/linux/tools/testing/selftests/net/ |
H A D | test_vxlan_mdb.sh | 259 local ns2=$1; shift 265 ip link set dev veth1 netns $ns2 name veth0 268 setup_common_ns $ns2 $local_addr2 1174 local ns2=$1; shift 1189 run_cmd "tc -n $ns2 qdisc replace dev veth0 clsact" 1190 run_cmd "tc -n $ns2 qdisc replace dev vx0 clsact" 1191 run_cmd "ip -n $ns2 address replace $vtep1_ip/$plen dev lo" 1192 run_cmd "ip -n $ns2 address replace $vtep2_ip/$plen dev lo" 1198 …run_cmd "tc -n $ns2 filter replace dev vx0 ingress pref 1 handle 101 proto all flower enc_dst_ip $… 1200 tc_check_packets "$ns2" "dev vx0 ingress" 101 1 [all …]
|
/linux/tools/testing/selftests/net/netfilter/ |
H A D | rpath.sh | 37 ns2="ns2-$sfx" 38 trap "ip netns del $ns1; ip netns del $ns2" EXIT 43 ip netns add "$ns2" 44 ip netns exec "$ns2" sysctl -q net.ipv4.conf.all.rp_filter=0 45 ip netns exec "$ns2" sysctl -q net.ipv4.conf.default.rp_filter=0 46 ip netns exec "$ns2" sysctl -q net.ipv6.conf.all.keep_addr_on_down=1 49 ip -net "$ns1" link add v0 type veth peer name v0 netns "$ns2" 50 ip -net "$ns1" link set v0 up; ip -net "$ns2" link set v0 up 52 ip -net "$ns2" a a 192.168.23.1/24 dev v0 54 ip -net "$ns2" a a fec0:23::1/64 dev v0 nodad [all …]
|
H A D | conntrack_tcp_unreplied.sh | 23 ip netns pids "$ns2" | xargs kill 2>/dev/null 39 if ! ip netns exec "$ns2" nft list counter inet filter "$name" | grep -q "$expect"; then 40 echo "ERROR: counter $name in $ns2 has unexpected value (expected $expect)" 1>&2 41 ip netns exec "$ns2" nft list counter inet filter "$name" 1>&2 51 setup_ns ns1 ns2 55 ip -net "$ns1" link set netns "$ns2" dev veth2 58 ip -net "$ns2" link set up dev lo 60 ip -net "$ns2" link set up dev veth2 62 ip -net "$ns2" addr add 10.11.11.2/24 dev veth2 63 ip -net "$ns2" route add default via 10.11.11.1 [all …]
|
H A D | nft_conntrack_helper.sh | 24 ip netns del "$ns2" 29 setup_ns ns1 ns2 31 if ! ip link add veth0 netns "$ns1" type veth peer name veth0 netns "$ns2" > /dev/null 2>&1;then 37 ip -net "$ns2" link set veth0 up 42 ip -net "$ns2" addr add 10.0.1.2/24 dev veth0 43 ip -net "$ns2" addr add dead:1::2/64 dev veth0 nodad 117 ip netns exec "$ns2" socat -t 3 -u -4 TCP-LISTEN:"$port",reuseaddr STDOUT > /dev/null & 118 busywait "$BUSYWAIT_TIMEOUT" listener_ready "$ns2" "$port" "-4" 123 check_for_helper "$ns2" "ip $msg" "$port" "$autoassign" 130 ip netns exec "$ns2" conntrack -F 2> /dev/null [all …]
|
H A D | nft_nat.sh | 18 ip netns pids "$ns2" | xargs kill 2>/dev/null 30 setup_ns ns0 ns1 ns2 36 ip link add veth1 netns "$ns0" type veth peer name eth0 netns "$ns2" 59 do_config "$ns2" 2 143 for i in "$ns0" "$ns1" "$ns2" ;do 189 bad_counter "$ns0" ns2$dir "$expect" "test_local_dnat6 2" 206 if ! ip netns exec "$ns2" nft list counter inet filter "ns0${dir}" | grep -q "$expect";then 207 bad_counter "$ns2" ns0$dir "$expect" "test_local_dnat6 4" 212 test $lret -eq 0 && echo "PASS: ipv6 ping to $ns1 was $family NATted to $ns2" 281 if ! ip netns exec "$ns2" nft list counter inet filter ns0${dir} | grep -q "$expect";then [all …]
|
