xref: /freebsd/tests/sys/kern/socket_msg_trunc.c (revision 152a6d410e47a818fae905f6f4bd43f422146802)
1be1f485dSAlexander V. Chernikov /*-
24d846d26SWarner Losh  * SPDX-License-Identifier: BSD-2-Clause
3be1f485dSAlexander V. Chernikov  *
4be1f485dSAlexander V. Chernikov  * Copyright (c) 2022 Alexander V. Chernikov
5be1f485dSAlexander V. Chernikov  *
6be1f485dSAlexander V. Chernikov  * Redistribution and use in source and binary forms, with or without
7be1f485dSAlexander V. Chernikov  * modification, are permitted provided that the following conditions
8be1f485dSAlexander V. Chernikov  * are met:
9be1f485dSAlexander V. Chernikov  * 1. Redistributions of source code must retain the above copyright
10be1f485dSAlexander V. Chernikov  *    notice, this list of conditions and the following disclaimer.
11be1f485dSAlexander V. Chernikov  * 2. Redistributions in binary form must reproduce the above copyright
12be1f485dSAlexander V. Chernikov  *    notice, this list of conditions and the following disclaimer in the
13be1f485dSAlexander V. Chernikov  *    documentation and/or other materials provided with the distribution.
14be1f485dSAlexander V. Chernikov  *
15be1f485dSAlexander V. Chernikov  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16be1f485dSAlexander V. Chernikov  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17be1f485dSAlexander V. Chernikov  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18be1f485dSAlexander V. Chernikov  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19be1f485dSAlexander V. Chernikov  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20be1f485dSAlexander V. Chernikov  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21be1f485dSAlexander V. Chernikov  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22be1f485dSAlexander V. Chernikov  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23be1f485dSAlexander V. Chernikov  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24be1f485dSAlexander V. Chernikov  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25be1f485dSAlexander V. Chernikov  * SUCH DAMAGE.
26be1f485dSAlexander V. Chernikov  */
27be1f485dSAlexander V. Chernikov 
28b5e7dbacSMark Johnston #include <sys/param.h>
29be1f485dSAlexander V. Chernikov #include <sys/errno.h>
30d8735eb7SMark Johnston #include <sys/ktrace.h>
31be1f485dSAlexander V. Chernikov #include <sys/socket.h>
32be1f485dSAlexander V. Chernikov #include <sys/un.h>
33b5e7dbacSMark Johnston 
34be1f485dSAlexander V. Chernikov #include <netinet/in.h>
35b5e7dbacSMark Johnston 
36d8735eb7SMark Johnston #include <fcntl.h>
37be1f485dSAlexander V. Chernikov #include <poll.h>
38b5e7dbacSMark Johnston #include <stdio.h>
39b5e7dbacSMark Johnston #include <stdlib.h>
40be1f485dSAlexander V. Chernikov 
41be1f485dSAlexander V. Chernikov #include <atf-c.h>
42be1f485dSAlexander V. Chernikov 
43be1f485dSAlexander V. Chernikov static void
check_recvmsg(int cs,int ss,struct sockaddr * sa,const size_t sizes[],size_t nsizes)44b5e7dbacSMark Johnston check_recvmsg(int cs, int ss, struct sockaddr *sa, const size_t sizes[],
45b5e7dbacSMark Johnston     size_t nsizes)
