_UNSPECIFIED = 0,
+ IB_LINK_LAYER_INFINIBAND = 1,
+ IB_LINK_LAYER_ETHERNET = 2,
+};
+
+enum rdma_netdev_t {
+ RDMA_NETDEV_OPA_VNIC = 0,
+ RDMA_NETDEV_IPOIB = 1,
+};
+
+enum ib_srq_attr_mask {
+ IB_SRQ_MAX_WR = 1,
+ IB_SRQ_LIMIT = 2,
+};
+
+enum ib_mr_type {
+ IB_MR_TYPE_MEM_REG = 0,
+ IB_MR_TYPE_SG_GAPS = 1,
+ IB_MR_TYPE_DM = 2,
+ IB_MR_TYPE_USER = 3,
+ IB_MR_TYPE_DMA = 4,
+ IB_MR_TYPE_INTEGRITY = 5,
+};
+
+enum ib_uverbs_advise_mr_advice {
+ IB_UVERBS_ADVISE_MR_ADVICE_PREFETCH = 0,
+ IB_UVERBS_ADVISE_MR_ADVICE_PREFETCH_WRITE = 1,
+ IB_UVERBS_ADVISE_MR_ADVICE_PREFETCH_NO_FAULT = 2,
+};
+
+struct uverbs_attr_bundle;
+
+struct rdma_cm_id;
+
+struct iw_cm_id;
+
+struct iw_cm_conn_param;
+
+struct ib_qp;
+
+struct ib_send_wr;
+
+struct ib_recv_wr;
+
+struct ib_cq;
+
+struct ib_wc;
+
+struct ib_srq;
+
+struct ib_grh;
+
+struct ib_device_attr;
+
+struct ib_udata;
+
+struct ib_device_modify;
+
+struct ib_port_attr;
+
+struct ib_port_modify;
+
+struct ib_port_immutable;
+
+struct rdma_netdev_alloc_params;
+
+union ib_gid;
+
+struct ib_gid_attr;
+
+struct ib_ucontext;
+
+struct rdma_user_mmap_entry;
+
+struct ib_pd;
+
+struct ib_ah;
+
+struct rdma_ah_init_attr;
+
+struct rdma_ah_attr;
+
+struct ib_srq_init_attr;
+
+struct ib_srq_attr;
+
+struct ib_qp_init_attr;
+
+struct ib_qp_attr;
+
+struct ib_cq_init_attr;
+
+struct ib_mr;
+
+struct ib_sge;
+
+struct ib_mr_status;
+
+struct ib_mw;
+
+struct ib_xrcd;
+
+struct ib_flow;
+
+struct ib_flow_attr;
+
+struct ib_flow_action;
+
+struct ib_wq;
+
+struct ib_wq_init_attr;
+
+struct ib_wq_attr;
+
+struct ib_rwq_ind_table;
+
+struct ib_rwq_ind_table_init_attr;
+
+struct ib_dm;
+
+struct ib_dm_alloc_attr;
+
+struct ib_dm_mr_attr;
+
+struct ib_counters;
+
+struct ib_counters_read_attr;
+
+struct ib_device_ops {
+ struct module *owner;
+ enum rdma_driver_id driver_id;
+ u32 uverbs_abi_ver;
+ unsigned int uverbs_no_driver_id_binding: 1;
+ const struct attribute_group *device_group;
+ const struct attribute_group **port_groups;
+ int (*post_send)(struct ib_qp *, const struct ib_send_wr *, const struct ib_send_wr **);
+ int (*post_recv)(struct ib_qp *, const struct ib_recv_wr *, const struct ib_recv_wr **);
+ void (*drain_rq)(struct ib_qp *);
+ void (*drain_sq)(struct ib_qp *);
+ int (*poll_cq)(struct ib_cq *, int, struct ib_wc *);
+ int (*peek_cq)(struct ib_cq *, int);
+ int (*req_notify_cq)(struct ib_cq *, enum ib_cq_notify_flags);
+ int (*post_srq_recv)(struct ib_srq *, const struct ib_recv_wr *, const struct ib_recv_wr **);
+ int (*process_mad)(struct ib_device *, int, u32, const struct ib_wc *, const struct ib_grh *, const struct ib_mad *, struct ib_mad *, size_t *, u16 *);
+ int (*query_device)(struct ib_device *, struct ib_device_attr *, struct ib_udata *);
+ int (*modify_device)(struct ib_device *, int, struct ib_device_modify *);
+ void (*get_dev_fw_str)(struct ib_device *, char *);
+ const struct cpumask * (*get_vector_affinity)(struct ib_device *, int);
+ int (*query_port)(struct ib_device *, u32, struct ib_port_attr *);
+ int (*modify_port)(struct ib_device *, u32, int, struct ib_port_modify *);
+ int (*get_port_immutable)(struct ib_device *, u32, struct ib_port_immutable *);
+ enum rdma_link_layer (*get_link_layer)(struct ib_device *, u32);
+ struct net_device * (*get_netdev)(struct ib_device *, u32);
+ struct net_device * (*alloc_rdma_netdev)(struct ib_device *, u32, enum rdma_netdev_t, const char *, unsigned char, void (*)(struct net_device *));
+ int (*rdma_netdev_get_params)(struct ib_device *, u32, enum rdma_netdev_t, struct rdma_netdev_alloc_params *);
+ int (*query_gid)(struct ib_device *, u32, int, union ib_gid *);
+ int (*add_gid)(const struct ib_gid_attr *, void **);
+ int (*del_gid)(const struct ib_gid_attr *, void **);
+ int (*query_pkey)(struct ib_device *, u32, u16, u16 *);
+ int (*alloc_ucontext)(struct ib_ucontext *, struct ib_udata *);
+ void (*dealloc_ucontext)(struct ib_ucontext *);
+ int (*mmap)(struct ib_ucontext *, struct vm_area_struct *);
+ void (*mmap_free)(struct rdma_user_mmap_entry *);
+ void (*disassociate_ucontext)(struct ib_ucontext *);
+ int (*alloc_pd)(struct ib_pd *, struct ib_udata *);
+ int (*dealloc_pd)(struct ib_pd *, struct ib_udata *);
+ int (*create_ah)(struct ib_ah *, struct rdma_ah_init_attr *, struct ib_udata *);
+ int (*create_user_ah)(struct ib_ah *, struct rdma_ah_init_attr *, struct ib_udata *);
+ int (*modify_ah)(struct ib_ah *, struct rdma_ah_attr *);
+ int (*query_ah)(struct ib_ah *, struct rdma_ah_attr *);
+ int (*destroy_ah)(struct ib_ah *, u32);
+ int (*create_srq)(struct ib_srq *, struct ib_srq_init_attr *, struct ib_udata *);
+ int (*modify_srq)(struct ib_srq *, struct ib_srq_attr *, enum ib_srq_attr_mask, struct ib_udata *);
+ int (*query_srq)(struct ib_srq *, struct ib_srq_attr *);
+ int (*destroy_srq)(struct ib_srq *, struct ib_udata *);
+ int (*create_qp)(struct ib_qp *, struct ib_qp_init_attr *, struct ib_udata *);
+ int (*modify_qp)(struct ib_qp *, struct ib_qp_attr *, int, struct ib_udata *);
+ int (*query_qp)(struct ib_qp *, struct ib_qp_attr *, int, struct ib_qp_init_attr *);
+ int (*destroy_qp)(struct ib_qp *, struct ib_udata *);
+ int (*create_cq)(struct ib_cq *, const struct ib_cq_init_attr *, struct ib_udata *);
+ int (*modify_cq)(struct ib_cq *, u16, u16);
+ int (*destroy_cq)(struct ib_cq *, struct ib_udata *);
+ int (*resize_cq)(struct ib_cq *, int, struct ib_udata *);
+ struct ib_mr * (*get_dma_mr)(struct ib_pd *, int);
+ struct ib_mr * (*reg_user_mr)(struct ib_pd *, u64, u64, u64, int, struct ib_udata *);
+ struct ib_mr * (*reg_user_mr_dmabuf)(struct ib_pd *, u64, u64, u64, int, int, struct ib_udata *);
+ struct ib_mr * (*rereg_user_mr)(struct ib_mr *, int, u64, u64, u64, int, struct ib_pd *, struct ib_udata *);
+ int (*dereg_mr)(struct ib_mr *, struct ib_udata *);
+ struct ib_mr * (*alloc_mr)(struct ib_pd *, enum ib_mr_type, u32);
+ struct ib_mr * (*alloc_mr_integrity)(struct ib_pd *, u32, u32);
+ int (*advise_mr)(struct ib_pd *, enum ib_uverbs_advise_mr_advice, u32, struct ib_sge *, u32, struct uverbs_attr_bundle *);
+ int (*map_mr_sg)(struct ib_mr *, struct scatterlist *, int, unsigned int *);
+ int (*check_mr_status)(struct ib_mr *, u32, struct ib_mr_status *);
+ int (*alloc_mw)(struct ib_mw *, struct ib_udata *);
+ int (*dealloc_mw)(struct ib_mw *);
+ int (*attach_mcast)(struct ib_qp *, union ib_gid *, u16);
+ int (*detach_mcast)(struct ib_qp *, union ib_gid *, u16);
+ int (*alloc_xrcd)(struct ib_xrcd *, struct ib_udata *);
+ int (*dealloc_xrcd)(struct ib_xrcd *, struct ib_udata *);
+ struct ib_flow * (*create_flow)(struct ib_qp *, struct ib_flow_attr *, struct ib_udata *);
+ int (*destroy_flow)(struct ib_flow *);
+ int (*destroy_flow_action)(struct ib_flow_action *);
+ int (*set_vf_link_state)(struct ib_device *, int, u32, int);
+ int (*get_vf_config)(struct ib_device *, int, u32, struct ifla_vf_info *);
+ int (*get_vf_stats)(struct ib_device *, int, u32, struct ifla_vf_stats *);
+ int (*get_vf_guid)(struct ib_device *, int, u32, struct ifla_vf_guid *, struct ifla_vf_guid *);
+ int (*set_vf_guid)(struct ib_device *, int, u32, u64, int);
+ struct ib_wq * (*create_wq)(struct ib_pd *, struct ib_wq_init_attr *, struct ib_udata *);
+ int (*destroy_wq)(struct ib_wq *, struct ib_udata *);
+ int (*modify_wq)(struct ib_wq *, struct ib_wq_attr *, u32, struct ib_udata *);
+ int (*create_rwq_ind_table)(struct ib_rwq_ind_table *, struct ib_rwq_ind_table_init_attr *, struct ib_udata *);
+ int (*destroy_rwq_ind_table)(struct ib_rwq_ind_table *);
+ struct ib_dm * (*alloc_dm)(struct ib_device *, struct ib_ucontext *, struct ib_dm_alloc_attr *, struct uverbs_attr_bundle *);
+ int (*dealloc_dm)(struct ib_dm *, struct uverbs_attr_bundle *);
+ struct ib_mr * (*reg_dm_mr)(struct ib_pd *, struct ib_dm *, struct ib_dm_mr_attr *, struct uverbs_attr_bundle *);
+ int (*create_counters)(struct ib_counters *, struct uverbs_attr_bundle *);
+ int (*destroy_counters)(struct ib_counters *);
+ int (*read_counters)(struct ib_counters *, struct ib_counters_read_attr *, struct uverbs_attr_bundle *);
+ int (*map_mr_sg_pi)(struct ib_mr *, struct scatterlist *, int, unsigned int *, struct scatterlist *, int, unsigned int *);
+ struct rdma_hw_stats * (*alloc_hw_device_stats)(struct ib_device *);
+ struct rdma_hw_stats * (*alloc_hw_port_stats)(struct ib_device *, u32);
+ int (*get_hw_stats)(struct ib_device *, struct rdma_hw_stats *, u32, int);
+ int (*modify_hw_stat)(struct ib_device *, u32, unsigned int, bool);
+ int (*fill_res_mr_entry)(struct sk_buff *, struct ib_mr *);
+ int (*fill_res_mr_entry_raw)(struct sk_buff *, struct ib_mr *);
+ int (*fill_res_cq_entry)(struct sk_buff *, struct ib_cq *);
+ int (*fill_res_cq_entry_raw)(struct sk_buff *, struct ib_cq *);
+ int (*fill_res_qp_entry)(struct sk_buff *, struct ib_qp *);
+ int (*fill_res_qp_entry_raw)(struct sk_buff *, struct ib_qp *);
+ int (*fill_res_cm_id_entry)(struct sk_buff *, struct rdma_cm_id *);
+ int (*enable_driver)(struct ib_device *);
+ void (*dealloc_driver)(struct ib_device *);
+ void (*iw_add_ref)(struct ib_qp *);
+ void (*iw_rem_ref)(struct ib_qp *);
+ struct ib_qp * (*iw_get_qp)(struct ib_device *, int);
+ int (*iw_connect)(struct iw_cm_id *, struct iw_cm_conn_param *);
+ int (*iw_accept)(struct iw_cm_id *, struct iw_cm_conn_param *);
+ int (*iw_reject)(struct iw_cm_id *, const void *, u8);
+ int (*iw_create_listen)(struct iw_cm_id *, int);
+ int (*iw_destroy_listen)(struct iw_cm_id *);
+ int (*counter_bind_qp)(struct rdma_counter *, struct ib_qp *);
+ int (*counter_unbind_qp)(struct ib_qp *);
+ int (*counter_dealloc)(struct rdma_counter *);
+ struct rdma_hw_stats * (*counter_alloc_stats)(struct rdma_counter *);
+ int (*counter_update_stats)(struct rdma_counter *);
+ int (*fill_stat_mr_entry)(struct sk_buff *, struct ib_mr *);
+ int (*query_ucontext)(struct ib_ucontext *, struct uverbs_attr_bundle *);
+ int (*get_numa_node)(struct ib_device *);
+ size_t size_ib_ah;
+ size_t size_ib_counters;
+ size_t size_ib_cq;
+ size_t size_ib_mw;
+ size_t size_ib_pd;
+ size_t size_ib_qp;
+ size_t size_ib_rwq_ind_table;
+ size_t size_ib_srq;
+ size_t size_ib_ucontext;
+ size_t size_ib_xrcd;
+};
+
+struct ib_core_device {
+ struct device dev;
+ possible_net_t rdma_net;
+ struct kobject *ports_kobj;
+ struct list_head port_list;
+ struct ib_device *owner;
+};
+
+enum ib_atomic_cap {
+ IB_ATOMIC_NONE = 0,
+ IB_ATOMIC_HCA = 1,
+ IB_ATOMIC_GLOB = 2,
+};
+
+struct ib_odp_caps {
+ uint64_t general_caps;
+ struct {
+ uint32_t rc_odp_caps;
+ uint32_t uc_odp_caps;
+ uint32_t ud_odp_caps;
+ uint32_t xrc_odp_caps;
+ } per_transport_caps;
+};
+
+struct ib_rss_caps {
+ u32 supported_qpts;
+ u32 max_rwq_indirection_tables;
+ u32 max_rwq_indirection_table_size;
+};
+
+struct ib_tm_caps {
+ u32 max_rndv_hdr_size;
+ u32 max_num_tags;
+ u32 flags;
+ u32 max_ops;
+ u32 max_sge;
+};
+
+struct ib_cq_caps {
+ u16 max_cq_moderation_count;
+ u16 max_cq_moderation_period;
+};
+
+struct ib_device_attr {
+ u64 fw_ver;
+ __be64 sys_image_guid;
+ u64 max_mr_size;
+ u64 page_size_cap;
+ u32 vendor_id;
+ u32 vendor_part_id;
+ u32 hw_ver;
+ int max_qp;
+ int max_qp_wr;
+ u64 device_cap_flags;
+ u64 kernel_cap_flags;
+ int max_send_sge;
+ int max_recv_sge;
+ int max_sge_rd;
+ int max_cq;
+ int max_cqe;
+ int max_mr;
+ int max_pd;
+ int max_qp_rd_atom;
+ int max_ee_rd_atom;
+ int max_res_rd_atom;
+ int max_qp_init_rd_atom;
+ int max_ee_init_rd_atom;
+ enum ib_atomic_cap atomic_cap;
+ enum ib_atomic_cap masked_atomic_cap;
+ int max_ee;
+ int max_rdd;
+ int max_mw;
+ int max_raw_ipv6_qp;
+ int max_raw_ethy_qp;
+ int max_mcast_grp;
+ int max_mcast_qp_attach;
+ int max_total_mcast_qp_attach;
+ int max_ah;
+ int max_srq;
+ int max_srq_wr;
+ int max_srq_sge;
+ unsigned int max_fast_reg_page_list_len;
+ unsigned int max_pi_fast_reg_page_list_len;
+ u16 max_pkeys;
+ u8 local_ca_ack_delay;
+ int sig_prot_cap;
+ int sig_guard_cap;
+ struct ib_odp_caps odp_caps;
+ uint64_t timestamp_mask;
+ uint64_t hca_core_clock;
+ struct ib_rss_caps rss_caps;
+ u32 max_wq_type_rq;
+ u32 raw_packet_caps;
+ struct ib_tm_caps tm_caps;
+ struct ib_cq_caps cq_caps;
+ u64 max_dm_size;
+ u32 max_sgl_rd;
+};
+
+struct hw_stats_device_data;
+
+struct rdma_restrack_root;
+
+struct uapi_definition;
+
+struct ib_port_data;
+
+struct ib_device {
+ struct device *dma_device;
+ struct ib_device_ops ops;
+ char name[64];
+ struct callback_head callback_head;
+ struct list_head event_handler_list;
+ struct rw_semaphore event_handler_rwsem;
+ spinlock_t qp_open_list_lock;
+ struct rw_semaphore client_data_rwsem;
+ struct xarray client_data;
+ struct mutex unregistration_lock;
+ rwlock_t cache_lock;
+ struct ib_port_data *port_data;
+ int num_comp_vectors;
+ union {
+ struct device dev;
+ struct ib_core_device coredev;
+ };
+ const struct attribute_group *groups[4];
+ u64 uverbs_cmd_mask;
+ char node_desc[64];
+ __be64 node_guid;
+ u32 local_dma_lkey;
+ u16 is_switch: 1;
+ u16 kverbs_provider: 1;
+ u16 use_cq_dim: 1;
+ u8 node_type;
+ u32 phys_port_cnt;
+ struct ib_device_attr attrs;
+ struct hw_stats_device_data *hw_stats_data;
+ u32 index;
+ spinlock_t cq_pools_lock;
+ struct list_head cq_pools[3];
+ struct rdma_restrack_root *res;
+ const struct uapi_definition *driver_def;
+ refcount_t refcount;
+ struct completion unreg_completion;
+ struct work_struct unregistration_work;
+ const struct rdma_link_ops *link_ops;
+ struct mutex compat_devs_mutex;
+ struct xarray compat_devs;
+ char iw_ifname[16];
+ u32 iw_driver_flags;
+ u32 lag_flags;
+};
+
+enum ib_signature_type {
+ IB_SIG_TYPE_NONE = 0,
+ IB_SIG_TYPE_T10_DIF = 1,
+};
+
+enum ib_t10_dif_bg_type {
+ IB_T10DIF_CRC = 0,
+ IB_T10DIF_CSUM = 1,
+};
+
+struct ib_t10_dif_domain {
+ enum ib_t10_dif_bg_type bg_type;
+ u16 pi_interval;
+ u16 bg;
+ u16 app_tag;
+ u32 ref_tag;
+ bool ref_remap;
+ bool app_escape;
+ bool ref_escape;
+ u16 apptag_check_mask;
+};
+
+struct ib_sig_domain {
+ enum ib_signature_type sig_type;
+ union {
+ struct ib_t10_dif_domain dif;
+ } sig;
+};
+
+struct ib_sig_attrs {
+ u8 check_mask;
+ struct ib_sig_domain mem;
+ struct ib_sig_domain wire;
+ int meta_length;
+};
+
+enum ib_sig_err_type {
+ IB_SIG_BAD_GUARD = 0,
+ IB_SIG_BAD_REFTAG = 1,
+ IB_SIG_BAD_APPTAG = 2,
+};
+
+struct ib_sig_err {
+ enum ib_sig_err_type err_type;
+ u32 expected;
+ u32 actual;
+ u64 sig_err_offset;
+ u32 key;
+};
+
+union ib_gid {
+ u8 raw[16];
+ struct {
+ __be64 subnet_prefix;
+ __be64 interface_id;
+ } global;
+};
+
+enum ib_gid_type {
+ IB_GID_TYPE_IB = 0,
+ IB_GID_TYPE_ROCE = 1,
+ IB_GID_TYPE_ROCE_UDP_ENCAP = 2,
+ IB_GID_TYPE_SIZE = 3,
+};
+
+struct ib_gid_attr {
+ struct net_device *ndev;
+ struct ib_device *device;
+ union ib_gid gid;
+ enum ib_gid_type gid_type;
+ u16 index;
+ u32 port_num;
+};
+
+struct ib_cq_init_attr {
+ unsigned int cqe;
+ u32 comp_vector;
+ u32 flags;
+};
+
+struct ib_dm_mr_attr {
+ u64 length;
+ u64 offset;
+ u32 access_flags;
+};
+
+struct ib_dm_alloc_attr {
+ u64 length;
+ u32 alignment;
+ u32 flags;
+};
+
+enum ib_mtu {
+ IB_MTU_256 = 1,
+ IB_MTU_512 = 2,
+ IB_MTU_1024 = 3,
+ IB_MTU_2048 = 4,
+ IB_MTU_4096 = 5,
+};
+
+enum ib_port_state {
+ IB_PORT_NOP = 0,
+ IB_PORT_DOWN = 1,
+ IB_PORT_INIT = 2,
+ IB_PORT_ARMED = 3,
+ IB_PORT_ACTIVE = 4,
+ IB_PORT_ACTIVE_DEFER = 5,
+};
+
+struct rdma_stat_desc {
+ const char *name;
+ unsigned int flags;
+ const void *priv;
+};
+
+struct ib_port_attr {
+ u64 subnet_prefix;
+ enum ib_port_state state;
+ enum ib_mtu max_mtu;
+ enum ib_mtu active_mtu;
+ u32 phys_mtu;
+ int gid_tbl_len;
+ unsigned int ip_gids: 1;
+ u32 port_cap_flags;
+ u32 max_msg_sz;
+ u32 bad_pkey_cntr;
+ u32 qkey_viol_cntr;
+ u16 pkey_tbl_len;
+ u32 sm_lid;
+ u32 lid;
+ u8 lmc;
+ u8 max_vl_num;
+ u8 sm_sl;
+ u8 subnet_timeout;
+ u8 init_type_reply;
+ u8 active_width;
+ u16 active_speed;
+ u8 phys_state;
+ u16 port_cap_flags2;
+};
+
+struct ib_device_modify {
+ u64 sys_image_guid;
+ char node_desc[64];
+};
+
+struct ib_port_modify {
+ u32 set_port_cap_mask;
+ u32 clr_port_cap_mask;
+ u8 init_type;
+};
+
+enum ib_event_type {
+ IB_EVENT_CQ_ERR = 0,
+ IB_EVENT_QP_FATAL = 1,
+ IB_EVENT_QP_REQ_ERR = 2,
+ IB_EVENT_QP_ACCESS_ERR = 3,
+ IB_EVENT_COMM_EST = 4,
+ IB_EVENT_SQ_DRAINED = 5,
+ IB_EVENT_PATH_MIG = 6,
+ IB_EVENT_PATH_MIG_ERR = 7,
+ IB_EVENT_DEVICE_FATAL = 8,
+ IB_EVENT_PORT_ACTIVE = 9,
+ IB_EVENT_PORT_ERR = 10,
+ IB_EVENT_LID_CHANGE = 11,
+ IB_EVENT_PKEY_CHANGE = 12,
+ IB_EVENT_SM_CHANGE = 13,
+ IB_EVENT_SRQ_ERR = 14,
+ IB_EVENT_SRQ_LIMIT_REACHED = 15,
+ IB_EVENT_QP_LAST_WQE_REACHED = 16,
+ IB_EVENT_CLIENT_REREGISTER = 17,
+ IB_EVENT_GID_CHANGE = 18,
+ IB_EVENT_WQ_FATAL = 19,
+};
+
+struct ib_ucq_object;
+
+typedef void (*ib_comp_handler)(struct ib_cq *, void *);
+
+struct ib_event;
+
+struct ib_cq {
+ struct ib_device *device;
+ struct ib_ucq_object *uobject;
+ ib_comp_handler comp_handler;
+ void (*event_handler)(struct ib_event *, void *);
+ void *cq_context;
+ int cqe;
+ unsigned int cqe_used;
+ atomic_t usecnt;
+ enum ib_poll_context poll_ctx;
+ struct ib_wc *wc;
+ struct list_head pool_entry;
+ union {
+ struct irq_poll iop;
+ struct work_struct work;
+ };
+ struct workqueue_struct *comp_wq;
+ struct dim *dim;
+ ktime_t timestamp;
+ u8 interrupt: 1;
+ u8 shared: 1;
+ unsigned int comp_vector;
+ struct rdma_restrack_entry res;
+};
+
+struct ib_uqp_object;
+
+enum ib_qp_type {
+ IB_QPT_SMI = 0,
+ IB_QPT_GSI = 1,
+ IB_QPT_RC = 2,
+ IB_QPT_UC = 3,
+ IB_QPT_UD = 4,
+ IB_QPT_RAW_IPV6 = 5,
+ IB_QPT_RAW_ETHERTYPE = 6,
+ IB_QPT_RAW_PACKET = 8,
+ IB_QPT_XRC_INI = 9,
+ IB_QPT_XRC_TGT = 10,
+ IB_QPT_MAX = 11,
+ IB_QPT_DRIVER = 255,
+ IB_QPT_RESERVED1 = 4096,
+ IB_QPT_RESERVED2 = 4097,
+ IB_QPT_RESERVED3 = 4098,
+ IB_QPT_RESERVED4 = 4099,
+ IB_QPT_RESERVED5 = 4100,
+ IB_QPT_RESERVED6 = 4101,
+ IB_QPT_RESERVED7 = 4102,
+ IB_QPT_RESERVED8 = 4103,
+ IB_QPT_RESERVED9 = 4104,
+ IB_QPT_RESERVED10 = 4105,
+};
+
+struct ib_qp_security;
+
+struct ib_qp {
+ struct ib_device *device;
+ struct ib_pd *pd;
+ struct ib_cq *send_cq;
+ struct ib_cq *recv_cq;
+ spinlock_t mr_lock;
+ int mrs_used;
+ struct list_head rdma_mrs;
+ struct list_head sig_mrs;
+ struct ib_srq *srq;
+ struct ib_xrcd *xrcd;
+ struct list_head xrcd_list;
+ atomic_t usecnt;
+ struct list_head open_list;
+ struct ib_qp *real_qp;
+ struct ib_uqp_object *uobject;
+ void (*event_handler)(struct ib_event *, void *);
+ void *qp_context;
+ const struct ib_gid_attr *av_sgid_attr;
+ const struct ib_gid_attr *alt_path_sgid_attr;
+ u32 qp_num;
+ u32 max_write_sge;
+ u32 max_read_sge;
+ enum ib_qp_type qp_type;
+ struct ib_rwq_ind_table *rwq_ind_tbl;
+ struct ib_qp_security *qp_sec;
+ u32 port;
+ bool integrity_en;
+ struct rdma_restrack_entry res;
+ struct rdma_counter *counter;
+};
+
+struct ib_usrq_object;
+
+enum ib_srq_type {
+ IB_SRQT_BASIC = 0,
+ IB_SRQT_XRC = 1,
+ IB_SRQT_TM = 2,
+};
+
+struct ib_srq {
+ struct ib_device *device;
+ struct ib_pd *pd;
+ struct ib_usrq_object *uobject;
+ void (*event_handler)(struct ib_event *, void *);
+ void *srq_context;
+ enum ib_srq_type srq_type;
+ atomic_t usecnt;
+ struct {
+ struct ib_cq *cq;
+ union {
+ struct {
+ struct ib_xrcd *xrcd;
+ u32 srq_num;
+ } xrc;
+ };
+ } ext;
+ struct rdma_restrack_entry res;
+};
+
+struct ib_uwq_object;
+
+enum ib_wq_state {
+ IB_WQS_RESET = 0,
+ IB_WQS_RDY = 1,
+ IB_WQS_ERR = 2,
+};
+
+enum ib_wq_type {
+ IB_WQT_RQ = 0,
+};
+
+struct ib_wq {
+ struct ib_device *device;
+ struct ib_uwq_object *uobject;
+ void *wq_context;
+ void (*event_handler)(struct ib_event *, void *);
+ struct ib_pd *pd;
+ struct ib_cq *cq;
+ u32 wq_num;
+ enum ib_wq_state state;
+ enum ib_wq_type wq_type;
+ atomic_t usecnt;
+};
+
+struct ib_event {
+ struct ib_device *device;
+ union {
+ struct ib_cq *cq;
+ struct ib_qp *qp;
+ struct ib_srq *srq;
+ struct ib_wq *wq;
+ u32 port_num;
+ } element;
+ enum ib_event_type event;
+};
+
+struct ib_global_route {
+ const struct ib_gid_attr *sgid_attr;
+ union ib_gid dgid;
+ u32 flow_label;
+ u8 sgid_index;
+ u8 hop_limit;
+ u8 traffic_class;
+};
+
+struct ib_grh {
+ __be32 version_tclass_flow;
+ __be16 paylen;
+ u8 next_hdr;
+ u8 hop_limit;
+ union ib_gid sgid;
+ union ib_gid dgid;
+};
+
+struct ib_mr_status {
+ u32 fail_status;
+ struct ib_sig_err sig_err;
+};
+
+struct rdma_ah_init_attr {
+ struct rdma_ah_attr *ah_attr;
+ u32 flags;
+ struct net_device *xmit_slave;
+};
+
+enum rdma_ah_attr_type {
+ RDMA_AH_ATTR_TYPE_UNDEFINED = 0,
+ RDMA_AH_ATTR_TYPE_IB = 1,
+ RDMA_AH_ATTR_TYPE_ROCE = 2,
+ RDMA_AH_ATTR_TYPE_OPA = 3,
+};
+
+struct ib_ah_attr {
+ u16 dlid;
+ u8 src_path_bits;
+};
+
+struct roce_ah_attr {
+ u8 dmac[6];
+};
+
+struct opa_ah_attr {
+ u32 dlid;
+ u8 src_path_bits;
+ bool make_grd;
+};
+
+struct rdma_ah_attr {
+ struct ib_global_route grh;
+ u8 sl;
+ u8 static_rate;
+ u32 port_num;
+ u8 ah_flags;
+ enum rdma_ah_attr_type type;
+ union {
+ struct ib_ah_attr ib;
+ struct roce_ah_attr roce;
+ struct opa_ah_attr opa;
+ };
+};
+
+enum ib_wc_status {
+ IB_WC_SUCCESS = 0,
+ IB_WC_LOC_LEN_ERR = 1,
+ IB_WC_LOC_QP_OP_ERR = 2,
+ IB_WC_LOC_EEC_OP_ERR = 3,
+ IB_WC_LOC_PROT_ERR = 4,
+ IB_WC_WR_FLUSH_ERR = 5,
+ IB_WC_MW_BIND_ERR = 6,
+ IB_WC_BAD_RESP_ERR = 7,
+ IB_WC_LOC_ACCESS_ERR = 8,
+ IB_WC_REM_INV_REQ_ERR = 9,
+ IB_WC_REM_ACCESS_ERR = 10,
+ IB_WC_REM_OP_ERR = 11,
+ IB_WC_RETRY_EXC_ERR = 12,
+ IB_WC_RNR_RETRY_EXC_ERR = 13,
+ IB_WC_LOC_RDD_VIOL_ERR = 14,
+ IB_WC_REM_INV_RD_REQ_ERR = 15,
+ IB_WC_REM_ABORT_ERR = 16,
+ IB_WC_INV_EECN_ERR = 17,
+ IB_WC_INV_EEC_STATE_ERR = 18,
+ IB_WC_FATAL_ERR = 19,
+ IB_WC_RESP_TIMEOUT_ERR = 20,
+ IB_WC_GENERAL_ERR = 21,
+};
+
+enum ib_wc_opcode {
+ IB_WC_SEND = 0,
+ IB_WC_RDMA_WRITE = 1,
+ IB_WC_RDMA_READ = 2,
+ IB_WC_COMP_SWAP = 3,
+ IB_WC_FETCH_ADD = 4,
+ IB_WC_BIND_MW = 5,
+ IB_WC_LOCAL_INV = 6,
+ IB_WC_LSO = 7,
+ IB_WC_REG_MR = 8,
+ IB_WC_MASKED_COMP_SWAP = 9,
+ IB_WC_MASKED_FETCH_ADD = 10,
+ IB_WC_RECV = 128,
+ IB_WC_RECV_RDMA_WITH_IMM = 129,
+};
+
+struct ib_cqe {
+ void (*done)(struct ib_cq *, struct ib_wc *);
+};
+
+struct ib_wc {
+ union {
+ u64 wr_id;
+ struct ib_cqe *wr_cqe;
+ };
+ enum ib_wc_status status;
+ enum ib_wc_opcode opcode;
+ u32 vendor_err;
+ u32 byte_len;
+ struct ib_qp *qp;
+ union {
+ __be32 imm_data;
+ u32 invalidate_rkey;
+ } ex;
+ u32 src_qp;
+ u32 slid;
+ int wc_flags;
+ u16 pkey_index;
+ u8 sl;
+ u8 dlid_path_bits;
+ u32 port_num;
+ u8 smac[6];
+ u16 vlan_id;
+ u8 network_hdr_type;
+};
+
+struct ib_srq_attr {
+ u32 max_wr;
+ u32 max_sge;
+ u32 srq_limit;
+};
+
+struct ib_xrcd {
+ struct ib_device *device;
+ atomic_t usecnt;
+ struct inode *inode;
+ struct rw_semaphore tgt_qps_rwsem;
+ struct xarray tgt_qps;
+};
+
+struct ib_srq_init_attr {
+ void (*event_handler)(struct ib_event *, void *);
+ void *srq_context;
+ struct ib_srq_attr attr;
+ enum ib_srq_type srq_type;
+ struct {
+ struct ib_cq *cq;
+ union {
+ struct {
+ struct ib_xrcd *xrcd;
+ } xrc;
+ struct {
+ u32 max_num_tags;
+ } tag_matching;
+ };
+ } ext;
+};
+
+struct ib_qp_cap {
+ u32 max_send_wr;
+ u32 max_recv_wr;
+ u32 max_send_sge;
+ u32 max_recv_sge;
+ u32 max_inline_data;
+ u32 max_rdma_ctxs;
+};
+
+enum ib_sig_type {
+ IB_SIGNAL_ALL_WR = 0,
+ IB_SIGNAL_REQ_WR = 1,
+};
+
+struct ib_qp_init_attr {
+ void (*event_handler)(struct ib_event *, void *);
+ void *qp_context;
+ struct ib_cq *send_cq;
+ struct ib_cq *recv_cq;
+ struct ib_srq *srq;
+ struct ib_xrcd *xrcd;
+ struct ib_qp_cap cap;
+ enum ib_sig_type sq_sig_type;
+ enum ib_qp_type qp_type;
+ u32 create_flags;
+ u32 port_num;
+ struct ib_rwq_ind_table *rwq_ind_tbl;
+ u32 source_qpn;
+};
+
+struct ib_uobject;
+
+struct ib_rwq_ind_table {
+ struct ib_device *device;
+ struct ib_uobject *uobject;
+ atomic_t usecnt;
+ u32 ind_tbl_num;
+ u32 log_ind_tbl_size;
+ struct ib_wq **ind_tbl;
+};
+
+enum ib_qp_state {
+ IB_QPS_RESET = 0,
+ IB_QPS_INIT = 1,
+ IB_QPS_RTR = 2,
+ IB_QPS_RTS = 3,
+ IB_QPS_SQD = 4,
+ IB_QPS_SQE = 5,
+ IB_QPS_ERR = 6,
+};
+
+enum ib_mig_state {
+ IB_MIG_MIGRATED = 0,
+ IB_MIG_REARM = 1,
+ IB_MIG_ARMED = 2,
+};
+
+enum ib_mw_type {
+ IB_MW_TYPE_1 = 1,
+ IB_MW_TYPE_2 = 2,
+};
+
+struct ib_qp_attr {
+ enum ib_qp_state qp_state;
+ enum ib_qp_state cur_qp_state;
+ enum ib_mtu path_mtu;
+ enum ib_mig_state path_mig_state;
+ u32 qkey;
+ u32 rq_psn;
+ u32 sq_psn;
+ u32 dest_qp_num;
+ int qp_access_flags;
+ struct ib_qp_cap cap;
+ struct rdma_ah_attr ah_attr;
+ struct rdma_ah_attr alt_ah_attr;
+ u16 pkey_index;
+ u16 alt_pkey_index;
+ u8 en_sqd_async_notify;
+ u8 sq_draining;
+ u8 max_rd_atomic;
+ u8 max_dest_rd_atomic;
+ u8 min_rnr_timer;
+ u32 port_num;
+ u8 timeout;
+ u8 retry_cnt;
+ u8 rnr_retry;
+ u32 alt_port_num;
+ u8 alt_timeout;
+ u32 rate_limit;
+ struct net_device *xmit_slave;
+};
+
+enum ib_wr_opcode {
+ IB_WR_RDMA_WRITE = 0,
+ IB_WR_RDMA_WRITE_WITH_IMM = 1,
+ IB_WR_SEND = 2,
+ IB_WR_SEND_WITH_IMM = 3,
+ IB_WR_RDMA_READ = 4,
+ IB_WR_ATOMIC_CMP_AND_SWP = 5,
+ IB_WR_ATOMIC_FETCH_AND_ADD = 6,
+ IB_WR_BIND_MW = 8,
+ IB_WR_LSO = 10,
+ IB_WR_SEND_WITH_INV = 9,
+ IB_WR_RDMA_READ_WITH_INV = 11,
+ IB_WR_LOCAL_INV = 7,
+ IB_WR_MASKED_ATOMIC_CMP_AND_SWP = 12,
+ IB_WR_MASKED_ATOMIC_FETCH_AND_ADD = 13,
+ IB_WR_REG_MR = 32,
+ IB_WR_REG_MR_INTEGRITY = 33,
+ IB_WR_RESERVED1 = 240,
+ IB_WR_RESERVED2 = 241,
+ IB_WR_RESERVED3 = 242,
+ IB_WR_RESERVED4 = 243,
+ IB_WR_RESERVED5 = 244,
+ IB_WR_RESERVED6 = 245,
+ IB_WR_RESERVED7 = 246,
+ IB_WR_RESERVED8 = 247,
+ IB_WR_RESERVED9 = 248,
+ IB_WR_RESERVED10 = 249,
+};
+
+struct ib_sge {
+ u64 addr;
+ u32 length;
+ u32 lkey;
+};
+
+struct ib_send_wr {
+ struct ib_send_wr *next;
+ union {
+ u64 wr_id;
+ struct ib_cqe *wr_cqe;
+ };
+ struct ib_sge *sg_list;
+ int num_sge;
+ enum ib_wr_opcode opcode;
+ int send_flags;
+ union {
+ __be32 imm_data;
+ u32 invalidate_rkey;
+ } ex;
+};
+
+struct ib_ah {
+ struct ib_device *device;
+ struct ib_pd *pd;
+ struct ib_uobject *uobject;
+ const struct ib_gid_attr *sgid_attr;
+ enum rdma_ah_attr_type type;
+};
+
+struct ib_mr {
+ struct ib_device *device;
+ struct ib_pd *pd;
+ u32 lkey;
+ u32 rkey;
+ u64 iova;
+ u64 length;
+ unsigned int page_size;
+ enum ib_mr_type type;
+ bool need_inval;
+ union {
+ struct ib_uobject *uobject;
+ struct list_head qp_entry;
+ };
+ struct ib_dm *dm;
+ struct ib_sig_attrs *sig_attrs;
+ struct rdma_restrack_entry res;
+};
+
+struct ib_recv_wr {
+ struct ib_recv_wr *next;
+ union {
+ u64 wr_id;
+ struct ib_cqe *wr_cqe;
+ };
+ struct ib_sge *sg_list;
+ int num_sge;
+};
+
+struct ib_rdmacg_object {};
+
+struct ib_uverbs_file;
+
+struct ib_ucontext {
+ struct ib_device *device;
+ struct ib_uverbs_file *ufile;
+ struct ib_rdmacg_object cg_obj;
+ struct rdma_restrack_entry res;
+ struct xarray mmap_xa;
+};
+
+struct uverbs_api_object;
+
+struct ib_uobject {
+ u64 user_handle;
+ struct ib_uverbs_file *ufile;
+ struct ib_ucontext *context;
+ void *object;
+ struct list_head list;
+ struct ib_rdmacg_object cg_obj;
+ int id;
+ struct kref ref;
+ atomic_t usecnt;
+ struct callback_head rcu;
+ const struct uverbs_api_object *uapi_object;
+};
+
+struct ib_udata {
+ const void *inbuf;
+ void *outbuf;
+ size_t inlen;
+ size_t outlen;
+};
+
+struct ib_pd {
+ u32 local_dma_lkey;
+ u32 flags;
+ struct ib_device *device;
+ struct ib_uobject *uobject;
+ atomic_t usecnt;
+ u32 unsafe_global_rkey;
+ struct ib_mr *__internal_mr;
+ struct rdma_restrack_entry res;
+};
+
+struct ib_wq_init_attr {
+ void *wq_context;
+ enum ib_wq_type wq_type;
+ u32 max_wr;
+ u32 max_sge;
+ struct ib_cq *cq;
+ void (*event_handler)(struct ib_event *, void *);
+ u32 create_flags;
+};
+
+struct ib_wq_attr {
+ enum ib_wq_state wq_state;
+ enum ib_wq_state curr_wq_state;
+ u32 flags;
+ u32 flags_mask;
+};
+
+struct ib_rwq_ind_table_init_attr {
+ u32 log_ind_tbl_size;
+ struct ib_wq **ind_tbl;
+};
+
+enum port_pkey_state {
+ IB_PORT_PKEY_NOT_VALID = 0,
+ IB_PORT_PKEY_VALID = 1,
+ IB_PORT_PKEY_LISTED = 2,
+};
+
+struct ib_port_pkey {
+ enum port_pkey_state state;
+ u16 pkey_index;
+ u32 port_num;
+ struct list_head qp_list;
+ struct list_head to_error_list;
+ struct ib_qp_security *sec;
+};
+
+struct ib_ports_pkeys;
+
+struct ib_qp_security {
+ struct ib_qp *qp;
+ struct ib_device *dev;
+ struct mutex mutex;
+ struct ib_ports_pkeys *ports_pkeys;
+ struct list_head shared_qp_list;
+ void *security;
+ bool destroying;
+ atomic_t error_list_count;
+ struct completion error_complete;
+ int error_comps_pending;
+};
+
+struct ib_ports_pkeys {
+ struct ib_port_pkey main;
+ struct ib_port_pkey alt;
+};
+
+struct ib_dm {
+ struct ib_device *device;
+ u32 length;
+ u32 flags;
+ struct ib_uobject *uobject;
+ atomic_t usecnt;
+};
+
+struct ib_mw {
+ struct ib_device *device;
+ struct ib_pd *pd;
+ struct ib_uobject *uobject;
+ u32 rkey;
+ enum ib_mw_type type;
+};
+
+enum ib_flow_attr_type {
+ IB_FLOW_ATTR_NORMAL = 0,
+ IB_FLOW_ATTR_ALL_DEFAULT = 1,
+ IB_FLOW_ATTR_MC_DEFAULT = 2,
+ IB_FLOW_ATTR_SNIFFER = 3,
+};
+
+enum ib_flow_spec_type {
+ IB_FLOW_SPEC_ETH = 32,
+ IB_FLOW_SPEC_IB = 34,
+ IB_FLOW_SPEC_IPV4 = 48,
+ IB_FLOW_SPEC_IPV6 = 49,
+ IB_FLOW_SPEC_ESP = 52,
+ IB_FLOW_SPEC_TCP = 64,
+ IB_FLOW_SPEC_UDP = 65,
+ IB_FLOW_SPEC_VXLAN_TUNNEL = 80,
+ IB_FLOW_SPEC_GRE = 81,
+ IB_FLOW_SPEC_MPLS = 96,
+ IB_FLOW_SPEC_INNER = 256,
+ IB_FLOW_SPEC_ACTION_TAG = 4096,
+ IB_FLOW_SPEC_ACTION_DROP = 4097,
+ IB_FLOW_SPEC_ACTION_HANDLE = 4098,
+ IB_FLOW_SPEC_ACTION_COUNT = 4099,
+};
+
+struct ib_flow_eth_filter {
+ u8 dst_mac[6];
+ u8 src_mac[6];
+ __be16 ether_type;
+ __be16 vlan_tag;
+ u8 real_sz[0];
+};
+
+struct ib_flow_spec_eth {
+ u32 type;
+ u16 size;
+ struct ib_flow_eth_filter val;
+ struct ib_flow_eth_filter mask;
+};
+
+struct ib_flow_ib_filter {
+ __be16 dlid;
+ __u8 sl;
+ u8 real_sz[0];
+};
+
+struct ib_flow_spec_ib {
+ u32 type;
+ u16 size;
+ struct ib_flow_ib_filter val;
+ struct ib_flow_ib_filter mask;
+};
+
+struct ib_flow_ipv4_filter {
+ __be32 src_ip;
+ __be32 dst_ip;
+ u8 proto;
+ u8 tos;
+ u8 ttl;
+ u8 flags;
+ u8 real_sz[0];
+};
+
+struct ib_flow_spec_ipv4 {
+ u32 type;
+ u16 size;
+ struct ib_flow_ipv4_filter val;
+ struct ib_flow_ipv4_filter mask;
+};
+
+struct ib_flow_ipv6_filter {
+ u8 src_ip[16];
+ u8 dst_ip[16];
+ __be32 flow_label;
+ u8 next_hdr;
+ u8 traffic_class;
+ u8 hop_limit;
+ u8 real_sz[0];
+};
+
+struct ib_flow_spec_ipv6 {
+ u32 type;
+ u16 size;
+ struct ib_flow_ipv6_filter val;
+ struct ib_flow_ipv6_filter mask;
+};
+
+struct ib_flow_tcp_udp_filter {
+ __be16 dst_port;
+ __be16 src_port;
+ u8 real_sz[0];
+};
+
+struct ib_flow_spec_tcp_udp {
+ u32 type;
+ u16 size;
+ struct ib_flow_tcp_udp_filter val;
+ struct ib_flow_tcp_udp_filter mask;
+};
+
+struct ib_flow_tunnel_filter {
+ __be32 tunnel_id;
+ u8 real_sz[0];
+};
+
+struct ib_flow_spec_tunnel {
+ u32 type;
+ u16 size;
+ struct ib_flow_tunnel_filter val;
+ struct ib_flow_tunnel_filter mask;
+};
+
+struct ib_flow_esp_filter {
+ __be32 spi;
+ __be32 seq;
+ u8 real_sz[0];
+};
+
+struct ib_flow_spec_esp {
+ u32 type;
+ u16 size;
+ struct ib_flow_esp_filter val;
+ struct ib_flow_esp_filter mask;
+};
+
+struct ib_flow_gre_filter {
+ __be16 c_ks_res0_ver;
+ __be16 protocol;
+ __be32 key;
+ u8 real_sz[0];
+};
+
+struct ib_flow_spec_gre {
+ u32 type;
+ u16 size;
+ struct ib_flow_gre_filter val;
+ struct ib_flow_gre_filter mask;
+};
+
+struct ib_flow_mpls_filter {
+ __be32 tag;
+ u8 real_sz[0];
+};
+
+struct ib_flow_spec_mpls {
+ u32 type;
+ u16 size;
+ struct ib_flow_mpls_filter val;
+ struct ib_flow_mpls_filter mask;
+};
+
+struct ib_flow_spec_action_tag {
+ enum ib_flow_spec_type type;
+ u16 size;
+ u32 tag_id;
+};
+
+struct ib_flow_spec_action_drop {
+ enum ib_flow_spec_type type;
+ u16 size;
+};
+
+struct ib_flow_spec_action_handle {
+ enum ib_flow_spec_type type;
+ u16 size;
+ struct ib_flow_action *act;
+};
+
+enum ib_flow_action_type {
+ IB_FLOW_ACTION_UNSPECIFIED = 0,
+ IB_FLOW_ACTION_ESP = 1,
+};
+
+struct ib_flow_action {
+ struct ib_device *device;
+ struct ib_uobject *uobject;
+ enum ib_flow_action_type type;
+ atomic_t usecnt;
+};
+
+struct ib_flow_spec_action_count {
+ enum ib_flow_spec_type type;
+ u16 size;
+ struct ib_counters *counters;
+};
+
+struct ib_counters {
+ struct ib_device *device;
+ struct ib_uobject *uobject;
+ atomic_t usecnt;
+};
+
+union ib_flow_spec {
+ struct {
+ u32 type;
+ u16 size;
+ };
+ struct ib_flow_spec_eth eth;
+ struct ib_flow_spec_ib ib;
+ struct ib_flow_spec_ipv4 ipv4;
+ struct ib_flow_spec_tcp_udp tcp_udp;
+ struct ib_flow_spec_ipv6 ipv6;
+ struct ib_flow_spec_tunnel tunnel;
+ struct ib_flow_spec_esp esp;
+ struct ib_flow_spec_gre gre;
+ struct ib_flow_spec_mpls mpls;
+ struct ib_flow_spec_action_tag flow_tag;
+ struct ib_flow_spec_action_drop drop;
+ struct ib_flow_spec_action_handle action;
+ struct ib_flow_spec_action_count flow_count;
+};
+
+struct ib_flow_attr {
+ enum ib_flow_attr_type type;
+ u16 size;
+ u16 priority;
+ u32 flags;
+ u8 num_of_specs;
+ u32 port;
+ union ib_flow_spec flows[0];
+};
+
+struct ib_flow {
+ struct ib_qp *qp;
+ struct ib_device *device;
+ struct ib_uobject *uobject;
+};
+
+struct ib_pkey_cache;
+
+struct ib_gid_table;
+
+struct ib_port_cache {
+ u64 subnet_prefix;
+ struct ib_pkey_cache *pkey;
+ struct ib_gid_table *gid;
+ u8 lmc;
+ enum ib_port_state port_state;
+};
+
+struct ib_port_immutable {
+ int pkey_tbl_len;
+ int gid_tbl_len;
+ u32 core_cap_flags;
+ u32 max_mad_size;
+};
+
+struct ib_port;
+
+struct ib_port_data {
+ struct ib_device *ib_dev;
+ struct ib_port_immutable immutable;
+ spinlock_t pkey_list_lock;
+ spinlock_t netdev_lock;
+ struct list_head pkey_list;
+ struct ib_port_cache cache;
+ struct net_device *netdev;
+ struct hlist_node ndev_hash_link;
+ struct rdma_port_counter port_counter;
+ struct ib_port *sysfs;
+};
+
+struct rdma_netdev_alloc_params {
+ size_t sizeof_priv;
+ unsigned int txqs;
+ unsigned int rxqs;
+ void *param;
+ int (*initialize_rdma_netdev)(struct ib_device *, u32, struct net_device *, void *);
+};
+
+struct ib_counters_read_attr {
+ u64 *counters_buff;
+ u32 ncounters;
+ u32 flags;
+};
+
+struct rdma_user_mmap_entry {
+ struct kref ref;
+ struct ib_ucontext *ucontext;
+ long unsigned int start_pgoff;
+ size_t npages;
+ bool driver_removed;
+};
+
+enum devlink_command {
+ DEVLINK_CMD_UNSPEC = 0,
+ DEVLINK_CMD_GET = 1,
+ DEVLINK_CMD_SET = 2,
+ DEVLINK_CMD_NEW = 3,
+ DEVLINK_CMD_DEL = 4,
+ DEVLINK_CMD_PORT_GET = 5,
+ DEVLINK_CMD_PORT_SET = 6,
+ DEVLINK_CMD_PORT_NEW = 7,
+ DEVLINK_CMD_PORT_DEL = 8,
+ DEVLINK_CMD_PORT_SPLIT = 9,
+ DEVLINK_CMD_PORT_UNSPLIT = 10,
+ DEVLINK_CMD_SB_GET = 11,
+ DEVLINK_CMD_SB_SET = 12,
+ DEVLINK_CMD_SB_NEW = 13,
+ DEVLINK_CMD_SB_DEL = 14,
+ DEVLINK_CMD_SB_POOL_GET = 15,
+ DEVLINK_CMD_SB_POOL_SET = 16,
+ DEVLINK_CMD_SB_POOL_NEW = 17,
+ DEVLINK_CMD_SB_POOL_DEL = 18,
+ DEVLINK_CMD_SB_PORT_POOL_GET = 19,
+ DEVLINK_CMD_SB_PORT_POOL_SET = 20,
+ DEVLINK_CMD_SB_PORT_POOL_NEW = 21,
+ DEVLINK_CMD_SB_PORT_POOL_DEL = 22,
+ DEVLINK_CMD_SB_TC_POOL_BIND_GET = 23,
+ DEVLINK_CMD_SB_TC_POOL_BIND_SET = 24,
+ DEVLINK_CMD_SB_TC_POOL_BIND_NEW = 25,
+ DEVLINK_CMD_SB_TC_POOL_BIND_DEL = 26,
+ DEVLINK_CMD_SB_OCC_SNAPSHOT = 27,
+ DEVLINK_CMD_SB_OCC_MAX_CLEAR = 28,
+ DEVLINK_CMD_ESWITCH_GET = 29,
+ DEVLINK_CMD_ESWITCH_SET = 30,
+ DEVLINK_CMD_DPIPE_TABLE_GET = 31,
+ DEVLINK_CMD_DPIPE_ENTRIES_GET = 32,
+ DEVLINK_CMD_DPIPE_HEADERS_GET = 33,
+ DEVLINK_CMD_DPIPE_TABLE_COUNTERS_SET = 34,
+ DEVLINK_CMD_RESOURCE_SET = 35,
+ DEVLINK_CMD_RESOURCE_DUMP = 36,
+ DEVLINK_CMD_RELOAD = 37,
+ DEVLINK_CMD_PARAM_GET = 38,
+ DEVLINK_CMD_PARAM_SET = 39,
+ DEVLINK_CMD_PARAM_NEW = 40,
+ DEVLINK_CMD_PARAM_DEL = 41,
+ DEVLINK_CMD_REGION_GET = 42,
+ DEVLINK_CMD_REGION_SET = 43,
+ DEVLINK_CMD_REGION_NEW = 44,
+ DEVLINK_CMD_REGION_DEL = 45,
+ DEVLINK_CMD_REGION_READ = 46,
+ DEVLINK_CMD_PORT_PARAM_GET = 47,
+ DEVLINK_CMD_PORT_PARAM_SET = 48,
+ DEVLINK_CMD_PORT_PARAM_NEW = 49,
+ DEVLINK_CMD_PORT_PARAM_DEL = 50,
+ DEVLINK_CMD_INFO_GET = 51,
+ DEVLINK_CMD_HEALTH_REPORTER_GET = 52,
+ DEVLINK_CMD_HEALTH_REPORTER_SET = 53,
+ DEVLINK_CMD_HEALTH_REPORTER_RECOVER = 54,
+ DEVLINK_CMD_HEALTH_REPORTER_DIAGNOSE = 55,
+ DEVLINK_CMD_HEALTH_REPORTER_DUMP_GET = 56,
+ DEVLINK_CMD_HEALTH_REPORTER_DUMP_CLEAR = 57,
+ DEVLINK_CMD_FLASH_UPDATE = 58,
+ DEVLINK_CMD_FLASH_UPDATE_END = 59,
+ DEVLINK_CMD_FLASH_UPDATE_STATUS = 60,
+ DEVLINK_CMD_TRAP_GET = 61,
+ DEVLINK_CMD_TRAP_SET = 62,
+ DEVLINK_CMD_TRAP_NEW = 63,
+ DEVLINK_CMD_TRAP_DEL = 64,
+ DEVLINK_CMD_TRAP_GROUP_GET = 65,
+ DEVLINK_CMD_TRAP_GROUP_SET = 66,
+ DEVLINK_CMD_TRAP_GROUP_NEW = 67,
+ DEVLINK_CMD_TRAP_GROUP_DEL = 68,
+ DEVLINK_CMD_TRAP_POLICER_GET = 69,
+ DEVLINK_CMD_TRAP_POLICER_SET = 70,
+ DEVLINK_CMD_TRAP_POLICER_NEW = 71,
+ DEVLINK_CMD_TRAP_POLICER_DEL = 72,
+ DEVLINK_CMD_HEALTH_REPORTER_TEST = 73,
+ DEVLINK_CMD_RATE_GET = 74,
+ DEVLINK_CMD_RATE_SET = 75,
+ DEVLINK_CMD_RATE_NEW = 76,
+ DEVLINK_CMD_RATE_DEL = 77,
+ DEVLINK_CMD_LINECARD_GET = 78,
+ DEVLINK_CMD_LINECARD_SET = 79,
+ DEVLINK_CMD_LINECARD_NEW = 80,
+ DEVLINK_CMD_LINECARD_DEL = 81,
+ DEVLINK_CMD_SELFTESTS_GET = 82,
+ DEVLINK_CMD_SELFTESTS_RUN = 83,
+ __DEVLINK_CMD_MAX = 84,
+ DEVLINK_CMD_MAX = 83,
+};
+
+enum {
+ DEVLINK_ATTR_STATS_RX_PACKETS = 0,
+ DEVLINK_ATTR_STATS_RX_BYTES = 1,
+ DEVLINK_ATTR_STATS_RX_DROPPED = 2,
+ __DEVLINK_ATTR_STATS_MAX = 3,
+ DEVLINK_ATTR_STATS_MAX = 2,
+};
+
+enum {
+ DEVLINK_FLASH_OVERWRITE_SETTINGS_BIT = 0,
+ DEVLINK_FLASH_OVERWRITE_IDENTIFIERS_BIT = 1,
+ __DEVLINK_FLASH_OVERWRITE_MAX_BIT = 2,
+ DEVLINK_FLASH_OVERWRITE_MAX_BIT = 1,
+};
+
+enum devlink_attr_selftest_id {
+ DEVLINK_ATTR_SELFTEST_ID_UNSPEC = 0,
+ DEVLINK_ATTR_SELFTEST_ID_FLASH = 1,
+ __DEVLINK_ATTR_SELFTEST_ID_MAX = 2,
+ DEVLINK_ATTR_SELFTEST_ID_MAX = 1,
+};
+
+enum devlink_attr_selftest_result {
+ DEVLINK_ATTR_SELFTEST_RESULT_UNSPEC = 0,
+ DEVLINK_ATTR_SELFTEST_RESULT = 1,
+ DEVLINK_ATTR_SELFTEST_RESULT_ID = 2,
+ DEVLINK_ATTR_SELFTEST_RESULT_STATUS = 3,
+ __DEVLINK_ATTR_SELFTEST_RESULT_MAX = 4,
+ DEVLINK_ATTR_SELFTEST_RESULT_MAX = 3,
+};
+
+enum {
+ DEVLINK_ATTR_TRAP_METADATA_TYPE_IN_PORT = 0,
+ DEVLINK_ATTR_TRAP_METADATA_TYPE_FA_COOKIE = 1,
+};
+
+enum devlink_linecard_state {
+ DEVLINK_LINECARD_STATE_UNSPEC = 0,
+ DEVLINK_LINECARD_STATE_UNPROVISIONED = 1,
+ DEVLINK_LINECARD_STATE_UNPROVISIONING = 2,
+ DEVLINK_LINECARD_STATE_PROVISIONING = 3,
+ DEVLINK_LINECARD_STATE_PROVISIONING_FAILED = 4,
+ DEVLINK_LINECARD_STATE_PROVISIONED = 5,
+ DEVLINK_LINECARD_STATE_ACTIVE = 6,
+ __DEVLINK_LINECARD_STATE_MAX = 7,
+ DEVLINK_LINECARD_STATE_MAX = 6,
+};
+
+enum devlink_attr {
+ DEVLINK_ATTR_UNSPEC = 0,
+ DEVLINK_ATTR_BUS_NAME = 1,
+ DEVLINK_ATTR_DEV_NAME = 2,
+ DEVLINK_ATTR_PORT_INDEX = 3,
+ DEVLINK_ATTR_PORT_TYPE = 4,
+ DEVLINK_ATTR_PORT_DESIRED_TYPE = 5,
+ DEVLINK_ATTR_PORT_NETDEV_IFINDEX = 6,
+ DEVLINK_ATTR_PORT_NETDEV_NAME = 7,
+ DEVLINK_ATTR_PORT_IBDEV_NAME = 8,
+ DEVLINK_ATTR_PORT_SPLIT_COUNT = 9,
+ DEVLINK_ATTR_PORT_SPLIT_GROUP = 10,
+ DEVLINK_ATTR_SB_INDEX = 11,
+ DEVLINK_ATTR_SB_SIZE = 12,
+ DEVLINK_ATTR_SB_INGRESS_POOL_COUNT = 13,
+ DEVLINK_ATTR_SB_EGRESS_POOL_COUNT = 14,
+ DEVLINK_ATTR_SB_INGRESS_TC_COUNT = 15,
+ DEVLINK_ATTR_SB_EGRESS_TC_COUNT = 16,
+ DEVLINK_ATTR_SB_POOL_INDEX = 17,
+ DEVLINK_ATTR_SB_POOL_TYPE = 18,
+ DEVLINK_ATTR_SB_POOL_SIZE = 19,
+ DEVLINK_ATTR_SB_POOL_THRESHOLD_TYPE = 20,
+ DEVLINK_ATTR_SB_THRESHOLD = 21,
+ DEVLINK_ATTR_SB_TC_INDEX = 22,
+ DEVLINK_ATTR_SB_OCC_CUR = 23,
+ DEVLINK_ATTR_SB_OCC_MAX = 24,
+ DEVLINK_ATTR_ESWITCH_MODE = 25,
+ DEVLINK_ATTR_ESWITCH_INLINE_MODE = 26,
+ DEVLINK_ATTR_DPIPE_TABLES = 27,
+ DEVLINK_ATTR_DPIPE_TABLE = 28,
+ DEVLINK_ATTR_DPIPE_TABLE_NAME = 29,
+ DEVLINK_ATTR_DPIPE_TABLE_SIZE = 30,
+ DEVLINK_ATTR_DPIPE_TABLE_MATCHES = 31,
+ DEVLINK_ATTR_DPIPE_TABLE_ACTIONS = 32,
+ DEVLINK_ATTR_DPIPE_TABLE_COUNTERS_ENABLED = 33,
+ DEVLINK_ATTR_DPIPE_ENTRIES = 34,
+ DEVLINK_ATTR_DPIPE_ENTRY = 35,
+ DEVLINK_ATTR_DPIPE_ENTRY_INDEX = 36,
+ DEVLINK_ATTR_DPIPE_ENTRY_MATCH_VALUES = 37,
+ DEVLINK_ATTR_DPIPE_ENTRY_ACTION_VALUES = 38,
+ DEVLINK_ATTR_DPIPE_ENTRY_COUNTER = 39,
+ DEVLINK_ATTR_DPIPE_MATCH = 40,
+ DEVLINK_ATTR_DPIPE_MATCH_VALUE = 41,
+ DEVLINK_ATTR_DPIPE_MATCH_TYPE = 42,
+ DEVLINK_ATTR_DPIPE_ACTION = 43,
+ DEVLINK_ATTR_DPIPE_ACTION_VALUE = 44,
+ DEVLINK_ATTR_DPIPE_ACTION_TYPE = 45,
+ DEVLINK_ATTR_DPIPE_VALUE = 46,
+ DEVLINK_ATTR_DPIPE_VALUE_MASK = 47,
+ DEVLINK_ATTR_DPIPE_VALUE_MAPPING = 48,
+ DEVLINK_ATTR_DPIPE_HEADERS = 49,
+ DEVLINK_ATTR_DPIPE_HEADER = 50,
+ DEVLINK_ATTR_DPIPE_HEADER_NAME = 51,
+ DEVLINK_ATTR_DPIPE_HEADER_ID = 52,
+ DEVLINK_ATTR_DPIPE_HEADER_FIELDS = 53,
+ DEVLINK_ATTR_DPIPE_HEADER_GLOBAL = 54,
+ DEVLINK_ATTR_DPIPE_HEADER_INDEX = 55,
+ DEVLINK_ATTR_DPIPE_FIELD = 56,
+ DEVLINK_ATTR_DPIPE_FIELD_NAME = 57,
+ DEVLINK_ATTR_DPIPE_FIELD_ID = 58,
+ DEVLINK_ATTR_DPIPE_FIELD_BITWIDTH = 59,
+ DEVLINK_ATTR_DPIPE_FIELD_MAPPING_TYPE = 60,
+ DEVLINK_ATTR_PAD = 61,
+ DEVLINK_ATTR_ESWITCH_ENCAP_MODE = 62,
+ DEVLINK_ATTR_RESOURCE_LIST = 63,
+ DEVLINK_ATTR_RESOURCE = 64,
+ DEVLINK_ATTR_RESOURCE_NAME = 65,
+ DEVLINK_ATTR_RESOURCE_ID = 66,
+ DEVLINK_ATTR_RESOURCE_SIZE = 67,
+ DEVLINK_ATTR_RESOURCE_SIZE_NEW = 68,
+ DEVLINK_ATTR_RESOURCE_SIZE_VALID = 69,
+ DEVLINK_ATTR_RESOURCE_SIZE_MIN = 70,
+ DEVLINK_ATTR_RESOURCE_SIZE_MAX = 71,
+ DEVLINK_ATTR_RESOURCE_SIZE_GRAN = 72,
+ DEVLINK_ATTR_RESOURCE_UNIT = 73,
+ DEVLINK_ATTR_RESOURCE_OCC = 74,
+ DEVLINK_ATTR_DPIPE_TABLE_RESOURCE_ID = 75,
+ DEVLINK_ATTR_DPIPE_TABLE_RESOURCE_UNITS = 76,
+ DEVLINK_ATTR_PORT_FLAVOUR = 77,
+ DEVLINK_ATTR_PORT_NUMBER = 78,
+ DEVLINK_ATTR_PORT_SPLIT_SUBPORT_NUMBER = 79,
+ DEVLINK_ATTR_PARAM = 80,
+ DEVLINK_ATTR_PARAM_NAME = 81,
+ DEVLINK_ATTR_PARAM_GENERIC = 82,
+ DEVLINK_ATTR_PARAM_TYPE = 83,
+ DEVLINK_ATTR_PARAM_VALUES_LIST = 84,
+ DEVLINK_ATTR_PARAM_VALUE = 85,
+ DEVLINK_ATTR_PARAM_VALUE_DATA = 86,
+ DEVLINK_ATTR_PARAM_VALUE_CMODE = 87,
+ DEVLINK_ATTR_REGION_NAME = 88,
+ DEVLINK_ATTR_REGION_SIZE = 89,
+ DEVLINK_ATTR_REGION_SNAPSHOTS = 90,
+ DEVLINK_ATTR_REGION_SNAPSHOT = 91,
+ DEVLINK_ATTR_REGION_SNAPSHOT_ID = 92,
+ DEVLINK_ATTR_REGION_CHUNKS = 93,
+ DEVLINK_ATTR_REGION_CHUNK = 94,
+ DEVLINK_ATTR_REGION_CHUNK_DATA = 95,
+ DEVLINK_ATTR_REGION_CHUNK_ADDR = 96,
+ DEVLINK_ATTR_REGION_CHUNK_LEN = 97,
+ DEVLINK_ATTR_INFO_DRIVER_NAME = 98,
+ DEVLINK_ATTR_INFO_SERIAL_NUMBER = 99,
+ DEVLINK_ATTR_INFO_VERSION_FIXED = 100,
+ DEVLINK_ATTR_INFO_VERSION_RUNNING = 101,
+ DEVLINK_ATTR_INFO_VERSION_STORED = 102,
+ DEVLINK_ATTR_INFO_VERSION_NAME = 103,
+ DEVLINK_ATTR_INFO_VERSION_VALUE = 104,
+ DEVLINK_ATTR_SB_POOL_CELL_SIZE = 105,
+ DEVLINK_ATTR_FMSG = 106,
+ DEVLINK_ATTR_FMSG_OBJ_NEST_START = 107,
+ DEVLINK_ATTR_FMSG_PAIR_NEST_START = 108,
+ DEVLINK_ATTR_FMSG_ARR_NEST_START = 109,
+ DEVLINK_ATTR_FMSG_NEST_END = 110,
+ DEVLINK_ATTR_FMSG_OBJ_NAME = 111,
+ DEVLINK_ATTR_FMSG_OBJ_VALUE_TYPE = 112,
+ DEVLINK_ATTR_FMSG_OBJ_VALUE_DATA = 113,
+ DEVLINK_ATTR_HEALTH_REPORTER = 114,
+ DEVLINK_ATTR_HEALTH_REPORTER_NAME = 115,
+ DEVLINK_ATTR_HEALTH_REPORTER_STATE = 116,
+ DEVLINK_ATTR_HEALTH_REPORTER_ERR_COUNT = 117,
+ DEVLINK_ATTR_HEALTH_REPORTER_RECOVER_COUNT = 118,
+ DEVLINK_ATTR_HEALTH_REPORTER_DUMP_TS = 119,
+ DEVLINK_ATTR_HEALTH_REPORTER_GRACEFUL_PERIOD = 120,
+ DEVLINK_ATTR_HEALTH_REPORTER_AUTO_RECOVER = 121,
+ DEVLINK_ATTR_FLASH_UPDATE_FILE_NAME = 122,
+ DEVLINK_ATTR_FLASH_UPDATE_COMPONENT = 123,
+ DEVLINK_ATTR_FLASH_UPDATE_STATUS_MSG = 124,
+ DEVLINK_ATTR_FLASH_UPDATE_STATUS_DONE = 125,
+ DEVLINK_ATTR_FLASH_UPDATE_STATUS_TOTAL = 126,
+ DEVLINK_ATTR_PORT_PCI_PF_NUMBER = 127,
+ DEVLINK_ATTR_PORT_PCI_VF_NUMBER = 128,
+ DEVLINK_ATTR_STATS = 129,
+ DEVLINK_ATTR_TRAP_NAME = 130,
+ DEVLINK_ATTR_TRAP_ACTION = 131,
+ DEVLINK_ATTR_TRAP_TYPE = 132,
+ DEVLINK_ATTR_TRAP_GENERIC = 133,
+ DEVLINK_ATTR_TRAP_METADATA = 134,
+ DEVLINK_ATTR_TRAP_GROUP_NAME = 135,
+ DEVLINK_ATTR_RELOAD_FAILED = 136,
+ DEVLINK_ATTR_HEALTH_REPORTER_DUMP_TS_NS = 137,
+ DEVLINK_ATTR_NETNS_FD = 138,
+ DEVLINK_ATTR_NETNS_PID = 139,
+ DEVLINK_ATTR_NETNS_ID = 140,
+ DEVLINK_ATTR_HEALTH_REPORTER_AUTO_DUMP = 141,
+ DEVLINK_ATTR_TRAP_POLICER_ID = 142,
+ DEVLINK_ATTR_TRAP_POLICER_RATE = 143,
+ DEVLINK_ATTR_TRAP_POLICER_BURST = 144,
+ DEVLINK_ATTR_PORT_FUNCTION = 145,
+ DEVLINK_ATTR_INFO_BOARD_SERIAL_NUMBER = 146,
+ DEVLINK_ATTR_PORT_LANES = 147,
+ DEVLINK_ATTR_PORT_SPLITTABLE = 148,
+ DEVLINK_ATTR_PORT_EXTERNAL = 149,
+ DEVLINK_ATTR_PORT_CONTROLLER_NUMBER = 150,
+ DEVLINK_ATTR_FLASH_UPDATE_STATUS_TIMEOUT = 151,
+ DEVLINK_ATTR_FLASH_UPDATE_OVERWRITE_MASK = 152,
+ DEVLINK_ATTR_RELOAD_ACTION = 153,
+ DEVLINK_ATTR_RELOAD_ACTIONS_PERFORMED = 154,
+ DEVLINK_ATTR_RELOAD_LIMITS = 155,
+ DEVLINK_ATTR_DEV_STATS = 156,
+ DEVLINK_ATTR_RELOAD_STATS = 157,
+ DEVLINK_ATTR_RELOAD_STATS_ENTRY = 158,
+ DEVLINK_ATTR_RELOAD_STATS_LIMIT = 159,
+ DEVLINK_ATTR_RELOAD_STATS_VALUE = 160,
+ DEVLINK_ATTR_REMOTE_RELOAD_STATS = 161,
+ DEVLINK_ATTR_RELOAD_ACTION_INFO = 162,
+ DEVLINK_ATTR_RELOAD_ACTION_STATS = 163,
+ DEVLINK_ATTR_PORT_PCI_SF_NUMBER = 164,
+ DEVLINK_ATTR_RATE_TYPE = 165,
+ DEVLINK_ATTR_RATE_TX_SHARE = 166,
+ DEVLINK_ATTR_RATE_TX_MAX = 167,
+ DEVLINK_ATTR_RATE_NODE_NAME = 168,
+ DEVLINK_ATTR_RATE_PARENT_NODE_NAME = 169,
+ DEVLINK_ATTR_REGION_MAX_SNAPSHOTS = 170,
+ DEVLINK_ATTR_LINECARD_INDEX = 171,
+ DEVLINK_ATTR_LINECARD_STATE = 172,
+ DEVLINK_ATTR_LINECARD_TYPE = 173,
+ DEVLINK_ATTR_LINECARD_SUPPORTED_TYPES = 174,
+ DEVLINK_ATTR_NESTED_DEVLINK = 175,
+ DEVLINK_ATTR_SELFTESTS = 176,
+ DEVLINK_ATTR_RATE_TX_PRIORITY = 177,
+ DEVLINK_ATTR_RATE_TX_WEIGHT = 178,
+ __DEVLINK_ATTR_MAX = 179,
+ DEVLINK_ATTR_MAX = 178,
+};
+
+enum devlink_dpipe_field_mapping_type {
+ DEVLINK_DPIPE_FIELD_MAPPING_TYPE_NONE = 0,
+ DEVLINK_DPIPE_FIELD_MAPPING_TYPE_IFINDEX = 1,
+};
+
+enum devlink_dpipe_match_type {
+ DEVLINK_DPIPE_MATCH_TYPE_FIELD_EXACT = 0,
+};
+
+enum devlink_dpipe_action_type {
+ DEVLINK_DPIPE_ACTION_TYPE_FIELD_MODIFY = 0,
+};
+
+enum devlink_dpipe_field_ethernet_id {
+ DEVLINK_DPIPE_FIELD_ETHERNET_DST_MAC = 0,
+};
+
+enum devlink_dpipe_field_ipv4_id {
+ DEVLINK_DPIPE_FIELD_IPV4_DST_IP = 0,
+};
+
+enum devlink_dpipe_field_ipv6_id {
+ DEVLINK_DPIPE_FIELD_IPV6_DST_IP = 0,
+};
+
+enum devlink_dpipe_header_id {
+ DEVLINK_DPIPE_HEADER_ETHERNET = 0,
+ DEVLINK_DPIPE_HEADER_IPV4 = 1,
+ DEVLINK_DPIPE_HEADER_IPV6 = 2,
+};
+
+enum devlink_port_function_attr {
+ DEVLINK_PORT_FUNCTION_ATTR_UNSPEC = 0,
+ DEVLINK_PORT_FUNCTION_ATTR_HW_ADDR = 1,
+ DEVLINK_PORT_FN_ATTR_STATE = 2,
+ DEVLINK_PORT_FN_ATTR_OPSTATE = 3,
+ __DEVLINK_PORT_FUNCTION_ATTR_MAX = 4,
+ DEVLINK_PORT_FUNCTION_ATTR_MAX = 3,
+};
+
+struct devlink_linecard_ops;
+
+struct devlink_linecard_type;
+
+struct devlink_linecard {
+ struct list_head list;
+ struct devlink *devlink;
+ unsigned int index;
+ refcount_t refcount;
+ const struct devlink_linecard_ops *ops;
+ void *priv;
+ enum devlink_linecard_state state;
+ struct mutex state_lock;
+ const char *type;
+ struct devlink_linecard_type *types;
+ unsigned int types_count;
+ struct devlink *nested_devlink;
+};
+
+struct devlink_linecard_ops {
+ int (*provision)(struct devlink_linecard *, void *, const char *, const void *, struct netlink_ext_ack *);
+ int (*unprovision)(struct devlink_linecard *, void *, struct netlink_ext_ack *);
+ bool (*same_provision)(struct devlink_linecard *, void *, const char *, const void *);
+ unsigned int (*types_count)(struct devlink_linecard *, void *);
+ void (*types_get)(struct devlink_linecard *, void *, unsigned int, const char **, const void **);
+};
+
+struct devlink_dpipe_field {
+ const char *name;
+ unsigned int id;
+ unsigned int bitwidth;
+ enum devlink_dpipe_field_mapping_type mapping_type;
+};
+
+struct devlink_dpipe_header {
+ const char *name;
+ unsigned int id;
+ struct devlink_dpipe_field *fields;
+ unsigned int fields_count;
+ bool global;
+};
+
+struct devlink_dpipe_match {
+ enum devlink_dpipe_match_type type;
+ unsigned int header_index;
+ struct devlink_dpipe_header *header;
+ unsigned int field_id;
+};
+
+struct devlink_dpipe_action {
+ enum devlink_dpipe_action_type type;
+ unsigned int header_index;
+ struct devlink_dpipe_header *header;
+ unsigned int field_id;
+};
+
+struct devlink_dpipe_value {
+ union {
+ struct devlink_dpipe_action *action;
+ struct devlink_dpipe_match *match;
+ };
+ unsigned int mapping_value;
+ bool mapping_valid;
+ unsigned int value_size;
+ void *value;
+ void *mask;
+};
+
+struct devlink_dpipe_entry {
+ u64 index;
+ struct devlink_dpipe_value *match_values;
+ unsigned int match_values_count;
+ struct devlink_dpipe_value *action_values;
+ unsigned int action_values_count;
+ u64 counter;
+ bool counter_valid;
+};
+
+struct devlink_dpipe_dump_ctx {
+ struct genl_info *info;
+ enum devlink_command cmd;
+ struct sk_buff *skb;
+ struct nlattr *nest;
+ void *hdr;
+};
+
+struct devlink_dpipe_table_ops;
+
+struct devlink_dpipe_table {
+ void *priv;
+ struct list_head list;
+ const char *name;
+ bool counters_enabled;
+ bool counter_control_extern;
+ bool resource_valid;
+ u64 resource_id;
+ u64 resource_units;
+ struct devlink_dpipe_table_ops *table_ops;
+ struct callback_head rcu;
+};
+
+struct devlink_dpipe_table_ops {
+ int (*actions_dump)(void *, struct sk_buff *);
+ int (*matches_dump)(void *, struct sk_buff *);
+ int (*entries_dump)(void *, bool, struct devlink_dpipe_dump_ctx *);
+ int (*counters_set_update)(void *, bool);
+ u64 (*size_get)(void *);
+};
+
+struct devlink_dpipe_headers {
+ struct devlink_dpipe_header **headers;
+ unsigned int headers_count;
+};
+
+struct devlink_flash_notify {
+ const char *status_msg;
+ const char *component;
+ long unsigned int done;
+ long unsigned int total;
+ long unsigned int timeout;
+};
+
+struct devlink_param_item {
+ struct list_head list;
+ const struct devlink_param *param;
+ union devlink_param_value driverinit_value;
+ bool driverinit_value_valid;
+};
+
+struct devlink_port_region_ops {
+ const char *name;
+ void (*destructor)(const void *);
+ int (*snapshot)(struct devlink_port *, const struct devlink_port_region_ops *, struct netlink_ext_ack *, u8 **);
+ void *priv;
+};
+
+enum devlink_health_reporter_state {
+ DEVLINK_HEALTH_REPORTER_STATE_HEALTHY = 0,
+ DEVLINK_HEALTH_REPORTER_STATE_ERROR = 1,
+};
+
+struct devlink_health_reporter {
+ struct list_head list;
+ void *priv;
+ const struct devlink_health_reporter_ops *ops;
+ struct devlink *devlink;
+ struct devlink_port *devlink_port;
+ struct devlink_fmsg *dump_fmsg;
+ struct mutex dump_lock;
+ u64 graceful_period;
+ bool auto_recover;
+ bool auto_dump;
+ u8 health_state;
+ u64 dump_ts;
+ u64 dump_real_ts;
+ u64 error_count;
+ u64 recovery_count;
+ u64 last_recovery_ts;
+ refcount_t refcount;
+};
+
+struct devlink_fmsg {
+ struct list_head item_list;
+ bool putting_binary;
+};
+
+struct devlink_trap_metadata {
+ const char *trap_name;
+ const char *trap_group_name;
+ struct net_device *input_dev;
+ netdevice_tracker dev_tracker;
+ const struct flow_action_cookie *fa_cookie;
+ enum devlink_trap_type trap_type;
+};
+
+struct devlink_info_req {
+ struct sk_buff *msg;
+ void (*version_cb)(const char *, enum devlink_info_version_type, void *);
+ void *version_cb_priv;
+};
+
+struct trace_event_raw_devlink_hwmsg {
+ struct trace_entry ent;
+ u32 __data_loc_bus_name;
+ u32 __data_loc_dev_name;
+ u32 __data_loc_driver_name;
+ bool incoming;
+ long unsigned int type;
+ u32 __data_loc_buf;
+ size_t len;
+ char __data[0];
+};
+
+struct trace_event_raw_devlink_hwerr {
+ struct trace_entry ent;
+ u32 __data_loc_bus_name;
+ u32 __data_loc_dev_name;
+ u32 __data_loc_driver_name;
+ int err;
+ u32 __data_loc_msg;
+ char __data[0];
+};
+
+struct trace_event_raw_devlink_health_report {
+ struct trace_entry ent;
+ u32 __data_loc_bus_name;
+ u32 __data_loc_dev_name;
+ u32 __data_loc_driver_name;
+ u32 __data_loc_reporter_name;
+ u32 __data_loc_msg;
+ char __data[0];
+};
+
+struct trace_event_raw_devlink_health_recover_aborted {
+ struct trace_entry ent;
+ u32 __data_loc_bus_name;
+ u32 __data_loc_dev_name;
+ u32 __data_loc_driver_name;
+ u32 __data_loc_reporter_name;
+ bool health_state;
+ u64 time_since_last_recover;
+ char __data[0];
+};
+
+struct trace_event_raw_devlink_health_reporter_state_update {
+ struct trace_entry ent;
+ u32 __data_loc_bus_name;
+ u32 __data_loc_dev_name;
+ u32 __data_loc_driver_name;
+ u32 __data_loc_reporter_name;
+ u8 new_state;
+ char __data[0];
+};
+
+struct trace_event_raw_devlink_trap_report {
+ struct trace_entry ent;
+ u32 __data_loc_bus_name;
+ u32 __data_loc_dev_name;
+ u32 __data_loc_driver_name;
+ u32 __data_loc_trap_name;
+ u32 __data_loc_trap_group_name;
+ char input_dev_name[16];
+ char __data[0];
+};
+
+struct trace_event_data_offsets_devlink_hwmsg {
+ u32 bus_name;
+ u32 dev_name;
+ u32 driver_name;
+ u32 buf;
+};
+
+struct trace_event_data_offsets_devlink_hwerr {
+ u32 bus_name;
+ u32 dev_name;
+ u32 driver_name;
+ u32 msg;
+};
+
+struct trace_event_data_offsets_devlink_health_report {
+ u32 bus_name;
+ u32 dev_name;
+ u32 driver_name;
+ u32 reporter_name;
+ u32 msg;
+};
+
+struct trace_event_data_offsets_devlink_health_recover_aborted {
+ u32 bus_name;
+ u32 dev_name;
+ u32 driver_name;
+ u32 reporter_name;
+};
+
+struct trace_event_data_offsets_devlink_health_reporter_state_update {
+ u32 bus_name;
+ u32 dev_name;
+ u32 driver_name;
+ u32 reporter_name;
+};
+
+struct trace_event_data_offsets_devlink_trap_report {
+ u32 bus_name;
+ u32 dev_name;
+ u32 driver_name;
+ u32 trap_name;
+ u32 trap_group_name;
+};
+
+typedef void (*btf_trace_devlink_hwmsg)(void *, const struct devlink *, bool, long unsigned int, const u8 *, size_t);
+
+typedef void (*btf_trace_devlink_hwerr)(void *, const struct devlink *, int, const char *);
+
+typedef void (*btf_trace_devlink_health_report)(void *, const struct devlink *, const char *, const char *);
+
+typedef void (*btf_trace_devlink_health_recover_aborted)(void *, const struct devlink *, const char *, bool, u64);
+
+typedef void (*btf_trace_devlink_health_reporter_state_update)(void *, const struct devlink *, const char *, bool);
+
+typedef void (*btf_trace_devlink_trap_report)(void *, const struct devlink *, struct sk_buff *, const struct devlink_trap_metadata *);
+
+struct devlink_linecard_type {
+ const char *type;
+ const void *priv;
+};
+
+struct devlink_resource {
+ const char *name;
+ u64 id;
+ u64 size;
+ u64 size_new;
+ bool size_valid;
+ struct devlink_resource *parent;
+ struct devlink_resource_size_params size_params;
+ struct list_head list;
+ struct list_head resource_list;
+ devlink_resource_occ_get_t *occ_get;
+ void *occ_get_priv;
+};
+
+struct devlink_sb {
+ struct list_head list;
+ unsigned int index;
+ u32 size;
+ u16 ingress_pools_count;
+ u16 egress_pools_count;
+ u16 ingress_tc_count;
+ u16 egress_tc_count;
+};
+
+struct devlink_region {
+ struct devlink *devlink;
+ struct devlink_port *port;
+ struct list_head list;
+ union {
+ const struct devlink_region_ops *ops;
+ const struct devlink_port_region_ops *port_ops;
+ };
+ struct mutex snapshot_lock;
+ struct list_head snapshot_list;
+ u32 max_snapshots;
+ u32 cur_snapshots;
+ u64 size;
+};
+
+struct devlink_snapshot {
+ struct list_head list;
+ struct devlink_region *region;
+ u8 *data;
+ u32 id;
+};
+
+enum devlink_multicast_groups {
+ DEVLINK_MCGRP_CONFIG = 0,
+};
+
+struct devlink_reload_combination {
+ enum devlink_reload_action action;
+ enum devlink_reload_limit limit;
+};
+
+struct devlink_flash_component_lookup_ctx {
+ const char *lookup_name;
+ bool lookup_name_found;
+};
+
+struct devlink_fmsg_item {
+ struct list_head list;
+ int attrtype;
+ u8 nla_type;
+ u16 len;
+ int value[0];
+};
+
+struct devlink_stats {
+ u64_stats_t rx_bytes;
+ u64_stats_t rx_packets;
+ struct u64_stats_sync syncp;
+};
+
+struct devlink_trap_policer_item {
+ const struct devlink_trap_policer *policer;
+ u64 rate;
+ u64 burst;
+ struct list_head list;
+};
+
+struct devlink_trap_group_item {
+ const struct devlink_trap_group *group;
+ struct devlink_trap_policer_item *policer_item;
+ struct list_head list;
+ struct devlink_stats *stats;
+};
+
+struct devlink_trap_item {
+ const struct devlink_trap *trap;
+ struct devlink_trap_group_item *group_item;
+ struct list_head list;
+ enum devlink_trap_action action;
+ struct devlink_stats *stats;
+ void *priv;
+};
+
+enum insn_type {
+ CALL = 0,
+ NOP = 1,
+ JMP = 2,
+ RET = 3,
+};
+
+struct _fpx_sw_bytes {
+ __u32 magic1;
+ __u32 extended_size;
+ __u64 xfeatures;
+ __u32 xstate_size;
+ __u32 padding[7];
+};
+
+struct _fpreg {
+ __u16 significand[4];
+ __u16 exponent;
+};
+
+struct _fpxreg {
+ __u16 significand[4];
+ __u16 exponent;
+ __u16 padding[3];
+};
+
+struct _xmmreg {
+ __u32 element[4];
+};
+
+struct _fpstate_32 {
+ __u32 cw;
+ __u32 sw;
+ __u32 tag;
+ __u32 ipoff;
+ __u32 cssel;
+ __u32 dataoff;
+ __u32 datasel;
+ struct _fpreg _st[8];
+ __u16 status;
+ __u16 magic;
+ __u32 _fxsr_env[6];
+ __u32 mxcsr;
+ __u32 reserved;
+ struct _fpxreg _fxsr_st[8];
+ struct _xmmreg _xmm[8];
+ union {
+ __u32 padding1[44];
+ __u32 padding[44];
+ };
+ union {
+ __u32 padding2[12];
+ struct _fpx_sw_bytes sw_reserved;
+ };
+};
+
+struct user_i387_ia32_struct {
+ u32 cwd;
+ u32 swd;
+ u32 twd;
+ u32 fip;
+ u32 fcs;
+ u32 foo;
+ u32 fos;
+ u32 st_space[20];
+};
+
+enum {
+ TASKSTATS_TYPE_UNSPEC = 0,
+ TASKSTATS_TYPE_PID = 1,
+ TASKSTATS_TYPE_TGID = 2,
+ TASKSTATS_TYPE_STATS = 3,
+ TASKSTATS_TYPE_AGGR_PID = 4,
+ TASKSTATS_TYPE_AGGR_TGID = 5,
+ TASKSTATS_TYPE_NULL = 6,
+ __TASKSTATS_TYPE_MAX = 7,
+};
+
+enum {
+ TASKSTATS_CMD_ATTR_UNSPEC = 0,
+ TASKSTATS_CMD_ATTR_PID = 1,
+ TASKSTATS_CMD_ATTR_TGID = 2,
+ TASKSTATS_CMD_ATTR_REGISTER_CPUMASK = 3,
+ TASKSTATS_CMD_ATTR_DEREGISTER_CPUMASK = 4,
+ __TASKSTATS_CMD_ATTR_MAX = 5,
+};
+
+enum {
+ CGROUPSTATS_CMD_UNSPEC = 3,
+ CGROUPSTATS_CMD_GET = 4,
+ CGROUPSTATS_CMD_NEW = 5,
+ __CGROUPSTATS_CMD_MAX = 6,
+};
+
+enum {
+ CGROUPSTATS_TYPE_UNSPEC = 0,
+ CGROUPSTATS_TYPE_CGROUP_STATS = 1,
+ __CGROUPSTATS_TYPE_MAX = 2,
+};
+
+enum {
+ CGROUPSTATS_CMD_ATTR_UNSPEC = 0,
+ CGROUPSTATS_CMD_ATTR_FD = 1,
+ __CGROUPSTATS_CMD_ATTR_MAX = 2,
+};
+
+struct listener {
+ struct list_head list;
+ pid_t pid;
+ char valid;
+};
+
+struct listener_list {
+ struct rw_semaphore sem;
+ struct list_head list;
+};
+
+enum actions {
+ REGISTER = 0,
+ DEREGISTER = 1,
+ CPU_DONT_CARE = 2,
+};
+
+struct user_arg_ptr {
+ union {
+ const char * const *native;
+ } ptr;
+};
+
+typedef u32 unicode_t;
+
+struct utf8_table {
+ int cmask;
+ int cval;
+ int shift;
+ long int lmask;
+ long int lval;
+};
+
+struct tracefs_dir_ops {
+ int (*mkdir)(const char *);
+ int (*rmdir)(const char *);
+};
+
+struct tracefs_mount_opts {
+ kuid_t uid;
+ kgid_t gid;
+ umode_t mode;
+ unsigned int opts;
+};
+
+struct tracefs_fs_info {
+ struct tracefs_mount_opts mount_opts;
+};
+
+struct cond_insertf_data {
+ struct policydb *p;
+ struct avtab_node **dst;
+ struct cond_av_list *other;
+};
+
+struct rand_data {
+ __u64 data;
+ __u64 old_data;
+ __u64 prev_time;
+ __u64 last_delta;
+ __s64 last_delta2;
+ unsigned int osr;
+ unsigned char *mem;
+ unsigned int memlocation;
+ unsigned int memblocks;
+ unsigned int memblocksize;
+ unsigned int memaccessloops;
+ int rct_count;
+ unsigned int apt_observations;
+ unsigned int apt_count;
+ unsigned int apt_base;
+ unsigned int apt_base_set: 1;
+ unsigned int health_failure: 1;
+};
+
+struct rand_data;
+
+struct jitterentropy {
+ spinlock_t jent_lock;
+ struct rand_data *entropy_collector;
+ unsigned int reset_cnt;
+};
+
+struct acpi_pcct_shared_memory {
+ u32 signature;
+ u16 command;
+ u16 status;
+};
+
+struct cpc_register_resource {
+ acpi_object_type type;
+ u64 *sys_mem_vaddr;
+ union {
+ struct cpc_reg reg;
+ u64 int_value;
+ } cpc_entry;
+};
+
+struct cpc_desc {
+ int num_entries;
+ int version;
+ int cpu_id;
+ int write_cmd_status;
+ int write_cmd_id;
+ struct cpc_register_resource cpc_regs[21];
+ struct acpi_psd_package domain_info;
+ struct kobject kobj;
+};
+
+enum cppc_regs {
+ HIGHEST_PERF = 0,
+ NOMINAL_PERF = 1,
+ LOW_NON_LINEAR_PERF = 2,
+ LOWEST_PERF = 3,
+ GUARANTEED_PERF = 4,
+ DESIRED_PERF = 5,
+ MIN_PERF = 6,
+ MAX_PERF = 7,
+ PERF_REDUC_TOLERANCE = 8,
+ TIME_WINDOW = 9,
+ CTR_WRAP_TIME = 10,
+ REFERENCE_CTR = 11,
+ DELIVERED_CTR = 12,
+ PERF_LIMITED = 13,
+ ENABLE = 14,
+ AUTO_SEL_ENABLE = 15,
+ AUTO_ACT_WINDOW = 16,
+ ENERGY_PERF = 17,
+ REFERENCE_PERF = 18,
+ LOWEST_FREQ = 19,
+ NOMINAL_FREQ = 20,
+};
+
+struct cppc_perf_ctrls {
+ u32 max_perf;
+ u32 min_perf;
+ u32 desired_perf;
+};
+
+struct cppc_perf_fb_ctrs {
+ u64 reference;
+ u64 delivered;
+ u64 reference_perf;
+ u64 wraparound_time;
+};
+
+struct cppc_cpudata {
+ struct list_head node;
+ struct cppc_perf_caps perf_caps;
+ struct cppc_perf_ctrls perf_ctrls;
+ struct cppc_perf_fb_ctrs perf_fb_ctrs;
+ unsigned int shared_type;
+ cpumask_var_t shared_cpu_map;
+};
+
+struct cppc_pcc_data {
+ struct pcc_mbox_chan *pcc_channel;
+ void *pcc_comm_addr;
+ bool pcc_channel_acquired;
+ unsigned int deadline_us;
+ unsigned int pcc_mpar;
+ unsigned int pcc_mrtt;
+ unsigned int pcc_nominal;
+ bool pending_pcc_write_cmd;
+ bool platform_owns_pcc;
+ unsigned int pcc_write_cnt;
+ struct rw_semaphore pcc_lock;
+ wait_queue_head_t pcc_write_wait_q;
+ ktime_t last_cmd_cmpl_time;
+ ktime_t last_mpar_reset;
+ int mpar_count;
+ int refcount;
+};
+
+struct tpm1_get_random_out {
+ __be32 rng_data_len;
+ u8 rng_data[128];
+};
+
+struct virtio_net_config {
+ __u8 mac[6];
+ __virtio16 status;
+ __virtio16 max_virtqueue_pairs;
+ __virtio16 mtu;
+ __le32 speed;
+ __u8 duplex;
+ __u8 rss_max_key_size;
+ __le16 rss_max_indirection_table_length;
+ __le32 supported_hash_types;
+};
+
+struct virtio_net_hdr_v1 {
+ __u8 flags;
+ __u8 gso_type;
+ __virtio16 hdr_len;
+ __virtio16 gso_size;
+ union {
+ struct {
+ __virtio16 csum_start;
+ __virtio16 csum_offset;
+ };
+ struct {
+ __virtio16 start;
+ __virtio16 offset;
+ } csum;
+ struct {
+ __le16 segments;
+ __le16 dup_acks;
+ } rsc;
+ };
+ __virtio16 num_buffers;
+};
+
+struct virtio_net_hdr_v1_hash {
+ struct virtio_net_hdr_v1 hdr;
+ __le32 hash_value;
+ __le16 hash_report;
+ __le16 padding;
+};
+
+struct virtio_net_hdr_mrg_rxbuf {
+ struct virtio_net_hdr hdr;
+ __virtio16 num_buffers;
+};
+
+struct virtio_net_ctrl_hdr {
+ __u8 class;
+ __u8 cmd;
+};
+
+typedef __u8 virtio_net_ctrl_ack;
+
+struct virtio_net_ctrl_mac {
+ __virtio32 entries;
+ __u8 macs[0];
+};
+
+struct virtio_net_ctrl_mq {
+ __virtio16 virtqueue_pairs;
+};
+
+struct virtio_net_ctrl_coal_tx {
+ __le32 tx_max_packets;
+ __le32 tx_usecs;
+};
+
+struct virtio_net_ctrl_coal_rx {
+ __le32 rx_max_packets;
+ __le32 rx_usecs;
+};
+
+struct ewma_pkt_len {
+ long unsigned int internal;
+};
+
+struct virtnet_stat_desc {
+ char desc[32];
+ size_t offset;
+};
+
+struct virtnet_sq_stats {
+ struct u64_stats_sync syncp;
+ u64 packets;
+ u64 bytes;
+ u64 xdp_tx;
+ u64 xdp_tx_drops;
+ u64 kicks;
+ u64 tx_timeouts;
+};
+
+struct virtnet_rq_stats {
+ struct u64_stats_sync syncp;
+ u64 packets;
+ u64 bytes;
+ u64 drops;
+ u64 xdp_packets;
+ u64 xdp_tx;
+ u64 xdp_redirects;
+ u64 xdp_drops;
+ u64 kicks;
+};
+
+struct send_queue {
+ struct virtqueue *vq;
+ struct scatterlist sg[19];
+ char name[40];
+ struct virtnet_sq_stats stats;
+ struct napi_struct napi;
+ bool reset;
+};
+
+struct receive_queue {
+ struct virtqueue *vq;
+ struct napi_struct napi;
+ struct bpf_prog *xdp_prog;
+ struct virtnet_rq_stats stats;
+ struct page *pages;
+ struct ewma_pkt_len mrg_avg_pkt_len;
+ struct page_frag alloc_frag;
+ struct scatterlist sg[19];
+ unsigned int min_buf_len;
+ char name[40];
+ long: 32;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ long: 64;
+ struct xdp_rxq_info xdp_rxq;
+};
+
+struct virtio_net_ctrl_rss {
+ u32 hash_types;
+ u16 indirection_table_mask;
+ u16 unclassified_queue;
+ u16 indirection_table[128];
+ u16 max_tx_vq;
+ u8 hash_key_length;
+ u8 key[40];
+};
+
+struct control_buf {
+ struct virtio_net_ctrl_hdr hdr;
+ virtio_net_ctrl_ack status;
+ struct virtio_net_ctrl_mq mq;
+ u8 promisc;
+ u8 allmulti;
+ __virtio16 vid;
+ __virtio64 offloads;
+ struct virtio_net_ctrl_rss rss;
+};
+
+struct virtnet_info {
+ struct virtio_device *vdev;
+ struct virtqueue *cvq;
+ struct net_device *dev;
+ struct send_queue *sq;
+ struct receive_queue *rq;
+ unsigned int status;
+ u16 max_queue_pairs;
+ u16 curr_queue_pairs;
+ u16 xdp_queue_pairs;
+ bool xdp_enabled;
+ bool big_packets;
+ unsigned int big_packets_num_skbfrags;
+ bool mergeable_rx_bufs;
+ bool has_rss;
+ bool has_rss_hash_report;
+ u8 rss_key_size;
+ u16 rss_indir_table_size;
+ u32 rss_hash_types_supported;
+ u32 rss_hash_types_saved;
+ bool has_cvq;
+ bool any_header_sg;
+ u8 hdr_len;
+ struct delayed_work refill;
+ bool refill_enabled;
+ spinlock_t refill_lock;
+ struct work_struct config_work;
+ bool affinity_hint_set;
+ struct hlist_node node;
+ struct hlist_node node_dead;
+ struct control_buf *ctrl;
+ u8 duplex;
+ u32 speed;
+ u32 tx_usecs;
+ u32 rx_usecs;
+ u32 tx_max_packets;
+ u32 rx_max_packets;
+ long unsigned int guest_offloads;
+ long unsigned int guest_offloads_capable;
+ struct failover *failover;
+};
+
+struct ifaddrlblmsg {
+ __u8 ifal_family;
+ __u8 __ifal_reserved;
+ __u8 ifal_prefixlen;
+ __u8 ifal_flags;
+ __u32 ifal_index;
+ __u32 ifal_seq;
+};
+
+enum {
+ IFAL_ADDRESS = 1,
+ IFAL_LABEL = 2,
+ __IFAL_MAX = 3,
+};
+
+struct ip6addrlbl_entry {
+ struct in6_addr prefix;
+ int prefixlen;
+ int ifindex;
+ int addrtype;
+ u32 label;
+ struct hlist_node list;
+ struct callback_head rcu;
+};
+
+struct ip6addrlbl_init_table {
+ const struct in6_addr *prefix;
+ int prefixlen;
+ u32 label;
+};
+
+struct fork_frame {
+ struct inactive_task_frame frame;
+ struct pt_regs regs;
+};
+
+struct ssb_state {
+ struct ssb_state *shared_state;
+ raw_spinlock_t lock;
+ unsigned int disable_state;
+ long unsigned int local_state;
+};
+
+enum {
+ BPF_F_GET_BRANCH_RECORDS_SIZE = 1,
+};
+
+struct bpf_perf_event_value {
+ __u64 counter;
+ __u64 enabled;
+ __u64 running;
+};
+
+struct btf_ptr {
+ void *ptr;
+ __u32 type_id;
+ __u32 flags;
+};
+
+struct bpf_key {
+ struct key *key;
+ bool has_ref;
+};
+
+struct perf_event_query_bpf {
+ __u32 ids_len;
+ __u32 prog_cnt;
+ __u32 ids[0];
+};
+
+struct trace_event_raw_bpf_trace_printk {
+ struct trace_entry ent;
+ u32 __data_loc_bpf_string;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_bpf_trace_printk {
+ u32 bpf_string;
+};
+
+typedef void (*btf_trace_bpf_trace_printk)(void *, const char *);
+
+struct bpf_trace_module {
+ struct module *module;
+ struct list_head list;
+};
+
+typedef u64 (*btf_bpf_override_return)(struct pt_regs *, long unsigned int);
+
+typedef u64 (*btf_bpf_probe_read_user)(void *, u32, const void *);
+
+typedef u64 (*btf_bpf_probe_read_user_str)(void *, u32, const void *);
+
+typedef u64 (*btf_bpf_probe_read_kernel)(void *, u32, const void *);
+
+typedef u64 (*btf_bpf_probe_read_kernel_str)(void *, u32, const void *);
+
+typedef u64 (*btf_bpf_probe_read_compat)(void *, u32, const void *);
+
+typedef u64 (*btf_bpf_probe_read_compat_str)(void *, u32, const void *);
+
+typedef u64 (*btf_bpf_probe_write_user)(void *, const void *, u32);
+
+typedef u64 (*btf_bpf_trace_printk)(char *, u32, u64, u64, u64);
+
+typedef u64 (*btf_bpf_trace_vprintk)(char *, u32, const void *, u32);
+
+typedef u64 (*btf_bpf_seq_printf)(struct seq_file *, char *, u32, const void *, u32);
+
+typedef u64 (*btf_bpf_seq_write)(struct seq_file *, const void *, u32);
+
+typedef u64 (*btf_bpf_seq_printf_btf)(struct seq_file *, struct btf_ptr *, u32, u64);
+
+typedef u64 (*btf_bpf_perf_event_read)(struct bpf_map *, u64);
+
+typedef u64 (*btf_bpf_perf_event_read_value)(struct bpf_map *, u64, struct bpf_perf_event_value *, u32);
+
+struct bpf_trace_sample_data {
+ struct perf_sample_data sds[3];
+};
+
+typedef u64 (*btf_bpf_perf_event_output)(struct pt_regs *, struct bpf_map *, u64, void *, u64);
+
+struct bpf_nested_pt_regs {
+ struct pt_regs regs[3];
+};
+
+typedef u64 (*btf_bpf_get_current_task)();
+
+typedef u64 (*btf_bpf_get_current_task_btf)();
+
+typedef u64 (*btf_bpf_task_pt_regs)(struct task_struct *);
+
+typedef u64 (*btf_bpf_current_task_under_cgroup)(struct bpf_map *, u32);
+
+struct send_signal_irq_work {
+ struct irq_work irq_work;
+ struct task_struct *task;
+ u32 sig;
+ enum pid_type type;
+};
+
+typedef u64 (*btf_bpf_send_signal)(u32);
+
+typedef u64 (*btf_bpf_send_signal_thread)(u32);
+
+typedef u64 (*btf_bpf_d_path)(struct path *, char *, u32);
+
+typedef u64 (*btf_bpf_snprintf_btf)(char *, u32, struct btf_ptr *, u32, u64);
+
+typedef u64 (*btf_bpf_get_func_ip_tracing)(void *);
+
+typedef u64 (*btf_bpf_get_func_ip_kprobe)(struct pt_regs *);
+
+typedef u64 (*btf_bpf_get_func_ip_kprobe_multi)(struct pt_regs *);
+
+typedef u64 (*btf_bpf_get_attach_cookie_kprobe_multi)(struct pt_regs *);
+
+typedef u64 (*btf_bpf_get_attach_cookie_trace)(void *);
+
+typedef u64 (*btf_bpf_get_attach_cookie_pe)(struct bpf_perf_event_data_kern *);
+
+typedef u64 (*btf_bpf_get_attach_cookie_tracing)(void *);
+
+typedef u64 (*btf_bpf_get_branch_snapshot)(void *, u32, u64);
+
+typedef u64 (*btf_get_func_arg)(void *, u32, u64 *);
+
+typedef u64 (*btf_get_func_ret)(void *, u64 *);
+
+typedef u64 (*btf_get_func_arg_cnt)(void *);
+
+typedef u64 (*btf_bpf_perf_event_output_tp)(void *, struct bpf_map *, u64, void *, u64);
+
+typedef u64 (*btf_bpf_get_stackid_tp)(void *, struct bpf_map *, u64);
+
+typedef u64 (*btf_bpf_get_stack_tp)(void *, void *, u32, u64);
+
+typedef u64 (*btf_bpf_perf_prog_read_value)(struct bpf_perf_event_data_kern *, struct bpf_perf_event_value *, u32);
+
+typedef u64 (*btf_bpf_read_branch_records)(struct bpf_perf_event_data_kern *, void *, u32, u64);
+
+struct bpf_raw_tp_regs {
+ struct pt_regs regs[3];
+};
+
+typedef u64 (*btf_bpf_perf_event_output_raw_tp)(struct bpf_raw_tracepoint_args *, struct bpf_map *, u64, void *, u64);
+
+typedef u64 (*btf_bpf_get_stackid_raw_tp)(struct bpf_raw_tracepoint_args *, struct bpf_map *, u64);
+
+typedef u64 (*btf_bpf_get_stack_raw_tp)(struct bpf_raw_tracepoint_args *, void *, u32, u64);
+
+struct bpf_kprobe_multi_link {
+ struct bpf_link link;
+ struct fprobe fp;
+ long unsigned int *addrs;
+ u64 *cookies;
+ u32 cnt;
+ u32 mods_cnt;
+ struct module **mods;
+};
+
+struct bpf_kprobe_multi_run_ctx {
+ struct bpf_run_ctx run_ctx;
+ struct bpf_kprobe_multi_link *link;
+ long unsigned int entry_ip;
+};
+
+struct user_syms {
+ const char **syms;
+ char *buf;
+};
+
+struct multi_symbols_sort {
+ const char **funcs;
+ u64 *cookies;
+};
+
+struct module_addr_args {
+ long unsigned int *addrs;
+ u32 addrs_cnt;
+ struct module **mods;
+ int mods_cnt;
+ int mods_cap;
+};
+
+struct cryptomgr_param {
+ struct rtattr *tb[34];
+ struct {
+ struct rtattr attr;
+ struct crypto_attr_type data;
+ } type;
+ struct {
+ struct rtattr attr;
+ struct crypto_attr_alg data;
+ } attrs[32];
+ char template[128];
+ struct crypto_larval *larval;
+ u32 otype;
+ u32 omask;
+};
+
+struct crypto_test_param {
+ char driver[128];
+ char alg[128];
+ u32 type;
+};
+
+struct show_busy_params {
+ struct seq_file *m;
+ struct blk_mq_hw_ctx *hctx;
+};
+
+struct irq_glue {
+ struct irq_affinity_notify notify;
+ struct cpu_rmap *rmap;
+ u16 index;
+};
+
+struct fb_cvt_data {
+ u32 xres;
+ u32 yres;
+ u32 refresh;
+ u32 f_refresh;
+ u32 pixclock;
+ u32 hperiod;
+ u32 hblank;
+ u32 hfreq;
+ u32 htotal;
+ u32 vtotal;
+ u32 vsync;
+ u32 hsync;
+ u32 h_front_porch;
+ u32 h_back_porch;
+ u32 v_front_porch;
+ u32 v_back_porch;
+ u32 h_margin;
+ u32 v_margin;
+ u32 interlace;
+ u32 aspect_ratio;
+ u32 active_pixels;
+ u32 flags;
+ u32 status;
+};
+
+struct virtio_balloon_config {
+ __le32 num_pages;
+ __le32 actual;
+ union {
+ __le32 free_page_hint_cmd_id;
+ __le32 free_page_report_cmd_id;
+ };
+ __le32 poison_val;
+};
+
+struct virtio_balloon_stat {
+ __virtio16 tag;
+ __virtio64 val;
+} __attribute__((packed));
+
+enum virtio_balloon_vq {
+ VIRTIO_BALLOON_VQ_INFLATE = 0,
+ VIRTIO_BALLOON_VQ_DEFLATE = 1,
+ VIRTIO_BALLOON_VQ_STATS = 2,
+ VIRTIO_BALLOON_VQ_FREE_PAGE = 3,
+ VIRTIO_BALLOON_VQ_REPORTING = 4,
+ VIRTIO_BALLOON_VQ_MAX = 5,
+};
+
+enum virtio_balloon_config_read {
+ VIRTIO_BALLOON_CONFIG_READ_CMD_ID = 0,
+};
+
+struct virtio_balloon {
+ struct virtio_device *vdev;
+ struct virtqueue *inflate_vq;
+ struct virtqueue *deflate_vq;
+ struct virtqueue *stats_vq;
+ struct virtqueue *free_page_vq;
+ struct workqueue_struct *balloon_wq;
+ struct work_struct report_free_page_work;
+ struct work_struct update_balloon_stats_work;
+ struct work_struct update_balloon_size_work;
+ spinlock_t stop_update_lock;
+ bool stop_update;
+ long: 56;
+ long unsigned int config_read_bitmap;
+ struct list_head free_page_list;
+ spinlock_t free_page_list_lock;
+ long unsigned int num_free_page_blocks;
+ u32 cmd_id_received_cache;
+ __virtio32 cmd_id_active;
+ __virtio32 cmd_id_stop;
+ int: 32;
+ wait_queue_head_t acked;
+ unsigned int num_pages;
+ int: 32;
+ struct balloon_dev_info vb_dev_info;
+ struct mutex balloon_lock;
+ unsigned int num_pfns;
+ __virtio32 pfns[256];
+ struct virtio_balloon_stat stats[10];
+ struct shrinker shrinker;
+ struct notifier_block oom_nb;
+ struct virtqueue *reporting_vq;
+ struct page_reporting_dev_info pr_dev_info;
+} __attribute__((packed));
+
+enum txtime_flags {
+ SOF_TXTIME_DEADLINE_MODE = 1,
+ SOF_TXTIME_REPORT_ERRORS = 2,
+ SOF_TXTIME_FLAGS_LAST = 2,
+ SOF_TXTIME_FLAGS_MASK = 3,
+};
+
+struct sock_txtime {
+ __kernel_clockid_t clockid;
+ __u32 flags;
+};
+
+struct xt_bpf_info {
+ __u16 bpf_program_num_elem;
+ struct sock_filter bpf_program[64];
+ struct bpf_prog *filter;
+};
+
+enum xt_bpf_modes {
+ XT_BPF_MODE_BYTECODE = 0,
+ XT_BPF_MODE_FD_PINNED = 1,
+ XT_BPF_MODE_FD_ELF = 2,
+};
+
+struct xt_bpf_info_v1 {
+ __u16 mode;
+ __u16 bpf_program_num_elem;
+ __s32 fd;
+ union {
+ struct sock_filter bpf_program[64];
+ char path[512];
+ };
+ struct bpf_prog *filter;
+};
+
+enum {
+ PIM_TYPE_HELLO = 0,
+ PIM_TYPE_REGISTER = 1,
+ PIM_TYPE_REGISTER_STOP = 2,
+ PIM_TYPE_JOIN_PRUNE = 3,
+ PIM_TYPE_BOOTSTRAP = 4,
+ PIM_TYPE_ASSERT = 5,
+ PIM_TYPE_GRAFT = 6,
+ PIM_TYPE_GRAFT_ACK = 7,
+ PIM_TYPE_CANDIDATE_RP_ADV = 8,
+};
+
+struct pimreghdr {
+ __u8 type;
+ __u8 reserved;
+ __be16 csum;
+ __be32 flags;
+};
+
+typedef short unsigned int vifi_t;
+
+struct vifctl {
+ vifi_t vifc_vifi;
+ unsigned char vifc_flags;
+ unsigned char vifc_threshold;
+ unsigned int vifc_rate_limit;
+ union {
+ struct in_addr vifc_lcl_addr;
+ int vifc_lcl_ifindex;
+ };
+ struct in_addr vifc_rmt_addr;
+};
+
+struct mfcctl {
+ struct in_addr mfcc_origin;
+ struct in_addr mfcc_mcastgrp;
+ vifi_t mfcc_parent;
+ unsigned char mfcc_ttls[32];
+ unsigned int mfcc_pkt_cnt;
+ unsigned int mfcc_byte_cnt;
+ unsigned int mfcc_wrong_if;
+ int mfcc_expire;
+};
+
+struct sioc_sg_req {
+ struct in_addr src;
+ struct in_addr grp;
+ long unsigned int pktcnt;
+ long unsigned int bytecnt;
+ long unsigned int wrong_if;
+};
+
+struct sioc_vif_req {
+ vifi_t vifi;
+ long unsigned int icount;
+ long unsigned int ocount;
+ long unsigned int ibytes;
+ long unsigned int obytes;
+};
+
+struct igmpmsg {
+ __u32 unused1;
+ __u32 unused2;
+ unsigned char im_msgtype;
+ unsigned char im_mbz;
+ unsigned char im_vif;
+ unsigned char im_vif_hi;
+ struct in_addr im_src;
+ struct in_addr im_dst;
+};
+
+enum {
+ IPMRA_TABLE_UNSPEC = 0,
+ IPMRA_TABLE_ID = 1,
+ IPMRA_TABLE_CACHE_RES_QUEUE_LEN = 2,
+ IPMRA_TABLE_MROUTE_REG_VIF_NUM = 3,
+ IPMRA_TABLE_MROUTE_DO_ASSERT = 4,
+ IPMRA_TABLE_MROUTE_DO_PIM = 5,
+ IPMRA_TABLE_VIFS = 6,
+ IPMRA_TABLE_MROUTE_DO_WRVIFWHOLE = 7,
+ __IPMRA_TABLE_MAX = 8,
+};
+
+enum {
+ IPMRA_VIF_UNSPEC = 0,
+ IPMRA_VIF = 1,
+ __IPMRA_VIF_MAX = 2,
+};
+
+enum {
+ IPMRA_VIFA_UNSPEC = 0,
+ IPMRA_VIFA_IFINDEX = 1,
+ IPMRA_VIFA_VIF_ID = 2,
+ IPMRA_VIFA_FLAGS = 3,
+ IPMRA_VIFA_BYTES_IN = 4,
+ IPMRA_VIFA_BYTES_OUT = 5,
+ IPMRA_VIFA_PACKETS_IN = 6,
+ IPMRA_VIFA_PACKETS_OUT = 7,
+ IPMRA_VIFA_LOCAL_ADDR = 8,
+ IPMRA_VIFA_REMOTE_ADDR = 9,
+ IPMRA_VIFA_PAD = 10,
+ __IPMRA_VIFA_MAX = 11,
+};
+
+enum {
+ IPMRA_CREPORT_UNSPEC = 0,
+ IPMRA_CREPORT_MSGTYPE = 1,
+ IPMRA_CREPORT_VIF_ID = 2,
+ IPMRA_CREPORT_SRC_ADDR = 3,
+ IPMRA_CREPORT_DST_ADDR = 4,
+ IPMRA_CREPORT_PKT = 5,
+ IPMRA_CREPORT_TABLE = 6,
+ __IPMRA_CREPORT_MAX = 7,
+};
+
+struct mfc_cache_cmp_arg {
+ __be32 mfc_mcastgrp;
+ __be32 mfc_origin;
+};
+
+struct mfc_cache {
+ struct mr_mfc _c;
+ union {
+ struct {
+ __be32 mfc_mcastgrp;
+ __be32 mfc_origin;
+ };
+ struct mfc_cache_cmp_arg cmparg;
+ };
+};
+
+struct join_entry {
+ u32 token;
+ u32 remote_nonce;
+ u32 local_nonce;
+ u8 join_id;
+ u8 local_id;
+ u8 backup;
+ u8 valid;
+};
+
+struct node_vectors {
+ unsigned int id;
+ union {
+ unsigned int nvectors;
+ unsigned int ncpus;
+ };
+};
+
+struct trace_event_raw_rcu_utilization {
+ struct trace_entry ent;
+ const char *s;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_grace_period {
+ struct trace_entry ent;
+ const char *rcuname;
+ long int gp_seq;
+ const char *gpevent;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_future_grace_period {
+ struct trace_entry ent;
+ const char *rcuname;
+ long int gp_seq;
+ long int gp_seq_req;
+ u8 level;
+ int grplo;
+ int grphi;
+ const char *gpevent;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_grace_period_init {
+ struct trace_entry ent;
+ const char *rcuname;
+ long int gp_seq;
+ u8 level;
+ int grplo;
+ int grphi;
+ long unsigned int qsmask;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_exp_grace_period {
+ struct trace_entry ent;
+ const char *rcuname;
+ long int gpseq;
+ const char *gpevent;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_exp_funnel_lock {
+ struct trace_entry ent;
+ const char *rcuname;
+ u8 level;
+ int grplo;
+ int grphi;
+ const char *gpevent;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_preempt_task {
+ struct trace_entry ent;
+ const char *rcuname;
+ long int gp_seq;
+ int pid;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_unlock_preempted_task {
+ struct trace_entry ent;
+ const char *rcuname;
+ long int gp_seq;
+ int pid;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_quiescent_state_report {
+ struct trace_entry ent;
+ const char *rcuname;
+ long int gp_seq;
+ long unsigned int mask;
+ long unsigned int qsmask;
+ u8 level;
+ int grplo;
+ int grphi;
+ u8 gp_tasks;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_fqs {
+ struct trace_entry ent;
+ const char *rcuname;
+ long int gp_seq;
+ int cpu;
+ const char *qsevent;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_stall_warning {
+ struct trace_entry ent;
+ const char *rcuname;
+ const char *msg;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_dyntick {
+ struct trace_entry ent;
+ const char *polarity;
+ long int oldnesting;
+ long int newnesting;
+ int dynticks;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_callback {
+ struct trace_entry ent;
+ const char *rcuname;
+ void *rhp;
+ void *func;
+ long int qlen;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_segcb_stats {
+ struct trace_entry ent;
+ const char *ctx;
+ long unsigned int gp_seq[4];
+ long int seglen[4];
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_kvfree_callback {
+ struct trace_entry ent;
+ const char *rcuname;
+ void *rhp;
+ long unsigned int offset;
+ long int qlen;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_batch_start {
+ struct trace_entry ent;
+ const char *rcuname;
+ long int qlen;
+ long int blimit;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_invoke_callback {
+ struct trace_entry ent;
+ const char *rcuname;
+ void *rhp;
+ void *func;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_invoke_kvfree_callback {
+ struct trace_entry ent;
+ const char *rcuname;
+ void *rhp;
+ long unsigned int offset;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_invoke_kfree_bulk_callback {
+ struct trace_entry ent;
+ const char *rcuname;
+ long unsigned int nr_records;
+ void **p;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_batch_end {
+ struct trace_entry ent;
+ const char *rcuname;
+ int callbacks_invoked;
+ char cb;
+ char nr;
+ char iit;
+ char risk;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_torture_read {
+ struct trace_entry ent;
+ char rcutorturename[8];
+ struct callback_head *rhp;
+ long unsigned int secs;
+ long unsigned int c_old;
+ long unsigned int c;
+ char __data[0];
+};
+
+struct trace_event_raw_rcu_barrier {
+ struct trace_entry ent;
+ const char *rcuname;
+ const char *s;
+ int cpu;
+ int cnt;
+ long unsigned int done;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_rcu_utilization {};
+
+struct trace_event_data_offsets_rcu_grace_period {};
+
+struct trace_event_data_offsets_rcu_future_grace_period {};
+
+struct trace_event_data_offsets_rcu_grace_period_init {};
+
+struct trace_event_data_offsets_rcu_exp_grace_period {};
+
+struct trace_event_data_offsets_rcu_exp_funnel_lock {};
+
+struct trace_event_data_offsets_rcu_preempt_task {};
+
+struct trace_event_data_offsets_rcu_unlock_preempted_task {};
+
+struct trace_event_data_offsets_rcu_quiescent_state_report {};
+
+struct trace_event_data_offsets_rcu_fqs {};
+
+struct trace_event_data_offsets_rcu_stall_warning {};
+
+struct trace_event_data_offsets_rcu_dyntick {};
+
+struct trace_event_data_offsets_rcu_callback {};
+
+struct trace_event_data_offsets_rcu_segcb_stats {};
+
+struct trace_event_data_offsets_rcu_kvfree_callback {};
+
+struct trace_event_data_offsets_rcu_batch_start {};
+
+struct trace_event_data_offsets_rcu_invoke_callback {};
+
+struct trace_event_data_offsets_rcu_invoke_kvfree_callback {};
+
+struct trace_event_data_offsets_rcu_invoke_kfree_bulk_callback {};
+
+struct trace_event_data_offsets_rcu_batch_end {};
+
+struct trace_event_data_offsets_rcu_torture_read {};
+
+struct trace_event_data_offsets_rcu_barrier {};
+
+typedef void (*btf_trace_rcu_utilization)(void *, const char *);
+
+typedef void (*btf_trace_rcu_grace_period)(void *, const char *, long unsigned int, const char *);
+
+typedef void (*btf_trace_rcu_future_grace_period)(void *, const char *, long unsigned int, long unsigned int, u8, int, int, const char *);
+
+typedef void (*btf_trace_rcu_grace_period_init)(void *, const char *, long unsigned int, u8, int, int, long unsigned int);
+
+typedef void (*btf_trace_rcu_exp_grace_period)(void *, const char *, long unsigned int, const char *);
+
+typedef void (*btf_trace_rcu_exp_funnel_lock)(void *, const char *, u8, int, int, const char *);
+
+typedef void (*btf_trace_rcu_preempt_task)(void *, const char *, int, long unsigned int);
+
+typedef void (*btf_trace_rcu_unlock_preempted_task)(void *, const char *, long unsigned int, int);
+
+typedef void (*btf_trace_rcu_quiescent_state_report)(void *, const char *, long unsigned int, long unsigned int, long unsigned int, u8, int, int, int);
+
+typedef void (*btf_trace_rcu_fqs)(void *, const char *, long unsigned int, int, const char *);
+
+typedef void (*btf_trace_rcu_stall_warning)(void *, const char *, const char *);
+
+typedef void (*btf_trace_rcu_dyntick)(void *, const char *, long int, long int, int);
+
+typedef void (*btf_trace_rcu_callback)(void *, const char *, struct callback_head *, long int);
+
+typedef void (*btf_trace_rcu_segcb_stats)(void *, struct rcu_segcblist *, const char *);
+
+typedef void (*btf_trace_rcu_kvfree_callback)(void *, const char *, struct callback_head *, long unsigned int, long int);
+
+typedef void (*btf_trace_rcu_batch_start)(void *, const char *, long int, long int);
+
+typedef void (*btf_trace_rcu_invoke_callback)(void *, const char *, struct callback_head *);
+
+typedef void (*btf_trace_rcu_invoke_kvfree_callback)(void *, const char *, struct callback_head *, long unsigned int);
+
+typedef void (*btf_trace_rcu_invoke_kfree_bulk_callback)(void *, const char *, long unsigned int, void **);
+
+typedef void (*btf_trace_rcu_batch_end)(void *, const char *, int, char, char, char, char);
+
+typedef void (*btf_trace_rcu_torture_read)(void *, const char *, struct callback_head *, long unsigned int, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_rcu_barrier)(void *, const char *, const char *, int, int, long unsigned int);
+
+struct early_boot_kfree_rcu {
+ struct callback_head rh;
+};
+
+struct rcu_tasks;
+
+typedef void (*rcu_tasks_gp_func_t)(struct rcu_tasks *);
+
+typedef void (*pregp_func_t)(struct list_head *);
+
+typedef void (*pertask_func_t)(struct task_struct *, struct list_head *);
+
+typedef void (*postscan_func_t)(struct list_head *);
+
+typedef void (*holdouts_func_t)(struct list_head *, bool, bool *);
+
+typedef void (*postgp_func_t)(struct rcu_tasks *);
+
+struct rcu_tasks_percpu;
+
+struct rcu_tasks {
+ struct rcuwait cbs_wait;
+ raw_spinlock_t cbs_gbl_lock;
+ struct mutex tasks_gp_mutex;
+ int gp_state;
+ int gp_sleep;
+ int init_fract;
+ long unsigned int gp_jiffies;
+ long unsigned int gp_start;
+ long unsigned int tasks_gp_seq;
+ long unsigned int n_ipis;
+ long unsigned int n_ipis_fails;
+ struct task_struct *kthread_ptr;
+ rcu_tasks_gp_func_t gp_func;
+ pregp_func_t pregp_func;
+ pertask_func_t pertask_func;
+ postscan_func_t postscan_func;
+ holdouts_func_t holdouts_func;
+ postgp_func_t postgp_func;
+ call_rcu_func_t call_func;
+ struct rcu_tasks_percpu *rtpcpu;
+ int percpu_enqueue_shift;
+ int percpu_enqueue_lim;
+ int percpu_dequeue_lim;
+ long unsigned int percpu_dequeue_gpseq;
+ struct mutex barrier_q_mutex;
+ atomic_t barrier_q_count;
+ struct completion barrier_q_completion;
+ long unsigned int barrier_q_seq;
+ char *name;
+ char *kname;
+};
+
+struct rcu_tasks_percpu {
+ struct rcu_segcblist cblist;
+ raw_spinlock_t lock;
+ long unsigned int rtp_jiffies;
+ long unsigned int rtp_n_lock_retries;
+ struct work_struct rtp_work;
+ struct irq_work rtp_irq_work;
+ struct callback_head barrier_q_head;
+ struct list_head rtp_blkd_tasks;
+ int cpu;
+ struct rcu_tasks *rtpp;
+};
+
+struct trc_stall_chk_rdr {
+ int nesting;
+ int ipi_to_cpu;
+ u8 needqs;
+};
+
+struct rcu_tasks_test_desc {
+ struct callback_head rh;
+ const char *name;
+ bool notrun;
+ long unsigned int runstart;
+};
+
+struct old_utimbuf32 {
+ old_time32_t actime;
+ old_time32_t modtime;
+};
+
+struct utimbuf {
+ __kernel_old_time_t actime;
+ __kernel_old_time_t modtime;
+};
+
+enum {
+ VERBOSE_STATUS = 1,
+};
+
+enum {
+ Enabled = 0,
+ Magic = 1,
+};
+
+typedef struct {
+ struct list_head list;
+ long unsigned int flags;
+ int offset;
+ int size;
+ char *magic;
+ char *mask;
+ const char *interpreter;
+ char *name;
+ struct dentry *dentry;
+ struct file *interp_file;
+} Node;
+
+struct bpf_iter_aux_info;
+
+struct trace_event_raw_jbd2_checkpoint {
+ struct trace_entry ent;
+ dev_t dev;
+ int result;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_commit {
+ struct trace_entry ent;
+ dev_t dev;
+ char sync_commit;
+ int transaction;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_end_commit {
+ struct trace_entry ent;
+ dev_t dev;
+ char sync_commit;
+ int transaction;
+ int head;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_submit_inode_data {
+ struct trace_entry ent;
+ dev_t dev;
+ ino_t ino;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_handle_start_class {
+ struct trace_entry ent;
+ dev_t dev;
+ long unsigned int tid;
+ unsigned int type;
+ unsigned int line_no;
+ int requested_blocks;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_handle_extend {
+ struct trace_entry ent;
+ dev_t dev;
+ long unsigned int tid;
+ unsigned int type;
+ unsigned int line_no;
+ int buffer_credits;
+ int requested_blocks;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_handle_stats {
+ struct trace_entry ent;
+ dev_t dev;
+ long unsigned int tid;
+ unsigned int type;
+ unsigned int line_no;
+ int interval;
+ int sync;
+ int requested_blocks;
+ int dirtied_blocks;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_run_stats {
+ struct trace_entry ent;
+ dev_t dev;
+ long unsigned int tid;
+ long unsigned int wait;
+ long unsigned int request_delay;
+ long unsigned int running;
+ long unsigned int locked;
+ long unsigned int flushing;
+ long unsigned int logging;
+ __u32 handle_count;
+ __u32 blocks;
+ __u32 blocks_logged;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_checkpoint_stats {
+ struct trace_entry ent;
+ dev_t dev;
+ long unsigned int tid;
+ long unsigned int chp_time;
+ __u32 forced_to_close;
+ __u32 written;
+ __u32 dropped;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_update_log_tail {
+ struct trace_entry ent;
+ dev_t dev;
+ tid_t tail_sequence;
+ tid_t first_tid;
+ long unsigned int block_nr;
+ long unsigned int freed;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_write_superblock {
+ struct trace_entry ent;
+ dev_t dev;
+ blk_opf_t write_flags;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_lock_buffer_stall {
+ struct trace_entry ent;
+ dev_t dev;
+ long unsigned int stall_ms;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_journal_shrink {
+ struct trace_entry ent;
+ dev_t dev;
+ long unsigned int nr_to_scan;
+ long unsigned int count;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_shrink_scan_exit {
+ struct trace_entry ent;
+ dev_t dev;
+ long unsigned int nr_to_scan;
+ long unsigned int nr_shrunk;
+ long unsigned int count;
+ char __data[0];
+};
+
+struct trace_event_raw_jbd2_shrink_checkpoint_list {
+ struct trace_entry ent;
+ dev_t dev;
+ tid_t first_tid;
+ tid_t tid;
+ tid_t last_tid;
+ long unsigned int nr_freed;
+ long unsigned int nr_scanned;
+ tid_t next_tid;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_jbd2_checkpoint {};
+
+struct trace_event_data_offsets_jbd2_commit {};
+
+struct trace_event_data_offsets_jbd2_end_commit {};
+
+struct trace_event_data_offsets_jbd2_submit_inode_data {};
+
+struct trace_event_data_offsets_jbd2_handle_start_class {};
+
+struct trace_event_data_offsets_jbd2_handle_extend {};
+
+struct trace_event_data_offsets_jbd2_handle_stats {};
+
+struct trace_event_data_offsets_jbd2_run_stats {};
+
+struct trace_event_data_offsets_jbd2_checkpoint_stats {};
+
+struct trace_event_data_offsets_jbd2_update_log_tail {};
+
+struct trace_event_data_offsets_jbd2_write_superblock {};
+
+struct trace_event_data_offsets_jbd2_lock_buffer_stall {};
+
+struct trace_event_data_offsets_jbd2_journal_shrink {};
+
+struct trace_event_data_offsets_jbd2_shrink_scan_exit {};
+
+struct trace_event_data_offsets_jbd2_shrink_checkpoint_list {};
+
+typedef void (*btf_trace_jbd2_checkpoint)(void *, journal_t *, int);
+
+typedef void (*btf_trace_jbd2_start_commit)(void *, journal_t *, transaction_t *);
+
+typedef void (*btf_trace_jbd2_commit_locking)(void *, journal_t *, transaction_t *);
+
+typedef void (*btf_trace_jbd2_commit_flushing)(void *, journal_t *, transaction_t *);
+
+typedef void (*btf_trace_jbd2_commit_logging)(void *, journal_t *, transaction_t *);
+
+typedef void (*btf_trace_jbd2_drop_transaction)(void *, journal_t *, transaction_t *);
+
+typedef void (*btf_trace_jbd2_end_commit)(void *, journal_t *, transaction_t *);
+
+typedef void (*btf_trace_jbd2_submit_inode_data)(void *, struct inode *);
+
+typedef void (*btf_trace_jbd2_handle_start)(void *, dev_t, long unsigned int, unsigned int, unsigned int, int);
+
+typedef void (*btf_trace_jbd2_handle_restart)(void *, dev_t, long unsigned int, unsigned int, unsigned int, int);
+
+typedef void (*btf_trace_jbd2_handle_extend)(void *, dev_t, long unsigned int, unsigned int, unsigned int, int, int);
+
+typedef void (*btf_trace_jbd2_handle_stats)(void *, dev_t, long unsigned int, unsigned int, unsigned int, int, int, int, int);
+
+typedef void (*btf_trace_jbd2_run_stats)(void *, dev_t, long unsigned int, struct transaction_run_stats_s *);
+
+typedef void (*btf_trace_jbd2_checkpoint_stats)(void *, dev_t, long unsigned int, struct transaction_chp_stats_s *);
+
+typedef void (*btf_trace_jbd2_update_log_tail)(void *, journal_t *, tid_t, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_jbd2_write_superblock)(void *, journal_t *, blk_opf_t);
+
+typedef void (*btf_trace_jbd2_lock_buffer_stall)(void *, dev_t, long unsigned int);
+
+typedef void (*btf_trace_jbd2_shrink_count)(void *, journal_t *, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_jbd2_shrink_scan_enter)(void *, journal_t *, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_jbd2_shrink_scan_exit)(void *, journal_t *, long unsigned int, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_jbd2_shrink_checkpoint_list)(void *, journal_t *, tid_t, tid_t, tid_t, long unsigned int, long unsigned int, tid_t);
+
+struct jbd2_stats_proc_session {
+ journal_t *journal;
+ struct transaction_stats_s *stats;
+ int start;
+ int max;
+};
+
+typedef unsigned int FSE_DTable;
+
+typedef struct {
+ size_t state;
+ const void *table;
+} FSE_DState_t;
+
+typedef struct {
+ U16 tableLog;
+ U16 fastMode;
+} FSE_DTableHeader;
+
+typedef struct {
+ short unsigned int newState;
+ unsigned char symbol;
+ unsigned char nbBits;
+} FSE_decode_t;
+
+typedef struct {
+ short int ncount[256];
+ FSE_DTable dtable[1];
+} FSE_DecompressWksp;
+
+struct acpi_wakeup_handler {
+ struct list_head list_node;
+ bool (*wakeup)(void *);
+ void *context;
+};
+
+struct override_status_id {
+ struct acpi_device_id hid[2];
+ struct x86_cpu_id cpu_ids[2];
+ struct dmi_system_id dmi_ids[2];
+ const char *uid;
+ const char *path;
+ long long unsigned int status;
+};
+
+struct termios {
+ tcflag_t c_iflag;
+ tcflag_t c_oflag;
+ tcflag_t c_cflag;
+ tcflag_t c_lflag;
+ cc_t c_line;
+ cc_t c_cc[19];
+};
+
+struct termios2 {
+ tcflag_t c_iflag;
+ tcflag_t c_oflag;
+ tcflag_t c_cflag;
+ tcflag_t c_lflag;
+ cc_t c_line;
+ cc_t c_cc[19];
+ speed_t c_ispeed;
+ speed_t c_ospeed;
+};
+
+struct termio {
+ short unsigned int c_iflag;
+ short unsigned int c_oflag;
+ short unsigned int c_cflag;
+ short unsigned int c_lflag;
+ unsigned char c_line;
+ unsigned char c_cc[8];
+};
+
+enum {
+ IFLA_BOND_UNSPEC = 0,
+ IFLA_BOND_MODE = 1,
+ IFLA_BOND_ACTIVE_SLAVE = 2,
+ IFLA_BOND_MIIMON = 3,
+ IFLA_BOND_UPDELAY = 4,
+ IFLA_BOND_DOWNDELAY = 5,
+ IFLA_BOND_USE_CARRIER = 6,
+ IFLA_BOND_ARP_INTERVAL = 7,
+ IFLA_BOND_ARP_IP_TARGET = 8,
+ IFLA_BOND_ARP_VALIDATE = 9,
+ IFLA_BOND_ARP_ALL_TARGETS = 10,
+ IFLA_BOND_PRIMARY = 11,
+ IFLA_BOND_PRIMARY_RESELECT = 12,
+ IFLA_BOND_FAIL_OVER_MAC = 13,
+ IFLA_BOND_XMIT_HASH_POLICY = 14,
+ IFLA_BOND_RESEND_IGMP = 15,
+ IFLA_BOND_NUM_PEER_NOTIF = 16,
+ IFLA_BOND_ALL_SLAVES_ACTIVE = 17,
+ IFLA_BOND_MIN_LINKS = 18,
+ IFLA_BOND_LP_INTERVAL = 19,
+ IFLA_BOND_PACKETS_PER_SLAVE = 20,
+ IFLA_BOND_AD_LACP_RATE = 21,
+ IFLA_BOND_AD_SELECT = 22,
+ IFLA_BOND_AD_INFO = 23,
+ IFLA_BOND_AD_ACTOR_SYS_PRIO = 24,
+ IFLA_BOND_AD_USER_PORT_KEY = 25,
+ IFLA_BOND_AD_ACTOR_SYSTEM = 26,
+ IFLA_BOND_TLB_DYNAMIC_LB = 27,
+ IFLA_BOND_PEER_NOTIF_DELAY = 28,
+ IFLA_BOND_AD_LACP_ACTIVE = 29,
+ IFLA_BOND_MISSED_MAX = 30,
+ IFLA_BOND_NS_IP6_TARGET = 31,
+ __IFLA_BOND_MAX = 32,
+};
+
+enum {
+ IFLA_BOND_AD_INFO_UNSPEC = 0,
+ IFLA_BOND_AD_INFO_AGGREGATOR = 1,
+ IFLA_BOND_AD_INFO_NUM_PORTS = 2,
+ IFLA_BOND_AD_INFO_ACTOR_KEY = 3,
+ IFLA_BOND_AD_INFO_PARTNER_KEY = 4,
+ IFLA_BOND_AD_INFO_PARTNER_MAC = 5,
+ __IFLA_BOND_AD_INFO_MAX = 6,
+};
+
+enum {
+ IFLA_BOND_SLAVE_UNSPEC = 0,
+ IFLA_BOND_SLAVE_STATE = 1,
+ IFLA_BOND_SLAVE_MII_STATUS = 2,
+ IFLA_BOND_SLAVE_LINK_FAILURE_COUNT = 3,
+ IFLA_BOND_SLAVE_PERM_HWADDR = 4,
+ IFLA_BOND_SLAVE_QUEUE_ID = 5,
+ IFLA_BOND_SLAVE_AD_AGGREGATOR_ID = 6,
+ IFLA_BOND_SLAVE_AD_ACTOR_OPER_PORT_STATE = 7,
+ IFLA_BOND_SLAVE_AD_PARTNER_OPER_PORT_STATE = 8,
+ IFLA_BOND_SLAVE_PRIO = 9,
+ __IFLA_BOND_SLAVE_MAX = 10,
+};
+
+enum {
+ LINK_XSTATS_TYPE_UNSPEC = 0,
+ LINK_XSTATS_TYPE_BRIDGE = 1,
+ LINK_XSTATS_TYPE_BOND = 2,
+ __LINK_XSTATS_TYPE_MAX = 3,
+};
+
+enum {
+ BOND_XSTATS_UNSPEC = 0,
+ BOND_XSTATS_3AD = 1,
+ __BOND_XSTATS_MAX = 2,
+};
+
+struct cpuidle_state_kobj {
+ struct cpuidle_state *state;
+ struct cpuidle_state_usage *state_usage;
+ struct completion kobj_unregister;
+ struct kobject kobj;
+ struct cpuidle_device *device;
+};
+
+struct cpuidle_device_kobj {
+ struct cpuidle_device *dev;
+ struct completion kobj_unregister;
+ struct kobject kobj;
+};
+
+struct cpuidle_attr {
+ struct attribute attr;
+ ssize_t (*show)(struct cpuidle_device *, char *);
+ ssize_t (*store)(struct cpuidle_device *, const char *, size_t);
+};
+
+struct cpuidle_state_attr {
+ struct attribute attr;
+ ssize_t (*show)(struct cpuidle_state *, struct cpuidle_state_usage *, char *);
+ ssize_t (*store)(struct cpuidle_state *, struct cpuidle_state_usage *, const char *, size_t);
+};
+
+struct udp_tunnel_nic_table_entry;
+
+struct udp_tunnel_nic {
+ struct work_struct work;
+ struct net_device *dev;
+ u8 need_sync: 1;
+ u8 need_replay: 1;
+ u8 work_pending: 1;
+ unsigned int n_tables;
+ long unsigned int missed;
+ struct udp_tunnel_nic_table_entry **entries;
+};
+
+struct udp_tunnel_nic_shared_node {
+ struct net_device *dev;
+ struct list_head list;
+};
+
+enum udp_tunnel_nic_table_entry_flags {
+ UDP_TUNNEL_NIC_ENTRY_ADD = 1,
+ UDP_TUNNEL_NIC_ENTRY_DEL = 2,
+ UDP_TUNNEL_NIC_ENTRY_OP_FAIL = 4,
+ UDP_TUNNEL_NIC_ENTRY_FROZEN = 8,
+};
+
+struct udp_tunnel_nic_table_entry {
+ __be16 port;
+ u8 type;
+ u8 flags;
+ u16 use_cnt;
+ u8 hw_priv;
+};
+
+struct nft_ct_frag6_pernet {
+ struct ctl_table_header *nf_frag_frags_hdr;
+ struct fqdir *fqdir;
+};
+
+struct csum_pseudo_header {
+ __be64 data_seq;
+ __be32 subflow_seq;
+ __be16 data_len;
+ __sum16 csum;
+};
+
+struct ppin_info {
+ int feature;
+ int msr_ppin_ctl;
+ int msr_ppin;
+};
+
+struct cpuid_dependent_feature {
+ u32 feature;
+ u32 level;
+};
+
+enum rseq_cpu_id_state {
+ RSEQ_CPU_ID_UNINITIALIZED = -1,
+ RSEQ_CPU_ID_REGISTRATION_FAILED = -2,
+};
+
+enum rseq_flags {
+ RSEQ_FLAG_UNREGISTER = 1,
+};
+
+enum rseq_cs_flags {
+ RSEQ_CS_FLAG_NO_RESTART_ON_PREEMPT = 1,
+ RSEQ_CS_FLAG_NO_RESTART_ON_SIGNAL = 2,
+ RSEQ_CS_FLAG_NO_RESTART_ON_MIGRATE = 4,
+};
+
+struct rseq_cs {
+ __u32 version;
+ __u32 flags;
+ __u64 start_ip;
+ __u64 post_commit_offset;
+ __u64 abort_ip;
+};
+
+struct trace_event_raw_rseq_update {
+ struct trace_entry ent;
+ s32 cpu_id;
+ char __data[0];
+};
+
+struct trace_event_raw_rseq_ip_fixup {
+ struct trace_entry ent;
+ long unsigned int regs_ip;
+ long unsigned int start_ip;
+ long unsigned int post_commit_offset;
+ long unsigned int abort_ip;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_rseq_update {};
+
+struct trace_event_data_offsets_rseq_ip_fixup {};
+
+typedef void (*btf_trace_rseq_update)(void *, struct task_struct *);
+
+typedef void (*btf_trace_rseq_ip_fixup)(void *, long unsigned int, long unsigned int, long unsigned int, long unsigned int);
+
+struct trace_event_raw_vm_unmapped_area {
+ struct trace_entry ent;
+ long unsigned int addr;
+ long unsigned int total_vm;
+ long unsigned int flags;
+ long unsigned int length;
+ long unsigned int low_limit;
+ long unsigned int high_limit;
+ long unsigned int align_mask;
+ long unsigned int align_offset;
+ char __data[0];
+};
+
+struct trace_event_raw_vma_mas_szero {
+ struct trace_entry ent;
+ struct maple_tree *mt;
+ long unsigned int start;
+ long unsigned int end;
+ char __data[0];
+};
+
+struct trace_event_raw_vma_store {
+ struct trace_entry ent;
+ struct maple_tree *mt;
+ struct vm_area_struct *vma;
+ long unsigned int vm_start;
+ long unsigned int vm_end;
+ char __data[0];
+};
+
+struct trace_event_raw_exit_mmap {
+ struct trace_entry ent;
+ struct mm_struct *mm;
+ struct maple_tree *mt;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_vm_unmapped_area {};
+
+struct trace_event_data_offsets_vma_mas_szero {};
+
+struct trace_event_data_offsets_vma_store {};
+
+struct trace_event_data_offsets_exit_mmap {};
+
+typedef void (*btf_trace_vm_unmapped_area)(void *, long unsigned int, struct vm_unmapped_area_info *);
+
+typedef void (*btf_trace_vma_mas_szero)(void *, struct maple_tree *, long unsigned int, long unsigned int);
+
+typedef void (*btf_trace_vma_store)(void *, struct maple_tree *, struct vm_area_struct *);
+
+typedef void (*btf_trace_exit_mmap)(void *, struct mm_struct *);
+
+struct mqueue_fs_context {
+ struct ipc_namespace *ipc_ns;
+ bool newns;
+};
+
+struct posix_msg_tree_node {
+ struct rb_node rb_node;
+ struct list_head msg_list;
+ int priority;
+};
+
+struct ext_wait_queue {
+ struct task_struct *task;
+ struct list_head list;
+ struct msg_msg *msg;
+ int state;
+};
+
+struct mqueue_inode_info {
+ spinlock_t lock;
+ struct inode vfs_inode;
+ wait_queue_head_t wait_q;
+ struct rb_root msg_tree;
+ struct rb_node *msg_tree_rightmost;
+ struct posix_msg_tree_node *node_cache;
+ struct mq_attr attr;
+ struct sigevent notify;
+ struct pid *notify_owner;
+ u32 notify_self_exec_id;
+ struct user_namespace *notify_user_ns;
+ struct ucounts *ucounts;
+ struct sock *notify_sock;
+ struct sk_buff *notify_cookie;
+ struct ext_wait_queue e_wait_q[2];
+ long unsigned int qsize;
+};
+
+typedef uint32_t char32_t;
+
+struct uni_screen {
+ char32_t *lines[0];
+};
+
+struct con_driver {
+ const struct consw *con;
+ const char *desc;
+ struct device *dev;
+ int node;
+ int first;
+ int last;
+ int flag;
+};
+
+enum {
+ blank_off = 0,
+ blank_normal_wait = 1,
+ blank_vesa_wait = 2,
+};
+
+enum {
+ EPecma = 0,
+ EPdec = 1,
+ EPeq = 2,
+ EPgt = 3,
+ EPlt = 4,
+};
+
+struct rgb {
+ u8 r;
+ u8 g;
+ u8 b;
+};
+
+enum {
+ ESnormal = 0,
+ ESesc = 1,
+ ESsquare = 2,
+ ESgetpars = 3,
+ ESfunckey = 4,
+ EShash = 5,
+ ESsetG0 = 6,
+ ESsetG1 = 7,
+ ESpercent = 8,
+ EScsiignore = 9,
+ ESnonstd = 10,
+ ESpalette = 11,
+ ESosc = 12,
+ ESapc = 13,
+ ESpm = 14,
+ ESdcs = 15,
+};
+
+struct interval {
+ uint32_t first;
+ uint32_t last;
+};
+
+struct vc_draw_region {
+ long unsigned int from;
+ long unsigned int to;
+ int x;
+};
+
+struct brd_device {
+ int brd_number;
+ struct gendisk *brd_disk;
+ struct list_head brd_list;
+ spinlock_t brd_lock;
+ struct xarray brd_pages;
+ u64 brd_nr_pages;
+};
+
+enum {
+ TCA_BPF_UNSPEC = 0,
+ TCA_BPF_ACT = 1,
+ TCA_BPF_POLICE = 2,
+ TCA_BPF_CLASSID = 3,
+ TCA_BPF_OPS_LEN = 4,
+ TCA_BPF_OPS = 5,
+ TCA_BPF_FD = 6,
+ TCA_BPF_NAME = 7,
+ TCA_BPF_FLAGS = 8,
+ TCA_BPF_FLAGS_GEN = 9,
+ TCA_BPF_TAG = 10,
+ TCA_BPF_ID = 11,
+ __TCA_BPF_MAX = 12,
+};
+
+struct cls_bpf_head {
+ struct list_head plist;
+ struct idr handle_idr;
+ struct callback_head rcu;
+};
+
+struct cls_bpf_prog {
+ struct bpf_prog *filter;
+ struct list_head link;
+ struct tcf_result res;
+ bool exts_integrated;
+ u32 gen_flags;
+ unsigned int in_hw_count;
+ struct tcf_exts exts;
+ u32 handle;
+ u16 bpf_num_ops;
+ struct sock_filter *bpf_ops;
+ const char *bpf_name;
+ struct tcf_proto *tp;
+ struct rcu_work rwork;
+};
+
+enum nfnetlink_groups {
+ NFNLGRP_NONE = 0,
+ NFNLGRP_CONNTRACK_NEW = 1,
+ NFNLGRP_CONNTRACK_UPDATE = 2,
+ NFNLGRP_CONNTRACK_DESTROY = 3,
+ NFNLGRP_CONNTRACK_EXP_NEW = 4,
+ NFNLGRP_CONNTRACK_EXP_UPDATE = 5,
+ NFNLGRP_CONNTRACK_EXP_DESTROY = 6,
+ NFNLGRP_NFTABLES = 7,
+ NFNLGRP_ACCT_QUOTA = 8,
+ NFNLGRP_NFTRACE = 9,
+ __NFNLGRP_MAX = 10,
+};
+
+enum nfnl_batch_attributes {
+ NFNL_BATCH_UNSPEC = 0,
+ NFNL_BATCH_GENID = 1,
+ __NFNL_BATCH_MAX = 2,
+};
+
+struct nfnl_net {
+ struct sock *nfnl;
+};
+
+struct nfnl_err {
+ struct list_head head;
+ struct nlmsghdr *nlh;
+ int err;
+ struct netlink_ext_ack extack;
+};
+
+enum {
+ NFNL_BATCH_FAILURE = 1,
+ NFNL_BATCH_DONE = 2,
+ NFNL_BATCH_REPLAY = 4,
+};
+
+struct bpfilter_umh_ops {
+ struct umd_info info;
+ struct mutex lock;
+ int (*sockopt)(struct sock *, int, sockptr_t, unsigned int, bool);
+ int (*start)();
+};
+
+struct ipt_icmp {
+ __u8 type;
+ __u8 code[2];
+ __u8 invflags;
+};
+
+struct ipt_getinfo {
+ char name[32];
+ unsigned int valid_hooks;
+ unsigned int hook_entry[5];
+ unsigned int underflow[5];
+ unsigned int num_entries;
+ unsigned int size;
+};
+
+struct ipt_get_entries {
+ char name[32];
+ unsigned int size;
+ struct ipt_entry entrytable[0];
+};
+
+struct ipt_error {
+ struct ipt_entry entry;
+ struct xt_error_target target;
+};
+
+struct ip_tunnel_prl {
+ __be32 addr;
+ __u16 flags;
+ __u16 __reserved;
+ __u32 datalen;
+ __u32 __reserved2;
+};
+
+struct sit_net {
+ struct ip_tunnel *tunnels_r_l[16];
+ struct ip_tunnel *tunnels_r[16];
+ struct ip_tunnel *tunnels_l[16];
+ struct ip_tunnel *tunnels_wc[1];
+ struct ip_tunnel **tunnels[4];
+ struct net_device *fb_tunnel_dev;
+};
+
+struct metadata_dst;
+
+struct warn_args;
+
+struct trace_event_raw_x86_fpu {
+ struct trace_entry ent;
+ struct fpu *fpu;
+ bool load_fpu;
+ u64 xfeatures;
+ u64 xcomp_bv;
+ char __data[0];
+};
+
+struct trace_event_data_offsets_x86_fpu {};
+
+typedef void (*btf_trace_x86_fpu_before_save)(void *, struct fpu *);
+
+typedef void (*btf_trace_x86_fpu_after_save)(void *, struct fpu *);
+
+typedef void (*btf_trace_x86_fpu_before_restore)(void *, struct fpu *);
+
+typedef void (*btf_trace_x86_fpu_after_restore)(void *, struct fpu *);
+
+typedef void (*btf_trace_x86_fpu_regs_activated)(void *, struct fpu *);
+
+typedef void (*btf_trace_x86_fpu_regs_deactivated)(void *, struct fpu *);
+
+typedef void (*btf_trace_x86_fpu_init_state)(void *, struct fpu *);
+
+typedef void (*btf_trace_x86_fpu_dropped)(void *, struct fpu *);
+
+typedef void (*btf_trace_x86_fpu_copy_src)(void *, struct fpu *);
+
+typedef void (*btf_trace_x86_fpu_copy_dst)(void *, struct fpu *);
+
+typedef void (*btf_trace_x86_fpu_xstate_check_failed)(void *, struct fpu *);
+
+enum freezer_state_flags {
+ CGROUP_FREEZER_ONLINE = 1,
+ CGROUP_FREEZING_SELF = 2,
+ CGROUP_FREEZING_PARENT = 4,
+ CGROUP_FROZEN = 8,
+ CGROUP_FREEZING = 6,
+};
+
+struct freezer {
+ struct cgroup_subsys_state css;
+ unsigned int state;
+};
+
+struct tracer_stat {
+ const char *name;
+ void * (*stat_start)(struct tracer_stat *);
+ void * (*stat_next)(void *, int);
+ cmp_func_t stat_cmp;
+ int (*stat_show)(struct seq_file *, void *);
+ void (*stat_release)(void *);
+ int (*stat_headers)(struct seq_file *);
+};
+
+struct stat_node {
+ struct rb_node node;
+ void *stat;
+};
+
+struct stat_session {
+ struct list_head session_list;
+ struct tracer_stat *ts;
+ struct rb_root stat_root;
+ struct mutex stat_mutex;
+ struct dentry *file;
+};
+
+struct bpf_timer {
+ long: 64;
+ long: 64;
+};
+
+struct bpf_dynptr {
+ long: 64;
+ long: 64;
+};
+
+struct bpf_list_head {
+ long: 64;
+ long: 64;
+};
+
+struct bpf_list_node {
+ long: 64;
+ long: 64;
+};
+
+struct bpf_pidns_info {
+ __u32 pid;
+ __u32 tgid;
+};
+
+typedef u64 (*btf_bpf_map_lookup_elem)(struct bpf_map *, void *);
+
+typedef u64 (*btf_bpf_map_update_elem)(struct bpf_map *, void *, void *, u64);
+
+typedef u64 (*btf_bpf_map_delete_elem)(struct bpf_map *, void *);
+
+typedef u64 (*btf_bpf_map_push_elem)(struct bpf_map *, void *, u64);
+
+typedef u64 (*btf_bpf_map_pop_elem)(struct bpf_map *, void *);
+
+typedef u64 (*btf_bpf_map_peek_elem)(struct bpf_map *, void *);
+
+typedef u64 (*btf_bpf_map_lookup_percpu_elem)(struct bpf_map *, void *, u32);
+
+typedef u64 (*btf_bpf_get_smp_processor_id)();
+
+typedef u64 (*btf_bpf_get_numa_node_id)();
+
+typedef u64 (*btf_bpf_ktime_get_ns)();
+
+typedef u64 (*btf_bpf_ktime_get_boot_ns)();
+
+typedef u64 (*btf_bpf_ktime_get_coarse_ns)();
+
+typedef u64 (*btf_bpf_ktime_get_tai_ns)();
+
+typedef u64 (*btf_bpf_get_current_pid_tgid)();
+
+typedef u64 (*btf_bpf_get_current_uid_gid)();
+
+typedef u64 (*btf_bpf_get_current_comm)(char *, u32);
+
+typedef u64 (*btf_bpf_spin_lock)(struct bpf_spin_lock *);
+
+typedef u64 (*btf_bpf_spin_unlock)(struct bpf_spin_lock *);
+
+typedef u64 (*btf_bpf_jiffies64)();
+
+typedef u64 (*btf_bpf_get_current_cgroup_id)();
+
+typedef u64 (*btf_bpf_get_current_ancestor_cgroup_id)(int);
+
+typedef u64 (*btf_bpf_strtol)(const char *, size_t, u64, long int *);
+
+typedef u64 (*btf_bpf_strtoul)(const char *, size_t, u64, long unsigned int *);
+
+typedef u64 (*btf_bpf_strncmp)(const char *, u32, const char *);
+
+typedef u64 (*btf_bpf_get_ns_current_pid_tgid)(u64, u64, struct bpf_pidns_info *, u32);
+
+typedef u64 (*btf_bpf_event_output_data)(void *, struct bpf_map *, u64, void *, u64);
+
+typedef u64 (*btf_bpf_copy_from_user)(void *, u32, const void *);
+
+typedef u64 (*btf_bpf_copy_from_user_task)(void *, u32, const void *, struct task_struct *, u64);
+
+typedef u64 (*btf_bpf_per_cpu_ptr)(const void *, u32);
+
+typedef u64 (*btf_bpf_this_cpu_ptr)(const void *);
+
+struct bpf_bprintf_buffers {
+ char tmp_bufs[1536];
+};
+
+typedef u64 (*btf_bpf_snprintf)(char *, u32, char *, const void *, u32);
+
+struct bpf_hrtimer {
+ struct hrtimer timer;
+ struct bpf_map *map;
+ struct bpf_prog *prog;
+ void *callback_fn;
+ void *value;
+};
+
+struct bpf_timer_kern {
+ struct bpf_hrtimer *timer;
+ struct bpf_spin_lock lock;
+};
+
+typedef u64 (*btf_bpf_timer_init)(struct bpf_timer_kern *, struct bpf_map *, u64);
+
+typedef u64 (*btf_bpf_timer_set_callback)(struct bpf_timer_kern *, void *, struct bpf_prog_aux *);
+
+typedef u64 (*btf_bpf_timer_start)(struct bpf_timer_kern *, u64, u64);
+
+typedef u64 (*btf_bpf_timer_cancel)(struct bpf_timer_kern *);
+
+typedef u64 (*btf_bpf_kptr_xchg)(void *, void *);
+
+typedef u64 (*btf_bpf_dynptr_from_mem)(void *, u32, u64, struct bpf_dynptr_kern *);
+
+typedef u64 (*btf_bpf_dynptr_read)(void *, u32, struct bpf_dynptr_kern *, u32, u64);
+
+typedef u64 (*btf_bpf_dynptr_write)(struct bpf_dynptr_kern *, u32, void *, u32, u64);
+
+typedef u64 (*btf_bpf_dynptr_data)(struct bpf_dynptr_kern *, u32, u32);
+
+struct hashtab_info {
+ u32 slots_used;
+ u32 max_chain_len;
+};
+
+struct sidtab_str_cache {
+ struct callback_head rcu_member;
+ struct list_head lru_member;
+ struct sidtab_entry *parent;
+ u32 len;
+ char str[0];
+};
+
+struct sha512_state {
+ u64 state[8];
+ u64 count[2];
+ u8 buf[128];
+};
+
+typedef void sha512_block_fn(struct sha512_state *, const u8 *, int);
+
+enum pkcs7_actions {
+ ACT_pkcs7_check_content_type = 0,
+ ACT_pkcs7_extract_cert = 1,
+ ACT_pkcs7_note_OID = 2,
+ ACT_pkcs7_note_certificate_list = 3,
+ ACT_pkcs7_note_content = 4,
+ ACT_pkcs7_note_data = 5,
+ ACT_pkcs7_note_signed_info = 6,
+ ACT_pkcs7_note_signeddata_version = 7,
+ ACT_pkcs7_note_signerinfo_version = 8,
+ ACT_pkcs7_sig_note_authenticated_attr = 9,
+ ACT_pkcs7_sig_note_digest_algo = 10,
+ ACT_pkcs7_sig_note_issuer = 11,
+ ACT_pkcs7_sig_note_pkey_algo = 12,
+ ACT_pkcs7_sig_note_serial = 13,
+ ACT_pkcs7_sig_note_set_of_authattrs = 14,
+ ACT_pkcs7_sig_note_signature = 15,
+ ACT_pkcs7_sig_note_skid = 16,
+ NR__pkcs7_actions = 17,
+};
+
+struct pkcs7_parse_context {
+ struct pkcs7_message *msg;
+ struct pkcs7_signed_info *sinfo;
+ struct pkcs7_signed_info **ppsinfo;
+ struct x509_certificate *certs;
+ struct x509_certificate **ppcerts;
+ long unsigned int data;
+ enum OID last_oid;
+ unsigned int x509_index;
+ unsigned int sinfo_index;
+ const void *raw_serial;
+ unsigned int raw_serial_size;
+ unsigned int raw_issuer_size;
+ const void *raw_issuer;
+ const void *raw_skid;
+ unsigned int raw_skid_size;
+ bool expect_skid;
+};
+
+struct queue_sysfs_entry {
+ struct attribute attr;
+ ssize_t (*show)(struct request_queue *, char *);
+ ssize_t (*store)(struct request_queue *, const char *, size_t);
+};
+
+struct io_xattr {
+ struct file *file;
+ struct xattr_ctx ctx;
+ struct filename *filename;
+};
+
+typedef struct {
+ BYTE maxTableLog;
+ BYTE tableType;
+ BYTE tableLog;
+ BYTE reserved;
+} DTableDesc;
+
+typedef struct {
+ BYTE byte;
+ BYTE nbBits;
+} HUF_DEltX1;
+
+typedef struct {
+ U32 rankVal[16];
+ U32 rankStart[16];
+ U32 statsWksp[218];
+ BYTE symbols[256];
+ BYTE huffWeight[256];
+} HUF_ReadDTableX1_Workspace;
+
+typedef struct {
+ U16 sequence;
+ BYTE nbBits;
+ BYTE length;
+} HUF_DEltX2;
+
+typedef struct {
+ BYTE symbol;
+ BYTE weight;
+} sortedSymbol_t;
+
+typedef U32 rankValCol_t[13];
+
+typedef struct {
+ U32 rankVal[156];
+ U32 rankStats[13];
+ U32 rankStart0[14];
+ sortedSymbol_t sortedSymbol[256];
+ BYTE weightList[256];
+ U32 calleeWksp[218];
+} HUF_ReadDTableX2_Workspace;
+
+typedef struct {
+ U32 tableTime;
+ U32 decode256Time;
+} algo_time_t;
+
+struct irq_override_cmp {
+ const struct dmi_system_id *system;
+ unsigned char irq;
+ unsigned char triggering;
+ unsigned char polarity;
+ unsigned char shareable;
+ bool override;
+};
+
+struct res_proc_context {
+ struct list_head *list;
+ int (*preproc)(struct acpi_resource *, void *);
+ void *preproc_data;
+ int count;
+ int error;
+};
+
+struct dw8250_platform_data {
+ u8 usr_reg;
+ u32 cpr_val;
+ unsigned int quirks;
+};
+
+struct dw8250_data {
+ struct dw8250_port_data data;
+ const struct dw8250_platform_data *pdata;
+ int msr_mask_on;
+ int msr_mask_off;
+ struct clk *clk;
+ struct clk *pclk;
+ struct notifier_block clk_notifier;
+ struct work_struct clk_work;
+ struct reset_control *rst;
+ unsigned int skip_autocfg: 1;
+ unsigned int uart_16550_compatible: 1;
+};
+
+struct sch_frag_data {
+ long unsigned int dst;
+ struct qdisc_skb_cb cb;
+ __be16 inner_protocol;
+ u16 vlan_tci;
+ __be16 vlan_proto;
+ unsigned int l2_len;
+ u8 l2_data[18];
+ int (*xmit)(struct sk_buff *);
+};
+
+struct tsinfo_reply_data {
+ struct ethnl_reply_data base;
+ struct ethtool_ts_info ts_info;
+};
+
+struct icmp_ext_hdr {
+ __u8 reserved1: 4;
+ __u8 version: 4;
+ __u8 reserved2;
+ __sum16 checksum;
+};
+
+struct icmp_extobj_hdr {
+ __be16 length;
+ __u8 class_num;
+ __u8 class_type;
+};
+
+struct icmp_ext_echo_ctype3_hdr {
+ __be16 afi;
+ __u8 addrlen;
+ __u8 reserved;
+};
+
+struct icmp_ext_echo_iio {
+ struct icmp_extobj_hdr extobj_hdr;
+ union {
+ char name[16];
+ __be32 ifindex;
+ struct {
+ struct icmp_ext_echo_ctype3_hdr ctype3_hdr;
+ union {
+ __be32 ipv4_addr;
+ struct in6_addr ipv6_addr;
+ } ip_addr;
+ } addr;
+ } ident;
+};
+
+struct icmp_bxm {
+ struct sk_buff *skb;
+ int offset;
+ int data_len;
+ struct {
+ struct icmphdr icmph;
+ __be32 times[3];
+ } data;
+ int head_len;
+ struct ip_options_data replyopts;
+};
+
+struct icmp_control {
+ enum skb_drop_reason (*handler)(struct sk_buff *);
+ short int error;
+};
+
+enum {
+ XFRM_SHARE_ANY = 0,
+ XFRM_SHARE_SESSION = 1,
+ XFRM_SHARE_USER = 2,
+ XFRM_SHARE_UNIQUE = 3,
+};
+
+struct xfrm_user_sec_ctx {
+ __u16 len;
+ __u16 exttype;
+ __u8 ctx_alg;
+ __u8 ctx_doi;
+ __u16 ctx_len;
+};
+
+struct xfrm_user_tmpl {
+ struct xfrm_id id;
+ __u16 family;
+ xfrm_address_t saddr;
+ __u32 reqid;
+ __u8 mode;
+ __u8 share;
+ __u8 optional;
+ __u32 aalgos;
+ __u32 ealgos;
+ __u32 calgos;
+};
+
+struct xfrm_userpolicy_type {
+ __u8 type;
+ __u16 reserved1;
+ __u8 reserved2;
+};
+
+enum xfrm_sadattr_type_t {
+ XFRMA_SAD_UNSPEC = 0,
+ XFRMA_SAD_CNT = 1,
+ XFRMA_SAD_HINFO = 2,
+ __XFRMA_SAD_MAX = 3,
+};
+
+struct xfrmu_sadhinfo {
+ __u32 sadhcnt;
+ __u32 sadhmcnt;
+};
+
+enum xfrm_spdattr_type_t {
+ XFRMA_SPD_UNSPEC = 0,
+ XFRMA_SPD_INFO = 1,
+ XFRMA_SPD_HINFO = 2,
+ XFRMA_SPD_IPV4_HTHRESH = 3,
+ XFRMA_SPD_IPV6_HTHRESH = 4,
+ __XFRMA_SPD_MAX = 5,
+};
+
+struct xfrmu_spdinfo {
+ __u32 incnt;
+ __u32 outcnt;
+ __u32 fwdcnt;
+ __u32 inscnt;
+ __u32 outscnt;
+ __u32 fwdscnt;
+};
+
+struct xfrmu_spdhinfo {
+ __u32 spdhcnt;
+ __u32 spdhmcnt;
+};
+
+struct xfrmu_spdhthresh {
+ __u8 lbits;
+ __u8 rbits;
+};
+
+struct xfrm_usersa_info {
+ struct xfrm_selector sel;
+ struct xfrm_id id;
+ xfrm_address_t saddr;
+ struct xfrm_lifetime_cfg lft;
+ struct xfrm_lifetime_cur curlft;
+ struct xfrm_stats stats;
+ __u32 seq;
+ __u32 reqid;
+ __u16 family;
+ __u8 mode;
+ __u8 replay_window;
+ __u8 flags;
+};
+
+struct xfrm_usersa_id {
+ xfrm_address_t daddr;
+ __be32 spi;
+ __u16 family;
+ __u8 proto;
+};
+
+struct xfrm_aevent_id {
+ struct xfrm_usersa_id sa_id;
+ xfrm_address_t saddr;
+ __u32 flags;
+ __u32 reqid;
+};
+
+struct xfrm_userspi_info {
+ struct xfrm_usersa_info info;
+ __u32 min;
+ __u32 max;
+};
+
+struct xfrm_userpolicy_info {
+ struct xfrm_selector sel;
+ struct xfrm_lifetime_cfg lft;
+ struct xfrm_lifetime_cur curlft;
+ __u32 priority;
+ __u32 index;
+ __u8 dir;
+ __u8 action;
+ __u8 flags;
+ __u8 share;
+};
+
+struct xfrm_userpolicy_id {
+ struct xfrm_selector sel;
+ __u32 index;
+ __u8 dir;
+};
+
+struct xfrm_user_acquire {
+ struct xfrm_id id;
+ xfrm_address_t saddr;
+ struct xfrm_selector sel;
+ struct xfrm_userpolicy_info policy;
+ __u32 aalgos;
+ __u32 ealgos;
+ __u32 calgos;
+ __u32 seq;
+};
+
+struct xfrm_user_expire {
+ struct xfrm_usersa_info state;
+ __u8 hard;
+};
+
+struct xfrm_user_polexpire {
+ struct xfrm_userpolicy_info pol;
+ __u8 hard;
+};
+
+struct xfrm_usersa_flush {
+ __u8 proto;
+};
+
+struct xfrm_user_report {
+ __u8 proto;
+ struct xfrm_selector sel;
+};
+
+struct xfrm_user_mapping {
+ struct xfrm_usersa_id id;
+ __u32 reqid;
+ xfrm_address_t old_saddr;
+ xfrm_address_t new_saddr;
+ __be16 old_sport;
+ __be16 new_sport;
+};
+
+struct xfrm_user_offload {
+ int ifindex;
+ __u8 flags;
+};
+
+struct xfrm_userpolicy_default {
+ __u8 in;
+ __u8 fwd;
+ __u8 out;
+};
+
+enum {
+ XFRM_DEV_OFFLOAD_IN = 1,
+ XFRM_DEV_OFFLOAD_OUT = 2,
+};
+
+struct xfrm_dump_info {
+ struct sk_buff *in_skb;
+ struct sk_buff *out_skb;
+ u32 nlmsg_seq;
+ u16 nlmsg_flags;
+};
+
+struct xfrm_link {
+ int (*doit)(struct sk_buff *, struct nlmsghdr *, struct nlattr **, struct netlink_ext_ack *);
+ int (*start)(struct netlink_callback *);
+ int (*dump)(struct sk_buff *, struct netlink_callback *);
+ int (*done)(struct netlink_callback *);
+ const struct nla_policy *nla_pol;
+ int nla_max;
+};
+
+struct mptcp_pernet {
+ struct ctl_table_header *ctl_table_hdr;
+ unsigned int add_addr_timeout;
+ unsigned int stale_loss_cnt;
+ u8 mptcp_enabled;
+ u8 checksum_enabled;
+ u8 allow_join_initial_addr_port;
+ u8 pm_type;
+};
+
+#ifndef BPF_NO_PRESERVE_ACCESS_INDEX
+#pragma clang attribute pop
+#endif
+
+#endif /* __VMLINUX_H__ */
diff --git a/.github/actions/debian/action.yml b/.github/actions/debian/action.yml
new file mode 100644
index 0000000..23d48ec
--- /dev/null
+++ b/.github/actions/debian/action.yml
@@ -0,0 +1,16 @@
+name: 'debian'
+description: 'Build'
+inputs:
+ target:
+ description: 'Run target'
+ required: true
+runs:
+ using: "composite"
+ steps:
+ - run: |
+ source /tmp/ci_setup
+ bash -x $CI_ROOT/managers/debian.sh SETUP
+ bash -x $CI_ROOT/managers/debian.sh ${{ inputs.target }}
+ bash -x $CI_ROOT/managers/debian.sh CLEANUP
+ shell: bash
+
diff --git a/.github/actions/setup/action.yml b/.github/actions/setup/action.yml
new file mode 100644
index 0000000..1776b15
--- /dev/null
+++ b/.github/actions/setup/action.yml
@@ -0,0 +1,23 @@
+name: 'setup'
+description: 'setup env, create /tmp/ci_setup'
+runs:
+ using: "composite"
+ steps:
+ - id: variables
+ run: |
+ export REPO_ROOT=$GITHUB_WORKSPACE
+ export CI_ROOT=$REPO_ROOT/ci
+ # this is somewhat ugly, but that is the easiest way to share this code with
+ # arch specific docker
+ echo 'echo ::group::Env setup' > /tmp/ci_setup
+ echo export DEBIAN_FRONTEND=noninteractive >> /tmp/ci_setup
+ echo sudo apt-get update >> /tmp/ci_setup
+ echo sudo apt-get install -y aptitude qemu-kvm zstd binutils-dev elfutils libcap-dev libelf-dev libdw-dev libguestfs-tools >> /tmp/ci_setup
+ echo export PROJECT_NAME='libbpf' >> /tmp/ci_setup
+ echo export AUTHOR_EMAIL="$(git log -1 --pretty=\"%aE\")" >> /tmp/ci_setup
+ echo export REPO_ROOT=$GITHUB_WORKSPACE >> /tmp/ci_setup
+ echo export CI_ROOT=$REPO_ROOT/ci >> /tmp/ci_setup
+ echo export VMTEST_ROOT=$CI_ROOT/vmtest >> /tmp/ci_setup
+ echo 'echo ::endgroup::' >> /tmp/ci_setup
+ shell: bash
+
diff --git a/.github/actions/vmtest/action.yml b/.github/actions/vmtest/action.yml
new file mode 100644
index 0000000..d124fbd
--- /dev/null
+++ b/.github/actions/vmtest/action.yml
@@ -0,0 +1,99 @@
+name: 'vmtest'
+description: 'Build + run vmtest'
+inputs:
+ kernel:
+ description: 'kernel version or LATEST'
+ required: true
+ default: 'LATEST'
+ arch:
+ description: 'what arch to test'
+ required: true
+ default: 'x86_64'
+ pahole:
+ description: 'pahole rev or master'
+ required: true
+ default: 'master'
+runs:
+ using: "composite"
+ steps:
+ # setup environment
+ - name: Setup environment
+ uses: libbpf/ci/setup-build-env@master
+ with:
+ pahole: ${{ inputs.pahole }}
+ # 1. download CHECKPOINT kernel source
+ - name: Get checkpoint commit
+ shell: bash
+ run: |
+ cat CHECKPOINT-COMMIT
+ echo "CHECKPOINT=$(cat CHECKPOINT-COMMIT)" >> $GITHUB_ENV
+ - name: Get kernel source at checkpoint
+ uses: libbpf/ci/get-linux-source@master
+ with:
+ repo: 'https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git'
+ rev: ${{ env.CHECKPOINT }}
+ dest: '${{ github.workspace }}/.kernel'
+ - name: Patch kernel source
+ uses: libbpf/ci/patch-kernel@master
+ with:
+ patches-root: '${{ github.workspace }}/ci/diffs'
+ repo-root: '.kernel'
+ - name: Prepare to build BPF selftests
+ shell: bash
+ run: |
+ source $GITHUB_ACTION_PATH/../../../ci/vmtest/helpers.sh
+ foldable start "Prepare building selftest"
+ cd .kernel
+ cat tools/testing/selftests/bpf/config \
+ tools/testing/selftests/bpf/config.${{ inputs.arch }} > .config
+ make olddefconfig && make prepare
+ cd -
+ foldable end
+ # 2. if kernel == LATEST, build kernel image from tree
+ - name: Build kernel image
+ if: ${{ inputs.kernel == 'LATEST' }}
+ shell: bash
+ run: |
+ source $GITHUB_ACTION_PATH/../../../ci/vmtest/helpers.sh
+ foldable start "Build Kernel Image"
+ cd .kernel
+ make -j $((4*$(nproc))) all > /dev/null
+ cp vmlinux ${{ github.workspace }}
+ cd -
+ foldable end
+ # else, just download prebuilt kernel image
+ - name: Download prebuilt kernel
+ if: ${{ inputs.kernel != 'LATEST' }}
+ uses: libbpf/ci/download-vmlinux@master
+ with:
+ kernel: ${{ inputs.kernel }}
+ arch: ${{ inputs.arch }}
+ # 3. build selftests
+ - name: Build BPF selftests
+ uses: ./.github/actions/build-selftests
+ with:
+ repo-path: '.kernel'
+ kernel: ${{ inputs.kernel }}
+ # 4. prepare rootfs
+ - name: prepare rootfs
+ uses: libbpf/ci/prepare-rootfs@master
+ env:
+ KBUILD_OUTPUT: '.kernel'
+ with:
+ project-name: 'libbpf'
+ arch: ${{ inputs.arch }}
+ kernel: ${{ inputs.kernel }}
+ kernel-root: '.kernel'
+ kbuild-output: ${{ env.KBUILD_OUTPUT }}
+ image-output: '/tmp/root.img'
+ # 5. run selftest in QEMU
+ - name: Run selftests
+ env:
+ KERNEL: ${{ inputs.kernel }}
+ REPO_ROOT: ${{ github.workspace }}
+ uses: libbpf/ci/run-qemu@master
+ with:
+ arch: ${{ inputs.arch }}
+ img: '/tmp/root.img'
+ vmlinuz: 'vmlinuz'
+ kernel-root: '.kernel'
diff --git a/.github/workflows/build.yml b/.github/workflows/build.yml
new file mode 100644
index 0000000..d9697ba
--- /dev/null
+++ b/.github/workflows/build.yml
@@ -0,0 +1,91 @@
+name: libbpf-build
+
+on:
+ pull_request:
+ push:
+ schedule:
+ - cron: '0 18 * * *'
+
+concurrency:
+ group: ci-build-${{ github.head_ref }}
+ cancel-in-progress: true
+
+jobs:
+
+ debian:
+ runs-on: ubuntu-latest
+ name: Debian Build (${{ matrix.name }})
+ strategy:
+ fail-fast: false
+ matrix:
+ include:
+ - name: default
+ target: RUN
+ - name: ASan+UBSan
+ target: RUN_ASAN
+ - name: clang ASan+UBSan
+ target: RUN_CLANG_ASAN
+ - name: gcc-10 ASan+UBSan
+ target: RUN_GCC10_ASAN
+ - name: clang
+ target: RUN_CLANG
+ - name: clang-14
+ target: RUN_CLANG14
+ - name: clang-15
+ target: RUN_CLANG15
+ - name: clang-16
+ target: RUN_CLANG16
+ - name: gcc-10
+ target: RUN_GCC10
+ - name: gcc-11
+ target: RUN_GCC11
+ - name: gcc-12
+ target: RUN_GCC12
+ steps:
+ - uses: actions/checkout@v3
+ name: Checkout
+ - uses: ./.github/actions/setup
+ name: Setup
+ - uses: ./.github/actions/debian
+ name: Build
+ with:
+ target: ${{ matrix.target }}
+
+ ubuntu:
+ runs-on: ubuntu-latest
+ name: Ubuntu Focal Build (${{ matrix.arch }})
+ strategy:
+ fail-fast: false
+ matrix:
+ include:
+ - arch: aarch64
+ - arch: ppc64le
+ - arch: s390x
+ - arch: x86
+ steps:
+ - uses: actions/checkout@v3
+ name: Checkout
+ - uses: ./.github/actions/setup
+ name: Pre-Setup
+ - run: source /tmp/ci_setup && sudo -E $CI_ROOT/managers/ubuntu.sh
+ if: matrix.arch == 'x86'
+ name: Setup
+ - uses: uraimo/run-on-arch-action@v2.0.5
+ name: Build in docker
+ if: matrix.arch != 'x86'
+ with:
+ distro:
+ ubuntu20.04
+ arch:
+ ${{ matrix.arch }}
+ setup:
+ cp /tmp/ci_setup $GITHUB_WORKSPACE
+ dockerRunArgs: |
+ --volume "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}"
+ shell: /bin/bash
+ install: |
+ export DEBIAN_FRONTEND=noninteractive
+ export TZ="America/Los_Angeles"
+ apt-get update -y
+ apt-get install -y tzdata build-essential sudo
+ run: source ${GITHUB_WORKSPACE}/ci_setup && $CI_ROOT/managers/ubuntu.sh
diff --git a/.github/workflows/cifuzz.yml b/.github/workflows/cifuzz.yml
new file mode 100644
index 0000000..bcada62
--- /dev/null
+++ b/.github/workflows/cifuzz.yml
@@ -0,0 +1,40 @@
+---
+# https://google.github.io/oss-fuzz/getting-started/continuous-integration/
+name: CIFuzz
+on:
+ push:
+ branches:
+ - master
+ pull_request:
+ branches:
+ - master
+jobs:
+ Fuzzing:
+ runs-on: ubuntu-latest
+ if: github.repository == 'libbpf/libbpf'
+ strategy:
+ fail-fast: false
+ matrix:
+ sanitizer: [address, undefined, memory]
+ steps:
+ - name: Build Fuzzers (${{ matrix.sanitizer }})
+ id: build
+ uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
+ with:
+ oss-fuzz-project-name: 'libbpf'
+ dry-run: false
+ allowed-broken-targets-percentage: 0
+ sanitizer: ${{ matrix.sanitizer }}
+ - name: Run Fuzzers (${{ matrix.sanitizer }})
+ uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
+ with:
+ oss-fuzz-project-name: 'libbpf'
+ fuzz-seconds: 300
+ dry-run: false
+ sanitizer: ${{ matrix.sanitizer }}
+ - name: Upload Crash
+ uses: actions/upload-artifact@v1
+ if: failure() && steps.build.outcome == 'success'
+ with:
+ name: ${{ matrix.sanitizer }}-artifacts
+ path: ./out/artifacts
diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml
new file mode 100644
index 0000000..5d3ecf3
--- /dev/null
+++ b/.github/workflows/codeql.yml
@@ -0,0 +1,52 @@
+---
+# vi: ts=2 sw=2 et:
+
+name: "CodeQL"
+
+on:
+ push:
+ branches:
+ - master
+ pull_request:
+ branches:
+ - master
+
+permissions:
+ contents: read
+
+jobs:
+ analyze:
+ name: Analyze
+ runs-on: ubuntu-22.04
+ concurrency:
+ group: ${{ github.workflow }}-${{ matrix.language }}-${{ github.ref }}
+ cancel-in-progress: true
+ permissions:
+ actions: read
+ security-events: write
+
+ strategy:
+ fail-fast: false
+ matrix:
+ language: ['cpp', 'python']
+
+ steps:
+ - name: Checkout repository
+ uses: actions/checkout@v3
+
+ - name: Initialize CodeQL
+ uses: github/codeql-action/init@v2
+ with:
+ languages: ${{ matrix.language }}
+ queries: +security-extended,security-and-quality
+
+ - name: Setup
+ uses: ./.github/actions/setup
+
+ - name: Build
+ run: |
+ source /tmp/ci_setup
+ make -C ./src
+
+ - name: Perform CodeQL Analysis
+ uses: github/codeql-action/analyze@v2
diff --git a/.github/workflows/coverity.yml b/.github/workflows/coverity.yml
new file mode 100644
index 0000000..8caa8ad
--- /dev/null
+++ b/.github/workflows/coverity.yml
@@ -0,0 +1,32 @@
+name: libbpf-ci-coverity
+
+on:
+ schedule:
+ - cron: '0 18 * * *'
+
+
+jobs:
+ coverity:
+ runs-on: ubuntu-latest
+ if: github.repository == 'libbpf/libbpf'
+ name: Coverity
+ steps:
+ - uses: actions/checkout@v3
+ - uses: ./.github/actions/setup
+ - name: Run coverity
+ run: |
+ source "${GITHUB_WORKSPACE}"/ci/vmtest/helpers.sh
+ foldable start "Setup CI env"
+ source /tmp/ci_setup
+ export COVERITY_SCAN_NOTIFICATION_EMAIL="${AUTHOR_EMAIL}"
+ export COVERITY_SCAN_BRANCH_PATTERN=${GITHUB_REF##refs/*/}
+ export TRAVIS_BRANCH=${COVERITY_SCAN_BRANCH_PATTERN}
+ foldable end
+ scripts/coverity.sh
+ env:
+ COVERITY_SCAN_TOKEN: ${{ secrets.COVERITY_SCAN_TOKEN }}
+ COVERITY_SCAN_PROJECT_NAME: libbpf
+ COVERITY_SCAN_BUILD_COMMAND_PREPEND: 'cd src/'
+ COVERITY_SCAN_BUILD_COMMAND: 'make'
+ - name: SCM log
+ run: cat /home/runner/work/libbpf/libbpf/src/cov-int/scm_log.txt
diff --git a/.github/workflows/lint.yml b/.github/workflows/lint.yml
new file mode 100644
index 0000000..35e7091
--- /dev/null
+++ b/.github/workflows/lint.yml
@@ -0,0 +1,19 @@
+name: "lint"
+
+on:
+ pull_request:
+ push:
+ branches:
+ - master
+
+jobs:
+ shellcheck:
+ name: ShellCheck
+ runs-on: ubuntu-latest
+ steps:
+ - name: Checkout repository
+ uses: actions/checkout@v3
+ - name: Run ShellCheck
+ uses: ludeeus/action-shellcheck@master
+ env:
+ SHELLCHECK_OPTS: --severity=error
diff --git a/.github/workflows/ondemand.yml b/.github/workflows/ondemand.yml
new file mode 100644
index 0000000..6cd46e5
--- /dev/null
+++ b/.github/workflows/ondemand.yml
@@ -0,0 +1,36 @@
+name: ondemand
+
+on:
+ workflow_dispatch:
+ inputs:
+ kernel-origin:
+ description: 'git repo for linux kernel'
+ default: 'https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git'
+ required: true
+ kernel-rev:
+ description: 'rev/tag/branch for linux kernel'
+ default: "master"
+ required: true
+ pahole-origin:
+ description: 'git repo for pahole'
+ default: 'https://git.kernel.org/pub/scm/devel/pahole/pahole.git'
+ required: true
+ pahole-rev:
+ description: 'ref/tag/branch for pahole'
+ default: "master"
+ required: true
+
+jobs:
+ vmtest:
+ runs-on: ubuntu-latest
+ name: vmtest with customized pahole/Kernel
+ steps:
+ - uses: actions/checkout@v3
+ - uses: ./.github/actions/setup
+ - uses: ./.github/actions/vmtest
+ with:
+ kernel: 'LATEST'
+ kernel-rev: ${{ github.event.inputs.kernel-rev }}
+ kernel-origin: ${{ github.event.inputs.kernel-origin }}
+ pahole: ${{ github.event.inputs.pahole-rev }}
+ pahole-origin: ${{ github.event.inputs.pahole-origin }}
diff --git a/.github/workflows/pahole.yml b/.github/workflows/pahole.yml
new file mode 100644
index 0000000..37840ff
--- /dev/null
+++ b/.github/workflows/pahole.yml
@@ -0,0 +1,20 @@
+name: pahole-staging
+
+on:
+ schedule:
+ - cron: '0 18 * * *'
+
+
+jobs:
+ vmtest:
+ runs-on: ubuntu-20.04
+ name: Kernel LATEST + staging pahole
+ env:
+ STAGING: tmp.master
+ steps:
+ - uses: actions/checkout@v3
+ - uses: ./.github/actions/setup
+ - uses: ./.github/actions/vmtest
+ with:
+ kernel: LATEST
+ pahole: $STAGING
diff --git a/.github/workflows/test.yml b/.github/workflows/test.yml
new file mode 100644
index 0000000..1e7224c
--- /dev/null
+++ b/.github/workflows/test.yml
@@ -0,0 +1,42 @@
+name: libbpf-ci
+
+on:
+ pull_request:
+ push:
+ schedule:
+ - cron: '0 18 * * *'
+
+concurrency:
+ group: ci-test-${{ github.head_ref }}
+ cancel-in-progress: true
+
+jobs:
+ vmtest:
+ runs-on: ${{ matrix.runs_on }}
+ name: Kernel ${{ matrix.kernel }} on ${{ matrix.runs_on }} + selftests
+ strategy:
+ fail-fast: false
+ matrix:
+ include:
+ - kernel: 'LATEST'
+ runs_on: ubuntu-20.04
+ arch: 'x86_64'
+ - kernel: '5.5.0'
+ runs_on: ubuntu-20.04
+ arch: 'x86_64'
+ - kernel: '4.9.0'
+ runs_on: ubuntu-20.04
+ arch: 'x86_64'
+ - kernel: 'LATEST'
+ runs_on: s390x
+ arch: 's390x'
+ steps:
+ - uses: actions/checkout@v3
+ name: Checkout
+ - uses: ./.github/actions/setup
+ name: Setup
+ - uses: ./.github/actions/vmtest
+ name: vmtest
+ with:
+ kernel: ${{ matrix.kernel }}
+ arch: ${{ matrix.arch }}
diff --git a/.readthedocs.yaml b/.readthedocs.yaml
new file mode 100644
index 0000000..803dfa2
--- /dev/null
+++ b/.readthedocs.yaml
@@ -0,0 +1,22 @@
+# .readthedocs.yaml
+# Read the Docs configuration file
+# See https://docs.readthedocs.io/en/stable/config-file/v2.html for details
+
+# Required
+version: 2
+
+# Build documentation in the docs/ directory with Sphinx
+sphinx:
+ builder: html
+ configuration: docs/conf.py
+
+formats:
+ - htmlzip
+ - pdf
+ - epub
+
+# Optionally set the version of Python and requirements required to build your docs
+python:
+ version: 3.7
+ install:
+ - requirements: docs/sphinx/requirements.txt \ No newline at end of file
diff --git a/BPF-CHECKPOINT-COMMIT b/BPF-CHECKPOINT-COMMIT
new file mode 100644
index 0000000..331725a
--- /dev/null
+++ b/BPF-CHECKPOINT-COMMIT
@@ -0,0 +1 @@
+54c3f1a81421f85e60ae2eaae7be3727a09916ee
diff --git a/CHECKPOINT-COMMIT b/CHECKPOINT-COMMIT
new file mode 100644
index 0000000..a1abd95
--- /dev/null
+++ b/CHECKPOINT-COMMIT
@@ -0,0 +1 @@
+7b43df6c6ec38c9097420902a1c8165c4b25bf70
diff --git a/LICENSE b/LICENSE
new file mode 100644
index 0000000..d38fed3
--- /dev/null
+++ b/LICENSE
@@ -0,0 +1 @@
+LGPL-2.1 OR BSD-2-Clause
diff --git a/LICENSE.BSD-2-Clause b/LICENSE.BSD-2-Clause
new file mode 100644
index 0000000..bce40aa
--- /dev/null
+++ b/LICENSE.BSD-2-Clause
@@ -0,0 +1,32 @@
+Valid-License-Identifier: BSD-2-Clause
+SPDX-URL: https://spdx.org/licenses/BSD-2-Clause.html
+Usage-Guide:
+ To use the BSD 2-clause "Simplified" License put the following SPDX
+ tag/value pair into a comment according to the placement guidelines in
+ the licensing rules documentation:
+ SPDX-License-Identifier: BSD-2-Clause
+License-Text:
+
+Copyright (c) 2015 The Libbpf Authors. All rights reserved.
+
+Redistribution and use in source and binary forms, with or without
+modification, are permitted provided that the following conditions are met:
+
+1. Redistributions of source code must retain the above copyright notice,
+ this list of conditions and the following disclaimer.
+
+2. Redistributions in binary form must reproduce the above copyright
+ notice, this list of conditions and the following disclaimer in the
+ documentation and/or other materials provided with the distribution.
+
+THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+POSSIBILITY OF SUCH DAMAGE.
diff --git a/LICENSE.LGPL-2.1 b/LICENSE.LGPL-2.1
new file mode 100644
index 0000000..27bb434
--- /dev/null
+++ b/LICENSE.LGPL-2.1
@@ -0,0 +1,503 @@
+Valid-License-Identifier: LGPL-2.1
+Valid-License-Identifier: LGPL-2.1+
+SPDX-URL: https://spdx.org/licenses/LGPL-2.1.html
+Usage-Guide:
+ To use this license in source code, put one of the following SPDX
+ tag/value pairs into a comment according to the placement
+ guidelines in the licensing rules documentation.
+ For 'GNU Lesser General Public License (LGPL) version 2.1 only' use:
+ SPDX-License-Identifier: LGPL-2.1
+ For 'GNU Lesser General Public License (LGPL) version 2.1 or any later
+ version' use:
+ SPDX-License-Identifier: LGPL-2.1+
+License-Text:
+
+GNU LESSER GENERAL PUBLIC LICENSE
+Version 2.1, February 1999
+
+Copyright (C) 1991, 1999 Free Software Foundation, Inc.
+51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
+
+Everyone is permitted to copy and distribute verbatim copies of this
+license document, but changing it is not allowed.
+
+[This is the first released version of the Lesser GPL. It also counts as
+the successor of the GNU Library Public License, version 2, hence the
+version number 2.1.]
+
+Preamble
+
+The licenses for most software are designed to take away your freedom to
+share and change it. By contrast, the GNU General Public Licenses are
+intended to guarantee your freedom to share and change free software--to
+make sure the software is free for all its users.
+
+This license, the Lesser General Public License, applies to some specially
+designated software packages--typically libraries--of the Free Software
+Foundation and other authors who decide to use it. You can use it too, but
+we suggest you first think carefully about whether this license or the
+ordinary General Public License is the better strategy to use in any
+particular case, based on the explanations below.
+
+When we speak of free software, we are referring to freedom of use, not
+price. Our General Public Licenses are designed to make sure that you have
+the freedom to distribute copies of free software (and charge for this
+service if you wish); that you receive source code or can get it if you
+want it; that you can change the software and use pieces of it in new free
+programs; and that you are informed that you can do these things.
+
+To protect your rights, we need to make restrictions that forbid
+distributors to deny you these rights or to ask you to surrender these
+rights. These restrictions translate to certain responsibilities for you if
+you distribute copies of the library or if you modify it.
+
+For example, if you distribute copies of the library, whether gratis or for
+a fee, you must give the recipients all the rights that we gave you. You
+must make sure that they, too, receive or can get the source code. If you
+link other code with the library, you must provide complete object files to
+the recipients, so that they can relink them with the library after making
+changes to the library and recompiling it. And you must show them these
+terms so they know their rights.
+
+We protect your rights with a two-step method: (1) we copyright the
+library, and (2) we offer you this license, which gives you legal
+permission to copy, distribute and/or modify the library.
+
+To protect each distributor, we want to make it very clear that there is no
+warranty for the free library. Also, if the library is modified by someone
+else and passed on, the recipients should know that what they have is not
+the original version, so that the original author's reputation will not be
+affected by problems that might be introduced by others.
+
+Finally, software patents pose a constant threat to the existence of any
+free program. We wish to make sure that a company cannot effectively
+restrict the users of a free program by obtaining a restrictive license
+from a patent holder. Therefore, we insist that any patent license obtained
+for a version of the library must be consistent with the full freedom of
+use specified in this license.
+
+Most GNU software, including some libraries, is covered by the ordinary GNU
+General Public License. This license, the GNU Lesser General Public
+License, applies to certain designated libraries, and is quite different
+from the ordinary General Public License. We use this license for certain
+libraries in order to permit linking those libraries into non-free
+programs.
+
+When a program is linked with a library, whether statically or using a
+shared library, the combination of the two is legally speaking a combined
+work, a derivative of the original library. The ordinary General Public
+License therefore permits such linking only if the entire combination fits
+its criteria of freedom. The Lesser General Public License permits more lax
+criteria for linking other code with the library.
+
+We call this license the "Lesser" General Public License because it does
+Less to protect the user's freedom than the ordinary General Public
+License. It also provides other free software developers Less of an
+advantage over competing non-free programs. These disadvantages are the
+reason we use the ordinary General Public License for many
+libraries. However, the Lesser license provides advantages in certain
+special circumstances.
+
+For example, on rare occasions, there may be a special need to encourage
+the widest possible use of a certain library, so that it becomes a de-facto
+standard. To achieve this, non-free programs must be allowed to use the
+library. A more frequent case is that a free library does the same job as
+widely used non-free libraries. In this case, there is little to gain by
+limiting the free library to free software only, so we use the Lesser
+General Public License.
+
+In other cases, permission to use a particular library in non-free programs
+enables a greater number of people to use a large body of free
+software. For example, permission to use the GNU C Library in non-free
+programs enables many more people to use the whole GNU operating system, as
+well as its variant, the GNU/Linux operating system.
+
+Although the Lesser General Public License is Less protective of the users'
+freedom, it does ensure that the user of a program that is linked with the
+Library has the freedom and the wherewithal to run that program using a
+modified version of the Library.
+
+The precise terms and conditions for copying, distribution and modification
+follow. Pay close attention to the difference between a "work based on the
+library" and a "work that uses the library". The former contains code
+derived from the library, whereas the latter must be combined with the
+library in order to run.
+
+TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
+
+0. This License Agreement applies to any software library or other program
+ which contains a notice placed by the copyright holder or other
+ authorized party saying it may be distributed under the terms of this
+ Lesser General Public License (also called "this License"). Each
+ licensee is addressed as "you".
+
+ A "library" means a collection of software functions and/or data
+ prepared so as to be conveniently linked with application programs
+ (which use some of those functions and data) to form executables.
+
+ The "Library", below, refers to any such software library or work which
+ has been distributed under these terms. A "work based on the Library"
+ means either the Library or any derivative work under copyright law:
+ that is to say, a work containing the Library or a portion of it, either
+ verbatim or with modifications and/or translated straightforwardly into
+ another language. (Hereinafter, translation is included without
+ limitation in the term "modification".)
+
+ "Source code" for a work means the preferred form of the work for making
+ modifications to it. For a library, complete source code means all the
+ source code for all modules it contains, plus any associated interface
+ definition files, plus the scripts used to control compilation and
+ installation of the library.
+
+ Activities other than copying, distribution and modification are not
+ covered by this License; they are outside its scope. The act of running
+ a program using the Library is not restricted, and output from such a
+ program is covered only if its contents constitute a work based on the
+ Library (independent of the use of the Library in a tool for writing
+ it). Whether that is true depends on what the Library does and what the
+ program that uses the Library does.
+
+1. You may copy and distribute verbatim copies of the Library's complete
+ source code as you receive it, in any medium, provided that you
+ conspicuously and appropriately publish on each copy an appropriate
+ copyright notice and disclaimer of warranty; keep intact all the notices
+ that refer to this License and to the absence of any warranty; and
+ distribute a copy of this License along with the Library.
+
+ You may charge a fee for the physical act of transferring a copy, and
+ you may at your option offer warranty protection in exchange for a fee.
+
+2. You may modify your copy or copies of the Library or any portion of it,
+ thus forming a work based on the Library, and copy and distribute such
+ modifications or work under the terms of Section 1 above, provided that
+ you also meet all of these conditions:
+
+ a) The modified work must itself be a software library.
+
+ b) You must cause the files modified to carry prominent notices stating
+ that you changed the files and the date of any change.
+
+ c) You must cause the whole of the work to be licensed at no charge to
+ all third parties under the terms of this License.
+
+ d) If a facility in the modified Library refers to a function or a table
+ of data to be supplied by an application program that uses the
+ facility, other than as an argument passed when the facility is
+ invoked, then you must make a good faith effort to ensure that, in
+ the event an application does not supply such function or table, the
+ facility still operates, and performs whatever part of its purpose
+ remains meaningful.
+
+ (For example, a function in a library to compute square roots has a
+ purpose that is entirely well-defined independent of the
+ application. Therefore, Subsection 2d requires that any
+ application-supplied function or table used by this function must be
+ optional: if the application does not supply it, the square root
+ function must still compute square roots.)
+
+ These requirements apply to the modified work as a whole. If
+ identifiable sections of that work are not derived from the Library, and
+ can be reasonably considered independent and separate works in
+ themselves, then this License, and its terms, do not apply to those
+ sections when you distribute them as separate works. But when you
+ distribute the same sections as part of a whole which is a work based on
+ the Library, the distribution of the whole must be on the terms of this
+ License, whose permissions for other licensees extend to the entire
+ whole, and thus to each and every part regardless of who wrote it.
+
+ Thus, it is not the intent of this section to claim rights or contest
+ your rights to work written entirely by you; rather, the intent is to
+ exercise the right to control the distribution of derivative or
+ collective works based on the Library.
+
+ In addition, mere aggregation of another work not based on the Library
+ with the Library (or with a work based on the Library) on a volume of a
+ storage or distribution medium does not bring the other work under the
+ scope of this License.
+
+3. You may opt to apply the terms of the ordinary GNU General Public
+ License instead of this License to a given copy of the Library. To do
+ this, you must alter all the notices that refer to this License, so that
+ they refer to the ordinary GNU General Public License, version 2,
+ instead of to this License. (If a newer version than version 2 of the
+ ordinary GNU General Public License has appeared, then you can specify
+ that version instead if you wish.) Do not make any other change in these
+ notices.
+
+ Once this change is made in a given copy, it is irreversible for that
+ copy, so the ordinary GNU General Public License applies to all
+ subsequent copies and derivative works made from that copy.
+
+ This option is useful when you wish to copy part of the code of the
+ Library into a program that is not a library.
+
+4. You may copy and distribute the Library (or a portion or derivative of
+ it, under Section 2) in object code or executable form under the terms
+ of Sections 1 and 2 above provided that you accompany it with the
+ complete corresponding machine-readable source code, which must be
+ distributed under the terms of Sections 1 and 2 above on a medium
+ customarily used for software interchange.
+
+ If distribution of object code is made by offering access to copy from a
+ designated place, then offering equivalent access to copy the source
+ code from the same place satisfies the requirement to distribute the
+ source code, even though third parties are not compelled to copy the
+ source along with the object code.
+
+5. A program that contains no derivative of any portion of the Library, but
+ is designed to work with the Library by being compiled or linked with
+ it, is called a "work that uses the Library". Such a work, in isolation,
+ is not a derivative work of the Library, and therefore falls outside the
+ scope of this License.
+
+ However, linking a "work that uses the Library" with the Library creates
+ an executable that is a derivative of the Library (because it contains
+ portions of the Library), rather than a "work that uses the
+ library". The executable is therefore covered by this License. Section 6
+ states terms for distribution of such executables.
+
+ When a "work that uses the Library" uses material from a header file
+ that is part of the Library, the object code for the work may be a
+ derivative work of the Library even though the source code is
+ not. Whether this is true is especially significant if the work can be
+ linked without the Library, or if the work is itself a library. The
+ threshold for this to be true is not precisely defined by law.
+
+ If such an object file uses only numerical parameters, data structure
+ layouts and accessors, and small macros and small inline functions (ten
+ lines or less in length), then the use of the object file is
+ unrestricted, regardless of whether it is legally a derivative
+ work. (Executables containing this object code plus portions of the
+ Library will still fall under Section 6.)
+
+ Otherwise, if the work is a derivative of the Library, you may
+ distribute the object code for the work under the terms of Section
+ 6. Any executables containing that work also fall under Section 6,
+ whether or not they are linked directly with the Library itself.
+
+6. As an exception to the Sections above, you may also combine or link a
+ "work that uses the Library" with the Library to produce a work
+ containing portions of the Library, and distribute that work under terms
+ of your choice, provided that the terms permit modification of the work
+ for the customer's own use and reverse engineering for debugging such
+ modifications.
+
+ You must give prominent notice with each copy of the work that the
+ Library is used in it and that the Library and its use are covered by
+ this License. You must supply a copy of this License. If the work during
+ execution displays copyright notices, you must include the copyright
+ notice for the Library among them, as well as a reference directing the
+ user to the copy of this License. Also, you must do one of these things:
+
+ a) Accompany the work with the complete corresponding machine-readable
+ source code for the Library including whatever changes were used in
+ the work (which must be distributed under Sections 1 and 2 above);
+ and, if the work is an executable linked with the Library, with the
+ complete machine-readable "work that uses the Library", as object
+ code and/or source code, so that the user can modify the Library and
+ then relink to produce a modified executable containing the modified
+ Library. (It is understood that the user who changes the contents of
+ definitions files in the Library will not necessarily be able to
+ recompile the application to use the modified definitions.)
+
+ b) Use a suitable shared library mechanism for linking with the
+ Library. A suitable mechanism is one that (1) uses at run time a copy
+ of the library already present on the user's computer system, rather
+ than copying library functions into the executable, and (2) will
+ operate properly with a modified version of the library, if the user
+ installs one, as long as the modified version is interface-compatible
+ with the version that the work was made with.
+
+ c) Accompany the work with a written offer, valid for at least three
+ years, to give the same user the materials specified in Subsection
+ 6a, above, for a charge no more than the cost of performing this
+ distribution.
+
+ d) If distribution of the work is made by offering access to copy from a
+ designated place, offer equivalent access to copy the above specified
+ materials from the same place.
+
+ e) Verify that the user has already received a copy of these materials
+ or that you have already sent this user a copy.
+
+ For an executable, the required form of the "work that uses the Library"
+ must include any data and utility programs needed for reproducing the
+ executable from it. However, as a special exception, the materials to be
+ distributed need not include anything that is normally distributed (in
+ either source or binary form) with the major components (compiler,
+ kernel, and so on) of the operating system on which the executable runs,
+ unless that component itself accompanies the executable.
+
+ It may happen that this requirement contradicts the license restrictions
+ of other proprietary libraries that do not normally accompany the
+ operating system. Such a contradiction means you cannot use both them
+ and the Library together in an executable that you distribute.
+
+7. You may place library facilities that are a work based on the Library
+ side-by-side in a single library together with other library facilities
+ not covered by this License, and distribute such a combined library,
+ provided that the separate distribution of the work based on the Library
+ and of the other library facilities is otherwise permitted, and provided
+ that you do these two things:
+
+ a) Accompany the combined library with a copy of the same work based on
+ the Library, uncombined with any other library facilities. This must
+ be distributed under the terms of the Sections above.
+
+ b) Give prominent notice with the combined library of the fact that part
+ of it is a work based on the Library, and explaining where to find
+ the accompanying uncombined form of the same work.
+
+8. You may not copy, modify, sublicense, link with, or distribute the
+ Library except as expressly provided under this License. Any attempt
+ otherwise to copy, modify, sublicense, link with, or distribute the
+ Library is void, and will automatically terminate your rights under this
+ License. However, parties who have received copies, or rights, from you
+ under this License will not have their licenses terminated so long as
+ such parties remain in full compliance.
+
+9. You are not required to accept this License, since you have not signed
+ it. However, nothing else grants you permission to modify or distribute
+ the Library or its derivative works. These actions are prohibited by law
+ if you do not accept this License. Therefore, by modifying or
+ distributing the Library (or any work based on the Library), you
+ indicate your acceptance of this License to do so, and all its terms and
+ conditions for copying, distributing or modifying the Library or works
+ based on it.
+
+10. Each time you redistribute the Library (or any work based on the
+ Library), the recipient automatically receives a license from the
+ original licensor to copy, distribute, link with or modify the Library
+ subject to these terms and conditions. You may not impose any further
+ restrictions on the recipients' exercise of the rights granted
+ herein. You are not responsible for enforcing compliance by third
+ parties with this License.
+
+11. If, as a consequence of a court judgment or allegation of patent
+ infringement or for any other reason (not limited to patent issues),
+ conditions are imposed on you (whether by court order, agreement or
+ otherwise) that contradict the conditions of this License, they do not
+ excuse you from the conditions of this License. If you cannot
+ distribute so as to satisfy simultaneously your obligations under this
+ License and any other pertinent obligations, then as a consequence you
+ may not distribute the Library at all. For example, if a patent license
+ would not permit royalty-free redistribution of the Library by all
+ those who receive copies directly or indirectly through you, then the
+ only way you could satisfy both it and this License would be to refrain
+ entirely from distribution of the Library.
+
+ If any portion of this section is held invalid or unenforceable under
+ any particular circumstance, the balance of the section is intended to
+ apply, and the section as a whole is intended to apply in other
+ circumstances.
+
+ It is not the purpose of this section to induce you to infringe any
+ patents or other property right claims or to contest validity of any
+ such claims; this section has the sole purpose of protecting the
+ integrity of the free software distribution system which is implemented
+ by public license practices. Many people have made generous
+ contributions to the wide range of software distributed through that
+ system in reliance on consistent application of that system; it is up
+ to the author/donor to decide if he or she is willing to distribute
+ software through any other system and a licensee cannot impose that
+ choice.
+
+ This section is intended to make thoroughly clear what is believed to
+ be a consequence of the rest of this License.
+
+12. If the distribution and/or use of the Library is restricted in certain
+ countries either by patents or by copyrighted interfaces, the original
+ copyright holder who places the Library under this License may add an
+ explicit geographical distribution limitation excluding those
+ countries, so that distribution is permitted only in or among countries
+ not thus excluded. In such case, this License incorporates the
+ limitation as if written in the body of this License.
+
+13. The Free Software Foundation may publish revised and/or new versions of
+ the Lesser General Public License from time to time. Such new versions
+ will be similar in spirit to the present version, but may differ in
+ detail to address new problems or concerns.
+
+ Each version is given a distinguishing version number. If the Library
+ specifies a version number of this License which applies to it and "any
+ later version", you have the option of following the terms and
+ conditions either of that version or of any later version published by
+ the Free Software Foundation. If the Library does not specify a license
+ version number, you may choose any version ever published by the Free
+ Software Foundation.
+
+14. If you wish to incorporate parts of the Library into other free
+ programs whose distribution conditions are incompatible with these,
+ write to the author to ask for permission. For software which is
+ copyrighted by the Free Software Foundation, write to the Free Software
+ Foundation; we sometimes make exceptions for this. Our decision will be
+ guided by the two goals of preserving the free status of all
+ derivatives of our free software and of promoting the sharing and reuse
+ of software generally.
+
+NO WARRANTY
+
+15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
+ FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
+ OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
+ PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
+ EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+ WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
+ ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH
+ YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
+ NECESSARY SERVICING, REPAIR OR CORRECTION.
+
+16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
+ WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
+ REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
+ DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
+ DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY
+ (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED
+ INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
+ THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR
+ OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
+
+END OF TERMS AND CONDITIONS
+
+How to Apply These Terms to Your New Libraries
+
+If you develop a new library, and you want it to be of the greatest
+possible use to the public, we recommend making it free software that
+everyone can redistribute and change. You can do so by permitting
+redistribution under these terms (or, alternatively, under the terms of the
+ordinary General Public License).
+
+To apply these terms, attach the following notices to the library. It is
+safest to attach them to the start of each source file to most effectively
+convey the exclusion of warranty; and each file should have at least the
+"copyright" line and a pointer to where the full notice is found.
+
+one line to give the library's name and an idea of what it does.
+Copyright (C) year name of author
+
+This library is free software; you can redistribute it and/or modify it
+under the terms of the GNU Lesser General Public License as published by
+the Free Software Foundation; either version 2.1 of the License, or (at
+your option) any later version.
+
+This library is distributed in the hope that it will be useful, but WITHOUT
+ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License
+for more details.
+
+You should have received a copy of the GNU Lesser General Public License
+along with this library; if not, write to the Free Software Foundation,
+Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Also add
+information on how to contact you by electronic and paper mail.
+
+You should also get your employer (if you work as a programmer) or your
+school, if any, to sign a "copyright disclaimer" for the library, if
+necessary. Here is a sample; alter the names:
+
+Yoyodyne, Inc., hereby disclaims all copyright interest in
+the library `Frob' (a library for tweaking knobs) written
+by James Random Hacker.
+
+signature of Ty Coon, 1 April 1990
+Ty Coon, President of Vice
+That's all there is to it!
diff --git a/README.md b/README.md
new file mode 100644
index 0000000..9861b16
--- /dev/null
+++ b/README.md
@@ -0,0 +1,189 @@
+<picture>
+ <source media="(prefers-color-scheme: dark)" srcset="assets/libbpf-logo-sideways-darkbg.png" width="40%">
+ <img src="assets/libbpf-logo-sideways.png" width="40%">
+</picture>
+
+libbpf
+[![Github Actions Builds & Tests](https://github.com/libbpf/libbpf/actions/workflows/test.yml/badge.svg)](https://github.com/libbpf/libbpf/actions/workflows/test.yml)
+[![Coverity](https://img.shields.io/coverity/scan/18195.svg)](https://scan.coverity.com/projects/libbpf)
+[![CodeQL](https://github.com/libbpf/libbpf/workflows/CodeQL/badge.svg?branch=master)](https://github.com/libbpf/libbpf/actions?query=workflow%3ACodeQL+branch%3Amaster)
+[![OSS-Fuzz Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/libbpf.svg)](https://oss-fuzz-build-logs.storage.googleapis.com/index.html#libbpf)
+[![Read the Docs](https://readthedocs.org/projects/libbpf/badge/?version=latest)](https://libbpf.readthedocs.io/en/latest/)
+======
+
+**This is the official home of the libbpf library.**
+
+*Please use this Github repository for building and packaging libbpf
+and when using it in your projects through Git submodule.*
+
+Libbpf *authoritative source code* is developed as part of [bpf-next Linux source
+tree](https://kernel.googlesource.com/pub/scm/linux/kernel/git/bpf/bpf-next) under
+`tools/lib/bpf` subdirectory and is periodically synced to Github. As such, all the
+libbpf changes should be sent to [BPF mailing list](http://vger.kernel.org/vger-lists.html#bpf),
+please don't open PRs here unless you are changing Github-specific parts of libbpf
+(e.g., Github-specific Makefile).
+
+Libbpf and general BPF usage questions
+======================================
+
+Libbpf documentation can be found [here](https://libbpf.readthedocs.io/en/latest/api.html).
+It's an ongoing effort and has ways to go, but please take a look and consider contributing as well.
+
+Please check out [libbpf-bootstrap](https://github.com/libbpf/libbpf-bootstrap)
+and [the companion blog post](https://nakryiko.com/posts/libbpf-bootstrap/) for
+the examples of building BPF applications with libbpf.
+[libbpf-tools](https://github.com/iovisor/bcc/tree/master/libbpf-tools) are also
+a good source of the real-world libbpf-based tracing tools.
+
+See also ["BPF CO-RE reference guide"](https://nakryiko.com/posts/bpf-core-reference-guide/)
+for the coverage of practical aspects of building BPF CO-RE applications and
+["BPF CO-RE"](https://nakryiko.com/posts/bpf-portability-and-co-re/) for
+general introduction into BPF portability issues and BPF CO-RE origins.
+
+All general BPF questions, including kernel functionality, libbpf APIs and
+their application, should be sent to bpf@vger.kernel.org mailing list. You can
+subscribe to it [here](http://vger.kernel.org/vger-lists.html#bpf) and search
+its archive [here](https://lore.kernel.org/bpf/). Please search the archive
+before asking new questions. It very well might be that this was already
+addressed or answered before.
+
+bpf@vger.kernel.org is monitored by many more people and they will happily try
+to help you with whatever issue you have. This repository's PRs and issues
+should be opened only for dealing with issues pertaining to specific way this
+libbpf mirror repo is set up and organized.
+
+Building libbpf
+===============
+libelf is an internal dependency of libbpf and thus it is required to link
+against and must be installed on the system for applications to work.
+pkg-config is used by default to find libelf, and the program called can be
+overridden with `PKG_CONFIG`.
+
+If using `pkg-config` at build time is not desired, it can be disabled by
+setting `NO_PKG_CONFIG=1` when calling make.
+
+To build both static libbpf.a and shared libbpf.so:
+```bash
+$ cd src
+$ make
+```
+
+To build only static libbpf.a library in directory
+build/ and install them together with libbpf headers in a staging directory
+root/:
+```bash
+$ cd src
+$ mkdir build root
+$ BUILD_STATIC_ONLY=y OBJDIR=build DESTDIR=root make install
+```
+
+To build both static libbpf.a and shared libbpf.so against a custom libelf
+dependency installed in /build/root/ and install them together with libbpf
+headers in a build directory /build/root/:
+```bash
+$ cd src
+$ PKG_CONFIG_PATH=/build/root/lib64/pkgconfig DESTDIR=/build/root make install
+```
+
+BPF CO-RE (Compile Once – Run Everywhere)
+=========================================
+
+Libbpf supports building BPF CO-RE-enabled applications, which, in contrast to
+[BCC](https://github.com/iovisor/bcc/), do not require Clang/LLVM runtime
+being deployed to target servers and doesn't rely on kernel-devel headers
+being available.
+
+It does rely on kernel to be built with [BTF type
+information](https://www.kernel.org/doc/html/latest/bpf/btf.html), though.
+Some major Linux distributions come with kernel BTF already built in:
+ - Fedora 31+
+ - RHEL 8.2+
+ - OpenSUSE Tumbleweed (in the next release, as of 2020-06-04)
+ - Arch Linux (from kernel 5.7.1.arch1-1)
+ - Manjaro (from kernel 5.4 if compiled after 2021-06-18)
+ - Ubuntu 20.10
+ - Debian 11 (amd64/arm64)
+
+If your kernel doesn't come with BTF built-in, you'll need to build custom
+kernel. You'll need:
+ - `pahole` 1.16+ tool (part of `dwarves` package), which performs DWARF to
+ BTF conversion;
+ - kernel built with `CONFIG_DEBUG_INFO_BTF=y` option;
+ - you can check if your kernel has BTF built-in by looking for
+ `/sys/kernel/btf/vmlinux` file:
+
+```shell
+$ ls -la /sys/kernel/btf/vmlinux
+-r--r--r--. 1 root root 3541561 Jun 2 18:16 /sys/kernel/btf/vmlinux
+```
+
+To develop and build BPF programs, you'll need Clang/LLVM 10+. The following
+distributions have Clang/LLVM 10+ packaged by default:
+ - Fedora 32+
+ - Ubuntu 20.04+
+ - Arch Linux
+ - Ubuntu 20.10 (LLVM 11)
+ - Debian 11 (LLVM 11)
+ - Alpine 3.13+
+
+Otherwise, please make sure to update it on your system.
+
+The following resources are useful to understand what BPF CO-RE is and how to
+use it:
+- [BPF CO-RE reference guide](https://nakryiko.com/posts/bpf-core-reference-guide/)
+- [BPF Portability and CO-RE](https://nakryiko.com/posts/bpf-portability-and-co-re/)
+- [HOWTO: BCC to libbpf conversion](https://nakryiko.com/posts/bcc-to-libbpf-howto-guide/)
+- [libbpf-tools in BCC repo](https://github.com/iovisor/bcc/tree/master/libbpf-tools)
+ contain lots of real-world tools converted from BCC to BPF CO-RE. Consider
+ converting some more to both contribute to the BPF community and gain some
+ more experience with it.
+
+Distributions
+=============
+
+Distributions packaging libbpf from this mirror:
+ - [Fedora](https://src.fedoraproject.org/rpms/libbpf)
+ - [Gentoo](https://packages.gentoo.org/packages/dev-libs/libbpf)
+ - [Debian](https://packages.debian.org/source/sid/libbpf)
+ - [Arch](https://archlinux.org/packages/core/x86_64/libbpf/)
+ - [Ubuntu](https://packages.ubuntu.com/source/impish/libbpf)
+ - [Alpine](https://pkgs.alpinelinux.org/packages?name=libbpf)
+
+Benefits of packaging from the mirror over packaging from kernel sources:
+ - Consistent versioning across distributions.
+ - No ties to any specific kernel, transparent handling of older kernels.
+ Libbpf is designed to be kernel-agnostic and work across multitude of
+ kernel versions. It has built-in mechanisms to gracefully handle older
+ kernels, that are missing some of the features, by working around or
+ gracefully degrading functionality. Thus libbpf is not tied to a specific
+ kernel version and can/should be packaged and versioned independently.
+ - Continuous integration testing via
+ [GitHub Actions](https://github.com/libbpf/libbpf/actions).
+ - Static code analysis via [LGTM](https://lgtm.com/projects/g/libbpf/libbpf)
+ and [Coverity](https://scan.coverity.com/projects/libbpf).
+
+Package dependencies of libbpf, package names may vary across distros:
+ - zlib
+ - libelf
+
+[![libbpf distro packaging status](https://repology.org/badge/vertical-allrepos/libbpf.svg)](https://repology.org/project/libbpf/versions)
+
+
+bpf-next to Github sync
+=======================
+
+All the gory details of syncing can be found in `scripts/sync-kernel.sh`
+script.
+
+Some header files in this repo (`include/linux/*.h`) are reduced versions of
+their counterpart files at
+[bpf-next](https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/)'s
+`tools/include/linux/*.h` to make compilation successful.
+
+License
+=======
+
+This work is dual-licensed under BSD 2-clause license and GNU LGPL v2.1 license.
+You can choose between one of them if you use this work.
+
+`SPDX-License-Identifier: BSD-2-Clause OR LGPL-2.1`
diff --git a/assets/libbpf-logo-compact-darkbg.png b/assets/libbpf-logo-compact-darkbg.png
new file mode 100644
index 0000000..aaef60e
--- /dev/null
+++ b/assets/libbpf-logo-compact-darkbg.png
Binary files differ
diff --git a/assets/libbpf-logo-compact-mono.png b/assets/libbpf-logo-compact-mono.png
new file mode 100644
index 0000000..51daed1
--- /dev/null
+++ b/assets/libbpf-logo-compact-mono.png
Binary files differ
diff --git a/assets/libbpf-logo-compact.png b/assets/libbpf-logo-compact.png
new file mode 100644
index 0000000..99ae3ab
--- /dev/null
+++ b/assets/libbpf-logo-compact.png
Binary files differ
diff --git a/assets/libbpf-logo-sideways-darkbg.png b/assets/libbpf-logo-sideways-darkbg.png
new file mode 100644
index 0000000..00d6d83
--- /dev/null
+++ b/assets/libbpf-logo-sideways-darkbg.png
Binary files differ
diff --git a/assets/libbpf-logo-sideways-mono.png b/assets/libbpf-logo-sideways-mono.png
new file mode 100644
index 0000000..82f1ce5
--- /dev/null
+++ b/assets/libbpf-logo-sideways-mono.png
Binary files differ
diff --git a/assets/libbpf-logo-sideways.png b/assets/libbpf-logo-sideways.png
new file mode 100644
index 0000000..48186c3
--- /dev/null
+++ b/assets/libbpf-logo-sideways.png
Binary files differ
diff --git a/assets/libbpf-logo-sparse-darkbg.png b/assets/libbpf-logo-sparse-darkbg.png
new file mode 100644
index 0000000..5e57430
--- /dev/null
+++ b/assets/libbpf-logo-sparse-darkbg.png
Binary files differ
diff --git a/assets/libbpf-logo-sparse-mono.png b/assets/libbpf-logo-sparse-mono.png
new file mode 100644
index 0000000..b02d432
--- /dev/null
+++ b/assets/libbpf-logo-sparse-mono.png
Binary files differ
diff --git a/assets/libbpf-logo-sparse.png b/assets/libbpf-logo-sparse.png
new file mode 100644
index 0000000..a306588
--- /dev/null
+++ b/assets/libbpf-logo-sparse.png
Binary files differ
diff --git a/ci/diffs/.keep b/ci/diffs/.keep
new file mode 100644
index 0000000..e69de29
--- /dev/null
+++ b/ci/diffs/.keep
diff --git a/ci/managers/debian.sh b/ci/managers/debian.sh
new file mode 100755
index 0000000..3d3f860
--- /dev/null
+++ b/ci/managers/debian.sh
@@ -0,0 +1,95 @@
+#!/bin/bash
+
+PHASES=(${@:-SETUP RUN RUN_ASAN CLEANUP})
+DEBIAN_RELEASE="${DEBIAN_RELEASE:-testing}"
+CONT_NAME="${CONT_NAME:-libbpf-debian-$DEBIAN_RELEASE}"
+ENV_VARS="${ENV_VARS:-}"
+DOCKER_RUN="${DOCKER_RUN:-docker run}"
+REPO_ROOT="${REPO_ROOT:-$PWD}"
+ADDITIONAL_DEPS=(pkgconf)
+EXTRA_CFLAGS=""
+EXTRA_LDFLAGS=""
+
+function info() {
+ echo -e "\033[33;1m$1\033[0m"
+}
+
+function error() {
+ echo -e "\033[31;1m$1\033[0m"
+}
+
+function docker_exec() {
+ docker exec $ENV_VARS $CONT_NAME "$@"
+}
+
+set -eu
+
+source "$(dirname $0)/travis_wait.bash"
+
+for phase in "${PHASES[@]}"; do
+ case $phase in
+ SETUP)
+ info "Setup phase"
+ info "Using Debian $DEBIAN_RELEASE"
+
+ docker --version
+
+ docker pull debian:$DEBIAN_RELEASE
+ info "Starting container $CONT_NAME"
+ $DOCKER_RUN -v $REPO_ROOT:/build:rw \
+ -w /build --privileged=true --name $CONT_NAME \
+ -dit --net=host debian:$DEBIAN_RELEASE /bin/bash
+ echo -e "::group::Build Env Setup"
+ docker_exec bash -c "echo deb-src http://deb.debian.org/debian $DEBIAN_RELEASE main >>/etc/apt/sources.list"
+ docker_exec apt-get -y update
+ docker_exec apt-get -y install aptitude
+ docker_exec aptitude -y install make libz-dev libelf-dev
+ docker_exec aptitude -y install "${ADDITIONAL_DEPS[@]}"
+ echo -e "::endgroup::"
+ ;;
+ RUN|RUN_CLANG|RUN_CLANG14|RUN_CLANG15|RUN_CLANG16|RUN_GCC10|RUN_GCC11|RUN_GCC12|RUN_ASAN|RUN_CLANG_ASAN|RUN_GCC10_ASAN)
+ CC="cc"
+ if [[ "$phase" =~ "RUN_CLANG(\d+)(_ASAN)?" ]]; then
+ ENV_VARS="-e CC=clang-${BASH_REMATCH[1]} -e CXX=clang++-${BASH_REMATCH[1]}"
+ CC="clang-${BASH_REMATCH[1]}"
+ elif [[ "$phase" = *"CLANG"* ]]; then
+ ENV_VARS="-e CC=clang -e CXX=clang++"
+ CC="clang"
+ elif [[ "$phase" =~ "RUN_GCC(\d+)(_ASAN)?" ]]; then
+ ENV_VARS="-e CC=gcc-${BASH_REMATCH[1]} -e CXX=g++-${BASH_REMATCH[1]}"
+ CC="gcc-${BASH_REMATCH[1]}"
+ fi
+ if [[ "$phase" = *"ASAN"* ]]; then
+ EXTRA_CFLAGS="${EXTRA_CFLAGS} -fsanitize=address,undefined"
+ EXTRA_LDFLAGS="${EXTRA_LDFLAGS} -fsanitize=address,undefined"
+ fi
+ if [[ "$CC" != "cc" ]]; then
+ docker_exec aptitude -y install "$CC"
+ else
+ docker_exec aptitude -y install gcc
+ fi
+ docker_exec mkdir build install
+ docker_exec ${CC} --version
+ info "build"
+ docker_exec make -j$((4*$(nproc))) EXTRA_CFLAGS="${EXTRA_CFLAGS}" EXTRA_LDFLAGS="${EXTRA_LDFLAGS}" -C ./src -B OBJDIR=../build
+ info "ldd build/libbpf.so:"
+ docker_exec ldd build/libbpf.so
+ if ! docker_exec ldd build/libbpf.so | grep -q libelf; then
+ error "No reference to libelf.so in libbpf.so!"
+ exit 1
+ fi
+ info "install"
+ docker_exec make -j$((4*$(nproc))) -C src OBJDIR=../build DESTDIR=../install install
+ info "link binary"
+ docker_exec bash -c "EXTRA_CFLAGS=\"${EXTRA_CFLAGS}\" EXTRA_LDFLAGS=\"${EXTRA_LDFLAGS}\" ./ci/managers/test_compile.sh"
+ ;;
+ CLEANUP)
+ info "Cleanup phase"
+ docker stop $CONT_NAME
+ docker rm -f $CONT_NAME
+ ;;
+ *)
+ echo >&2 "Unknown phase '$phase'"
+ exit 1
+ esac
+done
diff --git a/ci/managers/test_compile.sh b/ci/managers/test_compile.sh
new file mode 100755
index 0000000..094ba3e
--- /dev/null
+++ b/ci/managers/test_compile.sh
@@ -0,0 +1,15 @@
+#!/bin/bash
+set -euox pipefail
+
+EXTRA_CFLAGS=${EXTRA_CFLAGS:-}
+EXTRA_LDFLAGS=${EXTRA_LDFLAGS:-}
+
+cat << EOF > main.c
+#include <bpf/libbpf.h>
+int main() {
+ return bpf_object__open(0) < 0;
+}
+EOF
+
+# static linking
+${CC:-cc} ${EXTRA_CFLAGS} ${EXTRA_LDFLAGS} -o main -I./include/uapi -I./install/usr/include main.c ./build/libbpf.a -lelf -lz
diff --git a/ci/managers/travis_wait.bash b/ci/managers/travis_wait.bash
new file mode 100644
index 0000000..acf6ad1
--- /dev/null
+++ b/ci/managers/travis_wait.bash
@@ -0,0 +1,61 @@
+# This was borrowed from https://github.com/travis-ci/travis-build/tree/master/lib/travis/build/bash
+# to get around https://github.com/travis-ci/travis-ci/issues/9979. It should probably be removed
+# as soon as Travis CI has started to provide an easy way to export the functions to bash scripts.
+
+travis_jigger() {
+ local cmd_pid="${1}"
+ shift
+ local timeout="${1}"
+ shift
+ local count=0
+
+ echo -e "\\n"
+
+ while [[ "${count}" -lt "${timeout}" ]]; do
+ count="$((count + 1))"
+ echo -ne "Still running (${count} of ${timeout}): ${*}\\r"
+ sleep 60
+ done
+
+ echo -e "\\n${ANSI_RED}Timeout (${timeout} minutes) reached. Terminating \"${*}\"${ANSI_RESET}\\n"
+ kill -9 "${cmd_pid}"
+}
+
+travis_wait() {
+ local timeout="${1}"
+
+ if [[ "${timeout}" =~ ^[0-9]+$ ]]; then
+ shift
+ else
+ timeout=20
+ fi
+
+ local cmd=("${@}")
+ local log_file="travis_wait_${$}.log"
+
+ "${cmd[@]}" &>"${log_file}" &
+ local cmd_pid="${!}"
+
+ travis_jigger "${!}" "${timeout}" "${cmd[@]}" &
+ local jigger_pid="${!}"
+ local result
+
+ {
+ set +e
+ wait "${cmd_pid}" 2>/dev/null
+ result="${?}"
+ ps -p"${jigger_pid}" &>/dev/null && kill "${jigger_pid}"
+ set -e
+ }
+
+ if [[ "${result}" -eq 0 ]]; then
+ echo -e "\\n${ANSI_GREEN}The command ${cmd[*]} exited with ${result}.${ANSI_RESET}"
+ else
+ echo -e "\\n${ANSI_RED}The command ${cmd[*]} exited with ${result}.${ANSI_RESET}"
+ fi
+
+ echo -e "\\n${ANSI_GREEN}Log:${ANSI_RESET}\\n"
+ cat "${log_file}"
+
+ return "${result}"
+}
diff --git a/ci/managers/ubuntu.sh b/ci/managers/ubuntu.sh
new file mode 100755
index 0000000..7fe1b3f
--- /dev/null
+++ b/ci/managers/ubuntu.sh
@@ -0,0 +1,24 @@
+#!/bin/bash
+set -eux
+
+RELEASE="focal"
+
+apt-get update
+apt-get install -y pkg-config
+
+source "$(dirname $0)/travis_wait.bash"
+
+cd $REPO_ROOT
+
+EXTRA_CFLAGS="-Werror -Wall -fsanitize=address,undefined"
+EXTRA_LDFLAGS="-Werror -Wall -fsanitize=address,undefined"
+mkdir build install
+cc --version
+make -j$((4*$(nproc))) EXTRA_CFLAGS="${EXTRA_CFLAGS}" EXTRA_LDFLAGS="${EXTRA_LDFLAGS}" -C ./src -B OBJDIR=../build
+ldd build/libbpf.so
+if ! ldd build/libbpf.so | grep -q libelf; then
+ echo "FAIL: No reference to libelf.so in libbpf.so!"
+ exit 1
+fi
+make -j$((4*$(nproc))) -C src OBJDIR=../build DESTDIR=../install install
+EXTRA_CFLAGS=${EXTRA_CFLAGS} EXTRA_LDFLAGS=${EXTRA_LDFLAGS} $(dirname $0)/test_compile.sh
diff --git a/ci/vmtest/configs/ALLOWLIST-4.9.0 b/ci/vmtest/configs/ALLOWLIST-4.9.0
new file mode 100644
index 0000000..ee0d3db
--- /dev/null
+++ b/ci/vmtest/configs/ALLOWLIST-4.9.0
@@ -0,0 +1,8 @@
+# btf_dump -- need to disable data dump sub-tests
+core_retro
+cpu_mask
+hashmap
+legacy_printk
+perf_buffer
+section_names
+
diff --git a/ci/vmtest/configs/ALLOWLIST-5.5.0 b/ci/vmtest/configs/ALLOWLIST-5.5.0
new file mode 100644
index 0000000..87f72f9
--- /dev/null
+++ b/ci/vmtest/configs/ALLOWLIST-5.5.0
@@ -0,0 +1,55 @@
+# attach_probe
+autoload
+bpf_verif_scale
+cgroup_attach_autodetach
+cgroup_attach_override
+core_autosize
+core_extern
+core_read_macros
+core_reloc
+core_retro
+cpu_mask
+endian
+get_branch_snapshot
+get_stackid_cannot_attach
+global_data
+global_data_init
+global_func_args
+hashmap
+l4lb_all
+legacy_printk
+linked_funcs
+linked_maps
+map_lock
+obj_name
+perf_buffer
+perf_event_stackmap
+pinning
+pkt_md_access
+probe_user
+queue_stack_map
+raw_tp_writable_reject_nbd_invalid
+raw_tp_writable_test_run
+rdonly_maps
+section_names
+signal_pending
+skeleton
+sockmap_ktls
+sockopt
+sockopt_inherit
+sockopt_multi
+spinlock
+stacktrace_map
+stacktrace_map_raw_tp
+static_linked
+task_fd_query_rawtp
+task_fd_query_tp
+tc_bpf
+tcp_estats
+tcp_rtt
+tp_attach_query
+usdt/urand_pid_attach
+xdp
+xdp_info
+xdp_noinline
+xdp_perf
diff --git a/ci/vmtest/configs/DENYLIST-5.5.0 b/ci/vmtest/configs/DENYLIST-5.5.0
new file mode 100644
index 0000000..d732bed
--- /dev/null
+++ b/ci/vmtest/configs/DENYLIST-5.5.0
@@ -0,0 +1,118 @@
+# This file is not used and is there for historic purposes only.
+# See ALLOWLIST-5.5.0 instead.
+
+# PERMANENTLY DISABLED
+align # verifier output format changed
+atomics # new atomic operations (v5.12+)
+atomic_bounds # new atomic operations (v5.12+)
+bind_perm # changed semantics of return values (v5.12+)
+bpf_cookie # 5.15+
+bpf_iter # bpf_iter support is missing
+bpf_obj_id # bpf_link support missing for GET_OBJ_INFO, GET_FD_BY_ID, etc
+bpf_tcp_ca # STRUCT_OPS is missing
+btf_map_in_map # inner map leak fixed in 5.8
+btf_skc_cls_ingress # v5.10+ functionality
+cg_storage_multi # v5.9+ functionality
+cgroup_attach_multi # BPF_F_REPLACE_PROG missing
+cgroup_link # LINK_CREATE is missing
+cgroup_skb_sk_lookup # bpf_sk_lookup_tcp() helper is missing
+check_mtu # missing BPF helper (v5.12+)
+cls_redirect # bpf_csum_level() helper is missing
+connect_force_port # cgroup/get{peer,sock}name{4,6} support is missing
+d_path # v5.10+ feature
+enable_stats # BPF_ENABLE_STATS support is missing
+fentry_fexit # bpf_prog_test_tracing missing
+fentry_test # bpf_prog_test_tracing missing
+fexit_bpf2bpf # freplace is missing
+fexit_sleep # relies on bpf_trampoline fix in 5.12+
+fexit_test # bpf_prog_test_tracing missing
+flow_dissector # bpf_link-based flow dissector is in 5.8+
+flow_dissector_reattach
+for_each # v5.12+
+get_func_ip_test # v5.15+
+get_stack_raw_tp # exercising BPF verifier bug causing infinite loop
+hash_large_key # v5.11+
+ima # v5.11+
+kfree_skb # 32-bit pointer arith in test_pkt_access
+ksyms # __start_BTF has different name
+kfunc_call # v5.13+
+link_pinning # bpf_link is missing
+linked_vars # v5.13+
+load_bytes_relative # new functionality in 5.8
+lookup_and_delete # v5.14+
+map_init # per-CPU LRU missing
+map_ptr # test uses BPF_MAP_TYPE_RINGBUF, added in 5.8
+metadata # v5.10+
+migrate_reuseport # v5.14+
+mmap # 5.5 kernel is too permissive with re-mmaping
+modify_return # fmod_ret support is missing
+module_attach # module BTF support missing (v5.11+)
+netcnt
+netns_cookie # v5.15+
+ns_current_pid_tgid # bpf_get_ns_current_pid_tgid() helper is missing
+pe_preserve_elems # v5.10+
+perf_branches # bpf_read_branch_records() helper is missing
+perf_link # v5.15+
+pkt_access # 32-bit pointer arith in test_pkt_access
+probe_read_user_str # kernel bug with garbage bytes at the end
+prog_run_xattr # 32-bit pointer arith in test_pkt_access
+raw_tp_test_run # v5.10+
+recursion # v5.12+
+ringbuf # BPF_MAP_TYPE_RINGBUF is supported in 5.8+
+
+# bug in verifier w/ tracking references
+#reference_tracking/classifier/sk_lookup_success
+reference_tracking
+
+select_reuseport # UDP support is missing
+send_signal # bpf_send_signal_thread() helper is missing
+sk_assign # bpf_sk_assign helper missing
+sk_lookup # v5.9+
+sk_storage_tracing # missing bpf_sk_storage_get() helper
+skb_ctx # ctx_{size, }_{in, out} in BPF_PROG_TEST_RUN is missing
+skb_helpers # helpers added in 5.8+
+skeleton # creates too big ARRAY map
+snprintf # v5.13+
+snprintf_btf # v5.10+
+sock_fields # v5.10+
+socket_cookie # v5.12+
+sockmap_basic # uses new socket fields, 5.8+
+sockmap_listen # no listen socket supportin SOCKMAP
+sockopt_sk
+sockopt_qos_to_cc # v5.15+
+stacktrace_build_id # v5.9+
+stack_var_off # v5.12+
+syscall # v5.14+
+task_local_storage # v5.12+
+task_pt_regs # v5.15+
+tcp_hdr_options # v5.10+, new TCP header options feature in BPF
+tcpbpf_user # LINK_CREATE is missing
+tc_redirect # v5.14+
+test_bpffs # v5.10+, new CONFIG_BPF_PRELOAD=y and CONFIG_BPF_PRELOAD_UMG=y|m
+test_bprm_opts # v5.11+
+test_global_funcs # kernel doesn't support BTF linkage=global on FUNCs
+test_local_storage # v5.10+ feature
+test_lsm # no BPF_LSM support
+test_overhead # no fmod_ret support
+test_profiler # needs verifier logic improvements from v5.10+
+test_skb_pkt_end # v5.11+
+timer # v5.15+
+timer_mim # v5.15+
+trace_ext # v5.10+
+trace_printk # v5.14+
+trampoline_count # v5.12+ have lower allowed limits
+udp_limit # no cgroup/sock_release BPF program type (5.9+)
+varlen # verifier bug fixed in later kernels
+vmlinux # hrtimer_nanosleep() signature changed incompatibly
+xdp_adjust_tail # new XDP functionality added in 5.8
+xdp_attach # IFLA_XDP_EXPECTED_FD support is missing
+xdp_bonding # v5.15+
+xdp_bpf2bpf # freplace is missing
+xdp_context_test_run # v5.15+
+xdp_cpumap_attach # v5.9+
+xdp_devmap_attach # new feature in 5.8
+xdp_link # v5.9+
+
+# SUBTESTS FAILING (block entire test until blocking subtests works properly)
+btf # "size check test", "func (Non zero vlen)"
+tailcalls # tailcall_bpf2bpf_1, tailcall_bpf2bpf_2, tailcall_bpf2bpf_3
diff --git a/ci/vmtest/configs/DENYLIST-latest b/ci/vmtest/configs/DENYLIST-latest
new file mode 100644
index 0000000..e69de29
--- /dev/null
+++ b/ci/vmtest/configs/DENYLIST-latest
diff --git a/ci/vmtest/configs/DENYLIST-latest.s390x b/ci/vmtest/configs/DENYLIST-latest.s390x
new file mode 100644
index 0000000..3684f49
--- /dev/null
+++ b/ci/vmtest/configs/DENYLIST-latest.s390x
@@ -0,0 +1,3 @@
+# TEMPORARY
+usdt/basic # failing verifier due to bounds check after LLVM update
+usdt/multispec # same as above
diff --git a/ci/vmtest/helpers.sh b/ci/vmtest/helpers.sh
new file mode 100755
index 0000000..c44d098
--- /dev/null
+++ b/ci/vmtest/helpers.sh
@@ -0,0 +1,38 @@
+# shellcheck shell=bash
+
+# $1 - start or end
+# $2 - fold identifier, no spaces
+# $3 - fold section description
+foldable() {
+ local YELLOW='\033[1;33m'
+ local NOCOLOR='\033[0m'
+ if [ $1 = "start" ]; then
+ line="::group::$2"
+ if [ ! -z "${3:-}" ]; then
+ line="$line - ${YELLOW}$3${NOCOLOR}"
+ fi
+ else
+ line="::endgroup::"
+ fi
+ echo -e "$line"
+}
+
+__print() {
+ local TITLE=""
+ if [[ -n $2 ]]; then
+ TITLE=" title=$2"
+ fi
+ echo "::$1${TITLE}::$3"
+}
+
+# $1 - title
+# $2 - message
+print_error() {
+ __print error $1 $2
+}
+
+# $1 - title
+# $2 - message
+print_notice() {
+ __print notice $1 $2
+}
diff --git a/ci/vmtest/run_selftests.sh b/ci/vmtest/run_selftests.sh
new file mode 100755
index 0000000..1dcde76
--- /dev/null
+++ b/ci/vmtest/run_selftests.sh
@@ -0,0 +1,87 @@
+#!/bin/bash
+
+set -euo pipefail
+
+source $(cd $(dirname $0) && pwd)/helpers.sh
+
+ARCH=$(uname -m)
+
+STATUS_FILE=/exitstatus
+
+read_lists() {
+ (for path in "$@"; do
+ if [[ -s "$path" ]]; then
+ cat "$path"
+ fi;
+ done) | cut -d'#' -f1 | tr -s ' \t\n' ','
+}
+
+test_progs() {
+ if [[ "${KERNEL}" != '4.9.0' ]]; then
+ foldable start test_progs "Testing test_progs"
+ # "&& true" does not change the return code (it is not executed
+ # if the Python script fails), but it prevents exiting on a
+ # failure due to the "set -e".
+ ./test_progs ${DENYLIST:+-d$DENYLIST} ${ALLOWLIST:+-a$ALLOWLIST} && true
+ echo "test_progs:$?" >> "${STATUS_FILE}"
+ foldable end test_progs
+ fi
+}
+
+test_progs_no_alu32() {
+ foldable start test_progs-no_alu32 "Testing test_progs-no_alu32"
+ ./test_progs-no_alu32 ${DENYLIST:+-d$DENYLIST} ${ALLOWLIST:+-a$ALLOWLIST} && true
+ echo "test_progs-no_alu32:$?" >> "${STATUS_FILE}"
+ foldable end test_progs-no_alu32
+}
+
+test_maps() {
+ if [[ "${KERNEL}" == 'latest' ]]; then
+ foldable start test_maps "Testing test_maps"
+ ./test_maps && true
+ echo "test_maps:$?" >> "${STATUS_FILE}"
+ foldable end test_maps
+ fi
+}
+
+test_verifier() {
+ if [[ "${KERNEL}" == 'latest' ]]; then
+ foldable start test_verifier "Testing test_verifier"
+ ./test_verifier && true
+ echo "test_verifier:$?" >> "${STATUS_FILE}"
+ foldable end test_verifier
+ fi
+}
+
+foldable end vm_init
+
+configs_path=/${PROJECT_NAME}/selftests/bpf
+local_configs_path=${PROJECT_NAME}/vmtest/configs
+DENYLIST=$(read_lists \
+ "$configs_path/DENYLIST" \
+ "$configs_path/DENYLIST.${ARCH}" \
+ "$local_configs_path/DENYLIST-${KERNEL}" \
+ "$local_configs_path/DENYLIST-${KERNEL}.${ARCH}" \
+)
+ALLOWLIST=$(read_lists \
+ "$configs_path/ALLOWLIST" \
+ "$configs_path/ALLOWLIST.${ARCH}" \
+ "$local_configs_path/ALLOWLIST-${KERNEL}" \
+ "$local_configs_path/ALLOWLIST-${KERNEL}.${ARCH}" \
+)
+
+echo "DENYLIST: ${DENYLIST}"
+echo "ALLOWLIST: ${ALLOWLIST}"
+
+cd ${PROJECT_NAME}/selftests/bpf
+
+if [ $# -eq 0 ]; then
+ test_progs
+ test_progs_no_alu32
+ # test_maps
+ test_verifier
+else
+ for test_name in "$@"; do
+ "${test_name}"
+ done
+fi
diff --git a/docs/.gitignore b/docs/.gitignore
new file mode 100644
index 0000000..dd08fae
--- /dev/null
+++ b/docs/.gitignore
@@ -0,0 +1,2 @@
+sphinx/build
+sphinx/doxygen/build \ No newline at end of file
diff --git a/docs/api.rst b/docs/api.rst
new file mode 100644
index 0000000..7a8e709
--- /dev/null
+++ b/docs/api.rst
@@ -0,0 +1,93 @@
+.. SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+
+.. _api:
+
+.. toctree:: Table of Contents
+
+
+LIBBPF API
+==========
+
+Error Handling
+--------------
+
+When libbpf is used in "libbpf 1.0 mode", API functions can return errors in one of two ways.
+
+You can set "libbpf 1.0" mode with the following line:
+
+.. code-block::
+
+ libbpf_set_strict_mode(LIBBPF_STRICT_DIRECT_ERRS | LIBBPF_STRICT_CLEAN_PTRS);
+
+If the function returns an error code directly, it uses 0 to indicate success
+and a negative error code to indicate what caused the error. In this case the
+error code should be checked directly from the return, you do not need to check
+errno.
+
+For example:
+
+.. code-block::
+
+ err = some_libbpf_api_with_error_return(...);
+ if (err < 0) {
+ /* Handle error accordingly */
+ }
+
+If the function returns a pointer, it will return NULL to indicate there was
+an error. In this case errno should be checked for the error code.
+
+For example:
+
+.. code-block::
+
+ ptr = some_libbpf_api_returning_ptr();
+ if (!ptr) {
+ /* note no minus sign for EINVAL and E2BIG below */
+ if (errno == EINVAL) {
+ /* handle EINVAL error */
+ } else if (errno == E2BIG) {
+ /* handle E2BIG error */
+ }
+ }
+
+libbpf.h
+--------
+.. doxygenfile:: libbpf.h
+ :project: libbpf
+ :sections: func define public-type enum
+
+bpf.h
+-----
+.. doxygenfile:: bpf.h
+ :project: libbpf
+ :sections: func define public-type enum
+
+btf.h
+-----
+.. doxygenfile:: btf.h
+ :project: libbpf
+ :sections: func define public-type enum
+
+xsk.h
+-----
+.. doxygenfile:: xsk.h
+ :project: libbpf
+ :sections: func define public-type enum
+
+bpf_tracing.h
+-------------
+.. doxygenfile:: bpf_tracing.h
+ :project: libbpf
+ :sections: func define public-type enum
+
+bpf_core_read.h
+---------------
+.. doxygenfile:: bpf_core_read.h
+ :project: libbpf
+ :sections: func define public-type enum
+
+bpf_endian.h
+------------
+.. doxygenfile:: bpf_endian.h
+ :project: libbpf
+ :sections: func define public-type enum
diff --git a/docs/conf.py b/docs/conf.py
new file mode 100644
index 0000000..1d8714e
--- /dev/null
+++ b/docs/conf.py
@@ -0,0 +1,40 @@
+#!/usr/bin/env python3
+# SPDX-License-Identifier: GPL-2.0
+# Configuration file for the Sphinx documentation builder.
+#
+# This file only contains a selection of the most common options. For a full
+# list see the documentation:
+# https://www.sphinx-doc.org/en/master/usage/configuration.html
+
+import os
+import subprocess
+
+project = "libbpf"
+
+extensions = [
+ 'sphinx.ext.autodoc',
+ 'sphinx.ext.doctest',
+ 'sphinx.ext.mathjax',
+ 'sphinx.ext.viewcode',
+ 'sphinx.ext.imgmath',
+ 'sphinx.ext.todo',
+ 'breathe',
+]
+
+# List of patterns, relative to source directory, that match files and
+# directories to ignore when looking for source files.
+# This pattern also affects html_static_path and html_extra_path.
+exclude_patterns = []
+
+read_the_docs_build = os.environ.get('READTHEDOCS', None) == 'True'
+
+if read_the_docs_build:
+ subprocess.call('cd sphinx ; make clean', shell=True)
+ subprocess.call('cd sphinx/doxygen ; doxygen', shell=True)
+
+html_theme = 'sphinx_rtd_theme'
+
+breathe_projects = { "libbpf": "./sphinx/doxygen/build/xml/" }
+breathe_default_project = "libbpf"
+breathe_show_define_initializer = True
+breathe_show_enumvalue_initializer = True
diff --git a/docs/index.rst b/docs/index.rst
new file mode 100644
index 0000000..f9b3b25
--- /dev/null
+++ b/docs/index.rst
@@ -0,0 +1,24 @@
+.. SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+
+.. _libbpf:
+
+libbpf
+======
+
+.. toctree::
+ :maxdepth: 1
+
+ API Documentation <https://libbpf.readthedocs.io/en/latest/api.html>
+ program_types
+ libbpf_naming_convention
+ libbpf_build
+
+This is documentation for libbpf, a userspace library for loading and
+interacting with bpf programs.
+
+All general BPF questions, including kernel functionality, libbpf APIs and
+their application, should be sent to bpf@vger.kernel.org mailing list.
+You can `subscribe <http://vger.kernel.org/vger-lists.html#bpf>`_ to the
+mailing list search its `archive <https://lore.kernel.org/bpf/>`_.
+Please search the archive before asking new questions. It very well might
+be that this was already addressed or answered before.
diff --git a/docs/libbpf_build.rst b/docs/libbpf_build.rst
new file mode 100644
index 0000000..8e8c23e
--- /dev/null
+++ b/docs/libbpf_build.rst
@@ -0,0 +1,37 @@
+.. SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+
+Building libbpf
+===============
+
+libelf and zlib are internal dependencies of libbpf and thus are required to link
+against and must be installed on the system for applications to work.
+pkg-config is used by default to find libelf, and the program called
+can be overridden with PKG_CONFIG.
+
+If using pkg-config at build time is not desired, it can be disabled by
+setting NO_PKG_CONFIG=1 when calling make.
+
+To build both static libbpf.a and shared libbpf.so:
+
+.. code-block:: bash
+
+ $ cd src
+ $ make
+
+To build only static libbpf.a library in directory build/ and install them
+together with libbpf headers in a staging directory root/:
+
+.. code-block:: bash
+
+ $ cd src
+ $ mkdir build root
+ $ BUILD_STATIC_ONLY=y OBJDIR=build DESTDIR=root make install
+
+To build both static libbpf.a and shared libbpf.so against a custom libelf
+dependency installed in /build/root/ and install them together with libbpf
+headers in a build directory /build/root/:
+
+.. code-block:: bash
+
+ $ cd src
+ $ PKG_CONFIG_PATH=/build/root/lib64/pkgconfig DESTDIR=/build/root make \ No newline at end of file
diff --git a/docs/libbpf_naming_convention.rst b/docs/libbpf_naming_convention.rst
new file mode 100644
index 0000000..c5ac97f
--- /dev/null
+++ b/docs/libbpf_naming_convention.rst
@@ -0,0 +1,193 @@
+.. SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+
+API naming convention
+=====================
+
+libbpf API provides access to a few logically separated groups of
+functions and types. Every group has its own naming convention
+described here. It's recommended to follow these conventions whenever a
+new function or type is added to keep libbpf API clean and consistent.
+
+All types and functions provided by libbpf API should have one of the
+following prefixes: ``bpf_``, ``btf_``, ``libbpf_``, ``btf_dump_``,
+``ring_buffer_``, ``perf_buffer_``.
+
+System call wrappers
+--------------------
+
+System call wrappers are simple wrappers for commands supported by
+sys_bpf system call. These wrappers should go to ``bpf.h`` header file
+and map one to one to corresponding commands.
+
+For example ``bpf_map_lookup_elem`` wraps ``BPF_MAP_LOOKUP_ELEM``
+command of sys_bpf, ``bpf_prog_attach`` wraps ``BPF_PROG_ATTACH``, etc.
+
+Objects
+-------
+
+Another class of types and functions provided by libbpf API is "objects"
+and functions to work with them. Objects are high-level abstractions
+such as BPF program or BPF map. They're represented by corresponding
+structures such as ``struct bpf_object``, ``struct bpf_program``,
+``struct bpf_map``, etc.
+
+Structures are forward declared and access to their fields should be
+provided via corresponding getters and setters rather than directly.
+
+These objects are associated with corresponding parts of ELF object that
+contains compiled BPF programs.
+
+For example ``struct bpf_object`` represents ELF object itself created
+from an ELF file or from a buffer, ``struct bpf_program`` represents a
+program in ELF object and ``struct bpf_map`` is a map.
+
+Functions that work with an object have names built from object name,
+double underscore and part that describes function purpose.
+
+For example ``bpf_object__open`` consists of the name of corresponding
+object, ``bpf_object``, double underscore and ``open`` that defines the
+purpose of the function to open ELF file and create ``bpf_object`` from
+it.
+
+All objects and corresponding functions other than BTF related should go
+to ``libbpf.h``. BTF types and functions should go to ``btf.h``.
+
+Auxiliary functions
+-------------------
+
+Auxiliary functions and types that don't fit well in any of categories
+described above should have ``libbpf_`` prefix, e.g.
+``libbpf_get_error`` or ``libbpf_prog_type_by_name``.
+
+ABI
+---
+
+libbpf can be both linked statically or used as DSO. To avoid possible
+conflicts with other libraries an application is linked with, all
+non-static libbpf symbols should have one of the prefixes mentioned in
+API documentation above. See API naming convention to choose the right
+name for a new symbol.
+
+Symbol visibility
+-----------------
+
+libbpf follow the model when all global symbols have visibility "hidden"
+by default and to make a symbol visible it has to be explicitly
+attributed with ``LIBBPF_API`` macro. For example:
+
+.. code-block:: c
+
+ LIBBPF_API int bpf_prog_get_fd_by_id(__u32 id);
+
+This prevents from accidentally exporting a symbol, that is not supposed
+to be a part of ABI what, in turn, improves both libbpf developer- and
+user-experiences.
+
+ABI versionning
+---------------
+
+To make future ABI extensions possible libbpf ABI is versioned.
+Versioning is implemented by ``libbpf.map`` version script that is
+passed to linker.
+
+Version name is ``LIBBPF_`` prefix + three-component numeric version,
+starting from ``0.0.1``.
+
+Every time ABI is being changed, e.g. because a new symbol is added or
+semantic of existing symbol is changed, ABI version should be bumped.
+This bump in ABI version is at most once per kernel development cycle.
+
+For example, if current state of ``libbpf.map`` is:
+
+.. code-block:: none
+
+ LIBBPF_0.0.1 {
+ global:
+ bpf_func_a;
+ bpf_func_b;
+ local:
+ \*;
+ };
+
+, and a new symbol ``bpf_func_c`` is being introduced, then
+``libbpf.map`` should be changed like this:
+
+.. code-block:: none
+
+ LIBBPF_0.0.1 {
+ global:
+ bpf_func_a;
+ bpf_func_b;
+ local:
+ \*;
+ };
+ LIBBPF_0.0.2 {
+ global:
+ bpf_func_c;
+ } LIBBPF_0.0.1;
+
+, where new version ``LIBBPF_0.0.2`` depends on the previous
+``LIBBPF_0.0.1``.
+
+Format of version script and ways to handle ABI changes, including
+incompatible ones, described in details in [1].
+
+Stand-alone build
+-------------------
+
+Under https://github.com/libbpf/libbpf there is a (semi-)automated
+mirror of the mainline's version of libbpf for a stand-alone build.
+
+However, all changes to libbpf's code base must be upstreamed through
+the mainline kernel tree.
+
+
+API documentation convention
+============================
+
+The libbpf API is documented via comments above definitions in
+header files. These comments can be rendered by doxygen and sphinx
+for well organized html output. This section describes the
+convention in which these comments should be formated.
+
+Here is an example from btf.h:
+
+.. code-block:: c
+
+ /**
+ * @brief **btf__new()** creates a new instance of a BTF object from the raw
+ * bytes of an ELF's BTF section
+ * @param data raw bytes
+ * @param size number of bytes passed in `data`
+ * @return new BTF object instance which has to be eventually freed with
+ * **btf__free()**
+ *
+ * On error, error-code-encoded-as-pointer is returned, not a NULL. To extract
+ * error code from such a pointer `libbpf_get_error()` should be used. If
+ * `libbpf_set_strict_mode(LIBBPF_STRICT_CLEAN_PTRS)` is enabled, NULL is
+ * returned on error instead. In both cases thread-local `errno` variable is
+ * always set to error code as well.
+ */
+
+The comment must start with a block comment of the form '/\*\*'.
+
+The documentation always starts with a @brief directive. This line is a short
+description about this API. It starts with the name of the API, denoted in bold
+like so: **api_name**. Please include an open and close parenthesis if this is a
+function. Follow with the short description of the API. A longer form description
+can be added below the last directive, at the bottom of the comment.
+
+Parameters are denoted with the @param directive, there should be one for each
+parameter. If this is a function with a non-void return, use the @return directive
+to document it.
+
+License
+-------------------
+
+libbpf is dual-licensed under LGPL 2.1 and BSD 2-Clause.
+
+Links
+-------------------
+
+[1] https://www.akkadia.org/drepper/dsohowto.pdf
+ (Chapter 3. Maintaining APIs and ABIs).
diff --git a/docs/program_types.rst b/docs/program_types.rst
new file mode 100644
index 0000000..ad4d4d5
--- /dev/null
+++ b/docs/program_types.rst
@@ -0,0 +1,203 @@
+.. SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+
+.. _program_types_and_elf:
+
+Program Types and ELF Sections
+==============================
+
+The table below lists the program types, their attach types where relevant and the ELF section
+names supported by libbpf for them. The ELF section names follow these rules:
+
+- ``type`` is an exact match, e.g. ``SEC("socket")``
+- ``type+`` means it can be either exact ``SEC("type")`` or well-formed ``SEC("type/extras")``
+ with a '``/``' separator between ``type`` and ``extras``.
+
+When ``extras`` are specified, they provide details of how to auto-attach the BPF program. The
+format of ``extras`` depends on the program type, e.g. ``SEC("tracepoint/<category>/<name>")``
+for tracepoints or ``SEC("usdt/<path>:<provider>:<name>")`` for USDT probes. The extras are
+described in more detail in the footnotes.
+
+
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| Program Type | Attach Type | ELF Section Name | Sleepable |
++===========================================+========================================+==================================+===========+
+| ``BPF_PROG_TYPE_CGROUP_DEVICE`` | ``BPF_CGROUP_DEVICE`` | ``cgroup/dev`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_CGROUP_SKB`` | | ``cgroup/skb`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_INET_EGRESS`` | ``cgroup_skb/egress`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_INET_INGRESS`` | ``cgroup_skb/ingress`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_CGROUP_SOCKOPT`` | ``BPF_CGROUP_GETSOCKOPT`` | ``cgroup/getsockopt`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_SETSOCKOPT`` | ``cgroup/setsockopt`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_CGROUP_SOCK_ADDR`` | ``BPF_CGROUP_INET4_BIND`` | ``cgroup/bind4`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_INET4_CONNECT`` | ``cgroup/connect4`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_INET4_GETPEERNAME`` | ``cgroup/getpeername4`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_INET4_GETSOCKNAME`` | ``cgroup/getsockname4`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_INET6_BIND`` | ``cgroup/bind6`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_INET6_CONNECT`` | ``cgroup/connect6`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_INET6_GETPEERNAME`` | ``cgroup/getpeername6`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_INET6_GETSOCKNAME`` | ``cgroup/getsockname6`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_UDP4_RECVMSG`` | ``cgroup/recvmsg4`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_UDP4_SENDMSG`` | ``cgroup/sendmsg4`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_UDP6_RECVMSG`` | ``cgroup/recvmsg6`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_UDP6_SENDMSG`` | ``cgroup/sendmsg6`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_CGROUP_SOCK`` | ``BPF_CGROUP_INET4_POST_BIND`` | ``cgroup/post_bind4`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_INET6_POST_BIND`` | ``cgroup/post_bind6`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_INET_SOCK_CREATE`` | ``cgroup/sock_create`` | |
++ + +----------------------------------+-----------+
+| | | ``cgroup/sock`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_CGROUP_INET_SOCK_RELEASE`` | ``cgroup/sock_release`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_CGROUP_SYSCTL`` | ``BPF_CGROUP_SYSCTL`` | ``cgroup/sysctl`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_EXT`` | | ``freplace+`` [#fentry]_ | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_FLOW_DISSECTOR`` | ``BPF_FLOW_DISSECTOR`` | ``flow_dissector`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_KPROBE`` | | ``kprobe+`` [#kprobe]_ | |
++ + +----------------------------------+-----------+
+| | | ``kretprobe+`` [#kprobe]_ | |
++ + +----------------------------------+-----------+
+| | | ``ksyscall+`` [#ksyscall]_ | |
++ + +----------------------------------+-----------+
+| | | ``kretsyscall+`` [#ksyscall]_ | |
++ + +----------------------------------+-----------+
+| | | ``uprobe+`` [#uprobe]_ | |
++ + +----------------------------------+-----------+
+| | | ``uprobe.s+`` [#uprobe]_ | Yes |
++ + +----------------------------------+-----------+
+| | | ``uretprobe+`` [#uprobe]_ | |
++ + +----------------------------------+-----------+
+| | | ``uretprobe.s+`` [#uprobe]_ | Yes |
++ + +----------------------------------+-----------+
+| | | ``usdt+`` [#usdt]_ | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_TRACE_KPROBE_MULTI`` | ``kprobe.multi+`` [#kpmulti]_ | |
++ + +----------------------------------+-----------+
+| | | ``kretprobe.multi+`` [#kpmulti]_ | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_LIRC_MODE2`` | ``BPF_LIRC_MODE2`` | ``lirc_mode2`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_LSM`` | ``BPF_LSM_CGROUP`` | ``lsm_cgroup+`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_LSM_MAC`` | ``lsm+`` [#lsm]_ | |
++ + +----------------------------------+-----------+
+| | | ``lsm.s+`` [#lsm]_ | Yes |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_LWT_IN`` | | ``lwt_in`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_LWT_OUT`` | | ``lwt_out`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_LWT_SEG6LOCAL`` | | ``lwt_seg6local`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_LWT_XMIT`` | | ``lwt_xmit`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_PERF_EVENT`` | | ``perf_event`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE`` | | ``raw_tp.w+`` [#rawtp]_ | |
++ + +----------------------------------+-----------+
+| | | ``raw_tracepoint.w+`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_RAW_TRACEPOINT`` | | ``raw_tp+`` [#rawtp]_ | |
++ + +----------------------------------+-----------+
+| | | ``raw_tracepoint+`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_SCHED_ACT`` | | ``action`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_SCHED_CLS`` | | ``classifier`` | |
++ + +----------------------------------+-----------+
+| | | ``tc`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_SK_LOOKUP`` | ``BPF_SK_LOOKUP`` | ``sk_lookup`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_SK_MSG`` | ``BPF_SK_MSG_VERDICT`` | ``sk_msg`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_SK_REUSEPORT`` | ``BPF_SK_REUSEPORT_SELECT_OR_MIGRATE`` | ``sk_reuseport/migrate`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_SK_REUSEPORT_SELECT`` | ``sk_reuseport`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_SK_SKB`` | | ``sk_skb`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_SK_SKB_STREAM_PARSER`` | ``sk_skb/stream_parser`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_SK_SKB_STREAM_VERDICT`` | ``sk_skb/stream_verdict`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_SOCKET_FILTER`` | | ``socket`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_SOCK_OPS`` | ``BPF_CGROUP_SOCK_OPS`` | ``sockops`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_STRUCT_OPS`` | | ``struct_ops+`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_SYSCALL`` | | ``syscall`` | Yes |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_TRACEPOINT`` | | ``tp+`` [#tp]_ | |
++ + +----------------------------------+-----------+
+| | | ``tracepoint+`` [#tp]_ | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_TRACING`` | ``BPF_MODIFY_RETURN`` | ``fmod_ret+`` [#fentry]_ | |
++ + +----------------------------------+-----------+
+| | | ``fmod_ret.s+`` [#fentry]_ | Yes |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_TRACE_FENTRY`` | ``fentry+`` [#fentry]_ | |
++ + +----------------------------------+-----------+
+| | | ``fentry.s+`` [#fentry]_ | Yes |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_TRACE_FEXIT`` | ``fexit+`` [#fentry]_ | |
++ + +----------------------------------+-----------+
+| | | ``fexit.s+`` [#fentry]_ | Yes |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_TRACE_ITER`` | ``iter+`` [#iter]_ | |
++ + +----------------------------------+-----------+
+| | | ``iter.s+`` [#iter]_ | Yes |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_TRACE_RAW_TP`` | ``tp_btf+`` [#fentry]_ | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+| ``BPF_PROG_TYPE_XDP`` | ``BPF_XDP_CPUMAP`` | ``xdp.frags/cpumap`` | |
++ + +----------------------------------+-----------+
+| | | ``xdp/cpumap`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_XDP_DEVMAP`` | ``xdp.frags/devmap`` | |
++ + +----------------------------------+-----------+
+| | | ``xdp/devmap`` | |
++ +----------------------------------------+----------------------------------+-----------+
+| | ``BPF_XDP`` | ``xdp.frags`` | |
++ + +----------------------------------+-----------+
+| | | ``xdp`` | |
++-------------------------------------------+----------------------------------------+----------------------------------+-----------+
+
+
+.. rubric:: Footnotes
+
+.. [#fentry] The ``fentry`` attach format is ``fentry[.s]/<function>``.
+.. [#kprobe] The ``kprobe`` attach format is ``kprobe/<function>[+<offset>]``. Valid
+ characters for ``function`` are ``a-zA-Z0-9_.`` and ``offset`` must be a valid
+ non-negative integer.
+.. [#ksyscall] The ``ksyscall`` attach format is ``ksyscall/<syscall>``.
+.. [#uprobe] The ``uprobe`` attach format is ``uprobe[.s]/<path>:<function>[+<offset>]``.
+.. [#usdt] The ``usdt`` attach format is ``usdt/<path>:<provider>:<name>``.
+.. [#kpmulti] The ``kprobe.multi`` attach format is ``kprobe.multi/<pattern>`` where ``pattern``
+ supports ``*`` and ``?`` wildcards. Valid characters for pattern are
+ ``a-zA-Z0-9_.*?``.
+.. [#lsm] The ``lsm`` attachment format is ``lsm[.s]/<hook>``.
+.. [#rawtp] The ``raw_tp`` attach format is ``raw_tracepoint[.w]/<tracepoint>``.
+.. [#tp] The ``tracepoint`` attach format is ``tracepoint/<category>/<name>``.
+.. [#iter] The ``iter`` attach format is ``iter[.s]/<struct-name>``.
diff --git a/docs/sphinx/Makefile b/docs/sphinx/Makefile
new file mode 100644
index 0000000..5dc39c5
--- /dev/null
+++ b/docs/sphinx/Makefile
@@ -0,0 +1,9 @@
+SPHINXBUILD ?= sphinx-build
+SOURCEDIR = ../src
+BUILDDIR = build
+
+help:
+ @$(SPHINXBUILD) -M help "$(SOURCEDIR)" "$(BUILDDIR)"
+
+%:
+ @$(SPHINXBUILD) -M $@ "$(SOURCEDIR)" "$(BUILDDIR)"
diff --git a/docs/sphinx/doxygen/Doxyfile b/docs/sphinx/doxygen/Doxyfile
new file mode 100644
index 0000000..b04c115
--- /dev/null
+++ b/docs/sphinx/doxygen/Doxyfile
@@ -0,0 +1,277 @@
+DOXYFILE_ENCODING = UTF-8
+PROJECT_NAME = "libbpf"
+PROJECT_NUMBER =
+PROJECT_BRIEF =
+PROJECT_LOGO =
+OUTPUT_DIRECTORY = ./build
+CREATE_SUBDIRS = NO
+ALLOW_UNICODE_NAMES = NO
+OUTPUT_LANGUAGE = English
+OUTPUT_TEXT_DIRECTION = None
+BRIEF_MEMBER_DESC = YES
+REPEAT_BRIEF = YES
+ALWAYS_DETAILED_SEC = NO
+INLINE_INHERITED_MEMB = NO
+FULL_PATH_NAMES = YES
+STRIP_FROM_PATH =
+STRIP_FROM_INC_PATH =
+SHORT_NAMES = NO
+JAVADOC_AUTOBRIEF = NO
+JAVADOC_BANNER = NO
+QT_AUTOBRIEF = NO
+MULTILINE_CPP_IS_BRIEF = NO
+PYTHON_DOCSTRING = NO
+INHERIT_DOCS = YES
+SEPARATE_MEMBER_PAGES = NO
+TAB_SIZE = 4
+ALIASES =
+OPTIMIZE_OUTPUT_FOR_C = YES
+OPTIMIZE_OUTPUT_JAVA = NO
+OPTIMIZE_FOR_FORTRAN = NO
+OPTIMIZE_OUTPUT_VHDL = NO
+OPTIMIZE_OUTPUT_SLICE = NO
+EXTENSION_MAPPING =
+MARKDOWN_SUPPORT = YES
+TOC_INCLUDE_HEADINGS = 5
+AUTOLINK_SUPPORT = YES
+BUILTIN_STL_SUPPORT = NO
+CPP_CLI_SUPPORT = NO
+SIP_SUPPORT = NO
+IDL_PROPERTY_SUPPORT = YES
+DISTRIBUTE_GROUP_DOC = NO
+GROUP_NESTED_COMPOUNDS = NO
+SUBGROUPING = YES
+INLINE_GROUPED_CLASSES = NO
+INLINE_SIMPLE_STRUCTS = NO
+TYPEDEF_HIDES_STRUCT = NO
+LOOKUP_CACHE_SIZE = 0
+NUM_PROC_THREADS = 1
+EXTRACT_ALL = NO
+EXTRACT_PRIVATE = NO
+EXTRACT_PRIV_VIRTUAL = NO
+EXTRACT_PACKAGE = NO
+EXTRACT_STATIC = NO
+EXTRACT_LOCAL_CLASSES = YES
+EXTRACT_LOCAL_METHODS = NO
+EXTRACT_ANON_NSPACES = NO
+RESOLVE_UNNAMED_PARAMS = YES
+HIDE_UNDOC_MEMBERS = NO
+HIDE_UNDOC_CLASSES = NO
+HIDE_FRIEND_COMPOUNDS = NO
+HIDE_IN_BODY_DOCS = NO
+INTERNAL_DOCS = NO
+CASE_SENSE_NAMES = YES
+HIDE_SCOPE_NAMES = NO
+HIDE_COMPOUND_REFERENCE= NO
+SHOW_INCLUDE_FILES = YES
+SHOW_GROUPED_MEMB_INC = NO
+FORCE_LOCAL_INCLUDES = NO
+INLINE_INFO = YES
+SORT_MEMBER_DOCS = YES
+SORT_BRIEF_DOCS = NO
+SORT_MEMBERS_CTORS_1ST = NO
+SORT_GROUP_NAMES = NO
+SORT_BY_SCOPE_NAME = NO
+STRICT_PROTO_MATCHING = NO
+GENERATE_TODOLIST = YES
+GENERATE_TESTLIST = YES
+GENERATE_BUGLIST = YES
+GENERATE_DEPRECATEDLIST= YES
+ENABLED_SECTIONS =
+MAX_INITIALIZER_LINES = 30
+SHOW_USED_FILES = YES
+SHOW_FILES = YES
+SHOW_NAMESPACES = YES
+FILE_VERSION_FILTER =
+LAYOUT_FILE =
+CITE_BIB_FILES =
+QUIET = NO
+WARNINGS = YES
+WARN_IF_UNDOCUMENTED = YES
+WARN_IF_DOC_ERROR = YES
+WARN_NO_PARAMDOC = NO
+WARN_AS_ERROR = NO
+WARN_FORMAT = "$file:$line: $text"
+WARN_LOGFILE =
+INPUT = ../../../src
+INPUT_ENCODING = UTF-8
+FILE_PATTERNS = *.c \
+ *.h
+RECURSIVE = NO
+EXCLUDE =
+EXCLUDE_SYMLINKS = NO
+EXCLUDE_PATTERNS =
+EXCLUDE_SYMBOLS = ___*
+EXAMPLE_PATH =
+EXAMPLE_PATTERNS = *
+EXAMPLE_RECURSIVE = NO
+IMAGE_PATH =
+INPUT_FILTER =
+FILTER_PATTERNS =
+FILTER_SOURCE_FILES = NO
+FILTER_SOURCE_PATTERNS =
+USE_MDFILE_AS_MAINPAGE = YES
+SOURCE_BROWSER = NO
+INLINE_SOURCES = NO
+STRIP_CODE_COMMENTS = YES
+REFERENCED_BY_RELATION = NO
+REFERENCES_RELATION = NO
+REFERENCES_LINK_SOURCE = YES
+SOURCE_TOOLTIPS = YES
+USE_HTAGS = NO
+VERBATIM_HEADERS = YES
+ALPHABETICAL_INDEX = YES
+IGNORE_PREFIX =
+GENERATE_HTML = NO
+HTML_OUTPUT = html
+HTML_FILE_EXTENSION = .html
+HTML_HEADER =
+HTML_FOOTER =
+HTML_STYLESHEET =
+HTML_EXTRA_STYLESHEET =
+HTML_EXTRA_FILES =
+HTML_COLORSTYLE_HUE = 220
+HTML_COLORSTYLE_SAT = 100
+HTML_COLORSTYLE_GAMMA = 80
+HTML_TIMESTAMP = NO
+HTML_DYNAMIC_MENUS = YES
+HTML_DYNAMIC_SECTIONS = NO
+HTML_INDEX_NUM_ENTRIES = 100
+GENERATE_DOCSET = NO
+DOCSET_FEEDNAME = "Doxygen generated docs"
+DOCSET_BUNDLE_ID = org.doxygen.Project
+DOCSET_PUBLISHER_ID = org.doxygen.Publisher
+DOCSET_PUBLISHER_NAME = Publisher
+GENERATE_HTMLHELP = NO
+CHM_FILE =
+HHC_LOCATION =
+GENERATE_CHI = NO
+CHM_INDEX_ENCODING =
+BINARY_TOC = NO
+TOC_EXPAND = NO
+GENERATE_QHP = NO
+QCH_FILE =
+QHP_NAMESPACE = org.doxygen.Project
+QHP_VIRTUAL_FOLDER = doc
+QHP_CUST_FILTER_NAME =
+QHP_CUST_FILTER_ATTRS =
+QHP_SECT_FILTER_ATTRS =
+QHG_LOCATION =
+GENERATE_ECLIPSEHELP = NO
+ECLIPSE_DOC_ID = org.doxygen.Project
+DISABLE_INDEX = NO
+GENERATE_TREEVIEW = NO
+ENUM_VALUES_PER_LINE = 4
+TREEVIEW_WIDTH = 250
+EXT_LINKS_IN_WINDOW = NO
+HTML_FORMULA_FORMAT = png
+FORMULA_FONTSIZE = 10
+FORMULA_TRANSPARENT = YES
+FORMULA_MACROFILE =
+USE_MATHJAX = NO
+MATHJAX_FORMAT = HTML-CSS
+MATHJAX_RELPATH = https://cdn.jsdelivr.net/npm/mathjax@2
+MATHJAX_EXTENSIONS =
+MATHJAX_CODEFILE =
+SEARCHENGINE = YES
+SERVER_BASED_SEARCH = NO
+EXTERNAL_SEARCH = NO
+SEARCHENGINE_URL =
+SEARCHDATA_FILE = searchdata.xml
+EXTERNAL_SEARCH_ID =
+EXTRA_SEARCH_MAPPINGS =
+GENERATE_LATEX = NO
+LATEX_OUTPUT = latex
+LATEX_CMD_NAME =
+MAKEINDEX_CMD_NAME = makeindex
+LATEX_MAKEINDEX_CMD = makeindex
+COMPACT_LATEX = NO
+PAPER_TYPE = a4
+EXTRA_PACKAGES =
+LATEX_HEADER =
+LATEX_FOOTER =
+LATEX_EXTRA_STYLESHEET =
+LATEX_EXTRA_FILES =
+PDF_HYPERLINKS = YES
+USE_PDFLATEX = YES
+LATEX_BATCHMODE = NO
+LATEX_HIDE_INDICES = NO
+LATEX_SOURCE_CODE = NO
+LATEX_BIB_STYLE = plain
+LATEX_TIMESTAMP = NO
+LATEX_EMOJI_DIRECTORY =
+GENERATE_RTF = NO
+RTF_OUTPUT = rtf
+COMPACT_RTF = NO
+RTF_HYPERLINKS = NO
+RTF_STYLESHEET_FILE =
+RTF_EXTENSIONS_FILE =
+RTF_SOURCE_CODE = NO
+GENERATE_MAN = NO
+MAN_OUTPUT = man
+MAN_EXTENSION = .3
+MAN_SUBDIR =
+MAN_LINKS = NO
+GENERATE_XML = YES
+XML_OUTPUT = xml
+XML_PROGRAMLISTING = YES
+XML_NS_MEMB_FILE_SCOPE = NO
+GENERATE_DOCBOOK = NO
+DOCBOOK_OUTPUT = docbook
+DOCBOOK_PROGRAMLISTING = NO
+GENERATE_AUTOGEN_DEF = NO
+GENERATE_PERLMOD = NO
+PERLMOD_LATEX = NO
+PERLMOD_PRETTY = YES
+PERLMOD_MAKEVAR_PREFIX =
+ENABLE_PREPROCESSING = YES
+MACRO_EXPANSION = NO
+EXPAND_ONLY_PREDEF = YES
+SEARCH_INCLUDES = YES
+INCLUDE_PATH =
+INCLUDE_FILE_PATTERNS =
+PREDEFINED =
+EXPAND_AS_DEFINED =
+SKIP_FUNCTION_MACROS = NO
+TAGFILES =
+GENERATE_TAGFILE =
+ALLEXTERNALS = NO
+EXTERNAL_GROUPS = YES
+EXTERNAL_PAGES = YES
+CLASS_DIAGRAMS = YES
+DIA_PATH =
+HIDE_UNDOC_RELATIONS = YES
+HAVE_DOT = NO
+DOT_NUM_THREADS = 0
+DOT_FONTNAME = Helvetica
+DOT_FONTSIZE = 10
+DOT_FONTPATH =
+CLASS_GRAPH = YES
+COLLABORATION_GRAPH = YES
+GROUP_GRAPHS = YES
+UML_LOOK = NO
+UML_LIMIT_NUM_FIELDS = 10
+DOT_UML_DETAILS = NO
+DOT_WRAP_THRESHOLD = 17
+TEMPLATE_RELATIONS = NO
+INCLUDE_GRAPH = YES
+INCLUDED_BY_GRAPH = YES
+CALL_GRAPH = NO
+CALLER_GRAPH = NO
+GRAPHICAL_HIERARCHY = YES
+DIRECTORY_GRAPH = YES
+DOT_IMAGE_FORMAT = png
+INTERACTIVE_SVG = NO
+DOT_PATH =
+DOTFILE_DIRS =
+MSCFILE_DIRS =
+DIAFILE_DIRS =
+PLANTUML_JAR_PATH =
+PLANTUML_CFG_FILE =
+PLANTUML_INCLUDE_PATH =
+DOT_GRAPH_MAX_NODES = 50
+MAX_DOT_GRAPH_DEPTH = 0
+DOT_TRANSPARENT = NO
+DOT_MULTI_TARGETS = NO
+GENERATE_LEGEND = YES
+DOT_CLEANUP = YES
diff --git a/docs/sphinx/requirements.txt b/docs/sphinx/requirements.txt
new file mode 100644
index 0000000..188f51e
--- /dev/null
+++ b/docs/sphinx/requirements.txt
@@ -0,0 +1 @@
+breathe \ No newline at end of file
diff --git a/fuzz/bpf-object-fuzzer.c b/fuzz/bpf-object-fuzzer.c
new file mode 100644
index 0000000..89286e2
--- /dev/null
+++ b/fuzz/bpf-object-fuzzer.c
@@ -0,0 +1,23 @@
+#include "libbpf.h"
+
+static int libbpf_print_fn(enum libbpf_print_level level, const char *format, va_list args)
+{
+ return 0;
+}
+
+int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
+ struct bpf_object *obj = NULL;
+ DECLARE_LIBBPF_OPTS(bpf_object_open_opts, opts);
+ int err;
+
+ libbpf_set_print(libbpf_print_fn);
+
+ opts.object_name = "fuzz-object";
+ obj = bpf_object__open_mem(data, size, &opts);
+ err = libbpf_get_error(obj);
+ if (err)
+ return 0;
+
+ bpf_object__close(obj);
+ return 0;
+}
diff --git a/fuzz/bpf-object-fuzzer_seed_corpus.zip b/fuzz/bpf-object-fuzzer_seed_corpus.zip
new file mode 100644
index 0000000..602b381
--- /dev/null
+++ b/fuzz/bpf-object-fuzzer_seed_corpus.zip
Binary files differ
diff --git a/include/asm/barrier.h b/include/asm/barrier.h
new file mode 100644
index 0000000..1fc6aee
--- /dev/null
+++ b/include/asm/barrier.h
@@ -0,0 +1,7 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+#ifndef __ASM_BARRIER_H
+#define __ASM_BARRIER_H
+
+#include <linux/compiler.h>
+
+#endif
diff --git a/include/linux/compiler.h b/include/linux/compiler.h
new file mode 100644
index 0000000..26336dc
--- /dev/null
+++ b/include/linux/compiler.h
@@ -0,0 +1,70 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+#ifndef __LINUX_COMPILER_H
+#define __LINUX_COMPILER_H
+
+#define likely(x) __builtin_expect(!!(x), 1)
+#define unlikely(x) __builtin_expect(!!(x), 0)
+
+#define READ_ONCE(x) (*(volatile typeof(x) *)&x)
+#define WRITE_ONCE(x, v) (*(volatile typeof(x) *)&x) = (v)
+
+#define barrier() asm volatile("" ::: "memory")
+
+#if defined(__x86_64__)
+
+# define smp_rmb() barrier()
+# define smp_wmb() barrier()
+# define smp_mb() asm volatile("lock; addl $0,-132(%%rsp)" ::: "memory", "cc")
+
+# define smp_store_release(p, v) \
+do { \
+ barrier(); \
+ WRITE_ONCE(*p, v); \
+} while (0)
+
+# define smp_load_acquire(p) \
+({ \
+ typeof(*p) ___p = READ_ONCE(*p); \
+ barrier(); \
+ ___p; \
+})
+
+#elif defined(__aarch64__)
+
+# define smp_rmb() asm volatile("dmb ishld" ::: "memory")
+# define smp_wmb() asm volatile("dmb ishst" ::: "memory")
+# define smp_mb() asm volatile("dmb ish" ::: "memory")
+
+#endif
+
+#ifndef smp_mb
+# define smp_mb() __sync_synchronize()
+#endif
+
+#ifndef smp_rmb
+# define smp_rmb() smp_mb()
+#endif
+
+#ifndef smp_wmb
+# define smp_wmb() smp_mb()
+#endif
+
+#ifndef smp_store_release
+# define smp_store_release(p, v) \
+do { \
+ smp_mb(); \
+ WRITE_ONCE(*p, v); \
+} while (0)
+#endif
+
+#ifndef smp_load_acquire
+# define smp_load_acquire(p) \
+({ \
+ typeof(*p) ___p = READ_ONCE(*p); \
+ smp_mb(); \
+ ___p; \
+})
+#endif
+
+#endif /* __LINUX_COMPILER_H */
diff --git a/include/linux/err.h b/include/linux/err.h
new file mode 100644
index 0000000..1b1dafb
--- /dev/null
+++ b/include/linux/err.h
@@ -0,0 +1,38 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+#ifndef __LINUX_ERR_H
+#define __LINUX_ERR_H
+
+#include <linux/types.h>
+#include <asm/errno.h>
+
+#define MAX_ERRNO 4095
+
+#define IS_ERR_VALUE(x) ((x) >= (unsigned long)-MAX_ERRNO)
+
+static inline void * ERR_PTR(long error_)
+{
+ return (void *) error_;
+}
+
+static inline long PTR_ERR(const void *ptr)
+{
+ return (long) ptr;
+}
+
+static inline bool IS_ERR(const void *ptr)
+{
+ return IS_ERR_VALUE((unsigned long)ptr);
+}
+
+static inline bool IS_ERR_OR_NULL(const void *ptr)
+{
+ return (!ptr) || IS_ERR_VALUE((unsigned long)ptr);
+}
+
+static inline long PTR_ERR_OR_ZERO(const void *ptr)
+{
+ return IS_ERR(ptr) ? PTR_ERR(ptr) : 0;
+}
+
+#endif
diff --git a/include/linux/filter.h b/include/linux/filter.h
new file mode 100644
index 0000000..e7e3373
--- /dev/null
+++ b/include/linux/filter.h
@@ -0,0 +1,134 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+#ifndef __LINUX_FILTER_H
+#define __LINUX_FILTER_H
+
+#include <linux/bpf.h>
+
+#define BPF_RAW_INSN(CODE, DST, SRC, OFF, IMM) \
+ ((struct bpf_insn) { \
+ .code = CODE, \
+ .dst_reg = DST, \
+ .src_reg = SRC, \
+ .off = OFF, \
+ .imm = IMM })
+
+#define BPF_ALU32_IMM(OP, DST, IMM) \
+ ((struct bpf_insn) { \
+ .code = BPF_ALU | BPF_OP(OP) | BPF_K, \
+ .dst_reg = DST, \
+ .src_reg = 0, \
+ .off = 0, \
+ .imm = IMM })
+
+#define BPF_ALU64_IMM(OP, DST, IMM) \
+ ((struct bpf_insn) { \
+ .code = BPF_ALU64 | BPF_OP(OP) | BPF_K, \
+ .dst_reg = DST, \
+ .src_reg = 0, \
+ .off = 0, \
+ .imm = IMM })
+
+#define BPF_MOV64_IMM(DST, IMM) \
+ ((struct bpf_insn) { \
+ .code = BPF_ALU64 | BPF_MOV | BPF_K, \
+ .dst_reg = DST, \
+ .src_reg = 0, \
+ .off = 0, \
+ .imm = IMM })
+
+#define BPF_EXIT_INSN() \
+ ((struct bpf_insn) { \
+ .code = BPF_JMP | BPF_EXIT, \
+ .dst_reg = 0, \
+ .src_reg = 0, \
+ .off = 0, \
+ .imm = 0 })
+
+#define BPF_EMIT_CALL(FUNC) \
+ ((struct bpf_insn) { \
+ .code = BPF_JMP | BPF_CALL, \
+ .dst_reg = 0, \
+ .src_reg = 0, \
+ .off = 0, \
+ .imm = ((FUNC) - BPF_FUNC_unspec) })
+
+#define BPF_LDX_MEM(SIZE, DST, SRC, OFF) \
+ ((struct bpf_insn) { \
+ .code = BPF_LDX | BPF_SIZE(SIZE) | BPF_MEM, \
+ .dst_reg = DST, \
+ .src_reg = SRC, \
+ .off = OFF, \
+ .imm = 0 })
+
+#define BPF_STX_MEM(SIZE, DST, SRC, OFF) \
+ ((struct bpf_insn) { \
+ .code = BPF_STX | BPF_SIZE(SIZE) | BPF_MEM, \
+ .dst_reg = DST, \
+ .src_reg = SRC, \
+ .off = OFF, \
+ .imm = 0 })
+
+#define BPF_ST_MEM(SIZE, DST, OFF, IMM) \
+ ((struct bpf_insn) { \
+ .code = BPF_ST | BPF_SIZE(SIZE) | BPF_MEM, \
+ .dst_reg = DST, \
+ .src_reg = 0, \
+ .off = OFF, \
+ .imm = IMM })
+
+#define BPF_MOV64_REG(DST, SRC) \
+ ((struct bpf_insn) { \
+ .code = BPF_ALU64 | BPF_MOV | BPF_X, \
+ .dst_reg = DST, \
+ .src_reg = SRC, \
+ .off = 0, \
+ .imm = 0 })
+
+#define BPF_MOV32_IMM(DST, IMM) \
+ ((struct bpf_insn) { \
+ .code = BPF_ALU | BPF_MOV | BPF_K, \
+ .dst_reg = DST, \
+ .src_reg = 0, \
+ .off = 0, \
+ .imm = IMM })
+
+#define BPF_LD_IMM64_RAW_FULL(DST, SRC, OFF1, OFF2, IMM1, IMM2) \
+ ((struct bpf_insn) { \
+ .code = BPF_LD | BPF_DW | BPF_IMM, \
+ .dst_reg = DST, \
+ .src_reg = SRC, \
+ .off = OFF1, \
+ .imm = IMM1 }), \
+ ((struct bpf_insn) { \
+ .code = 0, \
+ .dst_reg = 0, \
+ .src_reg = 0, \
+ .off = OFF2, \
+ .imm = IMM2 })
+
+#define BPF_LD_MAP_FD(DST, MAP_FD) \
+ BPF_LD_IMM64_RAW_FULL(DST, BPF_PSEUDO_MAP_FD, 0, 0, \
+ MAP_FD, 0)
+
+#define BPF_LD_MAP_VALUE(DST, MAP_FD, VALUE_OFF) \
+ BPF_LD_IMM64_RAW_FULL(DST, BPF_PSEUDO_MAP_VALUE, 0, 0, \
+ MAP_FD, VALUE_OFF)
+
+#define BPF_JMP_IMM(OP, DST, IMM, OFF) \
+ ((struct bpf_insn) { \
+ .code = BPF_JMP | BPF_OP(OP) | BPF_K, \
+ .dst_reg = DST, \
+ .src_reg = 0, \
+ .off = OFF, \
+ .imm = IMM })
+
+#define BPF_JMP32_IMM(OP, DST, IMM, OFF) \
+ ((struct bpf_insn) { \
+ .code = BPF_JMP32 | BPF_OP(OP) | BPF_K, \
+ .dst_reg = DST, \
+ .src_reg = 0, \
+ .off = OFF, \
+ .imm = IMM })
+
+#endif
diff --git a/include/linux/kernel.h b/include/linux/kernel.h
new file mode 100644
index 0000000..a4a7a9d
--- /dev/null
+++ b/include/linux/kernel.h
@@ -0,0 +1,44 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+#ifndef __LINUX_KERNEL_H
+#define __LINUX_KERNEL_H
+
+#ifndef offsetof
+#define offsetof(TYPE, MEMBER) ((size_t) &((TYPE *)0)->MEMBER)
+#endif
+
+#ifndef container_of
+#define container_of(ptr, type, member) ({ \
+ const typeof(((type *)0)->member) * __mptr = (ptr); \
+ (type *)((char *)__mptr - offsetof(type, member)); })
+#endif
+
+#ifndef max
+#define max(x, y) ({ \
+ typeof(x) _max1 = (x); \
+ typeof(y) _max2 = (y); \
+ (void) (&_max1 == &_max2); \
+ _max1 > _max2 ? _max1 : _max2; })
+#endif
+
+#ifndef min
+#define min(x, y) ({ \
+ typeof(x) _min1 = (x); \
+ typeof(y) _min2 = (y); \
+ (void) (&_min1 == &_min2); \
+ _min1 < _min2 ? _min1 : _min2; })
+#endif
+
+#ifndef roundup
+#define roundup(x, y) ( \
+{ \
+ const typeof(y) __y = y; \
+ (((x) + (__y - 1)) / __y) * __y; \
+} \
+)
+#endif
+
+#define ARRAY_SIZE(arr) (sizeof(arr) / sizeof((arr)[0]))
+#define __KERNEL_DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
+
+#endif
diff --git a/include/linux/list.h b/include/linux/list.h
new file mode 100644
index 0000000..fc91c34
--- /dev/null
+++ b/include/linux/list.h
@@ -0,0 +1,91 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+#ifndef __LINUX_LIST_H
+#define __LINUX_LIST_H
+
+#define LIST_HEAD_INIT(name) { &(name), &(name) }
+#define LIST_HEAD(name) \
+ struct list_head name = LIST_HEAD_INIT(name)
+
+#define POISON_POINTER_DELTA 0
+#define LIST_POISON1 ((void *) 0x100 + POISON_POINTER_DELTA)
+#define LIST_POISON2 ((void *) 0x200 + POISON_POINTER_DELTA)
+
+
+static inline void INIT_LIST_HEAD(struct list_head *list)
+{
+ list->next = list;
+ list->prev = list;
+}
+
+static inline void __list_add(struct list_head *new,
+ struct list_head *prev,
+ struct list_head *next)
+{
+ next->prev = new;
+ new->next = next;
+ new->prev = prev;
+ prev->next = new;
+}
+
+/**
+ * list_add - add a new entry
+ * @new: new entry to be added
+ * @head: list head to add it after
+ *
+ * Insert a new entry after the specified head.
+ * This is good for implementing stacks.
+ */
+static inline void list_add(struct list_head *new, struct list_head *head)
+{
+ __list_add(new, head, head->next);
+}
+
+/*
+ * Delete a list entry by making the prev/next entries
+ * point to each other.
+ *
+ * This is only for internal list manipulation where we know
+ * the prev/next entries already!
+ */
+static inline void __list_del(struct list_head * prev, struct list_head * next)
+{
+ next->prev = prev;
+ prev->next = next;
+}
+
+/**
+ * list_del - deletes entry from list.
+ * @entry: the element to delete from the list.
+ * Note: list_empty() on entry does not return true after this, the entry is
+ * in an undefined state.
+ */
+static inline void __list_del_entry(struct list_head *entry)
+{
+ __list_del(entry->prev, entry->next);
+}
+
+static inline void list_del(struct list_head *entry)
+{
+ __list_del(entry->prev, entry->next);
+ entry->next = LIST_POISON1;
+ entry->prev = LIST_POISON2;
+}
+
+static inline int list_empty(const struct list_head *head)
+{
+ return head->next == head;
+}
+
+#define list_entry(ptr, type, member) \
+ container_of(ptr, type, member)
+#define list_first_entry(ptr, type, member) \
+ list_entry((ptr)->next, type, member)
+#define list_next_entry(pos, member) \
+ list_entry((pos)->member.next, typeof(*(pos)), member)
+#define list_for_each_entry(pos, head, member) \
+ for (pos = list_first_entry(head, typeof(*pos), member); \
+ &pos->member != (head); \
+ pos = list_next_entry(pos, member))
+
+#endif
diff --git a/include/linux/overflow.h b/include/linux/overflow.h
new file mode 100644
index 0000000..53d7580
--- /dev/null
+++ b/include/linux/overflow.h
@@ -0,0 +1,90 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+#ifndef __LINUX_OVERFLOW_H
+#define __LINUX_OVERFLOW_H
+
+#define is_signed_type(type) (((type)(-1)) < (type)1)
+#define __type_half_max(type) ((type)1 << (8*sizeof(type) - 1 - is_signed_type(type)))
+#define type_max(T) ((T)((__type_half_max(T) - 1) + __type_half_max(T)))
+#define type_min(T) ((T)((T)-type_max(T)-(T)1))
+
+#ifndef unlikely
+#define unlikely(x) __builtin_expect(!!(x), 0)
+#endif
+
+#ifdef __GNUC__
+#define GCC_VERSION (__GNUC__ * 10000 \
+ + __GNUC_MINOR__ * 100 \
+ + __GNUC_PATCHLEVEL__)
+#if GCC_VERSION >= 50100
+#define COMPILER_HAS_GENERIC_BUILTIN_OVERFLOW 1
+#endif
+#endif
+
+#ifdef COMPILER_HAS_GENERIC_BUILTIN_OVERFLOW
+
+#define check_mul_overflow(a, b, d) ({ \
+ typeof(a) __a = (a); \
+ typeof(b) __b = (b); \
+ typeof(d) __d = (d); \
+ (void) (&__a == &__b); \
+ (void) (&__a == __d); \
+ __builtin_mul_overflow(__a, __b, __d); \
+})
+
+#else
+
+/*
+ * If one of a or b is a compile-time constant, this avoids a division.
+ */
+#define __unsigned_mul_overflow(a, b, d) ({ \
+ typeof(a) __a = (a); \
+ typeof(b) __b = (b); \
+ typeof(d) __d = (d); \
+ (void) (&__a == &__b); \
+ (void) (&__a == __d); \
+ *__d = __a * __b; \
+ __builtin_constant_p(__b) ? \
+ __b > 0 && __a > type_max(typeof(__a)) / __b : \
+ __a > 0 && __b > type_max(typeof(__b)) / __a; \
+})
+
+/*
+ * Signed multiplication is rather hard. gcc always follows C99, so
+ * division is truncated towards 0. This means that we can write the
+ * overflow check like this:
+ *
+ * (a > 0 && (b > MAX/a || b < MIN/a)) ||
+ * (a < -1 && (b > MIN/a || b < MAX/a) ||
+ * (a == -1 && b == MIN)
+ *
+ * The redundant casts of -1 are to silence an annoying -Wtype-limits
+ * (included in -Wextra) warning: When the type is u8 or u16, the
+ * __b_c_e in check_mul_overflow obviously selects
+ * __unsigned_mul_overflow, but unfortunately gcc still parses this
+ * code and warns about the limited range of __b.
+ */
+
+#define __signed_mul_overflow(a, b, d) ({ \
+ typeof(a) __a = (a); \
+ typeof(b) __b = (b); \
+ typeof(d) __d = (d); \
+ typeof(a) __tmax = type_max(typeof(a)); \
+ typeof(a) __tmin = type_min(typeof(a)); \
+ (void) (&__a == &__b); \
+ (void) (&__a == __d); \
+ *__d = (__u64)__a * (__u64)__b; \
+ (__b > 0 && (__a > __tmax/__b || __a < __tmin/__b)) || \
+ (__b < (typeof(__b))-1 && (__a > __tmin/__b || __a < __tmax/__b)) || \
+ (__b == (typeof(__b))-1 && __a == __tmin); \
+})
+
+#define check_mul_overflow(a, b, d) \
+ __builtin_choose_expr(is_signed_type(typeof(a)), \
+ __signed_mul_overflow(a, b, d), \
+ __unsigned_mul_overflow(a, b, d))
+
+
+#endif /* COMPILER_HAS_GENERIC_BUILTIN_OVERFLOW */
+
+#endif
diff --git a/include/linux/ring_buffer.h b/include/linux/ring_buffer.h
new file mode 100644
index 0000000..fc4677b
--- /dev/null
+++ b/include/linux/ring_buffer.h
@@ -0,0 +1,18 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+#ifndef _TOOLS_LINUX_RING_BUFFER_H_
+#define _TOOLS_LINUX_RING_BUFFER_H_
+
+#include <linux/compiler.h>
+
+static inline __u64 ring_buffer_read_head(struct perf_event_mmap_page *base)
+{
+ return smp_load_acquire(&base->data_head);
+}
+
+static inline void ring_buffer_write_tail(struct perf_event_mmap_page *base,
+ __u64 tail)
+{
+ smp_store_release(&base->data_tail, tail);
+}
+
+#endif /* _TOOLS_LINUX_RING_BUFFER_H_ */
diff --git a/include/linux/types.h b/include/linux/types.h
new file mode 100644
index 0000000..b15252a
--- /dev/null
+++ b/include/linux/types.h
@@ -0,0 +1,33 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+#ifndef __LINUX_TYPES_H
+#define __LINUX_TYPES_H
+
+#include <stdbool.h>
+#include <stddef.h>
+#include <stdint.h>
+
+#include <linux/stddef.h>
+
+#include <asm/types.h>
+#include <asm/posix_types.h>
+
+#define __bitwise__
+#define __bitwise __bitwise__
+
+typedef __u16 __bitwise __le16;
+typedef __u16 __bitwise __be16;
+typedef __u32 __bitwise __le32;
+typedef __u32 __bitwise __be32;
+typedef __u64 __bitwise __le64;
+typedef __u64 __bitwise __be64;
+
+#ifndef __aligned_u64
+# define __aligned_u64 __u64 __attribute__((aligned(8)))
+#endif
+
+struct list_head {
+ struct list_head *next, *prev;
+};
+
+#endif
diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h
new file mode 100644
index 0000000..bc1a3d2
--- /dev/null
+++ b/include/uapi/linux/bpf.h
@@ -0,0 +1,7057 @@
+/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
+/* Copyright (c) 2011-2014 PLUMgrid, http://plumgrid.com
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of version 2 of the GNU General Public
+ * License as published by the Free Software Foundation.
