aboutsummaryrefslogtreecommitdiff
path: root/net/icmp/t_ping.c
diff options
context:
space:
mode:
Diffstat (limited to 'net/icmp/t_ping.c')
-rw-r--r--net/icmp/t_ping.c438
1 files changed, 438 insertions, 0 deletions
diff --git a/net/icmp/t_ping.c b/net/icmp/t_ping.c
new file mode 100644
index 000000000000..fd8067c803aa
--- /dev/null
+++ b/net/icmp/t_ping.c
@@ -0,0 +1,438 @@
+/* $NetBSD: t_ping.c,v 1.15 2012/09/04 22:31:58 alnsn Exp $ */
+
+/*-
+ * Copyright (c) 2010 The NetBSD Foundation, Inc.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND
+ * CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
+ * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+ * IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY
+ * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
+ * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
+ * IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
+ * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
+ * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <sys/cdefs.h>
+#ifndef lint
+__RCSID("$NetBSD: t_ping.c,v 1.15 2012/09/04 22:31:58 alnsn Exp $");
+#endif /* not lint */
+
+#include <sys/types.h>
+#include <sys/resource.h>
+#include <sys/sysctl.h>
+#include <sys/wait.h>
+
+#include <atf-c.h>
+#include <assert.h>
+#include <fcntl.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+#include <signal.h>
+
+#include <netinet/in.h>
+#include <netinet/ip_var.h>
+
+#include <rump/rump.h>
+#include <rump/rump_syscalls.h>
+
+#include "../../h_macros.h"
+#include "../config/netconfig.c"
+
+ATF_TC(simpleping);
+ATF_TC_HEAD(simpleping, tc)
+{
+
+ atf_tc_set_md_var(tc, "descr", "check that kernel responds to ping");
+ atf_tc_set_md_var(tc, "timeout", "2");
+}
+
+ATF_TC_BODY(simpleping, tc)
+{
+ char ifname[IFNAMSIZ];
+ pid_t cpid;
+ bool win, win2;
+ char token;
+ int channel[2];
+
+ RL(pipe(channel));
+
+ cpid = fork();
+ rump_init();
+ netcfg_rump_makeshmif("but-can-i-buy-your-ether-bus", ifname);
+
+ switch (cpid) {
+ case -1:
+ atf_tc_fail_errno("fork failed");
+ case 0:
+ netcfg_rump_if(ifname, "1.1.1.10", "255.255.255.0");
+ close(channel[0]);
+ ATF_CHECK(write(channel[1], "U", 1) == 1);
+ close(channel[1]);
+ pause();
+ break;
+ default:
+ break;
+ }
+
+ close(channel[1]);
+ ATF_CHECK(read(channel[0], &token, 1) == 1 && token == 'U');
+ close(channel[0]);
+
+ netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");
+
+ /*
+ * The beauty of shmif is that we don't have races here.
+ */
+ win = netcfg_rump_pingtest("1.1.1.10", 500);
+ win2 = netcfg_rump_pingtest("1.1.1.30", 500);
+
+ kill(cpid, SIGKILL);
+
+ if (!win)
+ atf_tc_fail("ping failed");
+ if (win2)
+ atf_tc_fail("non-existent host responded");
+}
+
+ATF_TC(floodping);
+ATF_TC_HEAD(floodping, tc)
+{
+
+ atf_tc_set_md_var(tc, "descr", "see how kernel responds to floodping");
+}
+
+/* why the hell isn't this available in userspace??? */
+static uint16_t
+in_cksum(void *data, size_t len)
+{
+ uint16_t *buf = data;
+ unsigned sum;
+
+ for (sum = 0; len > 1; len -= 2)
+ sum += *buf++;
+ if (len)
+ sum += *(uint8_t *)buf;
+
+ sum = (sum >> 16) + (sum & 0xffff);
+ sum += (sum >> 16);
+
+ return ~sum;
+}
+
+static int
+doping(const char *target, int loops, u_int pktsize)
