Path: blob/main/tests/sys/netinet/socket_afinet.c
102415 views
/*-1* SPDX-License-Identifier: BSD-2-Clause2*3* Copyright (c) 2019 Bjoern A. Zeeb4* Copyright (c) 2024 Stormshield5*6* Redistribution and use in source and binary forms, with or without7* modification, are permitted provided that the following conditions8* are met:9* 1. Redistributions of source code must retain the above copyright10* notice, this list of conditions and the following disclaimer.11* 2. Redistributions in binary form must reproduce the above copyright12* notice, this list of conditions and the following disclaimer in the13* documentation and/or other materials provided with the distribution.14*15* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND16* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE17* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE18* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE19* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL20* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS21* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)22* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT23* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY24* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF25* SUCH DAMAGE.26*/2728#include <sys/param.h>29#include <sys/socket.h>30#include <sys/wait.h>3132#include <netinet/in.h>3334#include <errno.h>35#include <poll.h>36#include <pwd.h>37#include <stdio.h>38#include <unistd.h>3940#include <atf-c.h>4142ATF_TC_WITHOUT_HEAD(socket_afinet);43ATF_TC_BODY(socket_afinet, tc)44{45int sd;4647sd = socket(PF_INET, SOCK_DGRAM, 0);48ATF_CHECK(sd >= 0);4950close(sd);51}5253ATF_TC_WITHOUT_HEAD(socket_afinet_bind_zero);54ATF_TC_BODY(socket_afinet_bind_zero, tc)55{56int sd, rc;57struct sockaddr_in sin;5859if (atf_tc_get_config_var_as_bool_wd(tc, "ci", false))60atf_tc_skip("doesn't work when mac_portacl(4) loaded (https://bugs.freebsd.org/238781)");6162sd = socket(PF_INET, SOCK_DGRAM, 0);63ATF_CHECK(sd >= 0);6465bzero(&sin, sizeof(sin));66/*67* For AF_INET we do not check the family in in_pcbbind_setup(9),68* sa_len gets set from the syscall argument in getsockaddr(9),69* so we bind to 0:0.70*/71rc = bind(sd, (struct sockaddr *)&sin, sizeof(sin));72ATF_CHECK_EQ(0, rc);7374close(sd);75}7677ATF_TC_WITHOUT_HEAD(socket_afinet_bind_ok);78ATF_TC_BODY(socket_afinet_bind_ok, tc)79{80int sd, rc;81struct sockaddr_in sin;8283sd = socket(PF_INET, SOCK_DGRAM, 0);84ATF_CHECK(sd >= 0);8586bzero(&sin, sizeof(sin));87sin.sin_family = AF_INET;88sin.sin_len = sizeof(sin);89sin.sin_port = htons(0);90sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);91rc = bind(sd, (struct sockaddr *)&sin, sizeof(sin));92ATF_CHECK_EQ(0, rc);9394close(sd);95}9697ATF_TC_WITHOUT_HEAD(socket_afinet_poll_no_rdhup);98ATF_TC_BODY(socket_afinet_poll_no_rdhup, tc)99{100int ss, ss2, cs, rc;101struct sockaddr_in sin;102socklen_t slen;103struct pollfd pfd;104int one = 1;105106/* Verify that we don't expose POLLRDHUP if not requested. */107108/* Server setup. */109ss = socket(PF_INET, SOCK_STREAM, 0);110ATF_CHECK(ss >= 0);111rc = setsockopt(ss, SOL_SOCKET, SO_REUSEPORT, &one, sizeof(one));112ATF_CHECK_EQ(0, rc);113bzero(&sin, sizeof(sin));114sin.sin_family = AF_INET;115sin.sin_len = sizeof(sin);116sin.sin_port = htons(0);117sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);118rc = bind(ss, (struct sockaddr *)&sin, sizeof(sin));119ATF_CHECK_EQ(0, rc);120rc = listen(ss, 1);121ATF_CHECK_EQ(0, rc);122slen = sizeof(sin);123rc = getsockname(ss, (struct sockaddr *)&sin, &slen);124ATF_CHECK_EQ(0, rc);125126/* Client connects, server accepts. */127cs = socket(PF_INET, SOCK_STREAM, 0);128ATF_CHECK(cs >= 0);129rc = connect(cs, (struct sockaddr *)&sin, sizeof(sin));130ATF_CHECK_EQ(0, rc);131ss2 = accept(ss, NULL, NULL);132ATF_CHECK(ss2 >= 0);133134/* Server can write, sees only POLLOUT. */135pfd.fd = ss2;136pfd.events = POLLIN | POLLOUT;137rc = poll(&pfd, 1, 0);138ATF_CHECK_EQ(1, rc);139ATF_CHECK_EQ(POLLOUT, pfd.revents);140141/* Client closes socket! */142rc = close(cs);143ATF_CHECK_EQ(0, rc);144145/*146* Server now sees POLLIN, but not POLLRDHUP because we didn't ask.147* Need non-zero timeout to wait for the FIN to arrive and trigger the148* socket to become readable.149*/150pfd.fd = ss2;151pfd.events = POLLIN;152rc = poll(&pfd, 1, 60000);153ATF_CHECK_EQ(1, rc);154ATF_CHECK_EQ(POLLIN, pfd.revents);155156close(ss2);157close(ss);158}159160ATF_TC_WITHOUT_HEAD(socket_afinet_poll_rdhup);161ATF_TC_BODY(socket_afinet_poll_rdhup, tc)162{163int ss, ss2, cs, rc;164struct sockaddr_in sin;165socklen_t slen;166struct pollfd pfd;167char buffer;168int one = 1;169170/* Verify that server sees POLLRDHUP if it asks for it. */171172/* Server setup. */173ss = socket(PF_INET, SOCK_STREAM, 0);174ATF_CHECK(ss >= 0);175rc = setsockopt(ss, SOL_SOCKET, SO_REUSEPORT, &one, sizeof(one));176ATF_CHECK_EQ(0, rc);177bzero(&sin, sizeof(sin));178sin.sin_family = AF_INET;179sin.sin_len = sizeof(sin);180sin.sin_port = htons(0);181sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);182rc = bind(ss, (struct sockaddr *)&sin, sizeof(sin));183ATF_CHECK_EQ(0, rc);184rc = listen(ss, 1);185ATF_CHECK_EQ(0, rc);186slen = sizeof(sin);187rc = getsockname(ss, (struct sockaddr *)&sin, &slen);188ATF_CHECK_EQ(0, rc);189190/* Client connects, server accepts. */191cs = socket(PF_INET, SOCK_STREAM, 0);192ATF_CHECK(cs >= 0);193rc = connect(cs, (struct sockaddr *)&sin, sizeof(sin));194ATF_CHECK_EQ(0, rc);195ss2 = accept(ss, NULL, NULL);196ATF_CHECK(ss2 >= 0);197198/* Server can write, so sees POLLOUT. */199pfd.fd = ss2;200pfd.events = POLLIN | POLLOUT | POLLRDHUP;201rc = poll(&pfd, 1, 0);202ATF_CHECK_EQ(1, rc);203ATF_CHECK_EQ(POLLOUT, pfd.revents);204205/* Client writes two bytes, server reads only one of them. */206rc = write(cs, "xx", 2);207ATF_CHECK_EQ(2, rc);208rc = read(ss2, &buffer, 1);209ATF_CHECK_EQ(1, rc);210211/* Server can read, so sees POLLIN. */212pfd.fd = ss2;213pfd.events = POLLIN | POLLOUT | POLLRDHUP;214rc = poll(&pfd, 1, 0);215ATF_CHECK_EQ(1, rc);216ATF_CHECK_EQ(POLLIN | POLLOUT, pfd.revents);217218/* Client closes socket! */219rc = close(cs);220ATF_CHECK_EQ(0, rc);221222/*223* Server sees Linux-style POLLRDHUP. Note that this is the case even224* though one byte of data remains unread.225*226* This races against the delivery of FIN caused by the close() above.227* Sometimes (more likely when run under truss or if another system228* call is added in between) it hits the path where sopoll_generic()229* immediately sees SBS_CANTRCVMORE, and sometimes it sleeps with flag230* SB_SEL so that it's woken up almost