mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-12-27 11:06:41 -05:00
selftests/net: Drop timeout argument from test_client_verify()
It's always TEST_TIMEOUT_SEC, with an unjustified exception in rst test, that is more paranoia-long timeout rather than based on requirements. Signed-off-by: Dmitry Safonov <0x7f454c46@gmail.com> Link: https://patch.msgid.link/20250319-tcp-ao-selftests-polling-v2-7-da48040153d1@gmail.com Signed-off-by: Jakub Kicinski <kuba@kernel.org>
This commit is contained in:
committed by
Jakub Kicinski
parent
1e1738faa2
commit
edbac739e4
@@ -53,7 +53,7 @@ static void *client_fn(void *arg)
|
||||
if (test_get_tcp_counters(sk, &ao1))
|
||||
test_error("test_get_tcp_counters()");
|
||||
|
||||
if (test_client_verify(sk, 100, nr_packets, TEST_TIMEOUT_SEC)) {
|
||||
if (test_client_verify(sk, 100, nr_packets)) {
|
||||
test_fail("verify failed");
|
||||
return NULL;
|
||||
}
|
||||
|
||||
@@ -395,7 +395,6 @@ static void icmp_interfere(const size_t nr, uint32_t rcv_nxt, void *src, void *d
|
||||
|
||||
static void send_interfered(int sk)
|
||||
{
|
||||
const unsigned int timeout = TEST_TIMEOUT_SEC;
|
||||
struct sockaddr_in6 src, dst;
|
||||
socklen_t addr_sz;
|
||||
|
||||
@@ -409,7 +408,7 @@ static void send_interfered(int sk)
|
||||
while (1) {
|
||||
uint32_t rcv_nxt;
|
||||
|
||||
if (test_client_verify(sk, packet_size, packets_nr, timeout)) {
|
||||
if (test_client_verify(sk, packet_size, packets_nr)) {
|
||||
test_fail("client: connection is broken");
|
||||
return;
|
||||
}
|
||||
|
||||
@@ -918,7 +918,7 @@ static int run_client(const char *tst_name, unsigned int port,
|
||||
collection.keys[rnext_index].used_on_server_tx = 1;
|
||||
|
||||
synchronize_threads(); /* 3: accepted => send data */
|
||||
if (test_client_verify(sk, msg_sz, msg_nr, TEST_TIMEOUT_SEC)) {
|
||||
if (test_client_verify(sk, msg_sz, msg_nr)) {
|
||||
test_fail("verify failed");
|
||||
close(sk);
|
||||
if (before)
|
||||
@@ -1016,7 +1016,7 @@ static void try_unmatched_keys(int sk, int *rnext_index, unsigned int port)
|
||||
trace_ao_event_expect(TCP_AO_RNEXT_REQUEST, this_ip_addr, this_ip_dest,
|
||||
-1, port, 0, -1, -1, -1, -1, -1,
|
||||
-1, key->server_keyid, -1);
|
||||
if (test_client_verify(sk, msg_len, nr_packets, TEST_TIMEOUT_SEC))
|
||||
if (test_client_verify(sk, msg_len, nr_packets))
|
||||
test_fail("verify failed");
|
||||
*rnext_index = i;
|
||||
}
|
||||
@@ -1061,7 +1061,7 @@ static void check_current_back(const char *tst_name, unsigned int port,
|
||||
port, -1, 0, -1, -1, -1, -1, -1,
|
||||
collection.keys[rotate_to_index].client_keyid,
|
||||
collection.keys[current_index].client_keyid, -1);
|
||||
if (test_client_verify(sk, msg_len, nr_packets, TEST_TIMEOUT_SEC))
|
||||
if (test_client_verify(sk, msg_len, nr_packets))
|
||||
test_fail("verify failed");
|
||||
/* There is a race here: between setting the current_key with
|
||||
* setsockopt(TCP_AO_INFO) and starting to send some data - there
|
||||
@@ -1099,7 +1099,7 @@ static void roll_over_keys(const char *tst_name, unsigned int port,
|
||||
collection.keys[i].server_keyid, -1);
|
||||
if (test_set_key(sk, -1, collection.keys[i].server_keyid))
|
||||
test_error("Can't change the Rnext key");
|
||||
