Searched refs:SK_PASS (Results 1 - 20 of 20) sorted by relevance
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | test_sockmap_progs_query.c | 15 return SK_PASS; 21 return SK_PASS;
|
H A D | sockmap_tcp_msg_prog.c | 9 return SK_PASS;
|
H A D | test_sockmap_pass_prog.c | 29 return SK_PASS;
|
H A D | test_sk_lookup.c | 78 return SK_PASS; 92 return SK_PASS; 98 return SK_PASS; 115 return SK_PASS; 119 return SK_PASS; 123 return err ? SK_DROP : SK_PASS; 134 return SK_PASS; 136 return SK_PASS; 138 return SK_PASS; 142 return SK_PASS; [all...] |
H A D | test_migrate_reuseport.c | 6 * return SK_PASS without selecting a listener. 104 return SK_PASS; 115 return SK_PASS; 132 return SK_PASS;
|
H A D | test_sockmap_update.c | 45 return failed ? SK_DROP : SK_PASS;
|
H A D | test_sockmap_kern.h | 157 int err, *f, ret = SK_PASS; 263 return SK_PASS; 330 return SK_PASS; 342 return SK_PASS; 347 return SK_PASS; 371 return SK_PASS;
|
H A D | test_skmsg_load_helpers.c | 31 int verdict = SK_PASS;
|
H A D | test_select_reuseport_kern.c | 118 return SK_PASS; 181 return result < PASS ? SK_DROP : SK_PASS;
|
H A D | test_sockmap_listen.c | 131 verdict = err ? SK_DROP : SK_PASS;
|
H A D | dynptr_fail.c | 268 return SK_PASS; 1088 return SK_PASS; 1114 return SK_PASS; 1140 return SK_PASS; 1166 return SK_PASS; 1191 return SK_PASS; 1304 return SK_PASS; 1326 return SK_PASS;
|
H A D | test_assign_reuse.c | 55 return SK_PASS;
|
/linux-master/include/linux/ |
H A D | filter.h | 1423 * Allowed return values for a BPF SK_LOOKUP program are SK_PASS and 1426 * SK_PASS && ctx.selected_sk != NULL: use selected_sk as lookup result 1427 * SK_PASS && ctx.selected_sk == NULL: continue to htable-based socket lookup 1433 * 1. If any program returned SK_PASS and a non-NULL ctx.selected_sk, 1434 * macro result is SK_PASS and last ctx.selected_sk is used. 1437 * 3. Otherwise result is SK_PASS and ctx.selected_sk is NULL. 1460 if (_ret == SK_PASS && _ctx->selected_sk) { \ 1472 _all_pass || _selected_sk ? SK_PASS : SK_DROP; \ 1499 if (act == SK_PASS) { 1538 if (act == SK_PASS) { [all...] |
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | sockmap_listen.c | 653 key = SK_PASS; 706 key = SK_PASS; 999 key = SK_PASS; 1369 key = SK_PASS; 1535 key = SK_PASS;
|
/linux-master/net/core/ |
H A D | sock_map.c | 652 return SK_PASS; 681 return SK_PASS; 1256 return SK_PASS; 1285 return SK_PASS;
|
H A D | skmsg.c | 856 case SK_PASS:
|
H A D | filter.c | 11159 if (action == SK_PASS)
|
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 2946 * **SK_PASS** on success, or **SK_DROP** on error. 3153 * the verdict eBPF program returns **SK_PASS**), redirect it to 3161 * **SK_PASS** on success, or **SK_DROP** on error. 3430 * the verdict eBPF program returns **SK_PASS**), redirect it to 3438 * **SK_PASS** on success, or **SK_DROP** on error. 3444 * if the verdict eBPF program returns **SK_PASS**), redirect it 3452 * **SK_PASS** on success, or **SK_DROP** on error. 6473 SK_PASS, enumerator in enum:sk_action
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 2946 * **SK_PASS** on success, or **SK_DROP** on error. 3153 * the verdict eBPF program returns **SK_PASS**), redirect it to 3161 * **SK_PASS** on success, or **SK_DROP** on error. 3430 * the verdict eBPF program returns **SK_PASS**), redirect it to 3438 * **SK_PASS** on success, or **SK_DROP** on error. 3444 * if the verdict eBPF program returns **SK_PASS**), redirect it 3452 * **SK_PASS** on success, or **SK_DROP** on error. 6473 SK_PASS, enumerator in enum:sk_action
|
/linux-master/kernel/bpf/ |
H A D | verifier.c | 15484 range = retval_range(SK_DROP, SK_PASS);
|
Completed in 1011 milliseconds