Home
last modified time | relevance | path

Searched full:ns2 (Results 1 – 25 of 181) sorted by relevance

12345678

/kernel/linux/linux-6.6/tools/testing/selftests/net/mptcp/
Dmptcp_join.sh26 ns2=""
91 ns2="ns2-$rndh"
94 for netns in "$ns1" "$ns2"; do
109 # ns1 ns2
117 ip link add ns1eth$i netns "$ns1" type veth peer name ns2eth$i netns "$ns2"
122 ip -net "$ns2" addr add 10.0.$i.2/24 dev ns2eth$i
123 ip -net "$ns2" addr add dead:beef:$i::2/64 dev ns2eth$i nodad
124 ip -net "$ns2" link set ns2eth$i up
126 # let $ns2 reach any $ns1 address from any interface
127 ip -net "$ns2" route add default via 10.0.$i.1 dev ns2eth$i metric 10$i
[all …]
Duserspace_pm.sh60 ns2="ns2-$rndh"
126 for netns in "$ns1" "$ns2" ;do
138 for i in "$ns1" "$ns2" ;do
145 # "$ns1" ns2
148 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth1 netns "$ns2"
157 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
158 ip -net "$ns2" addr add 10.0.2.2/24 dev ns2eth1
159 ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad
160 ip -net "$ns2" addr add dead:beef:2::2/64 dev ns2eth1 nodad
161 ip -net "$ns2" link set ns2eth1 up
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/net/mptcp/
Dmptcp_join.sh25 ns2="ns2-$rndh"
27 for netns in "$ns1" "$ns2";do
35 # ns1 ns2
42 ip link add ns1eth$i netns "$ns1" type veth peer name ns2eth$i netns "$ns2"
47 ip -net "$ns2" addr add 10.0.$i.2/24 dev ns2eth$i
48 ip -net "$ns2" addr add dead:beef:$i::2/64 dev ns2eth$i nodad
49 ip -net "$ns2" link set ns2eth$i up
51 # let $ns2 reach any $ns1 address from any interface
52 ip -net "$ns2" route add default via 10.0.$i.1 dev ns2eth$i metric 10$i
60 for netns in "$ns1" "$ns2"; do
[all …]
/kernel/linux/linux-6.6/tools/testing/selftests/netfilter/
Drpath.sh37 ns2="ns2-$sfx"
38 trap "ip netns del $ns1; ip netns del $ns2" EXIT
40 # create two netns, disable rp_filter in ns2 and
43 ip netns add "$ns2"
44 ip netns exec "$ns2" sysctl -q net.ipv4.conf.all.rp_filter=0
45 ip netns exec "$ns2" sysctl -q net.ipv4.conf.default.rp_filter=0
46 ip netns exec "$ns2" sysctl -q net.ipv6.conf.all.keep_addr_on_down=1
49 ip -net "$ns1" link add v0 type veth peer name v0 netns "$ns2"
50 ip -net "$ns1" link set v0 up; ip -net "$ns2" link set v0 up
52 ip -net "$ns2" a a 192.168.23.1/24 dev v0
[all …]
Dconntrack_tcp_unreplied.sh14 ns2="ns2-$sfx"
30 ip netns pids $ns2 | xargs kill 2>/dev/null
33 ip netns del $ns2
47 cnt=$(ip netns exec $ns2 nft list counter inet filter "$name" | grep -q "$expect")
49 echo "ERROR: counter $name in $ns2 has unexpected value (expected $expect)" 1>&2
50 ip netns exec $ns2 nft list counter inet filter "$name" 1>&2
62 ip netns add $ns2 || exit 1
66 ip -net $ns1 link set netns $ns2 dev veth2
69 ip -net $ns2 link set up dev lo
71 ip -net $ns2 link set up dev veth2
[all …]
Dnft_nat.sh14 ns2="ns2-$sfx"
47 ip netns add "$ns2"
49 echo "SKIP: Could not create net namespace $ns2"
58 ip link add veth1 netns "$ns0" type veth peer name eth0 netns "$ns2"
216 cnt=$(ip netns exec "$ns0" nft list counter inet filter ns2${dir} | grep -q "$expect")
218 bad_counter "$ns0" ns2$dir "$expect" "test_local_dnat6 2"
233 # expect 1 packet in ns2
236 cnt=$(ip netns exec "$ns2" nft list counter inet filter ns0${dir} | grep -q "$expect")
238 bad_counter "$ns2" ns0$dir "$expect" "test_local_dnat6 4"
243 test $lret -eq 0 && echo "PASS: ipv6 ping to $ns1 was $family NATted to $ns2"
