verdict 1934 drivers/ata/libata-eh.c unsigned int verdict = 0; verdict 1943 drivers/ata/libata-eh.c verdict |= ATA_EH_SPDN_SPEED_DOWN | verdict 1948 drivers/ata/libata-eh.c verdict |= ATA_EH_SPDN_NCQ_OFF | ATA_EH_SPDN_KEEP_ERRORS; verdict 1953 drivers/ata/libata-eh.c verdict |= ATA_EH_SPDN_FALLBACK_TO_PIO; verdict 1962 drivers/ata/libata-eh.c verdict |= ATA_EH_SPDN_NCQ_OFF; verdict 1967 drivers/ata/libata-eh.c verdict |= ATA_EH_SPDN_SPEED_DOWN; verdict 1969 drivers/ata/libata-eh.c return verdict; verdict 1994 drivers/ata/libata-eh.c unsigned int verdict; verdict 2003 drivers/ata/libata-eh.c verdict = ata_eh_speed_down_verdict(dev); verdict 2006 drivers/ata/libata-eh.c if ((verdict & ATA_EH_SPDN_NCQ_OFF) && verdict 2015 drivers/ata/libata-eh.c if (verdict & ATA_EH_SPDN_SPEED_DOWN) { verdict 2047 drivers/ata/libata-eh.c if ((verdict & ATA_EH_SPDN_FALLBACK_TO_PIO) && (dev->spdn_cnt >= 2) && verdict 2060 drivers/ata/libata-eh.c if (!(verdict & ATA_EH_SPDN_KEEP_ERRORS)) verdict 52 drivers/w1/slaves/w1_therm.c u8 verdict; verdict 497 drivers/w1/slaves/w1_therm.c info->verdict = 0; verdict 551 drivers/w1/slaves/w1_therm.c info->verdict = 1; verdict 555 drivers/w1/slaves/w1_therm.c if (info->verdict) verdict 584 drivers/w1/slaves/w1_therm.c info.crc, (info.verdict) ? "YES" : "NO"); verdict 585 drivers/w1/slaves/w1_therm.c if (info.verdict) verdict 615 drivers/w1/slaves/w1_therm.c if (!info.verdict) { verdict 18 include/linux/netfilter.h static inline int NF_DROP_GETERR(int verdict) verdict 20 include/linux/netfilter.h return -(verdict >> NF_VERDICT_QBITS); verdict 40 include/linux/netfilter_arp/arp_tables.h .target.verdict = -(__verdict) - 1, \ verdict 53 include/linux/netfilter_ipv4/ip_tables.h .target.verdict = -(__verdict) - 1, \ verdict 435 include/net/ip_vs.h int *verdict, struct ip_vs_conn **cpp, verdict 791 include/net/ip_vs.h int *verdict, struct ip_vs_conn **cpp); verdict 35 include/net/netfilter/nf_queue.h void nf_reinject(struct nf_queue_entry *entry, unsigned int verdict); verdict 125 include/net/netfilter/nf_queue.h unsigned int index, unsigned int verdict); verdict 85 include/net/netfilter/nf_tables.h struct nft_verdict verdict; verdict 100 include/net/netfilter/nf_tables.h struct nft_verdict verdict; verdict 1211 include/net/netfilter/nf_tables.h const struct nft_verdict *verdict; verdict 1218 include/net/netfilter/nf_tables.h const struct nft_verdict *verdict, verdict 70 include/uapi/linux/netfilter/nfnetlink_queue.h __be32 verdict; verdict 67 include/uapi/linux/netfilter/x_tables.h int verdict; verdict 164 include/uapi/linux/netfilter_bridge/ebtables.h int verdict; verdict 153 include/uapi/linux/netfilter_ipv6/ip6_tables.h .target.verdict = -(__verdict) - 1, \ verdict 204 net/bridge/br_input.c unsigned int verdict, i; verdict 223 net/bridge/br_input.c verdict = nf_hook_entry_hookfn(&e->hooks[i], skb, &state); verdict 224 net/bridge/br_input.c switch (verdict & NF_VERDICT_MASK) { verdict 235 net/bridge/br_input.c ret = nf_queue(skb, &state, i, verdict); verdict 188 net/bridge/netfilter/ebtables.c int verdict, sp = 0; verdict 234 net/bridge/netfilter/ebtables.c verdict = ((struct ebt_standard_target *)t)->verdict; verdict 238 net/bridge/netfilter/ebtables.c verdict = t->u.target->target(skb, &acpar); verdict 240 net/bridge/netfilter/ebtables.c if (verdict == EBT_ACCEPT) { verdict 244 net/bridge/netfilter/ebtables.c if (verdict == EBT_DROP) { verdict 248 net/bridge/netfilter/ebtables.c if (verdict == EBT_RETURN) { verdict 265 net/bridge/netfilter/ebtables.c if (verdict == EBT_CONTINUE) verdict 268 net/bridge/netfilter/ebtables.c if (WARN(verdict < 0, "bogus standard verdict\n")) { verdict 278 net/bridge/netfilter/ebtables.c chaininfo = (struct ebt_entries *) (base + verdict); verdict 729 net/bridge/netfilter/ebtables.c if (((struct ebt_standard_target *)t)->verdict < verdict 764 net/bridge/netfilter/ebtables.c int i, chain_nr = -1, pos = 0, nentries = chain->nentries, verdict; verdict 792 net/bridge/netfilter/ebtables.c verdict = ((struct ebt_standard_target *)t)->verdict; verdict 793 net/bridge/netfilter/ebtables.c if (verdict >= 0) { /* jump to another chain */ verdict 795 net/bridge/netfilter/ebtables.c (struct ebt_entries *)(base + verdict); verdict 66 net/bridge/netfilter/nft_meta_bridge.c regs->verdict.code = NFT_BREAK; verdict 356 net/bridge/netfilter/nft_reject_bridge.c regs->verdict.code = NF_DROP; verdict 612 net/core/skmsg.c static int sk_psock_map_verd(int verdict, bool redir) verdict 614 net/core/skmsg.c switch (verdict) { verdict 690 net/core/skmsg.c struct sk_buff *skb, int verdict) verdict 696 net/core/skmsg.c switch (verdict) { verdict 188 net/ipv4/netfilter/arp_tables.c unsigned int verdict = NF_DROP; verdict 238 net/ipv4/netfilter/arp_tables.c v = ((struct xt_standard_target *)t)->verdict; verdict 242 net/ipv4/netfilter/arp_tables.c verdict = (unsigned int)(-v) - 1; verdict 257 net/ipv4/netfilter/arp_tables.c verdict = NF_DROP; verdict 269 net/ipv4/netfilter/arp_tables.c verdict = t->u.kernel.target->target(skb, &acpar); verdict 271 net/ipv4/netfilter/arp_tables.c if (verdict == XT_CONTINUE) { verdict 286 net/ipv4/netfilter/arp_tables.c return verdict; verdict 335 net/ipv4/netfilter/arp_tables.c t->verdict < 0) || visited) { verdict 362 net/ipv4/netfilter/arp_tables.c int newpos = t->verdict; verdict 439 net/ipv4/netfilter/arp_tables.c unsigned int verdict; verdict 446 net/ipv4/netfilter/arp_tables.c verdict = ((struct xt_standard_target *)t)->verdict; verdict 447 net/ipv4/netfilter/arp_tables.c verdict = -verdict - 1; verdict 448 net/ipv4/netfilter/arp_tables.c return verdict == NF_DROP || verdict == NF_ACCEPT; verdict 174 net/ipv4/netfilter/ip_tables.c t->verdict < 0) { verdict 233 net/ipv4/netfilter/ip_tables.c unsigned int verdict = NF_DROP; verdict 314 net/ipv4/netfilter/ip_tables.c v = ((struct xt_standard_target *)t)->verdict; verdict 318 net/ipv4/netfilter/ip_tables.c verdict = (unsigned int)(-v) - 1; verdict 333 net/ipv4/netfilter/ip_tables.c verdict = NF_DROP; verdict 346 net/ipv4/netfilter/ip_tables.c verdict = t->u.kernel.target->target(skb, &acpar); verdict 347 net/ipv4/netfilter/ip_tables.c if (verdict == XT_CONTINUE) { verdict 362 net/ipv4/netfilter/ip_tables.c else return verdict; verdict 400 net/ipv4/netfilter/ip_tables.c t->verdict < 0) || visited) { verdict 426 net/ipv4/netfilter/ip_tables.c int newpos = t->verdict; verdict 575 net/ipv4/netfilter/ip_tables.c unsigned int verdict; verdict 582 net/ipv4/netfilter/ip_tables.c