linux-yocto/tools/testing/selftests/net/packetdrill/tcp_inq_server.pkt
Willem de Bruijn 8a405552fd selftests/net: integrate packetdrill with ksft
Lay the groundwork to import into kselftests the over 150 packetdrill
TCP/IP conformance tests on github.com/google/packetdrill.

Florian recently added support for packetdrill tests in nf_conntrack,
in commit a8a388c2aa ("selftests: netfilter: add packetdrill based
conntrack tests").

This patch takes a slightly different approach. It relies on
ksft_runner.sh to run every *.pkt file in the directory.

Any future imports of packetdrill tests should require no additional
coding. Just add the *.pkt files.

Initially import only two features/directories from github. One with a
single script, and one with two. This was the only reason to pick
tcp/inq and tcp/md5.

The path replaces the directory hierarchy in github with a flat space
of files: $(subst /,_,$(wildcard tcp/**/*.pkt)). This is the most
straightforward option to integrate with kselftests. The Linked thread
reviewed two ways to maintain the hierarchy: TEST_PROGS_RECURSE and
PRESERVE_TEST_DIRS. But both introduce significant changes to
kselftest infra and with that risk to existing tests.

Implementation notes:
- restore alphabetical order when adding the new directory to
  tools/testing/selftests/Makefile
- imported *.pkt files and support verbatim from the github project,
  except for
    - update `source ./defaults.sh` path (to adjust for flat dir)
    - add SPDX headers
    - remove one author statement
    - Acknowledgment: drop an e (checkpatch)

Tested:
	make -C tools/testing/selftests \
	  TARGETS=net/packetdrill \
	  run_tests

	make -C tools/testing/selftests \
	  TARGETS=net/packetdrill \
	  install INSTALL_PATH=$KSFT_INSTALL_PATH

	# in virtme-ng
	./run_kselftest.sh -c net/packetdrill
	./run_kselftest.sh -t net/packetdrill:tcp_inq_client.pkt

Link: https://lore.kernel.org/netdev/20240827193417.2792223-1-willemdebruijn.kernel@gmail.com/
Signed-off-by: Willem de Bruijn <willemb@google.com>
Link: https://patch.msgid.link/20240905231653.2427327-3-willemdebruijn.kernel@gmail.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
2024-09-09 17:38:02 -07:00

52 lines
1.6 KiB
Plaintext

// SPDX-License-Identifier: GPL-2.0
// Test TCP_INQ and TCP_CM_INQ on the server side.
`./defaults.sh
`
// Initialize connection
0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
+0 bind(3, ..., ...) = 0
+0 listen(3, 1) = 0
+0 < S 0:0(0) win 32792 <mss 1000,sackOK,nop,nop,nop,wscale 10>
+0 > S. 0:0(0) ack 1 <mss 1460,nop,nop,sackOK,nop,wscale 8>
+.01 < . 1:1(0) ack 1 win 514
// Accept the connection and enable TCP_INQ.
+0 accept(3, ..., ...) = 4
+0 setsockopt(4, SOL_TCP, TCP_INQ, [1], 4) = 0
// Now we have 10K of data ready on the socket.
+0 < . 1:10001(10000) ack 1 win 514
+0 > . 1:1(0) ack 10001
// We read 2K and we should have 8K ready to read.
+0 recvmsg(4, {msg_name(...)=...,
msg_iov(1)=[{..., 2000}],
msg_flags=0,
msg_control=[{cmsg_level=SOL_TCP,
cmsg_type=TCP_CM_INQ,
cmsg_data=8000}]}, 0) = 2000
// We read 8K and we should have no further data ready to read.
+0 recvmsg(4, {msg_name(...)=...,
msg_iov(1)=[{..., 8000}],
msg_flags=0,
msg_control=[{cmsg_level=SOL_TCP,
cmsg_type=TCP_CM_INQ,
cmsg_data=0}]}, 0) = 8000
// Client sends more data and closes the connections.
+0 < F. 10001:20001(10000) ack 1 win 514
+0 > . 1:1(0) ack 20002
// We read 10K and we should have one "fake" byte because the connection is
// closed.
+0 recvmsg(4, {msg_name(...)=...,
msg_iov(1)=[{..., 10000}],
msg_flags=0,
msg_control=[{cmsg_level=SOL_TCP,
cmsg_type=TCP_CM_INQ,
cmsg_data=1}]}, 0) = 10000
// Now, receive error.
+0 read(3, ..., 2000) = -1 ENOTCONN (Transport endpoint is not connected)