Home
last modified time | relevance | path

Searched full:ns2 (Results 1 – 25 of 97) sorted by relevance

1234

/Linux-v6.1/tools/testing/selftests/net/mptcp/
Dmptcp_join.sh19 ns2=""
66 ns2="ns2-$rndh"
69 for netns in "$ns1" "$ns2"; do
85 # ns1 ns2
93 ip link add ns1eth$i netns "$ns1" type veth peer name ns2eth$i netns "$ns2"
98 ip -net "$ns2" addr add 10.0.$i.2/24 dev ns2eth$i
99 ip -net "$ns2" addr add dead:beef:$i::2/64 dev ns2eth$i nodad
100 ip -net "$ns2" link set ns2eth$i up
102 # let $ns2 reach any $ns1 address from any interface
103 ip -net "$ns2" route add default via 10.0.$i.1 dev ns2eth$i metric 10$i
[all …]
Duserspace_pm.sh38 ns2="ns2-$rndh"
69 for netns in "$ns1" "$ns2" ;do
77 for i in "$ns1" "$ns2" ;do
84 # "$ns1" ns2
87 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth1 netns "$ns2"
96 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
97 ip -net "$ns2" addr add 10.0.2.2/24 dev ns2eth1
98 ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad
99 ip -net "$ns2" addr add dead:beef:2::2/64 dev ns2eth1 nodad
100 ip -net "$ns2" link set ns2eth1 up
[all …]
Dsimult_flows.sh6 ns2="ns2-$rndh"
31 for netns in "$ns1" "$ns2" "$ns3";do
42 # "$ns1" ns2 ns3
62 for i in "$ns1" "$ns2" "$ns3";do
69 ip link add ns1eth1 netns "$ns1" type veth peer name ns2eth1 netns "$ns2"
70 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth2 netns "$ns2"
71 ip link add ns2eth3 netns "$ns2" type veth peer name ns3eth1 netns "$ns3"
88 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
89 ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad
90 ip -net "$ns2" link set ns2eth1 up mtu 1500
[all …]
Dmptcp_sockopt.sh37 ns2="ns2-$rndh"
40 for netns in "$ns1" "$ns2" "$ns_sbox";do
49 ip link add ns1eth$i netns "$ns1" type veth peer name ns2eth$i netns "$ns2"
54 ip -net "$ns2" addr add 10.0.$i.2/24 dev ns2eth$i
55 ip -net "$ns2" addr add dead:beef:$i::2/64 dev ns2eth$i nodad
56 ip -net "$ns2" link set ns2eth$i up
58 # let $ns2 reach any $ns1 address from any interface
59 ip -net "$ns2" route add default via 10.0.$i.1 dev ns2eth$i metric 10$i
64 ip netns exec $ns2 ./pm_nl_ctl add 10.0.$i.2 flags signal
65 ip netns exec $ns2 ./pm_nl_ctl add dead:beef:$i::2 flags signal
[all …]
Dmptcp_connect.sh124 ns2="ns2-$rndh"
138 for netns in "$ns1" "$ns2" "$ns3" "$ns4";do
159 for i in "$ns1" "$ns2" "$ns3" "$ns4";do
164 # "$ns1" ns2 ns3 ns4
169 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth1 netns "$ns2"
170 ip link add ns2eth3 netns "$ns2" type veth peer name ns3eth2 netns "$ns3"
180 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
181 ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad
182 ip -net "$ns2" link set ns2eth1 up
184 ip -net "$ns2" addr add 10.0.2.1/24 dev ns2eth3
[all …]
/Linux-v6.1/tools/testing/selftests/netfilter/
Drpath.sh37 ns2="ns2-$sfx"
38 trap "ip netns del $ns1; ip netns del $ns2" EXIT
40 # create two netns, disable rp_filter in ns2 and
43 ip netns add "$ns2"
44 ip netns exec "$ns2" sysctl -q net.ipv4.conf.all.rp_filter=0
45 ip netns exec "$ns2" sysctl -q net.ipv4.conf.default.rp_filter=0
46 ip netns exec "$ns2" sysctl -q net.ipv6.conf.all.keep_addr_on_down=1
49 ip -net "$ns1" link add v0 type veth peer name v0 netns "$ns2"
50 ip -net "$ns1" link set v0 up; ip -net "$ns2" link set v0 up
