github.com/FlowerWrong/netstack@v0.0.0-20191009141956-e5848263af28/tcpip/network/ipv4/ipv4_test.go (about)

     1  // Copyright 2018 The gVisor Authors.
     2  //
     3  // Licensed under the Apache License, Version 2.0 (the "License");
     4  // you may not use this file except in compliance with the License.
     5  // You may obtain a copy of the License at
     6  //
     7  //     http://www.apache.org/licenses/LICENSE-2.0
     8  //
     9  // Unless required by applicable law or agreed to in writing, software
    10  // distributed under the License is distributed on an "AS IS" BASIS,
    11  // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    12  // See the License for the specific language governing permissions and
    13  // limitations under the License.
    14  
    15  package ipv4_test
    16  
    17  import (
    18  	"bytes"
    19  	"encoding/hex"
    20  	"math/rand"
    21  	"testing"
    22  
    23  	"github.com/FlowerWrong/netstack/tcpip"
    24  	"github.com/FlowerWrong/netstack/tcpip/buffer"
    25  	"github.com/FlowerWrong/netstack/tcpip/header"
    26  	"github.com/FlowerWrong/netstack/tcpip/link/channel"
    27  	"github.com/FlowerWrong/netstack/tcpip/link/sniffer"
    28  	"github.com/FlowerWrong/netstack/tcpip/network/ipv4"
    29  	"github.com/FlowerWrong/netstack/tcpip/stack"
    30  	"github.com/FlowerWrong/netstack/tcpip/transport/tcp"
    31  	"github.com/FlowerWrong/netstack/tcpip/transport/udp"
    32  	"github.com/FlowerWrong/netstack/waiter"
    33  )
    34  
    35  func TestExcludeBroadcast(t *testing.T) {
    36  	s := stack.New(stack.Options{
    37  		NetworkProtocols:   []stack.NetworkProtocol{ipv4.NewProtocol()},
    38  		TransportProtocols: []stack.TransportProtocol{udp.NewProtocol()},
    39  	})
    40  
    41  	const defaultMTU = 65536
    42  	ep := stack.LinkEndpoint(channel.New(256, defaultMTU, ""))
    43  	if testing.Verbose() {
    44  		ep = sniffer.New(ep)
    45  	}
    46  	if err := s.CreateNIC(1, ep); err != nil {
    47  		t.Fatalf("CreateNIC failed: %v", err)
    48  	}
    49  
    50  	if err := s.AddAddress(1, ipv4.ProtocolNumber, header.IPv4Any); err != nil {
    51  		t.Fatalf("AddAddress failed: %v", err)
    52  	}
    53  
    54  	s.SetRouteTable([]tcpip.Route{{
    55  		Destination: header.IPv4EmptySubnet,
    56  		NIC:         1,
    57  	}})
    58  
    59  	randomAddr := tcpip.FullAddress{NIC: 1, Addr: "\x0a\x00\x00\x01", Port: 53}
    60  
    61  	var wq waiter.Queue
    62  	t.Run("WithoutPrimaryAddress", func(t *testing.T) {
    63  		ep, err := s.NewEndpoint(udp.ProtocolNumber, ipv4.ProtocolNumber, &wq)
    64  		if err != nil {
    65  			t.Fatal(err)
    66  		}
    67  		defer ep.Close()
    68  
    69  		// Cannot connect using a broadcast address as the source.
    70  		if err := ep.Connect(randomAddr); err != tcpip.ErrNoRoute {
    71  			t.Errorf("got ep.Connect(...) = %v, want = %v", err, tcpip.ErrNoRoute)
    72  		}
    73  
    74  		// However, we can bind to a broadcast address to listen.
    75  		if err := ep.Bind(tcpip.FullAddress{Addr: header.IPv4Broadcast, Port: 53, NIC: 1}); err != nil {
    76  			t.Errorf("Bind failed: %v", err)
    77  		}
    78  	})
    79  
    80  	t.Run("WithPrimaryAddress", func(t *testing.T) {
    81  		ep, err := s.NewEndpoint(udp.ProtocolNumber, ipv4.ProtocolNumber, &wq)
    82  		if err != nil {
    83  			t.Fatal(err)
    84  		}
    85  		defer ep.Close()
    86  
    87  		// Add a valid primary endpoint address, now we can connect.
    88  		if err := s.AddAddress(1, ipv4.ProtocolNumber, "\x0a\x00\x00\x02"); err != nil {
    89  			t.Fatalf("AddAddress failed: %v", err)
    90  		}
    91  		if err := ep.Connect(randomAddr); err != nil {
    92  			t.Errorf("Connect failed: %v", err)
    93  		}
    94  	})
    95  }
    96  
    97  // makeHdrAndPayload generates a randomize packet. hdrLength indicates how much
    98  // data should already be in the header before WritePacket. extraLength
    99  // indicates how much extra space should be in the header. The payload is made
   100  // from many Views of the sizes listed in viewSizes.