immediately and runs again,231* which is why we need a non-zero timeout here.232*/233pfd.fd = ss2;234pfd.events = POLLRDHUP;235rc = poll(&pfd, 1, 60000);236ATF_CHECK_EQ(1, rc);237ATF_CHECK_EQ(POLLRDHUP, pfd.revents);238239close(ss2);240close(ss);241}242243ATF_TC_WITHOUT_HEAD(socket_afinet_stream_reconnect);244ATF_TC_BODY(socket_afinet_stream_reconnect, tc)245{246struct sockaddr_in sin;247socklen_t slen;248int ss, cs, rc;249250/*251* Make sure that an attempt to connect(2) a connected or disconnected252* stream socket fails with EISCONN.253*/254255/* Server setup. */256ss = socket(PF_INET, SOCK_STREAM, 0);257ATF_CHECK(ss >= 0);258bzero(&sin, sizeof(sin));259sin.sin_family = AF_INET;260sin.sin_len = sizeof(sin);261sin.sin_port = htons(0);262sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);263rc = bind(ss, (struct sockaddr *)&sin, sizeof(sin));264ATF_CHECK_EQ(0, rc);265rc = listen(ss, 1);266ATF_CHECK_EQ(0, rc);267slen = sizeof(sin);268rc = getsockname(ss, (struct sockaddr *)&sin, &slen);269ATF_CHECK_EQ(0, rc);270271/* Client connects, shuts down. */272cs = socket(PF_INET, SOCK_STREAM, 0);273ATF_CHECK(cs >= 0);274rc = connect(cs, (struct sockaddr *)&sin, sizeof(sin));275ATF_CHECK_EQ(0, rc);276rc = shutdown(cs, SHUT_RDWR);277ATF_CHECK_EQ(0, rc);278279/* A subsequent connect(2) fails with EISCONN. */280rc = connect(cs, (struct sockaddr *)&sin, sizeof(sin));281ATF_CHECK_EQ(-1, rc);282ATF_CHECK_EQ(errno, EISCONN);283284rc = close(cs);285ATF_CHECK_EQ(0, rc);286rc = close(ss);287ATF_CHECK_EQ(0, rc);288}289290/*291* Make sure that unprivileged users can't set the IP_BINDANY or IPV6_BINDANY292* socket options.293*/294ATF_TC(socket_afinet_bindany);295ATF_TC_HEAD(socket_afinet_bindany, tc)296{297atf_tc_set_md_var(tc, "require.user", "unprivileged");298}299ATF_TC_BODY(socket_afinet_bindany, tc)300{301int s;302303s = socket(AF_INET, SOCK_STREAM, 0);304ATF_REQUIRE(s >= 0);305ATF_REQUIRE_ERRNO(EPERM,306setsockopt(s, IPPROTO_IP, IP_BINDANY, &(int){1}, sizeof(int)) ==307-1);308ATF_REQUIRE(close(s) == 0);309310s = socket(AF_INET, SOCK_DGRAM, 0);311ATF_REQUIRE(s >= 0);312ATF_REQUIRE_ERRNO(EPERM,313setsockopt(s, IPPROTO_IP, IP_BINDANY, &(int){1}, sizeof(int)) ==314-1);315ATF_REQUIRE(close(s) == 0);316317s = socket(AF_INET6, SOCK_STREAM, 0);318ATF_REQUIRE(s >= 0);319ATF_REQUIRE_ERRNO(EPERM,320setsockopt(s, IPPROTO_IPV6, IPV6_BINDANY, &(int){1}, sizeof(int)) ==321-1);322ATF_REQUIRE(close(s) == 0);323324s = socket(AF_INET6, SOCK_DGRAM, 0);325ATF_REQUIRE(s >= 0);326ATF_REQUIRE_ERRNO(EPERM,327setsockopt(s, IPPROTO_IPV6, IPV6_BINDANY, &(int){1}, sizeof(int)) ==328-1);329ATF_REQUIRE(close(s) == 0);330}331332/*333* Bind a socket to the specified address, optionally dropping privileges and334* setting one of the SO_REUSE* options first.335*336* Returns true if the bind succeeded, and false if it failed with EADDRINUSE.337*/338static bool339child_bind(const atf_tc_t *tc, int type, struct sockaddr *sa, int opt,340bool unpriv)341{342const char *user;343pid_t child;344345if (unpriv) {346if (!atf_tc_has_config_var(tc, "unprivileged_user"))347atf_tc_skip("unprivileged_user not set");348user = atf_tc_get_config_var(tc, "unprivileged_user");349} else {350user = NULL;351}352353child = fork();354ATF_REQUIRE(child != -1);355if (child == 0) {356int s;357358if (user != NULL) {359struct