Searched refs:verdict (Results 1 - 25 of 89) sorted by relevance

1234

/linux-master/tools/testing/selftests/bpf/progs/
H A Dtest_sockmap_listen.c66 int verdict; local
69 verdict = bpf_sk_redirect_map(skb, &sock_map, zero, 0);
71 verdict = bpf_sk_redirect_hash(skb, &sock_hash, &zero, 0);
73 count = bpf_map_lookup_elem(&verdict_map, &verdict);
77 return verdict;
85 int verdict; local
88 verdict = bpf_sk_redirect_map(skb, &sock_map, zero,
91 verdict = bpf_sk_redirect_hash(skb, &sock_hash, &zero,
94 count = bpf_map_lookup_elem(&verdict_map, &verdict);
98 return verdict;
106 int verdict; local
124 int err, verdict; local
[all...]
H A Dtest_skmsg_load_helpers.c31 int verdict = SK_PASS; local
42 verdict = SK_DROP;
44 return verdict;
/linux-master/drivers/net/ethernet/amazon/ena/
H A Dena_xdp.h84 u32 verdict = ENA_XDP_PASS; local
92 verdict = bpf_prog_run_xdp(xdp_prog, xdp);
94 switch (verdict) {
98 trace_xdp_exception(rx_ring->netdev, xdp_prog, verdict);
100 verdict = ENA_XDP_DROP;
116 verdict = ENA_XDP_TX;
121 verdict = ENA_XDP_REDIRECT;
124 trace_xdp_exception(rx_ring->netdev, xdp_prog, verdict);
126 verdict = ENA_XDP_DROP;
129 trace_xdp_exception(rx_ring->netdev, xdp_prog, verdict);
[all...]
/linux-master/samples/bpf/
H A Dtest_cgrp2_attach.c43 static int prog_load(int map_fd, int verdict) argument
71 BPF_MOV64_IMM(BPF_REG_0, verdict), /* r0 = verdict */
92 static int attach_filter(int cg_fd, int type, int verdict) argument
105 prog_fd = prog_load(map_fd, verdict);
136 int detach_only = 0, verdict = 1; local
143 verdict = 0;
174 ret = attach_filter(cg_fd, type, verdict);
/linux-master/net/netfilter/
H A Dnf_tables_core.c45 const struct nft_verdict *verdict,
55 nft_trace_notify(pkt, verdict, rule, info);
59 struct nft_verdict *verdict,
66 __nft_trace_packet(pkt, verdict, rule, info, type);
94 regs->verdict.code = NFT_BREAK;
108 regs->verdict.code = NFT_BREAK;
118 switch (regs->verdict.code & NF_VERDICT_MASK) {
135 __nft_trace_packet(pkt, &regs->verdict, rule, info, type);
277 regs.verdict.code = NFT_CONTINUE;
290 if (regs.verdict
44 __nft_trace_packet(const struct nft_pktinfo *pkt, const struct nft_verdict *verdict, const struct nft_rule_dp *rule, struct nft_traceinfo *info, enum nft_trace_types type) argument
58 nft_trace_packet(const struct nft_pktinfo *pkt, struct nft_verdict *verdict, struct nft_traceinfo *info, const struct nft_rule_dp *rule, enum nft_trace_types type) argument
[all...]
H A Dnft_fwd_netdev.c37 regs->verdict.code = NF_STOLEN;
101 unsigned int verdict = NF_STOLEN; local
111 verdict = NFT_BREAK;
115 verdict = NF_DROP;
127 verdict = NFT_BREAK;
131 verdict = NF_DROP;
140 verdict = NFT_BREAK;
152 regs->verdict.code = verdict;
H A Dnft_immediate.c74 struct nft_chain *chain = priv->data.verdict.chain;
76 switch (priv->data.verdict.code) {
105 switch (data->verdict.code) {
108 chain = data->verdict.chain;
151 switch (data->verdict.code) {
154 chain = data->verdict.chain;
198 switch (data->verdict.code) {
201 chain = data->verdict.chain;
260 switch (data->verdict.code) {
264 err = nft_chain_validate(ctx, data->verdict
[all...]
