/kernel/linux/linux-5.10/tools/testing/selftests/netfilter/ |
H A D | conntrack_icmp_related.sh | 137 type filter hook forward priority 0; policy accept; 138 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept 139 meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept 140 meta l4proto { icmp, icmpv6 } ct state new,established accept 154 type filter hook input priority 0; policy accept; 156 icmp type "redirect" ct state "related" counter name "redir4" accept 157 icmpv6 type "nd-redirect" ct state "related" counter name "redir6" accept 159 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 160 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept 174 type filter hook input priority 0; policy accept; [all...] |
H A D | nft_queue.sh | 97 type filter hook prerouting priority $prio; policy accept; 101 type filter hook input priority $prio; policy accept; 105 type filter hook forward priority $prio; policy accept; 110 type filter hook output priority $prio; policy accept; 115 type filter hook postrouting priority $prio; policy accept; 128 type filter hook prerouting priority $prio; policy accept; 132 type filter hook input priority $prio; policy accept; 136 type filter hook forward priority $prio; policy accept; 140 type filter hook output priority $prio; policy accept; 144 type filter hook postrouting priority $prio; policy accept; [all...] |
H A D | nft_flowtable.sh | 170 tcp flags fin,rst ct mark set 0 accept 176 meta length gt $lmtu accept comment something-to-grep-for 183 ct state established,related accept 186 meta length lt 200 oif "veth1" tcp dport 12345 counter accept 188 meta nfproto ipv4 meta l4proto icmp accept 189 meta nfproto ipv6 meta l4proto icmpv6 accept 335 type nat hook prerouting priority 0; policy accept; 340 type nat hook postrouting priority 0; policy accept; 359 echo "FAIL: Could not delete large-packet accept rule"
|
H A D | nft_meta.sh | 52 type filter hook input priority 0; policy accept; 67 type filter hook output priority 0; policy accept;
|
H A D | nft_conntrack_helper.sh | 79 type filter hook prerouting priority 0; policy accept; 83 type filter hook output priority 0; policy accept;
|
/kernel/linux/linux-6.6/tools/testing/selftests/netfilter/ |
H A D | conntrack_icmp_related.sh | 137 type filter hook forward priority 0; policy accept; 138 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept 139 meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept 140 meta l4proto { icmp, icmpv6 } ct state new,established accept 154 type filter hook input priority 0; policy accept; 156 icmp type "redirect" ct state "related" counter name "redir4" accept 157 icmpv6 type "nd-redirect" ct state "related" counter name "redir6" accept 159 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 160 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept 174 type filter hook input priority 0; policy accept; [all...] |
H A D | nft_queue.sh | 101 type filter hook prerouting priority $prio; policy accept; 105 type filter hook input priority $prio; policy accept; 109 type filter hook forward priority $prio; policy accept; 114 type filter hook output priority $prio; policy accept; 120 type filter hook postrouting priority $prio; policy accept; 133 type filter hook prerouting priority $prio; policy accept; 137 type filter hook input priority $prio; policy accept; 141 type filter hook forward priority $prio; policy accept; 145 type filter hook output priority $prio; policy accept; 149 type filter hook postrouting priority $prio; policy accept; [all...] |
H A D | nft_flowtable.sh | 173 meta oif "veth1" tcp dport 12345 ct mark set 1 flow add @f1 counter name routed_orig accept 176 ct mark 1 counter name ct direction map { original : routed_orig, reply : routed_repl } accept 178 ct state established,related accept 180 meta nfproto ipv4 meta l4proto icmp accept 181 meta nfproto ipv6 meta l4proto icmpv6 accept 197 type filter hook input priority 0; policy accept; 199 ip dscp cs3 counter name ip4dscp3 accept 200 ip dscp 0 counter name ip4dscp0 accept 409 type filter hook ingress device "veth0" priority 0; policy accept 426 type filter hook egress device "veth1" priority 0; policy accept [all...] |
H A D | conntrack_tcp_unreplied.sh | 96 type filter hook input priority 0; policy accept; 97 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept 98 ct state new ct status dnat tcp dport 8080 counter name "redir" accept 120 type nat hook prerouting priority 0; policy accept;
|
H A D | nft_nat.sh | 187 type nat hook output priority 0; policy accept; 262 type nat hook output priority 0; policy accept; 388 type nat hook output priority 0; policy accept; 455 type nat hook postrouting priority 0; policy accept; 556 type nat hook postrouting priority 0; policy accept; 655 type nat hook prerouting priority 0; policy accept; 737 type nat hook prerouting priority 0; policy accept; 842 type filter hook forward priority 0; policy accept; 860 type filter hook prerouting priority -300; policy accept; 864 type filter hook output priority -300; policy accept; [all...] |
H A D | nft_synproxy.sh | 84 type filter hook prerouting priority -300; policy accept; 89 type filter hook forward priority 0; policy accept; 91 ct state new,established counter accept
