1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
5 #include <net/if_arp.h>
10 #include "alloc-util.h"
13 #include "exit-status.h"
16 #include "in-addr-util.h"
20 #include "path-util.h"
21 #include "process-util.h"
22 #include "random-util.h"
24 #include "socket-util.h"
25 #include "string-util.h"
27 #include "tmpfile-util.h"
29 assert_cc(SUN_PATH_LEN
== 108);
32 assert_se( ifname_valid("foo"));
33 assert_se( ifname_valid("eth0"));
35 assert_se(!ifname_valid("0"));
36 assert_se(!ifname_valid("99"));
37 assert_se( ifname_valid("a99"));
38 assert_se( ifname_valid("99a"));
40 assert_se(!ifname_valid(NULL
));
41 assert_se(!ifname_valid(""));
42 assert_se(!ifname_valid(" "));
43 assert_se(!ifname_valid(" foo"));
44 assert_se(!ifname_valid("bar\n"));
45 assert_se(!ifname_valid("."));
46 assert_se(!ifname_valid(".."));
47 assert_se(ifname_valid("foo.bar"));
48 assert_se(!ifname_valid("x:y"));
50 assert_se( ifname_valid_full("xxxxxxxxxxxxxxx", 0));
51 assert_se(!ifname_valid_full("xxxxxxxxxxxxxxxx", 0));
52 assert_se( ifname_valid_full("xxxxxxxxxxxxxxxx", IFNAME_VALID_ALTERNATIVE
));
53 assert_se( ifname_valid_full("xxxxxxxxxxxxxxxx", IFNAME_VALID_ALTERNATIVE
));
54 assert_se(!ifname_valid_full("999", IFNAME_VALID_ALTERNATIVE
));
55 assert_se( ifname_valid_full("999", IFNAME_VALID_ALTERNATIVE
| IFNAME_VALID_NUMERIC
));
56 assert_se(!ifname_valid_full("0", IFNAME_VALID_ALTERNATIVE
| IFNAME_VALID_NUMERIC
));
59 static void test_socket_print_unix_one(const char *in
, size_t len_in
, const char *expected
) {
60 _cleanup_free_
char *out
= NULL
, *c
= NULL
;
62 assert_se(len_in
<= SUN_PATH_LEN
);
63 SocketAddress a
= { .sockaddr
= { .un
= { .sun_family
= AF_UNIX
} },
64 .size
= offsetof(struct sockaddr_un
, sun_path
) + len_in
,
67 memcpy(a
.sockaddr
.un
.sun_path
, in
, len_in
);
69 assert_se(socket_address_print(&a
, &out
) >= 0);
70 assert_se(c
= cescape(in
));
71 log_info("\"%s\" → \"%s\" (expect \"%s\")", in
, out
, expected
);
72 assert_se(streq(out
, expected
));
75 TEST(socket_print_unix
) {
76 /* Some additional tests for abstract addresses which we don't parse */
78 test_socket_print_unix_one("\0\0\0\0", 4, "@\\000\\000\\000");
79 test_socket_print_unix_one("@abs", 5, "@abs");
80 test_socket_print_unix_one("\n", 2, "\\n");
81 test_socket_print_unix_one("", 1, "<unnamed>");
82 test_socket_print_unix_one("\0", 1, "<unnamed>");
83 test_socket_print_unix_one("\0_________________________there's 108 characters in this string_____________________________________________", 108,
84 "@_________________________there\\'s 108 characters in this string_____________________________________________");
85 test_socket_print_unix_one("////////////////////////////////////////////////////////////////////////////////////////////////////////////", 108,
86 "////////////////////////////////////////////////////////////////////////////////////////////////////////////");
