You need to sign in or sign up before continuing.
提交 ed2f9cb2 编写于 作者: A Alexei Starovoitov 提交者: Zheng Zengkai

libbpf: Support for syscall program type

mainline inclusion
from mainline-5.14-rc1
commit 5452fc9a
category: feature
bugzilla: https://gitee.com/openeuler/kernel/issues/I5EUVD
CVE: NA

Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5452fc9a17fc26816a683ab04cf1c29131ca27e4

-------------------------------------------------

Trivial support for syscall program type.
Signed-off-by: NAlexei Starovoitov <ast@kernel.org>
Signed-off-by: NDaniel Borkmann <daniel@iogearbox.net>
Acked-by: NAndrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/20210514003623.28033-5-alexei.starovoitov@gmail.com
(cherry picked from commit 5452fc9a)
Signed-off-by: NWang Yufen <wangyufen@huawei.com>

Conflicts:
	tools/lib/bpf/libbpf.c
Signed-off-by: NWang Yufen <wangyufen@huawei.com>
上级 1752e668
...@@ -8972,6 +8972,8 @@ static const struct bpf_sec_def section_defs[] = { ...@@ -8972,6 +8972,8 @@ static const struct bpf_sec_def section_defs[] = {
.is_attach_btf = true, .is_attach_btf = true,
.expected_attach_type = BPF_SCHED, .expected_attach_type = BPF_SCHED,
.attach_fn = attach_sched), .attach_fn = attach_sched),
SEC_DEF("syscall", SYSCALL,
.is_sleepable = true),
BPF_EAPROG_SEC("xdp_devmap/", BPF_PROG_TYPE_XDP, BPF_EAPROG_SEC("xdp_devmap/", BPF_PROG_TYPE_XDP,
BPF_XDP_DEVMAP), BPF_XDP_DEVMAP),
BPF_EAPROG_SEC("xdp_cpumap/", BPF_PROG_TYPE_XDP, BPF_EAPROG_SEC("xdp_cpumap/", BPF_PROG_TYPE_XDP,
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册