Searched refs:accept (Results 1 - 25 of 188) sorted by relevance

12345678

/linux-master/include/uapi/linux/
H A Dbpqether.h16 unsigned char accept[ETH_ALEN]; member in struct:bpq_ethaddr
/linux-master/tools/testing/selftests/netfilter/
H A Dconntrack_icmp_related.sh137 type filter hook forward priority 0; policy accept;
138 meta l4proto icmpv6 icmpv6 type "packet-too-big" ct state "related" counter name "related" accept
139 meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept
140 meta l4proto { icmp, icmpv6 } ct state new,established accept
154 type filter hook input priority 0; policy accept;
156 icmp type "redirect" ct state "related" counter name "redir4" accept
157 icmpv6 type "nd-redirect" ct state "related" counter name "redir6" accept
159 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
160 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept
174 type filter hook input priority 0; policy accept;
[all...]
H A Dnft_queue.sh101 type filter hook prerouting priority $prio; policy accept;
105 type filter hook input priority $prio; policy accept;
109 type filter hook forward priority $prio; policy accept;
114 type filter hook output priority $prio; policy accept;
120 type filter hook postrouting priority $prio; policy accept;
133 type filter hook prerouting priority $prio; policy accept;
137 type filter hook input priority $prio; policy accept;
141 type filter hook forward priority $prio; policy accept;
145 type filter hook output priority $prio; policy accept;
149 type filter hook postrouting priority $prio; policy accept;
[all...]
H A Dnft_synproxy.sh84 type filter hook prerouting priority -300; policy accept;
89 type filter hook forward priority 0; policy accept;
91 ct state new,established counter accept
H A Dconntrack_tcp_unreplied.sh96 type filter hook input priority 0; policy accept;
97 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept
98 ct state new ct status dnat tcp dport 8080 counter name "redir" accept
120 type nat hook prerouting priority 0; policy accept;
H A Dnft_flowtable.sh173 meta oif "veth1" tcp dport 12345 ct mark set 1 flow add @f1 counter name routed_orig accept
176 ct mark 1 counter name ct direction map { original : routed_orig, reply : routed_repl } accept
178 ct state established,related accept
180 meta nfproto ipv4 meta l4proto icmp accept
181 meta nfproto ipv6 meta l4proto icmpv6 accept
197 type filter hook input priority 0; policy accept;
199 ip dscp cs3 counter name ip4dscp3 accept
200 ip dscp 0 counter name ip4dscp0 accept
409 type filter hook ingress device "veth0" priority 0; policy accept
426 type filter hook egress device "veth1" priority 0; policy accept
[all...]
H A Dnft_meta.sh52 type filter hook input priority 0; policy accept;
67 type filter hook output priority 0; policy accept;
H A Dconnect_close.c65 c = accept(s, NULL, NULL);
H A Dnft_nat.sh187 type nat hook output priority 0; policy accept;
262 type nat hook output priority 0; policy accept;
388 type nat hook output priority 0; policy accept;
455 type nat hook postrouting priority 0; policy accept;
556 type nat hook postrouting priority 0; policy accept;
655 type nat hook prerouting priority 0; policy accept;
737 type nat hook prerouting priority 0; policy accept;
842 type filter hook forward priority 0; policy accept;
860 type filter hook prerouting priority -300; policy accept;
864 type filter hook output priority -300; policy accept;
[all...]
H A Dbridge_netfilter.sh133 type filter hook input priority 1; policy accept
135 ct state new accept
141 type filter hook forward priority 0; policy accept
H A Dnft_conntrack_helper.sh79 type filter hook prerouting priority 0; policy accept;
83 type filter hook output priority 0; policy accept;
/linux-master/include/xen/interface/io/
H A Dpvcalls.h10 /* "1" means socket, connect, release, bind, listen, accept and poll */
75 } accept; member in union:xen_pvcalls_request::__anon189
110 } accept; member in union:xen_pvcalls_response::__anon190
/linux-master/tools/testing/selftests/bpf/prog_tests/
H A Dcgroup_skb_sk_lookup.c37 serv_in_sk = accept(serv_sk, NULL, NULL);
38 if (CHECK(serv_in_sk < 0, "accept", "errno %d\n", errno))
H A Dsk_storage_tracing.c68 passive_fd = accept(listen_fd, NULL, 0);
69 if (CHECK(passive_fd == -1, "accept", "passive_fd:%d errno:%d\n",
H A Dtcpbpf_user.c62 accept_fd = accept(listen_fd, NULL, NULL);
63 if (!ASSERT_NEQ(accept_fd, -1, "accept(listen_fd)"))
91 * shutdown accept first to guarantee correct ordering for
H A Dtcp_custom_syncookie.c104 child = accept(server, NULL, 0);
105 if (!ASSERT_NEQ(child, -1, "accept"))
/linux-master/tools/testing/selftests/net/
H A Dbind_timewait.c68 child_fd = accept(server_fd, (struct sockaddr *)&addr, &addrlen);
H A Dsctp_hello.c122 csk = accept(lsk, (struct sockaddr *)NULL, (socklen_t *)NULL);
124 printf("failed to accept new client\n");
/linux-master/tools/testing/selftests/net/tcp_ao/
H A Dconnect.c20 sk = accept(lsk, NULL, NULL);
22 test_error("accept()");
H A DMakefile5 TEST_BOTH_AF += icmps-accept icmps-discard
/linux-master/crypto/
H A Dalgif_rng.c175 .accept = sock_no_accept,
193 .accept = sock_no_accept,
318 .accept = rng_accept_parent,
/linux-master/io_uring/
H A Dnet.c1352 struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept); local
1358 accept->addr = u64_to_user_ptr(READ_ONCE(sqe->addr));
1359 accept->addr_len = u64_to_user_ptr(READ_ONCE(sqe->addr2));
1360 accept->flags = READ_ONCE(sqe->accept_flags);
1361 accept->nofile = rlimit(RLIMIT_NOFILE);
1366 accept->file_slot = READ_ONCE(sqe->file_index);
1367 if (accept->file_slot) {
1368 if (accept->flags & SOCK_CLOEXEC)
1371 accept->file_slot != IORING_FILE_INDEX_ALLOC)
1374 if (accept
1385 struct io_accept *accept = io_kiocb_to_cmd(req, struct io_accept); local
[all...]
/linux-master/security/apparmor/
H A Dmatch.c25 * unpack_table - unpack a dfa table (one of accept, default, base, next check)
96 * @flags: flags controlling what type of accept table are acceptable
99 * NOTE: this does not valid accept table values
113 /* accept.size == default.size == base.size */
149 * NOTE: this does not valid accept table values
254 * @flags: flags controlling what type of accept tables are acceptable
509 * aa_dfa_match_until - traverse @dfa until accept state or end of input
528 u32 *accept = ACCEPT_TABLE(dfa); local
545 if (accept[state])
556 if (accept[stat
589 u32 *accept = ACCEPT_TABLE(dfa); local
[all...]
/linux-master/samples/bpf/
H A Dtest_probe_write_user_user.c91 assert((serverconnfd = accept(serverfd, &tmp_addr, &sockaddr_len)) > 0);
/linux-master/include/linux/sunrpc/
H A Dsvcauth.h104 * accept() is given a request and should verify it.
107 * The return value of accept() can indicate:
124 * accept is passed the proc number so that it can accept NULL rpc requests
145 enum svc_auth_status (*accept)(struct svc_rqst *rqstp); member in struct:auth_ops

Completed in 288 milliseconds

12345678