46be1f485dSAlexander V. Chernikov {
47*8e2c2992SBrooks Davis 	char buf[9000];
48b5e7dbacSMark Johnston 
49b5e7dbacSMark Johnston 	memset(buf, 0xFF, sizeof(buf));
50b5e7dbacSMark Johnston 	for (size_t i = 0; i < nsizes; i++) {
51b5e7dbacSMark Johnston 		ssize_t rc;
52b5e7dbacSMark Johnston 		size_t sz = sizes[i];
53b5e7dbacSMark Johnston 		char tbuf[1];
54b5e7dbacSMark Johnston 
55*8e2c2992SBrooks Davis 		ATF_REQUIRE(sz <= sizeof(buf));
56*8e2c2992SBrooks Davis 
57b5e7dbacSMark Johnston 		rc = sendto(cs, buf, sz, 0, sa, sa->sa_len);
58b5e7dbacSMark Johnston 		ATF_REQUIRE_MSG(rc != -1, "sendto failed: %s", strerror(errno));
59b5e7dbacSMark Johnston 		ATF_REQUIRE((size_t)rc == sz);
60b5e7dbacSMark Johnston 
61b5e7dbacSMark Johnston 		rc = recv(ss, NULL, 0, MSG_PEEK | MSG_TRUNC);
62b5e7dbacSMark Johnston 		ATF_REQUIRE_MSG(rc >= 0, "recv failed: %s", strerror(errno));
63b5e7dbacSMark Johnston 		ATF_REQUIRE((size_t)rc == sz);
64b5e7dbacSMark Johnston 
65b5e7dbacSMark Johnston 		rc = recv(ss, tbuf, sizeof(tbuf), MSG_PEEK | MSG_TRUNC);
66b5e7dbacSMark Johnston 		ATF_REQUIRE_MSG(rc >= 0, "recv failed: %s", strerror(errno));
67b5e7dbacSMark Johnston 		ATF_REQUIRE((size_t)rc == sz);
68b5e7dbacSMark Johnston 
69b5e7dbacSMark Johnston 		rc = recv(ss, tbuf, sizeof(tbuf), MSG_TRUNC);
70b5e7dbacSMark Johnston 		ATF_REQUIRE_MSG(rc >= 0, "recv failed: %s", strerror(errno));
71b5e7dbacSMark Johnston 		ATF_REQUIRE((size_t)rc == sz);
72b5e7dbacSMark Johnston 	}
73b5e7dbacSMark Johnston 
74b5e7dbacSMark Johnston 	ATF_REQUIRE(close(cs) == 0);
75b5e7dbacSMark Johnston 	ATF_REQUIRE(close(ss) == 0);
76b5e7dbacSMark Johnston }
77b5e7dbacSMark Johnston 
78b5e7dbacSMark Johnston ATF_TC_WITHOUT_HEAD(recv_trunc_afinet_udp);
ATF_TC_BODY(recv_trunc_afinet_udp,tc)79b5e7dbacSMark Johnston ATF_TC_BODY(recv_trunc_afinet_udp, tc)
80b5e7dbacSMark Johnston {
81be1f485dSAlexander V. Chernikov 	struct sockaddr_in sin;
82b5e7dbacSMark Johnston 	struct sockaddr *sa;
83b5e7dbacSMark Johnston 	int ss, cs, rc;
84be1f485dSAlexander V. Chernikov 
85be1f485dSAlexander V. Chernikov 	ss = socket(PF_INET, SOCK_DGRAM, 0);
86b5e7dbacSMark Johnston 	ATF_REQUIRE(ss >= 0);
87b5e7dbacSMark Johnston 
88b5e7dbacSMark Johnston 	memset(&sin, 0, sizeof(sin));
89be1f485dSAlexander V. Chernikov 	sin.sin_family = AF_INET;
90be1f485dSAlexander V. Chernikov 	sin.sin_len = sizeof(sin);
91be1f485dSAlexander V. Chernikov 	sin.sin_port = htons(6666);
92be1f485dSAlexander V. Chernikov 	sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
93be1f485dSAlexander V. Chernikov 	sa = (struct sockaddr *)&sin;
94be1f485dSAlexander V. Chernikov 	rc = bind(ss, sa, sa->sa_len);
95b5e7dbacSMark Johnston 	ATF_REQUIRE_MSG(rc == 0, "bind failed: %s", strerror(errno));
96be1f485dSAlexander V. Chernikov 
97be1f485dSAlexander V. Chernikov 	cs = socket(PF_INET, SOCK_DGRAM, 0);
98b5e7dbacSMark Johnston 	ATF_REQUIRE(cs >= 0);
99be1f485dSAlexander V. Chernikov 
100b5e7dbacSMark Johnston 	size_t sizes[] = {80, 255, 256, 1024, 4096, 9000};
101b5e7dbacSMark Johnston 	check_recvmsg(cs, ss, sa, sizes, nitems(sizes));
102b5e7dbacSMark Johnston }
