/*	$NetBSD: t_ping.c,v 1.24 2019/06/11 08:34:01 gson Exp $	*/

/*-
 * Copyright (c) 2010 The NetBSD Foundation, Inc.
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 *
 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND
 * CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 * IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY
 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
 * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
 * IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
 * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */

#include <sys/cdefs.h>
#ifndef lint
__RCSID("$NetBSD: t_ping.c,v 1.24 2019/06/11 08:34:01 gson Exp $");
#endif /* not lint */

#include <sys/types.h>
#include <sys/resource.h>
#include <sys/sysctl.h>
#include <sys/wait.h>

#include <atf-c.h>
#include <assert.h>
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <signal.h>

#include <netinet/in.h>
#include <netinet/ip_var.h>

#include <rump/rump.h>
#include <rump/rump_syscalls.h>

#include "h_macros.h"
#include "../config/netconfig.c"

ATF_TC(simpleping);
ATF_TC_HEAD(simpleping, tc)
{

	atf_tc_set_md_var(tc, "descr", "check that kernel responds to ping");
	atf_tc_set_md_var(tc, "timeout", "20");
}

ATF_TC_BODY(simpleping, tc)
{
	char ifname[IFNAMSIZ];
	pid_t cpid;
	bool win, win2;
	char token;
	int channel[2];

	RL(pipe(channel));

	cpid = fork();
	rump_init();
	netcfg_rump_makeshmif("but-can-i-buy-your-ether-bus", ifname);

	switch (cpid) {
	case -1:
		atf_tc_fail_errno("fork failed");
	case 0:
		netcfg_rump_if(ifname, "1.1.1.10", "255.255.255.0");
		close(channel[0]);
		ATF_CHECK(write(channel[1], "U", 1) == 1);
		close(channel[1]);
		pause();
		break;
	default:
		break;
	}

	close(channel[1]);
	ATF_CHECK(read(channel[0], &token, 1) == 1 && token == 'U');
	close(channel[0]);

	netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");

	/*
	 * The beauty of shmif is that we don't have races here.
	 */
	win = netcfg_rump_pingtest("1.1.1.10", 500);
	win2 = netcfg_rump_pingtest("1.1.1.30", 500);

	kill(cpid, SIGKILL);

	if (!win)
		atf_tc_fail("ping failed");
	if (win2)
		atf_tc_fail("non-existent host responded");
}

ATF_TC(floodping);
ATF_TC_HEAD(floodping, tc)
{

	atf_tc_set_md_var(tc, "descr", "see how kernel responds to floodping");
}

/* why the hell isn't this available in userspace??? */
static uint16_t
in_cksum(void *data, size_t len)
{
	uint16_t *buf = data;
	unsigned sum;

	for (sum = 0; len > 1; len -= 2)
		sum += *buf++;
	if (len)
		sum += *(uint8_t *)buf;

	sum = (sum >> 16) + (sum & 0xffff);
	sum += (sum >> 16);

	return ~sum;
}

static int
doping(const char *target, int loops, u_int pktsize)
{
	union {
		char buf[IP_MAXPACKET - sizeof(struct ip)];
		struct icmp i;	/* ensure proper alignment */
	} sndbuf;
	char recvbuf[IP_MAXPACKET];
	struct sockaddr_in dst, pingee;
	struct icmp *icmp;
	socklen_t slen;
	ssize_t n;
	int loop, succ;
	int x, xnon, s;

	RL(s = rump_sys_socket(PF_INET, SOCK_RAW, IPPROTO_ICMP));
	RL(x = rump_sys_fcntl(s, F_GETFL, 0));
	xnon = x | O_NONBLOCK;

	memset(&dst, 0, sizeof(dst));
	dst.sin_len = sizeof(dst);
	dst.sin_family = AF_INET;
	dst.sin_addr.s_addr = inet_addr(target);

	icmp = (struct icmp *)&sndbuf;
	memset(icmp, 0, sizeof(*icmp));
	icmp->icmp_type = ICMP_ECHO;
	icmp->icmp_id = htons(37);

	if (pktsize < sizeof(*icmp))
		pktsize = sizeof(*icmp);
	if (pktsize > sizeof(sndbuf.buf))
		pktsize = sizeof(sndbuf.buf);

