Searched refs:ctstate (Results 1 – 10 of 10) sorted by relevance
17 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`18 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`50 +0 `$xtables -D INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`51 +0 `$xtables -D OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
15 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`16 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
6 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`7 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
17 +0 `iptables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`18 +0 `iptables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
33 $xtables -A INPUT -m conntrack --ctstate NEW -p tcp --syn
7 +0 `$xtables -A INPUT -m conntrack --ctstate INVALID -j DROP`118 +0 `$xtables -D INPUT -m conntrack --ctstate INVALID -j DROP`
8 +0 `iptables -A INPUT -m conntrack --ctstate INVALID -p tcp --tcp-flags SYN,ACK SYN,ACK`
1453 u32 ctstate = 0, ctstate_mask = 0; in mlx5_tc_ct_add_no_trk_match() local1456 &ctstate, &ctstate_mask); in mlx5_tc_ct_add_no_trk_match()1463 ctstate, ctstate_mask); in mlx5_tc_ct_add_no_trk_match()1486 u32 ctstate = 0, ctstate_mask = 0; in mlx5_tc_ct_match_add() local1535 ctstate |= trk ? MLX5_CT_STATE_TRK_BIT : 0; in mlx5_tc_ct_match_add()1536 ctstate |= new ? MLX5_CT_STATE_NEW_BIT : 0; in mlx5_tc_ct_match_add()1563 ctstate, ctstate_mask); in mlx5_tc_ct_match_add()1616 u32 ctstate; in tc_ct_pre_ct_add_rules() local1652 ctstate = MLX5_CT_STATE_TRK_BIT; in tc_ct_pre_ct_add_rules()1654 ctstate |= MLX5_CT_STATE_NAT_BIT; in tc_ct_pre_ct_add_rules()[all …]
53 ip netns exec "${NETNS}" ip6tables -A INPUT -m conntrack --ctstate INVALID -j ACCEPT
190 ip netns exec "$r_a" iptables -A FORWARD -m conntrack --ctstate NEW