Home
last modified time | relevance | path

Searched refs:cls_bpf (Results 1 – 9 of 9) sorted by relevance

/Linux-v6.6/net/sched/
Dcls_bpf.c150 struct tc_cls_bpf_offload cls_bpf = {}; in cls_bpf_offload_cmd() local
158 tc_cls_common_offload_init(&cls_bpf.common, tp, obj->gen_flags, extack); in cls_bpf_offload_cmd()
159 cls_bpf.command = TC_CLSBPF_OFFLOAD; in cls_bpf_offload_cmd()
160 cls_bpf.exts = &obj->exts; in cls_bpf_offload_cmd()
161 cls_bpf.prog = prog ? prog->filter : NULL; in cls_bpf_offload_cmd()
162 cls_bpf.oldprog = oldprog ? oldprog->filter : NULL; in cls_bpf_offload_cmd()
163 cls_bpf.name = obj->bpf_name; in cls_bpf_offload_cmd()
164 cls_bpf.exts_integrated = obj->exts_integrated; in cls_bpf_offload_cmd()
167 err = tc_setup_cb_replace(block, tp, TC_SETUP_CLSBPF, &cls_bpf, in cls_bpf_offload_cmd()
173 err = tc_setup_cb_add(block, tp, TC_SETUP_CLSBPF, &cls_bpf, in cls_bpf_offload_cmd()
[all …]
DMakefile73 obj-$(CONFIG_NET_CLS_BPF) += cls_bpf.o
DKconfig546 be called cls_bpf.
/Linux-v6.6/drivers/net/ethernet/netronome/nfp/bpf/
Dmain.c108 struct tc_cls_bpf_offload *cls_bpf = type_data; in nfp_bpf_setup_tc_block_cb() local
115 NL_SET_ERR_MSG_MOD(cls_bpf->common.extack, in nfp_bpf_setup_tc_block_cb()
119 if (!tc_cls_can_offload_and_chain0(nn->dp.netdev, &cls_bpf->common)) in nfp_bpf_setup_tc_block_cb()
122 NL_SET_ERR_MSG_MOD(cls_bpf->common.extack, in nfp_bpf_setup_tc_block_cb()
126 if (cls_bpf->common.protocol != htons(ETH_P_ALL)) { in nfp_bpf_setup_tc_block_cb()
127 NL_SET_ERR_MSG_MOD(cls_bpf->common.extack, in nfp_bpf_setup_tc_block_cb()
133 if (!cls_bpf->exts_integrated || in nfp_bpf_setup_tc_block_cb()
134 tcf_exts_has_actions(cls_bpf->exts)) { in nfp_bpf_setup_tc_block_cb()
135 NL_SET_ERR_MSG_MOD(cls_bpf->common.extack, in nfp_bpf_setup_tc_block_cb()
140 if (cls_bpf->command != TC_CLSBPF_OFFLOAD) in nfp_bpf_setup_tc_block_cb()
[all …]
/Linux-v6.6/drivers/net/netdevsim/
Dbpf.c121 struct tc_cls_bpf_offload *cls_bpf = type_data; in nsim_bpf_setup_tc_block_cb() local
122 struct bpf_prog *prog = cls_bpf->prog; in nsim_bpf_setup_tc_block_cb()
127 NSIM_EA(cls_bpf->common.extack, in nsim_bpf_setup_tc_block_cb()
132 if (!tc_cls_can_offload_and_chain0(ns->netdev, &cls_bpf->common)) in nsim_bpf_setup_tc_block_cb()
135 if (cls_bpf->common.protocol != htons(ETH_P_ALL)) { in nsim_bpf_setup_tc_block_cb()
136 NSIM_EA(cls_bpf->common.extack, in nsim_bpf_setup_tc_block_cb()
142 NSIM_EA(cls_bpf->common.extack, in nsim_bpf_setup_tc_block_cb()
148 NSIM_EA(cls_bpf->common.extack, in nsim_bpf_setup_tc_block_cb()
153 if (cls_bpf->command != TC_CLSBPF_OFFLOAD) in nsim_bpf_setup_tc_block_cb()
156 oldprog = cls_bpf->oldprog; in nsim_bpf_setup_tc_block_cb()
[all …]
/Linux-v6.6/Documentation/networking/
Dfilter.rst56 in many more places. There's xt_bpf for netfilter, cls_bpf in the kernel
177 xt_bpf and cls_bpf users might have requirements that could result in
379 and cls_bpf understands and can directly be loaded with. Example with above
393 In particular, as usage with xt_bpf or cls_bpf can result in more complex BPF
638 includes seccomp BPF, classic socket filters, cls_bpf traffic classifier,
/Linux-v6.6/Documentation/bpf/
Dverifier.rst210 In cls_bpf and act_bpf programs the verifier allows direct access to the packet
Dbpf_devel_QA.rst298 A: For UAPI changes related to the XDP or tc layer (e.g. ``cls_bpf``),
/Linux-v6.6/
DMAINTAINERS3760 F: net/sched/cls_bpf.c
3817 F: net/sched/cls_bpf.c