Home
last modified time | relevance | path

Searched refs:nft (Results 1 – 14 of 14) sorted by relevance

/Linux-v5.4/tools/testing/selftests/netfilter/
Dnft_nat.sh16 nft --version > /dev/null 2>&1
71 ip netns exec $ns nft list counter inet filter $counter 1>&2
79 cnt=$(ip netns exec $ns nft list counter inet filter ns0in | grep -q "packets 1 bytes 84")
84 cnt=$(ip netns exec $ns nft list counter inet filter ns0out | grep -q "packets 1 bytes 84")
91 cnt=$(ip netns exec $ns nft list counter inet filter ns0in6 | grep -q "$expect")
96 cnt=$(ip netns exec $ns nft list counter inet filter ns0out6 | grep -q "$expect")
110 cnt=$(ip netns exec ns0 nft list counter inet filter ns0in | grep -q "packets 0 bytes 0")
116 cnt=$(ip netns exec ns0 nft list counter inet filter ns0in6 | grep -q "packets 0 bytes 0")
122 cnt=$(ip netns exec ns0 nft list counter inet filter ns0out | grep -q "packets 0 bytes 0")
127 cnt=$(ip netns exec ns0 nft list counter inet filter ns0out6 | grep -q "packets 0 bytes 0")
[all …]
Dnft_flowtable.sh24 nft --version > /dev/null 2>&1
125 ip netns exec nsr1 nft -f - <<EOF
271 ip netns exec nsr1 nft list ruleset
284 ip netns exec nsr1 nft -f - <<EOF
299 ip netns exec nsr1 nft list ruleset
305 handle=$(ip netns exec nsr1 nft -a list table inet filter | grep something-to-grep-for | cut -d \# …
307 ip netns exec nsr1 nft delete rule inet filter forward $handle
321 ip netns exec nsr1 nft list ruleset
356 ip netns exec nsr1 nft delete table ip nat
368 ip netns exec nsr1 nft list ruleset 1>&2
Dnft_trans_stress.sh15 nft --version > /dev/null 2>&1
62 for i in $(seq 1 10) ; do ip netns exec "$testns" nft -f "$tmp" & done
67 ip netns exec "$testns" nft delete table inet $table 2>/dev/null
Dconntrack_icmp_related.sh21 nft --version > /dev/null 2>&1
53 cnt=$(ip netns exec $ns nft list counter inet filter "$name" | grep -q "$expect")
56 ip netns exec $ns nft list counter inet filter "$name" 1>&2
130 ip netns exec $netns nft -f - <<EOF
145 ip netns exec nsclient1 nft -f - <<EOF
159 ip netns exec nsclient2 nft -f - <<EOF
188 ip netns exec nsrouter1 nft -f - <<EOF
/Linux-v5.4/Documentation/networking/
Dtproxy.txt21 Alternatively you can do this in nft with the following commands:
23 # nft add table filter
24 # nft add chain filter divert "{ type filter hook prerouting priority -150; }"
25 # nft add rule filter divert meta l4proto tcp socket transparent 1 meta mark set 1 accept
69 Or the following rule to nft:
71 # nft add rule filter divert tcp dport 80 tproxy to :50080 meta mark set 1 accept
/Linux-v5.4/net/netfilter/
Dnf_tables_api.c68 switch (net->nft.validate_state) { in nft_validate_state_update()
79 net->nft.validate_state = new_validate_state; in nft_validate_state_update()
140 list_for_each_entry_reverse(trans, &net->nft.commit_list, list) { in nft_set_trans_bind()
204 list_add_tail(&trans->list, &ctx->net->nft.commit_list); in nft_trans_table_add()
231 list_add_tail(&trans->list, &ctx->net->nft.commit_list); in nft_trans_chain_add()
304 list_add_tail(&trans->list, &ctx->net->nft.commit_list); in nft_trans_rule_add()
359 list_add_tail(&trans->list, &ctx->net->nft.commit_list); in nft_trans_set_add()
391 list_add_tail(&trans->list, &ctx->net->nft.commit_list); in nft_trans_obj_add()
424 list_add_tail(&trans->list, &ctx->net->nft.commit_list); in nft_trans_flowtable_add()
457 list_for_each_entry_rcu(table, &net->nft.tables, list) { in nft_table_lookup()
[all …]
Dnf_tables_offload.c331 list_for_each_entry(trans, &net->nft.commit_list, list) { in nft_flow_rule_offload_commit()
392 list_for_each_entry(table, &net->nft.tables, list) { in __nft_offload_get_chain()
419 mutex_lock(&net->nft.commit_mutex); in nft_indr_block_cb()
427 mutex_unlock(&net->nft.commit_mutex); in nft_indr_block_cb()
449 mutex_lock(&net->nft.commit_mutex); in nft_offload_netdev_event()
453 mutex_unlock(&net->nft.commit_mutex); in nft_offload_netdev_event()
Dnft_chain_filter.c328 mutex_lock(&ctx.net->nft.commit_mutex); in nf_tables_netdev_event()
329 list_for_each_entry(table, &ctx.net->nft.tables, list) { in nf_tables_netdev_event()
343 mutex_unlock(&ctx.net->nft.commit_mutex); in nf_tables_netdev_event()
Dnf_tables_core.c159 bool genbit = READ_ONCE(net->nft.gencursor); in nft_do_chain()
Dnft_dynset.c138 lockdep_assert_held(&ctx->net->nft.commit_mutex); in nft_dynset_init()
DKconfig404 controlled by iptables, ip6tables or nft.
449 (also known as expressions) that the userspace 'nft' utility
/Linux-v5.4/drivers/net/wireless/ath/ath9k/
Dcalib.c155 int16_t *nft) in ath9k_hw_get_nf_thresh() argument
159 *nft = (int8_t)ah->eep_ops->get_eeprom(ah, EEP_NFTHRESH_5); in ath9k_hw_get_nf_thresh()
162 *nft = (int8_t)ah->eep_ops->get_eeprom(ah, EEP_NFTHRESH_2); in ath9k_hw_get_nf_thresh()
/Linux-v5.4/include/net/
Dnet_namespace.h142 struct netns_nftables nft; member
/Linux-v5.4/include/net/netfilter/
Dnf_tables.h1254 return net->nft.gencursor + 1 == 1 ? 1 : 0; in nft_gencursor_next()
1265 return 1 << READ_ONCE(net->nft.gencursor); in nft_genmask_cur()