Searched refs:accept (Results 1 - 25 of 191) sorted by relevance

12345678

/linux-master/include/uapi/linux/
H A Dbpqether.h16 unsigned char accept[ETH_ALEN]; member in struct:bpq_ethaddr
/linux-master/tools/testing/selftests/net/netfilter/
H A Dconntrack_icmp_related.sh119 type filter hook forward priority 0; policy accept;
120 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept
121 meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept
122 meta l4proto { icmp, icmpv6 } ct state new,established accept
136 type filter hook input priority 0; policy accept;
138 icmp type "redirect" ct state "related" counter name "redir4" accept
139 icmpv6 type "nd-redirect" ct state "related" counter name "redir6" accept
141 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
142 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept
156 type filter hook input priority 0; policy accept;
[all...]
H A Dconntrack_tcp_unreplied.sh71 type filter hook input priority 0; policy accept;
72 ct state established accept
90 type filter hook input priority 0; policy accept;
91 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept
92 ct state new ct status dnat tcp dport 8080 counter name "redir" accept
129 type nat hook prerouting priority 0; policy accept;
H A Dnft_queue.sh79 type filter hook prerouting priority $prio; policy accept;
83 type filter hook input priority $prio; policy accept;
87 type filter hook forward priority $prio; policy accept;
92 type filter hook output priority $prio; policy accept;
98 type filter hook postrouting priority $prio; policy accept;
111 type filter hook prerouting priority $prio; policy accept;
115 type filter hook input priority $prio; policy accept;
119 type filter hook forward priority $prio; policy accept;
123 type filter hook output priority $prio; policy accept;
127 type filter hook postrouting priority $prio; policy accept;
[all...]
H A Dnft_synproxy.sh65 type filter hook prerouting priority -300; policy accept;
70 type filter hook forward priority 0; policy accept;
72 ct state new,established counter accept
H A Dnft_flowtable.sh164 meta oif "veth1" tcp dport 12345 ct mark set 1 flow add @f1 counter name routed_orig accept
167 ct mark 1 counter name ct direction map { original : routed_orig, reply : routed_repl } accept
169 ct state established,related accept
171 meta nfproto ipv4 meta l4proto icmp accept
172 meta nfproto ipv6 meta l4proto icmpv6 accept
188 type filter hook input priority 0; policy accept;
190 ip dscp cs3 counter name ip4dscp3 accept
191 ip dscp 0 counter name ip4dscp0 accept
390 type filter hook ingress device "veth0" priority 0; policy accept
407 type filter hook egress device "veth1" priority 0; policy accept
[all...]
H A Dnft_conntrack_helper.sh55 type filter hook prerouting priority 0; policy accept;
59 type filter hook output priority 0; policy accept;
H A Dnft_meta.sh52 type filter hook input priority 0; policy accept;
67 type filter hook output priority 0; policy accept;
H A Dconnect_close.c65 c = accept(s, NULL, NULL);
H A Dnft_nat.sh161 type nat hook output priority 0; policy accept;
231 type nat hook output priority 0; policy accept;
353 type nat hook output priority 0; policy accept;
415 type nat hook postrouting priority 0; policy accept;
506 type nat hook postrouting priority 0; policy accept;
595 type nat hook prerouting priority 0; policy accept;
670 type nat hook prerouting priority 0; policy accept;
771 type filter hook forward priority 0; policy accept;
789 type filter hook prerouting priority -300; policy accept;
793 type filter hook output priority -300; policy accept;
[all...]
H A Dbr_netfilter.sh118 type filter hook input priority 1; policy accept
120 ct state new accept
126 type filter hook forward priority 0; policy accept
H A Dnft_fib.sh41 type filter hook prerouting priority 0; policy accept;
55 fib saddr . iif oif gt 0 accept
68 type filter hook prerouting priority 0; policy accept;
/linux-master/include/xen/interface/io/
H A Dpvcalls.h10 /* "1" means socket, connect, release, bind, listen, accept and poll */
75 } accept; member in union:xen_pvcalls_request::__anon189
110 } accept; member in union:xen_pvcalls_response::__anon190
/linux-master/tools/testing/selftests/net/mptcp/
H A Dpm_netlink.sh50 local accept="${1}"
55 printf "add_addr_accepted %d subflows %d \n" "${accept}" "${subflows}"
57 printf "accept %d\nsubflows %d\n" "${accept}" "${subflows}"
/linux-master/tools/testing/selftests/bpf/prog_tests/
H A Dcgroup_skb_sk_lookup.c37 serv_in_sk = accept(serv_sk, NULL, NULL);
38 if (CHECK(serv_in_sk < 0, "accept", "errno %d\n", errno))
H A Dsk_storage_tracing.c68 passive_fd = accept(listen_fd, NULL, 0);
69 if (CHECK(passive_fd == -1, "accept", "passive_fd:%d errno:%d\n",
H A Dtcpbpf_user.c62 accept_fd = accept(listen_fd, NULL, NULL);
63 if (!ASSERT_NEQ(accept_fd, -1, "accept(listen_fd)"))
91 * shutdown accept first to guarantee correct ordering for
/linux-master/io_uring/
H A Dnet.c1495 struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept); local
1500 accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
1501 accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2));
1502 accept->flags = READ_ONCE(sqe->accept_flags);
1503 accept->nofile = rlimit(RLIMIT_NOFILE);
1504 accept->iou_flags = READ_ONCE(sqe->ioprio);
1505 if (accept->iou_flags & ~ACCEPT_FLAGS)
1508 accept->file_slot = READ_ONCE(sqe->file_index);
1509 if (accept->file_slot) {
1510 if (accept
1529 struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept); local
[all...]
/linux-master/tools/testing/selftests/net/
H A Dbind_timewait.c68 child_fd = accept(server_fd, (struct sockaddr *)&addr, &addrlen);
H A Dsctp_hello.c122 csk = accept(lsk, (struct sockaddr *)NULL, (socklen_t *)NULL);
124 printf("failed to accept new client\n");
/linux-master/tools/testing/selftests/net/tcp_ao/
H A Dconnect.c20 sk = accept(lsk, NULL, NULL);
22 test_error("accept()");
H A DMakefile5 TEST_BOTH_AF += icmps-accept icmps-discard
/linux-master/crypto/
H A Dalgif_rng.c175 .accept = sock_no_accept,
193 .accept = sock_no_accept,
318 .accept = rng_accept_parent,
/linux-master/security/apparmor/
H A Dmatch.c25 * unpack_table - unpack a dfa table (one of accept, default, base, next check)
96 * @flags: flags controlling what type of accept table are acceptable
99 * NOTE: this does not valid accept table values
113 /* accept.size == default.size == base.size */
149 * NOTE: this does not valid accept table values
254 * @flags: flags controlling what type of accept tables are acceptable
509 * aa_dfa_match_until - traverse @dfa until accept state or end of input
528 u32 *accept = ACCEPT_TABLE(dfa); local
545 if (accept[state])
556 if (accept[stat
589 u32 *accept = ACCEPT_TABLE(dfa); local
[all...]
/linux-master/samples/bpf/
H A Dtest_probe_write_user_user.c91 assert((serverconnfd = accept(serverfd, &tmp_addr, &sockaddr_len)) > 0);

Completed in 406 milliseconds

12345678