]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/test/test-socket-util.c
tree-wide: drop license boilerplate
[thirdparty/systemd.git] / src / test / test-socket-util.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2 /***
3 This file is part of systemd
4
5 Copyright 2014 Ronny Chevalier
6 ***/
7
8 #include <sys/types.h>
9 #include <unistd.h>
10 #include <grp.h>
11
12 #include "alloc-util.h"
13 #include "async.h"
14 #include "fd-util.h"
15 #include "in-addr-util.h"
16 #include "log.h"
17 #include "macro.h"
18 #include "process-util.h"
19 #include "socket-util.h"
20 #include "string-util.h"
21 #include "util.h"
22
23 static void test_ifname_valid(void) {
24 assert(ifname_valid("foo"));
25 assert(ifname_valid("eth0"));
26
27 assert(!ifname_valid("0"));
28 assert(!ifname_valid("99"));
29 assert(ifname_valid("a99"));
30 assert(ifname_valid("99a"));
31
32 assert(!ifname_valid(NULL));
33 assert(!ifname_valid(""));
34 assert(!ifname_valid(" "));
35 assert(!ifname_valid(" foo"));
36 assert(!ifname_valid("bar\n"));
37 assert(!ifname_valid("."));
38 assert(!ifname_valid(".."));
39 assert(ifname_valid("foo.bar"));
40 assert(!ifname_valid("x:y"));
41
42 assert(ifname_valid("xxxxxxxxxxxxxxx"));
43 assert(!ifname_valid("xxxxxxxxxxxxxxxx"));
44 }
45
46 static void test_socket_address_parse(void) {
47 SocketAddress a;
48
49 assert_se(socket_address_parse(&a, "junk") < 0);
50 assert_se(socket_address_parse(&a, "192.168.1.1") < 0);
51 assert_se(socket_address_parse(&a, ".168.1.1") < 0);
52 assert_se(socket_address_parse(&a, "989.168.1.1") < 0);
53 assert_se(socket_address_parse(&a, "192.168.1.1:65536") < 0);
54 assert_se(socket_address_parse(&a, "192.168.1.1:0") < 0);
55 assert_se(socket_address_parse(&a, "0") < 0);
56 assert_se(socket_address_parse(&a, "65536") < 0);
57
58 assert_se(socket_address_parse(&a, "65535") >= 0);
59
60 /* The checks below will pass even if ipv6 is disabled in
61 * kernel. The underlying glibc's inet_pton() is just a string
62 * parser and doesn't make any syscalls. */
63
64 assert_se(socket_address_parse(&a, "[::1]") < 0);
65 assert_se(socket_address_parse(&a, "[::1]8888") < 0);
66 assert_se(socket_address_parse(&a, "::1") < 0);
67 assert_se(socket_address_parse(&a, "[::1]:0") < 0);
68 assert_se(socket_address_parse(&a, "[::1]:65536") < 0);
69 assert_se(socket_address_parse(&a, "[a:b:1]:8888") < 0);
70
71 assert_se(socket_address_parse(&a, "8888") >= 0);
72 assert_se(a.sockaddr.sa.sa_family == (socket_ipv6_is_supported() ? AF_INET6 : AF_INET));
73
74 assert_se(socket_address_parse(&a, "[2001:0db8:0000:85a3:0000:0000:ac1f:8001]:8888") >= 0);
75 assert_se(a.sockaddr.sa.sa_family == AF_INET6);
76
77 assert_se(socket_address_parse(&a, "[::1]:8888") >= 0);
78 assert_se(a.sockaddr.sa.sa_family == AF_INET6);
79
80 assert_se(socket_address_parse(&a, "192.168.1.254:8888") >= 0);
81 assert_se(a.sockaddr.sa.sa_family == AF_INET);
82
83 assert_se(socket_address_parse(&a, "/foo/bar") >= 0);
84 assert_se(a.sockaddr.sa.sa_family == AF_UNIX);
85
86 assert_se(socket_address_parse(&a, "@abstract") >= 0);
87 assert_se(a.sockaddr.sa.sa_family == AF_UNIX);
88
89 assert_se(socket_address_parse(&a, "vsock::1234") >= 0);
90 assert_se(a.sockaddr.sa.sa_family == AF_VSOCK);
