Home
last modified time | relevance | path

Searched refs:nft (Results 1 – 25 of 25) sorted by relevance

/linux-5.19.10/tools/testing/selftests/netfilter/
Dnft_nat.sh21 nft --version > /dev/null 2>&1
86 ip netns exec $ns nft list counter inet filter $counter 1>&2
94 cnt=$(ip netns exec $ns nft list counter inet filter ns0in | grep -q "packets 1 bytes 84")
99 cnt=$(ip netns exec $ns nft list counter inet filter ns0out | grep -q "packets 1 bytes 84")
106 cnt=$(ip netns exec $ns nft list counter inet filter ns0in6 | grep -q "$expect")
111 cnt=$(ip netns exec $ns nft list counter inet filter ns0out6 | grep -q "$expect")
125 cnt=$(ip netns exec "$ns0" nft list counter inet filter ns0in | grep -q "packets 0 bytes 0")
131 cnt=$(ip netns exec "$ns0" nft list counter inet filter ns0in6 | grep -q "packets 0 bytes 0")
137 cnt=$(ip netns exec "$ns0" nft list counter inet filter ns0out | grep -q "packets 0 bytes 0")
142 cnt=$(ip netns exec "$ns0" nft list counter inet filter ns0out6 | grep -q "packets 0 bytes 0")
[all …]
Dnft_concat_range.sh482 eval "echo \"${set_template}\"" | nft -f -
939 nft reset counter inet filter test >/dev/null 2>&1
940 nft flush ruleset >/dev/null 2>&1
1073 if ! nft add element inet filter test "${1}"; then
1093 if ! nft add element netdev perf norange "${1}"; then
1102 if ! nft add element netdev perf noconcat "${1}"; then
1111 if ! nft delete element inet filter test "${1}"; then
1121 for token in $(nft list counter inet filter test); do
1130 for token in $(nft list counter netdev perf test); do
1187 nft reset counter inet filter test >/dev/null
[all …]
Dnft_fib.sh26 nft --version > /dev/null 2>&1
59 ip netns exec ${netns} nft -f /dev/stdin <<EOF
72 ip netns exec ${netns} nft -f /dev/stdin <<EOF
86 ip netns exec ${netns} nft -f /dev/stdin <<EOF
113 …line=$(ip netns exec ${ns} nft list table inet filter | grep 'fib saddr . iif' | grep $address | g…
118 ip netns exec ${ns} nft list table inet filter
203 ip netns exec ${nsrouter} nft flush table inet filter
237 ip netns exec ${ns1} nft flush ruleset
238 ip netns exec ${ns2} nft flush ruleset
239 ip netns exec ${nsrouter} nft flush ruleset
[all …]
Dconntrack_vrf.sh50 nft --version > /dev/null 2>&1
108 ip netns exec $ns0 nft -f - <<EOF
143 ip netns exec $ns0 nft list ruleset
161 ip netns exec $ns0 nft -f - <<EOF
190 ip netns exec $ns0 nft list table ip nat |grep -q 'counter packets 2' &&
191 ip netns exec $ns0 nft list table ip nat |grep -q 'untracked counter packets [1-9]'
210 ip netns exec $ns0 nft -f - <<EOF
227 ip netns exec $ns0 nft list table ip nat |grep -q 'counter packets 2'
Dnft_meta.sh10 if ! nft --version > /dev/null 2>&1; then
28 ip netns exec "$ns0" nft -f /dev/stdin <<EOF
94 if ! ip netns exec "$ns0" nft list counter inet filter $cname | grep -q "$want"; then
97 ip netns exec "$ns0" nft list counter inet filter $cname
134 ip netns exec "$ns0" nft reset counters > /dev/null
Dconntrack_tcp_unreplied.sh16 nft --version > /dev/null 2>&1
47 cnt=$(ip netns exec $ns2 nft list counter inet filter "$name" | grep -q "$expect")
50 ip netns exec $ns2 nft list counter inet filter "$name" 1>&2
91 ip netns exec $ns2 nft -f - <<EOF
117 ip netns exec $ns2 nft -f - <<EOF
Dnft_queue.sh31 nft --version > /dev/null 2>&1
94 ip netns exec ${nsrouter} nft -f /dev/stdin <<EOF
130 ip netns exec ${nsrouter} nft -f /dev/stdin <<EOF
187 ip netns exec ${nsrouter} nft -f /dev/stdin <<EOF
211 ip netns exec ${nsrouter} nft delete table $proto blackh
252 ip netns exec ${nsrouter} nft list ruleset
319 ip netns exec ${nsrouter} nft -f /dev/stdin <<EOF
368 ip netns exec ${ns1} nft -f /dev/stdin <<EOF
391 …ip netns exec ${ns1} nft list chain inet filter $n | grep -q "oifname \"$d\" icmp type echo-reques…
394 ip netns exec ${ns1} nft list ruleset
Dnft_trans_stress.sh15 nft --version > /dev/null 2>&1
62 for i in $(seq 1 10) ; do ip netns exec "$testns" nft -f "$tmp" & done
67 ip netns exec "$testns" nft delete table inet $table 2>/dev/null
Dnft_flowtable.sh161 ip netns exec $nsr1 nft -f - <<EOF
329 ip netns exec $nsr1 nft list ruleset
342 ip netns exec $nsr1 nft -f - <<EOF