+ */
+#ifndef _UAPI__LINUX_BPF_H__
+#define _UAPI__LINUX_BPF_H__
+
+#include <linux/types.h>
+#include <linux/bpf_common.h>
+
+/* Extended instruction set based on top of classic BPF */
+
+/* instruction classes */
+#define BPF_JMP32 0x06 /* jmp mode in word width */
+#define BPF_ALU64 0x07 /* alu mode in double word width */
+
+/* ld/ldx fields */
+#define BPF_DW 0x18 /* double word (64-bit) */
+#define BPF_ATOMIC 0xc0 /* atomic memory ops - op type in immediate */
+#define BPF_XADD 0xc0 /* exclusive add - legacy name */
+
+/* alu/jmp fields */
+#define BPF_MOV 0xb0 /* mov reg to reg */
+#define BPF_ARSH 0xc0 /* sign extending arithmetic shift right */
+
+/* change endianness of a register */
+#define BPF_END 0xd0 /* flags for endianness conversion: */
+#define BPF_TO_LE 0x00 /* convert to little-endian */
+#define BPF_TO_BE 0x08 /* convert to big-endian */
+#define BPF_FROM_LE BPF_TO_LE
+#define BPF_FROM_BE BPF_TO_BE
+
+/* jmp encodings */
+#define BPF_JNE 0x50 /* jump != */
+#define BPF_JLT 0xa0 /* LT is unsigned, '<' */
+#define BPF_JLE 0xb0 /* LE is unsigned, '<=' */
+#define BPF_JSGT 0x60 /* SGT is signed '>', GT in x86 */
+#define BPF_JSGE 0x70 /* SGE is signed '>=', GE in x86 */
+#define BPF_JSLT 0xc0 /* SLT is signed, '<' */
+#define BPF_JSLE 0xd0 /* SLE is signed, '<=' */
+#define BPF_CALL 0x80 /* function call */
+#define BPF_EXIT 0x90 /* function return */
+
+/* atomic op type fields (stored in immediate) */
+#define BPF_FETCH 0x01 /* not an opcode on its own, used to build others */
+#define BPF_XCHG (0xe0 | BPF_FETCH) /* atomic exchange */
+#define BPF_CMPXCHG (0xf0 | BPF_FETCH) /* atomic compare-and-write */
+
+/* Register numbers */
+enum {
+ BPF_REG_0 = 0,
+ BPF_REG_1,
+ BPF_REG_2,
+ BPF_REG_3,
+ BPF_REG_4,
+ BPF_REG_5,
+ BPF_REG_6,
+ BPF_REG_7,
+ BPF_REG_8,
+ BPF_REG_9,
+ BPF_REG_10,
+ __MAX_BPF_REG,
+};
+
+/* BPF has 10 general purpose 64-bit registers and stack frame. */
+#define MAX_BPF_REG __MAX_BPF_REG
+
+struct bpf_insn {
+ __u8 code; /* opcode */
+ __u8 dst_reg:4; /* dest register */
+ __u8 src_reg:4; /* source register */
+ __s16 off; /* signed offset */
+ __s32 imm; /* signed immediate constant */
+};
+
+/* Key of an a BPF_MAP_TYPE_LPM_TRIE entry */
+struct bpf_lpm_trie_key {
+ __u32 prefixlen; /* up to 32 for AF_INET, 128 for AF_INET6 */
+ __u8 data[0]; /* Arbitrary size */
+};
+
+struct bpf_cgroup_storage_key {
+ __u64 cgroup_inode_id; /* cgroup inode id */
+ __u32 attach_type; /* program attach type (enum bpf_attach_type) */
+};
+
+enum bpf_cgroup_iter_order {
+ BPF_CGROUP_ITER_ORDER_UNSPEC = 0,
+ BPF_CGROUP_ITER_SELF_ONLY, /* process only a single object. */
+ BPF_CGROUP_ITER_DESCENDANTS_PRE, /* walk descendants in pre-order. */
+ BPF_CGROUP_ITER_DESCENDANTS_POST, /* walk descendants in post-order. */
+ BPF_CGROUP_ITER_ANCESTORS_UP, /* walk ancestors upward. */
+};
+
+union bpf_iter_link_info {
+ struct {
+ __u32 map_fd;
+ } map;
+ struct {
+ enum bpf_cgroup_iter_order order;
+
+ /* At most one of cgroup_fd and cgroup_id can be non-zero. If
+ * both are zero, the walk starts from the default cgroup v2
+ * root. For walking v1 hierarchy, one should always explicitly
+ * specify cgroup_fd.
+ */
+ __u32 cgroup_fd;
+ __u64 cgroup_id;
+ } cgroup;
+ /* Parameters of task iterators. */
+ struct {
+ __u32 tid;
+ __u32 pid;
+ __u32 pid_fd;
+ } task;
+};
+
+/* BPF syscall commands, see bpf(2) man-page for more details. */
+/**
+ * DOC: eBPF Syscall Preamble
+ *
+ * The operation to be performed by the **bpf**\ () system call is determined
+ * by the *cmd* argument. Each operation takes an accompanying argument,
+ * provided via *attr*, which is a pointer to a union of type *bpf_attr* (see
+ * below). The size argument is the size of the union pointed to by *attr*.
+ */
+/**
+ * DOC: eBPF Syscall Commands
+ *
+ * BPF_MAP_CREATE
+ * Description
+ * Create a map and return a file descriptor that refers to the
+ * map. The close-on-exec file descriptor flag (see **fcntl**\ (2))
+ * is automatically enabled for the new file descriptor.
+ *
+ * Applying **close**\ (2) to the file descriptor returned by
+ * **BPF_MAP_CREATE** will delete the map (but see NOTES).
+ *
+ * Return
+ * A new file descriptor (a nonnegative integer), or -1 if an
+ * error occurred (in which case, *errno* is set appropriately).
+ *
+ * BPF_MAP_LOOKUP_ELEM
+ * Description
+ * Look up an element with a given *key* in the map referred to
+ * by the file descriptor *map_fd*.
+ *
+ * The *flags* argument may be specified as one of the
+ * following:
+ *
+ * **BPF_F_LOCK**
+ * Look up the value of a spin-locked map without
+ * returning the lock. This must be specified if the
+ * elements contain a spinlock.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_MAP_UPDATE_ELEM
+ * Description
+ * Create or update an element (key/value pair) in a specified map.
+ *
+ * The *flags* argument should be specified as one of the
+ * following:
+ *
+ * **BPF_ANY**
+ * Create a new element or update an existing element.
+ * **BPF_NOEXIST**
+ * Create a new element only if it did not exist.
+ * **BPF_EXIST**
+ * Update an existing element.
+ * **BPF_F_LOCK**
+ * Update a spin_lock-ed map element.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * May set *errno* to **EINVAL**, **EPERM**, **ENOMEM**,
+ * **E2BIG**, **EEXIST**, or **ENOENT**.
+ *
+ * **E2BIG**
+ * The number of elements in the map reached the
+ * *max_entries* limit specified at map creation time.
+ * **EEXIST**
+ * If *flags* specifies **BPF_NOEXIST** and the element
+ * with *key* already exists in the map.
+ * **ENOENT**
+ * If *flags* specifies **BPF_EXIST** and the element with
+ * *key* does not exist in the map.
+ *
+ * BPF_MAP_DELETE_ELEM
+ * Description
+ * Look up and delete an element by key in a specified map.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_MAP_GET_NEXT_KEY
+ * Description
+ * Look up an element by key in a specified map and return the key
+ * of the next element. Can be used to iterate over all elements
+ * in the map.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * The following cases can be used to iterate over all elements of
+ * the map:
+ *
+ * * If *key* is not found, the operation returns zero and sets
+ * the *next_key* pointer to the key of the first element.
+ * * If *key* is found, the operation returns zero and sets the
+ * *next_key* pointer to the key of the next element.
+ * * If *key* is the last element, returns -1 and *errno* is set
+ * to **ENOENT**.
+ *
+ * May set *errno* to **ENOMEM**, **EFAULT**, **EPERM**, or
+ * **EINVAL** on error.
+ *
+ * BPF_PROG_LOAD
+ * Description
+ * Verify and load an eBPF program, returning a new file
+ * descriptor associated with the program.
+ *
+ * Applying **close**\ (2) to the file descriptor returned by
+ * **BPF_PROG_LOAD** will unload the eBPF program (but see NOTES).
+ *
+ * The close-on-exec file descriptor flag (see **fcntl**\ (2)) is
+ * automatically enabled for the new file descriptor.
+ *
+ * Return
+ * A new file descriptor (a nonnegative integer), or -1 if an
+ * error occurred (in which case, *errno* is set appropriately).
+ *
+ * BPF_OBJ_PIN
+ * Description
+ * Pin an eBPF program or map referred by the specified *bpf_fd*
+ * to the provided *pathname* on the filesystem.
+ *
+ * The *pathname* argument must not contain a dot (".").
+ *
+ * On success, *pathname* retains a reference to the eBPF object,
+ * preventing deallocation of the object when the original
+ * *bpf_fd* is closed. This allow the eBPF object to live beyond
+ * **close**\ (\ *bpf_fd*\ ), and hence the lifetime of the parent
+ * process.
+ *
+ * Applying **unlink**\ (2) or similar calls to the *pathname*
+ * unpins the object from the filesystem, removing the reference.
+ * If no other file descriptors or filesystem nodes refer to the
+ * same object, it will be deallocated (see NOTES).
+ *
+ * The filesystem type for the parent directory of *pathname* must
+ * be **BPF_FS_MAGIC**.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_OBJ_GET
+ * Description
+ * Open a file descriptor for the eBPF object pinned to the
+ * specified *pathname*.
+ *
+ * Return
+ * A new file descriptor (a nonnegative integer), or -1 if an
+ * error occurred (in which case, *errno* is set appropriately).
+ *
+ * BPF_PROG_ATTACH
+ * Description
+ * Attach an eBPF program to a *target_fd* at the specified
+ * *attach_type* hook.
+ *
+ * The *attach_type* specifies the eBPF attachment point to
+ * attach the program to, and must be one of *bpf_attach_type*
+ * (see below).
+ *
+ * The *attach_bpf_fd* must be a valid file descriptor for a
+ * loaded eBPF program of a cgroup, flow dissector, LIRC, sockmap
+ * or sock_ops type corresponding to the specified *attach_type*.
+ *
+ * The *target_fd* must be a valid file descriptor for a kernel
+ * object which depends on the attach type of *attach_bpf_fd*:
+ *
+ * **BPF_PROG_TYPE_CGROUP_DEVICE**,
+ * **BPF_PROG_TYPE_CGROUP_SKB**,
+ * **BPF_PROG_TYPE_CGROUP_SOCK**,
+ * **BPF_PROG_TYPE_CGROUP_SOCK_ADDR**,
+ * **BPF_PROG_TYPE_CGROUP_SOCKOPT**,
+ * **BPF_PROG_TYPE_CGROUP_SYSCTL**,
+ * **BPF_PROG_TYPE_SOCK_OPS**
+ *
+ * Control Group v2 hierarchy with the eBPF controller
+ * enabled. Requires the kernel to be compiled with
+ * **CONFIG_CGROUP_BPF**.
+ *
+ * **BPF_PROG_TYPE_FLOW_DISSECTOR**
+ *
+ * Network namespace (eg /proc/self/ns/net).
+ *
+ * **BPF_PROG_TYPE_LIRC_MODE2**
+ *
+ * LIRC device path (eg /dev/lircN). Requires the kernel
+ * to be compiled with **CONFIG_BPF_LIRC_MODE2**.
+ *
+ * **BPF_PROG_TYPE_SK_SKB**,
+ * **BPF_PROG_TYPE_SK_MSG**
+ *
+ * eBPF map of socket type (eg **BPF_MAP_TYPE_SOCKHASH**).
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_PROG_DETACH
+ * Description
+ * Detach the eBPF program associated with the *target_fd* at the
+ * hook specified by *attach_type*. The program must have been
+ * previously attached using **BPF_PROG_ATTACH**.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_PROG_TEST_RUN
+ * Description
+ * Run the eBPF program associated with the *prog_fd* a *repeat*
+ * number of times against a provided program context *ctx_in* and
+ * data *data_in*, and return the modified program context
+ * *ctx_out*, *data_out* (for example, packet data), result of the
+ * execution *retval*, and *duration* of the test run.
+ *
+ * The sizes of the buffers provided as input and output
+ * parameters *ctx_in*, *ctx_out*, *data_in*, and *data_out* must
+ * be provided in the corresponding variables *ctx_size_in*,
+ * *ctx_size_out*, *data_size_in*, and/or *data_size_out*. If any
+ * of these parameters are not provided (ie set to NULL), the
+ * corresponding size field must be zero.
+ *
+ * Some program types have particular requirements:
+ *
+ * **BPF_PROG_TYPE_SK_LOOKUP**
+ * *data_in* and *data_out* must be NULL.
+ *
+ * **BPF_PROG_TYPE_RAW_TRACEPOINT**,
+ * **BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE**
+ *
+ * *ctx_out*, *data_in* and *data_out* must be NULL.
+ * *repeat* must be zero.
+ *
+ * BPF_PROG_RUN is an alias for BPF_PROG_TEST_RUN.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * **ENOSPC**
+ * Either *data_size_out* or *ctx_size_out* is too small.
+ * **ENOTSUPP**
+ * This command is not supported by the program type of
+ * the program referred to by *prog_fd*.
+ *
+ * BPF_PROG_GET_NEXT_ID
+ * Description
+ * Fetch the next eBPF program currently loaded into the kernel.
+ *
+ * Looks for the eBPF program with an id greater than *start_id*
+ * and updates *next_id* on success. If no other eBPF programs
+ * remain with ids higher than *start_id*, returns -1 and sets
+ * *errno* to **ENOENT**.
+ *
+ * Return
+ * Returns zero on success. On error, or when no id remains, -1
+ * is returned and *errno* is set appropriately.
+ *
+ * BPF_MAP_GET_NEXT_ID
+ * Description
+ * Fetch the next eBPF map currently loaded into the kernel.
+ *
+ * Looks for the eBPF map with an id greater than *start_id*
+ * and updates *next_id* on success. If no other eBPF maps
+ * remain with ids higher than *start_id*, returns -1 and sets
+ * *errno* to **ENOENT**.
+ *
+ * Return
+ * Returns zero on success. On error, or when no id remains, -1
+ * is returned and *errno* is set appropriately.
+ *
+ * BPF_PROG_GET_FD_BY_ID
+ * Description
+ * Open a file descriptor for the eBPF program corresponding to
+ * *prog_id*.
+ *
+ * Return
+ * A new file descriptor (a nonnegative integer), or -1 if an
+ * error occurred (in which case, *errno* is set appropriately).
+ *
+ * BPF_MAP_GET_FD_BY_ID
+ * Description
+ * Open a file descriptor for the eBPF map corresponding to
+ * *map_id*.
+ *
+ * Return
+ * A new file descriptor (a nonnegative integer), or -1 if an
+ * error occurred (in which case, *errno* is set appropriately).
+ *
+ * BPF_OBJ_GET_INFO_BY_FD
+ * Description
+ * Obtain information about the eBPF object corresponding to
+ * *bpf_fd*.
+ *
+ * Populates up to *info_len* bytes of *info*, which will be in
+ * one of the following formats depending on the eBPF object type
+ * of *bpf_fd*:
+ *
+ * * **struct bpf_prog_info**
+ * * **struct bpf_map_info**
+ * * **struct bpf_btf_info**
+ * * **struct bpf_link_info**
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_PROG_QUERY
+ * Description
+ * Obtain information about eBPF programs associated with the
+ * specified *attach_type* hook.
+ *
+ * The *target_fd* must be a valid file descriptor for a kernel
+ * object which depends on the attach type of *attach_bpf_fd*:
+ *
+ * **BPF_PROG_TYPE_CGROUP_DEVICE**,
+ * **BPF_PROG_TYPE_CGROUP_SKB**,
+ * **BPF_PROG_TYPE_CGROUP_SOCK**,
+ * **BPF_PROG_TYPE_CGROUP_SOCK_ADDR**,
+ * **BPF_PROG_TYPE_CGROUP_SOCKOPT**,
+ * **BPF_PROG_TYPE_CGROUP_SYSCTL**,
+ * **BPF_PROG_TYPE_SOCK_OPS**
+ *
+ * Control Group v2 hierarchy with the eBPF controller
+ * enabled. Requires the kernel to be compiled with
+ * **CONFIG_CGROUP_BPF**.
+ *
+ * **BPF_PROG_TYPE_FLOW_DISSECTOR**
+ *
+ * Network namespace (eg /proc/self/ns/net).
+ *
+ * **BPF_PROG_TYPE_LIRC_MODE2**
+ *
+ * LIRC device path (eg /dev/lircN). Requires the kernel
+ * to be compiled with **CONFIG_BPF_LIRC_MODE2**.
+ *
+ * **BPF_PROG_QUERY** always fetches the number of programs
+ * attached and the *attach_flags* which were used to attach those
+ * programs. Additionally, if *prog_ids* is nonzero and the number
+ * of attached programs is less than *prog_cnt*, populates
+ * *prog_ids* with the eBPF program ids of the programs attached
+ * at *target_fd*.
+ *
+ * The following flags may alter the result:
+ *
+ * **BPF_F_QUERY_EFFECTIVE**
+ * Only return information regarding programs which are
+ * currently effective at the specified *target_fd*.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_RAW_TRACEPOINT_OPEN
+ * Description
+ * Attach an eBPF program to a tracepoint *name* to access kernel
+ * internal arguments of the tracepoint in their raw form.
+ *
+ * The *prog_fd* must be a valid file descriptor associated with
+ * a loaded eBPF program of type **BPF_PROG_TYPE_RAW_TRACEPOINT**.
+ *
+ * No ABI guarantees are made about the content of tracepoint
+ * arguments exposed to the corresponding eBPF program.
+ *
+ * Applying **close**\ (2) to the file descriptor returned by
+ * **BPF_RAW_TRACEPOINT_OPEN** will delete the map (but see NOTES).
+ *
+ * Return
+ * A new file descriptor (a nonnegative integer), or -1 if an
+ * error occurred (in which case, *errno* is set appropriately).
+ *
+ * BPF_BTF_LOAD
+ * Description
+ * Verify and load BPF Type Format (BTF) metadata into the kernel,
+ * returning a new file descriptor associated with the metadata.
+ * BTF is described in more detail at
+ * https://www.kernel.org/doc/html/latest/bpf/btf.html.
+ *
+ * The *btf* parameter must point to valid memory providing
+ * *btf_size* bytes of BTF binary metadata.
+ *
+ * The returned file descriptor can be passed to other **bpf**\ ()
+ * subcommands such as **BPF_PROG_LOAD** or **BPF_MAP_CREATE** to
+ * associate the BTF with those objects.
+ *
+ * Similar to **BPF_PROG_LOAD**, **BPF_BTF_LOAD** has optional
+ * parameters to specify a *btf_log_buf*, *btf_log_size* and
+ * *btf_log_level* which allow the kernel to return freeform log
+ * output regarding the BTF verification process.
+ *
+ * Return
+ * A new file descriptor (a nonnegative integer), or -1 if an
+ * error occurred (in which case, *errno* is set appropriately).
+ *
+ * BPF_BTF_GET_FD_BY_ID
+ * Description
+ * Open a file descriptor for the BPF Type Format (BTF)
+ * corresponding to *btf_id*.
+ *
+ * Return
+ * A new file descriptor (a nonnegative integer), or -1 if an
+ * error occurred (in which case, *errno* is set appropriately).
+ *
+ * BPF_TASK_FD_QUERY
+ * Description
+ * Obtain information about eBPF programs associated with the
+ * target process identified by *pid* and *fd*.
+ *
+ * If the *pid* and *fd* are associated with a tracepoint, kprobe
+ * or uprobe perf event, then the *prog_id* and *fd_type* will
+ * be populated with the eBPF program id and file descriptor type
+ * of type **bpf_task_fd_type**. If associated with a kprobe or
+ * uprobe, the *probe_offset* and *probe_addr* will also be
+ * populated. Optionally, if *buf* is provided, then up to
+ * *buf_len* bytes of *buf* will be populated with the name of
+ * the tracepoint, kprobe or uprobe.
+ *
+ * The resulting *prog_id* may be introspected in deeper detail
+ * using **BPF_PROG_GET_FD_BY_ID** and **BPF_OBJ_GET_INFO_BY_FD**.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_MAP_LOOKUP_AND_DELETE_ELEM
+ * Description
+ * Look up an element with the given *key* in the map referred to
+ * by the file descriptor *fd*, and if found, delete the element.
+ *
+ * For **BPF_MAP_TYPE_QUEUE** and **BPF_MAP_TYPE_STACK** map
+ * types, the *flags* argument needs to be set to 0, but for other
+ * map types, it may be specified as:
+ *
+ * **BPF_F_LOCK**
+ * Look up and delete the value of a spin-locked map
+ * without returning the lock. This must be specified if
+ * the elements contain a spinlock.
+ *
+ * The **BPF_MAP_TYPE_QUEUE** and **BPF_MAP_TYPE_STACK** map types
+ * implement this command as a "pop" operation, deleting the top
+ * element rather than one corresponding to *key*.
+ * The *key* and *key_len* parameters should be zeroed when
+ * issuing this operation for these map types.
+ *
+ * This command is only valid for the following map types:
+ * * **BPF_MAP_TYPE_QUEUE**
+ * * **BPF_MAP_TYPE_STACK**
+ * * **BPF_MAP_TYPE_HASH**
+ * * **BPF_MAP_TYPE_PERCPU_HASH**
+ * * **BPF_MAP_TYPE_LRU_HASH**
+ * * **BPF_MAP_TYPE_LRU_PERCPU_HASH**
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_MAP_FREEZE
+ * Description
+ * Freeze the permissions of the specified map.
+ *
+ * Write permissions may be frozen by passing zero *flags*.
+ * Upon success, no future syscall invocations may alter the
+ * map state of *map_fd*. Write operations from eBPF programs
+ * are still possible for a frozen map.
+ *
+ * Not supported for maps of type **BPF_MAP_TYPE_STRUCT_OPS**.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_BTF_GET_NEXT_ID
+ * Description
+ * Fetch the next BPF Type Format (BTF) object currently loaded
+ * into the kernel.
+ *
+ * Looks for the BTF object with an id greater than *start_id*
+ * and updates *next_id* on success. If no other BTF objects
+ * remain with ids higher than *start_id*, returns -1 and sets
+ * *errno* to **ENOENT**.
+ *
+ * Return
+ * Returns zero on success. On error, or when no id remains, -1
+ * is returned and *errno* is set appropriately.
+ *
+ * BPF_MAP_LOOKUP_BATCH
+ * Description
+ * Iterate and fetch multiple elements in a map.
+ *
+ * Two opaque values are used to manage batch operations,
+ * *in_batch* and *out_batch*. Initially, *in_batch* must be set
+ * to NULL to begin the batched operation. After each subsequent
+ * **BPF_MAP_LOOKUP_BATCH**, the caller should pass the resultant
+ * *out_batch* as the *in_batch* for the next operation to
+ * continue iteration from the current point.
+ *
+ * The *keys* and *values* are output parameters which must point
+ * to memory large enough to hold *count* items based on the key
+ * and value size of the map *map_fd*. The *keys* buffer must be
+ * of *key_size* * *count*. The *values* buffer must be of
+ * *value_size* * *count*.
+ *
+ * The *elem_flags* argument may be specified as one of the
+ * following:
+ *
+ * **BPF_F_LOCK**
+ * Look up the value of a spin-locked map without
+ * returning the lock. This must be specified if the
+ * elements contain a spinlock.
+ *
+ * On success, *count* elements from the map are copied into the
+ * user buffer, with the keys copied into *keys* and the values
+ * copied into the corresponding indices in *values*.
+ *
+ * If an error is returned and *errno* is not **EFAULT**, *count*
+ * is set to the number of successfully processed elements.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * May set *errno* to **ENOSPC** to indicate that *keys* or
+ * *values* is too small to dump an entire bucket during
+ * iteration of a hash-based map type.
+ *
+ * BPF_MAP_LOOKUP_AND_DELETE_BATCH
+ * Description
+ * Iterate and delete all elements in a map.
+ *
+ * This operation has the same behavior as
+ * **BPF_MAP_LOOKUP_BATCH** with two exceptions:
+ *
+ * * Every element that is successfully returned is also deleted
+ * from the map. This is at least *count* elements. Note that
+ * *count* is both an input and an output parameter.
+ * * Upon returning with *errno* set to **EFAULT**, up to
+ * *count* elements may be deleted without returning the keys
+ * and values of the deleted elements.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_MAP_UPDATE_BATCH
+ * Description
+ * Update multiple elements in a map by *key*.
+ *
+ * The *keys* and *values* are input parameters which must point
+ * to memory large enough to hold *count* items based on the key
+ * and value size of the map *map_fd*. The *keys* buffer must be
+ * of *key_size* * *count*. The *values* buffer must be of
+ * *value_size* * *count*.
+ *
+ * Each element specified in *keys* is sequentially updated to the
+ * value in the corresponding index in *values*. The *in_batch*
+ * and *out_batch* parameters are ignored and should be zeroed.
+ *
+ * The *elem_flags* argument should be specified as one of the
+ * following:
+ *
+ * **BPF_ANY**
+ * Create new elements or update a existing elements.
+ * **BPF_NOEXIST**
+ * Create new elements only if they do not exist.
+ * **BPF_EXIST**
+ * Update existing elements.
+ * **BPF_F_LOCK**
+ * Update spin_lock-ed map elements. This must be
+ * specified if the map value contains a spinlock.
+ *
+ * On success, *count* elements from the map are updated.
+ *
+ * If an error is returned and *errno* is not **EFAULT**, *count*
+ * is set to the number of successfully processed elements.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * May set *errno* to **EINVAL**, **EPERM**, **ENOMEM**, or
+ * **E2BIG**. **E2BIG** indicates that the number of elements in
+ * the map reached the *max_entries* limit specified at map
+ * creation time.
+ *
+ * May set *errno* to one of the following error codes under
+ * specific circumstances:
+ *
+ * **EEXIST**
+ * If *flags* specifies **BPF_NOEXIST** and the element
+ * with *key* already exists in the map.
+ * **ENOENT**
+ * If *flags* specifies **BPF_EXIST** and the element with
+ * *key* does not exist in the map.
+ *
+ * BPF_MAP_DELETE_BATCH
+ * Description
+ * Delete multiple elements in a map by *key*.
+ *
+ * The *keys* parameter is an input parameter which must point
+ * to memory large enough to hold *count* items based on the key
+ * size of the map *map_fd*, that is, *key_size* * *count*.
+ *
+ * Each element specified in *keys* is sequentially deleted. The
+ * *in_batch*, *out_batch*, and *values* parameters are ignored
+ * and should be zeroed.
+ *
+ * The *elem_flags* argument may be specified as one of the
+ * following:
+ *
+ * **BPF_F_LOCK**
+ * Look up the value of a spin-locked map without
+ * returning the lock. This must be specified if the
+ * elements contain a spinlock.
+ *
+ * On success, *count* elements from the map are updated.
+ *
+ * If an error is returned and *errno* is not **EFAULT**, *count*
+ * is set to the number of successfully processed elements. If
+ * *errno* is **EFAULT**, up to *count* elements may be been
+ * deleted.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_LINK_CREATE
+ * Description
+ * Attach an eBPF program to a *target_fd* at the specified
+ * *attach_type* hook and return a file descriptor handle for
+ * managing the link.
+ *
+ * Return
+ * A new file descriptor (a nonnegative integer), or -1 if an
+ * error occurred (in which case, *errno* is set appropriately).
+ *
+ * BPF_LINK_UPDATE
+ * Description
+ * Update the eBPF program in the specified *link_fd* to
+ * *new_prog_fd*.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_LINK_GET_FD_BY_ID
+ * Description
+ * Open a file descriptor for the eBPF Link corresponding to
+ * *link_id*.
+ *
+ * Return
+ * A new file descriptor (a nonnegative integer), or -1 if an
+ * error occurred (in which case, *errno* is set appropriately).
+ *
+ * BPF_LINK_GET_NEXT_ID
+ * Description
+ * Fetch the next eBPF link currently loaded into the kernel.
+ *
+ * Looks for the eBPF link with an id greater than *start_id*
+ * and updates *next_id* on success. If no other eBPF links
+ * remain with ids higher than *start_id*, returns -1 and sets
+ * *errno* to **ENOENT**.
+ *
+ * Return
+ * Returns zero on success. On error, or when no id remains, -1
+ * is returned and *errno* is set appropriately.
+ *
+ * BPF_ENABLE_STATS
+ * Description
+ * Enable eBPF runtime statistics gathering.
+ *
+ * Runtime statistics gathering for the eBPF runtime is disabled
+ * by default to minimize the corresponding performance overhead.
+ * This command enables statistics globally.
+ *
+ * Multiple programs may independently enable statistics.
+ * After gathering the desired statistics, eBPF runtime statistics
+ * may be disabled again by calling **close**\ (2) for the file
+ * descriptor returned by this function. Statistics will only be
+ * disabled system-wide when all outstanding file descriptors
+ * returned by prior calls for this subcommand are closed.
+ *
+ * Return
+ * A new file descriptor (a nonnegative integer), or -1 if an
+ * error occurred (in which case, *errno* is set appropriately).
+ *
+ * BPF_ITER_CREATE
+ * Description
+ * Create an iterator on top of the specified *link_fd* (as
+ * previously created using **BPF_LINK_CREATE**) and return a
+ * file descriptor that can be used to trigger the iteration.
+ *
+ * If the resulting file descriptor is pinned to the filesystem
+ * using **BPF_OBJ_PIN**, then subsequent **read**\ (2) syscalls
+ * for that path will trigger the iterator to read kernel state
+ * using the eBPF program attached to *link_fd*.
+ *
+ * Return
+ * A new file descriptor (a nonnegative integer), or -1 if an
+ * error occurred (in which case, *errno* is set appropriately).
+ *
+ * BPF_LINK_DETACH
+ * Description
+ * Forcefully detach the specified *link_fd* from its
+ * corresponding attachment point.
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * BPF_PROG_BIND_MAP
+ * Description
+ * Bind a map to the lifetime of an eBPF program.
+ *
+ * The map identified by *map_fd* is bound to the program
+ * identified by *prog_fd* and only released when *prog_fd* is
+ * released. This may be used in cases where metadata should be
+ * associated with a program which otherwise does not contain any
+ * references to the map (for example, embedded in the eBPF
+ * program instructions).
+ *
+ * Return
+ * Returns zero on success. On error, -1 is returned and *errno*
+ * is set appropriately.
+ *
+ * NOTES
+ * eBPF objects (maps and programs) can be shared between processes.
+ *
+ * * After **fork**\ (2), the child inherits file descriptors
+ * referring to the same eBPF objects.
+ * * File descriptors referring to eBPF objects can be transferred over
+ * **unix**\ (7) domain sockets.
+ * * File descriptors referring to eBPF objects can be duplicated in the
+ * usual way, using **dup**\ (2) and similar calls.
+ * * File descriptors referring to eBPF objects can be pinned to the
+ * filesystem using the **BPF_OBJ_PIN** command of **bpf**\ (2).
+ *
+ * An eBPF object is deallocated only after all file descriptors referring
+ * to the object have been closed and no references remain pinned to the
+ * filesystem or attached (for example, bound to a program or device).
+ */
+enum bpf_cmd {
+ BPF_MAP_CREATE,
+ BPF_MAP_LOOKUP_ELEM,
+ BPF_MAP_UPDATE_ELEM,
+ BPF_MAP_DELETE_ELEM,
+ BPF_MAP_GET_NEXT_KEY,
+ BPF_PROG_LOAD,
+ BPF_OBJ_PIN,
+ BPF_OBJ_GET,
+ BPF_PROG_ATTACH,
+ BPF_PROG_DETACH,
+ BPF_PROG_TEST_RUN,
+ BPF_PROG_RUN = BPF_PROG_TEST_RUN,
+ BPF_PROG_GET_NEXT_ID,
+ BPF_MAP_GET_NEXT_ID,
+ BPF_PROG_GET_FD_BY_ID,
+ BPF_MAP_GET_FD_BY_ID,
+ BPF_OBJ_GET_INFO_BY_FD,
+ BPF_PROG_QUERY,
+ BPF_RAW_TRACEPOINT_OPEN,
+ BPF_BTF_LOAD,
+ BPF_BTF_GET_FD_BY_ID,
+ BPF_TASK_FD_QUERY,
+ BPF_MAP_LOOKUP_AND_DELETE_ELEM,
+ BPF_MAP_FREEZE,
+ BPF_BTF_GET_NEXT_ID,
+ BPF_MAP_LOOKUP_BATCH,
+ BPF_MAP_LOOKUP_AND_DELETE_BATCH,
+ BPF_MAP_UPDATE_BATCH,
+ BPF_MAP_DELETE_BATCH,
+ BPF_LINK_CREATE,
+ BPF_LINK_UPDATE,
+ BPF_LINK_GET_FD_BY_ID,
+ BPF_LINK_GET_NEXT_ID,
+ BPF_ENABLE_STATS,
+ BPF_ITER_CREATE,
+ BPF_LINK_DETACH,
+ BPF_PROG_BIND_MAP,
+};
+
+enum bpf_map_type {
+ BPF_MAP_TYPE_UNSPEC,
+ BPF_MAP_TYPE_HASH,
+ BPF_MAP_TYPE_ARRAY,
+ BPF_MAP_TYPE_PROG_ARRAY,
+ BPF_MAP_TYPE_PERF_EVENT_ARRAY,
+ BPF_MAP_TYPE_PERCPU_HASH,
+ BPF_MAP_TYPE_PERCPU_ARRAY,
+ BPF_MAP_TYPE_STACK_TRACE,
+ BPF_MAP_TYPE_CGROUP_ARRAY,
+ BPF_MAP_TYPE_LRU_HASH,
+ BPF_MAP_TYPE_LRU_PERCPU_HASH,
+ BPF_MAP_TYPE_LPM_TRIE,
+ BPF_MAP_TYPE_ARRAY_OF_MAPS,
+ BPF_MAP_TYPE_HASH_OF_MAPS,
+ BPF_MAP_TYPE_DEVMAP,
+ BPF_MAP_TYPE_SOCKMAP,
+ BPF_MAP_TYPE_CPUMAP,
+ BPF_MAP_TYPE_XSKMAP,
+ BPF_MAP_TYPE_SOCKHASH,
+ BPF_MAP_TYPE_CGROUP_STORAGE_DEPRECATED,
+ /* BPF_MAP_TYPE_CGROUP_STORAGE is available to bpf programs attaching
+ * to a cgroup. The newer BPF_MAP_TYPE_CGRP_STORAGE is available to
+ * both cgroup-attached and other progs and supports all functionality
+ * provided by BPF_MAP_TYPE_CGROUP_STORAGE. So mark
+ * BPF_MAP_TYPE_CGROUP_STORAGE deprecated.
+ */
+ BPF_MAP_TYPE_CGROUP_STORAGE = BPF_MAP_TYPE_CGROUP_STORAGE_DEPRECATED,
+ BPF_MAP_TYPE_REUSEPORT_SOCKARRAY,
+ BPF_MAP_TYPE_PERCPU_CGROUP_STORAGE,
+ BPF_MAP_TYPE_QUEUE,
+ BPF_MAP_TYPE_STACK,
+ BPF_MAP_TYPE_SK_STORAGE,
+ BPF_MAP_TYPE_DEVMAP_HASH,
+ BPF_MAP_TYPE_STRUCT_OPS,
+ BPF_MAP_TYPE_RINGBUF,
+ BPF_MAP_TYPE_INODE_STORAGE,
+ BPF_MAP_TYPE_TASK_STORAGE,
+ BPF_MAP_TYPE_BLOOM_FILTER,
+ BPF_MAP_TYPE_USER_RINGBUF,
+ BPF_MAP_TYPE_CGRP_STORAGE,
+};
+
+/* Note that tracing related programs such as
+ * BPF_PROG_TYPE_{KPROBE,TRACEPOINT,PERF_EVENT,RAW_TRACEPOINT}
+ * are not subject to a stable API since kernel internal data
+ * structures can change from release to release and may
+ * therefore break existing tracing BPF programs. Tracing BPF
+ * programs correspond to /a/ specific kernel which is to be
+ * analyzed, and not /a/ specific kernel /and/ all future ones.
+ */
+enum bpf_prog_type {
+ BPF_PROG_TYPE_UNSPEC,
+ BPF_PROG_TYPE_SOCKET_FILTER,
+ BPF_PROG_TYPE_KPROBE,
+ BPF_PROG_TYPE_SCHED_CLS,
+ BPF_PROG_TYPE_SCHED_ACT,
+ BPF_PROG_TYPE_TRACEPOINT,
+ BPF_PROG_TYPE_XDP,
+ BPF_PROG_TYPE_PERF_EVENT,
+ BPF_PROG_TYPE_CGROUP_SKB,
+ BPF_PROG_TYPE_CGROUP_SOCK,
+ BPF_PROG_TYPE_LWT_IN,
+ BPF_PROG_TYPE_LWT_OUT,
+ BPF_PROG_TYPE_LWT_XMIT,
+ BPF_PROG_TYPE_SOCK_OPS,
+ BPF_PROG_TYPE_SK_SKB,
+ BPF_PROG_TYPE_CGROUP_DEVICE,
+ BPF_PROG_TYPE_SK_MSG,
+ BPF_PROG_TYPE_RAW_TRACEPOINT,
+ BPF_PROG_TYPE_CGROUP_SOCK_ADDR,
+ BPF_PROG_TYPE_LWT_SEG6LOCAL,
+ BPF_PROG_TYPE_LIRC_MODE2,
+ BPF_PROG_TYPE_SK_REUSEPORT,
+ BPF_PROG_TYPE_FLOW_DISSECTOR,
+ BPF_PROG_TYPE_CGROUP_SYSCTL,
+ BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE,
+ BPF_PROG_TYPE_CGROUP_SOCKOPT,
+ BPF_PROG_TYPE_TRACING,
+ BPF_PROG_TYPE_STRUCT_OPS,
+ BPF_PROG_TYPE_EXT,
+ BPF_PROG_TYPE_LSM,
+ BPF_PROG_TYPE_SK_LOOKUP,
+ BPF_PROG_TYPE_SYSCALL, /* a program that can execute syscalls */
+};
+
+enum bpf_attach_type {
+ BPF_CGROUP_INET_INGRESS,
+ BPF_CGROUP_INET_EGRESS,
+ BPF_CGROUP_INET_SOCK_CREATE,
+ BPF_CGROUP_SOCK_OPS,
+ BPF_SK_SKB_STREAM_PARSER,
+ BPF_SK_SKB_STREAM_VERDICT,
+ BPF_CGROUP_DEVICE,
+ BPF_SK_MSG_VERDICT,
+ BPF_CGROUP_INET4_BIND,
+ BPF_CGROUP_INET6_BIND,
+ BPF_CGROUP_INET4_CONNECT,
+ BPF_CGROUP_INET6_CONNECT,
+ BPF_CGROUP_INET4_POST_BIND,
+ BPF_CGROUP_INET6_POST_BIND,
+ BPF_CGROUP_UDP4_SENDMSG,
+ BPF_CGROUP_UDP6_SENDMSG,
+ BPF_LIRC_MODE2,
+ BPF_FLOW_DISSECTOR,
+ BPF_CGROUP_SYSCTL,
+ BPF_CGROUP_UDP4_RECVMSG,
+ BPF_CGROUP_UDP6_RECVMSG,
+ BPF_CGROUP_GETSOCKOPT,
+ BPF_CGROUP_SETSOCKOPT,
+ BPF_TRACE_RAW_TP,
+ BPF_TRACE_FENTRY,
+ BPF_TRACE_FEXIT,
+ BPF_MODIFY_RETURN,
+ BPF_LSM_MAC,
+ BPF_TRACE_ITER,
+ BPF_CGROUP_INET4_GETPEERNAME,
+ BPF_CGROUP_INET6_GETPEERNAME,
+ BPF_CGROUP_INET4_GETSOCKNAME,
+ BPF_CGROUP_INET6_GETSOCKNAME,
+ BPF_XDP_DEVMAP,
+ BPF_CGROUP_INET_SOCK_RELEASE,
+ BPF_XDP_CPUMAP,
+ BPF_SK_LOOKUP,
+ BPF_XDP,
+ BPF_SK_SKB_VERDICT,
+ BPF_SK_REUSEPORT_SELECT,
+ BPF_SK_REUSEPORT_SELECT_OR_MIGRATE,
+ BPF_PERF_EVENT,
+ BPF_TRACE_KPROBE_MULTI,
+ BPF_LSM_CGROUP,
+ __MAX_BPF_ATTACH_TYPE
+};
+
+#define MAX_BPF_ATTACH_TYPE __MAX_BPF_ATTACH_TYPE
+
+enum bpf_link_type {
+ BPF_LINK_TYPE_UNSPEC = 0,
+ BPF_LINK_TYPE_RAW_TRACEPOINT = 1,
+ BPF_LINK_TYPE_TRACING = 2,
+ BPF_LINK_TYPE_CGROUP = 3,
+ BPF_LINK_TYPE_ITER = 4,
+ BPF_LINK_TYPE_NETNS = 5,
+ BPF_LINK_TYPE_XDP = 6,
+ BPF_LINK_TYPE_PERF_EVENT = 7,
+ BPF_LINK_TYPE_KPROBE_MULTI = 8,
+ BPF_LINK_TYPE_STRUCT_OPS = 9,
+
+ MAX_BPF_LINK_TYPE,
+};
+
+/* cgroup-bpf attach flags used in BPF_PROG_ATTACH command
+ *
+ * NONE(default): No further bpf programs allowed in the subtree.
+ *
+ * BPF_F_ALLOW_OVERRIDE: If a sub-cgroup installs some bpf program,
+ * the program in this cgroup yields to sub-cgroup program.
+ *
+ * BPF_F_ALLOW_MULTI: If a sub-cgroup installs some bpf program,
+ * that cgroup program gets run in addition to the program in this cgroup.
+ *
+ * Only one program is allowed to be attached to a cgroup with
+ * NONE or BPF_F_ALLOW_OVERRIDE flag.
+ * Attaching another program on top of NONE or BPF_F_ALLOW_OVERRIDE will
+ * release old program and attach the new one. Attach flags has to match.
+ *
+ * Multiple programs are allowed to be attached to a cgroup with
+ * BPF_F_ALLOW_MULTI flag. They are executed in FIFO order
+ * (those that were attached first, run first)
+ * The programs of sub-cgroup are executed first, then programs of
+ * this cgroup and then programs of parent cgroup.
+ * When children program makes decision (like picking TCP CA or sock bind)
+ * parent program has a chance to override it.
+ *
+ * With BPF_F_ALLOW_MULTI a new program is added to the end of the list of
+ * programs for a cgroup. Though it's possible to replace an old program at
+ * any position by also specifying BPF_F_REPLACE flag and position itself in
+ * replace_bpf_fd attribute. Old program at this position will be released.
+ *
+ * A cgroup with MULTI or OVERRIDE flag allows any attach flags in sub-cgroups.
+ * A cgroup with NONE doesn't allow any programs in sub-cgroups.
+ * Ex1:
+ * cgrp1 (MULTI progs A, B) ->
+ * cgrp2 (OVERRIDE prog C) ->
+ * cgrp3 (MULTI prog D) ->
+ * cgrp4 (OVERRIDE prog E) ->
+ * cgrp5 (NONE prog F)
+ * the event in cgrp5 triggers execution of F,D,A,B in that order.
+ * if prog F is detached, the execution is E,D,A,B
+ * if prog F and D are detached, the execution is E,A,B
+ * if prog F, E and D are detached, the execution is C,A,B
+ *
+ * All eligible programs are executed regardless of return code from
+ * earlier programs.
+ */
+#define BPF_F_ALLOW_OVERRIDE (1U << 0)
+#define BPF_F_ALLOW_MULTI (1U << 1)
+#define BPF_F_REPLACE (1U << 2)
+
+/* If BPF_F_STRICT_ALIGNMENT is used in BPF_PROG_LOAD command, the
+ * verifier will perform strict alignment checking as if the kernel
+ * has been built with CONFIG_EFFICIENT_UNALIGNED_ACCESS not set,
+ * and NET_IP_ALIGN defined to 2.
+ */
+#define BPF_F_STRICT_ALIGNMENT (1U << 0)
+
+/* If BPF_F_ANY_ALIGNMENT is used in BPF_PROF_LOAD command, the
+ * verifier will allow any alignment whatsoever. On platforms
+ * with strict alignment requirements for loads ands stores (such
+ * as sparc and mips) the verifier validates that all loads and
+ * stores provably follow this requirement. This flag turns that
+ * checking and enforcement off.
+ *
+ * It is mostly used for testing when we want to validate the
+ * context and memory access aspects of the verifier, but because
+ * of an unaligned access the alignment check would trigger before
+ * the one we are interested in.
+ */
+#define BPF_F_ANY_ALIGNMENT (1U << 1)
+
+/* BPF_F_TEST_RND_HI32 is used in BPF_PROG_LOAD command for testing purpose.
+ * Verifier does sub-register def/use analysis and identifies instructions whose
+ * def only matters for low 32-bit, high 32-bit is never referenced later
+ * through implicit zero extension. Therefore verifier notifies JIT back-ends
+ * that it is safe to ignore clearing high 32-bit for these instructions. This
+ * saves some back-ends a lot of code-gen. However such optimization is not
+ * necessary on some arches, for example x86_64, arm64 etc, whose JIT back-ends
+ * hence hasn't used verifier's analysis result. But, we really want to have a
+ * way to be able to verify the correctness of the described optimization on
+ * x86_64 on which testsuites are frequently exercised.
+ *
+ * So, this flag is introduced. Once it is set, verifier will randomize high
+ * 32-bit for those instructions who has been identified as safe to ignore them.
+ * Then, if verifier is not doing correct analysis, such randomization will
+ * regress tests to expose bugs.
+ */
+#define BPF_F_TEST_RND_HI32 (1U << 2)
+
+/* The verifier internal test flag. Behavior is undefined */
+#define BPF_F_TEST_STATE_FREQ (1U << 3)
+
+/* If BPF_F_SLEEPABLE is used in BPF_PROG_LOAD command, the verifier will
+ * restrict map and helper usage for such programs. Sleepable BPF programs can
+ * only be attached to hooks where kernel execution context allows sleeping.
+ * Such programs are allowed to use helpers that may sleep like
+ * bpf_copy_from_user().
+ */
+#define BPF_F_SLEEPABLE (1U << 4)
+
+/* If BPF_F_XDP_HAS_FRAGS is used in BPF_PROG_LOAD command, the loaded program
+ * fully support xdp frags.
+ */
+#define BPF_F_XDP_HAS_FRAGS (1U << 5)
+
+/* link_create.kprobe_multi.flags used in LINK_CREATE command for
+ * BPF_TRACE_KPROBE_MULTI attach type to create return probe.
+ */
+#define BPF_F_KPROBE_MULTI_RETURN (1U << 0)
+
+/* When BPF ldimm64's insn[0].src_reg != 0 then this can have
+ * the following extensions:
+ *
+ * insn[0].src_reg: BPF_PSEUDO_MAP_[FD|IDX]
+ * insn[0].imm: map fd or fd_idx
+ * insn[1].imm: 0
+ * insn[0].off: 0
+ * insn[1].off: 0
+ * ldimm64 rewrite: address of map
+ * verifier type: CONST_PTR_TO_MAP
+ */
+#define BPF_PSEUDO_MAP_FD 1
+#define BPF_PSEUDO_MAP_IDX 5
+
+/* insn[0].src_reg: BPF_PSEUDO_MAP_[IDX_]VALUE
+ * insn[0].imm: map fd or fd_idx
+ * insn[1].imm: offset into value
+ * insn[0].off: 0
+ * insn[1].off: 0
+ * ldimm64 rewrite: address of map[0]+offset
+ * verifier type: PTR_TO_MAP_VALUE
+ */
+#define BPF_PSEUDO_MAP_VALUE 2
+#define BPF_PSEUDO_MAP_IDX_VALUE 6
+
+/* insn[0].src_reg: BPF_PSEUDO_BTF_ID
+ * insn[0].imm: kernel btd id of VAR
+ * insn[1].imm: 0
+ * insn[0].off: 0
+ * insn[1].off: 0
+ * ldimm64 rewrite: address of the kernel variable
+ * verifier type: PTR_TO_BTF_ID or PTR_TO_MEM, depending on whether the var
+ * is struct/union.
+ */
+#define BPF_PSEUDO_BTF_ID 3
+/* insn[0].src_reg: BPF_PSEUDO_FUNC
+ * insn[0].imm: insn offset to the func
+ * insn[1].imm: 0
+ * insn[0].off: 0
+ * insn[1].off: 0
+ * ldimm64 rewrite: address of the function
+ * verifier type: PTR_TO_FUNC.
+ */
+#define BPF_PSEUDO_FUNC 4
+
+/* when bpf_call->src_reg == BPF_PSEUDO_CALL, bpf_call->imm == pc-relative
+ * offset to another bpf function
+ */
+#define BPF_PSEUDO_CALL 1
+/* when bpf_call->src_reg == BPF_PSEUDO_KFUNC_CALL,
+ * bpf_call->imm == btf_id of a BTF_KIND_FUNC in the running kernel
+ */
+#define BPF_PSEUDO_KFUNC_CALL 2
+
+/* flags for BPF_MAP_UPDATE_ELEM command */
+enum {
+ BPF_ANY = 0, /* create new element or update existing */
+ BPF_NOEXIST = 1, /* create new element if it didn't exist */
+ BPF_EXIST = 2, /* update existing element */
+ BPF_F_LOCK = 4, /* spin_lock-ed map_lookup/map_update */
+};
+
+/* flags for BPF_MAP_CREATE command */
+enum {
+ BPF_F_NO_PREALLOC = (1U << 0),
+/* Instead of having one common LRU list in the
+ * BPF_MAP_TYPE_LRU_[PERCPU_]HASH map, use a percpu LRU list
+ * which can scale and perform better.
+ * Note, the LRU nodes (including free nodes) cannot be moved
+ * across different LRU lists.
+ */
+ BPF_F_NO_COMMON_LRU = (1U << 1),
+/* Specify numa node during map creation */
+ BPF_F_NUMA_NODE = (1U << 2),
+
+/* Flags for accessing BPF object from syscall side. */
+ BPF_F_RDONLY = (1U << 3),
+ BPF_F_WRONLY = (1U << 4),
+
+/* Flag for stack_map, store build_id+offset instead of pointer */
+ BPF_F_STACK_BUILD_ID = (1U << 5),
+
+/* Zero-initialize hash function seed. This should only be used for testing. */
+ BPF_F_ZERO_SEED = (1U << 6),
+
+/* Flags for accessing BPF object from program side. */
+ BPF_F_RDONLY_PROG = (1U << 7),
+ BPF_F_WRONLY_PROG = (1U << 8),
+
+/* Clone map from listener for newly accepted socket */
+ BPF_F_CLONE = (1U << 9),
+
+/* Enable memory-mapping BPF map */
+ BPF_F_MMAPABLE = (1U << 10),
+
+/* Share perf_event among processes */
+ BPF_F_PRESERVE_ELEMS = (1U << 11),
+
+/* Create a map that is suitable to be an inner map with dynamic max entries */
+ BPF_F_INNER_MAP = (1U << 12),
+};
+
+/* Flags for BPF_PROG_QUERY. */
+
+/* Query effective (directly attached + inherited from ancestor cgroups)
+ * programs that will be executed for events within a cgroup.
+ * attach_flags with this flag are always returned 0.
+ */
+#define BPF_F_QUERY_EFFECTIVE (1U << 0)
+
+/* Flags for BPF_PROG_TEST_RUN */
+
+/* If set, run the test on the cpu specified by bpf_attr.test.cpu */
+#define BPF_F_TEST_RUN_ON_CPU (1U << 0)
+/* If set, XDP frames will be transmitted after processing */
+#define BPF_F_TEST_XDP_LIVE_FRAMES (1U << 1)
+
+/* type for BPF_ENABLE_STATS */
+enum bpf_stats_type {
+ /* enabled run_time_ns and run_cnt */
+ BPF_STATS_RUN_TIME = 0,
+};
+
+enum bpf_stack_build_id_status {
+ /* user space need an empty entry to identify end of a trace */
+ BPF_STACK_BUILD_ID_EMPTY = 0,
+ /* with valid build_id and offset */
+ BPF_STACK_BUILD_ID_VALID = 1,
+ /* couldn't get build_id, fallback to ip */
+ BPF_STACK_BUILD_ID_IP = 2,
+};
+
+#define BPF_BUILD_ID_SIZE 20
+struct bpf_stack_build_id {
+ __s32 status;
+ unsigned char build_id[BPF_BUILD_ID_SIZE];
+ union {
+ __u64 offset;
+ __u64 ip;
+ };
+};
+
+#define BPF_OBJ_NAME_LEN 16U
+
+union bpf_attr {
+ struct { /* anonymous struct used by BPF_MAP_CREATE command */
+ __u32 map_type; /* one of enum bpf_map_type */
+ __u32 key_size; /* size of key in bytes */
+ __u32 value_size; /* size of value in bytes */
+ __u32 max_entries; /* max number of entries in a map */
+ __u32 map_flags; /* BPF_MAP_CREATE related
+ * flags defined above.
+ */
+ __u32 inner_map_fd; /* fd pointing to the inner map */
+ __u32 numa_node; /* numa node (effective only if
+ * BPF_F_NUMA_NODE is set).
+ */
+ char map_name[BPF_OBJ_NAME_LEN];
+ __u32 map_ifindex; /* ifindex of netdev to create on */
+ __u32 btf_fd; /* fd pointing to a BTF type data */
+ __u32 btf_key_type_id; /* BTF type_id of the key */
+ __u32 btf_value_type_id; /* BTF type_id of the value */
+ __u32 btf_vmlinux_value_type_id;/* BTF type_id of a kernel-
+ * struct stored as the
+ * map value
+ */
+ /* Any per-map-type extra fields
+ *
+ * BPF_MAP_TYPE_BLOOM_FILTER - the lowest 4 bits indicate the
+ * number of hash functions (if 0, the bloom filter will default
+ * to using 5 hash functions).
+ */
+ __u64 map_extra;
+ };
+
+ struct { /* anonymous struct used by BPF_MAP_*_ELEM commands */
+ __u32 map_fd;
+ __aligned_u64 key;
+ union {
+ __aligned_u64 value;
+ __aligned_u64 next_key;
+ };
+ __u64 flags;
+ };
+
+ struct { /* struct used by BPF_MAP_*_BATCH commands */
+ __aligned_u64 in_batch; /* start batch,
+ * NULL to start from beginning
+ */
+ __aligned_u64 out_batch; /* output: next start batch */
+ __aligned_u64 keys;
+ __aligned_u64 values;
+ __u32 count; /* input/output:
+ * input: # of key/value
+ * elements
+ * output: # of filled elements
+ */
+ __u32 map_fd;
+ __u64 elem_flags;
+ __u64 flags;
+ } batch;
+
+ struct { /* anonymous struct used by BPF_PROG_LOAD command */
+ __u32 prog_type; /* one of enum bpf_prog_type */
+ __u32 insn_cnt;
+ __aligned_u64 insns;
+ __aligned_u64 license;
+ __u32 log_level; /* verbosity level of verifier */
+ __u32 log_size; /* size of user buffer */
+ __aligned_u64 log_buf; /* user supplied buffer */
+ __u32 kern_version; /* not used */
+ __u32 prog_flags;
+ char prog_name[BPF_OBJ_NAME_LEN];
+ __u32 prog_ifindex; /* ifindex of netdev to prep for */
+ /* For some prog types expected attach type must be known at
+ * load time to verify attach type specific parts of prog
+ * (context accesses, allowed helpers, etc).
+ */
+ __u32 expected_attach_type;
+ __u32 prog_btf_fd; /* fd pointing to BTF type data */
+ __u32 func_info_rec_size; /* userspace bpf_func_info size */
+ __aligned_u64 func_info; /* func info */
+ __u32 func_info_cnt; /* number of bpf_func_info records */
+ __u32 line_info_rec_size; /* userspace bpf_line_info size */
+ __aligned_u64 line_info; /* line info */
+ __u32 line_info_cnt; /* number of bpf_line_info records */
+ __u32 attach_btf_id; /* in-kernel BTF type id to attach to */
+ union {
+ /* valid prog_fd to attach to bpf prog */
+ __u32 attach_prog_fd;
+ /* or valid module BTF object fd or 0 to attach to vmlinux */
+ __u32 attach_btf_obj_fd;
+ };
+ __u32 core_relo_cnt; /* number of bpf_core_relo */
+ __aligned_u64 fd_array; /* array of FDs */
+ __aligned_u64 core_relos;
+ __u32 core_relo_rec_size; /* sizeof(struct bpf_core_relo) */
+ };
+
+ struct { /* anonymous struct used by BPF_OBJ_* commands */
+ __aligned_u64 pathname;
+ __u32 bpf_fd;
+ __u32 file_flags;
+ };
+
+ struct { /* anonymous struct used by BPF_PROG_ATTACH/DETACH commands */
+ __u32 target_fd; /* container object to attach to */
+ __u32 attach_bpf_fd; /* eBPF program to attach */
+ __u32 attach_type;
+ __u32 attach_flags;
+ __u32 replace_bpf_fd; /* previously attached eBPF
+ * program to replace if
+ * BPF_F_REPLACE is used
+ */
+ };
+
+ struct { /* anonymous struct used by BPF_PROG_TEST_RUN command */
+ __u32 prog_fd;
+ __u32 retval;
+ __u32 data_size_in; /* input: len of data_in */
+ __u32 data_size_out; /* input/output: len of data_out
+ * returns ENOSPC if data_out
+ * is too small.
+ */
+ __aligned_u64 data_in;
+ __aligned_u64 data_out;
+ __u32 repeat;
+ __u32 duration;
+ __u32 ctx_size_in; /* input: len of ctx_in */
+ __u32 ctx_size_out; /* input/output: len of ctx_out
+ * returns ENOSPC if ctx_out
+ * is too small.
+ */
+ __aligned_u64 ctx_in;
+ __aligned_u64 ctx_out;
+ __u32 flags;
+ __u32 cpu;
+ __u32 batch_size;
+ } test;
+
+ struct { /* anonymous struct used by BPF_*_GET_*_ID */
+ union {
+ __u32 start_id;
+ __u32 prog_id;
+ __u32 map_id;
+ __u32 btf_id;
+ __u32 link_id;
+ };
+ __u32 next_id;
+ __u32 open_flags;
+ };
+
+ struct { /* anonymous struct used by BPF_OBJ_GET_INFO_BY_FD */
+ __u32 bpf_fd;
+ __u32 info_len;
+ __aligned_u64 info;
+ } info;
+
+ struct { /* anonymous struct used by BPF_PROG_QUERY command */
+ __u32 target_fd; /* container object to query */
+ __u32 attach_type;
+ __u32 query_flags;
+ __u32 attach_flags;
+ __aligned_u64 prog_ids;
+ __u32 prog_cnt;
+ /* output: per-program attach_flags.
+ * not allowed to be set during effective query.
+ */
+ __aligned_u64 prog_attach_flags;
+ } query;
+
+ struct { /* anonymous struct used by BPF_RAW_TRACEPOINT_OPEN command */
+ __u64 name;
+ __u32 prog_fd;
+ } raw_tracepoint;
+
+ struct { /* anonymous struct for BPF_BTF_LOAD */
+ __aligned_u64 btf;
+ __aligned_u64 btf_log_buf;
+ __u32 btf_size;
+ __u32 btf_log_size;
+ __u32 btf_log_level;
+ };
+
+ struct {
+ __u32 pid; /* input: pid */
+ __u32 fd; /* input: fd */
+ __u32 flags; /* input: flags */
+ __u32 buf_len; /* input/output: buf len */
+ __aligned_u64 buf; /* input/output:
+ * tp_name for tracepoint
+ * symbol for kprobe
+ * filename for uprobe
+ */
+ __u32 prog_id; /* output: prod_id */
+ __u32 fd_type; /* output: BPF_FD_TYPE_* */
+ __u64 probe_offset; /* output: probe_offset */
+ __u64 probe_addr; /* output: probe_addr */
+ } task_fd_query;
+
+ struct { /* struct used by BPF_LINK_CREATE command */
+ __u32 prog_fd; /* eBPF program to attach */
+ union {
+ __u32 target_fd; /* object to attach to */
+ __u32 target_ifindex; /* target ifindex */
+ };
+ __u32 attach_type; /* attach type */
+ __u32 flags; /* extra flags */
+ union {
+ __u32 target_btf_id; /* btf_id of target to attach to */
+ struct {
+ __aligned_u64 iter_info; /* extra bpf_iter_link_info */
+ __u32 iter_info_len; /* iter_info length */
+ };
+ struct {
+ /* black box user-provided value passed through
+ * to BPF program at the execution time and
+ * accessible through bpf_get_attach_cookie() BPF helper
+ */
+ __u64 bpf_cookie;
+ } perf_event;
+ struct {
+ __u32 flags;
+ __u32 cnt;
+ __aligned_u64 syms;
+ __aligned_u64 addrs;
+ __aligned_u64 cookies;
+ } kprobe_multi;
+ struct {
+ /* this is overlaid with the target_btf_id above. */
+ __u32 target_btf_id;
+ /* black box user-provided value passed through
+ * to BPF program at the execution time and
+ * accessible through bpf_get_attach_cookie() BPF helper
+ */
+ __u64 cookie;
+ } tracing;
+ };
+ } link_create;
+
+ struct { /* struct used by BPF_LINK_UPDATE command */
+ __u32 link_fd; /* link fd */
+ /* new program fd to update link with */
+ __u32 new_prog_fd;
+ __u32 flags; /* extra flags */
+ /* expected link's program fd; is specified only if
+ * BPF_F_REPLACE flag is set in flags */
+ __u32 old_prog_fd;
+ } link_update;
+
+ struct {
+ __u32 link_fd;
+ } link_detach;
+
+ struct { /* struct used by BPF_ENABLE_STATS command */
+ __u32 type;
+ } enable_stats;
+
+ struct { /* struct used by BPF_ITER_CREATE command */
+ __u32 link_fd;
+ __u32 flags;
+ } iter_create;
+
+ struct { /* struct used by BPF_PROG_BIND_MAP command */
+ __u32 prog_fd;
+ __u32 map_fd;
+ __u32 flags; /* extra flags */
+ } prog_bind_map;
+
+} __attribute__((aligned(8)));
+
+/* The description below is an attempt at providing documentation to eBPF
+ * developers about the multiple available eBPF helper functions. It can be
+ * parsed and used to produce a manual page. The workflow is the following,
+ * and requires the rst2man utility:
+ *
+ * $ ./scripts/bpf_doc.py \
+ * --filename include/uapi/linux/bpf.h > /tmp/bpf-helpers.rst
+ * $ rst2man /tmp/bpf-helpers.rst > /tmp/bpf-helpers.7
+ * $ man /tmp/bpf-helpers.7
+ *
+ * Note that in order to produce this external documentation, some RST
+ * formatting is used in the descriptions to get "bold" and "italics" in
+ * manual pages. Also note that the few trailing white spaces are
+ * intentional, removing them would break paragraphs for rst2man.
+ *
+ * Start of BPF helper function descriptions:
+ *
+ * void *bpf_map_lookup_elem(struct bpf_map *map, const void *key)
+ * Description
+ * Perform a lookup in *map* for an entry associated to *key*.
+ * Return
+ * Map value associated to *key*, or **NULL** if no entry was
+ * found.
+ *
+ * long bpf_map_update_elem(struct bpf_map *map, const void *key, const void *value, u64 flags)
+ * Description
+ * Add or update the value of the entry associated to *key* in
+ * *map* with *value*. *flags* is one of:
+ *
+ * **BPF_NOEXIST**
+ * The entry for *key* must not exist in the map.
+ * **BPF_EXIST**
+ * The entry for *key* must already exist in the map.
+ * **BPF_ANY**
+ * No condition on the existence of the entry for *key*.
+ *
+ * Flag value **BPF_NOEXIST** cannot be used for maps of types
+ * **BPF_MAP_TYPE_ARRAY** or **BPF_MAP_TYPE_PERCPU_ARRAY** (all
+ * elements always exist), the helper would return an error.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_map_delete_elem(struct bpf_map *map, const void *key)
+ * Description
+ * Delete entry with *key* from *map*.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_probe_read(void *dst, u32 size, const void *unsafe_ptr)
+ * Description
+ * For tracing programs, safely attempt to read *size* bytes from
+ * kernel space address *unsafe_ptr* and store the data in *dst*.
+ *
+ * Generally, use **bpf_probe_read_user**\ () or
+ * **bpf_probe_read_kernel**\ () instead.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * u64 bpf_ktime_get_ns(void)
+ * Description
+ * Return the time elapsed since system boot, in nanoseconds.
+ * Does not include time the system was suspended.
+ * See: **clock_gettime**\ (**CLOCK_MONOTONIC**)
+ * Return
+ * Current *ktime*.
+ *
+ * long bpf_trace_printk(const char *fmt, u32 fmt_size, ...)
+ * Description
+ * This helper is a "printk()-like" facility for debugging. It
+ * prints a message defined by format *fmt* (of size *fmt_size*)
+ * to file *\/sys/kernel/debug/tracing/trace* from DebugFS, if
+ * available. It can take up to three additional **u64**
+ * arguments (as an eBPF helpers, the total number of arguments is
+ * limited to five).
+ *
+ * Each time the helper is called, it appends a line to the trace.
+ * Lines are discarded while *\/sys/kernel/debug/tracing/trace* is
+ * open, use *\/sys/kernel/debug/tracing/trace_pipe* to avoid this.
+ * The format of the trace is customizable, and the exact output
+ * one will get depends on the options set in
+ * *\/sys/kernel/debug/tracing/trace_options* (see also the
+ * *README* file under the same directory). However, it usually
+ * defaults to something like:
+ *
+ * ::
+ *
+ * telnet-470 [001] .N.. 419421.045894: 0x00000001: <formatted msg>
+ *
+ * In the above:
+ *
+ * * ``telnet`` is the name of the current task.
+ * * ``470`` is the PID of the current task.
+ * * ``001`` is the CPU number on which the task is
+ * running.
+ * * In ``.N..``, each character refers to a set of
+ * options (whether irqs are enabled, scheduling
+ * options, whether hard/softirqs are running, level of
+ * preempt_disabled respectively). **N** means that
+ * **TIF_NEED_RESCHED** and **PREEMPT_NEED_RESCHED**
+ * are set.
+ * * ``419421.045894`` is a timestamp.
+ * * ``0x00000001`` is a fake value used by BPF for the
+ * instruction pointer register.
+ * * ``<formatted msg>`` is the message formatted with
+ * *fmt*.
+ *
+ * The conversion specifiers supported by *fmt* are similar, but
+ * more limited than for printk(). They are **%d**, **%i**,
+ * **%u**, **%x**, **%ld**, **%li**, **%lu**, **%lx**, **%lld**,
+ * **%lli**, **%llu**, **%llx**, **%p**, **%s**. No modifier (size
+ * of field, padding with zeroes, etc.) is available, and the
+ * helper will return **-EINVAL** (but print nothing) if it
+ * encounters an unknown specifier.
+ *
+ * Also, note that **bpf_trace_printk**\ () is slow, and should
+ * only be used for debugging purposes. For this reason, a notice
+ * block (spanning several lines) is printed to kernel logs and
+ * states that the helper should not be used "for production use"
+ * the first time this helper is used (or more precisely, when
+ * **trace_printk**\ () buffers are allocated). For passing values
+ * to user space, perf events should be preferred.
+ * Return
+ * The number of bytes written to the buffer, or a negative error
+ * in case of failure.
+ *
+ * u32 bpf_get_prandom_u32(void)
+ * Description
+ * Get a pseudo-random number.
+ *
+ * From a security point of view, this helper uses its own
+ * pseudo-random internal state, and cannot be used to infer the
+ * seed of other random functions in the kernel. However, it is
+ * essential to note that the generator used by the helper is not
+ * cryptographically secure.
+ * Return
+ * A random 32-bit unsigned value.
+ *
+ * u32 bpf_get_smp_processor_id(void)
+ * Description
+ * Get the SMP (symmetric multiprocessing) processor id. Note that
+ * all programs run with migration disabled, which means that the
+ * SMP processor id is stable during all the execution of the
+ * program.
+ * Return
+ * The SMP id of the processor running the program.
+ *
+ * long bpf_skb_store_bytes(struct sk_buff *skb, u32 offset, const void *from, u32 len, u64 flags)
+ * Description
+ * Store *len* bytes from address *from* into the packet
+ * associated to *skb*, at *offset*. *flags* are a combination of
+ * **BPF_F_RECOMPUTE_CSUM** (automatically recompute the
+ * checksum for the packet after storing the bytes) and
+ * **BPF_F_INVALIDATE_HASH** (set *skb*\ **->hash**, *skb*\
+ * **->swhash** and *skb*\ **->l4hash** to 0).
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_l3_csum_replace(struct sk_buff *skb, u32 offset, u64 from, u64 to, u64 size)
+ * Description
+ * Recompute the layer 3 (e.g. IP) checksum for the packet
+ * associated to *skb*. Computation is incremental, so the helper
+ * must know the former value of the header field that was
+ * modified (*from*), the new value of this field (*to*), and the
+ * number of bytes (2 or 4) for this field, stored in *size*.
+ * Alternatively, it is possible to store the difference between
+ * the previous and the new values of the header field in *to*, by
+ * setting *from* and *size* to 0. For both methods, *offset*
+ * indicates the location of the IP checksum within the packet.
+ *
+ * This helper works in combination with **bpf_csum_diff**\ (),
+ * which does not update the checksum in-place, but offers more
+ * flexibility and can handle sizes larger than 2 or 4 for the
+ * checksum to update.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_l4_csum_replace(struct sk_buff *skb, u32 offset, u64 from, u64 to, u64 flags)
+ * Description
+ * Recompute the layer 4 (e.g. TCP, UDP or ICMP) checksum for the
+ * packet associated to *skb*. Computation is incremental, so the
+ * helper must know the former value of the header field that was
+ * modified (*from*), the new value of this field (*to*), and the
+ * number of bytes (2 or 4) for this field, stored on the lowest
+ * four bits of *flags*. Alternatively, it is possible to store
+ * the difference between the previous and the new values of the
+ * header field in *to*, by setting *from* and the four lowest
+ * bits of *flags* to 0. For both methods, *offset* indicates the
+ * location of the IP checksum within the packet. In addition to
+ * the size of the field, *flags* can be added (bitwise OR) actual
+ * flags. With **BPF_F_MARK_MANGLED_0**, a null checksum is left
+ * untouched (unless **BPF_F_MARK_ENFORCE** is added as well), and
+ * for updates resulting in a null checksum the value is set to
+ * **CSUM_MANGLED_0** instead. Flag **BPF_F_PSEUDO_HDR** indicates
+ * the checksum is to be computed against a pseudo-header.
+ *
+ * This helper works in combination with **bpf_csum_diff**\ (),
+ * which does not update the checksum in-place, but offers more
+ * flexibility and can handle sizes larger than 2 or 4 for the
+ * checksum to update.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_tail_call(void *ctx, struct bpf_map *prog_array_map, u32 index)
+ * Description
+ * This special helper is used to trigger a "tail call", or in
+ * other words, to jump into another eBPF program. The same stack
+ * frame is used (but values on stack and in registers for the
+ * caller are not accessible to the callee). This mechanism allows
+ * for program chaining, either for raising the maximum number of
+ * available eBPF instructions, or to execute given programs in
+ * conditional blocks. For security reasons, there is an upper
+ * limit to the number of successive tail calls that can be
+ * performed.
+ *
+ * Upon call of this helper, the program attempts to jump into a
+ * program referenced at index *index* in *prog_array_map*, a
+ * special map of type **BPF_MAP_TYPE_PROG_ARRAY**, and passes
+ * *ctx*, a pointer to the context.
+ *
+ * If the call succeeds, the kernel immediately runs the first
+ * instruction of the new program. This is not a function call,
+ * and it never returns to the previous program. If the call
+ * fails, then the helper has no effect, and the caller continues
+ * to run its subsequent instructions. A call can fail if the
+ * destination program for the jump does not exist (i.e. *index*
+ * is superior to the number of entries in *prog_array_map*), or
+ * if the maximum number of tail calls has been reached for this
+ * chain of programs. This limit is defined in the kernel by the
+ * macro **MAX_TAIL_CALL_CNT** (not accessible to user space),
+ * which is currently set to 33.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_clone_redirect(struct sk_buff *skb, u32 ifindex, u64 flags)
+ * Description
+ * Clone and redirect the packet associated to *skb* to another
+ * net device of index *ifindex*. Both ingress and egress
+ * interfaces can be used for redirection. The **BPF_F_INGRESS**
+ * value in *flags* is used to make the distinction (ingress path
+ * is selected if the flag is present, egress path otherwise).
+ * This is the only flag supported for now.
+ *
+ * In comparison with **bpf_redirect**\ () helper,
+ * **bpf_clone_redirect**\ () has the associated cost of
+ * duplicating the packet buffer, but this can be executed out of
+ * the eBPF program. Conversely, **bpf_redirect**\ () is more
+ * efficient, but it is handled through an action code where the
+ * redirection happens only after the eBPF program has returned.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * u64 bpf_get_current_pid_tgid(void)
+ * Description
+ * Get the current pid and tgid.
+ * Return
+ * A 64-bit integer containing the current tgid and pid, and
+ * created as such:
+ * *current_task*\ **->tgid << 32 \|**
+ * *current_task*\ **->pid**.
+ *
+ * u64 bpf_get_current_uid_gid(void)
+ * Description
+ * Get the current uid and gid.
+ * Return
+ * A 64-bit integer containing the current GID and UID, and
+ * created as such: *current_gid* **<< 32 \|** *current_uid*.
+ *
+ * long bpf_get_current_comm(void *buf, u32 size_of_buf)
+ * Description
+ * Copy the **comm** attribute of the current task into *buf* of
+ * *size_of_buf*. The **comm** attribute contains the name of
+ * the executable (excluding the path) for the current task. The
+ * *size_of_buf* must be strictly positive. On success, the
+ * helper makes sure that the *buf* is NUL-terminated. On failure,
+ * it is filled with zeroes.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * u32 bpf_get_cgroup_classid(struct sk_buff *skb)
+ * Description
+ * Retrieve the classid for the current task, i.e. for the net_cls
+ * cgroup to which *skb* belongs.
+ *
+ * This helper can be used on TC egress path, but not on ingress.
+ *
+ * The net_cls cgroup provides an interface to tag network packets
+ * based on a user-provided identifier for all traffic coming from
+ * the tasks belonging to the related cgroup. See also the related
+ * kernel documentation, available from the Linux sources in file
+ * *Documentation/admin-guide/cgroup-v1/net_cls.rst*.
+ *
+ * The Linux kernel has two versions for cgroups: there are
+ * cgroups v1 and cgroups v2. Both are available to users, who can
+ * use a mixture of them, but note that the net_cls cgroup is for
+ * cgroup v1 only. This makes it incompatible with BPF programs
+ * run on cgroups, which is a cgroup-v2-only feature (a socket can
+ * only hold data for one version of cgroups at a time).
+ *
+ * This helper is only available is the kernel was compiled with
+ * the **CONFIG_CGROUP_NET_CLASSID** configuration option set to
+ * "**y**" or to "**m**".
+ * Return
+ * The classid, or 0 for the default unconfigured classid.
+ *
+ * long bpf_skb_vlan_push(struct sk_buff *skb, __be16 vlan_proto, u16 vlan_tci)
+ * Description
+ * Push a *vlan_tci* (VLAN tag control information) of protocol
+ * *vlan_proto* to the packet associated to *skb*, then update
+ * the checksum. Note that if *vlan_proto* is different from
+ * **ETH_P_8021Q** and **ETH_P_8021AD**, it is considered to
+ * be **ETH_P_8021Q**.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_skb_vlan_pop(struct sk_buff *skb)
+ * Description
+ * Pop a VLAN header from the packet associated to *skb*.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_skb_get_tunnel_key(struct sk_buff *skb, struct bpf_tunnel_key *key, u32 size, u64 flags)
+ * Description
+ * Get tunnel metadata. This helper takes a pointer *key* to an
+ * empty **struct bpf_tunnel_key** of **size**, that will be
+ * filled with tunnel metadata for the packet associated to *skb*.
+ * The *flags* can be set to **BPF_F_TUNINFO_IPV6**, which
+ * indicates that the tunnel is based on IPv6 protocol instead of
+ * IPv4.
+ *
+ * The **struct bpf_tunnel_key** is an object that generalizes the
+ * principal parameters used by various tunneling protocols into a
+ * single struct. This way, it can be used to easily make a
+ * decision based on the contents of the encapsulation header,
+ * "summarized" in this struct. In particular, it holds the IP
+ * address of the remote end (IPv4 or IPv6, depending on the case)
+ * in *key*\ **->remote_ipv4** or *key*\ **->remote_ipv6**. Also,
+ * this struct exposes the *key*\ **->tunnel_id**, which is
+ * generally mapped to a VNI (Virtual Network Identifier), making
+ * it programmable together with the **bpf_skb_set_tunnel_key**\
+ * () helper.
+ *
+ * Let's imagine that the following code is part of a program
+ * attached to the TC ingress interface, on one end of a GRE
+ * tunnel, and is supposed to filter out all messages coming from
+ * remote ends with IPv4 address other than 10.0.0.1:
+ *
+ * ::
+ *
+ * int ret;
+ * struct bpf_tunnel_key key = {};
+ *
+ * ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0);
+ * if (ret < 0)
+ * return TC_ACT_SHOT; // drop packet
+ *
+ * if (key.remote_ipv4 != 0x0a000001)
+ * return TC_ACT_SHOT; // drop packet
+ *
+ * return TC_ACT_OK; // accept packet
+ *
+ * This interface can also be used with all encapsulation devices
+ * that can operate in "collect metadata" mode: instead of having
+ * one network device per specific configuration, the "collect
+ * metadata" mode only requires a single device where the
+ * configuration can be extracted from this helper.
+ *
+ * This can be used together with various tunnels such as VXLan,
+ * Geneve, GRE or IP in IP (IPIP).
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_skb_set_tunnel_key(struct sk_buff *skb, struct bpf_tunnel_key *key, u32 size, u64 flags)
+ * Description
+ * Populate tunnel metadata for packet associated to *skb.* The
+ * tunnel metadata is set to the contents of *key*, of *size*. The
+ * *flags* can be set to a combination of the following values:
+ *
+ * **BPF_F_TUNINFO_IPV6**
+ * Indicate that the tunnel is based on IPv6 protocol
+ * instead of IPv4.
+ * **BPF_F_ZERO_CSUM_TX**
+ * For IPv4 packets, add a flag to tunnel metadata
+ * indicating that checksum computation should be skipped
+ * and checksum set to zeroes.
+ * **BPF_F_DONT_FRAGMENT**
+ * Add a flag to tunnel metadata indicating that the
+ * packet should not be fragmented.
+ * **BPF_F_SEQ_NUMBER**
+ * Add a flag to tunnel metadata indicating that a
+ * sequence number should be added to tunnel header before
+ * sending the packet. This flag was added for GRE
+ * encapsulation, but might be used with other protocols
+ * as well in the future.
+ * **BPF_F_NO_TUNNEL_KEY**
+ * Add a flag to tunnel metadata indicating that no tunnel
+ * key should be set in the resulting tunnel header.
+ *
+ * Here is a typical usage on the transmit path:
+ *
+ * ::
+ *
+ * struct bpf_tunnel_key key;
+ * populate key ...
+ * bpf_skb_set_tunnel_key(skb, &key, sizeof(key), 0);
+ * bpf_clone_redirect(skb, vxlan_dev_ifindex, 0);
+ *
+ * See also the description of the **bpf_skb_get_tunnel_key**\ ()
+ * helper for additional information.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * u64 bpf_perf_event_read(struct bpf_map *map, u64 flags)
+ * Description
+ * Read the value of a perf event counter. This helper relies on a
+ * *map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. The nature of
+ * the perf event counter is selected when *map* is updated with
+ * perf event file descriptors. The *map* is an array whose size
+ * is the number of available CPUs, and each cell contains a value
+ * relative to one CPU. The value to retrieve is indicated by
+ * *flags*, that contains the index of the CPU to look up, masked
+ * with **BPF_F_INDEX_MASK**. Alternatively, *flags* can be set to
+ * **BPF_F_CURRENT_CPU** to indicate that the value for the
+ * current CPU should be retrieved.
+ *
+ * Note that before Linux 4.13, only hardware perf event can be
+ * retrieved.
+ *
+ * Also, be aware that the newer helper
+ * **bpf_perf_event_read_value**\ () is recommended over
+ * **bpf_perf_event_read**\ () in general. The latter has some ABI
+ * quirks where error and counter value are used as a return code
+ * (which is wrong to do since ranges may overlap). This issue is
+ * fixed with **bpf_perf_event_read_value**\ (), which at the same
+ * time provides more features over the **bpf_perf_event_read**\
+ * () interface. Please refer to the description of
+ * **bpf_perf_event_read_value**\ () for details.
+ * Return
+ * The value of the perf event counter read from the map, or a
+ * negative error code in case of failure.
+ *
+ * long bpf_redirect(u32 ifindex, u64 flags)
+ * Description
+ * Redirect the packet to another net device of index *ifindex*.
+ * This helper is somewhat similar to **bpf_clone_redirect**\
+ * (), except that the packet is not cloned, which provides
+ * increased performance.
+ *
+ * Except for XDP, both ingress and egress interfaces can be used
+ * for redirection. The **BPF_F_INGRESS** value in *flags* is used
+ * to make the distinction (ingress path is selected if the flag
+ * is present, egress path otherwise). Currently, XDP only
+ * supports redirection to the egress interface, and accepts no
+ * flag at all.
+ *
+ * The same effect can also be attained with the more generic
+ * **bpf_redirect_map**\ (), which uses a BPF map to store the
+ * redirect target instead of providing it directly to the helper.
+ * Return
+ * For XDP, the helper returns **XDP_REDIRECT** on success or
+ * **XDP_ABORTED** on error. For other program types, the values
+ * are **TC_ACT_REDIRECT** on success or **TC_ACT_SHOT** on
+ * error.
+ *
+ * u32 bpf_get_route_realm(struct sk_buff *skb)
+ * Description
+ * Retrieve the realm or the route, that is to say the
+ * **tclassid** field of the destination for the *skb*. The
+ * identifier retrieved is a user-provided tag, similar to the
+ * one used with the net_cls cgroup (see description for
+ * **bpf_get_cgroup_classid**\ () helper), but here this tag is
+ * held by a route (a destination entry), not by a task.
+ *
+ * Retrieving this identifier works with the clsact TC egress hook
+ * (see also **tc-bpf(8)**), or alternatively on conventional
+ * classful egress qdiscs, but not on TC ingress path. In case of
+ * clsact TC egress hook, this has the advantage that, internally,
+ * the destination entry has not been dropped yet in the transmit
+ * path. Therefore, the destination entry does not need to be
+ * artificially held via **netif_keep_dst**\ () for a classful
+ * qdisc until the *skb* is freed.
+ *
+ * This helper is available only if the kernel was compiled with
+ * **CONFIG_IP_ROUTE_CLASSID** configuration option.
+ * Return
+ * The realm of the route for the packet associated to *skb*, or 0
+ * if none was found.
+ *
+ * long bpf_perf_event_output(void *ctx, struct bpf_map *map, u64 flags, void *data, u64 size)
+ * Description
+ * Write raw *data* blob into a special BPF perf event held by
+ * *map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. This perf
+ * event must have the following attributes: **PERF_SAMPLE_RAW**
+ * as **sample_type**, **PERF_TYPE_SOFTWARE** as **type**, and
+ * **PERF_COUNT_SW_BPF_OUTPUT** as **config**.
+ *
+ * The *flags* are used to indicate the index in *map* for which
+ * the value must be put, masked with **BPF_F_INDEX_MASK**.
+ * Alternatively, *flags* can be set to **BPF_F_CURRENT_CPU**
+ * to indicate that the index of the current CPU core should be
+ * used.
+ *
+ * The value to write, of *size*, is passed through eBPF stack and
+ * pointed by *data*.
+ *
+ * The context of the program *ctx* needs also be passed to the
+ * helper.
+ *
+ * On user space, a program willing to read the values needs to
+ * call **perf_event_open**\ () on the perf event (either for
+ * one or for all CPUs) and to store the file descriptor into the
+ * *map*. This must be done before the eBPF program can send data
+ * into it. An example is available in file
+ * *samples/bpf/trace_output_user.c* in the Linux kernel source
+ * tree (the eBPF program counterpart is in
+ * *samples/bpf/trace_output_kern.c*).
+ *
+ * **bpf_perf_event_output**\ () achieves better performance
+ * than **bpf_trace_printk**\ () for sharing data with user
+ * space, and is much better suitable for streaming data from eBPF
+ * programs.
+ *
+ * Note that this helper is not restricted to tracing use cases
+ * and can be used with programs attached to TC or XDP as well,
+ * where it allows for passing data to user space listeners. Data
+ * can be:
+ *
+ * * Only custom structs,
+ * * Only the packet payload, or
+ * * A combination of both.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_skb_load_bytes(const void *skb, u32 offset, void *to, u32 len)
+ * Description
+ * This helper was provided as an easy way to load data from a
+ * packet. It can be used to load *len* bytes from *offset* from
+ * the packet associated to *skb*, into the buffer pointed by
+ * *to*.
+ *
+ * Since Linux 4.7, usage of this helper has mostly been replaced
+ * by "direct packet access", enabling packet data to be
+ * manipulated with *skb*\ **->data** and *skb*\ **->data_end**
+ * pointing respectively to the first byte of packet data and to
+ * the byte after the last byte of packet data. However, it
+ * remains useful if one wishes to read large quantities of data
+ * at once from a packet into the eBPF stack.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_get_stackid(void *ctx, struct bpf_map *map, u64 flags)
+ * Description
+ * Walk a user or a kernel stack and return its id. To achieve
+ * this, the helper needs *ctx*, which is a pointer to the context
+ * on which the tracing program is executed, and a pointer to a
+ * *map* of type **BPF_MAP_TYPE_STACK_TRACE**.
+ *
+ * The last argument, *flags*, holds the number of stack frames to
+ * skip (from 0 to 255), masked with
+ * **BPF_F_SKIP_FIELD_MASK**. The next bits can be used to set
+ * a combination of the following flags:
+ *
+ * **BPF_F_USER_STACK**
+ * Collect a user space stack instead of a kernel stack.
+ * **BPF_F_FAST_STACK_CMP**
+ * Compare stacks by hash only.
+ * **BPF_F_REUSE_STACKID**
+ * If two different stacks hash into the same *stackid*,
+ * discard the old one.
+ *
+ * The stack id retrieved is a 32 bit long integer handle which
+ * can be further combined with other data (including other stack
+ * ids) and used as a key into maps. This can be useful for
+ * generating a variety of graphs (such as flame graphs or off-cpu
+ * graphs).
+ *
+ * For walking a stack, this helper is an improvement over
+ * **bpf_probe_read**\ (), which can be used with unrolled loops
+ * but is not efficient and consumes a lot of eBPF instructions.
+ * Instead, **bpf_get_stackid**\ () can collect up to
+ * **PERF_MAX_STACK_DEPTH** both kernel and user frames. Note that
+ * this limit can be controlled with the **sysctl** program, and
+ * that it should be manually increased in order to profile long
+ * user stacks (such as stacks for Java programs). To do so, use:
+ *
+ * ::
+ *
+ * # sysctl kernel.perf_event_max_stack=<new value>
+ * Return
+ * The positive or null stack id on success, or a negative error
+ * in case of failure.
+ *
+ * s64 bpf_csum_diff(__be32 *from, u32 from_size, __be32 *to, u32 to_size, __wsum seed)
+ * Description
+ * Compute a checksum difference, from the raw buffer pointed by
+ * *from*, of length *from_size* (that must be a multiple of 4),
+ * towards the raw buffer pointed by *to*, of size *to_size*
+ * (same remark). An optional *seed* can be added to the value
+ * (this can be cascaded, the seed may come from a previous call
+ * to the helper).
+ *
+ * This is flexible enough to be used in several ways:
+ *
+ * * With *from_size* == 0, *to_size* > 0 and *seed* set to
+ * checksum, it can be used when pushing new data.
+ * * With *from_size* > 0, *to_size* == 0 and *seed* set to
+ * checksum, it can be used when removing data from a packet.
+ * * With *from_size* > 0, *to_size* > 0 and *seed* set to 0, it
+ * can be used to compute a diff. Note that *from_size* and
+ * *to_size* do not need to be equal.
+ *
+ * This helper can be used in combination with
+ * **bpf_l3_csum_replace**\ () and **bpf_l4_csum_replace**\ (), to
+ * which one can feed in the difference computed with
+ * **bpf_csum_diff**\ ().
+ * Return
+ * The checksum result, or a negative error code in case of
+ * failure.
+ *
+ * long bpf_skb_get_tunnel_opt(struct sk_buff *skb, void *opt, u32 size)
+ * Description
+ * Retrieve tunnel options metadata for the packet associated to
+ * *skb*, and store the raw tunnel option data to the buffer *opt*
+ * of *size*.
+ *
+ * This helper can be used with encapsulation devices that can
+ * operate in "collect metadata" mode (please refer to the related
+ * note in the description of **bpf_skb_get_tunnel_key**\ () for
+ * more details). A particular example where this can be used is
+ * in combination with the Geneve encapsulation protocol, where it
+ * allows for pushing (with **bpf_skb_get_tunnel_opt**\ () helper)
+ * and retrieving arbitrary TLVs (Type-Length-Value headers) from
+ * the eBPF program. This allows for full customization of these
+ * headers.
+ * Return
+ * The size of the option data retrieved.
+ *
+ * long bpf_skb_set_tunnel_opt(struct sk_buff *skb, void *opt, u32 size)
+ * Description
+ * Set tunnel options metadata for the packet associated to *skb*
+ * to the option data contained in the raw buffer *opt* of *size*.
+ *
+ * See also the description of the **bpf_skb_get_tunnel_opt**\ ()
+ * helper for additional information.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_skb_change_proto(struct sk_buff *skb, __be16 proto, u64 flags)
+ * Description
+ * Change the protocol of the *skb* to *proto*. Currently
+ * supported are transition from IPv4 to IPv6, and from IPv6 to
+ * IPv4. The helper takes care of the groundwork for the
+ * transition, including resizing the socket buffer. The eBPF
+ * program is expected to fill the new headers, if any, via
+ * **skb_store_bytes**\ () and to recompute the checksums with
+ * **bpf_l3_csum_replace**\ () and **bpf_l4_csum_replace**\
+ * (). The main case for this helper is to perform NAT64
+ * operations out of an eBPF program.
+ *
+ * Internally, the GSO type is marked as dodgy so that headers are
+ * checked and segments are recalculated by the GSO/GRO engine.
+ * The size for GSO target is adapted as well.
+ *
+ * All values for *flags* are reserved for future usage, and must
+ * be left at zero.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_skb_change_type(struct sk_buff *skb, u32 type)
+ * Description
+ * Change the packet type for the packet associated to *skb*. This
+ * comes down to setting *skb*\ **->pkt_type** to *type*, except
+ * the eBPF program does not have a write access to *skb*\
+ * **->pkt_type** beside this helper. Using a helper here allows
+ * for graceful handling of errors.
+ *
+ * The major use case is to change incoming *skb*s to
+ * **PACKET_HOST** in a programmatic way instead of having to
+ * recirculate via **redirect**\ (..., **BPF_F_INGRESS**), for
+ * example.
+ *
+ * Note that *type* only allows certain values. At this time, they
+ * are:
+ *
+ * **PACKET_HOST**
+ * Packet is for us.
+ * **PACKET_BROADCAST**
+ * Send packet to all.
+ * **PACKET_MULTICAST**
+ * Send packet to group.
+ * **PACKET_OTHERHOST**
+ * Send packet to someone else.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_skb_under_cgroup(struct sk_buff *skb, struct bpf_map *map, u32 index)
+ * Description
+ * Check whether *skb* is a descendant of the cgroup2 held by
+ * *map* of type **BPF_MAP_TYPE_CGROUP_ARRAY**, at *index*.
+ * Return
+ * The return value depends on the result of the test, and can be:
+ *
+ * * 0, if the *skb* failed the cgroup2 descendant test.
+ * * 1, if the *skb* succeeded the cgroup2 descendant test.
+ * * A negative error code, if an error occurred.
+ *
+ * u32 bpf_get_hash_recalc(struct sk_buff *skb)
+ * Description
+ * Retrieve the hash of the packet, *skb*\ **->hash**. If it is
+ * not set, in particular if the hash was cleared due to mangling,
+ * recompute this hash. Later accesses to the hash can be done
+ * directly with *skb*\ **->hash**.
+ *
+ * Calling **bpf_set_hash_invalid**\ (), changing a packet
+ * prototype with **bpf_skb_change_proto**\ (), or calling
+ * **bpf_skb_store_bytes**\ () with the
+ * **BPF_F_INVALIDATE_HASH** are actions susceptible to clear
+ * the hash and to trigger a new computation for the next call to
+ * **bpf_get_hash_recalc**\ ().
+ * Return
+ * The 32-bit hash.
+ *
+ * u64 bpf_get_current_task(void)
+ * Description
+ * Get the current task.
+ * Return
+ * A pointer to the current task struct.
+ *
+ * long bpf_probe_write_user(void *dst, const void *src, u32 len)
+ * Description
+ * Attempt in a safe way to write *len* bytes from the buffer
+ * *src* to *dst* in memory. It only works for threads that are in
+ * user context, and *dst* must be a valid user space address.
+ *
+ * This helper should not be used to implement any kind of
+ * security mechanism because of TOC-TOU attacks, but rather to
+ * debug, divert, and manipulate execution of semi-cooperative
+ * processes.
+ *
+ * Keep in mind that this feature is meant for experiments, and it
+ * has a risk of crashing the system and running programs.
+ * Therefore, when an eBPF program using this helper is attached,
+ * a warning including PID and process name is printed to kernel
+ * logs.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_current_task_under_cgroup(struct bpf_map *map, u32 index)
+ * Description
+ * Check whether the probe is being run is the context of a given
+ * subset of the cgroup2 hierarchy. The cgroup2 to test is held by
+ * *map* of type **BPF_MAP_TYPE_CGROUP_ARRAY**, at *index*.
+ * Return
+ * The return value depends on the result of the test, and can be:
+ *
+ * * 1, if current task belongs to the cgroup2.
+ * * 0, if current task does not belong to the cgroup2.
+ * * A negative error code, if an error occurred.
+ *
+ * long bpf_skb_change_tail(struct sk_buff *skb, u32 len, u64 flags)
+ * Description
+ * Resize (trim or grow) the packet associated to *skb* to the
+ * new *len*. The *flags* are reserved for future usage, and must
+ * be left at zero.
+ *
+ * The basic idea is that the helper performs the needed work to
+ * change the size of the packet, then the eBPF program rewrites
+ * the rest via helpers like **bpf_skb_store_bytes**\ (),
+ * **bpf_l3_csum_replace**\ (), **bpf_l3_csum_replace**\ ()
+ * and others. This helper is a slow path utility intended for
+ * replies with control messages. And because it is targeted for
+ * slow path, the helper itself can afford to be slow: it
+ * implicitly linearizes, unclones and drops offloads from the
+ * *skb*.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_skb_pull_data(struct sk_buff *skb, u32 len)
+ * Description
+ * Pull in non-linear data in case the *skb* is non-linear and not
+ * all of *len* are part of the linear section. Make *len* bytes
+ * from *skb* readable and writable. If a zero value is passed for
+ * *len*, then all bytes in the linear part of *skb* will be made
+ * readable and writable.
+ *
+ * This helper is only needed for reading and writing with direct
+ * packet access.
+ *
+ * For direct packet access, testing that offsets to access
+ * are within packet boundaries (test on *skb*\ **->data_end**) is
+ * susceptible to fail if offsets are invalid, or if the requested
+ * data is in non-linear parts of the *skb*. On failure the
+ * program can just bail out, or in the case of a non-linear
+ * buffer, use a helper to make the data available. The
+ * **bpf_skb_load_bytes**\ () helper is a first solution to access
+ * the data. Another one consists in using **bpf_skb_pull_data**
+ * to pull in once the non-linear parts, then retesting and
+ * eventually access the data.
+ *
+ * At the same time, this also makes sure the *skb* is uncloned,
+ * which is a necessary condition for direct write. As this needs
+ * to be an invariant for the write part only, the verifier
+ * detects writes and adds a prologue that is calling
+ * **bpf_skb_pull_data()** to effectively unclone the *skb* from
+ * the very beginning in case it is indeed cloned.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * s64 bpf_csum_update(struct sk_buff *skb, __wsum csum)
+ * Description
+ * Add the checksum *csum* into *skb*\ **->csum** in case the
+ * driver has supplied a checksum for the entire packet into that
+ * field. Return an error otherwise. This helper is intended to be
+ * used in combination with **bpf_csum_diff**\ (), in particular
+ * when the checksum needs to be updated after data has been
+ * written into the packet through direct packet access.
+ * Return
+ * The checksum on success, or a negative error code in case of
+ * failure.
+ *
+ * void bpf_set_hash_invalid(struct sk_buff *skb)
+ * Description
+ * Invalidate the current *skb*\ **->hash**. It can be used after
+ * mangling on headers through direct packet access, in order to
+ * indicate that the hash is outdated and to trigger a
+ * recalculation the next time the kernel tries to access this
+ * hash or when the **bpf_get_hash_recalc**\ () helper is called.
+ * Return
+ * void.
+ *
+ * long bpf_get_numa_node_id(void)
+ * Description
+ * Return the id of the current NUMA node. The primary use case
+ * for this helper is the selection of sockets for the local NUMA
+ * node, when the program is attached to sockets using the
+ * **SO_ATTACH_REUSEPORT_EBPF** option (see also **socket(7)**),
+ * but the helper is also available to other eBPF program types,
+ * similarly to **bpf_get_smp_processor_id**\ ().
+ * Return
+ * The id of current NUMA node.
+ *
+ * long bpf_skb_change_head(struct sk_buff *skb, u32 len, u64 flags)
+ * Description
+ * Grows headroom of packet associated to *skb* and adjusts the
+ * offset of the MAC header accordingly, adding *len* bytes of
+ * space. It automatically extends and reallocates memory as
+ * required.
+ *
+ * This helper can be used on a layer 3 *skb* to push a MAC header
+ * for redirection into a layer 2 device.
+ *
+ * All values for *flags* are reserved for future usage, and must
+ * be left at zero.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_xdp_adjust_head(struct xdp_buff *xdp_md, int delta)
+ * Description
+ * Adjust (move) *xdp_md*\ **->data** by *delta* bytes. Note that
+ * it is possible to use a negative value for *delta*. This helper
+ * can be used to prepare the packet for pushing or popping
+ * headers.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_probe_read_str(void *dst, u32 size, const void *unsafe_ptr)
+ * Description
+ * Copy a NUL terminated string from an unsafe kernel address
+ * *unsafe_ptr* to *dst*. See **bpf_probe_read_kernel_str**\ () for
+ * more details.
+ *
+ * Generally, use **bpf_probe_read_user_str**\ () or
+ * **bpf_probe_read_kernel_str**\ () instead.
+ * Return
+ * On success, the strictly positive length of the string,
+ * including the trailing NUL character. On error, a negative
+ * value.
+ *
+ * u64 bpf_get_socket_cookie(struct sk_buff *skb)
+ * Description
+ * If the **struct sk_buff** pointed by *skb* has a known socket,
+ * retrieve the cookie (generated by the kernel) of this socket.
+ * If no cookie has been set yet, generate a new cookie. Once
+ * generated, the socket cookie remains stable for the life of the
+ * socket. This helper can be useful for monitoring per socket
+ * networking traffic statistics as it provides a global socket
+ * identifier that can be assumed unique.
+ * Return
+ * A 8-byte long unique number on success, or 0 if the socket
+ * field is missing inside *skb*.
+ *
+ * u64 bpf_get_socket_cookie(struct bpf_sock_addr *ctx)
+ * Description
+ * Equivalent to bpf_get_socket_cookie() helper that accepts
+ * *skb*, but gets socket from **struct bpf_sock_addr** context.
+ * Return
+ * A 8-byte long unique number.
+ *
+ * u64 bpf_get_socket_cookie(struct bpf_sock_ops *ctx)
+ * Description
+ * Equivalent to **bpf_get_socket_cookie**\ () helper that accepts
+ * *skb*, but gets socket from **struct bpf_sock_ops** context.
+ * Return
+ * A 8-byte long unique number.
+ *
+ * u64 bpf_get_socket_cookie(struct sock *sk)
+ * Description
+ * Equivalent to **bpf_get_socket_cookie**\ () helper that accepts
+ * *sk*, but gets socket from a BTF **struct sock**. This helper
+ * also works for sleepable programs.
+ * Return
+ * A 8-byte long unique number or 0 if *sk* is NULL.
+ *
+ * u32 bpf_get_socket_uid(struct sk_buff *skb)
+ * Description
+ * Get the owner UID of the socked associated to *skb*.
+ * Return
+ * The owner UID of the socket associated to *skb*. If the socket
+ * is **NULL**, or if it is not a full socket (i.e. if it is a
+ * time-wait or a request socket instead), **overflowuid** value
+ * is returned (note that **overflowuid** might also be the actual
+ * UID value for the socket).
+ *
+ * long bpf_set_hash(struct sk_buff *skb, u32 hash)
+ * Description
+ * Set the full hash for *skb* (set the field *skb*\ **->hash**)
+ * to value *hash*.
+ * Return
+ * 0
+ *
+ * long bpf_setsockopt(void *bpf_socket, int level, int optname, void *optval, int optlen)
+ * Description
+ * Emulate a call to **setsockopt()** on the socket associated to
+ * *bpf_socket*, which must be a full socket. The *level* at
+ * which the option resides and the name *optname* of the option
+ * must be specified, see **setsockopt(2)** for more information.
+ * The option value of length *optlen* is pointed by *optval*.
+ *
+ * *bpf_socket* should be one of the following:
+ *
+ * * **struct bpf_sock_ops** for **BPF_PROG_TYPE_SOCK_OPS**.
+ * * **struct bpf_sock_addr** for **BPF_CGROUP_INET4_CONNECT**
+ * and **BPF_CGROUP_INET6_CONNECT**.
+ *
+ * This helper actually implements a subset of **setsockopt()**.
+ * It supports the following *level*\ s:
+ *
+ * * **SOL_SOCKET**, which supports the following *optname*\ s:
+ * **SO_RCVBUF**, **SO_SNDBUF**, **SO_MAX_PACING_RATE**,
+ * **SO_PRIORITY**, **SO_RCVLOWAT**, **SO_MARK**,
+ * **SO_BINDTODEVICE**, **SO_KEEPALIVE**, **SO_REUSEADDR**,
+ * **SO_REUSEPORT**, **SO_BINDTOIFINDEX**, **SO_TXREHASH**.
+ * * **IPPROTO_TCP**, which supports the following *optname*\ s:
+ * **TCP_CONGESTION**, **TCP_BPF_IW**,
+ * **TCP_BPF_SNDCWND_CLAMP**, **TCP_SAVE_SYN**,
+ * **TCP_KEEPIDLE**, **TCP_KEEPINTVL**, **TCP_KEEPCNT**,
+ * **TCP_SYNCNT**, **TCP_USER_TIMEOUT**, **TCP_NOTSENT_LOWAT**,
+ * **TCP_NODELAY**, **TCP_MAXSEG**, **TCP_WINDOW_CLAMP**,
+ * **TCP_THIN_LINEAR_TIMEOUTS**, **TCP_BPF_DELACK_MAX**,
+ * **TCP_BPF_RTO_MIN**.
+ * * **IPPROTO_IP**, which supports *optname* **IP_TOS**.
+ * * **IPPROTO_IPV6**, which supports the following *optname*\ s:
+ * **IPV6_TCLASS**, **IPV6_AUTOFLOWLABEL**.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_skb_adjust_room(struct sk_buff *skb, s32 len_diff, u32 mode, u64 flags)
+ * Description
+ * Grow or shrink the room for data in the packet associated to
+ * *skb* by *len_diff*, and according to the selected *mode*.
+ *
+ * By default, the helper will reset any offloaded checksum
+ * indicator of the skb to CHECKSUM_NONE. This can be avoided
+ * by the following flag:
+ *
+ * * **BPF_F_ADJ_ROOM_NO_CSUM_RESET**: Do not reset offloaded
+ * checksum data of the skb to CHECKSUM_NONE.
+ *
+ * There are two supported modes at this time:
+ *
+ * * **BPF_ADJ_ROOM_MAC**: Adjust room at the mac layer
+ * (room space is added or removed between the layer 2 and
+ * layer 3 headers).
+ *
+ * * **BPF_ADJ_ROOM_NET**: Adjust room at the network layer
+ * (room space is added or removed between the layer 3 and
+ * layer 4 headers).
+ *
+ * The following flags are supported at this time:
+ *
+ * * **BPF_F_ADJ_ROOM_FIXED_GSO**: Do not adjust gso_size.
+ * Adjusting mss in this way is not allowed for datagrams.
+ *
+ * * **BPF_F_ADJ_ROOM_ENCAP_L3_IPV4**,
+ * **BPF_F_ADJ_ROOM_ENCAP_L3_IPV6**:
+ * Any new space is reserved to hold a tunnel header.
+ * Configure skb offsets and other fields accordingly.
+ *
+ * * **BPF_F_ADJ_ROOM_ENCAP_L4_GRE**,
+ * **BPF_F_ADJ_ROOM_ENCAP_L4_UDP**:
+ * Use with ENCAP_L3 flags to further specify the tunnel type.
+ *
+ * * **BPF_F_ADJ_ROOM_ENCAP_L2**\ (*len*):
+ * Use with ENCAP_L3/L4 flags to further specify the tunnel
+ * type; *len* is the length of the inner MAC header.
+ *
+ * * **BPF_F_ADJ_ROOM_ENCAP_L2_ETH**:
+ * Use with BPF_F_ADJ_ROOM_ENCAP_L2 flag to further specify the
+ * L2 type as Ethernet.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_redirect_map(struct bpf_map *map, u64 key, u64 flags)
+ * Description
+ * Redirect the packet to the endpoint referenced by *map* at
+ * index *key*. Depending on its type, this *map* can contain
+ * references to net devices (for forwarding packets through other
+ * ports), or to CPUs (for redirecting XDP frames to another CPU;
+ * but this is only implemented for native XDP (with driver
+ * support) as of this writing).
+ *
+ * The lower two bits of *flags* are used as the return code if
+ * the map lookup fails. This is so that the return value can be
+ * one of the XDP program return codes up to **XDP_TX**, as chosen
+ * by the caller. The higher bits of *flags* can be set to
+ * BPF_F_BROADCAST or BPF_F_EXCLUDE_INGRESS as defined below.
+ *
+ * With BPF_F_BROADCAST the packet will be broadcasted to all the
+ * interfaces in the map, with BPF_F_EXCLUDE_INGRESS the ingress
+ * interface will be excluded when do broadcasting.
+ *
+ * See also **bpf_redirect**\ (), which only supports redirecting
+ * to an ifindex, but doesn't require a map to do so.
+ * Return
+ * **XDP_REDIRECT** on success, or the value of the two lower bits
+ * of the *flags* argument on error.
+ *
+ * long bpf_sk_redirect_map(struct sk_buff *skb, struct bpf_map *map, u32 key, u64 flags)
+ * Description
+ * Redirect the packet to the socket referenced by *map* (of type
+ * **BPF_MAP_TYPE_SOCKMAP**) at index *key*. Both ingress and
+ * egress interfaces can be used for redirection. The
+ * **BPF_F_INGRESS** value in *flags* is used to make the
+ * distinction (ingress path is selected if the flag is present,
+ * egress path otherwise). This is the only flag supported for now.
+ * Return
+ * **SK_PASS** on success, or **SK_DROP** on error.
+ *
+ * long bpf_sock_map_update(struct bpf_sock_ops *skops, struct bpf_map *map, void *key, u64 flags)
+ * Description
+ * Add an entry to, or update a *map* referencing sockets. The
+ * *skops* is used as a new value for the entry associated to
+ * *key*. *flags* is one of:
+ *
+ * **BPF_NOEXIST**
+ * The entry for *key* must not exist in the map.
+ * **BPF_EXIST**
+ * The entry for *key* must already exist in the map.
+ * **BPF_ANY**
+ * No condition on the existence of the entry for *key*.
+ *
+ * If the *map* has eBPF programs (parser and verdict), those will
+ * be inherited by the socket being added. If the socket is
+ * already attached to eBPF programs, this results in an error.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_xdp_adjust_meta(struct xdp_buff *xdp_md, int delta)
+ * Description
+ * Adjust the address pointed by *xdp_md*\ **->data_meta** by
+ * *delta* (which can be positive or negative). Note that this
+ * operation modifies the address stored in *xdp_md*\ **->data**,
+ * so the latter must be loaded only after the helper has been
+ * called.
+ *
+ * The use of *xdp_md*\ **->data_meta** is optional and programs
+ * are not required to use it. The rationale is that when the
+ * packet is processed with XDP (e.g. as DoS filter), it is
+ * possible to push further meta data along with it before passing
+ * to the stack, and to give the guarantee that an ingress eBPF
+ * program attached as a TC classifier on the same device can pick
+ * this up for further post-processing. Since TC works with socket
+ * buffers, it remains possible to set from XDP the **mark** or
+ * **priority** pointers, or other pointers for the socket buffer.
+ * Having this scratch space generic and programmable allows for
+ * more flexibility as the user is free to store whatever meta
+ * data they need.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_perf_event_read_value(struct bpf_map *map, u64 flags, struct bpf_perf_event_value *buf, u32 buf_size)
+ * Description
+ * Read the value of a perf event counter, and store it into *buf*
+ * of size *buf_size*. This helper relies on a *map* of type
+ * **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. The nature of the perf event
+ * counter is selected when *map* is updated with perf event file
+ * descriptors. The *map* is an array whose size is the number of
+ * available CPUs, and each cell contains a value relative to one
+ * CPU. The value to retrieve is indicated by *flags*, that
+ * contains the index of the CPU to look up, masked with
+ * **BPF_F_INDEX_MASK**. Alternatively, *flags* can be set to
+ * **BPF_F_CURRENT_CPU** to indicate that the value for the
+ * current CPU should be retrieved.
+ *
+ * This helper behaves in a way close to
+ * **bpf_perf_event_read**\ () helper, save that instead of
+ * just returning the value observed, it fills the *buf*
+ * structure. This allows for additional data to be retrieved: in
+ * particular, the enabled and running times (in *buf*\
+ * **->enabled** and *buf*\ **->running**, respectively) are
+ * copied. In general, **bpf_perf_event_read_value**\ () is
+ * recommended over **bpf_perf_event_read**\ (), which has some
+ * ABI issues and provides fewer functionalities.
+ *
+ * These values are interesting, because hardware PMU (Performance
+ * Monitoring Unit) counters are limited resources. When there are
+ * more PMU based perf events opened than available counters,
+ * kernel will multiplex these events so each event gets certain
+ * percentage (but not all) of the PMU time. In case that
+ * multiplexing happens, the number of samples or counter value
+ * will not reflect the case compared to when no multiplexing
+ * occurs. This makes comparison between different runs difficult.
+ * Typically, the counter value should be normalized before
+ * comparing to other experiments. The usual normalization is done
+ * as follows.
+ *
+ * ::
+ *
+ * normalized_counter = counter * t_enabled / t_running
+ *
+ * Where t_enabled is the time enabled for event and t_running is
+ * the time running for event since last normalization. The
+ * enabled and running times are accumulated since the perf event
+ * open. To achieve scaling factor between two invocations of an
+ * eBPF program, users can use CPU id as the key (which is
+ * typical for perf array usage model) to remember the previous
+ * value and do the calculation inside the eBPF program.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_perf_prog_read_value(struct bpf_perf_event_data *ctx, struct bpf_perf_event_value *buf, u32 buf_size)
+ * Description
+ * For en eBPF program attached to a perf event, retrieve the
+ * value of the event counter associated to *ctx* and store it in
+ * the structure pointed by *buf* and of size *buf_size*. Enabled
+ * and running times are also stored in the structure (see
+ * description of helper **bpf_perf_event_read_value**\ () for
+ * more details).
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_getsockopt(void *bpf_socket, int level, int optname, void *optval, int optlen)
+ * Description
+ * Emulate a call to **getsockopt()** on the socket associated to
+ * *bpf_socket*, which must be a full socket. The *level* at
+ * which the option resides and the name *optname* of the option
+ * must be specified, see **getsockopt(2)** for more information.
+ * The retrieved value is stored in the structure pointed by
+ * *opval* and of length *optlen*.
+ *
+ * *bpf_socket* should be one of the following:
+ *
+ * * **struct bpf_sock_ops** for **BPF_PROG_TYPE_SOCK_OPS**.
+ * * **struct bpf_sock_addr** for **BPF_CGROUP_INET4_CONNECT**
+ * and **BPF_CGROUP_INET6_CONNECT**.
+ *
+ * This helper actually implements a subset of **getsockopt()**.
+ * It supports the same set of *optname*\ s that is supported by
+ * the **bpf_setsockopt**\ () helper. The exceptions are
+ * **TCP_BPF_*** is **bpf_setsockopt**\ () only and
+ * **TCP_SAVED_SYN** is **bpf_getsockopt**\ () only.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_override_return(struct pt_regs *regs, u64 rc)
+ * Description
+ * Used for error injection, this helper uses kprobes to override
+ * the return value of the probed function, and to set it to *rc*.
+ * The first argument is the context *regs* on which the kprobe
+ * works.
+ *
+ * This helper works by setting the PC (program counter)
+ * to an override function which is run in place of the original
+ * probed function. This means the probed function is not run at
+ * all. The replacement function just returns with the required
+ * value.
+ *
+ * This helper has security implications, and thus is subject to
+ * restrictions. It is only available if the kernel was compiled
+ * with the **CONFIG_BPF_KPROBE_OVERRIDE** configuration
+ * option, and in this case it only works on functions tagged with
+ * **ALLOW_ERROR_INJECTION** in the kernel code.
+ *
+ * Also, the helper is only available for the architectures having
+ * the CONFIG_FUNCTION_ERROR_INJECTION option. As of this writing,
+ * x86 architecture is the only one to support this feature.
+ * Return
+ * 0
+ *
+ * long bpf_sock_ops_cb_flags_set(struct bpf_sock_ops *bpf_sock, int argval)
+ * Description
+ * Attempt to set the value of the **bpf_sock_ops_cb_flags** field
+ * for the full TCP socket associated to *bpf_sock_ops* to
+ * *argval*.
+ *
+ * The primary use of this field is to determine if there should
+ * be calls to eBPF programs of type
+ * **BPF_PROG_TYPE_SOCK_OPS** at various points in the TCP
+ * code. A program of the same type can change its value, per
+ * connection and as necessary, when the connection is
+ * established. This field is directly accessible for reading, but
+ * this helper must be used for updates in order to return an
+ * error if an eBPF program tries to set a callback that is not
+ * supported in the current kernel.
+ *
+ * *argval* is a flag array which can combine these flags:
+ *
+ * * **BPF_SOCK_OPS_RTO_CB_FLAG** (retransmission time out)
+ * * **BPF_SOCK_OPS_RETRANS_CB_FLAG** (retransmission)
+ * * **BPF_SOCK_OPS_STATE_CB_FLAG** (TCP state change)
+ * * **BPF_SOCK_OPS_RTT_CB_FLAG** (every RTT)
+ *
+ * Therefore, this function can be used to clear a callback flag by
+ * setting the appropriate bit to zero. e.g. to disable the RTO
+ * callback:
+ *
+ * **bpf_sock_ops_cb_flags_set(bpf_sock,**
+ * **bpf_sock->bpf_sock_ops_cb_flags & ~BPF_SOCK_OPS_RTO_CB_FLAG)**
+ *
+ * Here are some examples of where one could call such eBPF
+ * program:
+ *
+ * * When RTO fires.
+ * * When a packet is retransmitted.
+ * * When the connection terminates.
+ * * When a packet is sent.
+ * * When a packet is received.
+ * Return
+ * Code **-EINVAL** if the socket is not a full TCP socket;
+ * otherwise, a positive number containing the bits that could not
+ * be set is returned (which comes down to 0 if all bits were set
+ * as required).
+ *
+ * long bpf_msg_redirect_map(struct sk_msg_buff *msg, struct bpf_map *map, u32 key, u64 flags)
+ * Description
+ * This helper is used in programs implementing policies at the
+ * socket level. If the message *msg* is allowed to pass (i.e. if
+ * the verdict eBPF program returns **SK_PASS**), redirect it to
+ * the socket referenced by *map* (of type
+ * **BPF_MAP_TYPE_SOCKMAP**) at index *key*. Both ingress and
+ * egress interfaces can be used for redirection. The
+ * **BPF_F_INGRESS** value in *flags* is used to make the
+ * distinction (ingress path is selected if the flag is present,
+ * egress path otherwise). This is the only flag supported for now.
+ * Return
+ * **SK_PASS** on success, or **SK_DROP** on error.
+ *
+ * long bpf_msg_apply_bytes(struct sk_msg_buff *msg, u32 bytes)
+ * Description
+ * For socket policies, apply the verdict of the eBPF program to
+ * the next *bytes* (number of bytes) of message *msg*.
+ *
+ * For example, this helper can be used in the following cases:
+ *
+ * * A single **sendmsg**\ () or **sendfile**\ () system call
+ * contains multiple logical messages that the eBPF program is
+ * supposed to read and for which it should apply a verdict.
+ * * An eBPF program only cares to read the first *bytes* of a
+ * *msg*. If the message has a large payload, then setting up
+ * and calling the eBPF program repeatedly for all bytes, even
+ * though the verdict is already known, would create unnecessary
+ * overhead.
+ *
+ * When called from within an eBPF program, the helper sets a
+ * counter internal to the BPF infrastructure, that is used to
+ * apply the last verdict to the next *bytes*. If *bytes* is
+ * smaller than the current data being processed from a
+ * **sendmsg**\ () or **sendfile**\ () system call, the first
+ * *bytes* will be sent and the eBPF program will be re-run with
+ * the pointer for start of data pointing to byte number *bytes*
+ * **+ 1**. If *bytes* is larger than the current data being
+ * processed, then the eBPF verdict will be applied to multiple
+ * **sendmsg**\ () or **sendfile**\ () calls until *bytes* are
+ * consumed.
+ *
+ * Note that if a socket closes with the internal counter holding
+ * a non-zero value, this is not a problem because data is not
+ * being buffered for *bytes* and is sent as it is received.
+ * Return
+ * 0
+ *
+ * long bpf_msg_cork_bytes(struct sk_msg_buff *msg, u32 bytes)
+ * Description
+ * For socket policies, prevent the execution of the verdict eBPF
+ * program for message *msg* until *bytes* (byte number) have been
+ * accumulated.
+ *
+ * This can be used when one needs a specific number of bytes
+ * before a verdict can be assigned, even if the data spans
+ * multiple **sendmsg**\ () or **sendfile**\ () calls. The extreme
+ * case would be a user calling **sendmsg**\ () repeatedly with
+ * 1-byte long message segments. Obviously, this is bad for
+ * performance, but it is still valid. If the eBPF program needs
+ * *bytes* bytes to validate a header, this helper can be used to
+ * prevent the eBPF program to be called again until *bytes* have
+ * been accumulated.
+ * Return
+ * 0
+ *
+ * long bpf_msg_pull_data(struct sk_msg_buff *msg, u32 start, u32 end, u64 flags)
+ * Description
+ * For socket policies, pull in non-linear data from user space
+ * for *msg* and set pointers *msg*\ **->data** and *msg*\
+ * **->data_end** to *start* and *end* bytes offsets into *msg*,
+ * respectively.
+ *
+ * If a program of type **BPF_PROG_TYPE_SK_MSG** is run on a
+ * *msg* it can only parse data that the (**data**, **data_end**)
+ * pointers have already consumed. For **sendmsg**\ () hooks this
+ * is likely the first scatterlist element. But for calls relying
+ * on the **sendpage** handler (e.g. **sendfile**\ ()) this will
+ * be the range (**0**, **0**) because the data is shared with
+ * user space and by default the objective is to avoid allowing
+ * user space to modify data while (or after) eBPF verdict is
+ * being decided. This helper can be used to pull in data and to
+ * set the start and end pointer to given values. Data will be
+ * copied if necessary (i.e. if data was not linear and if start
+ * and end pointers do not point to the same chunk).
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * All values for *flags* are reserved for future usage, and must
+ * be left at zero.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_bind(struct bpf_sock_addr *ctx, struct sockaddr *addr, int addr_len)
+ * Description
+ * Bind the socket associated to *ctx* to the address pointed by
+ * *addr*, of length *addr_len*. This allows for making outgoing
+ * connection from the desired IP address, which can be useful for
+ * example when all processes inside a cgroup should use one
+ * single IP address on a host that has multiple IP configured.
+ *
+ * This helper works for IPv4 and IPv6, TCP and UDP sockets. The
+ * domain (*addr*\ **->sa_family**) must be **AF_INET** (or
+ * **AF_INET6**). It's advised to pass zero port (**sin_port**
+ * or **sin6_port**) which triggers IP_BIND_ADDRESS_NO_PORT-like
+ * behavior and lets the kernel efficiently pick up an unused
+ * port as long as 4-tuple is unique. Passing non-zero port might
+ * lead to degraded performance.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_xdp_adjust_tail(struct xdp_buff *xdp_md, int delta)
+ * Description
+ * Adjust (move) *xdp_md*\ **->data_end** by *delta* bytes. It is
+ * possible to both shrink and grow the packet tail.
+ * Shrink done via *delta* being a negative integer.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_skb_get_xfrm_state(struct sk_buff *skb, u32 index, struct bpf_xfrm_state *xfrm_state, u32 size, u64 flags)
+ * Description
+ * Retrieve the XFRM state (IP transform framework, see also
+ * **ip-xfrm(8)**) at *index* in XFRM "security path" for *skb*.
+ *
+ * The retrieved value is stored in the **struct bpf_xfrm_state**
+ * pointed by *xfrm_state* and of length *size*.
+ *
+ * All values for *flags* are reserved for future usage, and must
+ * be left at zero.
+ *
+ * This helper is available only if the kernel was compiled with
+ * **CONFIG_XFRM** configuration option.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_get_stack(void *ctx, void *buf, u32 size, u64 flags)
+ * Description
+ * Return a user or a kernel stack in bpf program provided buffer.
+ * To achieve this, the helper needs *ctx*, which is a pointer
+ * to the context on which the tracing program is executed.
+ * To store the stacktrace, the bpf program provides *buf* with
+ * a nonnegative *size*.
+ *
+ * The last argument, *flags*, holds the number of stack frames to
+ * skip (from 0 to 255), masked with
+ * **BPF_F_SKIP_FIELD_MASK**. The next bits can be used to set
+ * the following flags:
+ *
+ * **BPF_F_USER_STACK**
+ * Collect a user space stack instead of a kernel stack.
+ * **BPF_F_USER_BUILD_ID**
+ * Collect (build_id, file_offset) instead of ips for user
+ * stack, only valid if **BPF_F_USER_STACK** is also
+ * specified.
+ *
+ * *file_offset* is an offset relative to the beginning
+ * of the executable or shared object file backing the vma
+ * which the *ip* falls in. It is *not* an offset relative
+ * to that object's base address. Accordingly, it must be
+ * adjusted by adding (sh_addr - sh_offset), where
+ * sh_{addr,offset} correspond to the executable section
+ * containing *file_offset* in the object, for comparisons
+ * to symbols' st_value to be valid.
+ *
+ * **bpf_get_stack**\ () can collect up to
+ * **PERF_MAX_STACK_DEPTH** both kernel and user frames, subject
+ * to sufficient large buffer size. Note that
+ * this limit can be controlled with the **sysctl** program, and
+ * that it should be manually increased in order to profile long
+ * user stacks (such as stacks for Java programs). To do so, use:
+ *
+ * ::
+ *
+ * # sysctl kernel.perf_event_max_stack=<new value>
+ * Return
+ * The non-negative copied *buf* length equal to or less than
+ * *size* on success, or a negative error in case of failure.
+ *
+ * long bpf_skb_load_bytes_relative(const void *skb, u32 offset, void *to, u32 len, u32 start_header)
+ * Description
+ * This helper is similar to **bpf_skb_load_bytes**\ () in that
+ * it provides an easy way to load *len* bytes from *offset*
+ * from the packet associated to *skb*, into the buffer pointed
+ * by *to*. The difference to **bpf_skb_load_bytes**\ () is that
+ * a fifth argument *start_header* exists in order to select a
+ * base offset to start from. *start_header* can be one of:
+ *
+ * **BPF_HDR_START_MAC**
+ * Base offset to load data from is *skb*'s mac header.
+ * **BPF_HDR_START_NET**
+ * Base offset to load data from is *skb*'s network header.
+ *
+ * In general, "direct packet access" is the preferred method to
+ * access packet data, however, this helper is in particular useful
+ * in socket filters where *skb*\ **->data** does not always point
+ * to the start of the mac header and where "direct packet access"
+ * is not available.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_fib_lookup(void *ctx, struct bpf_fib_lookup *params, int plen, u32 flags)
+ * Description
+ * Do FIB lookup in kernel tables using parameters in *params*.
+ * If lookup is successful and result shows packet is to be
+ * forwarded, the neighbor tables are searched for the nexthop.
+ * If successful (ie., FIB lookup shows forwarding and nexthop
+ * is resolved), the nexthop address is returned in ipv4_dst
+ * or ipv6_dst based on family, smac is set to mac address of
+ * egress device, dmac is set to nexthop mac address, rt_metric
+ * is set to metric from route (IPv4/IPv6 only), and ifindex
+ * is set to the device index of the nexthop from the FIB lookup.
+ *
+ * *plen* argument is the size of the passed in struct.
+ * *flags* argument can be a combination of one or more of the
+ * following values:
+ *
+ * **BPF_FIB_LOOKUP_DIRECT**
+ * Do a direct table lookup vs full lookup using FIB
+ * rules.
+ * **BPF_FIB_LOOKUP_OUTPUT**
+ * Perform lookup from an egress perspective (default is
+ * ingress).
+ *
+ * *ctx* is either **struct xdp_md** for XDP programs or
+ * **struct sk_buff** tc cls_act programs.
+ * Return
+ * * < 0 if any input argument is invalid
+ * * 0 on success (packet is forwarded, nexthop neighbor exists)
+ * * > 0 one of **BPF_FIB_LKUP_RET_** codes explaining why the
+ * packet is not forwarded or needs assist from full stack
+ *
+ * If lookup fails with BPF_FIB_LKUP_RET_FRAG_NEEDED, then the MTU
+ * was exceeded and output params->mtu_result contains the MTU.
+ *
+ * long bpf_sock_hash_update(struct bpf_sock_ops *skops, struct bpf_map *map, void *key, u64 flags)
+ * Description
+ * Add an entry to, or update a sockhash *map* referencing sockets.
+ * The *skops* is used as a new value for the entry associated to
+ * *key*. *flags* is one of:
+ *
+ * **BPF_NOEXIST**
+ * The entry for *key* must not exist in the map.
+ * **BPF_EXIST**
+ * The entry for *key* must already exist in the map.
+ * **BPF_ANY**
+ * No condition on the existence of the entry for *key*.
+ *
+ * If the *map* has eBPF programs (parser and verdict), those will
+ * be inherited by the socket being added. If the socket is
+ * already attached to eBPF programs, this results in an error.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_msg_redirect_hash(struct sk_msg_buff *msg, struct bpf_map *map, void *key, u64 flags)
+ * Description
+ * This helper is used in programs implementing policies at the
+ * socket level. If the message *msg* is allowed to pass (i.e. if
+ * the verdict eBPF program returns **SK_PASS**), redirect it to
+ * the socket referenced by *map* (of type
+ * **BPF_MAP_TYPE_SOCKHASH**) using hash *key*. Both ingress and
+ * egress interfaces can be used for redirection. The
+ * **BPF_F_INGRESS** value in *flags* is used to make the
+ * distinction (ingress path is selected if the flag is present,
+ * egress path otherwise). This is the only flag supported for now.
+ * Return
+ * **SK_PASS** on success, or **SK_DROP** on error.
+ *
+ * long bpf_sk_redirect_hash(struct sk_buff *skb, struct bpf_map *map, void *key, u64 flags)
+ * Description
+ * This helper is used in programs implementing policies at the
+ * skb socket level. If the sk_buff *skb* is allowed to pass (i.e.
+ * if the verdict eBPF program returns **SK_PASS**), redirect it
+ * to the socket referenced by *map* (of type
+ * **BPF_MAP_TYPE_SOCKHASH**) using hash *key*. Both ingress and
+ * egress interfaces can be used for redirection. The
+ * **BPF_F_INGRESS** value in *flags* is used to make the
+ * distinction (ingress path is selected if the flag is present,
+ * egress otherwise). This is the only flag supported for now.
+ * Return
+ * **SK_PASS** on success, or **SK_DROP** on error.
+ *
+ * long bpf_lwt_push_encap(struct sk_buff *skb, u32 type, void *hdr, u32 len)
+ * Description
+ * Encapsulate the packet associated to *skb* within a Layer 3
+ * protocol header. This header is provided in the buffer at
+ * address *hdr*, with *len* its size in bytes. *type* indicates
+ * the protocol of the header and can be one of:
+ *
+ * **BPF_LWT_ENCAP_SEG6**
+ * IPv6 encapsulation with Segment Routing Header
+ * (**struct ipv6_sr_hdr**). *hdr* only contains the SRH,
+ * the IPv6 header is computed by the kernel.
+ * **BPF_LWT_ENCAP_SEG6_INLINE**
+ * Only works if *skb* contains an IPv6 packet. Insert a
+ * Segment Routing Header (**struct ipv6_sr_hdr**) inside
+ * the IPv6 header.
+ * **BPF_LWT_ENCAP_IP**
+ * IP encapsulation (GRE/GUE/IPIP/etc). The outer header
+ * must be IPv4 or IPv6, followed by zero or more
+ * additional headers, up to **LWT_BPF_MAX_HEADROOM**
+ * total bytes in all prepended headers. Please note that
+ * if **skb_is_gso**\ (*skb*) is true, no more than two
+ * headers can be prepended, and the inner header, if
+ * present, should be either GRE or UDP/GUE.
+ *
+ * **BPF_LWT_ENCAP_SEG6**\ \* types can be called by BPF programs
+ * of type **BPF_PROG_TYPE_LWT_IN**; **BPF_LWT_ENCAP_IP** type can
+ * be called by bpf programs of types **BPF_PROG_TYPE_LWT_IN** and
+ * **BPF_PROG_TYPE_LWT_XMIT**.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_lwt_seg6_store_bytes(struct sk_buff *skb, u32 offset, const void *from, u32 len)
+ * Description
+ * Store *len* bytes from address *from* into the packet
+ * associated to *skb*, at *offset*. Only the flags, tag and TLVs
+ * inside the outermost IPv6 Segment Routing Header can be
+ * modified through this helper.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_lwt_seg6_adjust_srh(struct sk_buff *skb, u32 offset, s32 delta)
+ * Description
+ * Adjust the size allocated to TLVs in the outermost IPv6
+ * Segment Routing Header contained in the packet associated to
+ * *skb*, at position *offset* by *delta* bytes. Only offsets
+ * after the segments are accepted. *delta* can be as well
+ * positive (growing) as negative (shrinking).
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_lwt_seg6_action(struct sk_buff *skb, u32 action, void *param, u32 param_len)
+ * Description
+ * Apply an IPv6 Segment Routing action of type *action* to the
+ * packet associated to *skb*. Each action takes a parameter
+ * contained at address *param*, and of length *param_len* bytes.
+ * *action* can be one of:
+ *
+ * **SEG6_LOCAL_ACTION_END_X**
+ * End.X action: Endpoint with Layer-3 cross-connect.
+ * Type of *param*: **struct in6_addr**.
+ * **SEG6_LOCAL_ACTION_END_T**
+ * End.T action: Endpoint with specific IPv6 table lookup.
+ * Type of *param*: **int**.
+ * **SEG6_LOCAL_ACTION_END_B6**
+ * End.B6 action: Endpoint bound to an SRv6 policy.
+ * Type of *param*: **struct ipv6_sr_hdr**.
+ * **SEG6_LOCAL_ACTION_END_B6_ENCAP**
+ * End.B6.Encap action: Endpoint bound to an SRv6
+ * encapsulation policy.
+ * Type of *param*: **struct ipv6_sr_hdr**.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_rc_repeat(void *ctx)
+ * Description
+ * This helper is used in programs implementing IR decoding, to
+ * report a successfully decoded repeat key message. This delays
+ * the generation of a key up event for previously generated
+ * key down event.
+ *
+ * Some IR protocols like NEC have a special IR message for
+ * repeating last button, for when a button is held down.
+ *
+ * The *ctx* should point to the lirc sample as passed into
+ * the program.
+ *
+ * This helper is only available is the kernel was compiled with
+ * the **CONFIG_BPF_LIRC_MODE2** configuration option set to
+ * "**y**".
+ * Return
+ * 0
+ *
+ * long bpf_rc_keydown(void *ctx, u32 protocol, u64 scancode, u32 toggle)
+ * Description
+ * This helper is used in programs implementing IR decoding, to
+ * report a successfully decoded key press with *scancode*,
+ * *toggle* value in the given *protocol*. The scancode will be
+ * translated to a keycode using the rc keymap, and reported as
+ * an input key down event. After a period a key up event is
+ * generated. This period can be extended by calling either
+ * **bpf_rc_keydown**\ () again with the same values, or calling
+ * **bpf_rc_repeat**\ ().
+ *
+ * Some protocols include a toggle bit, in case the button was
+ * released and pressed again between consecutive scancodes.
+ *
+ * The *ctx* should point to the lirc sample as passed into
+ * the program.
+ *
+ * The *protocol* is the decoded protocol number (see
+ * **enum rc_proto** for some predefined values).
+ *
+ * This helper is only available is the kernel was compiled with
+ * the **CONFIG_BPF_LIRC_MODE2** configuration option set to
+ * "**y**".
+ * Return
+ * 0
+ *
+ * u64 bpf_skb_cgroup_id(struct sk_buff *skb)
+ * Description
+ * Return the cgroup v2 id of the socket associated with the *skb*.
+ * This is roughly similar to the **bpf_get_cgroup_classid**\ ()
+ * helper for cgroup v1 by providing a tag resp. identifier that
+ * can be matched on or used for map lookups e.g. to implement
+ * policy. The cgroup v2 id of a given path in the hierarchy is
+ * exposed in user space through the f_handle API in order to get
+ * to the same 64-bit id.
+ *
+ * This helper can be used on TC egress path, but not on ingress,
+ * and is available only if the kernel was compiled with the
+ * **CONFIG_SOCK_CGROUP_DATA** configuration option.
+ * Return
+ * The id is returned or 0 in case the id could not be retrieved.
+ *
+ * u64 bpf_get_current_cgroup_id(void)
+ * Description
+ * Get the current cgroup id based on the cgroup within which
+ * the current task is running.
+ * Return
+ * A 64-bit integer containing the current cgroup id based
+ * on the cgroup within which the current task is running.
+ *
+ * void *bpf_get_local_storage(void *map, u64 flags)
+ * Description
+ * Get the pointer to the local storage area.
+ * The type and the size of the local storage is defined
+ * by the *map* argument.
+ * The *flags* meaning is specific for each map type,
+ * and has to be 0 for cgroup local storage.
+ *
+ * Depending on the BPF program type, a local storage area
+ * can be shared between multiple instances of the BPF program,
+ * running simultaneously.
+ *
+ * A user should care about the synchronization by himself.
+ * For example, by using the **BPF_ATOMIC** instructions to alter
+ * the shared data.
+ * Return
+ * A pointer to the local storage area.
+ *
+ * long bpf_sk_select_reuseport(struct sk_reuseport_md *reuse, struct bpf_map *map, void *key, u64 flags)
+ * Description
+ * Select a **SO_REUSEPORT** socket from a
+ * **BPF_MAP_TYPE_REUSEPORT_SOCKARRAY** *map*.
+ * It checks the selected socket is matching the incoming
+ * request in the socket buffer.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * u64 bpf_skb_ancestor_cgroup_id(struct sk_buff *skb, int ancestor_level)
+ * Description
+ * Return id of cgroup v2 that is ancestor of cgroup associated
+ * with the *skb* at the *ancestor_level*. The root cgroup is at
+ * *ancestor_level* zero and each step down the hierarchy
+ * increments the level. If *ancestor_level* == level of cgroup
+ * associated with *skb*, then return value will be same as that
+ * of **bpf_skb_cgroup_id**\ ().
+ *
+ * The helper is useful to implement policies based on cgroups
+ * that are upper in hierarchy than immediate cgroup associated
+ * with *skb*.
+ *
+ * The format of returned id and helper limitations are same as in
+ * **bpf_skb_cgroup_id**\ ().
+ * Return
+ * The id is returned or 0 in case the id could not be retrieved.
+ *
+ * struct bpf_sock *bpf_sk_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags)
+ * Description
+ * Look for TCP socket matching *tuple*, optionally in a child
+ * network namespace *netns*. The return value must be checked,
+ * and if non-**NULL**, released via **bpf_sk_release**\ ().
+ *
+ * The *ctx* should point to the context of the program, such as
+ * the skb or socket (depending on the hook in use). This is used
+ * to determine the base network namespace for the lookup.
+ *
+ * *tuple_size* must be one of:
+ *
+ * **sizeof**\ (*tuple*\ **->ipv4**)
+ * Look for an IPv4 socket.
+ * **sizeof**\ (*tuple*\ **->ipv6**)
+ * Look for an IPv6 socket.
+ *
+ * If the *netns* is a negative signed 32-bit integer, then the
+ * socket lookup table in the netns associated with the *ctx*
+ * will be used. For the TC hooks, this is the netns of the device
+ * in the skb. For socket hooks, this is the netns of the socket.
+ * If *netns* is any other signed 32-bit value greater than or
+ * equal to zero then it specifies the ID of the netns relative to
+ * the netns associated with the *ctx*. *netns* values beyond the
+ * range of 32-bit integers are reserved for future use.
+ *
+ * All values for *flags* are reserved for future usage, and must
+ * be left at zero.
+ *
+ * This helper is available only if the kernel was compiled with
+ * **CONFIG_NET** configuration option.
+ * Return
+ * Pointer to **struct bpf_sock**, or **NULL** in case of failure.
+ * For sockets with reuseport option, the **struct bpf_sock**
+ * result is from *reuse*\ **->socks**\ [] using the hash of the
+ * tuple.
+ *
+ * struct bpf_sock *bpf_sk_lookup_udp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags)
+ * Description
+ * Look for UDP socket matching *tuple*, optionally in a child
+ * network namespace *netns*. The return value must be checked,
+ * and if non-**NULL**, released via **bpf_sk_release**\ ().
+ *
+ * The *ctx* should point to the context of the program, such as
+ * the skb or socket (depending on the hook in use). This is used
+ * to determine the base network namespace for the lookup.
+ *
+ * *tuple_size* must be one of:
+ *
+ * **sizeof**\ (*tuple*\ **->ipv4**)
+ * Look for an IPv4 socket.
+ * **sizeof**\ (*tuple*\ **->ipv6**)
+ * Look for an IPv6 socket.
+ *
+ * If the *netns* is a negative signed 32-bit integer, then the
+ * socket lookup table in the netns associated with the *ctx*
+ * will be used. For the TC hooks, this is the netns of the device
+ * in the skb. For socket hooks, this is the netns of the socket.
+ * If *netns* is any other signed 32-bit value greater than or
+ * equal to zero then it specifies the ID of the netns relative to
+ * the netns associated with the *ctx*. *netns* values beyond the
+ * range of 32-bit integers are reserved for future use.
+ *
+ * All values for *flags* are reserved for future usage, and must
+ * be left at zero.
+ *
+ * This helper is available only if the kernel was compiled with
+ * **CONFIG_NET** configuration option.
+ * Return
+ * Pointer to **struct bpf_sock**, or **NULL** in case of failure.
+ * For sockets with reuseport option, the **struct bpf_sock**
+ * result is from *reuse*\ **->socks**\ [] using the hash of the
+ * tuple.
+ *
+ * long bpf_sk_release(void *sock)
+ * Description
+ * Release the reference held by *sock*. *sock* must be a
+ * non-**NULL** pointer that was returned from
+ * **bpf_sk_lookup_xxx**\ ().
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_map_push_elem(struct bpf_map *map, const void *value, u64 flags)
+ * Description
+ * Push an element *value* in *map*. *flags* is one of:
+ *
+ * **BPF_EXIST**
+ * If the queue/stack is full, the oldest element is
+ * removed to make room for this.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_map_pop_elem(struct bpf_map *map, void *value)
+ * Description
+ * Pop an element from *map*.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_map_peek_elem(struct bpf_map *map, void *value)
+ * Description
+ * Get an element from *map* without removing it.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_msg_push_data(struct sk_msg_buff *msg, u32 start, u32 len, u64 flags)
+ * Description
+ * For socket policies, insert *len* bytes into *msg* at offset
+ * *start*.
+ *
+ * If a program of type **BPF_PROG_TYPE_SK_MSG** is run on a
+ * *msg* it may want to insert metadata or options into the *msg*.
+ * This can later be read and used by any of the lower layer BPF
+ * hooks.
+ *
+ * This helper may fail if under memory pressure (a malloc
+ * fails) in these cases BPF programs will get an appropriate
+ * error and BPF programs will need to handle them.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_msg_pop_data(struct sk_msg_buff *msg, u32 start, u32 len, u64 flags)
+ * Description
+ * Will remove *len* bytes from a *msg* starting at byte *start*.
+ * This may result in **ENOMEM** errors under certain situations if
+ * an allocation and copy are required due to a full ring buffer.
+ * However, the helper will try to avoid doing the allocation
+ * if possible. Other errors can occur if input parameters are
+ * invalid either due to *start* byte not being valid part of *msg*
+ * payload and/or *pop* value being to large.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_rc_pointer_rel(void *ctx, s32 rel_x, s32 rel_y)
+ * Description
+ * This helper is used in programs implementing IR decoding, to
+ * report a successfully decoded pointer movement.
+ *
+ * The *ctx* should point to the lirc sample as passed into
+ * the program.
+ *
+ * This helper is only available is the kernel was compiled with
+ * the **CONFIG_BPF_LIRC_MODE2** configuration option set to
+ * "**y**".
+ * Return
+ * 0
+ *
+ * long bpf_spin_lock(struct bpf_spin_lock *lock)
+ * Description
+ * Acquire a spinlock represented by the pointer *lock*, which is
+ * stored as part of a value of a map. Taking the lock allows to
+ * safely update the rest of the fields in that value. The
+ * spinlock can (and must) later be released with a call to
+ * **bpf_spin_unlock**\ (\ *lock*\ ).
+ *
+ * Spinlocks in BPF programs come with a number of restrictions
+ * and constraints:
+ *
+ * * **bpf_spin_lock** objects are only allowed inside maps of
+ * types **BPF_MAP_TYPE_HASH** and **BPF_MAP_TYPE_ARRAY** (this
+ * list could be extended in the future).
+ * * BTF description of the map is mandatory.
+ * * The BPF program can take ONE lock at a time, since taking two
+ * or more could cause dead locks.
+ * * Only one **struct bpf_spin_lock** is allowed per map element.
+ * * When the lock is taken, calls (either BPF to BPF or helpers)
+ * are not allowed.
+ * * The **BPF_LD_ABS** and **BPF_LD_IND** instructions are not
+ * allowed inside a spinlock-ed region.
+ * * The BPF program MUST call **bpf_spin_unlock**\ () to release
+ * the lock, on all execution paths, before it returns.
+ * * The BPF program can access **struct bpf_spin_lock** only via
+ * the **bpf_spin_lock**\ () and **bpf_spin_unlock**\ ()
+ * helpers. Loading or storing data into the **struct
+ * bpf_spin_lock** *lock*\ **;** field of a map is not allowed.
+ * * To use the **bpf_spin_lock**\ () helper, the BTF description
+ * of the map value must be a struct and have **struct
+ * bpf_spin_lock** *anyname*\ **;** field at the top level.
+ * Nested lock inside another struct is not allowed.
+ * * The **struct bpf_spin_lock** *lock* field in a map value must
+ * be aligned on a multiple of 4 bytes in that value.
+ * * Syscall with command **BPF_MAP_LOOKUP_ELEM** does not copy
+ * the **bpf_spin_lock** field to user space.
+ * * Syscall with command **BPF_MAP_UPDATE_ELEM**, or update from
+ * a BPF program, do not update the **bpf_spin_lock** field.
+ * * **bpf_spin_lock** cannot be on the stack or inside a
+ * networking packet (it can only be inside of a map values).
+ * * **bpf_spin_lock** is available to root only.
+ * * Tracing programs and socket filter programs cannot use
+ * **bpf_spin_lock**\ () due to insufficient preemption checks
+ * (but this may change in the future).
+ * * **bpf_spin_lock** is not allowed in inner maps of map-in-map.
+ * Return
+ * 0
+ *
+ * long bpf_spin_unlock(struct bpf_spin_lock *lock)
+ * Description
+ * Release the *lock* previously locked by a call to
+ * **bpf_spin_lock**\ (\ *lock*\ ).
+ * Return
+ * 0
+ *
+ * struct bpf_sock *bpf_sk_fullsock(struct bpf_sock *sk)
+ * Description
+ * This helper gets a **struct bpf_sock** pointer such
+ * that all the fields in this **bpf_sock** can be accessed.
+ * Return
+ * A **struct bpf_sock** pointer on success, or **NULL** in
+ * case of failure.
+ *
+ * struct bpf_tcp_sock *bpf_tcp_sock(struct bpf_sock *sk)
+ * Description
+ * This helper gets a **struct bpf_tcp_sock** pointer from a
+ * **struct bpf_sock** pointer.
+ * Return
+ * A **struct bpf_tcp_sock** pointer on success, or **NULL** in
+ * case of failure.
+ *
+ * long bpf_skb_ecn_set_ce(struct sk_buff *skb)
+ * Description
+ * Set ECN (Explicit Congestion Notification) field of IP header
+ * to **CE** (Congestion Encountered) if current value is **ECT**
+ * (ECN Capable Transport). Otherwise, do nothing. Works with IPv6
+ * and IPv4.
+ * Return
+ * 1 if the **CE** flag is set (either by the current helper call
+ * or because it was already present), 0 if it is not set.
+ *
+ * struct bpf_sock *bpf_get_listener_sock(struct bpf_sock *sk)
+ * Description
+ * Return a **struct bpf_sock** pointer in **TCP_LISTEN** state.
+ * **bpf_sk_release**\ () is unnecessary and not allowed.
+ * Return
+ * A **struct bpf_sock** pointer on success, or **NULL** in
+ * case of failure.
+ *
+ * struct bpf_sock *bpf_skc_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags)
+ * Description
+ * Look for TCP socket matching *tuple*, optionally in a child
+ * network namespace *netns*. The return value must be checked,
+ * and if non-**NULL**, released via **bpf_sk_release**\ ().
+ *
+ * This function is identical to **bpf_sk_lookup_tcp**\ (), except
+ * that it also returns timewait or request sockets. Use
+ * **bpf_sk_fullsock**\ () or **bpf_tcp_sock**\ () to access the
+ * full structure.
+ *
+ * This helper is available only if the kernel was compiled with
+ * **CONFIG_NET** configuration option.
+ * Return
+ * Pointer to **struct bpf_sock**, or **NULL** in case of failure.
+ * For sockets with reuseport option, the **struct bpf_sock**
+ * result is from *reuse*\ **->socks**\ [] using the hash of the
+ * tuple.
+ *
+ * long bpf_tcp_check_syncookie(void *sk, void *iph, u32 iph_len, struct tcphdr *th, u32 th_len)
+ * Description
+ * Check whether *iph* and *th* contain a valid SYN cookie ACK for
+ * the listening socket in *sk*.
+ *
+ * *iph* points to the start of the IPv4 or IPv6 header, while
+ * *iph_len* contains **sizeof**\ (**struct iphdr**) or
+ * **sizeof**\ (**struct ipv6hdr**).
+ *
+ * *th* points to the start of the TCP header, while *th_len*
+ * contains the length of the TCP header (at least
+ * **sizeof**\ (**struct tcphdr**)).
+ * Return
+ * 0 if *iph* and *th* are a valid SYN cookie ACK, or a negative
+ * error otherwise.
+ *
+ * long bpf_sysctl_get_name(struct bpf_sysctl *ctx, char *buf, size_t buf_len, u64 flags)
+ * Description
+ * Get name of sysctl in /proc/sys/ and copy it into provided by
+ * program buffer *buf* of size *buf_len*.
+ *
+ * The buffer is always NUL terminated, unless it's zero-sized.
+ *
+ * If *flags* is zero, full name (e.g. "net/ipv4/tcp_mem") is
+ * copied. Use **BPF_F_SYSCTL_BASE_NAME** flag to copy base name
+ * only (e.g. "tcp_mem").
+ * Return
+ * Number of character copied (not including the trailing NUL).
+ *
+ * **-E2BIG** if the buffer wasn't big enough (*buf* will contain
+ * truncated name in this case).
+ *
+ * long bpf_sysctl_get_current_value(struct bpf_sysctl *ctx, char *buf, size_t buf_len)
+ * Description
+ * Get current value of sysctl as it is presented in /proc/sys
+ * (incl. newline, etc), and copy it as a string into provided
+ * by program buffer *buf* of size *buf_len*.
+ *
+ * The whole value is copied, no matter what file position user
+ * space issued e.g. sys_read at.
+ *
+ * The buffer is always NUL terminated, unless it's zero-sized.
+ * Return
+ * Number of character copied (not including the trailing NUL).
+ *
+ * **-E2BIG** if the buffer wasn't big enough (*buf* will contain
+ * truncated name in this case).
+ *
+ * **-EINVAL** if current value was unavailable, e.g. because
+ * sysctl is uninitialized and read returns -EIO for it.
+ *
+ * long bpf_sysctl_get_new_value(struct bpf_sysctl *ctx, char *buf, size_t buf_len)
+ * Description
+ * Get new value being written by user space to sysctl (before
+ * the actual write happens) and copy it as a string into
+ * provided by program buffer *buf* of size *buf_len*.
+ *
+ * User space may write new value at file position > 0.
+ *
+ * The buffer is always NUL terminated, unless it's zero-sized.
+ * Return
+ * Number of character copied (not including the trailing NUL).
+ *
+ * **-E2BIG** if the buffer wasn't big enough (*buf* will contain
+ * truncated name in this case).
+ *
+ * **-EINVAL** if sysctl is being read.
+ *
+ * long bpf_sysctl_set_new_value(struct bpf_sysctl *ctx, const char *buf, size_t buf_len)
+ * Description
+ * Override new value being written by user space to sysctl with
+ * value provided by program in buffer *buf* of size *buf_len*.
+ *
+ * *buf* should contain a string in same form as provided by user
+ * space on sysctl write.
+ *
+ * User space may write new value at file position > 0. To override
+ * the whole sysctl value file position should be set to zero.
+ * Return
+ * 0 on success.
+ *
+ * **-E2BIG** if the *buf_len* is too big.
+ *
+ * **-EINVAL** if sysctl is being read.
+ *
+ * long bpf_strtol(const char *buf, size_t buf_len, u64 flags, long *res)
+ * Description
+ * Convert the initial part of the string from buffer *buf* of
+ * size *buf_len* to a long integer according to the given base
+ * and save the result in *res*.
+ *
+ * The string may begin with an arbitrary amount of white space
+ * (as determined by **isspace**\ (3)) followed by a single
+ * optional '**-**' sign.
+ *
+ * Five least significant bits of *flags* encode base, other bits
+ * are currently unused.
+ *
+ * Base must be either 8, 10, 16 or 0 to detect it automatically
+ * similar to user space **strtol**\ (3).
+ * Return
+ * Number of characters consumed on success. Must be positive but
+ * no more than *buf_len*.
+ *
+ * **-EINVAL** if no valid digits were found or unsupported base
+ * was provided.
+ *
+ * **-ERANGE** if resulting value was out of range.
+ *
+ * long bpf_strtoul(const char *buf, size_t buf_len, u64 flags, unsigned long *res)
+ * Description
+ * Convert the initial part of the string from buffer *buf* of
+ * size *buf_len* to an unsigned long integer according to the
+ * given base and save the result in *res*.
+ *
+ * The string may begin with an arbitrary amount of white space
+ * (as determined by **isspace**\ (3)).
+ *
+ * Five least significant bits of *flags* encode base, other bits
+ * are currently unused.
+ *
+ * Base must be either 8, 10, 16 or 0 to detect it automatically
+ * similar to user space **strtoul**\ (3).
+ * Return
+ * Number of characters consumed on success. Must be positive but
+ * no more than *buf_len*.
+ *
+ * **-EINVAL** if no valid digits were found or unsupported base
+ * was provided.
+ *
+ * **-ERANGE** if resulting value was out of range.
+ *
+ * void *bpf_sk_storage_get(struct bpf_map *map, void *sk, void *value, u64 flags)
+ * Description
+ * Get a bpf-local-storage from a *sk*.
+ *
+ * Logically, it could be thought of getting the value from
+ * a *map* with *sk* as the **key**. From this
+ * perspective, the usage is not much different from
+ * **bpf_map_lookup_elem**\ (*map*, **&**\ *sk*) except this
+ * helper enforces the key must be a full socket and the map must
+ * be a **BPF_MAP_TYPE_SK_STORAGE** also.
+ *
+ * Underneath, the value is stored locally at *sk* instead of
+ * the *map*. The *map* is used as the bpf-local-storage
+ * "type". The bpf-local-storage "type" (i.e. the *map*) is
+ * searched against all bpf-local-storages residing at *sk*.
+ *
+ * *sk* is a kernel **struct sock** pointer for LSM program.
+ * *sk* is a **struct bpf_sock** pointer for other program types.
+ *
+ * An optional *flags* (**BPF_SK_STORAGE_GET_F_CREATE**) can be
+ * used such that a new bpf-local-storage will be
+ * created if one does not exist. *value* can be used
+ * together with **BPF_SK_STORAGE_GET_F_CREATE** to specify
+ * the initial value of a bpf-local-storage. If *value* is
+ * **NULL**, the new bpf-local-storage will be zero initialized.
+ * Return
+ * A bpf-local-storage pointer is returned on success.
+ *
+ * **NULL** if not found or there was an error in adding
+ * a new bpf-local-storage.
+ *
+ * long bpf_sk_storage_delete(struct bpf_map *map, void *sk)
+ * Description
+ * Delete a bpf-local-storage from a *sk*.
+ * Return
+ * 0 on success.
+ *
+ * **-ENOENT** if the bpf-local-storage cannot be found.
+ * **-EINVAL** if sk is not a fullsock (e.g. a request_sock).
+ *
+ * long bpf_send_signal(u32 sig)
+ * Description
+ * Send signal *sig* to the process of the current task.
+ * The signal may be delivered to any of this process's threads.
+ * Return
+ * 0 on success or successfully queued.
+ *
+ * **-EBUSY** if work queue under nmi is full.
+ *
+ * **-EINVAL** if *sig* is invalid.
+ *
+ * **-EPERM** if no permission to send the *sig*.
+ *
+ * **-EAGAIN** if bpf program can try again.
+ *
+ * s64 bpf_tcp_gen_syncookie(void *sk, void *iph, u32 iph_len, struct tcphdr *th, u32 th_len)
+ * Description
+ * Try to issue a SYN cookie for the packet with corresponding
+ * IP/TCP headers, *iph* and *th*, on the listening socket in *sk*.
+ *
+ * *iph* points to the start of the IPv4 or IPv6 header, while
+ * *iph_len* contains **sizeof**\ (**struct iphdr**) or
+ * **sizeof**\ (**struct ipv6hdr**).
+ *
+ * *th* points to the start of the TCP header, while *th_len*
+ * contains the length of the TCP header with options (at least
+ * **sizeof**\ (**struct tcphdr**)).
+ * Return
+ * On success, lower 32 bits hold the generated SYN cookie in
+ * followed by 16 bits which hold the MSS value for that cookie,
+ * and the top 16 bits are unused.
+ *
+ * On failure, the returned value is one of the following:
+ *
+ * **-EINVAL** SYN cookie cannot be issued due to error
+ *
+ * **-ENOENT** SYN cookie should not be issued (no SYN flood)
+ *
+ * **-EOPNOTSUPP** kernel configuration does not enable SYN cookies
+ *
+ * **-EPROTONOSUPPORT** IP packet version is not 4 or 6
+ *
+ * long bpf_skb_output(void *ctx, struct bpf_map *map, u64 flags, void *data, u64 size)
+ * Description
+ * Write raw *data* blob into a special BPF perf event held by
+ * *map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. This perf
+ * event must have the following attributes: **PERF_SAMPLE_RAW**
+ * as **sample_type**, **PERF_TYPE_SOFTWARE** as **type**, and
+ * **PERF_COUNT_SW_BPF_OUTPUT** as **config**.
+ *
+ * The *flags* are used to indicate the index in *map* for which
+ * the value must be put, masked with **BPF_F_INDEX_MASK**.
+ * Alternatively, *flags* can be set to **BPF_F_CURRENT_CPU**
+ * to indicate that the index of the current CPU core should be
+ * used.
+ *
+ * The value to write, of *size*, is passed through eBPF stack and
+ * pointed by *data*.
+ *
+ * *ctx* is a pointer to in-kernel struct sk_buff.
+ *
+ * This helper is similar to **bpf_perf_event_output**\ () but
+ * restricted to raw_tracepoint bpf programs.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_probe_read_user(void *dst, u32 size, const void *unsafe_ptr)
+ * Description
+ * Safely attempt to read *size* bytes from user space address
+ * *unsafe_ptr* and store the data in *dst*.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_probe_read_kernel(void *dst, u32 size, const void *unsafe_ptr)
+ * Description
+ * Safely attempt to read *size* bytes from kernel space address
+ * *unsafe_ptr* and store the data in *dst*.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_probe_read_user_str(void *dst, u32 size, const void *unsafe_ptr)
+ * Description
+ * Copy a NUL terminated string from an unsafe user address
+ * *unsafe_ptr* to *dst*. The *size* should include the
+ * terminating NUL byte. In case the string length is smaller than
+ * *size*, the target is not padded with further NUL bytes. If the
+ * string length is larger than *size*, just *size*-1 bytes are
+ * copied and the last byte is set to NUL.
+ *
+ * On success, returns the number of bytes that were written,
+ * including the terminal NUL. This makes this helper useful in
+ * tracing programs for reading strings, and more importantly to
+ * get its length at runtime. See the following snippet:
+ *
+ * ::
+ *
+ * SEC("kprobe/sys_open")
+ * void bpf_sys_open(struct pt_regs *ctx)
+ * {
+ * char buf[PATHLEN]; // PATHLEN is defined to 256
+ * int res = bpf_probe_read_user_str(buf, sizeof(buf),
+ * ctx->di);
+ *
+ * // Consume buf, for example push it to
+ * // userspace via bpf_perf_event_output(); we
+ * // can use res (the string length) as event
+ * // size, after checking its boundaries.
+ * }
+ *
+ * In comparison, using **bpf_probe_read_user**\ () helper here
+ * instead to read the string would require to estimate the length
+ * at compile time, and would often result in copying more memory
+ * than necessary.
+ *
+ * Another useful use case is when parsing individual process
+ * arguments or individual environment variables navigating
+ * *current*\ **->mm->arg_start** and *current*\
+ * **->mm->env_start**: using this helper and the return value,
+ * one can quickly iterate at the right offset of the memory area.
+ * Return
+ * On success, the strictly positive length of the output string,
+ * including the trailing NUL character. On error, a negative
+ * value.
+ *
+ * long bpf_probe_read_kernel_str(void *dst, u32 size, const void *unsafe_ptr)
+ * Description
+ * Copy a NUL terminated string from an unsafe kernel address *unsafe_ptr*
+ * to *dst*. Same semantics as with **bpf_probe_read_user_str**\ () apply.
+ * Return
+ * On success, the strictly positive length of the string, including
+ * the trailing NUL character. On error, a negative value.
+ *
+ * long bpf_tcp_send_ack(void *tp, u32 rcv_nxt)
+ * Description
+ * Send out a tcp-ack. *tp* is the in-kernel struct **tcp_sock**.
+ * *rcv_nxt* is the ack_seq to be sent out.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_send_signal_thread(u32 sig)
+ * Description
+ * Send signal *sig* to the thread corresponding to the current task.
+ * Return
+ * 0 on success or successfully queued.
+ *
+ * **-EBUSY** if work queue under nmi is full.
+ *
+ * **-EINVAL** if *sig* is invalid.
+ *
+ * **-EPERM** if no permission to send the *sig*.
+ *
+ * **-EAGAIN** if bpf program can try again.
+ *
+ * u64 bpf_jiffies64(void)
+ * Description
+ * Obtain the 64bit jiffies
+ * Return
+ * The 64 bit jiffies
+ *
+ * long bpf_read_branch_records(struct bpf_perf_event_data *ctx, void *buf, u32 size, u64 flags)
+ * Description
+ * For an eBPF program attached to a perf event, retrieve the
+ * branch records (**struct perf_branch_entry**) associated to *ctx*
+ * and store it in the buffer pointed by *buf* up to size
+ * *size* bytes.
+ * Return
+ * On success, number of bytes written to *buf*. On error, a
+ * negative value.
+ *
+ * The *flags* can be set to **BPF_F_GET_BRANCH_RECORDS_SIZE** to
+ * instead return the number of bytes required to store all the
+ * branch entries. If this flag is set, *buf* may be NULL.
+ *
+ * **-EINVAL** if arguments invalid or **size** not a multiple
+ * of **sizeof**\ (**struct perf_branch_entry**\ ).
+ *
+ * **-ENOENT** if architecture does not support branch records.
+ *
+ * long bpf_get_ns_current_pid_tgid(u64 dev, u64 ino, struct bpf_pidns_info *nsdata, u32 size)
+ * Description
+ * Returns 0 on success, values for *pid* and *tgid* as seen from the current
+ * *namespace* will be returned in *nsdata*.
+ * Return
+ * 0 on success, or one of the following in case of failure:
+ *
+ * **-EINVAL** if dev and inum supplied don't match dev_t and inode number
+ * with nsfs of current task, or if dev conversion to dev_t lost high bits.
+ *
+ * **-ENOENT** if pidns does not exists for the current task.
+ *
+ * long bpf_xdp_output(void *ctx, struct bpf_map *map, u64 flags, void *data, u64 size)
+ * Description
+ * Write raw *data* blob into a special BPF perf event held by
+ * *map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. This perf
+ * event must have the following attributes: **PERF_SAMPLE_RAW**
+ * as **sample_type**, **PERF_TYPE_SOFTWARE** as **type**, and
+ * **PERF_COUNT_SW_BPF_OUTPUT** as **config**.
+ *
+ * The *flags* are used to indicate the index in *map* for which
+ * the value must be put, masked with **BPF_F_INDEX_MASK**.
+ * Alternatively, *flags* can be set to **BPF_F_CURRENT_CPU**
+ * to indicate that the index of the current CPU core should be
+ * used.
+ *
+ * The value to write, of *size*, is passed through eBPF stack and
+ * pointed by *data*.
+ *
+ * *ctx* is a pointer to in-kernel struct xdp_buff.
+ *
+ * This helper is similar to **bpf_perf_eventoutput**\ () but
+ * restricted to raw_tracepoint bpf programs.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * u64 bpf_get_netns_cookie(void *ctx)
+ * Description
+ * Retrieve the cookie (generated by the kernel) of the network
+ * namespace the input *ctx* is associated with. The network
+ * namespace cookie remains stable for its lifetime and provides
+ * a global identifier that can be assumed unique. If *ctx* is
+ * NULL, then the helper returns the cookie for the initial
+ * network namespace. The cookie itself is very similar to that
+ * of **bpf_get_socket_cookie**\ () helper, but for network
+ * namespaces instead of sockets.
+ * Return
+ * A 8-byte long opaque number.
+ *
+ * u64 bpf_get_current_ancestor_cgroup_id(int ancestor_level)
+ * Description
+ * Return id of cgroup v2 that is ancestor of the cgroup associated
+ * with the current task at the *ancestor_level*. The root cgroup
+ * is at *ancestor_level* zero and each step down the hierarchy
+ * increments the level. If *ancestor_level* == level of cgroup
+ * associated with the current task, then return value will be the
+ * same as that of **bpf_get_current_cgroup_id**\ ().
+ *
+ * The helper is useful to implement policies based on cgroups
+ * that are upper in hierarchy than immediate cgroup associated
+ * with the current task.
+ *
+ * The format of returned id and helper limitations are same as in
+ * **bpf_get_current_cgroup_id**\ ().
+ * Return
+ * The id is returned or 0 in case the id could not be retrieved.
+ *
+ * long bpf_sk_assign(struct sk_buff *skb, void *sk, u64 flags)
+ * Description
+ * Helper is overloaded depending on BPF program type. This
+ * description applies to **BPF_PROG_TYPE_SCHED_CLS** and
+ * **BPF_PROG_TYPE_SCHED_ACT** programs.
+ *
+ * Assign the *sk* to the *skb*. When combined with appropriate
+ * routing configuration to receive the packet towards the socket,
+ * will cause *skb* to be delivered to the specified socket.
+ * Subsequent redirection of *skb* via **bpf_redirect**\ (),
+ * **bpf_clone_redirect**\ () or other methods outside of BPF may
+ * interfere with successful delivery to the socket.
+ *
+ * This operation is only valid from TC ingress path.
+ *
+ * The *flags* argument must be zero.
+ * Return
+ * 0 on success, or a negative error in case of failure:
+ *
+ * **-EINVAL** if specified *flags* are not supported.
+ *
+ * **-ENOENT** if the socket is unavailable for assignment.
+ *
+ * **-ENETUNREACH** if the socket is unreachable (wrong netns).
+ *
+ * **-EOPNOTSUPP** if the operation is not supported, for example
+ * a call from outside of TC ingress.
+ *
+ * **-ESOCKTNOSUPPORT** if the socket type is not supported
+ * (reuseport).
+ *
+ * long bpf_sk_assign(struct bpf_sk_lookup *ctx, struct bpf_sock *sk, u64 flags)
+ * Description
+ * Helper is overloaded depending on BPF program type. This
+ * description applies to **BPF_PROG_TYPE_SK_LOOKUP** programs.
+ *
+ * Select the *sk* as a result of a socket lookup.
+ *
+ * For the operation to succeed passed socket must be compatible
+ * with the packet description provided by the *ctx* object.
+ *
+ * L4 protocol (**IPPROTO_TCP** or **IPPROTO_UDP**) must
+ * be an exact match. While IP family (**AF_INET** or
+ * **AF_INET6**) must be compatible, that is IPv6 sockets
+ * that are not v6-only can be selected for IPv4 packets.
+ *
+ * Only TCP listeners and UDP unconnected sockets can be
+ * selected. *sk* can also be NULL to reset any previous
+ * selection.
+ *
+ * *flags* argument can combination of following values:
+ *
+ * * **BPF_SK_LOOKUP_F_REPLACE** to override the previous
+ * socket selection, potentially done by a BPF program
+ * that ran before us.
+ *
+ * * **BPF_SK_LOOKUP_F_NO_REUSEPORT** to skip
+ * load-balancing within reuseport group for the socket
+ * being selected.
+ *
+ * On success *ctx->sk* will point to the selected socket.
+ *
+ * Return
+ * 0 on success, or a negative errno in case of failure.
+ *
+ * * **-EAFNOSUPPORT** if socket family (*sk->family*) is
+ * not compatible with packet family (*ctx->family*).
+ *
+ * * **-EEXIST** if socket has been already selected,
+ * potentially by another program, and
+ * **BPF_SK_LOOKUP_F_REPLACE** flag was not specified.
+ *
+ * * **-EINVAL** if unsupported flags were specified.
+ *
+ * * **-EPROTOTYPE** if socket L4 protocol
+ * (*sk->protocol*) doesn't match packet protocol
+ * (*ctx->protocol*).
+ *
+ * * **-ESOCKTNOSUPPORT** if socket is not in allowed
+ * state (TCP listening or UDP unconnected).
+ *
+ * u64 bpf_ktime_get_boot_ns(void)
+ * Description
+ * Return the time elapsed since system boot, in nanoseconds.
+ * Does include the time the system was suspended.
+ * See: **clock_gettime**\ (**CLOCK_BOOTTIME**)
+ * Return
+ * Current *ktime*.
+ *
+ * long bpf_seq_printf(struct seq_file *m, const char *fmt, u32 fmt_size, const void *data, u32 data_len)
+ * Description
+ * **bpf_seq_printf**\ () uses seq_file **seq_printf**\ () to print
+ * out the format string.
+ * The *m* represents the seq_file. The *fmt* and *fmt_size* are for
+ * the format string itself. The *data* and *data_len* are format string
+ * arguments. The *data* are a **u64** array and corresponding format string
+ * values are stored in the array. For strings and pointers where pointees
+ * are accessed, only the pointer values are stored in the *data* array.
+ * The *data_len* is the size of *data* in bytes - must be a multiple of 8.
+ *
+ * Formats **%s**, **%p{i,I}{4,6}** requires to read kernel memory.
+ * Reading kernel memory may fail due to either invalid address or
+ * valid address but requiring a major memory fault. If reading kernel memory
+ * fails, the string for **%s** will be an empty string, and the ip
+ * address for **%p{i,I}{4,6}** will be 0. Not returning error to
+ * bpf program is consistent with what **bpf_trace_printk**\ () does for now.
+ * Return
+ * 0 on success, or a negative error in case of failure:
+ *
+ * **-EBUSY** if per-CPU memory copy buffer is busy, can try again
+ * by returning 1 from bpf program.
+ *
+ * **-EINVAL** if arguments are invalid, or if *fmt* is invalid/unsupported.
+ *
+ * **-E2BIG** if *fmt* contains too many format specifiers.
+ *
+ * **-EOVERFLOW** if an overflow happened: The same object will be tried again.
+ *
+ * long bpf_seq_write(struct seq_file *m, const void *data, u32 len)
+ * Description
+ * **bpf_seq_write**\ () uses seq_file **seq_write**\ () to write the data.
+ * The *m* represents the seq_file. The *data* and *len* represent the
+ * data to write in bytes.
+ * Return
+ * 0 on success, or a negative error in case of failure:
+ *
+ * **-EOVERFLOW** if an overflow happened: The same object will be tried again.
+ *
+ * u64 bpf_sk_cgroup_id(void *sk)
+ * Description
+ * Return the cgroup v2 id of the socket *sk*.
+ *
+ * *sk* must be a non-**NULL** pointer to a socket, e.g. one
+ * returned from **bpf_sk_lookup_xxx**\ (),
+ * **bpf_sk_fullsock**\ (), etc. The format of returned id is
+ * same as in **bpf_skb_cgroup_id**\ ().
+ *
+ * This helper is available only if the kernel was compiled with
+ * the **CONFIG_SOCK_CGROUP_DATA** configuration option.
+ * Return
+ * The id is returned or 0 in case the id could not be retrieved.
+ *
+ * u64 bpf_sk_ancestor_cgroup_id(void *sk, int ancestor_level)
+ * Description
+ * Return id of cgroup v2 that is ancestor of cgroup associated
+ * with the *sk* at the *ancestor_level*. The root cgroup is at
+ * *ancestor_level* zero and each step down the hierarchy
+ * increments the level. If *ancestor_level* == level of cgroup
+ * associated with *sk*, then return value will be same as that
+ * of **bpf_sk_cgroup_id**\ ().
+ *
+ * The helper is useful to implement policies based on cgroups
+ * that are upper in hierarchy than immediate cgroup associated
+ * with *sk*.
+ *
+ * The format of returned id and helper limitations are same as in
+ * **bpf_sk_cgroup_id**\ ().
+ * Return
+ * The id is returned or 0 in case the id could not be retrieved.
+ *
+ * long bpf_ringbuf_output(void *ringbuf, void *data, u64 size, u64 flags)
+ * Description
+ * Copy *size* bytes from *data* into a ring buffer *ringbuf*.
+ * If **BPF_RB_NO_WAKEUP** is specified in *flags*, no notification
+ * of new data availability is sent.
+ * If **BPF_RB_FORCE_WAKEUP** is specified in *flags*, notification
+ * of new data availability is sent unconditionally.
+ * If **0** is specified in *flags*, an adaptive notification
+ * of new data availability is sent.
+ *
+ * An adaptive notification is a notification sent whenever the user-space
+ * process has caught up and consumed all available payloads. In case the user-space
+ * process is still processing a previous payload, then no notification is needed
+ * as it will process the newly added payload automatically.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * void *bpf_ringbuf_reserve(void *ringbuf, u64 size, u64 flags)
+ * Description
+ * Reserve *size* bytes of payload in a ring buffer *ringbuf*.
+ * *flags* must be 0.
+ * Return
+ * Valid pointer with *size* bytes of memory available; NULL,
+ * otherwise.
+ *
+ * void bpf_ringbuf_submit(void *data, u64 flags)
+ * Description
+ * Submit reserved ring buffer sample, pointed to by *data*.
+ * If **BPF_RB_NO_WAKEUP** is specified in *flags*, no notification
+ * of new data availability is sent.
+ * If **BPF_RB_FORCE_WAKEUP** is specified in *flags*, notification
+ * of new data availability is sent unconditionally.
+ * If **0** is specified in *flags*, an adaptive notification
+ * of new data availability is sent.
+ *
+ * See 'bpf_ringbuf_output()' for the definition of adaptive notification.
+ * Return
+ * Nothing. Always succeeds.
+ *
+ * void bpf_ringbuf_discard(void *data, u64 flags)
+ * Description
+ * Discard reserved ring buffer sample, pointed to by *data*.
+ * If **BPF_RB_NO_WAKEUP** is specified in *flags*, no notification
+ * of new data availability is sent.
+ * If **BPF_RB_FORCE_WAKEUP** is specified in *flags*, notification
+ * of new data availability is sent unconditionally.
+ * If **0** is specified in *flags*, an adaptive notification
+ * of new data availability is sent.
+ *
+ * See 'bpf_ringbuf_output()' for the definition of adaptive notification.
+ * Return
+ * Nothing. Always succeeds.
+ *
+ * u64 bpf_ringbuf_query(void *ringbuf, u64 flags)
+ * Description
+ * Query various characteristics of provided ring buffer. What
+ * exactly is queries is determined by *flags*:
+ *
+ * * **BPF_RB_AVAIL_DATA**: Amount of data not yet consumed.
+ * * **BPF_RB_RING_SIZE**: The size of ring buffer.
+ * * **BPF_RB_CONS_POS**: Consumer position (can wrap around).
+ * * **BPF_RB_PROD_POS**: Producer(s) position (can wrap around).
+ *
+ * Data returned is just a momentary snapshot of actual values
+ * and could be inaccurate, so this facility should be used to
+ * power heuristics and for reporting, not to make 100% correct
+ * calculation.
+ * Return
+ * Requested value, or 0, if *flags* are not recognized.
+ *
+ * long bpf_csum_level(struct sk_buff *skb, u64 level)
+ * Description
+ * Change the skbs checksum level by one layer up or down, or
+ * reset it entirely to none in order to have the stack perform
+ * checksum validation. The level is applicable to the following
+ * protocols: TCP, UDP, GRE, SCTP, FCOE. For example, a decap of
+ * | ETH | IP | UDP | GUE | IP | TCP | into | ETH | IP | TCP |
+ * through **bpf_skb_adjust_room**\ () helper with passing in
+ * **BPF_F_ADJ_ROOM_NO_CSUM_RESET** flag would require one call
+ * to **bpf_csum_level**\ () with **BPF_CSUM_LEVEL_DEC** since
+ * the UDP header is removed. Similarly, an encap of the latter
+ * into the former could be accompanied by a helper call to
+ * **bpf_csum_level**\ () with **BPF_CSUM_LEVEL_INC** if the
+ * skb is still intended to be processed in higher layers of the
+ * stack instead of just egressing at tc.
+ *
+ * There are three supported level settings at this time:
+ *
+ * * **BPF_CSUM_LEVEL_INC**: Increases skb->csum_level for skbs
+ * with CHECKSUM_UNNECESSARY.
+ * * **BPF_CSUM_LEVEL_DEC**: Decreases skb->csum_level for skbs
+ * with CHECKSUM_UNNECESSARY.
+ * * **BPF_CSUM_LEVEL_RESET**: Resets skb->csum_level to 0 and
+ * sets CHECKSUM_NONE to force checksum validation by the stack.
+ * * **BPF_CSUM_LEVEL_QUERY**: No-op, returns the current
+ * skb->csum_level.
+ * Return
+ * 0 on success, or a negative error in case of failure. In the
+ * case of **BPF_CSUM_LEVEL_QUERY**, the current skb->csum_level
+ * is returned or the error code -EACCES in case the skb is not
+ * subject to CHECKSUM_UNNECESSARY.
+ *
+ * struct tcp6_sock *bpf_skc_to_tcp6_sock(void *sk)
+ * Description
+ * Dynamically cast a *sk* pointer to a *tcp6_sock* pointer.
+ * Return
+ * *sk* if casting is valid, or **NULL** otherwise.
+ *
+ * struct tcp_sock *bpf_skc_to_tcp_sock(void *sk)
+ * Description
+ * Dynamically cast a *sk* pointer to a *tcp_sock* pointer.
+ * Return
+ * *sk* if casting is valid, or **NULL** otherwise.
+ *
+ * struct tcp_timewait_sock *bpf_skc_to_tcp_timewait_sock(void *sk)
+ * Description
+ * Dynamically cast a *sk* pointer to a *tcp_timewait_sock* pointer.
+ * Return
+ * *sk* if casting is valid, or **NULL** otherwise.
+ *
+ * struct tcp_request_sock *bpf_skc_to_tcp_request_sock(void *sk)
+ * Description
+ * Dynamically cast a *sk* pointer to a *tcp_request_sock* pointer.
+ * Return
+ * *sk* if casting is valid, or **NULL** otherwise.
+ *
+ * struct udp6_sock *bpf_skc_to_udp6_sock(void *sk)
+ * Description
+ * Dynamically cast a *sk* pointer to a *udp6_sock* pointer.
+ * Return
+ * *sk* if casting is valid, or **NULL** otherwise.
+ *
+ * long bpf_get_task_stack(struct task_struct *task, void *buf, u32 size, u64 flags)
+ * Description
+ * Return a user or a kernel stack in bpf program provided buffer.
+ * To achieve this, the helper needs *task*, which is a valid
+ * pointer to **struct task_struct**. To store the stacktrace, the
+ * bpf program provides *buf* with a nonnegative *size*.
+ *
+ * The last argument, *flags*, holds the number of stack frames to
+ * skip (from 0 to 255), masked with
+ * **BPF_F_SKIP_FIELD_MASK**. The next bits can be used to set
+ * the following flags:
+ *
+ * **BPF_F_USER_STACK**
+ * Collect a user space stack instead of a kernel stack.
+ * **BPF_F_USER_BUILD_ID**
+ * Collect buildid+offset instead of ips for user stack,
+ * only valid if **BPF_F_USER_STACK** is also specified.
+ *
+ * **bpf_get_task_stack**\ () can collect up to
+ * **PERF_MAX_STACK_DEPTH** both kernel and user frames, subject
+ * to sufficient large buffer size. Note that
+ * this limit can be controlled with the **sysctl** program, and
+ * that it should be manually increased in order to profile long
+ * user stacks (such as stacks for Java programs). To do so, use:
+ *
+ * ::
+ *
+ * # sysctl kernel.perf_event_max_stack=<new value>
+ * Return
+ * The non-negative copied *buf* length equal to or less than
+ * *size* on success, or a negative error in case of failure.
+ *
+ * long bpf_load_hdr_opt(struct bpf_sock_ops *skops, void *searchby_res, u32 len, u64 flags)
+ * Description
+ * Load header option. Support reading a particular TCP header
+ * option for bpf program (**BPF_PROG_TYPE_SOCK_OPS**).
+ *
+ * If *flags* is 0, it will search the option from the
+ * *skops*\ **->skb_data**. The comment in **struct bpf_sock_ops**
+ * has details on what skb_data contains under different
+ * *skops*\ **->op**.
+ *
+ * The first byte of the *searchby_res* specifies the
+ * kind that it wants to search.
+ *
+ * If the searching kind is an experimental kind
+ * (i.e. 253 or 254 according to RFC6994). It also
+ * needs to specify the "magic" which is either
+ * 2 bytes or 4 bytes. It then also needs to
+ * specify the size of the magic by using
+ * the 2nd byte which is "kind-length" of a TCP
+ * header option and the "kind-length" also
+ * includes the first 2 bytes "kind" and "kind-length"
+ * itself as a normal TCP header option also does.
+ *
+ * For example, to search experimental kind 254 with
+ * 2 byte magic 0xeB9F, the searchby_res should be
+ * [ 254, 4, 0xeB, 0x9F, 0, 0, .... 0 ].
+ *
+ * To search for the standard window scale option (3),
+ * the *searchby_res* should be [ 3, 0, 0, .... 0 ].
+ * Note, kind-length must be 0 for regular option.
+ *
+ * Searching for No-Op (0) and End-of-Option-List (1) are
+ * not supported.
+ *
+ * *len* must be at least 2 bytes which is the minimal size
+ * of a header option.
+ *
+ * Supported flags:
+ *
+ * * **BPF_LOAD_HDR_OPT_TCP_SYN** to search from the
+ * saved_syn packet or the just-received syn packet.
+ *
+ * Return
+ * > 0 when found, the header option is copied to *searchby_res*.
+ * The return value is the total length copied. On failure, a
+ * negative error code is returned:
+ *
+ * **-EINVAL** if a parameter is invalid.
+ *
+ * **-ENOMSG** if the option is not found.
+ *
+ * **-ENOENT** if no syn packet is available when
+ * **BPF_LOAD_HDR_OPT_TCP_SYN** is used.
+ *
+ * **-ENOSPC** if there is not enough space. Only *len* number of
+ * bytes are copied.
+ *
+ * **-EFAULT** on failure to parse the header options in the
+ * packet.
+ *
+ * **-EPERM** if the helper cannot be used under the current
+ * *skops*\ **->op**.
+ *
+ * long bpf_store_hdr_opt(struct bpf_sock_ops *skops, const void *from, u32 len, u64 flags)
+ * Description
+ * Store header option. The data will be copied
+ * from buffer *from* with length *len* to the TCP header.
+ *
+ * The buffer *from* should have the whole option that
+ * includes the kind, kind-length, and the actual
+ * option data. The *len* must be at least kind-length
+ * long. The kind-length does not have to be 4 byte
+ * aligned. The kernel will take care of the padding
+ * and setting the 4 bytes aligned value to th->doff.
+ *
+ * This helper will check for duplicated option
+ * by searching the same option in the outgoing skb.
+ *
+ * This helper can only be called during
+ * **BPF_SOCK_OPS_WRITE_HDR_OPT_CB**.
+ *
+ * Return
+ * 0 on success, or negative error in case of failure:
+ *
+ * **-EINVAL** If param is invalid.
+ *
+ * **-ENOSPC** if there is not enough space in the header.
+ * Nothing has been written
+ *
+ * **-EEXIST** if the option already exists.
+ *
+ * **-EFAULT** on failure to parse the existing header options.
+ *
+ * **-EPERM** if the helper cannot be used under the current
+ * *skops*\ **->op**.
+ *
+ * long bpf_reserve_hdr_opt(struct bpf_sock_ops *skops, u32 len, u64 flags)
+ * Description
+ * Reserve *len* bytes for the bpf header option. The
+ * space will be used by **bpf_store_hdr_opt**\ () later in
+ * **BPF_SOCK_OPS_WRITE_HDR_OPT_CB**.
+ *
+ * If **bpf_reserve_hdr_opt**\ () is called multiple times,
+ * the total number of bytes will be reserved.
+ *
+ * This helper can only be called during
+ * **BPF_SOCK_OPS_HDR_OPT_LEN_CB**.
+ *
+ * Return
+ * 0 on success, or negative error in case of failure:
+ *
+ * **-EINVAL** if a parameter is invalid.
+ *
+ * **-ENOSPC** if there is not enough space in the header.
+ *
+ * **-EPERM** if the helper cannot be used under the current
+ * *skops*\ **->op**.
+ *
+ * void *bpf_inode_storage_get(struct bpf_map *map, void *inode, void *value, u64 flags)
+ * Description
+ * Get a bpf_local_storage from an *inode*.
+ *
+ * Logically, it could be thought of as getting the value from
+ * a *map* with *inode* as the **key**. From this
+ * perspective, the usage is not much different from
+ * **bpf_map_lookup_elem**\ (*map*, **&**\ *inode*) except this
+ * helper enforces the key must be an inode and the map must also
+ * be a **BPF_MAP_TYPE_INODE_STORAGE**.
+ *
+ * Underneath, the value is stored locally at *inode* instead of
+ * the *map*. The *map* is used as the bpf-local-storage
+ * "type". The bpf-local-storage "type" (i.e. the *map*) is
+ * searched against all bpf_local_storage residing at *inode*.
+ *
+ * An optional *flags* (**BPF_LOCAL_STORAGE_GET_F_CREATE**) can be
+ * used such that a new bpf_local_storage will be
+ * created if one does not exist. *value* can be used
+ * together with **BPF_LOCAL_STORAGE_GET_F_CREATE** to specify
+ * the initial value of a bpf_local_storage. If *value* is
+ * **NULL**, the new bpf_local_storage will be zero initialized.
+ * Return
+ * A bpf_local_storage pointer is returned on success.
+ *
+ * **NULL** if not found or there was an error in adding
+ * a new bpf_local_storage.
+ *
+ * int bpf_inode_storage_delete(struct bpf_map *map, void *inode)
+ * Description
+ * Delete a bpf_local_storage from an *inode*.
+ * Return
+ * 0 on success.
+ *
+ * **-ENOENT** if the bpf_local_storage cannot be found.
+ *
+ * long bpf_d_path(struct path *path, char *buf, u32 sz)
+ * Description
+ * Return full path for given **struct path** object, which
+ * needs to be the kernel BTF *path* object. The path is
+ * returned in the provided buffer *buf* of size *sz* and
+ * is zero terminated.
+ *
+ * Return
+ * On success, the strictly positive length of the string,
+ * including the trailing NUL character. On error, a negative
+ * value.
+ *
+ * long bpf_copy_from_user(void *dst, u32 size, const void *user_ptr)
+ * Description
+ * Read *size* bytes from user space address *user_ptr* and store
+ * the data in *dst*. This is a wrapper of **copy_from_user**\ ().
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_snprintf_btf(char *str, u32 str_size, struct btf_ptr *ptr, u32 btf_ptr_size, u64 flags)
+ * Description
+ * Use BTF to store a string representation of *ptr*->ptr in *str*,
+ * using *ptr*->type_id. This value should specify the type
+ * that *ptr*->ptr points to. LLVM __builtin_btf_type_id(type, 1)
+ * can be used to look up vmlinux BTF type ids. Traversing the
+ * data structure using BTF, the type information and values are
+ * stored in the first *str_size* - 1 bytes of *str*. Safe copy of
+ * the pointer data is carried out to avoid kernel crashes during
+ * operation. Smaller types can use string space on the stack;
+ * larger programs can use map data to store the string
+ * representation.
+ *
+ * The string can be subsequently shared with userspace via
+ * bpf_perf_event_output() or ring buffer interfaces.
+ * bpf_trace_printk() is to be avoided as it places too small
+ * a limit on string size to be useful.
+ *
+ * *flags* is a combination of
+ *
+ * **BTF_F_COMPACT**
+ * no formatting around type information
+ * **BTF_F_NONAME**
+ * no struct/union member names/types
+ * **BTF_F_PTR_RAW**
+ * show raw (unobfuscated) pointer values;
+ * equivalent to printk specifier %px.
+ * **BTF_F_ZERO**
+ * show zero-valued struct/union members; they
+ * are not displayed by default
+ *
+ * Return
+ * The number of bytes that were written (or would have been
+ * written if output had to be truncated due to string size),
+ * or a negative error in cases of failure.
+ *
+ * long bpf_seq_printf_btf(struct seq_file *m, struct btf_ptr *ptr, u32 ptr_size, u64 flags)
+ * Description
+ * Use BTF to write to seq_write a string representation of
+ * *ptr*->ptr, using *ptr*->type_id as per bpf_snprintf_btf().
+ * *flags* are identical to those used for bpf_snprintf_btf.
+ * Return
+ * 0 on success or a negative error in case of failure.
+ *
+ * u64 bpf_skb_cgroup_classid(struct sk_buff *skb)
+ * Description
+ * See **bpf_get_cgroup_classid**\ () for the main description.
+ * This helper differs from **bpf_get_cgroup_classid**\ () in that
+ * the cgroup v1 net_cls class is retrieved only from the *skb*'s
+ * associated socket instead of the current process.
+ * Return
+ * The id is returned or 0 in case the id could not be retrieved.
+ *
+ * long bpf_redirect_neigh(u32 ifindex, struct bpf_redir_neigh *params, int plen, u64 flags)
+ * Description
+ * Redirect the packet to another net device of index *ifindex*
+ * and fill in L2 addresses from neighboring subsystem. This helper
+ * is somewhat similar to **bpf_redirect**\ (), except that it
+ * populates L2 addresses as well, meaning, internally, the helper
+ * relies on the neighbor lookup for the L2 address of the nexthop.
+ *
+ * The helper will perform a FIB lookup based on the skb's
+ * networking header to get the address of the next hop, unless
+ * this is supplied by the caller in the *params* argument. The
+ * *plen* argument indicates the len of *params* and should be set
+ * to 0 if *params* is NULL.
+ *
+ * The *flags* argument is reserved and must be 0. The helper is
+ * currently only supported for tc BPF program types, and enabled
+ * for IPv4 and IPv6 protocols.
+ * Return
+ * The helper returns **TC_ACT_REDIRECT** on success or
+ * **TC_ACT_SHOT** on error.
+ *
+ * void *bpf_per_cpu_ptr(const void *percpu_ptr, u32 cpu)
+ * Description
+ * Take a pointer to a percpu ksym, *percpu_ptr*, and return a
+ * pointer to the percpu kernel variable on *cpu*. A ksym is an
+ * extern variable decorated with '__ksym'. For ksym, there is a
+ * global var (either static or global) defined of the same name
+ * in the kernel. The ksym is percpu if the global var is percpu.
+ * The returned pointer points to the global percpu var on *cpu*.
+ *
+ * bpf_per_cpu_ptr() has the same semantic as per_cpu_ptr() in the
+ * kernel, except that bpf_per_cpu_ptr() may return NULL. This
+ * happens if *cpu* is larger than nr_cpu_ids. The caller of
+ * bpf_per_cpu_ptr() must check the returned value.
+ * Return
+ * A pointer pointing to the kernel percpu variable on *cpu*, or
+ * NULL, if *cpu* is invalid.
+ *
+ * void *bpf_this_cpu_ptr(const void *percpu_ptr)
+ * Description
+ * Take a pointer to a percpu ksym, *percpu_ptr*, and return a
+ * pointer to the percpu kernel variable on this cpu. See the
+ * description of 'ksym' in **bpf_per_cpu_ptr**\ ().
+ *
+ * bpf_this_cpu_ptr() has the same semantic as this_cpu_ptr() in
+ * the kernel. Different from **bpf_per_cpu_ptr**\ (), it would
+ * never return NULL.
+ * Return
+ * A pointer pointing to the kernel percpu variable on this cpu.
+ *
+ * long bpf_redirect_peer(u32 ifindex, u64 flags)
+ * Description
+ * Redirect the packet to another net device of index *ifindex*.
+ * This helper is somewhat similar to **bpf_redirect**\ (), except
+ * that the redirection happens to the *ifindex*' peer device and
+ * the netns switch takes place from ingress to ingress without
+ * going through the CPU's backlog queue.
+ *
+ * The *flags* argument is reserved and must be 0. The helper is
+ * currently only supported for tc BPF program types at the ingress
+ * hook and for veth device types. The peer device must reside in a
+ * different network namespace.
+ * Return
+ * The helper returns **TC_ACT_REDIRECT** on success or
+ * **TC_ACT_SHOT** on error.
+ *
+ * void *bpf_task_storage_get(struct bpf_map *map, struct task_struct *task, void *value, u64 flags)
+ * Description
+ * Get a bpf_local_storage from the *task*.
+ *
+ * Logically, it could be thought of as getting the value from
+ * a *map* with *task* as the **key**. From this
+ * perspective, the usage is not much different from
+ * **bpf_map_lookup_elem**\ (*map*, **&**\ *task*) except this
+ * helper enforces the key must be a task_struct and the map must also
+ * be a **BPF_MAP_TYPE_TASK_STORAGE**.
+ *
+ * Underneath, the value is stored locally at *task* instead of
+ * the *map*. The *map* is used as the bpf-local-storage
+ * "type". The bpf-local-storage "type" (i.e. the *map*) is
+ * searched against all bpf_local_storage residing at *task*.
+ *
+ * An optional *flags* (**BPF_LOCAL_STORAGE_GET_F_CREATE**) can be
+ * used such that a new bpf_local_storage will be
+ * created if one does not exist. *value* can be used
+ * together with **BPF_LOCAL_STORAGE_GET_F_CREATE** to specify
+ * the initial value of a bpf_local_storage. If *value* is
+ * **NULL**, the new bpf_local_storage will be zero initialized.
+ * Return
+ * A bpf_local_storage pointer is returned on success.
+ *
+ * **NULL** if not found or there was an error in adding
+ * a new bpf_local_storage.
+ *
+ * long bpf_task_storage_delete(struct bpf_map *map, struct task_struct *task)
+ * Description
+ * Delete a bpf_local_storage from a *task*.
+ * Return
+ * 0 on success.
+ *
+ * **-ENOENT** if the bpf_local_storage cannot be found.
+ *
+ * struct task_struct *bpf_get_current_task_btf(void)
+ * Description
+ * Return a BTF pointer to the "current" task.
+ * This pointer can also be used in helpers that accept an
+ * *ARG_PTR_TO_BTF_ID* of type *task_struct*.
+ * Return
+ * Pointer to the current task.
+ *
+ * long bpf_bprm_opts_set(struct linux_binprm *bprm, u64 flags)
+ * Description
+ * Set or clear certain options on *bprm*:
+ *
+ * **BPF_F_BPRM_SECUREEXEC** Set the secureexec bit
+ * which sets the **AT_SECURE** auxv for glibc. The bit
+ * is cleared if the flag is not specified.
+ * Return
+ * **-EINVAL** if invalid *flags* are passed, zero otherwise.
+ *
+ * u64 bpf_ktime_get_coarse_ns(void)
+ * Description
+ * Return a coarse-grained version of the time elapsed since
+ * system boot, in nanoseconds. Does not include time the system
+ * was suspended.
+ *
+ * See: **clock_gettime**\ (**CLOCK_MONOTONIC_COARSE**)
+ * Return
+ * Current *ktime*.
+ *
+ * long bpf_ima_inode_hash(struct inode *inode, void *dst, u32 size)
+ * Description
+ * Returns the stored IMA hash of the *inode* (if it's available).
+ * If the hash is larger than *size*, then only *size*
+ * bytes will be copied to *dst*
+ * Return
+ * The **hash_algo** is returned on success,
+ * **-EOPNOTSUP** if IMA is disabled or **-EINVAL** if
+ * invalid arguments are passed.
+ *
+ * struct socket *bpf_sock_from_file(struct file *file)
+ * Description
+ * If the given file represents a socket, returns the associated
+ * socket.
+ * Return
+ * A pointer to a struct socket on success or NULL if the file is
+ * not a socket.
+ *
+ * long bpf_check_mtu(void *ctx, u32 ifindex, u32 *mtu_len, s32 len_diff, u64 flags)
+ * Description
+ * Check packet size against exceeding MTU of net device (based
+ * on *ifindex*). This helper will likely be used in combination
+ * with helpers that adjust/change the packet size.
+ *
+ * The argument *len_diff* can be used for querying with a planned
+ * size change. This allows to check MTU prior to changing packet
+ * ctx. Providing a *len_diff* adjustment that is larger than the
+ * actual packet size (resulting in negative packet size) will in
+ * principle not exceed the MTU, which is why it is not considered
+ * a failure. Other BPF helpers are needed for performing the
+ * planned size change; therefore the responsibility for catching
+ * a negative packet size belongs in those helpers.
+ *
+ * Specifying *ifindex* zero means the MTU check is performed
+ * against the current net device. This is practical if this isn't
+ * used prior to redirect.
+ *
+ * On input *mtu_len* must be a valid pointer, else verifier will
+ * reject BPF program. If the value *mtu_len* is initialized to
+ * zero then the ctx packet size is use. When value *mtu_len* is
+ * provided as input this specify the L3 length that the MTU check
+ * is done against. Remember XDP and TC length operate at L2, but
+ * this value is L3 as this correlate to MTU and IP-header tot_len
+ * values which are L3 (similar behavior as bpf_fib_lookup).
+ *
+ * The Linux kernel route table can configure MTUs on a more
+ * specific per route level, which is not provided by this helper.
+ * For route level MTU checks use the **bpf_fib_lookup**\ ()
+ * helper.
+ *
+ * *ctx* is either **struct xdp_md** for XDP programs or
+ * **struct sk_buff** for tc cls_act programs.
+ *
+ * The *flags* argument can be a combination of one or more of the
+ * following values:
+ *
+ * **BPF_MTU_CHK_SEGS**
+ * This flag will only works for *ctx* **struct sk_buff**.
+ * If packet context contains extra packet segment buffers
+ * (often knows as GSO skb), then MTU check is harder to
+ * check at this point, because in transmit path it is
+ * possible for the skb packet to get re-segmented
+ * (depending on net device features). This could still be
+ * a MTU violation, so this flag enables performing MTU
+ * check against segments, with a different violation
+ * return code to tell it apart. Check cannot use len_diff.
+ *
+ * On return *mtu_len* pointer contains the MTU value of the net
+ * device. Remember the net device configured MTU is the L3 size,
+ * which is returned here and XDP and TC length operate at L2.
+ * Helper take this into account for you, but remember when using
+ * MTU value in your BPF-code.
+ *
+ * Return
+ * * 0 on success, and populate MTU value in *mtu_len* pointer.
+ *
+ * * < 0 if any input argument is invalid (*mtu_len* not updated)
+ *
+ * MTU violations return positive values, but also populate MTU
+ * value in *mtu_len* pointer, as this can be needed for
+ * implementing PMTU handing:
+ *
+ * * **BPF_MTU_CHK_RET_FRAG_NEEDED**
+ * * **BPF_MTU_CHK_RET_SEGS_TOOBIG**
+ *
+ * long bpf_for_each_map_elem(struct bpf_map *map, void *callback_fn, void *callback_ctx, u64 flags)
+ * Description
+ * For each element in **map**, call **callback_fn** function with
+ * **map**, **callback_ctx** and other map-specific parameters.
+ * The **callback_fn** should be a static function and
+ * the **callback_ctx** should be a pointer to the stack.
+ * The **flags** is used to control certain aspects of the helper.
+ * Currently, the **flags** must be 0.
+ *
+ * The following are a list of supported map types and their
+ * respective expected callback signatures:
+ *
+ * BPF_MAP_TYPE_HASH, BPF_MAP_TYPE_PERCPU_HASH,
+ * BPF_MAP_TYPE_LRU_HASH, BPF_MAP_TYPE_LRU_PERCPU_HASH,
+ * BPF_MAP_TYPE_ARRAY, BPF_MAP_TYPE_PERCPU_ARRAY
+ *
+ * long (\*callback_fn)(struct bpf_map \*map, const void \*key, void \*value, void \*ctx);
+ *
+ * For per_cpu maps, the map_value is the value on the cpu where the
+ * bpf_prog is running.
+ *
+ * If **callback_fn** return 0, the helper will continue to the next
+ * element. If return value is 1, the helper will skip the rest of
+ * elements and return. Other return values are not used now.
+ *
+ * Return
+ * The number of traversed map elements for success, **-EINVAL** for
+ * invalid **flags**.
+ *
+ * long bpf_snprintf(char *str, u32 str_size, const char *fmt, u64 *data, u32 data_len)
+ * Description
+ * Outputs a string into the **str** buffer of size **str_size**
+ * based on a format string stored in a read-only map pointed by
+ * **fmt**.
+ *
+ * Each format specifier in **fmt** corresponds to one u64 element
+ * in the **data** array. For strings and pointers where pointees
+ * are accessed, only the pointer values are stored in the *data*
+ * array. The *data_len* is the size of *data* in bytes - must be
+ * a multiple of 8.
+ *
+ * Formats **%s** and **%p{i,I}{4,6}** require to read kernel
+ * memory. Reading kernel memory may fail due to either invalid
+ * address or valid address but requiring a major memory fault. If
+ * reading kernel memory fails, the string for **%s** will be an
+ * empty string, and the ip address for **%p{i,I}{4,6}** will be 0.
+ * Not returning error to bpf program is consistent with what
+ * **bpf_trace_printk**\ () does for now.
+ *
+ * Return
+ * The strictly positive length of the formatted string, including
+ * the trailing zero character. If the return value is greater than
+ * **str_size**, **str** contains a truncated string, guaranteed to
+ * be zero-terminated except when **str_size** is 0.
+ *
+ * Or **-EBUSY** if the per-CPU memory copy buffer is busy.
+ *
+ * long bpf_sys_bpf(u32 cmd, void *attr, u32 attr_size)
+ * Description
+ * Execute bpf syscall with given arguments.
+ * Return
+ * A syscall result.
+ *
+ * long bpf_btf_find_by_name_kind(char *name, int name_sz, u32 kind, int flags)
+ * Description
+ * Find BTF type with given name and kind in vmlinux BTF or in module's BTFs.
+ * Return
+ * Returns btf_id and btf_obj_fd in lower and upper 32 bits.
+ *
+ * long bpf_sys_close(u32 fd)
+ * Description
+ * Execute close syscall for given FD.
+ * Return
+ * A syscall result.
+ *
+ * long bpf_timer_init(struct bpf_timer *timer, struct bpf_map *map, u64 flags)
+ * Description
+ * Initialize the timer.
+ * First 4 bits of *flags* specify clockid.
+ * Only CLOCK_MONOTONIC, CLOCK_REALTIME, CLOCK_BOOTTIME are allowed.
+ * All other bits of *flags* are reserved.
+ * The verifier will reject the program if *timer* is not from
+ * the same *map*.
+ * Return
+ * 0 on success.
+ * **-EBUSY** if *timer* is already initialized.
+ * **-EINVAL** if invalid *flags* are passed.
+ * **-EPERM** if *timer* is in a map that doesn't have any user references.
+ * The user space should either hold a file descriptor to a map with timers
+ * or pin such map in bpffs. When map is unpinned or file descriptor is
+ * closed all timers in the map will be cancelled and freed.
+ *
+ * long bpf_timer_set_callback(struct bpf_timer *timer, void *callback_fn)
+ * Description
+ * Configure the timer to call *callback_fn* static function.
+ * Return
+ * 0 on success.
+ * **-EINVAL** if *timer* was not initialized with bpf_timer_init() earlier.
+ * **-EPERM** if *timer* is in a map that doesn't have any user references.
+ * The user space should either hold a file descriptor to a map with timers
+ * or pin such map in bpffs. When map is unpinned or file descriptor is
+ * closed all timers in the map will be cancelled and freed.
+ *
+ * long bpf_timer_start(struct bpf_timer *timer, u64 nsecs, u64 flags)
+ * Description
+ * Set timer expiration N nanoseconds from the current time. The
+ * configured callback will be invoked in soft irq context on some cpu
+ * and will not repeat unless another bpf_timer_start() is made.
+ * In such case the next invocation can migrate to a different cpu.
+ * Since struct bpf_timer is a field inside map element the map
+ * owns the timer. The bpf_timer_set_callback() will increment refcnt
+ * of BPF program to make sure that callback_fn code stays valid.
+ * When user space reference to a map reaches zero all timers
+ * in a map are cancelled and corresponding program's refcnts are
+ * decremented. This is done to make sure that Ctrl-C of a user
+ * process doesn't leave any timers running. If map is pinned in
+ * bpffs the callback_fn can re-arm itself indefinitely.
+ * bpf_map_update/delete_elem() helpers and user space sys_bpf commands
+ * cancel and free the timer in the given map element.
+ * The map can contain timers that invoke callback_fn-s from different
+ * programs. The same callback_fn can serve different timers from
+ * different maps if key/value layout matches across maps.
+ * Every bpf_timer_set_callback() can have different callback_fn.
+ *
+ * Return
+ * 0 on success.
+ * **-EINVAL** if *timer* was not initialized with bpf_timer_init() earlier
+ * or invalid *flags* are passed.
+ *
+ * long bpf_timer_cancel(struct bpf_timer *timer)
+ * Description
+ * Cancel the timer and wait for callback_fn to finish if it was running.
+ * Return
+ * 0 if the timer was not active.
+ * 1 if the timer was active.
+ * **-EINVAL** if *timer* was not initialized with bpf_timer_init() earlier.
+ * **-EDEADLK** if callback_fn tried to call bpf_timer_cancel() on its
+ * own timer which would have led to a deadlock otherwise.
+ *
+ * u64 bpf_get_func_ip(void *ctx)
+ * Description
+ * Get address of the traced function (for tracing and kprobe programs).
+ * Return
+ * Address of the traced function.
+ * 0 for kprobes placed within the function (not at the entry).
+ *
+ * u64 bpf_get_attach_cookie(void *ctx)
+ * Description
+ * Get bpf_cookie value provided (optionally) during the program
+ * attachment. It might be different for each individual
+ * attachment, even if BPF program itself is the same.
+ * Expects BPF program context *ctx* as a first argument.
+ *
+ * Supported for the following program types:
+ * - kprobe/uprobe;
+ * - tracepoint;
+ * - perf_event.
+ * Return
+ * Value specified by user at BPF link creation/attachment time
+ * or 0, if it was not specified.
+ *
+ * long bpf_task_pt_regs(struct task_struct *task)
+ * Description
+ * Get the struct pt_regs associated with **task**.
+ * Return
+ * A pointer to struct pt_regs.
+ *
+ * long bpf_get_branch_snapshot(void *entries, u32 size, u64 flags)
+ * Description
+ * Get branch trace from hardware engines like Intel LBR. The
+ * hardware engine is stopped shortly after the helper is
+ * called. Therefore, the user need to filter branch entries
+ * based on the actual use case. To capture branch trace
+ * before the trigger point of the BPF program, the helper
+ * should be called at the beginning of the BPF program.
+ *
+ * The data is stored as struct perf_branch_entry into output
+ * buffer *entries*. *size* is the size of *entries* in bytes.
+ * *flags* is reserved for now and must be zero.
+ *
+ * Return
+ * On success, number of bytes written to *buf*. On error, a
+ * negative value.
+ *
+ * **-EINVAL** if *flags* is not zero.
+ *
+ * **-ENOENT** if architecture does not support branch records.
+ *
+ * long bpf_trace_vprintk(const char *fmt, u32 fmt_size, const void *data, u32 data_len)
+ * Description
+ * Behaves like **bpf_trace_printk**\ () helper, but takes an array of u64
+ * to format and can handle more format args as a result.
+ *
+ * Arguments are to be used as in **bpf_seq_printf**\ () helper.
+ * Return
+ * The number of bytes written to the buffer, or a negative error
+ * in case of failure.
+ *
+ * struct unix_sock *bpf_skc_to_unix_sock(void *sk)
+ * Description
+ * Dynamically cast a *sk* pointer to a *unix_sock* pointer.
+ * Return
+ * *sk* if casting is valid, or **NULL** otherwise.
+ *
+ * long bpf_kallsyms_lookup_name(const char *name, int name_sz, int flags, u64 *res)
+ * Description
+ * Get the address of a kernel symbol, returned in *res*. *res* is
+ * set to 0 if the symbol is not found.
+ * Return
+ * On success, zero. On error, a negative value.
+ *
+ * **-EINVAL** if *flags* is not zero.
+ *
+ * **-EINVAL** if string *name* is not the same size as *name_sz*.
+ *
+ * **-ENOENT** if symbol is not found.
+ *
+ * **-EPERM** if caller does not have permission to obtain kernel address.
+ *
+ * long bpf_find_vma(struct task_struct *task, u64 addr, void *callback_fn, void *callback_ctx, u64 flags)
+ * Description
+ * Find vma of *task* that contains *addr*, call *callback_fn*
+ * function with *task*, *vma*, and *callback_ctx*.
+ * The *callback_fn* should be a static function and
+ * the *callback_ctx* should be a pointer to the stack.
+ * The *flags* is used to control certain aspects of the helper.
+ * Currently, the *flags* must be 0.
+ *
+ * The expected callback signature is
+ *
+ * long (\*callback_fn)(struct task_struct \*task, struct vm_area_struct \*vma, void \*callback_ctx);
+ *
+ * Return
+ * 0 on success.
+ * **-ENOENT** if *task->mm* is NULL, or no vma contains *addr*.
+ * **-EBUSY** if failed to try lock mmap_lock.
+ * **-EINVAL** for invalid **flags**.
+ *
+ * long bpf_loop(u32 nr_loops, void *callback_fn, void *callback_ctx, u64 flags)
+ * Description
+ * For **nr_loops**, call **callback_fn** function
+ * with **callback_ctx** as the context parameter.
+ * The **callback_fn** should be a static function and
+ * the **callback_ctx** should be a pointer to the stack.
+ * The **flags** is used to control certain aspects of the helper.
+ * Currently, the **flags** must be 0. Currently, nr_loops is
+ * limited to 1 << 23 (~8 million) loops.
+ *
+ * long (\*callback_fn)(u32 index, void \*ctx);
+ *
+ * where **index** is the current index in the loop. The index
+ * is zero-indexed.
+ *
+ * If **callback_fn** returns 0, the helper will continue to the next
+ * loop. If return value is 1, the helper will skip the rest of
+ * the loops and return. Other return values are not used now,
+ * and will be rejected by the verifier.
+ *
+ * Return
+ * The number of loops performed, **-EINVAL** for invalid **flags**,
+ * **-E2BIG** if **nr_loops** exceeds the maximum number of loops.
+ *
+ * long bpf_strncmp(const char *s1, u32 s1_sz, const char *s2)
+ * Description
+ * Do strncmp() between **s1** and **s2**. **s1** doesn't need
+ * to be null-terminated and **s1_sz** is the maximum storage
+ * size of **s1**. **s2** must be a read-only string.
+ * Return
+ * An integer less than, equal to, or greater than zero
+ * if the first **s1_sz** bytes of **s1** is found to be
+ * less than, to match, or be greater than **s2**.
+ *
+ * long bpf_get_func_arg(void *ctx, u32 n, u64 *value)
+ * Description
+ * Get **n**-th argument register (zero based) of the traced function (for tracing programs)
+ * returned in **value**.
+ *
+ * Return
+ * 0 on success.
+ * **-EINVAL** if n >= argument register count of traced function.
+ *
+ * long bpf_get_func_ret(void *ctx, u64 *value)
+ * Description
+ * Get return value of the traced function (for tracing programs)
+ * in **value**.
+ *
+ * Return
+ * 0 on success.
+ * **-EOPNOTSUPP** for tracing programs other than BPF_TRACE_FEXIT or BPF_MODIFY_RETURN.
+ *
+ * long bpf_get_func_arg_cnt(void *ctx)
+ * Description
+ * Get number of registers of the traced function (for tracing programs) where
+ * function arguments are stored in these registers.
+ *
+ * Return
+ * The number of argument registers of the traced function.
+ *
+ * int bpf_get_retval(void)
+ * Description
+ * Get the BPF program's return value that will be returned to the upper layers.
+ *
+ * This helper is currently supported by cgroup programs and only by the hooks
+ * where BPF program's return value is returned to the userspace via errno.
+ * Return
+ * The BPF program's return value.
+ *
+ * int bpf_set_retval(int retval)
+ * Description
+ * Set the BPF program's return value that will be returned to the upper layers.
+ *
+ * This helper is currently supported by cgroup programs and only by the hooks
+ * where BPF program's return value is returned to the userspace via errno.
+ *
+ * Note that there is the following corner case where the program exports an error
+ * via bpf_set_retval but signals success via 'return 1':
+ *
+ * bpf_set_retval(-EPERM);
+ * return 1;
+ *
+ * In this case, the BPF program's return value will use helper's -EPERM. This
+ * still holds true for cgroup/bind{4,6} which supports extra 'return 3' success case.
+ *
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * u64 bpf_xdp_get_buff_len(struct xdp_buff *xdp_md)
+ * Description
+ * Get the total size of a given xdp buff (linear and paged area)
+ * Return
+ * The total size of a given xdp buffer.
+ *
+ * long bpf_xdp_load_bytes(struct xdp_buff *xdp_md, u32 offset, void *buf, u32 len)
+ * Description
+ * This helper is provided as an easy way to load data from a
+ * xdp buffer. It can be used to load *len* bytes from *offset* from
+ * the frame associated to *xdp_md*, into the buffer pointed by
+ * *buf*.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_xdp_store_bytes(struct xdp_buff *xdp_md, u32 offset, void *buf, u32 len)
+ * Description
+ * Store *len* bytes from buffer *buf* into the frame
+ * associated to *xdp_md*, at *offset*.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * long bpf_copy_from_user_task(void *dst, u32 size, const void *user_ptr, struct task_struct *tsk, u64 flags)
+ * Description
+ * Read *size* bytes from user space address *user_ptr* in *tsk*'s
+ * address space, and stores the data in *dst*. *flags* is not
+ * used yet and is provided for future extensibility. This helper
+ * can only be used by sleepable programs.
+ * Return
+ * 0 on success, or a negative error in case of failure. On error
+ * *dst* buffer is zeroed out.
+ *
+ * long bpf_skb_set_tstamp(struct sk_buff *skb, u64 tstamp, u32 tstamp_type)
+ * Description
+ * Change the __sk_buff->tstamp_type to *tstamp_type*
+ * and set *tstamp* to the __sk_buff->tstamp together.
+ *
+ * If there is no need to change the __sk_buff->tstamp_type,
+ * the tstamp value can be directly written to __sk_buff->tstamp
+ * instead.
+ *
+ * BPF_SKB_TSTAMP_DELIVERY_MONO is the only tstamp that
+ * will be kept during bpf_redirect_*(). A non zero
+ * *tstamp* must be used with the BPF_SKB_TSTAMP_DELIVERY_MONO
+ * *tstamp_type*.
+ *
+ * A BPF_SKB_TSTAMP_UNSPEC *tstamp_type* can only be used
+ * with a zero *tstamp*.
+ *
+ * Only IPv4 and IPv6 skb->protocol are supported.
+ *
+ * This function is most useful when it needs to set a
+ * mono delivery time to __sk_buff->tstamp and then
+ * bpf_redirect_*() to the egress of an iface. For example,
+ * changing the (rcv) timestamp in __sk_buff->tstamp at
+ * ingress to a mono delivery time and then bpf_redirect_*()
+ * to sch_fq@phy-dev.
+ * Return
+ * 0 on success.
+ * **-EINVAL** for invalid input
+ * **-EOPNOTSUPP** for unsupported protocol
+ *
+ * long bpf_ima_file_hash(struct file *file, void *dst, u32 size)
+ * Description
+ * Returns a calculated IMA hash of the *file*.
+ * If the hash is larger than *size*, then only *size*
+ * bytes will be copied to *dst*
+ * Return
+ * The **hash_algo** is returned on success,
+ * **-EOPNOTSUP** if the hash calculation failed or **-EINVAL** if
+ * invalid arguments are passed.
+ *
+ * void *bpf_kptr_xchg(void *map_value, void *ptr)
+ * Description
+ * Exchange kptr at pointer *map_value* with *ptr*, and return the
+ * old value. *ptr* can be NULL, otherwise it must be a referenced
+ * pointer which will be released when this helper is called.
+ * Return
+ * The old value of kptr (which can be NULL). The returned pointer
+ * if not NULL, is a reference which must be released using its
+ * corresponding release function, or moved into a BPF map before
+ * program exit.
+ *
+ * void *bpf_map_lookup_percpu_elem(struct bpf_map *map, const void *key, u32 cpu)
+ * Description
+ * Perform a lookup in *percpu map* for an entry associated to
+ * *key* on *cpu*.
+ * Return
+ * Map value associated to *key* on *cpu*, or **NULL** if no entry
+ * was found or *cpu* is invalid.
+ *
+ * struct mptcp_sock *bpf_skc_to_mptcp_sock(void *sk)
+ * Description
+ * Dynamically cast a *sk* pointer to a *mptcp_sock* pointer.
+ * Return
+ * *sk* if casting is valid, or **NULL** otherwise.
+ *
+ * long bpf_dynptr_from_mem(void *data, u32 size, u64 flags, struct bpf_dynptr *ptr)
+ * Description
+ * Get a dynptr to local memory *data*.
+ *
+ * *data* must be a ptr to a map value.
+ * The maximum *size* supported is DYNPTR_MAX_SIZE.
+ * *flags* is currently unused.
+ * Return
+ * 0 on success, -E2BIG if the size exceeds DYNPTR_MAX_SIZE,
+ * -EINVAL if flags is not 0.
+ *
+ * long bpf_ringbuf_reserve_dynptr(void *ringbuf, u32 size, u64 flags, struct bpf_dynptr *ptr)
+ * Description
+ * Reserve *size* bytes of payload in a ring buffer *ringbuf*
+ * through the dynptr interface. *flags* must be 0.
+ *
+ * Please note that a corresponding bpf_ringbuf_submit_dynptr or
+ * bpf_ringbuf_discard_dynptr must be called on *ptr*, even if the
+ * reservation fails. This is enforced by the verifier.
+ * Return
+ * 0 on success, or a negative error in case of failure.
+ *
+ * void bpf_ringbuf_submit_dynptr(struct bpf_dynptr *ptr, u64 flags)
+ * Description
+ * Submit reserved ring buffer sample, pointed to by *data*,
+ * through the dynptr interface. This is a no-op if the dynptr is
+ * invalid/null.
+ *
+ * For more information on *flags*, please see
+ * 'bpf_ringbuf_submit'.
+ * Return
+ * Nothing. Always succeeds.
+ *
+ * void bpf_ringbuf_discard_dynptr(struct bpf_dynptr *ptr, u64 flags)
+ * Description
+ * Discard reserved ring buffer sample through the dynptr
+ * interface. This is a no-op if the dynptr is invalid/null.
+ *
+ * For more information on *flags*, please see
+ * 'bpf_ringbuf_discard'.
+ * Return
+ * Nothing. Always succeeds.
+ *
+ * long bpf_dynptr_read(void *dst, u32 len, const struct bpf_dynptr *src, u32 offset, u64 flags)
+ * Description
+ * Read *len* bytes from *src* into *dst*, starting from *offset*
+ * into *src*.
+ * *flags* is currently unused.
+ * Return
+ * 0 on success, -E2BIG if *offset* + *len* exceeds the length
+ * of *src*'s data, -EINVAL if *src* is an invalid dynptr or if
+ * *flags* is not 0.
+ *
+ * long bpf_dynptr_write(const struct bpf_dynptr *dst, u32 offset, void *src, u32 len, u64 flags)
+ * Description
+ * Write *len* bytes from *src* into *dst*, starting from *offset*
+ * into *dst*.
+ * *flags* is currently unused.
+ * Return
+ * 0 on success, -E2BIG if *offset* + *len* exceeds the length
+ * of *dst*'s data, -EINVAL if *dst* is an invalid dynptr or if *dst*
+ * is a read-only dynptr or if *flags* is not 0.
+ *
+ * void *bpf_dynptr_data(const struct bpf_dynptr *ptr, u32 offset, u32 len)
+ * Description
+ * Get a pointer to the underlying dynptr data.
+ *
+ * *len* must be a statically known value. The returned data slice
+ * is invalidated whenever the dynptr is invalidated.
+ * Return
+ * Pointer to the underlying dynptr data, NULL if the dynptr is
+ * read-only, if the dynptr is invalid, or if the offset and length
+ * is out of bounds.
+ *
+ * s64 bpf_tcp_raw_gen_syncookie_ipv4(struct iphdr *iph, struct tcphdr *th, u32 th_len)
+ * Description
+ * Try to issue a SYN cookie for the packet with corresponding
+ * IPv4/TCP headers, *iph* and *th*, without depending on a
+ * listening socket.
+ *
+ * *iph* points to the IPv4 header.
+ *
+ * *th* points to the start of the TCP header, while *th_len*
+ * contains the length of the TCP header (at least
+ * **sizeof**\ (**struct tcphdr**)).
+ * Return
+ * On success, lower 32 bits hold the generated SYN cookie in
+ * followed by 16 bits which hold the MSS value for that cookie,
+ * and the top 16 bits are unused.
+ *
+ * On failure, the returned value is one of the following:
+ *
+ * **-EINVAL** if *th_len* is invalid.
+ *
+ * s64 bpf_tcp_raw_gen_syncookie_ipv6(struct ipv6hdr *iph, struct tcphdr *th, u32 th_len)
+ * Description
+ * Try to issue a SYN cookie for the packet with corresponding
+ * IPv6/TCP headers, *iph* and *th*, without depending on a
+ * listening socket.
+ *
+ * *iph* points to the IPv6 header.
+ *
+ * *th* points to the start of the TCP header, while *th_len*
+ * contains the length of the TCP header (at least
+ * **sizeof**\ (**struct tcphdr**)).
+ * Return
+ * On success, lower 32 bits hold the generated SYN cookie in
+ * followed by 16 bits which hold the MSS value for that cookie,
+ * and the top 16 bits are unused.
+ *
+ * On failure, the returned value is one of the following:
+ *
+ * **-EINVAL** if *th_len* is invalid.
+ *
+ * **-EPROTONOSUPPORT** if CONFIG_IPV6 is not builtin.
+ *
+ * long bpf_tcp_raw_check_syncookie_ipv4(struct iphdr *iph, struct tcphdr *th)
+ * Description
+ * Check whether *iph* and *th* contain a valid SYN cookie ACK
+ * without depending on a listening socket.
+ *
+ * *iph* points to the IPv4 header.
+ *
+ * *th* points to the TCP header.
+ * Return
+ * 0 if *iph* and *th* are a valid SYN cookie ACK.
+ *
+ * On failure, the returned value is one of the following:
+ *
+ * **-EACCES** if the SYN cookie is not valid.
+ *
+ * long bpf_tcp_raw_check_syncookie_ipv6(struct ipv6hdr *iph, struct tcphdr *th)
+ * Description
+ * Check whether *iph* and *th* contain a valid SYN cookie ACK
+ * without depending on a listening socket.
+ *
+ * *iph* points to the IPv6 header.
+ *
+ * *th* points to the TCP header.
+ * Return
+ * 0 if *iph* and *th* are a valid SYN cookie ACK.
+ *
+ * On failure, the returned value is one of the following:
+ *
+ * **-EACCES** if the SYN cookie is not valid.
+ *
+ * **-EPROTONOSUPPORT** if CONFIG_IPV6 is not builtin.
+ *
+ * u64 bpf_ktime_get_tai_ns(void)
+ * Description
+ * A nonsettable system-wide clock derived from wall-clock time but
+ * ignoring leap seconds. This clock does not experience
+ * discontinuities and backwards jumps caused by NTP inserting leap
+ * seconds as CLOCK_REALTIME does.
+ *
+ * See: **clock_gettime**\ (**CLOCK_TAI**)
+ * Return
+ * Current *ktime*.
+ *
+ * long bpf_user_ringbuf_drain(struct bpf_map *map, void *callback_fn, void *ctx, u64 flags)
+ * Description
+ * Drain samples from the specified user ring buffer, and invoke
+ * the provided callback for each such sample:
+ *
+ * long (\*callback_fn)(const struct bpf_dynptr \*dynptr, void \*ctx);
+ *
+ * If **callback_fn** returns 0, the helper will continue to try
+ * and drain the next sample, up to a maximum of
+ * BPF_MAX_USER_RINGBUF_SAMPLES samples. If the return value is 1,
+ * the helper will skip the rest of the samples and return. Other
+ * return values are not used now, and will be rejected by the
+ * verifier.
+ * Return
+ * The number of drained samples if no error was encountered while
+ * draining samples, or 0 if no samples were present in the ring
+ * buffer. If a user-space producer was epoll-waiting on this map,
+ * and at least one sample was drained, they will receive an event
+ * notification notifying them of available space in the ring
+ * buffer. If the BPF_RB_NO_WAKEUP flag is passed to this
+ * function, no wakeup notification will be sent. If the
+ * BPF_RB_FORCE_WAKEUP flag is passed, a wakeup notification will
+ * be sent even if no sample was drained.
+ *
+ * On failure, the returned value is one of the following:
+ *
+ * **-EBUSY** if the ring buffer is contended, and another calling
+ * context was concurrently draining the ring buffer.
+ *
+ * **-EINVAL** if user-space is not properly tracking the ring
+ * buffer due to the producer position not being aligned to 8
+ * bytes, a sample not being aligned to 8 bytes, or the producer
+ * position not matching the advertised length of a sample.
+ *
+ * **-E2BIG** if user-space has tried to publish a sample which is
+ * larger than the size of the ring buffer, or which cannot fit
+ * within a struct bpf_dynptr.
+ *
+ * void *bpf_cgrp_storage_get(struct bpf_map *map, struct cgroup *cgroup, void *value, u64 flags)
+ * Description
+ * Get a bpf_local_storage from the *cgroup*.
+ *
+ * Logically, it could be thought of as getting the value from
+ * a *map* with *cgroup* as the **key**. From this
+ * perspective, the usage is not much different from
+ * **bpf_map_lookup_elem**\ (*map*, **&**\ *cgroup*) except this
+ * helper enforces the key must be a cgroup struct and the map must also
+ * be a **BPF_MAP_TYPE_CGRP_STORAGE**.
+ *
+ * In reality, the local-storage value is embedded directly inside of the
+ * *cgroup* object itself, rather than being located in the
+ * **BPF_MAP_TYPE_CGRP_STORAGE** map. When the local-storage value is
+ * queried for some *map* on a *cgroup* object, the kernel will perform an
+ * O(n) iteration over all of the live local-storage values for that
+ * *cgroup* object until the local-storage value for the *map* is found.
+ *
+ * An optional *flags* (**BPF_LOCAL_STORAGE_GET_F_CREATE**) can be
+ * used such that a new bpf_local_storage will be
+ * created if one does not exist. *value* can be used
+ * together with **BPF_LOCAL_STORAGE_GET_F_CREATE** to specify
+ * the initial value of a bpf_local_storage. If *value* is
+ * **NULL**, the new bpf_local_storage will be zero initialized.
+ * Return
+ * A bpf_local_storage pointer is returned on success.
+ *
+ * **NULL** if not found or there was an error in adding
+ * a new bpf_local_storage.
+ *
+ * long bpf_cgrp_storage_delete(struct bpf_map *map, struct cgroup *cgroup)
+ * Description
+ * Delete a bpf_local_storage from a *cgroup*.
+ * Return
+ * 0 on success.
+ *
+ * **-ENOENT** if the bpf_local_storage cannot be found.
+ */
+#define ___BPF_FUNC_MAPPER(FN, ctx...) \
+ FN(unspec, 0, ##ctx) \
+ FN(map_lookup_elem, 1, ##ctx) \
+ FN(map_update_elem, 2, ##ctx) \
+ FN(map_delete_elem, 3, ##ctx) \
+ FN(probe_read, 4, ##ctx) \
+ FN(ktime_get_ns, 5, ##ctx) \
+ FN(trace_printk, 6, ##ctx) \
+ FN(get_prandom_u32, 7, ##ctx) \
+ FN(get_smp_processor_id, 8, ##ctx) \
+ FN(skb_store_bytes, 9, ##ctx) \
+ FN(l3_csum_replace, 10, ##ctx) \
+ FN(l4_csum_replace, 11, ##ctx) \
+ FN(tail_call, 12, ##ctx) \
+ FN(clone_redirect, 13, ##ctx) \
+ FN(get_current_pid_tgid, 14, ##ctx) \
+ FN(get_current_uid_gid, 15, ##ctx) \
+ FN(get_current_comm, 16, ##ctx) \
+ FN(get_cgroup_classid, 17, ##ctx) \
+ FN(skb_vlan_push, 18, ##ctx) \
+ FN(skb_vlan_pop, 19, ##ctx) \
+ FN(skb_get_tunnel_key, 20, ##ctx) \
+ FN(skb_set_tunnel_key, 21, ##ctx) \
+ FN(perf_event_read, 22, ##ctx) \
+ FN(redirect, 23, ##ctx) \
+ FN(get_route_realm, 24, ##ctx) \
+ FN(perf_event_output, 25, ##ctx) \
+ FN(skb_load_bytes, 26, ##ctx) \
+ FN(get_stackid, 27, ##ctx) \
+ FN(csum_diff, 28, ##ctx) \
+ FN(skb_get_tunnel_opt, 29, ##ctx) \
+ FN(skb_set_tunnel_opt, 30, ##ctx) \
+ FN(skb_change_proto, 31, ##ctx) \
+ FN(skb_change_type, 32, ##ctx) \
+ FN(skb_under_cgroup, 33, ##ctx) \
+ FN(get_hash_recalc, 34, ##ctx) \
+ FN(get_current_task, 35, ##ctx) \
+ FN(probe_write_user, 36, ##ctx) \
+ FN(current_task_under_cgroup, 37, ##ctx) \
+ FN(skb_change_tail, 38, ##ctx) \
+ FN(skb_pull_data, 39, ##ctx) \
+ FN(csum_update, 40, ##ctx) \
+ FN(set_hash_invalid, 41, ##ctx) \
+ FN(get_numa_node_id, 42, ##ctx) \
+ FN(skb_change_head, 43, ##ctx) \
+ FN(xdp_adjust_head, 44, ##ctx) \
+ FN(probe_read_str, 45, ##ctx) \
+ FN(get_socket_cookie, 46, ##ctx) \
+ FN(get_socket_uid, 47, ##ctx) \
+ FN(set_hash, 48, ##ctx) \
+ FN(setsockopt, 49, ##ctx) \
+ FN(skb_adjust_room, 50, ##ctx) \
+ FN(redirect_map, 51, ##ctx) \
+ FN(sk_redirect_map, 52, ##ctx) \
+ FN(sock_map_update, 53, ##ctx) \
+ FN(xdp_adjust_meta, 54, ##ctx) \
+ FN(perf_event_read_value, 55, ##ctx) \
+ FN(perf_prog_read_value, 56, ##ctx) \
+ FN(getsockopt, 57, ##ctx) \
+ FN(override_return, 58, ##ctx) \
+ FN(sock_ops_cb_flags_set, 59, ##ctx) \
+ FN(msg_redirect_map, 60, ##ctx) \
+ FN(msg_apply_bytes, 61, ##ctx) \
+ FN(msg_cork_bytes, 62, ##ctx) \
+ FN(msg_pull_data, 63, ##ctx) \
+ FN(bind, 64, ##ctx) \
+ FN(xdp_adjust_tail, 65, ##ctx) \
+ FN(skb_get_xfrm_state, 66, ##ctx) \
+ FN(get_stack, 67, ##ctx) \
+ FN(skb_load_bytes_relative, 68, ##ctx) \
+ FN(fib_lookup, 69, ##ctx) \
+ FN(sock_hash_update, 70, ##ctx) \
+ FN(msg_redirect_hash, 71, ##ctx) \
+ FN(sk_redirect_hash, 72, ##ctx) \
+ FN(lwt_push_encap, 73, ##ctx) \
+ FN(lwt_seg6_store_bytes, 74, ##ctx) \
+ FN(lwt_seg6_adjust_srh, 75, ##ctx) \
+ FN(lwt_seg6_action, 76, ##ctx) \
+ FN(rc_repeat, 77, ##ctx) \
+ FN(rc_keydown, 78, ##ctx) \
+ FN(skb_cgroup_id, 79, ##ctx) \
+ FN(get_current_cgroup_id, 80, ##ctx) \
+ FN(get_local_storage, 81, ##ctx) \
+ FN(sk_select_reuseport, 82, ##ctx) \
+ FN(skb_ancestor_cgroup_id, 83, ##ctx) \
+ FN(sk_lookup_tcp, 84, ##ctx) \
+ FN(sk_lookup_udp, 85, ##ctx) \
+ FN(sk_release, 86, ##ctx) \
+ FN(map_push_elem, 87, ##ctx) \
+ FN(map_pop_elem, 88, ##ctx) \
+ FN(map_peek_elem, 89, ##ctx) \
+ FN(msg_push_data, 90, ##ctx) \
+ FN(msg_pop_data, 91, ##ctx) \
+ FN(rc_pointer_rel, 92, ##ctx) \
+ FN(spin_lock, 93, ##ctx) \
+ FN(spin_unlock, 94, ##ctx) \
+ FN(sk_fullsock, 95, ##ctx) \
+ FN(tcp_sock, 96, ##ctx) \
+ FN(skb_ecn_set_ce, 97, ##ctx) \
+ FN(get_listener_sock, 98, ##ctx) \
+ FN(skc_lookup_tcp, 99, ##ctx) \
+ FN(tcp_check_syncookie, 100, ##ctx) \
+ FN(sysctl_get_name, 101, ##ctx) \
+ FN(sysctl_get_current_value, 102, ##ctx) \
+ FN(sysctl_get_new_value, 103, ##ctx) \
+ FN(sysctl_set_new_value, 104, ##ctx) \
+ FN(strtol, 105, ##ctx) \
+ FN(strtoul, 106, ##ctx) \
+ FN(sk_storage_get, 107, ##ctx) \
+ FN(sk_storage_delete, 108, ##ctx) \
+ FN(send_signal, 109, ##ctx) \
+ FN(tcp_gen_syncookie, 110, ##ctx) \
+ FN(skb_output, 111, ##ctx) \
+ FN(probe_read_user, 112, ##ctx) \
+ FN(probe_read_kernel, 113, ##ctx) \
+ FN(probe_read_user_str, 114, ##ctx) \
+ FN(probe_read_kernel_str, 115, ##ctx) \
+ FN(tcp_send_ack, 116, ##ctx) \
+ FN(send_signal_thread, 117, ##ctx) \
+ FN(jiffies64, 118, ##ctx) \
+ FN(read_branch_records, 119, ##ctx) \
+ FN(get_ns_current_pid_tgid, 120, ##ctx) \
+ FN(xdp_output, 121, ##ctx) \
+ FN(get_netns_cookie, 122, ##ctx) \
+ FN(get_current_ancestor_cgroup_id, 123, ##ctx) \
+ FN(sk_assign, 124, ##ctx) \
+ FN(ktime_get_boot_ns, 125, ##ctx) \
+ FN(seq_printf, 126, ##ctx) \
+ FN(seq_write, 127, ##ctx) \
+ FN(sk_cgroup_id, 128, ##ctx) \
+ FN(sk_ancestor_cgroup_id, 129, ##ctx) \
+ FN(ringbuf_output, 130, ##ctx) \
+ FN(ringbuf_reserve, 131, ##ctx) \
+ FN(ringbuf_submit, 132, ##ctx) \
+ FN(ringbuf_discard, 133, ##ctx) \
+ FN(ringbuf_query, 134, ##ctx) \
+ FN(csum_level, 135, ##ctx) \
+ FN(skc_to_tcp6_sock, 136, ##ctx) \
+ FN(skc_to_tcp_sock, 137, ##ctx) \
+ FN(skc_to_tcp_timewait_sock, 138, ##ctx) \
+ FN(skc_to_tcp_request_sock, 139, ##ctx) \
+ FN(skc_to_udp6_sock, 140, ##ctx) \
+ FN(get_task_stack, 141, ##ctx) \
+ FN(load_hdr_opt, 142, ##ctx) \
+ FN(store_hdr_opt, 143, ##ctx) \
+ FN(reserve_hdr_opt, 144, ##ctx) \
+ FN(inode_storage_get, 145, ##ctx) \
+ FN(inode_storage_delete, 146, ##ctx) \
+ FN(d_path, 147, ##ctx) \
+ FN(copy_from_user, 148, ##ctx) \
+ FN(snprintf_btf, 149, ##ctx) \
+ FN(seq_printf_btf, 150, ##ctx) \
+ FN(skb_cgroup_classid, 151, ##ctx) \
+ FN(redirect_neigh, 152, ##ctx) \
+ FN(per_cpu_ptr, 153, ##ctx) \
+ FN(this_cpu_ptr, 154, ##ctx) \
+ FN(redirect_peer, 155, ##ctx) \
+ FN(task_storage_get, 156, ##ctx) \
+ FN(task_storage_delete, 157, ##ctx) \
+ FN(get_current_task_btf, 158, ##ctx) \
+ FN(bprm_opts_set, 159, ##ctx) \
+ FN(ktime_get_coarse_ns, 160, ##ctx) \
+ FN(ima_inode_hash, 161, ##ctx) \
+ FN(sock_from_file, 162, ##ctx) \
+ FN(check_mtu, 163, ##ctx) \
+ FN(for_each_map_elem, 164, ##ctx) \
+ FN(snprintf, 165, ##ctx) \
+ FN(sys_bpf, 166, ##ctx) \
+ FN(btf_find_by_name_kind, 167, ##ctx) \
+ FN(sys_close, 168, ##ctx) \
+ FN(timer_init, 169, ##ctx) \
+ FN(timer_set_callback, 170, ##ctx) \
+ FN(timer_start, 171, ##ctx) \
+ FN(timer_cancel, 172, ##ctx) \
+ FN(get_func_ip, 173, ##ctx) \
+ FN(get_attach_cookie, 174, ##ctx) \
+ FN(task_pt_regs, 175, ##ctx) \
+ FN(get_branch_snapshot, 176, ##ctx) \
+ FN(trace_vprintk, 177, ##ctx) \
+ FN(skc_to_unix_sock, 178, ##ctx) \
+ FN(kallsyms_lookup_name, 179, ##ctx) \
+ FN(find_vma, 180, ##ctx) \
+ FN(loop, 181, ##ctx) \
+ FN(strncmp, 182, ##ctx) \
+ FN(get_func_arg, 183, ##ctx) \
+ FN(get_func_ret, 184, ##ctx) \
+ FN(get_func_arg_cnt, 185, ##ctx) \
+ FN(get_retval, 186, ##ctx) \
+ FN(set_retval, 187, ##ctx) \
+ FN(xdp_get_buff_len, 188, ##ctx) \
+ FN(xdp_load_bytes, 189, ##ctx) \
+ FN(xdp_store_bytes, 190, ##ctx) \
+ FN(copy_from_user_task, 191, ##ctx) \
+ FN(skb_set_tstamp, 192, ##ctx) \
+ FN(ima_file_hash, 193, ##ctx) \
+ FN(kptr_xchg, 194, ##ctx) \
+ FN(map_lookup_percpu_elem, 195, ##ctx) \
+ FN(skc_to_mptcp_sock, 196, ##ctx) \
+ FN(dynptr_from_mem, 197, ##ctx) \
+ FN(ringbuf_reserve_dynptr, 198, ##ctx) \
+ FN(ringbuf_submit_dynptr, 199, ##ctx) \
+ FN(ringbuf_discard_dynptr, 200, ##ctx) \
+ FN(dynptr_read, 201, ##ctx) \
+ FN(dynptr_write, 202, ##ctx) \
+ FN(dynptr_data, 203, ##ctx) \
+ FN(tcp_raw_gen_syncookie_ipv4, 204, ##ctx) \
+ FN(tcp_raw_gen_syncookie_ipv6, 205, ##ctx) \
+ FN(tcp_raw_check_syncookie_ipv4, 206, ##ctx) \
+ FN(tcp_raw_check_syncookie_ipv6, 207, ##ctx) \
+ FN(ktime_get_tai_ns, 208, ##ctx) \
+ FN(user_ringbuf_drain, 209, ##ctx) \
+ FN(cgrp_storage_get, 210, ##ctx) \
+ FN(cgrp_storage_delete, 211, ##ctx) \
+ /* */
+
+/* backwards-compatibility macros for users of __BPF_FUNC_MAPPER that don't
+ * know or care about integer value that is now passed as second argument
+ */
+#define __BPF_FUNC_MAPPER_APPLY(name, value, FN) FN(name),
+#define __BPF_FUNC_MAPPER(FN) ___BPF_FUNC_MAPPER(__BPF_FUNC_MAPPER_APPLY, FN)
+
+/* integer value in 'imm' field of BPF_CALL instruction selects which helper
+ * function eBPF program intends to call
+ */
+#define __BPF_ENUM_FN(x, y) BPF_FUNC_ ## x = y,
+enum bpf_func_id {
+ ___BPF_FUNC_MAPPER(__BPF_ENUM_FN)
+ __BPF_FUNC_MAX_ID,
+};
+#undef __BPF_ENUM_FN
+
+/* All flags used by eBPF helper functions, placed here. */
+
+/* BPF_FUNC_skb_store_bytes flags. */
+enum {
+ BPF_F_RECOMPUTE_CSUM = (1ULL << 0),
+ BPF_F_INVALIDATE_HASH = (1ULL << 1),
+};
+
+/* BPF_FUNC_l3_csum_replace and BPF_FUNC_l4_csum_replace flags.
+ * First 4 bits are for passing the header field size.
+ */
+enum {
+ BPF_F_HDR_FIELD_MASK = 0xfULL,
+};
+
+/* BPF_FUNC_l4_csum_replace flags. */
+enum {
+ BPF_F_PSEUDO_HDR = (1ULL << 4),
+ BPF_F_MARK_MANGLED_0 = (1ULL << 5),
+ BPF_F_MARK_ENFORCE = (1ULL << 6),
+};
+
+/* BPF_FUNC_clone_redirect and BPF_FUNC_redirect flags. */
+enum {
+ BPF_F_INGRESS = (1ULL << 0),
+};
+
+/* BPF_FUNC_skb_set_tunnel_key and BPF_FUNC_skb_get_tunnel_key flags. */
+enum {
+ BPF_F_TUNINFO_IPV6 = (1ULL << 0),
+};
+
+/* flags for both BPF_FUNC_get_stackid and BPF_FUNC_get_stack. */
+enum {
+ BPF_F_SKIP_FIELD_MASK = 0xffULL,
+ BPF_F_USER_STACK = (1ULL << 8),
+/* flags used by BPF_FUNC_get_stackid only. */
+ BPF_F_FAST_STACK_CMP = (1ULL << 9),
+ BPF_F_REUSE_STACKID = (1ULL << 10),
+/* flags used by BPF_FUNC_get_stack only. */
+ BPF_F_USER_BUILD_ID = (1ULL << 11),
+};
+
+/* BPF_FUNC_skb_set_tunnel_key flags. */
+enum {
+ BPF_F_ZERO_CSUM_TX = (1ULL << 1),
+ BPF_F_DONT_FRAGMENT = (1ULL << 2),
+ BPF_F_SEQ_NUMBER = (1ULL << 3),
+ BPF_F_NO_TUNNEL_KEY = (1ULL << 4),
+};
+
+/* BPF_FUNC_skb_get_tunnel_key flags. */
+enum {
+ BPF_F_TUNINFO_FLAGS = (1ULL << 4),
+};
+
+/* BPF_FUNC_perf_event_output, BPF_FUNC_perf_event_read and
+ * BPF_FUNC_perf_event_read_value flags.
+ */
+enum {
+ BPF_F_INDEX_MASK = 0xffffffffULL,
+ BPF_F_CURRENT_CPU = BPF_F_INDEX_MASK,
+/* BPF_FUNC_perf_event_output for sk_buff input context. */
+ BPF_F_CTXLEN_MASK = (0xfffffULL << 32),
+};
+
+/* Current network namespace */
+enum {
+ BPF_F_CURRENT_NETNS = (-1L),
+};
+
+/* BPF_FUNC_csum_level level values. */
+enum {
+ BPF_CSUM_LEVEL_QUERY,
+ BPF_CSUM_LEVEL_INC,
+ BPF_CSUM_LEVEL_DEC,
+ BPF_CSUM_LEVEL_RESET,
+};
+
+/* BPF_FUNC_skb_adjust_room flags. */
+enum {
+ BPF_F_ADJ_ROOM_FIXED_GSO = (1ULL << 0),
+ BPF_F_ADJ_ROOM_ENCAP_L3_IPV4 = (1ULL << 1),
+ BPF_F_ADJ_ROOM_ENCAP_L3_IPV6 = (1ULL << 2),
+ BPF_F_ADJ_ROOM_ENCAP_L4_GRE = (1ULL << 3),
+ BPF_F_ADJ_ROOM_ENCAP_L4_UDP = (1ULL << 4),
+ BPF_F_ADJ_ROOM_NO_CSUM_RESET = (1ULL << 5),
+ BPF_F_ADJ_ROOM_ENCAP_L2_ETH = (1ULL << 6),
+};
+
+enum {
+ BPF_ADJ_ROOM_ENCAP_L2_MASK = 0xff,
+ BPF_ADJ_ROOM_ENCAP_L2_SHIFT = 56,
+};
+
+#define BPF_F_ADJ_ROOM_ENCAP_L2(len) (((__u64)len & \
+ BPF_ADJ_ROOM_ENCAP_L2_MASK) \
+ << BPF_ADJ_ROOM_ENCAP_L2_SHIFT)
+
+/* BPF_FUNC_sysctl_get_name flags. */
+enum {
+ BPF_F_SYSCTL_BASE_NAME = (1ULL << 0),
+};
+
+/* BPF_FUNC_<kernel_obj>_storage_get flags */
+enum {
+ BPF_LOCAL_STORAGE_GET_F_CREATE = (1ULL << 0),
+ /* BPF_SK_STORAGE_GET_F_CREATE is only kept for backward compatibility
+ * and BPF_LOCAL_STORAGE_GET_F_CREATE must be used instead.
+ */
+ BPF_SK_STORAGE_GET_F_CREATE = BPF_LOCAL_STORAGE_GET_F_CREATE,
+};
+
+/* BPF_FUNC_read_branch_records flags. */
+enum {
+ BPF_F_GET_BRANCH_RECORDS_SIZE = (1ULL << 0),
+};
+
+/* BPF_FUNC_bpf_ringbuf_commit, BPF_FUNC_bpf_ringbuf_discard, and
+ * BPF_FUNC_bpf_ringbuf_output flags.
+ */
+enum {
+ BPF_RB_NO_WAKEUP = (1ULL << 0),
+ BPF_RB_FORCE_WAKEUP = (1ULL << 1),
+};
+
+/* BPF_FUNC_bpf_ringbuf_query flags */
+enum {
+ BPF_RB_AVAIL_DATA = 0,
+ BPF_RB_RING_SIZE = 1,
+ BPF_RB_CONS_POS = 2,
+ BPF_RB_PROD_POS = 3,
+};
+
+/* BPF ring buffer constants */
+enum {
+ BPF_RINGBUF_BUSY_BIT = (1U << 31),
+ BPF_RINGBUF_DISCARD_BIT = (1U << 30),
+ BPF_RINGBUF_HDR_SZ = 8,
+};
+
+/* BPF_FUNC_sk_assign flags in bpf_sk_lookup context. */
+enum {
+ BPF_SK_LOOKUP_F_REPLACE = (1ULL << 0),
+ BPF_SK_LOOKUP_F_NO_REUSEPORT = (1ULL << 1),
+};
+
+/* Mode for BPF_FUNC_skb_adjust_room helper. */
+enum bpf_adj_room_mode {
+ BPF_ADJ_ROOM_NET,
+ BPF_ADJ_ROOM_MAC,
+};
+
+/* Mode for BPF_FUNC_skb_load_bytes_relative helper. */
+enum bpf_hdr_start_off {
+ BPF_HDR_START_MAC,
+ BPF_HDR_START_NET,
+};
+
+/* Encapsulation type for BPF_FUNC_lwt_push_encap helper. */
+enum bpf_lwt_encap_mode {
+ BPF_LWT_ENCAP_SEG6,
+ BPF_LWT_ENCAP_SEG6_INLINE,
+ BPF_LWT_ENCAP_IP,
+};
+
+/* Flags for bpf_bprm_opts_set helper */
+enum {
+ BPF_F_BPRM_SECUREEXEC = (1ULL << 0),
+};
+
+/* Flags for bpf_redirect_map helper */
+enum {
+ BPF_F_BROADCAST = (1ULL << 3),
+ BPF_F_EXCLUDE_INGRESS = (1ULL << 4),
+};
+
+#define __bpf_md_ptr(type, name) \
+union { \
+ type name; \
+ __u64 :64; \
+} __attribute__((aligned(8)))
+
+enum {
+ BPF_SKB_TSTAMP_UNSPEC,
+ BPF_SKB_TSTAMP_DELIVERY_MONO, /* tstamp has mono delivery time */
+ /* For any BPF_SKB_TSTAMP_* that the bpf prog cannot handle,
+ * the bpf prog should handle it like BPF_SKB_TSTAMP_UNSPEC
+ * and try to deduce it by ingress, egress or skb->sk->sk_clockid.
+ */
+};
+
+/* user accessible mirror of in-kernel sk_buff.
+ * new fields can only be added to the end of this structure
+ */
+struct __sk_buff {
+ __u32 len;
+ __u32 pkt_type;
+ __u32 mark;
+ __u32 queue_mapping;
+ __u32 protocol;
+ __u32 vlan_present;
+ __u32 vlan_tci;
+ __u32 vlan_proto;
+ __u32 priority;
+ __u32 ingress_ifindex;
+ __u32 ifindex;
+ __u32 tc_index;
+ __u32 cb[5];
+ __u32 hash;
+ __u32 tc_classid;
+ __u32 data;
+ __u32 data_end;
+ __u32 napi_id;
+
+ /* Accessed by BPF_PROG_TYPE_sk_skb types from here to ... */
+ __u32 family;
+ __u32 remote_ip4; /* Stored in network byte order */
+ __u32 local_ip4; /* Stored in network byte order */
+ __u32 remote_ip6[4]; /* Stored in network byte order */
+ __u32 local_ip6[4]; /* Stored in network byte order */
+ __u32 remote_port; /* Stored in network byte order */
+ __u32 local_port; /* stored in host byte order */
+ /* ... here. */
+
+ __u32 data_meta;
+ __bpf_md_ptr(struct bpf_flow_keys *, flow_keys);
+ __u64 tstamp;
+ __u32 wire_len;
+ __u32 gso_segs;
+ __bpf_md_ptr(struct bpf_sock *, sk);
+ __u32 gso_size;
+ __u8 tstamp_type;
+ __u32 :24; /* Padding, future use. */
+ __u64 hwtstamp;
+};
+
+struct bpf_tunnel_key {
+ __u32 tunnel_id;
+ union {
+ __u32 remote_ipv4;
+ __u32 remote_ipv6[4];
+ };
+ __u8 tunnel_tos;
+ __u8 tunnel_ttl;
+ union {
+ __u16 tunnel_ext; /* compat */
+ __be16 tunnel_flags;
+ };
+ __u32 tunnel_label;
+ union {
+ __u32 local_ipv4;
+ __u32 local_ipv6[4];
+ };
+};
+
+/* user accessible mirror of in-kernel xfrm_state.
+ * new fields can only be added to the end of this structure
+ */
+struct bpf_xfrm_state {
+ __u32 reqid;
+ __u32 spi; /* Stored in network byte order */
+ __u16 family;
+ __u16 ext; /* Padding, future use. */
+ union {
+ __u32 remote_ipv4; /* Stored in network byte order */
+ __u32 remote_ipv6[4]; /* Stored in network byte order */
+ };
+};
+
+/* Generic BPF return codes which all BPF program types may support.
+ * The values are binary compatible with their TC_ACT_* counter-part to
+ * provide backwards compatibility with existing SCHED_CLS and SCHED_ACT
+ * programs.
+ *
+ * XDP is handled seprately, see XDP_*.
+ */
+enum bpf_ret_code {
+ BPF_OK = 0,
+ /* 1 reserved */
+ BPF_DROP = 2,
+ /* 3-6 reserved */
+ BPF_REDIRECT = 7,
+ /* >127 are reserved for prog type specific return codes.
+ *
+ * BPF_LWT_REROUTE: used by BPF_PROG_TYPE_LWT_IN and
+ * BPF_PROG_TYPE_LWT_XMIT to indicate that skb had been
+ * changed and should be routed based on its new L3 header.
+ * (This is an L3 redirect, as opposed to L2 redirect
+ * represented by BPF_REDIRECT above).
+ */
+ BPF_LWT_REROUTE = 128,
+ /* BPF_FLOW_DISSECTOR_CONTINUE: used by BPF_PROG_TYPE_FLOW_DISSECTOR
+ * to indicate that no custom dissection was performed, and
+ * fallback to standard dissector is requested.
+ */
+ BPF_FLOW_DISSECTOR_CONTINUE = 129,
+};
+
+struct bpf_sock {
+ __u32 bound_dev_if;
+ __u32 family;
+ __u32 type;
+ __u32 protocol;
+ __u32 mark;
+ __u32 priority;
+ /* IP address also allows 1 and 2 bytes access */
+ __u32 src_ip4;
+ __u32 src_ip6[4];
+ __u32 src_port; /* host byte order */
+ __be16 dst_port; /* network byte order */
+ __u16 :16; /* zero padding */
+ __u32 dst_ip4;
+ __u32 dst_ip6[4];
+ __u32 state;
+ __s32 rx_queue_mapping;
+};
+
+struct bpf_tcp_sock {
+ __u32 snd_cwnd; /* Sending congestion window */
+ __u32 srtt_us; /* smoothed round trip time << 3 in usecs */
+ __u32 rtt_min;
+ __u32 snd_ssthresh; /* Slow start size threshold */
+ __u32 rcv_nxt; /* What we want to receive next */
+ __u32 snd_nxt; /* Next sequence we send */
+ __u32 snd_una; /* First byte we want an ack for */
+ __u32 mss_cache; /* Cached effective mss, not including SACKS */
+ __u32 ecn_flags; /* ECN status bits. */
+ __u32 rate_delivered; /* saved rate sample: packets delivered */
+ __u32 rate_interval_us; /* saved rate sample: time elapsed */
+ __u32 packets_out; /* Packets which are "in flight" */
+ __u32 retrans_out; /* Retransmitted packets out */
+ __u32 total_retrans; /* Total retransmits for entire connection */
+ __u32 segs_in; /* RFC4898 tcpEStatsPerfSegsIn
+ * total number of segments in.
+ */
+ __u32 data_segs_in; /* RFC4898 tcpEStatsPerfDataSegsIn
+ * total number of data segments in.
+ */
+ __u32 segs_out; /* RFC4898 tcpEStatsPerfSegsOut
+ * The total number of segments sent.
+ */
+ __u32 data_segs_out; /* RFC4898 tcpEStatsPerfDataSegsOut
+ * total number of data segments sent.
+ */
+ __u32 lost_out; /* Lost packets */
+ __u32 sacked_out; /* SACK'd packets */
+ __u64 bytes_received; /* RFC4898 tcpEStatsAppHCThruOctetsReceived
+ * sum(delta(rcv_nxt)), or how many bytes
+ * were acked.
+ */
+ __u64 bytes_acked; /* RFC4898 tcpEStatsAppHCThruOctetsAcked
+ * sum(delta(snd_una)), or how many bytes
+ * were acked.
+ */
+ __u32 dsack_dups; /* RFC4898 tcpEStatsStackDSACKDups
+ * total number of DSACK blocks received
+ */
+ __u32 delivered; /* Total data packets delivered incl. rexmits */
+ __u32 delivered_ce; /* Like the above but only ECE marked packets */
+ __u32 icsk_retransmits; /* Number of unrecovered [RTO] timeouts */
+};
+
+struct bpf_sock_tuple {
+ union {
+ struct {
+ __be32 saddr;
+ __be32 daddr;
+ __be16 sport;
+ __be16 dport;
+ } ipv4;
+ struct {
+ __be32 saddr[4];
+ __be32 daddr[4];
+ __be16 sport;
+ __be16 dport;
+ } ipv6;
+ };
+};
+
+struct bpf_xdp_sock {
+ __u32 queue_id;
+};
+
+#define XDP_PACKET_HEADROOM 256
+
+/* User return codes for XDP prog type.
+ * A valid XDP program must return one of these defined values. All other
+ * return codes are reserved for future use. Unknown return codes will
+ * result in packet drops and a warning via bpf_warn_invalid_xdp_action().
+ */
+enum xdp_action {
+ XDP_ABORTED = 0,
+ XDP_DROP,
+ XDP_PASS,
+ XDP_TX,
+ XDP_REDIRECT,
+};
+
+/* user accessible metadata for XDP packet hook
+ * new fields must be added to the end of this structure
+ */
+struct xdp_md {
+ __u32 data;
+ __u32 data_end;
+ __u32 data_meta;
+ /* Below access go through struct xdp_rxq_info */
+ __u32 ingress_ifindex; /* rxq->dev->ifindex */
+ __u32 rx_queue_index; /* rxq->queue_index */
+
+ __u32 egress_ifindex; /* txq->dev->ifindex */
+};
+
+/* DEVMAP map-value layout
+ *
+ * The struct data-layout of map-value is a configuration interface.
+ * New members can only be added to the end of this structure.
+ */
+struct bpf_devmap_val {
+ __u32 ifindex; /* device index */
+ union {
+ int fd; /* prog fd on map write */
+ __u32 id; /* prog id on map read */
+ } bpf_prog;
+};
+
+/* CPUMAP map-value layout
+ *
+ * The struct data-layout of map-value is a configuration interface.
+ * New members can only be added to the end of this structure.
+ */
+struct bpf_cpumap_val {
+ __u32 qsize; /* queue size to remote target CPU */
+ union {
+ int fd; /* prog fd on map write */
+ __u32 id; /* prog id on map read */
+ } bpf_prog;
+};
+
+enum sk_action {
+ SK_DROP = 0,
+ SK_PASS,
+};
+
+/* user accessible metadata for SK_MSG packet hook, new fields must
+ * be added to the end of this structure
+ */
+struct sk_msg_md {
+ __bpf_md_ptr(void *, data);
+ __bpf_md_ptr(void *, data_end);
+
+ __u32 family;
+ __u32 remote_ip4; /* Stored in network byte order */
+ __u32 local_ip4; /* Stored in network byte order */
+ __u32 remote_ip6[4]; /* Stored in network byte order */
+ __u32 local_ip6[4]; /* Stored in network byte order */
+ __u32 remote_port; /* Stored in network byte order */
+ __u32 local_port; /* stored in host byte order */
+ __u32 size; /* Total size of sk_msg */
+
+ __bpf_md_ptr(struct bpf_sock *, sk); /* current socket */
+};
+
+struct sk_reuseport_md {
+ /*
+ * Start of directly accessible data. It begins from
+ * the tcp/udp header.
+ */
+ __bpf_md_ptr(void *, data);
+ /* End of directly accessible data */
+ __bpf_md_ptr(void *, data_end);
+ /*
+ * Total length of packet (starting from the tcp/udp header).
+ * Note that the directly accessible bytes (data_end - data)
+ * could be less than this "len". Those bytes could be
+ * indirectly read by a helper "bpf_skb_load_bytes()".
+ */
+ __u32 len;
+ /*
+ * Eth protocol in the mac header (network byte order). e.g.
+ * ETH_P_IP(0x0800) and ETH_P_IPV6(0x86DD)
+ */
+ __u32 eth_protocol;
+ __u32 ip_protocol; /* IP protocol. e.g. IPPROTO_TCP, IPPROTO_UDP */
+ __u32 bind_inany; /* Is sock bound to an INANY address? */
+ __u32 hash; /* A hash of the packet 4 tuples */
+ /* When reuse->migrating_sk is NULL, it is selecting a sk for the
+ * new incoming connection request (e.g. selecting a listen sk for
+ * the received SYN in the TCP case). reuse->sk is one of the sk
+ * in the reuseport group. The bpf prog can use reuse->sk to learn
+ * the local listening ip/port without looking into the skb.
+ *
+ * When reuse->migrating_sk is not NULL, reuse->sk is closed and
+ * reuse->migrating_sk is the socket that needs to be migrated
+ * to another listening socket. migrating_sk could be a fullsock
+ * sk that is fully established or a reqsk that is in-the-middle
+ * of 3-way handshake.
+ */
+ __bpf_md_ptr(struct bpf_sock *, sk);
+ __bpf_md_ptr(struct bpf_sock *, migrating_sk);
+};
+
+#define BPF_TAG_SIZE 8
+
+struct bpf_prog_info {
+ __u32 type;
+ __u32 id;
+ __u8 tag[BPF_TAG_SIZE];
+ __u32 jited_prog_len;
+ __u32 xlated_prog_len;
+ __aligned_u64 jited_prog_insns;
+ __aligned_u64 xlated_prog_insns;
+ __u64 load_time; /* ns since boottime */
+ __u32 created_by_uid;
+ __u32 nr_map_ids;
+ __aligned_u64 map_ids;
+ char name[BPF_OBJ_NAME_LEN];
+ __u32 ifindex;
+ __u32 gpl_compatible:1;
+ __u32 :31; /* alignment pad */
+ __u64 netns_dev;
+ __u64 netns_ino;
+ __u32 nr_jited_ksyms;
+ __u32 nr_jited_func_lens;
+ __aligned_u64 jited_ksyms;
+ __aligned_u64 jited_func_lens;
+ __u32 btf_id;
+ __u32 func_info_rec_size;
+ __aligned_u64 func_info;
+ __u32 nr_func_info;
+ __u32 nr_line_info;
+ __aligned_u64 line_info;
+ __aligned_u64 jited_line_info;
+ __u32 nr_jited_line_info;
+ __u32 line_info_rec_size;
+ __u32 jited_line_info_rec_size;
+ __u32 nr_prog_tags;
+ __aligned_u64 prog_tags;
+ __u64 run_time_ns;
+ __u64 run_cnt;
+ __u64 recursion_misses;
+ __u32 verified_insns;
+ __u32 attach_btf_obj_id;
+ __u32 attach_btf_id;
+} __attribute__((aligned(8)));
+
+struct bpf_map_info {
+ __u32 type;
+ __u32 id;
+ __u32 key_size;
+ __u32 value_size;
+ __u32 max_entries;
+ __u32 map_flags;
+ char name[BPF_OBJ_NAME_LEN];
+ __u32 ifindex;
+ __u32 btf_vmlinux_value_type_id;
+ __u64 netns_dev;
+ __u64 netns_ino;
+ __u32 btf_id;
+ __u32 btf_key_type_id;
+ __u32 btf_value_type_id;
+ __u32 :32; /* alignment pad */
+ __u64 map_extra;
+} __attribute__((aligned(8)));
+
+struct bpf_btf_info {
+ __aligned_u64 btf;
+ __u32 btf_size;
+ __u32 id;
+ __aligned_u64 name;
+ __u32 name_len;
+ __u32 kernel_btf;
+} __attribute__((aligned(8)));
+
+struct bpf_link_info {
+ __u32 type;
+ __u32 id;
+ __u32 prog_id;
+ union {
+ struct {
+ __aligned_u64 tp_name; /* in/out: tp_name buffer ptr */
+ __u32 tp_name_len; /* in/out: tp_name buffer len */
+ } raw_tracepoint;
+ struct {
+ __u32 attach_type;
+ __u32 target_obj_id; /* prog_id for PROG_EXT, otherwise btf object id */
+ __u32 target_btf_id; /* BTF type id inside the object */
+ } tracing;
+ struct {
+ __u64 cgroup_id;
+ __u32 attach_type;
+ } cgroup;
+ struct {
+ __aligned_u64 target_name; /* in/out: target_name buffer ptr */
+ __u32 target_name_len; /* in/out: target_name buffer len */
+
+ /* If the iter specific field is 32 bits, it can be put
+ * in the first or second union. Otherwise it should be
+ * put in the second union.
+ */
+ union {
+ struct {
+ __u32 map_id;
+ } map;
+ };
+ union {
+ struct {
+ __u64 cgroup_id;
+ __u32 order;
+ } cgroup;
+ struct {
+ __u32 tid;
+ __u32 pid;
+ } task;
+ };
+ } iter;
+ struct {
+ __u32 netns_ino;
+ __u32 attach_type;
+ } netns;
+ struct {
+ __u32 ifindex;
+ } xdp;
+ };
+} __attribute__((aligned(8)));
+
+/* User bpf_sock_addr struct to access socket fields and sockaddr struct passed
+ * by user and intended to be used by socket (e.g. to bind to, depends on
+ * attach type).
+ */
+struct bpf_sock_addr {
+ __u32 user_family; /* Allows 4-byte read, but no write. */
+ __u32 user_ip4; /* Allows 1,2,4-byte read and 4-byte write.
+ * Stored in network byte order.
+ */
+ __u32 user_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write.
+ * Stored in network byte order.
+ */
+ __u32 user_port; /* Allows 1,2,4-byte read and 4-byte write.
+ * Stored in network byte order
+ */
+ __u32 family; /* Allows 4-byte read, but no write */
+ __u32 type; /* Allows 4-byte read, but no write */
+ __u32 protocol; /* Allows 4-byte read, but no write */
+ __u32 msg_src_ip4; /* Allows 1,2,4-byte read and 4-byte write.
+ * Stored in network byte order.
+ */
+ __u32 msg_src_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write.
+ * Stored in network byte order.
+ */
+ __bpf_md_ptr(struct bpf_sock *, sk);
+};
+
+/* User bpf_sock_ops struct to access socket values and specify request ops
+ * and their replies.
+ * Some of this fields are in network (bigendian) byte order and may need
+ * to be converted before use (bpf_ntohl() defined in samples/bpf/bpf_endian.h).
+ * New fields can only be added at the end of this structure
+ */
+struct bpf_sock_ops {
+ __u32 op;
+ union {
+ __u32 args[4]; /* Optionally passed to bpf program */
+ __u32 reply; /* Returned by bpf program */
+ __u32 replylong[4]; /* Optionally returned by bpf prog */
+ };
+ __u32 family;
+ __u32 remote_ip4; /* Stored in network byte order */
+ __u32 local_ip4; /* Stored in network byte order */
+ __u32 remote_ip6[4]; /* Stored in network byte order */
+ __u32 local_ip6[4]; /* Stored in network byte order */
+ __u32 remote_port; /* Stored in network byte order */
+ __u32 local_port; /* stored in host byte order */
+ __u32 is_fullsock; /* Some TCP fields are only valid if
+ * there is a full socket. If not, the
+ * fields read as zero.
+ */
+ __u32 snd_cwnd;
+ __u32 srtt_us; /* Averaged RTT << 3 in usecs */
+ __u32 bpf_sock_ops_cb_flags; /* flags defined in uapi/linux/tcp.h */
+ __u32 state;
+ __u32 rtt_min;
+ __u32 snd_ssthresh;
+ __u32 rcv_nxt;
+ __u32 snd_nxt;
+ __u32 snd_una;
+ __u32 mss_cache;
+ __u32 ecn_flags;
+ __u32 rate_delivered;
+ __u32 rate_interval_us;
+ __u32 packets_out;
+ __u32 retrans_out;
+ __u32 total_retrans;
+ __u32 segs_in;
+ __u32 data_segs_in;
+ __u32 segs_out;
+ __u32 data_segs_out;
+ __u32 lost_out;
+ __u32 sacked_out;
+ __u32 sk_txhash;
+ __u64 bytes_received;
+ __u64 bytes_acked;
+ __bpf_md_ptr(struct bpf_sock *, sk);
+ /* [skb_data, skb_data_end) covers the whole TCP header.
+ *
+ * BPF_SOCK_OPS_PARSE_HDR_OPT_CB: The packet received
+ * BPF_SOCK_OPS_HDR_OPT_LEN_CB: Not useful because the
+ * header has not been written.
+ * BPF_SOCK_OPS_WRITE_HDR_OPT_CB: The header and options have
+ * been written so far.
+ * BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB: The SYNACK that concludes
+ * the 3WHS.
+ * BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB: The ACK that concludes
+ * the 3WHS.
+ *
+ * bpf_load_hdr_opt() can also be used to read a particular option.
+ */
+ __bpf_md_ptr(void *, skb_data);
+ __bpf_md_ptr(void *, skb_data_end);
+ __u32 skb_len; /* The total length of a packet.
+ * It includes the header, options,
+ * and payload.
+ */
+ __u32 skb_tcp_flags; /* tcp_flags of the header. It provides
+ * an easy way to check for tcp_flags
+ * without parsing skb_data.
+ *
+ * In particular, the skb_tcp_flags
+ * will still be available in
+ * BPF_SOCK_OPS_HDR_OPT_LEN even though
+ * the outgoing header has not
+ * been written yet.
+ */
+ __u64 skb_hwtstamp;
+};
+
+/* Definitions for bpf_sock_ops_cb_flags */
+enum {
+ BPF_SOCK_OPS_RTO_CB_FLAG = (1<<0),
+ BPF_SOCK_OPS_RETRANS_CB_FLAG = (1<<1),
+ BPF_SOCK_OPS_STATE_CB_FLAG = (1<<2),
+ BPF_SOCK_OPS_RTT_CB_FLAG = (1<<3),
+ /* Call bpf for all received TCP headers. The bpf prog will be
+ * called under sock_ops->op == BPF_SOCK_OPS_PARSE_HDR_OPT_CB
+ *
+ * Please refer to the comment in BPF_SOCK_OPS_PARSE_HDR_OPT_CB
+ * for the header option related helpers that will be useful
+ * to the bpf programs.
+ *
+ * It could be used at the client/active side (i.e. connect() side)
+ * when the server told it that the server was in syncookie
+ * mode and required the active side to resend the bpf-written
+ * options. The active side can keep writing the bpf-options until
+ * it received a valid packet from the server side to confirm
+ * the earlier packet (and options) has been received. The later
+ * example patch is using it like this at the active side when the
+ * server is in syncookie mode.
+ *
+ * The bpf prog will usually turn this off in the common cases.
+ */
+ BPF_SOCK_OPS_PARSE_ALL_HDR_OPT_CB_FLAG = (1<<4),
+ /* Call bpf when kernel has received a header option that
+ * the kernel cannot handle. The bpf prog will be called under
+ * sock_ops->op == BPF_SOCK_OPS_PARSE_HDR_OPT_CB.
+ *
+ * Please refer to the comment in BPF_SOCK_OPS_PARSE_HDR_OPT_CB
+ * for the header option related helpers that will be useful
+ * to the bpf programs.
+ */
+ BPF_SOCK_OPS_PARSE_UNKNOWN_HDR_OPT_CB_FLAG = (1<<5),
+ /* Call bpf when the kernel is writing header options for the
+ * outgoing packet. The bpf prog will first be called
+ * to reserve space in a skb under
+ * sock_ops->op == BPF_SOCK_OPS_HDR_OPT_LEN_CB. Then
+ * the bpf prog will be called to write the header option(s)
+ * under sock_ops->op == BPF_SOCK_OPS_WRITE_HDR_OPT_CB.
+ *
+ * Please refer to the comment in BPF_SOCK_OPS_HDR_OPT_LEN_CB
+ * and BPF_SOCK_OPS_WRITE_HDR_OPT_CB for the header option
+ * related helpers that will be useful to the bpf programs.
+ *
+ * The kernel gets its chance to reserve space and write
+ * options first before the BPF program does.
+ */
+ BPF_SOCK_OPS_WRITE_HDR_OPT_CB_FLAG = (1<<6),
+/* Mask of all currently supported cb flags */
+ BPF_SOCK_OPS_ALL_CB_FLAGS = 0x7F,
+};
+
+/* List of known BPF sock_ops operators.
+ * New entries can only be added at the end
+ */
+enum {
+ BPF_SOCK_OPS_VOID,
+ BPF_SOCK_OPS_TIMEOUT_INIT, /* Should return SYN-RTO value to use or
+ * -1 if default value should be used
+ */
+ BPF_SOCK_OPS_RWND_INIT, /* Should return initial advertized
+ * window (in packets) or -1 if default
+ * value should be used
+ */
+ BPF_SOCK_OPS_TCP_CONNECT_CB, /* Calls BPF program right before an
+ * active connection is initialized
+ */
+ BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB, /* Calls BPF program when an
+ * active connection is
+ * established
+ */
+ BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB, /* Calls BPF program when a
+ * passive connection is
+ * established
+ */
+ BPF_SOCK_OPS_NEEDS_ECN, /* If connection's congestion control
+ * needs ECN
+ */
+ BPF_SOCK_OPS_BASE_RTT, /* Get base RTT. The correct value is
+ * based on the path and may be
+ * dependent on the congestion control
+ * algorithm. In general it indicates
+ * a congestion threshold. RTTs above
+ * this indicate congestion
+ */
+ BPF_SOCK_OPS_RTO_CB, /* Called when an RTO has triggered.
+ * Arg1: value of icsk_retransmits
+ * Arg2: value of icsk_rto
+ * Arg3: whether RTO has expired
+ */
+ BPF_SOCK_OPS_RETRANS_CB, /* Called when skb is retransmitted.
+ * Arg1: sequence number of 1st byte
+ * Arg2: # segments
+ * Arg3: return value of
+ * tcp_transmit_skb (0 => success)
+ */
+ BPF_SOCK_OPS_STATE_CB, /* Called when TCP changes state.
+ * Arg1: old_state
+ * Arg2: new_state
+ */
+ BPF_SOCK_OPS_TCP_LISTEN_CB, /* Called on listen(2), right after
+ * socket transition to LISTEN state.
+ */
+ BPF_SOCK_OPS_RTT_CB, /* Called on every RTT.
+ */
+ BPF_SOCK_OPS_PARSE_HDR_OPT_CB, /* Parse the header option.
+ * It will be called to handle
+ * the packets received at
+ * an already established
+ * connection.
+ *
+ * sock_ops->skb_data:
+ * Referring to the received skb.
+ * It covers the TCP header only.
+ *
+ * bpf_load_hdr_opt() can also
+ * be used to search for a
+ * particular option.
+ */
+ BPF_SOCK_OPS_HDR_OPT_LEN_CB, /* Reserve space for writing the
+ * header option later in
+ * BPF_SOCK_OPS_WRITE_HDR_OPT_CB.
+ * Arg1: bool want_cookie. (in
+ * writing SYNACK only)
+ *
+ * sock_ops->skb_data:
+ * Not available because no header has
+ * been written yet.
+ *
+ * sock_ops->skb_tcp_flags:
+ * The tcp_flags of the
+ * outgoing skb. (e.g. SYN, ACK, FIN).
+ *
+ * bpf_reserve_hdr_opt() should
+ * be used to reserve space.
+ */
+ BPF_SOCK_OPS_WRITE_HDR_OPT_CB, /* Write the header options
+ * Arg1: bool want_cookie. (in
+ * writing SYNACK only)
+ *
+ * sock_ops->skb_data:
+ * Referring to the outgoing skb.
+ * It covers the TCP header
+ * that has already been written
+ * by the kernel and the
+ * earlier bpf-progs.
+ *
+ * sock_ops->skb_tcp_flags:
+ * The tcp_flags of the outgoing
+ * skb. (e.g. SYN, ACK, FIN).
+ *
+ * bpf_store_hdr_opt() should
+ * be used to write the
+ * option.
+ *
+ * bpf_load_hdr_opt() can also
+ * be used to search for a
+ * particular option that
+ * has already been written
+ * by the kernel or the
+ * earlier bpf-progs.
+ */
+};
+
+/* List of TCP states. There is a build check in net/ipv4/tcp.c to detect
+ * changes between the TCP and BPF versions. Ideally this should never happen.
+ * If it does, we need to add code to convert them before calling
+ * the BPF sock_ops function.
+ */
+enum {
+ BPF_TCP_ESTABLISHED = 1,
+ BPF_TCP_SYN_SENT,
+ BPF_TCP_SYN_RECV,
+ BPF_TCP_FIN_WAIT1,
+ BPF_TCP_FIN_WAIT2,
+ BPF_TCP_TIME_WAIT,
+ BPF_TCP_CLOSE,
+ BPF_TCP_CLOSE_WAIT,
+ BPF_TCP_LAST_ACK,
+ BPF_TCP_LISTEN,
+ BPF_TCP_CLOSING, /* Now a valid state */
+ BPF_TCP_NEW_SYN_RECV,
+
+ BPF_TCP_MAX_STATES /* Leave at the end! */
+};
+
+enum {
+ TCP_BPF_IW = 1001, /* Set TCP initial congestion window */
+ TCP_BPF_SNDCWND_CLAMP = 1002, /* Set sndcwnd_clamp */
+ TCP_BPF_DELACK_MAX = 1003, /* Max delay ack in usecs */
+ TCP_BPF_RTO_MIN = 1004, /* Min delay ack in usecs */
+ /* Copy the SYN pkt to optval
+ *
+ * BPF_PROG_TYPE_SOCK_OPS only. It is similar to the
+ * bpf_getsockopt(TCP_SAVED_SYN) but it does not limit
+ * to only getting from the saved_syn. It can either get the
+ * syn packet from:
+ *
+ * 1. the just-received SYN packet (only available when writing the
+ * SYNACK). It will be useful when it is not necessary to
+ * save the SYN packet for latter use. It is also the only way
+ * to get the SYN during syncookie mode because the syn
+ * packet cannot be saved during syncookie.
+ *
+ * OR
+ *
+ * 2. the earlier saved syn which was done by
+ * bpf_setsockopt(TCP_SAVE_SYN).
+ *
+ * The bpf_getsockopt(TCP_BPF_SYN*) option will hide where the
+ * SYN packet is obtained.
+ *
+ * If the bpf-prog does not need the IP[46] header, the
+ * bpf-prog can avoid parsing the IP header by using
+ * TCP_BPF_SYN. Otherwise, the bpf-prog can get both
+ * IP[46] and TCP header by using TCP_BPF_SYN_IP.
+ *
+ * >0: Total number of bytes copied
+ * -ENOSPC: Not enough space in optval. Only optlen number of
+ * bytes is copied.
+ * -ENOENT: The SYN skb is not available now and the earlier SYN pkt
+ * is not saved by setsockopt(TCP_SAVE_SYN).
+ */
+ TCP_BPF_SYN = 1005, /* Copy the TCP header */
+ TCP_BPF_SYN_IP = 1006, /* Copy the IP[46] and TCP header */
+ TCP_BPF_SYN_MAC = 1007, /* Copy the MAC, IP[46], and TCP header */
+};
+
+enum {
+ BPF_LOAD_HDR_OPT_TCP_SYN = (1ULL << 0),
+};
+
+/* args[0] value during BPF_SOCK_OPS_HDR_OPT_LEN_CB and
+ * BPF_SOCK_OPS_WRITE_HDR_OPT_CB.
+ */
+enum {
+ BPF_WRITE_HDR_TCP_CURRENT_MSS = 1, /* Kernel is finding the
+ * total option spaces
+ * required for an established
+ * sk in order to calculate the
+ * MSS. No skb is actually
+ * sent.
+ */
+ BPF_WRITE_HDR_TCP_SYNACK_COOKIE = 2, /* Kernel is in syncookie mode
+ * when sending a SYN.
+ */
+};
+
+struct bpf_perf_event_value {
+ __u64 counter;
+ __u64 enabled;
+ __u64 running;
+};
+
+enum {
+ BPF_DEVCG_ACC_MKNOD = (1ULL << 0),
+ BPF_DEVCG_ACC_READ = (1ULL << 1),
+ BPF_DEVCG_ACC_WRITE = (1ULL << 2),
+};
+
+enum {
+ BPF_DEVCG_DEV_BLOCK = (1ULL << 0),
+ BPF_DEVCG_DEV_CHAR = (1ULL << 1),
+};
+
+struct bpf_cgroup_dev_ctx {
+ /* access_type encoded as (BPF_DEVCG_ACC_* << 16) | BPF_DEVCG_DEV_* */
+ __u32 access_type;
+ __u32 major;
+ __u32 minor;
+};
+
+struct bpf_raw_tracepoint_args {
+ __u64 args[0];
+};
+
+/* DIRECT: Skip the FIB rules and go to FIB table associated with device
+ * OUTPUT: Do lookup from egress perspective; default is ingress
+ */
+enum {
+ BPF_FIB_LOOKUP_DIRECT = (1U << 0),
+ BPF_FIB_LOOKUP_OUTPUT = (1U << 1),
+};
+
+enum {
+ BPF_FIB_LKUP_RET_SUCCESS, /* lookup successful */
+ BPF_FIB_LKUP_RET_BLACKHOLE, /* dest is blackholed; can be dropped */
+ BPF_FIB_LKUP_RET_UNREACHABLE, /* dest is unreachable; can be dropped */
+ BPF_FIB_LKUP_RET_PROHIBIT, /* dest not allowed; can be dropped */
+ BPF_FIB_LKUP_RET_NOT_FWDED, /* packet is not forwarded */
+ BPF_FIB_LKUP_RET_FWD_DISABLED, /* fwding is not enabled on ingress */
+ BPF_FIB_LKUP_RET_UNSUPP_LWT, /* fwd requires encapsulation */
+ BPF_FIB_LKUP_RET_NO_NEIGH, /* no neighbor entry for nh */
+ BPF_FIB_LKUP_RET_FRAG_NEEDED, /* fragmentation required to fwd */
+};
+
+struct bpf_fib_lookup {
+ /* input: network family for lookup (AF_INET, AF_INET6)
+ * output: network family of egress nexthop
+ */
+ __u8 family;
+
+ /* set if lookup is to consider L4 data - e.g., FIB rules */
+ __u8 l4_protocol;
+ __be16 sport;
+ __be16 dport;
+
+ union { /* used for MTU check */
+ /* input to lookup */
+ __u16 tot_len; /* L3 length from network hdr (iph->tot_len) */
+
+ /* output: MTU value */
+ __u16 mtu_result;
+ };
+ /* input: L3 device index for lookup
+ * output: device index from FIB lookup
+ */
+ __u32 ifindex;
+
+ union {
+ /* inputs to lookup */
+ __u8 tos; /* AF_INET */
+ __be32 flowinfo; /* AF_INET6, flow_label + priority */
+
+ /* output: metric of fib result (IPv4/IPv6 only) */
+ __u32 rt_metric;
+ };
+
+ union {
+ __be32 ipv4_src;
+ __u32 ipv6_src[4]; /* in6_addr; network order */
+ };
+
+ /* input to bpf_fib_lookup, ipv{4,6}_dst is destination address in
+ * network header. output: bpf_fib_lookup sets to gateway address
+ * if FIB lookup returns gateway route
+ */
+ union {
+ __be32 ipv4_dst;
+ __u32 ipv6_dst[4]; /* in6_addr; network order */
+ };
+
+ /* output */
+ __be16 h_vlan_proto;
+ __be16 h_vlan_TCI;
+ __u8 smac[6]; /* ETH_ALEN */
+ __u8 dmac[6]; /* ETH_ALEN */
+};
+
+struct bpf_redir_neigh {
+ /* network family for lookup (AF_INET, AF_INET6) */
+ __u32 nh_family;
+ /* network address of nexthop; skips fib lookup to find gateway */
+ union {
+ __be32 ipv4_nh;
+ __u32 ipv6_nh[4]; /* in6_addr; network order */
+ };
+};
+
+/* bpf_check_mtu flags*/
+enum bpf_check_mtu_flags {
+ BPF_MTU_CHK_SEGS = (1U << 0),
+};
+
+enum bpf_check_mtu_ret {
+ BPF_MTU_CHK_RET_SUCCESS, /* check and lookup successful */
+ BPF_MTU_CHK_RET_FRAG_NEEDED, /* fragmentation required to fwd */
+ BPF_MTU_CHK_RET_SEGS_TOOBIG, /* GSO re-segmentation needed to fwd */
+};
+
+enum bpf_task_fd_type {
+ BPF_FD_TYPE_RAW_TRACEPOINT, /* tp name */
+ BPF_FD_TYPE_TRACEPOINT, /* tp name */
+ BPF_FD_TYPE_KPROBE, /* (symbol + offset) or addr */
+ BPF_FD_TYPE_KRETPROBE, /* (symbol + offset) or addr */
+ BPF_FD_TYPE_UPROBE, /* filename + offset */
+ BPF_FD_TYPE_URETPROBE, /* filename + offset */
+};
+
+enum {
+ BPF_FLOW_DISSECTOR_F_PARSE_1ST_FRAG = (1U << 0),
+ BPF_FLOW_DISSECTOR_F_STOP_AT_FLOW_LABEL = (1U << 1),
+ BPF_FLOW_DISSECTOR_F_STOP_AT_ENCAP = (1U << 2),
+};
+
+struct bpf_flow_keys {
+ __u16 nhoff;
+ __u16 thoff;
+ __u16 addr_proto; /* ETH_P_* of valid addrs */
+ __u8 is_frag;
+ __u8 is_first_frag;
+ __u8 is_encap;
+ __u8 ip_proto;
+ __be16 n_proto;
+ __be16 sport;
+ __be16 dport;
+ union {
+ struct {
+ __be32 ipv4_src;
+ __be32 ipv4_dst;
+ };
+ struct {
+ __u32 ipv6_src[4]; /* in6_addr; network order */
+ __u32 ipv6_dst[4]; /* in6_addr; network order */
+ };
+ };
+ __u32 flags;
+ __be32 flow_label;
+};
+
+struct bpf_func_info {
+ __u32 insn_off;
+ __u32 type_id;
+};
+
+#define BPF_LINE_INFO_LINE_NUM(line_col) ((line_col) >> 10)
+#define BPF_LINE_INFO_LINE_COL(line_col) ((line_col) & 0x3ff)
+
+struct bpf_line_info {
+ __u32 insn_off;
+ __u32 file_name_off;
+ __u32 line_off;
+ __u32 line_col;
+};
+
+struct bpf_spin_lock {
+ __u32 val;
+};
+
+struct bpf_timer {
+ __u64 :64;
+ __u64 :64;
+} __attribute__((aligned(8)));
+
+struct bpf_dynptr {
+ __u64 :64;
+ __u64 :64;
+} __attribute__((aligned(8)));
+
+struct bpf_list_head {
+ __u64 :64;
+ __u64 :64;
+} __attribute__((aligned(8)));
+
+struct bpf_list_node {
+ __u64 :64;
+ __u64 :64;
+} __attribute__((aligned(8)));
+
+struct bpf_sysctl {
+ __u32 write; /* Sysctl is being read (= 0) or written (= 1).
+ * Allows 1,2,4-byte read, but no write.
+ */
+ __u32 file_pos; /* Sysctl file position to read from, write to.
+ * Allows 1,2,4-byte read an 4-byte write.
+ */
+};
+
+struct bpf_sockopt {
+ __bpf_md_ptr(struct bpf_sock *, sk);
+ __bpf_md_ptr(void *, optval);
+ __bpf_md_ptr(void *, optval_end);
+
+ __s32 level;
+ __s32 optname;
+ __s32 optlen;
+ __s32 retval;
+};
+
+struct bpf_pidns_info {
+ __u32 pid;
+ __u32 tgid;
+};
+
+/* User accessible data for SK_LOOKUP programs. Add new fields at the end. */
+struct bpf_sk_lookup {
+ union {
+ __bpf_md_ptr(struct bpf_sock *, sk); /* Selected socket */
+ __u64 cookie; /* Non-zero if socket was selected in PROG_TEST_RUN */
+ };
+
+ __u32 family; /* Protocol family (AF_INET, AF_INET6) */
+ __u32 protocol; /* IP protocol (IPPROTO_TCP, IPPROTO_UDP) */
+ __u32 remote_ip4; /* Network byte order */
+ __u32 remote_ip6[4]; /* Network byte order */
+ __be16 remote_port; /* Network byte order */
+ __u16 :16; /* Zero padding */
+ __u32 local_ip4; /* Network byte order */
+ __u32 local_ip6[4]; /* Network byte order */
+ __u32 local_port; /* Host byte order */
+ __u32 ingress_ifindex; /* The arriving interface. Determined by inet_iif. */
+};
+
+/*
+ * struct btf_ptr is used for typed pointer representation; the
+ * type id is used to render the pointer data as the appropriate type
+ * via the bpf_snprintf_btf() helper described above. A flags field -
+ * potentially to specify additional details about the BTF pointer
+ * (rather than its mode of display) - is included for future use.
+ * Display flags - BTF_F_* - are passed to bpf_snprintf_btf separately.
+ */
+struct btf_ptr {
+ void *ptr;
+ __u32 type_id;
+ __u32 flags; /* BTF ptr flags; unused at present. */
+};
+
+/*
+ * Flags to control bpf_snprintf_btf() behaviour.
+ * - BTF_F_COMPACT: no formatting around type information
+ * - BTF_F_NONAME: no struct/union member names/types
+ * - BTF_F_PTR_RAW: show raw (unobfuscated) pointer values;
+ * equivalent to %px.
+ * - BTF_F_ZERO: show zero-valued struct/union members; they
+ * are not displayed by default
+ */
+enum {
+ BTF_F_COMPACT = (1ULL << 0),
+ BTF_F_NONAME = (1ULL << 1),
+ BTF_F_PTR_RAW = (1ULL << 2),
+ BTF_F_ZERO = (1ULL << 3),
+};
+
+/* bpf_core_relo_kind encodes which aspect of captured field/type/enum value
+ * has to be adjusted by relocations. It is emitted by llvm and passed to
+ * libbpf and later to the kernel.
+ */
+enum bpf_core_relo_kind {
+ BPF_CORE_FIELD_BYTE_OFFSET = 0, /* field byte offset */
+ BPF_CORE_FIELD_BYTE_SIZE = 1, /* field size in bytes */
+ BPF_CORE_FIELD_EXISTS = 2, /* field existence in target kernel */
+ BPF_CORE_FIELD_SIGNED = 3, /* field signedness (0 - unsigned, 1 - signed) */
+ BPF_CORE_FIELD_LSHIFT_U64 = 4, /* bitfield-specific left bitshift */
+ BPF_CORE_FIELD_RSHIFT_U64 = 5, /* bitfield-specific right bitshift */
+ BPF_CORE_TYPE_ID_LOCAL = 6, /* type ID in local BPF object */
+ BPF_CORE_TYPE_ID_TARGET = 7, /* type ID in target kernel */
+ BPF_CORE_TYPE_EXISTS = 8, /* type existence in target kernel */
+ BPF_CORE_TYPE_SIZE = 9, /* type size in bytes */
+ BPF_CORE_ENUMVAL_EXISTS = 10, /* enum value existence in target kernel */
+ BPF_CORE_ENUMVAL_VALUE = 11, /* enum value integer value */
+ BPF_CORE_TYPE_MATCHES = 12, /* type match in target kernel */
+};
+
+/*
+ * "struct bpf_core_relo" is used to pass relocation data form LLVM to libbpf
+ * and from libbpf to the kernel.
+ *
+ * CO-RE relocation captures the following data:
+ * - insn_off - instruction offset (in bytes) within a BPF program that needs
+ * its insn->imm field to be relocated with actual field info;
+ * - type_id - BTF type ID of the "root" (containing) entity of a relocatable
+ * type or field;
+ * - access_str_off - offset into corresponding .BTF string section. String
+ * interpretation depends on specific relocation kind:
+ * - for field-based relocations, string encodes an accessed field using
+ * a sequence of field and array indices, separated by colon (:). It's
+ * conceptually very close to LLVM's getelementptr ([0]) instruction's
+ * arguments for identifying offset to a field.
+ * - for type-based relocations, strings is expected to be just "0";
+ * - for enum value-based relocations, string contains an index of enum
+ * value within its enum type;
+ * - kind - one of enum bpf_core_relo_kind;
+ *
+ * Example:
+ * struct sample {
+ * int a;
+ * struct {
+ * int b[10];
+ * };
+ * };
+ *
+ * struct sample *s = ...;
+ * int *x = &s->a; // encoded as "0:0" (a is field #0)
+ * int *y = &s->b[5]; // encoded as "0:1:0:5" (anon struct is field #1,
+ * // b is field #0 inside anon struct, accessing elem #5)
+ * int *z = &s[10]->b; // encoded as "10:1" (ptr is used as an array)
+ *
+ * type_id for all relocs in this example will capture BTF type id of
+ * `struct sample`.
+ *
+ * Such relocation is emitted when using __builtin_preserve_access_index()
+ * Clang built-in, passing expression that captures field address, e.g.:
+ *
+ * bpf_probe_read(&dst, sizeof(dst),
+ * __builtin_preserve_access_index(&src->a.b.c));
+ *
+ * In this case Clang will emit field relocation recording necessary data to
+ * be able to find offset of embedded `a.b.c` field within `src` struct.
+ *
+ * [0] https://llvm.org/docs/LangRef.html#getelementptr-instruction
+ */
+struct bpf_core_relo {
+ __u32 insn_off;
+ __u32 type_id;
+ __u32 access_str_off;
+ enum bpf_core_relo_kind kind;
+};
+
+#endif /* _UAPI__LINUX_BPF_H__ */
diff --git a/include/uapi/linux/bpf_common.h b/include/uapi/linux/bpf_common.h
new file mode 100644
index 0000000..ee97668
--- /dev/null
+++ b/include/uapi/linux/bpf_common.h
@@ -0,0 +1,57 @@
+/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
+#ifndef _UAPI__LINUX_BPF_COMMON_H__
+#define _UAPI__LINUX_BPF_COMMON_H__
+
+/* Instruction classes */
+#define BPF_CLASS(code) ((code) & 0x07)
+#define BPF_LD 0x00
+#define BPF_LDX 0x01
+#define BPF_ST 0x02
+#define BPF_STX 0x03
+#define BPF_ALU 0x04
+#define BPF_JMP 0x05
+#define BPF_RET 0x06
+#define BPF_MISC 0x07
+
+/* ld/ldx fields */
+#define BPF_SIZE(code) ((code) & 0x18)
+#define BPF_W 0x00 /* 32-bit */
+#define BPF_H 0x08 /* 16-bit */
+#define BPF_B 0x10 /* 8-bit */
+/* eBPF BPF_DW 0x18 64-bit */
+#define BPF_MODE(code) ((code) & 0xe0)
+#define BPF_IMM 0x00
+#define BPF_ABS 0x20
+#define BPF_IND 0x40
+#define BPF_MEM 0x60
+#define BPF_LEN 0x80
+#define BPF_MSH 0xa0
+
+/* alu/jmp fields */
+#define BPF_OP(code) ((code) & 0xf0)
+#define BPF_ADD 0x00
+#define BPF_SUB 0x10
+#define BPF_MUL 0x20
+#define BPF_DIV 0x30
+#define BPF_OR 0x40
+#define BPF_AND 0x50
+#define BPF_LSH 0x60
+#define BPF_RSH 0x70
+#define BPF_NEG 0x80
+#define BPF_MOD 0x90
+#define BPF_XOR 0xa0
+
+#define BPF_JA 0x00
+#define BPF_JEQ 0x10
+#define BPF_JGT 0x20
+#define BPF_JGE 0x30
+#define BPF_JSET 0x40
+#define BPF_SRC(code) ((code) & 0x08)
+#define BPF_K 0x00
+#define BPF_X 0x08
+
+#ifndef BPF_MAXINSNS
+#define BPF_MAXINSNS 4096
+#endif
+
+#endif /* _UAPI__LINUX_BPF_COMMON_H__ */
diff --git a/include/uapi/linux/btf.h b/include/uapi/linux/btf.h
new file mode 100644
index 0000000..ec1798b
--- /dev/null
+++ b/include/uapi/linux/btf.h
@@ -0,0 +1,200 @@
+/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
+/* Copyright (c) 2018 Facebook */
+#ifndef _UAPI__LINUX_BTF_H__
+#define _UAPI__LINUX_BTF_H__
+
+#include <linux/types.h>
+
+#define BTF_MAGIC 0xeB9F
+#define BTF_VERSION 1
+
+struct btf_header {
+ __u16 magic;
+ __u8 version;
+ __u8 flags;
+ __u32 hdr_len;
+
+ /* All offsets are in bytes relative to the end of this header */
+ __u32 type_off; /* offset of type section */
+ __u32 type_len; /* length of type section */
+ __u32 str_off; /* offset of string section */
+ __u32 str_len; /* length of string section */
+};
+
+/* Max # of type identifier */
+#define BTF_MAX_TYPE 0x000fffff
+/* Max offset into the string section */
+#define BTF_MAX_NAME_OFFSET 0x00ffffff
+/* Max # of struct/union/enum members or func args */
+#define BTF_MAX_VLEN 0xffff
+
+struct btf_type {
+ __u32 name_off;
+ /* "info" bits arrangement
+ * bits 0-15: vlen (e.g. # of struct's members)
+ * bits 16-23: unused
+ * bits 24-28: kind (e.g. int, ptr, array...etc)
+ * bits 29-30: unused
+ * bit 31: kind_flag, currently used by
+ * struct, union, enum, fwd and enum64
+ */
+ __u32 info;
+ /* "size" is used by INT, ENUM, STRUCT, UNION, DATASEC and ENUM64.
+ * "size" tells the size of the type it is describing.
+ *
+ * "type" is used by PTR, TYPEDEF, VOLATILE, CONST, RESTRICT,
+ * FUNC, FUNC_PROTO, VAR, DECL_TAG and TYPE_TAG.
+ * "type" is a type_id referring to another type.
+ */
+ union {
+ __u32 size;
+ __u32 type;
+ };
+};
+
+#define BTF_INFO_KIND(info) (((info) >> 24) & 0x1f)
+#define BTF_INFO_VLEN(info) ((info) & 0xffff)
+#define BTF_INFO_KFLAG(info) ((info) >> 31)
+
+enum {
+ BTF_KIND_UNKN = 0, /* Unknown */
+ BTF_KIND_INT = 1, /* Integer */
+ BTF_KIND_PTR = 2, /* Pointer */
+ BTF_KIND_ARRAY = 3, /* Array */
+ BTF_KIND_STRUCT = 4, /* Struct */
+ BTF_KIND_UNION = 5, /* Union */
+ BTF_KIND_ENUM = 6, /* Enumeration up to 32-bit values */
+ BTF_KIND_FWD = 7, /* Forward */
+ BTF_KIND_TYPEDEF = 8, /* Typedef */
+ BTF_KIND_VOLATILE = 9, /* Volatile */
+ BTF_KIND_CONST = 10, /* Const */
+ BTF_KIND_RESTRICT = 11, /* Restrict */
+ BTF_KIND_FUNC = 12, /* Function */
+ BTF_KIND_FUNC_PROTO = 13, /* Function Proto */
+ BTF_KIND_VAR = 14, /* Variable */
+ BTF_KIND_DATASEC = 15, /* Section */
+ BTF_KIND_FLOAT = 16, /* Floating point */
+ BTF_KIND_DECL_TAG = 17, /* Decl Tag */
+ BTF_KIND_TYPE_TAG = 18, /* Type Tag */
+ BTF_KIND_ENUM64 = 19, /* Enumeration up to 64-bit values */
+
+ NR_BTF_KINDS,
+ BTF_KIND_MAX = NR_BTF_KINDS - 1,
+};
+
+/* For some specific BTF_KIND, "struct btf_type" is immediately
+ * followed by extra data.
+ */
+
+/* BTF_KIND_INT is followed by a u32 and the following
+ * is the 32 bits arrangement:
+ */
+#define BTF_INT_ENCODING(VAL) (((VAL) & 0x0f000000) >> 24)
+#define BTF_INT_OFFSET(VAL) (((VAL) & 0x00ff0000) >> 16)
+#define BTF_INT_BITS(VAL) ((VAL) & 0x000000ff)
+
+/* Attributes stored in the BTF_INT_ENCODING */
+#define BTF_INT_SIGNED (1 << 0)
+#define BTF_INT_CHAR (1 << 1)
+#define BTF_INT_BOOL (1 << 2)
+
+/* BTF_KIND_ENUM is followed by multiple "struct btf_enum".
+ * The exact number of btf_enum is stored in the vlen (of the
+ * info in "struct btf_type").
+ */
+struct btf_enum {
+ __u32 name_off;
+ __s32 val;
+};
+
+/* BTF_KIND_ARRAY is followed by one "struct btf_array" */
+struct btf_array {
+ __u32 type;
+ __u32 index_type;
+ __u32 nelems;
+};
+
+/* BTF_KIND_STRUCT and BTF_KIND_UNION are followed
+ * by multiple "struct btf_member". The exact number
+ * of btf_member is stored in the vlen (of the info in
+ * "struct btf_type").
+ */
+struct btf_member {
+ __u32 name_off;
+ __u32 type;
+ /* If the type info kind_flag is set, the btf_member offset
+ * contains both member bitfield size and bit offset. The
+ * bitfield size is set for bitfield members. If the type
+ * info kind_flag is not set, the offset contains only bit
+ * offset.
+ */
+ __u32 offset;
+};
+
+/* If the struct/union type info kind_flag is set, the
+ * following two macros are used to access bitfield_size
+ * and bit_offset from btf_member.offset.
+ */
+#define BTF_MEMBER_BITFIELD_SIZE(val) ((val) >> 24)
+#define BTF_MEMBER_BIT_OFFSET(val) ((val) & 0xffffff)
+
+/* BTF_KIND_FUNC_PROTO is followed by multiple "struct btf_param".
+ * The exact number of btf_param is stored in the vlen (of the
+ * info in "struct btf_type").
+ */
+struct btf_param {
+ __u32 name_off;
+ __u32 type;
+};
+
+enum {
+ BTF_VAR_STATIC = 0,
+ BTF_VAR_GLOBAL_ALLOCATED = 1,
+ BTF_VAR_GLOBAL_EXTERN = 2,
+};
+
+enum btf_func_linkage {
+ BTF_FUNC_STATIC = 0,
+ BTF_FUNC_GLOBAL = 1,
+ BTF_FUNC_EXTERN = 2,
+};
+
+/* BTF_KIND_VAR is followed by a single "struct btf_var" to describe
+ * additional information related to the variable such as its linkage.
+ */
+struct btf_var {
+ __u32 linkage;
+};
+
+/* BTF_KIND_DATASEC is followed by multiple "struct btf_var_secinfo"
+ * to describe all BTF_KIND_VAR types it contains along with it's
+ * in-section offset as well as size.
+ */
+struct btf_var_secinfo {
+ __u32 type;
+ __u32 offset;
+ __u32 size;
+};
+
+/* BTF_KIND_DECL_TAG is followed by a single "struct btf_decl_tag" to describe
+ * additional information related to the tag applied location.
+ * If component_idx == -1, the tag is applied to a struct, union,
+ * variable or function. Otherwise, it is applied to a struct/union
+ * member or a func argument, and component_idx indicates which member
+ * or argument (0 ... vlen-1).
+ */
+struct btf_decl_tag {
+ __s32 component_idx;
+};
+
+/* BTF_KIND_ENUM64 is followed by multiple "struct btf_enum64".
+ * The exact number of btf_enum64 is stored in the vlen (of the
+ * info in "struct btf_type").
+ */
+struct btf_enum64 {
+ __u32 name_off;
+ __u32 val_lo32;
+ __u32 val_hi32;
+};
+
+#endif /* _UAPI__LINUX_BTF_H__ */
diff --git a/include/uapi/linux/fcntl.h b/include/uapi/linux/fcntl.h
new file mode 100644
index 0000000..2f86b2a
--- /dev/null
+++ b/include/uapi/linux/fcntl.h
@@ -0,0 +1,114 @@
+/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
+#ifndef _UAPI_LINUX_FCNTL_H
+#define _UAPI_LINUX_FCNTL_H
+
+#include <asm/fcntl.h>
+#include <linux/openat2.h>
+
+#define F_SETLEASE (F_LINUX_SPECIFIC_BASE + 0)
+#define F_GETLEASE (F_LINUX_SPECIFIC_BASE + 1)
+
+/*
+ * Cancel a blocking posix lock; internal use only until we expose an
+ * asynchronous lock api to userspace:
+ */
+#define F_CANCELLK (F_LINUX_SPECIFIC_BASE + 5)
+
+/* Create a file descriptor with FD_CLOEXEC set. */
+#define F_DUPFD_CLOEXEC (F_LINUX_SPECIFIC_BASE + 6)
+
+/*
+ * Request nofications on a directory.
+ * See below for events that may be notified.
