]>
Commit | Line | Data |
---|---|---|
53e1b683 | 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
c182135d | 2 | |
ca78ad1d ZJS |
3 | #include <fcntl.h> |
4 | #include <grp.h> | |
5 | #include <sys/stat.h> | |
43f2c88d LP |
6 | #include <sys/types.h> |
7 | #include <unistd.h> | |
43f2c88d | 8 | |
b5efdb8a | 9 | #include "alloc-util.h" |
07630cea | 10 | #include "async.h" |
15dca371 | 11 | #include "escape.h" |
8a3386ab | 12 | #include "exit-status.h" |
3ffd4af2 | 13 | #include "fd-util.h" |
3b653205 | 14 | #include "in-addr-util.h" |
8a3386ab | 15 | #include "io-util.h" |
059f6c42 | 16 | #include "log.h" |
07630cea | 17 | #include "macro.h" |
ef118d00 | 18 | #include "missing_network.h" |
dccca82b | 19 | #include "process-util.h" |
07630cea LP |
20 | #include "socket-util.h" |
21 | #include "string-util.h" | |
6d7c4033 | 22 | #include "tests.h" |
e4de7287 | 23 | #include "tmpfile-util.h" |
c182135d | 24 | |
ef76dff2 | 25 | static void test_ifname_valid(void) { |
041103a6 ZJS |
26 | log_info("/* %s */", __func__); |
27 | ||
ef76dff2 LP |
28 | assert(ifname_valid("foo")); |
29 | assert(ifname_valid("eth0")); | |
30 | ||
31 | assert(!ifname_valid("0")); | |
32 | assert(!ifname_valid("99")); | |
33 | assert(ifname_valid("a99")); | |
34 | assert(ifname_valid("99a")); | |
35 | ||
36 | assert(!ifname_valid(NULL)); | |
37 | assert(!ifname_valid("")); | |
38 | assert(!ifname_valid(" ")); | |
39 | assert(!ifname_valid(" foo")); | |
40 | assert(!ifname_valid("bar\n")); | |
41 | assert(!ifname_valid(".")); | |
42 | assert(!ifname_valid("..")); | |
43 | assert(ifname_valid("foo.bar")); | |
7ed95830 | 44 | assert(!ifname_valid("x:y")); |
ef76dff2 LP |
45 | |
46 | assert(ifname_valid("xxxxxxxxxxxxxxx")); | |
47 | assert(!ifname_valid("xxxxxxxxxxxxxxxx")); | |
48 | } | |
49 | ||
39e73acb | 50 | static void test_socket_address_parse_one(const char *in, int ret, int family, const char *expected) { |
c182135d | 51 | SocketAddress a; |
39e73acb | 52 | _cleanup_free_ char *out = NULL; |
041103a6 | 53 | int r; |
c182135d | 54 | |
041103a6 | 55 | r = socket_address_parse(&a, in); |
041103a6 | 56 | if (r >= 0) |
39e73acb ZJS |
57 | assert_se(socket_address_print(&a, &out) >= 0); |
58 | ||
59 | log_info("\"%s\" → %s → \"%s\" (expect \"%s\")", in, | |
60 | r >= 0 ? "✓" : "✗", empty_to_dash(out), r >= 0 ? expected ?: in : "-"); | |
61 | assert_se(r == ret); | |
62 | if (r >= 0) { | |
041103a6 | 63 | assert_se(a.sockaddr.sa.sa_family == family); |
39e73acb ZJS |
64 | assert_se(streq(out, expected ?: in)); |
65 | } | |
041103a6 | 66 | } |
4ebc62ec | 67 | |
15dca371 ZJS |
68 | #define SUN_PATH_LEN (sizeof(((struct sockaddr_un){}).sun_path)) |
69 | assert_cc(sizeof(((struct sockaddr_un){}).sun_path) == 108); | |
70 | ||
041103a6 ZJS |
71 | static void test_socket_address_parse(void) { |
72 | log_info("/* %s */", __func__); | |
4ebc62ec | 73 | |
39e73acb ZJS |
74 | test_socket_address_parse_one("junk", -EINVAL, 0, NULL); |
75 | test_socket_address_parse_one("192.168.1.1", -EINVAL, 0, NULL); | |
76 | test_socket_address_parse_one(".168.1.1", -EINVAL, 0, NULL); | |
77 | test_socket_address_parse_one("989.168.1.1", -EINVAL, 0, NULL); | |
78 | test_socket_address_parse_one("192.168.1.1:65536", -ERANGE, 0, NULL); | |
79 | test_socket_address_parse_one("192.168.1.1:0", -EINVAL, 0, NULL); | |
80 | test_socket_address_parse_one("0", -EINVAL, 0, NULL); | |
81 | test_socket_address_parse_one("65536", -ERANGE, 0, NULL); | |
c182135d | 82 | |
041103a6 | 83 | const int default_family = socket_ipv6_is_supported() ? AF_INET6 : AF_INET; |
c182135d | 84 | |
39e73acb | 85 | test_socket_address_parse_one("65535", 0, default_family, "[::]:65535"); |
c182135d | 86 | |
041103a6 ZJS |
87 | /* The checks below will pass even if ipv6 is disabled in |
88 | * kernel. The underlying glibc's inet_pton() is just a string | |
89 | * parser and doesn't make any syscalls. */ | |
0fc0f14b | 90 | |
39e73acb ZJS |
91 | test_socket_address_parse_one("[::1]", -EINVAL, 0, NULL); |
92 | test_socket_address_parse_one("[::1]8888", -EINVAL, 0, NULL); | |
93 | test_socket_address_parse_one("::1", -EINVAL, 0, NULL); | |
94 | test_socket_address_parse_one("[::1]:0", -EINVAL, 0, NULL); | |
95 | test_socket_address_parse_one("[::1]:65536", -ERANGE, 0, NULL); | |
96 | test_socket_address_parse_one("[a:b:1]:8888", -EINVAL, 0, NULL); | |
97 | ||
98 | test_socket_address_parse_one("8888", 0, default_family, "[::]:8888"); | |
99 | test_socket_address_parse_one("[2001:0db8:0000:85a3:0000:0000:ac1f:8001]:8888", 0, AF_INET6, | |
100 | "[2001:db8:0:85a3::ac1f:8001]:8888"); | |
101 | test_socket_address_parse_one("[::1]:8888", 0, AF_INET6, NULL); | |
102 | test_socket_address_parse_one("192.168.1.254:8888", 0, AF_INET, NULL); | |
103 | test_socket_address_parse_one("/foo/bar", 0, AF_UNIX, NULL); | |
15dca371 | 104 | test_socket_address_parse_one("/", 0, AF_UNIX, NULL); |
39e73acb ZJS |
105 | test_socket_address_parse_one("@abstract", 0, AF_UNIX, NULL); |
106 | ||