verdict = ((struct xt_standard_target *)t)->verdict; verdict 583 net/ipv4/netfilter/ip_tables.c verdict = -verdict - 1; verdict 584 net/ipv4/netfilter/ip_tables.c return verdict == NF_DROP || verdict == NF_ACCEPT; verdict 58 net/ipv4/netfilter/iptable_filter.c ((struct ipt_standard *)repl->entries)[1].target.verdict = verdict 44 net/ipv4/netfilter/nft_fib_ipv4.c regs->verdict.code = NFT_BREAK; verdict 94 net/ipv4/netfilter/nft_fib_ipv4.c regs->verdict.code = NFT_BREAK; verdict 36 net/ipv4/netfilter/nft_reject_ipv4.c regs->verdict.code = NF_DROP; verdict 199 net/ipv6/netfilter/ip6_tables.c t->verdict < 0) { verdict 257 net/ipv6/netfilter/ip6_tables.c unsigned int verdict = NF_DROP; verdict 337 net/ipv6/netfilter/ip6_tables.c v = ((struct xt_standard_target *)t)->verdict; verdict 341 net/ipv6/netfilter/ip6_tables.c verdict = (unsigned int)(-v) - 1; verdict 354 net/ipv6/netfilter/ip6_tables.c verdict = NF_DROP; verdict 367 net/ipv6/netfilter/ip6_tables.c verdict = t->u.kernel.target->target(skb, &acpar); verdict 368 net/ipv6/netfilter/ip6_tables.c if (verdict == XT_CONTINUE) verdict 380 net/ipv6/netfilter/ip6_tables.c else return verdict; verdict 418 net/ipv6/netfilter/ip6_tables.c t->verdict < 0) || visited) { verdict 444 net/ipv6/netfilter/ip6_tables.c int newpos = t->verdict; verdict 593 net/ipv6/netfilter/ip6_tables.c unsigned int verdict; verdict 600 net/ipv6/netfilter/ip6_tables.c verdict = ((struct xt_standard_target *)t)->verdict; verdict 601 net/ipv6/netfilter/ip6_tables.c verdict = -verdict - 1; verdict 602 net/ipv6/netfilter/ip6_tables.c return verdict == NF_DROP || verdict == NF_ACCEPT; verdict 59 net/ipv6/netfilter/ip6table_filter.c ((struct ip6t_standard *)repl->entries)[1].target.verdict = verdict 130 net/ipv6/netfilter/nft_fib_ipv6.c regs->verdict.code = NFT_BREAK; verdict 160 net/ipv6/netfilter/nft_fib_ipv6.c regs->verdict.code = NFT_BREAK; verdict 37 net/ipv6/netfilter/nft_reject_ipv6.c regs->verdict.code = NF_DROP; verdict 508 net/netfilter/core.c unsigned int verdict; verdict 512 net/netfilter/core.c verdict = nf_hook_entry_hookfn(&e->hooks[s], skb, state); verdict 513 net/netfilter/core.c switch (verdict & NF_VERDICT_MASK) { verdict 518 net/netfilter/core.c ret = NF_DROP_GETERR(verdict); verdict 523 net/netfilter/core.c ret = nf_queue(skb, state, s, verdict); verdict 881 net/netfilter/ipvs/ip_vs_core.c unsigned int verdict = NF_DROP; verdict 920 net/netfilter/ipvs/ip_vs_core.c verdict = NF_ACCEPT; verdict 925 net/netfilter/ipvs/ip_vs_core.c return verdict; verdict 1382 net/netfilter/ipvs/ip_vs_core.c int verdict = ip_vs_out_icmp_v6(ipvs, skb, &related, verdict 1386 net/netfilter/ipvs/ip_vs_core.c return verdict; verdict 1392 net/netfilter/ipvs/ip_vs_core.c int verdict = ip_vs_out_icmp(ipvs, skb, &related, hooknum); verdict 1395 net/netfilter/ipvs/ip_vs_core.c return verdict; verdict 1547 net/netfilter/ipvs/ip_vs_core.c int *verdict, struct ip_vs_conn **cpp, verdict 1558 net/netfilter/ipvs/ip_vs_core.c if (!pp->conn_schedule(ipvs, af, skb, pd, verdict, cpp, iph)) verdict 1572 net/netfilter/ipvs/ip_vs_core.c *verdict = NF_ACCEPT; verdict 1663 net/netfilter/ipvs/ip_vs_core.c unsigned int offset, offset2, ihl, verdict; verdict 1790 net/netfilter/ipvs/ip_vs_core.c