__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
#!/bin/bash
# SPDX-License-Identifier: GPL-2.0
#
# Check xfrm policy resolution. Topology:
#
# 1.2 1.1 3.1 3.10 2.1 2.2
# eth1 eth1 veth0 veth0 eth1 eth1
# ns1 ---- ns3 ----- ns4 ---- ns2
#
# ns3 and ns4 are connected via ipsec tunnel.
# pings from ns1 to ns2 (and vice versa) are supposed to work like this:
# ns1: ping 10.0.2.2: passes via ipsec tunnel.
# ns2: ping 10.0.1.2: passes via ipsec tunnel.
# ns1: ping 10.0.1.253: passes via ipsec tunnel (direct policy)
# ns2: ping 10.0.2.253: passes via ipsec tunnel (direct policy)
#
# ns1: ping 10.0.2.254: does NOT pass via ipsec tunnel (exception)
# ns2: ping 10.0.1.254: does NOT pass via ipsec tunnel (exception)
source lib.sh
ret=0
policy_checks_ok=1
KEY_SHA=0xdeadbeef1234567890abcdefabcdefabcdefabcd
KEY_AES=0x0123456789abcdef0123456789012345
SPI1=0x1
SPI2=0x2
do_esp_policy() {
local ns=$1
local me=$2
local remote=$3
local lnet=$4
local rnet=$5
# to encrypt packets as they go out (includes forwarded packets that need encapsulation)
ip -net $ns xfrm policy add src $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow
# to fwd decrypted packets after esp processing:
ip -net $ns xfrm policy add src $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow
}
do_esp() {
local ns=$1
local me=$2
local remote=$3
local lnet=$4
local rnet=$5
local spi_out=$6
local spi_in=$7
ip -net $ns xfrm state add src $remote dst $me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $rnet dst $lnet
ip -net $ns xfrm state add src $me dst $remote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $lnet dst $rnet
do_esp_policy $ns $me $remote $lnet $rnet
}
# add policies with different netmasks, to make sure kernel carries
# the policies contained within new netmask over when search tree is
# re-built.
# peer netns that are supposed to be encapsulated via esp have addresses
# in the 10.0.1.0/24 and 10.0.2.0/24 subnets, respectively.
#
# Adding a policy for '10.0.1.0/23' will make it necessary to
# alter the prefix of 10.0.1.0 subnet.
# In case new prefix overlaps with existing node, the node and all
# policies it carries need to be merged with the existing one(s).
#
# Do that here.
do_overlap()
{
local ns=$1
# adds new nodes to tree (neither network exists yet in policy database).
ip -net $ns xfrm policy add src 10.1.0.0/24 dst 10.0.0.0/24 dir fwd priority 200 action block
# adds a new node in the 10.0.0.0/24 tree (dst node exists).
ip -net $ns xfrm policy add src 10.2.0.0/24 dst 10.0.0.0/24 dir fwd priority 200 action block
# adds a 10.2.0.0/23 node, but for different dst.
ip -net $ns xfrm policy add src 10.2.0.0/23 dst 10.0.1.0/24 dir fwd priority 200 action block
