From nobody Thu Sep 18 08:15:35 2025 Delivered-To: wpasupplicant.patchew@gmail.com Received: by 2002:a05:6a06:869:b0:4b8:7781:bd2f with SMTP id d41csp549170pis; Wed, 18 May 2022 15:04:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyf+Tf/6wJlGXhVDOspg5PE+pmHHkHCsoyUJbotIKQz1h5GjUiknt1AXVpt2ehU+nWhKuHB X-Received: by 2002:a9d:73d9:0:b0:606:21c9:a283 with SMTP id m25-20020a9d73d9000000b0060621c9a283mr744661otk.321.1652911499368; Wed, 18 May 2022 15:04:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652911499; cv=none; d=google.com; s=arc-20160816; b=KIYNkD6oN3XkwNQknX5lDyl3DkbLGyVMck1NpW5JkMnVQiLczwQmWPmrdxAegnN8au VspcrFLlcu4PUUd59/GZKABP9OsxXmM2V0QyI8b2S9qqHhM4fnD+ZRcNgZyR4AB+6B0y yocSAPzCz5SC8nbNxPSEYOATgi+4B/RMPlCRIw7KFRcox6IeS8/dTsFRyNE5h7Ks0eEM 2FojWkJDwfkM/hxA4CHKBR6+d6mGH+2/ya3gIiX1coDN0DFC4ECx8sVZm4Ch3LTws8V8 QaWu6g093Mi13lsAn1bnvPUeZXMB+V4hUnUDN1bl4eawAMQN1lcVmPNt/x9kIYett9V3 H84g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=/Q9ZwGA7jnsgjBdP5vnhlivv6FeW/WCHlNzjId+JSWg=; b=KpIBOWTJVNy2YjCl2jUxxAiM4mUs/D4wsV6sGMPAyEyMZBAcVx+MtuipKbwsO2jeqD 4Nq35jxfFAw3PwcS7nmWCbgIene4M9WdULpKRHZHX0kKvHy04poA0/MQCj4cQ0/+vtax z5zNie4QoQtTbdGcAGF4Wv36dARhL6sNx4OlBn1nCMN2x0thmBEVtSSsvv5O9fSrrdHf ylhJtpvMxcE9uEDB4+2M21NJv79140MJ7ry9nU9E1vRuY/focPqcfeUfifyjBWiYYVoD UjIXbvZOV3qcu9Cx/abEKqOFuFokcja8RjtzIieTyXfFuQAOHSlVlTgmqBSLCIOCNh+J 9uwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=ZYM6iBSF; spf=pass (google.com: domain of mptcp+bounces-5377-wpasupplicant.patchew=gmail.com@lists.linux.dev designates 139.178.84.19 as permitted sender) smtp.mailfrom="mptcp+bounces-5377-wpasupplicant.patchew=gmail.com@lists.linux.dev"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from da.mirrors.kernel.org (da.mirrors.kernel.org. [139.178.84.19]) by mx.google.com with ESMTPS id y128-20020aca3286000000b002fa7b9cdfa7si3016104oiy.207.2022.05.18.15.04.59 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 18 May 2022 15:04:59 -0700 (PDT) Received-SPF: pass (google.com: domain of mptcp+bounces-5377-wpasupplicant.patchew=gmail.com@lists.linux.dev designates 139.178.84.19 as permitted sender) client-ip=139.178.84.19; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=ZYM6iBSF; spf=pass (google.com: domain of mptcp+bounces-5377-wpasupplicant.patchew=gmail.com@lists.linux.dev designates 139.178.84.19 as permitted sender) smtp.mailfrom="mptcp+bounces-5377-wpasupplicant.patchew=gmail.com@lists.linux.dev"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by da.mirrors.kernel.org (Postfix) with ESMTPS id 33C722E09F8 for ; Wed, 18 May 2022 22:04:59 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 53B0333C5; Wed, 18 May 2022 22:04:56 +0000 (UTC) X-Original-To: mptcp@lists.linux.dev Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8F6F933C7 for ; Wed, 18 May 2022 22:04:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1652911494; x=1684447494; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=7jv4TLkPgS77sTOajhv/AhHBPudRU+BK3j6zHr5UKYM=; b=ZYM6iBSFBCNyJ0IkB/0PJGvv45zYTq3yHYHZ0kZASVuAZCHxFEzaptTp