   101  func makeHdrAndPayload(hdrLength int, extraLength int, viewSizes []int) (buffer.Prependable, buffer.VectorisedView) {
   102  	hdr := buffer.NewPrependable(hdrLength + extraLength)
   103  	hdr.Prepend(hdrLength)
   104  	rand.Read(hdr.View())
   105  
   106  	var views []buffer.View
   107  	totalLength := 0
   108  	for _, s := range viewSizes {
   109  		newView := buffer.NewView(s)
   110  		rand.Read(newView)
   111  		views = append(views, newView)
   112  		totalLength += s
   113  	}
   114  	payload := buffer.NewVectorisedView(totalLength, views)
   115  	return hdr, payload
   116  }
   117  
   118  // comparePayloads compared the contents of all the packets against the contents
   119  // of the source packet.
   120  func compareFragments(t *testing.T, packets []packetInfo, sourcePacketInfo packetInfo, mtu uint32) {
   121  	t.Helper()
   122  	// Make a complete array of the sourcePacketInfo packet.
   123  	source := header.IPv4(packets[0].Header.View()[:header.IPv4MinimumSize])
   124  	source = append(source, sourcePacketInfo.Header.View()...)
   125  	source = append(source, sourcePacketInfo.Payload.ToView()...)
   126  
   127  	// Make a copy of the IP header, which will be modified in some fields to make
   128  	// an expected header.
   129  	sourceCopy := header.IPv4(append(buffer.View(nil), source[:source.HeaderLength()]...))
   130  	sourceCopy.SetChecksum(0)
   131  	sourceCopy.SetFlagsFragmentOffset(0, 0)
   132  	sourceCopy.SetTotalLength(0)
   133  	var offset uint16
   134  	// Build up an array of the bytes sent.
   135  	var reassembledPayload []byte
   136  	for i, packet := range packets {
   137  		// Confirm that the packet is valid.
   138  		allBytes := packet.Header.View().ToVectorisedView()
   139  		allBytes.Append(packet.Payload)
   140  		ip := header.IPv4(allBytes.ToView())
   141  		if !ip.IsValid(len(ip)) {
   142  			t.Errorf("IP packet is invalid:\n%s", hex.Dump(ip))
   143  		}
   144  		if got, want := ip.CalculateChecksum(), uint16(0xffff); got != want {
   145  			t.Errorf("ip.CalculateChecksum() got %#x, want %#x", got, want)
   146  		}
   147  		if got, want := len(ip), int(mtu); got > want {
   148  			t.Errorf("fragment is too large, got %d want %d", got, want)
   149  		}
   150  		if got, want := packet.Header.UsedLength(), sourcePacketInfo.Header.UsedLength()+header.IPv4MinimumSize; i == 0 && want < int(mtu) && got != want {
   151  			t.Errorf("first fragment hdr parts should have unmodified length if possible: got %d, want %d", got, want)
   152  		}
   153  		if got, want := packet.Header.AvailableLength(), sourcePacketInfo.Header.AvailableLength()-header.IPv4MinimumSize; got != want {
   154  			t.Errorf("fragment #%d should have the same available space for prepending as source: got %d, want %d", i, got, want)
   155  		}
   156  		if i < len(packets)-1 {
   157  			sourceCopy.SetFlagsFragmentOffset(sourceCopy.Flags()|header.IPv4FlagMoreFragments, offset)
   158  		} else {
   159  			sourceCopy.SetFlagsFragmentOffset(sourceCopy.Flags()&^header.IPv4FlagMoreFragments, offset)
   160  		}
   161  		reassembledPayload = append(reassembledPayload, ip.Payload()...)
   162  		offset += ip.TotalLength() - uint16(ip.HeaderLength())
   163  		// Clear out the checksum and length from the ip because we can't compare
   164  		// it.
   165  		sourceCopy.SetTotalLength(uint16(len(ip)))
   166  		sourceCopy.SetChecksum(0)
   167  		sourceCopy.SetChecksum(^sourceCopy.CalculateChecksum())
   168  		if !bytes.Equal(ip[:ip.HeaderLength()], sourceCopy[:sourceCopy.HeaderLength()]) {
   169  			t.Errorf("ip[:ip.HeaderLength()] got:\n%s\nwant:\n%s", hex.Dump(ip[:ip.HeaderLength()]), hex.Dump(sourceCopy[:sourceCopy.HeaderLength()]))
   170  		}
   171  	}
   172  	expected := source[source.HeaderLength():]
   173  	if !bytes.Equal(reassembledPayload, expected) {
   174  		t.Errorf("reassembledPayload got:\n%s\nwant:\n%s", hex.Dump(reassembledPayload), hex.Dump(expected))
   175  	}
   176  }
   177  
   178  type errorChannel struct {
   179  	*channel.Endpoint
   180  	Ch                    chan packetInfo
   181  	packetCollectorErrors []*tcpip.Error
   182  }
   183  
   184  // newErrorChannel creates a new errorChannel endpoint. Each call to WritePacket
   185  // will return successive errors from packetCollectorErrors until the list is
   186  // empty and then return nil each time.