87 test_socket_print_unix_one("\0\a\b\n\255", 6, "@\\a\\b\\n\\255\\000");
90 TEST(sockaddr_equal
) {
91 union sockaddr_union a
= {
92 .in
.sin_family
= AF_INET
,
94 .in
.sin_addr
.s_addr
= htobe32(INADDR_ANY
),
96 union sockaddr_union b
= {
97 .in
.sin_family
= AF_INET
,
99 .in
.sin_addr
.s_addr
= htobe32(INADDR_ANY
),
101 union sockaddr_union c
= {
102 .in
.sin_family
= AF_INET
,
104 .in
.sin_addr
.s_addr
= htobe32(1234),
106 union sockaddr_union d
= {
107 .in6
.sin6_family
= AF_INET6
,
109 .in6
.sin6_addr
= IN6ADDR_ANY_INIT
,
111 union sockaddr_union e
= {
112 .vm
.svm_family
= AF_VSOCK
,
114 .vm
.svm_cid
= VMADDR_CID_ANY
,
117 assert_se(sockaddr_equal(&a
, &a
));
118 assert_se(sockaddr_equal(&a
, &b
));
119 assert_se(sockaddr_equal(&d
, &d
));
120 assert_se(sockaddr_equal(&e
, &e
));
121 assert_se(!sockaddr_equal(&a
, &c
));
122 assert_se(!sockaddr_equal(&b
, &c
));
123 assert_se(!sockaddr_equal(&a
, &e
));
126 TEST(sockaddr_un_len
) {
127 static const struct sockaddr_un fs
= {
128 .sun_family
= AF_UNIX
,
129 .sun_path
= "/foo/bar/waldo",
132 static const struct sockaddr_un abstract
= {
133 .sun_family
= AF_UNIX
,
134 .sun_path
= "\0foobar",
137 assert_se(SOCKADDR_UN_LEN(fs
) == offsetof(struct sockaddr_un
, sun_path
) + strlen(fs
.sun_path
) + 1);
138 assert_se(SOCKADDR_UN_LEN(abstract
) == offsetof(struct sockaddr_un
, sun_path
) + 1 + strlen(abstract
.sun_path
+ 1));
141 TEST(in_addr_is_multicast
) {
142 union in_addr_union a
, b
;
145 assert_se(in_addr_from_string_auto("192.168.3.11", &f
, &a
) >= 0);
146 assert_se(in_addr_is_multicast(f
, &a
) == 0);
148 assert_se(in_addr_from_string_auto("224.0.0.1", &f
, &a
) >= 0);
149 assert_se(in_addr_is_multicast(f
, &a
) == 1);
151 assert_se(in_addr_from_string_auto("FF01:0:0:0:0:0:0:1", &f
, &b
) >= 0);
152 assert_se(in_addr_is_multicast(f
, &b
) == 1);
154 assert_se(in_addr_from_string_auto("2001:db8::c:69b:aeff:fe53:743e", &f
, &b
) >= 0);
155 assert_se(in_addr_is_multicast(f
, &b
) == 0);
158 TEST(getpeercred_getpeergroups
) {
161 r
= safe_fork("(getpeercred)", FORK_DEATHSIG
|FORK_LOG
|FORK_WAIT
, NULL
);
165 static const gid_t gids
[] = { 3, 4, 5, 6, 7 };
173 if (geteuid() == 0) {
176 test_gids
= (gid_t
*) gids
;
177 n_test_gids
= ELEMENTSOF(gids
);
179 assert_se(setgroups(n_test_gids
, test_gids
) >= 0);
180 assert_se(setresgid(test_gid
, test_gid
, test_gid
) >= 0);
181 assert_se(setresuid(test_uid
, test_uid
, test_uid
) >= 0);
189 ngroups_max
= sysconf(_SC_NGROUPS_MAX
);
190 assert_se(ngroups_max
> 0);
192 test_gids
= newa(gid_t
, ngroups_max
);
194 r
= getgroups(ngroups_max
, test_gids
);
196 n_test_gids
= (size_t) r
;
199 assert_se(socketpair(AF_UNIX
, SOCK_STREAM
, 0, pair
) >= 0);
201 assert_se(getpeercred(pair
[0], &ucred
) >= 0);
203 assert_se(ucred
.uid
== test_uid
);
204 assert_se(ucred
.gid
== test_gid
);
205 assert_se(ucred
.pid
== getpid_cached());
208 _cleanup_free_ gid_t
