Searched full:ns2 (Results 1 – 25 of 97) sorted by relevance
1234
/Linux-v6.1/tools/testing/selftests/net/mptcp/ |
D | mptcp_join.sh | 19 ns2="" 66 ns2="ns2-$rndh" 69 for netns in "$ns1" "$ns2"; do 85 # ns1 ns2 93 ip link add ns1eth$i netns "$ns1" type veth peer name ns2eth$i netns "$ns2" 98 ip -net "$ns2" addr add 10.0.$i.2/24 dev ns2eth$i 99 ip -net "$ns2" addr add dead:beef:$i::2/64 dev ns2eth$i nodad 100 ip -net "$ns2" link set ns2eth$i up 102 # let $ns2 reach any $ns1 address from any interface 103 ip -net "$ns2" route add default via 10.0.$i.1 dev ns2eth$i metric 10$i [all …]
|
D | userspace_pm.sh | 38 ns2="ns2-$rndh" 69 for netns in "$ns1" "$ns2" ;do 77 for i in "$ns1" "$ns2" ;do 84 # "$ns1" ns2 87 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth1 netns "$ns2" 96 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1 97 ip -net "$ns2" addr add 10.0.2.2/24 dev ns2eth1 98 ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad 99 ip -net "$ns2" addr add dead:beef:2::2/64 dev ns2eth1 nodad 100 ip -net "$ns2" link set ns2eth1 up [all …]
|
D | simult_flows.sh | 6 ns2="ns2-$rndh" 31 for netns in "$ns1" "$ns2" "$ns3";do 42 # "$ns1" ns2 ns3 62 for i in "$ns1" "$ns2" "$ns3";do 69 ip link add ns1eth1 netns "$ns1" type veth peer name ns2eth1 netns "$ns2" 70 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth2 netns "$ns2" 71 ip link add ns2eth3 netns "$ns2" type veth peer name ns3eth1 netns "$ns3" 88 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1 89 ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad 90 ip -net "$ns2" link set ns2eth1 up mtu 1500 [all …]
|
D | mptcp_sockopt.sh | 37 ns2="ns2-$rndh" 40 for netns in "$ns1" "$ns2" "$ns_sbox";do 49 ip link add ns1eth$i netns "$ns1" type veth peer name ns2eth$i netns "$ns2" 54 ip -net "$ns2" addr add 10.0.$i.2/24 dev ns2eth$i 55 ip -net "$ns2" addr add dead:beef:$i::2/64 dev ns2eth$i nodad 56 ip -net "$ns2" link set ns2eth$i up 58 # let $ns2 reach any $ns1 address from any interface 59 ip -net "$ns2" route add default via 10.0.$i.1 dev ns2eth$i metric 10$i 64 ip netns exec $ns2 ./pm_nl_ctl add 10.0.$i.2 flags signal 65 ip netns exec $ns2 ./pm_nl_ctl add dead:beef:$i::2 flags signal [all …]
|
D | mptcp_connect.sh | 124 ns2="ns2-$rndh" 138 for netns in "$ns1" "$ns2" "$ns3" "$ns4";do 159 for i in "$ns1" "$ns2" "$ns3" "$ns4";do 164 # "$ns1" ns2 ns3 ns4 169 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth1 netns "$ns2" 170 ip link add ns2eth3 netns "$ns2" type veth peer name ns3eth2 netns "$ns3" 180 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1 181 ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad 182 ip -net "$ns2" link set ns2eth1 up 184 ip -net "$ns2" addr add 10.0.2.1/24 dev ns2eth3 [all …]
|
/Linux-v6.1/tools/testing/selftests/netfilter/ |
D | rpath.sh | 37 ns2="ns2-$sfx" 38 trap "ip netns del $ns1; ip netns del $ns2" EXIT 40 # create two netns, disable rp_filter in ns2 and 43 ip netns add "$ns2" 44 ip netns exec "$ns2" sysctl -q net.ipv4.conf.all.rp_filter=0 45 ip netns exec "$ns2" sysctl -q net.ipv4.conf.default.rp_filter=0 46 ip netns exec "$ns2" sysctl -q net.ipv6.conf.all.keep_addr_on_down=1 49 ip -net "$ns1" link add v0 type veth peer name v0 netns "$ns2" 50 ip -net "$ns1" link set v0 up; ip -net "$ns2" link set v0 up 52 ip -net "$ns2" a a 192.168.23.1/24 dev v0 [all …]