+ */
+#define F_NOTIFY (F_LINUX_SPECIFIC_BASE+2)
+
+/*
+ * Set and get of pipe page size array
+ */
+#define F_SETPIPE_SZ (F_LINUX_SPECIFIC_BASE + 7)
+#define F_GETPIPE_SZ (F_LINUX_SPECIFIC_BASE + 8)
+
+/*
+ * Set/Get seals
+ */
+#define F_ADD_SEALS (F_LINUX_SPECIFIC_BASE + 9)
+#define F_GET_SEALS (F_LINUX_SPECIFIC_BASE + 10)
+
+/*
+ * Types of seals
+ */
+#define F_SEAL_SEAL 0x0001 /* prevent further seals from being set */
+#define F_SEAL_SHRINK 0x0002 /* prevent file from shrinking */
+#define F_SEAL_GROW 0x0004 /* prevent file from growing */
+#define F_SEAL_WRITE 0x0008 /* prevent writes */
+#define F_SEAL_FUTURE_WRITE 0x0010 /* prevent future writes while mapped */
+/* (1U << 31) is reserved for signed error codes */
+
+/*
+ * Set/Get write life time hints. {GET,SET}_RW_HINT operate on the
+ * underlying inode, while {GET,SET}_FILE_RW_HINT operate only on
+ * the specific file.
+ */
+#define F_GET_RW_HINT (F_LINUX_SPECIFIC_BASE + 11)
+#define F_SET_RW_HINT (F_LINUX_SPECIFIC_BASE + 12)
+#define F_GET_FILE_RW_HINT (F_LINUX_SPECIFIC_BASE + 13)
+#define F_SET_FILE_RW_HINT (F_LINUX_SPECIFIC_BASE + 14)
+
+/*
+ * Valid hint values for F_{GET,SET}_RW_HINT. 0 is "not set", or can be
+ * used to clear any hints previously set.
+ */
+#define RWH_WRITE_LIFE_NOT_SET 0
+#define RWH_WRITE_LIFE_NONE 1
+#define RWH_WRITE_LIFE_SHORT 2
+#define RWH_WRITE_LIFE_MEDIUM 3
+#define RWH_WRITE_LIFE_LONG 4
+#define RWH_WRITE_LIFE_EXTREME 5
+
+/*
+ * The originally introduced spelling is remained from the first
+ * versions of the patch set that introduced the feature, see commit
+ * v4.13-rc1~212^2~51.
+ */
+#define RWF_WRITE_LIFE_NOT_SET RWH_WRITE_LIFE_NOT_SET
+
+/*
+ * Types of directory notifications that may be requested.
+ */
+#define DN_ACCESS 0x00000001 /* File accessed */
+#define DN_MODIFY 0x00000002 /* File modified */
+#define DN_CREATE 0x00000004 /* File created */
+#define DN_DELETE 0x00000008 /* File removed */
+#define DN_RENAME 0x00000010 /* File renamed */
+#define DN_ATTRIB 0x00000020 /* File changed attibutes */
+#define DN_MULTISHOT 0x80000000 /* Don't remove notifier */
+
+/*
+ * The constants AT_REMOVEDIR and AT_EACCESS have the same value. AT_EACCESS is
+ * meaningful only to faccessat, while AT_REMOVEDIR is meaningful only to
+ * unlinkat. The two functions do completely different things and therefore,
+ * the flags can be allowed to overlap. For example, passing AT_REMOVEDIR to
+ * faccessat would be undefined behavior and thus treating it equivalent to
+ * AT_EACCESS is valid undefined behavior.
+ */
+#define AT_FDCWD -100 /* Special value used to indicate
+ openat should use the current
+ working directory. */
+#define AT_SYMLINK_NOFOLLOW 0x100 /* Do not follow symbolic links. */
+#define AT_EACCESS 0x200 /* Test access permitted for
+ effective IDs, not real IDs. */
+#define AT_REMOVEDIR 0x200 /* Remove directory instead of
+ unlinking file. */
+#define AT_SYMLINK_FOLLOW 0x400 /* Follow symbolic links. */
+#define AT_NO_AUTOMOUNT 0x800 /* Suppress terminal automount traversal */
+#define AT_EMPTY_PATH 0x1000 /* Allow empty relative pathname */
+
+#define AT_STATX_SYNC_TYPE 0x6000 /* Type of synchronisation required from statx() */
+#define AT_STATX_SYNC_AS_STAT 0x0000 /* - Do whatever stat() does */
+#define AT_STATX_FORCE_SYNC 0x2000 /* - Force the attributes to be sync'd with the server */
+#define AT_STATX_DONT_SYNC 0x4000 /* - Don't sync attributes with the server */
+
+#define AT_RECURSIVE 0x8000 /* Apply to the entire subtree */
+
+#endif /* _UAPI_LINUX_FCNTL_H */
diff --git a/include/uapi/linux/if_link.h b/include/uapi/linux/if_link.h
new file mode 100644
index 0000000..901d98b
--- /dev/null
+++ b/include/uapi/linux/if_link.h
@@ -0,0 +1,1283 @@
+/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
+#ifndef _UAPI_LINUX_IF_LINK_H
+#define _UAPI_LINUX_IF_LINK_H
+
+#include <linux/types.h>
+#include <linux/netlink.h>
+
+/* This struct should be in sync with struct rtnl_link_stats64 */
+struct rtnl_link_stats {
+ __u32 rx_packets;
+ __u32 tx_packets;
+ __u32 rx_bytes;
+ __u32 tx_bytes;
+ __u32 rx_errors;
+ __u32 tx_errors;
+ __u32 rx_dropped;
+ __u32 tx_dropped;
+ __u32 multicast;
+ __u32 collisions;
+ /* detailed rx_errors: */
+ __u32 rx_length_errors;
+ __u32 rx_over_errors;
+ __u32 rx_crc_errors;
+ __u32 rx_frame_errors;
+ __u32 rx_fifo_errors;
+ __u32 rx_missed_errors;
+
+ /* detailed tx_errors */
+ __u32 tx_aborted_errors;
+ __u32 tx_carrier_errors;
+ __u32 tx_fifo_errors;
+ __u32 tx_heartbeat_errors;
+ __u32 tx_window_errors;
+
+ /* for cslip etc */
+ __u32 rx_compressed;
+ __u32 tx_compressed;
+
+ __u32 rx_nohandler;
+};
+
+/**
+ * struct rtnl_link_stats64 - The main device statistics structure.
+ *
+ * @rx_packets: Number of good packets received by the interface.
+ * For hardware interfaces counts all good packets received from the device
+ * by the host, including packets which host had to drop at various stages
+ * of processing (even in the driver).
+ *
+ * @tx_packets: Number of packets successfully transmitted.
+ * For hardware interfaces counts packets which host was able to successfully
+ * hand over to the device, which does not necessarily mean that packets
+ * had been successfully transmitted out of the device, only that device
+ * acknowledged it copied them out of host memory.
+ *
+ * @rx_bytes: Number of good received bytes, corresponding to @rx_packets.
+ *
+ * For IEEE 802.3 devices should count the length of Ethernet Frames
+ * excluding the FCS.
+ *
+ * @tx_bytes: Number of good transmitted bytes, corresponding to @tx_packets.
+ *
+ * For IEEE 802.3 devices should count the length of Ethernet Frames
+ * excluding the FCS.
+ *
+ * @rx_errors: Total number of bad packets received on this network device.
+ * This counter must include events counted by @rx_length_errors,
+ * @rx_crc_errors, @rx_frame_errors and other errors not otherwise
+ * counted.
+ *
+ * @tx_errors: Total number of transmit problems.
+ * This counter must include events counter by @tx_aborted_errors,
+ * @tx_carrier_errors, @tx_fifo_errors, @tx_heartbeat_errors,
+ * @tx_window_errors and other errors not otherwise counted.
+ *
+ * @rx_dropped: Number of packets received but not processed,
+ * e.g. due to lack of resources or unsupported protocol.
+ * For hardware interfaces this counter may include packets discarded
+ * due to L2 address filtering but should not include packets dropped
+ * by the device due to buffer exhaustion which are counted separately in
+ * @rx_missed_errors (since procfs folds those two counters together).
+ *
+ * @tx_dropped: Number of packets dropped on their way to transmission,
+ * e.g. due to lack of resources.
+ *
+ * @multicast: Multicast packets received.
+ * For hardware interfaces this statistic is commonly calculated
+ * at the device level (unlike @rx_packets) and therefore may include
+ * packets which did not reach the host.
+ *
+ * For IEEE 802.3 devices this counter may be equivalent to:
+ *
+ * - 30.3.1.1.21 aMulticastFramesReceivedOK
+ *
+ * @collisions: Number of collisions during packet transmissions.
+ *
+ * @rx_length_errors: Number of packets dropped due to invalid length.
+ * Part of aggregate "frame" errors in `/proc/net/dev`.
+ *
+ * For IEEE 802.3 devices this counter should be equivalent to a sum
+ * of the following attributes:
+ *
+ * - 30.3.1.1.23 aInRangeLengthErrors
+ * - 30.3.1.1.24 aOutOfRangeLengthField
+ * - 30.3.1.1.25 aFrameTooLongErrors
+ *
+ * @rx_over_errors: Receiver FIFO overflow event counter.
+ *
+ * Historically the count of overflow events. Such events may be
+ * reported in the receive descriptors or via interrupts, and may
+ * not correspond one-to-one with dropped packets.
+ *
+ * The recommended interpretation for high speed interfaces is -
+ * number of packets dropped because they did not fit into buffers
+ * provided by the host, e.g. packets larger than MTU or next buffer
+ * in the ring was not available for a scatter transfer.
+ *
+ * Part of aggregate "frame" errors in `/proc/net/dev`.
+ *
+ * This statistics was historically used interchangeably with
+ * @rx_fifo_errors.
+ *
+ * This statistic corresponds to hardware events and is not commonly used
+ * on software devices.
+ *
+ * @rx_crc_errors: Number of packets received with a CRC error.
+ * Part of aggregate "frame" errors in `/proc/net/dev`.
+ *
+ * For IEEE 802.3 devices this counter must be equivalent to:
+ *
+ * - 30.3.1.1.6 aFrameCheckSequenceErrors
+ *
+ * @rx_frame_errors: Receiver frame alignment errors.
+ * Part of aggregate "frame" errors in `/proc/net/dev`.
+ *
+ * For IEEE 802.3 devices this counter should be equivalent to:
+ *
+ * - 30.3.1.1.7 aAlignmentErrors
+ *
+ * @rx_fifo_errors: Receiver FIFO error counter.
+ *
+ * Historically the count of overflow events. Those events may be
+ * reported in the receive descriptors or via interrupts, and may
+ * not correspond one-to-one with dropped packets.
+ *
+ * This statistics was used interchangeably with @rx_over_errors.
+ * Not recommended for use in drivers for high speed interfaces.
+ *
+ * This statistic is used on software devices, e.g. to count software
+ * packet queue overflow (can) or sequencing errors (GRE).
+ *
+ * @rx_missed_errors: Count of packets missed by the host.
+ * Folded into the "drop" counter in `/proc/net/dev`.
+ *
+ * Counts number of packets dropped by the device due to lack
+ * of buffer space. This usually indicates that the host interface
+ * is slower than the network interface, or host is not keeping up
+ * with the receive packet rate.
+ *
+ * This statistic corresponds to hardware events and is not used
+ * on software devices.
+ *
+ * @tx_aborted_errors:
+ * Part of aggregate "carrier" errors in `/proc/net/dev`.
+ * For IEEE 802.3 devices capable of half-duplex operation this counter
+ * must be equivalent to:
+ *
+ * - 30.3.1.1.11 aFramesAbortedDueToXSColls
+ *
+ * High speed interfaces may use this counter as a general device
+ * discard counter.
+ *
+ * @tx_carrier_errors: Number of frame transmission errors due to loss
+ * of carrier during transmission.
+ * Part of aggregate "carrier" errors in `/proc/net/dev`.
+ *
+ * For IEEE 802.3 devices this counter must be equivalent to:
+ *
+ * - 30.3.1.1.13 aCarrierSenseErrors
+ *
+ * @tx_fifo_errors: Number of frame transmission errors due to device
+ * FIFO underrun / underflow. This condition occurs when the device
+ * begins transmission of a frame but is unable to deliver the
+ * entire frame to the transmitter in time for transmission.
+ * Part of aggregate "carrier" errors in `/proc/net/dev`.
+ *
+ * @tx_heartbeat_errors: Number of Heartbeat / SQE Test errors for
+ * old half-duplex Ethernet.
+ * Part of aggregate "carrier" errors in `/proc/net/dev`.
+ *
+ * For IEEE 802.3 devices possibly equivalent to:
+ *
+ * - 30.3.2.1.4 aSQETestErrors
+ *
+ * @tx_window_errors: Number of frame transmission errors due
+ * to late collisions (for Ethernet - after the first 64B of transmission).
+ * Part of aggregate "carrier" errors in `/proc/net/dev`.
+ *
+ * For IEEE 802.3 devices this counter must be equivalent to:
+ *
+ * - 30.3.1.1.10 aLateCollisions
+ *
+ * @rx_compressed: Number of correctly received compressed packets.
+ * This counters is only meaningful for interfaces which support
+ * packet compression (e.g. CSLIP, PPP).
+ *
+ * @tx_compressed: Number of transmitted compressed packets.
+ * This counters is only meaningful for interfaces which support
+ * packet compression (e.g. CSLIP, PPP).
+ *
+ * @rx_nohandler: Number of packets received on the interface
+ * but dropped by the networking stack because the device is
+ * not designated to receive packets (e.g. backup link in a bond).
+ */
+struct rtnl_link_stats64 {
+ __u64 rx_packets;
+ __u64 tx_packets;
+ __u64 rx_bytes;
+ __u64 tx_bytes;
+ __u64 rx_errors;
+ __u64 tx_errors;
+ __u64 rx_dropped;
+ __u64 tx_dropped;
+ __u64 multicast;
+ __u64 collisions;
+
+ /* detailed rx_errors: */
+ __u64 rx_length_errors;
+ __u64 rx_over_errors;
+ __u64 rx_crc_errors;
+ __u64 rx_frame_errors;
+ __u64 rx_fifo_errors;
+ __u64 rx_missed_errors;
+
+ /* detailed tx_errors */
+ __u64 tx_aborted_errors;
+ __u64 tx_carrier_errors;
+ __u64 tx_fifo_errors;
+ __u64 tx_heartbeat_errors;
+ __u64 tx_window_errors;
+
+ /* for cslip etc */
+ __u64 rx_compressed;
+ __u64 tx_compressed;
+ __u64 rx_nohandler;
+};
+
+/* The struct should be in sync with struct ifmap */
+struct rtnl_link_ifmap {
+ __u64 mem_start;
+ __u64 mem_end;
+ __u64 base_addr;
+ __u16 irq;
+ __u8 dma;
+ __u8 port;
+};
+
+/*
+ * IFLA_AF_SPEC
+ * Contains nested attributes for address family specific attributes.
+ * Each address family may create a attribute with the address family
+ * number as type and create its own attribute structure in it.
+ *
+ * Example:
+ * [IFLA_AF_SPEC] = {
+ * [AF_INET] = {
+ * [IFLA_INET_CONF] = ...,
+ * },
+ * [AF_INET6] = {
+ * [IFLA_INET6_FLAGS] = ...,
+ * [IFLA_INET6_CONF] = ...,
+ * }
+ * }
+ */
+
+enum {
+ IFLA_UNSPEC,
+ IFLA_ADDRESS,
+ IFLA_BROADCAST,
+ IFLA_IFNAME,
+ IFLA_MTU,
+ IFLA_LINK,
+ IFLA_QDISC,
+ IFLA_STATS,
+ IFLA_COST,
+#define IFLA_COST IFLA_COST
+ IFLA_PRIORITY,
+#define IFLA_PRIORITY IFLA_PRIORITY
+ IFLA_MASTER,
+#define IFLA_MASTER IFLA_MASTER
+ IFLA_WIRELESS, /* Wireless Extension event - see wireless.h */
+#define IFLA_WIRELESS IFLA_WIRELESS
+ IFLA_PROTINFO, /* Protocol specific information for a link */
+#define IFLA_PROTINFO IFLA_PROTINFO
+ IFLA_TXQLEN,
+#define IFLA_TXQLEN IFLA_TXQLEN
+ IFLA_MAP,
+#define IFLA_MAP IFLA_MAP
+ IFLA_WEIGHT,
+#define IFLA_WEIGHT IFLA_WEIGHT
+ IFLA_OPERSTATE,
+ IFLA_LINKMODE,
+ IFLA_LINKINFO,
+#define IFLA_LINKINFO IFLA_LINKINFO
+ IFLA_NET_NS_PID,
+ IFLA_IFALIAS,
+ IFLA_NUM_VF, /* Number of VFs if device is SR-IOV PF */
+ IFLA_VFINFO_LIST,
+ IFLA_STATS64,
+ IFLA_VF_PORTS,
+ IFLA_PORT_SELF,
+ IFLA_AF_SPEC,
+ IFLA_GROUP, /* Group the device belongs to */
+ IFLA_NET_NS_FD,
+ IFLA_EXT_MASK, /* Extended info mask, VFs, etc */
+ IFLA_PROMISCUITY, /* Promiscuity count: > 0 means acts PROMISC */
+#define IFLA_PROMISCUITY IFLA_PROMISCUITY
+ IFLA_NUM_TX_QUEUES,
+ IFLA_NUM_RX_QUEUES,
+ IFLA_CARRIER,
+ IFLA_PHYS_PORT_ID,
+ IFLA_CARRIER_CHANGES,
+ IFLA_PHYS_SWITCH_ID,
+ IFLA_LINK_NETNSID,
+ IFLA_PHYS_PORT_NAME,
+ IFLA_PROTO_DOWN,
+ IFLA_GSO_MAX_SEGS,
+ IFLA_GSO_MAX_SIZE,
+ IFLA_PAD,
+ IFLA_XDP,
+ IFLA_EVENT,
+ IFLA_NEW_NETNSID,
+ IFLA_IF_NETNSID,
+ IFLA_TARGET_NETNSID = IFLA_IF_NETNSID, /* new alias */
+ IFLA_CARRIER_UP_COUNT,
+ IFLA_CARRIER_DOWN_COUNT,
+ IFLA_NEW_IFINDEX,
+ IFLA_MIN_MTU,
+ IFLA_MAX_MTU,
+ IFLA_PROP_LIST,
+ IFLA_ALT_IFNAME, /* Alternative ifname */
+ IFLA_PERM_ADDRESS,
+ IFLA_PROTO_DOWN_REASON,
+
+ /* device (sysfs) name as parent, used instead
+ * of IFLA_LINK where there's no parent netdev
+ */
+ IFLA_PARENT_DEV_NAME,
+ IFLA_PARENT_DEV_BUS_NAME,
+ IFLA_GRO_MAX_SIZE,
+ IFLA_TSO_MAX_SIZE,
+ IFLA_TSO_MAX_SEGS,
+
+ __IFLA_MAX
+};
+
+
+#define IFLA_MAX (__IFLA_MAX - 1)
+
+enum {
+ IFLA_PROTO_DOWN_REASON_UNSPEC,
+ IFLA_PROTO_DOWN_REASON_MASK, /* u32, mask for reason bits */
+ IFLA_PROTO_DOWN_REASON_VALUE, /* u32, reason bit value */
+
+ __IFLA_PROTO_DOWN_REASON_CNT,
+ IFLA_PROTO_DOWN_REASON_MAX = __IFLA_PROTO_DOWN_REASON_CNT - 1
+};
+
+/* backwards compatibility for userspace */
+#ifndef __KERNEL__
+#define IFLA_RTA(r) ((struct rtattr*)(((char*)(r)) + NLMSG_ALIGN(sizeof(struct ifinfomsg))))
+#define IFLA_PAYLOAD(n) NLMSG_PAYLOAD(n,sizeof(struct ifinfomsg))
+#endif
+
+enum {
+ IFLA_INET_UNSPEC,
+ IFLA_INET_CONF,
+ __IFLA_INET_MAX,
+};
+
+#define IFLA_INET_MAX (__IFLA_INET_MAX - 1)
+
+/* ifi_flags.
+
+ IFF_* flags.
+
+ The only change is:
+ IFF_LOOPBACK, IFF_BROADCAST and IFF_POINTOPOINT are
+ more not changeable by user. They describe link media
+ characteristics and set by device driver.
+
+ Comments:
+ - Combination IFF_BROADCAST|IFF_POINTOPOINT is invalid
+ - If neither of these three flags are set;
+ the interface is NBMA.
+
+ - IFF_MULTICAST does not mean anything special:
+ multicasts can be used on all not-NBMA links.
+ IFF_MULTICAST means that this media uses special encapsulation
+ for multicast frames. Apparently, all IFF_POINTOPOINT and
+ IFF_BROADCAST devices are able to use multicasts too.
+ */
+
+/* IFLA_LINK.
+ For usual devices it is equal ifi_index.
+ If it is a "virtual interface" (f.e. tunnel), ifi_link
+ can point to real physical interface (f.e. for bandwidth calculations),
+ or maybe 0, what means, that real media is unknown (usual
+ for IPIP tunnels, when route to endpoint is allowed to change)
+ */
+
+/* Subtype attributes for IFLA_PROTINFO */
+enum {
+ IFLA_INET6_UNSPEC,
+ IFLA_INET6_FLAGS, /* link flags */
+ IFLA_INET6_CONF, /* sysctl parameters */
+ IFLA_INET6_STATS, /* statistics */
+ IFLA_INET6_MCAST, /* MC things. What of them? */
+ IFLA_INET6_CACHEINFO, /* time values and max reasm size */
+ IFLA_INET6_ICMP6STATS, /* statistics (icmpv6) */
+ IFLA_INET6_TOKEN, /* device token */
+ IFLA_INET6_ADDR_GEN_MODE, /* implicit address generator mode */
+ IFLA_INET6_RA_MTU, /* mtu carried in the RA message */
+ __IFLA_INET6_MAX
+};
+
+#define IFLA_INET6_MAX (__IFLA_INET6_MAX - 1)
+
+enum in6_addr_gen_mode {
+ IN6_ADDR_GEN_MODE_EUI64,
+ IN6_ADDR_GEN_MODE_NONE,
+ IN6_ADDR_GEN_MODE_STABLE_PRIVACY,
+ IN6_ADDR_GEN_MODE_RANDOM,
+};
+
+/* Bridge section */
+
+enum {
+ IFLA_BR_UNSPEC,
+ IFLA_BR_FORWARD_DELAY,
+ IFLA_BR_HELLO_TIME,
+ IFLA_BR_MAX_AGE,
+ IFLA_BR_AGEING_TIME,
+ IFLA_BR_STP_STATE,
+ IFLA_BR_PRIORITY,
+ IFLA_BR_VLAN_FILTERING,
+ IFLA_BR_VLAN_PROTOCOL,
+ IFLA_BR_GROUP_FWD_MASK,
+ IFLA_BR_ROOT_ID,
+ IFLA_BR_BRIDGE_ID,
+ IFLA_BR_ROOT_PORT,
+ IFLA_BR_ROOT_PATH_COST,
+ IFLA_BR_TOPOLOGY_CHANGE,
+ IFLA_BR_TOPOLOGY_CHANGE_DETECTED,
+ IFLA_BR_HELLO_TIMER,
+ IFLA_BR_TCN_TIMER,
+ IFLA_BR_TOPOLOGY_CHANGE_TIMER,
+ IFLA_BR_GC_TIMER,
+ IFLA_BR_GROUP_ADDR,
+ IFLA_BR_FDB_FLUSH,
+ IFLA_BR_MCAST_ROUTER,
+ IFLA_BR_MCAST_SNOOPING,
+ IFLA_BR_MCAST_QUERY_USE_IFADDR,
+ IFLA_BR_MCAST_QUERIER,
+ IFLA_BR_MCAST_HASH_ELASTICITY,
+ IFLA_BR_MCAST_HASH_MAX,
+ IFLA_BR_MCAST_LAST_MEMBER_CNT,
+ IFLA_BR_MCAST_STARTUP_QUERY_CNT,
+ IFLA_BR_MCAST_LAST_MEMBER_INTVL,
+ IFLA_BR_MCAST_MEMBERSHIP_INTVL,
+ IFLA_BR_MCAST_QUERIER_INTVL,
+ IFLA_BR_MCAST_QUERY_INTVL,
+ IFLA_BR_MCAST_QUERY_RESPONSE_INTVL,
+ IFLA_BR_MCAST_STARTUP_QUERY_INTVL,
+ IFLA_BR_NF_CALL_IPTABLES,
+ IFLA_BR_NF_CALL_IP6TABLES,
+ IFLA_BR_NF_CALL_ARPTABLES,
+ IFLA_BR_VLAN_DEFAULT_PVID,
+ IFLA_BR_PAD,
+ IFLA_BR_VLAN_STATS_ENABLED,
+ IFLA_BR_MCAST_STATS_ENABLED,
+ IFLA_BR_MCAST_IGMP_VERSION,
+ IFLA_BR_MCAST_MLD_VERSION,
+ IFLA_BR_VLAN_STATS_PER_PORT,
+ IFLA_BR_MULTI_BOOLOPT,
+ IFLA_BR_MCAST_QUERIER_STATE,
+ __IFLA_BR_MAX,
+};
+
+#define IFLA_BR_MAX (__IFLA_BR_MAX - 1)
+
+struct ifla_bridge_id {
+ __u8 prio[2];
+ __u8 addr[6]; /* ETH_ALEN */
+};
+
+enum {
+ BRIDGE_MODE_UNSPEC,
+ BRIDGE_MODE_HAIRPIN,
+};
+
+enum {
+ IFLA_BRPORT_UNSPEC,
+ IFLA_BRPORT_STATE, /* Spanning tree state */
+ IFLA_BRPORT_PRIORITY, /* " priority */
+ IFLA_BRPORT_COST, /* " cost */
+ IFLA_BRPORT_MODE, /* mode (hairpin) */
+ IFLA_BRPORT_GUARD, /* bpdu guard */
+ IFLA_BRPORT_PROTECT, /* root port protection */
+ IFLA_BRPORT_FAST_LEAVE, /* multicast fast leave */
+ IFLA_BRPORT_LEARNING, /* mac learning */
+ IFLA_BRPORT_UNICAST_FLOOD, /* flood unicast traffic */
+ IFLA_BRPORT_PROXYARP, /* proxy ARP */
+ IFLA_BRPORT_LEARNING_SYNC, /* mac learning sync from device */
+ IFLA_BRPORT_PROXYARP_WIFI, /* proxy ARP for Wi-Fi */
+ IFLA_BRPORT_ROOT_ID, /* designated root */
+ IFLA_BRPORT_BRIDGE_ID, /* designated bridge */
+ IFLA_BRPORT_DESIGNATED_PORT,
+ IFLA_BRPORT_DESIGNATED_COST,
+ IFLA_BRPORT_ID,
+ IFLA_BRPORT_NO,
+ IFLA_BRPORT_TOPOLOGY_CHANGE_ACK,
+ IFLA_BRPORT_CONFIG_PENDING,
+ IFLA_BRPORT_MESSAGE_AGE_TIMER,
+ IFLA_BRPORT_FORWARD_DELAY_TIMER,
+ IFLA_BRPORT_HOLD_TIMER,
+ IFLA_BRPORT_FLUSH,
+ IFLA_BRPORT_MULTICAST_ROUTER,
+ IFLA_BRPORT_PAD,
+ IFLA_BRPORT_MCAST_FLOOD,
+ IFLA_BRPORT_MCAST_TO_UCAST,
+ IFLA_BRPORT_VLAN_TUNNEL,
+ IFLA_BRPORT_BCAST_FLOOD,
+ IFLA_BRPORT_GROUP_FWD_MASK,
+ IFLA_BRPORT_NEIGH_SUPPRESS,
+ IFLA_BRPORT_ISOLATED,
+ IFLA_BRPORT_BACKUP_PORT,
+ IFLA_BRPORT_MRP_RING_OPEN,
+ IFLA_BRPORT_MRP_IN_OPEN,
+ IFLA_BRPORT_MCAST_EHT_HOSTS_LIMIT,
+ IFLA_BRPORT_MCAST_EHT_HOSTS_CNT,
+ __IFLA_BRPORT_MAX
+};
+#define IFLA_BRPORT_MAX (__IFLA_BRPORT_MAX - 1)
+
+struct ifla_cacheinfo {
+ __u32 max_reasm_len;
+ __u32 tstamp; /* ipv6InterfaceTable updated timestamp */
+ __u32 reachable_time;
+ __u32 retrans_time;
+};
+
+enum {
+ IFLA_INFO_UNSPEC,
+ IFLA_INFO_KIND,
+ IFLA_INFO_DATA,
+ IFLA_INFO_XSTATS,
+ IFLA_INFO_SLAVE_KIND,
+ IFLA_INFO_SLAVE_DATA,
+ __IFLA_INFO_MAX,
+};
+
+#define IFLA_INFO_MAX (__IFLA_INFO_MAX - 1)
+
+/* VLAN section */
+
+enum {
+ IFLA_VLAN_UNSPEC,
+ IFLA_VLAN_ID,
+ IFLA_VLAN_FLAGS,
+ IFLA_VLAN_EGRESS_QOS,
+ IFLA_VLAN_INGRESS_QOS,
+ IFLA_VLAN_PROTOCOL,
+ __IFLA_VLAN_MAX,
+};
+
+#define IFLA_VLAN_MAX (__IFLA_VLAN_MAX - 1)
+
+struct ifla_vlan_flags {
+ __u32 flags;
+ __u32 mask;
+};
+
+enum {
+ IFLA_VLAN_QOS_UNSPEC,
+ IFLA_VLAN_QOS_MAPPING,
+ __IFLA_VLAN_QOS_MAX
+};
+
+#define IFLA_VLAN_QOS_MAX (__IFLA_VLAN_QOS_MAX - 1)
+
+struct ifla_vlan_qos_mapping {
+ __u32 from;
+ __u32 to;
+};
+
+/* MACVLAN section */
+enum {
+ IFLA_MACVLAN_UNSPEC,
+ IFLA_MACVLAN_MODE,
+ IFLA_MACVLAN_FLAGS,
+ IFLA_MACVLAN_MACADDR_MODE,
+ IFLA_MACVLAN_MACADDR,
+ IFLA_MACVLAN_MACADDR_DATA,
+ IFLA_MACVLAN_MACADDR_COUNT,
+ IFLA_MACVLAN_BC_QUEUE_LEN,
+ IFLA_MACVLAN_BC_QUEUE_LEN_USED,
+ __IFLA_MACVLAN_MAX,
+};
+
+#define IFLA_MACVLAN_MAX (__IFLA_MACVLAN_MAX - 1)
+
+enum macvlan_mode {
+ MACVLAN_MODE_PRIVATE = 1, /* don't talk to other macvlans */
+ MACVLAN_MODE_VEPA = 2, /* talk to other ports through ext bridge */
+ MACVLAN_MODE_BRIDGE = 4, /* talk to bridge ports directly */
+ MACVLAN_MODE_PASSTHRU = 8,/* take over the underlying device */
+ MACVLAN_MODE_SOURCE = 16,/* use source MAC address list to assign */
+};
+
+enum macvlan_macaddr_mode {
+ MACVLAN_MACADDR_ADD,
+ MACVLAN_MACADDR_DEL,
+ MACVLAN_MACADDR_FLUSH,
+ MACVLAN_MACADDR_SET,
+};
+
+#define MACVLAN_FLAG_NOPROMISC 1
+#define MACVLAN_FLAG_NODST 2 /* skip dst macvlan if matching src macvlan */
+
+/* VRF section */
+enum {
+ IFLA_VRF_UNSPEC,
+ IFLA_VRF_TABLE,
+ __IFLA_VRF_MAX
+};
+
+#define IFLA_VRF_MAX (__IFLA_VRF_MAX - 1)
+
+enum {
+ IFLA_VRF_PORT_UNSPEC,
+ IFLA_VRF_PORT_TABLE,
+ __IFLA_VRF_PORT_MAX
+};
+
+#define IFLA_VRF_PORT_MAX (__IFLA_VRF_PORT_MAX - 1)
+
+/* MACSEC section */
+enum {
+ IFLA_MACSEC_UNSPEC,
+ IFLA_MACSEC_SCI,
+ IFLA_MACSEC_PORT,
+ IFLA_MACSEC_ICV_LEN,
+ IFLA_MACSEC_CIPHER_SUITE,
+ IFLA_MACSEC_WINDOW,
+ IFLA_MACSEC_ENCODING_SA,
+ IFLA_MACSEC_ENCRYPT,
+ IFLA_MACSEC_PROTECT,
+ IFLA_MACSEC_INC_SCI,
+ IFLA_MACSEC_ES,
+ IFLA_MACSEC_SCB,
+ IFLA_MACSEC_REPLAY_PROTECT,
+ IFLA_MACSEC_VALIDATION,
+ IFLA_MACSEC_PAD,
+ IFLA_MACSEC_OFFLOAD,
+ __IFLA_MACSEC_MAX,
+};
+
+#define IFLA_MACSEC_MAX (__IFLA_MACSEC_MAX - 1)
+
+/* XFRM section */
+enum {
+ IFLA_XFRM_UNSPEC,
+ IFLA_XFRM_LINK,
+ IFLA_XFRM_IF_ID,
+ IFLA_XFRM_COLLECT_METADATA,
+ __IFLA_XFRM_MAX
+};
+
+#define IFLA_XFRM_MAX (__IFLA_XFRM_MAX - 1)
+
+enum macsec_validation_type {
+ MACSEC_VALIDATE_DISABLED = 0,
+ MACSEC_VALIDATE_CHECK = 1,
+ MACSEC_VALIDATE_STRICT = 2,
+ __MACSEC_VALIDATE_END,
+ MACSEC_VALIDATE_MAX = __MACSEC_VALIDATE_END - 1,
+};
+
+enum macsec_offload {
+ MACSEC_OFFLOAD_OFF = 0,
+ MACSEC_OFFLOAD_PHY = 1,
+ MACSEC_OFFLOAD_MAC = 2,
+ __MACSEC_OFFLOAD_END,
+ MACSEC_OFFLOAD_MAX = __MACSEC_OFFLOAD_END - 1,
+};
+
+/* IPVLAN section */
+enum {
+ IFLA_IPVLAN_UNSPEC,
+ IFLA_IPVLAN_MODE,
+ IFLA_IPVLAN_FLAGS,
+ __IFLA_IPVLAN_MAX
+};
+
+#define IFLA_IPVLAN_MAX (__IFLA_IPVLAN_MAX - 1)
+
+enum ipvlan_mode {
+ IPVLAN_MODE_L2 = 0,
+ IPVLAN_MODE_L3,
+ IPVLAN_MODE_L3S,
+ IPVLAN_MODE_MAX
+};
+
+#define IPVLAN_F_PRIVATE 0x01
+#define IPVLAN_F_VEPA 0x02
+
+/* VXLAN section */
+enum {
+ IFLA_VXLAN_UNSPEC,
+ IFLA_VXLAN_ID,
+ IFLA_VXLAN_GROUP, /* group or remote address */
+ IFLA_VXLAN_LINK,
+ IFLA_VXLAN_LOCAL,
+ IFLA_VXLAN_TTL,
+ IFLA_VXLAN_TOS,
+ IFLA_VXLAN_LEARNING,
+ IFLA_VXLAN_AGEING,
+ IFLA_VXLAN_LIMIT,
+ IFLA_VXLAN_PORT_RANGE, /* source port */
+ IFLA_VXLAN_PROXY,
+ IFLA_VXLAN_RSC,
+ IFLA_VXLAN_L2MISS,
+ IFLA_VXLAN_L3MISS,
+ IFLA_VXLAN_PORT, /* destination port */
+ IFLA_VXLAN_GROUP6,
+ IFLA_VXLAN_LOCAL6,
+ IFLA_VXLAN_UDP_CSUM,
+ IFLA_VXLAN_UDP_ZERO_CSUM6_TX,
+ IFLA_VXLAN_UDP_ZERO_CSUM6_RX,
+ IFLA_VXLAN_REMCSUM_TX,
+ IFLA_VXLAN_REMCSUM_RX,
+ IFLA_VXLAN_GBP,
+ IFLA_VXLAN_REMCSUM_NOPARTIAL,
+ IFLA_VXLAN_COLLECT_METADATA,
+ IFLA_VXLAN_LABEL,
+ IFLA_VXLAN_GPE,
+ IFLA_VXLAN_TTL_INHERIT,
+ IFLA_VXLAN_DF,
+ __IFLA_VXLAN_MAX
+};
+#define IFLA_VXLAN_MAX (__IFLA_VXLAN_MAX - 1)
+
+struct ifla_vxlan_port_range {
+ __be16 low;
+ __be16 high;
+};
+
+enum ifla_vxlan_df {
+ VXLAN_DF_UNSET = 0,
+ VXLAN_DF_SET,
+ VXLAN_DF_INHERIT,
+ __VXLAN_DF_END,
+ VXLAN_DF_MAX = __VXLAN_DF_END - 1,
+};
+
+/* GENEVE section */
+enum {
+ IFLA_GENEVE_UNSPEC,
+ IFLA_GENEVE_ID,
+ IFLA_GENEVE_REMOTE,
+ IFLA_GENEVE_TTL,
+ IFLA_GENEVE_TOS,
+ IFLA_GENEVE_PORT, /* destination port */
+ IFLA_GENEVE_COLLECT_METADATA,
+ IFLA_GENEVE_REMOTE6,
+ IFLA_GENEVE_UDP_CSUM,
+ IFLA_GENEVE_UDP_ZERO_CSUM6_TX,
+ IFLA_GENEVE_UDP_ZERO_CSUM6_RX,
+ IFLA_GENEVE_LABEL,
+ IFLA_GENEVE_TTL_INHERIT,
+ IFLA_GENEVE_DF,
+ __IFLA_GENEVE_MAX
+};
+#define IFLA_GENEVE_MAX (__IFLA_GENEVE_MAX - 1)
+
+enum ifla_geneve_df {
+ GENEVE_DF_UNSET = 0,
+ GENEVE_DF_SET,
+ GENEVE_DF_INHERIT,
+ __GENEVE_DF_END,
+ GENEVE_DF_MAX = __GENEVE_DF_END - 1,
+};
+
+/* Bareudp section */
+enum {
+ IFLA_BAREUDP_UNSPEC,
+ IFLA_BAREUDP_PORT,
+ IFLA_BAREUDP_ETHERTYPE,
+ IFLA_BAREUDP_SRCPORT_MIN,
+ IFLA_BAREUDP_MULTIPROTO_MODE,
+ __IFLA_BAREUDP_MAX
+};
+
+#define IFLA_BAREUDP_MAX (__IFLA_BAREUDP_MAX - 1)
+
+/* PPP section */
+enum {
+ IFLA_PPP_UNSPEC,
+ IFLA_PPP_DEV_FD,
+ __IFLA_PPP_MAX
+};
+#define IFLA_PPP_MAX (__IFLA_PPP_MAX - 1)
+
+/* GTP section */
+
+enum ifla_gtp_role {
+ GTP_ROLE_GGSN = 0,
+ GTP_ROLE_SGSN,
+};
+
+enum {
+ IFLA_GTP_UNSPEC,
+ IFLA_GTP_FD0,
+ IFLA_GTP_FD1,
+ IFLA_GTP_PDP_HASHSIZE,
+ IFLA_GTP_ROLE,
+ __IFLA_GTP_MAX,
+};
+#define IFLA_GTP_MAX (__IFLA_GTP_MAX - 1)
+
+/* Bonding section */
+
+enum {
+ IFLA_BOND_UNSPEC,
+ IFLA_BOND_MODE,
+ IFLA_BOND_ACTIVE_SLAVE,
+ IFLA_BOND_MIIMON,
+ IFLA_BOND_UPDELAY,
+ IFLA_BOND_DOWNDELAY,
+ IFLA_BOND_USE_CARRIER,
+ IFLA_BOND_ARP_INTERVAL,
+ IFLA_BOND_ARP_IP_TARGET,
+ IFLA_BOND_ARP_VALIDATE,
+ IFLA_BOND_ARP_ALL_TARGETS,
+ IFLA_BOND_PRIMARY,
+ IFLA_BOND_PRIMARY_RESELECT,
+ IFLA_BOND_FAIL_OVER_MAC,
+ IFLA_BOND_XMIT_HASH_POLICY,
+ IFLA_BOND_RESEND_IGMP,
+ IFLA_BOND_NUM_PEER_NOTIF,
+ IFLA_BOND_ALL_SLAVES_ACTIVE,
+ IFLA_BOND_MIN_LINKS,
+ IFLA_BOND_LP_INTERVAL,
+ IFLA_BOND_PACKETS_PER_SLAVE,
+ IFLA_BOND_AD_LACP_RATE,
+ IFLA_BOND_AD_SELECT,
+ IFLA_BOND_AD_INFO,
+ IFLA_BOND_AD_ACTOR_SYS_PRIO,
+ IFLA_BOND_AD_USER_PORT_KEY,
+ IFLA_BOND_AD_ACTOR_SYSTEM,
+ IFLA_BOND_TLB_DYNAMIC_LB,
+ IFLA_BOND_PEER_NOTIF_DELAY,
+ IFLA_BOND_AD_LACP_ACTIVE,
+ IFLA_BOND_MISSED_MAX,
+ IFLA_BOND_NS_IP6_TARGET,
+ __IFLA_BOND_MAX,
+};
+
+#define IFLA_BOND_MAX (__IFLA_BOND_MAX - 1)
+
+enum {
+ IFLA_BOND_AD_INFO_UNSPEC,
+ IFLA_BOND_AD_INFO_AGGREGATOR,
+ IFLA_BOND_AD_INFO_NUM_PORTS,
+ IFLA_BOND_AD_INFO_ACTOR_KEY,
+ IFLA_BOND_AD_INFO_PARTNER_KEY,
+ IFLA_BOND_AD_INFO_PARTNER_MAC,
+ __IFLA_BOND_AD_INFO_MAX,
+};
+
+#define IFLA_BOND_AD_INFO_MAX (__IFLA_BOND_AD_INFO_MAX - 1)
+
+enum {
+ IFLA_BOND_SLAVE_UNSPEC,
+ IFLA_BOND_SLAVE_STATE,
+ IFLA_BOND_SLAVE_MII_STATUS,
+ IFLA_BOND_SLAVE_LINK_FAILURE_COUNT,
+ IFLA_BOND_SLAVE_PERM_HWADDR,
+ IFLA_BOND_SLAVE_QUEUE_ID,
+ IFLA_BOND_SLAVE_AD_AGGREGATOR_ID,
+ IFLA_BOND_SLAVE_AD_ACTOR_OPER_PORT_STATE,
+ IFLA_BOND_SLAVE_AD_PARTNER_OPER_PORT_STATE,
+ IFLA_BOND_SLAVE_PRIO,
+ __IFLA_BOND_SLAVE_MAX,
+};
+
+#define IFLA_BOND_SLAVE_MAX (__IFLA_BOND_SLAVE_MAX - 1)
+
+/* SR-IOV virtual function management section */
+
+enum {
+ IFLA_VF_INFO_UNSPEC,
+ IFLA_VF_INFO,
+ __IFLA_VF_INFO_MAX,
+};
+
+#define IFLA_VF_INFO_MAX (__IFLA_VF_INFO_MAX - 1)
+
+enum {
+ IFLA_VF_UNSPEC,
+ IFLA_VF_MAC, /* Hardware queue specific attributes */
+ IFLA_VF_VLAN, /* VLAN ID and QoS */
+ IFLA_VF_TX_RATE, /* Max TX Bandwidth Allocation */
+ IFLA_VF_SPOOFCHK, /* Spoof Checking on/off switch */
+ IFLA_VF_LINK_STATE, /* link state enable/disable/auto switch */
+ IFLA_VF_RATE, /* Min and Max TX Bandwidth Allocation */
+ IFLA_VF_RSS_QUERY_EN, /* RSS Redirection Table and Hash Key query
+ * on/off switch
+ */
+ IFLA_VF_STATS, /* network device statistics */
+ IFLA_VF_TRUST, /* Trust VF */
+ IFLA_VF_IB_NODE_GUID, /* VF Infiniband node GUID */
+ IFLA_VF_IB_PORT_GUID, /* VF Infiniband port GUID */
+ IFLA_VF_VLAN_LIST, /* nested list of vlans, option for QinQ */
+ IFLA_VF_BROADCAST, /* VF broadcast */
+ __IFLA_VF_MAX,
+};
+
+#define IFLA_VF_MAX (__IFLA_VF_MAX - 1)
+
+struct ifla_vf_mac {
+ __u32 vf;
+ __u8 mac[32]; /* MAX_ADDR_LEN */
+};
+
+struct ifla_vf_broadcast {
+ __u8 broadcast[32];
+};
+
+struct ifla_vf_vlan {
+ __u32 vf;
+ __u32 vlan; /* 0 - 4095, 0 disables VLAN filter */
+ __u32 qos;
+};
+
+enum {
+ IFLA_VF_VLAN_INFO_UNSPEC,
+ IFLA_VF_VLAN_INFO, /* VLAN ID, QoS and VLAN protocol */
+ __IFLA_VF_VLAN_INFO_MAX,
+};
+
+#define IFLA_VF_VLAN_INFO_MAX (__IFLA_VF_VLAN_INFO_MAX - 1)
+#define MAX_VLAN_LIST_LEN 1
+
+struct ifla_vf_vlan_info {
+ __u32 vf;
+ __u32 vlan; /* 0 - 4095, 0 disables VLAN filter */
+ __u32 qos;
+ __be16 vlan_proto; /* VLAN protocol either 802.1Q or 802.1ad */
+};
+
+struct ifla_vf_tx_rate {
+ __u32 vf;
+ __u32 rate; /* Max TX bandwidth in Mbps, 0 disables throttling */
+};
+
+struct ifla_vf_rate {
+ __u32 vf;
+ __u32 min_tx_rate; /* Min Bandwidth in Mbps */
+ __u32 max_tx_rate; /* Max Bandwidth in Mbps */
+};
+
+struct ifla_vf_spoofchk {
+ __u32 vf;
+ __u32 setting;
+};
+
+struct ifla_vf_guid {
+ __u32 vf;
+ __u64 guid;
+};
+
+enum {
+ IFLA_VF_LINK_STATE_AUTO, /* link state of the uplink */
+ IFLA_VF_LINK_STATE_ENABLE, /* link always up */
+ IFLA_VF_LINK_STATE_DISABLE, /* link always down */
+ __IFLA_VF_LINK_STATE_MAX,
+};
+
+struct ifla_vf_link_state {
+ __u32 vf;
+ __u32 link_state;
+};
+
+struct ifla_vf_rss_query_en {
+ __u32 vf;
+ __u32 setting;
+};
+
+enum {
+ IFLA_VF_STATS_RX_PACKETS,
+ IFLA_VF_STATS_TX_PACKETS,
+ IFLA_VF_STATS_RX_BYTES,
+ IFLA_VF_STATS_TX_BYTES,
+ IFLA_VF_STATS_BROADCAST,
+ IFLA_VF_STATS_MULTICAST,
+ IFLA_VF_STATS_PAD,
+ IFLA_VF_STATS_RX_DROPPED,
+ IFLA_VF_STATS_TX_DROPPED,
+ __IFLA_VF_STATS_MAX,
+};
+
+#define IFLA_VF_STATS_MAX (__IFLA_VF_STATS_MAX - 1)
+
+struct ifla_vf_trust {
+ __u32 vf;
+ __u32 setting;
+};
+
+/* VF ports management section
+ *
+ * Nested layout of set/get msg is:
+ *
+ * [IFLA_NUM_VF]
+ * [IFLA_VF_PORTS]
+ * [IFLA_VF_PORT]
+ * [IFLA_PORT_*], ...
+ * [IFLA_VF_PORT]
+ * [IFLA_PORT_*], ...
+ * ...
+ * [IFLA_PORT_SELF]
+ * [IFLA_PORT_*], ...
+ */
+
+enum {
+ IFLA_VF_PORT_UNSPEC,
+ IFLA_VF_PORT, /* nest */
+ __IFLA_VF_PORT_MAX,
+};
+
+#define IFLA_VF_PORT_MAX (__IFLA_VF_PORT_MAX - 1)
+
+enum {
+ IFLA_PORT_UNSPEC,
+ IFLA_PORT_VF, /* __u32 */
+ IFLA_PORT_PROFILE, /* string */
+ IFLA_PORT_VSI_TYPE, /* 802.1Qbg (pre-)standard VDP */
+ IFLA_PORT_INSTANCE_UUID, /* binary UUID */
+ IFLA_PORT_HOST_UUID, /* binary UUID */
+ IFLA_PORT_REQUEST, /* __u8 */
+ IFLA_PORT_RESPONSE, /* __u16, output only */
+ __IFLA_PORT_MAX,
+};
+
+#define IFLA_PORT_MAX (__IFLA_PORT_MAX - 1)
+
+#define PORT_PROFILE_MAX 40
+#define PORT_UUID_MAX 16
+#define PORT_SELF_VF -1
+
+enum {
+ PORT_REQUEST_PREASSOCIATE = 0,
+ PORT_REQUEST_PREASSOCIATE_RR,
+ PORT_REQUEST_ASSOCIATE,
+ PORT_REQUEST_DISASSOCIATE,
+};
+
+enum {
+ PORT_VDP_RESPONSE_SUCCESS = 0,
+ PORT_VDP_RESPONSE_INVALID_FORMAT,
+ PORT_VDP_RESPONSE_INSUFFICIENT_RESOURCES,
+ PORT_VDP_RESPONSE_UNUSED_VTID,
+ PORT_VDP_RESPONSE_VTID_VIOLATION,
+ PORT_VDP_RESPONSE_VTID_VERSION_VIOALTION,
+ PORT_VDP_RESPONSE_OUT_OF_SYNC,
+ /* 0x08-0xFF reserved for future VDP use */
+ PORT_PROFILE_RESPONSE_SUCCESS = 0x100,
+ PORT_PROFILE_RESPONSE_INPROGRESS,
+ PORT_PROFILE_RESPONSE_INVALID,
+ PORT_PROFILE_RESPONSE_BADSTATE,
+ PORT_PROFILE_RESPONSE_INSUFFICIENT_RESOURCES,
+ PORT_PROFILE_RESPONSE_ERROR,
+};
+
+struct ifla_port_vsi {
+ __u8 vsi_mgr_id;
+ __u8 vsi_type_id[3];
+ __u8 vsi_type_version;
+ __u8 pad[3];
+};
+
+
+/* IPoIB section */
+
+enum {
+ IFLA_IPOIB_UNSPEC,
+ IFLA_IPOIB_PKEY,
+ IFLA_IPOIB_MODE,
+ IFLA_IPOIB_UMCAST,
+ __IFLA_IPOIB_MAX
+};
+
+enum {
+ IPOIB_MODE_DATAGRAM = 0, /* using unreliable datagram QPs */
+ IPOIB_MODE_CONNECTED = 1, /* using connected QPs */
+};
+
+#define IFLA_IPOIB_MAX (__IFLA_IPOIB_MAX - 1)
+
+
+/* HSR/PRP section, both uses same interface */
+
+/* Different redundancy protocols for hsr device */
+enum {
+ HSR_PROTOCOL_HSR,
+ HSR_PROTOCOL_PRP,
+ HSR_PROTOCOL_MAX,
+};
+
+enum {
+ IFLA_HSR_UNSPEC,
+ IFLA_HSR_SLAVE1,
+ IFLA_HSR_SLAVE2,
+ IFLA_HSR_MULTICAST_SPEC, /* Last byte of supervision addr */
+ IFLA_HSR_SUPERVISION_ADDR, /* Supervision frame multicast addr */
+ IFLA_HSR_SEQ_NR,
+ IFLA_HSR_VERSION, /* HSR version */
+ IFLA_HSR_PROTOCOL, /* Indicate different protocol than
+ * HSR. For example PRP.
+ */
+ __IFLA_HSR_MAX,
+};
+
+#define IFLA_HSR_MAX (__IFLA_HSR_MAX - 1)
+
+/* STATS section */
+
+struct if_stats_msg {
+ __u8 family;
+ __u8 pad1;
+ __u16 pad2;
+ __u32 ifindex;
+ __u32 filter_mask;
+};
+
+/* A stats attribute can be netdev specific or a global stat.
+ * For netdev stats, lets use the prefix IFLA_STATS_LINK_*
+ */
+enum {
+ IFLA_STATS_UNSPEC, /* also used as 64bit pad attribute */
+ IFLA_STATS_LINK_64,
+ IFLA_STATS_LINK_XSTATS,
+ IFLA_STATS_LINK_XSTATS_SLAVE,
+ IFLA_STATS_LINK_OFFLOAD_XSTATS,
+ IFLA_STATS_AF_SPEC,
+ __IFLA_STATS_MAX,
+};
+
+#define IFLA_STATS_MAX (__IFLA_STATS_MAX - 1)
+
+#define IFLA_STATS_FILTER_BIT(ATTR) (1 << (ATTR - 1))
+
+/* These are embedded into IFLA_STATS_LINK_XSTATS:
+ * [IFLA_STATS_LINK_XSTATS]
+ * -> [LINK_XSTATS_TYPE_xxx]
+ * -> [rtnl link type specific attributes]
+ */
+enum {
+ LINK_XSTATS_TYPE_UNSPEC,
+ LINK_XSTATS_TYPE_BRIDGE,
+ LINK_XSTATS_TYPE_BOND,
+ __LINK_XSTATS_TYPE_MAX
+};
+#define LINK_XSTATS_TYPE_MAX (__LINK_XSTATS_TYPE_MAX - 1)
+
+/* These are stats embedded into IFLA_STATS_LINK_OFFLOAD_XSTATS */
+enum {
+ IFLA_OFFLOAD_XSTATS_UNSPEC,
+ IFLA_OFFLOAD_XSTATS_CPU_HIT, /* struct rtnl_link_stats64 */
+ __IFLA_OFFLOAD_XSTATS_MAX
+};
+#define IFLA_OFFLOAD_XSTATS_MAX (__IFLA_OFFLOAD_XSTATS_MAX - 1)
+
+/* XDP section */
+
+#define XDP_FLAGS_UPDATE_IF_NOEXIST (1U << 0)
+#define XDP_FLAGS_SKB_MODE (1U << 1)
+#define XDP_FLAGS_DRV_MODE (1U << 2)
+#define XDP_FLAGS_HW_MODE (1U << 3)
+#define XDP_FLAGS_REPLACE (1U << 4)
+#define XDP_FLAGS_MODES (XDP_FLAGS_SKB_MODE | \
+ XDP_FLAGS_DRV_MODE | \
+ XDP_FLAGS_HW_MODE)
+#define XDP_FLAGS_MASK (XDP_FLAGS_UPDATE_IF_NOEXIST | \
+ XDP_FLAGS_MODES | XDP_FLAGS_REPLACE)
+
+/* These are stored into IFLA_XDP_ATTACHED on dump. */
+enum {
+ XDP_ATTACHED_NONE = 0,
+ XDP_ATTACHED_DRV,
+ XDP_ATTACHED_SKB,
+ XDP_ATTACHED_HW,
+ XDP_ATTACHED_MULTI,
+};
+
+enum {
+ IFLA_XDP_UNSPEC,
+ IFLA_XDP_FD,
+ IFLA_XDP_ATTACHED,
+ IFLA_XDP_FLAGS,
+ IFLA_XDP_PROG_ID,
+ IFLA_XDP_DRV_PROG_ID,
+ IFLA_XDP_SKB_PROG_ID,
+ IFLA_XDP_HW_PROG_ID,
+ IFLA_XDP_EXPECTED_FD,
+ __IFLA_XDP_MAX,
+};
+
+#define IFLA_XDP_MAX (__IFLA_XDP_MAX - 1)
+
+enum {
+ IFLA_EVENT_NONE,
+ IFLA_EVENT_REBOOT, /* internal reset / reboot */
+ IFLA_EVENT_FEATURES, /* change in offload features */
+ IFLA_EVENT_BONDING_FAILOVER, /* change in active slave */
+ IFLA_EVENT_NOTIFY_PEERS, /* re-sent grat. arp/ndisc */
+ IFLA_EVENT_IGMP_RESEND, /* re-sent IGMP JOIN */
+ IFLA_EVENT_BONDING_OPTIONS, /* change in bonding options */
+};
+
+/* tun section */
+
+enum {
+ IFLA_TUN_UNSPEC,
+ IFLA_TUN_OWNER,
+ IFLA_TUN_GROUP,
+ IFLA_TUN_TYPE,
+ IFLA_TUN_PI,
+ IFLA_TUN_VNET_HDR,
+ IFLA_TUN_PERSIST,
+ IFLA_TUN_MULTI_QUEUE,
+ IFLA_TUN_NUM_QUEUES,
+ IFLA_TUN_NUM_DISABLED_QUEUES,
+ __IFLA_TUN_MAX,
+};
+
+#define IFLA_TUN_MAX (__IFLA_TUN_MAX - 1)
+
+/* rmnet section */
+
+#define RMNET_FLAGS_INGRESS_DEAGGREGATION (1U << 0)
+#define RMNET_FLAGS_INGRESS_MAP_COMMANDS (1U << 1)
+#define RMNET_FLAGS_INGRESS_MAP_CKSUMV4 (1U << 2)
+#define RMNET_FLAGS_EGRESS_MAP_CKSUMV4 (1U << 3)
+#define RMNET_FLAGS_INGRESS_MAP_CKSUMV5 (1U << 4)
+#define RMNET_FLAGS_EGRESS_MAP_CKSUMV5 (1U << 5)
+
+enum {
+ IFLA_RMNET_UNSPEC,
+ IFLA_RMNET_MUX_ID,
+ IFLA_RMNET_FLAGS,
+ __IFLA_RMNET_MAX,
+};
+
+#define IFLA_RMNET_MAX (__IFLA_RMNET_MAX - 1)
+
+struct ifla_rmnet_flags {
+ __u32 flags;
+ __u32 mask;
+};
+
+/* MCTP section */
+
+enum {
+ IFLA_MCTP_UNSPEC,
+ IFLA_MCTP_NET,
+ __IFLA_MCTP_MAX,
+};
+
+#define IFLA_MCTP_MAX (__IFLA_MCTP_MAX - 1)
+
+#endif /* _UAPI_LINUX_IF_LINK_H */
diff --git a/include/uapi/linux/if_xdp.h b/include/uapi/linux/if_xdp.h
new file mode 100644
index 0000000..a78a809
--- /dev/null
+++ b/include/uapi/linux/if_xdp.h
@@ -0,0 +1,111 @@
+/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
+/*
+ * if_xdp: XDP socket user-space interface
+ * Copyright(c) 2018 Intel Corporation.
+ *
+ * Author(s): Björn Töpel <bjorn.topel@intel.com>
+ * Magnus Karlsson <magnus.karlsson@intel.com>
+ */
+
+#ifndef _LINUX_IF_XDP_H
+#define _LINUX_IF_XDP_H
+
+#include <linux/types.h>
+
+/* Options for the sxdp_flags field */
+#define XDP_SHARED_UMEM (1 << 0)
+#define XDP_COPY (1 << 1) /* Force copy-mode */
+#define XDP_ZEROCOPY (1 << 2) /* Force zero-copy mode */
+/* If this option is set, the driver might go sleep and in that case
+ * the XDP_RING_NEED_WAKEUP flag in the fill and/or Tx rings will be
+ * set. If it is set, the application need to explicitly wake up the
+ * driver with a poll() (Rx and Tx) or sendto() (Tx only). If you are
+ * running the driver and the application on the same core, you should
+ * use this option so that the kernel will yield to the user space
+ * application.
+ */
+#define XDP_USE_NEED_WAKEUP (1 << 3)
+
+/* Flags for xsk_umem_config flags */
+#define XDP_UMEM_UNALIGNED_CHUNK_FLAG (1 << 0)
+
+struct sockaddr_xdp {
+ __u16 sxdp_family;
+ __u16 sxdp_flags;
+ __u32 sxdp_ifindex;
+ __u32 sxdp_queue_id;
+ __u32 sxdp_shared_umem_fd;
+};
+
+/* XDP_RING flags */
+#define XDP_RING_NEED_WAKEUP (1 << 0)
+
+struct xdp_ring_offset {
+ __u64 producer;
+ __u64 consumer;
+ __u64 desc;
+ __u64 flags;
+};
+
+struct xdp_mmap_offsets {
+ struct xdp_ring_offset rx;
+ struct xdp_ring_offset tx;
+ struct xdp_ring_offset fr; /* Fill */
+ struct xdp_ring_offset cr; /* Completion */
+};
+
+/* XDP socket options */
+#define XDP_MMAP_OFFSETS 1
+#define XDP_RX_RING 2
+#define XDP_TX_RING 3
+#define XDP_UMEM_REG 4
+#define XDP_UMEM_FILL_RING 5
+#define XDP_UMEM_COMPLETION_RING 6
+#define XDP_STATISTICS 7
+#define XDP_OPTIONS 8
+
+struct xdp_umem_reg {
+ __u64 addr; /* Start of packet data area */
+ __u64 len; /* Length of packet data area */
+ __u32 chunk_size;
+ __u32 headroom;
+ __u32 flags;
+};
+
+struct xdp_statistics {
+ __u64 rx_dropped; /* Dropped for other reasons */
+ __u64 rx_invalid_descs; /* Dropped due to invalid descriptor */
+ __u64 tx_invalid_descs; /* Dropped due to invalid descriptor */
+ __u64 rx_ring_full; /* Dropped due to rx ring being full */
+ __u64 rx_fill_ring_empty_descs; /* Failed to retrieve item from fill ring */
+ __u64 tx_ring_empty_descs; /* Failed to retrieve item from tx ring */
+};
+
+struct xdp_options {
+ __u32 flags;
+};
+
+/* Flags for the flags field of struct xdp_options */
+#define XDP_OPTIONS_ZEROCOPY (1 << 0)
+
+/* Pgoff for mmaping the rings */
+#define XDP_PGOFF_RX_RING 0
+#define XDP_PGOFF_TX_RING 0x80000000
+#define XDP_UMEM_PGOFF_FILL_RING 0x100000000ULL
+#define XDP_UMEM_PGOFF_COMPLETION_RING 0x180000000ULL
+
+/* Masks for unaligned chunks mode */
+#define XSK_UNALIGNED_BUF_OFFSET_SHIFT 48
+#define XSK_UNALIGNED_BUF_ADDR_MASK \
+ ((1ULL << XSK_UNALIGNED_BUF_OFFSET_SHIFT) - 1)
+
+/* Rx/Tx descriptor */
+struct xdp_desc {
+ __u64 addr;
+ __u32 len;
+ __u32 options;
+};
+
+/* UMEM descriptor is __u64 */
+
+#endif /* _LINUX_IF_XDP_H */
diff --git a/include/uapi/linux/netlink.h b/include/uapi/linux/netlink.h
new file mode 100644
index 0000000..0a4d733
--- /dev/null
+++ b/include/uapi/linux/netlink.h
@@ -0,0 +1,252 @@
+/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
+#ifndef _UAPI__LINUX_NETLINK_H
+#define _UAPI__LINUX_NETLINK_H
+
+#include <linux/kernel.h>
+#include <linux/socket.h> /* for __kernel_sa_family_t */
+#include <linux/types.h>
+
+#define NETLINK_ROUTE 0 /* Routing/device hook */
+#define NETLINK_UNUSED 1 /* Unused number */
+#define NETLINK_USERSOCK 2 /* Reserved for user mode socket protocols */
+#define NETLINK_FIREWALL 3 /* Unused number, formerly ip_queue */
+#define NETLINK_SOCK_DIAG 4 /* socket monitoring */
+#define NETLINK_NFLOG 5 /* netfilter/iptables ULOG */
+#define NETLINK_XFRM 6 /* ipsec */
+#define NETLINK_SELINUX 7 /* SELinux event notifications */
+#define NETLINK_ISCSI 8 /* Open-iSCSI */
+#define NETLINK_AUDIT 9 /* auditing */
+#define NETLINK_FIB_LOOKUP 10
+#define NETLINK_CONNECTOR 11
+#define NETLINK_NETFILTER 12 /* netfilter subsystem */
+#define NETLINK_IP6_FW 13
+#define NETLINK_DNRTMSG 14 /* DECnet routing messages */
+#define NETLINK_KOBJECT_UEVENT 15 /* Kernel messages to userspace */
+#define NETLINK_GENERIC 16
+/* leave room for NETLINK_DM (DM Events) */
+#define NETLINK_SCSITRANSPORT 18 /* SCSI Transports */
+#define NETLINK_ECRYPTFS 19
+#define NETLINK_RDMA 20
+#define NETLINK_CRYPTO 21 /* Crypto layer */
+#define NETLINK_SMC 22 /* SMC monitoring */
+
+#define NETLINK_INET_DIAG NETLINK_SOCK_DIAG
+
+#define MAX_LINKS 32
+
+struct sockaddr_nl {
+ __kernel_sa_family_t nl_family; /* AF_NETLINK */
+ unsigned short nl_pad; /* zero */
+ __u32 nl_pid; /* port ID */
+ __u32 nl_groups; /* multicast groups mask */
+};
+
+struct nlmsghdr {
+ __u32 nlmsg_len; /* Length of message including header */
+ __u16 nlmsg_type; /* Message content */
+ __u16 nlmsg_flags; /* Additional flags */
+ __u32 nlmsg_seq; /* Sequence number */
+ __u32 nlmsg_pid; /* Sending process port ID */
+};
+
+/* Flags values */
+
+#define NLM_F_REQUEST 0x01 /* It is request message. */
+#define NLM_F_MULTI 0x02 /* Multipart message, terminated by NLMSG_DONE */
+#define NLM_F_ACK 0x04 /* Reply with ack, with zero or error code */
+#define NLM_F_ECHO 0x08 /* Echo this request */
+#define NLM_F_DUMP_INTR 0x10 /* Dump was inconsistent due to sequence change */
+#define NLM_F_DUMP_FILTERED 0x20 /* Dump was filtered as requested */
+
+/* Modifiers to GET request */
+#define NLM_F_ROOT 0x100 /* specify tree root */
+#define NLM_F_MATCH 0x200 /* return all matching */
+#define NLM_F_ATOMIC 0x400 /* atomic GET */
+#define NLM_F_DUMP (NLM_F_ROOT|NLM_F_MATCH)
+
+/* Modifiers to NEW request */
+#define NLM_F_REPLACE 0x100 /* Override existing */
+#define NLM_F_EXCL 0x200 /* Do not touch, if it exists */
+#define NLM_F_CREATE 0x400 /* Create, if it does not exist */
+#define NLM_F_APPEND 0x800 /* Add to end of list */
+
+/* Modifiers to DELETE request */
+#define NLM_F_NONREC 0x100 /* Do not delete recursively */
+
+/* Flags for ACK message */
+#define NLM_F_CAPPED 0x100 /* request was capped */
+#define NLM_F_ACK_TLVS 0x200 /* extended ACK TVLs were included */
+
+/*
+ 4.4BSD ADD NLM_F_CREATE|NLM_F_EXCL
+ 4.4BSD CHANGE NLM_F_REPLACE
+
+ True CHANGE NLM_F_CREATE|NLM_F_REPLACE
+ Append NLM_F_CREATE
+ Check NLM_F_EXCL
+ */
+
+#define NLMSG_ALIGNTO 4U
+#define NLMSG_ALIGN(len) ( ((len)+NLMSG_ALIGNTO-1) & ~(NLMSG_ALIGNTO-1) )
+#define NLMSG_HDRLEN ((int) NLMSG_ALIGN(sizeof(struct nlmsghdr)))
+#define NLMSG_LENGTH(len) ((len) + NLMSG_HDRLEN)
+#define NLMSG_SPACE(len) NLMSG_ALIGN(NLMSG_LENGTH(len))
+#define NLMSG_DATA(nlh) ((void*)(((char*)nlh) + NLMSG_LENGTH(0)))
+#define NLMSG_NEXT(nlh,len) ((len) -= NLMSG_ALIGN((nlh)->nlmsg_len), \
+ (struct nlmsghdr*)(((char*)(nlh)) + NLMSG_ALIGN((nlh)->nlmsg_len)))
+#define NLMSG_OK(nlh,len) ((len) >= (int)sizeof(struct nlmsghdr) && \
+ (nlh)->nlmsg_len >= sizeof(struct nlmsghdr) && \
+ (nlh)->nlmsg_len <= (len))
+#define NLMSG_PAYLOAD(nlh,len) ((nlh)->nlmsg_len - NLMSG_SPACE((len)))
+
+#define NLMSG_NOOP 0x1 /* Nothing. */
+#define NLMSG_ERROR 0x2 /* Error */
+#define NLMSG_DONE 0x3 /* End of a dump */
+#define NLMSG_OVERRUN 0x4 /* Data lost */
+
+#define NLMSG_MIN_TYPE 0x10 /* < 0x10: reserved control messages */
+
+struct nlmsgerr {
+ int error;
+ struct nlmsghdr msg;
+ /*
+ * followed by the message contents unless NETLINK_CAP_ACK was set
+ * or the ACK indicates success (error == 0)
+ * message length is aligned with NLMSG_ALIGN()
+ */
+ /*
+ * followed by TLVs defined in enum nlmsgerr_attrs
+ * if NETLINK_EXT_ACK was set
+ */
+};
+
+/**
+ * enum nlmsgerr_attrs - nlmsgerr attributes
+ * @NLMSGERR_ATTR_UNUSED: unused
+ * @NLMSGERR_ATTR_MSG: error message string (string)
+ * @NLMSGERR_ATTR_OFFS: offset of the invalid attribute in the original
+ * message, counting from the beginning of the header (u32)
+ * @NLMSGERR_ATTR_COOKIE: arbitrary subsystem specific cookie to
+ * be used - in the success case - to identify a created
+ * object or operation or similar (binary)
+ * @__NLMSGERR_ATTR_MAX: number of attributes
+ * @NLMSGERR_ATTR_MAX: highest attribute number
+ */
+enum nlmsgerr_attrs {
+ NLMSGERR_ATTR_UNUSED,
+ NLMSGERR_ATTR_MSG,
+ NLMSGERR_ATTR_OFFS,
+ NLMSGERR_ATTR_COOKIE,
+
+ __NLMSGERR_ATTR_MAX,
+ NLMSGERR_ATTR_MAX = __NLMSGERR_ATTR_MAX - 1
+};
+
+#define NETLINK_ADD_MEMBERSHIP 1
+#define NETLINK_DROP_MEMBERSHIP 2
+#define NETLINK_PKTINFO 3
+#define NETLINK_BROADCAST_ERROR 4
+#define NETLINK_NO_ENOBUFS 5
+#ifndef __KERNEL__
+#define NETLINK_RX_RING 6
+#define NETLINK_TX_RING 7
+#endif
+#define NETLINK_LISTEN_ALL_NSID 8
+#define NETLINK_LIST_MEMBERSHIPS 9
+#define NETLINK_CAP_ACK 10
+#define NETLINK_EXT_ACK 11
+#define NETLINK_GET_STRICT_CHK 12
+
+struct nl_pktinfo {
+ __u32 group;
+};
+
+struct nl_mmap_req {
+ unsigned int nm_block_size;
+ unsigned int nm_block_nr;
+ unsigned int nm_frame_size;
+ unsigned int nm_frame_nr;
+};
+
+struct nl_mmap_hdr {
+ unsigned int nm_status;
+ unsigned int nm_len;
+ __u32 nm_group;
+ /* credentials */
+ __u32 nm_pid;
+ __u32 nm_uid;
+ __u32 nm_gid;
+};
+
+#ifndef __KERNEL__
+enum nl_mmap_status {
+ NL_MMAP_STATUS_UNUSED,
+ NL_MMAP_STATUS_RESERVED,
+ NL_MMAP_STATUS_VALID,
+ NL_MMAP_STATUS_COPY,
+ NL_MMAP_STATUS_SKIP,
+};
+
+#define NL_MMAP_MSG_ALIGNMENT NLMSG_ALIGNTO
+#define NL_MMAP_MSG_ALIGN(sz) __ALIGN_KERNEL(sz, NL_MMAP_MSG_ALIGNMENT)
+#define NL_MMAP_HDRLEN NL_MMAP_MSG_ALIGN(sizeof(struct nl_mmap_hdr))
+#endif
+
+#define NET_MAJOR 36 /* Major 36 is reserved for networking */
+
+enum {
+ NETLINK_UNCONNECTED = 0,
+ NETLINK_CONNECTED,
+};
+
+/*
+ * <------- NLA_HDRLEN ------> <-- NLA_ALIGN(payload)-->
+ * +---------------------+- - -+- - - - - - - - - -+- - -+
+ * | Header | Pad | Payload | Pad |
+ * | (struct nlattr) | ing | | ing |
+ * +---------------------+- - -+- - - - - - - - - -+- - -+
+ * <-------------- nlattr->nla_len -------------->
+ */
+
+struct nlattr {
+ __u16 nla_len;
+ __u16 nla_type;
+};
+
+/*
+ * nla_type (16 bits)
+ * +---+---+-------------------------------+
+ * | N | O | Attribute Type |
+ * +---+---+-------------------------------+
+ * N := Carries nested attributes
+ * O := Payload stored in network byte order
+ *
+ * Note: The N and O flag are mutually exclusive.
+ */
+#define NLA_F_NESTED (1 << 15)
+#define NLA_F_NET_BYTEORDER (1 << 14)
+#define NLA_TYPE_MASK ~(NLA_F_NESTED | NLA_F_NET_BYTEORDER)
+
+#define NLA_ALIGNTO 4
+#define NLA_ALIGN(len) (((len) + NLA_ALIGNTO - 1) & ~(NLA_ALIGNTO - 1))
+#define NLA_HDRLEN ((int) NLA_ALIGN(sizeof(struct nlattr)))
+
+/* Generic 32 bitflags attribute content sent to the kernel.
+ *
+ * The value is a bitmap that defines the values being set
+ * The selector is a bitmask that defines which value is legit
+ *
+ * Examples:
+ * value = 0x0, and selector = 0x1
+ * implies we are selecting bit 1 and we want to set its value to 0.
+ *
+ * value = 0x2, and selector = 0x2
+ * implies we are selecting bit 2 and we want to set its value to 1.
+ *
+ */
+struct nla_bitfield32 {
+ __u32 value;
+ __u32 selector;
+};
+
+#endif /* _UAPI__LINUX_NETLINK_H */
diff --git a/include/uapi/linux/perf_event.h b/include/uapi/linux/perf_event.h
new file mode 100644
index 0000000..ccb7f5d
--- /dev/null
+++ b/include/uapi/linux/perf_event.h
@@ -0,0 +1,1445 @@
+/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
+/*
+ * Performance events:
+ *
+ * Copyright (C) 2008-2009, Thomas Gleixner <tglx@linutronix.de>
+ * Copyright (C) 2008-2011, Red Hat, Inc., Ingo Molnar
+ * Copyright (C) 2008-2011, Red Hat, Inc., Peter Zijlstra
+ *
+ * Data type definitions, declarations, prototypes.
+ *
+ * Started by: Thomas Gleixner and Ingo Molnar
+ *
+ * For licencing details see kernel-base/COPYING
+ */
+#ifndef _UAPI_LINUX_PERF_EVENT_H
+#define _UAPI_LINUX_PERF_EVENT_H
+
+#include <linux/types.h>
+#include <linux/ioctl.h>
+#include <asm/byteorder.h>
+
+/*
+ * User-space ABI bits:
+ */
+
+/*
+ * attr.type
+ */
+enum perf_type_id {
+ PERF_TYPE_HARDWARE = 0,
+ PERF_TYPE_SOFTWARE = 1,
+ PERF_TYPE_TRACEPOINT = 2,
+ PERF_TYPE_HW_CACHE = 3,
+ PERF_TYPE_RAW = 4,
+ PERF_TYPE_BREAKPOINT = 5,
+
+ PERF_TYPE_MAX, /* non-ABI */
+};
+
+/*
+ * attr.config layout for type PERF_TYPE_HARDWARE and PERF_TYPE_HW_CACHE
+ * PERF_TYPE_HARDWARE: 0xEEEEEEEE000000AA
+ * AA: hardware event ID
+ * EEEEEEEE: PMU type ID
+ * PERF_TYPE_HW_CACHE: 0xEEEEEEEE00DDCCBB
+ * BB: hardware cache ID
+ * CC: hardware cache op ID
+ * DD: hardware cache op result ID
+ * EEEEEEEE: PMU type ID
+ * If the PMU type ID is 0, the PERF_TYPE_RAW will be applied.
+ */
+#define PERF_PMU_TYPE_SHIFT 32
+#define PERF_HW_EVENT_MASK 0xffffffff
+
+/*
+ * Generalized performance event event_id types, used by the
+ * attr.event_id parameter of the sys_perf_event_open()
+ * syscall:
+ */
+enum perf_hw_id {
+ /*
+ * Common hardware events, generalized by the kernel:
+ */
+ PERF_COUNT_HW_CPU_CYCLES = 0,
+ PERF_COUNT_HW_INSTRUCTIONS = 1,
+ PERF_COUNT_HW_CACHE_REFERENCES = 2,
+ PERF_COUNT_HW_CACHE_MISSES = 3,
+ PERF_COUNT_HW_BRANCH_INSTRUCTIONS = 4,
+ PERF_COUNT_HW_BRANCH_MISSES = 5,
+ PERF_COUNT_HW_BUS_CYCLES = 6,
+ PERF_COUNT_HW_STALLED_CYCLES_FRONTEND = 7,
+ PERF_COUNT_HW_STALLED_CYCLES_BACKEND = 8,
+ PERF_COUNT_HW_REF_CPU_CYCLES = 9,
+
+ PERF_COUNT_HW_MAX, /* non-ABI */
+};
+
+/*
+ * Generalized hardware cache events:
+ *
+ * { L1-D, L1-I, LLC, ITLB, DTLB, BPU, NODE } x
+ * { read, write, prefetch } x
+ * { accesses, misses }
+ */
+enum perf_hw_cache_id {
+ PERF_COUNT_HW_CACHE_L1D = 0,
+ PERF_COUNT_HW_CACHE_L1I = 1,
+ PERF_COUNT_HW_CACHE_LL = 2,
+ PERF_COUNT_HW_CACHE_DTLB = 3,
+ PERF_COUNT_HW_CACHE_ITLB = 4,
+ PERF_COUNT_HW_CACHE_BPU = 5,
+ PERF_COUNT_HW_CACHE_NODE = 6,
+
+ PERF_COUNT_HW_CACHE_MAX, /* non-ABI */
+};
+
+enum perf_hw_cache_op_id {
+ PERF_COUNT_HW_CACHE_OP_READ = 0,
+ PERF_COUNT_HW_CACHE_OP_WRITE = 1,
+ PERF_COUNT_HW_CACHE_OP_PREFETCH = 2,
+
+ PERF_COUNT_HW_CACHE_OP_MAX, /* non-ABI */
+};
+
+enum perf_hw_cache_op_result_id {
+ PERF_COUNT_HW_CACHE_RESULT_ACCESS = 0,
+ PERF_COUNT_HW_CACHE_RESULT_MISS = 1,
+
+ PERF_COUNT_HW_CACHE_RESULT_MAX, /* non-ABI */
+};
+
+/*
+ * Special "software" events provided by the kernel, even if the hardware
+ * does not support performance events. These events measure various
+ * physical and sw events of the kernel (and allow the profiling of them as
+ * well):
+ */
+enum perf_sw_ids {
+ PERF_COUNT_SW_CPU_CLOCK = 0,
+ PERF_COUNT_SW_TASK_CLOCK = 1,
+ PERF_COUNT_SW_PAGE_FAULTS = 2,
+ PERF_COUNT_SW_CONTEXT_SWITCHES = 3,
+ PERF_COUNT_SW_CPU_MIGRATIONS = 4,
+ PERF_COUNT_SW_PAGE_FAULTS_MIN = 5,
+ PERF_COUNT_SW_PAGE_FAULTS_MAJ = 6,
+ PERF_COUNT_SW_ALIGNMENT_FAULTS = 7,
+ PERF_COUNT_SW_EMULATION_FAULTS = 8,
+ PERF_COUNT_SW_DUMMY = 9,
+ PERF_COUNT_SW_BPF_OUTPUT = 10,
+ PERF_COUNT_SW_CGROUP_SWITCHES = 11,
+
+ PERF_COUNT_SW_MAX, /* non-ABI */
+};
+
+/*
+ * Bits that can be set in attr.sample_type to request information
+ * in the overflow packets.
+ */
+enum perf_event_sample_format {
+ PERF_SAMPLE_IP = 1U << 0,
+ PERF_SAMPLE_TID = 1U << 1,
+ PERF_SAMPLE_TIME = 1U << 2,
+ PERF_SAMPLE_ADDR = 1U << 3,
+ PERF_SAMPLE_READ = 1U << 4,
+ PERF_SAMPLE_CALLCHAIN = 1U << 5,
+ PERF_SAMPLE_ID = 1U << 6,
+ PERF_SAMPLE_CPU = 1U << 7,
+ PERF_SAMPLE_PERIOD = 1U << 8,
+ PERF_SAMPLE_STREAM_ID = 1U << 9,
+ PERF_SAMPLE_RAW = 1U << 10,
+ PERF_SAMPLE_BRANCH_STACK = 1U << 11,
+ PERF_SAMPLE_REGS_USER = 1U << 12,
+ PERF_SAMPLE_STACK_USER = 1U << 13,
+ PERF_SAMPLE_WEIGHT = 1U << 14,
+ PERF_SAMPLE_DATA_SRC = 1U << 15,
+ PERF_SAMPLE_IDENTIFIER = 1U << 16,
+ PERF_SAMPLE_TRANSACTION = 1U << 17,
+ PERF_SAMPLE_REGS_INTR = 1U << 18,
+ PERF_SAMPLE_PHYS_ADDR = 1U << 19,
+ PERF_SAMPLE_AUX = 1U << 20,
+ PERF_SAMPLE_CGROUP = 1U << 21,
+ PERF_SAMPLE_DATA_PAGE_SIZE = 1U << 22,
+ PERF_SAMPLE_CODE_PAGE_SIZE = 1U << 23,
+ PERF_SAMPLE_WEIGHT_STRUCT = 1U << 24,
+
+ PERF_SAMPLE_MAX = 1U << 25, /* non-ABI */
+};
+
+#define PERF_SAMPLE_WEIGHT_TYPE (PERF_SAMPLE_WEIGHT | PERF_SAMPLE_WEIGHT_STRUCT)
+/*
+ * values to program into branch_sample_type when PERF_SAMPLE_BRANCH is set
+ *
+ * If the user does not pass priv level information via branch_sample_type,
+ * the kernel uses the event's priv level. Branch and event priv levels do
+ * not have to match. Branch priv level is checked for permissions.
+ *
+ * The branch types can be combined, however BRANCH_ANY covers all types
+ * of branches and therefore it supersedes all the other types.
+ */
+enum perf_branch_sample_type_shift {
+ PERF_SAMPLE_BRANCH_USER_SHIFT = 0, /* user branches */
+ PERF_SAMPLE_BRANCH_KERNEL_SHIFT = 1, /* kernel branches */
+ PERF_SAMPLE_BRANCH_HV_SHIFT = 2, /* hypervisor branches */
+
+ PERF_SAMPLE_BRANCH_ANY_SHIFT = 3, /* any branch types */
+ PERF_SAMPLE_BRANCH_ANY_CALL_SHIFT = 4, /* any call branch */
+ PERF_SAMPLE_BRANCH_ANY_RETURN_SHIFT = 5, /* any return branch */
+ PERF_SAMPLE_BRANCH_IND_CALL_SHIFT = 6, /* indirect calls */
+ PERF_SAMPLE_BRANCH_ABORT_TX_SHIFT = 7, /* transaction aborts */
+ PERF_SAMPLE_BRANCH_IN_TX_SHIFT = 8, /* in transaction */
+ PERF_SAMPLE_BRANCH_NO_TX_SHIFT = 9, /* not in transaction */
+ PERF_SAMPLE_BRANCH_COND_SHIFT = 10, /* conditional branches */
+
+ PERF_SAMPLE_BRANCH_CALL_STACK_SHIFT = 11, /* call/ret stack */
+ PERF_SAMPLE_BRANCH_IND_JUMP_SHIFT = 12, /* indirect jumps */
+ PERF_SAMPLE_BRANCH_CALL_SHIFT = 13, /* direct call */
+
+ PERF_SAMPLE_BRANCH_NO_FLAGS_SHIFT = 14, /* no flags */
+ PERF_SAMPLE_BRANCH_NO_CYCLES_SHIFT = 15, /* no cycles */
+
+ PERF_SAMPLE_BRANCH_TYPE_SAVE_SHIFT = 16, /* save branch type */
+
+ PERF_SAMPLE_BRANCH_HW_INDEX_SHIFT = 17, /* save low level index of raw branch records */
+
+ PERF_SAMPLE_BRANCH_PRIV_SAVE_SHIFT = 18, /* save privilege mode */
+
+ PERF_SAMPLE_BRANCH_MAX_SHIFT /* non-ABI */
+};
+
+enum perf_branch_sample_type {
+ PERF_SAMPLE_BRANCH_USER = 1U << PERF_SAMPLE_BRANCH_USER_SHIFT,
+ PERF_SAMPLE_BRANCH_KERNEL = 1U << PERF_SAMPLE_BRANCH_KERNEL_SHIFT,
+ PERF_SAMPLE_BRANCH_HV = 1U << PERF_SAMPLE_BRANCH_HV_SHIFT,
+
+ PERF_SAMPLE_BRANCH_ANY = 1U << PERF_SAMPLE_BRANCH_ANY_SHIFT,
+ PERF_SAMPLE_BRANCH_ANY_CALL = 1U << PERF_SAMPLE_BRANCH_ANY_CALL_SHIFT,
+ PERF_SAMPLE_BRANCH_ANY_RETURN = 1U << PERF_SAMPLE_BRANCH_ANY_RETURN_SHIFT,
+ PERF_SAMPLE_BRANCH_IND_CALL = 1U << PERF_SAMPLE_BRANCH_IND_CALL_SHIFT,
+ PERF_SAMPLE_BRANCH_ABORT_TX = 1U << PERF_SAMPLE_BRANCH_ABORT_TX_SHIFT,
+ PERF_SAMPLE_BRANCH_IN_TX = 1U << PERF_SAMPLE_BRANCH_IN_TX_SHIFT,
+ PERF_SAMPLE_BRANCH_NO_TX = 1U << PERF_SAMPLE_BRANCH_NO_TX_SHIFT,
+ PERF_SAMPLE_BRANCH_COND = 1U << PERF_SAMPLE_BRANCH_COND_SHIFT,
+
+ PERF_SAMPLE_BRANCH_CALL_STACK = 1U << PERF_SAMPLE_BRANCH_CALL_STACK_SHIFT,
+ PERF_SAMPLE_BRANCH_IND_JUMP = 1U << PERF_SAMPLE_BRANCH_IND_JUMP_SHIFT,
+ PERF_SAMPLE_BRANCH_CALL = 1U << PERF_SAMPLE_BRANCH_CALL_SHIFT,
+
+ PERF_SAMPLE_BRANCH_NO_FLAGS = 1U << PERF_SAMPLE_BRANCH_NO_FLAGS_SHIFT,
+ PERF_SAMPLE_BRANCH_NO_CYCLES = 1U << PERF_SAMPLE_BRANCH_NO_CYCLES_SHIFT,
+
+ PERF_SAMPLE_BRANCH_TYPE_SAVE =
+ 1U << PERF_SAMPLE_BRANCH_TYPE_SAVE_SHIFT,
+
+ PERF_SAMPLE_BRANCH_HW_INDEX = 1U << PERF_SAMPLE_BRANCH_HW_INDEX_SHIFT,
+
+ PERF_SAMPLE_BRANCH_PRIV_SAVE = 1U << PERF_SAMPLE_BRANCH_PRIV_SAVE_SHIFT,
+
+ PERF_SAMPLE_BRANCH_MAX = 1U << PERF_SAMPLE_BRANCH_MAX_SHIFT,
+};
+
+/*
+ * Common flow change classification
+ */
+enum {
+ PERF_BR_UNKNOWN = 0, /* unknown */
+ PERF_BR_COND = 1, /* conditional */
+ PERF_BR_UNCOND = 2, /* unconditional */
+ PERF_BR_IND = 3, /* indirect */
+ PERF_BR_CALL = 4, /* function call */
+ PERF_BR_IND_CALL = 5, /* indirect function call */
+ PERF_BR_RET = 6, /* function return */
+ PERF_BR_SYSCALL = 7, /* syscall */
+ PERF_BR_SYSRET = 8, /* syscall return */
+ PERF_BR_COND_CALL = 9, /* conditional function call */
+ PERF_BR_COND_RET = 10, /* conditional function return */
+ PERF_BR_ERET = 11, /* exception return */
+ PERF_BR_IRQ = 12, /* irq */
+ PERF_BR_SERROR = 13, /* system error */
+ PERF_BR_NO_TX = 14, /* not in transaction */
+ PERF_BR_EXTEND_ABI = 15, /* extend ABI */
+ PERF_BR_MAX,
+};
+
+/*
+ * Common branch speculation outcome classification
+ */
+enum {
+ PERF_BR_SPEC_NA = 0, /* Not available */
+ PERF_BR_SPEC_WRONG_PATH = 1, /* Speculative but on wrong path */
+ PERF_BR_NON_SPEC_CORRECT_PATH = 2, /* Non-speculative but on correct path */
+ PERF_BR_SPEC_CORRECT_PATH = 3, /* Speculative and on correct path */
+ PERF_BR_SPEC_MAX,
+};
+
+enum {
+ PERF_BR_NEW_FAULT_ALGN = 0, /* Alignment fault */
+ PERF_BR_NEW_FAULT_DATA = 1, /* Data fault */
+ PERF_BR_NEW_FAULT_INST = 2, /* Inst fault */
+ PERF_BR_NEW_ARCH_1 = 3, /* Architecture specific */
+ PERF_BR_NEW_ARCH_2 = 4, /* Architecture specific */
+ PERF_BR_NEW_ARCH_3 = 5, /* Architecture specific */
+ PERF_BR_NEW_ARCH_4 = 6, /* Architecture specific */
+ PERF_BR_NEW_ARCH_5 = 7, /* Architecture specific */
+ PERF_BR_NEW_MAX,
+};
+
+enum {
+ PERF_BR_PRIV_UNKNOWN = 0,
+ PERF_BR_PRIV_USER = 1,
+ PERF_BR_PRIV_KERNEL = 2,
+ PERF_BR_PRIV_HV = 3,
+};
+
+#define PERF_BR_ARM64_FIQ PERF_BR_NEW_ARCH_1
+#define PERF_BR_ARM64_DEBUG_HALT PERF_BR_NEW_ARCH_2
+#define PERF_BR_ARM64_DEBUG_EXIT PERF_BR_NEW_ARCH_3
+#define PERF_BR_ARM64_DEBUG_INST PERF_BR_NEW_ARCH_4
+#define PERF_BR_ARM64_DEBUG_DATA PERF_BR_NEW_ARCH_5
+
+#define PERF_SAMPLE_BRANCH_PLM_ALL \
+ (PERF_SAMPLE_BRANCH_USER|\
+ PERF_SAMPLE_BRANCH_KERNEL|\
+ PERF_SAMPLE_BRANCH_HV)
+
+/*
+ * Values to determine ABI of the registers dump.
+ */
+enum perf_sample_regs_abi {
+ PERF_SAMPLE_REGS_ABI_NONE = 0,
+ PERF_SAMPLE_REGS_ABI_32 = 1,
+ PERF_SAMPLE_REGS_ABI_64 = 2,
+};
+
+/*
+ * Values for the memory transaction event qualifier, mostly for
+ * abort events. Multiple bits can be set.
+ */
+enum {
+ PERF_TXN_ELISION = (1 << 0), /* From elision */
+ PERF_TXN_TRANSACTION = (1 << 1), /* From transaction */
+ PERF_TXN_SYNC = (1 << 2), /* Instruction is related */
+ PERF_TXN_ASYNC = (1 << 3), /* Instruction not related */
+ PERF_TXN_RETRY = (1 << 4), /* Retry possible */
+ PERF_TXN_CONFLICT = (1 << 5), /* Conflict abort */
+ PERF_TXN_CAPACITY_WRITE = (1 << 6), /* Capacity write abort */
+ PERF_TXN_CAPACITY_READ = (1 << 7), /* Capacity read abort */
+
+ PERF_TXN_MAX = (1 << 8), /* non-ABI */
+
+ /* bits 32..63 are reserved for the abort code */
+
+ PERF_TXN_ABORT_MASK = (0xffffffffULL << 32),
+ PERF_TXN_ABORT_SHIFT = 32,
+};
+
+/*
+ * The format of the data returned by read() on a perf event fd,
+ * as specified by attr.read_format:
+ *
+ * struct read_format {
+ * { u64 value;
+ * { u64 time_enabled; } && PERF_FORMAT_TOTAL_TIME_ENABLED
+ * { u64 time_running; } && PERF_FORMAT_TOTAL_TIME_RUNNING
+ * { u64 id; } && PERF_FORMAT_ID
+ * { u64 lost; } && PERF_FORMAT_LOST
+ * } && !PERF_FORMAT_GROUP
+ *
+ * { u64 nr;
+ * { u64 time_enabled; } && PERF_FORMAT_TOTAL_TIME_ENABLED
+ * { u64 time_running; } && PERF_FORMAT_TOTAL_TIME_RUNNING
+ * { u64 value;
+ * { u64 id; } && PERF_FORMAT_ID
+ * { u64 lost; } && PERF_FORMAT_LOST
+ * } cntr[nr];
+ * } && PERF_FORMAT_GROUP
+ * };
+ */
+enum perf_event_read_format {
+ PERF_FORMAT_TOTAL_TIME_ENABLED = 1U << 0,
+ PERF_FORMAT_TOTAL_TIME_RUNNING = 1U << 1,
+ PERF_FORMAT_ID = 1U << 2,
+ PERF_FORMAT_GROUP = 1U << 3,
+ PERF_FORMAT_LOST = 1U << 4,
+
+ PERF_FORMAT_MAX = 1U << 5, /* non-ABI */
+};
+
+#define PERF_ATTR_SIZE_VER0 64 /* sizeof first published struct */
+#define PERF_ATTR_SIZE_VER1 72 /* add: config2 */
+#define PERF_ATTR_SIZE_VER2 80 /* add: branch_sample_type */
+#define PERF_ATTR_SIZE_VER3 96 /* add: sample_regs_user */
+ /* add: sample_stack_user */
+#define PERF_ATTR_SIZE_VER4 104 /* add: sample_regs_intr */
+#define PERF_ATTR_SIZE_VER5 112 /* add: aux_watermark */
+#define PERF_ATTR_SIZE_VER6 120 /* add: aux_sample_size */
+#define PERF_ATTR_SIZE_VER7 128 /* add: sig_data */
+
+/*
+ * Hardware event_id to monitor via a performance monitoring event:
+ *
+ * @sample_max_stack: Max number of frame pointers in a callchain,
+ * should be < /proc/sys/kernel/perf_event_max_stack
+ */
+struct perf_event_attr {
+
+ /*
+ * Major type: hardware/software/tracepoint/etc.
+ */
+ __u32 type;
+
+ /*
+ * Size of the attr structure, for fwd/bwd compat.
+ */
+ __u32 size;
+
+ /*
+ * Type specific configuration information.
+ */
+ __u64 config;
+
+ union {
+ __u64 sample_period;
+ __u64 sample_freq;
+ };
+
+ __u64 sample_type;
+ __u64 read_format;
+
+ __u64 disabled : 1, /* off by default */
+ inherit : 1, /* children inherit it */
+ pinned : 1, /* must always be on PMU */
+ exclusive : 1, /* only group on PMU */
+ exclude_user : 1, /* don't count user */
+ exclude_kernel : 1, /* ditto kernel */
+ exclude_hv : 1, /* ditto hypervisor */
+ exclude_idle : 1, /* don't count when idle */
+ mmap : 1, /* include mmap data */
+ comm : 1, /* include comm data */
+ freq : 1, /* use freq, not period */
+ inherit_stat : 1, /* per task counts */
+ enable_on_exec : 1, /* next exec enables */
+ task : 1, /* trace fork/exit */
+ watermark : 1, /* wakeup_watermark */
+ /*
+ * precise_ip:
+ *
+ * 0 - SAMPLE_IP can have arbitrary skid
+ * 1 - SAMPLE_IP must have constant skid
+ * 2 - SAMPLE_IP requested to have 0 skid
+ * 3 - SAMPLE_IP must have 0 skid
+ *
+ * See also PERF_RECORD_MISC_EXACT_IP
+ */
+ precise_ip : 2, /* skid constraint */
+ mmap_data : 1, /* non-exec mmap data */
+ sample_id_all : 1, /* sample_type all events */
+
+ exclude_host : 1, /* don't count in host */
+ exclude_guest : 1, /* don't count in guest */
+
+ exclude_callchain_kernel : 1, /* exclude kernel callchains */
+ exclude_callchain_user : 1, /* exclude user callchains */
+ mmap2 : 1, /* include mmap with inode data */
+ comm_exec : 1, /* flag comm events that are due to an exec */
+ use_clockid : 1, /* use @clockid for time fields */
+ context_switch : 1, /* context switch data */
+ write_backward : 1, /* Write ring buffer from end to beginning */
+ namespaces : 1, /* include namespaces data */
+ ksymbol : 1, /* include ksymbol events */
+ bpf_event : 1, /* include bpf events */
+ aux_output : 1, /* generate AUX records instead of events */
+ cgroup : 1, /* include cgroup events */
+ text_poke : 1, /* include text poke events */
+ build_id : 1, /* use build id in mmap2 events */
+ inherit_thread : 1, /* children only inherit if cloned with CLONE_THREAD */
+ remove_on_exec : 1, /* event is removed from task on exec */
+ sigtrap : 1, /* send synchronous SIGTRAP on event */
+ __reserved_1 : 26;
+
+ union {
+ __u32 wakeup_events; /* wakeup every n events */
+ __u32 wakeup_watermark; /* bytes before wakeup */
+ };
+
+ __u32 bp_type;
+ union {
+ __u64 bp_addr;
+ __u64 kprobe_func; /* for perf_kprobe */
+ __u64 uprobe_path; /* for perf_uprobe */
+ __u64 config1; /* extension of config */
+ };
+ union {
+ __u64 bp_len;
+ __u64 kprobe_addr; /* when kprobe_func == NULL */
+ __u64 probe_offset; /* for perf_[k,u]probe */
+ __u64 config2; /* extension of config1 */
+ };
+ __u64 branch_sample_type; /* enum perf_branch_sample_type */
+
+ /*
+ * Defines set of user regs to dump on samples.
+ * See asm/perf_regs.h for details.
+ */
+ __u64 sample_regs_user;
+
+ /*
+ * Defines size of the user stack to dump on samples.
+ */
+ __u32 sample_stack_user;
+
+ __s32 clockid;
+ /*
+ * Defines set of regs to dump for each sample
+ * state captured on:
+ * - precise = 0: PMU interrupt
+ * - precise > 0: sampled instruction
+ *
+ * See asm/perf_regs.h for details.
+ */
+ __u64 sample_regs_intr;
+
+ /*
+ * Wakeup watermark for AUX area
+ */
+ __u32 aux_watermark;
+ __u16 sample_max_stack;
+ __u16 __reserved_2;
+ __u32 aux_sample_size;
+ __u32 __reserved_3;
+
+ /*
+ * User provided data if sigtrap=1, passed back to user via
+ * siginfo_t::si_perf_data, e.g. to permit user to identify the event.
+ * Note, siginfo_t::si_perf_data is long-sized, and sig_data will be
+ * truncated accordingly on 32 bit architectures.
+ */
+ __u64 sig_data;
+};
+
+/*
+ * Structure used by below PERF_EVENT_IOC_QUERY_BPF command
+ * to query bpf programs attached to the same perf tracepoint
+ * as the given perf event.
+ */
+struct perf_event_query_bpf {
+ /*
+ * The below ids array length
+ */
+ __u32 ids_len;
+ /*
+ * Set by the kernel to indicate the number of
+ * available programs
+ */
+ __u32 prog_cnt;
+ /*
+ * User provided buffer to store program ids
+ */
+ __u32 ids[];
+};
+
+/*
+ * Ioctls that can be done on a perf event fd:
+ */
+#define PERF_EVENT_IOC_ENABLE _IO ('$', 0)
+#define PERF_EVENT_IOC_DISABLE _IO ('$', 1)
+#define PERF_EVENT_IOC_REFRESH _IO ('$', 2)
+#define PERF_EVENT_IOC_RESET _IO ('$', 3)
+#define PERF_EVENT_IOC_PERIOD _IOW('$', 4, __u64)
+#define PERF_EVENT_IOC_SET_OUTPUT _IO ('$', 5)
+#define PERF_EVENT_IOC_SET_FILTER _IOW('$', 6, char *)
+#define PERF_EVENT_IOC_ID _IOR('$', 7, __u64 *)
+#define PERF_EVENT_IOC_SET_BPF _IOW('$', 8, __u32)
+#define PERF_EVENT_IOC_PAUSE_OUTPUT _IOW('$', 9, __u32)
+#define PERF_EVENT_IOC_QUERY_BPF _IOWR('$', 10, struct perf_event_query_bpf *)
+#define PERF_EVENT_IOC_MODIFY_ATTRIBUTES _IOW('$', 11, struct perf_event_attr *)
+
+enum perf_event_ioc_flags {
+ PERF_IOC_FLAG_GROUP = 1U << 0,
+};
+
+/*
+ * Structure of the page that can be mapped via mmap
+ */
+struct perf_event_mmap_page {
+ __u32 version; /* version number of this structure */
+ __u32 compat_version; /* lowest version this is compat with */
+
+ /*
+ * Bits needed to read the hw events in user-space.
+ *
+ * u32 seq, time_mult, time_shift, index, width;
+ * u64 count, enabled, running;
+ * u64 cyc, time_offset;
+ * s64 pmc = 0;
+ *
+ * do {
+ * seq = pc->lock;
+ * barrier()
+ *
+ * enabled = pc->time_enabled;
+ * running = pc->time_running;
+ *
+ * if (pc->cap_usr_time && enabled != running) {
+ * cyc = rdtsc();
+ * time_offset = pc->time_offset;
+ * time_mult = pc->time_mult;
+ * time_shift = pc->time_shift;
+ * }
+ *
+ * index = pc->index;
+ * count = pc->offset;
+ * if (pc->cap_user_rdpmc && index) {
+ * width = pc->pmc_width;
+ * pmc = rdpmc(index - 1);
+ * }
+ *
+ * barrier();
+ * } while (pc->lock != seq);
+ *
+ * NOTE: for obvious reason this only works on self-monitoring
+ * processes.
+ */
+ __u32 lock; /* seqlock for synchronization */
+ __u32 index; /* hardware event identifier */
+ __s64 offset; /* add to hardware event value */
+ __u64 time_enabled; /* time event active */
+ __u64 time_running; /* time event on cpu */
+ union {
+ __u64 capabilities;
+ struct {
+ __u64 cap_bit0 : 1, /* Always 0, deprecated, see commit 860f085b74e9 */
+ cap_bit0_is_deprecated : 1, /* Always 1, signals that bit 0 is zero */
+
+ cap_user_rdpmc : 1, /* The RDPMC instruction can be used to read counts */
+ cap_user_time : 1, /* The time_{shift,mult,offset} fields are used */
+ cap_user_time_zero : 1, /* The time_zero field is used */
+ cap_user_time_short : 1, /* the time_{cycle,mask} fields are used */
+ cap_____res : 58;
+ };
+ };
+
+ /*
+ * If cap_user_rdpmc this field provides the bit-width of the value
+ * read using the rdpmc() or equivalent instruction. This can be used
+ * to sign extend the result like:
+ *
+ * pmc <<= 64 - width;
+ * pmc >>= 64 - width; // signed shift right
+ * count += pmc;
+ */
+ __u16 pmc_width;
+
+ /*
+ * If cap_usr_time the below fields can be used to compute the time
+ * delta since time_enabled (in ns) using rdtsc or similar.
+ *
+ * u64 quot, rem;
+ * u64 delta;
+ *
+ * quot = (cyc >> time_shift);
+ * rem = cyc & (((u64)1 << time_shift) - 1);
+ * delta = time_offset + quot * time_mult +
+ * ((rem * time_mult) >> time_shift);
+ *
+ * Where time_offset,time_mult,time_shift and cyc are read in the
+ * seqcount loop described above. This delta can then be added to
+ * enabled and possible running (if index), improving the scaling:
+ *
+ * enabled += delta;
+ * if (index)
+ * running += delta;
+ *
+ * quot = count / running;
+ * rem = count % running;
+ * count = quot * enabled + (rem * enabled) / running;
+ */
+ __u16 time_shift;
+ __u32 time_mult;
+ __u64 time_offset;
+ /*
+ * If cap_usr_time_zero, the hardware clock (e.g. TSC) can be calculated
+ * from sample timestamps.
+ *
+ * time = timestamp - time_zero;
+ * quot = time / time_mult;
+ * rem = time % time_mult;
+ * cyc = (quot << time_shift) + (rem << time_shift) / time_mult;
+ *
+ * And vice versa:
+ *
+ * quot = cyc >> time_shift;
+ * rem = cyc & (((u64)1 << time_shift) - 1);
+ * timestamp = time_zero + quot * time_mult +
+ * ((rem * time_mult) >> time_shift);
+ */
+ __u64 time_zero;
+
+ __u32 size; /* Header size up to __reserved[] fields. */
+ __u32 __reserved_1;
+
+ /*
+ * If cap_usr_time_short, the hardware clock is less than 64bit wide
+ * and we must compute the 'cyc' value, as used by cap_usr_time, as:
+ *
+ * cyc = time_cycles + ((cyc - time_cycles) & time_mask)
+ *
+ * NOTE: this form is explicitly chosen such that cap_usr_time_short
+ * is a correction on top of cap_usr_time, and code that doesn't
+ * know about cap_usr_time_short still works under the assumption
+ * the counter doesn't wrap.
+ */
+ __u64 time_cycles;
+ __u64 time_mask;
+
+ /*
+ * Hole for extension of the self monitor capabilities
+ */
+
+ __u8 __reserved[116*8]; /* align to 1k. */
+
+ /*
+ * Control data for the mmap() data buffer.
+ *
+ * User-space reading the @data_head value should issue an smp_rmb(),
+ * after reading this value.
+ *
+ * When the mapping is PROT_WRITE the @data_tail value should be
+ * written by userspace to reflect the last read data, after issueing
+ * an smp_mb() to separate the data read from the ->data_tail store.
+ * In this case the kernel will not over-write unread data.
+ *
+ * See perf_output_put_handle() for the data ordering.
+ *
+ * data_{offset,size} indicate the location and size of the perf record
+ * buffer within the mmapped area.
+ */
+ __u64 data_head; /* head in the data section */
+ __u64 data_tail; /* user-space written tail */
+ __u64 data_offset; /* where the buffer starts */
+ __u64 data_size; /* data buffer size */
+
+ /*
+ * AUX area is defined by aux_{offset,size} fields that should be set
+ * by the userspace, so that
+ *
+ * aux_offset >= data_offset + data_size
+ *
+ * prior to mmap()ing it. Size of the mmap()ed area should be aux_size.
+ *
+ * Ring buffer pointers aux_{head,tail} have the same semantics as
+ * data_{head,tail} and same ordering rules apply.
+ */
+ __u64 aux_head;
+ __u64 aux_tail;
+ __u64 aux_offset;
+ __u64 aux_size;
+};
+
+/*
+ * The current state of perf_event_header::misc bits usage:
+ * ('|' used bit, '-' unused bit)
+ *
+ * 012 CDEF
+ * |||---------||||
+ *
+ * Where:
+ * 0-2 CPUMODE_MASK
+ *
+ * C PROC_MAP_PARSE_TIMEOUT
+ * D MMAP_DATA / COMM_EXEC / FORK_EXEC / SWITCH_OUT
+ * E MMAP_BUILD_ID / EXACT_IP / SCHED_OUT_PREEMPT
+ * F (reserved)
+ */
+
+#define PERF_RECORD_MISC_CPUMODE_MASK (7 << 0)
+#define PERF_RECORD_MISC_CPUMODE_UNKNOWN (0 << 0)
+#define PERF_RECORD_MISC_KERNEL (1 << 0)
+#define PERF_RECORD_MISC_USER (2 << 0)
+#define PERF_RECORD_MISC_HYPERVISOR (3 << 0)
+#define PERF_RECORD_MISC_GUEST_KERNEL (4 << 0)
+#define PERF_RECORD_MISC_GUEST_USER (5 << 0)
+
+/*
+ * Indicates that /proc/PID/maps parsing are truncated by time out.
+ */
+#define PERF_RECORD_MISC_PROC_MAP_PARSE_TIMEOUT (1 << 12)
+/*
+ * Following PERF_RECORD_MISC_* are used on different
+ * events, so can reuse the same bit position:
+ *
+ * PERF_RECORD_MISC_MMAP_DATA - PERF_RECORD_MMAP* events
+ * PERF_RECORD_MISC_COMM_EXEC - PERF_RECORD_COMM event
+ * PERF_RECORD_MISC_FORK_EXEC - PERF_RECORD_FORK event (perf internal)
+ * PERF_RECORD_MISC_SWITCH_OUT - PERF_RECORD_SWITCH* events
+ */
+#define PERF_RECORD_MISC_MMAP_DATA (1 << 13)
+#define PERF_RECORD_MISC_COMM_EXEC (1 << 13)
+#define PERF_RECORD_MISC_FORK_EXEC (1 << 13)
+#define PERF_RECORD_MISC_SWITCH_OUT (1 << 13)
+/*
+ * These PERF_RECORD_MISC_* flags below are safely reused
+ * for the following events:
+ *
+ * PERF_RECORD_MISC_EXACT_IP - PERF_RECORD_SAMPLE of precise events
+ * PERF_RECORD_MISC_SWITCH_OUT_PREEMPT - PERF_RECORD_SWITCH* events
+ * PERF_RECORD_MISC_MMAP_BUILD_ID - PERF_RECORD_MMAP2 event
+ *
+ *
+ * PERF_RECORD_MISC_EXACT_IP:
+ * Indicates that the content of PERF_SAMPLE_IP points to
+ * the actual instruction that triggered the event. See also
+ * perf_event_attr::precise_ip.
+ *
+ * PERF_RECORD_MISC_SWITCH_OUT_PREEMPT:
+ * Indicates that thread was preempted in TASK_RUNNING state.
+ *
+ * PERF_RECORD_MISC_MMAP_BUILD_ID:
+ * Indicates that mmap2 event carries build id data.
+ */
+#define PERF_RECORD_MISC_EXACT_IP (1 << 14)
+#define PERF_RECORD_MISC_SWITCH_OUT_PREEMPT (1 << 14)
+#define PERF_RECORD_MISC_MMAP_BUILD_ID (1 << 14)
+/*
+ * Reserve the last bit to indicate some extended misc field
+ */
+#define PERF_RECORD_MISC_EXT_RESERVED (1 << 15)
+
+struct perf_event_header {
+ __u32 type;
+ __u16 misc;
+ __u16 size;
+};
+
+struct perf_ns_link_info {
+ __u64 dev;
+ __u64 ino;
+};
+
+enum {
+ NET_NS_INDEX = 0,
+ UTS_NS_INDEX = 1,
+ IPC_NS_INDEX = 2,
+ PID_NS_INDEX = 3,
+ USER_NS_INDEX = 4,
+ MNT_NS_INDEX = 5,
+ CGROUP_NS_INDEX = 6,
+
+ NR_NAMESPACES, /* number of available namespaces */
+};
+
+enum perf_event_type {
+
+ /*
+ * If perf_event_attr.sample_id_all is set then all event types will
+ * have the sample_type selected fields related to where/when
+ * (identity) an event took place (TID, TIME, ID, STREAM_ID, CPU,
+ * IDENTIFIER) described in PERF_RECORD_SAMPLE below, it will be stashed
+ * just after the perf_event_header and the fields already present for
+ * the existing fields, i.e. at the end of the payload. That way a newer
+ * perf.data file will be supported by older perf tools, with these new
+ * optional fields being ignored.
+ *
+ * struct sample_id {
+ * { u32 pid, tid; } && PERF_SAMPLE_TID
+ * { u64 time; } && PERF_SAMPLE_TIME
+ * { u64 id; } && PERF_SAMPLE_ID
+ * { u64 stream_id;} && PERF_SAMPLE_STREAM_ID
+ * { u32 cpu, res; } && PERF_SAMPLE_CPU
+ * { u64 id; } && PERF_SAMPLE_IDENTIFIER
+ * } && perf_event_attr::sample_id_all
+ *
+ * Note that PERF_SAMPLE_IDENTIFIER duplicates PERF_SAMPLE_ID. The
+ * advantage of PERF_SAMPLE_IDENTIFIER is that its position is fixed
+ * relative to header.size.
+ */
+
+ /*
+ * The MMAP events record the PROT_EXEC mappings so that we can
+ * correlate userspace IPs to code. They have the following structure:
+ *
+ * struct {
+ * struct perf_event_header header;
+ *
+ * u32 pid, tid;
+ * u64 addr;
+ * u64 len;
+ * u64 pgoff;
+ * char filename[];
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_MMAP = 1,
+
+ /*
+ * struct {
+ * struct perf_event_header header;
+ * u64 id;
+ * u64 lost;
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_LOST = 2,
+
+ /*
+ * struct {
+ * struct perf_event_header header;
+ *
+ * u32 pid, tid;
+ * char comm[];
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_COMM = 3,
+
+ /*
+ * struct {
+ * struct perf_event_header header;
+ * u32 pid, ppid;
+ * u32 tid, ptid;
+ * u64 time;
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_EXIT = 4,
+
+ /*
+ * struct {
+ * struct perf_event_header header;
+ * u64 time;
+ * u64 id;
+ * u64 stream_id;
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_THROTTLE = 5,
+ PERF_RECORD_UNTHROTTLE = 6,
+
+ /*
+ * struct {
+ * struct perf_event_header header;
+ * u32 pid, ppid;
+ * u32 tid, ptid;
+ * u64 time;
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_FORK = 7,
+
+ /*
+ * struct {
+ * struct perf_event_header header;
+ * u32 pid, tid;
+ *
+ * struct read_format values;
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_READ = 8,
+
+ /*
+ * struct {
+ * struct perf_event_header header;
+ *
+ * #
+ * # Note that PERF_SAMPLE_IDENTIFIER duplicates PERF_SAMPLE_ID.
+ * # The advantage of PERF_SAMPLE_IDENTIFIER is that its position
+ * # is fixed relative to header.
+ * #
+ *
+ * { u64 id; } && PERF_SAMPLE_IDENTIFIER
+ * { u64 ip; } && PERF_SAMPLE_IP
+ * { u32 pid, tid; } && PERF_SAMPLE_TID
+ * { u64 time; } && PERF_SAMPLE_TIME
+ * { u64 addr; } && PERF_SAMPLE_ADDR
+ * { u64 id; } && PERF_SAMPLE_ID
+ * { u64 stream_id;} && PERF_SAMPLE_STREAM_ID
+ * { u32 cpu, res; } && PERF_SAMPLE_CPU
+ * { u64 period; } && PERF_SAMPLE_PERIOD
+ *
+ * { struct read_format values; } && PERF_SAMPLE_READ
+ *
+ * { u64 nr,
+ * u64 ips[nr]; } && PERF_SAMPLE_CALLCHAIN
+ *
+ * #
+ * # The RAW record below is opaque data wrt the ABI
+ * #
+ * # That is, the ABI doesn't make any promises wrt to
+ * # the stability of its content, it may vary depending
+ * # on event, hardware, kernel version and phase of
+ * # the moon.
+ * #
+ * # In other words, PERF_SAMPLE_RAW contents are not an ABI.
+ * #
+ *
+ * { u32 size;
+ * char data[size];}&& PERF_SAMPLE_RAW
+ *
+ * { u64 nr;
+ * { u64 hw_idx; } && PERF_SAMPLE_BRANCH_HW_INDEX
+ * { u64 from, to, flags } lbr[nr];
+ * } && PERF_SAMPLE_BRANCH_STACK
+ *
+ * { u64 abi; # enum perf_sample_regs_abi
+ * u64 regs[weight(mask)]; } && PERF_SAMPLE_REGS_USER
+ *
+ * { u64 size;
+ * char data[size];
+ * u64 dyn_size; } && PERF_SAMPLE_STACK_USER
+ *
+ * { union perf_sample_weight
+ * {
+ * u64 full; && PERF_SAMPLE_WEIGHT
+ * #if defined(__LITTLE_ENDIAN_BITFIELD)
+ * struct {
+ * u32 var1_dw;
+ * u16 var2_w;
+ * u16 var3_w;
+ * } && PERF_SAMPLE_WEIGHT_STRUCT
+ * #elif defined(__BIG_ENDIAN_BITFIELD)
+ * struct {
+ * u16 var3_w;
+ * u16 var2_w;
+ * u32 var1_dw;
+ * } && PERF_SAMPLE_WEIGHT_STRUCT
+ * #endif
+ * }
+ * }
+ * { u64 data_src; } && PERF_SAMPLE_DATA_SRC
+ * { u64 transaction; } && PERF_SAMPLE_TRANSACTION
+ * { u64 abi; # enum perf_sample_regs_abi
+ * u64 regs[weight(mask)]; } && PERF_SAMPLE_REGS_INTR
+ * { u64 phys_addr;} && PERF_SAMPLE_PHYS_ADDR
+ * { u64 size;
+ * char data[size]; } && PERF_SAMPLE_AUX
+ * { u64 data_page_size;} && PERF_SAMPLE_DATA_PAGE_SIZE
+ * { u64 code_page_size;} && PERF_SAMPLE_CODE_PAGE_SIZE
+ * };
+ */
+ PERF_RECORD_SAMPLE = 9,
+
+ /*
+ * The MMAP2 records are an augmented version of MMAP, they add
+ * maj, min, ino numbers to be used to uniquely identify each mapping
+ *
+ * struct {
+ * struct perf_event_header header;
+ *
+ * u32 pid, tid;
+ * u64 addr;
+ * u64 len;
+ * u64 pgoff;
+ * union {
+ * struct {
+ * u32 maj;
+ * u32 min;
+ * u64 ino;
+ * u64 ino_generation;
+ * };
+ * struct {
+ * u8 build_id_size;
+ * u8 __reserved_1;
+ * u16 __reserved_2;
+ * u8 build_id[20];
+ * };
+ * };
+ * u32 prot, flags;
+ * char filename[];
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_MMAP2 = 10,
+
+ /*
+ * Records that new data landed in the AUX buffer part.
+ *
+ * struct {
+ * struct perf_event_header header;
+ *
+ * u64 aux_offset;
+ * u64 aux_size;
+ * u64 flags;
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_AUX = 11,
+
+ /*
+ * Indicates that instruction trace has started
+ *
+ * struct {
+ * struct perf_event_header header;
+ * u32 pid;
+ * u32 tid;
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_ITRACE_START = 12,
+
+ /*
+ * Records the dropped/lost sample number.
+ *
+ * struct {
+ * struct perf_event_header header;
+ *
+ * u64 lost;
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_LOST_SAMPLES = 13,
+
+ /*
+ * Records a context switch in or out (flagged by
+ * PERF_RECORD_MISC_SWITCH_OUT). See also
+ * PERF_RECORD_SWITCH_CPU_WIDE.
+ *
+ * struct {
+ * struct perf_event_header header;
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_SWITCH = 14,
+
+ /*
+ * CPU-wide version of PERF_RECORD_SWITCH with next_prev_pid and
+ * next_prev_tid that are the next (switching out) or previous
+ * (switching in) pid/tid.
+ *
+ * struct {
+ * struct perf_event_header header;
+ * u32 next_prev_pid;
+ * u32 next_prev_tid;
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_SWITCH_CPU_WIDE = 15,
+
+ /*
+ * struct {
+ * struct perf_event_header header;
+ * u32 pid;
+ * u32 tid;
+ * u64 nr_namespaces;
+ * { u64 dev, inode; } [nr_namespaces];
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_NAMESPACES = 16,
+
+ /*
+ * Record ksymbol register/unregister events:
+ *
+ * struct {
+ * struct perf_event_header header;
+ * u64 addr;
+ * u32 len;
+ * u16 ksym_type;
+ * u16 flags;
+ * char name[];
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_KSYMBOL = 17,
+
+ /*
+ * Record bpf events:
+ * enum perf_bpf_event_type {
+ * PERF_BPF_EVENT_UNKNOWN = 0,
+ * PERF_BPF_EVENT_PROG_LOAD = 1,
+ * PERF_BPF_EVENT_PROG_UNLOAD = 2,
+ * };
+ *
+ * struct {
+ * struct perf_event_header header;
+ * u16 type;
+ * u16 flags;
+ * u32 id;
+ * u8 tag[BPF_TAG_SIZE];
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_BPF_EVENT = 18,
+
+ /*
+ * struct {
+ * struct perf_event_header header;
+ * u64 id;
+ * char path[];
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_CGROUP = 19,
+
+ /*
+ * Records changes to kernel text i.e. self-modified code. 'old_len' is
+ * the number of old bytes, 'new_len' is the number of new bytes. Either
+ * 'old_len' or 'new_len' may be zero to indicate, for example, the
+ * addition or removal of a trampoline. 'bytes' contains the old bytes
+ * followed immediately by the new bytes.
+ *
+ * struct {
+ * struct perf_event_header header;
+ * u64 addr;
+ * u16 old_len;
+ * u16 new_len;
+ * u8 bytes[];
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_TEXT_POKE = 20,
+
+ /*
+ * Data written to the AUX area by hardware due to aux_output, may need
+ * to be matched to the event by an architecture-specific hardware ID.
+ * This records the hardware ID, but requires sample_id to provide the
+ * event ID. e.g. Intel PT uses this record to disambiguate PEBS-via-PT
+ * records from multiple events.
+ *
+ * struct {
+ * struct perf_event_header header;
+ * u64 hw_id;
+ * struct sample_id sample_id;
+ * };
+ */
+ PERF_RECORD_AUX_OUTPUT_HW_ID = 21,
+
+ PERF_RECORD_MAX, /* non-ABI */
+};
+
+enum perf_record_ksymbol_type {
+ PERF_RECORD_KSYMBOL_TYPE_UNKNOWN = 0,
+ PERF_RECORD_KSYMBOL_TYPE_BPF = 1,
+ /*
+ * Out of line code such as kprobe-replaced instructions or optimized
+ * kprobes or ftrace trampolines.
+ */
+ PERF_RECORD_KSYMBOL_TYPE_OOL = 2,
+ PERF_RECORD_KSYMBOL_TYPE_MAX /* non-ABI */
+};
+
+#define PERF_RECORD_KSYMBOL_FLAGS_UNREGISTER (1 << 0)
+
+enum perf_bpf_event_type {
+ PERF_BPF_EVENT_UNKNOWN = 0,
+ PERF_BPF_EVENT_PROG_LOAD = 1,
+ PERF_BPF_EVENT_PROG_UNLOAD = 2,
+ PERF_BPF_EVENT_MAX, /* non-ABI */
+};
+
+#define PERF_MAX_STACK_DEPTH 127
+#define PERF_MAX_CONTEXTS_PER_STACK 8
+
+enum perf_callchain_context {
+ PERF_CONTEXT_HV = (__u64)-32,
+ PERF_CONTEXT_KERNEL = (__u64)-128,
+ PERF_CONTEXT_USER = (__u64)-512,
+
+ PERF_CONTEXT_GUEST = (__u64)-2048,
+ PERF_CONTEXT_GUEST_KERNEL = (__u64)-2176,
+ PERF_CONTEXT_GUEST_USER = (__u64)-2560,
+
+ PERF_CONTEXT_MAX = (__u64)-4095,
+};
+
+/**
+ * PERF_RECORD_AUX::flags bits
+ */
+#define PERF_AUX_FLAG_TRUNCATED 0x01 /* record was truncated to fit */
+#define PERF_AUX_FLAG_OVERWRITE 0x02 /* snapshot from overwrite mode */
+#define PERF_AUX_FLAG_PARTIAL 0x04 /* record contains gaps */
+#define PERF_AUX_FLAG_COLLISION 0x08 /* sample collided with another */
+#define PERF_AUX_FLAG_PMU_FORMAT_TYPE_MASK 0xff00 /* PMU specific trace format type */
+
+/* CoreSight PMU AUX buffer formats */
+#define PERF_AUX_FLAG_CORESIGHT_FORMAT_CORESIGHT 0x0000 /* Default for backward compatibility */
+#define PERF_AUX_FLAG_CORESIGHT_FORMAT_RAW 0x0100 /* Raw format of the source */
+
+#define PERF_FLAG_FD_NO_GROUP (1UL << 0)
+#define PERF_FLAG_FD_OUTPUT (1UL << 1)
+#define PERF_FLAG_PID_CGROUP (1UL << 2) /* pid=cgroup id, per-cpu mode only */
+#define PERF_FLAG_FD_CLOEXEC (1UL << 3) /* O_CLOEXEC */
+
+#if defined(__LITTLE_ENDIAN_BITFIELD)
+union perf_mem_data_src {
+ __u64 val;
+ struct {
+ __u64 mem_op:5, /* type of opcode */
+ mem_lvl:14, /* memory hierarchy level */
+ mem_snoop:5, /* snoop mode */
+ mem_lock:2, /* lock instr */
+ mem_dtlb:7, /* tlb access */
+ mem_lvl_num:4, /* memory hierarchy level number */
+ mem_remote:1, /* remote */
+ mem_snoopx:2, /* snoop mode, ext */
+ mem_blk:3, /* access blocked */
+ mem_hops:3, /* hop level */
+ mem_rsvd:18;
+ };
+};
+#elif defined(__BIG_ENDIAN_BITFIELD)
+union perf_mem_data_src {
+ __u64 val;
+ struct {
+ __u64 mem_rsvd:18,
+ mem_hops:3, /* hop level */
+ mem_blk:3, /* access blocked */
+ mem_snoopx:2, /* snoop mode, ext */
+ mem_remote:1, /* remote */
+ mem_lvl_num:4, /* memory hierarchy level number */
+ mem_dtlb:7, /* tlb access */
+ mem_lock:2, /* lock instr */
+ mem_snoop:5, /* snoop mode */
+ mem_lvl:14, /* memory hierarchy level */
+ mem_op:5; /* type of opcode */
+ };
+};
+#else
+#error "Unknown endianness"
+#endif
+
+/* type of opcode (load/store/prefetch,code) */
+#define PERF_MEM_OP_NA 0x01 /* not available */
+#define PERF_MEM_OP_LOAD 0x02 /* load instruction */
+#define PERF_MEM_OP_STORE 0x04 /* store instruction */
+#define PERF_MEM_OP_PFETCH 0x08 /* prefetch */
+#define PERF_MEM_OP_EXEC 0x10 /* code (execution) */
+#define PERF_MEM_OP_SHIFT 0
+
+/*
+ * PERF_MEM_LVL_* namespace being depricated to some extent in the
+ * favour of newer composite PERF_MEM_{LVLNUM_,REMOTE_,SNOOPX_} fields.
+ * Supporting this namespace inorder to not break defined ABIs.
+ *
+ * memory hierarchy (memory level, hit or miss)
+ */
+#define PERF_MEM_LVL_NA 0x01 /* not available */
+#define PERF_MEM_LVL_HIT 0x02 /* hit level */
+#define PERF_MEM_LVL_MISS 0x04 /* miss level */
+#define PERF_MEM_LVL_L1 0x08 /* L1 */
+#define PERF_MEM_LVL_LFB 0x10 /* Line Fill Buffer */
+#define PERF_MEM_LVL_L2 0x20 /* L2 */
+#define PERF_MEM_LVL_L3 0x40 /* L3 */
+#define PERF_MEM_LVL_LOC_RAM 0x80 /* Local DRAM */
+#define PERF_MEM_LVL_REM_RAM1 0x100 /* Remote DRAM (1 hop) */
+#define PERF_MEM_LVL_REM_RAM2 0x200 /* Remote DRAM (2 hops) */
+#define PERF_MEM_LVL_REM_CCE1 0x400 /* Remote Cache (1 hop) */
+#define PERF_MEM_LVL_REM_CCE2 0x800 /* Remote Cache (2 hops) */
+#define PERF_MEM_LVL_IO 0x1000 /* I/O memory */
+#define PERF_MEM_LVL_UNC 0x2000 /* Uncached memory */
+#define PERF_MEM_LVL_SHIFT 5
+
+#define PERF_MEM_REMOTE_REMOTE 0x01 /* Remote */
+#define PERF_MEM_REMOTE_SHIFT 37
+
+#define PERF_MEM_LVLNUM_L1 0x01 /* L1 */
+#define PERF_MEM_LVLNUM_L2 0x02 /* L2 */
+#define PERF_MEM_LVLNUM_L3 0x03 /* L3 */
+#define PERF_MEM_LVLNUM_L4 0x04 /* L4 */
+/* 5-0x8 available */
+#define PERF_MEM_LVLNUM_CXL 0x09 /* CXL */
+#define PERF_MEM_LVLNUM_IO 0x0a /* I/O */
+#define PERF_MEM_LVLNUM_ANY_CACHE 0x0b /* Any cache */
+#define PERF_MEM_LVLNUM_LFB 0x0c /* LFB */
+#define PERF_MEM_LVLNUM_RAM 0x0d /* RAM */
+#define PERF_MEM_LVLNUM_PMEM 0x0e /* PMEM */
+#define PERF_MEM_LVLNUM_NA 0x0f /* N/A */
+
+#define PERF_MEM_LVLNUM_SHIFT 33
+
+/* snoop mode */
+#define PERF_MEM_SNOOP_NA 0x01 /* not available */
+#define PERF_MEM_SNOOP_NONE 0x02 /* no snoop */
+#define PERF_MEM_SNOOP_HIT 0x04 /* snoop hit */
+#define PERF_MEM_SNOOP_MISS 0x08 /* snoop miss */
+#define PERF_MEM_SNOOP_HITM 0x10 /* snoop hit modified */
+#define PERF_MEM_SNOOP_SHIFT 19
+
+#define PERF_MEM_SNOOPX_FWD 0x01 /* forward */
+#define PERF_MEM_SNOOPX_PEER 0x02 /* xfer from peer */
+#define PERF_MEM_SNOOPX_SHIFT 38
+
+/* locked instruction */
+#define PERF_MEM_LOCK_NA 0x01 /* not available */
+#define PERF_MEM_LOCK_LOCKED 0x02 /* locked transaction */
+#define PERF_MEM_LOCK_SHIFT 24
+
+/* TLB access */
+#define PERF_MEM_TLB_NA 0x01 /* not available */
+#define PERF_MEM_TLB_HIT 0x02 /* hit level */
+#define PERF_MEM_TLB_MISS 0x04 /* miss level */
+#define PERF_MEM_TLB_L1 0x08 /* L1 */
+#define PERF_MEM_TLB_L2 0x10 /* L2 */
+#define PERF_MEM_TLB_WK 0x20 /* Hardware Walker*/
+#define PERF_MEM_TLB_OS 0x40 /* OS fault handler */
+#define PERF_MEM_TLB_SHIFT 26
+
+/* Access blocked */
+#define PERF_MEM_BLK_NA 0x01 /* not available */
+#define PERF_MEM_BLK_DATA 0x02 /* data could not be forwarded */
+#define PERF_MEM_BLK_ADDR 0x04 /* address conflict */
+#define PERF_MEM_BLK_SHIFT 40
+
+/* hop level */
+#define PERF_MEM_HOPS_0 0x01 /* remote core, same node */
+#define PERF_MEM_HOPS_1 0x02 /* remote node, same socket */
+#define PERF_MEM_HOPS_2 0x03 /* remote socket, same board */
+#define PERF_MEM_HOPS_3 0x04 /* remote board */
+/* 5-7 available */
+#define PERF_MEM_HOPS_SHIFT 43
+
+#define PERF_MEM_S(a, s) \
+ (((__u64)PERF_MEM_##a##_##s) << PERF_MEM_##a##_SHIFT)
+
+/*
+ * single taken branch record layout:
+ *
+ * from: source instruction (may not always be a branch insn)
+ * to: branch target
+ * mispred: branch target was mispredicted
+ * predicted: branch target was predicted
+ *
+ * support for mispred, predicted is optional. In case it
+ * is not supported mispred = predicted = 0.
+ *
+ * in_tx: running in a hardware transaction
+ * abort: aborting a hardware transaction
+ * cycles: cycles from last branch (or 0 if not supported)
+ * type: branch type
+ * spec: branch speculation info (or 0 if not supported)
+ */
+struct perf_branch_entry {
+ __u64 from;
+ __u64 to;
+ __u64 mispred:1, /* target mispredicted */
+ predicted:1,/* target predicted */
+ in_tx:1, /* in transaction */
+ abort:1, /* transaction abort */
+ cycles:16, /* cycle count to last branch */
+ type:4, /* branch type */
+ spec:2, /* branch speculation info */
+ new_type:4, /* additional branch type */
+ priv:3, /* privilege level */
+ reserved:31;
+};
+
+union perf_sample_weight {
+ __u64 full;
+#if defined(__LITTLE_ENDIAN_BITFIELD)
+ struct {
+ __u32 var1_dw;
+ __u16 var2_w;
+ __u16 var3_w;
+ };
+#elif defined(__BIG_ENDIAN_BITFIELD)
+ struct {
+ __u16 var3_w;
+ __u16 var2_w;
+ __u32 var1_dw;
+ };
+#else
+#error "Unknown endianness"
+#endif
+};
+
+#endif /* _UAPI_LINUX_PERF_EVENT_H */
diff --git a/include/uapi/linux/pkt_cls.h b/include/uapi/linux/pkt_cls.h
new file mode 100644
index 0000000..3faee01
--- /dev/null
+++ b/include/uapi/linux/pkt_cls.h
@@ -0,0 +1,612 @@
+/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
+#ifndef __LINUX_PKT_CLS_H
+#define __LINUX_PKT_CLS_H
+
+#include <linux/types.h>
+#include <linux/pkt_sched.h>
+
+#define TC_COOKIE_MAX_SIZE 16
+
+/* Action attributes */
+enum {
+ TCA_ACT_UNSPEC,
+ TCA_ACT_KIND,
+ TCA_ACT_OPTIONS,
+ TCA_ACT_INDEX,
+ TCA_ACT_STATS,
+ TCA_ACT_PAD,
+ TCA_ACT_COOKIE,
+ __TCA_ACT_MAX
+};
+
+#define TCA_ACT_MAX __TCA_ACT_MAX
+#define TCA_OLD_COMPAT (TCA_ACT_MAX+1)
+#define TCA_ACT_MAX_PRIO 32
+#define TCA_ACT_BIND 1
+#define TCA_ACT_NOBIND 0
+#define TCA_ACT_UNBIND 1
+#define TCA_ACT_NOUNBIND 0
+#define TCA_ACT_REPLACE 1
+#define TCA_ACT_NOREPLACE 0
+
+#define TC_ACT_UNSPEC (-1)
+#define TC_ACT_OK 0
+#define TC_ACT_RECLASSIFY 1
+#define TC_ACT_SHOT 2
+#define TC_ACT_PIPE 3
+#define TC_ACT_STOLEN 4
+#define TC_ACT_QUEUED 5
+#define TC_ACT_REPEAT 6
+#define TC_ACT_REDIRECT 7
+#define TC_ACT_TRAP 8 /* For hw path, this means "trap to cpu"
+ * and don't further process the frame
+ * in hardware. For sw path, this is
+ * equivalent of TC_ACT_STOLEN - drop
+ * the skb and act like everything
+ * is alright.
+ */
+#define TC_ACT_VALUE_MAX TC_ACT_TRAP
+
+/* There is a special kind of actions called "extended actions",
+ * which need a value parameter. These have a local opcode located in
+ * the highest nibble, starting from 1. The rest of the bits
+ * are used to carry the value. These two parts together make
+ * a combined opcode.
+ */
+#define __TC_ACT_EXT_SHIFT 28
+#define __TC_ACT_EXT(local) ((local) << __TC_ACT_EXT_SHIFT)
+#define TC_ACT_EXT_VAL_MASK ((1 << __TC_ACT_EXT_SHIFT) - 1)
+#define TC_ACT_EXT_OPCODE(combined) ((combined) & (~TC_ACT_EXT_VAL_MASK))
+#define TC_ACT_EXT_CMP(combined, opcode) (TC_ACT_EXT_OPCODE(combined) == opcode)
+
+#define TC_ACT_JUMP __TC_ACT_EXT(1)
+#define TC_ACT_GOTO_CHAIN __TC_ACT_EXT(2)
+#define TC_ACT_EXT_OPCODE_MAX TC_ACT_GOTO_CHAIN
+
+/* Action type identifiers*/
+enum {
+ TCA_ID_UNSPEC=0,
+ TCA_ID_POLICE=1,
+ /* other actions go here */
+ __TCA_ID_MAX=255
+};
+
+#define TCA_ID_MAX __TCA_ID_MAX
+
+struct tc_police {
+ __u32 index;
+ int action;
+#define TC_POLICE_UNSPEC TC_ACT_UNSPEC
+#define TC_POLICE_OK TC_ACT_OK
+#define TC_POLICE_RECLASSIFY TC_ACT_RECLASSIFY
+#define TC_POLICE_SHOT TC_ACT_SHOT
+#define TC_POLICE_PIPE TC_ACT_PIPE
+
+ __u32 limit;
+ __u32 burst;
+ __u32 mtu;
+ struct tc_ratespec rate;
+ struct tc_ratespec peakrate;
+ int refcnt;
+ int bindcnt;
+ __u32 capab;
+};
+
+struct tcf_t {
+ __u64 install;
+ __u64 lastuse;
+ __u64 expires;
+ __u64 firstuse;
+};
+
+struct tc_cnt {
+ int refcnt;
+ int bindcnt;
+};
+
+#define tc_gen \
+ __u32 index; \
+ __u32 capab; \
+ int action; \
+ int refcnt; \
+ int bindcnt
+
+enum {
+ TCA_POLICE_UNSPEC,
+ TCA_POLICE_TBF,
+ TCA_POLICE_RATE,
+ TCA_POLICE_PEAKRATE,
+ TCA_POLICE_AVRATE,
+ TCA_POLICE_RESULT,
+ TCA_POLICE_TM,
+ TCA_POLICE_PAD,
+ __TCA_POLICE_MAX
+#define TCA_POLICE_RESULT TCA_POLICE_RESULT
+};
+
+#define TCA_POLICE_MAX (__TCA_POLICE_MAX - 1)
+
+/* tca flags definitions */
+#define TCA_CLS_FLAGS_SKIP_HW (1 << 0) /* don't offload filter to HW */
+#define TCA_CLS_FLAGS_SKIP_SW (1 << 1) /* don't use filter in SW */
+#define TCA_CLS_FLAGS_IN_HW (1 << 2) /* filter is offloaded to HW */
+#define TCA_CLS_FLAGS_NOT_IN_HW (1 << 3) /* filter isn't offloaded to HW */
+#define TCA_CLS_FLAGS_VERBOSE (1 << 4) /* verbose logging */
+
+/* U32 filters */
+
+#define TC_U32_HTID(h) ((h)&0xFFF00000)
+#define TC_U32_USERHTID(h) (TC_U32_HTID(h)>>20)
+#define TC_U32_HASH(h) (((h)>>12)&0xFF)
+#define TC_U32_NODE(h) ((h)&0xFFF)
+#define TC_U32_KEY(h) ((h)&0xFFFFF)
+#define TC_U32_UNSPEC 0
+#define TC_U32_ROOT (0xFFF00000)
+
+enum {
+ TCA_U32_UNSPEC,
+ TCA_U32_CLASSID,
+ TCA_U32_HASH,
+ TCA_U32_LINK,
+ TCA_U32_DIVISOR,
+ TCA_U32_SEL,
+ TCA_U32_POLICE,
+ TCA_U32_ACT,
+ TCA_U32_INDEV,
+ TCA_U32_PCNT,
+ TCA_U32_MARK,
+ TCA_U32_FLAGS,
+ TCA_U32_PAD,
+ __TCA_U32_MAX
+};
+
+#define TCA_U32_MAX (__TCA_U32_MAX - 1)
+
+struct tc_u32_key {
+ __be32 mask;
+ __be32 val;
+ int off;
+ int offmask;
+};
+
+struct tc_u32_sel {
+ unsigned char flags;
+ unsigned char offshift;
+ unsigned char nkeys;
+
+ __be16 offmask;
+ __u16 off;
+ short offoff;
+
+ short hoff;
+ __be32 hmask;
+ struct tc_u32_key keys[];
+};
+
+struct tc_u32_mark {
+ __u32 val;
+ __u32 mask;
+ __u32 success;
+};
+
+struct tc_u32_pcnt {
+ __u64 rcnt;
+ __u64 rhit;
+ __u64 kcnts[];
+};
+
+/* Flags */
+
+#define TC_U32_TERMINAL 1
+#define TC_U32_OFFSET 2
+#define TC_U32_VAROFFSET 4
+#define TC_U32_EAT 8
+
+#define TC_U32_MAXDEPTH 8
+
+
+/* RSVP filter */
+
+enum {
+ TCA_RSVP_UNSPEC,
+ TCA_RSVP_CLASSID,
+ TCA_RSVP_DST,
+ TCA_RSVP_SRC,
+ TCA_RSVP_PINFO,
+ TCA_RSVP_POLICE,
+ TCA_RSVP_ACT,
+ __TCA_RSVP_MAX
+};
+
+#define TCA_RSVP_MAX (__TCA_RSVP_MAX - 1 )
+
+struct tc_rsvp_gpi {
+ __u32 key;
+ __u32 mask;
+ int offset;
+};
+
+struct tc_rsvp_pinfo {
+ struct tc_rsvp_gpi dpi;
+ struct tc_rsvp_gpi spi;
+ __u8 protocol;
+ __u8 tunnelid;
+ __u8 tunnelhdr;
+ __u8 pad;
+};
+
+/* ROUTE filter */
+
+enum {
+ TCA_ROUTE4_UNSPEC,
+ TCA_ROUTE4_CLASSID,
+ TCA_ROUTE4_TO,
+ TCA_ROUTE4_FROM,
+ TCA_ROUTE4_IIF,
+ TCA_ROUTE4_POLICE,
+ TCA_ROUTE4_ACT,
+ __TCA_ROUTE4_MAX
+};
+
+#define TCA_ROUTE4_MAX (__TCA_ROUTE4_MAX - 1)
+
+
+/* FW filter */
+
+enum {
+ TCA_FW_UNSPEC,
+ TCA_FW_CLASSID,
+ TCA_FW_POLICE,
+ TCA_FW_INDEV,
+ TCA_FW_ACT, /* used by CONFIG_NET_CLS_ACT */
+ TCA_FW_MASK,
+ __TCA_FW_MAX
+};
+
+#define TCA_FW_MAX (__TCA_FW_MAX - 1)
+
+/* TC index filter */
+
+enum {
+ TCA_TCINDEX_UNSPEC,
+ TCA_TCINDEX_HASH,
+ TCA_TCINDEX_MASK,
+ TCA_TCINDEX_SHIFT,
+ TCA_TCINDEX_FALL_THROUGH,
+ TCA_TCINDEX_CLASSID,
+ TCA_TCINDEX_POLICE,
+ TCA_TCINDEX_ACT,
+ __TCA_TCINDEX_MAX
+};
+
+#define TCA_TCINDEX_MAX (__TCA_TCINDEX_MAX - 1)
+
+/* Flow filter */
+
+enum {
+ FLOW_KEY_SRC,
+ FLOW_KEY_DST,
+ FLOW_KEY_PROTO,
+ FLOW_KEY_PROTO_SRC,
+ FLOW_KEY_PROTO_DST,
+ FLOW_KEY_IIF,
+ FLOW_KEY_PRIORITY,
+ FLOW_KEY_MARK,
+ FLOW_KEY_NFCT,
+ FLOW_KEY_NFCT_SRC,
+ FLOW_KEY_NFCT_DST,
+ FLOW_KEY_NFCT_PROTO_SRC,
+ FLOW_KEY_NFCT_PROTO_DST,
+ FLOW_KEY_RTCLASSID,
+ FLOW_KEY_SKUID,
+ FLOW_KEY_SKGID,
+ FLOW_KEY_VLAN_TAG,
+ FLOW_KEY_RXHASH,
+ __FLOW_KEY_MAX,
+};
+
+#define FLOW_KEY_MAX (__FLOW_KEY_MAX - 1)
+
+enum {
+ FLOW_MODE_MAP,
+ FLOW_MODE_HASH,
+};
+
+enum {
+ TCA_FLOW_UNSPEC,
+ TCA_FLOW_KEYS,
+ TCA_FLOW_MODE,
+ TCA_FLOW_BASECLASS,
+ TCA_FLOW_RSHIFT,
+ TCA_FLOW_ADDEND,
+ TCA_FLOW_MASK,
+ TCA_FLOW_XOR,
+ TCA_FLOW_DIVISOR,
+ TCA_FLOW_ACT,
+ TCA_FLOW_POLICE,
+ TCA_FLOW_EMATCHES,
+ TCA_FLOW_PERTURB,
+ __TCA_FLOW_MAX
+};
+
+#define TCA_FLOW_MAX (__TCA_FLOW_MAX - 1)
+
+/* Basic filter */
+
+enum {
+ TCA_BASIC_UNSPEC,
+ TCA_BASIC_CLASSID,
+ TCA_BASIC_EMATCHES,
+ TCA_BASIC_ACT,
+ TCA_BASIC_POLICE,
+ __TCA_BASIC_MAX
+};
+
+#define TCA_BASIC_MAX (__TCA_BASIC_MAX - 1)
+
+
+/* Cgroup classifier */
+
+enum {
+ TCA_CGROUP_UNSPEC,
+ TCA_CGROUP_ACT,
+ TCA_CGROUP_POLICE,
+ TCA_CGROUP_EMATCHES,
+ __TCA_CGROUP_MAX,
+};
+
+#define TCA_CGROUP_MAX (__TCA_CGROUP_MAX - 1)
+
+/* BPF classifier */
+
+#define TCA_BPF_FLAG_ACT_DIRECT (1 << 0)
+
+enum {
+ TCA_BPF_UNSPEC,
+ TCA_BPF_ACT,
+ TCA_BPF_POLICE,
+ TCA_BPF_CLASSID,
+ TCA_BPF_OPS_LEN,
+ TCA_BPF_OPS,
+ TCA_BPF_FD,
+ TCA_BPF_NAME,
+ TCA_BPF_FLAGS,
+ TCA_BPF_FLAGS_GEN,
+ TCA_BPF_TAG,
+ TCA_BPF_ID,
+ __TCA_BPF_MAX,
+};
+
+#define TCA_BPF_MAX (__TCA_BPF_MAX - 1)
+
+/* Flower classifier */
+
+enum {
+ TCA_FLOWER_UNSPEC,
+ TCA_FLOWER_CLASSID,
+ TCA_FLOWER_INDEV,
+ TCA_FLOWER_ACT,
+ TCA_FLOWER_KEY_ETH_DST, /* ETH_ALEN */
+ TCA_FLOWER_KEY_ETH_DST_MASK, /* ETH_ALEN */
+ TCA_FLOWER_KEY_ETH_SRC, /* ETH_ALEN */
+ TCA_FLOWER_KEY_ETH_SRC_MASK, /* ETH_ALEN */
+ TCA_FLOWER_KEY_ETH_TYPE, /* be16 */
+ TCA_FLOWER_KEY_IP_PROTO, /* u8 */
+ TCA_FLOWER_KEY_IPV4_SRC, /* be32 */
+ TCA_FLOWER_KEY_IPV4_SRC_MASK, /* be32 */
+ TCA_FLOWER_KEY_IPV4_DST, /* be32 */
+ TCA_FLOWER_KEY_IPV4_DST_MASK, /* be32 */
+ TCA_FLOWER_KEY_IPV6_SRC, /* struct in6_addr */
+ TCA_FLOWER_KEY_IPV6_SRC_MASK, /* struct in6_addr */
+ TCA_FLOWER_KEY_IPV6_DST, /* struct in6_addr */
+ TCA_FLOWER_KEY_IPV6_DST_MASK, /* struct in6_addr */
+ TCA_FLOWER_KEY_TCP_SRC, /* be16 */
+ TCA_FLOWER_KEY_TCP_DST, /* be16 */
+ TCA_FLOWER_KEY_UDP_SRC, /* be16 */
+ TCA_FLOWER_KEY_UDP_DST, /* be16 */
+
+ TCA_FLOWER_FLAGS,
+ TCA_FLOWER_KEY_VLAN_ID, /* be16 */
+ TCA_FLOWER_KEY_VLAN_PRIO, /* u8 */
+ TCA_FLOWER_KEY_VLAN_ETH_TYPE, /* be16 */
+
+ TCA_FLOWER_KEY_ENC_KEY_ID, /* be32 */
+ TCA_FLOWER_KEY_ENC_IPV4_SRC, /* be32 */
+ TCA_FLOWER_KEY_ENC_IPV4_SRC_MASK,/* be32 */
+ TCA_FLOWER_KEY_ENC_IPV4_DST, /* be32 */
+ TCA_FLOWER_KEY_ENC_IPV4_DST_MASK,/* be32 */
+ TCA_FLOWER_KEY_ENC_IPV6_SRC, /* struct in6_addr */
+ TCA_FLOWER_KEY_ENC_IPV6_SRC_MASK,/* struct in6_addr */
+ TCA_FLOWER_KEY_ENC_IPV6_DST, /* struct in6_addr */
+ TCA_FLOWER_KEY_ENC_IPV6_DST_MASK,/* struct in6_addr */
+
+ TCA_FLOWER_KEY_TCP_SRC_MASK, /* be16 */
+ TCA_FLOWER_KEY_TCP_DST_MASK, /* be16 */
+ TCA_FLOWER_KEY_UDP_SRC_MASK, /* be16 */
+ TCA_FLOWER_KEY_UDP_DST_MASK, /* be16 */
+ TCA_FLOWER_KEY_SCTP_SRC_MASK, /* be16 */
+ TCA_FLOWER_KEY_SCTP_DST_MASK, /* be16 */
+
+ TCA_FLOWER_KEY_SCTP_SRC, /* be16 */
+ TCA_FLOWER_KEY_SCTP_DST, /* be16 */
+
+ TCA_FLOWER_KEY_ENC_UDP_SRC_PORT, /* be16 */
+ TCA_FLOWER_KEY_ENC_UDP_SRC_PORT_MASK, /* be16 */
+ TCA_FLOWER_KEY_ENC_UDP_DST_PORT, /* be16 */
+ TCA_FLOWER_KEY_ENC_UDP_DST_PORT_MASK, /* be16 */
+
+ TCA_FLOWER_KEY_FLAGS, /* be32 */
+ TCA_FLOWER_KEY_FLAGS_MASK, /* be32 */
+
+ TCA_FLOWER_KEY_ICMPV4_CODE, /* u8 */
+ TCA_FLOWER_KEY_ICMPV4_CODE_MASK,/* u8 */
+ TCA_FLOWER_KEY_ICMPV4_TYPE, /* u8 */
+ TCA_FLOWER_KEY_ICMPV4_TYPE_MASK,/* u8 */
+ TCA_FLOWER_KEY_ICMPV6_CODE, /* u8 */
+ TCA_FLOWER_KEY_ICMPV6_CODE_MASK,/* u8 */
+ TCA_FLOWER_KEY_ICMPV6_TYPE, /* u8 */
+ TCA_FLOWER_KEY_ICMPV6_TYPE_MASK,/* u8 */
+
+ TCA_FLOWER_KEY_ARP_SIP, /* be32 */
+ TCA_FLOWER_KEY_ARP_SIP_MASK, /* be32 */
+ TCA_FLOWER_KEY_ARP_TIP, /* be32 */
+ TCA_FLOWER_KEY_ARP_TIP_MASK, /* be32 */
+ TCA_FLOWER_KEY_ARP_OP, /* u8 */
+ TCA_FLOWER_KEY_ARP_OP_MASK, /* u8 */
+ TCA_FLOWER_KEY_ARP_SHA, /* ETH_ALEN */
+ TCA_FLOWER_KEY_ARP_SHA_MASK, /* ETH_ALEN */
+ TCA_FLOWER_KEY_ARP_THA, /* ETH_ALEN */
+ TCA_FLOWER_KEY_ARP_THA_MASK, /* ETH_ALEN */
+
+ TCA_FLOWER_KEY_MPLS_TTL, /* u8 - 8 bits */
+ TCA_FLOWER_KEY_MPLS_BOS, /* u8 - 1 bit */
+ TCA_FLOWER_KEY_MPLS_TC, /* u8 - 3 bits */
+ TCA_FLOWER_KEY_MPLS_LABEL, /* be32 - 20 bits */
+
+ TCA_FLOWER_KEY_TCP_FLAGS, /* be16 */
+ TCA_FLOWER_KEY_TCP_FLAGS_MASK, /* be16 */
+
+ TCA_FLOWER_KEY_IP_TOS, /* u8 */
+ TCA_FLOWER_KEY_IP_TOS_MASK, /* u8 */
+ TCA_FLOWER_KEY_IP_TTL, /* u8 */
+ TCA_FLOWER_KEY_IP_TTL_MASK, /* u8 */
+
+ TCA_FLOWER_KEY_CVLAN_ID, /* be16 */
+ TCA_FLOWER_KEY_CVLAN_PRIO, /* u8 */
+ TCA_FLOWER_KEY_CVLAN_ETH_TYPE, /* be16 */
+
+ TCA_FLOWER_KEY_ENC_IP_TOS, /* u8 */
+ TCA_FLOWER_KEY_ENC_IP_TOS_MASK, /* u8 */
+ TCA_FLOWER_KEY_ENC_IP_TTL, /* u8 */
+ TCA_FLOWER_KEY_ENC_IP_TTL_MASK, /* u8 */
+
+ TCA_FLOWER_KEY_ENC_OPTS,
+ TCA_FLOWER_KEY_ENC_OPTS_MASK,
+
+ TCA_FLOWER_IN_HW_COUNT,
+
+ __TCA_FLOWER_MAX,
+};
+
+#define TCA_FLOWER_MAX (__TCA_FLOWER_MAX - 1)
+
+enum {
+ TCA_FLOWER_KEY_ENC_OPTS_UNSPEC,
+ TCA_FLOWER_KEY_ENC_OPTS_GENEVE, /* Nested
+ * TCA_FLOWER_KEY_ENC_OPT_GENEVE_
+ * attributes
+ */
+ __TCA_FLOWER_KEY_ENC_OPTS_MAX,
+};
+
+#define TCA_FLOWER_KEY_ENC_OPTS_MAX (__TCA_FLOWER_KEY_ENC_OPTS_MAX - 1)
+
+enum {
+ TCA_FLOWER_KEY_ENC_OPT_GENEVE_UNSPEC,
+ TCA_FLOWER_KEY_ENC_OPT_GENEVE_CLASS, /* u16 */
+ TCA_FLOWER_KEY_ENC_OPT_GENEVE_TYPE, /* u8 */
+ TCA_FLOWER_KEY_ENC_OPT_GENEVE_DATA, /* 4 to 128 bytes */
+
+ __TCA_FLOWER_KEY_ENC_OPT_GENEVE_MAX,
+};
+
+#define TCA_FLOWER_KEY_ENC_OPT_GENEVE_MAX \
+ (__TCA_FLOWER_KEY_ENC_OPT_GENEVE_MAX - 1)
+
+enum {
+ TCA_FLOWER_KEY_FLAGS_IS_FRAGMENT = (1 << 0),
+ TCA_FLOWER_KEY_FLAGS_FRAG_IS_FIRST = (1 << 1),
+};
+
+/* Match-all classifier */
+
+enum {
+ TCA_MATCHALL_UNSPEC,
+ TCA_MATCHALL_CLASSID,
+ TCA_MATCHALL_ACT,
+ TCA_MATCHALL_FLAGS,
+ __TCA_MATCHALL_MAX,
+};
+
+#define TCA_MATCHALL_MAX (__TCA_MATCHALL_MAX - 1)
+
+/* Extended Matches */
+
+struct tcf_ematch_tree_hdr {
+ __u16 nmatches;
+ __u16 progid;
+};
+
+enum {
+ TCA_EMATCH_TREE_UNSPEC,
+ TCA_EMATCH_TREE_HDR,
+ TCA_EMATCH_TREE_LIST,
+ __TCA_EMATCH_TREE_MAX
+};
+#define TCA_EMATCH_TREE_MAX (__TCA_EMATCH_TREE_MAX - 1)
+
+struct tcf_ematch_hdr {
+ __u16 matchid;
+ __u16 kind;
+ __u16 flags;
+ __u16 pad; /* currently unused */
+};
+
+/* 0 1
+ * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+ * +-----------------------+-+-+---+
+ * | Unused |S|I| R |
+ * +-----------------------+-+-+---+
+ *
+ * R(2) ::= relation to next ematch
+ * where: 0 0 END (last ematch)
+ * 0 1 AND
+ * 1 0 OR
+ * 1 1 Unused (invalid)
+ * I(1) ::= invert result
+ * S(1) ::= simple payload
+ */
+#define TCF_EM_REL_END 0
+#define TCF_EM_REL_AND (1<<0)
+#define TCF_EM_REL_OR (1<<1)
+#define TCF_EM_INVERT (1<<2)
+#define TCF_EM_SIMPLE (1<<3)
+
+#define TCF_EM_REL_MASK 3
+#define TCF_EM_REL_VALID(v) (((v) & TCF_EM_REL_MASK) != TCF_EM_REL_MASK)
+
+enum {
+ TCF_LAYER_LINK,
+ TCF_LAYER_NETWORK,
+ TCF_LAYER_TRANSPORT,
+ __TCF_LAYER_MAX
+};
+#define TCF_LAYER_MAX (__TCF_LAYER_MAX - 1)
+
+/* Ematch type assignments
+ * 1..32767 Reserved for ematches inside kernel tree
+ * 32768..65535 Free to use, not reliable
+ */
+#define TCF_EM_CONTAINER 0
+#define TCF_EM_CMP 1
+#define TCF_EM_NBYTE 2
+#define TCF_EM_U32 3
+#define TCF_EM_META 4
+#define TCF_EM_TEXT 5
+#define TCF_EM_VLAN 6
+#define TCF_EM_CANID 7
+#define TCF_EM_IPSET 8
+#define TCF_EM_IPT 9
+#define TCF_EM_MAX 9
+
+enum {
+ TCF_EM_PROG_TC
+};
+
+enum {
+ TCF_EM_OPND_EQ,
+ TCF_EM_OPND_GT,
+ TCF_EM_OPND_LT
+};
+
+#endif
diff --git a/include/uapi/linux/pkt_sched.h b/include/uapi/linux/pkt_sched.h
new file mode 100644
index 0000000..5c903ab
--- /dev/null
+++ b/include/uapi/linux/pkt_sched.h
@@ -0,0 +1,1164 @@
+/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
+#ifndef __LINUX_PKT_SCHED_H
+#define __LINUX_PKT_SCHED_H
+
+#include <linux/types.h>
+
+/* Logical priority bands not depending on specific packet scheduler.
+ Every scheduler will map them to real traffic classes, if it has
+ no more precise mechanism to classify packets.
+
+ These numbers have no special meaning, though their coincidence
+ with obsolete IPv6 values is not occasional :-). New IPv6 drafts
+ preferred full anarchy inspired by diffserv group.
+
+ Note: TC_PRIO_BESTEFFORT does not mean that it is the most unhappy
+ class, actually, as rule it will be handled with more care than
+ filler or even bulk.
+ */
+
+#define TC_PRIO_BESTEFFORT 0
+#define TC_PRIO_FILLER 1
+#define TC_PRIO_BULK 2
+#define TC_PRIO_INTERACTIVE_BULK 4
+#define TC_PRIO_INTERACTIVE 6
+#define TC_PRIO_CONTROL 7
+
+#define TC_PRIO_MAX 15
+
+/* Generic queue statistics, available for all the elements.
+ Particular schedulers may have also their private records.
+ */
+
+struct tc_stats {
+ __u64 bytes; /* Number of enqueued bytes */
+ __u32 packets; /* Number of enqueued packets */
+ __u32 drops; /* Packets dropped because of lack of resources */
+ __u32 overlimits; /* Number of throttle events when this
+ * flow goes out of allocated bandwidth */
+ __u32 bps; /* Current flow byte rate */
+ __u32 pps; /* Current flow packet rate */
+ __u32 qlen;
+ __u32 backlog;
+};
+
+struct tc_estimator {
+ signed char interval;
+ unsigned char ewma_log;
+};
+
+/* "Handles"
+ ---------
+
+ All the traffic control objects have 32bit identifiers, or "handles".
+
+ They can be considered as opaque numbers from user API viewpoint,
+ but actually they always consist of two fields: major and
+ minor numbers, which are interpreted by kernel specially,
+ that may be used by applications, though not recommended.
+
+ F.e. qdisc handles always have minor number equal to zero,
+ classes (or flows) have major equal to parent qdisc major, and
+ minor uniquely identifying class inside qdisc.
+
+ Macros to manipulate handles:
+ */
+
+#define TC_H_MAJ_MASK (0xFFFF0000U)
+#define TC_H_MIN_MASK (0x0000FFFFU)
+#define TC_H_MAJ(h) ((h)&TC_H_MAJ_MASK)
+#define TC_H_MIN(h) ((h)&TC_H_MIN_MASK)
+#define TC_H_MAKE(maj,min) (((maj)&TC_H_MAJ_MASK)|((min)&TC_H_MIN_MASK))
+
+#define TC_H_UNSPEC (0U)
+#define TC_H_ROOT (0xFFFFFFFFU)
+#define TC_H_INGRESS (0xFFFFFFF1U)
+#define TC_H_CLSACT TC_H_INGRESS
+
+#define TC_H_MIN_PRIORITY 0xFFE0U
+#define TC_H_MIN_INGRESS 0xFFF2U
+#define TC_H_MIN_EGRESS 0xFFF3U
+
+/* Need to corrospond to iproute2 tc/tc_core.h "enum link_layer" */
+enum tc_link_layer {
+ TC_LINKLAYER_UNAWARE, /* Indicate unaware old iproute2 util */
+ TC_LINKLAYER_ETHERNET,
+ TC_LINKLAYER_ATM,
+};
+#define TC_LINKLAYER_MASK 0x0F /* limit use to lower 4 bits */
+
+struct tc_ratespec {
+ unsigned char cell_log;
+ __u8 linklayer; /* lower 4 bits */
+ unsigned short overhead;
+ short cell_align;
+ unsigned short mpu;
+ __u32 rate;
+};
+
+#define TC_RTAB_SIZE 1024
+
+struct tc_sizespec {
+ unsigned char cell_log;
+ unsigned char size_log;
+ short cell_align;
+ int overhead;
+ unsigned int linklayer;
+ unsigned int mpu;
+ unsigned int mtu;
+ unsigned int tsize;
+};
+
+enum {
+ TCA_STAB_UNSPEC,
+ TCA_STAB_BASE,
+ TCA_STAB_DATA,
+ __TCA_STAB_MAX
+};
+
+#define TCA_STAB_MAX (__TCA_STAB_MAX - 1)
+
+/* FIFO section */
+
+struct tc_fifo_qopt {
+ __u32 limit; /* Queue length: bytes for bfifo, packets for pfifo */
+};
+
+/* SKBPRIO section */
+
+/*
+ * Priorities go from zero to (SKBPRIO_MAX_PRIORITY - 1).
+ * SKBPRIO_MAX_PRIORITY should be at least 64 in order for skbprio to be able
+ * to map one to one the DS field of IPV4 and IPV6 headers.
+ * Memory allocation grows linearly with SKBPRIO_MAX_PRIORITY.
+ */
+
+#define SKBPRIO_MAX_PRIORITY 64
+
+struct tc_skbprio_qopt {
+ __u32 limit; /* Queue length in packets. */
+};
+
+/* PRIO section */
+
+#define TCQ_PRIO_BANDS 16
+#define TCQ_MIN_PRIO_BANDS 2
+
+struct tc_prio_qopt {
+ int bands; /* Number of bands */
+ __u8 priomap[TC_PRIO_MAX+1]; /* Map: logical priority -> PRIO band */
+};
+
+/* MULTIQ section */
+
+struct tc_multiq_qopt {
+ __u16 bands; /* Number of bands */
+ __u16 max_bands; /* Maximum number of queues */
+};
+
+/* PLUG section */
+
+#define TCQ_PLUG_BUFFER 0
+#define TCQ_PLUG_RELEASE_ONE 1
+#define TCQ_PLUG_RELEASE_INDEFINITE 2
+#define TCQ_PLUG_LIMIT 3
+
+struct tc_plug_qopt {
+ /* TCQ_PLUG_BUFFER: Inset a plug into the queue and
+ * buffer any incoming packets
+ * TCQ_PLUG_RELEASE_ONE: Dequeue packets from queue head
+ * to beginning of the next plug.
+ * TCQ_PLUG_RELEASE_INDEFINITE: Dequeue all packets from queue.
+ * Stop buffering packets until the next TCQ_PLUG_BUFFER
+ * command is received (just act as a pass-thru queue).
+ * TCQ_PLUG_LIMIT: Increase/decrease queue size
+ */
+ int action;
+ __u32 limit;
+};
+
+/* TBF section */
+
+struct tc_tbf_qopt {
+ struct tc_ratespec rate;
+ struct tc_ratespec peakrate;
+ __u32 limit;
+ __u32 buffer;
+ __u32 mtu;
+};
+
+enum {
+ TCA_TBF_UNSPEC,
+ TCA_TBF_PARMS,
+ TCA_TBF_RTAB,
+ TCA_TBF_PTAB,
+ TCA_TBF_RATE64,
+ TCA_TBF_PRATE64,
+ TCA_TBF_BURST,
+ TCA_TBF_PBURST,
+ TCA_TBF_PAD,
+ __TCA_TBF_MAX,
+};
+
+#define TCA_TBF_MAX (__TCA_TBF_MAX - 1)
+
+
+/* TEQL section */
+
+/* TEQL does not require any parameters */
+
+/* SFQ section */
+
+struct tc_sfq_qopt {
+ unsigned quantum; /* Bytes per round allocated to flow */
+ int perturb_period; /* Period of hash perturbation */
+ __u32 limit; /* Maximal packets in queue */
+ unsigned divisor; /* Hash divisor */
+ unsigned flows; /* Maximal number of flows */
+};
+
+struct tc_sfqred_stats {
+ __u32 prob_drop; /* Early drops, below max threshold */
+ __u32 forced_drop; /* Early drops, after max threshold */
+ __u32 prob_mark; /* Marked packets, below max threshold */
+ __u32 forced_mark; /* Marked packets, after max threshold */
+ __u32 prob_mark_head; /* Marked packets, below max threshold */
+ __u32 forced_mark_head;/* Marked packets, after max threshold */
+};
+
+struct tc_sfq_qopt_v1 {
+ struct tc_sfq_qopt v0;
+ unsigned int depth; /* max number of packets per flow */
+ unsigned int headdrop;
+/* SFQRED parameters */
+ __u32 limit; /* HARD maximal flow queue length (bytes) */
+ __u32 qth_min; /* Min average length threshold (bytes) */
+ __u32 qth_max; /* Max average length threshold (bytes) */
+ unsigned char Wlog; /* log(W) */
+ unsigned char Plog; /* log(P_max/(qth_max-qth_min)) */
+ unsigned char Scell_log; /* cell size for idle damping */
+ unsigned char flags;
+ __u32 max_P; /* probability, high resolution */
+/* SFQRED stats */
+ struct tc_sfqred_stats stats;
+};
+
+
+struct tc_sfq_xstats {
+ __s32 allot;
+};
+
+/* RED section */
+
+enum {
+ TCA_RED_UNSPEC,
+ TCA_RED_PARMS,
+ TCA_RED_STAB,
+ TCA_RED_MAX_P,
+ __TCA_RED_MAX,
+};
+
+#define TCA_RED_MAX (__TCA_RED_MAX - 1)
+
+struct tc_red_qopt {
+ __u32 limit; /* HARD maximal queue length (bytes) */
+ __u32 qth_min; /* Min average length threshold (bytes) */
+ __u32 qth_max; /* Max average length threshold (bytes) */
+ unsigned char Wlog; /* log(W) */
+ unsigned char Plog; /* log(P_max/(qth_max-qth_min)) */
+ unsigned char Scell_log; /* cell size for idle damping */
+ unsigned char flags;
+#define TC_RED_ECN 1
+#define TC_RED_HARDDROP 2
+#define TC_RED_ADAPTATIVE 4
+};
+
+struct tc_red_xstats {
+ __u32 early; /* Early drops */
+ __u32 pdrop; /* Drops due to queue limits */
+ __u32 other; /* Drops due to drop() calls */
+ __u32 marked; /* Marked packets */
+};
+
+/* GRED section */
+
+#define MAX_DPs 16
+
+enum {
+ TCA_GRED_UNSPEC,
+ TCA_GRED_PARMS,
+ TCA_GRED_STAB,
+ TCA_GRED_DPS,
+ TCA_GRED_MAX_P,
+ TCA_GRED_LIMIT,
+ TCA_GRED_VQ_LIST, /* nested TCA_GRED_VQ_ENTRY */
+ __TCA_GRED_MAX,
+};
+
+#define TCA_GRED_MAX (__TCA_GRED_MAX - 1)
+
+enum {
+ TCA_GRED_VQ_ENTRY_UNSPEC,
+ TCA_GRED_VQ_ENTRY, /* nested TCA_GRED_VQ_* */
+ __TCA_GRED_VQ_ENTRY_MAX,
+};
+#define TCA_GRED_VQ_ENTRY_MAX (__TCA_GRED_VQ_ENTRY_MAX - 1)
+
+enum {
+ TCA_GRED_VQ_UNSPEC,
+ TCA_GRED_VQ_PAD,
+ TCA_GRED_VQ_DP, /* u32 */
+ TCA_GRED_VQ_STAT_BYTES, /* u64 */
+ TCA_GRED_VQ_STAT_PACKETS, /* u32 */
+ TCA_GRED_VQ_STAT_BACKLOG, /* u32 */
+ TCA_GRED_VQ_STAT_PROB_DROP, /* u32 */
+ TCA_GRED_VQ_STAT_PROB_MARK, /* u32 */
+ TCA_GRED_VQ_STAT_FORCED_DROP, /* u32 */
+ TCA_GRED_VQ_STAT_FORCED_MARK, /* u32 */
+ TCA_GRED_VQ_STAT_PDROP, /* u32 */
+ TCA_GRED_VQ_STAT_OTHER, /* u32 */
+ TCA_GRED_VQ_FLAGS, /* u32 */
+ __TCA_GRED_VQ_MAX
+};
+
+#define TCA_GRED_VQ_MAX (__TCA_GRED_VQ_MAX - 1)
+
+struct tc_gred_qopt {
+ __u32 limit; /* HARD maximal queue length (bytes) */
+ __u32 qth_min; /* Min average length threshold (bytes) */
+ __u32 qth_max; /* Max average length threshold (bytes) */
+ __u32 DP; /* up to 2^32 DPs */
+ __u32 backlog;
+ __u32 qave;
+ __u32 forced;
+ __u32 early;
+ __u32 other;
+ __u32 pdrop;
+ __u8 Wlog; /* log(W) */
+ __u8 Plog; /* log(P_max/(qth_max-qth_min)) */
+ __u8 Scell_log; /* cell size for idle damping */
+ __u8 prio; /* prio of this VQ */
+ __u32 packets;
+ __u32 bytesin;
+};
+
+/* gred setup */
+struct tc_gred_sopt {
+ __u32 DPs;
+ __u32 def_DP;
+ __u8 grio;
+ __u8 flags;
+ __u16 pad1;
+};
+
+/* CHOKe section */
+
+enum {
+ TCA_CHOKE_UNSPEC,
+ TCA_CHOKE_PARMS,
+ TCA_CHOKE_STAB,
+ TCA_CHOKE_MAX_P,
+ __TCA_CHOKE_MAX,
+};
+
+#define TCA_CHOKE_MAX (__TCA_CHOKE_MAX - 1)
+
+struct tc_choke_qopt {
+ __u32 limit; /* Hard queue length (packets) */
+ __u32 qth_min; /* Min average threshold (packets) */
+ __u32 qth_max; /* Max average threshold (packets) */
+ unsigned char Wlog; /* log(W) */
+ unsigned char Plog; /* log(P_max/(qth_max-qth_min)) */
+ unsigned char Scell_log; /* cell size for idle damping */
+ unsigned char flags; /* see RED flags */
+};
+
+struct tc_choke_xstats {
+ __u32 early; /* Early drops */
+ __u32 pdrop; /* Drops due to queue limits */
+ __u32 other; /* Drops due to drop() calls */
+ __u32 marked; /* Marked packets */
+ __u32 matched; /* Drops due to flow match */
+};
+
+/* HTB section */
+#define TC_HTB_NUMPRIO 8
+#define TC_HTB_MAXDEPTH 8
+#define TC_HTB_PROTOVER 3 /* the same as HTB and TC's major */
+
+struct tc_htb_opt {
+ struct tc_ratespec rate;
+ struct tc_ratespec ceil;
+ __u32 buffer;
+ __u32 cbuffer;
+ __u32 quantum;
+ __u32 level; /* out only */
+ __u32 prio;
+};
+struct tc_htb_glob {
+ __u32 version; /* to match HTB/TC */
+ __u32 rate2quantum; /* bps->quantum divisor */
+ __u32 defcls; /* default class number */
+ __u32 debug; /* debug flags */
+
+ /* stats */
+ __u32 direct_pkts; /* count of non shaped packets */
+};
+enum {
+ TCA_HTB_UNSPEC,
+ TCA_HTB_PARMS,
+ TCA_HTB_INIT,
+ TCA_HTB_CTAB,
+ TCA_HTB_RTAB,
+ TCA_HTB_DIRECT_QLEN,
+ TCA_HTB_RATE64,
+ TCA_HTB_CEIL64,
+ TCA_HTB_PAD,
+ TCA_HTB_OFFLOAD,
+ __TCA_HTB_MAX,
+};
+
+#define TCA_HTB_MAX (__TCA_HTB_MAX - 1)
+
+struct tc_htb_xstats {
+ __u32 lends;
+ __u32 borrows;
+ __u32 giants; /* unused since 'Make HTB scheduler work with TSO.' */
+ __s32 tokens;
+ __s32 ctokens;
+};
+
+/* HFSC section */
+
+struct tc_hfsc_qopt {
+ __u16 defcls; /* default class */
+};
+
+struct tc_service_curve {
+ __u32 m1; /* slope of the first segment in bps */
+ __u32 d; /* x-projection of the first segment in us */
+ __u32 m2; /* slope of the second segment in bps */
+};
+
+struct tc_hfsc_stats {
+ __u64 work; /* total work done */
+ __u64 rtwork; /* work done by real-time criteria */
+ __u32 period; /* current period */
+ __u32 level; /* class level in hierarchy */
+};
+
+enum {
+ TCA_HFSC_UNSPEC,
+ TCA_HFSC_RSC,
+ TCA_HFSC_FSC,
+ TCA_HFSC_USC,
+ __TCA_HFSC_MAX,
+};
+
+#define TCA_HFSC_MAX (__TCA_HFSC_MAX - 1)
+
+
+/* CBQ section */
+
+#define TC_CBQ_MAXPRIO 8
+#define TC_CBQ_MAXLEVEL 8
+#define TC_CBQ_DEF_EWMA 5
+
+struct tc_cbq_lssopt {
+ unsigned char change;
+ unsigned char flags;
+#define TCF_CBQ_LSS_BOUNDED 1
+#define TCF_CBQ_LSS_ISOLATED 2
+ unsigned char ewma_log;
+ unsigned char level;
+#define TCF_CBQ_LSS_FLAGS 1
+#define TCF_CBQ_LSS_EWMA 2
+#define TCF_CBQ_LSS_MAXIDLE 4
+#define TCF_CBQ_LSS_MINIDLE 8
+#define TCF_CBQ_LSS_OFFTIME 0x10
+#define TCF_CBQ_LSS_AVPKT 0x20
+ __u32 maxidle;
+ __u32 minidle;
+ __u32 offtime;
+ __u32 avpkt;
+};
+
+struct tc_cbq_wrropt {
+ unsigned char flags;
+ unsigned char priority;
+ unsigned char cpriority;
+ unsigned char __reserved;
+ __u32 allot;
+ __u32 weight;
+};
+
+struct tc_cbq_ovl {
+ unsigned char strategy;
+#define TC_CBQ_OVL_CLASSIC 0
+#define TC_CBQ_OVL_DELAY 1
+#define TC_CBQ_OVL_LOWPRIO 2
+#define TC_CBQ_OVL_DROP 3
+#define TC_CBQ_OVL_RCLASSIC 4
+ unsigned char priority2;
+ __u16 pad;
+ __u32 penalty;
+};
+
+struct tc_cbq_police {
+ unsigned char police;
+ unsigned char __res1;
+ unsigned short __res2;
+};
+
+struct tc_cbq_fopt {
+ __u32 split;
+ __u32 defmap;
+ __u32 defchange;
+};
+
+struct tc_cbq_xstats {
+ __u32 borrows;
+ __u32 overactions;
+ __s32 avgidle;
+ __s32 undertime;
+};
+
+enum {
+ TCA_CBQ_UNSPEC,
+ TCA_CBQ_LSSOPT,
+ TCA_CBQ_WRROPT,
+ TCA_CBQ_FOPT,
+ TCA_CBQ_OVL_STRATEGY,
+ TCA_CBQ_RATE,
+ TCA_CBQ_RTAB,
+ TCA_CBQ_POLICE,
+ __TCA_CBQ_MAX,
+};
+
+#define TCA_CBQ_MAX (__TCA_CBQ_MAX - 1)
+
+/* dsmark section */
+
+enum {
+ TCA_DSMARK_UNSPEC,
+ TCA_DSMARK_INDICES,
+ TCA_DSMARK_DEFAULT_INDEX,
+ TCA_DSMARK_SET_TC_INDEX,
+ TCA_DSMARK_MASK,
+ TCA_DSMARK_VALUE,
+ __TCA_DSMARK_MAX,
+};
+
+#define TCA_DSMARK_MAX (__TCA_DSMARK_MAX - 1)
+
+/* ATM section */
+
+enum {
+ TCA_ATM_UNSPEC,
+ TCA_ATM_FD, /* file/socket descriptor */
+ TCA_ATM_PTR, /* pointer to descriptor - later */
+ TCA_ATM_HDR, /* LL header */
+ TCA_ATM_EXCESS, /* excess traffic class (0 for CLP) */
+ TCA_ATM_ADDR, /* PVC address (for output only) */
+ TCA_ATM_STATE, /* VC state (ATM_VS_*; for output only) */
+ __TCA_ATM_MAX,
+};
+
+#define TCA_ATM_MAX (__TCA_ATM_MAX - 1)
+
+/* Network emulator */
+
+enum {
+ TCA_NETEM_UNSPEC,
+ TCA_NETEM_CORR,
+ TCA_NETEM_DELAY_DIST,
+ TCA_NETEM_REORDER,
+ TCA_NETEM_CORRUPT,
+ TCA_NETEM_LOSS,
+ TCA_NETEM_RATE,
+ TCA_NETEM_ECN,
+ TCA_NETEM_RATE64,
+ TCA_NETEM_PAD,
+ TCA_NETEM_LATENCY64,
+ TCA_NETEM_JITTER64,
+ TCA_NETEM_SLOT,
+ TCA_NETEM_SLOT_DIST,
+ __TCA_NETEM_MAX,
+};
+
+#define TCA_NETEM_MAX (__TCA_NETEM_MAX - 1)
+
+struct tc_netem_qopt {
+ __u32 latency; /* added delay (us) */
+ __u32 limit; /* fifo limit (packets) */
+ __u32 loss; /* random packet loss (0=none ~0=100%) */
+ __u32 gap; /* re-ordering gap (0 for none) */
+ __u32 duplicate; /* random packet dup (0=none ~0=100%) */
+ __u32 jitter; /* random jitter in latency (us) */
+};
+
+struct tc_netem_corr {
+ __u32 delay_corr; /* delay correlation */
+ __u32 loss_corr; /* packet loss correlation */
+ __u32 dup_corr; /* duplicate correlation */
+};
+
+struct tc_netem_reorder {
+ __u32 probability;
+ __u32 correlation;
+};
+
+struct tc_netem_corrupt {
+ __u32 probability;
+ __u32 correlation;
+};
+
+struct tc_netem_rate {
+ __u32 rate; /* byte/s */
+ __s32 packet_overhead;
+ __u32 cell_size;
+ __s32 cell_overhead;
+};
+
+struct tc_netem_slot {
+ __s64 min_delay; /* nsec */
+ __s64 max_delay;
+ __s32 max_packets;
+ __s32 max_bytes;
+ __s64 dist_delay; /* nsec */
+ __s64 dist_jitter; /* nsec */
+};
+
+enum {
+ NETEM_LOSS_UNSPEC,
+ NETEM_LOSS_GI, /* General Intuitive - 4 state model */
+ NETEM_LOSS_GE, /* Gilbert Elliot models */
+ __NETEM_LOSS_MAX
+};
+#define NETEM_LOSS_MAX (__NETEM_LOSS_MAX - 1)
+
+/* State transition probabilities for 4 state model */
+struct tc_netem_gimodel {
+ __u32 p13;
+ __u32 p31;
+ __u32 p32;
+ __u32 p14;
+ __u32 p23;
+};
+
+/* Gilbert-Elliot models */
+struct tc_netem_gemodel {
+ __u32 p;
+ __u32 r;
+ __u32 h;
+ __u32 k1;
+};
+
+#define NETEM_DIST_SCALE 8192
+#define NETEM_DIST_MAX 16384
+
+/* DRR */
+
+enum {
+ TCA_DRR_UNSPEC,
+ TCA_DRR_QUANTUM,
+ __TCA_DRR_MAX
+};
+
+#define TCA_DRR_MAX (__TCA_DRR_MAX - 1)
+
+struct tc_drr_stats {
+ __u32 deficit;
+};
+
+/* MQPRIO */
+#define TC_QOPT_BITMASK 15
+#define TC_QOPT_MAX_QUEUE 16
+
+enum {
+ TC_MQPRIO_HW_OFFLOAD_NONE, /* no offload requested */
+ TC_MQPRIO_HW_OFFLOAD_TCS, /* offload TCs, no queue counts */
+ __TC_MQPRIO_HW_OFFLOAD_MAX
+};
+
+#define TC_MQPRIO_HW_OFFLOAD_MAX (__TC_MQPRIO_HW_OFFLOAD_MAX - 1)
+
+enum {
+ TC_MQPRIO_MODE_DCB,
+ TC_MQPRIO_MODE_CHANNEL,
+ __TC_MQPRIO_MODE_MAX
+};
+
+#define __TC_MQPRIO_MODE_MAX (__TC_MQPRIO_MODE_MAX - 1)
+
+enum {
+ TC_MQPRIO_SHAPER_DCB,
+ TC_MQPRIO_SHAPER_BW_RATE, /* Add new shapers below */
+ __TC_MQPRIO_SHAPER_MAX
+};
+
+#define __TC_MQPRIO_SHAPER_MAX (__TC_MQPRIO_SHAPER_MAX - 1)
+
+struct tc_mqprio_qopt {
+ __u8 num_tc;
+ __u8 prio_tc_map[TC_QOPT_BITMASK + 1];
+ __u8 hw;
+ __u16 count[TC_QOPT_MAX_QUEUE];
+ __u16 offset[TC_QOPT_MAX_QUEUE];
+};
+
+#define TC_MQPRIO_F_MODE 0x1
+#define TC_MQPRIO_F_SHAPER 0x2
+#define TC_MQPRIO_F_MIN_RATE 0x4
+#define TC_MQPRIO_F_MAX_RATE 0x8
+
+enum {
+ TCA_MQPRIO_UNSPEC,
+ TCA_MQPRIO_MODE,
+ TCA_MQPRIO_SHAPER,
+ TCA_MQPRIO_MIN_RATE64,
+ TCA_MQPRIO_MAX_RATE64,
+ __TCA_MQPRIO_MAX,
+};
+
+#define TCA_MQPRIO_MAX (__TCA_MQPRIO_MAX - 1)
+
+/* SFB */
+
+enum {
+ TCA_SFB_UNSPEC,
+ TCA_SFB_PARMS,
+ __TCA_SFB_MAX,
+};
+
+#define TCA_SFB_MAX (__TCA_SFB_MAX - 1)
+
+/*
+ * Note: increment, decrement are Q0.16 fixed-point values.
+ */
+struct tc_sfb_qopt {
+ __u32 rehash_interval; /* delay between hash move, in ms */
+ __u32 warmup_time; /* double buffering warmup time in ms (warmup_time < rehash_interval) */
+ __u32 max; /* max len of qlen_min */
+ __u32 bin_size; /* maximum queue length per bin */
+ __u32 increment; /* probability increment, (d1 in Blue) */
+ __u32 decrement; /* probability decrement, (d2 in Blue) */
+ __u32 limit; /* max SFB queue length */
+ __u32 penalty_rate; /* inelastic flows are rate limited to 'rate' pps */
+ __u32 penalty_burst;
+};
+
+struct tc_sfb_xstats {
+ __u32 earlydrop;
+ __u32 penaltydrop;
+ __u32 bucketdrop;
+ __u32 queuedrop;
+ __u32 childdrop; /* drops in child qdisc */
+ __u32 marked;
+ __u32 maxqlen;
+ __u32 maxprob;
+ __u32 avgprob;
+};
+
+#define SFB_MAX_PROB 0xFFFF
+
+/* QFQ */
+enum {
+ TCA_QFQ_UNSPEC,
+ TCA_QFQ_WEIGHT,
+ TCA_QFQ_LMAX,
+ __TCA_QFQ_MAX
+};
+
+#define TCA_QFQ_MAX (__TCA_QFQ_MAX - 1)
+
+struct tc_qfq_stats {
+ __u32 weight;
+ __u32 lmax;
+};
+
+/* CODEL */
+
+enum {
+ TCA_CODEL_UNSPEC,
+ TCA_CODEL_TARGET,
+ TCA_CODEL_LIMIT,
+ TCA_CODEL_INTERVAL,
+ TCA_CODEL_ECN,
+ TCA_CODEL_CE_THRESHOLD,
+ __TCA_CODEL_MAX
+};
+
+#define TCA_CODEL_MAX (__TCA_CODEL_MAX - 1)
+
+struct tc_codel_xstats {
+ __u32 maxpacket; /* largest packet we've seen so far */
+ __u32 count; /* how many drops we've done since the last time we
+ * entered dropping state
+ */
+ __u32 lastcount; /* count at entry to dropping state */
+ __u32 ldelay; /* in-queue delay seen by most recently dequeued packet */
+ __s32 drop_next; /* time to drop next packet */
+ __u32 drop_overlimit; /* number of time max qdisc packet limit was hit */
+ __u32 ecn_mark; /* number of packets we ECN marked instead of dropped */
+ __u32 dropping; /* are we in dropping state ? */
+ __u32 ce_mark; /* number of CE marked packets because of ce_threshold */
+};
+
+/* FQ_CODEL */
+
+enum {
+ TCA_FQ_CODEL_UNSPEC,
+ TCA_FQ_CODEL_TARGET,
+ TCA_FQ_CODEL_LIMIT,
+ TCA_FQ_CODEL_INTERVAL,
+ TCA_FQ_CODEL_ECN,
+ TCA_FQ_CODEL_FLOWS,
+ TCA_FQ_CODEL_QUANTUM,
+ TCA_FQ_CODEL_CE_THRESHOLD,
+ TCA_FQ_CODEL_DROP_BATCH_SIZE,
+ TCA_FQ_CODEL_MEMORY_LIMIT,
+ __TCA_FQ_CODEL_MAX
+};
+
+#define TCA_FQ_CODEL_MAX (__TCA_FQ_CODEL_MAX - 1)
+
+enum {
+ TCA_FQ_CODEL_XSTATS_QDISC,
+ TCA_FQ_CODEL_XSTATS_CLASS,
+};
+
+struct tc_fq_codel_qd_stats {
+ __u32 maxpacket; /* largest packet we've seen so far */
+ __u32 drop_overlimit; /* number of time max qdisc
+ * packet limit was hit
+ */
+ __u32 ecn_mark; /* number of packets we ECN marked
+ * instead of being dropped
+ */
+ __u32 new_flow_count; /* number of time packets
+ * created a 'new flow'
+ */
+ __u32 new_flows_len; /* count of flows in new list */
+ __u32 old_flows_len; /* count of flows in old list */
+ __u32 ce_mark; /* packets above ce_threshold */
+ __u32 memory_usage; /* in bytes */
+ __u32 drop_overmemory;
+};
+
+struct tc_fq_codel_cl_stats {
+ __s32 deficit;
+ __u32 ldelay; /* in-queue delay seen by most recently
+ * dequeued packet
+ */
+ __u32 count;
+ __u32 lastcount;
+ __u32 dropping;
+ __s32 drop_next;
+};
+
+struct tc_fq_codel_xstats {
+ __u32 type;
+ union {
+ struct tc_fq_codel_qd_stats qdisc_stats;
+ struct tc_fq_codel_cl_stats class_stats;
+ };
+};
+
+/* FQ */
+
+enum {
+ TCA_FQ_UNSPEC,
+
+ TCA_FQ_PLIMIT, /* limit of total number of packets in queue */
+
+ TCA_FQ_FLOW_PLIMIT, /* limit of packets per flow */
+
+ TCA_FQ_QUANTUM, /* RR quantum */
+
+ TCA_FQ_INITIAL_QUANTUM, /* RR quantum for new flow */
+
+ TCA_FQ_RATE_ENABLE, /* enable/disable rate limiting */
+
+ TCA_FQ_FLOW_DEFAULT_RATE,/* obsolete, do not use */
+
+ TCA_FQ_FLOW_MAX_RATE, /* per flow max rate */
+
+ TCA_FQ_BUCKETS_LOG, /* log2(number of buckets) */
+
+ TCA_FQ_FLOW_REFILL_DELAY, /* flow credit refill delay in usec */
+
+ TCA_FQ_ORPHAN_MASK, /* mask applied to orphaned skb hashes */
+
+ TCA_FQ_LOW_RATE_THRESHOLD, /* per packet delay under this rate */
+
+ TCA_FQ_CE_THRESHOLD, /* DCTCP-like CE-marking threshold */
+
+ __TCA_FQ_MAX
+};
+
+#define TCA_FQ_MAX (__TCA_FQ_MAX - 1)
+
+struct tc_fq_qd_stats {
+ __u64 gc_flows;
+ __u64 highprio_packets;
+ __u64 tcp_retrans;
+ __u64 throttled;
+ __u64 flows_plimit;
+ __u64 pkts_too_long;
+ __u64 allocation_errors;
+ __s64 time_next_delayed_flow;
+ __u32 flows;
+ __u32 inactive_flows;
+ __u32 throttled_flows;
+ __u32 unthrottle_latency_ns;
+ __u64 ce_mark; /* packets above ce_threshold */
+};
+
+/* Heavy-Hitter Filter */
+
+enum {
+ TCA_HHF_UNSPEC,
+ TCA_HHF_BACKLOG_LIMIT,
+ TCA_HHF_QUANTUM,
+ TCA_HHF_HH_FLOWS_LIMIT,
+ TCA_HHF_RESET_TIMEOUT,
+ TCA_HHF_ADMIT_BYTES,
+ TCA_HHF_EVICT_TIMEOUT,
+ TCA_HHF_NON_HH_WEIGHT,
+ __TCA_HHF_MAX
+};
+
+#define TCA_HHF_MAX (__TCA_HHF_MAX - 1)
+
+struct tc_hhf_xstats {
+ __u32 drop_overlimit; /* number of times max qdisc packet limit
+ * was hit
+ */
+ __u32 hh_overlimit; /* number of times max heavy-hitters was hit */
+ __u32 hh_tot_count; /* number of captured heavy-hitters so far */
+ __u32 hh_cur_count; /* number of current heavy-hitters */
+};
+
+/* PIE */
+enum {
+ TCA_PIE_UNSPEC,
+ TCA_PIE_TARGET,
+ TCA_PIE_LIMIT,
+ TCA_PIE_TUPDATE,
+ TCA_PIE_ALPHA,
+ TCA_PIE_BETA,
+ TCA_PIE_ECN,
+ TCA_PIE_BYTEMODE,
+ __TCA_PIE_MAX
+};
+#define TCA_PIE_MAX (__TCA_PIE_MAX - 1)
+
+struct tc_pie_xstats {
+ __u32 prob; /* current probability */
+ __u32 delay; /* current delay in ms */
+ __u32 avg_dq_rate; /* current average dq_rate in bits/pie_time */
+ __u32 packets_in; /* total number of packets enqueued */
+ __u32 dropped; /* packets dropped due to pie_action */
+ __u32 overlimit; /* dropped due to lack of space in queue */
+ __u32 maxq; /* maximum queue size */
+ __u32 ecn_mark; /* packets marked with ecn*/
+};
+
+/* CBS */
+struct tc_cbs_qopt {
+ __u8 offload;
+ __u8 _pad[3];
+ __s32 hicredit;
+ __s32 locredit;
+ __s32 idleslope;
+ __s32 sendslope;
+};
+
+enum {
+ TCA_CBS_UNSPEC,
+ TCA_CBS_PARMS,
+ __TCA_CBS_MAX,
+};
+
+#define TCA_CBS_MAX (__TCA_CBS_MAX - 1)
+
+
+/* ETF */
+struct tc_etf_qopt {
+ __s32 delta;
+ __s32 clockid;
+ __u32 flags;
+#define TC_ETF_DEADLINE_MODE_ON BIT(0)
+#define TC_ETF_OFFLOAD_ON BIT(1)
+};
+
+enum {
+ TCA_ETF_UNSPEC,
+ TCA_ETF_PARMS,
+ __TCA_ETF_MAX,
+};
+
+#define TCA_ETF_MAX (__TCA_ETF_MAX - 1)
+
+
+/* CAKE */
+enum {
+ TCA_CAKE_UNSPEC,
+ TCA_CAKE_PAD,
+ TCA_CAKE_BASE_RATE64,
+ TCA_CAKE_DIFFSERV_MODE,
+ TCA_CAKE_ATM,
+ TCA_CAKE_FLOW_MODE,
+ TCA_CAKE_OVERHEAD,
+ TCA_CAKE_RTT,
+ TCA_CAKE_TARGET,
+ TCA_CAKE_AUTORATE,
+ TCA_CAKE_MEMORY,
+ TCA_CAKE_NAT,
+ TCA_CAKE_RAW,
+ TCA_CAKE_WASH,
+ TCA_CAKE_MPU,
+ TCA_CAKE_INGRESS,
+ TCA_CAKE_ACK_FILTER,
+ TCA_CAKE_SPLIT_GSO,
+ __TCA_CAKE_MAX
+};
+#define TCA_CAKE_MAX (__TCA_CAKE_MAX - 1)
+
+enum {
+ __TCA_CAKE_STATS_INVALID,
+ TCA_CAKE_STATS_PAD,
+ TCA_CAKE_STATS_CAPACITY_ESTIMATE64,
+ TCA_CAKE_STATS_MEMORY_LIMIT,
+ TCA_CAKE_STATS_MEMORY_USED,
+ TCA_CAKE_STATS_AVG_NETOFF,
+ TCA_CAKE_STATS_MIN_NETLEN,
+ TCA_CAKE_STATS_MAX_NETLEN,
+ TCA_CAKE_STATS_MIN_ADJLEN,
+ TCA_CAKE_STATS_MAX_ADJLEN,
+ TCA_CAKE_STATS_TIN_STATS,
+ TCA_CAKE_STATS_DEFICIT,
+ TCA_CAKE_STATS_COBALT_COUNT,
+ TCA_CAKE_STATS_DROPPING,
+ TCA_CAKE_STATS_DROP_NEXT_US,
+ TCA_CAKE_STATS_P_DROP,
+ TCA_CAKE_STATS_BLUE_TIMER_US,
+ __TCA_CAKE_STATS_MAX
+};
+#define TCA_CAKE_STATS_MAX (__TCA_CAKE_STATS_MAX - 1)
+
+enum {
+ __TCA_CAKE_TIN_STATS_INVALID,
+ TCA_CAKE_TIN_STATS_PAD,
+ TCA_CAKE_TIN_STATS_SENT_PACKETS,
+ TCA_CAKE_TIN_STATS_SENT_BYTES64,
+ TCA_CAKE_TIN_STATS_DROPPED_PACKETS,
+ TCA_CAKE_TIN_STATS_DROPPED_BYTES64,
+ TCA_CAKE_TIN_STATS_ACKS_DROPPED_PACKETS,
+ TCA_CAKE_TIN_STATS_ACKS_DROPPED_BYTES64,
+ TCA_CAKE_TIN_STATS_ECN_MARKED_PACKETS,
+ TCA_CAKE_TIN_STATS_ECN_MARKED_BYTES64,
+ TCA_CAKE_TIN_STATS_BACKLOG_PACKETS,
+ TCA_CAKE_TIN_STATS_BACKLOG_BYTES,
+ TCA_CAKE_TIN_STATS_THRESHOLD_RATE64,
+ TCA_CAKE_TIN_STATS_TARGET_US,
+ TCA_CAKE_TIN_STATS_INTERVAL_US,
+ TCA_CAKE_TIN_STATS_WAY_INDIRECT_HITS,
+ TCA_CAKE_TIN_STATS_WAY_MISSES,
+ TCA_CAKE_TIN_STATS_WAY_COLLISIONS,
+ TCA_CAKE_TIN_STATS_PEAK_DELAY_US,
+ TCA_CAKE_TIN_STATS_AVG_DELAY_US,
+ TCA_CAKE_TIN_STATS_BASE_DELAY_US,
+ TCA_CAKE_TIN_STATS_SPARSE_FLOWS,
+ TCA_CAKE_TIN_STATS_BULK_FLOWS,
+ TCA_CAKE_TIN_STATS_UNRESPONSIVE_FLOWS,
+ TCA_CAKE_TIN_STATS_MAX_SKBLEN,
+ TCA_CAKE_TIN_STATS_FLOW_QUANTUM,
+ __TCA_CAKE_TIN_STATS_MAX
+};
+#define TCA_CAKE_TIN_STATS_MAX (__TCA_CAKE_TIN_STATS_MAX - 1)
+#define TC_CAKE_MAX_TINS (8)
+
+enum {
+ CAKE_FLOW_NONE = 0,
+ CAKE_FLOW_SRC_IP,
+ CAKE_FLOW_DST_IP,
+ CAKE_FLOW_HOSTS, /* = CAKE_FLOW_SRC_IP | CAKE_FLOW_DST_IP */
+ CAKE_FLOW_FLOWS,
+ CAKE_FLOW_DUAL_SRC, /* = CAKE_FLOW_SRC_IP | CAKE_FLOW_FLOWS */
+ CAKE_FLOW_DUAL_DST, /* = CAKE_FLOW_DST_IP | CAKE_FLOW_FLOWS */
+ CAKE_FLOW_TRIPLE, /* = CAKE_FLOW_HOSTS | CAKE_FLOW_FLOWS */
+ CAKE_FLOW_MAX,
+};
+
+enum {
+ CAKE_DIFFSERV_DIFFSERV3 = 0,
+ CAKE_DIFFSERV_DIFFSERV4,
+ CAKE_DIFFSERV_DIFFSERV8,
+ CAKE_DIFFSERV_BESTEFFORT,
+ CAKE_DIFFSERV_PRECEDENCE,
+ CAKE_DIFFSERV_MAX
+};
+
+enum {
+ CAKE_ACK_NONE = 0,
+ CAKE_ACK_FILTER,
+ CAKE_ACK_AGGRESSIVE,
+ CAKE_ACK_MAX
+};
+
+enum {
+ CAKE_ATM_NONE = 0,
+ CAKE_ATM_ATM,
+ CAKE_ATM_PTM,
+ CAKE_ATM_MAX
+};
+
+
+/* TAPRIO */
+enum {
+ TC_TAPRIO_CMD_SET_GATES = 0x00,
+ TC_TAPRIO_CMD_SET_AND_HOLD = 0x01,
+ TC_TAPRIO_CMD_SET_AND_RELEASE = 0x02,
+};
+
+enum {
+ TCA_TAPRIO_SCHED_ENTRY_UNSPEC,
+ TCA_TAPRIO_SCHED_ENTRY_INDEX, /* u32 */
+ TCA_TAPRIO_SCHED_ENTRY_CMD, /* u8 */
+ TCA_TAPRIO_SCHED_ENTRY_GATE_MASK, /* u32 */
+ TCA_TAPRIO_SCHED_ENTRY_INTERVAL, /* u32 */
+ __TCA_TAPRIO_SCHED_ENTRY_MAX,
+};
+#define TCA_TAPRIO_SCHED_ENTRY_MAX (__TCA_TAPRIO_SCHED_ENTRY_MAX - 1)
+
+/* The format for schedule entry list is:
+ * [TCA_TAPRIO_SCHED_ENTRY_LIST]
+ * [TCA_TAPRIO_SCHED_ENTRY]
+ * [TCA_TAPRIO_SCHED_ENTRY_CMD]
+ * [TCA_TAPRIO_SCHED_ENTRY_GATES]
+ * [TCA_TAPRIO_SCHED_ENTRY_INTERVAL]
+ */
+enum {
+ TCA_TAPRIO_SCHED_UNSPEC,
+ TCA_TAPRIO_SCHED_ENTRY,
+ __TCA_TAPRIO_SCHED_MAX,
+};
+
+#define TCA_TAPRIO_SCHED_MAX (__TCA_TAPRIO_SCHED_MAX - 1)
+
+enum {
+ TCA_TAPRIO_ATTR_UNSPEC,
+ TCA_TAPRIO_ATTR_PRIOMAP, /* struct tc_mqprio_qopt */
+ TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST, /* nested of entry */
+ TCA_TAPRIO_ATTR_SCHED_BASE_TIME, /* s64 */
+ TCA_TAPRIO_ATTR_SCHED_SINGLE_ENTRY, /* single entry */
+ TCA_TAPRIO_ATTR_SCHED_CLOCKID, /* s32 */
+ TCA_TAPRIO_PAD,
+ __TCA_TAPRIO_ATTR_MAX,
+};
+
+#define TCA_TAPRIO_ATTR_MAX (__TCA_TAPRIO_ATTR_MAX - 1)
+
+#endif
diff --git a/scripts/build-fuzzers.sh b/scripts/build-fuzzers.sh
new file mode 100755
index 0000000..a704f47
--- /dev/null
+++ b/scripts/build-fuzzers.sh
@@ -0,0 +1,81 @@
+#!/bin/bash
+set -eux
+
+SANITIZER=${SANITIZER:-address}
+flags="-O1 -fno-omit-frame-pointer -g -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITIZER -fsanitize=fuzzer-no-link"
+
+export CC=${CC:-clang}
+export CFLAGS=${CFLAGS:-$flags}
+
+export CXX=${CXX:-clang++}
+export CXXFLAGS=${CXXFLAGS:-$flags}
+
+cd "$(dirname -- "$0")/.."
+
+export OUT=${OUT:-"$(pwd)/out"}
+mkdir -p "$OUT"
+
+export LIB_FUZZING_ENGINE=${LIB_FUZZING_ENGINE:--fsanitize=fuzzer}
+
+# libelf is compiled with _FORTIFY_SOURCE by default and it
+# isn't compatible with MSan. It was borrowed
+# from https://github.com/google/oss-fuzz/pull/7422
+if [[ "$SANITIZER" == memory ]]; then
+ CFLAGS+=" -U_FORTIFY_SOURCE"
+ CXXFLAGS+=" -U_FORTIFY_SOURCE"
+fi
+
+# The alignment check is turned off by default on OSS-Fuzz/CFLite so it should be
+# turned on explicitly there. It was borrowed from
+# https://github.com/google/oss-fuzz/pull/7092
+if [[ "$SANITIZER" == undefined ]]; then
+ additional_ubsan_checks=alignment
+ UBSAN_FLAGS="-fsanitize=$additional_ubsan_checks -fno-sanitize-recover=$additional_ubsan_checks"
+ CFLAGS+=" $UBSAN_FLAGS"
+ CXXFLAGS+=" $UBSAN_FLAGS"
+fi
+
+# Ideally libbelf should be built using release tarballs available
+# at https://sourceware.org/elfutils/ftp/. Unfortunately sometimes they
+# fail to compile (for example, elfutils-0.185 fails to compile with LDFLAGS enabled
+# due to https://bugs.gentoo.org/794601) so let's just point the script to
+# commits referring to versions of libelf that actually can be built
+rm -rf elfutils
+git clone git://sourceware.org/git/elfutils.git
+(
+cd elfutils
+git checkout e9f3045caa5c4498f371383e5519151942d48b6d
+git log --oneline -1
+
+# ASan isn't compatible with -Wl,--no-undefined: https://github.com/google/sanitizers/issues/380
+find -name Makefile.am | xargs sed -i 's/,--no-undefined//'
+
+# ASan isn't compatible with -Wl,-z,defs either:
+# https://clang.llvm.org/docs/AddressSanitizer.html#usage
+sed -i 's/^\(ZDEFS_LDFLAGS=\).*/\1/' configure.ac
+
+if [[ "$SANITIZER" == undefined ]]; then
+ # That's basicaly what --enable-sanitize-undefined does to turn off unaligned access
+ # elfutils heavily relies on on i386/x86_64 but without changing compiler flags along the way
+ sed -i 's/\(check_undefined_val\)=[0-9]/\1=1/' configure.ac
+fi
+
+autoreconf -i -f
+if ! ./configure --enable-maintainer-mode --disable-debuginfod --disable-libdebuginfod \
+ CC="$CC" CFLAGS="-Wno-error $CFLAGS" CXX="$CXX" CXXFLAGS="-Wno-error $CXXFLAGS" LDFLAGS="$CFLAGS"; then
+ cat config.log
+ exit 1
+fi
+
+make -C config -j$(nproc) V=1
+make -C lib -j$(nproc) V=1
+make -C libelf -j$(nproc) V=1
+)
+
+make -C src BUILD_STATIC_ONLY=y V=1 clean
+make -C src -j$(nproc) CFLAGS="-I$(pwd)/elfutils/libelf $CFLAGS" BUILD_STATIC_ONLY=y V=1
+
+$CC $CFLAGS -Isrc -Iinclude -Iinclude/uapi -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -c fuzz/bpf-object-fuzzer.c -o bpf-object-fuzzer.o
+$CXX $CXXFLAGS $LIB_FUZZING_ENGINE bpf-object-fuzzer.o src/libbpf.a "$(pwd)/elfutils/libelf/libelf.a" -l:libz.a -o "$OUT/bpf-object-fuzzer"
+
+cp fuzz/bpf-object-fuzzer_seed_corpus.zip "$OUT"
diff --git a/scripts/coverity.sh b/scripts/coverity.sh
new file mode 100755
index 0000000..99e4809
--- /dev/null
+++ b/scripts/coverity.sh
@@ -0,0 +1,105 @@
+#!/bin/bash
+# Taken from: https://scan.coverity.com/scripts/travisci_build_coverity_scan.sh
+# Local changes are annotated with "#[local]"
+
+set -e
+
+# Environment check
+echo -e "\033[33;1mNote: COVERITY_SCAN_PROJECT_NAME and COVERITY_SCAN_TOKEN are available on Project Settings page on scan.coverity.com\033[0m"
+[ -z "$COVERITY_SCAN_PROJECT_NAME" ] && echo "ERROR: COVERITY_SCAN_PROJECT_NAME must be set" && exit 1
+[ -z "$COVERITY_SCAN_NOTIFICATION_EMAIL" ] && echo "ERROR: COVERITY_SCAN_NOTIFICATION_EMAIL must be set" && exit 1
+[ -z "$COVERITY_SCAN_BRANCH_PATTERN" ] && echo "ERROR: COVERITY_SCAN_BRANCH_PATTERN must be set" && exit 1
+[ -z "$COVERITY_SCAN_BUILD_COMMAND" ] && echo "ERROR: COVERITY_SCAN_BUILD_COMMAND must be set" && exit 1
+[ -z "$COVERITY_SCAN_TOKEN" ] && echo "ERROR: COVERITY_SCAN_TOKEN must be set" && exit 1
+
+PLATFORM=`uname`
+#[local] Use /var/tmp for TOOL_ARCHIVE and TOOL_BASE, as on certain systems
+# /tmp is tmpfs and is sometimes too small to handle all necessary tooling
+TOOL_ARCHIVE=/var//tmp/cov-analysis-${PLATFORM}.tgz
+TOOL_URL=https://scan.coverity.com/download/${PLATFORM}
+TOOL_BASE=/var/tmp/coverity-scan-analysis
+UPLOAD_URL="https://scan.coverity.com/builds"
+SCAN_URL="https://scan.coverity.com"
+
+# Do not run on pull requests
+if [ "${TRAVIS_PULL_REQUEST}" = "true" ]; then
+ echo -e "\033[33;1mINFO: Skipping Coverity Analysis: branch is a pull request.\033[0m"
+ exit 0
+fi
+
+# Verify this branch should run
+IS_COVERITY_SCAN_BRANCH=`ruby -e "puts '${TRAVIS_BRANCH}' =~ /\\A$COVERITY_SCAN_BRANCH_PATTERN\\z/ ? 1 : 0"`
+if [ "$IS_COVERITY_SCAN_BRANCH" = "1" ]; then
+ echo -e "\033[33;1mCoverity Scan configured to run on branch ${TRAVIS_BRANCH}\033[0m"
+else
+ echo -e "\033[33;1mCoverity Scan NOT configured to run on branch ${TRAVIS_BRANCH}\033[0m"
+ exit 1
+fi
+
+# Verify upload is permitted
+AUTH_RES=`curl -s --form project="$COVERITY_SCAN_PROJECT_NAME" --form token="$COVERITY_SCAN_TOKEN" $SCAN_URL/api/upload_permitted`
+if [ "$AUTH_RES" = "Access denied" ]; then
+ echo -e "\033[33;1mCoverity Scan API access denied. Check COVERITY_SCAN_PROJECT_NAME and COVERITY_SCAN_TOKEN.\033[0m"
+ exit 1
+else
+ AUTH=`echo $AUTH_RES | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['upload_permitted']"`
+ if [ "$AUTH" = "true" ]; then
+ echo -e "\033[33;1mCoverity Scan analysis authorized per quota.\033[0m"
+ else
+ WHEN=`echo $AUTH_RES | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['next_upload_permitted_at']"`
+ echo -e "\033[33;1mCoverity Scan analysis NOT authorized until $WHEN.\033[0m"
+ exit 0
+ fi
+fi
+
+if [ ! -d $TOOL_BASE ]; then
+ # Download Coverity Scan Analysis Tool
+ if [ ! -e $TOOL_ARCHIVE ]; then
+ echo -e "\033[33;1mDownloading Coverity Scan Analysis Tool...\033[0m"
+ wget -nv -O $TOOL_ARCHIVE $TOOL_URL --post-data "project=$COVERITY_SCAN_PROJECT_NAME&token=$COVERITY_SCAN_TOKEN"
+ fi
+
+ # Extract Coverity Scan Analysis Tool
+ echo -e "\033[33;1mExtracting Coverity Scan Analysis Tool...\033[0m"
+ mkdir -p $TOOL_BASE
+ pushd $TOOL_BASE
+ tar xzf $TOOL_ARCHIVE
+ popd
+fi
+
+TOOL_DIR=`find $TOOL_BASE -type d -name 'cov-analysis*'`
+export PATH=$TOOL_DIR/bin:$PATH
+
+# Build
+echo -e "\033[33;1mRunning Coverity Scan Analysis Tool...\033[0m"
+COV_BUILD_OPTIONS=""
+#COV_BUILD_OPTIONS="--return-emit-failures 8 --parse-error-threshold 85"
+RESULTS_DIR="cov-int"
+eval "${COVERITY_SCAN_BUILD_COMMAND_PREPEND}"
+COVERITY_UNSUPPORTED=1 cov-build --dir $RESULTS_DIR $COV_BUILD_OPTIONS $COVERITY_SCAN_BUILD_COMMAND
+cov-import-scm --dir $RESULTS_DIR --scm git --log $RESULTS_DIR/scm_log.txt 2>&1
+
+# Upload results
+echo -e "\033[33;1mTarring Coverity Scan Analysis results...\033[0m"
+RESULTS_ARCHIVE=analysis-results.tgz
+tar czf $RESULTS_ARCHIVE $RESULTS_DIR
+SHA=`git rev-parse --short HEAD`
+
+echo -e "\033[33;1mUploading Coverity Scan Analysis results...\033[0m"
+response=$(curl \
+ --silent --write-out "\n%{http_code}\n" \
+ --form project=$COVERITY_SCAN_PROJECT_NAME \
+ --form token=$COVERITY_SCAN_TOKEN \
+ --form email=$COVERITY_SCAN_NOTIFICATION_EMAIL \
+ --form file=@$RESULTS_ARCHIVE \
+ --form version=$SHA \
+ --form description="Travis CI build" \
+ $UPLOAD_URL)
+status_code=$(echo "$response" | sed -n '$p')
+#[local] Coverity used to return 201 on success, but it's 200 now
+# See https://github.com/systemd/systemd/blob/master/tools/coverity.sh#L145
+if [ "$status_code" != "200" ]; then
+ TEXT=$(echo "$response" | sed '$d')
+ echo -e "\033[33;1mCoverity Scan upload failed: $TEXT.\033[0m"
+ exit 1
+fi
diff --git a/scripts/sync-kernel.sh b/scripts/sync-kernel.sh
new file mode 100755
index 0000000..eb09ef1
--- /dev/null
+++ b/scripts/sync-kernel.sh
@@ -0,0 +1,353 @@
+#!/bin/bash
+
+usage () {
+ echo "USAGE: ./sync-kernel.sh <libbpf-repo> <kernel-repo> <bpf-branch>"
+ echo ""
+ echo "Set BPF_NEXT_BASELINE to override bpf-next tree commit, otherwise read from <libbpf-repo>/CHECKPOINT-COMMIT."
+ echo "Set BPF_BASELINE to override bpf tree commit, otherwise read from <libbpf-repo>/BPF-CHECKPOINT-COMMIT."
+ echo "Set MANUAL_MODE to 1 to manually control every cherry-picked commits."
+ exit 1
+}
+
+set -eu
+
+LIBBPF_REPO=${1-""}
+LINUX_REPO=${2-""}
+BPF_BRANCH=${3-""}
+BASELINE_COMMIT=${BPF_NEXT_BASELINE:-$(cat ${LIBBPF_REPO}/CHECKPOINT-COMMIT)}
+BPF_BASELINE_COMMIT=${BPF_BASELINE:-$(cat ${LIBBPF_REPO}/BPF-CHECKPOINT-COMMIT)}
+
+if [ -z "${LIBBPF_REPO}" ] || [ -z "${LINUX_REPO}" ]; then
+ echo "Error: libbpf or linux repos are not specified"
+ usage
+fi
+if [ -z "${BPF_BRANCH}" ]; then
+ echo "Error: linux's bpf tree branch is not specified"
+ usage
+fi
+if [ -z "${BASELINE_COMMIT}" ] || [ -z "${BPF_BASELINE_COMMIT}" ]; then
+ echo "Error: bpf or bpf-next baseline commits are not provided"
+ usage
+fi
+
+SUFFIX=$(date --utc +%Y-%m-%dT%H-%M-%S.%3NZ)
+WORKDIR=$(pwd)
+TMP_DIR=$(mktemp -d)
+
+trap "cd ${WORKDIR}; exit" INT TERM EXIT
+
+declare -A PATH_MAP
+PATH_MAP=( \
+ [tools/lib/bpf]=src \
+ [tools/include/uapi/linux/bpf_common.h]=include/uapi/linux/bpf_common.h \
+ [tools/include/uapi/linux/bpf.h]=include/uapi/linux/bpf.h \
+ [tools/include/uapi/linux/btf.h]=include/uapi/linux/btf.h \
+ [tools/include/uapi/linux/fcntl.h]=include/uapi/linux/fcntl.h \
+ [tools/include/uapi/linux/if_link.h]=include/uapi/linux/if_link.h \
+ [tools/include/uapi/linux/if_xdp.h]=include/uapi/linux/if_xdp.h \
+ [tools/include/uapi/linux/netlink.h]=include/uapi/linux/netlink.h \
+ [tools/include/uapi/linux/pkt_cls.h]=include/uapi/linux/pkt_cls.h \
+ [tools/include/uapi/linux/pkt_sched.h]=include/uapi/linux/pkt_sched.h \
+ [include/uapi/linux/perf_event.h]=include/uapi/linux/perf_event.h \
+ [Documentation/bpf/libbpf]=docs \
+)
+
+LIBBPF_PATHS=("${!PATH_MAP[@]}" ":^tools/lib/bpf/Makefile" ":^tools/lib/bpf/Build" ":^tools/lib/bpf/.gitignore" ":^tools/include/tools/libc_compat.h")
+LIBBPF_VIEW_PATHS=("${PATH_MAP[@]}")
+LIBBPF_VIEW_EXCLUDE_REGEX='^src/(Makefile|Build|test_libbpf\.c|bpf_helper_defs\.h|\.gitignore)$|^docs/(\.gitignore|api\.rst|conf\.py)$|^docs/sphinx/.*'
+LINUX_VIEW_EXCLUDE_REGEX='^include/tools/libc_compat.h$'
+
+LIBBPF_TREE_FILTER="mkdir -p __libbpf/include/uapi/linux __libbpf/include/tools && "$'\\\n'
+for p in "${!PATH_MAP[@]}"; do
+ LIBBPF_TREE_FILTER+="git mv -kf ${p} __libbpf/${PATH_MAP[${p}]} && "$'\\\n'
+done
+LIBBPF_TREE_FILTER+="git rm --ignore-unmatch -f __libbpf/src/{Makefile,Build,test_libbpf.c,.gitignore} >/dev/null"
+
+cd_to()
+{
+ cd ${WORKDIR} && cd "$1"
+}
+
+# Output brief single-line commit description
+# $1 - commit ref
+commit_desc()
+{
+ git log -n1 --pretty='%h ("%s")' $1
+}
+
+# Create commit single-line signature, which consists of:
+# - full commit subject
+# - author date in ISO8601 format
+# - full commit body with newlines replaced with vertical bars (|)
+# - shortstat appended at the end
+# The idea is that this single-line signature is good enough to make final
+# decision about whether two commits are the same, across different repos.
+# $1 - commit ref
+# $2 - paths filter
+commit_signature()
+{
+ local ref=$1
+ shift
+ git show --pretty='("%s")|%aI|%b' --shortstat $ref -- "${@-.}" | tr '\n' '|'
+}
+
+# Cherry-pick commits touching libbpf-related files
+# $1 - baseline_tag
+# $2 - tip_tag
+cherry_pick_commits()
+{
+ local manual_mode=${MANUAL_MODE:-0}
+ local baseline_tag=$1
+ local tip_tag=$2
+ local new_commits
+ local signature
+ local should_skip
+ local synced_cnt
+ local manual_check
+ local libbpf_conflict_cnt
+ local desc
+
+ new_commits=$(git rev-list --no-merges --topo-order --reverse ${baseline_tag}..${tip_tag} -- "${LIBBPF_PATHS[@]}")
+ for new_commit in ${new_commits}; do
+ desc="$(commit_desc ${new_commit})"
+ signature="$(commit_signature ${new_commit} "${LIBBPF_PATHS[@]}")"
+ synced_cnt=$(grep -F "${signature}" ${TMP_DIR}/libbpf_commits.txt | wc -l)
+ manual_check=0
+ if ((${synced_cnt} > 0)); then
+ # commit with the same subject is already in libbpf, but it's
+ # not 100% the same commit, so check with user
+ echo "Commit '${desc}' is synced into libbpf as:"
+ grep -F "${signature}" ${TMP_DIR}/libbpf_commits.txt | \
+ cut -d'|' -f1 | sed -e 's/^/- /'
+ if ((${manual_mode} != 1 && ${synced_cnt} == 1)); then
+ echo "Skipping '${desc}' due to unique match..."
+ continue
+ fi
+ if ((${synced_cnt} > 1)); then
+ echo "'${desc} matches multiple commits, please, double-check!"
+ manual_check=1
+ fi
+ fi
+ if ((${manual_mode} == 1 || ${manual_check} == 1)); then
+ read -p "Do you want to skip '${desc}'? [y/N]: " should_skip
+ case "${should_skip}" in
+ "y" | "Y")
+ echo "Skipping '${desc}'..."
+ continue
+ ;;
+ esac
+ fi
+ # commit hasn't been synced into libbpf yet
+ echo "Picking '${desc}'..."
+ if ! git cherry-pick ${new_commit} &>/dev/null; then
+ echo "Warning! Cherry-picking '${desc} failed, checking if it's non-libbpf files causing problems..."
+ libbpf_conflict_cnt=$(git diff --name-only --diff-filter=U -- "${LIBBPF_PATHS[@]}" | wc -l)
+ conflict_cnt=$(git diff --name-only | wc -l)
+ prompt_resolution=1
+
+ if ((${libbpf_conflict_cnt} == 0)); then
+ echo "Looks like only non-libbpf files have conflicts, ignoring..."
+ if ((${conflict_cnt} == 0)); then
+ echo "Empty cherry-pick, skipping it..."
+ git cherry-pick --abort
+ continue
+ fi
+
+ git add .
+ # GIT_EDITOR=true to avoid editor popping up to edit commit message
+ if ! GIT_EDITOR=true git cherry-pick --continue &>/dev/null; then
+ echo "Error! That still failed! Please resolve manually."
+ else
+ echo "Success! All cherry-pick conflicts were resolved for '${desc}'!"
+ prompt_resolution=0
+ fi
+ fi
+
+ if ((${prompt_resolution} == 1)); then
+ read -p "Error! Cherry-picking '${desc}' failed, please fix manually and press <return> to proceed..."
+ fi
+ fi
+ # Append signature of just cherry-picked commit to avoid
+ # potentially cherry-picking the same commit twice later when
+ # processing bpf tree commits. At this point we don't know yet
+ # the final commit sha in libbpf repo, so we record Linux SHA
+ # instead as LINUX_<sha>.
+ echo LINUX_$(git log --pretty='%h' -n1) "${signature}" >> ${TMP_DIR}/libbpf_commits.txt
+ done
+}
+
+cleanup()
+{
+ echo "Cleaning up..."
+ rm -r ${TMP_DIR}
+ cd_to ${LINUX_REPO}
+ git checkout ${TIP_SYM_REF}
+ git branch -D ${BASELINE_TAG} ${TIP_TAG} ${BPF_BASELINE_TAG} ${BPF_TIP_TAG} \
+ ${SQUASH_BASE_TAG} ${SQUASH_TIP_TAG} ${VIEW_TAG} || true
+
+ cd_to .
+ echo "DONE."
+}
+
+
+cd_to ${LIBBPF_REPO}
+GITHUB_ABS_DIR=$(pwd)
+echo "Dumping existing libbpf commit signatures..."
+for h in $(git log --pretty='%h' -n500); do
+ echo $h "$(commit_signature $h)" >> ${TMP_DIR}/libbpf_commits.txt
+done
+
+# Use current kernel repo HEAD as a source of patches
+cd_to ${LINUX_REPO}
+LINUX_ABS_DIR=$(pwd)
+TIP_SYM_REF=$(git symbolic-ref -q --short HEAD || git rev-parse HEAD)
+TIP_COMMIT=$(git rev-parse HEAD)
+BPF_TIP_COMMIT=$(git rev-parse ${BPF_BRANCH})
+BASELINE_TAG=libbpf-baseline-${SUFFIX}
+TIP_TAG=libbpf-tip-${SUFFIX}
+BPF_BASELINE_TAG=libbpf-bpf-baseline-${SUFFIX}
+BPF_TIP_TAG=libbpf-bpf-tip-${SUFFIX}
+VIEW_TAG=libbpf-view-${SUFFIX}
+LIBBPF_SYNC_TAG=libbpf-sync-${SUFFIX}
+
+# Squash state of kernel repo at baseline into single commit
+SQUASH_BASE_TAG=libbpf-squash-base-${SUFFIX}
+SQUASH_TIP_TAG=libbpf-squash-tip-${SUFFIX}
+SQUASH_COMMIT=$(git commit-tree ${BASELINE_COMMIT}^{tree} -m "BASELINE SQUASH ${BASELINE_COMMIT}")
+
+echo "WORKDIR: ${WORKDIR}"
+echo "LINUX REPO: ${LINUX_REPO}"
+echo "LIBBPF REPO: ${LIBBPF_REPO}"
+echo "TEMP DIR: ${TMP_DIR}"
+echo "SUFFIX: ${SUFFIX}"
+echo "BASE COMMIT: '$(commit_desc ${BASELINE_COMMIT})'"
+echo "TIP COMMIT: '$(commit_desc ${TIP_COMMIT})'"
+echo "BPF BASE COMMIT: '$(commit_desc ${BPF_BASELINE_COMMIT})'"
+echo "BPF TIP COMMIT: '$(commit_desc ${BPF_TIP_COMMIT})'"
+echo "SQUASH COMMIT: ${SQUASH_COMMIT}"
+echo "BASELINE TAG: ${BASELINE_TAG}"
+echo "TIP TAG: ${TIP_TAG}"
+echo "BPF BASELINE TAG: ${BPF_BASELINE_TAG}"
+echo "BPF TIP TAG: ${BPF_TIP_TAG}"
+echo "SQUASH BASE TAG: ${SQUASH_BASE_TAG}"
+echo "SQUASH TIP TAG: ${SQUASH_TIP_TAG}"
+echo "VIEW TAG: ${VIEW_TAG}"
+echo "LIBBPF SYNC TAG: ${LIBBPF_SYNC_TAG}"
+echo "PATCHES: ${TMP_DIR}/patches"
+
+git branch ${BASELINE_TAG} ${BASELINE_COMMIT}
+git branch ${TIP_TAG} ${TIP_COMMIT}
+git branch ${BPF_BASELINE_TAG} ${BPF_BASELINE_COMMIT}
+git branch ${BPF_TIP_TAG} ${BPF_TIP_COMMIT}
+git branch ${SQUASH_BASE_TAG} ${SQUASH_COMMIT}
+git checkout -b ${SQUASH_TIP_TAG} ${SQUASH_COMMIT}
+
+# Cherry-pick new commits onto squashed baseline commit
+cherry_pick_commits ${BASELINE_TAG} ${TIP_TAG}
+cherry_pick_commits ${BPF_BASELINE_TAG} ${BPF_TIP_TAG}
+
+# Move all libbpf files into __libbpf directory.
+FILTER_BRANCH_SQUELCH_WARNING=1 git filter-branch --prune-empty -f --tree-filter "${LIBBPF_TREE_FILTER}" ${SQUASH_TIP_TAG} ${SQUASH_BASE_TAG}
+# Make __libbpf a new root directory
+FILTER_BRANCH_SQUELCH_WARNING=1 git filter-branch --prune-empty -f --subdirectory-filter __libbpf ${SQUASH_TIP_TAG} ${SQUASH_BASE_TAG}
+
+# If there are no new commits with libbpf-related changes, bail out
+COMMIT_CNT=$(git rev-list --count ${SQUASH_BASE_TAG}..${SQUASH_TIP_TAG})
+if ((${COMMIT_CNT} <= 0)); then
+ echo "No new changes to apply, we are done!"
+ cleanup
+ exit 2
+fi
+
+# Exclude baseline commit and generate nice cover letter with summary
+git format-patch ${SQUASH_BASE_TAG}..${SQUASH_TIP_TAG} --cover-letter -o ${TMP_DIR}/patches
+
+# Now is time to re-apply libbpf-related linux patches to libbpf repo
+cd_to ${LIBBPF_REPO}
+git checkout -b ${LIBBPF_SYNC_TAG}
+
+for patch in $(ls -1 ${TMP_DIR}/patches | tail -n +2); do
+ if ! git am -3 --committer-date-is-author-date "${TMP_DIR}/patches/${patch}"; then
+ if ! patch -p1 --merge < "${TMP_DIR}/patches/${patch}"; then
+ read -p "Applying ${TMP_DIR}/patches/${patch} failed, please resolve manually and press <return> to proceed..."
+ fi
+ git am --continue
+ fi
+done
+
+# Generate bpf_helper_defs.h and commit, if anything changed
+# restore Linux tip to use bpf_doc.py
+cd_to ${LINUX_REPO}
+git checkout ${TIP_TAG}
+# re-generate bpf_helper_defs.h
+cd_to ${LIBBPF_REPO}
+"${LINUX_ABS_DIR}/scripts/bpf_doc.py" --header \
+ --file include/uapi/linux/bpf.h > src/bpf_helper_defs.h
+# if anything changed, commit it
+helpers_changes=$(git status --porcelain src/bpf_helper_defs.h | wc -l)
+if ((${helpers_changes} == 1)); then
+ git add src/bpf_helper_defs.h
+ git commit -s -m "sync: auto-generate latest BPF helpers
+
+Latest changes to BPF helper definitions.
+" -- src/bpf_helper_defs.h
+fi
+
+# Use generated cover-letter as a template for "sync commit" with
+# baseline and checkpoint commits from kernel repo (and leave summary
+# from cover letter intact, of course)
+echo ${TIP_COMMIT} > CHECKPOINT-COMMIT && \
+echo ${BPF_TIP_COMMIT} > BPF-CHECKPOINT-COMMIT && \
+git add CHECKPOINT-COMMIT && \
+git add BPF-CHECKPOINT-COMMIT && \
+awk '/\*\*\* BLURB HERE \*\*\*/ {p=1} p' ${TMP_DIR}/patches/0000-cover-letter.patch | \
+sed "s/\*\*\* BLURB HERE \*\*\*/\
+sync: latest libbpf changes from kernel\n\
+\n\
+Syncing latest libbpf commits from kernel repository.\n\
+Baseline bpf-next commit: ${BASELINE_COMMIT}\n\
+Checkpoint bpf-next commit: ${TIP_COMMIT}\n\
+Baseline bpf commit: ${BPF_BASELINE_COMMIT}\n\
+Checkpoint bpf commit: ${BPF_TIP_COMMIT}/" | \
+git commit -s --file=-
+
+echo "SUCCESS! ${COMMIT_CNT} commits synced."
+
+echo "Verifying Linux's and Github's libbpf state"
+
+cd_to ${LINUX_REPO}
+git checkout -b ${VIEW_TAG} ${TIP_COMMIT}
+FILTER_BRANCH_SQUELCH_WARNING=1 git filter-branch -f --tree-filter "${LIBBPF_TREE_FILTER}" ${VIEW_TAG}^..${VIEW_TAG}
+FILTER_BRANCH_SQUELCH_WARNING=1 git filter-branch -f --subdirectory-filter __libbpf ${VIEW_TAG}^..${VIEW_TAG}
+git ls-files -- "${LIBBPF_VIEW_PATHS[@]}" | grep -v -E "${LINUX_VIEW_EXCLUDE_REGEX}" > ${TMP_DIR}/linux-view.ls
+
+cd_to ${LIBBPF_REPO}
+git ls-files -- "${LIBBPF_VIEW_PATHS[@]}" | grep -v -E "${LIBBPF_VIEW_EXCLUDE_REGEX}" > ${TMP_DIR}/github-view.ls
+
+echo "Comparing list of files..."
+diff -u ${TMP_DIR}/linux-view.ls ${TMP_DIR}/github-view.ls
+echo "Comparing file contents..."
+CONSISTENT=1
+for F in $(cat ${TMP_DIR}/linux-view.ls); do
+ if ! diff -u "${LINUX_ABS_DIR}/${F}" "${GITHUB_ABS_DIR}/${F}"; then
+ echo "${LINUX_ABS_DIR}/${F} and ${GITHUB_ABS_DIR}/${F} are different!"
+ CONSISTENT=0
+ fi
+done
+if ((${CONSISTENT} == 1)); then
+ echo "Great! Content is identical!"
+else
+ ignore_inconsistency=n
+ echo "Unfortunately, there are some inconsistencies, please double check."
+ read -p "Does everything look good? [y/N]: " ignore_inconsistency
+ case "${ignore_inconsistency}" in
+ "y" | "Y")
+ echo "Ok, proceeding..."
+ ;;
+ *)
+ echo "Oops, exiting with error..."
+ exit 4
+ esac
+fi
+
+cleanup
diff --git a/src/.gitignore b/src/.gitignore
new file mode 100644
index 0000000..0473afb
--- /dev/null
+++ b/src/.gitignore
@@ -0,0 +1,6 @@
+*.o
+*.a
+/libbpf.pc
+/libbpf.so*
+/staticobjs
+/sharedobjs
diff --git a/src/Makefile b/src/Makefile
new file mode 100644
index 0000000..d535f81
--- /dev/null
+++ b/src/Makefile
@@ -0,0 +1,183 @@
+# SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+
+ifeq ($(V),1)
+ Q =
+ msg =
+else
+ Q = @
+ msg = @printf ' %-8s %s%s\n' "$(1)" "$(2)" "$(if $(3), $(3))";
+endif
+
+LIBBPF_MAJOR_VERSION := 1
+LIBBPF_MINOR_VERSION := 1
+LIBBPF_PATCH_VERSION := 0
+LIBBPF_VERSION := $(LIBBPF_MAJOR_VERSION).$(LIBBPF_MINOR_VERSION).$(LIBBPF_PATCH_VERSION)
+LIBBPF_MAJMIN_VERSION := $(LIBBPF_MAJOR_VERSION).$(LIBBPF_MINOR_VERSION).0
+LIBBPF_MAP_VERSION := $(shell grep -oE '^LIBBPF_([0-9.]+)' libbpf.map | sort -rV | head -n1 | cut -d'_' -f2)
+ifneq ($(LIBBPF_MAJMIN_VERSION), $(LIBBPF_MAP_VERSION))
+$(error Libbpf release ($(LIBBPF_VERSION)) and map ($(LIBBPF_MAP_VERSION)) versions are out of sync!)
+endif
+
+define allow-override
+ $(if $(or $(findstring environment,$(origin $(1))),\
+ $(findstring command line,$(origin $(1)))),,\
+ $(eval $(1) = $(2)))
+endef
+
+$(call allow-override,CC,$(CROSS_COMPILE)cc)
+$(call allow-override,LD,$(CROSS_COMPILE)ld)
+
+TOPDIR = ..
+
+INCLUDES := -I. -I$(TOPDIR)/include -I$(TOPDIR)/include/uapi
+ALL_CFLAGS := $(INCLUDES)
+
+SHARED_CFLAGS += -fPIC -fvisibility=hidden -DSHARED
+
+CFLAGS ?= -g -O2 -Werror -Wall -std=gnu89
+ALL_CFLAGS += $(CFLAGS) -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 $(EXTRA_CFLAGS)
+ALL_LDFLAGS += $(LDFLAGS) $(EXTRA_LDFLAGS)
+
+ifdef NO_PKG_CONFIG
+ ALL_LDFLAGS += -lelf -lz
+else
+ PKG_CONFIG ?= pkg-config
+ ALL_CFLAGS += $(shell $(PKG_CONFIG) --cflags libelf zlib)
+ ALL_LDFLAGS += $(shell $(PKG_CONFIG) --libs libelf zlib)
+endif
+
+OBJDIR ?= .
+SHARED_OBJDIR := $(OBJDIR)/sharedobjs
+STATIC_OBJDIR := $(OBJDIR)/staticobjs
+OBJS := bpf.o btf.o libbpf.o libbpf_errno.o netlink.o \
+ nlattr.o str_error.o libbpf_probes.o bpf_prog_linfo.o \
+ btf_dump.o hashmap.o ringbuf.o strset.o linker.o gen_loader.o \
+ relo_core.o usdt.o
+SHARED_OBJS := $(addprefix $(SHARED_OBJDIR)/,$(OBJS))
+STATIC_OBJS := $(addprefix $(STATIC_OBJDIR)/,$(OBJS))
+
+STATIC_LIBS := $(OBJDIR)/libbpf.a
+ifndef BUILD_STATIC_ONLY
+ SHARED_LIBS := $(OBJDIR)/libbpf.so \
+ $(OBJDIR)/libbpf.so.$(LIBBPF_MAJOR_VERSION) \
+ $(OBJDIR)/libbpf.so.$(LIBBPF_VERSION)
+ VERSION_SCRIPT := libbpf.map
+endif
+
+HEADERS := bpf.h libbpf.h btf.h libbpf_common.h libbpf_legacy.h \
+ bpf_helpers.h bpf_helper_defs.h bpf_tracing.h \
+ bpf_endian.h bpf_core_read.h skel_internal.h libbpf_version.h \
+ usdt.bpf.h
+UAPI_HEADERS := $(addprefix $(TOPDIR)/include/uapi/linux/,\
+ bpf.h bpf_common.h btf.h)
+
+PC_FILE := $(OBJDIR)/libbpf.pc
+
+INSTALL = install
+
+DESTDIR ?=
+
+HOSTARCH = $(firstword $(subst -, ,$(shell $(CC) -dumpmachine)))
+ifeq ($(filter-out %64 %64be %64eb %64le %64el s390x, $(HOSTARCH)),)
+ LIBSUBDIR := lib64
+else
+ LIBSUBDIR := lib
+endif
+
+# By default let the pc file itself use ${prefix} in includedir/libdir so that
+# the prefix can be overridden at runtime (eg: --define-prefix)
+ifndef LIBDIR
+ LIBDIR_PC := $$\{prefix\}/$(LIBSUBDIR)
+else
+ LIBDIR_PC := $(LIBDIR)
+endif
+PREFIX ?= /usr
+LIBDIR ?= $(PREFIX)/$(LIBSUBDIR)
+INCLUDEDIR ?= $(PREFIX)/include
+UAPIDIR ?= $(PREFIX)/include
+
+TAGS_PROG := $(if $(shell which etags 2>/dev/null),etags,ctags)
+
+all: $(STATIC_LIBS) $(SHARED_LIBS) $(PC_FILE)
+
+$(OBJDIR)/libbpf.a: $(STATIC_OBJS)
+ $(call msg,AR,$@)
+ $(Q)$(AR) rcs $@ $^
+
+$(OBJDIR)/libbpf.so: $(OBJDIR)/libbpf.so.$(LIBBPF_MAJOR_VERSION)
+ $(Q)ln -sf $(^F) $@
+
+$(OBJDIR)/libbpf.so.$(LIBBPF_MAJOR_VERSION): $(OBJDIR)/libbpf.so.$(LIBBPF_VERSION)
+ $(Q)ln -sf $(^F) $@
+
+$(OBJDIR)/libbpf.so.$(LIBBPF_VERSION): $(SHARED_OBJS)
+ $(call msg,CC,$@)
+ $(Q)$(CC) -shared -Wl,--version-script=$(VERSION_SCRIPT) \
+ -Wl,-soname,libbpf.so.$(LIBBPF_MAJOR_VERSION) \
+ $^ $(ALL_LDFLAGS) -o $@
+
+$(OBJDIR)/libbpf.pc: force
+ $(Q)sed -e "s|@PREFIX@|$(PREFIX)|" \
+ -e "s|@LIBDIR@|$(LIBDIR_PC)|" \
+ -e "s|@VERSION@|$(LIBBPF_VERSION)|" \
+ < libbpf.pc.template > $@
+
+$(STATIC_OBJDIR) $(SHARED_OBJDIR):
+ $(call msg,MKDIR,$@)
+ $(Q)mkdir -p $@
+
+$(STATIC_OBJDIR)/%.o: %.c | $(STATIC_OBJDIR)
+ $(call msg,CC,$@)
+ $(Q)$(CC) $(ALL_CFLAGS) $(CPPFLAGS) -c $< -o $@
+
+$(SHARED_OBJDIR)/%.o: %.c | $(SHARED_OBJDIR)
+ $(call msg,CC,$@)
+ $(Q)$(CC) $(ALL_CFLAGS) $(SHARED_CFLAGS) $(CPPFLAGS) -c $< -o $@
+
+define do_install
+ $(call msg,INSTALL,$1)
+ $(Q)if [ ! -d '$(DESTDIR)$2' ]; then \
+ $(INSTALL) -d -m 755 '$(DESTDIR)$2'; \
+ fi;
+ $(Q)$(INSTALL) $(if $3,-m $3,) $1 '$(DESTDIR)$2'
+endef
+
+# Preserve symlinks at installation.
+define do_s_install
+ $(call msg,INSTALL,$1)
+ $(Q)if [ ! -d '$(DESTDIR)$2' ]; then \
+ $(INSTALL) -d -m 755 '$(DESTDIR)$2'; \
+ fi;
+ $(Q)cp -fR $1 '$(DESTDIR)$2'
+endef
+
+install: all install_headers install_pkgconfig
+ $(call do_s_install,$(STATIC_LIBS) $(SHARED_LIBS),$(LIBDIR))
+
+install_headers:
+ $(call do_install,$(HEADERS),$(INCLUDEDIR)/bpf,644)
+
+# UAPI headers can be installed by a different package so they're not installed
+# in by install rule.
+install_uapi_headers:
+ $(call do_install,$(UAPI_HEADERS),$(UAPIDIR)/linux,644)
+
+install_pkgconfig: $(PC_FILE)
+ $(call do_install,$(PC_FILE),$(LIBDIR)/pkgconfig,644)
+
+clean:
+ $(call msg,CLEAN)
+ $(Q)rm -rf *.o *.a *.so *.so.* *.pc $(SHARED_OBJDIR) $(STATIC_OBJDIR)
+
+.PHONY: cscope tags force
+cscope:
+ $(call msg,CSCOPE)
+ $(Q)ls *.c *.h > cscope.files
+ $(Q)cscope -b -q -f cscope.out
+
+tags:
+ $(call msg,CTAGS)
+ $(Q)rm -f TAGS tags
+ $(Q)ls *.c *.h | xargs $(TAGS_PROG) -a
+
+force:
diff --git a/src/bpf.c b/src/bpf.c
new file mode 100644
index 0000000..9aff98f
--- /dev/null
+++ b/src/bpf.c
@@ -0,0 +1,1165 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+
+/*
+ * common eBPF ELF operations.
+ *
+ * Copyright (C) 2013-2015 Alexei Starovoitov <ast@kernel.org>
+ * Copyright (C) 2015 Wang Nan <wangnan0@huawei.com>
+ * Copyright (C) 2015 Huawei Inc.
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation;
+ * version 2.1 of the License (not later!)
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this program; if not, see <http://www.gnu.org/licenses>
+ */
+
+#include <stdlib.h>
+#include <string.h>
+#include <memory.h>
+#include <unistd.h>
+#include <asm/unistd.h>
+#include <errno.h>
+#include <linux/bpf.h>
+#include <linux/filter.h>
+#include <linux/kernel.h>
+#include <limits.h>
+#include <sys/resource.h>
+#include "bpf.h"
+#include "libbpf.h"
+#include "libbpf_internal.h"
+
+/*
+ * When building perf, unistd.h is overridden. __NR_bpf is
+ * required to be defined explicitly.
+ */
+#ifndef __NR_bpf
+# if defined(__i386__)
+# define __NR_bpf 357
+# elif defined(__x86_64__)
+# define __NR_bpf 321
+# elif defined(__aarch64__)
+# define __NR_bpf 280
+# elif defined(__sparc__)
+# define __NR_bpf 349
+# elif defined(__s390__)
+# define __NR_bpf 351
+# elif defined(__arc__)
+# define __NR_bpf 280
+# elif defined(__mips__) && defined(_ABIO32)
+# define __NR_bpf 4355
+# elif defined(__mips__) && defined(_ABIN32)
+# define __NR_bpf 6319
+# elif defined(__mips__) && defined(_ABI64)
+# define __NR_bpf 5315
+# else
+# error __NR_bpf not defined. libbpf does not support your arch.
+# endif
+#endif
+
+static inline __u64 ptr_to_u64(const void *ptr)
+{
+ return (__u64) (unsigned long) ptr;
+}
+
+static inline int sys_bpf(enum bpf_cmd cmd, union bpf_attr *attr,
+ unsigned int size)
+{
+ return syscall(__NR_bpf, cmd, attr, size);
+}
+
+static inline int sys_bpf_fd(enum bpf_cmd cmd, union bpf_attr *attr,
+ unsigned int size)
+{
+ int fd;
+
+ fd = sys_bpf(cmd, attr, size);
+ return ensure_good_fd(fd);
+}
+
+int sys_bpf_prog_load(union bpf_attr *attr, unsigned int size, int attempts)
+{
+ int fd;
+
+ do {
+ fd = sys_bpf_fd(BPF_PROG_LOAD, attr, size);
+ } while (fd < 0 && errno == EAGAIN && --attempts > 0);
+
+ return fd;
+}
+
+/* Probe whether kernel switched from memlock-based (RLIMIT_MEMLOCK) to
+ * memcg-based memory accounting for BPF maps and progs. This was done in [0].
+ * We use the support for bpf_ktime_get_coarse_ns() helper, which was added in
+ * the same 5.11 Linux release ([1]), to detect memcg-based accounting for BPF.
+ *
+ * [0] https://lore.kernel.org/bpf/20201201215900.3569844-1-guro@fb.com/
+ * [1] d05512618056 ("bpf: Add bpf_ktime_get_coarse_ns helper")
+ */
+int probe_memcg_account(void)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, attach_btf_obj_fd);
+ struct bpf_insn insns[] = {
+ BPF_EMIT_CALL(BPF_FUNC_ktime_get_coarse_ns),
+ BPF_EXIT_INSN(),
+ };
+ size_t insn_cnt = ARRAY_SIZE(insns);
+ union bpf_attr attr;
+ int prog_fd;
+
+ /* attempt loading freplace trying to use custom BTF */
+ memset(&attr, 0, attr_sz);
+ attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER;
+ attr.insns = ptr_to_u64(insns);
+ attr.insn_cnt = insn_cnt;
+ attr.license = ptr_to_u64("GPL");
+
+ prog_fd = sys_bpf_fd(BPF_PROG_LOAD, &attr, attr_sz);
+ if (prog_fd >= 0) {
+ close(prog_fd);
+ return 1;
+ }
+ return 0;
+}
+
+static bool memlock_bumped;
+static rlim_t memlock_rlim = RLIM_INFINITY;
+
+int libbpf_set_memlock_rlim(size_t memlock_bytes)
+{
+ if (memlock_bumped)
+ return libbpf_err(-EBUSY);
+
+ memlock_rlim = memlock_bytes;
+ return 0;
+}
+
+int bump_rlimit_memlock(void)
+{
+ struct rlimit rlim;
+
+ /* if kernel supports memcg-based accounting, skip bumping RLIMIT_MEMLOCK */
+ if (memlock_bumped || kernel_supports(NULL, FEAT_MEMCG_ACCOUNT))
+ return 0;
+
+ memlock_bumped = true;
+
+ /* zero memlock_rlim_max disables auto-bumping RLIMIT_MEMLOCK */
+ if (memlock_rlim == 0)
+ return 0;
+
+ rlim.rlim_cur = rlim.rlim_max = memlock_rlim;
+ if (setrlimit(RLIMIT_MEMLOCK, &rlim))
+ return -errno;
+
+ return 0;
+}
+
+int bpf_map_create(enum bpf_map_type map_type,
+ const char *map_name,
+ __u32 key_size,
+ __u32 value_size,
+ __u32 max_entries,
+ const struct bpf_map_create_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, map_extra);
+ union bpf_attr attr;
+ int fd;
+
+ bump_rlimit_memlock();
+
+ memset(&attr, 0, attr_sz);
+
+ if (!OPTS_VALID(opts, bpf_map_create_opts))
+ return libbpf_err(-EINVAL);
+
+ attr.map_type = map_type;
+ if (map_name && kernel_supports(NULL, FEAT_PROG_NAME))
+ libbpf_strlcpy(attr.map_name, map_name, sizeof(attr.map_name));
+ attr.key_size = key_size;
+ attr.value_size = value_size;
+ attr.max_entries = max_entries;
+
+ attr.btf_fd = OPTS_GET(opts, btf_fd, 0);
+ attr.btf_key_type_id = OPTS_GET(opts, btf_key_type_id, 0);
+ attr.btf_value_type_id = OPTS_GET(opts, btf_value_type_id, 0);
+ attr.btf_vmlinux_value_type_id = OPTS_GET(opts, btf_vmlinux_value_type_id, 0);
+
+ attr.inner_map_fd = OPTS_GET(opts, inner_map_fd, 0);
+ attr.map_flags = OPTS_GET(opts, map_flags, 0);
+ attr.map_extra = OPTS_GET(opts, map_extra, 0);
+ attr.numa_node = OPTS_GET(opts, numa_node, 0);
+ attr.map_ifindex = OPTS_GET(opts, map_ifindex, 0);
+
+ fd = sys_bpf_fd(BPF_MAP_CREATE, &attr, attr_sz);
+ return libbpf_err_errno(fd);
+}
+
+static void *
+alloc_zero_tailing_info(const void *orecord, __u32 cnt,
+ __u32 actual_rec_size, __u32 expected_rec_size)
+{
+ __u64 info_len = (__u64)actual_rec_size * cnt;
+ void *info, *nrecord;
+ int i;
+
+ info = malloc(info_len);
+ if (!info)
+ return NULL;
+
+ /* zero out bytes kernel does not understand */
+ nrecord = info;
+ for (i = 0; i < cnt; i++) {
+ memcpy(nrecord, orecord, expected_rec_size);
+ memset(nrecord + expected_rec_size, 0,
+ actual_rec_size - expected_rec_size);
+ orecord += actual_rec_size;
+ nrecord += actual_rec_size;
+ }
+
+ return info;
+}
+
+int bpf_prog_load(enum bpf_prog_type prog_type,
+ const char *prog_name, const char *license,
+ const struct bpf_insn *insns, size_t insn_cnt,
+ const struct bpf_prog_load_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, fd_array);
+ void *finfo = NULL, *linfo = NULL;
+ const char *func_info, *line_info;
+ __u32 log_size, log_level, attach_prog_fd, attach_btf_obj_fd;
+ __u32 func_info_rec_size, line_info_rec_size;
+ int fd, attempts;
+ union bpf_attr attr;
+ char *log_buf;
+
+ bump_rlimit_memlock();
+
+ if (!OPTS_VALID(opts, bpf_prog_load_opts))
+ return libbpf_err(-EINVAL);
+
+ attempts = OPTS_GET(opts, attempts, 0);
+ if (attempts < 0)
+ return libbpf_err(-EINVAL);
+ if (attempts == 0)
+ attempts = PROG_LOAD_ATTEMPTS;
+
+ memset(&attr, 0, attr_sz);
+
+ attr.prog_type = prog_type;
+ attr.expected_attach_type = OPTS_GET(opts, expected_attach_type, 0);
+
+ attr.prog_btf_fd = OPTS_GET(opts, prog_btf_fd, 0);
+ attr.prog_flags = OPTS_GET(opts, prog_flags, 0);
+ attr.prog_ifindex = OPTS_GET(opts, prog_ifindex, 0);
+ attr.kern_version = OPTS_GET(opts, kern_version, 0);
+
+ if (prog_name && kernel_supports(NULL, FEAT_PROG_NAME))
+ libbpf_strlcpy(attr.prog_name, prog_name, sizeof(attr.prog_name));
+ attr.license = ptr_to_u64(license);
+
+ if (insn_cnt > UINT_MAX)
+ return libbpf_err(-E2BIG);
+
+ attr.insns = ptr_to_u64(insns);
+ attr.insn_cnt = (__u32)insn_cnt;
+
+ attach_prog_fd = OPTS_GET(opts, attach_prog_fd, 0);
+ attach_btf_obj_fd = OPTS_GET(opts, attach_btf_obj_fd, 0);
+
+ if (attach_prog_fd && attach_btf_obj_fd)
+ return libbpf_err(-EINVAL);
+
+ attr.attach_btf_id = OPTS_GET(opts, attach_btf_id, 0);
+ if (attach_prog_fd)
+ attr.attach_prog_fd = attach_prog_fd;
+ else
+ attr.attach_btf_obj_fd = attach_btf_obj_fd;
+
+ log_buf = OPTS_GET(opts, log_buf, NULL);
+ log_size = OPTS_GET(opts, log_size, 0);
+ log_level = OPTS_GET(opts, log_level, 0);
+
+ if (!!log_buf != !!log_size)
+ return libbpf_err(-EINVAL);
+ if (log_level > (4 | 2 | 1))
+ return libbpf_err(-EINVAL);
+ if (log_level && !log_buf)
+ return libbpf_err(-EINVAL);
+
+ func_info_rec_size = OPTS_GET(opts, func_info_rec_size, 0);
+ func_info = OPTS_GET(opts, func_info, NULL);
+ attr.func_info_rec_size = func_info_rec_size;
+ attr.func_info = ptr_to_u64(func_info);
+ attr.func_info_cnt = OPTS_GET(opts, func_info_cnt, 0);
+
+ line_info_rec_size = OPTS_GET(opts, line_info_rec_size, 0);
+ line_info = OPTS_GET(opts, line_info, NULL);
+ attr.line_info_rec_size = line_info_rec_size;
+ attr.line_info = ptr_to_u64(line_info);
+ attr.line_info_cnt = OPTS_GET(opts, line_info_cnt, 0);
+
+ attr.fd_array = ptr_to_u64(OPTS_GET(opts, fd_array, NULL));
+
+ if (log_level) {
+ attr.log_buf = ptr_to_u64(log_buf);
+ attr.log_size = log_size;
+ attr.log_level = log_level;
+ }
+
+ fd = sys_bpf_prog_load(&attr, attr_sz, attempts);
+ if (fd >= 0)
+ return fd;
+
+ /* After bpf_prog_load, the kernel may modify certain attributes
+ * to give user space a hint how to deal with loading failure.
+ * Check to see whether we can make some changes and load again.
+ */
+ while (errno == E2BIG && (!finfo || !linfo)) {
+ if (!finfo && attr.func_info_cnt &&
+ attr.func_info_rec_size < func_info_rec_size) {
+ /* try with corrected func info records */
+ finfo = alloc_zero_tailing_info(func_info,
+ attr.func_info_cnt,
+ func_info_rec_size,
+ attr.func_info_rec_size);
+ if (!finfo) {
+ errno = E2BIG;
+ goto done;
+ }
+
+ attr.func_info = ptr_to_u64(finfo);
+ attr.func_info_rec_size = func_info_rec_size;
+ } else if (!linfo && attr.line_info_cnt &&
+ attr.line_info_rec_size < line_info_rec_size) {
+ linfo = alloc_zero_tailing_info(line_info,
+ attr.line_info_cnt,
+ line_info_rec_size,
+ attr.line_info_rec_size);
+ if (!linfo) {
+ errno = E2BIG;
+ goto done;
+ }
+
+ attr.line_info = ptr_to_u64(linfo);
+ attr.line_info_rec_size = line_info_rec_size;
+ } else {
+ break;
+ }
+
+ fd = sys_bpf_prog_load(&attr, attr_sz, attempts);
+ if (fd >= 0)
+ goto done;
+ }
+
+ if (log_level == 0 && log_buf) {
+ /* log_level == 0 with non-NULL log_buf requires retrying on error
+ * with log_level == 1 and log_buf/log_buf_size set, to get details of
+ * failure
+ */
+ attr.log_buf = ptr_to_u64(log_buf);
+ attr.log_size = log_size;
+ attr.log_level = 1;
+
+ fd = sys_bpf_prog_load(&attr, attr_sz, attempts);
+ }
+done:
+ /* free() doesn't affect errno, so we don't need to restore it */
+ free(finfo);
+ free(linfo);
+ return libbpf_err_errno(fd);
+}
+
+int bpf_map_update_elem(int fd, const void *key, const void *value,
+ __u64 flags)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, flags);
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.map_fd = fd;
+ attr.key = ptr_to_u64(key);
+ attr.value = ptr_to_u64(value);
+ attr.flags = flags;
+
+ ret = sys_bpf(BPF_MAP_UPDATE_ELEM, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_map_lookup_elem(int fd, const void *key, void *value)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, flags);
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.map_fd = fd;
+ attr.key = ptr_to_u64(key);
+ attr.value = ptr_to_u64(value);
+
+ ret = sys_bpf(BPF_MAP_LOOKUP_ELEM, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_map_lookup_elem_flags(int fd, const void *key, void *value, __u64 flags)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, flags);
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.map_fd = fd;
+ attr.key = ptr_to_u64(key);
+ attr.value = ptr_to_u64(value);
+ attr.flags = flags;
+
+ ret = sys_bpf(BPF_MAP_LOOKUP_ELEM, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_map_lookup_and_delete_elem(int fd, const void *key, void *value)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, flags);
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.map_fd = fd;
+ attr.key = ptr_to_u64(key);
+ attr.value = ptr_to_u64(value);
+
+ ret = sys_bpf(BPF_MAP_LOOKUP_AND_DELETE_ELEM, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_map_lookup_and_delete_elem_flags(int fd, const void *key, void *value, __u64 flags)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, flags);
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.map_fd = fd;
+ attr.key = ptr_to_u64(key);
+ attr.value = ptr_to_u64(value);
+ attr.flags = flags;
+
+ ret = sys_bpf(BPF_MAP_LOOKUP_AND_DELETE_ELEM, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_map_delete_elem(int fd, const void *key)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, flags);
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.map_fd = fd;
+ attr.key = ptr_to_u64(key);
+
+ ret = sys_bpf(BPF_MAP_DELETE_ELEM, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_map_delete_elem_flags(int fd, const void *key, __u64 flags)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, flags);
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.map_fd = fd;
+ attr.key = ptr_to_u64(key);
+ attr.flags = flags;
+
+ ret = sys_bpf(BPF_MAP_DELETE_ELEM, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_map_get_next_key(int fd, const void *key, void *next_key)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, next_key);
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.map_fd = fd;
+ attr.key = ptr_to_u64(key);
+ attr.next_key = ptr_to_u64(next_key);
+
+ ret = sys_bpf(BPF_MAP_GET_NEXT_KEY, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_map_freeze(int fd)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, map_fd);
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.map_fd = fd;
+
+ ret = sys_bpf(BPF_MAP_FREEZE, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+static int bpf_map_batch_common(int cmd, int fd, void *in_batch,
+ void *out_batch, void *keys, void *values,
+ __u32 *count,
+ const struct bpf_map_batch_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, batch);
+ union bpf_attr attr;
+ int ret;
+
+ if (!OPTS_VALID(opts, bpf_map_batch_opts))
+ return libbpf_err(-EINVAL);
+
+ memset(&attr, 0, attr_sz);
+ attr.batch.map_fd = fd;
+ attr.batch.in_batch = ptr_to_u64(in_batch);
+ attr.batch.out_batch = ptr_to_u64(out_batch);
+ attr.batch.keys = ptr_to_u64(keys);
+ attr.batch.values = ptr_to_u64(values);
+ attr.batch.count = *count;
+ attr.batch.elem_flags = OPTS_GET(opts, elem_flags, 0);
+ attr.batch.flags = OPTS_GET(opts, flags, 0);
+
+ ret = sys_bpf(cmd, &attr, attr_sz);
+ *count = attr.batch.count;
+
+ return libbpf_err_errno(ret);
+}
+
+int bpf_map_delete_batch(int fd, const void *keys, __u32 *count,
+ const struct bpf_map_batch_opts *opts)
+{
+ return bpf_map_batch_common(BPF_MAP_DELETE_BATCH, fd, NULL,
+ NULL, (void *)keys, NULL, count, opts);
+}
+
+int bpf_map_lookup_batch(int fd, void *in_batch, void *out_batch, void *keys,
+ void *values, __u32 *count,
+ const struct bpf_map_batch_opts *opts)
+{
+ return bpf_map_batch_common(BPF_MAP_LOOKUP_BATCH, fd, in_batch,
+ out_batch, keys, values, count, opts);
+}
+
+int bpf_map_lookup_and_delete_batch(int fd, void *in_batch, void *out_batch,
+ void *keys, void *values, __u32 *count,
+ const struct bpf_map_batch_opts *opts)
+{
+ return bpf_map_batch_common(BPF_MAP_LOOKUP_AND_DELETE_BATCH,
+ fd, in_batch, out_batch, keys, values,
+ count, opts);
+}
+
+int bpf_map_update_batch(int fd, const void *keys, const void *values, __u32 *count,
+ const struct bpf_map_batch_opts *opts)
+{
+ return bpf_map_batch_common(BPF_MAP_UPDATE_BATCH, fd, NULL, NULL,
+ (void *)keys, (void *)values, count, opts);
+}
+
+int bpf_obj_pin(int fd, const char *pathname)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, file_flags);
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.pathname = ptr_to_u64((void *)pathname);
+ attr.bpf_fd = fd;
+
+ ret = sys_bpf(BPF_OBJ_PIN, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_obj_get(const char *pathname)
+{
+ return bpf_obj_get_opts(pathname, NULL);
+}
+
+int bpf_obj_get_opts(const char *pathname, const struct bpf_obj_get_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, file_flags);
+ union bpf_attr attr;
+ int fd;
+
+ if (!OPTS_VALID(opts, bpf_obj_get_opts))
+ return libbpf_err(-EINVAL);
+
+ memset(&attr, 0, attr_sz);
+ attr.pathname = ptr_to_u64((void *)pathname);
+ attr.file_flags = OPTS_GET(opts, file_flags, 0);
+
+ fd = sys_bpf_fd(BPF_OBJ_GET, &attr, attr_sz);
+ return libbpf_err_errno(fd);
+}
+
+int bpf_prog_attach(int prog_fd, int target_fd, enum bpf_attach_type type,
+ unsigned int flags)
+{
+ DECLARE_LIBBPF_OPTS(bpf_prog_attach_opts, opts,
+ .flags = flags,
+ );
+
+ return bpf_prog_attach_opts(prog_fd, target_fd, type, &opts);
+}
+
+int bpf_prog_attach_opts(int prog_fd, int target_fd,
+ enum bpf_attach_type type,
+ const struct bpf_prog_attach_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, replace_bpf_fd);
+ union bpf_attr attr;
+ int ret;
+
+ if (!OPTS_VALID(opts, bpf_prog_attach_opts))
+ return libbpf_err(-EINVAL);
+
+ memset(&attr, 0, attr_sz);
+ attr.target_fd = target_fd;
+ attr.attach_bpf_fd = prog_fd;
+ attr.attach_type = type;
+ attr.attach_flags = OPTS_GET(opts, flags, 0);
+ attr.replace_bpf_fd = OPTS_GET(opts, replace_prog_fd, 0);
+
+ ret = sys_bpf(BPF_PROG_ATTACH, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_prog_detach(int target_fd, enum bpf_attach_type type)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, replace_bpf_fd);
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.target_fd = target_fd;
+ attr.attach_type = type;
+
+ ret = sys_bpf(BPF_PROG_DETACH, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_prog_detach2(int prog_fd, int target_fd, enum bpf_attach_type type)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, replace_bpf_fd);
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.target_fd = target_fd;
+ attr.attach_bpf_fd = prog_fd;
+ attr.attach_type = type;
+
+ ret = sys_bpf(BPF_PROG_DETACH, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_link_create(int prog_fd, int target_fd,
+ enum bpf_attach_type attach_type,
+ const struct bpf_link_create_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, link_create);
+ __u32 target_btf_id, iter_info_len;
+ union bpf_attr attr;
+ int fd, err;
+
+ if (!OPTS_VALID(opts, bpf_link_create_opts))
+ return libbpf_err(-EINVAL);
+
+ iter_info_len = OPTS_GET(opts, iter_info_len, 0);
+ target_btf_id = OPTS_GET(opts, target_btf_id, 0);
+
+ /* validate we don't have unexpected combinations of non-zero fields */
+ if (iter_info_len || target_btf_id) {
+ if (iter_info_len && target_btf_id)
+ return libbpf_err(-EINVAL);
+ if (!OPTS_ZEROED(opts, target_btf_id))
+ return libbpf_err(-EINVAL);
+ }
+
+ memset(&attr, 0, attr_sz);
+ attr.link_create.prog_fd = prog_fd;
+ attr.link_create.target_fd = target_fd;
+ attr.link_create.attach_type = attach_type;
+ attr.link_create.flags = OPTS_GET(opts, flags, 0);
+
+ if (target_btf_id) {
+ attr.link_create.target_btf_id = target_btf_id;
+ goto proceed;
+ }
+
+ switch (attach_type) {
+ case BPF_TRACE_ITER:
+ attr.link_create.iter_info = ptr_to_u64(OPTS_GET(opts, iter_info, (void *)0));
+ attr.link_create.iter_info_len = iter_info_len;
+ break;
+ case BPF_PERF_EVENT:
+ attr.link_create.perf_event.bpf_cookie = OPTS_GET(opts, perf_event.bpf_cookie, 0);
+ if (!OPTS_ZEROED(opts, perf_event))
+ return libbpf_err(-EINVAL);
+ break;
+ case BPF_TRACE_KPROBE_MULTI:
+ attr.link_create.kprobe_multi.flags = OPTS_GET(opts, kprobe_multi.flags, 0);
+ attr.link_create.kprobe_multi.cnt = OPTS_GET(opts, kprobe_multi.cnt, 0);
+ attr.link_create.kprobe_multi.syms = ptr_to_u64(OPTS_GET(opts, kprobe_multi.syms, 0));
+ attr.link_create.kprobe_multi.addrs = ptr_to_u64(OPTS_GET(opts, kprobe_multi.addrs, 0));
+ attr.link_create.kprobe_multi.cookies = ptr_to_u64(OPTS_GET(opts, kprobe_multi.cookies, 0));
+ if (!OPTS_ZEROED(opts, kprobe_multi))
+ return libbpf_err(-EINVAL);
+ break;
+ case BPF_TRACE_FENTRY:
+ case BPF_TRACE_FEXIT:
+ case BPF_MODIFY_RETURN:
+ case BPF_LSM_MAC:
+ attr.link_create.tracing.cookie = OPTS_GET(opts, tracing.cookie, 0);
+ if (!OPTS_ZEROED(opts, tracing))
+ return libbpf_err(-EINVAL);
+ break;
+ default:
+ if (!OPTS_ZEROED(opts, flags))
+ return libbpf_err(-EINVAL);
+ break;
+ }
+proceed:
+ fd = sys_bpf_fd(BPF_LINK_CREATE, &attr, attr_sz);
+ if (fd >= 0)
+ return fd;
+ /* we'll get EINVAL if LINK_CREATE doesn't support attaching fentry
+ * and other similar programs
+ */
+ err = -errno;
+ if (err != -EINVAL)
+ return libbpf_err(err);
+
+ /* if user used features not supported by
+ * BPF_RAW_TRACEPOINT_OPEN command, then just give up immediately
+ */
+ if (attr.link_create.target_fd || attr.link_create.target_btf_id)
+ return libbpf_err(err);
+ if (!OPTS_ZEROED(opts, sz))
+ return libbpf_err(err);
+
+ /* otherwise, for few select kinds of programs that can be
+ * attached using BPF_RAW_TRACEPOINT_OPEN command, try that as
+ * a fallback for older kernels
+ */
+ switch (attach_type) {
+ case BPF_TRACE_RAW_TP:
+ case BPF_LSM_MAC:
+ case BPF_TRACE_FENTRY:
+ case BPF_TRACE_FEXIT:
+ case BPF_MODIFY_RETURN:
+ return bpf_raw_tracepoint_open(NULL, prog_fd);
+ default:
+ return libbpf_err(err);
+ }
+}
+
+int bpf_link_detach(int link_fd)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, link_detach);
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.link_detach.link_fd = link_fd;
+
+ ret = sys_bpf(BPF_LINK_DETACH, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_link_update(int link_fd, int new_prog_fd,
+ const struct bpf_link_update_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, link_update);
+ union bpf_attr attr;
+ int ret;
+
+ if (!OPTS_VALID(opts, bpf_link_update_opts))
+ return libbpf_err(-EINVAL);
+
+ memset(&attr, 0, attr_sz);
+ attr.link_update.link_fd = link_fd;
+ attr.link_update.new_prog_fd = new_prog_fd;
+ attr.link_update.flags = OPTS_GET(opts, flags, 0);
+ attr.link_update.old_prog_fd = OPTS_GET(opts, old_prog_fd, 0);
+
+ ret = sys_bpf(BPF_LINK_UPDATE, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
+
+int bpf_iter_create(int link_fd)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, iter_create);
+ union bpf_attr attr;
+ int fd;
+
+ memset(&attr, 0, attr_sz);
+ attr.iter_create.link_fd = link_fd;
+
+ fd = sys_bpf_fd(BPF_ITER_CREATE, &attr, attr_sz);
+ return libbpf_err_errno(fd);
+}
+
+int bpf_prog_query_opts(int target_fd,
+ enum bpf_attach_type type,
+ struct bpf_prog_query_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, query);
+ union bpf_attr attr;
+ int ret;
+
+ if (!OPTS_VALID(opts, bpf_prog_query_opts))
+ return libbpf_err(-EINVAL);
+
+ memset(&attr, 0, attr_sz);
+
+ attr.query.target_fd = target_fd;
+ attr.query.attach_type = type;
+ attr.query.query_flags = OPTS_GET(opts, query_flags, 0);
+ attr.query.prog_cnt = OPTS_GET(opts, prog_cnt, 0);
+ attr.query.prog_ids = ptr_to_u64(OPTS_GET(opts, prog_ids, NULL));
+ attr.query.prog_attach_flags = ptr_to_u64(OPTS_GET(opts, prog_attach_flags, NULL));
+
+ ret = sys_bpf(BPF_PROG_QUERY, &attr, attr_sz);
+
+ OPTS_SET(opts, attach_flags, attr.query.attach_flags);
+ OPTS_SET(opts, prog_cnt, attr.query.prog_cnt);
+
+ return libbpf_err_errno(ret);
+}
+
+int bpf_prog_query(int target_fd, enum bpf_attach_type type, __u32 query_flags,
+ __u32 *attach_flags, __u32 *prog_ids, __u32 *prog_cnt)
+{
+ LIBBPF_OPTS(bpf_prog_query_opts, opts);
+ int ret;
+
+ opts.query_flags = query_flags;
+ opts.prog_ids = prog_ids;
+ opts.prog_cnt = *prog_cnt;
+
+ ret = bpf_prog_query_opts(target_fd, type, &opts);
+
+ if (attach_flags)
+ *attach_flags = opts.attach_flags;
+ *prog_cnt = opts.prog_cnt;
+
+ return libbpf_err_errno(ret);
+}
+
+int bpf_prog_test_run_opts(int prog_fd, struct bpf_test_run_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, test);
+ union bpf_attr attr;
+ int ret;
+
+ if (!OPTS_VALID(opts, bpf_test_run_opts))
+ return libbpf_err(-EINVAL);
+
+ memset(&attr, 0, attr_sz);
+ attr.test.prog_fd = prog_fd;
+ attr.test.batch_size = OPTS_GET(opts, batch_size, 0);
+ attr.test.cpu = OPTS_GET(opts, cpu, 0);
+ attr.test.flags = OPTS_GET(opts, flags, 0);
+ attr.test.repeat = OPTS_GET(opts, repeat, 0);
+ attr.test.duration = OPTS_GET(opts, duration, 0);
+ attr.test.ctx_size_in = OPTS_GET(opts, ctx_size_in, 0);
+ attr.test.ctx_size_out = OPTS_GET(opts, ctx_size_out, 0);
+ attr.test.data_size_in = OPTS_GET(opts, data_size_in, 0);
+ attr.test.data_size_out = OPTS_GET(opts, data_size_out, 0);
+ attr.test.ctx_in = ptr_to_u64(OPTS_GET(opts, ctx_in, NULL));
+ attr.test.ctx_out = ptr_to_u64(OPTS_GET(opts, ctx_out, NULL));
+ attr.test.data_in = ptr_to_u64(OPTS_GET(opts, data_in, NULL));
+ attr.test.data_out = ptr_to_u64(OPTS_GET(opts, data_out, NULL));
+
+ ret = sys_bpf(BPF_PROG_TEST_RUN, &attr, attr_sz);
+
+ OPTS_SET(opts, data_size_out, attr.test.data_size_out);
+ OPTS_SET(opts, ctx_size_out, attr.test.ctx_size_out);
+ OPTS_SET(opts, duration, attr.test.duration);
+ OPTS_SET(opts, retval, attr.test.retval);
+
+ return libbpf_err_errno(ret);
+}
+
+static int bpf_obj_get_next_id(__u32 start_id, __u32 *next_id, int cmd)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, open_flags);
+ union bpf_attr attr;
+ int err;
+
+ memset(&attr, 0, attr_sz);
+ attr.start_id = start_id;
+
+ err = sys_bpf(cmd, &attr, attr_sz);
+ if (!err)
+ *next_id = attr.next_id;
+
+ return libbpf_err_errno(err);
+}
+
+int bpf_prog_get_next_id(__u32 start_id, __u32 *next_id)
+{
+ return bpf_obj_get_next_id(start_id, next_id, BPF_PROG_GET_NEXT_ID);
+}
+
+int bpf_map_get_next_id(__u32 start_id, __u32 *next_id)
+{
+ return bpf_obj_get_next_id(start_id, next_id, BPF_MAP_GET_NEXT_ID);
+}
+
+int bpf_btf_get_next_id(__u32 start_id, __u32 *next_id)
+{
+ return bpf_obj_get_next_id(start_id, next_id, BPF_BTF_GET_NEXT_ID);
+}
+
+int bpf_link_get_next_id(__u32 start_id, __u32 *next_id)
+{
+ return bpf_obj_get_next_id(start_id, next_id, BPF_LINK_GET_NEXT_ID);
+}
+
+int bpf_prog_get_fd_by_id_opts(__u32 id,
+ const struct bpf_get_fd_by_id_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, open_flags);
+ union bpf_attr attr;
+ int fd;
+
+ if (!OPTS_VALID(opts, bpf_get_fd_by_id_opts))
+ return libbpf_err(-EINVAL);
+
+ memset(&attr, 0, attr_sz);
+ attr.prog_id = id;
+ attr.open_flags = OPTS_GET(opts, open_flags, 0);
+
+ fd = sys_bpf_fd(BPF_PROG_GET_FD_BY_ID, &attr, attr_sz);
+ return libbpf_err_errno(fd);
+}
+
+int bpf_prog_get_fd_by_id(__u32 id)
+{
+ return bpf_prog_get_fd_by_id_opts(id, NULL);
+}
+
+int bpf_map_get_fd_by_id_opts(__u32 id,
+ const struct bpf_get_fd_by_id_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, open_flags);
+ union bpf_attr attr;
+ int fd;
+
+ if (!OPTS_VALID(opts, bpf_get_fd_by_id_opts))
+ return libbpf_err(-EINVAL);
+
+ memset(&attr, 0, attr_sz);
+ attr.map_id = id;
+ attr.open_flags = OPTS_GET(opts, open_flags, 0);
+
+ fd = sys_bpf_fd(BPF_MAP_GET_FD_BY_ID, &attr, attr_sz);
+ return libbpf_err_errno(fd);
+}
+
+int bpf_map_get_fd_by_id(__u32 id)
+{
+ return bpf_map_get_fd_by_id_opts(id, NULL);
+}
+
+int bpf_btf_get_fd_by_id_opts(__u32 id,
+ const struct bpf_get_fd_by_id_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, open_flags);
+ union bpf_attr attr;
+ int fd;
+
+ if (!OPTS_VALID(opts, bpf_get_fd_by_id_opts))
+ return libbpf_err(-EINVAL);
+
+ memset(&attr, 0, attr_sz);
+ attr.btf_id = id;
+ attr.open_flags = OPTS_GET(opts, open_flags, 0);
+
+ fd = sys_bpf_fd(BPF_BTF_GET_FD_BY_ID, &attr, attr_sz);
+ return libbpf_err_errno(fd);
+}
+
+int bpf_btf_get_fd_by_id(__u32 id)
+{
+ return bpf_btf_get_fd_by_id_opts(id, NULL);
+}
+
+int bpf_link_get_fd_by_id_opts(__u32 id,
+ const struct bpf_get_fd_by_id_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, open_flags);
+ union bpf_attr attr;
+ int fd;
+
+ if (!OPTS_VALID(opts, bpf_get_fd_by_id_opts))
+ return libbpf_err(-EINVAL);
+
+ memset(&attr, 0, attr_sz);
+ attr.link_id = id;
+ attr.open_flags = OPTS_GET(opts, open_flags, 0);
+
+ fd = sys_bpf_fd(BPF_LINK_GET_FD_BY_ID, &attr, attr_sz);
+ return libbpf_err_errno(fd);
+}
+
+int bpf_link_get_fd_by_id(__u32 id)
+{
+ return bpf_link_get_fd_by_id_opts(id, NULL);
+}
+
+int bpf_obj_get_info_by_fd(int bpf_fd, void *info, __u32 *info_len)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, info);
+ union bpf_attr attr;
+ int err;
+
+ memset(&attr, 0, attr_sz);
+ attr.info.bpf_fd = bpf_fd;
+ attr.info.info_len = *info_len;
+ attr.info.info = ptr_to_u64(info);
+
+ err = sys_bpf(BPF_OBJ_GET_INFO_BY_FD, &attr, attr_sz);
+ if (!err)
+ *info_len = attr.info.info_len;
+ return libbpf_err_errno(err);
+}
+
+int bpf_raw_tracepoint_open(const char *name, int prog_fd)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, raw_tracepoint);
+ union bpf_attr attr;
+ int fd;
+
+ memset(&attr, 0, attr_sz);
+ attr.raw_tracepoint.name = ptr_to_u64(name);
+ attr.raw_tracepoint.prog_fd = prog_fd;
+
+ fd = sys_bpf_fd(BPF_RAW_TRACEPOINT_OPEN, &attr, attr_sz);
+ return libbpf_err_errno(fd);
+}
+
+int bpf_btf_load(const void *btf_data, size_t btf_size, const struct bpf_btf_load_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, btf_log_level);
+ union bpf_attr attr;
+ char *log_buf;
+ size_t log_size;
+ __u32 log_level;
+ int fd;
+
+ bump_rlimit_memlock();
+
+ memset(&attr, 0, attr_sz);
+
+ if (!OPTS_VALID(opts, bpf_btf_load_opts))
+ return libbpf_err(-EINVAL);
+
+ log_buf = OPTS_GET(opts, log_buf, NULL);
+ log_size = OPTS_GET(opts, log_size, 0);
+ log_level = OPTS_GET(opts, log_level, 0);
+
+ if (log_size > UINT_MAX)
+ return libbpf_err(-EINVAL);
+ if (log_size && !log_buf)
+ return libbpf_err(-EINVAL);
+
+ attr.btf = ptr_to_u64(btf_data);
+ attr.btf_size = btf_size;
+ /* log_level == 0 and log_buf != NULL means "try loading without
+ * log_buf, but retry with log_buf and log_level=1 on error", which is
+ * consistent across low-level and high-level BTF and program loading
+ * APIs within libbpf and provides a sensible behavior in practice
+ */
+ if (log_level) {
+ attr.btf_log_buf = ptr_to_u64(log_buf);
+ attr.btf_log_size = (__u32)log_size;
+ attr.btf_log_level = log_level;
+ }
+
+ fd = sys_bpf_fd(BPF_BTF_LOAD, &attr, attr_sz);
+ if (fd < 0 && log_buf && log_level == 0) {
+ attr.btf_log_buf = ptr_to_u64(log_buf);
+ attr.btf_log_size = (__u32)log_size;
+ attr.btf_log_level = 1;
+ fd = sys_bpf_fd(BPF_BTF_LOAD, &attr, attr_sz);
+ }
+ return libbpf_err_errno(fd);
+}
+
+int bpf_task_fd_query(int pid, int fd, __u32 flags, char *buf, __u32 *buf_len,
+ __u32 *prog_id, __u32 *fd_type, __u64 *probe_offset,
+ __u64 *probe_addr)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, task_fd_query);
+ union bpf_attr attr;
+ int err;
+
+ memset(&attr, 0, attr_sz);
+ attr.task_fd_query.pid = pid;
+ attr.task_fd_query.fd = fd;
+ attr.task_fd_query.flags = flags;
+ attr.task_fd_query.buf = ptr_to_u64(buf);
+ attr.task_fd_query.buf_len = *buf_len;
+
+ err = sys_bpf(BPF_TASK_FD_QUERY, &attr, attr_sz);
+
+ *buf_len = attr.task_fd_query.buf_len;
+ *prog_id = attr.task_fd_query.prog_id;
+ *fd_type = attr.task_fd_query.fd_type;
+ *probe_offset = attr.task_fd_query.probe_offset;
+ *probe_addr = attr.task_fd_query.probe_addr;
+
+ return libbpf_err_errno(err);
+}
+
+int bpf_enable_stats(enum bpf_stats_type type)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, enable_stats);
+ union bpf_attr attr;
+ int fd;
+
+ memset(&attr, 0, attr_sz);
+ attr.enable_stats.type = type;
+
+ fd = sys_bpf_fd(BPF_ENABLE_STATS, &attr, attr_sz);
+ return libbpf_err_errno(fd);
+}
+
+int bpf_prog_bind_map(int prog_fd, int map_fd,
+ const struct bpf_prog_bind_opts *opts)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, prog_bind_map);
+ union bpf_attr attr;
+ int ret;
+
+ if (!OPTS_VALID(opts, bpf_prog_bind_opts))
+ return libbpf_err(-EINVAL);
+
+ memset(&attr, 0, attr_sz);
+ attr.prog_bind_map.prog_fd = prog_fd;
+ attr.prog_bind_map.map_fd = map_fd;
+ attr.prog_bind_map.flags = OPTS_GET(opts, flags, 0);
+
+ ret = sys_bpf(BPF_PROG_BIND_MAP, &attr, attr_sz);
+ return libbpf_err_errno(ret);
+}
diff --git a/src/bpf.h b/src/bpf.h
new file mode 100644
index 0000000..7468978
--- /dev/null
+++ b/src/bpf.h
@@ -0,0 +1,461 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+/*
+ * common eBPF ELF operations.
+ *
+ * Copyright (C) 2013-2015 Alexei Starovoitov <ast@kernel.org>
+ * Copyright (C) 2015 Wang Nan <wangnan0@huawei.com>
+ * Copyright (C) 2015 Huawei Inc.
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation;
+ * version 2.1 of the License (not later!)
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this program; if not, see <http://www.gnu.org/licenses>
+ */
+#ifndef __LIBBPF_BPF_H
+#define __LIBBPF_BPF_H
+
+#include <linux/bpf.h>
+#include <stdbool.h>
+#include <stddef.h>
+#include <stdint.h>
+
+#include "libbpf_common.h"
+#include "libbpf_legacy.h"
+
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+int libbpf_set_memlock_rlim(size_t memlock_bytes);
+
+struct bpf_map_create_opts {
+ size_t sz; /* size of this struct for forward/backward compatibility */
+
+ __u32 btf_fd;
+ __u32 btf_key_type_id;
+ __u32 btf_value_type_id;
+ __u32 btf_vmlinux_value_type_id;
+
+ __u32 inner_map_fd;
+ __u32 map_flags;
+ __u64 map_extra;
+
+ __u32 numa_node;
+ __u32 map_ifindex;
+};
+#define bpf_map_create_opts__last_field map_ifindex
+
+LIBBPF_API int bpf_map_create(enum bpf_map_type map_type,
+ const char *map_name,
+ __u32 key_size,
+ __u32 value_size,
+ __u32 max_entries,
+ const struct bpf_map_create_opts *opts);
+
+struct bpf_prog_load_opts {
+ size_t sz; /* size of this struct for forward/backward compatibility */
+
+ /* libbpf can retry BPF_PROG_LOAD command if bpf() syscall returns
+ * -EAGAIN. This field determines how many attempts libbpf has to
+ * make. If not specified, libbpf will use default value of 5.
+ */
+ int attempts;
+
+ enum bpf_attach_type expected_attach_type;
+ __u32 prog_btf_fd;
+ __u32 prog_flags;
+ __u32 prog_ifindex;
+ __u32 kern_version;
+
+ __u32 attach_btf_id;
+ __u32 attach_prog_fd;
+ __u32 attach_btf_obj_fd;
+
+ const int *fd_array;
+
+ /* .BTF.ext func info data */
+ const void *func_info;
+ __u32 func_info_cnt;
+ __u32 func_info_rec_size;
+
+ /* .BTF.ext line info data */
+ const void *line_info;
+ __u32 line_info_cnt;
+ __u32 line_info_rec_size;
+
+ /* verifier log options */
+ __u32 log_level;
+ __u32 log_size;
+ char *log_buf;
+};
+#define bpf_prog_load_opts__last_field log_buf
+
+LIBBPF_API int bpf_prog_load(enum bpf_prog_type prog_type,
+ const char *prog_name, const char *license,
+ const struct bpf_insn *insns, size_t insn_cnt,
+ const struct bpf_prog_load_opts *opts);
+
+/* Flags to direct loading requirements */
+#define MAPS_RELAX_COMPAT 0x01
+
+/* Recommended log buffer size */
+#define BPF_LOG_BUF_SIZE (UINT32_MAX >> 8) /* verifier maximum in kernels <= 5.1 */
+
+struct bpf_btf_load_opts {
+ size_t sz; /* size of this struct for forward/backward compatibility */
+
+ /* kernel log options */
+ char *log_buf;
+ __u32 log_level;
+ __u32 log_size;
+};
+#define bpf_btf_load_opts__last_field log_size
+
+LIBBPF_API int bpf_btf_load(const void *btf_data, size_t btf_size,
+ const struct bpf_btf_load_opts *opts);
+
+LIBBPF_API int bpf_map_update_elem(int fd, const void *key, const void *value,
+ __u64 flags);
+
+LIBBPF_API int bpf_map_lookup_elem(int fd, const void *key, void *value);
+LIBBPF_API int bpf_map_lookup_elem_flags(int fd, const void *key, void *value,
+ __u64 flags);
+LIBBPF_API int bpf_map_lookup_and_delete_elem(int fd, const void *key,
+ void *value);
+LIBBPF_API int bpf_map_lookup_and_delete_elem_flags(int fd, const void *key,
+ void *value, __u64 flags);
+LIBBPF_API int bpf_map_delete_elem(int fd, const void *key);
+LIBBPF_API int bpf_map_delete_elem_flags(int fd, const void *key, __u64 flags);
+LIBBPF_API int bpf_map_get_next_key(int fd, const void *key, void *next_key);
+LIBBPF_API int bpf_map_freeze(int fd);
+
+struct bpf_map_batch_opts {
+ size_t sz; /* size of this struct for forward/backward compatibility */
+ __u64 elem_flags;
+ __u64 flags;
+};
+#define bpf_map_batch_opts__last_field flags
+
+
+/**
+ * @brief **bpf_map_delete_batch()** allows for batch deletion of multiple
+ * elements in a BPF map.
+ *
+ * @param fd BPF map file descriptor
+ * @param keys pointer to an array of *count* keys
+ * @param count input and output parameter; on input **count** represents the
+ * number of elements in the map to delete in batch;
+ * on output if a non-EFAULT error is returned, **count** represents the number of deleted
+ * elements if the output **count** value is not equal to the input **count** value
+ * If EFAULT is returned, **count** should not be trusted to be correct.
+ * @param opts options for configuring the way the batch deletion works
+ * @return 0, on success; negative error code, otherwise (errno is also set to
+ * the error code)
+ */
+LIBBPF_API int bpf_map_delete_batch(int fd, const void *keys,
+ __u32 *count,
+ const struct bpf_map_batch_opts *opts);
+
+/**
+ * @brief **bpf_map_lookup_batch()** allows for batch lookup of BPF map elements.
+ *
+ * The parameter *in_batch* is the address of the first element in the batch to read.
+ * *out_batch* is an output parameter that should be passed as *in_batch* to subsequent
+ * calls to **bpf_map_lookup_batch()**. NULL can be passed for *in_batch* to indicate
+ * that the batched lookup starts from the beginning of the map.
+ *
+ * The *keys* and *values* are output parameters which must point to memory large enough to
+ * hold *count* items based on the key and value size of the map *map_fd*. The *keys*
+ * buffer must be of *key_size* * *count*. The *values* buffer must be of
+ * *value_size* * *count*.
+ *
+ * @param fd BPF map file descriptor
+ * @param in_batch address of the first element in batch to read, can pass NULL to
+ * indicate that the batched lookup starts from the beginning of the map.
+ * @param out_batch output parameter that should be passed to next call as *in_batch*
+ * @param keys pointer to an array large enough for *count* keys
+ * @param values pointer to an array large enough for *count* values
+ * @param count input and output parameter; on input it's the number of elements
+ * in the map to read in batch; on output it's the number of elements that were
+ * successfully read.
+ * If a non-EFAULT error is returned, count will be set as the number of elements
+ * that were read before the error occurred.
+ * If EFAULT is returned, **count** should not be trusted to be correct.
+ * @param opts options for configuring the way the batch lookup works
+ * @return 0, on success; negative error code, otherwise (errno is also set to
+ * the error code)
+ */
+LIBBPF_API int bpf_map_lookup_batch(int fd, void *in_batch, void *out_batch,
+ void *keys, void *values, __u32 *count,
+ const struct bpf_map_batch_opts *opts);
+
+/**
+ * @brief **bpf_map_lookup_and_delete_batch()** allows for batch lookup and deletion
+ * of BPF map elements where each element is deleted after being retrieved.
+ *
+ * @param fd BPF map file descriptor
+ * @param in_batch address of the first element in batch to read, can pass NULL to
+ * get address of the first element in *out_batch*
+ * @param out_batch output parameter that should be passed to next call as *in_batch*
+ * @param keys pointer to an array of *count* keys
+ * @param values pointer to an array large enough for *count* values
+ * @param count input and output parameter; on input it's the number of elements
+ * in the map to read and delete in batch; on output it represents the number of
+ * elements that were successfully read and deleted
+ * If a non-**EFAULT** error code is returned and if the output **count** value
+ * is not equal to the input **count** value, up to **count** elements may
+ * have been deleted.
+ * if **EFAULT** is returned up to *count* elements may have been deleted without
+ * being returned via the *keys* and *values* output parameters.
+ * @param opts options for configuring the way the batch lookup and delete works
+ * @return 0, on success; negative error code, otherwise (errno is also set to
+ * the error code)
+ */
+LIBBPF_API int bpf_map_lookup_and_delete_batch(int fd, void *in_batch,
+ void *out_batch, void *keys,
+ void *values, __u32 *count,
+ const struct bpf_map_batch_opts *opts);
+
+/**
+ * @brief **bpf_map_update_batch()** updates multiple elements in a map
+ * by specifying keys and their corresponding values.
+ *
+ * The *keys* and *values* parameters must point to memory large enough
+ * to hold *count* items based on the key and value size of the map.
+ *
+ * The *opts* parameter can be used to control how *bpf_map_update_batch()*
+ * should handle keys that either do or do not already exist in the map.
+ * In particular the *flags* parameter of *bpf_map_batch_opts* can be
+ * one of the following:
+ *
+ * Note that *count* is an input and output parameter, where on output it
+ * represents how many elements were successfully updated. Also note that if
+ * **EFAULT** then *count* should not be trusted to be correct.
+ *
+ * **BPF_ANY**
+ * Create new elements or update existing.
+ *
+ * **BPF_NOEXIST**
+ * Create new elements only if they do not exist.
+ *
+ * **BPF_EXIST**
+ * Update existing elements.
+ *
+ * **BPF_F_LOCK**
+ * Update spin_lock-ed map elements. This must be
+ * specified if the map value contains a spinlock.
+ *
+ * @param fd BPF map file descriptor
+ * @param keys pointer to an array of *count* keys
+ * @param values pointer to an array of *count* values
+ * @param count input and output parameter; on input it's the number of elements
+ * in the map to update in batch; on output if a non-EFAULT error is returned,
+ * **count** represents the number of updated elements if the output **count**
+ * value is not equal to the input **count** value.
+ * If EFAULT is returned, **count** should not be trusted to be correct.
+ * @param opts options for configuring the way the batch update works
+ * @return 0, on success; negative error code, otherwise (errno is also set to
+ * the error code)
+ */
+LIBBPF_API int bpf_map_update_batch(int fd, const void *keys, const void *values,
+ __u32 *count,
+ const struct bpf_map_batch_opts *opts);
+
+struct bpf_obj_get_opts {
+ size_t sz; /* size of this struct for forward/backward compatibility */
+
+ __u32 file_flags;
+
+ size_t :0;
+};
+#define bpf_obj_get_opts__last_field file_flags
+
+LIBBPF_API int bpf_obj_pin(int fd, const char *pathname);
+LIBBPF_API int bpf_obj_get(const char *pathname);
+LIBBPF_API int bpf_obj_get_opts(const char *pathname,
+ const struct bpf_obj_get_opts *opts);
+
+struct bpf_prog_attach_opts {
+ size_t sz; /* size of this struct for forward/backward compatibility */
+ unsigned int flags;
+ int replace_prog_fd;
+};
+#define bpf_prog_attach_opts__last_field replace_prog_fd
+
+LIBBPF_API int bpf_prog_attach(int prog_fd, int attachable_fd,
+ enum bpf_attach_type type, unsigned int flags);
+LIBBPF_API int bpf_prog_attach_opts(int prog_fd, int attachable_fd,
+ enum bpf_attach_type type,
+ const struct bpf_prog_attach_opts *opts);
+LIBBPF_API int bpf_prog_detach(int attachable_fd, enum bpf_attach_type type);
+LIBBPF_API int bpf_prog_detach2(int prog_fd, int attachable_fd,
+ enum bpf_attach_type type);
+
+union bpf_iter_link_info; /* defined in up-to-date linux/bpf.h */
+struct bpf_link_create_opts {
+ size_t sz; /* size of this struct for forward/backward compatibility */
+ __u32 flags;
+ union bpf_iter_link_info *iter_info;
+ __u32 iter_info_len;
+ __u32 target_btf_id;
+ union {
+ struct {
+ __u64 bpf_cookie;
+ } perf_event;
+ struct {
+ __u32 flags;
+ __u32 cnt;
+ const char **syms;
+ const unsigned long *addrs;
+ const __u64 *cookies;
+ } kprobe_multi;
+ struct {
+ __u64 cookie;
+ } tracing;
+ };
+ size_t :0;
+};
+#define bpf_link_create_opts__last_field kprobe_multi.cookies
+
+LIBBPF_API int bpf_link_create(int prog_fd, int target_fd,
+ enum bpf_attach_type attach_type,
+ const struct bpf_link_create_opts *opts);
+
+LIBBPF_API int bpf_link_detach(int link_fd);
+
+struct bpf_link_update_opts {
+ size_t sz; /* size of this struct for forward/backward compatibility */
+ __u32 flags; /* extra flags */
+ __u32 old_prog_fd; /* expected old program FD */
+};
+#define bpf_link_update_opts__last_field old_prog_fd
+
+LIBBPF_API int bpf_link_update(int link_fd, int new_prog_fd,
+ const struct bpf_link_update_opts *opts);
+
+LIBBPF_API int bpf_iter_create(int link_fd);
+
+struct bpf_prog_test_run_attr {
+ int prog_fd;
+ int repeat;
+ const void *data_in;
+ __u32 data_size_in;
+ void *data_out; /* optional */
+ __u32 data_size_out; /* in: max length of data_out
+ * out: length of data_out */
+ __u32 retval; /* out: return code of the BPF program */
+ __u32 duration; /* out: average per repetition in ns */
+ const void *ctx_in; /* optional */
+ __u32 ctx_size_in;
+ void *ctx_out; /* optional */
+ __u32 ctx_size_out; /* in: max length of ctx_out
+ * out: length of cxt_out */
+};
+
+LIBBPF_API int bpf_prog_get_next_id(__u32 start_id, __u32 *next_id);
+LIBBPF_API int bpf_map_get_next_id(__u32 start_id, __u32 *next_id);
+LIBBPF_API int bpf_btf_get_next_id(__u32 start_id, __u32 *next_id);
+LIBBPF_API int bpf_link_get_next_id(__u32 start_id, __u32 *next_id);
+
+struct bpf_get_fd_by_id_opts {
+ size_t sz; /* size of this struct for forward/backward compatibility */
+ __u32 open_flags; /* permissions requested for the operation on fd */
+ size_t :0;
+};
+#define bpf_get_fd_by_id_opts__last_field open_flags
+
+LIBBPF_API int bpf_prog_get_fd_by_id(__u32 id);
+LIBBPF_API int bpf_prog_get_fd_by_id_opts(__u32 id,
+ const struct bpf_get_fd_by_id_opts *opts);
+LIBBPF_API int bpf_map_get_fd_by_id(__u32 id);
+LIBBPF_API int bpf_map_get_fd_by_id_opts(__u32 id,
+ const struct bpf_get_fd_by_id_opts *opts);
+LIBBPF_API int bpf_btf_get_fd_by_id(__u32 id);
+LIBBPF_API int bpf_btf_get_fd_by_id_opts(__u32 id,
+ const struct bpf_get_fd_by_id_opts *opts);
+LIBBPF_API int bpf_link_get_fd_by_id(__u32 id);
+LIBBPF_API int bpf_link_get_fd_by_id_opts(__u32 id,
+ const struct bpf_get_fd_by_id_opts *opts);
+LIBBPF_API int bpf_obj_get_info_by_fd(int bpf_fd, void *info, __u32 *info_len);
+
+struct bpf_prog_query_opts {
+ size_t sz; /* size of this struct for forward/backward compatibility */
+ __u32 query_flags;
+ __u32 attach_flags; /* output argument */
+ __u32 *prog_ids;
+ __u32 prog_cnt; /* input+output argument */
+ __u32 *prog_attach_flags;
+};
+#define bpf_prog_query_opts__last_field prog_attach_flags
+
+LIBBPF_API int bpf_prog_query_opts(int target_fd,
+ enum bpf_attach_type type,
+ struct bpf_prog_query_opts *opts);
+LIBBPF_API int bpf_prog_query(int target_fd, enum bpf_attach_type type,
+ __u32 query_flags, __u32 *attach_flags,
+ __u32 *prog_ids, __u32 *prog_cnt);
+
+LIBBPF_API int bpf_raw_tracepoint_open(const char *name, int prog_fd);
+LIBBPF_API int bpf_task_fd_query(int pid, int fd, __u32 flags, char *buf,
+ __u32 *buf_len, __u32 *prog_id, __u32 *fd_type,
+ __u64 *probe_offset, __u64 *probe_addr);
+
+#ifdef __cplusplus
+/* forward-declaring enums in C++ isn't compatible with pure C enums, so
+ * instead define bpf_enable_stats() as accepting int as an input
+ */
+LIBBPF_API int bpf_enable_stats(int type);
+#else
+enum bpf_stats_type; /* defined in up-to-date linux/bpf.h */
+LIBBPF_API int bpf_enable_stats(enum bpf_stats_type type);
+#endif
+
+struct bpf_prog_bind_opts {
+ size_t sz; /* size of this struct for forward/backward compatibility */
+ __u32 flags;
+};
+#define bpf_prog_bind_opts__last_field flags
+
+LIBBPF_API int bpf_prog_bind_map(int prog_fd, int map_fd,
+ const struct bpf_prog_bind_opts *opts);
+
+struct bpf_test_run_opts {
+ size_t sz; /* size of this struct for forward/backward compatibility */
+ const void *data_in; /* optional */
+ void *data_out; /* optional */
+ __u32 data_size_in;
+ __u32 data_size_out; /* in: max length of data_out
+ * out: length of data_out
+ */
+ const void *ctx_in; /* optional */
+ void *ctx_out; /* optional */
+ __u32 ctx_size_in;
+ __u32 ctx_size_out; /* in: max length of ctx_out
+ * out: length of cxt_out
+ */
+ __u32 retval; /* out: return code of the BPF program */
+ int repeat;
+ __u32 duration; /* out: average per repetition in ns */
+ __u32 flags;
+ __u32 cpu;
+ __u32 batch_size;
+};
+#define bpf_test_run_opts__last_field batch_size
+
+LIBBPF_API int bpf_prog_test_run_opts(int prog_fd,
+ struct bpf_test_run_opts *opts);
+
+#ifdef __cplusplus
+} /* extern "C" */
+#endif
+
+#endif /* __LIBBPF_BPF_H */
diff --git a/src/bpf_core_read.h b/src/bpf_core_read.h
new file mode 100644
index 0000000..496e6a8
--- /dev/null
+++ b/src/bpf_core_read.h
@@ -0,0 +1,484 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+#ifndef __BPF_CORE_READ_H__
+#define __BPF_CORE_READ_H__
+
+/*
+ * enum bpf_field_info_kind is passed as a second argument into
+ * __builtin_preserve_field_info() built-in to get a specific aspect of
+ * a field, captured as a first argument. __builtin_preserve_field_info(field,
+ * info_kind) returns __u32 integer and produces BTF field relocation, which
+ * is understood and processed by libbpf during BPF object loading. See
+ * selftests/bpf for examples.
+ */
+enum bpf_field_info_kind {
+ BPF_FIELD_BYTE_OFFSET = 0, /* field byte offset */
+ BPF_FIELD_BYTE_SIZE = 1,
+ BPF_FIELD_EXISTS = 2, /* field existence in target kernel */
+ BPF_FIELD_SIGNED = 3,
+ BPF_FIELD_LSHIFT_U64 = 4,
+ BPF_FIELD_RSHIFT_U64 = 5,
+};
+
+/* second argument to __builtin_btf_type_id() built-in */
+enum bpf_type_id_kind {
+ BPF_TYPE_ID_LOCAL = 0, /* BTF type ID in local program */
+ BPF_TYPE_ID_TARGET = 1, /* BTF type ID in target kernel */
+};
+
+/* second argument to __builtin_preserve_type_info() built-in */
+enum bpf_type_info_kind {
+ BPF_TYPE_EXISTS = 0, /* type existence in target kernel */
+ BPF_TYPE_SIZE = 1, /* type size in target kernel */
+ BPF_TYPE_MATCHES = 2, /* type match in target kernel */
+};
+
+/* second argument to __builtin_preserve_enum_value() built-in */
+enum bpf_enum_value_kind {
+ BPF_ENUMVAL_EXISTS = 0, /* enum value existence in kernel */
+ BPF_ENUMVAL_VALUE = 1, /* enum value value relocation */
+};
+
+#define __CORE_RELO(src, field, info) \
+ __builtin_preserve_field_info((src)->field, BPF_FIELD_##info)
+
+#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
+#define __CORE_BITFIELD_PROBE_READ(dst, src, fld) \
+ bpf_probe_read_kernel( \
+ (void *)dst, \
+ __CORE_RELO(src, fld, BYTE_SIZE), \
+ (const void *)src + __CORE_RELO(src, fld, BYTE_OFFSET))
+#else
+/* semantics of LSHIFT_64 assumes loading values into low-ordered bytes, so
+ * for big-endian we need to adjust destination pointer accordingly, based on
+ * field byte size
+ */
+#define __CORE_BITFIELD_PROBE_READ(dst, src, fld) \
+ bpf_probe_read_kernel( \
+ (void *)dst + (8 - __CORE_RELO(src, fld, BYTE_SIZE)), \
+ __CORE_RELO(src, fld, BYTE_SIZE), \
+ (const void *)src + __CORE_RELO(src, fld, BYTE_OFFSET))
+#endif
+
+/*
+ * Extract bitfield, identified by s->field, and return its value as u64.
+ * All this is done in relocatable manner, so bitfield changes such as
+ * signedness, bit size, offset changes, this will be handled automatically.
+ * This version of macro is using bpf_probe_read_kernel() to read underlying
+ * integer storage. Macro functions as an expression and its return type is
+ * bpf_probe_read_kernel()'s return value: 0, on success, <0 on error.
