Packetdrill's concise user guide

Packetdrill's concise user guide

1. Packetdrill compilation and installation

  1. Source code link https://github.com/google/packetdrill.git
  2. Source code compilation annotation netdev.c
/* Set the offload flags to be like a typical ethernet device */
static void set_device_offload_flags(struct local_netdev *netdev)
{
#ifdef linux
// const u32 offload =
// TUN_F_CSUM | TUN_F_TSO4 | TUN_F_TSO6 | TUN_F_TSO_ECN | TUN_F_UFO;
// if (ioctl(netdev->tun_fd, TUNSETOFFLOAD, offload) != 0)
// die_perror("TUNSETOFFLOAD");
#endif
}

./configure && make

How to use

./packetdrill test.pkt

test.pkt is a test script written in Packetdrill syntax.

Success: No output, indicating the script is correct and everything is as expected.

Failure: Indicates where the script failed and why.

2. Packetdrill executes its own test cases

  1. Open tcpdump -i any tcp port 8080 to capture packets for easy analysis
  2. Fast retransmission is tested here, and the test environment is centos7.2.
  3. Simple description: < indicates input, and packetdrill will construct a real data packet. >Indicates a packet to which the protocol stack is expected to respond. (This packet is not constructed by packetdrill, but is sent by the protocol stack.)
// Test fast retransmit with 4 packets outstanding, receiver sending SACKs.
// In this variant the receiver supports SACK.
// Establish a connection.
0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
+0 bind(3, ..., ...) = 0
+0 listen(3, 1) = 0
//Three-way handshake+0 < S 0:0(0) win 32792 <mss 1000,sackOK,nop,nop,nop,wscale 7>
+0 > S. 0:0(0) ack 1 <...>
+.1 < . 1:1(0) ack 1 win 257
+0 accept(3, ..., ...) = 4
// System call, let the protocol stack send 100 bytes // Send 1 data segment and get an ACK, so cwnd is now 4.
+0 write(4, ..., 1000) = 1000
//The protocol stack is expected to send psh, ack, but it actually sends ack1
//+0 > P. 1:1001(1000) ack 2
//Inject ack into the protocol stack
+.1 < . 1:1(0) ack 1001 win 257
// Write 4 data segments.
//System call, let the protocol stack send 4000 bytes + 0 write(4, ..., 4000) = 4000
//The protocol stack is expected to send psh, ack, but it actually sends seq 1001:2001, ack 1; seq 2001:3001, ack 1; seq 3001:4001, ack 1; [P.], seq 4001:5001, ack 1
//+0 > P. 1001:5001(4000) ack 1
// Get 3 SACKs.
//Send three acks to the protocol stack in succession
+.1 < . 1:1(0) ack 1001 win 257 <sack 2001:3001,nop,nop>
+0 < . 1:1(0) ack 1001 win 257 <sack 2001:4001,nop,nop>
+0 < . 1:1(0) ack 1001 win 257 <sack 2001:5001,nop,nop>
// We've received 3 duplicate ACKs, so we do a fast retransmit.
//The protocol stack is expected to issue a fast retransmit Seq 1001:2001, ack 1
//+0 > . 1001:2001(1000) ack 1
// Receiver ACKs all data.
//ACK to the protocol stack and respond to the ACK of all messages.
+.1 < . 1:1(0) ack 6001 win 257
4. Modify fr-4pkt-sack-linux.pkt as follows.
+0 > P. 1:1001(1000) ack 2  +0 > P. 1:1001(1000) ack 1
//+0 > P. 1001:5001(4000) ack 1  
+0 > . 1001:2001(1000) ack 1
+0 > . 2001:3001(1000) ack 1
+0 > . 3001:4001(1000) ack 1
+0 > P. 4001:5001(1000) ack 1

[Note: If an error occurs when executing the test case provided by packetdrill, it is usually because the packet sent by the protocol stack does not meet the expected packet. First, eliminate the part that is greater than the expected one, then execute the test case, and then analyze the expected result by capturing the packet. Usually due to the limitation of three-way handshake mss]

