t_ip_reass.c revision 1.1 1 1.1 ozaki /*-
2 1.1 ozaki * Copyright (c) 2018 The FreeBSD Foundation
3 1.1 ozaki *
4 1.1 ozaki * This software was developed by Mark Johnston under sponsorship from
5 1.1 ozaki * the FreeBSD Foundation.
6 1.1 ozaki *
7 1.1 ozaki * Redistribution and use in source and binary forms, with or without
8 1.1 ozaki * modification, are permitted provided that the following conditions are
9 1.1 ozaki * met:
10 1.1 ozaki * 1. Redistributions of source code must retain the above copyright
11 1.1 ozaki * notice, this list of conditions and the following disclaimer.
12 1.1 ozaki * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 ozaki * notice, this list of conditions and the following disclaimer in
14 1.1 ozaki * the documentation and/or other materials provided with the
15 1.1 ozaki * distribution.
16 1.1 ozaki *
17 1.1 ozaki * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18 1.1 ozaki * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 1.1 ozaki * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 1.1 ozaki * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21 1.1 ozaki * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 1.1 ozaki * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 1.1 ozaki * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 1.1 ozaki * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 1.1 ozaki * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 1.1 ozaki * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 1.1 ozaki * SUCH DAMAGE.
28 1.1 ozaki */
29 1.1 ozaki
30 1.1 ozaki #include <sys/cdefs.h>
31 1.1 ozaki __FBSDID("$FreeBSD$");
32 1.1 ozaki
33 1.1 ozaki #include <sys/param.h>
34 1.1 ozaki #include <sys/ioctl.h>
35 1.1 ozaki #include <sys/socket.h>
36 1.1 ozaki #include <sys/sysctl.h>
37 1.1 ozaki
38 1.1 ozaki #include <net/bpf.h>
39 1.1 ozaki #include <net/if.h>
40 1.1 ozaki #include <netinet/in.h>
41 1.1 ozaki #include <netinet/ip.h>
42 1.1 ozaki #include <netinet/ip_var.h>
43 1.1 ozaki
44 1.1 ozaki #include <err.h>
45 1.1 ozaki #include <errno.h>
46 1.1 ozaki #include <fcntl.h>
47 1.1 ozaki #include <ifaddrs.h>
48 1.1 ozaki #include <stdint.h>
49 1.1 ozaki #include <stdlib.h>
50 1.1 ozaki #include <time.h>
51 1.1 ozaki #include <unistd.h>
52 1.1 ozaki
53 1.1 ozaki #include <atf-c.h>
54 1.1 ozaki
55 1.1 ozaki struct lopacket {
56 1.1 ozaki u_int family;
57 1.1 ozaki struct ip hdr;
58 1.1 ozaki char payload[];
59 1.1 ozaki };
60 1.1 ozaki
61 1.1 ozaki static void
62 1.1 ozaki update_cksum(struct ip *ip)
63 1.1 ozaki {
64 1.1 ozaki size_t i;
65 1.1 ozaki uint32_t cksum;
66 1.1 ozaki uint16_t *cksump;
67 1.1 ozaki
68 1.1 ozaki ip->ip_sum = 0;
69 1.1 ozaki cksump = (uint16_t *)ip;