	RL(rump_sys_setsockopt(s, SOL_SOCKET, SO_SNDBUF,
	    &pktsize, sizeof(pktsize)));
	RL(rump_sys_setsockopt(s, SOL_SOCKET, SO_RCVBUF,
	    &pktsize, sizeof(pktsize)));

	slen = sizeof(pingee);
	succ = 0;
	for (loop = 0; loop < loops; loop++) {
		RL(rump_sys_fcntl(s, F_SETFL, x));
		icmp->icmp_seq = htons(loop);
		icmp->icmp_cksum = 0;
		icmp->icmp_cksum = in_cksum(icmp, pktsize);

		n = rump_sys_sendto(s, icmp, pktsize, 0,
		    (struct sockaddr *)&dst, sizeof(dst));
		if (n == -1) {
			if (errno == ENOBUFS)
				continue;
			atf_tc_fail_errno("sendto failed");
		}

		RL(rump_sys_fcntl(s, F_SETFL, xnon));
		while ((n = rump_sys_recvfrom(s, recvbuf, sizeof(recvbuf), 0,
		    (struct sockaddr *)&pingee, &slen)) > 0) {
			succ++;
		}
		if (n == -1 && (errno == EAGAIN || errno == ENOBUFS))
			continue;
		atf_tc_fail_errno("recv failed (n == %zd)", n);
	}

	rump_sys_close(s);
	return succ;
}

#define LOOPS 10000

ATF_TC_BODY(floodping, tc)
{
	char ifname[IFNAMSIZ];
	pid_t cpid;
	int succ;

	cpid = fork();
	rump_init();
	netcfg_rump_makeshmif("thank-you-driver-for-getting-me-here", ifname);

	switch (cpid) {
	case -1:
		atf_tc_fail_errno("fork failed");
	case 0:
		netcfg_rump_if(ifname, "1.1.1.10", "255.255.255.0");
		pause();
		break;
	default:
		break;
	}

	netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");

	succ = doping("1.1.1.10", LOOPS, 56);
	printf("got %d/%d\n", succ, LOOPS);

	kill(cpid, SIGKILL);
}

ATF_TC(floodping2);
ATF_TC_HEAD(floodping2, tc)
{

	atf_tc_set_md_var(tc, "descr", "two hosts floodpinging each other");
}

ATF_TC_BODY(floodping2, tc)
{
	char ifname[IFNAMSIZ];
	pid_t cpid;
	int succ;

	cpid = fork();
	rump_init();
	netcfg_rump_makeshmif("floodping2", ifname);

	switch (cpid) {
	case -1:
		atf_tc_fail_errno("fork failed");
	case 0:
		netcfg_rump_if(ifname, "1.1.1.10", "255.255.255.0");
		succ = doping("1.1.1.20", LOOPS, 56);
		break;
	default:
		netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");
		succ = doping("1.1.1.10", LOOPS, 56);
		break;
	}

	printf("got %d/%d\n", succ, LOOPS);
}

ATF_TC(pingsize);
ATF_TC_HEAD(pingsize, tc)
{

	atf_tc_set_md_var(tc, "descr", "ping with packets min <= size <= max");
}

ATF_TC_BODY(pingsize, tc)
{
	char ifname[IFNAMSIZ];
	pid_t cpid;
	int sent, succ, i;

	cpid = fork();
	rump_init();
	netcfg_rump_makeshmif("jippikaiee", ifname);

	switch (cpid) {
	case -1:
		atf_tc_fail_errno("fork failed");
	case 0:
		netcfg_rump_if(ifname, "1.1.1.10", "255.255.255.0");
		pause();
		break;
	default:
		break;
	}

	netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");

	succ = sent = 0;

	/* small sizes */
	for (i = 0 ; i < IP_MAXPACKET - 60000; i++) {
		sent++;
		succ += doping("1.1.1.10", 1, i);
	}

	/* medium sizes */
	for (i = IP_MAXPACKET - 60000; i < IP_MAXPACKET - 100; i += 1000) {
		sent++;
		succ += doping("1.1.1.10", 1, i);
	}

	/* big sizes */
	for (i = IP_MAXPACKET - 100; i < IP_MAXPACKET; i += 10) {
		sent++;
		succ += doping("1.1.1.10", 1, i);
	}

	printf("got %d/%d\n", succ, sent);
	kill(cpid, SIGKILL);
}

ATF_TC(ping_of_death);
ATF_TC_HEAD(ping_of_death, tc)
{

	atf_tc_set_md_var(tc, "descr", "send a \"ping of death\"");
	atf_tc_set_md_var(tc, "timeout", "20");
}

