����JFIF���������
__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
/*
* Libbpf legacy APIs (either discouraged or deprecated, as mentioned in [0])
*
* [0] https://docs.google.com/document/d/1UyjTZuPFWiPFyKk1tV5an11_iaRuec6U-ZESZ54nNTY
*
* Copyright (C) 2021 Facebook
*/
#ifndef __LIBBPF_LEGACY_BPF_H
#define __LIBBPF_LEGACY_BPF_H
#include <linux/bpf.h>
#include <stdbool.h>
#include <stddef.h>
#include <stdint.h>
#include "libbpf_common.h"
#ifdef __cplusplus
extern "C" {
#endif
/* As of libbpf 1.0 libbpf_set_strict_mode() and enum libbpf_struct_mode have
* no effect. But they are left in libbpf_legacy.h so that applications that
* prepared for libbpf 1.0 before final release by using
* libbpf_set_strict_mode() still work with libbpf 1.0+ without any changes.
*/
enum libbpf_strict_mode {
/* Turn on all supported strict features of libbpf to simulate libbpf
* v1.0 behavior.
* This will be the default behavior in libbpf v1.0.
*/
LIBBPF_STRICT_ALL = 0xffffffff,
/*
* Disable any libbpf 1.0 behaviors. This is the default before libbpf
* v1.0. It won't be supported anymore in v1.0, please update your
* code so that it handles LIBBPF_STRICT_ALL mode before libbpf v1.0.
*/
LIBBPF_STRICT_NONE = 0x00,
/*
* Return NULL pointers on error, not ERR_PTR(err).
* Additionally, libbpf also always sets errno to corresponding Exx
* (positive) error code.
*/
LIBBPF_STRICT_CLEAN_PTRS = 0x01,
/*
* Return actual error codes from low-level APIs directly, not just -1.
* Additionally, libbpf also always sets errno to corresponding Exx
* (positive) error code.
*/
LIBBPF_STRICT_DIRECT_ERRS = 0x02,
/*
* Enforce strict BPF program section (SEC()) names.
* E.g., while prefiously SEC("xdp_whatever") or SEC("perf_event_blah") were
* allowed, with LIBBPF_STRICT_SEC_PREFIX this will become
* unrecognized by libbpf and would have to be just SEC("xdp") and
* SEC("xdp") and SEC("perf_event").
*
* Note, in this mode the program pin path will be based on the
* function name instead of section name.
*
* Additionally, routines in the .text section are always considered
* sub-programs. Legacy behavior allows for a single routine in .text
* to be a program.
*/
LIBBPF_STRICT_SEC_NAME = 0x04,
/*
* Disable the global 'bpf_objects_list'. Maintaining this list adds
* a race condition to bpf_object__open() and bpf_object__close().
* Clients can maintain it on their own if it is valuable for them.
*/
LIBBPF_STRICT_NO_OBJECT_LIST = 0x08,
/*
* Automatically bump RLIMIT_MEMLOCK using setrlimit() before the
* first BPF program or map creation operation. This is done only if
* kernel is too old to support memcg-based memory accounting for BPF
* subsystem. By default, RLIMIT_MEMLOCK limit is set to RLIM_INFINITY,
* but it can be overridden with libbpf_set_memlock_rlim() API.
* Note that libbpf_set_memlock_rlim() needs to be called before
* the very first bpf_prog_load(), bpf_map_create() or bpf_object__load()
* operation.
*/
LIBBPF_STRICT_AUTO_RLIMIT_MEMLOCK = 0x10,
/*
* Error out on any SEC("maps") map definition, which are deprecated
* in favor of BTF-defined map definitions in SEC(".maps").
*/
LIBBPF_STRICT_MAP_DEFINITIONS = 0x20,
__LIBBPF_STRICT_LAST,
};
LIBBPF_API int libbpf_set_strict_mode(enum libbpf_strict_mode mode);
/**
* @brief **libbpf_get_error()** extracts the error code from the passed
* pointer
* @param ptr pointer returned from libbpf API function
* @return error code; or 0 if no error occurred
*
* Note, as of libbpf 1.0 this function is not necessary and not recommended
* to be used. Libbpf doesn't return error code embedded into the pointer
* itself. Instead, NULL is returned on error and error code is passed through
* thread-local errno variable. **libbpf_get_error()** is just returning -errno
* value if it receives NULL, which is correct only if errno hasn't been
* modified between libbpf API call and corresponding **libbpf_get_error()**
* call. Prefer to check return for NULL and use errno directly.