70 1.1 ozaki for (cksum = 0, i = 0; i < sizeof(*ip) / sizeof(*cksump); cksump++, i++)
71 1.1 ozaki cksum += ntohs(*cksump);
72 1.1 ozaki cksum = (cksum >> 16) + (cksum & 0xffff);
73 1.1 ozaki cksum = ~(cksum + (cksum >> 16));
74 1.1 ozaki ip->ip_sum = htons((uint16_t)cksum);
75 1.1 ozaki }
76 1.1 ozaki
77 1.1 ozaki static struct lopacket *
78 1.1 ozaki alloc_lopacket(in_addr_t dstaddr, size_t payloadlen)
79 1.1 ozaki {
80 1.1 ozaki struct ip *ip;
81 1.1 ozaki struct lopacket *packet;
82 1.1 ozaki size_t pktlen;
83 1.1 ozaki
84 1.1 ozaki pktlen = sizeof(*packet) + payloadlen;
85 1.1 ozaki packet = malloc(pktlen);
86 1.1 ozaki ATF_REQUIRE(packet != NULL);
87 1.1 ozaki
88 1.1 ozaki memset(packet, 0, pktlen);
89 1.1 ozaki packet->family = AF_INET;
90 1.1 ozaki
91 1.1 ozaki ip = &packet->hdr;
92 1.1 ozaki ip->ip_hl = sizeof(struct ip) >> 2;
93 1.1 ozaki ip->ip_v = 4;
94 1.1 ozaki ip->ip_tos = 0;
95 1.1 ozaki ip->ip_len = htons(sizeof(*ip) + payloadlen);
96 1.1 ozaki ip->ip_id = 0;
97 1.1 ozaki ip->ip_off = 0;
98 1.1 ozaki ip->ip_ttl = 1;
99 1.1 ozaki ip->ip_p = IPPROTO_IP;
100 1.1 ozaki ip->ip_sum = 0;
101 1.1 ozaki ip->ip_src.s_addr = dstaddr;
102 1.1 ozaki ip->ip_dst.s_addr = dstaddr;
103 1.1 ozaki update_cksum(ip);
104 1.1 ozaki
105 1.1 ozaki return (packet);
106 1.1 ozaki }
107 1.1 ozaki
108 1.1 ozaki static void
109 1.1 ozaki free_lopacket(struct lopacket *packet)
110 1.1 ozaki {
111 1.1 ozaki
112 1.1 ozaki free(packet);
113 1.1 ozaki }
114 1.1 ozaki
115 1.1 ozaki static void
116 1.1 ozaki write_lopacket(int bpffd, struct lopacket *packet)
117 1.1 ozaki {
118 1.1 ozaki struct timespec ts;
119 1.1 ozaki ssize_t n;
120 1.1 ozaki size_t len;
121 1.1 ozaki
122 1.1 ozaki len = sizeof(packet->family) + ntohs(packet->hdr.ip_len);
123 1.1 ozaki n = write(bpffd, packet, len);
124 1.1 ozaki ATF_REQUIRE_MSG(n >= 0, "packet write failed: %s", strerror(errno));
125 1.1 ozaki ATF_REQUIRE_MSG((size_t)n == len, "wrote %zd bytes instead of %zu",
126 1.1 ozaki n, len);
127 1.1 ozaki
128 1.1 ozaki /*
129 1.1 ozaki * Loopback packets are dispatched asynchronously, give netisr some
130 1.1 ozaki * time.
131 1.1 ozaki */
132 1.1 ozaki ts.tv_sec = 0;
133 1.1 ozaki ts.tv_nsec = 5000000; /* 5ms */
134 1.1 ozaki (void)nanosleep(&ts, NULL);
135 1.1 ozaki }
136 1.1 ozaki
137 1.1 ozaki static int
138 1.1 ozaki open_lobpf(in_addr_t *addrp)
139 1.1 ozaki {
140 1.1 ozaki struct ifreq ifr;
141 1.1 ozaki struct ifaddrs *ifa, *ifap;
142 1.1 ozaki int error, fd;
143 1.1 ozaki
144 1.1 ozaki fd = open("/dev/bpf0", O_RDWR);
145 1.1 ozaki if (fd < 0 && errno == ENOENT)
146 1.1 ozaki atf_tc_skip("no BPF device available");
147 1.1 ozaki ATF_REQUIRE_MSG(fd >= 0, "open(/dev/bpf0): %s", strerror(errno));
148 1.1 ozaki
149 1.1 ozaki error = getifaddrs(&ifap);
