Home
last modified time | relevance | path

Searched refs:ns2 (Results 1 – 25 of 44) sorted by relevance

12

/tools/testing/selftests/net/mptcp/
A Dmptcp_join.sh28 ns2=""
1199 ns_tx=$ns2
1258 ns_rx=$ns2
1296 ns_tx=$ns2
1553 ns_tx=$ns2
1704 addr_ns=$ns2
3646 wait_mpj $ns2
3674 wait_mpj $ns2
3695 wait_mpj $ns2
3778 wait_mpj $ns2
[all …]
A Dsimult_flows.sh12 ns2=""
45 mptcp_lib_ns_exit "${ns1}" "${ns2}" "${ns3}"
71 mptcp_lib_ns_init ns1 ns2 ns3
92 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
94 ip -net "$ns2" link set ns2eth1 up mtu 1500
96 ip -net "$ns2" addr add 10.0.2.2/24 dev ns2eth2
98 ip -net "$ns2" link set ns2eth2 up mtu 1500
100 ip -net "$ns2" addr add 10.0.3.2/24 dev ns2eth3
102 ip -net "$ns2" link set ns2eth3 up mtu 1500
103 ip netns exec "$ns2" sysctl -q net.ipv4.ip_forward=1
[all …]
A Duserspace_pm.sh54 ns2=""
110 mptcp_lib_ns_exit "${ns1}" "${ns2}"
121 mptcp_lib_ns_init ns1 ns2
150 for i in "$ns1" "$ns2" ;do
166 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
167 ip -net "$ns2" addr add 10.0.2.2/24 dev ns2eth1
170 ip -net "$ns2" link set ns2eth1 up
215 ip netns exec "$ns2" \
329 ip netns exec "$ns2"\
339 ip netns exec "$ns2" ./pm_nl_ctl ann\
[all …]
A Dmptcp_sockopt.sh22 ns2=""
67 mptcp_lib_ns_init ns1 ns2 ns_sbox
76 ip -net "$ns2" addr add 10.0.$i.2/24 dev ns2eth$i
77 ip -net "$ns2" addr add dead:beef:$i::2/64 dev ns2eth$i nodad
78 ip -net "$ns2" link set ns2eth$i up
86 mptcp_lib_pm_nl_add_endpoint "${ns2}" "10.0.${i}.2" flags signal
91 mptcp_lib_pm_nl_set_limits "${ns2}" 8 8
94 add_mark_rules $ns2 2
101 mptcp_lib_ns_exit "${ns1}" "${ns2}" "${ns_sbox}"
361 run_tests $ns1 $ns2 10.0.1.1
[all …]
A Dmptcp_connect.sh130 ns2=""
160 mptcp_lib_ns_init ns1 ns2 ns3 ns4
180 ip -net "$ns2" link set ns2eth1 up
184 ip -net "$ns2" link set ns2eth3 up
209 for i in "$ns1" "$ns2" "$ns3" "$ns4";do
669 local listener_ns="$ns2"
867 do_ping "$ns2" $sender 10.0.1.2
869 do_ping "$ns2" $sender 10.0.2.1
922 for sender in $ns1 $ns2 $ns3 $ns4;do
934 run_tests "$ns2" $sender 10.0.1.2
[all …]
/tools/testing/selftests/bpf/prog_tests/
A Dlwt_ip_encap.c142 if (!ns1 || !ns2) in configure_vrf()
153 SYS(fail, "ip -n %s link set red up", ns2); in configure_vrf()
201 if (!ns2 || !vrf) in configure_ns2()
204 nstoken = open_netns(ns2); in configure_ns2()
276 if (!ns1 || !ns2 || !ns3 || !vrf) in setup_network()
307 ns2, IP4_ADDR_GRE, IP4_ADDR_8, vrf); in setup_network()
311 ns2, IP6_ADDR_GRE, IP6_ADDR_8, vrf); in setup_network()
437 char ns2[NETNS_NAME_SIZE] = NETNS_BASE "-2-"; in lwt_ip_encap() local
472 ns2, IP4_ADDR_DST, BPF_FILE, sec, vrf); in lwt_ip_encap()
474 ns2, IP6_ADDR_DST, BPF_FILE, sec, vrf); in lwt_ip_encap()
[all …]
A Dxdp_vlan.c29 static int setup_network(char *ns1, char *ns2) in setup_network() argument
33 if (!ASSERT_OK(append_tid(ns2, NS_MAX_SIZE), "create ns2 name")) in setup_network()
37 SYS(fail, "ip netns add %s", ns2); in setup_network()
39 ns1, VETH_NAME, VETH_NAME, ns2); in setup_network()
53 ns2, VETH_NAME, VETH_NAME, VLAN_ID, VLAN_ID); in setup_network()
55 SYS(fail, "ip -n %s link set %s up", ns2, VETH_NAME); in setup_network()