|
D | nft_nat.sh | 14 ns2="ns2-$sfx" 47 ip netns add "$ns2" 49 echo "SKIP: Could not create net namespace $ns2" 58 ip link add veth1 netns "$ns0" type veth peer name eth0 netns "$ns2" 216 cnt=$(ip netns exec "$ns0" nft list counter inet filter ns2${dir} | grep -q "$expect") 218 bad_counter "$ns0" ns2$dir "$expect" "test_local_dnat6 2" 233 # expect 1 packet in ns2 236 cnt=$(ip netns exec "$ns2" nft list counter inet filter ns0${dir} | grep -q "$expect") 238 bad_counter "$ns2" ns0$dir "$expect" "test_local_dnat6 4" 243 test $lret -eq 0 && echo "PASS: ipv6 ping to $ns1 was $family NATted to $ns2" [all …]
|
D | conntrack_tcp_unreplied.sh | 14 ns2="ns2-$sfx" 30 ip netns pids $ns2 | xargs kill 2>/dev/null 33 ip netns del $ns2 47 cnt=$(ip netns exec $ns2 nft list counter inet filter "$name" | grep -q "$expect") 49 echo "ERROR: counter $name in $ns2 has unexpected value (expected $expect)" 1>&2 50 ip netns exec $ns2 nft list counter inet filter "$name" 1>&2 62 ip netns add $ns2 || exit 1 66 ip -net $ns1 link set netns $ns2 dev veth2 69 ip -net $ns2 link set up dev lo 71 ip -net $ns2 link set up dev veth2 [all …]
|
D | nft_flowtable.sh | 19 ns2="ns2-$sfx" 46 ip netns add $ns2 51 ip netns del $ns2 67 ip link add veth1 netns $nsr2 type veth peer name eth0 netns $ns2 81 # to ns2 (smaller MTU) to stack either to perform fragmentation (ip_no_pmtu_disc=1), 83 # ns2 is going via nsr2 with a smaller mtu, so that TCPMSS announced by both peers 120 ip -net $ns2 link set eth0 mtu $rmtu 135 for ns in $ns1 $ns2;do 148 ip -net $ns2 addr add 10.0.2.99/24 dev eth0 150 ip -net $ns2 route add default via 10.0.2.1 [all …]
|
D | nft_conntrack_helper.sh | 13 ns2="ns2-$sfx" 19 ip netns del ${ns2} 49 ip netns add ${ns2} 51 ip link add veth0 netns ${ns1} type veth peer name veth0 netns ${ns2} > /dev/null 2>&1 60 ip -net ${ns2} link set lo up 61 ip -net ${ns2} link set veth0 up 66 ip -net ${ns2} addr add 10.0.1.2/24 dev veth0 67 ip -net ${ns2} addr add dead:1::2/64 dev veth0 134 sleep 3 | ip netns exec ${ns2} nc -w 2 -l -p $port > /dev/null & 140 check_for_helper "$ns2" "ip $msg" $port $autoassign [all …]
|
D | ipvs.sh | 20 # | ns2 | 71 ip netns add ns2 74 ip link add veth02 netns ns0 type veth peer name veth20 netns ns2 75 ip link add veth12 netns ns1 type veth peer name veth21 netns ns2 91 ip netns exec ns2 ip link set lo up 92 ip netns exec ns2 ip link set veth21 up 93 ip netns exec ns2 ip addr add ${rip_v4}/24 dev veth21 94 ip netns exec ns2 ip link set veth20 up 95 ip netns exec ns2 ip addr add ${sip_v4}/24 dev veth20 117 ip netns exec ns2 nc -l -p 8080 > "${outfile}" & [all …]
|
D | nf_nat_edemux.sh | 13 ns2="ns2-$sfx" 18 ip netns del $ns2 47 ip netns add $ns2 52 ip link set netns $ns2 dev veth2 58 ip netns exec $ns2 ip link set up dev lo 59 ip netns exec $ns2 ip link set up dev veth2 60 ip netns exec $ns2 ip addr add 192.168.1.2/24 dev veth2 68 ip netns exec $ns2 sysctl -q net.ipv4.ip_local_port_range="10000 10000" 71 ip netns exec $ns2 iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-destin… 74 ip netns exec $ns2 ip route add 10.96.0.1 via 192.168.1.1 [all …]
|
