Home
last modified time | relevance | path

Searched full:accept (Results 1 – 25 of 1610) sorted by relevance

12345678910>>...65

/linux-6.12.1/tools/testing/selftests/bpf/verifier/
Dsleepable.c2 "sleepable fentry accept",
10 .result = ACCEPT,
15 "sleepable fexit accept",
23 .result = ACCEPT,
28 "sleepable fmod_ret accept",
36 .result = ACCEPT,
41 "sleepable iter accept",
49 .result = ACCEPT,
54 "sleepable lsm accept",
62 .result = ACCEPT,
[all …]
Dbasic_instr.c13 .result = ACCEPT,
29 .result = ACCEPT,
39 .result = ACCEPT,
49 .result = ACCEPT,
60 .result = ACCEPT,
71 .result = ACCEPT,
81 .result = ACCEPT,
91 .result = ACCEPT,
103 .result = ACCEPT,
117 .result = ACCEPT,
[all …]
Djmp32.c17 .result = ACCEPT,
49 .result = ACCEPT,
76 .result = ACCEPT,
92 .result = ACCEPT,
105 .result = ACCEPT,
129 .result = ACCEPT,
157 .result = ACCEPT,
170 .result = ACCEPT,
194 .result = ACCEPT,
222 .result = ACCEPT,
[all …]
Devent_output.c44 .result = ACCEPT,
52 .result = ACCEPT,
60 .result = ACCEPT,
68 .result = ACCEPT,
76 .result = ACCEPT,
84 .result = ACCEPT,
92 .result = ACCEPT,
100 .result = ACCEPT,
108 .result = ACCEPT,
117 .result = ACCEPT,
Ddead_code.c13 .result = ACCEPT,
24 .result = ACCEPT,
39 .result = ACCEPT,
50 .result = ACCEPT,
62 .result = ACCEPT,
76 .result = ACCEPT,
92 .result = ACCEPT,
110 .result = ACCEPT,
128 .result = ACCEPT,
144 .result = ACCEPT,
[all …]
Dctx_skb.c30 .result = ACCEPT,
184 .result = ACCEPT,
194 .result = ACCEPT,
204 .result = ACCEPT,
220 .result = ACCEPT,
236 .result = ACCEPT,
246 .result = ACCEPT,
256 .result = ACCEPT,
301 .result = ACCEPT,
312 .result = ACCEPT,
[all …]
Djit.c20 .result = ACCEPT,
44 .result = ACCEPT,
58 .result = ACCEPT,
71 .result = ACCEPT,
126 .result = ACCEPT,
173 .result = ACCEPT,
192 .result = ACCEPT,
200 .result = ACCEPT,
208 .result = ACCEPT,
216 .result = ACCEPT,
Dld_dw.c7 .result = ACCEPT,
16 .result = ACCEPT,
25 .result = ACCEPT,
34 .result = ACCEPT,
43 .result = ACCEPT,
Dwide_access.c18 BPF_SOCK_ADDR_STORE(user_ip6, 0, ACCEPT,
23 BPF_SOCK_ADDR_STORE(user_ip6, 2, ACCEPT,
33 BPF_SOCK_ADDR_STORE(msg_src_ip6, 1, ACCEPT,
60 BPF_SOCK_ADDR_LOAD(user_ip6, 0, ACCEPT,
65 BPF_SOCK_ADDR_LOAD(user_ip6, 2, ACCEPT,
75 BPF_SOCK_ADDR_LOAD(msg_src_ip6, 1, ACCEPT,
Dld_abs.c70 .result = ACCEPT,
93 .result = ACCEPT,
162 .result = ACCEPT,
182 .result = ACCEPT,
202 .result = ACCEPT,
218 .result = ACCEPT,
234 .result = ACCEPT,
245 .result = ACCEPT,
273 .result = ACCEPT,
284 .result = ACCEPT,
Ddirect_value_access.c10 .result = ACCEPT,
22 .result = ACCEPT,
34 .result = ACCEPT,
46 .result = ACCEPT,
58 .result = ACCEPT,
95 .result = ACCEPT,
119 .result = ACCEPT,
169 .result = ACCEPT,
183 .result = ACCEPT,
237 .result = ACCEPT,
Dperf_event_sample_period.c14 .result = ACCEPT,
30 .result = ACCEPT,
46 .result = ACCEPT,
57 .result = ACCEPT,
Datomic_cmpxchg.c36 .result = ACCEPT,
73 .result = ACCEPT,
109 .result = ACCEPT,
129 .result = ACCEPT,
149 .result = ACCEPT,
170 .result = ACCEPT,
210 .result = ACCEPT,
Djset.c31 .result = ACCEPT,
71 .result = ACCEPT,
88 .result = ACCEPT,
146 .result = ACCEPT,
168 .result = ACCEPT,
Djump.c23 .result = ACCEPT,
51 .result = ACCEPT,
87 .result = ACCEPT,
138 .result = ACCEPT,
179 .result = ACCEPT,
208 .result = ACCEPT,
237 .result = ACCEPT,
267 .result = ACCEPT,
373 .result = ACCEPT,
395 .result = ACCEPT,
/linux-6.12.1/tools/testing/selftests/net/netfilter/
Dconntrack_icmp_related.sh119 type filter hook forward priority 0; policy accept;
120 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept
121 …a l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept
122 meta l4proto { icmp, icmpv6 } ct state new,established accept
136 type filter hook input priority 0; policy accept;
138 icmp type "redirect" ct state "related" counter name "redir4" accept
139 icmpv6 type "nd-redirect" ct state "related" counter name "redir6" accept
141 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
142 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept
156 type filter hook input priority 0; policy accept;
[all …]
Dnft_queue.sh95 type filter hook prerouting priority $prio; policy accept;
99 type filter hook input priority $prio; policy accept;
103 type filter hook forward priority $prio; policy accept;
