aboutsummaryrefslogtreecommitdiffstats
path: root/scripts/bpf_helpers_doc.py
diff options
context:
space:
mode:
authorLorenzo Bianconi <[email protected]>2020-07-14 13:56:41 +0000
committerDaniel Borkmann <[email protected]>2020-07-16 15:00:32 +0000
commitce4dade7f12a8f3e7918184ac851d992f551805d (patch)
treee835407b974caae990b0cfbfab6adca49efb2184 /scripts/bpf_helpers_doc.py
parentlibbpf: Add SEC name for xdp programs attached to CPUMAP (diff)
downloadkernel-ce4dade7f12a8f3e7918184ac851d992f551805d.tar.gz
kernel-ce4dade7f12a8f3e7918184ac851d992f551805d.zip
samples/bpf: xdp_redirect_cpu: Load a eBPF program on cpumap
Extend xdp_redirect_cpu_{usr,kern}.c adding the possibility to load a XDP program on cpumap entries. The following options have been added: - mprog-name: cpumap entry program name - mprog-filename: cpumap entry program filename - redirect-device: output interface if the cpumap program performs a XDP_REDIRECT to an egress interface - redirect-map: bpf map used to perform XDP_REDIRECT to an egress interface - mprog-disable: disable loading XDP program on cpumap entries Add xdp_pass, xdp_drop, xdp_redirect stats accounting Co-developed-by: Jesper Dangaard Brouer <[email protected]> Signed-off-by: Jesper Dangaard Brouer <[email protected]> Signed-off-by: Lorenzo Bianconi <[email protected]> Signed-off-by: Daniel Borkmann <[email protected]> Link: https://lore.kernel.org/bpf/aa5a9a281b9dac425620fdabe82670ffb6bbdb92.1594734381.git.lorenzo@kernel.org
Diffstat (limited to 'scripts/bpf_helpers_doc.py')
0 files changed, 0 insertions, 0 deletions