  1. Executing: ../../../packetdrill fr-4pkt-sack-linux.pkt, no errors.
  2. The following results can be seen by capturing packets: if ACK is repeated three times, fast retransmission is implemented. Achieve the expected effect.
// Construct the packet yourself to implement three repeated ack 1001.
07:57:36.469280 IP 192.0.2.1.36840 > TENCENT64.site.webcache: Flags [.], ack 1001, win 257, options [sack 1 {2001:3001},nop,nop], length 0
07:57:36.469836 IP 192.0.2.1.36840 > TENCENT64.site.webcache: Flags [.], ack 1001, win 257, options [sack 1 {2001:4001},nop,nop], length 0
07:57:36.470349 IP 192.0.2.1.36840 > TENCENT64.site.webcache: Flags [.], ack 1001, win 257, options [sack 1 {2001:5001},nop,nop], length 0
// The protocol stack initiates fast retransmission. Seq 1001:2001,ack 1,1000
07:57:36.470376 IP TENCENT64.site.webcache > 192.0.2.1.36840: Flags [.], seq 1001:2001, ack 1, win 229, length 1000

3. Packetdrill explains its own test case description

Here we mainly explain the basic syntax of packetdrill.

A script can contain four types of statements: data packets, system calls, shell commands, and python statements.
Each statement must begin with a timestamp indicating when it was executed.

  • Packets

Data packets are divided into: input data packets and output data packets, the format is similar to tcpdump,
Supports TCP, UDP, ICMP, and most of TCP options.

Input data packet (< means input): Packetdrill will construct a real data packet and then inject it into the protocol stack.

example:

0.100 < S 0:0(0) win 32792 <mss 1000, nop, nop, sackOK, nop, wscale 7>
0.250 < [1:1461(1460)] icmp unreachable frag_needed mtu 1200

Output data packet (> indicates output): packetdrill will check whether the protocol stack actually sends such a packet.

+0 > udp (1472)
  • System Calls

The format of the system calls is similar to strace.
For each system call, packetdrill executes it at the specified time and checks whether the return value is the same as expected. System calls are mainly used for scene construction and non-test end data sending and receiving.

Examples of common system calls:
System calls

connect(3, ..., ...) = -1 EINPROGRESS (Operation now in progress) //Client connects to server getsockopt(3, SOL_SOCKET, SO_ERROR, [0], [4]) = 0 //Get socketopt
fcntl(3, F_SETFL, O_RDWR) = 0 //Fcntl settings ioctl(4, SIOCINQ, [1000]) = 0 //Ioctl settings read(3, ..., 1024) = 785 //Read data write(3, ..., 57) = 57 //Write data close(3) = 0 //Close the connection socket(..., SOCK_STREAM, IPPROTO_TCP) = 3 //Tcp socket
setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0 //Set address reuse bind(3, ..., ...) = 0 //Bind port listen(3, 1) = 0 //Listen port accept(3, ..., ...) = 4 //Accept connection
  • Shell script usage

Common usage is to use shell scripts to set kernel parameters or call shell commands to collect TCP statistics. set up

example:

+0 `sysctl -q net.ipv4.tcp_timestamps=0`
+0 `ss -4 -n state SYN-RECV | grep 192.168.0.1:8080 > /dev/null`
  • Usage of Python script

A common usage is to use Python's assert to assert whether the information in tcp_info meets expectations.

example:

0.310%
assert tcpi_reordering == 3
assert tcpi_unacked == 10
assert tcpi_sacked == 6
assert tcpi_ca_state == TCP_CA_Recovery
}%
  • Timestamp

Each statement must begin with a timestamp, indicating when it was executed, or when an event is expected to occur. The test case may fail due to timing issues.

Timestamps can use a variety of formats:

Absolute: 0.75
Relative: +0.2
Wildcard (any time):*
Range (absolute time interval): 0.750~0.900
Relative Range: +0.1~+0.2
Loose (allowable error value): --tolerance_usecs=800
Blocking (blocking time interval): 0.750...0.900

If the corresponding event does not occur at the specified timestamp, an error will be reported and the actual occurrence time of the event will be informed.

+1.0 > S. 0:0(0) ack 1 <mss 1460,nop,nop,sackOK,nop,wscale 6>

It is expected that TCP should send a SYNACK packet after 1 second.

In actual use, –tolerance_usecs=405000 is generally specified, which means that a time error of 4ms is allowed.

4. Packetdrill implements basic scenario construction test

The scene structure of a scene is either a client scene or a server scene. For details on how to construct a specific package, please refer to the test cases that come with packetdrill.

