* Enhanced decoding of getsockopt SO_ERROR option.
* Enhanced error diagnostics when the first exec fails.
* Added %net as a short form of %network in syscall specifications.
- * Updated lists of FAN_*, IFLA_*, NETLINK_*, SOL_*, and TCA_* constants.
+ * Updated lists of BPF_*, FAN_*, IFLA_*, NETLINK_*, SOL_*, and TCA_*
+ constants.
* Enhanced manual page.
* Bug fixes
},
{ /* 1 */
.data = { .BPF_PROG_LOAD_data = {
- .prog_type = 21,
+ .prog_type = 22,
.insn_cnt = 0xbadc0ded,
.insns = 0,
.license = 0,
.prog_flags = 0,
} },
.size = offsetofend(struct BPF_PROG_LOAD_struct, prog_flags),
- .str = "prog_type=0x15 /* BPF_PROG_TYPE_??? */"
+ .str = "prog_type=0x16 /* BPF_PROG_TYPE_??? */"
", insn_cnt=3134983661, insns=NULL, license=NULL"
", log_level=42, log_size=3141592653, log_buf=NULL"
", kern_version=KERNEL_VERSION(51966, 240, 13)"
{ /* 2 */
.data = { .BPF_PROG_QUERY_data = {
.target_fd = 3141592653U,
- .attach_type = 17,
+ .attach_type = 18,
.query_flags = 0xfffffffe,
.attach_flags = 0xfffffffc,
.prog_ids = 0xffffffffffffffffULL,
} },
.size = offsetofend(struct BPF_PROG_QUERY_struct, prog_cnt),
.str = "query={target_fd=-1153374643"
- ", attach_type=0x11 /* BPF_??? */"
+ ", attach_type=0x12 /* BPF_??? */"
", query_flags=0xfffffffe /* BPF_F_QUERY_??? */"
", attach_flags=0xfffffffc /* BPF_F_??? */"
", prog_ids="
print_bpf_attr(void)
{
#if XLAT_RAW
- printf("{prog_type=0x15"
+ printf("{prog_type=0x16"
#else
- printf("{prog_type=0x15 /* BPF_PROG_TYPE_??? */"
+ printf("{prog_type=0x16 /* BPF_PROG_TYPE_??? */"
#endif
", insn_cnt=3134983661"
", insns=NULL"
{
long ret;
struct BPF_PROG_LOAD_struct prog = {
- .prog_type = 21,
+ .prog_type = 22,
.insn_cnt = 0xbadc0ded,
.insns = 0,
.license = 0,