1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
5 #include <net/if_arp.h>
10 #include "alloc-util.h"
13 #include "exit-status.h"
16 #include "in-addr-util.h"
17 #include "iovec-util.h"
20 #include "path-util.h"
21 #include "process-util.h"
22 #include "random-util.h"
24 #include "socket-util.h"
25 #include "string-util.h"
27 #include "tmpfile-util.h"
29 assert_cc(SUN_PATH_LEN
== 108);
32 assert_se( ifname_valid("foo"));
33 assert_se( ifname_valid("eth0"));
35 assert_se(!ifname_valid("0"));
36 assert_se(!ifname_valid("99"));
37 assert_se( ifname_valid("a99"));
38 assert_se( ifname_valid("99a"));
40 assert_se(!ifname_valid(NULL
));
41 assert_se(!ifname_valid(""));
42 assert_se(!ifname_valid(" "));
43 assert_se(!ifname_valid(" foo"));
44 assert_se(!ifname_valid("bar\n"));
45 assert_se(!ifname_valid("."));
46 assert_se(!ifname_valid(".."));
47 assert_se(ifname_valid("foo.bar"));
48 assert_se(!ifname_valid("x:y"));
50 assert_se( ifname_valid_full("xxxxxxxxxxxxxxx", 0));
51 assert_se(!ifname_valid_full("xxxxxxxxxxxxxxxx", 0));
52 assert_se( ifname_valid_full("xxxxxxxxxxxxxxxx", IFNAME_VALID_ALTERNATIVE
));
53 assert_se( ifname_valid_full("xxxxxxxxxxxxxxxx", IFNAME_VALID_ALTERNATIVE
));
54 assert_se(!ifname_valid_full("999", IFNAME_VALID_ALTERNATIVE
));
55 assert_se( ifname_valid_full("999", IFNAME_VALID_ALTERNATIVE
| IFNAME_VALID_NUMERIC
));
56 assert_se(!ifname_valid_full("0", IFNAME_VALID_ALTERNATIVE
| IFNAME_VALID_NUMERIC
));
59 static void test_socket_print_unix_one(const char *in
, size_t len_in
, const char *expected
) {
60 _cleanup_free_
char *out
= NULL
, *c
= NULL
;
62 assert_se(len_in
<= SUN_PATH_LEN
);
63 SocketAddress a
= { .sockaddr
= { .un
= { .sun_family
= AF_UNIX
} },
64 .size
= offsetof(struct sockaddr_un
, sun_path
) + len_in
,
67 memcpy(a
.sockaddr
.un
.sun_path
, in
, len_in
);
69 assert_se(socket_address_print(&a
, &out
) >= 0);
70 assert_se(c
= cescape(in
));
71 log_info("\"%s\" → \"%s\" (expect \"%s\")", in
, out
, expected
);
72 assert_se(streq(out
, expected
));
75 TEST(socket_print_unix
) {
76 /* Some additional tests for abstract addresses which we don't parse */
78 test_socket_print_unix_one("\0\0\0\0", 4, "@\\000\\000\\000");
79 test_socket_print_unix_one("@abs", 5, "@abs");
80 test_socket_print_unix_one("\n", 2, "\\n");
81 test_socket_print_unix_one("", 1, "<unnamed>");
82 test_socket_print_unix_one("\0", 1, "<unnamed>");
83 test_socket_print_unix_one("\0_________________________there's 108 characters in this string_____________________________________________", 108,
84 "@_________________________there\\'s 108 characters in this string_____________________________________________");
85 test_socket_print_unix_one("////////////////////////////////////////////////////////////////////////////////////////////////////////////", 108,
86 "////////////////////////////////////////////////////////////////////////////////////////////////////////////");
87 test_socket_print_unix_one("\0\a\b\n\255", 6, "@\\a\\b\\n\\255\\000");
90 TEST(sockaddr_equal
) {
91 union sockaddr_union a
= {
92 .in
.sin_family
= AF_INET
,
94 .in
.sin_addr
.s_addr
= htobe32(INADDR_ANY
),
96 union sockaddr_union b
= {
97 .in
.sin_family
= AF_INET
,
99 .in
.sin_addr
.s_addr
= htobe32(INADDR_ANY
