verdict          1934 drivers/ata/libata-eh.c 	unsigned int verdict = 0;
verdict          1943 drivers/ata/libata-eh.c 		verdict |= ATA_EH_SPDN_SPEED_DOWN |
verdict          1948 drivers/ata/libata-eh.c 		verdict |= ATA_EH_SPDN_NCQ_OFF | ATA_EH_SPDN_KEEP_ERRORS;
verdict          1953 drivers/ata/libata-eh.c 		verdict |= ATA_EH_SPDN_FALLBACK_TO_PIO;
verdict          1962 drivers/ata/libata-eh.c 		verdict |= ATA_EH_SPDN_NCQ_OFF;
verdict          1967 drivers/ata/libata-eh.c 		verdict |= ATA_EH_SPDN_SPEED_DOWN;
verdict          1969 drivers/ata/libata-eh.c 	return verdict;
verdict          1994 drivers/ata/libata-eh.c 	unsigned int verdict;
verdict          2003 drivers/ata/libata-eh.c 	verdict = ata_eh_speed_down_verdict(dev);
verdict          2006 drivers/ata/libata-eh.c 	if ((verdict & ATA_EH_SPDN_NCQ_OFF) &&
verdict          2015 drivers/ata/libata-eh.c 	if (verdict & ATA_EH_SPDN_SPEED_DOWN) {
verdict          2047 drivers/ata/libata-eh.c 	if ((verdict & ATA_EH_SPDN_FALLBACK_TO_PIO) && (dev->spdn_cnt >= 2) &&
verdict          2060 drivers/ata/libata-eh.c 	if (!(verdict & ATA_EH_SPDN_KEEP_ERRORS))
verdict            52 drivers/w1/slaves/w1_therm.c 	u8 verdict;
verdict           497 drivers/w1/slaves/w1_therm.c 		info->verdict = 0;
verdict           551 drivers/w1/slaves/w1_therm.c 					info->verdict = 1;
verdict           555 drivers/w1/slaves/w1_therm.c 		if (info->verdict)
verdict           584 drivers/w1/slaves/w1_therm.c 		      info.crc, (info.verdict) ? "YES" : "NO");
verdict           585 drivers/w1/slaves/w1_therm.c 	if (info.verdict)
verdict           615 drivers/w1/slaves/w1_therm.c 		if (!info.verdict) {
verdict            18 include/linux/netfilter.h static inline int NF_DROP_GETERR(int verdict)
verdict            20 include/linux/netfilter.h 	return -(verdict >> NF_VERDICT_QBITS);
verdict            40 include/linux/netfilter_arp/arp_tables.h 	.target.verdict	= -(__verdict) - 1,				       \
verdict            53 include/linux/netfilter_ipv4/ip_tables.h 	.target.verdict	= -(__verdict) - 1,				       \
verdict           435 include/net/ip_vs.h 			     int *verdict, struct ip_vs_conn **cpp,
verdict           791 include/net/ip_vs.h 			     int *verdict, struct ip_vs_conn **cpp);
verdict            35 include/net/netfilter/nf_queue.h void nf_reinject(struct nf_queue_entry *entry, unsigned int verdict);
verdict           125 include/net/netfilter/nf_queue.h 	     unsigned int index, unsigned int verdict);
verdict            85 include/net/netfilter/nf_tables.h 		struct nft_verdict	verdict;
verdict           100 include/net/netfilter/nf_tables.h 		struct nft_verdict	verdict;
verdict          1211 include/net/netfilter/nf_tables.h 	const struct nft_verdict	*verdict;
verdict          1218 include/net/netfilter/nf_tables.h 		    const struct nft_verdict *verdict,
verdict            70 include/uapi/linux/netfilter/nfnetlink_queue.h 	__be32 verdict;
verdict            67 include/uapi/linux/netfilter/x_tables.h 	int verdict;
verdict           164 include/uapi/linux/netfilter_bridge/ebtables.h 	int verdict;
verdict           153 include/uapi/linux/netfilter_ipv6/ip6_tables.h 	.target.verdict	= -(__verdict) - 1,				       \
verdict           204 net/bridge/br_input.c 	unsigned int verdict, i;
verdict           223 net/bridge/br_input.c 		verdict = nf_hook_entry_hookfn(&e->hooks[i], skb, &state);
verdict           224 net/bridge/br_input.c 		switch (verdict & NF_VERDICT_MASK) {
verdict           235 net/bridge/br_input.c 			ret = nf_queue(skb, &state, i, verdict);
verdict           188 net/bridge/netfilter/ebtables.c 	int verdict, sp = 0;
verdict           234 net/bridge/netfilter/ebtables.c 			verdict = ((struct ebt_standard_target *)t)->verdict;