52 ip -net "$ns2" a a 192.168.23.1/24 dev v0
[all …]
Dnft_nat.sh14 ns2="ns2-$sfx"
47 ip netns add "$ns2"
49 echo "SKIP: Could not create net namespace $ns2"
58 ip link add veth1 netns "$ns0" type veth peer name eth0 netns "$ns2"
216 cnt=$(ip netns exec "$ns0" nft list counter inet filter ns2${dir} | grep -q "$expect")
218 bad_counter "$ns0" ns2$dir "$expect" "test_local_dnat6 2"
233 # expect 1 packet in ns2
236 cnt=$(ip netns exec "$ns2" nft list counter inet filter ns0${dir} | grep -q "$expect")
238 bad_counter "$ns2" ns0$dir "$expect" "test_local_dnat6 4"
243 test $lret -eq 0 && echo "PASS: ipv6 ping to $ns1 was $family NATted to $ns2"
[all …]
Dconntrack_tcp_unreplied.sh14 ns2="ns2-$sfx"
30 ip netns pids $ns2 | xargs kill 2>/dev/null
33 ip netns del $ns2
47 cnt=$(ip netns exec $ns2 nft list counter inet filter "$name" | grep -q "$expect")
49 echo "ERROR: counter $name in $ns2 has unexpected value (expected $expect)" 1>&2
50 ip netns exec $ns2 nft list counter inet filter "$name" 1>&2
62 ip netns add $ns2 || exit 1
66 ip -net $ns1 link set netns $ns2 dev veth2
69 ip -net $ns2 link set up dev lo
71 ip -net $ns2 link set up dev veth2
[all …]
Dnft_flowtable.sh19 ns2="ns2-$sfx"
46 ip netns add $ns2
51 ip netns del $ns2
67 ip link add veth1 netns $nsr2 type veth peer name eth0 netns $ns2
81 # to ns2 (smaller MTU) to stack either to perform fragmentation (ip_no_pmtu_disc=1),
83 # ns2 is going via nsr2 with a smaller mtu, so that TCPMSS announced by both peers
120 ip -net $ns2 link set eth0 mtu $rmtu
135 for ns in $ns1 $ns2;do
148 ip -net $ns2 addr add 10.0.2.99/24 dev eth0
150 ip -net $ns2 route add default via 10.0.2.1
[all …]
Dnft_conntrack_helper.sh13 ns2="ns2-$sfx"
19 ip netns del ${ns2}
49 ip netns add ${ns2}
51 ip link add veth0 netns ${ns1} type veth peer name veth0 netns ${ns2} > /dev/null 2>&1
60 ip -net ${ns2} link set lo up
61 ip -net ${ns2} link set veth0 up
66 ip -net ${ns2} addr add 10.0.1.2/24 dev veth0
67 ip -net ${ns2} addr add dead:1::2/64 dev veth0
134 sleep 3 | ip netns exec ${ns2} nc -w 2 -l -p $port > /dev/null &
140 check_for_helper "$ns2" "ip $msg" $port $autoassign
[all …]
Dipvs.sh20 # | ns2 |
71 ip netns add ns2
74 ip link add veth02 netns ns0 type veth peer name veth20 netns ns2
75 ip link add veth12 netns ns1 type veth peer name veth21 netns ns2
91 ip netns exec ns2 ip link set lo up
92 ip netns exec ns2 ip link set veth21 up
93 ip netns exec ns2 ip addr add ${rip_v4}/24 dev veth21
94 ip netns exec ns2 ip link set veth20 up
95 ip netns exec ns2 ip addr add ${sip_v4}/24 dev veth20
117 ip netns exec ns2 nc -l -p 8080 > "${outfile}" &
[all …]
Dnf_nat_edemux.sh13 ns2="ns2-$sfx"
18 ip netns del $ns2
47 ip netns add $ns2
52 ip link set netns $ns2 dev veth2
58 ip netns exec $ns2 ip link set up dev lo
59 ip netns exec $ns2 ip link set up dev veth2
60 ip netns exec $ns2 ip addr add 192.168.1.2/24 dev veth2
68 ip netns exec $ns2 sysctl -q net.ipv4.ip_local_port_range="10000 10000"
71 ip netns exec $ns2 iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-destin…
74 ip netns exec $ns2 ip route add 10.96.0.1 via 192.168.1.1
[all …]
Dnft_synproxy.sh12 ns2="ns2-$rnd" # iperf server
29 ip netns add $ns2
33 ip netns pids $ns2 | xargs kill 2>/dev/null
35 ip netns del $ns2
43 ip link add veth1 netns $nsr type veth peer name eth0 netns $ns2