150 1.1 ozaki ATF_REQUIRE(error == 0);
151 1.1 ozaki for (ifa = ifap; ifa != NULL; ifa = ifa->ifa_next)
152 1.1 ozaki if ((ifa->ifa_flags & IFF_LOOPBACK) != 0 &&
153 1.1 ozaki ifa->ifa_addr->sa_family == AF_INET)
154 1.1 ozaki break;
155 1.1 ozaki if (ifa == NULL)
156 1.1 ozaki atf_tc_skip("no loopback address found");
157 1.1 ozaki
158 1.1 ozaki memset(&ifr, 0, sizeof(ifr));
159 1.1 ozaki strlcpy(ifr.ifr_name, ifa->ifa_name, IFNAMSIZ);
160 1.1 ozaki error = ioctl(fd, BIOCSETIF, &ifr);
161 1.1 ozaki ATF_REQUIRE_MSG(error == 0, "ioctl(BIOCSETIF): %s", strerror(errno));
162 1.1 ozaki
163 1.1 ozaki *addrp = ((struct sockaddr_in *)(void *)ifa->ifa_addr)->sin_addr.s_addr;
164 1.1 ozaki
165 1.1 ozaki freeifaddrs(ifap);
166 1.1 ozaki
167 1.1 ozaki return (fd);
168 1.1 ozaki }
169 1.1 ozaki
170 1.1 ozaki static void
171 1.1 ozaki get_ipstat(struct ipstat *stat)
172 1.1 ozaki {
173 1.1 ozaki size_t len;
174 1.1 ozaki int error;
175 1.1 ozaki
176 1.1 ozaki memset(stat, 0, sizeof(*stat));
177 1.1 ozaki len = sizeof(*stat);
178 1.1 ozaki error = sysctlbyname("net.inet.ip.stats", stat, &len, NULL, 0);
179 1.1 ozaki ATF_REQUIRE_MSG(error == 0, "sysctl(net.inet.ip.stats) failed: %s",
180 1.1 ozaki strerror(errno));
181 1.1 ozaki ATF_REQUIRE(len == sizeof(*stat));
182 1.1 ozaki }
183 1.1 ozaki
184 1.1 ozaki #define CHECK_IP_COUNTER(oldp, newp, counter) \
185 1.1 ozaki ATF_REQUIRE_MSG((oldp)->ips_ ## counter < (newp)->ips_ ## counter, \
186 1.1 ozaki "ips_" #counter " wasn't incremented (%ju vs. %ju)", \
187 1.1 ozaki (uintmax_t)old.ips_ ## counter, (uintmax_t)new.ips_## counter);
188 1.1 ozaki
189 1.1 ozaki /*
190 1.1 ozaki * Make sure a fragment with MF set doesn't come after the last fragment of a
191 1.1 ozaki * packet. Make sure that multiple fragments with MF clear have the same offset
192 1.1 ozaki * and length.
193 1.1 ozaki */
194 1.1 ozaki ATF_TC(ip_reass__multiple_last_fragments);
195 1.1 ozaki ATF_TC_HEAD(ip_reass__multiple_last_fragments, tc)
196 1.1 ozaki {
197 1.1 ozaki atf_tc_set_md_var(tc, "require.user", "root");
198 1.1 ozaki }
199 1.1 ozaki ATF_TC_BODY(ip_reass__multiple_last_fragments, tc)
200 1.1 ozaki {
201 1.1 ozaki struct ipstat old, new;
202 1.1 ozaki struct ip *ip;
203 1.1 ozaki struct lopacket *packet1, *packet2, *packet3, *packet4;
204 1.1 ozaki in_addr_t addr;
205 1.1 ozaki int error, fd;
206 1.1 ozaki uint16_t ipid;
207 1.1 ozaki
208 1.1 ozaki fd = open_lobpf(&addr);
209 1.1 ozaki ipid = arc4random_uniform(UINT16_MAX + 1);
210 1.1 ozaki
211 1.1 ozaki packet1 = alloc_lopacket(addr, 16);
212 1.1 ozaki ip = &packet1->hdr;
213 1.1 ozaki ip->ip_id = ipid;
214 1.1 ozaki ip->ip_off = htons(0x10);
215 1.1 ozaki update_cksum(ip);
216 1.1 ozaki
217 1.1 ozaki packet2 = alloc_lopacket(addr, 16);
