From patchwork Tue Sep 10 11:55:16 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: KP Singh X-Patchwork-Id: 11139303 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 0302E76 for ; Tue, 10 Sep 2019 11:57:38 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id D58032084D for ; Tue, 10 Sep 2019 11:57:37 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="U2yeuy49" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731926AbfIJL4b (ORCPT ); Tue, 10 Sep 2019 07:56:31 -0400 Received: from mail-wr1-f65.google.com ([209.85.221.65]:36036 "EHLO mail-wr1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730510AbfIJL42 (ORCPT ); Tue, 10 Sep 2019 07:56:28 -0400 Received: by mail-wr1-f65.google.com with SMTP id y19so19628213wrd.3 for ; Tue, 10 Sep 2019 04:56:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=erwaox0KQegjEF70k5TnX2qoDQuWlO/oZz7eu2CybDk=; b=U2yeuy49oz2xrU00CSc0L8N5m7pK1clPrglgIMpG4rwgHeb78qd5OYUi+5Q7cHdFdC XxpH8vL5J5D5B50U8ksPia+n2rOTT3Efl9AwBmd+S3oN5n1wwszlZixPpAUvXef3tmqJ lxvRnOTGcuHYY2hfs0yzy76NJ53p+Zmof1EQ8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=erwaox0KQegjEF70k5TnX2qoDQuWlO/oZz7eu2CybDk=; b=uTyvtmeE1daNl/pAgT6uurUcql+PS3Tbf0ghyVpdpdXtk5eLHWDK0P+EI0Mz14/z9u iYOvXt51WmzTvc0VL+4TRWBDndm/J0t+a08ln4N7su9Q6XFUHqDxRlTdIYNXZcGCwvRt kbhLNjTrG1iBqCcyVllXq3S5PwV5cHwr+vKHnvDS4nAN2u03Yud55CrzJOPqjFu7SZ6I uhXXRG/LlnZe7ylC4NyN3NCF5qD9PS13g+xXLxAM9xQVCl/tNAdSNopNApusc3rzx48J sSwfDU6UaX9mWhKj521XmtTLcrYZKPvU9mgmA/keHbzMM2O+o4Su8BPpoyop/g2KTfqt cYJg== X-Gm-Message-State: APjAAAUNdh9ACW1/7Ra0PoankMjlVWsVkYRSFjYEehKWrBMrpXERT+1V 0wcWKubt7ZDivMk1nJZqaX7Qww== X-Google-Smtp-Source: APXvYqwezaTQauLlYnnq67hLlLJ4sDXlgLRoqeO6CL/e/dXjtdzUMWZO0oPgM5a7vUghEl33WTHJVw== X-Received: by 2002:adf:e947:: with SMTP id m7mr26845791wrn.178.1568116586919; Tue, 10 Sep 2019 04:56:26 -0700 (PDT) Received: from kpsingh-kernel.c.hoisthospitality.com (110.8.30.213.rev.vodafone.pt. [213.30.8.110]) by smtp.gmail.com with ESMTPSA id q19sm23732935wra.89.2019.09.10.04.56.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Sep 2019 04:56:26 -0700 (PDT) From: KP Singh To: linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-security-module@vger.kernel.org Cc: Alexei Starovoitov , Daniel Borkmann , James Morris , Kees Cook , Thomas Garnier , Michael Halcrow , Paul Turner , Brendan Gregg , Jann Horn , Matthew Garrett , Christian Brauner , =?utf-8?q?Micka=C3=ABl_Sala=C3=BCn?= , Florent Revest , Martin KaFai Lau , Song Liu , Yonghong Song , "Serge E. Hallyn" , Mauro Carvalho Chehab , "David S. Miller" , Greg Kroah-Hartman , Nicolas Ferre , Stanislav Fomichev , Quentin Monnet , Andrey Ignatov , Joe Stringer Subject: [RFC v1 03/14] bpf: krsi: sync BPF UAPI header with tools Date: Tue, 10 Sep 2019 13:55:16 +0200 Message-Id: <20190910115527.5235-4-kpsingh@chromium.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190910115527.5235-1-kpsingh@chromium.org> References: <20190910115527.5235-1-kpsingh@chromium.org> MIME-Version: 1.0 Sender: owner-linux-security-module@vger.kernel.org Precedence: bulk List-ID: From: KP Singh Signed-off-by: KP Singh --- tools/include/uapi/linux/bpf.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h index a5aa7d3ac6a1..32ab38f1a2fe 100644 --- a/tools/include/uapi/linux/bpf.h +++ b/tools/include/uapi/linux/bpf.h @@ -171,6 +171,7 @@ enum bpf_prog_type { BPF_PROG_TYPE_CGROUP_SYSCTL, BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE, BPF_PROG_TYPE_CGROUP_SOCKOPT, + BPF_PROG_TYPE_KRSI, }; enum bpf_attach_type { @@ -197,6 +198,7 @@ enum bpf_attach_type { BPF_CGROUP_UDP6_RECVMSG, BPF_CGROUP_GETSOCKOPT, BPF_CGROUP_SETSOCKOPT, + BPF_KRSI, __MAX_BPF_ATTACH_TYPE };