Home
last modified time | relevance | path

Searched refs:accept (Results 1 – 25 of 366) sorted by relevance

12345678910>>...15

/linux-6.6.21/tools/testing/selftests/netfilter/
Dconntrack_icmp_related.sh137 type filter hook forward priority 0; policy accept;
138 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept
139 …a l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept
140 meta l4proto { icmp, icmpv6 } ct state new,established accept
154 type filter hook input priority 0; policy accept;
156 icmp type "redirect" ct state "related" counter name "redir4" accept
157 icmpv6 type "nd-redirect" ct state "related" counter name "redir6" accept
159 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
160 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept
174 type filter hook input priority 0; policy accept;
[all …]
Dnft_queue.sh101 type filter hook prerouting priority $prio; policy accept;
105 type filter hook input priority $prio; policy accept;
109 type filter hook forward priority $prio; policy accept;
114 type filter hook output priority $prio; policy accept;
120 type filter hook postrouting priority $prio; policy accept;
133 type filter hook prerouting priority $prio; policy accept;
137 type filter hook input priority $prio; policy accept;
141 type filter hook forward priority $prio; policy accept;
145 type filter hook output priority $prio; policy accept;
149 type filter hook postrouting priority $prio; policy accept;
[all …]
Dnft_flowtable.sh173 meta oif "veth1" tcp dport 12345 ct mark set 1 flow add @f1 counter name routed_orig accept
176 ct mark 1 counter name ct direction map { original : routed_orig, reply : routed_repl } accept
178 ct state established,related accept
180 meta nfproto ipv4 meta l4proto icmp accept
181 meta nfproto ipv6 meta l4proto icmpv6 accept
197 type filter hook input priority 0; policy accept;
199 ip dscp cs3 counter name ip4dscp3 accept
200 ip dscp 0 counter name ip4dscp0 accept
409 type filter hook ingress device "veth0" priority 0; policy accept
426 type filter hook egress device "veth1" priority 0; policy accept
[all …]
Dconntrack_tcp_unreplied.sh96 type filter hook input priority 0; policy accept;
97 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept
98 ct state new ct status dnat tcp dport 8080 counter name "redir" accept
120 type nat hook prerouting priority 0; policy accept;
Dnft_nat.sh187 type nat hook output priority 0; policy accept;
262 type nat hook output priority 0; policy accept;
388 type nat hook output priority 0; policy accept;
455 type nat hook postrouting priority 0; policy accept;
556 type nat hook postrouting priority 0; policy accept;
655 type nat hook prerouting priority 0; policy accept;
737 type nat hook prerouting priority 0; policy accept;
842 type filter hook forward priority 0; policy accept;
860 type filter hook prerouting priority -300; policy accept;
864 type filter hook output priority -300; policy accept;
[all …]
Dnft_synproxy.sh84 type filter hook prerouting priority -300; policy accept;
89 type filter hook forward priority 0; policy accept;
91 ct state new,established counter accept
Dnft_conntrack_helper.sh79 type filter hook prerouting priority 0; policy accept;
83 type filter hook output priority 0; policy accept;
Dnft_meta.sh52 type filter hook input priority 0; policy accept;
67 type filter hook output priority 0; policy accept;
Dnft_fib.sh62 type filter hook prerouting priority 0; policy accept;
76 fib saddr . iif oif gt 0 accept
89 type filter hook prerouting priority 0; policy accept;
/linux-6.6.21/Documentation/netlink/specs/
Dhandshake.yaml42 name: accept
93 notify: accept
95 name: accept
97 attribute-set: accept