),
101 union sockaddr_union c
= {
102 .in
.sin_family
= AF_INET
,
104 .in
.sin_addr
.s_addr
= htobe32(1234),
106 union sockaddr_union d
= {
107 .in6
.sin6_family
= AF_INET6
,
109 .in6
.sin6_addr
= IN6ADDR_ANY_INIT
,
111 union sockaddr_union e
= {
112 .vm
.svm_family
= AF_VSOCK
,
114 .vm
.svm_cid
= VMADDR_CID_ANY
,
117 assert_se(sockaddr_equal(&a
, &a
));
118 assert_se(sockaddr_equal(&a
, &b
));
119 assert_se(sockaddr_equal(&d
, &d
));
120 assert_se(sockaddr_equal(&e
, &e
));
121 assert_se(!sockaddr_equal(&a
, &c
));
122 assert_se(!sockaddr_equal(&b
, &c
));
123 assert_se(!sockaddr_equal(&a
, &e
));
126 TEST(sockaddr_un_len
) {
127 static const struct sockaddr_un fs
= {
128 .sun_family
= AF_UNIX
,
129 .sun_path
= "/foo/bar/waldo",
132 static const struct sockaddr_un abstract
= {
133 .sun_family
= AF_UNIX
,
134 .sun_path
= "\0foobar",
137 assert_se(SOCKADDR_UN_LEN(fs
) == offsetof(struct sockaddr_un
, sun_path
) + strlen(fs
.sun_path
) + 1);
138 assert_se(SOCKADDR_UN_LEN(abstract
) == offsetof(struct sockaddr_un
, sun_path
) + 1 + strlen(abstract
.sun_path
+ 1));
141 TEST(in_addr_is_multicast
) {
142 union in_addr_union a
, b
;
145 assert_se(in_addr_from_string_auto("192.168.3.11", &f
, &a
) >= 0);
146 assert_se(in_addr_is_multicast(f
, &a
) == 0);
148 assert_se(in_addr_from_string_auto("224.0.0.1", &f
, &a
) >= 0);
149 assert_se(in_addr_is_multicast(f
, &a
) == 1);
151 assert_se(in_addr_from_string_auto("FF01:0:0:0:0:0:0:1", &f
, &b
) >= 0);
152 assert_se(in_addr_is_multicast(f
, &b
) == 1);
154 assert_se(in_addr_from_string_auto("2001:db8::c:69b:aeff:fe53:743e", &f
, &b
) >= 0);
155 assert_se(in_addr_is_multicast(f
, &b
) == 0);
158 TEST(getpeercred_getpeergroups
) {
161 r
= safe_fork("(getpeercred)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
165 static const gid_t gids
[] = { 3, 4, 5, 6, 7 };
173 if (geteuid() == 0) {
176 test_gids
= (gid_t
*) gids
;
177 n_test_gids
= ELEMENTSOF(gids
);
179 assert_se(setgroups(n_test_gids
, test_gids
) >= 0);
180 assert_se(setresgid(test_gid
, test_gid
, test_gid
) >= 0);
181 assert_se(setresuid(test_uid
, test_uid
, test_uid
) >= 0);
189 ngroups_max
= sysconf(_SC_NGROUPS_MAX
);
190 assert_se(ngroups_max
> 0);
192 test_gids
= newa(gid_t
, ngroups_max
);
194 r
= getgroups(ngroups_max
, test_gids
);
196 n_test_gids
= (size_t) r
;
199 assert_se(socketpair(AF_UNIX
, SOCK_STREAM
, 0, pair
) >= 0);
201 assert_se(getpeercred(pair
[0], &ucred
) >= 0);
203 assert_se(ucred
.uid
== test_uid
);
204 assert_se(ucred
.gid
== test_gid
);
205 assert_se(ucred
.pid
== getpid_cached());
208 _cleanup_free_ gid_t
*peer_groups
= NULL
;
210 r
= getpeergroups(pair
[0], &peer_groups
);
211 assert_se(r
>= 0 || IN_SET(r
, -EOPNOTSUPP
, -ENOPROTOOPT
));
214 assert_se((size_t) r
== n_test_gids
);
215 assert_se(memcmp(peer_groups
, test_gids
, sizeof(gid_t
) * n_test_gids
) == 0);
219 safe_close_pair(pair
);
225 static const char file_contents
[] = "test contents for passfd";
226 _cleanup_close_pair_
int pair
[2];
229 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
231 r
= safe_fork("(passfd_read)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
236 pair
[0] = safe_close(pair
[0]);
238 char tmpfile
[] = "/tmp/test-socket-util-passfd-read-XXXXXX";
