mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-09-13 22:25:03 +00:00
6f52b16c5b
Many user space API headers are missing licensing information, which makes it hard for compliance tools to determine the correct license. By default are files without license information under the default license of the kernel, which is GPLV2. Marking them GPLV2 would exclude them from being included in non GPLV2 code, which is obviously not intended. The user space API headers fall under the syscall exception which is in the kernels COPYING file: NOTE! This copyright does *not* cover user programs that use kernel services by normal system calls - this is merely considered normal use of the kernel, and does *not* fall under the heading of "derived work". otherwise syscall usage would not be possible. Update the files which contain no license information with an SPDX license identifier. The chosen identifier is 'GPL-2.0 WITH Linux-syscall-note' which is the officially assigned identifier for the Linux syscall exception. SPDX license identifiers are a legally binding shorthand, which can be used instead of the full boiler plate text. This patch is based on work done by Thomas Gleixner and Kate Stewart and Philippe Ombredanne. See the previous patch in this series for the methodology of how this patch was researched. Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org> Reviewed-by: Philippe Ombredanne <pombredanne@nexb.com> Reviewed-by: Thomas Gleixner <tglx@linutronix.de> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
42 lines
935 B
C
42 lines
935 B
C
/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
|
|
#ifndef _XT_BPF_H
|
|
#define _XT_BPF_H
|
|
|
|
#include <linux/filter.h>
|
|
#include <linux/limits.h>
|
|
#include <linux/types.h>
|
|
|
|
#define XT_BPF_MAX_NUM_INSTR 64
|
|
#define XT_BPF_PATH_MAX (XT_BPF_MAX_NUM_INSTR * sizeof(struct sock_filter))
|
|
|
|
struct bpf_prog;
|
|
|
|
struct xt_bpf_info {
|
|
__u16 bpf_program_num_elem;
|
|
struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR];
|
|
|
|
/* only used in the kernel */
|
|
struct bpf_prog *filter __attribute__((aligned(8)));
|
|
};
|
|
|
|
enum xt_bpf_modes {
|
|
XT_BPF_MODE_BYTECODE,
|
|
XT_BPF_MODE_FD_PINNED,
|
|
XT_BPF_MODE_FD_ELF,
|
|
};
|
|
#define XT_BPF_MODE_PATH_PINNED XT_BPF_MODE_FD_PINNED
|
|
|
|
struct xt_bpf_info_v1 {
|
|
__u16 mode;
|
|
__u16 bpf_program_num_elem;
|
|
__s32 fd;
|
|
union {
|
|
struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR];
|
|
char path[XT_BPF_PATH_MAX];
|
|
};
|
|
|
|
/* only used in the kernel */
|
|
struct bpf_prog *filter __attribute__((aligned(8)));
|
|
};
|
|
|
|
#endif /*_XT_BPF_H */
|