H A D | ipvs.sh | 59 setup_ns ns0 ns1 ns2 62 ip link add veth02 netns "${ns0}" type veth peer name veth20 netns "${ns2}" 63 ip link add veth12 netns "${ns1}" type veth peer name veth21 netns "${ns2}" 78 ip netns exec "${ns2}" ip link set veth21 up 79 ip netns exec "${ns2}" ip addr add "${rip_v4}/24" dev veth21 80 ip netns exec "${ns2}" ip link set veth20 up 81 ip netns exec "${ns2}" ip addr add "${sip_v4}/24" dev veth20 100 ip netns exec "$ns2" timeout 5 socat -u -4 TCP-LISTEN:8080,reuseaddr STDOUT > "${outfile}" & 130 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.arp_ignore=1 131 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.arp_announce=2 [all …]
|
H A D | nf_nat_edemux.sh | 23 setup_ns ns1 ns2 28 ip link set netns "$ns2" dev veth2 34 ip netns exec "$ns2" ip link set up dev lo 35 ip netns exec "$ns2" ip link set up dev veth2 36 ip netns exec "$ns2" ip addr add 192.168.1.2/24 dev veth2 44 ip netns exec "$ns2" sysctl -q net.ipv4.ip_local_port_range="10000 10000" 47 ip netns exec "$ns2" iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-dest… 50 ip netns exec "$ns2" ip route add 10.96.0.1 via 192.168.1.1 53 ip netns exec "$ns2" socat -t 10 - TCP:192.168.1.1:5201 > /dev/null & 60 echo test | ip netns exec "$ns2" socat -t 3 -u STDIN TCP:10.96.0.1:443,connect-timeout=3 >/dev/null [all …]
|
H A D | nft_synproxy.sh | 11 setup_ns nsr ns1 ns2 17 ip netns pids "$ns2" | xargs kill 2>/dev/null 25 ip link add veth1 netns "$nsr" type veth peer name eth0 netns "$ns2" 38 for n in $ns1 $ns2; do 42 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0 44 ip -net "$ns2" route add default via 10.0.2.1 48 echo "ERROR: $ns1 cannot reach $ns2" 1>&2 52 if ! ip netns exec "$ns2" ping -c 1 -q 10.0.1.99 > /dev/null; then 53 echo "ERROR: $ns2 cannot reach $ns1" 1>&2 57 ip netns exec "$ns2" iperf3 -s > /dev/null 2>&1 &
|
H A D | bridge_brouter.sh | 23 setup_ns nsbr ns1 ns2 31 ip link add veth1 netns "$nsbr" type veth peer name eth0 netns "$ns2" 48 ip -net "$ns2" link set eth0 up 50 ip -net "$ns2" addr add 10.0.0.12/24 dev eth0 81 echo "PASS: ${ns1}/${ns2} connectivity with active broute rule" 101 if ! ip netns exec "$ns2" ping -q -c 1 10.0.0.11 > /dev/null; then 106 echo "PASS: ${ns1}/${ns2} connectivity with active broute rule and bridge forward drop" 112 echo "ERROR: Could not reach ${ns2} from ${ns1}" 1>&2 116 if ! ip netns exec "$ns2" ping -c 1 -q 10.0.0.11 > /dev/null; then 117 echo "ERROR: Could not reach ${ns1} from ${ns2}" 1>&2
|
H A D | nft_flowtable.sh | 31 setup_ns ns1 ns2 nsr1 nsr2 35 ip netns pids "$ns2" | xargs kill 2>/dev/null 51 ip link add veth1 netns "$nsr2" type veth peer name eth0 netns "$ns2" 115 ip -net "$ns2" link set eth0 mtu "$rmtu" 130 for ns in "$ns1" "$ns2";do 142 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0 144 ip -net "$ns2" route add default via 10.0.2.1 146 ip -net "$ns2" addr add dead:2::99/64 dev eth0 nodad 148 ip -net "$ns2" route add default via dead:2::1 185 ip netns exec "$ns2" nft -f - <<EOF [all …]
|