passwd *passwd;360361passwd = getpwnam(user);362if (seteuid(passwd->pw_uid) != 0)363_exit(1);364}365366s = socket(sa->sa_family, type, 0);367if (s < 0)368_exit(2);369if (bind(s, sa, sa->sa_len) == 0)370_exit(3);371if (errno != EADDRINUSE)372_exit(4);373if (opt != 0) {374if (setsockopt(s, SOL_SOCKET, opt, &(int){1},375sizeof(int)) != 0)376_exit(5);377}378if (bind(s, sa, sa->sa_len) == 0)379_exit(6);380if (errno != EADDRINUSE)381_exit(7);382_exit(0);383} else {384int status;385386ATF_REQUIRE_EQ(waitpid(child, &status, 0), child);387ATF_REQUIRE(WIFEXITED(status));388status = WEXITSTATUS(status);389ATF_REQUIRE_MSG(status == 0 || status == 6,390"child exited with %d", status);391return (status == 6);392}393}394395static bool396child_bind_priv(const atf_tc_t *tc, int type, struct sockaddr *sa, int opt)397{398return (child_bind(tc, type, sa, opt, false));399}400401static bool402child_bind_unpriv(const atf_tc_t *tc, int type, struct sockaddr *sa, int opt)403{404return (child_bind(tc, type, sa, opt, true));405}406407static int408bind_socket(int domain, int type, int opt, bool unspec, struct sockaddr *sa)409{410socklen_t slen;411int s;412413s = socket(domain, type, 0);414ATF_REQUIRE(s >= 0);415416if (domain == AF_INET) {417struct sockaddr_in sin;418419bzero(&sin, sizeof(sin));420sin.sin_family = AF_INET;421sin.sin_len = sizeof(sin);422sin.sin_addr.s_addr = htonl(unspec ?423INADDR_ANY : INADDR_LOOPBACK);424sin.sin_port = htons(0);425ATF_REQUIRE(bind(s, (struct sockaddr *)&sin, sizeof(sin)) == 0);426427slen = sizeof(sin);428} else /* if (domain == AF_INET6) */ {429struct sockaddr_in6 sin6;430431bzero(&sin6, sizeof(sin6));432sin6.sin6_family = AF_INET6;433sin6.sin6_len = sizeof(sin6);434sin6.sin6_addr = unspec ? in6addr_any : in6addr_loopback;435sin6.sin6_port = htons(0);436ATF_REQUIRE(bind(s, (struct sockaddr *)&sin6, sizeof(sin6)) == 0);437438slen = sizeof(sin6);439}440441if (opt != 0) {442ATF_REQUIRE(setsockopt(s, SOL_SOCKET, opt, &(int){1},443sizeof(int)) == 0);444}445446ATF_REQUIRE(getsockname(s, sa, &slen) == 0);447448return (s);449}450451static void452multibind_test(const atf_tc_t *tc, int domain, int type)453{454struct sockaddr_storage ss;455int opts[4] = { 0, SO_REUSEADDR, SO_REUSEPORT, SO_REUSEPORT_LB };456int s;457bool flags[2] = { false, true };458bool res;459460for (size_t flagi = 0; flagi < nitems(flags); flagi++) {461for (size_t opti = 0; opti < nitems(opts); opti++) {462s = bind_socket(domain, type, opts[opti], flags[flagi],463(struct sockaddr *)&ss);464for (size_t optj = 0; optj < nitems(opts); optj++) {465int opt;466467opt = opts[optj];468res = child_bind_priv(tc, type,469(struct sockaddr *)&ss, opt);470/*471* Multi-binding is only allowed when both472* sockets have SO_REUSEPORT or SO_REUSEPORT_LB473* set.474*/475if (opts[opti] != 0 &&476opts[opti] != SO_REUSEADDR && opti == optj)477ATF_REQUIRE(res);478else479ATF_REQUIRE(!res);480481res = child_bind_unpriv(tc, type,482(struct sockaddr *)&ss, opt);483/*484* Multi-binding is only allowed when both485* sockets have the same owner.486*/487ATF_REQUIRE(!res);488}489ATF_REQUIRE(close(s) == 0);490}491}492}493494/*495* Try to bind two sockets to the same address/port tuple. Under some496* conditions this is