verdict           238 net/bridge/netfilter/ebtables.c 			verdict = t->u.target->target(skb, &acpar);
verdict           240 net/bridge/netfilter/ebtables.c 		if (verdict == EBT_ACCEPT) {
verdict           244 net/bridge/netfilter/ebtables.c 		if (verdict == EBT_DROP) {
verdict           248 net/bridge/netfilter/ebtables.c 		if (verdict == EBT_RETURN) {
verdict           265 net/bridge/netfilter/ebtables.c 		if (verdict == EBT_CONTINUE)
verdict           268 net/bridge/netfilter/ebtables.c 		if (WARN(verdict < 0, "bogus standard verdict\n")) {
verdict           278 net/bridge/netfilter/ebtables.c 		chaininfo = (struct ebt_entries *) (base + verdict);
verdict           729 net/bridge/netfilter/ebtables.c 		if (((struct ebt_standard_target *)t)->verdict <
verdict           764 net/bridge/netfilter/ebtables.c 	int i, chain_nr = -1, pos = 0, nentries = chain->nentries, verdict;
verdict           792 net/bridge/netfilter/ebtables.c 		verdict = ((struct ebt_standard_target *)t)->verdict;
verdict           793 net/bridge/netfilter/ebtables.c 		if (verdict >= 0) { /* jump to another chain */
verdict           795 net/bridge/netfilter/ebtables.c 			   (struct ebt_entries *)(base + verdict);
verdict            66 net/bridge/netfilter/nft_meta_bridge.c 	regs->verdict.code = NFT_BREAK;
verdict           356 net/bridge/netfilter/nft_reject_bridge.c 	regs->verdict.code = NF_DROP;
verdict           612 net/core/skmsg.c static int sk_psock_map_verd(int verdict, bool redir)
verdict           614 net/core/skmsg.c 	switch (verdict) {
verdict           690 net/core/skmsg.c 				   struct sk_buff *skb, int verdict)
verdict           696 net/core/skmsg.c 	switch (verdict) {
verdict           188 net/ipv4/netfilter/arp_tables.c 	unsigned int verdict = NF_DROP;
verdict           238 net/ipv4/netfilter/arp_tables.c 			v = ((struct xt_standard_target *)t)->verdict;
verdict           242 net/ipv4/netfilter/arp_tables.c 					verdict = (unsigned int)(-v) - 1;
verdict           257 net/ipv4/netfilter/arp_tables.c 					verdict = NF_DROP;
verdict           269 net/ipv4/netfilter/arp_tables.c 		verdict = t->u.kernel.target->target(skb, &acpar);
verdict           271 net/ipv4/netfilter/arp_tables.c 		if (verdict == XT_CONTINUE) {
verdict           286 net/ipv4/netfilter/arp_tables.c 		return verdict;
verdict           335 net/ipv4/netfilter/arp_tables.c 			     t->verdict < 0) || visited) {
verdict           362 net/ipv4/netfilter/arp_tables.c 				int newpos = t->verdict;
verdict           439 net/ipv4/netfilter/arp_tables.c 	unsigned int verdict;
verdict           446 net/ipv4/netfilter/arp_tables.c 	verdict = ((struct xt_standard_target *)t)->verdict;
verdict           447 net/ipv4/netfilter/arp_tables.c 	verdict = -verdict - 1;
verdict           448 net/ipv4/netfilter/arp_tables.c 	return verdict == NF_DROP || verdict == NF_ACCEPT;
verdict           174 net/ipv4/netfilter/ip_tables.c 		   t->verdict < 0) {
verdict           233 net/ipv4/netfilter/ip_tables.c 	unsigned int verdict = NF_DROP;
verdict           314 net/ipv4/netfilter/ip_tables.c 			v = ((struct xt_standard_target *)t)->verdict;
verdict           318 net/ipv4/netfilter/ip_tables.c 					verdict = (unsigned int)(-v) - 1;
verdict           333 net/ipv4/netfilter/ip_tables.c 					verdict = NF_DROP;
verdict           346 net/ipv4/netfilter/ip_tables.c 		verdict = t->u.kernel.target->target(skb, &acpar);
verdict           347 net/ipv4/netfilter/ip_tables.c 		if (verdict == XT_CONTINUE) {
verdict           362 net/ipv4/netfilter/ip_tables.c 	else return verdict;
verdict           400 net/ipv4/netfilter/ip_tables.c 			     t->verdict < 0) || visited) {
verdict           426 net/ipv4/netfilter/ip_tables.c 				int newpos = t->verdict;
verdict           575 net/ipv4/netfilter/ip_tables.c 	unsigned int verdict;
