Home
last modified time | relevance | path

Searched refs:accept (Results 1 – 25 of 285) sorted by relevance

12345678910>>...12

/Linux-v5.4/tools/testing/selftests/netfilter/
Dconntrack_icmp_related.sh135 type filter hook forward priority 0; policy accept;
136 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept
137 …a l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept
138 meta l4proto { icmp, icmpv6 } ct state new,established accept
150 type filter hook input priority 0; policy accept;
151 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
153 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept
166 type filter hook input priority 0; policy accept;
167 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
169 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" accept
[all …]
Dnft_flowtable.sh144 tcp flags fin,rst ct mark set 0 accept
150 meta length gt 1500 accept comment something-to-grep-for
157 ct state established,related accept
160 meta length lt 200 oif "veth1" tcp dport 12345 counter accept
162 meta nfproto ipv4 meta l4proto icmp accept
163 meta nfproto ipv6 meta l4proto icmpv6 accept
287 type nat hook postrouting priority 0; policy accept;
Dnft_nat.sh172 type nat hook output priority 0; policy accept;
247 type nat hook output priority 0; policy accept;
399 type nat hook postrouting priority 0; policy accept;
500 type nat hook postrouting priority 0; policy accept;
599 type nat hook prerouting priority 0; policy accept;
681 type nat hook prerouting priority 0; policy accept;
783 type filter hook input priority 0; policy accept;
788 type filter hook output priority 0; policy accept;
/Linux-v5.4/arch/x86/kvm/
Dirq.c45 u8 accept = kvm_apic_accept_pic_intr(v); in kvm_cpu_has_extint() local
47 if (accept) { in kvm_cpu_has_extint()
/Linux-v5.4/include/xen/interface/io/
Dpvcalls.h73 } accept; member
108 } accept; member
/Linux-v5.4/crypto/
Dalgif_rng.c107 .accept = sock_no_accept,
172 .accept = rng_accept_parent,
Dalgif_skcipher.c198 .accept = sock_no_accept,
294 .accept = sock_no_accept,
383 .accept = skcipher_accept_parent,
Dalgif_hash.c291 .accept = hash_accept,
398 .accept = hash_accept_nokey,
467 .accept = hash_accept_parent,
Dalgif_aead.c367 .accept = sock_no_accept,
463 .accept = sock_no_accept,
594 .accept = aead_accept_parent,
/Linux-v5.4/security/apparmor/
Dmatch.c518 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local
535 if (accept[state]) in aa_dfa_match_until()
546 if (accept[state]) in aa_dfa_match_until()
579 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_matchn_until() local
597 if (accept[state]) in aa_dfa_matchn_until()
608 if (accept[state]) in aa_dfa_matchn_until()
/Linux-v5.4/sound/soc/sh/rcar/
Drsnd.h707 int (*accept)(struct rsnd_dai_stream *io); member
738 int (*accept)(struct rsnd_dai_stream *io),
746 #define rsnd_kctrl_new_m(mod, io, rtd, name, accept, update, cfg, size, max) \ argument
747 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_m(cfg), \
750 #define rsnd_kctrl_new_s(mod, io, rtd, name, accept, update, cfg, max) \ argument
751 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
754 #define rsnd_kctrl_new_e(mod, io, rtd, name, accept, update, cfg, texts, size) \ argument
755 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
/Linux-v5.4/include/uapi/linux/
Dbpqether.h16 unsigned char accept[ETH_ALEN]; member
/Linux-v5.4/drivers/staging/uwb/
Duwb-debug.c43 bool accept; member
256 if (dbg->accept) { in uwb_dbg_new_rsv()
294 &rc->dbg->accept); in uwb_dbg_add_rc()
/Linux-v5.4/tools/testing/selftests/bpf/prog_tests/
Dtcp_rtt.c228 client_fd = accept(fd, (struct sockaddr *)&addr, &len); in server_thread()
238 if (CHECK_FAIL(accept(fd, (struct sockaddr *)&addr, &len) >= 0)) { in server_thread()
/Linux-v5.4/Documentation/admin-guide/blockdev/drbd/
Dconn-states-8.dot4 WFConnection -> WFReportParams [ label = "in connect() after accept" ]
/Linux-v5.4/drivers/xen/
Dpvcalls-back.c545 req->u.accept.id_new, in __pvcalls_back_accept()
546 req->u.accept.ref, in __pvcalls_back_accept()
547 req->u.accept.evtchn, in __pvcalls_back_accept()
565 rsp->u.accept.id = req->u.accept.id; in __pvcalls_back_accept()
712 req->u.accept.id); in pvcalls_back_accept()
739 rsp->u.accept.id = req->u.accept.id; in pvcalls_back_accept()
/Linux-v5.4/Documentation/ABI/testing/
Dsysfs-class-pktcdvd71 accept new bio requests from the block layer.
74 mark, do no longer accept bio write requests
/Linux-v5.4/Documentation/filesystems/
Dudf.txt38 The uid= and gid= options need a bit more explaining. They will accept a
40 belonging to that uid and gid. Mount options also accept the string "forget".
/Linux-v5.4/drivers/isdn/
DKconfig16 (though still much slower than with DSL) or to make and accept
/Linux-v5.4/tools/testing/selftests/bpf/
Dtcp_server.py68 (clientSocket, address) = serverSocket.accept()
/Linux-v5.4/samples/bpf/
Dtest_probe_write_user_user.c65 assert((serverconnfd = accept(serverfd, &tmp_addr, &sockaddr_len)) > 0); in main()
/Linux-v5.4/Documentation/networking/
Dtproxy.txt25 # nft add rule filter divert meta l4proto tcp socket transparent 1 meta mark set 1 accept
71 # nft add rule filter divert tcp dport 80 tproxy to :50080 meta mark set 1 accept
/Linux-v5.4/Documentation/powerpc/
Ddawr-power9.rst44 will accept the command. Unfortunately since there is no hardware
52 If a guest is started on a POWER8 host, GDB will accept the watchpoint
/Linux-v5.4/include/linux/sunrpc/
Dsvcauth.h132 int (*accept)(struct svc_rqst *rq, __be32 *authp); member
/Linux-v5.4/Documentation/devicetree/bindings/net/
Dftgmac100.txt19 aspeed parts. Other (unknown) parts will accept any value.

12345678910>>...12