diff --git a/gtests/net/packetdrill/tests/bsd/tcp/listen/listen-incoming-no-tcp-flags.pkt b/gtests/net/packetdrill/tests/bsd/tcp/listen/listen-incoming-no-tcp-flags.pkt new file mode 100644 index 0000000000000000000000000000000000000000..03f2d1e72736953872bb27d05e62c07636c2ae76 --- /dev/null +++ b/gtests/net/packetdrill/tests/bsd/tcp/listen/listen-incoming-no-tcp-flags.pkt @@ -0,0 +1,25 @@ +// Test behavior when a listener gets an incoming packet from +// new sender on a non-established connection that +// doesn't have any of the TCP flags set. +// Listener should not send any response. +// Checking if we can establish a connection with the +// system after a connection reset. + +0.000 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3 +0.000 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0 +0.000 bind(3, ..., ...) = 0 +0.000 listen(3, 1) = 0 + +// An incoming TCP segment with no TCP flags set. +0.100 < - 0:0(0) win 65535 <mss 1460,sackOK,nop,nop,nop,wscale 7> +// FreeBSD ignores the packet and sends nothing. + +// Now make sure that when a valid SYN arrives shortly thereafter +// (with the same address 4-tuple) we can still successfully establish +// a connection. + +0.200 < S 0:0(0) win 65535 <mss 1460,sackOK,nop,nop,nop,wscale 7> +0.200 > S. 0:0(0) ack 1 <...> + +0.300 < . 1:1(0) ack 1 win 65535 +0.300 accept(3, ..., ...) = 4