# dst now overlaps with the 10.0.1.0/24 ESP policy in fwd.
# kernel must 'promote' existing one (10.0.0.0/24) to 10.0.0.0/23.
# But 10.0.0.0/23 also includes existing 10.0.1.0/24, so that node
# also has to be merged too, including source-sorted subtrees.
# old:
# 10.0.0.0/24 (node 1 in dst tree of the bin)
# 10.1.0.0/24 (node in src tree of dst node 1)
# 10.2.0.0/24 (node in src tree of dst node 1)
# 10.0.1.0/24 (node 2 in dst tree of the bin)
# 10.0.2.0/24 (node in src tree of dst node 2)
# 10.2.0.0/24 (node in src tree of dst node 2)
#
# The next 'policy add' adds dst '10.0.0.0/23', which means
# that dst node 1 and dst node 2 have to be merged including
# the sub-tree. As no duplicates are allowed, policies in
# the two '10.0.2.0/24' are also merged.
#
# after the 'add', internal search tree should look like this:
# 10.0.0.0/23 (node in dst tree of bin)
# 10.0.2.0/24 (node in src tree of dst node)
# 10.1.0.0/24 (node in src tree of dst node)
# 10.2.0.0/24 (node in src tree of dst node)
#
# 10.0.0.0/24 and 10.0.1.0/24 nodes have been merged as 10.0.0.0/23.
ip -net $ns xfrm policy add src 10.1.0.0/24 dst 10.0.0.0/23 dir fwd priority 200 action block
# similar to above: add policies (with partially random address), with shrinking prefixes.
for p in 29 28 27;do
for k in $(seq 1 32); do
ip -net $ns xfrm policy add src 10.253.1.$((RANDOM%255))/$p dst 10.254.1.$((RANDOM%255))/$p dir fwd priority $((200+k)) action block 2>/dev/null
done
done
}
do_esp_policy_get_check() {
local ns=$1
local lnet=$2
local rnet=$3
ip -net $ns xfrm policy get src $lnet dst $rnet dir out > /dev/null
if [ $? -ne 0 ] && [ $policy_checks_ok -eq 1 ] ;then
policy_checks_ok=0
echo "FAIL: ip -net $ns xfrm policy get src $lnet dst $rnet dir out"
ret=1
fi
ip -net $ns xfrm policy get src $rnet dst $lnet dir fwd > /dev/null
if [ $? -ne 0 ] && [ $policy_checks_ok -eq 1 ] ;then
policy_checks_ok=0
echo "FAIL: ip -net $ns xfrm policy get src $rnet dst $lnet dir fwd"
ret=1
fi
}
do_exception() {
local ns=$1
local me=$2
local remote=$3
local encryptip=$4
local plain=$5
# network $plain passes without tunnel
ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow
# direct policy for $encryptip, use tunnel, higher prio takes precedence
ip -net $ns xfrm policy add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow
}
# policies that are not supposed to match any packets generated in this test.
do_dummies4() {
local ns=$1
for i in $(seq 10 16);do
# dummy policy with wildcard src/dst.
echo netns exec $ns ip xfrm policy add src 0.0.0.0/0 dst 10.$i.99.0/30 dir out action block
echo netns exec $ns ip xfrm policy add src 10.$i.99.0/30 dst 0.0.0.0/0 dir out action block
for j in $(seq 32 64);do
echo netns exec $ns ip xfrm policy add src 10.$i.1.0/30 dst 10.$i.$j.0/30 dir out action block
# silly, as it encompasses the one above too, but its allowed:
echo netns exec $ns ip xfrm policy add src 10.$i.1.0/29 dst 10.$i.$j.0/29 dir out action block
# and yet again, even more broad one.
echo netns exec $ns ip xfrm policy add src 10.$i.1.0/24 dst 10.$i.$j.0/24 dir out action block
echo netns exec $ns ip xfrm policy add src 10.$i.$j.0/24 dst 10.$i.1.0/24 dir fwd action block
done
done | ip -batch /dev/stdin
}
do_dummies6() {
local ns=$1
for i in $(seq 10 16);do
for j in $(seq 32 64);do
echo netns exec $ns ip xfrm policy add src dead:$i::/64 dst dead:$i:$j::/64 dir out action block
echo netns exec $ns ip xfrm policy add src dead:$i:$j::/64 dst dead:$i::/24 dir fwd action block
done
done | ip -batch /dev/stdin
}
check_ipt_policy_count()
{
ns=$1
ip netns exec $ns iptables-save -c |grep policy | ( read c rest
ip netns exec $ns iptables -Z
if [ x"$c" = x'[0:0]' ]; then
exit 0
elif [ x"$c" = x ]; then
echo "ERROR: No counters"
ret=1
exit 111
else
exit 1
fi
)
}
check_xfrm() {
# 0: iptables -m policy rule count == 0
# 1: iptables -m policy rule count != 0
rval=$1
ip=$2
local lret=0
ip netns exec ${ns[1]} ping -q -c 1 10.0.2.$ip > /dev/null
check_ipt_policy_count ${ns[3]}
if [ $? -ne $rval ] ; then
lret=1
fi
check_ipt_policy_count ${ns[4]}
if [ $? -ne $rval ] ; then
lret=1
fi
ip netns exec ${ns[2]} ping -q -c 1 10.0.1.$ip > /dev/null
check_ipt_policy_count ${ns[3]}
if [ $? -ne $rval ] ; then
lret=1
fi
check_ipt_policy_count ${ns[4]}
if [ $? -ne $rval ] ; then
lret=1
fi
return $lret
}
check_exceptions()
{
logpostfix="$1"
