| /linux/tools/testing/selftests/net/mptcp/ | 
| H A D | mptcp_join.sh | 28 ns2=""110 	mptcp_lib_ns_init ns1 ns2
 113 	for netns in "$ns1" "$ns2"; do
 123 	#  ns1         ns2
 131 		ip link add ns1eth$i netns "$ns1" type veth peer name ns2eth$i netns "$ns2"
 136 		ip -net "$ns2" addr add 10.0.$i.2/24 dev ns2eth$i
 137 		ip -net "$ns2" addr add dead:beef:$i::2/64 dev ns2eth$i nodad
 138 		ip -net "$ns2" link set ns2eth$i up
 140 		# let $ns2 reach any $ns1 address from any interface
 141 		ip -net "$ns2" route add default via 10.0.$i.1 dev ns2eth$i metric 10$i
 [all …]
 
 | 
| H A D | userspace_pm.sh | 54 ns2=""110 	mptcp_lib_ns_exit "${ns1}" "${ns2}"
 121 mptcp_lib_ns_init ns1 ns2
 150 for i in "$ns1" "$ns2" ;do
 154 #  "$ns1"              ns2
 157 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth1 netns "$ns2"
 166 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
 167 ip -net "$ns2" addr add 10.0.2.2/24 dev ns2eth1
 168 ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad
 169 ip -net "$ns2" addr add dead:beef:2::2/64 dev ns2eth1 nodad
 [all …]
 
 | 
| H A D | simult_flows.sh | 12 ns2=""45 	mptcp_lib_ns_exit "${ns1}" "${ns2}" "${ns3}"
 51 #  "$ns1"              ns2                    ns3
 71 	mptcp_lib_ns_init ns1 ns2 ns3
 73 	ip link add ns1eth1 netns "$ns1" type veth peer name ns2eth1 netns "$ns2"
 74 	ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth2 netns "$ns2"
 75 	ip link add ns2eth3 netns "$ns2" type veth peer name ns3eth1 netns "$ns3"
 92 	ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
 93 	ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad
 94 	ip -net "$ns2" link set ns2eth1 up mtu 1500
 [all …]
 
 | 
| H A D | mptcp_connect.sh | 130 ns2=""145 	mptcp_lib_ns_exit "${ns1}" "${ns2}" "${ns3}" "${ns4}"
 160 mptcp_lib_ns_init ns1 ns2 ns3 ns4
 162 #  "$ns1"              ns2                    ns3                     ns4
 167 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth1 netns "$ns2"
 168 ip link add ns2eth3 netns "$ns2" type veth peer name ns3eth2 netns "$ns3"
 178 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
 179 ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad
 180 ip -net "$ns2" link set ns2eth1 up
 182 ip -net "$ns2" addr add 10.0.2.1/24 dev ns2eth3
 [all …]
 
