lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20190301180614.4134278-3-javierhonduco@fb.com> Date: Fri, 1 Mar 2019 10:06:13 -0800 From: Javier Honduvilla Coto <javierhonduco@...com> To: <netdev@...r.kernel.org> CC: <yhs@...com>, <kernel-team@...com>, Javier Honduvilla Coto <javierhonduco@...il.com> Subject: [PATCH v2 bpf-next 2/3] bpf: sync kernel uapi headers From: Javier Honduvilla Coto <javierhonduco@...il.com> Sync kernel uapi headers. Signed-off-by: Javier Honduvilla Coto <javierhonduco@...il.com> --- tools/include/uapi/linux/bpf.h | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h index bcdd2474eee7..354ec295864c 100644 --- a/tools/include/uapi/linux/bpf.h +++ b/tools/include/uapi/linux/bpf.h @@ -2359,6 +2359,14 @@ union bpf_attr { * Return * A **struct bpf_tcp_sock** pointer on success, or NULL in * case of failure. + * + * int bpf_progenyof(int pid) + * Description + * This helper is useful in programs that want to filter events + * happening to a pid of any of its descendants. + * Return + * 1 if the currently executing process' pid is in the process + * hierarchy of the passed pid. 0 Otherwise. */ #define __BPF_FUNC_MAPPER(FN) \ FN(unspec), \ @@ -2457,7 +2465,8 @@ union bpf_attr { FN(spin_lock), \ FN(spin_unlock), \ FN(sk_fullsock), \ - FN(tcp_sock), + FN(tcp_sock), \ + FN(progenyof), /* integer value in 'imm' field of BPF_CALL instruction selects which helper * function eBPF program intends to call -- 2.17.1
Powered by blists - more mailing lists