]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/test/test-socket-util.c
Merge pull request #11827 from keszybz/pkgconfig-variables
[thirdparty/systemd.git] / src / test / test-socket-util.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <sys/types.h>
4 #include <unistd.h>
5 #include <grp.h>
6
7 #include "alloc-util.h"
8 #include "async.h"
9 #include "escape.h"
10 #include "exit-status.h"
11 #include "fd-util.h"
12 #include "in-addr-util.h"
13 #include "io-util.h"
14 #include "log.h"
15 #include "macro.h"
16 #include "missing_network.h"
17 #include "process-util.h"
18 #include "socket-util.h"
19 #include "string-util.h"
20 #include "tests.h"
21 #include "tmpfile-util.h"
22 #include "util.h"
23
24 static void test_ifname_valid(void) {
25 log_info("/* %s */", __func__);
26
27 assert(ifname_valid("foo"));
28 assert(ifname_valid("eth0"));
29
30 assert(!ifname_valid("0"));
31 assert(!ifname_valid("99"));
32 assert(ifname_valid("a99"));
33 assert(ifname_valid("99a"));
34
35 assert(!ifname_valid(NULL));
36 assert(!ifname_valid(""));
37 assert(!ifname_valid(" "));
38 assert(!ifname_valid(" foo"));
39 assert(!ifname_valid("bar\n"));
40 assert(!ifname_valid("."));
41 assert(!ifname_valid(".."));
42 assert(ifname_valid("foo.bar"));
43 assert(!ifname_valid("x:y"));
44
45 assert(ifname_valid("xxxxxxxxxxxxxxx"));
46 assert(!ifname_valid("xxxxxxxxxxxxxxxx"));
47 }
48
49 static void test_socket_address_parse_one(const char *in, int ret, int family, const char *expected) {
50 SocketAddress a;
51 _cleanup_free_ char *out = NULL;
52 int r;
53
54 r = socket_address_parse(&a, in);
55 if (r >= 0)
56 assert_se(socket_address_print(&a, &out) >= 0);
57
58 log_info("\"%s\" → %s → \"%s\" (expect \"%s\")", in,
59 r >= 0 ? "✓" : "✗", empty_to_dash(out), r >= 0 ? expected ?: in : "-");
60 assert_se(r == ret);
61 if (r >= 0) {
62 assert_se(a.sockaddr.sa.sa_family == family);
63 assert_se(streq(out, expected ?: in));
64 }
65 }
66
67 #define SUN_PATH_LEN (sizeof(((struct sockaddr_un){}).sun_path))
68 assert_cc(sizeof(((struct sockaddr_un){}).sun_path) == 108);
69
70 static void test_socket_address_parse(void) {
71 log_info("/* %s */", __func__);
72
73 test_socket_address_parse_one("junk", -EINVAL, 0, NULL);
74 test_socket_address_parse_one("192.168.1.1", -EINVAL, 0, NULL);
75 test_socket_address_parse_one(".168.1.1", -EINVAL, 0, NULL);
76 test_socket_address_parse_one("989.168.1.1", -EINVAL, 0, NULL);
77 test_socket_address_parse_one("192.168.1.1:65536", -ERANGE, 0, NULL);
78 test_socket_address_parse_one("192.168.1.1:0", -EINVAL, 0, NULL);
79 test_socket_address_parse_one("0", -EINVAL, 0, NULL);
80 test_socket_address_parse_one("65536", -ERANGE, 0, NULL);
81
82 const int default_family = socket_ipv6_is_supported() ? AF_INET6 : AF_INET;
83
84 test_socket_address_parse_one("65535", 0, default_family, "[::]:65535");
85
86 /* The checks below will pass even if ipv6 is disabled in
87 * kernel. The underlying glibc's inet_pton() is just a string
88 * parser and doesn't make any syscalls. */
89
90 test_socket_address_parse_one("[::1]", -EINVAL, 0, NULL);
91 test_socket_address_parse_one("[::1]8888", -EINVAL, 0, NULL);
92 test_socket_address_parse_one("::1", -EINVAL, 0, NULL);
93 test_socket_address_parse_one("[::1]:0", -EINVAL, 0, NULL);
94 test_socket_address_parse_one("[::1]:65536", -ERANGE, 0, NULL);
95 test_socket_address_parse_one("[a:b:1]:8888", -EINVAL, 0, NULL);
96
97 test_socket_address_parse_one("8888", 0, default_family, "[::]:8888");
98 test_socket_address_parse_one("[2001:0db8:0000:85a3:0000:0000:ac1f:8001]:8888", 0, AF_INET6,
99 "[2001:db8:0:85a3::ac1f:8001]:8888");
100 test_socket_address_parse_one("[::1]:8888", 0, AF_INET6, NULL);
101 test_socket_address_parse_one("192.168.1.254:8888", 0, AF_INET, NULL);