65 static void cleanup_network(const char *ns1, const char *ns2) in cleanup_network() argument
68 SYS_NOFAIL("ip netns del %s", ns2); in cleanup_network()
76 char ns2[NS_MAX_SIZE] = NS2_NAME; in xdp_vlan() local
81 if (!ASSERT_OK(setup_network(ns1, ns2), "setup network")) in xdp_vlan()
[all …]
/tools/testing/selftests/net/
A Dtest_vxlan_mdb.sh259 local ns2=$1; shift
1270 local ns2=$ns2_v4
1290 local ns2=$ns2_v4
1310 local ns2=$ns2_v6
1330 local ns2=$ns2_v6
1411 local ns2=$ns2_v4
1431 local ns2=$ns2_v4
1451 local ns2=$ns2_v6
1471 local ns2=$ns2_v6
1552 local ns2=$ns2_v4
[all …]
A Dipv6_force_forwarding.sh14 cleanup_ns $ns1 $ns2 $ns3
21 setup_ns ns1 ns2 ns3
29 ip link set veth21 netns $ns2
30 ip link set veth23 netns $ns2
35 ip -n $ns2 addr add 2001:db8:1::2/64 dev veth21 nodad
36 ip -n $ns2 addr add 2001:db8:2::1/64 dev veth23 nodad
41 ip -n $ns2 link set veth21 up
42 ip -n $ns2 link set veth23 up
50 ip netns exec $ns2 sysctl -qw net.ipv6.conf.all.forwarding=0
65 ip netns exec $ns2 sysctl -qw net.ipv6.conf.veth21.force_forwarding=0
[all …]
A Dlink_netns.py16 with NetNS() as ns1, NetNS() as ns2:
17 with NetNSEnter(str(ns2)):
24 ip(f"link add netns {ns1} dummy2 type dummy", ns=str(ns2))
60 with NetNS() as ns1, NetNS() as ns2, NetNS() as ns3:
61 net1, net2, net3 = str(ns1), str(ns2), str(ns3)
101 with NetNS() as ns1, NetNS() as ns2, NetNS() as ns3, NetNS() as ns4:
102 net1, net2, net3, net4 = str(ns1), str(ns2), str(ns3), str(ns4)
A Dtest_neigh.sh41 setup_ns ns1 ns2
43 ip -n "$ns1" link add veth0 type veth peer name veth1 netns "$ns2"
45 ip -n "$ns2" link set dev veth1 up
49 ip -n "$ns2" address add 192.0.2.2/24 dev veth1
50 ip -n "$ns2" address add 2001:db8:1::2/64 dev veth1 nodad
53 ip netns exec "$ns2" sysctl -qw net.ipv6.conf.all.keep_addr_on_down=1
77 mac=$(ip -n "$ns2" -j link show dev veth1 | jq -r '.[]["address"]')
163 run_cmd "ip -n $ns2 link set dev veth1 down"
164 run_cmd "ip -n $ns2 link set dev veth1 up"
202 run_cmd "tc -n $ns2 qdisc add dev veth1 clsact"
[all …]
/tools/testing/selftests/net/netfilter/
A Drpath.sh37 setup_ns ns1 ns2
44 ip -net "$ns2" a a 192.168.23.1/24 dev v0
46 ip -net "$ns2" a a fec0:23::1/64 dev v0 nodad
49 ip -net "$ns2" link add d0 type dummy
50 ip -net "$ns2" link set d0 up
52 ip -net "$ns2" a a 192.168.42.1/24 dev d0
54 ip -net "$ns2" a a fec0:42::1/64 dev d0 nodad
112 ip netns exec "$ns2" "$1" -t raw -vS | \
134 ) | ip netns exec "$ns2" $nft -f -
175 ip -net "$ns2" link set vrf0 up
[all …]
A Dconntrack_tcp_unreplied.sh23 ip netns pids "$ns2" | xargs kill 2>/dev/null
51 setup_ns ns1 ns2
55 ip -net "$ns1" link set netns "$ns2" dev veth2
58 ip -net "$ns2" link set up dev lo
60 ip -net "$ns2" link set up dev veth2
62 ip -net "$ns2" addr add 10.11.11.2/24 dev veth2
63 ip -net "$ns2" route add default via 10.11.11.1
85 ip netns exec "$ns2" nft -f - <<EOF
103 echo "INFO: connect $ns1 -> $ns2 to the virtual ip"
126 ip netns exec "$ns2" nft -f - <<EOF
[all …]
A Dnft_conntrack_helper.sh24 ip netns del "$ns2"
29 setup_ns ns1 ns2
37 ip -net "$ns2" link set veth0 up