 | 
| /linux/tools/testing/selftests/net/netfilter/ | 
| H A D | rpath.sh | 37 setup_ns ns1 ns238 ip netns exec "$ns2" sysctl -q net.ipv6.conf.all.keep_addr_on_down=1
 41 ip -net "$ns1" link add v0 type veth peer name v0 netns "$ns2"
 42 ip -net "$ns1" link set v0 up; ip -net "$ns2" link set v0 up
 44 ip -net "$ns2" a a 192.168.23.1/24 dev v0
 46 ip -net "$ns2" a a fec0:23::1/64 dev v0 nodad
 48 # rp filter testing: ns1 sends packets via v0 which ns2 would route back via d0
 49 ip -net "$ns2" link add d0 type dummy
 50 ip -net "$ns2" link set d0 up
 52 ip -net "$ns2"
 [all...]
 | 
| H A D | nft_nat.sh | 18 	ip netns pids "$ns2" | xargs kill 2>/dev/null30 setup_ns ns0 ns1 ns2
 36 ip link add veth1 netns "$ns0" type veth peer name eth0 netns "$ns2"
 59 do_config "$ns2" 2
 143 	for i in "$ns0" "$ns1" "$ns2" ;do
 188 		if ! ip netns exec "$ns0" nft list counter inet filter "ns2${dir}" | grep -q "$expect";then
 189 			bad_counter "$ns0" ns2$dir "$expect" "test_local_dnat6 2"
 203 	# expect 1 packet in ns2
 206 		if ! ip netns exec "$ns2" nft list counter inet filter "ns0${dir}" | grep -q "$expect";then
 207 			bad_counter "$ns2" ns
 [all...]
 | 
| H A D | conntrack_tcp_unreplied.sh | 23 	ip netns pids "$ns2" | xargs kill 2>/dev/null39 	if ! ip netns exec "$ns2" nft list counter inet filter "$name" | grep -q "$expect"; then
 40 		echo "ERROR: counter $name in $ns2 has unexpected value (expected $expect)" 1>&2
 41 		ip netns exec "$ns2" nft list counter inet filter "$name" 1>&2
 51 setup_ns ns1 ns2
 55 ip -net "$ns1" link set netns "$ns2" dev veth2
 58 ip -net "$ns2" link set up dev lo
 60 ip -net "$ns2" link set up dev veth2
 62 ip -net "$ns2" addr add 10.11.11.2/24 dev veth2
 63 ip -net "$ns2" route add default via 10.11.11.1
 [all …]
 
 | 
| H A D | nft_conntrack_helper.sh | 24 	ip netns del "$ns2"29 setup_ns ns1 ns2
 31 if ! ip link add veth0 netns "$ns1" type veth peer name veth0 netns "$ns2" > /dev/null 2>&1;then
 37 ip -net "$ns2" link set veth0 up
 42 ip -net "$ns2" addr add 10.0.1.2/24 dev veth0
 43 ip -net "$ns2" addr add dead:1::2/64 dev veth0 nodad
 117 	ip netns exec "$ns2" socat -t 3 -u -4 TCP-LISTEN:"$port",reuseaddr STDOUT > /dev/null &
 118 	busywait "$BUSYWAIT_TIMEOUT" listener_ready "$ns2" "$port" "-4"
 123 	check_for_helper "$ns2" "ip $msg" "$port" "$autoassign"
 130 	ip netns exec "$ns2" conntrack -F 2> /dev/null
 [all …]
 
 | 
| H A D | nft_flowtable.sh | 32 setup_ns ns1 ns2 nsr1 nsr236 	ip netns pids "$ns2" | xargs kill 2>/dev/null
 52 ip link add veth1 netns "$nsr2" type veth peer name eth0 netns "$ns2"
 66 # to ns2 (smaller MTU) to stack either to perform fragmentation (ip_no_pmtu_disc=1),
 68 # ns2 is going via nsr2 with a smaller mtu, so that TCPMSS announced by both peers
 120 ip -net "$ns2" link set eth0 mtu "$rmtu"
 135 for ns in "$ns1" "$ns2";do
 147 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0
 149 ip -net "$ns2" route add default via 10.0.2.1
 151 ip -net "$ns2" addr add dead:2::99/64 dev eth0 nodad
 [all …]
 
 | 
| H A D | nf_nat_edemux.sh | 45 setup_ns ns1 ns250 ip link set netns "$ns2" dev veth2
 56 ip netns exec "$ns2" ip link set up dev lo
 57 ip netns exec "$ns2" ip link set up dev veth2
 58 ip netns exec "$ns2" ip addr add 192.168.1.2/24 dev veth2
 66 ip netns exec "$ns2" sysctl -q net.ipv4.ip_local_port_range="10000 10000"
 69 ip netns exec "$ns2" iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-dest…
 72 ip netns exec "$ns2" ip route add 10.96.0.1 via 192.168.1.1
 78 sleep 10 | ip netns exec "$ns2" socat -t 10 - TCP:192.168.1.1:5201 > /dev/null &
 80 busywait "$BUSYWAIT_TIMEOUT" connect_done "$ns2" "5201"
 [all …]
 
