/linux-6.12.1/tools/testing/selftests/bpf/verifier/ |
D | sleepable.c | 2 "sleepable fentry accept", 10 .result = ACCEPT, 15 "sleepable fexit accept", 23 .result = ACCEPT, 28 "sleepable fmod_ret accept", 36 .result = ACCEPT, 41 "sleepable iter accept", 49 .result = ACCEPT, 54 "sleepable lsm accept", 62 .result = ACCEPT, [all …]
|
D | basic_instr.c | 13 .result = ACCEPT, 29 .result = ACCEPT, 39 .result = ACCEPT, 49 .result = ACCEPT, 60 .result = ACCEPT, 71 .result = ACCEPT, 81 .result = ACCEPT, 91 .result = ACCEPT, 103 .result = ACCEPT, 117 .result = ACCEPT, [all …]
|
D | jmp32.c | 17 .result = ACCEPT, 49 .result = ACCEPT, 76 .result = ACCEPT, 92 .result = ACCEPT, 105 .result = ACCEPT, 129 .result = ACCEPT, 157 .result = ACCEPT, 170 .result = ACCEPT, 194 .result = ACCEPT, 222 .result = ACCEPT, [all …]
|
D | event_output.c | 44 .result = ACCEPT, 52 .result = ACCEPT, 60 .result = ACCEPT, 68 .result = ACCEPT, 76 .result = ACCEPT, 84 .result = ACCEPT, 92 .result = ACCEPT, 100 .result = ACCEPT, 108 .result = ACCEPT, 117 .result = ACCEPT,
|
D | dead_code.c | 13 .result = ACCEPT, 24 .result = ACCEPT, 39 .result = ACCEPT, 50 .result = ACCEPT, 62 .result = ACCEPT, 76 .result = ACCEPT, 92 .result = ACCEPT, 110 .result = ACCEPT, 128 .result = ACCEPT, 144 .result = ACCEPT, [all …]
|
D | ctx_skb.c | 30 .result = ACCEPT, 184 .result = ACCEPT, 194 .result = ACCEPT, 204 .result = ACCEPT, 220 .result = ACCEPT, 236 .result = ACCEPT, 246 .result = ACCEPT, 256 .result = ACCEPT, 301 .result = ACCEPT, 312 .result = ACCEPT, [all …]
|
D | jit.c | 20 .result = ACCEPT, 44 .result = ACCEPT, 58 .result = ACCEPT, 71 .result = ACCEPT, 126 .result = ACCEPT, 173 .result = ACCEPT, 192 .result = ACCEPT, 200 .result = ACCEPT, 208 .result = ACCEPT, 216 .result = ACCEPT,
|
D | ld_dw.c | 7 .result = ACCEPT, 16 .result = ACCEPT, 25 .result = ACCEPT, 34 .result = ACCEPT, 43 .result = ACCEPT,
|
D | wide_access.c | 18 BPF_SOCK_ADDR_STORE(user_ip6, 0, ACCEPT, 23 BPF_SOCK_ADDR_STORE(user_ip6, 2, ACCEPT, 33 BPF_SOCK_ADDR_STORE(msg_src_ip6, 1, ACCEPT, 60 BPF_SOCK_ADDR_LOAD(user_ip6, 0, ACCEPT, 65 BPF_SOCK_ADDR_LOAD(user_ip6, 2, ACCEPT, 75 BPF_SOCK_ADDR_LOAD(msg_src_ip6, 1, ACCEPT,
|
D | ld_abs.c | 70 .result = ACCEPT, 93 .result = ACCEPT, 162 .result = ACCEPT, 182 .result = ACCEPT, 202 .result = ACCEPT, 218 .result = ACCEPT, 234 .result = ACCEPT, 245 .result = ACCEPT, 273 .result = ACCEPT, 284 .result = ACCEPT,
|
D | direct_value_access.c | 10 .result = ACCEPT, 22 .result = ACCEPT, 34 .result = ACCEPT, 46 .result = ACCEPT, 58 .result = ACCEPT, 95 .result = ACCEPT, 119 .result = ACCEPT, 169 .result = ACCEPT, 183 .result = ACCEPT, 237 .result = ACCEPT,
|
D | perf_event_sample_period.c | 14 .result = ACCEPT, 30 .result = ACCEPT, 46 .result = ACCEPT, 57 .result = ACCEPT,
|
D | atomic_cmpxchg.c | 36 .result = ACCEPT, 73 .result = ACCEPT, 109 .result = ACCEPT, 129 .result = ACCEPT, 149 .result = ACCEPT, 170 .result = ACCEPT, 210 .result = ACCEPT,
|
D | jset.c | 31 .result = ACCEPT, 71 .result = ACCEPT, 88 .result = ACCEPT, 146 .result = ACCEPT, 168 .result = ACCEPT,
|
D | jump.c | 23 .result = ACCEPT, 51 .result = ACCEPT, 87 .result = ACCEPT, 138 .result = ACCEPT, 179 .result = ACCEPT, 208 .result = ACCEPT, 237 .result = ACCEPT, 267 .result = ACCEPT, 373 .result = ACCEPT, 395 .result = ACCEPT,
|
/linux-6.12.1/tools/testing/selftests/net/netfilter/ |
D | conntrack_icmp_related.sh | 119 type filter hook forward priority 0; policy accept; 120 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept 121 …a l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept 122 meta l4proto { icmp, icmpv6 } ct state new,established accept 136 type filter hook input priority 0; policy accept; 138 icmp type "redirect" ct state "related" counter name "redir4" accept 139 icmpv6 type "nd-redirect" ct state "related" counter name "redir6" accept 141 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 142 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept 156 type filter hook input priority 0; policy accept; [all …]
|