permitted.497*/498ATF_TC(socket_afinet_multibind);499ATF_TC_HEAD(socket_afinet_multibind, tc)500{501atf_tc_set_md_var(tc, "require.user", "root");502atf_tc_set_md_var(tc, "require.config", "unprivileged_user");503}504ATF_TC_BODY(socket_afinet_multibind, tc)505{506multibind_test(tc, AF_INET, SOCK_STREAM);507multibind_test(tc, AF_INET, SOCK_DGRAM);508multibind_test(tc, AF_INET6, SOCK_STREAM);509multibind_test(tc, AF_INET6, SOCK_DGRAM);510}511512static void513bind_connected_port_test(const atf_tc_t *tc, int domain)514{515struct sockaddr_in sin;516struct sockaddr_in6 sin6;517struct sockaddr *sinp;518int error, sd[3], tmp;519bool res;520521/*522* Create a connected socket pair.523*/524sd[0] = socket(domain, SOCK_STREAM, 0);525ATF_REQUIRE_MSG(sd[0] >= 0, "socket failed: %s", strerror(errno));526sd[1] = socket(domain, SOCK_STREAM, 0);527ATF_REQUIRE_MSG(sd[1] >= 0, "socket failed: %s", strerror(errno));528if (domain == PF_INET) {529memset(&sin, 0, sizeof(sin));530sin.sin_family = AF_INET;531sin.sin_len = sizeof(sin);532sin.sin_addr.s_addr = htonl(INADDR_ANY);533sin.sin_port = htons(0);534sinp = (struct sockaddr *)&sin;535} else {536ATF_REQUIRE(domain == PF_INET6);537memset(&sin6, 0, sizeof(sin6));538sin6.sin6_family = AF_INET6;539sin6.sin6_len = sizeof(sin6);540sin6.sin6_addr = in6addr_any;541sin6.sin6_port = htons(0);542sinp = (struct sockaddr *)&sin6;543}544545error = bind(sd[0], sinp, sinp->sa_len);546ATF_REQUIRE_MSG(error == 0, "bind failed: %s", strerror(errno));547error = listen(sd[0], 1);548ATF_REQUIRE_MSG(error == 0, "listen failed: %s", strerror(errno));549550error = getsockname(sd[0], sinp, &(socklen_t){ sinp->sa_len });551ATF_REQUIRE_MSG(error == 0, "getsockname failed: %s", strerror(errno));552if (domain == PF_INET)553sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);554else555sin6.sin6_addr = in6addr_loopback;556error = connect(sd[1], sinp, sinp->sa_len);557ATF_REQUIRE_MSG(error == 0, "connect failed: %s", strerror(errno));558tmp = accept(sd[0], NULL, NULL);559ATF_REQUIRE_MSG(tmp >= 0, "accept failed: %s", strerror(errno));560ATF_REQUIRE(close(sd[0]) == 0);561sd[0] = tmp;562563/* bind() should succeed even from an unprivileged user. */564res = child_bind(tc, SOCK_STREAM, sinp, 0, false);565ATF_REQUIRE(!res);566res = child_bind(tc, SOCK_STREAM, sinp, 0, true);567ATF_REQUIRE(!res);568}569570/*571* Normally bind() prevents port stealing by a different user, even when572* SO_REUSE* are specified. However, if the port is bound by a connected573* socket, then it's fair game.574*/575ATF_TC(socket_afinet_bind_connected_port);576ATF_TC_HEAD(socket_afinet_bind_connected_port, tc)577{578atf_tc_set_md_var(tc, "require.user", "root");579atf_tc_set_md_var(tc, "require.config", "unprivileged_user");580}581ATF_TC_BODY(socket_afinet_bind_connected_port, tc)582{583bind_connected_port_test(tc, AF_INET);584bind_connected_port_test(tc, AF_INET6);585}586587ATF_TP_ADD_TCS(tp)588{589ATF_TP_ADD_TC(tp, socket_afinet);590ATF_TP_ADD_TC(tp, socket_afinet_bind_zero);591ATF_TP_ADD_TC(tp, socket_afinet_bind_ok);592ATF_TP_ADD_TC(tp, socket_afinet_poll_no_rdhup);593ATF_TP_ADD_TC(tp, socket_afinet_poll_rdhup);594ATF_TP_ADD_TC(tp, socket_afinet_stream_reconnect);595ATF_TP_ADD_TC(tp, socket_afinet_bindany);596ATF_TP_ADD_TC(tp, socket_afinet_multibind);597ATF_TP_ADD_TC(tp, socket_afinet_bind_connected_port);598599return atf_no_error();600}601602603