/linux/tools/testing/selftests/net/netfilter/packetdrill/ |
H A D | conntrack_synack_old.pkt | 17 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP` 18 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP` 50 +0 `$xtables -D INPUT -p tcp -m conntrack --ctstate INVALID -j DROP` 51 +0 `$xtables -D OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
|
H A D | conntrack_ack_loss_stall.pkt | 6 // should set -P DROP but it disconnects VM w.o. extra netns 7 +0 `$xtables -A INPUT -m conntrack --ctstate INVALID -j DROP` 118 +0 `$xtables -D INPUT -m conntrack --ctstate INVALID -j DROP`
|
H A D | conntrack_syn_challenge_ack.pkt | 15 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP` 16 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
|
H A D | conntrack_rst_invalid.pkt | 6 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP` 7 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
|
H A D | conntrack_inexact_rst.pkt | 17 +0 `iptables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP` 18 +0 `iptables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
|
/linux/tools/testing/selftests/net/netfilter/ |
H A D | bridge_brouter.sh | 56 … ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP; then 90 ip netns exec "$nsbr" ebtables -t filter -A FORWARD -p ipv4 --ip-protocol icmp -j DROP 99 …$nsbr" ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP
|
H A D | conntrack_sctp_collision.sh | 58 ip net exec "$ROUTER_NS" iptables -A FORWARD -m state --state INVALID,UNTRACKED -j DROP 59 ip net exec "$ROUTER_NS" iptables -A INPUT -p sctp -j DROP
|
/linux/samples/bpf/ |
H A D | xdp_sample_user.c | 61 #define DROP(drop) drop, "drop/s" macro 674 str, PPS(pps), DROP(drop), ERR(err)); in stats_get_rx_cnt() 720 str, PPS(pps), DROP(drop), err, "bulk-avg"); in stats_get_cpumap_enqueue() 740 str, PPS(pps), DROP(drop), err, "bulk-avg"); in stats_get_cpumap_enqueue() 763 "xdp_stats", PASS(xdp_pass), DROP(xdp_drop), in stats_get_cpumap_remote() 779 str, PASS(xdp_pass), DROP(xdp_drop), in stats_get_cpumap_remote() 801 pps ? "kthread total" : "kthread", PPS(pps), DROP(drop), err, in stats_get_cpumap_kthread() 818 str, PPS(pps), DROP(drop), err, "sched"); in stats_get_cpumap_kthread() 979 str, XMIT(pps), DROP(drop), err, "drv_err/s", in stats_get_devmap_xmit() 1072 __COLUMN(".2f") "\n", str, XMIT(pps), DROP(drop), in stats_get_devmap_xmit_multi() [all …]
|
/linux/drivers/net/ethernet/freescale/dpaa2/ |
H A D | dpaa2-eth-devlink.c | 7 DEVLINK_TRAP_GENERIC(DROP, DROP, _id, \
|
/linux/drivers/net/ethernet/arc/ |
H A D | emac.h | 44 #define DROP (1 << 23) macro
|
H A D | emac_main.c | 127 if (unlikely(info & (DROP | DEFR | LTCL | UFLO))) { in arc_emac_tx_clean()
|
/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | net_cls.rst | 44 iptables -A OUTPUT -m cgroup ! --cgroup 0x100001 -j DROP
|
/linux/drivers/net/ethernet/marvell/prestera/ |
H A D | prestera_devlink.c | 157 DEVLINK_TRAP_DRIVER(DROP, DROP, DEVLINK_PRESTERA_TRAP_ID_##_id, \
|
/linux/tools/testing/selftests/net/ |
H A D | srv6_end_dx6_netfilter_test.sh | 203 ip netns exec ${nsname} ip6tables -t raw -A PREROUTING -m rpfilter --invert -j DROP
|
H A D | srv6_end_dx4_netfilter_test.sh | 204 ip netns exec ${nsname} iptables -t raw -A PREROUTING -m rpfilter --invert -j DROP
|
/linux/drivers/net/netdevsim/ |
H A D | dev.c | 671 DEVLINK_TRAP_GENERIC(DROP, DROP, _id, \ 675 DEVLINK_TRAP_GENERIC(DROP, DROP, _id, \
|
/linux/drivers/net/ethernet/mellanox/mlx5/core/ |
H A D | devlink.c | 776 DEVLINK_TRAP_GENERIC(DROP, DROP, _id, \
|
/linux/include/trace/events/ |
H A D | xdp.h | 16 FN(DROP) \
|
/linux/mm/ |
H A D | filemap.c | 1214 DROP, /* Drop ref to page before wait, no check when woken, enumerator 1298 if (behavior == DROP) in folio_wait_bit_common() 1482 return folio_wait_bit_common(folio, PG_locked, state, DROP); in folio_put_wait_locked()
|
/linux/Documentation/networking/ |
H A D | snmp_counter.rst | 1333 sudo iptables -A INPUT -i ens3 -p tcp --destination-port 9000 -j DROP 1678 nstatuser@nstat-a:~$ sudo iptables -A INPUT -p tcp --sport 9000 -j DROP
|
/linux/ |
H A D | MAINTAINERS | 16396 NETWORK DROP MONITOR
|