239 assert_se(write_tmpfile(tmpfile
, file_contents
) == 0);
241 _cleanup_close_
int tmpfd
= open(tmpfile
, O_RDONLY
);
242 assert_se(tmpfd
>= 0);
243 assert_se(unlink(tmpfile
) == 0);
245 assert_se(send_one_fd(pair
[1], tmpfd
, MSG_DONTWAIT
) == 0);
251 struct iovec iov
= IOVEC_MAKE(buf
, sizeof(buf
)-1);
252 _cleanup_close_
int fd
;
254 pair
[1] = safe_close(pair
[1]);
256 assert_se(receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
) == 0);
259 r
= read(fd
, buf
, sizeof(buf
)-1);
262 assert_se(streq(buf
, file_contents
));
265 TEST(passfd_contents_read
) {
266 _cleanup_close_pair_
int pair
[2];
267 static const char file_contents
[] = "test contents in the file";
268 static const char wire_contents
[] = "test contents on the wire";
271 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
273 r
= safe_fork("(passfd_contents_read)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
278 struct iovec iov
= IOVEC_MAKE_STRING(wire_contents
);
279 char tmpfile
[] = "/tmp/test-socket-util-passfd-contents-read-XXXXXX";
281 pair
[0] = safe_close(pair
[0]);
283 assert_se(write_tmpfile(tmpfile
, file_contents
) == 0);
285 _cleanup_close_
int tmpfd
= open(tmpfile
, O_RDONLY
);
286 assert_se(tmpfd
>= 0);
287 assert_se(unlink(tmpfile
) == 0);
289 assert_se(send_one_fd_iov(pair
[1], tmpfd
, &iov
, 1, MSG_DONTWAIT
) > 0);
295 struct iovec iov
= IOVEC_MAKE(buf
, sizeof(buf
)-1);
296 _cleanup_close_
int fd
;
299 pair
[1] = safe_close(pair
[1]);
301 k
= receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
);
304 assert_se(streq(buf
, wire_contents
));
307 r
= read(fd
, buf
, sizeof(buf
)-1);
310 assert_se(streq(buf
, file_contents
));
313 TEST(pass_many_fds_contents_read
) {
314 _cleanup_close_pair_
int pair
[2];
315 static const char file_contents
[][STRLEN("test contents in the fileX") + 1] = {
316 "test contents in the file0",
317 "test contents in the file1",
318 "test contents in the file2"
320 static const char wire_contents
[] = "test contents on the wire";
323 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
325 r
= safe_fork("(passfd_contents_read)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
330 struct iovec iov
= IOVEC_MAKE_STRING(wire_contents
);
331 char tmpfile
[][STRLEN("/tmp/test-socket-util-passfd-contents-read-XXXXXX") + 1] = {
332 "/tmp/test-socket-util-passfd-contents-read-XXXXXX",
333 "/tmp/test-socket-util-passfd-contents-read-XXXXXX",
334 "/tmp/test-socket-util-passfd-contents-read-XXXXXX"
336 int tmpfds
[3] = EBADF_TRIPLET
;
338 pair
[0] = safe_close(pair
[0]);
340 for (size_t i
= 0; i
< 3; ++i
) {
341 assert_se(write_tmpfile(tmpfile
[i
], file_contents
[i
]) == 0);
342 tmpfds
[i
] = open(tmpfile
[i
], O_RDONLY
);
343 assert_se(tmpfds
[i
] >= 0);
344 assert_se(unlink(tmpfile
[i
]) == 0);
347 assert_se(send_many_fds_iov(pair
[1], tmpfds
, 3, &iov
, 1, MSG_DONTWAIT
) > 0);
348 close_many(tmpfds
, 3);
354 struct iovec iov
= IOVEC_MAKE(buf
, sizeof(buf
)-1);
355 _cleanup_free_
int *fds
= NULL
;
359 pair
[1] = safe_close(pair
[1]);
361 k
= receive_many_fds_iov(pair
[0], &iov
, 1, &fds
, &n_fds
, MSG_DONTWAIT
);
364 assert_se(streq(buf
, wire_contents
));
366 assert_se(n_fds
== 3);
368 for (size_t i
= 0; i
< 3; ++i
) {
369 assert_se(fds
[i
] >= 0);
370 r
= read(fds
[i
