diff options
author | rwatson <rwatson@FreeBSD.org> | 2005-01-16 13:05:32 +0000 |
---|---|---|
committer | rwatson <rwatson@FreeBSD.org> | 2005-01-16 13:05:32 +0000 |
commit | 69eae68c08ae6b5de2f66e67df223217088dd048 (patch) | |
tree | 7f82929b4ffc1b7e7138599a71a6d90e49ef45ac /tools | |
parent | dc0aca6cee7685ee32a3103876c9bdfc18ee09aa (diff) | |
download | FreeBSD-src-69eae68c08ae6b5de2f66e67df223217088dd048.zip FreeBSD-src-69eae68c08ae6b5de2f66e67df223217088dd048.tar.gz |
Add udpconnectjail, a simple regression test to exercise an (as yet)
unfixed bug in the jail() implementation relating to using the connect()
system call on UDP sockets.
PR: 26506
Diffstat (limited to 'tools')
-rw-r--r-- | tools/regression/netinet/udpconnectjail/Makefile | 7 | ||||
-rw-r--r-- | tools/regression/netinet/udpconnectjail/udpconnectjail.c | 110 |
2 files changed, 117 insertions, 0 deletions
diff --git a/tools/regression/netinet/udpconnectjail/Makefile b/tools/regression/netinet/udpconnectjail/Makefile new file mode 100644 index 0000000..d8f7e93 --- /dev/null +++ b/tools/regression/netinet/udpconnectjail/Makefile @@ -0,0 +1,7 @@ +# $FreeBSD$ + +PROG= udpconnectjail +NO_MAN= yes +WARNS= 3 + +.include <bsd.prog.mk> diff --git a/tools/regression/netinet/udpconnectjail/udpconnectjail.c b/tools/regression/netinet/udpconnectjail/udpconnectjail.c new file mode 100644 index 0000000..be7e43b --- /dev/null +++ b/tools/regression/netinet/udpconnectjail/udpconnectjail.c @@ -0,0 +1,110 @@ +/*- + * Copyright (c) 2005 Robert N. M. Watson + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + * + * $FreeBSD$ + */ + +#include <sys/param.h> +#include <sys/jail.h> +#include <sys/socket.h> + +#include <netinet/in.h> + +#include <arpa/inet.h> + +#include <err.h> +#include <errno.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <unistd.h> + +/* + * A bug in the jail(8) code prevented processes in jail from properly + * connecting UDP sockets. This test program attempts to exercise that bug. + */ + +static void +usage(void) +{ + + fprintf(stderr, "udpconnectjail: no arguments\n"); + exit(-1); +} + +static void +test(const char *context, struct sockaddr_in *sin) +{ + int sock; + + sock = socket(PF_INET, SOCK_DGRAM, 0); + if (sock == -1) + errx(-1, "%s: socket(PF_INET, SOCK_DGRAM, 0): %s", context, + strerror(errno)); + + if (connect(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0) + errx(-1, "%s: connect(%s): %s", context, + inet_ntoa(sin->sin_addr), strerror(errno)); + + if (close(sock) < 0) + errx(-1, "%s: close(): %s", context, strerror(errno)); +} + +int +main(int argc, __unused char *argv[]) +{ + struct sockaddr_in sin; + struct jail thejail; + + if (argc != 1) + usage(); + + bzero(&sin, sizeof(sin)); + sin.sin_len = sizeof(sin); + sin.sin_family = AF_INET; + sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK); + sin.sin_port = 0; + + /* + * First run the system call test outside of a jail. + */ + test("not in jail", &sin); + + /* + * Now re-run in a jail. + */ + bzero(&thejail, sizeof(thejail)); + thejail.version = 0; + thejail.path = "/"; + thejail.hostname = "jail"; + thejail.ip_number = htonl(INADDR_LOOPBACK); + if (jail(&thejail) < 0) + errx(-1, "jail: %s", strerror(errno)); + test("in jail", &sin); + + fprintf(stdout, "PASS\n"); + + return (0); +} |