[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190410203631.1576576-3-javierhonduco@fb.com>
Date: Wed, 10 Apr 2019 13:36:30 -0700
From: Javier Honduvilla Coto <javierhonduco@...com>
To: <netdev@...r.kernel.org>
CC: <yhs@...com>, <kernel-team@...com>
Subject: [PATCH v5 bpf-next 2/3] bpf: sync kernel uapi headers
Sync kernel uapi headers.
Signed-off-by: Javier Honduvilla Coto <javierhonduco@...com>
---
tools/include/uapi/linux/bpf.h | 10 +++++++++-
1 file changed, 9 insertions(+), 1 deletion(-)
diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h
index af1cbd951f26..f707b286c21d 100644
--- a/tools/include/uapi/linux/bpf.h
+++ b/tools/include/uapi/linux/bpf.h
@@ -2493,6 +2493,13 @@ union bpf_attr {
* Return
* 0 if iph and th are a valid SYN cookie ACK, or a negative error
* otherwise.
+ * int bpf_descendant_of(pid_t pid)
+ * Description
+ * This helper is useful in programs that want to filter events
+ * happening to a pid or to any of its descendants.
+ * Return
+ * 1 if the passed pid is an ancestor of the currently executing
+ * process' pid or equal to it.
*/
#define __BPF_FUNC_MAPPER(FN) \
FN(unspec), \
@@ -2595,7 +2602,8 @@ union bpf_attr {
FN(skb_ecn_set_ce), \
FN(get_listener_sock), \
FN(skc_lookup_tcp), \
- FN(tcp_check_syncookie),
+ FN(tcp_check_syncookie), \
+ FN(descendant_of),
/* integer value in 'imm' field of BPF_CALL instruction selects which helper
* function eBPF program intends to call
--
2.17.1
Powered by blists - more mailing lists