summaryrefslogtreecommitdiffstats
path: root/tests/sys
diff options
context:
space:
mode:
authorasomers <asomers@FreeBSD.org>2014-04-24 23:56:56 +0000
committerasomers <asomers@FreeBSD.org>2014-04-24 23:56:56 +0000
commitf8a34b6f4917582dfd787f47a09088f66e0ac509 (patch)
tree0064882c540e74bd3ff2493c7043a3d32284f2c3 /tests/sys
parent520525b9030603bd0c155c88b72b14989c525a78 (diff)
downloadFreeBSD-src-f8a34b6f4917582dfd787f47a09088f66e0ac509.zip
FreeBSD-src-f8a34b6f4917582dfd787f47a09088f66e0ac509.tar.gz
Fix subnet and default routes on different FIBs on the same subnet.
These two bugs are closely related. The root cause is that ifa_ifwithnet does not consider FIBs when searching for an interface address. sys/net/if_var.h sys/net/if.c Add a fib argument to ifa_ifwithnet and ifa_ifwithdstadddr. Those functions will only return an address whose interface fib equals the argument. sys/net/route.c Update calls to ifa_ifwithnet and ifa_ifwithdstaddr with fib arguments. sys/netinet/in.c Update in_addprefix to consider the interface fib when adding prefixes. This will prevent it from not adding a subnet route when one already exists on a different fib. sys/net/rtsock.c sys/netinet/in_pcb.c sys/netinet/ip_output.c sys/netinet/ip_options.c sys/netinet6/nd6.c Add RT_DEFAULT_FIB arguments to ifa_ifwithdstaddr and ifa_ifwithnet. In some cases it there wasn't a clear specific fib number to use. In others, I was unable to test those functions so I chose RT_DEFAULT_FIB to minimize divergence from current behavior. I will fix some of the latter changes along with PR kern/187553. tests/sys/netinet/fibs_test.sh tests/sys/netinet/udp_dontroute.c tests/sys/netinet/Makefile Revert r263738. The udp_dontroute test was right all along. However, bugs kern/187550 and kern/187553 cancelled each other out when it came to this test. Because of kern/187553, ifa_ifwithnet searched the default fib instead of the requested one, but because of kern/187550, there was an applicable subnet route on the default fib. The new test added in r263738 doesn't work right, however. I can verify with dtrace that ifa_ifwithnet returned the wrong address before I applied this commit, but route(8) miraculously found the correct interface to use anyway. I don't know how. Clear expected failure messages for kern/187550 and kern/187552. PR: kern/187550 PR: kern/187552 Reviewed by: melifaro MFC after: 3 weeks Sponsored by: Spectra Logic
Diffstat (limited to 'tests/sys')
-rw-r--r--tests/sys/netinet/Makefile5
-rwxr-xr-xtests/sys/netinet/fibs_test.sh62
-rw-r--r--tests/sys/netinet/udp_dontroute.c85
3 files changed, 114 insertions, 38 deletions
diff --git a/tests/sys/netinet/Makefile b/tests/sys/netinet/Makefile
index 6caf89c..aff1b42 100644
--- a/tests/sys/netinet/Makefile
+++ b/tests/sys/netinet/Makefile
@@ -1,7 +1,12 @@
# $FreeBSD$
TESTSDIR= ${TESTSBASE}/sys/netinet
+BINDIR= ${TESTSDIR}
ATF_TESTS_SH+= fibs_test
+PROG= udp_dontroute
+SRCS= udp_dontroute.c
+NO_MAN=
+WARNS?= 6
.include <bsd.test.mk>
diff --git a/tests/sys/netinet/fibs_test.sh b/tests/sys/netinet/fibs_test.sh
index d6756bd..9f2c417 100755
--- a/tests/sys/netinet/fibs_test.sh
+++ b/tests/sys/netinet/fibs_test.sh
@@ -175,7 +175,6 @@ default_route_with_multiple_fibs_on_same_subnet_head()
default_route_with_multiple_fibs_on_same_subnet_body()
{