102 test_socket_address_parse_one("/foo/bar", 0, AF_UNIX, NULL);
103 test_socket_address_parse_one("/", 0, AF_UNIX, NULL);
104 test_socket_address_parse_one("@abstract", 0, AF_UNIX, NULL);
105
106 {
107 char aaa[SUN_PATH_LEN + 1] = "@";
108
109 memset(aaa + 1, 'a', SUN_PATH_LEN - 1);
110 char_array_0(aaa);
111
112 test_socket_address_parse_one(aaa, -EINVAL, 0, NULL);
113
114 aaa[SUN_PATH_LEN - 1] = '\0';
115 test_socket_address_parse_one(aaa, 0, AF_UNIX, NULL);
116 }
117
118 test_socket_address_parse_one("vsock:2:1234", 0, AF_VSOCK, NULL);
119 test_socket_address_parse_one("vsock::1234", 0, AF_VSOCK, NULL);
120 test_socket_address_parse_one("vsock:2:1234x", -EINVAL, 0, NULL);
121 test_socket_address_parse_one("vsock:2x:1234", -EINVAL, 0, NULL);
122 test_socket_address_parse_one("vsock:2", -EINVAL, 0, NULL);
123 }
124
125 static void test_socket_print_unix_one(const char *in, size_t len_in, const char *expected) {
126 _cleanup_free_ char *out = NULL, *c = NULL;
127
128 SocketAddress a = { .sockaddr = { .un = { .sun_family = AF_UNIX } },
129 .size = offsetof(struct sockaddr_un, sun_path) + len_in,
130 .type = SOCK_STREAM,
131 };
132 memcpy(a.sockaddr.un.sun_path, in, len_in);
133
134 assert_se(socket_address_print(&a, &out) >= 0);
135 assert_se(c = cescape(in));
136 log_info("\"%s\" \"%s\" (expect \"%s\")", in, out, expected);
137 assert_se(streq(out, expected));
138 }
139
140 static void test_socket_print_unix(void) {
141 log_info("/* %s */", __func__);
142
143 /* Some additional tests for abstract addresses which we don't parse */
144
145 test_socket_print_unix_one("\0\0\0\0", 4, "@\\000\\000\\000");
146 test_socket_print_unix_one("@abs", 5, "@abs");
147 test_socket_print_unix_one("\n", 2, "\\n");
148 test_socket_print_unix_one("", 1, "<unnamed>");
149 test_socket_print_unix_one("\0", 1, "<unnamed>");
150 test_socket_print_unix_one("\0_________________________there's 108 characters in this string_____________________________________________", 108,
151 "@_________________________there\\'s 108 characters in this string_____________________________________________");
152 test_socket_print_unix_one("////////////////////////////////////////////////////////////////////////////////////////////////////////////", 108,
153 "////////////////////////////////////////////////////////////////////////////////////////////////////////////");
154 test_socket_print_unix_one("////////////////////////////////////////////////////////////////////////////////////////////////////////////", 109,
155 "////////////////////////////////////////////////////////////////////////////////////////////////////////////");
156 test_socket_print_unix_one("\0\a\b\n\255", 6, "@\\a\\b\\n\\255\\000");
157 }
158
159 static void test_socket_address_parse_netlink(void) {
160 SocketAddress a;
161
162 log_info("/* %s */", __func__);
163
164 assert_se(socket_address_parse_netlink(&a, "junk") < 0);
165 assert_se(socket_address_parse_netlink(&a, "") < 0);
166
167 assert_se(socket_address_parse_netlink(&a, "route") >= 0);
168 assert_se(a.sockaddr.nl.nl_family == AF_NETLINK);
169 assert_se(a.sockaddr.nl.nl_groups == 0);
170 assert_se(a.protocol == NETLINK_ROUTE);
171 assert_se(socket_address_parse_netlink(&a, "route") >= 0);
172 assert_se(socket_address_parse_netlink(&a, "route 10") >= 0);
173 assert_se(a.sockaddr.nl.nl_family == AF_NETLINK);
174 assert_se(a.sockaddr.nl.nl_groups == 10);
175 assert_se(a.protocol == NETLINK_ROUTE);
176
177 /* With spaces and tabs */
178 assert_se(socket_address_parse_netlink(&a, " kobject-uevent ") >= 0);
179 assert_se(a.sockaddr.nl.nl_family == AF_NETLINK);
180 assert_se(a.sockaddr.nl.nl_groups == 0);
181 assert_se(a.protocol == NETLINK_KOBJECT_UEVENT);
182 assert_se(socket_address_parse_netlink(&a, " \t kobject-uevent \t 10") >= 0);