+{
+ union {
+ char buf[IP_MAXPACKET - sizeof(struct ip)];
+ struct icmp i; /* ensure proper alignment */
+ } sndbuf;
+ char recvbuf[IP_MAXPACKET];
+ struct sockaddr_in dst, pingee;
+ struct icmp *icmp;
+ socklen_t slen;
+ ssize_t n;
+ int loop, succ;
+ int x, xnon, s;
+
+ RL(s = rump_sys_socket(PF_INET, SOCK_RAW, IPPROTO_ICMP));
+ RL(x = rump_sys_fcntl(s, F_GETFL, 0));
+ xnon = x | O_NONBLOCK;
+
+ memset(&dst, 0, sizeof(dst));
+ dst.sin_len = sizeof(dst);
+ dst.sin_family = AF_INET;
+ dst.sin_addr.s_addr = inet_addr(target);
+
+ icmp = (struct icmp *)&sndbuf;
+ memset(icmp, 0, sizeof(*icmp));
+ icmp->icmp_type = ICMP_ECHO;
+ icmp->icmp_id = htons(37);
+
+ if (pktsize < sizeof(*icmp))
+ pktsize = sizeof(*icmp);
+ if (pktsize > sizeof(sndbuf.buf))
+ pktsize = sizeof(sndbuf.buf);
+
+ RL(rump_sys_setsockopt(s, SOL_SOCKET, SO_SNDBUF,
+ &pktsize, sizeof(pktsize)));
+ RL(rump_sys_setsockopt(s, SOL_SOCKET, SO_RCVBUF,
+ &pktsize, sizeof(pktsize)));
+
+ slen = sizeof(pingee);
+ succ = 0;
+ for (loop = 0; loop < loops; loop++) {
+ RL(rump_sys_fcntl(s, F_SETFL, x));
+ icmp->icmp_seq = htons(loop);
+ icmp->icmp_cksum = 0;
+ icmp->icmp_cksum = in_cksum(icmp, pktsize);
+ RL(rump_sys_sendto(s, icmp, pktsize, 0,
+ (struct sockaddr *)&dst, sizeof(dst)));
+
+ RL(rump_sys_fcntl(s, F_SETFL, xnon));
+ while ((n = rump_sys_recvfrom(s, recvbuf, sizeof(recvbuf), 0,
+ (struct sockaddr *)&pingee, &slen)) > 0) {
+ succ++;
+ }
+ if (n == -1 && errno == EAGAIN)
+ continue;
+ atf_tc_fail_errno("recv failed");
+ }
+
+ rump_sys_close(s);
+ return succ;
+}
+
+#define LOOPS 10000
+
+ATF_TC_BODY(floodping, tc)
+{
+ char ifname[IFNAMSIZ];
+ pid_t cpid;
+ int succ;
+
+ cpid = fork();
+ rump_init();
+ netcfg_rump_makeshmif("thank-you-driver-for-getting-me-here", ifname);
+
+ switch (cpid) {
+ case -1:
+ atf_tc_fail_errno("fork failed");
+ case 0:
+ netcfg_rump_if(ifname, "1.1.1.10", "255.255.255.0");
+ pause();
+ break;
+ default:
+ break;
+ }
+
+ netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");
+
+ succ = doping("1.1.1.10", LOOPS, 56);
+ printf("got %d/%d\n", succ, LOOPS);
+
+ kill(cpid, SIGKILL);
+}
+
+ATF_TC(floodping2);
+ATF_TC_HEAD(floodping2, tc)
+{
+
+ atf_tc_set_md_var(tc, "descr", "two hosts floodpinging each other");
+}
+
+ATF_TC_BODY(floodping2, tc)
+{
+ char ifname[IFNAMSIZ];
+ pid_t cpid;
+ int succ;
+
+ cpid = fork();
+ rump_init();
+ netcfg_rump_makeshmif("floodping2", ifname);
+
+ switch (cpid) {
+ case -1:
+ atf_tc_fail_errno("fork failed");
+ case 0:
+ netcfg_rump_if(ifname, "1.1.1.10", "255.255.255.0");
+ succ = doping("1.1.1.20", LOOPS, 56);
+ break;
+ default:
+ netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");
+ succ = doping("1.1.1.10", LOOPS, 56);
+ break;
+ }
+
+ printf("got %d/%d\n", succ, LOOPS);
+}
+
+ATF_TC(pingsize);
+ATF_TC_HEAD(pingsize, tc)
+{
+
+ atf_tc_set_md_var(tc, "descr", "ping with packets min <= size <= max");
+}
+
+ATF_TC_BODY(pingsize, tc)
+{
+ char ifname[IFNAMSIZ];
+ pid_t cpid;
+ int succ, i;
+
+ cpid = fork();
+ rump_init();
+ netcfg_rump_makeshmif("jippikaiee", ifname);
+
+ switch (cpid) {
+ case -1:
+ atf_tc_fail_errno("fork failed");
+ case 0:
+ netcfg_rump_if(ifname, "1.1.1.10", "255.255.255.0");
