xref: /freebsd/tests/sys/netinet/udp_bindings.c (revision cb2887746f8b9dd4ad6b1e757cdc053a08b25a2e)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause
3  *
4  * Copyright (c) 2025 Gleb Smirnoff <glebius@FreeBSD.org>
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  *
15  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25  * SUCH DAMAGE.
26  */
27 
28 #include <sys/param.h>
29 #include <sys/jail.h>
30 #include <sys/socket.h>
31 #include <netinet/in.h>
32 #include <arpa/inet.h>
33 #include <errno.h>
34 #include <ifaddrs.h>
35 #include <pthread.h>
36 #include <stdio.h>
37 #include <stdlib.h>
38 #include <string.h>
39 #include <unistd.h>
40 
41 #include <atf-c.h>
42 
43 static const char buf[] = "Hello";
44 
45 static void
46 sendtolocalhost(int s)
47 {
48 	struct sockaddr_in dst = {
49 		.sin_family = AF_INET,
50 		.sin_len = sizeof(struct sockaddr_in),
51 		.sin_addr = { htonl(INADDR_LOOPBACK) },
52 		.sin_port = htons(1638),
53 	};
54 
55 	ATF_REQUIRE(sendto(s, buf, sizeof(buf), 0, (struct sockaddr *)&dst,
56 	    sizeof(dst)) == sizeof(buf));
57 }
58 
59 /*
60  * Echo back to the sender its own address in payload.
61  */
62 static void *
63 echo(void *arg)
64 {
65 	int s = *(int *)arg;
66 	struct sockaddr_in sin;
67 	socklen_t slen = sizeof(sin);
68 	char rbuf[sizeof(buf)];
69 
70 	ATF_REQUIRE(recvfrom(s, &rbuf, sizeof(rbuf), 0, (struct sockaddr *)&sin,
71 	    &slen) == sizeof(rbuf));
72 	printf("Echo to %s:%u\n", inet_ntoa(sin.sin_addr), ntohs(sin.sin_port));
73 	ATF_REQUIRE(sendto(s, &sin, sizeof(sin), 0, (struct sockaddr *)&sin,
74 	    sizeof(sin)) == sizeof(sin));
75 	return (NULL);
76 }
77 
78 /*
79  * Cycle through local addresses (normally there should be at least two
80  * different IPv4 ones), and communicate to the echo server checking both
81  * IP_SENDSRCADDR and IP_RECVDSTADDR.  Use same cmsg buffer for both send
82  * and receive operation, this is a suggested in manual, given that
83  * IP_RECVDSTADDR == IP_SENDSRCADDR.
84  * At the setup phase check that IP_SENDSRCADDR doesn't work on unbound socket.
85  */
86 ATF_TC_WITHOUT_HEAD(IP_SENDSRCADDR);
87 ATF_TC_BODY(IP_SENDSRCADDR, tc)
88 {
89 	struct sockaddr_in srv = {
90 		.sin_family = AF_INET,
91 		.sin_len = sizeof(struct sockaddr_in),
92 	}, dst;
93 	char cbuf[CMSG_SPACE(sizeof(struct in_addr))];
94 	struct iovec iov = {
95 		.iov_base = __DECONST(char *, buf),
96 		.iov_len = sizeof(buf),
97 	};
98 	struct iovec riov = {
99 		.iov_base = &dst,
100 		.iov_len = sizeof(dst),
101 	};
102 	struct msghdr msg = {
103 		.msg_iov = &iov,
104 		.msg_iovlen = 1,
105 		.msg_name = &srv,
106 		.msg_namelen = sizeof(srv),
107 		.msg_control = cbuf,
108 		.msg_controllen = sizeof(cbuf),
109 	};
110 	struct msghdr rmsg = {
111 		.msg_iov = &riov,
112 		.msg_iovlen = 1,
113 		.msg_control = cbuf,
114 		.msg_controllen = sizeof(cbuf),
115 	};
116 	struct cmsghdr *cmsg = CMSG_FIRSTHDR(&msg);
117 	*cmsg = (struct cmsghdr) {
118 		.cmsg_level = IPPROTO_IP,
119 		.cmsg_type = IP_SENDSRCADDR,
120 		.cmsg_len = CMSG_LEN(sizeof(struct in_addr)),
121 	};
122 	socklen_t slen = sizeof(struct sockaddr_in);
123 	struct ifaddrs *ifa0, *ifa;
124 	pthread_t tid;
125 	int s, e;
126 
127 	/* First check that IP_SENDSRCADDR doesn't work on an unbound socket. */
128 	ATF_REQUIRE((s = socket(PF_INET, SOCK_DGRAM, 0)) > 0);
129 	ATF_REQUIRE_MSG(sendmsg(s, &msg, 0) == -1 && errno == EINVAL,
130 	    "sendmsg(.cmsg_type = IP_SENDSRCADDR), errno %d", errno);
131 
132 	/* Bind to random ports both sender and echo server. */
133 	ATF_REQUIRE(bind(s, (struct sockaddr *)&srv, sizeof(srv)) == 0);
134 	ATF_REQUIRE((e = socket(PF_INET, SOCK_DGRAM, 0)) > 0);
135 	ATF_REQUIRE(bind(e, (struct sockaddr *)&srv, sizeof(srv)) == 0);
136 	ATF_REQUIRE(getsockname(e, (struct sockaddr *)&srv, &slen) == 0);
137 	srv.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