183 assert_se(a.sockaddr.nl.nl_family == AF_NETLINK);
184 assert_se(a.sockaddr.nl.nl_groups == 10);
185 assert_se(a.protocol == NETLINK_KOBJECT_UEVENT);
186 assert_se(socket_address_parse_netlink(&a, "kobject-uevent\t10") >= 0);
187 assert_se(a.sockaddr.nl.nl_family == AF_NETLINK);
188 assert_se(a.sockaddr.nl.nl_groups == 10);
189 assert_se(a.protocol == NETLINK_KOBJECT_UEVENT);
190
191 /* trailing space is not supported */
192 assert_se(socket_address_parse_netlink(&a, "kobject-uevent\t10 ") < 0);
193
194 /* Group must be unsigned */
195 assert_se(socket_address_parse_netlink(&a, "kobject-uevent -1") < 0);
196
197 /* oss-fuzz #6884 */
198 assert_se(socket_address_parse_netlink(&a, "\xff") < 0);
199 }
200
201 static void test_socket_address_equal(void) {
202 SocketAddress a, b;
203
204 log_info("/* %s */", __func__);
205
206 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
207 assert_se(socket_address_parse(&b, "192.168.1.1:888") >= 0);
208 assert_se(!socket_address_equal(&a, &b));
209
210 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
211 assert_se(socket_address_parse(&b, "192.16.1.1:8888") >= 0);
212 assert_se(!socket_address_equal(&a, &b));
213
214 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
215 assert_se(socket_address_parse(&b, "8888") >= 0);
216 assert_se(!socket_address_equal(&a, &b));
217
218 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
219 assert_se(socket_address_parse(&b, "/foo/bar/") >= 0);
220 assert_se(!socket_address_equal(&a, &b));
221
222 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
223 assert_se(socket_address_parse(&b, "192.168.1.1:8888") >= 0);
224 assert_se(socket_address_equal(&a, &b));
225
226 assert_se(socket_address_parse(&a, "/foo/bar") >= 0);
227 assert_se(socket_address_parse(&b, "/foo/bar") >= 0);
228 assert_se(socket_address_equal(&a, &b));
229
230 assert_se(socket_address_parse(&a, "[::1]:8888") >= 0);
231 assert_se(socket_address_parse(&b, "[::1]:8888") >= 0);
232 assert_se(socket_address_equal(&a, &b));
233
234 assert_se(socket_address_parse(&a, "@abstract") >= 0);
235 assert_se(socket_address_parse(&b, "@abstract") >= 0);
236 assert_se(socket_address_equal(&a, &b));
237
238 assert_se(socket_address_parse_netlink(&a, "firewall") >= 0);
239 assert_se(socket_address_parse_netlink(&b, "firewall") >= 0);
240 assert_se(socket_address_equal(&a, &b));
241
242 assert_se(socket_address_parse(&a, "vsock:2:1234") >= 0);
243 assert_se(socket_address_parse(&b, "vsock:2:1234") >= 0);
244 assert_se(socket_address_equal(&a, &b));
245 assert_se(socket_address_parse(&b, "vsock:2:1235") >= 0);
246 assert_se(!socket_address_equal(&a, &b));
247 assert_se(socket_address_parse(&b, "vsock:3:1234") >= 0);
248 assert_se(!socket_address_equal(&a, &b));
249 }
250
251 static void test_socket_address_get_path(void) {
252 SocketAddress a;
253
254 log_info("/* %s */", __func__);
255
256 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
257 assert_se(!socket_address_get_path(&a));
258
259 assert_se(socket_address_parse(&a, "@abstract") >= 0);
260 assert_se(!socket_address_get_path(&a));
261
262 assert_se(socket_address_parse(&a, "[::1]:8888") >= 0);
263 assert_se(!socket_address_get_path(&a));
264
265 assert_se(socket_address_parse(&a, "/foo/bar") >= 0);
266 assert_se(streq(socket_address_get_path(&a), "/foo/bar"));
267
268 assert_se(socket_address_parse(&a, "vsock:2:1234") >= 0);
269 assert_se(!socket_address_get_path(&a));
270 }
271
272 static void test_socket_address_is(void) {
273 SocketAddress a;
274
275 log_info("/* %s */", __func__);
276
277 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
278 assert_se(socket_address_is(&a, "192.168.1.1:8888", SOCK_STREAM));
279 assert_se(!socket_address_is(&a, "route", SOCK_STREAM));
280 assert_se(!socket_address_is(&a, "192.168.1.1:8888", SOCK_RAW));