ATF_TC_BODY(ping_of_death, tc)
{
	char data[1500];
	struct sockaddr_in dst;
	struct ip *ip;
	struct icmp *icmp;
	char ifname[IFNAMSIZ];
	pid_t cpid;
	size_t tot, frag;
	int s, x, loop;
	ssize_t error;

	cpid = fork();
	rump_init();
	netcfg_rump_makeshmif("jippikaiee", ifname);

	switch (cpid) {
	case -1:
		atf_tc_fail_errno("fork failed");
	case 0:
		/* wait until we receive a too long IP packet */
		for (loop = 0;; loop++) {
			uint64_t ipstat[IP_NSTATS];
			size_t arglen;
			int mib[4];

			if (loop == 1)
				netcfg_rump_if(ifname,
				    "1.1.1.10", "255.255.255.0");

			mib[0] = CTL_NET;
			mib[1] = PF_INET;
			mib[2] = IPPROTO_IP;
			mib[3] = IPCTL_STATS;

			arglen = sizeof(ipstat);
			RL(rump_sys___sysctl(mib, 4, &ipstat, &arglen,
			    NULL, 0));
			if (loop == 0 && ipstat[IP_STAT_TOOLONG] != 0)
				_exit(1);
			if (ipstat[IP_STAT_TOOLONG])
				break;
			usleep(10000);
		}

		_exit(0);
		break;
	default:
		break;
	}

	netcfg_rump_if(ifname, "1.1.1.20", "255.255.255.0");

	RL(s = rump_sys_socket(PF_INET, SOCK_RAW, 0));
	x = 1;
	RL(rump_sys_setsockopt(s, IPPROTO_IP, IP_HDRINCL, &x, sizeof(x)));

	memset(&dst, 0, sizeof(dst));
	dst.sin_len = sizeof(dst);
	dst.sin_family = AF_INET;
	dst.sin_addr.s_addr = inet_addr("1.1.1.10");

	/* construct packet */
	memset(data, 0, sizeof(data));
	ip = (struct ip *)data;
	ip->ip_v = 4;
	ip->ip_hl = sizeof(*ip) >> 2;
	ip->ip_p = IPPROTO_ICMP;
	ip->ip_ttl = IPDEFTTL;
	ip->ip_dst = dst.sin_addr;
	ip->ip_id = 1234;

	icmp = (struct icmp *)(ip + 1);
	icmp->icmp_type = ICMP_ECHO;
	icmp->icmp_cksum = in_cksum(icmp, sizeof(*icmp));

	for (;;) {
		int status;

		/* resolve arp before sending raw stuff */
		netcfg_rump_pingtest("1.1.1.10", 1);

		for (tot = 0;
		    tot < 65538 - sizeof(*ip);
		    tot += (frag - sizeof(*ip))) {
			frag = MIN(65538 - tot, sizeof(data));
			ip->ip_off = tot >> 3;
			assert((size_t)ip->ip_off << 3 == tot);
			ip->ip_len = frag;

			if (frag == sizeof(data)) {
				ip->ip_off |= IP_MF;
			}

			error = rump_sys_sendto(s, data, frag, 0,
			    (struct sockaddr *)&dst, sizeof(dst));
			if (error == -1) {
				if (errno == ENOBUFS)
					continue;
				atf_tc_fail_errno("sendto failed");
			}
			if ((size_t)error != frag)
				atf_tc_fail("sendto did not write all data");
		}
		if (waitpid(-1, &status, WNOHANG) > 0) {
			if (WIFEXITED(status) && WEXITSTATUS(status) == 0)
				break;
			atf_tc_fail("child did not exit clean");
		}

		usleep(10000);
	}
}

ATF_TP_ADD_TCS(tp)
{

	ATF_TP_ADD_TC(tp, simpleping);
	ATF_TP_ADD_TC(tp, floodping);
	ATF_TP_ADD_TC(tp, floodping2);
	ATF_TP_ADD_TC(tp, pingsize);
	ATF_TP_ADD_TC(tp, ping_of_death);

	return atf_no_error();
}