103b5e7dbacSMark Johnston 
104b5e7dbacSMark Johnston ATF_TC_WITHOUT_HEAD(recv_trunc_afinet6_udp);
ATF_TC_BODY(recv_trunc_afinet6_udp,tc)105b5e7dbacSMark Johnston ATF_TC_BODY(recv_trunc_afinet6_udp, tc)
106b5e7dbacSMark Johnston {
107b5e7dbacSMark Johnston 	struct sockaddr_in6 sin6;
108b5e7dbacSMark Johnston 	struct sockaddr *sa;
109b5e7dbacSMark Johnston 	int cs, ss, rc;
110b5e7dbacSMark Johnston 
111be1f485dSAlexander V. Chernikov 	ss = socket(PF_INET6, SOCK_DGRAM, 0);
112b5e7dbacSMark Johnston 	ATF_REQUIRE(ss >= 0);
113b5e7dbacSMark Johnston 
114b5e7dbacSMark Johnston 	memset(&sin6, 0, sizeof(sin6));
115be1f485dSAlexander V. Chernikov 	sin6.sin6_family = AF_INET6;
116be1f485dSAlexander V. Chernikov 	sin6.sin6_len = sizeof(sin6);
117be1f485dSAlexander V. Chernikov 	sin6.sin6_port = htons(6666);
118be1f485dSAlexander V. Chernikov 	const struct in6_addr in6loopback = IN6ADDR_LOOPBACK_INIT;
119be1f485dSAlexander V. Chernikov 	sin6.sin6_addr = in6loopback;
120be1f485dSAlexander V. Chernikov 	sa = (struct sockaddr *)&sin6;
121be1f485dSAlexander V. Chernikov 	rc = bind(ss, sa, sa->sa_len);
122b5e7dbacSMark Johnston 	ATF_REQUIRE_MSG(rc == 0, "bind failed: %s", strerror(errno));
123be1f485dSAlexander V. Chernikov 
124be1f485dSAlexander V. Chernikov 	cs = socket(PF_INET6, SOCK_DGRAM, 0);
125b5e7dbacSMark Johnston 	ATF_REQUIRE(cs >= 0);
126be1f485dSAlexander V. Chernikov 
127b5e7dbacSMark Johnston 	size_t sizes[] = {80, 255, 256, 1024, 4096, 9000};
128b5e7dbacSMark Johnston 	check_recvmsg(cs, ss, sa, sizes, nitems(sizes));
129b5e7dbacSMark Johnston }
130b5e7dbacSMark Johnston 
131b5e7dbacSMark Johnston ATF_TC_WITHOUT_HEAD(recv_trunc_afunix_dgram);
ATF_TC_BODY(recv_trunc_afunix_dgram,tc)132b5e7dbacSMark Johnston ATF_TC_BODY(recv_trunc_afunix_dgram, tc)
133b5e7dbacSMark Johnston {
134b5e7dbacSMark Johnston 	struct sockaddr_un sun;
135b5e7dbacSMark Johnston 	struct sockaddr *sa;
136b5e7dbacSMark Johnston 	int ss, cs, rc;
137b5e7dbacSMark Johnston 
138be1f485dSAlexander V. Chernikov 	ss = socket(PF_UNIX, SOCK_DGRAM, 0);
139b5e7dbacSMark Johnston 	ATF_REQUIRE(ss >= 0);
140b5e7dbacSMark Johnston 
141b5e7dbacSMark Johnston 	bzero(&sun, sizeof(sun));
142b5e7dbacSMark Johnston 	sun.sun_family = AF_UNIX;
143b5e7dbacSMark Johnston 	strlcpy(sun.sun_path, "test_check_recvmsg_socket", sizeof(sun.sun_path));
144b5e7dbacSMark Johnston 	sun.sun_len = sizeof(sun);
145b5e7dbacSMark Johnston 	sa = (struct sockaddr *)&sun;
146be1f485dSAlexander V. Chernikov 	rc = bind(ss, sa, sa->sa_len);
147b5e7dbacSMark Johnston 	ATF_REQUIRE_MSG(rc == 0, "bind failed: %s", strerror(errno));
148be1f485dSAlexander V. Chernikov 
149be1f485dSAlexander V. Chernikov 	cs = socket(PF_UNIX, SOCK_DGRAM, 0);
150b5e7dbacSMark Johnston 	ATF_REQUIRE(cs >= 0);
151be1f485dSAlexander V. Chernikov 
152b5e7dbacSMark Johnston 	size_t sizes[] = {80, 255, 256, 1024, 2000};
153b5e7dbacSMark Johnston 	check_recvmsg(cs, ss, sa, sizes, nitems(sizes));
154be1f485dSAlexander V. Chernikov }
155be1f485dSAlexander V. Chernikov 
156d8735eb7SMark Johnston /*
157d8735eb7SMark Johnston  * Exercise the case where ktrace was used to dump a truncated buffer.