91 assert_se(socket_address_parse(&a, "vsock:2:1234") >= 0);
92 assert_se(a.sockaddr.sa.sa_family == AF_VSOCK);
93 assert_se(socket_address_parse(&a, "vsock:2:1234x") < 0);
94 assert_se(socket_address_parse(&a, "vsock:2x:1234") < 0);
95 assert_se(socket_address_parse(&a, "vsock:2") < 0);
96 }
97
98 static void test_socket_address_parse_netlink(void) {
99 SocketAddress a;
100
101 assert_se(socket_address_parse_netlink(&a, "junk") < 0);
102 assert_se(socket_address_parse_netlink(&a, "") < 0);
103
104 assert_se(socket_address_parse_netlink(&a, "route") >= 0);
105 assert_se(socket_address_parse_netlink(&a, "route 10") >= 0);
106 assert_se(a.sockaddr.sa.sa_family == AF_NETLINK);
107 assert_se(a.protocol == NETLINK_ROUTE);
108
109 /* With spaces and tabs */
110 assert_se(socket_address_parse_netlink(&a, " kobject-uevent ") >= 0);
111 assert_se(socket_address_parse_netlink(&a, " \t kobject-uevent \t 10 \t") >= 0);
112 assert_se(a.sockaddr.sa.sa_family == AF_NETLINK);
113 assert_se(a.protocol == NETLINK_KOBJECT_UEVENT);
114
115 assert_se(socket_address_parse_netlink(&a, "kobject-uevent\t10") >= 0);
116 assert_se(a.sockaddr.sa.sa_family == AF_NETLINK);
117 assert_se(a.protocol == NETLINK_KOBJECT_UEVENT);
118
119 /* oss-fuzz #6884 */
120 assert_se(socket_address_parse_netlink(&a, "\xff") < 0);
121 }
122
123 static void test_socket_address_equal(void) {
124 SocketAddress a;
125 SocketAddress b;
126
127 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
128 assert_se(socket_address_parse(&b, "192.168.1.1:888") >= 0);
129 assert_se(!socket_address_equal(&a, &b));
130
131 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
132 assert_se(socket_address_parse(&b, "192.16.1.1:8888") >= 0);
133 assert_se(!socket_address_equal(&a, &b));
134
135 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
136 assert_se(socket_address_parse(&b, "8888") >= 0);
137 assert_se(!socket_address_equal(&a, &b));
138
139 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
140 assert_se(socket_address_parse(&b, "/foo/bar/") >= 0);
141 assert_se(!socket_address_equal(&a, &b));
142
143 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
144 assert_se(socket_address_parse(&b, "192.168.1.1:8888") >= 0);
145 assert_se(socket_address_equal(&a, &b));
146
147 assert_se(socket_address_parse(&a, "/foo/bar") >= 0);
148 assert_se(socket_address_parse(&b, "/foo/bar") >= 0);
149 assert_se(socket_address_equal(&a, &b));
150
151 assert_se(socket_address_parse(&a, "[::1]:8888") >= 0);
152 assert_se(socket_address_parse(&b, "[::1]:8888") >= 0);
153 assert_se(socket_address_equal(&a, &b));
154
155 assert_se(socket_address_parse(&a, "@abstract") >= 0);
156 assert_se(socket_address_parse(&b, "@abstract") >= 0);
157 assert_se(socket_address_equal(&a, &b));
158
159 assert_se(socket_address_parse_netlink(&a, "firewall") >= 0);
160 assert_se(socket_address_parse_netlink(&b, "firewall") >= 0);
161 assert_se(socket_address_equal(&a, &b));
162
163 assert_se(socket_address_parse(&a, "vsock:2:1234") >= 0);
164 assert_se(socket_address_parse(&b, "vsock:2:1234") >= 0);
165 assert_se(socket_address_equal(&a, &b));
166 assert_se(socket_address_parse(&b, "vsock:2:1235") >= 0);
167 assert_se(!socket_address_equal(&a, &b));
168 assert_se(socket_address_parse(&b, "vsock:3:1234") >= 0);
