1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 3 * 4 * Copyright (c) 2025 Gleb Smirnoff <glebius@FreeBSD.org> 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 1. Redistributions of source code must retain the above copyright 10 * notice, this list of conditions and the following disclaimer. 11 * 2. Redistributions in binary form must reproduce the above copyright 12 * notice, this list of conditions and the following disclaimer in the 13 * documentation and/or other materials provided with the distribution. 14 * 15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25 * SUCH DAMAGE. 26 */ 27 28 #include <sys/param.h> 29 #include <sys/jail.h> 30 #include <sys/socket.h> 31 #include <netinet/in.h> 32 #include <arpa/inet.h> 33 #include <errno.h> 34 #include <ifaddrs.h> 35 #include <pthread.h> 36 #include <stdio.h> 37 #include <stdlib.h> 38 #include <string.h> 39 #include <unistd.h> 40 41 #include <atf-c.h> 42 43 static const char buf[] = "Hello"; 44 45 static void 46 sendtolocalhost(int s) 47 { 48 struct sockaddr_in dst = { 49 .sin_family = AF_INET, 50 .sin_len = sizeof(struct sockaddr_in), 51 .sin_addr = { htonl(INADDR_LOOPBACK) }, 52 .sin_port = htons(1638), 53 }; 54 55 ATF_REQUIRE(sendto(s, buf, sizeof(buf), 0, (struct sockaddr *)&dst, 56 sizeof(dst)) == sizeof(buf)); 57 } 58 59 /* 60 * Echo back to the sender its own address in payload. 61 */ 62 static void * 63 echo(void *arg) 64 { 65 int s = *(int *)arg; 66 struct sockaddr_in sin; 67 socklen_t slen = sizeof(sin); 68 char rbuf[sizeof(buf)]; 69 70 ATF_REQUIRE(recvfrom(s, &rbuf, sizeof(rbuf), 0, (struct sockaddr *)&sin, 71 &slen) == sizeof(rbuf)); 72 printf("Echo to %s:%u\n", inet_ntoa(sin.sin_addr), ntohs(sin.sin_port)); 73 ATF_REQUIRE(sendto(s, &sin, sizeof(sin), 0, (struct sockaddr *)&sin, 74 sizeof(sin)) == sizeof(sin)); 75 return (NULL); 76 } 77 78 /* 79 * Cycle through local addresses (normally there should be at least two 80 * different IPv4 ones), and communicate to the echo server checking both 81 * IP_SENDSRCADDR and IP_RECVDSTADDR. Use same cmsg buffer for both send 82 * and receive operation, this is a suggested in manual, given that 83 * IP_RECVDSTADDR == IP_SENDSRCADDR. 84 * At the setup phase check that IP_SENDSRCADDR doesn't work on unbound socket. 85 */ 86 ATF_TC_WITHOUT_HEAD(IP_SENDSRCADDR); 87 ATF_TC_BODY(IP_SENDSRCADDR, tc) 88 { 89 struct sockaddr_in srv = { 90 .sin_family = AF_INET, 91 .sin_len = sizeof(struct sockaddr_in), 92 }, dst; 93 char cbuf[CMSG_SPACE(sizeof(struct in_addr))]; 94 struct iovec iov = { 95 .iov_base = __DECONST(char *, buf), 96 .iov_len = sizeof(buf), 97 }; 98 struct iovec riov = { 99 .iov_base = &dst, 100 .iov_len = sizeof(dst), 101 }; 102 struct msghdr msg = { 103 .msg_iov = &iov, 104 .msg_iovlen = 1, 105 .msg_name = &srv, 106 .msg_namelen = sizeof(srv), 107 .msg_control = cbuf, 108 .msg_controllen = sizeof(cbuf), 109 }; 110 struct msghdr rmsg = { 111 .msg_iov = &riov, 112 .msg_iovlen = 1, 113 .msg_control = cbuf, 114 .msg_controllen = sizeof(cbuf), 115 }; 116 struct cmsghdr *cmsg = CMSG_FIRSTHDR(&msg); 117 *cmsg = (struct cmsghdr) { 118 .cmsg_level = IPPROTO_IP, 119 .cmsg_type = IP_SENDSRCADDR, 120 .cmsg_len = CMSG_LEN(sizeof(struct in_addr)), 121 }; 122 socklen_t slen = sizeof(struct sockaddr_in); 123 struct ifaddrs *ifa0, *ifa; 124 pthread_t tid; 125 int s, e; 126 127 /* First check that IP_SENDSRCADDR doesn't work on an unbound socket. */ 128 ATF_REQUIRE((s = socket(PF_INET, SOCK_DGRAM, 0)) > 0); 129 ATF_REQUIRE_MSG(sendmsg(s, &msg, 0) == -1 && errno == EINVAL, 130 "sendmsg(.cmsg_type = IP_SENDSRCADDR), errno %d", errno); 131 132 /* Bind to random ports both sender and echo server. */ 133 ATF_REQUIRE(bind(s, (struct sockaddr *)&srv, sizeof(srv)) == 0); 134 ATF_REQUIRE((e = socket(PF_INET, SOCK_DGRAM, 0)) > 0); 135 ATF_REQUIRE(bind(e, (struct