Home
last modified time | relevance | path

Searched refs:accept (Results 1 – 25 of 350) sorted by relevance

12345678910>>...14

/linux/tools/testing/selftests/net/netfilter/
H A Dconntrack_icmp_related.sh119 type filter hook forward priority 0; policy accept;
120 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept
121 …a l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept
122 meta l4proto { icmp, icmpv6 } ct state new,established accept
136 type filter hook input priority 0; policy accept;
138 icmp type "redirect" ct state "related" counter name "redir4" accept
139 icmpv6 type "nd-redirect" ct state "related" counter name "redir6" accept
141 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
142 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept
156 type filter hook input priority 0; policy accept;
[all …]
H A Dnft_queue.sh97 type filter hook prerouting priority $prio; policy accept;
101 type filter hook input priority $prio; policy accept;
105 type filter hook forward priority $prio; policy accept;
110 type filter hook output priority $prio; policy accept;
116 type filter hook postrouting priority $prio; policy accept;
129 type filter hook prerouting priority $prio; policy accept;
133 type filter hook input priority $prio; policy accept;
137 type filter hook forward priority $prio; policy accept;
141 type filter hook output priority $prio; policy accept;
145 type filter hook postrouting priority $prio; policy accept;
[all...]
H A Dconntrack_tcp_unreplied.sh71 type filter hook input priority 0; policy accept;
72 ct state established accept
90 type filter hook input priority 0; policy accept;
91 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept
92 ct state new ct status dnat tcp dport 8080 counter name "redir" accept
129 type nat hook prerouting priority 0; policy accept;
H A Dnft_flowtable.sh176 meta oif "veth1" tcp dport 12345 ct mark set 1 flow add @f1 counter name routed_orig accept
179 ct mark 1 counter name ct direction map { original : routed_orig, reply : routed_repl } accept
181 ct state established,related accept
183 meta nfproto ipv4 meta l4proto icmp accept
184 meta nfproto ipv6 meta l4proto icmpv6 accept
200 type filter hook input priority 0; policy accept;
202 ip dscp cs3 counter name ip4dscp3 accept
203 ip dscp 0 counter name ip4dscp0 accept
423 type filter hook ingress device "veth0" priority 0; policy accept
440 type filter hook egress device "veth1" priority 0; policy accept
[all...]
H A Dnft_nat.sh161 type nat hook output priority 0; policy accept;
231 type nat hook output priority 0; policy accept;
353 type nat hook output priority 0; policy accept;
415 type nat hook postrouting priority 0; policy accept;
506 type nat hook postrouting priority 0; policy accept;
595 type nat hook prerouting priority 0; policy accept;
670 type nat hook prerouting priority 0; policy accept;
771 type filter hook forward priority 0; policy accept;
789 type filter hook prerouting priority -300; policy accept;
793 type filter hook output priority -300; policy accept;
[all...]
H A Dnft_synproxy.sh65 type filter hook prerouting priority -300; policy accept;
70 type filter hook forward priority 0; policy accept;
72 ct state new,established counter accept
H A Dbr_netfilter.sh121 type filter hook input priority 1; policy accept
123 ct state new accept
129 type filter hook forward priority 0; policy accept
H A Dnft_conntrack_helper.sh55 type filter hook prerouting priority 0; policy accept;
59 type filter hook output priority 0; policy accept;
H A Dnft_meta.sh52 type filter hook input priority 0; policy accept;
67 type filter hook output priority 0; policy accept;
