Home
last modified time | relevance | path

Searched refs:accept (Results 1 – 25 of 331) sorted by relevance

12345678910>>...14

/linux/tools/testing/selftests/netfilter/
A Dconntrack_icmp_related.sh135 type filter hook forward priority 0; policy accept;
138 meta l4proto { icmp, icmpv6 } ct state new,established accept
150 type filter hook input priority 0; policy accept;
151 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
166 type filter hook input priority 0; policy accept;
167 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
169 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" accept
174 type filter hook output priority 0; policy accept;
175 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
191 type nat hook postrouting priority 0; policy accept;
[all …]
A Dnft_queue.sh105 type filter hook input priority $prio; policy accept;
109 type filter hook forward priority $prio; policy accept;
114 type filter hook output priority $prio; policy accept;
136 type filter hook input priority $prio; policy accept;
140 type filter hook forward priority $prio; policy accept;
144 type filter hook output priority $prio; policy accept;
189 type filter hook forward priority 0; policy accept;
305 type filter hook output priority 0; policy accept;
309 type filter hook postrouting priority 0; policy accept;
354 type filter hook output priority 0; policy accept;
[all …]
A Dnft_flowtable.sh170 tcp flags fin,rst ct mark set 0 accept
176 meta length gt $lmtu accept comment something-to-grep-for
183 ct state established,related accept
186 meta length lt 200 oif "veth1" tcp dport 12345 counter accept
188 meta nfproto ipv4 meta l4proto icmp accept
189 meta nfproto ipv6 meta l4proto icmpv6 accept
335 type nat hook prerouting priority 0; policy accept;
340 type nat hook postrouting priority 0; policy accept;
390 type nat hook prerouting priority 0; policy accept;
395 type nat hook postrouting priority 0; policy accept;
A Dconntrack_tcp_unreplied.sh96 type filter hook input priority 0; policy accept;
97 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept
98 ct state new ct status dnat tcp dport 8080 counter name "redir" accept
120 type nat hook prerouting priority 0; policy accept;
A Dnft_nat.sh187 type nat hook output priority 0; policy accept;
262 type nat hook output priority 0; policy accept;
414 type nat hook postrouting priority 0; policy accept;
515 type nat hook postrouting priority 0; policy accept;
614 type nat hook prerouting priority 0; policy accept;
696 type nat hook prerouting priority 0; policy accept;
801 type filter hook forward priority 0; policy accept;
823 type filter hook output priority -300; policy accept;
873 type nat hook postrouting priority 0; policy accept;
954 type filter hook input priority 0; policy accept;
[all …]
A Dnft_conntrack_helper.sh79 type filter hook prerouting priority 0; policy accept;
83 type filter hook output priority 0; policy accept;
A Dnft_meta.sh52 type filter hook input priority 0; policy accept;
67 type filter hook output priority 0; policy accept;
A Dnft_nat_zones.sh186 type filter hook prerouting priority -64000; policy accept;
196 type nat hook postrouting priority 0; policy accept;
201 type filter hook prerouting priority -100; policy accept;
/linux/include/xen/interface/io/
A Dpvcalls.h75 } accept; member
110 } accept; member
/linux/sound/soc/sh/rcar/
A Drsnd.h721 int (*accept)(struct rsnd_dai_stream *io); member
752 int (*accept)(struct rsnd_dai_stream *io),
760 #define rsnd_kctrl_new_m(mod, io, rtd, name, accept, update, cfg, size, max) \ argument
761 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_m(cfg), \
764 #define rsnd_kctrl_new_s(mod, io, rtd, name, accept, update, cfg, max) \ argument
765 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
768 #define rsnd_kctrl_new_e(mod, io, rtd, name, accept, update, cfg, texts, size) \ argument
769 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
/linux/security/apparmor/
A Dmatch.c574 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local
591 if (accept[state]) in aa_dfa_match_until()
602 if (accept[state]) in aa_dfa_match_until()
635 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_matchn_until() local
653 if (accept[state]) in aa_dfa_matchn_until()
664 if (accept[state]) in aa_dfa_matchn_until()
/linux/crypto/
A Dalgif_rng.c175 .accept = sock_no_accept,
194 .accept = sock_no_accept,
320 .accept = rng_accept_parent,
A Dalgif_skcipher.c193 .accept = sock_no_accept,
284 .accept = sock_no_accept,
367 .accept = skcipher_accept_parent,
A Dalgif_hash.c289 .accept = hash_accept,
391 .accept = hash_accept_nokey,
460 .accept = hash_accept_parent,
A Dalgif_aead.c367 .accept = sock_no_accept,
458 .accept = sock_no_accept,
582 .accept = aead_accept_parent,
/linux/Documentation/riscv/
A Dpatch-acceptance.rst21 We'll only accept patches for new modules or extensions if the
32 RISC-V extensions, we'll only to accept patches for extensions that
/linux/include/uapi/linux/
A Dbpqether.h16 unsigned char accept[ETH_ALEN]; member
/linux/tools/testing/selftests/bpf/prog_tests/
A Dbtf_skc_cls_ingress.c115 srv_fd = accept(listen_fd, NULL, NULL); in test_conn()
170 srv_fd = accept(listen_fd, NULL, NULL); in test_syncookie()
A Dbpf_tcp_ca.c41 fd = accept(lfd, NULL, NULL); in server()
286 srv_fd = accept(lfd, NULL, 0); in test_dctcp_fallback()
/linux/drivers/xen/
A Dpvcalls-back.c554 req->u.accept.id_new, in __pvcalls_back_accept()
555 req->u.accept.ref, in __pvcalls_back_accept()
556 req->u.accept.evtchn, in __pvcalls_back_accept()
574 rsp->u.accept.id = req->u.accept.id; in __pvcalls_back_accept()
721 req->u.accept.id); in pvcalls_back_accept()
748 rsp->u.accept.id = req->u.accept.id; in pvcalls_back_accept()
/linux/Documentation/ABI/testing/
A Dsysfs-class-pktcdvd74 accept new bio requests from the block layer.
77 mark, do no longer accept bio write requests
/linux/Documentation/filesystems/
A Dudf.rst43 The uid= and gid= options need a bit more explaining. They will accept a
45 belonging to that uid and gid. Mount options also accept the string "forget".
/linux/Documentation/admin-guide/blockdev/drbd/
A Dconn-states-8.dot4 WFConnection -> WFReportParams [ label = "in connect() after accept" ]
/linux/Documentation/arm64/
A Dtagged-address-abi.rst55 incorrectly accept valid tagged pointers for the ``brk()``,
65 incorrectly accept valid tagged pointers for this system call.
98 - All syscalls except the cases mentioned in section 3 can accept any
/linux/Documentation/crypto/
A Duserspace-if.rst77 3. Invoke accept with the socket descriptor. The accept system call
81 kernel, the file descriptor returned by accept must be used.
314 WARNING: The user space caller may invoke the initially mentioned accept
355 /* opfd is the file descriptor returned from accept() system call */
368 descriptor returned by the accept system call).

Completed in 31 milliseconds

12345678910>>...14