], buf
, sizeof(buf
)-1);
373 assert_se(streq(buf
, file_contents
[i
]));
378 TEST(receive_nopassfd
) {
379 _cleanup_close_pair_
int pair
[2];
380 static const char wire_contents
[] = "no fd passed here";
383 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
385 r
= safe_fork("(receive_nopassfd)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
390 struct iovec iov
= IOVEC_MAKE_STRING(wire_contents
);
392 pair
[0] = safe_close(pair
[0]);
394 assert_se(send_one_fd_iov(pair
[1], -1, &iov
, 1, MSG_DONTWAIT
) > 0);
400 struct iovec iov
= IOVEC_MAKE(buf
, sizeof(buf
)-1);
404 pair
[1] = safe_close(pair
[1]);
406 k
= receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
);
409 assert_se(streq(buf
, wire_contents
));
411 /* no fd passed here, confirm it was reset */
412 assert_se(fd
== -EBADF
);
415 TEST(send_nodata_nofd
) {
416 _cleanup_close_pair_
int pair
[2];
419 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
421 r
= safe_fork("(send_nodata_nofd)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
426 pair
[0] = safe_close(pair
[0]);
428 assert_se(send_one_fd_iov(pair
[1], -1, NULL
, 0, MSG_DONTWAIT
) == -EINVAL
);
434 struct iovec iov
= IOVEC_MAKE(buf
, sizeof(buf
)-1);
438 pair
[1] = safe_close(pair
[1]);
440 k
= receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
);
441 /* recvmsg() will return errno EAGAIN if nothing was sent */
442 assert_se(k
== -EAGAIN
);
444 /* receive_one_fd_iov returned error, so confirm &fd wasn't touched */
445 assert_se(fd
== -999);
448 TEST(send_emptydata
) {
449 _cleanup_close_pair_
int pair
[2];
452 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
454 r
= safe_fork("(send_emptydata)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
459 struct iovec iov
= IOVEC_MAKE_STRING(""); /* zero-length iov */
460 assert_se(iov
.iov_len
== 0);
462 pair
[0] = safe_close(pair
[0]);
464 /* This will succeed, since iov is set. */
465 assert_se(send_one_fd_iov(pair
[1], -1, &iov
, 1, MSG_DONTWAIT
) == 0);
471 struct iovec iov
= IOVEC_MAKE(buf
, sizeof(buf
)-1);
475 pair
[1] = safe_close(pair
[1]);
477 k
= receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
);
478 /* receive_one_fd_iov() returns -EIO if an fd is not found and no data was returned. */
479 assert_se(k
== -EIO
);
481 /* receive_one_fd_iov returned error, so confirm &fd wasn't touched */
482 assert_se(fd
== -999);
486 _cleanup_close_
int listen_stream
, listen_dgram
, listen_seqpacket
, connect_stream
, connect_dgram
, connect_seqpacket
;
487 static const union sockaddr_union sa
= { .un
.sun_family
= AF_UNIX
};
488 union sockaddr_union lsa
;
491 listen_stream
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
492 assert_se(listen_stream
>= 0);
494 listen_dgram
= socket(AF_UNIX
, SOCK_DGRAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
495 assert_se(listen_dgram
>= 0);
497 listen_seqpacket
= socket(AF_UNIX
, SOCK_SEQPACKET
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
498 assert_se(listen_seqpacket
>= 0);
500 assert_se(flush_accept(listen_stream
) < 0);
501 assert_se(flush_accept(listen_dgram
) < 0);
502 assert_se(flush_accept(listen_seqpacket
) < 0);
504 assert_se(bind(listen_stream
, &sa
.sa
, sizeof(sa_family_t
)) >= 0);
505 assert_se(bind(listen_dgram
