/kernel/linux/linux-5.10/tools/testing/selftests/bpf/verifier/ |
H A D | event_output.c | 44 .result = ACCEPT, 52 .result = ACCEPT, 60 .result = ACCEPT, 68 .result = ACCEPT, 76 .result = ACCEPT, 84 .result = ACCEPT, 92 .result = ACCEPT, 100 .result = ACCEPT, 108 .result = ACCEPT, 117 .result = ACCEPT, [all...] |
H A D | wide_access.c | 17 BPF_SOCK_ADDR_STORE(user_ip6, 0, ACCEPT, 21 BPF_SOCK_ADDR_STORE(user_ip6, 2, ACCEPT, 29 BPF_SOCK_ADDR_STORE(msg_src_ip6, 1, ACCEPT, 54 BPF_SOCK_ADDR_LOAD(user_ip6, 0, ACCEPT, 58 BPF_SOCK_ADDR_LOAD(user_ip6, 2, ACCEPT, 66 BPF_SOCK_ADDR_LOAD(msg_src_ip6, 1, ACCEPT,
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/verifier/ |
H A D | event_output.c | 44 .result = ACCEPT, 52 .result = ACCEPT, 60 .result = ACCEPT, 68 .result = ACCEPT, 76 .result = ACCEPT, 84 .result = ACCEPT, 92 .result = ACCEPT, 100 .result = ACCEPT, 108 .result = ACCEPT, 117 .result = ACCEPT, [all...] |
H A D | wide_access.c | 18 BPF_SOCK_ADDR_STORE(user_ip6, 0, ACCEPT, 23 BPF_SOCK_ADDR_STORE(user_ip6, 2, ACCEPT, 33 BPF_SOCK_ADDR_STORE(msg_src_ip6, 1, ACCEPT, 60 BPF_SOCK_ADDR_LOAD(user_ip6, 0, ACCEPT, 65 BPF_SOCK_ADDR_LOAD(user_ip6, 2, ACCEPT, 75 BPF_SOCK_ADDR_LOAD(msg_src_ip6, 1, ACCEPT,
|
H A D | bpf_loop_inline.c | 60 .result = ACCEPT, 93 .result = ACCEPT, 130 .result = ACCEPT, 168 .result = ACCEPT, 238 .result = ACCEPT, 253 .result = ACCEPT,
|
H A D | atomic_fetch.c | 21 .result = ACCEPT, 45 .result = ACCEPT, 119 .result = ACCEPT, \
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/prog_tests/ |
H A D | cls_redirect.c | 192 ACCEPT, enumerator 240 { TCP, ACCEPT, UNKNOWN_CONN, NO_HOPS, SYN }, 241 { TCP, ACCEPT, UNKNOWN_CONN, NO_HOPS, ACK }, 243 { TCP, ACCEPT, KNOWN_CONN, ONE_HOP, ACK }, 244 { UDP, ACCEPT, UNKNOWN_CONN, NO_HOPS, NONE }, 246 { UDP, ACCEPT, KNOWN_CONN, ONE_HOP, NONE }, 429 case ACCEPT: in test_cls_redirect_common()
|
H A D | align.c | 17 ACCEPT, enumerator
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/ |
H A D | cls_redirect.c | 193 ACCEPT, enumerator 241 { TCP, ACCEPT, UNKNOWN_CONN, NO_HOPS, SYN }, 242 { TCP, ACCEPT, UNKNOWN_CONN, NO_HOPS, ACK }, 244 { TCP, ACCEPT, KNOWN_CONN, ONE_HOP, ACK }, 245 { UDP, ACCEPT, UNKNOWN_CONN, NO_HOPS, NONE }, 247 { UDP, ACCEPT, KNOWN_CONN, ONE_HOP, NONE }, 430 case ACCEPT: in test_cls_redirect_common()
|
H A D | align.c | 17 ACCEPT, enumerator
|
/kernel/linux/linux-5.10/samples/bpf/ |
H A D | run_cookie_uid_helper_example.sh | 8 iptables -D OUTPUT -m bpf --object-pinned ${mnt_dir}/bpf_prog -j ACCEPT
|
/kernel/linux/linux-6.6/samples/bpf/ |
H A D | run_cookie_uid_helper_example.sh | 8 iptables -D OUTPUT -m bpf --object-pinned ${mnt_dir}/bpf_prog -j ACCEPT
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/mptcp/ |
H A D | mptcp_sockopt.sh | 32 ip netns exec $ns $t -A OUTPUT -p tcp --syn -m mark --mark $m -j ACCEPT 35 ip netns exec $ns $t -A OUTPUT -p tcp --tcp-flags RST RST -m mark --mark 0 -j ACCEPT 37 ip netns exec $ns $t -A OUTPUT -p tcp -m mark --mark $m -j ACCEPT
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/ |
H A D | big_tcp.sh | 98 -m length ! --length 0:$CHK_SIZE -j ACCEPT 117 -m length ! --length 0:$CHK_SIZE -j ACCEPT
|
H A D | ip_defrag.sh | 53 ip netns exec "${NETNS}" ip6tables -A INPUT -m conntrack --ctstate INVALID -j ACCEPT
|
/kernel/linux/linux-5.10/tools/testing/selftests/net/ |
H A D | ip_defrag.sh | 53 ip netns exec "${NETNS}" ip6tables -A INPUT -m conntrack --ctstate INVALID -j ACCEPT
|
/kernel/linux/linux-6.6/tools/testing/selftests/netfilter/ |
H A D | conntrack_tcp_unreplied.sh | 79 ip netns exec $ns1 iptables -A INPUT -m state --state established,related -j ACCEPT
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/ |
H A D | test_verifier.c | 97 ACCEPT, enumerator 1023 if (expected_ret == ACCEPT || expected_ret == VERBOSE_ACCEPT) { in do_test_single()
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/ |
H A D | test_verifier.c | 141 ACCEPT, enumerator 1667 if (expected_ret == ACCEPT || expected_ret == VERBOSE_ACCEPT) { in do_test_single()
|