sockaddr *)&srv, sizeof(srv)) == 0); 136 ATF_REQUIRE(getsockname(e, (struct sockaddr *)&srv, &slen) == 0); 137 srv.sin_addr.s_addr = htonl(INADDR_LOOPBACK); 138 139 ATF_REQUIRE(getifaddrs(&ifa0) == 0); 140 for (ifa = ifa0; ifa != NULL; ifa = ifa->ifa_next) { 141 struct sockaddr_in src; 142 struct in_addr vrf; 143 144 if (ifa->ifa_addr->sa_family != AF_INET) 145 continue; 146 memcpy(&src, ifa->ifa_addr, sizeof(src)); 147 printf("Sending from %s\n", inet_ntoa(src.sin_addr)); 148 ATF_REQUIRE(pthread_create(&tid, NULL, echo, &e) == 0); 149 memcpy(CMSG_DATA(cmsg), &src.sin_addr, sizeof(src.sin_addr)); 150 ATF_REQUIRE(sendmsg(s, &msg, 0) == sizeof(buf)); 151 ATF_REQUIRE(recvmsg(s, &rmsg, 0) == sizeof(struct sockaddr_in)); 152 memcpy(&vrf, CMSG_DATA(cmsg), sizeof(vrf)); 153 ATF_REQUIRE_MSG(dst.sin_addr.s_addr == src.sin_addr.s_addr, 154 "Sent from %s, but echo server reports %s", 155 inet_ntoa(src.sin_addr), inet_ntoa(dst.sin_addr)); 156 ATF_REQUIRE_MSG(vrf.s_addr == src.sin_addr.s_addr, 157 "Sent from %s, but IP_RECVDSTADDR reports %s", 158 inet_ntoa(src.sin_addr), inet_ntoa(vrf)); 159 ATF_REQUIRE(pthread_join(tid, NULL) == 0); 160 } 161 162 freeifaddrs(ifa0); 163 close(s); 164 close(e); 165 } 166 167 /* 168 * Check gethostname(2) on a newborn socket, and then on an unconnected, but 169 * used socket. The first shall return all-zeroes, and second one should 170 * return us our assigned port. 171 */ 172 ATF_TC_WITHOUT_HEAD(gethostname); 173 ATF_TC_BODY(gethostname, tc) 174 { 175 struct sockaddr_in sin; 176 socklen_t slen = sizeof(sin); 177 int s; 178 179 ATF_REQUIRE((s = socket(PF_INET, SOCK_DGRAM, 0)) > 0); 180 ATF_REQUIRE(getsockname(s, (struct sockaddr *)&sin, &slen) == 0); 181 ATF_REQUIRE_MSG(sin.sin_addr.s_addr == INADDR_ANY && sin.sin_port == 0, 182 "newborn socket name %s:%u", inet_ntoa(sin.sin_addr), 183 ntohs(sin.sin_port)); 184 sendtolocalhost(s); 185 ATF_REQUIRE(getsockname(s, (struct sockaddr *)&sin, &slen) == 0); 186 ATF_REQUIRE_MSG(sin.sin_addr.s_addr == INADDR_ANY && sin.sin_port != 0, 187 "used unconnected socket name %s:%u", inet_ntoa(sin.sin_addr), 188 ntohs(sin.sin_port)); 189 close(s); 190 } 191 192 ATF_TC_WITHOUT_HEAD(gethostname_jailed); 193 ATF_TC_BODY(gethostname_jailed, tc) 194 { 195 struct in_addr laddr = { htonl(INADDR_LOOPBACK) }; 196 struct jail jconf = { 197 .version = JAIL_API_VERSION, 198 .path = __DECONST(char *, "/"), 199 .hostname = __DECONST(char *,"test"), 200 .ip4s = 1, 201 .ip4 = &laddr, 202 }; 203 struct sockaddr_in sin; 204 socklen_t slen = sizeof(sin); 205 int s; 206 207 ATF_REQUIRE(jail(&jconf) > 0); 208 ATF_REQUIRE((s = socket(PF_INET, SOCK_DGRAM, 0)) > 0); 209 sendtolocalhost(s); 210 ATF_REQUIRE(getsockname(s, (struct sockaddr *)&sin, &slen) == 0); 211 ATF_REQUIRE_MSG(sin.sin_addr.s_addr == laddr.s_addr && 212 sin.sin_port != 0, 213 "jailed unconnected socket name %s:%u", inet_ntoa(sin.sin_addr), 214 ntohs(sin.sin_port)); 215 close(s); 216 } 217 218 /* 219 * See bug 274009. 220 */ 221 ATF_TC_WITHOUT_HEAD(v4mapped); 222 ATF_TC_BODY(v4mapped, tc) 223 { 224 struct sockaddr_in6 sa6 = { 225 .sin6_family = AF_INET6, 226 .sin6_len = sizeof(struct sockaddr_in6), 227 .sin6_port = htons(1), 228 }; 229 int s; 230 231 ATF_REQUIRE((s = socket(PF_INET6, SOCK_DGRAM, 0)) > 0); 232 ATF_REQUIRE(setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY, &(int){0}, 233 sizeof(int)) == 0); 234 ATF_REQUIRE(inet_pton(AF_INET6, "::ffff:127.0.0.1", &(sa6.sin6_addr)) 235 == 1); 236 ATF_REQUIRE(sendto(s, buf, sizeof(buf), 0, (struct sockaddr *)&sa6, 237 sizeof(sa6)) == sizeof(buf)); 238 close(s); 239 } 240 241 ATF_TP_ADD_TCS(tp) 242 { 243 ATF_TP_ADD_TC(tp, v4mapped); 244 ATF_TP_ADD_TC(tp, gethostname); 245 ATF_TP_ADD_TC(tp, gethostname_jailed); 246 ATF_TP_ADD_TC(tp, IP_SENDSRCADDR); 247 248 return (atf_no_error()); 249 } 250