Home
last modified time | relevance | path

Searched refs:ns2 (Results 1 – 25 of 72) sorted by relevance

123

/linux-6.15/tools/testing/selftests/net/mptcp/
H A Dmptcp_join.sh28 ns2=""
1198 ns_tx=$ns2
1257 ns_rx=$ns2
1295 ns_tx=$ns2
1542 ns_tx=$ns2
1693 addr_ns=$ns2
3630 wait_mpj $ns2
3658 wait_mpj $ns2
3679 wait_mpj $ns2
3762 wait_mpj $ns2
[all …]
H A Duserspace_pm.sh54 ns2=""
110 mptcp_lib_ns_exit "${ns1}" "${ns2}"
121 mptcp_lib_ns_init ns1 ns2
150 for i in "$ns1" "$ns2" ;do
166 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
167 ip -net "$ns2" addr add 10.0.2.2/24 dev ns2eth1
170 ip -net "$ns2" link set ns2eth1 up
215 ip netns exec "$ns2" \
329 ip netns exec "$ns2"\
339 ip netns exec "$ns2" ./pm_nl_ctl ann\
[all …]
H A Dsimult_flows.sh12 ns2=""
45 mptcp_lib_ns_exit "${ns1}" "${ns2}" "${ns3}"
71 mptcp_lib_ns_init ns1 ns2 ns3
92 ip -net "$ns2" addr add 10.0.1.2/24 dev ns2eth1
94 ip -net "$ns2" link set ns2eth1 up mtu 1500
96 ip -net "$ns2" addr add 10.0.2.2/24 dev ns2eth2
98 ip -net "$ns2" link set ns2eth2 up mtu 1500
100 ip -net "$ns2" addr add 10.0.3.2/24 dev ns2eth3
102 ip -net "$ns2" link set ns2eth3 up mtu 1500
103 ip netns exec "$ns2" sysctl -q net.ipv4.ip_forward=1
[all …]
H A Dmptcp_connect.sh130 ns2=""
160 mptcp_lib_ns_init ns1 ns2 ns3 ns4
180 ip -net "$ns2" link set ns2eth1 up
184 ip -net "$ns2" link set ns2eth3 up
209 for i in "$ns1" "$ns2" "$ns3" "$ns4";do
669 local listener_ns="$ns2"
867 do_ping "$ns2" $sender 10.0.1.2
869 do_ping "$ns2" $sender 10.0.2.1
922 for sender in $ns1 $ns2 $ns3 $ns4;do
934 run_tests "$ns2" $sender 10.0.1.2
[all …]
H A Dmptcp_sockopt.sh22 ns2=""
67 mptcp_lib_ns_init ns1 ns2 ns_sbox
76 ip -net "$ns2" addr add 10.0.$i.2/24 dev ns2eth$i
77 ip -net "$ns2" addr add dead:beef:$i::2/64 dev ns2eth$i nodad
78 ip -net "$ns2" link set ns2eth$i up
86 mptcp_lib_pm_nl_add_endpoint "${ns2}" "10.0.${i}.2" flags signal
91 mptcp_lib_pm_nl_set_limits "${ns2}" 8 8
94 add_mark_rules $ns2 2
101 mptcp_lib_ns_exit "${ns1}" "${ns2}" "${ns_sbox}"
361 run_tests $ns1 $ns2 10.0.1.1
[all …]
/linux-6.15/tools/testing/selftests/bpf/prog_tests/
H A Dlwt_ip_encap.c142 if (!ns1 || !ns2) in configure_vrf()
153 SYS(fail, "ip -n %s link set red up", ns2); in configure_vrf()
201 if (!ns2 || !vrf) in configure_ns2()
204 nstoken = open_netns(ns2); in configure_ns2()
276 if (!ns1 || !ns2 || !ns3 || !vrf) in setup_network()
307 ns2, IP4_ADDR_GRE, IP4_ADDR_8, vrf); in setup_network()
311 ns2, IP6_ADDR_GRE, IP6_ADDR_8, vrf); in setup_network()
437 char ns2[NETNS_NAME_SIZE] = NETNS_BASE "-2-"; in lwt_ip_encap() local
472 ns2, IP4_ADDR_DST, BPF_FILE, sec, vrf); in lwt_ip_encap()
474 ns2, IP6_ADDR_DST, BPF_FILE, sec, vrf); in lwt_ip_encap()
[all …]
H A Dxdp_vlan.c29 static int setup_network(char *ns1, char *ns2) in setup_network() argument