[all …]
Dnft_conntrack_helper.sh13 ns2="ns2-$sfx"
19 ip netns del ${ns2}
49 ip netns add ${ns2}
51 ip link add veth0 netns ${ns1} type veth peer name veth0 netns ${ns2} > /dev/null 2>&1
60 ip -net ${ns2} link set lo up
61 ip -net ${ns2} link set veth0 up
66 ip -net ${ns2} addr add 10.0.1.2/24 dev veth0
67 ip -net ${ns2} addr add dead:1::2/64 dev veth0
134 sleep 3 | ip netns exec ${ns2} nc -w 2 -l -p $port > /dev/null &
140 check_for_helper "$ns2" "ip $msg" $port $autoassign
[all …]
Dnft_flowtable.sh19 ns2="ns2-$sfx"
46 ip netns add $ns2
51 ip netns del $ns2
67 ip link add veth1 netns $nsr2 type veth peer name eth0 netns $ns2
81 # to ns2 (smaller MTU) to stack either to perform fragmentation (ip_no_pmtu_disc=1),
83 # ns2 is going via nsr2 with a smaller mtu, so that TCPMSS announced by both peers
120 ip -net $ns2 link set eth0 mtu $rmtu
135 for ns in $ns1 $ns2;do
148 ip -net $ns2 addr add 10.0.2.99/24 dev eth0
150 ip -net $ns2 route add default via 10.0.2.1
[all …]
Dipvs.sh20 # | ns2 |
71 ip netns add ns2
74 ip link add veth02 netns ns0 type veth peer name veth20 netns ns2
75 ip link add veth12 netns ns1 type veth peer name veth21 netns ns2
91 ip netns exec ns2 ip link set lo up
92 ip netns exec ns2 ip link set veth21 up
93 ip netns exec ns2 ip addr add ${rip_v4}/24 dev veth21
94 ip netns exec ns2 ip link set veth20 up
95 ip netns exec ns2 ip addr add ${sip_v4}/24 dev veth20
117 ip netns exec ns2 nc -l -p 8080 > "${outfile}" &
[all …]
Dnf_nat_edemux.sh13 ns2="ns2-$sfx"
18 ip netns del $ns2
47 ip netns add $ns2
52 ip link set netns $ns2 dev veth2
58 ip netns exec $ns2 ip link set up dev lo
59 ip netns exec $ns2 ip link set up dev veth2
60 ip netns exec $ns2 ip addr add 192.168.1.2/24 dev veth2
68 ip netns exec $ns2 sysctl -q net.ipv4.ip_local_port_range="10000 10000"
71 ip netns exec $ns2 iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-destin…
74 ip netns exec $ns2 ip route add 10.96.0.1 via 192.168.1.1
[all …]
Dnft_synproxy.sh12 ns2="ns2-$rnd" # iperf server
29 ip netns add $ns2
33 ip netns pids $ns2 | xargs kill 2>/dev/null
35 ip netns del $ns2
43 ip link add veth1 netns $nsr type veth peer name eth0 netns $ns2
56 for n in $ns1 $ns2; do
61 ip -net $ns2 addr add 10.0.2.99/24 dev eth0
63 ip -net $ns2 route add default via 10.0.2.1
67 echo "ERROR: $ns1 cannot reach $ns2" 1>&2
71 if ! ip netns exec $ns2 ping -c 1 -q 10.0.1.99 > /dev/null; then
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/netfilter/
Dnft_nat.sh14 ns2="ns2-$sfx"
47 ip netns add "$ns2"
49 echo "SKIP: Could not create net namespace $ns2"
58 ip link add veth1 netns "$ns0" type veth peer name eth0 netns "$ns2"
216 cnt=$(ip netns exec "$ns0" nft list counter inet filter ns2${dir} | grep -q "$expect")
218 bad_counter "$ns0" ns2$dir "$expect" "test_local_dnat6 2"
233 # expect 1 packet in ns2
236 cnt=$(ip netns exec "$ns2" nft list counter inet filter ns0${dir} | grep -q "$expect")
238 bad_counter "$ns2" ns0$dir "$expect" "test_local_dnat6 4"
243 test $lret -eq 0 && echo "PASS: ipv6 ping to $ns1 was $family NATted to $ns2"
[all …]
Dnft_conntrack_helper.sh13 ns2="ns2-$sfx"
19 ip netns del ${ns2}
49 ip netns add ${ns2}
51 ip link add veth0 netns ${ns1} type veth peer name veth0 netns ${ns2} > /dev/null 2>&1
60 ip -net ${ns2} link set lo up
61 ip -net ${ns2} link set veth0 up
66 ip -net ${ns2} addr add 10.0.1.2/24 dev veth0
