t_ping.c revision 314817
1/*	$NetBSD: t_ping.c,v 1.17 2017/01/13 21:30:42 christos Exp $	*/
2
3/*-
4 * Copyright (c) 2010 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 *    notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in the
14 *    documentation and/or other materials provided with the distribution.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND
17 * CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
18 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY
21 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
23 * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
24 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
25 * IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
26 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
27 * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 */
29
30#include <sys/cdefs.h>
31#ifndef lint
32__RCSID("$NetBSD: t_ping.c,v 1.17 2017/01/13 21:30:42 christos Exp $");
33#endif /* not lint */
34
35#include <sys/types.h>
36#include <sys/resource.h>
37#include <sys/sysctl.h>
38#include <sys/wait.h>
39
40#include <atf-c.h>
41#include <assert.h>
42#include <fcntl.h>
43#include <stdio.h>
44#include <stdlib.h>
45#include <string.h>
46#include <unistd.h>
47#include <signal.h>
48
49#include <netinet/in.h>
50#include <netinet/ip_var.h>
51
52#include <rump/rump.h>
53#include <rump/rump_syscalls.h>
54
55#include "h_macros.h"
56#include "../config/netconfig.c"
57
58ATF_TC(simpleping);
59ATF_TC_HEAD(simpleping, tc)
60{
61
62	atf_tc_set_md_var(tc, "descr", "check that kernel responds to ping");
63	atf_tc_set_md_var(tc, "timeout", "20");
64}
65
66ATF_TC_BODY(simpleping, tc)
67{
68	char ifname[IFNAMSIZ];
69	pid_t cpid;
70	bool win, win2;
71	char token;
72	int channel[2];
73
74	RL(pipe(channel));
75
76	cpid = fork();
77	rump_init();
78	netcfg_rump_makeshmif("but-can-i-buy-your-ether-bus", ifname);
79
80	switch (cpid) {
81	case -1:
82		atf_tc_fail_errno("fork failed");
83	case 0:
84		netcfg_rump_if(ifname, "1.1.1.10", "255.255.255.0");
85		close(channel[0]);
86		ATF_CHECK(write(channel[1], "U", 1) == 1);
87		close(channel[1]);
88		pause();
89		break;
90	default:
91		break;
92	}
93
94	close(channel[1]);
95	ATF_CHECK(read(channel[0], &token, 1) == 1 && token == 'U');
96	close(channel[0]);
97
98	netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");
99
100	/*
101	 * The beauty of shmif is that we don't have races here.
102	 */
103	win = netcfg_rump_pingtest("1.1.1.10", 500);
104	win2 = netcfg_rump_pingtest("1.1.1.30", 500);
105
106	kill(cpid, SIGKILL);
107
108	if (!win)
109		atf_tc_fail("ping failed");
110	if (win2)
111		atf_tc_fail("non-existent host responded");
112}
113
114ATF_TC(floodping);
115ATF_TC_HEAD(floodping, tc)
116{
117
118	atf_tc_set_md_var(tc, "descr", "see how kernel responds to floodping");
119}
120
121/* why the hell isn't this available in userspace??? */
122static uint16_t
123in_cksum(void *data, size_t len)
124{
125	uint16_t *buf = data;
126	unsigned sum;
127
128	for (sum = 0; len > 1; len -= 2)
129		sum += *buf++;
130	if (len)
131		sum += *(uint8_t *)buf;
132
133	sum = (sum >> 16) + (sum & 0xffff);
134	sum += (sum >> 16);
135
136	return ~sum;
137}
138
139static int
140doping(const char *target, int loops, u_int pktsize)
141{
142	union {
143		char buf[IP_MAXPACKET - sizeof(struct ip)];
144		struct icmp i;	/* ensure proper alignment */
145	} sndbuf;
146	char recvbuf[IP_MAXPACKET];
147	struct sockaddr_in dst, pingee;