15dca371 ZJS |
107 | { |
108 | char aaa[SUN_PATH_LEN + 1] = "@"; | |
109 | ||
110 | memset(aaa + 1, 'a', SUN_PATH_LEN - 1); | |
111 | char_array_0(aaa); | |
112 | ||
113 | test_socket_address_parse_one(aaa, -EINVAL, 0, NULL); | |
114 | ||
115 | aaa[SUN_PATH_LEN - 1] = '\0'; | |
116 | test_socket_address_parse_one(aaa, 0, AF_UNIX, NULL); | |
117 | } | |
118 | ||
39e73acb | 119 | test_socket_address_parse_one("vsock:2:1234", 0, AF_VSOCK, NULL); |
3a484991 | 120 | test_socket_address_parse_one("vsock::1234", 0, AF_VSOCK, NULL); |
39e73acb ZJS |
121 | test_socket_address_parse_one("vsock:2:1234x", -EINVAL, 0, NULL); |
122 | test_socket_address_parse_one("vsock:2x:1234", -EINVAL, 0, NULL); | |
123 | test_socket_address_parse_one("vsock:2", -EINVAL, 0, NULL); | |
c182135d RC |
124 | } |
125 | ||
15dca371 ZJS |
126 | static void test_socket_print_unix_one(const char *in, size_t len_in, const char *expected) { |
127 | _cleanup_free_ char *out = NULL, *c = NULL; | |
128 | ||
129 | SocketAddress a = { .sockaddr = { .un = { .sun_family = AF_UNIX } }, | |
130 | .size = offsetof(struct sockaddr_un, sun_path) + len_in, | |
131 | .type = SOCK_STREAM, | |
132 | }; | |
133 | memcpy(a.sockaddr.un.sun_path, in, len_in); | |
134 | ||
135 | assert_se(socket_address_print(&a, &out) >= 0); | |
136 | assert_se(c = cescape(in)); | |
137 | log_info("\"%s\" → \"%s\" (expect \"%s\")", in, out, expected); | |
138 | assert_se(streq(out, expected)); | |
139 | } | |
140 | ||
141 | static void test_socket_print_unix(void) { | |
142 | log_info("/* %s */", __func__); | |
143 | ||
144 | /* Some additional tests for abstract addresses which we don't parse */ | |
145 | ||
146 | test_socket_print_unix_one("\0\0\0\0", 4, "@\\000\\000\\000"); | |
147 | test_socket_print_unix_one("@abs", 5, "@abs"); | |
148 | test_socket_print_unix_one("\n", 2, "\\n"); | |
149 | test_socket_print_unix_one("", 1, "<unnamed>"); | |
150 | test_socket_print_unix_one("\0", 1, "<unnamed>"); | |
151 | test_socket_print_unix_one("\0_________________________there's 108 characters in this string_____________________________________________", 108, | |
152 | "@_________________________there\\'s 108 characters in this string_____________________________________________"); | |
153 | test_socket_print_unix_one("////////////////////////////////////////////////////////////////////////////////////////////////////////////", 108, | |
154 | "////////////////////////////////////////////////////////////////////////////////////////////////////////////"); | |
155 | test_socket_print_unix_one("////////////////////////////////////////////////////////////////////////////////////////////////////////////", 109, | |
156 | "////////////////////////////////////////////////////////////////////////////////////////////////////////////"); | |
157 | test_socket_print_unix_one("\0\a\b\n\255", 6, "@\\a\\b\\n\\255\\000"); | |
158 | } | |
159 | ||
c182135d RC |
160 | static void test_socket_address_parse_netlink(void) { |
161 | SocketAddress a; | |
162 | ||
041103a6 ZJS |
163 | log_info("/* %s */", __func__); |
164 | ||
c182135d RC |
165 | assert_se(socket_address_parse_netlink(&a, "junk") < 0); |
166 | assert_se(socket_address_parse_netlink(&a, "") < 0); | |
167 | ||
528a74a1 YW |
168 | assert_se(socket_address_parse_netlink(&a, "route") >= 0); |
169 | assert_se(a.sockaddr.nl.nl_family == AF_NETLINK); | |
170 | assert_se(a.sockaddr.nl.nl_groups == 0); | |
171 | assert_se(a.protocol == NETLINK_ROUTE); | |
c182135d RC |
172 | assert_se(socket_address_parse_netlink(&a, "route") >= 0); |
173 | assert_se(socket_address_parse_netlink(&a, "route 10") >= 0); | |
528a74a1 YW |
174 | assert_se(a.sockaddr.nl.nl_family == AF_NETLINK); |
175 | assert_se(a.sockaddr.nl.nl_groups == 10); | |
c182135d | 176 | assert_se(a.protocol == NETLINK_ROUTE); |
8d89e51f | 177 | |
5685efde ZJS |
178 | /* With spaces and tabs */ |
179 | assert_se(socket_address_parse_netlink(&a, " kobject-uevent ") >= 0); | |
528a74a1 YW |
180 | assert_se(a.sockaddr.nl.nl_family == AF_NETLINK); |
181 | assert_se(a.sockaddr.nl.nl_groups == 0); | |
182 | assert_se(a.protocol == NETLINK_KOBJECT_UEVENT); | |
183 | assert_se(socket_address_parse_netlink(&a, " \t kobject-uevent \t 10") >= 0); | |
184 | assert_se(a.sockaddr.nl.nl_family == AF_NETLINK); | |
185 | assert_se(a.sockaddr.nl.nl_groups == 10); | |
5685efde | 186 | assert_se(a.protocol == NETLINK_KOBJECT_UEVENT); |
5685efde | 187 | assert_se(socket_address_parse_netlink(&a, "kobject-uevent\t10") >= 0); |
528a74a1 YW |
188 | assert_se(a.sockaddr.nl.nl_family == AF_NETLINK); |
189 | assert_se(a.sockaddr.nl.nl_groups == 10); | |
5685efde ZJS |
190 | assert_se(a.protocol == NETLINK_KOBJECT_UEVENT); |
191 | ||
528a74a1 YW |
192 | /* trailing space is not supported */ |
193 | assert_se(socket_address_parse_netlink(&a, "kobject-uevent\t10 ") < 0); | |
194 | ||
195 | /* Group must be unsigned */ | |
196 | assert_se(socket_address_parse_netlink(&a, "kobject-uevent -1") < 0); | |
197 | ||