verdict           582 net/ipv4/netfilter/ip_tables.c 	verdict = ((struct xt_standard_target *)t)->verdict;
verdict           583 net/ipv4/netfilter/ip_tables.c 	verdict = -verdict - 1;
verdict           584 net/ipv4/netfilter/ip_tables.c 	return verdict == NF_DROP || verdict == NF_ACCEPT;
verdict            58 net/ipv4/netfilter/iptable_filter.c 	((struct ipt_standard *)repl->entries)[1].target.verdict =
verdict            44 net/ipv4/netfilter/nft_fib_ipv4.c 		regs->verdict.code = NFT_BREAK;
verdict            94 net/ipv4/netfilter/nft_fib_ipv4.c 		regs->verdict.code = NFT_BREAK;
verdict            36 net/ipv4/netfilter/nft_reject_ipv4.c 	regs->verdict.code = NF_DROP;
verdict           199 net/ipv6/netfilter/ip6_tables.c 		    t->verdict < 0) {
verdict           257 net/ipv6/netfilter/ip6_tables.c 	unsigned int verdict = NF_DROP;
verdict           337 net/ipv6/netfilter/ip6_tables.c 			v = ((struct xt_standard_target *)t)->verdict;
verdict           341 net/ipv6/netfilter/ip6_tables.c 					verdict = (unsigned int)(-v) - 1;
verdict           354 net/ipv6/netfilter/ip6_tables.c 					verdict = NF_DROP;
verdict           367 net/ipv6/netfilter/ip6_tables.c 		verdict = t->u.kernel.target->target(skb, &acpar);
verdict           368 net/ipv6/netfilter/ip6_tables.c 		if (verdict == XT_CONTINUE)
verdict           380 net/ipv6/netfilter/ip6_tables.c 	else return verdict;
verdict           418 net/ipv6/netfilter/ip6_tables.c 			     t->verdict < 0) || visited) {
verdict           444 net/ipv6/netfilter/ip6_tables.c 				int newpos = t->verdict;
verdict           593 net/ipv6/netfilter/ip6_tables.c 	unsigned int verdict;
verdict           600 net/ipv6/netfilter/ip6_tables.c 	verdict = ((struct xt_standard_target *)t)->verdict;
verdict           601 net/ipv6/netfilter/ip6_tables.c 	verdict = -verdict - 1;
verdict           602 net/ipv6/netfilter/ip6_tables.c 	return verdict == NF_DROP || verdict == NF_ACCEPT;
verdict            59 net/ipv6/netfilter/ip6table_filter.c 	((struct ip6t_standard *)repl->entries)[1].target.verdict =
verdict           130 net/ipv6/netfilter/nft_fib_ipv6.c 		regs->verdict.code = NFT_BREAK;
verdict           160 net/ipv6/netfilter/nft_fib_ipv6.c 		regs->verdict.code = NFT_BREAK;
verdict            37 net/ipv6/netfilter/nft_reject_ipv6.c 	regs->verdict.code = NF_DROP;
verdict           508 net/netfilter/core.c 	unsigned int verdict;
verdict           512 net/netfilter/core.c 		verdict = nf_hook_entry_hookfn(&e->hooks[s], skb, state);
verdict           513 net/netfilter/core.c 		switch (verdict & NF_VERDICT_MASK) {
verdict           518 net/netfilter/core.c 			ret = NF_DROP_GETERR(verdict);
verdict           523 net/netfilter/core.c 			ret = nf_queue(skb, state, s, verdict);
verdict           881 net/netfilter/ipvs/ip_vs_core.c 	unsigned int verdict = NF_DROP;
verdict           920 net/netfilter/ipvs/ip_vs_core.c 	verdict = NF_ACCEPT;
verdict           925 net/netfilter/ipvs/ip_vs_core.c 	return verdict;
verdict          1382 net/netfilter/ipvs/ip_vs_core.c 			int verdict = ip_vs_out_icmp_v6(ipvs, skb, &related,
verdict          1386 net/netfilter/ipvs/ip_vs_core.c 				return verdict;
verdict          1392 net/netfilter/ipvs/ip_vs_core.c 			int verdict = ip_vs_out_icmp(ipvs, skb, &related, hooknum);
verdict          1395 net/netfilter/ipvs/ip_vs_core.c 				return verdict;
verdict          1547 net/netfilter/ipvs/ip_vs_core.c 		      int *verdict, struct ip_vs_conn **cpp,
verdict          1558 net/netfilter/ipvs/ip_vs_core.c 		if (!pp->conn_schedule(ipvs, af, skb, pd, verdict, cpp, iph))
verdict          1572 net/netfilter/ipvs/ip_vs_core.c 		*verdict = NF_ACCEPT;
verdict          1663 net/netfilter/ipvs/ip_vs_core.c 	unsigned int offset, offset2, ihl, verdict;
