2020-03-03 21:35:59 +08:00
|
|
|
# SPDX-License-Identifier: GPL-2.0-only
|
2020-09-21 22:36:57 +08:00
|
|
|
ipsec
|
2017-08-04 04:29:45 +08:00
|
|
|
msg_zerocopy
|
2013-04-20 04:36:12 +08:00
|
|
|
socket
|
|
|
|
psock_fanout
|
2018-06-01 00:14:40 +08:00
|
|
|
psock_snd
|
2013-04-20 04:36:12 +08:00
|
|
|
psock_tpacket
|
2018-12-13 05:15:37 +08:00
|
|
|
reuseport_addr_any
|
2016-01-05 06:41:48 +08:00
|
|
|
reuseport_bpf
|
2016-02-11 00:50:41 +08:00
|
|
|
reuseport_bpf_cpu
|
reuseport, bpf: add test case for bpf_get_numa_node_id
The test case is very similar to reuseport_bpf_cpu, only that here
we select socket members based on current numa node id.
# numactl -H
available: 2 nodes (0-1)
node 0 cpus: 0 1 2 3 4 5 12 13 14 15 16 17
node 0 size: 128867 MB
node 0 free: 120080 MB
node 1 cpus: 6 7 8 9 10 11 18 19 20 21 22 23
node 1 size: 96765 MB
node 1 free: 87504 MB
node distances:
node 0 1
0: 10 20
1: 20 10
# ./reuseport_bpf_numa
---- IPv4 UDP ----
send node 0, receive socket 0
send node 1, receive socket 1
send node 1, receive socket 1
send node 0, receive socket 0
---- IPv6 UDP ----
send node 0, receive socket 0
send node 1, receive socket 1
send node 1, receive socket 1
send node 0, receive socket 0
---- IPv4 TCP ----
send node 0, receive socket 0
send node 1, receive socket 1
send node 1, receive socket 1
send node 0, receive socket 0
---- IPv6 TCP ----
send node 0, receive socket 0
send node 1, receive socket 1
send node 1, receive socket 1
send node 0, receive socket 0
SUCCESS
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-10-21 18:46:34 +08:00
|
|
|
reuseport_bpf_numa
|
2016-04-13 01:11:26 +08:00
|
|
|
reuseport_dualstack
|
2017-09-19 21:51:26 +08:00
|
|
|
reuseaddr_conflict
|
2018-04-23 22:00:50 +08:00
|
|
|
tcp_mmap
|
2018-04-27 01:42:22 +08:00
|
|
|
udpgso
|
2018-04-27 01:42:25 +08:00
|
|
|
udpgso_bench_rx
|
|
|
|
udpgso_bench_tx
|
2018-06-21 06:43:44 +08:00
|
|
|
tcp_inq
|
2018-07-26 17:53:58 +08:00
|
|
|
tls
|
2018-11-25 10:09:26 +08:00
|
|
|
txring_overwrite
|
2018-08-29 02:36:20 +08:00
|
|
|
ip_defrag
|
2019-07-25 08:07:14 +08:00
|
|
|
ipv6_flowlabel
|
|
|
|
ipv6_flowlabel_mgr
|
2019-05-24 01:48:46 +08:00
|
|
|
so_txtime
|
2019-05-30 00:34:01 +08:00
|
|
|
tcp_fastopen_backup_key
|
2019-10-05 08:36:50 +08:00
|
|
|
nettest
|
selftests: net: Add FIN_ACK processing order related latency spike test
This commit adds a test for FIN_ACK process races related reconnection
latency spike issues. The issue has described and solved by the
previous commit ("tcp: Reduce SYN resend delay if a suspicous ACK is
received").
The test program is configured with a server and a client process. The
server creates and binds a socket to a port that dynamically allocated,
listen on it, and start a infinite loop. Inside the loop, it accepts
connection, reads 4 bytes from the socket, and closes the connection.
The client is constructed as an infinite loop. Inside the loop, it
creates a socket with LINGER and NODELAY option, connect to the server,
send 4 bytes data, try read some data from server. After the read()
returns, it measure the latency from the beginning of this loop to this
point and if the latency is larger than 1 second (spike), print a
message.
Reviewed-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: SeongJae Park <sjpark@amazon.de>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
2020-02-02 11:38:27 +08:00
|
|
|
fin_ack_lat
|
2020-03-26 04:32:07 +08:00
|
|
|
reuseaddr_ports_exhausted
|
|
|
|
hwtstamp_config
|
|
|
|
rxtimestamp
|
|
|
|
timestamping
|
|
|
|
txtimestamp
|