/linux-6.12.1/tools/testing/selftests/net/ |
D | setup_veth.sh | 9 local -r ns_name="$2" 13 [[ -e /var/run/netns/"${ns_name}" ]] || ip netns add "${ns_name}" 15 ip link set dev "${ns_dev}" netns "${ns_name}" mtu 65535 16 ip -netns "${ns_name}" link set dev "${ns_dev}" up 18 ip netns exec "${ns_name}" ethtool -K "${ns_dev}" gro on tso off 30 local ns_name 32 for ns_name in ${client_ns} ${server_ns}; do 33 [[ -e /var/run/netns/"${ns_name}" ]] && ip netns del "${ns_name}"
|
D | setup_loopback.sh | 45 local -r ns_name="$2" 58 [[ -e /var/run/netns/"${ns_name}" ]] || ip netns add "${ns_name}" 59 ip link set dev "${ns_dev}" netns "${ns_name}" 60 ip -netns "${ns_name}" link set dev "${ns_dev}" up 62 ip -netns "${ns_name}" addr add dev "${ns_dev}" "${addr}" 70 ns_name="$1" 72 ip -netns "${ns_name}" link del dev "${ns_dev}" 73 ip netns del "${ns_name}"
|
D | lib.sh | 186 local ns_name="" 188 for ns_name in "$@"; do 190 if [ "${ns_name}" = "ns_name" ]; then 191 echo "Failed to setup namespace '${ns_name}': invalid name" 198 eval "${ns_name}=${ns_name,,}-$(mktemp -u XXXXXX)" 204 echo "Failed to create namespace $ns_name"
|
D | pmtu.sh | 730 ns_name="$(nsname ${ns})" 732 ip -n "${ns_name}" route add "${addr}" table "${rt_table}" via "${gw}" 746 ns_name="$(nsname ${ns})" 748 ip -n ${ns_name} -${fam} nexthop add id ${nhid} via ${gw} dev ${dev} 760 ns_name="$(nsname ${ns})" 762 ip -n "${ns_name}" -"${fam}" route add "${addr}" table "${rt_table}" nhid "${nhid}" 779 ns_name="$(nsname ${ns})" 785 ip link add ${if} up netns ${ns_name} type veth peer name ${ifpeer} netns ${peer_name} || return 1 789 ip -n ${ns_name} addr add ${prefix4}.${segment}.1/24 dev ${if} 790 ip -n ${ns_name} addr add ${prefix6}:${segment}::1/64 dev ${if}
|
/linux-6.12.1/security/apparmor/ |
D | policy.c | 593 const char *name, *ns_name; in aa_fqlookupn_profile() local 596 name = aa_splitn_fqname(fqname, n, &ns_name, &ns_len); in aa_fqlookupn_profile() 597 if (ns_name) { in aa_fqlookupn_profile() 598 ns = aa_lookupn_ns(labels_ns(base), ns_name, ns_len); in aa_fqlookupn_profile() 770 const char *ns_name, const char *name, in audit_policy() argument 775 ad.iface.ns = ns_name; in audit_policy() 1060 const char *ns_name = NULL, *info = NULL; in aa_replace_profiles() local 1071 error = aa_unpack(udata, &lh, &ns_name); in aa_replace_profiles() 1082 if (ns_name) { in aa_replace_profiles() 1083 if (ent->ns_name && in aa_replace_profiles() [all …]
|
D | lib.c | 62 char *aa_split_fqname(char *fqname, char **ns_name) in aa_split_fqname() argument 66 *ns_name = NULL; in aa_split_fqname() 69 *ns_name = skip_spaces(&name[1]); in aa_split_fqname() 104 const char *aa_splitn_fqname(const char *fqname, size_t n, const char **ns_name, in aa_splitn_fqname() argument 110 *ns_name = NULL; in aa_splitn_fqname() 118 *ns_name = skipn_spaces(&name[1], end - &name[1]); in aa_splitn_fqname() 119 if (!*ns_name) in aa_splitn_fqname() 122 *ns_len = split - *ns_name; in aa_splitn_fqname() 124 *ns_name = NULL; in aa_splitn_fqname() 132 *ns_len = end - *ns_name; in aa_splitn_fqname()
|
D | policy_unpack.c | 62 static int audit_iface(struct aa_profile *new, const char *ns_name, in audit_iface() argument 70 ad.iface.ns = ns_name; in audit_iface() 817 static struct aa_profile *unpack_profile(struct aa_ext *e, char **ns_name) in unpack_profile() argument 831 *ns_name = NULL; in unpack_profile() 847 *ns_name = kstrndup(tmpns, ns_len, GFP_KERNEL); in unpack_profile() 848 if (!*ns_name) { in unpack_profile() 1107 if (*ns_name) { in unpack_profile() 1108 kfree(*ns_name); in unpack_profile() 1109 *ns_name = NULL; in unpack_profile() 1288 kfree(ent->ns_name); in aa_load_ent_free() [all …]
|
D | label.c | 1270 const char *ns_name; in match_component() local 1276 ns_name = aa_ns_name(profile->ns, tp->ns, true); in match_component() 1278 state = aa_dfa_match(rules->policy->dfa, state, ns_name); in match_component() 1518 const char *ns_name = NULL; in aa_profile_snxprint() local 1530 ns_name = aa_ns_name(view, profile->ns, in aa_profile_snxprint() 1532 if (ns_name == aa_hidden_ns_name) { in aa_profile_snxprint() 1535 return snprintf(str, size, "%s", ns_name); in aa_profile_snxprint() 1542 if (ns_name) in aa_profile_snxprint() 1543 return snprintf(str, size, ":%s:%s (%s)", ns_name, in aa_profile_snxprint() 1549 if (ns_name) in aa_profile_snxprint() [all …]
|
D | domain.c | 93 const char *ns_name; in match_component() local 101 ns_name = aa_ns_name(profile->ns, tp->ns, true); in match_component() 103 state = aa_dfa_match(rules->file->dfa, state, ns_name); in match_component()
|
/linux-6.12.1/security/apparmor/include/ |
D | lib.h | 62 char *aa_split_fqname(char *args, char **ns_name); 63 const char *aa_splitn_fqname(const char *fqname, size_t n, const char **ns_name,
|
D | policy_unpack.h | 25 const char *ns_name; member
|