lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 17 Nov 2016 09:28:00 +0800 From: "Wangnan (F)" <wangnan0@...wei.com> To: Joe Stringer <joe@....org>, <linux-kernel@...r.kernel.org> CC: <netdev@...r.kernel.org>, <ast@...com>, <daniel@...earbox.net>, <acme@...nel.org> Subject: Re: [PATCHv2 perf/core 1/2] tools lib bpf: Sync {tools,}/include/uapi/linux/bpf.h On 2016/11/17 1:43, Joe Stringer wrote: > The tools version of this header is out of date; update it to the latest > version from the kernel headers. > > Signed-off-by: Joe Stringer <joe@....org> > --- > v2: No change. > --- > tools/include/uapi/linux/bpf.h | 51 ++++++++++++++++++++++++++++++++++++++++++ > 1 file changed, 51 insertions(+) Acked-by: Wang Nan <wangnan0@...wei.com> > diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h > index 9e5fc168c8a3..f09c70b97eca 100644 > --- a/tools/include/uapi/linux/bpf.h > +++ b/tools/include/uapi/linux/bpf.h > @@ -95,6 +95,7 @@ enum bpf_prog_type { > BPF_PROG_TYPE_SCHED_ACT, > BPF_PROG_TYPE_TRACEPOINT, > BPF_PROG_TYPE_XDP, > + BPF_PROG_TYPE_PERF_EVENT, > }; > > #define BPF_PSEUDO_MAP_FD 1 > @@ -375,6 +376,56 @@ enum bpf_func_id { > */ > BPF_FUNC_probe_write_user, > > + /** > + * bpf_current_task_under_cgroup(map, index) - Check cgroup2 membership of current task > + * @map: pointer to bpf_map in BPF_MAP_TYPE_CGROUP_ARRAY type > + * @index: index of the cgroup in the bpf_map > + * Return: > + * == 0 current failed the cgroup2 descendant test > + * == 1 current succeeded the cgroup2 descendant test > + * < 0 error > + */ > + BPF_FUNC_current_task_under_cgroup, > + > + /** > + * bpf_skb_change_tail(skb, len, flags) > + * The helper will resize the skb to the given new size, > + * to be used f.e. with control messages. > + * @skb: pointer to skb > + * @len: new skb length > + * @flags: reserved > + * Return: 0 on success or negative error > + */ > + BPF_FUNC_skb_change_tail, > + > + /** > + * bpf_skb_pull_data(skb, len) > + * The helper will pull in non-linear data in case the > + * skb is non-linear and not all of len are part of the > + * linear section. Only needed for read/write with direct > + * packet access. > + * @skb: pointer to skb > + * @len: len to make read/writeable > + * Return: 0 on success or negative error > + */ > + BPF_FUNC_skb_pull_data, > + > + /** > + * bpf_csum_update(skb, csum) > + * Adds csum into skb->csum in case of CHECKSUM_COMPLETE. > + * @skb: pointer to skb > + * @csum: csum to add > + * Return: csum on success or negative error > + */ > + BPF_FUNC_csum_update, > + > + /** > + * bpf_set_hash_invalid(skb) > + * Invalidate current skb>hash. > + * @skb: pointer to skb > + */ > + BPF_FUNC_set_hash_invalid, > + > __BPF_FUNC_MAX_ID, > }; >
Powered by blists - more mailing lists