*
* This API is left in libbpf 1.0 to allow applications that were 1.0-ready
* before final libbpf 1.0 without needing to change them.
*/
LIBBPF_API long libbpf_get_error(const void *ptr);
#define DECLARE_LIBBPF_OPTS LIBBPF_OPTS
/* "Discouraged" APIs which don't follow consistent libbpf naming patterns.
* They are normally a trivial aliases or wrappers for proper APIs and are
* left to minimize unnecessary disruption for users of libbpf. But they
* shouldn't be used going forward.
*/
struct bpf_program;
struct bpf_map;
struct btf;
struct btf_ext;
LIBBPF_API struct btf *libbpf_find_kernel_btf(void);
LIBBPF_API enum bpf_prog_type bpf_program__get_type(const struct bpf_program *prog);
LIBBPF_API enum bpf_attach_type bpf_program__get_expected_attach_type(const struct bpf_program *prog);
LIBBPF_API const char *bpf_map__get_pin_path(const struct bpf_map *map);
LIBBPF_API const void *btf__get_raw_data(const struct btf *btf, __u32 *size);
LIBBPF_API const void *btf_ext__get_raw_data(const struct btf_ext *btf_ext, __u32 *size);
#ifdef __cplusplus
} /* extern "C" */
#endif
#endif /* __LIBBPF_LEGACY_BPF_H */
| Name | Type | Size | Permission | Actions |
|---|---|---|---|---|
| Build | File | 263 B | 0644 |
|
| Makefile | File | 10.9 KB | 0644 |
|
| bpf.c | File | 36.63 KB | 0644 |
|
| bpf.h | File | 24.87 KB | 0644 |
|
| bpf_core_read.h | File | 21.89 KB | 0644 |
|
| bpf_endian.h | File | 3.66 KB | 0644 |
|
| bpf_gen_internal.h | File | 2.17 KB | 0644 |
|
| bpf_helpers.h | File | 15.51 KB | 0644 |
|
| bpf_prog_linfo.c | File | 6.14 KB | 0644 |
|
| bpf_tracing.h | File | 32.87 KB | 0644 |
|
| btf.c | File | 142.89 KB | 0644 |
|
| btf.h | File | 19.99 KB | 0644 |
|
| btf_dump.c | File | 69.04 KB | 0644 |
|
| btf_iter.c | File | 4.05 KB | 0644 |
|
| btf_relocate.c | File | 14.32 KB | 0644 |
|
| elf.c | File | 13.48 KB | 0644 |
|
| features.c | File | 17.16 KB | 0644 |
|
| gen_loader.c | File | 37.52 KB | 0644 |
|
| hashmap.c | File | 4.92 KB | 0644 |
|
| hashmap.h | File | 6.74 KB | 0644 |
|
| libbpf.c | File | 375.66 KB | 0644 |
|
| libbpf.h | File | 73.26 KB | 0644 |
|
| libbpf.map | File | 8.86 KB | 0644 |
|
| libbpf.pc.template | File | 252 B | 0644 |
|
| libbpf_common.h | File | 3.36 KB | 0644 |
|
| libbpf_errno.c | File | 2.25 KB | 0644 |
|
| libbpf_internal.h | File | 19.59 KB | 0644 |
|
| libbpf_legacy.h | File | 5.07 KB | 0644 |
|
| libbpf_probes.c | File | 11.87 KB | 0644 |
|
| libbpf_version.h | File | 242 B | 0644 |
|
| linker.c | File | 76.81 KB | 0644 |
|
| netlink.c | File | 21.65 KB | 0644 |
|
| nlattr.c | File | 4.9 KB | 0644 |
|
| nlattr.h | File | 4.23 KB | 0644 |
|
| relo_core.c | File | 50.5 KB | 0644 |
|
| relo_core.h | File | 3.26 KB | 0644 |
|
| ringbuf.c | File | 15.86 KB | 0644 |
|
| skel_internal.h | File | 8.89 KB | 0644 |
|
| str_error.c | File | 1020 B | 0644 |
|
| str_error.h | File | 235 B | 0644 |
|
| strset.c | File | 4.28 KB | 0644 |
|
| strset.h | File | 586 B | 0644 |
|
| usdt.bpf.h | File | 8.31 KB | 0644 |
|
| usdt.c | File | 51.09 KB | 0644 |
|
| zip.c | File | 8.29 KB | 0644 |
|
| zip.h | File | 1.24 KB | 0644 |
|