56 for n in $ns1 $ns2; do
61 ip -net $ns2 addr add 10.0.2.99/24 dev eth0
63 ip -net $ns2 route add default via 10.0.2.1
67 echo "ERROR: $ns1 cannot reach $ns2" 1>&2
71 if ! ip netns exec $ns2 ping -c 1 -q 10.0.1.99 > /dev/null; then
[all …]
Dbridge_brouter.sh8 # setup is: ns1 <-> ns0 <-> ns2
28 ip netns add ns2
35 ip link add veth1 netns ns0 type veth peer name eth0 netns ns2
52 # place both in same subnet, ns1 and ns2 connected via ns0:br0
80 # an ip address in same network segment as ns1 and ns2 (ns0
93 echo "PASS: ns1/ns2 connectivity with active broute rule"
115 ip netns exec ns2 ping -q -c 1 10.0.0.11 > /dev/null
121 echo "PASS: ns1/ns2 connectivity with active broute rule and bridge forward drop"
128 echo "ERROR: Could not reach ns2 from ns1" 1>&2
132 ip netns exec ns2 ping -c 1 -q 10.0.0.11 > /dev/null
[all …]
/Linux-v6.1/tools/testing/selftests/bpf/
Dtest_lwt_ip_encap.sh6 # NS1 NS2 NS3
21 # NS1/NS2 are configured to route packets to IPv*_GRE via IP*_8
26 # 1. routes NS2->IPv*_DST are brought down, so the only way a ping
48 readonly NS2="ns2-$(mktemp -u XXXXXX)"
112 ip netns add "${NS2}"
117 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.all.rp_filter=0
120 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.default.rp_filter=0
125 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.all.accept_dad=0
128 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.default.accept_dad=0
136 ip netns exec ${NS2} sysctl -wq net.ipv4.ip_forward=1
[all …]
Dtest_xdp_meta.sh6 readonly NS2="ns2-$(mktemp -u XXXXXX)"
19 ip netns del ${NS2} 2> /dev/null
30 ip netns add ${NS2}
37 ip link set veth2 netns ${NS2}
40 ip netns exec ${NS2} ip addr add 10.1.1.22/24 dev veth2
43 ip netns exec ${NS2} tc qdisc add dev veth2 clsact
46 ip netns exec ${NS2} tc filter add dev veth2 ingress bpf da obj test_xdp_meta.o sec t
49 ip netns exec ${NS2} ip link set dev veth2 xdp obj test_xdp_meta.o sec x
52 ip netns exec ${NS2} ip link set dev veth2 up
55 ip netns exec ${NS2} ping -c 1 10.1.1.11
Dtest_xdp_vlan.sh8 readonly NS2="ns2-$(mktemp -u XXXXXX)"
55 echo " ip netns exec ${NS2} bash"
62 ip netns del ${NS2} 2> /dev/null
132 ip netns del ${NS2} 2> /dev/null
150 ip netns add ${NS2}
160 ip link set veth2 netns ${NS2}
168 ip netns exec ${NS2} ethtool -K veth2 rxvlan off
170 # Disable tx-vlan-offload (mostly needed on ns2)
171 ip netns exec ${NS2} ethtool -K veth2 txvlan off
181 # In ns2/veth2 create VLAN device
[all …]
Dtest_tc_tunnel.sh11 readonly ns2="${ns_prefix}2"
29 ip netns add "${ns2}"
32 peer name veth2 mtu 1500 netns "${ns2}"
37 ip -netns "${ns2}" link set veth2 up
40 ip -netns "${ns2}" -4 addr add "${ns2_v4}/24" dev veth2
42 ip -netns "${ns2}" -6 addr add "${ns2_v6}/64" dev veth2 nodad
56 ip netns del "${ns2}"
72 ip netns exec "${ns2}" nc "${netcat_opt}" -l "${port}" > "${outfile}" &
219 ip netns exec "${ns2}" ip fou add port $dport ipproto ${dproto}
243 ip netns exec "${ns2}" ip link add name testtun0 type "${ttype}" \
[all …]
Dtest_xdp_redirect.sh5 # NS1(veth11) NS2(veth22)
14 readonly NS2="ns2-$(mktemp -u XXXXXX)"
23 ip netns add ${NS2}
26 ip link add veth2 index 222 type veth peer name veth22 netns ${NS2}
31 ip -n ${NS2} link set dev veth22 up
34 ip -n ${NS2} addr add 10.1.1.22/24 dev veth22
