525 lines
18 KiB
C
525 lines
18 KiB
C
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
|
|
|
#include <fcntl.h>
|
|
#include <grp.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/types.h>
|
|
#include <unistd.h>
|
|
|
|
#include "alloc-util.h"
|
|
#include "async.h"
|
|
#include "escape.h"
|
|
#include "exit-status.h"
|
|
#include "fd-util.h"
|
|
#include "in-addr-util.h"
|
|
#include "io-util.h"
|
|
#include "log.h"
|
|
#include "macro.h"
|
|
#include "process-util.h"
|
|
#include "socket-util.h"
|
|
#include "string-util.h"
|
|
#include "tests.h"
|
|
#include "tmpfile-util.h"
|
|
|
|
assert_cc(SUN_PATH_LEN == 108);
|
|
|
|
static void test_ifname_valid(void) {
|
|
log_info("/* %s */", __func__);
|
|
|
|
assert( ifname_valid("foo"));
|
|
assert( ifname_valid("eth0"));
|
|
|
|
assert(!ifname_valid("0"));
|
|
assert(!ifname_valid("99"));
|
|
assert( ifname_valid("a99"));
|
|
assert( ifname_valid("99a"));
|
|
|
|
assert(!ifname_valid(NULL));
|
|
assert(!ifname_valid(""));
|
|
assert(!ifname_valid(" "));
|
|
assert(!ifname_valid(" foo"));
|
|
assert(!ifname_valid("bar\n"));
|
|
assert(!ifname_valid("."));
|
|
assert(!ifname_valid(".."));
|
|
assert(ifname_valid("foo.bar"));
|
|
assert(!ifname_valid("x:y"));
|
|
|
|
assert( ifname_valid_full("xxxxxxxxxxxxxxx", 0));
|
|
assert(!ifname_valid_full("xxxxxxxxxxxxxxxx", 0));
|
|
assert( ifname_valid_full("xxxxxxxxxxxxxxxx", IFNAME_VALID_ALTERNATIVE));
|
|
assert( ifname_valid_full("xxxxxxxxxxxxxxxx", IFNAME_VALID_ALTERNATIVE));
|
|
assert(!ifname_valid_full("999", IFNAME_VALID_ALTERNATIVE));
|
|
assert( ifname_valid_full("999", IFNAME_VALID_ALTERNATIVE | IFNAME_VALID_NUMERIC));
|
|
assert(!ifname_valid_full("0", IFNAME_VALID_ALTERNATIVE | IFNAME_VALID_NUMERIC));
|
|
}
|
|
|
|
static void test_socket_print_unix_one(const char *in, size_t len_in, const char *expected) {
|
|
_cleanup_free_ char *out = NULL, *c = NULL;
|
|
|
|
assert(len_in <= SUN_PATH_LEN);
|
|
SocketAddress a = { .sockaddr = { .un = { .sun_family = AF_UNIX } },
|
|
.size = offsetof(struct sockaddr_un, sun_path) + len_in,
|
|
.type = SOCK_STREAM,
|
|
};
|
|
memcpy(a.sockaddr.un.sun_path, in, len_in);
|
|
|
|
assert_se(socket_address_print(&a, &out) >= 0);
|
|
assert_se(c = cescape(in));
|
|
log_info("\"%s\" → \"%s\" (expect \"%s\")", in, out, expected);
|
|
assert_se(streq(out, expected));
|
|
}
|
|
|
|
static void test_socket_print_unix(void) {
|
|
log_info("/* %s */", __func__);
|
|
|
|
/* Some additional tests for abstract addresses which we don't parse */
|
|
|
|
test_socket_print_unix_one("\0\0\0\0", 4, "@\\000\\000\\000");
|
|
test_socket_print_unix_one("@abs", 5, "@abs");
|
|
test_socket_print_unix_one("\n", 2, "\\n");
|
|
test_socket_print_unix_one("", 1, "<unnamed>");
|
|
test_socket_print_unix_one("\0", 1, "<unnamed>");
