Home
last modified time | relevance | path

Searched refs:ns1 (Results 1 – 25 of 54) sorted by relevance

123

/tools/testing/selftests/net/
A Dtest_neigh.sh41 setup_ns ns1 ns2
44 ip -n "$ns1" link set dev veth0 up
92 run_cmd "ip -n $ns1 neigh flush dev veth0"
102 run_cmd "ip -n $ns1 neigh flush dev veth0"
111 run_cmd "ip -n $ns1 neigh flush dev veth0"
126 run_cmd "ip -n $ns1 neigh flush dev veth0"
137 run_cmd "ip -n $ns1 neigh flush dev veth0"
148 run_cmd "ip -n $ns1 neigh flush dev veth0"
151 run_cmd "ip -n $ns1 link set dev veth0 up"
161 run_cmd "ip -n $ns1 neigh flush dev veth0"
[all …]
A Dtest_vxlan_mdb.sh433 local ns1=$ns1_v4
446 local ns1=$ns1_v4
459 local ns1=$ns1_v6
472 local ns1=$ns1_v6
485 local ns1=$ns1_v4
498 local ns1=$ns1_v4
511 local ns1=$ns1_v6
524 local ns1=$ns1_v6
694 local ns1=$ns1_v4
711 local ns1=$ns1_v4
[all …]
A Dtest_vxlan_nolocalbypass.sh100 setup_ns ns1
102 ip -n $ns1 address add 192.0.2.1/32 dev lo
103 ip -n $ns1 address add 198.51.100.1/32 dev lo
107 ip -n $ns1 link add name vx1 up type vxlan id 100 dstport 4790
112 cleanup_ns $ns1
125 run_cmd "tc -n $ns1 qdisc add dev vx1 clsact"
128 run_cmd "tc -n $ns1 qdisc add dev lo clsact"
136 tc_check_packets "$ns1" "dev vx1 ingress" 101 1
146 tc_check_packets "$ns1" "dev vx1 ingress" 101 1
149 run_cmd "ip -n $ns1 link set dev vx0 type vxlan localbypass"
[all …]
A Dipv6_force_forwarding.sh14 cleanup_ns $ns1 $ns2 $ns3
21 setup_ns ns1 ns2 ns3
28 ip link set veth12 netns $ns1
34 ip -n $ns1 addr add 2001:db8:1::1/64 dev veth12 nodad
40 ip -n $ns1 link set veth12 up
46 ip -n $ns1 route add 2001:db8:2::/64 via 2001:db8:1::2
68 if ip netns exec $ns1 ping -6 -c 1 -W 2 2001:db8:2::2 &>/dev/null; then
79 if ip netns exec $ns1 ping -6 -c 1 -W 2 2001:db8:2::2 &>/dev/null; then
/tools/testing/selftests/net/mptcp/
A Dmptcp_join.sh27 ns1=""
1190 local ns_tx=$ns1
1200 ns_rx=$ns1
1252 local ns_rx=$ns1
1257 ns_tx=$ns1
1297 ns_rx=$ns1
1554 ns_rx=$ns1
1903 ss -N $ns1 -ti
3613 wait_mpj $ns1
3719 wait_mpj $ns1
[all …]
A Dsimult_flows.sh11 ns1=""
45 mptcp_lib_ns_exit "${ns1}" "${ns2}" "${ns3}"
71 mptcp_lib_ns_init ns1 ns2 ns3
79 ip -net "$ns1" link set ns1eth1 up mtu 1500
85 ip -net "$ns1" link set ns1eth2 up mtu 1500
89 mptcp_lib_pm_nl_set_limits "${ns1}" 1 1
160 NSTAT_HISTORY=/tmp/${ns1}.nstat ip netns exec ${ns1} \
172 ip netns exec ${ns1} \
190 NSTAT_HISTORY=/tmp/${ns1}.nstat ip netns exec ${ns1} \
191 nstat | grep Tcp > /tmp/${ns1}.out
[all …]
A Dpm_netlink.sh31 ns1=""
39 mptcp_lib_ns_exit "${ns1}"
47 mptcp_lib_ns_init ns1
63 ip -n "${ns1}" mptcp limits
65 ip netns exec "${ns1}" ./pm_nl_ctl limits
75 mptcp_lib_pm_nl_get_endpoint "${ns1}" "${@}"
91 mptcp_lib_pm_nl_set_limits "${ns1}" "${@}"
96 mptcp_lib_pm_nl_add_endpoint "${ns1}" "${@}"
101 mptcp_lib_pm_nl_del_endpoint "${ns1}" "${@}"
106 mptcp_lib_pm_nl_flush_endpoint "${ns1}"
[all …]
A Duserspace_pm.sh53 ns1=""
110 mptcp_lib_ns_exit "${ns1}" "${ns2}"
121 mptcp_lib_ns_init ns1 ns2
141 ip netns exec "$ns1" sysctl -q net.mptcp.pm_type=0
150 for i in "$ns1" "$ns2" ;do
