/linux-6.12.1/tools/testing/selftests/bpf/progs/ |
D | test_sockmap_listen.c | 66 int verdict; in prog_stream_verdict() local 69 verdict = bpf_sk_redirect_map(skb, &sock_map, zero, 0); in prog_stream_verdict() 71 verdict = bpf_sk_redirect_hash(skb, &sock_hash, &zero, 0); in prog_stream_verdict() 73 count = bpf_map_lookup_elem(&verdict_map, &verdict); in prog_stream_verdict() 77 return verdict; in prog_stream_verdict() 85 int verdict; in prog_skb_verdict() local 88 verdict = bpf_sk_redirect_map(skb, &sock_map, zero, in prog_skb_verdict() 91 verdict = bpf_sk_redirect_hash(skb, &sock_hash, &zero, in prog_skb_verdict() 94 count = bpf_map_lookup_elem(&verdict_map, &verdict); in prog_skb_verdict() 98 return verdict; in prog_skb_verdict() [all …]
|
D | test_skmsg_load_helpers.c | 30 int verdict = SK_PASS; in prog_msg_verdict_common() local 41 verdict = SK_DROP; in prog_msg_verdict_common() 43 return verdict; in prog_msg_verdict_common()
|
/linux-6.12.1/drivers/net/ethernet/amazon/ena/ |
D | ena_xdp.h | 84 u32 verdict = ENA_XDP_PASS; in ena_xdp_execute() local 92 verdict = bpf_prog_run_xdp(xdp_prog, xdp); in ena_xdp_execute() 94 switch (verdict) { in ena_xdp_execute() 98 trace_xdp_exception(rx_ring->netdev, xdp_prog, verdict); in ena_xdp_execute() 100 verdict = ENA_XDP_DROP; in ena_xdp_execute() 116 verdict = ENA_XDP_TX; in ena_xdp_execute() 121 verdict = ENA_XDP_REDIRECT; in ena_xdp_execute() 124 trace_xdp_exception(rx_ring->netdev, xdp_prog, verdict); in ena_xdp_execute() 126 verdict = ENA_XDP_DROP; in ena_xdp_execute() 129 trace_xdp_exception(rx_ring->netdev, xdp_prog, verdict); in ena_xdp_execute() [all …]
|
/linux-6.12.1/net/netfilter/ |
D | nf_tables_core.c | 45 const struct nft_verdict *verdict, in __nft_trace_packet() argument 55 nft_trace_notify(pkt, verdict, rule, info); in __nft_trace_packet() 59 struct nft_verdict *verdict, in nft_trace_packet() argument 66 __nft_trace_packet(pkt, verdict, rule, info, type); in nft_trace_packet() 94 regs->verdict.code = NFT_BREAK; in nft_cmp_fast_eval() 108 regs->verdict.code = NFT_BREAK; in nft_cmp16_fast_eval() 118 switch (regs->verdict.code & NF_VERDICT_MASK) { in __nft_trace_verdict() 135 __nft_trace_packet(pkt, ®s->verdict, rule, info, type); in __nft_trace_verdict() 277 regs.verdict.code = NFT_CONTINUE; in nft_do_chain() 290 if (regs.verdict.code != NFT_CONTINUE) in nft_do_chain() [all …]
|
D | nft_fwd_netdev.c | 37 regs->verdict.code = NF_STOLEN; in nft_fwd_netdev_eval() 101 unsigned int verdict = NF_STOLEN; in nft_fwd_neigh_eval() local 111 verdict = NFT_BREAK; in nft_fwd_neigh_eval() 115 verdict = NF_DROP; in nft_fwd_neigh_eval() 127 verdict = NFT_BREAK; in nft_fwd_neigh_eval() 131 verdict = NF_DROP; in nft_fwd_neigh_eval() 140 verdict = NFT_BREAK; in nft_fwd_neigh_eval() 152 regs->verdict.code = verdict; in nft_fwd_neigh_eval()
|
D | nft_immediate.c | 74 struct nft_chain *chain = priv->data.verdict.chain; in nft_immediate_init() 76 switch (priv->data.verdict.code) { in nft_immediate_init() 105 switch (data->verdict.code) { in nft_immediate_activate() 108 chain = data->verdict.chain; in nft_immediate_activate() 151 switch (data->verdict.code) { in nft_immediate_deactivate() 154 chain = data->verdict.chain; in nft_immediate_deactivate() 198 switch (data->verdict.code) { in nft_immediate_destroy() 201 chain = data->verdict.chain; in nft_immediate_destroy() 259 switch (data->verdict.code) { in nft_immediate_validate() 263 err = nft_chain_validate(ctx, data->verdict.chain); in nft_immediate_validate() [all …]
