Home
last modified time | relevance | path

Searched full:ns2 (Results 1 – 25 of 123) sorted by relevance

12345

/openbmc/linux/tools/testing/selftests/net/mptcp/
H A Dmptcp_join.sh28 ns2=""
93 ns2="ns2-$rndh"
96 for netns in "$ns1" "$ns2"; do
111 # ns1 ns2
119 ip link add ns1eth$i netns "$ns1" type veth peer name ns2eth$i netns "$ns2"
124 ip -net "$ns2" addr add 10.0.$i.2/24 dev ns2eth$i
125 ip -net "$ns2" addr add dead:beef:$i::2/64 dev ns2eth$i nodad
126 ip -net "$ns2" link set ns2eth$i up
128 # let $ns2 reach any $ns1 address from any interface
129 ip -net "$ns2" route add default via 10.0.$i.1 dev ns2eth$i metric 10$i
[all …]
H A Duserspace_pm.sh60 ns2="ns2-$rndh"
126 for netns in "$ns1" "$ns2" ;do
138 for i in "$ns1" "$ns2" ;do
145 # "$ns1" ns2
148 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth1 netns "$ns2"
157 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
158 ip -net "$ns2" addr add 10.0.2.2/24 dev ns2eth1
159 ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad
160 ip -net "$ns2" addr add dead:beef:2::2/64 dev ns2eth1 nodad
161 ip -net "$ns2" link set ns2eth1 up
[all …]
H A Dsimult_flows.sh9 ns2="ns2-$rndh"
34 for netns in "$ns1" "$ns2" "$ns3";do
47 # "$ns1" ns2 ns3
67 for i in "$ns1" "$ns2" "$ns3";do
74 ip link add ns1eth1 netns "$ns1" type veth peer name ns2eth1 netns "$ns2"
75 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth2 netns "$ns2"
76 ip link add ns2eth3 netns "$ns2" type veth peer name ns3eth1 netns "$ns3"
93 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
94 ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad
95 ip -net "$ns2" link set ns2eth1 up mtu 1500
[all …]
H A Dmptcp_connect.sh131 ns2="ns2-$rndh"
148 for netns in "$ns1" "$ns2" "$ns3" "$ns4";do
172 for i in "$ns1" "$ns2" "$ns3" "$ns4";do
177 # "$ns1" ns2 ns3 ns4
182 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth1 netns "$ns2"
183 ip link add ns2eth3 netns "$ns2" type veth peer name ns3eth2 netns "$ns3"
193 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
194 ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad
195 ip -net "$ns2" link set ns2eth1 up
197 ip -net "$ns2" addr add 10.0.2.1/24 dev ns2eth3
[all …]
H A Dmptcp_sockopt.sh21 ns2="ns2-$rndh"
45 for netns in "$ns1" "$ns2" "$ns_sbox";do
55 ip link add ns1eth$i netns "$ns1" type veth peer name ns2eth$i netns "$ns2"
60 ip -net "$ns2" addr add 10.0.$i.2/24 dev ns2eth$i
61 ip -net "$ns2" addr add dead:beef:$i::2/64 dev ns2eth$i nodad
62 ip -net "$ns2" link set ns2eth$i up
64 # let $ns2 reach any $ns1 address from any interface
65 ip -net "$ns2" route add default via 10.0.$i.1 dev ns2eth$i metric 10$i
70 ip netns exec $ns2 ./pm_nl_ctl add 10.0.$i.2 flags signal
71 ip netns exec $ns2 ./pm_nl_ctl add dead:beef:$i::2 flags signal
[all …]
/openbmc/linux/tools/testing/selftests/netfilter/
H A Drpath.sh37 ns2="ns2-$sfx"
38 trap "ip netns del $ns1; ip netns del $ns2" EXIT
40 # create two netns, disable rp_filter in ns2 and
43 ip netns add "$ns2"
44 ip netns exec "$ns2" sysctl -q net.ipv4.conf.all.rp_filter=0
45 ip netns exec "$ns2" sysctl -q net.ipv4.conf.default.rp_filter=0
46 ip netns exec "$ns2" sysctl -q net.ipv6.conf.all.keep_addr_on_down=1
49 ip -net "$ns1" link add v0 type veth peer name v0 netns "$ns2"
50 ip -net "$ns1" link set v0 up; ip -net "$ns2" link set v0 up