H A Dnft_nat_zones.sh141 type filter hook prerouting priority -64000; policy accept;
151 type nat hook postrouting priority 0; policy accept;
156 type filter hook prerouting priority -100; policy accept;
H A Dconntrack_reverse_clash.sh22 type nat hook postrouting priority srcnat; policy accept;
/linux/io_uring/
H A Dnet.c1609 struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept); in io_accept_prep() local
1614 accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr)); in io_accept_prep()
1615 accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2)); in io_accept_prep()
1616 accept->flags = READ_ONCE(sqe->accept_flags); in io_accept_prep()
1617 accept->nofile = rlimit(RLIMIT_NOFILE); in io_accept_prep()
1618 accept->iou_flags = READ_ONCE(sqe->ioprio); in io_accept_prep()
1619 if (accept->iou_flags & ~ACCEPT_FLAGS) in io_accept_prep()
1622 accept->file_slot = READ_ONCE(sqe->file_index); in io_accept_prep()
1623 if (accept->file_slot) { in io_accept_prep()
1624 if (accept->flags & SOCK_CLOEXEC) in io_accept_prep()
[all …]
/linux/tools/testing/selftests/net/mptcp/
H A Dpm_netlink.sh50 local accept="${1}"
55 printf "add_addr_accepted %d subflows %d \n" "${accept}" "${subflows}"
57 printf "accept %d\nsubflows %d\n" "${accept}" "${subflows}"
/linux/tools/testing/selftests/net/packetdrill/
H A Dtcp_rcv_big_endseq.pkt20 +0 accept(3, ..., ...) = 4
39 // If queue is empty, accept a packet even if its end_seq is above wup + rcv_wnd
H A Dtcp_ooo-before-and-after-accept.pkt28 +0 accept(3, ..., ...) = 4
45 +0 accept(3, ..., ...) = 4
H A Dtcp_blocking_blocking-read.pkt18 +0 accept(3, ..., ...) = 4
/linux/include/xen/interface/io/
H A Dpvcalls.h75 } accept; member
110 } accept; member
/linux/sound/soc/renesas/rcar/
H A Drsnd.h721 int (*accept)(struct rsnd_dai_stream *io); member
751 int (*accept)(struct rsnd_dai_stream *io),
759 #define rsnd_kctrl_new_m(mod, io, rtd, name, accept, update, cfg, size, max) \ argument
760 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_m(cfg), \
763 #define rsnd_kctrl_new_s(mod, io, rtd, name, accept, update, cfg, max) \ argument
764 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
767 #define rsnd_kctrl_new_e(mod, io, rtd, name, accept, update, cfg, texts, size) \ argument
768 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
/linux/security/apparmor/
H A Dmatch.c583 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local
600 if (accept[state]) in aa_dfa_match_until()
611 if (accept[state]) in aa_dfa_match_until()
644 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_matchn_until() local
662 if (accept[state]) in aa_dfa_matchn_until()
673 if (accept[state]) in aa_dfa_matchn_until()
/linux/crypto/
H A Dalgif_rng.c175 .accept = sock_no_accept,
193 .accept = sock_no_accept,
317 .accept = rng_accept_parent,
H A Dalgif_skcipher.c257 .accept = sock_no_accept,
335 .accept = sock_no_accept,
419 .accept = skcipher_accept_parent,
/linux/net/smc/
H A Dsmc_inet.c40 .accept = smc_accept,
87 .accept = smc_accept,
/linux/include/uapi/linux/
H A Dbpqether.h16 unsigned char accept[ETH_ALEN]; member
/linux/tools/testing/selftests/bpf/prog_tests/
H A Dsock_destroy.c47 accept_serv = accept(serv, NULL, NULL); in test_tcp_client()
88 accept_serv = accept(serv, NULL, NULL); in test_tcp_server()
H A Dsetget_sockopt.c104 cfd = accept(sfd, NULL, 0); in test_ktls()
105 if (!ASSERT_GE(cfd, 0, "accept")) in test_ktls()
177 * accept()ed socket; this was set earlier in the passive established in test_nonstandard_opt()
178 * callback for the accept()ed socket via bpf_setsockopt(). in test_nonstandard_opt()
184 cfd = accept(sfd, NULL, 0); in test_nonstandard_opt()
185 if (!ASSERT_GE(cfd, 0, "accept")) in test_nonstandard_opt()

12345678910>>...14