+ */
+#define BPF_CORE_READ_BITFIELD_PROBED(s, field) ({ \
+ unsigned long long val = 0; \
+ \
+ __CORE_BITFIELD_PROBE_READ(&val, s, field); \
+ val <<= __CORE_RELO(s, field, LSHIFT_U64); \
+ if (__CORE_RELO(s, field, SIGNED)) \
+ val = ((long long)val) >> __CORE_RELO(s, field, RSHIFT_U64); \
+ else \
+ val = val >> __CORE_RELO(s, field, RSHIFT_U64); \
+ val; \
+})
+
+/*
+ * Extract bitfield, identified by s->field, and return its value as u64.
+ * This version of macro is using direct memory reads and should be used from
+ * BPF program types that support such functionality (e.g., typed raw
+ * tracepoints).
+ */
+#define BPF_CORE_READ_BITFIELD(s, field) ({ \
+ const void *p = (const void *)s + __CORE_RELO(s, field, BYTE_OFFSET); \
+ unsigned long long val; \
+ \
+ /* This is a so-called barrier_var() operation that makes specified \
+ * variable "a black box" for optimizing compiler. \
+ * It forces compiler to perform BYTE_OFFSET relocation on p and use \
+ * its calculated value in the switch below, instead of applying \
+ * the same relocation 4 times for each individual memory load. \
+ */ \
+ asm volatile("" : "=r"(p) : "0"(p)); \
+ \
+ switch (__CORE_RELO(s, field, BYTE_SIZE)) { \
+ case 1: val = *(const unsigned char *)p; break; \
+ case 2: val = *(const unsigned short *)p; break; \
+ case 4: val = *(const unsigned int *)p; break; \
+ case 8: val = *(const unsigned long long *)p; break; \
+ } \
+ val <<= __CORE_RELO(s, field, LSHIFT_U64); \
+ if (__CORE_RELO(s, field, SIGNED)) \
+ val = ((long long)val) >> __CORE_RELO(s, field, RSHIFT_U64); \
+ else \
+ val = val >> __CORE_RELO(s, field, RSHIFT_U64); \
+ val; \
+})
+
+#define ___bpf_field_ref1(field) (field)
+#define ___bpf_field_ref2(type, field) (((typeof(type) *)0)->field)
+#define ___bpf_field_ref(args...) \
+ ___bpf_apply(___bpf_field_ref, ___bpf_narg(args))(args)
+
+/*
+ * Convenience macro to check that field actually exists in target kernel's.
+ * Returns:
+ * 1, if matching field is present in target kernel;
+ * 0, if no matching field found.
+ *
+ * Supports two forms:
+ * - field reference through variable access:
+ * bpf_core_field_exists(p->my_field);
+ * - field reference through type and field names:
+ * bpf_core_field_exists(struct my_type, my_field).
+ */
+#define bpf_core_field_exists(field...) \
+ __builtin_preserve_field_info(___bpf_field_ref(field), BPF_FIELD_EXISTS)
+
+/*
+ * Convenience macro to get the byte size of a field. Works for integers,
+ * struct/unions, pointers, arrays, and enums.
+ *
+ * Supports two forms:
+ * - field reference through variable access:
+ * bpf_core_field_size(p->my_field);
+ * - field reference through type and field names:
+ * bpf_core_field_size(struct my_type, my_field).
+ */
+#define bpf_core_field_size(field...) \
+ __builtin_preserve_field_info(___bpf_field_ref(field), BPF_FIELD_BYTE_SIZE)
+
+/*
+ * Convenience macro to get field's byte offset.
+ *
+ * Supports two forms:
+ * - field reference through variable access:
+ * bpf_core_field_offset(p->my_field);
+ * - field reference through type and field names:
+ * bpf_core_field_offset(struct my_type, my_field).
+ */
+#define bpf_core_field_offset(field...) \
+ __builtin_preserve_field_info(___bpf_field_ref(field), BPF_FIELD_BYTE_OFFSET)
+
+/*
+ * Convenience macro to get BTF type ID of a specified type, using a local BTF
+ * information. Return 32-bit unsigned integer with type ID from program's own
+ * BTF. Always succeeds.
+ */
+#define bpf_core_type_id_local(type) \
+ __builtin_btf_type_id(*(typeof(type) *)0, BPF_TYPE_ID_LOCAL)
+
+/*
+ * Convenience macro to get BTF type ID of a target kernel's type that matches
+ * specified local type.
+ * Returns:
+ * - valid 32-bit unsigned type ID in kernel BTF;
+ * - 0, if no matching type was found in a target kernel BTF.
+ */
+#define bpf_core_type_id_kernel(type) \
+ __builtin_btf_type_id(*(typeof(type) *)0, BPF_TYPE_ID_TARGET)
+
+/*
+ * Convenience macro to check that provided named type
+ * (struct/union/enum/typedef) exists in a target kernel.
+ * Returns:
+ * 1, if such type is present in target kernel's BTF;
+ * 0, if no matching type is found.
+ */
+#define bpf_core_type_exists(type) \
+ __builtin_preserve_type_info(*(typeof(type) *)0, BPF_TYPE_EXISTS)
+
+/*
+ * Convenience macro to check that provided named type
+ * (struct/union/enum/typedef) "matches" that in a target kernel.
+ * Returns:
+ * 1, if the type matches in the target kernel's BTF;
+ * 0, if the type does not match any in the target kernel
+ */
+#define bpf_core_type_matches(type) \
+ __builtin_preserve_type_info(*(typeof(type) *)0, BPF_TYPE_MATCHES)
+
+/*
+ * Convenience macro to get the byte size of a provided named type
+ * (struct/union/enum/typedef) in a target kernel.
+ * Returns:
+ * >= 0 size (in bytes), if type is present in target kernel's BTF;
+ * 0, if no matching type is found.
+ */
+#define bpf_core_type_size(type) \
+ __builtin_preserve_type_info(*(typeof(type) *)0, BPF_TYPE_SIZE)
+
+/*
+ * Convenience macro to check that provided enumerator value is defined in
+ * a target kernel.
+ * Returns:
+ * 1, if specified enum type and its enumerator value are present in target
+ * kernel's BTF;
+ * 0, if no matching enum and/or enum value within that enum is found.
+ */
+#define bpf_core_enum_value_exists(enum_type, enum_value) \
+ __builtin_preserve_enum_value(*(typeof(enum_type) *)enum_value, BPF_ENUMVAL_EXISTS)
+
+/*
+ * Convenience macro to get the integer value of an enumerator value in
+ * a target kernel.
+ * Returns:
+ * 64-bit value, if specified enum type and its enumerator value are
+ * present in target kernel's BTF;
+ * 0, if no matching enum and/or enum value within that enum is found.
+ */
+#define bpf_core_enum_value(enum_type, enum_value) \
+ __builtin_preserve_enum_value(*(typeof(enum_type) *)enum_value, BPF_ENUMVAL_VALUE)
+
+/*
+ * bpf_core_read() abstracts away bpf_probe_read_kernel() call and captures
+ * offset relocation for source address using __builtin_preserve_access_index()
+ * built-in, provided by Clang.
+ *
+ * __builtin_preserve_access_index() takes as an argument an expression of
+ * taking an address of a field within struct/union. It makes compiler emit
+ * a relocation, which records BTF type ID describing root struct/union and an
+ * accessor string which describes exact embedded field that was used to take
+ * an address. See detailed description of this relocation format and
+ * semantics in comments to struct bpf_field_reloc in libbpf_internal.h.
+ *
+ * This relocation allows libbpf to adjust BPF instruction to use correct
+ * actual field offset, based on target kernel BTF type that matches original
+ * (local) BTF, used to record relocation.
+ */
+#define bpf_core_read(dst, sz, src) \
+ bpf_probe_read_kernel(dst, sz, (const void *)__builtin_preserve_access_index(src))
+
+/* NOTE: see comments for BPF_CORE_READ_USER() about the proper types use. */
+#define bpf_core_read_user(dst, sz, src) \
+ bpf_probe_read_user(dst, sz, (const void *)__builtin_preserve_access_index(src))
+/*
+ * bpf_core_read_str() is a thin wrapper around bpf_probe_read_str()
+ * additionally emitting BPF CO-RE field relocation for specified source
+ * argument.
+ */
+#define bpf_core_read_str(dst, sz, src) \
+ bpf_probe_read_kernel_str(dst, sz, (const void *)__builtin_preserve_access_index(src))
+
+/* NOTE: see comments for BPF_CORE_READ_USER() about the proper types use. */
+#define bpf_core_read_user_str(dst, sz, src) \
+ bpf_probe_read_user_str(dst, sz, (const void *)__builtin_preserve_access_index(src))
+
+#define ___concat(a, b) a ## b
+#define ___apply(fn, n) ___concat(fn, n)
+#define ___nth(_1, _2, _3, _4, _5, _6, _7, _8, _9, _10, __11, N, ...) N
+
+/*
+ * return number of provided arguments; used for switch-based variadic macro
+ * definitions (see ___last, ___arrow, etc below)
+ */
+#define ___narg(...) ___nth(_, ##__VA_ARGS__, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0)
+/*
+ * return 0 if no arguments are passed, N - otherwise; used for
+ * recursively-defined macros to specify termination (0) case, and generic
+ * (N) case (e.g., ___read_ptrs, ___core_read)
+ */
+#define ___empty(...) ___nth(_, ##__VA_ARGS__, N, N, N, N, N, N, N, N, N, N, 0)
+
+#define ___last1(x) x
+#define ___last2(a, x) x
+#define ___last3(a, b, x) x
+#define ___last4(a, b, c, x) x
+#define ___last5(a, b, c, d, x) x
+#define ___last6(a, b, c, d, e, x) x
+#define ___last7(a, b, c, d, e, f, x) x
+#define ___last8(a, b, c, d, e, f, g, x) x
+#define ___last9(a, b, c, d, e, f, g, h, x) x
+#define ___last10(a, b, c, d, e, f, g, h, i, x) x
+#define ___last(...) ___apply(___last, ___narg(__VA_ARGS__))(__VA_ARGS__)
+
+#define ___nolast2(a, _) a
+#define ___nolast3(a, b, _) a, b
+#define ___nolast4(a, b, c, _) a, b, c
+#define ___nolast5(a, b, c, d, _) a, b, c, d
+#define ___nolast6(a, b, c, d, e, _) a, b, c, d, e
+#define ___nolast7(a, b, c, d, e, f, _) a, b, c, d, e, f
+#define ___nolast8(a, b, c, d, e, f, g, _) a, b, c, d, e, f, g
+#define ___nolast9(a, b, c, d, e, f, g, h, _) a, b, c, d, e, f, g, h
+#define ___nolast10(a, b, c, d, e, f, g, h, i, _) a, b, c, d, e, f, g, h, i
+#define ___nolast(...) ___apply(___nolast, ___narg(__VA_ARGS__))(__VA_ARGS__)
+
+#define ___arrow1(a) a
+#define ___arrow2(a, b) a->b
+#define ___arrow3(a, b, c) a->b->c
+#define ___arrow4(a, b, c, d) a->b->c->d
+#define ___arrow5(a, b, c, d, e) a->b->c->d->e
+#define ___arrow6(a, b, c, d, e, f) a->b->c->d->e->f
+#define ___arrow7(a, b, c, d, e, f, g) a->b->c->d->e->f->g
+#define ___arrow8(a, b, c, d, e, f, g, h) a->b->c->d->e->f->g->h
+#define ___arrow9(a, b, c, d, e, f, g, h, i) a->b->c->d->e->f->g->h->i
+#define ___arrow10(a, b, c, d, e, f, g, h, i, j) a->b->c->d->e->f->g->h->i->j
+#define ___arrow(...) ___apply(___arrow, ___narg(__VA_ARGS__))(__VA_ARGS__)
+
+#define ___type(...) typeof(___arrow(__VA_ARGS__))
+
+#define ___read(read_fn, dst, src_type, src, accessor) \
+ read_fn((void *)(dst), sizeof(*(dst)), &((src_type)(src))->accessor)
+
+/* "recursively" read a sequence of inner pointers using local __t var */
+#define ___rd_first(fn, src, a) ___read(fn, &__t, ___type(src), src, a);
+#define ___rd_last(fn, ...) \
+ ___read(fn, &__t, ___type(___nolast(__VA_ARGS__)), __t, ___last(__VA_ARGS__));
+#define ___rd_p1(fn, ...) const void *__t; ___rd_first(fn, __VA_ARGS__)
+#define ___rd_p2(fn, ...) ___rd_p1(fn, ___nolast(__VA_ARGS__)) ___rd_last(fn, __VA_ARGS__)
+#define ___rd_p3(fn, ...) ___rd_p2(fn, ___nolast(__VA_ARGS__)) ___rd_last(fn, __VA_ARGS__)
+#define ___rd_p4(fn, ...) ___rd_p3(fn, ___nolast(__VA_ARGS__)) ___rd_last(fn, __VA_ARGS__)
+#define ___rd_p5(fn, ...) ___rd_p4(fn, ___nolast(__VA_ARGS__)) ___rd_last(fn, __VA_ARGS__)
+#define ___rd_p6(fn, ...) ___rd_p5(fn, ___nolast(__VA_ARGS__)) ___rd_last(fn, __VA_ARGS__)
+#define ___rd_p7(fn, ...) ___rd_p6(fn, ___nolast(__VA_ARGS__)) ___rd_last(fn, __VA_ARGS__)
+#define ___rd_p8(fn, ...) ___rd_p7(fn, ___nolast(__VA_ARGS__)) ___rd_last(fn, __VA_ARGS__)
+#define ___rd_p9(fn, ...) ___rd_p8(fn, ___nolast(__VA_ARGS__)) ___rd_last(fn, __VA_ARGS__)
+#define ___read_ptrs(fn, src, ...) \
+ ___apply(___rd_p, ___narg(__VA_ARGS__))(fn, src, __VA_ARGS__)
+
+#define ___core_read0(fn, fn_ptr, dst, src, a) \
+ ___read(fn, dst, ___type(src), src, a);
+#define ___core_readN(fn, fn_ptr, dst, src, ...) \
+ ___read_ptrs(fn_ptr, src, ___nolast(__VA_ARGS__)) \
+ ___read(fn, dst, ___type(src, ___nolast(__VA_ARGS__)), __t, \
+ ___last(__VA_ARGS__));
+#define ___core_read(fn, fn_ptr, dst, src, a, ...) \
+ ___apply(___core_read, ___empty(__VA_ARGS__))(fn, fn_ptr, dst, \
+ src, a, ##__VA_ARGS__)
+
+/*
+ * BPF_CORE_READ_INTO() is a more performance-conscious variant of
+ * BPF_CORE_READ(), in which final field is read into user-provided storage.
+ * See BPF_CORE_READ() below for more details on general usage.
+ */
+#define BPF_CORE_READ_INTO(dst, src, a, ...) ({ \
+ ___core_read(bpf_core_read, bpf_core_read, \
+ dst, (src), a, ##__VA_ARGS__) \
+})
+
+/*
+ * Variant of BPF_CORE_READ_INTO() for reading from user-space memory.
+ *
+ * NOTE: see comments for BPF_CORE_READ_USER() about the proper types use.
+ */
+#define BPF_CORE_READ_USER_INTO(dst, src, a, ...) ({ \
+ ___core_read(bpf_core_read_user, bpf_core_read_user, \
+ dst, (src), a, ##__VA_ARGS__) \
+})
+
+/* Non-CO-RE variant of BPF_CORE_READ_INTO() */
+#define BPF_PROBE_READ_INTO(dst, src, a, ...) ({ \
+ ___core_read(bpf_probe_read, bpf_probe_read, \
+ dst, (src), a, ##__VA_ARGS__) \
+})
+
+/* Non-CO-RE variant of BPF_CORE_READ_USER_INTO().
+ *
+ * As no CO-RE relocations are emitted, source types can be arbitrary and are
+ * not restricted to kernel types only.
+ */
+#define BPF_PROBE_READ_USER_INTO(dst, src, a, ...) ({ \
+ ___core_read(bpf_probe_read_user, bpf_probe_read_user, \
+ dst, (src), a, ##__VA_ARGS__) \
+})
+
+/*
+ * BPF_CORE_READ_STR_INTO() does same "pointer chasing" as
+ * BPF_CORE_READ() for intermediate pointers, but then executes (and returns
+ * corresponding error code) bpf_core_read_str() for final string read.
+ */
+#define BPF_CORE_READ_STR_INTO(dst, src, a, ...) ({ \
+ ___core_read(bpf_core_read_str, bpf_core_read, \
+ dst, (src), a, ##__VA_ARGS__) \
+})
+
+/*
+ * Variant of BPF_CORE_READ_STR_INTO() for reading from user-space memory.
+ *
+ * NOTE: see comments for BPF_CORE_READ_USER() about the proper types use.
+ */
+#define BPF_CORE_READ_USER_STR_INTO(dst, src, a, ...) ({ \
+ ___core_read(bpf_core_read_user_str, bpf_core_read_user, \
+ dst, (src), a, ##__VA_ARGS__) \
+})
+
+/* Non-CO-RE variant of BPF_CORE_READ_STR_INTO() */
+#define BPF_PROBE_READ_STR_INTO(dst, src, a, ...) ({ \
+ ___core_read(bpf_probe_read_str, bpf_probe_read, \
+ dst, (src), a, ##__VA_ARGS__) \
+})
+
+/*
+ * Non-CO-RE variant of BPF_CORE_READ_USER_STR_INTO().
+ *
+ * As no CO-RE relocations are emitted, source types can be arbitrary and are
+ * not restricted to kernel types only.
+ */
+#define BPF_PROBE_READ_USER_STR_INTO(dst, src, a, ...) ({ \
+ ___core_read(bpf_probe_read_user_str, bpf_probe_read_user, \
+ dst, (src), a, ##__VA_ARGS__) \
+})
+
+/*
+ * BPF_CORE_READ() is used to simplify BPF CO-RE relocatable read, especially
+ * when there are few pointer chasing steps.
+ * E.g., what in non-BPF world (or in BPF w/ BCC) would be something like:
+ * int x = s->a.b.c->d.e->f->g;
+ * can be succinctly achieved using BPF_CORE_READ as:
+ * int x = BPF_CORE_READ(s, a.b.c, d.e, f, g);
+ *
+ * BPF_CORE_READ will decompose above statement into 4 bpf_core_read (BPF
+ * CO-RE relocatable bpf_probe_read_kernel() wrapper) calls, logically
+ * equivalent to:
+ * 1. const void *__t = s->a.b.c;
+ * 2. __t = __t->d.e;
+ * 3. __t = __t->f;
+ * 4. return __t->g;
+ *
+ * Equivalence is logical, because there is a heavy type casting/preservation
+ * involved, as well as all the reads are happening through
+ * bpf_probe_read_kernel() calls using __builtin_preserve_access_index() to
+ * emit CO-RE relocations.
+ *
+ * N.B. Only up to 9 "field accessors" are supported, which should be more
+ * than enough for any practical purpose.
+ */
+#define BPF_CORE_READ(src, a, ...) ({ \
+ ___type((src), a, ##__VA_ARGS__) __r; \
+ BPF_CORE_READ_INTO(&__r, (src), a, ##__VA_ARGS__); \
+ __r; \
+})
+
+/*
+ * Variant of BPF_CORE_READ() for reading from user-space memory.
+ *
+ * NOTE: all the source types involved are still *kernel types* and need to
+ * exist in kernel (or kernel module) BTF, otherwise CO-RE relocation will
+ * fail. Custom user types are not relocatable with CO-RE.
+ * The typical situation in which BPF_CORE_READ_USER() might be used is to
+ * read kernel UAPI types from the user-space memory passed in as a syscall
+ * input argument.
+ */
+#define BPF_CORE_READ_USER(src, a, ...) ({ \
+ ___type((src), a, ##__VA_ARGS__) __r; \
+ BPF_CORE_READ_USER_INTO(&__r, (src), a, ##__VA_ARGS__); \
+ __r; \
+})
+
+/* Non-CO-RE variant of BPF_CORE_READ() */
+#define BPF_PROBE_READ(src, a, ...) ({ \
+ ___type((src), a, ##__VA_ARGS__) __r; \
+ BPF_PROBE_READ_INTO(&__r, (src), a, ##__VA_ARGS__); \
+ __r; \
+})
+
+/*
+ * Non-CO-RE variant of BPF_CORE_READ_USER().
+ *
+ * As no CO-RE relocations are emitted, source types can be arbitrary and are
+ * not restricted to kernel types only.
+ */
+#define BPF_PROBE_READ_USER(src, a, ...) ({ \
+ ___type((src), a, ##__VA_ARGS__) __r; \
+ BPF_PROBE_READ_USER_INTO(&__r, (src), a, ##__VA_ARGS__); \
+ __r; \
+})
+
+#endif
+
diff --git a/src/bpf_endian.h b/src/bpf_endian.h
new file mode 100644
index 0000000..ec9db4f
--- /dev/null
+++ b/src/bpf_endian.h
@@ -0,0 +1,99 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+#ifndef __BPF_ENDIAN__
+#define __BPF_ENDIAN__
+
+/*
+ * Isolate byte #n and put it into byte #m, for __u##b type.
+ * E.g., moving byte #6 (nnnnnnnn) into byte #1 (mmmmmmmm) for __u64:
+ * 1) xxxxxxxx nnnnnnnn xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx mmmmmmmm xxxxxxxx
+ * 2) nnnnnnnn xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx mmmmmmmm xxxxxxxx 00000000
+ * 3) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 nnnnnnnn
+ * 4) 00000000 00000000 00000000 00000000 00000000 00000000 nnnnnnnn 00000000
+ */
+#define ___bpf_mvb(x, b, n, m) ((__u##b)(x) << (b-(n+1)*8) >> (b-8) << (m*8))
+
+#define ___bpf_swab16(x) ((__u16)( \
+ ___bpf_mvb(x, 16, 0, 1) | \
+ ___bpf_mvb(x, 16, 1, 0)))
+
+#define ___bpf_swab32(x) ((__u32)( \
+ ___bpf_mvb(x, 32, 0, 3) | \
+ ___bpf_mvb(x, 32, 1, 2) | \
+ ___bpf_mvb(x, 32, 2, 1) | \
+ ___bpf_mvb(x, 32, 3, 0)))
+
+#define ___bpf_swab64(x) ((__u64)( \
+ ___bpf_mvb(x, 64, 0, 7) | \
+ ___bpf_mvb(x, 64, 1, 6) | \
+ ___bpf_mvb(x, 64, 2, 5) | \
+ ___bpf_mvb(x, 64, 3, 4) | \
+ ___bpf_mvb(x, 64, 4, 3) | \
+ ___bpf_mvb(x, 64, 5, 2) | \
+ ___bpf_mvb(x, 64, 6, 1) | \
+ ___bpf_mvb(x, 64, 7, 0)))
+
+/* LLVM's BPF target selects the endianness of the CPU
+ * it compiles on, or the user specifies (bpfel/bpfeb),
+ * respectively. The used __BYTE_ORDER__ is defined by
+ * the compiler, we cannot rely on __BYTE_ORDER from
+ * libc headers, since it doesn't reflect the actual
+ * requested byte order.
+ *
+ * Note, LLVM's BPF target has different __builtin_bswapX()
+ * semantics. It does map to BPF_ALU | BPF_END | BPF_TO_BE
+ * in bpfel and bpfeb case, which means below, that we map
+ * to cpu_to_be16(). We could use it unconditionally in BPF
+ * case, but better not rely on it, so that this header here
+ * can be used from application and BPF program side, which
+ * use different targets.
+ */
+#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
+# define __bpf_ntohs(x) __builtin_bswap16(x)
+# define __bpf_htons(x) __builtin_bswap16(x)
+# define __bpf_constant_ntohs(x) ___bpf_swab16(x)
+# define __bpf_constant_htons(x) ___bpf_swab16(x)
+# define __bpf_ntohl(x) __builtin_bswap32(x)
+# define __bpf_htonl(x) __builtin_bswap32(x)
+# define __bpf_constant_ntohl(x) ___bpf_swab32(x)
+# define __bpf_constant_htonl(x) ___bpf_swab32(x)
+# define __bpf_be64_to_cpu(x) __builtin_bswap64(x)
+# define __bpf_cpu_to_be64(x) __builtin_bswap64(x)
+# define __bpf_constant_be64_to_cpu(x) ___bpf_swab64(x)
+# define __bpf_constant_cpu_to_be64(x) ___bpf_swab64(x)
+#elif __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
+# define __bpf_ntohs(x) (x)
+# define __bpf_htons(x) (x)
+# define __bpf_constant_ntohs(x) (x)
+# define __bpf_constant_htons(x) (x)
+# define __bpf_ntohl(x) (x)
+# define __bpf_htonl(x) (x)
+# define __bpf_constant_ntohl(x) (x)
+# define __bpf_constant_htonl(x) (x)
+# define __bpf_be64_to_cpu(x) (x)
+# define __bpf_cpu_to_be64(x) (x)
+# define __bpf_constant_be64_to_cpu(x) (x)
+# define __bpf_constant_cpu_to_be64(x) (x)
+#else
+# error "Fix your compiler's __BYTE_ORDER__?!"
+#endif
+
+#define bpf_htons(x) \
+ (__builtin_constant_p(x) ? \
+ __bpf_constant_htons(x) : __bpf_htons(x))
+#define bpf_ntohs(x) \
+ (__builtin_constant_p(x) ? \
+ __bpf_constant_ntohs(x) : __bpf_ntohs(x))
+#define bpf_htonl(x) \
+ (__builtin_constant_p(x) ? \
+ __bpf_constant_htonl(x) : __bpf_htonl(x))
+#define bpf_ntohl(x) \
+ (__builtin_constant_p(x) ? \
+ __bpf_constant_ntohl(x) : __bpf_ntohl(x))
+#define bpf_cpu_to_be64(x) \
+ (__builtin_constant_p(x) ? \
+ __bpf_constant_cpu_to_be64(x) : __bpf_cpu_to_be64(x))
+#define bpf_be64_to_cpu(x) \
+ (__builtin_constant_p(x) ? \
+ __bpf_constant_be64_to_cpu(x) : __bpf_be64_to_cpu(x))
+
+#endif /* __BPF_ENDIAN__ */
diff --git a/src/bpf_gen_internal.h b/src/bpf_gen_internal.h
new file mode 100644
index 0000000..2233089
--- /dev/null
+++ b/src/bpf_gen_internal.h
@@ -0,0 +1,72 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+/* Copyright (c) 2021 Facebook */
+#ifndef __BPF_GEN_INTERNAL_H
+#define __BPF_GEN_INTERNAL_H
+
+#include "bpf.h"
+
+struct ksym_relo_desc {
+ const char *name;
+ int kind;
+ int insn_idx;
+ bool is_weak;
+ bool is_typeless;
+};
+
+struct ksym_desc {
+ const char *name;
+ int ref;
+ int kind;
+ union {
+ /* used for kfunc */
+ int off;
+ /* used for typeless ksym */
+ bool typeless;
+ };
+ int insn;
+};
+
+struct bpf_gen {
+ struct gen_loader_opts *opts;
+ void *data_start;
+ void *data_cur;
+ void *insn_start;
+ void *insn_cur;
+ ssize_t cleanup_label;
+ __u32 nr_progs;
+ __u32 nr_maps;
+ int log_level;
+ int error;
+ struct ksym_relo_desc *relos;
+ int relo_cnt;
+ struct bpf_core_relo *core_relos;
+ int core_relo_cnt;
+ char attach_target[128];
+ int attach_kind;
+ struct ksym_desc *ksyms;
+ __u32 nr_ksyms;
+ int fd_array;
+ int nr_fd_array;
+};
+
+void bpf_gen__init(struct bpf_gen *gen, int log_level, int nr_progs, int nr_maps);
+int bpf_gen__finish(struct bpf_gen *gen, int nr_progs, int nr_maps);
+void bpf_gen__free(struct bpf_gen *gen);
+void bpf_gen__load_btf(struct bpf_gen *gen, const void *raw_data, __u32 raw_size);
+void bpf_gen__map_create(struct bpf_gen *gen,
+ enum bpf_map_type map_type, const char *map_name,
+ __u32 key_size, __u32 value_size, __u32 max_entries,
+ struct bpf_map_create_opts *map_attr, int map_idx);
+void bpf_gen__prog_load(struct bpf_gen *gen,
+ enum bpf_prog_type prog_type, const char *prog_name,
+ const char *license, struct bpf_insn *insns, size_t insn_cnt,
+ struct bpf_prog_load_opts *load_attr, int prog_idx);
+void bpf_gen__map_update_elem(struct bpf_gen *gen, int map_idx, void *value, __u32 value_size);
+void bpf_gen__map_freeze(struct bpf_gen *gen, int map_idx);
+void bpf_gen__record_attach_target(struct bpf_gen *gen, const char *name, enum bpf_attach_type type);
+void bpf_gen__record_extern(struct bpf_gen *gen, const char *name, bool is_weak,
+ bool is_typeless, int kind, int insn_idx);
+void bpf_gen__record_relo_core(struct bpf_gen *gen, const struct bpf_core_relo *core_relo);
+void bpf_gen__populate_outer_map(struct bpf_gen *gen, int outer_map_idx, int key, int inner_map_idx);
+
+#endif
diff --git a/src/bpf_helper_defs.h b/src/bpf_helper_defs.h
new file mode 100644
index 0000000..9bcaca1
--- /dev/null
+++ b/src/bpf_helper_defs.h
@@ -0,0 +1,4718 @@
+/* This is auto-generated file. See bpf_doc.py for details. */
+
+/* Forward declarations of BPF structs */
+struct bpf_fib_lookup;
+struct bpf_sk_lookup;
+struct bpf_perf_event_data;
+struct bpf_perf_event_value;
+struct bpf_pidns_info;
+struct bpf_redir_neigh;
+struct bpf_sock;
+struct bpf_sock_addr;
+struct bpf_sock_ops;
+struct bpf_sock_tuple;
+struct bpf_spin_lock;
+struct bpf_sysctl;
+struct bpf_tcp_sock;
+struct bpf_tunnel_key;
+struct bpf_xfrm_state;
+struct linux_binprm;
+struct pt_regs;
+struct sk_reuseport_md;
+struct sockaddr;
+struct tcphdr;
+struct seq_file;
+struct tcp6_sock;
+struct tcp_sock;
+struct tcp_timewait_sock;
+struct tcp_request_sock;
+struct udp6_sock;
+struct unix_sock;
+struct task_struct;
+struct cgroup;
+struct __sk_buff;
+struct sk_msg_md;
+struct xdp_md;
+struct path;
+struct btf_ptr;
+struct inode;
+struct socket;
+struct file;
+struct bpf_timer;
+struct mptcp_sock;
+struct bpf_dynptr;
+struct iphdr;
+struct ipv6hdr;
+
+/*
+ * bpf_map_lookup_elem
+ *
+ * Perform a lookup in *map* for an entry associated to *key*.
+ *
+ * Returns
+ * Map value associated to *key*, or **NULL** if no entry was
+ * found.
+ */
+static void *(*bpf_map_lookup_elem)(void *map, const void *key) = (void *) 1;
+
+/*
+ * bpf_map_update_elem
+ *
+ * Add or update the value of the entry associated to *key* in
+ * *map* with *value*. *flags* is one of:
+ *
+ * **BPF_NOEXIST**
+ * The entry for *key* must not exist in the map.
+ * **BPF_EXIST**
+ * The entry for *key* must already exist in the map.
+ * **BPF_ANY**
+ * No condition on the existence of the entry for *key*.
+ *
+ * Flag value **BPF_NOEXIST** cannot be used for maps of types
+ * **BPF_MAP_TYPE_ARRAY** or **BPF_MAP_TYPE_PERCPU_ARRAY** (all
+ * elements always exist), the helper would return an error.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_map_update_elem)(void *map, const void *key, const void *value, __u64 flags) = (void *) 2;
+
+/*
+ * bpf_map_delete_elem
+ *
+ * Delete entry with *key* from *map*.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_map_delete_elem)(void *map, const void *key) = (void *) 3;
+
+/*
+ * bpf_probe_read
+ *
+ * For tracing programs, safely attempt to read *size* bytes from
+ * kernel space address *unsafe_ptr* and store the data in *dst*.
+ *
+ * Generally, use **bpf_probe_read_user**\ () or
+ * **bpf_probe_read_kernel**\ () instead.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_probe_read)(void *dst, __u32 size, const void *unsafe_ptr) = (void *) 4;
+
+/*
+ * bpf_ktime_get_ns
+ *
+ * Return the time elapsed since system boot, in nanoseconds.
+ * Does not include time the system was suspended.
+ * See: **clock_gettime**\ (**CLOCK_MONOTONIC**)
+ *
+ * Returns
+ * Current *ktime*.
+ */
+static __u64 (*bpf_ktime_get_ns)(void) = (void *) 5;
+
+/*
+ * bpf_trace_printk
+ *
+ * This helper is a "printk()-like" facility for debugging. It
+ * prints a message defined by format *fmt* (of size *fmt_size*)
+ * to file *\/sys/kernel/debug/tracing/trace* from DebugFS, if
+ * available. It can take up to three additional **u64**
+ * arguments (as an eBPF helpers, the total number of arguments is
+ * limited to five).
+ *
+ * Each time the helper is called, it appends a line to the trace.
+ * Lines are discarded while *\/sys/kernel/debug/tracing/trace* is
+ * open, use *\/sys/kernel/debug/tracing/trace_pipe* to avoid this.
+ * The format of the trace is customizable, and the exact output
+ * one will get depends on the options set in
+ * *\/sys/kernel/debug/tracing/trace_options* (see also the
+ * *README* file under the same directory). However, it usually
+ * defaults to something like:
+ *
+ * ::
+ *
+ * telnet-470 [001] .N.. 419421.045894: 0x00000001: <formatted msg>
+ *
+ * In the above:
+ *
+ * * ``telnet`` is the name of the current task.
+ * * ``470`` is the PID of the current task.
+ * * ``001`` is the CPU number on which the task is
+ * running.
+ * * In ``.N..``, each character refers to a set of
+ * options (whether irqs are enabled, scheduling
+ * options, whether hard/softirqs are running, level of
+ * preempt_disabled respectively). **N** means that
+ * **TIF_NEED_RESCHED** and **PREEMPT_NEED_RESCHED**
+ * are set.
+ * * ``419421.045894`` is a timestamp.
+ * * ``0x00000001`` is a fake value used by BPF for the
+ * instruction pointer register.
+ * * ``<formatted msg>`` is the message formatted with
+ * *fmt*.
+ *
+ * The conversion specifiers supported by *fmt* are similar, but
+ * more limited than for printk(). They are **%d**, **%i**,
+ * **%u**, **%x**, **%ld**, **%li**, **%lu**, **%lx**, **%lld**,
+ * **%lli**, **%llu**, **%llx**, **%p**, **%s**. No modifier (size
+ * of field, padding with zeroes, etc.) is available, and the
+ * helper will return **-EINVAL** (but print nothing) if it
+ * encounters an unknown specifier.
+ *
+ * Also, note that **bpf_trace_printk**\ () is slow, and should
+ * only be used for debugging purposes. For this reason, a notice
+ * block (spanning several lines) is printed to kernel logs and
+ * states that the helper should not be used "for production use"
+ * the first time this helper is used (or more precisely, when
+ * **trace_printk**\ () buffers are allocated). For passing values
+ * to user space, perf events should be preferred.
+ *
+ * Returns
+ * The number of bytes written to the buffer, or a negative error
+ * in case of failure.
+ */
+static long (*bpf_trace_printk)(const char *fmt, __u32 fmt_size, ...) = (void *) 6;
+
+/*
+ * bpf_get_prandom_u32
+ *
+ * Get a pseudo-random number.
+ *
+ * From a security point of view, this helper uses its own
+ * pseudo-random internal state, and cannot be used to infer the
+ * seed of other random functions in the kernel. However, it is
+ * essential to note that the generator used by the helper is not
+ * cryptographically secure.
+ *
+ * Returns
+ * A random 32-bit unsigned value.
+ */
+static __u32 (*bpf_get_prandom_u32)(void) = (void *) 7;
+
+/*
+ * bpf_get_smp_processor_id
+ *
+ * Get the SMP (symmetric multiprocessing) processor id. Note that
+ * all programs run with migration disabled, which means that the
+ * SMP processor id is stable during all the execution of the
+ * program.
+ *
+ * Returns
+ * The SMP id of the processor running the program.
+ */
+static __u32 (*bpf_get_smp_processor_id)(void) = (void *) 8;
+
+/*
+ * bpf_skb_store_bytes
+ *
+ * Store *len* bytes from address *from* into the packet
+ * associated to *skb*, at *offset*. *flags* are a combination of
+ * **BPF_F_RECOMPUTE_CSUM** (automatically recompute the
+ * checksum for the packet after storing the bytes) and
+ * **BPF_F_INVALIDATE_HASH** (set *skb*\ **->hash**, *skb*\
+ * **->swhash** and *skb*\ **->l4hash** to 0).
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_store_bytes)(struct __sk_buff *skb, __u32 offset, const void *from, __u32 len, __u64 flags) = (void *) 9;
+
+/*
+ * bpf_l3_csum_replace
+ *
+ * Recompute the layer 3 (e.g. IP) checksum for the packet
+ * associated to *skb*. Computation is incremental, so the helper
+ * must know the former value of the header field that was
+ * modified (*from*), the new value of this field (*to*), and the
+ * number of bytes (2 or 4) for this field, stored in *size*.
+ * Alternatively, it is possible to store the difference between
+ * the previous and the new values of the header field in *to*, by
+ * setting *from* and *size* to 0. For both methods, *offset*
+ * indicates the location of the IP checksum within the packet.
+ *
+ * This helper works in combination with **bpf_csum_diff**\ (),
+ * which does not update the checksum in-place, but offers more
+ * flexibility and can handle sizes larger than 2 or 4 for the
+ * checksum to update.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_l3_csum_replace)(struct __sk_buff *skb, __u32 offset, __u64 from, __u64 to, __u64 size) = (void *) 10;
+
+/*
+ * bpf_l4_csum_replace
+ *
+ * Recompute the layer 4 (e.g. TCP, UDP or ICMP) checksum for the
+ * packet associated to *skb*. Computation is incremental, so the
+ * helper must know the former value of the header field that was
+ * modified (*from*), the new value of this field (*to*), and the
+ * number of bytes (2 or 4) for this field, stored on the lowest
+ * four bits of *flags*. Alternatively, it is possible to store
+ * the difference between the previous and the new values of the
+ * header field in *to*, by setting *from* and the four lowest
+ * bits of *flags* to 0. For both methods, *offset* indicates the
+ * location of the IP checksum within the packet. In addition to
+ * the size of the field, *flags* can be added (bitwise OR) actual
+ * flags. With **BPF_F_MARK_MANGLED_0**, a null checksum is left
+ * untouched (unless **BPF_F_MARK_ENFORCE** is added as well), and
+ * for updates resulting in a null checksum the value is set to
+ * **CSUM_MANGLED_0** instead. Flag **BPF_F_PSEUDO_HDR** indicates
+ * the checksum is to be computed against a pseudo-header.
+ *
+ * This helper works in combination with **bpf_csum_diff**\ (),
+ * which does not update the checksum in-place, but offers more
+ * flexibility and can handle sizes larger than 2 or 4 for the
+ * checksum to update.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_l4_csum_replace)(struct __sk_buff *skb, __u32 offset, __u64 from, __u64 to, __u64 flags) = (void *) 11;
+
+/*
+ * bpf_tail_call
+ *
+ * This special helper is used to trigger a "tail call", or in
+ * other words, to jump into another eBPF program. The same stack
+ * frame is used (but values on stack and in registers for the
+ * caller are not accessible to the callee). This mechanism allows
+ * for program chaining, either for raising the maximum number of
+ * available eBPF instructions, or to execute given programs in
+ * conditional blocks. For security reasons, there is an upper
+ * limit to the number of successive tail calls that can be
+ * performed.
+ *
+ * Upon call of this helper, the program attempts to jump into a
+ * program referenced at index *index* in *prog_array_map*, a
+ * special map of type **BPF_MAP_TYPE_PROG_ARRAY**, and passes
+ * *ctx*, a pointer to the context.
+ *
+ * If the call succeeds, the kernel immediately runs the first
+ * instruction of the new program. This is not a function call,
+ * and it never returns to the previous program. If the call
+ * fails, then the helper has no effect, and the caller continues
+ * to run its subsequent instructions. A call can fail if the
+ * destination program for the jump does not exist (i.e. *index*
+ * is superior to the number of entries in *prog_array_map*), or
+ * if the maximum number of tail calls has been reached for this
+ * chain of programs. This limit is defined in the kernel by the
+ * macro **MAX_TAIL_CALL_CNT** (not accessible to user space),
+ * which is currently set to 33.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_tail_call)(void *ctx, void *prog_array_map, __u32 index) = (void *) 12;
+
+/*
+ * bpf_clone_redirect
+ *
+ * Clone and redirect the packet associated to *skb* to another
+ * net device of index *ifindex*. Both ingress and egress
+ * interfaces can be used for redirection. The **BPF_F_INGRESS**
+ * value in *flags* is used to make the distinction (ingress path
+ * is selected if the flag is present, egress path otherwise).
+ * This is the only flag supported for now.
+ *
+ * In comparison with **bpf_redirect**\ () helper,
+ * **bpf_clone_redirect**\ () has the associated cost of
+ * duplicating the packet buffer, but this can be executed out of
+ * the eBPF program. Conversely, **bpf_redirect**\ () is more
+ * efficient, but it is handled through an action code where the
+ * redirection happens only after the eBPF program has returned.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_clone_redirect)(struct __sk_buff *skb, __u32 ifindex, __u64 flags) = (void *) 13;
+
+/*
+ * bpf_get_current_pid_tgid
+ *
+ * Get the current pid and tgid.
+ *
+ * Returns
+ * A 64-bit integer containing the current tgid and pid, and
+ * created as such:
+ * *current_task*\ **->tgid << 32 \|**
+ * *current_task*\ **->pid**.
+ */
+static __u64 (*bpf_get_current_pid_tgid)(void) = (void *) 14;
+
+/*
+ * bpf_get_current_uid_gid
+ *
+ * Get the current uid and gid.
+ *
+ * Returns
+ * A 64-bit integer containing the current GID and UID, and
+ * created as such: *current_gid* **<< 32 \|** *current_uid*.
+ */
+static __u64 (*bpf_get_current_uid_gid)(void) = (void *) 15;
+
+/*
+ * bpf_get_current_comm
+ *
+ * Copy the **comm** attribute of the current task into *buf* of
+ * *size_of_buf*. The **comm** attribute contains the name of
+ * the executable (excluding the path) for the current task. The
+ * *size_of_buf* must be strictly positive. On success, the
+ * helper makes sure that the *buf* is NUL-terminated. On failure,
+ * it is filled with zeroes.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_get_current_comm)(void *buf, __u32 size_of_buf) = (void *) 16;
+
+/*
+ * bpf_get_cgroup_classid
+ *
+ * Retrieve the classid for the current task, i.e. for the net_cls
+ * cgroup to which *skb* belongs.
+ *
+ * This helper can be used on TC egress path, but not on ingress.
+ *
+ * The net_cls cgroup provides an interface to tag network packets
+ * based on a user-provided identifier for all traffic coming from
+ * the tasks belonging to the related cgroup. See also the related
+ * kernel documentation, available from the Linux sources in file
+ * *Documentation/admin-guide/cgroup-v1/net_cls.rst*.
+ *
+ * The Linux kernel has two versions for cgroups: there are
+ * cgroups v1 and cgroups v2. Both are available to users, who can
+ * use a mixture of them, but note that the net_cls cgroup is for
+ * cgroup v1 only. This makes it incompatible with BPF programs
+ * run on cgroups, which is a cgroup-v2-only feature (a socket can
+ * only hold data for one version of cgroups at a time).
+ *
+ * This helper is only available is the kernel was compiled with
+ * the **CONFIG_CGROUP_NET_CLASSID** configuration option set to
+ * "**y**" or to "**m**".
+ *
+ * Returns
+ * The classid, or 0 for the default unconfigured classid.
+ */
+static __u32 (*bpf_get_cgroup_classid)(struct __sk_buff *skb) = (void *) 17;
+
+/*
+ * bpf_skb_vlan_push
+ *
+ * Push a *vlan_tci* (VLAN tag control information) of protocol
+ * *vlan_proto* to the packet associated to *skb*, then update
+ * the checksum. Note that if *vlan_proto* is different from
+ * **ETH_P_8021Q** and **ETH_P_8021AD**, it is considered to
+ * be **ETH_P_8021Q**.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_vlan_push)(struct __sk_buff *skb, __be16 vlan_proto, __u16 vlan_tci) = (void *) 18;
+
+/*
+ * bpf_skb_vlan_pop
+ *
+ * Pop a VLAN header from the packet associated to *skb*.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_vlan_pop)(struct __sk_buff *skb) = (void *) 19;
+
+/*
+ * bpf_skb_get_tunnel_key
+ *
+ * Get tunnel metadata. This helper takes a pointer *key* to an
+ * empty **struct bpf_tunnel_key** of **size**, that will be
+ * filled with tunnel metadata for the packet associated to *skb*.
+ * The *flags* can be set to **BPF_F_TUNINFO_IPV6**, which
+ * indicates that the tunnel is based on IPv6 protocol instead of
+ * IPv4.
+ *
+ * The **struct bpf_tunnel_key** is an object that generalizes the
+ * principal parameters used by various tunneling protocols into a
+ * single struct. This way, it can be used to easily make a
+ * decision based on the contents of the encapsulation header,
+ * "summarized" in this struct. In particular, it holds the IP
+ * address of the remote end (IPv4 or IPv6, depending on the case)
+ * in *key*\ **->remote_ipv4** or *key*\ **->remote_ipv6**. Also,
+ * this struct exposes the *key*\ **->tunnel_id**, which is
+ * generally mapped to a VNI (Virtual Network Identifier), making
+ * it programmable together with the **bpf_skb_set_tunnel_key**\
+ * () helper.
+ *
+ * Let's imagine that the following code is part of a program
+ * attached to the TC ingress interface, on one end of a GRE
+ * tunnel, and is supposed to filter out all messages coming from
+ * remote ends with IPv4 address other than 10.0.0.1:
+ *
+ * ::
+ *
+ * int ret;
+ * struct bpf_tunnel_key key = {};
+ *
+ * ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0);
+ * if (ret < 0)
+ * return TC_ACT_SHOT; // drop packet
+ *
+ * if (key.remote_ipv4 != 0x0a000001)
+ * return TC_ACT_SHOT; // drop packet
+ *
+ * return TC_ACT_OK; // accept packet
+ *
+ * This interface can also be used with all encapsulation devices
+ * that can operate in "collect metadata" mode: instead of having
+ * one network device per specific configuration, the "collect
+ * metadata" mode only requires a single device where the
+ * configuration can be extracted from this helper.
+ *
+ * This can be used together with various tunnels such as VXLan,
+ * Geneve, GRE or IP in IP (IPIP).
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_get_tunnel_key)(struct __sk_buff *skb, struct bpf_tunnel_key *key, __u32 size, __u64 flags) = (void *) 20;
+
+/*
+ * bpf_skb_set_tunnel_key
+ *
+ * Populate tunnel metadata for packet associated to *skb.* The
+ * tunnel metadata is set to the contents of *key*, of *size*. The
+ * *flags* can be set to a combination of the following values:
+ *
+ * **BPF_F_TUNINFO_IPV6**
+ * Indicate that the tunnel is based on IPv6 protocol
+ * instead of IPv4.
+ * **BPF_F_ZERO_CSUM_TX**
+ * For IPv4 packets, add a flag to tunnel metadata
+ * indicating that checksum computation should be skipped
+ * and checksum set to zeroes.
+ * **BPF_F_DONT_FRAGMENT**
+ * Add a flag to tunnel metadata indicating that the
+ * packet should not be fragmented.
+ * **BPF_F_SEQ_NUMBER**
+ * Add a flag to tunnel metadata indicating that a
+ * sequence number should be added to tunnel header before
+ * sending the packet. This flag was added for GRE
+ * encapsulation, but might be used with other protocols
+ * as well in the future.
+ * **BPF_F_NO_TUNNEL_KEY**
+ * Add a flag to tunnel metadata indicating that no tunnel
+ * key should be set in the resulting tunnel header.
+ *
+ * Here is a typical usage on the transmit path:
+ *
+ * ::
+ *
+ * struct bpf_tunnel_key key;
+ * populate key ...
+ * bpf_skb_set_tunnel_key(skb, &key, sizeof(key), 0);
+ * bpf_clone_redirect(skb, vxlan_dev_ifindex, 0);
+ *
+ * See also the description of the **bpf_skb_get_tunnel_key**\ ()
+ * helper for additional information.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_set_tunnel_key)(struct __sk_buff *skb, struct bpf_tunnel_key *key, __u32 size, __u64 flags) = (void *) 21;
+
+/*
+ * bpf_perf_event_read
+ *
+ * Read the value of a perf event counter. This helper relies on a
+ * *map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. The nature of
+ * the perf event counter is selected when *map* is updated with
+ * perf event file descriptors. The *map* is an array whose size
+ * is the number of available CPUs, and each cell contains a value
+ * relative to one CPU. The value to retrieve is indicated by
+ * *flags*, that contains the index of the CPU to look up, masked
+ * with **BPF_F_INDEX_MASK**. Alternatively, *flags* can be set to
+ * **BPF_F_CURRENT_CPU** to indicate that the value for the
+ * current CPU should be retrieved.
+ *
+ * Note that before Linux 4.13, only hardware perf event can be
+ * retrieved.
+ *
+ * Also, be aware that the newer helper
+ * **bpf_perf_event_read_value**\ () is recommended over
+ * **bpf_perf_event_read**\ () in general. The latter has some ABI
+ * quirks where error and counter value are used as a return code
+ * (which is wrong to do since ranges may overlap). This issue is
+ * fixed with **bpf_perf_event_read_value**\ (), which at the same
+ * time provides more features over the **bpf_perf_event_read**\
+ * () interface. Please refer to the description of
+ * **bpf_perf_event_read_value**\ () for details.
+ *
+ * Returns
+ * The value of the perf event counter read from the map, or a
+ * negative error code in case of failure.
+ */
+static __u64 (*bpf_perf_event_read)(void *map, __u64 flags) = (void *) 22;
+
+/*
+ * bpf_redirect
+ *
+ * Redirect the packet to another net device of index *ifindex*.
+ * This helper is somewhat similar to **bpf_clone_redirect**\
+ * (), except that the packet is not cloned, which provides
+ * increased performance.
+ *
+ * Except for XDP, both ingress and egress interfaces can be used
+ * for redirection. The **BPF_F_INGRESS** value in *flags* is used
+ * to make the distinction (ingress path is selected if the flag
+ * is present, egress path otherwise). Currently, XDP only
+ * supports redirection to the egress interface, and accepts no
+ * flag at all.
+ *
+ * The same effect can also be attained with the more generic
+ * **bpf_redirect_map**\ (), which uses a BPF map to store the
+ * redirect target instead of providing it directly to the helper.
+ *
+ * Returns
+ * For XDP, the helper returns **XDP_REDIRECT** on success or
+ * **XDP_ABORTED** on error. For other program types, the values
+ * are **TC_ACT_REDIRECT** on success or **TC_ACT_SHOT** on
+ * error.
+ */
+static long (*bpf_redirect)(__u32 ifindex, __u64 flags) = (void *) 23;
+
+/*
+ * bpf_get_route_realm
+ *
+ * Retrieve the realm or the route, that is to say the
+ * **tclassid** field of the destination for the *skb*. The
+ * identifier retrieved is a user-provided tag, similar to the
+ * one used with the net_cls cgroup (see description for
+ * **bpf_get_cgroup_classid**\ () helper), but here this tag is
+ * held by a route (a destination entry), not by a task.
+ *
+ * Retrieving this identifier works with the clsact TC egress hook
+ * (see also **tc-bpf(8)**), or alternatively on conventional
+ * classful egress qdiscs, but not on TC ingress path. In case of
+ * clsact TC egress hook, this has the advantage that, internally,
+ * the destination entry has not been dropped yet in the transmit
+ * path. Therefore, the destination entry does not need to be
+ * artificially held via **netif_keep_dst**\ () for a classful
+ * qdisc until the *skb* is freed.
+ *
+ * This helper is available only if the kernel was compiled with
+ * **CONFIG_IP_ROUTE_CLASSID** configuration option.
+ *
+ * Returns
+ * The realm of the route for the packet associated to *skb*, or 0
+ * if none was found.
+ */
+static __u32 (*bpf_get_route_realm)(struct __sk_buff *skb) = (void *) 24;
+
+/*
+ * bpf_perf_event_output
+ *
+ * Write raw *data* blob into a special BPF perf event held by
+ * *map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. This perf
+ * event must have the following attributes: **PERF_SAMPLE_RAW**
+ * as **sample_type**, **PERF_TYPE_SOFTWARE** as **type**, and
+ * **PERF_COUNT_SW_BPF_OUTPUT** as **config**.
+ *
+ * The *flags* are used to indicate the index in *map* for which
+ * the value must be put, masked with **BPF_F_INDEX_MASK**.
+ * Alternatively, *flags* can be set to **BPF_F_CURRENT_CPU**
+ * to indicate that the index of the current CPU core should be
+ * used.
+ *
+ * The value to write, of *size*, is passed through eBPF stack and
+ * pointed by *data*.
+ *
+ * The context of the program *ctx* needs also be passed to the
+ * helper.
+ *
+ * On user space, a program willing to read the values needs to
+ * call **perf_event_open**\ () on the perf event (either for
+ * one or for all CPUs) and to store the file descriptor into the
+ * *map*. This must be done before the eBPF program can send data
+ * into it. An example is available in file
+ * *samples/bpf/trace_output_user.c* in the Linux kernel source
+ * tree (the eBPF program counterpart is in
+ * *samples/bpf/trace_output_kern.c*).
+ *
+ * **bpf_perf_event_output**\ () achieves better performance
+ * than **bpf_trace_printk**\ () for sharing data with user
+ * space, and is much better suitable for streaming data from eBPF
+ * programs.
+ *
+ * Note that this helper is not restricted to tracing use cases
+ * and can be used with programs attached to TC or XDP as well,
+ * where it allows for passing data to user space listeners. Data
+ * can be:
+ *
+ * * Only custom structs,
+ * * Only the packet payload, or
+ * * A combination of both.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_perf_event_output)(void *ctx, void *map, __u64 flags, void *data, __u64 size) = (void *) 25;
+
+/*
+ * bpf_skb_load_bytes
+ *
+ * This helper was provided as an easy way to load data from a
+ * packet. It can be used to load *len* bytes from *offset* from
+ * the packet associated to *skb*, into the buffer pointed by
+ * *to*.
+ *
+ * Since Linux 4.7, usage of this helper has mostly been replaced
+ * by "direct packet access", enabling packet data to be
+ * manipulated with *skb*\ **->data** and *skb*\ **->data_end**
+ * pointing respectively to the first byte of packet data and to
+ * the byte after the last byte of packet data. However, it
+ * remains useful if one wishes to read large quantities of data
+ * at once from a packet into the eBPF stack.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_load_bytes)(const void *skb, __u32 offset, void *to, __u32 len) = (void *) 26;
+
+/*
+ * bpf_get_stackid
+ *
+ * Walk a user or a kernel stack and return its id. To achieve
+ * this, the helper needs *ctx*, which is a pointer to the context
+ * on which the tracing program is executed, and a pointer to a
+ * *map* of type **BPF_MAP_TYPE_STACK_TRACE**.
+ *
+ * The last argument, *flags*, holds the number of stack frames to
+ * skip (from 0 to 255), masked with
+ * **BPF_F_SKIP_FIELD_MASK**. The next bits can be used to set
+ * a combination of the following flags:
+ *
+ * **BPF_F_USER_STACK**
+ * Collect a user space stack instead of a kernel stack.
+ * **BPF_F_FAST_STACK_CMP**
+ * Compare stacks by hash only.
+ * **BPF_F_REUSE_STACKID**
+ * If two different stacks hash into the same *stackid*,
+ * discard the old one.
+ *
+ * The stack id retrieved is a 32 bit long integer handle which
+ * can be further combined with other data (including other stack
+ * ids) and used as a key into maps. This can be useful for
+ * generating a variety of graphs (such as flame graphs or off-cpu
+ * graphs).
+ *
+ * For walking a stack, this helper is an improvement over
+ * **bpf_probe_read**\ (), which can be used with unrolled loops
+ * but is not efficient and consumes a lot of eBPF instructions.
+ * Instead, **bpf_get_stackid**\ () can collect up to
+ * **PERF_MAX_STACK_DEPTH** both kernel and user frames. Note that
+ * this limit can be controlled with the **sysctl** program, and
+ * that it should be manually increased in order to profile long
+ * user stacks (such as stacks for Java programs). To do so, use:
+ *
+ * ::
+ *
+ * # sysctl kernel.perf_event_max_stack=<new value>
+ *
+ * Returns
+ * The positive or null stack id on success, or a negative error
+ * in case of failure.
+ */
+static long (*bpf_get_stackid)(void *ctx, void *map, __u64 flags) = (void *) 27;
+
+/*
+ * bpf_csum_diff
+ *
+ * Compute a checksum difference, from the raw buffer pointed by
+ * *from*, of length *from_size* (that must be a multiple of 4),
+ * towards the raw buffer pointed by *to*, of size *to_size*
+ * (same remark). An optional *seed* can be added to the value
+ * (this can be cascaded, the seed may come from a previous call
+ * to the helper).
+ *
+ * This is flexible enough to be used in several ways:
+ *
+ * * With *from_size* == 0, *to_size* > 0 and *seed* set to
+ * checksum, it can be used when pushing new data.
+ * * With *from_size* > 0, *to_size* == 0 and *seed* set to
+ * checksum, it can be used when removing data from a packet.
+ * * With *from_size* > 0, *to_size* > 0 and *seed* set to 0, it
+ * can be used to compute a diff. Note that *from_size* and
+ * *to_size* do not need to be equal.
+ *
+ * This helper can be used in combination with
+ * **bpf_l3_csum_replace**\ () and **bpf_l4_csum_replace**\ (), to
+ * which one can feed in the difference computed with
+ * **bpf_csum_diff**\ ().
+ *
+ * Returns
+ * The checksum result, or a negative error code in case of
+ * failure.
+ */
+static __s64 (*bpf_csum_diff)(__be32 *from, __u32 from_size, __be32 *to, __u32 to_size, __wsum seed) = (void *) 28;
+
+/*
+ * bpf_skb_get_tunnel_opt
+ *
+ * Retrieve tunnel options metadata for the packet associated to
+ * *skb*, and store the raw tunnel option data to the buffer *opt*
+ * of *size*.
+ *
+ * This helper can be used with encapsulation devices that can
+ * operate in "collect metadata" mode (please refer to the related
+ * note in the description of **bpf_skb_get_tunnel_key**\ () for
+ * more details). A particular example where this can be used is
+ * in combination with the Geneve encapsulation protocol, where it
+ * allows for pushing (with **bpf_skb_get_tunnel_opt**\ () helper)
+ * and retrieving arbitrary TLVs (Type-Length-Value headers) from
+ * the eBPF program. This allows for full customization of these
+ * headers.
+ *
+ * Returns
+ * The size of the option data retrieved.
+ */
+static long (*bpf_skb_get_tunnel_opt)(struct __sk_buff *skb, void *opt, __u32 size) = (void *) 29;
+
+/*
+ * bpf_skb_set_tunnel_opt
+ *
+ * Set tunnel options metadata for the packet associated to *skb*
+ * to the option data contained in the raw buffer *opt* of *size*.
+ *
+ * See also the description of the **bpf_skb_get_tunnel_opt**\ ()
+ * helper for additional information.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_set_tunnel_opt)(struct __sk_buff *skb, void *opt, __u32 size) = (void *) 30;
+
+/*
+ * bpf_skb_change_proto
+ *
+ * Change the protocol of the *skb* to *proto*. Currently
+ * supported are transition from IPv4 to IPv6, and from IPv6 to
+ * IPv4. The helper takes care of the groundwork for the
+ * transition, including resizing the socket buffer. The eBPF
+ * program is expected to fill the new headers, if any, via
+ * **skb_store_bytes**\ () and to recompute the checksums with
+ * **bpf_l3_csum_replace**\ () and **bpf_l4_csum_replace**\
+ * (). The main case for this helper is to perform NAT64
+ * operations out of an eBPF program.
+ *
+ * Internally, the GSO type is marked as dodgy so that headers are
+ * checked and segments are recalculated by the GSO/GRO engine.
+ * The size for GSO target is adapted as well.
+ *
+ * All values for *flags* are reserved for future usage, and must
+ * be left at zero.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_change_proto)(struct __sk_buff *skb, __be16 proto, __u64 flags) = (void *) 31;
+
+/*
+ * bpf_skb_change_type
+ *
+ * Change the packet type for the packet associated to *skb*. This
+ * comes down to setting *skb*\ **->pkt_type** to *type*, except
+ * the eBPF program does not have a write access to *skb*\
+ * **->pkt_type** beside this helper. Using a helper here allows
+ * for graceful handling of errors.
+ *
+ * The major use case is to change incoming *skb*s to
+ * **PACKET_HOST** in a programmatic way instead of having to
+ * recirculate via **redirect**\ (..., **BPF_F_INGRESS**), for
+ * example.
+ *
+ * Note that *type* only allows certain values. At this time, they
+ * are:
+ *
+ * **PACKET_HOST**
+ * Packet is for us.
+ * **PACKET_BROADCAST**
+ * Send packet to all.
+ * **PACKET_MULTICAST**
+ * Send packet to group.
+ * **PACKET_OTHERHOST**
+ * Send packet to someone else.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_change_type)(struct __sk_buff *skb, __u32 type) = (void *) 32;
+
+/*
+ * bpf_skb_under_cgroup
+ *
+ * Check whether *skb* is a descendant of the cgroup2 held by
+ * *map* of type **BPF_MAP_TYPE_CGROUP_ARRAY**, at *index*.
+ *
+ * Returns
+ * The return value depends on the result of the test, and can be:
+ *
+ * * 0, if the *skb* failed the cgroup2 descendant test.
+ * * 1, if the *skb* succeeded the cgroup2 descendant test.
+ * * A negative error code, if an error occurred.
+ */
+static long (*bpf_skb_under_cgroup)(struct __sk_buff *skb, void *map, __u32 index) = (void *) 33;
+
+/*
+ * bpf_get_hash_recalc
+ *
+ * Retrieve the hash of the packet, *skb*\ **->hash**. If it is
+ * not set, in particular if the hash was cleared due to mangling,
+ * recompute this hash. Later accesses to the hash can be done
+ * directly with *skb*\ **->hash**.
+ *
+ * Calling **bpf_set_hash_invalid**\ (), changing a packet
+ * prototype with **bpf_skb_change_proto**\ (), or calling
+ * **bpf_skb_store_bytes**\ () with the
+ * **BPF_F_INVALIDATE_HASH** are actions susceptible to clear
+ * the hash and to trigger a new computation for the next call to
+ * **bpf_get_hash_recalc**\ ().
+ *
+ * Returns
+ * The 32-bit hash.
+ */
+static __u32 (*bpf_get_hash_recalc)(struct __sk_buff *skb) = (void *) 34;
+
+/*
+ * bpf_get_current_task
+ *
+ * Get the current task.
+ *
+ * Returns
+ * A pointer to the current task struct.
+ */
+static __u64 (*bpf_get_current_task)(void) = (void *) 35;
+
+/*
+ * bpf_probe_write_user
+ *
+ * Attempt in a safe way to write *len* bytes from the buffer
+ * *src* to *dst* in memory. It only works for threads that are in
+ * user context, and *dst* must be a valid user space address.
+ *
+ * This helper should not be used to implement any kind of
+ * security mechanism because of TOC-TOU attacks, but rather to
+ * debug, divert, and manipulate execution of semi-cooperative
+ * processes.
+ *
+ * Keep in mind that this feature is meant for experiments, and it
+ * has a risk of crashing the system and running programs.
+ * Therefore, when an eBPF program using this helper is attached,
+ * a warning including PID and process name is printed to kernel
+ * logs.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_probe_write_user)(void *dst, const void *src, __u32 len) = (void *) 36;
+
+/*
+ * bpf_current_task_under_cgroup
+ *
+ * Check whether the probe is being run is the context of a given
+ * subset of the cgroup2 hierarchy. The cgroup2 to test is held by
+ * *map* of type **BPF_MAP_TYPE_CGROUP_ARRAY**, at *index*.
+ *
+ * Returns
+ * The return value depends on the result of the test, and can be:
+ *
+ * * 1, if current task belongs to the cgroup2.
+ * * 0, if current task does not belong to the cgroup2.
+ * * A negative error code, if an error occurred.
+ */
+static long (*bpf_current_task_under_cgroup)(void *map, __u32 index) = (void *) 37;
+
+/*
+ * bpf_skb_change_tail
+ *
+ * Resize (trim or grow) the packet associated to *skb* to the
+ * new *len*. The *flags* are reserved for future usage, and must
+ * be left at zero.
+ *
+ * The basic idea is that the helper performs the needed work to
+ * change the size of the packet, then the eBPF program rewrites
+ * the rest via helpers like **bpf_skb_store_bytes**\ (),
+ * **bpf_l3_csum_replace**\ (), **bpf_l3_csum_replace**\ ()
+ * and others. This helper is a slow path utility intended for
+ * replies with control messages. And because it is targeted for
+ * slow path, the helper itself can afford to be slow: it
+ * implicitly linearizes, unclones and drops offloads from the
+ * *skb*.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_change_tail)(struct __sk_buff *skb, __u32 len, __u64 flags) = (void *) 38;
+
+/*
+ * bpf_skb_pull_data
+ *
+ * Pull in non-linear data in case the *skb* is non-linear and not
+ * all of *len* are part of the linear section. Make *len* bytes
+ * from *skb* readable and writable. If a zero value is passed for
+ * *len*, then all bytes in the linear part of *skb* will be made
+ * readable and writable.
+ *
+ * This helper is only needed for reading and writing with direct
+ * packet access.
+ *
+ * For direct packet access, testing that offsets to access
+ * are within packet boundaries (test on *skb*\ **->data_end**) is
+ * susceptible to fail if offsets are invalid, or if the requested
+ * data is in non-linear parts of the *skb*. On failure the
+ * program can just bail out, or in the case of a non-linear
+ * buffer, use a helper to make the data available. The
+ * **bpf_skb_load_bytes**\ () helper is a first solution to access
+ * the data. Another one consists in using **bpf_skb_pull_data**
+ * to pull in once the non-linear parts, then retesting and
+ * eventually access the data.
+ *
+ * At the same time, this also makes sure the *skb* is uncloned,
+ * which is a necessary condition for direct write. As this needs
+ * to be an invariant for the write part only, the verifier
+ * detects writes and adds a prologue that is calling
+ * **bpf_skb_pull_data()** to effectively unclone the *skb* from
+ * the very beginning in case it is indeed cloned.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_pull_data)(struct __sk_buff *skb, __u32 len) = (void *) 39;
+
+/*
+ * bpf_csum_update
+ *
+ * Add the checksum *csum* into *skb*\ **->csum** in case the
+ * driver has supplied a checksum for the entire packet into that
+ * field. Return an error otherwise. This helper is intended to be
+ * used in combination with **bpf_csum_diff**\ (), in particular
+ * when the checksum needs to be updated after data has been
+ * written into the packet through direct packet access.
+ *
+ * Returns
+ * The checksum on success, or a negative error code in case of
+ * failure.
+ */
+static __s64 (*bpf_csum_update)(struct __sk_buff *skb, __wsum csum) = (void *) 40;
+
+/*
+ * bpf_set_hash_invalid
+ *
+ * Invalidate the current *skb*\ **->hash**. It can be used after
+ * mangling on headers through direct packet access, in order to
+ * indicate that the hash is outdated and to trigger a
+ * recalculation the next time the kernel tries to access this
+ * hash or when the **bpf_get_hash_recalc**\ () helper is called.
+ *
+ * Returns
+ * void.
+ */
+static void (*bpf_set_hash_invalid)(struct __sk_buff *skb) = (void *) 41;
+
+/*
+ * bpf_get_numa_node_id
+ *
+ * Return the id of the current NUMA node. The primary use case
+ * for this helper is the selection of sockets for the local NUMA
+ * node, when the program is attached to sockets using the
+ * **SO_ATTACH_REUSEPORT_EBPF** option (see also **socket(7)**),
+ * but the helper is also available to other eBPF program types,
+ * similarly to **bpf_get_smp_processor_id**\ ().
+ *
+ * Returns
+ * The id of current NUMA node.
+ */
+static long (*bpf_get_numa_node_id)(void) = (void *) 42;
+
+/*
+ * bpf_skb_change_head
+ *
+ * Grows headroom of packet associated to *skb* and adjusts the
+ * offset of the MAC header accordingly, adding *len* bytes of
+ * space. It automatically extends and reallocates memory as
+ * required.
+ *
+ * This helper can be used on a layer 3 *skb* to push a MAC header
+ * for redirection into a layer 2 device.
+ *
+ * All values for *flags* are reserved for future usage, and must
+ * be left at zero.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_change_head)(struct __sk_buff *skb, __u32 len, __u64 flags) = (void *) 43;
+
+/*
+ * bpf_xdp_adjust_head
+ *
+ * Adjust (move) *xdp_md*\ **->data** by *delta* bytes. Note that
+ * it is possible to use a negative value for *delta*. This helper
+ * can be used to prepare the packet for pushing or popping
+ * headers.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_xdp_adjust_head)(struct xdp_md *xdp_md, int delta) = (void *) 44;
+
+/*
+ * bpf_probe_read_str
+ *
+ * Copy a NUL terminated string from an unsafe kernel address
+ * *unsafe_ptr* to *dst*. See **bpf_probe_read_kernel_str**\ () for
+ * more details.
+ *
+ * Generally, use **bpf_probe_read_user_str**\ () or
+ * **bpf_probe_read_kernel_str**\ () instead.
+ *
+ * Returns
+ * On success, the strictly positive length of the string,
+ * including the trailing NUL character. On error, a negative
+ * value.
+ */
+static long (*bpf_probe_read_str)(void *dst, __u32 size, const void *unsafe_ptr) = (void *) 45;
+
+/*
+ * bpf_get_socket_cookie
+ *
+ * If the **struct sk_buff** pointed by *skb* has a known socket,
+ * retrieve the cookie (generated by the kernel) of this socket.
+ * If no cookie has been set yet, generate a new cookie. Once
+ * generated, the socket cookie remains stable for the life of the
+ * socket. This helper can be useful for monitoring per socket
+ * networking traffic statistics as it provides a global socket
+ * identifier that can be assumed unique.
+ *
+ * Returns
+ * A 8-byte long unique number on success, or 0 if the socket
+ * field is missing inside *skb*.
+ */
+static __u64 (*bpf_get_socket_cookie)(void *ctx) = (void *) 46;
+
+/*
+ * bpf_get_socket_uid
+ *
+ * Get the owner UID of the socked associated to *skb*.
+ *
+ * Returns
+ * The owner UID of the socket associated to *skb*. If the socket
+ * is **NULL**, or if it is not a full socket (i.e. if it is a
+ * time-wait or a request socket instead), **overflowuid** value
+ * is returned (note that **overflowuid** might also be the actual
+ * UID value for the socket).
+ */
+static __u32 (*bpf_get_socket_uid)(struct __sk_buff *skb) = (void *) 47;
+
+/*
+ * bpf_set_hash
+ *
+ * Set the full hash for *skb* (set the field *skb*\ **->hash**)
+ * to value *hash*.
+ *
+ * Returns
+ * 0
+ */
+static long (*bpf_set_hash)(struct __sk_buff *skb, __u32 hash) = (void *) 48;
+
+/*
+ * bpf_setsockopt
+ *
+ * Emulate a call to **setsockopt()** on the socket associated to
+ * *bpf_socket*, which must be a full socket. The *level* at
+ * which the option resides and the name *optname* of the option
+ * must be specified, see **setsockopt(2)** for more information.
+ * The option value of length *optlen* is pointed by *optval*.
+ *
+ * *bpf_socket* should be one of the following:
+ *
+ * * **struct bpf_sock_ops** for **BPF_PROG_TYPE_SOCK_OPS**.
+ * * **struct bpf_sock_addr** for **BPF_CGROUP_INET4_CONNECT**
+ * and **BPF_CGROUP_INET6_CONNECT**.
+ *
+ * This helper actually implements a subset of **setsockopt()**.
+ * It supports the following *level*\ s:
+ *
+ * * **SOL_SOCKET**, which supports the following *optname*\ s:
+ * **SO_RCVBUF**, **SO_SNDBUF**, **SO_MAX_PACING_RATE**,
+ * **SO_PRIORITY**, **SO_RCVLOWAT**, **SO_MARK**,
+ * **SO_BINDTODEVICE**, **SO_KEEPALIVE**, **SO_REUSEADDR**,
+ * **SO_REUSEPORT**, **SO_BINDTOIFINDEX**, **SO_TXREHASH**.
+ * * **IPPROTO_TCP**, which supports the following *optname*\ s:
+ * **TCP_CONGESTION**, **TCP_BPF_IW**,
+ * **TCP_BPF_SNDCWND_CLAMP**, **TCP_SAVE_SYN**,
+ * **TCP_KEEPIDLE**, **TCP_KEEPINTVL**, **TCP_KEEPCNT**,
+ * **TCP_SYNCNT**, **TCP_USER_TIMEOUT**, **TCP_NOTSENT_LOWAT**,
+ * **TCP_NODELAY**, **TCP_MAXSEG**, **TCP_WINDOW_CLAMP**,
+ * **TCP_THIN_LINEAR_TIMEOUTS**, **TCP_BPF_DELACK_MAX**,
+ * **TCP_BPF_RTO_MIN**.
+ * * **IPPROTO_IP**, which supports *optname* **IP_TOS**.
+ * * **IPPROTO_IPV6**, which supports the following *optname*\ s:
+ * **IPV6_TCLASS**, **IPV6_AUTOFLOWLABEL**.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_setsockopt)(void *bpf_socket, int level, int optname, void *optval, int optlen) = (void *) 49;
+
+/*
+ * bpf_skb_adjust_room
+ *
+ * Grow or shrink the room for data in the packet associated to
+ * *skb* by *len_diff*, and according to the selected *mode*.
+ *
+ * By default, the helper will reset any offloaded checksum
+ * indicator of the skb to CHECKSUM_NONE. This can be avoided
+ * by the following flag:
+ *
+ * * **BPF_F_ADJ_ROOM_NO_CSUM_RESET**: Do not reset offloaded
+ * checksum data of the skb to CHECKSUM_NONE.
+ *
+ * There are two supported modes at this time:
+ *
+ * * **BPF_ADJ_ROOM_MAC**: Adjust room at the mac layer
+ * (room space is added or removed between the layer 2 and
+ * layer 3 headers).
+ *
+ * * **BPF_ADJ_ROOM_NET**: Adjust room at the network layer
+ * (room space is added or removed between the layer 3 and
+ * layer 4 headers).
+ *
+ * The following flags are supported at this time:
+ *
+ * * **BPF_F_ADJ_ROOM_FIXED_GSO**: Do not adjust gso_size.
+ * Adjusting mss in this way is not allowed for datagrams.
+ *
+ * * **BPF_F_ADJ_ROOM_ENCAP_L3_IPV4**,
+ * **BPF_F_ADJ_ROOM_ENCAP_L3_IPV6**:
+ * Any new space is reserved to hold a tunnel header.
+ * Configure skb offsets and other fields accordingly.
+ *
+ * * **BPF_F_ADJ_ROOM_ENCAP_L4_GRE**,
+ * **BPF_F_ADJ_ROOM_ENCAP_L4_UDP**:
+ * Use with ENCAP_L3 flags to further specify the tunnel type.
+ *
+ * * **BPF_F_ADJ_ROOM_ENCAP_L2**\ (*len*):
+ * Use with ENCAP_L3/L4 flags to further specify the tunnel
+ * type; *len* is the length of the inner MAC header.
+ *
+ * * **BPF_F_ADJ_ROOM_ENCAP_L2_ETH**:
+ * Use with BPF_F_ADJ_ROOM_ENCAP_L2 flag to further specify the
+ * L2 type as Ethernet.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_adjust_room)(struct __sk_buff *skb, __s32 len_diff, __u32 mode, __u64 flags) = (void *) 50;
+
+/*
+ * bpf_redirect_map
+ *
+ * Redirect the packet to the endpoint referenced by *map* at
+ * index *key*. Depending on its type, this *map* can contain
+ * references to net devices (for forwarding packets through other
+ * ports), or to CPUs (for redirecting XDP frames to another CPU;
+ * but this is only implemented for native XDP (with driver
+ * support) as of this writing).
+ *
+ * The lower two bits of *flags* are used as the return code if
+ * the map lookup fails. This is so that the return value can be
+ * one of the XDP program return codes up to **XDP_TX**, as chosen
+ * by the caller. The higher bits of *flags* can be set to
+ * BPF_F_BROADCAST or BPF_F_EXCLUDE_INGRESS as defined below.
+ *
+ * With BPF_F_BROADCAST the packet will be broadcasted to all the
+ * interfaces in the map, with BPF_F_EXCLUDE_INGRESS the ingress
+ * interface will be excluded when do broadcasting.
+ *
+ * See also **bpf_redirect**\ (), which only supports redirecting
+ * to an ifindex, but doesn't require a map to do so.
+ *
+ * Returns
+ * **XDP_REDIRECT** on success, or the value of the two lower bits
+ * of the *flags* argument on error.
+ */
+static long (*bpf_redirect_map)(void *map, __u64 key, __u64 flags) = (void *) 51;
+
+/*
+ * bpf_sk_redirect_map
+ *
+ * Redirect the packet to the socket referenced by *map* (of type
+ * **BPF_MAP_TYPE_SOCKMAP**) at index *key*. Both ingress and
+ * egress interfaces can be used for redirection. The
+ * **BPF_F_INGRESS** value in *flags* is used to make the
+ * distinction (ingress path is selected if the flag is present,
+ * egress path otherwise). This is the only flag supported for now.
+ *
+ * Returns
+ * **SK_PASS** on success, or **SK_DROP** on error.
+ */
+static long (*bpf_sk_redirect_map)(struct __sk_buff *skb, void *map, __u32 key, __u64 flags) = (void *) 52;
+
+/*
+ * bpf_sock_map_update
+ *
+ * Add an entry to, or update a *map* referencing sockets. The
+ * *skops* is used as a new value for the entry associated to
+ * *key*. *flags* is one of:
+ *
+ * **BPF_NOEXIST**
+ * The entry for *key* must not exist in the map.
+ * **BPF_EXIST**
+ * The entry for *key* must already exist in the map.
+ * **BPF_ANY**
+ * No condition on the existence of the entry for *key*.
+ *
+ * If the *map* has eBPF programs (parser and verdict), those will
+ * be inherited by the socket being added. If the socket is
+ * already attached to eBPF programs, this results in an error.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_sock_map_update)(struct bpf_sock_ops *skops, void *map, void *key, __u64 flags) = (void *) 53;
+
+/*
+ * bpf_xdp_adjust_meta
+ *
+ * Adjust the address pointed by *xdp_md*\ **->data_meta** by
+ * *delta* (which can be positive or negative). Note that this
+ * operation modifies the address stored in *xdp_md*\ **->data**,
+ * so the latter must be loaded only after the helper has been
+ * called.
+ *
+ * The use of *xdp_md*\ **->data_meta** is optional and programs
+ * are not required to use it. The rationale is that when the
+ * packet is processed with XDP (e.g. as DoS filter), it is
+ * possible to push further meta data along with it before passing
+ * to the stack, and to give the guarantee that an ingress eBPF
+ * program attached as a TC classifier on the same device can pick
+ * this up for further post-processing. Since TC works with socket
+ * buffers, it remains possible to set from XDP the **mark** or
+ * **priority** pointers, or other pointers for the socket buffer.
+ * Having this scratch space generic and programmable allows for
+ * more flexibility as the user is free to store whatever meta
+ * data they need.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_xdp_adjust_meta)(struct xdp_md *xdp_md, int delta) = (void *) 54;
+
+/*
+ * bpf_perf_event_read_value
+ *
+ * Read the value of a perf event counter, and store it into *buf*
+ * of size *buf_size*. This helper relies on a *map* of type
+ * **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. The nature of the perf event
+ * counter is selected when *map* is updated with perf event file
+ * descriptors. The *map* is an array whose size is the number of
+ * available CPUs, and each cell contains a value relative to one
+ * CPU. The value to retrieve is indicated by *flags*, that
+ * contains the index of the CPU to look up, masked with
+ * **BPF_F_INDEX_MASK**. Alternatively, *flags* can be set to
+ * **BPF_F_CURRENT_CPU** to indicate that the value for the
+ * current CPU should be retrieved.
+ *
+ * This helper behaves in a way close to
+ * **bpf_perf_event_read**\ () helper, save that instead of
+ * just returning the value observed, it fills the *buf*
+ * structure. This allows for additional data to be retrieved: in
+ * particular, the enabled and running times (in *buf*\
+ * **->enabled** and *buf*\ **->running**, respectively) are
+ * copied. In general, **bpf_perf_event_read_value**\ () is
+ * recommended over **bpf_perf_event_read**\ (), which has some
+ * ABI issues and provides fewer functionalities.
+ *
+ * These values are interesting, because hardware PMU (Performance
+ * Monitoring Unit) counters are limited resources. When there are
+ * more PMU based perf events opened than available counters,
+ * kernel will multiplex these events so each event gets certain
+ * percentage (but not all) of the PMU time. In case that
+ * multiplexing happens, the number of samples or counter value
+ * will not reflect the case compared to when no multiplexing
+ * occurs. This makes comparison between different runs difficult.
+ * Typically, the counter value should be normalized before
+ * comparing to other experiments. The usual normalization is done
+ * as follows.
+ *
+ * ::
+ *
+ * normalized_counter = counter * t_enabled / t_running
+ *
+ * Where t_enabled is the time enabled for event and t_running is
+ * the time running for event since last normalization. The
+ * enabled and running times are accumulated since the perf event
+ * open. To achieve scaling factor between two invocations of an
+ * eBPF program, users can use CPU id as the key (which is
+ * typical for perf array usage model) to remember the previous
+ * value and do the calculation inside the eBPF program.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_perf_event_read_value)(void *map, __u64 flags, struct bpf_perf_event_value *buf, __u32 buf_size) = (void *) 55;
+
+/*
+ * bpf_perf_prog_read_value
+ *
+ * For en eBPF program attached to a perf event, retrieve the
+ * value of the event counter associated to *ctx* and store it in
+ * the structure pointed by *buf* and of size *buf_size*. Enabled
+ * and running times are also stored in the structure (see
+ * description of helper **bpf_perf_event_read_value**\ () for
+ * more details).
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_perf_prog_read_value)(struct bpf_perf_event_data *ctx, struct bpf_perf_event_value *buf, __u32 buf_size) = (void *) 56;
+
+/*
+ * bpf_getsockopt
+ *
+ * Emulate a call to **getsockopt()** on the socket associated to
+ * *bpf_socket*, which must be a full socket. The *level* at
+ * which the option resides and the name *optname* of the option
+ * must be specified, see **getsockopt(2)** for more information.
+ * The retrieved value is stored in the structure pointed by
+ * *opval* and of length *optlen*.
+ *
+ * *bpf_socket* should be one of the following:
+ *
+ * * **struct bpf_sock_ops** for **BPF_PROG_TYPE_SOCK_OPS**.
+ * * **struct bpf_sock_addr** for **BPF_CGROUP_INET4_CONNECT**
+ * and **BPF_CGROUP_INET6_CONNECT**.
+ *
+ * This helper actually implements a subset of **getsockopt()**.
+ * It supports the same set of *optname*\ s that is supported by
+ * the **bpf_setsockopt**\ () helper. The exceptions are
+ * **TCP_BPF_*** is **bpf_setsockopt**\ () only and
+ * **TCP_SAVED_SYN** is **bpf_getsockopt**\ () only.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_getsockopt)(void *bpf_socket, int level, int optname, void *optval, int optlen) = (void *) 57;
+
+/*
+ * bpf_override_return
+ *
+ * Used for error injection, this helper uses kprobes to override
+ * the return value of the probed function, and to set it to *rc*.
+ * The first argument is the context *regs* on which the kprobe
+ * works.
+ *
+ * This helper works by setting the PC (program counter)
+ * to an override function which is run in place of the original
+ * probed function. This means the probed function is not run at
+ * all. The replacement function just returns with the required
+ * value.
+ *
+ * This helper has security implications, and thus is subject to
+ * restrictions. It is only available if the kernel was compiled
+ * with the **CONFIG_BPF_KPROBE_OVERRIDE** configuration
+ * option, and in this case it only works on functions tagged with
+ * **ALLOW_ERROR_INJECTION** in the kernel code.
+ *
+ * Also, the helper is only available for the architectures having
+ * the CONFIG_FUNCTION_ERROR_INJECTION option. As of this writing,
+ * x86 architecture is the only one to support this feature.
+ *
+ * Returns
+ * 0
+ */
+static long (*bpf_override_return)(struct pt_regs *regs, __u64 rc) = (void *) 58;
+
+/*
+ * bpf_sock_ops_cb_flags_set
+ *
+ * Attempt to set the value of the **bpf_sock_ops_cb_flags** field
+ * for the full TCP socket associated to *bpf_sock_ops* to
+ * *argval*.
+ *
+ * The primary use of this field is to determine if there should
+ * be calls to eBPF programs of type
+ * **BPF_PROG_TYPE_SOCK_OPS** at various points in the TCP
+ * code. A program of the same type can change its value, per
+ * connection and as necessary, when the connection is
+ * established. This field is directly accessible for reading, but
+ * this helper must be used for updates in order to return an
+ * error if an eBPF program tries to set a callback that is not
+ * supported in the current kernel.
+ *
+ * *argval* is a flag array which can combine these flags:
+ *
+ * * **BPF_SOCK_OPS_RTO_CB_FLAG** (retransmission time out)
+ * * **BPF_SOCK_OPS_RETRANS_CB_FLAG** (retransmission)
+ * * **BPF_SOCK_OPS_STATE_CB_FLAG** (TCP state change)
+ * * **BPF_SOCK_OPS_RTT_CB_FLAG** (every RTT)
+ *
+ * Therefore, this function can be used to clear a callback flag by
+ * setting the appropriate bit to zero. e.g. to disable the RTO
+ * callback:
+ *
+ * **bpf_sock_ops_cb_flags_set(bpf_sock,**
+ * **bpf_sock->bpf_sock_ops_cb_flags & ~BPF_SOCK_OPS_RTO_CB_FLAG)**
+ *
+ * Here are some examples of where one could call such eBPF
+ * program:
+ *
+ * * When RTO fires.
+ * * When a packet is retransmitted.
+ * * When the connection terminates.
+ * * When a packet is sent.
+ * * When a packet is received.
+ *
+ * Returns
+ * Code **-EINVAL** if the socket is not a full TCP socket;
+ * otherwise, a positive number containing the bits that could not
+ * be set is returned (which comes down to 0 if all bits were set
+ * as required).
+ */
+static long (*bpf_sock_ops_cb_flags_set)(struct bpf_sock_ops *bpf_sock, int argval) = (void *) 59;
+
+/*
+ * bpf_msg_redirect_map
+ *
+ * This helper is used in programs implementing policies at the
+ * socket level. If the message *msg* is allowed to pass (i.e. if
+ * the verdict eBPF program returns **SK_PASS**), redirect it to
+ * the socket referenced by *map* (of type
+ * **BPF_MAP_TYPE_SOCKMAP**) at index *key*. Both ingress and
+ * egress interfaces can be used for redirection. The
+ * **BPF_F_INGRESS** value in *flags* is used to make the
+ * distinction (ingress path is selected if the flag is present,
+ * egress path otherwise). This is the only flag supported for now.
+ *
+ * Returns
+ * **SK_PASS** on success, or **SK_DROP** on error.
+ */
+static long (*bpf_msg_redirect_map)(struct sk_msg_md *msg, void *map, __u32 key, __u64 flags) = (void *) 60;
+
+/*
+ * bpf_msg_apply_bytes
+ *
+ * For socket policies, apply the verdict of the eBPF program to
+ * the next *bytes* (number of bytes) of message *msg*.
+ *
+ * For example, this helper can be used in the following cases:
+ *
+ * * A single **sendmsg**\ () or **sendfile**\ () system call
+ * contains multiple logical messages that the eBPF program is
+ * supposed to read and for which it should apply a verdict.
+ * * An eBPF program only cares to read the first *bytes* of a
+ * *msg*. If the message has a large payload, then setting up
+ * and calling the eBPF program repeatedly for all bytes, even
+ * though the verdict is already known, would create unnecessary
+ * overhead.
+ *
+ * When called from within an eBPF program, the helper sets a
+ * counter internal to the BPF infrastructure, that is used to
+ * apply the last verdict to the next *bytes*. If *bytes* is
+ * smaller than the current data being processed from a
+ * **sendmsg**\ () or **sendfile**\ () system call, the first
+ * *bytes* will be sent and the eBPF program will be re-run with
+ * the pointer for start of data pointing to byte number *bytes*
+ * **+ 1**. If *bytes* is larger than the current data being
+ * processed, then the eBPF verdict will be applied to multiple
+ * **sendmsg**\ () or **sendfile**\ () calls until *bytes* are
+ * consumed.
+ *
+ * Note that if a socket closes with the internal counter holding
+ * a non-zero value, this is not a problem because data is not
+ * being buffered for *bytes* and is sent as it is received.
+ *
+ * Returns
+ * 0
+ */
+static long (*bpf_msg_apply_bytes)(struct sk_msg_md *msg, __u32 bytes) = (void *) 61;
+
+/*
+ * bpf_msg_cork_bytes
+ *
+ * For socket policies, prevent the execution of the verdict eBPF
+ * program for message *msg* until *bytes* (byte number) have been
+ * accumulated.
+ *
+ * This can be used when one needs a specific number of bytes
+ * before a verdict can be assigned, even if the data spans
+ * multiple **sendmsg**\ () or **sendfile**\ () calls. The extreme
+ * case would be a user calling **sendmsg**\ () repeatedly with
+ * 1-byte long message segments. Obviously, this is bad for
+ * performance, but it is still valid. If the eBPF program needs
+ * *bytes* bytes to validate a header, this helper can be used to
+ * prevent the eBPF program to be called again until *bytes* have
+ * been accumulated.
+ *
+ * Returns
+ * 0
+ */
+static long (*bpf_msg_cork_bytes)(struct sk_msg_md *msg, __u32 bytes) = (void *) 62;
+
+/*
+ * bpf_msg_pull_data
+ *
+ * For socket policies, pull in non-linear data from user space
+ * for *msg* and set pointers *msg*\ **->data** and *msg*\
+ * **->data_end** to *start* and *end* bytes offsets into *msg*,
+ * respectively.
+ *
+ * If a program of type **BPF_PROG_TYPE_SK_MSG** is run on a
+ * *msg* it can only parse data that the (**data**, **data_end**)
+ * pointers have already consumed. For **sendmsg**\ () hooks this
+ * is likely the first scatterlist element. But for calls relying
+ * on the **sendpage** handler (e.g. **sendfile**\ ()) this will
+ * be the range (**0**, **0**) because the data is shared with
+ * user space and by default the objective is to avoid allowing
+ * user space to modify data while (or after) eBPF verdict is
+ * being decided. This helper can be used to pull in data and to
+ * set the start and end pointer to given values. Data will be
+ * copied if necessary (i.e. if data was not linear and if start
+ * and end pointers do not point to the same chunk).
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * All values for *flags* are reserved for future usage, and must
+ * be left at zero.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_msg_pull_data)(struct sk_msg_md *msg, __u32 start, __u32 end, __u64 flags) = (void *) 63;
+
+/*
+ * bpf_bind
+ *
+ * Bind the socket associated to *ctx* to the address pointed by
+ * *addr*, of length *addr_len*. This allows for making outgoing
+ * connection from the desired IP address, which can be useful for
+ * example when all processes inside a cgroup should use one
+ * single IP address on a host that has multiple IP configured.
+ *
+ * This helper works for IPv4 and IPv6, TCP and UDP sockets. The
+ * domain (*addr*\ **->sa_family**) must be **AF_INET** (or
+ * **AF_INET6**). It's advised to pass zero port (**sin_port**
+ * or **sin6_port**) which triggers IP_BIND_ADDRESS_NO_PORT-like
+ * behavior and lets the kernel efficiently pick up an unused
+ * port as long as 4-tuple is unique. Passing non-zero port might
+ * lead to degraded performance.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_bind)(struct bpf_sock_addr *ctx, struct sockaddr *addr, int addr_len) = (void *) 64;
+
+/*
+ * bpf_xdp_adjust_tail
+ *
+ * Adjust (move) *xdp_md*\ **->data_end** by *delta* bytes. It is
+ * possible to both shrink and grow the packet tail.
+ * Shrink done via *delta* being a negative integer.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_xdp_adjust_tail)(struct xdp_md *xdp_md, int delta) = (void *) 65;
+
+/*
+ * bpf_skb_get_xfrm_state
+ *
+ * Retrieve the XFRM state (IP transform framework, see also
+ * **ip-xfrm(8)**) at *index* in XFRM "security path" for *skb*.
+ *
+ * The retrieved value is stored in the **struct bpf_xfrm_state**
+ * pointed by *xfrm_state* and of length *size*.
+ *
+ * All values for *flags* are reserved for future usage, and must
+ * be left at zero.
+ *
+ * This helper is available only if the kernel was compiled with
+ * **CONFIG_XFRM** configuration option.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_get_xfrm_state)(struct __sk_buff *skb, __u32 index, struct bpf_xfrm_state *xfrm_state, __u32 size, __u64 flags) = (void *) 66;
+
+/*
+ * bpf_get_stack
+ *
+ * Return a user or a kernel stack in bpf program provided buffer.
+ * To achieve this, the helper needs *ctx*, which is a pointer
+ * to the context on which the tracing program is executed.
+ * To store the stacktrace, the bpf program provides *buf* with
+ * a nonnegative *size*.
+ *
+ * The last argument, *flags*, holds the number of stack frames to
+ * skip (from 0 to 255), masked with
+ * **BPF_F_SKIP_FIELD_MASK**. The next bits can be used to set
+ * the following flags:
+ *
+ * **BPF_F_USER_STACK**
+ * Collect a user space stack instead of a kernel stack.
+ * **BPF_F_USER_BUILD_ID**
+ * Collect (build_id, file_offset) instead of ips for user
+ * stack, only valid if **BPF_F_USER_STACK** is also
+ * specified.
+ *
+ * *file_offset* is an offset relative to the beginning
+ * of the executable or shared object file backing the vma
+ * which the *ip* falls in. It is *not* an offset relative
+ * to that object's base address. Accordingly, it must be
+ * adjusted by adding (sh_addr - sh_offset), where
+ * sh_{addr,offset} correspond to the executable section
+ * containing *file_offset* in the object, for comparisons
+ * to symbols' st_value to be valid.
+ *
+ * **bpf_get_stack**\ () can collect up to
+ * **PERF_MAX_STACK_DEPTH** both kernel and user frames, subject
+ * to sufficient large buffer size. Note that
+ * this limit can be controlled with the **sysctl** program, and
+ * that it should be manually increased in order to profile long
+ * user stacks (such as stacks for Java programs). To do so, use:
+ *
+ * ::
+ *
+ * # sysctl kernel.perf_event_max_stack=<new value>
+ *
+ * Returns
+ * The non-negative copied *buf* length equal to or less than
+ * *size* on success, or a negative error in case of failure.
+ */
+static long (*bpf_get_stack)(void *ctx, void *buf, __u32 size, __u64 flags) = (void *) 67;
+
+/*
+ * bpf_skb_load_bytes_relative
+ *
+ * This helper is similar to **bpf_skb_load_bytes**\ () in that
+ * it provides an easy way to load *len* bytes from *offset*
+ * from the packet associated to *skb*, into the buffer pointed
+ * by *to*. The difference to **bpf_skb_load_bytes**\ () is that
+ * a fifth argument *start_header* exists in order to select a
+ * base offset to start from. *start_header* can be one of:
+ *
+ * **BPF_HDR_START_MAC**
+ * Base offset to load data from is *skb*'s mac header.
+ * **BPF_HDR_START_NET**
+ * Base offset to load data from is *skb*'s network header.
+ *
+ * In general, "direct packet access" is the preferred method to
+ * access packet data, however, this helper is in particular useful
+ * in socket filters where *skb*\ **->data** does not always point
+ * to the start of the mac header and where "direct packet access"
+ * is not available.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_load_bytes_relative)(const void *skb, __u32 offset, void *to, __u32 len, __u32 start_header) = (void *) 68;
+
+/*
+ * bpf_fib_lookup
+ *
+ * Do FIB lookup in kernel tables using parameters in *params*.
+ * If lookup is successful and result shows packet is to be
+ * forwarded, the neighbor tables are searched for the nexthop.
+ * If successful (ie., FIB lookup shows forwarding and nexthop
+ * is resolved), the nexthop address is returned in ipv4_dst
+ * or ipv6_dst based on family, smac is set to mac address of
+ * egress device, dmac is set to nexthop mac address, rt_metric
+ * is set to metric from route (IPv4/IPv6 only), and ifindex
+ * is set to the device index of the nexthop from the FIB lookup.
+ *
+ * *plen* argument is the size of the passed in struct.
+ * *flags* argument can be a combination of one or more of the
+ * following values:
+ *
+ * **BPF_FIB_LOOKUP_DIRECT**
+ * Do a direct table lookup vs full lookup using FIB
+ * rules.
+ * **BPF_FIB_LOOKUP_OUTPUT**
+ * Perform lookup from an egress perspective (default is
+ * ingress).
+ *
+ * *ctx* is either **struct xdp_md** for XDP programs or
+ * **struct sk_buff** tc cls_act programs.
+ *
+ * Returns
+ * * < 0 if any input argument is invalid
+ * * 0 on success (packet is forwarded, nexthop neighbor exists)
+ * * > 0 one of **BPF_FIB_LKUP_RET_** codes explaining why the
+ * packet is not forwarded or needs assist from full stack
+ *
+ * If lookup fails with BPF_FIB_LKUP_RET_FRAG_NEEDED, then the MTU
+ * was exceeded and output params->mtu_result contains the MTU.
+ */
+static long (*bpf_fib_lookup)(void *ctx, struct bpf_fib_lookup *params, int plen, __u32 flags) = (void *) 69;
+
+/*
+ * bpf_sock_hash_update
+ *
+ * Add an entry to, or update a sockhash *map* referencing sockets.
+ * The *skops* is used as a new value for the entry associated to
+ * *key*. *flags* is one of:
+ *
+ * **BPF_NOEXIST**
+ * The entry for *key* must not exist in the map.
+ * **BPF_EXIST**
+ * The entry for *key* must already exist in the map.
+ * **BPF_ANY**
+ * No condition on the existence of the entry for *key*.
+ *
+ * If the *map* has eBPF programs (parser and verdict), those will
+ * be inherited by the socket being added. If the socket is
+ * already attached to eBPF programs, this results in an error.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_sock_hash_update)(struct bpf_sock_ops *skops, void *map, void *key, __u64 flags) = (void *) 70;
+
+/*
+ * bpf_msg_redirect_hash
+ *
+ * This helper is used in programs implementing policies at the
+ * socket level. If the message *msg* is allowed to pass (i.e. if
+ * the verdict eBPF program returns **SK_PASS**), redirect it to
+ * the socket referenced by *map* (of type
+ * **BPF_MAP_TYPE_SOCKHASH**) using hash *key*. Both ingress and
+ * egress interfaces can be used for redirection. The
+ * **BPF_F_INGRESS** value in *flags* is used to make the
+ * distinction (ingress path is selected if the flag is present,
+ * egress path otherwise). This is the only flag supported for now.
+ *
+ * Returns
+ * **SK_PASS** on success, or **SK_DROP** on error.
+ */
+static long (*bpf_msg_redirect_hash)(struct sk_msg_md *msg, void *map, void *key, __u64 flags) = (void *) 71;
+
+/*
+ * bpf_sk_redirect_hash
+ *
+ * This helper is used in programs implementing policies at the
+ * skb socket level. If the sk_buff *skb* is allowed to pass (i.e.
+ * if the verdict eBPF program returns **SK_PASS**), redirect it
+ * to the socket referenced by *map* (of type
+ * **BPF_MAP_TYPE_SOCKHASH**) using hash *key*. Both ingress and
+ * egress interfaces can be used for redirection. The
+ * **BPF_F_INGRESS** value in *flags* is used to make the
+ * distinction (ingress path is selected if the flag is present,
+ * egress otherwise). This is the only flag supported for now.
+ *
+ * Returns
+ * **SK_PASS** on success, or **SK_DROP** on error.
+ */
+static long (*bpf_sk_redirect_hash)(struct __sk_buff *skb, void *map, void *key, __u64 flags) = (void *) 72;
+
+/*
+ * bpf_lwt_push_encap
+ *
+ * Encapsulate the packet associated to *skb* within a Layer 3
+ * protocol header. This header is provided in the buffer at
+ * address *hdr*, with *len* its size in bytes. *type* indicates
+ * the protocol of the header and can be one of:
+ *
+ * **BPF_LWT_ENCAP_SEG6**
+ * IPv6 encapsulation with Segment Routing Header
+ * (**struct ipv6_sr_hdr**). *hdr* only contains the SRH,
+ * the IPv6 header is computed by the kernel.
+ * **BPF_LWT_ENCAP_SEG6_INLINE**
+ * Only works if *skb* contains an IPv6 packet. Insert a
+ * Segment Routing Header (**struct ipv6_sr_hdr**) inside
+ * the IPv6 header.
+ * **BPF_LWT_ENCAP_IP**
+ * IP encapsulation (GRE/GUE/IPIP/etc). The outer header
+ * must be IPv4 or IPv6, followed by zero or more
+ * additional headers, up to **LWT_BPF_MAX_HEADROOM**
+ * total bytes in all prepended headers. Please note that
+ * if **skb_is_gso**\ (*skb*) is true, no more than two
+ * headers can be prepended, and the inner header, if
+ * present, should be either GRE or UDP/GUE.
+ *
+ * **BPF_LWT_ENCAP_SEG6**\ \* types can be called by BPF programs
+ * of type **BPF_PROG_TYPE_LWT_IN**; **BPF_LWT_ENCAP_IP** type can
+ * be called by bpf programs of types **BPF_PROG_TYPE_LWT_IN** and
+ * **BPF_PROG_TYPE_LWT_XMIT**.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_lwt_push_encap)(struct __sk_buff *skb, __u32 type, void *hdr, __u32 len) = (void *) 73;
+
+/*
+ * bpf_lwt_seg6_store_bytes
+ *
+ * Store *len* bytes from address *from* into the packet
+ * associated to *skb*, at *offset*. Only the flags, tag and TLVs
+ * inside the outermost IPv6 Segment Routing Header can be
+ * modified through this helper.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_lwt_seg6_store_bytes)(struct __sk_buff *skb, __u32 offset, const void *from, __u32 len) = (void *) 74;
+
+/*
+ * bpf_lwt_seg6_adjust_srh
+ *
+ * Adjust the size allocated to TLVs in the outermost IPv6
+ * Segment Routing Header contained in the packet associated to
+ * *skb*, at position *offset* by *delta* bytes. Only offsets
+ * after the segments are accepted. *delta* can be as well
+ * positive (growing) as negative (shrinking).
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_lwt_seg6_adjust_srh)(struct __sk_buff *skb, __u32 offset, __s32 delta) = (void *) 75;
+
+/*
+ * bpf_lwt_seg6_action
+ *
+ * Apply an IPv6 Segment Routing action of type *action* to the
+ * packet associated to *skb*. Each action takes a parameter
+ * contained at address *param*, and of length *param_len* bytes.
+ * *action* can be one of:
+ *
+ * **SEG6_LOCAL_ACTION_END_X**
+ * End.X action: Endpoint with Layer-3 cross-connect.
+ * Type of *param*: **struct in6_addr**.
+ * **SEG6_LOCAL_ACTION_END_T**
+ * End.T action: Endpoint with specific IPv6 table lookup.
+ * Type of *param*: **int**.
+ * **SEG6_LOCAL_ACTION_END_B6**
+ * End.B6 action: Endpoint bound to an SRv6 policy.
+ * Type of *param*: **struct ipv6_sr_hdr**.
+ * **SEG6_LOCAL_ACTION_END_B6_ENCAP**
+ * End.B6.Encap action: Endpoint bound to an SRv6
+ * encapsulation policy.
+ * Type of *param*: **struct ipv6_sr_hdr**.
+ *
+ * A call to this helper is susceptible to change the underlying
+ * packet buffer. Therefore, at load time, all checks on pointers
+ * previously done by the verifier are invalidated and must be
+ * performed again, if the helper is used in combination with
+ * direct packet access.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_lwt_seg6_action)(struct __sk_buff *skb, __u32 action, void *param, __u32 param_len) = (void *) 76;
+
+/*
+ * bpf_rc_repeat
+ *
+ * This helper is used in programs implementing IR decoding, to
+ * report a successfully decoded repeat key message. This delays
+ * the generation of a key up event for previously generated
+ * key down event.
+ *
+ * Some IR protocols like NEC have a special IR message for
+ * repeating last button, for when a button is held down.
+ *
+ * The *ctx* should point to the lirc sample as passed into
+ * the program.
+ *
+ * This helper is only available is the kernel was compiled with
+ * the **CONFIG_BPF_LIRC_MODE2** configuration option set to
+ * "**y**".
+ *
+ * Returns
+ * 0
+ */
+static long (*bpf_rc_repeat)(void *ctx) = (void *) 77;
+
+/*
+ * bpf_rc_keydown
+ *
+ * This helper is used in programs implementing IR decoding, to
+ * report a successfully decoded key press with *scancode*,
+ * *toggle* value in the given *protocol*. The scancode will be
+ * translated to a keycode using the rc keymap, and reported as
+ * an input key down event. After a period a key up event is
+ * generated. This period can be extended by calling either
+ * **bpf_rc_keydown**\ () again with the same values, or calling
+ * **bpf_rc_repeat**\ ().
+ *
+ * Some protocols include a toggle bit, in case the button was
+ * released and pressed again between consecutive scancodes.
+ *
+ * The *ctx* should point to the lirc sample as passed into
+ * the program.
+ *
+ * The *protocol* is the decoded protocol number (see
+ * **enum rc_proto** for some predefined values).
+ *
+ * This helper is only available is the kernel was compiled with
+ * the **CONFIG_BPF_LIRC_MODE2** configuration option set to
+ * "**y**".
+ *
+ * Returns
+ * 0
+ */
+static long (*bpf_rc_keydown)(void *ctx, __u32 protocol, __u64 scancode, __u32 toggle) = (void *) 78;
+
+/*
+ * bpf_skb_cgroup_id
+ *
+ * Return the cgroup v2 id of the socket associated with the *skb*.
+ * This is roughly similar to the **bpf_get_cgroup_classid**\ ()
+ * helper for cgroup v1 by providing a tag resp. identifier that
+ * can be matched on or used for map lookups e.g. to implement
+ * policy. The cgroup v2 id of a given path in the hierarchy is
+ * exposed in user space through the f_handle API in order to get
+ * to the same 64-bit id.
+ *
+ * This helper can be used on TC egress path, but not on ingress,
+ * and is available only if the kernel was compiled with the
+ * **CONFIG_SOCK_CGROUP_DATA** configuration option.
+ *
+ * Returns
+ * The id is returned or 0 in case the id could not be retrieved.
+ */
+static __u64 (*bpf_skb_cgroup_id)(struct __sk_buff *skb) = (void *) 79;
+
+/*
+ * bpf_get_current_cgroup_id
+ *
+ * Get the current cgroup id based on the cgroup within which
+ * the current task is running.
+ *
+ * Returns
+ * A 64-bit integer containing the current cgroup id based
+ * on the cgroup within which the current task is running.
+ */
+static __u64 (*bpf_get_current_cgroup_id)(void) = (void *) 80;
+
+/*
+ * bpf_get_local_storage
+ *
+ * Get the pointer to the local storage area.
+ * The type and the size of the local storage is defined
+ * by the *map* argument.
+ * The *flags* meaning is specific for each map type,
+ * and has to be 0 for cgroup local storage.
+ *
+ * Depending on the BPF program type, a local storage area
+ * can be shared between multiple instances of the BPF program,
+ * running simultaneously.
+ *
+ * A user should care about the synchronization by himself.
+ * For example, by using the **BPF_ATOMIC** instructions to alter
+ * the shared data.
+ *
+ * Returns
+ * A pointer to the local storage area.
+ */
+static void *(*bpf_get_local_storage)(void *map, __u64 flags) = (void *) 81;
+
+/*
+ * bpf_sk_select_reuseport
+ *
+ * Select a **SO_REUSEPORT** socket from a
+ * **BPF_MAP_TYPE_REUSEPORT_SOCKARRAY** *map*.
+ * It checks the selected socket is matching the incoming
+ * request in the socket buffer.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_sk_select_reuseport)(struct sk_reuseport_md *reuse, void *map, void *key, __u64 flags) = (void *) 82;
+
+/*
+ * bpf_skb_ancestor_cgroup_id
+ *
+ * Return id of cgroup v2 that is ancestor of cgroup associated
+ * with the *skb* at the *ancestor_level*. The root cgroup is at
+ * *ancestor_level* zero and each step down the hierarchy
+ * increments the level. If *ancestor_level* == level of cgroup
+ * associated with *skb*, then return value will be same as that
+ * of **bpf_skb_cgroup_id**\ ().
+ *
+ * The helper is useful to implement policies based on cgroups
+ * that are upper in hierarchy than immediate cgroup associated
+ * with *skb*.
+ *
+ * The format of returned id and helper limitations are same as in
+ * **bpf_skb_cgroup_id**\ ().
+ *
+ * Returns
+ * The id is returned or 0 in case the id could not be retrieved.
+ */
+static __u64 (*bpf_skb_ancestor_cgroup_id)(struct __sk_buff *skb, int ancestor_level) = (void *) 83;
+
+/*
+ * bpf_sk_lookup_tcp
+ *
+ * Look for TCP socket matching *tuple*, optionally in a child
+ * network namespace *netns*. The return value must be checked,
+ * and if non-**NULL**, released via **bpf_sk_release**\ ().
+ *
+ * The *ctx* should point to the context of the program, such as
+ * the skb or socket (depending on the hook in use). This is used
+ * to determine the base network namespace for the lookup.
+ *
+ * *tuple_size* must be one of:
+ *
+ * **sizeof**\ (*tuple*\ **->ipv4**)
+ * Look for an IPv4 socket.
+ * **sizeof**\ (*tuple*\ **->ipv6**)
+ * Look for an IPv6 socket.
+ *
+ * If the *netns* is a negative signed 32-bit integer, then the
+ * socket lookup table in the netns associated with the *ctx*
+ * will be used. For the TC hooks, this is the netns of the device
+ * in the skb. For socket hooks, this is the netns of the socket.
+ * If *netns* is any other signed 32-bit value greater than or
+ * equal to zero then it specifies the ID of the netns relative to
+ * the netns associated with the *ctx*. *netns* values beyond the
+ * range of 32-bit integers are reserved for future use.
+ *
+ * All values for *flags* are reserved for future usage, and must
+ * be left at zero.
+ *
+ * This helper is available only if the kernel was compiled with
+ * **CONFIG_NET** configuration option.
+ *
+ * Returns
+ * Pointer to **struct bpf_sock**, or **NULL** in case of failure.
+ * For sockets with reuseport option, the **struct bpf_sock**
+ * result is from *reuse*\ **->socks**\ [] using the hash of the
+ * tuple.
+ */
+static struct bpf_sock *(*bpf_sk_lookup_tcp)(void *ctx, struct bpf_sock_tuple *tuple, __u32 tuple_size, __u64 netns, __u64 flags) = (void *) 84;
+
+/*
+ * bpf_sk_lookup_udp
+ *
+ * Look for UDP socket matching *tuple*, optionally in a child
+ * network namespace *netns*. The return value must be checked,
+ * and if non-**NULL**, released via **bpf_sk_release**\ ().
+ *
+ * The *ctx* should point to the context of the program, such as
+ * the skb or socket (depending on the hook in use). This is used
+ * to determine the base network namespace for the lookup.
+ *
+ * *tuple_size* must be one of:
+ *
+ * **sizeof**\ (*tuple*\ **->ipv4**)
+ * Look for an IPv4 socket.
+ * **sizeof**\ (*tuple*\ **->ipv6**)
+ * Look for an IPv6 socket.
+ *
+ * If the *netns* is a negative signed 32-bit integer, then the
+ * socket lookup table in the netns associated with the *ctx*
+ * will be used. For the TC hooks, this is the netns of the device
+ * in the skb. For socket hooks, this is the netns of the socket.
+ * If *netns* is any other signed 32-bit value greater than or
+ * equal to zero then it specifies the ID of the netns relative to
+ * the netns associated with the *ctx*. *netns* values beyond the
+ * range of 32-bit integers are reserved for future use.
+ *
+ * All values for *flags* are reserved for future usage, and must
+ * be left at zero.
+ *
+ * This helper is available only if the kernel was compiled with
+ * **CONFIG_NET** configuration option.
+ *
+ * Returns
+ * Pointer to **struct bpf_sock**, or **NULL** in case of failure.
+ * For sockets with reuseport option, the **struct bpf_sock**
+ * result is from *reuse*\ **->socks**\ [] using the hash of the
+ * tuple.
+ */
+static struct bpf_sock *(*bpf_sk_lookup_udp)(void *ctx, struct bpf_sock_tuple *tuple, __u32 tuple_size, __u64 netns, __u64 flags) = (void *) 85;
+
+/*
+ * bpf_sk_release
+ *
+ * Release the reference held by *sock*. *sock* must be a
+ * non-**NULL** pointer that was returned from
+ * **bpf_sk_lookup_xxx**\ ().
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_sk_release)(void *sock) = (void *) 86;
+
+/*
+ * bpf_map_push_elem
+ *
+ * Push an element *value* in *map*. *flags* is one of:
+ *
+ * **BPF_EXIST**
+ * If the queue/stack is full, the oldest element is
+ * removed to make room for this.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_map_push_elem)(void *map, const void *value, __u64 flags) = (void *) 87;
+
+/*
+ * bpf_map_pop_elem
+ *
+ * Pop an element from *map*.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_map_pop_elem)(void *map, void *value) = (void *) 88;
+
+/*
+ * bpf_map_peek_elem
+ *
+ * Get an element from *map* without removing it.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_map_peek_elem)(void *map, void *value) = (void *) 89;
+
+/*
+ * bpf_msg_push_data
+ *
+ * For socket policies, insert *len* bytes into *msg* at offset
+ * *start*.
+ *
+ * If a program of type **BPF_PROG_TYPE_SK_MSG** is run on a
+ * *msg* it may want to insert metadata or options into the *msg*.
+ * This can later be read and used by any of the lower layer BPF
+ * hooks.
+ *
+ * This helper may fail if under memory pressure (a malloc
+ * fails) in these cases BPF programs will get an appropriate
+ * error and BPF programs will need to handle them.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_msg_push_data)(struct sk_msg_md *msg, __u32 start, __u32 len, __u64 flags) = (void *) 90;
+
+/*
+ * bpf_msg_pop_data
+ *
+ * Will remove *len* bytes from a *msg* starting at byte *start*.
+ * This may result in **ENOMEM** errors under certain situations if
+ * an allocation and copy are required due to a full ring buffer.
+ * However, the helper will try to avoid doing the allocation
+ * if possible. Other errors can occur if input parameters are
+ * invalid either due to *start* byte not being valid part of *msg*
+ * payload and/or *pop* value being to large.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_msg_pop_data)(struct sk_msg_md *msg, __u32 start, __u32 len, __u64 flags) = (void *) 91;
+
+/*
+ * bpf_rc_pointer_rel
+ *
+ * This helper is used in programs implementing IR decoding, to
+ * report a successfully decoded pointer movement.
+ *
+ * The *ctx* should point to the lirc sample as passed into
+ * the program.
+ *
+ * This helper is only available is the kernel was compiled with
+ * the **CONFIG_BPF_LIRC_MODE2** configuration option set to
+ * "**y**".
+ *
+ * Returns
+ * 0
+ */
+static long (*bpf_rc_pointer_rel)(void *ctx, __s32 rel_x, __s32 rel_y) = (void *) 92;
+
+/*
+ * bpf_spin_lock
+ *
+ * Acquire a spinlock represented by the pointer *lock*, which is
+ * stored as part of a value of a map. Taking the lock allows to
+ * safely update the rest of the fields in that value. The
+ * spinlock can (and must) later be released with a call to
+ * **bpf_spin_unlock**\ (\ *lock*\ ).
+ *
+ * Spinlocks in BPF programs come with a number of restrictions
+ * and constraints:
+ *
+ * * **bpf_spin_lock** objects are only allowed inside maps of
+ * types **BPF_MAP_TYPE_HASH** and **BPF_MAP_TYPE_ARRAY** (this
+ * list could be extended in the future).
+ * * BTF description of the map is mandatory.
+ * * The BPF program can take ONE lock at a time, since taking two
+ * or more could cause dead locks.
+ * * Only one **struct bpf_spin_lock** is allowed per map element.
+ * * When the lock is taken, calls (either BPF to BPF or helpers)
+ * are not allowed.
+ * * The **BPF_LD_ABS** and **BPF_LD_IND** instructions are not
+ * allowed inside a spinlock-ed region.
+ * * The BPF program MUST call **bpf_spin_unlock**\ () to release
+ * the lock, on all execution paths, before it returns.
+ * * The BPF program can access **struct bpf_spin_lock** only via
+ * the **bpf_spin_lock**\ () and **bpf_spin_unlock**\ ()
+ * helpers. Loading or storing data into the **struct
+ * bpf_spin_lock** *lock*\ **;** field of a map is not allowed.
+ * * To use the **bpf_spin_lock**\ () helper, the BTF description
+ * of the map value must be a struct and have **struct
+ * bpf_spin_lock** *anyname*\ **;** field at the top level.
+ * Nested lock inside another struct is not allowed.
+ * * The **struct bpf_spin_lock** *lock* field in a map value must
+ * be aligned on a multiple of 4 bytes in that value.
+ * * Syscall with command **BPF_MAP_LOOKUP_ELEM** does not copy
+ * the **bpf_spin_lock** field to user space.
+ * * Syscall with command **BPF_MAP_UPDATE_ELEM**, or update from
+ * a BPF program, do not update the **bpf_spin_lock** field.
+ * * **bpf_spin_lock** cannot be on the stack or inside a
+ * networking packet (it can only be inside of a map values).
+ * * **bpf_spin_lock** is available to root only.
+ * * Tracing programs and socket filter programs cannot use
+ * **bpf_spin_lock**\ () due to insufficient preemption checks
+ * (but this may change in the future).
+ * * **bpf_spin_lock** is not allowed in inner maps of map-in-map.
+ *
+ * Returns
+ * 0
+ */
+static long (*bpf_spin_lock)(struct bpf_spin_lock *lock) = (void *) 93;
+
+/*
+ * bpf_spin_unlock
+ *
+ * Release the *lock* previously locked by a call to
+ * **bpf_spin_lock**\ (\ *lock*\ ).
+ *
+ * Returns
+ * 0
+ */
+static long (*bpf_spin_unlock)(struct bpf_spin_lock *lock) = (void *) 94;
+
+/*
+ * bpf_sk_fullsock
+ *
+ * This helper gets a **struct bpf_sock** pointer such
+ * that all the fields in this **bpf_sock** can be accessed.
+ *
+ * Returns
+ * A **struct bpf_sock** pointer on success, or **NULL** in
+ * case of failure.
+ */
+static struct bpf_sock *(*bpf_sk_fullsock)(struct bpf_sock *sk) = (void *) 95;
+
+/*
+ * bpf_tcp_sock
+ *
+ * This helper gets a **struct bpf_tcp_sock** pointer from a
+ * **struct bpf_sock** pointer.
+ *
+ * Returns
+ * A **struct bpf_tcp_sock** pointer on success, or **NULL** in
+ * case of failure.
+ */
+static struct bpf_tcp_sock *(*bpf_tcp_sock)(struct bpf_sock *sk) = (void *) 96;
+
+/*
+ * bpf_skb_ecn_set_ce
+ *
+ * Set ECN (Explicit Congestion Notification) field of IP header
+ * to **CE** (Congestion Encountered) if current value is **ECT**
+ * (ECN Capable Transport). Otherwise, do nothing. Works with IPv6
+ * and IPv4.
+ *
+ * Returns
+ * 1 if the **CE** flag is set (either by the current helper call
+ * or because it was already present), 0 if it is not set.
+ */
+static long (*bpf_skb_ecn_set_ce)(struct __sk_buff *skb) = (void *) 97;
+
+/*
+ * bpf_get_listener_sock
+ *
+ * Return a **struct bpf_sock** pointer in **TCP_LISTEN** state.
+ * **bpf_sk_release**\ () is unnecessary and not allowed.
+ *
+ * Returns
+ * A **struct bpf_sock** pointer on success, or **NULL** in
+ * case of failure.
+ */
+static struct bpf_sock *(*bpf_get_listener_sock)(struct bpf_sock *sk) = (void *) 98;
+
+/*
+ * bpf_skc_lookup_tcp
+ *
+ * Look for TCP socket matching *tuple*, optionally in a child
+ * network namespace *netns*. The return value must be checked,
+ * and if non-**NULL**, released via **bpf_sk_release**\ ().
+ *
+ * This function is identical to **bpf_sk_lookup_tcp**\ (), except
+ * that it also returns timewait or request sockets. Use
+ * **bpf_sk_fullsock**\ () or **bpf_tcp_sock**\ () to access the
+ * full structure.
+ *
+ * This helper is available only if the kernel was compiled with
+ * **CONFIG_NET** configuration option.
+ *
+ * Returns
+ * Pointer to **struct bpf_sock**, or **NULL** in case of failure.
+ * For sockets with reuseport option, the **struct bpf_sock**
+ * result is from *reuse*\ **->socks**\ [] using the hash of the
+ * tuple.
+ */
+static struct bpf_sock *(*bpf_skc_lookup_tcp)(void *ctx, struct bpf_sock_tuple *tuple, __u32 tuple_size, __u64 netns, __u64 flags) = (void *) 99;
+
+/*
+ * bpf_tcp_check_syncookie
+ *
+ * Check whether *iph* and *th* contain a valid SYN cookie ACK for
+ * the listening socket in *sk*.
+ *
+ * *iph* points to the start of the IPv4 or IPv6 header, while
+ * *iph_len* contains **sizeof**\ (**struct iphdr**) or
+ * **sizeof**\ (**struct ipv6hdr**).
+ *
+ * *th* points to the start of the TCP header, while *th_len*
+ * contains the length of the TCP header (at least
+ * **sizeof**\ (**struct tcphdr**)).
+ *
+ * Returns
+ * 0 if *iph* and *th* are a valid SYN cookie ACK, or a negative
+ * error otherwise.
+ */
+static long (*bpf_tcp_check_syncookie)(void *sk, void *iph, __u32 iph_len, struct tcphdr *th, __u32 th_len) = (void *) 100;
+
+/*
+ * bpf_sysctl_get_name
+ *
+ * Get name of sysctl in /proc/sys/ and copy it into provided by
+ * program buffer *buf* of size *buf_len*.
+ *
+ * The buffer is always NUL terminated, unless it's zero-sized.
+ *
+ * If *flags* is zero, full name (e.g. "net/ipv4/tcp_mem") is
+ * copied. Use **BPF_F_SYSCTL_BASE_NAME** flag to copy base name
+ * only (e.g. "tcp_mem").
+ *
+ * Returns
+ * Number of character copied (not including the trailing NUL).
+ *
+ * **-E2BIG** if the buffer wasn't big enough (*buf* will contain
+ * truncated name in this case).
+ */
+static long (*bpf_sysctl_get_name)(struct bpf_sysctl *ctx, char *buf, unsigned long buf_len, __u64 flags) = (void *) 101;
+
+/*
+ * bpf_sysctl_get_current_value
+ *
+ * Get current value of sysctl as it is presented in /proc/sys
+ * (incl. newline, etc), and copy it as a string into provided
+ * by program buffer *buf* of size *buf_len*.
+ *
+ * The whole value is copied, no matter what file position user
+ * space issued e.g. sys_read at.
+ *
+ * The buffer is always NUL terminated, unless it's zero-sized.
+ *
+ * Returns
+ * Number of character copied (not including the trailing NUL).
+ *
+ * **-E2BIG** if the buffer wasn't big enough (*buf* will contain
+ * truncated name in this case).
+ *
+ * **-EINVAL** if current value was unavailable, e.g. because
+ * sysctl is uninitialized and read returns -EIO for it.
+ */
+static long (*bpf_sysctl_get_current_value)(struct bpf_sysctl *ctx, char *buf, unsigned long buf_len) = (void *) 102;
+
+/*
+ * bpf_sysctl_get_new_value
+ *
+ * Get new value being written by user space to sysctl (before
+ * the actual write happens) and copy it as a string into
+ * provided by program buffer *buf* of size *buf_len*.
+ *
+ * User space may write new value at file position > 0.
+ *
+ * The buffer is always NUL terminated, unless it's zero-sized.
+ *
+ * Returns
+ * Number of character copied (not including the trailing NUL).
+ *
+ * **-E2BIG** if the buffer wasn't big enough (*buf* will contain
+ * truncated name in this case).
+ *
+ * **-EINVAL** if sysctl is being read.
+ */
+static long (*bpf_sysctl_get_new_value)(struct bpf_sysctl *ctx, char *buf, unsigned long buf_len) = (void *) 103;
+
+/*
+ * bpf_sysctl_set_new_value
+ *
+ * Override new value being written by user space to sysctl with
+ * value provided by program in buffer *buf* of size *buf_len*.
+ *
+ * *buf* should contain a string in same form as provided by user
+ * space on sysctl write.
+ *
+ * User space may write new value at file position > 0. To override
+ * the whole sysctl value file position should be set to zero.
+ *
+ * Returns
+ * 0 on success.
+ *
+ * **-E2BIG** if the *buf_len* is too big.
+ *
+ * **-EINVAL** if sysctl is being read.
+ */
+static long (*bpf_sysctl_set_new_value)(struct bpf_sysctl *ctx, const char *buf, unsigned long buf_len) = (void *) 104;
+
+/*
+ * bpf_strtol
+ *
+ * Convert the initial part of the string from buffer *buf* of
+ * size *buf_len* to a long integer according to the given base
+ * and save the result in *res*.
+ *
+ * The string may begin with an arbitrary amount of white space
+ * (as determined by **isspace**\ (3)) followed by a single
+ * optional '**-**' sign.
+ *
+ * Five least significant bits of *flags* encode base, other bits
+ * are currently unused.
+ *
+ * Base must be either 8, 10, 16 or 0 to detect it automatically
+ * similar to user space **strtol**\ (3).
+ *
+ * Returns
+ * Number of characters consumed on success. Must be positive but
+ * no more than *buf_len*.
+ *
+ * **-EINVAL** if no valid digits were found or unsupported base
+ * was provided.
+ *
+ * **-ERANGE** if resulting value was out of range.
+ */
+static long (*bpf_strtol)(const char *buf, unsigned long buf_len, __u64 flags, long *res) = (void *) 105;
+
+/*
+ * bpf_strtoul
+ *
+ * Convert the initial part of the string from buffer *buf* of
+ * size *buf_len* to an unsigned long integer according to the
+ * given base and save the result in *res*.
+ *
+ * The string may begin with an arbitrary amount of white space
+ * (as determined by **isspace**\ (3)).
+ *
+ * Five least significant bits of *flags* encode base, other bits
+ * are currently unused.
+ *
+ * Base must be either 8, 10, 16 or 0 to detect it automatically
+ * similar to user space **strtoul**\ (3).
+ *
+ * Returns
+ * Number of characters consumed on success. Must be positive but
+ * no more than *buf_len*.
+ *
+ * **-EINVAL** if no valid digits were found or unsupported base
+ * was provided.
+ *
+ * **-ERANGE** if resulting value was out of range.
+ */
+static long (*bpf_strtoul)(const char *buf, unsigned long buf_len, __u64 flags, unsigned long *res) = (void *) 106;
+
+/*
+ * bpf_sk_storage_get
+ *
+ * Get a bpf-local-storage from a *sk*.
+ *
+ * Logically, it could be thought of getting the value from
+ * a *map* with *sk* as the **key**. From this
+ * perspective, the usage is not much different from
+ * **bpf_map_lookup_elem**\ (*map*, **&**\ *sk*) except this
+ * helper enforces the key must be a full socket and the map must
+ * be a **BPF_MAP_TYPE_SK_STORAGE** also.
+ *
+ * Underneath, the value is stored locally at *sk* instead of
+ * the *map*. The *map* is used as the bpf-local-storage
+ * "type". The bpf-local-storage "type" (i.e. the *map*) is
+ * searched against all bpf-local-storages residing at *sk*.
+ *
+ * *sk* is a kernel **struct sock** pointer for LSM program.
+ * *sk* is a **struct bpf_sock** pointer for other program types.
+ *
+ * An optional *flags* (**BPF_SK_STORAGE_GET_F_CREATE**) can be
+ * used such that a new bpf-local-storage will be
+ * created if one does not exist. *value* can be used
+ * together with **BPF_SK_STORAGE_GET_F_CREATE** to specify
+ * the initial value of a bpf-local-storage. If *value* is
+ * **NULL**, the new bpf-local-storage will be zero initialized.
+ *
+ * Returns
+ * A bpf-local-storage pointer is returned on success.
+ *
+ * **NULL** if not found or there was an error in adding
+ * a new bpf-local-storage.
+ */
+static void *(*bpf_sk_storage_get)(void *map, void *sk, void *value, __u64 flags) = (void *) 107;
+
+/*
+ * bpf_sk_storage_delete
+ *
+ * Delete a bpf-local-storage from a *sk*.
+ *
+ * Returns
+ * 0 on success.
+ *
+ * **-ENOENT** if the bpf-local-storage cannot be found.
+ * **-EINVAL** if sk is not a fullsock (e.g. a request_sock).
+ */
+static long (*bpf_sk_storage_delete)(void *map, void *sk) = (void *) 108;
+
+/*
+ * bpf_send_signal
+ *
+ * Send signal *sig* to the process of the current task.
+ * The signal may be delivered to any of this process's threads.
+ *
+ * Returns
+ * 0 on success or successfully queued.
+ *
+ * **-EBUSY** if work queue under nmi is full.
+ *
+ * **-EINVAL** if *sig* is invalid.
+ *
+ * **-EPERM** if no permission to send the *sig*.
+ *
+ * **-EAGAIN** if bpf program can try again.
+ */
+static long (*bpf_send_signal)(__u32 sig) = (void *) 109;
+
+/*
+ * bpf_tcp_gen_syncookie
+ *
+ * Try to issue a SYN cookie for the packet with corresponding
+ * IP/TCP headers, *iph* and *th*, on the listening socket in *sk*.
+ *
+ * *iph* points to the start of the IPv4 or IPv6 header, while
+ * *iph_len* contains **sizeof**\ (**struct iphdr**) or
+ * **sizeof**\ (**struct ipv6hdr**).
+ *
+ * *th* points to the start of the TCP header, while *th_len*
+ * contains the length of the TCP header with options (at least
+ * **sizeof**\ (**struct tcphdr**)).
+ *
+ * Returns
+ * On success, lower 32 bits hold the generated SYN cookie in
+ * followed by 16 bits which hold the MSS value for that cookie,
+ * and the top 16 bits are unused.
+ *
+ * On failure, the returned value is one of the following:
+ *
+ * **-EINVAL** SYN cookie cannot be issued due to error
+ *
+ * **-ENOENT** SYN cookie should not be issued (no SYN flood)
+ *
+ * **-EOPNOTSUPP** kernel configuration does not enable SYN cookies
+ *
+ * **-EPROTONOSUPPORT** IP packet version is not 4 or 6
+ */
+static __s64 (*bpf_tcp_gen_syncookie)(void *sk, void *iph, __u32 iph_len, struct tcphdr *th, __u32 th_len) = (void *) 110;
+
+/*
+ * bpf_skb_output
+ *
+ * Write raw *data* blob into a special BPF perf event held by
+ * *map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. This perf
+ * event must have the following attributes: **PERF_SAMPLE_RAW**
+ * as **sample_type**, **PERF_TYPE_SOFTWARE** as **type**, and
+ * **PERF_COUNT_SW_BPF_OUTPUT** as **config**.
+ *
+ * The *flags* are used to indicate the index in *map* for which
+ * the value must be put, masked with **BPF_F_INDEX_MASK**.
+ * Alternatively, *flags* can be set to **BPF_F_CURRENT_CPU**
+ * to indicate that the index of the current CPU core should be
+ * used.
+ *
+ * The value to write, of *size*, is passed through eBPF stack and
+ * pointed by *data*.
+ *
+ * *ctx* is a pointer to in-kernel struct sk_buff.
+ *
+ * This helper is similar to **bpf_perf_event_output**\ () but
+ * restricted to raw_tracepoint bpf programs.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_skb_output)(void *ctx, void *map, __u64 flags, void *data, __u64 size) = (void *) 111;
+
+/*
+ * bpf_probe_read_user
+ *
+ * Safely attempt to read *size* bytes from user space address
+ * *unsafe_ptr* and store the data in *dst*.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_probe_read_user)(void *dst, __u32 size, const void *unsafe_ptr) = (void *) 112;
+
+/*
+ * bpf_probe_read_kernel
+ *
+ * Safely attempt to read *size* bytes from kernel space address
+ * *unsafe_ptr* and store the data in *dst*.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_probe_read_kernel)(void *dst, __u32 size, const void *unsafe_ptr) = (void *) 113;
+
+/*
+ * bpf_probe_read_user_str
+ *
+ * Copy a NUL terminated string from an unsafe user address
+ * *unsafe_ptr* to *dst*. The *size* should include the
+ * terminating NUL byte. In case the string length is smaller than
+ * *size*, the target is not padded with further NUL bytes. If the
+ * string length is larger than *size*, just *size*-1 bytes are
+ * copied and the last byte is set to NUL.
+ *
+ * On success, returns the number of bytes that were written,
+ * including the terminal NUL. This makes this helper useful in
+ * tracing programs for reading strings, and more importantly to
+ * get its length at runtime. See the following snippet:
+ *
+ * ::
+ *
+ * SEC("kprobe/sys_open")
+ * void bpf_sys_open(struct pt_regs *ctx)
+ * {
+ * char buf[PATHLEN]; // PATHLEN is defined to 256
+ * int res = bpf_probe_read_user_str(buf, sizeof(buf),
+ * ctx->di);
+ *
+ * // Consume buf, for example push it to
+ * // userspace via bpf_perf_event_output(); we
+ * // can use res (the string length) as event
+ * // size, after checking its boundaries.
+ * }
+ *
+ * In comparison, using **bpf_probe_read_user**\ () helper here
+ * instead to read the string would require to estimate the length
+ * at compile time, and would often result in copying more memory
+ * than necessary.
+ *
+ * Another useful use case is when parsing individual process
+ * arguments or individual environment variables navigating
+ * *current*\ **->mm->arg_start** and *current*\
+ * **->mm->env_start**: using this helper and the return value,
+ * one can quickly iterate at the right offset of the memory area.
+ *
+ * Returns
+ * On success, the strictly positive length of the output string,
+ * including the trailing NUL character. On error, a negative
+ * value.
+ */
+static long (*bpf_probe_read_user_str)(void *dst, __u32 size, const void *unsafe_ptr) = (void *) 114;
+
+/*
+ * bpf_probe_read_kernel_str
+ *
+ * Copy a NUL terminated string from an unsafe kernel address *unsafe_ptr*
+ * to *dst*. Same semantics as with **bpf_probe_read_user_str**\ () apply.
+ *
+ * Returns
+ * On success, the strictly positive length of the string, including
+ * the trailing NUL character. On error, a negative value.
+ */
+static long (*bpf_probe_read_kernel_str)(void *dst, __u32 size, const void *unsafe_ptr) = (void *) 115;
+
+/*
+ * bpf_tcp_send_ack
+ *
+ * Send out a tcp-ack. *tp* is the in-kernel struct **tcp_sock**.
+ * *rcv_nxt* is the ack_seq to be sent out.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_tcp_send_ack)(void *tp, __u32 rcv_nxt) = (void *) 116;
+
+/*
+ * bpf_send_signal_thread
+ *
+ * Send signal *sig* to the thread corresponding to the current task.
+ *
+ * Returns
+ * 0 on success or successfully queued.
+ *
+ * **-EBUSY** if work queue under nmi is full.
+ *
+ * **-EINVAL** if *sig* is invalid.
+ *
+ * **-EPERM** if no permission to send the *sig*.
+ *
+ * **-EAGAIN** if bpf program can try again.
+ */
+static long (*bpf_send_signal_thread)(__u32 sig) = (void *) 117;
+
+/*
+ * bpf_jiffies64
+ *
+ * Obtain the 64bit jiffies
+ *
+ * Returns
+ * The 64 bit jiffies
+ */
+static __u64 (*bpf_jiffies64)(void) = (void *) 118;
+
+/*
+ * bpf_read_branch_records
+ *
+ * For an eBPF program attached to a perf event, retrieve the
+ * branch records (**struct perf_branch_entry**) associated to *ctx*
+ * and store it in the buffer pointed by *buf* up to size
+ * *size* bytes.
+ *
+ * Returns
+ * On success, number of bytes written to *buf*. On error, a
+ * negative value.
+ *
+ * The *flags* can be set to **BPF_F_GET_BRANCH_RECORDS_SIZE** to
+ * instead return the number of bytes required to store all the
+ * branch entries. If this flag is set, *buf* may be NULL.
+ *
+ * **-EINVAL** if arguments invalid or **size** not a multiple
+ * of **sizeof**\ (**struct perf_branch_entry**\ ).
+ *
+ * **-ENOENT** if architecture does not support branch records.
+ */
+static long (*bpf_read_branch_records)(struct bpf_perf_event_data *ctx, void *buf, __u32 size, __u64 flags) = (void *) 119;
+
+/*
+ * bpf_get_ns_current_pid_tgid
+ *
+ * Returns 0 on success, values for *pid* and *tgid* as seen from the current
+ * *namespace* will be returned in *nsdata*.
+ *
+ * Returns
+ * 0 on success, or one of the following in case of failure:
+ *
+ * **-EINVAL** if dev and inum supplied don't match dev_t and inode number
+ * with nsfs of current task, or if dev conversion to dev_t lost high bits.
+ *
+ * **-ENOENT** if pidns does not exists for the current task.
+ */
+static long (*bpf_get_ns_current_pid_tgid)(__u64 dev, __u64 ino, struct bpf_pidns_info *nsdata, __u32 size) = (void *) 120;
+
+/*
+ * bpf_xdp_output
+ *
+ * Write raw *data* blob into a special BPF perf event held by
+ * *map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. This perf
+ * event must have the following attributes: **PERF_SAMPLE_RAW**
+ * as **sample_type**, **PERF_TYPE_SOFTWARE** as **type**, and
+ * **PERF_COUNT_SW_BPF_OUTPUT** as **config**.
+ *
+ * The *flags* are used to indicate the index in *map* for which
+ * the value must be put, masked with **BPF_F_INDEX_MASK**.
+ * Alternatively, *flags* can be set to **BPF_F_CURRENT_CPU**
+ * to indicate that the index of the current CPU core should be
+ * used.
+ *
+ * The value to write, of *size*, is passed through eBPF stack and
+ * pointed by *data*.
+ *
+ * *ctx* is a pointer to in-kernel struct xdp_buff.
+ *
+ * This helper is similar to **bpf_perf_eventoutput**\ () but
+ * restricted to raw_tracepoint bpf programs.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_xdp_output)(void *ctx, void *map, __u64 flags, void *data, __u64 size) = (void *) 121;
+
+/*
+ * bpf_get_netns_cookie
+ *
+ * Retrieve the cookie (generated by the kernel) of the network
+ * namespace the input *ctx* is associated with. The network
+ * namespace cookie remains stable for its lifetime and provides
+ * a global identifier that can be assumed unique. If *ctx* is
+ * NULL, then the helper returns the cookie for the initial
+ * network namespace. The cookie itself is very similar to that
+ * of **bpf_get_socket_cookie**\ () helper, but for network
+ * namespaces instead of sockets.
+ *
+ * Returns
+ * A 8-byte long opaque number.
+ */
+static __u64 (*bpf_get_netns_cookie)(void *ctx) = (void *) 122;
+
+/*
+ * bpf_get_current_ancestor_cgroup_id
+ *
+ * Return id of cgroup v2 that is ancestor of the cgroup associated
+ * with the current task at the *ancestor_level*. The root cgroup
+ * is at *ancestor_level* zero and each step down the hierarchy
+ * increments the level. If *ancestor_level* == level of cgroup
+ * associated with the current task, then return value will be the
+ * same as that of **bpf_get_current_cgroup_id**\ ().
+ *
+ * The helper is useful to implement policies based on cgroups
+ * that are upper in hierarchy than immediate cgroup associated
+ * with the current task.
+ *
+ * The format of returned id and helper limitations are same as in
+ * **bpf_get_current_cgroup_id**\ ().
+ *
+ * Returns
+ * The id is returned or 0 in case the id could not be retrieved.
+ */
+static __u64 (*bpf_get_current_ancestor_cgroup_id)(int ancestor_level) = (void *) 123;
+
+/*
+ * bpf_sk_assign
+ *
+ * Helper is overloaded depending on BPF program type. This
+ * description applies to **BPF_PROG_TYPE_SCHED_CLS** and
+ * **BPF_PROG_TYPE_SCHED_ACT** programs.
+ *
+ * Assign the *sk* to the *skb*. When combined with appropriate
+ * routing configuration to receive the packet towards the socket,
+ * will cause *skb* to be delivered to the specified socket.
+ * Subsequent redirection of *skb* via **bpf_redirect**\ (),
+ * **bpf_clone_redirect**\ () or other methods outside of BPF may
+ * interfere with successful delivery to the socket.
+ *
+ * This operation is only valid from TC ingress path.
+ *
+ * The *flags* argument must be zero.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure:
+ *
+ * **-EINVAL** if specified *flags* are not supported.
+ *
+ * **-ENOENT** if the socket is unavailable for assignment.
+ *
+ * **-ENETUNREACH** if the socket is unreachable (wrong netns).
+ *
+ * **-EOPNOTSUPP** if the operation is not supported, for example
+ * a call from outside of TC ingress.
+ *
+ * **-ESOCKTNOSUPPORT** if the socket type is not supported
+ * (reuseport).
+ */
+static long (*bpf_sk_assign)(void *ctx, void *sk, __u64 flags) = (void *) 124;
+
+/*
+ * bpf_ktime_get_boot_ns
+ *
+ * Return the time elapsed since system boot, in nanoseconds.
+ * Does include the time the system was suspended.
+ * See: **clock_gettime**\ (**CLOCK_BOOTTIME**)
+ *
+ * Returns
+ * Current *ktime*.
+ */
+static __u64 (*bpf_ktime_get_boot_ns)(void) = (void *) 125;
+
+/*
+ * bpf_seq_printf
+ *
+ * **bpf_seq_printf**\ () uses seq_file **seq_printf**\ () to print
+ * out the format string.
+ * The *m* represents the seq_file. The *fmt* and *fmt_size* are for
+ * the format string itself. The *data* and *data_len* are format string
+ * arguments. The *data* are a **u64** array and corresponding format string
+ * values are stored in the array. For strings and pointers where pointees
+ * are accessed, only the pointer values are stored in the *data* array.
+ * The *data_len* is the size of *data* in bytes - must be a multiple of 8.
+ *
+ * Formats **%s**, **%p{i,I}{4,6}** requires to read kernel memory.
+ * Reading kernel memory may fail due to either invalid address or
+ * valid address but requiring a major memory fault. If reading kernel memory
+ * fails, the string for **%s** will be an empty string, and the ip
+ * address for **%p{i,I}{4,6}** will be 0. Not returning error to
+ * bpf program is consistent with what **bpf_trace_printk**\ () does for now.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure:
+ *
+ * **-EBUSY** if per-CPU memory copy buffer is busy, can try again
+ * by returning 1 from bpf program.
+ *
+ * **-EINVAL** if arguments are invalid, or if *fmt* is invalid/unsupported.
+ *
+ * **-E2BIG** if *fmt* contains too many format specifiers.
+ *
+ * **-EOVERFLOW** if an overflow happened: The same object will be tried again.
+ */
+static long (*bpf_seq_printf)(struct seq_file *m, const char *fmt, __u32 fmt_size, const void *data, __u32 data_len) = (void *) 126;
+
+/*
+ * bpf_seq_write
+ *
+ * **bpf_seq_write**\ () uses seq_file **seq_write**\ () to write the data.
+ * The *m* represents the seq_file. The *data* and *len* represent the
+ * data to write in bytes.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure:
+ *
+ * **-EOVERFLOW** if an overflow happened: The same object will be tried again.
+ */
+static long (*bpf_seq_write)(struct seq_file *m, const void *data, __u32 len) = (void *) 127;
+
+/*
+ * bpf_sk_cgroup_id
+ *
+ * Return the cgroup v2 id of the socket *sk*.
+ *
+ * *sk* must be a non-**NULL** pointer to a socket, e.g. one
+ * returned from **bpf_sk_lookup_xxx**\ (),
+ * **bpf_sk_fullsock**\ (), etc. The format of returned id is
+ * same as in **bpf_skb_cgroup_id**\ ().
+ *
+ * This helper is available only if the kernel was compiled with
+ * the **CONFIG_SOCK_CGROUP_DATA** configuration option.
+ *
+ * Returns
+ * The id is returned or 0 in case the id could not be retrieved.
+ */
+static __u64 (*bpf_sk_cgroup_id)(void *sk) = (void *) 128;
+
+/*
+ * bpf_sk_ancestor_cgroup_id
+ *
+ * Return id of cgroup v2 that is ancestor of cgroup associated
+ * with the *sk* at the *ancestor_level*. The root cgroup is at
+ * *ancestor_level* zero and each step down the hierarchy
+ * increments the level. If *ancestor_level* == level of cgroup
+ * associated with *sk*, then return value will be same as that
+ * of **bpf_sk_cgroup_id**\ ().
+ *
+ * The helper is useful to implement policies based on cgroups
+ * that are upper in hierarchy than immediate cgroup associated
+ * with *sk*.
+ *
+ * The format of returned id and helper limitations are same as in
+ * **bpf_sk_cgroup_id**\ ().
+ *
+ * Returns
+ * The id is returned or 0 in case the id could not be retrieved.
+ */
+static __u64 (*bpf_sk_ancestor_cgroup_id)(void *sk, int ancestor_level) = (void *) 129;
+
+/*
+ * bpf_ringbuf_output
+ *
+ * Copy *size* bytes from *data* into a ring buffer *ringbuf*.
+ * If **BPF_RB_NO_WAKEUP** is specified in *flags*, no notification
+ * of new data availability is sent.
+ * If **BPF_RB_FORCE_WAKEUP** is specified in *flags*, notification
+ * of new data availability is sent unconditionally.
+ * If **0** is specified in *flags*, an adaptive notification
+ * of new data availability is sent.
+ *
+ * An adaptive notification is a notification sent whenever the user-space
+ * process has caught up and consumed all available payloads. In case the user-space
+ * process is still processing a previous payload, then no notification is needed
+ * as it will process the newly added payload automatically.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_ringbuf_output)(void *ringbuf, void *data, __u64 size, __u64 flags) = (void *) 130;
+
+/*
+ * bpf_ringbuf_reserve
+ *
+ * Reserve *size* bytes of payload in a ring buffer *ringbuf*.
+ * *flags* must be 0.
+ *
+ * Returns
+ * Valid pointer with *size* bytes of memory available; NULL,
+ * otherwise.
+ */
+static void *(*bpf_ringbuf_reserve)(void *ringbuf, __u64 size, __u64 flags) = (void *) 131;
+
+/*
+ * bpf_ringbuf_submit
+ *
+ * Submit reserved ring buffer sample, pointed to by *data*.
+ * If **BPF_RB_NO_WAKEUP** is specified in *flags*, no notification
+ * of new data availability is sent.
+ * If **BPF_RB_FORCE_WAKEUP** is specified in *flags*, notification
+ * of new data availability is sent unconditionally.
+ * If **0** is specified in *flags*, an adaptive notification
+ * of new data availability is sent.
+ *
+ * See 'bpf_ringbuf_output()' for the definition of adaptive notification.
+ *
+ * Returns
+ * Nothing. Always succeeds.
+ */
+static void (*bpf_ringbuf_submit)(void *data, __u64 flags) = (void *) 132;
+
+/*
+ * bpf_ringbuf_discard
+ *
+ * Discard reserved ring buffer sample, pointed to by *data*.
+ * If **BPF_RB_NO_WAKEUP** is specified in *flags*, no notification
+ * of new data availability is sent.
+ * If **BPF_RB_FORCE_WAKEUP** is specified in *flags*, notification
+ * of new data availability is sent unconditionally.
+ * If **0** is specified in *flags*, an adaptive notification
+ * of new data availability is sent.
+ *
+ * See 'bpf_ringbuf_output()' for the definition of adaptive notification.
+ *
+ * Returns
+ * Nothing. Always succeeds.
+ */
+static void (*bpf_ringbuf_discard)(void *data, __u64 flags) = (void *) 133;
+
+/*
+ * bpf_ringbuf_query
+ *
+ * Query various characteristics of provided ring buffer. What
+ * exactly is queries is determined by *flags*:
+ *
+ * * **BPF_RB_AVAIL_DATA**: Amount of data not yet consumed.
+ * * **BPF_RB_RING_SIZE**: The size of ring buffer.
+ * * **BPF_RB_CONS_POS**: Consumer position (can wrap around).
+ * * **BPF_RB_PROD_POS**: Producer(s) position (can wrap around).
+ *
+ * Data returned is just a momentary snapshot of actual values
+ * and could be inaccurate, so this facility should be used to
+ * power heuristics and for reporting, not to make 100% correct
+ * calculation.
+ *
+ * Returns
+ * Requested value, or 0, if *flags* are not recognized.
+ */
+static __u64 (*bpf_ringbuf_query)(void *ringbuf, __u64 flags) = (void *) 134;
+
+/*
+ * bpf_csum_level
+ *
+ * Change the skbs checksum level by one layer up or down, or
+ * reset it entirely to none in order to have the stack perform
+ * checksum validation. The level is applicable to the following
+ * protocols: TCP, UDP, GRE, SCTP, FCOE. For example, a decap of
+ * | ETH | IP | UDP | GUE | IP | TCP | into | ETH | IP | TCP |
+ * through **bpf_skb_adjust_room**\ () helper with passing in
+ * **BPF_F_ADJ_ROOM_NO_CSUM_RESET** flag would require one call
+ * to **bpf_csum_level**\ () with **BPF_CSUM_LEVEL_DEC** since
+ * the UDP header is removed. Similarly, an encap of the latter
+ * into the former could be accompanied by a helper call to
+ * **bpf_csum_level**\ () with **BPF_CSUM_LEVEL_INC** if the
+ * skb is still intended to be processed in higher layers of the
+ * stack instead of just egressing at tc.
+ *
+ * There are three supported level settings at this time:
+ *
+ * * **BPF_CSUM_LEVEL_INC**: Increases skb->csum_level for skbs
+ * with CHECKSUM_UNNECESSARY.
+ * * **BPF_CSUM_LEVEL_DEC**: Decreases skb->csum_level for skbs
+ * with CHECKSUM_UNNECESSARY.
+ * * **BPF_CSUM_LEVEL_RESET**: Resets skb->csum_level to 0 and
+ * sets CHECKSUM_NONE to force checksum validation by the stack.
+ * * **BPF_CSUM_LEVEL_QUERY**: No-op, returns the current
+ * skb->csum_level.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure. In the
+ * case of **BPF_CSUM_LEVEL_QUERY**, the current skb->csum_level
+ * is returned or the error code -EACCES in case the skb is not
+ * subject to CHECKSUM_UNNECESSARY.
+ */
+static long (*bpf_csum_level)(struct __sk_buff *skb, __u64 level) = (void *) 135;
+
+/*
+ * bpf_skc_to_tcp6_sock
+ *
+ * Dynamically cast a *sk* pointer to a *tcp6_sock* pointer.
+ *
+ * Returns
+ * *sk* if casting is valid, or **NULL** otherwise.
+ */
+static struct tcp6_sock *(*bpf_skc_to_tcp6_sock)(void *sk) = (void *) 136;
+
+/*
+ * bpf_skc_to_tcp_sock
+ *
+ * Dynamically cast a *sk* pointer to a *tcp_sock* pointer.
+ *
+ * Returns
+ * *sk* if casting is valid, or **NULL** otherwise.
+ */
+static struct tcp_sock *(*bpf_skc_to_tcp_sock)(void *sk) = (void *) 137;
+
+/*
+ * bpf_skc_to_tcp_timewait_sock
+ *
+ * Dynamically cast a *sk* pointer to a *tcp_timewait_sock* pointer.
+ *
+ * Returns
+ * *sk* if casting is valid, or **NULL** otherwise.
+ */
+static struct tcp_timewait_sock *(*bpf_skc_to_tcp_timewait_sock)(void *sk) = (void *) 138;
+
+/*
+ * bpf_skc_to_tcp_request_sock
+ *
+ * Dynamically cast a *sk* pointer to a *tcp_request_sock* pointer.
+ *
+ * Returns
+ * *sk* if casting is valid, or **NULL** otherwise.
+ */
+static struct tcp_request_sock *(*bpf_skc_to_tcp_request_sock)(void *sk) = (void *) 139;
+
+/*
+ * bpf_skc_to_udp6_sock
+ *
+ * Dynamically cast a *sk* pointer to a *udp6_sock* pointer.
+ *
+ * Returns
+ * *sk* if casting is valid, or **NULL** otherwise.
+ */
+static struct udp6_sock *(*bpf_skc_to_udp6_sock)(void *sk) = (void *) 140;
+
+/*
+ * bpf_get_task_stack
+ *
+ * Return a user or a kernel stack in bpf program provided buffer.
+ * To achieve this, the helper needs *task*, which is a valid
+ * pointer to **struct task_struct**. To store the stacktrace, the
+ * bpf program provides *buf* with a nonnegative *size*.
+ *
+ * The last argument, *flags*, holds the number of stack frames to
+ * skip (from 0 to 255), masked with
+ * **BPF_F_SKIP_FIELD_MASK**. The next bits can be used to set
+ * the following flags:
+ *
+ * **BPF_F_USER_STACK**
+ * Collect a user space stack instead of a kernel stack.
+ * **BPF_F_USER_BUILD_ID**
+ * Collect buildid+offset instead of ips for user stack,
+ * only valid if **BPF_F_USER_STACK** is also specified.
+ *
+ * **bpf_get_task_stack**\ () can collect up to
+ * **PERF_MAX_STACK_DEPTH** both kernel and user frames, subject
+ * to sufficient large buffer size. Note that
+ * this limit can be controlled with the **sysctl** program, and
+ * that it should be manually increased in order to profile long
+ * user stacks (such as stacks for Java programs). To do so, use:
+ *
+ * ::
+ *
+ * # sysctl kernel.perf_event_max_stack=<new value>
+ *
+ * Returns
+ * The non-negative copied *buf* length equal to or less than
+ * *size* on success, or a negative error in case of failure.
+ */
+static long (*bpf_get_task_stack)(struct task_struct *task, void *buf, __u32 size, __u64 flags) = (void *) 141;
+
+/*
+ * bpf_load_hdr_opt
+ *
+ * Load header option. Support reading a particular TCP header
+ * option for bpf program (**BPF_PROG_TYPE_SOCK_OPS**).
+ *
+ * If *flags* is 0, it will search the option from the
+ * *skops*\ **->skb_data**. The comment in **struct bpf_sock_ops**
+ * has details on what skb_data contains under different
+ * *skops*\ **->op**.
+ *
+ * The first byte of the *searchby_res* specifies the
+ * kind that it wants to search.
+ *
+ * If the searching kind is an experimental kind
+ * (i.e. 253 or 254 according to RFC6994). It also
+ * needs to specify the "magic" which is either
+ * 2 bytes or 4 bytes. It then also needs to
+ * specify the size of the magic by using
+ * the 2nd byte which is "kind-length" of a TCP
+ * header option and the "kind-length" also
+ * includes the first 2 bytes "kind" and "kind-length"
+ * itself as a normal TCP header option also does.
+ *
+ * For example, to search experimental kind 254 with
+ * 2 byte magic 0xeB9F, the searchby_res should be
+ * [ 254, 4, 0xeB, 0x9F, 0, 0, .... 0 ].
+ *
+ * To search for the standard window scale option (3),
+ * the *searchby_res* should be [ 3, 0, 0, .... 0 ].
+ * Note, kind-length must be 0 for regular option.
+ *
+ * Searching for No-Op (0) and End-of-Option-List (1) are
+ * not supported.
+ *
+ * *len* must be at least 2 bytes which is the minimal size
+ * of a header option.
+ *
+ * Supported flags:
+ *
+ * * **BPF_LOAD_HDR_OPT_TCP_SYN** to search from the
+ * saved_syn packet or the just-received syn packet.
+ *
+ *
+ * Returns
+ * > 0 when found, the header option is copied to *searchby_res*.
+ * The return value is the total length copied. On failure, a
+ * negative error code is returned:
+ *
+ * **-EINVAL** if a parameter is invalid.
+ *
+ * **-ENOMSG** if the option is not found.
+ *
+ * **-ENOENT** if no syn packet is available when
+ * **BPF_LOAD_HDR_OPT_TCP_SYN** is used.
+ *
+ * **-ENOSPC** if there is not enough space. Only *len* number of
+ * bytes are copied.
+ *
+ * **-EFAULT** on failure to parse the header options in the
+ * packet.
+ *
+ * **-EPERM** if the helper cannot be used under the current
+ * *skops*\ **->op**.
+ */
+static long (*bpf_load_hdr_opt)(struct bpf_sock_ops *skops, void *searchby_res, __u32 len, __u64 flags) = (void *) 142;
+
+/*
+ * bpf_store_hdr_opt
+ *
+ * Store header option. The data will be copied
+ * from buffer *from* with length *len* to the TCP header.
+ *
+ * The buffer *from* should have the whole option that
+ * includes the kind, kind-length, and the actual
+ * option data. The *len* must be at least kind-length
+ * long. The kind-length does not have to be 4 byte
+ * aligned. The kernel will take care of the padding
+ * and setting the 4 bytes aligned value to th->doff.
+ *
+ * This helper will check for duplicated option
+ * by searching the same option in the outgoing skb.
+ *
+ * This helper can only be called during
+ * **BPF_SOCK_OPS_WRITE_HDR_OPT_CB**.
+ *
+ *
+ * Returns
+ * 0 on success, or negative error in case of failure:
+ *
+ * **-EINVAL** If param is invalid.
+ *
+ * **-ENOSPC** if there is not enough space in the header.
+ * Nothing has been written
+ *
+ * **-EEXIST** if the option already exists.
+ *
+ * **-EFAULT** on failure to parse the existing header options.
+ *
+ * **-EPERM** if the helper cannot be used under the current
+ * *skops*\ **->op**.
+ */
+static long (*bpf_store_hdr_opt)(struct bpf_sock_ops *skops, const void *from, __u32 len, __u64 flags) = (void *) 143;
+
+/*
+ * bpf_reserve_hdr_opt
+ *
+ * Reserve *len* bytes for the bpf header option. The
+ * space will be used by **bpf_store_hdr_opt**\ () later in
+ * **BPF_SOCK_OPS_WRITE_HDR_OPT_CB**.
+ *
+ * If **bpf_reserve_hdr_opt**\ () is called multiple times,
+ * the total number of bytes will be reserved.
+ *
+ * This helper can only be called during
+ * **BPF_SOCK_OPS_HDR_OPT_LEN_CB**.
+ *
+ *
+ * Returns
+ * 0 on success, or negative error in case of failure:
+ *
+ * **-EINVAL** if a parameter is invalid.
+ *
+ * **-ENOSPC** if there is not enough space in the header.
+ *
+ * **-EPERM** if the helper cannot be used under the current
+ * *skops*\ **->op**.
+ */
+static long (*bpf_reserve_hdr_opt)(struct bpf_sock_ops *skops, __u32 len, __u64 flags) = (void *) 144;
+
+/*
+ * bpf_inode_storage_get
+ *
+ * Get a bpf_local_storage from an *inode*.
+ *
+ * Logically, it could be thought of as getting the value from
+ * a *map* with *inode* as the **key**. From this
+ * perspective, the usage is not much different from
+ * **bpf_map_lookup_elem**\ (*map*, **&**\ *inode*) except this
+ * helper enforces the key must be an inode and the map must also
+ * be a **BPF_MAP_TYPE_INODE_STORAGE**.
+ *
+ * Underneath, the value is stored locally at *inode* instead of
+ * the *map*. The *map* is used as the bpf-local-storage
+ * "type". The bpf-local-storage "type" (i.e. the *map*) is
+ * searched against all bpf_local_storage residing at *inode*.
+ *
+ * An optional *flags* (**BPF_LOCAL_STORAGE_GET_F_CREATE**) can be
+ * used such that a new bpf_local_storage will be
+ * created if one does not exist. *value* can be used
+ * together with **BPF_LOCAL_STORAGE_GET_F_CREATE** to specify
+ * the initial value of a bpf_local_storage. If *value* is
+ * **NULL**, the new bpf_local_storage will be zero initialized.
+ *
+ * Returns
+ * A bpf_local_storage pointer is returned on success.
+ *
+ * **NULL** if not found or there was an error in adding
+ * a new bpf_local_storage.
+ */
+static void *(*bpf_inode_storage_get)(void *map, void *inode, void *value, __u64 flags) = (void *) 145;
+
+/*
+ * bpf_inode_storage_delete
+ *
+ * Delete a bpf_local_storage from an *inode*.
+ *
+ * Returns
+ * 0 on success.
+ *
+ * **-ENOENT** if the bpf_local_storage cannot be found.
+ */
+static int (*bpf_inode_storage_delete)(void *map, void *inode) = (void *) 146;
+
+/*
+ * bpf_d_path
+ *
+ * Return full path for given **struct path** object, which
+ * needs to be the kernel BTF *path* object. The path is
+ * returned in the provided buffer *buf* of size *sz* and
+ * is zero terminated.
+ *
+ *
+ * Returns
+ * On success, the strictly positive length of the string,
+ * including the trailing NUL character. On error, a negative
+ * value.
+ */
+static long (*bpf_d_path)(struct path *path, char *buf, __u32 sz) = (void *) 147;
+
+/*
+ * bpf_copy_from_user
+ *
+ * Read *size* bytes from user space address *user_ptr* and store
+ * the data in *dst*. This is a wrapper of **copy_from_user**\ ().
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_copy_from_user)(void *dst, __u32 size, const void *user_ptr) = (void *) 148;
+
+/*
+ * bpf_snprintf_btf
+ *
+ * Use BTF to store a string representation of *ptr*->ptr in *str*,
+ * using *ptr*->type_id. This value should specify the type
+ * that *ptr*->ptr points to. LLVM __builtin_btf_type_id(type, 1)
+ * can be used to look up vmlinux BTF type ids. Traversing the
+ * data structure using BTF, the type information and values are
+ * stored in the first *str_size* - 1 bytes of *str*. Safe copy of
+ * the pointer data is carried out to avoid kernel crashes during
+ * operation. Smaller types can use string space on the stack;
+ * larger programs can use map data to store the string
+ * representation.
+ *
+ * The string can be subsequently shared with userspace via
+ * bpf_perf_event_output() or ring buffer interfaces.
+ * bpf_trace_printk() is to be avoided as it places too small
+ * a limit on string size to be useful.
+ *
+ * *flags* is a combination of
+ *
+ * **BTF_F_COMPACT**
+ * no formatting around type information
+ * **BTF_F_NONAME**
+ * no struct/union member names/types
+ * **BTF_F_PTR_RAW**
+ * show raw (unobfuscated) pointer values;
+ * equivalent to printk specifier %px.
+ * **BTF_F_ZERO**
+ * show zero-valued struct/union members; they
+ * are not displayed by default
+ *
+ *
+ * Returns
+ * The number of bytes that were written (or would have been
+ * written if output had to be truncated due to string size),
+ * or a negative error in cases of failure.
+ */
+static long (*bpf_snprintf_btf)(char *str, __u32 str_size, struct btf_ptr *ptr, __u32 btf_ptr_size, __u64 flags) = (void *) 149;
+
+/*
+ * bpf_seq_printf_btf
+ *
+ * Use BTF to write to seq_write a string representation of
+ * *ptr*->ptr, using *ptr*->type_id as per bpf_snprintf_btf().
+ * *flags* are identical to those used for bpf_snprintf_btf.
+ *
+ * Returns
+ * 0 on success or a negative error in case of failure.
+ */
+static long (*bpf_seq_printf_btf)(struct seq_file *m, struct btf_ptr *ptr, __u32 ptr_size, __u64 flags) = (void *) 150;
+
+/*
+ * bpf_skb_cgroup_classid
+ *
+ * See **bpf_get_cgroup_classid**\ () for the main description.
+ * This helper differs from **bpf_get_cgroup_classid**\ () in that
+ * the cgroup v1 net_cls class is retrieved only from the *skb*'s
+ * associated socket instead of the current process.
+ *
+ * Returns
+ * The id is returned or 0 in case the id could not be retrieved.
+ */
+static __u64 (*bpf_skb_cgroup_classid)(struct __sk_buff *skb) = (void *) 151;
+
+/*
+ * bpf_redirect_neigh
+ *
+ * Redirect the packet to another net device of index *ifindex*
+ * and fill in L2 addresses from neighboring subsystem. This helper
+ * is somewhat similar to **bpf_redirect**\ (), except that it
+ * populates L2 addresses as well, meaning, internally, the helper
+ * relies on the neighbor lookup for the L2 address of the nexthop.
+ *
+ * The helper will perform a FIB lookup based on the skb's
+ * networking header to get the address of the next hop, unless
+ * this is supplied by the caller in the *params* argument. The
+ * *plen* argument indicates the len of *params* and should be set
+ * to 0 if *params* is NULL.
+ *
+ * The *flags* argument is reserved and must be 0. The helper is
+ * currently only supported for tc BPF program types, and enabled
+ * for IPv4 and IPv6 protocols.
+ *
+ * Returns
+ * The helper returns **TC_ACT_REDIRECT** on success or
+ * **TC_ACT_SHOT** on error.
+ */
+static long (*bpf_redirect_neigh)(__u32 ifindex, struct bpf_redir_neigh *params, int plen, __u64 flags) = (void *) 152;
+
+/*
+ * bpf_per_cpu_ptr
+ *
+ * Take a pointer to a percpu ksym, *percpu_ptr*, and return a
+ * pointer to the percpu kernel variable on *cpu*. A ksym is an
+ * extern variable decorated with '__ksym'. For ksym, there is a
+ * global var (either static or global) defined of the same name
+ * in the kernel. The ksym is percpu if the global var is percpu.
+ * The returned pointer points to the global percpu var on *cpu*.
+ *
+ * bpf_per_cpu_ptr() has the same semantic as per_cpu_ptr() in the
+ * kernel, except that bpf_per_cpu_ptr() may return NULL. This
+ * happens if *cpu* is larger than nr_cpu_ids. The caller of
+ * bpf_per_cpu_ptr() must check the returned value.
+ *
+ * Returns
+ * A pointer pointing to the kernel percpu variable on *cpu*, or
+ * NULL, if *cpu* is invalid.
+ */
+static void *(*bpf_per_cpu_ptr)(const void *percpu_ptr, __u32 cpu) = (void *) 153;
+
+/*
+ * bpf_this_cpu_ptr
+ *
+ * Take a pointer to a percpu ksym, *percpu_ptr*, and return a
+ * pointer to the percpu kernel variable on this cpu. See the
+ * description of 'ksym' in **bpf_per_cpu_ptr**\ ().
+ *
+ * bpf_this_cpu_ptr() has the same semantic as this_cpu_ptr() in
+ * the kernel. Different from **bpf_per_cpu_ptr**\ (), it would
+ * never return NULL.
+ *
+ * Returns
+ * A pointer pointing to the kernel percpu variable on this cpu.
+ */
+static void *(*bpf_this_cpu_ptr)(const void *percpu_ptr) = (void *) 154;
+
+/*
+ * bpf_redirect_peer
+ *
+ * Redirect the packet to another net device of index *ifindex*.
+ * This helper is somewhat similar to **bpf_redirect**\ (), except
+ * that the redirection happens to the *ifindex*' peer device and
+ * the netns switch takes place from ingress to ingress without
+ * going through the CPU's backlog queue.
+ *
+ * The *flags* argument is reserved and must be 0. The helper is
+ * currently only supported for tc BPF program types at the ingress
+ * hook and for veth device types. The peer device must reside in a
+ * different network namespace.
+ *
+ * Returns
+ * The helper returns **TC_ACT_REDIRECT** on success or
+ * **TC_ACT_SHOT** on error.
+ */
+static long (*bpf_redirect_peer)(__u32 ifindex, __u64 flags) = (void *) 155;
+
+/*
+ * bpf_task_storage_get
+ *
+ * Get a bpf_local_storage from the *task*.
+ *
+ * Logically, it could be thought of as getting the value from
+ * a *map* with *task* as the **key**. From this
+ * perspective, the usage is not much different from
+ * **bpf_map_lookup_elem**\ (*map*, **&**\ *task*) except this
+ * helper enforces the key must be a task_struct and the map must also
+ * be a **BPF_MAP_TYPE_TASK_STORAGE**.
+ *
+ * Underneath, the value is stored locally at *task* instead of
+ * the *map*. The *map* is used as the bpf-local-storage
+ * "type". The bpf-local-storage "type" (i.e. the *map*) is
+ * searched against all bpf_local_storage residing at *task*.
+ *
+ * An optional *flags* (**BPF_LOCAL_STORAGE_GET_F_CREATE**) can be
+ * used such that a new bpf_local_storage will be
+ * created if one does not exist. *value* can be used
+ * together with **BPF_LOCAL_STORAGE_GET_F_CREATE** to specify
+ * the initial value of a bpf_local_storage. If *value* is
+ * **NULL**, the new bpf_local_storage will be zero initialized.
+ *
+ * Returns
+ * A bpf_local_storage pointer is returned on success.
+ *
+ * **NULL** if not found or there was an error in adding
+ * a new bpf_local_storage.
+ */
+static void *(*bpf_task_storage_get)(void *map, struct task_struct *task, void *value, __u64 flags) = (void *) 156;
+
+/*
+ * bpf_task_storage_delete
+ *
+ * Delete a bpf_local_storage from a *task*.
+ *
+ * Returns
+ * 0 on success.
+ *
+ * **-ENOENT** if the bpf_local_storage cannot be found.
+ */
+static long (*bpf_task_storage_delete)(void *map, struct task_struct *task) = (void *) 157;
+
+/*
+ * bpf_get_current_task_btf
+ *
+ * Return a BTF pointer to the "current" task.
+ * This pointer can also be used in helpers that accept an
+ * *ARG_PTR_TO_BTF_ID* of type *task_struct*.
+ *
+ * Returns
+ * Pointer to the current task.
+ */
+static struct task_struct *(*bpf_get_current_task_btf)(void) = (void *) 158;
+
+/*
+ * bpf_bprm_opts_set
+ *
+ * Set or clear certain options on *bprm*:
+ *
+ * **BPF_F_BPRM_SECUREEXEC** Set the secureexec bit
+ * which sets the **AT_SECURE** auxv for glibc. The bit
+ * is cleared if the flag is not specified.
+ *
+ * Returns
+ * **-EINVAL** if invalid *flags* are passed, zero otherwise.
+ */
+static long (*bpf_bprm_opts_set)(struct linux_binprm *bprm, __u64 flags) = (void *) 159;
+
+/*
+ * bpf_ktime_get_coarse_ns
+ *
+ * Return a coarse-grained version of the time elapsed since
+ * system boot, in nanoseconds. Does not include time the system
+ * was suspended.
+ *
+ * See: **clock_gettime**\ (**CLOCK_MONOTONIC_COARSE**)
+ *
+ * Returns
+ * Current *ktime*.
+ */
+static __u64 (*bpf_ktime_get_coarse_ns)(void) = (void *) 160;
+
+/*
+ * bpf_ima_inode_hash
+ *
+ * Returns the stored IMA hash of the *inode* (if it's available).
+ * If the hash is larger than *size*, then only *size*
+ * bytes will be copied to *dst*
+ *
+ * Returns
+ * The **hash_algo** is returned on success,
+ * **-EOPNOTSUP** if IMA is disabled or **-EINVAL** if
+ * invalid arguments are passed.
+ */
+static long (*bpf_ima_inode_hash)(struct inode *inode, void *dst, __u32 size) = (void *) 161;
+
+/*
+ * bpf_sock_from_file
+ *
+ * If the given file represents a socket, returns the associated
+ * socket.
+ *
+ * Returns
+ * A pointer to a struct socket on success or NULL if the file is
+ * not a socket.
+ */
+static struct socket *(*bpf_sock_from_file)(struct file *file) = (void *) 162;
+
+/*
+ * bpf_check_mtu
+ *
+ * Check packet size against exceeding MTU of net device (based
+ * on *ifindex*). This helper will likely be used in combination
+ * with helpers that adjust/change the packet size.
+ *
+ * The argument *len_diff* can be used for querying with a planned
+ * size change. This allows to check MTU prior to changing packet
+ * ctx. Providing a *len_diff* adjustment that is larger than the
+ * actual packet size (resulting in negative packet size) will in
+ * principle not exceed the MTU, which is why it is not considered
+ * a failure. Other BPF helpers are needed for performing the
+ * planned size change; therefore the responsibility for catching
+ * a negative packet size belongs in those helpers.
+ *
+ * Specifying *ifindex* zero means the MTU check is performed
+ * against the current net device. This is practical if this isn't
+ * used prior to redirect.
+ *
+ * On input *mtu_len* must be a valid pointer, else verifier will
+ * reject BPF program. If the value *mtu_len* is initialized to
+ * zero then the ctx packet size is use. When value *mtu_len* is
+ * provided as input this specify the L3 length that the MTU check
+ * is done against. Remember XDP and TC length operate at L2, but
+ * this value is L3 as this correlate to MTU and IP-header tot_len
+ * values which are L3 (similar behavior as bpf_fib_lookup).
+ *
+ * The Linux kernel route table can configure MTUs on a more
+ * specific per route level, which is not provided by this helper.
+ * For route level MTU checks use the **bpf_fib_lookup**\ ()
+ * helper.
+ *
+ * *ctx* is either **struct xdp_md** for XDP programs or
+ * **struct sk_buff** for tc cls_act programs.
+ *
+ * The *flags* argument can be a combination of one or more of the
+ * following values:
+ *
+ * **BPF_MTU_CHK_SEGS**
+ * This flag will only works for *ctx* **struct sk_buff**.
+ * If packet context contains extra packet segment buffers
+ * (often knows as GSO skb), then MTU check is harder to
+ * check at this point, because in transmit path it is
+ * possible for the skb packet to get re-segmented
+ * (depending on net device features). This could still be
+ * a MTU violation, so this flag enables performing MTU
+ * check against segments, with a different violation
+ * return code to tell it apart. Check cannot use len_diff.
+ *
+ * On return *mtu_len* pointer contains the MTU value of the net
+ * device. Remember the net device configured MTU is the L3 size,
+ * which is returned here and XDP and TC length operate at L2.
+ * Helper take this into account for you, but remember when using
+ * MTU value in your BPF-code.
+ *
+ *
+ * Returns
+ * * 0 on success, and populate MTU value in *mtu_len* pointer.
+ *
+ * * < 0 if any input argument is invalid (*mtu_len* not updated)
+ *
+ * MTU violations return positive values, but also populate MTU
+ * value in *mtu_len* pointer, as this can be needed for
+ * implementing PMTU handing:
+ *
+ * * **BPF_MTU_CHK_RET_FRAG_NEEDED**
+ * * **BPF_MTU_CHK_RET_SEGS_TOOBIG**
+ */
+static long (*bpf_check_mtu)(void *ctx, __u32 ifindex, __u32 *mtu_len, __s32 len_diff, __u64 flags) = (void *) 163;
+
+/*
+ * bpf_for_each_map_elem
+ *
+ * For each element in **map**, call **callback_fn** function with
+ * **map**, **callback_ctx** and other map-specific parameters.
+ * The **callback_fn** should be a static function and
+ * the **callback_ctx** should be a pointer to the stack.
+ * The **flags** is used to control certain aspects of the helper.
+ * Currently, the **flags** must be 0.
+ *
+ * The following are a list of supported map types and their
+ * respective expected callback signatures:
+ *
+ * BPF_MAP_TYPE_HASH, BPF_MAP_TYPE_PERCPU_HASH,
+ * BPF_MAP_TYPE_LRU_HASH, BPF_MAP_TYPE_LRU_PERCPU_HASH,
+ * BPF_MAP_TYPE_ARRAY, BPF_MAP_TYPE_PERCPU_ARRAY
+ *
+ * long (\*callback_fn)(struct bpf_map \*map, const void \*key, void \*value, void \*ctx);
+ *
+ * For per_cpu maps, the map_value is the value on the cpu where the
+ * bpf_prog is running.
+ *
+ * If **callback_fn** return 0, the helper will continue to the next
+ * element. If return value is 1, the helper will skip the rest of
+ * elements and return. Other return values are not used now.
+ *
+ *
+ * Returns
+ * The number of traversed map elements for success, **-EINVAL** for
+ * invalid **flags**.
+ */
+static long (*bpf_for_each_map_elem)(void *map, void *callback_fn, void *callback_ctx, __u64 flags) = (void *) 164;
+
+/*
+ * bpf_snprintf
+ *
+ * Outputs a string into the **str** buffer of size **str_size**
+ * based on a format string stored in a read-only map pointed by
+ * **fmt**.
+ *
+ * Each format specifier in **fmt** corresponds to one u64 element
+ * in the **data** array. For strings and pointers where pointees
+ * are accessed, only the pointer values are stored in the *data*
+ * array. The *data_len* is the size of *data* in bytes - must be
+ * a multiple of 8.
+ *
+ * Formats **%s** and **%p{i,I}{4,6}** require to read kernel
+ * memory. Reading kernel memory may fail due to either invalid
+ * address or valid address but requiring a major memory fault. If
+ * reading kernel memory fails, the string for **%s** will be an
+ * empty string, and the ip address for **%p{i,I}{4,6}** will be 0.
+ * Not returning error to bpf program is consistent with what
+ * **bpf_trace_printk**\ () does for now.
+ *
+ *
+ * Returns
+ * The strictly positive length of the formatted string, including
+ * the trailing zero character. If the return value is greater than
+ * **str_size**, **str** contains a truncated string, guaranteed to
+ * be zero-terminated except when **str_size** is 0.
+ *
+ * Or **-EBUSY** if the per-CPU memory copy buffer is busy.
+ */
+static long (*bpf_snprintf)(char *str, __u32 str_size, const char *fmt, __u64 *data, __u32 data_len) = (void *) 165;
+
+/*
+ * bpf_sys_bpf
+ *
+ * Execute bpf syscall with given arguments.
+ *
+ * Returns
+ * A syscall result.
+ */
+static long (*bpf_sys_bpf)(__u32 cmd, void *attr, __u32 attr_size) = (void *) 166;
+
+/*
+ * bpf_btf_find_by_name_kind
+ *
+ * Find BTF type with given name and kind in vmlinux BTF or in module's BTFs.
+ *
+ * Returns
+ * Returns btf_id and btf_obj_fd in lower and upper 32 bits.
+ */
+static long (*bpf_btf_find_by_name_kind)(char *name, int name_sz, __u32 kind, int flags) = (void *) 167;
+
+/*
+ * bpf_sys_close
+ *
+ * Execute close syscall for given FD.
+ *
+ * Returns
+ * A syscall result.
+ */
+static long (*bpf_sys_close)(__u32 fd) = (void *) 168;
+
+/*
+ * bpf_timer_init
+ *
+ * Initialize the timer.
+ * First 4 bits of *flags* specify clockid.
+ * Only CLOCK_MONOTONIC, CLOCK_REALTIME, CLOCK_BOOTTIME are allowed.
+ * All other bits of *flags* are reserved.
+ * The verifier will reject the program if *timer* is not from
+ * the same *map*.
+ *
+ * Returns
+ * 0 on success.
+ * **-EBUSY** if *timer* is already initialized.
+ * **-EINVAL** if invalid *flags* are passed.
+ * **-EPERM** if *timer* is in a map that doesn't have any user references.
+ * The user space should either hold a file descriptor to a map with timers
+ * or pin such map in bpffs. When map is unpinned or file descriptor is
+ * closed all timers in the map will be cancelled and freed.
+ */
+static long (*bpf_timer_init)(struct bpf_timer *timer, void *map, __u64 flags) = (void *) 169;
+
+/*
+ * bpf_timer_set_callback
+ *
+ * Configure the timer to call *callback_fn* static function.
+ *
+ * Returns
+ * 0 on success.
+ * **-EINVAL** if *timer* was not initialized with bpf_timer_init() earlier.
+ * **-EPERM** if *timer* is in a map that doesn't have any user references.
+ * The user space should either hold a file descriptor to a map with timers
+ * or pin such map in bpffs. When map is unpinned or file descriptor is
+ * closed all timers in the map will be cancelled and freed.
+ */
+static long (*bpf_timer_set_callback)(struct bpf_timer *timer, void *callback_fn) = (void *) 170;
+
+/*
+ * bpf_timer_start
+ *
+ * Set timer expiration N nanoseconds from the current time. The
+ * configured callback will be invoked in soft irq context on some cpu
+ * and will not repeat unless another bpf_timer_start() is made.
+ * In such case the next invocation can migrate to a different cpu.
+ * Since struct bpf_timer is a field inside map element the map
+ * owns the timer. The bpf_timer_set_callback() will increment refcnt
+ * of BPF program to make sure that callback_fn code stays valid.
+ * When user space reference to a map reaches zero all timers
+ * in a map are cancelled and corresponding program's refcnts are
+ * decremented. This is done to make sure that Ctrl-C of a user
+ * process doesn't leave any timers running. If map is pinned in
+ * bpffs the callback_fn can re-arm itself indefinitely.
+ * bpf_map_update/delete_elem() helpers and user space sys_bpf commands
+ * cancel and free the timer in the given map element.
+ * The map can contain timers that invoke callback_fn-s from different
+ * programs. The same callback_fn can serve different timers from
+ * different maps if key/value layout matches across maps.
+ * Every bpf_timer_set_callback() can have different callback_fn.
+ *
+ *
+ * Returns
+ * 0 on success.
+ * **-EINVAL** if *timer* was not initialized with bpf_timer_init() earlier
+ * or invalid *flags* are passed.
+ */
+static long (*bpf_timer_start)(struct bpf_timer *timer, __u64 nsecs, __u64 flags) = (void *) 171;
+
+/*
+ * bpf_timer_cancel
+ *
+ * Cancel the timer and wait for callback_fn to finish if it was running.
+ *
+ * Returns
+ * 0 if the timer was not active.
+ * 1 if the timer was active.
+ * **-EINVAL** if *timer* was not initialized with bpf_timer_init() earlier.
+ * **-EDEADLK** if callback_fn tried to call bpf_timer_cancel() on its
+ * own timer which would have led to a deadlock otherwise.
+ */
+static long (*bpf_timer_cancel)(struct bpf_timer *timer) = (void *) 172;
+
+/*
+ * bpf_get_func_ip
+ *
+ * Get address of the traced function (for tracing and kprobe programs).
+ *
+ * Returns
+ * Address of the traced function.
+ * 0 for kprobes placed within the function (not at the entry).
+ */
+static __u64 (*bpf_get_func_ip)(void *ctx) = (void *) 173;
+
+/*
+ * bpf_get_attach_cookie
+ *
+ * Get bpf_cookie value provided (optionally) during the program
+ * attachment. It might be different for each individual
+ * attachment, even if BPF program itself is the same.
+ * Expects BPF program context *ctx* as a first argument.
+ *
+ * Supported for the following program types:
+ * - kprobe/uprobe;
+ * - tracepoint;
+ * - perf_event.
+ *
+ * Returns
+ * Value specified by user at BPF link creation/attachment time
+ * or 0, if it was not specified.
+ */
+static __u64 (*bpf_get_attach_cookie)(void *ctx) = (void *) 174;
+
+/*
+ * bpf_task_pt_regs
+ *
+ * Get the struct pt_regs associated with **task**.
+ *
+ * Returns
+ * A pointer to struct pt_regs.
+ */
+static long (*bpf_task_pt_regs)(struct task_struct *task) = (void *) 175;
+
+/*
+ * bpf_get_branch_snapshot
+ *
+ * Get branch trace from hardware engines like Intel LBR. The
+ * hardware engine is stopped shortly after the helper is
+ * called. Therefore, the user need to filter branch entries
+ * based on the actual use case. To capture branch trace
+ * before the trigger point of the BPF program, the helper
+ * should be called at the beginning of the BPF program.
+ *
+ * The data is stored as struct perf_branch_entry into output
+ * buffer *entries*. *size* is the size of *entries* in bytes.
+ * *flags* is reserved for now and must be zero.
+ *
+ *
+ * Returns
+ * On success, number of bytes written to *buf*. On error, a
+ * negative value.
+ *
+ * **-EINVAL** if *flags* is not zero.
+ *
+ * **-ENOENT** if architecture does not support branch records.
+ */
+static long (*bpf_get_branch_snapshot)(void *entries, __u32 size, __u64 flags) = (void *) 176;
+
+/*
+ * bpf_trace_vprintk
+ *
+ * Behaves like **bpf_trace_printk**\ () helper, but takes an array of u64
+ * to format and can handle more format args as a result.
+ *
+ * Arguments are to be used as in **bpf_seq_printf**\ () helper.
+ *
+ * Returns
+ * The number of bytes written to the buffer, or a negative error
+ * in case of failure.
+ */
+static long (*bpf_trace_vprintk)(const char *fmt, __u32 fmt_size, const void *data, __u32 data_len) = (void *) 177;
+
+/*
+ * bpf_skc_to_unix_sock
+ *
+ * Dynamically cast a *sk* pointer to a *unix_sock* pointer.
+ *
+ * Returns
+ * *sk* if casting is valid, or **NULL** otherwise.
+ */
+static struct unix_sock *(*bpf_skc_to_unix_sock)(void *sk) = (void *) 178;
+
+/*
+ * bpf_kallsyms_lookup_name
+ *
+ * Get the address of a kernel symbol, returned in *res*. *res* is
+ * set to 0 if the symbol is not found.
+ *
+ * Returns
+ * On success, zero. On error, a negative value.
+ *
+ * **-EINVAL** if *flags* is not zero.
+ *
+ * **-EINVAL** if string *name* is not the same size as *name_sz*.
+ *
+ * **-ENOENT** if symbol is not found.
+ *
+ * **-EPERM** if caller does not have permission to obtain kernel address.
+ */
+static long (*bpf_kallsyms_lookup_name)(const char *name, int name_sz, int flags, __u64 *res) = (void *) 179;
+
+/*
+ * bpf_find_vma
+ *
+ * Find vma of *task* that contains *addr*, call *callback_fn*
+ * function with *task*, *vma*, and *callback_ctx*.
+ * The *callback_fn* should be a static function and
+ * the *callback_ctx* should be a pointer to the stack.
+ * The *flags* is used to control certain aspects of the helper.
+ * Currently, the *flags* must be 0.
+ *
+ * The expected callback signature is
+ *
+ * long (\*callback_fn)(struct task_struct \*task, struct vm_area_struct \*vma, void \*callback_ctx);
+ *
+ *
+ * Returns
+ * 0 on success.
+ * **-ENOENT** if *task->mm* is NULL, or no vma contains *addr*.
+ * **-EBUSY** if failed to try lock mmap_lock.
+ * **-EINVAL** for invalid **flags**.
+ */
+static long (*bpf_find_vma)(struct task_struct *task, __u64 addr, void *callback_fn, void *callback_ctx, __u64 flags) = (void *) 180;
+
+/*
+ * bpf_loop
+ *
+ * For **nr_loops**, call **callback_fn** function
+ * with **callback_ctx** as the context parameter.
+ * The **callback_fn** should be a static function and
+ * the **callback_ctx** should be a pointer to the stack.
+ * The **flags** is used to control certain aspects of the helper.
+ * Currently, the **flags** must be 0. Currently, nr_loops is
+ * limited to 1 << 23 (~8 million) loops.
+ *
+ * long (\*callback_fn)(u32 index, void \*ctx);
+ *
+ * where **index** is the current index in the loop. The index
+ * is zero-indexed.
+ *
+ * If **callback_fn** returns 0, the helper will continue to the next
+ * loop. If return value is 1, the helper will skip the rest of
+ * the loops and return. Other return values are not used now,
+ * and will be rejected by the verifier.
+ *
+ *
+ * Returns
+ * The number of loops performed, **-EINVAL** for invalid **flags**,
+ * **-E2BIG** if **nr_loops** exceeds the maximum number of loops.
+ */
+static long (*bpf_loop)(__u32 nr_loops, void *callback_fn, void *callback_ctx, __u64 flags) = (void *) 181;
+
+/*
+ * bpf_strncmp
+ *
+ * Do strncmp() between **s1** and **s2**. **s1** doesn't need
+ * to be null-terminated and **s1_sz** is the maximum storage
+ * size of **s1**. **s2** must be a read-only string.
+ *
+ * Returns
+ * An integer less than, equal to, or greater than zero
+ * if the first **s1_sz** bytes of **s1** is found to be
+ * less than, to match, or be greater than **s2**.
+ */
+static long (*bpf_strncmp)(const char *s1, __u32 s1_sz, const char *s2) = (void *) 182;
+
+/*
+ * bpf_get_func_arg
+ *
+ * Get **n**-th argument register (zero based) of the traced function (for tracing programs)
+ * returned in **value**.
+ *
+ *
+ * Returns
+ * 0 on success.
+ * **-EINVAL** if n >= argument register count of traced function.
+ */
+static long (*bpf_get_func_arg)(void *ctx, __u32 n, __u64 *value) = (void *) 183;
+
+/*
+ * bpf_get_func_ret
+ *
+ * Get return value of the traced function (for tracing programs)
+ * in **value**.
+ *
+ *
+ * Returns
+ * 0 on success.
+ * **-EOPNOTSUPP** for tracing programs other than BPF_TRACE_FEXIT or BPF_MODIFY_RETURN.
+ */
+static long (*bpf_get_func_ret)(void *ctx, __u64 *value) = (void *) 184;
+
+/*
+ * bpf_get_func_arg_cnt
+ *
+ * Get number of registers of the traced function (for tracing programs) where
+ * function arguments are stored in these registers.
+ *
+ *
+ * Returns
+ * The number of argument registers of the traced function.
+ */
+static long (*bpf_get_func_arg_cnt)(void *ctx) = (void *) 185;
+
+/*
+ * bpf_get_retval
+ *
+ * Get the BPF program's return value that will be returned to the upper layers.
+ *
+ * This helper is currently supported by cgroup programs and only by the hooks
+ * where BPF program's return value is returned to the userspace via errno.
+ *
+ * Returns
+ * The BPF program's return value.
+ */
+static int (*bpf_get_retval)(void) = (void *) 186;
+
+/*
+ * bpf_set_retval
+ *
+ * Set the BPF program's return value that will be returned to the upper layers.
+ *
+ * This helper is currently supported by cgroup programs and only by the hooks
+ * where BPF program's return value is returned to the userspace via errno.
+ *
+ * Note that there is the following corner case where the program exports an error
+ * via bpf_set_retval but signals success via 'return 1':
+ *
+ * bpf_set_retval(-EPERM);
+ * return 1;
+ *
+ * In this case, the BPF program's return value will use helper's -EPERM. This
+ * still holds true for cgroup/bind{4,6} which supports extra 'return 3' success case.
+ *
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static int (*bpf_set_retval)(int retval) = (void *) 187;
+
+/*
+ * bpf_xdp_get_buff_len
+ *
+ * Get the total size of a given xdp buff (linear and paged area)
+ *
+ * Returns
+ * The total size of a given xdp buffer.
+ */
+static __u64 (*bpf_xdp_get_buff_len)(struct xdp_md *xdp_md) = (void *) 188;
+
+/*
+ * bpf_xdp_load_bytes
+ *
+ * This helper is provided as an easy way to load data from a
+ * xdp buffer. It can be used to load *len* bytes from *offset* from
+ * the frame associated to *xdp_md*, into the buffer pointed by
+ * *buf*.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_xdp_load_bytes)(struct xdp_md *xdp_md, __u32 offset, void *buf, __u32 len) = (void *) 189;
+
+/*
+ * bpf_xdp_store_bytes
+ *
+ * Store *len* bytes from buffer *buf* into the frame
+ * associated to *xdp_md*, at *offset*.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_xdp_store_bytes)(struct xdp_md *xdp_md, __u32 offset, void *buf, __u32 len) = (void *) 190;
+
+/*
+ * bpf_copy_from_user_task
+ *
+ * Read *size* bytes from user space address *user_ptr* in *tsk*'s
+ * address space, and stores the data in *dst*. *flags* is not
+ * used yet and is provided for future extensibility. This helper
+ * can only be used by sleepable programs.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure. On error
+ * *dst* buffer is zeroed out.
+ */
+static long (*bpf_copy_from_user_task)(void *dst, __u32 size, const void *user_ptr, struct task_struct *tsk, __u64 flags) = (void *) 191;
+
+/*
+ * bpf_skb_set_tstamp
+ *
+ * Change the __sk_buff->tstamp_type to *tstamp_type*
+ * and set *tstamp* to the __sk_buff->tstamp together.
+ *
+ * If there is no need to change the __sk_buff->tstamp_type,
+ * the tstamp value can be directly written to __sk_buff->tstamp
+ * instead.
+ *
+ * BPF_SKB_TSTAMP_DELIVERY_MONO is the only tstamp that
+ * will be kept during bpf_redirect_*(). A non zero
+ * *tstamp* must be used with the BPF_SKB_TSTAMP_DELIVERY_MONO
+ * *tstamp_type*.
+ *
+ * A BPF_SKB_TSTAMP_UNSPEC *tstamp_type* can only be used
+ * with a zero *tstamp*.
+ *
+ * Only IPv4 and IPv6 skb->protocol are supported.
+ *
+ * This function is most useful when it needs to set a
+ * mono delivery time to __sk_buff->tstamp and then
+ * bpf_redirect_*() to the egress of an iface. For example,
+ * changing the (rcv) timestamp in __sk_buff->tstamp at
+ * ingress to a mono delivery time and then bpf_redirect_*()
+ * to sch_fq@phy-dev.
+ *
+ * Returns
+ * 0 on success.
+ * **-EINVAL** for invalid input
+ * **-EOPNOTSUPP** for unsupported protocol
+ */
+static long (*bpf_skb_set_tstamp)(struct __sk_buff *skb, __u64 tstamp, __u32 tstamp_type) = (void *) 192;
+
+/*
+ * bpf_ima_file_hash
+ *
+ * Returns a calculated IMA hash of the *file*.
+ * If the hash is larger than *size*, then only *size*
+ * bytes will be copied to *dst*
+ *
+ * Returns
+ * The **hash_algo** is returned on success,
+ * **-EOPNOTSUP** if the hash calculation failed or **-EINVAL** if
+ * invalid arguments are passed.
+ */
+static long (*bpf_ima_file_hash)(struct file *file, void *dst, __u32 size) = (void *) 193;
+
+/*
+ * bpf_kptr_xchg
+ *
+ * Exchange kptr at pointer *map_value* with *ptr*, and return the
+ * old value. *ptr* can be NULL, otherwise it must be a referenced
+ * pointer which will be released when this helper is called.
+ *
+ * Returns
+ * The old value of kptr (which can be NULL). The returned pointer
+ * if not NULL, is a reference which must be released using its
+ * corresponding release function, or moved into a BPF map before
+ * program exit.
+ */
+static void *(*bpf_kptr_xchg)(void *map_value, void *ptr) = (void *) 194;
+
+/*
+ * bpf_map_lookup_percpu_elem
+ *
+ * Perform a lookup in *percpu map* for an entry associated to
+ * *key* on *cpu*.
+ *
+ * Returns
+ * Map value associated to *key* on *cpu*, or **NULL** if no entry
+ * was found or *cpu* is invalid.
+ */
+static void *(*bpf_map_lookup_percpu_elem)(void *map, const void *key, __u32 cpu) = (void *) 195;
+
+/*
+ * bpf_skc_to_mptcp_sock
+ *
+ * Dynamically cast a *sk* pointer to a *mptcp_sock* pointer.
+ *
+ * Returns
+ * *sk* if casting is valid, or **NULL** otherwise.
+ */
+static struct mptcp_sock *(*bpf_skc_to_mptcp_sock)(void *sk) = (void *) 196;
+
+/*
+ * bpf_dynptr_from_mem
+ *
+ * Get a dynptr to local memory *data*.
+ *
+ * *data* must be a ptr to a map value.
+ * The maximum *size* supported is DYNPTR_MAX_SIZE.
+ * *flags* is currently unused.
+ *
+ * Returns
+ * 0 on success, -E2BIG if the size exceeds DYNPTR_MAX_SIZE,
+ * -EINVAL if flags is not 0.
+ */
+static long (*bpf_dynptr_from_mem)(void *data, __u32 size, __u64 flags, struct bpf_dynptr *ptr) = (void *) 197;
+
+/*
+ * bpf_ringbuf_reserve_dynptr
+ *
+ * Reserve *size* bytes of payload in a ring buffer *ringbuf*
+ * through the dynptr interface. *flags* must be 0.
+ *
+ * Please note that a corresponding bpf_ringbuf_submit_dynptr or
+ * bpf_ringbuf_discard_dynptr must be called on *ptr*, even if the
+ * reservation fails. This is enforced by the verifier.
+ *
+ * Returns
+ * 0 on success, or a negative error in case of failure.
+ */
+static long (*bpf_ringbuf_reserve_dynptr)(void *ringbuf, __u32 size, __u64 flags, struct bpf_dynptr *ptr) = (void *) 198;
+
+/*
+ * bpf_ringbuf_submit_dynptr
+ *
+ * Submit reserved ring buffer sample, pointed to by *data*,
+ * through the dynptr interface. This is a no-op if the dynptr is
+ * invalid/null.
+ *
+ * For more information on *flags*, please see
+ * 'bpf_ringbuf_submit'.
+ *
+ * Returns
+ * Nothing. Always succeeds.
+ */
+static void (*bpf_ringbuf_submit_dynptr)(struct bpf_dynptr *ptr, __u64 flags) = (void *) 199;
+
+/*
+ * bpf_ringbuf_discard_dynptr
+ *
+ * Discard reserved ring buffer sample through the dynptr
+ * interface. This is a no-op if the dynptr is invalid/null.
+ *
+ * For more information on *flags*, please see
+ * 'bpf_ringbuf_discard'.
+ *
+ * Returns
+ * Nothing. Always succeeds.
+ */
+static void (*bpf_ringbuf_discard_dynptr)(struct bpf_dynptr *ptr, __u64 flags) = (void *) 200;
+
+/*
+ * bpf_dynptr_read
+ *
+ * Read *len* bytes from *src* into *dst*, starting from *offset*
+ * into *src*.
+ * *flags* is currently unused.
+ *
+ * Returns
+ * 0 on success, -E2BIG if *offset* + *len* exceeds the length
+ * of *src*'s data, -EINVAL if *src* is an invalid dynptr or if
+ * *flags* is not 0.
+ */
+static long (*bpf_dynptr_read)(void *dst, __u32 len, const struct bpf_dynptr *src, __u32 offset, __u64 flags) = (void *) 201;
+
+/*
+ * bpf_dynptr_write
+ *
+ * Write *len* bytes from *src* into *dst*, starting from *offset*
+ * into *dst*.
+ * *flags* is currently unused.
+ *
+ * Returns
+ * 0 on success, -E2BIG if *offset* + *len* exceeds the length
+ * of *dst*'s data, -EINVAL if *dst* is an invalid dynptr or if *dst*
+ * is a read-only dynptr or if *flags* is not 0.
+ */
+static long (*bpf_dynptr_write)(const struct bpf_dynptr *dst, __u32 offset, void *src, __u32 len, __u64 flags) = (void *) 202;
+
+/*
+ * bpf_dynptr_data
+ *
+ * Get a pointer to the underlying dynptr data.
+ *
+ * *len* must be a statically known value. The returned data slice
+ * is invalidated whenever the dynptr is invalidated.
+ *
+ * Returns
+ * Pointer to the underlying dynptr data, NULL if the dynptr is
+ * read-only, if the dynptr is invalid, or if the offset and length
+ * is out of bounds.
+ */
+static void *(*bpf_dynptr_data)(const struct bpf_dynptr *ptr, __u32 offset, __u32 len) = (void *) 203;
+
+/*
+ * bpf_tcp_raw_gen_syncookie_ipv4
+ *
+ * Try to issue a SYN cookie for the packet with corresponding
+ * IPv4/TCP headers, *iph* and *th*, without depending on a
+ * listening socket.
+ *
+ * *iph* points to the IPv4 header.
+ *
+ * *th* points to the start of the TCP header, while *th_len*
+ * contains the length of the TCP header (at least
+ * **sizeof**\ (**struct tcphdr**)).
+ *
+ * Returns
+ * On success, lower 32 bits hold the generated SYN cookie in
+ * followed by 16 bits which hold the MSS value for that cookie,
+ * and the top 16 bits are unused.
+ *
+ * On failure, the returned value is one of the following:
+ *
+ * **-EINVAL** if *th_len* is invalid.
+ */
+static __s64 (*bpf_tcp_raw_gen_syncookie_ipv4)(struct iphdr *iph, struct tcphdr *th, __u32 th_len) = (void *) 204;
+
+/*
+ * bpf_tcp_raw_gen_syncookie_ipv6
+ *
+ * Try to issue a SYN cookie for the packet with corresponding
+ * IPv6/TCP headers, *iph* and *th*, without depending on a
+ * listening socket.
+ *
+ * *iph* points to the IPv6 header.
+ *
+ * *th* points to the start of the TCP header, while *th_len*
+ * contains the length of the TCP header (at least
+ * **sizeof**\ (**struct tcphdr**)).
+ *
+ * Returns
+ * On success, lower 32 bits hold the generated SYN cookie in
+ * followed by 16 bits which hold the MSS value for that cookie,
+ * and the top 16 bits are unused.
+ *
+ * On failure, the returned value is one of the following:
+ *
+ * **-EINVAL** if *th_len* is invalid.
+ *
+ * **-EPROTONOSUPPORT** if CONFIG_IPV6 is not builtin.
+ */
+static __s64 (*bpf_tcp_raw_gen_syncookie_ipv6)(struct ipv6hdr *iph, struct tcphdr *th, __u32 th_len) = (void *) 205;
+
+/*
+ * bpf_tcp_raw_check_syncookie_ipv4
+ *
+ * Check whether *iph* and *th* contain a valid SYN cookie ACK
+ * without depending on a listening socket.
+ *
+ * *iph* points to the IPv4 header.
+ *
+ * *th* points to the TCP header.
+ *
+ * Returns
+ * 0 if *iph* and *th* are a valid SYN cookie ACK.
+ *
+ * On failure, the returned value is one of the following:
+ *
+ * **-EACCES** if the SYN cookie is not valid.
+ */
+static long (*bpf_tcp_raw_check_syncookie_ipv4)(struct iphdr *iph, struct tcphdr *th) = (void *) 206;
+
+/*
+ * bpf_tcp_raw_check_syncookie_ipv6
+ *
+ * Check whether *iph* and *th* contain a valid SYN cookie ACK
+ * without depending on a listening socket.
+ *
+ * *iph* points to the IPv6 header.
+ *
+ * *th* points to the TCP header.
+ *
+ * Returns
+ * 0 if *iph* and *th* are a valid SYN cookie ACK.
+ *
+ * On failure, the returned value is one of the following:
+ *
+ * **-EACCES** if the SYN cookie is not valid.
+ *
+ * **-EPROTONOSUPPORT** if CONFIG_IPV6 is not builtin.
+ */
+static long (*bpf_tcp_raw_check_syncookie_ipv6)(struct ipv6hdr *iph, struct tcphdr *th) = (void *) 207;
+
+/*
+ * bpf_ktime_get_tai_ns
+ *
+ * A nonsettable system-wide clock derived from wall-clock time but
+ * ignoring leap seconds. This clock does not experience
+ * discontinuities and backwards jumps caused by NTP inserting leap
+ * seconds as CLOCK_REALTIME does.
+ *
+ * See: **clock_gettime**\ (**CLOCK_TAI**)
+ *
+ * Returns
+ * Current *ktime*.
+ */
+static __u64 (*bpf_ktime_get_tai_ns)(void) = (void *) 208;
+
+/*
+ * bpf_user_ringbuf_drain
+ *
+ * Drain samples from the specified user ring buffer, and invoke
+ * the provided callback for each such sample:
+ *
+ * long (\*callback_fn)(const struct bpf_dynptr \*dynptr, void \*ctx);
+ *
+ * If **callback_fn** returns 0, the helper will continue to try
+ * and drain the next sample, up to a maximum of
+ * BPF_MAX_USER_RINGBUF_SAMPLES samples. If the return value is 1,
+ * the helper will skip the rest of the samples and return. Other
+ * return values are not used now, and will be rejected by the
+ * verifier.
+ *
+ * Returns
+ * The number of drained samples if no error was encountered while
+ * draining samples, or 0 if no samples were present in the ring
+ * buffer. If a user-space producer was epoll-waiting on this map,
+ * and at least one sample was drained, they will receive an event
+ * notification notifying them of available space in the ring
+ * buffer. If the BPF_RB_NO_WAKEUP flag is passed to this
+ * function, no wakeup notification will be sent. If the
+ * BPF_RB_FORCE_WAKEUP flag is passed, a wakeup notification will
+ * be sent even if no sample was drained.
+ *
+ * On failure, the returned value is one of the following:
+ *
+ * **-EBUSY** if the ring buffer is contended, and another calling
+ * context was concurrently draining the ring buffer.
+ *
+ * **-EINVAL** if user-space is not properly tracking the ring
+ * buffer due to the producer position not being aligned to 8
+ * bytes, a sample not being aligned to 8 bytes, or the producer
+ * position not matching the advertised length of a sample.
+ *
+ * **-E2BIG** if user-space has tried to publish a sample which is
+ * larger than the size of the ring buffer, or which cannot fit
+ * within a struct bpf_dynptr.
+ */
+static long (*bpf_user_ringbuf_drain)(void *map, void *callback_fn, void *ctx, __u64 flags) = (void *) 209;
+
+/*
+ * bpf_cgrp_storage_get
+ *
+ * Get a bpf_local_storage from the *cgroup*.
+ *
+ * Logically, it could be thought of as getting the value from
+ * a *map* with *cgroup* as the **key**. From this
+ * perspective, the usage is not much different from
+ * **bpf_map_lookup_elem**\ (*map*, **&**\ *cgroup*) except this
+ * helper enforces the key must be a cgroup struct and the map must also
+ * be a **BPF_MAP_TYPE_CGRP_STORAGE**.
+ *
+ * In reality, the local-storage value is embedded directly inside of the
+ * *cgroup* object itself, rather than being located in the
+ * **BPF_MAP_TYPE_CGRP_STORAGE** map. When the local-storage value is
+ * queried for some *map* on a *cgroup* object, the kernel will perform an
+ * O(n) iteration over all of the live local-storage values for that
+ * *cgroup* object until the local-storage value for the *map* is found.
+ *
+ * An optional *flags* (**BPF_LOCAL_STORAGE_GET_F_CREATE**) can be
+ * used such that a new bpf_local_storage will be
+ * created if one does not exist. *value* can be used
+ * together with **BPF_LOCAL_STORAGE_GET_F_CREATE** to specify
+ * the initial value of a bpf_local_storage. If *value* is
+ * **NULL**, the new bpf_local_storage will be zero initialized.
+ *
+ * Returns
+ * A bpf_local_storage pointer is returned on success.
+ *
+ * **NULL** if not found or there was an error in adding
+ * a new bpf_local_storage.
+ */
+static void *(*bpf_cgrp_storage_get)(void *map, struct cgroup *cgroup, void *value, __u64 flags) = (void *) 210;
+
+/*
+ * bpf_cgrp_storage_delete
+ *
+ * Delete a bpf_local_storage from a *cgroup*.
+ *
+ * Returns
+ * 0 on success.
+ *
+ * **-ENOENT** if the bpf_local_storage cannot be found.
+ */
+static long (*bpf_cgrp_storage_delete)(void *map, struct cgroup *cgroup) = (void *) 211;
+
+
diff --git a/src/bpf_helpers.h b/src/bpf_helpers.h
new file mode 100644
index 0000000..d37c4fe
--- /dev/null
+++ b/src/bpf_helpers.h
@@ -0,0 +1,289 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+#ifndef __BPF_HELPERS__
+#define __BPF_HELPERS__
+
+/*
+ * Note that bpf programs need to include either
+ * vmlinux.h (auto-generated from BTF) or linux/types.h
+ * in advance since bpf_helper_defs.h uses such types
+ * as __u64.
+ */
+#include "bpf_helper_defs.h"
+
+#define __uint(name, val) int (*name)[val]
+#define __type(name, val) typeof(val) *name
+#define __array(name, val) typeof(val) *name[]
+
+/*
+ * Helper macro to place programs, maps, license in
+ * different sections in elf_bpf file. Section names
+ * are interpreted by libbpf depending on the context (BPF programs, BPF maps,
+ * extern variables, etc).
+ * To allow use of SEC() with externs (e.g., for extern .maps declarations),
+ * make sure __attribute__((unused)) doesn't trigger compilation warning.
+ */
+#if __GNUC__ && !__clang__
+
+/*
+ * Pragma macros are broken on GCC
+ * https://gcc.gnu.org/bugzilla/show_bug.cgi?id=55578
+ * https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90400
+ */
+#define SEC(name) __attribute__((section(name), used))
+
+#else
+
+#define SEC(name) \
+ _Pragma("GCC diagnostic push") \
+ _Pragma("GCC diagnostic ignored \"-Wignored-attributes\"") \
+ __attribute__((section(name), used)) \
+ _Pragma("GCC diagnostic pop") \
+
+#endif
+
+/* Avoid 'linux/stddef.h' definition of '__always_inline'. */
+#undef __always_inline
+#define __always_inline inline __attribute__((always_inline))
+
+#ifndef __noinline
+#define __noinline __attribute__((noinline))
+#endif
+#ifndef __weak
+#define __weak __attribute__((weak))
+#endif
+
+/*
+ * Use __hidden attribute to mark a non-static BPF subprogram effectively
+ * static for BPF verifier's verification algorithm purposes, allowing more
+ * extensive and permissive BPF verification process, taking into account
+ * subprogram's caller context.
+ */
+#define __hidden __attribute__((visibility("hidden")))
+
+/* When utilizing vmlinux.h with BPF CO-RE, user BPF programs can't include
+ * any system-level headers (such as stddef.h, linux/version.h, etc), and
+ * commonly-used macros like NULL and KERNEL_VERSION aren't available through
+ * vmlinux.h. This just adds unnecessary hurdles and forces users to re-define
+ * them on their own. So as a convenience, provide such definitions here.
+ */
+#ifndef NULL
+#define NULL ((void *)0)
+#endif
+
+#ifndef KERNEL_VERSION
+#define KERNEL_VERSION(a, b, c) (((a) << 16) + ((b) << 8) + ((c) > 255 ? 255 : (c)))
+#endif
+
+/*
+ * Helper macros to manipulate data structures
+ */
+#ifndef offsetof
+#define offsetof(TYPE, MEMBER) ((unsigned long)&((TYPE *)0)->MEMBER)
+#endif
+#ifndef container_of
+#define container_of(ptr, type, member) \
+ ({ \
+ void *__mptr = (void *)(ptr); \
+ ((type *)(__mptr - offsetof(type, member))); \
+ })
+#endif
+
+/*
+ * Compiler (optimization) barrier.
+ */
+#ifndef barrier
+#define barrier() asm volatile("" ::: "memory")
+#endif
+
+/* Variable-specific compiler (optimization) barrier. It's a no-op which makes
+ * compiler believe that there is some black box modification of a given
+ * variable and thus prevents compiler from making extra assumption about its
+ * value and potential simplifications and optimizations on this variable.
+ *
+ * E.g., compiler might often delay or even omit 32-bit to 64-bit casting of
+ * a variable, making some code patterns unverifiable. Putting barrier_var()
+ * in place will ensure that cast is performed before the barrier_var()
+ * invocation, because compiler has to pessimistically assume that embedded
+ * asm section might perform some extra operations on that variable.
+ *
+ * This is a variable-specific variant of more global barrier().
+ */
+#ifndef barrier_var
+#define barrier_var(var) asm volatile("" : "=r"(var) : "0"(var))
+#endif
+
+/*
+ * Helper macro to throw a compilation error if __bpf_unreachable() gets
+ * built into the resulting code. This works given BPF back end does not
+ * implement __builtin_trap(). This is useful to assert that certain paths
+ * of the program code are never used and hence eliminated by the compiler.
+ *
+ * For example, consider a switch statement that covers known cases used by
+ * the program. __bpf_unreachable() can then reside in the default case. If
+ * the program gets extended such that a case is not covered in the switch
+ * statement, then it will throw a build error due to the default case not
+ * being compiled out.
+ */
+#ifndef __bpf_unreachable
+# define __bpf_unreachable() __builtin_trap()
+#endif
+
+/*
+ * Helper function to perform a tail call with a constant/immediate map slot.
+ */
+#if __clang_major__ >= 8 && defined(__bpf__)
+static __always_inline void
+bpf_tail_call_static(void *ctx, const void *map, const __u32 slot)
+{
+ if (!__builtin_constant_p(slot))
+ __bpf_unreachable();
+
+ /*
+ * Provide a hard guarantee that LLVM won't optimize setting r2 (map
+ * pointer) and r3 (constant map index) from _different paths_ ending
+ * up at the _same_ call insn as otherwise we won't be able to use the
+ * jmpq/nopl retpoline-free patching by the x86-64 JIT in the kernel
+ * given they mismatch. See also d2e4c1e6c294 ("bpf: Constant map key
+ * tracking for prog array pokes") for details on verifier tracking.
+ *
+ * Note on clobber list: we need to stay in-line with BPF calling
+ * convention, so even if we don't end up using r0, r4, r5, we need
+ * to mark them as clobber so that LLVM doesn't end up using them
+ * before / after the call.
+ */
+ asm volatile("r1 = %[ctx]\n\t"
+ "r2 = %[map]\n\t"
+ "r3 = %[slot]\n\t"
+ "call 12"
+ :: [ctx]"r"(ctx), [map]"r"(map), [slot]"i"(slot)
+ : "r0", "r1", "r2", "r3", "r4", "r5");
+}
+#endif
+
+enum libbpf_pin_type {
+ LIBBPF_PIN_NONE,
+ /* PIN_BY_NAME: pin maps by name (in /sys/fs/bpf by default) */
+ LIBBPF_PIN_BY_NAME,
+};
+
+enum libbpf_tristate {
+ TRI_NO = 0,
+ TRI_YES = 1,
+ TRI_MODULE = 2,
+};
+
+#define __kconfig __attribute__((section(".kconfig")))
+#define __ksym __attribute__((section(".ksyms")))
+#define __kptr __attribute__((btf_type_tag("kptr")))
+#define __kptr_ref __attribute__((btf_type_tag("kptr_ref")))
+
+#ifndef ___bpf_concat
+#define ___bpf_concat(a, b) a ## b
+#endif
+#ifndef ___bpf_apply
+#define ___bpf_apply(fn, n) ___bpf_concat(fn, n)
+#endif
+#ifndef ___bpf_nth
+#define ___bpf_nth(_, _1, _2, _3, _4, _5, _6, _7, _8, _9, _a, _b, _c, N, ...) N
+#endif
+#ifndef ___bpf_narg
+#define ___bpf_narg(...) \
+ ___bpf_nth(_, ##__VA_ARGS__, 12, 11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0)
+#endif
+
+#define ___bpf_fill0(arr, p, x) do {} while (0)
+#define ___bpf_fill1(arr, p, x) arr[p] = x
+#define ___bpf_fill2(arr, p, x, args...) arr[p] = x; ___bpf_fill1(arr, p + 1, args)
+#define ___bpf_fill3(arr, p, x, args...) arr[p] = x; ___bpf_fill2(arr, p + 1, args)
+#define ___bpf_fill4(arr, p, x, args...) arr[p] = x; ___bpf_fill3(arr, p + 1, args)
+#define ___bpf_fill5(arr, p, x, args...) arr[p] = x; ___bpf_fill4(arr, p + 1, args)
+#define ___bpf_fill6(arr, p, x, args...) arr[p] = x; ___bpf_fill5(arr, p + 1, args)
+#define ___bpf_fill7(arr, p, x, args...) arr[p] = x; ___bpf_fill6(arr, p + 1, args)
+#define ___bpf_fill8(arr, p, x, args...) arr[p] = x; ___bpf_fill7(arr, p + 1, args)
+#define ___bpf_fill9(arr, p, x, args...) arr[p] = x; ___bpf_fill8(arr, p + 1, args)
+#define ___bpf_fill10(arr, p, x, args...) arr[p] = x; ___bpf_fill9(arr, p + 1, args)
+#define ___bpf_fill11(arr, p, x, args...) arr[p] = x; ___bpf_fill10(arr, p + 1, args)
+#define ___bpf_fill12(arr, p, x, args...) arr[p] = x; ___bpf_fill11(arr, p + 1, args)
+#define ___bpf_fill(arr, args...) \
+ ___bpf_apply(___bpf_fill, ___bpf_narg(args))(arr, 0, args)
+
+/*
+ * BPF_SEQ_PRINTF to wrap bpf_seq_printf to-be-printed values
+ * in a structure.
+ */
+#define BPF_SEQ_PRINTF(seq, fmt, args...) \
+({ \
+ static const char ___fmt[] = fmt; \
+ unsigned long long ___param[___bpf_narg(args)]; \
+ \
+ _Pragma("GCC diagnostic push") \
+ _Pragma("GCC diagnostic ignored \"-Wint-conversion\"") \
+ ___bpf_fill(___param, args); \
+ _Pragma("GCC diagnostic pop") \
+ \
+ bpf_seq_printf(seq, ___fmt, sizeof(___fmt), \
+ ___param, sizeof(___param)); \
+})
+
+/*
+ * BPF_SNPRINTF wraps the bpf_snprintf helper with variadic arguments instead of
+ * an array of u64.
+ */
+#define BPF_SNPRINTF(out, out_size, fmt, args...) \
+({ \
+ static const char ___fmt[] = fmt; \
+ unsigned long long ___param[___bpf_narg(args)]; \
+ \
+ _Pragma("GCC diagnostic push") \
+ _Pragma("GCC diagnostic ignored \"-Wint-conversion\"") \
+ ___bpf_fill(___param, args); \
+ _Pragma("GCC diagnostic pop") \
+ \
+ bpf_snprintf(out, out_size, ___fmt, \
+ ___param, sizeof(___param)); \
+})
+
+#ifdef BPF_NO_GLOBAL_DATA
+#define BPF_PRINTK_FMT_MOD
+#else
+#define BPF_PRINTK_FMT_MOD static const
+#endif
+
+#define __bpf_printk(fmt, ...) \
+({ \
+ BPF_PRINTK_FMT_MOD char ____fmt[] = fmt; \
+ bpf_trace_printk(____fmt, sizeof(____fmt), \
+ ##__VA_ARGS__); \
+})
+
+/*
+ * __bpf_vprintk wraps the bpf_trace_vprintk helper with variadic arguments
+ * instead of an array of u64.
+ */
+#define __bpf_vprintk(fmt, args...) \
+({ \
+ static const char ___fmt[] = fmt; \
+ unsigned long long ___param[___bpf_narg(args)]; \
+ \
+ _Pragma("GCC diagnostic push") \
+ _Pragma("GCC diagnostic ignored \"-Wint-conversion\"") \
+ ___bpf_fill(___param, args); \
+ _Pragma("GCC diagnostic pop") \
+ \
+ bpf_trace_vprintk(___fmt, sizeof(___fmt), \
+ ___param, sizeof(___param)); \
+})
+
+/* Use __bpf_printk when bpf_printk call has 3 or fewer fmt args
+ * Otherwise use __bpf_vprintk
+ */
+#define ___bpf_pick_printk(...) \
+ ___bpf_nth(_, ##__VA_ARGS__, __bpf_vprintk, __bpf_vprintk, __bpf_vprintk, \
+ __bpf_vprintk, __bpf_vprintk, __bpf_vprintk, __bpf_vprintk, \
+ __bpf_vprintk, __bpf_vprintk, __bpf_printk /*3*/, __bpf_printk /*2*/,\
+ __bpf_printk /*1*/, __bpf_printk /*0*/)
+
+/* Helper macro to print out debug messages */
+#define bpf_printk(fmt, args...) ___bpf_pick_printk(args)(fmt, ##args)
+
+#endif
diff --git a/src/bpf_prog_linfo.c b/src/bpf_prog_linfo.c
new file mode 100644
index 0000000..5c50309
--- /dev/null
+++ b/src/bpf_prog_linfo.c
@@ -0,0 +1,246 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+/* Copyright (c) 2018 Facebook */
+
+#include <string.h>
+#include <stdlib.h>
+#include <linux/err.h>
+#include <linux/bpf.h>
+#include "libbpf.h"
+#include "libbpf_internal.h"
+
+struct bpf_prog_linfo {
+ void *raw_linfo;
+ void *raw_jited_linfo;
+ __u32 *nr_jited_linfo_per_func;
+ __u32 *jited_linfo_func_idx;
+ __u32 nr_linfo;
+ __u32 nr_jited_func;
+ __u32 rec_size;
+ __u32 jited_rec_size;
+};
+
+static int dissect_jited_func(struct bpf_prog_linfo *prog_linfo,
+ const __u64 *ksym_func, const __u32 *ksym_len)
+{
+ __u32 nr_jited_func, nr_linfo;
+ const void *raw_jited_linfo;
+ const __u64 *jited_linfo;
+ __u64 last_jited_linfo;
+ /*
+ * Index to raw_jited_linfo:
+ * i: Index for searching the next ksym_func
+ * prev_i: Index to the last found ksym_func
+ */
+ __u32 i, prev_i;
+ __u32 f; /* Index to ksym_func */
+
+ raw_jited_linfo = prog_linfo->raw_jited_linfo;
+ jited_linfo = raw_jited_linfo;
+ if (ksym_func[0] != *jited_linfo)
+ goto errout;
+
+ prog_linfo->jited_linfo_func_idx[0] = 0;
+ nr_jited_func = prog_linfo->nr_jited_func;
+ nr_linfo = prog_linfo->nr_linfo;
+
+ for (prev_i = 0, i = 1, f = 1;
+ i < nr_linfo && f < nr_jited_func;
+ i++) {
+ raw_jited_linfo += prog_linfo->jited_rec_size;
+ last_jited_linfo = *jited_linfo;
+ jited_linfo = raw_jited_linfo;
+
+ if (ksym_func[f] == *jited_linfo) {
+ prog_linfo->jited_linfo_func_idx[f] = i;
+
+ /* Sanity check */
+ if (last_jited_linfo - ksym_func[f - 1] + 1 >
+ ksym_len[f - 1])
+ goto errout;
+
+ prog_linfo->nr_jited_linfo_per_func[f - 1] =
+ i - prev_i;
+ prev_i = i;
+
+ /*
+ * The ksym_func[f] is found in jited_linfo.
+ * Look for the next one.
+ */
+ f++;
+ } else if (*jited_linfo <= last_jited_linfo) {
+ /* Ensure the addr is increasing _within_ a func */
+ goto errout;
+ }
+ }
+
+ if (f != nr_jited_func)
+ goto errout;
+
+ prog_linfo->nr_jited_linfo_per_func[nr_jited_func - 1] =
+ nr_linfo - prev_i;
+
+ return 0;
+
+errout:
+ return -EINVAL;
+}
+
+void bpf_prog_linfo__free(struct bpf_prog_linfo *prog_linfo)
+{
+ if (!prog_linfo)
+ return;
+
+ free(prog_linfo->raw_linfo);
+ free(prog_linfo->raw_jited_linfo);
+ free(prog_linfo->nr_jited_linfo_per_func);
+ free(prog_linfo->jited_linfo_func_idx);
+ free(prog_linfo);
+}
+
+struct bpf_prog_linfo *bpf_prog_linfo__new(const struct bpf_prog_info *info)
+{
+ struct bpf_prog_linfo *prog_linfo;
+ __u32 nr_linfo, nr_jited_func;
+ __u64 data_sz;
+
+ nr_linfo = info->nr_line_info;
+
+ if (!nr_linfo)
+ return errno = EINVAL, NULL;
+
+ /*
+ * The min size that bpf_prog_linfo has to access for
+ * searching purpose.
+ */
+ if (info->line_info_rec_size <
+ offsetof(struct bpf_line_info, file_name_off))
+ return errno = EINVAL, NULL;
+
+ prog_linfo = calloc(1, sizeof(*prog_linfo));
+ if (!prog_linfo)
+ return errno = ENOMEM, NULL;
+
+ /* Copy xlated line_info */
+ prog_linfo->nr_linfo = nr_linfo;
+ prog_linfo->rec_size = info->line_info_rec_size;
+ data_sz = (__u64)nr_linfo * prog_linfo->rec_size;
+ prog_linfo->raw_linfo = malloc(data_sz);
+ if (!prog_linfo->raw_linfo)
+ goto err_free;
+ memcpy(prog_linfo->raw_linfo, (void *)(long)info->line_info, data_sz);
+
+ nr_jited_func = info->nr_jited_ksyms;
+ if (!nr_jited_func ||
+ !info->jited_line_info ||
+ info->nr_jited_line_info != nr_linfo ||
+ info->jited_line_info_rec_size < sizeof(__u64) ||
+ info->nr_jited_func_lens != nr_jited_func ||
+ !info->jited_ksyms ||
+ !info->jited_func_lens)
+ /* Not enough info to provide jited_line_info */
+ return prog_linfo;
+
+ /* Copy jited_line_info */
+ prog_linfo->nr_jited_func = nr_jited_func;
+ prog_linfo->jited_rec_size = info->jited_line_info_rec_size;
+ data_sz = (__u64)nr_linfo * prog_linfo->jited_rec_size;
+ prog_linfo->raw_jited_linfo = malloc(data_sz);
+ if (!prog_linfo->raw_jited_linfo)
+ goto err_free;
+ memcpy(prog_linfo->raw_jited_linfo,
+ (void *)(long)info->jited_line_info, data_sz);
+
+ /* Number of jited_line_info per jited func */
+ prog_linfo->nr_jited_linfo_per_func = malloc(nr_jited_func *
+ sizeof(__u32));
+ if (!prog_linfo->nr_jited_linfo_per_func)
+ goto err_free;
+
+ /*
+ * For each jited func,
+ * the start idx to the "linfo" and "jited_linfo" array,
+ */
+ prog_linfo->jited_linfo_func_idx = malloc(nr_jited_func *
+ sizeof(__u32));
+ if (!prog_linfo->jited_linfo_func_idx)
+ goto err_free;
+
+ if (dissect_jited_func(prog_linfo,
+ (__u64 *)(long)info->jited_ksyms,
+ (__u32 *)(long)info->jited_func_lens))
+ goto err_free;
+
+ return prog_linfo;
+
+err_free:
+ bpf_prog_linfo__free(prog_linfo);
+ return errno = EINVAL, NULL;
+}
+
+const struct bpf_line_info *
+bpf_prog_linfo__lfind_addr_func(const struct bpf_prog_linfo *prog_linfo,
+ __u64 addr, __u32 func_idx, __u32 nr_skip)
+{
+ __u32 jited_rec_size, rec_size, nr_linfo, start, i;
+ const void *raw_jited_linfo, *raw_linfo;
+ const __u64 *jited_linfo;
+
+ if (func_idx >= prog_linfo->nr_jited_func)
+ return errno = ENOENT, NULL;
+
+ nr_linfo = prog_linfo->nr_jited_linfo_per_func[func_idx];
+ if (nr_skip >= nr_linfo)
+ return errno = ENOENT, NULL;
+
+ start = prog_linfo->jited_linfo_func_idx[func_idx] + nr_skip;
+ jited_rec_size = prog_linfo->jited_rec_size;
+ raw_jited_linfo = prog_linfo->raw_jited_linfo +
+ (start * jited_rec_size);
+ jited_linfo = raw_jited_linfo;
+ if (addr < *jited_linfo)
+ return errno = ENOENT, NULL;
+
+ nr_linfo -= nr_skip;
+ rec_size = prog_linfo->rec_size;
+ raw_linfo = prog_linfo->raw_linfo + (start * rec_size);
+ for (i = 0; i < nr_linfo; i++) {
+ if (addr < *jited_linfo)
+ break;
+
+ raw_linfo += rec_size;
+ raw_jited_linfo += jited_rec_size;
+ jited_linfo = raw_jited_linfo;
+ }
+
+ return raw_linfo - rec_size;
+}
+
+const struct bpf_line_info *
+bpf_prog_linfo__lfind(const struct bpf_prog_linfo *prog_linfo,
+ __u32 insn_off, __u32 nr_skip)
+{
+ const struct bpf_line_info *linfo;
+ __u32 rec_size, nr_linfo, i;
+ const void *raw_linfo;
+
+ nr_linfo = prog_linfo->nr_linfo;
+ if (nr_skip >= nr_linfo)
+ return errno = ENOENT, NULL;
+
+ rec_size = prog_linfo->rec_size;
+ raw_linfo = prog_linfo->raw_linfo + (nr_skip * rec_size);
+ linfo = raw_linfo;
+ if (insn_off < linfo->insn_off)
+ return errno = ENOENT, NULL;
+
+ nr_linfo -= nr_skip;
+ for (i = 0; i < nr_linfo; i++) {
+ if (insn_off < linfo->insn_off)
+ break;
+
+ raw_linfo += rec_size;
+ linfo = raw_linfo;
+ }
+
+ return raw_linfo - rec_size;
+}
diff --git a/src/bpf_tracing.h b/src/bpf_tracing.h
new file mode 100644
index 0000000..2972dc2
--- /dev/null
+++ b/src/bpf_tracing.h
@@ -0,0 +1,670 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+#ifndef __BPF_TRACING_H__
+#define __BPF_TRACING_H__
+
+#include <bpf/bpf_helpers.h>
+
+/* Scan the ARCH passed in from ARCH env variable (see Makefile) */
+#if defined(__TARGET_ARCH_x86)
+ #define bpf_target_x86
+ #define bpf_target_defined
+#elif defined(__TARGET_ARCH_s390)
+ #define bpf_target_s390
+ #define bpf_target_defined
+#elif defined(__TARGET_ARCH_arm)
+ #define bpf_target_arm
+ #define bpf_target_defined
+#elif defined(__TARGET_ARCH_arm64)
+ #define bpf_target_arm64
+ #define bpf_target_defined
+#elif defined(__TARGET_ARCH_mips)
+ #define bpf_target_mips
+ #define bpf_target_defined
+#elif defined(__TARGET_ARCH_powerpc)
+ #define bpf_target_powerpc
+ #define bpf_target_defined
+#elif defined(__TARGET_ARCH_sparc)
+ #define bpf_target_sparc
+ #define bpf_target_defined
+#elif defined(__TARGET_ARCH_riscv)
+ #define bpf_target_riscv
+ #define bpf_target_defined
+#elif defined(__TARGET_ARCH_arc)
+ #define bpf_target_arc
+ #define bpf_target_defined
+#else
+
+/* Fall back to what the compiler says */
+#if defined(__x86_64__)
+ #define bpf_target_x86
+ #define bpf_target_defined
+#elif defined(__s390__)
+ #define bpf_target_s390
+ #define bpf_target_defined
+#elif defined(__arm__)
+ #define bpf_target_arm
+ #define bpf_target_defined
+#elif defined(__aarch64__)
+ #define bpf_target_arm64
+ #define bpf_target_defined
+#elif defined(__mips__)
+ #define bpf_target_mips
+ #define bpf_target_defined
+#elif defined(__powerpc__)
+ #define bpf_target_powerpc
+ #define bpf_target_defined
+#elif defined(__sparc__)
+ #define bpf_target_sparc
+ #define bpf_target_defined
+#elif defined(__riscv) && __riscv_xlen == 64
+ #define bpf_target_riscv
+ #define bpf_target_defined
+#elif defined(__arc__)
+ #define bpf_target_arc
+ #define bpf_target_defined
+#endif /* no compiler target */
+
+#endif
+
+#ifndef __BPF_TARGET_MISSING
+#define __BPF_TARGET_MISSING "GCC error \"Must specify a BPF target arch via __TARGET_ARCH_xxx\""
+#endif
+
+#if defined(bpf_target_x86)
+
+#if defined(__KERNEL__) || defined(__VMLINUX_H__)
+
+#define __PT_PARM1_REG di
+#define __PT_PARM2_REG si
+#define __PT_PARM3_REG dx
+#define __PT_PARM4_REG cx
+#define __PT_PARM5_REG r8
+#define __PT_RET_REG sp
+#define __PT_FP_REG bp
+#define __PT_RC_REG ax
+#define __PT_SP_REG sp
+#define __PT_IP_REG ip
+/* syscall uses r10 for PARM4 */
+#define PT_REGS_PARM4_SYSCALL(x) ((x)->r10)
+#define PT_REGS_PARM4_CORE_SYSCALL(x) BPF_CORE_READ(x, r10)
+
+#else
+
+#ifdef __i386__
+
+#define __PT_PARM1_REG eax
+#define __PT_PARM2_REG edx
+#define __PT_PARM3_REG ecx
+/* i386 kernel is built with -mregparm=3 */
+#define __PT_PARM4_REG __unsupported__
+#define __PT_PARM5_REG __unsupported__
+#define __PT_RET_REG esp
+#define __PT_FP_REG ebp
+#define __PT_RC_REG eax
+#define __PT_SP_REG esp
+#define __PT_IP_REG eip
+
+#else /* __i386__ */
+
+#define __PT_PARM1_REG rdi
+#define __PT_PARM2_REG rsi
+#define __PT_PARM3_REG rdx
+#define __PT_PARM4_REG rcx
+#define __PT_PARM5_REG r8
+#define __PT_RET_REG rsp
+#define __PT_FP_REG rbp
+#define __PT_RC_REG rax
+#define __PT_SP_REG rsp
+#define __PT_IP_REG rip
+/* syscall uses r10 for PARM4 */
+#define PT_REGS_PARM4_SYSCALL(x) ((x)->r10)
+#define PT_REGS_PARM4_CORE_SYSCALL(x) BPF_CORE_READ(x, r10)
+
+#endif /* __i386__ */
+
+#endif /* __KERNEL__ || __VMLINUX_H__ */
+
+#elif defined(bpf_target_s390)
+
+struct pt_regs___s390 {
+ unsigned long orig_gpr2;
+};
+
+/* s390 provides user_pt_regs instead of struct pt_regs to userspace */
+#define __PT_REGS_CAST(x) ((const user_pt_regs *)(x))
+#define __PT_PARM1_REG gprs[2]
+#define __PT_PARM2_REG gprs[3]
+#define __PT_PARM3_REG gprs[4]
+#define __PT_PARM4_REG gprs[5]
+#define __PT_PARM5_REG gprs[6]
+#define __PT_RET_REG grps[14]
+#define __PT_FP_REG gprs[11] /* Works only with CONFIG_FRAME_POINTER */
+#define __PT_RC_REG gprs[2]
+#define __PT_SP_REG gprs[15]
+#define __PT_IP_REG psw.addr
+#define PT_REGS_PARM1_SYSCALL(x) PT_REGS_PARM1_CORE_SYSCALL(x)
+#define PT_REGS_PARM1_CORE_SYSCALL(x) BPF_CORE_READ((const struct pt_regs___s390 *)(x), orig_gpr2)
+
+#elif defined(bpf_target_arm)
+
+#define __PT_PARM1_REG uregs[0]
+#define __PT_PARM2_REG uregs[1]
+#define __PT_PARM3_REG uregs[2]
+#define __PT_PARM4_REG uregs[3]
+#define __PT_PARM5_REG uregs[4]
+#define __PT_RET_REG uregs[14]
+#define __PT_FP_REG uregs[11] /* Works only with CONFIG_FRAME_POINTER */
+#define __PT_RC_REG uregs[0]
+#define __PT_SP_REG uregs[13]
+#define __PT_IP_REG uregs[12]
+
+#elif defined(bpf_target_arm64)
+
+struct pt_regs___arm64 {
+ unsigned long orig_x0;
+};
+
+/* arm64 provides struct user_pt_regs instead of struct pt_regs to userspace */
+#define __PT_REGS_CAST(x) ((const struct user_pt_regs *)(x))
+#define __PT_PARM1_REG regs[0]
+#define __PT_PARM2_REG regs[1]
+#define __PT_PARM3_REG regs[2]
+#define __PT_PARM4_REG regs[3]
+#define __PT_PARM5_REG regs[4]
+#define __PT_RET_REG regs[30]
+#define __PT_FP_REG regs[29] /* Works only with CONFIG_FRAME_POINTER */
+#define __PT_RC_REG regs[0]
+#define __PT_SP_REG sp
+#define __PT_IP_REG pc
+#define PT_REGS_PARM1_SYSCALL(x) PT_REGS_PARM1_CORE_SYSCALL(x)
+#define PT_REGS_PARM1_CORE_SYSCALL(x) BPF_CORE_READ((const struct pt_regs___arm64 *)(x), orig_x0)
+
+#elif defined(bpf_target_mips)
+
+#define __PT_PARM1_REG regs[4]
+#define __PT_PARM2_REG regs[5]
+#define __PT_PARM3_REG regs[6]
+#define __PT_PARM4_REG regs[7]
+#define __PT_PARM5_REG regs[8]
+#define __PT_RET_REG regs[31]
+#define __PT_FP_REG regs[30] /* Works only with CONFIG_FRAME_POINTER */
+#define __PT_RC_REG regs[2]
+#define __PT_SP_REG regs[29]
+#define __PT_IP_REG cp0_epc
+
+#elif defined(bpf_target_powerpc)
+
+#define __PT_PARM1_REG gpr[3]
+#define __PT_PARM2_REG gpr[4]
+#define __PT_PARM3_REG gpr[5]
+#define __PT_PARM4_REG gpr[6]
+#define __PT_PARM5_REG gpr[7]
+#define __PT_RET_REG regs[31]
+#define __PT_FP_REG __unsupported__
+#define __PT_RC_REG gpr[3]
+#define __PT_SP_REG sp
+#define __PT_IP_REG nip
+/* powerpc does not select ARCH_HAS_SYSCALL_WRAPPER. */
+#define PT_REGS_SYSCALL_REGS(ctx) ctx
+
+#elif defined(bpf_target_sparc)
+
+#define __PT_PARM1_REG u_regs[UREG_I0]
+#define __PT_PARM2_REG u_regs[UREG_I1]
+#define __PT_PARM3_REG u_regs[UREG_I2]
+#define __PT_PARM4_REG u_regs[UREG_I3]
+#define __PT_PARM5_REG u_regs[UREG_I4]
+#define __PT_RET_REG u_regs[UREG_I7]
+#define __PT_FP_REG __unsupported__
+#define __PT_RC_REG u_regs[UREG_I0]
+#define __PT_SP_REG u_regs[UREG_FP]
+/* Should this also be a bpf_target check for the sparc case? */
+#if defined(__arch64__)
+#define __PT_IP_REG tpc
+#else
+#define __PT_IP_REG pc
+#endif
+
+#elif defined(bpf_target_riscv)
+
+#define __PT_REGS_CAST(x) ((const struct user_regs_struct *)(x))
+#define __PT_PARM1_REG a0
+#define __PT_PARM2_REG a1
+#define __PT_PARM3_REG a2
+#define __PT_PARM4_REG a3
+#define __PT_PARM5_REG a4
+#define __PT_RET_REG ra
+#define __PT_FP_REG s0
+#define __PT_RC_REG a0
+#define __PT_SP_REG sp
+#define __PT_IP_REG pc
+/* riscv does not select ARCH_HAS_SYSCALL_WRAPPER. */
+#define PT_REGS_SYSCALL_REGS(ctx) ctx
+
+#elif defined(bpf_target_arc)
+
+/* arc provides struct user_pt_regs instead of struct pt_regs to userspace */
+#define __PT_REGS_CAST(x) ((const struct user_regs_struct *)(x))
+#define __PT_PARM1_REG scratch.r0
+#define __PT_PARM2_REG scratch.r1
+#define __PT_PARM3_REG scratch.r2
+#define __PT_PARM4_REG scratch.r3
+#define __PT_PARM5_REG scratch.r4
+#define __PT_RET_REG scratch.blink
+#define __PT_FP_REG __unsupported__
+#define __PT_RC_REG scratch.r0
+#define __PT_SP_REG scratch.sp
+#define __PT_IP_REG scratch.ret
+/* arc does not select ARCH_HAS_SYSCALL_WRAPPER. */
+#define PT_REGS_SYSCALL_REGS(ctx) ctx
+
+#endif
+
+#if defined(bpf_target_defined)
+
+struct pt_regs;
+
+/* allow some architecutres to override `struct pt_regs` */
+#ifndef __PT_REGS_CAST
+#define __PT_REGS_CAST(x) (x)
+#endif
+
+#define PT_REGS_PARM1(x) (__PT_REGS_CAST(x)->__PT_PARM1_REG)
+#define PT_REGS_PARM2(x) (__PT_REGS_CAST(x)->__PT_PARM2_REG)
+#define PT_REGS_PARM3(x) (__PT_REGS_CAST(x)->__PT_PARM3_REG)
+#define PT_REGS_PARM4(x) (__PT_REGS_CAST(x)->__PT_PARM4_REG)
+#define PT_REGS_PARM5(x) (__PT_REGS_CAST(x)->__PT_PARM5_REG)
+#define PT_REGS_RET(x) (__PT_REGS_CAST(x)->__PT_RET_REG)
+#define PT_REGS_FP(x) (__PT_REGS_CAST(x)->__PT_FP_REG)
+#define PT_REGS_RC(x) (__PT_REGS_CAST(x)->__PT_RC_REG)
+#define PT_REGS_SP(x) (__PT_REGS_CAST(x)->__PT_SP_REG)
+#define PT_REGS_IP(x) (__PT_REGS_CAST(x)->__PT_IP_REG)
+
+#define PT_REGS_PARM1_CORE(x) BPF_CORE_READ(__PT_REGS_CAST(x), __PT_PARM1_REG)
+#define PT_REGS_PARM2_CORE(x) BPF_CORE_READ(__PT_REGS_CAST(x), __PT_PARM2_REG)
+#define PT_REGS_PARM3_CORE(x) BPF_CORE_READ(__PT_REGS_CAST(x), __PT_PARM3_REG)
+#define PT_REGS_PARM4_CORE(x) BPF_CORE_READ(__PT_REGS_CAST(x), __PT_PARM4_REG)
+#define PT_REGS_PARM5_CORE(x) BPF_CORE_READ(__PT_REGS_CAST(x), __PT_PARM5_REG)
+#define PT_REGS_RET_CORE(x) BPF_CORE_READ(__PT_REGS_CAST(x), __PT_RET_REG)
+#define PT_REGS_FP_CORE(x) BPF_CORE_READ(__PT_REGS_CAST(x), __PT_FP_REG)
+#define PT_REGS_RC_CORE(x) BPF_CORE_READ(__PT_REGS_CAST(x), __PT_RC_REG)
+#define PT_REGS_SP_CORE(x) BPF_CORE_READ(__PT_REGS_CAST(x), __PT_SP_REG)
+#define PT_REGS_IP_CORE(x) BPF_CORE_READ(__PT_REGS_CAST(x), __PT_IP_REG)
+
+#if defined(bpf_target_powerpc)
+
+#define BPF_KPROBE_READ_RET_IP(ip, ctx) ({ (ip) = (ctx)->link; })
+#define BPF_KRETPROBE_READ_RET_IP BPF_KPROBE_READ_RET_IP
+
+#elif defined(bpf_target_sparc)
+
+#define BPF_KPROBE_READ_RET_IP(ip, ctx) ({ (ip) = PT_REGS_RET(ctx); })
+#define BPF_KRETPROBE_READ_RET_IP BPF_KPROBE_READ_RET_IP
+
+#else
+
+#define BPF_KPROBE_READ_RET_IP(ip, ctx) \
+ ({ bpf_probe_read_kernel(&(ip), sizeof(ip), (void *)PT_REGS_RET(ctx)); })
+#define BPF_KRETPROBE_READ_RET_IP(ip, ctx) \
+ ({ bpf_probe_read_kernel(&(ip), sizeof(ip), (void *)(PT_REGS_FP(ctx) + sizeof(ip))); })
+
+#endif
+
+#ifndef PT_REGS_PARM1_SYSCALL
+#define PT_REGS_PARM1_SYSCALL(x) PT_REGS_PARM1(x)
+#endif
+#define PT_REGS_PARM2_SYSCALL(x) PT_REGS_PARM2(x)
+#define PT_REGS_PARM3_SYSCALL(x) PT_REGS_PARM3(x)
+#ifndef PT_REGS_PARM4_SYSCALL
+#define PT_REGS_PARM4_SYSCALL(x) PT_REGS_PARM4(x)
+#endif
+#define PT_REGS_PARM5_SYSCALL(x) PT_REGS_PARM5(x)
+
+#ifndef PT_REGS_PARM1_CORE_SYSCALL
+#define PT_REGS_PARM1_CORE_SYSCALL(x) PT_REGS_PARM1_CORE(x)
+#endif
+#define PT_REGS_PARM2_CORE_SYSCALL(x) PT_REGS_PARM2_CORE(x)
+#define PT_REGS_PARM3_CORE_SYSCALL(x) PT_REGS_PARM3_CORE(x)
+#ifndef PT_REGS_PARM4_CORE_SYSCALL
+#define PT_REGS_PARM4_CORE_SYSCALL(x) PT_REGS_PARM4_CORE(x)
+#endif
+#define PT_REGS_PARM5_CORE_SYSCALL(x) PT_REGS_PARM5_CORE(x)
+
+#else /* defined(bpf_target_defined) */
+
+#define PT_REGS_PARM1(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM2(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM3(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM4(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM5(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_RET(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_FP(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_RC(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_SP(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_IP(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+
+#define PT_REGS_PARM1_CORE(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM2_CORE(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM3_CORE(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM4_CORE(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM5_CORE(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_RET_CORE(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_FP_CORE(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_RC_CORE(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_SP_CORE(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_IP_CORE(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+
+#define BPF_KPROBE_READ_RET_IP(ip, ctx) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define BPF_KRETPROBE_READ_RET_IP(ip, ctx) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+
+#define PT_REGS_PARM1_SYSCALL(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM2_SYSCALL(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM3_SYSCALL(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM4_SYSCALL(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM5_SYSCALL(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+
+#define PT_REGS_PARM1_CORE_SYSCALL(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM2_CORE_SYSCALL(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM3_CORE_SYSCALL(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM4_CORE_SYSCALL(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+#define PT_REGS_PARM5_CORE_SYSCALL(x) ({ _Pragma(__BPF_TARGET_MISSING); 0l; })
+
+#endif /* defined(bpf_target_defined) */
+
+/*
+ * When invoked from a syscall handler kprobe, returns a pointer to a
+ * struct pt_regs containing syscall arguments and suitable for passing to
+ * PT_REGS_PARMn_SYSCALL() and PT_REGS_PARMn_CORE_SYSCALL().
+ */
+#ifndef PT_REGS_SYSCALL_REGS
+/* By default, assume that the arch selects ARCH_HAS_SYSCALL_WRAPPER. */
+#define PT_REGS_SYSCALL_REGS(ctx) ((struct pt_regs *)PT_REGS_PARM1(ctx))
+#endif
+
+#ifndef ___bpf_concat
+#define ___bpf_concat(a, b) a ## b
+#endif
+#ifndef ___bpf_apply
+#define ___bpf_apply(fn, n) ___bpf_concat(fn, n)
+#endif
+#ifndef ___bpf_nth
+#define ___bpf_nth(_, _1, _2, _3, _4, _5, _6, _7, _8, _9, _a, _b, _c, N, ...) N
+#endif
+#ifndef ___bpf_narg
+#define ___bpf_narg(...) ___bpf_nth(_, ##__VA_ARGS__, 12, 11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0)
+#endif
+
+#define ___bpf_ctx_cast0() ctx
+#define ___bpf_ctx_cast1(x) ___bpf_ctx_cast0(), (void *)ctx[0]
+#define ___bpf_ctx_cast2(x, args...) ___bpf_ctx_cast1(args), (void *)ctx[1]
+#define ___bpf_ctx_cast3(x, args...) ___bpf_ctx_cast2(args), (void *)ctx[2]
+#define ___bpf_ctx_cast4(x, args...) ___bpf_ctx_cast3(args), (void *)ctx[3]
+#define ___bpf_ctx_cast5(x, args...) ___bpf_ctx_cast4(args), (void *)ctx[4]
+#define ___bpf_ctx_cast6(x, args...) ___bpf_ctx_cast5(args), (void *)ctx[5]
+#define ___bpf_ctx_cast7(x, args...) ___bpf_ctx_cast6(args), (void *)ctx[6]
+#define ___bpf_ctx_cast8(x, args...) ___bpf_ctx_cast7(args), (void *)ctx[7]
+#define ___bpf_ctx_cast9(x, args...) ___bpf_ctx_cast8(args), (void *)ctx[8]
+#define ___bpf_ctx_cast10(x, args...) ___bpf_ctx_cast9(args), (void *)ctx[9]
+#define ___bpf_ctx_cast11(x, args...) ___bpf_ctx_cast10(args), (void *)ctx[10]
+#define ___bpf_ctx_cast12(x, args...) ___bpf_ctx_cast11(args), (void *)ctx[11]
+#define ___bpf_ctx_cast(args...) ___bpf_apply(___bpf_ctx_cast, ___bpf_narg(args))(args)
+
+/*
+ * BPF_PROG is a convenience wrapper for generic tp_btf/fentry/fexit and
+ * similar kinds of BPF programs, that accept input arguments as a single
+ * pointer to untyped u64 array, where each u64 can actually be a typed
+ * pointer or integer of different size. Instead of requring user to write
+ * manual casts and work with array elements by index, BPF_PROG macro
+ * allows user to declare a list of named and typed input arguments in the
+ * same syntax as for normal C function. All the casting is hidden and
+ * performed transparently, while user code can just assume working with
+ * function arguments of specified type and name.
+ *
+ * Original raw context argument is preserved as well as 'ctx' argument.
+ * This is useful when using BPF helpers that expect original context
+ * as one of the parameters (e.g., for bpf_perf_event_output()).
+ */
+#define BPF_PROG(name, args...) \
+name(unsigned long long *ctx); \
+static __always_inline typeof(name(0)) \
+____##name(unsigned long long *ctx, ##args); \
+typeof(name(0)) name(unsigned long long *ctx) \
+{ \
+ _Pragma("GCC diagnostic push") \
+ _Pragma("GCC diagnostic ignored \"-Wint-conversion\"") \
+ return ____##name(___bpf_ctx_cast(args)); \
+ _Pragma("GCC diagnostic pop") \
+} \
+static __always_inline typeof(name(0)) \
+____##name(unsigned long long *ctx, ##args)
+
+#ifndef ___bpf_nth2
+#define ___bpf_nth2(_, _1, _2, _3, _4, _5, _6, _7, _8, _9, _10, _11, _12, _13, \
+ _14, _15, _16, _17, _18, _19, _20, _21, _22, _23, _24, N, ...) N
+#endif
+#ifndef ___bpf_narg2
+#define ___bpf_narg2(...) \
+ ___bpf_nth2(_, ##__VA_ARGS__, 12, 12, 11, 11, 10, 10, 9, 9, 8, 8, 7, 7, \
+ 6, 6, 5, 5, 4, 4, 3, 3, 2, 2, 1, 1, 0)
+#endif
+
+#define ___bpf_treg_cnt(t) \
+ __builtin_choose_expr(sizeof(t) == 1, 1, \
+ __builtin_choose_expr(sizeof(t) == 2, 1, \
+ __builtin_choose_expr(sizeof(t) == 4, 1, \
+ __builtin_choose_expr(sizeof(t) == 8, 1, \
+ __builtin_choose_expr(sizeof(t) == 16, 2, \
+ (void)0)))))
+
+#define ___bpf_reg_cnt0() (0)
+#define ___bpf_reg_cnt1(t, x) (___bpf_reg_cnt0() + ___bpf_treg_cnt(t))
+#define ___bpf_reg_cnt2(t, x, args...) (___bpf_reg_cnt1(args) + ___bpf_treg_cnt(t))
+#define ___bpf_reg_cnt3(t, x, args...) (___bpf_reg_cnt2(args) + ___bpf_treg_cnt(t))
+#define ___bpf_reg_cnt4(t, x, args...) (___bpf_reg_cnt3(args) + ___bpf_treg_cnt(t))
+#define ___bpf_reg_cnt5(t, x, args...) (___bpf_reg_cnt4(args) + ___bpf_treg_cnt(t))
+#define ___bpf_reg_cnt6(t, x, args...) (___bpf_reg_cnt5(args) + ___bpf_treg_cnt(t))
+#define ___bpf_reg_cnt7(t, x, args...) (___bpf_reg_cnt6(args) + ___bpf_treg_cnt(t))
+#define ___bpf_reg_cnt8(t, x, args...) (___bpf_reg_cnt7(args) + ___bpf_treg_cnt(t))
+#define ___bpf_reg_cnt9(t, x, args...) (___bpf_reg_cnt8(args) + ___bpf_treg_cnt(t))
+#define ___bpf_reg_cnt10(t, x, args...) (___bpf_reg_cnt9(args) + ___bpf_treg_cnt(t))
+#define ___bpf_reg_cnt11(t, x, args...) (___bpf_reg_cnt10(args) + ___bpf_treg_cnt(t))
+#define ___bpf_reg_cnt12(t, x, args...) (___bpf_reg_cnt11(args) + ___bpf_treg_cnt(t))
+#define ___bpf_reg_cnt(args...) ___bpf_apply(___bpf_reg_cnt, ___bpf_narg2(args))(args)
+
+#define ___bpf_union_arg(t, x, n) \
+ __builtin_choose_expr(sizeof(t) == 1, ({ union { __u8 z[1]; t x; } ___t = { .z = {ctx[n]}}; ___t.x; }), \
+ __builtin_choose_expr(sizeof(t) == 2, ({ union { __u16 z[1]; t x; } ___t = { .z = {ctx[n]} }; ___t.x; }), \
+ __builtin_choose_expr(sizeof(t) == 4, ({ union { __u32 z[1]; t x; } ___t = { .z = {ctx[n]} }; ___t.x; }), \
+ __builtin_choose_expr(sizeof(t) == 8, ({ union { __u64 z[1]; t x; } ___t = {.z = {ctx[n]} }; ___t.x; }), \
+ __builtin_choose_expr(sizeof(t) == 16, ({ union { __u64 z[2]; t x; } ___t = {.z = {ctx[n], ctx[n + 1]} }; ___t.x; }), \
+ (void)0)))))
+
+#define ___bpf_ctx_arg0(n, args...)
+#define ___bpf_ctx_arg1(n, t, x) , ___bpf_union_arg(t, x, n - ___bpf_reg_cnt1(t, x))
+#define ___bpf_ctx_arg2(n, t, x, args...) , ___bpf_union_arg(t, x, n - ___bpf_reg_cnt2(t, x, args)) ___bpf_ctx_arg1(n, args)
+#define ___bpf_ctx_arg3(n, t, x, args...) , ___bpf_union_arg(t, x, n - ___bpf_reg_cnt3(t, x, args)) ___bpf_ctx_arg2(n, args)
+#define ___bpf_ctx_arg4(n, t, x, args...) , ___bpf_union_arg(t, x, n - ___bpf_reg_cnt4(t, x, args)) ___bpf_ctx_arg3(n, args)
+#define ___bpf_ctx_arg5(n, t, x, args...) , ___bpf_union_arg(t, x, n - ___bpf_reg_cnt5(t, x, args)) ___bpf_ctx_arg4(n, args)
+#define ___bpf_ctx_arg6(n, t, x, args...) , ___bpf_union_arg(t, x, n - ___bpf_reg_cnt6(t, x, args)) ___bpf_ctx_arg5(n, args)
+#define ___bpf_ctx_arg7(n, t, x, args...) , ___bpf_union_arg(t, x, n - ___bpf_reg_cnt7(t, x, args)) ___bpf_ctx_arg6(n, args)
+#define ___bpf_ctx_arg8(n, t, x, args...) , ___bpf_union_arg(t, x, n - ___bpf_reg_cnt8(t, x, args)) ___bpf_ctx_arg7(n, args)
+#define ___bpf_ctx_arg9(n, t, x, args...) , ___bpf_union_arg(t, x, n - ___bpf_reg_cnt9(t, x, args)) ___bpf_ctx_arg8(n, args)
+#define ___bpf_ctx_arg10(n, t, x, args...) , ___bpf_union_arg(t, x, n - ___bpf_reg_cnt10(t, x, args)) ___bpf_ctx_arg9(n, args)
+#define ___bpf_ctx_arg11(n, t, x, args...) , ___bpf_union_arg(t, x, n - ___bpf_reg_cnt11(t, x, args)) ___bpf_ctx_arg10(n, args)
+#define ___bpf_ctx_arg12(n, t, x, args...) , ___bpf_union_arg(t, x, n - ___bpf_reg_cnt12(t, x, args)) ___bpf_ctx_arg11(n, args)
+#define ___bpf_ctx_arg(args...) ___bpf_apply(___bpf_ctx_arg, ___bpf_narg2(args))(___bpf_reg_cnt(args), args)
+
+#define ___bpf_ctx_decl0()
+#define ___bpf_ctx_decl1(t, x) , t x
+#define ___bpf_ctx_decl2(t, x, args...) , t x ___bpf_ctx_decl1(args)
+#define ___bpf_ctx_decl3(t, x, args...) , t x ___bpf_ctx_decl2(args)
+#define ___bpf_ctx_decl4(t, x, args...) , t x ___bpf_ctx_decl3(args)
+#define ___bpf_ctx_decl5(t, x, args...) , t x ___bpf_ctx_decl4(args)
+#define ___bpf_ctx_decl6(t, x, args...) , t x ___bpf_ctx_decl5(args)
+#define ___bpf_ctx_decl7(t, x, args...) , t x ___bpf_ctx_decl6(args)
+#define ___bpf_ctx_decl8(t, x, args...) , t x ___bpf_ctx_decl7(args)
+#define ___bpf_ctx_decl9(t, x, args...) , t x ___bpf_ctx_decl8(args)
+#define ___bpf_ctx_decl10(t, x, args...) , t x ___bpf_ctx_decl9(args)
+#define ___bpf_ctx_decl11(t, x, args...) , t x ___bpf_ctx_decl10(args)
+#define ___bpf_ctx_decl12(t, x, args...) , t x ___bpf_ctx_decl11(args)
+#define ___bpf_ctx_decl(args...) ___bpf_apply(___bpf_ctx_decl, ___bpf_narg2(args))(args)
+
+/*
+ * BPF_PROG2 is an enhanced version of BPF_PROG in order to handle struct
+ * arguments. Since each struct argument might take one or two u64 values
+ * in the trampoline stack, argument type size is needed to place proper number
+ * of u64 values for each argument. Therefore, BPF_PROG2 has different
+ * syntax from BPF_PROG. For example, for the following BPF_PROG syntax:
+ *
+ * int BPF_PROG(test2, int a, int b) { ... }
+ *
+ * the corresponding BPF_PROG2 syntax is:
+ *
+ * int BPF_PROG2(test2, int, a, int, b) { ... }
+ *
+ * where type and the corresponding argument name are separated by comma.
+ *
+ * Use BPF_PROG2 macro if one of the arguments might be a struct/union larger
+ * than 8 bytes:
+ *
+ * int BPF_PROG2(test_struct_arg, struct bpf_testmod_struct_arg_1, a, int, b,
+ * int, c, int, d, struct bpf_testmod_struct_arg_2, e, int, ret)
+ * {
+ * // access a, b, c, d, e, and ret directly
+ * ...
+ * }
+ */
+#define BPF_PROG2(name, args...) \
+name(unsigned long long *ctx); \
+static __always_inline typeof(name(0)) \
+____##name(unsigned long long *ctx ___bpf_ctx_decl(args)); \
+typeof(name(0)) name(unsigned long long *ctx) \
+{ \
+ return ____##name(ctx ___bpf_ctx_arg(args)); \
+} \
+static __always_inline typeof(name(0)) \
+____##name(unsigned long long *ctx ___bpf_ctx_decl(args))
+
+struct pt_regs;
+
+#define ___bpf_kprobe_args0() ctx
+#define ___bpf_kprobe_args1(x) ___bpf_kprobe_args0(), (void *)PT_REGS_PARM1(ctx)
+#define ___bpf_kprobe_args2(x, args...) ___bpf_kprobe_args1(args), (void *)PT_REGS_PARM2(ctx)
+#define ___bpf_kprobe_args3(x, args...) ___bpf_kprobe_args2(args), (void *)PT_REGS_PARM3(ctx)
+#define ___bpf_kprobe_args4(x, args...) ___bpf_kprobe_args3(args), (void *)PT_REGS_PARM4(ctx)
+#define ___bpf_kprobe_args5(x, args...) ___bpf_kprobe_args4(args), (void *)PT_REGS_PARM5(ctx)
+#define ___bpf_kprobe_args(args...) ___bpf_apply(___bpf_kprobe_args, ___bpf_narg(args))(args)
+
+/*
+ * BPF_KPROBE serves the same purpose for kprobes as BPF_PROG for
+ * tp_btf/fentry/fexit BPF programs. It hides the underlying platform-specific
+ * low-level way of getting kprobe input arguments from struct pt_regs, and
+ * provides a familiar typed and named function arguments syntax and
+ * semantics of accessing kprobe input paremeters.
+ *
+ * Original struct pt_regs* context is preserved as 'ctx' argument. This might
+ * be necessary when using BPF helpers like bpf_perf_event_output().
+ */
+#define BPF_KPROBE(name, args...) \
+name(struct pt_regs *ctx); \
+static __always_inline typeof(name(0)) \
+____##name(struct pt_regs *ctx, ##args); \
+typeof(name(0)) name(struct pt_regs *ctx) \
+{ \
+ _Pragma("GCC diagnostic push") \
+ _Pragma("GCC diagnostic ignored \"-Wint-conversion\"") \
+ return ____##name(___bpf_kprobe_args(args)); \
+ _Pragma("GCC diagnostic pop") \
+} \
+static __always_inline typeof(name(0)) \
+____##name(struct pt_regs *ctx, ##args)
+
+#define ___bpf_kretprobe_args0() ctx
+#define ___bpf_kretprobe_args1(x) ___bpf_kretprobe_args0(), (void *)PT_REGS_RC(ctx)
+#define ___bpf_kretprobe_args(args...) ___bpf_apply(___bpf_kretprobe_args, ___bpf_narg(args))(args)
+
+/*
+ * BPF_KRETPROBE is similar to BPF_KPROBE, except, it only provides optional
+ * return value (in addition to `struct pt_regs *ctx`), but no input
+ * arguments, because they will be clobbered by the time probed function
+ * returns.
+ */
+#define BPF_KRETPROBE(name, args...) \
+name(struct pt_regs *ctx); \
+static __always_inline typeof(name(0)) \
+____##name(struct pt_regs *ctx, ##args); \
+typeof(name(0)) name(struct pt_regs *ctx) \
+{ \
+ _Pragma("GCC diagnostic push") \
+ _Pragma("GCC diagnostic ignored \"-Wint-conversion\"") \
+ return ____##name(___bpf_kretprobe_args(args)); \
+ _Pragma("GCC diagnostic pop") \
+} \
+static __always_inline typeof(name(0)) ____##name(struct pt_regs *ctx, ##args)
+
+/* If kernel has CONFIG_ARCH_HAS_SYSCALL_WRAPPER, read pt_regs directly */
+#define ___bpf_syscall_args0() ctx
+#define ___bpf_syscall_args1(x) ___bpf_syscall_args0(), (void *)PT_REGS_PARM1_SYSCALL(regs)
+#define ___bpf_syscall_args2(x, args...) ___bpf_syscall_args1(args), (void *)PT_REGS_PARM2_SYSCALL(regs)
+#define ___bpf_syscall_args3(x, args...) ___bpf_syscall_args2(args), (void *)PT_REGS_PARM3_SYSCALL(regs)
+#define ___bpf_syscall_args4(x, args...) ___bpf_syscall_args3(args), (void *)PT_REGS_PARM4_SYSCALL(regs)
+#define ___bpf_syscall_args5(x, args...) ___bpf_syscall_args4(args), (void *)PT_REGS_PARM5_SYSCALL(regs)
+#define ___bpf_syscall_args(args...) ___bpf_apply(___bpf_syscall_args, ___bpf_narg(args))(args)
+
+/* If kernel doesn't have CONFIG_ARCH_HAS_SYSCALL_WRAPPER, we have to BPF_CORE_READ from pt_regs */
+#define ___bpf_syswrap_args0() ctx
+#define ___bpf_syswrap_args1(x) ___bpf_syswrap_args0(), (void *)PT_REGS_PARM1_CORE_SYSCALL(regs)
+#define ___bpf_syswrap_args2(x, args...) ___bpf_syswrap_args1(args), (void *)PT_REGS_PARM2_CORE_SYSCALL(regs)
+#define ___bpf_syswrap_args3(x, args...) ___bpf_syswrap_args2(args), (void *)PT_REGS_PARM3_CORE_SYSCALL(regs)
+#define ___bpf_syswrap_args4(x, args...) ___bpf_syswrap_args3(args), (void *)PT_REGS_PARM4_CORE_SYSCALL(regs)
+#define ___bpf_syswrap_args5(x, args...) ___bpf_syswrap_args4(args), (void *)PT_REGS_PARM5_CORE_SYSCALL(regs)
+#define ___bpf_syswrap_args(args...) ___bpf_apply(___bpf_syswrap_args, ___bpf_narg(args))(args)
+
+/*
+ * BPF_KSYSCALL is a variant of BPF_KPROBE, which is intended for
+ * tracing syscall functions, like __x64_sys_close. It hides the underlying
+ * platform-specific low-level way of getting syscall input arguments from
+ * struct pt_regs, and provides a familiar typed and named function arguments
+ * syntax and semantics of accessing syscall input parameters.
+ *
+ * Original struct pt_regs * context is preserved as 'ctx' argument. This might
+ * be necessary when using BPF helpers like bpf_perf_event_output().
+ *
+ * At the moment BPF_KSYSCALL does not transparently handle all the calling
+ * convention quirks for the following syscalls:
+ *
+ * - mmap(): __ARCH_WANT_SYS_OLD_MMAP.
+ * - clone(): CONFIG_CLONE_BACKWARDS, CONFIG_CLONE_BACKWARDS2 and
+ * CONFIG_CLONE_BACKWARDS3.
+ * - socket-related syscalls: __ARCH_WANT_SYS_SOCKETCALL.
+ * - compat syscalls.
+ *
+ * This may or may not change in the future. User needs to take extra measures
+ * to handle such quirks explicitly, if necessary.
+ *
+ * This macro relies on BPF CO-RE support and virtual __kconfig externs.
+ */
+#define BPF_KSYSCALL(name, args...) \
+name(struct pt_regs *ctx); \
+extern _Bool LINUX_HAS_SYSCALL_WRAPPER __kconfig; \
+static __always_inline typeof(name(0)) \
+____##name(struct pt_regs *ctx, ##args); \
+typeof(name(0)) name(struct pt_regs *ctx) \
+{ \
+ struct pt_regs *regs = LINUX_HAS_SYSCALL_WRAPPER \
+ ? (struct pt_regs *)PT_REGS_PARM1(ctx) \
+ : ctx; \
+ _Pragma("GCC diagnostic push") \
+ _Pragma("GCC diagnostic ignored \"-Wint-conversion\"") \
+ if (LINUX_HAS_SYSCALL_WRAPPER) \
+ return ____##name(___bpf_syswrap_args(args)); \
+ else \
+ return ____##name(___bpf_syscall_args(args)); \
+ _Pragma("GCC diagnostic pop") \
+} \
+static __always_inline typeof(name(0)) \
+____##name(struct pt_regs *ctx, ##args)
+
+#define BPF_KPROBE_SYSCALL BPF_KSYSCALL
+
+#endif
diff --git a/src/btf.c b/src/btf.c
new file mode 100644
index 0000000..b032500
--- /dev/null
+++ b/src/btf.c
@@ -0,0 +1,5027 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+/* Copyright (c) 2018 Facebook */
+
+#include <byteswap.h>
+#include <endian.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <fcntl.h>
+#include <unistd.h>
+#include <errno.h>
+#include <sys/utsname.h>
+#include <sys/param.h>
+#include <sys/stat.h>
+#include <linux/kernel.h>
+#include <linux/err.h>
+#include <linux/btf.h>
+#include <gelf.h>
+#include "btf.h"
+#include "bpf.h"
+#include "libbpf.h"
+#include "libbpf_internal.h"
+#include "hashmap.h"
+#include "strset.h"
+
+#define BTF_MAX_NR_TYPES 0x7fffffffU
+#define BTF_MAX_STR_OFFSET 0x7fffffffU
+
+static struct btf_type btf_void;
+
+struct btf {
+ /* raw BTF data in native endianness */
+ void *raw_data;
+ /* raw BTF data in non-native endianness */
+ void *raw_data_swapped;
+ __u32 raw_size;
+ /* whether target endianness differs from the native one */
+ bool swapped_endian;
+
+ /*
+ * When BTF is loaded from an ELF or raw memory it is stored
+ * in a contiguous memory block. The hdr, type_data, and, strs_data
+ * point inside that memory region to their respective parts of BTF
+ * representation:
+ *
+ * +--------------------------------+
+ * | Header | Types | Strings |
+ * +--------------------------------+
+ * ^ ^ ^
+ * | | |
+ * hdr | |
+ * types_data-+ |
+ * strs_data------------+
+ *
+ * If BTF data is later modified, e.g., due to types added or
+ * removed, BTF deduplication performed, etc, this contiguous
+ * representation is broken up into three independently allocated
+ * memory regions to be able to modify them independently.
+ * raw_data is nulled out at that point, but can be later allocated
+ * and cached again if user calls btf__raw_data(), at which point
+ * raw_data will contain a contiguous copy of header, types, and
+ * strings:
+ *
+ * +----------+ +---------+ +-----------+
+ * | Header | | Types | | Strings |
+ * +----------+ +---------+ +-----------+
+ * ^ ^ ^
+ * | | |
+ * hdr | |
+ * types_data----+ |
+ * strset__data(strs_set)-----+
+ *
+ * +----------+---------+-----------+
+ * | Header | Types | Strings |
+ * raw_data----->+----------+---------+-----------+
+ */
+ struct btf_header *hdr;
+
+ void *types_data;
+ size_t types_data_cap; /* used size stored in hdr->type_len */
+
+ /* type ID to `struct btf_type *` lookup index
+ * type_offs[0] corresponds to the first non-VOID type:
+ * - for base BTF it's type [1];
+ * - for split BTF it's the first non-base BTF type.
+ */
+ __u32 *type_offs;
+ size_t type_offs_cap;
+ /* number of types in this BTF instance:
+ * - doesn't include special [0] void type;
+ * - for split BTF counts number of types added on top of base BTF.
+ */
+ __u32 nr_types;
+ /* if not NULL, points to the base BTF on top of which the current
+ * split BTF is based
+ */
+ struct btf *base_btf;
+ /* BTF type ID of the first type in this BTF instance:
+ * - for base BTF it's equal to 1;
+ * - for split BTF it's equal to biggest type ID of base BTF plus 1.
+ */
+ int start_id;
+ /* logical string offset of this BTF instance:
+ * - for base BTF it's equal to 0;
+ * - for split BTF it's equal to total size of base BTF's string section size.
+ */
+ int start_str_off;
+
+ /* only one of strs_data or strs_set can be non-NULL, depending on
+ * whether BTF is in a modifiable state (strs_set is used) or not
+ * (strs_data points inside raw_data)
+ */
+ void *strs_data;
+ /* a set of unique strings */
+ struct strset *strs_set;
+ /* whether strings are already deduplicated */
+ bool strs_deduped;
+
+ /* BTF object FD, if loaded into kernel */
+ int fd;
+
+ /* Pointer size (in bytes) for a target architecture of this BTF */
+ int ptr_sz;
+};
+
+static inline __u64 ptr_to_u64(const void *ptr)
+{
+ return (__u64) (unsigned long) ptr;
+}
+
+/* Ensure given dynamically allocated memory region pointed to by *data* with
+ * capacity of *cap_cnt* elements each taking *elem_sz* bytes has enough
+ * memory to accommodate *add_cnt* new elements, assuming *cur_cnt* elements
+ * are already used. At most *max_cnt* elements can be ever allocated.
+ * If necessary, memory is reallocated and all existing data is copied over,
+ * new pointer to the memory region is stored at *data, new memory region
+ * capacity (in number of elements) is stored in *cap.
+ * On success, memory pointer to the beginning of unused memory is returned.
+ * On error, NULL is returned.
+ */
+void *libbpf_add_mem(void **data, size_t *cap_cnt, size_t elem_sz,
+ size_t cur_cnt, size_t max_cnt, size_t add_cnt)
+{
+ size_t new_cnt;
+ void *new_data;
+
+ if (cur_cnt + add_cnt <= *cap_cnt)
+ return *data + cur_cnt * elem_sz;
+
+ /* requested more than the set limit */
+ if (cur_cnt + add_cnt > max_cnt)
+ return NULL;
+
+ new_cnt = *cap_cnt;
+ new_cnt += new_cnt / 4; /* expand by 25% */
+ if (new_cnt < 16) /* but at least 16 elements */
+ new_cnt = 16;
+ if (new_cnt > max_cnt) /* but not exceeding a set limit */
+ new_cnt = max_cnt;
+ if (new_cnt < cur_cnt + add_cnt) /* also ensure we have enough memory */
+ new_cnt = cur_cnt + add_cnt;
+
+ new_data = libbpf_reallocarray(*data, new_cnt, elem_sz);
+ if (!new_data)
+ return NULL;
+
+ /* zero out newly allocated portion of memory */
+ memset(new_data + (*cap_cnt) * elem_sz, 0, (new_cnt - *cap_cnt) * elem_sz);
+
+ *data = new_data;
+ *cap_cnt = new_cnt;
+ return new_data + cur_cnt * elem_sz;
+}
+
+/* Ensure given dynamically allocated memory region has enough allocated space
+ * to accommodate *need_cnt* elements of size *elem_sz* bytes each
+ */
+int libbpf_ensure_mem(void **data, size_t *cap_cnt, size_t elem_sz, size_t need_cnt)
+{
+ void *p;
+
+ if (need_cnt <= *cap_cnt)
+ return 0;
+
+ p = libbpf_add_mem(data, cap_cnt, elem_sz, *cap_cnt, SIZE_MAX, need_cnt - *cap_cnt);
+ if (!p)
+ return -ENOMEM;
+
+ return 0;
+}
+
+static void *btf_add_type_offs_mem(struct btf *btf, size_t add_cnt)
+{
+ return libbpf_add_mem((void **)&btf->type_offs, &btf->type_offs_cap, sizeof(__u32),
+ btf->nr_types, BTF_MAX_NR_TYPES, add_cnt);
+}
+
+static int btf_add_type_idx_entry(struct btf *btf, __u32 type_off)
+{
+ __u32 *p;
+
+ p = btf_add_type_offs_mem(btf, 1);
+ if (!p)
+ return -ENOMEM;
+
+ *p = type_off;
+ return 0;
+}
+
+static void btf_bswap_hdr(struct btf_header *h)
+{
+ h->magic = bswap_16(h->magic);
+ h->hdr_len = bswap_32(h->hdr_len);
+ h->type_off = bswap_32(h->type_off);
+ h->type_len = bswap_32(h->type_len);
+ h->str_off = bswap_32(h->str_off);
+ h->str_len = bswap_32(h->str_len);
+}
+
+static int btf_parse_hdr(struct btf *btf)
+{
+ struct btf_header *hdr = btf->hdr;
+ __u32 meta_left;
+
+ if (btf->raw_size < sizeof(struct btf_header)) {
+ pr_debug("BTF header not found\n");
+ return -EINVAL;
+ }
+
+ if (hdr->magic == bswap_16(BTF_MAGIC)) {
+ btf->swapped_endian = true;
+ if (bswap_32(hdr->hdr_len) != sizeof(struct btf_header)) {
+ pr_warn("Can't load BTF with non-native endianness due to unsupported header length %u\n",
+ bswap_32(hdr->hdr_len));
+ return -ENOTSUP;
+ }
+ btf_bswap_hdr(hdr);
+ } else if (hdr->magic != BTF_MAGIC) {
+ pr_debug("Invalid BTF magic: %x\n", hdr->magic);
+ return -EINVAL;
+ }
+
+ if (btf->raw_size < hdr->hdr_len) {
+ pr_debug("BTF header len %u larger than data size %u\n",
+ hdr->hdr_len, btf->raw_size);
+ return -EINVAL;
+ }
+
+ meta_left = btf->raw_size - hdr->hdr_len;
+ if (meta_left < (long long)hdr->str_off + hdr->str_len) {
+ pr_debug("Invalid BTF total size: %u\n", btf->raw_size);
+ return -EINVAL;
+ }
+
+ if ((long long)hdr->type_off + hdr->type_len > hdr->str_off) {
+ pr_debug("Invalid BTF data sections layout: type data at %u + %u, strings data at %u + %u\n",
+ hdr->type_off, hdr->type_len, hdr->str_off, hdr->str_len);
+ return -EINVAL;
+ }
+
+ if (hdr->type_off % 4) {
+ pr_debug("BTF type section is not aligned to 4 bytes\n");
+ return -EINVAL;
+ }
+
+ return 0;
+}
+
+static int btf_parse_str_sec(struct btf *btf)
+{
+ const struct btf_header *hdr = btf->hdr;
+ const char *start = btf->strs_data;
+ const char *end = start + btf->hdr->str_len;
+
+ if (btf->base_btf && hdr->str_len == 0)
+ return 0;
+ if (!hdr->str_len || hdr->str_len - 1 > BTF_MAX_STR_OFFSET || end[-1]) {
+ pr_debug("Invalid BTF string section\n");
+ return -EINVAL;
+ }
+ if (!btf->base_btf && start[0]) {
+ pr_debug("Invalid BTF string section\n");
+ return -EINVAL;
+ }
+ return 0;
+}
+
+static int btf_type_size(const struct btf_type *t)
+{
+ const int base_size = sizeof(struct btf_type);
+ __u16 vlen = btf_vlen(t);
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_FWD:
+ case BTF_KIND_CONST:
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_RESTRICT:
+ case BTF_KIND_PTR:
+ case BTF_KIND_TYPEDEF:
+ case BTF_KIND_FUNC:
+ case BTF_KIND_FLOAT:
+ case BTF_KIND_TYPE_TAG:
+ return base_size;
+ case BTF_KIND_INT:
+ return base_size + sizeof(__u32);
+ case BTF_KIND_ENUM:
+ return base_size + vlen * sizeof(struct btf_enum);
+ case BTF_KIND_ENUM64:
+ return base_size + vlen * sizeof(struct btf_enum64);
+ case BTF_KIND_ARRAY:
+ return base_size + sizeof(struct btf_array);
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION:
+ return base_size + vlen * sizeof(struct btf_member);
+ case BTF_KIND_FUNC_PROTO:
+ return base_size + vlen * sizeof(struct btf_param);
+ case BTF_KIND_VAR:
+ return base_size + sizeof(struct btf_var);
+ case BTF_KIND_DATASEC:
+ return base_size + vlen * sizeof(struct btf_var_secinfo);
+ case BTF_KIND_DECL_TAG:
+ return base_size + sizeof(struct btf_decl_tag);
+ default:
+ pr_debug("Unsupported BTF_KIND:%u\n", btf_kind(t));
+ return -EINVAL;
+ }
+}
+
+static void btf_bswap_type_base(struct btf_type *t)
+{
+ t->name_off = bswap_32(t->name_off);
+ t->info = bswap_32(t->info);
+ t->type = bswap_32(t->type);
+}
+
+static int btf_bswap_type_rest(struct btf_type *t)
+{
+ struct btf_var_secinfo *v;
+ struct btf_enum64 *e64;
+ struct btf_member *m;
+ struct btf_array *a;
+ struct btf_param *p;
+ struct btf_enum *e;
+ __u16 vlen = btf_vlen(t);
+ int i;
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_FWD:
+ case BTF_KIND_CONST:
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_RESTRICT:
+ case BTF_KIND_PTR:
+ case BTF_KIND_TYPEDEF:
+ case BTF_KIND_FUNC:
+ case BTF_KIND_FLOAT:
+ case BTF_KIND_TYPE_TAG:
+ return 0;
+ case BTF_KIND_INT:
+ *(__u32 *)(t + 1) = bswap_32(*(__u32 *)(t + 1));
+ return 0;
+ case BTF_KIND_ENUM:
+ for (i = 0, e = btf_enum(t); i < vlen; i++, e++) {
+ e->name_off = bswap_32(e->name_off);
+ e->val = bswap_32(e->val);
+ }
+ return 0;
+ case BTF_KIND_ENUM64:
+ for (i = 0, e64 = btf_enum64(t); i < vlen; i++, e64++) {
+ e64->name_off = bswap_32(e64->name_off);
+ e64->val_lo32 = bswap_32(e64->val_lo32);
+ e64->val_hi32 = bswap_32(e64->val_hi32);
+ }
+ return 0;
+ case BTF_KIND_ARRAY:
+ a = btf_array(t);
+ a->type = bswap_32(a->type);
+ a->index_type = bswap_32(a->index_type);
+ a->nelems = bswap_32(a->nelems);
+ return 0;
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION:
+ for (i = 0, m = btf_members(t); i < vlen; i++, m++) {
+ m->name_off = bswap_32(m->name_off);
+ m->type = bswap_32(m->type);
+ m->offset = bswap_32(m->offset);
+ }
+ return 0;
+ case BTF_KIND_FUNC_PROTO:
+ for (i = 0, p = btf_params(t); i < vlen; i++, p++) {
+ p->name_off = bswap_32(p->name_off);
+ p->type = bswap_32(p->type);
+ }
+ return 0;
+ case BTF_KIND_VAR:
+ btf_var(t)->linkage = bswap_32(btf_var(t)->linkage);
+ return 0;
+ case BTF_KIND_DATASEC:
+ for (i = 0, v = btf_var_secinfos(t); i < vlen; i++, v++) {
+ v->type = bswap_32(v->type);
+ v->offset = bswap_32(v->offset);
+ v->size = bswap_32(v->size);
+ }
+ return 0;
+ case BTF_KIND_DECL_TAG:
+ btf_decl_tag(t)->component_idx = bswap_32(btf_decl_tag(t)->component_idx);
+ return 0;
+ default:
+ pr_debug("Unsupported BTF_KIND:%u\n", btf_kind(t));
+ return -EINVAL;
+ }
+}
+
+static int btf_parse_type_sec(struct btf *btf)
+{
+ struct btf_header *hdr = btf->hdr;
+ void *next_type = btf->types_data;
+ void *end_type = next_type + hdr->type_len;
+ int err, type_size;
+
+ while (next_type + sizeof(struct btf_type) <= end_type) {
+ if (btf->swapped_endian)
+ btf_bswap_type_base(next_type);
+
+ type_size = btf_type_size(next_type);
+ if (type_size < 0)
+ return type_size;
+ if (next_type + type_size > end_type) {
+ pr_warn("BTF type [%d] is malformed\n", btf->start_id + btf->nr_types);
+ return -EINVAL;
+ }
+
+ if (btf->swapped_endian && btf_bswap_type_rest(next_type))
+ return -EINVAL;
+
+ err = btf_add_type_idx_entry(btf, next_type - btf->types_data);
+ if (err)
+ return err;
+
+ next_type += type_size;
+ btf->nr_types++;
+ }
+
+ if (next_type != end_type) {
+ pr_warn("BTF types data is malformed\n");
+ return -EINVAL;
+ }
+
+ return 0;
+}
+
+__u32 btf__type_cnt(const struct btf *btf)
+{
+ return btf->start_id + btf->nr_types;
+}
+
+const struct btf *btf__base_btf(const struct btf *btf)
+{
+ return btf->base_btf;
+}
+
+/* internal helper returning non-const pointer to a type */
+struct btf_type *btf_type_by_id(const struct btf *btf, __u32 type_id)
+{
+ if (type_id == 0)
+ return &btf_void;
+ if (type_id < btf->start_id)
+ return btf_type_by_id(btf->base_btf, type_id);
+ return btf->types_data + btf->type_offs[type_id - btf->start_id];
+}
+
+const struct btf_type *btf__type_by_id(const struct btf *btf, __u32 type_id)
+{
+ if (type_id >= btf->start_id + btf->nr_types)
+ return errno = EINVAL, NULL;
+ return btf_type_by_id((struct btf *)btf, type_id);
+}
+
+static int determine_ptr_size(const struct btf *btf)
+{
+ static const char * const long_aliases[] = {
+ "long",
+ "long int",
+ "int long",
+ "unsigned long",
+ "long unsigned",
+ "unsigned long int",
+ "unsigned int long",
+ "long unsigned int",
+ "long int unsigned",
+ "int unsigned long",
+ "int long unsigned",
+ };
+ const struct btf_type *t;
+ const char *name;
+ int i, j, n;
+
+ if (btf->base_btf && btf->base_btf->ptr_sz > 0)
+ return btf->base_btf->ptr_sz;
+
+ n = btf__type_cnt(btf);
+ for (i = 1; i < n; i++) {
+ t = btf__type_by_id(btf, i);
+ if (!btf_is_int(t))
+ continue;
+
+ if (t->size != 4 && t->size != 8)
+ continue;
+
+ name = btf__name_by_offset(btf, t->name_off);
+ if (!name)
+ continue;
+
+ for (j = 0; j < ARRAY_SIZE(long_aliases); j++) {
+ if (strcmp(name, long_aliases[j]) == 0)
+ return t->size;
+ }
+ }
+
+ return -1;
+}
+
+static size_t btf_ptr_sz(const struct btf *btf)
+{
+ if (!btf->ptr_sz)
+ ((struct btf *)btf)->ptr_sz = determine_ptr_size(btf);
+ return btf->ptr_sz < 0 ? sizeof(void *) : btf->ptr_sz;
+}
+
+/* Return pointer size this BTF instance assumes. The size is heuristically
+ * determined by looking for 'long' or 'unsigned long' integer type and
+ * recording its size in bytes. If BTF type information doesn't have any such
+ * type, this function returns 0. In the latter case, native architecture's
+ * pointer size is assumed, so will be either 4 or 8, depending on
+ * architecture that libbpf was compiled for. It's possible to override
+ * guessed value by using btf__set_pointer_size() API.
+ */
+size_t btf__pointer_size(const struct btf *btf)
+{
+ if (!btf->ptr_sz)
+ ((struct btf *)btf)->ptr_sz = determine_ptr_size(btf);
+
+ if (btf->ptr_sz < 0)
+ /* not enough BTF type info to guess */
+ return 0;
+
+ return btf->ptr_sz;
+}
+
+/* Override or set pointer size in bytes. Only values of 4 and 8 are
+ * supported.
+ */
+int btf__set_pointer_size(struct btf *btf, size_t ptr_sz)
+{
+ if (ptr_sz != 4 && ptr_sz != 8)
+ return libbpf_err(-EINVAL);
+ btf->ptr_sz = ptr_sz;
+ return 0;
+}
+
+static bool is_host_big_endian(void)
+{
+#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
+ return false;
+#elif __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
+ return true;
+#else
+# error "Unrecognized __BYTE_ORDER__"
+#endif
+}
+
+enum btf_endianness btf__endianness(const struct btf *btf)
+{
+ if (is_host_big_endian())
+ return btf->swapped_endian ? BTF_LITTLE_ENDIAN : BTF_BIG_ENDIAN;
+ else
+ return btf->swapped_endian ? BTF_BIG_ENDIAN : BTF_LITTLE_ENDIAN;
+}
+
+int btf__set_endianness(struct btf *btf, enum btf_endianness endian)
+{
+ if (endian != BTF_LITTLE_ENDIAN && endian != BTF_BIG_ENDIAN)
+ return libbpf_err(-EINVAL);
+
+ btf->swapped_endian = is_host_big_endian() != (endian == BTF_BIG_ENDIAN);
+ if (!btf->swapped_endian) {
+ free(btf->raw_data_swapped);
+ btf->raw_data_swapped = NULL;
+ }
+ return 0;
+}
+
+static bool btf_type_is_void(const struct btf_type *t)
+{
+ return t == &btf_void || btf_is_fwd(t);
+}
+
+static bool btf_type_is_void_or_null(const struct btf_type *t)
+{
+ return !t || btf_type_is_void(t);
+}
+
+#define MAX_RESOLVE_DEPTH 32
+
+__s64 btf__resolve_size(const struct btf *btf, __u32 type_id)
+{
+ const struct btf_array *array;
+ const struct btf_type *t;
+ __u32 nelems = 1;
+ __s64 size = -1;
+ int i;
+
+ t = btf__type_by_id(btf, type_id);
+ for (i = 0; i < MAX_RESOLVE_DEPTH && !btf_type_is_void_or_null(t); i++) {
+ switch (btf_kind(t)) {
+ case BTF_KIND_INT:
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION:
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ case BTF_KIND_DATASEC:
+ case BTF_KIND_FLOAT:
+ size = t->size;
+ goto done;
+ case BTF_KIND_PTR:
+ size = btf_ptr_sz(btf);
+ goto done;
+ case BTF_KIND_TYPEDEF:
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_CONST:
+ case BTF_KIND_RESTRICT:
+ case BTF_KIND_VAR:
+ case BTF_KIND_DECL_TAG:
+ case BTF_KIND_TYPE_TAG:
+ type_id = t->type;
+ break;
+ case BTF_KIND_ARRAY:
+ array = btf_array(t);
+ if (nelems && array->nelems > UINT32_MAX / nelems)
+ return libbpf_err(-E2BIG);
+ nelems *= array->nelems;
+ type_id = array->type;
+ break;
+ default:
+ return libbpf_err(-EINVAL);
+ }
+
+ t = btf__type_by_id(btf, type_id);
+ }
+
+done:
+ if (size < 0)
+ return libbpf_err(-EINVAL);
+ if (nelems && size > UINT32_MAX / nelems)
+ return libbpf_err(-E2BIG);
+
+ return nelems * size;
+}
+
+int btf__align_of(const struct btf *btf, __u32 id)
+{
+ const struct btf_type *t = btf__type_by_id(btf, id);
+ __u16 kind = btf_kind(t);
+
+ switch (kind) {
+ case BTF_KIND_INT:
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ case BTF_KIND_FLOAT:
+ return min(btf_ptr_sz(btf), (size_t)t->size);
+ case BTF_KIND_PTR:
+ return btf_ptr_sz(btf);
+ case BTF_KIND_TYPEDEF:
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_CONST:
+ case BTF_KIND_RESTRICT:
+ case BTF_KIND_TYPE_TAG:
+ return btf__align_of(btf, t->type);
+ case BTF_KIND_ARRAY:
+ return btf__align_of(btf, btf_array(t)->type);
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION: {
+ const struct btf_member *m = btf_members(t);
+ __u16 vlen = btf_vlen(t);
+ int i, max_align = 1, align;
+
+ for (i = 0; i < vlen; i++, m++) {
+ align = btf__align_of(btf, m->type);
+ if (align <= 0)
+ return libbpf_err(align);
+ max_align = max(max_align, align);
+
+ /* if field offset isn't aligned according to field
+ * type's alignment, then struct must be packed
+ */
+ if (btf_member_bitfield_size(t, i) == 0 &&
+ (m->offset % (8 * align)) != 0)
+ return 1;
+ }
+
+ /* if struct/union size isn't a multiple of its alignment,
+ * then struct must be packed
+ */
+ if ((t->size % max_align) != 0)
+ return 1;
+
+ return max_align;
+ }
+ default:
+ pr_warn("unsupported BTF_KIND:%u\n", btf_kind(t));
+ return errno = EINVAL, 0;
+ }
+}
+
+int btf__resolve_type(const struct btf *btf, __u32 type_id)
+{
+ const struct btf_type *t;
+ int depth = 0;
+
+ t = btf__type_by_id(btf, type_id);
+ while (depth < MAX_RESOLVE_DEPTH &&
+ !btf_type_is_void_or_null(t) &&
+ (btf_is_mod(t) || btf_is_typedef(t) || btf_is_var(t))) {
+ type_id = t->type;
+ t = btf__type_by_id(btf, type_id);
+ depth++;
+ }
+
+ if (depth == MAX_RESOLVE_DEPTH || btf_type_is_void_or_null(t))
+ return libbpf_err(-EINVAL);
+
+ return type_id;
+}
+
+__s32 btf__find_by_name(const struct btf *btf, const char *type_name)
+{
+ __u32 i, nr_types = btf__type_cnt(btf);
+
+ if (!strcmp(type_name, "void"))
+ return 0;
+
+ for (i = 1; i < nr_types; i++) {
+ const struct btf_type *t = btf__type_by_id(btf, i);
+ const char *name = btf__name_by_offset(btf, t->name_off);
+
+ if (name && !strcmp(type_name, name))
+ return i;
+ }
+
+ return libbpf_err(-ENOENT);
+}
+
+static __s32 btf_find_by_name_kind(const struct btf *btf, int start_id,
+ const char *type_name, __u32 kind)
+{
+ __u32 i, nr_types = btf__type_cnt(btf);
+
+ if (kind == BTF_KIND_UNKN || !strcmp(type_name, "void"))
+ return 0;
+
+ for (i = start_id; i < nr_types; i++) {
+ const struct btf_type *t = btf__type_by_id(btf, i);
+ const char *name;
+
+ if (btf_kind(t) != kind)
+ continue;
+ name = btf__name_by_offset(btf, t->name_off);
+ if (name && !strcmp(type_name, name))
+ return i;
+ }
+
+ return libbpf_err(-ENOENT);
+}
+
+__s32 btf__find_by_name_kind_own(const struct btf *btf, const char *type_name,
+ __u32 kind)
+{
+ return btf_find_by_name_kind(btf, btf->start_id, type_name, kind);
+}
+
+__s32 btf__find_by_name_kind(const struct btf *btf, const char *type_name,
+ __u32 kind)
+{
+ return btf_find_by_name_kind(btf, 1, type_name, kind);
+}
+
+static bool btf_is_modifiable(const struct btf *btf)
+{
+ return (void *)btf->hdr != btf->raw_data;
+}
+
+void btf__free(struct btf *btf)
+{
+ if (IS_ERR_OR_NULL(btf))
+ return;
+
+ if (btf->fd >= 0)
+ close(btf->fd);
+
+ if (btf_is_modifiable(btf)) {
+ /* if BTF was modified after loading, it will have a split
+ * in-memory representation for header, types, and strings
+ * sections, so we need to free all of them individually. It
+ * might still have a cached contiguous raw data present,
+ * which will be unconditionally freed below.
+ */
+ free(btf->hdr);
+ free(btf->types_data);
+ strset__free(btf->strs_set);
+ }
+ free(btf->raw_data);
+ free(btf->raw_data_swapped);
+ free(btf->type_offs);
+ free(btf);
+}
+
+static struct btf *btf_new_empty(struct btf *base_btf)
+{
+ struct btf *btf;
+
+ btf = calloc(1, sizeof(*btf));
+ if (!btf)
+ return ERR_PTR(-ENOMEM);
+
+ btf->nr_types = 0;
+ btf->start_id = 1;
+ btf->start_str_off = 0;
+ btf->fd = -1;
+ btf->ptr_sz = sizeof(void *);
+ btf->swapped_endian = false;
+
+ if (base_btf) {
+ btf->base_btf = base_btf;
+ btf->start_id = btf__type_cnt(base_btf);
+ btf->start_str_off = base_btf->hdr->str_len;
+ }
+
+ /* +1 for empty string at offset 0 */
+ btf->raw_size = sizeof(struct btf_header) + (base_btf ? 0 : 1);
+ btf->raw_data = calloc(1, btf->raw_size);
+ if (!btf->raw_data) {
+ free(btf);
+ return ERR_PTR(-ENOMEM);
+ }
+
+ btf->hdr = btf->raw_data;
+ btf->hdr->hdr_len = sizeof(struct btf_header);
+ btf->hdr->magic = BTF_MAGIC;
+ btf->hdr->version = BTF_VERSION;
+
+ btf->types_data = btf->raw_data + btf->hdr->hdr_len;
+ btf->strs_data = btf->raw_data + btf->hdr->hdr_len;
+ btf->hdr->str_len = base_btf ? 0 : 1; /* empty string at offset 0 */
+
+ return btf;
+}
+
+struct btf *btf__new_empty(void)
+{
+ return libbpf_ptr(btf_new_empty(NULL));
+}
+
+struct btf *btf__new_empty_split(struct btf *base_btf)
+{
+ return libbpf_ptr(btf_new_empty(base_btf));
+}
+
+static struct btf *btf_new(const void *data, __u32 size, struct btf *base_btf)
+{
+ struct btf *btf;
+ int err;
+
+ btf = calloc(1, sizeof(struct btf));
+ if (!btf)
+ return ERR_PTR(-ENOMEM);
+
+ btf->nr_types = 0;
+ btf->start_id = 1;
+ btf->start_str_off = 0;
+ btf->fd = -1;
+
+ if (base_btf) {
+ btf->base_btf = base_btf;
+ btf->start_id = btf__type_cnt(base_btf);
+ btf->start_str_off = base_btf->hdr->str_len;
+ }
+
+ btf->raw_data = malloc(size);
+ if (!btf->raw_data) {
+ err = -ENOMEM;
+ goto done;
+ }
+ memcpy(btf->raw_data, data, size);
+ btf->raw_size = size;
+
+ btf->hdr = btf->raw_data;
+ err = btf_parse_hdr(btf);
+ if (err)
+ goto done;
+
+ btf->strs_data = btf->raw_data + btf->hdr->hdr_len + btf->hdr->str_off;
+ btf->types_data = btf->raw_data + btf->hdr->hdr_len + btf->hdr->type_off;
+
+ err = btf_parse_str_sec(btf);
+ err = err ?: btf_parse_type_sec(btf);
+ if (err)
+ goto done;
+
+done:
+ if (err) {
+ btf__free(btf);
+ return ERR_PTR(err);
+ }
+
+ return btf;
+}
+
+struct btf *btf__new(const void *data, __u32 size)
+{
+ return libbpf_ptr(btf_new(data, size, NULL));
+}
+
+static struct btf *btf_parse_elf(const char *path, struct btf *base_btf,
+ struct btf_ext **btf_ext)
+{
+ Elf_Data *btf_data = NULL, *btf_ext_data = NULL;
+ int err = 0, fd = -1, idx = 0;
+ struct btf *btf = NULL;
+ Elf_Scn *scn = NULL;
+ Elf *elf = NULL;
+ GElf_Ehdr ehdr;
+ size_t shstrndx;
+
+ if (elf_version(EV_CURRENT) == EV_NONE) {
+ pr_warn("failed to init libelf for %s\n", path);
+ return ERR_PTR(-LIBBPF_ERRNO__LIBELF);
+ }
+
+ fd = open(path, O_RDONLY | O_CLOEXEC);
+ if (fd < 0) {
+ err = -errno;
+ pr_warn("failed to open %s: %s\n", path, strerror(errno));
+ return ERR_PTR(err);
+ }
+
+ err = -LIBBPF_ERRNO__FORMAT;
+
+ elf = elf_begin(fd, ELF_C_READ, NULL);
+ if (!elf) {
+ pr_warn("failed to open %s as ELF file\n", path);
+ goto done;
+ }
+ if (!gelf_getehdr(elf, &ehdr)) {
+ pr_warn("failed to get EHDR from %s\n", path);
+ goto done;
+ }
+
+ if (elf_getshdrstrndx(elf, &shstrndx)) {
+ pr_warn("failed to get section names section index for %s\n",
+ path);
+ goto done;
+ }
+
+ if (!elf_rawdata(elf_getscn(elf, shstrndx), NULL)) {
+ pr_warn("failed to get e_shstrndx from %s\n", path);
+ goto done;
+ }
+
+ while ((scn = elf_nextscn(elf, scn)) != NULL) {
+ GElf_Shdr sh;
+ char *name;
+
+ idx++;
+ if (gelf_getshdr(scn, &sh) != &sh) {
+ pr_warn("failed to get section(%d) header from %s\n",
+ idx, path);
+ goto done;
+ }
+ name = elf_strptr(elf, shstrndx, sh.sh_name);
+ if (!name) {
+ pr_warn("failed to get section(%d) name from %s\n",
+ idx, path);
+ goto done;
+ }
+ if (strcmp(name, BTF_ELF_SEC) == 0) {
+ btf_data = elf_getdata(scn, 0);
+ if (!btf_data) {
+ pr_warn("failed to get section(%d, %s) data from %s\n",
+ idx, name, path);
+ goto done;
+ }
+ continue;
+ } else if (btf_ext && strcmp(name, BTF_EXT_ELF_SEC) == 0) {
+ btf_ext_data = elf_getdata(scn, 0);
+ if (!btf_ext_data) {
+ pr_warn("failed to get section(%d, %s) data from %s\n",
+ idx, name, path);
+ goto done;
+ }
+ continue;
+ }
+ }
+
+ err = 0;
+
+ if (!btf_data) {
+ pr_warn("failed to find '%s' ELF section in %s\n", BTF_ELF_SEC, path);
+ err = -ENOENT;
+ goto done;
+ }
+ btf = btf_new(btf_data->d_buf, btf_data->d_size, base_btf);
+ err = libbpf_get_error(btf);
+ if (err)
+ goto done;
+
+ switch (gelf_getclass(elf)) {
+ case ELFCLASS32:
+ btf__set_pointer_size(btf, 4);
+ break;
+ case ELFCLASS64:
+ btf__set_pointer_size(btf, 8);
+ break;
+ default:
+ pr_warn("failed to get ELF class (bitness) for %s\n", path);
+ break;
+ }
+
+ if (btf_ext && btf_ext_data) {
+ *btf_ext = btf_ext__new(btf_ext_data->d_buf, btf_ext_data->d_size);
+ err = libbpf_get_error(*btf_ext);
+ if (err)
+ goto done;
+ } else if (btf_ext) {
+ *btf_ext = NULL;
+ }
+done:
+ if (elf)
+ elf_end(elf);
+ close(fd);
+
+ if (!err)
+ return btf;
+
+ if (btf_ext)
+ btf_ext__free(*btf_ext);
+ btf__free(btf);
+
+ return ERR_PTR(err);
+}
+
+struct btf *btf__parse_elf(const char *path, struct btf_ext **btf_ext)
+{
+ return libbpf_ptr(btf_parse_elf(path, NULL, btf_ext));
+}
+
+struct btf *btf__parse_elf_split(const char *path, struct btf *base_btf)
+{
+ return libbpf_ptr(btf_parse_elf(path, base_btf, NULL));
+}
+
+static struct btf *btf_parse_raw(const char *path, struct btf *base_btf)
+{
+ struct btf *btf = NULL;
+ void *data = NULL;
+ FILE *f = NULL;
+ __u16 magic;
+ int err = 0;
+ long sz;
+
+ f = fopen(path, "rb");
+ if (!f) {
+ err = -errno;
+ goto err_out;
+ }
+
+ /* check BTF magic */
+ if (fread(&magic, 1, sizeof(magic), f) < sizeof(magic)) {
+ err = -EIO;
+ goto err_out;
+ }
+ if (magic != BTF_MAGIC && magic != bswap_16(BTF_MAGIC)) {
+ /* definitely not a raw BTF */
+ err = -EPROTO;
+ goto err_out;
+ }
+
+ /* get file size */
+ if (fseek(f, 0, SEEK_END)) {
+ err = -errno;
+ goto err_out;
+ }
+ sz = ftell(f);
+ if (sz < 0) {
+ err = -errno;
+ goto err_out;
+ }
+ /* rewind to the start */
+ if (fseek(f, 0, SEEK_SET)) {
+ err = -errno;
+ goto err_out;
+ }
+
+ /* pre-alloc memory and read all of BTF data */
+ data = malloc(sz);
+ if (!data) {
+ err = -ENOMEM;
+ goto err_out;
+ }
+ if (fread(data, 1, sz, f) < sz) {
+ err = -EIO;
+ goto err_out;
+ }
+
+ /* finally parse BTF data */
+ btf = btf_new(data, sz, base_btf);
+
+err_out:
+ free(data);
+ if (f)
+ fclose(f);
+ return err ? ERR_PTR(err) : btf;
+}
+
+struct btf *btf__parse_raw(const char *path)
+{
+ return libbpf_ptr(btf_parse_raw(path, NULL));
+}
+
+struct btf *btf__parse_raw_split(const char *path, struct btf *base_btf)
+{
+ return libbpf_ptr(btf_parse_raw(path, base_btf));
+}
+
+static struct btf *btf_parse(const char *path, struct btf *base_btf, struct btf_ext **btf_ext)
+{
+ struct btf *btf;
+ int err;
+
+ if (btf_ext)
+ *btf_ext = NULL;
+
+ btf = btf_parse_raw(path, base_btf);
+ err = libbpf_get_error(btf);
+ if (!err)
+ return btf;
+ if (err != -EPROTO)
+ return ERR_PTR(err);
+ return btf_parse_elf(path, base_btf, btf_ext);
+}
+
+struct btf *btf__parse(const char *path, struct btf_ext **btf_ext)
+{
+ return libbpf_ptr(btf_parse(path, NULL, btf_ext));
+}
+
+struct btf *btf__parse_split(const char *path, struct btf *base_btf)
+{
+ return libbpf_ptr(btf_parse(path, base_btf, NULL));
+}
+
+static void *btf_get_raw_data(const struct btf *btf, __u32 *size, bool swap_endian);
+
+int btf_load_into_kernel(struct btf *btf, char *log_buf, size_t log_sz, __u32 log_level)
+{
+ LIBBPF_OPTS(bpf_btf_load_opts, opts);
+ __u32 buf_sz = 0, raw_size;
+ char *buf = NULL, *tmp;
+ void *raw_data;
+ int err = 0;
+
+ if (btf->fd >= 0)
+ return libbpf_err(-EEXIST);
+ if (log_sz && !log_buf)
+ return libbpf_err(-EINVAL);
+
+ /* cache native raw data representation */
+ raw_data = btf_get_raw_data(btf, &raw_size, false);
+ if (!raw_data) {
+ err = -ENOMEM;
+ goto done;
+ }
+ btf->raw_size = raw_size;
+ btf->raw_data = raw_data;
+
+retry_load:
+ /* if log_level is 0, we won't provide log_buf/log_size to the kernel,
+ * initially. Only if BTF loading fails, we bump log_level to 1 and
+ * retry, using either auto-allocated or custom log_buf. This way
+ * non-NULL custom log_buf provides a buffer just in case, but hopes
+ * for successful load and no need for log_buf.