33 if (!ASSERT_OK(append_tid(ns2, NS_MAX_SIZE), "create ns2 name")) in setup_network()
37 SYS(fail, "ip netns add %s", ns2); in setup_network()
39 ns1, VETH_NAME, VETH_NAME, ns2); in setup_network()
53 ns2, VETH_NAME, VETH_NAME, VLAN_ID, VLAN_ID); in setup_network()
55 SYS(fail, "ip -n %s link set %s up", ns2, VETH_NAME); in setup_network()
65 static void cleanup_network(const char *ns1, const char *ns2) in cleanup_network() argument
68 SYS_NOFAIL("ip netns del %s", ns2); in cleanup_network()
76 char ns2[NS_MAX_SIZE] = NS2_NAME; in xdp_vlan() local
81 if (!ASSERT_OK(setup_network(ns1, ns2), "setup network")) in xdp_vlan()
[all …]
/linux-6.15/tools/testing/selftests/net/
H A Dtest_vxlan_mdb.sh259 local ns2=$1; shift
1270 local ns2=$ns2_v4
1290 local ns2=$ns2_v4
1310 local ns2=$ns2_v6
1330 local ns2=$ns2_v6
1411 local ns2=$ns2_v4
1431 local ns2=$ns2_v4
1451 local ns2=$ns2_v6
1471 local ns2=$ns2_v6
1552 local ns2=$ns2_v4
[all …]
H A Dfib_tests.sh71 cleanup_ns $ns1 $ns2
446 setup_ns ns2
449 $IP link set dev veth2 netns $ns2
451 ip -netns $ns2 address add 192.0.2.1/24 dev veth2
453 ip -netns $ns2 link set dev veth2 up
1058 setup_ns ns2
1067 $IP li set veth2 netns $ns2 up
1068 $IP li set veth4 netns $ns2 up
1069 ip -netns $ns2 li add dummy1 type dummy
1070 ip -netns $ns2 li set dummy1 up
[all …]
/linux-6.15/tools/testing/selftests/net/netfilter/
H A Drpath.sh37 ns2="ns2-$sfx"
43 ip netns add "$ns2"
52 ip -net "$ns2" a a 192.168.23.1/24 dev v0
54 ip -net "$ns2" a a fec0:23::1/64 dev v0 nodad
57 ip -net "$ns2" link add d0 type dummy
58 ip -net "$ns2" link set d0 up
60 ip -net "$ns2" a a 192.168.42.1/24 dev d0
120 ip netns exec "$ns2" "$1" -t raw -vS | \
142 ) | ip netns exec "$ns2" $nft -f -
183 ip -net "$ns2" link set vrf0 up
[all …]
H A Dconntrack_tcp_unreplied.sh23 ip netns pids "$ns2" | xargs kill 2>/dev/null
51 setup_ns ns1 ns2
55 ip -net "$ns1" link set netns "$ns2" dev veth2
58 ip -net "$ns2" link set up dev lo
60 ip -net "$ns2" link set up dev veth2
62 ip -net "$ns2" addr add 10.11.11.2/24 dev veth2
63 ip -net "$ns2" route add default via 10.11.11.1
85 ip netns exec "$ns2" nft -f - <<EOF
103 echo "INFO: connect $ns1 -> $ns2 to the virtual ip"
126 ip netns exec "$ns2" nft -f - <<EOF
[all …]
H A Dnft_conntrack_helper.sh24 ip netns del "$ns2"
29 setup_ns ns1 ns2
37 ip -net "$ns2" link set veth0 up
42 ip -net "$ns2" addr add 10.0.1.2/24 dev veth0
43 ip -net "$ns2" addr add dead:1::2/64 dev veth0 nodad
130 ip netns exec "$ns2" conntrack -F 2> /dev/null
138 check_for_helper "$ns2" "ipv6 $msg" "$port"
151 if ! load_ruleset_family inet "${ns2}"; then
153 if ! load_ruleset_family ip "${ns2}"; then
154 echo "FAIL: ${ns2} cannot load ip ruleset" 1>&2
[all …]
H A Dipvs.sh59 setup_ns ns0 ns1 ns2
78 ip netns exec "${ns2}" ip link set veth21 up
79 ip netns exec "${ns2}" ip addr add "${rip_v4}/24" dev veth21