verdict = NF_DROP; verdict 1850 net/netfilter/ipvs/ip_vs_core.c verdict = NF_STOLEN; verdict 1859 net/netfilter/ipvs/ip_vs_core.c verdict = ip_vs_icmp_xmit(skb, cp, pp, offset, hooknum, &ciph); verdict 1867 net/netfilter/ipvs/ip_vs_core.c return verdict; verdict 1880 net/netfilter/ipvs/ip_vs_core.c unsigned int offset, verdict; verdict 1947 net/netfilter/ipvs/ip_vs_core.c verdict = NF_ACCEPT; verdict 1960 net/netfilter/ipvs/ip_vs_core.c verdict = ip_vs_icmp_xmit_v6(skb, cp, pp, offset, hooknum, &ciph); verdict 1968 net/netfilter/ipvs/ip_vs_core.c return verdict; verdict 2026 net/netfilter/ipvs/ip_vs_core.c int verdict = ip_vs_in_icmp_v6(ipvs, skb, &related, verdict 2030 net/netfilter/ipvs/ip_vs_core.c return verdict; verdict 2036 net/netfilter/ipvs/ip_vs_core.c int verdict = ip_vs_in_icmp(ipvs, skb, &related, verdict 2040 net/netfilter/ipvs/ip_vs_core.c return verdict; verdict 105 net/netfilter/ipvs/ip_vs_proto_ah_esp.c int *verdict, struct ip_vs_conn **cpp, verdict 111 net/netfilter/ipvs/ip_vs_proto_ah_esp.c *verdict = NF_ACCEPT; verdict 18 net/netfilter/ipvs/ip_vs_proto_sctp.c int *verdict, struct ip_vs_conn **cpp, verdict 45 net/netfilter/ipvs/ip_vs_proto_sctp.c *verdict = NF_DROP; verdict 63 net/netfilter/ipvs/ip_vs_proto_sctp.c *verdict = NF_DROP; verdict 73 net/netfilter/ipvs/ip_vs_proto_sctp.c *verdict = ip_vs_leave(svc, skb, pd, iph); verdict 75 net/netfilter/ipvs/ip_vs_proto_sctp.c *verdict = NF_DROP; verdict 37 net/netfilter/ipvs/ip_vs_proto_tcp.c int *verdict, struct ip_vs_conn **cpp, verdict 61 net/netfilter/ipvs/ip_vs_proto_tcp.c *verdict = NF_DROP; verdict 82 net/netfilter/ipvs/ip_vs_proto_tcp.c *verdict = NF_DROP; verdict 93 net/netfilter/ipvs/ip_vs_proto_tcp.c *verdict = ip_vs_leave(svc, skb, pd, iph); verdict 95 net/netfilter/ipvs/ip_vs_proto_tcp.c *verdict = NF_DROP; verdict 33 net/netfilter/ipvs/ip_vs_proto_udp.c int *verdict, struct ip_vs_conn **cpp, verdict 51 net/netfilter/ipvs/ip_vs_proto_udp.c *verdict = NF_DROP; verdict 70 net/netfilter/ipvs/ip_vs_proto_udp.c *verdict = NF_DROP; verdict 81 net/netfilter/ipvs/ip_vs_proto_udp.c *verdict = ip_vs_leave(svc, skb, pd, iph); verdict 83 net/netfilter/ipvs/ip_vs_proto_udp.c *verdict = NF_DROP; verdict 702 net/netfilter/nf_nat_core.c unsigned int verdict = NF_ACCEPT; verdict 716 net/netfilter/nf_nat_core.c verdict = nf_nat_manip_pkt(skb, ct, mtype, dir); verdict 718 net/netfilter/nf_nat_core.c return verdict; verdict 231 net/netfilter/nf_queue.c unsigned int index, unsigned int verdict) verdict 235 net/netfilter/nf_queue.c ret = __nf_queue(skb, state, index, verdict >> NF_VERDICT_QBITS); verdict 238 net/netfilter/nf_queue.c (verdict & NF_VERDICT_FLAG_QUEUE_BYPASS)) verdict 253 net/netfilter/nf_queue.c unsigned int verdict, i = *index; verdict 258 net/netfilter/nf_queue.c verdict = nf_hook_entry_hookfn(hook, skb, state); verdict 259 net/netfilter/nf_queue.c if (verdict != NF_ACCEPT) { verdict 261 net/netfilter/nf_queue.c if (verdict != NF_REPEAT) verdict 262 net/netfilter/nf_queue.c return verdict; verdict 292 net/netfilter/nf_queue.c void nf_reinject(struct nf_queue_entry *entry, unsigned int verdict) verdict 319 net/netfilter/nf_queue.c if (verdict == NF_REPEAT) verdict 320 net/netfilter/nf_queue.c verdict = nf_hook_entry_hookfn(hook_entry, skb, &entry->state); verdict 322 net/netfilter/nf_queue.c if (verdict == NF_ACCEPT) { verdict 324 net/netfilter/nf_queue.c verdict = NF_DROP; verdict 327 net/netfilter/nf_queue.c if (verdict == NF_ACCEPT) { verdict 330 net/netfilter/nf_queue.c verdict = nf_iterate(skb, &entry->state, hooks, &i); verdict 333 net/netfilter/nf_queue.c switch (verdict & NF_VERDICT_MASK) { verdict 341 net/netfilter/nf_queue.c err = nf_queue(skb, &entry->state, i, verdict); verdict 4627 net/netfilter/nf_tables_api.c (data.verdict.code == NFT_GOTO || verdict 4628 net/netfilter/nf_tables_api.c data.verdict.code == NFT_JUMP)) verdict 4776 net/netfilter/nf_tables_api.c switch (data->verdict.code) { verdict 4779 net/netfilter/nf_tables_api.c data->verdict.chain->use++; verdict 7241 net/netfilter/nf_tables_api.c switch (data->verdict.code) { verdict 7244 net/netfilter/nf_tables_api.c return nf_tables_check_loops(ctx, data->verdict.chain); verdict 7276 net/netfilter/nf_tables_api.c switch (data->verdict.code) { verdict 7280 net/netfilter/nf_tables_api.c data->verdict.chain); verdict 7435 net/netfilter/nf_tables_api.c (data->verdict.code == NFT_GOTO || verdict 7436 net/netfilter/nf_tables_api.c data->verdict.code == NFT_JUMP)) { verdict 7437 net/netfilter/nf_tables_api.c err = nf_tables_check_loops(ctx, data->verdict.chain); verdict 7480 net/netfilter/nf_tables_api.c data->verdict.code = ntohl(nla_get_be32(tb[NFTA_VERDICT_CODE])); verdict 7482 net/netfilter/nf_tables_api.c switch (data->verdict.code) { verdict 7484 net/netfilter/nf_tables_api.c switch (data->verdict.code & NF_VERDICT_MASK) { verdict 7509 net/netfilter/nf_tables_api.c data->verdict.chain = chain; verdict 7513 net/netfilter/nf_tables_api.c desc->len = sizeof(data->verdict); verdict 7520 net/netfilter/nf_tables_api.c switch (data->verdict.code) { verdict 7523 net/netfilter/nf_tables_api.c data->verdict.chain->use--; verdict 7655 net/netfilter/nf_tables_api.c err = nft_verdict_dump(skb, NFTA_DATA_VERDICT, &data->verdict); verdict 58 net/netfilter/nf_tables_core.c regs->verdict.code = NFT_BREAK; verdict 164 net/netfilter/nf_tables_core.c nft_trace_init(&info, pkt, ®s.verdict, basechain); verdict 173 net/netfilter/nf_tables_core.c regs.verdict.code = NFT_CONTINUE; verdict 183 net/netfilter/nf_tables_core.c if (regs.verdict.code != NFT_CONTINUE) verdict 187 net/netfilter/nf_tables_core.c switch (regs.verdict.code) { verdict 189 net/netfilter/nf_tables_core.c regs.verdict.code = NFT_CONTINUE; verdict 199 net/netfilter/nf_tables_core.c switch (regs.verdict.code & NF_VERDICT_MASK) { verdict 206 net/netfilter/nf_tables_core.c return regs.verdict.code; verdict 209 net/netfilter/nf_tables_core.c switch (regs.verdict.code) { verdict 221 net/netfilter/nf_tables_core.c chain = regs.verdict.chain; verdict 154 net/netfilter/nf_tables_trace.c info->verdict->code == NFT_CONTINUE) verdict 172 net/netfilter/nf_tables_trace.c switch (info->verdict->code) { verdict 215 net/netfilter/nf_tables_trace.c size += nla_total_size(strlen(info->verdict->chain->name)); /* jump target */ verdict 255 net/netfilter/nf_tables_trace.c if (nft_verdict_dump(skb, NFTA_TRACE_VERDICT, info->verdict)) verdict 288 net/netfilter/nf_tables_trace.c const