+ */
+ if (log_level) {
+ /* if caller didn't provide custom log_buf, we'll keep
+ * allocating our own progressively bigger buffers for BTF
+ * verification log
+ */
+ if (!log_buf) {
+ buf_sz = max((__u32)BPF_LOG_BUF_SIZE, buf_sz * 2);
+ tmp = realloc(buf, buf_sz);
+ if (!tmp) {
+ err = -ENOMEM;
+ goto done;
+ }
+ buf = tmp;
+ buf[0] = '\0';
+ }
+
+ opts.log_buf = log_buf ? log_buf : buf;
+ opts.log_size = log_buf ? log_sz : buf_sz;
+ opts.log_level = log_level;
+ }
+
+ btf->fd = bpf_btf_load(raw_data, raw_size, &opts);
+ if (btf->fd < 0) {
+ /* time to turn on verbose mode and try again */
+ if (log_level == 0) {
+ log_level = 1;
+ goto retry_load;
+ }
+ /* only retry if caller didn't provide custom log_buf, but
+ * make sure we can never overflow buf_sz
+ */
+ if (!log_buf && errno == ENOSPC && buf_sz <= UINT_MAX / 2)
+ goto retry_load;
+
+ err = -errno;
+ pr_warn("BTF loading error: %d\n", err);
+ /* don't print out contents of custom log_buf */
+ if (!log_buf && buf[0])
+ pr_warn("-- BEGIN BTF LOAD LOG ---\n%s\n-- END BTF LOAD LOG --\n", buf);
+ }
+
+done:
+ free(buf);
+ return libbpf_err(err);
+}
+
+int btf__load_into_kernel(struct btf *btf)
+{
+ return btf_load_into_kernel(btf, NULL, 0, 0);
+}
+
+int btf__fd(const struct btf *btf)
+{
+ return btf->fd;
+}
+
+void btf__set_fd(struct btf *btf, int fd)
+{
+ btf->fd = fd;
+}
+
+static const void *btf_strs_data(const struct btf *btf)
+{
+ return btf->strs_data ? btf->strs_data : strset__data(btf->strs_set);
+}
+
+static void *btf_get_raw_data(const struct btf *btf, __u32 *size, bool swap_endian)
+{
+ struct btf_header *hdr = btf->hdr;
+ struct btf_type *t;
+ void *data, *p;
+ __u32 data_sz;
+ int i;
+
+ data = swap_endian ? btf->raw_data_swapped : btf->raw_data;
+ if (data) {
+ *size = btf->raw_size;
+ return data;
+ }
+
+ data_sz = hdr->hdr_len + hdr->type_len + hdr->str_len;
+ data = calloc(1, data_sz);
+ if (!data)
+ return NULL;
+ p = data;
+
+ memcpy(p, hdr, hdr->hdr_len);
+ if (swap_endian)
+ btf_bswap_hdr(p);
+ p += hdr->hdr_len;
+
+ memcpy(p, btf->types_data, hdr->type_len);
+ if (swap_endian) {
+ for (i = 0; i < btf->nr_types; i++) {
+ t = p + btf->type_offs[i];
+ /* btf_bswap_type_rest() relies on native t->info, so
+ * we swap base type info after we swapped all the
+ * additional information
+ */
+ if (btf_bswap_type_rest(t))
+ goto err_out;
+ btf_bswap_type_base(t);
+ }
+ }
+ p += hdr->type_len;
+
+ memcpy(p, btf_strs_data(btf), hdr->str_len);
+ p += hdr->str_len;
+
+ *size = data_sz;
+ return data;
+err_out:
+ free(data);
+ return NULL;
+}
+
+const void *btf__raw_data(const struct btf *btf_ro, __u32 *size)
+{
+ struct btf *btf = (struct btf *)btf_ro;
+ __u32 data_sz;
+ void *data;
+
+ data = btf_get_raw_data(btf, &data_sz, btf->swapped_endian);
+ if (!data)
+ return errno = ENOMEM, NULL;
+
+ btf->raw_size = data_sz;
+ if (btf->swapped_endian)
+ btf->raw_data_swapped = data;
+ else
+ btf->raw_data = data;
+ *size = data_sz;
+ return data;
+}
+
+__attribute__((alias("btf__raw_data")))
+const void *btf__get_raw_data(const struct btf *btf, __u32 *size);
+
+const char *btf__str_by_offset(const struct btf *btf, __u32 offset)
+{
+ if (offset < btf->start_str_off)
+ return btf__str_by_offset(btf->base_btf, offset);
+ else if (offset - btf->start_str_off < btf->hdr->str_len)
+ return btf_strs_data(btf) + (offset - btf->start_str_off);
+ else
+ return errno = EINVAL, NULL;
+}
+
+const char *btf__name_by_offset(const struct btf *btf, __u32 offset)
+{
+ return btf__str_by_offset(btf, offset);
+}
+
+struct btf *btf_get_from_fd(int btf_fd, struct btf *base_btf)
+{
+ struct bpf_btf_info btf_info;
+ __u32 len = sizeof(btf_info);
+ __u32 last_size;
+ struct btf *btf;
+ void *ptr;
+ int err;
+
+ /* we won't know btf_size until we call bpf_obj_get_info_by_fd(). so
+ * let's start with a sane default - 4KiB here - and resize it only if
+ * bpf_obj_get_info_by_fd() needs a bigger buffer.
+ */
+ last_size = 4096;
+ ptr = malloc(last_size);
+ if (!ptr)
+ return ERR_PTR(-ENOMEM);
+
+ memset(&btf_info, 0, sizeof(btf_info));
+ btf_info.btf = ptr_to_u64(ptr);
+ btf_info.btf_size = last_size;
+ err = bpf_obj_get_info_by_fd(btf_fd, &btf_info, &len);
+
+ if (!err && btf_info.btf_size > last_size) {
+ void *temp_ptr;
+
+ last_size = btf_info.btf_size;
+ temp_ptr = realloc(ptr, last_size);
+ if (!temp_ptr) {
+ btf = ERR_PTR(-ENOMEM);
+ goto exit_free;
+ }
+ ptr = temp_ptr;
+
+ len = sizeof(btf_info);
+ memset(&btf_info, 0, sizeof(btf_info));
+ btf_info.btf = ptr_to_u64(ptr);
+ btf_info.btf_size = last_size;
+
+ err = bpf_obj_get_info_by_fd(btf_fd, &btf_info, &len);
+ }
+
+ if (err || btf_info.btf_size > last_size) {
+ btf = err ? ERR_PTR(-errno) : ERR_PTR(-E2BIG);
+ goto exit_free;
+ }
+
+ btf = btf_new(ptr, btf_info.btf_size, base_btf);
+
+exit_free:
+ free(ptr);
+ return btf;
+}
+
+struct btf *btf__load_from_kernel_by_id_split(__u32 id, struct btf *base_btf)
+{
+ struct btf *btf;
+ int btf_fd;
+
+ btf_fd = bpf_btf_get_fd_by_id(id);
+ if (btf_fd < 0)
+ return libbpf_err_ptr(-errno);
+
+ btf = btf_get_from_fd(btf_fd, base_btf);
+ close(btf_fd);
+
+ return libbpf_ptr(btf);
+}
+
+struct btf *btf__load_from_kernel_by_id(__u32 id)
+{
+ return btf__load_from_kernel_by_id_split(id, NULL);
+}
+
+static void btf_invalidate_raw_data(struct btf *btf)
+{
+ if (btf->raw_data) {
+ free(btf->raw_data);
+ btf->raw_data = NULL;
+ }
+ if (btf->raw_data_swapped) {
+ free(btf->raw_data_swapped);
+ btf->raw_data_swapped = NULL;
+ }
+}
+
+/* Ensure BTF is ready to be modified (by splitting into a three memory
+ * regions for header, types, and strings). Also invalidate cached
+ * raw_data, if any.
+ */
+static int btf_ensure_modifiable(struct btf *btf)
+{
+ void *hdr, *types;
+ struct strset *set = NULL;
+ int err = -ENOMEM;
+
+ if (btf_is_modifiable(btf)) {
+ /* any BTF modification invalidates raw_data */
+ btf_invalidate_raw_data(btf);
+ return 0;
+ }
+
+ /* split raw data into three memory regions */
+ hdr = malloc(btf->hdr->hdr_len);
+ types = malloc(btf->hdr->type_len);
+ if (!hdr || !types)
+ goto err_out;
+
+ memcpy(hdr, btf->hdr, btf->hdr->hdr_len);
+ memcpy(types, btf->types_data, btf->hdr->type_len);
+
+ /* build lookup index for all strings */
+ set = strset__new(BTF_MAX_STR_OFFSET, btf->strs_data, btf->hdr->str_len);
+ if (IS_ERR(set)) {
+ err = PTR_ERR(set);
+ goto err_out;
+ }
+
+ /* only when everything was successful, update internal state */
+ btf->hdr = hdr;
+ btf->types_data = types;
+ btf->types_data_cap = btf->hdr->type_len;
+ btf->strs_data = NULL;
+ btf->strs_set = set;
+ /* if BTF was created from scratch, all strings are guaranteed to be
+ * unique and deduplicated
+ */
+ if (btf->hdr->str_len == 0)
+ btf->strs_deduped = true;
+ if (!btf->base_btf && btf->hdr->str_len == 1)
+ btf->strs_deduped = true;
+
+ /* invalidate raw_data representation */
+ btf_invalidate_raw_data(btf);
+
+ return 0;
+
+err_out:
+ strset__free(set);
+ free(hdr);
+ free(types);
+ return err;
+}
+
+/* Find an offset in BTF string section that corresponds to a given string *s*.
+ * Returns:
+ * - >0 offset into string section, if string is found;
+ * - -ENOENT, if string is not in the string section;
+ * - <0, on any other error.
+ */
+int btf__find_str(struct btf *btf, const char *s)
+{
+ int off;
+
+ if (btf->base_btf) {
+ off = btf__find_str(btf->base_btf, s);
+ if (off != -ENOENT)
+ return off;
+ }
+
+ /* BTF needs to be in a modifiable state to build string lookup index */
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ off = strset__find_str(btf->strs_set, s);
+ if (off < 0)
+ return libbpf_err(off);
+
+ return btf->start_str_off + off;
+}
+
+/* Add a string s to the BTF string section.
+ * Returns:
+ * - > 0 offset into string section, on success;
+ * - < 0, on error.
+ */
+int btf__add_str(struct btf *btf, const char *s)
+{
+ int off;
+
+ if (btf->base_btf) {
+ off = btf__find_str(btf->base_btf, s);
+ if (off != -ENOENT)
+ return off;
+ }
+
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ off = strset__add_str(btf->strs_set, s);
+ if (off < 0)
+ return libbpf_err(off);
+
+ btf->hdr->str_len = strset__data_size(btf->strs_set);
+
+ return btf->start_str_off + off;
+}
+
+static void *btf_add_type_mem(struct btf *btf, size_t add_sz)
+{
+ return libbpf_add_mem(&btf->types_data, &btf->types_data_cap, 1,
+ btf->hdr->type_len, UINT_MAX, add_sz);
+}
+
+static void btf_type_inc_vlen(struct btf_type *t)
+{
+ t->info = btf_type_info(btf_kind(t), btf_vlen(t) + 1, btf_kflag(t));
+}
+
+static int btf_commit_type(struct btf *btf, int data_sz)
+{
+ int err;
+
+ err = btf_add_type_idx_entry(btf, btf->hdr->type_len);
+ if (err)
+ return libbpf_err(err);
+
+ btf->hdr->type_len += data_sz;
+ btf->hdr->str_off += data_sz;
+ btf->nr_types++;
+ return btf->start_id + btf->nr_types - 1;
+}
+
+struct btf_pipe {
+ const struct btf *src;
+ struct btf *dst;
+ struct hashmap *str_off_map; /* map string offsets from src to dst */
+};
+
+static int btf_rewrite_str(__u32 *str_off, void *ctx)
+{
+ struct btf_pipe *p = ctx;
+ long mapped_off;
+ int off, err;
+
+ if (!*str_off) /* nothing to do for empty strings */
+ return 0;
+
+ if (p->str_off_map &&
+ hashmap__find(p->str_off_map, *str_off, &mapped_off)) {
+ *str_off = mapped_off;
+ return 0;
+ }
+
+ off = btf__add_str(p->dst, btf__str_by_offset(p->src, *str_off));
+ if (off < 0)
+ return off;
+
+ /* Remember string mapping from src to dst. It avoids
+ * performing expensive string comparisons.
+ */
+ if (p->str_off_map) {
+ err = hashmap__append(p->str_off_map, *str_off, off);
+ if (err)
+ return err;
+ }
+
+ *str_off = off;
+ return 0;
+}
+
+int btf__add_type(struct btf *btf, const struct btf *src_btf, const struct btf_type *src_type)
+{
+ struct btf_pipe p = { .src = src_btf, .dst = btf };
+ struct btf_type *t;
+ int sz, err;
+
+ sz = btf_type_size(src_type);
+ if (sz < 0)
+ return libbpf_err(sz);
+
+ /* deconstruct BTF, if necessary, and invalidate raw_data */
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ t = btf_add_type_mem(btf, sz);
+ if (!t)
+ return libbpf_err(-ENOMEM);
+
+ memcpy(t, src_type, sz);
+
+ err = btf_type_visit_str_offs(t, btf_rewrite_str, &p);
+ if (err)
+ return libbpf_err(err);
+
+ return btf_commit_type(btf, sz);
+}
+
+static int btf_rewrite_type_ids(__u32 *type_id, void *ctx)
+{
+ struct btf *btf = ctx;
+
+ if (!*type_id) /* nothing to do for VOID references */
+ return 0;
+
+ /* we haven't updated btf's type count yet, so
+ * btf->start_id + btf->nr_types - 1 is the type ID offset we should
+ * add to all newly added BTF types
+ */
+ *type_id += btf->start_id + btf->nr_types - 1;
+ return 0;
+}
+
+static size_t btf_dedup_identity_hash_fn(long key, void *ctx);
+static bool btf_dedup_equal_fn(long k1, long k2, void *ctx);
+
+int btf__add_btf(struct btf *btf, const struct btf *src_btf)
+{
+ struct btf_pipe p = { .src = src_btf, .dst = btf };
+ int data_sz, sz, cnt, i, err, old_strs_len;
+ __u32 *off;
+ void *t;
+
+ /* appending split BTF isn't supported yet */
+ if (src_btf->base_btf)
+ return libbpf_err(-ENOTSUP);
+
+ /* deconstruct BTF, if necessary, and invalidate raw_data */
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ /* remember original strings section size if we have to roll back
+ * partial strings section changes
+ */
+ old_strs_len = btf->hdr->str_len;
+
+ data_sz = src_btf->hdr->type_len;
+ cnt = btf__type_cnt(src_btf) - 1;
+
+ /* pre-allocate enough memory for new types */
+ t = btf_add_type_mem(btf, data_sz);
+ if (!t)
+ return libbpf_err(-ENOMEM);
+
+ /* pre-allocate enough memory for type offset index for new types */
+ off = btf_add_type_offs_mem(btf, cnt);
+ if (!off)
+ return libbpf_err(-ENOMEM);
+
+ /* Map the string offsets from src_btf to the offsets from btf to improve performance */
+ p.str_off_map = hashmap__new(btf_dedup_identity_hash_fn, btf_dedup_equal_fn, NULL);
+ if (IS_ERR(p.str_off_map))
+ return libbpf_err(-ENOMEM);
+
+ /* bulk copy types data for all types from src_btf */
+ memcpy(t, src_btf->types_data, data_sz);
+
+ for (i = 0; i < cnt; i++) {
+ sz = btf_type_size(t);
+ if (sz < 0) {
+ /* unlikely, has to be corrupted src_btf */
+ err = sz;
+ goto err_out;
+ }
+
+ /* fill out type ID to type offset mapping for lookups by type ID */
+ *off = t - btf->types_data;
+
+ /* add, dedup, and remap strings referenced by this BTF type */
+ err = btf_type_visit_str_offs(t, btf_rewrite_str, &p);
+ if (err)
+ goto err_out;
+
+ /* remap all type IDs referenced from this BTF type */
+ err = btf_type_visit_type_ids(t, btf_rewrite_type_ids, btf);
+ if (err)
+ goto err_out;
+
+ /* go to next type data and type offset index entry */
+ t += sz;
+ off++;
+ }
+
+ /* Up until now any of the copied type data was effectively invisible,
+ * so if we exited early before this point due to error, BTF would be
+ * effectively unmodified. There would be extra internal memory
+ * pre-allocated, but it would not be available for querying. But now
+ * that we've copied and rewritten all the data successfully, we can
+ * update type count and various internal offsets and sizes to
+ * "commit" the changes and made them visible to the outside world.
+ */
+ btf->hdr->type_len += data_sz;
+ btf->hdr->str_off += data_sz;
+ btf->nr_types += cnt;
+
+ hashmap__free(p.str_off_map);
+
+ /* return type ID of the first added BTF type */
+ return btf->start_id + btf->nr_types - cnt;
+err_out:
+ /* zero out preallocated memory as if it was just allocated with
+ * libbpf_add_mem()
+ */
+ memset(btf->types_data + btf->hdr->type_len, 0, data_sz);
+ memset(btf->strs_data + old_strs_len, 0, btf->hdr->str_len - old_strs_len);
+
+ /* and now restore original strings section size; types data size
+ * wasn't modified, so doesn't need restoring, see big comment above
+ */
+ btf->hdr->str_len = old_strs_len;
+
+ hashmap__free(p.str_off_map);
+
+ return libbpf_err(err);
+}
+
+/*
+ * Append new BTF_KIND_INT type with:
+ * - *name* - non-empty, non-NULL type name;
+ * - *sz* - power-of-2 (1, 2, 4, ..) size of the type, in bytes;
+ * - encoding is a combination of BTF_INT_SIGNED, BTF_INT_CHAR, BTF_INT_BOOL.
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_int(struct btf *btf, const char *name, size_t byte_sz, int encoding)
+{
+ struct btf_type *t;
+ int sz, name_off;
+
+ /* non-empty name */
+ if (!name || !name[0])
+ return libbpf_err(-EINVAL);
+ /* byte_sz must be power of 2 */
+ if (!byte_sz || (byte_sz & (byte_sz - 1)) || byte_sz > 16)
+ return libbpf_err(-EINVAL);
+ if (encoding & ~(BTF_INT_SIGNED | BTF_INT_CHAR | BTF_INT_BOOL))
+ return libbpf_err(-EINVAL);
+
+ /* deconstruct BTF, if necessary, and invalidate raw_data */
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_type) + sizeof(int);
+ t = btf_add_type_mem(btf, sz);
+ if (!t)
+ return libbpf_err(-ENOMEM);
+
+ /* if something goes wrong later, we might end up with an extra string,
+ * but that shouldn't be a problem, because BTF can't be constructed
+ * completely anyway and will most probably be just discarded
+ */
+ name_off = btf__add_str(btf, name);
+ if (name_off < 0)
+ return name_off;
+
+ t->name_off = name_off;
+ t->info = btf_type_info(BTF_KIND_INT, 0, 0);
+ t->size = byte_sz;
+ /* set INT info, we don't allow setting legacy bit offset/size */
+ *(__u32 *)(t + 1) = (encoding << 24) | (byte_sz * 8);
+
+ return btf_commit_type(btf, sz);
+}
+
+/*
+ * Append new BTF_KIND_FLOAT type with:
+ * - *name* - non-empty, non-NULL type name;
+ * - *sz* - size of the type, in bytes;
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_float(struct btf *btf, const char *name, size_t byte_sz)
+{
+ struct btf_type *t;
+ int sz, name_off;
+
+ /* non-empty name */
+ if (!name || !name[0])
+ return libbpf_err(-EINVAL);
+
+ /* byte_sz must be one of the explicitly allowed values */
+ if (byte_sz != 2 && byte_sz != 4 && byte_sz != 8 && byte_sz != 12 &&
+ byte_sz != 16)
+ return libbpf_err(-EINVAL);
+
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_type);
+ t = btf_add_type_mem(btf, sz);
+ if (!t)
+ return libbpf_err(-ENOMEM);
+
+ name_off = btf__add_str(btf, name);
+ if (name_off < 0)
+ return name_off;
+
+ t->name_off = name_off;
+ t->info = btf_type_info(BTF_KIND_FLOAT, 0, 0);
+ t->size = byte_sz;
+
+ return btf_commit_type(btf, sz);
+}
+
+/* it's completely legal to append BTF types with type IDs pointing forward to
+ * types that haven't been appended yet, so we only make sure that id looks
+ * sane, we can't guarantee that ID will always be valid
+ */
+static int validate_type_id(int id)
+{
+ if (id < 0 || id > BTF_MAX_NR_TYPES)
+ return -EINVAL;
+ return 0;
+}
+
+/* generic append function for PTR, TYPEDEF, CONST/VOLATILE/RESTRICT */
+static int btf_add_ref_kind(struct btf *btf, int kind, const char *name, int ref_type_id)
+{
+ struct btf_type *t;
+ int sz, name_off = 0;
+
+ if (validate_type_id(ref_type_id))
+ return libbpf_err(-EINVAL);
+
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_type);
+ t = btf_add_type_mem(btf, sz);
+ if (!t)
+ return libbpf_err(-ENOMEM);
+
+ if (name && name[0]) {
+ name_off = btf__add_str(btf, name);
+ if (name_off < 0)
+ return name_off;
+ }
+
+ t->name_off = name_off;
+ t->info = btf_type_info(kind, 0, 0);
+ t->type = ref_type_id;
+
+ return btf_commit_type(btf, sz);
+}
+
+/*
+ * Append new BTF_KIND_PTR type with:
+ * - *ref_type_id* - referenced type ID, it might not exist yet;
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_ptr(struct btf *btf, int ref_type_id)
+{
+ return btf_add_ref_kind(btf, BTF_KIND_PTR, NULL, ref_type_id);
+}
+
+/*
+ * Append new BTF_KIND_ARRAY type with:
+ * - *index_type_id* - type ID of the type describing array index;
+ * - *elem_type_id* - type ID of the type describing array element;
+ * - *nr_elems* - the size of the array;
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_array(struct btf *btf, int index_type_id, int elem_type_id, __u32 nr_elems)
+{
+ struct btf_type *t;
+ struct btf_array *a;
+ int sz;
+
+ if (validate_type_id(index_type_id) || validate_type_id(elem_type_id))
+ return libbpf_err(-EINVAL);
+
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_type) + sizeof(struct btf_array);
+ t = btf_add_type_mem(btf, sz);
+ if (!t)
+ return libbpf_err(-ENOMEM);
+
+ t->name_off = 0;
+ t->info = btf_type_info(BTF_KIND_ARRAY, 0, 0);
+ t->size = 0;
+
+ a = btf_array(t);
+ a->type = elem_type_id;
+ a->index_type = index_type_id;
+ a->nelems = nr_elems;
+
+ return btf_commit_type(btf, sz);
+}
+
+/* generic STRUCT/UNION append function */
+static int btf_add_composite(struct btf *btf, int kind, const char *name, __u32 bytes_sz)
+{
+ struct btf_type *t;
+ int sz, name_off = 0;
+
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_type);
+ t = btf_add_type_mem(btf, sz);
+ if (!t)
+ return libbpf_err(-ENOMEM);
+
+ if (name && name[0]) {
+ name_off = btf__add_str(btf, name);
+ if (name_off < 0)
+ return name_off;
+ }
+
+ /* start out with vlen=0 and no kflag; this will be adjusted when
+ * adding each member
+ */
+ t->name_off = name_off;
+ t->info = btf_type_info(kind, 0, 0);
+ t->size = bytes_sz;
+
+ return btf_commit_type(btf, sz);
+}
+
+/*
+ * Append new BTF_KIND_STRUCT type with:
+ * - *name* - name of the struct, can be NULL or empty for anonymous structs;
+ * - *byte_sz* - size of the struct, in bytes;
+ *
+ * Struct initially has no fields in it. Fields can be added by
+ * btf__add_field() right after btf__add_struct() succeeds.
+ *
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_struct(struct btf *btf, const char *name, __u32 byte_sz)
+{
+ return btf_add_composite(btf, BTF_KIND_STRUCT, name, byte_sz);
+}
+
+/*
+ * Append new BTF_KIND_UNION type with:
+ * - *name* - name of the union, can be NULL or empty for anonymous union;
+ * - *byte_sz* - size of the union, in bytes;
+ *
+ * Union initially has no fields in it. Fields can be added by
+ * btf__add_field() right after btf__add_union() succeeds. All fields
+ * should have *bit_offset* of 0.
+ *
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_union(struct btf *btf, const char *name, __u32 byte_sz)
+{
+ return btf_add_composite(btf, BTF_KIND_UNION, name, byte_sz);
+}
+
+static struct btf_type *btf_last_type(struct btf *btf)
+{
+ return btf_type_by_id(btf, btf__type_cnt(btf) - 1);
+}
+
+/*
+ * Append new field for the current STRUCT/UNION type with:
+ * - *name* - name of the field, can be NULL or empty for anonymous field;
+ * - *type_id* - type ID for the type describing field type;
+ * - *bit_offset* - bit offset of the start of the field within struct/union;
+ * - *bit_size* - bit size of a bitfield, 0 for non-bitfield fields;
+ * Returns:
+ * - 0, on success;
+ * - <0, on error.
+ */
+int btf__add_field(struct btf *btf, const char *name, int type_id,
+ __u32 bit_offset, __u32 bit_size)
+{
+ struct btf_type *t;
+ struct btf_member *m;
+ bool is_bitfield;
+ int sz, name_off = 0;
+
+ /* last type should be union/struct */
+ if (btf->nr_types == 0)
+ return libbpf_err(-EINVAL);
+ t = btf_last_type(btf);
+ if (!btf_is_composite(t))
+ return libbpf_err(-EINVAL);
+
+ if (validate_type_id(type_id))
+ return libbpf_err(-EINVAL);
+ /* best-effort bit field offset/size enforcement */
+ is_bitfield = bit_size || (bit_offset % 8 != 0);
+ if (is_bitfield && (bit_size == 0 || bit_size > 255 || bit_offset > 0xffffff))
+ return libbpf_err(-EINVAL);
+
+ /* only offset 0 is allowed for unions */
+ if (btf_is_union(t) && bit_offset)
+ return libbpf_err(-EINVAL);
+
+ /* decompose and invalidate raw data */
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_member);
+ m = btf_add_type_mem(btf, sz);
+ if (!m)
+ return libbpf_err(-ENOMEM);
+
+ if (name && name[0]) {
+ name_off = btf__add_str(btf, name);
+ if (name_off < 0)
+ return name_off;
+ }
+
+ m->name_off = name_off;
+ m->type = type_id;
+ m->offset = bit_offset | (bit_size << 24);
+
+ /* btf_add_type_mem can invalidate t pointer */
+ t = btf_last_type(btf);
+ /* update parent type's vlen and kflag */
+ t->info = btf_type_info(btf_kind(t), btf_vlen(t) + 1, is_bitfield || btf_kflag(t));
+
+ btf->hdr->type_len += sz;
+ btf->hdr->str_off += sz;
+ return 0;
+}
+
+static int btf_add_enum_common(struct btf *btf, const char *name, __u32 byte_sz,
+ bool is_signed, __u8 kind)
+{
+ struct btf_type *t;
+ int sz, name_off = 0;
+
+ /* byte_sz must be power of 2 */
+ if (!byte_sz || (byte_sz & (byte_sz - 1)) || byte_sz > 8)
+ return libbpf_err(-EINVAL);
+
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_type);
+ t = btf_add_type_mem(btf, sz);
+ if (!t)
+ return libbpf_err(-ENOMEM);
+
+ if (name && name[0]) {
+ name_off = btf__add_str(btf, name);
+ if (name_off < 0)
+ return name_off;
+ }
+
+ /* start out with vlen=0; it will be adjusted when adding enum values */
+ t->name_off = name_off;
+ t->info = btf_type_info(kind, 0, is_signed);
+ t->size = byte_sz;
+
+ return btf_commit_type(btf, sz);
+}
+
+/*
+ * Append new BTF_KIND_ENUM type with:
+ * - *name* - name of the enum, can be NULL or empty for anonymous enums;
+ * - *byte_sz* - size of the enum, in bytes.
+ *
+ * Enum initially has no enum values in it (and corresponds to enum forward
+ * declaration). Enumerator values can be added by btf__add_enum_value()
+ * immediately after btf__add_enum() succeeds.
+ *
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_enum(struct btf *btf, const char *name, __u32 byte_sz)
+{
+ /*
+ * set the signedness to be unsigned, it will change to signed
+ * if any later enumerator is negative.
+ */
+ return btf_add_enum_common(btf, name, byte_sz, false, BTF_KIND_ENUM);
+}
+
+/*
+ * Append new enum value for the current ENUM type with:
+ * - *name* - name of the enumerator value, can't be NULL or empty;
+ * - *value* - integer value corresponding to enum value *name*;
+ * Returns:
+ * - 0, on success;
+ * - <0, on error.
+ */
+int btf__add_enum_value(struct btf *btf, const char *name, __s64 value)
+{
+ struct btf_type *t;
+ struct btf_enum *v;
+ int sz, name_off;
+
+ /* last type should be BTF_KIND_ENUM */
+ if (btf->nr_types == 0)
+ return libbpf_err(-EINVAL);
+ t = btf_last_type(btf);
+ if (!btf_is_enum(t))
+ return libbpf_err(-EINVAL);
+
+ /* non-empty name */
+ if (!name || !name[0])
+ return libbpf_err(-EINVAL);
+ if (value < INT_MIN || value > UINT_MAX)
+ return libbpf_err(-E2BIG);
+
+ /* decompose and invalidate raw data */
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_enum);
+ v = btf_add_type_mem(btf, sz);
+ if (!v)
+ return libbpf_err(-ENOMEM);
+
+ name_off = btf__add_str(btf, name);
+ if (name_off < 0)
+ return name_off;
+
+ v->name_off = name_off;
+ v->val = value;
+
+ /* update parent type's vlen */
+ t = btf_last_type(btf);
+ btf_type_inc_vlen(t);
+
+ /* if negative value, set signedness to signed */
+ if (value < 0)
+ t->info = btf_type_info(btf_kind(t), btf_vlen(t), true);
+
+ btf->hdr->type_len += sz;
+ btf->hdr->str_off += sz;
+ return 0;
+}
+
+/*
+ * Append new BTF_KIND_ENUM64 type with:
+ * - *name* - name of the enum, can be NULL or empty for anonymous enums;
+ * - *byte_sz* - size of the enum, in bytes.
+ * - *is_signed* - whether the enum values are signed or not;
+ *
+ * Enum initially has no enum values in it (and corresponds to enum forward
+ * declaration). Enumerator values can be added by btf__add_enum64_value()
+ * immediately after btf__add_enum64() succeeds.
+ *
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_enum64(struct btf *btf, const char *name, __u32 byte_sz,
+ bool is_signed)
+{
+ return btf_add_enum_common(btf, name, byte_sz, is_signed,
+ BTF_KIND_ENUM64);
+}
+
+/*
+ * Append new enum value for the current ENUM64 type with:
+ * - *name* - name of the enumerator value, can't be NULL or empty;
+ * - *value* - integer value corresponding to enum value *name*;
+ * Returns:
+ * - 0, on success;
+ * - <0, on error.
+ */
+int btf__add_enum64_value(struct btf *btf, const char *name, __u64 value)
+{
+ struct btf_enum64 *v;
+ struct btf_type *t;
+ int sz, name_off;
+
+ /* last type should be BTF_KIND_ENUM64 */
+ if (btf->nr_types == 0)
+ return libbpf_err(-EINVAL);
+ t = btf_last_type(btf);
+ if (!btf_is_enum64(t))
+ return libbpf_err(-EINVAL);
+
+ /* non-empty name */
+ if (!name || !name[0])
+ return libbpf_err(-EINVAL);
+
+ /* decompose and invalidate raw data */
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_enum64);
+ v = btf_add_type_mem(btf, sz);
+ if (!v)
+ return libbpf_err(-ENOMEM);
+
+ name_off = btf__add_str(btf, name);
+ if (name_off < 0)
+ return name_off;
+
+ v->name_off = name_off;
+ v->val_lo32 = (__u32)value;
+ v->val_hi32 = value >> 32;
+
+ /* update parent type's vlen */
+ t = btf_last_type(btf);
+ btf_type_inc_vlen(t);
+
+ btf->hdr->type_len += sz;
+ btf->hdr->str_off += sz;
+ return 0;
+}
+
+/*
+ * Append new BTF_KIND_FWD type with:
+ * - *name*, non-empty/non-NULL name;
+ * - *fwd_kind*, kind of forward declaration, one of BTF_FWD_STRUCT,
+ * BTF_FWD_UNION, or BTF_FWD_ENUM;
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_fwd(struct btf *btf, const char *name, enum btf_fwd_kind fwd_kind)
+{
+ if (!name || !name[0])
+ return libbpf_err(-EINVAL);
+
+ switch (fwd_kind) {
+ case BTF_FWD_STRUCT:
+ case BTF_FWD_UNION: {
+ struct btf_type *t;
+ int id;
+
+ id = btf_add_ref_kind(btf, BTF_KIND_FWD, name, 0);
+ if (id <= 0)
+ return id;
+ t = btf_type_by_id(btf, id);
+ t->info = btf_type_info(BTF_KIND_FWD, 0, fwd_kind == BTF_FWD_UNION);
+ return id;
+ }
+ case BTF_FWD_ENUM:
+ /* enum forward in BTF currently is just an enum with no enum
+ * values; we also assume a standard 4-byte size for it
+ */
+ return btf__add_enum(btf, name, sizeof(int));
+ default:
+ return libbpf_err(-EINVAL);
+ }
+}
+
+/*
+ * Append new BTF_KING_TYPEDEF type with:
+ * - *name*, non-empty/non-NULL name;
+ * - *ref_type_id* - referenced type ID, it might not exist yet;
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_typedef(struct btf *btf, const char *name, int ref_type_id)
+{
+ if (!name || !name[0])
+ return libbpf_err(-EINVAL);
+
+ return btf_add_ref_kind(btf, BTF_KIND_TYPEDEF, name, ref_type_id);
+}
+
+/*
+ * Append new BTF_KIND_VOLATILE type with:
+ * - *ref_type_id* - referenced type ID, it might not exist yet;
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_volatile(struct btf *btf, int ref_type_id)
+{
+ return btf_add_ref_kind(btf, BTF_KIND_VOLATILE, NULL, ref_type_id);
+}
+
+/*
+ * Append new BTF_KIND_CONST type with:
+ * - *ref_type_id* - referenced type ID, it might not exist yet;
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_const(struct btf *btf, int ref_type_id)
+{
+ return btf_add_ref_kind(btf, BTF_KIND_CONST, NULL, ref_type_id);
+}
+
+/*
+ * Append new BTF_KIND_RESTRICT type with:
+ * - *ref_type_id* - referenced type ID, it might not exist yet;
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_restrict(struct btf *btf, int ref_type_id)
+{
+ return btf_add_ref_kind(btf, BTF_KIND_RESTRICT, NULL, ref_type_id);
+}
+
+/*
+ * Append new BTF_KIND_TYPE_TAG type with:
+ * - *value*, non-empty/non-NULL tag value;
+ * - *ref_type_id* - referenced type ID, it might not exist yet;
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_type_tag(struct btf *btf, const char *value, int ref_type_id)
+{
+ if (!value || !value[0])
+ return libbpf_err(-EINVAL);
+
+ return btf_add_ref_kind(btf, BTF_KIND_TYPE_TAG, value, ref_type_id);
+}
+
+/*
+ * Append new BTF_KIND_FUNC type with:
+ * - *name*, non-empty/non-NULL name;
+ * - *proto_type_id* - FUNC_PROTO's type ID, it might not exist yet;
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_func(struct btf *btf, const char *name,
+ enum btf_func_linkage linkage, int proto_type_id)
+{
+ int id;
+
+ if (!name || !name[0])
+ return libbpf_err(-EINVAL);
+ if (linkage != BTF_FUNC_STATIC && linkage != BTF_FUNC_GLOBAL &&
+ linkage != BTF_FUNC_EXTERN)
+ return libbpf_err(-EINVAL);
+
+ id = btf_add_ref_kind(btf, BTF_KIND_FUNC, name, proto_type_id);
+ if (id > 0) {
+ struct btf_type *t = btf_type_by_id(btf, id);
+
+ t->info = btf_type_info(BTF_KIND_FUNC, linkage, 0);
+ }
+ return libbpf_err(id);
+}
+
+/*
+ * Append new BTF_KIND_FUNC_PROTO with:
+ * - *ret_type_id* - type ID for return result of a function.
+ *
+ * Function prototype initially has no arguments, but they can be added by
+ * btf__add_func_param() one by one, immediately after
+ * btf__add_func_proto() succeeded.
+ *
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_func_proto(struct btf *btf, int ret_type_id)
+{
+ struct btf_type *t;
+ int sz;
+
+ if (validate_type_id(ret_type_id))
+ return libbpf_err(-EINVAL);
+
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_type);
+ t = btf_add_type_mem(btf, sz);
+ if (!t)
+ return libbpf_err(-ENOMEM);
+
+ /* start out with vlen=0; this will be adjusted when adding enum
+ * values, if necessary
+ */
+ t->name_off = 0;
+ t->info = btf_type_info(BTF_KIND_FUNC_PROTO, 0, 0);
+ t->type = ret_type_id;
+
+ return btf_commit_type(btf, sz);
+}
+
+/*
+ * Append new function parameter for current FUNC_PROTO type with:
+ * - *name* - parameter name, can be NULL or empty;
+ * - *type_id* - type ID describing the type of the parameter.
+ * Returns:
+ * - 0, on success;
+ * - <0, on error.
+ */
+int btf__add_func_param(struct btf *btf, const char *name, int type_id)
+{
+ struct btf_type *t;
+ struct btf_param *p;
+ int sz, name_off = 0;
+
+ if (validate_type_id(type_id))
+ return libbpf_err(-EINVAL);
+
+ /* last type should be BTF_KIND_FUNC_PROTO */
+ if (btf->nr_types == 0)
+ return libbpf_err(-EINVAL);
+ t = btf_last_type(btf);
+ if (!btf_is_func_proto(t))
+ return libbpf_err(-EINVAL);
+
+ /* decompose and invalidate raw data */
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_param);
+ p = btf_add_type_mem(btf, sz);
+ if (!p)
+ return libbpf_err(-ENOMEM);
+
+ if (name && name[0]) {
+ name_off = btf__add_str(btf, name);
+ if (name_off < 0)
+ return name_off;
+ }
+
+ p->name_off = name_off;
+ p->type = type_id;
+
+ /* update parent type's vlen */
+ t = btf_last_type(btf);
+ btf_type_inc_vlen(t);
+
+ btf->hdr->type_len += sz;
+ btf->hdr->str_off += sz;
+ return 0;
+}
+
+/*
+ * Append new BTF_KIND_VAR type with:
+ * - *name* - non-empty/non-NULL name;
+ * - *linkage* - variable linkage, one of BTF_VAR_STATIC,
+ * BTF_VAR_GLOBAL_ALLOCATED, or BTF_VAR_GLOBAL_EXTERN;
+ * - *type_id* - type ID of the type describing the type of the variable.
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_var(struct btf *btf, const char *name, int linkage, int type_id)
+{
+ struct btf_type *t;
+ struct btf_var *v;
+ int sz, name_off;
+
+ /* non-empty name */
+ if (!name || !name[0])
+ return libbpf_err(-EINVAL);
+ if (linkage != BTF_VAR_STATIC && linkage != BTF_VAR_GLOBAL_ALLOCATED &&
+ linkage != BTF_VAR_GLOBAL_EXTERN)
+ return libbpf_err(-EINVAL);
+ if (validate_type_id(type_id))
+ return libbpf_err(-EINVAL);
+
+ /* deconstruct BTF, if necessary, and invalidate raw_data */
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_type) + sizeof(struct btf_var);
+ t = btf_add_type_mem(btf, sz);
+ if (!t)
+ return libbpf_err(-ENOMEM);
+
+ name_off = btf__add_str(btf, name);
+ if (name_off < 0)
+ return name_off;
+
+ t->name_off = name_off;
+ t->info = btf_type_info(BTF_KIND_VAR, 0, 0);
+ t->type = type_id;
+
+ v = btf_var(t);
+ v->linkage = linkage;
+
+ return btf_commit_type(btf, sz);
+}
+
+/*
+ * Append new BTF_KIND_DATASEC type with:
+ * - *name* - non-empty/non-NULL name;
+ * - *byte_sz* - data section size, in bytes.
+ *
+ * Data section is initially empty. Variables info can be added with
+ * btf__add_datasec_var_info() calls, after btf__add_datasec() succeeds.
+ *
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_datasec(struct btf *btf, const char *name, __u32 byte_sz)
+{
+ struct btf_type *t;
+ int sz, name_off;
+
+ /* non-empty name */
+ if (!name || !name[0])
+ return libbpf_err(-EINVAL);
+
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_type);
+ t = btf_add_type_mem(btf, sz);
+ if (!t)
+ return libbpf_err(-ENOMEM);
+
+ name_off = btf__add_str(btf, name);
+ if (name_off < 0)
+ return name_off;
+
+ /* start with vlen=0, which will be update as var_secinfos are added */
+ t->name_off = name_off;
+ t->info = btf_type_info(BTF_KIND_DATASEC, 0, 0);
+ t->size = byte_sz;
+
+ return btf_commit_type(btf, sz);
+}
+
+/*
+ * Append new data section variable information entry for current DATASEC type:
+ * - *var_type_id* - type ID, describing type of the variable;
+ * - *offset* - variable offset within data section, in bytes;
+ * - *byte_sz* - variable size, in bytes.
+ *
+ * Returns:
+ * - 0, on success;
+ * - <0, on error.
+ */
+int btf__add_datasec_var_info(struct btf *btf, int var_type_id, __u32 offset, __u32 byte_sz)
+{
+ struct btf_type *t;
+ struct btf_var_secinfo *v;
+ int sz;
+
+ /* last type should be BTF_KIND_DATASEC */
+ if (btf->nr_types == 0)
+ return libbpf_err(-EINVAL);
+ t = btf_last_type(btf);
+ if (!btf_is_datasec(t))
+ return libbpf_err(-EINVAL);
+
+ if (validate_type_id(var_type_id))
+ return libbpf_err(-EINVAL);
+
+ /* decompose and invalidate raw data */
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_var_secinfo);
+ v = btf_add_type_mem(btf, sz);
+ if (!v)
+ return libbpf_err(-ENOMEM);
+
+ v->type = var_type_id;
+ v->offset = offset;
+ v->size = byte_sz;
+
+ /* update parent type's vlen */
+ t = btf_last_type(btf);
+ btf_type_inc_vlen(t);
+
+ btf->hdr->type_len += sz;
+ btf->hdr->str_off += sz;
+ return 0;
+}
+
+/*
+ * Append new BTF_KIND_DECL_TAG type with:
+ * - *value* - non-empty/non-NULL string;
+ * - *ref_type_id* - referenced type ID, it might not exist yet;
+ * - *component_idx* - -1 for tagging reference type, otherwise struct/union
+ * member or function argument index;
+ * Returns:
+ * - >0, type ID of newly added BTF type;
+ * - <0, on error.
+ */
+int btf__add_decl_tag(struct btf *btf, const char *value, int ref_type_id,
+ int component_idx)
+{
+ struct btf_type *t;
+ int sz, value_off;
+
+ if (!value || !value[0] || component_idx < -1)
+ return libbpf_err(-EINVAL);
+
+ if (validate_type_id(ref_type_id))
+ return libbpf_err(-EINVAL);
+
+ if (btf_ensure_modifiable(btf))
+ return libbpf_err(-ENOMEM);
+
+ sz = sizeof(struct btf_type) + sizeof(struct btf_decl_tag);
+ t = btf_add_type_mem(btf, sz);
+ if (!t)
+ return libbpf_err(-ENOMEM);
+
+ value_off = btf__add_str(btf, value);
+ if (value_off < 0)
+ return value_off;
+
+ t->name_off = value_off;
+ t->info = btf_type_info(BTF_KIND_DECL_TAG, 0, false);
+ t->type = ref_type_id;
+ btf_decl_tag(t)->component_idx = component_idx;
+
+ return btf_commit_type(btf, sz);
+}
+
+struct btf_ext_sec_setup_param {
+ __u32 off;
+ __u32 len;
+ __u32 min_rec_size;
+ struct btf_ext_info *ext_info;
+ const char *desc;
+};
+
+static int btf_ext_setup_info(struct btf_ext *btf_ext,
+ struct btf_ext_sec_setup_param *ext_sec)
+{
+ const struct btf_ext_info_sec *sinfo;
+ struct btf_ext_info *ext_info;
+ __u32 info_left, record_size;
+ size_t sec_cnt = 0;
+ /* The start of the info sec (including the __u32 record_size). */
+ void *info;
+
+ if (ext_sec->len == 0)
+ return 0;
+
+ if (ext_sec->off & 0x03) {
+ pr_debug(".BTF.ext %s section is not aligned to 4 bytes\n",
+ ext_sec->desc);
+ return -EINVAL;
+ }
+
+ info = btf_ext->data + btf_ext->hdr->hdr_len + ext_sec->off;
+ info_left = ext_sec->len;
+
+ if (btf_ext->data + btf_ext->data_size < info + ext_sec->len) {
+ pr_debug("%s section (off:%u len:%u) is beyond the end of the ELF section .BTF.ext\n",
+ ext_sec->desc, ext_sec->off, ext_sec->len);
+ return -EINVAL;
+ }
+
+ /* At least a record size */
+ if (info_left < sizeof(__u32)) {
+ pr_debug(".BTF.ext %s record size not found\n", ext_sec->desc);
+ return -EINVAL;
+ }
+
+ /* The record size needs to meet the minimum standard */
+ record_size = *(__u32 *)info;
+ if (record_size < ext_sec->min_rec_size ||
+ record_size & 0x03) {
+ pr_debug("%s section in .BTF.ext has invalid record size %u\n",
+ ext_sec->desc, record_size);
+ return -EINVAL;
+ }
+
+ sinfo = info + sizeof(__u32);
+ info_left -= sizeof(__u32);
+
+ /* If no records, return failure now so .BTF.ext won't be used. */
+ if (!info_left) {
+ pr_debug("%s section in .BTF.ext has no records", ext_sec->desc);
+ return -EINVAL;
+ }
+
+ while (info_left) {
+ unsigned int sec_hdrlen = sizeof(struct btf_ext_info_sec);
+ __u64 total_record_size;
+ __u32 num_records;
+
+ if (info_left < sec_hdrlen) {
+ pr_debug("%s section header is not found in .BTF.ext\n",
+ ext_sec->desc);
+ return -EINVAL;
+ }
+
+ num_records = sinfo->num_info;
+ if (num_records == 0) {
+ pr_debug("%s section has incorrect num_records in .BTF.ext\n",
+ ext_sec->desc);
+ return -EINVAL;
+ }
+
+ total_record_size = sec_hdrlen + (__u64)num_records * record_size;
+ if (info_left < total_record_size) {
+ pr_debug("%s section has incorrect num_records in .BTF.ext\n",
+ ext_sec->desc);
+ return -EINVAL;
+ }
+
+ info_left -= total_record_size;
+ sinfo = (void *)sinfo + total_record_size;
+ sec_cnt++;
+ }
+
+ ext_info = ext_sec->ext_info;
+ ext_info->len = ext_sec->len - sizeof(__u32);
+ ext_info->rec_size = record_size;
+ ext_info->info = info + sizeof(__u32);
+ ext_info->sec_cnt = sec_cnt;
+
+ return 0;
+}
+
+static int btf_ext_setup_func_info(struct btf_ext *btf_ext)
+{
+ struct btf_ext_sec_setup_param param = {
+ .off = btf_ext->hdr->func_info_off,
+ .len = btf_ext->hdr->func_info_len,
+ .min_rec_size = sizeof(struct bpf_func_info_min),
+ .ext_info = &btf_ext->func_info,
+ .desc = "func_info"
+ };
+
+ return btf_ext_setup_info(btf_ext, &param);
+}
+
+static int btf_ext_setup_line_info(struct btf_ext *btf_ext)
+{
+ struct btf_ext_sec_setup_param param = {
+ .off = btf_ext->hdr->line_info_off,
+ .len = btf_ext->hdr->line_info_len,
+ .min_rec_size = sizeof(struct bpf_line_info_min),
+ .ext_info = &btf_ext->line_info,
+ .desc = "line_info",
+ };
+
+ return btf_ext_setup_info(btf_ext, &param);
+}
+
+static int btf_ext_setup_core_relos(struct btf_ext *btf_ext)
+{
+ struct btf_ext_sec_setup_param param = {
+ .off = btf_ext->hdr->core_relo_off,
+ .len = btf_ext->hdr->core_relo_len,
+ .min_rec_size = sizeof(struct bpf_core_relo),
+ .ext_info = &btf_ext->core_relo_info,
+ .desc = "core_relo",
+ };
+
+ return btf_ext_setup_info(btf_ext, &param);
+}
+
+static int btf_ext_parse_hdr(__u8 *data, __u32 data_size)
+{
+ const struct btf_ext_header *hdr = (struct btf_ext_header *)data;
+
+ if (data_size < offsetofend(struct btf_ext_header, hdr_len) ||
+ data_size < hdr->hdr_len) {
+ pr_debug("BTF.ext header not found");
+ return -EINVAL;
+ }
+
+ if (hdr->magic == bswap_16(BTF_MAGIC)) {
+ pr_warn("BTF.ext in non-native endianness is not supported\n");
+ return -ENOTSUP;
+ } else if (hdr->magic != BTF_MAGIC) {
+ pr_debug("Invalid BTF.ext magic:%x\n", hdr->magic);
+ return -EINVAL;
+ }
+
+ if (hdr->version != BTF_VERSION) {
+ pr_debug("Unsupported BTF.ext version:%u\n", hdr->version);
+ return -ENOTSUP;
+ }
+
+ if (hdr->flags) {
+ pr_debug("Unsupported BTF.ext flags:%x\n", hdr->flags);
+ return -ENOTSUP;
+ }
+
+ if (data_size == hdr->hdr_len) {
+ pr_debug("BTF.ext has no data\n");
+ return -EINVAL;
+ }
+
+ return 0;
+}
+
+void btf_ext__free(struct btf_ext *btf_ext)
+{
+ if (IS_ERR_OR_NULL(btf_ext))
+ return;
+ free(btf_ext->func_info.sec_idxs);
+ free(btf_ext->line_info.sec_idxs);
+ free(btf_ext->core_relo_info.sec_idxs);
+ free(btf_ext->data);
+ free(btf_ext);
+}
+
+struct btf_ext *btf_ext__new(const __u8 *data, __u32 size)
+{
+ struct btf_ext *btf_ext;
+ int err;
+
+ btf_ext = calloc(1, sizeof(struct btf_ext));
+ if (!btf_ext)
+ return libbpf_err_ptr(-ENOMEM);
+
+ btf_ext->data_size = size;
+ btf_ext->data = malloc(size);
+ if (!btf_ext->data) {
+ err = -ENOMEM;
+ goto done;
+ }
+ memcpy(btf_ext->data, data, size);
+
+ err = btf_ext_parse_hdr(btf_ext->data, size);
+ if (err)
+ goto done;
+
+ if (btf_ext->hdr->hdr_len < offsetofend(struct btf_ext_header, line_info_len)) {
+ err = -EINVAL;
+ goto done;
+ }
+
+ err = btf_ext_setup_func_info(btf_ext);
+ if (err)
+ goto done;
+
+ err = btf_ext_setup_line_info(btf_ext);
+ if (err)
+ goto done;
+
+ if (btf_ext->hdr->hdr_len < offsetofend(struct btf_ext_header, core_relo_len))
+ goto done; /* skip core relos parsing */
+
+ err = btf_ext_setup_core_relos(btf_ext);
+ if (err)
+ goto done;
+
+done:
+ if (err) {
+ btf_ext__free(btf_ext);
+ return libbpf_err_ptr(err);
+ }
+
+ return btf_ext;
+}
+
+const void *btf_ext__get_raw_data(const struct btf_ext *btf_ext, __u32 *size)
+{
+ *size = btf_ext->data_size;
+ return btf_ext->data;
+}
+
+struct btf_dedup;
+
+static struct btf_dedup *btf_dedup_new(struct btf *btf, const struct btf_dedup_opts *opts);
+static void btf_dedup_free(struct btf_dedup *d);
+static int btf_dedup_prep(struct btf_dedup *d);
+static int btf_dedup_strings(struct btf_dedup *d);
+static int btf_dedup_prim_types(struct btf_dedup *d);
+static int btf_dedup_struct_types(struct btf_dedup *d);
+static int btf_dedup_ref_types(struct btf_dedup *d);
+static int btf_dedup_resolve_fwds(struct btf_dedup *d);
+static int btf_dedup_compact_types(struct btf_dedup *d);
+static int btf_dedup_remap_types(struct btf_dedup *d);
+
+/*
+ * Deduplicate BTF types and strings.
+ *
+ * BTF dedup algorithm takes as an input `struct btf` representing `.BTF` ELF
+ * section with all BTF type descriptors and string data. It overwrites that
+ * memory in-place with deduplicated types and strings without any loss of
+ * information. If optional `struct btf_ext` representing '.BTF.ext' ELF section
+ * is provided, all the strings referenced from .BTF.ext section are honored
+ * and updated to point to the right offsets after deduplication.
+ *
+ * If function returns with error, type/string data might be garbled and should
+ * be discarded.
+ *
+ * More verbose and detailed description of both problem btf_dedup is solving,
+ * as well as solution could be found at:
+ * https://facebookmicrosites.github.io/bpf/blog/2018/11/14/btf-enhancement.html
+ *
+ * Problem description and justification
+ * =====================================
+ *
+ * BTF type information is typically emitted either as a result of conversion
+ * from DWARF to BTF or directly by compiler. In both cases, each compilation
+ * unit contains information about a subset of all the types that are used
+ * in an application. These subsets are frequently overlapping and contain a lot
+ * of duplicated information when later concatenated together into a single
+ * binary. This algorithm ensures that each unique type is represented by single
+ * BTF type descriptor, greatly reducing resulting size of BTF data.
+ *
+ * Compilation unit isolation and subsequent duplication of data is not the only
+ * problem. The same type hierarchy (e.g., struct and all the type that struct
+ * references) in different compilation units can be represented in BTF to
+ * various degrees of completeness (or, rather, incompleteness) due to
+ * struct/union forward declarations.
+ *
+ * Let's take a look at an example, that we'll use to better understand the
+ * problem (and solution). Suppose we have two compilation units, each using
+ * same `struct S`, but each of them having incomplete type information about
+ * struct's fields:
+ *
+ * // CU #1:
+ * struct S;
+ * struct A {
+ * int a;
+ * struct A* self;
+ * struct S* parent;
+ * };
+ * struct B;
+ * struct S {
+ * struct A* a_ptr;
+ * struct B* b_ptr;
+ * };
+ *
+ * // CU #2:
+ * struct S;
+ * struct A;
+ * struct B {
+ * int b;
+ * struct B* self;
+ * struct S* parent;
+ * };
+ * struct S {
+ * struct A* a_ptr;
+ * struct B* b_ptr;
+ * };
+ *
+ * In case of CU #1, BTF data will know only that `struct B` exist (but no
+ * more), but will know the complete type information about `struct A`. While
+ * for CU #2, it will know full type information about `struct B`, but will
+ * only know about forward declaration of `struct A` (in BTF terms, it will
+ * have `BTF_KIND_FWD` type descriptor with name `B`).
+ *
+ * This compilation unit isolation means that it's possible that there is no
+ * single CU with complete type information describing structs `S`, `A`, and
+ * `B`. Also, we might get tons of duplicated and redundant type information.
+ *
+ * Additional complication we need to keep in mind comes from the fact that
+ * types, in general, can form graphs containing cycles, not just DAGs.
+ *
+ * While algorithm does deduplication, it also merges and resolves type
+ * information (unless disabled throught `struct btf_opts`), whenever possible.
+ * E.g., in the example above with two compilation units having partial type
+ * information for structs `A` and `B`, the output of algorithm will emit
+ * a single copy of each BTF type that describes structs `A`, `B`, and `S`
+ * (as well as type information for `int` and pointers), as if they were defined
+ * in a single compilation unit as:
+ *
+ * struct A {
+ * int a;
+ * struct A* self;
+ * struct S* parent;
+ * };
+ * struct B {
+ * int b;
+ * struct B* self;
+ * struct S* parent;
+ * };
+ * struct S {
+ * struct A* a_ptr;
+ * struct B* b_ptr;
+ * };
+ *
+ * Algorithm summary
+ * =================
+ *
+ * Algorithm completes its work in 7 separate passes:
+ *
+ * 1. Strings deduplication.
+ * 2. Primitive types deduplication (int, enum, fwd).
+ * 3. Struct/union types deduplication.
+ * 4. Resolve unambiguous forward declarations.
+ * 5. Reference types deduplication (pointers, typedefs, arrays, funcs, func
+ * protos, and const/volatile/restrict modifiers).
+ * 6. Types compaction.
+ * 7. Types remapping.
+ *
+ * Algorithm determines canonical type descriptor, which is a single
+ * representative type for each truly unique type. This canonical type is the
+ * one that will go into final deduplicated BTF type information. For
+ * struct/unions, it is also the type that algorithm will merge additional type
+ * information into (while resolving FWDs), as it discovers it from data in
+ * other CUs. Each input BTF type eventually gets either mapped to itself, if
+ * that type is canonical, or to some other type, if that type is equivalent
+ * and was chosen as canonical representative. This mapping is stored in
+ * `btf_dedup->map` array. This map is also used to record STRUCT/UNION that
+ * FWD type got resolved to.
+ *
+ * To facilitate fast discovery of canonical types, we also maintain canonical
+ * index (`btf_dedup->dedup_table`), which maps type descriptor's signature hash
+ * (i.e., hashed kind, name, size, fields, etc) into a list of canonical types
+ * that match that signature. With sufficiently good choice of type signature
+ * hashing function, we can limit number of canonical types for each unique type
+ * signature to a very small number, allowing to find canonical type for any
+ * duplicated type very quickly.
+ *
+ * Struct/union deduplication is the most critical part and algorithm for
+ * deduplicating structs/unions is described in greater details in comments for
+ * `btf_dedup_is_equiv` function.
+ */
+int btf__dedup(struct btf *btf, const struct btf_dedup_opts *opts)
+{
+ struct btf_dedup *d;
+ int err;
+
+ if (!OPTS_VALID(opts, btf_dedup_opts))
+ return libbpf_err(-EINVAL);
+
+ d = btf_dedup_new(btf, opts);
+ if (IS_ERR(d)) {
+ pr_debug("btf_dedup_new failed: %ld", PTR_ERR(d));
+ return libbpf_err(-EINVAL);
+ }
+
+ if (btf_ensure_modifiable(btf)) {
+ err = -ENOMEM;
+ goto done;
+ }
+
+ err = btf_dedup_prep(d);
+ if (err) {
+ pr_debug("btf_dedup_prep failed:%d\n", err);
+ goto done;
+ }
+ err = btf_dedup_strings(d);
+ if (err < 0) {
+ pr_debug("btf_dedup_strings failed:%d\n", err);
+ goto done;
+ }
+ err = btf_dedup_prim_types(d);
+ if (err < 0) {
+ pr_debug("btf_dedup_prim_types failed:%d\n", err);
+ goto done;
+ }
+ err = btf_dedup_struct_types(d);
+ if (err < 0) {
+ pr_debug("btf_dedup_struct_types failed:%d\n", err);
+ goto done;
+ }
+ err = btf_dedup_resolve_fwds(d);
+ if (err < 0) {
+ pr_debug("btf_dedup_resolve_fwds failed:%d\n", err);
+ goto done;
+ }
+ err = btf_dedup_ref_types(d);
+ if (err < 0) {
+ pr_debug("btf_dedup_ref_types failed:%d\n", err);
+ goto done;
+ }
+ err = btf_dedup_compact_types(d);
+ if (err < 0) {
+ pr_debug("btf_dedup_compact_types failed:%d\n", err);
+ goto done;
+ }
+ err = btf_dedup_remap_types(d);
+ if (err < 0) {
+ pr_debug("btf_dedup_remap_types failed:%d\n", err);
+ goto done;
+ }
+
+done:
+ btf_dedup_free(d);
+ return libbpf_err(err);
+}
+
+#define BTF_UNPROCESSED_ID ((__u32)-1)
+#define BTF_IN_PROGRESS_ID ((__u32)-2)
+
+struct btf_dedup {
+ /* .BTF section to be deduped in-place */
+ struct btf *btf;
+ /*
+ * Optional .BTF.ext section. When provided, any strings referenced
+ * from it will be taken into account when deduping strings
+ */
+ struct btf_ext *btf_ext;
+ /*
+ * This is a map from any type's signature hash to a list of possible
+ * canonical representative type candidates. Hash collisions are
+ * ignored, so even types of various kinds can share same list of
+ * candidates, which is fine because we rely on subsequent
+ * btf_xxx_equal() checks to authoritatively verify type equality.
+ */
+ struct hashmap *dedup_table;
+ /* Canonical types map */
+ __u32 *map;
+ /* Hypothetical mapping, used during type graph equivalence checks */
+ __u32 *hypot_map;
+ __u32 *hypot_list;
+ size_t hypot_cnt;
+ size_t hypot_cap;
+ /* Whether hypothetical mapping, if successful, would need to adjust
+ * already canonicalized types (due to a new forward declaration to
+ * concrete type resolution). In such case, during split BTF dedup
+ * candidate type would still be considered as different, because base
+ * BTF is considered to be immutable.
+ */
+ bool hypot_adjust_canon;
+ /* Various option modifying behavior of algorithm */
+ struct btf_dedup_opts opts;
+ /* temporary strings deduplication state */
+ struct strset *strs_set;
+};
+
+static long hash_combine(long h, long value)
+{
+ return h * 31 + value;
+}
+
+#define for_each_dedup_cand(d, node, hash) \
+ hashmap__for_each_key_entry(d->dedup_table, node, hash)
+
+static int btf_dedup_table_add(struct btf_dedup *d, long hash, __u32 type_id)
+{
+ return hashmap__append(d->dedup_table, hash, type_id);
+}
+
+static int btf_dedup_hypot_map_add(struct btf_dedup *d,
+ __u32 from_id, __u32 to_id)
+{
+ if (d->hypot_cnt == d->hypot_cap) {
+ __u32 *new_list;
+
+ d->hypot_cap += max((size_t)16, d->hypot_cap / 2);
+ new_list = libbpf_reallocarray(d->hypot_list, d->hypot_cap, sizeof(__u32));
+ if (!new_list)
+ return -ENOMEM;
+ d->hypot_list = new_list;
+ }
+ d->hypot_list[d->hypot_cnt++] = from_id;
+ d->hypot_map[from_id] = to_id;
+ return 0;
+}
+
+static void btf_dedup_clear_hypot_map(struct btf_dedup *d)
+{
+ int i;
+
+ for (i = 0; i < d->hypot_cnt; i++)
+ d->hypot_map[d->hypot_list[i]] = BTF_UNPROCESSED_ID;
+ d->hypot_cnt = 0;
+ d->hypot_adjust_canon = false;
+}
+
+static void btf_dedup_free(struct btf_dedup *d)
+{
+ hashmap__free(d->dedup_table);
+ d->dedup_table = NULL;
+
+ free(d->map);
+ d->map = NULL;
+
+ free(d->hypot_map);
+ d->hypot_map = NULL;
+
+ free(d->hypot_list);
+ d->hypot_list = NULL;
+
+ free(d);
+}
+
+static size_t btf_dedup_identity_hash_fn(long key, void *ctx)
+{
+ return key;
+}
+
+static size_t btf_dedup_collision_hash_fn(long key, void *ctx)
+{
+ return 0;
+}
+
+static bool btf_dedup_equal_fn(long k1, long k2, void *ctx)
+{
+ return k1 == k2;
+}
+
+static struct btf_dedup *btf_dedup_new(struct btf *btf, const struct btf_dedup_opts *opts)
+{
+ struct btf_dedup *d = calloc(1, sizeof(struct btf_dedup));
+ hashmap_hash_fn hash_fn = btf_dedup_identity_hash_fn;
+ int i, err = 0, type_cnt;
+
+ if (!d)
+ return ERR_PTR(-ENOMEM);
+
+ if (OPTS_GET(opts, force_collisions, false))
+ hash_fn = btf_dedup_collision_hash_fn;
+
+ d->btf = btf;
+ d->btf_ext = OPTS_GET(opts, btf_ext, NULL);
+
+ d->dedup_table = hashmap__new(hash_fn, btf_dedup_equal_fn, NULL);
+ if (IS_ERR(d->dedup_table)) {
+ err = PTR_ERR(d->dedup_table);
+ d->dedup_table = NULL;
+ goto done;
+ }
+
+ type_cnt = btf__type_cnt(btf);
+ d->map = malloc(sizeof(__u32) * type_cnt);
+ if (!d->map) {
+ err = -ENOMEM;
+ goto done;
+ }
+ /* special BTF "void" type is made canonical immediately */
+ d->map[0] = 0;
+ for (i = 1; i < type_cnt; i++) {
+ struct btf_type *t = btf_type_by_id(d->btf, i);
+
+ /* VAR and DATASEC are never deduped and are self-canonical */
+ if (btf_is_var(t) || btf_is_datasec(t))
+ d->map[i] = i;
+ else
+ d->map[i] = BTF_UNPROCESSED_ID;
+ }
+
+ d->hypot_map = malloc(sizeof(__u32) * type_cnt);
+ if (!d->hypot_map) {
+ err = -ENOMEM;
+ goto done;
+ }
+ for (i = 0; i < type_cnt; i++)
+ d->hypot_map[i] = BTF_UNPROCESSED_ID;
+
+done:
+ if (err) {
+ btf_dedup_free(d);
+ return ERR_PTR(err);
+ }
+
+ return d;
+}
+
+/*
+ * Iterate over all possible places in .BTF and .BTF.ext that can reference
+ * string and pass pointer to it to a provided callback `fn`.
+ */
+static int btf_for_each_str_off(struct btf_dedup *d, str_off_visit_fn fn, void *ctx)
+{
+ int i, r;
+
+ for (i = 0; i < d->btf->nr_types; i++) {
+ struct btf_type *t = btf_type_by_id(d->btf, d->btf->start_id + i);
+
+ r = btf_type_visit_str_offs(t, fn, ctx);
+ if (r)
+ return r;
+ }
+
+ if (!d->btf_ext)
+ return 0;
+
+ r = btf_ext_visit_str_offs(d->btf_ext, fn, ctx);
+ if (r)
+ return r;
+
+ return 0;
+}
+
+static int strs_dedup_remap_str_off(__u32 *str_off_ptr, void *ctx)
+{
+ struct btf_dedup *d = ctx;
+ __u32 str_off = *str_off_ptr;
+ const char *s;
+ int off, err;
+
+ /* don't touch empty string or string in main BTF */
+ if (str_off == 0 || str_off < d->btf->start_str_off)
+ return 0;
+
+ s = btf__str_by_offset(d->btf, str_off);
+ if (d->btf->base_btf) {
+ err = btf__find_str(d->btf->base_btf, s);
+ if (err >= 0) {
+ *str_off_ptr = err;
+ return 0;
+ }
+ if (err != -ENOENT)
+ return err;
+ }
+
+ off = strset__add_str(d->strs_set, s);
+ if (off < 0)
+ return off;
+
+ *str_off_ptr = d->btf->start_str_off + off;
+ return 0;
+}
+
+/*
+ * Dedup string and filter out those that are not referenced from either .BTF
+ * or .BTF.ext (if provided) sections.
+ *
+ * This is done by building index of all strings in BTF's string section,
+ * then iterating over all entities that can reference strings (e.g., type
+ * names, struct field names, .BTF.ext line info, etc) and marking corresponding
+ * strings as used. After that all used strings are deduped and compacted into
+ * sequential blob of memory and new offsets are calculated. Then all the string
+ * references are iterated again and rewritten using new offsets.
+ */
+static int btf_dedup_strings(struct btf_dedup *d)
+{
+ int err;
+
+ if (d->btf->strs_deduped)
+ return 0;
+
+ d->strs_set = strset__new(BTF_MAX_STR_OFFSET, NULL, 0);
+ if (IS_ERR(d->strs_set)) {
+ err = PTR_ERR(d->strs_set);
+ goto err_out;
+ }
+
+ if (!d->btf->base_btf) {
+ /* insert empty string; we won't be looking it up during strings
+ * dedup, but it's good to have it for generic BTF string lookups
+ */
+ err = strset__add_str(d->strs_set, "");
+ if (err < 0)
+ goto err_out;
+ }
+
+ /* remap string offsets */
+ err = btf_for_each_str_off(d, strs_dedup_remap_str_off, d);
+ if (err)
+ goto err_out;
+
+ /* replace BTF string data and hash with deduped ones */
+ strset__free(d->btf->strs_set);
+ d->btf->hdr->str_len = strset__data_size(d->strs_set);
+ d->btf->strs_set = d->strs_set;
+ d->strs_set = NULL;
+ d->btf->strs_deduped = true;
+ return 0;
+
+err_out:
+ strset__free(d->strs_set);
+ d->strs_set = NULL;
+
+ return err;
+}
+
+static long btf_hash_common(struct btf_type *t)
+{
+ long h;
+
+ h = hash_combine(0, t->name_off);
+ h = hash_combine(h, t->info);
+ h = hash_combine(h, t->size);
+ return h;
+}
+
+static bool btf_equal_common(struct btf_type *t1, struct btf_type *t2)
+{
+ return t1->name_off == t2->name_off &&
+ t1->info == t2->info &&
+ t1->size == t2->size;
+}
+
+/* Calculate type signature hash of INT or TAG. */
+static long btf_hash_int_decl_tag(struct btf_type *t)
+{
+ __u32 info = *(__u32 *)(t + 1);
+ long h;
+
+ h = btf_hash_common(t);
+ h = hash_combine(h, info);
+ return h;
+}
+
+/* Check structural equality of two INTs or TAGs. */
+static bool btf_equal_int_tag(struct btf_type *t1, struct btf_type *t2)
+{
+ __u32 info1, info2;
+
+ if (!btf_equal_common(t1, t2))
+ return false;
+ info1 = *(__u32 *)(t1 + 1);
+ info2 = *(__u32 *)(t2 + 1);
+ return info1 == info2;
+}
+
+/* Calculate type signature hash of ENUM/ENUM64. */
+static long btf_hash_enum(struct btf_type *t)
+{
+ long h;
+
+ /* don't hash vlen, enum members and size to support enum fwd resolving */
+ h = hash_combine(0, t->name_off);
+ return h;
+}
+
+static bool btf_equal_enum_members(struct btf_type *t1, struct btf_type *t2)
+{
+ const struct btf_enum *m1, *m2;
+ __u16 vlen;
+ int i;
+
+ vlen = btf_vlen(t1);
+ m1 = btf_enum(t1);
+ m2 = btf_enum(t2);
+ for (i = 0; i < vlen; i++) {
+ if (m1->name_off != m2->name_off || m1->val != m2->val)
+ return false;
+ m1++;
+ m2++;
+ }
+ return true;
+}
+
+static bool btf_equal_enum64_members(struct btf_type *t1, struct btf_type *t2)
+{
+ const struct btf_enum64 *m1, *m2;
+ __u16 vlen;
+ int i;
+
+ vlen = btf_vlen(t1);
+ m1 = btf_enum64(t1);
+ m2 = btf_enum64(t2);
+ for (i = 0; i < vlen; i++) {
+ if (m1->name_off != m2->name_off || m1->val_lo32 != m2->val_lo32 ||
+ m1->val_hi32 != m2->val_hi32)
+ return false;
+ m1++;
+ m2++;
+ }
+ return true;
+}
+
+/* Check structural equality of two ENUMs or ENUM64s. */
+static bool btf_equal_enum(struct btf_type *t1, struct btf_type *t2)
+{
+ if (!btf_equal_common(t1, t2))
+ return false;
+
+ /* t1 & t2 kinds are identical because of btf_equal_common */
+ if (btf_kind(t1) == BTF_KIND_ENUM)
+ return btf_equal_enum_members(t1, t2);
+ else
+ return btf_equal_enum64_members(t1, t2);
+}
+
+static inline bool btf_is_enum_fwd(struct btf_type *t)
+{
+ return btf_is_any_enum(t) && btf_vlen(t) == 0;
+}
+
+static bool btf_compat_enum(struct btf_type *t1, struct btf_type *t2)
+{
+ if (!btf_is_enum_fwd(t1) && !btf_is_enum_fwd(t2))
+ return btf_equal_enum(t1, t2);
+ /* At this point either t1 or t2 or both are forward declarations, thus:
+ * - skip comparing vlen because it is zero for forward declarations;
+ * - skip comparing size to allow enum forward declarations
+ * to be compatible with enum64 full declarations;
+ * - skip comparing kind for the same reason.
+ */
+ return t1->name_off == t2->name_off &&
+ btf_is_any_enum(t1) && btf_is_any_enum(t2);
+}
+
+/*
+ * Calculate type signature hash of STRUCT/UNION, ignoring referenced type IDs,
+ * as referenced type IDs equivalence is established separately during type
+ * graph equivalence check algorithm.
+ */
+static long btf_hash_struct(struct btf_type *t)
+{
+ const struct btf_member *member = btf_members(t);
+ __u32 vlen = btf_vlen(t);
+ long h = btf_hash_common(t);
+ int i;
+
+ for (i = 0; i < vlen; i++) {
+ h = hash_combine(h, member->name_off);
+ h = hash_combine(h, member->offset);
+ /* no hashing of referenced type ID, it can be unresolved yet */
+ member++;
+ }
+ return h;
+}
+
+/*
+ * Check structural compatibility of two STRUCTs/UNIONs, ignoring referenced
+ * type IDs. This check is performed during type graph equivalence check and
+ * referenced types equivalence is checked separately.
+ */
+static bool btf_shallow_equal_struct(struct btf_type *t1, struct btf_type *t2)
+{
+ const struct btf_member *m1, *m2;
+ __u16 vlen;
+ int i;
+
+ if (!btf_equal_common(t1, t2))
+ return false;
+
+ vlen = btf_vlen(t1);
+ m1 = btf_members(t1);
+ m2 = btf_members(t2);
+ for (i = 0; i < vlen; i++) {
+ if (m1->name_off != m2->name_off || m1->offset != m2->offset)
+ return false;
+ m1++;
+ m2++;
+ }
+ return true;
+}
+
+/*
+ * Calculate type signature hash of ARRAY, including referenced type IDs,
+ * under assumption that they were already resolved to canonical type IDs and
+ * are not going to change.
+ */
+static long btf_hash_array(struct btf_type *t)
+{
+ const struct btf_array *info = btf_array(t);
+ long h = btf_hash_common(t);
+
+ h = hash_combine(h, info->type);
+ h = hash_combine(h, info->index_type);
+ h = hash_combine(h, info->nelems);
+ return h;
+}
+
+/*
+ * Check exact equality of two ARRAYs, taking into account referenced
+ * type IDs, under assumption that they were already resolved to canonical
+ * type IDs and are not going to change.
+ * This function is called during reference types deduplication to compare
+ * ARRAY to potential canonical representative.
+ */
+static bool btf_equal_array(struct btf_type *t1, struct btf_type *t2)
+{
+ const struct btf_array *info1, *info2;
+
+ if (!btf_equal_common(t1, t2))
+ return false;
+
+ info1 = btf_array(t1);
+ info2 = btf_array(t2);
+ return info1->type == info2->type &&
+ info1->index_type == info2->index_type &&
+ info1->nelems == info2->nelems;
+}
+
+/*
+ * Check structural compatibility of two ARRAYs, ignoring referenced type
+ * IDs. This check is performed during type graph equivalence check and
+ * referenced types equivalence is checked separately.
+ */
+static bool btf_compat_array(struct btf_type *t1, struct btf_type *t2)
+{
+ if (!btf_equal_common(t1, t2))
+ return false;
+
+ return btf_array(t1)->nelems == btf_array(t2)->nelems;
+}
+
+/*
+ * Calculate type signature hash of FUNC_PROTO, including referenced type IDs,
+ * under assumption that they were already resolved to canonical type IDs and
+ * are not going to change.
+ */
+static long btf_hash_fnproto(struct btf_type *t)
+{
+ const struct btf_param *member = btf_params(t);
+ __u16 vlen = btf_vlen(t);
+ long h = btf_hash_common(t);
+ int i;
+
+ for (i = 0; i < vlen; i++) {
+ h = hash_combine(h, member->name_off);
+ h = hash_combine(h, member->type);
+ member++;
+ }
+ return h;
+}
+
+/*
+ * Check exact equality of two FUNC_PROTOs, taking into account referenced
+ * type IDs, under assumption that they were already resolved to canonical
+ * type IDs and are not going to change.
+ * This function is called during reference types deduplication to compare
+ * FUNC_PROTO to potential canonical representative.
+ */
+static bool btf_equal_fnproto(struct btf_type *t1, struct btf_type *t2)
+{
+ const struct btf_param *m1, *m2;
+ __u16 vlen;
+ int i;
+
+ if (!btf_equal_common(t1, t2))
+ return false;
+
+ vlen = btf_vlen(t1);
+ m1 = btf_params(t1);
+ m2 = btf_params(t2);
+ for (i = 0; i < vlen; i++) {
+ if (m1->name_off != m2->name_off || m1->type != m2->type)
+ return false;
+ m1++;
+ m2++;
+ }
+ return true;
+}
+
+/*
+ * Check structural compatibility of two FUNC_PROTOs, ignoring referenced type
+ * IDs. This check is performed during type graph equivalence check and
+ * referenced types equivalence is checked separately.
+ */
+static bool btf_compat_fnproto(struct btf_type *t1, struct btf_type *t2)
+{
+ const struct btf_param *m1, *m2;
+ __u16 vlen;
+ int i;
+
+ /* skip return type ID */
+ if (t1->name_off != t2->name_off || t1->info != t2->info)
+ return false;
+
+ vlen = btf_vlen(t1);
+ m1 = btf_params(t1);
+ m2 = btf_params(t2);
+ for (i = 0; i < vlen; i++) {
+ if (m1->name_off != m2->name_off)
+ return false;
+ m1++;
+ m2++;
+ }
+ return true;
+}
+
+/* Prepare split BTF for deduplication by calculating hashes of base BTF's
+ * types and initializing the rest of the state (canonical type mapping) for
+ * the fixed base BTF part.
+ */
+static int btf_dedup_prep(struct btf_dedup *d)
+{
+ struct btf_type *t;
+ int type_id;
+ long h;
+
+ if (!d->btf->base_btf)
+ return 0;
+
+ for (type_id = 1; type_id < d->btf->start_id; type_id++) {
+ t = btf_type_by_id(d->btf, type_id);
+
+ /* all base BTF types are self-canonical by definition */
+ d->map[type_id] = type_id;
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_VAR:
+ case BTF_KIND_DATASEC:
+ /* VAR and DATASEC are never hash/deduplicated */
+ continue;
+ case BTF_KIND_CONST:
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_RESTRICT:
+ case BTF_KIND_PTR:
+ case BTF_KIND_FWD:
+ case BTF_KIND_TYPEDEF:
+ case BTF_KIND_FUNC:
+ case BTF_KIND_FLOAT:
+ case BTF_KIND_TYPE_TAG:
+ h = btf_hash_common(t);
+ break;
+ case BTF_KIND_INT:
+ case BTF_KIND_DECL_TAG:
+ h = btf_hash_int_decl_tag(t);
+ break;
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ h = btf_hash_enum(t);
+ break;
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION:
+ h = btf_hash_struct(t);
+ break;
+ case BTF_KIND_ARRAY:
+ h = btf_hash_array(t);
+ break;
+ case BTF_KIND_FUNC_PROTO:
+ h = btf_hash_fnproto(t);
+ break;
+ default:
+ pr_debug("unknown kind %d for type [%d]\n", btf_kind(t), type_id);
+ return -EINVAL;
+ }
+ if (btf_dedup_table_add(d, h, type_id))
+ return -ENOMEM;
+ }
+
+ return 0;
+}
+
+/*
+ * Deduplicate primitive types, that can't reference other types, by calculating
+ * their type signature hash and comparing them with any possible canonical
+ * candidate. If no canonical candidate matches, type itself is marked as
+ * canonical and is added into `btf_dedup->dedup_table` as another candidate.
+ */
+static int btf_dedup_prim_type(struct btf_dedup *d, __u32 type_id)
+{
+ struct btf_type *t = btf_type_by_id(d->btf, type_id);
+ struct hashmap_entry *hash_entry;
+ struct btf_type *cand;
+ /* if we don't find equivalent type, then we are canonical */
+ __u32 new_id = type_id;
+ __u32 cand_id;
+ long h;
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_CONST:
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_RESTRICT:
+ case BTF_KIND_PTR:
+ case BTF_KIND_TYPEDEF:
+ case BTF_KIND_ARRAY:
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION:
+ case BTF_KIND_FUNC:
+ case BTF_KIND_FUNC_PROTO:
+ case BTF_KIND_VAR:
+ case BTF_KIND_DATASEC:
+ case BTF_KIND_DECL_TAG:
+ case BTF_KIND_TYPE_TAG:
+ return 0;
+
+ case BTF_KIND_INT:
+ h = btf_hash_int_decl_tag(t);
+ for_each_dedup_cand(d, hash_entry, h) {
+ cand_id = hash_entry->value;
+ cand = btf_type_by_id(d->btf, cand_id);
+ if (btf_equal_int_tag(t, cand)) {
+ new_id = cand_id;
+ break;
+ }
+ }
+ break;
+
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ h = btf_hash_enum(t);
+ for_each_dedup_cand(d, hash_entry, h) {
+ cand_id = hash_entry->value;
+ cand = btf_type_by_id(d->btf, cand_id);
+ if (btf_equal_enum(t, cand)) {
+ new_id = cand_id;
+ break;
+ }
+ if (btf_compat_enum(t, cand)) {
+ if (btf_is_enum_fwd(t)) {
+ /* resolve fwd to full enum */
+ new_id = cand_id;
+ break;
+ }
+ /* resolve canonical enum fwd to full enum */
+ d->map[cand_id] = type_id;
+ }
+ }
+ break;
+
+ case BTF_KIND_FWD:
+ case BTF_KIND_FLOAT:
+ h = btf_hash_common(t);
+ for_each_dedup_cand(d, hash_entry, h) {
+ cand_id = hash_entry->value;
+ cand = btf_type_by_id(d->btf, cand_id);
+ if (btf_equal_common(t, cand)) {
+ new_id = cand_id;
+ break;
+ }
+ }
+ break;
+
+ default:
+ return -EINVAL;
+ }
+
+ d->map[type_id] = new_id;
+ if (type_id == new_id && btf_dedup_table_add(d, h, type_id))
+ return -ENOMEM;
+
+ return 0;
+}
+
+static int btf_dedup_prim_types(struct btf_dedup *d)
+{
+ int i, err;
+
+ for (i = 0; i < d->btf->nr_types; i++) {
+ err = btf_dedup_prim_type(d, d->btf->start_id + i);
+ if (err)
+ return err;
+ }
+ return 0;
+}
+
+/*
+ * Check whether type is already mapped into canonical one (could be to itself).
+ */
+static inline bool is_type_mapped(struct btf_dedup *d, uint32_t type_id)
+{
+ return d->map[type_id] <= BTF_MAX_NR_TYPES;
+}
+
+/*
+ * Resolve type ID into its canonical type ID, if any; otherwise return original
+ * type ID. If type is FWD and is resolved into STRUCT/UNION already, follow
+ * STRUCT/UNION link and resolve it into canonical type ID as well.
+ */
+static inline __u32 resolve_type_id(struct btf_dedup *d, __u32 type_id)
+{
+ while (is_type_mapped(d, type_id) && d->map[type_id] != type_id)
+ type_id = d->map[type_id];
+ return type_id;
+}
+
+/*
+ * Resolve FWD to underlying STRUCT/UNION, if any; otherwise return original
+ * type ID.
+ */
+static uint32_t resolve_fwd_id(struct btf_dedup *d, uint32_t type_id)
+{
+ __u32 orig_type_id = type_id;
+
+ if (!btf_is_fwd(btf__type_by_id(d->btf, type_id)))
+ return type_id;
+
+ while (is_type_mapped(d, type_id) && d->map[type_id] != type_id)
+ type_id = d->map[type_id];
+
+ if (!btf_is_fwd(btf__type_by_id(d->btf, type_id)))
+ return type_id;
+
+ return orig_type_id;
+}
+
+
+static inline __u16 btf_fwd_kind(struct btf_type *t)
+{
+ return btf_kflag(t) ? BTF_KIND_UNION : BTF_KIND_STRUCT;
+}
+
+/* Check if given two types are identical ARRAY definitions */
+static bool btf_dedup_identical_arrays(struct btf_dedup *d, __u32 id1, __u32 id2)
+{
+ struct btf_type *t1, *t2;
+
+ t1 = btf_type_by_id(d->btf, id1);
+ t2 = btf_type_by_id(d->btf, id2);
+ if (!btf_is_array(t1) || !btf_is_array(t2))
+ return false;
+
+ return btf_equal_array(t1, t2);
+}
+
+/* Check if given two types are identical STRUCT/UNION definitions */
+static bool btf_dedup_identical_structs(struct btf_dedup *d, __u32 id1, __u32 id2)
+{
+ const struct btf_member *m1, *m2;
+ struct btf_type *t1, *t2;
+ int n, i;
+
+ t1 = btf_type_by_id(d->btf, id1);
+ t2 = btf_type_by_id(d->btf, id2);
+
+ if (!btf_is_composite(t1) || btf_kind(t1) != btf_kind(t2))
+ return false;
+
+ if (!btf_shallow_equal_struct(t1, t2))
+ return false;
+
+ m1 = btf_members(t1);
+ m2 = btf_members(t2);
+ for (i = 0, n = btf_vlen(t1); i < n; i++, m1++, m2++) {
+ if (m1->type != m2->type &&
+ !btf_dedup_identical_arrays(d, m1->type, m2->type) &&
+ !btf_dedup_identical_structs(d, m1->type, m2->type))
+ return false;
+ }
+ return true;
+}
+
+/*
+ * Check equivalence of BTF type graph formed by candidate struct/union (we'll
+ * call it "candidate graph" in this description for brevity) to a type graph
+ * formed by (potential) canonical struct/union ("canonical graph" for brevity
+ * here, though keep in mind that not all types in canonical graph are
+ * necessarily canonical representatives themselves, some of them might be
+ * duplicates or its uniqueness might not have been established yet).
+ * Returns:
+ * - >0, if type graphs are equivalent;
+ * - 0, if not equivalent;
+ * - <0, on error.
+ *
+ * Algorithm performs side-by-side DFS traversal of both type graphs and checks
+ * equivalence of BTF types at each step. If at any point BTF types in candidate
+ * and canonical graphs are not compatible structurally, whole graphs are
+ * incompatible. If types are structurally equivalent (i.e., all information
+ * except referenced type IDs is exactly the same), a mapping from `canon_id` to
+ * a `cand_id` is recored in hypothetical mapping (`btf_dedup->hypot_map`).
+ * If a type references other types, then those referenced types are checked
+ * for equivalence recursively.
+ *
+ * During DFS traversal, if we find that for current `canon_id` type we
+ * already have some mapping in hypothetical map, we check for two possible
+ * situations:
+ * - `canon_id` is mapped to exactly the same type as `cand_id`. This will
+ * happen when type graphs have cycles. In this case we assume those two
+ * types are equivalent.
+ * - `canon_id` is mapped to different type. This is contradiction in our
+ * hypothetical mapping, because same graph in canonical graph corresponds
+ * to two different types in candidate graph, which for equivalent type
+ * graphs shouldn't happen. This condition terminates equivalence check
+ * with negative result.
+ *
+ * If type graphs traversal exhausts types to check and find no contradiction,
+ * then type graphs are equivalent.
+ *
+ * When checking types for equivalence, there is one special case: FWD types.
+ * If FWD type resolution is allowed and one of the types (either from canonical
+ * or candidate graph) is FWD and other is STRUCT/UNION (depending on FWD's kind
+ * flag) and their names match, hypothetical mapping is updated to point from
+ * FWD to STRUCT/UNION. If graphs will be determined as equivalent successfully,
+ * this mapping will be used to record FWD -> STRUCT/UNION mapping permanently.
+ *
+ * Technically, this could lead to incorrect FWD to STRUCT/UNION resolution,
+ * if there are two exactly named (or anonymous) structs/unions that are
+ * compatible structurally, one of which has FWD field, while other is concrete
+ * STRUCT/UNION, but according to C sources they are different structs/unions
+ * that are referencing different types with the same name. This is extremely
+ * unlikely to happen, but btf_dedup API allows to disable FWD resolution if
+ * this logic is causing problems.
+ *
+ * Doing FWD resolution means that both candidate and/or canonical graphs can
+ * consists of portions of the graph that come from multiple compilation units.
+ * This is due to the fact that types within single compilation unit are always
+ * deduplicated and FWDs are already resolved, if referenced struct/union
+ * definiton is available. So, if we had unresolved FWD and found corresponding
+ * STRUCT/UNION, they will be from different compilation units. This
+ * consequently means that when we "link" FWD to corresponding STRUCT/UNION,
+ * type graph will likely have at least two different BTF types that describe
+ * same type (e.g., most probably there will be two different BTF types for the
+ * same 'int' primitive type) and could even have "overlapping" parts of type
+ * graph that describe same subset of types.
+ *
+ * This in turn means that our assumption that each type in canonical graph
+ * must correspond to exactly one type in candidate graph might not hold
+ * anymore and will make it harder to detect contradictions using hypothetical
+ * map. To handle this problem, we allow to follow FWD -> STRUCT/UNION
+ * resolution only in canonical graph. FWDs in candidate graphs are never
+ * resolved. To see why it's OK, let's check all possible situations w.r.t. FWDs
+ * that can occur:
+ * - Both types in canonical and candidate graphs are FWDs. If they are
+ * structurally equivalent, then they can either be both resolved to the
+ * same STRUCT/UNION or not resolved at all. In both cases they are
+ * equivalent and there is no need to resolve FWD on candidate side.
+ * - Both types in canonical and candidate graphs are concrete STRUCT/UNION,
+ * so nothing to resolve as well, algorithm will check equivalence anyway.
+ * - Type in canonical graph is FWD, while type in candidate is concrete
+ * STRUCT/UNION. In this case candidate graph comes from single compilation
+ * unit, so there is exactly one BTF type for each unique C type. After
+ * resolving FWD into STRUCT/UNION, there might be more than one BTF type
+ * in canonical graph mapping to single BTF type in candidate graph, but
+ * because hypothetical mapping maps from canonical to candidate types, it's
+ * alright, and we still maintain the property of having single `canon_id`
+ * mapping to single `cand_id` (there could be two different `canon_id`
+ * mapped to the same `cand_id`, but it's not contradictory).
+ * - Type in canonical graph is concrete STRUCT/UNION, while type in candidate
+ * graph is FWD. In this case we are just going to check compatibility of
+ * STRUCT/UNION and corresponding FWD, and if they are compatible, we'll
+ * assume that whatever STRUCT/UNION FWD resolves to must be equivalent to
+ * a concrete STRUCT/UNION from canonical graph. If the rest of type graphs
+ * turn out equivalent, we'll re-resolve FWD to concrete STRUCT/UNION from
+ * canonical graph.
+ */
+static int btf_dedup_is_equiv(struct btf_dedup *d, __u32 cand_id,
+ __u32 canon_id)
+{
+ struct btf_type *cand_type;
+ struct btf_type *canon_type;
+ __u32 hypot_type_id;
+ __u16 cand_kind;
+ __u16 canon_kind;
+ int i, eq;
+
+ /* if both resolve to the same canonical, they must be equivalent */
+ if (resolve_type_id(d, cand_id) == resolve_type_id(d, canon_id))
+ return 1;
+
+ canon_id = resolve_fwd_id(d, canon_id);
+
+ hypot_type_id = d->hypot_map[canon_id];
+ if (hypot_type_id <= BTF_MAX_NR_TYPES) {
+ if (hypot_type_id == cand_id)
+ return 1;
+ /* In some cases compiler will generate different DWARF types
+ * for *identical* array type definitions and use them for
+ * different fields within the *same* struct. This breaks type
+ * equivalence check, which makes an assumption that candidate
+ * types sub-graph has a consistent and deduped-by-compiler
+ * types within a single CU. So work around that by explicitly
+ * allowing identical array types here.
+ */
+ if (btf_dedup_identical_arrays(d, hypot_type_id, cand_id))
+ return 1;
+ /* It turns out that similar situation can happen with
+ * struct/union sometimes, sigh... Handle the case where
+ * structs/unions are exactly the same, down to the referenced
+ * type IDs. Anything more complicated (e.g., if referenced
+ * types are different, but equivalent) is *way more*
+ * complicated and requires a many-to-many equivalence mapping.
+ */
+ if (btf_dedup_identical_structs(d, hypot_type_id, cand_id))
+ return 1;
+ return 0;
+ }
+
+ if (btf_dedup_hypot_map_add(d, canon_id, cand_id))
+ return -ENOMEM;
+
+ cand_type = btf_type_by_id(d->btf, cand_id);
+ canon_type = btf_type_by_id(d->btf, canon_id);
+ cand_kind = btf_kind(cand_type);
+ canon_kind = btf_kind(canon_type);
+
+ if (cand_type->name_off != canon_type->name_off)
+ return 0;
+
+ /* FWD <--> STRUCT/UNION equivalence check, if enabled */
+ if ((cand_kind == BTF_KIND_FWD || canon_kind == BTF_KIND_FWD)
+ && cand_kind != canon_kind) {
+ __u16 real_kind;
+ __u16 fwd_kind;
+
+ if (cand_kind == BTF_KIND_FWD) {
+ real_kind = canon_kind;
+ fwd_kind = btf_fwd_kind(cand_type);
+ } else {
+ real_kind = cand_kind;
+ fwd_kind = btf_fwd_kind(canon_type);
+ /* we'd need to resolve base FWD to STRUCT/UNION */
+ if (fwd_kind == real_kind && canon_id < d->btf->start_id)
+ d->hypot_adjust_canon = true;
+ }
+ return fwd_kind == real_kind;
+ }
+
+ if (cand_kind != canon_kind)
+ return 0;
+
+ switch (cand_kind) {
+ case BTF_KIND_INT:
+ return btf_equal_int_tag(cand_type, canon_type);
+
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ return btf_compat_enum(cand_type, canon_type);
+
+ case BTF_KIND_FWD:
+ case BTF_KIND_FLOAT:
+ return btf_equal_common(cand_type, canon_type);
+
+ case BTF_KIND_CONST:
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_RESTRICT:
+ case BTF_KIND_PTR:
+ case BTF_KIND_TYPEDEF:
+ case BTF_KIND_FUNC:
+ case BTF_KIND_TYPE_TAG:
+ if (cand_type->info != canon_type->info)
+ return 0;
+ return btf_dedup_is_equiv(d, cand_type->type, canon_type->type);
+
+ case BTF_KIND_ARRAY: {
+ const struct btf_array *cand_arr, *canon_arr;
+
+ if (!btf_compat_array(cand_type, canon_type))
+ return 0;
+ cand_arr = btf_array(cand_type);
+ canon_arr = btf_array(canon_type);
+ eq = btf_dedup_is_equiv(d, cand_arr->index_type, canon_arr->index_type);
+ if (eq <= 0)
+ return eq;
+ return btf_dedup_is_equiv(d, cand_arr->type, canon_arr->type);
+ }
+
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION: {
+ const struct btf_member *cand_m, *canon_m;
+ __u16 vlen;
+
+ if (!btf_shallow_equal_struct(cand_type, canon_type))
+ return 0;
+ vlen = btf_vlen(cand_type);
+ cand_m = btf_members(cand_type);
+ canon_m = btf_members(canon_type);
+ for (i = 0; i < vlen; i++) {
+ eq = btf_dedup_is_equiv(d, cand_m->type, canon_m->type);
+ if (eq <= 0)
+ return eq;
+ cand_m++;
+ canon_m++;
+ }
+
+ return 1;
+ }
+
+ case BTF_KIND_FUNC_PROTO: {
+ const struct btf_param *cand_p, *canon_p;
+ __u16 vlen;
+
+ if (!btf_compat_fnproto(cand_type, canon_type))
+ return 0;
+ eq = btf_dedup_is_equiv(d, cand_type->type, canon_type->type);
+ if (eq <= 0)
+ return eq;
+ vlen = btf_vlen(cand_type);
+ cand_p = btf_params(cand_type);
+ canon_p = btf_params(canon_type);
+ for (i = 0; i < vlen; i++) {
+ eq = btf_dedup_is_equiv(d, cand_p->type, canon_p->type);
+ if (eq <= 0)
+ return eq;
+ cand_p++;
+ canon_p++;
+ }
+ return 1;
+ }
+
+ default:
+ return -EINVAL;
+ }
+ return 0;
+}
+
+/*
+ * Use hypothetical mapping, produced by successful type graph equivalence
+ * check, to augment existing struct/union canonical mapping, where possible.
+ *
+ * If BTF_KIND_FWD resolution is allowed, this mapping is also used to record
+ * FWD -> STRUCT/UNION correspondence as well. FWD resolution is bidirectional:
+ * it doesn't matter if FWD type was part of canonical graph or candidate one,
+ * we are recording the mapping anyway. As opposed to carefulness required
+ * for struct/union correspondence mapping (described below), for FWD resolution
+ * it's not important, as by the time that FWD type (reference type) will be
+ * deduplicated all structs/unions will be deduped already anyway.
+ *
+ * Recording STRUCT/UNION mapping is purely a performance optimization and is
+ * not required for correctness. It needs to be done carefully to ensure that
+ * struct/union from candidate's type graph is not mapped into corresponding
+ * struct/union from canonical type graph that itself hasn't been resolved into
+ * canonical representative. The only guarantee we have is that canonical
+ * struct/union was determined as canonical and that won't change. But any
+ * types referenced through that struct/union fields could have been not yet
+ * resolved, so in case like that it's too early to establish any kind of
+ * correspondence between structs/unions.
+ *
+ * No canonical correspondence is derived for primitive types (they are already
+ * deduplicated completely already anyway) or reference types (they rely on
+ * stability of struct/union canonical relationship for equivalence checks).
+ */
+static void btf_dedup_merge_hypot_map(struct btf_dedup *d)
+{
+ __u32 canon_type_id, targ_type_id;
+ __u16 t_kind, c_kind;
+ __u32 t_id, c_id;
+ int i;
+
+ for (i = 0; i < d->hypot_cnt; i++) {
+ canon_type_id = d->hypot_list[i];
+ targ_type_id = d->hypot_map[canon_type_id];
+ t_id = resolve_type_id(d, targ_type_id);
+ c_id = resolve_type_id(d, canon_type_id);
+ t_kind = btf_kind(btf__type_by_id(d->btf, t_id));
+ c_kind = btf_kind(btf__type_by_id(d->btf, c_id));
+ /*
+ * Resolve FWD into STRUCT/UNION.
+ * It's ok to resolve FWD into STRUCT/UNION that's not yet
+ * mapped to canonical representative (as opposed to
+ * STRUCT/UNION <--> STRUCT/UNION mapping logic below), because
+ * eventually that struct is going to be mapped and all resolved
+ * FWDs will automatically resolve to correct canonical
+ * representative. This will happen before ref type deduping,
+ * which critically depends on stability of these mapping. This
+ * stability is not a requirement for STRUCT/UNION equivalence
+ * checks, though.
+ */
+
+ /* if it's the split BTF case, we still need to point base FWD
+ * to STRUCT/UNION in a split BTF, because FWDs from split BTF
+ * will be resolved against base FWD. If we don't point base
+ * canonical FWD to the resolved STRUCT/UNION, then all the
+ * FWDs in split BTF won't be correctly resolved to a proper
+ * STRUCT/UNION.
+ */
+ if (t_kind != BTF_KIND_FWD && c_kind == BTF_KIND_FWD)
+ d->map[c_id] = t_id;
+
+ /* if graph equivalence determined that we'd need to adjust
+ * base canonical types, then we need to only point base FWDs
+ * to STRUCTs/UNIONs and do no more modifications. For all
+ * other purposes the type graphs were not equivalent.
+ */
+ if (d->hypot_adjust_canon)
+ continue;
+
+ if (t_kind == BTF_KIND_FWD && c_kind != BTF_KIND_FWD)
+ d->map[t_id] = c_id;
+
+ if ((t_kind == BTF_KIND_STRUCT || t_kind == BTF_KIND_UNION) &&
+ c_kind != BTF_KIND_FWD &&
+ is_type_mapped(d, c_id) &&
+ !is_type_mapped(d, t_id)) {
+ /*
+ * as a perf optimization, we can map struct/union
+ * that's part of type graph we just verified for
+ * equivalence. We can do that for struct/union that has
+ * canonical representative only, though.
+ */
+ d->map[t_id] = c_id;
+ }
+ }
+}
+
+/*
+ * Deduplicate struct/union types.
+ *
+ * For each struct/union type its type signature hash is calculated, taking
+ * into account type's name, size, number, order and names of fields, but
+ * ignoring type ID's referenced from fields, because they might not be deduped
+ * completely until after reference types deduplication phase. This type hash
+ * is used to iterate over all potential canonical types, sharing same hash.
+ * For each canonical candidate we check whether type graphs that they form
+ * (through referenced types in fields and so on) are equivalent using algorithm
+ * implemented in `btf_dedup_is_equiv`. If such equivalence is found and
+ * BTF_KIND_FWD resolution is allowed, then hypothetical mapping
+ * (btf_dedup->hypot_map) produced by aforementioned type graph equivalence
+ * algorithm is used to record FWD -> STRUCT/UNION mapping. It's also used to
+ * potentially map other structs/unions to their canonical representatives,
+ * if such relationship hasn't yet been established. This speeds up algorithm
+ * by eliminating some of the duplicate work.
+ *
+ * If no matching canonical representative was found, struct/union is marked
+ * as canonical for itself and is added into btf_dedup->dedup_table hash map
+ * for further look ups.
+ */
+static int btf_dedup_struct_type(struct btf_dedup *d, __u32 type_id)
+{
+ struct btf_type *cand_type, *t;
+ struct hashmap_entry *hash_entry;
+ /* if we don't find equivalent type, then we are canonical */
+ __u32 new_id = type_id;
+ __u16 kind;
+ long h;
+
+ /* already deduped or is in process of deduping (loop detected) */
+ if (d->map[type_id] <= BTF_MAX_NR_TYPES)
+ return 0;
+
+ t = btf_type_by_id(d->btf, type_id);
+ kind = btf_kind(t);
+
+ if (kind != BTF_KIND_STRUCT && kind != BTF_KIND_UNION)
+ return 0;
+
+ h = btf_hash_struct(t);
+ for_each_dedup_cand(d, hash_entry, h) {
+ __u32 cand_id = hash_entry->value;
+ int eq;
+
+ /*
+ * Even though btf_dedup_is_equiv() checks for
+ * btf_shallow_equal_struct() internally when checking two
+ * structs (unions) for equivalence, we need to guard here
+ * from picking matching FWD type as a dedup candidate.
+ * This can happen due to hash collision. In such case just
+ * relying on btf_dedup_is_equiv() would lead to potentially
+ * creating a loop (FWD -> STRUCT and STRUCT -> FWD), because
+ * FWD and compatible STRUCT/UNION are considered equivalent.
+ */
+ cand_type = btf_type_by_id(d->btf, cand_id);
+ if (!btf_shallow_equal_struct(t, cand_type))
+ continue;
+
+ btf_dedup_clear_hypot_map(d);
+ eq = btf_dedup_is_equiv(d, type_id, cand_id);
+ if (eq < 0)
+ return eq;
+ if (!eq)
+ continue;
+ btf_dedup_merge_hypot_map(d);
+ if (d->hypot_adjust_canon) /* not really equivalent */
+ continue;
+ new_id = cand_id;
+ break;
+ }
+
+ d->map[type_id] = new_id;
+ if (type_id == new_id && btf_dedup_table_add(d, h, type_id))
+ return -ENOMEM;
+
+ return 0;
+}
+
+static int btf_dedup_struct_types(struct btf_dedup *d)
+{
+ int i, err;
+
+ for (i = 0; i < d->btf->nr_types; i++) {
+ err = btf_dedup_struct_type(d, d->btf->start_id + i);
+ if (err)
+ return err;
+ }
+ return 0;
+}
+
+/*
+ * Deduplicate reference type.
+ *
+ * Once all primitive and struct/union types got deduplicated, we can easily
+ * deduplicate all other (reference) BTF types. This is done in two steps:
+ *
+ * 1. Resolve all referenced type IDs into their canonical type IDs. This
+ * resolution can be done either immediately for primitive or struct/union types
+ * (because they were deduped in previous two phases) or recursively for
+ * reference types. Recursion will always terminate at either primitive or
+ * struct/union type, at which point we can "unwind" chain of reference types
+ * one by one. There is no danger of encountering cycles because in C type
+ * system the only way to form type cycle is through struct/union, so any chain
+ * of reference types, even those taking part in a type cycle, will inevitably
+ * reach struct/union at some point.
+ *
+ * 2. Once all referenced type IDs are resolved into canonical ones, BTF type
+ * becomes "stable", in the sense that no further deduplication will cause
+ * any changes to it. With that, it's now possible to calculate type's signature
+ * hash (this time taking into account referenced type IDs) and loop over all
+ * potential canonical representatives. If no match was found, current type
+ * will become canonical representative of itself and will be added into
+ * btf_dedup->dedup_table as another possible canonical representative.
+ */
+static int btf_dedup_ref_type(struct btf_dedup *d, __u32 type_id)
+{
+ struct hashmap_entry *hash_entry;
+ __u32 new_id = type_id, cand_id;
+ struct btf_type *t, *cand;
+ /* if we don't find equivalent type, then we are representative type */
+ int ref_type_id;
+ long h;
+
+ if (d->map[type_id] == BTF_IN_PROGRESS_ID)
+ return -ELOOP;
+ if (d->map[type_id] <= BTF_MAX_NR_TYPES)
+ return resolve_type_id(d, type_id);
+
+ t = btf_type_by_id(d->btf, type_id);
+ d->map[type_id] = BTF_IN_PROGRESS_ID;
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_CONST:
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_RESTRICT:
+ case BTF_KIND_PTR:
+ case BTF_KIND_TYPEDEF:
+ case BTF_KIND_FUNC:
+ case BTF_KIND_TYPE_TAG:
+ ref_type_id = btf_dedup_ref_type(d, t->type);
+ if (ref_type_id < 0)
+ return ref_type_id;
+ t->type = ref_type_id;
+
+ h = btf_hash_common(t);
+ for_each_dedup_cand(d, hash_entry, h) {
+ cand_id = hash_entry->value;
+ cand = btf_type_by_id(d->btf, cand_id);
+ if (btf_equal_common(t, cand)) {
+ new_id = cand_id;
+ break;
+ }
+ }
+ break;
+
+ case BTF_KIND_DECL_TAG:
+ ref_type_id = btf_dedup_ref_type(d, t->type);
+ if (ref_type_id < 0)
+ return ref_type_id;
+ t->type = ref_type_id;
+
+ h = btf_hash_int_decl_tag(t);
+ for_each_dedup_cand(d, hash_entry, h) {
+ cand_id = hash_entry->value;
+ cand = btf_type_by_id(d->btf, cand_id);
+ if (btf_equal_int_tag(t, cand)) {
+ new_id = cand_id;
+ break;
+ }
+ }
+ break;
+
+ case BTF_KIND_ARRAY: {
+ struct btf_array *info = btf_array(t);
+
+ ref_type_id = btf_dedup_ref_type(d, info->type);
+ if (ref_type_id < 0)
+ return ref_type_id;
+ info->type = ref_type_id;
+
+ ref_type_id = btf_dedup_ref_type(d, info->index_type);
+ if (ref_type_id < 0)
+ return ref_type_id;
+ info->index_type = ref_type_id;
+
+ h = btf_hash_array(t);
+ for_each_dedup_cand(d, hash_entry, h) {
+ cand_id = hash_entry->value;
+ cand = btf_type_by_id(d->btf, cand_id);
+ if (btf_equal_array(t, cand)) {
+ new_id = cand_id;
+ break;
+ }
+ }
+ break;
+ }
+
+ case BTF_KIND_FUNC_PROTO: {
+ struct btf_param *param;
+ __u16 vlen;
+ int i;
+
+ ref_type_id = btf_dedup_ref_type(d, t->type);
+ if (ref_type_id < 0)
+ return ref_type_id;
+ t->type = ref_type_id;
+
+ vlen = btf_vlen(t);
+ param = btf_params(t);
+ for (i = 0; i < vlen; i++) {
+ ref_type_id = btf_dedup_ref_type(d, param->type);
+ if (ref_type_id < 0)
+ return ref_type_id;
+ param->type = ref_type_id;
+ param++;
+ }
+
+ h = btf_hash_fnproto(t);
+ for_each_dedup_cand(d, hash_entry, h) {
+ cand_id = hash_entry->value;
+ cand = btf_type_by_id(d->btf, cand_id);
+ if (btf_equal_fnproto(t, cand)) {
+ new_id = cand_id;
+ break;
+ }
+ }
+ break;
+ }
+
+ default:
+ return -EINVAL;
+ }
+
+ d->map[type_id] = new_id;
+ if (type_id == new_id && btf_dedup_table_add(d, h, type_id))
+ return -ENOMEM;
+
+ return new_id;
+}
+
+static int btf_dedup_ref_types(struct btf_dedup *d)
+{
+ int i, err;
+
+ for (i = 0; i < d->btf->nr_types; i++) {
+ err = btf_dedup_ref_type(d, d->btf->start_id + i);
+ if (err < 0)
+ return err;
+ }
+ /* we won't need d->dedup_table anymore */
+ hashmap__free(d->dedup_table);
+ d->dedup_table = NULL;
+ return 0;
+}
+
+/*
+ * Collect a map from type names to type ids for all canonical structs
+ * and unions. If the same name is shared by several canonical types
+ * use a special value 0 to indicate this fact.
+ */
+static int btf_dedup_fill_unique_names_map(struct btf_dedup *d, struct hashmap *names_map)
+{
+ __u32 nr_types = btf__type_cnt(d->btf);
+ struct btf_type *t;
+ __u32 type_id;
+ __u16 kind;
+ int err;
+
+ /*
+ * Iterate over base and split module ids in order to get all
+ * available structs in the map.
+ */
+ for (type_id = 1; type_id < nr_types; ++type_id) {
+ t = btf_type_by_id(d->btf, type_id);
+ kind = btf_kind(t);
+
+ if (kind != BTF_KIND_STRUCT && kind != BTF_KIND_UNION)
+ continue;
+
+ /* Skip non-canonical types */
+ if (type_id != d->map[type_id])
+ continue;
+
+ err = hashmap__add(names_map, t->name_off, type_id);
+ if (err == -EEXIST)
+ err = hashmap__set(names_map, t->name_off, 0, NULL, NULL);
+
+ if (err)
+ return err;
+ }
+
+ return 0;
+}
+
+static int btf_dedup_resolve_fwd(struct btf_dedup *d, struct hashmap *names_map, __u32 type_id)
+{
+ struct btf_type *t = btf_type_by_id(d->btf, type_id);
+ enum btf_fwd_kind fwd_kind = btf_kflag(t);
+ __u16 cand_kind, kind = btf_kind(t);
+ struct btf_type *cand_t;
+ uintptr_t cand_id;
+
+ if (kind != BTF_KIND_FWD)
+ return 0;
+
+ /* Skip if this FWD already has a mapping */
+ if (type_id != d->map[type_id])
+ return 0;
+
+ if (!hashmap__find(names_map, t->name_off, &cand_id))
+ return 0;
+
+ /* Zero is a special value indicating that name is not unique */
+ if (!cand_id)
+ return 0;
+
+ cand_t = btf_type_by_id(d->btf, cand_id);
+ cand_kind = btf_kind(cand_t);
+ if ((cand_kind == BTF_KIND_STRUCT && fwd_kind != BTF_FWD_STRUCT) ||
+ (cand_kind == BTF_KIND_UNION && fwd_kind != BTF_FWD_UNION))
+ return 0;
+
+ d->map[type_id] = cand_id;
+
+ return 0;
+}
+
+/*
+ * Resolve unambiguous forward declarations.
+ *
+ * The lion's share of all FWD declarations is resolved during
+ * `btf_dedup_struct_types` phase when different type graphs are
+ * compared against each other. However, if in some compilation unit a
+ * FWD declaration is not a part of a type graph compared against
+ * another type graph that declaration's canonical type would not be
+ * changed. Example:
+ *
+ * CU #1:
+ *
+ * struct foo;
+ * struct foo *some_global;
+ *
+ * CU #2:
+ *
+ * struct foo { int u; };
+ * struct foo *another_global;
+ *
+ * After `btf_dedup_struct_types` the BTF looks as follows:
+ *
+ * [1] STRUCT 'foo' size=4 vlen=1 ...
+ * [2] INT 'int' size=4 ...
+ * [3] PTR '(anon)' type_id=1
+ * [4] FWD 'foo' fwd_kind=struct
+ * [5] PTR '(anon)' type_id=4
+ *
+ * This pass assumes that such FWD declarations should be mapped to
+ * structs or unions with identical name in case if the name is not
+ * ambiguous.
+ */
+static int btf_dedup_resolve_fwds(struct btf_dedup *d)
+{
+ int i, err;
+ struct hashmap *names_map;
+
+ names_map = hashmap__new(btf_dedup_identity_hash_fn, btf_dedup_equal_fn, NULL);
+ if (IS_ERR(names_map))
+ return PTR_ERR(names_map);
+
+ err = btf_dedup_fill_unique_names_map(d, names_map);
+ if (err < 0)
+ goto exit;
+
+ for (i = 0; i < d->btf->nr_types; i++) {
+ err = btf_dedup_resolve_fwd(d, names_map, d->btf->start_id + i);
+ if (err < 0)
+ break;
+ }
+
+exit:
+ hashmap__free(names_map);
+ return err;
+}
+
+/*
+ * Compact types.
+ *
+ * After we established for each type its corresponding canonical representative
+ * type, we now can eliminate types that are not canonical and leave only
+ * canonical ones layed out sequentially in memory by copying them over
+ * duplicates. During compaction btf_dedup->hypot_map array is reused to store
+ * a map from original type ID to a new compacted type ID, which will be used
+ * during next phase to "fix up" type IDs, referenced from struct/union and
+ * reference types.
+ */
+static int btf_dedup_compact_types(struct btf_dedup *d)
+{
+ __u32 *new_offs;
+ __u32 next_type_id = d->btf->start_id;
+ const struct btf_type *t;
+ void *p;
+ int i, id, len;
+
+ /* we are going to reuse hypot_map to store compaction remapping */
+ d->hypot_map[0] = 0;
+ /* base BTF types are not renumbered */
+ for (id = 1; id < d->btf->start_id; id++)
+ d->hypot_map[id] = id;
+ for (i = 0, id = d->btf->start_id; i < d->btf->nr_types; i++, id++)
+ d->hypot_map[id] = BTF_UNPROCESSED_ID;
+
+ p = d->btf->types_data;
+
+ for (i = 0, id = d->btf->start_id; i < d->btf->nr_types; i++, id++) {
+ if (d->map[id] != id)
+ continue;
+
+ t = btf__type_by_id(d->btf, id);
+ len = btf_type_size(t);
+ if (len < 0)
+ return len;
+
+ memmove(p, t, len);
+ d->hypot_map[id] = next_type_id;
+ d->btf->type_offs[next_type_id - d->btf->start_id] = p - d->btf->types_data;
+ p += len;
+ next_type_id++;
+ }
+
+ /* shrink struct btf's internal types index and update btf_header */
+ d->btf->nr_types = next_type_id - d->btf->start_id;
+ d->btf->type_offs_cap = d->btf->nr_types;
+ d->btf->hdr->type_len = p - d->btf->types_data;
+ new_offs = libbpf_reallocarray(d->btf->type_offs, d->btf->type_offs_cap,
+ sizeof(*new_offs));
+ if (d->btf->type_offs_cap && !new_offs)
+ return -ENOMEM;
+ d->btf->type_offs = new_offs;
+ d->btf->hdr->str_off = d->btf->hdr->type_len;
+ d->btf->raw_size = d->btf->hdr->hdr_len + d->btf->hdr->type_len + d->btf->hdr->str_len;
+ return 0;
+}
+
+/*
+ * Figure out final (deduplicated and compacted) type ID for provided original
+ * `type_id` by first resolving it into corresponding canonical type ID and
+ * then mapping it to a deduplicated type ID, stored in btf_dedup->hypot_map,
+ * which is populated during compaction phase.
+ */
+static int btf_dedup_remap_type_id(__u32 *type_id, void *ctx)
+{
+ struct btf_dedup *d = ctx;
+ __u32 resolved_type_id, new_type_id;
+
+ resolved_type_id = resolve_type_id(d, *type_id);
+ new_type_id = d->hypot_map[resolved_type_id];
+ if (new_type_id > BTF_MAX_NR_TYPES)
+ return -EINVAL;
+
+ *type_id = new_type_id;
+ return 0;
+}
+
+/*
+ * Remap referenced type IDs into deduped type IDs.
+ *
+ * After BTF types are deduplicated and compacted, their final type IDs may
+ * differ from original ones. The map from original to a corresponding
+ * deduped type ID is stored in btf_dedup->hypot_map and is populated during
+ * compaction phase. During remapping phase we are rewriting all type IDs
+ * referenced from any BTF type (e.g., struct fields, func proto args, etc) to
+ * their final deduped type IDs.
+ */
+static int btf_dedup_remap_types(struct btf_dedup *d)
+{
+ int i, r;
+
+ for (i = 0; i < d->btf->nr_types; i++) {
+ struct btf_type *t = btf_type_by_id(d->btf, d->btf->start_id + i);
+
+ r = btf_type_visit_type_ids(t, btf_dedup_remap_type_id, d);
+ if (r)
+ return r;
+ }
+
+ if (!d->btf_ext)
+ return 0;
+
+ r = btf_ext_visit_type_ids(d->btf_ext, btf_dedup_remap_type_id, d);
+ if (r)
+ return r;
+
+ return 0;
+}
+
+/*
+ * Probe few well-known locations for vmlinux kernel image and try to load BTF
+ * data out of it to use for target BTF.
+ */
+struct btf *btf__load_vmlinux_btf(void)
+{
+ const char *locations[] = {
+ /* try canonical vmlinux BTF through sysfs first */
+ "/sys/kernel/btf/vmlinux",
+ /* fall back to trying to find vmlinux on disk otherwise */
+ "/boot/vmlinux-%1$s",
+ "/lib/modules/%1$s/vmlinux-%1$s",
+ "/lib/modules/%1$s/build/vmlinux",
+ "/usr/lib/modules/%1$s/kernel/vmlinux",
+ "/usr/lib/debug/boot/vmlinux-%1$s",
+ "/usr/lib/debug/boot/vmlinux-%1$s.debug",
+ "/usr/lib/debug/lib/modules/%1$s/vmlinux",
+ };
+ char path[PATH_MAX + 1];
+ struct utsname buf;
+ struct btf *btf;
+ int i, err;
+
+ uname(&buf);
+
+ for (i = 0; i < ARRAY_SIZE(locations); i++) {
+ snprintf(path, PATH_MAX, locations[i], buf.release);
+
+ if (faccessat(AT_FDCWD, path, R_OK, AT_EACCESS))
+ continue;
+
+ btf = btf__parse(path, NULL);
+ err = libbpf_get_error(btf);
+ pr_debug("loading kernel BTF '%s': %d\n", path, err);
+ if (err)
+ continue;
+
+ return btf;
+ }
+
+ pr_warn("failed to find valid kernel BTF\n");
+ return libbpf_err_ptr(-ESRCH);
+}
+
+struct btf *libbpf_find_kernel_btf(void) __attribute__((alias("btf__load_vmlinux_btf")));
+
+struct btf *btf__load_module_btf(const char *module_name, struct btf *vmlinux_btf)
+{
+ char path[80];
+
+ snprintf(path, sizeof(path), "/sys/kernel/btf/%s", module_name);
+ return btf__parse_split(path, vmlinux_btf);
+}
+
+int btf_type_visit_type_ids(struct btf_type *t, type_id_visit_fn visit, void *ctx)
+{
+ int i, n, err;
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_INT:
+ case BTF_KIND_FLOAT:
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ return 0;
+
+ case BTF_KIND_FWD:
+ case BTF_KIND_CONST:
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_RESTRICT:
+ case BTF_KIND_PTR:
+ case BTF_KIND_TYPEDEF:
+ case BTF_KIND_FUNC:
+ case BTF_KIND_VAR:
+ case BTF_KIND_DECL_TAG:
+ case BTF_KIND_TYPE_TAG:
+ return visit(&t->type, ctx);
+
+ case BTF_KIND_ARRAY: {
+ struct btf_array *a = btf_array(t);
+
+ err = visit(&a->type, ctx);
+ err = err ?: visit(&a->index_type, ctx);
+ return err;
+ }
+
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION: {
+ struct btf_member *m = btf_members(t);
+
+ for (i = 0, n = btf_vlen(t); i < n; i++, m++) {
+ err = visit(&m->type, ctx);
+ if (err)
+ return err;
+ }
+ return 0;
+ }
+
+ case BTF_KIND_FUNC_PROTO: {
+ struct btf_param *m = btf_params(t);
+
+ err = visit(&t->type, ctx);
+ if (err)
+ return err;
+ for (i = 0, n = btf_vlen(t); i < n; i++, m++) {
+ err = visit(&m->type, ctx);
+ if (err)
+ return err;
+ }
+ return 0;
+ }
+
+ case BTF_KIND_DATASEC: {
+ struct btf_var_secinfo *m = btf_var_secinfos(t);
+
+ for (i = 0, n = btf_vlen(t); i < n; i++, m++) {
+ err = visit(&m->type, ctx);
+ if (err)
+ return err;
+ }
+ return 0;
+ }
+
+ default:
+ return -EINVAL;
+ }
+}
+
+int btf_type_visit_str_offs(struct btf_type *t, str_off_visit_fn visit, void *ctx)
+{
+ int i, n, err;
+
+ err = visit(&t->name_off, ctx);
+ if (err)
+ return err;
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION: {
+ struct btf_member *m = btf_members(t);
+
+ for (i = 0, n = btf_vlen(t); i < n; i++, m++) {
+ err = visit(&m->name_off, ctx);
+ if (err)
+ return err;
+ }
+ break;
+ }
+ case BTF_KIND_ENUM: {
+ struct btf_enum *m = btf_enum(t);
+
+ for (i = 0, n = btf_vlen(t); i < n; i++, m++) {
+ err = visit(&m->name_off, ctx);
+ if (err)
+ return err;
+ }
+ break;
+ }
+ case BTF_KIND_ENUM64: {
+ struct btf_enum64 *m = btf_enum64(t);
+
+ for (i = 0, n = btf_vlen(t); i < n; i++, m++) {
+ err = visit(&m->name_off, ctx);
+ if (err)
+ return err;
+ }
+ break;
+ }
+ case BTF_KIND_FUNC_PROTO: {
+ struct btf_param *m = btf_params(t);
+
+ for (i = 0, n = btf_vlen(t); i < n; i++, m++) {
+ err = visit(&m->name_off, ctx);
+ if (err)
+ return err;
+ }
+ break;
+ }
+ default:
+ break;
+ }
+
+ return 0;
+}
+
+int btf_ext_visit_type_ids(struct btf_ext *btf_ext, type_id_visit_fn visit, void *ctx)
+{
+ const struct btf_ext_info *seg;
+ struct btf_ext_info_sec *sec;
+ int i, err;
+
+ seg = &btf_ext->func_info;
+ for_each_btf_ext_sec(seg, sec) {
+ struct bpf_func_info_min *rec;
+
+ for_each_btf_ext_rec(seg, sec, i, rec) {
+ err = visit(&rec->type_id, ctx);
+ if (err < 0)
+ return err;
+ }
+ }
+
+ seg = &btf_ext->core_relo_info;
+ for_each_btf_ext_sec(seg, sec) {
+ struct bpf_core_relo *rec;
+
+ for_each_btf_ext_rec(seg, sec, i, rec) {
+ err = visit(&rec->type_id, ctx);
+ if (err < 0)
+ return err;
+ }
+ }
+
+ return 0;
+}
+
+int btf_ext_visit_str_offs(struct btf_ext *btf_ext, str_off_visit_fn visit, void *ctx)
+{
+ const struct btf_ext_info *seg;
+ struct btf_ext_info_sec *sec;
+ int i, err;
+
+ seg = &btf_ext->func_info;
+ for_each_btf_ext_sec(seg, sec) {
+ err = visit(&sec->sec_name_off, ctx);
+ if (err)
+ return err;
+ }
+
+ seg = &btf_ext->line_info;
+ for_each_btf_ext_sec(seg, sec) {
+ struct bpf_line_info_min *rec;
+
+ err = visit(&sec->sec_name_off, ctx);
+ if (err)
+ return err;
+
+ for_each_btf_ext_rec(seg, sec, i, rec) {
+ err = visit(&rec->file_name_off, ctx);
+ if (err)
+ return err;
+ err = visit(&rec->line_off, ctx);
+ if (err)
+ return err;
+ }
+ }
+
+ seg = &btf_ext->core_relo_info;
+ for_each_btf_ext_sec(seg, sec) {
+ struct bpf_core_relo *rec;
+
+ err = visit(&sec->sec_name_off, ctx);
+ if (err)
+ return err;
+
+ for_each_btf_ext_rec(seg, sec, i, rec) {
+ err = visit(&rec->access_str_off, ctx);
+ if (err)
+ return err;
+ }
+ }
+
+ return 0;
+}
diff --git a/src/btf.h b/src/btf.h
new file mode 100644
index 0000000..8e6880d
--- /dev/null
+++ b/src/btf.h
@@ -0,0 +1,575 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+/* Copyright (c) 2018 Facebook */
+/*! \file */
+
+#ifndef __LIBBPF_BTF_H
+#define __LIBBPF_BTF_H
+
+#include <stdarg.h>
+#include <stdbool.h>
+#include <linux/btf.h>
+#include <linux/types.h>
+
+#include "libbpf_common.h"
+
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+#define BTF_ELF_SEC ".BTF"
+#define BTF_EXT_ELF_SEC ".BTF.ext"
+#define MAPS_ELF_SEC ".maps"
+
+struct btf;
+struct btf_ext;
+struct btf_type;
+
+struct bpf_object;
+
+enum btf_endianness {
+ BTF_LITTLE_ENDIAN = 0,
+ BTF_BIG_ENDIAN = 1,
+};
+
+/**
+ * @brief **btf__free()** frees all data of a BTF object
+ * @param btf BTF object to free
+ */
+LIBBPF_API void btf__free(struct btf *btf);
+
+/**
+ * @brief **btf__new()** creates a new instance of a BTF object from the raw
+ * bytes of an ELF's BTF section
+ * @param data raw bytes
+ * @param size number of bytes passed in `data`
+ * @return new BTF object instance which has to be eventually freed with
+ * **btf__free()**
+ *
+ * On error, error-code-encoded-as-pointer is returned, not a NULL. To extract
+ * error code from such a pointer `libbpf_get_error()` should be used. If
+ * `libbpf_set_strict_mode(LIBBPF_STRICT_CLEAN_PTRS)` is enabled, NULL is
+ * returned on error instead. In both cases thread-local `errno` variable is
+ * always set to error code as well.
+ */
+LIBBPF_API struct btf *btf__new(const void *data, __u32 size);
+
+/**
+ * @brief **btf__new_split()** create a new instance of a BTF object from the
+ * provided raw data bytes. It takes another BTF instance, **base_btf**, which
+ * serves as a base BTF, which is extended by types in a newly created BTF
+ * instance
+ * @param data raw bytes
+ * @param size length of raw bytes
+ * @param base_btf the base BTF object
+ * @return new BTF object instance which has to be eventually freed with
+ * **btf__free()**
+ *
+ * If *base_btf* is NULL, `btf__new_split()` is equivalent to `btf__new()` and
+ * creates non-split BTF.
+ *
+ * On error, error-code-encoded-as-pointer is returned, not a NULL. To extract
+ * error code from such a pointer `libbpf_get_error()` should be used. If
+ * `libbpf_set_strict_mode(LIBBPF_STRICT_CLEAN_PTRS)` is enabled, NULL is
+ * returned on error instead. In both cases thread-local `errno` variable is
+ * always set to error code as well.
+ */
+LIBBPF_API struct btf *btf__new_split(const void *data, __u32 size, struct btf *base_btf);
+
+/**
+ * @brief **btf__new_empty()** creates an empty BTF object. Use
+ * `btf__add_*()` to populate such BTF object.
+ * @return new BTF object instance which has to be eventually freed with
+ * **btf__free()**
+ *
+ * On error, error-code-encoded-as-pointer is returned, not a NULL. To extract
+ * error code from such a pointer `libbpf_get_error()` should be used. If
+ * `libbpf_set_strict_mode(LIBBPF_STRICT_CLEAN_PTRS)` is enabled, NULL is
+ * returned on error instead. In both cases thread-local `errno` variable is
+ * always set to error code as well.
+ */
+LIBBPF_API struct btf *btf__new_empty(void);
+
+/**
+ * @brief **btf__new_empty_split()** creates an unpopulated BTF object from an
+ * ELF BTF section except with a base BTF on top of which split BTF should be
+ * based
+ * @return new BTF object instance which has to be eventually freed with
+ * **btf__free()**
+ *
+ * If *base_btf* is NULL, `btf__new_empty_split()` is equivalent to
+ * `btf__new_empty()` and creates non-split BTF.
+ *
+ * On error, error-code-encoded-as-pointer is returned, not a NULL. To extract
+ * error code from such a pointer `libbpf_get_error()` should be used. If
+ * `libbpf_set_strict_mode(LIBBPF_STRICT_CLEAN_PTRS)` is enabled, NULL is
+ * returned on error instead. In both cases thread-local `errno` variable is
+ * always set to error code as well.
+ */
+LIBBPF_API struct btf *btf__new_empty_split(struct btf *base_btf);
+
+LIBBPF_API struct btf *btf__parse(const char *path, struct btf_ext **btf_ext);
+LIBBPF_API struct btf *btf__parse_split(const char *path, struct btf *base_btf);
+LIBBPF_API struct btf *btf__parse_elf(const char *path, struct btf_ext **btf_ext);
+LIBBPF_API struct btf *btf__parse_elf_split(const char *path, struct btf *base_btf);
+LIBBPF_API struct btf *btf__parse_raw(const char *path);
+LIBBPF_API struct btf *btf__parse_raw_split(const char *path, struct btf *base_btf);
+
+LIBBPF_API struct btf *btf__load_vmlinux_btf(void);
+LIBBPF_API struct btf *btf__load_module_btf(const char *module_name, struct btf *vmlinux_btf);
+
+LIBBPF_API struct btf *btf__load_from_kernel_by_id(__u32 id);
+LIBBPF_API struct btf *btf__load_from_kernel_by_id_split(__u32 id, struct btf *base_btf);
+
+LIBBPF_API int btf__load_into_kernel(struct btf *btf);
+LIBBPF_API __s32 btf__find_by_name(const struct btf *btf,
+ const char *type_name);
+LIBBPF_API __s32 btf__find_by_name_kind(const struct btf *btf,
+ const char *type_name, __u32 kind);
+LIBBPF_API __u32 btf__type_cnt(const struct btf *btf);
+LIBBPF_API const struct btf *btf__base_btf(const struct btf *btf);
+LIBBPF_API const struct btf_type *btf__type_by_id(const struct btf *btf,
+ __u32 id);
+LIBBPF_API size_t btf__pointer_size(const struct btf *btf);
+LIBBPF_API int btf__set_pointer_size(struct btf *btf, size_t ptr_sz);
+LIBBPF_API enum btf_endianness btf__endianness(const struct btf *btf);
+LIBBPF_API int btf__set_endianness(struct btf *btf, enum btf_endianness endian);
+LIBBPF_API __s64 btf__resolve_size(const struct btf *btf, __u32 type_id);
+LIBBPF_API int btf__resolve_type(const struct btf *btf, __u32 type_id);
+LIBBPF_API int btf__align_of(const struct btf *btf, __u32 id);
+LIBBPF_API int btf__fd(const struct btf *btf);
+LIBBPF_API void btf__set_fd(struct btf *btf, int fd);
+LIBBPF_API const void *btf__raw_data(const struct btf *btf, __u32 *size);
+LIBBPF_API const char *btf__name_by_offset(const struct btf *btf, __u32 offset);
+LIBBPF_API const char *btf__str_by_offset(const struct btf *btf, __u32 offset);
+
+LIBBPF_API struct btf_ext *btf_ext__new(const __u8 *data, __u32 size);
+LIBBPF_API void btf_ext__free(struct btf_ext *btf_ext);
+LIBBPF_API const void *btf_ext__raw_data(const struct btf_ext *btf_ext, __u32 *size);
+
+LIBBPF_API int btf__find_str(struct btf *btf, const char *s);
+LIBBPF_API int btf__add_str(struct btf *btf, const char *s);
+LIBBPF_API int btf__add_type(struct btf *btf, const struct btf *src_btf,
+ const struct btf_type *src_type);
+/**
+ * @brief **btf__add_btf()** appends all the BTF types from *src_btf* into *btf*
+ * @param btf BTF object which all the BTF types and strings are added to
+ * @param src_btf BTF object which all BTF types and referenced strings are copied from
+ * @return BTF type ID of the first appended BTF type, or negative error code
+ *
+ * **btf__add_btf()** can be used to simply and efficiently append the entire
+ * contents of one BTF object to another one. All the BTF type data is copied
+ * over, all referenced type IDs are adjusted by adding a necessary ID offset.
+ * Only strings referenced from BTF types are copied over and deduplicated, so
+ * if there were some unused strings in *src_btf*, those won't be copied over,
+ * which is consistent with the general string deduplication semantics of BTF
+ * writing APIs.
+ *
+ * If any error is encountered during this process, the contents of *btf* is
+ * left intact, which means that **btf__add_btf()** follows the transactional
+ * semantics and the operation as a whole is all-or-nothing.
+ *
+ * *src_btf* has to be non-split BTF, as of now copying types from split BTF
+ * is not supported and will result in -ENOTSUP error code returned.
+ */
+LIBBPF_API int btf__add_btf(struct btf *btf, const struct btf *src_btf);
+
+LIBBPF_API int btf__add_int(struct btf *btf, const char *name, size_t byte_sz, int encoding);
+LIBBPF_API int btf__add_float(struct btf *btf, const char *name, size_t byte_sz);
+LIBBPF_API int btf__add_ptr(struct btf *btf, int ref_type_id);
+LIBBPF_API int btf__add_array(struct btf *btf,
+ int index_type_id, int elem_type_id, __u32 nr_elems);
+/* struct/union construction APIs */
+LIBBPF_API int btf__add_struct(struct btf *btf, const char *name, __u32 sz);
+LIBBPF_API int btf__add_union(struct btf *btf, const char *name, __u32 sz);
+LIBBPF_API int btf__add_field(struct btf *btf, const char *name, int field_type_id,
+ __u32 bit_offset, __u32 bit_size);
+
+/* enum construction APIs */
+LIBBPF_API int btf__add_enum(struct btf *btf, const char *name, __u32 bytes_sz);
+LIBBPF_API int btf__add_enum_value(struct btf *btf, const char *name, __s64 value);
+LIBBPF_API int btf__add_enum64(struct btf *btf, const char *name, __u32 bytes_sz, bool is_signed);
+LIBBPF_API int btf__add_enum64_value(struct btf *btf, const char *name, __u64 value);
+
+enum btf_fwd_kind {
+ BTF_FWD_STRUCT = 0,
+ BTF_FWD_UNION = 1,
+ BTF_FWD_ENUM = 2,
+};
+
+LIBBPF_API int btf__add_fwd(struct btf *btf, const char *name, enum btf_fwd_kind fwd_kind);
+LIBBPF_API int btf__add_typedef(struct btf *btf, const char *name, int ref_type_id);
+LIBBPF_API int btf__add_volatile(struct btf *btf, int ref_type_id);
+LIBBPF_API int btf__add_const(struct btf *btf, int ref_type_id);
+LIBBPF_API int btf__add_restrict(struct btf *btf, int ref_type_id);
+LIBBPF_API int btf__add_type_tag(struct btf *btf, const char *value, int ref_type_id);
+
+/* func and func_proto construction APIs */
+LIBBPF_API int btf__add_func(struct btf *btf, const char *name,
+ enum btf_func_linkage linkage, int proto_type_id);
+LIBBPF_API int btf__add_func_proto(struct btf *btf, int ret_type_id);
+LIBBPF_API int btf__add_func_param(struct btf *btf, const char *name, int type_id);
+
+/* var & datasec construction APIs */
+LIBBPF_API int btf__add_var(struct btf *btf, const char *name, int linkage, int type_id);
+LIBBPF_API int btf__add_datasec(struct btf *btf, const char *name, __u32 byte_sz);
+LIBBPF_API int btf__add_datasec_var_info(struct btf *btf, int var_type_id,
+ __u32 offset, __u32 byte_sz);
+
+/* tag construction API */
+LIBBPF_API int btf__add_decl_tag(struct btf *btf, const char *value, int ref_type_id,
+ int component_idx);
+
+struct btf_dedup_opts {
+ size_t sz;
+ /* optional .BTF.ext info to dedup along the main BTF info */
+ struct btf_ext *btf_ext;
+ /* force hash collisions (used for testing) */
+ bool force_collisions;
+ size_t :0;
+};
+#define btf_dedup_opts__last_field force_collisions
+
+LIBBPF_API int btf__dedup(struct btf *btf, const struct btf_dedup_opts *opts);
+
+struct btf_dump;
+
+struct btf_dump_opts {
+ size_t sz;
+};
+#define btf_dump_opts__last_field sz
+
+typedef void (*btf_dump_printf_fn_t)(void *ctx, const char *fmt, va_list args);
+
+LIBBPF_API struct btf_dump *btf_dump__new(const struct btf *btf,
+ btf_dump_printf_fn_t printf_fn,
+ void *ctx,
+ const struct btf_dump_opts *opts);
+
+LIBBPF_API void btf_dump__free(struct btf_dump *d);
+
+LIBBPF_API int btf_dump__dump_type(struct btf_dump *d, __u32 id);
+
+struct btf_dump_emit_type_decl_opts {
+ /* size of this struct, for forward/backward compatiblity */
+ size_t sz;
+ /* optional field name for type declaration, e.g.:
+ * - struct my_struct <FNAME>
+ * - void (*<FNAME>)(int)
+ * - char (*<FNAME>)[123]
+ */
+ const char *field_name;
+ /* extra indentation level (in number of tabs) to emit for multi-line
+ * type declarations (e.g., anonymous struct); applies for lines
+ * starting from the second one (first line is assumed to have
+ * necessary indentation already
+ */
+ int indent_level;
+ /* strip all the const/volatile/restrict mods */
+ bool strip_mods;
+ size_t :0;
+};
+#define btf_dump_emit_type_decl_opts__last_field strip_mods
+
+LIBBPF_API int
+btf_dump__emit_type_decl(struct btf_dump *d, __u32 id,
+ const struct btf_dump_emit_type_decl_opts *opts);
+
+
+struct btf_dump_type_data_opts {
+ /* size of this struct, for forward/backward compatibility */
+ size_t sz;
+ const char *indent_str;
+ int indent_level;
+ /* below match "show" flags for bpf_show_snprintf() */
+ bool compact; /* no newlines/indentation */
+ bool skip_names; /* skip member/type names */
+ bool emit_zeroes; /* show 0-valued fields */
+ size_t :0;
+};
+#define btf_dump_type_data_opts__last_field emit_zeroes
+
+LIBBPF_API int
+btf_dump__dump_type_data(struct btf_dump *d, __u32 id,
+ const void *data, size_t data_sz,
+ const struct btf_dump_type_data_opts *opts);
+
+/*
+ * A set of helpers for easier BTF types handling.
+ *
+ * The inline functions below rely on constants from the kernel headers which
+ * may not be available for applications including this header file. To avoid
+ * compilation errors, we define all the constants here that were added after
+ * the initial introduction of the BTF_KIND* constants.
+ */
+#ifndef BTF_KIND_FUNC
+#define BTF_KIND_FUNC 12 /* Function */
+#define BTF_KIND_FUNC_PROTO 13 /* Function Proto */
+#endif
+#ifndef BTF_KIND_VAR
+#define BTF_KIND_VAR 14 /* Variable */
+#define BTF_KIND_DATASEC 15 /* Section */
+#endif
+#ifndef BTF_KIND_FLOAT
+#define BTF_KIND_FLOAT 16 /* Floating point */
+#endif
+/* The kernel header switched to enums, so the following were never #defined */
+#define BTF_KIND_DECL_TAG 17 /* Decl Tag */
+#define BTF_KIND_TYPE_TAG 18 /* Type Tag */
+#define BTF_KIND_ENUM64 19 /* Enum for up-to 64bit values */
+
+static inline __u16 btf_kind(const struct btf_type *t)
+{
+ return BTF_INFO_KIND(t->info);
+}
+
+static inline __u16 btf_vlen(const struct btf_type *t)
+{
+ return BTF_INFO_VLEN(t->info);
+}
+
+static inline bool btf_kflag(const struct btf_type *t)
+{
+ return BTF_INFO_KFLAG(t->info);
+}
+
+static inline bool btf_is_void(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_UNKN;
+}
+
+static inline bool btf_is_int(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_INT;
+}
+
+static inline bool btf_is_ptr(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_PTR;
+}
+
+static inline bool btf_is_array(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_ARRAY;
+}
+
+static inline bool btf_is_struct(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_STRUCT;
+}
+
+static inline bool btf_is_union(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_UNION;
+}
+
+static inline bool btf_is_composite(const struct btf_type *t)
+{
+ __u16 kind = btf_kind(t);
+
+ return kind == BTF_KIND_STRUCT || kind == BTF_KIND_UNION;
+}
+
+static inline bool btf_is_enum(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_ENUM;
+}
+
+static inline bool btf_is_enum64(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_ENUM64;
+}
+
+static inline bool btf_is_fwd(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_FWD;
+}
+
+static inline bool btf_is_typedef(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_TYPEDEF;
+}
+
+static inline bool btf_is_volatile(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_VOLATILE;
+}
+
+static inline bool btf_is_const(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_CONST;
+}
+
+static inline bool btf_is_restrict(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_RESTRICT;
+}
+
+static inline bool btf_is_mod(const struct btf_type *t)
+{
+ __u16 kind = btf_kind(t);
+
+ return kind == BTF_KIND_VOLATILE ||
+ kind == BTF_KIND_CONST ||
+ kind == BTF_KIND_RESTRICT ||
+ kind == BTF_KIND_TYPE_TAG;
+}
+
+static inline bool btf_is_func(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_FUNC;
+}
+
+static inline bool btf_is_func_proto(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_FUNC_PROTO;
+}
+
+static inline bool btf_is_var(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_VAR;
+}
+
+static inline bool btf_is_datasec(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_DATASEC;
+}
+
+static inline bool btf_is_float(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_FLOAT;
+}
+
+static inline bool btf_is_decl_tag(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_DECL_TAG;
+}
+
+static inline bool btf_is_type_tag(const struct btf_type *t)
+{
+ return btf_kind(t) == BTF_KIND_TYPE_TAG;
+}
+
+static inline bool btf_is_any_enum(const struct btf_type *t)
+{
+ return btf_is_enum(t) || btf_is_enum64(t);
+}
+
+static inline bool btf_kind_core_compat(const struct btf_type *t1,
+ const struct btf_type *t2)
+{
+ return btf_kind(t1) == btf_kind(t2) ||
+ (btf_is_any_enum(t1) && btf_is_any_enum(t2));
+}
+
+static inline __u8 btf_int_encoding(const struct btf_type *t)
+{
+ return BTF_INT_ENCODING(*(__u32 *)(t + 1));
+}
+
+static inline __u8 btf_int_offset(const struct btf_type *t)
+{
+ return BTF_INT_OFFSET(*(__u32 *)(t + 1));
+}
+
+static inline __u8 btf_int_bits(const struct btf_type *t)
+{
+ return BTF_INT_BITS(*(__u32 *)(t + 1));
+}
+
+static inline struct btf_array *btf_array(const struct btf_type *t)
+{
+ return (struct btf_array *)(t + 1);
+}
+
+static inline struct btf_enum *btf_enum(const struct btf_type *t)
+{
+ return (struct btf_enum *)(t + 1);
+}
+
+struct btf_enum64;
+
+static inline struct btf_enum64 *btf_enum64(const struct btf_type *t)
+{
+ return (struct btf_enum64 *)(t + 1);
+}
+
+static inline __u64 btf_enum64_value(const struct btf_enum64 *e)
+{
+ /* struct btf_enum64 is introduced in Linux 6.0, which is very
+ * bleeding-edge. Here we are avoiding relying on struct btf_enum64
+ * definition coming from kernel UAPI headers to support wider range
+ * of system-wide kernel headers.
+ *
+ * Given this header can be also included from C++ applications, that
+ * further restricts C tricks we can use (like using compatible
+ * anonymous struct). So just treat struct btf_enum64 as
+ * a three-element array of u32 and access second (lo32) and third
+ * (hi32) elements directly.
+ *
+ * For reference, here is a struct btf_enum64 definition:
+ *
+ * const struct btf_enum64 {
+ * __u32 name_off;
+ * __u32 val_lo32;
+ * __u32 val_hi32;
+ * };
+ */
+ const __u32 *e64 = (const __u32 *)e;
+
+ return ((__u64)e64[2] << 32) | e64[1];
+}
+
+static inline struct btf_member *btf_members(const struct btf_type *t)
+{
+ return (struct btf_member *)(t + 1);
+}
+
+/* Get bit offset of a member with specified index. */
+static inline __u32 btf_member_bit_offset(const struct btf_type *t,
+ __u32 member_idx)
+{
+ const struct btf_member *m = btf_members(t) + member_idx;
+ bool kflag = btf_kflag(t);
+
+ return kflag ? BTF_MEMBER_BIT_OFFSET(m->offset) : m->offset;
+}
+/*
+ * Get bitfield size of a member, assuming t is BTF_KIND_STRUCT or
+ * BTF_KIND_UNION. If member is not a bitfield, zero is returned.
+ */
+static inline __u32 btf_member_bitfield_size(const struct btf_type *t,
+ __u32 member_idx)
+{
+ const struct btf_member *m = btf_members(t) + member_idx;
+ bool kflag = btf_kflag(t);
+
+ return kflag ? BTF_MEMBER_BITFIELD_SIZE(m->offset) : 0;
+}
+
+static inline struct btf_param *btf_params(const struct btf_type *t)
+{
+ return (struct btf_param *)(t + 1);
+}
+
+static inline struct btf_var *btf_var(const struct btf_type *t)
+{
+ return (struct btf_var *)(t + 1);
+}
+
+static inline struct btf_var_secinfo *
+btf_var_secinfos(const struct btf_type *t)
+{
+ return (struct btf_var_secinfo *)(t + 1);
+}
+
+struct btf_decl_tag;
+static inline struct btf_decl_tag *btf_decl_tag(const struct btf_type *t)
+{
+ return (struct btf_decl_tag *)(t + 1);
+}
+
+#ifdef __cplusplus
+} /* extern "C" */
+#endif
+
+#endif /* __LIBBPF_BTF_H */
diff --git a/src/btf_dump.c b/src/btf_dump.c
new file mode 100644
index 0000000..580985e
--- /dev/null
+++ b/src/btf_dump.c
@@ -0,0 +1,2526 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+
+/*
+ * BTF-to-C type converter.
+ *
+ * Copyright (c) 2019 Facebook
+ */
+
+#include <stdbool.h>
+#include <stddef.h>
+#include <stdlib.h>
+#include <string.h>
+#include <ctype.h>
+#include <endian.h>
+#include <errno.h>
+#include <limits.h>
+#include <linux/err.h>
+#include <linux/btf.h>
+#include <linux/kernel.h>
+#include "btf.h"
+#include "hashmap.h"
+#include "libbpf.h"
+#include "libbpf_internal.h"
+
+static const char PREFIXES[] = "\t\t\t\t\t\t\t\t\t\t\t\t\t";
+static const size_t PREFIX_CNT = sizeof(PREFIXES) - 1;
+
+static const char *pfx(int lvl)
+{
+ return lvl >= PREFIX_CNT ? PREFIXES : &PREFIXES[PREFIX_CNT - lvl];
+}
+
+enum btf_dump_type_order_state {
+ NOT_ORDERED,
+ ORDERING,
+ ORDERED,
+};
+
+enum btf_dump_type_emit_state {
+ NOT_EMITTED,
+ EMITTING,
+ EMITTED,
+};
+
+/* per-type auxiliary state */
+struct btf_dump_type_aux_state {
+ /* topological sorting state */
+ enum btf_dump_type_order_state order_state: 2;
+ /* emitting state used to determine the need for forward declaration */
+ enum btf_dump_type_emit_state emit_state: 2;
+ /* whether forward declaration was already emitted */
+ __u8 fwd_emitted: 1;
+ /* whether unique non-duplicate name was already assigned */
+ __u8 name_resolved: 1;
+ /* whether type is referenced from any other type */
+ __u8 referenced: 1;
+};
+
+/* indent string length; one indent string is added for each indent level */
+#define BTF_DATA_INDENT_STR_LEN 32
+
+/*
+ * Common internal data for BTF type data dump operations.
+ */
+struct btf_dump_data {
+ const void *data_end; /* end of valid data to show */
+ bool compact;
+ bool skip_names;
+ bool emit_zeroes;
+ __u8 indent_lvl; /* base indent level */
+ char indent_str[BTF_DATA_INDENT_STR_LEN];
+ /* below are used during iteration */
+ int depth;
+ bool is_array_member;
+ bool is_array_terminated;
+ bool is_array_char;
+};
+
+struct btf_dump {
+ const struct btf *btf;
+ btf_dump_printf_fn_t printf_fn;
+ void *cb_ctx;
+ int ptr_sz;
+ bool strip_mods;
+ bool skip_anon_defs;
+ int last_id;
+
+ /* per-type auxiliary state */
+ struct btf_dump_type_aux_state *type_states;
+ size_t type_states_cap;
+ /* per-type optional cached unique name, must be freed, if present */
+ const char **cached_names;
+ size_t cached_names_cap;
+
+ /* topo-sorted list of dependent type definitions */
+ __u32 *emit_queue;
+ int emit_queue_cap;
+ int emit_queue_cnt;
+
+ /*
+ * stack of type declarations (e.g., chain of modifiers, arrays,
+ * funcs, etc)
+ */
+ __u32 *decl_stack;
+ int decl_stack_cap;
+ int decl_stack_cnt;
+
+ /* maps struct/union/enum name to a number of name occurrences */
+ struct hashmap *type_names;
+ /*
+ * maps typedef identifiers and enum value names to a number of such
+ * name occurrences
+ */
+ struct hashmap *ident_names;
+ /*
+ * data for typed display; allocated if needed.
+ */
+ struct btf_dump_data *typed_dump;
+};
+
+static size_t str_hash_fn(long key, void *ctx)
+{
+ return str_hash((void *)key);
+}
+
+static bool str_equal_fn(long a, long b, void *ctx)
+{
+ return strcmp((void *)a, (void *)b) == 0;
+}
+
+static const char *btf_name_of(const struct btf_dump *d, __u32 name_off)
+{
+ return btf__name_by_offset(d->btf, name_off);
+}
+
+static void btf_dump_printf(const struct btf_dump *d, const char *fmt, ...)
+{
+ va_list args;
+
+ va_start(args, fmt);
+ d->printf_fn(d->cb_ctx, fmt, args);
+ va_end(args);
+}
+
+static int btf_dump_mark_referenced(struct btf_dump *d);
+static int btf_dump_resize(struct btf_dump *d);
+
+struct btf_dump *btf_dump__new(const struct btf *btf,
+ btf_dump_printf_fn_t printf_fn,
+ void *ctx,
+ const struct btf_dump_opts *opts)
+{
+ struct btf_dump *d;
+ int err;
+
+ if (!OPTS_VALID(opts, btf_dump_opts))
+ return libbpf_err_ptr(-EINVAL);
+
+ if (!printf_fn)
+ return libbpf_err_ptr(-EINVAL);
+
+ d = calloc(1, sizeof(struct btf_dump));
+ if (!d)
+ return libbpf_err_ptr(-ENOMEM);
+
+ d->btf = btf;
+ d->printf_fn = printf_fn;
+ d->cb_ctx = ctx;
+ d->ptr_sz = btf__pointer_size(btf) ? : sizeof(void *);
+
+ d->type_names = hashmap__new(str_hash_fn, str_equal_fn, NULL);
+ if (IS_ERR(d->type_names)) {
+ err = PTR_ERR(d->type_names);
+ d->type_names = NULL;
+ goto err;
+ }
+ d->ident_names = hashmap__new(str_hash_fn, str_equal_fn, NULL);
+ if (IS_ERR(d->ident_names)) {
+ err = PTR_ERR(d->ident_names);
+ d->ident_names = NULL;
+ goto err;
+ }
+
+ err = btf_dump_resize(d);
+ if (err)
+ goto err;
+
+ return d;
+err:
+ btf_dump__free(d);
+ return libbpf_err_ptr(err);
+}
+
+static int btf_dump_resize(struct btf_dump *d)
+{
+ int err, last_id = btf__type_cnt(d->btf) - 1;
+
+ if (last_id <= d->last_id)
+ return 0;
+
+ if (libbpf_ensure_mem((void **)&d->type_states, &d->type_states_cap,
+ sizeof(*d->type_states), last_id + 1))
+ return -ENOMEM;
+ if (libbpf_ensure_mem((void **)&d->cached_names, &d->cached_names_cap,
+ sizeof(*d->cached_names), last_id + 1))
+ return -ENOMEM;
+
+ if (d->last_id == 0) {
+ /* VOID is special */
+ d->type_states[0].order_state = ORDERED;
+ d->type_states[0].emit_state = EMITTED;
+ }
+
+ /* eagerly determine referenced types for anon enums */
+ err = btf_dump_mark_referenced(d);
+ if (err)
+ return err;
+
+ d->last_id = last_id;
+ return 0;
+}
+
+static void btf_dump_free_names(struct hashmap *map)
+{
+ size_t bkt;
+ struct hashmap_entry *cur;
+
+ hashmap__for_each_entry(map, cur, bkt)
+ free((void *)cur->pkey);
+
+ hashmap__free(map);
+}
+
+void btf_dump__free(struct btf_dump *d)
+{
+ int i;
+
+ if (IS_ERR_OR_NULL(d))
+ return;
+
+ free(d->type_states);
+ if (d->cached_names) {
+ /* any set cached name is owned by us and should be freed */
+ for (i = 0; i <= d->last_id; i++) {
+ if (d->cached_names[i])
+ free((void *)d->cached_names[i]);
+ }
+ }
+ free(d->cached_names);
+ free(d->emit_queue);
+ free(d->decl_stack);
+ btf_dump_free_names(d->type_names);
+ btf_dump_free_names(d->ident_names);
+
+ free(d);
+}
+
+static int btf_dump_order_type(struct btf_dump *d, __u32 id, bool through_ptr);
+static void btf_dump_emit_type(struct btf_dump *d, __u32 id, __u32 cont_id);
+
+/*
+ * Dump BTF type in a compilable C syntax, including all the necessary
+ * dependent types, necessary for compilation. If some of the dependent types
+ * were already emitted as part of previous btf_dump__dump_type() invocation
+ * for another type, they won't be emitted again. This API allows callers to
+ * filter out BTF types according to user-defined criterias and emitted only
+ * minimal subset of types, necessary to compile everything. Full struct/union
+ * definitions will still be emitted, even if the only usage is through
+ * pointer and could be satisfied with just a forward declaration.
+ *
+ * Dumping is done in two high-level passes:
+ * 1. Topologically sort type definitions to satisfy C rules of compilation.
+ * 2. Emit type definitions in C syntax.
+ *
+ * Returns 0 on success; <0, otherwise.
+ */
+int btf_dump__dump_type(struct btf_dump *d, __u32 id)
+{
+ int err, i;
+
+ if (id >= btf__type_cnt(d->btf))
+ return libbpf_err(-EINVAL);
+
+ err = btf_dump_resize(d);
+ if (err)
+ return libbpf_err(err);
+
+ d->emit_queue_cnt = 0;
+ err = btf_dump_order_type(d, id, false);
+ if (err < 0)
+ return libbpf_err(err);
+
+ for (i = 0; i < d->emit_queue_cnt; i++)
+ btf_dump_emit_type(d, d->emit_queue[i], 0 /*top-level*/);
+
+ return 0;
+}
+
+/*
+ * Mark all types that are referenced from any other type. This is used to
+ * determine top-level anonymous enums that need to be emitted as an
+ * independent type declarations.
+ * Anonymous enums come in two flavors: either embedded in a struct's field
+ * definition, in which case they have to be declared inline as part of field
+ * type declaration; or as a top-level anonymous enum, typically used for
+ * declaring global constants. It's impossible to distinguish between two
+ * without knowning whether given enum type was referenced from other type:
+ * top-level anonymous enum won't be referenced by anything, while embedded
+ * one will.
+ */
+static int btf_dump_mark_referenced(struct btf_dump *d)
+{
+ int i, j, n = btf__type_cnt(d->btf);
+ const struct btf_type *t;
+ __u16 vlen;
+
+ for (i = d->last_id + 1; i < n; i++) {
+ t = btf__type_by_id(d->btf, i);
+ vlen = btf_vlen(t);
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_INT:
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ case BTF_KIND_FWD:
+ case BTF_KIND_FLOAT:
+ break;
+
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_CONST:
+ case BTF_KIND_RESTRICT:
+ case BTF_KIND_PTR:
+ case BTF_KIND_TYPEDEF:
+ case BTF_KIND_FUNC:
+ case BTF_KIND_VAR:
+ case BTF_KIND_DECL_TAG:
+ case BTF_KIND_TYPE_TAG:
+ d->type_states[t->type].referenced = 1;
+ break;
+
+ case BTF_KIND_ARRAY: {
+ const struct btf_array *a = btf_array(t);
+
+ d->type_states[a->index_type].referenced = 1;
+ d->type_states[a->type].referenced = 1;
+ break;
+ }
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION: {
+ const struct btf_member *m = btf_members(t);
+
+ for (j = 0; j < vlen; j++, m++)
+ d->type_states[m->type].referenced = 1;
+ break;
+ }
+ case BTF_KIND_FUNC_PROTO: {
+ const struct btf_param *p = btf_params(t);
+
+ for (j = 0; j < vlen; j++, p++)
+ d->type_states[p->type].referenced = 1;
+ break;
+ }
+ case BTF_KIND_DATASEC: {
+ const struct btf_var_secinfo *v = btf_var_secinfos(t);
+
+ for (j = 0; j < vlen; j++, v++)
+ d->type_states[v->type].referenced = 1;
+ break;
+ }
+ default:
+ return -EINVAL;
+ }
+ }
+ return 0;
+}
+
+static int btf_dump_add_emit_queue_id(struct btf_dump *d, __u32 id)
+{
+ __u32 *new_queue;
+ size_t new_cap;
+
+ if (d->emit_queue_cnt >= d->emit_queue_cap) {
+ new_cap = max(16, d->emit_queue_cap * 3 / 2);
+ new_queue = libbpf_reallocarray(d->emit_queue, new_cap, sizeof(new_queue[0]));
+ if (!new_queue)
+ return -ENOMEM;
+ d->emit_queue = new_queue;
+ d->emit_queue_cap = new_cap;
+ }
+
+ d->emit_queue[d->emit_queue_cnt++] = id;
+ return 0;
+}
+
+/*
+ * Determine order of emitting dependent types and specified type to satisfy
+ * C compilation rules. This is done through topological sorting with an
+ * additional complication which comes from C rules. The main idea for C is
+ * that if some type is "embedded" into a struct/union, it's size needs to be
+ * known at the time of definition of containing type. E.g., for:
+ *
+ * struct A {};
+ * struct B { struct A x; }
+ *
+ * struct A *HAS* to be defined before struct B, because it's "embedded",
+ * i.e., it is part of struct B layout. But in the following case:
+ *
+ * struct A;
+ * struct B { struct A *x; }
+ * struct A {};
+ *
+ * it's enough to just have a forward declaration of struct A at the time of
+ * struct B definition, as struct B has a pointer to struct A, so the size of
+ * field x is known without knowing struct A size: it's sizeof(void *).
+ *
+ * Unfortunately, there are some trickier cases we need to handle, e.g.:
+ *
+ * struct A {}; // if this was forward-declaration: compilation error
+ * struct B {
+ * struct { // anonymous struct
+ * struct A y;
+ * } *x;
+ * };
+ *
+ * In this case, struct B's field x is a pointer, so it's size is known
+ * regardless of the size of (anonymous) struct it points to. But because this
+ * struct is anonymous and thus defined inline inside struct B, *and* it
+ * embeds struct A, compiler requires full definition of struct A to be known
+ * before struct B can be defined. This creates a transitive dependency
+ * between struct A and struct B. If struct A was forward-declared before
+ * struct B definition and fully defined after struct B definition, that would
+ * trigger compilation error.
+ *
+ * All this means that while we are doing topological sorting on BTF type
+ * graph, we need to determine relationships between different types (graph
+ * nodes):
+ * - weak link (relationship) between X and Y, if Y *CAN* be
+ * forward-declared at the point of X definition;
+ * - strong link, if Y *HAS* to be fully-defined before X can be defined.
+ *
+ * The rule is as follows. Given a chain of BTF types from X to Y, if there is
+ * BTF_KIND_PTR type in the chain and at least one non-anonymous type
+ * Z (excluding X, including Y), then link is weak. Otherwise, it's strong.
+ * Weak/strong relationship is determined recursively during DFS traversal and
+ * is returned as a result from btf_dump_order_type().
+ *
+ * btf_dump_order_type() is trying to avoid unnecessary forward declarations,
+ * but it is not guaranteeing that no extraneous forward declarations will be
+ * emitted.
+ *
+ * To avoid extra work, algorithm marks some of BTF types as ORDERED, when
+ * it's done with them, but not for all (e.g., VOLATILE, CONST, RESTRICT,
+ * ARRAY, FUNC_PROTO), as weak/strong semantics for those depends on the
+ * entire graph path, so depending where from one came to that BTF type, it
+ * might cause weak or strong ordering. For types like STRUCT/UNION/INT/ENUM,
+ * once they are processed, there is no need to do it again, so they are
+ * marked as ORDERED. We can mark PTR as ORDERED as well, as it semi-forces
+ * weak link, unless subsequent referenced STRUCT/UNION/ENUM is anonymous. But
+ * in any case, once those are processed, no need to do it again, as the
+ * result won't change.
+ *
+ * Returns:
+ * - 1, if type is part of strong link (so there is strong topological
+ * ordering requirements);
+ * - 0, if type is part of weak link (so can be satisfied through forward
+ * declaration);
+ * - <0, on error (e.g., unsatisfiable type loop detected).
+ */
+static int btf_dump_order_type(struct btf_dump *d, __u32 id, bool through_ptr)
+{
+ /*
+ * Order state is used to detect strong link cycles, but only for BTF
+ * kinds that are or could be an independent definition (i.e.,
+ * stand-alone fwd decl, enum, typedef, struct, union). Ptrs, arrays,
+ * func_protos, modifiers are just means to get to these definitions.
+ * Int/void don't need definitions, they are assumed to be always
+ * properly defined. We also ignore datasec, var, and funcs for now.
+ * So for all non-defining kinds, we never even set ordering state,
+ * for defining kinds we set ORDERING and subsequently ORDERED if it
+ * forms a strong link.
+ */
+ struct btf_dump_type_aux_state *tstate = &d->type_states[id];
+ const struct btf_type *t;
+ __u16 vlen;
+ int err, i;
+
+ /* return true, letting typedefs know that it's ok to be emitted */
+ if (tstate->order_state == ORDERED)
+ return 1;
+
+ t = btf__type_by_id(d->btf, id);
+
+ if (tstate->order_state == ORDERING) {
+ /* type loop, but resolvable through fwd declaration */
+ if (btf_is_composite(t) && through_ptr && t->name_off != 0)
+ return 0;
+ pr_warn("unsatisfiable type cycle, id:[%u]\n", id);
+ return -ELOOP;
+ }
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_INT:
+ case BTF_KIND_FLOAT:
+ tstate->order_state = ORDERED;
+ return 0;
+
+ case BTF_KIND_PTR:
+ err = btf_dump_order_type(d, t->type, true);
+ tstate->order_state = ORDERED;
+ return err;
+
+ case BTF_KIND_ARRAY:
+ return btf_dump_order_type(d, btf_array(t)->type, false);
+
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION: {
+ const struct btf_member *m = btf_members(t);
+ /*
+ * struct/union is part of strong link, only if it's embedded
+ * (so no ptr in a path) or it's anonymous (so has to be
+ * defined inline, even if declared through ptr)
+ */
+ if (through_ptr && t->name_off != 0)
+ return 0;
+
+ tstate->order_state = ORDERING;
+
+ vlen = btf_vlen(t);
+ for (i = 0; i < vlen; i++, m++) {
+ err = btf_dump_order_type(d, m->type, false);
+ if (err < 0)
+ return err;
+ }
+
+ if (t->name_off != 0) {
+ err = btf_dump_add_emit_queue_id(d, id);
+ if (err < 0)
+ return err;
+ }
+
+ tstate->order_state = ORDERED;
+ return 1;
+ }
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ case BTF_KIND_FWD:
+ /*
+ * non-anonymous or non-referenced enums are top-level
+ * declarations and should be emitted. Same logic can be
+ * applied to FWDs, it won't hurt anyways.
+ */
+ if (t->name_off != 0 || !tstate->referenced) {
+ err = btf_dump_add_emit_queue_id(d, id);
+ if (err)
+ return err;
+ }
+ tstate->order_state = ORDERED;
+ return 1;
+
+ case BTF_KIND_TYPEDEF: {
+ int is_strong;
+
+ is_strong = btf_dump_order_type(d, t->type, through_ptr);
+ if (is_strong < 0)
+ return is_strong;
+
+ /* typedef is similar to struct/union w.r.t. fwd-decls */
+ if (through_ptr && !is_strong)
+ return 0;
+
+ /* typedef is always a named definition */
+ err = btf_dump_add_emit_queue_id(d, id);
+ if (err)
+ return err;
+
+ d->type_states[id].order_state = ORDERED;
+ return 1;
+ }
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_CONST:
+ case BTF_KIND_RESTRICT:
+ case BTF_KIND_TYPE_TAG:
+ return btf_dump_order_type(d, t->type, through_ptr);
+
+ case BTF_KIND_FUNC_PROTO: {
+ const struct btf_param *p = btf_params(t);
+ bool is_strong;
+
+ err = btf_dump_order_type(d, t->type, through_ptr);
+ if (err < 0)
+ return err;
+ is_strong = err > 0;
+
+ vlen = btf_vlen(t);
+ for (i = 0; i < vlen; i++, p++) {
+ err = btf_dump_order_type(d, p->type, through_ptr);
+ if (err < 0)
+ return err;
+ if (err > 0)
+ is_strong = true;
+ }
+ return is_strong;
+ }
+ case BTF_KIND_FUNC:
+ case BTF_KIND_VAR:
+ case BTF_KIND_DATASEC:
+ case BTF_KIND_DECL_TAG:
+ d->type_states[id].order_state = ORDERED;
+ return 0;
+
+ default:
+ return -EINVAL;
+ }
+}
+
+static void btf_dump_emit_missing_aliases(struct btf_dump *d, __u32 id,
+ const struct btf_type *t);
+
+static void btf_dump_emit_struct_fwd(struct btf_dump *d, __u32 id,
+ const struct btf_type *t);
+static void btf_dump_emit_struct_def(struct btf_dump *d, __u32 id,
+ const struct btf_type *t, int lvl);
+
+static void btf_dump_emit_enum_fwd(struct btf_dump *d, __u32 id,
+ const struct btf_type *t);
+static void btf_dump_emit_enum_def(struct btf_dump *d, __u32 id,
+ const struct btf_type *t, int lvl);
+
+static void btf_dump_emit_fwd_def(struct btf_dump *d, __u32 id,
+ const struct btf_type *t);
+
+static void btf_dump_emit_typedef_def(struct btf_dump *d, __u32 id,
+ const struct btf_type *t, int lvl);
+
+/* a local view into a shared stack */
+struct id_stack {
+ const __u32 *ids;
+ int cnt;
+};
+
+static void btf_dump_emit_type_decl(struct btf_dump *d, __u32 id,
+ const char *fname, int lvl);
+static void btf_dump_emit_type_chain(struct btf_dump *d,
+ struct id_stack *decl_stack,
+ const char *fname, int lvl);
+
+static const char *btf_dump_type_name(struct btf_dump *d, __u32 id);
+static const char *btf_dump_ident_name(struct btf_dump *d, __u32 id);
+static size_t btf_dump_name_dups(struct btf_dump *d, struct hashmap *name_map,
+ const char *orig_name);
+
+static bool btf_dump_is_blacklisted(struct btf_dump *d, __u32 id)
+{
+ const struct btf_type *t = btf__type_by_id(d->btf, id);
+
+ /* __builtin_va_list is a compiler built-in, which causes compilation
+ * errors, when compiling w/ different compiler, then used to compile
+ * original code (e.g., GCC to compile kernel, Clang to use generated
+ * C header from BTF). As it is built-in, it should be already defined
+ * properly internally in compiler.
+ */
+ if (t->name_off == 0)
+ return false;
+ return strcmp(btf_name_of(d, t->name_off), "__builtin_va_list") == 0;
+}
+
+/*
+ * Emit C-syntax definitions of types from chains of BTF types.
+ *
+ * High-level handling of determining necessary forward declarations are handled
+ * by btf_dump_emit_type() itself, but all nitty-gritty details of emitting type
+ * declarations/definitions in C syntax are handled by a combo of
+ * btf_dump_emit_type_decl()/btf_dump_emit_type_chain() w/ delegation to
+ * corresponding btf_dump_emit_*_{def,fwd}() functions.
+ *
+ * We also keep track of "containing struct/union type ID" to determine when
+ * we reference it from inside and thus can avoid emitting unnecessary forward
+ * declaration.
+ *
+ * This algorithm is designed in such a way, that even if some error occurs
+ * (either technical, e.g., out of memory, or logical, i.e., malformed BTF
+ * that doesn't comply to C rules completely), algorithm will try to proceed
+ * and produce as much meaningful output as possible.
+ */
+static void btf_dump_emit_type(struct btf_dump *d, __u32 id, __u32 cont_id)
+{
+ struct btf_dump_type_aux_state *tstate = &d->type_states[id];
+ bool top_level_def = cont_id == 0;
+ const struct btf_type *t;
+ __u16 kind;
+
+ if (tstate->emit_state == EMITTED)
+ return;
+
+ t = btf__type_by_id(d->btf, id);
+ kind = btf_kind(t);
+
+ if (tstate->emit_state == EMITTING) {
+ if (tstate->fwd_emitted)
+ return;
+
+ switch (kind) {
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION:
+ /*
+ * if we are referencing a struct/union that we are
+ * part of - then no need for fwd declaration
+ */
+ if (id == cont_id)
+ return;
+ if (t->name_off == 0) {
+ pr_warn("anonymous struct/union loop, id:[%u]\n",
+ id);
+ return;
+ }
+ btf_dump_emit_struct_fwd(d, id, t);
+ btf_dump_printf(d, ";\n\n");
+ tstate->fwd_emitted = 1;
+ break;
+ case BTF_KIND_TYPEDEF:
+ /*
+ * for typedef fwd_emitted means typedef definition
+ * was emitted, but it can be used only for "weak"
+ * references through pointer only, not for embedding
+ */
+ if (!btf_dump_is_blacklisted(d, id)) {
+ btf_dump_emit_typedef_def(d, id, t, 0);
+ btf_dump_printf(d, ";\n\n");
+ }
+ tstate->fwd_emitted = 1;
+ break;
+ default:
+ break;
+ }
+
+ return;
+ }
+
+ switch (kind) {
+ case BTF_KIND_INT:
+ /* Emit type alias definitions if necessary */
+ btf_dump_emit_missing_aliases(d, id, t);
+
+ tstate->emit_state = EMITTED;
+ break;
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ if (top_level_def) {
+ btf_dump_emit_enum_def(d, id, t, 0);
+ btf_dump_printf(d, ";\n\n");
+ }
+ tstate->emit_state = EMITTED;
+ break;
+ case BTF_KIND_PTR:
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_CONST:
+ case BTF_KIND_RESTRICT:
+ case BTF_KIND_TYPE_TAG:
+ btf_dump_emit_type(d, t->type, cont_id);
+ break;
+ case BTF_KIND_ARRAY:
+ btf_dump_emit_type(d, btf_array(t)->type, cont_id);
+ break;
+ case BTF_KIND_FWD:
+ btf_dump_emit_fwd_def(d, id, t);
+ btf_dump_printf(d, ";\n\n");
+ tstate->emit_state = EMITTED;
+ break;
+ case BTF_KIND_TYPEDEF:
+ tstate->emit_state = EMITTING;
+ btf_dump_emit_type(d, t->type, id);
+ /*
+ * typedef can server as both definition and forward
+ * declaration; at this stage someone depends on
+ * typedef as a forward declaration (refers to it
+ * through pointer), so unless we already did it,
+ * emit typedef as a forward declaration
+ */
+ if (!tstate->fwd_emitted && !btf_dump_is_blacklisted(d, id)) {
+ btf_dump_emit_typedef_def(d, id, t, 0);
+ btf_dump_printf(d, ";\n\n");
+ }
+ tstate->emit_state = EMITTED;
+ break;
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION:
+ tstate->emit_state = EMITTING;
+ /* if it's a top-level struct/union definition or struct/union
+ * is anonymous, then in C we'll be emitting all fields and
+ * their types (as opposed to just `struct X`), so we need to
+ * make sure that all types, referenced from struct/union
+ * members have necessary forward-declarations, where
+ * applicable
+ */
+ if (top_level_def || t->name_off == 0) {
+ const struct btf_member *m = btf_members(t);
+ __u16 vlen = btf_vlen(t);
+ int i, new_cont_id;
+
+ new_cont_id = t->name_off == 0 ? cont_id : id;
+ for (i = 0; i < vlen; i++, m++)
+ btf_dump_emit_type(d, m->type, new_cont_id);
+ } else if (!tstate->fwd_emitted && id != cont_id) {
+ btf_dump_emit_struct_fwd(d, id, t);
+ btf_dump_printf(d, ";\n\n");
+ tstate->fwd_emitted = 1;
+ }
+
+ if (top_level_def) {
+ btf_dump_emit_struct_def(d, id, t, 0);
+ btf_dump_printf(d, ";\n\n");
+ tstate->emit_state = EMITTED;
+ } else {
+ tstate->emit_state = NOT_EMITTED;
+ }
+ break;
+ case BTF_KIND_FUNC_PROTO: {
+ const struct btf_param *p = btf_params(t);
+ __u16 n = btf_vlen(t);
+ int i;
+
+ btf_dump_emit_type(d, t->type, cont_id);
+ for (i = 0; i < n; i++, p++)
+ btf_dump_emit_type(d, p->type, cont_id);
+
+ break;
+ }
+ default:
+ break;
+ }
+}
+
+static bool btf_is_struct_packed(const struct btf *btf, __u32 id,
+ const struct btf_type *t)
+{
+ const struct btf_member *m;
+ int max_align = 1, align, i, bit_sz;
+ __u16 vlen;
+
+ m = btf_members(t);
+ vlen = btf_vlen(t);
+ /* all non-bitfield fields have to be naturally aligned */
+ for (i = 0; i < vlen; i++, m++) {
+ align = btf__align_of(btf, m->type);
+ bit_sz = btf_member_bitfield_size(t, i);
+ if (align && bit_sz == 0 && m->offset % (8 * align) != 0)
+ return true;
+ max_align = max(align, max_align);
+ }
+ /* size of a non-packed struct has to be a multiple of its alignment */
+ if (t->size % max_align != 0)
+ return true;
+ /*
+ * if original struct was marked as packed, but its layout is
+ * naturally aligned, we'll detect that it's not packed
+ */
+ return false;
+}
+
+static void btf_dump_emit_bit_padding(const struct btf_dump *d,
+ int cur_off, int next_off, int next_align,
+ bool in_bitfield, int lvl)
+{
+ const struct {
+ const char *name;
+ int bits;
+ } pads[] = {
+ {"long", d->ptr_sz * 8}, {"int", 32}, {"short", 16}, {"char", 8}
+ };
+ int new_off, pad_bits, bits, i;
+ const char *pad_type;
+
+ if (cur_off >= next_off)
+ return; /* no gap */
+
+ /* For filling out padding we want to take advantage of
+ * natural alignment rules to minimize unnecessary explicit
+ * padding. First, we find the largest type (among long, int,
+ * short, or char) that can be used to force naturally aligned
+ * boundary. Once determined, we'll use such type to fill in
+ * the remaining padding gap. In some cases we can rely on
+ * compiler filling some gaps, but sometimes we need to force
+ * alignment to close natural alignment with markers like
+ * `long: 0` (this is always the case for bitfields). Note
+ * that even if struct itself has, let's say 4-byte alignment
+ * (i.e., it only uses up to int-aligned types), using `long:
+ * X;` explicit padding doesn't actually change struct's
+ * overall alignment requirements, but compiler does take into
+ * account that type's (long, in this example) natural
+ * alignment requirements when adding implicit padding. We use
+ * this fact heavily and don't worry about ruining correct
+ * struct alignment requirement.
+ */
+ for (i = 0; i < ARRAY_SIZE(pads); i++) {
+ pad_bits = pads[i].bits;
+ pad_type = pads[i].name;
+
+ new_off = roundup(cur_off, pad_bits);
+ if (new_off <= next_off)
+ break;
+ }
+
+ if (new_off > cur_off && new_off <= next_off) {
+ /* We need explicit `<type>: 0` aligning mark if next
+ * field is right on alignment offset and its
+ * alignment requirement is less strict than <type>'s
+ * alignment (so compiler won't naturally align to the
+ * offset we expect), or if subsequent `<type>: X`,
+ * will actually completely fit in the remaining hole,
+ * making compiler basically ignore `<type>: X`
+ * completely.
+ */
+ if (in_bitfield ||
+ (new_off == next_off && roundup(cur_off, next_align * 8) != new_off) ||
+ (new_off != next_off && next_off - new_off <= new_off - cur_off))
+ /* but for bitfields we'll emit explicit bit count */
+ btf_dump_printf(d, "\n%s%s: %d;", pfx(lvl), pad_type,
+ in_bitfield ? new_off - cur_off : 0);
+ cur_off = new_off;
+ }
+
+ /* Now we know we start at naturally aligned offset for a chosen
+ * padding type (long, int, short, or char), and so the rest is just
+ * a straightforward filling of remaining padding gap with full
+ * `<type>: sizeof(<type>);` markers, except for the last one, which
+ * might need smaller than sizeof(<type>) padding.
+ */
+ while (cur_off != next_off) {
+ bits = min(next_off - cur_off, pad_bits);
+ if (bits == pad_bits) {
+ btf_dump_printf(d, "\n%s%s: %d;", pfx(lvl), pad_type, pad_bits);
+ cur_off += bits;
+ continue;
+ }
+ /* For the remainder padding that doesn't cover entire
+ * pad_type bit length, we pick the smallest necessary type.
+ * This is pure aesthetics, we could have just used `long`,
+ * but having smallest necessary one communicates better the
+ * scale of the padding gap.
+ */
+ for (i = ARRAY_SIZE(pads) - 1; i >= 0; i--) {
+ pad_type = pads[i].name;
+ pad_bits = pads[i].bits;
+ if (pad_bits < bits)
+ continue;
+
+ btf_dump_printf(d, "\n%s%s: %d;", pfx(lvl), pad_type, bits);
+ cur_off += bits;
+ break;
+ }
+ }
+}
+
+static void btf_dump_emit_struct_fwd(struct btf_dump *d, __u32 id,
+ const struct btf_type *t)
+{
+ btf_dump_printf(d, "%s%s%s",
+ btf_is_struct(t) ? "struct" : "union",
+ t->name_off ? " " : "",
+ btf_dump_type_name(d, id));
+}
+
+static void btf_dump_emit_struct_def(struct btf_dump *d,
+ __u32 id,
+ const struct btf_type *t,
+ int lvl)
+{
+ const struct btf_member *m = btf_members(t);
+ bool is_struct = btf_is_struct(t);
+ bool packed, prev_bitfield = false;
+ int align, i, off = 0;
+ __u16 vlen = btf_vlen(t);
+
+ align = btf__align_of(d->btf, id);
+ packed = is_struct ? btf_is_struct_packed(d->btf, id, t) : 0;
+
+ btf_dump_printf(d, "%s%s%s {",
+ is_struct ? "struct" : "union",
+ t->name_off ? " " : "",
+ btf_dump_type_name(d, id));
+
+ for (i = 0; i < vlen; i++, m++) {
+ const char *fname;
+ int m_off, m_sz, m_align;
+ bool in_bitfield;
+
+ fname = btf_name_of(d, m->name_off);
+ m_sz = btf_member_bitfield_size(t, i);
+ m_off = btf_member_bit_offset(t, i);
+ m_align = packed ? 1 : btf__align_of(d->btf, m->type);
+
+ in_bitfield = prev_bitfield && m_sz != 0;
+
+ btf_dump_emit_bit_padding(d, off, m_off, m_align, in_bitfield, lvl + 1);
+ btf_dump_printf(d, "\n%s", pfx(lvl + 1));
+ btf_dump_emit_type_decl(d, m->type, fname, lvl + 1);
+
+ if (m_sz) {
+ btf_dump_printf(d, ": %d", m_sz);
+ off = m_off + m_sz;
+ prev_bitfield = true;
+ } else {
+ m_sz = max((__s64)0, btf__resolve_size(d->btf, m->type));
+ off = m_off + m_sz * 8;
+ prev_bitfield = false;
+ }
+
+ btf_dump_printf(d, ";");
+ }
+
+ /* pad at the end, if necessary */
+ if (is_struct)
+ btf_dump_emit_bit_padding(d, off, t->size * 8, align, false, lvl + 1);
+
+ /*
+ * Keep `struct empty {}` on a single line,
+ * only print newline when there are regular or padding fields.
+ */
+ if (vlen || t->size) {
+ btf_dump_printf(d, "\n");
+ btf_dump_printf(d, "%s}", pfx(lvl));
+ } else {
+ btf_dump_printf(d, "}");
+ }
+ if (packed)
+ btf_dump_printf(d, " __attribute__((packed))");
+}
+
+static const char *missing_base_types[][2] = {
+ /*
+ * GCC emits typedefs to its internal __PolyX_t types when compiling Arm
+ * SIMD intrinsics. Alias them to standard base types.
+ */
+ { "__Poly8_t", "unsigned char" },
+ { "__Poly16_t", "unsigned short" },
+ { "__Poly64_t", "unsigned long long" },
+ { "__Poly128_t", "unsigned __int128" },
+};
+
+static void btf_dump_emit_missing_aliases(struct btf_dump *d, __u32 id,
+ const struct btf_type *t)
+{
+ const char *name = btf_dump_type_name(d, id);
+ int i;
+
+ for (i = 0; i < ARRAY_SIZE(missing_base_types); i++) {
+ if (strcmp(name, missing_base_types[i][0]) == 0) {
+ btf_dump_printf(d, "typedef %s %s;\n\n",
+ missing_base_types[i][1], name);
+ break;
+ }
+ }
+}
+
+static void btf_dump_emit_enum_fwd(struct btf_dump *d, __u32 id,
+ const struct btf_type *t)
+{
+ btf_dump_printf(d, "enum %s", btf_dump_type_name(d, id));
+}
+
+static void btf_dump_emit_enum32_val(struct btf_dump *d,
+ const struct btf_type *t,
+ int lvl, __u16 vlen)
+{
+ const struct btf_enum *v = btf_enum(t);
+ bool is_signed = btf_kflag(t);
+ const char *fmt_str;
+ const char *name;
+ size_t dup_cnt;
+ int i;
+
+ for (i = 0; i < vlen; i++, v++) {
+ name = btf_name_of(d, v->name_off);
+ /* enumerators share namespace with typedef idents */
+ dup_cnt = btf_dump_name_dups(d, d->ident_names, name);
+ if (dup_cnt > 1) {
+ fmt_str = is_signed ? "\n%s%s___%zd = %d," : "\n%s%s___%zd = %u,";
+ btf_dump_printf(d, fmt_str, pfx(lvl + 1), name, dup_cnt, v->val);
+ } else {
+ fmt_str = is_signed ? "\n%s%s = %d," : "\n%s%s = %u,";
+ btf_dump_printf(d, fmt_str, pfx(lvl + 1), name, v->val);
+ }
+ }
+}
+
+static void btf_dump_emit_enum64_val(struct btf_dump *d,
+ const struct btf_type *t,
+ int lvl, __u16 vlen)
+{
+ const struct btf_enum64 *v = btf_enum64(t);
+ bool is_signed = btf_kflag(t);
+ const char *fmt_str;
+ const char *name;
+ size_t dup_cnt;
+ __u64 val;
+ int i;
+
+ for (i = 0; i < vlen; i++, v++) {
+ name = btf_name_of(d, v->name_off);
+ dup_cnt = btf_dump_name_dups(d, d->ident_names, name);
+ val = btf_enum64_value(v);
+ if (dup_cnt > 1) {
+ fmt_str = is_signed ? "\n%s%s___%zd = %lldLL,"
+ : "\n%s%s___%zd = %lluULL,";
+ btf_dump_printf(d, fmt_str,
+ pfx(lvl + 1), name, dup_cnt,
+ (unsigned long long)val);
+ } else {
+ fmt_str = is_signed ? "\n%s%s = %lldLL,"
+ : "\n%s%s = %lluULL,";
+ btf_dump_printf(d, fmt_str,
+ pfx(lvl + 1), name,
+ (unsigned long long)val);
+ }
+ }
+}
+static void btf_dump_emit_enum_def(struct btf_dump *d, __u32 id,
+ const struct btf_type *t,
+ int lvl)
+{
+ __u16 vlen = btf_vlen(t);
+
+ btf_dump_printf(d, "enum%s%s",
+ t->name_off ? " " : "",
+ btf_dump_type_name(d, id));
+
+ if (!vlen)
+ return;
+
+ btf_dump_printf(d, " {");
+ if (btf_is_enum(t))
+ btf_dump_emit_enum32_val(d, t, lvl, vlen);
+ else
+ btf_dump_emit_enum64_val(d, t, lvl, vlen);
+ btf_dump_printf(d, "\n%s}", pfx(lvl));
+
+ /* special case enums with special sizes */
+ if (t->size == 1) {
+ /* one-byte enums can be forced with mode(byte) attribute */
+ btf_dump_printf(d, " __attribute__((mode(byte)))");
+ } else if (t->size == 8 && d->ptr_sz == 8) {
+ /* enum can be 8-byte sized if one of the enumerator values
+ * doesn't fit in 32-bit integer, or by adding mode(word)
+ * attribute (but probably only on 64-bit architectures); do
+ * our best here to try to satisfy the contract without adding
+ * unnecessary attributes
+ */
+ bool needs_word_mode;
+
+ if (btf_is_enum(t)) {
+ /* enum can't represent 64-bit values, so we need word mode */
+ needs_word_mode = true;
+ } else {
+ /* enum64 needs mode(word) if none of its values has
+ * non-zero upper 32-bits (which means that all values
+ * fit in 32-bit integers and won't cause compiler to
+ * bump enum to be 64-bit naturally
+ */
+ int i;
+
+ needs_word_mode = true;
+ for (i = 0; i < vlen; i++) {
+ if (btf_enum64(t)[i].val_hi32 != 0) {
+ needs_word_mode = false;
+ break;
+ }
+ }
+ }
+ if (needs_word_mode)
+ btf_dump_printf(d, " __attribute__((mode(word)))");
+ }
+
+}
+
+static void btf_dump_emit_fwd_def(struct btf_dump *d, __u32 id,
+ const struct btf_type *t)
+{
+ const char *name = btf_dump_type_name(d, id);
+
+ if (btf_kflag(t))
+ btf_dump_printf(d, "union %s", name);
+ else
+ btf_dump_printf(d, "struct %s", name);
+}
+
+static void btf_dump_emit_typedef_def(struct btf_dump *d, __u32 id,
+ const struct btf_type *t, int lvl)
+{
+ const char *name = btf_dump_ident_name(d, id);
+
+ /*
+ * Old GCC versions are emitting invalid typedef for __gnuc_va_list
+ * pointing to VOID. This generates warnings from btf_dump() and
+ * results in uncompilable header file, so we are fixing it up here
+ * with valid typedef into __builtin_va_list.
+ */
+ if (t->type == 0 && strcmp(name, "__gnuc_va_list") == 0) {
+ btf_dump_printf(d, "typedef __builtin_va_list __gnuc_va_list");
+ return;
+ }
+
+ btf_dump_printf(d, "typedef ");
+ btf_dump_emit_type_decl(d, t->type, name, lvl);
+}
+
+static int btf_dump_push_decl_stack_id(struct btf_dump *d, __u32 id)
+{
+ __u32 *new_stack;
+ size_t new_cap;
+
+ if (d->decl_stack_cnt >= d->decl_stack_cap) {
+ new_cap = max(16, d->decl_stack_cap * 3 / 2);
+ new_stack = libbpf_reallocarray(d->decl_stack, new_cap, sizeof(new_stack[0]));
+ if (!new_stack)
+ return -ENOMEM;
+ d->decl_stack = new_stack;
+ d->decl_stack_cap = new_cap;
+ }
+
+ d->decl_stack[d->decl_stack_cnt++] = id;
+
+ return 0;
+}
+
+/*
+ * Emit type declaration (e.g., field type declaration in a struct or argument
+ * declaration in function prototype) in correct C syntax.
+ *
+ * For most types it's trivial, but there are few quirky type declaration
+ * cases worth mentioning:
+ * - function prototypes (especially nesting of function prototypes);
+ * - arrays;
+ * - const/volatile/restrict for pointers vs other types.
+ *
+ * For a good discussion of *PARSING* C syntax (as a human), see
+ * Peter van der Linden's "Expert C Programming: Deep C Secrets",
+ * Ch.3 "Unscrambling Declarations in C".
+ *
+ * It won't help with BTF to C conversion much, though, as it's an opposite
+ * problem. So we came up with this algorithm in reverse to van der Linden's
+ * parsing algorithm. It goes from structured BTF representation of type
+ * declaration to a valid compilable C syntax.
+ *
+ * For instance, consider this C typedef:
+ * typedef const int * const * arr[10] arr_t;
+ * It will be represented in BTF with this chain of BTF types:
+ * [typedef] -> [array] -> [ptr] -> [const] -> [ptr] -> [const] -> [int]
+ *
+ * Notice how [const] modifier always goes before type it modifies in BTF type
+ * graph, but in C syntax, const/volatile/restrict modifiers are written to
+ * the right of pointers, but to the left of other types. There are also other
+ * quirks, like function pointers, arrays of them, functions returning other
+ * functions, etc.
+ *
+ * We handle that by pushing all the types to a stack, until we hit "terminal"
+ * type (int/enum/struct/union/fwd). Then depending on the kind of a type on
+ * top of a stack, modifiers are handled differently. Array/function pointers
+ * have also wildly different syntax and how nesting of them are done. See
+ * code for authoritative definition.
+ *
+ * To avoid allocating new stack for each independent chain of BTF types, we
+ * share one bigger stack, with each chain working only on its own local view
+ * of a stack frame. Some care is required to "pop" stack frames after
+ * processing type declaration chain.
+ */
+int btf_dump__emit_type_decl(struct btf_dump *d, __u32 id,
+ const struct btf_dump_emit_type_decl_opts *opts)
+{
+ const char *fname;
+ int lvl, err;
+
+ if (!OPTS_VALID(opts, btf_dump_emit_type_decl_opts))
+ return libbpf_err(-EINVAL);
+
+ err = btf_dump_resize(d);
+ if (err)
+ return libbpf_err(err);
+
+ fname = OPTS_GET(opts, field_name, "");
+ lvl = OPTS_GET(opts, indent_level, 0);
+ d->strip_mods = OPTS_GET(opts, strip_mods, false);
+ btf_dump_emit_type_decl(d, id, fname, lvl);
+ d->strip_mods = false;
+ return 0;
+}
+
+static void btf_dump_emit_type_decl(struct btf_dump *d, __u32 id,
+ const char *fname, int lvl)
+{
+ struct id_stack decl_stack;
+ const struct btf_type *t;
+ int err, stack_start;
+
+ stack_start = d->decl_stack_cnt;
+ for (;;) {
+ t = btf__type_by_id(d->btf, id);
+ if (d->strip_mods && btf_is_mod(t))
+ goto skip_mod;
+
+ err = btf_dump_push_decl_stack_id(d, id);
+ if (err < 0) {
+ /*
+ * if we don't have enough memory for entire type decl
+ * chain, restore stack, emit warning, and try to
+ * proceed nevertheless
+ */
+ pr_warn("not enough memory for decl stack:%d", err);
+ d->decl_stack_cnt = stack_start;
+ return;
+ }
+skip_mod:
+ /* VOID */
+ if (id == 0)
+ break;
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_PTR:
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_CONST:
+ case BTF_KIND_RESTRICT:
+ case BTF_KIND_FUNC_PROTO:
+ case BTF_KIND_TYPE_TAG:
+ id = t->type;
+ break;
+ case BTF_KIND_ARRAY:
+ id = btf_array(t)->type;
+ break;
+ case BTF_KIND_INT:
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ case BTF_KIND_FWD:
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION:
+ case BTF_KIND_TYPEDEF:
+ case BTF_KIND_FLOAT:
+ goto done;
+ default:
+ pr_warn("unexpected type in decl chain, kind:%u, id:[%u]\n",
+ btf_kind(t), id);
+ goto done;
+ }
+ }
+done:
+ /*
+ * We might be inside a chain of declarations (e.g., array of function
+ * pointers returning anonymous (so inlined) structs, having another
+ * array field). Each of those needs its own "stack frame" to handle
+ * emitting of declarations. Those stack frames are non-overlapping
+ * portions of shared btf_dump->decl_stack. To make it a bit nicer to
+ * handle this set of nested stacks, we create a view corresponding to
+ * our own "stack frame" and work with it as an independent stack.
+ * We'll need to clean up after emit_type_chain() returns, though.
+ */
+ decl_stack.ids = d->decl_stack + stack_start;
+ decl_stack.cnt = d->decl_stack_cnt - stack_start;
+ btf_dump_emit_type_chain(d, &decl_stack, fname, lvl);
+ /*
+ * emit_type_chain() guarantees that it will pop its entire decl_stack
+ * frame before returning. But it works with a read-only view into
+ * decl_stack, so it doesn't actually pop anything from the
+ * perspective of shared btf_dump->decl_stack, per se. We need to
+ * reset decl_stack state to how it was before us to avoid it growing
+ * all the time.
+ */
+ d->decl_stack_cnt = stack_start;
+}
+
+static void btf_dump_emit_mods(struct btf_dump *d, struct id_stack *decl_stack)
+{
+ const struct btf_type *t;
+ __u32 id;
+
+ while (decl_stack->cnt) {
+ id = decl_stack->ids[decl_stack->cnt - 1];
+ t = btf__type_by_id(d->btf, id);
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_VOLATILE:
+ btf_dump_printf(d, "volatile ");
+ break;
+ case BTF_KIND_CONST:
+ btf_dump_printf(d, "const ");
+ break;
+ case BTF_KIND_RESTRICT:
+ btf_dump_printf(d, "restrict ");
+ break;
+ default:
+ return;
+ }
+ decl_stack->cnt--;
+ }
+}
+
+static void btf_dump_drop_mods(struct btf_dump *d, struct id_stack *decl_stack)
+{
+ const struct btf_type *t;
+ __u32 id;
+
+ while (decl_stack->cnt) {
+ id = decl_stack->ids[decl_stack->cnt - 1];
+ t = btf__type_by_id(d->btf, id);
+ if (!btf_is_mod(t))
+ return;
+ decl_stack->cnt--;
+ }
+}
+
+static void btf_dump_emit_name(const struct btf_dump *d,
+ const char *name, bool last_was_ptr)
+{
+ bool separate = name[0] && !last_was_ptr;
+
+ btf_dump_printf(d, "%s%s", separate ? " " : "", name);
+}
+
+static void btf_dump_emit_type_chain(struct btf_dump *d,
+ struct id_stack *decls,
+ const char *fname, int lvl)
+{
+ /*
+ * last_was_ptr is used to determine if we need to separate pointer
+ * asterisk (*) from previous part of type signature with space, so
+ * that we get `int ***`, instead of `int * * *`. We default to true
+ * for cases where we have single pointer in a chain. E.g., in ptr ->
+ * func_proto case. func_proto will start a new emit_type_chain call
+ * with just ptr, which should be emitted as (*) or (*<fname>), so we
+ * don't want to prepend space for that last pointer.
+ */
+ bool last_was_ptr = true;
+ const struct btf_type *t;
+ const char *name;
+ __u16 kind;
+ __u32 id;
+
+ while (decls->cnt) {
+ id = decls->ids[--decls->cnt];
+ if (id == 0) {
+ /* VOID is a special snowflake */
+ btf_dump_emit_mods(d, decls);
+ btf_dump_printf(d, "void");
+ last_was_ptr = false;
+ continue;
+ }
+
+ t = btf__type_by_id(d->btf, id);
+ kind = btf_kind(t);
+
+ switch (kind) {
+ case BTF_KIND_INT:
+ case BTF_KIND_FLOAT:
+ btf_dump_emit_mods(d, decls);
+ name = btf_name_of(d, t->name_off);
+ btf_dump_printf(d, "%s", name);
+ break;
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION:
+ btf_dump_emit_mods(d, decls);
+ /* inline anonymous struct/union */
+ if (t->name_off == 0 && !d->skip_anon_defs)
+ btf_dump_emit_struct_def(d, id, t, lvl);
+ else
+ btf_dump_emit_struct_fwd(d, id, t);
+ break;
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ btf_dump_emit_mods(d, decls);
+ /* inline anonymous enum */
+ if (t->name_off == 0 && !d->skip_anon_defs)
+ btf_dump_emit_enum_def(d, id, t, lvl);
+ else
+ btf_dump_emit_enum_fwd(d, id, t);
+ break;
+ case BTF_KIND_FWD:
+ btf_dump_emit_mods(d, decls);
+ btf_dump_emit_fwd_def(d, id, t);
+ break;
+ case BTF_KIND_TYPEDEF:
+ btf_dump_emit_mods(d, decls);
+ btf_dump_printf(d, "%s", btf_dump_ident_name(d, id));
+ break;
+ case BTF_KIND_PTR:
+ btf_dump_printf(d, "%s", last_was_ptr ? "*" : " *");
+ break;
+ case BTF_KIND_VOLATILE:
+ btf_dump_printf(d, " volatile");
+ break;
+ case BTF_KIND_CONST:
+ btf_dump_printf(d, " const");
+ break;
+ case BTF_KIND_RESTRICT:
+ btf_dump_printf(d, " restrict");
+ break;
+ case BTF_KIND_TYPE_TAG:
+ btf_dump_emit_mods(d, decls);
+ name = btf_name_of(d, t->name_off);
+ btf_dump_printf(d, " __attribute__((btf_type_tag(\"%s\")))", name);
+ break;
+ case BTF_KIND_ARRAY: {
+ const struct btf_array *a = btf_array(t);
+ const struct btf_type *next_t;
+ __u32 next_id;
+ bool multidim;
+ /*
+ * GCC has a bug
+ * (https://gcc.gnu.org/bugzilla/show_bug.cgi?id=8354)
+ * which causes it to emit extra const/volatile
+ * modifiers for an array, if array's element type has
+ * const/volatile modifiers. Clang doesn't do that.
+ * In general, it doesn't seem very meaningful to have
+ * a const/volatile modifier for array, so we are
+ * going to silently skip them here.
+ */
+ btf_dump_drop_mods(d, decls);
+
+ if (decls->cnt == 0) {
+ btf_dump_emit_name(d, fname, last_was_ptr);
+ btf_dump_printf(d, "[%u]", a->nelems);
+ return;
+ }
+
+ next_id = decls->ids[decls->cnt - 1];
+ next_t = btf__type_by_id(d->btf, next_id);
+ multidim = btf_is_array(next_t);
+ /* we need space if we have named non-pointer */
+ if (fname[0] && !last_was_ptr)
+ btf_dump_printf(d, " ");
+ /* no parentheses for multi-dimensional array */
+ if (!multidim)
+ btf_dump_printf(d, "(");
+ btf_dump_emit_type_chain(d, decls, fname, lvl);
+ if (!multidim)
+ btf_dump_printf(d, ")");
+ btf_dump_printf(d, "[%u]", a->nelems);
+ return;
+ }
+ case BTF_KIND_FUNC_PROTO: {
+ const struct btf_param *p = btf_params(t);
+ __u16 vlen = btf_vlen(t);
+ int i;
+
+ /*
+ * GCC emits extra volatile qualifier for
+ * __attribute__((noreturn)) function pointers. Clang
+ * doesn't do it. It's a GCC quirk for backwards
+ * compatibility with code written for GCC <2.5. So,
+ * similarly to extra qualifiers for array, just drop
+ * them, instead of handling them.
+ */
+ btf_dump_drop_mods(d, decls);
+ if (decls->cnt) {
+ btf_dump_printf(d, " (");
+ btf_dump_emit_type_chain(d, decls, fname, lvl);
+ btf_dump_printf(d, ")");
+ } else {
+ btf_dump_emit_name(d, fname, last_was_ptr);
+ }
+ btf_dump_printf(d, "(");
+ /*
+ * Clang for BPF target generates func_proto with no
+ * args as a func_proto with a single void arg (e.g.,
+ * `int (*f)(void)` vs just `int (*f)()`). We are
+ * going to pretend there are no args for such case.
+ */
+ if (vlen == 1 && p->type == 0) {
+ btf_dump_printf(d, ")");
+ return;
+ }
+
+ for (i = 0; i < vlen; i++, p++) {
+ if (i > 0)
+ btf_dump_printf(d, ", ");
+
+ /* last arg of type void is vararg */
+ if (i == vlen - 1 && p->type == 0) {
+ btf_dump_printf(d, "...");
+ break;
+ }
+
+ name = btf_name_of(d, p->name_off);
+ btf_dump_emit_type_decl(d, p->type, name, lvl);
+ }
+
+ btf_dump_printf(d, ")");
+ return;
+ }
+ default:
+ pr_warn("unexpected type in decl chain, kind:%u, id:[%u]\n",
+ kind, id);
+ return;
+ }
+
+ last_was_ptr = kind == BTF_KIND_PTR;
+ }
+
+ btf_dump_emit_name(d, fname, last_was_ptr);
+}
+
+/* show type name as (type_name) */
+static void btf_dump_emit_type_cast(struct btf_dump *d, __u32 id,
+ bool top_level)
+{
+ const struct btf_type *t;
+
+ /* for array members, we don't bother emitting type name for each
+ * member to avoid the redundancy of
+ * .name = (char[4])[(char)'f',(char)'o',(char)'o',]
+ */
+ if (d->typed_dump->is_array_member)
+ return;
+
+ /* avoid type name specification for variable/section; it will be done
+ * for the associated variable value(s).
+ */
+ t = btf__type_by_id(d->btf, id);
+ if (btf_is_var(t) || btf_is_datasec(t))
+ return;
+
+ if (top_level)
+ btf_dump_printf(d, "(");
+
+ d->skip_anon_defs = true;
+ d->strip_mods = true;
+ btf_dump_emit_type_decl(d, id, "", 0);
+ d->strip_mods = false;
+ d->skip_anon_defs = false;
+
+ if (top_level)
+ btf_dump_printf(d, ")");
+}
+
+/* return number of duplicates (occurrences) of a given name */
+static size_t btf_dump_name_dups(struct btf_dump *d, struct hashmap *name_map,
+ const char *orig_name)
+{
+ char *old_name, *new_name;
+ size_t dup_cnt = 0;
+ int err;
+
+ new_name = strdup(orig_name);
+ if (!new_name)
+ return 1;
+
+ (void)hashmap__find(name_map, orig_name, &dup_cnt);
+ dup_cnt++;
+
+ err = hashmap__set(name_map, new_name, dup_cnt, &old_name, NULL);
+ if (err)
+ free(new_name);
+
+ free(old_name);
+
+ return dup_cnt;
+}
+
+static const char *btf_dump_resolve_name(struct btf_dump *d, __u32 id,
+ struct hashmap *name_map)
+{
+ struct btf_dump_type_aux_state *s = &d->type_states[id];
+ const struct btf_type *t = btf__type_by_id(d->btf, id);
+ const char *orig_name = btf_name_of(d, t->name_off);
+ const char **cached_name = &d->cached_names[id];
+ size_t dup_cnt;
+
+ if (t->name_off == 0)
+ return "";
+
+ if (s->name_resolved)
+ return *cached_name ? *cached_name : orig_name;
+
+ if (btf_is_fwd(t) || (btf_is_enum(t) && btf_vlen(t) == 0)) {
+ s->name_resolved = 1;
+ return orig_name;
+ }
+
+ dup_cnt = btf_dump_name_dups(d, name_map, orig_name);
+ if (dup_cnt > 1) {
+ const size_t max_len = 256;
+ char new_name[max_len];
+
+ snprintf(new_name, max_len, "%s___%zu", orig_name, dup_cnt);
+ *cached_name = strdup(new_name);
+ }
+
+ s->name_resolved = 1;
+ return *cached_name ? *cached_name : orig_name;
+}
+
+static const char *btf_dump_type_name(struct btf_dump *d, __u32 id)
+{
+ return btf_dump_resolve_name(d, id, d->type_names);
+}
+
+static const char *btf_dump_ident_name(struct btf_dump *d, __u32 id)
+{
+ return btf_dump_resolve_name(d, id, d->ident_names);
+}
+
+static int btf_dump_dump_type_data(struct btf_dump *d,
+ const char *fname,
+ const struct btf_type *t,
+ __u32 id,
+ const void *data,
+ __u8 bits_offset,
+ __u8 bit_sz);
+
+static const char *btf_dump_data_newline(struct btf_dump *d)
+{
+ return d->typed_dump->compact || d->typed_dump->depth == 0 ? "" : "\n";
+}
+
+static const char *btf_dump_data_delim(struct btf_dump *d)
+{
+ return d->typed_dump->depth == 0 ? "" : ",";
+}
+
+static void btf_dump_data_pfx(struct btf_dump *d)
+{
+ int i, lvl = d->typed_dump->indent_lvl + d->typed_dump->depth;
+
+ if (d->typed_dump->compact)
+ return;
+
+ for (i = 0; i < lvl; i++)
+ btf_dump_printf(d, "%s", d->typed_dump->indent_str);
+}
+
+/* A macro is used here as btf_type_value[s]() appends format specifiers
+ * to the format specifier passed in; these do the work of appending
+ * delimiters etc while the caller simply has to specify the type values
+ * in the format specifier + value(s).
+ */
+#define btf_dump_type_values(d, fmt, ...) \
+ btf_dump_printf(d, fmt "%s%s", \
+ ##__VA_ARGS__, \
+ btf_dump_data_delim(d), \
+ btf_dump_data_newline(d))
+
+static int btf_dump_unsupported_data(struct btf_dump *d,
+ const struct btf_type *t,
+ __u32 id)
+{
+ btf_dump_printf(d, "<unsupported kind:%u>", btf_kind(t));
+ return -ENOTSUP;
+}
+
+static int btf_dump_get_bitfield_value(struct btf_dump *d,
+ const struct btf_type *t,
+ const void *data,
+ __u8 bits_offset,
+ __u8 bit_sz,
+ __u64 *value)
+{
+ __u16 left_shift_bits, right_shift_bits;
+ const __u8 *bytes = data;
+ __u8 nr_copy_bits;
+ __u64 num = 0;
+ int i;
+
+ /* Maximum supported bitfield size is 64 bits */
+ if (t->size > 8) {
+ pr_warn("unexpected bitfield size %d\n", t->size);
+ return -EINVAL;
+ }
+
+ /* Bitfield value retrieval is done in two steps; first relevant bytes are
+ * stored in num, then we left/right shift num to eliminate irrelevant bits.
+ */
+#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
+ for (i = t->size - 1; i >= 0; i--)
+ num = num * 256 + bytes[i];
+ nr_copy_bits = bit_sz + bits_offset;
+#elif __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
+ for (i = 0; i < t->size; i++)
+ num = num * 256 + bytes[i];
+ nr_copy_bits = t->size * 8 - bits_offset;
+#else
+# error "Unrecognized __BYTE_ORDER__"
+#endif
+ left_shift_bits = 64 - nr_copy_bits;
+ right_shift_bits = 64 - bit_sz;
+
+ *value = (num << left_shift_bits) >> right_shift_bits;
+
+ return 0;
+}
+
+static int btf_dump_bitfield_check_zero(struct btf_dump *d,
+ const struct btf_type *t,
+ const void *data,
+ __u8 bits_offset,
+ __u8 bit_sz)
+{
+ __u64 check_num;
+ int err;
+
+ err = btf_dump_get_bitfield_value(d, t, data, bits_offset, bit_sz, &check_num);
+ if (err)
+ return err;
+ if (check_num == 0)
+ return -ENODATA;
+ return 0;
+}
+
+static int btf_dump_bitfield_data(struct btf_dump *d,
+ const struct btf_type *t,
+ const void *data,
+ __u8 bits_offset,
+ __u8 bit_sz)
+{
+ __u64 print_num;
+ int err;
+
+ err = btf_dump_get_bitfield_value(d, t, data, bits_offset, bit_sz, &print_num);
+ if (err)
+ return err;
+
+ btf_dump_type_values(d, "0x%llx", (unsigned long long)print_num);
+
+ return 0;
+}
+
+/* ints, floats and ptrs */
+static int btf_dump_base_type_check_zero(struct btf_dump *d,
+ const struct btf_type *t,
+ __u32 id,
+ const void *data)
+{
+ static __u8 bytecmp[16] = {};
+ int nr_bytes;
+
+ /* For pointer types, pointer size is not defined on a per-type basis.
+ * On dump creation however, we store the pointer size.
+ */
+ if (btf_kind(t) == BTF_KIND_PTR)
+ nr_bytes = d->ptr_sz;
+ else
+ nr_bytes = t->size;
+
+ if (nr_bytes < 1 || nr_bytes > 16) {
+ pr_warn("unexpected size %d for id [%u]\n", nr_bytes, id);
+ return -EINVAL;
+ }
+
+ if (memcmp(data, bytecmp, nr_bytes) == 0)
+ return -ENODATA;
+ return 0;
+}
+
+static bool ptr_is_aligned(const struct btf *btf, __u32 type_id,
+ const void *data)
+{
+ int alignment = btf__align_of(btf, type_id);
+
+ if (alignment == 0)
+ return false;
+
+ return ((uintptr_t)data) % alignment == 0;
+}
+
+static int btf_dump_int_data(struct btf_dump *d,
+ const struct btf_type *t,
+ __u32 type_id,
+ const void *data,
+ __u8 bits_offset)
+{
+ __u8 encoding = btf_int_encoding(t);
+ bool sign = encoding & BTF_INT_SIGNED;
+ char buf[16] __attribute__((aligned(16)));
+ int sz = t->size;
+
+ if (sz == 0 || sz > sizeof(buf)) {
+ pr_warn("unexpected size %d for id [%u]\n", sz, type_id);
+ return -EINVAL;
+ }
+
+ /* handle packed int data - accesses of integers not aligned on
+ * int boundaries can cause problems on some platforms.
+ */
+ if (!ptr_is_aligned(d->btf, type_id, data)) {
+ memcpy(buf, data, sz);
+ data = buf;
+ }
+
+ switch (sz) {
+ case 16: {
+ const __u64 *ints = data;
+ __u64 lsi, msi;
+
+ /* avoid use of __int128 as some 32-bit platforms do not
+ * support it.
+ */
+#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
+ lsi = ints[0];
+ msi = ints[1];
+#elif __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
+ lsi = ints[1];
+ msi = ints[0];
+#else
+# error "Unrecognized __BYTE_ORDER__"
+#endif
+ if (msi == 0)
+ btf_dump_type_values(d, "0x%llx", (unsigned long long)lsi);
+ else
+ btf_dump_type_values(d, "0x%llx%016llx", (unsigned long long)msi,
+ (unsigned long long)lsi);
+ break;
+ }
+ case 8:
+ if (sign)
+ btf_dump_type_values(d, "%lld", *(long long *)data);
+ else
+ btf_dump_type_values(d, "%llu", *(unsigned long long *)data);
+ break;
+ case 4:
+ if (sign)
+ btf_dump_type_values(d, "%d", *(__s32 *)data);
+ else
+ btf_dump_type_values(d, "%u", *(__u32 *)data);
+ break;
+ case 2:
+ if (sign)
+ btf_dump_type_values(d, "%d", *(__s16 *)data);
+ else
+ btf_dump_type_values(d, "%u", *(__u16 *)data);
+ break;
+ case 1:
+ if (d->typed_dump->is_array_char) {
+ /* check for null terminator */
+ if (d->typed_dump->is_array_terminated)
+ break;
+ if (*(char *)data == '\0') {
+ d->typed_dump->is_array_terminated = true;
+ break;
+ }
+ if (isprint(*(char *)data)) {
+ btf_dump_type_values(d, "'%c'", *(char *)data);
+ break;
+ }
+ }
+ if (sign)
+ btf_dump_type_values(d, "%d", *(__s8 *)data);
+ else
+ btf_dump_type_values(d, "%u", *(__u8 *)data);
+ break;
+ default:
+ pr_warn("unexpected sz %d for id [%u]\n", sz, type_id);
+ return -EINVAL;
+ }
+ return 0;
+}
+
+union float_data {
+ long double ld;
+ double d;
+ float f;
+};
+
+static int btf_dump_float_data(struct btf_dump *d,
+ const struct btf_type *t,
+ __u32 type_id,
+ const void *data)
+{
+ const union float_data *flp = data;
+ union float_data fl;
+ int sz = t->size;
+
+ /* handle unaligned data; copy to local union */
+ if (!ptr_is_aligned(d->btf, type_id, data)) {
+ memcpy(&fl, data, sz);
+ flp = &fl;
+ }
+
+ switch (sz) {
+ case 16:
+ btf_dump_type_values(d, "%Lf", flp->ld);
+ break;
+ case 8:
+ btf_dump_type_values(d, "%lf", flp->d);
+ break;
+ case 4:
+ btf_dump_type_values(d, "%f", flp->f);
+ break;
+ default:
+ pr_warn("unexpected size %d for id [%u]\n", sz, type_id);
+ return -EINVAL;
+ }
+ return 0;
+}
+
+static int btf_dump_var_data(struct btf_dump *d,
+ const struct btf_type *v,
+ __u32 id,
+ const void *data)
+{
+ enum btf_func_linkage linkage = btf_var(v)->linkage;
+ const struct btf_type *t;
+ const char *l;
+ __u32 type_id;
+
+ switch (linkage) {
+ case BTF_FUNC_STATIC:
+ l = "static ";
+ break;
+ case BTF_FUNC_EXTERN:
+ l = "extern ";
+ break;
+ case BTF_FUNC_GLOBAL:
+ default:
+ l = "";
+ break;
+ }
+
+ /* format of output here is [linkage] [type] [varname] = (type)value,
+ * for example "static int cpu_profile_flip = (int)1"
+ */
+ btf_dump_printf(d, "%s", l);
+ type_id = v->type;
+ t = btf__type_by_id(d->btf, type_id);
+ btf_dump_emit_type_cast(d, type_id, false);
+ btf_dump_printf(d, " %s = ", btf_name_of(d, v->name_off));
+ return btf_dump_dump_type_data(d, NULL, t, type_id, data, 0, 0);
+}
+
+static int btf_dump_array_data(struct btf_dump *d,
+ const struct btf_type *t,
+ __u32 id,
+ const void *data)
+{
+ const struct btf_array *array = btf_array(t);
+ const struct btf_type *elem_type;
+ __u32 i, elem_type_id;
+ __s64 elem_size;
+ bool is_array_member;
+
+ elem_type_id = array->type;
+ elem_type = skip_mods_and_typedefs(d->btf, elem_type_id, NULL);
+ elem_size = btf__resolve_size(d->btf, elem_type_id);
+ if (elem_size <= 0) {
+ pr_warn("unexpected elem size %zd for array type [%u]\n",
+ (ssize_t)elem_size, id);
+ return -EINVAL;
+ }
+
+ if (btf_is_int(elem_type)) {
+ /*
+ * BTF_INT_CHAR encoding never seems to be set for
+ * char arrays, so if size is 1 and element is
+ * printable as a char, we'll do that.
+ */
+ if (elem_size == 1)
+ d->typed_dump->is_array_char = true;
+ }
+
+ /* note that we increment depth before calling btf_dump_print() below;
+ * this is intentional. btf_dump_data_newline() will not print a
+ * newline for depth 0 (since this leaves us with trailing newlines
+ * at the end of typed display), so depth is incremented first.
+ * For similar reasons, we decrement depth before showing the closing
+ * parenthesis.
+ */
+ d->typed_dump->depth++;
+ btf_dump_printf(d, "[%s", btf_dump_data_newline(d));
+
+ /* may be a multidimensional array, so store current "is array member"
+ * status so we can restore it correctly later.
+ */
+ is_array_member = d->typed_dump->is_array_member;
+ d->typed_dump->is_array_member = true;
+ for (i = 0; i < array->nelems; i++, data += elem_size) {
+ if (d->typed_dump->is_array_terminated)
+ break;
+ btf_dump_dump_type_data(d, NULL, elem_type, elem_type_id, data, 0, 0);
+ }
+ d->typed_dump->is_array_member = is_array_member;
+ d->typed_dump->depth--;
+ btf_dump_data_pfx(d);
+ btf_dump_type_values(d, "]");
+
+ return 0;
+}
+
+static int btf_dump_struct_data(struct btf_dump *d,
+ const struct btf_type *t,
+ __u32 id,
+ const void *data)
+{
+ const struct btf_member *m = btf_members(t);
+ __u16 n = btf_vlen(t);
+ int i, err = 0;
+
+ /* note that we increment depth before calling btf_dump_print() below;
+ * this is intentional. btf_dump_data_newline() will not print a
+ * newline for depth 0 (since this leaves us with trailing newlines
+ * at the end of typed display), so depth is incremented first.
+ * For similar reasons, we decrement depth before showing the closing
+ * parenthesis.
+ */
+ d->typed_dump->depth++;
+ btf_dump_printf(d, "{%s", btf_dump_data_newline(d));
+
+ for (i = 0; i < n; i++, m++) {
+ const struct btf_type *mtype;
+ const char *mname;
+ __u32 moffset;
+ __u8 bit_sz;
+
+ mtype = btf__type_by_id(d->btf, m->type);
+ mname = btf_name_of(d, m->name_off);
+ moffset = btf_member_bit_offset(t, i);
+
+ bit_sz = btf_member_bitfield_size(t, i);
+ err = btf_dump_dump_type_data(d, mname, mtype, m->type, data + moffset / 8,
+ moffset % 8, bit_sz);
+ if (err < 0)
+ return err;
+ }
+ d->typed_dump->depth--;
+ btf_dump_data_pfx(d);
+ btf_dump_type_values(d, "}");
+ return err;
+}
+
+union ptr_data {
+ unsigned int p;
+ unsigned long long lp;
+};
+
+static int btf_dump_ptr_data(struct btf_dump *d,
+ const struct btf_type *t,
+ __u32 id,
+ const void *data)
+{
+ if (ptr_is_aligned(d->btf, id, data) && d->ptr_sz == sizeof(void *)) {
+ btf_dump_type_values(d, "%p", *(void **)data);
+ } else {
+ union ptr_data pt;
+
+ memcpy(&pt, data, d->ptr_sz);
+ if (d->ptr_sz == 4)
+ btf_dump_type_values(d, "0x%x", pt.p);
+ else
+ btf_dump_type_values(d, "0x%llx", pt.lp);
+ }
+ return 0;
+}
+
+static int btf_dump_get_enum_value(struct btf_dump *d,
+ const struct btf_type *t,
+ const void *data,
+ __u32 id,
+ __s64 *value)
+{
+ bool is_signed = btf_kflag(t);
+
+ if (!ptr_is_aligned(d->btf, id, data)) {
+ __u64 val;
+ int err;
+
+ err = btf_dump_get_bitfield_value(d, t, data, 0, 0, &val);
+ if (err)
+ return err;
+ *value = (__s64)val;
+ return 0;
+ }
+
+ switch (t->size) {
+ case 8:
+ *value = *(__s64 *)data;
+ return 0;
+ case 4:
+ *value = is_signed ? (__s64)*(__s32 *)data : *(__u32 *)data;
+ return 0;
+ case 2:
+ *value = is_signed ? *(__s16 *)data : *(__u16 *)data;
+ return 0;
+ case 1:
+ *value = is_signed ? *(__s8 *)data : *(__u8 *)data;
+ return 0;
+ default:
+ pr_warn("unexpected size %d for enum, id:[%u]\n", t->size, id);
+ return -EINVAL;
+ }
+}
+
+static int btf_dump_enum_data(struct btf_dump *d,
+ const struct btf_type *t,
+ __u32 id,
+ const void *data)
+{
+ bool is_signed;
+ __s64 value;
+ int i, err;
+
+ err = btf_dump_get_enum_value(d, t, data, id, &value);
+ if (err)
+ return err;
+
+ is_signed = btf_kflag(t);
+ if (btf_is_enum(t)) {
+ const struct btf_enum *e;
+
+ for (i = 0, e = btf_enum(t); i < btf_vlen(t); i++, e++) {
+ if (value != e->val)
+ continue;
+ btf_dump_type_values(d, "%s", btf_name_of(d, e->name_off));
+ return 0;
+ }
+
+ btf_dump_type_values(d, is_signed ? "%d" : "%u", value);
+ } else {
+ const struct btf_enum64 *e;
+
+ for (i = 0, e = btf_enum64(t); i < btf_vlen(t); i++, e++) {
+ if (value != btf_enum64_value(e))
+ continue;
+ btf_dump_type_values(d, "%s", btf_name_of(d, e->name_off));
+ return 0;
+ }
+
+ btf_dump_type_values(d, is_signed ? "%lldLL" : "%lluULL",
+ (unsigned long long)value);
+ }
+ return 0;
+}
+
+static int btf_dump_datasec_data(struct btf_dump *d,
+ const struct btf_type *t,
+ __u32 id,
+ const void *data)
+{
+ const struct btf_var_secinfo *vsi;
+ const struct btf_type *var;
+ __u32 i;
+ int err;
+
+ btf_dump_type_values(d, "SEC(\"%s\") ", btf_name_of(d, t->name_off));
+
+ for (i = 0, vsi = btf_var_secinfos(t); i < btf_vlen(t); i++, vsi++) {
+ var = btf__type_by_id(d->btf, vsi->type);
+ err = btf_dump_dump_type_data(d, NULL, var, vsi->type, data + vsi->offset, 0, 0);
+ if (err < 0)
+ return err;
+ btf_dump_printf(d, ";");
+ }
+ return 0;
+}
+
+/* return size of type, or if base type overflows, return -E2BIG. */
+static int btf_dump_type_data_check_overflow(struct btf_dump *d,
+ const struct btf_type *t,
+ __u32 id,
+ const void *data,
+ __u8 bits_offset)
+{
+ __s64 size = btf__resolve_size(d->btf, id);
+
+ if (size < 0 || size >= INT_MAX) {
+ pr_warn("unexpected size [%zu] for id [%u]\n",
+ (size_t)size, id);
+ return -EINVAL;
+ }
+
+ /* Only do overflow checking for base types; we do not want to
+ * avoid showing part of a struct, union or array, even if we
+ * do not have enough data to show the full object. By
+ * restricting overflow checking to base types we can ensure
+ * that partial display succeeds, while avoiding overflowing
+ * and using bogus data for display.
+ */
+ t = skip_mods_and_typedefs(d->btf, id, NULL);
+ if (!t) {
+ pr_warn("unexpected error skipping mods/typedefs for id [%u]\n",
+ id);
+ return -EINVAL;
+ }
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_INT:
+ case BTF_KIND_FLOAT:
+ case BTF_KIND_PTR:
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ if (data + bits_offset / 8 + size > d->typed_dump->data_end)
+ return -E2BIG;
+ break;
+ default:
+ break;
+ }
+ return (int)size;
+}
+
+static int btf_dump_type_data_check_zero(struct btf_dump *d,
+ const struct btf_type *t,
+ __u32 id,
+ const void *data,
+ __u8 bits_offset,
+ __u8 bit_sz)
+{
+ __s64 value;
+ int i, err;
+
+ /* toplevel exceptions; we show zero values if
+ * - we ask for them (emit_zeros)
+ * - if we are at top-level so we see "struct empty { }"
+ * - or if we are an array member and the array is non-empty and
+ * not a char array; we don't want to be in a situation where we
+ * have an integer array 0, 1, 0, 1 and only show non-zero values.
+ * If the array contains zeroes only, or is a char array starting
+ * with a '\0', the array-level check_zero() will prevent showing it;
+ * we are concerned with determining zero value at the array member
+ * level here.
+ */
+ if (d->typed_dump->emit_zeroes || d->typed_dump->depth == 0 ||
+ (d->typed_dump->is_array_member &&
+ !d->typed_dump->is_array_char))
+ return 0;
+
+ t = skip_mods_and_typedefs(d->btf, id, NULL);
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_INT:
+ if (bit_sz)
+ return btf_dump_bitfield_check_zero(d, t, data, bits_offset, bit_sz);
+ return btf_dump_base_type_check_zero(d, t, id, data);
+ case BTF_KIND_FLOAT:
+ case BTF_KIND_PTR:
+ return btf_dump_base_type_check_zero(d, t, id, data);
+ case BTF_KIND_ARRAY: {
+ const struct btf_array *array = btf_array(t);
+ const struct btf_type *elem_type;
+ __u32 elem_type_id, elem_size;
+ bool ischar;
+
+ elem_type_id = array->type;
+ elem_size = btf__resolve_size(d->btf, elem_type_id);
+ elem_type = skip_mods_and_typedefs(d->btf, elem_type_id, NULL);
+
+ ischar = btf_is_int(elem_type) && elem_size == 1;
+
+ /* check all elements; if _any_ element is nonzero, all
+ * of array is displayed. We make an exception however
+ * for char arrays where the first element is 0; these
+ * are considered zeroed also, even if later elements are
+ * non-zero because the string is terminated.
+ */
+ for (i = 0; i < array->nelems; i++) {
+ if (i == 0 && ischar && *(char *)data == 0)
+ return -ENODATA;
+ err = btf_dump_type_data_check_zero(d, elem_type,
+ elem_type_id,
+ data +
+ (i * elem_size),
+ bits_offset, 0);
+ if (err != -ENODATA)
+ return err;
+ }
+ return -ENODATA;
+ }
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION: {
+ const struct btf_member *m = btf_members(t);
+ __u16 n = btf_vlen(t);
+
+ /* if any struct/union member is non-zero, the struct/union
+ * is considered non-zero and dumped.
+ */
+ for (i = 0; i < n; i++, m++) {
+ const struct btf_type *mtype;
+ __u32 moffset;
+
+ mtype = btf__type_by_id(d->btf, m->type);
+ moffset = btf_member_bit_offset(t, i);
+
+ /* btf_int_bits() does not store member bitfield size;
+ * bitfield size needs to be stored here so int display
+ * of member can retrieve it.
+ */
+ bit_sz = btf_member_bitfield_size(t, i);
+ err = btf_dump_type_data_check_zero(d, mtype, m->type, data + moffset / 8,
+ moffset % 8, bit_sz);
+ if (err != ENODATA)
+ return err;
+ }
+ return -ENODATA;
+ }
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ err = btf_dump_get_enum_value(d, t, data, id, &value);
+ if (err)
+ return err;
+ if (value == 0)
+ return -ENODATA;
+ return 0;
+ default:
+ return 0;
+ }
+}
+
+/* returns size of data dumped, or error. */
+static int btf_dump_dump_type_data(struct btf_dump *d,
+ const char *fname,
+ const struct btf_type *t,
+ __u32 id,
+ const void *data,
+ __u8 bits_offset,
+ __u8 bit_sz)
+{
+ int size, err = 0;
+
+ size = btf_dump_type_data_check_overflow(d, t, id, data, bits_offset);
+ if (size < 0)
+ return size;
+ err = btf_dump_type_data_check_zero(d, t, id, data, bits_offset, bit_sz);
+ if (err) {
+ /* zeroed data is expected and not an error, so simply skip
+ * dumping such data. Record other errors however.
+ */
+ if (err == -ENODATA)
+ return size;
+ return err;
+ }
+ btf_dump_data_pfx(d);
+
+ if (!d->typed_dump->skip_names) {
+ if (fname && strlen(fname) > 0)
+ btf_dump_printf(d, ".%s = ", fname);
+ btf_dump_emit_type_cast(d, id, true);
+ }
+
+ t = skip_mods_and_typedefs(d->btf, id, NULL);
+
+ switch (btf_kind(t)) {
+ case BTF_KIND_UNKN:
+ case BTF_KIND_FWD:
+ case BTF_KIND_FUNC:
+ case BTF_KIND_FUNC_PROTO:
+ case BTF_KIND_DECL_TAG:
+ err = btf_dump_unsupported_data(d, t, id);
+ break;
+ case BTF_KIND_INT:
+ if (bit_sz)
+ err = btf_dump_bitfield_data(d, t, data, bits_offset, bit_sz);
+ else
+ err = btf_dump_int_data(d, t, id, data, bits_offset);
+ break;
+ case BTF_KIND_FLOAT:
+ err = btf_dump_float_data(d, t, id, data);
+ break;
+ case BTF_KIND_PTR:
+ err = btf_dump_ptr_data(d, t, id, data);
+ break;
+ case BTF_KIND_ARRAY:
+ err = btf_dump_array_data(d, t, id, data);
+ break;
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION:
+ err = btf_dump_struct_data(d, t, id, data);
+ break;
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ /* handle bitfield and int enum values */
+ if (bit_sz) {
+ __u64 print_num;
+ __s64 enum_val;
+
+ err = btf_dump_get_bitfield_value(d, t, data, bits_offset, bit_sz,
+ &print_num);
+ if (err)
+ break;
+ enum_val = (__s64)print_num;
+ err = btf_dump_enum_data(d, t, id, &enum_val);
+ } else
+ err = btf_dump_enum_data(d, t, id, data);
+ break;
+ case BTF_KIND_VAR:
+ err = btf_dump_var_data(d, t, id, data);
+ break;
+ case BTF_KIND_DATASEC:
+ err = btf_dump_datasec_data(d, t, id, data);
+ break;
+ default:
+ pr_warn("unexpected kind [%u] for id [%u]\n",
+ BTF_INFO_KIND(t->info), id);
+ return -EINVAL;
+ }
+ if (err < 0)
+ return err;
+ return size;
+}
+
+int btf_dump__dump_type_data(struct btf_dump *d, __u32 id,
+ const void *data, size_t data_sz,
+ const struct btf_dump_type_data_opts *opts)
+{
+ struct btf_dump_data typed_dump = {};
+ const struct btf_type *t;
+ int ret;
+
+ if (!OPTS_VALID(opts, btf_dump_type_data_opts))
+ return libbpf_err(-EINVAL);
+
+ t = btf__type_by_id(d->btf, id);
+ if (!t)
+ return libbpf_err(-ENOENT);
+
+ d->typed_dump = &typed_dump;
+ d->typed_dump->data_end = data + data_sz;
+ d->typed_dump->indent_lvl = OPTS_GET(opts, indent_level, 0);
+
+ /* default indent string is a tab */
+ if (!OPTS_GET(opts, indent_str, NULL))
+ d->typed_dump->indent_str[0] = '\t';
+ else
+ libbpf_strlcpy(d->typed_dump->indent_str, opts->indent_str,
+ sizeof(d->typed_dump->indent_str));
+
+ d->typed_dump->compact = OPTS_GET(opts, compact, false);
+ d->typed_dump->skip_names = OPTS_GET(opts, skip_names, false);
+ d->typed_dump->emit_zeroes = OPTS_GET(opts, emit_zeroes, false);
+
+ ret = btf_dump_dump_type_data(d, NULL, t, id, data, 0, 0);
+
+ d->typed_dump = NULL;
+
+ return libbpf_err(ret);
+}
diff --git a/src/gen_loader.c b/src/gen_loader.c
new file mode 100644
index 0000000..23f5c46
--- /dev/null
+++ b/src/gen_loader.c
@@ -0,0 +1,1121 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+/* Copyright (c) 2021 Facebook */
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <errno.h>
+#include <linux/filter.h>
+#include <sys/param.h>
+#include "btf.h"
+#include "bpf.h"
+#include "libbpf.h"
+#include "libbpf_internal.h"
+#include "hashmap.h"
+#include "bpf_gen_internal.h"
+#include "skel_internal.h"
+#include <asm/byteorder.h>
+
+#define MAX_USED_MAPS 64
+#define MAX_USED_PROGS 32
+#define MAX_KFUNC_DESCS 256
+#define MAX_FD_ARRAY_SZ (MAX_USED_MAPS + MAX_KFUNC_DESCS)
+
+/* The following structure describes the stack layout of the loader program.
+ * In addition R6 contains the pointer to context.
+ * R7 contains the result of the last sys_bpf command (typically error or FD).
+ * R9 contains the result of the last sys_close command.
+ *
+ * Naming convention:
+ * ctx - bpf program context
+ * stack - bpf program stack
+ * blob - bpf_attr-s, strings, insns, map data.
+ * All the bytes that loader prog will use for read/write.
+ */
+struct loader_stack {
+ __u32 btf_fd;
+ __u32 inner_map_fd;
+ __u32 prog_fd[MAX_USED_PROGS];
+};
+
+#define stack_off(field) \
+ (__s16)(-sizeof(struct loader_stack) + offsetof(struct loader_stack, field))
+
+#define attr_field(attr, field) (attr + offsetof(union bpf_attr, field))
+
+static int blob_fd_array_off(struct bpf_gen *gen, int index)
+{
+ return gen->fd_array + index * sizeof(int);
+}
+
+static int realloc_insn_buf(struct bpf_gen *gen, __u32 size)
+{
+ size_t off = gen->insn_cur - gen->insn_start;
+ void *insn_start;
+
+ if (gen->error)
+ return gen->error;
+ if (size > INT32_MAX || off + size > INT32_MAX) {
+ gen->error = -ERANGE;
+ return -ERANGE;
+ }
+ insn_start = realloc(gen->insn_start, off + size);
+ if (!insn_start) {
+ gen->error = -ENOMEM;
+ free(gen->insn_start);
+ gen->insn_start = NULL;
+ return -ENOMEM;
+ }
+ gen->insn_start = insn_start;
+ gen->insn_cur = insn_start + off;
+ return 0;
+}
+
+static int realloc_data_buf(struct bpf_gen *gen, __u32 size)
+{
+ size_t off = gen->data_cur - gen->data_start;
+ void *data_start;
+
+ if (gen->error)
+ return gen->error;
+ if (size > INT32_MAX || off + size > INT32_MAX) {
+ gen->error = -ERANGE;
+ return -ERANGE;
+ }
+ data_start = realloc(gen->data_start, off + size);
+ if (!data_start) {
+ gen->error = -ENOMEM;
+ free(gen->data_start);
+ gen->data_start = NULL;
+ return -ENOMEM;
+ }
+ gen->data_start = data_start;
+ gen->data_cur = data_start + off;
+ return 0;
+}
+
+static void emit(struct bpf_gen *gen, struct bpf_insn insn)
+{
+ if (realloc_insn_buf(gen, sizeof(insn)))
+ return;
+ memcpy(gen->insn_cur, &insn, sizeof(insn));
+ gen->insn_cur += sizeof(insn);
+}
+
+static void emit2(struct bpf_gen *gen, struct bpf_insn insn1, struct bpf_insn insn2)
+{
+ emit(gen, insn1);
+ emit(gen, insn2);
+}
+
+static int add_data(struct bpf_gen *gen, const void *data, __u32 size);
+static void emit_sys_close_blob(struct bpf_gen *gen, int blob_off);
+
+void bpf_gen__init(struct bpf_gen *gen, int log_level, int nr_progs, int nr_maps)
+{
+ size_t stack_sz = sizeof(struct loader_stack), nr_progs_sz;
+ int i;
+
+ gen->fd_array = add_data(gen, NULL, MAX_FD_ARRAY_SZ * sizeof(int));
+ gen->log_level = log_level;
+ /* save ctx pointer into R6 */
+ emit(gen, BPF_MOV64_REG(BPF_REG_6, BPF_REG_1));
+
+ /* bzero stack */
+ emit(gen, BPF_MOV64_REG(BPF_REG_1, BPF_REG_10));
+ emit(gen, BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -stack_sz));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_2, stack_sz));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_3, 0));
+ emit(gen, BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel));
+
+ /* amount of stack actually used, only used to calculate iterations, not stack offset */
+ nr_progs_sz = offsetof(struct loader_stack, prog_fd[nr_progs]);
+ /* jump over cleanup code */
+ emit(gen, BPF_JMP_IMM(BPF_JA, 0, 0,
+ /* size of cleanup code below (including map fd cleanup) */
+ (nr_progs_sz / 4) * 3 + 2 +
+ /* 6 insns for emit_sys_close_blob,
+ * 6 insns for debug_regs in emit_sys_close_blob
+ */
+ nr_maps * (6 + (gen->log_level ? 6 : 0))));
+
+ /* remember the label where all error branches will jump to */
+ gen->cleanup_label = gen->insn_cur - gen->insn_start;
+ /* emit cleanup code: close all temp FDs */
+ for (i = 0; i < nr_progs_sz; i += 4) {
+ emit(gen, BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_10, -stack_sz + i));
+ emit(gen, BPF_JMP_IMM(BPF_JSLE, BPF_REG_1, 0, 1));
+ emit(gen, BPF_EMIT_CALL(BPF_FUNC_sys_close));
+ }
+ for (i = 0; i < nr_maps; i++)
+ emit_sys_close_blob(gen, blob_fd_array_off(gen, i));
+ /* R7 contains the error code from sys_bpf. Copy it into R0 and exit. */
+ emit(gen, BPF_MOV64_REG(BPF_REG_0, BPF_REG_7));
+ emit(gen, BPF_EXIT_INSN());
+}
+
+static int add_data(struct bpf_gen *gen, const void *data, __u32 size)
+{
+ __u32 size8 = roundup(size, 8);
+ __u64 zero = 0;
+ void *prev;
+
+ if (realloc_data_buf(gen, size8))
+ return 0;
+ prev = gen->data_cur;
+ if (data) {
+ memcpy(gen->data_cur, data, size);
+ memcpy(gen->data_cur + size, &zero, size8 - size);
+ } else {
+ memset(gen->data_cur, 0, size8);
+ }
+ gen->data_cur += size8;
+ return prev - gen->data_start;
+}
+
+/* Get index for map_fd/btf_fd slot in reserved fd_array, or in data relative
+ * to start of fd_array. Caller can decide if it is usable or not.
+ */
+static int add_map_fd(struct bpf_gen *gen)
+{
+ if (gen->nr_maps == MAX_USED_MAPS) {
+ pr_warn("Total maps exceeds %d\n", MAX_USED_MAPS);
+ gen->error = -E2BIG;
+ return 0;
+ }
+ return gen->nr_maps++;
+}
+
+static int add_kfunc_btf_fd(struct bpf_gen *gen)
+{
+ int cur;
+
+ if (gen->nr_fd_array == MAX_KFUNC_DESCS) {
+ cur = add_data(gen, NULL, sizeof(int));
+ return (cur - gen->fd_array) / sizeof(int);
+ }
+ return MAX_USED_MAPS + gen->nr_fd_array++;
+}
+
+static int insn_bytes_to_bpf_size(__u32 sz)
+{
+ switch (sz) {
+ case 8: return BPF_DW;
+ case 4: return BPF_W;
+ case 2: return BPF_H;
+ case 1: return BPF_B;
+ default: return -1;
+ }
+}
+
+/* *(u64 *)(blob + off) = (u64)(void *)(blob + data) */
+static void emit_rel_store(struct bpf_gen *gen, int off, int data)
+{
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_0, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, data));
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_1, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, off));
+ emit(gen, BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, 0));
+}
+
+static void move_blob2blob(struct bpf_gen *gen, int off, int size, int blob_off)
+{
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_2, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, blob_off));
+ emit(gen, BPF_LDX_MEM(insn_bytes_to_bpf_size(size), BPF_REG_0, BPF_REG_2, 0));
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_1, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, off));
+ emit(gen, BPF_STX_MEM(insn_bytes_to_bpf_size(size), BPF_REG_1, BPF_REG_0, 0));
+}
+
+static void move_blob2ctx(struct bpf_gen *gen, int ctx_off, int size, int blob_off)
+{
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_1, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, blob_off));
+ emit(gen, BPF_LDX_MEM(insn_bytes_to_bpf_size(size), BPF_REG_0, BPF_REG_1, 0));
+ emit(gen, BPF_STX_MEM(insn_bytes_to_bpf_size(size), BPF_REG_6, BPF_REG_0, ctx_off));
+}
+
+static void move_ctx2blob(struct bpf_gen *gen, int off, int size, int ctx_off,
+ bool check_non_zero)
+{
+ emit(gen, BPF_LDX_MEM(insn_bytes_to_bpf_size(size), BPF_REG_0, BPF_REG_6, ctx_off));
+ if (check_non_zero)
+ /* If value in ctx is zero don't update the blob.
+ * For example: when ctx->map.max_entries == 0, keep default max_entries from bpf.c
+ */
+ emit(gen, BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 3));
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_1, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, off));
+ emit(gen, BPF_STX_MEM(insn_bytes_to_bpf_size(size), BPF_REG_1, BPF_REG_0, 0));
+}
+
+static void move_stack2blob(struct bpf_gen *gen, int off, int size, int stack_off)
+{
+ emit(gen, BPF_LDX_MEM(insn_bytes_to_bpf_size(size), BPF_REG_0, BPF_REG_10, stack_off));
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_1, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, off));
+ emit(gen, BPF_STX_MEM(insn_bytes_to_bpf_size(size), BPF_REG_1, BPF_REG_0, 0));
+}
+
+static void move_stack2ctx(struct bpf_gen *gen, int ctx_off, int size, int stack_off)
+{
+ emit(gen, BPF_LDX_MEM(insn_bytes_to_bpf_size(size), BPF_REG_0, BPF_REG_10, stack_off));
+ emit(gen, BPF_STX_MEM(insn_bytes_to_bpf_size(size), BPF_REG_6, BPF_REG_0, ctx_off));
+}
+
+static void emit_sys_bpf(struct bpf_gen *gen, int cmd, int attr, int attr_size)
+{
+ emit(gen, BPF_MOV64_IMM(BPF_REG_1, cmd));
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_2, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, attr));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_3, attr_size));
+ emit(gen, BPF_EMIT_CALL(BPF_FUNC_sys_bpf));
+ /* remember the result in R7 */
+ emit(gen, BPF_MOV64_REG(BPF_REG_7, BPF_REG_0));
+}
+
+static bool is_simm16(__s64 value)
+{
+ return value == (__s64)(__s16)value;
+}
+
+static void emit_check_err(struct bpf_gen *gen)
+{
+ __s64 off = -(gen->insn_cur - gen->insn_start - gen->cleanup_label) / 8 - 1;
+
+ /* R7 contains result of last sys_bpf command.
+ * if (R7 < 0) goto cleanup;
+ */
+ if (is_simm16(off)) {
+ emit(gen, BPF_JMP_IMM(BPF_JSLT, BPF_REG_7, 0, off));
+ } else {
+ gen->error = -ERANGE;
+ emit(gen, BPF_JMP_IMM(BPF_JA, 0, 0, -1));
+ }
+}
+
+/* reg1 and reg2 should not be R1 - R5. They can be R0, R6 - R10 */
+static void emit_debug(struct bpf_gen *gen, int reg1, int reg2,
+ const char *fmt, va_list args)
+{
+ char buf[1024];
+ int addr, len, ret;
+
+ if (!gen->log_level)
+ return;
+ ret = vsnprintf(buf, sizeof(buf), fmt, args);
+ if (ret < 1024 - 7 && reg1 >= 0 && reg2 < 0)
+ /* The special case to accommodate common debug_ret():
+ * to avoid specifying BPF_REG_7 and adding " r=%%d" to
+ * prints explicitly.
+ */
+ strcat(buf, " r=%d");
+ len = strlen(buf) + 1;
+ addr = add_data(gen, buf, len);
+
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_1, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, addr));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_2, len));
+ if (reg1 >= 0)
+ emit(gen, BPF_MOV64_REG(BPF_REG_3, reg1));
+ if (reg2 >= 0)
+ emit(gen, BPF_MOV64_REG(BPF_REG_4, reg2));
+ emit(gen, BPF_EMIT_CALL(BPF_FUNC_trace_printk));
+}
+
+static void debug_regs(struct bpf_gen *gen, int reg1, int reg2, const char *fmt, ...)
+{
+ va_list args;
+
+ va_start(args, fmt);
+ emit_debug(gen, reg1, reg2, fmt, args);
+ va_end(args);
+}
+
+static void debug_ret(struct bpf_gen *gen, const char *fmt, ...)
+{
+ va_list args;
+
+ va_start(args, fmt);
+ emit_debug(gen, BPF_REG_7, -1, fmt, args);
+ va_end(args);
+}
+
+static void __emit_sys_close(struct bpf_gen *gen)
+{
+ emit(gen, BPF_JMP_IMM(BPF_JSLE, BPF_REG_1, 0,
+ /* 2 is the number of the following insns
+ * * 6 is additional insns in debug_regs
+ */
+ 2 + (gen->log_level ? 6 : 0)));
+ emit(gen, BPF_MOV64_REG(BPF_REG_9, BPF_REG_1));
+ emit(gen, BPF_EMIT_CALL(BPF_FUNC_sys_close));
+ debug_regs(gen, BPF_REG_9, BPF_REG_0, "close(%%d) = %%d");
+}
+
+static void emit_sys_close_stack(struct bpf_gen *gen, int stack_off)
+{
+ emit(gen, BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_10, stack_off));
+ __emit_sys_close(gen);
+}
+
+static void emit_sys_close_blob(struct bpf_gen *gen, int blob_off)
+{
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_0, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, blob_off));
+ emit(gen, BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0));
+ __emit_sys_close(gen);
+}
+
+int bpf_gen__finish(struct bpf_gen *gen, int nr_progs, int nr_maps)
+{
+ int i;
+
+ if (nr_progs < gen->nr_progs || nr_maps != gen->nr_maps) {
+ pr_warn("nr_progs %d/%d nr_maps %d/%d mismatch\n",
+ nr_progs, gen->nr_progs, nr_maps, gen->nr_maps);
+ gen->error = -EFAULT;
+ return gen->error;
+ }
+ emit_sys_close_stack(gen, stack_off(btf_fd));
+ for (i = 0; i < gen->nr_progs; i++)
+ move_stack2ctx(gen,
+ sizeof(struct bpf_loader_ctx) +
+ sizeof(struct bpf_map_desc) * gen->nr_maps +
+ sizeof(struct bpf_prog_desc) * i +
+ offsetof(struct bpf_prog_desc, prog_fd), 4,
+ stack_off(prog_fd[i]));
+ for (i = 0; i < gen->nr_maps; i++)
+ move_blob2ctx(gen,
+ sizeof(struct bpf_loader_ctx) +
+ sizeof(struct bpf_map_desc) * i +
+ offsetof(struct bpf_map_desc, map_fd), 4,
+ blob_fd_array_off(gen, i));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_0, 0));
+ emit(gen, BPF_EXIT_INSN());
+ pr_debug("gen: finish %d\n", gen->error);
+ if (!gen->error) {
+ struct gen_loader_opts *opts = gen->opts;
+
+ opts->insns = gen->insn_start;
+ opts->insns_sz = gen->insn_cur - gen->insn_start;
+ opts->data = gen->data_start;
+ opts->data_sz = gen->data_cur - gen->data_start;
+ }
+ return gen->error;
+}
+
+void bpf_gen__free(struct bpf_gen *gen)
+{
+ if (!gen)
+ return;
+ free(gen->data_start);
+ free(gen->insn_start);
+ free(gen);
+}
+
+void bpf_gen__load_btf(struct bpf_gen *gen, const void *btf_raw_data,
+ __u32 btf_raw_size)
+{
+ int attr_size = offsetofend(union bpf_attr, btf_log_level);
+ int btf_data, btf_load_attr;
+ union bpf_attr attr;
+
+ memset(&attr, 0, attr_size);
+ pr_debug("gen: load_btf: size %d\n", btf_raw_size);
+ btf_data = add_data(gen, btf_raw_data, btf_raw_size);
+
+ attr.btf_size = btf_raw_size;
+ btf_load_attr = add_data(gen, &attr, attr_size);
+
+ /* populate union bpf_attr with user provided log details */
+ move_ctx2blob(gen, attr_field(btf_load_attr, btf_log_level), 4,
+ offsetof(struct bpf_loader_ctx, log_level), false);
+ move_ctx2blob(gen, attr_field(btf_load_attr, btf_log_size), 4,
+ offsetof(struct bpf_loader_ctx, log_size), false);
+ move_ctx2blob(gen, attr_field(btf_load_attr, btf_log_buf), 8,
+ offsetof(struct bpf_loader_ctx, log_buf), false);
+ /* populate union bpf_attr with a pointer to the BTF data */
+ emit_rel_store(gen, attr_field(btf_load_attr, btf), btf_data);
+ /* emit BTF_LOAD command */
+ emit_sys_bpf(gen, BPF_BTF_LOAD, btf_load_attr, attr_size);
+ debug_ret(gen, "btf_load size %d", btf_raw_size);
+ emit_check_err(gen);
+ /* remember btf_fd in the stack, if successful */
+ emit(gen, BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_7, stack_off(btf_fd)));
+}
+
+void bpf_gen__map_create(struct bpf_gen *gen,
+ enum bpf_map_type map_type,
+ const char *map_name,
+ __u32 key_size, __u32 value_size, __u32 max_entries,
+ struct bpf_map_create_opts *map_attr, int map_idx)
+{
+ int attr_size = offsetofend(union bpf_attr, map_extra);
+ bool close_inner_map_fd = false;
+ int map_create_attr, idx;
+ union bpf_attr attr;
+
+ memset(&attr, 0, attr_size);
+ attr.map_type = map_type;
+ attr.key_size = key_size;
+ attr.value_size = value_size;
+ attr.map_flags = map_attr->map_flags;
+ attr.map_extra = map_attr->map_extra;
+ if (map_name)
+ libbpf_strlcpy(attr.map_name, map_name, sizeof(attr.map_name));
+ attr.numa_node = map_attr->numa_node;
+ attr.map_ifindex = map_attr->map_ifindex;
+ attr.max_entries = max_entries;
+ attr.btf_key_type_id = map_attr->btf_key_type_id;
+ attr.btf_value_type_id = map_attr->btf_value_type_id;
+
+ pr_debug("gen: map_create: %s idx %d type %d value_type_id %d\n",
+ attr.map_name, map_idx, map_type, attr.btf_value_type_id);
+
+ map_create_attr = add_data(gen, &attr, attr_size);
+ if (attr.btf_value_type_id)
+ /* populate union bpf_attr with btf_fd saved in the stack earlier */
+ move_stack2blob(gen, attr_field(map_create_attr, btf_fd), 4,
+ stack_off(btf_fd));
+ switch (attr.map_type) {
+ case BPF_MAP_TYPE_ARRAY_OF_MAPS:
+ case BPF_MAP_TYPE_HASH_OF_MAPS:
+ move_stack2blob(gen, attr_field(map_create_attr, inner_map_fd), 4,
+ stack_off(inner_map_fd));
+ close_inner_map_fd = true;
+ break;
+ default:
+ break;
+ }
+ /* conditionally update max_entries */
+ if (map_idx >= 0)
+ move_ctx2blob(gen, attr_field(map_create_attr, max_entries), 4,
+ sizeof(struct bpf_loader_ctx) +
+ sizeof(struct bpf_map_desc) * map_idx +
+ offsetof(struct bpf_map_desc, max_entries),
+ true /* check that max_entries != 0 */);
+ /* emit MAP_CREATE command */
+ emit_sys_bpf(gen, BPF_MAP_CREATE, map_create_attr, attr_size);
+ debug_ret(gen, "map_create %s idx %d type %d value_size %d value_btf_id %d",
+ attr.map_name, map_idx, map_type, value_size,
+ attr.btf_value_type_id);
+ emit_check_err(gen);
+ /* remember map_fd in the stack, if successful */
+ if (map_idx < 0) {
+ /* This bpf_gen__map_create() function is called with map_idx >= 0
+ * for all maps that libbpf loading logic tracks.
+ * It's called with -1 to create an inner map.
+ */
+ emit(gen, BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_7,
+ stack_off(inner_map_fd)));
+ } else if (map_idx != gen->nr_maps) {
+ gen->error = -EDOM; /* internal bug */
+ return;
+ } else {
+ /* add_map_fd does gen->nr_maps++ */
+ idx = add_map_fd(gen);
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_1, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, blob_fd_array_off(gen, idx)));
+ emit(gen, BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_7, 0));
+ }
+ if (close_inner_map_fd)
+ emit_sys_close_stack(gen, stack_off(inner_map_fd));
+}
+
+void bpf_gen__record_attach_target(struct bpf_gen *gen, const char *attach_name,
+ enum bpf_attach_type type)
+{
+ const char *prefix;
+ int kind, ret;
+
+ btf_get_kernel_prefix_kind(type, &prefix, &kind);
+ gen->attach_kind = kind;
+ ret = snprintf(gen->attach_target, sizeof(gen->attach_target), "%s%s",
+ prefix, attach_name);
+ if (ret >= sizeof(gen->attach_target))
+ gen->error = -ENOSPC;
+}
+
+static void emit_find_attach_target(struct bpf_gen *gen)
+{
+ int name, len = strlen(gen->attach_target) + 1;
+
+ pr_debug("gen: find_attach_tgt %s %d\n", gen->attach_target, gen->attach_kind);
+ name = add_data(gen, gen->attach_target, len);
+
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_1, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, name));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_2, len));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_3, gen->attach_kind));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_4, 0));
+ emit(gen, BPF_EMIT_CALL(BPF_FUNC_btf_find_by_name_kind));
+ emit(gen, BPF_MOV64_REG(BPF_REG_7, BPF_REG_0));
+ debug_ret(gen, "find_by_name_kind(%s,%d)",
+ gen->attach_target, gen->attach_kind);
+ emit_check_err(gen);
+ /* if successful, btf_id is in lower 32-bit of R7 and
+ * btf_obj_fd is in upper 32-bit
+ */
+}
+
+void bpf_gen__record_extern(struct bpf_gen *gen, const char *name, bool is_weak,
+ bool is_typeless, int kind, int insn_idx)
+{
+ struct ksym_relo_desc *relo;
+
+ relo = libbpf_reallocarray(gen->relos, gen->relo_cnt + 1, sizeof(*relo));
+ if (!relo) {
+ gen->error = -ENOMEM;
+ return;
+ }
+ gen->relos = relo;
+ relo += gen->relo_cnt;
+ relo->name = name;
+ relo->is_weak = is_weak;
+ relo->is_typeless = is_typeless;
+ relo->kind = kind;
+ relo->insn_idx = insn_idx;
+ gen->relo_cnt++;
+}
+
+/* returns existing ksym_desc with ref incremented, or inserts a new one */
+static struct ksym_desc *get_ksym_desc(struct bpf_gen *gen, struct ksym_relo_desc *relo)
+{
+ struct ksym_desc *kdesc;
+ int i;
+
+ for (i = 0; i < gen->nr_ksyms; i++) {
+ if (!strcmp(gen->ksyms[i].name, relo->name)) {
+ gen->ksyms[i].ref++;
+ return &gen->ksyms[i];
+ }
+ }
+ kdesc = libbpf_reallocarray(gen->ksyms, gen->nr_ksyms + 1, sizeof(*kdesc));
+ if (!kdesc) {
+ gen->error = -ENOMEM;
+ return NULL;
+ }
+ gen->ksyms = kdesc;
+ kdesc = &gen->ksyms[gen->nr_ksyms++];
+ kdesc->name = relo->name;
+ kdesc->kind = relo->kind;
+ kdesc->ref = 1;
+ kdesc->off = 0;
+ kdesc->insn = 0;
+ return kdesc;
+}
+
+/* Overwrites BPF_REG_{0, 1, 2, 3, 4, 7}
+ * Returns result in BPF_REG_7
+ */
+static void emit_bpf_find_by_name_kind(struct bpf_gen *gen, struct ksym_relo_desc *relo)
+{
+ int name_off, len = strlen(relo->name) + 1;
+
+ name_off = add_data(gen, relo->name, len);
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_1, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, name_off));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_2, len));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_3, relo->kind));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_4, 0));
+ emit(gen, BPF_EMIT_CALL(BPF_FUNC_btf_find_by_name_kind));
+ emit(gen, BPF_MOV64_REG(BPF_REG_7, BPF_REG_0));
+ debug_ret(gen, "find_by_name_kind(%s,%d)", relo->name, relo->kind);
+}
+
+/* Overwrites BPF_REG_{0, 1, 2, 3, 4, 7}
+ * Returns result in BPF_REG_7
+ * Returns u64 symbol addr in BPF_REG_9
+ */
+static void emit_bpf_kallsyms_lookup_name(struct bpf_gen *gen, struct ksym_relo_desc *relo)
+{
+ int name_off, len = strlen(relo->name) + 1, res_off;
+
+ name_off = add_data(gen, relo->name, len);
+ res_off = add_data(gen, NULL, 8); /* res is u64 */
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_1, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, name_off));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_2, len));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_3, 0));
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_4, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, res_off));
+ emit(gen, BPF_MOV64_REG(BPF_REG_7, BPF_REG_4));
+ emit(gen, BPF_EMIT_CALL(BPF_FUNC_kallsyms_lookup_name));
+ emit(gen, BPF_LDX_MEM(BPF_DW, BPF_REG_9, BPF_REG_7, 0));
+ emit(gen, BPF_MOV64_REG(BPF_REG_7, BPF_REG_0));
+ debug_ret(gen, "kallsyms_lookup_name(%s,%d)", relo->name, relo->kind);
+}
+
+/* Expects:
+ * BPF_REG_8 - pointer to instruction
+ *
+ * We need to reuse BTF fd for same symbol otherwise each relocation takes a new
+ * index, while kernel limits total kfunc BTFs to 256. For duplicate symbols,
+ * this would mean a new BTF fd index for each entry. By pairing symbol name
+ * with index, we get the insn->imm, insn->off pairing that kernel uses for
+ * kfunc_tab, which becomes the effective limit even though all of them may
+ * share same index in fd_array (such that kfunc_btf_tab has 1 element).
+ */
+static void emit_relo_kfunc_btf(struct bpf_gen *gen, struct ksym_relo_desc *relo, int insn)
+{
+ struct ksym_desc *kdesc;
+ int btf_fd_idx;
+
+ kdesc = get_ksym_desc(gen, relo);
+ if (!kdesc)
+ return;
+ /* try to copy from existing bpf_insn */
+ if (kdesc->ref > 1) {
+ move_blob2blob(gen, insn + offsetof(struct bpf_insn, imm), 4,
+ kdesc->insn + offsetof(struct bpf_insn, imm));
+ move_blob2blob(gen, insn + offsetof(struct bpf_insn, off), 2,
+ kdesc->insn + offsetof(struct bpf_insn, off));
+ goto log;
+ }
+ /* remember insn offset, so we can copy BTF ID and FD later */
+ kdesc->insn = insn;
+ emit_bpf_find_by_name_kind(gen, relo);
+ if (!relo->is_weak)
+ emit_check_err(gen);
+ /* get index in fd_array to store BTF FD at */
+ btf_fd_idx = add_kfunc_btf_fd(gen);
+ if (btf_fd_idx > INT16_MAX) {
+ pr_warn("BTF fd off %d for kfunc %s exceeds INT16_MAX, cannot process relocation\n",
+ btf_fd_idx, relo->name);
+ gen->error = -E2BIG;
+ return;
+ }
+ kdesc->off = btf_fd_idx;
+ /* jump to success case */
+ emit(gen, BPF_JMP_IMM(BPF_JSGE, BPF_REG_7, 0, 3));
+ /* set value for imm, off as 0 */
+ emit(gen, BPF_ST_MEM(BPF_W, BPF_REG_8, offsetof(struct bpf_insn, imm), 0));
+ emit(gen, BPF_ST_MEM(BPF_H, BPF_REG_8, offsetof(struct bpf_insn, off), 0));
+ /* skip success case for ret < 0 */
+ emit(gen, BPF_JMP_IMM(BPF_JA, 0, 0, 10));
+ /* store btf_id into insn[insn_idx].imm */
+ emit(gen, BPF_STX_MEM(BPF_W, BPF_REG_8, BPF_REG_7, offsetof(struct bpf_insn, imm)));
+ /* obtain fd in BPF_REG_9 */
+ emit(gen, BPF_MOV64_REG(BPF_REG_9, BPF_REG_7));
+ emit(gen, BPF_ALU64_IMM(BPF_RSH, BPF_REG_9, 32));
+ /* jump to fd_array store if fd denotes module BTF */
+ emit(gen, BPF_JMP_IMM(BPF_JNE, BPF_REG_9, 0, 2));
+ /* set the default value for off */
+ emit(gen, BPF_ST_MEM(BPF_H, BPF_REG_8, offsetof(struct bpf_insn, off), 0));
+ /* skip BTF fd store for vmlinux BTF */
+ emit(gen, BPF_JMP_IMM(BPF_JA, 0, 0, 4));
+ /* load fd_array slot pointer */
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_0, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, blob_fd_array_off(gen, btf_fd_idx)));
+ /* store BTF fd in slot */
+ emit(gen, BPF_STX_MEM(BPF_W, BPF_REG_0, BPF_REG_9, 0));
+ /* store index into insn[insn_idx].off */
+ emit(gen, BPF_ST_MEM(BPF_H, BPF_REG_8, offsetof(struct bpf_insn, off), btf_fd_idx));
+log:
+ if (!gen->log_level)
+ return;
+ emit(gen, BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_8,
+ offsetof(struct bpf_insn, imm)));
+ emit(gen, BPF_LDX_MEM(BPF_H, BPF_REG_9, BPF_REG_8,
+ offsetof(struct bpf_insn, off)));
+ debug_regs(gen, BPF_REG_7, BPF_REG_9, " func (%s:count=%d): imm: %%d, off: %%d",
+ relo->name, kdesc->ref);
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_0, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, blob_fd_array_off(gen, kdesc->off)));
+ emit(gen, BPF_LDX_MEM(BPF_W, BPF_REG_9, BPF_REG_0, 0));
+ debug_regs(gen, BPF_REG_9, -1, " func (%s:count=%d): btf_fd",
+ relo->name, kdesc->ref);
+}
+
+static void emit_ksym_relo_log(struct bpf_gen *gen, struct ksym_relo_desc *relo,
+ int ref)
+{
+ if (!gen->log_level)
+ return;
+ emit(gen, BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_8,
+ offsetof(struct bpf_insn, imm)));
+ emit(gen, BPF_LDX_MEM(BPF_H, BPF_REG_9, BPF_REG_8, sizeof(struct bpf_insn) +
+ offsetof(struct bpf_insn, imm)));
+ debug_regs(gen, BPF_REG_7, BPF_REG_9, " var t=%d w=%d (%s:count=%d): imm[0]: %%d, imm[1]: %%d",
+ relo->is_typeless, relo->is_weak, relo->name, ref);
+ emit(gen, BPF_LDX_MEM(BPF_B, BPF_REG_9, BPF_REG_8, offsetofend(struct bpf_insn, code)));
+ debug_regs(gen, BPF_REG_9, -1, " var t=%d w=%d (%s:count=%d): insn.reg",
+ relo->is_typeless, relo->is_weak, relo->name, ref);
+}
+
+/* Expects:
+ * BPF_REG_8 - pointer to instruction
+ */
+static void emit_relo_ksym_typeless(struct bpf_gen *gen,
+ struct ksym_relo_desc *relo, int insn)
+{
+ struct ksym_desc *kdesc;
+
+ kdesc = get_ksym_desc(gen, relo);
+ if (!kdesc)
+ return;
+ /* try to copy from existing ldimm64 insn */
+ if (kdesc->ref > 1) {
+ move_blob2blob(gen, insn + offsetof(struct bpf_insn, imm), 4,
+ kdesc->insn + offsetof(struct bpf_insn, imm));
+ move_blob2blob(gen, insn + sizeof(struct bpf_insn) + offsetof(struct bpf_insn, imm), 4,
+ kdesc->insn + sizeof(struct bpf_insn) + offsetof(struct bpf_insn, imm));
+ goto log;
+ }
+ /* remember insn offset, so we can copy ksym addr later */
+ kdesc->insn = insn;
+ /* skip typeless ksym_desc in fd closing loop in cleanup_relos */
+ kdesc->typeless = true;
+ emit_bpf_kallsyms_lookup_name(gen, relo);
+ emit(gen, BPF_JMP_IMM(BPF_JEQ, BPF_REG_7, -ENOENT, 1));
+ emit_check_err(gen);
+ /* store lower half of addr into insn[insn_idx].imm */
+ emit(gen, BPF_STX_MEM(BPF_W, BPF_REG_8, BPF_REG_9, offsetof(struct bpf_insn, imm)));
+ /* store upper half of addr into insn[insn_idx + 1].imm */
+ emit(gen, BPF_ALU64_IMM(BPF_RSH, BPF_REG_9, 32));
+ emit(gen, BPF_STX_MEM(BPF_W, BPF_REG_8, BPF_REG_9,
+ sizeof(struct bpf_insn) + offsetof(struct bpf_insn, imm)));
+log:
+ emit_ksym_relo_log(gen, relo, kdesc->ref);
+}
+
+static __u32 src_reg_mask(void)
+{
+#if defined(__LITTLE_ENDIAN_BITFIELD)
+ return 0x0f; /* src_reg,dst_reg,... */
+#elif defined(__BIG_ENDIAN_BITFIELD)
+ return 0xf0; /* dst_reg,src_reg,... */
+#else
+#error "Unsupported bit endianness, cannot proceed"
+#endif
+}
+
+/* Expects:
+ * BPF_REG_8 - pointer to instruction
+ */
+static void emit_relo_ksym_btf(struct bpf_gen *gen, struct ksym_relo_desc *relo, int insn)
+{
+ struct ksym_desc *kdesc;
+ __u32 reg_mask;
+
+ kdesc = get_ksym_desc(gen, relo);
+ if (!kdesc)
+ return;
+ /* try to copy from existing ldimm64 insn */
+ if (kdesc->ref > 1) {
+ move_blob2blob(gen, insn + offsetof(struct bpf_insn, imm), 4,
+ kdesc->insn + offsetof(struct bpf_insn, imm));
+ move_blob2blob(gen, insn + sizeof(struct bpf_insn) + offsetof(struct bpf_insn, imm), 4,
+ kdesc->insn + sizeof(struct bpf_insn) + offsetof(struct bpf_insn, imm));
+ /* jump over src_reg adjustment if imm is not 0, reuse BPF_REG_0 from move_blob2blob */
+ emit(gen, BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 3));
+ goto clear_src_reg;
+ }
+ /* remember insn offset, so we can copy BTF ID and FD later */
+ kdesc->insn = insn;
+ emit_bpf_find_by_name_kind(gen, relo);
+ if (!relo->is_weak)
+ emit_check_err(gen);
+ /* jump to success case */
+ emit(gen, BPF_JMP_IMM(BPF_JSGE, BPF_REG_7, 0, 3));
+ /* set values for insn[insn_idx].imm, insn[insn_idx + 1].imm as 0 */
+ emit(gen, BPF_ST_MEM(BPF_W, BPF_REG_8, offsetof(struct bpf_insn, imm), 0));
+ emit(gen, BPF_ST_MEM(BPF_W, BPF_REG_8, sizeof(struct bpf_insn) + offsetof(struct bpf_insn, imm), 0));
+ /* skip success case for ret < 0 */
+ emit(gen, BPF_JMP_IMM(BPF_JA, 0, 0, 4));
+ /* store btf_id into insn[insn_idx].imm */
+ emit(gen, BPF_STX_MEM(BPF_W, BPF_REG_8, BPF_REG_7, offsetof(struct bpf_insn, imm)));
+ /* store btf_obj_fd into insn[insn_idx + 1].imm */
+ emit(gen, BPF_ALU64_IMM(BPF_RSH, BPF_REG_7, 32));
+ emit(gen, BPF_STX_MEM(BPF_W, BPF_REG_8, BPF_REG_7,
+ sizeof(struct bpf_insn) + offsetof(struct bpf_insn, imm)));
+ /* skip src_reg adjustment */
+ emit(gen, BPF_JMP_IMM(BPF_JSGE, BPF_REG_7, 0, 3));
+clear_src_reg:
+ /* clear bpf_object__relocate_data's src_reg assignment, otherwise we get a verifier failure */
+ reg_mask = src_reg_mask();
+ emit(gen, BPF_LDX_MEM(BPF_B, BPF_REG_9, BPF_REG_8, offsetofend(struct bpf_insn, code)));
+ emit(gen, BPF_ALU32_IMM(BPF_AND, BPF_REG_9, reg_mask));
+ emit(gen, BPF_STX_MEM(BPF_B, BPF_REG_8, BPF_REG_9, offsetofend(struct bpf_insn, code)));
+
+ emit_ksym_relo_log(gen, relo, kdesc->ref);
+}
+
+void bpf_gen__record_relo_core(struct bpf_gen *gen,
+ const struct bpf_core_relo *core_relo)
+{
+ struct bpf_core_relo *relos;
+
+ relos = libbpf_reallocarray(gen->core_relos, gen->core_relo_cnt + 1, sizeof(*relos));
+ if (!relos) {
+ gen->error = -ENOMEM;
+ return;
+ }
+ gen->core_relos = relos;
+ relos += gen->core_relo_cnt;
+ memcpy(relos, core_relo, sizeof(*relos));
+ gen->core_relo_cnt++;
+}
+
+static void emit_relo(struct bpf_gen *gen, struct ksym_relo_desc *relo, int insns)
+{
+ int insn;
+
+ pr_debug("gen: emit_relo (%d): %s at %d\n", relo->kind, relo->name, relo->insn_idx);
+ insn = insns + sizeof(struct bpf_insn) * relo->insn_idx;
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_8, BPF_PSEUDO_MAP_IDX_VALUE, 0, 0, 0, insn));
+ switch (relo->kind) {
+ case BTF_KIND_VAR:
+ if (relo->is_typeless)
+ emit_relo_ksym_typeless(gen, relo, insn);
+ else
+ emit_relo_ksym_btf(gen, relo, insn);
+ break;
+ case BTF_KIND_FUNC:
+ emit_relo_kfunc_btf(gen, relo, insn);
+ break;
+ default:
+ pr_warn("Unknown relocation kind '%d'\n", relo->kind);
+ gen->error = -EDOM;
+ return;
+ }
+}
+
+static void emit_relos(struct bpf_gen *gen, int insns)
+{
+ int i;
+
+ for (i = 0; i < gen->relo_cnt; i++)
+ emit_relo(gen, gen->relos + i, insns);
+}
+
+static void cleanup_core_relo(struct bpf_gen *gen)
+{
+ if (!gen->core_relo_cnt)
+ return;
+ free(gen->core_relos);
+ gen->core_relo_cnt = 0;
+ gen->core_relos = NULL;
+}
+
+static void cleanup_relos(struct bpf_gen *gen, int insns)
+{
+ int i, insn;
+
+ for (i = 0; i < gen->nr_ksyms; i++) {
+ /* only close fds for typed ksyms and kfuncs */
+ if (gen->ksyms[i].kind == BTF_KIND_VAR && !gen->ksyms[i].typeless) {
+ /* close fd recorded in insn[insn_idx + 1].imm */
+ insn = gen->ksyms[i].insn;
+ insn += sizeof(struct bpf_insn) + offsetof(struct bpf_insn, imm);
+ emit_sys_close_blob(gen, insn);
+ } else if (gen->ksyms[i].kind == BTF_KIND_FUNC) {
+ emit_sys_close_blob(gen, blob_fd_array_off(gen, gen->ksyms[i].off));
+ if (gen->ksyms[i].off < MAX_FD_ARRAY_SZ)
+ gen->nr_fd_array--;
+ }
+ }
+ if (gen->nr_ksyms) {
+ free(gen->ksyms);
+ gen->nr_ksyms = 0;
+ gen->ksyms = NULL;
+ }
+ if (gen->relo_cnt) {
+ free(gen->relos);
+ gen->relo_cnt = 0;
+ gen->relos = NULL;
+ }
+ cleanup_core_relo(gen);
+}
+
+void bpf_gen__prog_load(struct bpf_gen *gen,
+ enum bpf_prog_type prog_type, const char *prog_name,
+ const char *license, struct bpf_insn *insns, size_t insn_cnt,
+ struct bpf_prog_load_opts *load_attr, int prog_idx)
+{
+ int prog_load_attr, license_off, insns_off, func_info, line_info, core_relos;
+ int attr_size = offsetofend(union bpf_attr, core_relo_rec_size);
+ union bpf_attr attr;
+
+ memset(&attr, 0, attr_size);
+ pr_debug("gen: prog_load: type %d insns_cnt %zd progi_idx %d\n",
+ prog_type, insn_cnt, prog_idx);
+ /* add license string to blob of bytes */
+ license_off = add_data(gen, license, strlen(license) + 1);
+ /* add insns to blob of bytes */
+ insns_off = add_data(gen, insns, insn_cnt * sizeof(struct bpf_insn));
+
+ attr.prog_type = prog_type;
+ attr.expected_attach_type = load_attr->expected_attach_type;
+ attr.attach_btf_id = load_attr->attach_btf_id;
+ attr.prog_ifindex = load_attr->prog_ifindex;
+ attr.kern_version = 0;
+ attr.insn_cnt = (__u32)insn_cnt;
+ attr.prog_flags = load_attr->prog_flags;
+
+ attr.func_info_rec_size = load_attr->func_info_rec_size;
+ attr.func_info_cnt = load_attr->func_info_cnt;
+ func_info = add_data(gen, load_attr->func_info,
+ attr.func_info_cnt * attr.func_info_rec_size);
+
+ attr.line_info_rec_size = load_attr->line_info_rec_size;
+ attr.line_info_cnt = load_attr->line_info_cnt;
+ line_info = add_data(gen, load_attr->line_info,
+ attr.line_info_cnt * attr.line_info_rec_size);
+
+ attr.core_relo_rec_size = sizeof(struct bpf_core_relo);
+ attr.core_relo_cnt = gen->core_relo_cnt;
+ core_relos = add_data(gen, gen->core_relos,
+ attr.core_relo_cnt * attr.core_relo_rec_size);
+
+ libbpf_strlcpy(attr.prog_name, prog_name, sizeof(attr.prog_name));
+ prog_load_attr = add_data(gen, &attr, attr_size);
+
+ /* populate union bpf_attr with a pointer to license */
+ emit_rel_store(gen, attr_field(prog_load_attr, license), license_off);
+
+ /* populate union bpf_attr with a pointer to instructions */
+ emit_rel_store(gen, attr_field(prog_load_attr, insns), insns_off);
+
+ /* populate union bpf_attr with a pointer to func_info */
+ emit_rel_store(gen, attr_field(prog_load_attr, func_info), func_info);
+
+ /* populate union bpf_attr with a pointer to line_info */
+ emit_rel_store(gen, attr_field(prog_load_attr, line_info), line_info);
+
+ /* populate union bpf_attr with a pointer to core_relos */
+ emit_rel_store(gen, attr_field(prog_load_attr, core_relos), core_relos);
+
+ /* populate union bpf_attr fd_array with a pointer to data where map_fds are saved */
+ emit_rel_store(gen, attr_field(prog_load_attr, fd_array), gen->fd_array);
+
+ /* populate union bpf_attr with user provided log details */
+ move_ctx2blob(gen, attr_field(prog_load_attr, log_level), 4,
+ offsetof(struct bpf_loader_ctx, log_level), false);
+ move_ctx2blob(gen, attr_field(prog_load_attr, log_size), 4,
+ offsetof(struct bpf_loader_ctx, log_size), false);
+ move_ctx2blob(gen, attr_field(prog_load_attr, log_buf), 8,
+ offsetof(struct bpf_loader_ctx, log_buf), false);
+ /* populate union bpf_attr with btf_fd saved in the stack earlier */
+ move_stack2blob(gen, attr_field(prog_load_attr, prog_btf_fd), 4,
+ stack_off(btf_fd));
+ if (gen->attach_kind) {
+ emit_find_attach_target(gen);
+ /* populate union bpf_attr with btf_id and btf_obj_fd found by helper */
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_0, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, prog_load_attr));
+ emit(gen, BPF_STX_MEM(BPF_W, BPF_REG_0, BPF_REG_7,
+ offsetof(union bpf_attr, attach_btf_id)));
+ emit(gen, BPF_ALU64_IMM(BPF_RSH, BPF_REG_7, 32));
+ emit(gen, BPF_STX_MEM(BPF_W, BPF_REG_0, BPF_REG_7,
+ offsetof(union bpf_attr, attach_btf_obj_fd)));
+ }
+ emit_relos(gen, insns_off);
+ /* emit PROG_LOAD command */
+ emit_sys_bpf(gen, BPF_PROG_LOAD, prog_load_attr, attr_size);
+ debug_ret(gen, "prog_load %s insn_cnt %d", attr.prog_name, attr.insn_cnt);
+ /* successful or not, close btf module FDs used in extern ksyms and attach_btf_obj_fd */
+ cleanup_relos(gen, insns_off);
+ if (gen->attach_kind) {
+ emit_sys_close_blob(gen,
+ attr_field(prog_load_attr, attach_btf_obj_fd));
+ gen->attach_kind = 0;
+ }
+ emit_check_err(gen);
+ /* remember prog_fd in the stack, if successful */
+ emit(gen, BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_7,
+ stack_off(prog_fd[gen->nr_progs])));
+ gen->nr_progs++;
+}
+
+void bpf_gen__map_update_elem(struct bpf_gen *gen, int map_idx, void *pvalue,
+ __u32 value_size)
+{
+ int attr_size = offsetofend(union bpf_attr, flags);
+ int map_update_attr, value, key;
+ union bpf_attr attr;
+ int zero = 0;
+
+ memset(&attr, 0, attr_size);
+ pr_debug("gen: map_update_elem: idx %d\n", map_idx);
+
+ value = add_data(gen, pvalue, value_size);
+ key = add_data(gen, &zero, sizeof(zero));
+
+ /* if (map_desc[map_idx].initial_value) {
+ * if (ctx->flags & BPF_SKEL_KERNEL)
+ * bpf_probe_read_kernel(value, value_size, initial_value);
+ * else
+ * bpf_copy_from_user(value, value_size, initial_value);
+ * }
+ */
+ emit(gen, BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_6,
+ sizeof(struct bpf_loader_ctx) +
+ sizeof(struct bpf_map_desc) * map_idx +
+ offsetof(struct bpf_map_desc, initial_value)));
+ emit(gen, BPF_JMP_IMM(BPF_JEQ, BPF_REG_3, 0, 8));
+ emit2(gen, BPF_LD_IMM64_RAW_FULL(BPF_REG_1, BPF_PSEUDO_MAP_IDX_VALUE,
+ 0, 0, 0, value));
+ emit(gen, BPF_MOV64_IMM(BPF_REG_2, value_size));
+ emit(gen, BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_6,
+ offsetof(struct bpf_loader_ctx, flags)));
+ emit(gen, BPF_JMP_IMM(BPF_JSET, BPF_REG_0, BPF_SKEL_KERNEL, 2));
+ emit(gen, BPF_EMIT_CALL(BPF_FUNC_copy_from_user));
+ emit(gen, BPF_JMP_IMM(BPF_JA, 0, 0, 1));
+ emit(gen, BPF_EMIT_CALL(BPF_FUNC_probe_read_kernel));
+
+ map_update_attr = add_data(gen, &attr, attr_size);
+ move_blob2blob(gen, attr_field(map_update_attr, map_fd), 4,
+ blob_fd_array_off(gen, map_idx));
+ emit_rel_store(gen, attr_field(map_update_attr, key), key);
+ emit_rel_store(gen, attr_field(map_update_attr, value), value);
+ /* emit MAP_UPDATE_ELEM command */
+ emit_sys_bpf(gen, BPF_MAP_UPDATE_ELEM, map_update_attr, attr_size);
+ debug_ret(gen, "update_elem idx %d value_size %d", map_idx, value_size);
+ emit_check_err(gen);
+}
+
+void bpf_gen__populate_outer_map(struct bpf_gen *gen, int outer_map_idx, int slot,
+ int inner_map_idx)
+{
+ int attr_size = offsetofend(union bpf_attr, flags);
+ int map_update_attr, key;
+ union bpf_attr attr;
+
+ memset(&attr, 0, attr_size);
+ pr_debug("gen: populate_outer_map: outer %d key %d inner %d\n",
+ outer_map_idx, slot, inner_map_idx);
+
+ key = add_data(gen, &slot, sizeof(slot));
+
+ map_update_attr = add_data(gen, &attr, attr_size);
+ move_blob2blob(gen, attr_field(map_update_attr, map_fd), 4,
+ blob_fd_array_off(gen, outer_map_idx));
+ emit_rel_store(gen, attr_field(map_update_attr, key), key);
+ emit_rel_store(gen, attr_field(map_update_attr, value),
+ blob_fd_array_off(gen, inner_map_idx));
+
+ /* emit MAP_UPDATE_ELEM command */
+ emit_sys_bpf(gen, BPF_MAP_UPDATE_ELEM, map_update_attr, attr_size);
+ debug_ret(gen, "populate_outer_map outer %d key %d inner %d",
+ outer_map_idx, slot, inner_map_idx);
+ emit_check_err(gen);
+}
+
+void bpf_gen__map_freeze(struct bpf_gen *gen, int map_idx)
+{
+ int attr_size = offsetofend(union bpf_attr, map_fd);
+ int map_freeze_attr;
+ union bpf_attr attr;
+
+ memset(&attr, 0, attr_size);
+ pr_debug("gen: map_freeze: idx %d\n", map_idx);
+ map_freeze_attr = add_data(gen, &attr, attr_size);
+ move_blob2blob(gen, attr_field(map_freeze_attr, map_fd), 4,
+ blob_fd_array_off(gen, map_idx));
+ /* emit MAP_FREEZE command */
+ emit_sys_bpf(gen, BPF_MAP_FREEZE, map_freeze_attr, attr_size);
+ debug_ret(gen, "map_freeze");
+ emit_check_err(gen);
+}
diff --git a/src/hashmap.c b/src/hashmap.c
new file mode 100644
index 0000000..140ee40
--- /dev/null
+++ b/src/hashmap.c
@@ -0,0 +1,240 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+
+/*
+ * Generic non-thread safe hash map implementation.
+ *
+ * Copyright (c) 2019 Facebook
+ */
+#include <stdint.h>
+#include <stdlib.h>
+#include <stdio.h>
+#include <errno.h>
+#include <linux/err.h>
+#include "hashmap.h"
+
+/* make sure libbpf doesn't use kernel-only integer typedefs */
+#pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
+
+/* prevent accidental re-addition of reallocarray() */
+#pragma GCC poison reallocarray
+
+/* start with 4 buckets */
+#define HASHMAP_MIN_CAP_BITS 2
+
+static void hashmap_add_entry(struct hashmap_entry **pprev,
+ struct hashmap_entry *entry)
+{
+ entry->next = *pprev;
+ *pprev = entry;
+}
+
+static void hashmap_del_entry(struct hashmap_entry **pprev,
+ struct hashmap_entry *entry)
+{
+ *pprev = entry->next;
+ entry->next = NULL;
+}
+
+void hashmap__init(struct hashmap *map, hashmap_hash_fn hash_fn,
+ hashmap_equal_fn equal_fn, void *ctx)
+{
+ map->hash_fn = hash_fn;
+ map->equal_fn = equal_fn;
+ map->ctx = ctx;
+
+ map->buckets = NULL;
+ map->cap = 0;
+ map->cap_bits = 0;
+ map->sz = 0;
+}
+
+struct hashmap *hashmap__new(hashmap_hash_fn hash_fn,
+ hashmap_equal_fn equal_fn,
+ void *ctx)
+{
+ struct hashmap *map = malloc(sizeof(struct hashmap));
+
+ if (!map)
+ return ERR_PTR(-ENOMEM);
+ hashmap__init(map, hash_fn, equal_fn, ctx);
+ return map;
+}
+
+void hashmap__clear(struct hashmap *map)
+{
+ struct hashmap_entry *cur, *tmp;
+ size_t bkt;
+
+ hashmap__for_each_entry_safe(map, cur, tmp, bkt) {
+ free(cur);
+ }
+ free(map->buckets);
+ map->buckets = NULL;
+ map->cap = map->cap_bits = map->sz = 0;
+}
+
+void hashmap__free(struct hashmap *map)
+{
+ if (IS_ERR_OR_NULL(map))
+ return;
+
+ hashmap__clear(map);
+ free(map);
+}
+
+size_t hashmap__size(const struct hashmap *map)
+{
+ return map->sz;
+}
+
+size_t hashmap__capacity(const struct hashmap *map)
+{
+ return map->cap;
+}
+
+static bool hashmap_needs_to_grow(struct hashmap *map)
+{
+ /* grow if empty or more than 75% filled */
+ return (map->cap == 0) || ((map->sz + 1) * 4 / 3 > map->cap);
+}
+
+static int hashmap_grow(struct hashmap *map)
+{
+ struct hashmap_entry **new_buckets;
+ struct hashmap_entry *cur, *tmp;
+ size_t new_cap_bits, new_cap;
+ size_t h, bkt;
+
+ new_cap_bits = map->cap_bits + 1;
+ if (new_cap_bits < HASHMAP_MIN_CAP_BITS)
+ new_cap_bits = HASHMAP_MIN_CAP_BITS;
+
+ new_cap = 1UL << new_cap_bits;
+ new_buckets = calloc(new_cap, sizeof(new_buckets[0]));
+ if (!new_buckets)
+ return -ENOMEM;
+
+ hashmap__for_each_entry_safe(map, cur, tmp, bkt) {
+ h = hash_bits(map->hash_fn(cur->key, map->ctx), new_cap_bits);
+ hashmap_add_entry(&new_buckets[h], cur);
+ }
+
+ map->cap = new_cap;
+ map->cap_bits = new_cap_bits;
+ free(map->buckets);
+ map->buckets = new_buckets;
+
+ return 0;
+}
+
+static bool hashmap_find_entry(const struct hashmap *map,
+ const long key, size_t hash,
+ struct hashmap_entry ***pprev,
+ struct hashmap_entry **entry)
+{
+ struct hashmap_entry *cur, **prev_ptr;
+
+ if (!map->buckets)
+ return false;
+
+ for (prev_ptr = &map->buckets[hash], cur = *prev_ptr;
+ cur;
+ prev_ptr = &cur->next, cur = cur->next) {
+ if (map->equal_fn(cur->key, key, map->ctx)) {
+ if (pprev)
+ *pprev = prev_ptr;
+ *entry = cur;
+ return true;
+ }
+ }
+
+ return false;
+}
+
+int hashmap_insert(struct hashmap *map, long key, long value,
+ enum hashmap_insert_strategy strategy,
+ long *old_key, long *old_value)
+{
+ struct hashmap_entry *entry;
+ size_t h;
+ int err;
+
+ if (old_key)
+ *old_key = 0;
+ if (old_value)
+ *old_value = 0;
+
+ h = hash_bits(map->hash_fn(key, map->ctx), map->cap_bits);
+ if (strategy != HASHMAP_APPEND &&
+ hashmap_find_entry(map, key, h, NULL, &entry)) {
+ if (old_key)
+ *old_key = entry->key;
+ if (old_value)
+ *old_value = entry->value;
+
+ if (strategy == HASHMAP_SET || strategy == HASHMAP_UPDATE) {
+ entry->key = key;
+ entry->value = value;
+ return 0;
+ } else if (strategy == HASHMAP_ADD) {
+ return -EEXIST;
+ }
+ }
+
+ if (strategy == HASHMAP_UPDATE)
+ return -ENOENT;
+
+ if (hashmap_needs_to_grow(map)) {
+ err = hashmap_grow(map);
+ if (err)
+ return err;
+ h = hash_bits(map->hash_fn(key, map->ctx), map->cap_bits);
+ }
+
+ entry = malloc(sizeof(struct hashmap_entry));
+ if (!entry)
+ return -ENOMEM;
+
+ entry->key = key;
+ entry->value = value;
+ hashmap_add_entry(&map->buckets[h], entry);
+ map->sz++;
+
+ return 0;
+}
+
+bool hashmap_find(const struct hashmap *map, long key, long *value)
+{
+ struct hashmap_entry *entry;
+ size_t h;
+
+ h = hash_bits(map->hash_fn(key, map->ctx), map->cap_bits);
+ if (!hashmap_find_entry(map, key, h, NULL, &entry))
+ return false;
+
+ if (value)
+ *value = entry->value;
+ return true;
+}
+
+bool hashmap_delete(struct hashmap *map, long key,
+ long *old_key, long *old_value)
+{
+ struct hashmap_entry **pprev, *entry;
+ size_t h;
+
+ h = hash_bits(map->hash_fn(key, map->ctx), map->cap_bits);
+ if (!hashmap_find_entry(map, key, h, &pprev, &entry))
+ return false;
+
+ if (old_key)
+ *old_key = entry->key;
+ if (old_value)
+ *old_value = entry->value;
+
+ hashmap_del_entry(pprev, entry);
+ free(entry);
+ map->sz--;
+
+ return true;
+}
diff --git a/src/hashmap.h b/src/hashmap.h
new file mode 100644
index 0000000..0a5bf19
--- /dev/null
+++ b/src/hashmap.h
@@ -0,0 +1,218 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+/*
+ * Generic non-thread safe hash map implementation.
+ *
+ * Copyright (c) 2019 Facebook
+ */
+#ifndef __LIBBPF_HASHMAP_H
+#define __LIBBPF_HASHMAP_H
+
+#include <stdbool.h>
+#include <stddef.h>
+#include <limits.h>
+
+static inline size_t hash_bits(size_t h, int bits)
+{
+ /* shuffle bits and return requested number of upper bits */
+ if (bits == 0)
+ return 0;
+
+#if (__SIZEOF_SIZE_T__ == __SIZEOF_LONG_LONG__)
+ /* LP64 case */
+ return (h * 11400714819323198485llu) >> (__SIZEOF_LONG_LONG__ * 8 - bits);
+#elif (__SIZEOF_SIZE_T__ <= __SIZEOF_LONG__)
+ return (h * 2654435769lu) >> (__SIZEOF_LONG__ * 8 - bits);
+#else
+# error "Unsupported size_t size"
+#endif
+}
+
+/* generic C-string hashing function */
+static inline size_t str_hash(const char *s)
+{
+ size_t h = 0;
+
+ while (*s) {
+ h = h * 31 + *s;
+ s++;
+ }
+ return h;
+}
+
+typedef size_t (*hashmap_hash_fn)(long key, void *ctx);
+typedef bool (*hashmap_equal_fn)(long key1, long key2, void *ctx);
+
+/*
+ * Hashmap interface is polymorphic, keys and values could be either
+ * long-sized integers or pointers, this is achieved as follows:
+ * - interface functions that operate on keys and values are hidden
+ * behind auxiliary macros, e.g. hashmap_insert <-> hashmap__insert;
+ * - these auxiliary macros cast the key and value parameters as
+ * long or long *, so the user does not have to specify the casts explicitly;
+ * - for pointer parameters (e.g. old_key) the size of the pointed
+ * type is verified by hashmap_cast_ptr using _Static_assert;
+ * - when iterating using hashmap__for_each_* forms
+ * hasmap_entry->key should be used for integer keys and
+ * hasmap_entry->pkey should be used for pointer keys,
+ * same goes for values.
+ */
+struct hashmap_entry {
+ union {
+ long key;
+ const void *pkey;
+ };
+ union {
+ long value;
+ void *pvalue;
+ };
+ struct hashmap_entry *next;
+};
+
+struct hashmap {
+ hashmap_hash_fn hash_fn;
+ hashmap_equal_fn equal_fn;
+ void *ctx;
+
+ struct hashmap_entry **buckets;
+ size_t cap;
+ size_t cap_bits;
+ size_t sz;
+};
+
+#define HASHMAP_INIT(hash_fn, equal_fn, ctx) { \
+ .hash_fn = (hash_fn), \
+ .equal_fn = (equal_fn), \
+ .ctx = (ctx), \
+ .buckets = NULL, \
+ .cap = 0, \
+ .cap_bits = 0, \
+ .sz = 0, \
+}
+
+void hashmap__init(struct hashmap *map, hashmap_hash_fn hash_fn,
+ hashmap_equal_fn equal_fn, void *ctx);
+struct hashmap *hashmap__new(hashmap_hash_fn hash_fn,
+ hashmap_equal_fn equal_fn,
+ void *ctx);
+void hashmap__clear(struct hashmap *map);
+void hashmap__free(struct hashmap *map);
+
+size_t hashmap__size(const struct hashmap *map);
+size_t hashmap__capacity(const struct hashmap *map);
+
+/*
+ * Hashmap insertion strategy:
+ * - HASHMAP_ADD - only add key/value if key doesn't exist yet;
+ * - HASHMAP_SET - add key/value pair if key doesn't exist yet; otherwise,
+ * update value;
+ * - HASHMAP_UPDATE - update value, if key already exists; otherwise, do
+ * nothing and return -ENOENT;
+ * - HASHMAP_APPEND - always add key/value pair, even if key already exists.
+ * This turns hashmap into a multimap by allowing multiple values to be
+ * associated with the same key. Most useful read API for such hashmap is
+ * hashmap__for_each_key_entry() iteration. If hashmap__find() is still
+ * used, it will return last inserted key/value entry (first in a bucket
+ * chain).
+ */
+enum hashmap_insert_strategy {
+ HASHMAP_ADD,
+ HASHMAP_SET,
+ HASHMAP_UPDATE,
+ HASHMAP_APPEND,
+};
+
+#define hashmap_cast_ptr(p) ({ \
+ _Static_assert((__builtin_constant_p((p)) ? (p) == NULL : 0) || \
+ sizeof(*(p)) == sizeof(long), \
+ #p " pointee should be a long-sized integer or a pointer"); \
+ (long *)(p); \
+})
+
+/*
+ * hashmap__insert() adds key/value entry w/ various semantics, depending on
+ * provided strategy value. If a given key/value pair replaced already
+ * existing key/value pair, both old key and old value will be returned
+ * through old_key and old_value to allow calling code do proper memory
+ * management.
+ */
+int hashmap_insert(struct hashmap *map, long key, long value,
+ enum hashmap_insert_strategy strategy,
+ long *old_key, long *old_value);
+
+#define hashmap__insert(map, key, value, strategy, old_key, old_value) \
+ hashmap_insert((map), (long)(key), (long)(value), (strategy), \
+ hashmap_cast_ptr(old_key), \
+ hashmap_cast_ptr(old_value))
+
+#define hashmap__add(map, key, value) \
+ hashmap__insert((map), (key), (value), HASHMAP_ADD, NULL, NULL)
+
+#define hashmap__set(map, key, value, old_key, old_value) \
+ hashmap__insert((map), (key), (value), HASHMAP_SET, (old_key), (old_value))
+
+#define hashmap__update(map, key, value, old_key, old_value) \
+ hashmap__insert((map), (key), (value), HASHMAP_UPDATE, (old_key), (old_value))
+
+#define hashmap__append(map, key, value) \
+ hashmap__insert((map), (key), (value), HASHMAP_APPEND, NULL, NULL)
+
+bool hashmap_delete(struct hashmap *map, long key, long *old_key, long *old_value);
+
+#define hashmap__delete(map, key, old_key, old_value) \
+ hashmap_delete((map), (long)(key), \
+ hashmap_cast_ptr(old_key), \
+ hashmap_cast_ptr(old_value))
+
+bool hashmap_find(const struct hashmap *map, long key, long *value);
+
+#define hashmap__find(map, key, value) \
+ hashmap_find((map), (long)(key), hashmap_cast_ptr(value))
+
+/*
+ * hashmap__for_each_entry - iterate over all entries in hashmap
+ * @map: hashmap to iterate
+ * @cur: struct hashmap_entry * used as a loop cursor
+ * @bkt: integer used as a bucket loop cursor
+ */
+#define hashmap__for_each_entry(map, cur, bkt) \
+ for (bkt = 0; bkt < map->cap; bkt++) \
+ for (cur = map->buckets[bkt]; cur; cur = cur->next)
+
+/*
+ * hashmap__for_each_entry_safe - iterate over all entries in hashmap, safe
+ * against removals
+ * @map: hashmap to iterate
+ * @cur: struct hashmap_entry * used as a loop cursor
+ * @tmp: struct hashmap_entry * used as a temporary next cursor storage
+ * @bkt: integer used as a bucket loop cursor
+ */
+#define hashmap__for_each_entry_safe(map, cur, tmp, bkt) \
+ for (bkt = 0; bkt < map->cap; bkt++) \
+ for (cur = map->buckets[bkt]; \
+ cur && ({tmp = cur->next; true; }); \
+ cur = tmp)
+
+/*
+ * hashmap__for_each_key_entry - iterate over entries associated with given key
+ * @map: hashmap to iterate
+ * @cur: struct hashmap_entry * used as a loop cursor
+ * @key: key to iterate entries for
+ */
+#define hashmap__for_each_key_entry(map, cur, _key) \
+ for (cur = map->buckets \
+ ? map->buckets[hash_bits(map->hash_fn((_key), map->ctx), map->cap_bits)] \
+ : NULL; \
+ cur; \
+ cur = cur->next) \
+ if (map->equal_fn(cur->key, (_key), map->ctx))
+
+#define hashmap__for_each_key_entry_safe(map, cur, tmp, _key) \
+ for (cur = map->buckets \
+ ? map->buckets[hash_bits(map->hash_fn((_key), map->ctx), map->cap_bits)] \
+ : NULL; \
+ cur && ({ tmp = cur->next; true; }); \
+ cur = tmp) \
+ if (map->equal_fn(cur->key, (_key), map->ctx))
+
+#endif /* __LIBBPF_HASHMAP_H */
diff --git a/src/libbpf.c b/src/libbpf.c
new file mode 100644
index 0000000..a5c67a3
--- /dev/null
+++ b/src/libbpf.c
@@ -0,0 +1,12490 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+
+/*
+ * Common eBPF ELF object loading operations.
+ *
+ * Copyright (C) 2013-2015 Alexei Starovoitov <ast@kernel.org>
+ * Copyright (C) 2015 Wang Nan <wangnan0@huawei.com>
+ * Copyright (C) 2015 Huawei Inc.
+ * Copyright (C) 2017 Nicira, Inc.
+ * Copyright (C) 2019 Isovalent, Inc.