D | nft_synproxy.sh | 12 ns2="ns2-$rnd" # iperf server 29 ip netns add $ns2 33 ip netns pids $ns2 | xargs kill 2>/dev/null 35 ip netns del $ns2 43 ip link add veth1 netns $nsr type veth peer name eth0 netns $ns2 56 for n in $ns1 $ns2; do 61 ip -net $ns2 addr add 10.0.2.99/24 dev eth0 63 ip -net $ns2 route add default via 10.0.2.1 67 echo "ERROR: $ns1 cannot reach $ns2" 1>&2 71 if ! ip netns exec $ns2 ping -c 1 -q 10.0.1.99 > /dev/null; then [all …]
|
D | bridge_brouter.sh | 8 # setup is: ns1 <-> ns0 <-> ns2 28 ip netns add ns2 35 ip link add veth1 netns ns0 type veth peer name eth0 netns ns2 52 # place both in same subnet, ns1 and ns2 connected via ns0:br0 80 # an ip address in same network segment as ns1 and ns2 (ns0 93 echo "PASS: ns1/ns2 connectivity with active broute rule" 115 ip netns exec ns2 ping -q -c 1 10.0.0.11 > /dev/null 121 echo "PASS: ns1/ns2 connectivity with active broute rule and bridge forward drop" 128 echo "ERROR: Could not reach ns2 from ns1" 1>&2 132 ip netns exec ns2 ping -c 1 -q 10.0.0.11 > /dev/null [all …]
|
/Linux-v6.1/tools/testing/selftests/bpf/ |
D | test_lwt_ip_encap.sh | 6 # NS1 NS2 NS3 21 # NS1/NS2 are configured to route packets to IPv*_GRE via IP*_8 26 # 1. routes NS2->IPv*_DST are brought down, so the only way a ping 48 readonly NS2="ns2-$(mktemp -u XXXXXX)" 112 ip netns add "${NS2}" 117 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.all.rp_filter=0 120 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.default.rp_filter=0 125 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.all.accept_dad=0 128 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.default.accept_dad=0 136 ip netns exec ${NS2} sysctl -wq net.ipv4.ip_forward=1 [all …]
|
D | test_xdp_meta.sh | 6 readonly NS2="ns2-$(mktemp -u XXXXXX)" 19 ip netns del ${NS2} 2> /dev/null 30 ip netns add ${NS2} 37 ip link set veth2 netns ${NS2} 40 ip netns exec ${NS2} ip addr add 10.1.1.22/24 dev veth2 43 ip netns exec ${NS2} tc qdisc add dev veth2 clsact 46 ip netns exec ${NS2} tc filter add dev veth2 ingress bpf da obj test_xdp_meta.o sec t 49 ip netns exec ${NS2} ip link set dev veth2 xdp obj test_xdp_meta.o sec x 52 ip netns exec ${NS2} ip link set dev veth2 up 55 ip netns exec ${NS2} ping -c 1 10.1.1.11
|
D | test_xdp_vlan.sh | 8 readonly NS2="ns2-$(mktemp -u XXXXXX)" 55 echo " ip netns exec ${NS2} bash" 62 ip netns del ${NS2} 2> /dev/null 132 ip netns del ${NS2} 2> /dev/null 150 ip netns add ${NS2} 160 ip link set veth2 netns ${NS2} 168 ip netns exec ${NS2} ethtool -K veth2 rxvlan off 170 # Disable tx-vlan-offload (mostly needed on ns2) 171 ip netns exec ${NS2} ethtool -K veth2 txvlan off 181 # In ns2/veth2 create VLAN device [all …]
|
D | test_tc_tunnel.sh | 11 readonly ns2="${ns_prefix}2" 29 ip netns add "${ns2}" 32 peer name veth2 mtu 1500 netns "${ns2}" 37 ip -netns "${ns2}" link set veth2 up 40 ip -netns "${ns2}" -4 addr add "${ns2_v4}/24" dev veth2 42 ip -netns "${ns2}" -6 addr add "${ns2_v6}/64" dev veth2 nodad 56 ip netns del "${ns2}" 72 ip netns exec "${ns2}" nc "${netcat_opt}" -l "${port}" > "${outfile}" & 219 ip netns exec "${ns2}" ip fou add port $dport ipproto ${dproto} 243 ip netns exec "${ns2}" ip link add name testtun0 type "${ttype}" \ [all …]
|
D | test_xdp_redirect.sh | 5 # NS1(veth11) NS2(veth22) 14 readonly NS2="ns2-$(mktemp -u XXXXXX)" 23 ip netns add ${NS2} 26 ip link add veth2 index 222 type veth peer name veth22 netns ${NS2} 31 ip -n ${NS2} link set dev veth22 up 34 ip -n ${NS2} addr add 10.1.1.22/24 dev veth22 42 ip netns del ${NS2} 2> /dev/null 58 ip -n ${NS2} link set veth22 $xdpmode obj xdp_dummy.bpf.o sec xdp &> /dev/null 63 ip netns exec ${NS2} ping -c 1 10.1.1.11 &> /dev/null; then