- atf_expect_fail "kern/187552 default route uses the wrong interface when multiple interfaces have the same subnet but different fibs"
# Configure the TAP interfaces to use a RFC5737 nonrouteable addresses
# and a non-default fib
ADDR0="192.0.2.2"
@@ -225,7 +224,6 @@ subnet_route_with_multiple_fibs_on_same_subnet_head()
subnet_route_with_multiple_fibs_on_same_subnet_body()
{
- atf_expect_fail "kern/187550 Multiple interfaces on different FIBs but the same subnet don't all have a subnet route"
# Configure the TAP interfaces to use a RFC5737 nonrouteable addresses
# and a non-default fib
ADDR0="192.0.2.2"
@@ -253,66 +251,54 @@ subnet_route_with_multiple_fibs_on_same_subnet_cleanup()
cleanup_tap
}
-# Regression test for kern/187553 "Source address selection for UDP packets
-# with SO_DONTROUTE uses the default FIB". The original complaint was that a
-# UDP packet with SO_DONTROUTE set would select a source address from an
-# interface on the default FIB instead of the process FIB.
+# Test that source address selection works correctly for UDP packets with
+# SO_DONTROUTE set that are sent on non-default FIBs.
# This bug was discovered with "setfib 1 netperf -t UDP_STREAM -H some_host"
# Regression test for kern/187553
-
+#
# The root cause was that ifa_ifwithnet() did not have a fib argument. It
# would return an address from an interface on any FIB that had a subnet route
# for the destination. If more than one were available, it would choose the
-# most specific. The root cause is most easily tested by creating two
-# interfaces with overlapping subnet routes, adding a default route to the
-# interface with the less specific subnet route, and looking up a host that
-# requires the default route using the FIB of the interface with the less
-# specific subnet route. "route get" should provide a route that uses the
-# interface on the chosen FIB. However, absent the patch for this bug it will
-# instead use the other interface.
-atf_test_case src_addr_selection_by_subnet cleanup
-src_addr_selection_by_subnet_head()
+# most specific. This is most easily tested by creating a FIB without a
+# default route, then trying to send a UDP packet with SO_DONTROUTE set to an
+# address which is not routable on that FIB. Absent the fix for this bug,
+# in_pcbladdr would choose an interface on any FIB with a default route. With
+# the fix, you will get EUNREACH or ENETUNREACH.
+atf_test_case udp_dontroute cleanup
+udp_dontroute_head()
{
atf_set "descr" "Source address selection for UDP packets with SO_DONTROUTE on non-default FIBs works"
atf_set "require.user" "root"
atf_set "require.config" "fibs"
}
-src_addr_selection_by_subnet_body()
+udp_dontroute_body()
{
atf_expect_fail "kern/187553 Source address selection for UDP packets with SO_DONTROUTE uses the default FIB"
# Configure the TAP interface to use an RFC5737 nonrouteable address
# and a non-default fib
- ADDR0="192.0.2.2"
- ADDR1="192.0.2.3"
- GATEWAY0="192.0.2.1"
- TARGET="192.0.2.128"
+ ADDR="192.0.2.2"
SUBNET="192.0.2.0"
- MASK0="25"
- MASK1="26"
+ MASK="24"
+ # Use a different IP on the same subnet as the target
+ TARGET="192.0.2.100"
# Check system configuration
if [ 0 != `sysctl -n net.add_addr_allfibs` ]; then
atf_skip "This test requires net.add_addr_allfibs=0"
fi
- get_fibs 2
+ get_fibs 1
# Configure a TAP interface
- setup_tap ${FIB0} ${ADDR0} ${MASK0}