148	struct icmp *icmp;
149	socklen_t slen;
150	ssize_t n;
151	int loop, succ;
152	int x, xnon, s;
153
154	RL(s = rump_sys_socket(PF_INET, SOCK_RAW, IPPROTO_ICMP));
155	RL(x = rump_sys_fcntl(s, F_GETFL, 0));
156	xnon = x | O_NONBLOCK;
157
158	memset(&dst, 0, sizeof(dst));
159	dst.sin_len = sizeof(dst);
160	dst.sin_family = AF_INET;
161	dst.sin_addr.s_addr = inet_addr(target);
162
163	icmp = (struct icmp *)&sndbuf;
164	memset(icmp, 0, sizeof(*icmp));
165	icmp->icmp_type = ICMP_ECHO;
166	icmp->icmp_id = htons(37);
167
168	if (pktsize < sizeof(*icmp))
169		pktsize = sizeof(*icmp);
170	if (pktsize > sizeof(sndbuf.buf))
171		pktsize = sizeof(sndbuf.buf);
172
173	RL(rump_sys_setsockopt(s, SOL_SOCKET, SO_SNDBUF,
174	    &pktsize, sizeof(pktsize)));
175	RL(rump_sys_setsockopt(s, SOL_SOCKET, SO_RCVBUF,
176	    &pktsize, sizeof(pktsize)));
177
178	slen = sizeof(pingee);
179	succ = 0;
180	for (loop = 0; loop < loops; loop++) {
181		RL(rump_sys_fcntl(s, F_SETFL, x));
182		icmp->icmp_seq = htons(loop);
183		icmp->icmp_cksum = 0;
184		icmp->icmp_cksum = in_cksum(icmp, pktsize);
185		RL(rump_sys_sendto(s, icmp, pktsize, 0,
186		    (struct sockaddr *)&dst, sizeof(dst)));
187
188		RL(rump_sys_fcntl(s, F_SETFL, xnon));
189		while ((n = rump_sys_recvfrom(s, recvbuf, sizeof(recvbuf), 0,
190		    (struct sockaddr *)&pingee, &slen)) > 0) {
191			succ++;
192		}
193		if (n == -1 && errno == EAGAIN)
194			continue;
195		atf_tc_fail_errno("recv failed");
196	}
197
198	rump_sys_close(s);
199	return succ;
200}
201
202#define LOOPS 10000
203
204ATF_TC_BODY(floodping, tc)
205{
206	char ifname[IFNAMSIZ];
207	pid_t cpid;
208	int succ;
209
210	cpid = fork();
211	rump_init();
212	netcfg_rump_makeshmif("thank-you-driver-for-getting-me-here", ifname);
213
214	switch (cpid) {
215	case -1:
216		atf_tc_fail_errno("fork failed");
217	case 0:
218		netcfg_rump_if(ifname, "1.1.1.10", "255.255.255.0");
219		pause();
220		break;
221	default:
222		break;
223	}
224
225	netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");
226
227	succ = doping("1.1.1.10", LOOPS, 56);
228	printf("got %d/%d\n", succ, LOOPS);
229
230	kill(cpid, SIGKILL);
231}
232
233ATF_TC(floodping2);
234ATF_TC_HEAD(floodping2, tc)
235{
236
237	atf_tc_set_md_var(tc, "descr", "two hosts floodpinging each other");
238}
239
240ATF_TC_BODY(floodping2, tc)
241{
242	char ifname[IFNAMSIZ];
243	pid_t cpid;
244	int succ;
245
246	cpid = fork();
247	rump_init();
248	netcfg_rump_makeshmif("floodping2", ifname);
249
250	switch (cpid) {
251	case -1:
252		atf_tc_fail_errno("fork failed");
253	case 0:
254		netcfg_rump_if(ifname, "1.1.1.10", "255.255.255.0");
255		succ = doping("1.1.1.20", LOOPS, 56);
256		break;
257	default:
258		netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");
259		succ = doping("1.1.1.10", LOOPS, 56);
260		break;
261	}
262
263	printf("got %d/%d\n", succ, LOOPS);
264}
265
266ATF_TC(pingsize);
267ATF_TC_HEAD(pingsize, tc)
268{
269
270	atf_tc_set_md_var(tc, "descr", "ping with packets min <= size <= max");
271}
272
273ATF_TC_BODY(pingsize, tc)
274{
275	char ifname[IFNAMSIZ];
276	pid_t cpid;
277	int succ, i;
278
279	cpid = fork();
280	rump_init();
281	netcfg_rump_makeshmif("jippikaiee", ifname);
282
283	switch (cpid) {
284	case -1:
285		atf_tc_fail_errno("fork failed");
286	case 0:
287		netcfg_rump_if(ifname, "1.1.1.10", "255.255.255.0");
288		pause();
289		break;
290	default:
291		break;
292	}
293
294	netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");
295
