/openbmc/openbmc/meta-openembedded/meta-networking/recipes-filter/nftables/ |
H A D | nftables_1.0.9.bb | 70 kernel-module-nft-chain-nat kernel-module-nft-queue \ 71 kernel-module-nft-compat kernel-module-nft-quota \ 72 kernel-module-nft-connlimit kernel-module-nft-redir \ 73 kernel-module-nft-ct kernel-module-nft-reject \ 74 kernel-module-nft-flow-offload kernel-module-nft-reject-inet \ 75 kernel-module-nft-hash kernel-module-nft-reject-ipv4 \ 76 kernel-module-nft-limit kernel-module-nft-reject-ipv6 \ 77 kernel-module-nft-log kernel-module-nft-socket \ 78 kernel-module-nft-masq kernel-module-nft-synproxy \ 79 kernel-module-nft-nat kernel-module-nft-tunnel \ [all …]
|
/openbmc/linux/tools/testing/selftests/netfilter/ |
H A D | nft_nat.sh | 21 nft --version > /dev/null 2>&1 184 ip netns exec "$ns0" nft -f /dev/stdin <<EOF 385 ip netns exec "$ns0" nft -f /dev/stdin <<EOF 452 ip netns exec "$ns0" nft -f /dev/stdin <<EOF 553 ip netns exec "$ns0" nft -f /dev/stdin <<EOF 652 ip netns exec "$ns0" nft -f /dev/stdin <<EOF 734 ip netns exec "$ns0" nft -f /dev/stdin <<EOF 839 ip netns exec "$ns0" nft -f /dev/stdin <<EOF 857 ip netns exec "$ns0" nft -f /dev/stdin <<EOF 879 ip netns exec "$ns0" nft -f /dev/stdin <<EOF [all …]
|
H A D | nft_trans_stress.sh | 42 nft --version > /dev/null 2>&1 90 ip netns exec "$testns" nft -f "$tmp" 91 for i in $(seq 1 10) ; do ip netns exec "$testns" nft -f "$tmp" & done 96 ip netns exec "$testns" nft delete table inet $table 106 (echo "flush ruleset"; cat "$tmp") | ip netns exec "$testns" nft -f /dev/stdin 120 ) | ip netns exec "$testns" nft -f /dev/stdin 127 ) | ip netns exec "$testns" nft -f /dev/stdin 141 (echo "flush ruleset"; cat "$tmp") | ip netns exec "$testns" nft -f /dev/stdin
|
H A D | rpath.sh | 24 if nft --version >/dev/null 2>&1; then 25 nft='nft' 27 nft='' 30 if [ -z "$iptables$ip6tables$nft" ]; then 75 [ -n "$nft" ] && ip netns exec "$ns2" $nft -f - <<EOF 104 [ -n "$nft" ] || return 0 105 ip netns exec "$ns2" "$nft" list chain inet t c | \ 118 if [ -n "$nft" ]; then 121 ip netns exec "$ns2" $nft -s list table inet t; 122 ) | ip netns exec "$ns2" $nft -f -
|
H A D | nft_concat_range.sh | 482 eval "echo \"${set_template}\"" | nft -f - 980 nft reset counter inet filter test >/dev/null 2>&1 981 nft flush ruleset >/dev/null 2>&1 1228 nft reset counter inet filter test >/dev/null 1349 nft flush inet filter test 2>/dev/null 1364 nft flush ruleset 1475 nft -f "${tmp}" 1528 nft flush set t s 2>/dev/null || return 1 1531 nft flush ruleset 1560 nft list set inet filter test ) | nft -f - [all …]
|
H A D | conntrack_vrf.sh | 50 nft --version > /dev/null 2>&1 108 ip netns exec $ns0 nft -f - <<EOF 143 ip netns exec $ns0 nft list ruleset 161 ip netns exec $ns0 nft -f - <<EOF 190 ip netns exec $ns0 nft list table ip nat |grep -q 'counter packets 2' && 191 ip netns exec $ns0 nft list table ip nat |grep -q 'untracked counter packets [1-9]' 210 ip netns exec $ns0 nft -f - <<EOF 227 ip netns exec $ns0 nft list table ip nat |grep -q 'counter packets 2'
