Home
last modified time | relevance | path

Searched refs:DROP (Results 1 – 21 of 21) sorted by relevance

/linux/tools/testing/selftests/net/netfilter/packetdrill/
H A Dconntrack_synack_old.pkt17 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
18 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
50 +0 `$xtables -D INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
51 +0 `$xtables -D OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
H A Dconntrack_ack_loss_stall.pkt6 // should set -P DROP but it disconnects VM w.o. extra netns
7 +0 `$xtables -A INPUT -m conntrack --ctstate INVALID -j DROP`
118 +0 `$xtables -D INPUT -m conntrack --ctstate INVALID -j DROP`
H A Dconntrack_syn_challenge_ack.pkt15 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
16 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
H A Dconntrack_rst_invalid.pkt6 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
7 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
H A Dconntrack_inexact_rst.pkt17 +0 `iptables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
18 +0 `iptables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
/linux/tools/testing/selftests/net/netfilter/
H A Dbridge_brouter.sh56 … ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP; then
90 ip netns exec "$nsbr" ebtables -t filter -A FORWARD -p ipv4 --ip-protocol icmp -j DROP
99 …$nsbr" ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP
H A Dconntrack_sctp_collision.sh58 ip net exec "$ROUTER_NS" iptables -A FORWARD -m state --state INVALID,UNTRACKED -j DROP
59 ip net exec "$ROUTER_NS" iptables -A INPUT -p sctp -j DROP
/linux/samples/bpf/
H A Dxdp_sample_user.c61 #define DROP(drop) drop, "drop/s" macro
674 str, PPS(pps), DROP(drop), ERR(err)); in stats_get_rx_cnt()
720 str, PPS(pps), DROP(drop), err, "bulk-avg"); in stats_get_cpumap_enqueue()
740 str, PPS(pps), DROP(drop), err, "bulk-avg"); in stats_get_cpumap_enqueue()
763 "xdp_stats", PASS(xdp_pass), DROP(xdp_drop), in stats_get_cpumap_remote()
779 str, PASS(xdp_pass), DROP(xdp_drop), in stats_get_cpumap_remote()
801 pps ? "kthread total" : "kthread", PPS(pps), DROP(drop), err, in stats_get_cpumap_kthread()
818 str, PPS(pps), DROP(drop), err, "sched"); in stats_get_cpumap_kthread()
979 str, XMIT(pps), DROP(drop), err, "drv_err/s", in stats_get_devmap_xmit()
1072 __COLUMN(".2f") "\n", str, XMIT(pps), DROP(drop), in stats_get_devmap_xmit_multi()
[all …]
/linux/drivers/net/ethernet/freescale/dpaa2/
H A Ddpaa2-eth-devlink.c7 DEVLINK_TRAP_GENERIC(DROP, DROP, _id, \
/linux/drivers/net/ethernet/arc/
H A Demac.h44 #define DROP (1 << 23) macro
H A Demac_main.c127 if (unlikely(info & (DROP | DEFR | LTCL | UFLO))) { in arc_emac_tx_clean()
/linux/Documentation/admin-guide/cgroup-v1/
H A Dnet_cls.rst44 iptables -A OUTPUT -m cgroup ! --cgroup 0x100001 -j DROP
/linux/drivers/net/ethernet/marvell/prestera/
H A Dprestera_devlink.c157 DEVLINK_TRAP_DRIVER(DROP, DROP, DEVLINK_PRESTERA_TRAP_ID_##_id, \
/linux/tools/testing/selftests/net/
H A Dsrv6_end_dx6_netfilter_test.sh203 ip netns exec ${nsname} ip6tables -t raw -A PREROUTING -m rpfilter --invert -j DROP
H A Dsrv6_end_dx4_netfilter_test.sh204 ip netns exec ${nsname} iptables -t raw -A PREROUTING -m rpfilter --invert -j DROP
/linux/drivers/net/netdevsim/
H A Ddev.c671 DEVLINK_TRAP_GENERIC(DROP, DROP, _id, \
675 DEVLINK_TRAP_GENERIC(DROP, DROP, _id, \
/linux/drivers/net/ethernet/mellanox/mlx5/core/
H A Ddevlink.c776 DEVLINK_TRAP_GENERIC(DROP, DROP, _id, \
/linux/include/trace/events/
H A Dxdp.h16 FN(DROP) \
/linux/mm/
H A Dfilemap.c1214 DROP, /* Drop ref to page before wait, no check when woken, enumerator
1298 if (behavior == DROP) in folio_wait_bit_common()
1482 return folio_wait_bit_common(folio, PG_locked, state, DROP); in folio_put_wait_locked()
/linux/Documentation/networking/
H A Dsnmp_counter.rst1333 sudo iptables -A INPUT -i ens3 -p tcp --destination-port 9000 -j DROP
1678 nstatuser@nstat-a:~$ sudo iptables -A INPUT -p tcp --sport 9000 -j DROP
/linux/
H A DMAINTAINERS16396 NETWORK DROP MONITOR