160 ip -net "$ns1" addr add 10.0.1.1/24 dev ns1eth2
161 ip -net "$ns1" addr add 10.0.2.1/24 dev ns1eth2
164 ip -net "$ns1" link set ns1eth2 up
208 ip netns exec "$ns1" \
682 ip netns exec "$ns1" ./pm_nl_ctl listen 10.0.2.1\
[all …]
A Dmptcp_connect.sh129 ns1=""
160 mptcp_lib_ns_init ns1 ns2 ns3 ns4
174 ip -net "$ns1" link set ns1eth2 up
668 local connector_ns="$ns1"
761 run_tests_lo "$ns1" "$ns1" 10.0.1.1 1 "-P ${peekmode}"
762 run_tests_lo "$ns1" "$ns1" dead:beef:1::1 1 "-P ${peekmode}"
812 run_tests_lo "$ns1" "$ns1" 10.0.1.1 1 "-I 3 -i $old_cin"
813 run_tests_lo "$ns1" "$ns1" dead:beef:1::1 1 "-I 3 -i $old_cin"
914 run_tests_lo "$ns1" "$ns1" 10.0.1.1 1
918 run_tests_lo "$ns1" "$ns1" dead:beef:1::1 1
[all …]
/tools/testing/selftests/bpf/prog_tests/
A Dlwt_ip_encap.c142 if (!ns1 || !ns2) in configure_vrf()
146 SYS(fail, "ip -n %s link set red up", ns1); in configure_vrf()
170 if (!ns1 || !vrf) in configure_ns1()
173 nstoken = open_netns(ns1); in configure_ns1()
276 if (!ns1 || !ns2 || !ns3 || !vrf) in setup_network()
305 ns1, IP4_ADDR_GRE, IP4_ADDR_6, vrf); in setup_network()
309 ns1, IP6_ADDR_GRE, IP6_ADDR_6, vrf); in setup_network()
354 if (!ns1 || !ns3) in test_gso_fix()
367 nstoken = open_netns(ns1); in test_gso_fix()
406 static int check_ping_ok(const char *ns1) in check_ping_ok() argument
[all …]
A Dxdp_vlan.c29 static int setup_network(char *ns1, char *ns2) in setup_network() argument
31 if (!ASSERT_OK(append_tid(ns1, NS_MAX_SIZE), "create ns1 name")) in setup_network()
36 SYS(fail, "ip netns add %s", ns1); in setup_network()
39 ns1, VETH_NAME, VETH_NAME, ns2); in setup_network()
49 SYS(fail, "ip -n %s link set %s up", ns1, VETH_NAME); in setup_network()
65 static void cleanup_network(const char *ns1, const char *ns2) in cleanup_network() argument
67 SYS_NOFAIL("ip netns del %s", ns1); in cleanup_network()
75 char ns1[NS_MAX_SIZE] = NS1_NAME; in xdp_vlan() local
81 if (!ASSERT_OK(setup_network(ns1, ns2), "setup network")) in xdp_vlan()
84 nstoken = open_netns(ns1); in xdp_vlan()
[all …]
/tools/testing/selftests/net/hsr/
A Dhsr_ping.sh34 do_ping "$ns1" 100.64.0.2
39 do_ping "$ns1" 100.64.0.3
43 do_ping "$ns1" dead:beef:1::2
44 do_ping "$ns1" dead:beef:1::3
227 do_ping "$ns1" 100.64.2.2
228 do_ping "$ns1" 100.64.3.2
229 do_ping "$ns1" 100.64.4.2
230 do_ping "$ns1" 100.64.5.2
232 do_ping "$ns1" 100.64.2.3
273 setup_ns ns1 ns2 ns3
[all …]
A Dhsr_redbox.sh12 do_ping "${ns1}" 100.64.0.2
19 do_ping "${ns1}" 100.64.0.3
20 do_ping "${ns1}" 100.64.0.41
22 do_ping "${ns1}" 100.64.0.51
34 do_ping_long "${ns1}" 100.64.0.3
35 do_ping_long "${ns1}" 100.64.0.41
37 do_ping_long "${ns1}" 100.64.0.51
83 ip -n "${ns1}" link set ns1eth1 up
84 ip -n "${ns1}" link set ns1eth2 up
124 ip -n "${ns1}" link set hsr1 up
[all …]
/tools/testing/selftests/net/netfilter/
A Dnft_conntrack_helper.sh21 ip netns pids "$ns1" | xargs kill 2>/dev/null
23 ip netns del "$ns1"
29 setup_ns ns1 ns2
36 ip -net "$ns1" link set veth0 up
39 ip -net "$ns1" addr add 10.0.1.1/24 dev veth0
40 ip -net "$ns1" addr add dead:1::1/64 dev veth0 nodad