|
H A D | nft_flowtable.sh | 159 ip netns exec $nsr1 nft -f - <<EOF 191 ip netns exec $ns2 nft -f - <<EOF 406 ip netns exec $nsr1 nft -f - <<EOF 423 ip netns exec $nsr1 nft -f - <<EOF 488 ip netns exec $nsr1 nft list ruleset 502 ip netns exec $nsr1 nft -f - <<EOF 523 ip netns exec $nsr1 nft list ruleset 543 ip netns exec $nsr1 nft list ruleset 559 ip netns exec $nsr1 nft -f - <<EOF 576 ip netns exec $nsr1 nft list ruleset [all …]
|
H A D | nft_fib.sh | 26 nft --version > /dev/null 2>&1 59 ip netns exec ${netns} nft -f /dev/stdin <<EOF 72 ip netns exec ${netns} nft -f /dev/stdin <<EOF 86 ip netns exec ${netns} nft -f /dev/stdin <<EOF 113 …line=$(ip netns exec ${ns} nft list table inet filter | grep 'fib saddr . iif' | grep $address | g… 118 ip netns exec ${ns} nft list table inet filter 204 ip netns exec ${nsrouter} nft flush table inet filter 238 ip netns exec ${ns1} nft flush ruleset 239 ip netns exec ${ns2} nft flush ruleset 240 ip netns exec ${nsrouter} nft flush ruleset [all …]
|
H A D | nft_meta.sh | 10 if ! nft --version > /dev/null 2>&1; then 28 ip netns exec "$ns0" nft -f /dev/stdin <<EOF 94 if ! ip netns exec "$ns0" nft list counter inet filter $cname | grep -q "$want"; then 97 ip netns exec "$ns0" nft list counter inet filter $cname 134 ip netns exec "$ns0" nft reset counters > /dev/null
|
H A D | conntrack_tcp_unreplied.sh | 16 nft --version > /dev/null 2>&1 47 cnt=$(ip netns exec $ns2 nft list counter inet filter "$name" | grep -q "$expect") 50 ip netns exec $ns2 nft list counter inet filter "$name" 1>&2 91 ip netns exec $ns2 nft -f - <<EOF 117 ip netns exec $ns2 nft -f - <<EOF
|
H A D | nft_queue.sh | 31 nft --version > /dev/null 2>&1 94 ip netns exec ${nsrouter} nft -f /dev/stdin <<EOF 130 ip netns exec ${nsrouter} nft -f /dev/stdin <<EOF 187 ip netns exec ${nsrouter} nft -f /dev/stdin <<EOF 211 ip netns exec ${nsrouter} nft delete table $proto blackh 252 ip netns exec ${nsrouter} nft list ruleset 319 ip netns exec ${nsrouter} nft -f /dev/stdin <<EOF 368 ip netns exec ${ns1} nft -f /dev/stdin <<EOF 391 …ip netns exec ${ns1} nft list chain inet filter $n | grep -q "oifname \"$d\" icmp type echo-reques… 394 ip netns exec ${ns1} nft list ruleset
|
H A D | nft_audit.sh | 9 nft --version >/dev/null 2>&1 || { 59 nft flush ruleset 208 readarray -t handles < <(nft -a list chain t1 c1 | \
|
H A D | conntrack_icmp_related.sh | 21 nft --version > /dev/null 2>&1 55 cnt=$(ip netns exec $ns nft list counter inet filter "$name" | grep -q "$expect") 58 ip netns exec $ns nft list counter inet filter "$name" 1>&2 132 ip netns exec $netns nft -f - <<EOF 147 ip netns exec nsclient1 nft -f - <<EOF 167 ip netns exec nsclient2 nft -f - <<EOF 196 ip netns exec nsrouter1 nft -f - <<EOF