|
D | nf_tables_trace.c | 127 const struct nft_verdict *verdict, in nf_trace_fill_rule_info() argument 140 verdict->code == NFT_CONTINUE) in nf_trace_fill_rule_info() 148 static bool nft_trace_have_verdict_chain(const struct nft_verdict *verdict, in nft_trace_have_verdict_chain() argument 159 switch (verdict->code) { in nft_trace_have_verdict_chain() 190 const struct nft_verdict *verdict, in nft_trace_notify() argument 225 if (nft_trace_have_verdict_chain(verdict, info)) in nft_trace_notify() 226 size += nla_total_size(strlen(verdict->chain->name)); /* jump target */ in nft_trace_notify() 253 if (nf_trace_fill_rule_info(skb, verdict, rule, info)) in nft_trace_notify() 264 if (nft_verdict_dump(skb, NFTA_TRACE_VERDICT, verdict)) in nft_trace_notify() 268 v = verdict->code & NF_VERDICT_MASK; in nft_trace_notify()
|
D | nft_synproxy.c | 61 regs->verdict.code = NF_STOLEN; in nft_synproxy_eval_v4() 67 regs->verdict.code = NF_STOLEN; in nft_synproxy_eval_v4() 69 regs->verdict.code = NF_DROP; in nft_synproxy_eval_v4() 92 regs->verdict.code = NF_STOLEN; in nft_synproxy_eval_v6() 98 regs->verdict.code = NF_STOLEN; in nft_synproxy_eval_v6() 100 regs->verdict.code = NF_DROP; in nft_synproxy_eval_v6() 117 regs->verdict.code = NFT_BREAK; in nft_synproxy_do_eval() 122 regs->verdict.code = NF_DROP; in nft_synproxy_do_eval() 130 regs->verdict.code = NF_DROP; in nft_synproxy_do_eval() 135 regs->verdict.code = NF_DROP; in nft_synproxy_do_eval() [all …]
|
D | nfnetlink_queue.c | 236 unsigned int verdict, i = *index; in nf_iterate() local 241 verdict = nf_hook_entry_hookfn(hook, skb, state); in nf_iterate() 242 if (verdict != NF_ACCEPT) { in nf_iterate() 244 if (verdict != NF_REPEAT) in nf_iterate() 245 return verdict; in nf_iterate() 312 static void nf_reinject(struct nf_queue_entry *entry, unsigned int verdict) in nf_reinject() argument 337 if (verdict == NF_REPEAT) in nf_reinject() 338 verdict = nf_hook_entry_hookfn(hook_entry, skb, &entry->state); in nf_reinject() 340 if (verdict == NF_ACCEPT) { in nf_reinject() 342 verdict = NF_DROP; in nf_reinject() [all …]
|
D | nft_tproxy.c | 35 regs->verdict.code = NFT_BREAK; in nft_tproxy_eval_v4() 41 regs->verdict.code = NFT_BREAK; in nft_tproxy_eval_v4() 80 regs->verdict.code = NFT_BREAK; in nft_tproxy_eval_v4() 102 regs->verdict.code = NFT_BREAK; in nft_tproxy_eval_v6() 109 regs->verdict.code = NFT_BREAK; in nft_tproxy_eval_v6() 153 regs->verdict.code = NFT_BREAK; in nft_tproxy_eval_v6() 182 regs->verdict.code = NFT_BREAK; in nft_tproxy_eval()
|
D | nft_socket.c | 34 regs->verdict.code = NFT_BREAK; in nft_socket_wildcard() 123 regs->verdict.code = NFT_BREAK; in nft_socket_eval() 135 regs->verdict.code = NFT_BREAK; in nft_socket_eval() 141 regs->verdict.code = NFT_BREAK; in nft_socket_eval() 149 regs->verdict.code = NFT_BREAK; in nft_socket_eval() 156 regs->verdict.code = NFT_BREAK; in nft_socket_eval()
|
D | nft_xfrm.c | 127 regs->verdict.code = NFT_BREAK; in nft_xfrm_state_get_key() 156 regs->verdict.code = NFT_BREAK; in nft_xfrm_state_get_key() 167 regs->verdict.code = NFT_BREAK; in nft_xfrm_get_eval_in() 191 regs->verdict.code = NFT_BREAK; in nft_xfrm_get_eval_out() 209 regs->verdict.code = NFT_BREAK; in nft_xfrm_get_eval()
