Home
last modified time | relevance | path

Searched refs:accept (Results 1 – 25 of 307) sorted by relevance

12345678910>>...13

/Linux-v5.10/tools/testing/selftests/netfilter/
Dconntrack_icmp_related.sh135 type filter hook forward priority 0; policy accept;
136 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept
137 …a l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept
138 meta l4proto { icmp, icmpv6 } ct state new,established accept
150 type filter hook input priority 0; policy accept;
151 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
153 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept
166 type filter hook input priority 0; policy accept;
167 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
169 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" accept
[all …]
Dnft_queue.sh97 type filter hook prerouting priority $prio; policy accept;
101 type filter hook input priority $prio; policy accept;
105 type filter hook forward priority $prio; policy accept;
110 type filter hook output priority $prio; policy accept;
115 type filter hook postrouting priority $prio; policy accept;
128 type filter hook prerouting priority $prio; policy accept;
132 type filter hook input priority $prio; policy accept;
136 type filter hook forward priority $prio; policy accept;
140 type filter hook output priority $prio; policy accept;
144 type filter hook postrouting priority $prio; policy accept;
[all …]
Dnft_flowtable.sh170 tcp flags fin,rst ct mark set 0 accept
176 meta length gt $lmtu accept comment something-to-grep-for
183 ct state established,related accept
186 meta length lt 200 oif "veth1" tcp dport 12345 counter accept
188 meta nfproto ipv4 meta l4proto icmp accept
189 meta nfproto ipv6 meta l4proto icmpv6 accept
336 type nat hook prerouting priority 0; policy accept;
341 type nat hook postrouting priority 0; policy accept;
Dnft_nat.sh187 type nat hook output priority 0; policy accept;
262 type nat hook output priority 0; policy accept;
414 type nat hook postrouting priority 0; policy accept;
515 type nat hook postrouting priority 0; policy accept;
614 type nat hook prerouting priority 0; policy accept;
696 type nat hook prerouting priority 0; policy accept;
798 type filter hook input priority 0; policy accept;
803 type filter hook output priority 0; policy accept;
Dnft_conntrack_helper.sh79 type filter hook prerouting priority 0; policy accept;
83 type filter hook output priority 0; policy accept;
Dnft_meta.sh52 type filter hook input priority 0; policy accept;
67 type filter hook output priority 0; policy accept;
/Linux-v5.10/include/xen/interface/io/
Dpvcalls.h73 } accept; member
108 } accept; member
/Linux-v5.10/sound/soc/sh/rcar/
Drsnd.h716 int (*accept)(struct rsnd_dai_stream *io); member
747 int (*accept)(struct rsnd_dai_stream *io),
755 #define rsnd_kctrl_new_m(mod, io, rtd, name, accept, update, cfg, size, max) \ argument
756 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_m(cfg), \
759 #define rsnd_kctrl_new_s(mod, io, rtd, name, accept, update, cfg, max) \ argument
760 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
763 #define rsnd_kctrl_new_e(mod, io, rtd, name, accept, update, cfg, texts, size) \ argument
764 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
/Linux-v5.10/security/apparmor/
Dmatch.c574 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local
591 if (accept[state]) in aa_dfa_match_until()
602 if (accept[state]) in aa_dfa_match_until()
635 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_matchn_until() local
653 if (accept[state]) in aa_dfa_matchn_until()
664 if (accept[state]) in aa_dfa_matchn_until()
/Linux-v5.10/crypto/
Dalgif_rng.c175 .accept = sock_no_accept,
194 .accept = sock_no_accept,
320 .accept = rng_accept_parent,
Dalgif_skcipher.c193 .accept = sock_no_accept,
284 .accept = sock_no_accept,
367 .accept = skcipher_accept_parent,
Dalgif_hash.c289 .accept = hash_accept,
391 .accept = hash_accept_nokey,
460 .accept = hash_accept_parent,
Dalgif_aead.c367 .accept = sock_no_accept,
458 .accept = sock_no_accept,
582 .accept = aead_accept_parent,
/Linux-v5.10/Documentation/riscv/
Dpatch-acceptance.rst21 We'll only accept patches for new modules or extensions if the
32 RISC-V extensions, we'll only to accept patches for extensions that
/Linux-v5.10/include/uapi/linux/
Dbpqether.h16 unsigned char accept[ETH_ALEN]; member
/Linux-v5.10/Documentation/admin-guide/blockdev/drbd/
Dconn-states-8.dot4 WFConnection -> WFReportParams [ label = "in connect() after accept" ]
/Linux-v5.10/Documentation/ABI/testing/
Dsysfs-class-pktcdvd74 accept new bio requests from the block layer.
77 mark, do no longer accept bio write requests
/Linux-v5.10/Documentation/filesystems/
Dudf.rst43 The uid= and gid= options need a bit more explaining. They will accept a
45 belonging to that uid and gid. Mount options also accept the string "forget".
/Linux-v5.10/drivers/xen/
Dpvcalls-back.c555 req->u.accept.id_new, in __pvcalls_back_accept()
556 req->u.accept.ref, in __pvcalls_back_accept()
557 req->u.accept.evtchn, in __pvcalls_back_accept()
575 rsp->u.accept.id = req->u.accept.id; in __pvcalls_back_accept()
722 req->u.accept.id); in pvcalls_back_accept()
749 rsp->u.accept.id = req->u.accept.id; in pvcalls_back_accept()
/Linux-v5.10/drivers/isdn/
DKconfig16 (though still much slower than with DSL) or to make and accept
/Linux-v5.10/tools/testing/selftests/bpf/prog_tests/
Dcgroup_skb_sk_lookup.c37 serv_in_sk = accept(serv_sk, NULL, NULL); in run_lookup_test()
/Linux-v5.10/tools/testing/selftests/bpf/
Dtcp_server.py68 (clientSocket, address) = serverSocket.accept()
/Linux-v5.10/Documentation/networking/
Dtproxy.rst28 # nft add rule filter divert meta l4proto tcp socket transparent 1 meta mark set 1 accept
74 # nft add rule filter divert tcp dport 80 tproxy to :50080 meta mark set 1 accept
/Linux-v5.10/Documentation/powerpc/
Ddawr-power9.rst44 will accept the command. Unfortunately since there is no hardware
52 If a guest is started on a POWER8 host, GDB will accept the watchpoint
/Linux-v5.10/Documentation/crypto/
Duserspace-if.rst77 3. Invoke accept with the socket descriptor. The accept system call
81 kernel, the file descriptor returned by accept must be used.
314 WARNING: The user space caller may invoke the initially mentioned accept
355 /* opfd is the file descriptor returned from accept() system call */
368 descriptor returned by the accept system call).

12345678910>>...13