169 assert_se(!socket_address_equal(&a, &b));
170 }
171
172 static void test_socket_address_get_path(void) {
173 SocketAddress a;
174
175 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
176 assert_se(!socket_address_get_path(&a));
177
178 assert_se(socket_address_parse(&a, "@abstract") >= 0);
179 assert_se(!socket_address_get_path(&a));
180
181 assert_se(socket_address_parse(&a, "[::1]:8888") >= 0);
182 assert_se(!socket_address_get_path(&a));
183
184 assert_se(socket_address_parse(&a, "/foo/bar") >= 0);
185 assert_se(streq(socket_address_get_path(&a), "/foo/bar"));
186
187 assert_se(socket_address_parse(&a, "vsock:2:1234") >= 0);
188 assert_se(!socket_address_get_path(&a));
189 }
190
191 static void test_socket_address_is(void) {
192 SocketAddress a;
193
194 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
195 assert_se(socket_address_is(&a, "192.168.1.1:8888", SOCK_STREAM));
196 assert_se(!socket_address_is(&a, "route", SOCK_STREAM));
197 assert_se(!socket_address_is(&a, "192.168.1.1:8888", SOCK_RAW));
198 }
199
200 static void test_socket_address_is_netlink(void) {
201 SocketAddress a;
202
203 assert_se(socket_address_parse_netlink(&a, "route 10") >= 0);
204 assert_se(socket_address_is_netlink(&a, "route 10"));
205 assert_se(!socket_address_is_netlink(&a, "192.168.1.1:8888"));
206 assert_se(!socket_address_is_netlink(&a, "route 1"));
207 }
208
209 static void test_in_addr_is_null(void) {
210
211 union in_addr_union i = {};
212
213 assert_se(in_addr_is_null(AF_INET, &i) == true);
214 assert_se(in_addr_is_null(AF_INET6, &i) == true);
215
216 i.in.s_addr = 0x1000000;
217 assert_se(in_addr_is_null(AF_INET, &i) == false);
218 assert_se(in_addr_is_null(AF_INET6, &i) == false);
219
220 assert_se(in_addr_is_null(-1, &i) == -EAFNOSUPPORT);
221 }
222
223 static void test_in_addr_prefix_intersect_one(unsigned f, const char *a, unsigned apl, const char *b, unsigned bpl, int result) {
224 union in_addr_union ua, ub;
225
226 assert_se(in_addr_from_string(f, a, &ua) >= 0);
227 assert_se(in_addr_from_string(f, b, &ub) >= 0);
228
229 assert_se(in_addr_prefix_intersect(f, &ua, apl, &ub, bpl) == result);
230 }
231
232 static void test_in_addr_prefix_intersect(void) {
233
234 test_in_addr_prefix_intersect_one(AF_INET, "255.255.255.255", 32, "255.255.255.254", 32, 0);
235 test_in_addr_prefix_intersect_one(AF_INET, "255.255.255.255", 0, "255.255.255.255", 32, 1);
236 test_in_addr_prefix_intersect_one(AF_INET, "0.0.0.0", 0, "47.11.8.15", 32, 1);
237
238 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 24, "1.1.1.1", 24, 1);
239 test_in_addr_prefix_intersect_one(AF_INET, "2.2.2.2", 24, "1.1.1.1", 24, 0);
240
241 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 24, "1.1.1.127", 25, 1);
242 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 24, "1.1.1.127", 26, 1);
243 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 25, "1.1.1.127", 25, 1);
244 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 25, "1.1.1.255", 25, 0);
245
246 test_in_addr_prefix_intersect_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 128, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:fffe", 128, 0);
247 test_in_addr_prefix_intersect_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 0, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 128, 1);