verdict          1790 net/netfilter/ipvs/ip_vs_core.c 	verdict = NF_DROP;
verdict          1850 net/netfilter/ipvs/ip_vs_core.c 		verdict = NF_STOLEN;
verdict          1859 net/netfilter/ipvs/ip_vs_core.c 	verdict = ip_vs_icmp_xmit(skb, cp, pp, offset, hooknum, &ciph);
verdict          1867 net/netfilter/ipvs/ip_vs_core.c 	return verdict;
verdict          1880 net/netfilter/ipvs/ip_vs_core.c 	unsigned int offset, verdict;
verdict          1947 net/netfilter/ipvs/ip_vs_core.c 		verdict = NF_ACCEPT;
verdict          1960 net/netfilter/ipvs/ip_vs_core.c 	verdict = ip_vs_icmp_xmit_v6(skb, cp, pp, offset, hooknum, &ciph);
verdict          1968 net/netfilter/ipvs/ip_vs_core.c 	return verdict;
verdict          2026 net/netfilter/ipvs/ip_vs_core.c 			int verdict = ip_vs_in_icmp_v6(ipvs, skb, &related,
verdict          2030 net/netfilter/ipvs/ip_vs_core.c 				return verdict;
verdict          2036 net/netfilter/ipvs/ip_vs_core.c 			int verdict = ip_vs_in_icmp(ipvs, skb, &related,
verdict          2040 net/netfilter/ipvs/ip_vs_core.c 				return verdict;
verdict           105 net/netfilter/ipvs/ip_vs_proto_ah_esp.c 		     int *verdict, struct ip_vs_conn **cpp,
verdict           111 net/netfilter/ipvs/ip_vs_proto_ah_esp.c 	*verdict = NF_ACCEPT;
verdict            18 net/netfilter/ipvs/ip_vs_proto_sctp.c 		   int *verdict, struct ip_vs_conn **cpp,
verdict            45 net/netfilter/ipvs/ip_vs_proto_sctp.c 		*verdict = NF_DROP;
verdict            63 net/netfilter/ipvs/ip_vs_proto_sctp.c 			*verdict = NF_DROP;
verdict            73 net/netfilter/ipvs/ip_vs_proto_sctp.c 				*verdict = ip_vs_leave(svc, skb, pd, iph);
verdict            75 net/netfilter/ipvs/ip_vs_proto_sctp.c 				*verdict = NF_DROP;
verdict            37 net/netfilter/ipvs/ip_vs_proto_tcp.c 		  int *verdict, struct ip_vs_conn **cpp,
verdict            61 net/netfilter/ipvs/ip_vs_proto_tcp.c 		*verdict = NF_DROP;
verdict            82 net/netfilter/ipvs/ip_vs_proto_tcp.c 			*verdict = NF_DROP;
verdict            93 net/netfilter/ipvs/ip_vs_proto_tcp.c 				*verdict = ip_vs_leave(svc, skb, pd, iph);
verdict            95 net/netfilter/ipvs/ip_vs_proto_tcp.c 				*verdict = NF_DROP;
verdict            33 net/netfilter/ipvs/ip_vs_proto_udp.c 		  int *verdict, struct ip_vs_conn **cpp,
verdict            51 net/netfilter/ipvs/ip_vs_proto_udp.c 		*verdict = NF_DROP;
verdict            70 net/netfilter/ipvs/ip_vs_proto_udp.c 			*verdict = NF_DROP;
verdict            81 net/netfilter/ipvs/ip_vs_proto_udp.c 				*verdict = ip_vs_leave(svc, skb, pd, iph);
verdict            83 net/netfilter/ipvs/ip_vs_proto_udp.c 				*verdict = NF_DROP;
verdict           702 net/netfilter/nf_nat_core.c 	unsigned int verdict = NF_ACCEPT;
verdict           716 net/netfilter/nf_nat_core.c 		verdict = nf_nat_manip_pkt(skb, ct, mtype, dir);
verdict           718 net/netfilter/nf_nat_core.c 	return verdict;
verdict           231 net/netfilter/nf_queue.c 	     unsigned int index, unsigned int verdict)
verdict           235 net/netfilter/nf_queue.c 	ret = __nf_queue(skb, state, index, verdict >> NF_VERDICT_QBITS);
verdict           238 net/netfilter/nf_queue.c 		    (verdict & NF_VERDICT_FLAG_QUEUE_BYPASS))
verdict           253 net/netfilter/nf_queue.c 	unsigned int verdict, i = *index;
verdict           258 net/netfilter/nf_queue.c 		verdict = nf_hook_entry_hookfn(hook, skb, state);
verdict           259 net/netfilter/nf_queue.c 		if (verdict != NF_ACCEPT) {
verdict           261 net/netfilter/nf_queue.c 			if (verdict != NF_REPEAT)
verdict           262 net/netfilter/nf_queue.c 				return verdict;
verdict           292 net/netfilter/nf_queue.c void nf_reinject(struct nf_queue_entry *entry, unsigned int verdict)
verdict           319 net/netfilter/nf_queue.c 	if (verdict == NF_REPEAT)