|
H A D | nft_meta.sh | 52 type filter hook input priority 0; policy accept; 67 type filter hook output priority 0; policy accept;
|
/kernel/linux/linux-6.6/io_uring/ |
H A D | net.c | 1349 struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept); in io_accept_prep() local 1355 accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr)); in io_accept_prep() 1356 accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2)); in io_accept_prep() 1357 accept->flags = READ_ONCE(sqe->accept_flags); in io_accept_prep() 1358 accept->nofile = rlimit(RLIMIT_NOFILE); in io_accept_prep() 1363 accept->file_slot = READ_ONCE(sqe->file_index); in io_accept_prep() 1364 if (accept->file_slot) { in io_accept_prep() 1365 if (accept->flags & SOCK_CLOEXEC) in io_accept_prep() 1368 accept->file_slot != IORING_FILE_INDEX_ALLOC) in io_accept_prep() 1371 if (accept in io_accept_prep() 1382 struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept); io_accept() local [all...] |
/kernel/linux/linux-5.10/include/xen/interface/io/ |
H A D | pvcalls.h | 8 /* "1" means socket, connect, release, bind, listen, accept and poll */ 73 } accept; member 108 } accept; member
|
/kernel/linux/linux-6.6/include/xen/interface/io/ |
H A D | pvcalls.h | 10 /* "1" means socket, connect, release, bind, listen, accept and poll */ 75 } accept; member 110 } accept; member
|
/kernel/linux/linux-5.10/sound/soc/sh/rcar/ |
H A D | rsnd.h | 716 int (*accept)(struct rsnd_dai_stream *io); member 747 int (*accept)(struct rsnd_dai_stream *io), 755 #define rsnd_kctrl_new_m(mod, io, rtd, name, accept, update, cfg, size, max) \ 756 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_m(cfg), \ 759 #define rsnd_kctrl_new_s(mod, io, rtd, name, accept, update, cfg, max) \ 760 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \ 763 #define rsnd_kctrl_new_e(mod, io, rtd, name, accept, update, cfg, texts, size) \ 764 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
|
/kernel/linux/linux-6.6/sound/soc/sh/rcar/ |
H A D | rsnd.h | 734 int (*accept)(struct rsnd_dai_stream *io); member 765 int (*accept)(struct rsnd_dai_stream *io), 773 #define rsnd_kctrl_new_m(mod, io, rtd, name, accept, update, cfg, size, max) \ 774 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_m(cfg), \ 777 #define rsnd_kctrl_new_s(mod, io, rtd, name, accept, update, cfg, max) \ 778 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \ 781 #define rsnd_kctrl_new_e(mod, io, rtd, name, accept, update, cfg, texts, size) \ 782 rsnd_kctrl_new(mod, io, rtd, name, accept, update, rsnd_kctrl_init_s(cfg), \
|
/kernel/linux/linux-5.10/security/apparmor/ |
H A D | match.c | 69 * unpack_table - unpack a dfa table (one of accept, default, base, next check) 140 * @flags: flags controlling what type of accept table are acceptable 143 * NOTE: this does not valid accept table values 157 /* accept.size == default.size == base.size */ in verify_table_headers() 193 * NOTE: this does not valid accept table values 298 * @flags: flags controlling what type of accept tables are acceptable 555 * aa_dfa_match_until - traverse @dfa until accept state or end of input 574 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local 591 if (accept[state]) in aa_dfa_match_until() 602 if (accept[stat in aa_dfa_match_until() 635 u32 *accept = ACCEPT_TABLE(dfa); aa_dfa_matchn_until() local [all...] |
/kernel/linux/linux-6.6/security/apparmor/ |
H A D | match.c | 69 * unpack_table - unpack a dfa table (one of accept, default, base, next check) 140 * @flags: flags controlling what type of accept table are acceptable 143 * NOTE: this does not valid accept table values 157 /* accept.size == default.size == base.size */ in verify_table_headers() 193 * NOTE: this does not valid accept table values 298 * @flags: flags controlling what type of accept tables are acceptable 553 * aa_dfa_match_until - traverse @dfa until accept state or end of input 572 u32 *accept = ACCEPT_TABLE(dfa); in aa_dfa_match_until() local 589 if (accept[state]) in aa_dfa_match_until() 600 if (accept[stat in aa_dfa_match_until() 633 u32 *accept = ACCEPT_TABLE(dfa); aa_dfa_matchn_until() local [all...] |
/kernel/linux/linux-5.10/include/uapi/linux/ |
H A D | bpqether.h | 16 unsigned char accept[ETH_ALEN]; member
|
/kernel/linux/linux-6.6/include/uapi/linux/ |
H A D | bpqether.h | 16 unsigned char accept[ETH_ALEN]; member
|
/kernel/linux/patches/linux-6.6/prebuilts/usr/include/linux/ |
H A D | bpqether.h | 26 unsigned char accept[ETH_ALEN]; member
|
/kernel/linux/patches/linux-5.10/prebuilts/usr/include/linux/ |
H A D | bpqether.h | 26 unsigned char accept[ETH_ALEN]; member
|
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/ |
H A D | bpqether.h | 14 unsigned char accept[ETH_ALEN]; member
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/ |
H A D | sock_destroy.c | 47 accept_serv = accept(serv, NULL, NULL); in test_tcp_client() 48 if (!ASSERT_GE(accept_serv, 0, "serv accept")) in test_tcp_client() 88 accept_serv = accept(serv, NULL, NULL); in test_tcp_server() 89 if (!ASSERT_GE(accept_serv, 0, "serv accept")) in test_tcp_server()
|