67 ip -net ${ns2} addr add dead:1::2/64 dev veth0
118 sleep 3 | ip netns exec ${ns2} nc -w 2 -l -p $port > /dev/null &
124 check_for_helper "$ns2" "ip $msg" $port
[all …]
Dipvs.sh20 # | ns2 |
71 ip netns add ns2
74 ip link add veth02 netns ns0 type veth peer name veth20 netns ns2
75 ip link add veth12 netns ns1 type veth peer name veth21 netns ns2
91 ip netns exec ns2 ip link set lo up
92 ip netns exec ns2 ip link set veth21 up
93 ip netns exec ns2 ip addr add ${rip_v4}/24 dev veth21
94 ip netns exec ns2 ip link set veth20 up
95 ip netns exec ns2 ip addr add ${sip_v4}/24 dev veth20
117 ip netns exec ns2 nc -l -p 8080 > "${outfile}" &
[all …]
Dnft_flowtable.sh42 ip netns add ns2
65 ip link add veth1 netns nsr2 type veth peer name eth0 netns ns2
80 # to ns2 (smaller MTU) to stack either to perform fragmentation (ip_no_pmtu_disc=1),
82 # ns2 is going via nsr2 with a smaller mtu, so that TCPMSS announced by both peers
119 ip -net ns2 link set eth0 mtu $rmtu
201 echo "ERROR: ns1 cannot reach ns2" 1>&2
205 if ! ip netns exec ns2 ping -c 1 -q 10.0.1.99 > /dev/null; then
206 echo "ERROR: ns2 cannot reach ns1" 1>&2
211 echo "PASS: netns routing/connectivity: ns1 can reach ns2"
277 if ! check_transfer "$ns1in" "$ns2out" "ns1 -> ns2"; then
[all …]
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/
Dtest_lwt_ip_encap.sh6 # NS1 NS2 NS3
21 # NS1/NS2 are configured to route packets to IPv*_GRE via IP*_8
26 # 1. routes NS2->IPv*_DST are brought down, so the only way a ping
49 readonly NS2="ns2-$(mktemp -u XXXXXX)"
113 ip netns add "${NS2}"
118 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.all.rp_filter=0
121 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.default.rp_filter=0
126 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.all.accept_dad=0
129 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.default.accept_dad=0
137 ip netns exec ${NS2} sysctl -wq net.ipv4.ip_forward=1
[all …]
Dtest_xdp_meta.sh7 readonly NS2="ns2-$(mktemp -u XXXXXX)"
20 ip netns del ${NS2} 2> /dev/null
31 ip netns add ${NS2}
38 ip link set veth2 netns ${NS2}
41 ip netns exec ${NS2} ip addr add 10.1.1.22/24 dev veth2
44 ip netns exec ${NS2} tc qdisc add dev veth2 clsact
47 ip netns exec ${NS2} tc filter add dev veth2 ingress bpf da obj ${BPF_FILE} sec t
50 ip netns exec ${NS2} ip link set dev veth2 xdp obj ${BPF_FILE} sec x
53 ip netns exec ${NS2} ip link set dev veth2 up
56 ip netns exec ${NS2} ping -c 1 10.1.1.11
Dtest_xdp_vlan.sh8 readonly NS2="ns2-$(mktemp -u XXXXXX)"
55 echo " ip netns exec ${NS2} bash"
62 ip netns del ${NS2} 2> /dev/null
132 ip netns del ${NS2} 2> /dev/null
150 ip netns add ${NS2}
160 ip link set veth2 netns ${NS2}
168 ip netns exec ${NS2} ethtool -K veth2 rxvlan off
170 # Disable tx-vlan-offload (mostly needed on ns2)
171 ip netns exec ${NS2} ethtool -K veth2 txvlan off
181 # In ns2/veth2 create VLAN device
[all …]
Dtest_tc_tunnel.sh12 readonly ns2="${ns_prefix}2"
30 ip netns add "${ns2}"
33 peer name veth2 mtu 1500 netns "${ns2}"
38 ip -netns "${ns2}" link set veth2 up
41 ip -netns "${ns2}" -4 addr add "${ns2_v4}/24" dev veth2
43 ip -netns "${ns2}" -6 addr add "${ns2_v6}/64" dev veth2 nodad
57 ip netns del "${ns2}"
73 ip netns exec "${ns2}" nc "${netcat_opt}" -l "${port}" > "${outfile}" &
223 ip netns exec "${ns2}" ip fou add port $dport ipproto ${dproto}