|
|
test_socket_print_unix_one("\0_________________________there's 108 characters in this string_____________________________________________", 108,
|
|
"@_________________________there\\'s 108 characters in this string_____________________________________________");
|
|
test_socket_print_unix_one("////////////////////////////////////////////////////////////////////////////////////////////////////////////", 108,
|
|
"////////////////////////////////////////////////////////////////////////////////////////////////////////////");
|
|
test_socket_print_unix_one("\0\a\b\n\255", 6, "@\\a\\b\\n\\255\\000");
|
|
}
|
|
|
|
static void test_sockaddr_equal(void) {
|
|
union sockaddr_union a = {
|
|
.in.sin_family = AF_INET,
|
|
.in.sin_port = 0,
|
|
.in.sin_addr.s_addr = htobe32(INADDR_ANY),
|
|
};
|
|
union sockaddr_union b = {
|
|
.in.sin_family = AF_INET,
|
|
.in.sin_port = 0,
|
|
.in.sin_addr.s_addr = htobe32(INADDR_ANY),
|
|
};
|
|
union sockaddr_union c = {
|
|
.in.sin_family = AF_INET,
|
|
.in.sin_port = 0,
|
|
.in.sin_addr.s_addr = htobe32(1234),
|
|
};
|
|
union sockaddr_union d = {
|
|
.in6.sin6_family = AF_INET6,
|
|
.in6.sin6_port = 0,
|
|
.in6.sin6_addr = IN6ADDR_ANY_INIT,
|
|
};
|
|
union sockaddr_union e = {
|
|
.vm.svm_family = AF_VSOCK,
|
|
.vm.svm_port = 0,
|
|
.vm.svm_cid = VMADDR_CID_ANY,
|
|
};
|
|
|
|
log_info("/* %s */", __func__);
|
|
|
|
assert_se(sockaddr_equal(&a, &a));
|
|
assert_se(sockaddr_equal(&a, &b));
|
|
assert_se(sockaddr_equal(&d, &d));
|
|
assert_se(sockaddr_equal(&e, &e));
|
|
assert_se(!sockaddr_equal(&a, &c));
|
|
assert_se(!sockaddr_equal(&b, &c));
|
|
assert_se(!sockaddr_equal(&a, &e));
|
|
}
|
|
|
|
static void test_sockaddr_un_len(void) {
|
|
log_info("/* %s */", __func__);
|
|
|
|
static const struct sockaddr_un fs = {
|
|
.sun_family = AF_UNIX,
|
|
.sun_path = "/foo/bar/waldo",
|
|
};
|
|
|
|
static const struct sockaddr_un abstract = {
|
|
.sun_family = AF_UNIX,
|
|
.sun_path = "\0foobar",
|
|
};
|
|
|
|
assert_se(SOCKADDR_UN_LEN(fs) == offsetof(struct sockaddr_un, sun_path) + strlen(fs.sun_path) + 1);
|
|
assert_se(SOCKADDR_UN_LEN(abstract) == offsetof(struct sockaddr_un, sun_path) + 1 + strlen(abstract.sun_path + 1));
|
|
}
|
|
|
|
static void test_in_addr_is_multicast(void) {
|
|
union in_addr_union a, b;
|
|
int f;
|
|
|
|
log_info("/* %s */", __func__);
|
|
|
|
assert_se(in_addr_from_string_auto("192.168.3.11", &f, &a) >= 0);
|
|
assert_se(in_addr_is_multicast(f, &a) == 0);
|
|
|
|
assert_se(in_addr_from_string_auto("224.0.0.1", &f, &a) >= 0);
|
|
assert_se(in_addr_is_multicast(f, &a) == 1);
|
|
|
|
assert_se(in_addr_from_string_auto("FF01:0:0:0:0:0:0:1", &f, &b) >= 0);
|
|
assert_se(in_addr_is_multicast(f, &b) == 1);
|
|
|
|
assert_se(in_addr_from_string_auto("2001:db8::c:69b:aeff:fe53:743e", &f, &b) >= 0);