80 ip netns exec "${ns2}" ip link set veth20 up
81 ip netns exec "${ns2}" ip addr add "${sip_v4}/24" dev veth20
135 ip netns exec "${ns2}" ip addr add "${vip_v4}/32" dev lo:1
148 ip netns exec "${ns2}" ip link del veth20
166 ip netns exec "${ns2}" modprobe -q ipip
167 ip netns exec "${ns2}" ip link set tunl0 up
170 ip netns exec "${ns2}" sysctl -qw net.ipv4.conf.all.rp_filter=0
[all …]
H A Dnft_nat.sh18 ip netns pids "$ns2" | xargs kill 2>/dev/null
30 setup_ns ns0 ns1 ns2
59 do_config "$ns2" 2
143 for i in "$ns0" "$ns1" "$ns2" ;do
392 echo "ERROR: cannot ping $ns1 from $ns2 via ipv6"
483 echo "ERROR: cannot ping $ns1 from $ns2 $natflags"
572 echo "ERROR: cannnot ping $ns1 from $ns2 via ipv6"
647 echo "ERROR: cannot ping $ns1 from $ns2"
659 bad_counter "$ns2" ns1$dir "$expect" "test_redirect 2"
989 test $lret -eq 0 && echo "PASS: IP statless for $ns2"
[all …]
H A Dnf_nat_edemux.sh23 setup_ns ns1 ns2
28 ip link set netns "$ns2" dev veth2
34 ip netns exec "$ns2" ip link set up dev lo
35 ip netns exec "$ns2" ip link set up dev veth2
36 ip netns exec "$ns2" ip addr add 192.168.1.2/24 dev veth2
44 ip netns exec "$ns2" sysctl -q net.ipv4.ip_local_port_range="10000 10000"
50 ip netns exec "$ns2" ip route add 10.96.0.1 via 192.168.1.1
53 ip netns exec "$ns2" socat -t 10 - TCP:192.168.1.1:5201 > /dev/null &
60 echo test | ip netns exec "$ns2" socat -t 3 -u STDIN TCP:10.96.0.1:443,connect-timeout=3 >/dev/null
74 sleep 5 | ip netns exec "$ns2" socat -t 5 -u STDIN TCP:192.168.1.1:5202,connect-timeout=5 >/dev/nul…
[all …]
H A Dnft_synproxy.sh11 setup_ns nsr ns1 ns2
17 ip netns pids "$ns2" | xargs kill 2>/dev/null
25 ip link add veth1 netns "$nsr" type veth peer name eth0 netns "$ns2"
38 for n in $ns1 $ns2; do
42 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0
44 ip -net "$ns2" route add default via 10.0.2.1
48 echo "ERROR: $ns1 cannot reach $ns2" 1>&2
52 if ! ip netns exec "$ns2" ping -c 1 -q 10.0.1.99 > /dev/null; then
53 echo "ERROR: $ns2 cannot reach $ns1" 1>&2
57 ip netns exec "$ns2" iperf3 -s > /dev/null 2>&1 &
H A Dbridge_brouter.sh23 setup_ns nsbr ns1 ns2
31 ip link add veth1 netns "$nsbr" type veth peer name eth0 netns "$ns2"
48 ip -net "$ns2" link set eth0 up
50 ip -net "$ns2" addr add 10.0.0.12/24 dev eth0
81 echo "PASS: ${ns1}/${ns2} connectivity with active broute rule"
101 if ! ip netns exec "$ns2" ping -q -c 1 10.0.0.11 > /dev/null; then
106 echo "PASS: ${ns1}/${ns2} connectivity with active broute rule and bridge forward drop"
112 echo "ERROR: Could not reach ${ns2} from ${ns1}" 1>&2
116 if ! ip netns exec "$ns2" ping -c 1 -q 10.0.0.11 > /dev/null; then
117 echo "ERROR: Could not reach ${ns1} from ${ns2}" 1>&2
H A Dnft_flowtable.sh31 setup_ns ns1 ns2 nsr1 nsr2
35 ip netns pids "$ns2" | xargs kill 2>/dev/null
115 ip -net "$ns2" link set eth0 mtu "$rmtu"
130 for ns in "$ns1" "$ns2";do
