/linux-6.8/tools/testing/selftests/bpf/verifier/ |
D | sleepable.c | 2 "sleepable fentry accept", 10 .result = ACCEPT, 15 "sleepable fexit accept", 23 .result = ACCEPT, 28 "sleepable fmod_ret accept", 36 .result = ACCEPT, 41 "sleepable iter accept", 49 .result = ACCEPT, 54 "sleepable lsm accept", 62 .result = ACCEPT, [all …]
|
D | basic_instr.c | 13 .result = ACCEPT, 29 .result = ACCEPT, 39 .result = ACCEPT, 49 .result = ACCEPT, 60 .result = ACCEPT, 71 .result = ACCEPT, 81 .result = ACCEPT, 91 .result = ACCEPT, 103 .result = ACCEPT, 117 .result = ACCEPT, [all …]
|
D | jmp32.c | 17 .result = ACCEPT, 49 .result = ACCEPT, 76 .result = ACCEPT, 92 .result = ACCEPT, 105 .result = ACCEPT, 129 .result = ACCEPT, 157 .result = ACCEPT, 170 .result = ACCEPT, 194 .result = ACCEPT, 222 .result = ACCEPT, [all …]
|
D | event_output.c | 44 .result = ACCEPT, 52 .result = ACCEPT, 60 .result = ACCEPT, 68 .result = ACCEPT, 76 .result = ACCEPT, 84 .result = ACCEPT, 92 .result = ACCEPT, 100 .result = ACCEPT, 108 .result = ACCEPT, 117 .result = ACCEPT,
|
D | dead_code.c | 13 .result = ACCEPT, 24 .result = ACCEPT, 39 .result = ACCEPT, 50 .result = ACCEPT, 62 .result = ACCEPT, 76 .result = ACCEPT, 92 .result = ACCEPT, 110 .result = ACCEPT, 128 .result = ACCEPT, 144 .result = ACCEPT, [all …]
|
D | ctx_skb.c | 30 .result = ACCEPT, 184 .result = ACCEPT, 194 .result = ACCEPT, 204 .result = ACCEPT, 220 .result = ACCEPT, 236 .result = ACCEPT, 246 .result = ACCEPT, 256 .result = ACCEPT, 301 .result = ACCEPT, 312 .result = ACCEPT, [all …]
|
D | jit.c | 20 .result = ACCEPT, 44 .result = ACCEPT, 58 .result = ACCEPT, 71 .result = ACCEPT, 126 .result = ACCEPT, 173 .result = ACCEPT, 192 .result = ACCEPT, 200 .result = ACCEPT, 208 .result = ACCEPT, 216 .result = ACCEPT,
|
D | ld_dw.c | 7 .result = ACCEPT, 16 .result = ACCEPT, 25 .result = ACCEPT, 34 .result = ACCEPT, 43 .result = ACCEPT,
|
D | wide_access.c | 18 BPF_SOCK_ADDR_STORE(user_ip6, 0, ACCEPT, 23 BPF_SOCK_ADDR_STORE(user_ip6, 2, ACCEPT, 33 BPF_SOCK_ADDR_STORE(msg_src_ip6, 1, ACCEPT, 60 BPF_SOCK_ADDR_LOAD(user_ip6, 0, ACCEPT, 65 BPF_SOCK_ADDR_LOAD(user_ip6, 2, ACCEPT, 75 BPF_SOCK_ADDR_LOAD(msg_src_ip6, 1, ACCEPT,
|
D | ld_abs.c | 70 .result = ACCEPT, 93 .result = ACCEPT, 162 .result = ACCEPT, 182 .result = ACCEPT, 202 .result = ACCEPT, 218 .result = ACCEPT, 234 .result = ACCEPT, 245 .result = ACCEPT, 273 .result = ACCEPT, 284 .result = ACCEPT,
|
D | direct_value_access.c | 10 .result = ACCEPT, 22 .result = ACCEPT, 34 .result = ACCEPT, 46 .result = ACCEPT, 58 .result = ACCEPT, 95 .result = ACCEPT, 119 .result = ACCEPT, 169 .result = ACCEPT, 183 .result = ACCEPT, 237 .result = ACCEPT,
|
D | perf_event_sample_period.c | 14 .result = ACCEPT, 30 .result = ACCEPT, 46 .result = ACCEPT, 57 .result = ACCEPT,
|
D | atomic_cmpxchg.c | 36 .result = ACCEPT, 73 .result = ACCEPT, 109 .result = ACCEPT, 129 .result = ACCEPT, 149 .result = ACCEPT, 170 .result = ACCEPT, 210 .result = ACCEPT,
|
D | jset.c | 31 .result = ACCEPT, 71 .result = ACCEPT, 88 .result = ACCEPT, 146 .result = ACCEPT, 168 .result = ACCEPT,
|
D | jump.c | 23 .result = ACCEPT, 51 .result = ACCEPT, 87 .result = ACCEPT, 138 .result = ACCEPT, 179 .result = ACCEPT, 208 .result = ACCEPT, 237 .result = ACCEPT, 267 .result = ACCEPT, 373 .result = ACCEPT, 395 .result = ACCEPT,
|
/linux-6.8/tools/testing/selftests/netfilter/ |
D | conntrack_icmp_related.sh | 137 type filter hook forward priority 0; policy accept; 138 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept 139 …a l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept 140 meta l4proto { icmp, icmpv6 } ct state new,established accept 154 type filter hook input priority 0; policy accept; 156 icmp type "redirect" ct state "related" counter name "redir4" accept 157 icmpv6 type "nd-redirect" ct state "related" counter name "redir6" accept 159 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 160 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept 174 type filter hook input priority 0; policy accept; [all …]
|
D | nft_queue.sh | 101 type filter hook prerouting priority $prio; policy accept; 105 type filter hook input priority $prio; policy accept; 109 type filter hook forward priority $prio; policy accept; 114 type filter hook output priority $prio; policy accept; 120 type filter hook postrouting priority $prio; policy accept; 133 type filter hook prerouting priority $prio; policy accept; 137 type filter hook input priority $prio; policy accept; 141 type filter hook forward priority $prio; policy accept; 145 type filter hook output priority $prio; policy accept; 149 type filter hook postrouting priority $prio; policy accept; [all …]