local lret=0
# ping to .254 should be excluded from the tunnel (exception is in place).
check_xfrm 0 254
if [ $? -ne 0 ]; then
echo "FAIL: expected ping to .254 to fail ($logpostfix)"
lret=1
else
echo "PASS: ping to .254 bypassed ipsec tunnel ($logpostfix)"
fi
# ping to .253 should use use ipsec due to direct policy exception.
check_xfrm 1 253
if [ $? -ne 0 ]; then
echo "FAIL: expected ping to .253 to use ipsec tunnel ($logpostfix)"
lret=1
else
echo "PASS: direct policy matches ($logpostfix)"
fi
# ping to .2 should use ipsec.
check_xfrm 1 2
if [ $? -ne 0 ]; then
echo "FAIL: expected ping to .2 to use ipsec tunnel ($logpostfix)"
lret=1
else
echo "PASS: policy matches ($logpostfix)"
fi
return $lret
}
check_hthresh_repeat()
{
local log=$1
i=0
for i in $(seq 1 10);do
ip -net ${ns[1]} xfrm policy update src e000:0001::0000 dst ff01::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
ip -net ${ns[1]} xfrm policy set hthresh6 0 28 || break
ip -net ${ns[1]} xfrm policy update src e000:0001::0000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
ip -net ${ns[1]} xfrm policy set hthresh6 0 28 || break
done
if [ $i -ne 10 ] ;then
echo "FAIL: $log" 1>&2
ret=1
return 1
fi
echo "PASS: $log"
return 0
}
# insert non-overlapping policies in a random order and check that
# all of them can be fetched using the traffic selectors.
check_random_order()
{
local ns=$1
local log=$2
for i in $(seq 50); do
ip -net $ns xfrm policy flush
for j in $(seq 0 16 255 | sort -R); do
ip -net $ns xfrm policy add dst $j.0.0.0/24 dir out priority 10 action allow
done
for j in $(seq 0 16 255); do
if ! ip -net $ns xfrm policy get dst $j.0.0.0/24 dir out > /dev/null; then
echo "FAIL: $log" 1>&2
return 1
fi
done
done
for i in $(seq 50); do
ip -net $ns xfrm policy flush
for j in $(seq 0 16 255 | sort -R); do
local addr=$(printf "e000:0000:%02x00::/56" $j)
ip -net $ns xfrm policy add dst $addr dir out priority 10 action allow
done
for j in $(seq 0 16 255); do
local addr=$(printf "e000:0000:%02x00::/56" $j)
if ! ip -net $ns xfrm policy get dst $addr dir out > /dev/null; then
echo "FAIL: $log" 1>&2
return 1
fi
done
done
ip -net $ns xfrm policy flush
echo "PASS: $log"
return 0
}
#check for needed privileges
if [ "$(id -u)" -ne 0 ];then
echo "SKIP: Need root privileges"
exit $ksft_skip
fi
ip -Version 2>/dev/null >/dev/null
if [ $? -ne 0 ];then
echo "SKIP: Could not run test without the ip tool"
exit $ksft_skip
fi
# needed to check if policy lookup got valid ipsec result
iptables --version 2>/dev/null >/dev/null
if [ $? -ne 0 ];then
echo "SKIP: Could not run test without iptables tool"
exit $ksft_skip
fi
setup_ns ns1 ns2 ns3 ns4
ns[1]=$ns1
ns[2]=$ns2
ns[3]=$ns3
ns[4]=$ns4
DEV=veth0
ip link add $DEV netns ${ns[1]} type veth peer name eth1 netns ${ns[3]}
ip link add $DEV netns ${ns[2]} type veth peer name eth1 netns ${ns[4]}
ip link add $DEV netns ${ns[3]} type veth peer name veth0 netns ${ns[4]}
DEV=veth0
for i in 1 2; do
ip -net ${ns[$i]} link set $DEV up
ip -net ${ns[$i]} addr add 10.0.$i.2/24 dev $DEV
