[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190322223848.3338614-3-javierhonduco@fb.com>
Date: Fri, 22 Mar 2019 15:38:47 -0700
From: Javier Honduvilla Coto <javierhonduco@...com>
To: <netdev@...r.kernel.org>
CC: <yhs@...com>, <kernel-team@...com>
Subject: [PATCH v4 bpf-next 2/3] bpf: sync kernel uapi headers
Sync kernel uapi headers.
Signed-off-by: Javier Honduvilla Coto <javierhonduco@...com>
---
tools/include/uapi/linux/bpf.h | 10 +++++++++-
1 file changed, 9 insertions(+), 1 deletion(-)
diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h
index 3c04410137d9..cf54cc739bf4 100644
--- a/tools/include/uapi/linux/bpf.h
+++ b/tools/include/uapi/linux/bpf.h
@@ -2463,6 +2463,13 @@ union bpf_attr {
* Return
* 0 if iph and th are a valid SYN cookie ACK, or a negative error
* otherwise.
+ * int bpf_progenyof(int pid)
+ * Description
+ * This helper is useful in programs that want to filter events
+ * happening to a pid of any of its descendants.
+ * Return
+ * 1 if the currently executing process' pid is in the process
+ * hierarchy of the passed pid. 0 Otherwise.
*/
#define __BPF_FUNC_MAPPER(FN) \
FN(unspec), \
@@ -2565,7 +2572,8 @@ union bpf_attr {
FN(skb_ecn_set_ce), \
FN(get_listener_sock), \
FN(skc_lookup_tcp), \
- FN(tcp_check_syncookie),
+ FN(tcp_check_syncookie), \
+ FN(progenyof),
/* integer value in 'imm' field of BPF_CALL instruction selects which helper
* function eBPF program intends to call
--
2.17.1
Powered by blists - more mailing lists