EgYsXK4BLmePCAlUKV0hJAj3UUj+2r4RBnT/F6sM8EGjHS79iJfFHPsQ5 no+K94t8x+BdlUXrhv3xoyGTo8S020EyCnTIUCzfb7GdAOFTZroP1M6US oc3s2ChZaBiQOsIiFE40assefS1qS6FDHrIEOdDYagza81zrwqwpxL7Cv ASmbLcjfTwuTYdTAaoQbueJadKGkOAbT2B5u9CNsWdCxBzXLeVz4eZwRy Ou/8+uqCersrBiAb+R2mj3/SzgzVH7uEwZy9vEtezJ9wfbJyAY2Fv6/HK A==; X-IronPort-AV: E=McAfee;i="6400,9594,10351"; a="271865365" X-IronPort-AV: E=Sophos;i="5.91,235,1647327600"; d="scan'208";a="271865365" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 May 2022 15:04:51 -0700 X-IronPort-AV: E=Sophos;i="5.91,235,1647327600"; d="scan'208";a="598075443" Received: from mjmartin-desk2.amr.corp.intel.com (HELO mjmartin-desk2.intel.com) ([10.209.36.18]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 May 2022 15:04:51 -0700 From: Mat Martineau To: netdev@vger.kernel.org Cc: Geliang Tang , davem@davemloft.net, kuba@kernel.org, pabeni@redhat.com, edumazet@google.com, matthieu.baerts@tessares.net, mptcp@lists.linux.dev, Mat Martineau Subject: [PATCH net-next 4/4] selftests: mptcp: add MP_FAIL reset testcase Date: Wed, 18 May 2022 15:04:46 -0700 Message-Id: <20220518220446.209750-5-mathew.j.martineau@linux.intel.com> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220518220446.209750-1-mathew.j.martineau@linux.intel.com> References: <20220518220446.209750-1-mathew.j.martineau@linux.intel.com> Precedence: bulk X-Mailing-List: mptcp@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Geliang Tang Add the multiple subflows test case for MP_FAIL, to test the MP_FAIL reset case. Use the test_linkfail value to make 1024KB test files. Invoke reset_with_fail() to use 'iptables' and 'tc action pedit' rules to produce the bit flips to trigger the checksum failures on ns2eth2. Add delays on ns2eth1 to make sure more data can translate on ns2eth2. The check_invert flag is enabled in reset_with_fail(), so this test prints out the inverted bytes, instead of the file mismatch errors. Invoke pedit_action_pkts() to get the numbers of the packets edited by the tc pedit actions, and print this numbers to the output. Co-developed-by: Paolo Abeni Signed-off-by: Paolo Abeni Signed-off-by: Geliang Tang Signed-off-by: Mat Martineau --- tools/testing/selftests/net/mptcp/mptcp_join.sh | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/tools/testing/selftests/net/mptcp/mptcp_join.sh b/tools/testin= g/selftests/net/mptcp/mptcp_join.sh index 7381d1f85209..91039605d82f 100755 --- a/tools/testing/selftests/net/mptcp/mptcp_join.sh +++ b/tools/testing/selftests/net/mptcp/mptcp_join.sh @@ -2705,6 +2705,16 @@ fail_tests() chk_join_nr 0 0 0 +1 +0 1 0 1 "$(pedit_action_pkts)" chk_fail_nr 1 -1 invert fi + + # multiple subflows + if reset_with_fail "MP_FAIL MP_RST" 2; then + tc -n $ns2 qdisc add dev ns2eth1 root netem rate 1mbit delay 5 + pm_nl_set_limits $ns1 0 1 + pm_nl_set_limits $ns2 0 1 + pm_nl_add_endpoint $ns2 10.0.2.2 dev ns2eth2 flags subflow + run_tests $ns1 $ns2 10.0.1.1 1024 + chk_join_nr 1 1 1 1 0 1 1 0 "$(pedit_action_pkts)" + fi } =20 userspace_tests() --=20 2.36.1