ip -net ${ns[$i]} addr add dead:$i::2/64 dev $DEV
ip -net ${ns[$i]} addr add 10.0.$i.253 dev $DEV
ip -net ${ns[$i]} addr add 10.0.$i.254 dev $DEV
ip -net ${ns[$i]} addr add dead:$i::fd dev $DEV
ip -net ${ns[$i]} addr add dead:$i::fe dev $DEV
done
for i in 3 4; do
ip -net ${ns[$i]} link set eth1 up
ip -net ${ns[$i]} link set veth0 up
done
ip -net ${ns[1]} route add default via 10.0.1.1
ip -net ${ns[2]} route add default via 10.0.2.1
ip -net ${ns[3]} addr add 10.0.1.1/24 dev eth1
ip -net ${ns[3]} addr add 10.0.3.1/24 dev veth0
ip -net ${ns[3]} addr add 2001:1::1/64 dev eth1
ip -net ${ns[3]} addr add 2001:3::1/64 dev veth0
ip -net ${ns[3]} route add default via 10.0.3.10
ip -net ${ns[4]} addr add 10.0.2.1/24 dev eth1
ip -net ${ns[4]} addr add 10.0.3.10/24 dev veth0
ip -net ${ns[4]} addr add 2001:2::1/64 dev eth1
ip -net ${ns[4]} addr add 2001:3::10/64 dev veth0
ip -net ${ns[4]} route add default via 10.0.3.1
for j in 4 6; do
for i in 3 4;do
ip netns exec ${ns[$i]} sysctl net.ipv$j.conf.eth1.forwarding=1 > /dev/null
ip netns exec ${ns[$i]} sysctl net.ipv$j.conf.veth0.forwarding=1 > /dev/null
done
done
# abuse iptables rule counter to check if ping matches a policy
ip netns exec ${ns[3]} iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
ip netns exec ${ns[4]} iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
if [ $? -ne 0 ];then
echo "SKIP: Could not insert iptables rule"
cleanup_ns $ns1 $ns2 $ns3 $ns4
exit $ksft_skip
fi
# localip remoteip localnet remotenet
do_esp ${ns[3]} 10.0.3.1 10.0.3.10 10.0.1.0/24 10.0.2.0/24 $SPI1 $SPI2
do_esp ${ns[3]} dead:3::1 dead:3::10 dead:1::/64 dead:2::/64 $SPI1 $SPI2
do_esp ${ns[4]} 10.0.3.10 10.0.3.1 10.0.2.0/24 10.0.1.0/24 $SPI2 $SPI1
do_esp ${ns[4]} dead:3::10 dead:3::1 dead:2::/64 dead:1::/64 $SPI2 $SPI1
do_dummies4 ${ns[3]}
do_dummies6 ${ns[4]}
do_esp_policy_get_check ${ns[3]} 10.0.1.0/24 10.0.2.0/24
do_esp_policy_get_check ${ns[4]} 10.0.2.0/24 10.0.1.0/24
do_esp_policy_get_check ${ns[3]} dead:1::/64 dead:2::/64
do_esp_policy_get_check ${ns[4]} dead:2::/64 dead:1::/64
# ping to .254 should use ipsec, exception is not installed.
check_xfrm 1 254
if [ $? -ne 0 ]; then
echo "FAIL: expected ping to .254 to use ipsec tunnel"
ret=1
else
echo "PASS: policy before exception matches"
fi
# installs exceptions
# localip remoteip encryptdst plaindst
do_exception ${ns[3]} 10.0.3.1 10.0.3.10 10.0.2.253 10.0.2.240/28
do_exception ${ns[4]} 10.0.3.10 10.0.3.1 10.0.1.253 10.0.1.240/28
do_exception ${ns[3]} dead:3::1 dead:3::10 dead:2::fd dead:2:f0::/96
do_exception ${ns[4]} dead:3::10 dead:3::1 dead:1::fd dead:1:f0::/96
check_exceptions "exceptions"
if [ $? -ne 0 ]; then
ret=1
fi
# insert block policies with adjacent/overlapping netmasks
do_overlap ${ns[3]}
check_exceptions "exceptions and block policies"
if [ $? -ne 0 ]; then
ret=1
fi
for n in ${ns[3]} ${ns[4]};do
ip -net $n xfrm policy set hthresh4 28 24 hthresh6 126 125
sleep $((RANDOM%5))
done
check_exceptions "exceptions and block policies after hresh changes"
