Path: blob/main/tests/sys/netinet6/frag6/frag6_15.py
39483 views
#!/usr/bin/env python1#-2# SPDX-License-Identifier: BSD-2-Clause3#4# Copyright (c) 2019 Netflix, Inc.5#6# Redistribution and use in source and binary forms, with or without7# modification, are permitted provided that the following conditions8# are met:9# 1. Redistributions of source code must retain the above copyright10# notice, this list of conditions and the following disclaimer.11# 2. Redistributions in binary form must reproduce the above copyright12# notice, this list of conditions and the following disclaimer in the13# documentation and/or other materials provided with the distribution.14#15# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND16# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE17# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE18# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE19# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL20# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS21# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)22# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT23# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY24# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF25# SUCH DAMAGE.26#27#2829import argparse30import logging31logging.getLogger("scapy").setLevel(logging.CRITICAL)32import scapy.all as sp33import socket34import sys35from time import sleep3637def main():38parser = argparse.ArgumentParser("frag6.py",39description="IPv6 fragementation test tool")40parser.add_argument('--sendif', nargs=1,41required=True,42help='The interface through which the packet will be sent')43parser.add_argument('--recvif', nargs=1,44required=True,45help='The interface on which to check for the packet')46parser.add_argument('--src', nargs=1,47required=True,48help='The source IP address')49parser.add_argument('--to', nargs=1,50required=True,51help='The destination IP address')52parser.add_argument('--debug',53required=False, action='store_true',54help='Enable test debugging')5556args = parser.parse_args()575859########################################################################60#61# Sysctl set to accept maximum 3 segments on a fragmented packet.62# The 4th packet will flush the entire q6.63#64# A: 4 Discarded.65# R: Silence (statistics only) no ICMPv6 as we skip the off=0 segment.66#67data = "66666666"68for i in range(4):69foffset=16 + (i * (0x100 + (int)(16 / 8)))70ip6f01 = sp.Ether() / \71sp.IPv6(src=args.src[0], dst=args.to[0]) / \72sp.IPv6ExtHdrFragment(offset=foffset, m=1, id=15) / \73sp.UDP(dport=3456, sport=6543) / \74data75if args.debug :76ip6f01.display()77sp.sendp(ip6f01, iface=args.sendif[0], verbose=False)787980# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # ##81#82# Sysctl set to accept maximum 3 segments on a fragmented packet.83# The 4th packet will flush the entire q6.84# This time we play proper offset/length games on the packets in order85# to trigger the 2nd test case, with the last packet still having m=1.86#87# A: 4 Discarded.88# R: ICMPv6 timeout expired.89#90data = "66666666"91for i in range(4):92foffset=(i * (int)(16 / 8))93ip6f01 = sp.Ether() / \94sp.IPv6(src=args.src[0], dst=args.to[0]) / \95sp.IPv6ExtHdrFragment(offset=foffset, m=1, id=0x1501) / \96sp.UDP(dport=3456, sport=6543) / \97data98if args.debug :99ip6f01.display()100sp.sendp(ip6f01, iface=args.sendif[0], verbose=False)101102sys.exit(0)103104if __name__ == '__main__':105main()106107108