H A Dnft_ct_fast.c34 regs->verdict.code = NFT_BREAK;
57 regs->verdict.code = NFT_BREAK;
H A Dnf_tables_trace.c127 const struct nft_verdict *verdict,
134 /* a continue verdict with ->type == RETURN means that this is
140 verdict->code == NFT_CONTINUE)
148 static bool nft_trace_have_verdict_chain(const struct nft_verdict *verdict, argument
159 switch (verdict->code) {
190 const struct nft_verdict *verdict,
212 nla_total_size(sizeof(u32)) + /* verdict code */
225 if (nft_trace_have_verdict_chain(verdict, info))
226 size += nla_total_size(strlen(verdict->chain->name)); /* jump target */
253 if (nf_trace_fill_rule_info(skb, verdict, rul
126 nf_trace_fill_rule_info(struct sk_buff *nlskb, const struct nft_verdict *verdict, const struct nft_rule_dp *rule, const struct nft_traceinfo *info) argument
189 nft_trace_notify(const struct nft_pktinfo *pkt, const struct nft_verdict *verdict, const struct nft_rule_dp *rule, struct nft_traceinfo *info) argument
[all...]
H A Dnft_synproxy.c61 regs->verdict.code = NF_STOLEN;
67 regs->verdict.code = NF_STOLEN;
69 regs->verdict.code = NF_DROP;
92 regs->verdict.code = NF_STOLEN;
98 regs->verdict.code = NF_STOLEN;
100 regs->verdict.code = NF_DROP;
117 regs->verdict.code = NFT_BREAK;
122 regs->verdict.code = NF_DROP;
130 regs->verdict.code = NF_DROP;
135 regs->verdict
[all...]
H A Dnft_socket.c33 regs->verdict.code = NFT_BREAK;
100 regs->verdict.code = NFT_BREAK;
112 regs->verdict.code = NFT_BREAK;
118 regs->verdict.code = NFT_BREAK;
126 regs->verdict.code = NFT_BREAK;
133 regs->verdict.code = NFT_BREAK;
H A Dnft_tproxy.c35 regs->verdict.code = NFT_BREAK;
41 regs->verdict.code = NFT_BREAK;
80 regs->verdict.code = NFT_BREAK;
102 regs->verdict.code = NFT_BREAK;
109 regs->verdict.code = NFT_BREAK;
153 regs->verdict.code = NFT_BREAK;
182 regs->verdict.code = NFT_BREAK;
H A Dnfnetlink_queue.c234 unsigned int verdict, i = *index; local
239 verdict = nf_hook_entry_hookfn(hook, skb, state);
240 if (verdict != NF_ACCEPT) {
242 if (verdict != NF_REPEAT)
243 return verdict;
310 static void nf_reinject(struct nf_queue_entry *entry, unsigned int verdict) argument
335 if (verdict == NF_REPEAT)
336 verdict = nf_hook_entry_hookfn(hook_entry, skb, &entry->state);
338 if (verdict == NF_ACCEPT) {
340 verdict
370 nfqnl_reinject(struct nf_queue_entry *entry, unsigned int verdict) argument
1236 unsigned int verdict; local
1262 unsigned int verdict, maxid; local
1376 unsigned int verdict; local
[all...]
H A Dnft_osf.c32 regs->verdict.code = NFT_BREAK;
39 regs->verdict.code = NFT_BREAK;
43 regs->verdict.code = NFT_BREAK;
/linux-master/tools/testing/selftests/bpf/prog_tests/
H A Dnetns_cookie.c16 int err, val, ret, map, verdict; local
35 verdict = bpf_program__fd(skel->progs.get_netns_cookie_sk_msg);
37 err = bpf_prog_attach(verdict, map, BPF_SK_MSG_VERDICT, 0);
H A Dsockmap_basic.c114 int err, map, verdict; local
120 verdict = bpf_program__fd(skel->progs.prog_msg_verdict);
123 err = bpf_prog_attach(verdict, map, BPF_SK_MSG_VERDICT, 0);
127 err = bpf_prog_detach2(verdict, map, BPF_SK_MSG_VERDICT);
278 int err, map, verdict; local
284 verdict = bpf_program__fd(skel->progs.prog_skb_verdict);
287 err = bpf_prog_attach(verdict, map, first, 0);
291 err = bpf_prog_attach(verdict, map, second, 0);
294 err = bpf_prog_detach2(verdict, map, first);
362 int n, err, map, verdict, local
417 int err, map, verdict, s, c0 = -1, c1 = -1, p0 = -1, p1 = -1; local
480 int err, map, verdict, s, c1, p1, zero = 0, sent, recvd, avail; local
[all...]
