/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | test_sockmap_listen.c | 66 int verdict; local 69 verdict = bpf_sk_redirect_map(skb, &sock_map, zero, 0); 71 verdict = bpf_sk_redirect_hash(skb, &sock_hash, &zero, 0); 73 count = bpf_map_lookup_elem(&verdict_map, &verdict); 77 return verdict; 85 int verdict; local 88 verdict = bpf_sk_redirect_map(skb, &sock_map, zero, 91 verdict = bpf_sk_redirect_hash(skb, &sock_hash, &zero, 94 count = bpf_map_lookup_elem(&verdict_map, &verdict); 98 return verdict; 106 int verdict; local 124 int err, verdict; local [all...] |
H A D | test_skmsg_load_helpers.c | 31 int verdict = SK_PASS; local 42 verdict = SK_DROP; 44 return verdict;
|
/linux-master/drivers/net/ethernet/amazon/ena/ |
H A D | ena_xdp.h | 84 u32 verdict = ENA_XDP_PASS; local 92 verdict = bpf_prog_run_xdp(xdp_prog, xdp); 94 switch (verdict) { 98 trace_xdp_exception(rx_ring->netdev, xdp_prog, verdict); 100 verdict = ENA_XDP_DROP; 116 verdict = ENA_XDP_TX; 121 verdict = ENA_XDP_REDIRECT; 124 trace_xdp_exception(rx_ring->netdev, xdp_prog, verdict); 126 verdict = ENA_XDP_DROP; 129 trace_xdp_exception(rx_ring->netdev, xdp_prog, verdict); [all...] |
/linux-master/samples/bpf/ |
H A D | test_cgrp2_attach.c | 43 static int prog_load(int map_fd, int verdict) argument 71 BPF_MOV64_IMM(BPF_REG_0, verdict), /* r0 = verdict */ 92 static int attach_filter(int cg_fd, int type, int verdict) argument 105 prog_fd = prog_load(map_fd, verdict); 136 int detach_only = 0, verdict = 1; local 143 verdict = 0; 174 ret = attach_filter(cg_fd, type, verdict);
|
/linux-master/net/netfilter/ |
H A D | nf_tables_core.c | 45 const struct nft_verdict *verdict, 55 nft_trace_notify(pkt, verdict, rule, info); 59 struct nft_verdict *verdict, 66 __nft_trace_packet(pkt, verdict, rule, info, type); 94 regs->verdict.code = NFT_BREAK; 108 regs->verdict.code = NFT_BREAK; 118 switch (regs->verdict.code & NF_VERDICT_MASK) { 135 __nft_trace_packet(pkt, ®s->verdict, rule, info, type); 277 regs.verdict.code = NFT_CONTINUE; 290 if (regs.verdict 44 __nft_trace_packet(const struct nft_pktinfo *pkt, const struct nft_verdict *verdict, const struct nft_rule_dp *rule, struct nft_traceinfo *info, enum nft_trace_types type) argument 58 nft_trace_packet(const struct nft_pktinfo *pkt, struct nft_verdict *verdict, struct nft_traceinfo *info, const struct nft_rule_dp *rule, enum nft_trace_types type) argument [all...] |
H A D | nft_fwd_netdev.c | 37 regs->verdict.code = NF_STOLEN; 101 unsigned int verdict = NF_STOLEN; local 111 verdict = NFT_BREAK; 115 verdict = NF_DROP; 127 verdict = NFT_BREAK; 131 verdict = NF_DROP; 140 verdict = NFT_BREAK; 152 regs->verdict.code = verdict;
|
H A D | nft_immediate.c | 74 struct nft_chain *chain = priv->data.verdict.chain; 76 switch (priv->data.verdict.code) { 105 switch (data->verdict.code) { 108 chain = data->verdict.chain; 151 switch (data->verdict.code) { 154 chain = data->verdict.chain; 198 switch (data->verdict.code) { 201 chain = data->verdict.chain; 260 switch (data->verdict.code) { 264 err = nft_chain_validate(ctx, data->verdict [all...] |