281 }
282
283 static void test_socket_address_is_netlink(void) {
284 SocketAddress a;
285
286 log_info("/* %s */", __func__);
287
288 assert_se(socket_address_parse_netlink(&a, "route 10") >= 0);
289 assert_se(socket_address_is_netlink(&a, "route 10"));
290 assert_se(!socket_address_is_netlink(&a, "192.168.1.1:8888"));
291 assert_se(!socket_address_is_netlink(&a, "route 1"));
292 }
293
294 static void test_in_addr_is_null(void) {
295 union in_addr_union i = {};
296
297 log_info("/* %s */", __func__);
298
299 assert_se(in_addr_is_null(AF_INET, &i) == true);
300 assert_se(in_addr_is_null(AF_INET6, &i) == true);
301
302 i.in.s_addr = 0x1000000;
303 assert_se(in_addr_is_null(AF_INET, &i) == false);
304 assert_se(in_addr_is_null(AF_INET6, &i) == false);
305
306 assert_se(in_addr_is_null(-1, &i) == -EAFNOSUPPORT);
307 }
308
309 static void test_in_addr_prefix_intersect_one(unsigned f, const char *a, unsigned apl, const char *b, unsigned bpl, int result) {
310 union in_addr_union ua, ub;
311
312 assert_se(in_addr_from_string(f, a, &ua) >= 0);
313 assert_se(in_addr_from_string(f, b, &ub) >= 0);
314
315 assert_se(in_addr_prefix_intersect(f, &ua, apl, &ub, bpl) == result);
316 }
317
318 static void test_in_addr_prefix_intersect(void) {
319 log_info("/* %s */", __func__);
320
321 test_in_addr_prefix_intersect_one(AF_INET, "255.255.255.255", 32, "255.255.255.254", 32, 0);
322 test_in_addr_prefix_intersect_one(AF_INET, "255.255.255.255", 0, "255.255.255.255", 32, 1);
323 test_in_addr_prefix_intersect_one(AF_INET, "0.0.0.0", 0, "47.11.8.15", 32, 1);
324
325 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 24, "1.1.1.1", 24, 1);
326 test_in_addr_prefix_intersect_one(AF_INET, "2.2.2.2", 24, "1.1.1.1", 24, 0);
327
328 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 24, "1.1.1.127", 25, 1);
329 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 24, "1.1.1.127", 26, 1);
330 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 25, "1.1.1.127", 25, 1);
331 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 25, "1.1.1.255", 25, 0);
332
333 test_in_addr_prefix_intersect_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 128, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:fffe", 128, 0);
334 test_in_addr_prefix_intersect_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 0, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 128, 1);
335 test_in_addr_prefix_intersect_one(AF_INET6, "::", 0, "beef:beef:beef:beef:beef:beef:beef:beef", 128, 1);
336
337 test_in_addr_prefix_intersect_one(AF_INET6, "1::2", 64, "1::2", 64, 1);
338 test_in_addr_prefix_intersect_one(AF_INET6, "2::2", 64, "1::2", 64, 0);
339
340 test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 120, "1::007f", 121, 1);
341 test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 120, "1::007f", 122, 1);
342 test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 121, "1::007f", 121, 1);
343 test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 121, "1::00ff", 121, 0);
344 }
345
346 static void test_in_addr_prefix_next_one(unsigned f, const char *before, unsigned pl, const char *after) {
347 union in_addr_union ubefore, uafter, t;
348
349 assert_se(in_addr_from_string(f, before, &ubefore) >= 0);
350
351 t = ubefore;
352 assert_se((in_addr_prefix_next(f, &t, pl) > 0) == !!after);
353
354 if (after) {
355 assert_se(in_addr_from_string(f, after, &uafter) >= 0);
356 assert_se(in_addr_equal(f, &t, &uafter) > 0);
357 }
358 }
359
360 static void test_in_addr_prefix_next(void) {
361 log_info("/* %s */", __func__);
362
363 test_in_addr_prefix_next_one(AF_INET, "192.168.0.0", 24, "192.168.1.0");
364 test_in_addr_prefix_next_one(AF_INET, "192.168.0.0", 16, "192.169.0.0");