296	succ = 0;
297
298	/* small sizes */
299	for (i = 0 ; i < IP_MAXPACKET - 60000; i++)
300		succ += doping("1.1.1.10", 1, i);
301
302	/* medium sizes */
303	for (i = IP_MAXPACKET - 60000; i < IP_MAXPACKET - 100; i += 1000)
304		succ += doping("1.1.1.10", 1, i);
305
306	/* big sizes */
307	for (i = IP_MAXPACKET - 100; i < IP_MAXPACKET; i += 10)
308		succ += doping("1.1.1.10", 1, i);
309
310	printf("got %d/%d\n", succ, IP_MAXPACKET);
311	kill(cpid, SIGKILL);
312}
313
314ATF_TC(ping_of_death);
315ATF_TC_HEAD(ping_of_death, tc)
316{
317
318	atf_tc_set_md_var(tc, "descr", "send a \"ping of death\"");
319	atf_tc_set_md_var(tc, "timeout", "20");
320}
321
322ATF_TC_BODY(ping_of_death, tc)
323{
324	char data[1500];
325	struct sockaddr_in dst;
326	struct ip *ip;
327	struct icmp *icmp;
328	char ifname[IFNAMSIZ];
329	pid_t cpid;
330	size_t tot, frag;
331	int s, x, loop;
332
333	cpid = fork();
334	rump_init();
335	netcfg_rump_makeshmif("jippikaiee", ifname);
336
337	switch (cpid) {
338	case -1:
339		atf_tc_fail_errno("fork failed");
340	case 0:
341		/* wait until we receive a too long IP packet */
342		for (loop = 0;; loop++) {
343			uint64_t ipstat[IP_NSTATS];
344			size_t arglen;
345			int mib[4];
346
347			if (loop == 1)
348				netcfg_rump_if(ifname,
349				    "1.1.1.10", "255.255.255.0");
350
351			mib[0] = CTL_NET;
352			mib[1] = PF_INET;
353			mib[2] = IPPROTO_IP;
354			mib[3] = IPCTL_STATS;
355
356			arglen = sizeof(ipstat);
357			RL(rump_sys___sysctl(mib, 4, &ipstat, &arglen,
358			    NULL, 0));
359			if (loop == 0 && ipstat[IP_STAT_TOOLONG] != 0)
360				_exit(1);
361			if (ipstat[IP_STAT_TOOLONG])
362				break;
363			usleep(10000);
364		}
365
366		_exit(0);
367		break;
368	default:
369		break;
370	}
371
372	netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");
373
374	RL(s = rump_sys_socket(PF_INET, SOCK_RAW, 0));
375	x = 1;
376	RL(rump_sys_setsockopt(s, IPPROTO_IP, IP_HDRINCL, &x, sizeof(x)));
377
378	memset(&dst, 0, sizeof(dst));
379	dst.sin_len = sizeof(dst);
380	dst.sin_family = AF_INET;
381	dst.sin_addr.s_addr = inet_addr("1.1.1.10");
382
383	/* construct packet */
384	memset(data, 0, sizeof(data));
385	ip = (struct ip *)data;
386	ip->ip_v = 4;
387	ip->ip_hl = sizeof(*ip) >> 2;
388	ip->ip_p = IPPROTO_ICMP;
389	ip->ip_ttl = IPDEFTTL;
390	ip->ip_dst = dst.sin_addr;
391	ip->ip_id = 1234;
392
393	icmp = (struct icmp *)(ip + 1);
394	icmp->icmp_type = ICMP_ECHO;
395	icmp->icmp_cksum = in_cksum(icmp, sizeof(*icmp));
396
397	for (;;) {
398		int status;
399
400		/* resolve arp before sending raw stuff */
401		netcfg_rump_pingtest("1.1.1.10", 1);
402
403		for (tot = 0;
404		    tot < 65538 - sizeof(*ip);
405		    tot += (frag - sizeof(*ip))) {
406			frag = MIN(65538 - tot, sizeof(data));
407			ip->ip_off = tot >> 3;
408			assert((size_t)ip->ip_off << 3 == tot);
409			ip->ip_len = frag;
410
411			if (frag == sizeof(data)) {
412				ip->ip_off |= IP_MF;
413			}
414
415			RL(rump_sys_sendto(s, data, frag, 0,
416			    (struct sockaddr *)&dst, sizeof(dst)));
417		}
418		if (waitpid(-1, &status, WNOHANG) > 0) {
419			if (WIFEXITED(status) && WEXITSTATUS(status) == 0)
420				break;
421			atf_tc_fail("child did not exit clean");
422		}
423
424		usleep(10000);
425	}
426}
427
428ATF_TP_ADD_TCS(tp)
429{
430
431	ATF_TP_ADD_TC(tp, simpleping);
432	ATF_TP_ADD_TC(tp, floodping);
433	ATF_TP_ADD_TC(tp, floodping2);
434	ATF_TP_ADD_TC(tp, pingsize);
435	ATF_TP_ADD_TC(tp, ping_of_death);
436
437	return atf_no_error();
438}
439