142 ip -net "$ns2" addr add 10.0.2.99/24 dev eth0
144 ip -net "$ns2" route add default via 10.0.2.1
148 ip -net "$ns2" route add default via dead:2::1
185 ip netns exec "$ns2" nft -f - <<EOF
213 echo "ERROR: $ns2 cannot reach $ns1" 1>&2
460 if test_tcp_forwarding "$ns1" "$ns2"; then
[all …]
/linux-6.15/tools/testing/selftests/net/hsr/
H A Dhsr_ping.sh35 do_ping "$ns2" 100.64.0.1
40 do_ping "$ns2" 100.64.0.3
45 do_ping "$ns2" dead:beef:1::1
46 do_ping "$ns2" dead:beef:1::2
237 do_ping "$ns2" 100.64.2.1
238 do_ping "$ns2" 100.64.3.1
239 do_ping "$ns2" 100.64.4.1
240 do_ping "$ns2" 100.64.5.1
242 do_ping "$ns2" 100.64.2.3
273 setup_ns ns1 ns2 ns3
[all …]
H A Dhsr_redbox.sh13 do_ping "${ns2}" 100.64.0.1
75 ip link add ns1eth1 netns "${ns1}" type veth peer name ns2eth1 netns "${ns2}"
86 ip -n "${ns2}" link set ns2eth1 up
87 ip -n "${ns2}" link set ns2eth2 up
88 ip -n "${ns2}" link set ns2eth3 up
102 ip -net "$ns2" link set address 00:11:22:00:02:01 dev ns2eth1
103 ip -net "$ns2" link set address 00:11:22:00:02:02 dev ns2eth2
104 ip -net "$ns2" link set address 00:11:22:00:02:03 dev ns2eth3
118 ip -n "${ns2}" addr add 100.64.0.2/24 dev hsr2
125 ip -n "${ns2}" link set hsr2 up
[all …]
/linux-6.15/tools/testing/selftests/bpf/
H A Dtest_tc_tunnel.sh12 readonly ns2="${ns_prefix}2"
30 ip netns add "${ns2}"
33 peer name veth2 mtu 1500 netns "${ns2}"
38 ip -netns "${ns2}" link set veth2 up
41 ip -netns "${ns2}" -4 addr add "${ns2_v4}/24" dev veth2
57 ip netns del "${ns2}"
277 ethaddr=$(ip netns exec "${ns2}" ip link show veth2 | \
285 ip netns exec "${ns2}" ip link set lo up
298 ip netns exec "${ns2}" ip link set dev testtun0 up
312 ip netns exec "${ns2}" ip link del dev testtun0
[all …]
/linux-6.15/samples/bpf/
H A Dtc_l2_redirect.sh18 $IP netns add ns2
26 $IP link set dev vens2 netns ns2
35 $IP -n ns2 link set dev lo up
36 $IP -n ns2 link set dev vens2 up
37 $IP -n ns2 addr add 10.2.1.102/24 dev vens2
39 $IP -n ns2 addr add 10.10.1.102 dev lo
43 $IP -n ns2 link set dev ipt2 up
44 $IP -n ns2 link set dev ip6t2 up
48 $IP -n ns2 route add 10.1.1.0/24 dev ipt2
52 $IP -n ns2 route add 10.1.1.0/24 dev ip6t2
[all …]
/linux-6.15/arch/arm/boot/dts/marvell/
H A Dkirkwood-is2.dts4 #include <dt-bindings/leds/leds-ns2.h>
5 #include "kirkwood-ns2-common.dtsi"
25 ns2-leds {
26 compatible = "lacie,ns2-leds";
29 label = "ns2:blue:sata";
H A Dkirkwood-ns2.dts4 #include <dt-bindings/leds/leds-ns2.h>
5 #include "kirkwood-ns2-common.dtsi"
25 ns2-leds {
26 compatible = "lacie,ns2-leds";
29 label = "ns2:blue:sata";
/linux-6.15/Documentation/devicetree/bindings/leds/
H A Dleds-ns2.txt4 - compatible: "lacie,ns2-leds".
6 Each LED is represented as a sub-node of the ns2-leds device.
21 #include <dt-bindings/leds/leds-ns2.h>
23 ns2-leds {
24 compatible = "lacie,ns2-leds";
27 label = "ns2:blue:sata";

123