   187  func newErrorChannel(size int, mtu uint32, linkAddr tcpip.LinkAddress, packetCollectorErrors []*tcpip.Error) *errorChannel {
   188  	return &errorChannel{
   189  		Endpoint:              channel.New(size, mtu, linkAddr),
   190  		Ch:                    make(chan packetInfo, size),
   191  		packetCollectorErrors: packetCollectorErrors,
   192  	}
   193  }
   194  
   195  // packetInfo holds all the information about an outbound packet.
   196  type packetInfo struct {
   197  	Header  buffer.Prependable
   198  	Payload buffer.VectorisedView
   199  }
   200  
   201  // Drain removes all outbound packets from the channel and counts them.
   202  func (e *errorChannel) Drain() int {
   203  	c := 0
   204  	for {
   205  		select {
   206  		case <-e.Ch:
   207  			c++
   208  		default:
   209  			return c
   210  		}
   211  	}
   212  }
   213  
   214  // WritePacket stores outbound packets into the channel.
   215  func (e *errorChannel) WritePacket(r *stack.Route, gso *stack.GSO, hdr buffer.Prependable, payload buffer.VectorisedView, protocol tcpip.NetworkProtocolNumber) *tcpip.Error {
   216  	p := packetInfo{
   217  		Header:  hdr,
   218  		Payload: payload,
   219  	}
   220  
   221  	select {
   222  	case e.Ch <- p:
   223  	default:
   224  	}
   225  
   226  	nextError := (*tcpip.Error)(nil)
   227  	if len(e.packetCollectorErrors) > 0 {
   228  		nextError = e.packetCollectorErrors[0]
   229  		e.packetCollectorErrors = e.packetCollectorErrors[1:]
   230  	}
   231  	return nextError
   232  }
   233  
   234  type context struct {
   235  	stack.Route
   236  	linkEP *errorChannel
   237  }
   238  
   239  func buildContext(t *testing.T, packetCollectorErrors []*tcpip.Error, mtu uint32) context {
   240  	// Make the packet and write it.
   241  	s := stack.New(stack.Options{
   242  		NetworkProtocols: []stack.NetworkProtocol{ipv4.NewProtocol()},
   243  	})
   244  	ep := newErrorChannel(100 /* Enough for all tests. */, mtu, "", packetCollectorErrors)
   245  	s.CreateNIC(1, ep)
   246  	const (
   247  		src = "\x10\x00\x00\x01"
   248  		dst = "\x10\x00\x00\x02"
   249  	)
   250  	s.AddAddress(1, ipv4.ProtocolNumber, src)
   251  	{
   252  		subnet, err := tcpip.NewSubnet(dst, tcpip.AddressMask(header.IPv4Broadcast))
   253  		if err != nil {
   254  			t.Fatal(err)
   255  		}
   256  		s.SetRouteTable([]tcpip.Route{{
   257  			Destination: subnet,
   258  			NIC:         1,
   259  		}})
   260  	}
   261  	r, err := s.FindRoute(0, src, dst, ipv4.ProtocolNumber, false /* multicastLoop */)
   262  	if err != nil {
   263  		t.Fatalf("s.FindRoute got %v, want %v", err, nil)
   264  	}
   265  	return context{
   266  		Route:  r,
   267  		linkEP: ep,
   268  	}
   269  }
   270  
   271  func TestFragmentation(t *testing.T) {
   272  	var manyPayloadViewsSizes [1000]int
   273  	for i := range manyPayloadViewsSizes {
   274  		manyPayloadViewsSizes[i] = 7
   275  	}
   276  	fragTests := []struct {
   277  		description       string
   278  		mtu               uint32
   279  		gso               *stack.GSO
   280  		hdrLength         int
   281  		extraLength       int
   282  		payloadViewsSizes []int
   283  		expectedFrags     int
   284  	}{
   285  		{"NoFragmentation", 2000, &stack.GSO{}, 0, header.IPv4MinimumSize, []int{1000}, 1},
   286  		{"NoFragmentationWithBigHeader", 2000, &stack.GSO{}, 16, header.IPv4MinimumSize, []int{1000}, 1},
   287  		{"Fragmented", 800, &stack.GSO{}, 0, header.IPv4MinimumSize, []int{1000}, 2},
   288  		{"FragmentedWithGsoNil", 800, nil, 0, header.IPv4MinimumSize, []int{1000}, 2},
   289  		{"FragmentedWithManyViews", 300, &stack.GSO{}, 0, header.IPv4MinimumSize, manyPayloadViewsSizes[:], 25},
   290  		{"FragmentedWithManyViewsAndPrependableBytes", 300, &stack.GSO{}, 0, header.IPv4MinimumSize + 55, manyPayloadViewsSizes[:], 25},
   291  		{"FragmentedWithBigHeader", 800, &stack.GSO{}, 20, header.IPv4MinimumSize, []int{1000}, 2},
   292  		{"FragmentedWithBigHeaderAndPrependableBytes", 800, &stack.GSO{}, 20, header.IPv4MinimumSize + 66, []int{1000}, 2},
   293  		{"FragmentedWithMTUSmallerThanHeaderAndPrependableBytes", 300, &stack.GSO{}, 1000, header.IPv4MinimumSize + 77, []int{500}, 6},
   294  	}
   295  
   296  	for _, ft := range fragTests {
   297  		t.Run(ft.description, func(t *testing.T) {
   298  			hdr, payload := makeHdrAndPayload(ft.hdrLength, ft.extraLength, ft.payloadViewsSizes)
   299  			source := packetInfo{
   300  				Header: hdr,
   301  				// Save the source payload because WritePacket will modify it.