218 1.1 ozaki ip = &packet2->hdr;
219 1.1 ozaki ip->ip_id = ipid;
220 1.1 ozaki ip->ip_off = htons(0x20);
221 1.1 ozaki update_cksum(ip);
222 1.1 ozaki
223 1.1 ozaki packet3 = alloc_lopacket(addr, 16);
224 1.1 ozaki ip = &packet3->hdr;
225 1.1 ozaki ip->ip_id = ipid;
226 1.1 ozaki ip->ip_off = htons(0x8);
227 1.1 ozaki update_cksum(ip);
228 1.1 ozaki
229 1.1 ozaki packet4 = alloc_lopacket(addr, 32);
230 1.1 ozaki ip = &packet4->hdr;
231 1.1 ozaki ip->ip_id = ipid;
232 1.1 ozaki ip->ip_off = htons(0x10);
233 1.1 ozaki update_cksum(ip);
234 1.1 ozaki
235 1.1 ozaki write_lopacket(fd, packet1);
236 1.1 ozaki
237 1.1 ozaki /* packet2 comes after packet1. */
238 1.1 ozaki get_ipstat(&old);
239 1.1 ozaki write_lopacket(fd, packet2);
240 1.1 ozaki get_ipstat(&new);
241 1.1 ozaki CHECK_IP_COUNTER(&old, &new, fragdropped);
242 1.1 ozaki
243 1.1 ozaki /* packet2 comes after packet1 and has MF set. */
244 1.1 ozaki packet2->hdr.ip_off = htons(IP_MF | 0x20);
245 1.1 ozaki update_cksum(&packet2->hdr);
246 1.1 ozaki get_ipstat(&old);
247 1.1 ozaki write_lopacket(fd, packet2);
248 1.1 ozaki get_ipstat(&new);
249 1.1 ozaki CHECK_IP_COUNTER(&old, &new, fragdropped);
250 1.1 ozaki
251 1.1 ozaki /* packet3 comes before packet1 but overlaps. */
252 1.1 ozaki get_ipstat(&old);
253 1.1 ozaki write_lopacket(fd, packet3);
254 1.1 ozaki get_ipstat(&new);
255 1.1 ozaki CHECK_IP_COUNTER(&old, &new, fragdropped);
256 1.1 ozaki
257 1.1 ozaki /* packet4 has the same offset as packet1 but is longer. */
258 1.1 ozaki get_ipstat(&old);
259 1.1 ozaki write_lopacket(fd, packet4);
260 1.1 ozaki get_ipstat(&new);
261 1.1 ozaki CHECK_IP_COUNTER(&old, &new, fragdropped);
262 1.1 ozaki
263 1.1 ozaki error = close(fd);
264 1.1 ozaki ATF_REQUIRE(error == 0);
265 1.1 ozaki free_lopacket(packet1);
266 1.1 ozaki free_lopacket(packet2);
267 1.1 ozaki free_lopacket(packet3);
268 1.1 ozaki free_lopacket(packet4);
269 1.1 ozaki }
270 1.1 ozaki
271 1.1 ozaki /*
272 1.1 ozaki * Make sure that we reject zero-length fragments.
273 1.1 ozaki */
274 1.1 ozaki ATF_TC(ip_reass__zero_length_fragment);
275 1.1 ozaki ATF_TC_HEAD(ip_reass__zero_length_fragment, tc)
276 1.1 ozaki {
277 1.1 ozaki atf_tc_set_md_var(tc, "require.user", "root");
278 1.1 ozaki }
279 1.1 ozaki ATF_TC_BODY(ip_reass__zero_length_fragment, tc)
280 1.1 ozaki {
281 1.1 ozaki struct ipstat old, new;
282 1.1 ozaki struct ip *ip;
283 1.1 ozaki struct lopacket *packet1, *packet2;
284 1.1 ozaki in_addr_t addr;
285 1.1 ozaki int error, fd;
286 1.1 ozaki uint16_t ipid;
287 1.1 ozaki
288 1.1 ozaki fd = open_lobpf(&addr);
289 1.1 ozaki ipid = arc4random_uniform(UINT16_MAX + 1);
290 1.1 ozaki
291 1.1 ozaki /*
292 1.1 ozaki * Create two packets, one with MF set, one without.