8d89e51f ZJS |
198 | /* oss-fuzz #6884 */ |
199 | assert_se(socket_address_parse_netlink(&a, "\xff") < 0); | |
c182135d RC |
200 | } |
201 | ||
202 | static void test_socket_address_equal(void) { | |
041103a6 ZJS |
203 | SocketAddress a, b; |
204 | ||
205 | log_info("/* %s */", __func__); | |
c182135d RC |
206 | |
207 | assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0); | |
208 | assert_se(socket_address_parse(&b, "192.168.1.1:888") >= 0); | |
209 | assert_se(!socket_address_equal(&a, &b)); | |
210 | ||
211 | assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0); | |
212 | assert_se(socket_address_parse(&b, "192.16.1.1:8888") >= 0); | |
213 | assert_se(!socket_address_equal(&a, &b)); | |
214 | ||
215 | assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0); | |
216 | assert_se(socket_address_parse(&b, "8888") >= 0); | |
217 | assert_se(!socket_address_equal(&a, &b)); | |
218 | ||
219 | assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0); | |
220 | assert_se(socket_address_parse(&b, "/foo/bar/") >= 0); | |
221 | assert_se(!socket_address_equal(&a, &b)); | |
222 | ||
223 | assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0); | |
224 | assert_se(socket_address_parse(&b, "192.168.1.1:8888") >= 0); | |
225 | assert_se(socket_address_equal(&a, &b)); | |
226 | ||
227 | assert_se(socket_address_parse(&a, "/foo/bar") >= 0); | |
228 | assert_se(socket_address_parse(&b, "/foo/bar") >= 0); | |
229 | assert_se(socket_address_equal(&a, &b)); | |
230 | ||
231 | assert_se(socket_address_parse(&a, "[::1]:8888") >= 0); | |
232 | assert_se(socket_address_parse(&b, "[::1]:8888") >= 0); | |
233 | assert_se(socket_address_equal(&a, &b)); | |
234 | ||
235 | assert_se(socket_address_parse(&a, "@abstract") >= 0); | |
236 | assert_se(socket_address_parse(&b, "@abstract") >= 0); | |
237 | assert_se(socket_address_equal(&a, &b)); | |
238 | ||
239 | assert_se(socket_address_parse_netlink(&a, "firewall") >= 0); | |
240 | assert_se(socket_address_parse_netlink(&b, "firewall") >= 0); | |
241 | assert_se(socket_address_equal(&a, &b)); | |
0fc0f14b SH |
242 | |
243 | assert_se(socket_address_parse(&a, "vsock:2:1234") >= 0); | |
244 | assert_se(socket_address_parse(&b, "vsock:2:1234") >= 0); | |
245 | assert_se(socket_address_equal(&a, &b)); | |
246 | assert_se(socket_address_parse(&b, "vsock:2:1235") >= 0); | |
247 | assert_se(!socket_address_equal(&a, &b)); | |
248 | assert_se(socket_address_parse(&b, "vsock:3:1234") >= 0); | |
249 | assert_se(!socket_address_equal(&a, &b)); | |
c182135d RC |
250 | } |
251 | ||
252 | static void test_socket_address_get_path(void) { | |
253 | SocketAddress a; | |
254 | ||
041103a6 ZJS |
255 | log_info("/* %s */", __func__); |
256 | ||
c182135d RC |
257 | assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0); |
258 | assert_se(!socket_address_get_path(&a)); | |
259 | ||
260 | assert_se(socket_address_parse(&a, "@abstract") >= 0); | |
261 | assert_se(!socket_address_get_path(&a)); | |
262 | ||
263 | assert_se(socket_address_parse(&a, "[::1]:8888") >= 0); | |
264 | assert_se(!socket_address_get_path(&a)); | |
265 | ||
266 | assert_se(socket_address_parse(&a, "/foo/bar") >= 0); | |
267 | assert_se(streq(socket_address_get_path(&a), "/foo/bar")); | |
0fc0f14b SH |
268 | |
269 | assert_se(socket_address_parse(&a, "vsock:2:1234") >= 0); | |
270 | assert_se(!socket_address_get_path(&a)); | |
c182135d RC |
271 | } |
272 | ||
43dc0043 RC |
273 | static void test_socket_address_is(void) { |
274 | SocketAddress a; | |
275 | ||
041103a6 ZJS |
276 | log_info("/* %s */", __func__); |
277 | ||
43dc0043 RC |
278 | assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0); |
279 | assert_se(socket_address_is(&a, "192.168.1.1:8888", SOCK_STREAM)); | |
280 | assert_se(!socket_address_is(&a, "route", SOCK_STREAM)); | |
281 | assert_se(!socket_address_is(&a, "192.168.1.1:8888", SOCK_RAW)); | |
282 | } | |
283 | ||
284 | static void test_socket_address_is_netlink(void) { | |
285 | SocketAddress a; | |
286 | ||
041103a6 ZJS |
287 | log_info("/* %s */", __func__); |
288 | ||
43dc0043 RC |
289 | assert_se(socket_address_parse_netlink(&a, "route 10") >= 0); |
290 | assert_se(socket_address_is_netlink(&a, "route 10")); | |
291 | assert_se(!socket_address_is_netlink(&a, "192.168.1.1:8888")); | |
292 | assert_se(!socket_address_is_netlink(&a, "route 1")); | |
293 | } | |
294 | ||
e7639886 | 295 | static void test_in_addr_is_null(void) { |
e7639886 DM |
296 | union in_addr_union i = {}; |
297 | ||
041103a6 ZJS |
298 | log_info("/* %s */", __func__); |
299 | ||
e7639886 DM |
300 | assert_se(in_addr_is_null(AF_INET, &i) == true); |
301 | assert_se(in_addr_is_null(AF_INET6, &i) == true); | |
302 | ||
303 | i.in.s_addr = 0x1000000; | |
304 | assert_se(in_addr_is_null(AF_INET, &i) == false); | |
305 | assert_se(in_addr_is_null(AF_INET6, &i) == false); | |
306 | ||
307 | assert_se(in_addr_is_null(-1, &i) == -EAFNOSUPPORT); | |
308 | } | |
309 | ||
059f6c42 LP |