H A D | nft_tproxy_tcp.sh | 35 ip netns pids "$ns2" | xargs kill 2>/dev/null 46 setup_ns ns1 ns2 ns3 nsrouter 52 ip link add veth1 netns "$nsrouter" type veth peer name eth0 netns "$ns2" 68 ip -net "$ns2" link set eth0 up 76 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0 77 ip -net "$ns2" addr add dead:2::99/64 dev eth0 nodad 78 ip -net "$ns2" route add default via 10.0.2.1 79 ip -net "$ns2" route add default via dead:2::1 222 …timeout "$timeout" ip netns exec "$ns2" socat "$socat_ipproto" tcp-listen:8080,fork SYSTEM:"echo P… 229 busywait "$BUSYWAIT_TIMEOUT" listener_ready "$ns2" 8080 "-t" [all …]
|
H A D | nft_tproxy_udp.sh | 35 ip netns pids "$ns2" | xargs kill 2>/dev/null 46 setup_ns ns1 ns2 ns3 nsrouter 52 ip link add veth1 netns "$nsrouter" type veth peer name eth0 netns "$ns2" 68 ip -net "$ns2" link set eth0 up 76 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0 77 ip -net "$ns2" addr add dead:2::99/64 dev eth0 nodad 78 ip -net "$ns2" route add default via 10.0.2.1 79 ip -net "$ns2" route add default via dead:2::1 196 …timeout "$timeout" ip netns exec "$ns2" socat "$socat_ipproto" udp-listen:8080,fork SYSTEM:"echo P… 203 busywait "$BUSYWAIT_TIMEOUT" listener_ready "$ns2" 8080 "-u" [all …]
|
H A D | nft_queue.sh | 16 ip netns pids "$ns2" | xargs kill 2>/dev/null 34 setup_ns ns1 ns2 ns3 nsrouter 50 ip link add veth1 netns "$nsrouter" type veth peer name eth0 netns "$ns2" 66 ip -net "$ns2" link set eth0 up 74 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0 75 ip -net "$ns2" addr add dead:2::99/64 dev eth0 nodad 76 ip -net "$ns2" route add default via 10.0.2.1 77 ip -net "$ns2" route add default via dead:2::1 272 timeout 5 ip netns exec "$ns2" socat -u TCP-LISTEN:12345 STDOUT >/dev/null & 275 busywait "$BUSYWAIT_TIMEOUT" listener_ready "$ns2" [all …]
|
H A D | nft_fib.sh | 24 setup_ns nsrouter ns1 ns2 106 load_ruleset "$ns2" 112 ip link add veth1 netns "$nsrouter" type veth peer name eth0 netns "$ns2" 123 ip -net "$ns2" link set eth0 up 130 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0 131 ip -net "$ns2" addr add dead:2::99/64 dev eth0 nodad 132 ip -net "$ns2" route add default via 10.0.2.1 133 ip -net "$ns2" route add default via dead:2::1 202 ip netns exec "$ns2" nft flush ruleset
|
/linux/tools/testing/selftests/bpf/ |
H A D | test_tc_tunnel.sh | 12 readonly ns2="${ns_prefix}2" 30 ip netns add "${ns2}" 33 peer name veth2 mtu 1500 netns "${ns2}" 38 ip -netns "${ns2}" link set veth2 up 41 ip -netns "${ns2}" -4 addr add "${ns2_v4}/24" dev veth2 43 ip -netns "${ns2}" -6 addr add "${ns2_v6}/64" dev veth2 nodad 57 ip netns del "${ns2}" 73 ip netns exec "${ns2}" nc "${netcat_opt}" -l "${port}" > "${outfile}" & 97 if ip netns exec "${ns2}" ss ${2:--4}OHntl | grep -q "$1"; then 234 ip netns exec "${ns2}" ip fou add port $dport ipproto ${dproto} [all …]
|
/linux/samples/bpf/ |
H A D | tc_l2_redirect.sh | 18 $IP netns add ns2 26 $IP link set dev vens2 netns ns2 35 $IP -n ns2 link set dev lo up 36 $IP -n ns2 link set dev vens2 up 37 $IP -n ns2 addr add 10.2.1.102/24 dev vens2 38 $IP -n ns2 addr add 2401:db02::66/64 dev vens2 nodad 39 $IP -n ns2 addr add 10.10.1.102 dev lo 40 $IP -n ns2 addr add 2401:face::66/64 dev lo nodad 41 $IP -n ns2 link add ipt2 type ipip local 10.2.1.102 remote 10.2.1.1 42 $IP -n ns2 link add ip6t2 type ip6tnl mode any local 2401:db02::66 remote 2401:db02::1 [all …]