158d8735eb7SMark Johnston  */
159d8735eb7SMark Johnston ATF_TC_WITHOUT_HEAD(recvmsg_trunc_ktrace_uio);
ATF_TC_BODY(recvmsg_trunc_ktrace_uio,tc)160d8735eb7SMark Johnston ATF_TC_BODY(recvmsg_trunc_ktrace_uio, tc)
161d8735eb7SMark Johnston {
162d8735eb7SMark Johnston 	struct ktr_header ktr;
163d8735eb7SMark Johnston 	struct msghdr msg;
164d8735eb7SMark Johnston 	struct iovec iov;
165d8735eb7SMark Johnston 	const char *tracepath;
166d8735eb7SMark Johnston 	char buf[128];
167d8735eb7SMark Johnston 	ssize_t nbytes;
168d8735eb7SMark Johnston 	int error, fd, sd[2];
169d8735eb7SMark Johnston 
170d8735eb7SMark Johnston 	tracepath = "ktrace";
171d8735eb7SMark Johnston 
172d8735eb7SMark Johnston 	error = socketpair(AF_UNIX, SOCK_DGRAM, 0, sd);
173d8735eb7SMark Johnston 	ATF_REQUIRE(error == 0);
174d8735eb7SMark Johnston 
175d8735eb7SMark Johnston 	memset(buf, 0, sizeof(buf));
176d8735eb7SMark Johnston 	nbytes = send(sd[0], buf, sizeof(buf), 0);
177d8735eb7SMark Johnston 	ATF_REQUIRE_MSG(nbytes >= 0, "send failed: %s", strerror(errno));
178d8735eb7SMark Johnston 	ATF_REQUIRE((size_t)nbytes == sizeof(buf));
179d8735eb7SMark Johnston 
180d8735eb7SMark Johnston 	fd = open(tracepath, O_RDWR | O_CREAT | O_TRUNC, 0644);
181d8735eb7SMark Johnston 	ATF_REQUIRE_MSG(fd >= 0, "open failed: %s", strerror(errno));
182d8735eb7SMark Johnston 	error = ktrace(tracepath, KTROP_SET, KTRFAC_GENIO, getpid());
183d8735eb7SMark Johnston 	ATF_REQUIRE_MSG(error == 0,
184d8735eb7SMark Johnston 	    "ktrace(SET) failed: %s", strerror(errno));
185d8735eb7SMark Johnston 
186d8735eb7SMark Johnston 	iov.iov_base = buf;
187d8735eb7SMark Johnston 	iov.iov_len = sizeof(buf) - 1; /* truncate */
188d8735eb7SMark Johnston 	memset(&msg, 0, sizeof(msg));
189d8735eb7SMark Johnston 	msg.msg_iov = &iov;
190d8735eb7SMark Johnston 	msg.msg_iovlen = 1;
191d8735eb7SMark Johnston 	nbytes = recvmsg(sd[1], &msg, MSG_TRUNC);
192d8735eb7SMark Johnston 	ATF_REQUIRE_MSG(nbytes >= 0, "recvmsg failed: %s", strerror(errno));
193d8735eb7SMark Johnston 	ATF_REQUIRE((size_t)nbytes == sizeof(buf));
194d8735eb7SMark Johnston 	ATF_REQUIRE((msg.msg_flags & MSG_TRUNC) != 0);
195d8735eb7SMark Johnston 
196d8735eb7SMark Johnston 	error = ktrace(tracepath, KTROP_CLEARFILE, 0, getpid());
197d8735eb7SMark Johnston 	ATF_REQUIRE_MSG(error == 0,
198d8735eb7SMark Johnston 	    "ktrace(CLEARFILE) failed: %s", strerror(errno));
199d8735eb7SMark Johnston 
200d8735eb7SMark Johnston 	nbytes = read(fd, &ktr, sizeof(ktr));
201d8735eb7SMark Johnston 	ATF_REQUIRE_MSG(nbytes >= 0, "read failed: %s", strerror(errno));
202d8735eb7SMark Johnston 	ATF_REQUIRE((size_t)nbytes == sizeof(ktr));
2034bd1e196SMark Johnston 	ATF_REQUIRE((ktr.ktr_type & ~KTR_TYPE) == KTR_GENIO);
204d8735eb7SMark Johnston 
205d8735eb7SMark Johnston 	ATF_REQUIRE(close(fd) == 0);
206d8735eb7SMark Johnston 	ATF_REQUIRE(close(sd[0]) == 0);
207d8735eb7SMark Johnston 	ATF_REQUIRE(close(sd[1]) == 0);
208d8735eb7SMark Johnston }
209d8735eb7SMark Johnston 
ATF_TP_ADD_TCS(tp)210be1f485dSAlexander V. Chernikov ATF_TP_ADD_TCS(tp)
211be1f485dSAlexander V. Chernikov {
212b5e7dbacSMark Johnston 	ATF_TP_ADD_TC(tp, recv_trunc_afinet_udp);
213b5e7dbacSMark Johnston 	ATF_TP_ADD_TC(tp, recv_trunc_afinet6_udp);
214b5e7dbacSMark Johnston 	ATF_TP_ADD_TC(tp, recv_trunc_afunix_dgram);
215d8735eb7SMark Johnston 	ATF_TP_ADD_TC(tp, recvmsg_trunc_ktrace_uio);
216be1f485dSAlexander V. Chernikov 
217b5e7dbacSMark Johnston 	return (atf_no_error());
218be1f485dSAlexander V. Chernikov }
219