*peer_groups
= NULL
;
210 r
= getpeergroups(pair
[0], &peer_groups
);
211 assert_se(r
>= 0 || IN_SET(r
, -EOPNOTSUPP
, -ENOPROTOOPT
));
214 assert_se((size_t) r
== n_test_gids
);
215 assert_se(memcmp(peer_groups
, test_gids
, sizeof(gid_t
) * n_test_gids
) == 0);
219 safe_close_pair(pair
);
225 static const char file_contents
[] = "test contents for passfd";
226 _cleanup_close_pair_
int pair
[2];
229 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
231 r
= safe_fork("(passfd_read)", FORK_DEATHSIG
|FORK_LOG
|FORK_WAIT
, NULL
);
236 pair
[0] = safe_close(pair
[0]);
238 char tmpfile
[] = "/tmp/test-socket-util-passfd-read-XXXXXX";
239 assert_se(write_tmpfile(tmpfile
, file_contents
) == 0);
241 _cleanup_close_
int tmpfd
= open(tmpfile
, O_RDONLY
);
242 assert_se(tmpfd
>= 0);
243 assert_se(unlink(tmpfile
) == 0);
245 assert_se(send_one_fd(pair
[1], tmpfd
, MSG_DONTWAIT
) == 0);
251 struct iovec iov
= IOVEC_INIT(buf
, sizeof(buf
)-1);
252 _cleanup_close_
int fd
;
254 pair
[1] = safe_close(pair
[1]);
256 assert_se(receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
) == 0);
259 r
= read(fd
, buf
, sizeof(buf
)-1);
262 assert_se(streq(buf
, file_contents
));
265 TEST(passfd_contents_read
) {
266 _cleanup_close_pair_
int pair
[2];
267 static const char file_contents
[] = "test contents in the file";
268 static const char wire_contents
[] = "test contents on the wire";
271 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
273 r
= safe_fork("(passfd_contents_read)", FORK_DEATHSIG
|FORK_LOG
|FORK_WAIT
, NULL
);
278 struct iovec iov
= IOVEC_INIT_STRING(wire_contents
);
279 char tmpfile
[] = "/tmp/test-socket-util-passfd-contents-read-XXXXXX";
281 pair
[0] = safe_close(pair
[0]);
283 assert_se(write_tmpfile(tmpfile
, file_contents
) == 0);
285 _cleanup_close_
int tmpfd
= open(tmpfile
, O_RDONLY
);
286 assert_se(tmpfd
>= 0);
287 assert_se(unlink(tmpfile
) == 0);
289 assert_se(send_one_fd_iov(pair
[1], tmpfd
, &iov
, 1, MSG_DONTWAIT
) > 0);
295 struct iovec iov
= IOVEC_INIT(buf
, sizeof(buf
)-1);
296 _cleanup_close_
int fd
;
299 pair
[1] = safe_close(pair
[1]);
301 k
= receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
);
304 assert_se(streq(buf
, wire_contents
));
307 r
= read(fd
, buf
, sizeof(buf
)-1);
310 assert_se(streq(buf
, file_contents
));
313 TEST(receive_nopassfd
) {
314 _cleanup_close_pair_
int pair
[2];
315 static const char wire_contents
[] = "no fd passed here";
318 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
320 r
= safe_fork("(receive_nopassfd)", FORK_DEATHSIG
|FORK_LOG
|FORK_WAIT
, NULL
);
325 struct iovec iov
= IOVEC_INIT_STRING(wire_contents
);
327 pair
[0] = safe_close(pair
[0]);
329 assert_se(send_one_fd_iov(pair
[1], -1, &iov
, 1, MSG_DONTWAIT
) > 0);
335 struct iovec iov
= IOVEC_INIT(buf
, sizeof(buf
)-1);
339 pair
[1] = safe_close(pair
[1]);
341 k
= receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
