Searched full:swp2 (Results 1 – 25 of 112) sorted by relevance
12345
14 # | | + $swp1 BR $swp2 + | |54 ip link set dev $swp2 master br155 ip link set dev $swp2 up57 tc qdisc add dev $swp2 clsact62 tc qdisc del dev $swp2 clsact64 ip link set dev $swp2 down65 ip link set dev $swp2 nomaster80 tc filter add dev $swp2 egress protocol ipv4 handle 101 pref 1 \84 tc filter add dev $swp2 egress protocol ipv4 handle 102 pref 1 \91 tc_check_packets "dev $swp2 egress" 101 1[all …]
42 ip link set dev $swp2 master br046 ip link set dev $swp2 up49 bridge vlan add dev $swp2 vid 6551 bridge vlan add dev $swp2 vid 8555 tc qdisc add dev $swp2 clsact60 tc qdisc del dev $swp2 clsact64 bridge vlan del vid 85 dev $swp266 bridge vlan del vid 65 dev $swp269 ip link set dev $swp2 down80 swp2=${NETIFS[p3]}[all …]
19 ip link set dev $swp2 down20 bridge mdb add dev br0 port "$swp2" grp $TEST_GROUP permanent 2>/dev/null23 ip link set dev $swp2 up24 setup_wait_dev $swp228 ip link set dev $swp2 down32 bridge mdb del dev br0 port "$swp2" grp $TEST_GROUP 2>/dev/null35 ip link set dev $swp2 up36 setup_wait_dev $swp269 ip link set dev $swp2 master br074 bridge link set dev $swp2 mcast_flood off[all …]
17 tc qdisc replace dev $swp2 parent 10:3 handle 103: tbf \19 tc qdisc replace dev $swp2 parent 10:2 handle 102: tbf \32 tc qdisc add dev $swp2 root handle 10: $QDISC 3 priomap 2 1 034 tc qdisc del dev $swp2 root43 tc qdisc replace dev $swp2 root handle 1: \45 tc qdisc replace dev $swp2 parent 1:1 handle 10: \47 tc qdisc replace dev $swp2 parent 10:3 handle 103: \49 tc qdisc replace dev $swp2 parent 10:2 handle 102: \51 tc qdisc replace dev $swp2 parent 10:1 handle 101: \57 tc qdisc del dev $swp2 root
5 # egress of $swp2, the traffic is acted upon by an action skbedit priority. The7 # qdisc at $swp2. The test verifies that for different priority values, the19 # | | + $swp1 BR $swp2 + | |62 ip link set dev $swp2 master br163 ip link set dev $swp2 up66 tc qdisc add dev $swp2 clsact67 tc qdisc add dev $swp2 root handle 10: \73 tc qdisc del dev $swp2 root74 tc qdisc del dev $swp2 clsact77 ip link set dev $swp2 down[all …]
5 # egress of $swp2, the traffic is acted upon by a pedit action. An ingress17 # | | + $swp1 BR $swp2 + | |61 ip link set dev $swp2 master br162 ip link set dev $swp2 up65 tc qdisc add dev $swp2 clsact70 tc qdisc del dev $swp2 clsact73 ip link set dev $swp2 down74 ip link set dev $swp2 nomaster85 swp2=${NETIFS[p3]}173 do_test_pedit_ip4 "dev $swp2 egress" "ip src" src_ip[all …]
4 # This test sends traffic from H1 to H2. Either on ingress of $swp1, or on egress of $swp2, the17 # | | + $swp1 BR $swp2 + | |62 ip link set dev $swp2 master br163 ip link set dev $swp2 up66 tc qdisc add dev $swp2 clsact71 tc qdisc del dev $swp2 clsact74 ip link set dev $swp2 down75 ip link set dev $swp2 nomaster86 swp2=${NETIFS[p3]}172 do_test_pedit_l4port "dev $swp2 egress" udp sport src_port[all …]
5 # egress of $swp2, the traffic is acted upon by a pedit action. An ingress17 # | | + $swp1 BR $swp2 + | |68 ip link set dev $swp2 master br169 ip link set dev $swp2 up72 tc qdisc add dev $swp2 clsact77 tc qdisc del dev $swp2 clsact80 ip link set dev $swp2 down81 ip link set dev $swp2 nomaster92 swp2=${NETIFS[p3]}185 do_test_ip_dsfield "dev $swp2 egress"[all …]