 | 
| H A D | nft_synproxy.sh | 11 setup_ns nsr ns1 ns217 	ip netns pids "$ns2" | xargs kill 2>/dev/null
 25 ip link add veth1 netns "$nsr" type veth peer name eth0 netns "$ns2"
 38 for n in $ns1 $ns2; do
 42 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0
 44 ip -net "$ns2" route add default via 10.0.2.1
 48   echo "ERROR: $ns1 cannot reach $ns2" 1>&2
 52 if ! ip netns exec "$ns2" ping -c 1 -q 10.0.1.99 > /dev/null; then
 53   echo "ERROR: $ns2 cannot reach $ns1" 1>&2
 57 ip netns exec "$ns2" iperf3 -s > /dev/null 2>&1 &
 [all …]
 
 | 
| H A D | ipvs.sh | 20 #                      |         ns2                           |59 	setup_ns ns0 ns1 ns2
 62 	ip link add veth02 netns "${ns0}" type veth peer name veth20 netns "${ns2}"
 63 	ip link add veth12 netns "${ns1}" type veth peer name veth21 netns "${ns2}"
 78 	ip netns exec "${ns2}" ip link set veth21 up
 79 	ip netns exec "${ns2}" ip addr add "${rip_v4}/24" dev veth21
 80 	ip netns exec "${ns2}" ip link set veth20 up
 81 	ip netns exec "${ns2}" ip addr add "${sip_v4}/24" dev veth20
 100 	ip netns exec "$ns2" timeout 5 socat -u -4 TCP-LISTEN:8080,reuseaddr STDOUT > "${outfile}" &
 130 	ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.arp_ignore=1
 [all …]
 
 | 
| H A D | bridge_brouter.sh | 8 # setup is: ns1 <-> nsbr <-> ns223 setup_ns nsbr ns1 ns2
 29 ip link add veth1 netns "$nsbr" type veth peer name eth0 netns "$ns2"
 44 # place both in same subnet, ${ns1} and ${ns2} connected via ${nsbr}:br0
 46 ip -net "$ns2" link set eth0 up
 48 ip -net "$ns2" addr add 10.0.0.12/24 dev eth0
 69 	# an ip address in same network segment as ${ns1} and ${ns2} (${nsbr}
 79 	echo "PASS: ${ns1}/${ns2} connectivity with active broute rule"
 99 	if ! ip netns exec "$ns2" ping -q -c 1 10.0.0.11 > /dev/null; then
 104 	echo "PASS: ${ns1}/${ns2} connectivit
 [all...]
 | 
| H A D | nft_tproxy_udp.sh | 7 # |ns1    |.99          .1|            |.1             .99|    ns2|35 	ip netns pids "$ns2" | xargs kill 2>/dev/null
 46 setup_ns ns1 ns2 ns3 nsrouter
 52 ip link add veth1 netns "$nsrouter" type veth peer name eth0 netns "$ns2"
 68 ip -net "$ns2" link set eth0 up
 76 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0
 77 ip -net "$ns2" addr add dead:2::99/64 dev eth0 nodad
 78 ip -net "$ns2" route add default via 10.0.2.1
 79 ip -net "$ns2" route add default via dead:2::1
 196 …timeout "$timeout" ip netns exec "$ns2" socat "$socat_ipproto" udp-listen:8080,fork SYSTEM:"echo P…
 [all …]
 