);
344 assert_se(streq(buf
, wire_contents
));
346 /* no fd passed here, confirm it was reset */
347 assert_se(fd
== -EBADF
);
350 TEST(send_nodata_nofd
) {
351 _cleanup_close_pair_
int pair
[2];
354 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
356 r
= safe_fork("(send_nodata_nofd)", FORK_DEATHSIG
|FORK_LOG
|FORK_WAIT
, NULL
);
361 pair
[0] = safe_close(pair
[0]);
363 assert_se(send_one_fd_iov(pair
[1], -1, NULL
, 0, MSG_DONTWAIT
) == -EINVAL
);
369 struct iovec iov
= IOVEC_INIT(buf
, sizeof(buf
)-1);
373 pair
[1] = safe_close(pair
[1]);
375 k
= receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
);
376 /* recvmsg() will return errno EAGAIN if nothing was sent */
377 assert_se(k
== -EAGAIN
);
379 /* receive_one_fd_iov returned error, so confirm &fd wasn't touched */
380 assert_se(fd
== -999);
383 TEST(send_emptydata
) {
384 _cleanup_close_pair_
int pair
[2];
387 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
389 r
= safe_fork("(send_emptydata)", FORK_DEATHSIG
|FORK_LOG
|FORK_WAIT
, NULL
);
394 struct iovec iov
= IOVEC_INIT_STRING(""); /* zero-length iov */
395 assert_se(iov
.iov_len
== 0);
397 pair
[0] = safe_close(pair
[0]);
399 /* This will succeed, since iov is set. */
400 assert_se(send_one_fd_iov(pair
[1], -1, &iov
, 1, MSG_DONTWAIT
) == 0);
406 struct iovec iov
= IOVEC_INIT(buf
, sizeof(buf
)-1);
410 pair
[1] = safe_close(pair
[1]);
412 k
= receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
);
413 /* receive_one_fd_iov() returns -EIO if an fd is not found and no data was returned. */
414 assert_se(k
== -EIO
);
416 /* receive_one_fd_iov returned error, so confirm &fd wasn't touched */
417 assert_se(fd
== -999);
421 _cleanup_close_
int listen_stream
, listen_dgram
, listen_seqpacket
, connect_stream
, connect_dgram
, connect_seqpacket
;
422 static const union sockaddr_union sa
= { .un
.sun_family
= AF_UNIX
};
423 union sockaddr_union lsa
;
426 listen_stream
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
427 assert_se(listen_stream
>= 0);
429 listen_dgram
= socket(AF_UNIX
, SOCK_DGRAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
430 assert_se(listen_dgram
>= 0);
432 listen_seqpacket
= socket(AF_UNIX
, SOCK_SEQPACKET
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
433 assert_se(listen_seqpacket
>= 0);
435 assert_se(flush_accept(listen_stream
) < 0);
436 assert_se(flush_accept(listen_dgram
) < 0);
437 assert_se(flush_accept(listen_seqpacket
) < 0);
439 assert_se(bind(listen_stream
, &sa
.sa
, sizeof(sa_family_t
)) >= 0);
440 assert_se(bind(listen_dgram
, &sa
.sa
, sizeof(sa_family_t
)) >= 0);
441 assert_se(bind(listen_seqpacket
, &sa
.sa
, sizeof(sa_family_t
)) >= 0);
443 assert_se(flush_accept(listen_stream
) < 0);
444 assert_se(flush_accept(listen_dgram
) < 0);
445 assert_se(flush_accept(listen_seqpacket
) < 0);
447 assert_se(listen(listen_stream
, SOMAXCONN
) >= 0);
