| /linux/tools/testing/selftests/net/netfilter/ |
| H A D | conntrack_icmp_related.sh | 119 type filter hook forward priority 0; policy accept; 120 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept 121 …a l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept 122 meta l4proto { icmp, icmpv6 } ct state new,established accept 136 type filter hook input priority 0; policy accept; 138 icmp type "redirect" ct state "related" counter name "redir4" accept 139 icmpv6 type "nd-redirect" ct state "related" counter name "redir6" accept 141 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 142 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept 156 type filter hook input priority 0; policy accept; [all …]
|
| H A D | nft_queue.sh | 97 type filter hook prerouting priority $prio; policy accept; 101 type filter hook input priority $prio; policy accept; 105 type filter hook forward priority $prio; policy accept; 110 type filter hook output priority $prio; policy accept; 116 type filter hook postrouting priority $prio; policy accept; 129 type filter hook prerouting priority $prio; policy accept; 133 type filter hook input priority $prio; policy accept; 137 type filter hook forward priority $prio; policy accept; 141 type filter hook output priority $prio; policy accept; 145 type filter hook postrouting priority $prio; policy accept; [all …]
|
| H A D | conntrack_tcp_unreplied.sh | 71 type filter hook input priority 0; policy accept; 72 ct state established accept 90 type filter hook input priority 0; policy accept; 91 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept 92 ct state new ct status dnat tcp dport 8080 counter name "redir" accept 129 type nat hook prerouting priority 0; policy accept;
|
| H A D | nft_flowtable.sh | 176 meta oif "veth1" tcp dport 12345 ct mark set 1 flow add @f1 counter name routed_orig accept 179 ct mark 1 counter name ct direction map { original : routed_orig, reply : routed_repl } accept 181 ct state established,related accept 183 meta nfproto ipv4 meta l4proto icmp accept 184 meta nfproto ipv6 meta l4proto icmpv6 accept 200 type filter hook input priority 0; policy accept; 202 ip dscp cs3 counter name ip4dscp3 accept 203 ip dscp 0 counter name ip4dscp0 accept 423 type filter hook ingress device "veth0" priority 0; policy accept 440 type filter hook egress device "veth1" priority 0; policy accept [all...] |
| H A D | nft_nat.sh | 161 type nat hook output priority 0; policy accept; 231 type nat hook output priority 0; policy accept; 353 type nat hook output priority 0; policy accept; 415 type nat hook postrouting priority 0; policy accept; 506 type nat hook postrouting priority 0; policy accept; 595 type nat hook prerouting priority 0; policy accept; 670 type nat hook prerouting priority 0; policy accept; 771 type filter hook forward priority 0; policy accept; 789 type filter hook prerouting priority -300; policy accept; 793 type filter hook output priority -300; policy accept; [all...] |
| H A D | nft_synproxy.sh | 65 type filter hook prerouting priority -300; policy accept; 70 type filter hook forward priority 0; policy accept; 72 ct state new,established counter accept
|
| H A D | br_netfilter.sh | 121 type filter hook input priority 1; policy accept 123 ct state new accept 129 type filter hook forward priority 0; policy accept
|
| H A D | nft_conntrack_helper.sh | 55 type filter hook prerouting priority 0; policy accept; 59 type filter hook output priority 0; policy accept;
|
| H A D | nft_meta.sh | 52 type filter hook input priority 0; policy accept; 67 type filter hook output priority 0; policy accept;
|
| H A D | nft_nat_zones.sh | 141 type filter hook prerouting priority -64000; policy accept; 151 type nat hook postrouting priority 0; policy accept; 156 type filter hook prerouting priority -100; policy accept;
|
| /linux/io_uring/ |