360 ip netns exec $nsr1 nft list ruleset
366 handle=$(ip netns exec $nsr1 nft -a list table inet filter | grep something-to-grep-for | cut -d \#…
368 if ! ip netns exec $nsr1 nft delete rule inet filter forward $handle; then
380 ip netns exec $nsr1 nft list ruleset
396 ip netns exec $nsr1 nft -f - <<EOF
415 ip netns exec $nsr1 nft list ruleset
440 ip netns exec $nsr1 nft list ruleset
[all …]
Dconntrack_icmp_related.sh21 nft --version > /dev/null 2>&1
53 cnt=$(ip netns exec $ns nft list counter inet filter "$name" | grep -q "$expect")
56 ip netns exec $ns nft list counter inet filter "$name" 1>&2
130 ip netns exec $netns nft -f - <<EOF
145 ip netns exec nsclient1 nft -f - <<EOF
159 ip netns exec nsclient2 nft -f - <<EOF
188 ip netns exec nsrouter1 nft -f - <<EOF
Dnft_nat_zones.sh63 nft --version > /dev/null 2>&1
161 ip netns exec $gw nft -f /dev/stdin<<EOF
244 ip netns exec $gw nft get element inet raw inicmp "{ 10.1.0.3 . \"veth$i\" . 10.3.0.99 }" 1>&2
249 ip netns exec $gw nft get element inet raw inicmp "{ 10.3.0.99 . \"veth0\" . 10.3.0.1 }" | grep -q …
253 ip netns exec $gw nft get element inet raw inicmp "{ 10.3.99 . \"veth0\" . 10.3.0.1 }" 1>&2
292 …ip netns exec $gw nft get element inet raw inflows "{ 10.1.0.3 . 10000 . \"veth$i\" . 10.3.0.99 . …
303 ip netns exec $gw nft get element inet raw inflows "{ 10.3.0.99 . 5201 . \"veth0\" . 10.3.0.1 . 100…
Dnft_zones_many.sh46 ip netns exec $ns nft -f /dev/stdin<<EOF
69 ) | ip netns exec $ns nft -f /dev/stdin
Dnft_synproxy.sh81 ip netns exec $nsr nft -f - <<EOF
112 ip netns exec $nsr nft list ruleset
Dnft_conntrack_helper.sh22 nft --version > /dev/null 2>&1
73 ip netns exec ${ns} nft -f - <<EOF
/linux-5.19.10/Documentation/networking/
Dtproxy.rst24 Alternatively you can do this in nft with the following commands::
26 # nft add table filter
27 # nft add chain filter divert "{ type filter hook prerouting priority -150; }"
28 # nft add rule filter divert meta l4proto tcp socket transparent 1 meta mark set 1 accept
72 Or the following rule to nft:
74 # nft add rule filter divert tcp dport 80 tproxy to :50080 meta mark set 1 accept
/linux-5.19.10/drivers/net/wireless/ath/ath9k/
Dcalib.c155 int16_t *nft) in ath9k_hw_get_nf_thresh() argument
159 *nft = (int8_t)ah->eep_ops->get_eeprom(ah, EEP_NFTHRESH_5); in ath9k_hw_get_nf_thresh()
162 *nft = (int8_t)ah->eep_ops->get_eeprom(ah, EEP_NFTHRESH_2); in ath9k_hw_get_nf_thresh()
/linux-5.19.10/tools/testing/selftests/net/mptcp/
Dmptcp_connect.sh695 ip netns exec "$listener_ns" nft -f /dev/stdin <<"EOF"
721 ip netns exec "$listener_ns" nft flush ruleset
728 ip netns exec "$listener_ns" nft flush ruleset
742 ip netns exec "$listener_ns" nft flush ruleset
/linux-5.19.10/drivers/net/ethernet/netronome/nfp/flower/
Dconntrack.h64 struct nf_flowtable *nft; member
Dmetadata.c648 if (zt->nft) { in nfp_zone_table_entry_destroy()
649 nf_flow_table_offload_del_cb(zt->nft, in nfp_zone_table_entry_destroy()
652 zt->nft = NULL; in nfp_zone_table_entry_destroy()
Dconntrack.c1144 zt->nft = NULL; in get_nfp_zone_entry()
1518 if (!zt->nft) { in nfp_fl_ct_handle_pre_ct()
1519 zt->nft = ct_act->ct.flow_table; in nfp_fl_ct_handle_pre_ct()
1520 err = nf_flow_table_offload_add_cb(zt->nft, nfp_fl_ct_handle_nft_flow, zt); in nfp_fl_ct_handle_pre_ct()
1839 zt->nft = NULL; in nfp_fl_ct_del_flow()
/linux-5.19.10/include/net/
Dnet_namespace.h141 struct netns_nftables nft; member
/linux-5.19.10/net/netfilter/
Dnf_tables_core.c237 bool genbit = READ_ONCE(net->nft.gencursor); in nft_do_chain()
DKconfig429 controlled by iptables, ip6tables or nft.
475 (also known as expressions) that the userspace 'nft' utility
Dnf_tables_api.c1262 struct nft_flowtable *flowtable, *nft; in nft_flush_table() local
1295 list_for_each_entry_safe(flowtable, nft, &ctx->table->flowtables, list) { in nft_flush_table()
8858 net->nft.gencursor = nft_gencursor_next(net); in nf_tables_commit()
/linux-5.19.10/include/net/netfilter/
Dnf_tables.h1408 return net->nft.gencursor + 1 == 1 ? 1 : 0; in nft_gencursor_next()
1419 return 1 << READ_ONCE(net->nft.gencursor); in nft_genmask_cur()