[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190301180614.4134278-3-javierhonduco@fb.com>
Date: Fri, 1 Mar 2019 10:06:13 -0800
From: Javier Honduvilla Coto <javierhonduco@...com>
To: <netdev@...r.kernel.org>
CC: <yhs@...com>, <kernel-team@...com>,
Javier Honduvilla Coto <javierhonduco@...il.com>
Subject: [PATCH v2 bpf-next 2/3] bpf: sync kernel uapi headers
From: Javier Honduvilla Coto <javierhonduco@...il.com>
Sync kernel uapi headers.
Signed-off-by: Javier Honduvilla Coto <javierhonduco@...il.com>
---
tools/include/uapi/linux/bpf.h | 11 ++++++++++-
1 file changed, 10 insertions(+), 1 deletion(-)
diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h
index bcdd2474eee7..354ec295864c 100644
--- a/tools/include/uapi/linux/bpf.h
+++ b/tools/include/uapi/linux/bpf.h
@@ -2359,6 +2359,14 @@ union bpf_attr {
* Return
* A **struct bpf_tcp_sock** pointer on success, or NULL in
* case of failure.
+ *
+ * int bpf_progenyof(int pid)
+ * Description
+ * This helper is useful in programs that want to filter events
+ * happening to a pid of any of its descendants.
+ * Return
+ * 1 if the currently executing process' pid is in the process
+ * hierarchy of the passed pid. 0 Otherwise.
*/
#define __BPF_FUNC_MAPPER(FN) \
FN(unspec), \
@@ -2457,7 +2465,8 @@ union bpf_attr {
FN(spin_lock), \
FN(spin_unlock), \
FN(sk_fullsock), \
- FN(tcp_sock),
+ FN(tcp_sock), \
+ FN(progenyof),
/* integer value in 'imm' field of BPF_CALL instruction selects which helper
* function eBPF program intends to call
--
2.17.1
Powered by blists - more mailing lists