310 | static void test_in_addr_prefix_intersect_one(unsigned f, const char *a, unsigned apl, const char *b, unsigned bpl, int result) { |
311 | union in_addr_union ua, ub; | |
312 | ||
313 | assert_se(in_addr_from_string(f, a, &ua) >= 0); | |
314 | assert_se(in_addr_from_string(f, b, &ub) >= 0); | |
315 | ||
316 | assert_se(in_addr_prefix_intersect(f, &ua, apl, &ub, bpl) == result); | |
317 | } | |
318 | ||
319 | static void test_in_addr_prefix_intersect(void) { | |
041103a6 | 320 | log_info("/* %s */", __func__); |
059f6c42 LP |
321 | |
322 | test_in_addr_prefix_intersect_one(AF_INET, "255.255.255.255", 32, "255.255.255.254", 32, 0); | |
323 | test_in_addr_prefix_intersect_one(AF_INET, "255.255.255.255", 0, "255.255.255.255", 32, 1); | |
324 | test_in_addr_prefix_intersect_one(AF_INET, "0.0.0.0", 0, "47.11.8.15", 32, 1); | |
325 | ||
326 | test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 24, "1.1.1.1", 24, 1); | |
327 | test_in_addr_prefix_intersect_one(AF_INET, "2.2.2.2", 24, "1.1.1.1", 24, 0); | |
328 | ||
329 | test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 24, "1.1.1.127", 25, 1); | |
330 | test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 24, "1.1.1.127", 26, 1); | |
331 | test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 25, "1.1.1.127", 25, 1); | |
332 | test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 25, "1.1.1.255", 25, 0); | |
333 | ||
334 | test_in_addr_prefix_intersect_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 128, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:fffe", 128, 0); | |
335 | test_in_addr_prefix_intersect_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 0, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 128, 1); | |
336 | test_in_addr_prefix_intersect_one(AF_INET6, "::", 0, "beef:beef:beef:beef:beef:beef:beef:beef", 128, 1); | |
337 | ||
338 | test_in_addr_prefix_intersect_one(AF_INET6, "1::2", 64, "1::2", 64, 1); | |
339 | test_in_addr_prefix_intersect_one(AF_INET6, "2::2", 64, "1::2", 64, 0); | |
340 | ||
341 | test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 120, "1::007f", 121, 1); | |
342 | test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 120, "1::007f", 122, 1); | |
343 | test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 121, "1::007f", 121, 1); | |
344 | test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 121, "1::00ff", 121, 0); | |
345 | } | |
346 | ||
347 | static void test_in_addr_prefix_next_one(unsigned f, const char *before, unsigned pl, const char *after) { | |
348 | union in_addr_union ubefore, uafter, t; | |
349 | ||
350 | assert_se(in_addr_from_string(f, before, &ubefore) >= 0); | |
351 | ||
352 | t = ubefore; | |
353 | assert_se((in_addr_prefix_next(f, &t, pl) > 0) == !!after); | |
354 | ||
355 | if (after) { | |
356 | assert_se(in_addr_from_string(f, after, &uafter) >= 0); | |
357 | assert_se(in_addr_equal(f, &t, &uafter) > 0); | |
358 | } | |
359 | } | |
360 | ||
361 | static void test_in_addr_prefix_next(void) { | |
041103a6 | 362 | log_info("/* %s */", __func__); |
059f6c42 LP |
363 | |
364 | test_in_addr_prefix_next_one(AF_INET, "192.168.0.0", 24, "192.168.1.0"); | |
365 | test_in_addr_prefix_next_one(AF_INET, "192.168.0.0", 16, "192.169.0.0"); | |
366 | test_in_addr_prefix_next_one(AF_INET, "192.168.0.0", 20, "192.168.16.0"); | |
367 | ||
368 | test_in_addr_prefix_next_one(AF_INET, "0.0.0.0", 32, "0.0.0.1"); | |
369 | test_in_addr_prefix_next_one(AF_INET, "255.255.255.255", 32, NULL); | |
370 | test_in_addr_prefix_next_one(AF_INET, "255.255.255.0", 24, NULL); | |
371 | ||
372 | test_in_addr_prefix_next_one(AF_INET6, "4400::", 128, "4400::0001"); | |
373 | test_in_addr_prefix_next_one(AF_INET6, "4400::", 120, "4400::0100"); | |
374 | test_in_addr_prefix_next_one(AF_INET6, "4400::", 127, "4400::0002"); | |
375 | test_in_addr_prefix_next_one(AF_INET6, "4400::", 8, "4500::"); | |
376 | test_in_addr_prefix_next_one(AF_INET6, "4400::", 7, "4600::"); | |
377 | ||
378 | test_in_addr_prefix_next_one(AF_INET6, "::", 128, "::1"); | |
379 | ||
380 | test_in_addr_prefix_next_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 128, NULL); | |
381 | test_in_addr_prefix_next_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ff00", 120, NULL); | |
059f6c42 LP |
382 | } |
383 | ||
07916bea RC |
384 | static void test_in_addr_to_string_one(int f, const char *addr) { |
385 | union in_addr_union ua; | |
386 | _cleanup_free_ char *r = NULL; | |
387 | ||
388 | assert_se(in_addr_from_string(f, addr, &ua) >= 0); | |
389 | assert_se(in_addr_to_string(f, &ua, &r) >= 0); | |
390 | printf("test_in_addr_to_string_one: %s == %s\n", addr, r); | |
391 | assert_se(streq(addr, r)); | |
392 | } | |
393 | ||
394 | static void test_in_addr_to_string(void) { | |
041103a6 ZJS |
395 | log_info("/* %s */", __func__); |
396 | ||
07916bea RC |
397 | test_in_addr_to_string_one(AF_INET, "192.168.0.1"); |
398 | test_in_addr_to_string_one(AF_INET, "10.11.12.13"); | |