|
D | nft_ct_fast.c | 34 regs->verdict.code = NFT_BREAK; in nft_ct_get_fast_eval() 57 regs->verdict.code = NFT_BREAK; in nft_ct_get_fast_eval()
|
D | nft_osf.c | 32 regs->verdict.code = NFT_BREAK; in nft_osf_eval() 39 regs->verdict.code = NFT_BREAK; in nft_osf_eval() 43 regs->verdict.code = NFT_BREAK; in nft_osf_eval()
|
D | nf_queue.c | 236 unsigned int index, unsigned int verdict) in nf_queue() argument 240 ret = __nf_queue(skb, state, index, verdict >> NF_VERDICT_QBITS); in nf_queue() 243 (verdict & NF_VERDICT_FLAG_QUEUE_BYPASS)) in nf_queue()
|
/linux-6.12.1/samples/bpf/ |
D | test_cgrp2_attach.c | 43 static int prog_load(int map_fd, int verdict) in prog_load() argument 71 BPF_MOV64_IMM(BPF_REG_0, verdict), /* r0 = verdict */ in prog_load() 92 static int attach_filter(int cg_fd, int type, int verdict) in attach_filter() argument 105 prog_fd = prog_load(map_fd, verdict); in attach_filter() 136 int detach_only = 0, verdict = 1; in main() local 143 verdict = 0; in main() 174 ret = attach_filter(cg_fd, type, verdict); in main()
|
/linux-6.12.1/tools/testing/selftests/net/netfilter/ |
D | nf_queue.c | 24 uint32_t verdict; member 171 .verdict = htonl(verd), in nfq_build_verdict() 316 nlh = nfq_build_verdict(buf, id, opts.queue_num, opts.verdict); in mainloop() 347 opts.verdict = atoi(optarg); in parse_opts() 348 if (opts.verdict > 0xffff) { in parse_opts() 353 opts.verdict <<= 16; in parse_opts() 354 opts.verdict |= NF_QUEUE; in parse_opts() 375 if (opts.verdict != NF_ACCEPT && (opts.verdict >> 16 == opts.queue_num)) { in parse_opts() 385 opts.verdict = NF_ACCEPT; in main()
|
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/ |
D | sockmap_basic.c | 114 int err, map, verdict; in test_skmsg_helpers() local 120 verdict = bpf_program__fd(skel->progs.prog_msg_verdict); in test_skmsg_helpers() 123 err = bpf_prog_attach(verdict, map, BPF_SK_MSG_VERDICT, 0); in test_skmsg_helpers() 127 err = bpf_prog_detach2(verdict, map, BPF_SK_MSG_VERDICT); in test_skmsg_helpers() 337 int err, map, verdict; in test_sockmap_skb_verdict_attach() local 343 verdict = bpf_program__fd(skel->progs.prog_skb_verdict); in test_sockmap_skb_verdict_attach() 346 err = bpf_prog_attach(verdict, map, first, 0); in test_sockmap_skb_verdict_attach() 350 err = bpf_prog_attach(verdict, map, second, 0); in test_sockmap_skb_verdict_attach() 353 err = bpf_prog_detach2(verdict, map, first); in test_sockmap_skb_verdict_attach() 454 int n, err, map, verdict, c1 = -1, p1 = -1; in test_sockmap_skb_verdict_shutdown() local [all …]
|
D | sockmap_listen.c | 728 int verdict = bpf_program__fd(skel->progs.prog_stream_verdict); in test_skb_redir_to_connected() local 737 err = xbpf_prog_attach(verdict, sock_map, BPF_SK_SKB_STREAM_VERDICT, 0); in test_skb_redir_to_connected() 744 xbpf_prog_detach2(verdict, sock_map, BPF_SK_SKB_STREAM_VERDICT); in test_skb_redir_to_connected() 753 int verdict = bpf_program__fd(skel->progs.prog_msg_verdict); in test_msg_redir_to_connected() local 758 err = xbpf_prog_attach(verdict, sock_map, BPF_SK_MSG_VERDICT, 0); in test_msg_redir_to_connected() 764 xbpf_prog_detach2(verdict, sock_map, BPF_SK_MSG_VERDICT); in test_msg_redir_to_connected() 848 int verdict = bpf_program__fd(skel->progs.prog_stream_verdict); in test_skb_redir_to_listening() local 857 err = xbpf_prog_attach(verdict, sock_map, BPF_SK_SKB_STREAM_VERDICT, 0); in test_skb_redir_to_listening() 864 xbpf_prog_detach2(verdict, sock_map, BPF_SK_SKB_STREAM_VERDICT); in test_skb_redir_to_listening() 873 int verdict = bpf_program__fd(skel->progs.prog_msg_verdict); in test_msg_redir_to_listening() local [all …]