H A D | nft_ct_fast.c | 34 regs->verdict.code = NFT_BREAK; 57 regs->verdict.code = NFT_BREAK;
|
H A D | nf_tables_trace.c | 127 const struct nft_verdict *verdict, 134 /* a continue verdict with ->type == RETURN means that this is 140 verdict->code == NFT_CONTINUE) 148 static bool nft_trace_have_verdict_chain(const struct nft_verdict *verdict, argument 159 switch (verdict->code) { 190 const struct nft_verdict *verdict, 212 nla_total_size(sizeof(u32)) + /* verdict code */ 225 if (nft_trace_have_verdict_chain(verdict, info)) 226 size += nla_total_size(strlen(verdict->chain->name)); /* jump target */ 253 if (nf_trace_fill_rule_info(skb, verdict, rul 126 nf_trace_fill_rule_info(struct sk_buff *nlskb, const struct nft_verdict *verdict, const struct nft_rule_dp *rule, const struct nft_traceinfo *info) argument 189 nft_trace_notify(const struct nft_pktinfo *pkt, const struct nft_verdict *verdict, const struct nft_rule_dp *rule, struct nft_traceinfo *info) argument [all...] |
H A D | nft_synproxy.c | 61 regs->verdict.code = NF_STOLEN; 67 regs->verdict.code = NF_STOLEN; 69 regs->verdict.code = NF_DROP; 92 regs->verdict.code = NF_STOLEN; 98 regs->verdict.code = NF_STOLEN; 100 regs->verdict.code = NF_DROP; 117 regs->verdict.code = NFT_BREAK; 122 regs->verdict.code = NF_DROP; 130 regs->verdict.code = NF_DROP; 135 regs->verdict [all...] |
H A D | nft_socket.c | 33 regs->verdict.code = NFT_BREAK; 100 regs->verdict.code = NFT_BREAK; 112 regs->verdict.code = NFT_BREAK; 118 regs->verdict.code = NFT_BREAK; 126 regs->verdict.code = NFT_BREAK; 133 regs->verdict.code = NFT_BREAK;
|
H A D | nft_tproxy.c | 35 regs->verdict.code = NFT_BREAK; 41 regs->verdict.code = NFT_BREAK; 80 regs->verdict.code = NFT_BREAK; 102 regs->verdict.code = NFT_BREAK; 109 regs->verdict.code = NFT_BREAK; 153 regs->verdict.code = NFT_BREAK; 182 regs->verdict.code = NFT_BREAK;
|
H A D | nfnetlink_queue.c | 234 unsigned int verdict, i = *index; local 239 verdict = nf_hook_entry_hookfn(hook, skb, state); 240 if (verdict != NF_ACCEPT) { 242 if (verdict != NF_REPEAT) 243 return verdict; 310 static void nf_reinject(struct nf_queue_entry *entry, unsigned int verdict) argument 335 if (verdict == NF_REPEAT) 336 verdict = nf_hook_entry_hookfn(hook_entry, skb, &entry->state); 338 if (verdict == NF_ACCEPT) { 340 verdict 370 nfqnl_reinject(struct nf_queue_entry *entry, unsigned int verdict) argument 1236 unsigned int verdict; local 1262 unsigned int verdict, maxid; local 1376 unsigned int verdict; local [all...] |
H A D | nft_osf.c | 32 regs->verdict.code = NFT_BREAK; 39 regs->verdict.code = NFT_BREAK; 43 regs->verdict.code = NFT_BREAK;
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | netns_cookie.c | 16 int err, val, ret, map, verdict; local 35 verdict = bpf_program__fd(skel->progs.get_netns_cookie_sk_msg); 37 err = bpf_prog_attach(verdict, map, BPF_SK_MSG_VERDICT, 0);
|
