mirror of
git://git.yoctoproject.org/linux-yocto.git
synced 2025-08-22 00:42:01 +02:00

Lay the groundwork to import into kselftests the over 150 packetdrill
TCP/IP conformance tests on github.com/google/packetdrill.
Florian recently added support for packetdrill tests in nf_conntrack,
in commit a8a388c2aa
("selftests: netfilter: add packetdrill based
conntrack tests").
This patch takes a slightly different approach. It relies on
ksft_runner.sh to run every *.pkt file in the directory.
Any future imports of packetdrill tests should require no additional
coding. Just add the *.pkt files.
Initially import only two features/directories from github. One with a
single script, and one with two. This was the only reason to pick
tcp/inq and tcp/md5.
The path replaces the directory hierarchy in github with a flat space
of files: $(subst /,_,$(wildcard tcp/**/*.pkt)). This is the most
straightforward option to integrate with kselftests. The Linked thread
reviewed two ways to maintain the hierarchy: TEST_PROGS_RECURSE and
PRESERVE_TEST_DIRS. But both introduce significant changes to
kselftest infra and with that risk to existing tests.
Implementation notes:
- restore alphabetical order when adding the new directory to
tools/testing/selftests/Makefile
- imported *.pkt files and support verbatim from the github project,
except for
- update `source ./defaults.sh` path (to adjust for flat dir)
- add SPDX headers
- remove one author statement
- Acknowledgment: drop an e (checkpatch)
Tested:
make -C tools/testing/selftests \
TARGETS=net/packetdrill \
run_tests
make -C tools/testing/selftests \
TARGETS=net/packetdrill \
install INSTALL_PATH=$KSFT_INSTALL_PATH
# in virtme-ng
./run_kselftest.sh -c net/packetdrill
./run_kselftest.sh -t net/packetdrill:tcp_inq_client.pkt
Link: https://lore.kernel.org/netdev/20240827193417.2792223-1-willemdebruijn.kernel@gmail.com/
Signed-off-by: Willem de Bruijn <willemb@google.com>
Link: https://patch.msgid.link/20240905231653.2427327-3-willemdebruijn.kernel@gmail.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
52 lines
1.6 KiB
Plaintext
52 lines
1.6 KiB
Plaintext
// SPDX-License-Identifier: GPL-2.0
|
|
// Test TCP_INQ and TCP_CM_INQ on the server side.
|
|
`./defaults.sh
|
|
`
|
|
|
|
// Initialize connection
|
|
0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
|
|
+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
|
|
+0 bind(3, ..., ...) = 0
|
|
+0 listen(3, 1) = 0
|
|
|
|
+0 < S 0:0(0) win 32792 <mss 1000,sackOK,nop,nop,nop,wscale 10>
|
|
+0 > S. 0:0(0) ack 1 <mss 1460,nop,nop,sackOK,nop,wscale 8>
|
|
+.01 < . 1:1(0) ack 1 win 514
|
|
|
|
// Accept the connection and enable TCP_INQ.
|
|
+0 accept(3, ..., ...) = 4
|
|
+0 setsockopt(4, SOL_TCP, TCP_INQ, [1], 4) = 0
|
|
|
|
// Now we have 10K of data ready on the socket.
|
|
+0 < . 1:10001(10000) ack 1 win 514
|
|
+0 > . 1:1(0) ack 10001
|
|
|
|
// We read 2K and we should have 8K ready to read.
|
|
+0 recvmsg(4, {msg_name(...)=...,
|
|
msg_iov(1)=[{..., 2000}],
|
|
msg_flags=0,
|
|
msg_control=[{cmsg_level=SOL_TCP,
|
|
cmsg_type=TCP_CM_INQ,
|
|
cmsg_data=8000}]}, 0) = 2000
|
|
// We read 8K and we should have no further data ready to read.
|
|
+0 recvmsg(4, {msg_name(...)=...,
|
|
msg_iov(1)=[{..., 8000}],
|
|
msg_flags=0,
|
|
msg_control=[{cmsg_level=SOL_TCP,
|
|
cmsg_type=TCP_CM_INQ,
|
|
cmsg_data=0}]}, 0) = 8000
|
|
// Client sends more data and closes the connections.
|
|
+0 < F. 10001:20001(10000) ack 1 win 514
|
|
+0 > . 1:1(0) ack 20002
|
|
|
|
// We read 10K and we should have one "fake" byte because the connection is
|
|
// closed.
|
|
+0 recvmsg(4, {msg_name(...)=...,
|
|
msg_iov(1)=[{..., 10000}],
|
|
msg_flags=0,
|
|
msg_control=[{cmsg_level=SOL_TCP,
|
|
cmsg_type=TCP_CM_INQ,
|
|
cmsg_data=1}]}, 0) = 10000
|
|
// Now, receive error.
|
|
+0 read(3, ..., 2000) = -1 ENOTCONN (Transport endpoint is not connected)
|