42 ip -net "$ns2" addr add 10.0.1.2/24 dev veth0
43 ip -net "$ns2" addr add dead:1::2/64 dev veth0 nodad
130 ip netns exec "$ns2" conntrack -F 2> /dev/null
138 check_for_helper "$ns2" "ipv6 $msg" "$port"
151 if ! load_ruleset_family inet "${ns2}"; then
153 if ! load_ruleset_family ip "${ns2}"; then
154 echo "FAIL: ${ns2} cannot load ip ruleset" 1>&2
[all …]
A Dnf_nat_edemux.sh23 setup_ns ns1 ns2
28 ip link set netns "$ns2" dev veth2
34 ip netns exec "$ns2" ip link set up dev lo
35 ip netns exec "$ns2" ip link set up dev veth2
36 ip netns exec "$ns2" ip addr add 192.168.1.2/24 dev veth2
44 ip netns exec "$ns2" sysctl -q net.ipv4.ip_local_port_range="10000 10000"
50 ip netns exec "$ns2" ip route add 10.96.0.1 via 192.168.1.1
53 ip netns exec "$ns2" socat -t 10 - TCP:192.168.1.1:5201 > /dev/null &
60 echo test | ip netns exec "$ns2" socat -t 3 -u STDIN TCP:10.96.0.1:443,connect-timeout=3 >/dev/null
74 sleep 5 | ip netns exec "$ns2" socat -t 5 -u STDIN TCP:192.168.1.1:5202,connect-timeout=5 >/dev/nul…
[all …]
A Dbridge_brouter.sh23 setup_ns nsbr ns1 ns2
29 ip link add veth1 netns "$nsbr" type veth peer name eth0 netns "$ns2"
46 ip -net "$ns2" link set eth0 up
48 ip -net "$ns2" addr add 10.0.0.12/24 dev eth0
79 echo "PASS: ${ns1}/${ns2} connectivity with active broute rule"
99 if ! ip netns exec "$ns2" ping -q -c 1 10.0.0.11 > /dev/null; then
104 echo "PASS: ${ns1}/${ns2} connectivity with active broute rule and bridge forward drop"
110 echo "ERROR: Could not reach ${ns2} from ${ns1}" 1>&2
114 if ! ip netns exec "$ns2" ping -c 1 -q 10.0.0.11 > /dev/null; then
115 echo "ERROR: Could not reach ${ns1} from ${ns2}" 1>&2
A Dnft_synproxy.sh11 setup_ns nsr ns1 ns2
17 ip netns pids "$ns2" | xargs kill 2>/dev/null
25 ip link add veth1 netns "$nsr" type veth peer name eth0 netns "$ns2"
38 for n in $ns1 $ns2; do
42 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0
44 ip -net "$ns2" route add default via 10.0.2.1
48 echo "ERROR: $ns1 cannot reach $ns2" 1>&2
52 if ! ip netns exec "$ns2" ping -c 1 -q 10.0.1.99 > /dev/null; then
53 echo "ERROR: $ns2 cannot reach $ns1" 1>&2
57 ip netns exec "$ns2" iperf3 -s > /dev/null 2>&1 &
A Dipvs.sh59 setup_ns ns0 ns1 ns2
78 ip netns exec "${ns2}" ip link set veth21 up
79 ip netns exec "${ns2}" ip addr add "${rip_v4}/24" dev veth21
80 ip netns exec "${ns2}" ip link set veth20 up
81 ip netns exec "${ns2}" ip addr add "${sip_v4}/24" dev veth20
130 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.arp_ignore=1
132 ip netns exec "${ns2}" ip addr add "${vip_v4}/32" dev lo:1
145 ip netns exec "${ns2}" ip link del veth20
163 ip netns exec "${ns2}" ip link set tunl0 up
164 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.arp_ignore=1
[all …]
A Dnft_nat.sh18 ip netns pids "$ns2" | xargs kill 2>/dev/null
30 setup_ns ns0 ns1 ns2
59 do_config "$ns2" 2
143 for i in "$ns0" "$ns1" "$ns2" ;do
392 echo "ERROR: cannot ping $ns1 from $ns2 via ipv6"
483 echo "ERROR: cannot ping $ns1 from $ns2 $natflags"
572 echo "ERROR: cannnot ping $ns1 from $ns2 via ipv6"
647 echo "ERROR: cannot ping $ns1 from $ns2"
