Searched refs:BPF_F_INGRESS (Results 1 – 14 of 14) sorted by relevance
/Linux-v6.6/tools/testing/selftests/bpf/progs/ |
D | empty_skb.c | 14 ret = bpf_clone_redirect(skb, ifindex, BPF_F_INGRESS); in redirect_ingress() 28 ret = bpf_clone_redirect(skb, ifindex, BPF_F_INGRESS); in tc_redirect_ingress()
|
D | test_lwt_redirect.c | 51 return bpf_redirect(target, BPF_F_INGRESS); in test_lwt_redirect_in() 87 return bpf_redirect(target, BPF_F_INGRESS); in test_lwt_redirect_in_nomac()
|
D | test_sockmap_listen.c | 82 test_ingress ? BPF_F_INGRESS : 0); in prog_skb_verdict() 85 test_ingress ? BPF_F_INGRESS : 0); in prog_skb_verdict()
|
D | test_cls_redirect.c | 396 return bpf_redirect(skb->ifindex, BPF_F_INGRESS); in accept_locally()
|
D | test_cls_redirect_dynptr.c | 288 return bpf_redirect(skb->ifindex, BPF_F_INGRESS); in accept_locally()
|
/Linux-v6.6/include/linux/ |
D | skmsg.h | 226 return msg->flags & BPF_F_INGRESS; in sk_msg_to_ingress() 513 #define BPF_F_PTR_MASK ~(BPF_F_INGRESS | BPF_F_STRPARSER) 531 return sk_redir & BPF_F_INGRESS; in skb_bpf_ingress() 536 skb->_sk_redir |= BPF_F_INGRESS; in skb_bpf_set_ingress() 544 skb->_sk_redir |= BPF_F_INGRESS; in skb_bpf_set_redir()
|
/Linux-v6.6/samples/bpf/ |
D | tc_l2_redirect_kern.c | 88 return bpf_redirect(*ifindex, BPF_F_INGRESS); in _l2_to_iptun_ingress_forward() 103 return bpf_redirect(*ifindex, BPF_F_INGRESS); in _l2_to_iptun_ingress_forward()
|
/Linux-v6.6/net/core/ |
D | sock_map.c | 639 if (unlikely(flags & ~(BPF_F_INGRESS))) in BPF_CALL_4() 646 skb_bpf_set_redir(skb, sk, flags & BPF_F_INGRESS); in BPF_CALL_4() 665 if (unlikely(flags & ~(BPF_F_INGRESS))) in BPF_CALL_4() 671 if (!(flags & BPF_F_INGRESS) && !sk_is_tcp(sk)) in BPF_CALL_4() 1240 if (unlikely(flags & ~(BPF_F_INGRESS))) in BPF_CALL_4() 1247 skb_bpf_set_redir(skb, sk, flags & BPF_F_INGRESS); in BPF_CALL_4() 1266 if (unlikely(flags & ~(BPF_F_INGRESS))) in BPF_CALL_4() 1272 if (!(flags & BPF_F_INGRESS) && !sk_is_tcp(sk)) in BPF_CALL_4()
|
D | filter.c | 2158 return flags & BPF_F_INGRESS ? in __bpf_redirect_no_mac() 2172 return flags & BPF_F_INGRESS ? in __bpf_redirect_common() 2431 if (unlikely(flags & (~(BPF_F_INGRESS) | BPF_F_REDIRECT_INTERNAL))) in BPF_CALL_3() 2507 if (unlikely(flags & (~(BPF_F_INGRESS) | BPF_F_REDIRECT_INTERNAL))) in BPF_CALL_2()
|
/Linux-v6.6/tools/testing/selftests/net/ |
D | nat6to4.c | 146 return bpf_redirect(skb->ifindex, BPF_F_INGRESS); in sched_cls_ingress6_nat_6_prog()
|
/Linux-v6.6/Documentation/bpf/ |
D | map_sockmap.rst | 93 can be used for redirection. The ``BPF_F_INGRESS`` value in ``flags`` is used 107 can be used for redirection. The ``BPF_F_INGRESS`` value in ``flags`` is used 173 interfaces can be used for redirection. The ``BPF_F_INGRESS`` value in 189 interfaces can be used for redirection. The ``BPF_F_INGRESS`` value in
|
/Linux-v6.6/tools/testing/selftests/bpf/ |
D | test_sockmap.c | 1168 int in = BPF_F_INGRESS; in run_options() 1201 int ingress = BPF_F_INGRESS; in run_options() 1231 int ingress = BPF_F_INGRESS; in run_options()
|
/Linux-v6.6/tools/include/uapi/linux/ |
D | bpf.h | 5901 BPF_F_INGRESS = (1ULL << 0), enumerator
|
/Linux-v6.6/include/uapi/linux/ |
D | bpf.h | 5901 BPF_F_INGRESS = (1ULL << 0), enumerator
|