| /tools/testing/selftests/net/netfilter/ |
| A D | nf_nat_edemux.sh | 39 ip netns exec "$ns1" socat -u TCP-LISTEN:5201,fork OPEN:/dev/null,wronly=1 & 53 ip netns exec "$ns2" socat -t 10 - TCP:192.168.1.1:5201 > /dev/null & 60 echo test | ip netns exec "$ns2" socat -t 3 -u STDIN TCP:10.96.0.1:443,connect-timeout=3 >/dev/null 74 sleep 5 | ip netns exec "$ns2" socat -t 5 -u STDIN TCP:192.168.1.1:5202,connect-timeout=5 >/dev/nul… 78 echo | ip netns exec "$ns2" socat -t 3 -u STDIN TCP:192.168.1.1:5203,connect-timeout=5 >/dev/null &
|
| A D | nft_conntrack_helper.sh | 117 ip netns exec "$ns2" socat -t 3 -u -4 TCP-LISTEN:"$port",reuseaddr STDOUT > /dev/null & 120 ip netns exec "$ns1" socat -u -4 STDIN TCP:10.0.1.2:"$port" < /dev/null > /dev/null 132 ip netns exec "$ns2" socat -t 3 -u -6 TCP-LISTEN:"$port",reuseaddr STDOUT > /dev/null & 135 ip netns exec "$ns1" socat -t 3 -u -6 STDIN TCP:"[dead:1::2]":"$port" < /dev/null > /dev/null
|
| A D | conntrack_vrf.sh | 79 ip netns exec "$ns1" socat -u -4 TCP-LISTEN:55555,reuseaddr,fork STDOUT > /dev/null & 161 …if ! ip netns exec "$ns0" ip vrf exec tvrf socat -u -4 STDIN TCP:"$IP1":55555 < /dev/null > /dev/n… 196 …if ! ip netns exec "$ns0" ip vrf exec tvrf socat -u -4 STDIN TCP:"$IP1":55555 < /dev/null > /dev/n…
|
| A D | nft_queue.sh | 274 timeout 5 ip netns exec "$ns2" socat -u TCP-LISTEN:12345 STDOUT >/dev/null & 282 ip netns exec "$ns1" socat -u STDIN TCP:10.0.2.99:12345 <"$TMPINPUT" >/dev/null 290 timeout 5 ip netns exec "$nsrouter" socat -u TCP-LISTEN:12345 STDOUT >/dev/null & 300 ip netns exec "$nsrouter" socat -u STDIN TCP:127.0.0.1:12345 <"$TMPINPUT" >/dev/null 334 timeout 5 ip netns exec "$nsrouter" socat -u TCP-LISTEN:12345 STDOUT >/dev/null & 344 ip netns exec "$nsrouter" socat -u STDIN TCP:127.0.0.1:12345 <"$TMPINPUT" > /dev/null
|
| A D | ipvs.sh | 100 ip netns exec "$ns2" timeout 5 socat -u -4 TCP-LISTEN:8080,reuseaddr STDOUT > "${outfile}" & 106 ip netns exec "${ns0}" timeout 2 socat -u -4 STDIN TCP:"${vip_v4}":"${port}" < "${infile}"
|
| A D | nft_nat_zones.sh | 226 ip netns exec "$srv" socat -u TCP-LISTEN:5201,fork STDOUT > /dev/null 2>/dev/null & 236 …if ! ip netns exec "$cl" socat -4 -u STDIN TCP:10.3.0.99:5201,sourceport=10000 < /dev/null > /dev/…
|
| A D | conntrack_tcp_unreplied.sh | 83 ip netns exec "$ns2" socat -u -4 TCP-LISTEN:8080,reuseaddr STDOUT &
|
| /tools/testing/selftests/net/netfilter/packetdrill/ |
| A D | conntrack_inexact_rst.pkt | 9 // 5.772212 client_ip > server_ip TCP 66 45020 > 443 [ACK] Seq=1905874048 Ack=781810658 Win=36352 … 12 // 5.788207 server_ip > client_ip TCP 66 443 > 45020 [FIN, ACK] Seq=781811916 Ack=1905874048 Win=3… 14 // 5.788479 client_ip > server_ip TCP 66 45020 > 443 [RST, ACK] Seq=1905874072 Ack=781811917 Win=3… 15 // 5.788581 server_ip > client_ip TCP 54 8443 > 45020 [RST] Seq=781811892 Win=0 Len=0
|
