Home
last modified time | relevance | path

Searched refs:accept (Results 1 – 25 of 420) sorted by relevance

12345678910>>...17

/linux-6.12.1/tools/testing/selftests/net/netfilter/
Dconntrack_icmp_related.sh119 type filter hook forward priority 0; policy accept;
120 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept
121 …a l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept
122 meta l4proto { icmp, icmpv6 } ct state new,established accept
136 type filter hook input priority 0; policy accept;
138 icmp type "redirect" ct state "related" counter name "redir4" accept
139 icmpv6 type "nd-redirect" ct state "related" counter name "redir6" accept
141 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
142 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept
156 type filter hook input priority 0; policy accept;
[all …]
Dnft_queue.sh95 type filter hook prerouting priority $prio; policy accept;
99 type filter hook input priority $prio; policy accept;
103 type filter hook forward priority $prio; policy accept;
108 type filter hook output priority $prio; policy accept;
114 type filter hook postrouting priority $prio; policy accept;
127 type filter hook prerouting priority $prio; policy accept;
131 type filter hook input priority $prio; policy accept;
135 type filter hook forward priority $prio; policy accept;
139 type filter hook output priority $prio; policy accept;
143 type filter hook postrouting priority $prio; policy accept;
[all …]
Dconntrack_tcp_unreplied.sh71 type filter hook input priority 0; policy accept;
72 ct state established accept
90 type filter hook input priority 0; policy accept;
91 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept
92 ct state new ct status dnat tcp dport 8080 counter name "redir" accept
129 type nat hook prerouting priority 0; policy accept;
Dnft_flowtable.sh167 meta oif "veth1" tcp dport 12345 ct mark set 1 flow add @f1 counter name routed_orig accept
170 ct mark 1 counter name ct direction map { original : routed_orig, reply : routed_repl } accept
172 ct state established,related accept
174 meta nfproto ipv4 meta l4proto icmp accept
175 meta nfproto ipv6 meta l4proto icmpv6 accept
191 type filter hook input priority 0; policy accept;
193 ip dscp cs3 counter name ip4dscp3 accept
194 ip dscp 0 counter name ip4dscp0 accept
385 type filter hook ingress device "veth0" priority 0; policy accept
402 type filter hook egress device "veth1" priority 0; policy accept
[all …]
Dnft_nat.sh161 type nat hook output priority 0; policy accept;
231 type nat hook output priority 0; policy accept;
353 type nat hook output priority 0; policy accept;
415 type nat hook postrouting priority 0; policy accept;
506 type nat hook postrouting priority 0; policy accept;
595 type nat hook prerouting priority 0; policy accept;
670 type nat hook prerouting priority 0; policy accept;
771 type filter hook forward priority 0; policy accept;
789 type filter hook prerouting priority -300; policy accept;
793 type filter hook output priority -300; policy accept;
[all …]
Dnft_synproxy.sh65 type filter hook prerouting priority -300; policy accept;
70 type filter hook forward priority 0; policy accept;
72 ct state new,established counter accept
Dbr_netfilter.sh118 type filter hook input priority 1; policy accept
120 ct state new accept
126 type filter hook forward priority 0; policy accept
Dnft_meta.sh52 type filter hook input priority 0; policy accept;
67 type filter hook output priority 0; policy accept;
Dnft_conntrack_helper.sh55 type filter hook prerouting priority 0; policy accept;
59 type filter hook output priority 0; policy accept;
Dnft_fib.sh41 type filter hook prerouting priority 0; policy accept;
55 fib saddr . iif oif gt 0 accept
68 type filter hook prerouting priority 0; policy accept;
Dconntrack_reverse_clash.sh22 type nat hook postrouting priority srcnat; policy accept;
Dnft_nat_zones.sh142 type filter hook prerouting priority -64000; policy accept;
152 type nat hook postrouting priority 0; policy accept;
157 type filter hook prerouting priority -100; policy accept;
/linux-6.12.1/io_uring/
Dnet.c1511 struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept); in io_accept_prep() local
1516 accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr)); in io_accept_prep()
1517 accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2)); in io_accept_prep()
1518 accept->flags = READ_ONCE(sqe->accept_flags); in io_accept_prep()
1519 accept->nofile = rlimit(RLIMIT_NOFILE); in io_accept_prep()
1520 accept->iou_flags = READ_ONCE(sqe->ioprio); in io_accept_prep()
1521 if (accept->iou_flags & ~ACCEPT_FLAGS) in io_accept_prep()
1524 accept->file_slot = READ_ONCE(sqe->file_index); in io_accept_prep()
1525 if (accept->file_slot) { in io_accept_prep()
1526 if (accept->flags & SOCK_CLOEXEC) in io_accept_prep()
[all …]
/linux-6.12.1/tools/testing/selftests/net/mptcp/
Dpm_netlink.sh50 local accept="${1}"
55 printf "add_addr_accepted %d subflows %d \n" "${accept}" "${subflows}"
57 printf "accept %d\nsubflows %d\n" "${accept}" "${subflows}"
/linux-6.12.1/include/xen/interface/io/
Dpvcalls.h75 } accept; member
110 } accept; member
/linux-6.12.1/sound/soc/sh/rcar/
Drsnd.h721 int (*accept)(struct rsnd_dai_stream *io); member
752 int (*accept)(struct rsnd_dai_stream *io),
760 #define rsnd_kctrl_new_m(mod, io, rtd, name, accept, update, cfg, size, max) \ argument
761 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_m(cfg), \
764 #define rsnd_kctrl_new_s(mod, io, rtd, name, accept, update, cfg, max) \ argument
765 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
768 #define rsnd_kctrl_new_e(mod, io, rtd, name, accept, update, cfg, texts, size) \ argument
769 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
/linux-6.12.1/security/apparmor/
Dmatch.c528 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local
545 if (accept[state]) in aa_dfa_match_until()
556 if (accept[state]) in aa_dfa_match_until()
589 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_matchn_until() local
607 if (accept[state]) in aa_dfa_matchn_until()
618 if (accept[state]) in aa_dfa_matchn_until()
/linux-6.12.1/crypto/
Dalgif_rng.c175 .accept = sock_no_accept,
193 .accept = sock_no_accept,
318 .accept = rng_accept_parent,
Dalgif_skcipher.c257 .accept = sock_no_accept,
335 .accept = sock_no_accept,
419 .accept = skcipher_accept_parent,
/linux-6.12.1/net/smc/
Dsmc_inet.c40 .accept = smc_accept,
88 .accept = smc_accept,
/linux-6.12.1/include/uapi/linux/
Dbpqether.h16 unsigned char accept[ETH_ALEN]; member
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/
Dsock_destroy.c47 accept_serv = accept(serv, NULL, NULL); in test_tcp_client()
88 accept_serv = accept(serv, NULL, NULL); in test_tcp_server()
Dbtf_skc_cls_ingress.c98 srv_fd = accept(listen_fd, NULL, NULL); in test_conn()
153 srv_fd = accept(listen_fd, NULL, NULL); in test_syncookie()
Dsetget_sockopt.c104 cfd = accept(sfd, NULL, 0); in test_ktls()
184 cfd = accept(sfd, NULL, 0); in test_nonstandard_opt()
/linux-6.12.1/Documentation/admin-guide/blockdev/drbd/
Dconn-states-8.dot4 WFConnection -> WFReportParams [ label = "in connect() after accept" ]

12345678910>>...17