|
/linux/tools/testing/selftests/net/mptcp/ |
H A D | userspace_pm.sh | 54 ns2="" 110 mptcp_lib_ns_exit "${ns1}" "${ns2}" 120 mptcp_lib_ns_init ns1 ns2 121 for i in "$ns1" "$ns2" ;do 128 ip link add ns1eth2 netns "$ns1" type veth peer name ns2eth1 netns "$ns2" 137 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1 138 ip -net "$ns2" addr add 10.0.2.2/24 dev ns2eth1 139 ip -net "$ns2" addr add dead:beef:1::2/64 dev ns2eth1 nodad 140 ip -net "$ns2" addr add dead:beef:2::2/64 dev ns2eth1 nodad 141 ip -net "$ns2" link set ns2eth1 up [all …]
|
/linux/tools/testing/selftests/net/hsr/ |
H A D | hsr_redbox.sh | 13 do_ping "${ns2}" 100.64.0.1 75 ip link add ns1eth1 netns "${ns1}" type veth peer name ns2eth1 netns "${ns2}" 76 ip link add ns1eth2 netns "${ns1}" type veth peer name ns2eth2 netns "${ns2}" 77 ip link add ns2eth3 netns "${ns2}" type veth peer name ns3eth1 netns "${ns3}" 86 ip -n "${ns2}" link set ns2eth1 up 87 ip -n "${ns2}" link set ns2eth2 up 88 ip -n "${ns2}" link set ns2eth3 up 102 ip -net "$ns2" link set address 00:11:22:00:02:01 dev ns2eth1 103 ip -net "$ns2" link set address 00:11:22:00:02:02 dev ns2eth2 104 ip -net "$ns2" link set address 00:11:22:00:02:03 dev ns2eth3 [all …]
|
/linux/arch/arm/boot/dts/marvell/ |
H A D | kirkwood-is2.dts | 4 #include <dt-bindings/leds/leds-ns2.h> 5 #include "kirkwood-ns2-common.dtsi" 25 ns2-leds { 26 compatible = "lacie,ns2-leds"; 29 label = "ns2:blue:sata";
|
H A D | kirkwood-ns2.dts | 4 #include <dt-bindings/leds/leds-ns2.h> 5 #include "kirkwood-ns2-common.dtsi" 25 ns2-leds { 26 compatible = "lacie,ns2-leds"; 29 label = "ns2:blue:sata";
|
H A D | kirkwood-ns2max.dts | 4 #include <dt-bindings/leds/leds-ns2.h> 5 #include "kirkwood-ns2-common.dtsi" 44 ns2-leds { 45 compatible = "lacie,ns2-leds"; 48 label = "ns2:blue:sata";
|
H A D | kirkwood-ns2mini.dts | 4 #include <dt-bindings/leds/leds-ns2.h> 5 #include "kirkwood-ns2-common.dtsi" 45 ns2-leds { 46 compatible = "lacie,ns2-leds"; 49 label = "ns2:blue:sata";
|
H A D | kirkwood-d2net.dts | 11 #include <dt-bindings/leds/leds-ns2.h> 23 ns2-leds { 24 compatible = "lacie,ns2-leds";
|
/linux/Documentation/devicetree/bindings/leds/ |
H A D | leds-ns2.txt | 4 - compatible: "lacie,ns2-leds". 6 Each LED is represented as a sub-node of the ns2-leds device. 21 #include <dt-bindings/leds/leds-ns2.h> 23 ns2-leds { 24 compatible = "lacie,ns2-leds"; 27 label = "ns2:blue:sata";
|
/linux/tools/testing/selftests/net/forwarding/ |
H A D | dual_vxlan_bridge.sh | 285 ip netns add ns2 286 ip link set dev v4 netns ns2 287 in_ns ns2 \ 291 in_ns ns2 ip link add name w1.20 link w1 type vlan id 20 292 in_ns ns2 ip link set dev w1.20 master br3 293 in_ns ns2 ip link set dev w1.20 up 298 ip netns exec ns2 ip link set dev v4 netns 1 299 ip netns del ns2 327 r2_mac=$(in_ns ns2 mac_get w2)
|