248 test_in_addr_prefix_intersect_one(AF_INET6, "::", 0, "beef:beef:beef:beef:beef:beef:beef:beef", 128, 1);
249
250 test_in_addr_prefix_intersect_one(AF_INET6, "1::2", 64, "1::2", 64, 1);
251 test_in_addr_prefix_intersect_one(AF_INET6, "2::2", 64, "1::2", 64, 0);
252
253 test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 120, "1::007f", 121, 1);
254 test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 120, "1::007f", 122, 1);
255 test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 121, "1::007f", 121, 1);
256 test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 121, "1::00ff", 121, 0);
257 }
258
259 static void test_in_addr_prefix_next_one(unsigned f, const char *before, unsigned pl, const char *after) {
260 union in_addr_union ubefore, uafter, t;
261
262 assert_se(in_addr_from_string(f, before, &ubefore) >= 0);
263
264 t = ubefore;
265 assert_se((in_addr_prefix_next(f, &t, pl) > 0) == !!after);
266
267 if (after) {
268 assert_se(in_addr_from_string(f, after, &uafter) >= 0);
269 assert_se(in_addr_equal(f, &t, &uafter) > 0);
270 }
271 }
272
273 static void test_in_addr_prefix_next(void) {
274
275 test_in_addr_prefix_next_one(AF_INET, "192.168.0.0", 24, "192.168.1.0");
276 test_in_addr_prefix_next_one(AF_INET, "192.168.0.0", 16, "192.169.0.0");
277 test_in_addr_prefix_next_one(AF_INET, "192.168.0.0", 20, "192.168.16.0");
278
279 test_in_addr_prefix_next_one(AF_INET, "0.0.0.0", 32, "0.0.0.1");
280 test_in_addr_prefix_next_one(AF_INET, "255.255.255.255", 32, NULL);
281 test_in_addr_prefix_next_one(AF_INET, "255.255.255.0", 24, NULL);
282
283 test_in_addr_prefix_next_one(AF_INET6, "4400::", 128, "4400::0001");
284 test_in_addr_prefix_next_one(AF_INET6, "4400::", 120, "4400::0100");
285 test_in_addr_prefix_next_one(AF_INET6, "4400::", 127, "4400::0002");
286 test_in_addr_prefix_next_one(AF_INET6, "4400::", 8, "4500::");
287 test_in_addr_prefix_next_one(AF_INET6, "4400::", 7, "4600::");
288
289 test_in_addr_prefix_next_one(AF_INET6, "::", 128, "::1");
290
291 test_in_addr_prefix_next_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 128, NULL);
292 test_in_addr_prefix_next_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ff00", 120, NULL);
293
294 }
295
296 static void test_in_addr_to_string_one(int f, const char *addr) {
297 union in_addr_union ua;
298 _cleanup_free_ char *r = NULL;
299
300 assert_se(in_addr_from_string(f, addr, &ua) >= 0);
301 assert_se(in_addr_to_string(f, &ua, &r) >= 0);
302 printf("test_in_addr_to_string_one: %s == %s\n", addr, r);
303 assert_se(streq(addr, r));
304 }
305
306 static void test_in_addr_to_string(void) {
307 test_in_addr_to_string_one(AF_INET, "192.168.0.1");
308 test_in_addr_to_string_one(AF_INET, "10.11.12.13");
309 test_in_addr_to_string_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff");
310 test_in_addr_to_string_one(AF_INET6, "::1");
311 test_in_addr_to_string_one(AF_INET6, "fe80::");
312 }
313
314 static void test_in_addr_ifindex_to_string_one(int f, const char *a, int ifindex, const char *b) {
315 _cleanup_free_ char *r = NULL;
316 union in_addr_union ua, uuaa;
317 int ff, ifindex2;
318
319 assert_se(in_addr_from_string(f, a, &ua) >= 0);
320 assert_se(in_addr_ifindex_to_string(f, &ua, ifindex, &r) >= 0);