verdict           320 net/netfilter/nf_queue.c 		verdict = nf_hook_entry_hookfn(hook_entry, skb, &entry->state);
verdict           322 net/netfilter/nf_queue.c 	if (verdict == NF_ACCEPT) {
verdict           324 net/netfilter/nf_queue.c 			verdict = NF_DROP;
verdict           327 net/netfilter/nf_queue.c 	if (verdict == NF_ACCEPT) {
verdict           330 net/netfilter/nf_queue.c 		verdict = nf_iterate(skb, &entry->state, hooks, &i);
verdict           333 net/netfilter/nf_queue.c 	switch (verdict & NF_VERDICT_MASK) {
verdict           341 net/netfilter/nf_queue.c 		err = nf_queue(skb, &entry->state, i, verdict);
verdict          4627 net/netfilter/nf_tables_api.c 			    (data.verdict.code == NFT_GOTO ||
verdict          4628 net/netfilter/nf_tables_api.c 			     data.verdict.code == NFT_JUMP))
verdict          4776 net/netfilter/nf_tables_api.c 		switch (data->verdict.code) {
verdict          4779 net/netfilter/nf_tables_api.c 			data->verdict.chain->use++;
verdict          7241 net/netfilter/nf_tables_api.c 	switch (data->verdict.code) {
verdict          7244 net/netfilter/nf_tables_api.c 		return nf_tables_check_loops(ctx, data->verdict.chain);
verdict          7276 net/netfilter/nf_tables_api.c 			switch (data->verdict.code) {
verdict          7280 net/netfilter/nf_tables_api.c 							data->verdict.chain);
verdict          7435 net/netfilter/nf_tables_api.c 		    (data->verdict.code == NFT_GOTO ||
verdict          7436 net/netfilter/nf_tables_api.c 		     data->verdict.code == NFT_JUMP)) {
verdict          7437 net/netfilter/nf_tables_api.c 			err = nf_tables_check_loops(ctx, data->verdict.chain);
verdict          7480 net/netfilter/nf_tables_api.c 	data->verdict.code = ntohl(nla_get_be32(tb[NFTA_VERDICT_CODE]));
verdict          7482 net/netfilter/nf_tables_api.c 	switch (data->verdict.code) {
verdict          7484 net/netfilter/nf_tables_api.c 		switch (data->verdict.code & NF_VERDICT_MASK) {
verdict          7509 net/netfilter/nf_tables_api.c 		data->verdict.chain = chain;
verdict          7513 net/netfilter/nf_tables_api.c 	desc->len = sizeof(data->verdict);
verdict          7520 net/netfilter/nf_tables_api.c 	switch (data->verdict.code) {
verdict          7523 net/netfilter/nf_tables_api.c 		data->verdict.chain->use--;
verdict          7655 net/netfilter/nf_tables_api.c 		err = nft_verdict_dump(skb, NFTA_DATA_VERDICT, &data->verdict);
verdict            58 net/netfilter/nf_tables_core.c 	regs->verdict.code = NFT_BREAK;
verdict           164 net/netfilter/nf_tables_core.c 		nft_trace_init(&info, pkt, &regs.verdict, basechain);
verdict           173 net/netfilter/nf_tables_core.c 	regs.verdict.code = NFT_CONTINUE;
verdict           183 net/netfilter/nf_tables_core.c 			if (regs.verdict.code != NFT_CONTINUE)
verdict           187 net/netfilter/nf_tables_core.c 		switch (regs.verdict.code) {
verdict           189 net/netfilter/nf_tables_core.c 			regs.verdict.code = NFT_CONTINUE;
verdict           199 net/netfilter/nf_tables_core.c 	switch (regs.verdict.code & NF_VERDICT_MASK) {
verdict           206 net/netfilter/nf_tables_core.c 		return regs.verdict.code;
verdict           209 net/netfilter/nf_tables_core.c 	switch (regs.verdict.code) {
verdict           221 net/netfilter/nf_tables_core.c 		chain = regs.verdict.chain;
verdict           154 net/netfilter/nf_tables_trace.c 	    info->verdict->code == NFT_CONTINUE)
verdict           172 net/netfilter/nf_tables_trace.c 	switch (info->verdict->code) {
verdict           215 net/netfilter/nf_tables_trace.c 		size += nla_total_size(strlen(info->verdict->chain->name)); /* jump target */
verdict           255 net/netfilter/nf_tables_trace.c 		if (nft_verdict_dump(skb, NFTA_TRACE_VERDICT, info->verdict))
verdict           288 net/netfilter/nf_tables_trace.c 		    const struct nft_verdict *verdict,