| /tools/testing/selftests/bpf/prog_tests/ |
| A D | cls_redirect.c | 140 TCP, enumerator 209 { TCP, ACCEPT, UNKNOWN_CONN, NO_HOPS, SYN }, 210 { TCP, ACCEPT, UNKNOWN_CONN, NO_HOPS, ACK }, 211 { TCP, FORWARD, UNKNOWN_CONN, ONE_HOP, ACK }, 212 { TCP, ACCEPT, KNOWN_CONN, ONE_HOP, ACK }, 303 case TCP: in build_input() 361 &servers[TCP][i], &conns[TCP][i], in test_cls_redirect_common() 362 &tuples[TCP][i]))) in test_cls_redirect_common()
|
| /tools/testing/selftests/net/rds/ |
| A D | README.txt | 4 These scripts provide a coverage test for RDS-TCP by creating two 9 the RDS-TCP stack was able to recover properly. The provided config.sh
|
| /tools/testing/selftests/drivers/net/netdevsim/ |
| A D | peer.sh | 119 ip netns exec nssv socat TCP-LISTEN:1234,fork $tmp_file & 125 echo "HI" | ip netns exec nscl socat STDIN TCP:192.168.1.1:1234
|
| /tools/testing/selftests/net/packetdrill/ |
| A D | tcp_eor_no-coalesce-retrans.pkt | 2 // Test TCP does not append any data from consequent writes to the tail 60 // TCP should fill the hole but no coalescing should happen, and all
|
| A D | tcp_ecn_ecn-uses-ect0.pkt | 2 // Test ECN: verify that Linux TCP ECN sending code uses ECT0 (not ECT1).
|
| A D | tcp_user_timeout_user_timeout.pkt | 20 // a TCP structure in kernel for about 1 minute !
|
| A D | tcp_md5_md5-only-on-client-ack.pkt | 19 // The TCP listener refcount should be 2, but on buggy kernels it can be 0:
|
| A D | tcp_eor_no-coalesce-small.pkt | 2 // Test TCP does not append any data from consequent writes to the tail
|
| A D | tcp_eor_no-coalesce-large.pkt | 2 // Test TCP does not append any data from consequent writes to the tail
|
| A D | tcp_syscall_bad_arg_fastopen-invalid-buf-ptr.pkt | 2 // Test TCP fastopen behavior with NULL as buffer pointer, but a non-zero
|
| A D | tcp_eor_no-coalesce-subsequent.pkt | 2 // Test TCP does not append any data from consequent writes to the tail
|
| A D | tcp_slow_start_slow-start-fq-ack-per-2pkt.pkt | 7 // Note we use FQ/pacing to check if TCP Small Queues is not hurting
|
| A D | tcp_timestamping_client-only-last-byte.pkt | 31 // Make sure that internal TCP timestamps are not overwritten and we have sane
|
| /tools/usb/usbip/ |
| A D | configure.ac | 54 AC_MSG_CHECKING([whether to use the libwrap (TCP wrappers) library]) 57 [use the libwrap (TCP wrappers) library])],
|
| /tools/testing/selftests/net/ |
| A D | gre_gso.sh | 123 cat $TMPFILE | timeout 1 socat -u STDIN TCP:$addr:$port 128 cat $TMPFILE | timeout 1 socat -u STDIN TCP:$addr:$port
|
| A D | busy_poll_test.sh | 84 ip netns exec nscl socat -u $tmp_file TCP:${SERVER_IP}:${SERVER_PORT}
|
| /tools/testing/selftests/net/mptcp/ |
| A D | mptcp_connect.sh | 629 do_transfer ${listener_ns} ${connector_ns} MPTCP TCP \ 637 do_transfer ${listener_ns} ${connector_ns} TCP MPTCP \ 646 do_transfer ${listener_ns} ${connector_ns} TCP TCP \
|