1. Server scenario

Construct the server-side scenario: the data packet input end is the client. The packet output end is the system call, which acts as a server.

// Establish a connection.
0.000 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
0.000 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
0.000 bind(3, ..., ...) = 0
0.000 listen(3, 1) = 0
0.000...0.200 accept(3, ..., ...) = 4
0.100 < S 0:0(0) win 32792 <mss 1000,nop,wscale 7>
0.100 > S. 0:0(0) ack 1 <mss 1460,nop,wscale 6>
0.200 < . 1:1(0) ack 1 win 257
//The server calls the system call and expects to send 2 packets.
0.300 write(4, ..., 2000) = 2000
//0.300 > P. 1:2001(2000) ack 1
0.300 > . 1:1001(1000) ack 1
0.300 > P. 1001:2001(1000) ack 1

1. Client scene construction

Construct the server-side scenario: the data packet input end is the server end. The packet output end is the system call, which acts as a client.

// Create a socket and set it to non-blocking.
0.000 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
0.000 fcntl(3, F_GETFL) = 0x2 (flags O_RDWR)
0.000 fcntl(3, F_SETFL, O_RDWR|O_NONBLOCK) = 0
// Establish connection and verify that there was no error.
0.100 connect(3, ..., ...) = -1 EINPROGRESS (Operation now in progress)
0.100 > S 0:0(0) <mss 1460,sackOK,TS val 100 ecr 0,nop,wscale 6>
0.200 < S. 0:0(0) ack 1 win 5792 <mss 1460,sackOK,TS val 700 ecr 100,nop,wscale 7>
0.200 > . 1:1(0) ack 1 <nop,nop,TS val 200 ecr 700>
//The client calls the system call, expecting to make an http request.
// Send the HTTP request.
0.200 write(3, ..., 57) = 57
0.200 > P. 1:58(57) ack 1 <nop,nop,TS val 200 ecr 700>
0.300 < . 1:1(0) ack 58 win 92 <nop,nop,TS val 800 ecr 200>

Summarize

The above is the full content of this article. I hope that the content of this article will have certain reference learning value for your study or work. Thank you for your support of 123WORDPRESS.COM. If you want to learn more about this, please check out the following links

You may also be interested in:
  • Java URL custom private network protocol
  • In-depth understanding of SQL Server 2008 network protocols
  • Getmac returns the Media Access Control (MAC) addresses of all network cards in the computer and a list of the network protocols for each address.
  • Winsockfix network protocol repair tool
  • TCP protocol detailed explanation_Powernode Java Academy
  • Python3 implements simple server and client examples of TCP protocol (sharing)
  • C# basic tutorial on server and client communication programming based on TCP protocol
  • Using C language to write a Socket communication program based on TCP protocol
  • Android programming uses HTTP protocol and TCP protocol to upload files
  • Java socket programming example based on TCP protocol
  • .Net WInform Development Notes (II) Winform Program Operation Structure Diagram and Application of TCP Protocol in Winform

<<:  Detailed explanation of JavaScript Reduce

>>:  Solution to the problem of failure to insert emoji expressions into MySQL

Recommend

Detailed explanation of Nginx forwarding socket port configuration

Common scenarios for Nginx forwarding socket port...

Detailed tutorial on deploying SpringBoot + Vue project to Linux server

Preface Let me share with you how I deployed a Sp...

Detailed tutorial on how to create a user in mysql and grant user permissions

Table of contents User Management Create a new us...

Java uses Apache.POI to export HSSFWorkbook to Excel

Use HSSFWorkbook in Apache.POI to export to Excel...

Global call implementation of Vue2.x Picker on mobile terminal

Table of contents What is the Picker component Pr...

Linux series of commonly used operation and maintenance commands (summary)

Table of contents 1. System monitoring 2. File Op...

Analyzing the troublesome Aborted warning in MySQL through case studies

This article mainly introduces the relevant conte...

JavaScript to implement a simple clock

This article example shares the specific code for...

Dynamically edit data in Layui table row

Table of contents Preface Style Function Descript...

Nginx reverse proxy springboot jar package process analysis

The common way to deploy a springboot project to ...

In IIS 7.5, HTML supports the include function like SHTML (add module mapping)

When I first started, I found a lot of errors. In...