1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
7 #include "alloc-util.h"
11 #include "in-addr-util.h"
12 #include "iovec-util.h"
14 #include "path-util.h"
16 #include "process-util.h"
17 #include "random-util.h"
19 #include "socket-util.h"
21 #include "tmpfile-util.h"
22 #include "user-util.h"
24 assert_cc(SUN_PATH_LEN
== 108);
27 assert_se( ifname_valid("foo"));
28 assert_se( ifname_valid("eth0"));
30 assert_se(!ifname_valid("0"));
31 assert_se(!ifname_valid("99"));
32 assert_se( ifname_valid("a99"));
33 assert_se( ifname_valid("99a"));
35 assert_se(!ifname_valid(NULL
));
36 assert_se(!ifname_valid(""));
37 assert_se(!ifname_valid(" "));
38 assert_se(!ifname_valid(" foo"));
39 assert_se(!ifname_valid("bar\n"));
40 assert_se(!ifname_valid("."));
41 assert_se(!ifname_valid(".."));
42 assert_se(ifname_valid("foo.bar"));
43 assert_se(!ifname_valid("x:y"));
45 assert_se( ifname_valid_full("xxxxxxxxxxxxxxx", 0));
46 assert_se(!ifname_valid_full("xxxxxxxxxxxxxxxx", 0));
47 assert_se( ifname_valid_full("xxxxxxxxxxxxxxxx", IFNAME_VALID_ALTERNATIVE
));
48 assert_se( ifname_valid_full("xxxxxxxxxxxxxxxx", IFNAME_VALID_ALTERNATIVE
));
49 assert_se(!ifname_valid_full("999", IFNAME_VALID_ALTERNATIVE
));
50 assert_se( ifname_valid_full("999", IFNAME_VALID_ALTERNATIVE
| IFNAME_VALID_NUMERIC
));
51 assert_se(!ifname_valid_full("0", IFNAME_VALID_ALTERNATIVE
| IFNAME_VALID_NUMERIC
));
54 static void test_socket_print_unix_one(const char *in
, size_t len_in
, const char *expected
) {
55 _cleanup_free_
char *out
= NULL
, *c
= NULL
;
57 assert_se(len_in
<= SUN_PATH_LEN
);
58 SocketAddress a
= { .sockaddr
= { .un
= { .sun_family
= AF_UNIX
} },
59 .size
= offsetof(struct sockaddr_un
, sun_path
) + len_in
,
62 memcpy(a
.sockaddr
.un
.sun_path
, in
, len_in
);
64 assert_se(socket_address_print(&a
, &out
) >= 0);
65 assert_se(c
= cescape(in
));
66 log_info("\"%s\" → \"%s\" (expect \"%s\")", in
, out
, expected
);
67 ASSERT_STREQ(out
, expected
);
70 TEST(socket_print_unix
) {
71 /* Some additional tests for abstract addresses which we don't parse */
73 test_socket_print_unix_one("\0\0\0\0", 4, "@\\000\\000\\000");
74 test_socket_print_unix_one("@abs", 5, "@abs");
75 test_socket_print_unix_one("\n", 2, "\\n");
76 test_socket_print_unix_one("", 1, "<unnamed>");
77 test_socket_print_unix_one("\0", 1, "<unnamed>");
78 test_socket_print_unix_one("\0_________________________there's 108 characters in this string_____________________________________________", 108,
79 "@_________________________there\\'s 108 characters in this string_____________________________________________");
80 test_socket_print_unix_one("////////////////////////////////////////////////////////////////////////////////////////////////////////////", 108,
81 "////////////////////////////////////////////////////////////////////////////////////////////////////////////");
82 test_socket_print_unix_one("\0\a\b\n\255", 6, "@\\a\\b\\n\\255\\000");
85 TEST(sockaddr_equal
) {
86 union sockaddr_union a
= {
87 .in
.sin_family
= AF_INET
,
89 .in
.sin_addr
.s_addr
= htobe32(INADDR_ANY
),
91 union sockaddr_union b
= {
92 .in
.sin_family
= AF_INET
,
94 .in
.sin_addr
.s_addr
= htobe32(INADDR_ANY
),
96 union sockaddr_union c
= {
97 .in
.sin_family
= AF_INET
,
99 .in
.sin_addr
.s_addr
= htobe32(1234),
101 union sockaddr_union d
= {
102 .in6
.sin6_family
= AF_INET6
,
104 .in6
.sin6_addr
= IN6ADDR_ANY_INIT
