Searched refs:iptables (Results 1 – 21 of 21) sorted by relevance
| /tools/testing/selftests/net/netfilter/ |
| A D | rpath.sh | 7 if iptables-legacy --version >/dev/null 2>&1; then 8 iptables='iptables-legacy' 9 elif iptables --version >/dev/null 2>&1; then 10 iptables='iptables' 12 iptables='' 29 if [ -z "$iptables$ip6tables$nft" ]; then 67 [ -n "$iptables" ] && { 70 if ! ip netns exec "$ns2" "$iptables" $common -m rpfilter;then 74 ip netns exec "$ns2" "$iptables" $common -m rpfilter --invert 128 [ -n "$iptables" ] && ip netns exec "$ns2" "$iptables" -t raw -Z [all …]
|
| A D | xt_string.sh | 39 iptables -A OUTPUT -o d0 -m string \ 43 ip netns exec "$netns" iptables -v -S OUTPUT | grep '^-A' 46 ip netns exec "$netns" iptables -Z OUTPUT
|
| A D | nf_nat_edemux.sh | 47 ip netns exec "$ns2" iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-dest… 71 ip netns exec "$ns1" iptables -t nat -A PREROUTING -p tcp --dport 5202 -j REDIRECT --to-ports 5201 72 ip netns exec "$ns1" iptables -t nat -A PREROUTING -p tcp --dport 5203 -j REDIRECT --to-ports 5201
|
| A D | conntrack_sctp_collision.sh | 58 ip net exec "$ROUTER_NS" iptables -A FORWARD -m state --state INVALID,UNTRACKED -j DROP 59 ip net exec "$ROUTER_NS" iptables -A INPUT -p sctp -j DROP
|
| A D | br_netfilter_queue.sh | 54 sysctl net.bridge.bridge-nf-call-iptables=1 || exit 1
|
| A D | br_netfilter.sh | 107 if ! ip netns exec "$ns0" sysctl -q net.bridge.bridge-nf-call-iptables=1; then
|
| A D | conntrack_ipip_mtu.sh | 190 ip netns exec "$r_a" iptables -A FORWARD -m conntrack --ctstate NEW
|
| /tools/testing/selftests/net/netfilter/packetdrill/ |
| A D | conntrack_inexact_rst.pkt | 17 +0 `iptables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP` 18 +0 `iptables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP` 61 +0 `iptables -v -S INPUT | grep INVALID | grep -q -- "-c 0 0"` 62 +0 `iptables -v -S OUTPUT | grep INVALID | grep -q -- "-c 0 0"`
|
| A D | conntrack_synack_reuse.pkt | 8 +0 `iptables -A INPUT -m conntrack --ctstate INVALID -p tcp --tcp-flags SYN,ACK SYN,ACK` 34 +0 `iptables -v -S INPUT | grep INVALID | grep -q -- "-c 0 0"`
|
| /tools/testing/selftests/net/mptcp/ |
| A D | mptcp_sockopt.sh | 18 iptables="iptables" 53 for t in ${iptables} ${ip6tables}; do 108 mptcp_lib_check_tools ip "${iptables}" "${ip6tables}" 115 local tables=${iptables}
|
| A D | mptcp_join.sh | 29 iptables="iptables" 156 mptcp_lib_check_tools ip tc ss "${iptables}" "${ip6tables}" 345 tables="${iptables}" 411 tables="${iptables}" 474 if ! ip netns exec "${ns}" ${iptables} \ 3799 ip netns exec "${ns2}" ${iptables} -D OUTPUT -s "10.0.3.2" -p tcp -j REJECT 3935 ip netns exec "${ns2}" ${iptables} -D OUTPUT -s "10.0.3.2" -p tcp -j REJECT
|
| /tools/testing/selftests/bpf/prog_tests/ |
| A D | bpf_nf.c | 52 const char *iptables = "iptables-legacy -t raw %s PREROUTING -j CONNMARK --set-mark 42/0"; in test_bpf_nf_ct() local 77 snprintf(cmd, sizeof(cmd), iptables, "-A"); in test_bpf_nf_ct() 149 snprintf(cmd, sizeof(cmd), iptables, "-D"); in test_bpf_nf_ct()
|
| /tools/testing/selftests/net/ |
| A D | xfrm_policy.sh | 185 ip netns exec $ns iptables-save -c |grep policy | ( read c rest 186 ip netns exec $ns iptables -Z 343 iptables --version 2>/dev/null >/dev/null 402 ip netns exec ${ns[3]} iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec 403 ip netns exec ${ns[4]} iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
|
| A D | udpgro_fwd.sh | 112 local ipt=iptables 198 IPT=iptables
|
| A D | udpgro.sh | 79 ipt_cmd=iptables
|
| A D | srv6_end_dx4_netfilter_test.sh | 204 ip netns exec ${nsname} iptables -t raw -A PREROUTING -m rpfilter --invert -j DROP
|
| A D | amt.sh | 168 ip netns exec "${RELAY}" iptables -t mangle -I PREROUTING \
|
| A D | fcnal-test.sh | 3983 run_cmd iptables -A INPUT -p tcp --dport 12345 -j REJECT --reject-with tcp-reset 3991 run_cmd iptables -F 3992 run_cmd iptables -A INPUT -p tcp --dport 12345 -j REJECT --reject-with icmp-port-unreachable 3993 run_cmd iptables -A INPUT -p udp --dport 12345 -j REJECT --reject-with icmp-port-unreachable 3999 iptables -F 4220 …run_cmd iptables -t nat -A POSTROUTING -p tcp -m tcp --dport ${port} -j SNAT --to-source ${NSA_LO_… 4234 …run_cmd iptables -t nat -D POSTROUTING -p tcp -m tcp --dport ${port} -j SNAT --to-source ${NSA_LO_…
|
| A D | fib_tests.sh | 2288 iptables -t mangle -L OUTPUT &> /dev/null 2340 $NS_EXEC iptables -t mangle -A OUTPUT -j MARK --set-mark 1 2347 $NS_EXEC iptables -t mangle -D OUTPUT -j MARK --set-mark 1
|
| /tools/testing/selftests/wireguard/ |
| A D | netns.sh | 199 n0 iptables -A INPUT -m length --length 1360 -j DROP 205 n0 iptables -F INPUT 338 n0 iptables -t nat -A POSTROUTING -s 192.168.1.0/24 -d 10.0.0.0/24 -j SNAT --to 10.0.0.1 352 n1 iptables -t mangle -I OUTPUT -j MARK --set-xmark 1 355 n1 iptables -t mangle -D OUTPUT -j MARK --set-xmark 1 389 n2 iptables -t nat -A POSTROUTING -s 10.0.0.0/24 -d 192.168.241.0/24 -j SNAT --to 192.168.241.2 390 n0 iptables -t filter -A INPUT \! -s 10.0.0.0/24 -i vethrs -j DROP # Manual rpfilter just to be exp… 396 n0 iptables -t nat -F 397 n0 iptables -t filter -F 398 n2 iptables -t nat -F
|
| /tools/testing/selftests/wireguard/qemu/ |
| A D | Makefile | 43 $(eval $(call tar_download,IPTABLES,iptables,1.8.7,.tar.bz2,https://www.netfilter.org/projects/ipta… 341 …)/bash $(IPROUTE2_PATH)/misc/ss $(IPROUTE2_PATH)/ip/ip $(IPTABLES_PATH)/iptables/xtables-legacy-mu… 431 $(IPTABLES_PATH)/iptables/xtables-legacy-multi: | $(IPTABLES_PATH)/.installed $(USERSPACE_DEPS)
|
Completed in 34 milliseconds