321 printf("test_in_addr_ifindex_to_string_one: %s == %s\n", b, r);
322 assert_se(streq(b, r));
323
324 assert_se(in_addr_ifindex_from_string_auto(b, &ff, &uuaa, &ifindex2) >= 0);
325 assert_se(ff == f);
326 assert_se(in_addr_equal(f, &ua, &uuaa));
327 assert_se(ifindex2 == ifindex || ifindex2 == 0);
328 }
329
330 static void test_in_addr_ifindex_to_string(void) {
331 test_in_addr_ifindex_to_string_one(AF_INET, "192.168.0.1", 7, "192.168.0.1");
332 test_in_addr_ifindex_to_string_one(AF_INET, "10.11.12.13", 9, "10.11.12.13");
333 test_in_addr_ifindex_to_string_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 10, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff");
334 test_in_addr_ifindex_to_string_one(AF_INET6, "::1", 11, "::1");
335 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::", 12, "fe80::%12");
336 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::", 0, "fe80::");
337 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::14", 12, "fe80::14%12");
338 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::15", -7, "fe80::15");
339 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::16", LOOPBACK_IFINDEX, "fe80::16%1");
340 }
341
342 static void test_in_addr_ifindex_from_string_auto(void) {
343 int family, ifindex;
344 union in_addr_union ua;
345
346 /* Most in_addr_ifindex_from_string_auto() invocations have already been tested above, but let's test some more */
347
348 assert_se(in_addr_ifindex_from_string_auto("fe80::17", &family, &ua, &ifindex) >= 0);
349 assert_se(family == AF_INET6);
350 assert_se(ifindex == 0);
351
352 assert_se(in_addr_ifindex_from_string_auto("fe80::18%19", &family, &ua, &ifindex) >= 0);
353 assert_se(family == AF_INET6);
354 assert_se(ifindex == 19);
355
356 assert_se(in_addr_ifindex_from_string_auto("fe80::18%lo", &family, &ua, &ifindex) >= 0);
357 assert_se(family == AF_INET6);
358 assert_se(ifindex == LOOPBACK_IFINDEX);
359
360 assert_se(in_addr_ifindex_from_string_auto("fe80::19%thisinterfacecantexist", &family, &ua, &ifindex) == -ENODEV);
361 }
362
363 static void test_sockaddr_equal(void) {
364 union sockaddr_union a = {
365 .in.sin_family = AF_INET,
366 .in.sin_port = 0,
367 .in.sin_addr.s_addr = htobe32(INADDR_ANY),
368 };
369 union sockaddr_union b = {
370 .in.sin_family = AF_INET,
371 .in.sin_port = 0,
372 .in.sin_addr.s_addr = htobe32(INADDR_ANY),
373 };
374 union sockaddr_union c = {
375 .in.sin_family = AF_INET,
376 .in.sin_port = 0,
377 .in.sin_addr.s_addr = htobe32(1234),
378 };
379 union sockaddr_union d = {
380 .in6.sin6_family = AF_INET6,
381 .in6.sin6_port = 0,
382 .in6.sin6_addr = IN6ADDR_ANY_INIT,
383 };
384 union sockaddr_union e = {
385 .vm.svm_family = AF_VSOCK,
386 .vm.svm_port = 0,
387 .vm.svm_cid = VMADDR_CID_ANY,
388 };
389 assert_se(sockaddr_equal(&a, &a));
390 assert_se(sockaddr_equal(&a, &b));
391 assert_se(sockaddr_equal(&d, &d));
392 assert_se(sockaddr_equal(&e, &e));
393 assert_se(!sockaddr_equal(&a, &c));
394 assert_se(!sockaddr_equal(&b, &c));
395 assert_se(!sockaddr_equal(&a, &e));
396 }
397
398 static void test_sockaddr_un_len(void) {
399 static const struct sockaddr_un fs = {
400 .sun_family = AF_UNIX,
401 .sun_path = "/foo/bar/waldo",
402 };
403