,
106 union sockaddr_union e
= {
107 .vm
.svm_family
= AF_VSOCK
,
109 .vm
.svm_cid
= VMADDR_CID_ANY
,
112 assert_se(sockaddr_equal(&a
, &a
));
113 assert_se(sockaddr_equal(&a
, &b
));
114 assert_se(sockaddr_equal(&d
, &d
));
115 assert_se(sockaddr_equal(&e
, &e
));
116 assert_se(!sockaddr_equal(&a
, &c
));
117 assert_se(!sockaddr_equal(&b
, &c
));
118 assert_se(!sockaddr_equal(&a
, &e
));
121 TEST(sockaddr_un_len
) {
122 static const struct sockaddr_un fs
= {
123 .sun_family
= AF_UNIX
,
124 .sun_path
= "/foo/bar/waldo",
127 static const struct sockaddr_un abstract
= {
128 .sun_family
= AF_UNIX
,
129 .sun_path
= "\0foobar",
132 assert_se(sockaddr_un_len(&fs
) == offsetof(struct sockaddr_un
, sun_path
) + strlen(fs
.sun_path
) + 1);
133 assert_se(sockaddr_un_len(&abstract
) == offsetof(struct sockaddr_un
, sun_path
) + 1 + strlen(abstract
.sun_path
+ 1));
136 TEST(in_addr_is_multicast
) {
137 union in_addr_union a
, b
;
140 assert_se(in_addr_from_string_auto("192.168.3.11", &f
, &a
) >= 0);
141 assert_se(in_addr_is_multicast(f
, &a
) == 0);
143 assert_se(in_addr_from_string_auto("224.0.0.1", &f
, &a
) >= 0);
144 assert_se(in_addr_is_multicast(f
, &a
) == 1);
146 assert_se(in_addr_from_string_auto("FF01:0:0:0:0:0:0:1", &f
, &b
) >= 0);
147 assert_se(in_addr_is_multicast(f
, &b
) == 1);
149 assert_se(in_addr_from_string_auto("2001:db8::c:69b:aeff:fe53:743e", &f
, &b
) >= 0);
150 assert_se(in_addr_is_multicast(f
, &b
) == 0);
153 TEST(getpeercred_getpeergroups
) {
156 r
= safe_fork("(getpeercred)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
160 static const gid_t gids
[] = { 3, 4, 5, 6, 7 };
166 int pair
[2] = EBADF_PAIR
;
168 if (geteuid() == 0 && !userns_has_single_user()) {
171 test_gids
= (gid_t
*) gids
;
172 n_test_gids
= ELEMENTSOF(gids
);
174 assert_se(fully_set_uid_gid(test_uid
, test_gid
, test_gids
, n_test_gids
) >= 0);
181 ngroups_max
= sysconf(_SC_NGROUPS_MAX
);
182 assert_se(ngroups_max
> 0);
184 test_gids
= newa(gid_t
, ngroups_max
);
186 r
= getgroups(ngroups_max
, test_gids
);
188 n_test_gids
= (size_t) r
;
191 assert_se(socketpair(AF_UNIX
, SOCK_STREAM
, 0, pair
) >= 0);
193 assert_se(getpeercred(pair
[0], &ucred
) >= 0);
195 assert_se(ucred
.uid
== test_uid
);
196 assert_se(ucred
.gid
== test_gid
);
197 assert_se(ucred
.pid
== getpid_cached());
200 _cleanup_free_ gid_t
*peer_groups
= NULL
;
202 r
= getpeergroups(pair
[0], &peer_groups
);
203 assert_se(r
>= 0 || IN_SET(r
, -EOPNOTSUPP
, -ENOPROTOOPT
));
206 assert_se((size_t) r
== n_test_gids
);
207 assert_se(memcmp(peer_groups
, test_gids
, sizeof(gid_t
) * n_test_gids
) == 0);
211 safe_close_pair(pair
);
217 static const char file_contents
[] = "test contents for passfd";
218 _cleanup_close_pair_
int pair
[2] = EBADF_PAIR
;
221 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
223 r
= safe_fork("(passfd_read)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
228 pair
[0] = safe_close(pair
[0]);
230 char tmpfile
[] = "/tmp/test-socket-util-passfd-read-XXXXXX";
231 assert_se(write_tmpfile(tmpfile
, file_contents
) == 0);
233 _cleanup_close_
int tmpfd
= open(tmpfile
, O_RDONLY
);
234 assert_se(tmpfd
>= 0);
235 assert_se(unlink(tmpfile
) == 0);
237 assert_se(send_one_fd(pair
[1], tmpfd
, MSG_DONTWAIT
) == 0);
243 struct iovec iov
= IOVEC_MAKE(buf
, sizeof(buf
)-1);
244 _cleanup_close_
int fd
= -EBADF
;
246 pair
[1] = safe_close(pair
[1]);