if (test_client_verify(sk, msg_len, nr_packets, TEST_TIMEOUT_SEC)) {
|
||||
if (test_client_verify(sk, msg_len, nr_packets)) {
|
||||
test_fail("verify failed");
|
||||
close(sk);
|
||||
test_tcp_counters_free(&tmp);
|
||||
|
||||
@@ -484,8 +484,7 @@ static inline int test_set_ao_flags(int sk, bool ao_required, bool accept_icmps)
|
||||
}
|
||||
|
||||
extern ssize_t test_server_run(int sk, ssize_t quota, time_t timeout_sec);
|
||||
extern int test_client_verify(int sk, const size_t msg_len, const size_t nr,
|
||||
time_t timeout_sec);
|
||||
extern int test_client_verify(int sk, const size_t msg_len, const size_t nr);
|
||||
|
||||
struct tcp_ao_key_counters {
|
||||
uint8_t sndid;
|
||||
|
||||
@@ -646,7 +646,7 @@ int test_skpair_server(int sk, ssize_t quota, test_cnt cond, volatile int *err)
|
||||
|
||||
static ssize_t test_client_loop(int sk, size_t buf_sz, const size_t msg_len,
|
||||
struct tcp_counters *c, test_cnt cond,
|
||||
volatile int *err, time_t timeout_sec)
|
||||
volatile int *err)
|
||||
{
|
||||
char msg[msg_len];
|
||||
int nodelay = 1;
|
||||
@@ -665,7 +665,7 @@ static ssize_t test_client_loop(int sk, size_t buf_sz, const size_t msg_len,
|
||||
size_t sent, bytes = min(msg_len, buf_sz - i);
|
||||
int ret;
|
||||
|
||||
ret = __test_skpair_poll(sk, 1, timeout_sec, c, cond, err);
|
||||
ret = __test_skpair_poll(sk, 1, TEST_TIMEOUT_SEC, c, cond, err);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
@@ -679,7 +679,8 @@ static ssize_t test_client_loop(int sk, size_t buf_sz, const size_t msg_len,
|
||||
do {
|
||||
ssize_t got;
|
||||
|
||||
ret = __test_skpair_poll(sk, 0, timeout_sec, c, cond, err);
|
||||
ret = __test_skpair_poll(sk, 0, TEST_TIMEOUT_SEC,
|
||||
c, cond, err);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
@@ -698,13 +699,12 @@ static ssize_t test_client_loop(int sk, size_t buf_sz, const size_t msg_len,
|
||||
return i;
|
||||
}
|
||||
|
||||
int test_client_verify(int sk, const size_t msg_len, const size_t nr,
|
||||
time_t timeout_sec)
|
||||
int test_client_verify(int sk, const size_t msg_len, const size_t nr)
|
||||
{
|
||||
size_t buf_sz = msg_len * nr;
|
||||
ssize_t ret;
|
||||
|
||||
ret = test_client_loop(sk, buf_sz, msg_len, NULL, 0, NULL, timeout_sec);
|
||||
ret = test_client_loop(sk, buf_sz, msg_len, NULL, 0, NULL);
|
||||
if (ret < 0)
|
||||
return (int)ret;
|
||||
return ret != buf_sz ? -1 : 0;
|
||||
@@ -722,8 +722,7 @@ int test_skpair_client(int sk, const size_t msg_len, const size_t nr,
|
||||
test_error("test_get_tcp_counters()");
|
||||
synchronize_threads(); /* 1: init skpair & read nscounters */
|
||||
|
||||
ret = test_client_loop(sk, buf_sz, msg_len, &c, cond, err,
|
||||
TEST_TIMEOUT_SEC);
|
||||
ret = test_client_loop(sk, buf_sz, msg_len, &c, cond, err);
|
||||
test_tcp_counters_free(&c);
|
||||
if (ret < 0)
|
||||
return (int)ret;
|
||||
|
||||
@@ -124,7 +124,7 @@ static void test_get_sk_checkpoint(unsigned int server_port, sockaddr_af *saddr,
|
||||
test_error("failed to connect()");
|
||||
|
||||
synchronize_threads(); /* 2: accepted => send data */
|
||||
if (test_client_verify(sk, msg_len, nr_packets, TEST_TIMEOUT_SEC))
|
||||
if (test_client_verify(sk, msg_len, nr_packets))
|
||||
test_fail("pre-migrate verify failed");