365 test_in_addr_prefix_next_one(AF_INET, "192.168.0.0", 20, "192.168.16.0");
366
367 test_in_addr_prefix_next_one(AF_INET, "0.0.0.0", 32, "0.0.0.1");
368 test_in_addr_prefix_next_one(AF_INET, "255.255.255.255", 32, NULL);
369 test_in_addr_prefix_next_one(AF_INET, "255.255.255.0", 24, NULL);
370
371 test_in_addr_prefix_next_one(AF_INET6, "4400::", 128, "4400::0001");
372 test_in_addr_prefix_next_one(AF_INET6, "4400::", 120, "4400::0100");
373 test_in_addr_prefix_next_one(AF_INET6, "4400::", 127, "4400::0002");
374 test_in_addr_prefix_next_one(AF_INET6, "4400::", 8, "4500::");
375 test_in_addr_prefix_next_one(AF_INET6, "4400::", 7, "4600::");
376
377 test_in_addr_prefix_next_one(AF_INET6, "::", 128, "::1");
378
379 test_in_addr_prefix_next_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 128, NULL);
380 test_in_addr_prefix_next_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ff00", 120, NULL);
381 }
382
383 static void test_in_addr_to_string_one(int f, const char *addr) {
384 union in_addr_union ua;
385 _cleanup_free_ char *r = NULL;
386
387 assert_se(in_addr_from_string(f, addr, &ua) >= 0);
388 assert_se(in_addr_to_string(f, &ua, &r) >= 0);
389 printf("test_in_addr_to_string_one: %s == %s\n", addr, r);
390 assert_se(streq(addr, r));
391 }
392
393 static void test_in_addr_to_string(void) {
394 log_info("/* %s */", __func__);
395
396 test_in_addr_to_string_one(AF_INET, "192.168.0.1");
397 test_in_addr_to_string_one(AF_INET, "10.11.12.13");
398 test_in_addr_to_string_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff");
399 test_in_addr_to_string_one(AF_INET6, "::1");
400 test_in_addr_to_string_one(AF_INET6, "fe80::");
401 }
402
403 static void test_in_addr_ifindex_to_string_one(int f, const char *a, int ifindex, const char *b) {
404 _cleanup_free_ char *r = NULL;
405 union in_addr_union ua, uuaa;
406 int ff, ifindex2;
407
408 assert_se(in_addr_from_string(f, a, &ua) >= 0);
409 assert_se(in_addr_ifindex_to_string(f, &ua, ifindex, &r) >= 0);
410 printf("test_in_addr_ifindex_to_string_one: %s == %s\n", b, r);
411 assert_se(streq(b, r));
412
413 assert_se(in_addr_ifindex_from_string_auto(b, &ff, &uuaa, &ifindex2) >= 0);
414 assert_se(ff == f);
415 assert_se(in_addr_equal(f, &ua, &uuaa));
416 assert_se(ifindex2 == ifindex || ifindex2 == 0);
417 }
418
419 static void test_in_addr_ifindex_to_string(void) {
420 log_info("/* %s */", __func__);
421
422 test_in_addr_ifindex_to_string_one(AF_INET, "192.168.0.1", 7, "192.168.0.1");
423 test_in_addr_ifindex_to_string_one(AF_INET, "10.11.12.13", 9, "10.11.12.13");
424 test_in_addr_ifindex_to_string_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 10, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff");
425 test_in_addr_ifindex_to_string_one(AF_INET6, "::1", 11, "::1");
426 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::", 12, "fe80::%12");
427 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::", 0, "fe80::");
428 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::14", 12, "fe80::14%12");
429 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::15", -7, "fe80::15");
430 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::16", LOOPBACK_IFINDEX, "fe80::16%1");
431 }
432
433 static void test_in_addr_ifindex_from_string_auto(void) {
434 int family, ifindex;
435 union in_addr_union ua;
436
437 log_info("/* %s */", __func__);
438 /* Most in_addr_ifindex_from_string_auto() invocations have already been tested above, but let's test some more */
439
440 assert_se(in_addr_ifindex_from_string_auto("fe80::17", &family, &ua, &ifindex) >= 0);
441 assert_se(family == AF_INET6);
442 assert_se(ifindex == 0);
443
444 assert_se(in_addr_ifindex_from_string_auto("fe80::18%19", &family, &ua, &ifindex) >= 0);
445 assert_se(family == AF_INET6);
446 assert_se(ifindex == 19);
447