+ pause();
+ break;
+ default:
+ break;
+ }
+
+ netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");
+
+ succ = 0;
+
+ /* small sizes */
+ for (i = 0 ; i < IP_MAXPACKET - 60000; i++)
+ succ += doping("1.1.1.10", 1, i);
+
+ /* medium sizes */
+ for (i = IP_MAXPACKET - 60000; i < IP_MAXPACKET - 100; i += 1000)
+ succ += doping("1.1.1.10", 1, i);
+
+ /* big sizes */
+ for (i = IP_MAXPACKET - 100; i < IP_MAXPACKET; i += 10)
+ succ += doping("1.1.1.10", 1, i);
+
+ printf("got %d/%d\n", succ, IP_MAXPACKET);
+ kill(cpid, SIGKILL);
+}
+
+ATF_TC(ping_of_death);
+ATF_TC_HEAD(ping_of_death, tc)
+{
+
+ atf_tc_set_md_var(tc, "descr", "send a \"ping of death\"");
+ atf_tc_set_md_var(tc, "timeout", "2");
+}
+
+ATF_TC_BODY(ping_of_death, tc)
+{
+ char data[1500];
+ struct sockaddr_in dst;
+ struct ip *ip;
+ struct icmp *icmp;
+ char ifname[IFNAMSIZ];
+ pid_t cpid;
+ size_t tot, frag;
+ int s, x, loop;
+
+ cpid = fork();
+ rump_init();
+ netcfg_rump_makeshmif("jippikaiee", ifname);
+
+ switch (cpid) {
+ case -1:
+ atf_tc_fail_errno("fork failed");
+ case 0:
+ /* wait until we receive a too long IP packet */
+ for (loop = 0;; loop++) {
+ uint64_t ipstat[IP_NSTATS];
+ size_t arglen;
+ int mib[4];
+
+ if (loop == 1)
+ netcfg_rump_if(ifname,
+ "1.1.1.10", "255.255.255.0");
+
+ mib[0] = CTL_NET;
+ mib[1] = PF_INET;
+ mib[2] = IPPROTO_IP;
+ mib[3] = IPCTL_STATS;
+
+ arglen = sizeof(ipstat);
+ RL(rump_sys___sysctl(mib, 4, &ipstat, &arglen,
+ NULL, 0));
+ if (loop == 0 && ipstat[IP_STAT_TOOLONG] != 0)
+ _exit(1);
+ if (ipstat[IP_STAT_TOOLONG])
+ break;
+ usleep(10000);
+ }
+
+ _exit(0);
+ break;
+ default:
+ break;
+ }
+
+ netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");
+
+ RL(s = rump_sys_socket(PF_INET, SOCK_RAW, 0));
+ x = 1;
+ RL(rump_sys_setsockopt(s, IPPROTO_IP, IP_HDRINCL, &x, sizeof(x)));
+
+ memset(&dst, 0, sizeof(dst));
+ dst.sin_len = sizeof(dst);
+ dst.sin_family = AF_INET;
+ dst.sin_addr.s_addr = inet_addr("1.1.1.10");
+
+ /* construct packet */
+ memset(data, 0, sizeof(data));
+ ip = (struct ip *)data;
+ ip->ip_v = 4;
+ ip->ip_hl = sizeof(*ip) >> 2;
+ ip->ip_p = IPPROTO_ICMP;
+ ip->ip_ttl = IPDEFTTL;
+ ip->ip_dst = dst.sin_addr;
+ ip->ip_id = 1234;
+
+ icmp = (struct icmp *)(ip + 1);
+ icmp->icmp_type = ICMP_ECHO;
+ icmp->icmp_cksum = in_cksum(icmp, sizeof(*icmp));
+
+ for (;;) {
+ int status;
+
+ /* resolve arp before sending raw stuff */
+ netcfg_rump_pingtest("1.1.1.10", 1);
+
+ for (tot = 0;
+ tot < 65538 - sizeof(*ip);
+ tot += (frag - sizeof(*ip))) {
+ frag = MIN(65538 - tot, sizeof(data));
+ ip->ip_off = tot >> 3;
+ assert((size_t)ip->ip_off << 3 == tot);
+ ip->ip_len = frag;
+
+ if (frag == sizeof(data)) {
+ ip->ip_off |= IP_MF;
+ }
+
+ RL(rump_sys_sendto(s, data, frag, 0,
+ (struct sockaddr *)&dst, sizeof(dst)));
+ }
+ if (waitpid(-1, &status, WNOHANG) > 0) {
+ if (WIFEXITED(status) && WEXITSTATUS(status) == 0)
+ break;
+ atf_tc_fail("child did not exit clean");
+ }
+
+ usleep(10000);
+ }
+}
+
+ATF_TP_ADD_TCS(tp)
+{
+
+ ATF_TP_ADD_TC(tp, simpleping);
+ ATF_TP_ADD_TC(tp, floodping);
+ ATF_TP_ADD_TC(tp, floodping2);
+ ATF_TP_ADD_TC(tp, pingsize);
+ ATF_TP_ADD_TC(tp, ping_of_death);
+
+ return atf_no_error();
+}