TCP fastopen opt34 tests

15 views
Skip to first unread message

Ravi Kerur

unread,
Aug 12, 2023, 4:05:33 PM8/12/23
to packetdrill
Hello,

I am looking at TCP fastopen tests and had following questions

 tcp option 34 tests have // Enable server Fast Open capability
// Test the server cookie is generated by aes64 encoding of remote and local
// IP addreses with a specific master key in net.ipv4.tcp_fastopen_key.
//
// Note: there are other nearly identical simpl*.pkt tests. The differences
// are the local or remote IP addresses
//
--local_ip=192.168.0.2
--remote_ip=10.248.0.3

// Enable server Fast Open capability
// Set master key to a0bf63f7-ed803d81-cd641d30-cebc4a90
`../../common/defaults.sh
 ../../common/set_sysctls.py \
  /proc/sys/net/ipv4/tcp_fastopen=0x30403 \
  /proc/sys/net/ipv4/tcp_fastopen_key=a0bf63f7-ed803d81-cd641d30-cebc4a90`

When I check the TCP man pages it shows only
tcp_fastopen (Bitmask; default: 0x1; since Linux 3.7) Enables RFC 7413 Fast Open support. The flag is used as a bitmap with the following values:
0x1 Enables client side Fast Open support 
0x2 Enables server side Fast Open support
0x4 Allows client side to transmit data in SYN without Fast Open option
0x200 Allows server side to accept SYN data without Fast Open option
0x400 Enables Fast Open on all listeners without TCP_FASTOPEN socket option

I get 0x403 what does net.ipv4.tcp_fastopen=0x30403 give?

RFC doesn't specify AES64 encoding/decoding so anything else needs to be set for these tests?

Tests are failing in 5.19 and 6.1 kernel.

Thanks,
Ravi

Neal Cardwell

unread,
Aug 14, 2023, 3:20:21 PM8/14/23
to Ravi Kerur, packetdrill, Shuo Chen, Willem de Bruijn
The  0x30000 bits in the bit mask are enabling features that are not in upstream kernels. They are NOPs on upstream kernels, so should not be contributing to any problems upstream, I would think.

RFC doesn't specify AES64 encoding/decoding so anything else needs to be set for these tests?

We wouldn't expect anything else to be needed for these tests.
 
Tests are failing in 5.19 and 6.1 kernel.

It would be helpful if you could share your test ouput, and/or run with --debug and or strace plus tcpdump to debug what is going wrong in your runs.

Thanks!
neal

 
Thanks,
Ravi

--
You received this message because you are subscribed to the Google Groups "packetdrill" group.
To unsubscribe from this group and stop receiving emails from it, send an email to packetdrill...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/packetdrill/fdca9853-112a-4e6d-8bad-2852c90dae2cn%40googlegroups.com.

Ravi Kerur

unread,
Aug 14, 2023, 5:11:23 PM8/14/23
to packetdrill
Attached test results for FO opt34.
script-tcp-fo-opt34-test-results
Reply all
Reply to author
Forward
0 new messages