struct nft_verdict *verdict, verdict 295 net/netfilter/nf_tables_trace.c info->verdict = verdict; verdict 226 net/netfilter/nfnetlink_queue.c static void nfqnl_reinject(struct nf_queue_entry *entry, unsigned int verdict) verdict 231 net/netfilter/nfnetlink_queue.c if (verdict == NF_ACCEPT || verdict 232 net/netfilter/nfnetlink_queue.c verdict == NF_REPEAT || verdict 233 net/netfilter/nfnetlink_queue.c verdict == NF_STOP) { verdict 239 net/netfilter/nfnetlink_queue.c verdict = NF_DROP; verdict 243 net/netfilter/nfnetlink_queue.c nf_reinject(entry, verdict); verdict 1042 net/netfilter/nfnetlink_queue.c unsigned int verdict; verdict 1048 net/netfilter/nfnetlink_queue.c verdict = ntohl(vhdr->verdict) & NF_VERDICT_MASK; verdict 1049 net/netfilter/nfnetlink_queue.c if (verdict > NF_MAX_VERDICT || verdict == NF_STOLEN) verdict 1067 net/netfilter/nfnetlink_queue.c unsigned int verdict, maxid; verdict 1083 net/netfilter/nfnetlink_queue.c verdict = ntohl(vhdr->verdict); verdict 1104 net/netfilter/nfnetlink_queue.c nfqnl_reinject(entry, verdict); verdict 1177 net/netfilter/nfnetlink_queue.c unsigned int verdict; verdict 1194 net/netfilter/nfnetlink_queue.c verdict = ntohl(vhdr->verdict); verdict 1220 net/netfilter/nfnetlink_queue.c verdict = NF_DROP; verdict 1229 net/netfilter/nfnetlink_queue.c nfqnl_reinject(entry, verdict); verdict 62 net/netfilter/nft_cmp.c regs->verdict.code = NFT_BREAK; verdict 85 net/netfilter/nft_compat.c regs->verdict.code = NFT_CONTINUE; verdict 88 net/netfilter/nft_compat.c regs->verdict.code = ret; verdict 111 net/netfilter/nft_compat.c regs->verdict.code = NF_ACCEPT; verdict 114 net/netfilter/nft_compat.c regs->verdict.code = NF_DROP; verdict 117 net/netfilter/nft_compat.c regs->verdict.code = NFT_CONTINUE; verdict 120 net/netfilter/nft_compat.c regs->verdict.code = NFT_RETURN; verdict 123 net/netfilter/nft_compat.c regs->verdict.code = ret; verdict 342 net/netfilter/nft_compat.c regs->verdict.code = NF_DROP; verdict 348 net/netfilter/nft_compat.c regs->verdict.code = NFT_CONTINUE; verdict 351 net/netfilter/nft_compat.c regs->verdict.code = NFT_BREAK; verdict 42 net/netfilter/nft_connlimit.c regs->verdict.code = NF_DROP; verdict 47 net/netfilter/nft_connlimit.c regs->verdict.code = NF_DROP; verdict 54 net/netfilter/nft_connlimit.c regs->verdict.code = NFT_BREAK; verdict 229 net/netfilter/nft_ct.c regs->verdict.code = NFT_BREAK; verdict 269 net/netfilter/nft_ct.c regs->verdict.code = NF_DROP; verdict 845 net/netfilter/nft_ct.c regs->verdict.code = NF_DROP; verdict 1224 net/netfilter/nft_ct.c regs->verdict.code = NFT_BREAK; verdict 1233 net/netfilter/nft_ct.c regs->verdict.code = NF_DROP; verdict 1238 net/netfilter/nft_ct.c regs->verdict.code = NFT_BREAK; verdict 1246 net/netfilter/nft_ct.c regs->verdict.code = NF_DROP; verdict 1256 net/netfilter/nft_ct.c regs->verdict.code = NF_DROP; verdict 108 net/netfilter/nft_dynset.c regs->verdict.code = NFT_BREAK; verdict 113 net/netfilter/nft_dynset.c regs->verdict.code = NFT_BREAK; verdict 59 net/netfilter/nft_exthdr.c regs->verdict.code = NFT_BREAK; verdict 156 net/netfilter/nft_exthdr.c regs->verdict.code = NFT_BREAK; verdict 219 net/netfilter/nft_exthdr.c regs->verdict.code = NFT_BREAK; verdict 41 net/netfilter/nft_fib_inet.c