659 bad_counter "$ns2" ns1$dir "$expect" "test_redirect 2"
1003 test $lret -eq 0 && echo "PASS: IP statless for $ns2"
[all …]
A Dnft_flowtable.sh31 setup_ns ns1 ns2 nsr1 nsr2
35 ip netns pids "$ns2" | xargs kill 2>/dev/null
115 ip -net "$ns2" link set eth0 mtu "$rmtu"
130 for ns in "$ns1" "$ns2";do
142 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0
144 ip -net "$ns2" route add default via 10.0.2.1
148 ip -net "$ns2" route add default via dead:2::1
185 ip netns exec "$ns2" nft -f - <<EOF
213 echo "ERROR: $ns2 cannot reach $ns1" 1>&2
460 if test_tcp_forwarding "$ns1" "$ns2"; then
[all …]
A Dnft_tproxy_tcp.sh35 ip netns pids "$ns2" | xargs kill 2>/dev/null
46 setup_ns ns1 ns2 ns3 nsrouter
52 ip link add veth1 netns "$nsrouter" type veth peer name eth0 netns "$ns2"
68 ip -net "$ns2" link set eth0 up
76 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0
77 ip -net "$ns2" addr add dead:2::99/64 dev eth0 nodad
78 ip -net "$ns2" route add default via 10.0.2.1
79 ip -net "$ns2" route add default via dead:2::1
229 busywait "$BUSYWAIT_TIMEOUT" listener_ready "$ns2" 8080 "-t"
347 echo "PASS: ${ns1} can reach ${ns2}"
[all …]
A Dnft_tproxy_udp.sh35 ip netns pids "$ns2" | xargs kill 2>/dev/null
46 setup_ns ns1 ns2 ns3 nsrouter
52 ip link add veth1 netns "$nsrouter" type veth peer name eth0 netns "$ns2"
68 ip -net "$ns2" link set eth0 up
76 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0
77 ip -net "$ns2" addr add dead:2::99/64 dev eth0 nodad
78 ip -net "$ns2" route add default via 10.0.2.1
79 ip -net "$ns2" route add default via dead:2::1
203 busywait "$BUSYWAIT_TIMEOUT" listener_ready "$ns2" 8080 "-u"
253 echo "PASS: ${ns1} can reach ${ns2}"
[all …]
/tools/testing/selftests/net/hsr/
A Dhsr_ping.sh35 do_ping "$ns2" 100.64.0.1
40 do_ping "$ns2" 100.64.0.3
45 do_ping "$ns2" dead:beef:1::1
46 do_ping "$ns2" dead:beef:1::2
237 do_ping "$ns2" 100.64.2.1
238 do_ping "$ns2" 100.64.3.1
239 do_ping "$ns2" 100.64.4.1
240 do_ping "$ns2" 100.64.5.1
242 do_ping "$ns2" 100.64.2.3
273 setup_ns ns1 ns2 ns3
[all …]
A Dhsr_redbox.sh13 do_ping "${ns2}" 100.64.0.1
75 ip link add ns1eth1 netns "${ns1}" type veth peer name ns2eth1 netns "${ns2}"
86 ip -n "${ns2}" link set ns2eth1 up
87 ip -n "${ns2}" link set ns2eth2 up
88 ip -n "${ns2}" link set ns2eth3 up
102 ip -net "$ns2" link set address 00:11:22:00:02:01 dev ns2eth1
103 ip -net "$ns2" link set address 00:11:22:00:02:02 dev ns2eth2
104 ip -net "$ns2" link set address 00:11:22:00:02:03 dev ns2eth3
118 ip -n "${ns2}" addr add 100.64.0.2/24 dev hsr2
125 ip -n "${ns2}" link set hsr2 up
[all …]
/tools/testing/selftests/bpf/
A Dtest_tc_tunnel.sh12 readonly ns2="${ns_prefix}2"
30 ip netns add "${ns2}"
33 peer name veth2 mtu 1500 netns "${ns2}"
38 ip -netns "${ns2}" link set veth2 up
41 ip -netns "${ns2}" -4 addr add "${ns2_v4}/24" dev veth2
57 ip netns del "${ns2}"
277 ethaddr=$(ip netns exec "${ns2}" ip link show veth2 | \
285 ip netns exec "${ns2}" ip link set lo up
298 ip netns exec "${ns2}" ip link set dev testtun0 up
312 ip netns exec "${ns2}" ip link del dev testtun0
[all …]

Completed in 46 milliseconds

12