Home
last modified time | relevance | path

Searched full:accept (Results 1 – 25 of 1526) sorted by relevance

12345678910>>...62

/linux-6.8/tools/testing/selftests/bpf/verifier/
Dsleepable.c2 "sleepable fentry accept",
10 .result = ACCEPT,
15 "sleepable fexit accept",
23 .result = ACCEPT,
28 "sleepable fmod_ret accept",
36 .result = ACCEPT,
41 "sleepable iter accept",
49 .result = ACCEPT,
54 "sleepable lsm accept",
62 .result = ACCEPT,
[all …]
Dbasic_instr.c13 .result = ACCEPT,
29 .result = ACCEPT,
39 .result = ACCEPT,
49 .result = ACCEPT,
60 .result = ACCEPT,
71 .result = ACCEPT,
81 .result = ACCEPT,
91 .result = ACCEPT,
103 .result = ACCEPT,
117 .result = ACCEPT,
[all …]
Djmp32.c17 .result = ACCEPT,
49 .result = ACCEPT,
76 .result = ACCEPT,
92 .result = ACCEPT,
105 .result = ACCEPT,
129 .result = ACCEPT,
157 .result = ACCEPT,
170 .result = ACCEPT,
194 .result = ACCEPT,
222 .result = ACCEPT,
[all …]
Devent_output.c44 .result = ACCEPT,
52 .result = ACCEPT,
60 .result = ACCEPT,
68 .result = ACCEPT,
76 .result = ACCEPT,
84 .result = ACCEPT,
92 .result = ACCEPT,
100 .result = ACCEPT,
108 .result = ACCEPT,
117 .result = ACCEPT,
Ddead_code.c13 .result = ACCEPT,
24 .result = ACCEPT,
39 .result = ACCEPT,
50 .result = ACCEPT,
62 .result = ACCEPT,
76 .result = ACCEPT,
92 .result = ACCEPT,
110 .result = ACCEPT,
128 .result = ACCEPT,
144 .result = ACCEPT,
[all …]
Dctx_skb.c30 .result = ACCEPT,
184 .result = ACCEPT,
194 .result = ACCEPT,
204 .result = ACCEPT,
220 .result = ACCEPT,
236 .result = ACCEPT,
246 .result = ACCEPT,
256 .result = ACCEPT,
301 .result = ACCEPT,
312 .result = ACCEPT,
[all …]
Djit.c20 .result = ACCEPT,
44 .result = ACCEPT,
58 .result = ACCEPT,
71 .result = ACCEPT,
126 .result = ACCEPT,
173 .result = ACCEPT,
192 .result = ACCEPT,
200 .result = ACCEPT,
208 .result = ACCEPT,
216 .result = ACCEPT,
Dld_dw.c7 .result = ACCEPT,
16 .result = ACCEPT,
25 .result = ACCEPT,
34 .result = ACCEPT,
43 .result = ACCEPT,
Dwide_access.c18 BPF_SOCK_ADDR_STORE(user_ip6, 0, ACCEPT,
23 BPF_SOCK_ADDR_STORE(user_ip6, 2, ACCEPT,
33 BPF_SOCK_ADDR_STORE(msg_src_ip6, 1, ACCEPT,
60 BPF_SOCK_ADDR_LOAD(user_ip6, 0, ACCEPT,
65 BPF_SOCK_ADDR_LOAD(user_ip6, 2, ACCEPT,
75 BPF_SOCK_ADDR_LOAD(msg_src_ip6, 1, ACCEPT,
Dld_abs.c70 .result = ACCEPT,
93 .result = ACCEPT,
162 .result = ACCEPT,
182 .result = ACCEPT,
202 .result = ACCEPT,
218 .result = ACCEPT,
234 .result = ACCEPT,
245 .result = ACCEPT,
273 .result = ACCEPT,
284 .result = ACCEPT,
Ddirect_value_access.c10 .result = ACCEPT,
22 .result = ACCEPT,
34 .result = ACCEPT,
46 .result = ACCEPT,
58 .result = ACCEPT,
95 .result = ACCEPT,
119 .result = ACCEPT,
169 .result = ACCEPT,
183 .result = ACCEPT,
237 .result = ACCEPT,
Dperf_event_sample_period.c14 .result = ACCEPT,
30 .result = ACCEPT,
46 .result = ACCEPT,
57 .result = ACCEPT,
Datomic_cmpxchg.c36 .result = ACCEPT,
73 .result = ACCEPT,
109 .result = ACCEPT,
129 .result = ACCEPT,
149 .result = ACCEPT,
170 .result = ACCEPT,
210 .result = ACCEPT,
Djset.c31 .result = ACCEPT,
71 .result = ACCEPT,
88 .result = ACCEPT,
146 .result = ACCEPT,
168 .result = ACCEPT,
Djump.c23 .result = ACCEPT,
51 .result = ACCEPT,
87 .result = ACCEPT,
138 .result = ACCEPT,
179 .result = ACCEPT,
208 .result = ACCEPT,
237 .result = ACCEPT,
267 .result = ACCEPT,
373 .result = ACCEPT,
395 .result = ACCEPT,
/linux-6.8/tools/testing/selftests/netfilter/
Dconntrack_icmp_related.sh137 type filter hook forward priority 0; policy accept;
138 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept
139 …a l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept
140 meta l4proto { icmp, icmpv6 } ct state new,established accept
154 type filter hook input priority 0; policy accept;
156 icmp type "redirect" ct state "related" counter name "redir4" accept
157 icmpv6 type "nd-redirect" ct state "related" counter name "redir6" accept
159 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
160 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept
174 type filter hook input priority 0; policy accept;
[all …]
Dnft_queue.sh101 type filter hook prerouting priority $prio; policy accept;
105 type filter hook input priority $prio; policy accept;
109 type filter hook forward priority $prio; policy accept;
114 type filter hook output priority $prio; policy accept;
120 type filter hook postrouting priority $prio; policy accept;
