Home
last modified time | relevance | path

Searched refs:accept (Results 1 – 25 of 345) sorted by relevance

12345678910>>...14

/Linux-v6.1/tools/testing/selftests/netfilter/
Dconntrack_icmp_related.sh135 type filter hook forward priority 0; policy accept;
136 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept
137 …a l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept
138 meta l4proto { icmp, icmpv6 } ct state new,established accept
150 type filter hook input priority 0; policy accept;
151 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
153 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept
166 type filter hook input priority 0; policy accept;
167 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
169 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" accept
[all …]
Dnft_queue.sh101 type filter hook prerouting priority $prio; policy accept;
105 type filter hook input priority $prio; policy accept;
109 type filter hook forward priority $prio; policy accept;
114 type filter hook output priority $prio; policy accept;
120 type filter hook postrouting priority $prio; policy accept;
133 type filter hook prerouting priority $prio; policy accept;
137 type filter hook input priority $prio; policy accept;
141 type filter hook forward priority $prio; policy accept;
145 type filter hook output priority $prio; policy accept;
149 type filter hook postrouting priority $prio; policy accept;
[all …]
Dconntrack_tcp_unreplied.sh96 type filter hook input priority 0; policy accept;
97 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept
98 ct state new ct status dnat tcp dport 8080 counter name "redir" accept
120 type nat hook prerouting priority 0; policy accept;
Dnft_flowtable.sh173 meta oif "veth1" tcp dport 12345 ct mark set 1 flow add @f1 counter name routed_orig accept
176 ct mark 1 counter name ct direction map { original : routed_orig, reply : routed_repl } accept
178 ct state established,related accept
180 meta nfproto ipv4 meta l4proto icmp accept
181 meta nfproto ipv6 meta l4proto icmpv6 accept
377 type nat hook prerouting priority 0; policy accept;
382 type nat hook postrouting priority 0; policy accept;
430 type nat hook prerouting priority 0; policy accept;
435 type nat hook postrouting priority 0; policy accept;
Dnft_nat.sh187 type nat hook output priority 0; policy accept;
262 type nat hook output priority 0; policy accept;
388 type nat hook output priority 0; policy accept;
453 type nat hook postrouting priority 0; policy accept;
554 type nat hook postrouting priority 0; policy accept;
653 type nat hook prerouting priority 0; policy accept;
735 type nat hook prerouting priority 0; policy accept;
840 type filter hook forward priority 0; policy accept;
858 type filter hook prerouting priority -300; policy accept;
862 type filter hook output priority -300; policy accept;
[all …]
Dnft_synproxy.sh84 type filter hook prerouting priority -300; policy accept;
89 type filter hook forward priority 0; policy accept;
91 ct state new,established counter accept
Dnft_conntrack_helper.sh79 type filter hook prerouting priority 0; policy accept;
83 type filter hook output priority 0; policy accept;
Dnft_meta.sh52 type filter hook input priority 0; policy accept;
67 type filter hook output priority 0; policy accept;
Dnft_fib.sh62 type filter hook prerouting priority 0; policy accept;
76 fib saddr . iif oif gt 0 accept
89 type filter hook prerouting priority 0; policy accept;
Dnft_nat_zones.sh186 type filter hook prerouting priority -64000; policy accept;
196 type nat hook postrouting priority 0; policy accept;
201 type filter hook prerouting priority -100; policy accept;
/Linux-v6.1/io_uring/
Dnet.c1231 struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept); in io_accept_prep() local
1237 accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr)); in io_accept_prep()
1238 accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2)); in io_accept_prep()
1239 accept->flags = READ_ONCE(sqe->accept_flags); in io_accept_prep()
1240 accept->nofile = rlimit(RLIMIT_NOFILE); in io_accept_prep()
1245 accept->file_slot = READ_ONCE(sqe->file_index); in io_accept_prep()
1246 if (accept->file_slot) { in io_accept_prep()
1247 if (accept->flags & SOCK_CLOEXEC) in io_accept_prep()
1250 accept->file_slot != IORING_FILE_INDEX_ALLOC) in io_accept_prep()
1253 if (accept->flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK)) in io_accept_prep()
[all …]
/Linux-v6.1/include/xen/interface/io/
Dpvcalls.h75 } accept; member
110 } accept; member
/Linux-v6.1/sound/soc/sh/rcar/
Drsnd.h721 int (*accept)(struct rsnd_dai_stream *io); member
752 int (*accept)(struct rsnd_dai_stream *io),
760 #define rsnd_kctrl_new_m(mod, io, rtd, name, accept, update, cfg, size, max) \ argument
761 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_m(cfg), \
764 #define rsnd_kctrl_new_s(mod, io, rtd, name, accept, update, cfg, max) \ argument
765 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
768 #define rsnd_kctrl_new_e(mod, io, rtd, name, accept, update, cfg, texts, size) \ argument
769 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
/Linux-v6.1/security/apparmor/
Dmatch.c574 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local
591 if (accept[state]) in aa_dfa_match_until()
602 if (accept[state]) in aa_dfa_match_until()
635 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_matchn_until() local
653 if (accept[state]) in aa_dfa_matchn_until()
664 if (accept[state]) in aa_dfa_matchn_until()
/Linux-v6.1/crypto/
Dalgif_rng.c175 .accept = sock_no_accept,
194 .accept = sock_no_accept,
320 .accept = rng_accept_parent,
Dalgif_skcipher.c193 .accept = sock_no_accept,
284 .accept = sock_no_accept,
367 .accept = skcipher_accept_parent,
Dalgif_hash.c290 .accept = hash_accept,
392 .accept = hash_accept_nokey,
461 .accept = hash_accept_parent,
/Linux-v6.1/Documentation/riscv/
Dpatch-acceptance.rst21 We'll only accept patches for new modules or extensions if the
32 RISC-V extensions, we'll only to accept patches for extensions that
/Linux-v6.1/include/uapi/linux/
Dbpqether.h16 unsigned char accept[ETH_ALEN]; member
/Linux-v6.1/tools/testing/selftests/bpf/prog_tests/
Dbtf_skc_cls_ingress.c95 srv_fd = accept(listen_fd, NULL, NULL); in test_conn()
150 srv_fd = accept(listen_fd, NULL, NULL); in test_syncookie()
/Linux-v6.1/lib/
Dtest_string.c186 const char accept[16]; in strspn_selftest() member
200 res = strspn(s->str, s->accept); in strspn_selftest()
/Linux-v6.1/Documentation/admin-guide/blockdev/drbd/
Dconn-states-8.dot4 WFConnection -> WFReportParams [ label = "in connect() after accept" ]
/Linux-v6.1/Documentation/ABI/testing/
Dsysfs-class-pktcdvd74 accept new bio requests from the block layer.
77 mark, do no longer accept bio write requests
/Linux-v6.1/Documentation/filesystems/
Dudf.rst43 The uid= and gid= options need a bit more explaining. They will accept a
45 belonging to that uid and gid. Mount options also accept the string "forget".
/Linux-v6.1/drivers/xen/
Dpvcalls-back.c554 req->u.accept.id_new, in __pvcalls_back_accept()
555 req->u.accept.ref, in __pvcalls_back_accept()
556 req->u.accept.evtchn, in __pvcalls_back_accept()
574 rsp->u.accept.id = req->u.accept.id; in __pvcalls_back_accept()
721 req->u.accept.id); in pvcalls_back_accept()
748 rsp->u.accept.id = req->u.accept.id; in pvcalls_back_accept()

12345678910>>...14