+ */
+
+#ifndef _GNU_SOURCE
+#define _GNU_SOURCE
+#endif
+#include <stdlib.h>
+#include <stdio.h>
+#include <stdarg.h>
+#include <libgen.h>
+#include <inttypes.h>
+#include <limits.h>
+#include <string.h>
+#include <unistd.h>
+#include <endian.h>
+#include <fcntl.h>
+#include <errno.h>
+#include <ctype.h>
+#include <asm/unistd.h>
+#include <linux/err.h>
+#include <linux/kernel.h>
+#include <linux/bpf.h>
+#include <linux/btf.h>
+#include <linux/filter.h>
+#include <linux/limits.h>
+#include <linux/perf_event.h>
+#include <linux/ring_buffer.h>
+#include <linux/version.h>
+#include <sys/epoll.h>
+#include <sys/ioctl.h>
+#include <sys/mman.h>
+#include <sys/stat.h>
+#include <sys/types.h>
+#include <sys/vfs.h>
+#include <sys/utsname.h>
+#include <sys/resource.h>
+#include <libelf.h>
+#include <gelf.h>
+#include <zlib.h>
+
+#include "libbpf.h"
+#include "bpf.h"
+#include "btf.h"
+#include "str_error.h"
+#include "libbpf_internal.h"
+#include "hashmap.h"
+#include "bpf_gen_internal.h"
+
+#ifndef BPF_FS_MAGIC
+#define BPF_FS_MAGIC 0xcafe4a11
+#endif
+
+#define BPF_INSN_SZ (sizeof(struct bpf_insn))
+
+/* vsprintf() in __base_pr() uses nonliteral format string. It may break
+ * compilation if user enables corresponding warning. Disable it explicitly.
+ */
+#pragma GCC diagnostic ignored "-Wformat-nonliteral"
+
+#define __printf(a, b) __attribute__((format(printf, a, b)))
+
+static struct bpf_map *bpf_object__add_map(struct bpf_object *obj);
+static bool prog_is_subprog(const struct bpf_object *obj, const struct bpf_program *prog);
+
+static const char * const attach_type_name[] = {
+ [BPF_CGROUP_INET_INGRESS] = "cgroup_inet_ingress",
+ [BPF_CGROUP_INET_EGRESS] = "cgroup_inet_egress",
+ [BPF_CGROUP_INET_SOCK_CREATE] = "cgroup_inet_sock_create",
+ [BPF_CGROUP_INET_SOCK_RELEASE] = "cgroup_inet_sock_release",
+ [BPF_CGROUP_SOCK_OPS] = "cgroup_sock_ops",
+ [BPF_CGROUP_DEVICE] = "cgroup_device",
+ [BPF_CGROUP_INET4_BIND] = "cgroup_inet4_bind",
+ [BPF_CGROUP_INET6_BIND] = "cgroup_inet6_bind",
+ [BPF_CGROUP_INET4_CONNECT] = "cgroup_inet4_connect",
+ [BPF_CGROUP_INET6_CONNECT] = "cgroup_inet6_connect",
+ [BPF_CGROUP_INET4_POST_BIND] = "cgroup_inet4_post_bind",
+ [BPF_CGROUP_INET6_POST_BIND] = "cgroup_inet6_post_bind",
+ [BPF_CGROUP_INET4_GETPEERNAME] = "cgroup_inet4_getpeername",
+ [BPF_CGROUP_INET6_GETPEERNAME] = "cgroup_inet6_getpeername",
+ [BPF_CGROUP_INET4_GETSOCKNAME] = "cgroup_inet4_getsockname",
+ [BPF_CGROUP_INET6_GETSOCKNAME] = "cgroup_inet6_getsockname",
+ [BPF_CGROUP_UDP4_SENDMSG] = "cgroup_udp4_sendmsg",
+ [BPF_CGROUP_UDP6_SENDMSG] = "cgroup_udp6_sendmsg",
+ [BPF_CGROUP_SYSCTL] = "cgroup_sysctl",
+ [BPF_CGROUP_UDP4_RECVMSG] = "cgroup_udp4_recvmsg",
+ [BPF_CGROUP_UDP6_RECVMSG] = "cgroup_udp6_recvmsg",
+ [BPF_CGROUP_GETSOCKOPT] = "cgroup_getsockopt",
+ [BPF_CGROUP_SETSOCKOPT] = "cgroup_setsockopt",
+ [BPF_SK_SKB_STREAM_PARSER] = "sk_skb_stream_parser",
+ [BPF_SK_SKB_STREAM_VERDICT] = "sk_skb_stream_verdict",
+ [BPF_SK_SKB_VERDICT] = "sk_skb_verdict",
+ [BPF_SK_MSG_VERDICT] = "sk_msg_verdict",
+ [BPF_LIRC_MODE2] = "lirc_mode2",
+ [BPF_FLOW_DISSECTOR] = "flow_dissector",
+ [BPF_TRACE_RAW_TP] = "trace_raw_tp",
+ [BPF_TRACE_FENTRY] = "trace_fentry",
+ [BPF_TRACE_FEXIT] = "trace_fexit",
+ [BPF_MODIFY_RETURN] = "modify_return",
+ [BPF_LSM_MAC] = "lsm_mac",
+ [BPF_LSM_CGROUP] = "lsm_cgroup",
+ [BPF_SK_LOOKUP] = "sk_lookup",
+ [BPF_TRACE_ITER] = "trace_iter",
+ [BPF_XDP_DEVMAP] = "xdp_devmap",
+ [BPF_XDP_CPUMAP] = "xdp_cpumap",
+ [BPF_XDP] = "xdp",
+ [BPF_SK_REUSEPORT_SELECT] = "sk_reuseport_select",
+ [BPF_SK_REUSEPORT_SELECT_OR_MIGRATE] = "sk_reuseport_select_or_migrate",
+ [BPF_PERF_EVENT] = "perf_event",
+ [BPF_TRACE_KPROBE_MULTI] = "trace_kprobe_multi",
+};
+
+static const char * const link_type_name[] = {
+ [BPF_LINK_TYPE_UNSPEC] = "unspec",
+ [BPF_LINK_TYPE_RAW_TRACEPOINT] = "raw_tracepoint",
+ [BPF_LINK_TYPE_TRACING] = "tracing",
+ [BPF_LINK_TYPE_CGROUP] = "cgroup",
+ [BPF_LINK_TYPE_ITER] = "iter",
+ [BPF_LINK_TYPE_NETNS] = "netns",
+ [BPF_LINK_TYPE_XDP] = "xdp",
+ [BPF_LINK_TYPE_PERF_EVENT] = "perf_event",
+ [BPF_LINK_TYPE_KPROBE_MULTI] = "kprobe_multi",
+ [BPF_LINK_TYPE_STRUCT_OPS] = "struct_ops",
+};
+
+static const char * const map_type_name[] = {
+ [BPF_MAP_TYPE_UNSPEC] = "unspec",
+ [BPF_MAP_TYPE_HASH] = "hash",
+ [BPF_MAP_TYPE_ARRAY] = "array",
+ [BPF_MAP_TYPE_PROG_ARRAY] = "prog_array",
+ [BPF_MAP_TYPE_PERF_EVENT_ARRAY] = "perf_event_array",
+ [BPF_MAP_TYPE_PERCPU_HASH] = "percpu_hash",
+ [BPF_MAP_TYPE_PERCPU_ARRAY] = "percpu_array",
+ [BPF_MAP_TYPE_STACK_TRACE] = "stack_trace",
+ [BPF_MAP_TYPE_CGROUP_ARRAY] = "cgroup_array",
+ [BPF_MAP_TYPE_LRU_HASH] = "lru_hash",
+ [BPF_MAP_TYPE_LRU_PERCPU_HASH] = "lru_percpu_hash",
+ [BPF_MAP_TYPE_LPM_TRIE] = "lpm_trie",
+ [BPF_MAP_TYPE_ARRAY_OF_MAPS] = "array_of_maps",
+ [BPF_MAP_TYPE_HASH_OF_MAPS] = "hash_of_maps",
+ [BPF_MAP_TYPE_DEVMAP] = "devmap",
+ [BPF_MAP_TYPE_DEVMAP_HASH] = "devmap_hash",
+ [BPF_MAP_TYPE_SOCKMAP] = "sockmap",
+ [BPF_MAP_TYPE_CPUMAP] = "cpumap",
+ [BPF_MAP_TYPE_XSKMAP] = "xskmap",
+ [BPF_MAP_TYPE_SOCKHASH] = "sockhash",
+ [BPF_MAP_TYPE_CGROUP_STORAGE] = "cgroup_storage",
+ [BPF_MAP_TYPE_REUSEPORT_SOCKARRAY] = "reuseport_sockarray",
+ [BPF_MAP_TYPE_PERCPU_CGROUP_STORAGE] = "percpu_cgroup_storage",
+ [BPF_MAP_TYPE_QUEUE] = "queue",
+ [BPF_MAP_TYPE_STACK] = "stack",
+ [BPF_MAP_TYPE_SK_STORAGE] = "sk_storage",
+ [BPF_MAP_TYPE_STRUCT_OPS] = "struct_ops",
+ [BPF_MAP_TYPE_RINGBUF] = "ringbuf",
+ [BPF_MAP_TYPE_INODE_STORAGE] = "inode_storage",
+ [BPF_MAP_TYPE_TASK_STORAGE] = "task_storage",
+ [BPF_MAP_TYPE_BLOOM_FILTER] = "bloom_filter",
+ [BPF_MAP_TYPE_USER_RINGBUF] = "user_ringbuf",
+ [BPF_MAP_TYPE_CGRP_STORAGE] = "cgrp_storage",
+};
+
+static const char * const prog_type_name[] = {
+ [BPF_PROG_TYPE_UNSPEC] = "unspec",
+ [BPF_PROG_TYPE_SOCKET_FILTER] = "socket_filter",
+ [BPF_PROG_TYPE_KPROBE] = "kprobe",
+ [BPF_PROG_TYPE_SCHED_CLS] = "sched_cls",
+ [BPF_PROG_TYPE_SCHED_ACT] = "sched_act",
+ [BPF_PROG_TYPE_TRACEPOINT] = "tracepoint",
+ [BPF_PROG_TYPE_XDP] = "xdp",
+ [BPF_PROG_TYPE_PERF_EVENT] = "perf_event",
+ [BPF_PROG_TYPE_CGROUP_SKB] = "cgroup_skb",
+ [BPF_PROG_TYPE_CGROUP_SOCK] = "cgroup_sock",
+ [BPF_PROG_TYPE_LWT_IN] = "lwt_in",
+ [BPF_PROG_TYPE_LWT_OUT] = "lwt_out",
+ [BPF_PROG_TYPE_LWT_XMIT] = "lwt_xmit",
+ [BPF_PROG_TYPE_SOCK_OPS] = "sock_ops",
+ [BPF_PROG_TYPE_SK_SKB] = "sk_skb",
+ [BPF_PROG_TYPE_CGROUP_DEVICE] = "cgroup_device",
+ [BPF_PROG_TYPE_SK_MSG] = "sk_msg",
+ [BPF_PROG_TYPE_RAW_TRACEPOINT] = "raw_tracepoint",
+ [BPF_PROG_TYPE_CGROUP_SOCK_ADDR] = "cgroup_sock_addr",
+ [BPF_PROG_TYPE_LWT_SEG6LOCAL] = "lwt_seg6local",
+ [BPF_PROG_TYPE_LIRC_MODE2] = "lirc_mode2",
+ [BPF_PROG_TYPE_SK_REUSEPORT] = "sk_reuseport",
+ [BPF_PROG_TYPE_FLOW_DISSECTOR] = "flow_dissector",
+ [BPF_PROG_TYPE_CGROUP_SYSCTL] = "cgroup_sysctl",
+ [BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE] = "raw_tracepoint_writable",
+ [BPF_PROG_TYPE_CGROUP_SOCKOPT] = "cgroup_sockopt",
+ [BPF_PROG_TYPE_TRACING] = "tracing",
+ [BPF_PROG_TYPE_STRUCT_OPS] = "struct_ops",
+ [BPF_PROG_TYPE_EXT] = "ext",
+ [BPF_PROG_TYPE_LSM] = "lsm",
+ [BPF_PROG_TYPE_SK_LOOKUP] = "sk_lookup",
+ [BPF_PROG_TYPE_SYSCALL] = "syscall",
+};
+
+static int __base_pr(enum libbpf_print_level level, const char *format,
+ va_list args)
+{
+ if (level == LIBBPF_DEBUG)
+ return 0;
+
+ return vfprintf(stderr, format, args);
+}
+
+static libbpf_print_fn_t __libbpf_pr = __base_pr;
+
+libbpf_print_fn_t libbpf_set_print(libbpf_print_fn_t fn)
+{
+ libbpf_print_fn_t old_print_fn = __libbpf_pr;
+
+ __libbpf_pr = fn;
+ return old_print_fn;
+}
+
+__printf(2, 3)
+void libbpf_print(enum libbpf_print_level level, const char *format, ...)
+{
+ va_list args;
+ int old_errno;
+
+ if (!__libbpf_pr)
+ return;
+
+ old_errno = errno;
+
+ va_start(args, format);
+ __libbpf_pr(level, format, args);
+ va_end(args);
+
+ errno = old_errno;
+}
+
+static void pr_perm_msg(int err)
+{
+ struct rlimit limit;
+ char buf[100];
+
+ if (err != -EPERM || geteuid() != 0)
+ return;
+
+ err = getrlimit(RLIMIT_MEMLOCK, &limit);
+ if (err)
+ return;
+
+ if (limit.rlim_cur == RLIM_INFINITY)
+ return;
+
+ if (limit.rlim_cur < 1024)
+ snprintf(buf, sizeof(buf), "%zu bytes", (size_t)limit.rlim_cur);
+ else if (limit.rlim_cur < 1024*1024)
+ snprintf(buf, sizeof(buf), "%.1f KiB", (double)limit.rlim_cur / 1024);
+ else
+ snprintf(buf, sizeof(buf), "%.1f MiB", (double)limit.rlim_cur / (1024*1024));
+
+ pr_warn("permission error while running as root; try raising 'ulimit -l'? current value: %s\n",
+ buf);
+}
+
+#define STRERR_BUFSIZE 128
+
+/* Copied from tools/perf/util/util.h */
+#ifndef zfree
+# define zfree(ptr) ({ free(*ptr); *ptr = NULL; })
+#endif
+
+#ifndef zclose
+# define zclose(fd) ({ \
+ int ___err = 0; \
+ if ((fd) >= 0) \
+ ___err = close((fd)); \
+ fd = -1; \
+ ___err; })
+#endif
+
+static inline __u64 ptr_to_u64(const void *ptr)
+{
+ return (__u64) (unsigned long) ptr;
+}
+
+int libbpf_set_strict_mode(enum libbpf_strict_mode mode)
+{
+ /* as of v1.0 libbpf_set_strict_mode() is a no-op */
+ return 0;
+}
+
+__u32 libbpf_major_version(void)
+{
+ return LIBBPF_MAJOR_VERSION;
+}
+
+__u32 libbpf_minor_version(void)
+{
+ return LIBBPF_MINOR_VERSION;
+}
+
+const char *libbpf_version_string(void)
+{
+#define __S(X) #X
+#define _S(X) __S(X)
+ return "v" _S(LIBBPF_MAJOR_VERSION) "." _S(LIBBPF_MINOR_VERSION);
+#undef _S
+#undef __S
+}
+
+enum reloc_type {
+ RELO_LD64,
+ RELO_CALL,
+ RELO_DATA,
+ RELO_EXTERN_VAR,
+ RELO_EXTERN_FUNC,
+ RELO_SUBPROG_ADDR,
+ RELO_CORE,
+};
+
+struct reloc_desc {
+ enum reloc_type type;
+ int insn_idx;
+ union {
+ const struct bpf_core_relo *core_relo; /* used when type == RELO_CORE */
+ struct {
+ int map_idx;
+ int sym_off;
+ };
+ };
+};
+
+/* stored as sec_def->cookie for all libbpf-supported SEC()s */
+enum sec_def_flags {
+ SEC_NONE = 0,
+ /* expected_attach_type is optional, if kernel doesn't support that */
+ SEC_EXP_ATTACH_OPT = 1,
+ /* legacy, only used by libbpf_get_type_names() and
+ * libbpf_attach_type_by_name(), not used by libbpf itself at all.
+ * This used to be associated with cgroup (and few other) BPF programs
+ * that were attachable through BPF_PROG_ATTACH command. Pretty
+ * meaningless nowadays, though.
+ */
+ SEC_ATTACHABLE = 2,
+ SEC_ATTACHABLE_OPT = SEC_ATTACHABLE | SEC_EXP_ATTACH_OPT,
+ /* attachment target is specified through BTF ID in either kernel or
+ * other BPF program's BTF object
+ */
+ SEC_ATTACH_BTF = 4,
+ /* BPF program type allows sleeping/blocking in kernel */
+ SEC_SLEEPABLE = 8,
+ /* BPF program support non-linear XDP buffer */
+ SEC_XDP_FRAGS = 16,
+};
+
+struct bpf_sec_def {
+ char *sec;
+ enum bpf_prog_type prog_type;
+ enum bpf_attach_type expected_attach_type;
+ long cookie;
+ int handler_id;
+
+ libbpf_prog_setup_fn_t prog_setup_fn;
+ libbpf_prog_prepare_load_fn_t prog_prepare_load_fn;
+ libbpf_prog_attach_fn_t prog_attach_fn;
+};
+
+/*
+ * bpf_prog should be a better name but it has been used in
+ * linux/filter.h.
+ */
+struct bpf_program {
+ char *name;
+ char *sec_name;
+ size_t sec_idx;
+ const struct bpf_sec_def *sec_def;
+ /* this program's instruction offset (in number of instructions)
+ * within its containing ELF section
+ */
+ size_t sec_insn_off;
+ /* number of original instructions in ELF section belonging to this
+ * program, not taking into account subprogram instructions possible
+ * appended later during relocation
+ */
+ size_t sec_insn_cnt;
+ /* Offset (in number of instructions) of the start of instruction
+ * belonging to this BPF program within its containing main BPF
+ * program. For the entry-point (main) BPF program, this is always
+ * zero. For a sub-program, this gets reset before each of main BPF
+ * programs are processed and relocated and is used to determined
+ * whether sub-program was already appended to the main program, and
+ * if yes, at which instruction offset.
+ */
+ size_t sub_insn_off;
+
+ /* instructions that belong to BPF program; insns[0] is located at
+ * sec_insn_off instruction within its ELF section in ELF file, so
+ * when mapping ELF file instruction index to the local instruction,
+ * one needs to subtract sec_insn_off; and vice versa.
+ */
+ struct bpf_insn *insns;
+ /* actual number of instruction in this BPF program's image; for
+ * entry-point BPF programs this includes the size of main program
+ * itself plus all the used sub-programs, appended at the end
+ */
+ size_t insns_cnt;
+
+ struct reloc_desc *reloc_desc;
+ int nr_reloc;
+
+ /* BPF verifier log settings */
+ char *log_buf;
+ size_t log_size;
+ __u32 log_level;
+
+ struct bpf_object *obj;
+
+ int fd;
+ bool autoload;
+ bool autoattach;
+ bool mark_btf_static;
+ enum bpf_prog_type type;
+ enum bpf_attach_type expected_attach_type;
+
+ int prog_ifindex;
+ __u32 attach_btf_obj_fd;
+ __u32 attach_btf_id;
+ __u32 attach_prog_fd;
+
+ void *func_info;
+ __u32 func_info_rec_size;
+ __u32 func_info_cnt;
+
+ void *line_info;
+ __u32 line_info_rec_size;
+ __u32 line_info_cnt;
+ __u32 prog_flags;
+};
+
+struct bpf_struct_ops {
+ const char *tname;
+ const struct btf_type *type;
+ struct bpf_program **progs;
+ __u32 *kern_func_off;
+ /* e.g. struct tcp_congestion_ops in bpf_prog's btf format */
+ void *data;
+ /* e.g. struct bpf_struct_ops_tcp_congestion_ops in
+ * btf_vmlinux's format.
+ * struct bpf_struct_ops_tcp_congestion_ops {
+ * [... some other kernel fields ...]
+ * struct tcp_congestion_ops data;
+ * }
+ * kern_vdata-size == sizeof(struct bpf_struct_ops_tcp_congestion_ops)
+ * bpf_map__init_kern_struct_ops() will populate the "kern_vdata"
+ * from "data".
+ */
+ void *kern_vdata;
+ __u32 type_id;
+};
+
+#define DATA_SEC ".data"
+#define BSS_SEC ".bss"
+#define RODATA_SEC ".rodata"
+#define KCONFIG_SEC ".kconfig"
+#define KSYMS_SEC ".ksyms"
+#define STRUCT_OPS_SEC ".struct_ops"
+
+enum libbpf_map_type {
+ LIBBPF_MAP_UNSPEC,
+ LIBBPF_MAP_DATA,
+ LIBBPF_MAP_BSS,
+ LIBBPF_MAP_RODATA,
+ LIBBPF_MAP_KCONFIG,
+};
+
+struct bpf_map_def {
+ unsigned int type;
+ unsigned int key_size;
+ unsigned int value_size;
+ unsigned int max_entries;
+ unsigned int map_flags;
+};
+
+struct bpf_map {
+ struct bpf_object *obj;
+ char *name;
+ /* real_name is defined for special internal maps (.rodata*,
+ * .data*, .bss, .kconfig) and preserves their original ELF section
+ * name. This is important to be able to find corresponding BTF
+ * DATASEC information.
+ */
+ char *real_name;
+ int fd;
+ int sec_idx;
+ size_t sec_offset;
+ int map_ifindex;
+ int inner_map_fd;
+ struct bpf_map_def def;
+ __u32 numa_node;
+ __u32 btf_var_idx;
+ __u32 btf_key_type_id;
+ __u32 btf_value_type_id;
+ __u32 btf_vmlinux_value_type_id;
+ enum libbpf_map_type libbpf_type;
+ void *mmaped;
+ struct bpf_struct_ops *st_ops;
+ struct bpf_map *inner_map;
+ void **init_slots;
+ int init_slots_sz;
+ char *pin_path;
+ bool pinned;
+ bool reused;
+ bool autocreate;
+ __u64 map_extra;
+};
+
+enum extern_type {
+ EXT_UNKNOWN,
+ EXT_KCFG,
+ EXT_KSYM,
+};
+
+enum kcfg_type {
+ KCFG_UNKNOWN,
+ KCFG_CHAR,
+ KCFG_BOOL,
+ KCFG_INT,
+ KCFG_TRISTATE,
+ KCFG_CHAR_ARR,
+};
+
+struct extern_desc {
+ enum extern_type type;
+ int sym_idx;
+ int btf_id;
+ int sec_btf_id;
+ const char *name;
+ bool is_set;
+ bool is_weak;
+ union {
+ struct {
+ enum kcfg_type type;
+ int sz;
+ int align;
+ int data_off;
+ bool is_signed;
+ } kcfg;
+ struct {
+ unsigned long long addr;
+
+ /* target btf_id of the corresponding kernel var. */
+ int kernel_btf_obj_fd;
+ int kernel_btf_id;
+
+ /* local btf_id of the ksym extern's type. */
+ __u32 type_id;
+ /* BTF fd index to be patched in for insn->off, this is
+ * 0 for vmlinux BTF, index in obj->fd_array for module
+ * BTF
+ */
+ __s16 btf_fd_idx;
+ } ksym;
+ };
+};
+
+struct module_btf {
+ struct btf *btf;
+ char *name;
+ __u32 id;
+ int fd;
+ int fd_array_idx;
+};
+
+enum sec_type {
+ SEC_UNUSED = 0,
+ SEC_RELO,
+ SEC_BSS,
+ SEC_DATA,
+ SEC_RODATA,
+};
+
+struct elf_sec_desc {
+ enum sec_type sec_type;
+ Elf64_Shdr *shdr;
+ Elf_Data *data;
+};
+
+struct elf_state {
+ int fd;
+ const void *obj_buf;
+ size_t obj_buf_sz;
+ Elf *elf;
+ Elf64_Ehdr *ehdr;
+ Elf_Data *symbols;
+ Elf_Data *st_ops_data;
+ size_t shstrndx; /* section index for section name strings */
+ size_t strtabidx;
+ struct elf_sec_desc *secs;
+ size_t sec_cnt;
+ int btf_maps_shndx;
+ __u32 btf_maps_sec_btf_id;
+ int text_shndx;
+ int symbols_shndx;
+ int st_ops_shndx;
+};
+
+struct usdt_manager;
+
+struct bpf_object {
+ char name[BPF_OBJ_NAME_LEN];
+ char license[64];
+ __u32 kern_version;
+
+ struct bpf_program *programs;
+ size_t nr_programs;
+ struct bpf_map *maps;
+ size_t nr_maps;
+ size_t maps_cap;
+
+ char *kconfig;
+ struct extern_desc *externs;
+ int nr_extern;
+ int kconfig_map_idx;
+
+ bool loaded;
+ bool has_subcalls;
+ bool has_rodata;
+
+ struct bpf_gen *gen_loader;
+
+ /* Information when doing ELF related work. Only valid if efile.elf is not NULL */
+ struct elf_state efile;
+
+ struct btf *btf;
+ struct btf_ext *btf_ext;
+
+ /* Parse and load BTF vmlinux if any of the programs in the object need
+ * it at load time.
+ */
+ struct btf *btf_vmlinux;
+ /* Path to the custom BTF to be used for BPF CO-RE relocations as an
+ * override for vmlinux BTF.
+ */
+ char *btf_custom_path;
+ /* vmlinux BTF override for CO-RE relocations */
+ struct btf *btf_vmlinux_override;
+ /* Lazily initialized kernel module BTFs */
+ struct module_btf *btf_modules;
+ bool btf_modules_loaded;
+ size_t btf_module_cnt;
+ size_t btf_module_cap;
+
+ /* optional log settings passed to BPF_BTF_LOAD and BPF_PROG_LOAD commands */
+ char *log_buf;
+ size_t log_size;
+ __u32 log_level;
+
+ int *fd_array;
+ size_t fd_array_cap;
+ size_t fd_array_cnt;
+
+ struct usdt_manager *usdt_man;
+
+ char path[];
+};
+
+static const char *elf_sym_str(const struct bpf_object *obj, size_t off);
+static const char *elf_sec_str(const struct bpf_object *obj, size_t off);
+static Elf_Scn *elf_sec_by_idx(const struct bpf_object *obj, size_t idx);
+static Elf_Scn *elf_sec_by_name(const struct bpf_object *obj, const char *name);
+static Elf64_Shdr *elf_sec_hdr(const struct bpf_object *obj, Elf_Scn *scn);
+static const char *elf_sec_name(const struct bpf_object *obj, Elf_Scn *scn);
+static Elf_Data *elf_sec_data(const struct bpf_object *obj, Elf_Scn *scn);
+static Elf64_Sym *elf_sym_by_idx(const struct bpf_object *obj, size_t idx);
+static Elf64_Rel *elf_rel_by_idx(Elf_Data *data, size_t idx);
+
+void bpf_program__unload(struct bpf_program *prog)
+{
+ if (!prog)
+ return;
+
+ zclose(prog->fd);
+
+ zfree(&prog->func_info);
+ zfree(&prog->line_info);
+}
+
+static void bpf_program__exit(struct bpf_program *prog)
+{
+ if (!prog)
+ return;
+
+ bpf_program__unload(prog);
+ zfree(&prog->name);
+ zfree(&prog->sec_name);
+ zfree(&prog->insns);
+ zfree(&prog->reloc_desc);
+
+ prog->nr_reloc = 0;
+ prog->insns_cnt = 0;
+ prog->sec_idx = -1;
+}
+
+static bool insn_is_subprog_call(const struct bpf_insn *insn)
+{
+ return BPF_CLASS(insn->code) == BPF_JMP &&
+ BPF_OP(insn->code) == BPF_CALL &&
+ BPF_SRC(insn->code) == BPF_K &&
+ insn->src_reg == BPF_PSEUDO_CALL &&
+ insn->dst_reg == 0 &&
+ insn->off == 0;
+}
+
+static bool is_call_insn(const struct bpf_insn *insn)
+{
+ return insn->code == (BPF_JMP | BPF_CALL);
+}
+
+static bool insn_is_pseudo_func(struct bpf_insn *insn)
+{
+ return is_ldimm64_insn(insn) && insn->src_reg == BPF_PSEUDO_FUNC;
+}
+
+static int
+bpf_object__init_prog(struct bpf_object *obj, struct bpf_program *prog,
+ const char *name, size_t sec_idx, const char *sec_name,
+ size_t sec_off, void *insn_data, size_t insn_data_sz)
+{
+ if (insn_data_sz == 0 || insn_data_sz % BPF_INSN_SZ || sec_off % BPF_INSN_SZ) {
+ pr_warn("sec '%s': corrupted program '%s', offset %zu, size %zu\n",
+ sec_name, name, sec_off, insn_data_sz);
+ return -EINVAL;
+ }
+
+ memset(prog, 0, sizeof(*prog));
+ prog->obj = obj;
+
+ prog->sec_idx = sec_idx;
+ prog->sec_insn_off = sec_off / BPF_INSN_SZ;
+ prog->sec_insn_cnt = insn_data_sz / BPF_INSN_SZ;
+ /* insns_cnt can later be increased by appending used subprograms */
+ prog->insns_cnt = prog->sec_insn_cnt;
+
+ prog->type = BPF_PROG_TYPE_UNSPEC;
+ prog->fd = -1;
+
+ /* libbpf's convention for SEC("?abc...") is that it's just like
+ * SEC("abc...") but the corresponding bpf_program starts out with
+ * autoload set to false.
+ */
+ if (sec_name[0] == '?') {
+ prog->autoload = false;
+ /* from now on forget there was ? in section name */
+ sec_name++;
+ } else {
+ prog->autoload = true;
+ }
+
+ prog->autoattach = true;
+
+ /* inherit object's log_level */
+ prog->log_level = obj->log_level;
+
+ prog->sec_name = strdup(sec_name);
+ if (!prog->sec_name)
+ goto errout;
+
+ prog->name = strdup(name);
+ if (!prog->name)
+ goto errout;
+
+ prog->insns = malloc(insn_data_sz);
+ if (!prog->insns)
+ goto errout;
+ memcpy(prog->insns, insn_data, insn_data_sz);
+
+ return 0;
+errout:
+ pr_warn("sec '%s': failed to allocate memory for prog '%s'\n", sec_name, name);
+ bpf_program__exit(prog);
+ return -ENOMEM;
+}
+
+static int
+bpf_object__add_programs(struct bpf_object *obj, Elf_Data *sec_data,
+ const char *sec_name, int sec_idx)
+{
+ Elf_Data *symbols = obj->efile.symbols;
+ struct bpf_program *prog, *progs;
+ void *data = sec_data->d_buf;
+ size_t sec_sz = sec_data->d_size, sec_off, prog_sz, nr_syms;
+ int nr_progs, err, i;
+ const char *name;
+ Elf64_Sym *sym;
+
+ progs = obj->programs;
+ nr_progs = obj->nr_programs;
+ nr_syms = symbols->d_size / sizeof(Elf64_Sym);
+ sec_off = 0;
+
+ for (i = 0; i < nr_syms; i++) {
+ sym = elf_sym_by_idx(obj, i);
+
+ if (sym->st_shndx != sec_idx)
+ continue;
+ if (ELF64_ST_TYPE(sym->st_info) != STT_FUNC)
+ continue;
+
+ prog_sz = sym->st_size;
+ sec_off = sym->st_value;
+
+ name = elf_sym_str(obj, sym->st_name);
+ if (!name) {
+ pr_warn("sec '%s': failed to get symbol name for offset %zu\n",
+ sec_name, sec_off);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+
+ if (sec_off + prog_sz > sec_sz) {
+ pr_warn("sec '%s': program at offset %zu crosses section boundary\n",
+ sec_name, sec_off);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+
+ if (sec_idx != obj->efile.text_shndx && ELF64_ST_BIND(sym->st_info) == STB_LOCAL) {
+ pr_warn("sec '%s': program '%s' is static and not supported\n", sec_name, name);
+ return -ENOTSUP;
+ }
+
+ pr_debug("sec '%s': found program '%s' at insn offset %zu (%zu bytes), code size %zu insns (%zu bytes)\n",
+ sec_name, name, sec_off / BPF_INSN_SZ, sec_off, prog_sz / BPF_INSN_SZ, prog_sz);
+
+ progs = libbpf_reallocarray(progs, nr_progs + 1, sizeof(*progs));
+ if (!progs) {
+ /*
+ * In this case the original obj->programs
+ * is still valid, so don't need special treat for
+ * bpf_close_object().
+ */
+ pr_warn("sec '%s': failed to alloc memory for new program '%s'\n",
+ sec_name, name);
+ return -ENOMEM;
+ }
+ obj->programs = progs;
+
+ prog = &progs[nr_progs];
+
+ err = bpf_object__init_prog(obj, prog, name, sec_idx, sec_name,
+ sec_off, data + sec_off, prog_sz);
+ if (err)
+ return err;
+
+ /* if function is a global/weak symbol, but has restricted
+ * (STV_HIDDEN or STV_INTERNAL) visibility, mark its BTF FUNC
+ * as static to enable more permissive BPF verification mode
+ * with more outside context available to BPF verifier
+ */
+ if (ELF64_ST_BIND(sym->st_info) != STB_LOCAL
+ && (ELF64_ST_VISIBILITY(sym->st_other) == STV_HIDDEN
+ || ELF64_ST_VISIBILITY(sym->st_other) == STV_INTERNAL))
+ prog->mark_btf_static = true;
+
+ nr_progs++;
+ obj->nr_programs = nr_progs;
+ }
+
+ return 0;
+}
+
+__u32 get_kernel_version(void)
+{
+ /* On Ubuntu LINUX_VERSION_CODE doesn't correspond to info.release,
+ * but Ubuntu provides /proc/version_signature file, as described at
+ * https://ubuntu.com/kernel, with an example contents below, which we
+ * can use to get a proper LINUX_VERSION_CODE.
+ *
+ * Ubuntu 5.4.0-12.15-generic 5.4.8
+ *
+ * In the above, 5.4.8 is what kernel is actually expecting, while
+ * uname() call will return 5.4.0 in info.release.
+ */
+ const char *ubuntu_kver_file = "/proc/version_signature";
+ __u32 major, minor, patch;
+ struct utsname info;
+
+ if (faccessat(AT_FDCWD, ubuntu_kver_file, R_OK, AT_EACCESS) == 0) {
+ FILE *f;
+
+ f = fopen(ubuntu_kver_file, "r");
+ if (f) {
+ if (fscanf(f, "%*s %*s %d.%d.%d\n", &major, &minor, &patch) == 3) {
+ fclose(f);
+ return KERNEL_VERSION(major, minor, patch);
+ }
+ fclose(f);
+ }
+ /* something went wrong, fall back to uname() approach */
+ }
+
+ uname(&info);
+ if (sscanf(info.release, "%u.%u.%u", &major, &minor, &patch) != 3)
+ return 0;
+ return KERNEL_VERSION(major, minor, patch);
+}
+
+static const struct btf_member *
+find_member_by_offset(const struct btf_type *t, __u32 bit_offset)
+{
+ struct btf_member *m;
+ int i;
+
+ for (i = 0, m = btf_members(t); i < btf_vlen(t); i++, m++) {
+ if (btf_member_bit_offset(t, i) == bit_offset)
+ return m;
+ }
+
+ return NULL;
+}
+
+static const struct btf_member *
+find_member_by_name(const struct btf *btf, const struct btf_type *t,
+ const char *name)
+{
+ struct btf_member *m;
+ int i;
+
+ for (i = 0, m = btf_members(t); i < btf_vlen(t); i++, m++) {
+ if (!strcmp(btf__name_by_offset(btf, m->name_off), name))
+ return m;
+ }
+
+ return NULL;
+}
+
+#define STRUCT_OPS_VALUE_PREFIX "bpf_struct_ops_"
+static int find_btf_by_prefix_kind(const struct btf *btf, const char *prefix,
+ const char *name, __u32 kind);
+
+static int
+find_struct_ops_kern_types(const struct btf *btf, const char *tname,
+ const struct btf_type **type, __u32 *type_id,
+ const struct btf_type **vtype, __u32 *vtype_id,
+ const struct btf_member **data_member)
+{
+ const struct btf_type *kern_type, *kern_vtype;
+ const struct btf_member *kern_data_member;
+ __s32 kern_vtype_id, kern_type_id;
+ __u32 i;
+
+ kern_type_id = btf__find_by_name_kind(btf, tname, BTF_KIND_STRUCT);
+ if (kern_type_id < 0) {
+ pr_warn("struct_ops init_kern: struct %s is not found in kernel BTF\n",
+ tname);
+ return kern_type_id;
+ }
+ kern_type = btf__type_by_id(btf, kern_type_id);
+
+ /* Find the corresponding "map_value" type that will be used
+ * in map_update(BPF_MAP_TYPE_STRUCT_OPS). For example,
+ * find "struct bpf_struct_ops_tcp_congestion_ops" from the
+ * btf_vmlinux.
+ */
+ kern_vtype_id = find_btf_by_prefix_kind(btf, STRUCT_OPS_VALUE_PREFIX,
+ tname, BTF_KIND_STRUCT);
+ if (kern_vtype_id < 0) {
+ pr_warn("struct_ops init_kern: struct %s%s is not found in kernel BTF\n",
+ STRUCT_OPS_VALUE_PREFIX, tname);
+ return kern_vtype_id;
+ }
+ kern_vtype = btf__type_by_id(btf, kern_vtype_id);
+
+ /* Find "struct tcp_congestion_ops" from
+ * struct bpf_struct_ops_tcp_congestion_ops {
+ * [ ... ]
+ * struct tcp_congestion_ops data;
+ * }
+ */
+ kern_data_member = btf_members(kern_vtype);
+ for (i = 0; i < btf_vlen(kern_vtype); i++, kern_data_member++) {
+ if (kern_data_member->type == kern_type_id)
+ break;
+ }
+ if (i == btf_vlen(kern_vtype)) {
+ pr_warn("struct_ops init_kern: struct %s data is not found in struct %s%s\n",
+ tname, STRUCT_OPS_VALUE_PREFIX, tname);
+ return -EINVAL;
+ }
+
+ *type = kern_type;
+ *type_id = kern_type_id;
+ *vtype = kern_vtype;
+ *vtype_id = kern_vtype_id;
+ *data_member = kern_data_member;
+
+ return 0;
+}
+
+static bool bpf_map__is_struct_ops(const struct bpf_map *map)
+{
+ return map->def.type == BPF_MAP_TYPE_STRUCT_OPS;
+}
+
+/* Init the map's fields that depend on kern_btf */
+static int bpf_map__init_kern_struct_ops(struct bpf_map *map,
+ const struct btf *btf,
+ const struct btf *kern_btf)
+{
+ const struct btf_member *member, *kern_member, *kern_data_member;
+ const struct btf_type *type, *kern_type, *kern_vtype;
+ __u32 i, kern_type_id, kern_vtype_id, kern_data_off;
+ struct bpf_struct_ops *st_ops;
+ void *data, *kern_data;
+ const char *tname;
+ int err;
+
+ st_ops = map->st_ops;
+ type = st_ops->type;
+ tname = st_ops->tname;
+ err = find_struct_ops_kern_types(kern_btf, tname,
+ &kern_type, &kern_type_id,
+ &kern_vtype, &kern_vtype_id,
+ &kern_data_member);
+ if (err)
+ return err;
+
+ pr_debug("struct_ops init_kern %s: type_id:%u kern_type_id:%u kern_vtype_id:%u\n",
+ map->name, st_ops->type_id, kern_type_id, kern_vtype_id);
+
+ map->def.value_size = kern_vtype->size;
+ map->btf_vmlinux_value_type_id = kern_vtype_id;
+
+ st_ops->kern_vdata = calloc(1, kern_vtype->size);
+ if (!st_ops->kern_vdata)
+ return -ENOMEM;
+
+ data = st_ops->data;
+ kern_data_off = kern_data_member->offset / 8;
+ kern_data = st_ops->kern_vdata + kern_data_off;
+
+ member = btf_members(type);
+ for (i = 0; i < btf_vlen(type); i++, member++) {
+ const struct btf_type *mtype, *kern_mtype;
+ __u32 mtype_id, kern_mtype_id;
+ void *mdata, *kern_mdata;
+ __s64 msize, kern_msize;
+ __u32 moff, kern_moff;
+ __u32 kern_member_idx;
+ const char *mname;
+
+ mname = btf__name_by_offset(btf, member->name_off);
+ kern_member = find_member_by_name(kern_btf, kern_type, mname);
+ if (!kern_member) {
+ pr_warn("struct_ops init_kern %s: Cannot find member %s in kernel BTF\n",
+ map->name, mname);
+ return -ENOTSUP;
+ }
+
+ kern_member_idx = kern_member - btf_members(kern_type);
+ if (btf_member_bitfield_size(type, i) ||
+ btf_member_bitfield_size(kern_type, kern_member_idx)) {
+ pr_warn("struct_ops init_kern %s: bitfield %s is not supported\n",
+ map->name, mname);
+ return -ENOTSUP;
+ }
+
+ moff = member->offset / 8;
+ kern_moff = kern_member->offset / 8;
+
+ mdata = data + moff;
+ kern_mdata = kern_data + kern_moff;
+
+ mtype = skip_mods_and_typedefs(btf, member->type, &mtype_id);
+ kern_mtype = skip_mods_and_typedefs(kern_btf, kern_member->type,
+ &kern_mtype_id);
+ if (BTF_INFO_KIND(mtype->info) !=
+ BTF_INFO_KIND(kern_mtype->info)) {
+ pr_warn("struct_ops init_kern %s: Unmatched member type %s %u != %u(kernel)\n",
+ map->name, mname, BTF_INFO_KIND(mtype->info),
+ BTF_INFO_KIND(kern_mtype->info));
+ return -ENOTSUP;
+ }
+
+ if (btf_is_ptr(mtype)) {
+ struct bpf_program *prog;
+
+ prog = st_ops->progs[i];
+ if (!prog)
+ continue;
+
+ kern_mtype = skip_mods_and_typedefs(kern_btf,
+ kern_mtype->type,
+ &kern_mtype_id);
+
+ /* mtype->type must be a func_proto which was
+ * guaranteed in bpf_object__collect_st_ops_relos(),
+ * so only check kern_mtype for func_proto here.
+ */
+ if (!btf_is_func_proto(kern_mtype)) {
+ pr_warn("struct_ops init_kern %s: kernel member %s is not a func ptr\n",
+ map->name, mname);
+ return -ENOTSUP;
+ }
+
+ prog->attach_btf_id = kern_type_id;
+ prog->expected_attach_type = kern_member_idx;
+
+ st_ops->kern_func_off[i] = kern_data_off + kern_moff;
+
+ pr_debug("struct_ops init_kern %s: func ptr %s is set to prog %s from data(+%u) to kern_data(+%u)\n",
+ map->name, mname, prog->name, moff,
+ kern_moff);
+
+ continue;
+ }
+
+ msize = btf__resolve_size(btf, mtype_id);
+ kern_msize = btf__resolve_size(kern_btf, kern_mtype_id);
+ if (msize < 0 || kern_msize < 0 || msize != kern_msize) {
+ pr_warn("struct_ops init_kern %s: Error in size of member %s: %zd != %zd(kernel)\n",
+ map->name, mname, (ssize_t)msize,
+ (ssize_t)kern_msize);
+ return -ENOTSUP;
+ }
+
+ pr_debug("struct_ops init_kern %s: copy %s %u bytes from data(+%u) to kern_data(+%u)\n",
+ map->name, mname, (unsigned int)msize,
+ moff, kern_moff);
+ memcpy(kern_mdata, mdata, msize);
+ }
+
+ return 0;
+}
+
+static int bpf_object__init_kern_struct_ops_maps(struct bpf_object *obj)
+{
+ struct bpf_map *map;
+ size_t i;
+ int err;
+
+ for (i = 0; i < obj->nr_maps; i++) {
+ map = &obj->maps[i];
+
+ if (!bpf_map__is_struct_ops(map))
+ continue;
+
+ err = bpf_map__init_kern_struct_ops(map, obj->btf,
+ obj->btf_vmlinux);
+ if (err)
+ return err;
+ }
+
+ return 0;
+}
+
+static int bpf_object__init_struct_ops_maps(struct bpf_object *obj)
+{
+ const struct btf_type *type, *datasec;
+ const struct btf_var_secinfo *vsi;
+ struct bpf_struct_ops *st_ops;
+ const char *tname, *var_name;
+ __s32 type_id, datasec_id;
+ const struct btf *btf;
+ struct bpf_map *map;
+ __u32 i;
+
+ if (obj->efile.st_ops_shndx == -1)
+ return 0;
+
+ btf = obj->btf;
+ datasec_id = btf__find_by_name_kind(btf, STRUCT_OPS_SEC,
+ BTF_KIND_DATASEC);
+ if (datasec_id < 0) {
+ pr_warn("struct_ops init: DATASEC %s not found\n",
+ STRUCT_OPS_SEC);
+ return -EINVAL;
+ }
+
+ datasec = btf__type_by_id(btf, datasec_id);
+ vsi = btf_var_secinfos(datasec);
+ for (i = 0; i < btf_vlen(datasec); i++, vsi++) {
+ type = btf__type_by_id(obj->btf, vsi->type);
+ var_name = btf__name_by_offset(obj->btf, type->name_off);
+
+ type_id = btf__resolve_type(obj->btf, vsi->type);
+ if (type_id < 0) {
+ pr_warn("struct_ops init: Cannot resolve var type_id %u in DATASEC %s\n",
+ vsi->type, STRUCT_OPS_SEC);
+ return -EINVAL;
+ }
+
+ type = btf__type_by_id(obj->btf, type_id);
+ tname = btf__name_by_offset(obj->btf, type->name_off);
+ if (!tname[0]) {
+ pr_warn("struct_ops init: anonymous type is not supported\n");
+ return -ENOTSUP;
+ }
+ if (!btf_is_struct(type)) {
+ pr_warn("struct_ops init: %s is not a struct\n", tname);
+ return -EINVAL;
+ }
+
+ map = bpf_object__add_map(obj);
+ if (IS_ERR(map))
+ return PTR_ERR(map);
+
+ map->sec_idx = obj->efile.st_ops_shndx;
+ map->sec_offset = vsi->offset;
+ map->name = strdup(var_name);
+ if (!map->name)
+ return -ENOMEM;
+
+ map->def.type = BPF_MAP_TYPE_STRUCT_OPS;
+ map->def.key_size = sizeof(int);
+ map->def.value_size = type->size;
+ map->def.max_entries = 1;
+
+ map->st_ops = calloc(1, sizeof(*map->st_ops));
+ if (!map->st_ops)
+ return -ENOMEM;
+ st_ops = map->st_ops;
+ st_ops->data = malloc(type->size);
+ st_ops->progs = calloc(btf_vlen(type), sizeof(*st_ops->progs));
+ st_ops->kern_func_off = malloc(btf_vlen(type) *
+ sizeof(*st_ops->kern_func_off));
+ if (!st_ops->data || !st_ops->progs || !st_ops->kern_func_off)
+ return -ENOMEM;
+
+ if (vsi->offset + type->size > obj->efile.st_ops_data->d_size) {
+ pr_warn("struct_ops init: var %s is beyond the end of DATASEC %s\n",
+ var_name, STRUCT_OPS_SEC);
+ return -EINVAL;
+ }
+
+ memcpy(st_ops->data,
+ obj->efile.st_ops_data->d_buf + vsi->offset,
+ type->size);
+ st_ops->tname = tname;
+ st_ops->type = type;
+ st_ops->type_id = type_id;
+
+ pr_debug("struct_ops init: struct %s(type_id=%u) %s found at offset %u\n",
+ tname, type_id, var_name, vsi->offset);
+ }
+
+ return 0;
+}
+
+static struct bpf_object *bpf_object__new(const char *path,
+ const void *obj_buf,
+ size_t obj_buf_sz,
+ const char *obj_name)
+{
+ struct bpf_object *obj;
+ char *end;
+
+ obj = calloc(1, sizeof(struct bpf_object) + strlen(path) + 1);
+ if (!obj) {
+ pr_warn("alloc memory failed for %s\n", path);
+ return ERR_PTR(-ENOMEM);
+ }
+
+ strcpy(obj->path, path);
+ if (obj_name) {
+ libbpf_strlcpy(obj->name, obj_name, sizeof(obj->name));
+ } else {
+ /* Using basename() GNU version which doesn't modify arg. */
+ libbpf_strlcpy(obj->name, basename((void *)path), sizeof(obj->name));
+ end = strchr(obj->name, '.');
+ if (end)
+ *end = 0;
+ }
+
+ obj->efile.fd = -1;
+ /*
+ * Caller of this function should also call
+ * bpf_object__elf_finish() after data collection to return
+ * obj_buf to user. If not, we should duplicate the buffer to
+ * avoid user freeing them before elf finish.
+ */
+ obj->efile.obj_buf = obj_buf;
+ obj->efile.obj_buf_sz = obj_buf_sz;
+ obj->efile.btf_maps_shndx = -1;
+ obj->efile.st_ops_shndx = -1;
+ obj->kconfig_map_idx = -1;
+
+ obj->kern_version = get_kernel_version();
+ obj->loaded = false;
+
+ return obj;
+}
+
+static void bpf_object__elf_finish(struct bpf_object *obj)
+{
+ if (!obj->efile.elf)
+ return;
+
+ elf_end(obj->efile.elf);
+ obj->efile.elf = NULL;
+ obj->efile.symbols = NULL;
+ obj->efile.st_ops_data = NULL;
+
+ zfree(&obj->efile.secs);
+ obj->efile.sec_cnt = 0;
+ zclose(obj->efile.fd);
+ obj->efile.obj_buf = NULL;
+ obj->efile.obj_buf_sz = 0;
+}
+
+static int bpf_object__elf_init(struct bpf_object *obj)
+{
+ Elf64_Ehdr *ehdr;
+ int err = 0;
+ Elf *elf;
+
+ if (obj->efile.elf) {
+ pr_warn("elf: init internal error\n");
+ return -LIBBPF_ERRNO__LIBELF;
+ }
+
+ if (obj->efile.obj_buf_sz > 0) {
+ /* obj_buf should have been validated by bpf_object__open_mem(). */
+ elf = elf_memory((char *)obj->efile.obj_buf, obj->efile.obj_buf_sz);
+ } else {
+ obj->efile.fd = open(obj->path, O_RDONLY | O_CLOEXEC);
+ if (obj->efile.fd < 0) {
+ char errmsg[STRERR_BUFSIZE], *cp;
+
+ err = -errno;
+ cp = libbpf_strerror_r(err, errmsg, sizeof(errmsg));
+ pr_warn("elf: failed to open %s: %s\n", obj->path, cp);
+ return err;
+ }
+
+ elf = elf_begin(obj->efile.fd, ELF_C_READ_MMAP, NULL);
+ }
+
+ if (!elf) {
+ pr_warn("elf: failed to open %s as ELF file: %s\n", obj->path, elf_errmsg(-1));
+ err = -LIBBPF_ERRNO__LIBELF;
+ goto errout;
+ }
+
+ obj->efile.elf = elf;
+
+ if (elf_kind(elf) != ELF_K_ELF) {
+ err = -LIBBPF_ERRNO__FORMAT;
+ pr_warn("elf: '%s' is not a proper ELF object\n", obj->path);
+ goto errout;
+ }
+
+ if (gelf_getclass(elf) != ELFCLASS64) {
+ err = -LIBBPF_ERRNO__FORMAT;
+ pr_warn("elf: '%s' is not a 64-bit ELF object\n", obj->path);
+ goto errout;
+ }
+
+ obj->efile.ehdr = ehdr = elf64_getehdr(elf);
+ if (!obj->efile.ehdr) {
+ pr_warn("elf: failed to get ELF header from %s: %s\n", obj->path, elf_errmsg(-1));
+ err = -LIBBPF_ERRNO__FORMAT;
+ goto errout;
+ }
+
+ if (elf_getshdrstrndx(elf, &obj->efile.shstrndx)) {
+ pr_warn("elf: failed to get section names section index for %s: %s\n",
+ obj->path, elf_errmsg(-1));
+ err = -LIBBPF_ERRNO__FORMAT;
+ goto errout;
+ }
+
+ /* Elf is corrupted/truncated, avoid calling elf_strptr. */
+ if (!elf_rawdata(elf_getscn(elf, obj->efile.shstrndx), NULL)) {
+ pr_warn("elf: failed to get section names strings from %s: %s\n",
+ obj->path, elf_errmsg(-1));
+ err = -LIBBPF_ERRNO__FORMAT;
+ goto errout;
+ }
+
+ /* Old LLVM set e_machine to EM_NONE */
+ if (ehdr->e_type != ET_REL || (ehdr->e_machine && ehdr->e_machine != EM_BPF)) {
+ pr_warn("elf: %s is not a valid eBPF object file\n", obj->path);
+ err = -LIBBPF_ERRNO__FORMAT;
+ goto errout;
+ }
+
+ return 0;
+errout:
+ bpf_object__elf_finish(obj);
+ return err;
+}
+
+static int bpf_object__check_endianness(struct bpf_object *obj)
+{
+#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
+ if (obj->efile.ehdr->e_ident[EI_DATA] == ELFDATA2LSB)
+ return 0;
+#elif __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
+ if (obj->efile.ehdr->e_ident[EI_DATA] == ELFDATA2MSB)
+ return 0;
+#else
+# error "Unrecognized __BYTE_ORDER__"
+#endif
+ pr_warn("elf: endianness mismatch in %s.\n", obj->path);
+ return -LIBBPF_ERRNO__ENDIAN;
+}
+
+static int
+bpf_object__init_license(struct bpf_object *obj, void *data, size_t size)
+{
+ if (!data) {
+ pr_warn("invalid license section in %s\n", obj->path);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+ /* libbpf_strlcpy() only copies first N - 1 bytes, so size + 1 won't
+ * go over allowed ELF data section buffer
+ */
+ libbpf_strlcpy(obj->license, data, min(size + 1, sizeof(obj->license)));
+ pr_debug("license of %s is %s\n", obj->path, obj->license);
+ return 0;
+}
+
+static int
+bpf_object__init_kversion(struct bpf_object *obj, void *data, size_t size)
+{
+ __u32 kver;
+
+ if (!data || size != sizeof(kver)) {
+ pr_warn("invalid kver section in %s\n", obj->path);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+ memcpy(&kver, data, sizeof(kver));
+ obj->kern_version = kver;
+ pr_debug("kernel version of %s is %x\n", obj->path, obj->kern_version);
+ return 0;
+}
+
+static bool bpf_map_type__is_map_in_map(enum bpf_map_type type)
+{
+ if (type == BPF_MAP_TYPE_ARRAY_OF_MAPS ||
+ type == BPF_MAP_TYPE_HASH_OF_MAPS)
+ return true;
+ return false;
+}
+
+static int find_elf_sec_sz(const struct bpf_object *obj, const char *name, __u32 *size)
+{
+ Elf_Data *data;
+ Elf_Scn *scn;
+
+ if (!name)
+ return -EINVAL;
+
+ scn = elf_sec_by_name(obj, name);
+ data = elf_sec_data(obj, scn);
+ if (data) {
+ *size = data->d_size;
+ return 0; /* found it */
+ }
+
+ return -ENOENT;
+}
+
+static Elf64_Sym *find_elf_var_sym(const struct bpf_object *obj, const char *name)
+{
+ Elf_Data *symbols = obj->efile.symbols;
+ const char *sname;
+ size_t si;
+
+ for (si = 0; si < symbols->d_size / sizeof(Elf64_Sym); si++) {
+ Elf64_Sym *sym = elf_sym_by_idx(obj, si);
+
+ if (ELF64_ST_TYPE(sym->st_info) != STT_OBJECT)
+ continue;
+
+ if (ELF64_ST_BIND(sym->st_info) != STB_GLOBAL &&
+ ELF64_ST_BIND(sym->st_info) != STB_WEAK)
+ continue;
+
+ sname = elf_sym_str(obj, sym->st_name);
+ if (!sname) {
+ pr_warn("failed to get sym name string for var %s\n", name);
+ return ERR_PTR(-EIO);
+ }
+ if (strcmp(name, sname) == 0)
+ return sym;
+ }
+
+ return ERR_PTR(-ENOENT);
+}
+
+static struct bpf_map *bpf_object__add_map(struct bpf_object *obj)
+{
+ struct bpf_map *map;
+ int err;
+
+ err = libbpf_ensure_mem((void **)&obj->maps, &obj->maps_cap,
+ sizeof(*obj->maps), obj->nr_maps + 1);
+ if (err)
+ return ERR_PTR(err);
+
+ map = &obj->maps[obj->nr_maps++];
+ map->obj = obj;
+ map->fd = -1;
+ map->inner_map_fd = -1;
+ map->autocreate = true;
+
+ return map;
+}
+
+static size_t bpf_map_mmap_sz(const struct bpf_map *map)
+{
+ long page_sz = sysconf(_SC_PAGE_SIZE);
+ size_t map_sz;
+
+ map_sz = (size_t)roundup(map->def.value_size, 8) * map->def.max_entries;
+ map_sz = roundup(map_sz, page_sz);
+ return map_sz;
+}
+
+static char *internal_map_name(struct bpf_object *obj, const char *real_name)
+{
+ char map_name[BPF_OBJ_NAME_LEN], *p;
+ int pfx_len, sfx_len = max((size_t)7, strlen(real_name));
+
+ /* This is one of the more confusing parts of libbpf for various
+ * reasons, some of which are historical. The original idea for naming
+ * internal names was to include as much of BPF object name prefix as
+ * possible, so that it can be distinguished from similar internal
+ * maps of a different BPF object.
+ * As an example, let's say we have bpf_object named 'my_object_name'
+ * and internal map corresponding to '.rodata' ELF section. The final
+ * map name advertised to user and to the kernel will be
+ * 'my_objec.rodata', taking first 8 characters of object name and
+ * entire 7 characters of '.rodata'.
+ * Somewhat confusingly, if internal map ELF section name is shorter
+ * than 7 characters, e.g., '.bss', we still reserve 7 characters
+ * for the suffix, even though we only have 4 actual characters, and
+ * resulting map will be called 'my_objec.bss', not even using all 15
+ * characters allowed by the kernel. Oh well, at least the truncated
+ * object name is somewhat consistent in this case. But if the map
+ * name is '.kconfig', we'll still have entirety of '.kconfig' added
+ * (8 chars) and thus will be left with only first 7 characters of the
+ * object name ('my_obje'). Happy guessing, user, that the final map
+ * name will be "my_obje.kconfig".
+ * Now, with libbpf starting to support arbitrarily named .rodata.*
+ * and .data.* data sections, it's possible that ELF section name is
+ * longer than allowed 15 chars, so we now need to be careful to take
+ * only up to 15 first characters of ELF name, taking no BPF object
+ * name characters at all. So '.rodata.abracadabra' will result in
+ * '.rodata.abracad' kernel and user-visible name.
+ * We need to keep this convoluted logic intact for .data, .bss and
+ * .rodata maps, but for new custom .data.custom and .rodata.custom
+ * maps we use their ELF names as is, not prepending bpf_object name
+ * in front. We still need to truncate them to 15 characters for the
+ * kernel. Full name can be recovered for such maps by using DATASEC
+ * BTF type associated with such map's value type, though.
+ */
+ if (sfx_len >= BPF_OBJ_NAME_LEN)
+ sfx_len = BPF_OBJ_NAME_LEN - 1;
+
+ /* if there are two or more dots in map name, it's a custom dot map */
+ if (strchr(real_name + 1, '.') != NULL)
+ pfx_len = 0;
+ else
+ pfx_len = min((size_t)BPF_OBJ_NAME_LEN - sfx_len - 1, strlen(obj->name));
+
+ snprintf(map_name, sizeof(map_name), "%.*s%.*s", pfx_len, obj->name,
+ sfx_len, real_name);
+
+ /* sanitise map name to characters allowed by kernel */
+ for (p = map_name; *p && p < map_name + sizeof(map_name); p++)
+ if (!isalnum(*p) && *p != '_' && *p != '.')
+ *p = '_';
+
+ return strdup(map_name);
+}
+
+static int
+map_fill_btf_type_info(struct bpf_object *obj, struct bpf_map *map);
+
+/* Internal BPF map is mmap()'able only if at least one of corresponding
+ * DATASEC's VARs are to be exposed through BPF skeleton. I.e., it's a GLOBAL
+ * variable and it's not marked as __hidden (which turns it into, effectively,
+ * a STATIC variable).
+ */
+static bool map_is_mmapable(struct bpf_object *obj, struct bpf_map *map)
+{
+ const struct btf_type *t, *vt;
+ struct btf_var_secinfo *vsi;
+ int i, n;
+
+ if (!map->btf_value_type_id)
+ return false;
+
+ t = btf__type_by_id(obj->btf, map->btf_value_type_id);
+ if (!btf_is_datasec(t))
+ return false;
+
+ vsi = btf_var_secinfos(t);
+ for (i = 0, n = btf_vlen(t); i < n; i++, vsi++) {
+ vt = btf__type_by_id(obj->btf, vsi->type);
+ if (!btf_is_var(vt))
+ continue;
+
+ if (btf_var(vt)->linkage != BTF_VAR_STATIC)
+ return true;
+ }
+
+ return false;
+}
+
+static int
+bpf_object__init_internal_map(struct bpf_object *obj, enum libbpf_map_type type,
+ const char *real_name, int sec_idx, void *data, size_t data_sz)
+{
+ struct bpf_map_def *def;
+ struct bpf_map *map;
+ int err;
+
+ map = bpf_object__add_map(obj);
+ if (IS_ERR(map))
+ return PTR_ERR(map);
+
+ map->libbpf_type = type;
+ map->sec_idx = sec_idx;
+ map->sec_offset = 0;
+ map->real_name = strdup(real_name);
+ map->name = internal_map_name(obj, real_name);
+ if (!map->real_name || !map->name) {
+ zfree(&map->real_name);
+ zfree(&map->name);
+ return -ENOMEM;
+ }
+
+ def = &map->def;
+ def->type = BPF_MAP_TYPE_ARRAY;
+ def->key_size = sizeof(int);
+ def->value_size = data_sz;
+ def->max_entries = 1;
+ def->map_flags = type == LIBBPF_MAP_RODATA || type == LIBBPF_MAP_KCONFIG
+ ? BPF_F_RDONLY_PROG : 0;
+
+ /* failures are fine because of maps like .rodata.str1.1 */
+ (void) map_fill_btf_type_info(obj, map);
+
+ if (map_is_mmapable(obj, map))
+ def->map_flags |= BPF_F_MMAPABLE;
+
+ pr_debug("map '%s' (global data): at sec_idx %d, offset %zu, flags %x.\n",
+ map->name, map->sec_idx, map->sec_offset, def->map_flags);
+
+ map->mmaped = mmap(NULL, bpf_map_mmap_sz(map), PROT_READ | PROT_WRITE,
+ MAP_SHARED | MAP_ANONYMOUS, -1, 0);
+ if (map->mmaped == MAP_FAILED) {
+ err = -errno;
+ map->mmaped = NULL;
+ pr_warn("failed to alloc map '%s' content buffer: %d\n",
+ map->name, err);
+ zfree(&map->real_name);
+ zfree(&map->name);
+ return err;
+ }
+
+ if (data)
+ memcpy(map->mmaped, data, data_sz);
+
+ pr_debug("map %td is \"%s\"\n", map - obj->maps, map->name);
+ return 0;
+}
+
+static int bpf_object__init_global_data_maps(struct bpf_object *obj)
+{
+ struct elf_sec_desc *sec_desc;
+ const char *sec_name;
+ int err = 0, sec_idx;
+
+ /*
+ * Populate obj->maps with libbpf internal maps.
+ */
+ for (sec_idx = 1; sec_idx < obj->efile.sec_cnt; sec_idx++) {
+ sec_desc = &obj->efile.secs[sec_idx];
+
+ /* Skip recognized sections with size 0. */
+ if (!sec_desc->data || sec_desc->data->d_size == 0)
+ continue;
+
+ switch (sec_desc->sec_type) {
+ case SEC_DATA:
+ sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx));
+ err = bpf_object__init_internal_map(obj, LIBBPF_MAP_DATA,
+ sec_name, sec_idx,
+ sec_desc->data->d_buf,
+ sec_desc->data->d_size);
+ break;
+ case SEC_RODATA:
+ obj->has_rodata = true;
+ sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx));
+ err = bpf_object__init_internal_map(obj, LIBBPF_MAP_RODATA,
+ sec_name, sec_idx,
+ sec_desc->data->d_buf,
+ sec_desc->data->d_size);
+ break;
+ case SEC_BSS:
+ sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx));
+ err = bpf_object__init_internal_map(obj, LIBBPF_MAP_BSS,
+ sec_name, sec_idx,
+ NULL,
+ sec_desc->data->d_size);
+ break;
+ default:
+ /* skip */
+ break;
+ }
+ if (err)
+ return err;
+ }
+ return 0;
+}
+
+
+static struct extern_desc *find_extern_by_name(const struct bpf_object *obj,
+ const void *name)
+{
+ int i;
+
+ for (i = 0; i < obj->nr_extern; i++) {
+ if (strcmp(obj->externs[i].name, name) == 0)
+ return &obj->externs[i];
+ }
+ return NULL;
+}
+
+static int set_kcfg_value_tri(struct extern_desc *ext, void *ext_val,
+ char value)
+{
+ switch (ext->kcfg.type) {
+ case KCFG_BOOL:
+ if (value == 'm') {
+ pr_warn("extern (kcfg) '%s': value '%c' implies tristate or char type\n",
+ ext->name, value);
+ return -EINVAL;
+ }
+ *(bool *)ext_val = value == 'y' ? true : false;
+ break;
+ case KCFG_TRISTATE:
+ if (value == 'y')
+ *(enum libbpf_tristate *)ext_val = TRI_YES;
+ else if (value == 'm')
+ *(enum libbpf_tristate *)ext_val = TRI_MODULE;
+ else /* value == 'n' */
+ *(enum libbpf_tristate *)ext_val = TRI_NO;
+ break;
+ case KCFG_CHAR:
+ *(char *)ext_val = value;
+ break;
+ case KCFG_UNKNOWN:
+ case KCFG_INT:
+ case KCFG_CHAR_ARR:
+ default:
+ pr_warn("extern (kcfg) '%s': value '%c' implies bool, tristate, or char type\n",
+ ext->name, value);
+ return -EINVAL;
+ }
+ ext->is_set = true;
+ return 0;
+}
+
+static int set_kcfg_value_str(struct extern_desc *ext, char *ext_val,
+ const char *value)
+{
+ size_t len;
+
+ if (ext->kcfg.type != KCFG_CHAR_ARR) {
+ pr_warn("extern (kcfg) '%s': value '%s' implies char array type\n",
+ ext->name, value);
+ return -EINVAL;
+ }
+
+ len = strlen(value);
+ if (value[len - 1] != '"') {
+ pr_warn("extern (kcfg) '%s': invalid string config '%s'\n",
+ ext->name, value);
+ return -EINVAL;
+ }
+
+ /* strip quotes */
+ len -= 2;
+ if (len >= ext->kcfg.sz) {
+ pr_warn("extern (kcfg) '%s': long string '%s' of (%zu bytes) truncated to %d bytes\n",
+ ext->name, value, len, ext->kcfg.sz - 1);
+ len = ext->kcfg.sz - 1;
+ }
+ memcpy(ext_val, value + 1, len);
+ ext_val[len] = '\0';
+ ext->is_set = true;
+ return 0;
+}
+
+static int parse_u64(const char *value, __u64 *res)
+{
+ char *value_end;
+ int err;
+
+ errno = 0;
+ *res = strtoull(value, &value_end, 0);
+ if (errno) {
+ err = -errno;
+ pr_warn("failed to parse '%s' as integer: %d\n", value, err);
+ return err;
+ }
+ if (*value_end) {
+ pr_warn("failed to parse '%s' as integer completely\n", value);
+ return -EINVAL;
+ }
+ return 0;
+}
+
+static bool is_kcfg_value_in_range(const struct extern_desc *ext, __u64 v)
+{
+ int bit_sz = ext->kcfg.sz * 8;
+
+ if (ext->kcfg.sz == 8)
+ return true;
+
+ /* Validate that value stored in u64 fits in integer of `ext->sz`
+ * bytes size without any loss of information. If the target integer
+ * is signed, we rely on the following limits of integer type of
+ * Y bits and subsequent transformation:
+ *
+ * -2^(Y-1) <= X <= 2^(Y-1) - 1
+ * 0 <= X + 2^(Y-1) <= 2^Y - 1
+ * 0 <= X + 2^(Y-1) < 2^Y
+ *
+ * For unsigned target integer, check that all the (64 - Y) bits are
+ * zero.
+ */
+ if (ext->kcfg.is_signed)
+ return v + (1ULL << (bit_sz - 1)) < (1ULL << bit_sz);
+ else
+ return (v >> bit_sz) == 0;
+}
+
+static int set_kcfg_value_num(struct extern_desc *ext, void *ext_val,
+ __u64 value)
+{
+ if (ext->kcfg.type != KCFG_INT && ext->kcfg.type != KCFG_CHAR &&
+ ext->kcfg.type != KCFG_BOOL) {
+ pr_warn("extern (kcfg) '%s': value '%llu' implies integer, char, or boolean type\n",
+ ext->name, (unsigned long long)value);
+ return -EINVAL;
+ }
+ if (ext->kcfg.type == KCFG_BOOL && value > 1) {
+ pr_warn("extern (kcfg) '%s': value '%llu' isn't boolean compatible\n",
+ ext->name, (unsigned long long)value);
+ return -EINVAL;
+
+ }
+ if (!is_kcfg_value_in_range(ext, value)) {
+ pr_warn("extern (kcfg) '%s': value '%llu' doesn't fit in %d bytes\n",
+ ext->name, (unsigned long long)value, ext->kcfg.sz);
+ return -ERANGE;
+ }
+ switch (ext->kcfg.sz) {
+ case 1:
+ *(__u8 *)ext_val = value;
+ break;
+ case 2:
+ *(__u16 *)ext_val = value;
+ break;
+ case 4:
+ *(__u32 *)ext_val = value;
+ break;
+ case 8:
+ *(__u64 *)ext_val = value;
+ break;
+ default:
+ return -EINVAL;
+ }
+ ext->is_set = true;
+ return 0;
+}
+
+static int bpf_object__process_kconfig_line(struct bpf_object *obj,
+ char *buf, void *data)
+{
+ struct extern_desc *ext;
+ char *sep, *value;
+ int len, err = 0;
+ void *ext_val;
+ __u64 num;
+
+ if (!str_has_pfx(buf, "CONFIG_"))
+ return 0;
+
+ sep = strchr(buf, '=');
+ if (!sep) {
+ pr_warn("failed to parse '%s': no separator\n", buf);
+ return -EINVAL;
+ }
+
+ /* Trim ending '\n' */
+ len = strlen(buf);
+ if (buf[len - 1] == '\n')
+ buf[len - 1] = '\0';
+ /* Split on '=' and ensure that a value is present. */
+ *sep = '\0';
+ if (!sep[1]) {
+ *sep = '=';
+ pr_warn("failed to parse '%s': no value\n", buf);
+ return -EINVAL;
+ }
+
+ ext = find_extern_by_name(obj, buf);
+ if (!ext || ext->is_set)
+ return 0;
+
+ ext_val = data + ext->kcfg.data_off;
+ value = sep + 1;
+
+ switch (*value) {
+ case 'y': case 'n': case 'm':
+ err = set_kcfg_value_tri(ext, ext_val, *value);
+ break;
+ case '"':
+ err = set_kcfg_value_str(ext, ext_val, value);
+ break;
+ default:
+ /* assume integer */
+ err = parse_u64(value, &num);
+ if (err) {
+ pr_warn("extern (kcfg) '%s': value '%s' isn't a valid integer\n", ext->name, value);
+ return err;
+ }
+ if (ext->kcfg.type != KCFG_INT && ext->kcfg.type != KCFG_CHAR) {
+ pr_warn("extern (kcfg) '%s': value '%s' implies integer type\n", ext->name, value);
+ return -EINVAL;
+ }
+ err = set_kcfg_value_num(ext, ext_val, num);
+ break;
+ }
+ if (err)
+ return err;
+ pr_debug("extern (kcfg) '%s': set to %s\n", ext->name, value);
+ return 0;
+}
+
+static int bpf_object__read_kconfig_file(struct bpf_object *obj, void *data)
+{
+ char buf[PATH_MAX];
+ struct utsname uts;
+ int len, err = 0;
+ gzFile file;
+
+ uname(&uts);
+ len = snprintf(buf, PATH_MAX, "/boot/config-%s", uts.release);
+ if (len < 0)
+ return -EINVAL;
+ else if (len >= PATH_MAX)
+ return -ENAMETOOLONG;
+
+ /* gzopen also accepts uncompressed files. */
+ file = gzopen(buf, "r");
+ if (!file)
+ file = gzopen("/proc/config.gz", "r");
+
+ if (!file) {
+ pr_warn("failed to open system Kconfig\n");
+ return -ENOENT;
+ }
+
+ while (gzgets(file, buf, sizeof(buf))) {
+ err = bpf_object__process_kconfig_line(obj, buf, data);
+ if (err) {
+ pr_warn("error parsing system Kconfig line '%s': %d\n",
+ buf, err);
+ goto out;
+ }
+ }
+
+out:
+ gzclose(file);
+ return err;
+}
+
+static int bpf_object__read_kconfig_mem(struct bpf_object *obj,
+ const char *config, void *data)
+{
+ char buf[PATH_MAX];
+ int err = 0;
+ FILE *file;
+
+ file = fmemopen((void *)config, strlen(config), "r");
+ if (!file) {
+ err = -errno;
+ pr_warn("failed to open in-memory Kconfig: %d\n", err);
+ return err;
+ }
+
+ while (fgets(buf, sizeof(buf), file)) {
+ err = bpf_object__process_kconfig_line(obj, buf, data);
+ if (err) {
+ pr_warn("error parsing in-memory Kconfig line '%s': %d\n",
+ buf, err);
+ break;
+ }
+ }
+
+ fclose(file);
+ return err;
+}
+
+static int bpf_object__init_kconfig_map(struct bpf_object *obj)
+{
+ struct extern_desc *last_ext = NULL, *ext;
+ size_t map_sz;
+ int i, err;
+
+ for (i = 0; i < obj->nr_extern; i++) {
+ ext = &obj->externs[i];
+ if (ext->type == EXT_KCFG)
+ last_ext = ext;
+ }
+
+ if (!last_ext)
+ return 0;
+
+ map_sz = last_ext->kcfg.data_off + last_ext->kcfg.sz;
+ err = bpf_object__init_internal_map(obj, LIBBPF_MAP_KCONFIG,
+ ".kconfig", obj->efile.symbols_shndx,
+ NULL, map_sz);
+ if (err)
+ return err;
+
+ obj->kconfig_map_idx = obj->nr_maps - 1;
+
+ return 0;
+}
+
+const struct btf_type *
+skip_mods_and_typedefs(const struct btf *btf, __u32 id, __u32 *res_id)
+{
+ const struct btf_type *t = btf__type_by_id(btf, id);
+
+ if (res_id)
+ *res_id = id;
+
+ while (btf_is_mod(t) || btf_is_typedef(t)) {
+ if (res_id)
+ *res_id = t->type;
+ t = btf__type_by_id(btf, t->type);
+ }
+
+ return t;
+}
+
+static const struct btf_type *
+resolve_func_ptr(const struct btf *btf, __u32 id, __u32 *res_id)
+{
+ const struct btf_type *t;
+
+ t = skip_mods_and_typedefs(btf, id, NULL);
+ if (!btf_is_ptr(t))
+ return NULL;
+
+ t = skip_mods_and_typedefs(btf, t->type, res_id);
+
+ return btf_is_func_proto(t) ? t : NULL;
+}
+
+static const char *__btf_kind_str(__u16 kind)
+{
+ switch (kind) {
+ case BTF_KIND_UNKN: return "void";
+ case BTF_KIND_INT: return "int";
+ case BTF_KIND_PTR: return "ptr";
+ case BTF_KIND_ARRAY: return "array";
+ case BTF_KIND_STRUCT: return "struct";
+ case BTF_KIND_UNION: return "union";
+ case BTF_KIND_ENUM: return "enum";
+ case BTF_KIND_FWD: return "fwd";
+ case BTF_KIND_TYPEDEF: return "typedef";
+ case BTF_KIND_VOLATILE: return "volatile";
+ case BTF_KIND_CONST: return "const";
+ case BTF_KIND_RESTRICT: return "restrict";
+ case BTF_KIND_FUNC: return "func";
+ case BTF_KIND_FUNC_PROTO: return "func_proto";
+ case BTF_KIND_VAR: return "var";
+ case BTF_KIND_DATASEC: return "datasec";
+ case BTF_KIND_FLOAT: return "float";
+ case BTF_KIND_DECL_TAG: return "decl_tag";
+ case BTF_KIND_TYPE_TAG: return "type_tag";
+ case BTF_KIND_ENUM64: return "enum64";
+ default: return "unknown";
+ }
+}
+
+const char *btf_kind_str(const struct btf_type *t)
+{
+ return __btf_kind_str(btf_kind(t));
+}
+
+/*
+ * Fetch integer attribute of BTF map definition. Such attributes are
+ * represented using a pointer to an array, in which dimensionality of array
+ * encodes specified integer value. E.g., int (*type)[BPF_MAP_TYPE_ARRAY];
+ * encodes `type => BPF_MAP_TYPE_ARRAY` key/value pair completely using BTF
+ * type definition, while using only sizeof(void *) space in ELF data section.
+ */
+static bool get_map_field_int(const char *map_name, const struct btf *btf,
+ const struct btf_member *m, __u32 *res)
+{
+ const struct btf_type *t = skip_mods_and_typedefs(btf, m->type, NULL);
+ const char *name = btf__name_by_offset(btf, m->name_off);
+ const struct btf_array *arr_info;
+ const struct btf_type *arr_t;
+
+ if (!btf_is_ptr(t)) {
+ pr_warn("map '%s': attr '%s': expected PTR, got %s.\n",
+ map_name, name, btf_kind_str(t));
+ return false;
+ }
+
+ arr_t = btf__type_by_id(btf, t->type);
+ if (!arr_t) {
+ pr_warn("map '%s': attr '%s': type [%u] not found.\n",
+ map_name, name, t->type);
+ return false;
+ }
+ if (!btf_is_array(arr_t)) {
+ pr_warn("map '%s': attr '%s': expected ARRAY, got %s.\n",
+ map_name, name, btf_kind_str(arr_t));
+ return false;
+ }
+ arr_info = btf_array(arr_t);
+ *res = arr_info->nelems;
+ return true;
+}
+
+static int pathname_concat(char *buf, size_t buf_sz, const char *path, const char *name)
+{
+ int len;
+
+ len = snprintf(buf, buf_sz, "%s/%s", path, name);
+ if (len < 0)
+ return -EINVAL;
+ if (len >= buf_sz)
+ return -ENAMETOOLONG;
+
+ return 0;
+}
+
+static int build_map_pin_path(struct bpf_map *map, const char *path)
+{
+ char buf[PATH_MAX];
+ int err;
+
+ if (!path)
+ path = "/sys/fs/bpf";
+
+ err = pathname_concat(buf, sizeof(buf), path, bpf_map__name(map));
+ if (err)
+ return err;
+
+ return bpf_map__set_pin_path(map, buf);
+}
+
+/* should match definition in bpf_helpers.h */
+enum libbpf_pin_type {
+ LIBBPF_PIN_NONE,
+ /* PIN_BY_NAME: pin maps by name (in /sys/fs/bpf by default) */
+ LIBBPF_PIN_BY_NAME,
+};
+
+int parse_btf_map_def(const char *map_name, struct btf *btf,
+ const struct btf_type *def_t, bool strict,
+ struct btf_map_def *map_def, struct btf_map_def *inner_def)
+{
+ const struct btf_type *t;
+ const struct btf_member *m;
+ bool is_inner = inner_def == NULL;
+ int vlen, i;
+
+ vlen = btf_vlen(def_t);
+ m = btf_members(def_t);
+ for (i = 0; i < vlen; i++, m++) {
+ const char *name = btf__name_by_offset(btf, m->name_off);
+
+ if (!name) {
+ pr_warn("map '%s': invalid field #%d.\n", map_name, i);
+ return -EINVAL;
+ }
+ if (strcmp(name, "type") == 0) {
+ if (!get_map_field_int(map_name, btf, m, &map_def->map_type))
+ return -EINVAL;
+ map_def->parts |= MAP_DEF_MAP_TYPE;
+ } else if (strcmp(name, "max_entries") == 0) {
+ if (!get_map_field_int(map_name, btf, m, &map_def->max_entries))
+ return -EINVAL;
+ map_def->parts |= MAP_DEF_MAX_ENTRIES;
+ } else if (strcmp(name, "map_flags") == 0) {
+ if (!get_map_field_int(map_name, btf, m, &map_def->map_flags))
+ return -EINVAL;
+ map_def->parts |= MAP_DEF_MAP_FLAGS;
+ } else if (strcmp(name, "numa_node") == 0) {
+ if (!get_map_field_int(map_name, btf, m, &map_def->numa_node))
+ return -EINVAL;
+ map_def->parts |= MAP_DEF_NUMA_NODE;
+ } else if (strcmp(name, "key_size") == 0) {
+ __u32 sz;
+
+ if (!get_map_field_int(map_name, btf, m, &sz))
+ return -EINVAL;
+ if (map_def->key_size && map_def->key_size != sz) {
+ pr_warn("map '%s': conflicting key size %u != %u.\n",
+ map_name, map_def->key_size, sz);
+ return -EINVAL;
+ }
+ map_def->key_size = sz;
+ map_def->parts |= MAP_DEF_KEY_SIZE;
+ } else if (strcmp(name, "key") == 0) {
+ __s64 sz;
+
+ t = btf__type_by_id(btf, m->type);
+ if (!t) {
+ pr_warn("map '%s': key type [%d] not found.\n",
+ map_name, m->type);
+ return -EINVAL;
+ }
+ if (!btf_is_ptr(t)) {
+ pr_warn("map '%s': key spec is not PTR: %s.\n",
+ map_name, btf_kind_str(t));
+ return -EINVAL;
+ }
+ sz = btf__resolve_size(btf, t->type);
+ if (sz < 0) {
+ pr_warn("map '%s': can't determine key size for type [%u]: %zd.\n",
+ map_name, t->type, (ssize_t)sz);
+ return sz;
+ }
+ if (map_def->key_size && map_def->key_size != sz) {
+ pr_warn("map '%s': conflicting key size %u != %zd.\n",
+ map_name, map_def->key_size, (ssize_t)sz);
+ return -EINVAL;
+ }
+ map_def->key_size = sz;
+ map_def->key_type_id = t->type;
+ map_def->parts |= MAP_DEF_KEY_SIZE | MAP_DEF_KEY_TYPE;
+ } else if (strcmp(name, "value_size") == 0) {
+ __u32 sz;
+
+ if (!get_map_field_int(map_name, btf, m, &sz))
+ return -EINVAL;
+ if (map_def->value_size && map_def->value_size != sz) {
+ pr_warn("map '%s': conflicting value size %u != %u.\n",
+ map_name, map_def->value_size, sz);
+ return -EINVAL;
+ }
+ map_def->value_size = sz;
+ map_def->parts |= MAP_DEF_VALUE_SIZE;
+ } else if (strcmp(name, "value") == 0) {
+ __s64 sz;
+
+ t = btf__type_by_id(btf, m->type);
+ if (!t) {
+ pr_warn("map '%s': value type [%d] not found.\n",
+ map_name, m->type);
+ return -EINVAL;
+ }
+ if (!btf_is_ptr(t)) {
+ pr_warn("map '%s': value spec is not PTR: %s.\n",
+ map_name, btf_kind_str(t));
+ return -EINVAL;
+ }
+ sz = btf__resolve_size(btf, t->type);
+ if (sz < 0) {
+ pr_warn("map '%s': can't determine value size for type [%u]: %zd.\n",
+ map_name, t->type, (ssize_t)sz);
+ return sz;
+ }
+ if (map_def->value_size && map_def->value_size != sz) {
+ pr_warn("map '%s': conflicting value size %u != %zd.\n",
+ map_name, map_def->value_size, (ssize_t)sz);
+ return -EINVAL;
+ }
+ map_def->value_size = sz;
+ map_def->value_type_id = t->type;
+ map_def->parts |= MAP_DEF_VALUE_SIZE | MAP_DEF_VALUE_TYPE;
+ }
+ else if (strcmp(name, "values") == 0) {
+ bool is_map_in_map = bpf_map_type__is_map_in_map(map_def->map_type);
+ bool is_prog_array = map_def->map_type == BPF_MAP_TYPE_PROG_ARRAY;
+ const char *desc = is_map_in_map ? "map-in-map inner" : "prog-array value";
+ char inner_map_name[128];
+ int err;
+
+ if (is_inner) {
+ pr_warn("map '%s': multi-level inner maps not supported.\n",
+ map_name);
+ return -ENOTSUP;
+ }
+ if (i != vlen - 1) {
+ pr_warn("map '%s': '%s' member should be last.\n",
+ map_name, name);
+ return -EINVAL;
+ }
+ if (!is_map_in_map && !is_prog_array) {
+ pr_warn("map '%s': should be map-in-map or prog-array.\n",
+ map_name);
+ return -ENOTSUP;
+ }
+ if (map_def->value_size && map_def->value_size != 4) {
+ pr_warn("map '%s': conflicting value size %u != 4.\n",
+ map_name, map_def->value_size);
+ return -EINVAL;
+ }
+ map_def->value_size = 4;
+ t = btf__type_by_id(btf, m->type);
+ if (!t) {
+ pr_warn("map '%s': %s type [%d] not found.\n",
+ map_name, desc, m->type);
+ return -EINVAL;
+ }
+ if (!btf_is_array(t) || btf_array(t)->nelems) {
+ pr_warn("map '%s': %s spec is not a zero-sized array.\n",
+ map_name, desc);
+ return -EINVAL;
+ }
+ t = skip_mods_and_typedefs(btf, btf_array(t)->type, NULL);
+ if (!btf_is_ptr(t)) {
+ pr_warn("map '%s': %s def is of unexpected kind %s.\n",
+ map_name, desc, btf_kind_str(t));
+ return -EINVAL;
+ }
+ t = skip_mods_and_typedefs(btf, t->type, NULL);
+ if (is_prog_array) {
+ if (!btf_is_func_proto(t)) {
+ pr_warn("map '%s': prog-array value def is of unexpected kind %s.\n",
+ map_name, btf_kind_str(t));
+ return -EINVAL;
+ }
+ continue;
+ }
+ if (!btf_is_struct(t)) {
+ pr_warn("map '%s': map-in-map inner def is of unexpected kind %s.\n",
+ map_name, btf_kind_str(t));
+ return -EINVAL;
+ }
+
+ snprintf(inner_map_name, sizeof(inner_map_name), "%s.inner", map_name);
+ err = parse_btf_map_def(inner_map_name, btf, t, strict, inner_def, NULL);
+ if (err)
+ return err;
+
+ map_def->parts |= MAP_DEF_INNER_MAP;
+ } else if (strcmp(name, "pinning") == 0) {
+ __u32 val;
+
+ if (is_inner) {
+ pr_warn("map '%s': inner def can't be pinned.\n", map_name);
+ return -EINVAL;
+ }
+ if (!get_map_field_int(map_name, btf, m, &val))
+ return -EINVAL;
+ if (val != LIBBPF_PIN_NONE && val != LIBBPF_PIN_BY_NAME) {
+ pr_warn("map '%s': invalid pinning value %u.\n",
+ map_name, val);
+ return -EINVAL;
+ }
+ map_def->pinning = val;
+ map_def->parts |= MAP_DEF_PINNING;
+ } else if (strcmp(name, "map_extra") == 0) {
+ __u32 map_extra;
+
+ if (!get_map_field_int(map_name, btf, m, &map_extra))
+ return -EINVAL;
+ map_def->map_extra = map_extra;
+ map_def->parts |= MAP_DEF_MAP_EXTRA;
+ } else {
+ if (strict) {
+ pr_warn("map '%s': unknown field '%s'.\n", map_name, name);
+ return -ENOTSUP;
+ }
+ pr_debug("map '%s': ignoring unknown field '%s'.\n", map_name, name);
+ }
+ }
+
+ if (map_def->map_type == BPF_MAP_TYPE_UNSPEC) {
+ pr_warn("map '%s': map type isn't specified.\n", map_name);
+ return -EINVAL;
+ }
+
+ return 0;
+}
+
+static size_t adjust_ringbuf_sz(size_t sz)
+{
+ __u32 page_sz = sysconf(_SC_PAGE_SIZE);
+ __u32 mul;
+
+ /* if user forgot to set any size, make sure they see error */
+ if (sz == 0)
+ return 0;
+ /* Kernel expects BPF_MAP_TYPE_RINGBUF's max_entries to be
+ * a power-of-2 multiple of kernel's page size. If user diligently
+ * satisified these conditions, pass the size through.
+ */
+ if ((sz % page_sz) == 0 && is_pow_of_2(sz / page_sz))
+ return sz;
+
+ /* Otherwise find closest (page_sz * power_of_2) product bigger than
+ * user-set size to satisfy both user size request and kernel
+ * requirements and substitute correct max_entries for map creation.
+ */
+ for (mul = 1; mul <= UINT_MAX / page_sz; mul <<= 1) {
+ if (mul * page_sz > sz)
+ return mul * page_sz;
+ }
+
+ /* if it's impossible to satisfy the conditions (i.e., user size is
+ * very close to UINT_MAX but is not a power-of-2 multiple of
+ * page_size) then just return original size and let kernel reject it
+ */
+ return sz;
+}
+
+static bool map_is_ringbuf(const struct bpf_map *map)
+{
+ return map->def.type == BPF_MAP_TYPE_RINGBUF ||
+ map->def.type == BPF_MAP_TYPE_USER_RINGBUF;
+}
+
+static void fill_map_from_def(struct bpf_map *map, const struct btf_map_def *def)
+{
+ map->def.type = def->map_type;
+ map->def.key_size = def->key_size;
+ map->def.value_size = def->value_size;
+ map->def.max_entries = def->max_entries;
+ map->def.map_flags = def->map_flags;
+ map->map_extra = def->map_extra;
+
+ map->numa_node = def->numa_node;
+ map->btf_key_type_id = def->key_type_id;
+ map->btf_value_type_id = def->value_type_id;
+
+ /* auto-adjust BPF ringbuf map max_entries to be a multiple of page size */
+ if (map_is_ringbuf(map))
+ map->def.max_entries = adjust_ringbuf_sz(map->def.max_entries);
+
+ if (def->parts & MAP_DEF_MAP_TYPE)
+ pr_debug("map '%s': found type = %u.\n", map->name, def->map_type);
+
+ if (def->parts & MAP_DEF_KEY_TYPE)
+ pr_debug("map '%s': found key [%u], sz = %u.\n",
+ map->name, def->key_type_id, def->key_size);
+ else if (def->parts & MAP_DEF_KEY_SIZE)
+ pr_debug("map '%s': found key_size = %u.\n", map->name, def->key_size);
+
+ if (def->parts & MAP_DEF_VALUE_TYPE)
+ pr_debug("map '%s': found value [%u], sz = %u.\n",
+ map->name, def->value_type_id, def->value_size);
+ else if (def->parts & MAP_DEF_VALUE_SIZE)
+ pr_debug("map '%s': found value_size = %u.\n", map->name, def->value_size);
+
+ if (def->parts & MAP_DEF_MAX_ENTRIES)
+ pr_debug("map '%s': found max_entries = %u.\n", map->name, def->max_entries);
+ if (def->parts & MAP_DEF_MAP_FLAGS)
+ pr_debug("map '%s': found map_flags = 0x%x.\n", map->name, def->map_flags);
+ if (def->parts & MAP_DEF_MAP_EXTRA)
+ pr_debug("map '%s': found map_extra = 0x%llx.\n", map->name,
+ (unsigned long long)def->map_extra);
+ if (def->parts & MAP_DEF_PINNING)
+ pr_debug("map '%s': found pinning = %u.\n", map->name, def->pinning);
+ if (def->parts & MAP_DEF_NUMA_NODE)
+ pr_debug("map '%s': found numa_node = %u.\n", map->name, def->numa_node);
+
+ if (def->parts & MAP_DEF_INNER_MAP)
+ pr_debug("map '%s': found inner map definition.\n", map->name);
+}
+
+static const char *btf_var_linkage_str(__u32 linkage)
+{
+ switch (linkage) {
+ case BTF_VAR_STATIC: return "static";
+ case BTF_VAR_GLOBAL_ALLOCATED: return "global";
+ case BTF_VAR_GLOBAL_EXTERN: return "extern";
+ default: return "unknown";
+ }
+}
+
+static int bpf_object__init_user_btf_map(struct bpf_object *obj,
+ const struct btf_type *sec,
+ int var_idx, int sec_idx,
+ const Elf_Data *data, bool strict,
+ const char *pin_root_path)
+{
+ struct btf_map_def map_def = {}, inner_def = {};
+ const struct btf_type *var, *def;
+ const struct btf_var_secinfo *vi;
+ const struct btf_var *var_extra;
+ const char *map_name;
+ struct bpf_map *map;
+ int err;
+
+ vi = btf_var_secinfos(sec) + var_idx;
+ var = btf__type_by_id(obj->btf, vi->type);
+ var_extra = btf_var(var);
+ map_name = btf__name_by_offset(obj->btf, var->name_off);
+
+ if (map_name == NULL || map_name[0] == '\0') {
+ pr_warn("map #%d: empty name.\n", var_idx);
+ return -EINVAL;
+ }
+ if ((__u64)vi->offset + vi->size > data->d_size) {
+ pr_warn("map '%s' BTF data is corrupted.\n", map_name);
+ return -EINVAL;
+ }
+ if (!btf_is_var(var)) {
+ pr_warn("map '%s': unexpected var kind %s.\n",
+ map_name, btf_kind_str(var));
+ return -EINVAL;
+ }
+ if (var_extra->linkage != BTF_VAR_GLOBAL_ALLOCATED) {
+ pr_warn("map '%s': unsupported map linkage %s.\n",
+ map_name, btf_var_linkage_str(var_extra->linkage));
+ return -EOPNOTSUPP;
+ }
+
+ def = skip_mods_and_typedefs(obj->btf, var->type, NULL);
+ if (!btf_is_struct(def)) {
+ pr_warn("map '%s': unexpected def kind %s.\n",
+ map_name, btf_kind_str(var));
+ return -EINVAL;
+ }
+ if (def->size > vi->size) {
+ pr_warn("map '%s': invalid def size.\n", map_name);
+ return -EINVAL;
+ }
+
+ map = bpf_object__add_map(obj);
+ if (IS_ERR(map))
+ return PTR_ERR(map);
+ map->name = strdup(map_name);
+ if (!map->name) {
+ pr_warn("map '%s': failed to alloc map name.\n", map_name);
+ return -ENOMEM;
+ }
+ map->libbpf_type = LIBBPF_MAP_UNSPEC;
+ map->def.type = BPF_MAP_TYPE_UNSPEC;
+ map->sec_idx = sec_idx;
+ map->sec_offset = vi->offset;
+ map->btf_var_idx = var_idx;
+ pr_debug("map '%s': at sec_idx %d, offset %zu.\n",
+ map_name, map->sec_idx, map->sec_offset);
+
+ err = parse_btf_map_def(map->name, obj->btf, def, strict, &map_def, &inner_def);
+ if (err)
+ return err;
+
+ fill_map_from_def(map, &map_def);
+
+ if (map_def.pinning == LIBBPF_PIN_BY_NAME) {
+ err = build_map_pin_path(map, pin_root_path);
+ if (err) {
+ pr_warn("map '%s': couldn't build pin path.\n", map->name);
+ return err;
+ }
+ }
+
+ if (map_def.parts & MAP_DEF_INNER_MAP) {
+ map->inner_map = calloc(1, sizeof(*map->inner_map));
+ if (!map->inner_map)
+ return -ENOMEM;
+ map->inner_map->fd = -1;
+ map->inner_map->sec_idx = sec_idx;
+ map->inner_map->name = malloc(strlen(map_name) + sizeof(".inner") + 1);
+ if (!map->inner_map->name)
+ return -ENOMEM;
+ sprintf(map->inner_map->name, "%s.inner", map_name);
+
+ fill_map_from_def(map->inner_map, &inner_def);
+ }
+
+ err = map_fill_btf_type_info(obj, map);
+ if (err)
+ return err;
+
+ return 0;
+}
+
+static int bpf_object__init_user_btf_maps(struct bpf_object *obj, bool strict,
+ const char *pin_root_path)
+{
+ const struct btf_type *sec = NULL;
+ int nr_types, i, vlen, err;
+ const struct btf_type *t;
+ const char *name;
+ Elf_Data *data;
+ Elf_Scn *scn;
+
+ if (obj->efile.btf_maps_shndx < 0)
+ return 0;
+
+ scn = elf_sec_by_idx(obj, obj->efile.btf_maps_shndx);
+ data = elf_sec_data(obj, scn);
+ if (!scn || !data) {
+ pr_warn("elf: failed to get %s map definitions for %s\n",
+ MAPS_ELF_SEC, obj->path);
+ return -EINVAL;
+ }
+
+ nr_types = btf__type_cnt(obj->btf);
+ for (i = 1; i < nr_types; i++) {
+ t = btf__type_by_id(obj->btf, i);
+ if (!btf_is_datasec(t))
+ continue;
+ name = btf__name_by_offset(obj->btf, t->name_off);
+ if (strcmp(name, MAPS_ELF_SEC) == 0) {
+ sec = t;
+ obj->efile.btf_maps_sec_btf_id = i;
+ break;
+ }
+ }
+
+ if (!sec) {
+ pr_warn("DATASEC '%s' not found.\n", MAPS_ELF_SEC);
+ return -ENOENT;
+ }
+
+ vlen = btf_vlen(sec);
+ for (i = 0; i < vlen; i++) {
+ err = bpf_object__init_user_btf_map(obj, sec, i,
+ obj->efile.btf_maps_shndx,
+ data, strict,
+ pin_root_path);
+ if (err)
+ return err;
+ }
+
+ return 0;
+}
+
+static int bpf_object__init_maps(struct bpf_object *obj,
+ const struct bpf_object_open_opts *opts)
+{
+ const char *pin_root_path;
+ bool strict;
+ int err = 0;
+
+ strict = !OPTS_GET(opts, relaxed_maps, false);
+ pin_root_path = OPTS_GET(opts, pin_root_path, NULL);
+
+ err = err ?: bpf_object__init_user_btf_maps(obj, strict, pin_root_path);
+ err = err ?: bpf_object__init_global_data_maps(obj);
+ err = err ?: bpf_object__init_kconfig_map(obj);
+ err = err ?: bpf_object__init_struct_ops_maps(obj);
+
+ return err;
+}
+
+static bool section_have_execinstr(struct bpf_object *obj, int idx)
+{
+ Elf64_Shdr *sh;
+
+ sh = elf_sec_hdr(obj, elf_sec_by_idx(obj, idx));
+ if (!sh)
+ return false;
+
+ return sh->sh_flags & SHF_EXECINSTR;
+}
+
+static bool btf_needs_sanitization(struct bpf_object *obj)
+{
+ bool has_func_global = kernel_supports(obj, FEAT_BTF_GLOBAL_FUNC);
+ bool has_datasec = kernel_supports(obj, FEAT_BTF_DATASEC);
+ bool has_float = kernel_supports(obj, FEAT_BTF_FLOAT);
+ bool has_func = kernel_supports(obj, FEAT_BTF_FUNC);
+ bool has_decl_tag = kernel_supports(obj, FEAT_BTF_DECL_TAG);
+ bool has_type_tag = kernel_supports(obj, FEAT_BTF_TYPE_TAG);
+ bool has_enum64 = kernel_supports(obj, FEAT_BTF_ENUM64);
+
+ return !has_func || !has_datasec || !has_func_global || !has_float ||
+ !has_decl_tag || !has_type_tag || !has_enum64;
+}
+
+static int bpf_object__sanitize_btf(struct bpf_object *obj, struct btf *btf)
+{
+ bool has_func_global = kernel_supports(obj, FEAT_BTF_GLOBAL_FUNC);
+ bool has_datasec = kernel_supports(obj, FEAT_BTF_DATASEC);
+ bool has_float = kernel_supports(obj, FEAT_BTF_FLOAT);
+ bool has_func = kernel_supports(obj, FEAT_BTF_FUNC);
+ bool has_decl_tag = kernel_supports(obj, FEAT_BTF_DECL_TAG);
+ bool has_type_tag = kernel_supports(obj, FEAT_BTF_TYPE_TAG);
+ bool has_enum64 = kernel_supports(obj, FEAT_BTF_ENUM64);
+ int enum64_placeholder_id = 0;
+ struct btf_type *t;
+ int i, j, vlen;
+
+ for (i = 1; i < btf__type_cnt(btf); i++) {
+ t = (struct btf_type *)btf__type_by_id(btf, i);
+
+ if ((!has_datasec && btf_is_var(t)) || (!has_decl_tag && btf_is_decl_tag(t))) {
+ /* replace VAR/DECL_TAG with INT */
+ t->info = BTF_INFO_ENC(BTF_KIND_INT, 0, 0);
+ /*
+ * using size = 1 is the safest choice, 4 will be too
+ * big and cause kernel BTF validation failure if
+ * original variable took less than 4 bytes
+ */
+ t->size = 1;
+ *(int *)(t + 1) = BTF_INT_ENC(0, 0, 8);
+ } else if (!has_datasec && btf_is_datasec(t)) {
+ /* replace DATASEC with STRUCT */
+ const struct btf_var_secinfo *v = btf_var_secinfos(t);
+ struct btf_member *m = btf_members(t);
+ struct btf_type *vt;
+ char *name;
+
+ name = (char *)btf__name_by_offset(btf, t->name_off);
+ while (*name) {
+ if (*name == '.')
+ *name = '_';
+ name++;
+ }
+
+ vlen = btf_vlen(t);
+ t->info = BTF_INFO_ENC(BTF_KIND_STRUCT, 0, vlen);
+ for (j = 0; j < vlen; j++, v++, m++) {
+ /* order of field assignments is important */
+ m->offset = v->offset * 8;
+ m->type = v->type;
+ /* preserve variable name as member name */
+ vt = (void *)btf__type_by_id(btf, v->type);
+ m->name_off = vt->name_off;
+ }
+ } else if (!has_func && btf_is_func_proto(t)) {
+ /* replace FUNC_PROTO with ENUM */
+ vlen = btf_vlen(t);
+ t->info = BTF_INFO_ENC(BTF_KIND_ENUM, 0, vlen);
+ t->size = sizeof(__u32); /* kernel enforced */
+ } else if (!has_func && btf_is_func(t)) {
+ /* replace FUNC with TYPEDEF */
+ t->info = BTF_INFO_ENC(BTF_KIND_TYPEDEF, 0, 0);
+ } else if (!has_func_global && btf_is_func(t)) {
+ /* replace BTF_FUNC_GLOBAL with BTF_FUNC_STATIC */
+ t->info = BTF_INFO_ENC(BTF_KIND_FUNC, 0, 0);
+ } else if (!has_float && btf_is_float(t)) {
+ /* replace FLOAT with an equally-sized empty STRUCT;
+ * since C compilers do not accept e.g. "float" as a
+ * valid struct name, make it anonymous
+ */
+ t->name_off = 0;
+ t->info = BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 0);
+ } else if (!has_type_tag && btf_is_type_tag(t)) {
+ /* replace TYPE_TAG with a CONST */
+ t->name_off = 0;
+ t->info = BTF_INFO_ENC(BTF_KIND_CONST, 0, 0);
+ } else if (!has_enum64 && btf_is_enum(t)) {
+ /* clear the kflag */
+ t->info = btf_type_info(btf_kind(t), btf_vlen(t), false);
+ } else if (!has_enum64 && btf_is_enum64(t)) {
+ /* replace ENUM64 with a union */
+ struct btf_member *m;
+
+ if (enum64_placeholder_id == 0) {
+ enum64_placeholder_id = btf__add_int(btf, "enum64_placeholder", 1, 0);
+ if (enum64_placeholder_id < 0)
+ return enum64_placeholder_id;
+
+ t = (struct btf_type *)btf__type_by_id(btf, i);
+ }
+
+ m = btf_members(t);
+ vlen = btf_vlen(t);
+ t->info = BTF_INFO_ENC(BTF_KIND_UNION, 0, vlen);
+ for (j = 0; j < vlen; j++, m++) {
+ m->type = enum64_placeholder_id;
+ m->offset = 0;
+ }
+ }
+ }
+
+ return 0;
+}
+
+static bool libbpf_needs_btf(const struct bpf_object *obj)
+{
+ return obj->efile.btf_maps_shndx >= 0 ||
+ obj->efile.st_ops_shndx >= 0 ||
+ obj->nr_extern > 0;
+}
+
+static bool kernel_needs_btf(const struct bpf_object *obj)
+{
+ return obj->efile.st_ops_shndx >= 0;
+}
+
+static int bpf_object__init_btf(struct bpf_object *obj,
+ Elf_Data *btf_data,
+ Elf_Data *btf_ext_data)
+{
+ int err = -ENOENT;
+
+ if (btf_data) {
+ obj->btf = btf__new(btf_data->d_buf, btf_data->d_size);
+ err = libbpf_get_error(obj->btf);
+ if (err) {
+ obj->btf = NULL;
+ pr_warn("Error loading ELF section %s: %d.\n", BTF_ELF_SEC, err);
+ goto out;
+ }
+ /* enforce 8-byte pointers for BPF-targeted BTFs */
+ btf__set_pointer_size(obj->btf, 8);
+ }
+ if (btf_ext_data) {
+ struct btf_ext_info *ext_segs[3];
+ int seg_num, sec_num;
+
+ if (!obj->btf) {
+ pr_debug("Ignore ELF section %s because its depending ELF section %s is not found.\n",
+ BTF_EXT_ELF_SEC, BTF_ELF_SEC);
+ goto out;
+ }
+ obj->btf_ext = btf_ext__new(btf_ext_data->d_buf, btf_ext_data->d_size);
+ err = libbpf_get_error(obj->btf_ext);
+ if (err) {
+ pr_warn("Error loading ELF section %s: %d. Ignored and continue.\n",
+ BTF_EXT_ELF_SEC, err);
+ obj->btf_ext = NULL;
+ goto out;
+ }
+
+ /* setup .BTF.ext to ELF section mapping */
+ ext_segs[0] = &obj->btf_ext->func_info;
+ ext_segs[1] = &obj->btf_ext->line_info;
+ ext_segs[2] = &obj->btf_ext->core_relo_info;
+ for (seg_num = 0; seg_num < ARRAY_SIZE(ext_segs); seg_num++) {
+ struct btf_ext_info *seg = ext_segs[seg_num];
+ const struct btf_ext_info_sec *sec;
+ const char *sec_name;
+ Elf_Scn *scn;
+
+ if (seg->sec_cnt == 0)
+ continue;
+
+ seg->sec_idxs = calloc(seg->sec_cnt, sizeof(*seg->sec_idxs));
+ if (!seg->sec_idxs) {
+ err = -ENOMEM;
+ goto out;
+ }
+
+ sec_num = 0;
+ for_each_btf_ext_sec(seg, sec) {
+ /* preventively increment index to avoid doing
+ * this before every continue below
+ */
+ sec_num++;
+
+ sec_name = btf__name_by_offset(obj->btf, sec->sec_name_off);
+ if (str_is_empty(sec_name))
+ continue;
+ scn = elf_sec_by_name(obj, sec_name);
+ if (!scn)
+ continue;
+
+ seg->sec_idxs[sec_num - 1] = elf_ndxscn(scn);
+ }
+ }
+ }
+out:
+ if (err && libbpf_needs_btf(obj)) {
+ pr_warn("BTF is required, but is missing or corrupted.\n");
+ return err;
+ }
+ return 0;
+}
+
+static int compare_vsi_off(const void *_a, const void *_b)
+{
+ const struct btf_var_secinfo *a = _a;
+ const struct btf_var_secinfo *b = _b;
+
+ return a->offset - b->offset;
+}
+
+static int btf_fixup_datasec(struct bpf_object *obj, struct btf *btf,
+ struct btf_type *t)
+{
+ __u32 size = 0, i, vars = btf_vlen(t);
+ const char *sec_name = btf__name_by_offset(btf, t->name_off);
+ struct btf_var_secinfo *vsi;
+ bool fixup_offsets = false;
+ int err;
+
+ if (!sec_name) {
+ pr_debug("No name found in string section for DATASEC kind.\n");
+ return -ENOENT;
+ }
+
+ /* Extern-backing datasecs (.ksyms, .kconfig) have their size and
+ * variable offsets set at the previous step. Further, not every
+ * extern BTF VAR has corresponding ELF symbol preserved, so we skip
+ * all fixups altogether for such sections and go straight to sorting
+ * VARs within their DATASEC.
+ */
+ if (strcmp(sec_name, KCONFIG_SEC) == 0 || strcmp(sec_name, KSYMS_SEC) == 0)
+ goto sort_vars;
+
+ /* Clang leaves DATASEC size and VAR offsets as zeroes, so we need to
+ * fix this up. But BPF static linker already fixes this up and fills
+ * all the sizes and offsets during static linking. So this step has
+ * to be optional. But the STV_HIDDEN handling is non-optional for any
+ * non-extern DATASEC, so the variable fixup loop below handles both
+ * functions at the same time, paying the cost of BTF VAR <-> ELF
+ * symbol matching just once.
+ */
+ if (t->size == 0) {
+ err = find_elf_sec_sz(obj, sec_name, &size);
+ if (err || !size) {
+ pr_debug("sec '%s': failed to determine size from ELF: size %u, err %d\n",
+ sec_name, size, err);
+ return -ENOENT;
+ }
+
+ t->size = size;
+ fixup_offsets = true;
+ }
+
+ for (i = 0, vsi = btf_var_secinfos(t); i < vars; i++, vsi++) {
+ const struct btf_type *t_var;
+ struct btf_var *var;
+ const char *var_name;
+ Elf64_Sym *sym;
+
+ t_var = btf__type_by_id(btf, vsi->type);
+ if (!t_var || !btf_is_var(t_var)) {
+ pr_debug("sec '%s': unexpected non-VAR type found\n", sec_name);
+ return -EINVAL;
+ }
+
+ var = btf_var(t_var);
+ if (var->linkage == BTF_VAR_STATIC || var->linkage == BTF_VAR_GLOBAL_EXTERN)
+ continue;
+
+ var_name = btf__name_by_offset(btf, t_var->name_off);
+ if (!var_name) {
+ pr_debug("sec '%s': failed to find name of DATASEC's member #%d\n",
+ sec_name, i);
+ return -ENOENT;
+ }
+
+ sym = find_elf_var_sym(obj, var_name);
+ if (IS_ERR(sym)) {
+ pr_debug("sec '%s': failed to find ELF symbol for VAR '%s'\n",
+ sec_name, var_name);
+ return -ENOENT;
+ }
+
+ if (fixup_offsets)
+ vsi->offset = sym->st_value;
+
+ /* if variable is a global/weak symbol, but has restricted
+ * (STV_HIDDEN or STV_INTERNAL) visibility, mark its BTF VAR
+ * as static. This follows similar logic for functions (BPF
+ * subprogs) and influences libbpf's further decisions about
+ * whether to make global data BPF array maps as
+ * BPF_F_MMAPABLE.
+ */
+ if (ELF64_ST_VISIBILITY(sym->st_other) == STV_HIDDEN
+ || ELF64_ST_VISIBILITY(sym->st_other) == STV_INTERNAL)
+ var->linkage = BTF_VAR_STATIC;
+ }
+
+sort_vars:
+ qsort(btf_var_secinfos(t), vars, sizeof(*vsi), compare_vsi_off);
+ return 0;
+}
+
+static int bpf_object_fixup_btf(struct bpf_object *obj)
+{
+ int i, n, err = 0;
+
+ if (!obj->btf)
+ return 0;
+
+ n = btf__type_cnt(obj->btf);
+ for (i = 1; i < n; i++) {
+ struct btf_type *t = btf_type_by_id(obj->btf, i);
+
+ /* Loader needs to fix up some of the things compiler
+ * couldn't get its hands on while emitting BTF. This
+ * is section size and global variable offset. We use
+ * the info from the ELF itself for this purpose.
+ */
+ if (btf_is_datasec(t)) {
+ err = btf_fixup_datasec(obj, obj->btf, t);
+ if (err)
+ return err;
+ }
+ }
+
+ return 0;
+}
+
+static bool prog_needs_vmlinux_btf(struct bpf_program *prog)
+{
+ if (prog->type == BPF_PROG_TYPE_STRUCT_OPS ||
+ prog->type == BPF_PROG_TYPE_LSM)
+ return true;
+
+ /* BPF_PROG_TYPE_TRACING programs which do not attach to other programs
+ * also need vmlinux BTF
+ */
+ if (prog->type == BPF_PROG_TYPE_TRACING && !prog->attach_prog_fd)
+ return true;
+
+ return false;
+}
+
+static bool obj_needs_vmlinux_btf(const struct bpf_object *obj)
+{
+ struct bpf_program *prog;
+ int i;
+
+ /* CO-RE relocations need kernel BTF, only when btf_custom_path
+ * is not specified
+ */
+ if (obj->btf_ext && obj->btf_ext->core_relo_info.len && !obj->btf_custom_path)
+ return true;
+
+ /* Support for typed ksyms needs kernel BTF */
+ for (i = 0; i < obj->nr_extern; i++) {
+ const struct extern_desc *ext;
+
+ ext = &obj->externs[i];
+ if (ext->type == EXT_KSYM && ext->ksym.type_id)
+ return true;
+ }
+
+ bpf_object__for_each_program(prog, obj) {
+ if (!prog->autoload)
+ continue;
+ if (prog_needs_vmlinux_btf(prog))
+ return true;
+ }
+
+ return false;
+}
+
+static int bpf_object__load_vmlinux_btf(struct bpf_object *obj, bool force)
+{
+ int err;
+
+ /* btf_vmlinux could be loaded earlier */
+ if (obj->btf_vmlinux || obj->gen_loader)
+ return 0;
+
+ if (!force && !obj_needs_vmlinux_btf(obj))
+ return 0;
+
+ obj->btf_vmlinux = btf__load_vmlinux_btf();
+ err = libbpf_get_error(obj->btf_vmlinux);
+ if (err) {
+ pr_warn("Error loading vmlinux BTF: %d\n", err);
+ obj->btf_vmlinux = NULL;
+ return err;
+ }
+ return 0;
+}
+
+static int bpf_object__sanitize_and_load_btf(struct bpf_object *obj)
+{
+ struct btf *kern_btf = obj->btf;
+ bool btf_mandatory, sanitize;
+ int i, err = 0;
+
+ if (!obj->btf)
+ return 0;
+
+ if (!kernel_supports(obj, FEAT_BTF)) {
+ if (kernel_needs_btf(obj)) {
+ err = -EOPNOTSUPP;
+ goto report;
+ }
+ pr_debug("Kernel doesn't support BTF, skipping uploading it.\n");
+ return 0;
+ }
+
+ /* Even though some subprogs are global/weak, user might prefer more
+ * permissive BPF verification process that BPF verifier performs for
+ * static functions, taking into account more context from the caller
+ * functions. In such case, they need to mark such subprogs with
+ * __attribute__((visibility("hidden"))) and libbpf will adjust
+ * corresponding FUNC BTF type to be marked as static and trigger more
+ * involved BPF verification process.
+ */
+ for (i = 0; i < obj->nr_programs; i++) {
+ struct bpf_program *prog = &obj->programs[i];
+ struct btf_type *t;
+ const char *name;
+ int j, n;
+
+ if (!prog->mark_btf_static || !prog_is_subprog(obj, prog))
+ continue;
+
+ n = btf__type_cnt(obj->btf);
+ for (j = 1; j < n; j++) {
+ t = btf_type_by_id(obj->btf, j);
+ if (!btf_is_func(t) || btf_func_linkage(t) != BTF_FUNC_GLOBAL)
+ continue;
+
+ name = btf__str_by_offset(obj->btf, t->name_off);
+ if (strcmp(name, prog->name) != 0)
+ continue;
+
+ t->info = btf_type_info(BTF_KIND_FUNC, BTF_FUNC_STATIC, 0);
+ break;
+ }
+ }
+
+ sanitize = btf_needs_sanitization(obj);
+ if (sanitize) {
+ const void *raw_data;
+ __u32 sz;
+
+ /* clone BTF to sanitize a copy and leave the original intact */
+ raw_data = btf__raw_data(obj->btf, &sz);
+ kern_btf = btf__new(raw_data, sz);
+ err = libbpf_get_error(kern_btf);
+ if (err)
+ return err;
+
+ /* enforce 8-byte pointers for BPF-targeted BTFs */
+ btf__set_pointer_size(obj->btf, 8);
+ err = bpf_object__sanitize_btf(obj, kern_btf);
+ if (err)
+ return err;
+ }
+
+ if (obj->gen_loader) {
+ __u32 raw_size = 0;
+ const void *raw_data = btf__raw_data(kern_btf, &raw_size);
+
+ if (!raw_data)
+ return -ENOMEM;
+ bpf_gen__load_btf(obj->gen_loader, raw_data, raw_size);
+ /* Pretend to have valid FD to pass various fd >= 0 checks.
+ * This fd == 0 will not be used with any syscall and will be reset to -1 eventually.
+ */
+ btf__set_fd(kern_btf, 0);
+ } else {
+ /* currently BPF_BTF_LOAD only supports log_level 1 */
+ err = btf_load_into_kernel(kern_btf, obj->log_buf, obj->log_size,
+ obj->log_level ? 1 : 0);
+ }
+ if (sanitize) {
+ if (!err) {
+ /* move fd to libbpf's BTF */
+ btf__set_fd(obj->btf, btf__fd(kern_btf));
+ btf__set_fd(kern_btf, -1);
+ }
+ btf__free(kern_btf);
+ }
+report:
+ if (err) {
+ btf_mandatory = kernel_needs_btf(obj);
+ pr_warn("Error loading .BTF into kernel: %d. %s\n", err,
+ btf_mandatory ? "BTF is mandatory, can't proceed."
+ : "BTF is optional, ignoring.");
+ if (!btf_mandatory)
+ err = 0;
+ }
+ return err;
+}
+
+static const char *elf_sym_str(const struct bpf_object *obj, size_t off)
+{
+ const char *name;
+
+ name = elf_strptr(obj->efile.elf, obj->efile.strtabidx, off);
+ if (!name) {
+ pr_warn("elf: failed to get section name string at offset %zu from %s: %s\n",
+ off, obj->path, elf_errmsg(-1));
+ return NULL;
+ }
+
+ return name;
+}
+
+static const char *elf_sec_str(const struct bpf_object *obj, size_t off)
+{
+ const char *name;
+
+ name = elf_strptr(obj->efile.elf, obj->efile.shstrndx, off);
+ if (!name) {
+ pr_warn("elf: failed to get section name string at offset %zu from %s: %s\n",
+ off, obj->path, elf_errmsg(-1));
+ return NULL;
+ }
+
+ return name;
+}
+
+static Elf_Scn *elf_sec_by_idx(const struct bpf_object *obj, size_t idx)
+{
+ Elf_Scn *scn;
+
+ scn = elf_getscn(obj->efile.elf, idx);
+ if (!scn) {
+ pr_warn("elf: failed to get section(%zu) from %s: %s\n",
+ idx, obj->path, elf_errmsg(-1));
+ return NULL;
+ }
+ return scn;
+}
+
+static Elf_Scn *elf_sec_by_name(const struct bpf_object *obj, const char *name)
+{
+ Elf_Scn *scn = NULL;
+ Elf *elf = obj->efile.elf;
+ const char *sec_name;
+
+ while ((scn = elf_nextscn(elf, scn)) != NULL) {
+ sec_name = elf_sec_name(obj, scn);
+ if (!sec_name)
+ return NULL;
+
+ if (strcmp(sec_name, name) != 0)
+ continue;
+
+ return scn;
+ }
+ return NULL;
+}
+
+static Elf64_Shdr *elf_sec_hdr(const struct bpf_object *obj, Elf_Scn *scn)
+{
+ Elf64_Shdr *shdr;
+
+ if (!scn)
+ return NULL;
+
+ shdr = elf64_getshdr(scn);
+ if (!shdr) {
+ pr_warn("elf: failed to get section(%zu) header from %s: %s\n",
+ elf_ndxscn(scn), obj->path, elf_errmsg(-1));
+ return NULL;
+ }
+
+ return shdr;
+}
+
+static const char *elf_sec_name(const struct bpf_object *obj, Elf_Scn *scn)
+{
+ const char *name;
+ Elf64_Shdr *sh;
+
+ if (!scn)
+ return NULL;
+
+ sh = elf_sec_hdr(obj, scn);
+ if (!sh)
+ return NULL;
+
+ name = elf_sec_str(obj, sh->sh_name);
+ if (!name) {
+ pr_warn("elf: failed to get section(%zu) name from %s: %s\n",
+ elf_ndxscn(scn), obj->path, elf_errmsg(-1));
+ return NULL;
+ }
+
+ return name;
+}
+
+static Elf_Data *elf_sec_data(const struct bpf_object *obj, Elf_Scn *scn)
+{
+ Elf_Data *data;
+
+ if (!scn)
+ return NULL;
+
+ data = elf_getdata(scn, 0);
+ if (!data) {
+ pr_warn("elf: failed to get section(%zu) %s data from %s: %s\n",
+ elf_ndxscn(scn), elf_sec_name(obj, scn) ?: "<?>",
+ obj->path, elf_errmsg(-1));
+ return NULL;
+ }
+
+ return data;
+}
+
+static Elf64_Sym *elf_sym_by_idx(const struct bpf_object *obj, size_t idx)
+{
+ if (idx >= obj->efile.symbols->d_size / sizeof(Elf64_Sym))
+ return NULL;
+
+ return (Elf64_Sym *)obj->efile.symbols->d_buf + idx;
+}
+
+static Elf64_Rel *elf_rel_by_idx(Elf_Data *data, size_t idx)
+{
+ if (idx >= data->d_size / sizeof(Elf64_Rel))
+ return NULL;
+
+ return (Elf64_Rel *)data->d_buf + idx;
+}
+
+static bool is_sec_name_dwarf(const char *name)
+{
+ /* approximation, but the actual list is too long */
+ return str_has_pfx(name, ".debug_");
+}
+
+static bool ignore_elf_section(Elf64_Shdr *hdr, const char *name)
+{
+ /* no special handling of .strtab */
+ if (hdr->sh_type == SHT_STRTAB)
+ return true;
+
+ /* ignore .llvm_addrsig section as well */
+ if (hdr->sh_type == SHT_LLVM_ADDRSIG)
+ return true;
+
+ /* no subprograms will lead to an empty .text section, ignore it */
+ if (hdr->sh_type == SHT_PROGBITS && hdr->sh_size == 0 &&
+ strcmp(name, ".text") == 0)
+ return true;
+
+ /* DWARF sections */
+ if (is_sec_name_dwarf(name))
+ return true;
+
+ if (str_has_pfx(name, ".rel")) {
+ name += sizeof(".rel") - 1;
+ /* DWARF section relocations */
+ if (is_sec_name_dwarf(name))
+ return true;
+
+ /* .BTF and .BTF.ext don't need relocations */
+ if (strcmp(name, BTF_ELF_SEC) == 0 ||
+ strcmp(name, BTF_EXT_ELF_SEC) == 0)
+ return true;
+ }
+
+ return false;
+}
+
+static int cmp_progs(const void *_a, const void *_b)
+{
+ const struct bpf_program *a = _a;
+ const struct bpf_program *b = _b;
+
+ if (a->sec_idx != b->sec_idx)
+ return a->sec_idx < b->sec_idx ? -1 : 1;
+
+ /* sec_insn_off can't be the same within the section */
+ return a->sec_insn_off < b->sec_insn_off ? -1 : 1;
+}
+
+static int bpf_object__elf_collect(struct bpf_object *obj)
+{
+ struct elf_sec_desc *sec_desc;
+ Elf *elf = obj->efile.elf;
+ Elf_Data *btf_ext_data = NULL;
+ Elf_Data *btf_data = NULL;
+ int idx = 0, err = 0;
+ const char *name;
+ Elf_Data *data;
+ Elf_Scn *scn;
+ Elf64_Shdr *sh;
+
+ /* ELF section indices are 0-based, but sec #0 is special "invalid"
+ * section. Since section count retrieved by elf_getshdrnum() does
+ * include sec #0, it is already the necessary size of an array to keep
+ * all the sections.
+ */
+ if (elf_getshdrnum(obj->efile.elf, &obj->efile.sec_cnt)) {
+ pr_warn("elf: failed to get the number of sections for %s: %s\n",
+ obj->path, elf_errmsg(-1));
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+ obj->efile.secs = calloc(obj->efile.sec_cnt, sizeof(*obj->efile.secs));
+ if (!obj->efile.secs)
+ return -ENOMEM;
+
+ /* a bunch of ELF parsing functionality depends on processing symbols,
+ * so do the first pass and find the symbol table
+ */
+ scn = NULL;
+ while ((scn = elf_nextscn(elf, scn)) != NULL) {
+ sh = elf_sec_hdr(obj, scn);
+ if (!sh)
+ return -LIBBPF_ERRNO__FORMAT;
+
+ if (sh->sh_type == SHT_SYMTAB) {
+ if (obj->efile.symbols) {
+ pr_warn("elf: multiple symbol tables in %s\n", obj->path);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+
+ data = elf_sec_data(obj, scn);
+ if (!data)
+ return -LIBBPF_ERRNO__FORMAT;
+
+ idx = elf_ndxscn(scn);
+
+ obj->efile.symbols = data;
+ obj->efile.symbols_shndx = idx;
+ obj->efile.strtabidx = sh->sh_link;
+ }
+ }
+
+ if (!obj->efile.symbols) {
+ pr_warn("elf: couldn't find symbol table in %s, stripped object file?\n",
+ obj->path);
+ return -ENOENT;
+ }
+
+ scn = NULL;
+ while ((scn = elf_nextscn(elf, scn)) != NULL) {
+ idx = elf_ndxscn(scn);
+ sec_desc = &obj->efile.secs[idx];
+
+ sh = elf_sec_hdr(obj, scn);
+ if (!sh)
+ return -LIBBPF_ERRNO__FORMAT;
+
+ name = elf_sec_str(obj, sh->sh_name);
+ if (!name)
+ return -LIBBPF_ERRNO__FORMAT;
+
+ if (ignore_elf_section(sh, name))
+ continue;
+
+ data = elf_sec_data(obj, scn);
+ if (!data)
+ return -LIBBPF_ERRNO__FORMAT;
+
+ pr_debug("elf: section(%d) %s, size %ld, link %d, flags %lx, type=%d\n",
+ idx, name, (unsigned long)data->d_size,
+ (int)sh->sh_link, (unsigned long)sh->sh_flags,
+ (int)sh->sh_type);
+
+ if (strcmp(name, "license") == 0) {
+ err = bpf_object__init_license(obj, data->d_buf, data->d_size);
+ if (err)
+ return err;
+ } else if (strcmp(name, "version") == 0) {
+ err = bpf_object__init_kversion(obj, data->d_buf, data->d_size);
+ if (err)
+ return err;
+ } else if (strcmp(name, "maps") == 0) {
+ pr_warn("elf: legacy map definitions in 'maps' section are not supported by libbpf v1.0+\n");
+ return -ENOTSUP;
+ } else if (strcmp(name, MAPS_ELF_SEC) == 0) {
+ obj->efile.btf_maps_shndx = idx;
+ } else if (strcmp(name, BTF_ELF_SEC) == 0) {
+ if (sh->sh_type != SHT_PROGBITS)
+ return -LIBBPF_ERRNO__FORMAT;
+ btf_data = data;
+ } else if (strcmp(name, BTF_EXT_ELF_SEC) == 0) {
+ if (sh->sh_type != SHT_PROGBITS)
+ return -LIBBPF_ERRNO__FORMAT;
+ btf_ext_data = data;
+ } else if (sh->sh_type == SHT_SYMTAB) {
+ /* already processed during the first pass above */
+ } else if (sh->sh_type == SHT_PROGBITS && data->d_size > 0) {
+ if (sh->sh_flags & SHF_EXECINSTR) {
+ if (strcmp(name, ".text") == 0)
+ obj->efile.text_shndx = idx;
+ err = bpf_object__add_programs(obj, data, name, idx);
+ if (err)
+ return err;
+ } else if (strcmp(name, DATA_SEC) == 0 ||
+ str_has_pfx(name, DATA_SEC ".")) {
+ sec_desc->sec_type = SEC_DATA;
+ sec_desc->shdr = sh;
+ sec_desc->data = data;
+ } else if (strcmp(name, RODATA_SEC) == 0 ||
+ str_has_pfx(name, RODATA_SEC ".")) {
+ sec_desc->sec_type = SEC_RODATA;
+ sec_desc->shdr = sh;
+ sec_desc->data = data;
+ } else if (strcmp(name, STRUCT_OPS_SEC) == 0) {
+ obj->efile.st_ops_data = data;
+ obj->efile.st_ops_shndx = idx;
+ } else {
+ pr_info("elf: skipping unrecognized data section(%d) %s\n",
+ idx, name);
+ }
+ } else if (sh->sh_type == SHT_REL) {
+ int targ_sec_idx = sh->sh_info; /* points to other section */
+
+ if (sh->sh_entsize != sizeof(Elf64_Rel) ||
+ targ_sec_idx >= obj->efile.sec_cnt)
+ return -LIBBPF_ERRNO__FORMAT;
+
+ /* Only do relo for section with exec instructions */
+ if (!section_have_execinstr(obj, targ_sec_idx) &&
+ strcmp(name, ".rel" STRUCT_OPS_SEC) &&
+ strcmp(name, ".rel" MAPS_ELF_SEC)) {
+ pr_info("elf: skipping relo section(%d) %s for section(%d) %s\n",
+ idx, name, targ_sec_idx,
+ elf_sec_name(obj, elf_sec_by_idx(obj, targ_sec_idx)) ?: "<?>");
+ continue;
+ }
+
+ sec_desc->sec_type = SEC_RELO;
+ sec_desc->shdr = sh;
+ sec_desc->data = data;
+ } else if (sh->sh_type == SHT_NOBITS && (strcmp(name, BSS_SEC) == 0 ||
+ str_has_pfx(name, BSS_SEC "."))) {
+ sec_desc->sec_type = SEC_BSS;
+ sec_desc->shdr = sh;
+ sec_desc->data = data;
+ } else {
+ pr_info("elf: skipping section(%d) %s (size %zu)\n", idx, name,
+ (size_t)sh->sh_size);
+ }
+ }
+
+ if (!obj->efile.strtabidx || obj->efile.strtabidx > idx) {
+ pr_warn("elf: symbol strings section missing or invalid in %s\n", obj->path);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+
+ /* sort BPF programs by section name and in-section instruction offset
+ * for faster search
+ */
+ if (obj->nr_programs)
+ qsort(obj->programs, obj->nr_programs, sizeof(*obj->programs), cmp_progs);
+
+ return bpf_object__init_btf(obj, btf_data, btf_ext_data);
+}
+
+static bool sym_is_extern(const Elf64_Sym *sym)
+{
+ int bind = ELF64_ST_BIND(sym->st_info);
+ /* externs are symbols w/ type=NOTYPE, bind=GLOBAL|WEAK, section=UND */
+ return sym->st_shndx == SHN_UNDEF &&
+ (bind == STB_GLOBAL || bind == STB_WEAK) &&
+ ELF64_ST_TYPE(sym->st_info) == STT_NOTYPE;
+}
+
+static bool sym_is_subprog(const Elf64_Sym *sym, int text_shndx)
+{
+ int bind = ELF64_ST_BIND(sym->st_info);
+ int type = ELF64_ST_TYPE(sym->st_info);
+
+ /* in .text section */
+ if (sym->st_shndx != text_shndx)
+ return false;
+
+ /* local function */
+ if (bind == STB_LOCAL && type == STT_SECTION)
+ return true;
+
+ /* global function */
+ return bind == STB_GLOBAL && type == STT_FUNC;
+}
+
+static int find_extern_btf_id(const struct btf *btf, const char *ext_name)
+{
+ const struct btf_type *t;
+ const char *tname;
+ int i, n;
+
+ if (!btf)
+ return -ESRCH;
+
+ n = btf__type_cnt(btf);
+ for (i = 1; i < n; i++) {
+ t = btf__type_by_id(btf, i);
+
+ if (!btf_is_var(t) && !btf_is_func(t))
+ continue;
+
+ tname = btf__name_by_offset(btf, t->name_off);
+ if (strcmp(tname, ext_name))
+ continue;
+
+ if (btf_is_var(t) &&
+ btf_var(t)->linkage != BTF_VAR_GLOBAL_EXTERN)
+ return -EINVAL;
+
+ if (btf_is_func(t) && btf_func_linkage(t) != BTF_FUNC_EXTERN)
+ return -EINVAL;
+
+ return i;
+ }
+
+ return -ENOENT;
+}
+
+static int find_extern_sec_btf_id(struct btf *btf, int ext_btf_id) {
+ const struct btf_var_secinfo *vs;
+ const struct btf_type *t;
+ int i, j, n;
+
+ if (!btf)
+ return -ESRCH;
+
+ n = btf__type_cnt(btf);
+ for (i = 1; i < n; i++) {
+ t = btf__type_by_id(btf, i);
+
+ if (!btf_is_datasec(t))
+ continue;
+
+ vs = btf_var_secinfos(t);
+ for (j = 0; j < btf_vlen(t); j++, vs++) {
+ if (vs->type == ext_btf_id)
+ return i;
+ }
+ }
+
+ return -ENOENT;
+}
+
+static enum kcfg_type find_kcfg_type(const struct btf *btf, int id,
+ bool *is_signed)
+{
+ const struct btf_type *t;
+ const char *name;
+
+ t = skip_mods_and_typedefs(btf, id, NULL);
+ name = btf__name_by_offset(btf, t->name_off);
+
+ if (is_signed)
+ *is_signed = false;
+ switch (btf_kind(t)) {
+ case BTF_KIND_INT: {
+ int enc = btf_int_encoding(t);
+
+ if (enc & BTF_INT_BOOL)
+ return t->size == 1 ? KCFG_BOOL : KCFG_UNKNOWN;
+ if (is_signed)
+ *is_signed = enc & BTF_INT_SIGNED;
+ if (t->size == 1)
+ return KCFG_CHAR;
+ if (t->size < 1 || t->size > 8 || (t->size & (t->size - 1)))
+ return KCFG_UNKNOWN;
+ return KCFG_INT;
+ }
+ case BTF_KIND_ENUM:
+ if (t->size != 4)
+ return KCFG_UNKNOWN;
+ if (strcmp(name, "libbpf_tristate"))
+ return KCFG_UNKNOWN;
+ return KCFG_TRISTATE;
+ case BTF_KIND_ENUM64:
+ if (strcmp(name, "libbpf_tristate"))
+ return KCFG_UNKNOWN;
+ return KCFG_TRISTATE;
+ case BTF_KIND_ARRAY:
+ if (btf_array(t)->nelems == 0)
+ return KCFG_UNKNOWN;
+ if (find_kcfg_type(btf, btf_array(t)->type, NULL) != KCFG_CHAR)
+ return KCFG_UNKNOWN;
+ return KCFG_CHAR_ARR;
+ default:
+ return KCFG_UNKNOWN;
+ }
+}
+
+static int cmp_externs(const void *_a, const void *_b)
+{
+ const struct extern_desc *a = _a;
+ const struct extern_desc *b = _b;
+
+ if (a->type != b->type)
+ return a->type < b->type ? -1 : 1;
+
+ if (a->type == EXT_KCFG) {
+ /* descending order by alignment requirements */
+ if (a->kcfg.align != b->kcfg.align)
+ return a->kcfg.align > b->kcfg.align ? -1 : 1;
+ /* ascending order by size, within same alignment class */
+ if (a->kcfg.sz != b->kcfg.sz)
+ return a->kcfg.sz < b->kcfg.sz ? -1 : 1;
+ }
+
+ /* resolve ties by name */
+ return strcmp(a->name, b->name);
+}
+
+static int find_int_btf_id(const struct btf *btf)
+{
+ const struct btf_type *t;
+ int i, n;
+
+ n = btf__type_cnt(btf);
+ for (i = 1; i < n; i++) {
+ t = btf__type_by_id(btf, i);
+
+ if (btf_is_int(t) && btf_int_bits(t) == 32)
+ return i;
+ }
+
+ return 0;
+}
+
+static int add_dummy_ksym_var(struct btf *btf)
+{
+ int i, int_btf_id, sec_btf_id, dummy_var_btf_id;
+ const struct btf_var_secinfo *vs;
+ const struct btf_type *sec;
+
+ if (!btf)
+ return 0;
+
+ sec_btf_id = btf__find_by_name_kind(btf, KSYMS_SEC,
+ BTF_KIND_DATASEC);
+ if (sec_btf_id < 0)
+ return 0;
+
+ sec = btf__type_by_id(btf, sec_btf_id);
+ vs = btf_var_secinfos(sec);
+ for (i = 0; i < btf_vlen(sec); i++, vs++) {
+ const struct btf_type *vt;
+
+ vt = btf__type_by_id(btf, vs->type);
+ if (btf_is_func(vt))
+ break;
+ }
+
+ /* No func in ksyms sec. No need to add dummy var. */
+ if (i == btf_vlen(sec))
+ return 0;
+
+ int_btf_id = find_int_btf_id(btf);
+ dummy_var_btf_id = btf__add_var(btf,
+ "dummy_ksym",
+ BTF_VAR_GLOBAL_ALLOCATED,
+ int_btf_id);
+ if (dummy_var_btf_id < 0)
+ pr_warn("cannot create a dummy_ksym var\n");
+
+ return dummy_var_btf_id;
+}
+
+static int bpf_object__collect_externs(struct bpf_object *obj)
+{
+ struct btf_type *sec, *kcfg_sec = NULL, *ksym_sec = NULL;
+ const struct btf_type *t;
+ struct extern_desc *ext;
+ int i, n, off, dummy_var_btf_id;
+ const char *ext_name, *sec_name;
+ Elf_Scn *scn;
+ Elf64_Shdr *sh;
+
+ if (!obj->efile.symbols)
+ return 0;
+
+ scn = elf_sec_by_idx(obj, obj->efile.symbols_shndx);
+ sh = elf_sec_hdr(obj, scn);
+ if (!sh || sh->sh_entsize != sizeof(Elf64_Sym))
+ return -LIBBPF_ERRNO__FORMAT;
+
+ dummy_var_btf_id = add_dummy_ksym_var(obj->btf);
+ if (dummy_var_btf_id < 0)
+ return dummy_var_btf_id;
+
+ n = sh->sh_size / sh->sh_entsize;
+ pr_debug("looking for externs among %d symbols...\n", n);
+
+ for (i = 0; i < n; i++) {
+ Elf64_Sym *sym = elf_sym_by_idx(obj, i);
+
+ if (!sym)
+ return -LIBBPF_ERRNO__FORMAT;
+ if (!sym_is_extern(sym))
+ continue;
+ ext_name = elf_sym_str(obj, sym->st_name);
+ if (!ext_name || !ext_name[0])
+ continue;
+
+ ext = obj->externs;
+ ext = libbpf_reallocarray(ext, obj->nr_extern + 1, sizeof(*ext));
+ if (!ext)
+ return -ENOMEM;
+ obj->externs = ext;
+ ext = &ext[obj->nr_extern];
+ memset(ext, 0, sizeof(*ext));
+ obj->nr_extern++;
+
+ ext->btf_id = find_extern_btf_id(obj->btf, ext_name);
+ if (ext->btf_id <= 0) {
+ pr_warn("failed to find BTF for extern '%s': %d\n",
+ ext_name, ext->btf_id);
+ return ext->btf_id;
+ }
+ t = btf__type_by_id(obj->btf, ext->btf_id);
+ ext->name = btf__name_by_offset(obj->btf, t->name_off);
+ ext->sym_idx = i;
+ ext->is_weak = ELF64_ST_BIND(sym->st_info) == STB_WEAK;
+
+ ext->sec_btf_id = find_extern_sec_btf_id(obj->btf, ext->btf_id);
+ if (ext->sec_btf_id <= 0) {
+ pr_warn("failed to find BTF for extern '%s' [%d] section: %d\n",
+ ext_name, ext->btf_id, ext->sec_btf_id);
+ return ext->sec_btf_id;
+ }
+ sec = (void *)btf__type_by_id(obj->btf, ext->sec_btf_id);
+ sec_name = btf__name_by_offset(obj->btf, sec->name_off);
+
+ if (strcmp(sec_name, KCONFIG_SEC) == 0) {
+ if (btf_is_func(t)) {
+ pr_warn("extern function %s is unsupported under %s section\n",
+ ext->name, KCONFIG_SEC);
+ return -ENOTSUP;
+ }
+ kcfg_sec = sec;
+ ext->type = EXT_KCFG;
+ ext->kcfg.sz = btf__resolve_size(obj->btf, t->type);
+ if (ext->kcfg.sz <= 0) {
+ pr_warn("failed to resolve size of extern (kcfg) '%s': %d\n",
+ ext_name, ext->kcfg.sz);
+ return ext->kcfg.sz;
+ }
+ ext->kcfg.align = btf__align_of(obj->btf, t->type);
+ if (ext->kcfg.align <= 0) {
+ pr_warn("failed to determine alignment of extern (kcfg) '%s': %d\n",
+ ext_name, ext->kcfg.align);
+ return -EINVAL;
+ }
+ ext->kcfg.type = find_kcfg_type(obj->btf, t->type,
+ &ext->kcfg.is_signed);
+ if (ext->kcfg.type == KCFG_UNKNOWN) {
+ pr_warn("extern (kcfg) '%s': type is unsupported\n", ext_name);
+ return -ENOTSUP;
+ }
+ } else if (strcmp(sec_name, KSYMS_SEC) == 0) {
+ ksym_sec = sec;
+ ext->type = EXT_KSYM;
+ skip_mods_and_typedefs(obj->btf, t->type,
+ &ext->ksym.type_id);
+ } else {
+ pr_warn("unrecognized extern section '%s'\n", sec_name);
+ return -ENOTSUP;
+ }
+ }
+ pr_debug("collected %d externs total\n", obj->nr_extern);
+
+ if (!obj->nr_extern)
+ return 0;
+
+ /* sort externs by type, for kcfg ones also by (align, size, name) */
+ qsort(obj->externs, obj->nr_extern, sizeof(*ext), cmp_externs);
+
+ /* for .ksyms section, we need to turn all externs into allocated
+ * variables in BTF to pass kernel verification; we do this by
+ * pretending that each extern is a 8-byte variable
+ */
+ if (ksym_sec) {
+ /* find existing 4-byte integer type in BTF to use for fake
+ * extern variables in DATASEC
+ */
+ int int_btf_id = find_int_btf_id(obj->btf);
+ /* For extern function, a dummy_var added earlier
+ * will be used to replace the vs->type and
+ * its name string will be used to refill
+ * the missing param's name.
+ */
+ const struct btf_type *dummy_var;
+
+ dummy_var = btf__type_by_id(obj->btf, dummy_var_btf_id);
+ for (i = 0; i < obj->nr_extern; i++) {
+ ext = &obj->externs[i];
+ if (ext->type != EXT_KSYM)
+ continue;
+ pr_debug("extern (ksym) #%d: symbol %d, name %s\n",
+ i, ext->sym_idx, ext->name);
+ }
+
+ sec = ksym_sec;
+ n = btf_vlen(sec);
+ for (i = 0, off = 0; i < n; i++, off += sizeof(int)) {
+ struct btf_var_secinfo *vs = btf_var_secinfos(sec) + i;
+ struct btf_type *vt;
+
+ vt = (void *)btf__type_by_id(obj->btf, vs->type);
+ ext_name = btf__name_by_offset(obj->btf, vt->name_off);
+ ext = find_extern_by_name(obj, ext_name);
+ if (!ext) {
+ pr_warn("failed to find extern definition for BTF %s '%s'\n",
+ btf_kind_str(vt), ext_name);
+ return -ESRCH;
+ }
+ if (btf_is_func(vt)) {
+ const struct btf_type *func_proto;
+ struct btf_param *param;
+ int j;
+
+ func_proto = btf__type_by_id(obj->btf,
+ vt->type);
+ param = btf_params(func_proto);
+ /* Reuse the dummy_var string if the
+ * func proto does not have param name.
+ */
+ for (j = 0; j < btf_vlen(func_proto); j++)
+ if (param[j].type && !param[j].name_off)
+ param[j].name_off =
+ dummy_var->name_off;
+ vs->type = dummy_var_btf_id;
+ vt->info &= ~0xffff;
+ vt->info |= BTF_FUNC_GLOBAL;
+ } else {
+ btf_var(vt)->linkage = BTF_VAR_GLOBAL_ALLOCATED;
+ vt->type = int_btf_id;
+ }
+ vs->offset = off;
+ vs->size = sizeof(int);
+ }
+ sec->size = off;
+ }
+
+ if (kcfg_sec) {
+ sec = kcfg_sec;
+ /* for kcfg externs calculate their offsets within a .kconfig map */
+ off = 0;
+ for (i = 0; i < obj->nr_extern; i++) {
+ ext = &obj->externs[i];
+ if (ext->type != EXT_KCFG)
+ continue;
+
+ ext->kcfg.data_off = roundup(off, ext->kcfg.align);
+ off = ext->kcfg.data_off + ext->kcfg.sz;
+ pr_debug("extern (kcfg) #%d: symbol %d, off %u, name %s\n",
+ i, ext->sym_idx, ext->kcfg.data_off, ext->name);
+ }
+ sec->size = off;
+ n = btf_vlen(sec);
+ for (i = 0; i < n; i++) {
+ struct btf_var_secinfo *vs = btf_var_secinfos(sec) + i;
+
+ t = btf__type_by_id(obj->btf, vs->type);
+ ext_name = btf__name_by_offset(obj->btf, t->name_off);
+ ext = find_extern_by_name(obj, ext_name);
+ if (!ext) {
+ pr_warn("failed to find extern definition for BTF var '%s'\n",
+ ext_name);
+ return -ESRCH;
+ }
+ btf_var(t)->linkage = BTF_VAR_GLOBAL_ALLOCATED;
+ vs->offset = ext->kcfg.data_off;
+ }
+ }
+ return 0;
+}
+
+static bool prog_is_subprog(const struct bpf_object *obj, const struct bpf_program *prog)
+{
+ return prog->sec_idx == obj->efile.text_shndx && obj->nr_programs > 1;
+}
+
+struct bpf_program *
+bpf_object__find_program_by_name(const struct bpf_object *obj,
+ const char *name)
+{
+ struct bpf_program *prog;
+
+ bpf_object__for_each_program(prog, obj) {
+ if (prog_is_subprog(obj, prog))
+ continue;
+ if (!strcmp(prog->name, name))
+ return prog;
+ }
+ return errno = ENOENT, NULL;
+}
+
+static bool bpf_object__shndx_is_data(const struct bpf_object *obj,
+ int shndx)
+{
+ switch (obj->efile.secs[shndx].sec_type) {
+ case SEC_BSS:
+ case SEC_DATA:
+ case SEC_RODATA:
+ return true;
+ default:
+ return false;
+ }
+}
+
+static bool bpf_object__shndx_is_maps(const struct bpf_object *obj,
+ int shndx)
+{
+ return shndx == obj->efile.btf_maps_shndx;
+}
+
+static enum libbpf_map_type
+bpf_object__section_to_libbpf_map_type(const struct bpf_object *obj, int shndx)
+{
+ if (shndx == obj->efile.symbols_shndx)
+ return LIBBPF_MAP_KCONFIG;
+
+ switch (obj->efile.secs[shndx].sec_type) {
+ case SEC_BSS:
+ return LIBBPF_MAP_BSS;
+ case SEC_DATA:
+ return LIBBPF_MAP_DATA;
+ case SEC_RODATA:
+ return LIBBPF_MAP_RODATA;
+ default:
+ return LIBBPF_MAP_UNSPEC;
+ }
+}
+
+static int bpf_program__record_reloc(struct bpf_program *prog,
+ struct reloc_desc *reloc_desc,
+ __u32 insn_idx, const char *sym_name,
+ const Elf64_Sym *sym, const Elf64_Rel *rel)
+{
+ struct bpf_insn *insn = &prog->insns[insn_idx];
+ size_t map_idx, nr_maps = prog->obj->nr_maps;
+ struct bpf_object *obj = prog->obj;
+ __u32 shdr_idx = sym->st_shndx;
+ enum libbpf_map_type type;
+ const char *sym_sec_name;
+ struct bpf_map *map;
+
+ if (!is_call_insn(insn) && !is_ldimm64_insn(insn)) {
+ pr_warn("prog '%s': invalid relo against '%s' for insns[%d].code 0x%x\n",
+ prog->name, sym_name, insn_idx, insn->code);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+
+ if (sym_is_extern(sym)) {
+ int sym_idx = ELF64_R_SYM(rel->r_info);
+ int i, n = obj->nr_extern;
+ struct extern_desc *ext;
+
+ for (i = 0; i < n; i++) {
+ ext = &obj->externs[i];
+ if (ext->sym_idx == sym_idx)
+ break;
+ }
+ if (i >= n) {
+ pr_warn("prog '%s': extern relo failed to find extern for '%s' (%d)\n",
+ prog->name, sym_name, sym_idx);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+ pr_debug("prog '%s': found extern #%d '%s' (sym %d) for insn #%u\n",
+ prog->name, i, ext->name, ext->sym_idx, insn_idx);
+ if (insn->code == (BPF_JMP | BPF_CALL))
+ reloc_desc->type = RELO_EXTERN_FUNC;
+ else
+ reloc_desc->type = RELO_EXTERN_VAR;
+ reloc_desc->insn_idx = insn_idx;
+ reloc_desc->sym_off = i; /* sym_off stores extern index */
+ return 0;
+ }
+
+ /* sub-program call relocation */
+ if (is_call_insn(insn)) {
+ if (insn->src_reg != BPF_PSEUDO_CALL) {
+ pr_warn("prog '%s': incorrect bpf_call opcode\n", prog->name);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+ /* text_shndx can be 0, if no default "main" program exists */
+ if (!shdr_idx || shdr_idx != obj->efile.text_shndx) {
+ sym_sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, shdr_idx));
+ pr_warn("prog '%s': bad call relo against '%s' in section '%s'\n",
+ prog->name, sym_name, sym_sec_name);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+ if (sym->st_value % BPF_INSN_SZ) {
+ pr_warn("prog '%s': bad call relo against '%s' at offset %zu\n",
+ prog->name, sym_name, (size_t)sym->st_value);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+ reloc_desc->type = RELO_CALL;
+ reloc_desc->insn_idx = insn_idx;
+ reloc_desc->sym_off = sym->st_value;
+ return 0;
+ }
+
+ if (!shdr_idx || shdr_idx >= SHN_LORESERVE) {
+ pr_warn("prog '%s': invalid relo against '%s' in special section 0x%x; forgot to initialize global var?..\n",
+ prog->name, sym_name, shdr_idx);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+
+ /* loading subprog addresses */
+ if (sym_is_subprog(sym, obj->efile.text_shndx)) {
+ /* global_func: sym->st_value = offset in the section, insn->imm = 0.
+ * local_func: sym->st_value = 0, insn->imm = offset in the section.
+ */
+ if ((sym->st_value % BPF_INSN_SZ) || (insn->imm % BPF_INSN_SZ)) {
+ pr_warn("prog '%s': bad subprog addr relo against '%s' at offset %zu+%d\n",
+ prog->name, sym_name, (size_t)sym->st_value, insn->imm);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+
+ reloc_desc->type = RELO_SUBPROG_ADDR;
+ reloc_desc->insn_idx = insn_idx;
+ reloc_desc->sym_off = sym->st_value;
+ return 0;
+ }
+
+ type = bpf_object__section_to_libbpf_map_type(obj, shdr_idx);
+ sym_sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, shdr_idx));
+
+ /* generic map reference relocation */
+ if (type == LIBBPF_MAP_UNSPEC) {
+ if (!bpf_object__shndx_is_maps(obj, shdr_idx)) {
+ pr_warn("prog '%s': bad map relo against '%s' in section '%s'\n",
+ prog->name, sym_name, sym_sec_name);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+ for (map_idx = 0; map_idx < nr_maps; map_idx++) {
+ map = &obj->maps[map_idx];
+ if (map->libbpf_type != type ||
+ map->sec_idx != sym->st_shndx ||
+ map->sec_offset != sym->st_value)
+ continue;
+ pr_debug("prog '%s': found map %zd (%s, sec %d, off %zu) for insn #%u\n",
+ prog->name, map_idx, map->name, map->sec_idx,
+ map->sec_offset, insn_idx);
+ break;
+ }
+ if (map_idx >= nr_maps) {
+ pr_warn("prog '%s': map relo failed to find map for section '%s', off %zu\n",
+ prog->name, sym_sec_name, (size_t)sym->st_value);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+ reloc_desc->type = RELO_LD64;
+ reloc_desc->insn_idx = insn_idx;
+ reloc_desc->map_idx = map_idx;
+ reloc_desc->sym_off = 0; /* sym->st_value determines map_idx */
+ return 0;
+ }
+
+ /* global data map relocation */
+ if (!bpf_object__shndx_is_data(obj, shdr_idx)) {
+ pr_warn("prog '%s': bad data relo against section '%s'\n",
+ prog->name, sym_sec_name);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+ for (map_idx = 0; map_idx < nr_maps; map_idx++) {
+ map = &obj->maps[map_idx];
+ if (map->libbpf_type != type || map->sec_idx != sym->st_shndx)
+ continue;
+ pr_debug("prog '%s': found data map %zd (%s, sec %d, off %zu) for insn %u\n",
+ prog->name, map_idx, map->name, map->sec_idx,
+ map->sec_offset, insn_idx);
+ break;
+ }
+ if (map_idx >= nr_maps) {
+ pr_warn("prog '%s': data relo failed to find map for section '%s'\n",
+ prog->name, sym_sec_name);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+
+ reloc_desc->type = RELO_DATA;
+ reloc_desc->insn_idx = insn_idx;
+ reloc_desc->map_idx = map_idx;
+ reloc_desc->sym_off = sym->st_value;
+ return 0;
+}
+
+static bool prog_contains_insn(const struct bpf_program *prog, size_t insn_idx)
+{
+ return insn_idx >= prog->sec_insn_off &&
+ insn_idx < prog->sec_insn_off + prog->sec_insn_cnt;
+}
+
+static struct bpf_program *find_prog_by_sec_insn(const struct bpf_object *obj,
+ size_t sec_idx, size_t insn_idx)
+{
+ int l = 0, r = obj->nr_programs - 1, m;
+ struct bpf_program *prog;
+
+ if (!obj->nr_programs)
+ return NULL;
+
+ while (l < r) {
+ m = l + (r - l + 1) / 2;
+ prog = &obj->programs[m];
+
+ if (prog->sec_idx < sec_idx ||
+ (prog->sec_idx == sec_idx && prog->sec_insn_off <= insn_idx))
+ l = m;
+ else
+ r = m - 1;
+ }
+ /* matching program could be at index l, but it still might be the
+ * wrong one, so we need to double check conditions for the last time
+ */
+ prog = &obj->programs[l];
+ if (prog->sec_idx == sec_idx && prog_contains_insn(prog, insn_idx))
+ return prog;
+ return NULL;
+}
+
+static int
+bpf_object__collect_prog_relos(struct bpf_object *obj, Elf64_Shdr *shdr, Elf_Data *data)
+{
+ const char *relo_sec_name, *sec_name;
+ size_t sec_idx = shdr->sh_info, sym_idx;
+ struct bpf_program *prog;
+ struct reloc_desc *relos;
+ int err, i, nrels;
+ const char *sym_name;
+ __u32 insn_idx;
+ Elf_Scn *scn;
+ Elf_Data *scn_data;
+ Elf64_Sym *sym;
+ Elf64_Rel *rel;
+
+ if (sec_idx >= obj->efile.sec_cnt)
+ return -EINVAL;
+
+ scn = elf_sec_by_idx(obj, sec_idx);
+ scn_data = elf_sec_data(obj, scn);
+
+ relo_sec_name = elf_sec_str(obj, shdr->sh_name);
+ sec_name = elf_sec_name(obj, scn);
+ if (!relo_sec_name || !sec_name)
+ return -EINVAL;
+
+ pr_debug("sec '%s': collecting relocation for section(%zu) '%s'\n",
+ relo_sec_name, sec_idx, sec_name);
+ nrels = shdr->sh_size / shdr->sh_entsize;
+
+ for (i = 0; i < nrels; i++) {
+ rel = elf_rel_by_idx(data, i);
+ if (!rel) {
+ pr_warn("sec '%s': failed to get relo #%d\n", relo_sec_name, i);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+
+ sym_idx = ELF64_R_SYM(rel->r_info);
+ sym = elf_sym_by_idx(obj, sym_idx);
+ if (!sym) {
+ pr_warn("sec '%s': symbol #%zu not found for relo #%d\n",
+ relo_sec_name, sym_idx, i);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+
+ if (sym->st_shndx >= obj->efile.sec_cnt) {
+ pr_warn("sec '%s': corrupted symbol #%zu pointing to invalid section #%zu for relo #%d\n",
+ relo_sec_name, sym_idx, (size_t)sym->st_shndx, i);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+
+ if (rel->r_offset % BPF_INSN_SZ || rel->r_offset >= scn_data->d_size) {
+ pr_warn("sec '%s': invalid offset 0x%zx for relo #%d\n",
+ relo_sec_name, (size_t)rel->r_offset, i);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+
+ insn_idx = rel->r_offset / BPF_INSN_SZ;
+ /* relocations against static functions are recorded as
+ * relocations against the section that contains a function;
+ * in such case, symbol will be STT_SECTION and sym.st_name
+ * will point to empty string (0), so fetch section name
+ * instead
+ */
+ if (ELF64_ST_TYPE(sym->st_info) == STT_SECTION && sym->st_name == 0)
+ sym_name = elf_sec_name(obj, elf_sec_by_idx(obj, sym->st_shndx));
+ else
+ sym_name = elf_sym_str(obj, sym->st_name);
+ sym_name = sym_name ?: "<?";
+
+ pr_debug("sec '%s': relo #%d: insn #%u against '%s'\n",
+ relo_sec_name, i, insn_idx, sym_name);
+
+ prog = find_prog_by_sec_insn(obj, sec_idx, insn_idx);
+ if (!prog) {
+ pr_debug("sec '%s': relo #%d: couldn't find program in section '%s' for insn #%u, probably overridden weak function, skipping...\n",
+ relo_sec_name, i, sec_name, insn_idx);
+ continue;
+ }
+
+ relos = libbpf_reallocarray(prog->reloc_desc,
+ prog->nr_reloc + 1, sizeof(*relos));
+ if (!relos)
+ return -ENOMEM;
+ prog->reloc_desc = relos;
+
+ /* adjust insn_idx to local BPF program frame of reference */
+ insn_idx -= prog->sec_insn_off;
+ err = bpf_program__record_reloc(prog, &relos[prog->nr_reloc],
+ insn_idx, sym_name, sym, rel);
+ if (err)
+ return err;
+
+ prog->nr_reloc++;
+ }
+ return 0;
+}
+
+static int map_fill_btf_type_info(struct bpf_object *obj, struct bpf_map *map)
+{
+ int id;
+
+ if (!obj->btf)
+ return -ENOENT;
+
+ /* if it's BTF-defined map, we don't need to search for type IDs.
+ * For struct_ops map, it does not need btf_key_type_id and
+ * btf_value_type_id.
+ */
+ if (map->sec_idx == obj->efile.btf_maps_shndx || bpf_map__is_struct_ops(map))
+ return 0;
+
+ /*
+ * LLVM annotates global data differently in BTF, that is,
+ * only as '.data', '.bss' or '.rodata'.
+ */
+ if (!bpf_map__is_internal(map))
+ return -ENOENT;
+
+ id = btf__find_by_name(obj->btf, map->real_name);
+ if (id < 0)
+ return id;
+
+ map->btf_key_type_id = 0;
+ map->btf_value_type_id = id;
+ return 0;
+}
+
+static int bpf_get_map_info_from_fdinfo(int fd, struct bpf_map_info *info)
+{
+ char file[PATH_MAX], buff[4096];
+ FILE *fp;
+ __u32 val;
+ int err;
+
+ snprintf(file, sizeof(file), "/proc/%d/fdinfo/%d", getpid(), fd);
+ memset(info, 0, sizeof(*info));
+
+ fp = fopen(file, "r");
+ if (!fp) {
+ err = -errno;
+ pr_warn("failed to open %s: %d. No procfs support?\n", file,
+ err);
+ return err;
+ }
+
+ while (fgets(buff, sizeof(buff), fp)) {
+ if (sscanf(buff, "map_type:\t%u", &val) == 1)
+ info->type = val;
+ else if (sscanf(buff, "key_size:\t%u", &val) == 1)
+ info->key_size = val;
+ else if (sscanf(buff, "value_size:\t%u", &val) == 1)
+ info->value_size = val;
+ else if (sscanf(buff, "max_entries:\t%u", &val) == 1)
+ info->max_entries = val;
+ else if (sscanf(buff, "map_flags:\t%i", &val) == 1)
+ info->map_flags = val;
+ }
+
+ fclose(fp);
+
+ return 0;
+}
+
+bool bpf_map__autocreate(const struct bpf_map *map)
+{
+ return map->autocreate;
+}
+
+int bpf_map__set_autocreate(struct bpf_map *map, bool autocreate)
+{
+ if (map->obj->loaded)
+ return libbpf_err(-EBUSY);
+
+ map->autocreate = autocreate;
+ return 0;
+}
+
+int bpf_map__reuse_fd(struct bpf_map *map, int fd)
+{
+ struct bpf_map_info info;
+ __u32 len = sizeof(info), name_len;
+ int new_fd, err;
+ char *new_name;
+
+ memset(&info, 0, len);
+ err = bpf_obj_get_info_by_fd(fd, &info, &len);
+ if (err && errno == EINVAL)
+ err = bpf_get_map_info_from_fdinfo(fd, &info);
+ if (err)
+ return libbpf_err(err);
+
+ name_len = strlen(info.name);
+ if (name_len == BPF_OBJ_NAME_LEN - 1 && strncmp(map->name, info.name, name_len) == 0)
+ new_name = strdup(map->name);
+ else
+ new_name = strdup(info.name);
+
+ if (!new_name)
+ return libbpf_err(-errno);
+
+ new_fd = open("/", O_RDONLY | O_CLOEXEC);
+ if (new_fd < 0) {
+ err = -errno;
+ goto err_free_new_name;
+ }
+
+ new_fd = dup3(fd, new_fd, O_CLOEXEC);
+ if (new_fd < 0) {
+ err = -errno;
+ goto err_close_new_fd;
+ }
+
+ err = zclose(map->fd);
+ if (err) {
+ err = -errno;
+ goto err_close_new_fd;
+ }
+ free(map->name);
+
+ map->fd = new_fd;
+ map->name = new_name;
+ map->def.type = info.type;
+ map->def.key_size = info.key_size;
+ map->def.value_size = info.value_size;
+ map->def.max_entries = info.max_entries;
+ map->def.map_flags = info.map_flags;
+ map->btf_key_type_id = info.btf_key_type_id;
+ map->btf_value_type_id = info.btf_value_type_id;
+ map->reused = true;
+ map->map_extra = info.map_extra;
+
+ return 0;
+
+err_close_new_fd:
+ close(new_fd);
+err_free_new_name:
+ free(new_name);
+ return libbpf_err(err);
+}
+
+__u32 bpf_map__max_entries(const struct bpf_map *map)
+{
+ return map->def.max_entries;
+}
+
+struct bpf_map *bpf_map__inner_map(struct bpf_map *map)
+{
+ if (!bpf_map_type__is_map_in_map(map->def.type))
+ return errno = EINVAL, NULL;
+
+ return map->inner_map;
+}
+
+int bpf_map__set_max_entries(struct bpf_map *map, __u32 max_entries)
+{
+ if (map->obj->loaded)
+ return libbpf_err(-EBUSY);
+
+ map->def.max_entries = max_entries;
+
+ /* auto-adjust BPF ringbuf map max_entries to be a multiple of page size */
+ if (map_is_ringbuf(map))
+ map->def.max_entries = adjust_ringbuf_sz(map->def.max_entries);
+
+ return 0;
+}
+
+static int
+bpf_object__probe_loading(struct bpf_object *obj)
+{
+ char *cp, errmsg[STRERR_BUFSIZE];
+ struct bpf_insn insns[] = {
+ BPF_MOV64_IMM(BPF_REG_0, 0),
+ BPF_EXIT_INSN(),
+ };
+ int ret, insn_cnt = ARRAY_SIZE(insns);
+
+ if (obj->gen_loader)
+ return 0;
+
+ ret = bump_rlimit_memlock();
+ if (ret)
+ pr_warn("Failed to bump RLIMIT_MEMLOCK (err = %d), you might need to do it explicitly!\n", ret);
+
+ /* make sure basic loading works */
+ ret = bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, NULL, "GPL", insns, insn_cnt, NULL);
+ if (ret < 0)
+ ret = bpf_prog_load(BPF_PROG_TYPE_TRACEPOINT, NULL, "GPL", insns, insn_cnt, NULL);
+ if (ret < 0) {
+ ret = errno;
+ cp = libbpf_strerror_r(ret, errmsg, sizeof(errmsg));
+ pr_warn("Error in %s():%s(%d). Couldn't load trivial BPF "
+ "program. Make sure your kernel supports BPF "
+ "(CONFIG_BPF_SYSCALL=y) and/or that RLIMIT_MEMLOCK is "
+ "set to big enough value.\n", __func__, cp, ret);
+ return -ret;
+ }
+ close(ret);
+
+ return 0;
+}
+
+static int probe_fd(int fd)
+{
+ if (fd >= 0)
+ close(fd);
+ return fd >= 0;
+}
+
+static int probe_kern_prog_name(void)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, prog_name);
+ struct bpf_insn insns[] = {
+ BPF_MOV64_IMM(BPF_REG_0, 0),
+ BPF_EXIT_INSN(),
+ };
+ union bpf_attr attr;
+ int ret;
+
+ memset(&attr, 0, attr_sz);
+ attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER;
+ attr.license = ptr_to_u64("GPL");
+ attr.insns = ptr_to_u64(insns);
+ attr.insn_cnt = (__u32)ARRAY_SIZE(insns);
+ libbpf_strlcpy(attr.prog_name, "libbpf_nametest", sizeof(attr.prog_name));
+
+ /* make sure loading with name works */
+ ret = sys_bpf_prog_load(&attr, attr_sz, PROG_LOAD_ATTEMPTS);
+ return probe_fd(ret);
+}
+
+static int probe_kern_global_data(void)
+{
+ char *cp, errmsg[STRERR_BUFSIZE];
+ struct bpf_insn insns[] = {
+ BPF_LD_MAP_VALUE(BPF_REG_1, 0, 16),
+ BPF_ST_MEM(BPF_DW, BPF_REG_1, 0, 42),
+ BPF_MOV64_IMM(BPF_REG_0, 0),
+ BPF_EXIT_INSN(),
+ };
+ int ret, map, insn_cnt = ARRAY_SIZE(insns);
+
+ map = bpf_map_create(BPF_MAP_TYPE_ARRAY, "libbpf_global", sizeof(int), 32, 1, NULL);
+ if (map < 0) {
+ ret = -errno;
+ cp = libbpf_strerror_r(ret, errmsg, sizeof(errmsg));
+ pr_warn("Error in %s():%s(%d). Couldn't create simple array map.\n",
+ __func__, cp, -ret);
+ return ret;
+ }
+
+ insns[0].imm = map;
+
+ ret = bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, NULL, "GPL", insns, insn_cnt, NULL);
+ close(map);
+ return probe_fd(ret);
+}
+
+static int probe_kern_btf(void)
+{
+ static const char strs[] = "\0int";
+ __u32 types[] = {
+ /* int */
+ BTF_TYPE_INT_ENC(1, BTF_INT_SIGNED, 0, 32, 4),
+ };
+
+ return probe_fd(libbpf__load_raw_btf((char *)types, sizeof(types),
+ strs, sizeof(strs)));
+}
+
+static int probe_kern_btf_func(void)
+{
+ static const char strs[] = "\0int\0x\0a";
+ /* void x(int a) {} */
+ __u32 types[] = {
+ /* int */
+ BTF_TYPE_INT_ENC(1, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
+ /* FUNC_PROTO */ /* [2] */
+ BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_FUNC_PROTO, 0, 1), 0),
+ BTF_PARAM_ENC(7, 1),
+ /* FUNC x */ /* [3] */
+ BTF_TYPE_ENC(5, BTF_INFO_ENC(BTF_KIND_FUNC, 0, 0), 2),
+ };
+
+ return probe_fd(libbpf__load_raw_btf((char *)types, sizeof(types),
+ strs, sizeof(strs)));
+}
+
+static int probe_kern_btf_func_global(void)
+{
+ static const char strs[] = "\0int\0x\0a";
+ /* static void x(int a) {} */
+ __u32 types[] = {
+ /* int */
+ BTF_TYPE_INT_ENC(1, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
+ /* FUNC_PROTO */ /* [2] */
+ BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_FUNC_PROTO, 0, 1), 0),
+ BTF_PARAM_ENC(7, 1),
+ /* FUNC x BTF_FUNC_GLOBAL */ /* [3] */
+ BTF_TYPE_ENC(5, BTF_INFO_ENC(BTF_KIND_FUNC, 0, BTF_FUNC_GLOBAL), 2),
+ };
+
+ return probe_fd(libbpf__load_raw_btf((char *)types, sizeof(types),
+ strs, sizeof(strs)));
+}
+
+static int probe_kern_btf_datasec(void)
+{
+ static const char strs[] = "\0x\0.data";
+ /* static int a; */
+ __u32 types[] = {
+ /* int */
+ BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
+ /* VAR x */ /* [2] */
+ BTF_TYPE_ENC(1, BTF_INFO_ENC(BTF_KIND_VAR, 0, 0), 1),
+ BTF_VAR_STATIC,
+ /* DATASEC val */ /* [3] */
+ BTF_TYPE_ENC(3, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
+ BTF_VAR_SECINFO_ENC(2, 0, 4),
+ };
+
+ return probe_fd(libbpf__load_raw_btf((char *)types, sizeof(types),
+ strs, sizeof(strs)));
+}
+
+static int probe_kern_btf_float(void)
+{
+ static const char strs[] = "\0float";
+ __u32 types[] = {
+ /* float */
+ BTF_TYPE_FLOAT_ENC(1, 4),
+ };
+
+ return probe_fd(libbpf__load_raw_btf((char *)types, sizeof(types),
+ strs, sizeof(strs)));
+}
+
+static int probe_kern_btf_decl_tag(void)
+{
+ static const char strs[] = "\0tag";
+ __u32 types[] = {
+ /* int */
+ BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
+ /* VAR x */ /* [2] */
+ BTF_TYPE_ENC(1, BTF_INFO_ENC(BTF_KIND_VAR, 0, 0), 1),
+ BTF_VAR_STATIC,
+ /* attr */
+ BTF_TYPE_DECL_TAG_ENC(1, 2, -1),
+ };
+
+ return probe_fd(libbpf__load_raw_btf((char *)types, sizeof(types),
+ strs, sizeof(strs)));
+}
+
+static int probe_kern_btf_type_tag(void)
+{
+ static const char strs[] = "\0tag";
+ __u32 types[] = {
+ /* int */
+ BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
+ /* attr */
+ BTF_TYPE_TYPE_TAG_ENC(1, 1), /* [2] */
+ /* ptr */
+ BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 2), /* [3] */
+ };
+
+ return probe_fd(libbpf__load_raw_btf((char *)types, sizeof(types),
+ strs, sizeof(strs)));
+}
+
+static int probe_kern_array_mmap(void)
+{
+ LIBBPF_OPTS(bpf_map_create_opts, opts, .map_flags = BPF_F_MMAPABLE);
+ int fd;
+
+ fd = bpf_map_create(BPF_MAP_TYPE_ARRAY, "libbpf_mmap", sizeof(int), sizeof(int), 1, &opts);
+ return probe_fd(fd);
+}
+
+static int probe_kern_exp_attach_type(void)
+{
+ LIBBPF_OPTS(bpf_prog_load_opts, opts, .expected_attach_type = BPF_CGROUP_INET_SOCK_CREATE);
+ struct bpf_insn insns[] = {
+ BPF_MOV64_IMM(BPF_REG_0, 0),
+ BPF_EXIT_INSN(),
+ };
+ int fd, insn_cnt = ARRAY_SIZE(insns);
+
+ /* use any valid combination of program type and (optional)
+ * non-zero expected attach type (i.e., not a BPF_CGROUP_INET_INGRESS)
+ * to see if kernel supports expected_attach_type field for
+ * BPF_PROG_LOAD command
+ */
+ fd = bpf_prog_load(BPF_PROG_TYPE_CGROUP_SOCK, NULL, "GPL", insns, insn_cnt, &opts);
+ return probe_fd(fd);
+}
+
+static int probe_kern_probe_read_kernel(void)
+{
+ struct bpf_insn insns[] = {
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_10), /* r1 = r10 (fp) */
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8), /* r1 += -8 */
+ BPF_MOV64_IMM(BPF_REG_2, 8), /* r2 = 8 */
+ BPF_MOV64_IMM(BPF_REG_3, 0), /* r3 = 0 */
+ BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_probe_read_kernel),
+ BPF_EXIT_INSN(),
+ };
+ int fd, insn_cnt = ARRAY_SIZE(insns);
+
+ fd = bpf_prog_load(BPF_PROG_TYPE_TRACEPOINT, NULL, "GPL", insns, insn_cnt, NULL);
+ return probe_fd(fd);
+}
+
+static int probe_prog_bind_map(void)
+{
+ char *cp, errmsg[STRERR_BUFSIZE];
+ struct bpf_insn insns[] = {
+ BPF_MOV64_IMM(BPF_REG_0, 0),
+ BPF_EXIT_INSN(),
+ };
+ int ret, map, prog, insn_cnt = ARRAY_SIZE(insns);
+
+ map = bpf_map_create(BPF_MAP_TYPE_ARRAY, "libbpf_det_bind", sizeof(int), 32, 1, NULL);
+ if (map < 0) {
+ ret = -errno;
+ cp = libbpf_strerror_r(ret, errmsg, sizeof(errmsg));
+ pr_warn("Error in %s():%s(%d). Couldn't create simple array map.\n",
+ __func__, cp, -ret);
+ return ret;
+ }
+
+ prog = bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, NULL, "GPL", insns, insn_cnt, NULL);
+ if (prog < 0) {
+ close(map);
+ return 0;
+ }
+
+ ret = bpf_prog_bind_map(prog, map, NULL);
+
+ close(map);
+ close(prog);
+
+ return ret >= 0;
+}
+
+static int probe_module_btf(void)
+{
+ static const char strs[] = "\0int";
+ __u32 types[] = {
+ /* int */
+ BTF_TYPE_INT_ENC(1, BTF_INT_SIGNED, 0, 32, 4),
+ };
+ struct bpf_btf_info info;
+ __u32 len = sizeof(info);
+ char name[16];
+ int fd, err;
+
+ fd = libbpf__load_raw_btf((char *)types, sizeof(types), strs, sizeof(strs));
+ if (fd < 0)
+ return 0; /* BTF not supported at all */
+
+ memset(&info, 0, sizeof(info));
+ info.name = ptr_to_u64(name);
+ info.name_len = sizeof(name);
+
+ /* check that BPF_OBJ_GET_INFO_BY_FD supports specifying name pointer;
+ * kernel's module BTF support coincides with support for
+ * name/name_len fields in struct bpf_btf_info.
+ */
+ err = bpf_obj_get_info_by_fd(fd, &info, &len);
+ close(fd);
+ return !err;
+}
+
+static int probe_perf_link(void)
+{
+ struct bpf_insn insns[] = {
+ BPF_MOV64_IMM(BPF_REG_0, 0),
+ BPF_EXIT_INSN(),
+ };
+ int prog_fd, link_fd, err;
+
+ prog_fd = bpf_prog_load(BPF_PROG_TYPE_TRACEPOINT, NULL, "GPL",
+ insns, ARRAY_SIZE(insns), NULL);
+ if (prog_fd < 0)
+ return -errno;
+
+ /* use invalid perf_event FD to get EBADF, if link is supported;
+ * otherwise EINVAL should be returned
+ */
+ link_fd = bpf_link_create(prog_fd, -1, BPF_PERF_EVENT, NULL);
+ err = -errno; /* close() can clobber errno */
+
+ if (link_fd >= 0)
+ close(link_fd);
+ close(prog_fd);
+
+ return link_fd < 0 && err == -EBADF;
+}
+
+static int probe_kern_bpf_cookie(void)
+{
+ struct bpf_insn insns[] = {
+ BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_get_attach_cookie),
+ BPF_EXIT_INSN(),
+ };
+ int ret, insn_cnt = ARRAY_SIZE(insns);
+
+ ret = bpf_prog_load(BPF_PROG_TYPE_KPROBE, NULL, "GPL", insns, insn_cnt, NULL);
+ return probe_fd(ret);
+}
+
+static int probe_kern_btf_enum64(void)
+{
+ static const char strs[] = "\0enum64";
+ __u32 types[] = {
+ BTF_TYPE_ENC(1, BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 0), 8),
+ };
+
+ return probe_fd(libbpf__load_raw_btf((char *)types, sizeof(types),
+ strs, sizeof(strs)));
+}
+
+static int probe_kern_syscall_wrapper(void);
+
+enum kern_feature_result {
+ FEAT_UNKNOWN = 0,
+ FEAT_SUPPORTED = 1,
+ FEAT_MISSING = 2,
+};
+
+typedef int (*feature_probe_fn)(void);
+
+static struct kern_feature_desc {
+ const char *desc;
+ feature_probe_fn probe;
+ enum kern_feature_result res;
+} feature_probes[__FEAT_CNT] = {
+ [FEAT_PROG_NAME] = {
+ "BPF program name", probe_kern_prog_name,
+ },
+ [FEAT_GLOBAL_DATA] = {
+ "global variables", probe_kern_global_data,
+ },
+ [FEAT_BTF] = {
+ "minimal BTF", probe_kern_btf,
+ },
+ [FEAT_BTF_FUNC] = {
+ "BTF functions", probe_kern_btf_func,
+ },
+ [FEAT_BTF_GLOBAL_FUNC] = {
+ "BTF global function", probe_kern_btf_func_global,
+ },
+ [FEAT_BTF_DATASEC] = {
+ "BTF data section and variable", probe_kern_btf_datasec,
+ },
+ [FEAT_ARRAY_MMAP] = {
+ "ARRAY map mmap()", probe_kern_array_mmap,
+ },
+ [FEAT_EXP_ATTACH_TYPE] = {
+ "BPF_PROG_LOAD expected_attach_type attribute",
+ probe_kern_exp_attach_type,
+ },
+ [FEAT_PROBE_READ_KERN] = {
+ "bpf_probe_read_kernel() helper", probe_kern_probe_read_kernel,
+ },
+ [FEAT_PROG_BIND_MAP] = {
+ "BPF_PROG_BIND_MAP support", probe_prog_bind_map,
+ },
+ [FEAT_MODULE_BTF] = {
+ "module BTF support", probe_module_btf,
+ },
+ [FEAT_BTF_FLOAT] = {
+ "BTF_KIND_FLOAT support", probe_kern_btf_float,
+ },
+ [FEAT_PERF_LINK] = {
+ "BPF perf link support", probe_perf_link,
+ },
+ [FEAT_BTF_DECL_TAG] = {
+ "BTF_KIND_DECL_TAG support", probe_kern_btf_decl_tag,
+ },
+ [FEAT_BTF_TYPE_TAG] = {
+ "BTF_KIND_TYPE_TAG support", probe_kern_btf_type_tag,
+ },
+ [FEAT_MEMCG_ACCOUNT] = {
+ "memcg-based memory accounting", probe_memcg_account,
+ },
+ [FEAT_BPF_COOKIE] = {
+ "BPF cookie support", probe_kern_bpf_cookie,
+ },
+ [FEAT_BTF_ENUM64] = {
+ "BTF_KIND_ENUM64 support", probe_kern_btf_enum64,
+ },
+ [FEAT_SYSCALL_WRAPPER] = {
+ "Kernel using syscall wrapper", probe_kern_syscall_wrapper,
+ },
+};
+
+bool kernel_supports(const struct bpf_object *obj, enum kern_feature_id feat_id)
+{
+ struct kern_feature_desc *feat = &feature_probes[feat_id];
+ int ret;
+
+ if (obj && obj->gen_loader)
+ /* To generate loader program assume the latest kernel
+ * to avoid doing extra prog_load, map_create syscalls.
+ */
+ return true;
+
+ if (READ_ONCE(feat->res) == FEAT_UNKNOWN) {
+ ret = feat->probe();
+ if (ret > 0) {
+ WRITE_ONCE(feat->res, FEAT_SUPPORTED);
+ } else if (ret == 0) {
+ WRITE_ONCE(feat->res, FEAT_MISSING);
+ } else {
+ pr_warn("Detection of kernel %s support failed: %d\n", feat->desc, ret);
+ WRITE_ONCE(feat->res, FEAT_MISSING);
+ }
+ }
+
+ return READ_ONCE(feat->res) == FEAT_SUPPORTED;
+}
+
+static bool map_is_reuse_compat(const struct bpf_map *map, int map_fd)
+{
+ struct bpf_map_info map_info;
+ char msg[STRERR_BUFSIZE];
+ __u32 map_info_len = sizeof(map_info);
+ int err;
+
+ memset(&map_info, 0, map_info_len);
+ err = bpf_obj_get_info_by_fd(map_fd, &map_info, &map_info_len);
+ if (err && errno == EINVAL)
+ err = bpf_get_map_info_from_fdinfo(map_fd, &map_info);
+ if (err) {
+ pr_warn("failed to get map info for map FD %d: %s\n", map_fd,
+ libbpf_strerror_r(errno, msg, sizeof(msg)));
+ return false;
+ }
+
+ return (map_info.type == map->def.type &&
+ map_info.key_size == map->def.key_size &&
+ map_info.value_size == map->def.value_size &&
+ map_info.max_entries == map->def.max_entries &&
+ map_info.map_flags == map->def.map_flags &&
+ map_info.map_extra == map->map_extra);
+}
+
+static int
+bpf_object__reuse_map(struct bpf_map *map)
+{
+ char *cp, errmsg[STRERR_BUFSIZE];
+ int err, pin_fd;
+
+ pin_fd = bpf_obj_get(map->pin_path);
+ if (pin_fd < 0) {
+ err = -errno;
+ if (err == -ENOENT) {
+ pr_debug("found no pinned map to reuse at '%s'\n",
+ map->pin_path);
+ return 0;
+ }
+
+ cp = libbpf_strerror_r(-err, errmsg, sizeof(errmsg));
+ pr_warn("couldn't retrieve pinned map '%s': %s\n",
+ map->pin_path, cp);
+ return err;
+ }
+
+ if (!map_is_reuse_compat(map, pin_fd)) {
+ pr_warn("couldn't reuse pinned map at '%s': parameter mismatch\n",
+ map->pin_path);
+ close(pin_fd);
+ return -EINVAL;
+ }
+
+ err = bpf_map__reuse_fd(map, pin_fd);
+ close(pin_fd);
+ if (err)
+ return err;
+
+ map->pinned = true;
+ pr_debug("reused pinned map at '%s'\n", map->pin_path);
+
+ return 0;
+}
+
+static int
+bpf_object__populate_internal_map(struct bpf_object *obj, struct bpf_map *map)
+{
+ enum libbpf_map_type map_type = map->libbpf_type;
+ char *cp, errmsg[STRERR_BUFSIZE];
+ int err, zero = 0;
+
+ if (obj->gen_loader) {
+ bpf_gen__map_update_elem(obj->gen_loader, map - obj->maps,
+ map->mmaped, map->def.value_size);
+ if (map_type == LIBBPF_MAP_RODATA || map_type == LIBBPF_MAP_KCONFIG)
+ bpf_gen__map_freeze(obj->gen_loader, map - obj->maps);
+ return 0;
+ }
+ err = bpf_map_update_elem(map->fd, &zero, map->mmaped, 0);
+ if (err) {
+ err = -errno;
+ cp = libbpf_strerror_r(err, errmsg, sizeof(errmsg));
+ pr_warn("Error setting initial map(%s) contents: %s\n",
+ map->name, cp);
+ return err;
+ }
+
+ /* Freeze .rodata and .kconfig map as read-only from syscall side. */
+ if (map_type == LIBBPF_MAP_RODATA || map_type == LIBBPF_MAP_KCONFIG) {
+ err = bpf_map_freeze(map->fd);
+ if (err) {
+ err = -errno;
+ cp = libbpf_strerror_r(err, errmsg, sizeof(errmsg));
+ pr_warn("Error freezing map(%s) as read-only: %s\n",
+ map->name, cp);
+ return err;
+ }
+ }
+ return 0;
+}
+
+static void bpf_map__destroy(struct bpf_map *map);
+
+static int bpf_object__create_map(struct bpf_object *obj, struct bpf_map *map, bool is_inner)
+{
+ LIBBPF_OPTS(bpf_map_create_opts, create_attr);
+ struct bpf_map_def *def = &map->def;
+ const char *map_name = NULL;
+ int err = 0;
+
+ if (kernel_supports(obj, FEAT_PROG_NAME))
+ map_name = map->name;
+ create_attr.map_ifindex = map->map_ifindex;
+ create_attr.map_flags = def->map_flags;
+ create_attr.numa_node = map->numa_node;
+ create_attr.map_extra = map->map_extra;
+
+ if (bpf_map__is_struct_ops(map))
+ create_attr.btf_vmlinux_value_type_id = map->btf_vmlinux_value_type_id;
+
+ if (obj->btf && btf__fd(obj->btf) >= 0) {
+ create_attr.btf_fd = btf__fd(obj->btf);
+ create_attr.btf_key_type_id = map->btf_key_type_id;
+ create_attr.btf_value_type_id = map->btf_value_type_id;
+ }
+
+ if (bpf_map_type__is_map_in_map(def->type)) {
+ if (map->inner_map) {
+ err = bpf_object__create_map(obj, map->inner_map, true);
+ if (err) {
+ pr_warn("map '%s': failed to create inner map: %d\n",
+ map->name, err);
+ return err;
+ }
+ map->inner_map_fd = bpf_map__fd(map->inner_map);
+ }
+ if (map->inner_map_fd >= 0)
+ create_attr.inner_map_fd = map->inner_map_fd;
+ }
+
+ switch (def->type) {
+ case BPF_MAP_TYPE_PERF_EVENT_ARRAY:
+ case BPF_MAP_TYPE_CGROUP_ARRAY:
+ case BPF_MAP_TYPE_STACK_TRACE:
+ case BPF_MAP_TYPE_ARRAY_OF_MAPS:
+ case BPF_MAP_TYPE_HASH_OF_MAPS:
+ case BPF_MAP_TYPE_DEVMAP:
+ case BPF_MAP_TYPE_DEVMAP_HASH:
+ case BPF_MAP_TYPE_CPUMAP:
+ case BPF_MAP_TYPE_XSKMAP:
+ case BPF_MAP_TYPE_SOCKMAP:
+ case BPF_MAP_TYPE_SOCKHASH:
+ case BPF_MAP_TYPE_QUEUE:
+ case BPF_MAP_TYPE_STACK:
+ create_attr.btf_fd = 0;
+ create_attr.btf_key_type_id = 0;
+ create_attr.btf_value_type_id = 0;
+ map->btf_key_type_id = 0;
+ map->btf_value_type_id = 0;
+ default:
+ break;
+ }
+
+ if (obj->gen_loader) {
+ bpf_gen__map_create(obj->gen_loader, def->type, map_name,
+ def->key_size, def->value_size, def->max_entries,
+ &create_attr, is_inner ? -1 : map - obj->maps);
+ /* Pretend to have valid FD to pass various fd >= 0 checks.
+ * This fd == 0 will not be used with any syscall and will be reset to -1 eventually.
+ */
+ map->fd = 0;
+ } else {
+ map->fd = bpf_map_create(def->type, map_name,
+ def->key_size, def->value_size,
+ def->max_entries, &create_attr);
+ }
+ if (map->fd < 0 && (create_attr.btf_key_type_id ||
+ create_attr.btf_value_type_id)) {
+ char *cp, errmsg[STRERR_BUFSIZE];
+
+ err = -errno;
+ cp = libbpf_strerror_r(err, errmsg, sizeof(errmsg));
+ pr_warn("Error in bpf_create_map_xattr(%s):%s(%d). Retrying without BTF.\n",
+ map->name, cp, err);
+ create_attr.btf_fd = 0;
+ create_attr.btf_key_type_id = 0;
+ create_attr.btf_value_type_id = 0;
+ map->btf_key_type_id = 0;
+ map->btf_value_type_id = 0;
+ map->fd = bpf_map_create(def->type, map_name,
+ def->key_size, def->value_size,
+ def->max_entries, &create_attr);
+ }
+
+ err = map->fd < 0 ? -errno : 0;
+
+ if (bpf_map_type__is_map_in_map(def->type) && map->inner_map) {
+ if (obj->gen_loader)
+ map->inner_map->fd = -1;
+ bpf_map__destroy(map->inner_map);
+ zfree(&map->inner_map);
+ }
+
+ return err;
+}
+
+static int init_map_in_map_slots(struct bpf_object *obj, struct bpf_map *map)
+{
+ const struct bpf_map *targ_map;
+ unsigned int i;
+ int fd, err = 0;
+
+ for (i = 0; i < map->init_slots_sz; i++) {
+ if (!map->init_slots[i])
+ continue;
+
+ targ_map = map->init_slots[i];
+ fd = bpf_map__fd(targ_map);
+
+ if (obj->gen_loader) {
+ bpf_gen__populate_outer_map(obj->gen_loader,
+ map - obj->maps, i,
+ targ_map - obj->maps);
+ } else {
+ err = bpf_map_update_elem(map->fd, &i, &fd, 0);
+ }
+ if (err) {
+ err = -errno;
+ pr_warn("map '%s': failed to initialize slot [%d] to map '%s' fd=%d: %d\n",
+ map->name, i, targ_map->name, fd, err);
+ return err;
+ }
+ pr_debug("map '%s': slot [%d] set to map '%s' fd=%d\n",
+ map->name, i, targ_map->name, fd);
+ }
+
+ zfree(&map->init_slots);
+ map->init_slots_sz = 0;
+
+ return 0;
+}
+
+static int init_prog_array_slots(struct bpf_object *obj, struct bpf_map *map)
+{
+ const struct bpf_program *targ_prog;
+ unsigned int i;
+ int fd, err;
+
+ if (obj->gen_loader)
+ return -ENOTSUP;
+
+ for (i = 0; i < map->init_slots_sz; i++) {
+ if (!map->init_slots[i])
+ continue;
+
+ targ_prog = map->init_slots[i];
+ fd = bpf_program__fd(targ_prog);
+
+ err = bpf_map_update_elem(map->fd, &i, &fd, 0);
+ if (err) {
+ err = -errno;
+ pr_warn("map '%s': failed to initialize slot [%d] to prog '%s' fd=%d: %d\n",
+ map->name, i, targ_prog->name, fd, err);
+ return err;
+ }
+ pr_debug("map '%s': slot [%d] set to prog '%s' fd=%d\n",
+ map->name, i, targ_prog->name, fd);
+ }
+
+ zfree(&map->init_slots);
+ map->init_slots_sz = 0;
+
+ return 0;
+}
+
+static int bpf_object_init_prog_arrays(struct bpf_object *obj)
+{
+ struct bpf_map *map;
+ int i, err;
+
+ for (i = 0; i < obj->nr_maps; i++) {
+ map = &obj->maps[i];
+
+ if (!map->init_slots_sz || map->def.type != BPF_MAP_TYPE_PROG_ARRAY)
+ continue;
+
+ err = init_prog_array_slots(obj, map);
+ if (err < 0) {
+ zclose(map->fd);
+ return err;
+ }
+ }
+ return 0;
+}
+
+static int map_set_def_max_entries(struct bpf_map *map)
+{
+ if (map->def.type == BPF_MAP_TYPE_PERF_EVENT_ARRAY && !map->def.max_entries) {
+ int nr_cpus;
+
+ nr_cpus = libbpf_num_possible_cpus();
+ if (nr_cpus < 0) {
+ pr_warn("map '%s': failed to determine number of system CPUs: %d\n",
+ map->name, nr_cpus);
+ return nr_cpus;
+ }
+ pr_debug("map '%s': setting size to %d\n", map->name, nr_cpus);
+ map->def.max_entries = nr_cpus;
+ }
+
+ return 0;
+}
+
+static int
+bpf_object__create_maps(struct bpf_object *obj)
+{
+ struct bpf_map *map;
+ char *cp, errmsg[STRERR_BUFSIZE];
+ unsigned int i, j;
+ int err;
+ bool retried;
+
+ for (i = 0; i < obj->nr_maps; i++) {
+ map = &obj->maps[i];
+
+ /* To support old kernels, we skip creating global data maps
+ * (.rodata, .data, .kconfig, etc); later on, during program
+ * loading, if we detect that at least one of the to-be-loaded
+ * programs is referencing any global data map, we'll error
+ * out with program name and relocation index logged.
+ * This approach allows to accommodate Clang emitting
+ * unnecessary .rodata.str1.1 sections for string literals,
+ * but also it allows to have CO-RE applications that use
+ * global variables in some of BPF programs, but not others.
+ * If those global variable-using programs are not loaded at
+ * runtime due to bpf_program__set_autoload(prog, false),
+ * bpf_object loading will succeed just fine even on old
+ * kernels.
+ */
+ if (bpf_map__is_internal(map) && !kernel_supports(obj, FEAT_GLOBAL_DATA))
+ map->autocreate = false;
+
+ if (!map->autocreate) {
+ pr_debug("map '%s': skipped auto-creating...\n", map->name);
+ continue;
+ }
+
+ err = map_set_def_max_entries(map);
+ if (err)
+ goto err_out;
+
+ retried = false;
+retry:
+ if (map->pin_path) {
+ err = bpf_object__reuse_map(map);
+ if (err) {
+ pr_warn("map '%s': error reusing pinned map\n",
+ map->name);
+ goto err_out;
+ }
+ if (retried && map->fd < 0) {
+ pr_warn("map '%s': cannot find pinned map\n",
+ map->name);
+ err = -ENOENT;
+ goto err_out;
+ }
+ }
+
+ if (map->fd >= 0) {
+ pr_debug("map '%s': skipping creation (preset fd=%d)\n",
+ map->name, map->fd);
+ } else {
+ err = bpf_object__create_map(obj, map, false);
+ if (err)
+ goto err_out;
+
+ pr_debug("map '%s': created successfully, fd=%d\n",
+ map->name, map->fd);
+
+ if (bpf_map__is_internal(map)) {
+ err = bpf_object__populate_internal_map(obj, map);
+ if (err < 0) {
+ zclose(map->fd);
+ goto err_out;
+ }
+ }
+
+ if (map->init_slots_sz && map->def.type != BPF_MAP_TYPE_PROG_ARRAY) {
+ err = init_map_in_map_slots(obj, map);
+ if (err < 0) {
+ zclose(map->fd);
+ goto err_out;
+ }
+ }
+ }
+
+ if (map->pin_path && !map->pinned) {
+ err = bpf_map__pin(map, NULL);
+ if (err) {
+ zclose(map->fd);
+ if (!retried && err == -EEXIST) {
+ retried = true;
+ goto retry;
+ }
+ pr_warn("map '%s': failed to auto-pin at '%s': %d\n",
+ map->name, map->pin_path, err);
+ goto err_out;
+ }
+ }
+ }
+
+ return 0;
+
+err_out:
+ cp = libbpf_strerror_r(err, errmsg, sizeof(errmsg));
+ pr_warn("map '%s': failed to create: %s(%d)\n", map->name, cp, err);
+ pr_perm_msg(err);
+ for (j = 0; j < i; j++)
+ zclose(obj->maps[j].fd);
+ return err;
+}
+
+static bool bpf_core_is_flavor_sep(const char *s)
+{
+ /* check X___Y name pattern, where X and Y are not underscores */
+ return s[0] != '_' && /* X */
+ s[1] == '_' && s[2] == '_' && s[3] == '_' && /* ___ */
+ s[4] != '_'; /* Y */
+}
+
+/* Given 'some_struct_name___with_flavor' return the length of a name prefix
+ * before last triple underscore. Struct name part after last triple
+ * underscore is ignored by BPF CO-RE relocation during relocation matching.
+ */
+size_t bpf_core_essential_name_len(const char *name)
+{
+ size_t n = strlen(name);
+ int i;
+
+ for (i = n - 5; i >= 0; i--) {
+ if (bpf_core_is_flavor_sep(name + i))
+ return i + 1;
+ }
+ return n;
+}
+
+void bpf_core_free_cands(struct bpf_core_cand_list *cands)
+{
+ if (!cands)
+ return;
+
+ free(cands->cands);
+ free(cands);
+}
+
+int bpf_core_add_cands(struct bpf_core_cand *local_cand,
+ size_t local_essent_len,
+ const struct btf *targ_btf,
+ const char *targ_btf_name,
+ int targ_start_id,
+ struct bpf_core_cand_list *cands)
+{
+ struct bpf_core_cand *new_cands, *cand;
+ const struct btf_type *t, *local_t;
+ const char *targ_name, *local_name;
+ size_t targ_essent_len;
+ int n, i;
+
+ local_t = btf__type_by_id(local_cand->btf, local_cand->id);
+ local_name = btf__str_by_offset(local_cand->btf, local_t->name_off);
+
+ n = btf__type_cnt(targ_btf);
+ for (i = targ_start_id; i < n; i++) {
+ t = btf__type_by_id(targ_btf, i);
+ if (!btf_kind_core_compat(t, local_t))
+ continue;
+
+ targ_name = btf__name_by_offset(targ_btf, t->name_off);
+ if (str_is_empty(targ_name))
+ continue;
+
+ targ_essent_len = bpf_core_essential_name_len(targ_name);
+ if (targ_essent_len != local_essent_len)
+ continue;
+
+ if (strncmp(local_name, targ_name, local_essent_len) != 0)
+ continue;
+
+ pr_debug("CO-RE relocating [%d] %s %s: found target candidate [%d] %s %s in [%s]\n",
+ local_cand->id, btf_kind_str(local_t),
+ local_name, i, btf_kind_str(t), targ_name,
+ targ_btf_name);
+ new_cands = libbpf_reallocarray(cands->cands, cands->len + 1,
+ sizeof(*cands->cands));
+ if (!new_cands)
+ return -ENOMEM;
+
+ cand = &new_cands[cands->len];
+ cand->btf = targ_btf;
+ cand->id = i;
+
+ cands->cands = new_cands;
+ cands->len++;
+ }
+ return 0;
+}
+
+static int load_module_btfs(struct bpf_object *obj)
+{
+ struct bpf_btf_info info;
+ struct module_btf *mod_btf;
+ struct btf *btf;
+ char name[64];
+ __u32 id = 0, len;
+ int err, fd;
+
+ if (obj->btf_modules_loaded)
+ return 0;
+
+ if (obj->gen_loader)
+ return 0;
+
+ /* don't do this again, even if we find no module BTFs */
+ obj->btf_modules_loaded = true;
+
+ /* kernel too old to support module BTFs */
+ if (!kernel_supports(obj, FEAT_MODULE_BTF))
+ return 0;
+
+ while (true) {
+ err = bpf_btf_get_next_id(id, &id);
+ if (err && errno == ENOENT)
+ return 0;
+ if (err) {
+ err = -errno;
+ pr_warn("failed to iterate BTF objects: %d\n", err);
+ return err;
+ }
+
+ fd = bpf_btf_get_fd_by_id(id);
+ if (fd < 0) {
+ if (errno == ENOENT)
+ continue; /* expected race: BTF was unloaded */
+ err = -errno;
+ pr_warn("failed to get BTF object #%d FD: %d\n", id, err);
+ return err;
+ }
+
+ len = sizeof(info);
+ memset(&info, 0, sizeof(info));
+ info.name = ptr_to_u64(name);
+ info.name_len = sizeof(name);
+
+ err = bpf_obj_get_info_by_fd(fd, &info, &len);
+ if (err) {
+ err = -errno;
+ pr_warn("failed to get BTF object #%d info: %d\n", id, err);
+ goto err_out;
+ }
+
+ /* ignore non-module BTFs */
+ if (!info.kernel_btf || strcmp(name, "vmlinux") == 0) {
+ close(fd);
+ continue;
+ }
+
+ btf = btf_get_from_fd(fd, obj->btf_vmlinux);
+ err = libbpf_get_error(btf);
+ if (err) {
+ pr_warn("failed to load module [%s]'s BTF object #%d: %d\n",
+ name, id, err);
+ goto err_out;
+ }
+
+ err = libbpf_ensure_mem((void **)&obj->btf_modules, &obj->btf_module_cap,
+ sizeof(*obj->btf_modules), obj->btf_module_cnt + 1);
+ if (err)
+ goto err_out;
+
+ mod_btf = &obj->btf_modules[obj->btf_module_cnt++];
+
+ mod_btf->btf = btf;
+ mod_btf->id = id;
+ mod_btf->fd = fd;
+ mod_btf->name = strdup(name);
+ if (!mod_btf->name) {
+ err = -ENOMEM;
+ goto err_out;
+ }
+ continue;
+
+err_out:
+ close(fd);
+ return err;
+ }
+
+ return 0;
+}
+
+static struct bpf_core_cand_list *
+bpf_core_find_cands(struct bpf_object *obj, const struct btf *local_btf, __u32 local_type_id)
+{
+ struct bpf_core_cand local_cand = {};
+ struct bpf_core_cand_list *cands;
+ const struct btf *main_btf;
+ const struct btf_type *local_t;
+ const char *local_name;
+ size_t local_essent_len;
+ int err, i;
+
+ local_cand.btf = local_btf;
+ local_cand.id = local_type_id;
+ local_t = btf__type_by_id(local_btf, local_type_id);
+ if (!local_t)
+ return ERR_PTR(-EINVAL);
+
+ local_name = btf__name_by_offset(local_btf, local_t->name_off);
+ if (str_is_empty(local_name))
+ return ERR_PTR(-EINVAL);
+ local_essent_len = bpf_core_essential_name_len(local_name);
+
+ cands = calloc(1, sizeof(*cands));
+ if (!cands)
+ return ERR_PTR(-ENOMEM);
+
+ /* Attempt to find target candidates in vmlinux BTF first */
+ main_btf = obj->btf_vmlinux_override ?: obj->btf_vmlinux;
+ err = bpf_core_add_cands(&local_cand, local_essent_len, main_btf, "vmlinux", 1, cands);
+ if (err)
+ goto err_out;
+
+ /* if vmlinux BTF has any candidate, don't got for module BTFs */
+ if (cands->len)
+ return cands;
+
+ /* if vmlinux BTF was overridden, don't attempt to load module BTFs */
+ if (obj->btf_vmlinux_override)
+ return cands;
+
+ /* now look through module BTFs, trying to still find candidates */
+ err = load_module_btfs(obj);
+ if (err)
+ goto err_out;
+
+ for (i = 0; i < obj->btf_module_cnt; i++) {
+ err = bpf_core_add_cands(&local_cand, local_essent_len,
+ obj->btf_modules[i].btf,
+ obj->btf_modules[i].name,
+ btf__type_cnt(obj->btf_vmlinux),
+ cands);
+ if (err)
+ goto err_out;
+ }
+
+ return cands;
+err_out:
+ bpf_core_free_cands(cands);
+ return ERR_PTR(err);
+}
+
+/* Check local and target types for compatibility. This check is used for
+ * type-based CO-RE relocations and follow slightly different rules than
+ * field-based relocations. This function assumes that root types were already
+ * checked for name match. Beyond that initial root-level name check, names
+ * are completely ignored. Compatibility rules are as follows:
+ * - any two STRUCTs/UNIONs/FWDs/ENUMs/INTs are considered compatible, but
+ * kind should match for local and target types (i.e., STRUCT is not
+ * compatible with UNION);
+ * - for ENUMs, the size is ignored;
+ * - for INT, size and signedness are ignored;
+ * - for ARRAY, dimensionality is ignored, element types are checked for
+ * compatibility recursively;
+ * - CONST/VOLATILE/RESTRICT modifiers are ignored;
+ * - TYPEDEFs/PTRs are compatible if types they pointing to are compatible;
+ * - FUNC_PROTOs are compatible if they have compatible signature: same
+ * number of input args and compatible return and argument types.
+ * These rules are not set in stone and probably will be adjusted as we get
+ * more experience with using BPF CO-RE relocations.
+ */
+int bpf_core_types_are_compat(const struct btf *local_btf, __u32 local_id,
+ const struct btf *targ_btf, __u32 targ_id)
+{
+ return __bpf_core_types_are_compat(local_btf, local_id, targ_btf, targ_id, 32);
+}
+
+int bpf_core_types_match(const struct btf *local_btf, __u32 local_id,
+ const struct btf *targ_btf, __u32 targ_id)
+{
+ return __bpf_core_types_match(local_btf, local_id, targ_btf, targ_id, false, 32);
+}
+
+static size_t bpf_core_hash_fn(const long key, void *ctx)
+{
+ return key;
+}
+
+static bool bpf_core_equal_fn(const long k1, const long k2, void *ctx)
+{
+ return k1 == k2;
+}
+
+static int record_relo_core(struct bpf_program *prog,
+ const struct bpf_core_relo *core_relo, int insn_idx)
+{
+ struct reloc_desc *relos, *relo;
+
+ relos = libbpf_reallocarray(prog->reloc_desc,
+ prog->nr_reloc + 1, sizeof(*relos));
+ if (!relos)
+ return -ENOMEM;
+ relo = &relos[prog->nr_reloc];
+ relo->type = RELO_CORE;
+ relo->insn_idx = insn_idx;
+ relo->core_relo = core_relo;
+ prog->reloc_desc = relos;
+ prog->nr_reloc++;
+ return 0;
+}
+
+static const struct bpf_core_relo *find_relo_core(struct bpf_program *prog, int insn_idx)
+{
+ struct reloc_desc *relo;
+ int i;
+
+ for (i = 0; i < prog->nr_reloc; i++) {
+ relo = &prog->reloc_desc[i];
+ if (relo->type != RELO_CORE || relo->insn_idx != insn_idx)
+ continue;
+
+ return relo->core_relo;
+ }
+
+ return NULL;
+}
+
+static int bpf_core_resolve_relo(struct bpf_program *prog,
+ const struct bpf_core_relo *relo,
+ int relo_idx,
+ const struct btf *local_btf,
+ struct hashmap *cand_cache,
+ struct bpf_core_relo_res *targ_res)
+{
+ struct bpf_core_spec specs_scratch[3] = {};
+ struct bpf_core_cand_list *cands = NULL;
+ const char *prog_name = prog->name;
+ const struct btf_type *local_type;
+ const char *local_name;
+ __u32 local_id = relo->type_id;
+ int err;
+
+ local_type = btf__type_by_id(local_btf, local_id);
+ if (!local_type)
+ return -EINVAL;
+
+ local_name = btf__name_by_offset(local_btf, local_type->name_off);
+ if (!local_name)
+ return -EINVAL;
+
+ if (relo->kind != BPF_CORE_TYPE_ID_LOCAL &&
+ !hashmap__find(cand_cache, local_id, &cands)) {
+ cands = bpf_core_find_cands(prog->obj, local_btf, local_id);
+ if (IS_ERR(cands)) {
+ pr_warn("prog '%s': relo #%d: target candidate search failed for [%d] %s %s: %ld\n",
+ prog_name, relo_idx, local_id, btf_kind_str(local_type),
+ local_name, PTR_ERR(cands));
+ return PTR_ERR(cands);
+ }
+ err = hashmap__set(cand_cache, local_id, cands, NULL, NULL);
+ if (err) {
+ bpf_core_free_cands(cands);
+ return err;
+ }
+ }
+
+ return bpf_core_calc_relo_insn(prog_name, relo, relo_idx, local_btf, cands, specs_scratch,
+ targ_res);
+}
+
+static int
+bpf_object__relocate_core(struct bpf_object *obj, const char *targ_btf_path)
+{
+ const struct btf_ext_info_sec *sec;
+ struct bpf_core_relo_res targ_res;
+ const struct bpf_core_relo *rec;
+ const struct btf_ext_info *seg;
+ struct hashmap_entry *entry;
+ struct hashmap *cand_cache = NULL;
+ struct bpf_program *prog;
+ struct bpf_insn *insn;
+ const char *sec_name;
+ int i, err = 0, insn_idx, sec_idx, sec_num;
+
+ if (obj->btf_ext->core_relo_info.len == 0)
+ return 0;
+
+ if (targ_btf_path) {
+ obj->btf_vmlinux_override = btf__parse(targ_btf_path, NULL);
+ err = libbpf_get_error(obj->btf_vmlinux_override);
+ if (err) {
+ pr_warn("failed to parse target BTF: %d\n", err);
+ return err;
+ }
+ }
+
+ cand_cache = hashmap__new(bpf_core_hash_fn, bpf_core_equal_fn, NULL);
+ if (IS_ERR(cand_cache)) {
+ err = PTR_ERR(cand_cache);
+ goto out;
+ }
+
+ seg = &obj->btf_ext->core_relo_info;
+ sec_num = 0;
+ for_each_btf_ext_sec(seg, sec) {
+ sec_idx = seg->sec_idxs[sec_num];
+ sec_num++;
+
+ sec_name = btf__name_by_offset(obj->btf, sec->sec_name_off);
+ if (str_is_empty(sec_name)) {
+ err = -EINVAL;
+ goto out;
+ }
+
+ pr_debug("sec '%s': found %d CO-RE relocations\n", sec_name, sec->num_info);
+
+ for_each_btf_ext_rec(seg, sec, i, rec) {
+ if (rec->insn_off % BPF_INSN_SZ)
+ return -EINVAL;
+ insn_idx = rec->insn_off / BPF_INSN_SZ;
+ prog = find_prog_by_sec_insn(obj, sec_idx, insn_idx);
+ if (!prog) {
+ /* When __weak subprog is "overridden" by another instance
+ * of the subprog from a different object file, linker still
+ * appends all the .BTF.ext info that used to belong to that
+ * eliminated subprogram.
+ * This is similar to what x86-64 linker does for relocations.
+ * So just ignore such relocations just like we ignore
+ * subprog instructions when discovering subprograms.
+ */
+ pr_debug("sec '%s': skipping CO-RE relocation #%d for insn #%d belonging to eliminated weak subprogram\n",
+ sec_name, i, insn_idx);
+ continue;
+ }
+ /* no need to apply CO-RE relocation if the program is
+ * not going to be loaded
+ */
+ if (!prog->autoload)
+ continue;
+
+ /* adjust insn_idx from section frame of reference to the local
+ * program's frame of reference; (sub-)program code is not yet
+ * relocated, so it's enough to just subtract in-section offset
+ */
+ insn_idx = insn_idx - prog->sec_insn_off;
+ if (insn_idx >= prog->insns_cnt)
+ return -EINVAL;
+ insn = &prog->insns[insn_idx];
+
+ err = record_relo_core(prog, rec, insn_idx);
+ if (err) {
+ pr_warn("prog '%s': relo #%d: failed to record relocation: %d\n",
+ prog->name, i, err);
+ goto out;
+ }
+
+ if (prog->obj->gen_loader)
+ continue;
+
+ err = bpf_core_resolve_relo(prog, rec, i, obj->btf, cand_cache, &targ_res);
+ if (err) {
+ pr_warn("prog '%s': relo #%d: failed to relocate: %d\n",
+ prog->name, i, err);
+ goto out;
+ }
+
+ err = bpf_core_patch_insn(prog->name, insn, insn_idx, rec, i, &targ_res);
+ if (err) {
+ pr_warn("prog '%s': relo #%d: failed to patch insn #%u: %d\n",
+ prog->name, i, insn_idx, err);
+ goto out;
+ }
+ }
+ }
+
+out:
+ /* obj->btf_vmlinux and module BTFs are freed after object load */
+ btf__free(obj->btf_vmlinux_override);
+ obj->btf_vmlinux_override = NULL;
+
+ if (!IS_ERR_OR_NULL(cand_cache)) {
+ hashmap__for_each_entry(cand_cache, entry, i) {
+ bpf_core_free_cands(entry->pvalue);
+ }
+ hashmap__free(cand_cache);
+ }
+ return err;
+}
+
+/* base map load ldimm64 special constant, used also for log fixup logic */
+#define MAP_LDIMM64_POISON_BASE 2001000000
+#define MAP_LDIMM64_POISON_PFX "200100"
+
+static void poison_map_ldimm64(struct bpf_program *prog, int relo_idx,
+ int insn_idx, struct bpf_insn *insn,
+ int map_idx, const struct bpf_map *map)
+{
+ int i;
+
+ pr_debug("prog '%s': relo #%d: poisoning insn #%d that loads map #%d '%s'\n",
+ prog->name, relo_idx, insn_idx, map_idx, map->name);
+
+ /* we turn single ldimm64 into two identical invalid calls */
+ for (i = 0; i < 2; i++) {
+ insn->code = BPF_JMP | BPF_CALL;
+ insn->dst_reg = 0;
+ insn->src_reg = 0;
+ insn->off = 0;
+ /* if this instruction is reachable (not a dead code),
+ * verifier will complain with something like:
+ * invalid func unknown#2001000123
+ * where lower 123 is map index into obj->maps[] array
+ */
+ insn->imm = MAP_LDIMM64_POISON_BASE + map_idx;
+
+ insn++;
+ }
+}
+
+/* Relocate data references within program code:
+ * - map references;
+ * - global variable references;
+ * - extern references.
+ */
+static int
+bpf_object__relocate_data(struct bpf_object *obj, struct bpf_program *prog)
+{
+ int i;
+
+ for (i = 0; i < prog->nr_reloc; i++) {
+ struct reloc_desc *relo = &prog->reloc_desc[i];
+ struct bpf_insn *insn = &prog->insns[relo->insn_idx];
+ const struct bpf_map *map;
+ struct extern_desc *ext;
+
+ switch (relo->type) {
+ case RELO_LD64:
+ map = &obj->maps[relo->map_idx];
+ if (obj->gen_loader) {
+ insn[0].src_reg = BPF_PSEUDO_MAP_IDX;
+ insn[0].imm = relo->map_idx;
+ } else if (map->autocreate) {
+ insn[0].src_reg = BPF_PSEUDO_MAP_FD;
+ insn[0].imm = map->fd;
+ } else {
+ poison_map_ldimm64(prog, i, relo->insn_idx, insn,
+ relo->map_idx, map);
+ }
+ break;
+ case RELO_DATA:
+ map = &obj->maps[relo->map_idx];
+ insn[1].imm = insn[0].imm + relo->sym_off;
+ if (obj->gen_loader) {
+ insn[0].src_reg = BPF_PSEUDO_MAP_IDX_VALUE;
+ insn[0].imm = relo->map_idx;
+ } else if (map->autocreate) {
+ insn[0].src_reg = BPF_PSEUDO_MAP_VALUE;
+ insn[0].imm = map->fd;
+ } else {
+ poison_map_ldimm64(prog, i, relo->insn_idx, insn,
+ relo->map_idx, map);
+ }
+ break;
+ case RELO_EXTERN_VAR:
+ ext = &obj->externs[relo->sym_off];
+ if (ext->type == EXT_KCFG) {
+ if (obj->gen_loader) {
+ insn[0].src_reg = BPF_PSEUDO_MAP_IDX_VALUE;
+ insn[0].imm = obj->kconfig_map_idx;
+ } else {
+ insn[0].src_reg = BPF_PSEUDO_MAP_VALUE;
+ insn[0].imm = obj->maps[obj->kconfig_map_idx].fd;
+ }
+ insn[1].imm = ext->kcfg.data_off;
+ } else /* EXT_KSYM */ {
+ if (ext->ksym.type_id && ext->is_set) { /* typed ksyms */
+ insn[0].src_reg = BPF_PSEUDO_BTF_ID;
+ insn[0].imm = ext->ksym.kernel_btf_id;
+ insn[1].imm = ext->ksym.kernel_btf_obj_fd;
+ } else { /* typeless ksyms or unresolved typed ksyms */
+ insn[0].imm = (__u32)ext->ksym.addr;
+ insn[1].imm = ext->ksym.addr >> 32;
+ }
+ }
+ break;
+ case RELO_EXTERN_FUNC:
+ ext = &obj->externs[relo->sym_off];
+ insn[0].src_reg = BPF_PSEUDO_KFUNC_CALL;
+ if (ext->is_set) {
+ insn[0].imm = ext->ksym.kernel_btf_id;
+ insn[0].off = ext->ksym.btf_fd_idx;
+ } else { /* unresolved weak kfunc */
+ insn[0].imm = 0;
+ insn[0].off = 0;
+ }
+ break;
+ case RELO_SUBPROG_ADDR:
+ if (insn[0].src_reg != BPF_PSEUDO_FUNC) {
+ pr_warn("prog '%s': relo #%d: bad insn\n",
+ prog->name, i);
+ return -EINVAL;
+ }
+ /* handled already */
+ break;
+ case RELO_CALL:
+ /* handled already */
+ break;
+ case RELO_CORE:
+ /* will be handled by bpf_program_record_relos() */
+ break;
+ default:
+ pr_warn("prog '%s': relo #%d: bad relo type %d\n",
+ prog->name, i, relo->type);
+ return -EINVAL;
+ }
+ }
+
+ return 0;
+}
+
+static int adjust_prog_btf_ext_info(const struct bpf_object *obj,
+ const struct bpf_program *prog,
+ const struct btf_ext_info *ext_info,
+ void **prog_info, __u32 *prog_rec_cnt,
+ __u32 *prog_rec_sz)
+{
+ void *copy_start = NULL, *copy_end = NULL;
+ void *rec, *rec_end, *new_prog_info;
+ const struct btf_ext_info_sec *sec;
+ size_t old_sz, new_sz;
+ int i, sec_num, sec_idx, off_adj;
+
+ sec_num = 0;
+ for_each_btf_ext_sec(ext_info, sec) {
+ sec_idx = ext_info->sec_idxs[sec_num];
+ sec_num++;
+ if (prog->sec_idx != sec_idx)
+ continue;
+
+ for_each_btf_ext_rec(ext_info, sec, i, rec) {
+ __u32 insn_off = *(__u32 *)rec / BPF_INSN_SZ;
+
+ if (insn_off < prog->sec_insn_off)
+ continue;
+ if (insn_off >= prog->sec_insn_off + prog->sec_insn_cnt)
+ break;
+
+ if (!copy_start)
+ copy_start = rec;
+ copy_end = rec + ext_info->rec_size;
+ }
+
+ if (!copy_start)
+ return -ENOENT;
+
+ /* append func/line info of a given (sub-)program to the main
+ * program func/line info
+ */
+ old_sz = (size_t)(*prog_rec_cnt) * ext_info->rec_size;
+ new_sz = old_sz + (copy_end - copy_start);
+ new_prog_info = realloc(*prog_info, new_sz);
+ if (!new_prog_info)
+ return -ENOMEM;
+ *prog_info = new_prog_info;
+ *prog_rec_cnt = new_sz / ext_info->rec_size;
+ memcpy(new_prog_info + old_sz, copy_start, copy_end - copy_start);
+
+ /* Kernel instruction offsets are in units of 8-byte
+ * instructions, while .BTF.ext instruction offsets generated
+ * by Clang are in units of bytes. So convert Clang offsets
+ * into kernel offsets and adjust offset according to program
+ * relocated position.
+ */
+ off_adj = prog->sub_insn_off - prog->sec_insn_off;
+ rec = new_prog_info + old_sz;
+ rec_end = new_prog_info + new_sz;
+ for (; rec < rec_end; rec += ext_info->rec_size) {
+ __u32 *insn_off = rec;
+
+ *insn_off = *insn_off / BPF_INSN_SZ + off_adj;
+ }
+ *prog_rec_sz = ext_info->rec_size;
+ return 0;
+ }
+
+ return -ENOENT;
+}
+
+static int
+reloc_prog_func_and_line_info(const struct bpf_object *obj,
+ struct bpf_program *main_prog,
+ const struct bpf_program *prog)
+{
+ int err;
+
+ /* no .BTF.ext relocation if .BTF.ext is missing or kernel doesn't
+ * supprot func/line info
+ */
+ if (!obj->btf_ext || !kernel_supports(obj, FEAT_BTF_FUNC))
+ return 0;
+
+ /* only attempt func info relocation if main program's func_info
+ * relocation was successful
+ */
+ if (main_prog != prog && !main_prog->func_info)
+ goto line_info;
+
+ err = adjust_prog_btf_ext_info(obj, prog, &obj->btf_ext->func_info,
+ &main_prog->func_info,
+ &main_prog->func_info_cnt,
+ &main_prog->func_info_rec_size);
+ if (err) {
+ if (err != -ENOENT) {
+ pr_warn("prog '%s': error relocating .BTF.ext function info: %d\n",
+ prog->name, err);
+ return err;
+ }
+ if (main_prog->func_info) {
+ /*
+ * Some info has already been found but has problem
+ * in the last btf_ext reloc. Must have to error out.
+ */
+ pr_warn("prog '%s': missing .BTF.ext function info.\n", prog->name);
+ return err;
+ }
+ /* Have problem loading the very first info. Ignore the rest. */
+ pr_warn("prog '%s': missing .BTF.ext function info for the main program, skipping all of .BTF.ext func info.\n",
+ prog->name);
+ }
+
+line_info:
+ /* don't relocate line info if main program's relocation failed */
+ if (main_prog != prog && !main_prog->line_info)
+ return 0;
+
+ err = adjust_prog_btf_ext_info(obj, prog, &obj->btf_ext->line_info,
+ &main_prog->line_info,
+ &main_prog->line_info_cnt,
+ &main_prog->line_info_rec_size);
+ if (err) {
+ if (err != -ENOENT) {
+ pr_warn("prog '%s': error relocating .BTF.ext line info: %d\n",
+ prog->name, err);
+ return err;
+ }
+ if (main_prog->line_info) {
+ /*
+ * Some info has already been found but has problem
+ * in the last btf_ext reloc. Must have to error out.
+ */
+ pr_warn("prog '%s': missing .BTF.ext line info.\n", prog->name);
+ return err;
+ }
+ /* Have problem loading the very first info. Ignore the rest. */
+ pr_warn("prog '%s': missing .BTF.ext line info for the main program, skipping all of .BTF.ext line info.\n",
+ prog->name);
+ }
+ return 0;
+}
+
+static int cmp_relo_by_insn_idx(const void *key, const void *elem)
+{
+ size_t insn_idx = *(const size_t *)key;
+ const struct reloc_desc *relo = elem;
+
+ if (insn_idx == relo->insn_idx)
+ return 0;
+ return insn_idx < relo->insn_idx ? -1 : 1;
+}
+
+static struct reloc_desc *find_prog_insn_relo(const struct bpf_program *prog, size_t insn_idx)
+{
+ if (!prog->nr_reloc)
+ return NULL;
+ return bsearch(&insn_idx, prog->reloc_desc, prog->nr_reloc,
+ sizeof(*prog->reloc_desc), cmp_relo_by_insn_idx);
+}
+
+static int append_subprog_relos(struct bpf_program *main_prog, struct bpf_program *subprog)
+{
+ int new_cnt = main_prog->nr_reloc + subprog->nr_reloc;
+ struct reloc_desc *relos;
+ int i;
+
+ if (main_prog == subprog)
+ return 0;
+ relos = libbpf_reallocarray(main_prog->reloc_desc, new_cnt, sizeof(*relos));
+ if (!relos)
+ return -ENOMEM;
+ if (subprog->nr_reloc)
+ memcpy(relos + main_prog->nr_reloc, subprog->reloc_desc,
+ sizeof(*relos) * subprog->nr_reloc);
+
+ for (i = main_prog->nr_reloc; i < new_cnt; i++)
+ relos[i].insn_idx += subprog->sub_insn_off;
+ /* After insn_idx adjustment the 'relos' array is still sorted
+ * by insn_idx and doesn't break bsearch.
+ */
+ main_prog->reloc_desc = relos;
+ main_prog->nr_reloc = new_cnt;
+ return 0;
+}
+
+static int
+bpf_object__reloc_code(struct bpf_object *obj, struct bpf_program *main_prog,
+ struct bpf_program *prog)
+{
+ size_t sub_insn_idx, insn_idx, new_cnt;
+ struct bpf_program *subprog;
+ struct bpf_insn *insns, *insn;
+ struct reloc_desc *relo;
+ int err;
+
+ err = reloc_prog_func_and_line_info(obj, main_prog, prog);
+ if (err)
+ return err;
+
+ for (insn_idx = 0; insn_idx < prog->sec_insn_cnt; insn_idx++) {
+ insn = &main_prog->insns[prog->sub_insn_off + insn_idx];
+ if (!insn_is_subprog_call(insn) && !insn_is_pseudo_func(insn))
+ continue;
+
+ relo = find_prog_insn_relo(prog, insn_idx);
+ if (relo && relo->type == RELO_EXTERN_FUNC)
+ /* kfunc relocations will be handled later
+ * in bpf_object__relocate_data()
+ */
+ continue;
+ if (relo && relo->type != RELO_CALL && relo->type != RELO_SUBPROG_ADDR) {
+ pr_warn("prog '%s': unexpected relo for insn #%zu, type %d\n",
+ prog->name, insn_idx, relo->type);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+ if (relo) {
+ /* sub-program instruction index is a combination of
+ * an offset of a symbol pointed to by relocation and
+ * call instruction's imm field; for global functions,
+ * call always has imm = -1, but for static functions
+ * relocation is against STT_SECTION and insn->imm
+ * points to a start of a static function
+ *
+ * for subprog addr relocation, the relo->sym_off + insn->imm is
+ * the byte offset in the corresponding section.
+ */
+ if (relo->type == RELO_CALL)
+ sub_insn_idx = relo->sym_off / BPF_INSN_SZ + insn->imm + 1;
+ else
+ sub_insn_idx = (relo->sym_off + insn->imm) / BPF_INSN_SZ;
+ } else if (insn_is_pseudo_func(insn)) {
+ /*
+ * RELO_SUBPROG_ADDR relo is always emitted even if both
+ * functions are in the same section, so it shouldn't reach here.
+ */
+ pr_warn("prog '%s': missing subprog addr relo for insn #%zu\n",
+ prog->name, insn_idx);
+ return -LIBBPF_ERRNO__RELOC;
+ } else {
+ /* if subprogram call is to a static function within
+ * the same ELF section, there won't be any relocation
+ * emitted, but it also means there is no additional
+ * offset necessary, insns->imm is relative to
+ * instruction's original position within the section
+ */
+ sub_insn_idx = prog->sec_insn_off + insn_idx + insn->imm + 1;
+ }
+
+ /* we enforce that sub-programs should be in .text section */
+ subprog = find_prog_by_sec_insn(obj, obj->efile.text_shndx, sub_insn_idx);
+ if (!subprog) {
+ pr_warn("prog '%s': no .text section found yet sub-program call exists\n",
+ prog->name);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+
+ /* if it's the first call instruction calling into this
+ * subprogram (meaning this subprog hasn't been processed
+ * yet) within the context of current main program:
+ * - append it at the end of main program's instructions blog;
+ * - process is recursively, while current program is put on hold;
+ * - if that subprogram calls some other not yet processes
+ * subprogram, same thing will happen recursively until
+ * there are no more unprocesses subprograms left to append
+ * and relocate.
+ */
+ if (subprog->sub_insn_off == 0) {
+ subprog->sub_insn_off = main_prog->insns_cnt;
+
+ new_cnt = main_prog->insns_cnt + subprog->insns_cnt;
+ insns = libbpf_reallocarray(main_prog->insns, new_cnt, sizeof(*insns));
+ if (!insns) {
+ pr_warn("prog '%s': failed to realloc prog code\n", main_prog->name);
+ return -ENOMEM;
+ }
+ main_prog->insns = insns;
+ main_prog->insns_cnt = new_cnt;
+
+ memcpy(main_prog->insns + subprog->sub_insn_off, subprog->insns,
+ subprog->insns_cnt * sizeof(*insns));
+
+ pr_debug("prog '%s': added %zu insns from sub-prog '%s'\n",
+ main_prog->name, subprog->insns_cnt, subprog->name);
+
+ /* The subprog insns are now appended. Append its relos too. */
+ err = append_subprog_relos(main_prog, subprog);
+ if (err)
+ return err;
+ err = bpf_object__reloc_code(obj, main_prog, subprog);
+ if (err)
+ return err;
+ }
+
+ /* main_prog->insns memory could have been re-allocated, so
+ * calculate pointer again
+ */
+ insn = &main_prog->insns[prog->sub_insn_off + insn_idx];
+ /* calculate correct instruction position within current main
+ * prog; each main prog can have a different set of
+ * subprograms appended (potentially in different order as
+ * well), so position of any subprog can be different for
+ * different main programs
+ */
+ insn->imm = subprog->sub_insn_off - (prog->sub_insn_off + insn_idx) - 1;
+
+ pr_debug("prog '%s': insn #%zu relocated, imm %d points to subprog '%s' (now at %zu offset)\n",
+ prog->name, insn_idx, insn->imm, subprog->name, subprog->sub_insn_off);
+ }
+
+ return 0;
+}
+
+/*
+ * Relocate sub-program calls.
+ *
+ * Algorithm operates as follows. Each entry-point BPF program (referred to as
+ * main prog) is processed separately. For each subprog (non-entry functions,
+ * that can be called from either entry progs or other subprogs) gets their
+ * sub_insn_off reset to zero. This serves as indicator that this subprogram
+ * hasn't been yet appended and relocated within current main prog. Once its
+ * relocated, sub_insn_off will point at the position within current main prog
+ * where given subprog was appended. This will further be used to relocate all
+ * the call instructions jumping into this subprog.
+ *
+ * We start with main program and process all call instructions. If the call
+ * is into a subprog that hasn't been processed (i.e., subprog->sub_insn_off
+ * is zero), subprog instructions are appended at the end of main program's
+ * instruction array. Then main program is "put on hold" while we recursively
+ * process newly appended subprogram. If that subprogram calls into another
+ * subprogram that hasn't been appended, new subprogram is appended again to
+ * the *main* prog's instructions (subprog's instructions are always left
+ * untouched, as they need to be in unmodified state for subsequent main progs
+ * and subprog instructions are always sent only as part of a main prog) and
+ * the process continues recursively. Once all the subprogs called from a main
+ * prog or any of its subprogs are appended (and relocated), all their
+ * positions within finalized instructions array are known, so it's easy to
+ * rewrite call instructions with correct relative offsets, corresponding to
+ * desired target subprog.
+ *
+ * Its important to realize that some subprogs might not be called from some
+ * main prog and any of its called/used subprogs. Those will keep their
+ * subprog->sub_insn_off as zero at all times and won't be appended to current
+ * main prog and won't be relocated within the context of current main prog.
+ * They might still be used from other main progs later.
+ *
+ * Visually this process can be shown as below. Suppose we have two main
+ * programs mainA and mainB and BPF object contains three subprogs: subA,
+ * subB, and subC. mainA calls only subA, mainB calls only subC, but subA and
+ * subC both call subB:
+ *
+ * +--------+ +-------+
+ * | v v |
+ * +--+---+ +--+-+-+ +---+--+
+ * | subA | | subB | | subC |
+ * +--+---+ +------+ +---+--+
+ * ^ ^
+ * | |
+ * +---+-------+ +------+----+
+ * | mainA | | mainB |
+ * +-----------+ +-----------+
+ *
+ * We'll start relocating mainA, will find subA, append it and start
+ * processing sub A recursively:
+ *
+ * +-----------+------+
+ * | mainA | subA |
+ * +-----------+------+
+ *
+ * At this point we notice that subB is used from subA, so we append it and
+ * relocate (there are no further subcalls from subB):
+ *
+ * +-----------+------+------+
+ * | mainA | subA | subB |
+ * +-----------+------+------+
+ *
+ * At this point, we relocate subA calls, then go one level up and finish with
+ * relocatin mainA calls. mainA is done.
+ *
+ * For mainB process is similar but results in different order. We start with
+ * mainB and skip subA and subB, as mainB never calls them (at least
+ * directly), but we see subC is needed, so we append and start processing it:
+ *
+ * +-----------+------+
+ * | mainB | subC |
+ * +-----------+------+
+ * Now we see subC needs subB, so we go back to it, append and relocate it:
+ *
+ * +-----------+------+------+
+ * | mainB | subC | subB |
+ * +-----------+------+------+
+ *
+ * At this point we unwind recursion, relocate calls in subC, then in mainB.
+ */
+static int
+bpf_object__relocate_calls(struct bpf_object *obj, struct bpf_program *prog)
+{
+ struct bpf_program *subprog;
+ int i, err;
+
+ /* mark all subprogs as not relocated (yet) within the context of
+ * current main program
+ */
+ for (i = 0; i < obj->nr_programs; i++) {
+ subprog = &obj->programs[i];
+ if (!prog_is_subprog(obj, subprog))
+ continue;
+
+ subprog->sub_insn_off = 0;
+ }
+
+ err = bpf_object__reloc_code(obj, prog, prog);
+ if (err)
+ return err;
+
+ return 0;
+}
+
+static void
+bpf_object__free_relocs(struct bpf_object *obj)
+{
+ struct bpf_program *prog;
+ int i;
+
+ /* free up relocation descriptors */
+ for (i = 0; i < obj->nr_programs; i++) {
+ prog = &obj->programs[i];
+ zfree(&prog->reloc_desc);
+ prog->nr_reloc = 0;
+ }
+}
+
+static int cmp_relocs(const void *_a, const void *_b)
+{
+ const struct reloc_desc *a = _a;
+ const struct reloc_desc *b = _b;
+
+ if (a->insn_idx != b->insn_idx)
+ return a->insn_idx < b->insn_idx ? -1 : 1;
+
+ /* no two relocations should have the same insn_idx, but ... */
+ if (a->type != b->type)
+ return a->type < b->type ? -1 : 1;
+
+ return 0;
+}
+
+static void bpf_object__sort_relos(struct bpf_object *obj)
+{
+ int i;
+
+ for (i = 0; i < obj->nr_programs; i++) {
+ struct bpf_program *p = &obj->programs[i];
+
+ if (!p->nr_reloc)
+ continue;
+
+ qsort(p->reloc_desc, p->nr_reloc, sizeof(*p->reloc_desc), cmp_relocs);
+ }
+}
+
+static int
+bpf_object__relocate(struct bpf_object *obj, const char *targ_btf_path)
+{
+ struct bpf_program *prog;
+ size_t i, j;
+ int err;
+
+ if (obj->btf_ext) {
+ err = bpf_object__relocate_core(obj, targ_btf_path);
+ if (err) {
+ pr_warn("failed to perform CO-RE relocations: %d\n",
+ err);
+ return err;
+ }
+ bpf_object__sort_relos(obj);
+ }
+
+ /* Before relocating calls pre-process relocations and mark
+ * few ld_imm64 instructions that points to subprogs.
+ * Otherwise bpf_object__reloc_code() later would have to consider
+ * all ld_imm64 insns as relocation candidates. That would
+ * reduce relocation speed, since amount of find_prog_insn_relo()
+ * would increase and most of them will fail to find a relo.
+ */
+ for (i = 0; i < obj->nr_programs; i++) {
+ prog = &obj->programs[i];
+ for (j = 0; j < prog->nr_reloc; j++) {
+ struct reloc_desc *relo = &prog->reloc_desc[j];
+ struct bpf_insn *insn = &prog->insns[relo->insn_idx];
+
+ /* mark the insn, so it's recognized by insn_is_pseudo_func() */
+ if (relo->type == RELO_SUBPROG_ADDR)
+ insn[0].src_reg = BPF_PSEUDO_FUNC;
+ }
+ }
+
+ /* relocate subprogram calls and append used subprograms to main
+ * programs; each copy of subprogram code needs to be relocated
+ * differently for each main program, because its code location might
+ * have changed.
+ * Append subprog relos to main programs to allow data relos to be
+ * processed after text is completely relocated.
+ */
+ for (i = 0; i < obj->nr_programs; i++) {
+ prog = &obj->programs[i];
+ /* sub-program's sub-calls are relocated within the context of
+ * its main program only
+ */
+ if (prog_is_subprog(obj, prog))
+ continue;
+ if (!prog->autoload)
+ continue;
+
+ err = bpf_object__relocate_calls(obj, prog);
+ if (err) {
+ pr_warn("prog '%s': failed to relocate calls: %d\n",
+ prog->name, err);
+ return err;
+ }
+ }
+ /* Process data relos for main programs */
+ for (i = 0; i < obj->nr_programs; i++) {
+ prog = &obj->programs[i];
+ if (prog_is_subprog(obj, prog))
+ continue;
+ if (!prog->autoload)
+ continue;
+ err = bpf_object__relocate_data(obj, prog);
+ if (err) {
+ pr_warn("prog '%s': failed to relocate data references: %d\n",
+ prog->name, err);
+ return err;
+ }
+ }
+
+ return 0;
+}
+
+static int bpf_object__collect_st_ops_relos(struct bpf_object *obj,
+ Elf64_Shdr *shdr, Elf_Data *data);
+
+static int bpf_object__collect_map_relos(struct bpf_object *obj,
+ Elf64_Shdr *shdr, Elf_Data *data)
+{
+ const int bpf_ptr_sz = 8, host_ptr_sz = sizeof(void *);
+ int i, j, nrels, new_sz;
+ const struct btf_var_secinfo *vi = NULL;
+ const struct btf_type *sec, *var, *def;
+ struct bpf_map *map = NULL, *targ_map = NULL;
+ struct bpf_program *targ_prog = NULL;
+ bool is_prog_array, is_map_in_map;
+ const struct btf_member *member;
+ const char *name, *mname, *type;
+ unsigned int moff;
+ Elf64_Sym *sym;
+ Elf64_Rel *rel;
+ void *tmp;
+
+ if (!obj->efile.btf_maps_sec_btf_id || !obj->btf)
+ return -EINVAL;
+ sec = btf__type_by_id(obj->btf, obj->efile.btf_maps_sec_btf_id);
+ if (!sec)
+ return -EINVAL;
+
+ nrels = shdr->sh_size / shdr->sh_entsize;
+ for (i = 0; i < nrels; i++) {
+ rel = elf_rel_by_idx(data, i);
+ if (!rel) {
+ pr_warn(".maps relo #%d: failed to get ELF relo\n", i);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+
+ sym = elf_sym_by_idx(obj, ELF64_R_SYM(rel->r_info));
+ if (!sym) {
+ pr_warn(".maps relo #%d: symbol %zx not found\n",
+ i, (size_t)ELF64_R_SYM(rel->r_info));
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+ name = elf_sym_str(obj, sym->st_name) ?: "<?>";
+
+ pr_debug(".maps relo #%d: for %zd value %zd rel->r_offset %zu name %d ('%s')\n",
+ i, (ssize_t)(rel->r_info >> 32), (size_t)sym->st_value,
+ (size_t)rel->r_offset, sym->st_name, name);
+
+ for (j = 0; j < obj->nr_maps; j++) {
+ map = &obj->maps[j];
+ if (map->sec_idx != obj->efile.btf_maps_shndx)
+ continue;
+
+ vi = btf_var_secinfos(sec) + map->btf_var_idx;
+ if (vi->offset <= rel->r_offset &&
+ rel->r_offset + bpf_ptr_sz <= vi->offset + vi->size)
+ break;
+ }
+ if (j == obj->nr_maps) {
+ pr_warn(".maps relo #%d: cannot find map '%s' at rel->r_offset %zu\n",
+ i, name, (size_t)rel->r_offset);
+ return -EINVAL;
+ }
+
+ is_map_in_map = bpf_map_type__is_map_in_map(map->def.type);
+ is_prog_array = map->def.type == BPF_MAP_TYPE_PROG_ARRAY;
+ type = is_map_in_map ? "map" : "prog";
+ if (is_map_in_map) {
+ if (sym->st_shndx != obj->efile.btf_maps_shndx) {
+ pr_warn(".maps relo #%d: '%s' isn't a BTF-defined map\n",
+ i, name);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+ if (map->def.type == BPF_MAP_TYPE_HASH_OF_MAPS &&
+ map->def.key_size != sizeof(int)) {
+ pr_warn(".maps relo #%d: hash-of-maps '%s' should have key size %zu.\n",
+ i, map->name, sizeof(int));
+ return -EINVAL;
+ }
+ targ_map = bpf_object__find_map_by_name(obj, name);
+ if (!targ_map) {
+ pr_warn(".maps relo #%d: '%s' isn't a valid map reference\n",
+ i, name);
+ return -ESRCH;
+ }
+ } else if (is_prog_array) {
+ targ_prog = bpf_object__find_program_by_name(obj, name);
+ if (!targ_prog) {
+ pr_warn(".maps relo #%d: '%s' isn't a valid program reference\n",
+ i, name);
+ return -ESRCH;
+ }
+ if (targ_prog->sec_idx != sym->st_shndx ||
+ targ_prog->sec_insn_off * 8 != sym->st_value ||
+ prog_is_subprog(obj, targ_prog)) {
+ pr_warn(".maps relo #%d: '%s' isn't an entry-point program\n",
+ i, name);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+ } else {
+ return -EINVAL;
+ }
+
+ var = btf__type_by_id(obj->btf, vi->type);
+ def = skip_mods_and_typedefs(obj->btf, var->type, NULL);
+ if (btf_vlen(def) == 0)
+ return -EINVAL;
+ member = btf_members(def) + btf_vlen(def) - 1;
+ mname = btf__name_by_offset(obj->btf, member->name_off);
+ if (strcmp(mname, "values"))
+ return -EINVAL;
+
+ moff = btf_member_bit_offset(def, btf_vlen(def) - 1) / 8;
+ if (rel->r_offset - vi->offset < moff)
+ return -EINVAL;
+
+ moff = rel->r_offset - vi->offset - moff;
+ /* here we use BPF pointer size, which is always 64 bit, as we
+ * are parsing ELF that was built for BPF target
+ */
+ if (moff % bpf_ptr_sz)
+ return -EINVAL;
+ moff /= bpf_ptr_sz;
+ if (moff >= map->init_slots_sz) {
+ new_sz = moff + 1;
+ tmp = libbpf_reallocarray(map->init_slots, new_sz, host_ptr_sz);
+ if (!tmp)
+ return -ENOMEM;
+ map->init_slots = tmp;
+ memset(map->init_slots + map->init_slots_sz, 0,
+ (new_sz - map->init_slots_sz) * host_ptr_sz);
+ map->init_slots_sz = new_sz;
+ }
+ map->init_slots[moff] = is_map_in_map ? (void *)targ_map : (void *)targ_prog;
+
+ pr_debug(".maps relo #%d: map '%s' slot [%d] points to %s '%s'\n",
+ i, map->name, moff, type, name);
+ }
+
+ return 0;
+}
+
+static int bpf_object__collect_relos(struct bpf_object *obj)
+{
+ int i, err;
+
+ for (i = 0; i < obj->efile.sec_cnt; i++) {
+ struct elf_sec_desc *sec_desc = &obj->efile.secs[i];
+ Elf64_Shdr *shdr;
+ Elf_Data *data;
+ int idx;
+
+ if (sec_desc->sec_type != SEC_RELO)
+ continue;
+
+ shdr = sec_desc->shdr;
+ data = sec_desc->data;
+ idx = shdr->sh_info;
+
+ if (shdr->sh_type != SHT_REL) {
+ pr_warn("internal error at %d\n", __LINE__);
+ return -LIBBPF_ERRNO__INTERNAL;
+ }
+
+ if (idx == obj->efile.st_ops_shndx)
+ err = bpf_object__collect_st_ops_relos(obj, shdr, data);
+ else if (idx == obj->efile.btf_maps_shndx)
+ err = bpf_object__collect_map_relos(obj, shdr, data);
+ else
+ err = bpf_object__collect_prog_relos(obj, shdr, data);
+ if (err)
+ return err;
+ }
+
+ bpf_object__sort_relos(obj);
+ return 0;
+}
+
+static bool insn_is_helper_call(struct bpf_insn *insn, enum bpf_func_id *func_id)
+{
+ if (BPF_CLASS(insn->code) == BPF_JMP &&
+ BPF_OP(insn->code) == BPF_CALL &&
+ BPF_SRC(insn->code) == BPF_K &&
+ insn->src_reg == 0 &&
+ insn->dst_reg == 0) {
+ *func_id = insn->imm;
+ return true;
+ }
+ return false;
+}
+
+static int bpf_object__sanitize_prog(struct bpf_object *obj, struct bpf_program *prog)
+{
+ struct bpf_insn *insn = prog->insns;
+ enum bpf_func_id func_id;
+ int i;
+
+ if (obj->gen_loader)
+ return 0;
+
+ for (i = 0; i < prog->insns_cnt; i++, insn++) {
+ if (!insn_is_helper_call(insn, &func_id))
+ continue;
+
+ /* on kernels that don't yet support
+ * bpf_probe_read_{kernel,user}[_str] helpers, fall back
+ * to bpf_probe_read() which works well for old kernels
+ */
+ switch (func_id) {
+ case BPF_FUNC_probe_read_kernel:
+ case BPF_FUNC_probe_read_user:
+ if (!kernel_supports(obj, FEAT_PROBE_READ_KERN))
+ insn->imm = BPF_FUNC_probe_read;
+ break;
+ case BPF_FUNC_probe_read_kernel_str:
+ case BPF_FUNC_probe_read_user_str:
+ if (!kernel_supports(obj, FEAT_PROBE_READ_KERN))
+ insn->imm = BPF_FUNC_probe_read_str;
+ break;
+ default:
+ break;
+ }
+ }
+ return 0;
+}
+
+static int libbpf_find_attach_btf_id(struct bpf_program *prog, const char *attach_name,
+ int *btf_obj_fd, int *btf_type_id);
+
+/* this is called as prog->sec_def->prog_prepare_load_fn for libbpf-supported sec_defs */
+static int libbpf_prepare_prog_load(struct bpf_program *prog,
+ struct bpf_prog_load_opts *opts, long cookie)
+{
+ enum sec_def_flags def = cookie;
+
+ /* old kernels might not support specifying expected_attach_type */
+ if ((def & SEC_EXP_ATTACH_OPT) && !kernel_supports(prog->obj, FEAT_EXP_ATTACH_TYPE))
+ opts->expected_attach_type = 0;
+
+ if (def & SEC_SLEEPABLE)
+ opts->prog_flags |= BPF_F_SLEEPABLE;
+
+ if (prog->type == BPF_PROG_TYPE_XDP && (def & SEC_XDP_FRAGS))
+ opts->prog_flags |= BPF_F_XDP_HAS_FRAGS;
+
+ if ((def & SEC_ATTACH_BTF) && !prog->attach_btf_id) {
+ int btf_obj_fd = 0, btf_type_id = 0, err;
+ const char *attach_name;
+
+ attach_name = strchr(prog->sec_name, '/');
+ if (!attach_name) {
+ /* if BPF program is annotated with just SEC("fentry")
+ * (or similar) without declaratively specifying
+ * target, then it is expected that target will be
+ * specified with bpf_program__set_attach_target() at
+ * runtime before BPF object load step. If not, then
+ * there is nothing to load into the kernel as BPF
+ * verifier won't be able to validate BPF program
+ * correctness anyways.
+ */
+ pr_warn("prog '%s': no BTF-based attach target is specified, use bpf_program__set_attach_target()\n",
+ prog->name);
+ return -EINVAL;
+ }
+ attach_name++; /* skip over / */
+
+ err = libbpf_find_attach_btf_id(prog, attach_name, &btf_obj_fd, &btf_type_id);
+ if (err)
+ return err;
+
+ /* cache resolved BTF FD and BTF type ID in the prog */
+ prog->attach_btf_obj_fd = btf_obj_fd;
+ prog->attach_btf_id = btf_type_id;
+
+ /* but by now libbpf common logic is not utilizing
+ * prog->atach_btf_obj_fd/prog->attach_btf_id anymore because
+ * this callback is called after opts were populated by
+ * libbpf, so this callback has to update opts explicitly here
+ */
+ opts->attach_btf_obj_fd = btf_obj_fd;
+ opts->attach_btf_id = btf_type_id;
+ }
+ return 0;
+}
+
+static void fixup_verifier_log(struct bpf_program *prog, char *buf, size_t buf_sz);
+
+static int bpf_object_load_prog(struct bpf_object *obj, struct bpf_program *prog,
+ struct bpf_insn *insns, int insns_cnt,
+ const char *license, __u32 kern_version, int *prog_fd)
+{
+ LIBBPF_OPTS(bpf_prog_load_opts, load_attr);
+ const char *prog_name = NULL;
+ char *cp, errmsg[STRERR_BUFSIZE];
+ size_t log_buf_size = 0;
+ char *log_buf = NULL, *tmp;
+ int btf_fd, ret, err;
+ bool own_log_buf = true;
+ __u32 log_level = prog->log_level;
+
+ if (prog->type == BPF_PROG_TYPE_UNSPEC) {
+ /*
+ * The program type must be set. Most likely we couldn't find a proper
+ * section definition at load time, and thus we didn't infer the type.
+ */
+ pr_warn("prog '%s': missing BPF prog type, check ELF section name '%s'\n",
+ prog->name, prog->sec_name);
+ return -EINVAL;
+ }
+
+ if (!insns || !insns_cnt)
+ return -EINVAL;
+
+ load_attr.expected_attach_type = prog->expected_attach_type;
+ if (kernel_supports(obj, FEAT_PROG_NAME))
+ prog_name = prog->name;
+ load_attr.attach_prog_fd = prog->attach_prog_fd;
+ load_attr.attach_btf_obj_fd = prog->attach_btf_obj_fd;
+ load_attr.attach_btf_id = prog->attach_btf_id;
+ load_attr.kern_version = kern_version;
+ load_attr.prog_ifindex = prog->prog_ifindex;
+
+ /* specify func_info/line_info only if kernel supports them */
+ btf_fd = bpf_object__btf_fd(obj);
+ if (btf_fd >= 0 && kernel_supports(obj, FEAT_BTF_FUNC)) {
+ load_attr.prog_btf_fd = btf_fd;
+ load_attr.func_info = prog->func_info;
+ load_attr.func_info_rec_size = prog->func_info_rec_size;
+ load_attr.func_info_cnt = prog->func_info_cnt;
+ load_attr.line_info = prog->line_info;
+ load_attr.line_info_rec_size = prog->line_info_rec_size;
+ load_attr.line_info_cnt = prog->line_info_cnt;
+ }
+ load_attr.log_level = log_level;
+ load_attr.prog_flags = prog->prog_flags;
+ load_attr.fd_array = obj->fd_array;
+
+ /* adjust load_attr if sec_def provides custom preload callback */
+ if (prog->sec_def && prog->sec_def->prog_prepare_load_fn) {
+ err = prog->sec_def->prog_prepare_load_fn(prog, &load_attr, prog->sec_def->cookie);
+ if (err < 0) {
+ pr_warn("prog '%s': failed to prepare load attributes: %d\n",
+ prog->name, err);
+ return err;
+ }
+ insns = prog->insns;
+ insns_cnt = prog->insns_cnt;
+ }
+
+ if (obj->gen_loader) {
+ bpf_gen__prog_load(obj->gen_loader, prog->type, prog->name,
+ license, insns, insns_cnt, &load_attr,
+ prog - obj->programs);
+ *prog_fd = -1;
+ return 0;
+ }
+
+retry_load:
+ /* if log_level is zero, we don't request logs initially even if
+ * custom log_buf is specified; if the program load fails, then we'll
+ * bump log_level to 1 and use either custom log_buf or we'll allocate
+ * our own and retry the load to get details on what failed
+ */
+ if (log_level) {
+ if (prog->log_buf) {
+ log_buf = prog->log_buf;
+ log_buf_size = prog->log_size;
+ own_log_buf = false;
+ } else if (obj->log_buf) {
+ log_buf = obj->log_buf;
+ log_buf_size = obj->log_size;
+ own_log_buf = false;
+ } else {
+ log_buf_size = max((size_t)BPF_LOG_BUF_SIZE, log_buf_size * 2);
+ tmp = realloc(log_buf, log_buf_size);
+ if (!tmp) {
+ ret = -ENOMEM;
+ goto out;
+ }
+ log_buf = tmp;
+ log_buf[0] = '\0';
+ own_log_buf = true;
+ }
+ }
+
+ load_attr.log_buf = log_buf;
+ load_attr.log_size = log_buf_size;
+ load_attr.log_level = log_level;
+
+ ret = bpf_prog_load(prog->type, prog_name, license, insns, insns_cnt, &load_attr);
+ if (ret >= 0) {
+ if (log_level && own_log_buf) {
+ pr_debug("prog '%s': -- BEGIN PROG LOAD LOG --\n%s-- END PROG LOAD LOG --\n",
+ prog->name, log_buf);
+ }
+
+ if (obj->has_rodata && kernel_supports(obj, FEAT_PROG_BIND_MAP)) {
+ struct bpf_map *map;
+ int i;
+
+ for (i = 0; i < obj->nr_maps; i++) {
+ map = &prog->obj->maps[i];
+ if (map->libbpf_type != LIBBPF_MAP_RODATA)
+ continue;
+
+ if (bpf_prog_bind_map(ret, bpf_map__fd(map), NULL)) {
+ cp = libbpf_strerror_r(errno, errmsg, sizeof(errmsg));
+ pr_warn("prog '%s': failed to bind map '%s': %s\n",
+ prog->name, map->real_name, cp);
+ /* Don't fail hard if can't bind rodata. */
+ }
+ }
+ }
+
+ *prog_fd = ret;
+ ret = 0;
+ goto out;
+ }
+
+ if (log_level == 0) {
+ log_level = 1;
+ goto retry_load;
+ }
+ /* On ENOSPC, increase log buffer size and retry, unless custom
+ * log_buf is specified.
+ * Be careful to not overflow u32, though. Kernel's log buf size limit
+ * isn't part of UAPI so it can always be bumped to full 4GB. So don't
+ * multiply by 2 unless we are sure we'll fit within 32 bits.
+ * Currently, we'll get -EINVAL when we reach (UINT_MAX >> 2).
+ */
+ if (own_log_buf && errno == ENOSPC && log_buf_size <= UINT_MAX / 2)
+ goto retry_load;
+
+ ret = -errno;
+
+ /* post-process verifier log to improve error descriptions */
+ fixup_verifier_log(prog, log_buf, log_buf_size);
+
+ cp = libbpf_strerror_r(errno, errmsg, sizeof(errmsg));
+ pr_warn("prog '%s': BPF program load failed: %s\n", prog->name, cp);
+ pr_perm_msg(ret);
+
+ if (own_log_buf && log_buf && log_buf[0] != '\0') {
+ pr_warn("prog '%s': -- BEGIN PROG LOAD LOG --\n%s-- END PROG LOAD LOG --\n",
+ prog->name, log_buf);
+ }
+
+out:
+ if (own_log_buf)
+ free(log_buf);
+ return ret;
+}
+
+static char *find_prev_line(char *buf, char *cur)
+{
+ char *p;
+
+ if (cur == buf) /* end of a log buf */
+ return NULL;
+
+ p = cur - 1;
+ while (p - 1 >= buf && *(p - 1) != '\n')
+ p--;
+
+ return p;
+}
+
+static void patch_log(char *buf, size_t buf_sz, size_t log_sz,
+ char *orig, size_t orig_sz, const char *patch)
+{
+ /* size of the remaining log content to the right from the to-be-replaced part */
+ size_t rem_sz = (buf + log_sz) - (orig + orig_sz);
+ size_t patch_sz = strlen(patch);
+
+ if (patch_sz != orig_sz) {
+ /* If patch line(s) are longer than original piece of verifier log,
+ * shift log contents by (patch_sz - orig_sz) bytes to the right
+ * starting from after to-be-replaced part of the log.
+ *
+ * If patch line(s) are shorter than original piece of verifier log,
+ * shift log contents by (orig_sz - patch_sz) bytes to the left
+ * starting from after to-be-replaced part of the log
+ *
+ * We need to be careful about not overflowing available
+ * buf_sz capacity. If that's the case, we'll truncate the end
+ * of the original log, as necessary.
+ */
+ if (patch_sz > orig_sz) {
+ if (orig + patch_sz >= buf + buf_sz) {
+ /* patch is big enough to cover remaining space completely */
+ patch_sz -= (orig + patch_sz) - (buf + buf_sz) + 1;
+ rem_sz = 0;
+ } else if (patch_sz - orig_sz > buf_sz - log_sz) {
+ /* patch causes part of remaining log to be truncated */
+ rem_sz -= (patch_sz - orig_sz) - (buf_sz - log_sz);
+ }
+ }
+ /* shift remaining log to the right by calculated amount */
+ memmove(orig + patch_sz, orig + orig_sz, rem_sz);
+ }
+
+ memcpy(orig, patch, patch_sz);
+}
+
+static void fixup_log_failed_core_relo(struct bpf_program *prog,
+ char *buf, size_t buf_sz, size_t log_sz,
+ char *line1, char *line2, char *line3)
+{
+ /* Expected log for failed and not properly guarded CO-RE relocation:
+ * line1 -> 123: (85) call unknown#195896080
+ * line2 -> invalid func unknown#195896080
+ * line3 -> <anything else or end of buffer>
+ *
+ * "123" is the index of the instruction that was poisoned. We extract
+ * instruction index to find corresponding CO-RE relocation and
+ * replace this part of the log with more relevant information about
+ * failed CO-RE relocation.
+ */
+ const struct bpf_core_relo *relo;
+ struct bpf_core_spec spec;
+ char patch[512], spec_buf[256];
+ int insn_idx, err, spec_len;
+
+ if (sscanf(line1, "%d: (%*d) call unknown#195896080\n", &insn_idx) != 1)
+ return;
+
+ relo = find_relo_core(prog, insn_idx);
+ if (!relo)
+ return;
+
+ err = bpf_core_parse_spec(prog->name, prog->obj->btf, relo, &spec);
+ if (err)
+ return;
+
+ spec_len = bpf_core_format_spec(spec_buf, sizeof(spec_buf), &spec);
+ snprintf(patch, sizeof(patch),
+ "%d: <invalid CO-RE relocation>\n"
+ "failed to resolve CO-RE relocation %s%s\n",
+ insn_idx, spec_buf, spec_len >= sizeof(spec_buf) ? "..." : "");
+
+ patch_log(buf, buf_sz, log_sz, line1, line3 - line1, patch);
+}
+
+static void fixup_log_missing_map_load(struct bpf_program *prog,
+ char *buf, size_t buf_sz, size_t log_sz,
+ char *line1, char *line2, char *line3)
+{
+ /* Expected log for failed and not properly guarded CO-RE relocation:
+ * line1 -> 123: (85) call unknown#2001000345
+ * line2 -> invalid func unknown#2001000345
+ * line3 -> <anything else or end of buffer>
+ *
+ * "123" is the index of the instruction that was poisoned.
+ * "345" in "2001000345" are map index in obj->maps to fetch map name.
+ */
+ struct bpf_object *obj = prog->obj;
+ const struct bpf_map *map;
+ int insn_idx, map_idx;
+ char patch[128];
+
+ if (sscanf(line1, "%d: (%*d) call unknown#%d\n", &insn_idx, &map_idx) != 2)
+ return;
+
+ map_idx -= MAP_LDIMM64_POISON_BASE;
+ if (map_idx < 0 || map_idx >= obj->nr_maps)
+ return;
+ map = &obj->maps[map_idx];
+
+ snprintf(patch, sizeof(patch),
+ "%d: <invalid BPF map reference>\n"
+ "BPF map '%s' is referenced but wasn't created\n",
+ insn_idx, map->name);
+
+ patch_log(buf, buf_sz, log_sz, line1, line3 - line1, patch);
+}
+
+static void fixup_verifier_log(struct bpf_program *prog, char *buf, size_t buf_sz)
+{
+ /* look for familiar error patterns in last N lines of the log */
+ const size_t max_last_line_cnt = 10;
+ char *prev_line, *cur_line, *next_line;
+ size_t log_sz;
+ int i;
+
+ if (!buf)
+ return;
+
+ log_sz = strlen(buf) + 1;
+ next_line = buf + log_sz - 1;
+
+ for (i = 0; i < max_last_line_cnt; i++, next_line = cur_line) {
+ cur_line = find_prev_line(buf, next_line);
+ if (!cur_line)
+ return;
+
+ /* failed CO-RE relocation case */
+ if (str_has_pfx(cur_line, "invalid func unknown#195896080\n")) {
+ prev_line = find_prev_line(buf, cur_line);
+ if (!prev_line)
+ continue;
+
+ fixup_log_failed_core_relo(prog, buf, buf_sz, log_sz,
+ prev_line, cur_line, next_line);
+ return;
+ } else if (str_has_pfx(cur_line, "invalid func unknown#"MAP_LDIMM64_POISON_PFX)) {
+ prev_line = find_prev_line(buf, cur_line);
+ if (!prev_line)
+ continue;
+
+ fixup_log_missing_map_load(prog, buf, buf_sz, log_sz,
+ prev_line, cur_line, next_line);
+ return;
+ }
+ }
+}
+
+static int bpf_program_record_relos(struct bpf_program *prog)
+{
+ struct bpf_object *obj = prog->obj;
+ int i;
+
+ for (i = 0; i < prog->nr_reloc; i++) {
+ struct reloc_desc *relo = &prog->reloc_desc[i];
+ struct extern_desc *ext = &obj->externs[relo->sym_off];
+
+ switch (relo->type) {
+ case RELO_EXTERN_VAR:
+ if (ext->type != EXT_KSYM)
+ continue;
+ bpf_gen__record_extern(obj->gen_loader, ext->name,
+ ext->is_weak, !ext->ksym.type_id,
+ BTF_KIND_VAR, relo->insn_idx);
+ break;
+ case RELO_EXTERN_FUNC:
+ bpf_gen__record_extern(obj->gen_loader, ext->name,
+ ext->is_weak, false, BTF_KIND_FUNC,
+ relo->insn_idx);
+ break;
+ case RELO_CORE: {
+ struct bpf_core_relo cr = {
+ .insn_off = relo->insn_idx * 8,
+ .type_id = relo->core_relo->type_id,
+ .access_str_off = relo->core_relo->access_str_off,
+ .kind = relo->core_relo->kind,
+ };
+
+ bpf_gen__record_relo_core(obj->gen_loader, &cr);
+ break;
+ }
+ default:
+ continue;
+ }
+ }
+ return 0;
+}
+
+static int
+bpf_object__load_progs(struct bpf_object *obj, int log_level)
+{
+ struct bpf_program *prog;
+ size_t i;
+ int err;
+
+ for (i = 0; i < obj->nr_programs; i++) {
+ prog = &obj->programs[i];
+ err = bpf_object__sanitize_prog(obj, prog);
+ if (err)
+ return err;
+ }
+
+ for (i = 0; i < obj->nr_programs; i++) {
+ prog = &obj->programs[i];
+ if (prog_is_subprog(obj, prog))
+ continue;
+ if (!prog->autoload) {
+ pr_debug("prog '%s': skipped loading\n", prog->name);
+ continue;
+ }
+ prog->log_level |= log_level;
+
+ if (obj->gen_loader)
+ bpf_program_record_relos(prog);
+
+ err = bpf_object_load_prog(obj, prog, prog->insns, prog->insns_cnt,
+ obj->license, obj->kern_version, &prog->fd);
+ if (err) {
+ pr_warn("prog '%s': failed to load: %d\n", prog->name, err);
+ return err;
+ }
+ }
+
+ bpf_object__free_relocs(obj);
+ return 0;
+}
+
+static const struct bpf_sec_def *find_sec_def(const char *sec_name);
+
+static int bpf_object_init_progs(struct bpf_object *obj, const struct bpf_object_open_opts *opts)
+{
+ struct bpf_program *prog;
+ int err;
+
+ bpf_object__for_each_program(prog, obj) {
+ prog->sec_def = find_sec_def(prog->sec_name);
+ if (!prog->sec_def) {
+ /* couldn't guess, but user might manually specify */
+ pr_debug("prog '%s': unrecognized ELF section name '%s'\n",
+ prog->name, prog->sec_name);
+ continue;
+ }
+
+ prog->type = prog->sec_def->prog_type;
+ prog->expected_attach_type = prog->sec_def->expected_attach_type;
+
+ /* sec_def can have custom callback which should be called
+ * after bpf_program is initialized to adjust its properties
+ */
+ if (prog->sec_def->prog_setup_fn) {
+ err = prog->sec_def->prog_setup_fn(prog, prog->sec_def->cookie);
+ if (err < 0) {
+ pr_warn("prog '%s': failed to initialize: %d\n",
+ prog->name, err);
+ return err;
+ }
+ }
+ }
+
+ return 0;
+}
+
+static struct bpf_object *bpf_object_open(const char *path, const void *obj_buf, size_t obj_buf_sz,
+ const struct bpf_object_open_opts *opts)
+{
+ const char *obj_name, *kconfig, *btf_tmp_path;
+ struct bpf_object *obj;
+ char tmp_name[64];
+ int err;
+ char *log_buf;
+ size_t log_size;
+ __u32 log_level;
+
+ if (elf_version(EV_CURRENT) == EV_NONE) {
+ pr_warn("failed to init libelf for %s\n",
+ path ? : "(mem buf)");
+ return ERR_PTR(-LIBBPF_ERRNO__LIBELF);
+ }
+
+ if (!OPTS_VALID(opts, bpf_object_open_opts))
+ return ERR_PTR(-EINVAL);
+
+ obj_name = OPTS_GET(opts, object_name, NULL);
+ if (obj_buf) {
+ if (!obj_name) {
+ snprintf(tmp_name, sizeof(tmp_name), "%lx-%lx",
+ (unsigned long)obj_buf,
+ (unsigned long)obj_buf_sz);
+ obj_name = tmp_name;
+ }
+ path = obj_name;
+ pr_debug("loading object '%s' from buffer\n", obj_name);
+ }
+
+ log_buf = OPTS_GET(opts, kernel_log_buf, NULL);
+ log_size = OPTS_GET(opts, kernel_log_size, 0);
+ log_level = OPTS_GET(opts, kernel_log_level, 0);
+ if (log_size > UINT_MAX)
+ return ERR_PTR(-EINVAL);
+ if (log_size && !log_buf)
+ return ERR_PTR(-EINVAL);
+
+ obj = bpf_object__new(path, obj_buf, obj_buf_sz, obj_name);
+ if (IS_ERR(obj))
+ return obj;
+
+ obj->log_buf = log_buf;
+ obj->log_size = log_size;
+ obj->log_level = log_level;
+
+ btf_tmp_path = OPTS_GET(opts, btf_custom_path, NULL);
+ if (btf_tmp_path) {
+ if (strlen(btf_tmp_path) >= PATH_MAX) {
+ err = -ENAMETOOLONG;
+ goto out;
+ }
+ obj->btf_custom_path = strdup(btf_tmp_path);
+ if (!obj->btf_custom_path) {
+ err = -ENOMEM;
+ goto out;
+ }
+ }
+
+ kconfig = OPTS_GET(opts, kconfig, NULL);
+ if (kconfig) {
+ obj->kconfig = strdup(kconfig);
+ if (!obj->kconfig) {
+ err = -ENOMEM;
+ goto out;
+ }
+ }
+
+ err = bpf_object__elf_init(obj);
+ err = err ? : bpf_object__check_endianness(obj);
+ err = err ? : bpf_object__elf_collect(obj);
+ err = err ? : bpf_object__collect_externs(obj);
+ err = err ? : bpf_object_fixup_btf(obj);
+ err = err ? : bpf_object__init_maps(obj, opts);
+ err = err ? : bpf_object_init_progs(obj, opts);
+ err = err ? : bpf_object__collect_relos(obj);
+ if (err)
+ goto out;
+
+ bpf_object__elf_finish(obj);
+
+ return obj;
+out:
+ bpf_object__close(obj);
+ return ERR_PTR(err);
+}
+
+struct bpf_object *
+bpf_object__open_file(const char *path, const struct bpf_object_open_opts *opts)
+{
+ if (!path)
+ return libbpf_err_ptr(-EINVAL);
+
+ pr_debug("loading %s\n", path);
+
+ return libbpf_ptr(bpf_object_open(path, NULL, 0, opts));
+}
+
+struct bpf_object *bpf_object__open(const char *path)
+{
+ return bpf_object__open_file(path, NULL);
+}
+
+struct bpf_object *
+bpf_object__open_mem(const void *obj_buf, size_t obj_buf_sz,
+ const struct bpf_object_open_opts *opts)
+{
+ if (!obj_buf || obj_buf_sz == 0)
+ return libbpf_err_ptr(-EINVAL);
+
+ return libbpf_ptr(bpf_object_open(NULL, obj_buf, obj_buf_sz, opts));
+}
+
+static int bpf_object_unload(struct bpf_object *obj)
+{
+ size_t i;
+
+ if (!obj)
+ return libbpf_err(-EINVAL);
+
+ for (i = 0; i < obj->nr_maps; i++) {
+ zclose(obj->maps[i].fd);
+ if (obj->maps[i].st_ops)
+ zfree(&obj->maps[i].st_ops->kern_vdata);
+ }
+
+ for (i = 0; i < obj->nr_programs; i++)
+ bpf_program__unload(&obj->programs[i]);
+
+ return 0;
+}
+
+static int bpf_object__sanitize_maps(struct bpf_object *obj)
+{
+ struct bpf_map *m;
+
+ bpf_object__for_each_map(m, obj) {
+ if (!bpf_map__is_internal(m))
+ continue;
+ if (!kernel_supports(obj, FEAT_ARRAY_MMAP))
+ m->def.map_flags ^= BPF_F_MMAPABLE;
+ }
+
+ return 0;
+}
+
+int libbpf_kallsyms_parse(kallsyms_cb_t cb, void *ctx)
+{
+ char sym_type, sym_name[500];
+ unsigned long long sym_addr;
+ int ret, err = 0;
+ FILE *f;
+
+ f = fopen("/proc/kallsyms", "r");
+ if (!f) {
+ err = -errno;
+ pr_warn("failed to open /proc/kallsyms: %d\n", err);
+ return err;
+ }
+
+ while (true) {
+ ret = fscanf(f, "%llx %c %499s%*[^\n]\n",
+ &sym_addr, &sym_type, sym_name);
+ if (ret == EOF && feof(f))
+ break;
+ if (ret != 3) {
+ pr_warn("failed to read kallsyms entry: %d\n", ret);
+ err = -EINVAL;
+ break;
+ }
+
+ err = cb(sym_addr, sym_type, sym_name, ctx);
+ if (err)
+ break;
+ }
+
+ fclose(f);
+ return err;
+}
+
+static int kallsyms_cb(unsigned long long sym_addr, char sym_type,
+ const char *sym_name, void *ctx)
+{
+ struct bpf_object *obj = ctx;
+ const struct btf_type *t;
+ struct extern_desc *ext;
+
+ ext = find_extern_by_name(obj, sym_name);
+ if (!ext || ext->type != EXT_KSYM)
+ return 0;
+
+ t = btf__type_by_id(obj->btf, ext->btf_id);
+ if (!btf_is_var(t))
+ return 0;
+
+ if (ext->is_set && ext->ksym.addr != sym_addr) {
+ pr_warn("extern (ksym) '%s': resolution is ambiguous: 0x%llx or 0x%llx\n",
+ sym_name, ext->ksym.addr, sym_addr);
+ return -EINVAL;
+ }
+ if (!ext->is_set) {
+ ext->is_set = true;
+ ext->ksym.addr = sym_addr;
+ pr_debug("extern (ksym) '%s': set to 0x%llx\n", sym_name, sym_addr);
+ }
+ return 0;
+}
+
+static int bpf_object__read_kallsyms_file(struct bpf_object *obj)
+{
+ return libbpf_kallsyms_parse(kallsyms_cb, obj);
+}
+
+static int find_ksym_btf_id(struct bpf_object *obj, const char *ksym_name,
+ __u16 kind, struct btf **res_btf,
+ struct module_btf **res_mod_btf)
+{
+ struct module_btf *mod_btf;
+ struct btf *btf;
+ int i, id, err;
+
+ btf = obj->btf_vmlinux;
+ mod_btf = NULL;
+ id = btf__find_by_name_kind(btf, ksym_name, kind);
+
+ if (id == -ENOENT) {
+ err = load_module_btfs(obj);
+ if (err)
+ return err;
+
+ for (i = 0; i < obj->btf_module_cnt; i++) {
+ /* we assume module_btf's BTF FD is always >0 */
+ mod_btf = &obj->btf_modules[i];
+ btf = mod_btf->btf;
+ id = btf__find_by_name_kind_own(btf, ksym_name, kind);
+ if (id != -ENOENT)
+ break;
+ }
+ }
+ if (id <= 0)
+ return -ESRCH;
+
+ *res_btf = btf;
+ *res_mod_btf = mod_btf;
+ return id;
+}
+
+static int bpf_object__resolve_ksym_var_btf_id(struct bpf_object *obj,
+ struct extern_desc *ext)
+{
+ const struct btf_type *targ_var, *targ_type;
+ __u32 targ_type_id, local_type_id;
+ struct module_btf *mod_btf = NULL;
+ const char *targ_var_name;
+ struct btf *btf = NULL;
+ int id, err;
+
+ id = find_ksym_btf_id(obj, ext->name, BTF_KIND_VAR, &btf, &mod_btf);
+ if (id < 0) {
+ if (id == -ESRCH && ext->is_weak)
+ return 0;
+ pr_warn("extern (var ksym) '%s': not found in kernel BTF\n",
+ ext->name);
+ return id;
+ }
+
+ /* find local type_id */
+ local_type_id = ext->ksym.type_id;
+
+ /* find target type_id */
+ targ_var = btf__type_by_id(btf, id);
+ targ_var_name = btf__name_by_offset(btf, targ_var->name_off);
+ targ_type = skip_mods_and_typedefs(btf, targ_var->type, &targ_type_id);
+
+ err = bpf_core_types_are_compat(obj->btf, local_type_id,
+ btf, targ_type_id);
+ if (err <= 0) {
+ const struct btf_type *local_type;
+ const char *targ_name, *local_name;
+
+ local_type = btf__type_by_id(obj->btf, local_type_id);
+ local_name = btf__name_by_offset(obj->btf, local_type->name_off);
+ targ_name = btf__name_by_offset(btf, targ_type->name_off);
+
+ pr_warn("extern (var ksym) '%s': incompatible types, expected [%d] %s %s, but kernel has [%d] %s %s\n",
+ ext->name, local_type_id,
+ btf_kind_str(local_type), local_name, targ_type_id,
+ btf_kind_str(targ_type), targ_name);
+ return -EINVAL;
+ }
+
+ ext->is_set = true;
+ ext->ksym.kernel_btf_obj_fd = mod_btf ? mod_btf->fd : 0;
+ ext->ksym.kernel_btf_id = id;
+ pr_debug("extern (var ksym) '%s': resolved to [%d] %s %s\n",
+ ext->name, id, btf_kind_str(targ_var), targ_var_name);
+
+ return 0;
+}
+
+static int bpf_object__resolve_ksym_func_btf_id(struct bpf_object *obj,
+ struct extern_desc *ext)
+{
+ int local_func_proto_id, kfunc_proto_id, kfunc_id;
+ struct module_btf *mod_btf = NULL;
+ const struct btf_type *kern_func;
+ struct btf *kern_btf = NULL;
+ int ret;
+
+ local_func_proto_id = ext->ksym.type_id;
+
+ kfunc_id = find_ksym_btf_id(obj, ext->name, BTF_KIND_FUNC, &kern_btf, &mod_btf);
+ if (kfunc_id < 0) {
+ if (kfunc_id == -ESRCH && ext->is_weak)
+ return 0;
+ pr_warn("extern (func ksym) '%s': not found in kernel or module BTFs\n",
+ ext->name);
+ return kfunc_id;
+ }
+
+ kern_func = btf__type_by_id(kern_btf, kfunc_id);
+ kfunc_proto_id = kern_func->type;
+
+ ret = bpf_core_types_are_compat(obj->btf, local_func_proto_id,
+ kern_btf, kfunc_proto_id);
+ if (ret <= 0) {
+ pr_warn("extern (func ksym) '%s': func_proto [%d] incompatible with kernel [%d]\n",
+ ext->name, local_func_proto_id, kfunc_proto_id);
+ return -EINVAL;
+ }
+
+ /* set index for module BTF fd in fd_array, if unset */
+ if (mod_btf && !mod_btf->fd_array_idx) {
+ /* insn->off is s16 */
+ if (obj->fd_array_cnt == INT16_MAX) {
+ pr_warn("extern (func ksym) '%s': module BTF fd index %d too big to fit in bpf_insn offset\n",
+ ext->name, mod_btf->fd_array_idx);
+ return -E2BIG;
+ }
+ /* Cannot use index 0 for module BTF fd */
+ if (!obj->fd_array_cnt)
+ obj->fd_array_cnt = 1;
+
+ ret = libbpf_ensure_mem((void **)&obj->fd_array, &obj->fd_array_cap, sizeof(int),
+ obj->fd_array_cnt + 1);
+ if (ret)
+ return ret;
+ mod_btf->fd_array_idx = obj->fd_array_cnt;
+ /* we assume module BTF FD is always >0 */
+ obj->fd_array[obj->fd_array_cnt++] = mod_btf->fd;
+ }
+
+ ext->is_set = true;
+ ext->ksym.kernel_btf_id = kfunc_id;
+ ext->ksym.btf_fd_idx = mod_btf ? mod_btf->fd_array_idx : 0;
+ pr_debug("extern (func ksym) '%s': resolved to kernel [%d]\n",
+ ext->name, kfunc_id);
+
+ return 0;
+}
+
+static int bpf_object__resolve_ksyms_btf_id(struct bpf_object *obj)
+{
+ const struct btf_type *t;
+ struct extern_desc *ext;
+ int i, err;
+
+ for (i = 0; i < obj->nr_extern; i++) {
+ ext = &obj->externs[i];
+ if (ext->type != EXT_KSYM || !ext->ksym.type_id)
+ continue;
+
+ if (obj->gen_loader) {
+ ext->is_set = true;
+ ext->ksym.kernel_btf_obj_fd = 0;
+ ext->ksym.kernel_btf_id = 0;
+ continue;
+ }
+ t = btf__type_by_id(obj->btf, ext->btf_id);
+ if (btf_is_var(t))
+ err = bpf_object__resolve_ksym_var_btf_id(obj, ext);
+ else
+ err = bpf_object__resolve_ksym_func_btf_id(obj, ext);
+ if (err)
+ return err;
+ }
+ return 0;
+}
+
+static int bpf_object__resolve_externs(struct bpf_object *obj,
+ const char *extra_kconfig)
+{
+ bool need_config = false, need_kallsyms = false;
+ bool need_vmlinux_btf = false;
+ struct extern_desc *ext;
+ void *kcfg_data = NULL;
+ int err, i;
+
+ if (obj->nr_extern == 0)
+ return 0;
+
+ if (obj->kconfig_map_idx >= 0)
+ kcfg_data = obj->maps[obj->kconfig_map_idx].mmaped;
+
+ for (i = 0; i < obj->nr_extern; i++) {
+ ext = &obj->externs[i];
+
+ if (ext->type == EXT_KSYM) {
+ if (ext->ksym.type_id)
+ need_vmlinux_btf = true;
+ else
+ need_kallsyms = true;
+ continue;
+ } else if (ext->type == EXT_KCFG) {
+ void *ext_ptr = kcfg_data + ext->kcfg.data_off;
+ __u64 value = 0;
+
+ /* Kconfig externs need actual /proc/config.gz */
+ if (str_has_pfx(ext->name, "CONFIG_")) {
+ need_config = true;
+ continue;
+ }
+
+ /* Virtual kcfg externs are customly handled by libbpf */
+ if (strcmp(ext->name, "LINUX_KERNEL_VERSION") == 0) {
+ value = get_kernel_version();
+ if (!value) {
+ pr_warn("extern (kcfg) '%s': failed to get kernel version\n", ext->name);
+ return -EINVAL;
+ }
+ } else if (strcmp(ext->name, "LINUX_HAS_BPF_COOKIE") == 0) {
+ value = kernel_supports(obj, FEAT_BPF_COOKIE);
+ } else if (strcmp(ext->name, "LINUX_HAS_SYSCALL_WRAPPER") == 0) {
+ value = kernel_supports(obj, FEAT_SYSCALL_WRAPPER);
+ } else if (!str_has_pfx(ext->name, "LINUX_") || !ext->is_weak) {
+ /* Currently libbpf supports only CONFIG_ and LINUX_ prefixed
+ * __kconfig externs, where LINUX_ ones are virtual and filled out
+ * customly by libbpf (their values don't come from Kconfig).
+ * If LINUX_xxx variable is not recognized by libbpf, but is marked
+ * __weak, it defaults to zero value, just like for CONFIG_xxx
+ * externs.
+ */
+ pr_warn("extern (kcfg) '%s': unrecognized virtual extern\n", ext->name);
+ return -EINVAL;
+ }
+
+ err = set_kcfg_value_num(ext, ext_ptr, value);
+ if (err)
+ return err;
+ pr_debug("extern (kcfg) '%s': set to 0x%llx\n",
+ ext->name, (long long)value);
+ } else {
+ pr_warn("extern '%s': unrecognized extern kind\n", ext->name);
+ return -EINVAL;
+ }
+ }
+ if (need_config && extra_kconfig) {
+ err = bpf_object__read_kconfig_mem(obj, extra_kconfig, kcfg_data);
+ if (err)
+ return -EINVAL;
+ need_config = false;
+ for (i = 0; i < obj->nr_extern; i++) {
+ ext = &obj->externs[i];
+ if (ext->type == EXT_KCFG && !ext->is_set) {
+ need_config = true;
+ break;
+ }
+ }
+ }
+ if (need_config) {
+ err = bpf_object__read_kconfig_file(obj, kcfg_data);
+ if (err)
+ return -EINVAL;
+ }
+ if (need_kallsyms) {
+ err = bpf_object__read_kallsyms_file(obj);
+ if (err)
+ return -EINVAL;
+ }
+ if (need_vmlinux_btf) {
+ err = bpf_object__resolve_ksyms_btf_id(obj);
+ if (err)
+ return -EINVAL;
+ }
+ for (i = 0; i < obj->nr_extern; i++) {
+ ext = &obj->externs[i];
+
+ if (!ext->is_set && !ext->is_weak) {
+ pr_warn("extern '%s' (strong): not resolved\n", ext->name);
+ return -ESRCH;
+ } else if (!ext->is_set) {
+ pr_debug("extern '%s' (weak): not resolved, defaulting to zero\n",
+ ext->name);
+ }
+ }
+
+ return 0;
+}
+
+static int bpf_object_load(struct bpf_object *obj, int extra_log_level, const char *target_btf_path)
+{
+ int err, i;
+
+ if (!obj)
+ return libbpf_err(-EINVAL);
+
+ if (obj->loaded) {
+ pr_warn("object '%s': load can't be attempted twice\n", obj->name);
+ return libbpf_err(-EINVAL);
+ }
+
+ if (obj->gen_loader)
+ bpf_gen__init(obj->gen_loader, extra_log_level, obj->nr_programs, obj->nr_maps);
+
+ err = bpf_object__probe_loading(obj);
+ err = err ? : bpf_object__load_vmlinux_btf(obj, false);
+ err = err ? : bpf_object__resolve_externs(obj, obj->kconfig);
+ err = err ? : bpf_object__sanitize_and_load_btf(obj);
+ err = err ? : bpf_object__sanitize_maps(obj);
+ err = err ? : bpf_object__init_kern_struct_ops_maps(obj);
+ err = err ? : bpf_object__create_maps(obj);
+ err = err ? : bpf_object__relocate(obj, obj->btf_custom_path ? : target_btf_path);
+ err = err ? : bpf_object__load_progs(obj, extra_log_level);
+ err = err ? : bpf_object_init_prog_arrays(obj);
+
+ if (obj->gen_loader) {
+ /* reset FDs */
+ if (obj->btf)
+ btf__set_fd(obj->btf, -1);
+ for (i = 0; i < obj->nr_maps; i++)
+ obj->maps[i].fd = -1;
+ if (!err)
+ err = bpf_gen__finish(obj->gen_loader, obj->nr_programs, obj->nr_maps);
+ }
+
+ /* clean up fd_array */
+ zfree(&obj->fd_array);
+
+ /* clean up module BTFs */
+ for (i = 0; i < obj->btf_module_cnt; i++) {
+ close(obj->btf_modules[i].fd);
+ btf__free(obj->btf_modules[i].btf);
+ free(obj->btf_modules[i].name);
+ }
+ free(obj->btf_modules);
+
+ /* clean up vmlinux BTF */
+ btf__free(obj->btf_vmlinux);
+ obj->btf_vmlinux = NULL;
+
+ obj->loaded = true; /* doesn't matter if successfully or not */
+
+ if (err)
+ goto out;
+
+ return 0;
+out:
+ /* unpin any maps that were auto-pinned during load */
+ for (i = 0; i < obj->nr_maps; i++)
+ if (obj->maps[i].pinned && !obj->maps[i].reused)
+ bpf_map__unpin(&obj->maps[i], NULL);
+
+ bpf_object_unload(obj);
+ pr_warn("failed to load object '%s'\n", obj->path);
+ return libbpf_err(err);
+}
+
+int bpf_object__load(struct bpf_object *obj)
+{
+ return bpf_object_load(obj, 0, NULL);
+}
+
+static int make_parent_dir(const char *path)
+{
+ char *cp, errmsg[STRERR_BUFSIZE];
+ char *dname, *dir;
+ int err = 0;
+
+ dname = strdup(path);
+ if (dname == NULL)
+ return -ENOMEM;
+
+ dir = dirname(dname);
+ if (mkdir(dir, 0700) && errno != EEXIST)
+ err = -errno;
+
+ free(dname);
+ if (err) {
+ cp = libbpf_strerror_r(-err, errmsg, sizeof(errmsg));
+ pr_warn("failed to mkdir %s: %s\n", path, cp);
+ }
+ return err;
+}
+
+static int check_path(const char *path)
+{
+ char *cp, errmsg[STRERR_BUFSIZE];
+ struct statfs st_fs;
+ char *dname, *dir;
+ int err = 0;
+
+ if (path == NULL)
+ return -EINVAL;
+
+ dname = strdup(path);
+ if (dname == NULL)
+ return -ENOMEM;
+
+ dir = dirname(dname);
+ if (statfs(dir, &st_fs)) {
+ cp = libbpf_strerror_r(errno, errmsg, sizeof(errmsg));
+ pr_warn("failed to statfs %s: %s\n", dir, cp);
+ err = -errno;
+ }
+ free(dname);
+
+ if (!err && st_fs.f_type != BPF_FS_MAGIC) {
+ pr_warn("specified path %s is not on BPF FS\n", path);
+ err = -EINVAL;
+ }
+
+ return err;
+}
+
+int bpf_program__pin(struct bpf_program *prog, const char *path)
+{
+ char *cp, errmsg[STRERR_BUFSIZE];
+ int err;
+
+ if (prog->fd < 0) {
+ pr_warn("prog '%s': can't pin program that wasn't loaded\n", prog->name);
+ return libbpf_err(-EINVAL);
+ }
+
+ err = make_parent_dir(path);
+ if (err)
+ return libbpf_err(err);
+
+ err = check_path(path);
+ if (err)
+ return libbpf_err(err);
+
+ if (bpf_obj_pin(prog->fd, path)) {
+ err = -errno;
+ cp = libbpf_strerror_r(err, errmsg, sizeof(errmsg));
+ pr_warn("prog '%s': failed to pin at '%s': %s\n", prog->name, path, cp);
+ return libbpf_err(err);
+ }
+
+ pr_debug("prog '%s': pinned at '%s'\n", prog->name, path);
+ return 0;
+}
+
+int bpf_program__unpin(struct bpf_program *prog, const char *path)
+{
+ int err;
+
+ if (prog->fd < 0) {
+ pr_warn("prog '%s': can't unpin program that wasn't loaded\n", prog->name);
+ return libbpf_err(-EINVAL);
+ }
+
+ err = check_path(path);
+ if (err)
+ return libbpf_err(err);
+
+ err = unlink(path);
+ if (err)
+ return libbpf_err(-errno);
+
+ pr_debug("prog '%s': unpinned from '%s'\n", prog->name, path);
+ return 0;
+}
+
+int bpf_map__pin(struct bpf_map *map, const char *path)
+{
+ char *cp, errmsg[STRERR_BUFSIZE];
+ int err;
+
+ if (map == NULL) {
+ pr_warn("invalid map pointer\n");
+ return libbpf_err(-EINVAL);
+ }
+
+ if (map->pin_path) {
+ if (path && strcmp(path, map->pin_path)) {
+ pr_warn("map '%s' already has pin path '%s' different from '%s'\n",
+ bpf_map__name(map), map->pin_path, path);
+ return libbpf_err(-EINVAL);
+ } else if (map->pinned) {
+ pr_debug("map '%s' already pinned at '%s'; not re-pinning\n",
+ bpf_map__name(map), map->pin_path);
+ return 0;
+ }
+ } else {
+ if (!path) {
+ pr_warn("missing a path to pin map '%s' at\n",
+ bpf_map__name(map));
+ return libbpf_err(-EINVAL);
+ } else if (map->pinned) {
+ pr_warn("map '%s' already pinned\n", bpf_map__name(map));
+ return libbpf_err(-EEXIST);
+ }
+
+ map->pin_path = strdup(path);
+ if (!map->pin_path) {
+ err = -errno;
+ goto out_err;
+ }
+ }
+
+ err = make_parent_dir(map->pin_path);
+ if (err)
+ return libbpf_err(err);
+
+ err = check_path(map->pin_path);
+ if (err)
+ return libbpf_err(err);
+
+ if (bpf_obj_pin(map->fd, map->pin_path)) {
+ err = -errno;
+ goto out_err;
+ }
+
+ map->pinned = true;
+ pr_debug("pinned map '%s'\n", map->pin_path);
+
+ return 0;
+
+out_err:
+ cp = libbpf_strerror_r(-err, errmsg, sizeof(errmsg));
+ pr_warn("failed to pin map: %s\n", cp);
+ return libbpf_err(err);
+}
+
+int bpf_map__unpin(struct bpf_map *map, const char *path)
+{
+ int err;
+
+ if (map == NULL) {
+ pr_warn("invalid map pointer\n");
+ return libbpf_err(-EINVAL);
+ }
+
+ if (map->pin_path) {
+ if (path && strcmp(path, map->pin_path)) {
+ pr_warn("map '%s' already has pin path '%s' different from '%s'\n",
+ bpf_map__name(map), map->pin_path, path);
+ return libbpf_err(-EINVAL);
+ }
+ path = map->pin_path;
+ } else if (!path) {
+ pr_warn("no path to unpin map '%s' from\n",
+ bpf_map__name(map));
+ return libbpf_err(-EINVAL);
+ }
+
+ err = check_path(path);
+ if (err)
+ return libbpf_err(err);
+
+ err = unlink(path);
+ if (err != 0)
+ return libbpf_err(-errno);
+
+ map->pinned = false;
+ pr_debug("unpinned map '%s' from '%s'\n", bpf_map__name(map), path);
+
+ return 0;
+}
+
+int bpf_map__set_pin_path(struct bpf_map *map, const char *path)
+{
+ char *new = NULL;
+
+ if (path) {
+ new = strdup(path);
+ if (!new)
+ return libbpf_err(-errno);
+ }
+
+ free(map->pin_path);
+ map->pin_path = new;
+ return 0;
+}
+
+__alias(bpf_map__pin_path)
+const char *bpf_map__get_pin_path(const struct bpf_map *map);
+
+const char *bpf_map__pin_path(const struct bpf_map *map)
+{
+ return map->pin_path;
+}
+
+bool bpf_map__is_pinned(const struct bpf_map *map)
+{
+ return map->pinned;
+}
+
+static void sanitize_pin_path(char *s)
+{
+ /* bpffs disallows periods in path names */
+ while (*s) {
+ if (*s == '.')
