diff options
| author | Lorenzo Bianconi <[email protected]> | 2020-07-14 13:56:41 +0000 |
|---|---|---|
| committer | Daniel Borkmann <[email protected]> | 2020-07-16 15:00:32 +0000 |
| commit | ce4dade7f12a8f3e7918184ac851d992f551805d (patch) | |
| tree | e835407b974caae990b0cfbfab6adca49efb2184 /scripts/bpf_helpers_doc.py | |
| parent | libbpf: Add SEC name for xdp programs attached to CPUMAP (diff) | |
| download | kernel-ce4dade7f12a8f3e7918184ac851d992f551805d.tar.gz kernel-ce4dade7f12a8f3e7918184ac851d992f551805d.zip | |
samples/bpf: xdp_redirect_cpu: Load a eBPF program on cpumap
Extend xdp_redirect_cpu_{usr,kern}.c adding the possibility to load
a XDP program on cpumap entries. The following options have been added:
- mprog-name: cpumap entry program name
- mprog-filename: cpumap entry program filename
- redirect-device: output interface if the cpumap program performs a
XDP_REDIRECT to an egress interface
- redirect-map: bpf map used to perform XDP_REDIRECT to an egress
interface
- mprog-disable: disable loading XDP program on cpumap entries
Add xdp_pass, xdp_drop, xdp_redirect stats accounting
Co-developed-by: Jesper Dangaard Brouer <[email protected]>
Signed-off-by: Jesper Dangaard Brouer <[email protected]>
Signed-off-by: Lorenzo Bianconi <[email protected]>
Signed-off-by: Daniel Borkmann <[email protected]>
Link: https://lore.kernel.org/bpf/aa5a9a281b9dac425620fdabe82670ffb6bbdb92.1594734381.git.lorenzo@kernel.org
Diffstat (limited to 'scripts/bpf_helpers_doc.py')
0 files changed, 0 insertions, 0 deletions