|
||||
|
||||
test_enable_repair(sk);
|
||||
|
||||
@@ -287,7 +287,7 @@ static void test_client_active_rst(unsigned int port)
|
||||
test_error("failed to connect()");
|
||||
|
||||
synchronize_threads(); /* 3: close listen socket */
|
||||
if (test_client_verify(sk[0], packet_sz, quota / packet_sz, TEST_TIMEOUT_SEC))
|
||||
if (test_client_verify(sk[0], packet_sz, quota / packet_sz))
|
||||
test_fail("Failed to send data on connected socket");
|
||||
else
|
||||
test_ok("Verified established tcp connection");
|
||||
@@ -340,7 +340,7 @@ static void test_client_passive_rst(unsigned int port)
|
||||
test_error("failed to connect()");
|
||||
|
||||
synchronize_threads(); /* 2: accepted => send data */
|
||||
if (test_client_verify(sk, packet_sz, quota / packet_sz, TEST_TIMEOUT_SEC))
|
||||
if (test_client_verify(sk, packet_sz, quota / packet_sz))
|
||||
test_fail("Failed to send data on connected socket");
|
||||
else
|
||||
test_ok("Verified established tcp connection");
|
||||
@@ -416,7 +416,7 @@ static void test_client_passive_rst(unsigned int port)
|
||||
* IP 10.0.254.1.7011 > 10.0.1.1.59772: Flags [R], seq 3215596252, win 0,
|
||||
* options [tcp-ao keyid 100 rnextkeyid 100 mac 0x0bcfbbf497bce844312304b2], length 0
|
||||
*/
|
||||
err = test_client_verify(sk, packet_sz, quota / packet_sz, 2 * TEST_TIMEOUT_SEC);
|
||||
err = test_client_verify(sk, packet_sz, quota / packet_sz);
|
||||
/* Make sure that the connection was reset, not timeouted */
|
||||
if (err && err == -ECONNRESET)
|
||||
test_ok("client sock was passively reset post-seq-adjust");
|
||||
|
||||
@@ -70,7 +70,7 @@ static void tcp_self_connect(const char *tst, unsigned int port,
|
||||
test_error("failed to connect()");
|
||||
}
|
||||
|
||||
if (test_client_verify(sk, 100, nr_packets, TEST_TIMEOUT_SEC)) {
|
||||
if (test_client_verify(sk, 100, nr_packets)) {
|
||||
test_fail("%s: tcp connection verify failed", tst);
|
||||
close(sk);
|
||||
return;
|
||||
@@ -136,7 +136,7 @@ static void tcp_self_connect(const char *tst, unsigned int port,
|
||||
test_ao_restore(sk, &ao_img);
|
||||
test_disable_repair(sk);
|
||||
test_sock_state_free(&img);
|
||||
if (test_client_verify(sk, 100, nr_packets, TEST_TIMEOUT_SEC)) {
|
||||
if (test_client_verify(sk, 100, nr_packets)) {
|
||||
test_fail("%s: tcp connection verify failed", tst);
|
||||
close(sk);
|
||||
return;
|
||||
|
||||
@@ -191,7 +191,7 @@ static void *client_fn(void *arg)
|
||||
test_error("failed to connect()");
|
||||
|
||||
synchronize_threads(); /* 2: accepted => send data */
|
||||
if (test_client_verify(sk, msg_len, nr_packets, TEST_TIMEOUT_SEC)) {
|
||||
if (test_client_verify(sk, msg_len, nr_packets)) {
|
||||
test_fail("pre-migrate verify failed");
|
||||
return NULL;
|
||||
}
|
||||
@@ -216,7 +216,7 @@ static void *client_fn(void *arg)
|
||||
test_server_port + 1, &cnt1);
|
||||
|
||||
synchronize_threads(); /* 5: verify the connection during SEQ-number rollover */
|
||||
if (test_client_verify(sk, msg_len, nr_packets, TEST_TIMEOUT_SEC))
|
||||
if (test_client_verify(sk, msg_len, nr_packets))
|
||||
test_fail("post-migrate verify failed");
|
||||
else
|
||||
test_ok("post-migrate connection alive");
|
||||
|
||||
Reference in New Issue
Block a user