293 1.1 ozaki */
294 1.1 ozaki packet1 = alloc_lopacket(addr, 0);
295 1.1 ozaki ip = &packet1->hdr;
296 1.1 ozaki ip->ip_id = ipid;
297 1.1 ozaki ip->ip_off = htons(IP_MF | 0x10);
298 1.1 ozaki update_cksum(ip);
299 1.1 ozaki
300 1.1 ozaki packet2 = alloc_lopacket(addr, 0);
301 1.1 ozaki ip = &packet2->hdr;
302 1.1 ozaki ip->ip_id = ~ipid;
303 1.1 ozaki ip->ip_off = htons(0x10);
304 1.1 ozaki update_cksum(ip);
305 1.1 ozaki
306 1.1 ozaki get_ipstat(&old);
307 1.1 ozaki write_lopacket(fd, packet1);
308 1.1 ozaki get_ipstat(&new);
309 1.1 ozaki CHECK_IP_COUNTER(&old, &new, toosmall);
310 1.1 ozaki CHECK_IP_COUNTER(&old, &new, fragdropped);
311 1.1 ozaki
312 1.1 ozaki get_ipstat(&old);
313 1.1 ozaki write_lopacket(fd, packet2);
314 1.1 ozaki get_ipstat(&new);
315 1.1 ozaki CHECK_IP_COUNTER(&old, &new, toosmall);
316 1.1 ozaki CHECK_IP_COUNTER(&old, &new, fragdropped);
317 1.1 ozaki
318 1.1 ozaki error = close(fd);
319 1.1 ozaki ATF_REQUIRE(error == 0);
320 1.1 ozaki free_lopacket(packet1);
321 1.1 ozaki free_lopacket(packet2);
322 1.1 ozaki }
323 1.1 ozaki
324 1.1 ozaki ATF_TC(ip_reass__large_fragment);
325 1.1 ozaki ATF_TC_HEAD(ip_reass__large_fragment, tc)
326 1.1 ozaki {
327 1.1 ozaki atf_tc_set_md_var(tc, "require.user", "root");
328 1.1 ozaki }
329 1.1 ozaki ATF_TC_BODY(ip_reass__large_fragment, tc)
330 1.1 ozaki {
331 1.1 ozaki struct ipstat old, new;
332 1.1 ozaki struct ip *ip;
333 1.1 ozaki struct lopacket *packet1, *packet2;
334 1.1 ozaki in_addr_t addr;
335 1.1 ozaki int error, fd;
336 1.1 ozaki uint16_t ipid;
337 1.1 ozaki
338 1.1 ozaki fd = open_lobpf(&addr);
339 1.1 ozaki ipid = arc4random_uniform(UINT16_MAX + 1);
340 1.1 ozaki
341 1.1 ozaki /*
342 1.1 ozaki * Create two packets, one with MF set, one without.
343 1.1 ozaki *
344 1.1 ozaki * 16 + (0x1fff << 3) > IP_MAXPACKET, so these should fail the check.
345 1.1 ozaki */
346 1.1 ozaki packet1 = alloc_lopacket(addr, 16);
347 1.1 ozaki ip = &packet1->hdr;
348 1.1 ozaki ip->ip_id = ipid;
349 1.1 ozaki ip->ip_off = htons(IP_MF | 0x1fff);
350 1.1 ozaki update_cksum(ip);
351 1.1 ozaki
352 1.1 ozaki packet2 = alloc_lopacket(addr, 16);
353 1.1 ozaki ip = &packet2->hdr;
354 1.1 ozaki ip->ip_id = ipid;
355 1.1 ozaki ip->ip_off = htons(0x1fff);
356 1.1 ozaki update_cksum(ip);
357 1.1 ozaki
358 1.1 ozaki get_ipstat(&old);
359 1.1 ozaki write_lopacket(fd, packet1);
360 1.1 ozaki get_ipstat(&new);
361 1.1 ozaki CHECK_IP_COUNTER(&old, &new, toolong);
362 1.1 ozaki CHECK_IP_COUNTER(&old, &new, fragdropped);
363 1.1 ozaki
364 1.1 ozaki get_ipstat(&old);
365 1.1 ozaki write_lopacket(fd, packet2);
366 1.1 ozaki get_ipstat(&new);
367 1.1 ozaki CHECK_IP_COUNTER(&old, &new, toolong);
368 1.1 ozaki CHECK_IP_COUNTER(&old, &new, fragdropped);
369 1.1 ozaki
370 1.1 ozaki error = close(fd);
371 1.1 ozaki ATF_REQUIRE(error == 0);
372 1.1 ozaki free_lopacket(packet1);
373 1.1 ozaki free_lopacket(packet2);
374 1.1 ozaki }
375 1.1 ozaki
376 1.1 ozaki ATF_TP_ADD_TCS(tp)
377 1.1 ozaki {
378 1.1 ozaki ATF_TP_ADD_TC(tp, ip_reass__multiple_last_fragments);
379 1.1 ozaki ATF_TP_ADD_TC(tp, ip_reass__zero_length_fragment);
380 1.1 ozaki ATF_TP_ADD_TC(tp, ip_reass__large_fragment);
381 1.1 ozaki
382 1.1 ozaki return (atf_no_error());
383 1.1 ozaki }
384