52 ip -net "$ns2" a a 192.168.23.1/24 dev v0
[all …]
H A Dconntrack_tcp_unreplied.sh14 ns2="ns2-$sfx"
30 ip netns pids $ns2 | xargs kill 2>/dev/null
33 ip netns del $ns2
47 cnt=$(ip netns exec $ns2 nft list counter inet filter "$name" | grep -q "$expect")
49 echo "ERROR: counter $name in $ns2 has unexpected value (expected $expect)" 1>&2
50 ip netns exec $ns2 nft list counter inet filter "$name" 1>&2
62 ip netns add $ns2 || exit 1
66 ip -net $ns1 link set netns $ns2 dev veth2
69 ip -net $ns2 link set up dev lo
71 ip -net $ns2 link set up dev veth2
[all …]
H A Dnft_nat.sh14 ns2="ns2-$sfx"
47 ip netns add "$ns2"
49 echo "SKIP: Could not create net namespace $ns2"
58 ip link add veth1 netns "$ns0" type veth peer name eth0 netns "$ns2"
216 cnt=$(ip netns exec "$ns0" nft list counter inet filter ns2${dir} | grep -q "$expect")
218 bad_counter "$ns0" ns2$dir "$expect" "test_local_dnat6 2"
233 # expect 1 packet in ns2
236 cnt=$(ip netns exec "$ns2" nft list counter inet filter ns0${dir} | grep -q "$expect")
238 bad_counter "$ns2" ns0$dir "$expect" "test_local_dnat6 4"
243 test $lret -eq 0 && echo "PASS: ipv6 ping to $ns1 was $family NATted to $ns2"
[all …]
H A Dnft_conntrack_helper.sh13 ns2="ns2-$sfx"
19 ip netns del ${ns2}
49 ip netns add ${ns2}
51 ip link add veth0 netns ${ns1} type veth peer name veth0 netns ${ns2} > /dev/null 2>&1
60 ip -net ${ns2} link set lo up
61 ip -net ${ns2} link set veth0 up
66 ip -net ${ns2} addr add 10.0.1.2/24 dev veth0
67 ip -net ${ns2} addr add dead:1::2/64 dev veth0
134 sleep 3 | ip netns exec ${ns2} nc -w 2 -l -p $port > /dev/null &
140 check_for_helper "$ns2" "ip $msg" $port $autoassign
[all …]
H A Dnft_flowtable.sh19 ns2="ns2-$sfx"
46 ip netns add $ns2
51 ip netns del $ns2
67 ip link add veth1 netns $nsr2 type veth peer name eth0 netns $ns2
81 # to ns2 (smaller MTU) to stack either to perform fragmentation (ip_no_pmtu_disc=1),
83 # ns2 is going via nsr2 with a smaller mtu, so that TCPMSS announced by both peers
120 ip -net $ns2 link set eth0 mtu $rmtu
135 for ns in $ns1 $ns2;do
148 ip -net $ns2 addr add 10.0.2.99/24 dev eth0
150 ip -net $ns2 route add default via 10.0.2.1
[all …]
H A Dipvs.sh20 # | ns2 |
71 ip netns add ns2
74 ip link add veth02 netns ns0 type veth peer name veth20 netns ns2
75 ip link add veth12 netns ns1 type veth peer name veth21 netns ns2
91 ip netns exec ns2 ip link set lo up
92 ip netns exec ns2 ip link set veth21 up
93 ip netns exec ns2 ip addr add ${rip_v4}/24 dev veth21
94 ip netns exec ns2 ip link set veth20 up
95 ip netns exec ns2 ip addr add ${sip_v4}/24 dev veth20
117 ip netns exec ns2 nc -l -p 8080 > "${outfile}" &
[all …]
H A Dnf_nat_edemux.sh13 ns2="ns2-$sfx"
18 ip netns del $ns2
47 ip netns add $ns2
52 ip link set netns $ns2 dev veth2
58 ip netns exec $ns2 ip link set up dev lo
59 ip netns exec $ns2 ip link set up dev veth2
60 ip netns exec $ns2 ip addr add 192.168.1.2/24 dev veth2
68 ip netns exec $ns2 sysctl -q net.ipv4.ip_local_port_range="10000 10000"
71 ip netns exec $ns2 iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-destin…
74 ip netns exec $ns2 ip route add 10.96.0.1 via 192.168.1.1
[all …]
H A Dnft_synproxy.sh12 ns2="ns2-$rnd" # iperf server
29 ip netns add $ns2
33 ip netns pids $ns2 | xargs kill 2>/dev/null
35 ip netns del $ns2
