Searched hist:e2cf17d3 (Results 1 – 6 of 6) sorted by relevance
/openbmc/linux/include/uapi/linux/netfilter/ |
H A D | nfnetlink_hook.h | e2cf17d3 Fri Jun 04 05:27:07 CDT 2021 Florian Westphal <fw@strlen.de> netfilter: add new hook nfnl subsystem
This nfnl subsystem allows to dump the list of all active netfiler hooks, e.g. defrag, conntrack, nf/ip/arp/ip6tables and so on.
This helps to see what kind of features are currently enabled in the network stack.
Sample output from nft tool using this infra:
$ nft list hook ip input family ip hook input { +0000000010 nft_do_chain_inet [nf_tables] # nft table firewalld INPUT +0000000100 nf_nat_ipv4_local_in [nf_nat] +2147483647 ipv4_confirm [nf_conntrack] }
Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
|
H A D | nfnetlink.h | e2cf17d3 Fri Jun 04 05:27:07 CDT 2021 Florian Westphal <fw@strlen.de> netfilter: add new hook nfnl subsystem
This nfnl subsystem allows to dump the list of all active netfiler hooks, e.g. defrag, conntrack, nf/ip/arp/ip6tables and so on.
This helps to see what kind of features are currently enabled in the network stack.
Sample output from nft tool using this infra:
$ nft list hook ip input family ip hook input { +0000000010 nft_do_chain_inet [nf_tables] # nft table firewalld INPUT +0000000100 nf_nat_ipv4_local_in [nf_nat] +2147483647 ipv4_confirm [nf_conntrack] }
Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
|
/openbmc/linux/net/netfilter/ |
H A D | nfnetlink_hook.c | e2cf17d3 Fri Jun 04 05:27:07 CDT 2021 Florian Westphal <fw@strlen.de> netfilter: add new hook nfnl subsystem
This nfnl subsystem allows to dump the list of all active netfiler hooks, e.g. defrag, conntrack, nf/ip/arp/ip6tables and so on.
This helps to see what kind of features are currently enabled in the network stack.
Sample output from nft tool using this infra:
$ nft list hook ip input family ip hook input { +0000000010 nft_do_chain_inet [nf_tables] # nft table firewalld INPUT +0000000100 nf_nat_ipv4_local_in [nf_nat] +2147483647 ipv4_confirm [nf_conntrack] }
Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
|
H A D | Makefile | e2cf17d3 Fri Jun 04 05:27:07 CDT 2021 Florian Westphal <fw@strlen.de> netfilter: add new hook nfnl subsystem
This nfnl subsystem allows to dump the list of all active netfiler hooks, e.g. defrag, conntrack, nf/ip/arp/ip6tables and so on.
This helps to see what kind of features are currently enabled in the network stack.
Sample output from nft tool using this infra:
$ nft list hook ip input family ip hook input { +0000000010 nft_do_chain_inet [nf_tables] # nft table firewalld INPUT +0000000100 nf_nat_ipv4_local_in [nf_nat] +2147483647 ipv4_confirm [nf_conntrack] }
Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
|
H A D | nfnetlink.c | e2cf17d3 Fri Jun 04 05:27:07 CDT 2021 Florian Westphal <fw@strlen.de> netfilter: add new hook nfnl subsystem
This nfnl subsystem allows to dump the list of all active netfiler hooks, e.g. defrag, conntrack, nf/ip/arp/ip6tables and so on.
This helps to see what kind of features are currently enabled in the network stack.
Sample output from nft tool using this infra:
$ nft list hook ip input family ip hook input { +0000000010 nft_do_chain_inet [nf_tables] # nft table firewalld INPUT +0000000100 nf_nat_ipv4_local_in [nf_nat] +2147483647 ipv4_confirm [nf_conntrack] }
Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
|
H A D | Kconfig | e2cf17d3 Fri Jun 04 05:27:07 CDT 2021 Florian Westphal <fw@strlen.de> netfilter: add new hook nfnl subsystem
This nfnl subsystem allows to dump the list of all active netfiler hooks, e.g. defrag, conntrack, nf/ip/arp/ip6tables and so on.
This helps to see what kind of features are currently enabled in the network stack.
Sample output from nft tool using this infra:
$ nft list hook ip input family ip hook input { +0000000010 nft_do_chain_inet [nf_tables] # nft table firewalld INPUT +0000000100 nf_nat_ipv4_local_in [nf_nat] +2147483647 ipv4_confirm [nf_conntrack] }
Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
|