448 assert_se(in_addr_ifindex_from_string_auto("fe80::18%lo", &family, &ua, &ifindex) >= 0);
449 assert_se(family == AF_INET6);
450 assert_se(ifindex == LOOPBACK_IFINDEX);
451
452 assert_se(in_addr_ifindex_from_string_auto("fe80::19%thisinterfacecantexist", &family, &ua, &ifindex) == -ENODEV);
453 }
454
455 static void test_sockaddr_equal(void) {
456 union sockaddr_union a = {
457 .in.sin_family = AF_INET,
458 .in.sin_port = 0,
459 .in.sin_addr.s_addr = htobe32(INADDR_ANY),
460 };
461 union sockaddr_union b = {
462 .in.sin_family = AF_INET,
463 .in.sin_port = 0,
464 .in.sin_addr.s_addr = htobe32(INADDR_ANY),
465 };
466 union sockaddr_union c = {
467 .in.sin_family = AF_INET,
468 .in.sin_port = 0,
469 .in.sin_addr.s_addr = htobe32(1234),
470 };
471 union sockaddr_union d = {
472 .in6.sin6_family = AF_INET6,
473 .in6.sin6_port = 0,
474 .in6.sin6_addr = IN6ADDR_ANY_INIT,
475 };
476 union sockaddr_union e = {
477 .vm.svm_family = AF_VSOCK,
478 .vm.svm_port = 0,
479 .vm.svm_cid = VMADDR_CID_ANY,
480 };
481
482 log_info("/* %s */", __func__);
483
484 assert_se(sockaddr_equal(&a, &a));
485 assert_se(sockaddr_equal(&a, &b));
486 assert_se(sockaddr_equal(&d, &d));
487 assert_se(sockaddr_equal(&e, &e));
488 assert_se(!sockaddr_equal(&a, &c));
489 assert_se(!sockaddr_equal(&b, &c));
490 assert_se(!sockaddr_equal(&a, &e));
491 }
492
493 static void test_sockaddr_un_len(void) {
494 log_info("/* %s */", __func__);
495
496 static const struct sockaddr_un fs = {
497 .sun_family = AF_UNIX,
498 .sun_path = "/foo/bar/waldo",
499 };
500
501 static const struct sockaddr_un abstract = {
502 .sun_family = AF_UNIX,
503 .sun_path = "\0foobar",
504 };
505
506 assert_se(SOCKADDR_UN_LEN(fs) == offsetof(struct sockaddr_un, sun_path) + strlen(fs.sun_path) + 1);
507 assert_se(SOCKADDR_UN_LEN(abstract) == offsetof(struct sockaddr_un, sun_path) + 1 + strlen(abstract.sun_path + 1));
508 }
509
510 static void test_in_addr_is_multicast(void) {
511 union in_addr_union a, b;
512 int f;
513
514 log_info("/* %s */", __func__);
515
516 assert_se(in_addr_from_string_auto("192.168.3.11", &f, &a) >= 0);
517 assert_se(in_addr_is_multicast(f, &a) == 0);
518
519 assert_se(in_addr_from_string_auto("224.0.0.1", &f, &a) >= 0);
520 assert_se(in_addr_is_multicast(f, &a) == 1);
521
522 assert_se(in_addr_from_string_auto("FF01:0:0:0:0:0:0:1", &f, &b) >= 0);
523 assert_se(in_addr_is_multicast(f, &b) == 1);
524
525 assert_se(in_addr_from_string_auto("2001:db8::c:69b:aeff:fe53:743e", &f, &b) >= 0);
526 assert_se(in_addr_is_multicast(f, &b) == 0);
527 }
528
529 static void test_getpeercred_getpeergroups(void) {
530 int r;
531
532 log_info("/* %s */", __func__);
533
534 r = safe_fork("(getpeercred)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
535 assert_se(r >= 0);
536
537 if (r == 0) {
538 static const gid_t gids[] = { 3, 4, 5, 6, 7 };
539 gid_t *test_gids;
540 size_t n_test_gids;
541 uid_t test_uid;
542 gid_t test_gid;
543 struct ucred ucred;
544 int pair[2];
545
546 if (geteuid() == 0) {
547 test_uid = 1;
548 test_gid = 2;
549 test_gids = (gid_t*) gids;
550 n_test_gids = ELEMENTSOF(gids);
551
552 assert_se(setgroups(n_test_gids, test_gids) >= 0);
553 assert_se(setresgid(test_gid, test_gid, test_gid) >= 0);
554 assert_se(setresuid(test_uid, test_uid, test_uid) >= 0);
555
556 } else {
557 long ngroups_max;
558
559 test_uid = getuid();
560 test_gid = getgid();
561
562 ngroups_max = sysconf(_SC_NGROUPS_MAX);
563 assert(ngroups_max > 0);
564
565 test_gids = newa(gid_t, ngroups_max);
566
567 r = getgroups(ngroups_max, test_gids);
568 assert_se(r >= 0);
569 n_test_gids = (size_t) r;
570 }
571
572 assert_se(socketpair(AF_UNIX, SOCK_STREAM, 0, pair) >= 0);
573
574 assert_se(getpeercred(pair[0], &ucred) >= 0);
575
576 assert_se(ucred.uid == test_uid);