399 | test_in_addr_to_string_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"); | |
400 | test_in_addr_to_string_one(AF_INET6, "::1"); | |
401 | test_in_addr_to_string_one(AF_INET6, "fe80::"); | |
402 | } | |
403 | ||
2817157b LP |
404 | static void test_in_addr_ifindex_to_string_one(int f, const char *a, int ifindex, const char *b) { |
405 | _cleanup_free_ char *r = NULL; | |
406 | union in_addr_union ua, uuaa; | |
407 | int ff, ifindex2; | |
408 | ||
409 | assert_se(in_addr_from_string(f, a, &ua) >= 0); | |
410 | assert_se(in_addr_ifindex_to_string(f, &ua, ifindex, &r) >= 0); | |
411 | printf("test_in_addr_ifindex_to_string_one: %s == %s\n", b, r); | |
412 | assert_se(streq(b, r)); | |
413 | ||
414 | assert_se(in_addr_ifindex_from_string_auto(b, &ff, &uuaa, &ifindex2) >= 0); | |
415 | assert_se(ff == f); | |
416 | assert_se(in_addr_equal(f, &ua, &uuaa)); | |
417 | assert_se(ifindex2 == ifindex || ifindex2 == 0); | |
418 | } | |
419 | ||
420 | static void test_in_addr_ifindex_to_string(void) { | |
041103a6 ZJS |
421 | log_info("/* %s */", __func__); |
422 | ||
2817157b LP |
423 | test_in_addr_ifindex_to_string_one(AF_INET, "192.168.0.1", 7, "192.168.0.1"); |
424 | test_in_addr_ifindex_to_string_one(AF_INET, "10.11.12.13", 9, "10.11.12.13"); | |
425 | test_in_addr_ifindex_to_string_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 10, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"); | |
426 | test_in_addr_ifindex_to_string_one(AF_INET6, "::1", 11, "::1"); | |
427 | test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::", 12, "fe80::%12"); | |
428 | test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::", 0, "fe80::"); | |
429 | test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::14", 12, "fe80::14%12"); | |
430 | test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::15", -7, "fe80::15"); | |
431 | test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::16", LOOPBACK_IFINDEX, "fe80::16%1"); | |
432 | } | |
433 | ||
434 | static void test_in_addr_ifindex_from_string_auto(void) { | |
435 | int family, ifindex; | |
436 | union in_addr_union ua; | |
437 | ||
041103a6 | 438 | log_info("/* %s */", __func__); |
2817157b LP |
439 | /* Most in_addr_ifindex_from_string_auto() invocations have already been tested above, but let's test some more */ |
440 | ||
441 | assert_se(in_addr_ifindex_from_string_auto("fe80::17", &family, &ua, &ifindex) >= 0); | |
442 | assert_se(family == AF_INET6); | |
443 | assert_se(ifindex == 0); | |
444 | ||
445 | assert_se(in_addr_ifindex_from_string_auto("fe80::18%19", &family, &ua, &ifindex) >= 0); | |
446 | assert_se(family == AF_INET6); | |
447 | assert_se(ifindex == 19); | |
448 | ||
449 | assert_se(in_addr_ifindex_from_string_auto("fe80::18%lo", &family, &ua, &ifindex) >= 0); | |
450 | assert_se(family == AF_INET6); | |
451 | assert_se(ifindex == LOOPBACK_IFINDEX); | |
452 | ||
453 | assert_se(in_addr_ifindex_from_string_auto("fe80::19%thisinterfacecantexist", &family, &ua, &ifindex) == -ENODEV); | |
454 | } | |
455 | ||
43dc0043 RC |
456 | static void test_sockaddr_equal(void) { |
457 | union sockaddr_union a = { | |
458 | .in.sin_family = AF_INET, | |
459 | .in.sin_port = 0, | |
8e38570e | 460 | .in.sin_addr.s_addr = htobe32(INADDR_ANY), |
43dc0043 RC |
461 | }; |
462 | union sockaddr_union b = { | |
463 | .in.sin_family = AF_INET, | |
464 | .in.sin_port = 0, | |
8e38570e | 465 | .in.sin_addr.s_addr = htobe32(INADDR_ANY), |
43dc0043 RC |
466 | }; |
467 | union sockaddr_union c = { | |
468 | .in.sin_family = AF_INET, | |
469 | .in.sin_port = 0, | |
8e38570e | 470 | .in.sin_addr.s_addr = htobe32(1234), |
43dc0043 RC |
471 | }; |
472 | union sockaddr_union d = { | |
473 | .in6.sin6_family = AF_INET6, | |
474 | .in6.sin6_port = 0, | |
475 | .in6.sin6_addr = IN6ADDR_ANY_INIT, | |
476 | }; | |
0fc0f14b SH |
477 | union sockaddr_union e = { |
478 | .vm.svm_family = AF_VSOCK, | |
479 | .vm.svm_port = 0, | |
480 | .vm.svm_cid = VMADDR_CID_ANY, | |
481 | }; | |
041103a6 ZJS |
482 | |
483 | log_info("/* %s */", __func__); | |
484 | ||
43dc0043 RC |
485 | assert_se(sockaddr_equal(&a, &a)); |
486 | assert_se(sockaddr_equal(&a, &b)); | |
487 | assert_se(sockaddr_equal(&d, &d)); | |
0fc0f14b | 488 | assert_se(sockaddr_equal(&e, &e)); |
43dc0043 RC |
489 | assert_se(!sockaddr_equal(&a, &c)); |
490 | assert_se(!sockaddr_equal(&b, &c)); | |
0fc0f14b | 491 | assert_se(!sockaddr_equal(&a, &e)); |
43dc0043 RC |
492 | } |
493 | ||
fc2fffe7 | 494 | static void test_sockaddr_un_len(void) { |
041103a6 ZJS |
495 | log_info("/* %s */", __func__); |
496 | ||
fc2fffe7 LP |
497 | static const struct sockaddr_un fs = { |
498 | .sun_family = AF_UNIX, | |
499 | .sun_path = "/foo/bar/waldo", | |
500 | }; | |
501 | ||
502 | static const struct sockaddr_un abstract = { | |
503 | .sun_family = AF_UNIX, | |
504 | .sun_path = "\0foobar", | |
505 | }; | |
506 | ||
69995bff | 507 | assert_se(SOCKADDR_UN_LEN(fs) == offsetof(struct sockaddr_un, sun_path) + strlen(fs.sun_path) + 1); |
fc2fffe7 LP |