+ *s = '_';
+ s++;
+ }
+}
+
+int bpf_object__pin_maps(struct bpf_object *obj, const char *path)
+{
+ struct bpf_map *map;
+ int err;
+
+ if (!obj)
+ return libbpf_err(-ENOENT);
+
+ if (!obj->loaded) {
+ pr_warn("object not yet loaded; load it first\n");
+ return libbpf_err(-ENOENT);
+ }
+
+ bpf_object__for_each_map(map, obj) {
+ char *pin_path = NULL;
+ char buf[PATH_MAX];
+
+ if (!map->autocreate)
+ continue;
+
+ if (path) {
+ err = pathname_concat(buf, sizeof(buf), path, bpf_map__name(map));
+ if (err)
+ goto err_unpin_maps;
+ sanitize_pin_path(buf);
+ pin_path = buf;
+ } else if (!map->pin_path) {
+ continue;
+ }
+
+ err = bpf_map__pin(map, pin_path);
+ if (err)
+ goto err_unpin_maps;
+ }
+
+ return 0;
+
+err_unpin_maps:
+ while ((map = bpf_object__prev_map(obj, map))) {
+ if (!map->pin_path)
+ continue;
+
+ bpf_map__unpin(map, NULL);
+ }
+
+ return libbpf_err(err);
+}
+
+int bpf_object__unpin_maps(struct bpf_object *obj, const char *path)
+{
+ struct bpf_map *map;
+ int err;
+
+ if (!obj)
+ return libbpf_err(-ENOENT);
+
+ bpf_object__for_each_map(map, obj) {
+ char *pin_path = NULL;
+ char buf[PATH_MAX];
+
+ if (path) {
+ err = pathname_concat(buf, sizeof(buf), path, bpf_map__name(map));
+ if (err)
+ return libbpf_err(err);
+ sanitize_pin_path(buf);
+ pin_path = buf;
+ } else if (!map->pin_path) {
+ continue;
+ }
+
+ err = bpf_map__unpin(map, pin_path);
+ if (err)
+ return libbpf_err(err);
+ }
+
+ return 0;
+}
+
+int bpf_object__pin_programs(struct bpf_object *obj, const char *path)
+{
+ struct bpf_program *prog;
+ char buf[PATH_MAX];
+ int err;
+
+ if (!obj)
+ return libbpf_err(-ENOENT);
+
+ if (!obj->loaded) {
+ pr_warn("object not yet loaded; load it first\n");
+ return libbpf_err(-ENOENT);
+ }
+
+ bpf_object__for_each_program(prog, obj) {
+ err = pathname_concat(buf, sizeof(buf), path, prog->name);
+ if (err)
+ goto err_unpin_programs;
+
+ err = bpf_program__pin(prog, buf);
+ if (err)
+ goto err_unpin_programs;
+ }
+
+ return 0;
+
+err_unpin_programs:
+ while ((prog = bpf_object__prev_program(obj, prog))) {
+ if (pathname_concat(buf, sizeof(buf), path, prog->name))
+ continue;
+
+ bpf_program__unpin(prog, buf);
+ }
+
+ return libbpf_err(err);
+}
+
+int bpf_object__unpin_programs(struct bpf_object *obj, const char *path)
+{
+ struct bpf_program *prog;
+ int err;
+
+ if (!obj)
+ return libbpf_err(-ENOENT);
+
+ bpf_object__for_each_program(prog, obj) {
+ char buf[PATH_MAX];
+
+ err = pathname_concat(buf, sizeof(buf), path, prog->name);
+ if (err)
+ return libbpf_err(err);
+
+ err = bpf_program__unpin(prog, buf);
+ if (err)
+ return libbpf_err(err);
+ }
+
+ return 0;
+}
+
+int bpf_object__pin(struct bpf_object *obj, const char *path)
+{
+ int err;
+
+ err = bpf_object__pin_maps(obj, path);
+ if (err)
+ return libbpf_err(err);
+
+ err = bpf_object__pin_programs(obj, path);
+ if (err) {
+ bpf_object__unpin_maps(obj, path);
+ return libbpf_err(err);
+ }
+
+ return 0;
+}
+
+static void bpf_map__destroy(struct bpf_map *map)
+{
+ if (map->inner_map) {
+ bpf_map__destroy(map->inner_map);
+ zfree(&map->inner_map);
+ }
+
+ zfree(&map->init_slots);
+ map->init_slots_sz = 0;
+
+ if (map->mmaped) {
+ munmap(map->mmaped, bpf_map_mmap_sz(map));
+ map->mmaped = NULL;
+ }
+
+ if (map->st_ops) {
+ zfree(&map->st_ops->data);
+ zfree(&map->st_ops->progs);
+ zfree(&map->st_ops->kern_func_off);
+ zfree(&map->st_ops);
+ }
+
+ zfree(&map->name);
+ zfree(&map->real_name);
+ zfree(&map->pin_path);
+
+ if (map->fd >= 0)
+ zclose(map->fd);
+}
+
+void bpf_object__close(struct bpf_object *obj)
+{
+ size_t i;
+
+ if (IS_ERR_OR_NULL(obj))
+ return;
+
+ usdt_manager_free(obj->usdt_man);
+ obj->usdt_man = NULL;
+
+ bpf_gen__free(obj->gen_loader);
+ bpf_object__elf_finish(obj);
+ bpf_object_unload(obj);
+ btf__free(obj->btf);
+ btf_ext__free(obj->btf_ext);
+
+ for (i = 0; i < obj->nr_maps; i++)
+ bpf_map__destroy(&obj->maps[i]);
+
+ zfree(&obj->btf_custom_path);
+ zfree(&obj->kconfig);
+ zfree(&obj->externs);
+ obj->nr_extern = 0;
+
+ zfree(&obj->maps);
+ obj->nr_maps = 0;
+
+ if (obj->programs && obj->nr_programs) {
+ for (i = 0; i < obj->nr_programs; i++)
+ bpf_program__exit(&obj->programs[i]);
+ }
+ zfree(&obj->programs);
+
+ free(obj);
+}
+
+const char *bpf_object__name(const struct bpf_object *obj)
+{
+ return obj ? obj->name : libbpf_err_ptr(-EINVAL);
+}
+
+unsigned int bpf_object__kversion(const struct bpf_object *obj)
+{
+ return obj ? obj->kern_version : 0;
+}
+
+struct btf *bpf_object__btf(const struct bpf_object *obj)
+{
+ return obj ? obj->btf : NULL;
+}
+
+int bpf_object__btf_fd(const struct bpf_object *obj)
+{
+ return obj->btf ? btf__fd(obj->btf) : -1;
+}
+
+int bpf_object__set_kversion(struct bpf_object *obj, __u32 kern_version)
+{
+ if (obj->loaded)
+ return libbpf_err(-EINVAL);
+
+ obj->kern_version = kern_version;
+
+ return 0;
+}
+
+int bpf_object__gen_loader(struct bpf_object *obj, struct gen_loader_opts *opts)
+{
+ struct bpf_gen *gen;
+
+ if (!opts)
+ return -EFAULT;
+ if (!OPTS_VALID(opts, gen_loader_opts))
+ return -EINVAL;
+ gen = calloc(sizeof(*gen), 1);
+ if (!gen)
+ return -ENOMEM;
+ gen->opts = opts;
+ obj->gen_loader = gen;
+ return 0;
+}
+
+static struct bpf_program *
+__bpf_program__iter(const struct bpf_program *p, const struct bpf_object *obj,
+ bool forward)
+{
+ size_t nr_programs = obj->nr_programs;
+ ssize_t idx;
+
+ if (!nr_programs)
+ return NULL;
+
+ if (!p)
+ /* Iter from the beginning */
+ return forward ? &obj->programs[0] :
+ &obj->programs[nr_programs - 1];
+
+ if (p->obj != obj) {
+ pr_warn("error: program handler doesn't match object\n");
+ return errno = EINVAL, NULL;
+ }
+
+ idx = (p - obj->programs) + (forward ? 1 : -1);
+ if (idx >= obj->nr_programs || idx < 0)
+ return NULL;
+ return &obj->programs[idx];
+}
+
+struct bpf_program *
+bpf_object__next_program(const struct bpf_object *obj, struct bpf_program *prev)
+{
+ struct bpf_program *prog = prev;
+
+ do {
+ prog = __bpf_program__iter(prog, obj, true);
+ } while (prog && prog_is_subprog(obj, prog));
+
+ return prog;
+}
+
+struct bpf_program *
+bpf_object__prev_program(const struct bpf_object *obj, struct bpf_program *next)
+{
+ struct bpf_program *prog = next;
+
+ do {
+ prog = __bpf_program__iter(prog, obj, false);
+ } while (prog && prog_is_subprog(obj, prog));
+
+ return prog;
+}
+
+void bpf_program__set_ifindex(struct bpf_program *prog, __u32 ifindex)
+{
+ prog->prog_ifindex = ifindex;
+}
+
+const char *bpf_program__name(const struct bpf_program *prog)
+{
+ return prog->name;
+}
+
+const char *bpf_program__section_name(const struct bpf_program *prog)
+{
+ return prog->sec_name;
+}
+
+bool bpf_program__autoload(const struct bpf_program *prog)
+{
+ return prog->autoload;
+}
+
+int bpf_program__set_autoload(struct bpf_program *prog, bool autoload)
+{
+ if (prog->obj->loaded)
+ return libbpf_err(-EINVAL);
+
+ prog->autoload = autoload;
+ return 0;
+}
+
+bool bpf_program__autoattach(const struct bpf_program *prog)
+{
+ return prog->autoattach;
+}
+
+void bpf_program__set_autoattach(struct bpf_program *prog, bool autoattach)
+{
+ prog->autoattach = autoattach;
+}
+
+const struct bpf_insn *bpf_program__insns(const struct bpf_program *prog)
+{
+ return prog->insns;
+}
+
+size_t bpf_program__insn_cnt(const struct bpf_program *prog)
+{
+ return prog->insns_cnt;
+}
+
+int bpf_program__set_insns(struct bpf_program *prog,
+ struct bpf_insn *new_insns, size_t new_insn_cnt)
+{
+ struct bpf_insn *insns;
+
+ if (prog->obj->loaded)
+ return -EBUSY;
+
+ insns = libbpf_reallocarray(prog->insns, new_insn_cnt, sizeof(*insns));
+ if (!insns) {
+ pr_warn("prog '%s': failed to realloc prog code\n", prog->name);
+ return -ENOMEM;
+ }
+ memcpy(insns, new_insns, new_insn_cnt * sizeof(*insns));
+
+ prog->insns = insns;
+ prog->insns_cnt = new_insn_cnt;
+ return 0;
+}
+
+int bpf_program__fd(const struct bpf_program *prog)
+{
+ if (!prog)
+ return libbpf_err(-EINVAL);
+
+ if (prog->fd < 0)
+ return libbpf_err(-ENOENT);
+
+ return prog->fd;
+}
+
+__alias(bpf_program__type)
+enum bpf_prog_type bpf_program__get_type(const struct bpf_program *prog);
+
+enum bpf_prog_type bpf_program__type(const struct bpf_program *prog)
+{
+ return prog->type;
+}
+
+int bpf_program__set_type(struct bpf_program *prog, enum bpf_prog_type type)
+{
+ if (prog->obj->loaded)
+ return libbpf_err(-EBUSY);
+
+ prog->type = type;
+ return 0;
+}
+
+__alias(bpf_program__expected_attach_type)
+enum bpf_attach_type bpf_program__get_expected_attach_type(const struct bpf_program *prog);
+
+enum bpf_attach_type bpf_program__expected_attach_type(const struct bpf_program *prog)
+{
+ return prog->expected_attach_type;
+}
+
+int bpf_program__set_expected_attach_type(struct bpf_program *prog,
+ enum bpf_attach_type type)
+{
+ if (prog->obj->loaded)
+ return libbpf_err(-EBUSY);
+
+ prog->expected_attach_type = type;
+ return 0;
+}
+
+__u32 bpf_program__flags(const struct bpf_program *prog)
+{
+ return prog->prog_flags;
+}
+
+int bpf_program__set_flags(struct bpf_program *prog, __u32 flags)
+{
+ if (prog->obj->loaded)
+ return libbpf_err(-EBUSY);
+
+ prog->prog_flags = flags;
+ return 0;
+}
+
+__u32 bpf_program__log_level(const struct bpf_program *prog)
+{
+ return prog->log_level;
+}
+
+int bpf_program__set_log_level(struct bpf_program *prog, __u32 log_level)
+{
+ if (prog->obj->loaded)
+ return libbpf_err(-EBUSY);
+
+ prog->log_level = log_level;
+ return 0;
+}
+
+const char *bpf_program__log_buf(const struct bpf_program *prog, size_t *log_size)
+{
+ *log_size = prog->log_size;
+ return prog->log_buf;
+}
+
+int bpf_program__set_log_buf(struct bpf_program *prog, char *log_buf, size_t log_size)
+{
+ if (log_size && !log_buf)
+ return -EINVAL;
+ if (prog->log_size > UINT_MAX)
+ return -EINVAL;
+ if (prog->obj->loaded)
+ return -EBUSY;
+
+ prog->log_buf = log_buf;
+ prog->log_size = log_size;
+ return 0;
+}
+
+#define SEC_DEF(sec_pfx, ptype, atype, flags, ...) { \
+ .sec = (char *)sec_pfx, \
+ .prog_type = BPF_PROG_TYPE_##ptype, \
+ .expected_attach_type = atype, \
+ .cookie = (long)(flags), \
+ .prog_prepare_load_fn = libbpf_prepare_prog_load, \
+ __VA_ARGS__ \
+}
+
+static int attach_kprobe(const struct bpf_program *prog, long cookie, struct bpf_link **link);
+static int attach_uprobe(const struct bpf_program *prog, long cookie, struct bpf_link **link);
+static int attach_ksyscall(const struct bpf_program *prog, long cookie, struct bpf_link **link);
+static int attach_usdt(const struct bpf_program *prog, long cookie, struct bpf_link **link);
+static int attach_tp(const struct bpf_program *prog, long cookie, struct bpf_link **link);
+static int attach_raw_tp(const struct bpf_program *prog, long cookie, struct bpf_link **link);
+static int attach_trace(const struct bpf_program *prog, long cookie, struct bpf_link **link);
+static int attach_kprobe_multi(const struct bpf_program *prog, long cookie, struct bpf_link **link);
+static int attach_lsm(const struct bpf_program *prog, long cookie, struct bpf_link **link);
+static int attach_iter(const struct bpf_program *prog, long cookie, struct bpf_link **link);
+
+static const struct bpf_sec_def section_defs[] = {
+ SEC_DEF("socket", SOCKET_FILTER, 0, SEC_NONE),
+ SEC_DEF("sk_reuseport/migrate", SK_REUSEPORT, BPF_SK_REUSEPORT_SELECT_OR_MIGRATE, SEC_ATTACHABLE),
+ SEC_DEF("sk_reuseport", SK_REUSEPORT, BPF_SK_REUSEPORT_SELECT, SEC_ATTACHABLE),
+ SEC_DEF("kprobe+", KPROBE, 0, SEC_NONE, attach_kprobe),
+ SEC_DEF("uprobe+", KPROBE, 0, SEC_NONE, attach_uprobe),
+ SEC_DEF("uprobe.s+", KPROBE, 0, SEC_SLEEPABLE, attach_uprobe),
+ SEC_DEF("kretprobe+", KPROBE, 0, SEC_NONE, attach_kprobe),
+ SEC_DEF("uretprobe+", KPROBE, 0, SEC_NONE, attach_uprobe),
+ SEC_DEF("uretprobe.s+", KPROBE, 0, SEC_SLEEPABLE, attach_uprobe),
+ SEC_DEF("kprobe.multi+", KPROBE, BPF_TRACE_KPROBE_MULTI, SEC_NONE, attach_kprobe_multi),
+ SEC_DEF("kretprobe.multi+", KPROBE, BPF_TRACE_KPROBE_MULTI, SEC_NONE, attach_kprobe_multi),
+ SEC_DEF("ksyscall+", KPROBE, 0, SEC_NONE, attach_ksyscall),
+ SEC_DEF("kretsyscall+", KPROBE, 0, SEC_NONE, attach_ksyscall),
+ SEC_DEF("usdt+", KPROBE, 0, SEC_NONE, attach_usdt),
+ SEC_DEF("tc", SCHED_CLS, 0, SEC_NONE),
+ SEC_DEF("classifier", SCHED_CLS, 0, SEC_NONE),
+ SEC_DEF("action", SCHED_ACT, 0, SEC_NONE),
+ SEC_DEF("tracepoint+", TRACEPOINT, 0, SEC_NONE, attach_tp),
+ SEC_DEF("tp+", TRACEPOINT, 0, SEC_NONE, attach_tp),
+ SEC_DEF("raw_tracepoint+", RAW_TRACEPOINT, 0, SEC_NONE, attach_raw_tp),
+ SEC_DEF("raw_tp+", RAW_TRACEPOINT, 0, SEC_NONE, attach_raw_tp),
+ SEC_DEF("raw_tracepoint.w+", RAW_TRACEPOINT_WRITABLE, 0, SEC_NONE, attach_raw_tp),
+ SEC_DEF("raw_tp.w+", RAW_TRACEPOINT_WRITABLE, 0, SEC_NONE, attach_raw_tp),
+ SEC_DEF("tp_btf+", TRACING, BPF_TRACE_RAW_TP, SEC_ATTACH_BTF, attach_trace),
+ SEC_DEF("fentry+", TRACING, BPF_TRACE_FENTRY, SEC_ATTACH_BTF, attach_trace),
+ SEC_DEF("fmod_ret+", TRACING, BPF_MODIFY_RETURN, SEC_ATTACH_BTF, attach_trace),
+ SEC_DEF("fexit+", TRACING, BPF_TRACE_FEXIT, SEC_ATTACH_BTF, attach_trace),
+ SEC_DEF("fentry.s+", TRACING, BPF_TRACE_FENTRY, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_trace),
+ SEC_DEF("fmod_ret.s+", TRACING, BPF_MODIFY_RETURN, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_trace),
+ SEC_DEF("fexit.s+", TRACING, BPF_TRACE_FEXIT, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_trace),
+ SEC_DEF("freplace+", EXT, 0, SEC_ATTACH_BTF, attach_trace),
+ SEC_DEF("lsm+", LSM, BPF_LSM_MAC, SEC_ATTACH_BTF, attach_lsm),
+ SEC_DEF("lsm.s+", LSM, BPF_LSM_MAC, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_lsm),
+ SEC_DEF("lsm_cgroup+", LSM, BPF_LSM_CGROUP, SEC_ATTACH_BTF),
+ SEC_DEF("iter+", TRACING, BPF_TRACE_ITER, SEC_ATTACH_BTF, attach_iter),
+ SEC_DEF("iter.s+", TRACING, BPF_TRACE_ITER, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_iter),
+ SEC_DEF("syscall", SYSCALL, 0, SEC_SLEEPABLE),
+ SEC_DEF("xdp.frags/devmap", XDP, BPF_XDP_DEVMAP, SEC_XDP_FRAGS),
+ SEC_DEF("xdp/devmap", XDP, BPF_XDP_DEVMAP, SEC_ATTACHABLE),
+ SEC_DEF("xdp.frags/cpumap", XDP, BPF_XDP_CPUMAP, SEC_XDP_FRAGS),
+ SEC_DEF("xdp/cpumap", XDP, BPF_XDP_CPUMAP, SEC_ATTACHABLE),
+ SEC_DEF("xdp.frags", XDP, BPF_XDP, SEC_XDP_FRAGS),
+ SEC_DEF("xdp", XDP, BPF_XDP, SEC_ATTACHABLE_OPT),
+ SEC_DEF("perf_event", PERF_EVENT, 0, SEC_NONE),
+ SEC_DEF("lwt_in", LWT_IN, 0, SEC_NONE),
+ SEC_DEF("lwt_out", LWT_OUT, 0, SEC_NONE),
+ SEC_DEF("lwt_xmit", LWT_XMIT, 0, SEC_NONE),
+ SEC_DEF("lwt_seg6local", LWT_SEG6LOCAL, 0, SEC_NONE),
+ SEC_DEF("sockops", SOCK_OPS, BPF_CGROUP_SOCK_OPS, SEC_ATTACHABLE_OPT),
+ SEC_DEF("sk_skb/stream_parser", SK_SKB, BPF_SK_SKB_STREAM_PARSER, SEC_ATTACHABLE_OPT),
+ SEC_DEF("sk_skb/stream_verdict",SK_SKB, BPF_SK_SKB_STREAM_VERDICT, SEC_ATTACHABLE_OPT),
+ SEC_DEF("sk_skb", SK_SKB, 0, SEC_NONE),
+ SEC_DEF("sk_msg", SK_MSG, BPF_SK_MSG_VERDICT, SEC_ATTACHABLE_OPT),
+ SEC_DEF("lirc_mode2", LIRC_MODE2, BPF_LIRC_MODE2, SEC_ATTACHABLE_OPT),
+ SEC_DEF("flow_dissector", FLOW_DISSECTOR, BPF_FLOW_DISSECTOR, SEC_ATTACHABLE_OPT),
+ SEC_DEF("cgroup_skb/ingress", CGROUP_SKB, BPF_CGROUP_INET_INGRESS, SEC_ATTACHABLE_OPT),
+ SEC_DEF("cgroup_skb/egress", CGROUP_SKB, BPF_CGROUP_INET_EGRESS, SEC_ATTACHABLE_OPT),
+ SEC_DEF("cgroup/skb", CGROUP_SKB, 0, SEC_NONE),
+ SEC_DEF("cgroup/sock_create", CGROUP_SOCK, BPF_CGROUP_INET_SOCK_CREATE, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/sock_release", CGROUP_SOCK, BPF_CGROUP_INET_SOCK_RELEASE, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/sock", CGROUP_SOCK, BPF_CGROUP_INET_SOCK_CREATE, SEC_ATTACHABLE_OPT),
+ SEC_DEF("cgroup/post_bind4", CGROUP_SOCK, BPF_CGROUP_INET4_POST_BIND, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/post_bind6", CGROUP_SOCK, BPF_CGROUP_INET6_POST_BIND, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/bind4", CGROUP_SOCK_ADDR, BPF_CGROUP_INET4_BIND, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/bind6", CGROUP_SOCK_ADDR, BPF_CGROUP_INET6_BIND, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/connect4", CGROUP_SOCK_ADDR, BPF_CGROUP_INET4_CONNECT, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/connect6", CGROUP_SOCK_ADDR, BPF_CGROUP_INET6_CONNECT, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/sendmsg4", CGROUP_SOCK_ADDR, BPF_CGROUP_UDP4_SENDMSG, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/sendmsg6", CGROUP_SOCK_ADDR, BPF_CGROUP_UDP6_SENDMSG, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/recvmsg4", CGROUP_SOCK_ADDR, BPF_CGROUP_UDP4_RECVMSG, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/recvmsg6", CGROUP_SOCK_ADDR, BPF_CGROUP_UDP6_RECVMSG, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/getpeername4", CGROUP_SOCK_ADDR, BPF_CGROUP_INET4_GETPEERNAME, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/getpeername6", CGROUP_SOCK_ADDR, BPF_CGROUP_INET6_GETPEERNAME, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/getsockname4", CGROUP_SOCK_ADDR, BPF_CGROUP_INET4_GETSOCKNAME, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/getsockname6", CGROUP_SOCK_ADDR, BPF_CGROUP_INET6_GETSOCKNAME, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/sysctl", CGROUP_SYSCTL, BPF_CGROUP_SYSCTL, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/getsockopt", CGROUP_SOCKOPT, BPF_CGROUP_GETSOCKOPT, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/setsockopt", CGROUP_SOCKOPT, BPF_CGROUP_SETSOCKOPT, SEC_ATTACHABLE),
+ SEC_DEF("cgroup/dev", CGROUP_DEVICE, BPF_CGROUP_DEVICE, SEC_ATTACHABLE_OPT),
+ SEC_DEF("struct_ops+", STRUCT_OPS, 0, SEC_NONE),
+ SEC_DEF("sk_lookup", SK_LOOKUP, BPF_SK_LOOKUP, SEC_ATTACHABLE),
+};
+
+static size_t custom_sec_def_cnt;
+static struct bpf_sec_def *custom_sec_defs;
+static struct bpf_sec_def custom_fallback_def;
+static bool has_custom_fallback_def;
+
+static int last_custom_sec_def_handler_id;
+
+int libbpf_register_prog_handler(const char *sec,
+ enum bpf_prog_type prog_type,
+ enum bpf_attach_type exp_attach_type,
+ const struct libbpf_prog_handler_opts *opts)
+{
+ struct bpf_sec_def *sec_def;
+
+ if (!OPTS_VALID(opts, libbpf_prog_handler_opts))
+ return libbpf_err(-EINVAL);
+
+ if (last_custom_sec_def_handler_id == INT_MAX) /* prevent overflow */
+ return libbpf_err(-E2BIG);
+
+ if (sec) {
+ sec_def = libbpf_reallocarray(custom_sec_defs, custom_sec_def_cnt + 1,
+ sizeof(*sec_def));
+ if (!sec_def)
+ return libbpf_err(-ENOMEM);
+
+ custom_sec_defs = sec_def;
+ sec_def = &custom_sec_defs[custom_sec_def_cnt];
+ } else {
+ if (has_custom_fallback_def)
+ return libbpf_err(-EBUSY);
+
+ sec_def = &custom_fallback_def;
+ }
+
+ sec_def->sec = sec ? strdup(sec) : NULL;
+ if (sec && !sec_def->sec)
+ return libbpf_err(-ENOMEM);
+
+ sec_def->prog_type = prog_type;
+ sec_def->expected_attach_type = exp_attach_type;
+ sec_def->cookie = OPTS_GET(opts, cookie, 0);
+
+ sec_def->prog_setup_fn = OPTS_GET(opts, prog_setup_fn, NULL);
+ sec_def->prog_prepare_load_fn = OPTS_GET(opts, prog_prepare_load_fn, NULL);
+ sec_def->prog_attach_fn = OPTS_GET(opts, prog_attach_fn, NULL);
+
+ sec_def->handler_id = ++last_custom_sec_def_handler_id;
+
+ if (sec)
+ custom_sec_def_cnt++;
+ else
+ has_custom_fallback_def = true;
+
+ return sec_def->handler_id;
+}
+
+int libbpf_unregister_prog_handler(int handler_id)
+{
+ struct bpf_sec_def *sec_defs;
+ int i;
+
+ if (handler_id <= 0)
+ return libbpf_err(-EINVAL);
+
+ if (has_custom_fallback_def && custom_fallback_def.handler_id == handler_id) {
+ memset(&custom_fallback_def, 0, sizeof(custom_fallback_def));
+ has_custom_fallback_def = false;
+ return 0;
+ }
+
+ for (i = 0; i < custom_sec_def_cnt; i++) {
+ if (custom_sec_defs[i].handler_id == handler_id)
+ break;
+ }
+
+ if (i == custom_sec_def_cnt)
+ return libbpf_err(-ENOENT);
+
+ free(custom_sec_defs[i].sec);
+ for (i = i + 1; i < custom_sec_def_cnt; i++)
+ custom_sec_defs[i - 1] = custom_sec_defs[i];
+ custom_sec_def_cnt--;
+
+ /* try to shrink the array, but it's ok if we couldn't */
+ sec_defs = libbpf_reallocarray(custom_sec_defs, custom_sec_def_cnt, sizeof(*sec_defs));
+ if (sec_defs)
+ custom_sec_defs = sec_defs;
+
+ return 0;
+}
+
+static bool sec_def_matches(const struct bpf_sec_def *sec_def, const char *sec_name)
+{
+ size_t len = strlen(sec_def->sec);
+
+ /* "type/" always has to have proper SEC("type/extras") form */
+ if (sec_def->sec[len - 1] == '/') {
+ if (str_has_pfx(sec_name, sec_def->sec))
+ return true;
+ return false;
+ }
+
+ /* "type+" means it can be either exact SEC("type") or
+ * well-formed SEC("type/extras") with proper '/' separator
+ */
+ if (sec_def->sec[len - 1] == '+') {
+ len--;
+ /* not even a prefix */
+ if (strncmp(sec_name, sec_def->sec, len) != 0)
+ return false;
+ /* exact match or has '/' separator */
+ if (sec_name[len] == '\0' || sec_name[len] == '/')
+ return true;
+ return false;
+ }
+
+ return strcmp(sec_name, sec_def->sec) == 0;
+}
+
+static const struct bpf_sec_def *find_sec_def(const char *sec_name)
+{
+ const struct bpf_sec_def *sec_def;
+ int i, n;
+
+ n = custom_sec_def_cnt;
+ for (i = 0; i < n; i++) {
+ sec_def = &custom_sec_defs[i];
+ if (sec_def_matches(sec_def, sec_name))
+ return sec_def;
+ }
+
+ n = ARRAY_SIZE(section_defs);
+ for (i = 0; i < n; i++) {
+ sec_def = &section_defs[i];
+ if (sec_def_matches(sec_def, sec_name))
+ return sec_def;
+ }
+
+ if (has_custom_fallback_def)
+ return &custom_fallback_def;
+
+ return NULL;
+}
+
+#define MAX_TYPE_NAME_SIZE 32
+
+static char *libbpf_get_type_names(bool attach_type)
+{
+ int i, len = ARRAY_SIZE(section_defs) * MAX_TYPE_NAME_SIZE;
+ char *buf;
+
+ buf = malloc(len);
+ if (!buf)
+ return NULL;
+
+ buf[0] = '\0';
+ /* Forge string buf with all available names */
+ for (i = 0; i < ARRAY_SIZE(section_defs); i++) {
+ const struct bpf_sec_def *sec_def = &section_defs[i];
+
+ if (attach_type) {
+ if (sec_def->prog_prepare_load_fn != libbpf_prepare_prog_load)
+ continue;
+
+ if (!(sec_def->cookie & SEC_ATTACHABLE))
+ continue;
+ }
+
+ if (strlen(buf) + strlen(section_defs[i].sec) + 2 > len) {
+ free(buf);
+ return NULL;
+ }
+ strcat(buf, " ");
+ strcat(buf, section_defs[i].sec);
+ }
+
+ return buf;
+}
+
+int libbpf_prog_type_by_name(const char *name, enum bpf_prog_type *prog_type,
+ enum bpf_attach_type *expected_attach_type)
+{
+ const struct bpf_sec_def *sec_def;
+ char *type_names;
+
+ if (!name)
+ return libbpf_err(-EINVAL);
+
+ sec_def = find_sec_def(name);
+ if (sec_def) {
+ *prog_type = sec_def->prog_type;
+ *expected_attach_type = sec_def->expected_attach_type;
+ return 0;
+ }
+
+ pr_debug("failed to guess program type from ELF section '%s'\n", name);
+ type_names = libbpf_get_type_names(false);
+ if (type_names != NULL) {
+ pr_debug("supported section(type) names are:%s\n", type_names);
+ free(type_names);
+ }
+
+ return libbpf_err(-ESRCH);
+}
+
+const char *libbpf_bpf_attach_type_str(enum bpf_attach_type t)
+{
+ if (t < 0 || t >= ARRAY_SIZE(attach_type_name))
+ return NULL;
+
+ return attach_type_name[t];
+}
+
+const char *libbpf_bpf_link_type_str(enum bpf_link_type t)
+{
+ if (t < 0 || t >= ARRAY_SIZE(link_type_name))
+ return NULL;
+
+ return link_type_name[t];
+}
+
+const char *libbpf_bpf_map_type_str(enum bpf_map_type t)
+{
+ if (t < 0 || t >= ARRAY_SIZE(map_type_name))
+ return NULL;
+
+ return map_type_name[t];
+}
+
+const char *libbpf_bpf_prog_type_str(enum bpf_prog_type t)
+{
+ if (t < 0 || t >= ARRAY_SIZE(prog_type_name))
+ return NULL;
+
+ return prog_type_name[t];
+}
+
+static struct bpf_map *find_struct_ops_map_by_offset(struct bpf_object *obj,
+ size_t offset)
+{
+ struct bpf_map *map;
+ size_t i;
+
+ for (i = 0; i < obj->nr_maps; i++) {
+ map = &obj->maps[i];
+ if (!bpf_map__is_struct_ops(map))
+ continue;
+ if (map->sec_offset <= offset &&
+ offset - map->sec_offset < map->def.value_size)
+ return map;
+ }
+
+ return NULL;
+}
+
+/* Collect the reloc from ELF and populate the st_ops->progs[] */
+static int bpf_object__collect_st_ops_relos(struct bpf_object *obj,
+ Elf64_Shdr *shdr, Elf_Data *data)
+{
+ const struct btf_member *member;
+ struct bpf_struct_ops *st_ops;
+ struct bpf_program *prog;
+ unsigned int shdr_idx;
+ const struct btf *btf;
+ struct bpf_map *map;
+ unsigned int moff, insn_idx;
+ const char *name;
+ __u32 member_idx;
+ Elf64_Sym *sym;
+ Elf64_Rel *rel;
+ int i, nrels;
+
+ btf = obj->btf;
+ nrels = shdr->sh_size / shdr->sh_entsize;
+ for (i = 0; i < nrels; i++) {
+ rel = elf_rel_by_idx(data, i);
+ if (!rel) {
+ pr_warn("struct_ops reloc: failed to get %d reloc\n", i);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+
+ sym = elf_sym_by_idx(obj, ELF64_R_SYM(rel->r_info));
+ if (!sym) {
+ pr_warn("struct_ops reloc: symbol %zx not found\n",
+ (size_t)ELF64_R_SYM(rel->r_info));
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+
+ name = elf_sym_str(obj, sym->st_name) ?: "<?>";
+ map = find_struct_ops_map_by_offset(obj, rel->r_offset);
+ if (!map) {
+ pr_warn("struct_ops reloc: cannot find map at rel->r_offset %zu\n",
+ (size_t)rel->r_offset);
+ return -EINVAL;
+ }
+
+ moff = rel->r_offset - map->sec_offset;
+ shdr_idx = sym->st_shndx;
+ st_ops = map->st_ops;
+ pr_debug("struct_ops reloc %s: for %lld value %lld shdr_idx %u rel->r_offset %zu map->sec_offset %zu name %d (\'%s\')\n",
+ map->name,
+ (long long)(rel->r_info >> 32),
+ (long long)sym->st_value,
+ shdr_idx, (size_t)rel->r_offset,
+ map->sec_offset, sym->st_name, name);
+
+ if (shdr_idx >= SHN_LORESERVE) {
+ pr_warn("struct_ops reloc %s: rel->r_offset %zu shdr_idx %u unsupported non-static function\n",
+ map->name, (size_t)rel->r_offset, shdr_idx);
+ return -LIBBPF_ERRNO__RELOC;
+ }
+ if (sym->st_value % BPF_INSN_SZ) {
+ pr_warn("struct_ops reloc %s: invalid target program offset %llu\n",
+ map->name, (unsigned long long)sym->st_value);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+ insn_idx = sym->st_value / BPF_INSN_SZ;
+
+ member = find_member_by_offset(st_ops->type, moff * 8);
+ if (!member) {
+ pr_warn("struct_ops reloc %s: cannot find member at moff %u\n",
+ map->name, moff);
+ return -EINVAL;
+ }
+ member_idx = member - btf_members(st_ops->type);
+ name = btf__name_by_offset(btf, member->name_off);
+
+ if (!resolve_func_ptr(btf, member->type, NULL)) {
+ pr_warn("struct_ops reloc %s: cannot relocate non func ptr %s\n",
+ map->name, name);
+ return -EINVAL;
+ }
+
+ prog = find_prog_by_sec_insn(obj, shdr_idx, insn_idx);
+ if (!prog) {
+ pr_warn("struct_ops reloc %s: cannot find prog at shdr_idx %u to relocate func ptr %s\n",
+ map->name, shdr_idx, name);
+ return -EINVAL;
+ }
+
+ /* prevent the use of BPF prog with invalid type */
+ if (prog->type != BPF_PROG_TYPE_STRUCT_OPS) {
+ pr_warn("struct_ops reloc %s: prog %s is not struct_ops BPF program\n",
+ map->name, prog->name);
+ return -EINVAL;
+ }
+
+ /* if we haven't yet processed this BPF program, record proper
+ * attach_btf_id and member_idx
+ */
+ if (!prog->attach_btf_id) {
+ prog->attach_btf_id = st_ops->type_id;
+ prog->expected_attach_type = member_idx;
+ }
+
+ /* struct_ops BPF prog can be re-used between multiple
+ * .struct_ops as long as it's the same struct_ops struct
+ * definition and the same function pointer field
+ */
+ if (prog->attach_btf_id != st_ops->type_id ||
+ prog->expected_attach_type != member_idx) {
+ pr_warn("struct_ops reloc %s: cannot use prog %s in sec %s with type %u attach_btf_id %u expected_attach_type %u for func ptr %s\n",
+ map->name, prog->name, prog->sec_name, prog->type,
+ prog->attach_btf_id, prog->expected_attach_type, name);
+ return -EINVAL;
+ }
+
+ st_ops->progs[member_idx] = prog;
+ }
+
+ return 0;
+}
+
+#define BTF_TRACE_PREFIX "btf_trace_"
+#define BTF_LSM_PREFIX "bpf_lsm_"
+#define BTF_ITER_PREFIX "bpf_iter_"
+#define BTF_MAX_NAME_SIZE 128
+
+void btf_get_kernel_prefix_kind(enum bpf_attach_type attach_type,
+ const char **prefix, int *kind)
+{
+ switch (attach_type) {
+ case BPF_TRACE_RAW_TP:
+ *prefix = BTF_TRACE_PREFIX;
+ *kind = BTF_KIND_TYPEDEF;
+ break;
+ case BPF_LSM_MAC:
+ case BPF_LSM_CGROUP:
+ *prefix = BTF_LSM_PREFIX;
+ *kind = BTF_KIND_FUNC;
+ break;
+ case BPF_TRACE_ITER:
+ *prefix = BTF_ITER_PREFIX;
+ *kind = BTF_KIND_FUNC;
+ break;
+ default:
+ *prefix = "";
+ *kind = BTF_KIND_FUNC;
+ }
+}
+
+static int find_btf_by_prefix_kind(const struct btf *btf, const char *prefix,
+ const char *name, __u32 kind)
+{
+ char btf_type_name[BTF_MAX_NAME_SIZE];
+ int ret;
+
+ ret = snprintf(btf_type_name, sizeof(btf_type_name),
+ "%s%s", prefix, name);
+ /* snprintf returns the number of characters written excluding the
+ * terminating null. So, if >= BTF_MAX_NAME_SIZE are written, it
+ * indicates truncation.
+ */
+ if (ret < 0 || ret >= sizeof(btf_type_name))
+ return -ENAMETOOLONG;
+ return btf__find_by_name_kind(btf, btf_type_name, kind);
+}
+
+static inline int find_attach_btf_id(struct btf *btf, const char *name,
+ enum bpf_attach_type attach_type)
+{
+ const char *prefix;
+ int kind;
+
+ btf_get_kernel_prefix_kind(attach_type, &prefix, &kind);
+ return find_btf_by_prefix_kind(btf, prefix, name, kind);
+}
+
+int libbpf_find_vmlinux_btf_id(const char *name,
+ enum bpf_attach_type attach_type)
+{
+ struct btf *btf;
+ int err;
+
+ btf = btf__load_vmlinux_btf();
+ err = libbpf_get_error(btf);
+ if (err) {
+ pr_warn("vmlinux BTF is not found\n");
+ return libbpf_err(err);
+ }
+
+ err = find_attach_btf_id(btf, name, attach_type);
+ if (err <= 0)
+ pr_warn("%s is not found in vmlinux BTF\n", name);
+
+ btf__free(btf);
+ return libbpf_err(err);
+}
+
+static int libbpf_find_prog_btf_id(const char *name, __u32 attach_prog_fd)
+{
+ struct bpf_prog_info info;
+ __u32 info_len = sizeof(info);
+ struct btf *btf;
+ int err;
+
+ memset(&info, 0, info_len);
+ err = bpf_obj_get_info_by_fd(attach_prog_fd, &info, &info_len);
+ if (err) {
+ pr_warn("failed bpf_obj_get_info_by_fd for FD %d: %d\n",
+ attach_prog_fd, err);
+ return err;
+ }
+
+ err = -EINVAL;
+ if (!info.btf_id) {
+ pr_warn("The target program doesn't have BTF\n");
+ goto out;
+ }
+ btf = btf__load_from_kernel_by_id(info.btf_id);
+ err = libbpf_get_error(btf);
+ if (err) {
+ pr_warn("Failed to get BTF %d of the program: %d\n", info.btf_id, err);
+ goto out;
+ }
+ err = btf__find_by_name_kind(btf, name, BTF_KIND_FUNC);
+ btf__free(btf);
+ if (err <= 0) {
+ pr_warn("%s is not found in prog's BTF\n", name);
+ goto out;
+ }
+out:
+ return err;
+}
+
+static int find_kernel_btf_id(struct bpf_object *obj, const char *attach_name,
+ enum bpf_attach_type attach_type,
+ int *btf_obj_fd, int *btf_type_id)
+{
+ int ret, i;
+
+ ret = find_attach_btf_id(obj->btf_vmlinux, attach_name, attach_type);
+ if (ret > 0) {
+ *btf_obj_fd = 0; /* vmlinux BTF */
+ *btf_type_id = ret;
+ return 0;
+ }
+ if (ret != -ENOENT)
+ return ret;
+
+ ret = load_module_btfs(obj);
+ if (ret)
+ return ret;
+
+ for (i = 0; i < obj->btf_module_cnt; i++) {
+ const struct module_btf *mod = &obj->btf_modules[i];
+
+ ret = find_attach_btf_id(mod->btf, attach_name, attach_type);
+ if (ret > 0) {
+ *btf_obj_fd = mod->fd;
+ *btf_type_id = ret;
+ return 0;
+ }
+ if (ret == -ENOENT)
+ continue;
+
+ return ret;
+ }
+
+ return -ESRCH;
+}
+
+static int libbpf_find_attach_btf_id(struct bpf_program *prog, const char *attach_name,
+ int *btf_obj_fd, int *btf_type_id)
+{
+ enum bpf_attach_type attach_type = prog->expected_attach_type;
+ __u32 attach_prog_fd = prog->attach_prog_fd;
+ int err = 0;
+
+ /* BPF program's BTF ID */
+ if (prog->type == BPF_PROG_TYPE_EXT || attach_prog_fd) {
+ if (!attach_prog_fd) {
+ pr_warn("prog '%s': attach program FD is not set\n", prog->name);
+ return -EINVAL;
+ }
+ err = libbpf_find_prog_btf_id(attach_name, attach_prog_fd);
+ if (err < 0) {
+ pr_warn("prog '%s': failed to find BPF program (FD %d) BTF ID for '%s': %d\n",
+ prog->name, attach_prog_fd, attach_name, err);
+ return err;
+ }
+ *btf_obj_fd = 0;
+ *btf_type_id = err;
+ return 0;
+ }
+
+ /* kernel/module BTF ID */
+ if (prog->obj->gen_loader) {
+ bpf_gen__record_attach_target(prog->obj->gen_loader, attach_name, attach_type);
+ *btf_obj_fd = 0;
+ *btf_type_id = 1;
+ } else {
+ err = find_kernel_btf_id(prog->obj, attach_name, attach_type, btf_obj_fd, btf_type_id);
+ }
+ if (err) {
+ pr_warn("prog '%s': failed to find kernel BTF type ID of '%s': %d\n",
+ prog->name, attach_name, err);
+ return err;
+ }
+ return 0;
+}
+
+int libbpf_attach_type_by_name(const char *name,
+ enum bpf_attach_type *attach_type)
+{
+ char *type_names;
+ const struct bpf_sec_def *sec_def;
+
+ if (!name)
+ return libbpf_err(-EINVAL);
+
+ sec_def = find_sec_def(name);
+ if (!sec_def) {
+ pr_debug("failed to guess attach type based on ELF section name '%s'\n", name);
+ type_names = libbpf_get_type_names(true);
+ if (type_names != NULL) {
+ pr_debug("attachable section(type) names are:%s\n", type_names);
+ free(type_names);
+ }
+
+ return libbpf_err(-EINVAL);
+ }
+
+ if (sec_def->prog_prepare_load_fn != libbpf_prepare_prog_load)
+ return libbpf_err(-EINVAL);
+ if (!(sec_def->cookie & SEC_ATTACHABLE))
+ return libbpf_err(-EINVAL);
+
+ *attach_type = sec_def->expected_attach_type;
+ return 0;
+}
+
+int bpf_map__fd(const struct bpf_map *map)
+{
+ return map ? map->fd : libbpf_err(-EINVAL);
+}
+
+static bool map_uses_real_name(const struct bpf_map *map)
+{
+ /* Since libbpf started to support custom .data.* and .rodata.* maps,
+ * their user-visible name differs from kernel-visible name. Users see
+ * such map's corresponding ELF section name as a map name.
+ * This check distinguishes .data/.rodata from .data.* and .rodata.*
+ * maps to know which name has to be returned to the user.
+ */
+ if (map->libbpf_type == LIBBPF_MAP_DATA && strcmp(map->real_name, DATA_SEC) != 0)
+ return true;
+ if (map->libbpf_type == LIBBPF_MAP_RODATA && strcmp(map->real_name, RODATA_SEC) != 0)
+ return true;
+ return false;
+}
+
+const char *bpf_map__name(const struct bpf_map *map)
+{
+ if (!map)
+ return NULL;
+
+ if (map_uses_real_name(map))
+ return map->real_name;
+
+ return map->name;
+}
+
+enum bpf_map_type bpf_map__type(const struct bpf_map *map)
+{
+ return map->def.type;
+}
+
+int bpf_map__set_type(struct bpf_map *map, enum bpf_map_type type)
+{
+ if (map->fd >= 0)
+ return libbpf_err(-EBUSY);
+ map->def.type = type;
+ return 0;
+}
+
+__u32 bpf_map__map_flags(const struct bpf_map *map)
+{
+ return map->def.map_flags;
+}
+
+int bpf_map__set_map_flags(struct bpf_map *map, __u32 flags)
+{
+ if (map->fd >= 0)
+ return libbpf_err(-EBUSY);
+ map->def.map_flags = flags;
+ return 0;
+}
+
+__u64 bpf_map__map_extra(const struct bpf_map *map)
+{
+ return map->map_extra;
+}
+
+int bpf_map__set_map_extra(struct bpf_map *map, __u64 map_extra)
+{
+ if (map->fd >= 0)
+ return libbpf_err(-EBUSY);
+ map->map_extra = map_extra;
+ return 0;
+}
+
+__u32 bpf_map__numa_node(const struct bpf_map *map)
+{
+ return map->numa_node;
+}
+
+int bpf_map__set_numa_node(struct bpf_map *map, __u32 numa_node)
+{
+ if (map->fd >= 0)
+ return libbpf_err(-EBUSY);
+ map->numa_node = numa_node;
+ return 0;
+}
+
+__u32 bpf_map__key_size(const struct bpf_map *map)
+{
+ return map->def.key_size;
+}
+
+int bpf_map__set_key_size(struct bpf_map *map, __u32 size)
+{
+ if (map->fd >= 0)
+ return libbpf_err(-EBUSY);
+ map->def.key_size = size;
+ return 0;
+}
+
+__u32 bpf_map__value_size(const struct bpf_map *map)
+{
+ return map->def.value_size;
+}
+
+int bpf_map__set_value_size(struct bpf_map *map, __u32 size)
+{
+ if (map->fd >= 0)
+ return libbpf_err(-EBUSY);
+ map->def.value_size = size;
+ return 0;
+}
+
+__u32 bpf_map__btf_key_type_id(const struct bpf_map *map)
+{
+ return map ? map->btf_key_type_id : 0;
+}
+
+__u32 bpf_map__btf_value_type_id(const struct bpf_map *map)
+{
+ return map ? map->btf_value_type_id : 0;
+}
+
+int bpf_map__set_initial_value(struct bpf_map *map,
+ const void *data, size_t size)
+{
+ if (!map->mmaped || map->libbpf_type == LIBBPF_MAP_KCONFIG ||
+ size != map->def.value_size || map->fd >= 0)
+ return libbpf_err(-EINVAL);
+
+ memcpy(map->mmaped, data, size);
+ return 0;
+}
+
+const void *bpf_map__initial_value(struct bpf_map *map, size_t *psize)
+{
+ if (!map->mmaped)
+ return NULL;
+ *psize = map->def.value_size;
+ return map->mmaped;
+}
+
+bool bpf_map__is_internal(const struct bpf_map *map)
+{
+ return map->libbpf_type != LIBBPF_MAP_UNSPEC;
+}
+
+__u32 bpf_map__ifindex(const struct bpf_map *map)
+{
+ return map->map_ifindex;
+}
+
+int bpf_map__set_ifindex(struct bpf_map *map, __u32 ifindex)
+{
+ if (map->fd >= 0)
+ return libbpf_err(-EBUSY);
+ map->map_ifindex = ifindex;
+ return 0;
+}
+
+int bpf_map__set_inner_map_fd(struct bpf_map *map, int fd)
+{
+ if (!bpf_map_type__is_map_in_map(map->def.type)) {
+ pr_warn("error: unsupported map type\n");
+ return libbpf_err(-EINVAL);
+ }
+ if (map->inner_map_fd != -1) {
+ pr_warn("error: inner_map_fd already specified\n");
+ return libbpf_err(-EINVAL);
+ }
+ if (map->inner_map) {
+ bpf_map__destroy(map->inner_map);
+ zfree(&map->inner_map);
+ }
+ map->inner_map_fd = fd;
+ return 0;
+}
+
+static struct bpf_map *
+__bpf_map__iter(const struct bpf_map *m, const struct bpf_object *obj, int i)
+{
+ ssize_t idx;
+ struct bpf_map *s, *e;
+
+ if (!obj || !obj->maps)
+ return errno = EINVAL, NULL;
+
+ s = obj->maps;
+ e = obj->maps + obj->nr_maps;
+
+ if ((m < s) || (m >= e)) {
+ pr_warn("error in %s: map handler doesn't belong to object\n",
+ __func__);
+ return errno = EINVAL, NULL;
+ }
+
+ idx = (m - obj->maps) + i;
+ if (idx >= obj->nr_maps || idx < 0)
+ return NULL;
+ return &obj->maps[idx];
+}
+
+struct bpf_map *
+bpf_object__next_map(const struct bpf_object *obj, const struct bpf_map *prev)
+{
+ if (prev == NULL)
+ return obj->maps;
+
+ return __bpf_map__iter(prev, obj, 1);
+}
+
+struct bpf_map *
+bpf_object__prev_map(const struct bpf_object *obj, const struct bpf_map *next)
+{
+ if (next == NULL) {
+ if (!obj->nr_maps)
+ return NULL;
+ return obj->maps + obj->nr_maps - 1;
+ }
+
+ return __bpf_map__iter(next, obj, -1);
+}
+
+struct bpf_map *
+bpf_object__find_map_by_name(const struct bpf_object *obj, const char *name)
+{
+ struct bpf_map *pos;
+
+ bpf_object__for_each_map(pos, obj) {
+ /* if it's a special internal map name (which always starts
+ * with dot) then check if that special name matches the
+ * real map name (ELF section name)
+ */
+ if (name[0] == '.') {
+ if (pos->real_name && strcmp(pos->real_name, name) == 0)
+ return pos;
+ continue;
+ }
+ /* otherwise map name has to be an exact match */
+ if (map_uses_real_name(pos)) {
+ if (strcmp(pos->real_name, name) == 0)
+ return pos;
+ continue;
+ }
+ if (strcmp(pos->name, name) == 0)
+ return pos;
+ }
+ return errno = ENOENT, NULL;
+}
+
+int
+bpf_object__find_map_fd_by_name(const struct bpf_object *obj, const char *name)
+{
+ return bpf_map__fd(bpf_object__find_map_by_name(obj, name));
+}
+
+static int validate_map_op(const struct bpf_map *map, size_t key_sz,
+ size_t value_sz, bool check_value_sz)
+{
+ if (map->fd <= 0)
+ return -ENOENT;
+
+ if (map->def.key_size != key_sz) {
+ pr_warn("map '%s': unexpected key size %zu provided, expected %u\n",
+ map->name, key_sz, map->def.key_size);
+ return -EINVAL;
+ }
+
+ if (!check_value_sz)
+ return 0;
+
+ switch (map->def.type) {
+ case BPF_MAP_TYPE_PERCPU_ARRAY:
+ case BPF_MAP_TYPE_PERCPU_HASH:
+ case BPF_MAP_TYPE_LRU_PERCPU_HASH:
+ case BPF_MAP_TYPE_PERCPU_CGROUP_STORAGE: {
+ int num_cpu = libbpf_num_possible_cpus();
+ size_t elem_sz = roundup(map->def.value_size, 8);
+
+ if (value_sz != num_cpu * elem_sz) {
+ pr_warn("map '%s': unexpected value size %zu provided for per-CPU map, expected %d * %zu = %zd\n",
+ map->name, value_sz, num_cpu, elem_sz, num_cpu * elem_sz);
+ return -EINVAL;
+ }
+ break;
+ }
+ default:
+ if (map->def.value_size != value_sz) {
+ pr_warn("map '%s': unexpected value size %zu provided, expected %u\n",
+ map->name, value_sz, map->def.value_size);
+ return -EINVAL;
+ }
+ break;
+ }
+ return 0;
+}
+
+int bpf_map__lookup_elem(const struct bpf_map *map,
+ const void *key, size_t key_sz,
+ void *value, size_t value_sz, __u64 flags)
+{
+ int err;
+
+ err = validate_map_op(map, key_sz, value_sz, true);
+ if (err)
+ return libbpf_err(err);
+
+ return bpf_map_lookup_elem_flags(map->fd, key, value, flags);
+}
+
+int bpf_map__update_elem(const struct bpf_map *map,
+ const void *key, size_t key_sz,
+ const void *value, size_t value_sz, __u64 flags)
+{
+ int err;
+
+ err = validate_map_op(map, key_sz, value_sz, true);
+ if (err)
+ return libbpf_err(err);
+
+ return bpf_map_update_elem(map->fd, key, value, flags);
+}
+
+int bpf_map__delete_elem(const struct bpf_map *map,
+ const void *key, size_t key_sz, __u64 flags)
+{
+ int err;
+
+ err = validate_map_op(map, key_sz, 0, false /* check_value_sz */);
+ if (err)
+ return libbpf_err(err);
+
+ return bpf_map_delete_elem_flags(map->fd, key, flags);
+}
+
+int bpf_map__lookup_and_delete_elem(const struct bpf_map *map,
+ const void *key, size_t key_sz,
+ void *value, size_t value_sz, __u64 flags)
+{
+ int err;
+
+ err = validate_map_op(map, key_sz, value_sz, true);
+ if (err)
+ return libbpf_err(err);
+
+ return bpf_map_lookup_and_delete_elem_flags(map->fd, key, value, flags);
+}
+
+int bpf_map__get_next_key(const struct bpf_map *map,
+ const void *cur_key, void *next_key, size_t key_sz)
+{
+ int err;
+
+ err = validate_map_op(map, key_sz, 0, false /* check_value_sz */);
+ if (err)
+ return libbpf_err(err);
+
+ return bpf_map_get_next_key(map->fd, cur_key, next_key);
+}
+
+long libbpf_get_error(const void *ptr)
+{
+ if (!IS_ERR_OR_NULL(ptr))
+ return 0;
+
+ if (IS_ERR(ptr))
+ errno = -PTR_ERR(ptr);
+
+ /* If ptr == NULL, then errno should be already set by the failing
+ * API, because libbpf never returns NULL on success and it now always
+ * sets errno on error. So no extra errno handling for ptr == NULL
+ * case.
+ */
+ return -errno;
+}
+
+/* Replace link's underlying BPF program with the new one */
+int bpf_link__update_program(struct bpf_link *link, struct bpf_program *prog)
+{
+ int ret;
+
+ ret = bpf_link_update(bpf_link__fd(link), bpf_program__fd(prog), NULL);
+ return libbpf_err_errno(ret);
+}
+
+/* Release "ownership" of underlying BPF resource (typically, BPF program
+ * attached to some BPF hook, e.g., tracepoint, kprobe, etc). Disconnected
+ * link, when destructed through bpf_link__destroy() call won't attempt to
+ * detach/unregisted that BPF resource. This is useful in situations where,
+ * say, attached BPF program has to outlive userspace program that attached it
+ * in the system. Depending on type of BPF program, though, there might be
+ * additional steps (like pinning BPF program in BPF FS) necessary to ensure
+ * exit of userspace program doesn't trigger automatic detachment and clean up
+ * inside the kernel.
+ */
+void bpf_link__disconnect(struct bpf_link *link)
+{
+ link->disconnected = true;
+}
+
+int bpf_link__destroy(struct bpf_link *link)
+{
+ int err = 0;
+
+ if (IS_ERR_OR_NULL(link))
+ return 0;
+
+ if (!link->disconnected && link->detach)
+ err = link->detach(link);
+ if (link->pin_path)
+ free(link->pin_path);
+ if (link->dealloc)
+ link->dealloc(link);
+ else
+ free(link);
+
+ return libbpf_err(err);
+}
+
+int bpf_link__fd(const struct bpf_link *link)
+{
+ return link->fd;
+}
+
+const char *bpf_link__pin_path(const struct bpf_link *link)
+{
+ return link->pin_path;
+}
+
+static int bpf_link__detach_fd(struct bpf_link *link)
+{
+ return libbpf_err_errno(close(link->fd));
+}
+
+struct bpf_link *bpf_link__open(const char *path)
+{
+ struct bpf_link *link;
+ int fd;
+
+ fd = bpf_obj_get(path);
+ if (fd < 0) {
+ fd = -errno;
+ pr_warn("failed to open link at %s: %d\n", path, fd);
+ return libbpf_err_ptr(fd);
+ }
+
+ link = calloc(1, sizeof(*link));
+ if (!link) {
+ close(fd);
+ return libbpf_err_ptr(-ENOMEM);
+ }
+ link->detach = &bpf_link__detach_fd;
+ link->fd = fd;
+
+ link->pin_path = strdup(path);
+ if (!link->pin_path) {
+ bpf_link__destroy(link);
+ return libbpf_err_ptr(-ENOMEM);
+ }
+
+ return link;
+}
+
+int bpf_link__detach(struct bpf_link *link)
+{
+ return bpf_link_detach(link->fd) ? -errno : 0;
+}
+
+int bpf_link__pin(struct bpf_link *link, const char *path)
+{
+ int err;
+
+ if (link->pin_path)
+ return libbpf_err(-EBUSY);
+ err = make_parent_dir(path);
+ if (err)
+ return libbpf_err(err);
+ err = check_path(path);
+ if (err)
+ return libbpf_err(err);
+
+ link->pin_path = strdup(path);
+ if (!link->pin_path)
+ return libbpf_err(-ENOMEM);
+
+ if (bpf_obj_pin(link->fd, link->pin_path)) {
+ err = -errno;
+ zfree(&link->pin_path);
+ return libbpf_err(err);
+ }
+
+ pr_debug("link fd=%d: pinned at %s\n", link->fd, link->pin_path);
+ return 0;
+}
+
+int bpf_link__unpin(struct bpf_link *link)
+{
+ int err;
+
+ if (!link->pin_path)
+ return libbpf_err(-EINVAL);
+
+ err = unlink(link->pin_path);
+ if (err != 0)
+ return -errno;
+
+ pr_debug("link fd=%d: unpinned from %s\n", link->fd, link->pin_path);
+ zfree(&link->pin_path);
+ return 0;
+}
+
+struct bpf_link_perf {
+ struct bpf_link link;
+ int perf_event_fd;
+ /* legacy kprobe support: keep track of probe identifier and type */
+ char *legacy_probe_name;
+ bool legacy_is_kprobe;
+ bool legacy_is_retprobe;
+};
+
+static int remove_kprobe_event_legacy(const char *probe_name, bool retprobe);
+static int remove_uprobe_event_legacy(const char *probe_name, bool retprobe);
+
+static int bpf_link_perf_detach(struct bpf_link *link)
+{
+ struct bpf_link_perf *perf_link = container_of(link, struct bpf_link_perf, link);
+ int err = 0;
+
+ if (ioctl(perf_link->perf_event_fd, PERF_EVENT_IOC_DISABLE, 0) < 0)
+ err = -errno;
+
+ if (perf_link->perf_event_fd != link->fd)
+ close(perf_link->perf_event_fd);
+ close(link->fd);
+
+ /* legacy uprobe/kprobe needs to be removed after perf event fd closure */
+ if (perf_link->legacy_probe_name) {
+ if (perf_link->legacy_is_kprobe) {
+ err = remove_kprobe_event_legacy(perf_link->legacy_probe_name,
+ perf_link->legacy_is_retprobe);
+ } else {
+ err = remove_uprobe_event_legacy(perf_link->legacy_probe_name,
+ perf_link->legacy_is_retprobe);
+ }
+ }
+
+ return err;
+}
+
+static void bpf_link_perf_dealloc(struct bpf_link *link)
+{
+ struct bpf_link_perf *perf_link = container_of(link, struct bpf_link_perf, link);
+
+ free(perf_link->legacy_probe_name);
+ free(perf_link);
+}
+
+struct bpf_link *bpf_program__attach_perf_event_opts(const struct bpf_program *prog, int pfd,
+ const struct bpf_perf_event_opts *opts)
+{
+ char errmsg[STRERR_BUFSIZE];
+ struct bpf_link_perf *link;
+ int prog_fd, link_fd = -1, err;
+
+ if (!OPTS_VALID(opts, bpf_perf_event_opts))
+ return libbpf_err_ptr(-EINVAL);
+
+ if (pfd < 0) {
+ pr_warn("prog '%s': invalid perf event FD %d\n",
+ prog->name, pfd);
+ return libbpf_err_ptr(-EINVAL);
+ }
+ prog_fd = bpf_program__fd(prog);
+ if (prog_fd < 0) {
+ pr_warn("prog '%s': can't attach BPF program w/o FD (did you load it?)\n",
+ prog->name);
+ return libbpf_err_ptr(-EINVAL);
+ }
+
+ link = calloc(1, sizeof(*link));
+ if (!link)
+ return libbpf_err_ptr(-ENOMEM);
+ link->link.detach = &bpf_link_perf_detach;
+ link->link.dealloc = &bpf_link_perf_dealloc;
+ link->perf_event_fd = pfd;
+
+ if (kernel_supports(prog->obj, FEAT_PERF_LINK)) {
+ DECLARE_LIBBPF_OPTS(bpf_link_create_opts, link_opts,
+ .perf_event.bpf_cookie = OPTS_GET(opts, bpf_cookie, 0));
+
+ link_fd = bpf_link_create(prog_fd, pfd, BPF_PERF_EVENT, &link_opts);
+ if (link_fd < 0) {
+ err = -errno;
+ pr_warn("prog '%s': failed to create BPF link for perf_event FD %d: %d (%s)\n",
+ prog->name, pfd,
+ err, libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+ goto err_out;
+ }
+ link->link.fd = link_fd;
+ } else {
+ if (OPTS_GET(opts, bpf_cookie, 0)) {
+ pr_warn("prog '%s': user context value is not supported\n", prog->name);
+ err = -EOPNOTSUPP;
+ goto err_out;
+ }
+
+ if (ioctl(pfd, PERF_EVENT_IOC_SET_BPF, prog_fd) < 0) {
+ err = -errno;
+ pr_warn("prog '%s': failed to attach to perf_event FD %d: %s\n",
+ prog->name, pfd, libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+ if (err == -EPROTO)
+ pr_warn("prog '%s': try add PERF_SAMPLE_CALLCHAIN to or remove exclude_callchain_[kernel|user] from pfd %d\n",
+ prog->name, pfd);
+ goto err_out;
+ }
+ link->link.fd = pfd;
+ }
+ if (ioctl(pfd, PERF_EVENT_IOC_ENABLE, 0) < 0) {
+ err = -errno;
+ pr_warn("prog '%s': failed to enable perf_event FD %d: %s\n",
+ prog->name, pfd, libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+ goto err_out;
+ }
+
+ return &link->link;
+err_out:
+ if (link_fd >= 0)
+ close(link_fd);
+ free(link);
+ return libbpf_err_ptr(err);
+}
+
+struct bpf_link *bpf_program__attach_perf_event(const struct bpf_program *prog, int pfd)
+{
+ return bpf_program__attach_perf_event_opts(prog, pfd, NULL);
+}
+
+/*
+ * this function is expected to parse integer in the range of [0, 2^31-1] from
+ * given file using scanf format string fmt. If actual parsed value is
+ * negative, the result might be indistinguishable from error
+ */
+static int parse_uint_from_file(const char *file, const char *fmt)
+{
+ char buf[STRERR_BUFSIZE];
+ int err, ret;
+ FILE *f;
+
+ f = fopen(file, "r");
+ if (!f) {
+ err = -errno;
+ pr_debug("failed to open '%s': %s\n", file,
+ libbpf_strerror_r(err, buf, sizeof(buf)));
+ return err;
+ }
+ err = fscanf(f, fmt, &ret);
+ if (err != 1) {
+ err = err == EOF ? -EIO : -errno;
+ pr_debug("failed to parse '%s': %s\n", file,
+ libbpf_strerror_r(err, buf, sizeof(buf)));
+ fclose(f);
+ return err;
+ }
+ fclose(f);
+ return ret;
+}
+
+static int determine_kprobe_perf_type(void)
+{
+ const char *file = "/sys/bus/event_source/devices/kprobe/type";
+
+ return parse_uint_from_file(file, "%d\n");
+}
+
+static int determine_uprobe_perf_type(void)
+{
+ const char *file = "/sys/bus/event_source/devices/uprobe/type";
+
+ return parse_uint_from_file(file, "%d\n");
+}
+
+static int determine_kprobe_retprobe_bit(void)
+{
+ const char *file = "/sys/bus/event_source/devices/kprobe/format/retprobe";
+
+ return parse_uint_from_file(file, "config:%d\n");
+}
+
+static int determine_uprobe_retprobe_bit(void)
+{
+ const char *file = "/sys/bus/event_source/devices/uprobe/format/retprobe";
+
+ return parse_uint_from_file(file, "config:%d\n");
+}
+
+#define PERF_UPROBE_REF_CTR_OFFSET_BITS 32
+#define PERF_UPROBE_REF_CTR_OFFSET_SHIFT 32
+
+static int perf_event_open_probe(bool uprobe, bool retprobe, const char *name,
+ uint64_t offset, int pid, size_t ref_ctr_off)
+{
+ const size_t attr_sz = sizeof(struct perf_event_attr);
+ struct perf_event_attr attr;
+ char errmsg[STRERR_BUFSIZE];
+ int type, pfd;
+
+ if ((__u64)ref_ctr_off >= (1ULL << PERF_UPROBE_REF_CTR_OFFSET_BITS))
+ return -EINVAL;
+
+ memset(&attr, 0, attr_sz);
+
+ type = uprobe ? determine_uprobe_perf_type()
+ : determine_kprobe_perf_type();
+ if (type < 0) {
+ pr_warn("failed to determine %s perf type: %s\n",
+ uprobe ? "uprobe" : "kprobe",
+ libbpf_strerror_r(type, errmsg, sizeof(errmsg)));
+ return type;
+ }
+ if (retprobe) {
+ int bit = uprobe ? determine_uprobe_retprobe_bit()
+ : determine_kprobe_retprobe_bit();
+
+ if (bit < 0) {
+ pr_warn("failed to determine %s retprobe bit: %s\n",
+ uprobe ? "uprobe" : "kprobe",
+ libbpf_strerror_r(bit, errmsg, sizeof(errmsg)));
+ return bit;
+ }
+ attr.config |= 1 << bit;
+ }
+ attr.size = attr_sz;
+ attr.type = type;
+ attr.config |= (__u64)ref_ctr_off << PERF_UPROBE_REF_CTR_OFFSET_SHIFT;
+ attr.config1 = ptr_to_u64(name); /* kprobe_func or uprobe_path */
+ attr.config2 = offset; /* kprobe_addr or probe_offset */
+
+ /* pid filter is meaningful only for uprobes */
+ pfd = syscall(__NR_perf_event_open, &attr,
+ pid < 0 ? -1 : pid /* pid */,
+ pid == -1 ? 0 : -1 /* cpu */,
+ -1 /* group_fd */, PERF_FLAG_FD_CLOEXEC);
+ return pfd >= 0 ? pfd : -errno;
+}
+
+static int append_to_file(const char *file, const char *fmt, ...)
+{
+ int fd, n, err = 0;
+ va_list ap;
+
+ fd = open(file, O_WRONLY | O_APPEND | O_CLOEXEC, 0);
+ if (fd < 0)
+ return -errno;
+
+ va_start(ap, fmt);
+ n = vdprintf(fd, fmt, ap);
+ va_end(ap);
+
+ if (n < 0)
+ err = -errno;
+
+ close(fd);
+ return err;
+}
+
+#define DEBUGFS "/sys/kernel/debug/tracing"
+#define TRACEFS "/sys/kernel/tracing"
+
+static bool use_debugfs(void)
+{
+ static int has_debugfs = -1;
+
+ if (has_debugfs < 0)
+ has_debugfs = faccessat(AT_FDCWD, DEBUGFS, F_OK, AT_EACCESS) == 0;
+
+ return has_debugfs == 1;
+}
+
+static const char *tracefs_path(void)
+{
+ return use_debugfs() ? DEBUGFS : TRACEFS;
+}
+
+static const char *tracefs_kprobe_events(void)
+{
+ return use_debugfs() ? DEBUGFS"/kprobe_events" : TRACEFS"/kprobe_events";
+}
+
+static const char *tracefs_uprobe_events(void)
+{
+ return use_debugfs() ? DEBUGFS"/uprobe_events" : TRACEFS"/uprobe_events";
+}
+
+static void gen_kprobe_legacy_event_name(char *buf, size_t buf_sz,
+ const char *kfunc_name, size_t offset)
+{
+ static int index = 0;
+
+ snprintf(buf, buf_sz, "libbpf_%u_%s_0x%zx_%d", getpid(), kfunc_name, offset,
+ __sync_fetch_and_add(&index, 1));
+}
+
+static int add_kprobe_event_legacy(const char *probe_name, bool retprobe,
+ const char *kfunc_name, size_t offset)
+{
+ return append_to_file(tracefs_kprobe_events(), "%c:%s/%s %s+0x%zx",
+ retprobe ? 'r' : 'p',
+ retprobe ? "kretprobes" : "kprobes",
+ probe_name, kfunc_name, offset);
+}
+
+static int remove_kprobe_event_legacy(const char *probe_name, bool retprobe)
+{
+ return append_to_file(tracefs_kprobe_events(), "-:%s/%s",
+ retprobe ? "kretprobes" : "kprobes", probe_name);
+}
+
+static int determine_kprobe_perf_type_legacy(const char *probe_name, bool retprobe)
+{
+ char file[256];
+
+ snprintf(file, sizeof(file), "%s/events/%s/%s/id",
+ tracefs_path(), retprobe ? "kretprobes" : "kprobes", probe_name);
+
+ return parse_uint_from_file(file, "%d\n");
+}
+
+static int perf_event_kprobe_open_legacy(const char *probe_name, bool retprobe,
+ const char *kfunc_name, size_t offset, int pid)
+{
+ const size_t attr_sz = sizeof(struct perf_event_attr);
+ struct perf_event_attr attr;
+ char errmsg[STRERR_BUFSIZE];
+ int type, pfd, err;
+
+ err = add_kprobe_event_legacy(probe_name, retprobe, kfunc_name, offset);
+ if (err < 0) {
+ pr_warn("failed to add legacy kprobe event for '%s+0x%zx': %s\n",
+ kfunc_name, offset,
+ libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+ return err;
+ }
+ type = determine_kprobe_perf_type_legacy(probe_name, retprobe);
+ if (type < 0) {
+ err = type;
+ pr_warn("failed to determine legacy kprobe event id for '%s+0x%zx': %s\n",
+ kfunc_name, offset,
+ libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+ goto err_clean_legacy;
+ }
+
+ memset(&attr, 0, attr_sz);
+ attr.size = attr_sz;
+ attr.config = type;
+ attr.type = PERF_TYPE_TRACEPOINT;
+
+ pfd = syscall(__NR_perf_event_open, &attr,
+ pid < 0 ? -1 : pid, /* pid */
+ pid == -1 ? 0 : -1, /* cpu */
+ -1 /* group_fd */, PERF_FLAG_FD_CLOEXEC);
+ if (pfd < 0) {
+ err = -errno;
+ pr_warn("legacy kprobe perf_event_open() failed: %s\n",
+ libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+ goto err_clean_legacy;
+ }
+ return pfd;
+
+err_clean_legacy:
+ /* Clear the newly added legacy kprobe_event */
+ remove_kprobe_event_legacy(probe_name, retprobe);
+ return err;
+}
+
+static const char *arch_specific_syscall_pfx(void)
+{
+#if defined(__x86_64__)
+ return "x64";
+#elif defined(__i386__)
+ return "ia32";
+#elif defined(__s390x__)
+ return "s390x";
+#elif defined(__s390__)
+ return "s390";
+#elif defined(__arm__)
+ return "arm";
+#elif defined(__aarch64__)
+ return "arm64";
+#elif defined(__mips__)
+ return "mips";
+#elif defined(__riscv)
+ return "riscv";
+#elif defined(__powerpc__)
+ return "powerpc";
+#elif defined(__powerpc64__)
+ return "powerpc64";
+#else
+ return NULL;
+#endif
+}
+
+static int probe_kern_syscall_wrapper(void)
+{
+ char syscall_name[64];
+ const char *ksys_pfx;
+
+ ksys_pfx = arch_specific_syscall_pfx();
+ if (!ksys_pfx)
+ return 0;
+
+ snprintf(syscall_name, sizeof(syscall_name), "__%s_sys_bpf", ksys_pfx);
+
+ if (determine_kprobe_perf_type() >= 0) {
+ int pfd;
+
+ pfd = perf_event_open_probe(false, false, syscall_name, 0, getpid(), 0);
+ if (pfd >= 0)
+ close(pfd);
+
+ return pfd >= 0 ? 1 : 0;
+ } else { /* legacy mode */
+ char probe_name[128];
+
+ gen_kprobe_legacy_event_name(probe_name, sizeof(probe_name), syscall_name, 0);
+ if (add_kprobe_event_legacy(probe_name, false, syscall_name, 0) < 0)
+ return 0;
+
+ (void)remove_kprobe_event_legacy(probe_name, false);
+ return 1;
+ }
+}
+
+struct bpf_link *
+bpf_program__attach_kprobe_opts(const struct bpf_program *prog,
+ const char *func_name,
+ const struct bpf_kprobe_opts *opts)
+{
+ DECLARE_LIBBPF_OPTS(bpf_perf_event_opts, pe_opts);
+ char errmsg[STRERR_BUFSIZE];
+ char *legacy_probe = NULL;
+ struct bpf_link *link;
+ size_t offset;
+ bool retprobe, legacy;
+ int pfd, err;
+
+ if (!OPTS_VALID(opts, bpf_kprobe_opts))
+ return libbpf_err_ptr(-EINVAL);
+
+ retprobe = OPTS_GET(opts, retprobe, false);
+ offset = OPTS_GET(opts, offset, 0);
+ pe_opts.bpf_cookie = OPTS_GET(opts, bpf_cookie, 0);
+
+ legacy = determine_kprobe_perf_type() < 0;
+ if (!legacy) {
+ pfd = perf_event_open_probe(false /* uprobe */, retprobe,
+ func_name, offset,
+ -1 /* pid */, 0 /* ref_ctr_off */);
+ } else {
+ char probe_name[256];
+
+ gen_kprobe_legacy_event_name(probe_name, sizeof(probe_name),
+ func_name, offset);
+
+ legacy_probe = strdup(probe_name);
+ if (!legacy_probe)
+ return libbpf_err_ptr(-ENOMEM);
+
+ pfd = perf_event_kprobe_open_legacy(legacy_probe, retprobe, func_name,
+ offset, -1 /* pid */);
+ }
+ if (pfd < 0) {
+ err = -errno;
+ pr_warn("prog '%s': failed to create %s '%s+0x%zx' perf event: %s\n",
+ prog->name, retprobe ? "kretprobe" : "kprobe",
+ func_name, offset,
+ libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+ goto err_out;
+ }
+ link = bpf_program__attach_perf_event_opts(prog, pfd, &pe_opts);
+ err = libbpf_get_error(link);
+ if (err) {
+ close(pfd);
+ pr_warn("prog '%s': failed to attach to %s '%s+0x%zx': %s\n",
+ prog->name, retprobe ? "kretprobe" : "kprobe",
+ func_name, offset,
+ libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+ goto err_clean_legacy;
+ }
+ if (legacy) {
+ struct bpf_link_perf *perf_link = container_of(link, struct bpf_link_perf, link);
+
+ perf_link->legacy_probe_name = legacy_probe;
+ perf_link->legacy_is_kprobe = true;
+ perf_link->legacy_is_retprobe = retprobe;
+ }
+
+ return link;
+
+err_clean_legacy:
+ if (legacy)
+ remove_kprobe_event_legacy(legacy_probe, retprobe);
+err_out:
+ free(legacy_probe);
+ return libbpf_err_ptr(err);
+}
+
+struct bpf_link *bpf_program__attach_kprobe(const struct bpf_program *prog,
+ bool retprobe,
+ const char *func_name)
+{
+ DECLARE_LIBBPF_OPTS(bpf_kprobe_opts, opts,
+ .retprobe = retprobe,
+ );
+
+ return bpf_program__attach_kprobe_opts(prog, func_name, &opts);
+}
+
+struct bpf_link *bpf_program__attach_ksyscall(const struct bpf_program *prog,
+ const char *syscall_name,
+ const struct bpf_ksyscall_opts *opts)
+{
+ LIBBPF_OPTS(bpf_kprobe_opts, kprobe_opts);
+ char func_name[128];
+
+ if (!OPTS_VALID(opts, bpf_ksyscall_opts))
+ return libbpf_err_ptr(-EINVAL);
+
+ if (kernel_supports(prog->obj, FEAT_SYSCALL_WRAPPER)) {
+ /* arch_specific_syscall_pfx() should never return NULL here
+ * because it is guarded by kernel_supports(). However, since
+ * compiler does not know that we have an explicit conditional
+ * as well.
+ */
+ snprintf(func_name, sizeof(func_name), "__%s_sys_%s",
+ arch_specific_syscall_pfx() ? : "", syscall_name);
+ } else {
+ snprintf(func_name, sizeof(func_name), "__se_sys_%s", syscall_name);
+ }
+
+ kprobe_opts.retprobe = OPTS_GET(opts, retprobe, false);
+ kprobe_opts.bpf_cookie = OPTS_GET(opts, bpf_cookie, 0);
+
+ return bpf_program__attach_kprobe_opts(prog, func_name, &kprobe_opts);
+}
+
+/* Adapted from perf/util/string.c */
+static bool glob_match(const char *str, const char *pat)
+{
+ while (*str && *pat && *pat != '*') {
+ if (*pat == '?') { /* Matches any single character */
+ str++;
+ pat++;
+ continue;
+ }
+ if (*str != *pat)
+ return false;
+ str++;
+ pat++;
+ }
+ /* Check wild card */
+ if (*pat == '*') {
+ while (*pat == '*')
+ pat++;
+ if (!*pat) /* Tail wild card matches all */
+ return true;
+ while (*str)
+ if (glob_match(str++, pat))
+ return true;
+ }
+ return !*str && !*pat;
+}
+
+struct kprobe_multi_resolve {
+ const char *pattern;
+ unsigned long *addrs;
+ size_t cap;
+ size_t cnt;
+};
+
+static int
+resolve_kprobe_multi_cb(unsigned long long sym_addr, char sym_type,
+ const char *sym_name, void *ctx)
+{
+ struct kprobe_multi_resolve *res = ctx;
+ int err;
+
+ if (!glob_match(sym_name, res->pattern))
+ return 0;
+
+ err = libbpf_ensure_mem((void **) &res->addrs, &res->cap, sizeof(unsigned long),
+ res->cnt + 1);
+ if (err)
+ return err;
+
+ res->addrs[res->cnt++] = (unsigned long) sym_addr;
+ return 0;
+}
+
+struct bpf_link *
+bpf_program__attach_kprobe_multi_opts(const struct bpf_program *prog,
+ const char *pattern,
+ const struct bpf_kprobe_multi_opts *opts)
+{
+ LIBBPF_OPTS(bpf_link_create_opts, lopts);
+ struct kprobe_multi_resolve res = {
+ .pattern = pattern,
+ };
+ struct bpf_link *link = NULL;
+ char errmsg[STRERR_BUFSIZE];
+ const unsigned long *addrs;
+ int err, link_fd, prog_fd;
+ const __u64 *cookies;
+ const char **syms;
+ bool retprobe;
+ size_t cnt;
+
+ if (!OPTS_VALID(opts, bpf_kprobe_multi_opts))
+ return libbpf_err_ptr(-EINVAL);
+
+ syms = OPTS_GET(opts, syms, false);
+ addrs = OPTS_GET(opts, addrs, false);
+ cnt = OPTS_GET(opts, cnt, false);
+ cookies = OPTS_GET(opts, cookies, false);
+
+ if (!pattern && !addrs && !syms)
+ return libbpf_err_ptr(-EINVAL);
+ if (pattern && (addrs || syms || cookies || cnt))
+ return libbpf_err_ptr(-EINVAL);
+ if (!pattern && !cnt)
+ return libbpf_err_ptr(-EINVAL);
+ if (addrs && syms)
+ return libbpf_err_ptr(-EINVAL);
+
+ if (pattern) {
+ err = libbpf_kallsyms_parse(resolve_kprobe_multi_cb, &res);
+ if (err)
+ goto error;
+ if (!res.cnt) {
+ err = -ENOENT;
+ goto error;
+ }
+ addrs = res.addrs;
+ cnt = res.cnt;
+ }
+
+ retprobe = OPTS_GET(opts, retprobe, false);
+
+ lopts.kprobe_multi.syms = syms;
+ lopts.kprobe_multi.addrs = addrs;
+ lopts.kprobe_multi.cookies = cookies;
+ lopts.kprobe_multi.cnt = cnt;
+ lopts.kprobe_multi.flags = retprobe ? BPF_F_KPROBE_MULTI_RETURN : 0;
+
+ link = calloc(1, sizeof(*link));
+ if (!link) {
+ err = -ENOMEM;
+ goto error;
+ }
+ link->detach = &bpf_link__detach_fd;
+
+ prog_fd = bpf_program__fd(prog);
+ link_fd = bpf_link_create(prog_fd, 0, BPF_TRACE_KPROBE_MULTI, &lopts);
+ if (link_fd < 0) {
+ err = -errno;
+ pr_warn("prog '%s': failed to attach: %s\n",
+ prog->name, libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+ goto error;
+ }
+ link->fd = link_fd;
+ free(res.addrs);
+ return link;
+
+error:
+ free(link);
+ free(res.addrs);
+ return libbpf_err_ptr(err);
+}
+
+static int attach_kprobe(const struct bpf_program *prog, long cookie, struct bpf_link **link)
+{
+ DECLARE_LIBBPF_OPTS(bpf_kprobe_opts, opts);
+ unsigned long offset = 0;
+ const char *func_name;
+ char *func;
+ int n;
+
+ *link = NULL;
+
+ /* no auto-attach for SEC("kprobe") and SEC("kretprobe") */
+ if (strcmp(prog->sec_name, "kprobe") == 0 || strcmp(prog->sec_name, "kretprobe") == 0)
+ return 0;
+
+ opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe/");
+ if (opts.retprobe)
+ func_name = prog->sec_name + sizeof("kretprobe/") - 1;
+ else
+ func_name = prog->sec_name + sizeof("kprobe/") - 1;
+
+ n = sscanf(func_name, "%m[a-zA-Z0-9_.]+%li", &func, &offset);
+ if (n < 1) {
+ pr_warn("kprobe name is invalid: %s\n", func_name);
+ return -EINVAL;
+ }
+ if (opts.retprobe && offset != 0) {
+ free(func);
+ pr_warn("kretprobes do not support offset specification\n");
+ return -EINVAL;
+ }
+
+ opts.offset = offset;
+ *link = bpf_program__attach_kprobe_opts(prog, func, &opts);
+ free(func);
+ return libbpf_get_error(*link);
+}
+
+static int attach_ksyscall(const struct bpf_program *prog, long cookie, struct bpf_link **link)
+{
+ LIBBPF_OPTS(bpf_ksyscall_opts, opts);
+ const char *syscall_name;
+
+ *link = NULL;
+
+ /* no auto-attach for SEC("ksyscall") and SEC("kretsyscall") */
+ if (strcmp(prog->sec_name, "ksyscall") == 0 || strcmp(prog->sec_name, "kretsyscall") == 0)
+ return 0;
+
+ opts.retprobe = str_has_pfx(prog->sec_name, "kretsyscall/");
+ if (opts.retprobe)
+ syscall_name = prog->sec_name + sizeof("kretsyscall/") - 1;
+ else
+ syscall_name = prog->sec_name + sizeof("ksyscall/") - 1;
+
+ *link = bpf_program__attach_ksyscall(prog, syscall_name, &opts);
+ return *link ? 0 : -errno;
+}
+
+static int attach_kprobe_multi(const struct bpf_program *prog, long cookie, struct bpf_link **link)
+{
+ LIBBPF_OPTS(bpf_kprobe_multi_opts, opts);
+ const char *spec;
+ char *pattern;
+ int n;
+
+ *link = NULL;
+
+ /* no auto-attach for SEC("kprobe.multi") and SEC("kretprobe.multi") */
+ if (strcmp(prog->sec_name, "kprobe.multi") == 0 ||
+ strcmp(prog->sec_name, "kretprobe.multi") == 0)
+ return 0;
+
+ opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe.multi/");
+ if (opts.retprobe)
+ spec = prog->sec_name + sizeof("kretprobe.multi/") - 1;
+ else
+ spec = prog->sec_name + sizeof("kprobe.multi/") - 1;
+
+ n = sscanf(spec, "%m[a-zA-Z0-9_.*?]", &pattern);
+ if (n < 1) {
+ pr_warn("kprobe multi pattern is invalid: %s\n", pattern);
+ return -EINVAL;
+ }
+
+ *link = bpf_program__attach_kprobe_multi_opts(prog, pattern, &opts);
+ free(pattern);
+ return libbpf_get_error(*link);
+}
+
+static void gen_uprobe_legacy_event_name(char *buf, size_t buf_sz,
+ const char *binary_path, uint64_t offset)
+{
+ int i;
+
+ snprintf(buf, buf_sz, "libbpf_%u_%s_0x%zx", getpid(), binary_path, (size_t)offset);
+
+ /* sanitize binary_path in the probe name */
+ for (i = 0; buf[i]; i++) {
+ if (!isalnum(buf[i]))
+ buf[i] = '_';
+ }
+}
+
+static inline int add_uprobe_event_legacy(const char *probe_name, bool retprobe,
+ const char *binary_path, size_t offset)
+{
+ return append_to_file(tracefs_uprobe_events(), "%c:%s/%s %s:0x%zx",
+ retprobe ? 'r' : 'p',
+ retprobe ? "uretprobes" : "uprobes",
+ probe_name, binary_path, offset);
+}
+
+static inline int remove_uprobe_event_legacy(const char *probe_name, bool retprobe)
+{
+ return append_to_file(tracefs_uprobe_events(), "-:%s/%s",
+ retprobe ? "uretprobes" : "uprobes", probe_name);
+}
+
+static int determine_uprobe_perf_type_legacy(const char *probe_name, bool retprobe)
+{
+ char file[512];
+
+ snprintf(file, sizeof(file), "%s/events/%s/%s/id",
+ tracefs_path(), retprobe ? "uretprobes" : "uprobes", probe_name);
+
+ return parse_uint_from_file(file, "%d\n");
+}
+
+static int perf_event_uprobe_open_legacy(const char *probe_name, bool retprobe,
+ const char *binary_path, size_t offset, int pid)
+{
+ const size_t attr_sz = sizeof(struct perf_event_attr);
+ struct perf_event_attr attr;
+ int type, pfd, err;
+
+ err = add_uprobe_event_legacy(probe_name, retprobe, binary_path, offset);
+ if (err < 0) {
+ pr_warn("failed to add legacy uprobe event for %s:0x%zx: %d\n",
+ binary_path, (size_t)offset, err);
+ return err;
+ }
+ type = determine_uprobe_perf_type_legacy(probe_name, retprobe);
+ if (type < 0) {
+ err = type;
+ pr_warn("failed to determine legacy uprobe event id for %s:0x%zx: %d\n",
+ binary_path, offset, err);
+ goto err_clean_legacy;
+ }
+
+ memset(&attr, 0, attr_sz);
+ attr.size = attr_sz;
+ attr.config = type;
+ attr.type = PERF_TYPE_TRACEPOINT;
+
+ pfd = syscall(__NR_perf_event_open, &attr,
+ pid < 0 ? -1 : pid, /* pid */
+ pid == -1 ? 0 : -1, /* cpu */
+ -1 /* group_fd */, PERF_FLAG_FD_CLOEXEC);
+ if (pfd < 0) {
+ err = -errno;
+ pr_warn("legacy uprobe perf_event_open() failed: %d\n", err);
+ goto err_clean_legacy;
+ }
+ return pfd;
+
+err_clean_legacy:
+ /* Clear the newly added legacy uprobe_event */
+ remove_uprobe_event_legacy(probe_name, retprobe);
+ return err;
+}
+
+/* Return next ELF section of sh_type after scn, or first of that type if scn is NULL. */
+static Elf_Scn *elf_find_next_scn_by_type(Elf *elf, int sh_type, Elf_Scn *scn)
+{
+ while ((scn = elf_nextscn(elf, scn)) != NULL) {
+ GElf_Shdr sh;
+
+ if (!gelf_getshdr(scn, &sh))
+ continue;
+ if (sh.sh_type == sh_type)
+ return scn;
+ }
+ return NULL;
+}
+
+/* Find offset of function name in object specified by path. "name" matches
+ * symbol name or name@@LIB for library functions.
+ */
+static long elf_find_func_offset(const char *binary_path, const char *name)
+{
+ int fd, i, sh_types[2] = { SHT_DYNSYM, SHT_SYMTAB };
+ bool is_shared_lib, is_name_qualified;
+ char errmsg[STRERR_BUFSIZE];
+ long ret = -ENOENT;
+ size_t name_len;
+ GElf_Ehdr ehdr;
+ Elf *elf;
+
+ fd = open(binary_path, O_RDONLY | O_CLOEXEC);
+ if (fd < 0) {
+ ret = -errno;
+ pr_warn("failed to open %s: %s\n", binary_path,
+ libbpf_strerror_r(ret, errmsg, sizeof(errmsg)));
+ return ret;
+ }
+ elf = elf_begin(fd, ELF_C_READ_MMAP, NULL);
+ if (!elf) {
+ pr_warn("elf: could not read elf from %s: %s\n", binary_path, elf_errmsg(-1));
+ close(fd);
+ return -LIBBPF_ERRNO__FORMAT;
+ }
+ if (!gelf_getehdr(elf, &ehdr)) {
+ pr_warn("elf: failed to get ehdr from %s: %s\n", binary_path, elf_errmsg(-1));
+ ret = -LIBBPF_ERRNO__FORMAT;
+ goto out;
+ }
+ /* for shared lib case, we do not need to calculate relative offset */
+ is_shared_lib = ehdr.e_type == ET_DYN;
+
+ name_len = strlen(name);
+ /* Does name specify "@@LIB"? */
+ is_name_qualified = strstr(name, "@@") != NULL;
+
+ /* Search SHT_DYNSYM, SHT_SYMTAB for symbol. This search order is used because if
+ * a binary is stripped, it may only have SHT_DYNSYM, and a fully-statically
+ * linked binary may not have SHT_DYMSYM, so absence of a section should not be
+ * reported as a warning/error.
+ */
+ for (i = 0; i < ARRAY_SIZE(sh_types); i++) {
+ size_t nr_syms, strtabidx, idx;
+ Elf_Data *symbols = NULL;
+ Elf_Scn *scn = NULL;
+ int last_bind = -1;
+ const char *sname;
+ GElf_Shdr sh;
+
+ scn = elf_find_next_scn_by_type(elf, sh_types[i], NULL);
+ if (!scn) {
+ pr_debug("elf: failed to find symbol table ELF sections in '%s'\n",
+ binary_path);
+ continue;
+ }
+ if (!gelf_getshdr(scn, &sh))
+ continue;
+ strtabidx = sh.sh_link;
+ symbols = elf_getdata(scn, 0);
+ if (!symbols) {
+ pr_warn("elf: failed to get symbols for symtab section in '%s': %s\n",
+ binary_path, elf_errmsg(-1));
+ ret = -LIBBPF_ERRNO__FORMAT;
+ goto out;
+ }
+ nr_syms = symbols->d_size / sh.sh_entsize;
+
+ for (idx = 0; idx < nr_syms; idx++) {
+ int curr_bind;
+ GElf_Sym sym;
+ Elf_Scn *sym_scn;
+ GElf_Shdr sym_sh;
+
+ if (!gelf_getsym(symbols, idx, &sym))
+ continue;
+
+ if (GELF_ST_TYPE(sym.st_info) != STT_FUNC)
+ continue;
+
+ sname = elf_strptr(elf, strtabidx, sym.st_name);
+ if (!sname)
+ continue;
+
+ curr_bind = GELF_ST_BIND(sym.st_info);
+
+ /* User can specify func, func@@LIB or func@@LIB_VERSION. */
+ if (strncmp(sname, name, name_len) != 0)
+ continue;
+ /* ...but we don't want a search for "foo" to match 'foo2" also, so any
+ * additional characters in sname should be of the form "@@LIB".
+ */
+ if (!is_name_qualified && sname[name_len] != '\0' && sname[name_len] != '@')
+ continue;
+
+ if (ret >= 0) {
+ /* handle multiple matches */
+ if (last_bind != STB_WEAK && curr_bind != STB_WEAK) {
+ /* Only accept one non-weak bind. */
+ pr_warn("elf: ambiguous match for '%s', '%s' in '%s'\n",
+ sname, name, binary_path);
+ ret = -LIBBPF_ERRNO__FORMAT;
+ goto out;
+ } else if (curr_bind == STB_WEAK) {
+ /* already have a non-weak bind, and
+ * this is a weak bind, so ignore.
+ */
+ continue;
+ }
+ }
+
+ /* Transform symbol's virtual address (absolute for
+ * binaries and relative for shared libs) into file
+ * offset, which is what kernel is expecting for
+ * uprobe/uretprobe attachment.
+ * See Documentation/trace/uprobetracer.rst for more
+ * details.
+ * This is done by looking up symbol's containing
+ * section's header and using it's virtual address
+ * (sh_addr) and corresponding file offset (sh_offset)
+ * to transform sym.st_value (virtual address) into
+ * desired final file offset.
+ */
+ sym_scn = elf_getscn(elf, sym.st_shndx);
+ if (!sym_scn)
+ continue;
+ if (!gelf_getshdr(sym_scn, &sym_sh))
+ continue;
+
+ ret = sym.st_value - sym_sh.sh_addr + sym_sh.sh_offset;
+ last_bind = curr_bind;
+ }
+ if (ret > 0)
+ break;
+ }
+
+ if (ret > 0) {
+ pr_debug("elf: symbol address match for '%s' in '%s': 0x%lx\n", name, binary_path,
+ ret);
+ } else {
+ if (ret == 0) {
+ pr_warn("elf: '%s' is 0 in symtab for '%s': %s\n", name, binary_path,
+ is_shared_lib ? "should not be 0 in a shared library" :
+ "try using shared library path instead");
+ ret = -ENOENT;
+ } else {
+ pr_warn("elf: failed to find symbol '%s' in '%s'\n", name, binary_path);
+ }
+ }
+out:
+ elf_end(elf);
+ close(fd);
+ return ret;
+}
+
+static const char *arch_specific_lib_paths(void)
+{
+ /*
+ * Based on https://packages.debian.org/sid/libc6.
+ *
+ * Assume that the traced program is built for the same architecture
+ * as libbpf, which should cover the vast majority of cases.
+ */
+#if defined(__x86_64__)
+ return "/lib/x86_64-linux-gnu";
+#elif defined(__i386__)
+ return "/lib/i386-linux-gnu";
+#elif defined(__s390x__)
+ return "/lib/s390x-linux-gnu";
+#elif defined(__s390__)
+ return "/lib/s390-linux-gnu";
+#elif defined(__arm__) && defined(__SOFTFP__)
+ return "/lib/arm-linux-gnueabi";
+#elif defined(__arm__) && !defined(__SOFTFP__)
+ return "/lib/arm-linux-gnueabihf";
+#elif defined(__aarch64__)
+ return "/lib/aarch64-linux-gnu";
+#elif defined(__mips__) && defined(__MIPSEL__) && _MIPS_SZLONG == 64
+ return "/lib/mips64el-linux-gnuabi64";
+#elif defined(__mips__) && defined(__MIPSEL__) && _MIPS_SZLONG == 32
+ return "/lib/mipsel-linux-gnu";
+#elif defined(__powerpc64__) && __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
+ return "/lib/powerpc64le-linux-gnu";
+#elif defined(__sparc__) && defined(__arch64__)
+ return "/lib/sparc64-linux-gnu";
+#elif defined(__riscv) && __riscv_xlen == 64
+ return "/lib/riscv64-linux-gnu";
+#else
+ return NULL;
+#endif
+}
+
+/* Get full path to program/shared library. */
+static int resolve_full_path(const char *file, char *result, size_t result_sz)
+{
+ const char *search_paths[3] = {};
+ int i, perm;
+
+ if (str_has_sfx(file, ".so") || strstr(file, ".so.")) {
+ search_paths[0] = getenv("LD_LIBRARY_PATH");
+ search_paths[1] = "/usr/lib64:/usr/lib";
+ search_paths[2] = arch_specific_lib_paths();
+ perm = R_OK;
+ } else {
+ search_paths[0] = getenv("PATH");
+ search_paths[1] = "/usr/bin:/usr/sbin";
+ perm = R_OK | X_OK;
+ }
+
+ for (i = 0; i < ARRAY_SIZE(search_paths); i++) {
+ const char *s;
+
+ if (!search_paths[i])
+ continue;
+ for (s = search_paths[i]; s != NULL; s = strchr(s, ':')) {
+ char *next_path;
+ int seg_len;
+
+ if (s[0] == ':')
+ s++;
+ next_path = strchr(s, ':');
+ seg_len = next_path ? next_path - s : strlen(s);
+ if (!seg_len)
+ continue;
+ snprintf(result, result_sz, "%.*s/%s", seg_len, s, file);
+ /* ensure it has required permissions */
+ if (faccessat(AT_FDCWD, result, perm, AT_EACCESS) < 0)
+ continue;
+ pr_debug("resolved '%s' to '%s'\n", file, result);
+ return 0;
+ }
+ }
+ return -ENOENT;
+}
+
+LIBBPF_API struct bpf_link *
+bpf_program__attach_uprobe_opts(const struct bpf_program *prog, pid_t pid,
+ const char *binary_path, size_t func_offset,
+ const struct bpf_uprobe_opts *opts)
+{
+ DECLARE_LIBBPF_OPTS(bpf_perf_event_opts, pe_opts);
+ char errmsg[STRERR_BUFSIZE], *legacy_probe = NULL;
+ char full_binary_path[PATH_MAX];
+ struct bpf_link *link;
+ size_t ref_ctr_off;
+ int pfd, err;
+ bool retprobe, legacy;
+ const char *func_name;
+
+ if (!OPTS_VALID(opts, bpf_uprobe_opts))
+ return libbpf_err_ptr(-EINVAL);
+
+ retprobe = OPTS_GET(opts, retprobe, false);
+ ref_ctr_off = OPTS_GET(opts, ref_ctr_offset, 0);
+ pe_opts.bpf_cookie = OPTS_GET(opts, bpf_cookie, 0);
+
+ if (!binary_path)
+ return libbpf_err_ptr(-EINVAL);
+
+ if (!strchr(binary_path, '/')) {
+ err = resolve_full_path(binary_path, full_binary_path,
+ sizeof(full_binary_path));
+ if (err) {
+ pr_warn("prog '%s': failed to resolve full path for '%s': %d\n",
+ prog->name, binary_path, err);
+ return libbpf_err_ptr(err);
+ }
+ binary_path = full_binary_path;
+ }
+ func_name = OPTS_GET(opts, func_name, NULL);
+ if (func_name) {
+ long sym_off;
+
+ sym_off = elf_find_func_offset(binary_path, func_name);
+ if (sym_off < 0)
+ return libbpf_err_ptr(sym_off);
+ func_offset += sym_off;
+ }
+
+ legacy = determine_uprobe_perf_type() < 0;
+ if (!legacy) {
+ pfd = perf_event_open_probe(true /* uprobe */, retprobe, binary_path,
+ func_offset, pid, ref_ctr_off);
+ } else {
+ char probe_name[PATH_MAX + 64];
+
+ if (ref_ctr_off)
+ return libbpf_err_ptr(-EINVAL);
+
+ gen_uprobe_legacy_event_name(probe_name, sizeof(probe_name),
+ binary_path, func_offset);
+
+ legacy_probe = strdup(probe_name);
+ if (!legacy_probe)
+ return libbpf_err_ptr(-ENOMEM);
+
+ pfd = perf_event_uprobe_open_legacy(legacy_probe, retprobe,
+ binary_path, func_offset, pid);
+ }
+ if (pfd < 0) {
+ err = -errno;
+ pr_warn("prog '%s': failed to create %s '%s:0x%zx' perf event: %s\n",
+ prog->name, retprobe ? "uretprobe" : "uprobe",
+ binary_path, func_offset,
+ libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+ goto err_out;
+ }
+
+ link = bpf_program__attach_perf_event_opts(prog, pfd, &pe_opts);
+ err = libbpf_get_error(link);
+ if (err) {
+ close(pfd);
+ pr_warn("prog '%s': failed to attach to %s '%s:0x%zx': %s\n",
+ prog->name, retprobe ? "uretprobe" : "uprobe",
+ binary_path, func_offset,
+ libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+ goto err_clean_legacy;
+ }
+ if (legacy) {
+ struct bpf_link_perf *perf_link = container_of(link, struct bpf_link_perf, link);
+
+ perf_link->legacy_probe_name = legacy_probe;
+ perf_link->legacy_is_kprobe = false;
+ perf_link->legacy_is_retprobe = retprobe;
+ }
+ return link;
+
+err_clean_legacy:
+ if (legacy)
+ remove_uprobe_event_legacy(legacy_probe, retprobe);
+err_out:
+ free(legacy_probe);
+ return libbpf_err_ptr(err);
+}
+
+/* Format of u[ret]probe section definition supporting auto-attach:
+ * u[ret]probe/binary:function[+offset]
+ *
+ * binary can be an absolute/relative path or a filename; the latter is resolved to a
+ * full binary path via bpf_program__attach_uprobe_opts.
+ *
+ * Specifying uprobe+ ensures we carry out strict matching; either "uprobe" must be
+ * specified (and auto-attach is not possible) or the above format is specified for
+ * auto-attach.
+ */
+static int attach_uprobe(const struct bpf_program *prog, long cookie, struct bpf_link **link)
+{
+ DECLARE_LIBBPF_OPTS(bpf_uprobe_opts, opts);
+ char *probe_type = NULL, *binary_path = NULL, *func_name = NULL;
+ int n, ret = -EINVAL;
+ long offset = 0;
+
+ *link = NULL;
+
+ n = sscanf(prog->sec_name, "%m[^/]/%m[^:]:%m[a-zA-Z0-9_.]+%li",
+ &probe_type, &binary_path, &func_name, &offset);
+ switch (n) {
+ case 1:
+ /* handle SEC("u[ret]probe") - format is valid, but auto-attach is impossible. */
+ ret = 0;
+ break;
+ case 2:
+ pr_warn("prog '%s': section '%s' missing ':function[+offset]' specification\n",
+ prog->name, prog->sec_name);
+ break;
+ case 3:
+ case 4:
+ opts.retprobe = strcmp(probe_type, "uretprobe") == 0 ||
+ strcmp(probe_type, "uretprobe.s") == 0;
+ if (opts.retprobe && offset != 0) {
+ pr_warn("prog '%s': uretprobes do not support offset specification\n",
+ prog->name);
+ break;
+ }
+ opts.func_name = func_name;
+ *link = bpf_program__attach_uprobe_opts(prog, -1, binary_path, offset, &opts);
+ ret = libbpf_get_error(*link);
+ break;
+ default:
+ pr_warn("prog '%s': invalid format of section definition '%s'\n", prog->name,
+ prog->sec_name);
+ break;
+ }
+ free(probe_type);
+ free(binary_path);
+ free(func_name);
+
+ return ret;
+}
+
+struct bpf_link *bpf_program__attach_uprobe(const struct bpf_program *prog,
+ bool retprobe, pid_t pid,
+ const char *binary_path,
+ size_t func_offset)
+{
+ DECLARE_LIBBPF_OPTS(bpf_uprobe_opts, opts, .retprobe = retprobe);
+
+ return bpf_program__attach_uprobe_opts(prog, pid, binary_path, func_offset, &opts);
+}
+
+struct bpf_link *bpf_program__attach_usdt(const struct bpf_program *prog,
+ pid_t pid, const char *binary_path,
+ const char *usdt_provider, const char *usdt_name,
+ const struct bpf_usdt_opts *opts)
+{
+ char resolved_path[512];
+ struct bpf_object *obj = prog->obj;
+ struct bpf_link *link;
+ __u64 usdt_cookie;
+ int err;
+
+ if (!OPTS_VALID(opts, bpf_uprobe_opts))
+ return libbpf_err_ptr(-EINVAL);
+
+ if (bpf_program__fd(prog) < 0) {
+ pr_warn("prog '%s': can't attach BPF program w/o FD (did you load it?)\n",
+ prog->name);
+ return libbpf_err_ptr(-EINVAL);
+ }
+
+ if (!binary_path)
+ return libbpf_err_ptr(-EINVAL);
+
+ if (!strchr(binary_path, '/')) {
+ err = resolve_full_path(binary_path, resolved_path, sizeof(resolved_path));
+ if (err) {
+ pr_warn("prog '%s': failed to resolve full path for '%s': %d\n",
+ prog->name, binary_path, err);
+ return libbpf_err_ptr(err);
+ }
+ binary_path = resolved_path;
+ }
+
+ /* USDT manager is instantiated lazily on first USDT attach. It will
+ * be destroyed together with BPF object in bpf_object__close().
+ */
+ if (IS_ERR(obj->usdt_man))
+ return libbpf_ptr(obj->usdt_man);
+ if (!obj->usdt_man) {
+ obj->usdt_man = usdt_manager_new(obj);
+ if (IS_ERR(obj->usdt_man))
+ return libbpf_ptr(obj->usdt_man);
+ }
+
+ usdt_cookie = OPTS_GET(opts, usdt_cookie, 0);
+ link = usdt_manager_attach_usdt(obj->usdt_man, prog, pid, binary_path,
+ usdt_provider, usdt_name, usdt_cookie);
+ err = libbpf_get_error(link);
+ if (err)
+ return libbpf_err_ptr(err);
+ return link;
+}
+
+static int attach_usdt(const struct bpf_program *prog, long cookie, struct bpf_link **link)
+{
+ char *path = NULL, *provider = NULL, *name = NULL;
+ const char *sec_name;
+ int n, err;
+
+ sec_name = bpf_program__section_name(prog);
+ if (strcmp(sec_name, "usdt") == 0) {
+ /* no auto-attach for just SEC("usdt") */
+ *link = NULL;
+ return 0;
+ }
+
+ n = sscanf(sec_name, "usdt/%m[^:]:%m[^:]:%m[^:]", &path, &provider, &name);
+ if (n != 3) {
+ pr_warn("invalid section '%s', expected SEC(\"usdt/<path>:<provider>:<name>\")\n",
+ sec_name);
+ err = -EINVAL;
+ } else {
+ *link = bpf_program__attach_usdt(prog, -1 /* any process */, path,
+ provider, name, NULL);
+ err = libbpf_get_error(*link);
+ }
+ free(path);
+ free(provider);
+ free(name);
+ return err;
+}
+
+static int determine_tracepoint_id(const char *tp_category,
+ const char *tp_name)
+{
+ char file[PATH_MAX];
+ int ret;
+
+ ret = snprintf(file, sizeof(file), "%s/events/%s/%s/id",
+ tracefs_path(), tp_category, tp_name);
+ if (ret < 0)
+ return -errno;
+ if (ret >= sizeof(file)) {
+ pr_debug("tracepoint %s/%s path is too long\n",
+ tp_category, tp_name);
+ return -E2BIG;
+ }
+ return parse_uint_from_file(file, "%d\n");
+}
+
+static int perf_event_open_tracepoint(const char *tp_category,
+ const char *tp_name)
+{
+ const size_t attr_sz = sizeof(struct perf_event_attr);
+ struct perf_event_attr attr;
+ char errmsg[STRERR_BUFSIZE];
+ int tp_id, pfd, err;
+
+ tp_id = determine_tracepoint_id(tp_category, tp_name);
+ if (tp_id < 0) {
+ pr_warn("failed to determine tracepoint '%s/%s' perf event ID: %s\n",
+ tp_category, tp_name,
+ libbpf_strerror_r(tp_id, errmsg, sizeof(errmsg)));
+ return tp_id;
+ }
+
+ memset(&attr, 0, attr_sz);
+ attr.type = PERF_TYPE_TRACEPOINT;
+ attr.size = attr_sz;
+ attr.config = tp_id;
+
+ pfd = syscall(__NR_perf_event_open, &attr, -1 /* pid */, 0 /* cpu */,
+ -1 /* group_fd */, PERF_FLAG_FD_CLOEXEC);
+ if (pfd < 0) {
+ err = -errno;
+ pr_warn("tracepoint '%s/%s' perf_event_open() failed: %s\n",
+ tp_category, tp_name,
+ libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+ return err;
+ }
+ return pfd;
+}
+
+struct bpf_link *bpf_program__attach_tracepoint_opts(const struct bpf_program *prog,
+ const char *tp_category,
+ const char *tp_name,
+ const struct bpf_tracepoint_opts *opts)
+{
+ DECLARE_LIBBPF_OPTS(bpf_perf_event_opts, pe_opts);
+ char errmsg[STRERR_BUFSIZE];
+ struct bpf_link *link;
+ int pfd, err;
+
+ if (!OPTS_VALID(opts, bpf_tracepoint_opts))
+ return libbpf_err_ptr(-EINVAL);
+
+ pe_opts.bpf_cookie = OPTS_GET(opts, bpf_cookie, 0);
+
+ pfd = perf_event_open_tracepoint(tp_category, tp_name);
+ if (pfd < 0) {
+ pr_warn("prog '%s': failed to create tracepoint '%s/%s' perf event: %s\n",
+ prog->name, tp_category, tp_name,
+ libbpf_strerror_r(pfd, errmsg, sizeof(errmsg)));
+ return libbpf_err_ptr(pfd);
+ }
+ link = bpf_program__attach_perf_event_opts(prog, pfd, &pe_opts);
+ err = libbpf_get_error(link);
+ if (err) {
+ close(pfd);
+ pr_warn("prog '%s': failed to attach to tracepoint '%s/%s': %s\n",
+ prog->name, tp_category, tp_name,
+ libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+ return libbpf_err_ptr(err);
+ }
+ return link;
+}
+
+struct bpf_link *bpf_program__attach_tracepoint(const struct bpf_program *prog,
+ const char *tp_category,
+ const char *tp_name)
+{
+ return bpf_program__attach_tracepoint_opts(prog, tp_category, tp_name, NULL);
+}
+
+static int attach_tp(const struct bpf_program *prog, long cookie, struct bpf_link **link)
+{
+ char *sec_name, *tp_cat, *tp_name;
+
+ *link = NULL;
+
+ /* no auto-attach for SEC("tp") or SEC("tracepoint") */
+ if (strcmp(prog->sec_name, "tp") == 0 || strcmp(prog->sec_name, "tracepoint") == 0)
+ return 0;
+
+ sec_name = strdup(prog->sec_name);
+ if (!sec_name)
+ return -ENOMEM;
+
+ /* extract "tp/<category>/<name>" or "tracepoint/<category>/<name>" */
+ if (str_has_pfx(prog->sec_name, "tp/"))
+ tp_cat = sec_name + sizeof("tp/") - 1;
+ else
+ tp_cat = sec_name + sizeof("tracepoint/") - 1;
+ tp_name = strchr(tp_cat, '/');
+ if (!tp_name) {
+ free(sec_name);
+ return -EINVAL;
+ }
+ *tp_name = '\0';
+ tp_name++;
+
+ *link = bpf_program__attach_tracepoint(prog, tp_cat, tp_name);
+ free(sec_name);
+ return libbpf_get_error(*link);
+}
+
+struct bpf_link *bpf_program__attach_raw_tracepoint(const struct bpf_program *prog,
+ const char *tp_name)
+{
+ char errmsg[STRERR_BUFSIZE];
+ struct bpf_link *link;
+ int prog_fd, pfd;
+
+ prog_fd = bpf_program__fd(prog);
+ if (prog_fd < 0) {
+ pr_warn("prog '%s': can't attach before loaded\n", prog->name);
+ return libbpf_err_ptr(-EINVAL);
+ }
+
+ link = calloc(1, sizeof(*link));
+ if (!link)
+ return libbpf_err_ptr(-ENOMEM);
+ link->detach = &bpf_link__detach_fd;
+
+ pfd = bpf_raw_tracepoint_open(tp_name, prog_fd);
+ if (pfd < 0) {
+ pfd = -errno;
+ free(link);
+ pr_warn("prog '%s': failed to attach to raw tracepoint '%s': %s\n",
+ prog->name, tp_name, libbpf_strerror_r(pfd, errmsg, sizeof(errmsg)));
+ return libbpf_err_ptr(pfd);
+ }
+ link->fd = pfd;
+ return link;
+}
+
+static int attach_raw_tp(const struct bpf_program *prog, long cookie, struct bpf_link **link)
+{
+ static const char *const prefixes[] = {
+ "raw_tp",
+ "raw_tracepoint",
+ "raw_tp.w",
+ "raw_tracepoint.w",
+ };
+ size_t i;
+ const char *tp_name = NULL;
+
+ *link = NULL;
+
+ for (i = 0; i < ARRAY_SIZE(prefixes); i++) {
+ size_t pfx_len;
+
+ if (!str_has_pfx(prog->sec_name, prefixes[i]))
+ continue;
+
+ pfx_len = strlen(prefixes[i]);
+ /* no auto-attach case of, e.g., SEC("raw_tp") */
+ if (prog->sec_name[pfx_len] == '\0')
+ return 0;
+
+ if (prog->sec_name[pfx_len] != '/')
+ continue;
+
+ tp_name = prog->sec_name + pfx_len + 1;
+ break;
+ }
+
+ if (!tp_name) {
+ pr_warn("prog '%s': invalid section name '%s'\n",
+ prog->name, prog->sec_name);
+ return -EINVAL;
+ }
+
+ *link = bpf_program__attach_raw_tracepoint(prog, tp_name);
+ return libbpf_get_error(*link);
+}
+
+/* Common logic for all BPF program types that attach to a btf_id */
+static struct bpf_link *bpf_program__attach_btf_id(const struct bpf_program *prog,
+ const struct bpf_trace_opts *opts)
+{
+ LIBBPF_OPTS(bpf_link_create_opts, link_opts);
+ char errmsg[STRERR_BUFSIZE];
+ struct bpf_link *link;
+ int prog_fd, pfd;
+
+ if (!OPTS_VALID(opts, bpf_trace_opts))
+ return libbpf_err_ptr(-EINVAL);
+
+ prog_fd = bpf_program__fd(prog);
+ if (prog_fd < 0) {
+ pr_warn("prog '%s': can't attach before loaded\n", prog->name);
+ return libbpf_err_ptr(-EINVAL);
+ }
+
+ link = calloc(1, sizeof(*link));
+ if (!link)
+ return libbpf_err_ptr(-ENOMEM);
+ link->detach = &bpf_link__detach_fd;
+
+ /* libbpf is smart enough to redirect to BPF_RAW_TRACEPOINT_OPEN on old kernels */
+ link_opts.tracing.cookie = OPTS_GET(opts, cookie, 0);
+ pfd = bpf_link_create(prog_fd, 0, bpf_program__expected_attach_type(prog), &link_opts);
+ if (pfd < 0) {
+ pfd = -errno;
+ free(link);
+ pr_warn("prog '%s': failed to attach: %s\n",
+ prog->name, libbpf_strerror_r(pfd, errmsg, sizeof(errmsg)));
+ return libbpf_err_ptr(pfd);
+ }
+ link->fd = pfd;
+ return link;
+}
+
+struct bpf_link *bpf_program__attach_trace(const struct bpf_program *prog)
+{
+ return bpf_program__attach_btf_id(prog, NULL);
+}
+
+struct bpf_link *bpf_program__attach_trace_opts(const struct bpf_program *prog,
+ const struct bpf_trace_opts *opts)
+{
+ return bpf_program__attach_btf_id(prog, opts);
+}
+
+struct bpf_link *bpf_program__attach_lsm(const struct bpf_program *prog)
+{
+ return bpf_program__attach_btf_id(prog, NULL);
+}
+
+static int attach_trace(const struct bpf_program *prog, long cookie, struct bpf_link **link)
+{
+ *link = bpf_program__attach_trace(prog);
+ return libbpf_get_error(*link);
+}
+
+static int attach_lsm(const struct bpf_program *prog, long cookie, struct bpf_link **link)
+{
+ *link = bpf_program__attach_lsm(prog);
+ return libbpf_get_error(*link);
+}
+
+static struct bpf_link *
+bpf_program__attach_fd(const struct bpf_program *prog, int target_fd, int btf_id,
+ const char *target_name)
+{
+ DECLARE_LIBBPF_OPTS(bpf_link_create_opts, opts,
+ .target_btf_id = btf_id);
+ enum bpf_attach_type attach_type;
+ char errmsg[STRERR_BUFSIZE];
+ struct bpf_link *link;
+ int prog_fd, link_fd;
+
+ prog_fd = bpf_program__fd(prog);
+ if (prog_fd < 0) {
+ pr_warn("prog '%s': can't attach before loaded\n", prog->name);
+ return libbpf_err_ptr(-EINVAL);
+ }
+
+ link = calloc(1, sizeof(*link));
+ if (!link)
+ return libbpf_err_ptr(-ENOMEM);
+ link->detach = &bpf_link__detach_fd;
+
+ attach_type = bpf_program__expected_attach_type(prog);
+ link_fd = bpf_link_create(prog_fd, target_fd, attach_type, &opts);
+ if (link_fd < 0) {
+ link_fd = -errno;
+ free(link);
+ pr_warn("prog '%s': failed to attach to %s: %s\n",
+ prog->name, target_name,
+ libbpf_strerror_r(link_fd, errmsg, sizeof(errmsg)));
+ return libbpf_err_ptr(link_fd);
+ }
+ link->fd = link_fd;
+ return link;
+}
+
+struct bpf_link *
+bpf_program__attach_cgroup(const struct bpf_program *prog, int cgroup_fd)
+{
+ return bpf_program__attach_fd(prog, cgroup_fd, 0, "cgroup");
+}
+
+struct bpf_link *
+bpf_program__attach_netns(const struct bpf_program *prog, int netns_fd)
+{
+ return bpf_program__attach_fd(prog, netns_fd, 0, "netns");
+}
+
+struct bpf_link *bpf_program__attach_xdp(const struct bpf_program *prog, int ifindex)
+{
+ /* target_fd/target_ifindex use the same field in LINK_CREATE */
+ return bpf_program__attach_fd(prog, ifindex, 0, "xdp");
+}
+
+struct bpf_link *bpf_program__attach_freplace(const struct bpf_program *prog,
+ int target_fd,
+ const char *attach_func_name)
+{
+ int btf_id;
+
+ if (!!target_fd != !!attach_func_name) {
+ pr_warn("prog '%s': supply none or both of target_fd and attach_func_name\n",
+ prog->name);
+ return libbpf_err_ptr(-EINVAL);
+ }
+
+ if (prog->type != BPF_PROG_TYPE_EXT) {
+ pr_warn("prog '%s': only BPF_PROG_TYPE_EXT can attach as freplace",
+ prog->name);
+ return libbpf_err_ptr(-EINVAL);
+ }
+
+ if (target_fd) {
+ btf_id = libbpf_find_prog_btf_id(attach_func_name, target_fd);
+ if (btf_id < 0)
+ return libbpf_err_ptr(btf_id);
+
+ return bpf_program__attach_fd(prog, target_fd, btf_id, "freplace");
+ } else {
+ /* no target, so use raw_tracepoint_open for compatibility
+ * with old kernels
+ */
+ return bpf_program__attach_trace(prog);
+ }
+}
+
+struct bpf_link *
+bpf_program__attach_iter(const struct bpf_program *prog,
+ const struct bpf_iter_attach_opts *opts)
+{
+ DECLARE_LIBBPF_OPTS(bpf_link_create_opts, link_create_opts);
+ char errmsg[STRERR_BUFSIZE];
+ struct bpf_link *link;
+ int prog_fd, link_fd;
+ __u32 target_fd = 0;
+
+ if (!OPTS_VALID(opts, bpf_iter_attach_opts))
+ return libbpf_err_ptr(-EINVAL);
+
+ link_create_opts.iter_info = OPTS_GET(opts, link_info, (void *)0);
+ link_create_opts.iter_info_len = OPTS_GET(opts, link_info_len, 0);
+
+ prog_fd = bpf_program__fd(prog);
+ if (prog_fd < 0) {
+ pr_warn("prog '%s': can't attach before loaded\n", prog->name);
+ return libbpf_err_ptr(-EINVAL);
+ }
+
+ link = calloc(1, sizeof(*link));
+ if (!link)
+ return libbpf_err_ptr(-ENOMEM);
+ link->detach = &bpf_link__detach_fd;
+
+ link_fd = bpf_link_create(prog_fd, target_fd, BPF_TRACE_ITER,
+ &link_create_opts);
+ if (link_fd < 0) {
+ link_fd = -errno;
+ free(link);
+ pr_warn("prog '%s': failed to attach to iterator: %s\n",
+ prog->name, libbpf_strerror_r(link_fd, errmsg, sizeof(errmsg)));
+ return libbpf_err_ptr(link_fd);
+ }
+ link->fd = link_fd;
+ return link;
+}
+
+static int attach_iter(const struct bpf_program *prog, long cookie, struct bpf_link **link)
+{
+ *link = bpf_program__attach_iter(prog, NULL);
+ return libbpf_get_error(*link);
+}
+
+struct bpf_link *bpf_program__attach(const struct bpf_program *prog)
+{
+ struct bpf_link *link = NULL;
+ int err;
+
+ if (!prog->sec_def || !prog->sec_def->prog_attach_fn)
+ return libbpf_err_ptr(-EOPNOTSUPP);
+
+ err = prog->sec_def->prog_attach_fn(prog, prog->sec_def->cookie, &link);
+ if (err)
+ return libbpf_err_ptr(err);
+
+ /* When calling bpf_program__attach() explicitly, auto-attach support
+ * is expected to work, so NULL returned link is considered an error.
+ * This is different for skeleton's attach, see comment in
+ * bpf_object__attach_skeleton().
+ */
+ if (!link)
+ return libbpf_err_ptr(-EOPNOTSUPP);
+
+ return link;
+}
+
+static int bpf_link__detach_struct_ops(struct bpf_link *link)
+{
+ __u32 zero = 0;
+
+ if (bpf_map_delete_elem(link->fd, &zero))
+ return -errno;
+
+ return 0;
+}
+
+struct bpf_link *bpf_map__attach_struct_ops(const struct bpf_map *map)
+{
+ struct bpf_struct_ops *st_ops;
+ struct bpf_link *link;
+ __u32 i, zero = 0;
+ int err;
+
+ if (!bpf_map__is_struct_ops(map) || map->fd == -1)
+ return libbpf_err_ptr(-EINVAL);
+
+ link = calloc(1, sizeof(*link));
+ if (!link)
+ return libbpf_err_ptr(-EINVAL);
+
+ st_ops = map->st_ops;
+ for (i = 0; i < btf_vlen(st_ops->type); i++) {
+ struct bpf_program *prog = st_ops->progs[i];
+ void *kern_data;
+ int prog_fd;
+
+ if (!prog)
+ continue;
+
+ prog_fd = bpf_program__fd(prog);
+ kern_data = st_ops->kern_vdata + st_ops->kern_func_off[i];
+ *(unsigned long *)kern_data = prog_fd;
+ }
+
+ err = bpf_map_update_elem(map->fd, &zero, st_ops->kern_vdata, 0);
+ if (err) {
+ err = -errno;
+ free(link);
+ return libbpf_err_ptr(err);
+ }
+
+ link->detach = bpf_link__detach_struct_ops;
+ link->fd = map->fd;
+
+ return link;
+}
+
+typedef enum bpf_perf_event_ret (*bpf_perf_event_print_t)(struct perf_event_header *hdr,
+ void *private_data);
+
+static enum bpf_perf_event_ret
+perf_event_read_simple(void *mmap_mem, size_t mmap_size, size_t page_size,
+ void **copy_mem, size_t *copy_size,
+ bpf_perf_event_print_t fn, void *private_data)
+{
+ struct perf_event_mmap_page *header = mmap_mem;
+ __u64 data_head = ring_buffer_read_head(header);
+ __u64 data_tail = header->data_tail;
+ void *base = ((__u8 *)header) + page_size;
+ int ret = LIBBPF_PERF_EVENT_CONT;
+ struct perf_event_header *ehdr;
+ size_t ehdr_size;
+
+ while (data_head != data_tail) {
+ ehdr = base + (data_tail & (mmap_size - 1));
+ ehdr_size = ehdr->size;
+
+ if (((void *)ehdr) + ehdr_size > base + mmap_size) {
+ void *copy_start = ehdr;
+ size_t len_first = base + mmap_size - copy_start;
+ size_t len_secnd = ehdr_size - len_first;
+
+ if (*copy_size < ehdr_size) {
+ free(*copy_mem);
+ *copy_mem = malloc(ehdr_size);
+ if (!*copy_mem) {
+ *copy_size = 0;
+ ret = LIBBPF_PERF_EVENT_ERROR;
+ break;
+ }
+ *copy_size = ehdr_size;
+ }
+
+ memcpy(*copy_mem, copy_start, len_first);
+ memcpy(*copy_mem + len_first, base, len_secnd);
+ ehdr = *copy_mem;
+ }
+
+ ret = fn(ehdr, private_data);
+ data_tail += ehdr_size;
+ if (ret != LIBBPF_PERF_EVENT_CONT)
+ break;
+ }
+
+ ring_buffer_write_tail(header, data_tail);
+ return libbpf_err(ret);
+}
+
+struct perf_buffer;
+
+struct perf_buffer_params {
+ struct perf_event_attr *attr;
+ /* if event_cb is specified, it takes precendence */
+ perf_buffer_event_fn event_cb;
+ /* sample_cb and lost_cb are higher-level common-case callbacks */
+ perf_buffer_sample_fn sample_cb;
+ perf_buffer_lost_fn lost_cb;
+ void *ctx;
+ int cpu_cnt;
+ int *cpus;
+ int *map_keys;
+};
+
+struct perf_cpu_buf {
+ struct perf_buffer *pb;
+ void *base; /* mmap()'ed memory */
+ void *buf; /* for reconstructing segmented data */
+ size_t buf_size;
+ int fd;
+ int cpu;
+ int map_key;
+};
+
+struct perf_buffer {
+ perf_buffer_event_fn event_cb;
+ perf_buffer_sample_fn sample_cb;
+ perf_buffer_lost_fn lost_cb;
+ void *ctx; /* passed into callbacks */
+
+ size_t page_size;
+ size_t mmap_size;
+ struct perf_cpu_buf **cpu_bufs;
+ struct epoll_event *events;
+ int cpu_cnt; /* number of allocated CPU buffers */
+ int epoll_fd; /* perf event FD */
+ int map_fd; /* BPF_MAP_TYPE_PERF_EVENT_ARRAY BPF map FD */
+};
+
+static void perf_buffer__free_cpu_buf(struct perf_buffer *pb,
+ struct perf_cpu_buf *cpu_buf)
+{
+ if (!cpu_buf)
+ return;
+ if (cpu_buf->base &&
+ munmap(cpu_buf->base, pb->mmap_size + pb->page_size))
+ pr_warn("failed to munmap cpu_buf #%d\n", cpu_buf->cpu);
+ if (cpu_buf->fd >= 0) {
+ ioctl(cpu_buf->fd, PERF_EVENT_IOC_DISABLE, 0);
+ close(cpu_buf->fd);
+ }
+ free(cpu_buf->buf);
+ free(cpu_buf);
+}
+
+void perf_buffer__free(struct perf_buffer *pb)
+{
+ int i;
+
+ if (IS_ERR_OR_NULL(pb))
+ return;
+ if (pb->cpu_bufs) {
+ for (i = 0; i < pb->cpu_cnt; i++) {
+ struct perf_cpu_buf *cpu_buf = pb->cpu_bufs[i];
+
+ if (!cpu_buf)
+ continue;
+
+ bpf_map_delete_elem(pb->map_fd, &cpu_buf->map_key);
+ perf_buffer__free_cpu_buf(pb, cpu_buf);
+ }
+ free(pb->cpu_bufs);
+ }
+ if (pb->epoll_fd >= 0)
+ close(pb->epoll_fd);
+ free(pb->events);
+ free(pb);
+}
+
+static struct perf_cpu_buf *
+perf_buffer__open_cpu_buf(struct perf_buffer *pb, struct perf_event_attr *attr,
+ int cpu, int map_key)
+{
+ struct perf_cpu_buf *cpu_buf;
+ char msg[STRERR_BUFSIZE];
+ int err;
+
+ cpu_buf = calloc(1, sizeof(*cpu_buf));
+ if (!cpu_buf)
+ return ERR_PTR(-ENOMEM);
+
+ cpu_buf->pb = pb;
+ cpu_buf->cpu = cpu;
+ cpu_buf->map_key = map_key;
+
+ cpu_buf->fd = syscall(__NR_perf_event_open, attr, -1 /* pid */, cpu,
+ -1, PERF_FLAG_FD_CLOEXEC);
+ if (cpu_buf->fd < 0) {
+ err = -errno;
+ pr_warn("failed to open perf buffer event on cpu #%d: %s\n",
+ cpu, libbpf_strerror_r(err, msg, sizeof(msg)));
+ goto error;
+ }
+
+ cpu_buf->base = mmap(NULL, pb->mmap_size + pb->page_size,
+ PROT_READ | PROT_WRITE, MAP_SHARED,
+ cpu_buf->fd, 0);
+ if (cpu_buf->base == MAP_FAILED) {
+ cpu_buf->base = NULL;
+ err = -errno;
+ pr_warn("failed to mmap perf buffer on cpu #%d: %s\n",
+ cpu, libbpf_strerror_r(err, msg, sizeof(msg)));
+ goto error;
+ }
+
+ if (ioctl(cpu_buf->fd, PERF_EVENT_IOC_ENABLE, 0) < 0) {
+ err = -errno;
+ pr_warn("failed to enable perf buffer event on cpu #%d: %s\n",
+ cpu, libbpf_strerror_r(err, msg, sizeof(msg)));
+ goto error;
+ }
+
+ return cpu_buf;
+
+error:
+ perf_buffer__free_cpu_buf(pb, cpu_buf);
+ return (struct perf_cpu_buf *)ERR_PTR(err);
+}
+
+static struct perf_buffer *__perf_buffer__new(int map_fd, size_t page_cnt,
+ struct perf_buffer_params *p);
+
+struct perf_buffer *perf_buffer__new(int map_fd, size_t page_cnt,
+ perf_buffer_sample_fn sample_cb,
+ perf_buffer_lost_fn lost_cb,
+ void *ctx,
+ const struct perf_buffer_opts *opts)
+{
+ const size_t attr_sz = sizeof(struct perf_event_attr);
+ struct perf_buffer_params p = {};
+ struct perf_event_attr attr;
+
+ if (!OPTS_VALID(opts, perf_buffer_opts))
+ return libbpf_err_ptr(-EINVAL);
+
+ memset(&attr, 0, attr_sz);
+ attr.size = attr_sz;
+ attr.config = PERF_COUNT_SW_BPF_OUTPUT;
+ attr.type = PERF_TYPE_SOFTWARE;
+ attr.sample_type = PERF_SAMPLE_RAW;
+ attr.sample_period = 1;
+ attr.wakeup_events = 1;
+
+ p.attr = &attr;
+ p.sample_cb = sample_cb;
+ p.lost_cb = lost_cb;
+ p.ctx = ctx;
+
+ return libbpf_ptr(__perf_buffer__new(map_fd, page_cnt, &p));
+}
+
+struct perf_buffer *perf_buffer__new_raw(int map_fd, size_t page_cnt,
+ struct perf_event_attr *attr,
+ perf_buffer_event_fn event_cb, void *ctx,
+ const struct perf_buffer_raw_opts *opts)
+{
+ struct perf_buffer_params p = {};
+
+ if (!attr)
+ return libbpf_err_ptr(-EINVAL);
+
+ if (!OPTS_VALID(opts, perf_buffer_raw_opts))
+ return libbpf_err_ptr(-EINVAL);
+
+ p.attr = attr;
+ p.event_cb = event_cb;
+ p.ctx = ctx;
+ p.cpu_cnt = OPTS_GET(opts, cpu_cnt, 0);
+ p.cpus = OPTS_GET(opts, cpus, NULL);
+ p.map_keys = OPTS_GET(opts, map_keys, NULL);
+
+ return libbpf_ptr(__perf_buffer__new(map_fd, page_cnt, &p));
+}
+
+static struct perf_buffer *__perf_buffer__new(int map_fd, size_t page_cnt,
+ struct perf_buffer_params *p)
+{
+ const char *online_cpus_file = "/sys/devices/system/cpu/online";
+ struct bpf_map_info map;
+ char msg[STRERR_BUFSIZE];
+ struct perf_buffer *pb;
+ bool *online = NULL;
+ __u32 map_info_len;
+ int err, i, j, n;
+
+ if (page_cnt == 0 || (page_cnt & (page_cnt - 1))) {
+ pr_warn("page count should be power of two, but is %zu\n",
+ page_cnt);
+ return ERR_PTR(-EINVAL);
+ }
+
+ /* best-effort sanity checks */
+ memset(&map, 0, sizeof(map));
+ map_info_len = sizeof(map);
+ err = bpf_obj_get_info_by_fd(map_fd, &map, &map_info_len);
+ if (err) {
+ err = -errno;
+ /* if BPF_OBJ_GET_INFO_BY_FD is supported, will return
+ * -EBADFD, -EFAULT, or -E2BIG on real error
+ */
+ if (err != -EINVAL) {
+ pr_warn("failed to get map info for map FD %d: %s\n",
+ map_fd, libbpf_strerror_r(err, msg, sizeof(msg)));
+ return ERR_PTR(err);
+ }
+ pr_debug("failed to get map info for FD %d; API not supported? Ignoring...\n",
+ map_fd);
+ } else {
+ if (map.type != BPF_MAP_TYPE_PERF_EVENT_ARRAY) {
+ pr_warn("map '%s' should be BPF_MAP_TYPE_PERF_EVENT_ARRAY\n",
+ map.name);
+ return ERR_PTR(-EINVAL);
+ }
+ }
+
+ pb = calloc(1, sizeof(*pb));
+ if (!pb)
+ return ERR_PTR(-ENOMEM);
+
+ pb->event_cb = p->event_cb;
+ pb->sample_cb = p->sample_cb;
+ pb->lost_cb = p->lost_cb;
+ pb->ctx = p->ctx;
+
+ pb->page_size = getpagesize();
+ pb->mmap_size = pb->page_size * page_cnt;
+ pb->map_fd = map_fd;
+
+ pb->epoll_fd = epoll_create1(EPOLL_CLOEXEC);
+ if (pb->epoll_fd < 0) {
+ err = -errno;
+ pr_warn("failed to create epoll instance: %s\n",
+ libbpf_strerror_r(err, msg, sizeof(msg)));
+ goto error;
+ }
+
+ if (p->cpu_cnt > 0) {
+ pb->cpu_cnt = p->cpu_cnt;
+ } else {
+ pb->cpu_cnt = libbpf_num_possible_cpus();
+ if (pb->cpu_cnt < 0) {
+ err = pb->cpu_cnt;
+ goto error;
+ }
+ if (map.max_entries && map.max_entries < pb->cpu_cnt)
+ pb->cpu_cnt = map.max_entries;
+ }
+
+ pb->events = calloc(pb->cpu_cnt, sizeof(*pb->events));
+ if (!pb->events) {
+ err = -ENOMEM;
+ pr_warn("failed to allocate events: out of memory\n");
+ goto error;
+ }
+ pb->cpu_bufs = calloc(pb->cpu_cnt, sizeof(*pb->cpu_bufs));
+ if (!pb->cpu_bufs) {
+ err = -ENOMEM;
+ pr_warn("failed to allocate buffers: out of memory\n");
+ goto error;
+ }
+
+ err = parse_cpu_mask_file(online_cpus_file, &online, &n);
+ if (err) {
+ pr_warn("failed to get online CPU mask: %d\n", err);
+ goto error;
+ }
+
+ for (i = 0, j = 0; i < pb->cpu_cnt; i++) {
+ struct perf_cpu_buf *cpu_buf;
+ int cpu, map_key;
+
+ cpu = p->cpu_cnt > 0 ? p->cpus[i] : i;
+ map_key = p->cpu_cnt > 0 ? p->map_keys[i] : i;
+
+ /* in case user didn't explicitly requested particular CPUs to
+ * be attached to, skip offline/not present CPUs
+ */
+ if (p->cpu_cnt <= 0 && (cpu >= n || !online[cpu]))
+ continue;
+
+ cpu_buf = perf_buffer__open_cpu_buf(pb, p->attr, cpu, map_key);
+ if (IS_ERR(cpu_buf)) {
+ err = PTR_ERR(cpu_buf);
+ goto error;
+ }
+
+ pb->cpu_bufs[j] = cpu_buf;
+
+ err = bpf_map_update_elem(pb->map_fd, &map_key,
+ &cpu_buf->fd, 0);
+ if (err) {
+ err = -errno;
+ pr_warn("failed to set cpu #%d, key %d -> perf FD %d: %s\n",
+ cpu, map_key, cpu_buf->fd,
+ libbpf_strerror_r(err, msg, sizeof(msg)));
+ goto error;
+ }
+
+ pb->events[j].events = EPOLLIN;
+ pb->events[j].data.ptr = cpu_buf;
+ if (epoll_ctl(pb->epoll_fd, EPOLL_CTL_ADD, cpu_buf->fd,
+ &pb->events[j]) < 0) {
+ err = -errno;
+ pr_warn("failed to epoll_ctl cpu #%d perf FD %d: %s\n",
+ cpu, cpu_buf->fd,
+ libbpf_strerror_r(err, msg, sizeof(msg)));
+ goto error;
+ }
+ j++;
+ }
+ pb->cpu_cnt = j;
+ free(online);
+
+ return pb;
+
+error:
+ free(online);
+ if (pb)
+ perf_buffer__free(pb);
+ return ERR_PTR(err);
+}
+
+struct perf_sample_raw {
+ struct perf_event_header header;
+ uint32_t size;
+ char data[];
+};
+
+struct perf_sample_lost {
+ struct perf_event_header header;
+ uint64_t id;
+ uint64_t lost;
+ uint64_t sample_id;
+};
+
+static enum bpf_perf_event_ret
+perf_buffer__process_record(struct perf_event_header *e, void *ctx)
+{
+ struct perf_cpu_buf *cpu_buf = ctx;
+ struct perf_buffer *pb = cpu_buf->pb;
+ void *data = e;
+
+ /* user wants full control over parsing perf event */
+ if (pb->event_cb)
+ return pb->event_cb(pb->ctx, cpu_buf->cpu, e);
+
+ switch (e->type) {
+ case PERF_RECORD_SAMPLE: {
+ struct perf_sample_raw *s = data;
+
+ if (pb->sample_cb)
+ pb->sample_cb(pb->ctx, cpu_buf->cpu, s->data, s->size);
+ break;
+ }
+ case PERF_RECORD_LOST: {
+ struct perf_sample_lost *s = data;
+
+ if (pb->lost_cb)
+ pb->lost_cb(pb->ctx, cpu_buf->cpu, s->lost);
+ break;
+ }
+ default:
+ pr_warn("unknown perf sample type %d\n", e->type);
+ return LIBBPF_PERF_EVENT_ERROR;
+ }
+ return LIBBPF_PERF_EVENT_CONT;
+}
+
+static int perf_buffer__process_records(struct perf_buffer *pb,
+ struct perf_cpu_buf *cpu_buf)
+{
+ enum bpf_perf_event_ret ret;
+
+ ret = perf_event_read_simple(cpu_buf->base, pb->mmap_size,
+ pb->page_size, &cpu_buf->buf,
+ &cpu_buf->buf_size,
+ perf_buffer__process_record, cpu_buf);
+ if (ret != LIBBPF_PERF_EVENT_CONT)
+ return ret;
+ return 0;
+}
+
+int perf_buffer__epoll_fd(const struct perf_buffer *pb)
+{
+ return pb->epoll_fd;
+}
+
+int perf_buffer__poll(struct perf_buffer *pb, int timeout_ms)
+{
+ int i, cnt, err;
+
+ cnt = epoll_wait(pb->epoll_fd, pb->events, pb->cpu_cnt, timeout_ms);
+ if (cnt < 0)
+ return -errno;
+
+ for (i = 0; i < cnt; i++) {
+ struct perf_cpu_buf *cpu_buf = pb->events[i].data.ptr;
+
+ err = perf_buffer__process_records(pb, cpu_buf);
+ if (err) {
+ pr_warn("error while processing records: %d\n", err);
+ return libbpf_err(err);
+ }
+ }
+ return cnt;
+}
+
+/* Return number of PERF_EVENT_ARRAY map slots set up by this perf_buffer
+ * manager.
+ */
+size_t perf_buffer__buffer_cnt(const struct perf_buffer *pb)
+{
+ return pb->cpu_cnt;
+}
+
+/*
+ * Return perf_event FD of a ring buffer in *buf_idx* slot of
+ * PERF_EVENT_ARRAY BPF map. This FD can be polled for new data using
+ * select()/poll()/epoll() Linux syscalls.
+ */
+int perf_buffer__buffer_fd(const struct perf_buffer *pb, size_t buf_idx)
+{
+ struct perf_cpu_buf *cpu_buf;
+
+ if (buf_idx >= pb->cpu_cnt)
+ return libbpf_err(-EINVAL);
+
+ cpu_buf = pb->cpu_bufs[buf_idx];
+ if (!cpu_buf)
+ return libbpf_err(-ENOENT);
+
+ return cpu_buf->fd;
+}
+
+int perf_buffer__buffer(struct perf_buffer *pb, int buf_idx, void **buf, size_t *buf_size)
+{
+ struct perf_cpu_buf *cpu_buf;
+
+ if (buf_idx >= pb->cpu_cnt)
+ return libbpf_err(-EINVAL);
+
+ cpu_buf = pb->cpu_bufs[buf_idx];
+ if (!cpu_buf)
+ return libbpf_err(-ENOENT);
+
+ *buf = cpu_buf->base;
+ *buf_size = pb->mmap_size;
+ return 0;
+}
+
+/*
+ * Consume data from perf ring buffer corresponding to slot *buf_idx* in
+ * PERF_EVENT_ARRAY BPF map without waiting/polling. If there is no data to
+ * consume, do nothing and return success.
+ * Returns:
+ * - 0 on success;
+ * - <0 on failure.
+ */
+int perf_buffer__consume_buffer(struct perf_buffer *pb, size_t buf_idx)
+{
+ struct perf_cpu_buf *cpu_buf;
+
+ if (buf_idx >= pb->cpu_cnt)
+ return libbpf_err(-EINVAL);
+
+ cpu_buf = pb->cpu_bufs[buf_idx];
+ if (!cpu_buf)
+ return libbpf_err(-ENOENT);
+
+ return perf_buffer__process_records(pb, cpu_buf);
+}
+
+int perf_buffer__consume(struct perf_buffer *pb)
+{
+ int i, err;
+
+ for (i = 0; i < pb->cpu_cnt; i++) {
+ struct perf_cpu_buf *cpu_buf = pb->cpu_bufs[i];
+
+ if (!cpu_buf)
+ continue;
+
+ err = perf_buffer__process_records(pb, cpu_buf);
+ if (err) {
+ pr_warn("perf_buffer: failed to process records in buffer #%d: %d\n", i, err);
+ return libbpf_err(err);
+ }
+ }
+ return 0;
+}
+
+int bpf_program__set_attach_target(struct bpf_program *prog,
+ int attach_prog_fd,
+ const char *attach_func_name)
+{
+ int btf_obj_fd = 0, btf_id = 0, err;
+
+ if (!prog || attach_prog_fd < 0)
+ return libbpf_err(-EINVAL);
+
+ if (prog->obj->loaded)
+ return libbpf_err(-EINVAL);
+
+ if (attach_prog_fd && !attach_func_name) {
+ /* remember attach_prog_fd and let bpf_program__load() find
+ * BTF ID during the program load
+ */
+ prog->attach_prog_fd = attach_prog_fd;
+ return 0;
+ }
+
+ if (attach_prog_fd) {
+ btf_id = libbpf_find_prog_btf_id(attach_func_name,
+ attach_prog_fd);
+ if (btf_id < 0)
+ return libbpf_err(btf_id);
+ } else {
+ if (!attach_func_name)
+ return libbpf_err(-EINVAL);
+
+ /* load btf_vmlinux, if not yet */
+ err = bpf_object__load_vmlinux_btf(prog->obj, true);
+ if (err)
+ return libbpf_err(err);
+ err = find_kernel_btf_id(prog->obj, attach_func_name,
+ prog->expected_attach_type,
+ &btf_obj_fd, &btf_id);
+ if (err)
+ return libbpf_err(err);
+ }
+
+ prog->attach_btf_id = btf_id;
+ prog->attach_btf_obj_fd = btf_obj_fd;
+ prog->attach_prog_fd = attach_prog_fd;
+ return 0;
+}
+
+int parse_cpu_mask_str(const char *s, bool **mask, int *mask_sz)
+{
+ int err = 0, n, len, start, end = -1;
+ bool *tmp;
+
+ *mask = NULL;
+ *mask_sz = 0;
+
+ /* Each sub string separated by ',' has format \d+-\d+ or \d+ */
+ while (*s) {
+ if (*s == ',' || *s == '\n') {
+ s++;
+ continue;
+ }
+ n = sscanf(s, "%d%n-%d%n", &start, &len, &end, &len);
+ if (n <= 0 || n > 2) {
+ pr_warn("Failed to get CPU range %s: %d\n", s, n);
+ err = -EINVAL;
+ goto cleanup;
+ } else if (n == 1) {
+ end = start;
+ }
+ if (start < 0 || start > end) {
+ pr_warn("Invalid CPU range [%d,%d] in %s\n",
+ start, end, s);
+ err = -EINVAL;
+ goto cleanup;
+ }
+ tmp = realloc(*mask, end + 1);
+ if (!tmp) {
+ err = -ENOMEM;
+ goto cleanup;
+ }
+ *mask = tmp;
+ memset(tmp + *mask_sz, 0, start - *mask_sz);
+ memset(tmp + start, 1, end - start + 1);
+ *mask_sz = end + 1;
+ s += len;
+ }
+ if (!*mask_sz) {
+ pr_warn("Empty CPU range\n");
+ return -EINVAL;
+ }
+ return 0;
+cleanup:
+ free(*mask);
+ *mask = NULL;
+ return err;
+}
+
+int parse_cpu_mask_file(const char *fcpu, bool **mask, int *mask_sz)
+{
+ int fd, err = 0, len;
+ char buf[128];
+
+ fd = open(fcpu, O_RDONLY | O_CLOEXEC);
+ if (fd < 0) {
+ err = -errno;
+ pr_warn("Failed to open cpu mask file %s: %d\n", fcpu, err);
+ return err;
+ }
+ len = read(fd, buf, sizeof(buf));
+ close(fd);
+ if (len <= 0) {
+ err = len ? -errno : -EINVAL;
+ pr_warn("Failed to read cpu mask from %s: %d\n", fcpu, err);
+ return err;
+ }
+ if (len >= sizeof(buf)) {
+ pr_warn("CPU mask is too big in file %s\n", fcpu);
+ return -E2BIG;
+ }
+ buf[len] = '\0';
+
+ return parse_cpu_mask_str(buf, mask, mask_sz);
+}
+
+int libbpf_num_possible_cpus(void)
+{
+ static const char *fcpu = "/sys/devices/system/cpu/possible";
+ static int cpus;
+ int err, n, i, tmp_cpus;
+ bool *mask;
+
+ tmp_cpus = READ_ONCE(cpus);
+ if (tmp_cpus > 0)
+ return tmp_cpus;
+
+ err = parse_cpu_mask_file(fcpu, &mask, &n);
+ if (err)
+ return libbpf_err(err);
+
+ tmp_cpus = 0;
+ for (i = 0; i < n; i++) {
+ if (mask[i])
+ tmp_cpus++;
+ }
+ free(mask);
+
+ WRITE_ONCE(cpus, tmp_cpus);
+ return tmp_cpus;
+}
+
+static int populate_skeleton_maps(const struct bpf_object *obj,
+ struct bpf_map_skeleton *maps,
+ size_t map_cnt)
+{
+ int i;
+
+ for (i = 0; i < map_cnt; i++) {
+ struct bpf_map **map = maps[i].map;
+ const char *name = maps[i].name;
+ void **mmaped = maps[i].mmaped;
+
+ *map = bpf_object__find_map_by_name(obj, name);
+ if (!*map) {
+ pr_warn("failed to find skeleton map '%s'\n", name);
+ return -ESRCH;
+ }
+
+ /* externs shouldn't be pre-setup from user code */
+ if (mmaped && (*map)->libbpf_type != LIBBPF_MAP_KCONFIG)
+ *mmaped = (*map)->mmaped;
+ }
+ return 0;
+}
+
+static int populate_skeleton_progs(const struct bpf_object *obj,
+ struct bpf_prog_skeleton *progs,
+ size_t prog_cnt)
+{
+ int i;
+
+ for (i = 0; i < prog_cnt; i++) {
+ struct bpf_program **prog = progs[i].prog;
+ const char *name = progs[i].name;
+
+ *prog = bpf_object__find_program_by_name(obj, name);
+ if (!*prog) {
+ pr_warn("failed to find skeleton program '%s'\n", name);
+ return -ESRCH;
+ }
+ }
+ return 0;
+}
+
+int bpf_object__open_skeleton(struct bpf_object_skeleton *s,
+ const struct bpf_object_open_opts *opts)
+{
+ DECLARE_LIBBPF_OPTS(bpf_object_open_opts, skel_opts,
+ .object_name = s->name,
+ );
+ struct bpf_object *obj;
+ int err;
+
+ /* Attempt to preserve opts->object_name, unless overriden by user
+ * explicitly. Overwriting object name for skeletons is discouraged,
+ * as it breaks global data maps, because they contain object name
+ * prefix as their own map name prefix. When skeleton is generated,
+ * bpftool is making an assumption that this name will stay the same.
+ */
+ if (opts) {
+ memcpy(&skel_opts, opts, sizeof(*opts));
+ if (!opts->object_name)
+ skel_opts.object_name = s->name;
+ }
+
+ obj = bpf_object__open_mem(s->data, s->data_sz, &skel_opts);
+ err = libbpf_get_error(obj);
+ if (err) {
+ pr_warn("failed to initialize skeleton BPF object '%s': %d\n",
+ s->name, err);
+ return libbpf_err(err);
+ }
+
+ *s->obj = obj;
+ err = populate_skeleton_maps(obj, s->maps, s->map_cnt);
+ if (err) {
+ pr_warn("failed to populate skeleton maps for '%s': %d\n", s->name, err);
+ return libbpf_err(err);
+ }
+
+ err = populate_skeleton_progs(obj, s->progs, s->prog_cnt);
+ if (err) {
+ pr_warn("failed to populate skeleton progs for '%s': %d\n", s->name, err);
+ return libbpf_err(err);
+ }
+
+ return 0;
+}
+
+int bpf_object__open_subskeleton(struct bpf_object_subskeleton *s)
+{
+ int err, len, var_idx, i;
+ const char *var_name;
+ const struct bpf_map *map;
+ struct btf *btf;
+ __u32 map_type_id;
+ const struct btf_type *map_type, *var_type;
+ const struct bpf_var_skeleton *var_skel;
+ struct btf_var_secinfo *var;
+
+ if (!s->obj)
+ return libbpf_err(-EINVAL);
+
+ btf = bpf_object__btf(s->obj);
+ if (!btf) {
+ pr_warn("subskeletons require BTF at runtime (object %s)\n",
+ bpf_object__name(s->obj));
+ return libbpf_err(-errno);
+ }
+
+ err = populate_skeleton_maps(s->obj, s->maps, s->map_cnt);
+ if (err) {
+ pr_warn("failed to populate subskeleton maps: %d\n", err);
+ return libbpf_err(err);
+ }
+
+ err = populate_skeleton_progs(s->obj, s->progs, s->prog_cnt);
+ if (err) {
+ pr_warn("failed to populate subskeleton maps: %d\n", err);
+ return libbpf_err(err);
+ }
+
+ for (var_idx = 0; var_idx < s->var_cnt; var_idx++) {
+ var_skel = &s->vars[var_idx];
+ map = *var_skel->map;
+ map_type_id = bpf_map__btf_value_type_id(map);
+ map_type = btf__type_by_id(btf, map_type_id);
+
+ if (!btf_is_datasec(map_type)) {
+ pr_warn("type for map '%1$s' is not a datasec: %2$s",
+ bpf_map__name(map),
+ __btf_kind_str(btf_kind(map_type)));
+ return libbpf_err(-EINVAL);
+ }
+
+ len = btf_vlen(map_type);
+ var = btf_var_secinfos(map_type);
+ for (i = 0; i < len; i++, var++) {
+ var_type = btf__type_by_id(btf, var->type);
+ var_name = btf__name_by_offset(btf, var_type->name_off);
+ if (strcmp(var_name, var_skel->name) == 0) {
+ *var_skel->addr = map->mmaped + var->offset;
+ break;
+ }
+ }
+ }
+ return 0;
+}
+
+void bpf_object__destroy_subskeleton(struct bpf_object_subskeleton *s)
+{
+ if (!s)
+ return;
+ free(s->maps);
+ free(s->progs);
+ free(s->vars);
+ free(s);
+}
+
+int bpf_object__load_skeleton(struct bpf_object_skeleton *s)
+{
+ int i, err;
+
+ err = bpf_object__load(*s->obj);
+ if (err) {
+ pr_warn("failed to load BPF skeleton '%s': %d\n", s->name, err);
+ return libbpf_err(err);
+ }
+
+ for (i = 0; i < s->map_cnt; i++) {
+ struct bpf_map *map = *s->maps[i].map;
+ size_t mmap_sz = bpf_map_mmap_sz(map);
+ int prot, map_fd = bpf_map__fd(map);
+ void **mmaped = s->maps[i].mmaped;
+
+ if (!mmaped)
+ continue;
+
+ if (!(map->def.map_flags & BPF_F_MMAPABLE)) {
+ *mmaped = NULL;
+ continue;
+ }
+
+ if (map->def.map_flags & BPF_F_RDONLY_PROG)
+ prot = PROT_READ;
+ else
+ prot = PROT_READ | PROT_WRITE;
+
+ /* Remap anonymous mmap()-ed "map initialization image" as
+ * a BPF map-backed mmap()-ed memory, but preserving the same
+ * memory address. This will cause kernel to change process'
+ * page table to point to a different piece of kernel memory,
+ * but from userspace point of view memory address (and its
+ * contents, being identical at this point) will stay the
+ * same. This mapping will be released by bpf_object__close()
+ * as per normal clean up procedure, so we don't need to worry
+ * about it from skeleton's clean up perspective.
+ */
+ *mmaped = mmap(map->mmaped, mmap_sz, prot,
+ MAP_SHARED | MAP_FIXED, map_fd, 0);
+ if (*mmaped == MAP_FAILED) {
+ err = -errno;
+ *mmaped = NULL;
+ pr_warn("failed to re-mmap() map '%s': %d\n",
+ bpf_map__name(map), err);
+ return libbpf_err(err);
+ }
+ }
+
+ return 0;
+}
+
+int bpf_object__attach_skeleton(struct bpf_object_skeleton *s)
+{
+ int i, err;
+
+ for (i = 0; i < s->prog_cnt; i++) {
+ struct bpf_program *prog = *s->progs[i].prog;
+ struct bpf_link **link = s->progs[i].link;
+
+ if (!prog->autoload || !prog->autoattach)
+ continue;
+
+ /* auto-attaching not supported for this program */
+ if (!prog->sec_def || !prog->sec_def->prog_attach_fn)
+ continue;
+
+ /* if user already set the link manually, don't attempt auto-attach */
+ if (*link)
+ continue;
+
+ err = prog->sec_def->prog_attach_fn(prog, prog->sec_def->cookie, link);
+ if (err) {
+ pr_warn("prog '%s': failed to auto-attach: %d\n",
+ bpf_program__name(prog), err);
+ return libbpf_err(err);
+ }
+
+ /* It's possible that for some SEC() definitions auto-attach
+ * is supported in some cases (e.g., if definition completely
+ * specifies target information), but is not in other cases.
+ * SEC("uprobe") is one such case. If user specified target
+ * binary and function name, such BPF program can be
+ * auto-attached. But if not, it shouldn't trigger skeleton's
+ * attach to fail. It should just be skipped.
+ * attach_fn signals such case with returning 0 (no error) and
+ * setting link to NULL.
+ */
+ }
+
+ return 0;
+}
+
+void bpf_object__detach_skeleton(struct bpf_object_skeleton *s)
+{
+ int i;
+
+ for (i = 0; i < s->prog_cnt; i++) {
+ struct bpf_link **link = s->progs[i].link;
+
+ bpf_link__destroy(*link);
+ *link = NULL;
+ }
+}
+
+void bpf_object__destroy_skeleton(struct bpf_object_skeleton *s)
+{
+ if (!s)
+ return;
+
+ if (s->progs)
+ bpf_object__detach_skeleton(s);
+ if (s->obj)
+ bpf_object__close(*s->obj);
+ free(s->maps);
+ free(s->progs);
+ free(s);
+}
diff --git a/src/libbpf.h b/src/libbpf.h
new file mode 100644
index 0000000..eee883f
--- /dev/null
+++ b/src/libbpf.h
@@ -0,0 +1,1529 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+/*
+ * Common eBPF ELF object loading operations.
+ *
+ * Copyright (C) 2013-2015 Alexei Starovoitov <ast@kernel.org>
+ * Copyright (C) 2015 Wang Nan <wangnan0@huawei.com>
+ * Copyright (C) 2015 Huawei Inc.
+ */
+#ifndef __LIBBPF_LIBBPF_H
+#define __LIBBPF_LIBBPF_H
+
+#include <stdarg.h>
+#include <stdio.h>
+#include <stdint.h>
+#include <stdbool.h>
+#include <sys/types.h> // for size_t
+#include <linux/bpf.h>
+
+#include "libbpf_common.h"
+#include "libbpf_legacy.h"
+
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+LIBBPF_API __u32 libbpf_major_version(void);
+LIBBPF_API __u32 libbpf_minor_version(void);
+LIBBPF_API const char *libbpf_version_string(void);
+
+enum libbpf_errno {
+ __LIBBPF_ERRNO__START = 4000,
+
+ /* Something wrong in libelf */
+ LIBBPF_ERRNO__LIBELF = __LIBBPF_ERRNO__START,
+ LIBBPF_ERRNO__FORMAT, /* BPF object format invalid */
+ LIBBPF_ERRNO__KVERSION, /* Incorrect or no 'version' section */
+ LIBBPF_ERRNO__ENDIAN, /* Endian mismatch */
+ LIBBPF_ERRNO__INTERNAL, /* Internal error in libbpf */
+ LIBBPF_ERRNO__RELOC, /* Relocation failed */
+ LIBBPF_ERRNO__LOAD, /* Load program failure for unknown reason */
+ LIBBPF_ERRNO__VERIFY, /* Kernel verifier blocks program loading */
+ LIBBPF_ERRNO__PROG2BIG, /* Program too big */
+ LIBBPF_ERRNO__KVER, /* Incorrect kernel version */
+ LIBBPF_ERRNO__PROGTYPE, /* Kernel doesn't support this program type */
+ LIBBPF_ERRNO__WRNGPID, /* Wrong pid in netlink message */
+ LIBBPF_ERRNO__INVSEQ, /* Invalid netlink sequence */
+ LIBBPF_ERRNO__NLPARSE, /* netlink parsing error */
+ __LIBBPF_ERRNO__END,
+};
+
+LIBBPF_API int libbpf_strerror(int err, char *buf, size_t size);
+
+/**
+ * @brief **libbpf_bpf_attach_type_str()** converts the provided attach type
+ * value into a textual representation.
+ * @param t The attach type.
+ * @return Pointer to a static string identifying the attach type. NULL is
+ * returned for unknown **bpf_attach_type** values.
+ */
+LIBBPF_API const char *libbpf_bpf_attach_type_str(enum bpf_attach_type t);
+
+/**
+ * @brief **libbpf_bpf_link_type_str()** converts the provided link type value
+ * into a textual representation.
+ * @param t The link type.
+ * @return Pointer to a static string identifying the link type. NULL is
+ * returned for unknown **bpf_link_type** values.
+ */
+LIBBPF_API const char *libbpf_bpf_link_type_str(enum bpf_link_type t);
+
+/**
+ * @brief **libbpf_bpf_map_type_str()** converts the provided map type value
+ * into a textual representation.
+ * @param t The map type.
+ * @return Pointer to a static string identifying the map type. NULL is
+ * returned for unknown **bpf_map_type** values.
+ */
+LIBBPF_API const char *libbpf_bpf_map_type_str(enum bpf_map_type t);
+
+/**
+ * @brief **libbpf_bpf_prog_type_str()** converts the provided program type
+ * value into a textual representation.
+ * @param t The program type.
+ * @return Pointer to a static string identifying the program type. NULL is
+ * returned for unknown **bpf_prog_type** values.
+ */
+LIBBPF_API const char *libbpf_bpf_prog_type_str(enum bpf_prog_type t);
+
+enum libbpf_print_level {
+ LIBBPF_WARN,
+ LIBBPF_INFO,
+ LIBBPF_DEBUG,
+};
+
+typedef int (*libbpf_print_fn_t)(enum libbpf_print_level level,
+ const char *, va_list ap);
+
+LIBBPF_API libbpf_print_fn_t libbpf_set_print(libbpf_print_fn_t fn);
+
+/* Hide internal to user */
+struct bpf_object;
+
+struct bpf_object_open_opts {
+ /* size of this struct, for forward/backward compatibility */
+ size_t sz;
+ /* object name override, if provided:
+ * - for object open from file, this will override setting object
+ * name from file path's base name;
+ * - for object open from memory buffer, this will specify an object
+ * name and will override default "<addr>-<buf-size>" name;
+ */
+ const char *object_name;
+ /* parse map definitions non-strictly, allowing extra attributes/data */
+ bool relaxed_maps;
+ /* maps that set the 'pinning' attribute in their definition will have
+ * their pin_path attribute set to a file in this directory, and be
+ * auto-pinned to that path on load; defaults to "/sys/fs/bpf".
+ */
+ const char *pin_root_path;
+
+ __u32 :32; /* stub out now removed attach_prog_fd */
+
+ /* Additional kernel config content that augments and overrides
+ * system Kconfig for CONFIG_xxx externs.
+ */
+ const char *kconfig;
+ /* Path to the custom BTF to be used for BPF CO-RE relocations.
+ * This custom BTF completely replaces the use of vmlinux BTF
+ * for the purpose of CO-RE relocations.
+ * NOTE: any other BPF feature (e.g., fentry/fexit programs,
+ * struct_ops, etc) will need actual kernel BTF at /sys/kernel/btf/vmlinux.
+ */
+ const char *btf_custom_path;
+ /* Pointer to a buffer for storing kernel logs for applicable BPF
+ * commands. Valid kernel_log_size has to be specified as well and are
+ * passed-through to bpf() syscall. Keep in mind that kernel might
+ * fail operation with -ENOSPC error if provided buffer is too small
+ * to contain entire log output.
+ * See the comment below for kernel_log_level for interaction between
+ * log_buf and log_level settings.
+ *
+ * If specified, this log buffer will be passed for:
+ * - each BPF progral load (BPF_PROG_LOAD) attempt, unless overriden
+ * with bpf_program__set_log() on per-program level, to get
+ * BPF verifier log output.
+ * - during BPF object's BTF load into kernel (BPF_BTF_LOAD) to get
+ * BTF sanity checking log.
+ *
+ * Each BPF command (BPF_BTF_LOAD or BPF_PROG_LOAD) will overwrite
+ * previous contents, so if you need more fine-grained control, set
+ * per-program buffer with bpf_program__set_log_buf() to preserve each
+ * individual program's verification log. Keep using kernel_log_buf
+ * for BTF verification log, if necessary.
+ */
+ char *kernel_log_buf;
+ size_t kernel_log_size;
+ /*
+ * Log level can be set independently from log buffer. Log_level=0
+ * means that libbpf will attempt loading BTF or program without any
+ * logging requested, but will retry with either its own or custom log
+ * buffer, if provided, and log_level=1 on any error.
+ * And vice versa, setting log_level>0 will request BTF or prog
+ * loading with verbose log from the first attempt (and as such also
+ * for successfully loaded BTF or program), and the actual log buffer
+ * could be either libbpf's own auto-allocated log buffer, if
+ * kernel_log_buffer is NULL, or user-provided custom kernel_log_buf.
+ * If user didn't provide custom log buffer, libbpf will emit captured
+ * logs through its print callback.
+ */
+ __u32 kernel_log_level;
+
+ size_t :0;
+};
+#define bpf_object_open_opts__last_field kernel_log_level
+
+LIBBPF_API struct bpf_object *bpf_object__open(const char *path);
+
+/**
+ * @brief **bpf_object__open_file()** creates a bpf_object by opening
+ * the BPF ELF object file pointed to by the passed path and loading it
+ * into memory.
+ * @param path BPF object file path
+ * @param opts options for how to load the bpf object, this parameter is
+ * optional and can be set to NULL
+ * @return pointer to the new bpf_object; or NULL is returned on error,
+ * error code is stored in errno
+ */
+LIBBPF_API struct bpf_object *
+bpf_object__open_file(const char *path, const struct bpf_object_open_opts *opts);
+
+/**
+ * @brief **bpf_object__open_mem()** creates a bpf_object by reading
+ * the BPF objects raw bytes from a memory buffer containing a valid
+ * BPF ELF object file.
+ * @param obj_buf pointer to the buffer containing ELF file bytes
+ * @param obj_buf_sz number of bytes in the buffer
+ * @param opts options for how to load the bpf object
+ * @return pointer to the new bpf_object; or NULL is returned on error,
+ * error code is stored in errno
+ */
+LIBBPF_API struct bpf_object *
+bpf_object__open_mem(const void *obj_buf, size_t obj_buf_sz,
+ const struct bpf_object_open_opts *opts);
+
+/* Load/unload object into/from kernel */
+LIBBPF_API int bpf_object__load(struct bpf_object *obj);
+
+LIBBPF_API void bpf_object__close(struct bpf_object *object);
+
+/* pin_maps and unpin_maps can both be called with a NULL path, in which case
+ * they will use the pin_path attribute of each map (and ignore all maps that
+ * don't have a pin_path set).
+ */
+LIBBPF_API int bpf_object__pin_maps(struct bpf_object *obj, const char *path);
+LIBBPF_API int bpf_object__unpin_maps(struct bpf_object *obj,
+ const char *path);
+LIBBPF_API int bpf_object__pin_programs(struct bpf_object *obj,
+ const char *path);
+LIBBPF_API int bpf_object__unpin_programs(struct bpf_object *obj,
+ const char *path);
+LIBBPF_API int bpf_object__pin(struct bpf_object *object, const char *path);
+
+LIBBPF_API const char *bpf_object__name(const struct bpf_object *obj);
+LIBBPF_API unsigned int bpf_object__kversion(const struct bpf_object *obj);
+LIBBPF_API int bpf_object__set_kversion(struct bpf_object *obj, __u32 kern_version);
+
+struct btf;
+LIBBPF_API struct btf *bpf_object__btf(const struct bpf_object *obj);
+LIBBPF_API int bpf_object__btf_fd(const struct bpf_object *obj);
+
+LIBBPF_API struct bpf_program *
+bpf_object__find_program_by_name(const struct bpf_object *obj,
+ const char *name);
+
+LIBBPF_API int
+libbpf_prog_type_by_name(const char *name, enum bpf_prog_type *prog_type,
+ enum bpf_attach_type *expected_attach_type);
+LIBBPF_API int libbpf_attach_type_by_name(const char *name,
+ enum bpf_attach_type *attach_type);
+LIBBPF_API int libbpf_find_vmlinux_btf_id(const char *name,
+ enum bpf_attach_type attach_type);
+
+/* Accessors of bpf_program */
+struct bpf_program;
+
+LIBBPF_API struct bpf_program *
+bpf_object__next_program(const struct bpf_object *obj, struct bpf_program *prog);
+
+#define bpf_object__for_each_program(pos, obj) \
+ for ((pos) = bpf_object__next_program((obj), NULL); \
+ (pos) != NULL; \
+ (pos) = bpf_object__next_program((obj), (pos)))
+
+LIBBPF_API struct bpf_program *
+bpf_object__prev_program(const struct bpf_object *obj, struct bpf_program *prog);
+
+LIBBPF_API void bpf_program__set_ifindex(struct bpf_program *prog,
+ __u32 ifindex);
+
+LIBBPF_API const char *bpf_program__name(const struct bpf_program *prog);
+LIBBPF_API const char *bpf_program__section_name(const struct bpf_program *prog);
+LIBBPF_API bool bpf_program__autoload(const struct bpf_program *prog);
+LIBBPF_API int bpf_program__set_autoload(struct bpf_program *prog, bool autoload);
+LIBBPF_API bool bpf_program__autoattach(const struct bpf_program *prog);
+LIBBPF_API void bpf_program__set_autoattach(struct bpf_program *prog, bool autoattach);
+
+struct bpf_insn;
+
+/**
+ * @brief **bpf_program__insns()** gives read-only access to BPF program's
+ * underlying BPF instructions.
+ * @param prog BPF program for which to return instructions
+ * @return a pointer to an array of BPF instructions that belong to the
+ * specified BPF program
+ *
+ * Returned pointer is always valid and not NULL. Number of `struct bpf_insn`
+ * pointed to can be fetched using **bpf_program__insn_cnt()** API.
+ *
+ * Keep in mind, libbpf can modify and append/delete BPF program's
+ * instructions as it processes BPF object file and prepares everything for
+ * uploading into the kernel. So depending on the point in BPF object
+ * lifetime, **bpf_program__insns()** can return different sets of
+ * instructions. As an example, during BPF object load phase BPF program
+ * instructions will be CO-RE-relocated, BPF subprograms instructions will be
+ * appended, ldimm64 instructions will have FDs embedded, etc. So instructions
+ * returned before **bpf_object__load()** and after it might be quite
+ * different.
+ */
+LIBBPF_API const struct bpf_insn *bpf_program__insns(const struct bpf_program *prog);
+
+/**
+ * @brief **bpf_program__set_insns()** can set BPF program's underlying
+ * BPF instructions.
+ *
+ * WARNING: This is a very advanced libbpf API and users need to know
+ * what they are doing. This should be used from prog_prepare_load_fn
+ * callback only.
+ *
+ * @param prog BPF program for which to return instructions
+ * @param new_insns a pointer to an array of BPF instructions
+ * @param new_insn_cnt number of `struct bpf_insn`'s that form
+ * specified BPF program
+ * @return 0, on success; negative error code, otherwise
+ */
+LIBBPF_API int bpf_program__set_insns(struct bpf_program *prog,
+ struct bpf_insn *new_insns, size_t new_insn_cnt);
+
+/**
+ * @brief **bpf_program__insn_cnt()** returns number of `struct bpf_insn`'s
+ * that form specified BPF program.
+ * @param prog BPF program for which to return number of BPF instructions
+ *
+ * See **bpf_program__insns()** documentation for notes on how libbpf can
+ * change instructions and their count during different phases of
+ * **bpf_object** lifetime.
+ */
+LIBBPF_API size_t bpf_program__insn_cnt(const struct bpf_program *prog);
+
+LIBBPF_API int bpf_program__fd(const struct bpf_program *prog);
+
+/**
+ * @brief **bpf_program__pin()** pins the BPF program to a file
+ * in the BPF FS specified by a path. This increments the programs
+ * reference count, allowing it to stay loaded after the process
+ * which loaded it has exited.
+ *
+ * @param prog BPF program to pin, must already be loaded
+ * @param path file path in a BPF file system
+ * @return 0, on success; negative error code, otherwise
+ */
+LIBBPF_API int bpf_program__pin(struct bpf_program *prog, const char *path);
+
+/**
+ * @brief **bpf_program__unpin()** unpins the BPF program from a file
+ * in the BPFFS specified by a path. This decrements the programs
+ * reference count.
+ *
+ * The file pinning the BPF program can also be unlinked by a different
+ * process in which case this function will return an error.
+ *
+ * @param prog BPF program to unpin
+ * @param path file path to the pin in a BPF file system
+ * @return 0, on success; negative error code, otherwise
+ */
+LIBBPF_API int bpf_program__unpin(struct bpf_program *prog, const char *path);
+LIBBPF_API void bpf_program__unload(struct bpf_program *prog);
+
+struct bpf_link;
+
+LIBBPF_API struct bpf_link *bpf_link__open(const char *path);
+LIBBPF_API int bpf_link__fd(const struct bpf_link *link);
+LIBBPF_API const char *bpf_link__pin_path(const struct bpf_link *link);
+/**
+ * @brief **bpf_link__pin()** pins the BPF link to a file
+ * in the BPF FS specified by a path. This increments the links
+ * reference count, allowing it to stay loaded after the process
+ * which loaded it has exited.
+ *
+ * @param link BPF link to pin, must already be loaded
+ * @param path file path in a BPF file system
+ * @return 0, on success; negative error code, otherwise
+ */
+
+LIBBPF_API int bpf_link__pin(struct bpf_link *link, const char *path);
+
+/**
+ * @brief **bpf_link__unpin()** unpins the BPF link from a file
+ * in the BPFFS specified by a path. This decrements the links
+ * reference count.
+ *
+ * The file pinning the BPF link can also be unlinked by a different
+ * process in which case this function will return an error.
+ *
+ * @param prog BPF program to unpin
+ * @param path file path to the pin in a BPF file system
+ * @return 0, on success; negative error code, otherwise
+ */
+LIBBPF_API int bpf_link__unpin(struct bpf_link *link);
+LIBBPF_API int bpf_link__update_program(struct bpf_link *link,
+ struct bpf_program *prog);
+LIBBPF_API void bpf_link__disconnect(struct bpf_link *link);
+LIBBPF_API int bpf_link__detach(struct bpf_link *link);
+LIBBPF_API int bpf_link__destroy(struct bpf_link *link);
+
+/**
+ * @brief **bpf_program__attach()** is a generic function for attaching
+ * a BPF program based on auto-detection of program type, attach type,
+ * and extra paremeters, where applicable.
+ *
+ * @param prog BPF program to attach
+ * @return Reference to the newly created BPF link; or NULL is returned on error,
+ * error code is stored in errno
+ *
+ * This is supported for:
+ * - kprobe/kretprobe (depends on SEC() definition)
+ * - uprobe/uretprobe (depends on SEC() definition)
+ * - tracepoint
+ * - raw tracepoint
+ * - tracing programs (typed raw TP/fentry/fexit/fmod_ret)
+ */
+LIBBPF_API struct bpf_link *
+bpf_program__attach(const struct bpf_program *prog);
+
+struct bpf_perf_event_opts {
+ /* size of this struct, for forward/backward compatiblity */
+ size_t sz;
+ /* custom user-provided value fetchable through bpf_get_attach_cookie() */
+ __u64 bpf_cookie;
+};
+#define bpf_perf_event_opts__last_field bpf_cookie
+
+LIBBPF_API struct bpf_link *
+bpf_program__attach_perf_event(const struct bpf_program *prog, int pfd);
+
+LIBBPF_API struct bpf_link *
+bpf_program__attach_perf_event_opts(const struct bpf_program *prog, int pfd,
+ const struct bpf_perf_event_opts *opts);
+
+struct bpf_kprobe_opts {
+ /* size of this struct, for forward/backward compatiblity */
+ size_t sz;
+ /* custom user-provided value fetchable through bpf_get_attach_cookie() */
+ __u64 bpf_cookie;
+ /* function's offset to install kprobe to */
+ size_t offset;
+ /* kprobe is return probe */
+ bool retprobe;
+ size_t :0;
+};
+#define bpf_kprobe_opts__last_field retprobe
+
+LIBBPF_API struct bpf_link *
+bpf_program__attach_kprobe(const struct bpf_program *prog, bool retprobe,
+ const char *func_name);
+LIBBPF_API struct bpf_link *
+bpf_program__attach_kprobe_opts(const struct bpf_program *prog,
+ const char *func_name,
+ const struct bpf_kprobe_opts *opts);
+
+struct bpf_kprobe_multi_opts {
+ /* size of this struct, for forward/backward compatibility */
+ size_t sz;
+ /* array of function symbols to attach */
+ const char **syms;
+ /* array of function addresses to attach */
+ const unsigned long *addrs;
+ /* array of user-provided values fetchable through bpf_get_attach_cookie */
+ const __u64 *cookies;
+ /* number of elements in syms/addrs/cookies arrays */
+ size_t cnt;
+ /* create return kprobes */
+ bool retprobe;
+ size_t :0;
+};
+
+#define bpf_kprobe_multi_opts__last_field retprobe
+
+LIBBPF_API struct bpf_link *
+bpf_program__attach_kprobe_multi_opts(const struct bpf_program *prog,
+ const char *pattern,
+ const struct bpf_kprobe_multi_opts *opts);
+
+struct bpf_ksyscall_opts {
+ /* size of this struct, for forward/backward compatiblity */
+ size_t sz;
+ /* custom user-provided value fetchable through bpf_get_attach_cookie() */
+ __u64 bpf_cookie;
+ /* attach as return probe? */
+ bool retprobe;
+ size_t :0;
+};
+#define bpf_ksyscall_opts__last_field retprobe
+
+/**
+ * @brief **bpf_program__attach_ksyscall()** attaches a BPF program
+ * to kernel syscall handler of a specified syscall. Optionally it's possible
+ * to request to install retprobe that will be triggered at syscall exit. It's
+ * also possible to associate BPF cookie (though options).
+ *
+ * Libbpf automatically will determine correct full kernel function name,
+ * which depending on system architecture and kernel version/configuration
+ * could be of the form __<arch>_sys_<syscall> or __se_sys_<syscall>, and will
+ * attach specified program using kprobe/kretprobe mechanism.
+ *
+ * **bpf_program__attach_ksyscall()** is an API counterpart of declarative
+ * **SEC("ksyscall/<syscall>")** annotation of BPF programs.
+ *
+ * At the moment **SEC("ksyscall")** and **bpf_program__attach_ksyscall()** do
+ * not handle all the calling convention quirks for mmap(), clone() and compat
+ * syscalls. It also only attaches to "native" syscall interfaces. If host
+ * system supports compat syscalls or defines 32-bit syscalls in 64-bit
+ * kernel, such syscall interfaces won't be attached to by libbpf.
+ *
+ * These limitations may or may not change in the future. Therefore it is
+ * recommended to use SEC("kprobe") for these syscalls or if working with
+ * compat and 32-bit interfaces is required.
+ *
+ * @param prog BPF program to attach
+ * @param syscall_name Symbolic name of the syscall (e.g., "bpf")
+ * @param opts Additional options (see **struct bpf_ksyscall_opts**)
+ * @return Reference to the newly created BPF link; or NULL is returned on
+ * error, error code is stored in errno
+ */
+LIBBPF_API struct bpf_link *
+bpf_program__attach_ksyscall(const struct bpf_program *prog,
+ const char *syscall_name,
+ const struct bpf_ksyscall_opts *opts);
+
+struct bpf_uprobe_opts {
+ /* size of this struct, for forward/backward compatiblity */
+ size_t sz;
+ /* offset of kernel reference counted USDT semaphore, added in
+ * a6ca88b241d5 ("trace_uprobe: support reference counter in fd-based uprobe")
+ */
+ size_t ref_ctr_offset;
+ /* custom user-provided value fetchable through bpf_get_attach_cookie() */
+ __u64 bpf_cookie;
+ /* uprobe is return probe, invoked at function return time */
+ bool retprobe;
+ /* Function name to attach to. Could be an unqualified ("abc") or library-qualified
+ * "abc@LIBXYZ" name. To specify function entry, func_name should be set while
+ * func_offset argument to bpf_prog__attach_uprobe_opts() should be 0. To trace an
+ * offset within a function, specify func_name and use func_offset argument to specify
+ * offset within the function. Shared library functions must specify the shared library
+ * binary_path.
+ */
+ const char *func_name;
+ size_t :0;
+};
+#define bpf_uprobe_opts__last_field func_name
+
+/**
+ * @brief **bpf_program__attach_uprobe()** attaches a BPF program
+ * to the userspace function which is found by binary path and
+ * offset. You can optionally specify a particular proccess to attach
+ * to. You can also optionally attach the program to the function
+ * exit instead of entry.
+ *
+ * @param prog BPF program to attach
+ * @param retprobe Attach to function exit
+ * @param pid Process ID to attach the uprobe to, 0 for self (own process),
+ * -1 for all processes
+ * @param binary_path Path to binary that contains the function symbol
+ * @param func_offset Offset within the binary of the function symbol
+ * @return Reference to the newly created BPF link; or NULL is returned on error,
+ * error code is stored in errno
+ */
+LIBBPF_API struct bpf_link *
+bpf_program__attach_uprobe(const struct bpf_program *prog, bool retprobe,
+ pid_t pid, const char *binary_path,
+ size_t func_offset);
+
+/**
+ * @brief **bpf_program__attach_uprobe_opts()** is just like
+ * bpf_program__attach_uprobe() except with a options struct
+ * for various configurations.
+ *
+ * @param prog BPF program to attach
+ * @param pid Process ID to attach the uprobe to, 0 for self (own process),
+ * -1 for all processes
+ * @param binary_path Path to binary that contains the function symbol
+ * @param func_offset Offset within the binary of the function symbol
+ * @param opts Options for altering program attachment
+ * @return Reference to the newly created BPF link; or NULL is returned on error,
+ * error code is stored in errno
+ */
+LIBBPF_API struct bpf_link *
+bpf_program__attach_uprobe_opts(const struct bpf_program *prog, pid_t pid,
+ const char *binary_path, size_t func_offset,
+ const struct bpf_uprobe_opts *opts);
+
+struct bpf_usdt_opts {
+ /* size of this struct, for forward/backward compatibility */
+ size_t sz;
+ /* custom user-provided value accessible through usdt_cookie() */
+ __u64 usdt_cookie;
+ size_t :0;
+};
+#define bpf_usdt_opts__last_field usdt_cookie
+
+/**
+ * @brief **bpf_program__attach_usdt()** is just like
+ * bpf_program__attach_uprobe_opts() except it covers USDT (User-space
+ * Statically Defined Tracepoint) attachment, instead of attaching to
+ * user-space function entry or exit.
+ *
+ * @param prog BPF program to attach
+ * @param pid Process ID to attach the uprobe to, 0 for self (own process),
+ * -1 for all processes
+ * @param binary_path Path to binary that contains provided USDT probe
+ * @param usdt_provider USDT provider name
+ * @param usdt_name USDT probe name
+ * @param opts Options for altering program attachment
+ * @return Reference to the newly created BPF link; or NULL is returned on error,
+ * error code is stored in errno
+ */
+LIBBPF_API struct bpf_link *
+bpf_program__attach_usdt(const struct bpf_program *prog,
+ pid_t pid, const char *binary_path,
+ const char *usdt_provider, const char *usdt_name,
+ const struct bpf_usdt_opts *opts);
+
+struct bpf_tracepoint_opts {
+ /* size of this struct, for forward/backward compatiblity */
+ size_t sz;
+ /* custom user-provided value fetchable through bpf_get_attach_cookie() */
+ __u64 bpf_cookie;
+};
+#define bpf_tracepoint_opts__last_field bpf_cookie
+
+LIBBPF_API struct bpf_link *
+bpf_program__attach_tracepoint(const struct bpf_program *prog,
+ const char *tp_category,
+ const char *tp_name);
+LIBBPF_API struct bpf_link *
+bpf_program__attach_tracepoint_opts(const struct bpf_program *prog,
+ const char *tp_category,
+ const char *tp_name,
+ const struct bpf_tracepoint_opts *opts);
+
+LIBBPF_API struct bpf_link *
+bpf_program__attach_raw_tracepoint(const struct bpf_program *prog,
+ const char *tp_name);
+
+struct bpf_trace_opts {
+ /* size of this struct, for forward/backward compatibility */
+ size_t sz;
+ /* custom user-provided value fetchable through bpf_get_attach_cookie() */
+ __u64 cookie;
+};
+#define bpf_trace_opts__last_field cookie
+
+LIBBPF_API struct bpf_link *
+bpf_program__attach_trace(const struct bpf_program *prog);
+LIBBPF_API struct bpf_link *
+bpf_program__attach_trace_opts(const struct bpf_program *prog, const struct bpf_trace_opts *opts);
+
+LIBBPF_API struct bpf_link *
+bpf_program__attach_lsm(const struct bpf_program *prog);
+LIBBPF_API struct bpf_link *
+bpf_program__attach_cgroup(const struct bpf_program *prog, int cgroup_fd);
+LIBBPF_API struct bpf_link *
+bpf_program__attach_netns(const struct bpf_program *prog, int netns_fd);
+LIBBPF_API struct bpf_link *
+bpf_program__attach_xdp(const struct bpf_program *prog, int ifindex);
+LIBBPF_API struct bpf_link *
+bpf_program__attach_freplace(const struct bpf_program *prog,
+ int target_fd, const char *attach_func_name);
+
+struct bpf_map;
+
+LIBBPF_API struct bpf_link *bpf_map__attach_struct_ops(const struct bpf_map *map);
+
+struct bpf_iter_attach_opts {
+ size_t sz; /* size of this struct for forward/backward compatibility */
+ union bpf_iter_link_info *link_info;
+ __u32 link_info_len;
+};
+#define bpf_iter_attach_opts__last_field link_info_len
+
+LIBBPF_API struct bpf_link *
+bpf_program__attach_iter(const struct bpf_program *prog,
+ const struct bpf_iter_attach_opts *opts);
+
+LIBBPF_API enum bpf_prog_type bpf_program__type(const struct bpf_program *prog);
+
+/**
+ * @brief **bpf_program__set_type()** sets the program
+ * type of the passed BPF program.
+ * @param prog BPF program to set the program type for
+ * @param type program type to set the BPF map to have
+ * @return error code; or 0 if no error. An error occurs
+ * if the object is already loaded.
+ *
+ * This must be called before the BPF object is loaded,
+ * otherwise it has no effect and an error is returned.
+ */
+LIBBPF_API int bpf_program__set_type(struct bpf_program *prog,
+ enum bpf_prog_type type);
+
+LIBBPF_API enum bpf_attach_type
+bpf_program__expected_attach_type(const struct bpf_program *prog);
+
+/**
+ * @brief **bpf_program__set_expected_attach_type()** sets the
+ * attach type of the passed BPF program. This is used for
+ * auto-detection of attachment when programs are loaded.
+ * @param prog BPF program to set the attach type for
+ * @param type attach type to set the BPF map to have
+ * @return error code; or 0 if no error. An error occurs
+ * if the object is already loaded.
+ *
+ * This must be called before the BPF object is loaded,
+ * otherwise it has no effect and an error is returned.
+ */
+LIBBPF_API int
+bpf_program__set_expected_attach_type(struct bpf_program *prog,
+ enum bpf_attach_type type);
+
+LIBBPF_API __u32 bpf_program__flags(const struct bpf_program *prog);
+LIBBPF_API int bpf_program__set_flags(struct bpf_program *prog, __u32 flags);
+
+/* Per-program log level and log buffer getters/setters.
+ * See bpf_object_open_opts comments regarding log_level and log_buf
+ * interactions.
+ */
+LIBBPF_API __u32 bpf_program__log_level(const struct bpf_program *prog);
+LIBBPF_API int bpf_program__set_log_level(struct bpf_program *prog, __u32 log_level);
+LIBBPF_API const char *bpf_program__log_buf(const struct bpf_program *prog, size_t *log_size);
+LIBBPF_API int bpf_program__set_log_buf(struct bpf_program *prog, char *log_buf, size_t log_size);
+
+/**
+ * @brief **bpf_program__set_attach_target()** sets BTF-based attach target
+ * for supported BPF program types:
+ * - BTF-aware raw tracepoints (tp_btf);
+ * - fentry/fexit/fmod_ret;
+ * - lsm;
+ * - freplace.
+ * @param prog BPF program to set the attach type for
+ * @param type attach type to set the BPF map to have
+ * @return error code; or 0 if no error occurred.
+ */
+LIBBPF_API int
+bpf_program__set_attach_target(struct bpf_program *prog, int attach_prog_fd,
+ const char *attach_func_name);
+
+/**
+ * @brief **bpf_object__find_map_by_name()** returns BPF map of
+ * the given name, if it exists within the passed BPF object
+ * @param obj BPF object
+ * @param name name of the BPF map
+ * @return BPF map instance, if such map exists within the BPF object;
+ * or NULL otherwise.
+ */
+LIBBPF_API struct bpf_map *
+bpf_object__find_map_by_name(const struct bpf_object *obj, const char *name);
+
+LIBBPF_API int
+bpf_object__find_map_fd_by_name(const struct bpf_object *obj, const char *name);
+
+LIBBPF_API struct bpf_map *
+bpf_object__next_map(const struct bpf_object *obj, const struct bpf_map *map);
+
+#define bpf_object__for_each_map(pos, obj) \
+ for ((pos) = bpf_object__next_map((obj), NULL); \
+ (pos) != NULL; \
+ (pos) = bpf_object__next_map((obj), (pos)))
+#define bpf_map__for_each bpf_object__for_each_map
+
+LIBBPF_API struct bpf_map *
+bpf_object__prev_map(const struct bpf_object *obj, const struct bpf_map *map);
+
+/**
+ * @brief **bpf_map__set_autocreate()** sets whether libbpf has to auto-create
+ * BPF map during BPF object load phase.
+ * @param map the BPF map instance
+ * @param autocreate whether to create BPF map during BPF object load
+ * @return 0 on success; -EBUSY if BPF object was already loaded
+ *
+ * **bpf_map__set_autocreate()** allows to opt-out from libbpf auto-creating
+ * BPF map. By default, libbpf will attempt to create every single BPF map
+ * defined in BPF object file using BPF_MAP_CREATE command of bpf() syscall
+ * and fill in map FD in BPF instructions.
+ *
+ * This API allows to opt-out of this process for specific map instance. This
+ * can be useful if host kernel doesn't support such BPF map type or used
+ * combination of flags and user application wants to avoid creating such
+ * a map in the first place. User is still responsible to make sure that their
+ * BPF-side code that expects to use such missing BPF map is recognized by BPF
+ * verifier as dead code, otherwise BPF verifier will reject such BPF program.
+ */
+LIBBPF_API int bpf_map__set_autocreate(struct bpf_map *map, bool autocreate);
+LIBBPF_API bool bpf_map__autocreate(const struct bpf_map *map);
+
+/**
+ * @brief **bpf_map__fd()** gets the file descriptor of the passed
+ * BPF map
+ * @param map the BPF map instance
+ * @return the file descriptor; or -EINVAL in case of an error
+ */
+LIBBPF_API int bpf_map__fd(const struct bpf_map *map);
+LIBBPF_API int bpf_map__reuse_fd(struct bpf_map *map, int fd);
+/* get map name */
+LIBBPF_API const char *bpf_map__name(const struct bpf_map *map);
+/* get/set map type */
+LIBBPF_API enum bpf_map_type bpf_map__type(const struct bpf_map *map);
+LIBBPF_API int bpf_map__set_type(struct bpf_map *map, enum bpf_map_type type);
+/* get/set map size (max_entries) */
+LIBBPF_API __u32 bpf_map__max_entries(const struct bpf_map *map);
+LIBBPF_API int bpf_map__set_max_entries(struct bpf_map *map, __u32 max_entries);
+/* get/set map flags */
+LIBBPF_API __u32 bpf_map__map_flags(const struct bpf_map *map);
+LIBBPF_API int bpf_map__set_map_flags(struct bpf_map *map, __u32 flags);
+/* get/set map NUMA node */
+LIBBPF_API __u32 bpf_map__numa_node(const struct bpf_map *map);
+LIBBPF_API int bpf_map__set_numa_node(struct bpf_map *map, __u32 numa_node);
+/* get/set map key size */
+LIBBPF_API __u32 bpf_map__key_size(const struct bpf_map *map);
+LIBBPF_API int bpf_map__set_key_size(struct bpf_map *map, __u32 size);
+/* get/set map value size */
+LIBBPF_API __u32 bpf_map__value_size(const struct bpf_map *map);
+LIBBPF_API int bpf_map__set_value_size(struct bpf_map *map, __u32 size);
+/* get map key/value BTF type IDs */
+LIBBPF_API __u32 bpf_map__btf_key_type_id(const struct bpf_map *map);
+LIBBPF_API __u32 bpf_map__btf_value_type_id(const struct bpf_map *map);
+/* get/set map if_index */
+LIBBPF_API __u32 bpf_map__ifindex(const struct bpf_map *map);
+LIBBPF_API int bpf_map__set_ifindex(struct bpf_map *map, __u32 ifindex);
+/* get/set map map_extra flags */
+LIBBPF_API __u64 bpf_map__map_extra(const struct bpf_map *map);
+LIBBPF_API int bpf_map__set_map_extra(struct bpf_map *map, __u64 map_extra);
+
+LIBBPF_API int bpf_map__set_initial_value(struct bpf_map *map,
+ const void *data, size_t size);
+LIBBPF_API const void *bpf_map__initial_value(struct bpf_map *map, size_t *psize);
+
+/**
+ * @brief **bpf_map__is_internal()** tells the caller whether or not the
+ * passed map is a special map created by libbpf automatically for things like
+ * global variables, __ksym externs, Kconfig values, etc
+ * @param map the bpf_map
+ * @return true, if the map is an internal map; false, otherwise
+ */
+LIBBPF_API bool bpf_map__is_internal(const struct bpf_map *map);
+LIBBPF_API int bpf_map__set_pin_path(struct bpf_map *map, const char *path);
+LIBBPF_API const char *bpf_map__pin_path(const struct bpf_map *map);
+LIBBPF_API bool bpf_map__is_pinned(const struct bpf_map *map);
+LIBBPF_API int bpf_map__pin(struct bpf_map *map, const char *path);
+LIBBPF_API int bpf_map__unpin(struct bpf_map *map, const char *path);
+
+LIBBPF_API int bpf_map__set_inner_map_fd(struct bpf_map *map, int fd);
+LIBBPF_API struct bpf_map *bpf_map__inner_map(struct bpf_map *map);
+
+/**
+ * @brief **bpf_map__lookup_elem()** allows to lookup BPF map value
+ * corresponding to provided key.
+ * @param map BPF map to lookup element in
+ * @param key pointer to memory containing bytes of the key used for lookup
+ * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size**
+ * @param value pointer to memory in which looked up value will be stored
+ * @param value_sz size in byte of value data memory; it has to match BPF map
+ * definition's **value_size**. For per-CPU BPF maps value size has to be
+ * a product of BPF map value size and number of possible CPUs in the system
+ * (could be fetched with **libbpf_num_possible_cpus()**). Note also that for
+ * per-CPU values value size has to be aligned up to closest 8 bytes for
+ * alignment reasons, so expected size is: `round_up(value_size, 8)
+ * * libbpf_num_possible_cpus()`.
+ * @flags extra flags passed to kernel for this operation
+ * @return 0, on success; negative error, otherwise
+ *
+ * **bpf_map__lookup_elem()** is high-level equivalent of
+ * **bpf_map_lookup_elem()** API with added check for key and value size.
+ */
+LIBBPF_API int bpf_map__lookup_elem(const struct bpf_map *map,
+ const void *key, size_t key_sz,
+ void *value, size_t value_sz, __u64 flags);
+
+/**
+ * @brief **bpf_map__update_elem()** allows to insert or update value in BPF
+ * map that corresponds to provided key.
+ * @param map BPF map to insert to or update element in
+ * @param key pointer to memory containing bytes of the key
+ * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size**
+ * @param value pointer to memory containing bytes of the value
+ * @param value_sz size in byte of value data memory; it has to match BPF map
+ * definition's **value_size**. For per-CPU BPF maps value size has to be
+ * a product of BPF map value size and number of possible CPUs in the system
+ * (could be fetched with **libbpf_num_possible_cpus()**). Note also that for
+ * per-CPU values value size has to be aligned up to closest 8 bytes for
+ * alignment reasons, so expected size is: `round_up(value_size, 8)
+ * * libbpf_num_possible_cpus()`.
+ * @flags extra flags passed to kernel for this operation
+ * @return 0, on success; negative error, otherwise
+ *
+ * **bpf_map__update_elem()** is high-level equivalent of
+ * **bpf_map_update_elem()** API with added check for key and value size.
+ */
+LIBBPF_API int bpf_map__update_elem(const struct bpf_map *map,
+ const void *key, size_t key_sz,
+ const void *value, size_t value_sz, __u64 flags);
+
+/**
+ * @brief **bpf_map__delete_elem()** allows to delete element in BPF map that
+ * corresponds to provided key.
+ * @param map BPF map to delete element from
+ * @param key pointer to memory containing bytes of the key
+ * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size**
+ * @flags extra flags passed to kernel for this operation
+ * @return 0, on success; negative error, otherwise
+ *
+ * **bpf_map__delete_elem()** is high-level equivalent of
+ * **bpf_map_delete_elem()** API with added check for key size.
+ */
+LIBBPF_API int bpf_map__delete_elem(const struct bpf_map *map,
+ const void *key, size_t key_sz, __u64 flags);
+
+/**
+ * @brief **bpf_map__lookup_and_delete_elem()** allows to lookup BPF map value
+ * corresponding to provided key and atomically delete it afterwards.
+ * @param map BPF map to lookup element in
+ * @param key pointer to memory containing bytes of the key used for lookup
+ * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size**
+ * @param value pointer to memory in which looked up value will be stored
+ * @param value_sz size in byte of value data memory; it has to match BPF map
+ * definition's **value_size**. For per-CPU BPF maps value size has to be
+ * a product of BPF map value size and number of possible CPUs in the system
+ * (could be fetched with **libbpf_num_possible_cpus()**). Note also that for
+ * per-CPU values value size has to be aligned up to closest 8 bytes for
+ * alignment reasons, so expected size is: `round_up(value_size, 8)
+ * * libbpf_num_possible_cpus()`.
+ * @flags extra flags passed to kernel for this operation
+ * @return 0, on success; negative error, otherwise
+ *
+ * **bpf_map__lookup_and_delete_elem()** is high-level equivalent of
+ * **bpf_map_lookup_and_delete_elem()** API with added check for key and value size.
+ */
+LIBBPF_API int bpf_map__lookup_and_delete_elem(const struct bpf_map *map,
+ const void *key, size_t key_sz,
+ void *value, size_t value_sz, __u64 flags);
+
+/**
+ * @brief **bpf_map__get_next_key()** allows to iterate BPF map keys by
+ * fetching next key that follows current key.
+ * @param map BPF map to fetch next key from
+ * @param cur_key pointer to memory containing bytes of current key or NULL to
+ * fetch the first key
+ * @param next_key pointer to memory to write next key into
+ * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size**
+ * @return 0, on success; -ENOENT if **cur_key** is the last key in BPF map;
+ * negative error, otherwise
+ *
+ * **bpf_map__get_next_key()** is high-level equivalent of
+ * **bpf_map_get_next_key()** API with added check for key size.
+ */
+LIBBPF_API int bpf_map__get_next_key(const struct bpf_map *map,
+ const void *cur_key, void *next_key, size_t key_sz);
+
+struct bpf_xdp_set_link_opts {
+ size_t sz;
+ int old_fd;
+ size_t :0;
+};
+#define bpf_xdp_set_link_opts__last_field old_fd
+
+struct bpf_xdp_attach_opts {
+ size_t sz;
+ int old_prog_fd;
+ size_t :0;
+};
+#define bpf_xdp_attach_opts__last_field old_prog_fd
+
+struct bpf_xdp_query_opts {
+ size_t sz;
+ __u32 prog_id; /* output */
+ __u32 drv_prog_id; /* output */
+ __u32 hw_prog_id; /* output */
+ __u32 skb_prog_id; /* output */
+ __u8 attach_mode; /* output */
+ size_t :0;
+};
+#define bpf_xdp_query_opts__last_field attach_mode
+
+LIBBPF_API int bpf_xdp_attach(int ifindex, int prog_fd, __u32 flags,
+ const struct bpf_xdp_attach_opts *opts);
+LIBBPF_API int bpf_xdp_detach(int ifindex, __u32 flags,
+ const struct bpf_xdp_attach_opts *opts);
+LIBBPF_API int bpf_xdp_query(int ifindex, int flags, struct bpf_xdp_query_opts *opts);
+LIBBPF_API int bpf_xdp_query_id(int ifindex, int flags, __u32 *prog_id);
+
+/* TC related API */
+enum bpf_tc_attach_point {
+ BPF_TC_INGRESS = 1 << 0,
+ BPF_TC_EGRESS = 1 << 1,
+ BPF_TC_CUSTOM = 1 << 2,
+};
+
+#define BPF_TC_PARENT(a, b) \
+ ((((a) << 16) & 0xFFFF0000U) | ((b) & 0x0000FFFFU))
+
+enum bpf_tc_flags {
+ BPF_TC_F_REPLACE = 1 << 0,
+};
+
+struct bpf_tc_hook {
+ size_t sz;
+ int ifindex;
+ enum bpf_tc_attach_point attach_point;
+ __u32 parent;
+ size_t :0;
+};
+#define bpf_tc_hook__last_field parent
+
+struct bpf_tc_opts {
+ size_t sz;
+ int prog_fd;
+ __u32 flags;
+ __u32 prog_id;
+ __u32 handle;
+ __u32 priority;
+ size_t :0;
+};
+#define bpf_tc_opts__last_field priority
+
+LIBBPF_API int bpf_tc_hook_create(struct bpf_tc_hook *hook);
+LIBBPF_API int bpf_tc_hook_destroy(struct bpf_tc_hook *hook);
+LIBBPF_API int bpf_tc_attach(const struct bpf_tc_hook *hook,
+ struct bpf_tc_opts *opts);
+LIBBPF_API int bpf_tc_detach(const struct bpf_tc_hook *hook,
+ const struct bpf_tc_opts *opts);
+LIBBPF_API int bpf_tc_query(const struct bpf_tc_hook *hook,
+ struct bpf_tc_opts *opts);
+
+/* Ring buffer APIs */
+struct ring_buffer;
+struct user_ring_buffer;
+
+typedef int (*ring_buffer_sample_fn)(void *ctx, void *data, size_t size);
+
+struct ring_buffer_opts {
+ size_t sz; /* size of this struct, for forward/backward compatiblity */
+};
+
+#define ring_buffer_opts__last_field sz
+
+LIBBPF_API struct ring_buffer *
+ring_buffer__new(int map_fd, ring_buffer_sample_fn sample_cb, void *ctx,
+ const struct ring_buffer_opts *opts);
+LIBBPF_API void ring_buffer__free(struct ring_buffer *rb);
+LIBBPF_API int ring_buffer__add(struct ring_buffer *rb, int map_fd,
+ ring_buffer_sample_fn sample_cb, void *ctx);
+LIBBPF_API int ring_buffer__poll(struct ring_buffer *rb, int timeout_ms);
+LIBBPF_API int ring_buffer__consume(struct ring_buffer *rb);
+LIBBPF_API int ring_buffer__epoll_fd(const struct ring_buffer *rb);
+
+struct user_ring_buffer_opts {
+ size_t sz; /* size of this struct, for forward/backward compatibility */
+};
+
+#define user_ring_buffer_opts__last_field sz
+
+/* @brief **user_ring_buffer__new()** creates a new instance of a user ring
+ * buffer.
+ *
+ * @param map_fd A file descriptor to a BPF_MAP_TYPE_USER_RINGBUF map.
+ * @param opts Options for how the ring buffer should be created.
+ * @return A user ring buffer on success; NULL and errno being set on a
+ * failure.
+ */
+LIBBPF_API struct user_ring_buffer *
+user_ring_buffer__new(int map_fd, const struct user_ring_buffer_opts *opts);
+
+/* @brief **user_ring_buffer__reserve()** reserves a pointer to a sample in the
+ * user ring buffer.
+ * @param rb A pointer to a user ring buffer.
+ * @param size The size of the sample, in bytes.
+ * @return A pointer to an 8-byte aligned reserved region of the user ring
+ * buffer; NULL, and errno being set if a sample could not be reserved.
+ *
+ * This function is *not* thread safe, and callers must synchronize accessing
+ * this function if there are multiple producers. If a size is requested that
+ * is larger than the size of the entire ring buffer, errno will be set to
+ * E2BIG and NULL is returned. If the ring buffer could accommodate the size,
+ * but currently does not have enough space, errno is set to ENOSPC and NULL is
+ * returned.
+ *
+ * After initializing the sample, callers must invoke
+ * **user_ring_buffer__submit()** to post the sample to the kernel. Otherwise,
+ * the sample must be freed with **user_ring_buffer__discard()**.
+ */
+LIBBPF_API void *user_ring_buffer__reserve(struct user_ring_buffer *rb, __u32 size);
+
+/* @brief **user_ring_buffer__reserve_blocking()** reserves a record in the
+ * ring buffer, possibly blocking for up to @timeout_ms until a sample becomes
+ * available.
+ * @param rb The user ring buffer.
+ * @param size The size of the sample, in bytes.
+ * @param timeout_ms The amount of time, in milliseconds, for which the caller
+ * should block when waiting for a sample. -1 causes the caller to block
+ * indefinitely.
+ * @return A pointer to an 8-byte aligned reserved region of the user ring
+ * buffer; NULL, and errno being set if a sample could not be reserved.
+ *
+ * This function is *not* thread safe, and callers must synchronize
+ * accessing this function if there are multiple producers
+ *
+ * If **timeout_ms** is -1, the function will block indefinitely until a sample
+ * becomes available. Otherwise, **timeout_ms** must be non-negative, or errno
+ * is set to EINVAL, and NULL is returned. If **timeout_ms** is 0, no blocking
+ * will occur and the function will return immediately after attempting to
+ * reserve a sample.
+ *
+ * If **size** is larger than the size of the entire ring buffer, errno is set
+ * to E2BIG and NULL is returned. If the ring buffer could accommodate
+ * **size**, but currently does not have enough space, the caller will block
+ * until at most **timeout_ms** has elapsed. If insufficient space is available
+ * at that time, errno is set to ENOSPC, and NULL is returned.
+ *
+ * The kernel guarantees that it will wake up this thread to check if
+ * sufficient space is available in the ring buffer at least once per
+ * invocation of the **bpf_ringbuf_drain()** helper function, provided that at
+ * least one sample is consumed, and the BPF program did not invoke the
+ * function with BPF_RB_NO_WAKEUP. A wakeup may occur sooner than that, but the
+ * kernel does not guarantee this. If the helper function is invoked with
+ * BPF_RB_FORCE_WAKEUP, a wakeup event will be sent even if no sample is
+ * consumed.
+ *
+ * When a sample of size **size** is found within **timeout_ms**, a pointer to
+ * the sample is returned. After initializing the sample, callers must invoke
+ * **user_ring_buffer__submit()** to post the sample to the ring buffer.
+ * Otherwise, the sample must be freed with **user_ring_buffer__discard()**.
+ */
+LIBBPF_API void *user_ring_buffer__reserve_blocking(struct user_ring_buffer *rb,
+ __u32 size,
+ int timeout_ms);
+
+/* @brief **user_ring_buffer__submit()** submits a previously reserved sample
+ * into the ring buffer.
+ * @param rb The user ring buffer.
+ * @param sample A reserved sample.
+ *
+ * It is not necessary to synchronize amongst multiple producers when invoking
+ * this function.
+ */
+LIBBPF_API void user_ring_buffer__submit(struct user_ring_buffer *rb, void *sample);
+
+/* @brief **user_ring_buffer__discard()** discards a previously reserved sample.
+ * @param rb The user ring buffer.
+ * @param sample A reserved sample.
+ *
+ * It is not necessary to synchronize amongst multiple producers when invoking
+ * this function.
+ */
+LIBBPF_API void user_ring_buffer__discard(struct user_ring_buffer *rb, void *sample);
+
+/* @brief **user_ring_buffer__free()** frees a ring buffer that was previously
+ * created with **user_ring_buffer__new()**.
+ * @param rb The user ring buffer being freed.
+ */
+LIBBPF_API void user_ring_buffer__free(struct user_ring_buffer *rb);
+
+/* Perf buffer APIs */
+struct perf_buffer;
+
+typedef void (*perf_buffer_sample_fn)(void *ctx, int cpu,
+ void *data, __u32 size);
+typedef void (*perf_buffer_lost_fn)(void *ctx, int cpu, __u64 cnt);
+
+/* common use perf buffer options */
+struct perf_buffer_opts {
+ size_t sz;
+};
+#define perf_buffer_opts__last_field sz
+
+/**
+ * @brief **perf_buffer__new()** creates BPF perfbuf manager for a specified
+ * BPF_PERF_EVENT_ARRAY map
+ * @param map_fd FD of BPF_PERF_EVENT_ARRAY BPF map that will be used by BPF
+ * code to send data over to user-space
+ * @param page_cnt number of memory pages allocated for each per-CPU buffer
+ * @param sample_cb function called on each received data record
+ * @param lost_cb function called when record loss has occurred
+ * @param ctx user-provided extra context passed into *sample_cb* and *lost_cb*
+ * @return a new instance of struct perf_buffer on success, NULL on error with
+ * *errno* containing an error code
+ */
+LIBBPF_API struct perf_buffer *
+perf_buffer__new(int map_fd, size_t page_cnt,
+ perf_buffer_sample_fn sample_cb, perf_buffer_lost_fn lost_cb, void *ctx,
+ const struct perf_buffer_opts *opts);
+
+enum bpf_perf_event_ret {
+ LIBBPF_PERF_EVENT_DONE = 0,
+ LIBBPF_PERF_EVENT_ERROR = -1,
+ LIBBPF_PERF_EVENT_CONT = -2,
+};
+
+struct perf_event_header;
+
+typedef enum bpf_perf_event_ret
+(*perf_buffer_event_fn)(void *ctx, int cpu, struct perf_event_header *event);
+
+/* raw perf buffer options, giving most power and control */
+struct perf_buffer_raw_opts {
+ size_t sz;
+ long :0;
+ long :0;
+ /* if cpu_cnt == 0, open all on all possible CPUs (up to the number of
+ * max_entries of given PERF_EVENT_ARRAY map)
+ */
+ int cpu_cnt;
+ /* if cpu_cnt > 0, cpus is an array of CPUs to open ring buffers on */
+ int *cpus;
+ /* if cpu_cnt > 0, map_keys specify map keys to set per-CPU FDs for */
+ int *map_keys;
+};
+#define perf_buffer_raw_opts__last_field map_keys
+
+struct perf_event_attr;
+
+LIBBPF_API struct perf_buffer *
+perf_buffer__new_raw(int map_fd, size_t page_cnt, struct perf_event_attr *attr,
+ perf_buffer_event_fn event_cb, void *ctx,
+ const struct perf_buffer_raw_opts *opts);
+
+LIBBPF_API void perf_buffer__free(struct perf_buffer *pb);
+LIBBPF_API int perf_buffer__epoll_fd(const struct perf_buffer *pb);
+LIBBPF_API int perf_buffer__poll(struct perf_buffer *pb, int timeout_ms);
+LIBBPF_API int perf_buffer__consume(struct perf_buffer *pb);
+LIBBPF_API int perf_buffer__consume_buffer(struct perf_buffer *pb, size_t buf_idx);
+LIBBPF_API size_t perf_buffer__buffer_cnt(const struct perf_buffer *pb);
+LIBBPF_API int perf_buffer__buffer_fd(const struct perf_buffer *pb, size_t buf_idx);
+/**
+ * @brief **perf_buffer__buffer()** returns the per-cpu raw mmap()'ed underlying
+ * memory region of the ring buffer.
+ * This ring buffer can be used to implement a custom events consumer.
+ * The ring buffer starts with the *struct perf_event_mmap_page*, which
+ * holds the ring buffer managment fields, when accessing the header
+ * structure it's important to be SMP aware.
+ * You can refer to *perf_event_read_simple* for a simple example.
+ * @param pb the perf buffer structure
+ * @param buf_idx the buffer index to retreive
+ * @param buf (out) gets the base pointer of the mmap()'ed memory
+ * @param buf_size (out) gets the size of the mmap()'ed region
+ * @return 0 on success, negative error code for failure
+ */
+LIBBPF_API int perf_buffer__buffer(struct perf_buffer *pb, int buf_idx, void **buf,
+ size_t *buf_size);
+
+struct bpf_prog_linfo;
+struct bpf_prog_info;
+
+LIBBPF_API void bpf_prog_linfo__free(struct bpf_prog_linfo *prog_linfo);
+LIBBPF_API struct bpf_prog_linfo *
+bpf_prog_linfo__new(const struct bpf_prog_info *info);
+LIBBPF_API const struct bpf_line_info *
+bpf_prog_linfo__lfind_addr_func(const struct bpf_prog_linfo *prog_linfo,
+ __u64 addr, __u32 func_idx, __u32 nr_skip);
+LIBBPF_API const struct bpf_line_info *
+bpf_prog_linfo__lfind(const struct bpf_prog_linfo *prog_linfo,
+ __u32 insn_off, __u32 nr_skip);
+
+/*
+ * Probe for supported system features
+ *
+ * Note that running many of these probes in a short amount of time can cause
+ * the kernel to reach the maximal size of lockable memory allowed for the
+ * user, causing subsequent probes to fail. In this case, the caller may want
+ * to adjust that limit with setrlimit().
+ */
+
+/**
+ * @brief **libbpf_probe_bpf_prog_type()** detects if host kernel supports
+ * BPF programs of a given type.
+ * @param prog_type BPF program type to detect kernel support for
+ * @param opts reserved for future extensibility, should be NULL
+ * @return 1, if given program type is supported; 0, if given program type is
+ * not supported; negative error code if feature detection failed or can't be
+ * performed
+ *
+ * Make sure the process has required set of CAP_* permissions (or runs as
+ * root) when performing feature checking.
+ */
+LIBBPF_API int libbpf_probe_bpf_prog_type(enum bpf_prog_type prog_type, const void *opts);
+/**
+ * @brief **libbpf_probe_bpf_map_type()** detects if host kernel supports
+ * BPF maps of a given type.
+ * @param map_type BPF map type to detect kernel support for
+ * @param opts reserved for future extensibility, should be NULL
+ * @return 1, if given map type is supported; 0, if given map type is
+ * not supported; negative error code if feature detection failed or can't be
+ * performed
+ *
+ * Make sure the process has required set of CAP_* permissions (or runs as
+ * root) when performing feature checking.
+ */
+LIBBPF_API int libbpf_probe_bpf_map_type(enum bpf_map_type map_type, const void *opts);
+/**
+ * @brief **libbpf_probe_bpf_helper()** detects if host kernel supports the
+ * use of a given BPF helper from specified BPF program type.
+ * @param prog_type BPF program type used to check the support of BPF helper
+ * @param helper_id BPF helper ID (enum bpf_func_id) to check support for
+ * @param opts reserved for future extensibility, should be NULL
+ * @return 1, if given combination of program type and helper is supported; 0,
+ * if the combination is not supported; negative error code if feature
+ * detection for provided input arguments failed or can't be performed
+ *
+ * Make sure the process has required set of CAP_* permissions (or runs as
+ * root) when performing feature checking.
+ */
+LIBBPF_API int libbpf_probe_bpf_helper(enum bpf_prog_type prog_type,
+ enum bpf_func_id helper_id, const void *opts);
+
+/**
+ * @brief **libbpf_num_possible_cpus()** is a helper function to get the
+ * number of possible CPUs that the host kernel supports and expects.
+ * @return number of possible CPUs; or error code on failure
+ *
+ * Example usage:
+ *
+ * int ncpus = libbpf_num_possible_cpus();
+ * if (ncpus < 0) {
+ * // error handling
+ * }
+ * long values[ncpus];
+ * bpf_map_lookup_elem(per_cpu_map_fd, key, values);
+ */
+LIBBPF_API int libbpf_num_possible_cpus(void);
+
+struct bpf_map_skeleton {
+ const char *name;
+ struct bpf_map **map;
+ void **mmaped;
+};
+
+struct bpf_prog_skeleton {
+ const char *name;
+ struct bpf_program **prog;
+ struct bpf_link **link;
+};
+
+struct bpf_object_skeleton {
+ size_t sz; /* size of this struct, for forward/backward compatibility */
+
+ const char *name;
+ const void *data;
+ size_t data_sz;
+
+ struct bpf_object **obj;
+
+ int map_cnt;
+ int map_skel_sz; /* sizeof(struct bpf_map_skeleton) */
+ struct bpf_map_skeleton *maps;
+
+ int prog_cnt;
+ int prog_skel_sz; /* sizeof(struct bpf_prog_skeleton) */
+ struct bpf_prog_skeleton *progs;
+};
+
+LIBBPF_API int
+bpf_object__open_skeleton(struct bpf_object_skeleton *s,
+ const struct bpf_object_open_opts *opts);
+LIBBPF_API int bpf_object__load_skeleton(struct bpf_object_skeleton *s);
+LIBBPF_API int bpf_object__attach_skeleton(struct bpf_object_skeleton *s);
+LIBBPF_API void bpf_object__detach_skeleton(struct bpf_object_skeleton *s);
+LIBBPF_API void bpf_object__destroy_skeleton(struct bpf_object_skeleton *s);
+
+struct bpf_var_skeleton {
+ const char *name;
+ struct bpf_map **map;
+ void **addr;
+};
+
+struct bpf_object_subskeleton {
+ size_t sz; /* size of this struct, for forward/backward compatibility */
+
+ const struct bpf_object *obj;
+
+ int map_cnt;
+ int map_skel_sz; /* sizeof(struct bpf_map_skeleton) */
+ struct bpf_map_skeleton *maps;
+
+ int prog_cnt;
+ int prog_skel_sz; /* sizeof(struct bpf_prog_skeleton) */
+ struct bpf_prog_skeleton *progs;
+
+ int var_cnt;
+ int var_skel_sz; /* sizeof(struct bpf_var_skeleton) */
+ struct bpf_var_skeleton *vars;
+};
+
+LIBBPF_API int
+bpf_object__open_subskeleton(struct bpf_object_subskeleton *s);
+LIBBPF_API void
+bpf_object__destroy_subskeleton(struct bpf_object_subskeleton *s);
+
+struct gen_loader_opts {
+ size_t sz; /* size of this struct, for forward/backward compatiblity */
+ const char *data;
+ const char *insns;
+ __u32 data_sz;
+ __u32 insns_sz;
+};
+
+#define gen_loader_opts__last_field insns_sz
+LIBBPF_API int bpf_object__gen_loader(struct bpf_object *obj,
+ struct gen_loader_opts *opts);
+
+enum libbpf_tristate {
+ TRI_NO = 0,
+ TRI_YES = 1,
+ TRI_MODULE = 2,
+};
+
+struct bpf_linker_opts {
+ /* size of this struct, for forward/backward compatiblity */
+ size_t sz;
+};
+#define bpf_linker_opts__last_field sz
+
+struct bpf_linker_file_opts {
+ /* size of this struct, for forward/backward compatiblity */
+ size_t sz;
+};
+#define bpf_linker_file_opts__last_field sz
+
+struct bpf_linker;
+
+LIBBPF_API struct bpf_linker *bpf_linker__new(const char *filename, struct bpf_linker_opts *opts);
+LIBBPF_API int bpf_linker__add_file(struct bpf_linker *linker,
+ const char *filename,
+ const struct bpf_linker_file_opts *opts);
+LIBBPF_API int bpf_linker__finalize(struct bpf_linker *linker);
+LIBBPF_API void bpf_linker__free(struct bpf_linker *linker);
+
+/*
+ * Custom handling of BPF program's SEC() definitions
+ */
+
+struct bpf_prog_load_opts; /* defined in bpf.h */
+
+/* Called during bpf_object__open() for each recognized BPF program. Callback
+ * can use various bpf_program__set_*() setters to adjust whatever properties
+ * are necessary.
+ */
+typedef int (*libbpf_prog_setup_fn_t)(struct bpf_program *prog, long cookie);
+
+/* Called right before libbpf performs bpf_prog_load() to load BPF program
+ * into the kernel. Callback can adjust opts as necessary.
+ */
+typedef int (*libbpf_prog_prepare_load_fn_t)(struct bpf_program *prog,
+ struct bpf_prog_load_opts *opts, long cookie);
+
+/* Called during skeleton attach or through bpf_program__attach(). If
+ * auto-attach is not supported, callback should return 0 and set link to
+ * NULL (it's not considered an error during skeleton attach, but it will be
+ * an error for bpf_program__attach() calls). On error, error should be
+ * returned directly and link set to NULL. On success, return 0 and set link
+ * to a valid struct bpf_link.
+ */
+typedef int (*libbpf_prog_attach_fn_t)(const struct bpf_program *prog, long cookie,
+ struct bpf_link **link);
+
+struct libbpf_prog_handler_opts {
+ /* size of this struct, for forward/backward compatiblity */
+ size_t sz;
+ /* User-provided value that is passed to prog_setup_fn,
+ * prog_prepare_load_fn, and prog_attach_fn callbacks. Allows user to
+ * register one set of callbacks for multiple SEC() definitions and
+ * still be able to distinguish them, if necessary. For example,
+ * libbpf itself is using this to pass necessary flags (e.g.,
+ * sleepable flag) to a common internal SEC() handler.
+ */
+ long cookie;
+ /* BPF program initialization callback (see libbpf_prog_setup_fn_t).
+ * Callback is optional, pass NULL if it's not necessary.
+ */
+ libbpf_prog_setup_fn_t prog_setup_fn;
+ /* BPF program loading callback (see libbpf_prog_prepare_load_fn_t).
+ * Callback is optional, pass NULL if it's not necessary.
+ */
+ libbpf_prog_prepare_load_fn_t prog_prepare_load_fn;
+ /* BPF program attach callback (see libbpf_prog_attach_fn_t).
+ * Callback is optional, pass NULL if it's not necessary.
+ */
+ libbpf_prog_attach_fn_t prog_attach_fn;
+};
+#define libbpf_prog_handler_opts__last_field prog_attach_fn
+
+/**
+ * @brief **libbpf_register_prog_handler()** registers a custom BPF program
+ * SEC() handler.
+ * @param sec section prefix for which custom handler is registered
+ * @param prog_type BPF program type associated with specified section
+ * @param exp_attach_type Expected BPF attach type associated with specified section
+ * @param opts optional cookie, callbacks, and other extra options
+ * @return Non-negative handler ID is returned on success. This handler ID has
+ * to be passed to *libbpf_unregister_prog_handler()* to unregister such
+ * custom handler. Negative error code is returned on error.
+ *
+ * *sec* defines which SEC() definitions are handled by this custom handler
+ * registration. *sec* can have few different forms:
+ * - if *sec* is just a plain string (e.g., "abc"), it will match only
+ * SEC("abc"). If BPF program specifies SEC("abc/whatever") it will result
+ * in an error;
+ * - if *sec* is of the form "abc/", proper SEC() form is
+ * SEC("abc/something"), where acceptable "something" should be checked by
+ * *prog_init_fn* callback, if there are additional restrictions;
+ * - if *sec* is of the form "abc+", it will successfully match both
+ * SEC("abc") and SEC("abc/whatever") forms;
+ * - if *sec* is NULL, custom handler is registered for any BPF program that
+ * doesn't match any of the registered (custom or libbpf's own) SEC()
+ * handlers. There could be only one such generic custom handler registered
+ * at any given time.
+ *
+ * All custom handlers (except the one with *sec* == NULL) are processed
+ * before libbpf's own SEC() handlers. It is allowed to "override" libbpf's
+ * SEC() handlers by registering custom ones for the same section prefix
+ * (i.e., it's possible to have custom SEC("perf_event/LLC-load-misses")
+ * handler).
+ *
+ * Note, like much of global libbpf APIs (e.g., libbpf_set_print(),
+ * libbpf_set_strict_mode(), etc)) these APIs are not thread-safe. User needs
+ * to ensure synchronization if there is a risk of running this API from
+ * multiple threads simultaneously.
+ */
+LIBBPF_API int libbpf_register_prog_handler(const char *sec,
+ enum bpf_prog_type prog_type,
+ enum bpf_attach_type exp_attach_type,
+ const struct libbpf_prog_handler_opts *opts);
+/**
+ * @brief *libbpf_unregister_prog_handler()* unregisters previously registered
+ * custom BPF program SEC() handler.
+ * @param handler_id handler ID returned by *libbpf_register_prog_handler()*
+ * after successful registration
+ * @return 0 on success, negative error code if handler isn't found
+ *
+ * Note, like much of global libbpf APIs (e.g., libbpf_set_print(),
+ * libbpf_set_strict_mode(), etc)) these APIs are not thread-safe. User needs
+ * to ensure synchronization if there is a risk of running this API from
+ * multiple threads simultaneously.
+ */
+LIBBPF_API int libbpf_unregister_prog_handler(int handler_id);
+
+#ifdef __cplusplus
+} /* extern "C" */
+#endif
+
+#endif /* __LIBBPF_LIBBPF_H */
diff --git a/src/libbpf.map b/src/libbpf.map
new file mode 100644
index 0000000..71bf569
--- /dev/null
+++ b/src/libbpf.map
@@ -0,0 +1,384 @@
+LIBBPF_0.0.1 {
+ global:
+ bpf_btf_get_fd_by_id;
+ bpf_map__btf_key_type_id;
+ bpf_map__btf_value_type_id;
+ bpf_map__fd;
+ bpf_map__name;
+ bpf_map__pin;
+ bpf_map__reuse_fd;
+ bpf_map__set_ifindex;
+ bpf_map__set_inner_map_fd;
+ bpf_map__unpin;
+ bpf_map_delete_elem;
+ bpf_map_get_fd_by_id;
+ bpf_map_get_next_id;
+ bpf_map_get_next_key;
+ bpf_map_lookup_and_delete_elem;
+ bpf_map_lookup_elem;
+ bpf_map_update_elem;
+ bpf_obj_get;
+ bpf_obj_get_info_by_fd;
+ bpf_obj_pin;
+ bpf_object__btf_fd;
+ bpf_object__close;
+ bpf_object__find_map_by_name;
+ bpf_object__kversion;
+ bpf_object__load;
+ bpf_object__name;
+ bpf_object__open;
+ bpf_object__pin;
+ bpf_object__pin_maps;
+ bpf_object__pin_programs;
+ bpf_object__unpin_maps;
+ bpf_object__unpin_programs;
+ bpf_prog_attach;
+ bpf_prog_detach;
+ bpf_prog_detach2;
+ bpf_prog_get_fd_by_id;
+ bpf_prog_get_next_id;
+ bpf_prog_query;
+ bpf_program__fd;
+ bpf_program__pin;
+ bpf_program__set_expected_attach_type;
+ bpf_program__set_ifindex;
+ bpf_program__set_type;
+ bpf_program__unload;
+ bpf_program__unpin;
+ bpf_prog_linfo__free;
+ bpf_prog_linfo__new;
+ bpf_prog_linfo__lfind_addr_func;
+ bpf_prog_linfo__lfind;
+ bpf_raw_tracepoint_open;
+ bpf_task_fd_query;
+ btf__fd;
+ btf__find_by_name;
+ btf__free;
+ btf__name_by_offset;
+ btf__new;
+ btf__resolve_size;
+ btf__resolve_type;
+ btf__type_by_id;
+ libbpf_attach_type_by_name;
+ libbpf_get_error;
+ libbpf_prog_type_by_name;
+ libbpf_set_print;
+ libbpf_strerror;
+ local:
+ *;
+};
+
+LIBBPF_0.0.2 {
+ global:
+ bpf_map_lookup_elem_flags;
+ bpf_object__btf;
+ bpf_object__find_map_fd_by_name;
+ btf__get_raw_data;
+ btf_ext__free;
+ btf_ext__get_raw_data;
+ btf_ext__new;
+} LIBBPF_0.0.1;
+
+LIBBPF_0.0.3 {
+ global:
+ bpf_map__is_internal;
+ bpf_map_freeze;
+} LIBBPF_0.0.2;
+
+LIBBPF_0.0.4 {
+ global:
+ bpf_link__destroy;
+ bpf_program__attach_kprobe;
+ bpf_program__attach_perf_event;
+ bpf_program__attach_raw_tracepoint;
+ bpf_program__attach_tracepoint;
+ bpf_program__attach_uprobe;
+ btf_dump__dump_type;
+ btf_dump__free;
+ btf__parse_elf;
+ libbpf_num_possible_cpus;
+ perf_buffer__free;
+ perf_buffer__poll;
+} LIBBPF_0.0.3;
+
+LIBBPF_0.0.5 {
+ global:
+ bpf_btf_get_next_id;
+} LIBBPF_0.0.4;
+
+LIBBPF_0.0.6 {
+ global:
+ bpf_map__get_pin_path;
+ bpf_map__is_pinned;
+ bpf_map__set_pin_path;
+ bpf_object__open_file;
+ bpf_object__open_mem;
+ bpf_program__attach_trace;
+ bpf_program__get_expected_attach_type;
+ bpf_program__get_type;
+ btf__find_by_name_kind;
+ libbpf_find_vmlinux_btf_id;
+} LIBBPF_0.0.5;
+
+LIBBPF_0.0.7 {
+ global:
+ btf_dump__emit_type_decl;
+ bpf_link__disconnect;
+ bpf_map__attach_struct_ops;
+ bpf_map_delete_batch;
+ bpf_map_lookup_and_delete_batch;
+ bpf_map_lookup_batch;
+ bpf_map_update_batch;
+ bpf_object__find_program_by_name;
+ bpf_object__attach_skeleton;
+ bpf_object__destroy_skeleton;
+ bpf_object__detach_skeleton;
+ bpf_object__load_skeleton;
+ bpf_object__open_skeleton;
+ bpf_program__attach;
+ bpf_program__name;
+ btf__align_of;
+ libbpf_find_kernel_btf;
+} LIBBPF_0.0.6;
+
+LIBBPF_0.0.8 {
+ global:
+ bpf_link__fd;
+ bpf_link__open;
+ bpf_link__pin;
+ bpf_link__pin_path;
+ bpf_link__unpin;
+ bpf_link__update_program;
+ bpf_link_create;
+ bpf_link_update;
+ bpf_map__set_initial_value;
+ bpf_prog_attach_opts;
+ bpf_program__attach_cgroup;
+ bpf_program__attach_lsm;
+ bpf_program__set_attach_target;
+} LIBBPF_0.0.7;
+
+LIBBPF_0.0.9 {
+ global:
+ bpf_enable_stats;
+ bpf_iter_create;
+ bpf_link_get_fd_by_id;
+ bpf_link_get_next_id;
+ bpf_program__attach_iter;
+ bpf_program__attach_netns;
+ perf_buffer__consume;
+ ring_buffer__add;
+ ring_buffer__consume;
+ ring_buffer__free;
+ ring_buffer__new;
+ ring_buffer__poll;
+} LIBBPF_0.0.8;
+
+LIBBPF_0.1.0 {
+ global:
+ bpf_link__detach;
+ bpf_link_detach;
+ bpf_map__ifindex;
+ bpf_map__key_size;
+ bpf_map__map_flags;
+ bpf_map__max_entries;
+ bpf_map__numa_node;
+ bpf_map__set_key_size;
+ bpf_map__set_map_flags;
+ bpf_map__set_max_entries;
+ bpf_map__set_numa_node;
+ bpf_map__set_type;
+ bpf_map__set_value_size;
+ bpf_map__type;
+ bpf_map__value_size;
+ bpf_program__attach_xdp;
+ bpf_program__autoload;
+ bpf_program__set_autoload;
+ btf__parse;
+ btf__parse_raw;
+ btf__pointer_size;
+ btf__set_fd;
+ btf__set_pointer_size;
+} LIBBPF_0.0.9;
+
+LIBBPF_0.2.0 {
+ global:
+ bpf_prog_bind_map;
+ bpf_prog_test_run_opts;
+ bpf_program__attach_freplace;
+ bpf_program__section_name;
+ btf__add_array;
+ btf__add_const;
+ btf__add_enum;
+ btf__add_enum_value;
+ btf__add_datasec;
+ btf__add_datasec_var_info;
+ btf__add_field;
+ btf__add_func;
+ btf__add_func_param;
+ btf__add_func_proto;
+ btf__add_fwd;
+ btf__add_int;
+ btf__add_ptr;
+ btf__add_restrict;
+ btf__add_str;
+ btf__add_struct;
+ btf__add_typedef;
+ btf__add_union;
+ btf__add_var;
+ btf__add_volatile;
+ btf__endianness;
+ btf__find_str;
+ btf__new_empty;
+ btf__set_endianness;
+ btf__str_by_offset;
+ perf_buffer__buffer_cnt;
+ perf_buffer__buffer_fd;
+ perf_buffer__epoll_fd;
+ perf_buffer__consume_buffer;
+} LIBBPF_0.1.0;
+
+LIBBPF_0.3.0 {
+ global:
+ btf__base_btf;
+ btf__parse_elf_split;
+ btf__parse_raw_split;
+ btf__parse_split;
+ btf__new_empty_split;
+ btf__new_split;
+ ring_buffer__epoll_fd;
+} LIBBPF_0.2.0;
+
+LIBBPF_0.4.0 {
+ global:
+ btf__add_float;
+ btf__add_type;
+ bpf_linker__add_file;
+ bpf_linker__finalize;
+ bpf_linker__free;
+ bpf_linker__new;
+ bpf_map__inner_map;
+ bpf_object__set_kversion;
+ bpf_tc_attach;
+ bpf_tc_detach;
+ bpf_tc_hook_create;
+ bpf_tc_hook_destroy;
+ bpf_tc_query;
+} LIBBPF_0.3.0;
+
+LIBBPF_0.5.0 {
+ global:
+ bpf_map__initial_value;
+ bpf_map__pin_path;
+ bpf_map_lookup_and_delete_elem_flags;
+ bpf_program__attach_kprobe_opts;
+ bpf_program__attach_perf_event_opts;
+ bpf_program__attach_tracepoint_opts;
+ bpf_program__attach_uprobe_opts;
+ bpf_object__gen_loader;
+ btf__load_from_kernel_by_id;
+ btf__load_from_kernel_by_id_split;
+ btf__load_into_kernel;
+ btf__load_module_btf;
+ btf__load_vmlinux_btf;
+ btf_dump__dump_type_data;
+ libbpf_set_strict_mode;
+} LIBBPF_0.4.0;
+
+LIBBPF_0.6.0 {
+ global:
+ bpf_map__map_extra;
+ bpf_map__set_map_extra;
+ bpf_map_create;
+ bpf_object__next_map;
+ bpf_object__next_program;
+ bpf_object__prev_map;
+ bpf_object__prev_program;
+ bpf_prog_load;
+ bpf_program__flags;
+ bpf_program__insn_cnt;
+ bpf_program__insns;
+ bpf_program__set_flags;
+ btf__add_btf;
+ btf__add_decl_tag;
+ btf__add_type_tag;
+ btf__dedup;
+ btf__raw_data;
+ btf__type_cnt;
+ btf_dump__new;
+ libbpf_major_version;
+ libbpf_minor_version;
+ libbpf_version_string;
+ perf_buffer__new;
+ perf_buffer__new_raw;
+} LIBBPF_0.5.0;
+
+LIBBPF_0.7.0 {
+ global:
+ bpf_btf_load;
+ bpf_program__expected_attach_type;
+ bpf_program__log_buf;
+ bpf_program__log_level;
+ bpf_program__set_log_buf;
+ bpf_program__set_log_level;
+ bpf_program__type;
+ bpf_xdp_attach;
+ bpf_xdp_detach;
+ bpf_xdp_query;
+ bpf_xdp_query_id;
+ btf_ext__raw_data;
+ libbpf_probe_bpf_helper;
+ libbpf_probe_bpf_map_type;
+ libbpf_probe_bpf_prog_type;
+ libbpf_set_memlock_rlim;
+} LIBBPF_0.6.0;
+
+LIBBPF_0.8.0 {
+ global:
+ bpf_map__autocreate;
+ bpf_map__get_next_key;
+ bpf_map__delete_elem;
+ bpf_map__lookup_and_delete_elem;
+ bpf_map__lookup_elem;
+ bpf_map__set_autocreate;
+ bpf_map__update_elem;
+ bpf_map_delete_elem_flags;
+ bpf_object__destroy_subskeleton;
+ bpf_object__open_subskeleton;
+ bpf_program__attach_kprobe_multi_opts;
+ bpf_program__attach_trace_opts;
+ bpf_program__attach_usdt;
+ bpf_program__set_insns;
+ libbpf_register_prog_handler;
+ libbpf_unregister_prog_handler;
+} LIBBPF_0.7.0;
+
+LIBBPF_1.0.0 {
+ global:
+ bpf_obj_get_opts;
+ bpf_prog_query_opts;
+ bpf_program__attach_ksyscall;
+ bpf_program__autoattach;
+ bpf_program__set_autoattach;
+ btf__add_enum64;
+ btf__add_enum64_value;
+ libbpf_bpf_attach_type_str;
+ libbpf_bpf_link_type_str;
+ libbpf_bpf_map_type_str;
+ libbpf_bpf_prog_type_str;
+ perf_buffer__buffer;
+} LIBBPF_0.8.0;
+
+LIBBPF_1.1.0 {
+ global:
+ bpf_btf_get_fd_by_id_opts;
+ bpf_link_get_fd_by_id_opts;
+ bpf_map_get_fd_by_id_opts;
+ bpf_prog_get_fd_by_id_opts;
+ user_ring_buffer__discard;
+ user_ring_buffer__free;
+ user_ring_buffer__new;
+ user_ring_buffer__reserve;
+ user_ring_buffer__reserve_blocking;
+ user_ring_buffer__submit;
+} LIBBPF_1.0.0;
diff --git a/src/libbpf.pc.template b/src/libbpf.pc.template
new file mode 100644
index 0000000..b45ed53
--- /dev/null
+++ b/src/libbpf.pc.template
@@ -0,0 +1,12 @@
+# SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+
+prefix=@PREFIX@
+libdir=@LIBDIR@
+includedir=${prefix}/include
+
+Name: libbpf
+Description: BPF library
+Version: @VERSION@
+Libs: -L${libdir} -lbpf
+Requires.private: libelf zlib
+Cflags: -I${includedir}
diff --git a/src/libbpf_common.h b/src/libbpf_common.h
new file mode 100644
index 0000000..9a7937f
--- /dev/null
+++ b/src/libbpf_common.h
@@ -0,0 +1,73 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+/*
+ * Common user-facing libbpf helpers.
+ *
+ * Copyright (c) 2019 Facebook
+ */
+
+#ifndef __LIBBPF_LIBBPF_COMMON_H
+#define __LIBBPF_LIBBPF_COMMON_H
+
+#include <string.h>
+#include "libbpf_version.h"
+
+#ifndef LIBBPF_API
+#define LIBBPF_API __attribute__((visibility("default")))
+#endif
+
+#define LIBBPF_DEPRECATED(msg) __attribute__((deprecated(msg)))
+
+/* Mark a symbol as deprecated when libbpf version is >= {major}.{minor} */
+#define LIBBPF_DEPRECATED_SINCE(major, minor, msg) \
+ __LIBBPF_MARK_DEPRECATED_ ## major ## _ ## minor \
+ (LIBBPF_DEPRECATED("libbpf v" # major "." # minor "+: " msg))
+
+#define __LIBBPF_CURRENT_VERSION_GEQ(major, minor) \
+ (LIBBPF_MAJOR_VERSION > (major) || \
+ (LIBBPF_MAJOR_VERSION == (major) && LIBBPF_MINOR_VERSION >= (minor)))
+
+/* Add checks for other versions below when planning deprecation of API symbols
+ * with the LIBBPF_DEPRECATED_SINCE macro.
+ */
+#if __LIBBPF_CURRENT_VERSION_GEQ(1, 0)
+#define __LIBBPF_MARK_DEPRECATED_1_0(X) X
+#else
+#define __LIBBPF_MARK_DEPRECATED_1_0(X)
+#endif
+
+/* This set of internal macros allows to do "function overloading" based on
+ * number of arguments provided by used in backwards-compatible way during the
+ * transition to libbpf 1.0
+ * It's ugly but necessary evil that will be cleaned up when we get to 1.0.
+ * See bpf_prog_load() overload for example.
+ */
+#define ___libbpf_cat(A, B) A ## B
+#define ___libbpf_select(NAME, NUM) ___libbpf_cat(NAME, NUM)
+#define ___libbpf_nth(_1, _2, _3, _4, _5, _6, N, ...) N
+#define ___libbpf_cnt(...) ___libbpf_nth(__VA_ARGS__, 6, 5, 4, 3, 2, 1)
+#define ___libbpf_overload(NAME, ...) ___libbpf_select(NAME, ___libbpf_cnt(__VA_ARGS__))(__VA_ARGS__)
+
+/* Helper macro to declare and initialize libbpf options struct
+ *
+ * This dance with uninitialized declaration, followed by memset to zero,
+ * followed by assignment using compound literal syntax is done to preserve
+ * ability to use a nice struct field initialization syntax and **hopefully**
+ * have all the padding bytes initialized to zero. It's not guaranteed though,
+ * when copying literal, that compiler won't copy garbage in literal's padding
+ * bytes, but that's the best way I've found and it seems to work in practice.
+ *
+ * Macro declares opts struct of given type and name, zero-initializes,
+ * including any extra padding, it with memset() and then assigns initial
+ * values provided by users in struct initializer-syntax as varargs.
+ */
+#define LIBBPF_OPTS(TYPE, NAME, ...) \
+ struct TYPE NAME = ({ \
+ memset(&NAME, 0, sizeof(struct TYPE)); \
+ (struct TYPE) { \
+ .sz = sizeof(struct TYPE), \
+ __VA_ARGS__ \
+ }; \
+ })
+
+#endif /* __LIBBPF_LIBBPF_COMMON_H */
diff --git a/src/libbpf_errno.c b/src/libbpf_errno.c
new file mode 100644
index 0000000..6b18017
--- /dev/null
+++ b/src/libbpf_errno.c
@@ -0,0 +1,75 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+
+/*
+ * Copyright (C) 2013-2015 Alexei Starovoitov <ast@kernel.org>
+ * Copyright (C) 2015 Wang Nan <wangnan0@huawei.com>
+ * Copyright (C) 2015 Huawei Inc.
+ * Copyright (C) 2017 Nicira, Inc.
+ */
+
+#undef _GNU_SOURCE
+#include <stdio.h>
+#include <string.h>
+
+#include "libbpf.h"
+#include "libbpf_internal.h"
+
+/* make sure libbpf doesn't use kernel-only integer typedefs */
+#pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
+
+#define ERRNO_OFFSET(e) ((e) - __LIBBPF_ERRNO__START)
+#define ERRCODE_OFFSET(c) ERRNO_OFFSET(LIBBPF_ERRNO__##c)
+#define NR_ERRNO (__LIBBPF_ERRNO__END - __LIBBPF_ERRNO__START)
+
+static const char *libbpf_strerror_table[NR_ERRNO] = {
+ [ERRCODE_OFFSET(LIBELF)] = "Something wrong in libelf",
+ [ERRCODE_OFFSET(FORMAT)] = "BPF object format invalid",
+ [ERRCODE_OFFSET(KVERSION)] = "'version' section incorrect or lost",
+ [ERRCODE_OFFSET(ENDIAN)] = "Endian mismatch",
+ [ERRCODE_OFFSET(INTERNAL)] = "Internal error in libbpf",
+ [ERRCODE_OFFSET(RELOC)] = "Relocation failed",
+ [ERRCODE_OFFSET(VERIFY)] = "Kernel verifier blocks program loading",
+ [ERRCODE_OFFSET(PROG2BIG)] = "Program too big",
+ [ERRCODE_OFFSET(KVER)] = "Incorrect kernel version",
+ [ERRCODE_OFFSET(PROGTYPE)] = "Kernel doesn't support this program type",
+ [ERRCODE_OFFSET(WRNGPID)] = "Wrong pid in netlink message",
+ [ERRCODE_OFFSET(INVSEQ)] = "Invalid netlink sequence",
+ [ERRCODE_OFFSET(NLPARSE)] = "Incorrect netlink message parsing",
+};
+
+int libbpf_strerror(int err, char *buf, size_t size)
+{
+ int ret;
+
+ if (!buf || !size)
+ return libbpf_err(-EINVAL);
+
+ err = err > 0 ? err : -err;
+
+ if (err < __LIBBPF_ERRNO__START) {
+ ret = strerror_r(err, buf, size);
+ buf[size - 1] = '\0';
+ return libbpf_err_errno(ret);
+ }
+
+ if (err < __LIBBPF_ERRNO__END) {
+ const char *msg;
+
+ msg = libbpf_strerror_table[ERRNO_OFFSET(err)];
+ ret = snprintf(buf, size, "%s", msg);
+ buf[size - 1] = '\0';
+ /* The length of the buf and msg is positive.
+ * A negative number may be returned only when the
+ * size exceeds INT_MAX. Not likely to appear.
+ */
+ if (ret >= size)
+ return libbpf_err(-ERANGE);
+ return 0;
+ }
+
+ ret = snprintf(buf, size, "Unknown libbpf error %d", err);
+ buf[size - 1] = '\0';
+ if (ret >= size)
+ return libbpf_err(-ERANGE);
+ return libbpf_err(-ENOENT);
+}
diff --git a/src/libbpf_internal.h b/src/libbpf_internal.h
new file mode 100644
index 0000000..377642f
--- /dev/null
+++ b/src/libbpf_internal.h
@@ -0,0 +1,579 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+/*
+ * Internal libbpf helpers.
+ *
+ * Copyright (c) 2019 Facebook
+ */
+
+#ifndef __LIBBPF_LIBBPF_INTERNAL_H
+#define __LIBBPF_LIBBPF_INTERNAL_H
+
+#include <stdlib.h>
+#include <limits.h>
+#include <errno.h>
+#include <linux/err.h>
+#include <fcntl.h>
+#include <unistd.h>
+#include "relo_core.h"
+
+/* make sure libbpf doesn't use kernel-only integer typedefs */
+#pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
+
+/* prevent accidental re-addition of reallocarray() */
+#pragma GCC poison reallocarray
+
+#include "libbpf.h"
+#include "btf.h"
+
+#ifndef EM_BPF
+#define EM_BPF 247
+#endif
+
+#ifndef R_BPF_64_64
+#define R_BPF_64_64 1
+#endif
+#ifndef R_BPF_64_ABS64
+#define R_BPF_64_ABS64 2
+#endif
+#ifndef R_BPF_64_ABS32
+#define R_BPF_64_ABS32 3
+#endif
+#ifndef R_BPF_64_32
+#define R_BPF_64_32 10
+#endif
+
+#ifndef SHT_LLVM_ADDRSIG
+#define SHT_LLVM_ADDRSIG 0x6FFF4C03
+#endif
+
+/* if libelf is old and doesn't support mmap(), fall back to read() */
+#ifndef ELF_C_READ_MMAP
+#define ELF_C_READ_MMAP ELF_C_READ
+#endif
+
+/* Older libelf all end up in this expression, for both 32 and 64 bit */
+#ifndef ELF64_ST_VISIBILITY
+#define ELF64_ST_VISIBILITY(o) ((o) & 0x03)
+#endif
+
+#define BTF_INFO_ENC(kind, kind_flag, vlen) \
+ ((!!(kind_flag) << 31) | ((kind) << 24) | ((vlen) & BTF_MAX_VLEN))
+#define BTF_TYPE_ENC(name, info, size_or_type) (name), (info), (size_or_type)
+#define BTF_INT_ENC(encoding, bits_offset, nr_bits) \
+ ((encoding) << 24 | (bits_offset) << 16 | (nr_bits))
+#define BTF_TYPE_INT_ENC(name, encoding, bits_offset, bits, sz) \
+ BTF_TYPE_ENC(name, BTF_INFO_ENC(BTF_KIND_INT, 0, 0), sz), \
+ BTF_INT_ENC(encoding, bits_offset, bits)
+#define BTF_MEMBER_ENC(name, type, bits_offset) (name), (type), (bits_offset)
+#define BTF_PARAM_ENC(name, type) (name), (type)
+#define BTF_VAR_SECINFO_ENC(type, offset, size) (type), (offset), (size)
+#define BTF_TYPE_FLOAT_ENC(name, sz) \
+ BTF_TYPE_ENC(name, BTF_INFO_ENC(BTF_KIND_FLOAT, 0, 0), sz)
+#define BTF_TYPE_DECL_TAG_ENC(value, type, component_idx) \
+ BTF_TYPE_ENC(value, BTF_INFO_ENC(BTF_KIND_DECL_TAG, 0, 0), type), (component_idx)
+#define BTF_TYPE_TYPE_TAG_ENC(value, type) \
+ BTF_TYPE_ENC(value, BTF_INFO_ENC(BTF_KIND_TYPE_TAG, 0, 0), type)
+
+#ifndef likely
+#define likely(x) __builtin_expect(!!(x), 1)
+#endif
+#ifndef unlikely
+#define unlikely(x) __builtin_expect(!!(x), 0)
+#endif
+#ifndef min
+# define min(x, y) ((x) < (y) ? (x) : (y))
+#endif
+#ifndef max
+# define max(x, y) ((x) < (y) ? (y) : (x))
+#endif
+#ifndef offsetofend
+# define offsetofend(TYPE, FIELD) \
+ (offsetof(TYPE, FIELD) + sizeof(((TYPE *)0)->FIELD))
+#endif
+#ifndef __alias
+#define __alias(symbol) __attribute__((alias(#symbol)))
+#endif
+
+/* Check whether a string `str` has prefix `pfx`, regardless if `pfx` is
+ * a string literal known at compilation time or char * pointer known only at
+ * runtime.
+ */
+#define str_has_pfx(str, pfx) \
+ (strncmp(str, pfx, __builtin_constant_p(pfx) ? sizeof(pfx) - 1 : strlen(pfx)) == 0)
+
+/* suffix check */
+static inline bool str_has_sfx(const char *str, const char *sfx)
+{
+ size_t str_len = strlen(str);
+ size_t sfx_len = strlen(sfx);
+
+ if (sfx_len > str_len)
+ return false;
+ return strcmp(str + str_len - sfx_len, sfx) == 0;
+}
+
+/* Symbol versioning is different between static and shared library.
+ * Properly versioned symbols are needed for shared library, but
+ * only the symbol of the new version is needed for static library.
+ * Starting with GNU C 10, use symver attribute instead of .symver assembler
+ * directive, which works better with GCC LTO builds.
+ */
+#if defined(SHARED) && defined(__GNUC__) && __GNUC__ >= 10
+
+#define DEFAULT_VERSION(internal_name, api_name, version) \
+ __attribute__((symver(#api_name "@@" #version)))
+#define COMPAT_VERSION(internal_name, api_name, version) \
+ __attribute__((symver(#api_name "@" #version)))
+
+#elif defined(SHARED)
+
+#define COMPAT_VERSION(internal_name, api_name, version) \
+ asm(".symver " #internal_name "," #api_name "@" #version);
+#define DEFAULT_VERSION(internal_name, api_name, version) \
+ asm(".symver " #internal_name "," #api_name "@@" #version);
+
+#else /* !SHARED */
+
+#define COMPAT_VERSION(internal_name, api_name, version)
+#define DEFAULT_VERSION(internal_name, api_name, version) \
+ extern typeof(internal_name) api_name \
+ __attribute__((alias(#internal_name)));
+
+#endif
+
+extern void libbpf_print(enum libbpf_print_level level,
+ const char *format, ...)
+ __attribute__((format(printf, 2, 3)));
+
+#define __pr(level, fmt, ...) \
+do { \
+ libbpf_print(level, "libbpf: " fmt, ##__VA_ARGS__); \
+} while (0)
+
+#define pr_warn(fmt, ...) __pr(LIBBPF_WARN, fmt, ##__VA_ARGS__)
+#define pr_info(fmt, ...) __pr(LIBBPF_INFO, fmt, ##__VA_ARGS__)
+#define pr_debug(fmt, ...) __pr(LIBBPF_DEBUG, fmt, ##__VA_ARGS__)
+
+#ifndef __has_builtin
+#define __has_builtin(x) 0
+#endif
+
+struct bpf_link {
+ int (*detach)(struct bpf_link *link);
+ void (*dealloc)(struct bpf_link *link);
+ char *pin_path; /* NULL, if not pinned */
+ int fd; /* hook FD, -1 if not applicable */
+ bool disconnected;
+};
+
+/*
+ * Re-implement glibc's reallocarray() for libbpf internal-only use.
+ * reallocarray(), unfortunately, is not available in all versions of glibc,
+ * so requires extra feature detection and using reallocarray() stub from
+ * <tools/libc_compat.h> and COMPAT_NEED_REALLOCARRAY. All this complicates
+ * build of libbpf unnecessarily and is just a maintenance burden. Instead,
+ * it's trivial to implement libbpf-specific internal version and use it
+ * throughout libbpf.
+ */
+static inline void *libbpf_reallocarray(void *ptr, size_t nmemb, size_t size)
+{
+ size_t total;
+
+#if __has_builtin(__builtin_mul_overflow)
+ if (unlikely(__builtin_mul_overflow(nmemb, size, &total)))
+ return NULL;
+#else
+ if (size == 0 || nmemb > ULONG_MAX / size)
+ return NULL;
+ total = nmemb * size;
+#endif
+ return realloc(ptr, total);
+}
+
+/* Copy up to sz - 1 bytes from zero-terminated src string and ensure that dst
+ * is zero-terminated string no matter what (unless sz == 0, in which case
+ * it's a no-op). It's conceptually close to FreeBSD's strlcpy(), but differs
+ * in what is returned. Given this is internal helper, it's trivial to extend
+ * this, when necessary. Use this instead of strncpy inside libbpf source code.
+ */
+static inline void libbpf_strlcpy(char *dst, const char *src, size_t sz)
+{
+ size_t i;
+
+ if (sz == 0)
+ return;
+
+ sz--;
+ for (i = 0; i < sz && src[i]; i++)
+ dst[i] = src[i];
+ dst[i] = '\0';
+}
+
+__u32 get_kernel_version(void);
+
+struct btf;
+struct btf_type;
+
+struct btf_type *btf_type_by_id(const struct btf *btf, __u32 type_id);
+const char *btf_kind_str(const struct btf_type *t);
+const struct btf_type *skip_mods_and_typedefs(const struct btf *btf, __u32 id, __u32 *res_id);
+
+static inline enum btf_func_linkage btf_func_linkage(const struct btf_type *t)
+{
+ return (enum btf_func_linkage)(int)btf_vlen(t);
+}
+
+static inline __u32 btf_type_info(int kind, int vlen, int kflag)
+{
+ return (kflag << 31) | (kind << 24) | vlen;
+}
+
+enum map_def_parts {
+ MAP_DEF_MAP_TYPE = 0x001,
+ MAP_DEF_KEY_TYPE = 0x002,
+ MAP_DEF_KEY_SIZE = 0x004,
+ MAP_DEF_VALUE_TYPE = 0x008,
+ MAP_DEF_VALUE_SIZE = 0x010,
+ MAP_DEF_MAX_ENTRIES = 0x020,
+ MAP_DEF_MAP_FLAGS = 0x040,
+ MAP_DEF_NUMA_NODE = 0x080,
+ MAP_DEF_PINNING = 0x100,
+ MAP_DEF_INNER_MAP = 0x200,
+ MAP_DEF_MAP_EXTRA = 0x400,
+
+ MAP_DEF_ALL = 0x7ff, /* combination of all above */
+};
+
+struct btf_map_def {
+ enum map_def_parts parts;
+ __u32 map_type;
+ __u32 key_type_id;
+ __u32 key_size;
+ __u32 value_type_id;
+ __u32 value_size;
+ __u32 max_entries;
+ __u32 map_flags;
+ __u32 numa_node;
+ __u32 pinning;
+ __u64 map_extra;
+};
+
+int parse_btf_map_def(const char *map_name, struct btf *btf,
+ const struct btf_type *def_t, bool strict,
+ struct btf_map_def *map_def, struct btf_map_def *inner_def);
+
+void *libbpf_add_mem(void **data, size_t *cap_cnt, size_t elem_sz,
+ size_t cur_cnt, size_t max_cnt, size_t add_cnt);
+int libbpf_ensure_mem(void **data, size_t *cap_cnt, size_t elem_sz, size_t need_cnt);
+
+static inline bool libbpf_is_mem_zeroed(const char *p, ssize_t len)
+{
+ while (len > 0) {
+ if (*p)
+ return false;
+ p++;
+ len--;
+ }
+ return true;
+}
+
+static inline bool libbpf_validate_opts(const char *opts,
+ size_t opts_sz, size_t user_sz,
+ const char *type_name)
+{
+ if (user_sz < sizeof(size_t)) {
+ pr_warn("%s size (%zu) is too small\n", type_name, user_sz);
+ return false;
+ }
+ if (!libbpf_is_mem_zeroed(opts + opts_sz, (ssize_t)user_sz - opts_sz)) {
+ pr_warn("%s has non-zero extra bytes\n", type_name);
+ return false;
+ }
+ return true;
+}
+
+#define OPTS_VALID(opts, type) \
+ (!(opts) || libbpf_validate_opts((const char *)opts, \
+ offsetofend(struct type, \
+ type##__last_field), \
+ (opts)->sz, #type))
+#define OPTS_HAS(opts, field) \
+ ((opts) && opts->sz >= offsetofend(typeof(*(opts)), field))
+#define OPTS_GET(opts, field, fallback_value) \
+ (OPTS_HAS(opts, field) ? (opts)->field : fallback_value)
+#define OPTS_SET(opts, field, value) \
+ do { \
+ if (OPTS_HAS(opts, field)) \
+ (opts)->field = value; \
+ } while (0)
+
+#define OPTS_ZEROED(opts, last_nonzero_field) \
+({ \
+ ssize_t __off = offsetofend(typeof(*(opts)), last_nonzero_field); \
+ !(opts) || libbpf_is_mem_zeroed((const void *)opts + __off, \
+ (opts)->sz - __off); \
+})
+
+enum kern_feature_id {
+ /* v4.14: kernel support for program & map names. */
+ FEAT_PROG_NAME,
+ /* v5.2: kernel support for global data sections. */
+ FEAT_GLOBAL_DATA,
+ /* BTF support */
+ FEAT_BTF,
+ /* BTF_KIND_FUNC and BTF_KIND_FUNC_PROTO support */
+ FEAT_BTF_FUNC,
+ /* BTF_KIND_VAR and BTF_KIND_DATASEC support */
+ FEAT_BTF_DATASEC,
+ /* BTF_FUNC_GLOBAL is supported */
+ FEAT_BTF_GLOBAL_FUNC,
+ /* BPF_F_MMAPABLE is supported for arrays */
+ FEAT_ARRAY_MMAP,
+ /* kernel support for expected_attach_type in BPF_PROG_LOAD */
+ FEAT_EXP_ATTACH_TYPE,
+ /* bpf_probe_read_{kernel,user}[_str] helpers */
+ FEAT_PROBE_READ_KERN,
+ /* BPF_PROG_BIND_MAP is supported */
+ FEAT_PROG_BIND_MAP,
+ /* Kernel support for module BTFs */
+ FEAT_MODULE_BTF,
+ /* BTF_KIND_FLOAT support */
+ FEAT_BTF_FLOAT,
+ /* BPF perf link support */
+ FEAT_PERF_LINK,
+ /* BTF_KIND_DECL_TAG support */
+ FEAT_BTF_DECL_TAG,
+ /* BTF_KIND_TYPE_TAG support */
+ FEAT_BTF_TYPE_TAG,
+ /* memcg-based accounting for BPF maps and progs */
+ FEAT_MEMCG_ACCOUNT,
+ /* BPF cookie (bpf_get_attach_cookie() BPF helper) support */
+ FEAT_BPF_COOKIE,
+ /* BTF_KIND_ENUM64 support and BTF_KIND_ENUM kflag support */
+ FEAT_BTF_ENUM64,
+ /* Kernel uses syscall wrapper (CONFIG_ARCH_HAS_SYSCALL_WRAPPER) */
+ FEAT_SYSCALL_WRAPPER,
+ __FEAT_CNT,
+};
+
+int probe_memcg_account(void);
+bool kernel_supports(const struct bpf_object *obj, enum kern_feature_id feat_id);
+int bump_rlimit_memlock(void);
+
+int parse_cpu_mask_str(const char *s, bool **mask, int *mask_sz);
+int parse_cpu_mask_file(const char *fcpu, bool **mask, int *mask_sz);
+int libbpf__load_raw_btf(const char *raw_types, size_t types_len,
+ const char *str_sec, size_t str_len);
+int btf_load_into_kernel(struct btf *btf, char *log_buf, size_t log_sz, __u32 log_level);
+
+struct btf *btf_get_from_fd(int btf_fd, struct btf *base_btf);
+void btf_get_kernel_prefix_kind(enum bpf_attach_type attach_type,
+ const char **prefix, int *kind);
+
+struct btf_ext_info {
+ /*
+ * info points to the individual info section (e.g. func_info and
+ * line_info) from the .BTF.ext. It does not include the __u32 rec_size.
+ */
+ void *info;
+ __u32 rec_size;
+ __u32 len;
+ /* optional (maintained internally by libbpf) mapping between .BTF.ext
+ * section and corresponding ELF section. This is used to join
+ * information like CO-RE relocation records with corresponding BPF
+ * programs defined in ELF sections
+ */
+ __u32 *sec_idxs;
+ int sec_cnt;
+};
+
+#define for_each_btf_ext_sec(seg, sec) \
+ for (sec = (seg)->info; \
+ (void *)sec < (seg)->info + (seg)->len; \
+ sec = (void *)sec + sizeof(struct btf_ext_info_sec) + \
+ (seg)->rec_size * sec->num_info)
+
+#define for_each_btf_ext_rec(seg, sec, i, rec) \
+ for (i = 0, rec = (void *)&(sec)->data; \
+ i < (sec)->num_info; \
+ i++, rec = (void *)rec + (seg)->rec_size)
+
+/*
+ * The .BTF.ext ELF section layout defined as
+ * struct btf_ext_header
+ * func_info subsection
+ *
+ * The func_info subsection layout:
+ * record size for struct bpf_func_info in the func_info subsection
+ * struct btf_sec_func_info for section #1
+ * a list of bpf_func_info records for section #1
+ * where struct bpf_func_info mimics one in include/uapi/linux/bpf.h
+ * but may not be identical
+ * struct btf_sec_func_info for section #2
+ * a list of bpf_func_info records for section #2
+ * ......
+ *
+ * Note that the bpf_func_info record size in .BTF.ext may not
+ * be the same as the one defined in include/uapi/linux/bpf.h.
+ * The loader should ensure that record_size meets minimum
+ * requirement and pass the record as is to the kernel. The
+ * kernel will handle the func_info properly based on its contents.
+ */
+struct btf_ext_header {
+ __u16 magic;
+ __u8 version;
+ __u8 flags;
+ __u32 hdr_len;
+
+ /* All offsets are in bytes relative to the end of this header */
+ __u32 func_info_off;
+ __u32 func_info_len;
+ __u32 line_info_off;
+ __u32 line_info_len;
+
+ /* optional part of .BTF.ext header */
+ __u32 core_relo_off;
+ __u32 core_relo_len;
+};
+
+struct btf_ext {
+ union {
+ struct btf_ext_header *hdr;
+ void *data;
+ };
+ struct btf_ext_info func_info;
+ struct btf_ext_info line_info;
+ struct btf_ext_info core_relo_info;
+ __u32 data_size;
+};
+
+struct btf_ext_info_sec {
+ __u32 sec_name_off;
+ __u32 num_info;
+ /* Followed by num_info * record_size number of bytes */
+ __u8 data[];
+};
+
+/* The minimum bpf_func_info checked by the loader */
+struct bpf_func_info_min {
+ __u32 insn_off;
+ __u32 type_id;
+};
+
+/* The minimum bpf_line_info checked by the loader */
+struct bpf_line_info_min {
+ __u32 insn_off;
+ __u32 file_name_off;
+ __u32 line_off;
+ __u32 line_col;
+};
+
+
+typedef int (*type_id_visit_fn)(__u32 *type_id, void *ctx);
+typedef int (*str_off_visit_fn)(__u32 *str_off, void *ctx);
+int btf_type_visit_type_ids(struct btf_type *t, type_id_visit_fn visit, void *ctx);
+int btf_type_visit_str_offs(struct btf_type *t, str_off_visit_fn visit, void *ctx);
+int btf_ext_visit_type_ids(struct btf_ext *btf_ext, type_id_visit_fn visit, void *ctx);
+int btf_ext_visit_str_offs(struct btf_ext *btf_ext, str_off_visit_fn visit, void *ctx);
+__s32 btf__find_by_name_kind_own(const struct btf *btf, const char *type_name,
+ __u32 kind);
+
+typedef int (*kallsyms_cb_t)(unsigned long long sym_addr, char sym_type,
+ const char *sym_name, void *ctx);
+
+int libbpf_kallsyms_parse(kallsyms_cb_t cb, void *arg);
+
+/* handle direct returned errors */
+static inline int libbpf_err(int ret)
+{
+ if (ret < 0)
+ errno = -ret;
+ return ret;
+}
+
+/* handle errno-based (e.g., syscall or libc) errors according to libbpf's
+ * strict mode settings
+ */
+static inline int libbpf_err_errno(int ret)
+{
+ /* errno is already assumed to be set on error */
+ return ret < 0 ? -errno : ret;
+}
+
+/* handle error for pointer-returning APIs, err is assumed to be < 0 always */
+static inline void *libbpf_err_ptr(int err)
+{
+ /* set errno on error, this doesn't break anything */
+ errno = -err;
+ return NULL;
+}
+
+/* handle pointer-returning APIs' error handling */
+static inline void *libbpf_ptr(void *ret)
+{
+ /* set errno on error, this doesn't break anything */
+ if (IS_ERR(ret))
+ errno = -PTR_ERR(ret);
+
+ return IS_ERR(ret) ? NULL : ret;
+}
+
+static inline bool str_is_empty(const char *s)
+{
+ return !s || !s[0];
+}
+
+static inline bool is_ldimm64_insn(struct bpf_insn *insn)
+{
+ return insn->code == (BPF_LD | BPF_IMM | BPF_DW);
+}
+
+/* if fd is stdin, stdout, or stderr, dup to a fd greater than 2
+ * Takes ownership of the fd passed in, and closes it if calling
+ * fcntl(fd, F_DUPFD_CLOEXEC, 3).
+ */
+static inline int ensure_good_fd(int fd)
+{
+ int old_fd = fd, saved_errno;
+
+ if (fd < 0)
+ return fd;
+ if (fd < 3) {
+ fd = fcntl(fd, F_DUPFD_CLOEXEC, 3);
+ saved_errno = errno;
+ close(old_fd);
+ if (fd < 0) {
+ pr_warn("failed to dup FD %d to FD > 2: %d\n", old_fd, -saved_errno);
+ errno = saved_errno;
+ }
+ }
+ return fd;
+}
+
+/* The following two functions are exposed to bpftool */
+int bpf_core_add_cands(struct bpf_core_cand *local_cand,
+ size_t local_essent_len,
+ const struct btf *targ_btf,
+ const char *targ_btf_name,
+ int targ_start_id,
+ struct bpf_core_cand_list *cands);
+void bpf_core_free_cands(struct bpf_core_cand_list *cands);
+
+struct usdt_manager *usdt_manager_new(struct bpf_object *obj);
+void usdt_manager_free(struct usdt_manager *man);
+struct bpf_link * usdt_manager_attach_usdt(struct usdt_manager *man,
+ const struct bpf_program *prog,
+ pid_t pid, const char *path,
+ const char *usdt_provider, const char *usdt_name,
+ __u64 usdt_cookie);
+
+static inline bool is_pow_of_2(size_t x)
+{
+ return x && (x & (x - 1)) == 0;
+}
+
+#define PROG_LOAD_ATTEMPTS 5
+int sys_bpf_prog_load(union bpf_attr *attr, unsigned int size, int attempts);
+
+#endif /* __LIBBPF_LIBBPF_INTERNAL_H */
diff --git a/src/libbpf_legacy.h b/src/libbpf_legacy.h
new file mode 100644
index 0000000..1e1be46
--- /dev/null
+++ b/src/libbpf_legacy.h
@@ -0,0 +1,140 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+/*
+ * Libbpf legacy APIs (either discouraged or deprecated, as mentioned in [0])
+ *
+ * [0] https://docs.google.com/document/d/1UyjTZuPFWiPFyKk1tV5an11_iaRuec6U-ZESZ54nNTY
+ *
+ * Copyright (C) 2021 Facebook
+ */
+#ifndef __LIBBPF_LEGACY_BPF_H
+#define __LIBBPF_LEGACY_BPF_H
+
+#include <linux/bpf.h>
+#include <stdbool.h>
+#include <stddef.h>
+#include <stdint.h>
+#include "libbpf_common.h"
+
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+/* As of libbpf 1.0 libbpf_set_strict_mode() and enum libbpf_struct_mode have
+ * no effect. But they are left in libbpf_legacy.h so that applications that
+ * prepared for libbpf 1.0 before final release by using
+ * libbpf_set_strict_mode() still work with libbpf 1.0+ without any changes.
+ */
+enum libbpf_strict_mode {
+ /* Turn on all supported strict features of libbpf to simulate libbpf
+ * v1.0 behavior.
+ * This will be the default behavior in libbpf v1.0.
+ */
+ LIBBPF_STRICT_ALL = 0xffffffff,
+
+ /*
+ * Disable any libbpf 1.0 behaviors. This is the default before libbpf
+ * v1.0. It won't be supported anymore in v1.0, please update your
+ * code so that it handles LIBBPF_STRICT_ALL mode before libbpf v1.0.
+ */
+ LIBBPF_STRICT_NONE = 0x00,
+ /*
+ * Return NULL pointers on error, not ERR_PTR(err).
+ * Additionally, libbpf also always sets errno to corresponding Exx
+ * (positive) error code.
+ */
+ LIBBPF_STRICT_CLEAN_PTRS = 0x01,
+ /*
+ * Return actual error codes from low-level APIs directly, not just -1.
+ * Additionally, libbpf also always sets errno to corresponding Exx
+ * (positive) error code.
+ */
+ LIBBPF_STRICT_DIRECT_ERRS = 0x02,
+ /*
+ * Enforce strict BPF program section (SEC()) names.
+ * E.g., while prefiously SEC("xdp_whatever") or SEC("perf_event_blah") were
+ * allowed, with LIBBPF_STRICT_SEC_PREFIX this will become
+ * unrecognized by libbpf and would have to be just SEC("xdp") and
+ * SEC("xdp") and SEC("perf_event").
+ *
+ * Note, in this mode the program pin path will be based on the
+ * function name instead of section name.
+ *
+ * Additionally, routines in the .text section are always considered
+ * sub-programs. Legacy behavior allows for a single routine in .text
+ * to be a program.
+ */
+ LIBBPF_STRICT_SEC_NAME = 0x04,
+ /*
+ * Disable the global 'bpf_objects_list'. Maintaining this list adds
+ * a race condition to bpf_object__open() and bpf_object__close().
+ * Clients can maintain it on their own if it is valuable for them.
+ */
+ LIBBPF_STRICT_NO_OBJECT_LIST = 0x08,
+ /*
+ * Automatically bump RLIMIT_MEMLOCK using setrlimit() before the
+ * first BPF program or map creation operation. This is done only if
+ * kernel is too old to support memcg-based memory accounting for BPF
+ * subsystem. By default, RLIMIT_MEMLOCK limit is set to RLIM_INFINITY,
+ * but it can be overriden with libbpf_set_memlock_rlim() API.
+ * Note that libbpf_set_memlock_rlim() needs to be called before
+ * the very first bpf_prog_load(), bpf_map_create() or bpf_object__load()
+ * operation.
+ */
+ LIBBPF_STRICT_AUTO_RLIMIT_MEMLOCK = 0x10,
+ /*
+ * Error out on any SEC("maps") map definition, which are deprecated
+ * in favor of BTF-defined map definitions in SEC(".maps").
+ */
+ LIBBPF_STRICT_MAP_DEFINITIONS = 0x20,
+
+ __LIBBPF_STRICT_LAST,
+};
+
+LIBBPF_API int libbpf_set_strict_mode(enum libbpf_strict_mode mode);
+
+/**
+ * @brief **libbpf_get_error()** extracts the error code from the passed
+ * pointer
+ * @param ptr pointer returned from libbpf API function
+ * @return error code; or 0 if no error occured
+ *
+ * Note, as of libbpf 1.0 this function is not necessary and not recommended
+ * to be used. Libbpf doesn't return error code embedded into the pointer
+ * itself. Instead, NULL is returned on error and error code is passed through
+ * thread-local errno variable. **libbpf_get_error()** is just returning -errno
+ * value if it receives NULL, which is correct only if errno hasn't been
+ * modified between libbpf API call and corresponding **libbpf_get_error()**
+ * call. Prefer to check return for NULL and use errno directly.
+ *
+ * This API is left in libbpf 1.0 to allow applications that were 1.0-ready
+ * before final libbpf 1.0 without needing to change them.
+ */
+LIBBPF_API long libbpf_get_error(const void *ptr);
+
+#define DECLARE_LIBBPF_OPTS LIBBPF_OPTS
+
+/* "Discouraged" APIs which don't follow consistent libbpf naming patterns.
+ * They are normally a trivial aliases or wrappers for proper APIs and are
+ * left to minimize unnecessary disruption for users of libbpf. But they
+ * shouldn't be used going forward.
+ */
+
+struct bpf_program;
+struct bpf_map;
+struct btf;
+struct btf_ext;
+
+LIBBPF_API struct btf *libbpf_find_kernel_btf(void);
+
+LIBBPF_API enum bpf_prog_type bpf_program__get_type(const struct bpf_program *prog);
+LIBBPF_API enum bpf_attach_type bpf_program__get_expected_attach_type(const struct bpf_program *prog);
+LIBBPF_API const char *bpf_map__get_pin_path(const struct bpf_map *map);
+LIBBPF_API const void *btf__get_raw_data(const struct btf *btf, __u32 *size);
+LIBBPF_API const void *btf_ext__get_raw_data(const struct btf_ext *btf_ext, __u32 *size);
+
+#ifdef __cplusplus
+} /* extern "C" */
+#endif
+
+#endif /* __LIBBPF_LEGACY_BPF_H */
diff --git a/src/libbpf_probes.c b/src/libbpf_probes.c
new file mode 100644
index 0000000..b44fcbb
--- /dev/null
+++ b/src/libbpf_probes.c
@@ -0,0 +1,364 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+/* Copyright (c) 2019 Netronome Systems, Inc. */
+
+#include <errno.h>
+#include <fcntl.h>
+#include <string.h>
+#include <stdlib.h>
+#include <unistd.h>
+#include <net/if.h>
+#include <sys/utsname.h>
+
+#include <linux/btf.h>
+#include <linux/filter.h>
+#include <linux/kernel.h>
+
+#include "bpf.h"
+#include "libbpf.h"
+#include "libbpf_internal.h"
+
+static int probe_prog_load(enum bpf_prog_type prog_type,
+ const struct bpf_insn *insns, size_t insns_cnt,
+ char *log_buf, size_t log_buf_sz)
+{
+ LIBBPF_OPTS(bpf_prog_load_opts, opts,
+ .log_buf = log_buf,
+ .log_size = log_buf_sz,
+ .log_level = log_buf ? 1 : 0,
+ );
+ int fd, err, exp_err = 0;
+ const char *exp_msg = NULL;
+ char buf[4096];
+
+ switch (prog_type) {
+ case BPF_PROG_TYPE_CGROUP_SOCK_ADDR:
+ opts.expected_attach_type = BPF_CGROUP_INET4_CONNECT;
+ break;
+ case BPF_PROG_TYPE_CGROUP_SOCKOPT:
+ opts.expected_attach_type = BPF_CGROUP_GETSOCKOPT;
+ break;
+ case BPF_PROG_TYPE_SK_LOOKUP:
+ opts.expected_attach_type = BPF_SK_LOOKUP;
+ break;
+ case BPF_PROG_TYPE_KPROBE:
+ opts.kern_version = get_kernel_version();
+ break;
+ case BPF_PROG_TYPE_LIRC_MODE2:
+ opts.expected_attach_type = BPF_LIRC_MODE2;
+ break;
+ case BPF_PROG_TYPE_TRACING:
+ case BPF_PROG_TYPE_LSM:
+ opts.log_buf = buf;
+ opts.log_size = sizeof(buf);
+ opts.log_level = 1;
+ if (prog_type == BPF_PROG_TYPE_TRACING)
+ opts.expected_attach_type = BPF_TRACE_FENTRY;
+ else
+ opts.expected_attach_type = BPF_MODIFY_RETURN;
+ opts.attach_btf_id = 1;
+
+ exp_err = -EINVAL;
+ exp_msg = "attach_btf_id 1 is not a function";
+ break;
+ case BPF_PROG_TYPE_EXT:
+ opts.log_buf = buf;
+ opts.log_size = sizeof(buf);
+ opts.log_level = 1;
+ opts.attach_btf_id = 1;
+
+ exp_err = -EINVAL;
+ exp_msg = "Cannot replace kernel functions";
+ break;
+ case BPF_PROG_TYPE_SYSCALL:
+ opts.prog_flags = BPF_F_SLEEPABLE;
+ break;
+ case BPF_PROG_TYPE_STRUCT_OPS:
+ exp_err = -524; /* -ENOTSUPP */
+ break;
+ case BPF_PROG_TYPE_UNSPEC:
+ case BPF_PROG_TYPE_SOCKET_FILTER:
+ case BPF_PROG_TYPE_SCHED_CLS:
+ case BPF_PROG_TYPE_SCHED_ACT:
+ case BPF_PROG_TYPE_TRACEPOINT:
+ case BPF_PROG_TYPE_XDP:
+ case BPF_PROG_TYPE_PERF_EVENT:
+ case BPF_PROG_TYPE_CGROUP_SKB:
+ case BPF_PROG_TYPE_CGROUP_SOCK:
+ case BPF_PROG_TYPE_LWT_IN:
+ case BPF_PROG_TYPE_LWT_OUT:
+ case BPF_PROG_TYPE_LWT_XMIT:
+ case BPF_PROG_TYPE_SOCK_OPS:
+ case BPF_PROG_TYPE_SK_SKB:
+ case BPF_PROG_TYPE_CGROUP_DEVICE:
+ case BPF_PROG_TYPE_SK_MSG:
+ case BPF_PROG_TYPE_RAW_TRACEPOINT:
+ case BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE:
+ case BPF_PROG_TYPE_LWT_SEG6LOCAL:
+ case BPF_PROG_TYPE_SK_REUSEPORT:
+ case BPF_PROG_TYPE_FLOW_DISSECTOR:
+ case BPF_PROG_TYPE_CGROUP_SYSCTL:
+ break;
+ default:
+ return -EOPNOTSUPP;
+ }
+
+ fd = bpf_prog_load(prog_type, NULL, "GPL", insns, insns_cnt, &opts);
+ err = -errno;
+ if (fd >= 0)
+ close(fd);
+ if (exp_err) {
+ if (fd >= 0 || err != exp_err)
+ return 0;
+ if (exp_msg && !strstr(buf, exp_msg))
+ return 0;
+ return 1;
+ }
+ return fd >= 0 ? 1 : 0;
+}
+
+int libbpf_probe_bpf_prog_type(enum bpf_prog_type prog_type, const void *opts)
+{
+ struct bpf_insn insns[] = {
+ BPF_MOV64_IMM(BPF_REG_0, 0),
+ BPF_EXIT_INSN()
+ };
+ const size_t insn_cnt = ARRAY_SIZE(insns);
+ int ret;
+
+ if (opts)
+ return libbpf_err(-EINVAL);
+
+ ret = probe_prog_load(prog_type, insns, insn_cnt, NULL, 0);
+ return libbpf_err(ret);
+}
+
+int libbpf__load_raw_btf(const char *raw_types, size_t types_len,
+ const char *str_sec, size_t str_len)
+{
+ struct btf_header hdr = {
+ .magic = BTF_MAGIC,
+ .version = BTF_VERSION,
+ .hdr_len = sizeof(struct btf_header),
+ .type_len = types_len,
+ .str_off = types_len,
+ .str_len = str_len,
+ };
+ int btf_fd, btf_len;
+ __u8 *raw_btf;
+
+ btf_len = hdr.hdr_len + hdr.type_len + hdr.str_len;
+ raw_btf = malloc(btf_len);
+ if (!raw_btf)
+ return -ENOMEM;
+
+ memcpy(raw_btf, &hdr, sizeof(hdr));
+ memcpy(raw_btf + hdr.hdr_len, raw_types, hdr.type_len);
+ memcpy(raw_btf + hdr.hdr_len + hdr.type_len, str_sec, hdr.str_len);
+
+ btf_fd = bpf_btf_load(raw_btf, btf_len, NULL);
+
+ free(raw_btf);
+ return btf_fd;
+}
+
+static int load_local_storage_btf(void)
+{
+ const char strs[] = "\0bpf_spin_lock\0val\0cnt\0l";
+ /* struct bpf_spin_lock {
+ * int val;
+ * };
+ * struct val {
+ * int cnt;
+ * struct bpf_spin_lock l;
+ * };
+ */
+ __u32 types[] = {
+ /* int */
+ BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
+ /* struct bpf_spin_lock */ /* [2] */
+ BTF_TYPE_ENC(1, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 1), 4),
+ BTF_MEMBER_ENC(15, 1, 0), /* int val; */
+ /* struct val */ /* [3] */
+ BTF_TYPE_ENC(15, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 2), 8),
+ BTF_MEMBER_ENC(19, 1, 0), /* int cnt; */
+ BTF_MEMBER_ENC(23, 2, 32),/* struct bpf_spin_lock l; */
+ };
+
+ return libbpf__load_raw_btf((char *)types, sizeof(types),
+ strs, sizeof(strs));
+}
+
+static int probe_map_create(enum bpf_map_type map_type)
+{
+ LIBBPF_OPTS(bpf_map_create_opts, opts);
+ int key_size, value_size, max_entries;
+ __u32 btf_key_type_id = 0, btf_value_type_id = 0;
+ int fd = -1, btf_fd = -1, fd_inner = -1, exp_err = 0, err = 0;
+
+ key_size = sizeof(__u32);
+ value_size = sizeof(__u32);
+ max_entries = 1;
+
+ switch (map_type) {
+ case BPF_MAP_TYPE_STACK_TRACE:
+ value_size = sizeof(__u64);
+ break;
+ case BPF_MAP_TYPE_LPM_TRIE:
+ key_size = sizeof(__u64);
+ value_size = sizeof(__u64);
+ opts.map_flags = BPF_F_NO_PREALLOC;
+ break;
+ case BPF_MAP_TYPE_CGROUP_STORAGE:
+ case BPF_MAP_TYPE_PERCPU_CGROUP_STORAGE:
+ key_size = sizeof(struct bpf_cgroup_storage_key);
+ value_size = sizeof(__u64);
+ max_entries = 0;
+ break;
+ case BPF_MAP_TYPE_QUEUE:
+ case BPF_MAP_TYPE_STACK:
+ key_size = 0;
+ break;
+ case BPF_MAP_TYPE_SK_STORAGE:
+ case BPF_MAP_TYPE_INODE_STORAGE:
+ case BPF_MAP_TYPE_TASK_STORAGE:
+ case BPF_MAP_TYPE_CGRP_STORAGE:
+ btf_key_type_id = 1;
+ btf_value_type_id = 3;
+ value_size = 8;
+ max_entries = 0;
+ opts.map_flags = BPF_F_NO_PREALLOC;
+ btf_fd = load_local_storage_btf();
+ if (btf_fd < 0)
+ return btf_fd;
+ break;
+ case BPF_MAP_TYPE_RINGBUF:
+ case BPF_MAP_TYPE_USER_RINGBUF:
+ key_size = 0;
+ value_size = 0;
+ max_entries = sysconf(_SC_PAGE_SIZE);
+ break;
+ case BPF_MAP_TYPE_STRUCT_OPS:
+ /* we'll get -ENOTSUPP for invalid BTF type ID for struct_ops */
+ opts.btf_vmlinux_value_type_id = 1;
+ exp_err = -524; /* -ENOTSUPP */
+ break;
+ case BPF_MAP_TYPE_BLOOM_FILTER:
+ key_size = 0;
+ max_entries = 1;
+ break;
+ case BPF_MAP_TYPE_HASH:
+ case BPF_MAP_TYPE_ARRAY:
+ case BPF_MAP_TYPE_PROG_ARRAY:
+ case BPF_MAP_TYPE_PERF_EVENT_ARRAY:
+ case BPF_MAP_TYPE_PERCPU_HASH:
+ case BPF_MAP_TYPE_PERCPU_ARRAY:
+ case BPF_MAP_TYPE_CGROUP_ARRAY:
+ case BPF_MAP_TYPE_LRU_HASH:
+ case BPF_MAP_TYPE_LRU_PERCPU_HASH:
+ case BPF_MAP_TYPE_ARRAY_OF_MAPS:
+ case BPF_MAP_TYPE_HASH_OF_MAPS:
+ case BPF_MAP_TYPE_DEVMAP:
+ case BPF_MAP_TYPE_DEVMAP_HASH:
+ case BPF_MAP_TYPE_SOCKMAP:
+ case BPF_MAP_TYPE_CPUMAP:
+ case BPF_MAP_TYPE_XSKMAP:
+ case BPF_MAP_TYPE_SOCKHASH:
+ case BPF_MAP_TYPE_REUSEPORT_SOCKARRAY:
+ break;
+ case BPF_MAP_TYPE_UNSPEC:
+ default:
+ return -EOPNOTSUPP;
+ }
+
+ if (map_type == BPF_MAP_TYPE_ARRAY_OF_MAPS ||
+ map_type == BPF_MAP_TYPE_HASH_OF_MAPS) {
+ fd_inner = bpf_map_create(BPF_MAP_TYPE_HASH, NULL,
+ sizeof(__u32), sizeof(__u32), 1, NULL);
+ if (fd_inner < 0)
+ goto cleanup;
+
+ opts.inner_map_fd = fd_inner;
+ }
+
+ if (btf_fd >= 0) {
+ opts.btf_fd = btf_fd;
+ opts.btf_key_type_id = btf_key_type_id;
+ opts.btf_value_type_id = btf_value_type_id;
+ }
+
+ fd = bpf_map_create(map_type, NULL, key_size, value_size, max_entries, &opts);
+ err = -errno;
+
+cleanup:
+ if (fd >= 0)
+ close(fd);
+ if (fd_inner >= 0)
+ close(fd_inner);
+ if (btf_fd >= 0)
+ close(btf_fd);
+
+ if (exp_err)
+ return fd < 0 && err == exp_err ? 1 : 0;
+ else
+ return fd >= 0 ? 1 : 0;
+}
+
+int libbpf_probe_bpf_map_type(enum bpf_map_type map_type, const void *opts)
+{
+ int ret;
+
+ if (opts)
+ return libbpf_err(-EINVAL);
+
+ ret = probe_map_create(map_type);
+ return libbpf_err(ret);
+}
+
+int libbpf_probe_bpf_helper(enum bpf_prog_type prog_type, enum bpf_func_id helper_id,
+ const void *opts)
+{
+ struct bpf_insn insns[] = {
+ BPF_EMIT_CALL((__u32)helper_id),
+ BPF_EXIT_INSN(),
+ };
+ const size_t insn_cnt = ARRAY_SIZE(insns);
+ char buf[4096];
+ int ret;
+
+ if (opts)
+ return libbpf_err(-EINVAL);
+
+ /* we can't successfully load all prog types to check for BPF helper
+ * support, so bail out with -EOPNOTSUPP error
+ */
+ switch (prog_type) {
+ case BPF_PROG_TYPE_TRACING:
+ case BPF_PROG_TYPE_EXT:
+ case BPF_PROG_TYPE_LSM:
+ case BPF_PROG_TYPE_STRUCT_OPS:
+ return -EOPNOTSUPP;
+ default:
+ break;
+ }
+
+ buf[0] = '\0';
+ ret = probe_prog_load(prog_type, insns, insn_cnt, buf, sizeof(buf));
+ if (ret < 0)
+ return libbpf_err(ret);
+
+ /* If BPF verifier doesn't recognize BPF helper ID (enum bpf_func_id)
+ * at all, it will emit something like "invalid func unknown#181".
+ * If BPF verifier recognizes BPF helper but it's not supported for
+ * given BPF program type, it will emit "unknown func bpf_sys_bpf#166".
+ * In both cases, provided combination of BPF program type and BPF
+ * helper is not supported by the kernel.
+ * In all other cases, probe_prog_load() above will either succeed (e.g.,
+ * because BPF helper happens to accept no input arguments or it
+ * accepts one input argument and initial PTR_TO_CTX is fine for
+ * that), or we'll get some more specific BPF verifier error about
+ * some unsatisfied conditions.
+ */
+ if (ret == 0 && (strstr(buf, "invalid func ") || strstr(buf, "unknown func ")))
+ return 0;
+ return 1; /* assume supported */
+}
diff --git a/src/libbpf_version.h b/src/libbpf_version.h
new file mode 100644
index 0000000..e944f5b
--- /dev/null
+++ b/src/libbpf_version.h
@@ -0,0 +1,9 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+/* Copyright (C) 2021 Facebook */
+#ifndef __LIBBPF_VERSION_H
+#define __LIBBPF_VERSION_H
+
+#define LIBBPF_MAJOR_VERSION 1
+#define LIBBPF_MINOR_VERSION 1
+
+#endif /* __LIBBPF_VERSION_H */
diff --git a/src/linker.c b/src/linker.c
new file mode 100644
index 0000000..4ac02c2
--- /dev/null
+++ b/src/linker.c
@@ -0,0 +1,2900 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+/*
+ * BPF static linker
+ *
+ * Copyright (c) 2021 Facebook
+ */
+#include <stdbool.h>
+#include <stddef.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+#include <errno.h>
+#include <linux/err.h>
+#include <linux/btf.h>
+#include <elf.h>
+#include <libelf.h>
+#include <fcntl.h>
+#include "libbpf.h"
+#include "btf.h"
+#include "libbpf_internal.h"
+#include "strset.h"
+
+#define BTF_EXTERN_SEC ".extern"
+
+struct src_sec {
+ const char *sec_name;
+ /* positional (not necessarily ELF) index in an array of sections */
+ int id;
+ /* positional (not necessarily ELF) index of a matching section in a final object file */
+ int dst_id;
+ /* section data offset in a matching output section */
+ int dst_off;
+ /* whether section is omitted from the final ELF file */
+ bool skipped;
+ /* whether section is an ephemeral section, not mapped to an ELF section */
+ bool ephemeral;
+
+ /* ELF info */
+ size_t sec_idx;
+ Elf_Scn *scn;
+ Elf64_Shdr *shdr;
+ Elf_Data *data;
+
+ /* corresponding BTF DATASEC type ID */
+ int sec_type_id;
+};
+
+struct src_obj {
+ const char *filename;
+ int fd;
+ Elf *elf;
+ /* Section header strings section index */
+ size_t shstrs_sec_idx;
+ /* SYMTAB section index */
+ size_t symtab_sec_idx;
+
+ struct btf *btf;
+ struct btf_ext *btf_ext;
+
+ /* List of sections (including ephemeral). Slot zero is unused. */
+ struct src_sec *secs;
+ int sec_cnt;
+
+ /* mapping of symbol indices from src to dst ELF */
+ int *sym_map;
+ /* mapping from the src BTF type IDs to dst ones */
+ int *btf_type_map;
+};
+
+/* single .BTF.ext data section */
+struct btf_ext_sec_data {
+ size_t rec_cnt;
+ __u32 rec_sz;
+ void *recs;
+};
+
+struct glob_sym {
+ /* ELF symbol index */
+ int sym_idx;
+ /* associated section id for .ksyms, .kconfig, etc, but not .extern */
+ int sec_id;
+ /* extern name offset in STRTAB */
+ int name_off;
+ /* optional associated BTF type ID */
+ int btf_id;
+ /* BTF type ID to which VAR/FUNC type is pointing to; used for
+ * rewriting types when extern VAR/FUNC is resolved to a concrete
+ * definition
+ */
+ int underlying_btf_id;
+ /* sec_var index in the corresponding dst_sec, if exists */
+ int var_idx;
+
+ /* extern or resolved/global symbol */
+ bool is_extern;
+ /* weak or strong symbol, never goes back from strong to weak */
+ bool is_weak;
+};
+
+struct dst_sec {
+ char *sec_name;
+ /* positional (not necessarily ELF) index in an array of sections */
+ int id;
+
+ bool ephemeral;
+
+ /* ELF info */
+ size_t sec_idx;
+ Elf_Scn *scn;
+ Elf64_Shdr *shdr;
+ Elf_Data *data;
+
+ /* final output section size */
+ int sec_sz;
+ /* final output contents of the section */
+ void *raw_data;
+
+ /* corresponding STT_SECTION symbol index in SYMTAB */
+ int sec_sym_idx;
+
+ /* section's DATASEC variable info, emitted on BTF finalization */
+ bool has_btf;
+ int sec_var_cnt;
+ struct btf_var_secinfo *sec_vars;
+
+ /* section's .BTF.ext data */
+ struct btf_ext_sec_data func_info;
+ struct btf_ext_sec_data line_info;
+ struct btf_ext_sec_data core_relo_info;
+};
+
+struct bpf_linker {
+ char *filename;
+ int fd;
+ Elf *elf;
+ Elf64_Ehdr *elf_hdr;
+
+ /* Output sections metadata */
+ struct dst_sec *secs;
+ int sec_cnt;
+
+ struct strset *strtab_strs; /* STRTAB unique strings */
+ size_t strtab_sec_idx; /* STRTAB section index */
+ size_t symtab_sec_idx; /* SYMTAB section index */
+
+ struct btf *btf;
+ struct btf_ext *btf_ext;
+
+ /* global (including extern) ELF symbols */
+ int glob_sym_cnt;
+ struct glob_sym *glob_syms;
+};
+
+#define pr_warn_elf(fmt, ...) \
+ libbpf_print(LIBBPF_WARN, "libbpf: " fmt ": %s\n", ##__VA_ARGS__, elf_errmsg(-1))
+
+static int init_output_elf(struct bpf_linker *linker, const char *file);
+
+static int linker_load_obj_file(struct bpf_linker *linker, const char *filename,
+ const struct bpf_linker_file_opts *opts,
+ struct src_obj *obj);
+static int linker_sanity_check_elf(struct src_obj *obj);
+static int linker_sanity_check_elf_symtab(struct src_obj *obj, struct src_sec *sec);
+static int linker_sanity_check_elf_relos(struct src_obj *obj, struct src_sec *sec);
+static int linker_sanity_check_btf(struct src_obj *obj);
+static int linker_sanity_check_btf_ext(struct src_obj *obj);
+static int linker_fixup_btf(struct src_obj *obj);
+static int linker_append_sec_data(struct bpf_linker *linker, struct src_obj *obj);
+static int linker_append_elf_syms(struct bpf_linker *linker, struct src_obj *obj);
+static int linker_append_elf_sym(struct bpf_linker *linker, struct src_obj *obj,
+ Elf64_Sym *sym, const char *sym_name, int src_sym_idx);
+static int linker_append_elf_relos(struct bpf_linker *linker, struct src_obj *obj);
+static int linker_append_btf(struct bpf_linker *linker, struct src_obj *obj);
+static int linker_append_btf_ext(struct bpf_linker *linker, struct src_obj *obj);
+
+static int finalize_btf(struct bpf_linker *linker);
+static int finalize_btf_ext(struct bpf_linker *linker);
+
+void bpf_linker__free(struct bpf_linker *linker)
+{
+ int i;
+
+ if (!linker)
+ return;
+
+ free(linker->filename);
+
+ if (linker->elf)
+ elf_end(linker->elf);
+
+ if (linker->fd >= 0)
+ close(linker->fd);
+
+ strset__free(linker->strtab_strs);
+
+ btf__free(linker->btf);
+ btf_ext__free(linker->btf_ext);
+
+ for (i = 1; i < linker->sec_cnt; i++) {
+ struct dst_sec *sec = &linker->secs[i];
+
+ free(sec->sec_name);
+ free(sec->raw_data);
+ free(sec->sec_vars);
+
+ free(sec->func_info.recs);
+ free(sec->line_info.recs);
+ free(sec->core_relo_info.recs);
+ }
+ free(linker->secs);
+
+ free(linker->glob_syms);
+ free(linker);
+}
+
+struct bpf_linker *bpf_linker__new(const char *filename, struct bpf_linker_opts *opts)
+{
+ struct bpf_linker *linker;
+ int err;
+
+ if (!OPTS_VALID(opts, bpf_linker_opts))
+ return errno = EINVAL, NULL;
+
+ if (elf_version(EV_CURRENT) == EV_NONE) {
+ pr_warn_elf("libelf initialization failed");
+ return errno = EINVAL, NULL;
+ }
+
+ linker = calloc(1, sizeof(*linker));
+ if (!linker)
+ return errno = ENOMEM, NULL;
+
+ linker->fd = -1;
+
+ err = init_output_elf(linker, filename);
+ if (err)
+ goto err_out;
+
+ return linker;
+
+err_out:
+ bpf_linker__free(linker);
+ return errno = -err, NULL;
+}
+
+static struct dst_sec *add_dst_sec(struct bpf_linker *linker, const char *sec_name)
+{
+ struct dst_sec *secs = linker->secs, *sec;
+ size_t new_cnt = linker->sec_cnt ? linker->sec_cnt + 1 : 2;
+
+ secs = libbpf_reallocarray(secs, new_cnt, sizeof(*secs));
+ if (!secs)
+ return NULL;
+
+ /* zero out newly allocated memory */
+ memset(secs + linker->sec_cnt, 0, (new_cnt - linker->sec_cnt) * sizeof(*secs));
+
+ linker->secs = secs;
+ linker->sec_cnt = new_cnt;
+
+ sec = &linker->secs[new_cnt - 1];
+ sec->id = new_cnt - 1;
+ sec->sec_name = strdup(sec_name);
+ if (!sec->sec_name)
+ return NULL;
+
+ return sec;
+}
+
+static Elf64_Sym *add_new_sym(struct bpf_linker *linker, size_t *sym_idx)
+{
+ struct dst_sec *symtab = &linker->secs[linker->symtab_sec_idx];
+ Elf64_Sym *syms, *sym;
+ size_t sym_cnt = symtab->sec_sz / sizeof(*sym);
+
+ syms = libbpf_reallocarray(symtab->raw_data, sym_cnt + 1, sizeof(*sym));
+ if (!syms)
+ return NULL;
+
+ sym = &syms[sym_cnt];
+ memset(sym, 0, sizeof(*sym));
+
+ symtab->raw_data = syms;
+ symtab->sec_sz += sizeof(*sym);
+ symtab->shdr->sh_size += sizeof(*sym);
+ symtab->data->d_size += sizeof(*sym);
+
+ if (sym_idx)
+ *sym_idx = sym_cnt;
+
+ return sym;
+}
+
+static int init_output_elf(struct bpf_linker *linker, const char *file)
+{
+ int err, str_off;
+ Elf64_Sym *init_sym;
+ struct dst_sec *sec;
+
+ linker->filename = strdup(file);
+ if (!linker->filename)
+ return -ENOMEM;
+
+ linker->fd = open(file, O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC, 0644);
+ if (linker->fd < 0) {
+ err = -errno;
+ pr_warn("failed to create '%s': %d\n", file, err);
+ return err;
+ }
+
+ linker->elf = elf_begin(linker->fd, ELF_C_WRITE, NULL);
+ if (!linker->elf) {
+ pr_warn_elf("failed to create ELF object");
+ return -EINVAL;
+ }
+
+ /* ELF header */
+ linker->elf_hdr = elf64_newehdr(linker->elf);
+ if (!linker->elf_hdr) {
+ pr_warn_elf("failed to create ELF header");
+ return -EINVAL;
+ }
+
+ linker->elf_hdr->e_machine = EM_BPF;
+ linker->elf_hdr->e_type = ET_REL;
+#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
+ linker->elf_hdr->e_ident[EI_DATA] = ELFDATA2LSB;
+#elif __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
+ linker->elf_hdr->e_ident[EI_DATA] = ELFDATA2MSB;
+#else
+#error "Unknown __BYTE_ORDER__"
+#endif
+
+ /* STRTAB */
+ /* initialize strset with an empty string to conform to ELF */
+ linker->strtab_strs = strset__new(INT_MAX, "", sizeof(""));
+ if (libbpf_get_error(linker->strtab_strs))
+ return libbpf_get_error(linker->strtab_strs);
+
+ sec = add_dst_sec(linker, ".strtab");
+ if (!sec)
+ return -ENOMEM;
+
+ sec->scn = elf_newscn(linker->elf);
+ if (!sec->scn) {
+ pr_warn_elf("failed to create STRTAB section");
+ return -EINVAL;
+ }
+
+ sec->shdr = elf64_getshdr(sec->scn);
+ if (!sec->shdr)
+ return -EINVAL;
+
+ sec->data = elf_newdata(sec->scn);
+ if (!sec->data) {
+ pr_warn_elf("failed to create STRTAB data");
+ return -EINVAL;
+ }
+
+ str_off = strset__add_str(linker->strtab_strs, sec->sec_name);
+ if (str_off < 0)
+ return str_off;
+
+ sec->sec_idx = elf_ndxscn(sec->scn);
+ linker->elf_hdr->e_shstrndx = sec->sec_idx;
+ linker->strtab_sec_idx = sec->sec_idx;
+
+ sec->shdr->sh_name = str_off;
+ sec->shdr->sh_type = SHT_STRTAB;
+ sec->shdr->sh_flags = SHF_STRINGS;
+ sec->shdr->sh_offset = 0;
+ sec->shdr->sh_link = 0;
+ sec->shdr->sh_info = 0;
+ sec->shdr->sh_addralign = 1;
+ sec->shdr->sh_size = sec->sec_sz = 0;
+ sec->shdr->sh_entsize = 0;
+
+ /* SYMTAB */
+ sec = add_dst_sec(linker, ".symtab");
+ if (!sec)
+ return -ENOMEM;
+
+ sec->scn = elf_newscn(linker->elf);
+ if (!sec->scn) {
+ pr_warn_elf("failed to create SYMTAB section");
+ return -EINVAL;
+ }
+
+ sec->shdr = elf64_getshdr(sec->scn);
+ if (!sec->shdr)
+ return -EINVAL;
+
+ sec->data = elf_newdata(sec->scn);
+ if (!sec->data) {
+ pr_warn_elf("failed to create SYMTAB data");
+ return -EINVAL;
+ }
+
+ str_off = strset__add_str(linker->strtab_strs, sec->sec_name);
+ if (str_off < 0)
+ return str_off;
+
+ sec->sec_idx = elf_ndxscn(sec->scn);
+ linker->symtab_sec_idx = sec->sec_idx;
+
+ sec->shdr->sh_name = str_off;
+ sec->shdr->sh_type = SHT_SYMTAB;
+ sec->shdr->sh_flags = 0;
+ sec->shdr->sh_offset = 0;
+ sec->shdr->sh_link = linker->strtab_sec_idx;
+ /* sh_info should be one greater than the index of the last local
+ * symbol (i.e., binding is STB_LOCAL). But why and who cares?