577 assert_se(ucred.gid == test_gid);
578 assert_se(ucred.pid == getpid_cached());
579
580 {
581 _cleanup_free_ gid_t *peer_groups = NULL;
582
583 r = getpeergroups(pair[0], &peer_groups);
584 assert_se(r >= 0 || IN_SET(r, -EOPNOTSUPP, -ENOPROTOOPT));
585
586 if (r >= 0) {
587 assert_se((size_t) r == n_test_gids);
588 assert_se(memcmp(peer_groups, test_gids, sizeof(gid_t) * n_test_gids) == 0);
589 }
590 }
591
592 safe_close_pair(pair);
593 _exit(EXIT_SUCCESS);
594 }
595 }
596
597 static void test_passfd_read(void) {
598 static const char file_contents[] = "test contents for passfd";
599 _cleanup_close_pair_ int pair[2] = { -1, -1 };
600 int r;
601
602 log_info("/* %s */", __func__);
603
604 assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0);
605
606 r = safe_fork("(passfd_read)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
607 assert_se(r >= 0);
608
609 if (r == 0) {
610 /* Child */
611 char tmpfile[] = "/tmp/test-socket-util-passfd-read-XXXXXX";
612 _cleanup_close_ int tmpfd = -1;
613
614 pair[0] = safe_close(pair[0]);
615
616 tmpfd = mkostemp_safe(tmpfile);
617 assert_se(tmpfd >= 0);
618 assert_se(write(tmpfd, file_contents, strlen(file_contents)) == (ssize_t) strlen(file_contents));
619 tmpfd = safe_close(tmpfd);
620
621 tmpfd = open(tmpfile, O_RDONLY);
622 assert_se(tmpfd >= 0);
623 assert_se(unlink(tmpfile) == 0);
624
625 assert_se(send_one_fd(pair[1], tmpfd, MSG_DONTWAIT) == 0);
626 _exit(EXIT_SUCCESS);
627 }
628
629 /* Parent */
630 char buf[64];
631 struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1);
632 _cleanup_close_ int fd = -1;
633
634 pair[1] = safe_close(pair[1]);
635
636 assert_se(receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd) == 0);
637
638 assert_se(fd >= 0);
639 r = read(fd, buf, sizeof(buf)-1);
640 assert_se(r >= 0);
641 buf[r] = 0;
642 assert_se(streq(buf, file_contents));
643 }
644
645 static void test_passfd_contents_read(void) {
646 _cleanup_close_pair_ int pair[2] = { -1, -1 };
647 static const char file_contents[] = "test contents in the file";
648 static const char wire_contents[] = "test contents on the wire";
649 int r;
650
651 log_info("/* %s */", __func__);
652
653 assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0);
654
655 r = safe_fork("(passfd_contents_read)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
656 assert_se(r >= 0);
657
658 if (r == 0) {
659 /* Child */
660 struct iovec iov = IOVEC_INIT_STRING(wire_contents);
661 char tmpfile[] = "/tmp/test-socket-util-passfd-contents-read-XXXXXX";
662 _cleanup_close_ int tmpfd = -1;
663
664 pair[0] = safe_close(pair[0]);
665
666 tmpfd = mkostemp_safe(tmpfile);
667 assert_se(tmpfd >= 0);
668 assert_se(write(tmpfd, file_contents, strlen(file_contents)) == (ssize_t) strlen(file_contents));
669 tmpfd = safe_close(tmpfd);
670
671 tmpfd = open(tmpfile, O_RDONLY);
672 assert_se(tmpfd >= 0);
673 assert_se(unlink(tmpfile) == 0);
674
675 assert_se(send_one_fd_iov(pair[1], tmpfd, &iov, 1, MSG_DONTWAIT) > 0);
676 _exit(EXIT_SUCCESS);
677 }
678
679 /* Parent */
680 char buf[64];
681 struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1);
682 _cleanup_close_ int fd = -1;
683 ssize_t k;
684
685 pair[1] = safe_close(pair[1]);
686
687 k = receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd);
688 assert_se(k > 0);
689 buf[k] = 0;
690 assert_se(streq(buf, wire_contents));
691
692 assert_se(fd >= 0);
693 r = read(fd, buf, sizeof(buf)-1);
694 assert_se(r >= 0);
695 buf[r] = 0;
696 assert_se(streq(buf, file_contents));
697 }
698
699 static void test_receive_nopassfd(void) {
700 _cleanup_close_pair_ int pair[2] = { -1, -1 };
701 static const char wire_contents[] = "no fd passed here";
702 int r;
703
704 log_info("/* %s */", __func__);
705
706 assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0);
707