129 ip netns exec "$ns1" conntrack -F 2> /dev/null
137 check_for_helper "$ns1" "ipv6 $msg" "$port"
141 if ! load_ruleset_family ip "$ns1"; then
142 echo "FAIL: ${ns1} cannot load ip ruleset" 1>&2
[all …]
A Dbridge_brouter.sh23 setup_ns nsbr ns1 ns2
25 if ! ip link add veth0 netns "$nsbr" type veth peer name eth0 netns "$ns1"; then
45 ip -net "$ns1" link set eth0 up
47 ip -net "$ns1" addr add 10.0.0.11/24 dev eth0
62 if ip netns exec "$ns1" ping -q -c 1 10.0.0.12 -W 0.5 > /dev/null 2>&1; then
74 if ! ip netns exec "$ns1" ping -q -c 1 10.0.0.12 > /dev/null; then
79 echo "PASS: ${ns1}/${ns2} connectivity with active broute rule"
83 if ! ip netns exec "$ns1" ping -q -c 1 10.0.0.12 > /dev/null; then
109 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.0.12 > /dev/null; then
110 echo "ERROR: Could not reach ${ns2} from ${ns1}" 1>&2
[all …]
A Dipvs.sh59 setup_ns ns0 ns1 ns2
73 ip netns exec "${ns1}" ip link set veth10 up
74 ip netns exec "${ns1}" ip addr add "${gip_v4}/24" dev veth10
75 ip netns exec "${ns1}" ip link set veth12 up
124 ip netns exec "${ns1}" sysctl -qw net.ipv4.ip_forward=1
127 ip netns exec "${ns1}" ip addr add "${vip_v4}/32" dev lo:1
140 ip netns exec "${ns1}" sysctl -qw net.ipv4.ip_forward=1
143 ip netns exec "${ns1}" ip addr add "${vip_v4}/32" dev lo:1
155 ip netns exec "${ns1}" ip link set tunl0 up
156 ip netns exec "${ns1}" sysctl -qw net.ipv4.ip_forward=0
[all …]
A Dnft_zones_many.sh22 setup_ns ns1
33 ip netns exec "$ns1" nft -f /dev/stdin<<EOF
51 ip netns exec "$ns1" sysctl -q net.netfilter.nf_conntrack_udp_timeout=3600
63 ) | ip netns exec "$ns1" nft -f /dev/stdin
91 count=$(ip netns exec "$ns1" conntrack -C)
97 ip netns exec "$ns1" conntrack -S 1>&2
111 ip netns exec "$ns1" conntrack -F >/dev/null 2>/dev/null
120 ip netns exec "$ns1" conntrack -I -s 1.1.1.1 -d 2.2.2.2 --protonum 6 \
123 ip netns exec "$ns1" conntrack -I -s 1.1.1.1 -d 2.2.2.2 --protonum 6 \
141 count=$(ip netns exec "$ns1" conntrack -C)
[all …]
A Dconntrack_tcp_unreplied.sh22 ip netns pids "$ns1" | xargs kill 2>/dev/null
51 setup_ns ns1 ns2
54 ip -net "$ns1" link add name veth1 type veth peer name veth2
55 ip -net "$ns1" link set netns "$ns2" dev veth2
57 ip -net "$ns1" link set up dev lo
59 ip -net "$ns1" link set up dev veth1
68 ip netns exec "$ns1" nft -f - <<EOF
77 ip -net "$ns1" addr add 10.11.11.1/24 dev veth1
78 ip -net "$ns1" route add 10.99.99.99 via 10.11.11.2
81 ip netns exec "$ns1" ping -q -c 2 10.11.11.2 >/dev/null || exit 1
[all …]
A Dnft_nat.sh17 ip netns pids "$ns1" | xargs kill 2>/dev/null
30 setup_ns ns0 ns1 ns2
58 do_config "$ns1" 1
143 for i in "$ns0" "$ns1" "$ns2" ;do
301 bad_counter "$ns1" ns1$dir "$expect" "test_local_dnat 5"
392 echo "ERROR: cannot ping $ns1 from $ns2 via ipv6"
483 echo "ERROR: cannot ping $ns1 from $ns2 $natflags"
572 echo "ERROR: cannnot ping $ns1 from $ns2 via ipv6"
647 echo "ERROR: cannot ping $ns1 from $ns2"
1065 for i in "$ns0" "$ns1" "$ns2" ;do
[all …]
A Dnft_synproxy.sh11 setup_ns nsr ns1 ns2
16 ip netns pids "$ns1" | xargs kill 2>/dev/null