248 assert_se(receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
) == 0);
251 ssize_t n
= read(fd
, buf
, sizeof(buf
)-1);
254 ASSERT_STREQ(buf
, file_contents
);
257 TEST(passfd_contents_read
) {
258 _cleanup_close_pair_
int pair
[2] = EBADF_PAIR
;
259 static const char file_contents
[] = "test contents in the file";
260 static const char wire_contents
[] = "test contents on the wire";
263 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
265 r
= safe_fork("(passfd_contents_read)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
270 struct iovec iov
= IOVEC_MAKE_STRING(wire_contents
);
271 char tmpfile
[] = "/tmp/test-socket-util-passfd-contents-read-XXXXXX";
273 pair
[0] = safe_close(pair
[0]);
275 assert_se(write_tmpfile(tmpfile
, file_contents
) == 0);
277 _cleanup_close_
int tmpfd
= open(tmpfile
, O_RDONLY
);
278 assert_se(tmpfd
>= 0);
279 assert_se(unlink(tmpfile
) == 0);
281 assert_se(send_one_fd_iov(pair
[1], tmpfd
, &iov
, 1, MSG_DONTWAIT
) > 0);
287 struct iovec iov
= IOVEC_MAKE(buf
, sizeof(buf
)-1);
288 _cleanup_close_
int fd
= -EBADF
;
291 pair
[1] = safe_close(pair
[1]);
293 k
= receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
);
296 ASSERT_STREQ(buf
, wire_contents
);
299 r
= read(fd
, buf
, sizeof(buf
)-1);
302 ASSERT_STREQ(buf
, file_contents
);
305 TEST(pass_many_fds_contents_read
) {
306 _cleanup_close_pair_
int pair
[2] = EBADF_PAIR
;
307 static const char file_contents
[][STRLEN("test contents in the fileX") + 1] = {
308 "test contents in the file0",
309 "test contents in the file1",
310 "test contents in the file2"
312 static const char wire_contents
[] = "test contents on the wire";
315 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
317 r
= safe_fork("(passfd_contents_read)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
322 struct iovec iov
= IOVEC_MAKE_STRING(wire_contents
);
323 char tmpfile
[][STRLEN("/tmp/test-socket-util-passfd-contents-read-XXXXXX") + 1] = {
324 "/tmp/test-socket-util-passfd-contents-read-XXXXXX",
325 "/tmp/test-socket-util-passfd-contents-read-XXXXXX",
326 "/tmp/test-socket-util-passfd-contents-read-XXXXXX"
328 int tmpfds
[3] = EBADF_TRIPLET
;
330 pair
[0] = safe_close(pair
[0]);
332 for (size_t i
= 0; i
< 3; ++i
) {
333 assert_se(write_tmpfile(tmpfile
[i
], file_contents
[i
]) == 0);
334 tmpfds
[i
] = open(tmpfile
[i
], O_RDONLY
);
335 assert_se(tmpfds
[i
] >= 0);
336 assert_se(unlink(tmpfile
[i
]) == 0);
339 assert_se(send_many_fds_iov(pair
[1], tmpfds
, 3, &iov
, 1, MSG_DONTWAIT
) > 0);
340 close_many(tmpfds
, 3);
346 struct iovec iov
= IOVEC_MAKE(buf
, sizeof(buf
)-1);
347 _cleanup_free_
int *fds
= NULL
;
351 pair
[1] = safe_close(pair
[1]);
353 k
= receive_many_fds_iov(pair
[0], &iov
, 1, &fds
, &n_fds
, MSG_DONTWAIT
);
356 ASSERT_STREQ(buf
, wire_contents
);
358 assert_se(n_fds
== 3);
360 for (size_t i
= 0; i
< 3; ++i
) {
361 assert_se(fds
[i
] >= 0);
362 r
= read(fds
[i
], buf
, sizeof(buf
)-1);
365 ASSERT_STREQ(buf
, file_contents
[i
]);
370 TEST(receive_nopassfd
) {
371 _cleanup_close_pair_
int pair
[2] = EBADF_PAIR
;
372 static const char wire_contents
[] = "no fd passed here";
375 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
377 r
= safe_fork("(receive_nopassfd)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
382 struct iovec iov
= IOVEC_MAKE_STRING(wire_contents
);
384 pair
[0] = safe_close(pair
[0]);
386 assert_se(send_one_fd_iov(pair
