/linux/tools/testing/selftests/bpf/verifier/ |
H A D | sleepable.c | 2 "sleepable fentry accept", 10 .result = ACCEPT, 15 "sleepable fexit accept", 23 .result = ACCEPT, 28 "sleepable fmod_ret accept", 36 .result = ACCEPT, 41 "sleepable iter accept", 49 .result = ACCEPT, 54 "sleepable lsm accept", 62 .result = ACCEPT, [all …]
|
H A D | basic_instr.c | 13 .result = ACCEPT, 29 .result = ACCEPT, 39 .result = ACCEPT, 49 .result = ACCEPT, 60 .result = ACCEPT, 71 .result = ACCEPT, 81 .result = ACCEPT, 91 .result = ACCEPT, 103 .result = ACCEPT, 117 .result = ACCEPT, [all …]
|
H A D | jmp32.c | 17 .result = ACCEPT, 49 .result = ACCEPT, 76 .result = ACCEPT, 91 .result = ACCEPT, 104 .result = ACCEPT, 128 .result = ACCEPT, 155 .result = ACCEPT, 168 .result = ACCEPT, 192 .result = ACCEPT, 219 .result = ACCEPT, [all …]
|
H A D | event_output.c | 44 .result = ACCEPT, 52 .result = ACCEPT, 60 .result = ACCEPT, 68 .result = ACCEPT, 76 .result = ACCEPT, 84 .result = ACCEPT, 92 .result = ACCEPT, 100 .result = ACCEPT, 108 .result = ACCEPT, 117 .result = ACCEPT,
|
H A D | dead_code.c | 12 .result = ACCEPT, 23 .result = ACCEPT, 38 .result = ACCEPT, 49 .result = ACCEPT, 61 .result = ACCEPT, 75 .result = ACCEPT, 91 .result = ACCEPT, 109 .result = ACCEPT, 127 .result = ACCEPT, 143 .result = ACCEPT, [all …]
|
H A D | ctx_skb.c | 30 .result = ACCEPT, 184 .result = ACCEPT, 194 .result = ACCEPT, 204 .result = ACCEPT, 220 .result = ACCEPT, 236 .result = ACCEPT, 246 .result = ACCEPT, 256 .result = ACCEPT, 301 .result = ACCEPT, 312 .result = ACCEPT, [all …]
|
H A D | jit.c | 20 .result = ACCEPT, 44 .result = ACCEPT, 58 .result = ACCEPT, 71 .result = ACCEPT, 126 .result = ACCEPT, 173 .result = ACCEPT, 192 .result = ACCEPT, 200 .result = ACCEPT, 208 .result = ACCEPT, 216 .result = ACCEPT,
|
H A D | ld_dw.c | 7 .result = ACCEPT, 16 .result = ACCEPT, 25 .result = ACCEPT, 34 .result = ACCEPT, 43 .result = ACCEPT,
|
H A D | wide_access.c | 18 BPF_SOCK_ADDR_STORE(user_ip6, 0, ACCEPT, 23 BPF_SOCK_ADDR_STORE(user_ip6, 2, ACCEPT, 33 BPF_SOCK_ADDR_STORE(msg_src_ip6, 1, ACCEPT, 60 BPF_SOCK_ADDR_LOAD(user_ip6, 0, ACCEPT, 65 BPF_SOCK_ADDR_LOAD(user_ip6, 2, ACCEPT, 75 BPF_SOCK_ADDR_LOAD(msg_src_ip6, 1, ACCEPT,
|
H A D | ld_abs.c | 70 .result = ACCEPT, 93 .result = ACCEPT, 162 .result = ACCEPT, 182 .result = ACCEPT, 202 .result = ACCEPT, 218 .result = ACCEPT, 234 .result = ACCEPT, 245 .result = ACCEPT, 273 .result = ACCEPT, 284 .result = ACCEPT,
|
H A D | direct_value_access.c | 10 .result = ACCEPT, 22 .result = ACCEPT, 34 .result = ACCEPT, 46 .result = ACCEPT, 58 .result = ACCEPT, 95 .result = ACCEPT, 119 .result = ACCEPT, 169 .result = ACCEPT, 183 .result = ACCEPT, 237 .result = ACCEPT,
|
H A D | perf_event_sample_period.c | 14 .result = ACCEPT, 30 .result = ACCEPT, 46 .result = ACCEPT, 57 .result = ACCEPT,
|
H A D | atomic_cmpxchg.c | 36 .result = ACCEPT, 73 .result = ACCEPT, 109 .result = ACCEPT, 129 .result = ACCEPT, 149 .result = ACCEPT, 170 .result = ACCEPT, 210 .result = ACCEPT,
|
H A D | jump.c | 23 .result = ACCEPT, 51 .result = ACCEPT, 87 .result = ACCEPT, 138 .result = ACCEPT, 179 .result = ACCEPT, 208 .result = ACCEPT, 237 .result = ACCEPT, 267 .result = ACCEPT, 373 .result = ACCEPT, 395 .result = ACCEPT,
|
H A D | jset.c | 31 .result = ACCEPT, 71 .result = ACCEPT, 87 .result = ACCEPT, 144 .result = ACCEPT, 166 .result = ACCEPT,
|
/linux/tools/testing/selftests/net/netfilter/ |
H A D | conntrack_icmp_related.sh | 119 type filter hook forward priority 0; policy accept; 120 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept 121 …a l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept 122 meta l4proto { icmp, icmpv6 } ct state new,established accept 136 type filter hook input priority 0; policy accept; 138 icmp type "redirect" ct state "related" counter name "redir4" accept 139 icmpv6 type "nd-redirect" ct state "related" counter name "redir6" accept 141 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 142 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept 156 type filter hook input priority 0; policy accept; [all …]
|