+ */
+ sec->shdr->sh_info = 0;
+ sec->shdr->sh_addralign = 8;
+ sec->shdr->sh_entsize = sizeof(Elf64_Sym);
+
+ /* .BTF */
+ linker->btf = btf__new_empty();
+ err = libbpf_get_error(linker->btf);
+ if (err)
+ return err;
+
+ /* add the special all-zero symbol */
+ init_sym = add_new_sym(linker, NULL);
+ if (!init_sym)
+ return -EINVAL;
+
+ init_sym->st_name = 0;
+ init_sym->st_info = 0;
+ init_sym->st_other = 0;
+ init_sym->st_shndx = SHN_UNDEF;
+ init_sym->st_value = 0;
+ init_sym->st_size = 0;
+
+ return 0;
+}
+
+int bpf_linker__add_file(struct bpf_linker *linker, const char *filename,
+ const struct bpf_linker_file_opts *opts)
+{
+ struct src_obj obj = {};
+ int err = 0;
+
+ if (!OPTS_VALID(opts, bpf_linker_file_opts))
+ return libbpf_err(-EINVAL);
+
+ if (!linker->elf)
+ return libbpf_err(-EINVAL);
+
+ err = err ?: linker_load_obj_file(linker, filename, opts, &obj);
+ err = err ?: linker_append_sec_data(linker, &obj);
+ err = err ?: linker_append_elf_syms(linker, &obj);
+ err = err ?: linker_append_elf_relos(linker, &obj);
+ err = err ?: linker_append_btf(linker, &obj);
+ err = err ?: linker_append_btf_ext(linker, &obj);
+
+ /* free up src_obj resources */
+ free(obj.btf_type_map);
+ btf__free(obj.btf);
+ btf_ext__free(obj.btf_ext);
+ free(obj.secs);
+ free(obj.sym_map);
+ if (obj.elf)
+ elf_end(obj.elf);
+ if (obj.fd >= 0)
+ close(obj.fd);
+
+ return libbpf_err(err);
+}
+
+static bool is_dwarf_sec_name(const char *name)
+{
+ /* approximation, but the actual list is too long */
+ return strncmp(name, ".debug_", sizeof(".debug_") - 1) == 0;
+}
+
+static bool is_ignored_sec(struct src_sec *sec)
+{
+ Elf64_Shdr *shdr = sec->shdr;
+ const char *name = sec->sec_name;
+
+ /* no special handling of .strtab */
+ if (shdr->sh_type == SHT_STRTAB)
+ return true;
+
+ /* ignore .llvm_addrsig section as well */
+ if (shdr->sh_type == SHT_LLVM_ADDRSIG)
+ return true;
+
+ /* no subprograms will lead to an empty .text section, ignore it */
+ if (shdr->sh_type == SHT_PROGBITS && shdr->sh_size == 0 &&
+ strcmp(sec->sec_name, ".text") == 0)
+ return true;
+
+ /* DWARF sections */
+ if (is_dwarf_sec_name(sec->sec_name))
+ return true;
+
+ if (strncmp(name, ".rel", sizeof(".rel") - 1) == 0) {
+ name += sizeof(".rel") - 1;
+ /* DWARF section relocations */
+ if (is_dwarf_sec_name(name))
+ return true;
+
+ /* .BTF and .BTF.ext don't need relocations */
+ if (strcmp(name, BTF_ELF_SEC) == 0 ||
+ strcmp(name, BTF_EXT_ELF_SEC) == 0)
+ return true;
+ }
+
+ return false;
+}
+
+static struct src_sec *add_src_sec(struct src_obj *obj, const char *sec_name)
+{
+ struct src_sec *secs = obj->secs, *sec;
+ size_t new_cnt = obj->sec_cnt ? obj->sec_cnt + 1 : 2;
+
+ secs = libbpf_reallocarray(secs, new_cnt, sizeof(*secs));
+ if (!secs)
+ return NULL;
+
+ /* zero out newly allocated memory */
+ memset(secs + obj->sec_cnt, 0, (new_cnt - obj->sec_cnt) * sizeof(*secs));
+
+ obj->secs = secs;
+ obj->sec_cnt = new_cnt;
+
+ sec = &obj->secs[new_cnt - 1];
+ sec->id = new_cnt - 1;
+ sec->sec_name = sec_name;
+
+ return sec;
+}
+
+static int linker_load_obj_file(struct bpf_linker *linker, const char *filename,
+ const struct bpf_linker_file_opts *opts,
+ struct src_obj *obj)
+{
+#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
+ const int host_endianness = ELFDATA2LSB;
+#elif __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
+ const int host_endianness = ELFDATA2MSB;
+#else
+#error "Unknown __BYTE_ORDER__"
+#endif
+ int err = 0;
+ Elf_Scn *scn;
+ Elf_Data *data;
+ Elf64_Ehdr *ehdr;
+ Elf64_Shdr *shdr;
+ struct src_sec *sec;
+
+ pr_debug("linker: adding object file '%s'...\n", filename);
+
+ obj->filename = filename;
+
+ obj->fd = open(filename, O_RDONLY | O_CLOEXEC);
+ if (obj->fd < 0) {
+ err = -errno;
+ pr_warn("failed to open file '%s': %d\n", filename, err);
+ return err;
+ }
+ obj->elf = elf_begin(obj->fd, ELF_C_READ_MMAP, NULL);
+ if (!obj->elf) {
+ err = -errno;
+ pr_warn_elf("failed to parse ELF file '%s'", filename);
+ return err;
+ }
+
+ /* Sanity check ELF file high-level properties */
+ ehdr = elf64_getehdr(obj->elf);
+ if (!ehdr) {
+ err = -errno;
+ pr_warn_elf("failed to get ELF header for %s", filename);
+ return err;
+ }
+ if (ehdr->e_ident[EI_DATA] != host_endianness) {
+ err = -EOPNOTSUPP;
+ pr_warn_elf("unsupported byte order of ELF file %s", filename);
+ return err;
+ }
+ if (ehdr->e_type != ET_REL
+ || ehdr->e_machine != EM_BPF
+ || ehdr->e_ident[EI_CLASS] != ELFCLASS64) {
+ err = -EOPNOTSUPP;
+ pr_warn_elf("unsupported kind of ELF file %s", filename);
+ return err;
+ }
+
+ if (elf_getshdrstrndx(obj->elf, &obj->shstrs_sec_idx)) {
+ err = -errno;
+ pr_warn_elf("failed to get SHSTRTAB section index for %s", filename);
+ return err;
+ }
+
+ scn = NULL;
+ while ((scn = elf_nextscn(obj->elf, scn)) != NULL) {
+ size_t sec_idx = elf_ndxscn(scn);
+ const char *sec_name;
+
+ shdr = elf64_getshdr(scn);
+ if (!shdr) {
+ err = -errno;
+ pr_warn_elf("failed to get section #%zu header for %s",
+ sec_idx, filename);
+ return err;
+ }
+
+ sec_name = elf_strptr(obj->elf, obj->shstrs_sec_idx, shdr->sh_name);
+ if (!sec_name) {
+ err = -errno;
+ pr_warn_elf("failed to get section #%zu name for %s",
+ sec_idx, filename);
+ return err;
+ }
+
+ data = elf_getdata(scn, 0);
+ if (!data) {
+ err = -errno;
+ pr_warn_elf("failed to get section #%zu (%s) data from %s",
+ sec_idx, sec_name, filename);
+ return err;
+ }
+
+ sec = add_src_sec(obj, sec_name);
+ if (!sec)
+ return -ENOMEM;
+
+ sec->scn = scn;
+ sec->shdr = shdr;
+ sec->data = data;
+ sec->sec_idx = elf_ndxscn(scn);
+
+ if (is_ignored_sec(sec)) {
+ sec->skipped = true;
+ continue;
+ }
+
+ switch (shdr->sh_type) {
+ case SHT_SYMTAB:
+ if (obj->symtab_sec_idx) {
+ err = -EOPNOTSUPP;
+ pr_warn("multiple SYMTAB sections found, not supported\n");
+ return err;
+ }
+ obj->symtab_sec_idx = sec_idx;
+ break;
+ case SHT_STRTAB:
+ /* we'll construct our own string table */
+ break;
+ case SHT_PROGBITS:
+ if (strcmp(sec_name, BTF_ELF_SEC) == 0) {
+ obj->btf = btf__new(data->d_buf, shdr->sh_size);
+ err = libbpf_get_error(obj->btf);
+ if (err) {
+ pr_warn("failed to parse .BTF from %s: %d\n", filename, err);
+ return err;
+ }
+ sec->skipped = true;
+ continue;
+ }
+ if (strcmp(sec_name, BTF_EXT_ELF_SEC) == 0) {
+ obj->btf_ext = btf_ext__new(data->d_buf, shdr->sh_size);
+ err = libbpf_get_error(obj->btf_ext);
+ if (err) {
+ pr_warn("failed to parse .BTF.ext from '%s': %d\n", filename, err);
+ return err;
+ }
+ sec->skipped = true;
+ continue;
+ }
+
+ /* data & code */
+ break;
+ case SHT_NOBITS:
+ /* BSS */
+ break;
+ case SHT_REL:
+ /* relocations */
+ break;
+ default:
+ pr_warn("unrecognized section #%zu (%s) in %s\n",
+ sec_idx, sec_name, filename);
+ err = -EINVAL;
+ return err;
+ }
+ }
+
+ err = err ?: linker_sanity_check_elf(obj);
+ err = err ?: linker_sanity_check_btf(obj);
+ err = err ?: linker_sanity_check_btf_ext(obj);
+ err = err ?: linker_fixup_btf(obj);
+
+ return err;
+}
+
+static int linker_sanity_check_elf(struct src_obj *obj)
+{
+ struct src_sec *sec;
+ int i, err;
+
+ if (!obj->symtab_sec_idx) {
+ pr_warn("ELF is missing SYMTAB section in %s\n", obj->filename);
+ return -EINVAL;
+ }
+ if (!obj->shstrs_sec_idx) {
+ pr_warn("ELF is missing section headers STRTAB section in %s\n", obj->filename);
+ return -EINVAL;
+ }
+
+ for (i = 1; i < obj->sec_cnt; i++) {
+ sec = &obj->secs[i];
+
+ if (sec->sec_name[0] == '\0') {
+ pr_warn("ELF section #%zu has empty name in %s\n", sec->sec_idx, obj->filename);
+ return -EINVAL;
+ }
+
+ if (sec->shdr->sh_addralign && !is_pow_of_2(sec->shdr->sh_addralign))
+ return -EINVAL;
+ if (sec->shdr->sh_addralign != sec->data->d_align)
+ return -EINVAL;
+
+ if (sec->shdr->sh_size != sec->data->d_size)
+ return -EINVAL;
+
+ switch (sec->shdr->sh_type) {
+ case SHT_SYMTAB:
+ err = linker_sanity_check_elf_symtab(obj, sec);
+ if (err)
+ return err;
+ break;
+ case SHT_STRTAB:
+ break;
+ case SHT_PROGBITS:
+ if (sec->shdr->sh_flags & SHF_EXECINSTR) {
+ if (sec->shdr->sh_size % sizeof(struct bpf_insn) != 0)
+ return -EINVAL;
+ }
+ break;
+ case SHT_NOBITS:
+ break;
+ case SHT_REL:
+ err = linker_sanity_check_elf_relos(obj, sec);
+ if (err)
+ return err;
+ break;
+ case SHT_LLVM_ADDRSIG:
+ break;
+ default:
+ pr_warn("ELF section #%zu (%s) has unrecognized type %zu in %s\n",
+ sec->sec_idx, sec->sec_name, (size_t)sec->shdr->sh_type, obj->filename);
+ return -EINVAL;
+ }
+ }
+
+ return 0;
+}
+
+static int linker_sanity_check_elf_symtab(struct src_obj *obj, struct src_sec *sec)
+{
+ struct src_sec *link_sec;
+ Elf64_Sym *sym;
+ int i, n;
+
+ if (sec->shdr->sh_entsize != sizeof(Elf64_Sym))
+ return -EINVAL;
+ if (sec->shdr->sh_size % sec->shdr->sh_entsize != 0)
+ return -EINVAL;
+
+ if (!sec->shdr->sh_link || sec->shdr->sh_link >= obj->sec_cnt) {
+ pr_warn("ELF SYMTAB section #%zu points to missing STRTAB section #%zu in %s\n",
+ sec->sec_idx, (size_t)sec->shdr->sh_link, obj->filename);
+ return -EINVAL;
+ }
+ link_sec = &obj->secs[sec->shdr->sh_link];
+ if (link_sec->shdr->sh_type != SHT_STRTAB) {
+ pr_warn("ELF SYMTAB section #%zu points to invalid STRTAB section #%zu in %s\n",
+ sec->sec_idx, (size_t)sec->shdr->sh_link, obj->filename);
+ return -EINVAL;
+ }
+
+ n = sec->shdr->sh_size / sec->shdr->sh_entsize;
+ sym = sec->data->d_buf;
+ for (i = 0; i < n; i++, sym++) {
+ int sym_type = ELF64_ST_TYPE(sym->st_info);
+ int sym_bind = ELF64_ST_BIND(sym->st_info);
+ int sym_vis = ELF64_ST_VISIBILITY(sym->st_other);
+
+ if (i == 0) {
+ if (sym->st_name != 0 || sym->st_info != 0
+ || sym->st_other != 0 || sym->st_shndx != 0
+ || sym->st_value != 0 || sym->st_size != 0) {
+ pr_warn("ELF sym #0 is invalid in %s\n", obj->filename);
+ return -EINVAL;
+ }
+ continue;
+ }
+ if (sym_bind != STB_LOCAL && sym_bind != STB_GLOBAL && sym_bind != STB_WEAK) {
+ pr_warn("ELF sym #%d in section #%zu has unsupported symbol binding %d\n",
+ i, sec->sec_idx, sym_bind);
+ return -EINVAL;
+ }
+ if (sym_vis != STV_DEFAULT && sym_vis != STV_HIDDEN) {
+ pr_warn("ELF sym #%d in section #%zu has unsupported symbol visibility %d\n",
+ i, sec->sec_idx, sym_vis);
+ return -EINVAL;
+ }
+ if (sym->st_shndx == 0) {
+ if (sym_type != STT_NOTYPE || sym_bind == STB_LOCAL
+ || sym->st_value != 0 || sym->st_size != 0) {
+ pr_warn("ELF sym #%d is invalid extern symbol in %s\n",
+ i, obj->filename);
+
+ return -EINVAL;
+ }
+ continue;
+ }
+ if (sym->st_shndx < SHN_LORESERVE && sym->st_shndx >= obj->sec_cnt) {
+ pr_warn("ELF sym #%d in section #%zu points to missing section #%zu in %s\n",
+ i, sec->sec_idx, (size_t)sym->st_shndx, obj->filename);
+ return -EINVAL;
+ }
+ if (sym_type == STT_SECTION) {
+ if (sym->st_value != 0)
+ return -EINVAL;
+ continue;
+ }
+ }
+
+ return 0;
+}
+
+static int linker_sanity_check_elf_relos(struct src_obj *obj, struct src_sec *sec)
+{
+ struct src_sec *link_sec, *sym_sec;
+ Elf64_Rel *relo;
+ int i, n;
+
+ if (sec->shdr->sh_entsize != sizeof(Elf64_Rel))
+ return -EINVAL;
+ if (sec->shdr->sh_size % sec->shdr->sh_entsize != 0)
+ return -EINVAL;
+
+ /* SHT_REL's sh_link should point to SYMTAB */
+ if (sec->shdr->sh_link != obj->symtab_sec_idx) {
+ pr_warn("ELF relo section #%zu points to invalid SYMTAB section #%zu in %s\n",
+ sec->sec_idx, (size_t)sec->shdr->sh_link, obj->filename);
+ return -EINVAL;
+ }
+
+ /* SHT_REL's sh_info points to relocated section */
+ if (!sec->shdr->sh_info || sec->shdr->sh_info >= obj->sec_cnt) {
+ pr_warn("ELF relo section #%zu points to missing section #%zu in %s\n",
+ sec->sec_idx, (size_t)sec->shdr->sh_info, obj->filename);
+ return -EINVAL;
+ }
+ link_sec = &obj->secs[sec->shdr->sh_info];
+
+ /* .rel<secname> -> <secname> pattern is followed */
+ if (strncmp(sec->sec_name, ".rel", sizeof(".rel") - 1) != 0
+ || strcmp(sec->sec_name + sizeof(".rel") - 1, link_sec->sec_name) != 0) {
+ pr_warn("ELF relo section #%zu name has invalid name in %s\n",
+ sec->sec_idx, obj->filename);
+ return -EINVAL;
+ }
+
+ /* don't further validate relocations for ignored sections */
+ if (link_sec->skipped)
+ return 0;
+
+ /* relocatable section is data or instructions */
+ if (link_sec->shdr->sh_type != SHT_PROGBITS && link_sec->shdr->sh_type != SHT_NOBITS) {
+ pr_warn("ELF relo section #%zu points to invalid section #%zu in %s\n",
+ sec->sec_idx, (size_t)sec->shdr->sh_info, obj->filename);
+ return -EINVAL;
+ }
+
+ /* check sanity of each relocation */
+ n = sec->shdr->sh_size / sec->shdr->sh_entsize;
+ relo = sec->data->d_buf;
+ sym_sec = &obj->secs[obj->symtab_sec_idx];
+ for (i = 0; i < n; i++, relo++) {
+ size_t sym_idx = ELF64_R_SYM(relo->r_info);
+ size_t sym_type = ELF64_R_TYPE(relo->r_info);
+
+ if (sym_type != R_BPF_64_64 && sym_type != R_BPF_64_32 &&
+ sym_type != R_BPF_64_ABS64 && sym_type != R_BPF_64_ABS32) {
+ pr_warn("ELF relo #%d in section #%zu has unexpected type %zu in %s\n",
+ i, sec->sec_idx, sym_type, obj->filename);
+ return -EINVAL;
+ }
+
+ if (!sym_idx || sym_idx * sizeof(Elf64_Sym) >= sym_sec->shdr->sh_size) {
+ pr_warn("ELF relo #%d in section #%zu points to invalid symbol #%zu in %s\n",
+ i, sec->sec_idx, sym_idx, obj->filename);
+ return -EINVAL;
+ }
+
+ if (link_sec->shdr->sh_flags & SHF_EXECINSTR) {
+ if (relo->r_offset % sizeof(struct bpf_insn) != 0) {
+ pr_warn("ELF relo #%d in section #%zu points to missing symbol #%zu in %s\n",
+ i, sec->sec_idx, sym_idx, obj->filename);
+ return -EINVAL;
+ }
+ }
+ }
+
+ return 0;
+}
+
+static int check_btf_type_id(__u32 *type_id, void *ctx)
+{
+ struct btf *btf = ctx;
+
+ if (*type_id >= btf__type_cnt(btf))
+ return -EINVAL;
+
+ return 0;
+}
+
+static int check_btf_str_off(__u32 *str_off, void *ctx)
+{
+ struct btf *btf = ctx;
+ const char *s;
+
+ s = btf__str_by_offset(btf, *str_off);
+
+ if (!s)
+ return -EINVAL;
+
+ return 0;
+}
+
+static int linker_sanity_check_btf(struct src_obj *obj)
+{
+ struct btf_type *t;
+ int i, n, err = 0;
+
+ if (!obj->btf)
+ return 0;
+
+ n = btf__type_cnt(obj->btf);
+ for (i = 1; i < n; i++) {
+ t = btf_type_by_id(obj->btf, i);
+
+ err = err ?: btf_type_visit_type_ids(t, check_btf_type_id, obj->btf);
+ err = err ?: btf_type_visit_str_offs(t, check_btf_str_off, obj->btf);
+ if (err)
+ return err;
+ }
+
+ return 0;
+}
+
+static int linker_sanity_check_btf_ext(struct src_obj *obj)
+{
+ int err = 0;
+
+ if (!obj->btf_ext)
+ return 0;
+
+ /* can't use .BTF.ext without .BTF */
+ if (!obj->btf)
+ return -EINVAL;
+
+ err = err ?: btf_ext_visit_type_ids(obj->btf_ext, check_btf_type_id, obj->btf);
+ err = err ?: btf_ext_visit_str_offs(obj->btf_ext, check_btf_str_off, obj->btf);
+ if (err)
+ return err;
+
+ return 0;
+}
+
+static int init_sec(struct bpf_linker *linker, struct dst_sec *dst_sec, struct src_sec *src_sec)
+{
+ Elf_Scn *scn;
+ Elf_Data *data;
+ Elf64_Shdr *shdr;
+ int name_off;
+
+ dst_sec->sec_sz = 0;
+ dst_sec->sec_idx = 0;
+ dst_sec->ephemeral = src_sec->ephemeral;
+
+ /* ephemeral sections are just thin section shells lacking most parts */
+ if (src_sec->ephemeral)
+ return 0;
+
+ scn = elf_newscn(linker->elf);
+ if (!scn)
+ return -ENOMEM;
+ data = elf_newdata(scn);
+ if (!data)
+ return -ENOMEM;
+ shdr = elf64_getshdr(scn);
+ if (!shdr)
+ return -ENOMEM;
+
+ dst_sec->scn = scn;
+ dst_sec->shdr = shdr;
+ dst_sec->data = data;
+ dst_sec->sec_idx = elf_ndxscn(scn);
+
+ name_off = strset__add_str(linker->strtab_strs, src_sec->sec_name);
+ if (name_off < 0)
+ return name_off;
+
+ shdr->sh_name = name_off;
+ shdr->sh_type = src_sec->shdr->sh_type;
+ shdr->sh_flags = src_sec->shdr->sh_flags;
+ shdr->sh_size = 0;
+ /* sh_link and sh_info have different meaning for different types of
+ * sections, so we leave it up to the caller code to fill them in, if
+ * necessary
+ */
+ shdr->sh_link = 0;
+ shdr->sh_info = 0;
+ shdr->sh_addralign = src_sec->shdr->sh_addralign;
+ shdr->sh_entsize = src_sec->shdr->sh_entsize;
+
+ data->d_type = src_sec->data->d_type;
+ data->d_size = 0;
+ data->d_buf = NULL;
+ data->d_align = src_sec->data->d_align;
+ data->d_off = 0;
+
+ return 0;
+}
+
+static struct dst_sec *find_dst_sec_by_name(struct bpf_linker *linker, const char *sec_name)
+{
+ struct dst_sec *sec;
+ int i;
+
+ for (i = 1; i < linker->sec_cnt; i++) {
+ sec = &linker->secs[i];
+
+ if (strcmp(sec->sec_name, sec_name) == 0)
+ return sec;
+ }
+
+ return NULL;
+}
+
+static bool secs_match(struct dst_sec *dst, struct src_sec *src)
+{
+ if (dst->ephemeral || src->ephemeral)
+ return true;
+
+ if (dst->shdr->sh_type != src->shdr->sh_type) {
+ pr_warn("sec %s types mismatch\n", dst->sec_name);
+ return false;
+ }
+ if (dst->shdr->sh_flags != src->shdr->sh_flags) {
+ pr_warn("sec %s flags mismatch\n", dst->sec_name);
+ return false;
+ }
+ if (dst->shdr->sh_entsize != src->shdr->sh_entsize) {
+ pr_warn("sec %s entsize mismatch\n", dst->sec_name);
+ return false;
+ }
+
+ return true;
+}
+
+static bool sec_content_is_same(struct dst_sec *dst_sec, struct src_sec *src_sec)
+{
+ if (dst_sec->sec_sz != src_sec->shdr->sh_size)
+ return false;
+ if (memcmp(dst_sec->raw_data, src_sec->data->d_buf, dst_sec->sec_sz) != 0)
+ return false;
+ return true;
+}
+
+static int extend_sec(struct bpf_linker *linker, struct dst_sec *dst, struct src_sec *src)
+{
+ void *tmp;
+ size_t dst_align, src_align;
+ size_t dst_align_sz, dst_final_sz;
+ int err;
+
+ /* Ephemeral source section doesn't contribute anything to ELF
+ * section data.
+ */
+ if (src->ephemeral)
+ return 0;
+
+ /* Some sections (like .maps) can contain both externs (and thus be
+ * ephemeral) and non-externs (map definitions). So it's possible that
+ * it has to be "upgraded" from ephemeral to non-ephemeral when the
+ * first non-ephemeral entity appears. In such case, we add ELF
+ * section, data, etc.
+ */
+ if (dst->ephemeral) {
+ err = init_sec(linker, dst, src);
+ if (err)
+ return err;
+ }
+
+ dst_align = dst->shdr->sh_addralign;
+ src_align = src->shdr->sh_addralign;
+ if (dst_align == 0)
+ dst_align = 1;
+ if (dst_align < src_align)
+ dst_align = src_align;
+
+ dst_align_sz = (dst->sec_sz + dst_align - 1) / dst_align * dst_align;
+
+ /* no need to re-align final size */
+ dst_final_sz = dst_align_sz + src->shdr->sh_size;
+
+ if (src->shdr->sh_type != SHT_NOBITS) {
+ tmp = realloc(dst->raw_data, dst_final_sz);
+ if (!tmp)
+ return -ENOMEM;
+ dst->raw_data = tmp;
+
+ /* pad dst section, if it's alignment forced size increase */
+ memset(dst->raw_data + dst->sec_sz, 0, dst_align_sz - dst->sec_sz);
+ /* now copy src data at a properly aligned offset */
+ memcpy(dst->raw_data + dst_align_sz, src->data->d_buf, src->shdr->sh_size);
+ }
+
+ dst->sec_sz = dst_final_sz;
+ dst->shdr->sh_size = dst_final_sz;
+ dst->data->d_size = dst_final_sz;
+
+ dst->shdr->sh_addralign = dst_align;
+ dst->data->d_align = dst_align;
+
+ src->dst_off = dst_align_sz;
+
+ return 0;
+}
+
+static bool is_data_sec(struct src_sec *sec)
+{
+ if (!sec || sec->skipped)
+ return false;
+ /* ephemeral sections are data sections, e.g., .kconfig, .ksyms */
+ if (sec->ephemeral)
+ return true;
+ return sec->shdr->sh_type == SHT_PROGBITS || sec->shdr->sh_type == SHT_NOBITS;
+}
+
+static bool is_relo_sec(struct src_sec *sec)
+{
+ if (!sec || sec->skipped || sec->ephemeral)
+ return false;
+ return sec->shdr->sh_type == SHT_REL;
+}
+
+static int linker_append_sec_data(struct bpf_linker *linker, struct src_obj *obj)
+{
+ int i, err;
+
+ for (i = 1; i < obj->sec_cnt; i++) {
+ struct src_sec *src_sec;
+ struct dst_sec *dst_sec;
+
+ src_sec = &obj->secs[i];
+ if (!is_data_sec(src_sec))
+ continue;
+
+ dst_sec = find_dst_sec_by_name(linker, src_sec->sec_name);
+ if (!dst_sec) {
+ dst_sec = add_dst_sec(linker, src_sec->sec_name);
+ if (!dst_sec)
+ return -ENOMEM;
+ err = init_sec(linker, dst_sec, src_sec);
+ if (err) {
+ pr_warn("failed to init section '%s'\n", src_sec->sec_name);
+ return err;
+ }
+ } else {
+ if (!secs_match(dst_sec, src_sec)) {
+ pr_warn("ELF sections %s are incompatible\n", src_sec->sec_name);
+ return -1;
+ }
+
+ /* "license" and "version" sections are deduped */
+ if (strcmp(src_sec->sec_name, "license") == 0
+ || strcmp(src_sec->sec_name, "version") == 0) {
+ if (!sec_content_is_same(dst_sec, src_sec)) {
+ pr_warn("non-identical contents of section '%s' are not supported\n", src_sec->sec_name);
+ return -EINVAL;
+ }
+ src_sec->skipped = true;
+ src_sec->dst_id = dst_sec->id;
+ continue;
+ }
+ }
+
+ /* record mapped section index */
+ src_sec->dst_id = dst_sec->id;
+
+ err = extend_sec(linker, dst_sec, src_sec);
+ if (err)
+ return err;
+ }
+
+ return 0;
+}
+
+static int linker_append_elf_syms(struct bpf_linker *linker, struct src_obj *obj)
+{
+ struct src_sec *symtab = &obj->secs[obj->symtab_sec_idx];
+ Elf64_Sym *sym = symtab->data->d_buf;
+ int i, n = symtab->shdr->sh_size / symtab->shdr->sh_entsize, err;
+ int str_sec_idx = symtab->shdr->sh_link;
+ const char *sym_name;
+
+ obj->sym_map = calloc(n + 1, sizeof(*obj->sym_map));
+ if (!obj->sym_map)
+ return -ENOMEM;
+
+ for (i = 0; i < n; i++, sym++) {
+ /* We already validated all-zero symbol #0 and we already
+ * appended it preventively to the final SYMTAB, so skip it.
+ */
+ if (i == 0)
+ continue;
+
+ sym_name = elf_strptr(obj->elf, str_sec_idx, sym->st_name);
+ if (!sym_name) {
+ pr_warn("can't fetch symbol name for symbol #%d in '%s'\n", i, obj->filename);
+ return -EINVAL;
+ }
+
+ err = linker_append_elf_sym(linker, obj, sym, sym_name, i);
+ if (err)
+ return err;
+ }
+
+ return 0;
+}
+
+static Elf64_Sym *get_sym_by_idx(struct bpf_linker *linker, size_t sym_idx)
+{
+ struct dst_sec *symtab = &linker->secs[linker->symtab_sec_idx];
+ Elf64_Sym *syms = symtab->raw_data;
+
+ return &syms[sym_idx];
+}
+
+static struct glob_sym *find_glob_sym(struct bpf_linker *linker, const char *sym_name)
+{
+ struct glob_sym *glob_sym;
+ const char *name;
+ int i;
+
+ for (i = 0; i < linker->glob_sym_cnt; i++) {
+ glob_sym = &linker->glob_syms[i];
+ name = strset__data(linker->strtab_strs) + glob_sym->name_off;
+
+ if (strcmp(name, sym_name) == 0)
+ return glob_sym;
+ }
+
+ return NULL;
+}
+
+static struct glob_sym *add_glob_sym(struct bpf_linker *linker)
+{
+ struct glob_sym *syms, *sym;
+
+ syms = libbpf_reallocarray(linker->glob_syms, linker->glob_sym_cnt + 1,
+ sizeof(*linker->glob_syms));
+ if (!syms)
+ return NULL;
+
+ sym = &syms[linker->glob_sym_cnt];
+ memset(sym, 0, sizeof(*sym));
+ sym->var_idx = -1;
+
+ linker->glob_syms = syms;
+ linker->glob_sym_cnt++;
+
+ return sym;
+}
+
+static bool glob_sym_btf_matches(const char *sym_name, bool exact,
+ const struct btf *btf1, __u32 id1,
+ const struct btf *btf2, __u32 id2)
+{
+ const struct btf_type *t1, *t2;
+ bool is_static1, is_static2;
+ const char *n1, *n2;
+ int i, n;
+
+recur:
+ n1 = n2 = NULL;
+ t1 = skip_mods_and_typedefs(btf1, id1, &id1);
+ t2 = skip_mods_and_typedefs(btf2, id2, &id2);
+
+ /* check if only one side is FWD, otherwise handle with common logic */
+ if (!exact && btf_is_fwd(t1) != btf_is_fwd(t2)) {
+ n1 = btf__str_by_offset(btf1, t1->name_off);
+ n2 = btf__str_by_offset(btf2, t2->name_off);
+ if (strcmp(n1, n2) != 0) {
+ pr_warn("global '%s': incompatible forward declaration names '%s' and '%s'\n",
+ sym_name, n1, n2);
+ return false;
+ }
+ /* validate if FWD kind matches concrete kind */
+ if (btf_is_fwd(t1)) {
+ if (btf_kflag(t1) && btf_is_union(t2))
+ return true;
+ if (!btf_kflag(t1) && btf_is_struct(t2))
+ return true;
+ pr_warn("global '%s': incompatible %s forward declaration and concrete kind %s\n",
+ sym_name, btf_kflag(t1) ? "union" : "struct", btf_kind_str(t2));
+ } else {
+ if (btf_kflag(t2) && btf_is_union(t1))
+ return true;
+ if (!btf_kflag(t2) && btf_is_struct(t1))
+ return true;
+ pr_warn("global '%s': incompatible %s forward declaration and concrete kind %s\n",
+ sym_name, btf_kflag(t2) ? "union" : "struct", btf_kind_str(t1));
+ }
+ return false;
+ }
+
+ if (btf_kind(t1) != btf_kind(t2)) {
+ pr_warn("global '%s': incompatible BTF kinds %s and %s\n",
+ sym_name, btf_kind_str(t1), btf_kind_str(t2));
+ return false;
+ }
+
+ switch (btf_kind(t1)) {
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION:
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ case BTF_KIND_FWD:
+ case BTF_KIND_FUNC:
+ case BTF_KIND_VAR:
+ n1 = btf__str_by_offset(btf1, t1->name_off);
+ n2 = btf__str_by_offset(btf2, t2->name_off);
+ if (strcmp(n1, n2) != 0) {
+ pr_warn("global '%s': incompatible %s names '%s' and '%s'\n",
+ sym_name, btf_kind_str(t1), n1, n2);
+ return false;
+ }
+ break;
+ default:
+ break;
+ }
+
+ switch (btf_kind(t1)) {
+ case BTF_KIND_UNKN: /* void */
+ case BTF_KIND_FWD:
+ return true;
+ case BTF_KIND_INT:
+ case BTF_KIND_FLOAT:
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ /* ignore encoding for int and enum values for enum */
+ if (t1->size != t2->size) {
+ pr_warn("global '%s': incompatible %s '%s' size %u and %u\n",
+ sym_name, btf_kind_str(t1), n1, t1->size, t2->size);
+ return false;
+ }
+ return true;
+ case BTF_KIND_PTR:
+ /* just validate overall shape of the referenced type, so no
+ * contents comparison for struct/union, and allowd fwd vs
+ * struct/union
+ */
+ exact = false;
+ id1 = t1->type;
+ id2 = t2->type;
+ goto recur;
+ case BTF_KIND_ARRAY:
+ /* ignore index type and array size */
+ id1 = btf_array(t1)->type;
+ id2 = btf_array(t2)->type;
+ goto recur;
+ case BTF_KIND_FUNC:
+ /* extern and global linkages are compatible */
+ is_static1 = btf_func_linkage(t1) == BTF_FUNC_STATIC;
+ is_static2 = btf_func_linkage(t2) == BTF_FUNC_STATIC;
+ if (is_static1 != is_static2) {
+ pr_warn("global '%s': incompatible func '%s' linkage\n", sym_name, n1);
+ return false;
+ }
+
+ id1 = t1->type;
+ id2 = t2->type;
+ goto recur;
+ case BTF_KIND_VAR:
+ /* extern and global linkages are compatible */
+ is_static1 = btf_var(t1)->linkage == BTF_VAR_STATIC;
+ is_static2 = btf_var(t2)->linkage == BTF_VAR_STATIC;
+ if (is_static1 != is_static2) {
+ pr_warn("global '%s': incompatible var '%s' linkage\n", sym_name, n1);
+ return false;
+ }
+
+ id1 = t1->type;
+ id2 = t2->type;
+ goto recur;
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION: {
+ const struct btf_member *m1, *m2;
+
+ if (!exact)
+ return true;
+
+ if (btf_vlen(t1) != btf_vlen(t2)) {
+ pr_warn("global '%s': incompatible number of %s fields %u and %u\n",
+ sym_name, btf_kind_str(t1), btf_vlen(t1), btf_vlen(t2));
+ return false;
+ }
+
+ n = btf_vlen(t1);
+ m1 = btf_members(t1);
+ m2 = btf_members(t2);
+ for (i = 0; i < n; i++, m1++, m2++) {
+ n1 = btf__str_by_offset(btf1, m1->name_off);
+ n2 = btf__str_by_offset(btf2, m2->name_off);
+ if (strcmp(n1, n2) != 0) {
+ pr_warn("global '%s': incompatible field #%d names '%s' and '%s'\n",
+ sym_name, i, n1, n2);
+ return false;
+ }
+ if (m1->offset != m2->offset) {
+ pr_warn("global '%s': incompatible field #%d ('%s') offsets\n",
+ sym_name, i, n1);
+ return false;
+ }
+ if (!glob_sym_btf_matches(sym_name, exact, btf1, m1->type, btf2, m2->type))
+ return false;
+ }
+
+ return true;
+ }
+ case BTF_KIND_FUNC_PROTO: {
+ const struct btf_param *m1, *m2;
+
+ if (btf_vlen(t1) != btf_vlen(t2)) {
+ pr_warn("global '%s': incompatible number of %s params %u and %u\n",
+ sym_name, btf_kind_str(t1), btf_vlen(t1), btf_vlen(t2));
+ return false;
+ }
+
+ n = btf_vlen(t1);
+ m1 = btf_params(t1);
+ m2 = btf_params(t2);
+ for (i = 0; i < n; i++, m1++, m2++) {
+ /* ignore func arg names */
+ if (!glob_sym_btf_matches(sym_name, exact, btf1, m1->type, btf2, m2->type))
+ return false;
+ }
+
+ /* now check return type as well */
+ id1 = t1->type;
+ id2 = t2->type;
+ goto recur;
+ }
+
+ /* skip_mods_and_typedefs() make this impossible */
+ case BTF_KIND_TYPEDEF:
+ case BTF_KIND_VOLATILE:
+ case BTF_KIND_CONST:
+ case BTF_KIND_RESTRICT:
+ /* DATASECs are never compared with each other */
+ case BTF_KIND_DATASEC:
+ default:
+ pr_warn("global '%s': unsupported BTF kind %s\n",
+ sym_name, btf_kind_str(t1));
+ return false;
+ }
+}
+
+static bool map_defs_match(const char *sym_name,
+ const struct btf *main_btf,
+ const struct btf_map_def *main_def,
+ const struct btf_map_def *main_inner_def,
+ const struct btf *extra_btf,
+ const struct btf_map_def *extra_def,
+ const struct btf_map_def *extra_inner_def)
+{
+ const char *reason;
+
+ if (main_def->map_type != extra_def->map_type) {
+ reason = "type";
+ goto mismatch;
+ }
+
+ /* check key type/size match */
+ if (main_def->key_size != extra_def->key_size) {
+ reason = "key_size";
+ goto mismatch;
+ }
+ if (!!main_def->key_type_id != !!extra_def->key_type_id) {
+ reason = "key type";
+ goto mismatch;
+ }
+ if ((main_def->parts & MAP_DEF_KEY_TYPE)
+ && !glob_sym_btf_matches(sym_name, true /*exact*/,
+ main_btf, main_def->key_type_id,
+ extra_btf, extra_def->key_type_id)) {
+ reason = "key type";
+ goto mismatch;
+ }
+
+ /* validate value type/size match */
+ if (main_def->value_size != extra_def->value_size) {
+ reason = "value_size";
+ goto mismatch;
+ }
+ if (!!main_def->value_type_id != !!extra_def->value_type_id) {
+ reason = "value type";
+ goto mismatch;
+ }
+ if ((main_def->parts & MAP_DEF_VALUE_TYPE)
+ && !glob_sym_btf_matches(sym_name, true /*exact*/,
+ main_btf, main_def->value_type_id,
+ extra_btf, extra_def->value_type_id)) {
+ reason = "key type";
+ goto mismatch;
+ }
+
+ if (main_def->max_entries != extra_def->max_entries) {
+ reason = "max_entries";
+ goto mismatch;
+ }
+ if (main_def->map_flags != extra_def->map_flags) {
+ reason = "map_flags";
+ goto mismatch;
+ }
+ if (main_def->numa_node != extra_def->numa_node) {
+ reason = "numa_node";
+ goto mismatch;
+ }
+ if (main_def->pinning != extra_def->pinning) {
+ reason = "pinning";
+ goto mismatch;
+ }
+
+ if ((main_def->parts & MAP_DEF_INNER_MAP) != (extra_def->parts & MAP_DEF_INNER_MAP)) {
+ reason = "inner map";
+ goto mismatch;
+ }
+
+ if (main_def->parts & MAP_DEF_INNER_MAP) {
+ char inner_map_name[128];
+
+ snprintf(inner_map_name, sizeof(inner_map_name), "%s.inner", sym_name);
+
+ return map_defs_match(inner_map_name,
+ main_btf, main_inner_def, NULL,
+ extra_btf, extra_inner_def, NULL);
+ }
+
+ return true;
+
+mismatch:
+ pr_warn("global '%s': map %s mismatch\n", sym_name, reason);
+ return false;
+}
+
+static bool glob_map_defs_match(const char *sym_name,
+ struct bpf_linker *linker, struct glob_sym *glob_sym,
+ struct src_obj *obj, Elf64_Sym *sym, int btf_id)
+{
+ struct btf_map_def dst_def = {}, dst_inner_def = {};
+ struct btf_map_def src_def = {}, src_inner_def = {};
+ const struct btf_type *t;
+ int err;
+
+ t = btf__type_by_id(obj->btf, btf_id);
+ if (!btf_is_var(t)) {
+ pr_warn("global '%s': invalid map definition type [%d]\n", sym_name, btf_id);
+ return false;
+ }
+ t = skip_mods_and_typedefs(obj->btf, t->type, NULL);
+
+ err = parse_btf_map_def(sym_name, obj->btf, t, true /*strict*/, &src_def, &src_inner_def);
+ if (err) {
+ pr_warn("global '%s': invalid map definition\n", sym_name);
+ return false;
+ }
+
+ /* re-parse existing map definition */
+ t = btf__type_by_id(linker->btf, glob_sym->btf_id);
+ t = skip_mods_and_typedefs(linker->btf, t->type, NULL);
+ err = parse_btf_map_def(sym_name, linker->btf, t, true /*strict*/, &dst_def, &dst_inner_def);
+ if (err) {
+ /* this should not happen, because we already validated it */
+ pr_warn("global '%s': invalid dst map definition\n", sym_name);
+ return false;
+ }
+
+ /* Currently extern map definition has to be complete and match
+ * concrete map definition exactly. This restriction might be lifted
+ * in the future.
+ */
+ return map_defs_match(sym_name, linker->btf, &dst_def, &dst_inner_def,
+ obj->btf, &src_def, &src_inner_def);
+}
+
+static bool glob_syms_match(const char *sym_name,
+ struct bpf_linker *linker, struct glob_sym *glob_sym,
+ struct src_obj *obj, Elf64_Sym *sym, size_t sym_idx, int btf_id)
+{
+ const struct btf_type *src_t;
+
+ /* if we are dealing with externs, BTF types describing both global
+ * and extern VARs/FUNCs should be completely present in all files
+ */
+ if (!glob_sym->btf_id || !btf_id) {
+ pr_warn("BTF info is missing for global symbol '%s'\n", sym_name);
+ return false;
+ }
+
+ src_t = btf__type_by_id(obj->btf, btf_id);
+ if (!btf_is_var(src_t) && !btf_is_func(src_t)) {
+ pr_warn("only extern variables and functions are supported, but got '%s' for '%s'\n",
+ btf_kind_str(src_t), sym_name);
+ return false;
+ }
+
+ /* deal with .maps definitions specially */
+ if (glob_sym->sec_id && strcmp(linker->secs[glob_sym->sec_id].sec_name, MAPS_ELF_SEC) == 0)
+ return glob_map_defs_match(sym_name, linker, glob_sym, obj, sym, btf_id);
+
+ if (!glob_sym_btf_matches(sym_name, true /*exact*/,
+ linker->btf, glob_sym->btf_id, obj->btf, btf_id))
+ return false;
+
+ return true;
+}
+
+static bool btf_is_non_static(const struct btf_type *t)
+{
+ return (btf_is_var(t) && btf_var(t)->linkage != BTF_VAR_STATIC)
+ || (btf_is_func(t) && btf_func_linkage(t) != BTF_FUNC_STATIC);
+}
+
+static int find_glob_sym_btf(struct src_obj *obj, Elf64_Sym *sym, const char *sym_name,
+ int *out_btf_sec_id, int *out_btf_id)
+{
+ int i, j, n, m, btf_id = 0;
+ const struct btf_type *t;
+ const struct btf_var_secinfo *vi;
+ const char *name;
+
+ if (!obj->btf) {
+ pr_warn("failed to find BTF info for object '%s'\n", obj->filename);
+ return -EINVAL;
+ }
+
+ n = btf__type_cnt(obj->btf);
+ for (i = 1; i < n; i++) {
+ t = btf__type_by_id(obj->btf, i);
+
+ /* some global and extern FUNCs and VARs might not be associated with any
+ * DATASEC, so try to detect them in the same pass
+ */
+ if (btf_is_non_static(t)) {
+ name = btf__str_by_offset(obj->btf, t->name_off);
+ if (strcmp(name, sym_name) != 0)
+ continue;
+
+ /* remember and still try to find DATASEC */
+ btf_id = i;
+ continue;
+ }
+
+ if (!btf_is_datasec(t))
+ continue;
+
+ vi = btf_var_secinfos(t);
+ for (j = 0, m = btf_vlen(t); j < m; j++, vi++) {
+ t = btf__type_by_id(obj->btf, vi->type);
+ name = btf__str_by_offset(obj->btf, t->name_off);
+
+ if (strcmp(name, sym_name) != 0)
+ continue;
+ if (btf_is_var(t) && btf_var(t)->linkage == BTF_VAR_STATIC)
+ continue;
+ if (btf_is_func(t) && btf_func_linkage(t) == BTF_FUNC_STATIC)
+ continue;
+
+ if (btf_id && btf_id != vi->type) {
+ pr_warn("global/extern '%s' BTF is ambiguous: both types #%d and #%u match\n",
+ sym_name, btf_id, vi->type);
+ return -EINVAL;
+ }
+
+ *out_btf_sec_id = i;
+ *out_btf_id = vi->type;
+
+ return 0;
+ }
+ }
+
+ /* free-floating extern or global FUNC */
+ if (btf_id) {
+ *out_btf_sec_id = 0;
+ *out_btf_id = btf_id;
+ return 0;
+ }
+
+ pr_warn("failed to find BTF info for global/extern symbol '%s'\n", sym_name);
+ return -ENOENT;
+}
+
+static struct src_sec *find_src_sec_by_name(struct src_obj *obj, const char *sec_name)
+{
+ struct src_sec *sec;
+ int i;
+
+ for (i = 1; i < obj->sec_cnt; i++) {
+ sec = &obj->secs[i];
+
+ if (strcmp(sec->sec_name, sec_name) == 0)
+ return sec;
+ }
+
+ return NULL;
+}
+
+static int complete_extern_btf_info(struct btf *dst_btf, int dst_id,
+ struct btf *src_btf, int src_id)
+{
+ struct btf_type *dst_t = btf_type_by_id(dst_btf, dst_id);
+ struct btf_type *src_t = btf_type_by_id(src_btf, src_id);
+ struct btf_param *src_p, *dst_p;
+ const char *s;
+ int i, n, off;
+
+ /* We already made sure that source and destination types (FUNC or
+ * VAR) match in terms of types and argument names.
+ */
+ if (btf_is_var(dst_t)) {
+ btf_var(dst_t)->linkage = BTF_VAR_GLOBAL_ALLOCATED;
+ return 0;
+ }
+
+ dst_t->info = btf_type_info(BTF_KIND_FUNC, BTF_FUNC_GLOBAL, 0);
+
+ /* now onto FUNC_PROTO types */
+ src_t = btf_type_by_id(src_btf, src_t->type);
+ dst_t = btf_type_by_id(dst_btf, dst_t->type);
+
+ /* Fill in all the argument names, which for extern FUNCs are missing.
+ * We'll end up with two copies of FUNCs/VARs for externs, but that
+ * will be taken care of by BTF dedup at the very end.
+ * It might be that BTF types for extern in one file has less/more BTF
+ * information (e.g., FWD instead of full STRUCT/UNION information),
+ * but that should be (in most cases, subject to BTF dedup rules)
+ * handled and resolved by BTF dedup algorithm as well, so we won't
+ * worry about it. Our only job is to make sure that argument names
+ * are populated on both sides, otherwise BTF dedup will pedantically
+ * consider them different.
+ */
+ src_p = btf_params(src_t);
+ dst_p = btf_params(dst_t);
+ for (i = 0, n = btf_vlen(dst_t); i < n; i++, src_p++, dst_p++) {
+ if (!src_p->name_off)
+ continue;
+
+ /* src_btf has more complete info, so add name to dst_btf */
+ s = btf__str_by_offset(src_btf, src_p->name_off);
+ off = btf__add_str(dst_btf, s);
+ if (off < 0)
+ return off;
+ dst_p->name_off = off;
+ }
+ return 0;
+}
+
+static void sym_update_bind(Elf64_Sym *sym, int sym_bind)
+{
+ sym->st_info = ELF64_ST_INFO(sym_bind, ELF64_ST_TYPE(sym->st_info));
+}
+
+static void sym_update_type(Elf64_Sym *sym, int sym_type)
+{
+ sym->st_info = ELF64_ST_INFO(ELF64_ST_BIND(sym->st_info), sym_type);
+}
+
+static void sym_update_visibility(Elf64_Sym *sym, int sym_vis)
+{
+ /* libelf doesn't provide setters for ST_VISIBILITY,
+ * but it is stored in the lower 2 bits of st_other
+ */
+ sym->st_other &= ~0x03;
+ sym->st_other |= sym_vis;
+}
+
+static int linker_append_elf_sym(struct bpf_linker *linker, struct src_obj *obj,
+ Elf64_Sym *sym, const char *sym_name, int src_sym_idx)
+{
+ struct src_sec *src_sec = NULL;
+ struct dst_sec *dst_sec = NULL;
+ struct glob_sym *glob_sym = NULL;
+ int name_off, sym_type, sym_bind, sym_vis, err;
+ int btf_sec_id = 0, btf_id = 0;
+ size_t dst_sym_idx;
+ Elf64_Sym *dst_sym;
+ bool sym_is_extern;
+
+ sym_type = ELF64_ST_TYPE(sym->st_info);
+ sym_bind = ELF64_ST_BIND(sym->st_info);
+ sym_vis = ELF64_ST_VISIBILITY(sym->st_other);
+ sym_is_extern = sym->st_shndx == SHN_UNDEF;
+
+ if (sym_is_extern) {
+ if (!obj->btf) {
+ pr_warn("externs without BTF info are not supported\n");
+ return -ENOTSUP;
+ }
+ } else if (sym->st_shndx < SHN_LORESERVE) {
+ src_sec = &obj->secs[sym->st_shndx];
+ if (src_sec->skipped)
+ return 0;
+ dst_sec = &linker->secs[src_sec->dst_id];
+
+ /* allow only one STT_SECTION symbol per section */
+ if (sym_type == STT_SECTION && dst_sec->sec_sym_idx) {
+ obj->sym_map[src_sym_idx] = dst_sec->sec_sym_idx;
+ return 0;
+ }
+ }
+
+ if (sym_bind == STB_LOCAL)
+ goto add_sym;
+
+ /* find matching BTF info */
+ err = find_glob_sym_btf(obj, sym, sym_name, &btf_sec_id, &btf_id);
+ if (err)
+ return err;
+
+ if (sym_is_extern && btf_sec_id) {
+ const char *sec_name = NULL;
+ const struct btf_type *t;
+
+ t = btf__type_by_id(obj->btf, btf_sec_id);
+ sec_name = btf__str_by_offset(obj->btf, t->name_off);
+
+ /* Clang puts unannotated extern vars into
+ * '.extern' BTF DATASEC. Treat them the same
+ * as unannotated extern funcs (which are
+ * currently not put into any DATASECs).
+ * Those don't have associated src_sec/dst_sec.
+ */
+ if (strcmp(sec_name, BTF_EXTERN_SEC) != 0) {
+ src_sec = find_src_sec_by_name(obj, sec_name);
+ if (!src_sec) {
+ pr_warn("failed to find matching ELF sec '%s'\n", sec_name);
+ return -ENOENT;
+ }
+ dst_sec = &linker->secs[src_sec->dst_id];
+ }
+ }
+
+ glob_sym = find_glob_sym(linker, sym_name);
+ if (glob_sym) {
+ /* Preventively resolve to existing symbol. This is
+ * needed for further relocation symbol remapping in
+ * the next step of linking.
+ */
+ obj->sym_map[src_sym_idx] = glob_sym->sym_idx;
+
+ /* If both symbols are non-externs, at least one of
+ * them has to be STB_WEAK, otherwise they are in
+ * a conflict with each other.
+ */
+ if (!sym_is_extern && !glob_sym->is_extern
+ && !glob_sym->is_weak && sym_bind != STB_WEAK) {
+ pr_warn("conflicting non-weak symbol #%d (%s) definition in '%s'\n",
+ src_sym_idx, sym_name, obj->filename);
+ return -EINVAL;
+ }
+
+ if (!glob_syms_match(sym_name, linker, glob_sym, obj, sym, src_sym_idx, btf_id))
+ return -EINVAL;
+
+ dst_sym = get_sym_by_idx(linker, glob_sym->sym_idx);
+
+ /* If new symbol is strong, then force dst_sym to be strong as
+ * well; this way a mix of weak and non-weak extern
+ * definitions will end up being strong.
+ */
+ if (sym_bind == STB_GLOBAL) {
+ /* We still need to preserve type (NOTYPE or
+ * OBJECT/FUNC, depending on whether the symbol is
+ * extern or not)
+ */
+ sym_update_bind(dst_sym, STB_GLOBAL);
+ glob_sym->is_weak = false;
+ }
+
+ /* Non-default visibility is "contaminating", with stricter
+ * visibility overwriting more permissive ones, even if more
+ * permissive visibility comes from just an extern definition.
+ * Currently only STV_DEFAULT and STV_HIDDEN are allowed and
+ * ensured by ELF symbol sanity checks above.
+ */
+ if (sym_vis > ELF64_ST_VISIBILITY(dst_sym->st_other))
+ sym_update_visibility(dst_sym, sym_vis);
+
+ /* If the new symbol is extern, then regardless if
+ * existing symbol is extern or resolved global, just
+ * keep the existing one untouched.
+ */
+ if (sym_is_extern)
+ return 0;
+
+ /* If existing symbol is a strong resolved symbol, bail out,
+ * because we lost resolution battle have nothing to
+ * contribute. We already checked abover that there is no
+ * strong-strong conflict. We also already tightened binding
+ * and visibility, so nothing else to contribute at that point.
+ */
+ if (!glob_sym->is_extern && sym_bind == STB_WEAK)
+ return 0;
+
+ /* At this point, new symbol is strong non-extern,
+ * so overwrite glob_sym with new symbol information.
+ * Preserve binding and visibility.
+ */
+ sym_update_type(dst_sym, sym_type);
+ dst_sym->st_shndx = dst_sec->sec_idx;
+ dst_sym->st_value = src_sec->dst_off + sym->st_value;
+ dst_sym->st_size = sym->st_size;
+
+ /* see comment below about dst_sec->id vs dst_sec->sec_idx */
+ glob_sym->sec_id = dst_sec->id;
+ glob_sym->is_extern = false;
+
+ if (complete_extern_btf_info(linker->btf, glob_sym->btf_id,
+ obj->btf, btf_id))
+ return -EINVAL;
+
+ /* request updating VAR's/FUNC's underlying BTF type when appending BTF type */
+ glob_sym->underlying_btf_id = 0;
+
+ obj->sym_map[src_sym_idx] = glob_sym->sym_idx;
+ return 0;
+ }
+
+add_sym:
+ name_off = strset__add_str(linker->strtab_strs, sym_name);
+ if (name_off < 0)
+ return name_off;
+
+ dst_sym = add_new_sym(linker, &dst_sym_idx);
+ if (!dst_sym)
+ return -ENOMEM;
+
+ dst_sym->st_name = name_off;
+ dst_sym->st_info = sym->st_info;
+ dst_sym->st_other = sym->st_other;
+ dst_sym->st_shndx = dst_sec ? dst_sec->sec_idx : sym->st_shndx;
+ dst_sym->st_value = (src_sec ? src_sec->dst_off : 0) + sym->st_value;
+ dst_sym->st_size = sym->st_size;
+
+ obj->sym_map[src_sym_idx] = dst_sym_idx;
+
+ if (sym_type == STT_SECTION && dst_sym) {
+ dst_sec->sec_sym_idx = dst_sym_idx;
+ dst_sym->st_value = 0;
+ }
+
+ if (sym_bind != STB_LOCAL) {
+ glob_sym = add_glob_sym(linker);
+ if (!glob_sym)
+ return -ENOMEM;
+
+ glob_sym->sym_idx = dst_sym_idx;
+ /* we use dst_sec->id (and not dst_sec->sec_idx), because
+ * ephemeral sections (.kconfig, .ksyms, etc) don't have
+ * sec_idx (as they don't have corresponding ELF section), but
+ * still have id. .extern doesn't have even ephemeral section
+ * associated with it, so dst_sec->id == dst_sec->sec_idx == 0.
+ */
+ glob_sym->sec_id = dst_sec ? dst_sec->id : 0;
+ glob_sym->name_off = name_off;
+ /* we will fill btf_id in during BTF merging step */
+ glob_sym->btf_id = 0;
+ glob_sym->is_extern = sym_is_extern;
+ glob_sym->is_weak = sym_bind == STB_WEAK;
+ }
+
+ return 0;
+}
+
+static int linker_append_elf_relos(struct bpf_linker *linker, struct src_obj *obj)
+{
+ struct src_sec *src_symtab = &obj->secs[obj->symtab_sec_idx];
+ struct dst_sec *dst_symtab;
+ int i, err;
+
+ for (i = 1; i < obj->sec_cnt; i++) {
+ struct src_sec *src_sec, *src_linked_sec;
+ struct dst_sec *dst_sec, *dst_linked_sec;
+ Elf64_Rel *src_rel, *dst_rel;
+ int j, n;
+
+ src_sec = &obj->secs[i];
+ if (!is_relo_sec(src_sec))
+ continue;
+
+ /* shdr->sh_info points to relocatable section */
+ src_linked_sec = &obj->secs[src_sec->shdr->sh_info];
+ if (src_linked_sec->skipped)
+ continue;
+
+ dst_sec = find_dst_sec_by_name(linker, src_sec->sec_name);
+ if (!dst_sec) {
+ dst_sec = add_dst_sec(linker, src_sec->sec_name);
+ if (!dst_sec)
+ return -ENOMEM;
+ err = init_sec(linker, dst_sec, src_sec);
+ if (err) {
+ pr_warn("failed to init section '%s'\n", src_sec->sec_name);
+ return err;
+ }
+ } else if (!secs_match(dst_sec, src_sec)) {
+ pr_warn("sections %s are not compatible\n", src_sec->sec_name);
+ return -1;
+ }
+
+ /* add_dst_sec() above could have invalidated linker->secs */
+ dst_symtab = &linker->secs[linker->symtab_sec_idx];
+
+ /* shdr->sh_link points to SYMTAB */
+ dst_sec->shdr->sh_link = linker->symtab_sec_idx;
+
+ /* shdr->sh_info points to relocated section */
+ dst_linked_sec = &linker->secs[src_linked_sec->dst_id];
+ dst_sec->shdr->sh_info = dst_linked_sec->sec_idx;
+
+ src_sec->dst_id = dst_sec->id;
+ err = extend_sec(linker, dst_sec, src_sec);
+ if (err)
+ return err;
+
+ src_rel = src_sec->data->d_buf;
+ dst_rel = dst_sec->raw_data + src_sec->dst_off;
+ n = src_sec->shdr->sh_size / src_sec->shdr->sh_entsize;
+ for (j = 0; j < n; j++, src_rel++, dst_rel++) {
+ size_t src_sym_idx = ELF64_R_SYM(src_rel->r_info);
+ size_t sym_type = ELF64_R_TYPE(src_rel->r_info);
+ Elf64_Sym *src_sym, *dst_sym;
+ size_t dst_sym_idx;
+
+ src_sym_idx = ELF64_R_SYM(src_rel->r_info);
+ src_sym = src_symtab->data->d_buf + sizeof(*src_sym) * src_sym_idx;
+
+ dst_sym_idx = obj->sym_map[src_sym_idx];
+ dst_sym = dst_symtab->raw_data + sizeof(*dst_sym) * dst_sym_idx;
+ dst_rel->r_offset += src_linked_sec->dst_off;
+ sym_type = ELF64_R_TYPE(src_rel->r_info);
+ dst_rel->r_info = ELF64_R_INFO(dst_sym_idx, sym_type);
+
+ if (ELF64_ST_TYPE(src_sym->st_info) == STT_SECTION) {
+ struct src_sec *sec = &obj->secs[src_sym->st_shndx];
+ struct bpf_insn *insn;
+
+ if (src_linked_sec->shdr->sh_flags & SHF_EXECINSTR) {
+ /* calls to the very first static function inside
+ * .text section at offset 0 will
+ * reference section symbol, not the
+ * function symbol. Fix that up,
+ * otherwise it won't be possible to
+ * relocate calls to two different
+ * static functions with the same name
+ * (rom two different object files)
+ */
+ insn = dst_linked_sec->raw_data + dst_rel->r_offset;
+ if (insn->code == (BPF_JMP | BPF_CALL))
+ insn->imm += sec->dst_off / sizeof(struct bpf_insn);
+ else
+ insn->imm += sec->dst_off;
+ } else {
+ pr_warn("relocation against STT_SECTION in non-exec section is not supported!\n");
+ return -EINVAL;
+ }
+ }
+
+ }
+ }
+
+ return 0;
+}
+
+static Elf64_Sym *find_sym_by_name(struct src_obj *obj, size_t sec_idx,
+ int sym_type, const char *sym_name)
+{
+ struct src_sec *symtab = &obj->secs[obj->symtab_sec_idx];
+ Elf64_Sym *sym = symtab->data->d_buf;
+ int i, n = symtab->shdr->sh_size / symtab->shdr->sh_entsize;
+ int str_sec_idx = symtab->shdr->sh_link;
+ const char *name;
+
+ for (i = 0; i < n; i++, sym++) {
+ if (sym->st_shndx != sec_idx)
+ continue;
+ if (ELF64_ST_TYPE(sym->st_info) != sym_type)
+ continue;
+
+ name = elf_strptr(obj->elf, str_sec_idx, sym->st_name);
+ if (!name)
+ return NULL;
+
+ if (strcmp(sym_name, name) != 0)
+ continue;
+
+ return sym;
+ }
+
+ return NULL;
+}
+
+static int linker_fixup_btf(struct src_obj *obj)
+{
+ const char *sec_name;
+ struct src_sec *sec;
+ int i, j, n, m;
+
+ if (!obj->btf)
+ return 0;
+
+ n = btf__type_cnt(obj->btf);
+ for (i = 1; i < n; i++) {
+ struct btf_var_secinfo *vi;
+ struct btf_type *t;
+
+ t = btf_type_by_id(obj->btf, i);
+ if (btf_kind(t) != BTF_KIND_DATASEC)
+ continue;
+
+ sec_name = btf__str_by_offset(obj->btf, t->name_off);
+ sec = find_src_sec_by_name(obj, sec_name);
+ if (sec) {
+ /* record actual section size, unless ephemeral */
+ if (sec->shdr)
+ t->size = sec->shdr->sh_size;
+ } else {
+ /* BTF can have some sections that are not represented
+ * in ELF, e.g., .kconfig, .ksyms, .extern, which are used
+ * for special extern variables.
+ *
+ * For all but one such special (ephemeral)
+ * sections, we pre-create "section shells" to be able
+ * to keep track of extra per-section metadata later
+ * (e.g., those BTF extern variables).
+ *
+ * .extern is even more special, though, because it
+ * contains extern variables that need to be resolved
+ * by static linker, not libbpf and kernel. When such
+ * externs are resolved, we are going to remove them
+ * from .extern BTF section and might end up not
+ * needing it at all. Each resolved extern should have
+ * matching non-extern VAR/FUNC in other sections.
+ *
+ * We do support leaving some of the externs
+ * unresolved, though, to support cases of building
+ * libraries, which will later be linked against final
+ * BPF applications. So if at finalization we still
+ * see unresolved externs, we'll create .extern
+ * section on our own.
+ */
+ if (strcmp(sec_name, BTF_EXTERN_SEC) == 0)
+ continue;
+
+ sec = add_src_sec(obj, sec_name);
+ if (!sec)
+ return -ENOMEM;
+
+ sec->ephemeral = true;
+ sec->sec_idx = 0; /* will match UNDEF shndx in ELF */
+ }
+
+ /* remember ELF section and its BTF type ID match */
+ sec->sec_type_id = i;
+
+ /* fix up variable offsets */
+ vi = btf_var_secinfos(t);
+ for (j = 0, m = btf_vlen(t); j < m; j++, vi++) {
+ const struct btf_type *vt = btf__type_by_id(obj->btf, vi->type);
+ const char *var_name = btf__str_by_offset(obj->btf, vt->name_off);
+ int var_linkage = btf_var(vt)->linkage;
+ Elf64_Sym *sym;
+
+ /* no need to patch up static or extern vars */
+ if (var_linkage != BTF_VAR_GLOBAL_ALLOCATED)
+ continue;
+
+ sym = find_sym_by_name(obj, sec->sec_idx, STT_OBJECT, var_name);
+ if (!sym) {
+ pr_warn("failed to find symbol for variable '%s' in section '%s'\n", var_name, sec_name);
+ return -ENOENT;
+ }
+
+ vi->offset = sym->st_value;
+ }
+ }
+
+ return 0;
+}
+
+static int remap_type_id(__u32 *type_id, void *ctx)
+{
+ int *id_map = ctx;
+ int new_id = id_map[*type_id];
+
+ /* Error out if the type wasn't remapped. Ignore VOID which stays VOID. */
+ if (new_id == 0 && *type_id != 0) {
+ pr_warn("failed to find new ID mapping for original BTF type ID %u\n", *type_id);
+ return -EINVAL;
+ }
+
+ *type_id = id_map[*type_id];
+
+ return 0;
+}
+
+static int linker_append_btf(struct bpf_linker *linker, struct src_obj *obj)
+{
+ const struct btf_type *t;
+ int i, j, n, start_id, id;
+ const char *name;
+
+ if (!obj->btf)
+ return 0;
+
+ start_id = btf__type_cnt(linker->btf);
+ n = btf__type_cnt(obj->btf);
+
+ obj->btf_type_map = calloc(n + 1, sizeof(int));
+ if (!obj->btf_type_map)
+ return -ENOMEM;
+
+ for (i = 1; i < n; i++) {
+ struct glob_sym *glob_sym = NULL;
+
+ t = btf__type_by_id(obj->btf, i);
+
+ /* DATASECs are handled specially below */
+ if (btf_kind(t) == BTF_KIND_DATASEC)
+ continue;
+
+ if (btf_is_non_static(t)) {
+ /* there should be glob_sym already */
+ name = btf__str_by_offset(obj->btf, t->name_off);
+ glob_sym = find_glob_sym(linker, name);
+
+ /* VARs without corresponding glob_sym are those that
+ * belong to skipped/deduplicated sections (i.e.,
+ * license and version), so just skip them
+ */
+ if (!glob_sym)
+ continue;
+
+ /* linker_append_elf_sym() might have requested
+ * updating underlying type ID, if extern was resolved
+ * to strong symbol or weak got upgraded to non-weak
+ */
+ if (glob_sym->underlying_btf_id == 0)
+ glob_sym->underlying_btf_id = -t->type;
+
+ /* globals from previous object files that match our
+ * VAR/FUNC already have a corresponding associated
+ * BTF type, so just make sure to use it
+ */
+ if (glob_sym->btf_id) {
+ /* reuse existing BTF type for global var/func */
+ obj->btf_type_map[i] = glob_sym->btf_id;
+ continue;
+ }
+ }
+
+ id = btf__add_type(linker->btf, obj->btf, t);
+ if (id < 0) {
+ pr_warn("failed to append BTF type #%d from file '%s'\n", i, obj->filename);
+ return id;
+ }
+
+ obj->btf_type_map[i] = id;
+
+ /* record just appended BTF type for var/func */
+ if (glob_sym) {
+ glob_sym->btf_id = id;
+ glob_sym->underlying_btf_id = -t->type;
+ }
+ }
+
+ /* remap all the types except DATASECs */
+ n = btf__type_cnt(linker->btf);
+ for (i = start_id; i < n; i++) {
+ struct btf_type *dst_t = btf_type_by_id(linker->btf, i);
+
+ if (btf_type_visit_type_ids(dst_t, remap_type_id, obj->btf_type_map))
+ return -EINVAL;
+ }
+
+ /* Rewrite VAR/FUNC underlying types (i.e., FUNC's FUNC_PROTO and VAR's
+ * actual type), if necessary
+ */
+ for (i = 0; i < linker->glob_sym_cnt; i++) {
+ struct glob_sym *glob_sym = &linker->glob_syms[i];
+ struct btf_type *glob_t;
+
+ if (glob_sym->underlying_btf_id >= 0)
+ continue;
+
+ glob_sym->underlying_btf_id = obj->btf_type_map[-glob_sym->underlying_btf_id];
+
+ glob_t = btf_type_by_id(linker->btf, glob_sym->btf_id);
+ glob_t->type = glob_sym->underlying_btf_id;
+ }
+
+ /* append DATASEC info */
+ for (i = 1; i < obj->sec_cnt; i++) {
+ struct src_sec *src_sec;
+ struct dst_sec *dst_sec;
+ const struct btf_var_secinfo *src_var;
+ struct btf_var_secinfo *dst_var;
+
+ src_sec = &obj->secs[i];
+ if (!src_sec->sec_type_id || src_sec->skipped)
+ continue;
+ dst_sec = &linker->secs[src_sec->dst_id];
+
+ /* Mark section as having BTF regardless of the presence of
+ * variables. In some cases compiler might generate empty BTF
+ * with no variables information. E.g., when promoting local
+ * array/structure variable initial values and BPF object
+ * file otherwise has no read-only static variables in
+ * .rodata. We need to preserve such empty BTF and just set
+ * correct section size.
+ */
+ dst_sec->has_btf = true;
+
+ t = btf__type_by_id(obj->btf, src_sec->sec_type_id);
+ src_var = btf_var_secinfos(t);
+ n = btf_vlen(t);
+ for (j = 0; j < n; j++, src_var++) {
+ void *sec_vars = dst_sec->sec_vars;
+ int new_id = obj->btf_type_map[src_var->type];
+ struct glob_sym *glob_sym = NULL;
+
+ t = btf_type_by_id(linker->btf, new_id);
+ if (btf_is_non_static(t)) {
+ name = btf__str_by_offset(linker->btf, t->name_off);
+ glob_sym = find_glob_sym(linker, name);
+ if (glob_sym->sec_id != dst_sec->id) {
+ pr_warn("global '%s': section mismatch %d vs %d\n",
+ name, glob_sym->sec_id, dst_sec->id);
+ return -EINVAL;
+ }
+ }
+
+ /* If there is already a member (VAR or FUNC) mapped
+ * to the same type, don't add a duplicate entry.
+ * This will happen when multiple object files define
+ * the same extern VARs/FUNCs.
+ */
+ if (glob_sym && glob_sym->var_idx >= 0) {
+ __s64 sz;
+
+ dst_var = &dst_sec->sec_vars[glob_sym->var_idx];
+ /* Because underlying BTF type might have
+ * changed, so might its size have changed, so
+ * re-calculate and update it in sec_var.
+ */
+ sz = btf__resolve_size(linker->btf, glob_sym->underlying_btf_id);
+ if (sz < 0) {
+ pr_warn("global '%s': failed to resolve size of underlying type: %d\n",
+ name, (int)sz);
+ return -EINVAL;
+ }
+ dst_var->size = sz;
+ continue;
+ }
+
+ sec_vars = libbpf_reallocarray(sec_vars,
+ dst_sec->sec_var_cnt + 1,
+ sizeof(*dst_sec->sec_vars));
+ if (!sec_vars)
+ return -ENOMEM;
+
+ dst_sec->sec_vars = sec_vars;
+ dst_sec->sec_var_cnt++;
+
+ dst_var = &dst_sec->sec_vars[dst_sec->sec_var_cnt - 1];
+ dst_var->type = obj->btf_type_map[src_var->type];
+ dst_var->size = src_var->size;
+ dst_var->offset = src_sec->dst_off + src_var->offset;
+
+ if (glob_sym)
+ glob_sym->var_idx = dst_sec->sec_var_cnt - 1;
+ }
+ }
+
+ return 0;
+}
+
+static void *add_btf_ext_rec(struct btf_ext_sec_data *ext_data, const void *src_rec)
+{
+ void *tmp;
+
+ tmp = libbpf_reallocarray(ext_data->recs, ext_data->rec_cnt + 1, ext_data->rec_sz);
+ if (!tmp)
+ return NULL;
+ ext_data->recs = tmp;
+
+ tmp += ext_data->rec_cnt * ext_data->rec_sz;
+ memcpy(tmp, src_rec, ext_data->rec_sz);
+
+ ext_data->rec_cnt++;
+
+ return tmp;
+}
+
+static int linker_append_btf_ext(struct bpf_linker *linker, struct src_obj *obj)
+{
+ const struct btf_ext_info_sec *ext_sec;
+ const char *sec_name, *s;
+ struct src_sec *src_sec;
+ struct dst_sec *dst_sec;
+ int rec_sz, str_off, i;
+
+ if (!obj->btf_ext)
+ return 0;
+
+ rec_sz = obj->btf_ext->func_info.rec_size;
+ for_each_btf_ext_sec(&obj->btf_ext->func_info, ext_sec) {
+ struct bpf_func_info_min *src_rec, *dst_rec;
+
+ sec_name = btf__name_by_offset(obj->btf, ext_sec->sec_name_off);
+ src_sec = find_src_sec_by_name(obj, sec_name);
+ if (!src_sec) {
+ pr_warn("can't find section '%s' referenced from .BTF.ext\n", sec_name);
+ return -EINVAL;
+ }
+ dst_sec = &linker->secs[src_sec->dst_id];
+
+ if (dst_sec->func_info.rec_sz == 0)
+ dst_sec->func_info.rec_sz = rec_sz;
+ if (dst_sec->func_info.rec_sz != rec_sz) {
+ pr_warn("incompatible .BTF.ext record sizes for section '%s'\n", sec_name);
+ return -EINVAL;
+ }
+
+ for_each_btf_ext_rec(&obj->btf_ext->func_info, ext_sec, i, src_rec) {
+ dst_rec = add_btf_ext_rec(&dst_sec->func_info, src_rec);
+ if (!dst_rec)
+ return -ENOMEM;
+
+ dst_rec->insn_off += src_sec->dst_off;
+ dst_rec->type_id = obj->btf_type_map[dst_rec->type_id];
+ }
+ }
+
+ rec_sz = obj->btf_ext->line_info.rec_size;
+ for_each_btf_ext_sec(&obj->btf_ext->line_info, ext_sec) {
+ struct bpf_line_info_min *src_rec, *dst_rec;
+
+ sec_name = btf__name_by_offset(obj->btf, ext_sec->sec_name_off);
+ src_sec = find_src_sec_by_name(obj, sec_name);
+ if (!src_sec) {
+ pr_warn("can't find section '%s' referenced from .BTF.ext\n", sec_name);
+ return -EINVAL;
+ }
+ dst_sec = &linker->secs[src_sec->dst_id];
+
+ if (dst_sec->line_info.rec_sz == 0)
+ dst_sec->line_info.rec_sz = rec_sz;
+ if (dst_sec->line_info.rec_sz != rec_sz) {
+ pr_warn("incompatible .BTF.ext record sizes for section '%s'\n", sec_name);
+ return -EINVAL;
+ }
+
+ for_each_btf_ext_rec(&obj->btf_ext->line_info, ext_sec, i, src_rec) {
+ dst_rec = add_btf_ext_rec(&dst_sec->line_info, src_rec);
+ if (!dst_rec)
+ return -ENOMEM;
+
+ dst_rec->insn_off += src_sec->dst_off;
+
+ s = btf__str_by_offset(obj->btf, src_rec->file_name_off);
+ str_off = btf__add_str(linker->btf, s);
+ if (str_off < 0)
+ return -ENOMEM;
+ dst_rec->file_name_off = str_off;
+
+ s = btf__str_by_offset(obj->btf, src_rec->line_off);
+ str_off = btf__add_str(linker->btf, s);
+ if (str_off < 0)
+ return -ENOMEM;
+ dst_rec->line_off = str_off;
+
+ /* dst_rec->line_col is fine */
+ }
+ }
+
+ rec_sz = obj->btf_ext->core_relo_info.rec_size;
+ for_each_btf_ext_sec(&obj->btf_ext->core_relo_info, ext_sec) {
+ struct bpf_core_relo *src_rec, *dst_rec;
+
+ sec_name = btf__name_by_offset(obj->btf, ext_sec->sec_name_off);
+ src_sec = find_src_sec_by_name(obj, sec_name);
+ if (!src_sec) {
+ pr_warn("can't find section '%s' referenced from .BTF.ext\n", sec_name);
+ return -EINVAL;
+ }
+ dst_sec = &linker->secs[src_sec->dst_id];
+
+ if (dst_sec->core_relo_info.rec_sz == 0)
+ dst_sec->core_relo_info.rec_sz = rec_sz;
+ if (dst_sec->core_relo_info.rec_sz != rec_sz) {
+ pr_warn("incompatible .BTF.ext record sizes for section '%s'\n", sec_name);
+ return -EINVAL;
+ }
+
+ for_each_btf_ext_rec(&obj->btf_ext->core_relo_info, ext_sec, i, src_rec) {
+ dst_rec = add_btf_ext_rec(&dst_sec->core_relo_info, src_rec);
+ if (!dst_rec)
+ return -ENOMEM;
+
+ dst_rec->insn_off += src_sec->dst_off;
+ dst_rec->type_id = obj->btf_type_map[dst_rec->type_id];
+
+ s = btf__str_by_offset(obj->btf, src_rec->access_str_off);
+ str_off = btf__add_str(linker->btf, s);
+ if (str_off < 0)
+ return -ENOMEM;
+ dst_rec->access_str_off = str_off;
+
+ /* dst_rec->kind is fine */
+ }
+ }
+
+ return 0;
+}
+
+int bpf_linker__finalize(struct bpf_linker *linker)
+{
+ struct dst_sec *sec;
+ size_t strs_sz;
+ const void *strs;
+ int err, i;
+
+ if (!linker->elf)
+ return libbpf_err(-EINVAL);
+
+ err = finalize_btf(linker);
+ if (err)
+ return libbpf_err(err);
+
+ /* Finalize strings */
+ strs_sz = strset__data_size(linker->strtab_strs);
+ strs = strset__data(linker->strtab_strs);
+
+ sec = &linker->secs[linker->strtab_sec_idx];
+ sec->data->d_align = 1;
+ sec->data->d_off = 0LL;
+ sec->data->d_buf = (void *)strs;
+ sec->data->d_type = ELF_T_BYTE;
+ sec->data->d_size = strs_sz;
+ sec->shdr->sh_size = strs_sz;
+
+ for (i = 1; i < linker->sec_cnt; i++) {
+ sec = &linker->secs[i];
+
+ /* STRTAB is handled specially above */
+ if (sec->sec_idx == linker->strtab_sec_idx)
+ continue;
+
+ /* special ephemeral sections (.ksyms, .kconfig, etc) */
+ if (!sec->scn)
+ continue;
+
+ sec->data->d_buf = sec->raw_data;
+ }
+
+ /* Finalize ELF layout */
+ if (elf_update(linker->elf, ELF_C_NULL) < 0) {
+ err = -errno;
+ pr_warn_elf("failed to finalize ELF layout");
+ return libbpf_err(err);
+ }
+
+ /* Write out final ELF contents */
+ if (elf_update(linker->elf, ELF_C_WRITE) < 0) {
+ err = -errno;
+ pr_warn_elf("failed to write ELF contents");
+ return libbpf_err(err);
+ }
+
+ elf_end(linker->elf);
+ close(linker->fd);
+
+ linker->elf = NULL;
+ linker->fd = -1;
+
+ return 0;
+}
+
+static int emit_elf_data_sec(struct bpf_linker *linker, const char *sec_name,
+ size_t align, const void *raw_data, size_t raw_sz)
+{
+ Elf_Scn *scn;
+ Elf_Data *data;
+ Elf64_Shdr *shdr;
+ int name_off;
+
+ name_off = strset__add_str(linker->strtab_strs, sec_name);
+ if (name_off < 0)
+ return name_off;
+
+ scn = elf_newscn(linker->elf);
+ if (!scn)
+ return -ENOMEM;
+ data = elf_newdata(scn);
+ if (!data)
+ return -ENOMEM;
+ shdr = elf64_getshdr(scn);
+ if (!shdr)
+ return -EINVAL;
+
+ shdr->sh_name = name_off;
+ shdr->sh_type = SHT_PROGBITS;
+ shdr->sh_flags = 0;
+ shdr->sh_size = raw_sz;
+ shdr->sh_link = 0;
+ shdr->sh_info = 0;
+ shdr->sh_addralign = align;
+ shdr->sh_entsize = 0;
+
+ data->d_type = ELF_T_BYTE;
+ data->d_size = raw_sz;
+ data->d_buf = (void *)raw_data;
+ data->d_align = align;
+ data->d_off = 0;
+
+ return 0;
+}
+
+static int finalize_btf(struct bpf_linker *linker)
+{
+ LIBBPF_OPTS(btf_dedup_opts, opts);
+ struct btf *btf = linker->btf;
+ const void *raw_data;
+ int i, j, id, err;
+ __u32 raw_sz;
+
+ /* bail out if no BTF data was produced */
+ if (btf__type_cnt(linker->btf) == 1)
+ return 0;
+
+ for (i = 1; i < linker->sec_cnt; i++) {
+ struct dst_sec *sec = &linker->secs[i];
+
+ if (!sec->has_btf)
+ continue;
+
+ id = btf__add_datasec(btf, sec->sec_name, sec->sec_sz);
+ if (id < 0) {
+ pr_warn("failed to add consolidated BTF type for datasec '%s': %d\n",
+ sec->sec_name, id);
+ return id;
+ }
+
+ for (j = 0; j < sec->sec_var_cnt; j++) {
+ struct btf_var_secinfo *vi = &sec->sec_vars[j];
+
+ if (btf__add_datasec_var_info(btf, vi->type, vi->offset, vi->size))
+ return -EINVAL;
+ }
+ }
+
+ err = finalize_btf_ext(linker);
+ if (err) {
+ pr_warn(".BTF.ext generation failed: %d\n", err);
+ return err;
+ }
+
+ opts.btf_ext = linker->btf_ext;
+ err = btf__dedup(linker->btf, &opts);
+ if (err) {
+ pr_warn("BTF dedup failed: %d\n", err);
+ return err;
+ }
+
+ /* Emit .BTF section */
+ raw_data = btf__raw_data(linker->btf, &raw_sz);
+ if (!raw_data)
+ return -ENOMEM;
+
+ err = emit_elf_data_sec(linker, BTF_ELF_SEC, 8, raw_data, raw_sz);
+ if (err) {
+ pr_warn("failed to write out .BTF ELF section: %d\n", err);
+ return err;
+ }
+
+ /* Emit .BTF.ext section */
+ if (linker->btf_ext) {
+ raw_data = btf_ext__get_raw_data(linker->btf_ext, &raw_sz);
+ if (!raw_data)
+ return -ENOMEM;
+
+ err = emit_elf_data_sec(linker, BTF_EXT_ELF_SEC, 8, raw_data, raw_sz);
+ if (err) {
+ pr_warn("failed to write out .BTF.ext ELF section: %d\n", err);
+ return err;
+ }
+ }
+
+ return 0;
+}
+
+static int emit_btf_ext_data(struct bpf_linker *linker, void *output,
+ const char *sec_name, struct btf_ext_sec_data *sec_data)
+{
+ struct btf_ext_info_sec *sec_info;
+ void *cur = output;
+ int str_off;
+ size_t sz;
+
+ if (!sec_data->rec_cnt)
+ return 0;
+
+ str_off = btf__add_str(linker->btf, sec_name);
+ if (str_off < 0)
+ return -ENOMEM;
+
+ sec_info = cur;
+ sec_info->sec_name_off = str_off;
+ sec_info->num_info = sec_data->rec_cnt;
+ cur += sizeof(struct btf_ext_info_sec);
+
+ sz = sec_data->rec_cnt * sec_data->rec_sz;
+ memcpy(cur, sec_data->recs, sz);
+ cur += sz;
+
+ return cur - output;
+}
+
+static int finalize_btf_ext(struct bpf_linker *linker)
+{
+ size_t funcs_sz = 0, lines_sz = 0, core_relos_sz = 0, total_sz = 0;
+ size_t func_rec_sz = 0, line_rec_sz = 0, core_relo_rec_sz = 0;
+ struct btf_ext_header *hdr;
+ void *data, *cur;
+ int i, err, sz;
+
+ /* validate that all sections have the same .BTF.ext record sizes
+ * and calculate total data size for each type of data (func info,
+ * line info, core relos)
+ */
+ for (i = 1; i < linker->sec_cnt; i++) {
+ struct dst_sec *sec = &linker->secs[i];
+
+ if (sec->func_info.rec_cnt) {
+ if (func_rec_sz == 0)
+ func_rec_sz = sec->func_info.rec_sz;
+ if (func_rec_sz != sec->func_info.rec_sz) {
+ pr_warn("mismatch in func_info record size %zu != %u\n",
+ func_rec_sz, sec->func_info.rec_sz);
+ return -EINVAL;
+ }
+
+ funcs_sz += sizeof(struct btf_ext_info_sec) + func_rec_sz * sec->func_info.rec_cnt;
+ }
+ if (sec->line_info.rec_cnt) {
+ if (line_rec_sz == 0)
+ line_rec_sz = sec->line_info.rec_sz;
+ if (line_rec_sz != sec->line_info.rec_sz) {
+ pr_warn("mismatch in line_info record size %zu != %u\n",
+ line_rec_sz, sec->line_info.rec_sz);
+ return -EINVAL;
+ }
+
+ lines_sz += sizeof(struct btf_ext_info_sec) + line_rec_sz * sec->line_info.rec_cnt;
+ }
+ if (sec->core_relo_info.rec_cnt) {
+ if (core_relo_rec_sz == 0)
+ core_relo_rec_sz = sec->core_relo_info.rec_sz;
+ if (core_relo_rec_sz != sec->core_relo_info.rec_sz) {
+ pr_warn("mismatch in core_relo_info record size %zu != %u\n",
+ core_relo_rec_sz, sec->core_relo_info.rec_sz);
+ return -EINVAL;
+ }
+
+ core_relos_sz += sizeof(struct btf_ext_info_sec) + core_relo_rec_sz * sec->core_relo_info.rec_cnt;
+ }
+ }
+
+ if (!funcs_sz && !lines_sz && !core_relos_sz)
+ return 0;
+
+ total_sz += sizeof(struct btf_ext_header);
+ if (funcs_sz) {
+ funcs_sz += sizeof(__u32); /* record size prefix */
+ total_sz += funcs_sz;
+ }
+ if (lines_sz) {
+ lines_sz += sizeof(__u32); /* record size prefix */
+ total_sz += lines_sz;
+ }
+ if (core_relos_sz) {
+ core_relos_sz += sizeof(__u32); /* record size prefix */
+ total_sz += core_relos_sz;
+ }
+
+ cur = data = calloc(1, total_sz);
+ if (!data)
+ return -ENOMEM;
+
+ hdr = cur;
+ hdr->magic = BTF_MAGIC;
+ hdr->version = BTF_VERSION;
+ hdr->flags = 0;
+ hdr->hdr_len = sizeof(struct btf_ext_header);
+ cur += sizeof(struct btf_ext_header);
+
+ /* All offsets are in bytes relative to the end of this header */
+ hdr->func_info_off = 0;
+ hdr->func_info_len = funcs_sz;
+ hdr->line_info_off = funcs_sz;
+ hdr->line_info_len = lines_sz;
+ hdr->core_relo_off = funcs_sz + lines_sz;
+ hdr->core_relo_len = core_relos_sz;
+
+ if (funcs_sz) {
+ *(__u32 *)cur = func_rec_sz;
+ cur += sizeof(__u32);
+
+ for (i = 1; i < linker->sec_cnt; i++) {
+ struct dst_sec *sec = &linker->secs[i];
+
+ sz = emit_btf_ext_data(linker, cur, sec->sec_name, &sec->func_info);
+ if (sz < 0) {
+ err = sz;
+ goto out;
+ }
+
+ cur += sz;
+ }
+ }
+
+ if (lines_sz) {
+ *(__u32 *)cur = line_rec_sz;
+ cur += sizeof(__u32);
+
+ for (i = 1; i < linker->sec_cnt; i++) {
+ struct dst_sec *sec = &linker->secs[i];
+
+ sz = emit_btf_ext_data(linker, cur, sec->sec_name, &sec->line_info);
+ if (sz < 0) {
+ err = sz;
+ goto out;
+ }
+
+ cur += sz;
+ }
+ }
+
+ if (core_relos_sz) {
+ *(__u32 *)cur = core_relo_rec_sz;
+ cur += sizeof(__u32);
+
+ for (i = 1; i < linker->sec_cnt; i++) {
+ struct dst_sec *sec = &linker->secs[i];
+
+ sz = emit_btf_ext_data(linker, cur, sec->sec_name, &sec->core_relo_info);
+ if (sz < 0) {
+ err = sz;
+ goto out;
+ }
+
+ cur += sz;
+ }
+ }
+
+ linker->btf_ext = btf_ext__new(data, total_sz);
+ err = libbpf_get_error(linker->btf_ext);
+ if (err) {
+ linker->btf_ext = NULL;
+ pr_warn("failed to parse final .BTF.ext data: %d\n", err);
+ goto out;
+ }
+
+out:
+ free(data);
+ return err;
+}
diff --git a/src/netlink.c b/src/netlink.c
new file mode 100644
index 0000000..3510458
--- /dev/null
+++ b/src/netlink.c
@@ -0,0 +1,813 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+/* Copyright (c) 2018 Facebook */
+
+#include <stdlib.h>
+#include <memory.h>
+#include <unistd.h>
+#include <arpa/inet.h>
+#include <linux/bpf.h>
+#include <linux/if_ether.h>
+#include <linux/pkt_cls.h>
+#include <linux/rtnetlink.h>
+#include <sys/socket.h>
+#include <errno.h>
+#include <time.h>
+
+#include "bpf.h"
+#include "libbpf.h"
+#include "libbpf_internal.h"
+#include "nlattr.h"
+
+#ifndef SOL_NETLINK
+#define SOL_NETLINK 270
+#endif
+
+typedef int (*libbpf_dump_nlmsg_t)(void *cookie, void *msg, struct nlattr **tb);
+
+typedef int (*__dump_nlmsg_t)(struct nlmsghdr *nlmsg, libbpf_dump_nlmsg_t,
+ void *cookie);
+
+struct xdp_link_info {
+ __u32 prog_id;
+ __u32 drv_prog_id;
+ __u32 hw_prog_id;
+ __u32 skb_prog_id;
+ __u8 attach_mode;
+};
+
+struct xdp_id_md {
+ int ifindex;
+ __u32 flags;
+ struct xdp_link_info info;
+};
+
+static int libbpf_netlink_open(__u32 *nl_pid)
+{
+ struct sockaddr_nl sa;
+ socklen_t addrlen;
+ int one = 1, ret;
+ int sock;
+
+ memset(&sa, 0, sizeof(sa));
+ sa.nl_family = AF_NETLINK;
+
+ sock = socket(AF_NETLINK, SOCK_RAW | SOCK_CLOEXEC, NETLINK_ROUTE);
+ if (sock < 0)
+ return -errno;
+
+ if (setsockopt(sock, SOL_NETLINK, NETLINK_EXT_ACK,
+ &one, sizeof(one)) < 0) {
+ pr_warn("Netlink error reporting not supported\n");
+ }
+
+ if (bind(sock, (struct sockaddr *)&sa, sizeof(sa)) < 0) {
+ ret = -errno;
+ goto cleanup;
+ }
+
+ addrlen = sizeof(sa);
+ if (getsockname(sock, (struct sockaddr *)&sa, &addrlen) < 0) {
+ ret = -errno;
+ goto cleanup;
+ }
+
+ if (addrlen != sizeof(sa)) {
+ ret = -LIBBPF_ERRNO__INTERNAL;
+ goto cleanup;
+ }
+
+ *nl_pid = sa.nl_pid;
+ return sock;
+
+cleanup:
+ close(sock);
+ return ret;
+}
+
+static void libbpf_netlink_close(int sock)
+{
+ close(sock);
+}
+
+enum {
+ NL_CONT,
+ NL_NEXT,
+ NL_DONE,
+};
+
+static int netlink_recvmsg(int sock, struct msghdr *mhdr, int flags)
+{
+ int len;
+
+ do {
+ len = recvmsg(sock, mhdr, flags);
+ } while (len < 0 && (errno == EINTR || errno == EAGAIN));
+
+ if (len < 0)
+ return -errno;
+ return len;
+}
+
+static int alloc_iov(struct iovec *iov, int len)
+{
+ void *nbuf;
+
+ nbuf = realloc(iov->iov_base, len);
+ if (!nbuf)
+ return -ENOMEM;
+
+ iov->iov_base = nbuf;
+ iov->iov_len = len;
+ return 0;
+}
+
+static int libbpf_netlink_recv(int sock, __u32 nl_pid, int seq,
+ __dump_nlmsg_t _fn, libbpf_dump_nlmsg_t fn,
+ void *cookie)
+{
+ struct iovec iov = {};
+ struct msghdr mhdr = {
+ .msg_iov = &iov,
+ .msg_iovlen = 1,
+ };
+ bool multipart = true;
+ struct nlmsgerr *err;
+ struct nlmsghdr *nh;
+ int len, ret;
+
+ ret = alloc_iov(&iov, 4096);
+ if (ret)
+ goto done;
+
+ while (multipart) {
+start:
+ multipart = false;
+ len = netlink_recvmsg(sock, &mhdr, MSG_PEEK | MSG_TRUNC);
+ if (len < 0) {
+ ret = len;
+ goto done;
+ }
+
+ if (len > iov.iov_len) {
+ ret = alloc_iov(&iov, len);
+ if (ret)
+ goto done;
+ }
+
+ len = netlink_recvmsg(sock, &mhdr, 0);
+ if (len < 0) {
+ ret = len;
+ goto done;
+ }
+
+ if (len == 0)
+ break;
+
+ for (nh = (struct nlmsghdr *)iov.iov_base; NLMSG_OK(nh, len);
+ nh = NLMSG_NEXT(nh, len)) {
+ if (nh->nlmsg_pid != nl_pid) {
+ ret = -LIBBPF_ERRNO__WRNGPID;
+ goto done;
+ }
+ if (nh->nlmsg_seq != seq) {
+ ret = -LIBBPF_ERRNO__INVSEQ;
+ goto done;
+ }
+ if (nh->nlmsg_flags & NLM_F_MULTI)
+ multipart = true;
+ switch (nh->nlmsg_type) {
+ case NLMSG_ERROR:
+ err = (struct nlmsgerr *)NLMSG_DATA(nh);
+ if (!err->error)
+ continue;
+ ret = err->error;
+ libbpf_nla_dump_errormsg(nh);
+ goto done;
+ case NLMSG_DONE:
+ ret = 0;
+ goto done;
+ default:
+ break;
+ }
+ if (_fn) {
+ ret = _fn(nh, fn, cookie);
+ switch (ret) {
+ case NL_CONT:
+ break;
+ case NL_NEXT:
+ goto start;
+ case NL_DONE:
+ ret = 0;
+ goto done;
+ default:
+ goto done;
+ }
+ }
+ }
+ }
+ ret = 0;
+done:
+ free(iov.iov_base);
+ return ret;
+}
+
+static int libbpf_netlink_send_recv(struct libbpf_nla_req *req,
+ __dump_nlmsg_t parse_msg,
+ libbpf_dump_nlmsg_t parse_attr,
+ void *cookie)
+{
+ __u32 nl_pid = 0;
+ int sock, ret;
+
+ sock = libbpf_netlink_open(&nl_pid);
+ if (sock < 0)
+ return sock;
+
+ req->nh.nlmsg_pid = 0;
+ req->nh.nlmsg_seq = time(NULL);
+
+ if (send(sock, req, req->nh.nlmsg_len, 0) < 0) {
+ ret = -errno;
+ goto out;
+ }
+
+ ret = libbpf_netlink_recv(sock, nl_pid, req->nh.nlmsg_seq,
+ parse_msg, parse_attr, cookie);
+out:
+ libbpf_netlink_close(sock);
+ return ret;
+}
+
+static int __bpf_set_link_xdp_fd_replace(int ifindex, int fd, int old_fd,
+ __u32 flags)
+{
+ struct nlattr *nla;
+ int ret;
+ struct libbpf_nla_req req;
+
+ memset(&req, 0, sizeof(req));
+ req.nh.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg));
+ req.nh.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
+ req.nh.nlmsg_type = RTM_SETLINK;
+ req.ifinfo.ifi_family = AF_UNSPEC;
+ req.ifinfo.ifi_index = ifindex;
+
+ nla = nlattr_begin_nested(&req, IFLA_XDP);
+ if (!nla)
+ return -EMSGSIZE;
+ ret = nlattr_add(&req, IFLA_XDP_FD, &fd, sizeof(fd));
+ if (ret < 0)
+ return ret;
+ if (flags) {
+ ret = nlattr_add(&req, IFLA_XDP_FLAGS, &flags, sizeof(flags));
+ if (ret < 0)
+ return ret;
+ }
+ if (flags & XDP_FLAGS_REPLACE) {
+ ret = nlattr_add(&req, IFLA_XDP_EXPECTED_FD, &old_fd,
+ sizeof(old_fd));
+ if (ret < 0)
+ return ret;
+ }
+ nlattr_end_nested(&req, nla);
+
+ return libbpf_netlink_send_recv(&req, NULL, NULL, NULL);
+}
+
+int bpf_xdp_attach(int ifindex, int prog_fd, __u32 flags, const struct bpf_xdp_attach_opts *opts)
+{
+ int old_prog_fd, err;
+
+ if (!OPTS_VALID(opts, bpf_xdp_attach_opts))
+ return libbpf_err(-EINVAL);
+
+ old_prog_fd = OPTS_GET(opts, old_prog_fd, 0);
+ if (old_prog_fd)
+ flags |= XDP_FLAGS_REPLACE;
+ else
+ old_prog_fd = -1;
+
+ err = __bpf_set_link_xdp_fd_replace(ifindex, prog_fd, old_prog_fd, flags);
+ return libbpf_err(err);
+}
+
+int bpf_xdp_detach(int ifindex, __u32 flags, const struct bpf_xdp_attach_opts *opts)
+{
+ return bpf_xdp_attach(ifindex, -1, flags, opts);
+}
+
+static int __dump_link_nlmsg(struct nlmsghdr *nlh,
+ libbpf_dump_nlmsg_t dump_link_nlmsg, void *cookie)
+{
+ struct nlattr *tb[IFLA_MAX + 1], *attr;
+ struct ifinfomsg *ifi = NLMSG_DATA(nlh);
+ int len;
+
+ len = nlh->nlmsg_len - NLMSG_LENGTH(sizeof(*ifi));
+ attr = (struct nlattr *) ((void *) ifi + NLMSG_ALIGN(sizeof(*ifi)));
+
+ if (libbpf_nla_parse(tb, IFLA_MAX, attr, len, NULL) != 0)
+ return -LIBBPF_ERRNO__NLPARSE;
+
+ return dump_link_nlmsg(cookie, ifi, tb);
+}
+
+static int get_xdp_info(void *cookie, void *msg, struct nlattr **tb)
+{
+ struct nlattr *xdp_tb[IFLA_XDP_MAX + 1];
+ struct xdp_id_md *xdp_id = cookie;
+ struct ifinfomsg *ifinfo = msg;
+ int ret;
+
+ if (xdp_id->ifindex && xdp_id->ifindex != ifinfo->ifi_index)
+ return 0;
+
+ if (!tb[IFLA_XDP])
+ return 0;
+
+ ret = libbpf_nla_parse_nested(xdp_tb, IFLA_XDP_MAX, tb[IFLA_XDP], NULL);
+ if (ret)
+ return ret;
+
+ if (!xdp_tb[IFLA_XDP_ATTACHED])
+ return 0;
+
+ xdp_id->info.attach_mode = libbpf_nla_getattr_u8(
+ xdp_tb[IFLA_XDP_ATTACHED]);
+
+ if (xdp_id->info.attach_mode == XDP_ATTACHED_NONE)
+ return 0;
+
+ if (xdp_tb[IFLA_XDP_PROG_ID])
+ xdp_id->info.prog_id = libbpf_nla_getattr_u32(
+ xdp_tb[IFLA_XDP_PROG_ID]);
+
+ if (xdp_tb[IFLA_XDP_SKB_PROG_ID])
+ xdp_id->info.skb_prog_id = libbpf_nla_getattr_u32(
+ xdp_tb[IFLA_XDP_SKB_PROG_ID]);
+
+ if (xdp_tb[IFLA_XDP_DRV_PROG_ID])
+ xdp_id->info.drv_prog_id = libbpf_nla_getattr_u32(
+ xdp_tb[IFLA_XDP_DRV_PROG_ID]);
+
+ if (xdp_tb[IFLA_XDP_HW_PROG_ID])
+ xdp_id->info.hw_prog_id = libbpf_nla_getattr_u32(
+ xdp_tb[IFLA_XDP_HW_PROG_ID]);
+
+ return 0;
+}
+
+int bpf_xdp_query(int ifindex, int xdp_flags, struct bpf_xdp_query_opts *opts)
+{
+ struct libbpf_nla_req req = {
+ .nh.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)),
+ .nh.nlmsg_type = RTM_GETLINK,
+ .nh.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
+ .ifinfo.ifi_family = AF_PACKET,
+ };
+ struct xdp_id_md xdp_id = {};
+ int err;
+
+ if (!OPTS_VALID(opts, bpf_xdp_query_opts))
+ return libbpf_err(-EINVAL);
+
+ if (xdp_flags & ~XDP_FLAGS_MASK)
+ return libbpf_err(-EINVAL);
+
+ /* Check whether the single {HW,DRV,SKB} mode is set */
+ xdp_flags &= XDP_FLAGS_SKB_MODE | XDP_FLAGS_DRV_MODE | XDP_FLAGS_HW_MODE;
+ if (xdp_flags & (xdp_flags - 1))
+ return libbpf_err(-EINVAL);
+
+ xdp_id.ifindex = ifindex;
+ xdp_id.flags = xdp_flags;
+
+ err = libbpf_netlink_send_recv(&req, __dump_link_nlmsg,
+ get_xdp_info, &xdp_id);
+ if (err)
+ return libbpf_err(err);
+
+ OPTS_SET(opts, prog_id, xdp_id.info.prog_id);
+ OPTS_SET(opts, drv_prog_id, xdp_id.info.drv_prog_id);
+ OPTS_SET(opts, hw_prog_id, xdp_id.info.hw_prog_id);
+ OPTS_SET(opts, skb_prog_id, xdp_id.info.skb_prog_id);
+ OPTS_SET(opts, attach_mode, xdp_id.info.attach_mode);
+
+ return 0;
+}
+
+int bpf_xdp_query_id(int ifindex, int flags, __u32 *prog_id)
+{
+ LIBBPF_OPTS(bpf_xdp_query_opts, opts);
+ int ret;
+
+ ret = bpf_xdp_query(ifindex, flags, &opts);
+ if (ret)
+ return libbpf_err(ret);
+
+ flags &= XDP_FLAGS_MODES;
+
+ if (opts.attach_mode != XDP_ATTACHED_MULTI && !flags)
+ *prog_id = opts.prog_id;
+ else if (flags & XDP_FLAGS_DRV_MODE)
+ *prog_id = opts.drv_prog_id;
+ else if (flags & XDP_FLAGS_HW_MODE)
+ *prog_id = opts.hw_prog_id;
+ else if (flags & XDP_FLAGS_SKB_MODE)
+ *prog_id = opts.skb_prog_id;
+ else
+ *prog_id = 0;
+
+ return 0;
+}
+
+
+typedef int (*qdisc_config_t)(struct libbpf_nla_req *req);
+
+static int clsact_config(struct libbpf_nla_req *req)
+{
+ req->tc.tcm_parent = TC_H_CLSACT;
+ req->tc.tcm_handle = TC_H_MAKE(TC_H_CLSACT, 0);
+
+ return nlattr_add(req, TCA_KIND, "clsact", sizeof("clsact"));
+}
+
+static int attach_point_to_config(struct bpf_tc_hook *hook,
+ qdisc_config_t *config)
+{
+ switch (OPTS_GET(hook, attach_point, 0)) {
+ case BPF_TC_INGRESS:
+ case BPF_TC_EGRESS:
+ case BPF_TC_INGRESS | BPF_TC_EGRESS:
+ if (OPTS_GET(hook, parent, 0))
+ return -EINVAL;
+ *config = &clsact_config;
+ return 0;
+ case BPF_TC_CUSTOM:
+ return -EOPNOTSUPP;
+ default:
+ return -EINVAL;
+ }
+}
+
+static int tc_get_tcm_parent(enum bpf_tc_attach_point attach_point,
+ __u32 *parent)
+{
+ switch (attach_point) {
+ case BPF_TC_INGRESS:
+ case BPF_TC_EGRESS:
+ if (*parent)
+ return -EINVAL;
+ *parent = TC_H_MAKE(TC_H_CLSACT,
+ attach_point == BPF_TC_INGRESS ?
+ TC_H_MIN_INGRESS : TC_H_MIN_EGRESS);
+ break;
+ case BPF_TC_CUSTOM:
+ if (!*parent)
+ return -EINVAL;
+ break;
+ default:
+ return -EINVAL;
+ }
+ return 0;
+}
+
+static int tc_qdisc_modify(struct bpf_tc_hook *hook, int cmd, int flags)
+{
+ qdisc_config_t config;
+ int ret;
+ struct libbpf_nla_req req;
+
+ ret = attach_point_to_config(hook, &config);
+ if (ret < 0)
+ return ret;
+
+ memset(&req, 0, sizeof(req));
+ req.nh.nlmsg_len = NLMSG_LENGTH(sizeof(struct tcmsg));
+ req.nh.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK | flags;
+ req.nh.nlmsg_type = cmd;
+ req.tc.tcm_family = AF_UNSPEC;
+ req.tc.tcm_ifindex = OPTS_GET(hook, ifindex, 0);
+
+ ret = config(&req);
+ if (ret < 0)
+ return ret;
+
+ return libbpf_netlink_send_recv(&req, NULL, NULL, NULL);
+}
+
+static int tc_qdisc_create_excl(struct bpf_tc_hook *hook)
+{
+ return tc_qdisc_modify(hook, RTM_NEWQDISC, NLM_F_CREATE | NLM_F_EXCL);
+}
+
+static int tc_qdisc_delete(struct bpf_tc_hook *hook)
+{
+ return tc_qdisc_modify(hook, RTM_DELQDISC, 0);
+}
+
+int bpf_tc_hook_create(struct bpf_tc_hook *hook)
+{
+ int ret;
+
+ if (!hook || !OPTS_VALID(hook, bpf_tc_hook) ||
+ OPTS_GET(hook, ifindex, 0) <= 0)
+ return libbpf_err(-EINVAL);
+
+ ret = tc_qdisc_create_excl(hook);
+ return libbpf_err(ret);
+}
+
+static int __bpf_tc_detach(const struct bpf_tc_hook *hook,
+ const struct bpf_tc_opts *opts,
+ const bool flush);
+
+int bpf_tc_hook_destroy(struct bpf_tc_hook *hook)
+{
+ if (!hook || !OPTS_VALID(hook, bpf_tc_hook) ||
+ OPTS_GET(hook, ifindex, 0) <= 0)
+ return libbpf_err(-EINVAL);
+
+ switch (OPTS_GET(hook, attach_point, 0)) {
+ case BPF_TC_INGRESS:
+ case BPF_TC_EGRESS:
+ return libbpf_err(__bpf_tc_detach(hook, NULL, true));
+ case BPF_TC_INGRESS | BPF_TC_EGRESS:
+ return libbpf_err(tc_qdisc_delete(hook));
+ case BPF_TC_CUSTOM:
+ return libbpf_err(-EOPNOTSUPP);
+ default:
+ return libbpf_err(-EINVAL);
+ }
+}
+
+struct bpf_cb_ctx {
+ struct bpf_tc_opts *opts;
+ bool processed;
+};
+
+static int __get_tc_info(void *cookie, struct tcmsg *tc, struct nlattr **tb,
+ bool unicast)
+{
+ struct nlattr *tbb[TCA_BPF_MAX + 1];
+ struct bpf_cb_ctx *info = cookie;
+
+ if (!info || !info->opts)
+ return -EINVAL;
+ if (unicast && info->processed)
+ return -EINVAL;
+ if (!tb[TCA_OPTIONS])
+ return NL_CONT;
+
+ libbpf_nla_parse_nested(tbb, TCA_BPF_MAX, tb[TCA_OPTIONS], NULL);
+ if (!tbb[TCA_BPF_ID])
+ return -EINVAL;
+
+ OPTS_SET(info->opts, prog_id, libbpf_nla_getattr_u32(tbb[TCA_BPF_ID]));
+ OPTS_SET(info->opts, handle, tc->tcm_handle);
+ OPTS_SET(info->opts, priority, TC_H_MAJ(tc->tcm_info) >> 16);
+
+ info->processed = true;
+ return unicast ? NL_NEXT : NL_DONE;
+}
+
+static int get_tc_info(struct nlmsghdr *nh, libbpf_dump_nlmsg_t fn,
+ void *cookie)
+{
+ struct tcmsg *tc = NLMSG_DATA(nh);
+ struct nlattr *tb[TCA_MAX + 1];
+
+ libbpf_nla_parse(tb, TCA_MAX,
+ (struct nlattr *)((void *)tc + NLMSG_ALIGN(sizeof(*tc))),
+ NLMSG_PAYLOAD(nh, sizeof(*tc)), NULL);
+ if (!tb[TCA_KIND])
+ return NL_CONT;
+ return __get_tc_info(cookie, tc, tb, nh->nlmsg_flags & NLM_F_ECHO);
+}
+
+static int tc_add_fd_and_name(struct libbpf_nla_req *req, int fd)
+{
+ struct bpf_prog_info info;
+ __u32 info_len = sizeof(info);
+ char name[256];
+ int len, ret;
+
+ memset(&info, 0, info_len);
+ ret = bpf_obj_get_info_by_fd(fd, &info, &info_len);
+ if (ret < 0)
+ return ret;
+
+ ret = nlattr_add(req, TCA_BPF_FD, &fd, sizeof(fd));
+ if (ret < 0)
+ return ret;
+ len = snprintf(name, sizeof(name), "%s:[%u]", info.name, info.id);
+ if (len < 0)
+ return -errno;
+ if (len >= sizeof(name))
+ return -ENAMETOOLONG;
+ return nlattr_add(req, TCA_BPF_NAME, name, len + 1);
+}
+
+int bpf_tc_attach(const struct bpf_tc_hook *hook, struct bpf_tc_opts *opts)
+{
+ __u32 protocol, bpf_flags, handle, priority, parent, prog_id, flags;
+ int ret, ifindex, attach_point, prog_fd;
+ struct bpf_cb_ctx info = {};
+ struct libbpf_nla_req req;
+ struct nlattr *nla;
+
+ if (!hook || !opts ||
+ !OPTS_VALID(hook, bpf_tc_hook) ||
+ !OPTS_VALID(opts, bpf_tc_opts))
+ return libbpf_err(-EINVAL);
+
+ ifindex = OPTS_GET(hook, ifindex, 0);
+ parent = OPTS_GET(hook, parent, 0);
+ attach_point = OPTS_GET(hook, attach_point, 0);
+
+ handle = OPTS_GET(opts, handle, 0);
+ priority = OPTS_GET(opts, priority, 0);
+ prog_fd = OPTS_GET(opts, prog_fd, 0);
+ prog_id = OPTS_GET(opts, prog_id, 0);
+ flags = OPTS_GET(opts, flags, 0);
+
+ if (ifindex <= 0 || !prog_fd || prog_id)
+ return libbpf_err(-EINVAL);
+ if (priority > UINT16_MAX)
+ return libbpf_err(-EINVAL);
+ if (flags & ~BPF_TC_F_REPLACE)
+ return libbpf_err(-EINVAL);
+
+ flags = (flags & BPF_TC_F_REPLACE) ? NLM_F_REPLACE : NLM_F_EXCL;
+ protocol = ETH_P_ALL;
+
+ memset(&req, 0, sizeof(req));
+ req.nh.nlmsg_len = NLMSG_LENGTH(sizeof(struct tcmsg));
+ req.nh.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK | NLM_F_CREATE |
+ NLM_F_ECHO | flags;
+ req.nh.nlmsg_type = RTM_NEWTFILTER;
+ req.tc.tcm_family = AF_UNSPEC;
+ req.tc.tcm_ifindex = ifindex;
+ req.tc.tcm_handle = handle;
+ req.tc.tcm_info = TC_H_MAKE(priority << 16, htons(protocol));
+
+ ret = tc_get_tcm_parent(attach_point, &parent);
+ if (ret < 0)
+ return libbpf_err(ret);
+ req.tc.tcm_parent = parent;
+
+ ret = nlattr_add(&req, TCA_KIND, "bpf", sizeof("bpf"));
+ if (ret < 0)
+ return libbpf_err(ret);
+ nla = nlattr_begin_nested(&req, TCA_OPTIONS);
+ if (!nla)
+ return libbpf_err(-EMSGSIZE);
+ ret = tc_add_fd_and_name(&req, prog_fd);
+ if (ret < 0)
+ return libbpf_err(ret);
+ bpf_flags = TCA_BPF_FLAG_ACT_DIRECT;
+ ret = nlattr_add(&req, TCA_BPF_FLAGS, &bpf_flags, sizeof(bpf_flags));
+ if (ret < 0)
+ return libbpf_err(ret);
+ nlattr_end_nested(&req, nla);
+
+ info.opts = opts;
+
+ ret = libbpf_netlink_send_recv(&req, get_tc_info, NULL, &info);
+ if (ret < 0)
+ return libbpf_err(ret);
+ if (!info.processed)
+ return libbpf_err(-ENOENT);
+ return ret;
+}
+
+static int __bpf_tc_detach(const struct bpf_tc_hook *hook,
+ const struct bpf_tc_opts *opts,
+ const bool flush)
+{
+ __u32 protocol = 0, handle, priority, parent, prog_id, flags;
+ int ret, ifindex, attach_point, prog_fd;
+ struct libbpf_nla_req req;
+
+ if (!hook ||
+ !OPTS_VALID(hook, bpf_tc_hook) ||
+ !OPTS_VALID(opts, bpf_tc_opts))
+ return -EINVAL;
+
+ ifindex = OPTS_GET(hook, ifindex, 0);
+ parent = OPTS_GET(hook, parent, 0);
+ attach_point = OPTS_GET(hook, attach_point, 0);
+
+ handle = OPTS_GET(opts, handle, 0);
+ priority = OPTS_GET(opts, priority, 0);
+ prog_fd = OPTS_GET(opts, prog_fd, 0);
+ prog_id = OPTS_GET(opts, prog_id, 0);
+ flags = OPTS_GET(opts, flags, 0);
+
+ if (ifindex <= 0 || flags || prog_fd || prog_id)
+ return -EINVAL;
+ if (priority > UINT16_MAX)
+ return -EINVAL;
+ if (!flush) {
+ if (!handle || !priority)
+ return -EINVAL;
+ protocol = ETH_P_ALL;
+ } else {
+ if (handle || priority)
+ return -EINVAL;
+ }
+
+ memset(&req, 0, sizeof(req));
+ req.nh.nlmsg_len = NLMSG_LENGTH(sizeof(struct tcmsg));
+ req.nh.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
+ req.nh.nlmsg_type = RTM_DELTFILTER;
+ req.tc.tcm_family = AF_UNSPEC;
+ req.tc.tcm_ifindex = ifindex;
+ if (!flush) {
+ req.tc.tcm_handle = handle;
+ req.tc.tcm_info = TC_H_MAKE(priority << 16, htons(protocol));
+ }
+
+ ret = tc_get_tcm_parent(attach_point, &parent);
+ if (ret < 0)
+ return ret;
+ req.tc.tcm_parent = parent;
+
+ if (!flush) {
+ ret = nlattr_add(&req, TCA_KIND, "bpf", sizeof("bpf"));
+ if (ret < 0)
+ return ret;
+ }
+
+ return libbpf_netlink_send_recv(&req, NULL, NULL, NULL);
+}
+
+int bpf_tc_detach(const struct bpf_tc_hook *hook,
+ const struct bpf_tc_opts *opts)
+{
+ int ret;
+
+ if (!opts)
+ return libbpf_err(-EINVAL);
+
+ ret = __bpf_tc_detach(hook, opts, false);
+ return libbpf_err(ret);
+}
+
+int bpf_tc_query(const struct bpf_tc_hook *hook, struct bpf_tc_opts *opts)
+{
+ __u32 protocol, handle, priority, parent, prog_id, flags;
+ int ret, ifindex, attach_point, prog_fd;
+ struct bpf_cb_ctx info = {};
+ struct libbpf_nla_req req;
+
+ if (!hook || !opts ||
+ !OPTS_VALID(hook, bpf_tc_hook) ||
+ !OPTS_VALID(opts, bpf_tc_opts))
+ return libbpf_err(-EINVAL);
+
+ ifindex = OPTS_GET(hook, ifindex, 0);
+ parent = OPTS_GET(hook, parent, 0);
+ attach_point = OPTS_GET(hook, attach_point, 0);
+
+ handle = OPTS_GET(opts, handle, 0);
+ priority = OPTS_GET(opts, priority, 0);
+ prog_fd = OPTS_GET(opts, prog_fd, 0);
+ prog_id = OPTS_GET(opts, prog_id, 0);
+ flags = OPTS_GET(opts, flags, 0);
+
+ if (ifindex <= 0 || flags || prog_fd || prog_id ||
+ !handle || !priority)
+ return libbpf_err(-EINVAL);
+ if (priority > UINT16_MAX)
+ return libbpf_err(-EINVAL);
+
+ protocol = ETH_P_ALL;
+
+ memset(&req, 0, sizeof(req));
+ req.nh.nlmsg_len = NLMSG_LENGTH(sizeof(struct tcmsg));
+ req.nh.nlmsg_flags = NLM_F_REQUEST;
+ req.nh.nlmsg_type = RTM_GETTFILTER;
+ req.tc.tcm_family = AF_UNSPEC;
+ req.tc.tcm_ifindex = ifindex;
+ req.tc.tcm_handle = handle;
+ req.tc.tcm_info = TC_H_MAKE(priority << 16, htons(protocol));
+
+ ret = tc_get_tcm_parent(attach_point, &parent);
+ if (ret < 0)
+ return libbpf_err(ret);
+ req.tc.tcm_parent = parent;
+
+ ret = nlattr_add(&req, TCA_KIND, "bpf", sizeof("bpf"));
+ if (ret < 0)
+ return libbpf_err(ret);
+
+ info.opts = opts;
+
+ ret = libbpf_netlink_send_recv(&req, get_tc_info, NULL, &info);
+ if (ret < 0)
+ return libbpf_err(ret);
+ if (!info.processed)
+ return libbpf_err(-ENOENT);
+ return ret;
+}
diff --git a/src/nlattr.c b/src/nlattr.c
new file mode 100644
index 0000000..3900d05
--- /dev/null
+++ b/src/nlattr.c
@@ -0,0 +1,195 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+
+/*
+ * NETLINK Netlink attributes
+ *
+ * Copyright (c) 2003-2013 Thomas Graf <tgraf@suug.ch>
+ */
+
+#include <errno.h>
+#include <string.h>
+#include <stdio.h>
+#include <linux/rtnetlink.h>
+#include "nlattr.h"
+#include "libbpf_internal.h"
+
+static uint16_t nla_attr_minlen[LIBBPF_NLA_TYPE_MAX+1] = {
+ [LIBBPF_NLA_U8] = sizeof(uint8_t),
+ [LIBBPF_NLA_U16] = sizeof(uint16_t),
+ [LIBBPF_NLA_U32] = sizeof(uint32_t),
+ [LIBBPF_NLA_U64] = sizeof(uint64_t),
+ [LIBBPF_NLA_STRING] = 1,
+ [LIBBPF_NLA_FLAG] = 0,
+};
+
+static struct nlattr *nla_next(const struct nlattr *nla, int *remaining)
+{
+ int totlen = NLA_ALIGN(nla->nla_len);
+
+ *remaining -= totlen;
+ return (struct nlattr *)((void *)nla + totlen);
+}
+
+static int nla_ok(const struct nlattr *nla, int remaining)
+{
+ return remaining >= (int)sizeof(*nla) &&
+ nla->nla_len >= sizeof(*nla) &&
+ nla->nla_len <= remaining;
+}
+
+static int nla_type(const struct nlattr *nla)
+{
+ return nla->nla_type & NLA_TYPE_MASK;
+}
+
+static int validate_nla(struct nlattr *nla, int maxtype,
+ struct libbpf_nla_policy *policy)
+{
+ struct libbpf_nla_policy *pt;
+ unsigned int minlen = 0;
+ int type = nla_type(nla);
+
+ if (type < 0 || type > maxtype)
+ return 0;
+
+ pt = &policy[type];
+
+ if (pt->type > LIBBPF_NLA_TYPE_MAX)
+ return 0;
+
+ if (pt->minlen)
+ minlen = pt->minlen;
+ else if (pt->type != LIBBPF_NLA_UNSPEC)
+ minlen = nla_attr_minlen[pt->type];
+
+ if (libbpf_nla_len(nla) < minlen)
+ return -1;
+
+ if (pt->maxlen && libbpf_nla_len(nla) > pt->maxlen)
+ return -1;
+
+ if (pt->type == LIBBPF_NLA_STRING) {
+ char *data = libbpf_nla_data(nla);
+
+ if (data[libbpf_nla_len(nla) - 1] != '\0')
+ return -1;
+ }
+
+ return 0;
+}
+
+static inline int nlmsg_len(const struct nlmsghdr *nlh)
+{
+ return nlh->nlmsg_len - NLMSG_HDRLEN;
+}
+
+/**
+ * Create attribute index based on a stream of attributes.
+ * @arg tb Index array to be filled (maxtype+1 elements).
+ * @arg maxtype Maximum attribute type expected and accepted.
+ * @arg head Head of attribute stream.
+ * @arg len Length of attribute stream.
+ * @arg policy Attribute validation policy.
+ *
+ * Iterates over the stream of attributes and stores a pointer to each
+ * attribute in the index array using the attribute type as index to
+ * the array. Attribute with a type greater than the maximum type
+ * specified will be silently ignored in order to maintain backwards
+ * compatibility. If \a policy is not NULL, the attribute will be
+ * validated using the specified policy.
+ *
+ * @see nla_validate
+ * @return 0 on success or a negative error code.
+ */
+int libbpf_nla_parse(struct nlattr *tb[], int maxtype, struct nlattr *head,
+ int len, struct libbpf_nla_policy *policy)
+{
+ struct nlattr *nla;
+ int rem, err;
+
+ memset(tb, 0, sizeof(struct nlattr *) * (maxtype + 1));
+
+ libbpf_nla_for_each_attr(nla, head, len, rem) {
+ int type = nla_type(nla);
+
+ if (type > maxtype)
+ continue;
+
+ if (policy) {
+ err = validate_nla(nla, maxtype, policy);
+ if (err < 0)
+ goto errout;
+ }
+
+ if (tb[type])
+ pr_warn("Attribute of type %#x found multiple times in message, "
+ "previous attribute is being ignored.\n", type);
+
+ tb[type] = nla;
+ }
+
+ err = 0;
+errout:
+ return err;
+}
+
+/**
+ * Create attribute index based on nested attribute
+ * @arg tb Index array to be filled (maxtype+1 elements).
+ * @arg maxtype Maximum attribute type expected and accepted.
+ * @arg nla Nested Attribute.
+ * @arg policy Attribute validation policy.
+ *
+ * Feeds the stream of attributes nested into the specified attribute
+ * to libbpf_nla_parse().
+ *
+ * @see libbpf_nla_parse
+ * @return 0 on success or a negative error code.
+ */
+int libbpf_nla_parse_nested(struct nlattr *tb[], int maxtype,
+ struct nlattr *nla,
+ struct libbpf_nla_policy *policy)
+{
+ return libbpf_nla_parse(tb, maxtype, libbpf_nla_data(nla),
+ libbpf_nla_len(nla), policy);
+}
+
+/* dump netlink extended ack error message */
+int libbpf_nla_dump_errormsg(struct nlmsghdr *nlh)
+{
+ struct libbpf_nla_policy extack_policy[NLMSGERR_ATTR_MAX + 1] = {
+ [NLMSGERR_ATTR_MSG] = { .type = LIBBPF_NLA_STRING },
+ [NLMSGERR_ATTR_OFFS] = { .type = LIBBPF_NLA_U32 },
+ };
+ struct nlattr *tb[NLMSGERR_ATTR_MAX + 1], *attr;
+ struct nlmsgerr *err;
+ char *errmsg = NULL;
+ int hlen, alen;
+
+ /* no TLVs, nothing to do here */
+ if (!(nlh->nlmsg_flags & NLM_F_ACK_TLVS))
+ return 0;
+
+ err = (struct nlmsgerr *)NLMSG_DATA(nlh);
+ hlen = sizeof(*err);
+
+ /* if NLM_F_CAPPED is set then the inner err msg was capped */
+ if (!(nlh->nlmsg_flags & NLM_F_CAPPED))
+ hlen += nlmsg_len(&err->msg);
+
+ attr = (struct nlattr *) ((void *) err + hlen);
+ alen = nlh->nlmsg_len - hlen;
+
+ if (libbpf_nla_parse(tb, NLMSGERR_ATTR_MAX, attr, alen,
+ extack_policy) != 0) {
+ pr_warn("Failed to parse extended error attributes\n");
+ return 0;
+ }
+
+ if (tb[NLMSGERR_ATTR_MSG])
+ errmsg = (char *) libbpf_nla_data(tb[NLMSGERR_ATTR_MSG]);
+
+ pr_warn("Kernel error message: %s\n", errmsg);
+
+ return 0;
+}
diff --git a/src/nlattr.h b/src/nlattr.h
new file mode 100644
index 0000000..4d15ae2
--- /dev/null
+++ b/src/nlattr.h
@@ -0,0 +1,164 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+/*
+ * NETLINK Netlink attributes
+ *
+ * Copyright (c) 2003-2013 Thomas Graf <tgraf@suug.ch>
+ */
+
+#ifndef __LIBBPF_NLATTR_H
+#define __LIBBPF_NLATTR_H
+
+#include <stdint.h>
+#include <string.h>
+#include <errno.h>
+#include <linux/netlink.h>
+#include <linux/rtnetlink.h>
+
+/* avoid multiple definition of netlink features */
+#define __LINUX_NETLINK_H
+
+/**
+ * Standard attribute types to specify validation policy
+ */
+enum {
+ LIBBPF_NLA_UNSPEC, /**< Unspecified type, binary data chunk */
+ LIBBPF_NLA_U8, /**< 8 bit integer */
+ LIBBPF_NLA_U16, /**< 16 bit integer */
+ LIBBPF_NLA_U32, /**< 32 bit integer */
+ LIBBPF_NLA_U64, /**< 64 bit integer */
+ LIBBPF_NLA_STRING, /**< NUL terminated character string */
+ LIBBPF_NLA_FLAG, /**< Flag */
+ LIBBPF_NLA_MSECS, /**< Micro seconds (64bit) */
+ LIBBPF_NLA_NESTED, /**< Nested attributes */
+ __LIBBPF_NLA_TYPE_MAX,
+};
+
+#define LIBBPF_NLA_TYPE_MAX (__LIBBPF_NLA_TYPE_MAX - 1)
+
+/**
+ * @ingroup attr
+ * Attribute validation policy.
+ *
+ * See section @core_doc{core_attr_parse,Attribute Parsing} for more details.
+ */
+struct libbpf_nla_policy {
+ /** Type of attribute or LIBBPF_NLA_UNSPEC */
+ uint16_t type;
+
+ /** Minimal length of payload required */
+ uint16_t minlen;
+
+ /** Maximal length of payload allowed */
+ uint16_t maxlen;
+};
+
+struct libbpf_nla_req {
+ struct nlmsghdr nh;
+ union {
+ struct ifinfomsg ifinfo;
+ struct tcmsg tc;
+ };
+ char buf[128];
+};
+
+/**
+ * @ingroup attr
+ * Iterate over a stream of attributes
+ * @arg pos loop counter, set to current attribute
+ * @arg head head of attribute stream
+ * @arg len length of attribute stream
+ * @arg rem initialized to len, holds bytes currently remaining in stream
+ */
+#define libbpf_nla_for_each_attr(pos, head, len, rem) \
+ for (pos = head, rem = len; \
+ nla_ok(pos, rem); \
+ pos = nla_next(pos, &(rem)))
+
+/**
+ * libbpf_nla_data - head of payload
+ * @nla: netlink attribute
+ */
+static inline void *libbpf_nla_data(const struct nlattr *nla)
+{
+ return (void *)nla + NLA_HDRLEN;
+}
+
+static inline uint8_t libbpf_nla_getattr_u8(const struct nlattr *nla)
+{
+ return *(uint8_t *)libbpf_nla_data(nla);
+}
+
+static inline uint32_t libbpf_nla_getattr_u32(const struct nlattr *nla)
+{
+ return *(uint32_t *)libbpf_nla_data(nla);
+}
+
+static inline const char *libbpf_nla_getattr_str(const struct nlattr *nla)
+{
+ return (const char *)libbpf_nla_data(nla);
+}
+
+/**
+ * libbpf_nla_len - length of payload
+ * @nla: netlink attribute
+ */
+static inline int libbpf_nla_len(const struct nlattr *nla)
+{
+ return nla->nla_len - NLA_HDRLEN;
+}
+
+int libbpf_nla_parse(struct nlattr *tb[], int maxtype, struct nlattr *head,
+ int len, struct libbpf_nla_policy *policy);
+int libbpf_nla_parse_nested(struct nlattr *tb[], int maxtype,
+ struct nlattr *nla,
+ struct libbpf_nla_policy *policy);
+
+int libbpf_nla_dump_errormsg(struct nlmsghdr *nlh);
+
+static inline struct nlattr *nla_data(struct nlattr *nla)
+{
+ return (struct nlattr *)((void *)nla + NLA_HDRLEN);
+}
+
+static inline struct nlattr *req_tail(struct libbpf_nla_req *req)
+{
+ return (struct nlattr *)((void *)req + NLMSG_ALIGN(req->nh.nlmsg_len));
+}
+
+static inline int nlattr_add(struct libbpf_nla_req *req, int type,
+ const void *data, int len)
+{
+ struct nlattr *nla;
+
+ if (NLMSG_ALIGN(req->nh.nlmsg_len) + NLA_ALIGN(NLA_HDRLEN + len) > sizeof(*req))
+ return -EMSGSIZE;
+ if (!!data != !!len)
+ return -EINVAL;
+
+ nla = req_tail(req);
+ nla->nla_type = type;
+ nla->nla_len = NLA_HDRLEN + len;
+ if (data)
+ memcpy(nla_data(nla), data, len);
+ req->nh.nlmsg_len = NLMSG_ALIGN(req->nh.nlmsg_len) + NLA_ALIGN(nla->nla_len);
+ return 0;
+}
+
+static inline struct nlattr *nlattr_begin_nested(struct libbpf_nla_req *req, int type)
+{
+ struct nlattr *tail;
+
+ tail = req_tail(req);
+ if (nlattr_add(req, type | NLA_F_NESTED, NULL, 0))
+ return NULL;
+ return tail;
+}
+
+static inline void nlattr_end_nested(struct libbpf_nla_req *req,
+ struct nlattr *tail)
+{
+ tail->nla_len = (void *)req_tail(req) - (void *)tail;
+}
+
+#endif /* __LIBBPF_NLATTR_H */
diff --git a/src/relo_core.c b/src/relo_core.c
new file mode 100644
index 0000000..c4b0e81
--- /dev/null
+++ b/src/relo_core.c
@@ -0,0 +1,1690 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+/* Copyright (c) 2019 Facebook */
+
+#ifdef __KERNEL__
+#include <linux/bpf.h>
+#include <linux/btf.h>
+#include <linux/string.h>
+#include <linux/bpf_verifier.h>
+#include "relo_core.h"
+
+static const char *btf_kind_str(const struct btf_type *t)
+{
+ return btf_type_str(t);
+}
+
+static bool is_ldimm64_insn(struct bpf_insn *insn)
+{
+ return insn->code == (BPF_LD | BPF_IMM | BPF_DW);
+}
+
+static const struct btf_type *
+skip_mods_and_typedefs(const struct btf *btf, u32 id, u32 *res_id)
+{
+ return btf_type_skip_modifiers(btf, id, res_id);
+}
+
+static const char *btf__name_by_offset(const struct btf *btf, u32 offset)
+{
+ return btf_name_by_offset(btf, offset);
+}
+
+static s64 btf__resolve_size(const struct btf *btf, u32 type_id)
+{
+ const struct btf_type *t;
+ int size;
+
+ t = btf_type_by_id(btf, type_id);
+ t = btf_resolve_size(btf, t, &size);
+ if (IS_ERR(t))
+ return PTR_ERR(t);
+ return size;
+}
+
+enum libbpf_print_level {
+ LIBBPF_WARN,
+ LIBBPF_INFO,
+ LIBBPF_DEBUG,
+};
+
+#undef pr_warn
+#undef pr_info
+#undef pr_debug
+#define pr_warn(fmt, log, ...) bpf_log((void *)log, fmt, "", ##__VA_ARGS__)
+#define pr_info(fmt, log, ...) bpf_log((void *)log, fmt, "", ##__VA_ARGS__)
+#define pr_debug(fmt, log, ...) bpf_log((void *)log, fmt, "", ##__VA_ARGS__)
+#define libbpf_print(level, fmt, ...) bpf_log((void *)prog_name, fmt, ##__VA_ARGS__)
+#else
+#include <stdio.h>
+#include <string.h>
+#include <errno.h>
+#include <ctype.h>
+#include <linux/err.h>
+
+#include "libbpf.h"
+#include "bpf.h"
+#include "btf.h"
+#include "str_error.h"
+#include "libbpf_internal.h"
+#endif
+
+static bool is_flex_arr(const struct btf *btf,
+ const struct bpf_core_accessor *acc,
+ const struct btf_array *arr)
+{
+ const struct btf_type *t;
+
+ /* not a flexible array, if not inside a struct or has non-zero size */
+ if (!acc->name || arr->nelems > 0)
+ return false;
+
+ /* has to be the last member of enclosing struct */
+ t = btf_type_by_id(btf, acc->type_id);
+ return acc->idx == btf_vlen(t) - 1;
+}
+
+static const char *core_relo_kind_str(enum bpf_core_relo_kind kind)
+{
+ switch (kind) {
+ case BPF_CORE_FIELD_BYTE_OFFSET: return "byte_off";
+ case BPF_CORE_FIELD_BYTE_SIZE: return "byte_sz";
+ case BPF_CORE_FIELD_EXISTS: return "field_exists";
+ case BPF_CORE_FIELD_SIGNED: return "signed";
+ case BPF_CORE_FIELD_LSHIFT_U64: return "lshift_u64";
+ case BPF_CORE_FIELD_RSHIFT_U64: return "rshift_u64";
+ case BPF_CORE_TYPE_ID_LOCAL: return "local_type_id";
+ case BPF_CORE_TYPE_ID_TARGET: return "target_type_id";
+ case BPF_CORE_TYPE_EXISTS: return "type_exists";
+ case BPF_CORE_TYPE_MATCHES: return "type_matches";
+ case BPF_CORE_TYPE_SIZE: return "type_size";
+ case BPF_CORE_ENUMVAL_EXISTS: return "enumval_exists";
+ case BPF_CORE_ENUMVAL_VALUE: return "enumval_value";
+ default: return "unknown";
+ }
+}
+
+static bool core_relo_is_field_based(enum bpf_core_relo_kind kind)
+{
+ switch (kind) {
+ case BPF_CORE_FIELD_BYTE_OFFSET:
+ case BPF_CORE_FIELD_BYTE_SIZE:
+ case BPF_CORE_FIELD_EXISTS:
+ case BPF_CORE_FIELD_SIGNED:
+ case BPF_CORE_FIELD_LSHIFT_U64:
+ case BPF_CORE_FIELD_RSHIFT_U64:
+ return true;
+ default:
+ return false;
+ }
+}
+
+static bool core_relo_is_type_based(enum bpf_core_relo_kind kind)
+{
+ switch (kind) {
+ case BPF_CORE_TYPE_ID_LOCAL:
+ case BPF_CORE_TYPE_ID_TARGET:
+ case BPF_CORE_TYPE_EXISTS:
+ case BPF_CORE_TYPE_MATCHES:
+ case BPF_CORE_TYPE_SIZE:
+ return true;
+ default:
+ return false;
+ }
+}
+
+static bool core_relo_is_enumval_based(enum bpf_core_relo_kind kind)
+{
+ switch (kind) {
+ case BPF_CORE_ENUMVAL_EXISTS:
+ case BPF_CORE_ENUMVAL_VALUE:
+ return true;
+ default:
+ return false;
+ }
+}
+
+int __bpf_core_types_are_compat(const struct btf *local_btf, __u32 local_id,
+ const struct btf *targ_btf, __u32 targ_id, int level)
+{
+ const struct btf_type *local_type, *targ_type;
+ int depth = 32; /* max recursion depth */
+
+ /* caller made sure that names match (ignoring flavor suffix) */
+ local_type = btf_type_by_id(local_btf, local_id);
+ targ_type = btf_type_by_id(targ_btf, targ_id);
+ if (!btf_kind_core_compat(local_type, targ_type))
+ return 0;
+
+recur:
+ depth--;
+ if (depth < 0)
+ return -EINVAL;
+
+ local_type = skip_mods_and_typedefs(local_btf, local_id, &local_id);
+ targ_type = skip_mods_and_typedefs(targ_btf, targ_id, &targ_id);
+ if (!local_type || !targ_type)
+ return -EINVAL;
+
+ if (!btf_kind_core_compat(local_type, targ_type))
+ return 0;
+
+ switch (btf_kind(local_type)) {
+ case BTF_KIND_UNKN:
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION:
+ case BTF_KIND_ENUM:
+ case BTF_KIND_FWD:
+ case BTF_KIND_ENUM64:
+ return 1;
+ case BTF_KIND_INT:
+ /* just reject deprecated bitfield-like integers; all other
+ * integers are by default compatible between each other
+ */
+ return btf_int_offset(local_type) == 0 && btf_int_offset(targ_type) == 0;
+ case BTF_KIND_PTR:
+ local_id = local_type->type;
+ targ_id = targ_type->type;
+ goto recur;
+ case BTF_KIND_ARRAY:
+ local_id = btf_array(local_type)->type;
+ targ_id = btf_array(targ_type)->type;
+ goto recur;
+ case BTF_KIND_FUNC_PROTO: {
+ struct btf_param *local_p = btf_params(local_type);
+ struct btf_param *targ_p = btf_params(targ_type);
+ __u16 local_vlen = btf_vlen(local_type);
+ __u16 targ_vlen = btf_vlen(targ_type);
+ int i, err;
+
+ if (local_vlen != targ_vlen)
+ return 0;
+
+ for (i = 0; i < local_vlen; i++, local_p++, targ_p++) {
+ if (level <= 0)
+ return -EINVAL;
+
+ skip_mods_and_typedefs(local_btf, local_p->type, &local_id);
+ skip_mods_and_typedefs(targ_btf, targ_p->type, &targ_id);
+ err = __bpf_core_types_are_compat(local_btf, local_id, targ_btf, targ_id,
+ level - 1);
+ if (err <= 0)
+ return err;
+ }
+
+ /* tail recurse for return type check */
+ skip_mods_and_typedefs(local_btf, local_type->type, &local_id);
+ skip_mods_and_typedefs(targ_btf, targ_type->type, &targ_id);
+ goto recur;
+ }
+ default:
+ pr_warn("unexpected kind %s relocated, local [%d], target [%d]\n",
+ btf_kind_str(local_type), local_id, targ_id);
+ return 0;
+ }
+}
+
+/*
+ * Turn bpf_core_relo into a low- and high-level spec representation,
+ * validating correctness along the way, as well as calculating resulting
+ * field bit offset, specified by accessor string. Low-level spec captures
+ * every single level of nestedness, including traversing anonymous
+ * struct/union members. High-level one only captures semantically meaningful
+ * "turning points": named fields and array indicies.
+ * E.g., for this case:
+ *
+ * struct sample {
+ * int __unimportant;
+ * struct {
+ * int __1;
+ * int __2;
+ * int a[7];
+ * };
+ * };
+ *
+ * struct sample *s = ...;
+ *
+ * int x = &s->a[3]; // access string = '0:1:2:3'
+ *
+ * Low-level spec has 1:1 mapping with each element of access string (it's
+ * just a parsed access string representation): [0, 1, 2, 3].
+ *
+ * High-level spec will capture only 3 points:
+ * - initial zero-index access by pointer (&s->... is the same as &s[0]...);
+ * - field 'a' access (corresponds to '2' in low-level spec);
+ * - array element #3 access (corresponds to '3' in low-level spec).
+ *
+ * Type-based relocations (TYPE_EXISTS/TYPE_MATCHES/TYPE_SIZE,
+ * TYPE_ID_LOCAL/TYPE_ID_TARGET) don't capture any field information. Their
+ * spec and raw_spec are kept empty.
+ *
+ * Enum value-based relocations (ENUMVAL_EXISTS/ENUMVAL_VALUE) use access
+ * string to specify enumerator's value index that need to be relocated.
+ */
+int bpf_core_parse_spec(const char *prog_name, const struct btf *btf,
+ const struct bpf_core_relo *relo,
+ struct bpf_core_spec *spec)
+{
+ int access_idx, parsed_len, i;
+ struct bpf_core_accessor *acc;
+ const struct btf_type *t;
+ const char *name, *spec_str;
+ __u32 id, name_off;
+ __s64 sz;
+
+ spec_str = btf__name_by_offset(btf, relo->access_str_off);
+ if (str_is_empty(spec_str) || *spec_str == ':')
+ return -EINVAL;
+
+ memset(spec, 0, sizeof(*spec));
+ spec->btf = btf;
+ spec->root_type_id = relo->type_id;
+ spec->relo_kind = relo->kind;
+
+ /* type-based relocations don't have a field access string */
+ if (core_relo_is_type_based(relo->kind)) {
+ if (strcmp(spec_str, "0"))
+ return -EINVAL;
+ return 0;
+ }
+
+ /* parse spec_str="0:1:2:3:4" into array raw_spec=[0, 1, 2, 3, 4] */
+ while (*spec_str) {
+ if (*spec_str == ':')
+ ++spec_str;
+ if (sscanf(spec_str, "%d%n", &access_idx, &parsed_len) != 1)
+ return -EINVAL;
+ if (spec->raw_len == BPF_CORE_SPEC_MAX_LEN)
+ return -E2BIG;
+ spec_str += parsed_len;
+ spec->raw_spec[spec->raw_len++] = access_idx;
+ }
+
+ if (spec->raw_len == 0)
+ return -EINVAL;
+
+ t = skip_mods_and_typedefs(btf, relo->type_id, &id);
+ if (!t)
+ return -EINVAL;
+
+ access_idx = spec->raw_spec[0];
+ acc = &spec->spec[0];
+ acc->type_id = id;
+ acc->idx = access_idx;
+ spec->len++;
+
+ if (core_relo_is_enumval_based(relo->kind)) {
+ if (!btf_is_any_enum(t) || spec->raw_len > 1 || access_idx >= btf_vlen(t))
+ return -EINVAL;
+
+ /* record enumerator name in a first accessor */
+ name_off = btf_is_enum(t) ? btf_enum(t)[access_idx].name_off
+ : btf_enum64(t)[access_idx].name_off;
+ acc->name = btf__name_by_offset(btf, name_off);
+ return 0;
+ }
+
+ if (!core_relo_is_field_based(relo->kind))
+ return -EINVAL;
+
+ sz = btf__resolve_size(btf, id);
+ if (sz < 0)
+ return sz;
+ spec->bit_offset = access_idx * sz * 8;
+
+ for (i = 1; i < spec->raw_len; i++) {
+ t = skip_mods_and_typedefs(btf, id, &id);
+ if (!t)
+ return -EINVAL;
+
+ access_idx = spec->raw_spec[i];
+ acc = &spec->spec[spec->len];
+
+ if (btf_is_composite(t)) {
+ const struct btf_member *m;
+ __u32 bit_offset;
+
+ if (access_idx >= btf_vlen(t))
+ return -EINVAL;
+
+ bit_offset = btf_member_bit_offset(t, access_idx);
+ spec->bit_offset += bit_offset;
+
+ m = btf_members(t) + access_idx;
+ if (m->name_off) {
+ name = btf__name_by_offset(btf, m->name_off);
+ if (str_is_empty(name))
+ return -EINVAL;
+
+ acc->type_id = id;
+ acc->idx = access_idx;
+ acc->name = name;
+ spec->len++;
+ }
+
+ id = m->type;
+ } else if (btf_is_array(t)) {
+ const struct btf_array *a = btf_array(t);
+ bool flex;
+
+ t = skip_mods_and_typedefs(btf, a->type, &id);
+ if (!t)
+ return -EINVAL;
+
+ flex = is_flex_arr(btf, acc - 1, a);
+ if (!flex && access_idx >= a->nelems)
+ return -EINVAL;
+
+ spec->spec[spec->len].type_id = id;
+ spec->spec[spec->len].idx = access_idx;
+ spec->len++;
+
+ sz = btf__resolve_size(btf, id);
+ if (sz < 0)
+ return sz;
+ spec->bit_offset += access_idx * sz * 8;
+ } else {
+ pr_warn("prog '%s': relo for [%u] %s (at idx %d) captures type [%d] of unexpected kind %s\n",
+ prog_name, relo->type_id, spec_str, i, id, btf_kind_str(t));
+ return -EINVAL;
+ }
+ }
+
+ return 0;
+}
+
+/* Check two types for compatibility for the purpose of field access
+ * relocation. const/volatile/restrict and typedefs are skipped to ensure we
+ * are relocating semantically compatible entities:
+ * - any two STRUCTs/UNIONs are compatible and can be mixed;
+ * - any two FWDs are compatible, if their names match (modulo flavor suffix);
+ * - any two PTRs are always compatible;
+ * - for ENUMs, names should be the same (ignoring flavor suffix) or at
+ * least one of enums should be anonymous;
+ * - for ENUMs, check sizes, names are ignored;
+ * - for INT, size and signedness are ignored;
+ * - any two FLOATs are always compatible;
+ * - for ARRAY, dimensionality is ignored, element types are checked for
+ * compatibility recursively;
+ * - everything else shouldn't be ever a target of relocation.
+ * These rules are not set in stone and probably will be adjusted as we get
+ * more experience with using BPF CO-RE relocations.
+ */
+static int bpf_core_fields_are_compat(const struct btf *local_btf,
+ __u32 local_id,
+ const struct btf *targ_btf,
+ __u32 targ_id)
+{
+ const struct btf_type *local_type, *targ_type;
+
+recur:
+ local_type = skip_mods_and_typedefs(local_btf, local_id, &local_id);
+ targ_type = skip_mods_and_typedefs(targ_btf, targ_id, &targ_id);
+ if (!local_type || !targ_type)
+ return -EINVAL;
+
+ if (btf_is_composite(local_type) && btf_is_composite(targ_type))
+ return 1;
+ if (!btf_kind_core_compat(local_type, targ_type))
+ return 0;
+
+ switch (btf_kind(local_type)) {
+ case BTF_KIND_PTR:
+ case BTF_KIND_FLOAT:
+ return 1;
+ case BTF_KIND_FWD:
+ case BTF_KIND_ENUM64:
+ case BTF_KIND_ENUM: {
+ const char *local_name, *targ_name;
+ size_t local_len, targ_len;
+
+ local_name = btf__name_by_offset(local_btf,
+ local_type->name_off);
+ targ_name = btf__name_by_offset(targ_btf, targ_type->name_off);
+ local_len = bpf_core_essential_name_len(local_name);
+ targ_len = bpf_core_essential_name_len(targ_name);
+ /* one of them is anonymous or both w/ same flavor-less names */
+ return local_len == 0 || targ_len == 0 ||
+ (local_len == targ_len &&
+ strncmp(local_name, targ_name, local_len) == 0);
+ }
+ case BTF_KIND_INT:
+ /* just reject deprecated bitfield-like integers; all other
+ * integers are by default compatible between each other
+ */
+ return btf_int_offset(local_type) == 0 &&
+ btf_int_offset(targ_type) == 0;
+ case BTF_KIND_ARRAY:
+ local_id = btf_array(local_type)->type;
+ targ_id = btf_array(targ_type)->type;
+ goto recur;
+ default:
+ return 0;
+ }
+}
+
+/*
+ * Given single high-level named field accessor in local type, find
+ * corresponding high-level accessor for a target type. Along the way,
+ * maintain low-level spec for target as well. Also keep updating target
+ * bit offset.
+ *
+ * Searching is performed through recursive exhaustive enumeration of all
+ * fields of a struct/union. If there are any anonymous (embedded)
+ * structs/unions, they are recursively searched as well. If field with
+ * desired name is found, check compatibility between local and target types,
+ * before returning result.
+ *
+ * 1 is returned, if field is found.
+ * 0 is returned if no compatible field is found.
+ * <0 is returned on error.
+ */
+static int bpf_core_match_member(const struct btf *local_btf,
+ const struct bpf_core_accessor *local_acc,
+ const struct btf *targ_btf,
+ __u32 targ_id,
+ struct bpf_core_spec *spec,
+ __u32 *next_targ_id)
+{
+ const struct btf_type *local_type, *targ_type;
+ const struct btf_member *local_member, *m;
+ const char *local_name, *targ_name;
+ __u32 local_id;
+ int i, n, found;
+
+ targ_type = skip_mods_and_typedefs(targ_btf, targ_id, &targ_id);
+ if (!targ_type)
+ return -EINVAL;
+ if (!btf_is_composite(targ_type))
+ return 0;
+
+ local_id = local_acc->type_id;
+ local_type = btf_type_by_id(local_btf, local_id);
+ local_member = btf_members(local_type) + local_acc->idx;
+ local_name = btf__name_by_offset(local_btf, local_member->name_off);
+
+ n = btf_vlen(targ_type);
+ m = btf_members(targ_type);
+ for (i = 0; i < n; i++, m++) {
+ __u32 bit_offset;
+
+ bit_offset = btf_member_bit_offset(targ_type, i);
+
+ /* too deep struct/union/array nesting */
+ if (spec->raw_len == BPF_CORE_SPEC_MAX_LEN)
+ return -E2BIG;
+
+ /* speculate this member will be the good one */
+ spec->bit_offset += bit_offset;
+ spec->raw_spec[spec->raw_len++] = i;
+
+ targ_name = btf__name_by_offset(targ_btf, m->name_off);
+ if (str_is_empty(targ_name)) {
+ /* embedded struct/union, we need to go deeper */
+ found = bpf_core_match_member(local_btf, local_acc,
+ targ_btf, m->type,
+ spec, next_targ_id);
+ if (found) /* either found or error */
+ return found;
+ } else if (strcmp(local_name, targ_name) == 0) {
+ /* matching named field */
+ struct bpf_core_accessor *targ_acc;
+
+ targ_acc = &spec->spec[spec->len++];
+ targ_acc->type_id = targ_id;
+ targ_acc->idx = i;
+ targ_acc->name = targ_name;
+
+ *next_targ_id = m->type;
+ found = bpf_core_fields_are_compat(local_btf,
+ local_member->type,
+ targ_btf, m->type);
+ if (!found)
+ spec->len--; /* pop accessor */
+ return found;
+ }
+ /* member turned out not to be what we looked for */
+ spec->bit_offset -= bit_offset;
+ spec->raw_len--;
+ }
+
+ return 0;
+}
+
+/*
+ * Try to match local spec to a target type and, if successful, produce full
+ * target spec (high-level, low-level + bit offset).
+ */
+static int bpf_core_spec_match(struct bpf_core_spec *local_spec,
+ const struct btf *targ_btf, __u32 targ_id,
+ struct bpf_core_spec *targ_spec)
+{
+ const struct btf_type *targ_type;
+ const struct bpf_core_accessor *local_acc;
+ struct bpf_core_accessor *targ_acc;
+ int i, sz, matched;
+ __u32 name_off;
+
+ memset(targ_spec, 0, sizeof(*targ_spec));
+ targ_spec->btf = targ_btf;
+ targ_spec->root_type_id = targ_id;
+ targ_spec->relo_kind = local_spec->relo_kind;
+
+ if (core_relo_is_type_based(local_spec->relo_kind)) {
+ if (local_spec->relo_kind == BPF_CORE_TYPE_MATCHES)
+ return bpf_core_types_match(local_spec->btf,
+ local_spec->root_type_id,
+ targ_btf, targ_id);
+ else
+ return bpf_core_types_are_compat(local_spec->btf,
+ local_spec->root_type_id,
+ targ_btf, targ_id);
+ }
+
+ local_acc = &local_spec->spec[0];
+ targ_acc = &targ_spec->spec[0];
+
+ if (core_relo_is_enumval_based(local_spec->relo_kind)) {
+ size_t local_essent_len, targ_essent_len;
+ const char *targ_name;
+
+ /* has to resolve to an enum */
+ targ_type = skip_mods_and_typedefs(targ_spec->btf, targ_id, &targ_id);
+ if (!btf_is_any_enum(targ_type))
+ return 0;
+
+ local_essent_len = bpf_core_essential_name_len(local_acc->name);
+
+ for (i = 0; i < btf_vlen(targ_type); i++) {
+ if (btf_is_enum(targ_type))
+ name_off = btf_enum(targ_type)[i].name_off;
+ else
+ name_off = btf_enum64(targ_type)[i].name_off;
+
+ targ_name = btf__name_by_offset(targ_spec->btf, name_off);
+ targ_essent_len = bpf_core_essential_name_len(targ_name);
+ if (targ_essent_len != local_essent_len)
+ continue;
+ if (strncmp(local_acc->name, targ_name, local_essent_len) == 0) {
+ targ_acc->type_id = targ_id;
+ targ_acc->idx = i;
+ targ_acc->name = targ_name;
+ targ_spec->len++;
+ targ_spec->raw_spec[targ_spec->raw_len] = targ_acc->idx;
+ targ_spec->raw_len++;
+ return 1;
+ }
+ }
+ return 0;
+ }
+
+ if (!core_relo_is_field_based(local_spec->relo_kind))
+ return -EINVAL;
+
+ for (i = 0; i < local_spec->len; i++, local_acc++, targ_acc++) {
+ targ_type = skip_mods_and_typedefs(targ_spec->btf, targ_id,
+ &targ_id);
+ if (!targ_type)
+ return -EINVAL;
+
+ if (local_acc->name) {
+ matched = bpf_core_match_member(local_spec->btf,
+ local_acc,
+ targ_btf, targ_id,
+ targ_spec, &targ_id);
+ if (matched <= 0)
+ return matched;
+ } else {
+ /* for i=0, targ_id is already treated as array element
+ * type (because it's the original struct), for others
+ * we should find array element type first
+ */
+ if (i > 0) {
+ const struct btf_array *a;
+ bool flex;
+
+ if (!btf_is_array(targ_type))
+ return 0;
+
+ a = btf_array(targ_type);
+ flex = is_flex_arr(targ_btf, targ_acc - 1, a);
+ if (!flex && local_acc->idx >= a->nelems)
+ return 0;
+ if (!skip_mods_and_typedefs(targ_btf, a->type,
+ &targ_id))
+ return -EINVAL;
+ }
+
+ /* too deep struct/union/array nesting */
+ if (targ_spec->raw_len == BPF_CORE_SPEC_MAX_LEN)
+ return -E2BIG;
+
+ targ_acc->type_id = targ_id;
+ targ_acc->idx = local_acc->idx;
+ targ_acc->name = NULL;
+ targ_spec->len++;
+ targ_spec->raw_spec[targ_spec->raw_len] = targ_acc->idx;
+ targ_spec->raw_len++;
+
+ sz = btf__resolve_size(targ_btf, targ_id);
+ if (sz < 0)
+ return sz;
+ targ_spec->bit_offset += local_acc->idx * sz * 8;
+ }
+ }
+
+ return 1;
+}
+
+static int bpf_core_calc_field_relo(const char *prog_name,
+ const struct bpf_core_relo *relo,
+ const struct bpf_core_spec *spec,
+ __u64 *val, __u32 *field_sz, __u32 *type_id,
+ bool *validate)
+{
+ const struct bpf_core_accessor *acc;
+ const struct btf_type *t;
+ __u32 byte_off, byte_sz, bit_off, bit_sz, field_type_id;
+ const struct btf_member *m;
+ const struct btf_type *mt;
+ bool bitfield;
+ __s64 sz;
+
+ *field_sz = 0;
+
+ if (relo->kind == BPF_CORE_FIELD_EXISTS) {
+ *val = spec ? 1 : 0;
+ return 0;
+ }
+
+ if (!spec)
+ return -EUCLEAN; /* request instruction poisoning */
+
+ acc = &spec->spec[spec->len - 1];
+ t = btf_type_by_id(spec->btf, acc->type_id);
+
+ /* a[n] accessor needs special handling */
+ if (!acc->name) {
+ if (relo->kind == BPF_CORE_FIELD_BYTE_OFFSET) {
+ *val = spec->bit_offset / 8;
+ /* remember field size for load/store mem size */
+ sz = btf__resolve_size(spec->btf, acc->type_id);
+ if (sz < 0)
+ return -EINVAL;
+ *field_sz = sz;
+ *type_id = acc->type_id;
+ } else if (relo->kind == BPF_CORE_FIELD_BYTE_SIZE) {
+ sz = btf__resolve_size(spec->btf, acc->type_id);
+ if (sz < 0)
+ return -EINVAL;
+ *val = sz;
+ } else {
+ pr_warn("prog '%s': relo %d at insn #%d can't be applied to array access\n",
+ prog_name, relo->kind, relo->insn_off / 8);
+ return -EINVAL;
+ }
+ if (validate)
+ *validate = true;
+ return 0;
+ }
+
+ m = btf_members(t) + acc->idx;
+ mt = skip_mods_and_typedefs(spec->btf, m->type, &field_type_id);
+ bit_off = spec->bit_offset;
+ bit_sz = btf_member_bitfield_size(t, acc->idx);
+
+ bitfield = bit_sz > 0;
+ if (bitfield) {
+ byte_sz = mt->size;
+ byte_off = bit_off / 8 / byte_sz * byte_sz;
+ /* figure out smallest int size necessary for bitfield load */
+ while (bit_off + bit_sz - byte_off * 8 > byte_sz * 8) {
+ if (byte_sz >= 8) {
+ /* bitfield can't be read with 64-bit read */
+ pr_warn("prog '%s': relo %d at insn #%d can't be satisfied for bitfield\n",
+ prog_name, relo->kind, relo->insn_off / 8);
+ return -E2BIG;
+ }
+ byte_sz *= 2;
+ byte_off = bit_off / 8 / byte_sz * byte_sz;
+ }
+ } else {
+ sz = btf__resolve_size(spec->btf, field_type_id);
+ if (sz < 0)
+ return -EINVAL;
+ byte_sz = sz;
+ byte_off = spec->bit_offset / 8;
+ bit_sz = byte_sz * 8;
+ }
+
+ /* for bitfields, all the relocatable aspects are ambiguous and we
+ * might disagree with compiler, so turn off validation of expected
+ * value, except for signedness
+ */
+ if (validate)
+ *validate = !bitfield;
+
+ switch (relo->kind) {
+ case BPF_CORE_FIELD_BYTE_OFFSET:
+ *val = byte_off;
+ if (!bitfield) {
+ *field_sz = byte_sz;
+ *type_id = field_type_id;
+ }
+ break;
+ case BPF_CORE_FIELD_BYTE_SIZE:
+ *val = byte_sz;
+ break;
+ case BPF_CORE_FIELD_SIGNED:
+ *val = (btf_is_any_enum(mt) && BTF_INFO_KFLAG(mt->info)) ||
+ (btf_int_encoding(mt) & BTF_INT_SIGNED);
+ if (validate)
+ *validate = true; /* signedness is never ambiguous */
+ break;
+ case BPF_CORE_FIELD_LSHIFT_U64:
+#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
+ *val = 64 - (bit_off + bit_sz - byte_off * 8);
+#else
+ *val = (8 - byte_sz) * 8 + (bit_off - byte_off * 8);
+#endif
+ break;
+ case BPF_CORE_FIELD_RSHIFT_U64:
+ *val = 64 - bit_sz;
+ if (validate)
+ *validate = true; /* right shift is never ambiguous */
+ break;
+ case BPF_CORE_FIELD_EXISTS:
+ default:
+ return -EOPNOTSUPP;
+ }
+
+ return 0;
+}
+
+static int bpf_core_calc_type_relo(const struct bpf_core_relo *relo,
+ const struct bpf_core_spec *spec,
+ __u64 *val, bool *validate)
+{
+ __s64 sz;
+
+ /* by default, always check expected value in bpf_insn */
+ if (validate)
+ *validate = true;
+
+ /* type-based relos return zero when target type is not found */
+ if (!spec) {
+ *val = 0;
+ return 0;
+ }
+
+ switch (relo->kind) {
+ case BPF_CORE_TYPE_ID_TARGET:
+ *val = spec->root_type_id;
+ /* type ID, embedded in bpf_insn, might change during linking,
+ * so enforcing it is pointless
+ */
+ if (validate)
+ *validate = false;
+ break;
+ case BPF_CORE_TYPE_EXISTS:
+ case BPF_CORE_TYPE_MATCHES:
+ *val = 1;
+ break;
+ case BPF_CORE_TYPE_SIZE:
+ sz = btf__resolve_size(spec->btf, spec->root_type_id);
+ if (sz < 0)
+ return -EINVAL;
+ *val = sz;
+ break;
+ case BPF_CORE_TYPE_ID_LOCAL:
+ /* BPF_CORE_TYPE_ID_LOCAL is handled specially and shouldn't get here */
+ default:
+ return -EOPNOTSUPP;
+ }
+
+ return 0;
+}
+
+static int bpf_core_calc_enumval_relo(const struct bpf_core_relo *relo,
+ const struct bpf_core_spec *spec,
+ __u64 *val)
+{
+ const struct btf_type *t;
+
+ switch (relo->kind) {
+ case BPF_CORE_ENUMVAL_EXISTS:
+ *val = spec ? 1 : 0;
+ break;
+ case BPF_CORE_ENUMVAL_VALUE:
+ if (!spec)
+ return -EUCLEAN; /* request instruction poisoning */
+ t = btf_type_by_id(spec->btf, spec->spec[0].type_id);
+ if (btf_is_enum(t))
+ *val = btf_enum(t)[spec->spec[0].idx].val;
+ else
+ *val = btf_enum64_value(btf_enum64(t) + spec->spec[0].idx);
+ break;
+ default:
+ return -EOPNOTSUPP;
+ }
+
+ return 0;
+}
+
+/* Calculate original and target relocation values, given local and target
+ * specs and relocation kind. These values are calculated for each candidate.
+ * If there are multiple candidates, resulting values should all be consistent
+ * with each other. Otherwise, libbpf will refuse to proceed due to ambiguity.
+ * If instruction has to be poisoned, *poison will be set to true.
+ */
+static int bpf_core_calc_relo(const char *prog_name,
+ const struct bpf_core_relo *relo,
+ int relo_idx,
+ const struct bpf_core_spec *local_spec,
+ const struct bpf_core_spec *targ_spec,
+ struct bpf_core_relo_res *res)
+{
+ int err = -EOPNOTSUPP;
+
+ res->orig_val = 0;
+ res->new_val = 0;
+ res->poison = false;
+ res->validate = true;
+ res->fail_memsz_adjust = false;
+ res->orig_sz = res->new_sz = 0;
+ res->orig_type_id = res->new_type_id = 0;
+
+ if (core_relo_is_field_based(relo->kind)) {
+ err = bpf_core_calc_field_relo(prog_name, relo, local_spec,
+ &res->orig_val, &res->orig_sz,
+ &res->orig_type_id, &res->validate);
+ err = err ?: bpf_core_calc_field_relo(prog_name, relo, targ_spec,
+ &res->new_val, &res->new_sz,
+ &res->new_type_id, NULL);
+ if (err)
+ goto done;
+ /* Validate if it's safe to adjust load/store memory size.
+ * Adjustments are performed only if original and new memory
+ * sizes differ.
+ */
+ res->fail_memsz_adjust = false;
+ if (res->orig_sz != res->new_sz) {
+ const struct btf_type *orig_t, *new_t;
+
+ orig_t = btf_type_by_id(local_spec->btf, res->orig_type_id);
+ new_t = btf_type_by_id(targ_spec->btf, res->new_type_id);
+
+ /* There are two use cases in which it's safe to
+ * adjust load/store's mem size:
+ * - reading a 32-bit kernel pointer, while on BPF
+ * size pointers are always 64-bit; in this case
+ * it's safe to "downsize" instruction size due to
+ * pointer being treated as unsigned integer with
+ * zero-extended upper 32-bits;
+ * - reading unsigned integers, again due to
+ * zero-extension is preserving the value correctly.
+ *
+ * In all other cases it's incorrect to attempt to
+ * load/store field because read value will be
+ * incorrect, so we poison relocated instruction.
+ */
+ if (btf_is_ptr(orig_t) && btf_is_ptr(new_t))
+ goto done;
+ if (btf_is_int(orig_t) && btf_is_int(new_t) &&
+ btf_int_encoding(orig_t) != BTF_INT_SIGNED &&
+ btf_int_encoding(new_t) != BTF_INT_SIGNED)
+ goto done;
+
+ /* mark as invalid mem size adjustment, but this will
+ * only be checked for LDX/STX/ST insns
+ */
+ res->fail_memsz_adjust = true;
+ }
+ } else if (core_relo_is_type_based(relo->kind)) {
+ err = bpf_core_calc_type_relo(relo, local_spec, &res->orig_val, &res->validate);
+ err = err ?: bpf_core_calc_type_relo(relo, targ_spec, &res->new_val, NULL);
+ } else if (core_relo_is_enumval_based(relo->kind)) {
+ err = bpf_core_calc_enumval_relo(relo, local_spec, &res->orig_val);
+ err = err ?: bpf_core_calc_enumval_relo(relo, targ_spec, &res->new_val);
+ }
+
+done:
+ if (err == -EUCLEAN) {
+ /* EUCLEAN is used to signal instruction poisoning request */
+ res->poison = true;
+ err = 0;
+ } else if (err == -EOPNOTSUPP) {
+ /* EOPNOTSUPP means unknown/unsupported relocation */
+ pr_warn("prog '%s': relo #%d: unrecognized CO-RE relocation %s (%d) at insn #%d\n",
+ prog_name, relo_idx, core_relo_kind_str(relo->kind),
+ relo->kind, relo->insn_off / 8);
+ }
+
+ return err;
+}
+
+/*
+ * Turn instruction for which CO_RE relocation failed into invalid one with
+ * distinct signature.
+ */
+static void bpf_core_poison_insn(const char *prog_name, int relo_idx,
+ int insn_idx, struct bpf_insn *insn)
+{
+ pr_debug("prog '%s': relo #%d: substituting insn #%d w/ invalid insn\n",
+ prog_name, relo_idx, insn_idx);
+ insn->code = BPF_JMP | BPF_CALL;
+ insn->dst_reg = 0;
+ insn->src_reg = 0;
+ insn->off = 0;
+ /* if this instruction is reachable (not a dead code),
+ * verifier will complain with the following message:
+ * invalid func unknown#195896080
+ */
+ insn->imm = 195896080; /* => 0xbad2310 => "bad relo" */
+}
+
+static int insn_bpf_size_to_bytes(struct bpf_insn *insn)
+{
+ switch (BPF_SIZE(insn->code)) {
+ case BPF_DW: return 8;
+ case BPF_W: return 4;
+ case BPF_H: return 2;
+ case BPF_B: return 1;
+ default: return -1;
+ }
+}
+
+static int insn_bytes_to_bpf_size(__u32 sz)
+{
+ switch (sz) {
+ case 8: return BPF_DW;
+ case 4: return BPF_W;
+ case 2: return BPF_H;
+ case 1: return BPF_B;
+ default: return -1;
+ }
+}
+
+/*
+ * Patch relocatable BPF instruction.
+ *
+ * Patched value is determined by relocation kind and target specification.
+ * For existence relocations target spec will be NULL if field/type is not found.
+ * Expected insn->imm value is determined using relocation kind and local
+ * spec, and is checked before patching instruction. If actual insn->imm value
+ * is wrong, bail out with error.
+ *
+ * Currently supported classes of BPF instruction are:
+ * 1. rX = <imm> (assignment with immediate operand);
+ * 2. rX += <imm> (arithmetic operations with immediate operand);
+ * 3. rX = <imm64> (load with 64-bit immediate value);
+ * 4. rX = *(T *)(rY + <off>), where T is one of {u8, u16, u32, u64};
+ * 5. *(T *)(rX + <off>) = rY, where T is one of {u8, u16, u32, u64};
+ * 6. *(T *)(rX + <off>) = <imm>, where T is one of {u8, u16, u32, u64}.
+ */
+int bpf_core_patch_insn(const char *prog_name, struct bpf_insn *insn,
+ int insn_idx, const struct bpf_core_relo *relo,
+ int relo_idx, const struct bpf_core_relo_res *res)
+{
+ __u64 orig_val, new_val;
+ __u8 class;
+
+ class = BPF_CLASS(insn->code);
+
+ if (res->poison) {
+poison:
+ /* poison second part of ldimm64 to avoid confusing error from
+ * verifier about "unknown opcode 00"
+ */
+ if (is_ldimm64_insn(insn))
+ bpf_core_poison_insn(prog_name, relo_idx, insn_idx + 1, insn + 1);
+ bpf_core_poison_insn(prog_name, relo_idx, insn_idx, insn);
+ return 0;
+ }
+
+ orig_val = res->orig_val;
+ new_val = res->new_val;
+
+ switch (class) {
+ case BPF_ALU:
+ case BPF_ALU64:
+ if (BPF_SRC(insn->code) != BPF_K)
+ return -EINVAL;
+ if (res->validate && insn->imm != orig_val) {
+ pr_warn("prog '%s': relo #%d: unexpected insn #%d (ALU/ALU64) value: got %u, exp %llu -> %llu\n",
+ prog_name, relo_idx,
+ insn_idx, insn->imm, (unsigned long long)orig_val,
+ (unsigned long long)new_val);
+ return -EINVAL;
+ }
+ orig_val = insn->imm;
+ insn->imm = new_val;
+ pr_debug("prog '%s': relo #%d: patched insn #%d (ALU/ALU64) imm %llu -> %llu\n",
+ prog_name, relo_idx, insn_idx,
+ (unsigned long long)orig_val, (unsigned long long)new_val);
+ break;
+ case BPF_LDX:
+ case BPF_ST:
+ case BPF_STX:
+ if (res->validate && insn->off != orig_val) {
+ pr_warn("prog '%s': relo #%d: unexpected insn #%d (LDX/ST/STX) value: got %u, exp %llu -> %llu\n",
+ prog_name, relo_idx, insn_idx, insn->off, (unsigned long long)orig_val,
+ (unsigned long long)new_val);
+ return -EINVAL;
+ }
+ if (new_val > SHRT_MAX) {
+ pr_warn("prog '%s': relo #%d: insn #%d (LDX/ST/STX) value too big: %llu\n",
+ prog_name, relo_idx, insn_idx, (unsigned long long)new_val);
+ return -ERANGE;
+ }
+ if (res->fail_memsz_adjust) {
+ pr_warn("prog '%s': relo #%d: insn #%d (LDX/ST/STX) accesses field incorrectly. "
+ "Make sure you are accessing pointers, unsigned integers, or fields of matching type and size.\n",
+ prog_name, relo_idx, insn_idx);
+ goto poison;
+ }
+
+ orig_val = insn->off;
+ insn->off = new_val;
+ pr_debug("prog '%s': relo #%d: patched insn #%d (LDX/ST/STX) off %llu -> %llu\n",
+ prog_name, relo_idx, insn_idx, (unsigned long long)orig_val,
+ (unsigned long long)new_val);
+
+ if (res->new_sz != res->orig_sz) {
+ int insn_bytes_sz, insn_bpf_sz;
+
+ insn_bytes_sz = insn_bpf_size_to_bytes(insn);
+ if (insn_bytes_sz != res->orig_sz) {
+ pr_warn("prog '%s': relo #%d: insn #%d (LDX/ST/STX) unexpected mem size: got %d, exp %u\n",
+ prog_name, relo_idx, insn_idx, insn_bytes_sz, res->orig_sz);
+ return -EINVAL;
+ }
+
+ insn_bpf_sz = insn_bytes_to_bpf_size(res->new_sz);
+ if (insn_bpf_sz < 0) {
+ pr_warn("prog '%s': relo #%d: insn #%d (LDX/ST/STX) invalid new mem size: %u\n",
+ prog_name, relo_idx, insn_idx, res->new_sz);
+ return -EINVAL;
+ }
+
+ insn->code = BPF_MODE(insn->code) | insn_bpf_sz | BPF_CLASS(insn->code);
+ pr_debug("prog '%s': relo #%d: patched insn #%d (LDX/ST/STX) mem_sz %u -> %u\n",
+ prog_name, relo_idx, insn_idx, res->orig_sz, res->new_sz);
+ }
+ break;
+ case BPF_LD: {
+ __u64 imm;
+
+ if (!is_ldimm64_insn(insn) ||
+ insn[0].src_reg != 0 || insn[0].off != 0 ||
+ insn[1].code != 0 || insn[1].dst_reg != 0 ||
+ insn[1].src_reg != 0 || insn[1].off != 0) {
+ pr_warn("prog '%s': relo #%d: insn #%d (LDIMM64) has unexpected form\n",
+ prog_name, relo_idx, insn_idx);
+ return -EINVAL;
+ }
+
+ imm = (__u32)insn[0].imm | ((__u64)insn[1].imm << 32);
+ if (res->validate && imm != orig_val) {
+ pr_warn("prog '%s': relo #%d: unexpected insn #%d (LDIMM64) value: got %llu, exp %llu -> %llu\n",
+ prog_name, relo_idx,
+ insn_idx, (unsigned long long)imm,
+ (unsigned long long)orig_val, (unsigned long long)new_val);
+ return -EINVAL;
+ }
+
+ insn[0].imm = new_val;
+ insn[1].imm = new_val >> 32;
+ pr_debug("prog '%s': relo #%d: patched insn #%d (LDIMM64) imm64 %llu -> %llu\n",
+ prog_name, relo_idx, insn_idx,
+ (unsigned long long)imm, (unsigned long long)new_val);
+ break;
+ }
+ default:
+ pr_warn("prog '%s': relo #%d: trying to relocate unrecognized insn #%d, code:0x%x, src:0x%x, dst:0x%x, off:0x%x, imm:0x%x\n",
+ prog_name, relo_idx, insn_idx, insn->code,
+ insn->src_reg, insn->dst_reg, insn->off, insn->imm);
+ return -EINVAL;
+ }
+
+ return 0;
+}
+
+/* Output spec definition in the format:
+ * [<type-id>] (<type-name>) + <raw-spec> => <offset>@<spec>,
+ * where <spec> is a C-syntax view of recorded field access, e.g.: x.a[3].b
+ */
+int bpf_core_format_spec(char *buf, size_t buf_sz, const struct bpf_core_spec *spec)
+{
+ const struct btf_type *t;
+ const char *s;
+ __u32 type_id;
+ int i, len = 0;
+
+#define append_buf(fmt, args...) \
+ ({ \
+ int r; \
+ r = snprintf(buf, buf_sz, fmt, ##args); \
+ len += r; \
+ if (r >= buf_sz) \
+ r = buf_sz; \
+ buf += r; \
+ buf_sz -= r; \
+ })
+
+ type_id = spec->root_type_id;
+ t = btf_type_by_id(spec->btf, type_id);
+ s = btf__name_by_offset(spec->btf, t->name_off);
+
+ append_buf("<%s> [%u] %s %s",
+ core_relo_kind_str(spec->relo_kind),
+ type_id, btf_kind_str(t), str_is_empty(s) ? "<anon>" : s);
+
+ if (core_relo_is_type_based(spec->relo_kind))
+ return len;
+
+ if (core_relo_is_enumval_based(spec->relo_kind)) {
+ t = skip_mods_and_typedefs(spec->btf, type_id, NULL);
+ if (btf_is_enum(t)) {
+ const struct btf_enum *e;
+ const char *fmt_str;
+
+ e = btf_enum(t) + spec->raw_spec[0];
+ s = btf__name_by_offset(spec->btf, e->name_off);
+ fmt_str = BTF_INFO_KFLAG(t->info) ? "::%s = %d" : "::%s = %u";
+ append_buf(fmt_str, s, e->val);
+ } else {
+ const struct btf_enum64 *e;
+ const char *fmt_str;
+
+ e = btf_enum64(t) + spec->raw_spec[0];
+ s = btf__name_by_offset(spec->btf, e->name_off);
+ fmt_str = BTF_INFO_KFLAG(t->info) ? "::%s = %lld" : "::%s = %llu";
+ append_buf(fmt_str, s, (unsigned long long)btf_enum64_value(e));
+ }
+ return len;
+ }
+
+ if (core_relo_is_field_based(spec->relo_kind)) {
+ for (i = 0; i < spec->len; i++) {
+ if (spec->spec[i].name)
+ append_buf(".%s", spec->spec[i].name);
+ else if (i > 0 || spec->spec[i].idx > 0)
+ append_buf("[%u]", spec->spec[i].idx);
+ }
+
+ append_buf(" (");
+ for (i = 0; i < spec->raw_len; i++)
+ append_buf("%s%d", i == 0 ? "" : ":", spec->raw_spec[i]);
+
+ if (spec->bit_offset % 8)
+ append_buf(" @ offset %u.%u)", spec->bit_offset / 8, spec->bit_offset % 8);
+ else
+ append_buf(" @ offset %u)", spec->bit_offset / 8);
+ return len;
+ }
+
+ return len;
+#undef append_buf
+}
+
+/*
+ * Calculate CO-RE relocation target result.
+ *
+ * The outline and important points of the algorithm:
+ * 1. For given local type, find corresponding candidate target types.
+ * Candidate type is a type with the same "essential" name, ignoring
+ * everything after last triple underscore (___). E.g., `sample`,
+ * `sample___flavor_one`, `sample___flavor_another_one`, are all candidates
+ * for each other. Names with triple underscore are referred to as
+ * "flavors" and are useful, among other things, to allow to
+ * specify/support incompatible variations of the same kernel struct, which
+ * might differ between different kernel versions and/or build
+ * configurations.
+ *
+ * N.B. Struct "flavors" could be generated by bpftool's BTF-to-C
+ * converter, when deduplicated BTF of a kernel still contains more than
+ * one different types with the same name. In that case, ___2, ___3, etc
+ * are appended starting from second name conflict. But start flavors are
+ * also useful to be defined "locally", in BPF program, to extract same
+ * data from incompatible changes between different kernel
+ * versions/configurations. For instance, to handle field renames between
+ * kernel versions, one can use two flavors of the struct name with the
+ * same common name and use conditional relocations to extract that field,
+ * depending on target kernel version.
+ * 2. For each candidate type, try to match local specification to this
+ * candidate target type. Matching involves finding corresponding
+ * high-level spec accessors, meaning that all named fields should match,
+ * as well as all array accesses should be within the actual bounds. Also,
+ * types should be compatible (see bpf_core_fields_are_compat for details).
+ * 3. It is supported and expected that there might be multiple flavors
+ * matching the spec. As long as all the specs resolve to the same set of
+ * offsets across all candidates, there is no error. If there is any
+ * ambiguity, CO-RE relocation will fail. This is necessary to accommodate
+ * imperfection of BTF deduplication, which can cause slight duplication of
+ * the same BTF type, if some directly or indirectly referenced (by
+ * pointer) type gets resolved to different actual types in different
+ * object files. If such a situation occurs, deduplicated BTF will end up
+ * with two (or more) structurally identical types, which differ only in
+ * types they refer to through pointer. This should be OK in most cases and
+ * is not an error.
+ * 4. Candidate types search is performed by linearly scanning through all
+ * types in target BTF. It is anticipated that this is overall more
+ * efficient memory-wise and not significantly worse (if not better)
+ * CPU-wise compared to prebuilding a map from all local type names to
+ * a list of candidate type names. It's also sped up by caching resolved
+ * list of matching candidates per each local "root" type ID, that has at
+ * least one bpf_core_relo associated with it. This list is shared
+ * between multiple relocations for the same type ID and is updated as some
+ * of the candidates are pruned due to structural incompatibility.
+ */
+int bpf_core_calc_relo_insn(const char *prog_name,
+ const struct bpf_core_relo *relo,
+ int relo_idx,
+ const struct btf *local_btf,
+ struct bpf_core_cand_list *cands,
+ struct bpf_core_spec *specs_scratch,
+ struct bpf_core_relo_res *targ_res)
+{
+ struct bpf_core_spec *local_spec = &specs_scratch[0];
+ struct bpf_core_spec *cand_spec = &specs_scratch[1];
+ struct bpf_core_spec *targ_spec = &specs_scratch[2];
+ struct bpf_core_relo_res cand_res;
+ const struct btf_type *local_type;
+ const char *local_name;
+ __u32 local_id;
+ char spec_buf[256];
+ int i, j, err;
+
+ local_id = relo->type_id;
+ local_type = btf_type_by_id(local_btf, local_id);
+ local_name = btf__name_by_offset(local_btf, local_type->name_off);
+ if (!local_name)
+ return -EINVAL;
+
+ err = bpf_core_parse_spec(prog_name, local_btf, relo, local_spec);
+ if (err) {
+ const char *spec_str;
+
+ spec_str = btf__name_by_offset(local_btf, relo->access_str_off);
+ pr_warn("prog '%s': relo #%d: parsing [%d] %s %s + %s failed: %d\n",
+ prog_name, relo_idx, local_id, btf_kind_str(local_type),
+ str_is_empty(local_name) ? "<anon>" : local_name,
+ spec_str ?: "<?>", err);
+ return -EINVAL;
+ }
+
+ bpf_core_format_spec(spec_buf, sizeof(spec_buf), local_spec);
+ pr_debug("prog '%s': relo #%d: %s\n", prog_name, relo_idx, spec_buf);
+
+ /* TYPE_ID_LOCAL relo is special and doesn't need candidate search */
+ if (relo->kind == BPF_CORE_TYPE_ID_LOCAL) {
+ /* bpf_insn's imm value could get out of sync during linking */
+ memset(targ_res, 0, sizeof(*targ_res));
+ targ_res->validate = false;
+ targ_res->poison = false;
+ targ_res->orig_val = local_spec->root_type_id;
+ targ_res->new_val = local_spec->root_type_id;
+ return 0;
+ }
+
+ /* libbpf doesn't support candidate search for anonymous types */
+ if (str_is_empty(local_name)) {
+ pr_warn("prog '%s': relo #%d: <%s> (%d) relocation doesn't support anonymous types\n",
+ prog_name, relo_idx, core_relo_kind_str(relo->kind), relo->kind);
+ return -EOPNOTSUPP;
+ }
+
+ for (i = 0, j = 0; i < cands->len; i++) {
+ err = bpf_core_spec_match(local_spec, cands->cands[i].btf,
+ cands->cands[i].id, cand_spec);
+ if (err < 0) {
+ bpf_core_format_spec(spec_buf, sizeof(spec_buf), cand_spec);
+ pr_warn("prog '%s': relo #%d: error matching candidate #%d %s: %d\n ",
+ prog_name, relo_idx, i, spec_buf, err);
+ return err;
+ }
+
+ bpf_core_format_spec(spec_buf, sizeof(spec_buf), cand_spec);
+ pr_debug("prog '%s': relo #%d: %s candidate #%d %s\n", prog_name,
+ relo_idx, err == 0 ? "non-matching" : "matching", i, spec_buf);
+
+ if (err == 0)
+ continue;
+
+ err = bpf_core_calc_relo(prog_name, relo, relo_idx, local_spec, cand_spec, &cand_res);
+ if (err)
+ return err;
+
+ if (j == 0) {
+ *targ_res = cand_res;
+ *targ_spec = *cand_spec;
+ } else if (cand_spec->bit_offset != targ_spec->bit_offset) {
+ /* if there are many field relo candidates, they
+ * should all resolve to the same bit offset
+ */
+ pr_warn("prog '%s': relo #%d: field offset ambiguity: %u != %u\n",
+ prog_name, relo_idx, cand_spec->bit_offset,
+ targ_spec->bit_offset);
+ return -EINVAL;
+ } else if (cand_res.poison != targ_res->poison ||
+ cand_res.new_val != targ_res->new_val) {
+ /* all candidates should result in the same relocation
+ * decision and value, otherwise it's dangerous to
+ * proceed due to ambiguity
+ */
+ pr_warn("prog '%s': relo #%d: relocation decision ambiguity: %s %llu != %s %llu\n",
+ prog_name, relo_idx,
+ cand_res.poison ? "failure" : "success",
+ (unsigned long long)cand_res.new_val,
+ targ_res->poison ? "failure" : "success",
+ (unsigned long long)targ_res->new_val);
+ return -EINVAL;
+ }
+
+ cands->cands[j++] = cands->cands[i];
+ }
+
+ /*
+ * For BPF_CORE_FIELD_EXISTS relo or when used BPF program has field
+ * existence checks or kernel version/config checks, it's expected
+ * that we might not find any candidates. In this case, if field
+ * wasn't found in any candidate, the list of candidates shouldn't
+ * change at all, we'll just handle relocating appropriately,
+ * depending on relo's kind.
+ */
+ if (j > 0)
+ cands->len = j;
+
+ /*
+ * If no candidates were found, it might be both a programmer error,
+ * as well as expected case, depending whether instruction w/
+ * relocation is guarded in some way that makes it unreachable (dead
+ * code) if relocation can't be resolved. This is handled in
+ * bpf_core_patch_insn() uniformly by replacing that instruction with
+ * BPF helper call insn (using invalid helper ID). If that instruction
+ * is indeed unreachable, then it will be ignored and eliminated by
+ * verifier. If it was an error, then verifier will complain and point
+ * to a specific instruction number in its log.
+ */
+ if (j == 0) {
+ pr_debug("prog '%s': relo #%d: no matching targets found\n",
+ prog_name, relo_idx);
+
+ /* calculate single target relo result explicitly */
+ err = bpf_core_calc_relo(prog_name, relo, relo_idx, local_spec, NULL, targ_res);
+ if (err)
+ return err;
+ }
+
+ return 0;
+}
+
+static bool bpf_core_names_match(const struct btf *local_btf, size_t local_name_off,
+ const struct btf *targ_btf, size_t targ_name_off)
+{
+ const char *local_n, *targ_n;
+ size_t local_len, targ_len;
+
+ local_n = btf__name_by_offset(local_btf, local_name_off);
+ targ_n = btf__name_by_offset(targ_btf, targ_name_off);
+
+ if (str_is_empty(targ_n))
+ return str_is_empty(local_n);
+
+ targ_len = bpf_core_essential_name_len(targ_n);
+ local_len = bpf_core_essential_name_len(local_n);
+
+ return targ_len == local_len && strncmp(local_n, targ_n, local_len) == 0;
+}
+
+static int bpf_core_enums_match(const struct btf *local_btf, const struct btf_type *local_t,
+ const struct btf *targ_btf, const struct btf_type *targ_t)
+{
+ __u16 local_vlen = btf_vlen(local_t);
+ __u16 targ_vlen = btf_vlen(targ_t);
+ int i, j;
+
+ if (local_t->size != targ_t->size)
+ return 0;
+
+ if (local_vlen > targ_vlen)
+ return 0;
+
+ /* iterate over the local enum's variants and make sure each has
+ * a symbolic name correspondent in the target
+ */
+ for (i = 0; i < local_vlen; i++) {
+ bool matched = false;
+ __u32 local_n_off, targ_n_off;
+
+ local_n_off = btf_is_enum(local_t) ? btf_enum(local_t)[i].name_off :
+ btf_enum64(local_t)[i].name_off;
+
+ for (j = 0; j < targ_vlen; j++) {
+ targ_n_off = btf_is_enum(targ_t) ? btf_enum(targ_t)[j].name_off :
+ btf_enum64(targ_t)[j].name_off;
+
+ if (bpf_core_names_match(local_btf, local_n_off, targ_btf, targ_n_off)) {
+ matched = true;
+ break;
+ }
+ }
+
+ if (!matched)
+ return 0;
+ }
+ return 1;
+}
+
+static int bpf_core_composites_match(const struct btf *local_btf, const struct btf_type *local_t,
+ const struct btf *targ_btf, const struct btf_type *targ_t,
+ bool behind_ptr, int level)
+{
+ const struct btf_member *local_m = btf_members(local_t);
+ __u16 local_vlen = btf_vlen(local_t);
+ __u16 targ_vlen = btf_vlen(targ_t);
+ int i, j, err;
+
+ if (local_vlen > targ_vlen)
+ return 0;
+
+ /* check that all local members have a match in the target */
+ for (i = 0; i < local_vlen; i++, local_m++) {
+ const struct btf_member *targ_m = btf_members(targ_t);
+ bool matched = false;
+
+ for (j = 0; j < targ_vlen; j++, targ_m++) {
+ if (!bpf_core_names_match(local_btf, local_m->name_off,
+ targ_btf, targ_m->name_off))
+ continue;
+
+ err = __bpf_core_types_match(local_btf, local_m->type, targ_btf,
+ targ_m->type, behind_ptr, level - 1);
+ if (err < 0)
+ return err;
+ if (err > 0) {
+ matched = true;
+ break;
+ }
+ }
+
+ if (!matched)
+ return 0;
+ }
+ return 1;
+}
+
+/* Check that two types "match". This function assumes that root types were
+ * already checked for name match.
+ *
+ * The matching relation is defined as follows:
+ * - modifiers and typedefs are stripped (and, hence, effectively ignored)
+ * - generally speaking types need to be of same kind (struct vs. struct, union
+ * vs. union, etc.)
+ * - exceptions are struct/union behind a pointer which could also match a
+ * forward declaration of a struct or union, respectively, and enum vs.
+ * enum64 (see below)
+ * Then, depending on type:
+ * - integers:
+ * - match if size and signedness match
+ * - arrays & pointers:
+ * - target types are recursively matched
+ * - structs & unions:
+ * - local members need to exist in target with the same name
+ * - for each member we recursively check match unless it is already behind a
+ * pointer, in which case we only check matching names and compatible kind
+ * - enums:
+ * - local variants have to have a match in target by symbolic name (but not
+ * numeric value)
+ * - size has to match (but enum may match enum64 and vice versa)
+ * - function pointers:
+ * - number and position of arguments in local type has to match target
+ * - for each argument and the return value we recursively check match
+ */
+int __bpf_core_types_match(const struct btf *local_btf, __u32 local_id, const struct btf *targ_btf,
+ __u32 targ_id, bool behind_ptr, int level)
+{
+ const struct btf_type *local_t, *targ_t;
+ int depth = 32; /* max recursion depth */
+ __u16 local_k, targ_k;
+
+ if (level <= 0)
+ return -EINVAL;
+
+ local_t = btf_type_by_id(local_btf, local_id);
+ targ_t = btf_type_by_id(targ_btf, targ_id);
+
+recur:
+ depth--;
+ if (depth < 0)
+ return -EINVAL;
+
+ local_t = skip_mods_and_typedefs(local_btf, local_id, &local_id);
+ targ_t = skip_mods_and_typedefs(targ_btf, targ_id, &targ_id);
+ if (!local_t || !targ_t)
+ return -EINVAL;
+
+ /* While the name check happens after typedefs are skipped, root-level
+ * typedefs would still be name-matched as that's the contract with
+ * callers.
+ */
+ if (!bpf_core_names_match(local_btf, local_t->name_off, targ_btf, targ_t->name_off))
+ return 0;
+
+ local_k = btf_kind(local_t);
+ targ_k = btf_kind(targ_t);
+
+ switch (local_k) {
+ case BTF_KIND_UNKN:
+ return local_k == targ_k;
+ case BTF_KIND_FWD: {
+ bool local_f = BTF_INFO_KFLAG(local_t->info);
+
+ if (behind_ptr) {
+ if (local_k == targ_k)
+ return local_f == BTF_INFO_KFLAG(targ_t->info);
+
+ /* for forward declarations kflag dictates whether the
+ * target is a struct (0) or union (1)
+ */
+ return (targ_k == BTF_KIND_STRUCT && !local_f) ||
+ (targ_k == BTF_KIND_UNION && local_f);
+ } else {
+ if (local_k != targ_k)
+ return 0;
+
+ /* match if the forward declaration is for the same kind */
+ return local_f == BTF_INFO_KFLAG(targ_t->info);
+ }
+ }
+ case BTF_KIND_ENUM:
+ case BTF_KIND_ENUM64:
+ if (!btf_is_any_enum(targ_t))
+ return 0;
+
+ return bpf_core_enums_match(local_btf, local_t, targ_btf, targ_t);
+ case BTF_KIND_STRUCT:
+ case BTF_KIND_UNION:
+ if (behind_ptr) {
+ bool targ_f = BTF_INFO_KFLAG(targ_t->info);
+
+ if (local_k == targ_k)
+ return 1;
+
+ if (targ_k != BTF_KIND_FWD)
+ return 0;
+
+ return (local_k == BTF_KIND_UNION) == targ_f;
+ } else {
+ if (local_k != targ_k)
+ return 0;
+
+ return bpf_core_composites_match(local_btf, local_t, targ_btf, targ_t,
+ behind_ptr, level);
+ }
+ case BTF_KIND_INT: {
+ __u8 local_sgn;
+ __u8 targ_sgn;
+
+ if (local_k != targ_k)
+ return 0;
+
+ local_sgn = btf_int_encoding(local_t) & BTF_INT_SIGNED;
+ targ_sgn = btf_int_encoding(targ_t) & BTF_INT_SIGNED;
+
+ return local_t->size == targ_t->size && local_sgn == targ_sgn;
+ }
+ case BTF_KIND_PTR:
+ if (local_k != targ_k)
+ return 0;
+
+ behind_ptr = true;
+
+ local_id = local_t->type;
+ targ_id = targ_t->type;
+ goto recur;
+ case BTF_KIND_ARRAY: {
+ const struct btf_array *local_array = btf_array(local_t);
+ const struct btf_array *targ_array = btf_array(targ_t);
+
+ if (local_k != targ_k)
+ return 0;
+
+ if (local_array->nelems != targ_array->nelems)
+ return 0;
+
+ local_id = local_array->type;
+ targ_id = targ_array->type;
+ goto recur;
+ }
+ case BTF_KIND_FUNC_PROTO: {
+ struct btf_param *local_p = btf_params(local_t);
+ struct btf_param *targ_p = btf_params(targ_t);
+ __u16 local_vlen = btf_vlen(local_t);
+ __u16 targ_vlen = btf_vlen(targ_t);
+ int i, err;
+
+ if (local_k != targ_k)
+ return 0;
+
+ if (local_vlen != targ_vlen)
+ return 0;
+
+ for (i = 0; i < local_vlen; i++, local_p++, targ_p++) {
+ err = __bpf_core_types_match(local_btf, local_p->type, targ_btf,
+ targ_p->type, behind_ptr, level - 1);
+ if (err <= 0)
+ return err;
+ }
+
+ /* tail recurse for return type check */
+ local_id = local_t->type;
+ targ_id = targ_t->type;
+ goto recur;
+ }
+ default:
+ pr_warn("unexpected kind %s relocated, local [%d], target [%d]\n",
+ btf_kind_str(local_t), local_id, targ_id);
+ return 0;
+ }
+}
diff --git a/src/relo_core.h b/src/relo_core.h
new file mode 100644
index 0000000..1c0566d
--- /dev/null
+++ b/src/relo_core.h
@@ -0,0 +1,99 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+/* Copyright (c) 2019 Facebook */
+
+#ifndef __RELO_CORE_H
+#define __RELO_CORE_H
+
+#include <linux/bpf.h>
+
+struct bpf_core_cand {
+ const struct btf *btf;
+ __u32 id;
+};
+
+/* dynamically sized list of type IDs and its associated struct btf */
+struct bpf_core_cand_list {
+ struct bpf_core_cand *cands;
+ int len;
+};
+
+#define BPF_CORE_SPEC_MAX_LEN 64
+
+/* represents BPF CO-RE field or array element accessor */
+struct bpf_core_accessor {
+ __u32 type_id; /* struct/union type or array element type */
+ __u32 idx; /* field index or array index */
+ const char *name; /* field name or NULL for array accessor */
+};
+
+struct bpf_core_spec {
+ const struct btf *btf;
+ /* high-level spec: named fields and array indices only */
+ struct bpf_core_accessor spec[BPF_CORE_SPEC_MAX_LEN];
+ /* original unresolved (no skip_mods_or_typedefs) root type ID */
+ __u32 root_type_id;
+ /* CO-RE relocation kind */
+ enum bpf_core_relo_kind relo_kind;
+ /* high-level spec length */
+ int len;
+ /* raw, low-level spec: 1-to-1 with accessor spec string */
+ int raw_spec[BPF_CORE_SPEC_MAX_LEN];
+ /* raw spec length */
+ int raw_len;
+ /* field bit offset represented by spec */
+ __u32 bit_offset;
+};
+
+struct bpf_core_relo_res {
+ /* expected value in the instruction, unless validate == false */
+ __u64 orig_val;
+ /* new value that needs to be patched up to */
+ __u64 new_val;
+ /* relocation unsuccessful, poison instruction, but don't fail load */
+ bool poison;
+ /* some relocations can't be validated against orig_val */
+ bool validate;
+ /* for field byte offset relocations or the forms:
+ * *(T *)(rX + <off>) = rY
+ * rX = *(T *)(rY + <off>),
+ * we remember original and resolved field size to adjust direct
+ * memory loads of pointers and integers; this is necessary for 32-bit
+ * host kernel architectures, but also allows to automatically
+ * relocate fields that were resized from, e.g., u32 to u64, etc.
+ */
+ bool fail_memsz_adjust;
+ __u32 orig_sz;
+ __u32 orig_type_id;
+ __u32 new_sz;
+ __u32 new_type_id;
+};
+
+int __bpf_core_types_are_compat(const struct btf *local_btf, __u32 local_id,
+ const struct btf *targ_btf, __u32 targ_id, int level);
+int bpf_core_types_are_compat(const struct btf *local_btf, __u32 local_id,
+ const struct btf *targ_btf, __u32 targ_id);
+int __bpf_core_types_match(const struct btf *local_btf, __u32 local_id, const struct btf *targ_btf,
+ __u32 targ_id, bool behind_ptr, int level);
+int bpf_core_types_match(const struct btf *local_btf, __u32 local_id, const struct btf *targ_btf,
+ __u32 targ_id);
+
+size_t bpf_core_essential_name_len(const char *name);
+
+int bpf_core_calc_relo_insn(const char *prog_name,
+ const struct bpf_core_relo *relo, int relo_idx,
+ const struct btf *local_btf,
+ struct bpf_core_cand_list *cands,
+ struct bpf_core_spec *specs_scratch,
+ struct bpf_core_relo_res *targ_res);
+
+int bpf_core_patch_insn(const char *prog_name, struct bpf_insn *insn,
+ int insn_idx, const struct bpf_core_relo *relo,
+ int relo_idx, const struct bpf_core_relo_res *res);
+
+int bpf_core_parse_spec(const char *prog_name, const struct btf *btf,
+ const struct bpf_core_relo *relo,
+ struct bpf_core_spec *spec);
+
+int bpf_core_format_spec(char *buf, size_t buf_sz, const struct bpf_core_spec *spec);
+
+#endif
diff --git a/src/ringbuf.c b/src/ringbuf.c
new file mode 100644
index 0000000..47855af
--- /dev/null
+++ b/src/ringbuf.c
@@ -0,0 +1,587 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+/*
+ * Ring buffer operations.
+ *
+ * Copyright (C) 2020 Facebook, Inc.
+ */
+#ifndef _GNU_SOURCE
+#define _GNU_SOURCE
+#endif
+#include <stdlib.h>
+#include <stdio.h>
+#include <errno.h>
+#include <unistd.h>
+#include <linux/err.h>
+#include <linux/bpf.h>
+#include <asm/barrier.h>
+#include <sys/mman.h>
+#include <sys/epoll.h>
+#include <time.h>
+
+#include "libbpf.h"
+#include "libbpf_internal.h"
+#include "bpf.h"
+
+struct ring {
+ ring_buffer_sample_fn sample_cb;
+ void *ctx;
+ void *data;
+ unsigned long *consumer_pos;
+ unsigned long *producer_pos;
+ unsigned long mask;
+ int map_fd;
+};
+
+struct ring_buffer {
+ struct epoll_event *events;
+ struct ring *rings;
+ size_t page_size;
+ int epoll_fd;
+ int ring_cnt;
+};
+
+struct user_ring_buffer {
+ struct epoll_event event;
+ unsigned long *consumer_pos;
+ unsigned long *producer_pos;
+ void *data;
+ unsigned long mask;
+ size_t page_size;
+ int map_fd;
+ int epoll_fd;
+};
+
+/* 8-byte ring buffer header structure */
+struct ringbuf_hdr {
+ __u32 len;
+ __u32 pad;
+};
+
+static void ringbuf_unmap_ring(struct ring_buffer *rb, struct ring *r)
+{
+ if (r->consumer_pos) {
+ munmap(r->consumer_pos, rb->page_size);
+ r->consumer_pos = NULL;
+ }
+ if (r->producer_pos) {
+ munmap(r->producer_pos, rb->page_size + 2 * (r->mask + 1));
+ r->producer_pos = NULL;
+ }
+}
+
+/* Add extra RINGBUF maps to this ring buffer manager */
+int ring_buffer__add(struct ring_buffer *rb, int map_fd,
+ ring_buffer_sample_fn sample_cb, void *ctx)
+{
+ struct bpf_map_info info;
+ __u32 len = sizeof(info);
+ struct epoll_event *e;
+ struct ring *r;
+ __u64 mmap_sz;
+ void *tmp;
+ int err;
+
+ memset(&info, 0, sizeof(info));
+
+ err = bpf_obj_get_info_by_fd(map_fd, &info, &len);
+ if (err) {
+ err = -errno;
+ pr_warn("ringbuf: failed to get map info for fd=%d: %d\n",
+ map_fd, err);
+ return libbpf_err(err);
+ }
+
+ if (info.type != BPF_MAP_TYPE_RINGBUF) {
+ pr_warn("ringbuf: map fd=%d is not BPF_MAP_TYPE_RINGBUF\n",
+ map_fd);
+ return libbpf_err(-EINVAL);
+ }
+
+ tmp = libbpf_reallocarray(rb->rings, rb->ring_cnt + 1, sizeof(*rb->rings));
+ if (!tmp)
+ return libbpf_err(-ENOMEM);
+ rb->rings = tmp;
+
+ tmp = libbpf_reallocarray(rb->events, rb->ring_cnt + 1, sizeof(*rb->events));
+ if (!tmp)
+ return libbpf_err(-ENOMEM);
+ rb->events = tmp;
+
+ r = &rb->rings[rb->ring_cnt];
+ memset(r, 0, sizeof(*r));
+
+ r->map_fd = map_fd;
+ r->sample_cb = sample_cb;
+ r->ctx = ctx;
+ r->mask = info.max_entries - 1;
+
+ /* Map writable consumer page */
+ tmp = mmap(NULL, rb->page_size, PROT_READ | PROT_WRITE, MAP_SHARED, map_fd, 0);
+ if (tmp == MAP_FAILED) {
+ err = -errno;
+ pr_warn("ringbuf: failed to mmap consumer page for map fd=%d: %d\n",
+ map_fd, err);
+ return libbpf_err(err);
+ }
+ r->consumer_pos = tmp;
+
+ /* Map read-only producer page and data pages. We map twice as big
+ * data size to allow simple reading of samples that wrap around the
+ * end of a ring buffer. See kernel implementation for details.
+ */
+ mmap_sz = rb->page_size + 2 * (__u64)info.max_entries;
+ if (mmap_sz != (__u64)(size_t)mmap_sz) {
+ pr_warn("ringbuf: ring buffer size (%u) is too big\n", info.max_entries);
+ return libbpf_err(-E2BIG);
+ }
+ tmp = mmap(NULL, (size_t)mmap_sz, PROT_READ, MAP_SHARED, map_fd, rb->page_size);
+ if (tmp == MAP_FAILED) {
+ err = -errno;
+ ringbuf_unmap_ring(rb, r);
+ pr_warn("ringbuf: failed to mmap data pages for map fd=%d: %d\n",
+ map_fd, err);
+ return libbpf_err(err);
+ }
+ r->producer_pos = tmp;
+ r->data = tmp + rb->page_size;
+
+ e = &rb->events[rb->ring_cnt];
+ memset(e, 0, sizeof(*e));
+
+ e->events = EPOLLIN;
+ e->data.fd = rb->ring_cnt;
+ if (epoll_ctl(rb->epoll_fd, EPOLL_CTL_ADD, map_fd, e) < 0) {
+ err = -errno;
+ ringbuf_unmap_ring(rb, r);
+ pr_warn("ringbuf: failed to epoll add map fd=%d: %d\n",
+ map_fd, err);
+ return libbpf_err(err);
+ }
+
+ rb->ring_cnt++;
+ return 0;
+}
+
+void ring_buffer__free(struct ring_buffer *rb)
+{
+ int i;
+
+ if (!rb)
+ return;
+
+ for (i = 0; i < rb->ring_cnt; ++i)
+ ringbuf_unmap_ring(rb, &rb->rings[i]);
+ if (rb->epoll_fd >= 0)
+ close(rb->epoll_fd);
+
+ free(rb->events);
+ free(rb->rings);
+ free(rb);
+}
+
+struct ring_buffer *
+ring_buffer__new(int map_fd, ring_buffer_sample_fn sample_cb, void *ctx,
+ const struct ring_buffer_opts *opts)
+{
+ struct ring_buffer *rb;
+ int err;
+
+ if (!OPTS_VALID(opts, ring_buffer_opts))
+ return errno = EINVAL, NULL;
+
+ rb = calloc(1, sizeof(*rb));
+ if (!rb)
+ return errno = ENOMEM, NULL;
+
+ rb->page_size = getpagesize();
+
+ rb->epoll_fd = epoll_create1(EPOLL_CLOEXEC);
+ if (rb->epoll_fd < 0) {
+ err = -errno;
+ pr_warn("ringbuf: failed to create epoll instance: %d\n", err);
+ goto err_out;
+ }
+
+ err = ring_buffer__add(rb, map_fd, sample_cb, ctx);
+ if (err)
+ goto err_out;
+
+ return rb;
+
+err_out:
+ ring_buffer__free(rb);
+ return errno = -err, NULL;
+}
+
+static inline int roundup_len(__u32 len)
+{
+ /* clear out top 2 bits (discard and busy, if set) */
+ len <<= 2;
+ len >>= 2;
+ /* add length prefix */
+ len += BPF_RINGBUF_HDR_SZ;
+ /* round up to 8 byte alignment */
+ return (len + 7) / 8 * 8;
+}
+
+static int64_t ringbuf_process_ring(struct ring *r)
+{
+ int *len_ptr, len, err;
+ /* 64-bit to avoid overflow in case of extreme application behavior */
+ int64_t cnt = 0;
+ unsigned long cons_pos, prod_pos;
+ bool got_new_data;
+ void *sample;
+
+ cons_pos = smp_load_acquire(r->consumer_pos);
+ do {
+ got_new_data = false;
+ prod_pos = smp_load_acquire(r->producer_pos);
+ while (cons_pos < prod_pos) {
+ len_ptr = r->data + (cons_pos & r->mask);
+ len = smp_load_acquire(len_ptr);
+
+ /* sample not committed yet, bail out for now */
+ if (len & BPF_RINGBUF_BUSY_BIT)
+ goto done;
+
+ got_new_data = true;
+ cons_pos += roundup_len(len);
+
+ if ((len & BPF_RINGBUF_DISCARD_BIT) == 0) {
+ sample = (void *)len_ptr + BPF_RINGBUF_HDR_SZ;
+ err = r->sample_cb(r->ctx, sample, len);
+ if (err < 0) {
+ /* update consumer pos and bail out */
+ smp_store_release(r->consumer_pos,
+ cons_pos);
+ return err;
+ }
+ cnt++;
+ }
+
+ smp_store_release(r->consumer_pos, cons_pos);
+ }
+ } while (got_new_data);
+done:
+ return cnt;
+}
+
+/* Consume available ring buffer(s) data without event polling.
+ * Returns number of records consumed across all registered ring buffers (or
+ * INT_MAX, whichever is less), or negative number if any of the callbacks
+ * return error.
+ */
+int ring_buffer__consume(struct ring_buffer *rb)
+{
+ int64_t err, res = 0;
+ int i;
+
+ for (i = 0; i < rb->ring_cnt; i++) {
+ struct ring *ring = &rb->rings[i];
+
+ err = ringbuf_process_ring(ring);
+ if (err < 0)
+ return libbpf_err(err);
+ res += err;
+ }
+ if (res > INT_MAX)
+ return INT_MAX;
+ return res;
+}
+
+/* Poll for available data and consume records, if any are available.
+ * Returns number of records consumed (or INT_MAX, whichever is less), or
+ * negative number, if any of the registered callbacks returned error.
+ */
+int ring_buffer__poll(struct ring_buffer *rb, int timeout_ms)
+{
+ int i, cnt;
+ int64_t err, res = 0;
+
+ cnt = epoll_wait(rb->epoll_fd, rb->events, rb->ring_cnt, timeout_ms);
+ if (cnt < 0)
+ return libbpf_err(-errno);
+
+ for (i = 0; i < cnt; i++) {
+ __u32 ring_id = rb->events[i].data.fd;
+ struct ring *ring = &rb->rings[ring_id];
+
+ err = ringbuf_process_ring(ring);
+ if (err < 0)
+ return libbpf_err(err);
+ res += err;
+ }
+ if (res > INT_MAX)
+ return INT_MAX;
+ return res;
+}
+
+/* Get an fd that can be used to sleep until data is available in the ring(s) */
+int ring_buffer__epoll_fd(const struct ring_buffer *rb)
+{
+ return rb->epoll_fd;
+}
+
+static void user_ringbuf_unmap_ring(struct user_ring_buffer *rb)
+{
+ if (rb->consumer_pos) {
+ munmap(rb->consumer_pos, rb->page_size);
+ rb->consumer_pos = NULL;
+ }
+ if (rb->producer_pos) {
+ munmap(rb->producer_pos, rb->page_size + 2 * (rb->mask + 1));
+ rb->producer_pos = NULL;
+ }
+}
+
+void user_ring_buffer__free(struct user_ring_buffer *rb)
+{
+ if (!rb)
+ return;
+
+ user_ringbuf_unmap_ring(rb);
+
+ if (rb->epoll_fd >= 0)
+ close(rb->epoll_fd);
+
+ free(rb);
+}
+
+static int user_ringbuf_map(struct user_ring_buffer *rb, int map_fd)
+{
+ struct bpf_map_info info;
+ __u32 len = sizeof(info);
+ __u64 mmap_sz;
+ void *tmp;
+ struct epoll_event *rb_epoll;
+ int err;
+
+ memset(&info, 0, sizeof(info));
+
+ err = bpf_obj_get_info_by_fd(map_fd, &info, &len);
+ if (err) {
+ err = -errno;
+ pr_warn("user ringbuf: failed to get map info for fd=%d: %d\n", map_fd, err);
+ return err;
+ }
+
+ if (info.type != BPF_MAP_TYPE_USER_RINGBUF) {
+ pr_warn("user ringbuf: map fd=%d is not BPF_MAP_TYPE_USER_RINGBUF\n", map_fd);
+ return -EINVAL;
+ }
+
+ rb->map_fd = map_fd;
+ rb->mask = info.max_entries - 1;
+
+ /* Map read-only consumer page */
+ tmp = mmap(NULL, rb->page_size, PROT_READ, MAP_SHARED, map_fd, 0);
+ if (tmp == MAP_FAILED) {
+ err = -errno;
+ pr_warn("user ringbuf: failed to mmap consumer page for map fd=%d: %d\n",
+ map_fd, err);
+ return err;
+ }
+ rb->consumer_pos = tmp;
+
+ /* Map read-write the producer page and data pages. We map the data
+ * region as twice the total size of the ring buffer to allow the
+ * simple reading and writing of samples that wrap around the end of
+ * the buffer. See the kernel implementation for details.
+ */
+ mmap_sz = rb->page_size + 2 * (__u64)info.max_entries;
+ if (mmap_sz != (__u64)(size_t)mmap_sz) {
+ pr_warn("user ringbuf: ring buf size (%u) is too big\n", info.max_entries);
+ return -E2BIG;
+ }
+ tmp = mmap(NULL, (size_t)mmap_sz, PROT_READ | PROT_WRITE, MAP_SHARED,
+ map_fd, rb->page_size);
+ if (tmp == MAP_FAILED) {
+ err = -errno;
+ pr_warn("user ringbuf: failed to mmap data pages for map fd=%d: %d\n",
+ map_fd, err);
+ return err;
+ }
+
+ rb->producer_pos = tmp;
+ rb->data = tmp + rb->page_size;
+
+ rb_epoll = &rb->event;
+ rb_epoll->events = EPOLLOUT;
+ if (epoll_ctl(rb->epoll_fd, EPOLL_CTL_ADD, map_fd, rb_epoll) < 0) {
+ err = -errno;
+ pr_warn("user ringbuf: failed to epoll add map fd=%d: %d\n", map_fd, err);
+ return err;
+ }
+
+ return 0;
+}
+
+struct user_ring_buffer *
+user_ring_buffer__new(int map_fd, const struct user_ring_buffer_opts *opts)
+{
+ struct user_ring_buffer *rb;
+ int err;
+
+ if (!OPTS_VALID(opts, user_ring_buffer_opts))
+ return errno = EINVAL, NULL;
+
+ rb = calloc(1, sizeof(*rb));
+ if (!rb)
+ return errno = ENOMEM, NULL;
+
+ rb->page_size = getpagesize();
+
+ rb->epoll_fd = epoll_create1(EPOLL_CLOEXEC);
+ if (rb->epoll_fd < 0) {
+ err = -errno;
+ pr_warn("user ringbuf: failed to create epoll instance: %d\n", err);
+ goto err_out;
+ }
+
+ err = user_ringbuf_map(rb, map_fd);
+ if (err)
+ goto err_out;
+
+ return rb;
+
+err_out:
+ user_ring_buffer__free(rb);
+ return errno = -err, NULL;
+}
+
+static void user_ringbuf_commit(struct user_ring_buffer *rb, void *sample, bool discard)
+{
+ __u32 new_len;
+ struct ringbuf_hdr *hdr;
+ uintptr_t hdr_offset;
+
+ hdr_offset = rb->mask + 1 + (sample - rb->data) - BPF_RINGBUF_HDR_SZ;
+ hdr = rb->data + (hdr_offset & rb->mask);
+
+ new_len = hdr->len & ~BPF_RINGBUF_BUSY_BIT;
+ if (discard)
+ new_len |= BPF_RINGBUF_DISCARD_BIT;
+
+ /* Synchronizes with smp_load_acquire() in __bpf_user_ringbuf_peek() in
+ * the kernel.
+ */
+ __atomic_exchange_n(&hdr->len, new_len, __ATOMIC_ACQ_REL);
+}
+
+void user_ring_buffer__discard(struct user_ring_buffer *rb, void *sample)
+{
+ user_ringbuf_commit(rb, sample, true);
+}
+
+void user_ring_buffer__submit(struct user_ring_buffer *rb, void *sample)
+{
+ user_ringbuf_commit(rb, sample, false);
+}
+
+void *user_ring_buffer__reserve(struct user_ring_buffer *rb, __u32 size)
+{
+ __u32 avail_size, total_size, max_size;
+ /* 64-bit to avoid overflow in case of extreme application behavior */
+ __u64 cons_pos, prod_pos;
+ struct ringbuf_hdr *hdr;
+
+ /* The top two bits are used as special flags */
+ if (size & (BPF_RINGBUF_BUSY_BIT | BPF_RINGBUF_DISCARD_BIT))
+ return errno = E2BIG, NULL;
+
+ /* Synchronizes with smp_store_release() in __bpf_user_ringbuf_peek() in
+ * the kernel.
+ */
+ cons_pos = smp_load_acquire(rb->consumer_pos);
+ /* Synchronizes with smp_store_release() in user_ringbuf_commit() */
+ prod_pos = smp_load_acquire(rb->producer_pos);
+
+ max_size = rb->mask + 1;
+ avail_size = max_size - (prod_pos - cons_pos);
+ /* Round up total size to a multiple of 8. */
+ total_size = (size + BPF_RINGBUF_HDR_SZ + 7) / 8 * 8;
+
+ if (total_size > max_size)
+ return errno = E2BIG, NULL;
+
+ if (avail_size < total_size)
+ return errno = ENOSPC, NULL;
+
+ hdr = rb->data + (prod_pos & rb->mask);
+ hdr->len = size | BPF_RINGBUF_BUSY_BIT;
+ hdr->pad = 0;
+
+ /* Synchronizes with smp_load_acquire() in __bpf_user_ringbuf_peek() in
+ * the kernel.
+ */
+ smp_store_release(rb->producer_pos, prod_pos + total_size);
+
+ return (void *)rb->data + ((prod_pos + BPF_RINGBUF_HDR_SZ) & rb->mask);
+}
+
+static __u64 ns_elapsed_timespec(const struct timespec *start, const struct timespec *end)
+{
+ __u64 start_ns, end_ns, ns_per_s = 1000000000;
+
+ start_ns = (__u64)start->tv_sec * ns_per_s + start->tv_nsec;
+ end_ns = (__u64)end->tv_sec * ns_per_s + end->tv_nsec;
+
+ return end_ns - start_ns;
+}
+
+void *user_ring_buffer__reserve_blocking(struct user_ring_buffer *rb, __u32 size, int timeout_ms)
+{
+ void *sample;
+ int err, ms_remaining = timeout_ms;
+ struct timespec start;
+
+ if (timeout_ms < 0 && timeout_ms != -1)
+ return errno = EINVAL, NULL;
+
+ if (timeout_ms != -1) {
+ err = clock_gettime(CLOCK_MONOTONIC, &start);
+ if (err)
+ return NULL;
+ }
+
+ do {
+ int cnt, ms_elapsed;
+ struct timespec curr;
+ __u64 ns_per_ms = 1000000;
+
+ sample = user_ring_buffer__reserve(rb, size);
+ if (sample)
+ return sample;
+ else if (errno != ENOSPC)
+ return NULL;
+
+ /* The kernel guarantees at least one event notification
+ * delivery whenever at least one sample is drained from the
+ * ring buffer in an invocation to bpf_ringbuf_drain(). Other
+ * additional events may be delivered at any time, but only one
+ * event is guaranteed per bpf_ringbuf_drain() invocation,
+ * provided that a sample is drained, and the BPF program did
+ * not pass BPF_RB_NO_WAKEUP to bpf_ringbuf_drain(). If
+ * BPF_RB_FORCE_WAKEUP is passed to bpf_ringbuf_drain(), a
+ * wakeup event will be delivered even if no samples are
+ * drained.
+ */
+ cnt = epoll_wait(rb->epoll_fd, &rb->event, 1, ms_remaining);
+ if (cnt < 0)
+ return NULL;
+
+ if (timeout_ms == -1)
+ continue;
+
+ err = clock_gettime(CLOCK_MONOTONIC, &curr);
+ if (err)
+ return NULL;
+
+ ms_elapsed = ns_elapsed_timespec(&start, &curr) / ns_per_ms;
+ ms_remaining = timeout_ms - ms_elapsed;
+ } while (ms_remaining > 0);
+
+ /* Try one more time to reserve a sample after the specified timeout has elapsed. */
+ return user_ring_buffer__reserve(rb, size);
+}
diff --git a/src/skel_internal.h b/src/skel_internal.h
new file mode 100644
index 0000000..1e82ab0
--- /dev/null
+++ b/src/skel_internal.h
@@ -0,0 +1,374 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+/* Copyright (c) 2021 Facebook */
+#ifndef __SKEL_INTERNAL_H
+#define __SKEL_INTERNAL_H
+
+#ifdef __KERNEL__
+#include <linux/fdtable.h>
+#include <linux/mm.h>
+#include <linux/mman.h>
+#include <linux/slab.h>
+#include <linux/bpf.h>
+#else
+#include <unistd.h>
+#include <sys/syscall.h>
+#include <sys/mman.h>
+#include <stdlib.h>
+#include "bpf.h"
+#endif
+
+#ifndef __NR_bpf
+# if defined(__mips__) && defined(_ABIO32)
+# define __NR_bpf 4355
+# elif defined(__mips__) && defined(_ABIN32)
+# define __NR_bpf 6319
+# elif defined(__mips__) && defined(_ABI64)
+# define __NR_bpf 5315
+# endif
+#endif
+
+/* This file is a base header for auto-generated *.lskel.h files.
+ * Its contents will change and may become part of auto-generation in the future.
+ *
+ * The layout of bpf_[map|prog]_desc and bpf_loader_ctx is feature dependent
+ * and will change from one version of libbpf to another and features
+ * requested during loader program generation.
+ */
+struct bpf_map_desc {
+ /* output of the loader prog */
+ int map_fd;
+ /* input for the loader prog */
+ __u32 max_entries;
+ __aligned_u64 initial_value;
+};
+struct bpf_prog_desc {
+ int prog_fd;
+};
+
+enum {
+ BPF_SKEL_KERNEL = (1ULL << 0),
+};
+
+struct bpf_loader_ctx {
+ __u32 sz;
+ __u32 flags;
+ __u32 log_level;
+ __u32 log_size;
+ __u64 log_buf;
+};
+
+struct bpf_load_and_run_opts {
+ struct bpf_loader_ctx *ctx;
+ const void *data;
+ const void *insns;
+ __u32 data_sz;
+ __u32 insns_sz;
+ const char *errstr;
+};
+
+long kern_sys_bpf(__u32 cmd, void *attr, __u32 attr_size);
+
+static inline int skel_sys_bpf(enum bpf_cmd cmd, union bpf_attr *attr,
+ unsigned int size)
+{
+#ifdef __KERNEL__
+ return kern_sys_bpf(cmd, attr, size);
+#else
+ return syscall(__NR_bpf, cmd, attr, size);
+#endif
+}
+
+#ifdef __KERNEL__
+static inline int close(int fd)
+{
+ return close_fd(fd);
+}
+
+static inline void *skel_alloc(size_t size)
+{
+ struct bpf_loader_ctx *ctx = kzalloc(size, GFP_KERNEL);
+
+ if (!ctx)
+ return NULL;
+ ctx->flags |= BPF_SKEL_KERNEL;
+ return ctx;
+}
+
+static inline void skel_free(const void *p)
+{
+ kfree(p);
+}
+
+/* skel->bss/rodata maps are populated the following way:
+ *
+ * For kernel use:
+ * skel_prep_map_data() allocates kernel memory that kernel module can directly access.
+ * Generated lskel stores the pointer in skel->rodata and in skel->maps.rodata.initial_value.
+ * The loader program will perform probe_read_kernel() from maps.rodata.initial_value.
+ * skel_finalize_map_data() sets skel->rodata to point to actual value in a bpf map and
+ * does maps.rodata.initial_value = ~0ULL to signal skel_free_map_data() that kvfree
+ * is not nessary.
+ *
+ * For user space:
+ * skel_prep_map_data() mmaps anon memory into skel->rodata that can be accessed directly.
+ * Generated lskel stores the pointer in skel->rodata and in skel->maps.rodata.initial_value.
+ * The loader program will perform copy_from_user() from maps.rodata.initial_value.
+ * skel_finalize_map_data() remaps bpf array map value from the kernel memory into
+ * skel->rodata address.
+ *
+ * The "bpftool gen skeleton -L" command generates lskel.h that is suitable for
+ * both kernel and user space. The generated loader program does
+ * either bpf_probe_read_kernel() or bpf_copy_from_user() from initial_value
+ * depending on bpf_loader_ctx->flags.
+ */
+static inline void skel_free_map_data(void *p, __u64 addr, size_t sz)
+{
+ if (addr != ~0ULL)
+ kvfree(p);
+ /* When addr == ~0ULL the 'p' points to
+ * ((struct bpf_array *)map)->value. See skel_finalize_map_data.
+ */
+}
+
+static inline void *skel_prep_map_data(const void *val, size_t mmap_sz, size_t val_sz)
+{
+ void *addr;
+
+ addr = kvmalloc(val_sz, GFP_KERNEL);
+ if (!addr)
+ return NULL;
+ memcpy(addr, val, val_sz);
+ return addr;
+}
+
+static inline void *skel_finalize_map_data(__u64 *init_val, size_t mmap_sz, int flags, int fd)
+{
+ struct bpf_map *map;
+ void *addr = NULL;
+
+ kvfree((void *) (long) *init_val);
+ *init_val = ~0ULL;
+
+ /* At this point bpf_load_and_run() finished without error and
+ * 'fd' is a valid bpf map FD. All sanity checks below should succeed.
+ */
+ map = bpf_map_get(fd);
+ if (IS_ERR(map))
+ return NULL;
+ if (map->map_type != BPF_MAP_TYPE_ARRAY)
+ goto out;
+ addr = ((struct bpf_array *)map)->value;
+ /* the addr stays valid, since FD is not closed */
+out:
+ bpf_map_put(map);
+ return addr;
+}
+
+#else
+
+static inline void *skel_alloc(size_t size)
+{
+ return calloc(1, size);
+}
+
+static inline void skel_free(void *p)
+{
+ free(p);
+}
+
+static inline void skel_free_map_data(void *p, __u64 addr, size_t sz)
+{
+ munmap(p, sz);
+}
+
+static inline void *skel_prep_map_data(const void *val, size_t mmap_sz, size_t val_sz)
+{
+ void *addr;
+
+ addr = mmap(NULL, mmap_sz, PROT_READ | PROT_WRITE,
+ MAP_SHARED | MAP_ANONYMOUS, -1, 0);
+ if (addr == (void *) -1)
+ return NULL;
+ memcpy(addr, val, val_sz);
+ return addr;
+}
+
+static inline void *skel_finalize_map_data(__u64 *init_val, size_t mmap_sz, int flags, int fd)
+{
+ void *addr;
+
+ addr = mmap((void *) (long) *init_val, mmap_sz, flags, MAP_SHARED | MAP_FIXED, fd, 0);
+ if (addr == (void *) -1)
+ return NULL;
+ return addr;
+}
+#endif
+
+static inline int skel_closenz(int fd)
+{
+ if (fd > 0)
+ return close(fd);
+ return -EINVAL;
+}
+
+#ifndef offsetofend
+#define offsetofend(TYPE, MEMBER) \
+ (offsetof(TYPE, MEMBER) + sizeof((((TYPE *)0)->MEMBER)))
+#endif
+
+static inline int skel_map_create(enum bpf_map_type map_type,
+ const char *map_name,
+ __u32 key_size,
+ __u32 value_size,
+ __u32 max_entries)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, map_extra);
+ union bpf_attr attr;
+
+ memset(&attr, 0, attr_sz);
+
+ attr.map_type = map_type;
+ strncpy(attr.map_name, map_name, sizeof(attr.map_name));
+ attr.key_size = key_size;
+ attr.value_size = value_size;
+ attr.max_entries = max_entries;
+
+ return skel_sys_bpf(BPF_MAP_CREATE, &attr, attr_sz);
+}
+
+static inline int skel_map_update_elem(int fd, const void *key,
+ const void *value, __u64 flags)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, flags);
+ union bpf_attr attr;
+
+ memset(&attr, 0, attr_sz);
+ attr.map_fd = fd;
+ attr.key = (long) key;
+ attr.value = (long) value;
+ attr.flags = flags;
+
+ return skel_sys_bpf(BPF_MAP_UPDATE_ELEM, &attr, attr_sz);
+}
+
+static inline int skel_map_delete_elem(int fd, const void *key)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, flags);
+ union bpf_attr attr;
+
+ memset(&attr, 0, attr_sz);
+ attr.map_fd = fd;
+ attr.key = (long)key;
+
+ return skel_sys_bpf(BPF_MAP_DELETE_ELEM, &attr, attr_sz);
+}
+
+static inline int skel_map_get_fd_by_id(__u32 id)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, flags);
+ union bpf_attr attr;
+
+ memset(&attr, 0, attr_sz);
+ attr.map_id = id;
+
+ return skel_sys_bpf(BPF_MAP_GET_FD_BY_ID, &attr, attr_sz);
+}
+
+static inline int skel_raw_tracepoint_open(const char *name, int prog_fd)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, raw_tracepoint.prog_fd);
+ union bpf_attr attr;
+
+ memset(&attr, 0, attr_sz);
+ attr.raw_tracepoint.name = (long) name;
+ attr.raw_tracepoint.prog_fd = prog_fd;
+
+ return skel_sys_bpf(BPF_RAW_TRACEPOINT_OPEN, &attr, attr_sz);
+}
+
+static inline int skel_link_create(int prog_fd, int target_fd,
+ enum bpf_attach_type attach_type)
+{
+ const size_t attr_sz = offsetofend(union bpf_attr, link_create.iter_info_len);
+ union bpf_attr attr;
+
+ memset(&attr, 0, attr_sz);
+ attr.link_create.prog_fd = prog_fd;
+ attr.link_create.target_fd = target_fd;
+ attr.link_create.attach_type = attach_type;
+
+ return skel_sys_bpf(BPF_LINK_CREATE, &attr, attr_sz);
+}
+
+#ifdef __KERNEL__
+#define set_err
+#else
+#define set_err err = -errno
+#endif
+
+static inline int bpf_load_and_run(struct bpf_load_and_run_opts *opts)
+{
+ const size_t prog_load_attr_sz = offsetofend(union bpf_attr, fd_array);
+ const size_t test_run_attr_sz = offsetofend(union bpf_attr, test);
+ int map_fd = -1, prog_fd = -1, key = 0, err;
+ union bpf_attr attr;
+
+ err = map_fd = skel_map_create(BPF_MAP_TYPE_ARRAY, "__loader.map", 4, opts->data_sz, 1);
+ if (map_fd < 0) {
+ opts->errstr = "failed to create loader map";
+ set_err;
+ goto out;
+ }
+
+ err = skel_map_update_elem(map_fd, &key, opts->data, 0);
+ if (err < 0) {
+ opts->errstr = "failed to update loader map";
+ set_err;
+ goto out;
+ }
+
+ memset(&attr, 0, prog_load_attr_sz);
+ attr.prog_type = BPF_PROG_TYPE_SYSCALL;
+ attr.insns = (long) opts->insns;
+ attr.insn_cnt = opts->insns_sz / sizeof(struct bpf_insn);
+ attr.license = (long) "Dual BSD/GPL";
+ memcpy(attr.prog_name, "__loader.prog", sizeof("__loader.prog"));
+ attr.fd_array = (long) &map_fd;
+ attr.log_level = opts->ctx->log_level;
+ attr.log_size = opts->ctx->log_size;
+ attr.log_buf = opts->ctx->log_buf;
+ attr.prog_flags = BPF_F_SLEEPABLE;
+ err = prog_fd = skel_sys_bpf(BPF_PROG_LOAD, &attr, prog_load_attr_sz);
+ if (prog_fd < 0) {
+ opts->errstr = "failed to load loader prog";
+ set_err;
+ goto out;
+ }
+
+ memset(&attr, 0, test_run_attr_sz);
+ attr.test.prog_fd = prog_fd;
+ attr.test.ctx_in = (long) opts->ctx;
+ attr.test.ctx_size_in = opts->ctx->sz;
+ err = skel_sys_bpf(BPF_PROG_RUN, &attr, test_run_attr_sz);
+ if (err < 0 || (int)attr.test.retval < 0) {
+ opts->errstr = "failed to execute loader prog";
+ if (err < 0) {
+ set_err;
+ } else {
+ err = (int)attr.test.retval;
+#ifndef __KERNEL__
+ errno = -err;
+#endif
+ }
+ goto out;
+ }
+ err = 0;
+out:
+ if (map_fd >= 0)
+ close(map_fd);
+ if (prog_fd >= 0)
+ close(prog_fd);
+ return err;
+}
+
+#endif
diff --git a/src/str_error.c b/src/str_error.c
new file mode 100644
index 0000000..146da01
--- /dev/null
+++ b/src/str_error.c
@@ -0,0 +1,21 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+#undef _GNU_SOURCE
+#include <string.h>
+#include <stdio.h>
+#include "str_error.h"
+
+/* make sure libbpf doesn't use kernel-only integer typedefs */
+#pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
+
+/*
+ * Wrapper to allow for building in non-GNU systems such as Alpine Linux's musl
+ * libc, while checking strerror_r() return to avoid having to check this in
+ * all places calling it.
+ */
+char *libbpf_strerror_r(int err, char *dst, int len)
+{
+ int ret = strerror_r(err < 0 ? -err : err, dst, len);
+ if (ret)
+ snprintf(dst, len, "ERROR: strerror_r(%d)=%d", err, ret);
+ return dst;
+}
diff --git a/src/str_error.h b/src/str_error.h
new file mode 100644
index 0000000..a139334
--- /dev/null
+++ b/src/str_error.h
@@ -0,0 +1,6 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+#ifndef __LIBBPF_STR_ERROR_H
+#define __LIBBPF_STR_ERROR_H
+
+char *libbpf_strerror_r(int err, char *dst, int len);
+#endif /* __LIBBPF_STR_ERROR_H */
diff --git a/src/strset.c b/src/strset.c
new file mode 100644
index 0000000..2464bcb
--- /dev/null
+++ b/src/strset.c
@@ -0,0 +1,177 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+/* Copyright (c) 2021 Facebook */
+#include <stdint.h>
+#include <stdlib.h>
+#include <stdio.h>
+#include <errno.h>
+#include <linux/err.h>
+#include "hashmap.h"
+#include "libbpf_internal.h"
+#include "strset.h"
+
+struct strset {
+ void *strs_data;
+ size_t strs_data_len;
+ size_t strs_data_cap;
+ size_t strs_data_max_len;
+
+ /* lookup index for each unique string in strings set */
+ struct hashmap *strs_hash;
+};
+
+static size_t strset_hash_fn(long key, void *ctx)
+{
+ const struct strset *s = ctx;
+ const char *str = s->strs_data + key;
+
+ return str_hash(str);
+}
+
+static bool strset_equal_fn(long key1, long key2, void *ctx)
+{
+ const struct strset *s = ctx;
+ const char *str1 = s->strs_data + key1;
+ const char *str2 = s->strs_data + key2;
+
+ return strcmp(str1, str2) == 0;
+}
+
+struct strset *strset__new(size_t max_data_sz, const char *init_data, size_t init_data_sz)
+{
+ struct strset *set = calloc(1, sizeof(*set));
+ struct hashmap *hash;
+ int err = -ENOMEM;
+
+ if (!set)
+ return ERR_PTR(-ENOMEM);
+
+ hash = hashmap__new(strset_hash_fn, strset_equal_fn, set);
+ if (IS_ERR(hash))
+ goto err_out;
+
+ set->strs_data_max_len = max_data_sz;
+ set->strs_hash = hash;
+
+ if (init_data) {
+ long off;
+
+ set->strs_data = malloc(init_data_sz);
+ if (!set->strs_data)
+ goto err_out;
+
+ memcpy(set->strs_data, init_data, init_data_sz);
+ set->strs_data_len = init_data_sz;
+ set->strs_data_cap = init_data_sz;
+
+ for (off = 0; off < set->strs_data_len; off += strlen(set->strs_data + off) + 1) {
+ /* hashmap__add() returns EEXIST if string with the same
+ * content already is in the hash map
+ */
+ err = hashmap__add(hash, off, off);
+ if (err == -EEXIST)
+ continue; /* duplicate */
+ if (err)
+ goto err_out;
+ }
+ }
+
+ return set;
+err_out:
+ strset__free(set);
+ return ERR_PTR(err);
+}
+
+void strset__free(struct strset *set)
+{
+ if (IS_ERR_OR_NULL(set))
+ return;
+
+ hashmap__free(set->strs_hash);
+ free(set->strs_data);
+ free(set);
+}
+
+size_t strset__data_size(const struct strset *set)
+{
+ return set->strs_data_len;
+}
+
+const char *strset__data(const struct strset *set)
+{
+ return set->strs_data;
+}
+
+static void *strset_add_str_mem(struct strset *set, size_t add_sz)
+{
+ return libbpf_add_mem(&set->strs_data, &set->strs_data_cap, 1,
+ set->strs_data_len, set->strs_data_max_len, add_sz);
+}
+
+/* Find string offset that corresponds to a given string *s*.
+ * Returns:
+ * - >0 offset into string data, if string is found;
+ * - -ENOENT, if string is not in the string data;
+ * - <0, on any other error.
+ */
+int strset__find_str(struct strset *set, const char *s)
+{
+ long old_off, new_off, len;
+ void *p;
+
+ /* see strset__add_str() for why we do this */
+ len = strlen(s) + 1;
+ p = strset_add_str_mem(set, len);
+ if (!p)
+ return -ENOMEM;
+
+ new_off = set->strs_data_len;
+ memcpy(p, s, len);
+
+ if (hashmap__find(set->strs_hash, new_off, &old_off))
+ return old_off;
+
+ return -ENOENT;
+}
+
+/* Add a string s to the string data. If the string already exists, return its
+ * offset within string data.
+ * Returns:
+ * - > 0 offset into string data, on success;
+ * - < 0, on error.
+ */
+int strset__add_str(struct strset *set, const char *s)
+{
+ long old_off, new_off, len;
+ void *p;
+ int err;
+
+ /* Hashmap keys are always offsets within set->strs_data, so to even
+ * look up some string from the "outside", we need to first append it
+ * at the end, so that it can be addressed with an offset. Luckily,
+ * until set->strs_data_len is incremented, that string is just a piece
+ * of garbage for the rest of the code, so no harm, no foul. On the
+ * other hand, if the string is unique, it's already appended and
+ * ready to be used, only a simple set->strs_data_len increment away.
+ */
+ len = strlen(s) + 1;
+ p = strset_add_str_mem(set, len);
+ if (!p)
+ return -ENOMEM;
+
+ new_off = set->strs_data_len;
+ memcpy(p, s, len);
+
+ /* Now attempt to add the string, but only if the string with the same
+ * contents doesn't exist already (HASHMAP_ADD strategy). If such
+ * string exists, we'll get its offset in old_off (that's old_key).
+ */
+ err = hashmap__insert(set->strs_hash, new_off, new_off,
+ HASHMAP_ADD, &old_off, NULL);
+ if (err == -EEXIST)
+ return old_off; /* duplicated string, return existing offset */
+ if (err)
+ return err;
+
+ set->strs_data_len += len; /* new unique string, adjust data length */
+ return new_off;
+}
diff --git a/src/strset.h b/src/strset.h
new file mode 100644
index 0000000..b6ddf77
--- /dev/null
+++ b/src/strset.h
@@ -0,0 +1,21 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+
+/* Copyright (c) 2021 Facebook */
+#ifndef __LIBBPF_STRSET_H
+#define __LIBBPF_STRSET_H
+
+#include <stdbool.h>
+#include <stddef.h>
+
+struct strset;
+
+struct strset *strset__new(size_t max_data_sz, const char *init_data, size_t init_data_sz);
+void strset__free(struct strset *set);
+
+const char *strset__data(const struct strset *set);
+size_t strset__data_size(const struct strset *set);
+
+int strset__find_str(struct strset *set, const char *s);
+int strset__add_str(struct strset *set, const char *s);
+
+#endif /* __LIBBPF_STRSET_H */
diff --git a/src/usdt.bpf.h b/src/usdt.bpf.h
new file mode 100644
index 0000000..fdfd235
--- /dev/null
+++ b/src/usdt.bpf.h
@@ -0,0 +1,247 @@
+/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
+/* Copyright (c) 2022 Meta Platforms, Inc. and affiliates. */
+#ifndef __USDT_BPF_H__
+#define __USDT_BPF_H__
+
+#include <linux/errno.h>
+#include <bpf/bpf_helpers.h>
+#include <bpf/bpf_tracing.h>
+
+/* Below types and maps are internal implementation details of libbpf's USDT
+ * support and are subjects to change. Also, bpf_usdt_xxx() API helpers should
+ * be considered an unstable API as well and might be adjusted based on user
+ * feedback from using libbpf's USDT support in production.
+ */
+
+/* User can override BPF_USDT_MAX_SPEC_CNT to change default size of internal
+ * map that keeps track of USDT argument specifications. This might be
+ * necessary if there are a lot of USDT attachments.
+ */
+#ifndef BPF_USDT_MAX_SPEC_CNT
+#define BPF_USDT_MAX_SPEC_CNT 256
+#endif
+/* User can override BPF_USDT_MAX_IP_CNT to change default size of internal
+ * map that keeps track of IP (memory address) mapping to USDT argument
+ * specification.
+ * Note, if kernel supports BPF cookies, this map is not used and could be
+ * resized all the way to 1 to save a bit of memory.
+ */
+#ifndef BPF_USDT_MAX_IP_CNT
+#define BPF_USDT_MAX_IP_CNT (4 * BPF_USDT_MAX_SPEC_CNT)
+#endif
+
+enum __bpf_usdt_arg_type {
+ BPF_USDT_ARG_CONST,
+ BPF_USDT_ARG_REG,
+ BPF_USDT_ARG_REG_DEREF,
+};
+
+struct __bpf_usdt_arg_spec {
+ /* u64 scalar interpreted depending on arg_type, see below */
+ __u64 val_off;
+ /* arg location case, see bpf_udst_arg() for details */
+ enum __bpf_usdt_arg_type arg_type;
+ /* offset of referenced register within struct pt_regs */
+ short reg_off;
+ /* whether arg should be interpreted as signed value */
+ bool arg_signed;
+ /* number of bits that need to be cleared and, optionally,
+ * sign-extended to cast arguments that are 1, 2, or 4 bytes
+ * long into final 8-byte u64/s64 value returned to user
+ */
+ char arg_bitshift;
+};
+
+/* should match USDT_MAX_ARG_CNT in usdt.c exactly */
+#define BPF_USDT_MAX_ARG_CNT 12
+struct __bpf_usdt_spec {
+ struct __bpf_usdt_arg_spec args[BPF_USDT_MAX_ARG_CNT];
+ __u64 usdt_cookie;
+ short arg_cnt;
+};
+
+struct {
+ __uint(type, BPF_MAP_TYPE_ARRAY);
+ __uint(max_entries, BPF_USDT_MAX_SPEC_CNT);
+ __type(key, int);
+ __type(value, struct __bpf_usdt_spec);
+} __bpf_usdt_specs SEC(".maps") __weak;
+
+struct {
+ __uint(type, BPF_MAP_TYPE_HASH);
+ __uint(max_entries, BPF_USDT_MAX_IP_CNT);
+ __type(key, long);
+ __type(value, __u32);
+} __bpf_usdt_ip_to_spec_id SEC(".maps") __weak;
+
+extern const _Bool LINUX_HAS_BPF_COOKIE __kconfig;
+
+static __always_inline
+int __bpf_usdt_spec_id(struct pt_regs *ctx)
+{
+ if (!LINUX_HAS_BPF_COOKIE) {
+ long ip = PT_REGS_IP(ctx);
+ int *spec_id_ptr;
+
+ spec_id_ptr = bpf_map_lookup_elem(&__bpf_usdt_ip_to_spec_id, &ip);
+ return spec_id_ptr ? *spec_id_ptr : -ESRCH;
+ }
+
+ return bpf_get_attach_cookie(ctx);
+}
+
+/* Return number of USDT arguments defined for currently traced USDT. */
+__weak __hidden
+int bpf_usdt_arg_cnt(struct pt_regs *ctx)
+{
+ struct __bpf_usdt_spec *spec;
+ int spec_id;
+
+ spec_id = __bpf_usdt_spec_id(ctx);
+ if (spec_id < 0)
+ return -ESRCH;
+
+ spec = bpf_map_lookup_elem(&__bpf_usdt_specs, &spec_id);
+ if (!spec)
+ return -ESRCH;
+
+ return spec->arg_cnt;
+}
+
+/* Fetch USDT argument #*arg_num* (zero-indexed) and put its value into *res.
+ * Returns 0 on success; negative error, otherwise.
+ * On error *res is guaranteed to be set to zero.
+ */
+__weak __hidden
+int bpf_usdt_arg(struct pt_regs *ctx, __u64 arg_num, long *res)
+{
+ struct __bpf_usdt_spec *spec;
+ struct __bpf_usdt_arg_spec *arg_spec;
+ unsigned long val;
+ int err, spec_id;
+
+ *res = 0;
+
+ spec_id = __bpf_usdt_spec_id(ctx);
+ if (spec_id < 0)
+ return -ESRCH;
+
+ spec = bpf_map_lookup_elem(&__bpf_usdt_specs, &spec_id);
+ if (!spec)
+ return -ESRCH;
+
+ if (arg_num >= BPF_USDT_MAX_ARG_CNT || arg_num >= spec->arg_cnt)
+ return -ENOENT;
+
+ arg_spec = &spec->args[arg_num];
+ switch (arg_spec->arg_type) {
+ case BPF_USDT_ARG_CONST:
+ /* Arg is just a constant ("-4@$-9" in USDT arg spec).
+ * value is recorded in arg_spec->val_off directly.
+ */
+ val = arg_spec->val_off;
+ break;
+ case BPF_USDT_ARG_REG:
+ /* Arg is in a register (e.g, "8@%rax" in USDT arg spec),
+ * so we read the contents of that register directly from
+ * struct pt_regs. To keep things simple user-space parts
+ * record offsetof(struct pt_regs, <regname>) in arg_spec->reg_off.
+ */
+ err = bpf_probe_read_kernel(&val, sizeof(val), (void *)ctx + arg_spec->reg_off);
+ if (err)
+ return err;
+ break;
+ case BPF_USDT_ARG_REG_DEREF:
+ /* Arg is in memory addressed by register, plus some offset
+ * (e.g., "-4@-1204(%rbp)" in USDT arg spec). Register is
+ * identified like with BPF_USDT_ARG_REG case, and the offset
+ * is in arg_spec->val_off. We first fetch register contents
+ * from pt_regs, then do another user-space probe read to
+ * fetch argument value itself.
+ */
+ err = bpf_probe_read_kernel(&val, sizeof(val), (void *)ctx + arg_spec->reg_off);
+ if (err)
+ return err;
+ err = bpf_probe_read_user(&val, sizeof(val), (void *)val + arg_spec->val_off);
+ if (err)
+ return err;
+#if __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
+ val >>= arg_spec->arg_bitshift;
+#endif
+ break;
+ default:
+ return -EINVAL;
+ }
+
+ /* cast arg from 1, 2, or 4 bytes to final 8 byte size clearing
+ * necessary upper arg_bitshift bits, with sign extension if argument
+ * is signed
+ */
+ val <<= arg_spec->arg_bitshift;
+ if (arg_spec->arg_signed)
+ val = ((long)val) >> arg_spec->arg_bitshift;
+ else
+ val = val >> arg_spec->arg_bitshift;
+ *res = val;
+ return 0;
+}
+
+/* Retrieve user-specified cookie value provided during attach as
+ * bpf_usdt_opts.usdt_cookie. This serves the same purpose as BPF cookie
+ * returned by bpf_get_attach_cookie(). Libbpf's support for USDT is itself
+ * utilizing BPF cookies internally, so user can't use BPF cookie directly
+ * for USDT programs and has to use bpf_usdt_cookie() API instead.
+ */
+__weak __hidden
+long bpf_usdt_cookie(struct pt_regs *ctx)
+{
+ struct __bpf_usdt_spec *spec;
+ int spec_id;
+
+ spec_id = __bpf_usdt_spec_id(ctx);
+ if (spec_id < 0)
+ return 0;
+
+ spec = bpf_map_lookup_elem(&__bpf_usdt_specs, &spec_id);
+ if (!spec)
+ return 0;
+
+ return spec->usdt_cookie;
+}
+
+/* we rely on ___bpf_apply() and ___bpf_narg() macros already defined in bpf_tracing.h */
+#define ___bpf_usdt_args0() ctx
+#define ___bpf_usdt_args1(x) ___bpf_usdt_args0(), ({ long _x; bpf_usdt_arg(ctx, 0, &_x); (void *)_x; })
+#define ___bpf_usdt_args2(x, args...) ___bpf_usdt_args1(args), ({ long _x; bpf_usdt_arg(ctx, 1, &_x); (void *)_x; })
+#define ___bpf_usdt_args3(x, args...) ___bpf_usdt_args2(args), ({ long _x; bpf_usdt_arg(ctx, 2, &_x); (void *)_x; })
+#define ___bpf_usdt_args4(x, args...) ___bpf_usdt_args3(args), ({ long _x; bpf_usdt_arg(ctx, 3, &_x); (void *)_x; })
+#define ___bpf_usdt_args5(x, args...) ___bpf_usdt_args4(args), ({ long _x; bpf_usdt_arg(ctx, 4, &_x); (void *)_x; })
+#define ___bpf_usdt_args6(x, args...) ___bpf_usdt_args5(args), ({ long _x; bpf_usdt_arg(ctx, 5, &_x); (void *)_x; })
+#define ___bpf_usdt_args7(x, args...) ___bpf_usdt_args6(args), ({ long _x; bpf_usdt_arg(ctx, 6, &_x); (void *)_x; })
+#define ___bpf_usdt_args8(x, args...) ___bpf_usdt_args7(args), ({ long _x; bpf_usdt_arg(ctx, 7, &_x); (void *)_x; })
+#define ___bpf_usdt_args9(x, args...) ___bpf_usdt_args8(args), ({ long _x; bpf_usdt_arg(ctx, 8, &_x); (void *)_x; })
+#define ___bpf_usdt_args10(x, args...) ___bpf_usdt_args9(args), ({ long _x; bpf_usdt_arg(ctx, 9, &_x); (void *)_x; })
+#define ___bpf_usdt_args11(x, args...) ___bpf_usdt_args10(args), ({ long _x; bpf_usdt_arg(ctx, 10, &_x); (void *)_x; })
+#define ___bpf_usdt_args12(x, args...) ___bpf_usdt_args11(args), ({ long _x; bpf_usdt_arg(ctx, 11, &_x); (void *)_x; })
+#define ___bpf_usdt_args(args...) ___bpf_apply(___bpf_usdt_args, ___bpf_narg(args))(args)
+
+/*
+ * BPF_USDT serves the same purpose for USDT handlers as BPF_PROG for
+ * tp_btf/fentry/fexit BPF programs and BPF_KPROBE for kprobes.
+ * Original struct pt_regs * context is preserved as 'ctx' argument.
+ */
+#define BPF_USDT(name, args...) \
+name(struct pt_regs *ctx); \
+static __always_inline typeof(name(0)) \
+____##name(struct pt_regs *ctx, ##args); \
+typeof(name(0)) name(struct pt_regs *ctx) \
+{ \
+ _Pragma("GCC diagnostic push") \
+ _Pragma("GCC diagnostic ignored \"-Wint-conversion\"") \
+ return ____##name(___bpf_usdt_args(args)); \
+ _Pragma("GCC diagnostic pop") \
+} \
+static __always_inline typeof(name(0)) \
+____##name(struct pt_regs *ctx, ##args)
+
+#endif /* __USDT_BPF_H__ */
diff --git a/src/usdt.c b/src/usdt.c
new file mode 100644
index 0000000..75b411f
--- /dev/null
+++ b/src/usdt.c
@@ -0,0 +1,1516 @@
+// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
+/* Copyright (c) 2022 Meta Platforms, Inc. and affiliates. */
+#include <ctype.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <libelf.h>
+#include <gelf.h>
+#include <unistd.h>
+#include <linux/ptrace.h>
+#include <linux/kernel.h>
+
+/* s8 will be marked as poison while it's a reg of riscv */
+#if defined(__riscv)
+#define rv_s8 s8
+#endif
+
+#include "bpf.h"
+#include "libbpf.h"
+#include "libbpf_common.h"
+#include "libbpf_internal.h"
+#include "hashmap.h"
+
+/* libbpf's USDT support consists of BPF-side state/code and user-space
+ * state/code working together in concert. BPF-side parts are defined in
+ * usdt.bpf.h header library. User-space state is encapsulated by struct
+ * usdt_manager and all the supporting code centered around usdt_manager.
+ *
+ * usdt.bpf.h defines two BPF maps that usdt_manager expects: USDT spec map
+ * and IP-to-spec-ID map, which is auxiliary map necessary for kernels that
+ * don't support BPF cookie (see below). These two maps are implicitly
+ * embedded into user's end BPF object file when user's code included
+ * usdt.bpf.h. This means that libbpf doesn't do anything special to create
+ * these USDT support maps. They are created by normal libbpf logic of
+ * instantiating BPF maps when opening and loading BPF object.
+ *
+ * As such, libbpf is basically unaware of the need to do anything
+ * USDT-related until the very first call to bpf_program__attach_usdt(), which
+ * can be called by user explicitly or happen automatically during skeleton
+ * attach (or, equivalently, through generic bpf_program__attach() call). At
+ * this point, libbpf will instantiate and initialize struct usdt_manager and
+ * store it in bpf_object. USDT manager is per-BPF object construct, as each
+ * independent BPF object might or might not have USDT programs, and thus all
+ * the expected USDT-related state. There is no coordination between two
+ * bpf_object in parts of USDT attachment, they are oblivious of each other's
+ * existence and libbpf is just oblivious, dealing with bpf_object-specific
+ * USDT state.
+ *
+ * Quick crash course on USDTs.
+ *
+ * From user-space application's point of view, USDT is essentially just
+ * a slightly special function call that normally has zero overhead, unless it
+ * is being traced by some external entity (e.g, BPF-based tool). Here's how
+ * a typical application can trigger USDT probe:
+ *
+ * #include <sys/sdt.h> // provided by systemtap-sdt-devel package
+ * // folly also provide similar functionality in folly/tracing/StaticTracepoint.h
+ *
+ * STAP_PROBE3(my_usdt_provider, my_usdt_probe_name, 123, x, &y);
+ *
+ * USDT is identified by it's <provider-name>:<probe-name> pair of names. Each
+ * individual USDT has a fixed number of arguments (3 in the above example)
+ * and specifies values of each argument as if it was a function call.
+ *
+ * USDT call is actually not a function call, but is instead replaced by
+ * a single NOP instruction (thus zero overhead, effectively). But in addition
+ * to that, those USDT macros generate special SHT_NOTE ELF records in
+ * .note.stapsdt ELF section. Here's an example USDT definition as emitted by
+ * `readelf -n <binary>`:
+ *
+ * stapsdt 0x00000089 NT_STAPSDT (SystemTap probe descriptors)
+ * Provider: test
+ * Name: usdt12
+ * Location: 0x0000000000549df3, Base: 0x00000000008effa4, Semaphore: 0x0000000000a4606e
+ * Arguments: -4@-1204(%rbp) -4@%edi -8@-1216(%rbp) -8@%r8 -4@$5 -8@%r9 8@%rdx 8@%r10 -4@$-9 -2@%cx -2@%ax -1@%sil
+ *
+ * In this case we have USDT test:usdt12 with 12 arguments.
+ *
+ * Location and base are offsets used to calculate absolute IP address of that
+ * NOP instruction that kernel can replace with an interrupt instruction to
+ * trigger instrumentation code (BPF program for all that we care about).
+ *
+ * Semaphore above is and optional feature. It records an address of a 2-byte
+ * refcount variable (normally in '.probes' ELF section) used for signaling if
+ * there is anything that is attached to USDT. This is useful for user
+ * applications if, for example, they need to prepare some arguments that are
+ * passed only to USDTs and preparation is expensive. By checking if USDT is
+ * "activated", an application can avoid paying those costs unnecessarily.
+ * Recent enough kernel has built-in support for automatically managing this
+ * refcount, which libbpf expects and relies on. If USDT is defined without
+ * associated semaphore, this value will be zero. See selftests for semaphore
+ * examples.
+ *
+ * Arguments is the most interesting part. This USDT specification string is
+ * providing information about all the USDT arguments and their locations. The
+ * part before @ sign defined byte size of the argument (1, 2, 4, or 8) and
+ * whether the argument is signed or unsigned (negative size means signed).
+ * The part after @ sign is assembly-like definition of argument location
+ * (see [0] for more details). Technically, assembler can provide some pretty
+ * advanced definitions, but libbpf is currently supporting three most common
+ * cases:
+ * 1) immediate constant, see 5th and 9th args above (-4@$5 and -4@-9);
+ * 2) register value, e.g., 8@%rdx, which means "unsigned 8-byte integer
+ * whose value is in register %rdx";
+ * 3) memory dereference addressed by register, e.g., -4@-1204(%rbp), which
+ * specifies signed 32-bit integer stored at offset -1204 bytes from
+ * memory address stored in %rbp.
+ *
+ * [0] https://sourceware.org/systemtap/wiki/UserSpaceProbeImplementation
+ *
+ * During attachment, libbpf parses all the relevant USDT specifications and
+ * prepares `struct usdt_spec` (USDT spec), which is then provided to BPF-side
+ * code through spec map. This allows BPF applications to quickly fetch the
+ * actual value at runtime using a simple BPF-side code.
+ *
+ * With basics out of the way, let's go over less immediately obvious aspects
+ * of supporting USDTs.
+ *
+ * First, there is no special USDT BPF program type. It is actually just
+ * a uprobe BPF program (which for kernel, at least currently, is just a kprobe
+ * program, so BPF_PROG_TYPE_KPROBE program type). With the only difference
+ * that uprobe is usually attached at the function entry, while USDT will
+ * normally will be somewhere inside the function. But it should always be
+ * pointing to NOP instruction, which makes such uprobes the fastest uprobe
+ * kind.
+ *
+ * Second, it's important to realize that such STAP_PROBEn(provider, name, ...)
+ * macro invocations can end up being inlined many-many times, depending on
+ * specifics of each individual user application. So single conceptual USDT
+ * (identified by provider:name pair of identifiers) is, generally speaking,
+ * multiple uprobe locations (USDT call sites) in different places in user
+ * application. Further, again due to inlining, each USDT call site might end
+ * up having the same argument #N be located in a different place. In one call
+ * site it could be a constant, in another will end up in a register, and in
+ * yet another could be some other register or even somewhere on the stack.
+ *
+ * As such, "attaching to USDT" means (in general case) attaching the same
+ * uprobe BPF program to multiple target locations in user application, each
+ * potentially having a completely different USDT spec associated with it.
+ * To wire all this up together libbpf allocates a unique integer spec ID for
+ * each unique USDT spec. Spec IDs are allocated as sequential small integers
+ * so that they can be used as keys in array BPF map (for performance reasons).
+ * Spec ID allocation and accounting is big part of what usdt_manager is
+ * about. This state has to be maintained per-BPF object and coordinate
+ * between different USDT attachments within the same BPF object.
+ *
+ * Spec ID is the key in spec BPF map, value is the actual USDT spec layed out
+ * as struct usdt_spec. Each invocation of BPF program at runtime needs to
+ * know its associated spec ID. It gets it either through BPF cookie, which
+ * libbpf sets to spec ID during attach time, or, if kernel is too old to
+ * support BPF cookie, through IP-to-spec-ID map that libbpf maintains in such
+ * case. The latter means that some modes of operation can't be supported
+ * without BPF cookie. Such mode is attaching to shared library "generically",
+ * without specifying target process. In such case, it's impossible to
+ * calculate absolute IP addresses for IP-to-spec-ID map, and thus such mode
+ * is not supported without BPF cookie support.
+ *
+ * Note that libbpf is using BPF cookie functionality for its own internal
+ * needs, so user itself can't rely on BPF cookie feature. To that end, libbpf
+ * provides conceptually equivalent USDT cookie support. It's still u64
+ * user-provided value that can be associated with USDT attachment. Note that
+ * this will be the same value for all USDT call sites within the same single
+ * *logical* USDT attachment. This makes sense because to user attaching to
+ * USDT is a single BPF program triggered for singular USDT probe. The fact
+ * that this is done at multiple actual locations is a mostly hidden
+ * implementation details. This USDT cookie value can be fetched with
+ * bpf_usdt_cookie(ctx) API provided by usdt.bpf.h
+ *
+ * Lastly, while single USDT can have tons of USDT call sites, it doesn't
+ * necessarily have that many different USDT specs. It very well might be
+ * that 1000 USDT call sites only need 5 different USDT specs, because all the
+ * arguments are typically contained in a small set of registers or stack
+ * locations. As such, it's wasteful to allocate as many USDT spec IDs as
+ * there are USDT call sites. So libbpf tries to be frugal and performs
+ * on-the-fly deduplication during a single USDT attachment to only allocate
+ * the minimal required amount of unique USDT specs (and thus spec IDs). This
+ * is trivially achieved by using USDT spec string (Arguments string from USDT
+ * note) as a lookup key in a hashmap. USDT spec string uniquely defines
+ * everything about how to fetch USDT arguments, so two USDT call sites
+ * sharing USDT spec string can safely share the same USDT spec and spec ID.
+ * Note, this spec string deduplication is happening only during the same USDT
+ * attachment, so each USDT spec shares the same USDT cookie value. This is
+ * not generally true for other USDT attachments within the same BPF object,
+ * as even if USDT spec string is the same, USDT cookie value can be
+ * different. It was deemed excessive to try to deduplicate across independent
+ * USDT attachments by taking into account USDT spec string *and* USDT cookie
+ * value, which would complicated spec ID accounting significantly for little
+ * gain.
+ */
+
+#define USDT_BASE_SEC ".stapsdt.base"
+#define USDT_SEMA_SEC ".probes"
+#define USDT_NOTE_SEC ".note.stapsdt"
+#define USDT_NOTE_TYPE 3
+#define USDT_NOTE_NAME "stapsdt"
+
+/* should match exactly enum __bpf_usdt_arg_type from usdt.bpf.h */
+enum usdt_arg_type {
+ USDT_ARG_CONST,
+ USDT_ARG_REG,
+ USDT_ARG_REG_DEREF,
+};
+
+/* should match exactly struct __bpf_usdt_arg_spec from usdt.bpf.h */
+struct usdt_arg_spec {
+ __u64 val_off;
+ enum usdt_arg_type arg_type;
+ short reg_off;
+ bool arg_signed;
+ char arg_bitshift;
+};
+
+/* should match BPF_USDT_MAX_ARG_CNT in usdt.bpf.h */
+#define USDT_MAX_ARG_CNT 12
+
+/* should match struct __bpf_usdt_spec from usdt.bpf.h */
+struct usdt_spec {
+ struct usdt_arg_spec args[USDT_MAX_ARG_CNT];
+ __u64 usdt_cookie;
+ short arg_cnt;
+};
+
+struct usdt_note {
+ const char *provider;
+ const char *name;
+ /* USDT args specification string, e.g.:
+ * "-4@%esi -4@-24(%rbp) -4@%ecx 2@%ax 8@%rdx"
+ */
+ const char *args;
+ long loc_addr;
+ long base_addr;
+ long sema_addr;
+};
+
+struct usdt_target {
+ long abs_ip;
+ long rel_ip;
+ long sema_off;
+ struct usdt_spec spec;
+ const char *spec_str;
+};
+
+struct usdt_manager {
+ struct bpf_map *specs_map;
+ struct bpf_map *ip_to_spec_id_map;
+
+ int *free_spec_ids;
+ size_t free_spec_cnt;
+ size_t next_free_spec_id;
+
+ bool has_bpf_cookie;
+ bool has_sema_refcnt;
+};
+
+struct usdt_manager *usdt_manager_new(struct bpf_object *obj)
+{
+ static const char *ref_ctr_sysfs_path = "/sys/bus/event_source/devices/uprobe/format/ref_ctr_offset";
+ struct usdt_manager *man;
+ struct bpf_map *specs_map, *ip_to_spec_id_map;
+
+ specs_map = bpf_object__find_map_by_name(obj, "__bpf_usdt_specs");
+ ip_to_spec_id_map = bpf_object__find_map_by_name(obj, "__bpf_usdt_ip_to_spec_id");
+ if (!specs_map || !ip_to_spec_id_map) {
+ pr_warn("usdt: failed to find USDT support BPF maps, did you forget to include bpf/usdt.bpf.h?\n");
+ return ERR_PTR(-ESRCH);
+ }
+
+ man = calloc(1, sizeof(*man));
+ if (!man)
+ return ERR_PTR(-ENOMEM);
+
+ man->specs_map = specs_map;
+ man->ip_to_spec_id_map = ip_to_spec_id_map;
+
+ /* Detect if BPF cookie is supported for kprobes.
+ * We don't need IP-to-ID mapping if we can use BPF cookies.
+ * Added in: 7adfc6c9b315 ("bpf: Add bpf_get_attach_cookie() BPF helper to access bpf_cookie value")
+ */
+ man->has_bpf_cookie = kernel_supports(obj, FEAT_BPF_COOKIE);
+
+ /* Detect kernel support for automatic refcounting of USDT semaphore.
+ * If this is not supported, USDTs with semaphores will not be supported.
+ * Added in: a6ca88b241d5 ("trace_uprobe: support reference counter in fd-based uprobe")
+ */
+ man->has_sema_refcnt = faccessat(AT_FDCWD, ref_ctr_sysfs_path, F_OK, AT_EACCESS) == 0;
+
+ return man;
+}
+
+void usdt_manager_free(struct usdt_manager *man)
+{
+ if (IS_ERR_OR_NULL(man))
+ return;
+
+ free(man->free_spec_ids);
+ free(man);
+}
+
+static int sanity_check_usdt_elf(Elf *elf, const char *path)
+{
+ GElf_Ehdr ehdr;
+ int endianness;
+
+ if (elf_kind(elf) != ELF_K_ELF) {
+ pr_warn("usdt: unrecognized ELF kind %d for '%s'\n", elf_kind(elf), path);
+ return -EBADF;
+ }
+
+ switch (gelf_getclass(elf)) {
+ case ELFCLASS64:
+ if (sizeof(void *) != 8) {
+ pr_warn("usdt: attaching to 64-bit ELF binary '%s' is not supported\n", path);
+ return -EBADF;
+ }
+ break;
+ case ELFCLASS32:
+ if (sizeof(void *) != 4) {
+ pr_warn("usdt: attaching to 32-bit ELF binary '%s' is not supported\n", path);
+ return -EBADF;
+ }
+ break;
+ default:
+ pr_warn("usdt: unsupported ELF class for '%s'\n", path);
+ return -EBADF;
+ }
+
+ if (!gelf_getehdr(elf, &ehdr))
+ return -EINVAL;
+
+ if (ehdr.e_type != ET_EXEC && ehdr.e_type != ET_DYN) {
+ pr_warn("usdt: unsupported type of ELF binary '%s' (%d), only ET_EXEC and ET_DYN are supported\n",
+ path, ehdr.e_type);
+ return -EBADF;
+ }
+
+#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
+ endianness = ELFDATA2LSB;
+#elif __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
+ endianness = ELFDATA2MSB;
+#else
+# error "Unrecognized __BYTE_ORDER__"
+#endif
+ if (endianness != ehdr.e_ident[EI_DATA]) {
+ pr_warn("usdt: ELF endianness mismatch for '%s'\n", path);
+ return -EBADF;
+ }
+
+ return 0;
+}
+
+static int find_elf_sec_by_name(Elf *elf, const char *sec_name, GElf_Shdr *shdr, Elf_Scn **scn)
+{
+ Elf_Scn *sec = NULL;
+ size_t shstrndx;
+
+ if (elf_getshdrstrndx(elf, &shstrndx))
+ return -EINVAL;
+
+ /* check if ELF is corrupted and avoid calling elf_strptr if yes */
+ if (!elf_rawdata(elf_getscn(elf, shstrndx), NULL))
+ return -EINVAL;
+
+ while ((sec = elf_nextscn(elf, sec)) != NULL) {
+ char *name;
+
+ if (!gelf_getshdr(sec, shdr))
+ return -EINVAL;
+
+ name = elf_strptr(elf, shstrndx, shdr->sh_name);
+ if (name && strcmp(sec_name, name) == 0) {
+ *scn = sec;
+ return 0;
+ }
+ }
+
+ return -ENOENT;
+}
+
+struct elf_seg {
+ long start;
+ long end;
+ long offset;
+ bool is_exec;
+};
+
+static int cmp_elf_segs(const void *_a, const void *_b)
+{
+ const struct elf_seg *a = _a;
+ const struct elf_seg *b = _b;
+
+ return a->start < b->start ? -1 : 1;
+}
+
+static int parse_elf_segs(Elf *elf, const char *path, struct elf_seg **segs, size_t *seg_cnt)
+{
+ GElf_Phdr phdr;
+ size_t n;
+ int i, err;
+ struct elf_seg *seg;
+ void *tmp;
+
+ *seg_cnt = 0;
+
+ if (elf_getphdrnum(elf, &n)) {
+ err = -errno;
+ return err;
+ }
+
+ for (i = 0; i < n; i++) {
+ if (!gelf_getphdr(elf, i, &phdr)) {
+ err = -errno;
+ return err;
+ }
+
+ pr_debug("usdt: discovered PHDR #%d in '%s': vaddr 0x%lx memsz 0x%lx offset 0x%lx type 0x%lx flags 0x%lx\n",
+ i, path, (long)phdr.p_vaddr, (long)phdr.p_memsz, (long)phdr.p_offset,
+ (long)phdr.p_type, (long)phdr.p_flags);
+ if (phdr.p_type != PT_LOAD)
+ continue;
+
+ tmp = libbpf_reallocarray(*segs, *seg_cnt + 1, sizeof(**segs));
+ if (!tmp)
+ return -ENOMEM;
+
+ *segs = tmp;
+ seg = *segs + *seg_cnt;
+ (*seg_cnt)++;
+
+ seg->start = phdr.p_vaddr;
+ seg->end = phdr.p_vaddr + phdr.p_memsz;
+ seg->offset = phdr.p_offset;
+ seg->is_exec = phdr.p_flags & PF_X;
+ }
+
+ if (*seg_cnt == 0) {
+ pr_warn("usdt: failed to find PT_LOAD program headers in '%s'\n", path);
+ return -ESRCH;
+ }
+
+ qsort(*segs, *seg_cnt, sizeof(**segs), cmp_elf_segs);
+ return 0;
+}
+
+static int parse_vma_segs(int pid, const char *lib_path, struct elf_seg **segs, size_t *seg_cnt)
+{
+ char path[PATH_MAX], line[PATH_MAX], mode[16];
+ size_t seg_start, seg_end, seg_off;
+ struct elf_seg *seg;
+ int tmp_pid, i, err;
+ FILE *f;
+
+ *seg_cnt = 0;
+
+ /* Handle containerized binaries only accessible from
+ * /proc/<pid>/root/<path>. They will be reported as just /<path> in
+ * /proc/<pid>/maps.
+ */
+ if (sscanf(lib_path, "/proc/%d/root%s", &tmp_pid, path) == 2 && pid == tmp_pid)
+ goto proceed;
+
+ if (!realpath(lib_path, path)) {
+ pr_warn("usdt: failed to get absolute path of '%s' (err %d), using path as is...\n",
+ lib_path, -errno);
+ libbpf_strlcpy(path, lib_path, sizeof(path));
+ }
+
+proceed:
+ sprintf(line, "/proc/%d/maps", pid);
+ f = fopen(line, "r");
+ if (!f) {
+ err = -errno;
+ pr_warn("usdt: failed to open '%s' to get base addr of '%s': %d\n",
+ line, lib_path, err);
+ return err;
+ }
+
+ /* We need to handle lines with no path at the end:
+ *
+ * 7f5c6f5d1000-7f5c6f5d3000 rw-p 001c7000 08:04 21238613 /usr/lib64/libc-2.17.so
+ * 7f5c6f5d3000-7f5c6f5d8000 rw-p 00000000 00:00 0
+ * 7f5c6f5d8000-7f5c6f5d9000 r-xp 00000000 103:01 362990598 /data/users/andriin/linux/tools/bpf/usdt/libhello_usdt.so
+ */
+ while (fscanf(f, "%zx-%zx %s %zx %*s %*d%[^\n]\n",
+ &seg_start, &seg_end, mode, &seg_off, line) == 5) {
+ void *tmp;
+
+ /* to handle no path case (see above) we need to capture line
+ * without skipping any whitespaces. So we need to strip
+ * leading whitespaces manually here
+ */
+ i = 0;
+ while (isblank(line[i]))
+ i++;
+ if (strcmp(line + i, path) != 0)
+ continue;
+
+ pr_debug("usdt: discovered segment for lib '%s': addrs %zx-%zx mode %s offset %zx\n",
+ path, seg_start, seg_end, mode, seg_off);
+
+ /* ignore non-executable sections for shared libs */
+ if (mode[2] != 'x')
+ continue;
+
+ tmp = libbpf_reallocarray(*segs, *seg_cnt + 1, sizeof(**segs));
+ if (!tmp) {
+ err = -ENOMEM;
+ goto err_out;
+ }
+
+ *segs = tmp;
+ seg = *segs + *seg_cnt;
+ *seg_cnt += 1;
+
+ seg->start = seg_start;
+ seg->end = seg_end;
+ seg->offset = seg_off;
+ seg->is_exec = true;
+ }
+
+ if (*seg_cnt == 0) {
+ pr_warn("usdt: failed to find '%s' (resolved to '%s') within PID %d memory mappings\n",
+ lib_path, path, pid);
+ err = -ESRCH;
+ goto err_out;
+ }
+
+ qsort(*segs, *seg_cnt, sizeof(**segs), cmp_elf_segs);
+ err = 0;
+err_out:
+ fclose(f);
+ return err;
+}
+
+static struct elf_seg *find_elf_seg(struct elf_seg *segs, size_t seg_cnt, long virtaddr)
+{
+ struct elf_seg *seg;
+ int i;
+
+ /* for ELF binaries (both executables and shared libraries), we are
+ * given virtual address (absolute for executables, relative for
+ * libraries) which should match address range of [seg_start, seg_end)
+ */
+ for (i = 0, seg = segs; i < seg_cnt; i++, seg++) {
+ if (seg->start <= virtaddr && virtaddr < seg->end)
+ return seg;
+ }
+ return NULL;
+}
+
+static struct elf_seg *find_vma_seg(struct elf_seg *segs, size_t seg_cnt, long offset)
+{
+ struct elf_seg *seg;
+ int i;
+
+ /* for VMA segments from /proc/<pid>/maps file, provided "address" is
+ * actually a file offset, so should be fall within logical
+ * offset-based range of [offset_start, offset_end)
+ */
+ for (i = 0, seg = segs; i < seg_cnt; i++, seg++) {
+ if (seg->offset <= offset && offset < seg->offset + (seg->end - seg->start))
+ return seg;
+ }
+ return NULL;
+}
+
+static int parse_usdt_note(Elf *elf, const char *path, GElf_Nhdr *nhdr,
+ const char *data, size_t name_off, size_t desc_off,
+ struct usdt_note *usdt_note);
+
+static int parse_usdt_spec(struct usdt_spec *spec, const struct usdt_note *note, __u64 usdt_cookie);
+
+static int collect_usdt_targets(struct usdt_manager *man, Elf *elf, const char *path, pid_t pid,
+ const char *usdt_provider, const char *usdt_name, __u64 usdt_cookie,
+ struct usdt_target **out_targets, size_t *out_target_cnt)
+{
+ size_t off, name_off, desc_off, seg_cnt = 0, vma_seg_cnt = 0, target_cnt = 0;
+ struct elf_seg *segs = NULL, *vma_segs = NULL;
+ struct usdt_target *targets = NULL, *target;
+ long base_addr = 0;
+ Elf_Scn *notes_scn, *base_scn;
+ GElf_Shdr base_shdr, notes_shdr;
+ GElf_Ehdr ehdr;
+ GElf_Nhdr nhdr;
+ Elf_Data *data;
+ int err;
+
+ *out_targets = NULL;
+ *out_target_cnt = 0;
+
+ err = find_elf_sec_by_name(elf, USDT_NOTE_SEC, &notes_shdr, &notes_scn);
+ if (err) {
+ pr_warn("usdt: no USDT notes section (%s) found in '%s'\n", USDT_NOTE_SEC, path);
+ return err;
+ }
+
+ if (notes_shdr.sh_type != SHT_NOTE || !gelf_getehdr(elf, &ehdr)) {
+ pr_warn("usdt: invalid USDT notes section (%s) in '%s'\n", USDT_NOTE_SEC, path);
+ return -EINVAL;
+ }
+
+ err = parse_elf_segs(elf, path, &segs, &seg_cnt);
+ if (err) {
+ pr_warn("usdt: failed to process ELF program segments for '%s': %d\n", path, err);
+ goto err_out;
+ }
+
+ /* .stapsdt.base ELF section is optional, but is used for prelink
+ * offset compensation (see a big comment further below)
+ */
+ if (find_elf_sec_by_name(elf, USDT_BASE_SEC, &base_shdr, &base_scn) == 0)
+ base_addr = base_shdr.sh_addr;
+
+ data = elf_getdata(notes_scn, 0);
+ off = 0;
+ while ((off = gelf_getnote(data, off, &nhdr, &name_off, &desc_off)) > 0) {
+ long usdt_abs_ip, usdt_rel_ip, usdt_sema_off = 0;
+ struct usdt_note note;
+ struct elf_seg *seg = NULL;
+ void *tmp;
+
+ err = parse_usdt_note(elf, path, &nhdr, data->d_buf, name_off, desc_off, &note);
+ if (err)
+ goto err_out;
+
+ if (strcmp(note.provider, usdt_provider) != 0 || strcmp(note.name, usdt_name) != 0)
+ continue;
+
+ /* We need to compensate "prelink effect". See [0] for details,
+ * relevant parts quoted here:
+ *
+ * Each SDT probe also expands into a non-allocated ELF note. You can
+ * find this by looking at SHT_NOTE sections and decoding the format;
+ * see below for details. Because the note is non-allocated, it means
+ * there is no runtime cost, and also preserved in both stripped files
+ * and .debug files.
+ *
+ * However, this means that prelink won't adjust the note's contents
+ * for address offsets. Instead, this is done via the .stapsdt.base
+ * section. This is a special section that is added to the text. We
+ * will only ever have one of these sections in a final link and it
+ * will only ever be one byte long. Nothing about this section itself
+ * matters, we just use it as a marker to detect prelink address
+ * adjustments.
+ *
+ * Each probe note records the link-time address of the .stapsdt.base
+ * section alongside the probe PC address. The decoder compares the
+ * base address stored in the note with the .stapsdt.base section's
+ * sh_addr. Initially these are the same, but the section header will
+ * be adjusted by prelink. So the decoder applies the difference to
+ * the probe PC address to get the correct prelinked PC address; the
+ * same adjustment is applied to the semaphore address, if any.
+ *
+ * [0] https://sourceware.org/systemtap/wiki/UserSpaceProbeImplementation
+ */
+ usdt_abs_ip = note.loc_addr;
+ if (base_addr)
+ usdt_abs_ip += base_addr - note.base_addr;
+
+ /* When attaching uprobes (which is what USDTs basically are)
+ * kernel expects file offset to be specified, not a relative
+ * virtual address, so we need to translate virtual address to
+ * file offset, for both ET_EXEC and ET_DYN binaries.
+ */
+ seg = find_elf_seg(segs, seg_cnt, usdt_abs_ip);
+ if (!seg) {
+ err = -ESRCH;
+ pr_warn("usdt: failed to find ELF program segment for '%s:%s' in '%s' at IP 0x%lx\n",
+ usdt_provider, usdt_name, path, usdt_abs_ip);
+ goto err_out;
+ }
+ if (!seg->is_exec) {
+ err = -ESRCH;
+ pr_warn("usdt: matched ELF binary '%s' segment [0x%lx, 0x%lx) for '%s:%s' at IP 0x%lx is not executable\n",
+ path, seg->start, seg->end, usdt_provider, usdt_name,
+ usdt_abs_ip);
+ goto err_out;
+ }
+ /* translate from virtual address to file offset */
+ usdt_rel_ip = usdt_abs_ip - seg->start + seg->offset;
+
+ if (ehdr.e_type == ET_DYN && !man->has_bpf_cookie) {
+ /* If we don't have BPF cookie support but need to
+ * attach to a shared library, we'll need to know and
+ * record absolute addresses of attach points due to
+ * the need to lookup USDT spec by absolute IP of
+ * triggered uprobe. Doing this resolution is only
+ * possible when we have a specific PID of the process
+ * that's using specified shared library. BPF cookie
+ * removes the absolute address limitation as we don't
+ * need to do this lookup (we just use BPF cookie as
+ * an index of USDT spec), so for newer kernels with
+ * BPF cookie support libbpf supports USDT attachment
+ * to shared libraries with no PID filter.
+ */
+ if (pid < 0) {
+ pr_warn("usdt: attaching to shared libraries without specific PID is not supported on current kernel\n");
+ err = -ENOTSUP;
+ goto err_out;
+ }
+
+ /* vma_segs are lazily initialized only if necessary */
+ if (vma_seg_cnt == 0) {
+ err = parse_vma_segs(pid, path, &vma_segs, &vma_seg_cnt);
+ if (err) {
+ pr_warn("usdt: failed to get memory segments in PID %d for shared library '%s': %d\n",
+ pid, path, err);
+ goto err_out;
+ }
+ }
+
+ seg = find_vma_seg(vma_segs, vma_seg_cnt, usdt_rel_ip);
+ if (!seg) {
+ err = -ESRCH;
+ pr_warn("usdt: failed to find shared lib memory segment for '%s:%s' in '%s' at relative IP 0x%lx\n",
+ usdt_provider, usdt_name, path, usdt_rel_ip);
+ goto err_out;
+ }
+
+ usdt_abs_ip = seg->start - seg->offset + usdt_rel_ip;
+ }
+
+ pr_debug("usdt: probe for '%s:%s' in %s '%s': addr 0x%lx base 0x%lx (resolved abs_ip 0x%lx rel_ip 0x%lx) args '%s' in segment [0x%lx, 0x%lx) at offset 0x%lx\n",
+ usdt_provider, usdt_name, ehdr.e_type == ET_EXEC ? "exec" : "lib ", path,
+ note.loc_addr, note.base_addr, usdt_abs_ip, usdt_rel_ip, note.args,
+ seg ? seg->start : 0, seg ? seg->end : 0, seg ? seg->offset : 0);
+
+ /* Adjust semaphore address to be a file offset */
+ if (note.sema_addr) {
+ if (!man->has_sema_refcnt) {
+ pr_warn("usdt: kernel doesn't support USDT semaphore refcounting for '%s:%s' in '%s'\n",
+ usdt_provider, usdt_name, path);
+ err = -ENOTSUP;
+ goto err_out;
+ }
+
+ seg = find_elf_seg(segs, seg_cnt, note.sema_addr);
+ if (!seg) {
+ err = -ESRCH;
+ pr_warn("usdt: failed to find ELF loadable segment with semaphore of '%s:%s' in '%s' at 0x%lx\n",
+ usdt_provider, usdt_name, path, note.sema_addr);
+ goto err_out;
+ }
+ if (seg->is_exec) {
+ err = -ESRCH;
+ pr_warn("usdt: matched ELF binary '%s' segment [0x%lx, 0x%lx] for semaphore of '%s:%s' at 0x%lx is executable\n",
+ path, seg->start, seg->end, usdt_provider, usdt_name,
+ note.sema_addr);
+ goto err_out;
+ }
+
+ usdt_sema_off = note.sema_addr - seg->start + seg->offset;
+
+ pr_debug("usdt: sema for '%s:%s' in %s '%s': addr 0x%lx base 0x%lx (resolved 0x%lx) in segment [0x%lx, 0x%lx] at offset 0x%lx\n",
+ usdt_provider, usdt_name, ehdr.e_type == ET_EXEC ? "exec" : "lib ",
+ path, note.sema_addr, note.base_addr, usdt_sema_off,
+ seg->start, seg->end, seg->offset);
+ }
+
+ /* Record adjusted addresses and offsets and parse USDT spec */
+ tmp = libbpf_reallocarray(targets, target_cnt + 1, sizeof(*targets));
+ if (!tmp) {
+ err = -ENOMEM;
+ goto err_out;
+ }
+ targets = tmp;
+
+ target = &targets[target_cnt];
+ memset(target, 0, sizeof(*target));
+
+ target->abs_ip = usdt_abs_ip;
+ target->rel_ip = usdt_rel_ip;
+ target->sema_off = usdt_sema_off;
+
+ /* notes.args references strings from Elf itself, so they can
+ * be referenced safely until elf_end() call
+ */
+ target->spec_str = note.args;
+
+ err = parse_usdt_spec(&target->spec, &note, usdt_cookie);
+ if (err)
+ goto err_out;
+
+ target_cnt++;
+ }
+
+ *out_targets = targets;
+ *out_target_cnt = target_cnt;
+ err = target_cnt;
+
+err_out:
+ free(segs);
+ free(vma_segs);
+ if (err < 0)
+ free(targets);
+ return err;
+}
+
+struct bpf_link_usdt {
+ struct bpf_link link;
+
+ struct usdt_manager *usdt_man;
+
+ size_t spec_cnt;
+ int *spec_ids;
+
+ size_t uprobe_cnt;
+ struct {
+ long abs_ip;
+ struct bpf_link *link;
+ } *uprobes;
+};
+
+static int bpf_link_usdt_detach(struct bpf_link *link)
+{
+ struct bpf_link_usdt *usdt_link = container_of(link, struct bpf_link_usdt, link);
+ struct usdt_manager *man = usdt_link->usdt_man;
+ int i;
+
+ for (i = 0; i < usdt_link->uprobe_cnt; i++) {
+ /* detach underlying uprobe link */
+ bpf_link__destroy(usdt_link->uprobes[i].link);
+ /* there is no need to update specs map because it will be
+ * unconditionally overwritten on subsequent USDT attaches,
+ * but if BPF cookies are not used we need to remove entry
+ * from ip_to_spec_id map, otherwise we'll run into false
+ * conflicting IP errors
+ */
+ if (!man->has_bpf_cookie) {
+ /* not much we can do about errors here */
+ (void)bpf_map_delete_elem(bpf_map__fd(man->ip_to_spec_id_map),
+ &usdt_link->uprobes[i].abs_ip);
+ }
+ }
+
+ /* try to return the list of previously used spec IDs to usdt_manager
+ * for future reuse for subsequent USDT attaches
+ */
+ if (!man->free_spec_ids) {
+ /* if there were no free spec IDs yet, just transfer our IDs */
+ man->free_spec_ids = usdt_link->spec_ids;
+ man->free_spec_cnt = usdt_link->spec_cnt;
+ usdt_link->spec_ids = NULL;
+ } else {
+ /* otherwise concat IDs */
+ size_t new_cnt = man->free_spec_cnt + usdt_link->spec_cnt;
+ int *new_free_ids;
+
+ new_free_ids = libbpf_reallocarray(man->free_spec_ids, new_cnt,
+ sizeof(*new_free_ids));
+ /* If we couldn't resize free_spec_ids, we'll just leak
+ * a bunch of free IDs; this is very unlikely to happen and if
+ * system is so exhausted on memory, it's the least of user's
+ * concerns, probably.
+ * So just do our best here to return those IDs to usdt_manager.
+ */
+ if (new_free_ids) {
+ memcpy(new_free_ids + man->free_spec_cnt, usdt_link->spec_ids,
+ usdt_link->spec_cnt * sizeof(*usdt_link->spec_ids));
+ man->free_spec_ids = new_free_ids;
+ man->free_spec_cnt = new_cnt;
+ }
+ }
+
+ return 0;
+}
+
+static void bpf_link_usdt_dealloc(struct bpf_link *link)
+{
+ struct bpf_link_usdt *usdt_link = container_of(link, struct bpf_link_usdt, link);
+
+ free(usdt_link->spec_ids);
+ free(usdt_link->uprobes);
+ free(usdt_link);
+}
+
+static size_t specs_hash_fn(long key, void *ctx)
+{
+ return str_hash((char *)key);
+}
+
+static bool specs_equal_fn(long key1, long key2, void *ctx)
+{
+ return strcmp((char *)key1, (char *)key2) == 0;
+}
+
+static int allocate_spec_id(struct usdt_manager *man, struct hashmap *specs_hash,
+ struct bpf_link_usdt *link, struct usdt_target *target,
+ int *spec_id, bool *is_new)
+{
+ long tmp;
+ void *new_ids;
+ int err;
+
+ /* check if we already allocated spec ID for this spec string */
+ if (hashmap__find(specs_hash, target->spec_str, &tmp)) {
+ *spec_id = tmp;
+ *is_new = false;
+ return 0;
+ }
+
+ /* otherwise it's a new ID that needs to be set up in specs map and
+ * returned back to usdt_manager when USDT link is detached
+ */
+ new_ids = libbpf_reallocarray(link->spec_ids, link->spec_cnt + 1, sizeof(*link->spec_ids));
+ if (!new_ids)
+ return -ENOMEM;
+ link->spec_ids = new_ids;
+
+ /* get next free spec ID, giving preference to free list, if not empty */
+ if (man->free_spec_cnt) {
+ *spec_id = man->free_spec_ids[man->free_spec_cnt - 1];
+
+ /* cache spec ID for current spec string for future lookups */
+ err = hashmap__add(specs_hash, target->spec_str, *spec_id);
+ if (err)
+ return err;
+
+ man->free_spec_cnt--;
+ } else {
+ /* don't allocate spec ID bigger than what fits in specs map */
+ if (man->next_free_spec_id >= bpf_map__max_entries(man->specs_map))
+ return -E2BIG;
+
+ *spec_id = man->next_free_spec_id;
+
+ /* cache spec ID for current spec string for future lookups */
+ err = hashmap__add(specs_hash, target->spec_str, *spec_id);
+ if (err)
+ return err;
+
+ man->next_free_spec_id++;
+ }
+
+ /* remember new spec ID in the link for later return back to free list on detach */
+ link->spec_ids[link->spec_cnt] = *spec_id;
+ link->spec_cnt++;
+ *is_new = true;
+ return 0;
+}
+
+struct bpf_link *usdt_manager_attach_usdt(struct usdt_manager *man, const struct bpf_program *prog,
+ pid_t pid, const char *path,
+ const char *usdt_provider, const char *usdt_name,
+ __u64 usdt_cookie)
+{
+ int i, fd, err, spec_map_fd, ip_map_fd;
+ LIBBPF_OPTS(bpf_uprobe_opts, opts);
+ struct hashmap *specs_hash = NULL;
+ struct bpf_link_usdt *link = NULL;
+ struct usdt_target *targets = NULL;
+ size_t target_cnt;
+ Elf *elf;
+
+ spec_map_fd = bpf_map__fd(man->specs_map);
+ ip_map_fd = bpf_map__fd(man->ip_to_spec_id_map);
+
+ /* TODO: perform path resolution similar to uprobe's */
+ fd = open(path, O_RDONLY);
+ if (fd < 0) {
+ err = -errno;
+ pr_warn("usdt: failed to open ELF binary '%s': %d\n", path, err);
+ return libbpf_err_ptr(err);
+ }
+
+ elf = elf_begin(fd, ELF_C_READ_MMAP, NULL);
+ if (!elf) {
+ err = -EBADF;
+ pr_warn("usdt: failed to parse ELF binary '%s': %s\n", path, elf_errmsg(-1));
+ goto err_out;
+ }
+
+ err = sanity_check_usdt_elf(elf, path);
+ if (err)
+ goto err_out;
+
+ /* normalize PID filter */
+ if (pid < 0)
+ pid = -1;
+ else if (pid == 0)
+ pid = getpid();
+
+ /* discover USDT in given binary, optionally limiting
+ * activations to a given PID, if pid > 0
+ */
+ err = collect_usdt_targets(man, elf, path, pid, usdt_provider, usdt_name,
+ usdt_cookie, &targets, &target_cnt);
+ if (err <= 0) {
+ err = (err == 0) ? -ENOENT : err;
+ goto err_out;
+ }
+
+ specs_hash = hashmap__new(specs_hash_fn, specs_equal_fn, NULL);
+ if (IS_ERR(specs_hash)) {
+ err = PTR_ERR(specs_hash);
+ goto err_out;
+ }
+
+ link = calloc(1, sizeof(*link));
+ if (!link) {
+ err = -ENOMEM;
+ goto err_out;
+ }
+
+ link->usdt_man = man;
+ link->link.detach = &bpf_link_usdt_detach;
+ link->link.dealloc = &bpf_link_usdt_dealloc;
+
+ link->uprobes = calloc(target_cnt, sizeof(*link->uprobes));
+ if (!link->uprobes) {
+ err = -ENOMEM;
+ goto err_out;
+ }
+
+ for (i = 0; i < target_cnt; i++) {
+ struct usdt_target *target = &targets[i];
+ struct bpf_link *uprobe_link;
+ bool is_new;
+ int spec_id;
+
+ /* Spec ID can be either reused or newly allocated. If it is
+ * newly allocated, we'll need to fill out spec map, otherwise
+ * entire spec should be valid and can be just used by a new
+ * uprobe. We reuse spec when USDT arg spec is identical. We
+ * also never share specs between two different USDT
+ * attachments ("links"), so all the reused specs already
+ * share USDT cookie value implicitly.
+ */
+ err = allocate_spec_id(man, specs_hash, link, target, &spec_id, &is_new);
+ if (err)
+ goto err_out;
+
+ if (is_new && bpf_map_update_elem(spec_map_fd, &spec_id, &target->spec, BPF_ANY)) {
+ err = -errno;
+ pr_warn("usdt: failed to set USDT spec #%d for '%s:%s' in '%s': %d\n",
+ spec_id, usdt_provider, usdt_name, path, err);
+ goto err_out;
+ }
+ if (!man->has_bpf_cookie &&
+ bpf_map_update_elem(ip_map_fd, &target->abs_ip, &spec_id, BPF_NOEXIST)) {
+ err = -errno;
+ if (err == -EEXIST) {
+ pr_warn("usdt: IP collision detected for spec #%d for '%s:%s' in '%s'\n",
+ spec_id, usdt_provider, usdt_name, path);
+ } else {
+ pr_warn("usdt: failed to map IP 0x%lx to spec #%d for '%s:%s' in '%s': %d\n",
+ target->abs_ip, spec_id, usdt_provider, usdt_name,
+ path, err);
+ }
+ goto err_out;
+ }
+
+ opts.ref_ctr_offset = target->sema_off;
+ opts.bpf_cookie = man->has_bpf_cookie ? spec_id : 0;
+ uprobe_link = bpf_program__attach_uprobe_opts(prog, pid, path,
+ target->rel_ip, &opts);
+ err = libbpf_get_error(uprobe_link);
+ if (err) {
+ pr_warn("usdt: failed to attach uprobe #%d for '%s:%s' in '%s': %d\n",
+ i, usdt_provider, usdt_name, path, err);
+ goto err_out;
+ }
+
+ link->uprobes[i].link = uprobe_link;
+ link->uprobes[i].abs_ip = target->abs_ip;
+ link->uprobe_cnt++;
+ }
+
+ free(targets);
+ hashmap__free(specs_hash);
+ elf_end(elf);
+ close(fd);
+
+ return &link->link;
+
+err_out:
+ if (link)
+ bpf_link__destroy(&link->link);
+ free(targets);
+ hashmap__free(specs_hash);
+ if (elf)
+ elf_end(elf);
+ close(fd);
+ return libbpf_err_ptr(err);
+}
+
+/* Parse out USDT ELF note from '.note.stapsdt' section.
+ * Logic inspired by perf's code.
+ */
+static int parse_usdt_note(Elf *elf, const char *path, GElf_Nhdr *nhdr,
+ const char *data, size_t name_off, size_t desc_off,
+ struct usdt_note *note)
+{
+ const char *provider, *name, *args;
+ long addrs[3];
+ size_t len;
+
+ /* sanity check USDT note name and type first */
+ if (strncmp(data + name_off, USDT_NOTE_NAME, nhdr->n_namesz) != 0)
+ return -EINVAL;
+ if (nhdr->n_type != USDT_NOTE_TYPE)
+ return -EINVAL;
+
+ /* sanity check USDT note contents ("description" in ELF terminology) */
+ len = nhdr->n_descsz;
+ data = data + desc_off;
+
+ /* +3 is the very minimum required to store three empty strings */
+ if (len < sizeof(addrs) + 3)
+ return -EINVAL;
+
+ /* get location, base, and semaphore addrs */
+ memcpy(&addrs, data, sizeof(addrs));
+
+ /* parse string fields: provider, name, args */
+ provider = data + sizeof(addrs);
+
+ name = (const char *)memchr(provider, '\0', data + len - provider);
+ if (!name) /* non-zero-terminated provider */
+ return -EINVAL;
+ name++;
+ if (name >= data + len || *name == '\0') /* missing or empty name */
+ return -EINVAL;
+
+ args = memchr(name, '\0', data + len - name);
+ if (!args) /* non-zero-terminated name */
+ return -EINVAL;
+ ++args;
+ if (args >= data + len) /* missing arguments spec */
+ return -EINVAL;
+
+ note->provider = provider;
+ note->name = name;
+ if (*args == '\0' || *args == ':')
+ note->args = "";
+ else
+ note->args = args;
+ note->loc_addr = addrs[0];
+ note->base_addr = addrs[1];
+ note->sema_addr = addrs[2];
+
+ return 0;
+}
+
+static int parse_usdt_arg(const char *arg_str, int arg_num, struct usdt_arg_spec *arg);
+
+static int parse_usdt_spec(struct usdt_spec *spec, const struct usdt_note *note, __u64 usdt_cookie)
+{
+ const char *s;
+ int len;
+
+ spec->usdt_cookie = usdt_cookie;
+ spec->arg_cnt = 0;
+
+ s = note->args;
+ while (s[0]) {
+ if (spec->arg_cnt >= USDT_MAX_ARG_CNT) {
+ pr_warn("usdt: too many USDT arguments (> %d) for '%s:%s' with args spec '%s'\n",
+ USDT_MAX_ARG_CNT, note->provider, note->name, note->args);
+ return -E2BIG;
+ }
+
+ len = parse_usdt_arg(s, spec->arg_cnt, &spec->args[spec->arg_cnt]);
+ if (len < 0)
+ return len;
+
+ s += len;
+ spec->arg_cnt++;
+ }
+
+ return 0;
+}
+
+/* Architecture-specific logic for parsing USDT argument location specs */
+
+#if defined(__x86_64__) || defined(__i386__)
+
+static int calc_pt_regs_off(const char *reg_name)
+{
+ static struct {
+ const char *names[4];
+ size_t pt_regs_off;
+ } reg_map[] = {
+#ifdef __x86_64__
+#define reg_off(reg64, reg32) offsetof(struct pt_regs, reg64)
+#else
+#define reg_off(reg64, reg32) offsetof(struct pt_regs, reg32)
+#endif
+ { {"rip", "eip", "", ""}, reg_off(rip, eip) },
+ { {"rax", "eax", "ax", "al"}, reg_off(rax, eax) },
+ { {"rbx", "ebx", "bx", "bl"}, reg_off(rbx, ebx) },
+ { {"rcx", "ecx", "cx", "cl"}, reg_off(rcx, ecx) },
+ { {"rdx", "edx", "dx", "dl"}, reg_off(rdx, edx) },
+ { {"rsi", "esi", "si", "sil"}, reg_off(rsi, esi) },
+ { {"rdi", "edi", "di", "dil"}, reg_off(rdi, edi) },
+ { {"rbp", "ebp", "bp", "bpl"}, reg_off(rbp, ebp) },
+ { {"rsp", "esp", "sp", "spl"}, reg_off(rsp, esp) },
+#undef reg_off
+#ifdef __x86_64__
+ { {"r8", "r8d", "r8w", "r8b"}, offsetof(struct pt_regs, r8) },
+ { {"r9", "r9d", "r9w", "r9b"}, offsetof(struct pt_regs, r9) },
+ { {"r10", "r10d", "r10w", "r10b"}, offsetof(struct pt_regs, r10) },
+ { {"r11", "r11d", "r11w", "r11b"}, offsetof(struct pt_regs, r11) },
+ { {"r12", "r12d", "r12w", "r12b"}, offsetof(struct pt_regs, r12) },
+ { {"r13", "r13d", "r13w", "r13b"}, offsetof(struct pt_regs, r13) },
+ { {"r14", "r14d", "r14w", "r14b"}, offsetof(struct pt_regs, r14) },
+ { {"r15", "r15d", "r15w", "r15b"}, offsetof(struct pt_regs, r15) },
+#endif
+ };
+ int i, j;
+
+ for (i = 0; i < ARRAY_SIZE(reg_map); i++) {
+ for (j = 0; j < ARRAY_SIZE(reg_map[i].names); j++) {
+ if (strcmp(reg_name, reg_map[i].names[j]) == 0)
+ return reg_map[i].pt_regs_off;
+ }
+ }
+
+ pr_warn("usdt: unrecognized register '%s'\n", reg_name);
+ return -ENOENT;
+}
+
+static int parse_usdt_arg(const char *arg_str, int arg_num, struct usdt_arg_spec *arg)
+{
+ char reg_name[16];
+ int arg_sz, len, reg_off;
+ long off;
+
+ if (sscanf(arg_str, " %d @ %ld ( %%%15[^)] ) %n", &arg_sz, &off, reg_name, &len) == 3) {
+ /* Memory dereference case, e.g., -4@-20(%rbp) */
+ arg->arg_type = USDT_ARG_REG_DEREF;
+ arg->val_off = off;
+ reg_off = calc_pt_regs_off(reg_name);
+ if (reg_off < 0)
+ return reg_off;
+ arg->reg_off = reg_off;
+ } else if (sscanf(arg_str, " %d @ ( %%%15[^)] ) %n", &arg_sz, reg_name, &len) == 2) {
+ /* Memory dereference case without offset, e.g., 8@(%rsp) */
+ arg->arg_type = USDT_ARG_REG_DEREF;
+ arg->val_off = 0;
+ reg_off = calc_pt_regs_off(reg_name);
+ if (reg_off < 0)
+ return reg_off;
+ arg->reg_off = reg_off;
+ } else if (sscanf(arg_str, " %d @ %%%15s %n", &arg_sz, reg_name, &len) == 2) {
+ /* Register read case, e.g., -4@%eax */
+ arg->arg_type = USDT_ARG_REG;
+ arg->val_off = 0;
+
+ reg_off = calc_pt_regs_off(reg_name);
+ if (reg_off < 0)
+ return reg_off;
+ arg->reg_off = reg_off;
+ } else if (sscanf(arg_str, " %d @ $%ld %n", &arg_sz, &off, &len) == 2) {
+ /* Constant value case, e.g., 4@$71 */
+ arg->arg_type = USDT_ARG_CONST;
+ arg->val_off = off;
+ arg->reg_off = 0;
+ } else {
+ pr_warn("usdt: unrecognized arg #%d spec '%s'\n", arg_num, arg_str);
+ return -EINVAL;
+ }
+
+ arg->arg_signed = arg_sz < 0;
+ if (arg_sz < 0)
+ arg_sz = -arg_sz;
+
+ switch (arg_sz) {
+ case 1: case 2: case 4: case 8:
+ arg->arg_bitshift = 64 - arg_sz * 8;
+ break;
+ default:
+ pr_warn("usdt: unsupported arg #%d (spec '%s') size: %d\n",
+ arg_num, arg_str, arg_sz);
+ return -EINVAL;
+ }
+
+ return len;
+}
+
+#elif defined(__s390x__)
+
+/* Do not support __s390__ for now, since user_pt_regs is broken with -m31. */
+
+static int parse_usdt_arg(const char *arg_str, int arg_num, struct usdt_arg_spec *arg)
+{
+ unsigned int reg;
+ int arg_sz, len;
+ long off;
+
+ if (sscanf(arg_str, " %d @ %ld ( %%r%u ) %n", &arg_sz, &off, &reg, &len) == 3) {
+ /* Memory dereference case, e.g., -2@-28(%r15) */
+ arg->arg_type = USDT_ARG_REG_DEREF;
+ arg->val_off = off;
+ if (reg > 15) {
+ pr_warn("usdt: unrecognized register '%%r%u'\n", reg);
+ return -EINVAL;
+ }
+ arg->reg_off = offsetof(user_pt_regs, gprs[reg]);
+ } else if (sscanf(arg_str, " %d @ %%r%u %n", &arg_sz, &reg, &len) == 2) {
+ /* Register read case, e.g., -8@%r0 */
+ arg->arg_type = USDT_ARG_REG;
+ arg->val_off = 0;
+ if (reg > 15) {
+ pr_warn("usdt: unrecognized register '%%r%u'\n", reg);
+ return -EINVAL;
+ }
+ arg->reg_off = offsetof(user_pt_regs, gprs[reg]);
+ } else if (sscanf(arg_str, " %d @ %ld %n", &arg_sz, &off, &len) == 2) {
+ /* Constant value case, e.g., 4@71 */
+ arg->arg_type = USDT_ARG_CONST;
+ arg->val_off = off;
+ arg->reg_off = 0;
+ } else {
+ pr_warn("usdt: unrecognized arg #%d spec '%s'\n", arg_num, arg_str);
+ return -EINVAL;
+ }
+
+ arg->arg_signed = arg_sz < 0;
+ if (arg_sz < 0)
+ arg_sz = -arg_sz;
+
+ switch (arg_sz) {
+ case 1: case 2: case 4: case 8:
+ arg->arg_bitshift = 64 - arg_sz * 8;
+ break;
+ default:
+ pr_warn("usdt: unsupported arg #%d (spec '%s') size: %d\n",
+ arg_num, arg_str, arg_sz);
+ return -EINVAL;
+ }
+
+ return len;
+}
+
+#elif defined(__aarch64__)
+
+static int calc_pt_regs_off(const char *reg_name)
+{
+ int reg_num;
+
+ if (sscanf(reg_name, "x%d", &reg_num) == 1) {
+ if (reg_num >= 0 && reg_num < 31)
+ return offsetof(struct user_pt_regs, regs[reg_num]);
+ } else if (strcmp(reg_name, "sp") == 0) {
+ return offsetof(struct user_pt_regs, sp);
+ }
+ pr_warn("usdt: unrecognized register '%s'\n", reg_name);
+ return -ENOENT;
+}
+
+static int parse_usdt_arg(const char *arg_str, int arg_num, struct usdt_arg_spec *arg)
+{
+ char reg_name[16];
+ int arg_sz, len, reg_off;
+ long off;
+
+ if (sscanf(arg_str, " %d @ \[ %15[a-z0-9], %ld ] %n", &arg_sz, reg_name, &off, &len) == 3) {
+ /* Memory dereference case, e.g., -4@[sp, 96] */
+ arg->arg_type = USDT_ARG_REG_DEREF;
+ arg->val_off = off;
+ reg_off = calc_pt_regs_off(reg_name);
+ if (reg_off < 0)
+ return reg_off;
+ arg->reg_off = reg_off;
+ } else if (sscanf(arg_str, " %d @ \[ %15[a-z0-9] ] %n", &arg_sz, reg_name, &len) == 2) {
+ /* Memory dereference case, e.g., -4@[sp] */
+ arg->arg_type = USDT_ARG_REG_DEREF;
+ arg->val_off = 0;
+ reg_off = calc_pt_regs_off(reg_name);
+ if (reg_off < 0)
+ return reg_off;
+ arg->reg_off = reg_off;
+ } else if (sscanf(arg_str, " %d @ %ld %n", &arg_sz, &off, &len) == 2) {
+ /* Constant value case, e.g., 4@5 */
+ arg->arg_type = USDT_ARG_CONST;
+ arg->val_off = off;
+ arg->reg_off = 0;
+ } else if (sscanf(arg_str, " %d @ %15[a-z0-9] %n", &arg_sz, reg_name, &len) == 2) {
+ /* Register read case, e.g., -8@x4 */
+ arg->arg_type = USDT_ARG_REG;
+ arg->val_off = 0;
+ reg_off = calc_pt_regs_off(reg_name);
+ if (reg_off < 0)
+ return reg_off;
+ arg->reg_off = reg_off;
+ } else {
+ pr_warn("usdt: unrecognized arg #%d spec '%s'\n", arg_num, arg_str);
+ return -EINVAL;
+ }
+
+ arg->arg_signed = arg_sz < 0;
+ if (arg_sz < 0)
+ arg_sz = -arg_sz;
+
+ switch (arg_sz) {
+ case 1: case 2: case 4: case 8:
+ arg->arg_bitshift = 64 - arg_sz * 8;
+ break;
+ default:
+ pr_warn("usdt: unsupported arg #%d (spec '%s') size: %d\n",
+ arg_num, arg_str, arg_sz);
+ return -EINVAL;
+ }
+
+ return len;
+}
+
+#elif defined(__riscv)
+
+static int calc_pt_regs_off(const char *reg_name)
+{
+ static struct {
+ const char *name;
+ size_t pt_regs_off;
+ } reg_map[] = {
+ { "ra", offsetof(struct user_regs_struct, ra) },
+ { "sp", offsetof(struct user_regs_struct, sp) },
+ { "gp", offsetof(struct user_regs_struct, gp) },
+ { "tp", offsetof(struct user_regs_struct, tp) },
+ { "a0", offsetof(struct user_regs_struct, a0) },
+ { "a1", offsetof(struct user_regs_struct, a1) },
+ { "a2", offsetof(struct user_regs_struct, a2) },
+ { "a3", offsetof(struct user_regs_struct, a3) },
+ { "a4", offsetof(struct user_regs_struct, a4) },
+ { "a5", offsetof(struct user_regs_struct, a5) },
+ { "a6", offsetof(struct user_regs_struct, a6) },
+ { "a7", offsetof(struct user_regs_struct, a7) },
+ { "s0", offsetof(struct user_regs_struct, s0) },
+ { "s1", offsetof(struct user_regs_struct, s1) },
+ { "s2", offsetof(struct user_regs_struct, s2) },
+ { "s3", offsetof(struct user_regs_struct, s3) },
+ { "s4", offsetof(struct user_regs_struct, s4) },
+ { "s5", offsetof(struct user_regs_struct, s5) },
+ { "s6", offsetof(struct user_regs_struct, s6) },
+ { "s7", offsetof(struct user_regs_struct, s7) },
+ { "s8", offsetof(struct user_regs_struct, rv_s8) },
+ { "s9", offsetof(struct user_regs_struct, s9) },
+ { "s10", offsetof(struct user_regs_struct, s10) },
+ { "s11", offsetof(struct user_regs_struct, s11) },
+ { "t0", offsetof(struct user_regs_struct, t0) },
+ { "t1", offsetof(struct user_regs_struct, t1) },
+ { "t2", offsetof(struct user_regs_struct, t2) },
+ { "t3", offsetof(struct user_regs_struct, t3) },
+ { "t4", offsetof(struct user_regs_struct, t4) },
+ { "t5", offsetof(struct user_regs_struct, t5) },
+ { "t6", offsetof(struct user_regs_struct, t6) },
+ };
+ int i;
+
+ for (i = 0; i < ARRAY_SIZE(reg_map); i++) {
+ if (strcmp(reg_name, reg_map[i].name) == 0)
+ return reg_map[i].pt_regs_off;
+ }
+
+ pr_warn("usdt: unrecognized register '%s'\n", reg_name);
+ return -ENOENT;
+}
+
+static int parse_usdt_arg(const char *arg_str, int arg_num, struct usdt_arg_spec *arg)
+{
+ char reg_name[16];
+ int arg_sz, len, reg_off;
+ long off;
+
+ if (sscanf(arg_str, " %d @ %ld ( %15[a-z0-9] ) %n", &arg_sz, &off, reg_name, &len) == 3) {
+ /* Memory dereference case, e.g., -8@-88(s0) */
+ arg->arg_type = USDT_ARG_REG_DEREF;
+ arg->val_off = off;
+ reg_off = calc_pt_regs_off(reg_name);
+ if (reg_off < 0)
+ return reg_off;
+ arg->reg_off = reg_off;
+ } else if (sscanf(arg_str, " %d @ %ld %n", &arg_sz, &off, &len) == 2) {
+ /* Constant value case, e.g., 4@5 */
+ arg->arg_type = USDT_ARG_CONST;
+ arg->val_off = off;
+ arg->reg_off = 0;
+ } else if (sscanf(arg_str, " %d @ %15[a-z0-9] %n", &arg_sz, reg_name, &len) == 2) {
+ /* Register read case, e.g., -8@a1 */
+ arg->arg_type = USDT_ARG_REG;
+ arg->val_off = 0;
+ reg_off = calc_pt_regs_off(reg_name);
+ if (reg_off < 0)
+ return reg_off;
+ arg->reg_off = reg_off;
+ } else {
+ pr_warn("usdt: unrecognized arg #%d spec '%s'\n", arg_num, arg_str);
+ return -EINVAL;
+ }
+
+ arg->arg_signed = arg_sz < 0;
+ if (arg_sz < 0)
+ arg_sz = -arg_sz;
+
+ switch (arg_sz) {
+ case 1: case 2: case 4: case 8:
+ arg->arg_bitshift = 64 - arg_sz * 8;
+ break;
+ default:
+ pr_warn("usdt: unsupported arg #%d (spec '%s') size: %d\n",
+ arg_num, arg_str, arg_sz);
+ return -EINVAL;
+ }
+
+ return len;
+}
+
+#else
+
+static int parse_usdt_arg(const char *arg_str, int arg_num, struct usdt_arg_spec *arg)
+{
+ pr_warn("usdt: libbpf doesn't support USDTs on current architecture\n");
+ return -ENOTSUP;
+}
+
+#endif