verdict           295 net/netfilter/nf_tables_trace.c 	info->verdict = verdict;
verdict           226 net/netfilter/nfnetlink_queue.c static void nfqnl_reinject(struct nf_queue_entry *entry, unsigned int verdict)
verdict           231 net/netfilter/nfnetlink_queue.c 	if (verdict == NF_ACCEPT ||
verdict           232 net/netfilter/nfnetlink_queue.c 	    verdict == NF_REPEAT ||
verdict           233 net/netfilter/nfnetlink_queue.c 	    verdict == NF_STOP) {
verdict           239 net/netfilter/nfnetlink_queue.c 				verdict = NF_DROP;
verdict           243 net/netfilter/nfnetlink_queue.c 	nf_reinject(entry, verdict);
verdict          1042 net/netfilter/nfnetlink_queue.c 	unsigned int verdict;
verdict          1048 net/netfilter/nfnetlink_queue.c 	verdict = ntohl(vhdr->verdict) & NF_VERDICT_MASK;
verdict          1049 net/netfilter/nfnetlink_queue.c 	if (verdict > NF_MAX_VERDICT || verdict == NF_STOLEN)
verdict          1067 net/netfilter/nfnetlink_queue.c 	unsigned int verdict, maxid;
verdict          1083 net/netfilter/nfnetlink_queue.c 	verdict = ntohl(vhdr->verdict);
verdict          1104 net/netfilter/nfnetlink_queue.c 		nfqnl_reinject(entry, verdict);
verdict          1177 net/netfilter/nfnetlink_queue.c 	unsigned int verdict;
verdict          1194 net/netfilter/nfnetlink_queue.c 	verdict = ntohl(vhdr->verdict);
verdict          1220 net/netfilter/nfnetlink_queue.c 			verdict = NF_DROP;
verdict          1229 net/netfilter/nfnetlink_queue.c 	nfqnl_reinject(entry, verdict);
verdict            62 net/netfilter/nft_cmp.c 	regs->verdict.code = NFT_BREAK;
verdict            85 net/netfilter/nft_compat.c 		regs->verdict.code = NFT_CONTINUE;
verdict            88 net/netfilter/nft_compat.c 		regs->verdict.code = ret;
verdict           111 net/netfilter/nft_compat.c 		regs->verdict.code = NF_ACCEPT;
verdict           114 net/netfilter/nft_compat.c 		regs->verdict.code = NF_DROP;
verdict           117 net/netfilter/nft_compat.c 		regs->verdict.code = NFT_CONTINUE;
verdict           120 net/netfilter/nft_compat.c 		regs->verdict.code = NFT_RETURN;
verdict           123 net/netfilter/nft_compat.c 		regs->verdict.code = ret;
verdict           342 net/netfilter/nft_compat.c 		regs->verdict.code = NF_DROP;
verdict           348 net/netfilter/nft_compat.c 		regs->verdict.code = NFT_CONTINUE;
verdict           351 net/netfilter/nft_compat.c 		regs->verdict.code = NFT_BREAK;
verdict            42 net/netfilter/nft_connlimit.c 		regs->verdict.code = NF_DROP;
verdict            47 net/netfilter/nft_connlimit.c 		regs->verdict.code = NF_DROP;
verdict            54 net/netfilter/nft_connlimit.c 		regs->verdict.code = NFT_BREAK;
verdict           229 net/netfilter/nft_ct.c 	regs->verdict.code = NFT_BREAK;
verdict           269 net/netfilter/nft_ct.c 			regs->verdict.code = NF_DROP;
verdict           845 net/netfilter/nft_ct.c 			regs->verdict.code = NF_DROP;
verdict          1224 net/netfilter/nft_ct.c 		regs->verdict.code = NFT_BREAK;
verdict          1233 net/netfilter/nft_ct.c 		regs->verdict.code = NF_DROP;
verdict          1238 net/netfilter/nft_ct.c 		regs->verdict.code = NFT_BREAK;
verdict          1246 net/netfilter/nft_ct.c 		regs->verdict.code = NF_DROP;
verdict          1256 net/netfilter/nft_ct.c 		regs->verdict.code = NF_DROP;
verdict           108 net/netfilter/nft_dynset.c 			regs->verdict.code = NFT_BREAK;
verdict           113 net/netfilter/nft_dynset.c 		regs->verdict.code = NFT_BREAK;
verdict            59 net/netfilter/nft_exthdr.c 	regs->verdict.code = NFT_BREAK;
verdict           156 net/netfilter/nft_exthdr.c 	regs->verdict.code = NFT_BREAK;
verdict           219 net/netfilter/nft_exthdr.c 		regs->verdict.code = NFT_BREAK;
verdict            41 net/netfilter/nft_fib_inet.c 	regs->verdict.code = NF_DROP;