 | 
| H A D | nft_tproxy_tcp.sh | 7 # |ns1    |.99          .1|            |.1             .99|    ns2|35 	ip netns pids "$ns2" | xargs kill 2>/dev/null
 46 setup_ns ns1 ns2 ns3 nsrouter
 52 ip link add veth1 netns "$nsrouter" type veth peer name eth0 netns "$ns2"
 68 ip -net "$ns2" link set eth0 up
 76 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0
 77 ip -net "$ns2" addr add dead:2::99/64 dev eth0 nodad
 78 ip -net "$ns2" route add default via 10.0.2.1
 79 ip -net "$ns2" route add default via dead:2::1
 222 …timeout "$timeout" ip netns exec "$ns2" socat "$socat_ipproto" tcp-listen:8080,fork SYSTEM:"echo P…
 [all …]
 
 | 
| /linux/tools/testing/selftests/bpf/ | 
| H A D | test_lwt_ip_encap.sh |  | 
| H A D | test_tc_tunnel.sh | 12 readonly ns2="${ns_prefix}2"30 	ip netns add "${ns2}"
 33 	      peer name veth2 mtu 1500 netns "${ns2}"
 38 	ip -netns "${ns2}" link set veth2 up
 41 	ip -netns "${ns2}" -4 addr add "${ns2_v4}/24" dev veth2
 43 	ip -netns "${ns2}" -6 addr add "${ns2_v6}/64" dev veth2 nodad
 57 	ip netns del "${ns2}"
 73 	ip netns exec "${ns2}" nc "${netcat_opt}" -l "${port}" > "${outfile}" &
 97 		if ip netns exec "${ns2}" ss ${2:--4}OHntl | grep -q "$1"; then
 234 	ip netns exec "${ns2}" ip fou add port $dport ipproto ${dproto}
 [all …]
 
 | 
| H A D | test_xdp_vlan.sh |  | 
| /linux/samples/bpf/ | 
| H A D | tc_l2_redirect.sh | 18 	$IP netns add ns226 	$IP link set dev vens2 netns ns2
 35 	$IP -n ns2 link set dev lo up
 36 	$IP -n ns2 link set dev vens2 up
 37 	$IP -n ns2 addr add 10.2.1.102/24 dev vens2
 38 	$IP -n ns2 addr add 2401:db02::66/64 dev vens2 nodad
 39 	$IP -n ns2 addr add 10.10.1.102 dev lo
 40 	$IP -n ns2 addr add 2401:face::66/64 dev lo nodad
 41 	$IP -n ns2 link add ipt2 type ipip local 10.2.1.102 remote 10.2.1.1
 42 	$IP -n ns2 link add ip6t2 type ip6tnl mode any local 2401:db02::66 remote 2401:db02::1
 [all …]
 
 | 
| /linux/tools/testing/selftests/net/ | 
| H A D | ipv6_force_forwarding.sh | 14     cleanup_ns $ns1 $ns2 $ns321     setup_ns ns1 ns2 ns3
 23     # Create veth pairs: ns1 <-> ns2 <-> ns3
 29     ip link set veth21 netns $ns2
 30     ip link set veth23 netns $ns2
 35     ip -n $ns2 addr add 2001:db8:1::2/64 dev veth21 nodad
 36     ip -n $ns2 addr add 2001:db8:2::1/64 dev veth23 nodad
 41     ip -n $ns2 link set veth21 up
 42     ip -n $ns2 link set veth23 up
 50     ip netns exec $ns2 sysctl -qw net.ipv6.conf.all.forwarding=0
 [all …]
 
 | 
| H A D | test_vxlan_mdb.sh | 259 	local ns2=$1; shift265 	ip link set dev veth1 netns $ns2 name veth0
 268 	setup_common_ns $ns2 $local_addr2
 1174 	local ns2=$1; shift
 1189 	run_cmd "tc -n $ns2 qdisc replace dev veth0 clsact"
 1190 	run_cmd "tc -n $ns2 qdisc replace dev vx0 clsact"
 1191 	run_cmd "ip -n $ns2 address replace $vtep1_ip/$plen dev lo"
 1192 	run_cmd "ip -n $ns2 address replace $vtep2_ip/$plen dev lo"
 1198 …run_cmd "tc -n $ns2 filter replace dev vx0 ingress pref 1 handle 101 proto all flower enc_dst_ip $…
 1200 	tc_check_packets "$ns2" "dev vx0 ingress" 101 1
 [all …]
 