|
D | nft_flowtable.sh | 173 meta oif "veth1" tcp dport 12345 ct mark set 1 flow add @f1 counter name routed_orig accept 176 ct mark 1 counter name ct direction map { original : routed_orig, reply : routed_repl } accept 178 ct state established,related accept 180 meta nfproto ipv4 meta l4proto icmp accept 181 meta nfproto ipv6 meta l4proto icmpv6 accept 197 type filter hook input priority 0; policy accept; 199 ip dscp cs3 counter name ip4dscp3 accept 200 ip dscp 0 counter name ip4dscp0 accept 409 type filter hook ingress device "veth0" priority 0; policy accept 426 type filter hook egress device "veth1" priority 0; policy accept [all …]
|
D | conntrack_tcp_unreplied.sh | 79 ip netns exec $ns1 iptables -A INPUT -m state --state established,related -j ACCEPT 96 type filter hook input priority 0; policy accept; 97 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept 98 ct state new ct status dnat tcp dport 8080 counter name "redir" accept 120 type nat hook prerouting priority 0; policy accept;
|
/linux-6.8/net/mac80211/tests/ |
D | mfp.c | 24 .desc = "public action: accept unicast from unknown peer", 32 .desc = "public action: accept multicast from unknown peer", 40 .desc = "public action: accept unicast without MFP", 49 .desc = "public action: accept multicast without MFP", 68 .desc = "public action: accept multicast with MFP", 133 .desc = "protected dual: accept unicast with MFP", 144 .desc = "protected dual: accept multicast with MFP", 156 .desc = "deauth: accept unicast with MFP but w/o key", 164 .desc = "disassoc: accept unicast with MFP but w/o key", 190 .desc = "BA action: accept unprotected without MFP",
|
/linux-6.8/net/bluetooth/ |
D | hci_request.c | 368 bt_dev_dbg(req->hdev, "Remove %pMR (0x%x) from accept list", &cp.bdaddr, in del_from_accept_list() 388 /* Adds connection to accept list if needed. On error, returns -1. */ 396 /* Already in accept list */ in add_to_accept_list() 401 /* Select filter policy to accept all advertising */ in add_to_accept_list() 405 /* Accept list can not be used with RPAs */ in add_to_accept_list() 412 /* During suspend, only wakeable devices can be in accept list */ in add_to_accept_list() 421 bt_dev_dbg(hdev, "Add %pMR (0x%x) to accept list", &cp.bdaddr, in add_to_accept_list() 457 /* We allow usage of accept list even with RPAs in suspend. In the worst in update_accept_list() 467 /* Go through the current accept list programmed into the in update_accept_list() 482 * remove it from the accept list. in update_accept_list() [all …]
|
/linux-6.8/Documentation/netlink/specs/ |
D | handshake.yaml | 42 name: accept 93 notify: accept 95 name: accept 97 attribute-set: accept
|
D | rt_link.yaml | 305 name: accept-redirects 320 name: accept-source-route 356 name: arp-accept 362 name: accept-local 408 name: accept-ra 411 name: accept-redirects 450 name: accept-ra-defrtr 453 name: accept-ra-pinfo 456 name: accept-ra-rtr-pref 462 name: accept-ra-rt-info-max-plen [all …]
|
/linux-6.8/tools/testing/selftests/bpf/prog_tests/ |
D | sockopt_inherit.c | 88 client_fd = accept(fd, (struct sockaddr *)&addr, &len); in server_thread() 89 if (!ASSERT_GE(client_fd, 0, "accept client")) in server_thread() 92 err += verify_sockopt(client_fd, CUSTOM_INHERIT1, "accept", 1); in server_thread() 93 err += verify_sockopt(client_fd, CUSTOM_INHERIT2, "accept", 1); in server_thread() 94 err += verify_sockopt(client_fd, CUSTOM_LISTENER, "accept", 0); in server_thread()
|
/linux-6.8/security/apparmor/ |
D | match.c | 25 * unpack_table - unpack a dfa table (one of accept, default, base, next check) 96 * @flags: flags controlling what type of accept table are acceptable 99 * NOTE: this does not valid accept table values 113 /* accept.size == default.size == base.size */ in verify_table_headers() 149 * NOTE: this does not valid accept table values 254 * @flags: flags controlling what type of accept tables are acceptable 509 * aa_dfa_match_until - traverse @dfa until accept state or end of input 528 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local 545 if (accept[state]) in aa_dfa_match_until() 556 if (accept[state]) in aa_dfa_match_until() [all …]
|