TCP/IP Regression Test Suite - GSoC '16
Student : Shivansh Rai (<shivansh@freebsd.org>)
Mentor : Hiren Panchasara (<hiren@freebsd.org>)
The Code
Overview
Regression testing is one of the most critical elements of the test artifacts and proves to be one of the most preventive measures for testing a software. Currently, within FreeBSD, there is no such tool to perform regression testing of the TCP/IP network stack. The purpose of this project is to develop tests using a regression testing tool which can then be integrated with FreeBSD. Once integrated, the tool will also facilitate further development of such tests. The regression testing tool of choice here is packetdrill.
Project description
packetdrill currently supports testing multiple scenarios for TCP/IP protocol suite within Linux. This project aims to design and implement a wire level regression test suite for FreeBSD using packetdrill. The test suite will exercise various states in the TCP/IP protocol suite, with both IPv4 and IPv6 support. Besides Linux, the packetdrill tool works on {Free, Net, Open} BSD. The existing Linux test suite implemented within packetdrill will provide a basis for understanding, and implementation of the FreeBSD test suite. For the current scope of the project, only a subset of the existing test scenarios will be implemented.
Why Packetdrill?
While valuable for measuring overall performance, TCP regression testing with netperf, application load tests, or production workloads can fail to reveal significant functional bugs in congestion control, loss recovery, flow control, security, DoS hardening and protocol state machines. Such approaches suffer from noise due to variations in site/network conditions or content, and a lack of precision and isolation, thus bugs in these areas can go unnoticed. Since netperf is supposed to be more for benchmarking purposes and what we are trying to do is measure correctness, packetdrill, which was built with the same mindset, seemed an apt choice for this project.
Deliverables
Development of TCP/IP based test suite for FreeBSD using packetdrill.
Attempt at covering all the scenarios implemented in packetdrill for Linux.
- If all the existing scenarios from Linux have been covered, attempt at working on new scenarios.
Attempt to create tests based on UDP and those related to sockets.
Scenarios covered
Scenario |
Number of tests |
Result |
|||
ICMP |
5 |
Passed |
|||
Blocking system calls |
2 |
Passed |
|||
Fast Retransmit |
1 |
Passed |
|||
Early Retransmit |
1 |
||||
Fast Recovery |
1 |
Passed |
|||
init_rto |
1 |
Passed |
|||
Initial window |
1 |
Passed |
|||
PMTU discovery |
1 |
Passed |
|||
Retransmission Timeout |
2 |
Passed |
|||
Socket Shutdown |
3 |
||||
Undo |
2 |
Passed |
|||
Connect |
1 |
Passed |
|||
TCP options establishment |
5 |
Passed |
|||
AIMD |
1 |
Passed |
|||
TIME-WAIT configuration |
1 |
Passed |
|||
Selective Acknowledgements |
1 |
Passed |
|||
Connection Close |
3 |
Passed |
|||
Simultaneous Close |
1 |
Passed |
|||
RESET from synchronized and |
6 |
Passed |
|||
TCP timestamps |
- |
Passed |
Test Plan
packetdrill supports two modes of testing - local and remote. A TUN virtual network device is used in the local testing and a physical NIC is used for remote testing. Local testing is relatively easier to use because there is less timing variation and the users need not coordinate access to multiple machines.
The following tests will be done in order to ensure proper functioning of the tests as desired -
- Local mode testing
- Remote mode testing
- IPv4 and IPv6 protocol testing
Milestones
Start |
End |
Task |
|
23 May |
|
Start of coding |
|
23 May |
24 May |
Checking for compatibility of previously developed tests for Linux with FreeBSD |
|
24 May |
19 June |
Manual development of tests based on TCP, considering all the scenarios covered in Linux tests |
|
20 June |
27 June |
Mid-term Evaluations |
|
28 June |
31 July |
Attempt at developing new tests covering additional scenarios and socket based tests for FreeBSD |
|
1 Aug |
11 Aug |
Attempt at adding support for tcp_info() options in order to use assertions successfully in packetdrill |
|
12 Aug |
14 Aug |
Code review |
|
15 Aug |
|
End of coding (soft) |
|
23 Aug |
|
End of coding (hard) |
Future Plans
Once we are successful in adding support in tcp_info() for checking window size, scenarios such as sliding window protocol, zero window handling and zero window probing can be successfully tested.
Adding support for urgent pointer in packetdrill.
packetdrill currently supports testing only a single connection at a time. An attempt will be made to patch it to support multiple concurrent connections.
The current remote mode available in packetdrill allows testing a remote host provided there is already an instance of packetdrill running on it. There is not yet support for testing a remote host that does not have packetdrill running. One such approach for enabling support for this can be that instead of getting command line arguments and the script over a TCP connection, the current instance can get it directly. Hence, the logic for handshake with the client will be removed, the packets will be injected and the client will wait for inbound packets.