H A D | sockmap_basic.c | 114 int err, map, verdict; local 120 verdict = bpf_program__fd(skel->progs.prog_msg_verdict); 123 err = bpf_prog_attach(verdict, map, BPF_SK_MSG_VERDICT, 0); 127 err = bpf_prog_detach2(verdict, map, BPF_SK_MSG_VERDICT); 278 int err, map, verdict; local 284 verdict = bpf_program__fd(skel->progs.prog_skb_verdict); 287 err = bpf_prog_attach(verdict, map, first, 0); 291 err = bpf_prog_attach(verdict, map, second, 0); 294 err = bpf_prog_detach2(verdict, map, first); 362 int n, err, map, verdict, local 417 int err, map, verdict, s, c0 = -1, c1 = -1, p0 = -1, p1 = -1; local 480 int err, map, verdict, s, c1, p1, zero = 0, sent, recvd, avail; local [all...] |
H A D | cgroup_attach_override.c | 13 static int prog_load(int verdict) argument 16 BPF_MOV64_IMM(BPF_REG_0, verdict), /* r0 = verdict */
|
H A D | sockmap_listen.c | 731 int verdict = bpf_program__fd(skel->progs.prog_stream_verdict); local 740 err = xbpf_prog_attach(verdict, sock_map, BPF_SK_SKB_STREAM_VERDICT, 0); 747 xbpf_prog_detach2(verdict, sock_map, BPF_SK_SKB_STREAM_VERDICT); 756 int verdict = bpf_program__fd(skel->progs.prog_msg_verdict); local 761 err = xbpf_prog_attach(verdict, sock_map, BPF_SK_MSG_VERDICT, 0); 767 xbpf_prog_detach2(verdict, sock_map, BPF_SK_MSG_VERDICT); 833 int verdict = bpf_program__fd(skel->progs.prog_stream_verdict); local 842 err = xbpf_prog_attach(verdict, sock_map, BPF_SK_SKB_STREAM_VERDICT, 0); 849 xbpf_prog_detach2(verdict, sock_map, BPF_SK_SKB_STREAM_VERDICT); 858 int verdict local 922 int verdict = bpf_program__fd(skel->progs.prog_stream_verdict); local 1409 int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); local 1560 int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); local 1699 int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); local 1757 int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); local 1811 int verdict = bpf_program__fd(skel->progs.prog_skb_verdict); local [all...] |
/linux-master/net/ipv6/netfilter/ |
H A D | ip6table_mangle.c | 35 unsigned int ret, verdict; local 50 verdict = ret & NF_VERDICT_MASK; 52 if (verdict != NF_DROP && verdict != NF_STOLEN &&
|
H A D | nft_reject_ipv6.c | 38 regs->verdict.code = NF_DROP;
|
/linux-master/net/ipv4/netfilter/ |
H A D | iptable_mangle.c | 39 unsigned int ret, verdict; local 54 verdict = ret & NF_VERDICT_MASK; 56 if (verdict != NF_DROP && verdict != NF_STOLEN) {
|
/linux-master/tools/testing/selftests/netfilter/ |
H A D | nf-queue.c | 24 uint32_t verdict; member in struct:options 171 .verdict = htonl(verd), 316 nlh = nfq_build_verdict(buf, id, opts.queue_num, opts.verdict); 347 opts.verdict = atoi(optarg); 348 if (opts.verdict > 0xffff) { 353 opts.verdict <<= 16; 354 opts.verdict |= NF_QUEUE; 375 if (opts.verdict != NF_ACCEPT && (opts.verdict >> 16 == opts.queue_num)) { 385 opts.verdict [all...] |
/linux-master/net/netfilter/ipvs/ |
H A D | ip_vs_proto_ah_esp.c | 105 int *verdict, struct ip_vs_conn **cpp, 111 *verdict = NF_ACCEPT; 103 ah_esp_conn_schedule(struct netns_ipvs *ipvs, int af, struct sk_buff *skb, struct ip_vs_proto_data *pd, int *verdict, struct ip_vs_conn **cpp, struct ip_vs_iphdr *iph) argument
|
/linux-master/include/linux/netfilter_ipv4/ |
H A D | ip_tables.h | 54 .target.verdict = -(__verdict) - 1, \
|
/linux-master/include/linux/netfilter_arp/ |
H A D | arp_tables.h | 40 .target.verdict = -(__verdict) - 1, \
|