Searched refs:BPF_F_INGRESS (Results 1 – 13 of 13) sorted by relevance
/linux/tools/testing/selftests/bpf/progs/ |
H A D | empty_skb.c | 14 ret = bpf_clone_redirect(skb, ifindex, BPF_F_INGRESS); in redirect_ingress() 28 ret = bpf_clone_redirect(skb, ifindex, BPF_F_INGRESS); in tc_redirect_ingress()
|
H A D | test_lwt_redirect.c | 51 return bpf_redirect(target, BPF_F_INGRESS); in test_lwt_redirect_in() 87 return bpf_redirect(target, BPF_F_INGRESS); in test_lwt_redirect_in_nomac()
|
H A D | test_sockmap_listen.c | 89 test_ingress ? BPF_F_INGRESS : 0); in prog_skb_verdict() 92 test_ingress ? BPF_F_INGRESS : 0); in prog_skb_verdict()
|
H A D | test_cls_redirect.c | 399 return bpf_redirect(skb->ifindex, BPF_F_INGRESS); in accept_locally()
|
H A D | test_cls_redirect_dynptr.c | 290 return bpf_redirect(skb->ifindex, BPF_F_INGRESS); in accept_locally()
|
/linux/include/linux/ |
H A D | skmsg.h | 238 return msg->flags & BPF_F_INGRESS; in sk_msg_to_ingress() 529 #define BPF_F_PTR_MASK ~(BPF_F_INGRESS | BPF_F_STRPARSER) 547 return sk_redir & BPF_F_INGRESS; in skb_bpf_ingress() 552 skb->_sk_redir |= BPF_F_INGRESS; in skb_bpf_set_ingress() 560 skb->_sk_redir |= BPF_F_INGRESS; in skb_bpf_set_redir()
|
/linux/net/core/ |
H A D | sock_map.c | 650 if (unlikely(flags & ~(BPF_F_INGRESS))) in BPF_CALL_4() 656 if ((flags & BPF_F_INGRESS) && sk_is_vsock(sk)) in BPF_CALL_4() 659 skb_bpf_set_redir(skb, sk, flags & BPF_F_INGRESS); in BPF_CALL_4() 678 if (unlikely(flags & ~(BPF_F_INGRESS))) in BPF_CALL_4() 684 if (!(flags & BPF_F_INGRESS) && !sk_is_tcp(sk)) in BPF_CALL_4() 1256 if (unlikely(flags & ~(BPF_F_INGRESS))) in BPF_CALL_4() 1262 if ((flags & BPF_F_INGRESS) && sk_is_vsock(sk)) in BPF_CALL_4() 1265 skb_bpf_set_redir(skb, sk, flags & BPF_F_INGRESS); in BPF_CALL_4() 1284 if (unlikely(flags & ~(BPF_F_INGRESS))) in BPF_CALL_4() 1290 if (!(flags & BPF_F_INGRESS) && !sk_is_tcp(sk)) in BPF_CALL_4()
|
H A D | filter.c | 2164 return flags & BPF_F_INGRESS ? in __bpf_redirect_no_mac() 2178 return flags & BPF_F_INGRESS ? in __bpf_redirect_common() 2438 if (unlikely(flags & (~(BPF_F_INGRESS) | BPF_F_REDIRECT_INTERNAL))) in BPF_CALL_3() 2519 if (unlikely(flags & (~(BPF_F_INGRESS) | BPF_F_REDIRECT_INTERNAL))) in BPF_CALL_2()
|
/linux/tools/testing/selftests/net/ |
H A D | nat6to4.bpf.c | 146 return bpf_redirect(skb->ifindex, BPF_F_INGRESS); in sched_cls_ingress6_nat_6_prog()
|
/linux/Documentation/bpf/ |
H A D | map_sockmap.rst | 93 can be used for redirection. The ``BPF_F_INGRESS`` value in ``flags`` is used 107 can be used for redirection. The ``BPF_F_INGRESS`` value in ``flags`` is used 173 interfaces can be used for redirection. The ``BPF_F_INGRESS`` value in 189 interfaces can be used for redirection. The ``BPF_F_INGRESS`` value in
|
/linux/tools/testing/selftests/bpf/ |
H A D | test_sockmap.c | 1262 int in = BPF_F_INGRESS; in run_options() 1295 int ingress = BPF_F_INGRESS; in run_options() 1325 int ingress = BPF_F_INGRESS; in run_options()
|
/linux/include/uapi/linux/ |
H A D | bpf.h | 6210 BPF_F_INGRESS = (1ULL << 0), /* used for skb path */ enumerator 6213 #define BPF_F_REDIRECT_FLAGS (BPF_F_INGRESS | BPF_F_BROADCAST | BPF_F_EXCLUDE_INGRESS)
|
/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 6210 BPF_F_INGRESS = (1ULL << 0), /* used for skb path */ enumerator 6213 #define BPF_F_REDIRECT_FLAGS (BPF_F_INGRESS | BPF_F_BROADCAST | BPF_F_EXCLUDE_INGRESS)
|