D | nft_queue.sh | 95 type filter hook prerouting priority $prio; policy accept; 99 type filter hook input priority $prio; policy accept; 103 type filter hook forward priority $prio; policy accept; 108 type filter hook output priority $prio; policy accept; 114 type filter hook postrouting priority $prio; policy accept; 127 type filter hook prerouting priority $prio; policy accept; 131 type filter hook input priority $prio; policy accept; 135 type filter hook forward priority $prio; policy accept; 139 type filter hook output priority $prio; policy accept; 143 type filter hook postrouting priority $prio; policy accept; [all …]
|
D | conntrack_tcp_unreplied.sh | 71 type filter hook input priority 0; policy accept; 72 ct state established accept 90 type filter hook input priority 0; policy accept; 91 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept 92 ct state new ct status dnat tcp dport 8080 counter name "redir" accept 129 type nat hook prerouting priority 0; policy accept;
|
D | nft_flowtable.sh | 167 meta oif "veth1" tcp dport 12345 ct mark set 1 flow add @f1 counter name routed_orig accept 170 ct mark 1 counter name ct direction map { original : routed_orig, reply : routed_repl } accept 172 ct state established,related accept 174 meta nfproto ipv4 meta l4proto icmp accept 175 meta nfproto ipv6 meta l4proto icmpv6 accept 191 type filter hook input priority 0; policy accept; 193 ip dscp cs3 counter name ip4dscp3 accept 194 ip dscp 0 counter name ip4dscp0 accept 385 type filter hook ingress device "veth0" priority 0; policy accept 402 type filter hook egress device "veth1" priority 0; policy accept [all …]
|
/linux-6.12.1/net/mac80211/tests/ |
D | mfp.c | 24 .desc = "public action: accept unicast from unknown peer", 32 .desc = "public action: accept multicast from unknown peer", 40 .desc = "public action: accept unicast without MFP", 49 .desc = "public action: accept multicast without MFP", 68 .desc = "public action: accept multicast with MFP", 133 .desc = "protected dual: accept unicast with MFP", 144 .desc = "protected dual: accept multicast with MFP", 156 .desc = "deauth: accept unicast with MFP but w/o key", 164 .desc = "disassoc: accept unicast with MFP but w/o key", 190 .desc = "BA action: accept unprotected without MFP",
|
/linux-6.12.1/Documentation/netlink/specs/ |
D | handshake.yaml | 42 name: accept 93 notify: accept 95 name: accept 97 attribute-set: accept
|
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/ |
D | sockopt_inherit.c | 60 client_fd = accept(fd, (struct sockaddr *)&addr, &len); in server_thread() 61 if (!ASSERT_GE(client_fd, 0, "accept client")) in server_thread() 64 err += verify_sockopt(client_fd, CUSTOM_INHERIT1, "accept", 1); in server_thread() 65 err += verify_sockopt(client_fd, CUSTOM_INHERIT2, "accept", 1); in server_thread() 66 err += verify_sockopt(client_fd, CUSTOM_LISTENER, "accept", 0); in server_thread()
|
D | setget_sockopt.c | 104 cfd = accept(sfd, NULL, 0); in test_ktls() 105 if (!ASSERT_GE(cfd, 0, "accept")) in test_ktls() 177 * accept()ed socket; this was set earlier in the passive established in test_nonstandard_opt() 178 * callback for the accept()ed socket via bpf_setsockopt(). in test_nonstandard_opt() 184 cfd = accept(sfd, NULL, 0); in test_nonstandard_opt() 185 if (!ASSERT_GE(cfd, 0, "accept")) in test_nonstandard_opt()
|
/linux-6.12.1/drivers/net/ethernet/tehuti/ |
D | tn40_regs.h | 229 #define TN40_GMAC_RX_FILTER_AOF 0x0080 /* accept over run */ 230 #define TN40_GMAC_RX_FILTER_ACF 0x0040 /* accept control frames */ 231 #define TN40_GMAC_RX_FILTER_ARUNT 0x0020 /* accept under run */ 232 #define TN40_GMAC_RX_FILTER_ACRC 0x0010 /* accept crc error */ 233 #define TN40_GMAC_RX_FILTER_AM 0x0008 /* accept multicast */ 234 #define TN40_GMAC_RX_FILTER_AB 0x0004 /* accept broadcast */
|
/linux-6.12.1/security/apparmor/ |
D | match.c | 25 * unpack_table - unpack a dfa table (one of accept, default, base, next check) 96 * @flags: flags controlling what type of accept table are acceptable 99 * NOTE: this does not valid accept table values 113 /* accept.size == default.size == base.size */ in verify_table_headers() 149 * NOTE: this does not valid accept table values 254 * @flags: flags controlling what type of accept tables are acceptable 509 * aa_dfa_match_until - traverse @dfa until accept state or end of input 528 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local 545 if (accept[state]) in aa_dfa_match_until() 556 if (accept[state]) in aa_dfa_match_until() [all …]
|