404 static const struct sockaddr_un abstract = {
405 .sun_family = AF_UNIX,
406 .sun_path = "\0foobar",
407 };
408
409 assert_se(SOCKADDR_UN_LEN(fs) == offsetof(struct sockaddr_un, sun_path) + strlen(fs.sun_path));
410 assert_se(SOCKADDR_UN_LEN(abstract) == offsetof(struct sockaddr_un, sun_path) + 1 + strlen(abstract.sun_path + 1));
411 }
412
413 static void test_in_addr_is_multicast(void) {
414 union in_addr_union a, b;
415 int f;
416
417 assert_se(in_addr_from_string_auto("192.168.3.11", &f, &a) >= 0);
418 assert_se(in_addr_is_multicast(f, &a) == 0);
419
420 assert_se(in_addr_from_string_auto("224.0.0.1", &f, &a) >= 0);
421 assert_se(in_addr_is_multicast(f, &a) == 1);
422
423 assert_se(in_addr_from_string_auto("FF01:0:0:0:0:0:0:1", &f, &b) >= 0);
424 assert_se(in_addr_is_multicast(f, &b) == 1);
425
426 assert_se(in_addr_from_string_auto("2001:db8::c:69b:aeff:fe53:743e", &f, &b) >= 0);
427 assert_se(in_addr_is_multicast(f, &b) == 0);
428 }
429
430 static void test_getpeercred_getpeergroups(void) {
431 int r;
432
433 r = safe_fork("(getpeercred)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
434 assert_se(r >= 0);
435
436 if (r == 0) {
437 static const gid_t gids[] = { 3, 4, 5, 6, 7 };
438 gid_t *test_gids;
439 _cleanup_free_ gid_t *peer_groups = NULL;
440 size_t n_test_gids;
441 uid_t test_uid;
442 gid_t test_gid;
443 struct ucred ucred;
444 int pair[2];
445
446 if (geteuid() == 0) {
447 test_uid = 1;
448 test_gid = 2;
449 test_gids = (gid_t*) gids;
450 n_test_gids = ELEMENTSOF(gids);
451
452 assert_se(setgroups(n_test_gids, test_gids) >= 0);
453 assert_se(setresgid(test_gid, test_gid, test_gid) >= 0);
454 assert_se(setresuid(test_uid, test_uid, test_uid) >= 0);
455
456 } else {
457 long ngroups_max;
458
459 test_uid = getuid();
460 test_gid = getgid();
461
462 ngroups_max = sysconf(_SC_NGROUPS_MAX);
463 assert(ngroups_max > 0);
464
465 test_gids = newa(gid_t, ngroups_max);
466
467 r = getgroups(ngroups_max, test_gids);
468 assert_se(r >= 0);
469 n_test_gids = (size_t) r;
470 }
471
472 assert_se(socketpair(AF_UNIX, SOCK_STREAM, 0, pair) >= 0);
473
474 assert_se(getpeercred(pair[0], &ucred) >= 0);
475
476 assert_se(ucred.uid == test_uid);
477 assert_se(ucred.gid == test_gid);
478 assert_se(ucred.pid == getpid_cached());
479
480 r = getpeergroups(pair[0], &peer_groups);
481 assert_se(r >= 0 || IN_SET(r, -EOPNOTSUPP, -ENOPROTOOPT));
482
483 if (r >= 0) {
484 assert_se((size_t) r == n_test_gids);
485 assert_se(memcmp(peer_groups, test_gids, sizeof(gid_t) * n_test_gids) == 0);
486 }
487
488 safe_close_pair(pair);
489 }
490 }
491
492 int main(int argc, char *argv[]) {
493
494 log_set_max_level(LOG_DEBUG);
495
496 test_ifname_valid();
497
498 test_socket_address_parse();
499 test_socket_address_parse_netlink();
500 test_socket_address_equal();
501 test_socket_address_get_path();
502 test_socket_address_is();
503 test_socket_address_is_netlink();
504
505 test_in_addr_is_null();
506 test_in_addr_prefix_intersect();
507 test_in_addr_prefix_next();
508 test_in_addr_to_string();
509 test_in_addr_ifindex_to_string();
510 test_in_addr_ifindex_from_string_auto();
511
512 test_sockaddr_equal();
513
514 test_sockaddr_un_len();
515
516 test_in_addr_is_multicast();
517
518 test_getpeercred_getpeergroups();
519
520 return 0;
521 }