verdict            50 net/netfilter/nft_fib_netdev.c 	regs->verdict.code = NFT_BREAK;
verdict           141 net/netfilter/nft_flow_offload.c 	regs->verdict.code = NFT_BREAK;
verdict            35 net/netfilter/nft_fwd_netdev.c 	regs->verdict.code = NF_STOLEN;
verdict            93 net/netfilter/nft_fwd_netdev.c 	unsigned int verdict = NF_STOLEN;
verdict           103 net/netfilter/nft_fwd_netdev.c 			verdict = NFT_BREAK;
verdict           107 net/netfilter/nft_fwd_netdev.c 			verdict = NF_DROP;
verdict           119 net/netfilter/nft_fwd_netdev.c 			verdict = NFT_BREAK;
verdict           123 net/netfilter/nft_fwd_netdev.c 			verdict = NF_DROP;
verdict           132 net/netfilter/nft_fwd_netdev.c 		verdict = NFT_BREAK;
verdict           143 net/netfilter/nft_fwd_netdev.c 	regs->verdict.code = verdict;
verdict           112 net/netfilter/nft_immediate.c 	switch (data->verdict.code) {
verdict           116 net/netfilter/nft_immediate.c 		err = nft_chain_validate(ctx, data->verdict.chain);
verdict           138 net/netfilter/nft_immediate.c 	switch (data->verdict.code) {
verdict           136 net/netfilter/nft_limit.c 		regs->verdict.code = NFT_BREAK;
verdict           186 net/netfilter/nft_limit.c 		regs->verdict.code = NFT_BREAK;
verdict           246 net/netfilter/nft_limit.c 		regs->verdict.code = NFT_BREAK;
verdict           290 net/netfilter/nft_limit.c 		regs->verdict.code = NFT_BREAK;
verdict            38 net/netfilter/nft_lookup.c 		regs->verdict.code = NFT_BREAK;
verdict           178 net/netfilter/nft_lookup.c 	switch (data->verdict.code) {
verdict           182 net/netfilter/nft_lookup.c 		err = nft_chain_validate(ctx, data->verdict.chain);
verdict           117 net/netfilter/nft_masq.c 	regs->verdict.code = nf_nat_masquerade_ipv4(pkt->skb, nft_hook(pkt),
verdict           163 net/netfilter/nft_masq.c 	regs->verdict.code = nf_nat_masquerade_ipv6(pkt->skb, &range,
verdict           265 net/netfilter/nft_meta.c 	regs->verdict.code = NFT_BREAK;
verdict            71 net/netfilter/nft_nat.c 	regs->verdict.code = nf_nat_setup_info(ct, &range, priv->type);
verdict           115 net/netfilter/nft_objref.c 		regs->verdict.code = NFT_BREAK;
verdict            34 net/netfilter/nft_osf.c 		regs->verdict.code = NFT_BREAK;
verdict            38 net/netfilter/nft_osf.c 		regs->verdict.code = NFT_BREAK;
verdict           113 net/netfilter/nft_payload.c 	regs->verdict.code = NFT_BREAK;
verdict           544 net/netfilter/nft_payload.c 	regs->verdict.code = NFT_BREAK;
verdict            52 net/netfilter/nft_queue.c 	regs->verdict.code = ret;
verdict            68 net/netfilter/nft_queue.c 	regs->verdict.code = ret;
verdict            38 net/netfilter/nft_quota.c 		regs->verdict.code = NFT_BREAK;
verdict            58 net/netfilter/nft_quota.c 		regs->verdict.code = NFT_BREAK;
verdict            34 net/netfilter/nft_range.c 			regs->verdict.code = NFT_BREAK;
verdict            38 net/netfilter/nft_range.c 			regs->verdict.code = NFT_BREAK;
verdict           123 net/netfilter/nft_redir.c 	regs->verdict.code = nf_nat_redirect_ipv4(pkt->skb, &mr, nft_hook(pkt));
verdict           171 net/netfilter/nft_redir.c 	regs->verdict.code =
verdict            58 net/netfilter/nft_reject_inet.c 	regs->verdict.code = NF_DROP;
verdict           102 net/netfilter/nft_rt.c 	regs->verdict.code = NFT_BREAK;
verdict            41 net/netfilter/nft_socket.c 			regs->verdict.code = NFT_BREAK;
verdict            46 net/netfilter/nft_socket.c 		regs->verdict.code = NFT_BREAK;
verdict            58 net/netfilter/nft_socket.c 			regs->verdict.code = NFT_BREAK;
verdict            64 net/netfilter/nft_socket.c 		regs->verdict.code = NFT_BREAK;
verdict            61 net/netfilter/nft_synproxy.c 		regs->verdict.code = NF_STOLEN;
