diff options
| author | David S. Miller <davem@davemloft.net> | 2019-06-20 00:06:27 -0400 | 
|---|---|---|
| committer | David S. Miller <davem@davemloft.net> | 2019-06-20 00:06:27 -0400 | 
| commit | dca73a65a68329ee386d3ff473152bac66eaab39 (patch) | |
| tree | 97c41afb932bdd6cbe67e7ffc38bfe5952c97798 /tools/include/uapi/linux/bpf.h | |
| parent | 497ad9f5b2dc86b733761b9afa44ecfa2f17be65 (diff) | |
| parent | 94079b64255fe40b9b53fd2e4081f68b9b14f54a (diff) | |
| download | blackbird-op-linux-dca73a65a68329ee386d3ff473152bac66eaab39.tar.gz blackbird-op-linux-dca73a65a68329ee386d3ff473152bac66eaab39.zip  | |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next
Alexei Starovoitov says:
====================
pull-request: bpf-next 2019-06-19
The following pull-request contains BPF updates for your *net-next* tree.
The main changes are:
1) new SO_REUSEPORT_DETACH_BPF setsocktopt, from Martin.
2) BTF based map definition, from Andrii.
3) support bpf_map_lookup_elem for xskmap, from Jonathan.
4) bounded loops and scalar precision logic in the verifier, from Alexei.
====================
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'tools/include/uapi/linux/bpf.h')
| -rw-r--r-- | tools/include/uapi/linux/bpf.h | 6 | 
1 files changed, 6 insertions, 0 deletions
diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h index 0e879721f75a..b077507efa3f 100644 --- a/tools/include/uapi/linux/bpf.h +++ b/tools/include/uapi/linux/bpf.h @@ -3085,6 +3085,10 @@ struct bpf_sock_tuple {  	};  }; +struct bpf_xdp_sock { +	__u32 queue_id; +}; +  #define XDP_PACKET_HEADROOM 256  /* User return codes for XDP prog type. @@ -3245,6 +3249,7 @@ struct bpf_sock_addr {  	__u32 msg_src_ip6[4];	/* Allows 1,2,4-byte read an 4-byte write.  				 * Stored in network byte order.  				 */ +	__bpf_md_ptr(struct bpf_sock *, sk);  };  /* User bpf_sock_ops struct to access socket values and specify request ops @@ -3296,6 +3301,7 @@ struct bpf_sock_ops {  	__u32 sk_txhash;  	__u64 bytes_received;  	__u64 bytes_acked; +	__bpf_md_ptr(struct bpf_sock *, sk);  };  /* Definitions for bpf_sock_ops_cb_flags */  | 