508 | assert_se(SOCKADDR_UN_LEN(abstract) == offsetof(struct sockaddr_un, sun_path) + 1 + strlen(abstract.sun_path + 1)); |
509 | } | |
510 | ||
1703b203 SS |
511 | static void test_in_addr_is_multicast(void) { |
512 | union in_addr_union a, b; | |
513 | int f; | |
514 | ||
041103a6 ZJS |
515 | log_info("/* %s */", __func__); |
516 | ||
1703b203 SS |
517 | assert_se(in_addr_from_string_auto("192.168.3.11", &f, &a) >= 0); |
518 | assert_se(in_addr_is_multicast(f, &a) == 0); | |
519 | ||
520 | assert_se(in_addr_from_string_auto("224.0.0.1", &f, &a) >= 0); | |
521 | assert_se(in_addr_is_multicast(f, &a) == 1); | |
522 | ||
523 | assert_se(in_addr_from_string_auto("FF01:0:0:0:0:0:0:1", &f, &b) >= 0); | |
524 | assert_se(in_addr_is_multicast(f, &b) == 1); | |
525 | ||
526 | assert_se(in_addr_from_string_auto("2001:db8::c:69b:aeff:fe53:743e", &f, &b) >= 0); | |
527 | assert_se(in_addr_is_multicast(f, &b) == 0); | |
528 | } | |
529 | ||
43f2c88d LP |
530 | static void test_getpeercred_getpeergroups(void) { |
531 | int r; | |
532 | ||
041103a6 ZJS |
533 | log_info("/* %s */", __func__); |
534 | ||
43f2c88d LP |
535 | r = safe_fork("(getpeercred)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL); |
536 | assert_se(r >= 0); | |
537 | ||
538 | if (r == 0) { | |
539 | static const gid_t gids[] = { 3, 4, 5, 6, 7 }; | |
540 | gid_t *test_gids; | |
43f2c88d LP |
541 | size_t n_test_gids; |
542 | uid_t test_uid; | |
543 | gid_t test_gid; | |
544 | struct ucred ucred; | |
545 | int pair[2]; | |
546 | ||
547 | if (geteuid() == 0) { | |
548 | test_uid = 1; | |
549 | test_gid = 2; | |
550 | test_gids = (gid_t*) gids; | |
551 | n_test_gids = ELEMENTSOF(gids); | |
552 | ||
553 | assert_se(setgroups(n_test_gids, test_gids) >= 0); | |
554 | assert_se(setresgid(test_gid, test_gid, test_gid) >= 0); | |
555 | assert_se(setresuid(test_uid, test_uid, test_uid) >= 0); | |
556 | ||
557 | } else { | |
558 | long ngroups_max; | |
559 | ||
560 | test_uid = getuid(); | |
561 | test_gid = getgid(); | |
562 | ||
563 | ngroups_max = sysconf(_SC_NGROUPS_MAX); | |
564 | assert(ngroups_max > 0); | |
565 | ||
566 | test_gids = newa(gid_t, ngroups_max); | |
567 | ||
568 | r = getgroups(ngroups_max, test_gids); | |
569 | assert_se(r >= 0); | |
570 | n_test_gids = (size_t) r; | |
571 | } | |
572 | ||
573 | assert_se(socketpair(AF_UNIX, SOCK_STREAM, 0, pair) >= 0); | |
574 | ||
575 | assert_se(getpeercred(pair[0], &ucred) >= 0); | |
576 | ||
577 | assert_se(ucred.uid == test_uid); | |
578 | assert_se(ucred.gid == test_gid); | |
579 | assert_se(ucred.pid == getpid_cached()); | |
580 | ||
181c4ba7 ZJS |
581 | { |
582 | _cleanup_free_ gid_t *peer_groups = NULL; | |
43f2c88d | 583 | |
181c4ba7 ZJS |
584 | r = getpeergroups(pair[0], &peer_groups); |
585 | assert_se(r >= 0 || IN_SET(r, -EOPNOTSUPP, -ENOPROTOOPT)); | |
586 | ||
587 | if (r >= 0) { | |
588 | assert_se((size_t) r == n_test_gids); | |
589 | assert_se(memcmp(peer_groups, test_gids, sizeof(gid_t) * n_test_gids) == 0); | |
590 | } | |
43f2c88d LP |
591 | } |
592 | ||
593 | safe_close_pair(pair); | |
8a3386ab | 594 | _exit(EXIT_SUCCESS); |
43f2c88d LP |
595 | } |
596 | } | |
597 | ||
8a3386ab FB |
598 | static void test_passfd_read(void) { |
599 | static const char file_contents[] = "test contents for passfd"; | |
600 | _cleanup_close_pair_ int pair[2] = { -1, -1 }; | |
601 | int r; | |
602 | ||
041103a6 ZJS |
603 | log_info("/* %s */", __func__); |
604 | ||
8a3386ab FB |
605 | assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0); |
606 | ||
607 | r = safe_fork("(passfd_read)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL); | |
608 | assert_se(r >= 0); | |
609 | ||
610 | if (r == 0) { | |
611 | /* Child */ | |
612 | char tmpfile[] = "/tmp/test-socket-util-passfd-read-XXXXXX"; | |
613 | _cleanup_close_ int tmpfd = -1; | |
614 | ||
615 | pair[0] = safe_close(pair[0]); | |
616 | ||
617 | tmpfd = mkostemp_safe(tmpfile); | |
618 | assert_se(tmpfd >= 0); | |
619 | assert_se(write(tmpfd, file_contents, strlen(file_contents)) == (ssize_t) strlen(file_contents)); | |
620 | tmpfd = safe_close(tmpfd); | |
621 | ||
622 | tmpfd = open(tmpfile, O_RDONLY); | |
623 | assert_se(tmpfd >= 0); | |
624 | assert_se(unlink(tmpfile) == 0); | |
625 | ||
626 | assert_se(send_one_fd(pair[1], tmpfd, MSG_DONTWAIT) == 0); | |
627 | _exit(EXIT_SUCCESS); | |
628 | } | |
629 | ||
630 | /* Parent */ | |
631 | char buf[64]; | |
632 | struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1); | |
633 | _cleanup_close_ int fd = -1; | |
634 | ||
635 | pair[1] = safe_close(pair[1]); | |
636 | ||
637 | assert_se(receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd) == 0); | |
638 | ||
639 | assert_se(fd >= 0); | |
640 | r = read(fd, buf, sizeof(buf)-1); | |
641 | assert_se(r >= 0); | |
642 | buf[r] = 0; | |
643 | assert_se(streq(buf, file_contents)); | |
644 | } | |
645 | ||
646 | static void test_passfd_contents_read(void) { | |
647 | _cleanup_close_pair_ int pair[2] = { -1, -1 }; | |