   302  				Payload: payload.Clone([]buffer.View{}),
   303  			}
   304  			c := buildContext(t, nil, ft.mtu)
   305  			err := c.Route.WritePacket(ft.gso, hdr, payload, tcp.ProtocolNumber, 42 /* ttl */, false /* useDefaultTTL */)
   306  			if err != nil {
   307  				t.Errorf("err got %v, want %v", err, nil)
   308  			}
   309  
   310  			var results []packetInfo
   311  		L:
   312  			for {
   313  				select {
   314  				case pi := <-c.linkEP.Ch:
   315  					results = append(results, pi)
   316  				default:
   317  					break L
   318  				}
   319  			}
   320  
   321  			if got, want := len(results), ft.expectedFrags; got != want {
   322  				t.Errorf("len(result) got %d, want %d", got, want)
   323  			}
   324  			if got, want := len(results), int(c.Route.Stats().IP.PacketsSent.Value()); got != want {
   325  				t.Errorf("no errors yet len(result) got %d, want %d", got, want)
   326  			}
   327  			compareFragments(t, results, source, ft.mtu)
   328  		})
   329  	}
   330  }
   331  
   332  // TestFragmentationErrors checks that errors are returned from write packet
   333  // correctly.
   334  func TestFragmentationErrors(t *testing.T) {
   335  	fragTests := []struct {
   336  		description           string
   337  		mtu                   uint32
   338  		hdrLength             int
   339  		payloadViewsSizes     []int
   340  		packetCollectorErrors []*tcpip.Error
   341  	}{
   342  		{"NoFrag", 2000, 0, []int{1000}, []*tcpip.Error{tcpip.ErrAborted}},
   343  		{"ErrorOnFirstFrag", 500, 0, []int{1000}, []*tcpip.Error{tcpip.ErrAborted}},
   344  		{"ErrorOnSecondFrag", 500, 0, []int{1000}, []*tcpip.Error{nil, tcpip.ErrAborted}},
   345  		{"ErrorOnFirstFragMTUSmallerThanHdr", 500, 1000, []int{500}, []*tcpip.Error{tcpip.ErrAborted}},
   346  	}
   347  
   348  	for _, ft := range fragTests {
   349  		t.Run(ft.description, func(t *testing.T) {
   350  			hdr, payload := makeHdrAndPayload(ft.hdrLength, header.IPv4MinimumSize, ft.payloadViewsSizes)
   351  			c := buildContext(t, ft.packetCollectorErrors, ft.mtu)
   352  			err := c.Route.WritePacket(&stack.GSO{}, hdr, payload, tcp.ProtocolNumber, 42 /* ttl */, false /* useDefaultTTL */)
   353  			for i := 0; i < len(ft.packetCollectorErrors)-1; i++ {
   354  				if got, want := ft.packetCollectorErrors[i], (*tcpip.Error)(nil); got != want {
   355  					t.Errorf("ft.packetCollectorErrors[%d] got %v, want %v", i, got, want)
   356  				}
   357  			}
   358  			// We only need to check that last error because all the ones before are
   359  			// nil.
   360  			if got, want := err, ft.packetCollectorErrors[len(ft.packetCollectorErrors)-1]; got != want {
   361  				t.Errorf("err got %v, want %v", got, want)
   362  			}
   363  			if got, want := c.linkEP.Drain(), int(c.Route.Stats().IP.PacketsSent.Value())+1; err != nil && got != want {
   364  				t.Errorf("after linkEP error len(result) got %d, want %d", got, want)
   365  			}
   366  		})
   367  	}
   368  }