H A Dcgroup_attach_override.c13 static int prog_load(int verdict) argument
16 BPF_MOV64_IMM(BPF_REG_0, verdict), /* r0 = verdict */
H A Dsockmap_listen.c731 int verdict = bpf_program__fd(skel->progs.prog_stream_verdict); local
740 err = xbpf_prog_attach(verdict, sock_map, BPF_SK_SKB_STREAM_VERDICT, 0);
747 xbpf_prog_detach2(verdict, sock_map, BPF_SK_SKB_STREAM_VERDICT);
756 int verdict = bpf_program__fd(skel->progs.prog_msg_verdict); local
761 err = xbpf_prog_attach(verdict, sock_map, BPF_SK_MSG_VERDICT, 0);
767 xbpf_prog_detach2(verdict, sock_map, BPF_SK_MSG_VERDICT);
833 int verdict = bpf_program__fd(skel->progs.prog_stream_verdict); local
842 err = xbpf_prog_attach(verdict, sock_map, BPF_SK_SKB_STREAM_VERDICT, 0);
849 xbpf_prog_detach2(verdict, sock_map, BPF_SK_SKB_STREAM_VERDICT);
858 int verdict local
922 int verdict = bpf_program__fd(skel->progs.prog_stream_verdict); local
1409 int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); local
1560 int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); local
1699 int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); local
1757 int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); local
1811 int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); local
[all...]
/linux-master/net/ipv6/netfilter/
H A Dip6table_mangle.c35 unsigned int ret, verdict; local
50 verdict = ret & NF_VERDICT_MASK;
52 if (verdict != NF_DROP && verdict != NF_STOLEN &&
H A Dnft_reject_ipv6.c38 regs->verdict.code = NF_DROP;
/linux-master/net/ipv4/netfilter/
H A Diptable_mangle.c39 unsigned int ret, verdict; local
54 verdict = ret & NF_VERDICT_MASK;
56 if (verdict != NF_DROP && verdict != NF_STOLEN) {
/linux-master/tools/testing/selftests/netfilter/
H A Dnf-queue.c24 uint32_t verdict; member in struct:options
171 .verdict = htonl(verd),
316 nlh = nfq_build_verdict(buf, id, opts.queue_num, opts.verdict);
347 opts.verdict = atoi(optarg);
348 if (opts.verdict > 0xffff) {
353 opts.verdict <<= 16;
354 opts.verdict |= NF_QUEUE;
375 if (opts.verdict != NF_ACCEPT && (opts.verdict >> 16 == opts.queue_num)) {
385 opts.verdict
[all...]
/linux-master/net/netfilter/ipvs/
H A Dip_vs_proto_ah_esp.c105 int *verdict, struct ip_vs_conn **cpp,
111 *verdict = NF_ACCEPT;
103 ah_esp_conn_schedule(struct netns_ipvs *ipvs, int af, struct sk_buff *skb, struct ip_vs_proto_data *pd, int *verdict, struct ip_vs_conn **cpp, struct ip_vs_iphdr *iph) argument
/linux-master/include/linux/netfilter_ipv4/
H A Dip_tables.h54 .target.verdict = -(__verdict) - 1, \
/linux-master/include/linux/netfilter_arp/
H A Darp_tables.h40 .target.verdict = -(__verdict) - 1, \

Completed in 249 milliseconds

1234