# full flush of policy db, check everything gets freed incl. internal meta data
ip -net ${ns[3]} xfrm policy flush
do_esp_policy ${ns[3]} 10.0.3.1 10.0.3.10 10.0.1.0/24 10.0.2.0/24
do_exception ${ns[3]} 10.0.3.1 10.0.3.10 10.0.2.253 10.0.2.240/28
# move inexact policies to hash table
ip -net ${ns[3]} xfrm policy set hthresh4 16 16
sleep $((RANDOM%5))
check_exceptions "exceptions and block policies after hthresh change in ns3"
# restore original hthresh settings -- move policies back to tables
for n in ${ns[3]} ${ns[4]};do
ip -net $n xfrm policy set hthresh4 32 32 hthresh6 128 128
sleep $((RANDOM%5))
done
check_exceptions "exceptions and block policies after htresh change to normal"
check_hthresh_repeat "policies with repeated htresh change"
check_random_order ${ns[3]} "policies inserted in random order"
cleanup_ns $ns1 $ns2 $ns3 $ns4
exit $ret
| Name | Type | Size | Permission | Actions |
|---|---|---|---|---|
| af_unix | Folder | 0755 |
|
|
| forwarding | Folder | 0755 |
|
|
| hsr | Folder | 0755 |
|
|
| lib | Folder | 0755 |
|
|
| mptcp | Folder | 0755 |
|
|
| netfilter | Folder | 0755 |
|
|
| openvswitch | Folder | 0755 |
|
|
| packetdrill | Folder | 0755 |
|
|
| rds | Folder | 0755 |
|
|
| tcp_ao | Folder | 0755 |
|
|
| Makefile | File | 4.82 KB | 0644 |
|
| altnames.sh | File | 1.77 KB | 0755 |
|
| amt.sh | File | 9.2 KB | 0755 |
|
| arp_ndisc_evict_nocarrier.sh | File | 5.15 KB | 0755 |
|
| arp_ndisc_untracked_subnets.sh | File | 7.04 KB | 0755 |
|
| bareudp.sh | File | 20.79 KB | 0755 |
|
| big_tcp.sh | File | 5.49 KB | 0755 |
|
| bind_bhash.sh | File | 1.34 KB | 0755 |
|
| busy_poll_test.sh | File | 3.47 KB | 0755 |
|
| cmsg_ipv6.sh | File | 3.34 KB | 0755 |
|
| cmsg_so_mark.sh | File | 1.54 KB | 0755 |
|
| cmsg_so_priority.sh | File | 3.93 KB | 0755 |
|
| cmsg_time.sh | File | 2.22 KB | 0755 |
|
| drop_monitor_tests.sh | File | 4.34 KB | 0755 |
|
| fcnal-test.sh | File | 106.62 KB | 0755 |
|
| fdb_flush.sh | File | 21.04 KB | 0755 |
|
| fdb_notify.sh | File | 1.81 KB | 0755 |
|
| fib-onlink-tests.sh | File | 12.04 KB | 0755 |
|
| fib_nexthop_multiprefix.sh | File | 5.81 KB | 0755 |
|
| fib_nexthop_nongw.sh | File | 2.19 KB | 0755 |
|
| fib_nexthops.sh | File | 73.9 KB | 0755 |
|
| fib_rule_tests.sh | File | 17.66 KB | 0755 |
|
| fib_tests.sh | File | 77.47 KB | 0755 |
|
| fin_ack_lat.sh | File | 507 B | 0755 |
|
| fq_band_pktlimit.sh | File | 1.81 KB | 0755 |
|
| gre_gso.sh | File | 4.04 KB | 0755 |
|
| gro.sh | File | 2.27 KB | 0755 |
|
| icmp.sh | File | 2.52 KB | 0755 |
|
| icmp_redirect.sh | File | 12.49 KB | 0755 |
|
| in_netns.sh | File | 323 B | 0755 |
|
| io_uring_zerocopy_tx.sh | File | 3 KB | 0755 |
|
| ioam6.sh | File | 50.49 KB | 0755 |
|
| ip6_gre_headroom.sh | File | 1.37 KB | 0755 |
|
| ip_defrag.sh | File | 2.04 KB | 0755 |
|
| ip_local_port_range.sh | File | 153 B | 0755 |
|
| ipv6_flowlabel.sh | File | 1 KB | 0755 |
|
| ipv6_route_update_soft_lockup.sh | File | 10.8 KB | 0755 |
|
| l2_tos_ttl_inherit.sh | File | 13.95 KB | 0755 |
|
| l2tp.sh | File | 9.68 KB | 0755 |
|
| lib.sh | File | 8.65 KB | 0644 |
|