708 r = safe_fork("(receive_nopassfd)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
709 assert_se(r >= 0);
710
711 if (r == 0) {
712 /* Child */
713 struct iovec iov = IOVEC_INIT_STRING(wire_contents);
714
715 pair[0] = safe_close(pair[0]);
716
717 assert_se(send_one_fd_iov(pair[1], -1, &iov, 1, MSG_DONTWAIT) > 0);
718 _exit(EXIT_SUCCESS);
719 }
720
721 /* Parent */
722 char buf[64];
723 struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1);
724 int fd = -999;
725 ssize_t k;
726
727 pair[1] = safe_close(pair[1]);
728
729 k = receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd);
730 assert_se(k > 0);
731 buf[k] = 0;
732 assert_se(streq(buf, wire_contents));
733
734 /* no fd passed here, confirm it was reset */
735 assert_se(fd == -1);
736 }
737
738 static void test_send_nodata_nofd(void) {
739 _cleanup_close_pair_ int pair[2] = { -1, -1 };
740 int r;
741
742 log_info("/* %s */", __func__);
743
744 assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0);
745
746 r = safe_fork("(send_nodata_nofd)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
747 assert_se(r >= 0);
748
749 if (r == 0) {
750 /* Child */
751 pair[0] = safe_close(pair[0]);
752
753 assert_se(send_one_fd_iov(pair[1], -1, NULL, 0, MSG_DONTWAIT) == -EINVAL);
754 _exit(EXIT_SUCCESS);
755 }
756
757 /* Parent */
758 char buf[64];
759 struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1);
760 int fd = -999;
761 ssize_t k;
762
763 pair[1] = safe_close(pair[1]);
764
765 k = receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd);
766 /* recvmsg() will return errno EAGAIN if nothing was sent */
767 assert_se(k == -EAGAIN);
768
769 /* receive_one_fd_iov returned error, so confirm &fd wasn't touched */
770 assert_se(fd == -999);
771 }
772
773 static void test_send_emptydata(void) {
774 _cleanup_close_pair_ int pair[2] = { -1, -1 };
775 int r;
776
777 log_info("/* %s */", __func__);
778
779 assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0);
780
781 r = safe_fork("(send_emptydata)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
782 assert_se(r >= 0);
783
784 if (r == 0) {
785 /* Child */
786 struct iovec iov = IOVEC_INIT_STRING(""); /* zero-length iov */
787 assert_se(iov.iov_len == 0);
788
789 pair[0] = safe_close(pair[0]);
790
791 /* This will succeed, since iov is set. */
792 assert_se(send_one_fd_iov(pair[1], -1, &iov, 1, MSG_DONTWAIT) == 0);
793 _exit(EXIT_SUCCESS);
794 }
795
796 /* Parent */
797 char buf[64];
798 struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1);
799 int fd = -999;
800 ssize_t k;
801
802 pair[1] = safe_close(pair[1]);
803
804 k = receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd);
805 /* receive_one_fd_iov() returns -EIO if an fd is not found and no data was returned. */
806 assert_se(k == -EIO);
807
808 /* receive_one_fd_iov returned error, so confirm &fd wasn't touched */
809 assert_se(fd == -999);
810 }
811
812 int main(int argc, char *argv[]) {
813 test_setup_logging(LOG_DEBUG);
814
815 test_ifname_valid();
816
817 test_socket_address_parse();
818 test_socket_print_unix();
819 test_socket_address_parse_netlink();
820 test_socket_address_equal();
821 test_socket_address_get_path();
822 test_socket_address_is();
823 test_socket_address_is_netlink();
824
825 test_in_addr_is_null();
826 test_in_addr_prefix_intersect();
827 test_in_addr_prefix_next();
828 test_in_addr_to_string();
829 test_in_addr_ifindex_to_string();
830 test_in_addr_ifindex_from_string_auto();
831
832 test_sockaddr_equal();
833
834 test_sockaddr_un_len();
835
836 test_in_addr_is_multicast();
837
838 test_getpeercred_getpeergroups();
839
840 test_passfd_read();
841 test_passfd_contents_read();
842 test_receive_nopassfd();
843 test_send_nodata_nofd();
844 test_send_emptydata();
845
846 return 0;
847 }