regs->verdict.code = NF_DROP; verdict 50 net/netfilter/nft_fib_netdev.c regs->verdict.code = NFT_BREAK; verdict 141 net/netfilter/nft_flow_offload.c regs->verdict.code = NFT_BREAK; verdict 35 net/netfilter/nft_fwd_netdev.c regs->verdict.code = NF_STOLEN; verdict 93 net/netfilter/nft_fwd_netdev.c unsigned int verdict = NF_STOLEN; verdict 103 net/netfilter/nft_fwd_netdev.c verdict = NFT_BREAK; verdict 107 net/netfilter/nft_fwd_netdev.c verdict = NF_DROP; verdict 119 net/netfilter/nft_fwd_netdev.c verdict = NFT_BREAK; verdict 123 net/netfilter/nft_fwd_netdev.c verdict = NF_DROP; verdict 132 net/netfilter/nft_fwd_netdev.c verdict = NFT_BREAK; verdict 143 net/netfilter/nft_fwd_netdev.c regs->verdict.code = verdict; verdict 112 net/netfilter/nft_immediate.c switch (data->verdict.code) { verdict 116 net/netfilter/nft_immediate.c err = nft_chain_validate(ctx, data->verdict.chain); verdict 138 net/netfilter/nft_immediate.c switch (data->verdict.code) { verdict 136 net/netfilter/nft_limit.c regs->verdict.code = NFT_BREAK; verdict 186 net/netfilter/nft_limit.c regs->verdict.code = NFT_BREAK; verdict 246 net/netfilter/nft_limit.c regs->verdict.code = NFT_BREAK; verdict 290 net/netfilter/nft_limit.c regs->verdict.code = NFT_BREAK; verdict 38 net/netfilter/nft_lookup.c regs->verdict.code = NFT_BREAK; verdict 178 net/netfilter/nft_lookup.c switch (data->verdict.code) { verdict 182 net/netfilter/nft_lookup.c err = nft_chain_validate(ctx, data->verdict.chain); verdict 117 net/netfilter/nft_masq.c regs->verdict.code = nf_nat_masquerade_ipv4(pkt->skb, nft_hook(pkt), verdict 163 net/netfilter/nft_masq.c regs->verdict.code = nf_nat_masquerade_ipv6(pkt->skb, &range, verdict 265 net/netfilter/nft_meta.c regs->verdict.code = NFT_BREAK; verdict 71 net/netfilter/nft_nat.c regs->verdict.code = nf_nat_setup_info(ct, &range, priv->type); verdict 115 net/netfilter/nft_objref.c regs->verdict.code = NFT_BREAK; verdict 34 net/netfilter/nft_osf.c regs->verdict.code = NFT_BREAK; verdict 38 net/netfilter/nft_osf.c regs->verdict.code = NFT_BREAK; verdict 113 net/netfilter/nft_payload.c regs->verdict.code = NFT_BREAK; verdict 544 net/netfilter/nft_payload.c regs->verdict.code = NFT_BREAK; verdict 52 net/netfilter/nft_queue.c regs->verdict.code = ret; verdict 68 net/netfilter/nft_queue.c regs->verdict.code = ret; verdict 38 net/netfilter/nft_quota.c regs->verdict.code = NFT_BREAK; verdict 58 net/netfilter/nft_quota.c regs->verdict.code = NFT_BREAK; verdict 34 net/netfilter/nft_range.c regs->verdict.code = NFT_BREAK; verdict 38 net/netfilter/nft_range.c regs->verdict.code = NFT_BREAK; verdict 123 net/netfilter/nft_redir.c regs->verdict.code = nf_nat_redirect_ipv4(pkt->skb, &mr, nft_hook(pkt)); verdict 171 net/netfilter/nft_redir.c regs->verdict.code = verdict 58 net/netfilter/nft_reject_inet.c regs->verdict.code = NF_DROP; verdict 102 net/netfilter/nft_rt.c regs->verdict.code = NFT_BREAK; verdict 41 net/netfilter/nft_socket.c regs->verdict.code = NFT_BREAK; verdict 46 net/netfilter/nft_socket.c regs->verdict.code = NFT_BREAK; verdict 58 net/netfilter/nft_socket.c regs->verdict.code = NFT_BREAK; verdict 64 net/netfilter/nft_socket.c regs->verdict.code = NFT_BREAK; verdict 61 net/netfilter/nft_synproxy.c