 | 
| H A D | msg_zerocopy.sh | 16 readonly NS2="${NSPREFIX}2"87 	ip netns del "${NS2}"
 95 ip netns add "${NS2}"
 99 ip netns exec "${NS2}" sysctl -w -q "${path_sysctl_mem}=1000000"
 102   peer name "${DEV}" mtu "${DEV_MTU}" netns "${NS2}"
 104 ip link add "${DUMMY_DEV}" mtu "${DEV_MTU}" netns "${NS2}" type dummy
 108 ip -netns "${NS2}" link set "${DEV}" up
 109 ip -netns "${NS2}" link set "${DUMMY_DEV}" up
 113 ip -netns "${NS2}" link set dev "${DEV}" address 06:06:06:06:06:06
 117 ip -netns "${NS2}" addr add "${DADDR}/${MASK}" dev "${DEV}" ${NODAD}
 [all …]
 
 | 
| H A D | bareudp.sh | 24 #   * NS1 and NS2 are the intermediate namespaces. They use a bareudp device to70 # |   |                              NS2                                  |
 127 # Create the four network namespaces used by the script (NS0, NS1, NS2 and NS3)
 133 	setup_ns NS0 NS1 NS2 NS3 || exit_cleanup
 165 #     NS1 with NS2, etc.),
 172 	ip link add name veth12 netns "${NS1}" type veth peer name veth21 netns "${NS2}"
 173 	ip link add name veth23 netns "${NS2}" type veth peer name veth32 netns "${NS3}"
 177 	iface_config "${NS2}" veth21 192.0.2.22 192.0.2.21/32 2001:db8::22 2001:db8::21/128
 178 	iface_config "${NS2}" veth23 192.0.2.32 192.0.2.33/32 2001:db8::32 2001:db8::33/128
 182 	tc -netns "${NS2}" qdis
 [all...]
 | 
| H A D | icmp.sh | 7 # | ns1                  |    v4-via-v6 routes:     | ns2                |17 # unreachable" message being sent from ns2, but there is no IPv4 address set in
 35     cleanup_ns $NS1 $NS2
 41 setup_ns NS1 NS2
 44 ip -netns $NS1 link add veth0 type veth peer name veth0 netns $NS2
 46 ip -netns $NS2 link set dev veth0 up
 49 ip -netns $NS2 addr add $H2_IP6/64 dev veth0 nodad
 51 ip -netns $NS2 route add $RT2 via inet6 $H1_IP6
 53 # Make sure ns2 will respond with ICMP unreachable
 54 ip netns exec $NS2 sysctl -qw net.ipv4.icmp_ratelimit=0 net.ipv4.ip_forward=1
 
 | 
| /linux/tools/testing/selftests/net/hsr/ | 
| H A D | hsr_redbox.sh | 13 	do_ping "${ns2}" 100.64.0.167 # |NS2 (RedBOX)            |   |NS3 (BR)                       |  | NS5 (SAN)  |
 75 	ip link add ns1eth1 netns "${ns1}" type veth peer name ns2eth1 netns "${ns2}"
 76 	ip link add ns1eth2 netns "${ns1}" type veth peer name ns2eth2 netns "${ns2}"
 77 	ip link add ns2eth3 netns "${ns2}" type veth peer name ns3eth1 netns "${ns3}"
 86 	ip -n "${ns2}" link set ns2eth1 up
 87 	ip -n "${ns2}" link set ns2eth2 up
 88 	ip -n "${ns2}" link set ns2eth3 up
 102 	ip -net "$ns2" link set address 00:11:22:00:02:01 dev ns2eth1
 103 	ip -net "$ns2" link set address 00:11:22:00:02:02 dev ns2eth2
 [all …]
 
 |