[1], -1, &iov
, 1, MSG_DONTWAIT
) > 0);
392 struct iovec iov
= IOVEC_MAKE(buf
, sizeof(buf
)-1);
396 pair
[1] = safe_close(pair
[1]);
398 k
= receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
);
401 ASSERT_STREQ(buf
, wire_contents
);
403 /* no fd passed here, confirm it was reset */
404 assert_se(fd
== -EBADF
);
407 TEST(send_nodata_nofd
) {
408 _cleanup_close_pair_
int pair
[2] = EBADF_PAIR
;
411 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
413 r
= safe_fork("(send_nodata_nofd)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
418 pair
[0] = safe_close(pair
[0]);
420 assert_se(send_one_fd_iov(pair
[1], -1, NULL
, 0, MSG_DONTWAIT
) == -EINVAL
);
426 struct iovec iov
= IOVEC_MAKE(buf
, sizeof(buf
)-1);
430 pair
[1] = safe_close(pair
[1]);
432 k
= receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
);
433 /* recvmsg() will return errno EAGAIN if nothing was sent */
434 assert_se(k
== -EAGAIN
);
436 /* receive_one_fd_iov returned error, so confirm &fd wasn't touched */
437 assert_se(fd
== -999);
440 TEST(send_emptydata
) {
441 _cleanup_close_pair_
int pair
[2] = EBADF_PAIR
;
444 assert_se(socketpair(AF_UNIX
, SOCK_DGRAM
, 0, pair
) >= 0);
446 r
= safe_fork("(send_emptydata)", FORK_DEATHSIG_SIGTERM
|FORK_LOG
|FORK_WAIT
, NULL
);
451 pair
[0] = safe_close(pair
[0]);
453 /* This will succeed, since iov is set. */
454 assert_se(send_one_fd_iov(pair
[1], -1, &iovec_empty
, 1, MSG_DONTWAIT
) == 0);
460 struct iovec iov
= IOVEC_MAKE(buf
, sizeof(buf
)-1);
464 pair
[1] = safe_close(pair
[1]);
466 k
= receive_one_fd_iov(pair
[0], &iov
, 1, MSG_DONTWAIT
, &fd
);
467 /* receive_one_fd_iov() returns -EIO if an fd is not found and no data was returned. */
468 assert_se(k
== -EIO
);
470 /* receive_one_fd_iov returned error, so confirm &fd wasn't touched */
471 assert_se(fd
== -999);
475 _cleanup_close_
int listen_stream
, listen_dgram
, listen_seqpacket
, connect_stream
, connect_dgram
, connect_seqpacket
;
476 static const union sockaddr_union sa
= { .un
.sun_family
= AF_UNIX
};
477 union sockaddr_union lsa
;
480 listen_stream
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
481 assert_se(listen_stream
>= 0);
483 listen_dgram
= socket(AF_UNIX
, SOCK_DGRAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
484 assert_se(listen_dgram
>= 0);
486 listen_seqpacket
= socket(AF_UNIX
, SOCK_SEQPACKET
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
487 assert_se(listen_seqpacket
>= 0);
489 assert_se(flush_accept(listen_stream
) < 0);
490 assert_se(flush_accept(listen_dgram
) < 0);
491 assert_se(flush_accept(listen_seqpacket
) < 0);
493 assert_se(bind(listen_stream
, &sa
.sa
, sizeof(sa_family_t
)) >= 0);
494 assert_se(bind(listen_dgram
, &sa
.sa
, sizeof(sa_family_t
)) >= 0);
495 assert_se(bind(listen_seqpacket
, &sa
.sa
, sizeof(sa_family_t
)) >= 0);
497 assert_se(flush_accept(listen_stream
) < 0);
498 assert_se(flush_accept(listen_dgram
) < 0);
499 assert_se(flush_accept(listen_seqpacket
) < 0);
501 assert_se(listen(listen_stream
, SOMAXCONN_DELUXE
) >= 0);
502 assert_se(listen(listen_dgram
, SOMAXCONN_DELUXE
) < 0);
503 assert_se(listen(listen_seqpacket
, SOMAXCONN_DELUXE
) >= 0);
505 assert_se(flush_accept(listen_stream
) >= 0);
506 assert_se(flush_accept(listen_dgram
) < 0);
507 assert_se(flush_accept(listen_seqpacket
) >= 0);
509 connect_stream
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
510 assert_se(connect_stream