138 
139 	ATF_REQUIRE(getifaddrs(&ifa0) == 0);
140 	for (ifa = ifa0; ifa != NULL; ifa = ifa->ifa_next) {
141 		struct sockaddr_in src;
142 		struct in_addr vrf;
143 
144 		if (ifa->ifa_addr->sa_family != AF_INET)
145 			continue;
146 		memcpy(&src, ifa->ifa_addr, sizeof(src));
147 		printf("Sending from %s\n", inet_ntoa(src.sin_addr));
148 		ATF_REQUIRE(pthread_create(&tid, NULL, echo, &e) == 0);
149 		memcpy(CMSG_DATA(cmsg), &src.sin_addr, sizeof(src.sin_addr));
150 		ATF_REQUIRE(sendmsg(s, &msg, 0) == sizeof(buf));
151 		ATF_REQUIRE(recvmsg(s, &rmsg, 0) == sizeof(struct sockaddr_in));
152 		memcpy(&vrf, CMSG_DATA(cmsg), sizeof(vrf));
153 		ATF_REQUIRE_MSG(dst.sin_addr.s_addr == src.sin_addr.s_addr,
154 		    "Sent from %s, but echo server reports %s",
155 		    inet_ntoa(src.sin_addr), inet_ntoa(dst.sin_addr));
156 		ATF_REQUIRE_MSG(vrf.s_addr == src.sin_addr.s_addr,
157 		    "Sent from %s, but IP_RECVDSTADDR reports %s",
158 		    inet_ntoa(src.sin_addr), inet_ntoa(vrf));
159 		ATF_REQUIRE(pthread_join(tid, NULL) == 0);
160 	}
161 
162 	freeifaddrs(ifa0);
163 	close(s);
164 	close(e);
165 }
166 
167 /*
168  * Check gethostname(2) on a newborn socket, and then on an unconnected, but
169  * used socket.  The first shall return all-zeroes, and second one should
170  * return us our assigned port.
171  */
172 ATF_TC_WITHOUT_HEAD(gethostname);
173 ATF_TC_BODY(gethostname, tc)
174 {
175 	struct sockaddr_in sin;
176 	socklen_t slen = sizeof(sin);
177 	int s;
178 
179 	ATF_REQUIRE((s = socket(PF_INET, SOCK_DGRAM, 0)) > 0);
180 	ATF_REQUIRE(getsockname(s, (struct sockaddr *)&sin, &slen) == 0);
181 	ATF_REQUIRE_MSG(sin.sin_addr.s_addr == INADDR_ANY && sin.sin_port == 0,
182 	    "newborn socket name %s:%u", inet_ntoa(sin.sin_addr),
183 	    ntohs(sin.sin_port));
184 	sendtolocalhost(s);
185 	ATF_REQUIRE(getsockname(s, (struct sockaddr *)&sin, &slen) == 0);
186 	ATF_REQUIRE_MSG(sin.sin_addr.s_addr == INADDR_ANY && sin.sin_port != 0,
187 	    "used unconnected socket name %s:%u", inet_ntoa(sin.sin_addr),
188 	    ntohs(sin.sin_port));
189 	close(s);
190 }
191 
192 ATF_TC_WITHOUT_HEAD(gethostname_jailed);
193 ATF_TC_BODY(gethostname_jailed, tc)
194 {
195 	struct in_addr laddr = { htonl(INADDR_LOOPBACK) };
196 	struct jail jconf = {
197 		.version = JAIL_API_VERSION,
198 		.path = __DECONST(char *, "/"),
199 		.hostname = __DECONST(char *,"test"),
200 		.ip4s = 1,
201 		.ip4 = &laddr,
202 	};
203 	struct sockaddr_in sin;
204 	socklen_t slen = sizeof(sin);
205 	int s;
206 
207 	ATF_REQUIRE(jail(&jconf) > 0);
208 	ATF_REQUIRE((s = socket(PF_INET, SOCK_DGRAM, 0)) > 0);
209 	sendtolocalhost(s);
210 	ATF_REQUIRE(getsockname(s, (struct sockaddr *)&sin, &slen) == 0);
211 	ATF_REQUIRE_MSG(sin.sin_addr.s_addr == laddr.s_addr &&
212 	    sin.sin_port != 0,
213 	    "jailed unconnected socket name %s:%u", inet_ntoa(sin.sin_addr),
214 	    ntohs(sin.sin_port));
215 	close(s);
216 }
217 
218 /*
219  * See bug 274009.
220  */
221 ATF_TC_WITHOUT_HEAD(v4mapped);
222 ATF_TC_BODY(v4mapped, tc)
223 {
224 	struct sockaddr_in6 sa6 = {
225 		.sin6_family = AF_INET6,
226 		.sin6_len = sizeof(struct sockaddr_in6),
227 		.sin6_port = htons(1),
228 	};
229 	int s;
230 
231 	ATF_REQUIRE((s = socket(PF_INET6, SOCK_DGRAM, 0)) > 0);
232 	ATF_REQUIRE(setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY, &(int){0},
233 	    sizeof(int)) == 0);
234 	ATF_REQUIRE(inet_pton(AF_INET6, "::ffff:127.0.0.1", &(sa6.sin6_addr))
235 	    == 1);
236 	ATF_REQUIRE(sendto(s, buf, sizeof(buf), 0, (struct sockaddr *)&sa6,
237 	    sizeof(sa6)) == sizeof(buf));
238 	close(s);
239 }
240 
241 ATF_TP_ADD_TCS(tp)
242 {
243 	ATF_TP_ADD_TC(tp, v4mapped);
244 	ATF_TP_ADD_TC(tp, gethostname);
245 	ATF_TP_ADD_TC(tp, gethostname_jailed);
246 	ATF_TP_ADD_TC(tp, IP_SENDSRCADDR);
247 
248 	return (atf_no_error());
249 }
250