Home
last modified time | relevance | path

Searched refs:iptables (Results 1 – 21 of 21) sorted by relevance

/tools/testing/selftests/net/netfilter/
A Drpath.sh7 if iptables-legacy --version >/dev/null 2>&1; then
8 iptables='iptables-legacy'
9 elif iptables --version >/dev/null 2>&1; then
10 iptables='iptables'
12 iptables=''
29 if [ -z "$iptables$ip6tables$nft" ]; then
67 [ -n "$iptables" ] && {
70 if ! ip netns exec "$ns2" "$iptables" $common -m rpfilter;then
74 ip netns exec "$ns2" "$iptables" $common -m rpfilter --invert
128 [ -n "$iptables" ] && ip netns exec "$ns2" "$iptables" -t raw -Z
[all …]
A Dxt_string.sh39 iptables -A OUTPUT -o d0 -m string \
43 ip netns exec "$netns" iptables -v -S OUTPUT | grep '^-A'
46 ip netns exec "$netns" iptables -Z OUTPUT
A Dnf_nat_edemux.sh47 ip netns exec "$ns2" iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-dest…
71 ip netns exec "$ns1" iptables -t nat -A PREROUTING -p tcp --dport 5202 -j REDIRECT --to-ports 5201
72 ip netns exec "$ns1" iptables -t nat -A PREROUTING -p tcp --dport 5203 -j REDIRECT --to-ports 5201
A Dconntrack_sctp_collision.sh58 ip net exec "$ROUTER_NS" iptables -A FORWARD -m state --state INVALID,UNTRACKED -j DROP
59 ip net exec "$ROUTER_NS" iptables -A INPUT -p sctp -j DROP
A Dbr_netfilter_queue.sh54 sysctl net.bridge.bridge-nf-call-iptables=1 || exit 1
A Dbr_netfilter.sh107 if ! ip netns exec "$ns0" sysctl -q net.bridge.bridge-nf-call-iptables=1; then
A Dconntrack_ipip_mtu.sh190 ip netns exec "$r_a" iptables -A FORWARD -m conntrack --ctstate NEW
/tools/testing/selftests/net/netfilter/packetdrill/
A Dconntrack_inexact_rst.pkt17 +0 `iptables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
18 +0 `iptables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
61 +0 `iptables -v -S INPUT | grep INVALID | grep -q -- "-c 0 0"`
62 +0 `iptables -v -S OUTPUT | grep INVALID | grep -q -- "-c 0 0"`
A Dconntrack_synack_reuse.pkt8 +0 `iptables -A INPUT -m conntrack --ctstate INVALID -p tcp --tcp-flags SYN,ACK SYN,ACK`
34 +0 `iptables -v -S INPUT | grep INVALID | grep -q -- "-c 0 0"`
/tools/testing/selftests/net/mptcp/
A Dmptcp_sockopt.sh18 iptables="iptables"
53 for t in ${iptables} ${ip6tables}; do
108 mptcp_lib_check_tools ip "${iptables}" "${ip6tables}"
115 local tables=${iptables}
A Dmptcp_join.sh29 iptables="iptables"
156 mptcp_lib_check_tools ip tc ss "${iptables}" "${ip6tables}"
345 tables="${iptables}"
411 tables="${iptables}"
474 if ! ip netns exec "${ns}" ${iptables} \
3799 ip netns exec "${ns2}" ${iptables} -D OUTPUT -s "10.0.3.2" -p tcp -j REJECT
3935 ip netns exec "${ns2}" ${iptables} -D OUTPUT -s "10.0.3.2" -p tcp -j REJECT
/tools/testing/selftests/bpf/prog_tests/
A Dbpf_nf.c52 const char *iptables = "iptables-legacy -t raw %s PREROUTING -j CONNMARK --set-mark 42/0"; in test_bpf_nf_ct() local
77 snprintf(cmd, sizeof(cmd), iptables, "-A"); in test_bpf_nf_ct()
149 snprintf(cmd, sizeof(cmd), iptables, "-D"); in test_bpf_nf_ct()
/tools/testing/selftests/net/
A Dxfrm_policy.sh185 ip netns exec $ns iptables-save -c |grep policy | ( read c rest
186 ip netns exec $ns iptables -Z
343 iptables --version 2>/dev/null >/dev/null
402 ip netns exec ${ns[3]} iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
403 ip netns exec ${ns[4]} iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
A Dudpgro_fwd.sh112 local ipt=iptables
198 IPT=iptables
A Dudpgro.sh79 ipt_cmd=iptables
A Dsrv6_end_dx4_netfilter_test.sh204 ip netns exec ${nsname} iptables -t raw -A PREROUTING -m rpfilter --invert -j DROP
A Damt.sh168 ip netns exec "${RELAY}" iptables -t mangle -I PREROUTING \
A Dfcnal-test.sh3983 run_cmd iptables -A INPUT -p tcp --dport 12345 -j REJECT --reject-with tcp-reset
3991 run_cmd iptables -F
3992 run_cmd iptables -A INPUT -p tcp --dport 12345 -j REJECT --reject-with icmp-port-unreachable
3993 run_cmd iptables -A INPUT -p udp --dport 12345 -j REJECT --reject-with icmp-port-unreachable
3999 iptables -F
4220 …run_cmd iptables -t nat -A POSTROUTING -p tcp -m tcp --dport ${port} -j SNAT --to-source ${NSA_LO_…
4234 …run_cmd iptables -t nat -D POSTROUTING -p tcp -m tcp --dport ${port} -j SNAT --to-source ${NSA_LO_…
A Dfib_tests.sh2288 iptables -t mangle -L OUTPUT &> /dev/null
2340 $NS_EXEC iptables -t mangle -A OUTPUT -j MARK --set-mark 1
2347 $NS_EXEC iptables -t mangle -D OUTPUT -j MARK --set-mark 1
/tools/testing/selftests/wireguard/
A Dnetns.sh199 n0 iptables -A INPUT -m length --length 1360 -j DROP
205 n0 iptables -F INPUT
338 n0 iptables -t nat -A POSTROUTING -s 192.168.1.0/24 -d 10.0.0.0/24 -j SNAT --to 10.0.0.1
352 n1 iptables -t mangle -I OUTPUT -j MARK --set-xmark 1
355 n1 iptables -t mangle -D OUTPUT -j MARK --set-xmark 1
389 n2 iptables -t nat -A POSTROUTING -s 10.0.0.0/24 -d 192.168.241.0/24 -j SNAT --to 192.168.241.2
390 n0 iptables -t filter -A INPUT \! -s 10.0.0.0/24 -i vethrs -j DROP # Manual rpfilter just to be exp…
396 n0 iptables -t nat -F
397 n0 iptables -t filter -F
398 n2 iptables -t nat -F
/tools/testing/selftests/wireguard/qemu/
A DMakefile43 $(eval $(call tar_download,IPTABLES,iptables,1.8.7,.tar.bz2,https://www.netfilter.org/projects/ipta…
341 …)/bash $(IPROUTE2_PATH)/misc/ss $(IPROUTE2_PATH)/ip/ip $(IPTABLES_PATH)/iptables/xtables-legacy-mu…
431 $(IPTABLES_PATH)/iptables/xtables-legacy-multi: | $(IPTABLES_PATH)/.installed $(USERSPACE_DEPS)

Completed in 34 milliseconds