linux-yocto/tools/testing/selftests/net/packetdrill/tcp_inq_client.pkt
Willem de Bruijn 8a405552fd selftests/net: integrate packetdrill with ksft
Lay the groundwork to import into kselftests the over 150 packetdrill
TCP/IP conformance tests on github.com/google/packetdrill.

Florian recently added support for packetdrill tests in nf_conntrack,
in commit a8a388c2aa ("selftests: netfilter: add packetdrill based
conntrack tests").

This patch takes a slightly different approach. It relies on
ksft_runner.sh to run every *.pkt file in the directory.

Any future imports of packetdrill tests should require no additional
coding. Just add the *.pkt files.

Initially import only two features/directories from github. One with a
single script, and one with two. This was the only reason to pick
tcp/inq and tcp/md5.

The path replaces the directory hierarchy in github with a flat space
of files: $(subst /,_,$(wildcard tcp/**/*.pkt)). This is the most
straightforward option to integrate with kselftests. The Linked thread
reviewed two ways to maintain the hierarchy: TEST_PROGS_RECURSE and
PRESERVE_TEST_DIRS. But both introduce significant changes to
kselftest infra and with that risk to existing tests.

Implementation notes:
- restore alphabetical order when adding the new directory to
  tools/testing/selftests/Makefile
- imported *.pkt files and support verbatim from the github project,
  except for
    - update `source ./defaults.sh` path (to adjust for flat dir)
    - add SPDX headers
    - remove one author statement
    - Acknowledgment: drop an e (checkpatch)

Tested:
	make -C tools/testing/selftests \
	  TARGETS=net/packetdrill \
	  run_tests

	make -C tools/testing/selftests \
	  TARGETS=net/packetdrill \
	  install INSTALL_PATH=$KSFT_INSTALL_PATH

	# in virtme-ng
	./run_kselftest.sh -c net/packetdrill
	./run_kselftest.sh -t net/packetdrill:tcp_inq_client.pkt

Link: https://lore.kernel.org/netdev/20240827193417.2792223-1-willemdebruijn.kernel@gmail.com/
Signed-off-by: Willem de Bruijn <willemb@google.com>
Link: https://patch.msgid.link/20240905231653.2427327-3-willemdebruijn.kernel@gmail.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
2024-09-09 17:38:02 -07:00

52 lines
1.7 KiB
Plaintext

// SPDX-License-Identifier: GPL-2.0
// Test TCP_INQ and TCP_CM_INQ on the client side.
`./defaults.sh
`
// Create a socket and set it to non-blocking.
0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
+0 fcntl(3, F_GETFL) = 0x2 (flags O_RDWR)
+0 fcntl(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0
// Connect to the server and enable TCP_INQ.
+0 connect(3, ..., ...) = -1 EINPROGRESS (Operation now in progress)
+0 setsockopt(3, SOL_TCP, TCP_INQ, [1], 4) = 0
+0 > S 0:0(0) <mss 1460,sackOK,TS val 100 ecr 0,nop,wscale 8>
+.01 < S. 0:0(0) ack 1 win 5792 <mss 1460,sackOK,TS val 700 ecr 100,nop,wscale 7>
+0 > . 1:1(0) ack 1 <nop,nop,TS val 200 ecr 700>
// Now we have 10K of data ready on the socket.
+0 < . 1:10001(10000) ack 1 win 514
+0 > . 1:1(0) ack 10001 <nop,nop,TS val 200 ecr 700>
// We read 1K and we should have 9K ready to read.
+0 recvmsg(3, {msg_name(...)=...,
msg_iov(1)=[{..., 1000}],
msg_flags=0,
msg_control=[{cmsg_level=SOL_TCP,
cmsg_type=TCP_CM_INQ,
cmsg_data=9000}]}, 0) = 1000
// We read 9K and we should have no further data ready to read.
+0 recvmsg(3, {msg_name(...)=...,
msg_iov(1)=[{..., 9000}],
msg_flags=0,
msg_control=[{cmsg_level=SOL_TCP,
cmsg_type=TCP_CM_INQ,
cmsg_data=0}]}, 0) = 9000
// Server sends more data and closes the connections.
+0 < F. 10001:20001(10000) ack 1 win 514
+0 > . 1:1(0) ack 20002 <nop,nop,TS val 200 ecr 700>
// We read 10K and we should have one "fake" byte because the connection is
// closed.
+0 recvmsg(3, {msg_name(...)=...,
msg_iov(1)=[{..., 10000}],
msg_flags=0,
msg_control=[{cmsg_level=SOL_TCP,
cmsg_type=TCP_CM_INQ,
cmsg_data=1}]}, 0) = 10000
// Now, receive EOF.
+0 read(3, ..., 2000) = 0