/Linux-v6.6/tools/testing/selftests/bpf/progs/ |
D | test_sk_lookup.c | 78 return SK_PASS; in lookup_pass() 92 return SK_PASS; in check_ifindex() 98 return SK_PASS; in reuseport_pass() 115 return SK_PASS; in redir_port() 119 return SK_PASS; in redir_port() 123 return err ? SK_DROP : SK_PASS; in redir_port() 134 return SK_PASS; in redir_ip4() 136 return SK_PASS; in redir_ip4() 138 return SK_PASS; in redir_ip4() 142 return SK_PASS; in redir_ip4() [all …]
|
D | test_migrate_reuseport.c | 104 return SK_PASS; in migrate_reuseport() 115 return SK_PASS; in migrate_reuseport() 132 return SK_PASS; in migrate_reuseport()
|
D | test_sockmap_progs_query.c | 15 return SK_PASS; in prog_skb_verdict() 21 return SK_PASS; in prog_skmsg_verdict()
|
D | test_sockmap_kern.h | 157 int err, *f, ret = SK_PASS; in bpf_prog3() 263 return SK_PASS; in bpf_prog4() 330 return SK_PASS; in bpf_prog8() 342 return SK_PASS; in bpf_prog9() 347 return SK_PASS; in bpf_prog9() 371 return SK_PASS; in bpf_prog10()
|
D | dynptr_fail.c | 268 return SK_PASS; in data_slice_out_of_bounds_skb() 1088 return SK_PASS; in skb_invalid_slice_write() 1114 return SK_PASS; in skb_invalid_data_slice1() 1140 return SK_PASS; in skb_invalid_data_slice2() 1166 return SK_PASS; in skb_invalid_data_slice3() 1191 return SK_PASS; in skb_invalid_data_slice4() 1304 return SK_PASS; in dynptr_slice_var_len1() 1326 return SK_PASS; in dynptr_slice_var_len2()
|
D | sockmap_tcp_msg_prog.c | 9 return SK_PASS; in bpf_prog1()
|
D | test_select_reuseport_kern.c | 118 return SK_PASS; in _select_by_skb_data() 181 return result < PASS ? SK_DROP : SK_PASS; in _select_by_skb_data()
|
D | test_sockmap_pass_prog.c | 29 return SK_PASS; in prog_skb_verdict()
|
D | test_sockmap_update.c | 45 return failed ? SK_DROP : SK_PASS; in copy_sock_map()
|
D | test_skmsg_load_helpers.c | 31 int verdict = SK_PASS; in prog_msg_verdict()
|
D | test_sockmap_listen.c | 124 verdict = err ? SK_DROP : SK_PASS; in prog_reuseport()
|
D | test_assign_reuse.c | 55 return SK_PASS; in reuse_accept()
|
/Linux-v6.6/Documentation/bpf/ |
D | prog_sk_lookup.rst | 52 The attached BPF programs must return with either ``SK_PASS`` or ``SK_DROP`` 54 ``SK_PASS`` signifies that the socket lookup should continue on to regular 63 with ``SK_PASS`` code. 68 1. If any program returned ``SK_PASS`` and selected a valid socket, the socket 70 2. If more than one program returned ``SK_PASS`` and selected a socket, the last 72 3. If any program returned ``SK_DROP``, and no program returned ``SK_PASS`` and 74 4. If all programs returned ``SK_PASS`` and none of them selected a socket,
|
D | map_sockmap.rst | 91 returns ``SK_PASS``), redirect it to the socket referenced by ``map`` (of type 97 Returns ``SK_PASS`` on success, or ``SK_DROP`` on error. 111 Returns ``SK_PASS`` on success, or ``SK_DROP`` on error. 171 ``SK_PASS``), redirect it to the socket referenced by ``map`` (of type 177 Returns ``SK_PASS`` on success, or ``SK_DROP`` on error. 187 returns ``SK_PASS``), redirect it to the socket referenced by ``map`` (of type 193 Returns ``SK_PASS`` on success, or ``SK_DROP`` on error. 389 return SK_PASS;
|
/Linux-v6.6/tools/testing/selftests/bpf/prog_tests/ |
D | sockmap_listen.c | 653 key = SK_PASS; in zero_verdict_count() 706 key = SK_PASS; in redir_to_connected() 999 key = SK_PASS; in test_reuseport_select_listening() 1372 key = SK_PASS; in unix_redir_to_connected() 1522 key = SK_PASS; in vsock_unix_redir_connectible() 1692 key = SK_PASS; in udp_redir_to_connected() 1780 key = SK_PASS; in inet_unix_redir_to_connected() 1860 key = SK_PASS; in unix_inet_redir_to_connected()
|
/Linux-v6.6/include/linux/ |
D | filter.h | 1407 if (_ret == SK_PASS && _ctx->selected_sk) { \ 1419 _all_pass || _selected_sk ? SK_PASS : SK_DROP; \ 1446 if (act == SK_PASS) { in bpf_sk_lookup_run_v4() 1485 if (act == SK_PASS) { in bpf_sk_lookup_run_v6()
|
/Linux-v6.6/net/core/ |
D | sock_map.c | 647 return SK_PASS; in BPF_CALL_4() 676 return SK_PASS; in BPF_CALL_4() 1248 return SK_PASS; in BPF_CALL_4() 1277 return SK_PASS; in BPF_CALL_4()
|
D | skmsg.c | 854 case SK_PASS: in sk_psock_map_verd()
|
D | filter.c | 11061 if (action == SK_PASS) in bpf_run_sk_reuseport()
|
/Linux-v6.6/tools/include/uapi/linux/ |
D | bpf.h | 6333 SK_PASS, enumerator
|
/Linux-v6.6/include/uapi/linux/ |
D | bpf.h | 6333 SK_PASS, enumerator
|
/Linux-v6.6/kernel/bpf/ |
D | verifier.c | 14592 range = tnum_range(SK_DROP, SK_PASS); in check_return_code()
|