24 ip link add veth0 netns "$nsr" type veth peer name eth0 netns "$ns1"
38 for n in $ns1 $ns2; do
41 ip -net "$ns1" addr add 10.0.1.99/24 dev eth0
43 ip -net "$ns1" route add default via 10.0.1.1
47 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.99 > /dev/null; then
48 echo "ERROR: $ns1 cannot reach $ns2" 1>&2
53 echo "ERROR: $ns2 cannot reach $ns1" 1>&2
88 if ! ip netns exec "$ns1" timeout 5 iperf3 -c 10.0.2.99 -n $((1 * 1024 * 1024)) > /dev/null; then
A Dnft_queue.sh17 ip netns pids "$ns1" | xargs kill 2>/dev/null
36 setup_ns ns1 ns2 ns3 nsrouter
67 ip -net "$ns1" link set eth0 up
362 ip -net "$ns1" li set eth0 master tvrf
363 ip -net "$ns1" li set tvrf up
381 ip netns exec "$ns1" ./nf_queue -q 1 &
493 ip netns exec "$ns1" ./nf_queue -q 11 &
592 ip netns exec "$ns1" nft -f - <<EOF
609 ip netns exec "$ns1" nft flush ruleset
634 echo "PASS: ${ns1} can reach ${ns2}"
[all …]
A Drpath.sh37 setup_ns ns1 ns2
42 ip -net "$ns1" link set v0 up; ip -net "$ns2" link set v0 up
43 ip -net "$ns1" a a 192.168.23.2/24 dev v0
45 ip -net "$ns1" a a fec0:23::2/64 dev v0 nodad
51 ip -net "$ns1" a a 192.168.42.2/24 dev v0
53 ip -net "$ns1" a a fec0:42::2/64 dev v0 nodad
59 ns1_hwaddr=$(ip -net "$ns1" link show dev v0 | \
142 netns_ping "$ns1" -I v0 192.168.42.1 && \
144 netns_ping "$ns1" -I v0 fec0:42::1 && \
157 netns_ping "$ns1" 192.168.23.1 || \
[all …]
A Dnf_nat_edemux.sh23 setup_ns ns1 ns2
27 ip link set netns "$ns1" dev veth1
30 ip netns exec "$ns1" ip link set up dev lo
31 ip netns exec "$ns1" ip link set up dev veth1
32 ip netns exec "$ns1" ip addr add 192.168.1.1/24 dev veth1
39 ip netns exec "$ns1" socat -u TCP-LISTEN:5201,fork OPEN:/dev/null,wronly=1 &
71 ip netns exec "$ns1" iptables -t nat -A PREROUTING -p tcp --dport 5202 -j REDIRECT --to-ports 5201
72 ip netns exec "$ns1" iptables -t nat -A PREROUTING -p tcp --dport 5203 -j REDIRECT --to-ports 5201
A Dnft_tproxy_tcp.sh34 ip netns pids "$ns1" | xargs kill 2>/dev/null
46 setup_ns ns1 ns2 ns3 nsrouter
67 ip -net "$ns1" link set eth0 up
71 ip -net "$ns1" addr add 10.0.1.99/24 dev eth0
72 ip -net "$ns1" addr add dead:1::99/64 dev eth0 nodad
73 ip -net "$ns1" route add default via 10.0.1.1
74 ip -net "$ns1" route add default via dead:1::1
92 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.99 > /dev/null; then
112 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.1 > /dev/null; then
347 echo "PASS: ${ns1} can reach ${ns2}"
[all …]
A Dnft_tproxy_udp.sh34 ip netns pids "$ns1" | xargs kill 2>/dev/null
46 setup_ns ns1 ns2 ns3 nsrouter
67 ip -net "$ns1" link set eth0 up
71 ip -net "$ns1" addr add 10.0.1.99/24 dev eth0
72 ip -net "$ns1" addr add dead:1::99/64 dev eth0 nodad
73 ip -net "$ns1" route add default via 10.0.1.1
74 ip -net "$ns1" route add default via dead:1::1
92 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.99 > /dev/null; then
112 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.1 > /dev/null; then
253 echo "PASS: ${ns1} can reach ${ns2}"
[all …]

Completed in 852 milliseconds

123