From nobody Thu Apr 2 20:22:04 2026 Received: from mail-pf1-f177.google.com (mail-pf1-f177.google.com [209.85.210.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 20ADA3F0AB0 for ; Wed, 1 Apr 2026 23:38:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.177 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775086707; cv=none; b=iyc3VkjCYOok/LjxpT+D3kig25wViEgBppFr81cMrSrLOTCzYdjcX6MfbfZ1AROJLJZDprnA36zMVXYLHDMRvEPd4hDdYclXgQX0SIsOiRWmEdUtaQG2i1StqXSJyyOhRsD5sTCZHfyd+/yiLLr+oEDPIv9wcOhY7olW8/xcUwo= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775086707; c=relaxed/simple; bh=8wDnYGmsZvC7abjvNEJ3Tk+IvO8q3U34sLBOd8TOXA8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=NTT5rT3z3Hb8m/4BGKuuSsFkK2+wd/ovaXsrvbwCQ9iMX8edp8wV8z5bttHhj+OGOc9FY82HD0hqMVCci7P2ltomwYpW4FswHTyRqw+sqAYuUlvO9XPZ2cwRwM6P7fSPlOzsc4LIJKf17OywvQRCePVxK/9s4OY3Gs5/Y1L/MG0= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=dama.to; spf=none smtp.mailfrom=dama.to; dkim=pass (2048-bit key) header.d=dama-to.20230601.gappssmtp.com header.i=@dama-to.20230601.gappssmtp.com header.b=KTZuEb4n; arc=none smtp.client-ip=209.85.210.177 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=dama.to Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=dama.to Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=dama-to.20230601.gappssmtp.com header.i=@dama-to.20230601.gappssmtp.com header.b="KTZuEb4n" Received: by mail-pf1-f177.google.com with SMTP id d2e1a72fcca58-82cf83bf375so132955b3a.0 for ; Wed, 01 Apr 2026 16:38:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dama-to.20230601.gappssmtp.com; s=20230601; t=1775086695; x=1775691495; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=NLMUaKCgV8ol4xEA39jbeNRFpzXzgz54RkpOpnmPJPI=; b=KTZuEb4nG6XfzTehZDj6Bg39VCQrS3nGZYzOrOI3z/REbHD+sx9jMkRR6UJxXa54b7 pzAE3YDsZg7D8PuljbxYRnxVnyrboT2NRYTRTQcd8n3Quihg2QDxbwH1z5UcAOCltjJc ovGxGqjM0jagq/bmxER106PlgneTWvqvP6uSZqkVNqvx7VZfTsOb5KSQvnKt7p3OMKRl iY54OeyMEdYXKBofkgSN8d2hLAibeD3arxn1LU1CcvxCIGx0639vDh2Mqssr82wySKA9 Tt2fZwyVuYWE6g40EInZ1jqTVt0fKdgdVW36u9TZsPnpVkyM1+UKFFuUYf/xAbOoC+c0 gUzw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1775086695; x=1775691495; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=NLMUaKCgV8ol4xEA39jbeNRFpzXzgz54RkpOpnmPJPI=; b=A3HB4byAD0xwG/tlEB6EzkccFR6M5pFw5wfDk05ZJq2XNm71do2Ptm6pqGV2LpadXv OoGuLXXvVf3WSUfKh2kHW9VDVjeOjkMjx1Sb0QXXQA8K665sysfcGz8HG8kPfcOQF6aQ ZoYlQNvlrUIMBgGLlXRU/bHYg62SLU4pIBzUxe7meQI0hV4wN7Bm6nMxxQKfnxaoCd+I uFa8p3cEP5Q/KI+23y15agVHRtID/sphnlX8ZIQaMR3EVZD5/mWdAnFvF5bcOAujD5Wg /zjxGOD7c4VVLusvNqgszx96xfLGEM5DM6HYr+vLwaW39PDGHRCTcXp8dkYyoUUCVONl DNww== X-Forwarded-Encrypted: i=1; AJvYcCWbVF8VDu4Di60vei/T4c6FLbNLGxPEfg68GADn+j3Q+scZqPpYZC2eGvKRcG5rEQzIMDQENajOllqu5sk=@vger.kernel.org X-Gm-Message-State: AOJu0Yz0c+YL7oKxD0jwprjwx1j/sTYF0xcc5XSfUfiK/v5rVxb5/Cwa ltgnzS3pyREqAvnPSQ+5tqrO80Js4sINJdZvl4QzCjs3KJEzaE3wfGTDEpqw8vz/0sI= X-Gm-Gg: ATEYQzyWwYiCMj9p4L7xpKOqG7reAQm1oeHdx/J5ljNyvXpDIonGAvepWEtDxRxuSZp