H A D | nft_queue.sh | 97 type filter hook prerouting priority $prio; policy accept; 101 type filter hook input priority $prio; policy accept; 105 type filter hook forward priority $prio; policy accept; 110 type filter hook output priority $prio; policy accept; 116 type filter hook postrouting priority $prio; policy accept; 129 type filter hook prerouting priority $prio; policy accept; 133 type filter hook input priority $prio; policy accept; 137 type filter hook forward priority $prio; policy accept; 141 type filter hook output priority $prio; policy accept; 145 type filter hook postrouting priority $prio; policy accept; [all...] |
H A D | conntrack_tcp_unreplied.sh | 71 type filter hook input priority 0; policy accept; 72 ct state established accept 90 type filter hook input priority 0; policy accept; 91 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept 92 ct state new ct status dnat tcp dport 8080 counter name "redir" accept 129 type nat hook prerouting priority 0; policy accept;
|
H A D | nft_flowtable.sh | 172 meta oif "veth1" tcp dport 12345 ct mark set 1 flow add @f1 counter name routed_orig accept 175 ct mark 1 counter name ct direction map { original : routed_orig, reply : routed_repl } accept 177 ct state established,related accept 179 meta nfproto ipv4 meta l4proto icmp accept 180 meta nfproto ipv6 meta l4proto icmpv6 accept 196 type filter hook input priority 0; policy accept; 198 ip dscp cs3 counter name ip4dscp3 accept 199 ip dscp 0 counter name ip4dscp0 accept 410 type filter hook ingress device "veth0" priority 0; policy accept 427 type filter hook egress device "veth1" priority 0; policy accept [all …]
|
/linux/net/mac80211/tests/ |
H A D | mfp.c | 24 .desc = "public action: accept unicast from unknown peer", 32 .desc = "public action: accept multicast from unknown peer", 40 .desc = "public action: accept unicast without MFP", 49 .desc = "public action: accept multicast without MFP", 68 .desc = "public action: accept multicast with MFP", 133 .desc = "protected dual: accept unicast with MFP", 144 .desc = "protected dual: accept multicast with MFP", 156 .desc = "deauth: accept unicast with MFP but w/o key", 164 .desc = "disassoc: accept unicast with MFP but w/o key", 190 .desc = "BA action: accept unprotected without MFP",
|
/linux/Documentation/netlink/specs/ |
H A D | handshake.yaml | 42 name: accept 96 notify: accept 98 name: accept 100 attribute-set: accept
|
/linux/drivers/net/ethernet/tehuti/ |
H A D | tn40_regs.h | 229 #define TN40_GMAC_RX_FILTER_AOF 0x0080 /* accept over run */ 230 #define TN40_GMAC_RX_FILTER_ACF 0x0040 /* accept control frames */ 231 #define TN40_GMAC_RX_FILTER_ARUNT 0x0020 /* accept under run */ 232 #define TN40_GMAC_RX_FILTER_ACRC 0x0010 /* accept crc error */ 233 #define TN40_GMAC_RX_FILTER_AM 0x0008 /* accept multicast */ 234 #define TN40_GMAC_RX_FILTER_AB 0x0004 /* accept broadcast */
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | sockopt_inherit.c | 60 client_fd = accept(fd, (struct sockaddr *)&addr, &len); in server_thread() 61 if (!ASSERT_GE(client_fd, 0, "accept client")) in server_thread() 64 err += verify_sockopt(client_fd, CUSTOM_INHERIT1, "accept", 1); in server_thread() 65 err += verify_sockopt(client_fd, CUSTOM_INHERIT2, "accept", 1); in server_thread() 66 err += verify_sockopt(client_fd, CUSTOM_LISTENER, "accept", 0); in server_thread()
|
H A D | setget_sockopt.c | 104 cfd = accept(sfd, NULL, 0); in test_ktls() 105 if (!ASSERT_GE(cfd, 0, "accept")) in test_ktls() 177 * accept()ed socket; this was set earlier in the passive established in test_nonstandard_opt() 178 * callback for the accept()ed socket via bpf_setsockopt(). in test_nonstandard_opt() 184 cfd = accept(sfd, NULL, 0); in test_nonstandard_opt() 185 if (!ASSERT_GE(cfd, 0, "accept")) in test_nonstandard_opt()
|
/linux/tools/testing/vsock/ |
H A D | vsock_test.c | 151 perror("accept"); in test_stream_client_close_server() 193 perror("accept"); in test_stream_server_close_server() 238 perror("accept"); in test_stream_multiconn_server() 297 perror("accept"); in test_msg_peek_server() 433 perror("accept"); in test_seqpacket_msg_bounds_server() 519 perror("accept"); in test_seqpacket_msg_trunc_server() 613 perror("accept"); in test_seqpacket_timeout_server() 672 perror("accept"); in test_seqpacket_bigmsg_server() 733 perror("accept"); in test_seqpacket_invalid_rec_buffer_server() 809 perror("accept"); in test_stream_poll_rcvlowat_server() [all …]
|