43 ip link add veth1 netns $nsr type veth peer name eth0 netns $ns2
56 for n in $ns1 $ns2; do
61 ip -net $ns2 addr add 10.0.2.99/24 dev eth0
63 ip -net $ns2 route add default via 10.0.2.1
67 echo "ERROR: $ns1 cannot reach $ns2" 1>&2
71 if ! ip netns exec $ns2 ping -c 1 -q 10.0.1.99 > /dev/null; then
[all …]
H A Dbridge_brouter.sh8 # setup is: ns1 <-> ns0 <-> ns2
28 ip netns add ns2
35 ip link add veth1 netns ns0 type veth peer name eth0 netns ns2
52 # place both in same subnet, ns1 and ns2 connected via ns0:br0
80 # an ip address in same network segment as ns1 and ns2 (ns0
93 echo "PASS: ns1/ns2 connectivity with active broute rule"
115 ip netns exec ns2 ping -q -c 1 10.0.0.11 > /dev/null
121 echo "PASS: ns1/ns2 connectivity with active broute rule and bridge forward drop"
128 echo "ERROR: Could not reach ns2 from ns1" 1>&2
132 ip netns exec ns2 ping -c 1 -q 10.0.0.11 > /dev/null
[all …]
/openbmc/linux/tools/testing/selftests/bpf/
H A Dtest_lwt_ip_encap.sh6 # NS1 NS2 NS3
21 # NS1/NS2 are configured to route packets to IPv*_GRE via IP*_8
26 # 1. routes NS2->IPv*_DST are brought down, so the only way a ping
49 readonly NS2="ns2-$(mktemp -u XXXXXX)"
113 ip netns add "${NS2}"
118 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.all.rp_filter=0
121 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.default.rp_filter=0
126 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.all.accept_dad=0
129 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.default.accept_dad=0
137 ip netns exec ${NS2} sysctl -wq net.ipv4.ip_forward=1
[all …]
H A Dtest_xdp_meta.sh7 readonly NS2="ns2-$(mktemp -u XXXXXX)"
20 ip netns del ${NS2} 2> /dev/null
31 ip netns add ${NS2}
38 ip link set veth2 netns ${NS2}
41 ip netns exec ${NS2} ip addr add 10.1.1.22/24 dev veth2
44 ip netns exec ${NS2} tc qdisc add dev veth2 clsact
47 ip netns exec ${NS2} tc filter add dev veth2 ingress bpf da obj ${BPF_FILE} sec t
50 ip netns exec ${NS2} ip link set dev veth2 xdp obj ${BPF_FILE} sec x
53 ip netns exec ${NS2} ip link set dev veth2 up
56 ip netns exec ${NS2} ping -c 1 10.1.1.11
H A Dtest_tc_tunnel.sh12 readonly ns2="${ns_prefix}2"
30 ip netns add "${ns2}"
33 peer name veth2 mtu 1500 netns "${ns2}"
38 ip -netns "${ns2}" link set veth2 up
41 ip -netns "${ns2}" -4 addr add "${ns2_v4}/24" dev veth2
43 ip -netns "${ns2}" -6 addr add "${ns2_v6}/64" dev veth2 nodad
57 ip netns del "${ns2}"
73 ip netns exec "${ns2}" nc "${netcat_opt}" -l "${port}" > "${outfile}" &
97 if ip netns exec "${ns2}" ss ${2:--4}OHntl | grep -q "$1"; then
234 ip netns exec "${ns2}" ip fou add port $dport ipproto ${dproto}
[all …]
H A Dtest_xdp_vlan.sh8 readonly NS2="ns2-$(mktemp -u XXXXXX)"
55 echo " ip netns exec ${NS2} bash"
62 ip netns del ${NS2} 2> /dev/null
132 ip netns del ${NS2} 2> /dev/null
150 ip netns add ${NS2}
160 ip link set veth2 netns ${NS2}
168 ip netns exec ${NS2} ethtool -K veth2 rxvlan off
170 # Disable tx-vlan-offload (mostly needed on ns2)
171 ip netns exec ${NS2} ethtool -K veth2 txvlan off
181 # In ns2/veth2 create VLAN device
[all …]
H A Dtest_xdp_redirect.sh5 # NS1(veth11) NS2(veth22)
14 readonly NS2="ns2-$(mktemp -u XXXXXX)"
23 ip netns add ${NS2}
26 ip link add veth2 index 222 type veth peer name veth22 netns ${NS2}
31 ip -n ${NS2} link set dev veth22 up
34 ip -n ${NS2} addr add 10.1.1.22/24 dev veth22