133 type filter hook prerouting priority $prio; policy accept;
137 type filter hook input priority $prio; policy accept;
141 type filter hook forward priority $prio; policy accept;
145 type filter hook output priority $prio; policy accept;
149 type filter hook postrouting priority $prio; policy accept;
[all …]
Dnft_flowtable.sh173 meta oif "veth1" tcp dport 12345 ct mark set 1 flow add @f1 counter name routed_orig accept
176 ct mark 1 counter name ct direction map { original : routed_orig, reply : routed_repl } accept
178 ct state established,related accept
180 meta nfproto ipv4 meta l4proto icmp accept
181 meta nfproto ipv6 meta l4proto icmpv6 accept
197 type filter hook input priority 0; policy accept;
199 ip dscp cs3 counter name ip4dscp3 accept
200 ip dscp 0 counter name ip4dscp0 accept
409 type filter hook ingress device "veth0" priority 0; policy accept
426 type filter hook egress device "veth1" priority 0; policy accept
[all …]
Dconntrack_tcp_unreplied.sh79 ip netns exec $ns1 iptables -A INPUT -m state --state established,related -j ACCEPT
96 type filter hook input priority 0; policy accept;
97 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept
98 ct state new ct status dnat tcp dport 8080 counter name "redir" accept
120 type nat hook prerouting priority 0; policy accept;
/linux-6.8/net/mac80211/tests/
Dmfp.c24 .desc = "public action: accept unicast from unknown peer",
32 .desc = "public action: accept multicast from unknown peer",
40 .desc = "public action: accept unicast without MFP",
49 .desc = "public action: accept multicast without MFP",
68 .desc = "public action: accept multicast with MFP",
133 .desc = "protected dual: accept unicast with MFP",
144 .desc = "protected dual: accept multicast with MFP",
156 .desc = "deauth: accept unicast with MFP but w/o key",
164 .desc = "disassoc: accept unicast with MFP but w/o key",
190 .desc = "BA action: accept unprotected without MFP",
/linux-6.8/net/bluetooth/
Dhci_request.c368 bt_dev_dbg(req->hdev, "Remove %pMR (0x%x) from accept list", &cp.bdaddr, in del_from_accept_list()
388 /* Adds connection to accept list if needed. On error, returns -1. */
396 /* Already in accept list */ in add_to_accept_list()
401 /* Select filter policy to accept all advertising */ in add_to_accept_list()
405 /* Accept list can not be used with RPAs */ in add_to_accept_list()
412 /* During suspend, only wakeable devices can be in accept list */ in add_to_accept_list()
421 bt_dev_dbg(hdev, "Add %pMR (0x%x) to accept list", &cp.bdaddr, in add_to_accept_list()
457 /* We allow usage of accept list even with RPAs in suspend. In the worst in update_accept_list()
467 /* Go through the current accept list programmed into the in update_accept_list()
482 * remove it from the accept list. in update_accept_list()
[all …]
/linux-6.8/Documentation/netlink/specs/
Dhandshake.yaml42 name: accept
93 notify: accept
95 name: accept
97 attribute-set: accept
Drt_link.yaml305 name: accept-redirects
320 name: accept-source-route
356 name: arp-accept
362 name: accept-local
408 name: accept-ra
411 name: accept-redirects
450 name: accept-ra-defrtr
453 name: accept-ra-pinfo
456 name: accept-ra-rtr-pref
462 name: accept-ra-rt-info-max-plen
[all …]
/linux-6.8/tools/testing/selftests/bpf/prog_tests/
Dsockopt_inherit.c88 client_fd = accept(fd, (struct sockaddr *)&addr, &len); in server_thread()
89 if (!ASSERT_GE(client_fd, 0, "accept client")) in server_thread()
92 err += verify_sockopt(client_fd, CUSTOM_INHERIT1, "accept", 1); in server_thread()
93 err += verify_sockopt(client_fd, CUSTOM_INHERIT2, "accept", 1); in server_thread()
94 err += verify_sockopt(client_fd, CUSTOM_LISTENER, "accept", 0); in server_thread()
/linux-6.8/security/apparmor/
Dmatch.c25 * unpack_table - unpack a dfa table (one of accept, default, base, next check)
96 * @flags: flags controlling what type of accept table are acceptable
99 * NOTE: this does not valid accept table values
113 /* accept.size == default.size == base.size */ in verify_table_headers()
149 * NOTE: this does not valid accept table values
254 * @flags: flags controlling what type of accept tables are acceptable
509 * aa_dfa_match_until - traverse @dfa until accept state or end of input
528 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local
545 if (accept[state]) in aa_dfa_match_until()
556 if (accept[state]) in aa_dfa_match_until()
[all …]

12345678910>>...62