648 | static const char file_contents[] = "test contents in the file"; | |
649 | static const char wire_contents[] = "test contents on the wire"; | |
650 | int r; | |
651 | ||
041103a6 ZJS |
652 | log_info("/* %s */", __func__); |
653 | ||
8a3386ab FB |
654 | assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0); |
655 | ||
656 | r = safe_fork("(passfd_contents_read)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL); | |
657 | assert_se(r >= 0); | |
658 | ||
659 | if (r == 0) { | |
660 | /* Child */ | |
661 | struct iovec iov = IOVEC_INIT_STRING(wire_contents); | |
662 | char tmpfile[] = "/tmp/test-socket-util-passfd-contents-read-XXXXXX"; | |
663 | _cleanup_close_ int tmpfd = -1; | |
664 | ||
665 | pair[0] = safe_close(pair[0]); | |
666 | ||
667 | tmpfd = mkostemp_safe(tmpfile); | |
668 | assert_se(tmpfd >= 0); | |
669 | assert_se(write(tmpfd, file_contents, strlen(file_contents)) == (ssize_t) strlen(file_contents)); | |
670 | tmpfd = safe_close(tmpfd); | |
671 | ||
672 | tmpfd = open(tmpfile, O_RDONLY); | |
673 | assert_se(tmpfd >= 0); | |
674 | assert_se(unlink(tmpfile) == 0); | |
675 | ||
676 | assert_se(send_one_fd_iov(pair[1], tmpfd, &iov, 1, MSG_DONTWAIT) > 0); | |
677 | _exit(EXIT_SUCCESS); | |
678 | } | |
679 | ||
680 | /* Parent */ | |
681 | char buf[64]; | |
682 | struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1); | |
683 | _cleanup_close_ int fd = -1; | |
684 | ssize_t k; | |
685 | ||
686 | pair[1] = safe_close(pair[1]); | |
687 | ||
688 | k = receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd); | |
689 | assert_se(k > 0); | |
690 | buf[k] = 0; | |
691 | assert_se(streq(buf, wire_contents)); | |
692 | ||
693 | assert_se(fd >= 0); | |
694 | r = read(fd, buf, sizeof(buf)-1); | |
695 | assert_se(r >= 0); | |
696 | buf[r] = 0; | |
697 | assert_se(streq(buf, file_contents)); | |
698 | } | |
699 | ||
700 | static void test_receive_nopassfd(void) { | |
701 | _cleanup_close_pair_ int pair[2] = { -1, -1 }; | |
702 | static const char wire_contents[] = "no fd passed here"; | |
703 | int r; | |
704 | ||
041103a6 ZJS |
705 | log_info("/* %s */", __func__); |
706 | ||
8a3386ab FB |
707 | assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0); |
708 | ||
709 | r = safe_fork("(receive_nopassfd)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL); | |
710 | assert_se(r >= 0); | |
711 | ||
712 | if (r == 0) { | |
713 | /* Child */ | |
714 | struct iovec iov = IOVEC_INIT_STRING(wire_contents); | |
715 | ||
716 | pair[0] = safe_close(pair[0]); | |
717 | ||
718 | assert_se(send_one_fd_iov(pair[1], -1, &iov, 1, MSG_DONTWAIT) > 0); | |
719 | _exit(EXIT_SUCCESS); | |
720 | } | |
721 | ||
722 | /* Parent */ | |
723 | char buf[64]; | |
724 | struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1); | |
725 | int fd = -999; | |
726 | ssize_t k; | |
727 | ||
728 | pair[1] = safe_close(pair[1]); | |
729 | ||
730 | k = receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd); | |
731 | assert_se(k > 0); | |
732 | buf[k] = 0; | |
733 | assert_se(streq(buf, wire_contents)); | |
734 | ||
735 | /* no fd passed here, confirm it was reset */ | |
736 | assert_se(fd == -1); | |
737 | } | |
738 | ||
739 | static void test_send_nodata_nofd(void) { | |
740 | _cleanup_close_pair_ int pair[2] = { -1, -1 }; | |
741 | int r; | |
742 | ||
041103a6 ZJS |
743 | log_info("/* %s */", __func__); |
744 | ||
8a3386ab FB |
745 | assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0); |
746 | ||
747 | r = safe_fork("(send_nodata_nofd)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL); | |
748 | assert_se(r >= 0); | |
749 | ||
750 | if (r == 0) { | |
751 | /* Child */ | |
752 | pair[0] = safe_close(pair[0]); | |
753 | ||
754 | assert_se(send_one_fd_iov(pair[1], -1, NULL, 0, MSG_DONTWAIT) == -EINVAL); | |
755 | _exit(EXIT_SUCCESS); | |
756 | } | |
757 | ||
758 | /* Parent */ | |
759 | char buf[64]; | |
760 | struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1); | |
761 | int fd = -999; | |
762 | ssize_t k; | |
763 | ||
764 | pair[1] = safe_close(pair[1]); | |
765 | ||
766 | k = receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd); | |
767 | /* recvmsg() will return errno EAGAIN if nothing was sent */ | |
768 | assert_se(k == -EAGAIN); | |
769 | ||
770 | /* receive_one_fd_iov returned error, so confirm &fd wasn't touched */ | |
771 | assert_se(fd == -999); | |
772 | } | |
773 | ||
774 | static void test_send_emptydata(void) { | |
775 | _cleanup_close_pair_ int pair[2] = { -1, -1 }; | |
776 | int r; | |
777 | ||
041103a6 ZJS |
778 | log_info("/* %s */", __func__); |
779 | ||
8a3386ab FB |
780 | assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0); |
781 | ||
782 | r = safe_fork("(send_emptydata)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL); | |
783 | assert_se(r >= 0); | |
784 | ||
785 | if (r == 0) { | |
786 | /* Child */ | |
787 | struct iovec iov = IOVEC_INIT_STRING(""); /* zero-length iov */ | |
788 | assert_se(iov.iov_len == 0); | |
789 | ||