36 simple_if_init $swp2 192.0.2.2/2437 tc qdisc add dev $swp2 ingress_block 22 egress_block 23 clsact42 tc qdisc del dev $swp2 clsact43 simple_if_fini $swp2 192.0.2.2/2480 $tcflags indev $swp2 dst_mac $swmac action drop105 swp2=${NETIFS[p3]}112 swp2origmac=$(mac_get $swp2)113 ip link set $swp2 address $swmac132 ip link set $swp2 address $swp2origmac
14 # | | + $swp1 BR $swp2 + | |54 ip link set dev $swp2 master br155 ip link set dev $swp2 up59 tc qdisc add dev $swp2 clsact64 tc qdisc del dev $swp2 clsact68 ip link set dev $swp2 down69 ip link set dev $swp2 nomaster99 tc filter add dev $swp2 egress protocol $proto handle 101 pref 1 \109 tc_check_packets "dev $swp2 egress" 101 1116 tc_check_packets "dev $swp2 egress" 101 2[all …]
13 # system to assure that there is overcommitment at $swp2. That is necessary so43 # | | + $swp2.10 | | + $swp2.11 | | + $swp2.12 | |47 # | + $swp2 |216 ip link set dev $swp2 up217 mtu_set $swp2 9900223 vlan_create $swp2 1$i227 ip link set dev $swp2.1$i master br1$i231 ip link set dev $swp2.1$i up243 vlan_destroy $swp2 1$i247 mtu_restore $swp2[all …]
19 swp2=${NETIFS[p2]}69 ip link set dev $swp2 up71 local -a speeds_arr=($(different_speeds_get $swp1 $swp2 0 0))76 ethtool_set $swp2 speed $speed2 autoneg off82 msg=$(busywait $TIMEOUT ethtool_ext_state $swp2 \88 ethtool -s $swp2 autoneg on91 ip link set dev $swp2 down
48 ip link set dev $swp2 master br054 ip link set dev $swp2 up59 ip link set dev $swp2 down70 swp2=${NETIFS[p3]}128 bridge vlan add vid 100 dev $swp2149 bridge vlan del vid 100 dev $swp2233 bridge fdb get $mac br br0 vlan 1 | grep -q "dev $swp2"243 bridge fdb del $mac vlan 1 dev $swp2 master282 bridge link set dev $swp2 learning on locked on mab on286 bridge fdb add $unlocked_mac2 dev $swp2 vlan 1 master static[all …]
49 ip link set dev $swp2 master br053 ip link set dev $swp2 up55 tc qdisc add dev $swp2 clsact60 tc qdisc del dev $swp2 clsact62 ip link set dev $swp2 down73 swp2=${NETIFS[p3]}102 tc filter add dev $swp2 egress protocol ip pref 1 handle 101 \110 devlink_trap_drop_test $trap_name $swp2 101114 devlink_trap_drop_cleanup $mz_pid $swp2 ip 1 101128 tc filter add dev $swp2 egress protocol ip pref 1 handle 101 \[all …]
22 tc qdisc replace dev $swp2 root handle 3: tbf rate 1gbit \35 devlink_port_pool_th_save $swp2 436 devlink_port_pool_th_set $swp2 4 1237 devlink_tc_bind_pool_th_save $swp2 7 egress38 devlink_tc_bind_pool_th_set $swp2 7 egress 4 539 devlink_tc_bind_pool_th_save $swp2 6 egress40 devlink_tc_bind_pool_th_set $swp2 6 egress 4 541 devlink_tc_bind_pool_th_save $swp2 5 egress42 devlink_tc_bind_pool_th_set $swp2 5 egress 4 552 devlink_tc_bind_pool_th_restore $swp2 5 egress[all …]
5 # switch. A shaper is used in $swp2, so the traffic is limited there. Packets31 # | | + $swp2.111 | |34 # | + $swp2 |107 devlink_port_pool_th_save $swp2 6110 devlink_tc_bind_pool_th_save $swp2 1 egress129 # $swp2132 ip link set dev $swp2 up133 vlan_create $swp2 111134 ip link set dev $swp2.111 type vlan egress-qos-map 0:0 1:1136 devlink_port_pool_th_set $swp2 6 $MAX_POOL_SIZE[all …]
