[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190710180025.94726-3-javierhonduco@fb.com>
Date: Wed, 10 Jul 2019 11:00:24 -0700
From: Javier Honduvilla Coto <javierhonduco@...com>
To: <netdev@...r.kernel.org>
CC: <yhs@...com>, <kernel-team@...com>, <jonhaslam@...com>
Subject: [PATCH v6 bpf-next 2/3] bpf: sync kernel uapi headers
Sync kernel uapi headers.
Signed-off-by: Javier Honduvilla Coto <javierhonduco@...com>
---
tools/include/uapi/linux/bpf.h | 20 +++++++++++++++++++-
1 file changed, 19 insertions(+), 1 deletion(-)
diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h
index 402208581b2d..505ee91898c2 100644
--- a/tools/include/uapi/linux/bpf.h
+++ b/tools/include/uapi/linux/bpf.h
@@ -2710,6 +2710,23 @@ union bpf_attr {
* **-EPERM** if no permission to send the *sig*.
*
* **-EAGAIN** if bpf program can try again.
+ *
+ * int bpf_descendant_of(pid_t pid)
+ * Description
+ * Determine if the process identified by *pid* is an ancestor
+ * (or equal) of the user process executed in this tracing
+ * context. This is useful when filtering events happening
+ * to a process and all of its descendants.
+ *
+ * Note that *pid* must be the pid from the global namespace
+ * as the pids of the process chain will be resolved using the
+ * initial pid namespace viewer context.
+ * Return
+ * * 1 if the process identified by *pid* is an ancestor, or equal,
+ * of the currently executing process within the global pid
+ * namespace
+ *
+ * * 0 otherwise.
*/
#define __BPF_FUNC_MAPPER(FN) \
FN(unspec), \
@@ -2821,7 +2838,8 @@ union bpf_attr {
FN(strtoul), \
FN(sk_storage_get), \
FN(sk_storage_delete), \
- FN(send_signal),
+ FN(send_signal), \
+ FN(descendant_of),
/* integer value in 'imm' field of BPF_CALL instruction selects which helper
* function eBPF program intends to call
--
2.17.1
Powered by blists - more mailing lists