42 ip netns del ${NS2} 2> /dev/null
58 ip -n ${NS2} link set veth22 $xdpmode obj xdp_dummy.bpf.o sec xdp &> /dev/null
63 ip netns exec ${NS2} ping -c 1 10.1.1.11 &> /dev/null; then
H A Dtest_lwt_seg6local.sh4 # NS1 ---- NS2 ---- NS3 ---- NS4 ---- NS5 ---- NS6
8 # All IPv6 packets going to fb00::/16 through NS2 will be encapsulated in a
28 readonly NS2="ns2-$(mktemp -u XXXXXX)"
52 ip netns del ${NS2} 2> /dev/null
63 ip netns add ${NS2}
78 ip link set veth2 netns ${NS2}
79 ip link set veth3 netns ${NS2}
89 ip netns exec ${NS2} ip link set dev veth2 up
90 ip netns exec ${NS2} ip link set dev veth3 up
103 ip netns exec ${NS2} ip -6 addr add fb00::21/16 dev veth2 scope link
[all …]
/openbmc/linux/tools/testing/selftests/net/hsr/
H A Dhsr_ping.sh33 ns2="ns2-$rndh"
39 for netns in "$ns1" "$ns2" "$ns3" ;do
117 do_ping "$ns2" 100.64.0.1
122 do_ping "$ns2" 100.64.0.3
127 do_ping "$ns2" dead:beef:1::1
128 do_ping "$ns2" dead:beef:1::2
160 do_ping_long "$ns2" 100.64.0.1
161 do_ping_long "$ns2" dead:beef:1::1
162 do_ping_long "$ns2" 100.64.0.3
163 do_ping_long "$ns2" dead:beef:1::2
[all …]
/openbmc/linux/samples/bpf/
H A Dtc_l2_redirect.sh18 $IP netns add ns2
26 $IP link set dev vens2 netns ns2
35 $IP -n ns2 link set dev lo up
36 $IP -n ns2 link set dev vens2 up
37 $IP -n ns2 addr add 10.2.1.102/24 dev vens2
38 $IP -n ns2 addr add 2401:db02::66/64 dev vens2 nodad
39 $IP -n ns2 addr add 10.10.1.102 dev lo
40 $IP -n ns2 addr add 2401:face::66/64 dev lo nodad
41 $IP -n ns2 link add ipt2 type ipip local 10.2.1.102 remote 10.2.1.1
42 $IP -n ns2 link add ip6t2 type ip6tnl mode any local 2401:db02::66 remote 2401:db02::1
[all …]
/openbmc/linux/tools/testing/selftests/net/
H A Dtest_vxlan_mdb.sh259 local ns2=$1; shift
264 ip netns add $ns2
268 ip link set dev veth1 netns $ns2 name veth0
271 setup_common_ns $ns2 $local_addr2
981 local ns2=$1; shift
996 run_cmd "tc -n $ns2 qdisc replace dev veth0 clsact"
997 run_cmd "tc -n $ns2 qdisc replace dev vx0 clsact"
998 run_cmd "ip -n $ns2 address replace $vtep1_ip/$plen dev lo"
999 run_cmd "ip -n $ns2 address replace $vtep2_ip/$plen dev lo"
1005 …run_cmd "tc -n $ns2 filter replace dev vx0 ingress pref 1 handle 101 proto all flower enc_dst_ip $…
[all …]
H A Dicmp.sh7 # | ns1 | v4-via-v6 routes: | ns2 |
17 # unreachable" message being sent from ns2, but there is no IPv4 address set in
22 NS2=ns2
36 ip netns del $NS2
43 ip netns add $NS2
46 ip -netns $NS1 link add veth0 type veth peer name veth0 netns $NS2
48 ip -netns $NS2 link set dev veth0 up
51 ip -netns $NS2 addr add $H2_IP6/64 dev veth0 nodad
53 ip -netns $NS2 route add $RT2 via inet6 $H1_IP6
55 # Make sure ns2 will respond with ICMP unreachable
[all …]
H A Dbareudp.sh24 # * NS1 and NS2 are the intermediate namespaces. They use a bareudp device to
70 # | | NS2 |
115 readonly NS2=$(mktemp -u ns2-XXXXXXXX)
137 # Create the four network namespaces used by the script (NS0, NS1, NS2 and NS3)
145 ip netns add "${NS2}" || exit_cleanup "${NS0}" "${NS1}"
146 ip netns add "${NS3}" || exit_cleanup "${NS0}" "${NS1}" "${NS2}"
153 exit_cleanup "${NS0}" "${NS1}" "${NS2}" "${NS3}"
185 # NS1 with NS2, etc.),
191 for ns in "${NS0}" "${NS1}" "${NS2}" "${NS3}"; do
196 ip link add name veth12 netns "${NS1}" type veth peer name veth21 netns "${NS2}"
[all …]

12345