790 | pair[0] = safe_close(pair[0]); | |
791 | ||
792 | /* This will succeed, since iov is set. */ | |
793 | assert_se(send_one_fd_iov(pair[1], -1, &iov, 1, MSG_DONTWAIT) == 0); | |
794 | _exit(EXIT_SUCCESS); | |
795 | } | |
796 | ||
797 | /* Parent */ | |
798 | char buf[64]; | |
799 | struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1); | |
800 | int fd = -999; | |
801 | ssize_t k; | |
802 | ||
803 | pair[1] = safe_close(pair[1]); | |
804 | ||
805 | k = receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd); | |
806 | /* receive_one_fd_iov() returns -EIO if an fd is not found and no data was returned. */ | |
807 | assert_se(k == -EIO); | |
808 | ||
809 | /* receive_one_fd_iov returned error, so confirm &fd wasn't touched */ | |
810 | assert_se(fd == -999); | |
811 | } | |
812 | ||
5b116c37 LP |
813 | static void test_flush_accept(void) { |
814 | _cleanup_close_ int listen_stream = -1, listen_dgram = -1, listen_seqpacket = 1, connect_stream = -1, connect_dgram = -1, connect_seqpacket = -1; | |
815 | static const union sockaddr_union sa = { .un.sun_family = AF_UNIX }; | |
816 | union sockaddr_union lsa; | |
817 | socklen_t l; | |
818 | ||
819 | listen_stream = socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0); | |
820 | assert_se(listen_stream >= 0); | |
821 | ||
822 | listen_dgram = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0); | |
823 | assert_se(listen_dgram >= 0); | |
824 | ||
825 | listen_seqpacket = socket(AF_UNIX, SOCK_SEQPACKET|SOCK_CLOEXEC|SOCK_NONBLOCK, 0); | |
826 | assert_se(listen_seqpacket >= 0); | |
827 | ||
828 | assert_se(flush_accept(listen_stream) < 0); | |
829 | assert_se(flush_accept(listen_dgram) < 0); | |
830 | assert_se(flush_accept(listen_seqpacket) < 0); | |
831 | ||
832 | assert_se(bind(listen_stream, &sa.sa, sizeof(sa_family_t)) >= 0); | |
833 | assert_se(bind(listen_dgram, &sa.sa, sizeof(sa_family_t)) >= 0); | |
834 | assert_se(bind(listen_seqpacket, &sa.sa, sizeof(sa_family_t)) >= 0); | |
835 | ||
836 | assert_se(flush_accept(listen_stream) < 0); | |
837 | assert_se(flush_accept(listen_dgram) < 0); | |
838 | assert_se(flush_accept(listen_seqpacket) < 0); | |
839 | ||
840 | assert_se(listen(listen_stream, SOMAXCONN) >= 0); | |
841 | assert_se(listen(listen_dgram, SOMAXCONN) < 0); | |
842 | assert_se(listen(listen_seqpacket, SOMAXCONN) >= 0); | |
843 | ||
844 | assert_se(flush_accept(listen_stream) >= 0); | |
845 | assert_se(flush_accept(listen_dgram) < 0); | |
846 | assert_se(flush_accept(listen_seqpacket) >= 0); | |
847 | ||
848 | connect_stream = socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0); | |
849 | assert_se(connect_stream >= 0); | |
850 | ||
851 | connect_dgram = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0); | |
852 | assert_se(connect_dgram >= 0); | |
853 | ||
854 | connect_seqpacket = socket(AF_UNIX, SOCK_SEQPACKET|SOCK_CLOEXEC|SOCK_NONBLOCK, 0); | |
855 | assert_se(connect_seqpacket >= 0); | |
856 | ||
857 | l = sizeof(lsa); | |
858 | assert_se(getsockname(listen_stream, &lsa.sa, &l) >= 0); | |
859 | assert_se(connect(connect_stream, &lsa.sa, l) >= 0); | |
860 | ||
861 | l = sizeof(lsa); | |
862 | assert_se(getsockname(listen_dgram, &lsa.sa, &l) >= 0); | |
863 | assert_se(connect(connect_dgram, &lsa.sa, l) >= 0); | |
864 | ||
865 | l = sizeof(lsa); | |
866 | assert_se(getsockname(listen_seqpacket, &lsa.sa, &l) >= 0); | |
867 | assert_se(connect(connect_seqpacket, &lsa.sa, l) >= 0); | |
868 | ||
869 | assert_se(flush_accept(listen_stream) >= 0); | |
870 | assert_se(flush_accept(listen_dgram) < 0); | |
871 | assert_se(flush_accept(listen_seqpacket) >= 0); | |
872 | } | |
873 | ||
c182135d | 874 | int main(int argc, char *argv[]) { |
6d7c4033 | 875 | test_setup_logging(LOG_DEBUG); |
059f6c42 | 876 | |
ef76dff2 LP |
877 | test_ifname_valid(); |
878 | ||
c182135d | 879 | test_socket_address_parse(); |
15dca371 | 880 | test_socket_print_unix(); |
c182135d RC |
881 | test_socket_address_parse_netlink(); |
882 | test_socket_address_equal(); | |
883 | test_socket_address_get_path(); | |
43dc0043 RC |
884 | test_socket_address_is(); |
885 | test_socket_address_is_netlink(); | |
059f6c42 | 886 | |
e7639886 | 887 | test_in_addr_is_null(); |
059f6c42 LP |
888 | test_in_addr_prefix_intersect(); |
889 | test_in_addr_prefix_next(); | |
07916bea | 890 | test_in_addr_to_string(); |
2817157b LP |
891 | test_in_addr_ifindex_to_string(); |
892 | test_in_addr_ifindex_from_string_auto(); | |
059f6c42 | 893 | |
43dc0043 RC |
894 | test_sockaddr_equal(); |
895 | ||
fc2fffe7 LP |
896 | test_sockaddr_un_len(); |
897 | ||
1703b203 SS |
898 | test_in_addr_is_multicast(); |
899 | ||
43f2c88d LP |
900 | test_getpeercred_getpeergroups(); |
901 | ||
8a3386ab FB |
902 | test_passfd_read(); |
903 | test_passfd_contents_read(); | |
904 | test_receive_nopassfd(); | |
905 | test_send_nodata_nofd(); | |
906 | test_send_emptydata(); | |
5b116c37 | 907 | test_flush_accept(); |
8a3386ab | 908 | |
059f6c42 | 909 | return 0; |
c182135d | 910 | } |