| H A D | net.c | 1617 struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept); in io_accept_prep() 1622 accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr)); in io_accept_prep() 1623 accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2)); in io_accept_prep() 1624 accept->flags = READ_ONCE(sqe->accept_flags); in io_accept_prep() 1625 accept->nofile = rlimit(RLIMIT_NOFILE); in io_accept_prep() 1626 accept->iou_flags = READ_ONCE(sqe->ioprio); in io_accept_prep() 1627 if (accept->iou_flags & ~ACCEPT_FLAGS) in io_accept_prep() 1630 accept->file_slot = READ_ONCE(sqe->file_index); in io_accept_prep() 1631 if (accept->file_slot) { in io_accept_prep() 1632 if (accept in io_accept_prep() 1613 struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept); io_accept_prep() local 1647 struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept); io_accept() local [all...] |
| /linux/tools/testing/selftests/net/mptcp/ |
| H A D | pm_netlink.sh | 50 local accept="${1}" 55 printf "add_addr_accepted %d subflows %d \n" "${accept}" "${subflows}" 57 printf "accept %d\nsubflows %d\n" "${accept}" "${subflows}"
|
| /linux/tools/testing/selftests/net/packetdrill/ |
| H A D | tcp_rcv_big_endseq.pkt | 20 +0 accept(3, ..., ...) = 4 39 // If queue is empty, accept a packet even if its end_seq is above wup + rcv_wnd
|
| H A D | tcp_ooo-before-and-after-accept.pkt | 28 +0 accept(3, ..., ...) = 4 45 +0 accept(3, ..., ...) = 4
|
| /linux/include/xen/interface/io/ |
| H A D | pvcalls.h | 75 } accept; member 110 } accept; member
|
| /linux/sound/soc/renesas/rcar/ |
| H A D | rsnd.h | 721 int (*accept)(struct rsnd_dai_stream *io); member 751 int (*accept)(struct rsnd_dai_stream *io), 759 #define rsnd_kctrl_new_m(mod, io, rtd, name, accept, update, cfg, size, max) \ argument 760 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_m(cfg), \ 763 #define rsnd_kctrl_new_s(mod, io, rtd, name, accept, update, cfg, max) \ argument 764 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \ 767 #define rsnd_kctrl_new_e(mod, io, rtd, name, accept, update, cfg, texts, size) \ argument 768 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
|
| /linux/security/apparmor/ |
| H A D | match.c | 609 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local 626 if (accept[state]) in aa_dfa_match_until() 637 if (accept[state]) in aa_dfa_match_until() 670 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_matchn_until() local 688 if (accept[state]) in aa_dfa_matchn_until() 699 if (accept[state]) in aa_dfa_matchn_until()
|
| /linux/crypto/ |
| H A D | algif_rng.c | 175 .accept = sock_no_accept, 193 .accept = sock_no_accept, 317 .accept = rng_accept_parent,
|
| H A D | algif_skcipher.c | 257 .accept = sock_no_accept, 335 .accept = sock_no_accept, 419 .accept = skcipher_accept_parent,
|
| /linux/net/smc/ |
| H A D | smc_inet.c | 40 .accept = smc_accept, 87 .accept = smc_accept,
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | sock_destroy.c | 47 accept_serv = accept(serv, NULL, NULL); in test_tcp_client() 88 accept_serv = accept(serv, NULL, NULL); in test_tcp_server()
|
| H A D | setget_sockopt.c | 104 cfd = accept(sfd, NULL, 0); in test_ktls() 184 cfd = accept(sfd, NULL, 0); in test_nonstandard_opt()
|
| /linux/include/uapi/linux/ |
| H A D | bpqether.h | 16 unsigned char accept[ETH_ALEN]; member
|
| /linux/drivers/xen/ |
| H A D | pvcalls-back.c | 562 req->u.accept.id_new, in __pvcalls_back_accept() 563 req->u.accept.ref, in __pvcalls_back_accept() 564 req->u.accept.evtchn, in __pvcalls_back_accept() 581 rsp->u.accept.id = req->u.accept.id; in __pvcalls_back_accept() 730 req->u.accept.id); in pvcalls_back_accept() 757 rsp->u.accept.id = req->u.accept.id; in pvcalls_back_accept()
|
| /linux/Documentation/translations/zh_CN/security/ |
| H A D | SCTP.rst | 109 每当通过 **accept**\(2)创建一个新的套接字(即TCP类型的套接字),或者当 246 每当通过 **accept**\(2)(即TCP类型的套接字)创建一个新的套接字,或者
|