42 ip link set dev $swp2 master br046 ip link set dev $swp2 up49 tc qdisc add dev $swp2 clsact54 tc qdisc del dev $swp2 clsact57 ip link set dev $swp2 down68 swp2=${NETIFS[p3]}98 tc filter add dev $swp2 egress protocol ip pref 1 handle 101 \110 devlink_trap_drop_test ingress_flow_action_drop $swp2 101116 devlink_trap_drop_cleanup $mz_pid $swp2 ip 1 101123 tc filter add dev $swp2 egress protocol ip pref 2 handle 102 \[all …]
11 # to a small pool ("PFC pool"). The traffic is forwarded to $swp2, which is22 # $swp2, and eventually to $h2.50 # | | | | + $swp2.111 | |55 # | iPOOL2: 1MB static + $swp2 |134 devlink_port_pool_th_save $swp2 6139 devlink_tc_bind_pool_th_save $swp2 1 egress175 # $swp2178 ip link set dev $swp2 up179 mtu_set $swp2 10000180 vlan_create $swp2 111[all …]
30 # | | + $swp2 | |92 ip link set dev $swp2 master br093 ip link set dev $swp2 up96 tc qdisc add dev $swp2 clsact107 tc qdisc del dev $swp2 clsact110 ip link set dev $swp2 down111 ip link set dev $swp2 nomaster133 # swp2139 tc filter add dev $swp2 egress protocol ip pref 1 handle 101 flower \143 tc filter add dev $swp2 egress protocol ip pref 2 handle 102 flower \[all …]
28 simple_if_init $swp2 192.0.2.2/2433 simple_if_fini $swp2 192.0.2.2/2451 tc qdisc add dev $swp2 ingress_block 22 clsact54 tc qdisc del dev $swp2 clsact56 tc qdisc add dev $swp2 egress_block 22 clsact61 tc qdisc add dev $swp2 egress_block 22 clsact79 tc qdisc del dev $swp2 clsact97 action mirred egress redirect dev $swp2100 tc qdisc add dev $swp2 ingress_block 22 clsact103 tc qdisc del dev $swp2 clsact[all …]
38 # | $swp1 + + $swp2 |41 # | | $swp1.1 + | | + $swp2.111 | |123 ip link set dev $swp2 up124 mtu_set $swp2 10000129 vlan_create $swp2 111146 ip link set dev $swp2.111 master br111156 devlink_port_pool_th_save $swp2 0157 devlink_port_pool_th_set $swp2 0 5158 devlink_tc_bind_pool_th_save $swp2 1 ingress159 devlink_tc_bind_pool_th_set $swp2 1 ingress 0 5[all …]
19 swp2=${NETIFS[p2]}22 ip link set dev $swp2 up24 busywait "$TIMEOUT" wait_for_port_up ethtool $swp233 ip link set dev $swp2 down124 ip link set dev $swp2 up125 busywait "$TIMEOUT" wait_for_port_up ethtool $swp2137 ip link set dev $swp2 down160 ethtool_set $swp2 speed $max_speed lanes $lanes autoneg off162 ip link set dev $swp2 up163 busywait "$TIMEOUT" wait_for_port_up ethtool $swp2[all …]
23 # | $swp1 + + $swp2 |26 # | | $swp1.111 + | | + $swp2.222 | |115 ip link set dev $swp2 up116 mtu_set $swp2 10000137 vlan_create $swp2 222150 ip link set dev $swp2.222 master br222165 devlink_port_pool_th_save $swp2 0166 devlink_port_pool_th_set $swp2 0 6167 devlink_tc_bind_pool_th_save $swp2 2 ingress168 devlink_tc_bind_pool_th_set $swp2 2 ingress 0 6[all …]
47 swp2=${NETIFS[p2]}50 ip link set dev $swp2 up57 ip link set dev $swp2 down82 local swp2_mac=$(mac_get $swp2)93 ip link set dev $swp2 master br1107 ip link set dev $swp2 addr 00:11:22:33:44:55108 check_err $? "Changing swp2's MAC address not permitted"112 ip link set dev $swp2 addr $swp2_mac290 ip link set dev $swp2 down292 ip link set dev $swp2 master bond1[all …]