|
D | netns_cookie.c | 16 int err, val, ret, map, verdict; in test_netns_cookie() local 35 verdict = bpf_program__fd(skel->progs.get_netns_cookie_sk_msg); in test_netns_cookie() 37 err = bpf_prog_attach(verdict, map, BPF_SK_MSG_VERDICT, 0); in test_netns_cookie()
|
/linux-6.12.1/net/ipv4/netfilter/ |
D | iptable_mangle.c | 39 unsigned int ret, verdict; in ipt_mangle_out() local 54 verdict = ret & NF_VERDICT_MASK; in ipt_mangle_out() 56 if (verdict != NF_DROP && verdict != NF_STOLEN) { in ipt_mangle_out()
|
D | arp_tables.c | 189 unsigned int verdict = NF_DROP; in arpt_do_table() local 239 v = ((struct xt_standard_target *)t)->verdict; in arpt_do_table() 243 verdict = (unsigned int)(-v) - 1; in arpt_do_table() 258 verdict = NF_DROP; in arpt_do_table() 270 verdict = t->u.kernel.target->target(skb, &acpar); in arpt_do_table() 272 if (verdict == XT_CONTINUE) { in arpt_do_table() 287 return verdict; in arpt_do_table() 336 t->verdict < 0) || visited) { in mark_source_chains() 363 int newpos = t->verdict; in mark_source_chains() 440 unsigned int verdict; in check_underflow() local [all …]
|
/linux-6.12.1/net/ipv6/netfilter/ |
D | ip6table_mangle.c | 35 unsigned int ret, verdict; in ip6t_mangle_out() local 50 verdict = ret & NF_VERDICT_MASK; in ip6t_mangle_out() 52 if (verdict != NF_DROP && verdict != NF_STOLEN && in ip6t_mangle_out()
|
/linux-6.12.1/Documentation/bpf/ |
D | map_sockmap.rst | 14 the result of a BPF (verdict) program with the help of the BPF helpers 29 and a verdict program. The parser program determines how much data has been 30 parsed and therefore how much data needs to be queued to come to a verdict. The 31 verdict program is essentially the redirect program and can return a verdict 39 parse or verdict program. If adding a sock object to a map would result 64 There are additional helpers available to use with the parser and verdict 67 bytes the given verdict should apply to. The helper ``bpf_msg_cork_bytes()`` 68 handles a different case where a BPF program cannot reach a verdict on a msg 90 the message ``msg`` is allowed to pass (i.e., if the verdict BPF program 136 If the ``map`` has BPF programs (parser and verdict), those will be inherited [all …]
|
/linux-6.12.1/net/netfilter/ipvs/ |
D | ip_vs_core.c | 863 unsigned int verdict = NF_DROP; in handle_response_icmp() local 901 verdict = NF_ACCEPT; in handle_response_icmp() 906 return verdict; in handle_response_icmp() 1364 int verdict = ip_vs_out_icmp_v6(ipvs, skb, &related, in ip_vs_out_hook() local 1368 return verdict; in ip_vs_out_hook() 1374 int verdict = ip_vs_out_icmp(ipvs, skb, &related, hooknum); in ip_vs_out_hook() local 1377 return verdict; in ip_vs_out_hook() 1471 int *verdict, struct ip_vs_conn **cpp, in ip_vs_try_to_schedule() argument 1482 if (!pp->conn_schedule(ipvs, af, skb, pd, verdict, cpp, iph)) in ip_vs_try_to_schedule() 1496 *verdict = NF_ACCEPT; in ip_vs_try_to_schedule() [all …]
|