Drt_link.yaml292 name: accept-redirects
307 name: accept-source-route
343 name: arp-accept
349 name: accept-local
395 name: accept-ra
398 name: accept-redirects
437 name: accept-ra-defrtr
440 name: accept-ra-pinfo
443 name: accept-ra-rtr-pref
449 name: accept-ra-rt-info-max-plen
[all …]
/linux-6.6.21/io_uring/
Dnet.c1314 struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept); in io_accept_prep() local
1320 accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr)); in io_accept_prep()
1321 accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2)); in io_accept_prep()
1322 accept->flags = READ_ONCE(sqe->accept_flags); in io_accept_prep()
1323 accept->nofile = rlimit(RLIMIT_NOFILE); in io_accept_prep()
1328 accept->file_slot = READ_ONCE(sqe->file_index); in io_accept_prep()
1329 if (accept->file_slot) { in io_accept_prep()
1330 if (accept->flags & SOCK_CLOEXEC) in io_accept_prep()
1333 accept->file_slot != IORING_FILE_INDEX_ALLOC) in io_accept_prep()
1336 if (accept->flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK)) in io_accept_prep()
[all …]
/linux-6.6.21/include/xen/interface/io/
Dpvcalls.h75 } accept; member
110 } accept; member
/linux-6.6.21/sound/soc/sh/rcar/
Drsnd.h734 int (*accept)(struct rsnd_dai_stream *io); member
765 int (*accept)(struct rsnd_dai_stream *io),
773 #define rsnd_kctrl_new_m(mod, io, rtd, name, accept, update, cfg, size, max) \ argument
774 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_m(cfg), \
777 #define rsnd_kctrl_new_s(mod, io, rtd, name, accept, update, cfg, max) \ argument
778 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
781 #define rsnd_kctrl_new_e(mod, io, rtd, name, accept, update, cfg, texts, size) \ argument
782 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
/linux-6.6.21/security/apparmor/
Dmatch.c572 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local
589 if (accept[state]) in aa_dfa_match_until()
600 if (accept[state]) in aa_dfa_match_until()
633 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_matchn_until() local
651 if (accept[state]) in aa_dfa_matchn_until()
662 if (accept[state]) in aa_dfa_matchn_until()
/linux-6.6.21/crypto/
Dalgif_rng.c175 .accept = sock_no_accept,
193 .accept = sock_no_accept,
318 .accept = rng_accept_parent,
Dalgif_skcipher.c193 .accept = sock_no_accept,
271 .accept = sock_no_accept,
353 .accept = skcipher_accept_parent,
/linux-6.6.21/include/uapi/linux/
Dbpqether.h16 unsigned char accept[ETH_ALEN]; member
/linux-6.6.21/lib/
Dtest_string.c186 const char accept[16]; in strspn_selftest() member
200 res = strspn(s->str, s->accept); in strspn_selftest()
/linux-6.6.21/tools/testing/selftests/bpf/prog_tests/
Dbtf_skc_cls_ingress.c98 srv_fd = accept(listen_fd, NULL, NULL); in test_conn()
153 srv_fd = accept(listen_fd, NULL, NULL); in test_syncookie()
Dsock_destroy.c47 accept_serv = accept(serv, NULL, NULL); in test_tcp_client()
88 accept_serv = accept(serv, NULL, NULL); in test_tcp_server()
/linux-6.6.21/Documentation/admin-guide/blockdev/drbd/
Dconn-states-8.dot4 WFConnection -> WFReportParams [ label = "in connect() after accept" ]
/linux-6.6.21/Documentation/ABI/testing/
Dsysfs-class-pktcdvd74 accept new bio requests from the block layer.
77 mark, do no longer accept bio write requests
/linux-6.6.21/tools/testing/selftests/net/
Dso_incoming_cpu.c218 fd = accept(self->servers[i], &self->addr, &self->addrlen); in verify_incoming_cpu()
268 client = accept(server, &self->addr, &self->addrlen); in TEST_F()
/linux-6.6.21/Documentation/filesystems/
Dudf.rst43 The uid= and gid= options need a bit more explaining. They will accept a
45 belonging to that uid and gid. Mount options also accept the string "forget".

12345678910>>...15