42 ip netns del ${NS2} 2> /dev/null
58 ip -n ${NS2} link set veth22 $xdpmode obj xdp_dummy.bpf.o sec xdp &> /dev/null
63 ip netns exec ${NS2} ping -c 1 10.1.1.11 &> /dev/null; then
Dtest_lwt_seg6local.sh4 # NS1 ---- NS2 ---- NS3 ---- NS4 ---- NS5 ---- NS6
8 # All IPv6 packets going to fb00::/16 through NS2 will be encapsulated in a
27 readonly NS2="ns2-$(mktemp -u XXXXXX)"
51 ip netns del ${NS2} 2> /dev/null
62 ip netns add ${NS2}
77 ip link set veth2 netns ${NS2}
78 ip link set veth3 netns ${NS2}
88 ip netns exec ${NS2} ip link set dev veth2 up
89 ip netns exec ${NS2} ip link set dev veth3 up
102 ip netns exec ${NS2} ip -6 addr add fb00::21/16 dev veth2 scope link
[all …]
/Linux-v6.1/samples/bpf/
Dtc_l2_redirect.sh17 $IP netns add ns2
25 $IP link set dev vens2 netns ns2
34 $IP -n ns2 link set dev lo up
35 $IP -n ns2 link set dev vens2 up
36 $IP -n ns2 addr add 10.2.1.102/24 dev vens2
37 $IP -n ns2 addr add 2401:db02::66/64 dev vens2 nodad
38 $IP -n ns2 addr add 10.10.1.102 dev lo
39 $IP -n ns2 addr add 2401:face::66/64 dev lo nodad
40 $IP -n ns2 link add ipt2 type ipip local 10.2.1.102 remote 10.2.1.1
41 $IP -n ns2 link add ip6t2 type ip6tnl mode any local 2401:db02::66 remote 2401:db02::1
[all …]
/Linux-v6.1/tools/testing/selftests/net/
Dicmp.sh7 # | ns1 | v4-via-v6 routes: | ns2 |
17 # unreachable" message being sent from ns2, but there is no IPv4 address set in
22 NS2=ns2
36 ip netns del $NS2
43 ip netns add $NS2
46 ip -netns $NS1 link add veth0 type veth peer name veth0 netns $NS2
48 ip -netns $NS2 link set dev veth0 up
51 ip -netns $NS2 addr add $H2_IP6/64 dev veth0 nodad
53 ip -netns $NS2 route add $RT2 via inet6 $H1_IP6
55 # Make sure ns2 will respond with ICMP unreachable
[all …]
Dbareudp.sh24 # * NS1 and NS2 are the intermediate namespaces. They use a bareudp device to
70 # | | NS2 |
115 readonly NS2=$(mktemp -u ns2-XXXXXXXX)
137 # Create the four network namespaces used by the script (NS0, NS1, NS2 and NS3)
145 ip netns add "${NS2}" || exit_cleanup "${NS0}" "${NS1}"
146 ip netns add "${NS3}" || exit_cleanup "${NS0}" "${NS1}" "${NS2}"
153 exit_cleanup "${NS0}" "${NS1}" "${NS2}" "${NS3}"
185 # NS1 with NS2, etc.),
191 for ns in "${NS0}" "${NS1}" "${NS2}" "${NS3}"; do
196 ip link add name veth12 netns "${NS1}" type veth peer name veth21 netns "${NS2}"
[all …]
Dso_txtime.sh14 readonly NS2="${NSPREFIX}2"
22 ip netns del "${NS2}"
30 ip netns add "${NS2}"
33 peer name "${DEV}" netns "${NS2}"
37 ip -netns "${NS2}" link set "${DEV}" up
41 ip -netns "${NS2}" link set dev "${DEV}" address 06:06:06:06:06:06
45 ip -netns "${NS2}" addr add 192.168.1.2/24 dev "${DEV}"
47 ip -netns "${NS2}" addr add fd::2/64 dev "${DEV}" nodad
67 …ip netns exec "${NS2}" "${BIN}" -"${IP}" -c "${CLOCK}" -t "${START}" -S "${SADDR}" -D "${DADDR}" "…
Dmsg_zerocopy.sh15 readonly NS2="${NSPREFIX}2"
76 ip netns del "${NS2}"
88 ip netns add "${NS2}"
91 peer name "${DEV}" mtu "${DEV_MTU}" netns "${NS2}"
95 ip -netns "${NS2}" link set "${DEV}" up
99 ip -netns "${NS2}" link set dev "${DEV}" address 06:06:06:06:06:06
103 ip -netns "${NS2}" addr add 192.168.1.2/24 dev "${DEV}"
105 ip -netns "${NS2}" addr add fd::2/64 dev "${DEV}" nodad
114 …ip netns exec "${NS2}" "${BIN}" "-${IP}" -i "${DEV}" -t 2 -C 2 -S "${SADDR}" -D "${DADDR}" ${ARGS}…

1234