- TAP0=${TAP}
- setup_tap ${FIB1} ${ADDR1} ${MASK1}
- TAP1=${TAP}
-
- # Add a gateway to the interface with the less specific subnet route
- setfib ${FIB0} route add default ${GATEWAY0}
-
- # Lookup a route
- echo "Looking up route to ${TARGET} with fib ${FIB0}"
- echo "Expected behavior is to use interface ${TAP0}"
- atf_check -o match:"interface:.${TAP0}" setfib ${FIB0} route -n get ${TARGET}
+ setup_tap ${FIB0} ${ADDR} ${MASK}
+
+ # Send a UDP packet with SO_DONTROUTE. In the failure case, it will
+ # return ENETUNREACH
+ SRCDIR=`atf_get_srcdir`
+ atf_check -o ignore setfib ${FIB0} ${SRCDIR}/udp_dontroute ${TARGET}
}
-src_addr_selection_by_subnet_cleanup()
+udp_dontroute_cleanup()
{
cleanup_tap
}
@@ -324,7 +310,7 @@ atf_init_test_cases()
atf_add_test_case loopback_and_network_routes_on_nondefault_fib
atf_add_test_case default_route_with_multiple_fibs_on_same_subnet
atf_add_test_case subnet_route_with_multiple_fibs_on_same_subnet
- atf_add_test_case src_addr_selection_by_subnet
+ atf_add_test_case udp_dontroute
}
# Looks up one or more fibs from the configuration data and validates them.
diff --git a/tests/sys/netinet/udp_dontroute.c b/tests/sys/netinet/udp_dontroute.c
new file mode 100644
index 0000000..6952f99
--- /dev/null
+++ b/tests/sys/netinet/udp_dontroute.c
@@ -0,0 +1,85 @@
+/*
+ * Copyright (c) 2014 Spectra Logic Corporation
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions, and the following disclaimer,
+ * without modification.
+ * 2. Redistributions in binary form must reproduce at minimum a disclaimer
+ * substantially similar to the "NO WARRANTY" disclaimer below
+ * ("Disclaimer") and any redistribution must be conditioned upon
+ * including a substantially similar Disclaimer requirement for further
+ * binary redistribution.
+ *
+ * NO WARRANTY
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+ * HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+ * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
+ * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGES.
+ *
+ * Authors: Alan Somers (Spectra Logic Corporation)
+ *
+ * $FreeBSD$
+ */
+
+#include <arpa/inet.h>
+#include <netinet/in.h>
+#include <sys/types.h>
+#include <sys/socket.h>
+
+#include <err.h>
+#include <errno.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+
+/*
+ * Sends a single UDP packet to the provided address, with SO_DONTROUTE set
+ * I couldn't find a way to do this with builtin utilities like nc(1)
+ */
+int main(int argc, char **argv)
+{
+ struct sockaddr_in dst;
+ int s;
+ int opt;
+ int ret;
+ const char* buf = "Hello, World!";
+
+ if (argc != 2) {
+ fprintf(stderr, "Usage: %s ip_address\n", argv[0]);
+ exit(2);
+ }
+ s = socket(PF_INET, SOCK_DGRAM, 0);
+ if (s < 0)
+ err(errno, "socket");
+ opt = 1;
+
+ ret = setsockopt(s, SOL_SOCKET, SO_DONTROUTE, &opt, sizeof(opt));
+ if (ret == -1)
+ err(errno, "setsockopt(SO_DONTROUTE)");
+
+ dst.sin_len = sizeof(dst);
+ dst.sin_family = AF_INET;
+ dst.sin_port = htons(46120);
+ dst.sin_addr.s_addr = inet_addr(argv[1]);
+ if (dst.sin_addr.s_addr == htonl(INADDR_NONE)) {
+ fprintf(stderr, "Invalid address: %s\n", argv[1]);
+ exit(2);
+ }
+ ret = sendto(s, buf, strlen(buf), 0, (struct sockaddr*)&dst,
+ dst.sin_len);
+ if (ret == -1)
+ err(errno, "sendto");
+
+ return (0);
+}
OpenPOWER on IntegriCloud