|
H A D | nft_nat_zones.sh | 63 nft --version > /dev/null 2>&1 161 ip netns exec $gw nft -f /dev/stdin<<EOF 244 ip netns exec $gw nft get element inet raw inicmp "{ 10.1.0.3 . \"veth$i\" . 10.3.0.99 }" 1>&2 249 ip netns exec $gw nft get element inet raw inicmp "{ 10.3.0.99 . \"veth0\" . 10.3.0.1 }" | grep -q … 253 ip netns exec $gw nft get element inet raw inicmp "{ 10.3.99 . \"veth0\" . 10.3.0.1 }" 1>&2 292 …ip netns exec $gw nft get element inet raw inflows "{ 10.1.0.3 . 10000 . \"veth$i\" . 10.3.0.99 . … 303 ip netns exec $gw nft get element inet raw inflows "{ 10.3.0.99 . 5201 . \"veth0\" . 10.3.0.1 . 100…
|
H A D | nft_zones_many.sh | 46 ip netns exec $ns nft -f /dev/stdin<<EOF 69 ) | ip netns exec $ns nft -f /dev/stdin
|
H A D | nft_synproxy.sh | 81 ip netns exec $nsr nft -f - <<EOF 112 ip netns exec $nsr nft list ruleset
|
H A D | nft_conntrack_helper.sh | 22 nft --version > /dev/null 2>&1 73 ip netns exec ${ns} nft -f - <<EOF
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-filter/nftables/nftables/ |
H A D | 0001-tests-shell-skip-secmark-tests-if-kernel-does-not-su.patch | 14 tests/shell/features/secmark.nft | 7 +++++++ 17 create mode 100644 tests/shell/features/secmark.nft 19 diff --git a/tests/shell/features/secmark.nft b/tests/shell/features/secmark.nft 23 +++ b/tests/shell/features/secmark.nft
|
H A D | run-ptest | 7 NFT=nft
|
/openbmc/openbmc/meta-google/recipes-google/nftables/files/ |
H A D | nftables.service | 7 ExecStart=/usr/libexec/nft-configure.sh 8 ExecReload=/usr/libexec/nft-configure.sh 9 ExecStop=/usr/sbin/nft flush ruleset
|
H A D | nft-configure.sh | 21 nft -f "$rules" || exit
|
/openbmc/linux/Documentation/networking/ |
H A D | tproxy.rst | 24 Alternatively you can do this in nft with the following commands:: 26 # nft add table filter 27 # nft add chain filter divert "{ type filter hook prerouting priority -150; }" 28 # nft add rule filter divert meta l4proto tcp socket transparent 1 meta mark set 1 accept 72 Or the following rule to nft: 74 # nft add rule filter divert tcp dport 80 tproxy to :50080 meta mark set 1 accept
|
/openbmc/openbmc/meta-google/recipes-google/nftables/ |
H A D | nftables-systemd.bb | 12 file://nft-configure.sh \ 25 install -m0755 ${WORKDIR}/nft-configure.sh ${D}${libexecdir}/
|
/openbmc/openbmc/meta-google/recipes-google/ncsi/ |
H A D | gbmc-ncsi-config.bb | 25 file://gbmc-ncsi-nft.sh.in \ 120 sed "s,@NCSI_IF@,$if_name,g" ${WORKDIR}/gbmc-ncsi-nft.sh.in \ 121 >${WORKDIR}/gbmc-ncsi-nft.sh 122 install -m644 ${WORKDIR}/gbmc-ncsi-nft.sh $mondir
|
/openbmc/linux/drivers/net/wireless/ath/ath9k/ |
H A D | calib.c | 155 int16_t *nft) in ath9k_hw_get_nf_thresh() argument 159 *nft = (int8_t)ah->eep_ops->get_eeprom(ah, EEP_NFTHRESH_5); in ath9k_hw_get_nf_thresh() 162 *nft = (int8_t)ah->eep_ops->get_eeprom(ah, EEP_NFTHRESH_2); in ath9k_hw_get_nf_thresh()
|