|
D | test_lwt_seg6local.sh | 4 # NS1 ---- NS2 ---- NS3 ---- NS4 ---- NS5 ---- NS6 8 # All IPv6 packets going to fb00::/16 through NS2 will be encapsulated in a 27 readonly NS2="ns2-$(mktemp -u XXXXXX)" 51 ip netns del ${NS2} 2> /dev/null 62 ip netns add ${NS2} 77 ip link set veth2 netns ${NS2} 78 ip link set veth3 netns ${NS2} 88 ip netns exec ${NS2} ip link set dev veth2 up 89 ip netns exec ${NS2} ip link set dev veth3 up 102 ip netns exec ${NS2} ip -6 addr add fb00::21/16 dev veth2 scope link [all …]
|
/Linux-v6.1/samples/bpf/ |
D | tc_l2_redirect.sh | 17 $IP netns add ns2 25 $IP link set dev vens2 netns ns2 34 $IP -n ns2 link set dev lo up 35 $IP -n ns2 link set dev vens2 up 36 $IP -n ns2 addr add 10.2.1.102/24 dev vens2 37 $IP -n ns2 addr add 2401:db02::66/64 dev vens2 nodad 38 $IP -n ns2 addr add 10.10.1.102 dev lo 39 $IP -n ns2 addr add 2401:face::66/64 dev lo nodad 40 $IP -n ns2 link add ipt2 type ipip local 10.2.1.102 remote 10.2.1.1 41 $IP -n ns2 link add ip6t2 type ip6tnl mode any local 2401:db02::66 remote 2401:db02::1 [all …]
|
/Linux-v6.1/tools/testing/selftests/net/ |
D | icmp.sh | 7 # | ns1 | v4-via-v6 routes: | ns2 | 17 # unreachable" message being sent from ns2, but there is no IPv4 address set in 22 NS2=ns2 36 ip netns del $NS2 43 ip netns add $NS2 46 ip -netns $NS1 link add veth0 type veth peer name veth0 netns $NS2 48 ip -netns $NS2 link set dev veth0 up 51 ip -netns $NS2 addr add $H2_IP6/64 dev veth0 nodad 53 ip -netns $NS2 route add $RT2 via inet6 $H1_IP6 55 # Make sure ns2 will respond with ICMP unreachable [all …]
|
D | bareudp.sh | 24 # * NS1 and NS2 are the intermediate namespaces. They use a bareudp device to 70 # | | NS2 | 115 readonly NS2=$(mktemp -u ns2-XXXXXXXX) 137 # Create the four network namespaces used by the script (NS0, NS1, NS2 and NS3) 145 ip netns add "${NS2}" || exit_cleanup "${NS0}" "${NS1}" 146 ip netns add "${NS3}" || exit_cleanup "${NS0}" "${NS1}" "${NS2}" 153 exit_cleanup "${NS0}" "${NS1}" "${NS2}" "${NS3}" 185 # NS1 with NS2, etc.), 191 for ns in "${NS0}" "${NS1}" "${NS2}" "${NS3}"; do 196 ip link add name veth12 netns "${NS1}" type veth peer name veth21 netns "${NS2}" [all …]
|
D | so_txtime.sh | 14 readonly NS2="${NSPREFIX}2" 22 ip netns del "${NS2}" 30 ip netns add "${NS2}" 33 peer name "${DEV}" netns "${NS2}" 37 ip -netns "${NS2}" link set "${DEV}" up 41 ip -netns "${NS2}" link set dev "${DEV}" address 06:06:06:06:06:06 45 ip -netns "${NS2}" addr add 192.168.1.2/24 dev "${DEV}" 47 ip -netns "${NS2}" addr add fd::2/64 dev "${DEV}" nodad 67 …ip netns exec "${NS2}" "${BIN}" -"${IP}" -c "${CLOCK}" -t "${START}" -S "${SADDR}" -D "${DADDR}" "…
|
D | msg_zerocopy.sh | 15 readonly NS2="${NSPREFIX}2" 76 ip netns del "${NS2}" 88 ip netns add "${NS2}" 91 peer name "${DEV}" mtu "${DEV_MTU}" netns "${NS2}" 95 ip -netns "${NS2}" link set "${DEV}" up 99 ip -netns "${NS2}" link set dev "${DEV}" address 06:06:06:06:06:06 103 ip -netns "${NS2}" addr add 192.168.1.2/24 dev "${DEV}" 105 ip -netns "${NS2}" addr add fd::2/64 dev "${DEV}" nodad 114 …ip netns exec "${NS2}" "${BIN}" "-${IP}" -i "${DEV}" -t 2 -C 2 -S "${SADDR}" -D "${DADDR}" ${ARGS}…
|
1234