108 type filter hook output priority $prio; policy accept;
114 type filter hook postrouting priority $prio; policy accept;
127 type filter hook prerouting priority $prio; policy accept;
131 type filter hook input priority $prio; policy accept;
135 type filter hook forward priority $prio; policy accept;
139 type filter hook output priority $prio; policy accept;
143 type filter hook postrouting priority $prio; policy accept;
[all …]
Dconntrack_tcp_unreplied.sh71 type filter hook input priority 0; policy accept;
72 ct state established accept
90 type filter hook input priority 0; policy accept;
91 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept
92 ct state new ct status dnat tcp dport 8080 counter name "redir" accept
129 type nat hook prerouting priority 0; policy accept;
Dnft_flowtable.sh167 meta oif "veth1" tcp dport 12345 ct mark set 1 flow add @f1 counter name routed_orig accept
170 ct mark 1 counter name ct direction map { original : routed_orig, reply : routed_repl } accept
172 ct state established,related accept
174 meta nfproto ipv4 meta l4proto icmp accept
175 meta nfproto ipv6 meta l4proto icmpv6 accept
191 type filter hook input priority 0; policy accept;
193 ip dscp cs3 counter name ip4dscp3 accept
194 ip dscp 0 counter name ip4dscp0 accept
385 type filter hook ingress device "veth0" priority 0; policy accept
402 type filter hook egress device "veth1" priority 0; policy accept
[all …]
/linux-6.12.1/net/mac80211/tests/
Dmfp.c24 .desc = "public action: accept unicast from unknown peer",
32 .desc = "public action: accept multicast from unknown peer",
40 .desc = "public action: accept unicast without MFP",
49 .desc = "public action: accept multicast without MFP",
68 .desc = "public action: accept multicast with MFP",
133 .desc = "protected dual: accept unicast with MFP",
144 .desc = "protected dual: accept multicast with MFP",
156 .desc = "deauth: accept unicast with MFP but w/o key",
164 .desc = "disassoc: accept unicast with MFP but w/o key",
190 .desc = "BA action: accept unprotected without MFP",
/linux-6.12.1/Documentation/netlink/specs/
Dhandshake.yaml42 name: accept
93 notify: accept
95 name: accept
97 attribute-set: accept
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/
Dsockopt_inherit.c60 client_fd = accept(fd, (struct sockaddr *)&addr, &len); in server_thread()
61 if (!ASSERT_GE(client_fd, 0, "accept client")) in server_thread()
64 err += verify_sockopt(client_fd, CUSTOM_INHERIT1, "accept", 1); in server_thread()
65 err += verify_sockopt(client_fd, CUSTOM_INHERIT2, "accept", 1); in server_thread()
66 err += verify_sockopt(client_fd, CUSTOM_LISTENER, "accept", 0); in server_thread()
Dsetget_sockopt.c104 cfd = accept(sfd, NULL, 0); in test_ktls()
105 if (!ASSERT_GE(cfd, 0, "accept")) in test_ktls()
177 * accept()ed socket; this was set earlier in the passive established in test_nonstandard_opt()
178 * callback for the accept()ed socket via bpf_setsockopt(). in test_nonstandard_opt()
184 cfd = accept(sfd, NULL, 0); in test_nonstandard_opt()
185 if (!ASSERT_GE(cfd, 0, "accept")) in test_nonstandard_opt()
/linux-6.12.1/drivers/net/ethernet/tehuti/
Dtn40_regs.h229 #define TN40_GMAC_RX_FILTER_AOF 0x0080 /* accept over run */
230 #define TN40_GMAC_RX_FILTER_ACF 0x0040 /* accept control frames */
231 #define TN40_GMAC_RX_FILTER_ARUNT 0x0020 /* accept under run */
232 #define TN40_GMAC_RX_FILTER_ACRC 0x0010 /* accept crc error */
233 #define TN40_GMAC_RX_FILTER_AM 0x0008 /* accept multicast */
234 #define TN40_GMAC_RX_FILTER_AB 0x0004 /* accept broadcast */
/linux-6.12.1/security/apparmor/
Dmatch.c25 * unpack_table - unpack a dfa table (one of accept, default, base, next check)
96 * @flags: flags controlling what type of accept table are acceptable
99 * NOTE: this does not valid accept table values
113 /* accept.size == default.size == base.size */ in verify_table_headers()
149 * NOTE: this does not valid accept table values
254 * @flags: flags controlling what type of accept tables are acceptable
509 * aa_dfa_match_until - traverse @dfa until accept state or end of input
528 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local
545 if (accept[state]) in aa_dfa_match_until()
556 if (accept[state]) in aa_dfa_match_until()
[all …]

12345678910>>...65