253 ip netns exec "${ns2}" ip link add name testtun0 type "${ttype}" \
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/
Dtest_lwt_ip_encap.sh6 # NS1 NS2 NS3
21 # NS1/NS2 are configured to route packets to IPv*_GRE via IP*_8
26 # 1. routes NS2->IPv*_DST are brought down, so the only way a ping
48 readonly NS2="ns2-$(mktemp -u XXXXXX)"
112 ip netns add "${NS2}"
117 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.all.rp_filter=0
120 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.default.rp_filter=0
125 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.all.accept_dad=0
128 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.default.accept_dad=0
136 ip netns exec ${NS2} sysctl -wq net.ipv4.ip_forward=1
[all …]
Dtest_tc_tunnel.sh11 readonly ns2="${ns_prefix}2"
29 ip netns add "${ns2}"
32 peer name veth2 mtu 1500 netns "${ns2}"
37 ip -netns "${ns2}" link set veth2 up
40 ip -netns "${ns2}" -4 addr add "${ns2_v4}/24" dev veth2
42 ip -netns "${ns2}" -6 addr add "${ns2_v6}/64" dev veth2 nodad
56 ip netns del "${ns2}"
72 ip netns exec "${ns2}" nc "${netcat_opt}" -l -p "${port}" > "${outfile}" &
213 ip netns exec "${ns2}" ip fou add port $dport ipproto ${dproto}
234 ip netns exec "${ns2}" ip link add name testtun0 type "${ttype}" \
[all …]
/kernel/linux/linux-6.6/tools/testing/selftests/net/hsr/
Dhsr_ping.sh33 ns2="ns2-$rndh"
39 for netns in "$ns1" "$ns2" "$ns3" ;do
117 do_ping "$ns2" 100.64.0.1
122 do_ping "$ns2" 100.64.0.3
127 do_ping "$ns2" dead:beef:1::1
128 do_ping "$ns2" dead:beef:1::2
160 do_ping_long "$ns2" 100.64.0.1
161 do_ping_long "$ns2" dead:beef:1::1
162 do_ping_long "$ns2" 100.64.0.3
163 do_ping_long "$ns2" dead:beef:1::2
[all …]
/kernel/linux/linux-6.6/samples/bpf/
Dtc_l2_redirect.sh18 $IP netns add ns2
26 $IP link set dev vens2 netns ns2
35 $IP -n ns2 link set dev lo up
36 $IP -n ns2 link set dev vens2 up
37 $IP -n ns2 addr add 10.2.1.102/24 dev vens2
38 $IP -n ns2 addr add 2401:db02::66/64 dev vens2 nodad
39 $IP -n ns2 addr add 10.10.1.102 dev lo
40 $IP -n ns2 addr add 2401:face::66/64 dev lo nodad
41 $IP -n ns2 link add ipt2 type ipip local 10.2.1.102 remote 10.2.1.1
42 $IP -n ns2 link add ip6t2 type ip6tnl mode any local 2401:db02::66 remote 2401:db02::1
[all …]
/kernel/linux/linux-5.10/samples/bpf/
Dtc_l2_redirect.sh17 $IP netns add ns2
25 $IP link set dev vens2 netns ns2
34 $IP -n ns2 link set dev lo up
35 $IP -n ns2 link set dev vens2 up
36 $IP -n ns2 addr add 10.2.1.102/24 dev vens2
37 $IP -n ns2 addr add 2401:db02::66/64 dev vens2 nodad
38 $IP -n ns2 addr add 10.10.1.102 dev lo
39 $IP -n ns2 addr add 2401:face::66/64 dev lo nodad
40 $IP -n ns2 link add ipt2 type ipip local 10.2.1.102 remote 10.2.1.1
41 $IP -n ns2 link add ip6t2 type ip6tnl mode any local 2401:db02::66 remote 2401:db02::1
[all …]
/kernel/linux/linux-6.6/tools/testing/selftests/net/
Dtest_vxlan_mdb.sh259 local ns2=$1; shift
264 ip netns add $ns2
268 ip link set dev veth1 netns $ns2 name veth0
271 setup_common_ns $ns2 $local_addr2
981 local ns2=$1; shift
995 run_cmd "tc -n $ns2 qdisc replace dev veth0 clsact"
996 run_cmd "tc -n $ns2 qdisc replace dev vx0 clsact"
997 run_cmd "ip -n $ns2 address replace $vtep1_ip/$plen dev lo"
998 run_cmd "ip -n $ns2 address replace $vtep2_ip/$plen dev lo"
1004 …run_cmd "tc -n $ns2 filter replace dev vx0 ingress pref 1 handle 101 proto all flower enc_dst_ip $…
[all …]

12345678