Fan1dpn67TFO/bpsr8yTfjbUtPySyK1fj07gw/Ex3Yjdj3bD9KPbcnZQv4IrwmLaetzZGgs0f64 eRrW5DExamIgJEDUsdMW+7+Z7k/rC9MQpsiu/RVPQBGoFhJk5SNQnH5ZHRm2xs3EyhQ5RKDi6gy CgZKbDf6QWPiM9K2+uJqKPmeK7Pn9smaXs8isMGhbct6hGcaIzVdAaUhbA6ZJi7WTp6l3NMcT7T RaoQjXTFLy3modvsMzC6wBooP2qQxwWnznDTAjP0/llR1Ei8JrIKH/Y8O/fPkLt0ePwo9o7adT8 AVDrAKcVyT8dwLPI8F2nQRCotf/7F2461Mz2f591nYTbeVU4icqQ7yNKIXHguVQJPmOkIymNuBG fo/V3K X-Received: by 2002:a05:6a21:9983:b0:39c:787:f17a with SMTP id adf61e73a8af0-39ef76a85e2mr5757489637.41.1775086693216; Wed, 01 Apr 2026 16:38:13 -0700 (PDT) Received: from localhost ([2a03:2880:2ff:70::]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-82cf9b3dcbesm1012860b3a.22.2026.04.01.16.38.12 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 01 Apr 2026 16:38:12 -0700 (PDT) From: Joe Damato To: netdev@vger.kernel.org, Andrew Lunn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Shuah Khan Cc: horms@kernel.org, michael.chan@broadcom.com, pavan.chebbi@broadcom.com, linux-kernel@vger.kernel.org, leon@kernel.org, Joe Damato , linux-kselftest@vger.kernel.org Subject: [net-next v7 10/10] selftests: drv-net: Add USO test Date: Wed, 1 Apr 2026 16:37:38 -0700 Message-ID: <20260401233745.2333858-11-joe@dama.to> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20260401233745.2333858-1-joe@dama.to> References: <20260401233745.2333858-1-joe@dama.to> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Add a simple test for USO. Tests both ipv4 and ipv6 with several full segments and a partial segment. Suggested-by: Jakub Kicinski Signed-off-by: Joe Damato --- v7: - Dropped Pavan's Reviewed-by as there were changes. - Update to use ksft_variants with a generator and a parameterized test_= uso function. - Save original USO state and restore it at the end of the test. - Replace sleep with cfg.wait_hw_stats_settle - Use a socat receiver and check tx stats locally instead of rx on the remote. v5: - Added Pavan's Reviewed-by. No functional changes. v4: - Fix python linter issues (unused imports, docstring, etc). rfcv2: - new in rfcv2 tools/testing/selftests/drivers/net/Makefile | 1 + tools/testing/selftests/drivers/net/uso.py | 103 +++++++++++++++++++ 2 files changed, 104 insertions(+) create mode 100755 tools/testing/selftests/drivers/net/uso.py diff --git a/tools/testing/selftests/drivers/net/Makefile b/tools/testing/s= elftests/drivers/net/Makefile index 7c7fa75b80c2..335c2ce4b9ab 100644 --- a/tools/testing/selftests/drivers/net/Makefile +++ b/tools/testing/selftests/drivers/net/Makefile @@ -21,6 +21,7 @@ TEST_PROGS :=3D \ ring_reconfig.py \ shaper.py \ stats.py \ + uso.py \ xdp.py \ # end of TEST_PROGS =20 diff --git a/tools/testing/selftests/drivers/net/uso.py b/tools/testing/sel= ftests/drivers/net/uso.py new file mode 100755 index 000000000000..75bf02849075 --- /dev/null +++ b/tools/testing/selftests/drivers/net/uso.py @@ -0,0 +1,103 @@ +#!