>= 0);
512 connect_dgram
= socket(AF_UNIX
, SOCK_DGRAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
513 assert_se(connect_dgram
>= 0);
515 connect_seqpacket
= socket(AF_UNIX
, SOCK_SEQPACKET
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
516 assert_se(connect_seqpacket
>= 0);
519 assert_se(getsockname(listen_stream
, &lsa
.sa
, &l
) >= 0);
520 assert_se(connect(connect_stream
, &lsa
.sa
, l
) >= 0);
523 assert_se(getsockname(listen_dgram
, &lsa
.sa
, &l
) >= 0);
524 assert_se(connect(connect_dgram
, &lsa
.sa
, l
) >= 0);
527 assert_se(getsockname(listen_seqpacket
, &lsa
.sa
, &l
) >= 0);
528 assert_se(connect(connect_seqpacket
, &lsa
.sa
, l
) >= 0);
530 assert_se(flush_accept(listen_stream
) >= 0);
531 assert_se(flush_accept(listen_dgram
) < 0);
532 assert_se(flush_accept(listen_seqpacket
) >= 0);
536 log_info("IPv6 supported: %s", yes_no(socket_ipv6_is_supported()));
537 log_info("IPv6 enabled: %s", yes_no(socket_ipv6_is_enabled()));
540 TEST(sockaddr_un_set_path
) {
541 _cleanup_(rm_rf_physical_and_freep
) char *t
= NULL
;
542 _cleanup_(unlink_and_freep
) char *sh
= NULL
;
543 _cleanup_free_
char *j
= NULL
;
544 union sockaddr_union sa
;
545 _cleanup_close_
int fd1
, fd2
, fd3
;
547 assert_se(mkdtemp_malloc("/tmp/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaXXXXXX", &t
) >= 0);
548 assert_se(strlen(t
) > SUN_PATH_LEN
);
550 assert_se(j
= path_join(t
, "sock"));
551 assert_se(sockaddr_un_set_path(&sa
.un
, j
) == -ENAMETOOLONG
); /* too long for AF_UNIX socket */
553 assert_se(asprintf(&sh
, "/tmp/%" PRIx64
, random_u64()) >= 0);
554 assert_se(symlink(t
, sh
) >= 0); /* create temporary symlink, to access it anyway */
557 assert_se(j
= path_join(sh
, "sock"));
558 assert_se(sockaddr_un_set_path(&sa
.un
, j
) >= 0);
560 fd1
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
, 0);
562 assert_se(bind(fd1
, &sa
.sa
, sockaddr_len(&sa
)) >= 0);
563 assert_se(listen(fd1
, 1) >= 0);
565 sh
= unlink_and_free(sh
); /* remove temporary symlink */
567 fd2
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
, 0);
569 assert_se(connect(fd2
, &sa
.sa
, sockaddr_len(&sa
)) < 0);
570 assert_se(errno
== ENOENT
); /* we removed the symlink, must fail */
573 assert_se(j
= path_join(t
, "sock"));
575 fd3
= open(j
, O_CLOEXEC
|O_PATH
|O_NOFOLLOW
);
577 assert_se(sockaddr_un_set_path(&sa
.un
, FORMAT_PROC_FD_PATH(fd3
)) >= 0); /* connect via O_PATH instead, circumventing 108ch limit */
579 assert_se(connect(fd2
, &sa
.sa
, sockaddr_len(&sa
)) >= 0);
582 TEST(getpeerpidref
) {
583 _cleanup_close_pair_
int fd
[2] = EBADF_PAIR
;
585 ASSERT_OK(socketpair(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
, 0, fd
));
587 _cleanup_(pidref_done
) PidRef pidref0
= PIDREF_NULL
, pidref1
= PIDREF_NULL
, pidref_self
= PIDREF_NULL
, pidref_pid1
= PIDREF_NULL
;
588 ASSERT_OK(getpeerpidref(fd
[0], &pidref0
));
589 ASSERT_OK(getpeerpidref(fd
[1], &pidref1
));
591 ASSERT_OK(pidref_set_self(&pidref_self
));
592 ASSERT_OK(pidref_set_pid(&pidref_pid1
, 1));
594 ASSERT_TRUE(pidref_equal(&pidref0
, &pidref1
));
595 ASSERT_TRUE(pidref_equal(&pidref0
, &pidref_self
));
596 ASSERT_TRUE(pidref_equal(&pidref1
, &pidref_self
));
598 ASSERT_TRUE(!pidref_equal(&pidref_self
, &pidref_pid1
));
599 ASSERT_TRUE(!pidref_equal(&pidref1
, &pidref_pid1
));
600 ASSERT_TRUE(!pidref_equal(&pidref0
, &pidref_pid1
));
603 DEFINE_TEST_MAIN(LOG_DEBUG
);