| lwt_dst_cache_ref_loop.sh | File | 5.94 KB | 0755 |
|
| msg_zerocopy.sh | File | 2.93 KB | 0755 |
|
| ndisc_unsolicited_na_test.sh | File | 5.85 KB | 0755 |
|
| net_helper.sh | File | 514 B | 0644 |
|
| netdevice.sh | File | 5.69 KB | 0755 |
|
| netns-name.sh | File | 2.4 KB | 0755 |
|
| netns-sysctl.sh | File | 910 B | 0755 |
|
| pmtu.sh | File | 78.42 KB | 0755 |
|
| psock_snd.sh | File | 2.2 KB | 0755 |
|
| reuseaddr_ports_exhausted.sh | File | 635 B | 0755 |
|
| reuseport_addr_any.sh | File | 81 B | 0755 |
|
| route_localnet.sh | File | 1.92 KB | 0755 |
|
| rps_default_mask.sh | File | 2.19 KB | 0755 |
|
| rtnetlink.sh | File | 35.16 KB | 0755 |
|
| rxtimestamp.sh | File | 79 B | 0755 |
|
| sctp_vrf.sh | File | 5.81 KB | 0755 |
|
| setup_loopback.sh | File | 2.7 KB | 0644 |
|
| setup_veth.sh | File | 1.01 KB | 0644 |
|
| so_txtime.sh | File | 2.71 KB | 0755 |
|
| srv6_end_dt46_l3vpn_test.sh | File | 20.57 KB | 0755 |
|
| srv6_end_dt4_l3vpn_test.sh | File | 16.92 KB | 0755 |
|
| srv6_end_dt6_l3vpn_test.sh | File | 17.11 KB | 0755 |
|
| srv6_end_dx4_netfilter_test.sh | File | 10.92 KB | 0755 |
|
| srv6_end_dx6_netfilter_test.sh | File | 11.13 KB | 0755 |
|
| srv6_end_flavors_test.sh | File | 23.56 KB | 0755 |
|
| srv6_end_next_csid_l3vpn_test.sh | File | 32.53 KB | 0755 |
|
| srv6_end_x_next_csid_l3vpn_test.sh | File | 35.46 KB | 0755 |
|
| srv6_hencap_red_l3vpn_test.sh | File | 23.15 KB | 0755 |
|
| srv6_hl2encap_red_l2vpn_test.sh | File | 20.51 KB | 0755 |
|
| stress_reuseport_listen.sh | File | 539 B | 0755 |
|
| tcp_fastopen_backup_key.sh | File | 1.06 KB | 0755 |
|
| test_blackhole_dev.sh | File | 280 B | 0755 |
|
| test_bpf.sh | File | 225 B | 0755 |
|
| test_bridge_backup_port.sh | File | 27.35 KB | 0755 |
|
| test_bridge_neigh_suppress.sh | File | 28.4 KB | 0755 |
|
| test_ingress_egress_chaining.sh | File | 2.14 KB | 0644 |
|
| test_vxlan_fdb_changelink.sh | File | 678 B | 0755 |
|
| test_vxlan_mdb.sh | File | 92.63 KB | 0755 |
|
| test_vxlan_nolocalbypass.sh | File | 5.57 KB | 0755 |
|
| test_vxlan_under_vrf.sh | File | 5.54 KB | 0755 |
|
| test_vxlan_vnifiltering.sh | File | 20.91 KB | 0755 |
|
| toeplitz.sh | File | 4.87 KB | 0755 |
|
| toeplitz_client.sh | File | 667 B | 0755 |
|
| traceroute.sh | File | 6.91 KB | 0755 |
|
| txtimestamp.sh | File | 1.84 KB | 0755 |
|
| udpgro.sh | File | 5.72 KB | 0755 |
|
| udpgro_bench.sh | File | 2.08 KB | 0755 |
|
| udpgro_frglist.sh | File | 2.43 KB | 0755 |
|
| udpgro_fwd.sh | File | 7.08 KB | 0755 |
|
| udpgso.sh | File | 2.42 KB | 0755 |
|
| udpgso_bench.sh | File | 2.83 KB | 0755 |
|
| unicast_extensions.sh | File | 7.77 KB | 0755 |
|
| veth.sh | File | 10.75 KB | 0755 |
|
| vlan_bridge_binding.sh | File | 4.49 KB | 0755 |
|
| vlan_hw_filter.sh | File | 819 B | 0755 |
|
| vrf-xfrm-tests.sh | File | 10.65 KB | 0755 |
|
| vrf_route_leaking.sh | File | 16.48 KB | 0755 |
|
| vrf_strict_mode_test.sh | File | 8 KB | 0755 |
|
| xfrm_policy.sh | File | 14.65 KB | 0755 |
|
| xfrm_policy_add_speed.sh | File | 1.51 KB | 0755 |
|