448 assert_se(listen(listen_dgram
, SOMAXCONN
) < 0);
449 assert_se(listen(listen_seqpacket
, SOMAXCONN
) >= 0);
451 assert_se(flush_accept(listen_stream
) >= 0);
452 assert_se(flush_accept(listen_dgram
) < 0);
453 assert_se(flush_accept(listen_seqpacket
) >= 0);
455 connect_stream
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
456 assert_se(connect_stream
>= 0);
458 connect_dgram
= socket(AF_UNIX
, SOCK_DGRAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
459 assert_se(connect_dgram
>= 0);
461 connect_seqpacket
= socket(AF_UNIX
, SOCK_SEQPACKET
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
462 assert_se(connect_seqpacket
>= 0);
465 assert_se(getsockname(listen_stream
, &lsa
.sa
, &l
) >= 0);
466 assert_se(connect(connect_stream
, &lsa
.sa
, l
) >= 0);
469 assert_se(getsockname(listen_dgram
, &lsa
.sa
, &l
) >= 0);
470 assert_se(connect(connect_dgram
, &lsa
.sa
, l
) >= 0);
473 assert_se(getsockname(listen_seqpacket
, &lsa
.sa
, &l
) >= 0);
474 assert_se(connect(connect_seqpacket
, &lsa
.sa
, l
) >= 0);
476 assert_se(flush_accept(listen_stream
) >= 0);
477 assert_se(flush_accept(listen_dgram
) < 0);
478 assert_se(flush_accept(listen_seqpacket
) >= 0);
482 log_info("IPv6 supported: %s", yes_no(socket_ipv6_is_supported()));
483 log_info("IPv6 enabled: %s", yes_no(socket_ipv6_is_enabled()));
486 TEST(sockaddr_un_set_path
) {
487 _cleanup_(rm_rf_physical_and_freep
) char *t
= NULL
;
488 _cleanup_(unlink_and_freep
) char *sh
= NULL
;
489 _cleanup_free_
char *j
= NULL
;
490 union sockaddr_union sa
;
491 _cleanup_close_
int fd1
, fd2
, fd3
;
493 assert_se(mkdtemp_malloc("/tmp/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaXXXXXX", &t
) >= 0);
494 assert_se(strlen(t
) > SUN_PATH_LEN
);
496 assert_se(j
= path_join(t
, "sock"));
497 assert_se(sockaddr_un_set_path(&sa
.un
, j
) == -ENAMETOOLONG
); /* too long for AF_UNIX socket */
499 assert_se(asprintf(&sh
, "/tmp/%" PRIx64
, random_u64()) >= 0);
500 assert_se(symlink(t
, sh
) >= 0); /* create temporary symlink, to access it anyway */
503 assert_se(j
= path_join(sh
, "sock"));
504 assert_se(sockaddr_un_set_path(&sa
.un
, j
) >= 0);
506 fd1
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
, 0);
508 assert_se(bind(fd1
, &sa
.sa
, SOCKADDR_LEN(sa
)) >= 0);
509 assert_se(listen(fd1
, 1) >= 0);
511 sh
= unlink_and_free(sh
); /* remove temporary symlink */
513 fd2
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
, 0);
515 assert_se(connect(fd2
, &sa
.sa
, SOCKADDR_LEN(sa
)) < 0);
516 assert_se(errno
== ENOENT
); /* we removed the symlink, must fail */
519 assert_se(j
= path_join(t
, "sock"));
521 fd3
= open(j
, O_CLOEXEC
|O_PATH
|O_NOFOLLOW
);
523 assert_se(sockaddr_un_set_path(&sa
.un
, FORMAT_PROC_FD_PATH(fd3
)) >= 0); /* connect via O_PATH instead, circumventing 108ch limit */
525 assert_se(connect(fd2
, &sa
.sa
, SOCKADDR_LEN(sa
)) >= 0);
528 DEFINE_TEST_MAIN(LOG_DEBUG
);