Searched refs:BPF_F_INGRESS (Results 1 – 14 of 14) sorted by relevance
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | empty_skb.c | 14 ret = bpf_clone_redirect(skb, ifindex, BPF_F_INGRESS); in redirect_ingress() 28 ret = bpf_clone_redirect(skb, ifindex, BPF_F_INGRESS); in tc_redirect_ingress()
|
H A D | test_lwt_redirect.c | 51 return bpf_redirect(target, BPF_F_INGRESS); in test_lwt_redirect_in() 87 return bpf_redirect(target, BPF_F_INGRESS); in test_lwt_redirect_in_nomac()
|
H A D | test_sockmap_listen.c | 82 test_ingress ? BPF_F_INGRESS : 0); in prog_skb_verdict() 85 test_ingress ? BPF_F_INGRESS : 0); in prog_skb_verdict()
|
H A D | test_cls_redirect_dynptr.c | 288 return bpf_redirect(skb->ifindex, BPF_F_INGRESS); in accept_locally()
|
H A D | test_cls_redirect.c | 396 return bpf_redirect(skb->ifindex, BPF_F_INGRESS); in accept_locally()
|
/openbmc/linux/include/linux/ |
H A D | skmsg.h | 227 return msg->flags & BPF_F_INGRESS; in sk_msg_to_ingress() 510 #define BPF_F_PTR_MASK ~(BPF_F_INGRESS | BPF_F_STRPARSER) 528 return sk_redir & BPF_F_INGRESS; in skb_bpf_ingress() 533 skb->_sk_redir |= BPF_F_INGRESS; in skb_bpf_set_ingress() 541 skb->_sk_redir |= BPF_F_INGRESS; in skb_bpf_set_redir()
|
/openbmc/linux/samples/bpf/ |
H A D | tc_l2_redirect_kern.c | 88 return bpf_redirect(*ifindex, BPF_F_INGRESS); in _l2_to_iptun_ingress_forward() 103 return bpf_redirect(*ifindex, BPF_F_INGRESS); in _l2_to_iptun_ingress_forward()
|
/openbmc/linux/net/core/ |
H A D | sock_map.c | 641 if (unlikely(flags & ~(BPF_F_INGRESS))) in BPF_CALL_4() 647 if ((flags & BPF_F_INGRESS) && sk_is_vsock(sk)) in BPF_CALL_4() 650 skb_bpf_set_redir(skb, sk, flags & BPF_F_INGRESS); in BPF_CALL_4() 669 if (unlikely(flags & ~(BPF_F_INGRESS))) in BPF_CALL_4() 675 if (!(flags & BPF_F_INGRESS) && !sk_is_tcp(sk)) in BPF_CALL_4() 1247 if (unlikely(flags & ~(BPF_F_INGRESS))) in BPF_CALL_4() 1253 if ((flags & BPF_F_INGRESS) && sk_is_vsock(sk)) in BPF_CALL_4() 1256 skb_bpf_set_redir(skb, sk, flags & BPF_F_INGRESS); in BPF_CALL_4() 1275 if (unlikely(flags & ~(BPF_F_INGRESS))) in BPF_CALL_4() 1281 if (!(flags & BPF_F_INGRESS) && !sk_is_tcp(sk)) in BPF_CALL_4()
|
H A D | filter.c | 2165 return flags & BPF_F_INGRESS ? in __bpf_redirect_no_mac() 2179 return flags & BPF_F_INGRESS ? in __bpf_redirect_common() 2440 if (unlikely(flags & (~(BPF_F_INGRESS) | BPF_F_REDIRECT_INTERNAL))) in BPF_CALL_3() 2517 if (unlikely(flags & (~(BPF_F_INGRESS) | BPF_F_REDIRECT_INTERNAL))) in BPF_CALL_2()
|
/openbmc/linux/tools/testing/selftests/net/ |
H A D | nat6to4.c | 146 return bpf_redirect(skb->ifindex, BPF_F_INGRESS); in sched_cls_ingress6_nat_6_prog()
|
/openbmc/linux/Documentation/bpf/ |
H A D | map_sockmap.rst | 93 can be used for redirection. The ``BPF_F_INGRESS`` value in ``flags`` is used 107 can be used for redirection. The ``BPF_F_INGRESS`` value in ``flags`` is used 173 interfaces can be used for redirection. The ``BPF_F_INGRESS`` value in 189 interfaces can be used for redirection. The ``BPF_F_INGRESS`` value in
|
/openbmc/linux/tools/testing/selftests/bpf/ |
H A D | test_sockmap.c | 1169 int in = BPF_F_INGRESS; in run_options() 1202 int ingress = BPF_F_INGRESS; in run_options() 1232 int ingress = BPF_F_INGRESS; in run_options()
|
/openbmc/linux/include/uapi/linux/ |
H A D | bpf.h | 6072 BPF_F_INGRESS = (1ULL << 0), /* used for skb path */ enumerator 6075 #define BPF_F_REDIRECT_FLAGS (BPF_F_INGRESS | BPF_F_BROADCAST | BPF_F_EXCLUDE_INGRESS)
|
/openbmc/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 5926 BPF_F_INGRESS = (1ULL << 0), enumerator
|