regs->verdict.code = NF_STOLEN; verdict 67 net/netfilter/nft_synproxy.c regs->verdict.code = NF_STOLEN; verdict 69 net/netfilter/nft_synproxy.c regs->verdict.code = NF_DROP; verdict 92 net/netfilter/nft_synproxy.c regs->verdict.code = NF_STOLEN; verdict 98 net/netfilter/nft_synproxy.c regs->verdict.code = NF_STOLEN; verdict 100 net/netfilter/nft_synproxy.c regs->verdict.code = NF_DROP; verdict 117 net/netfilter/nft_synproxy.c regs->verdict.code = NFT_BREAK; verdict 122 net/netfilter/nft_synproxy.c regs->verdict.code = NF_DROP; verdict 130 net/netfilter/nft_synproxy.c regs->verdict.code = NF_DROP; verdict 135 net/netfilter/nft_synproxy.c regs->verdict.code = NF_DROP; verdict 149 net/netfilter/nft_synproxy.c regs->verdict.code = NFT_BREAK; verdict 35 net/netfilter/nft_tproxy.c regs->verdict.code = NFT_BREAK; verdict 74 net/netfilter/nft_tproxy.c regs->verdict.code = NFT_BREAK; verdict 95 net/netfilter/nft_tproxy.c regs->verdict.code = NFT_BREAK; verdict 102 net/netfilter/nft_tproxy.c regs->verdict.code = NFT_BREAK; verdict 146 net/netfilter/nft_tproxy.c regs->verdict.code = NFT_BREAK; verdict 175 net/netfilter/nft_tproxy.c regs->verdict.code = NFT_BREAK; verdict 48 net/netfilter/nft_tunnel.c regs->verdict.code = NFT_BREAK; verdict 58 net/netfilter/nft_tunnel.c regs->verdict.code = NFT_BREAK; verdict 62 net/netfilter/nft_tunnel.c regs->verdict.code = NFT_BREAK; verdict 126 net/netfilter/nft_xfrm.c regs->verdict.code = NFT_BREAK; verdict 155 net/netfilter/nft_xfrm.c regs->verdict.code = NFT_BREAK; verdict 166 net/netfilter/nft_xfrm.c regs->verdict.code = NFT_BREAK; verdict 190 net/netfilter/nft_xfrm.c regs->verdict.code = NFT_BREAK; verdict 208 net/netfilter/nft_xfrm.c regs->verdict.code = NFT_BREAK; verdict 611 net/netfilter/x_tables.c static bool verdict_ok(int verdict) verdict 613 net/netfilter/x_tables.c if (verdict > 0) verdict 616 net/netfilter/x_tables.c if (verdict < 0) { verdict 617 net/netfilter/x_tables.c int v = -verdict - 1; verdict 619 net/netfilter/x_tables.c if (verdict == XT_RETURN) verdict 793 net/netfilter/x_tables.c compat_uint_t verdict; verdict 828 net/netfilter/x_tables.c if (!verdict_ok(st->verdict)) verdict 922 net/netfilter/x_tables.c if (!verdict_ok(st->verdict)) verdict 42 samples/bpf/test_cgrp2_attach.c static int prog_load(int map_fd, int verdict) verdict 69 samples/bpf/test_cgrp2_attach.c BPF_MOV64_IMM(BPF_REG_0, verdict), /* r0 = verdict */ verdict 87 samples/bpf/test_cgrp2_attach.c static int attach_filter(int cg_fd, int type, int verdict) verdict 100 samples/bpf/test_cgrp2_attach.c prog_fd = prog_load(map_fd, verdict); verdict 131 samples/bpf/test_cgrp2_attach.c int detach_only = 0, verdict = 1; verdict 138 samples/bpf/test_cgrp2_attach.c verdict = 0; verdict 169 samples/bpf/test_cgrp2_attach.c ret = attach_filter(cg_fd, type, verdict); verdict 51 tools/testing/selftests/bpf/test_cgroup_attach.c static int prog_load(int verdict) verdict 55 tools/testing/selftests/bpf/test_cgroup_attach.c BPF_MOV64_IMM(BPF_REG_0, verdict), /* r0 = verdict */ verdict 219 tools/testing/selftests/bpf/test_cgroup_attach.c static int prog_load_cnt(int verdict, int val) verdict 269 tools/testing/selftests/bpf/test_cgroup_attach.c BPF_MOV64_IMM(BPF_REG_0, verdict), /* r0 = verdict */