verdict            67 net/netfilter/nft_synproxy.c 			regs->verdict.code = NF_STOLEN;
verdict            69 net/netfilter/nft_synproxy.c 			regs->verdict.code = NF_DROP;
verdict            92 net/netfilter/nft_synproxy.c 		regs->verdict.code = NF_STOLEN;
verdict            98 net/netfilter/nft_synproxy.c 			regs->verdict.code = NF_STOLEN;
verdict           100 net/netfilter/nft_synproxy.c 			regs->verdict.code = NF_DROP;
verdict           117 net/netfilter/nft_synproxy.c 		regs->verdict.code = NFT_BREAK;
verdict           122 net/netfilter/nft_synproxy.c 		regs->verdict.code = NF_DROP;
verdict           130 net/netfilter/nft_synproxy.c 		regs->verdict.code = NF_DROP;
verdict           135 net/netfilter/nft_synproxy.c 		regs->verdict.code = NF_DROP;
verdict           149 net/netfilter/nft_synproxy.c 	regs->verdict.code = NFT_BREAK;
verdict            35 net/netfilter/nft_tproxy.c 		regs->verdict.code = NFT_BREAK;
verdict            74 net/netfilter/nft_tproxy.c 		regs->verdict.code = NFT_BREAK;
verdict            95 net/netfilter/nft_tproxy.c 		regs->verdict.code = NFT_BREAK;
verdict           102 net/netfilter/nft_tproxy.c 		regs->verdict.code = NFT_BREAK;
verdict           146 net/netfilter/nft_tproxy.c 		regs->verdict.code = NFT_BREAK;
verdict           175 net/netfilter/nft_tproxy.c 	regs->verdict.code = NFT_BREAK;
verdict            48 net/netfilter/nft_tunnel.c 			regs->verdict.code = NFT_BREAK;
verdict            58 net/netfilter/nft_tunnel.c 			regs->verdict.code = NFT_BREAK;
verdict            62 net/netfilter/nft_tunnel.c 		regs->verdict.code = NFT_BREAK;
verdict           126 net/netfilter/nft_xfrm.c 		regs->verdict.code = NFT_BREAK;
verdict           155 net/netfilter/nft_xfrm.c 	regs->verdict.code = NFT_BREAK;
verdict           166 net/netfilter/nft_xfrm.c 		regs->verdict.code = NFT_BREAK;
verdict           190 net/netfilter/nft_xfrm.c 	regs->verdict.code = NFT_BREAK;
verdict           208 net/netfilter/nft_xfrm.c 		regs->verdict.code = NFT_BREAK;
verdict           611 net/netfilter/x_tables.c static bool verdict_ok(int verdict)
verdict           613 net/netfilter/x_tables.c 	if (verdict > 0)
verdict           616 net/netfilter/x_tables.c 	if (verdict < 0) {
verdict           617 net/netfilter/x_tables.c 		int v = -verdict - 1;
verdict           619 net/netfilter/x_tables.c 		if (verdict == XT_RETURN)
verdict           793 net/netfilter/x_tables.c 	compat_uint_t verdict;
verdict           828 net/netfilter/x_tables.c 		if (!verdict_ok(st->verdict))
verdict           922 net/netfilter/x_tables.c 		if (!verdict_ok(st->verdict))
verdict            42 samples/bpf/test_cgrp2_attach.c static int prog_load(int map_fd, int verdict)
verdict            69 samples/bpf/test_cgrp2_attach.c 		BPF_MOV64_IMM(BPF_REG_0, verdict), /* r0 = verdict */
verdict            87 samples/bpf/test_cgrp2_attach.c static int attach_filter(int cg_fd, int type, int verdict)
verdict           100 samples/bpf/test_cgrp2_attach.c 	prog_fd = prog_load(map_fd, verdict);
verdict           131 samples/bpf/test_cgrp2_attach.c 	int detach_only = 0, verdict = 1;
verdict           138 samples/bpf/test_cgrp2_attach.c 			verdict = 0;
verdict           169 samples/bpf/test_cgrp2_attach.c 		ret = attach_filter(cg_fd, type, verdict);
verdict            51 tools/testing/selftests/bpf/test_cgroup_attach.c static int prog_load(int verdict)
verdict            55 tools/testing/selftests/bpf/test_cgroup_attach.c 		BPF_MOV64_IMM(BPF_REG_0, verdict), /* r0 = verdict */
verdict           219 tools/testing/selftests/bpf/test_cgroup_attach.c static int prog_load_cnt(int verdict, int val)
verdict           269 tools/testing/selftests/bpf/test_cgroup_attach.c 		BPF_MOV64_IMM(BPF_REG_0, verdict), /* r0 = verdict */