/usr/bin/env python3 +# SPDX-License-Identifier: GPL-2.0 + +"""Test USO + +Sends large UDP datagrams with UDP_SEGMENT and verifies that the peer +receives the correct number of individual segments with correct sizes. +""" +import random +import socket +import string + +from lib.py import ksft_run, ksft_exit, KsftSkipEx +from lib.py import ksft_eq, ksft_ge, ksft_variants, KsftNamedVariant +from lib.py import NetDrvEpEnv +from lib.py import bkg, defer, ethtool, ip, rand_port, wait_port_listen + +# python doesn't expose this constant, so we need to hardcode it to enable= UDP +# segmentation for large payloads +UDP_SEGMENT =3D 103 + + +def _send_uso(cfg, ipver, mss, total_payload, port): + if ipver =3D=3D "4": + sock =3D socket.socket(socket.AF_INET, socket.SOCK_DGRAM) + dst =3D (cfg.remote_addr_v["4"], port) + else: + sock =3D socket.socket(socket.AF_INET6, socket.SOCK_DGRAM) + dst =3D (cfg.remote_addr_v["6"], port) + + sock.setsockopt(socket.IPPROTO_UDP, UDP_SEGMENT, mss) + payload =3D ''.join(random.choice(string.ascii_lowercase) + for _ in range(total_payload)) + sock.sendto(payload.encode(), dst) + sock.close() + return payload + + +def _get_tx_packets(cfg): + stats =3D ip(f"-s link show dev {cfg.ifname}", json=3DTrue)[0] + return stats['stats64']['tx']['packets'] + + +def _test_uso(cfg, ipver, mss, total_payload): + cfg.require_ipver(ipver) + cfg.require_cmd("socat", remote=3DTrue) + + features =3D ethtool(f"-k {cfg.ifname}", json=3DTrue) + uso_was_on =3D features[0]["tx-udp-segmentation"]["active"] + + try: + ethtool(f"-K {cfg.ifname} tx-udp-segmentation on") + except Exception as exc: + raise KsftSkipEx( + "Device does not support tx-udp-segmentation") from exc + if not uso_was_on: + defer(ethtool, f"-K {cfg.ifname} tx-udp-segmentation off") + + expected_segs =3D (total_payload + mss - 1) // mss + + port =3D rand_port(stype=3Dsocket.SOCK_DGRAM) + rx_cmd =3D f"socat -{ipver} -T 2 -u UDP-RECV:{port},reuseport STDOUT" + + tx_before =3D _get_tx_packets(cfg) + + with bkg(rx_cmd, host=3Dcfg.remote, exit_wait=3DTrue) as rx: + wait_port_listen(port, proto=3D"udp", host=3Dcfg.remote) + _send_uso(cfg, ipver, mss, total_payload, port) + + ksft_eq(len(rx.stdout), total_payload, + comment=3Df"Received {len(rx.stdout)}B, expected {total_payloa= d}B") + + cfg.wait_hw_stats_settle() + + tx_after =3D _get_tx_packets(cfg) + tx_delta =3D tx_after - tx_before + + ksft_ge(tx_delta, expected_segs, + comment=3Df"Expected >=3D {expected_segs} tx packets, got {tx_= delta}") + + +def _uso_variants(): + for ipver in ["4", "6"]: + yield KsftNamedVariant(f"v{ipver}_partial", ipver, 1400, 1400 * 10= + 500) + yield KsftNamedVariant(f"v{ipver}_exact", ipver, 1400, 1400 * 5) + + +@ksft_variants(_uso_variants()) +def test_uso(cfg, ipver, mss, total_payload): + """Send a USO datagram and verify the peer receives the expected segme= nts.""" + _test_uso(cfg, ipver, mss, total_payload) + + +def main() -> None: + """Run USO tests.""" + with NetDrvEpEnv(__file__) as cfg: + ksft_run([test_uso], + args=3D(cfg, )) + ksft_exit() + + +if __name__ =3D=3D "__main__": + main() --=20 2.52.0