, &sa
.sa
, sizeof(sa_family_t
)) >= 0);
506 assert_se(bind(listen_seqpacket
, &sa
.sa
, sizeof(sa_family_t
)) >= 0);
508 assert_se(flush_accept(listen_stream
) < 0);
509 assert_se(flush_accept(listen_dgram
) < 0);
510 assert_se(flush_accept(listen_seqpacket
) < 0);
512 assert_se(listen(listen_stream
, SOMAXCONN_DELUXE
) >= 0);
513 assert_se(listen(listen_dgram
, SOMAXCONN_DELUXE
) < 0);
514 assert_se(listen(listen_seqpacket
, SOMAXCONN_DELUXE
) >= 0);
516 assert_se(flush_accept(listen_stream
) >= 0);
517 assert_se(flush_accept(listen_dgram
) < 0);
518 assert_se(flush_accept(listen_seqpacket
) >= 0);
520 connect_stream
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
521 assert_se(connect_stream
>= 0);
523 connect_dgram
= socket(AF_UNIX
, SOCK_DGRAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
524 assert_se(connect_dgram
>= 0);
526 connect_seqpacket
= socket(AF_UNIX
, SOCK_SEQPACKET
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
527 assert_se(connect_seqpacket
>= 0);
530 assert_se(getsockname(listen_stream
, &lsa
.sa
, &l
) >= 0);
531 assert_se(connect(connect_stream
, &lsa
.sa
, l
) >= 0);
534 assert_se(getsockname(listen_dgram
, &lsa
.sa
, &l
) >= 0);
535 assert_se(connect(connect_dgram
, &lsa
.sa
, l
) >= 0);
538 assert_se(getsockname(listen_seqpacket
, &lsa
.sa
, &l
) >= 0);
539 assert_se(connect(connect_seqpacket
, &lsa
.sa
, l
) >= 0);
541 assert_se(flush_accept(listen_stream
) >= 0);
542 assert_se(flush_accept(listen_dgram
) < 0);
543 assert_se(flush_accept(listen_seqpacket
) >= 0);
547 log_info("IPv6 supported: %s", yes_no(socket_ipv6_is_supported()));
548 log_info("IPv6 enabled: %s", yes_no(socket_ipv6_is_enabled()));
551 TEST(sockaddr_un_set_path
) {
552 _cleanup_(rm_rf_physical_and_freep
) char *t
= NULL
;
553 _cleanup_(unlink_and_freep
) char *sh
= NULL
;
554 _cleanup_free_
char *j
= NULL
;
555 union sockaddr_union sa
;
556 _cleanup_close_
int fd1
, fd2
, fd3
;
558 assert_se(mkdtemp_malloc("/tmp/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaXXXXXX", &t
) >= 0);
559 assert_se(strlen(t
) > SUN_PATH_LEN
);
561 assert_se(j
= path_join(t
, "sock"));
562 assert_se(sockaddr_un_set_path(&sa
.un
, j
) == -ENAMETOOLONG
); /* too long for AF_UNIX socket */
564 assert_se(asprintf(&sh
, "/tmp/%" PRIx64
, random_u64()) >= 0);
565 assert_se(symlink(t
, sh
) >= 0); /* create temporary symlink, to access it anyway */
568 assert_se(j
= path_join(sh
, "sock"));
569 assert_se(sockaddr_un_set_path(&sa
.un
, j
) >= 0);
571 fd1
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
, 0);
573 assert_se(bind(fd1
, &sa
.sa
, SOCKADDR_LEN(sa
)) >= 0);
574 assert_se(listen(fd1
, 1) >= 0);
576 sh
= unlink_and_free(sh
); /* remove temporary symlink */
578 fd2
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
, 0);
580 assert_se(connect(fd2
, &sa
.sa
, SOCKADDR_LEN(sa
)) < 0);
581 assert_se(errno
== ENOENT
); /* we removed the symlink, must fail */
584 assert_se(j
= path_join(t
, "sock"));
586 fd3
= open(j
, O_CLOEXEC
|O_PATH
|O_NOFOLLOW
);
588 assert_se(sockaddr_un_set_path(&sa
.un
, FORMAT_PROC_FD_PATH(fd3
)) >= 0); /* connect via O_PATH instead, circumventing 108ch limit */
590 assert_se(connect(fd2
, &sa
.sa
, SOCKADDR_LEN(sa
)) >= 0);
593 DEFINE_TEST_MAIN(LOG_DEBUG
);