|
|
assert_se(in_addr_is_multicast(f, &b) == 0);
|
|
}
|
|
|
|
static void test_getpeercred_getpeergroups(void) {
|
|
int r;
|
|
|
|
log_info("/* %s */", __func__);
|
|
|
|
r = safe_fork("(getpeercred)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
|
|
assert_se(r >= 0);
|
|
|
|
if (r == 0) {
|
|
static const gid_t gids[] = { 3, 4, 5, 6, 7 };
|
|
gid_t *test_gids;
|
|
size_t n_test_gids;
|
|
uid_t test_uid;
|
|
gid_t test_gid;
|
|
struct ucred ucred;
|
|
int pair[2];
|
|
|
|
if (geteuid() == 0) {
|
|
test_uid = 1;
|
|
test_gid = 2;
|
|
test_gids = (gid_t*) gids;
|
|
n_test_gids = ELEMENTSOF(gids);
|
|
|
|
assert_se(setgroups(n_test_gids, test_gids) >= 0);
|
|
assert_se(setresgid(test_gid, test_gid, test_gid) >= 0);
|
|
assert_se(setresuid(test_uid, test_uid, test_uid) >= 0);
|
|
|
|
} else {
|
|
long ngroups_max;
|
|
|
|
test_uid = getuid();
|
|
test_gid = getgid();
|
|
|
|
ngroups_max = sysconf(_SC_NGROUPS_MAX);
|
|
assert(ngroups_max > 0);
|
|
|
|
test_gids = newa(gid_t, ngroups_max);
|
|
|
|
r = getgroups(ngroups_max, test_gids);
|
|
assert_se(r >= 0);
|
|
n_test_gids = (size_t) r;
|
|
}
|
|
|
|
assert_se(socketpair(AF_UNIX, SOCK_STREAM, 0, pair) >= 0);
|
|
|
|
assert_se(getpeercred(pair[0], &ucred) >= 0);
|
|
|
|
assert_se(ucred.uid == test_uid);
|
|
assert_se(ucred.gid == test_gid);
|
|
assert_se(ucred.pid == getpid_cached());
|
|
|
|
{
|
|
_cleanup_free_ gid_t *peer_groups = NULL;
|
|
|
|
r = getpeergroups(pair[0], &peer_groups);
|
|
assert_se(r >= 0 || IN_SET(r, -EOPNOTSUPP, -ENOPROTOOPT));
|
|
|
|
if (r >= 0) {
|
|
assert_se((size_t) r == n_test_gids);
|
|
assert_se(memcmp(peer_groups, test_gids, sizeof(gid_t) * n_test_gids) == 0);
|
|
}
|
|
}
|
|
|
|
safe_close_pair(pair);
|
|
_exit(EXIT_SUCCESS);
|
|
}
|
|
}
|
|
|
|
static void test_passfd_read(void) {
|
|
static const char file_contents[] = "test contents for passfd";
|
|
_cleanup_close_pair_ int pair[2] = { -1, -1 };
|
|
int r;
|
|
|
|
log_info("/* %s */", __func__);
|
|
|
|
assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0);
|
|
|
|
r = safe_fork("(passfd_read)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
|
|
assert_se(r >= 0);
|
|
|
|
if (r == 0) {
|
|
/* Child */
|
|
char tmpfile[] = "/tmp/test-socket-util-passfd-read-XXXXXX";
|
|
_cleanup_close_ int tmpfd = -1;
|
|
|
|
pair[0] = safe_close(pair[0]);
|
|
|
|
tmpfd = mkostemp_safe(tmpfile);
|
|
assert_se(tmpfd >= 0);
|
|
assert_se(write(tmpfd, file_contents, strlen(file_contents)) == (ssize_t) strlen(file_contents));
|
|
tmpfd = safe_close(tmpfd);
|
|
|
|
tmpfd = open(tmpfile, O_RDONLY);
|
|
assert_se(tmpfd >= 0);
|
|
assert_se(unlink(tmpfile) == 0);
|
|
|
|
assert_se(send_one_fd(pair[1], tmpfd, MSG_DONTWAIT) == 0);
|
|
_exit(EXIT_SUCCESS);
|
|
}
|
|
|
|
/* Parent */
|
|
char buf[64];
|
|
struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1);
|
|
_cleanup_close_ int fd = -1;
|
|
|
|
pair[1] = safe_close(pair[1]);
|
|
|
|
assert_se(receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd) == 0);
|
|
|
|
assert_se(fd >= 0);
|
|
r = read(fd, buf, sizeof(buf)-1);
|
|
assert_se(r >= 0);
|
|
buf[r] = 0;
|
|
assert_se(streq(buf, file_contents));
|
|
}
|
|
|
|
static void test_passfd_contents_read(void) {
|
|
_cleanup_close_pair_ int pair[2] = { -1, -1 };
|
|
static const char file_contents[] = "test contents in the file";
|
|
static const char wire_contents[] = "test contents on the wire";
|
|
int r;
|
|
|
|
log_info("/* %s */", __func__);
|
|
|
|
assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0);
|
|
|
|
r = safe_fork("(passfd_contents_read)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
|
|
assert_se(r >= 0);
|
|
|
|
if (r == 0) {
|
|
/* Child */
|
|
struct iovec iov = IOVEC_INIT_STRING(wire_contents);
|
|
char tmpfile[] = "/tmp/test-socket-util-passfd-contents-read-XXXXXX";
|
|
_cleanup_close_ int tmpfd = -1;
|
|
|
|
pair[0] = safe_close(pair[0]);
|
|
|
|
tmpfd = mkostemp_safe(tmpfile);
|
|
assert_se(tmpfd >= 0);
|
|
assert_se(write(tmpfd, file_contents, strlen(file_contents)) == (ssize_t) strlen(file_contents));
|
|
tmpfd = safe_close(tmpfd);
|
|
|
|
tmpfd = open(tmpfile, O_RDONLY);
|
|
assert_se(tmpfd >= 0);
|
|
assert_se(unlink(tmpfile) == 0);
|
|
|
|
assert_se(send_one_fd_iov(pair[1], tmpfd, &iov, 1, MSG_DONTWAIT) > 0);
|
|
_exit(EXIT_SUCCESS);
|
|
}
|
|
|
|
/* Parent */
|
|
char buf[64];
|
|
struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1);
|
|
_cleanup_close_ int fd = -1;
|
|
ssize_t k;
|
|
|
|
pair[1] = safe_close(pair[1]);
|
|
|
|
k = receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd);
|
|
assert_se(k > 0);
|
|
buf[k] = 0;
|
|
assert_se(streq(buf, wire_contents));
|
|
|
|
assert_se(fd >= 0);
|
|
r = read(fd, buf, sizeof(buf)-1);
|
|
assert_se(r >= 0);
|
|
buf[r] = 0;
|
|
assert_se(streq(buf, file_contents));
|
|
}
|
|
|
|
static void test_receive_nopassfd(void) {
|
|
_cleanup_close_pair_ int pair[2] = { -1, -1 };
|
|
static const char wire_contents[] = "no fd passed here";
|
|
int r;
|
|
|
|
log_info("/* %s */", __func__);
|
|
|
|
assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0);
|
|
|
|
r = safe_fork("(receive_nopassfd)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
|
|
assert_se(r >= 0);
|
|
|
|
if (r == 0) {
|
|
/* Child */
|
|
struct iovec iov = IOVEC_INIT_STRING(wire_contents);
|
|
|
|
pair[0] = safe_close(pair[0]);
|
|
|
|
assert_se(send_one_fd_iov(pair[1], -1, &iov, 1, MSG_DONTWAIT) > 0);
|
|
_exit(EXIT_SUCCESS);
|
|
}
|
|
|
|
/* Parent */
|
|
char buf[64];
|
|
struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1);
|
|
int fd = -999;
|
|
ssize_t k;
|
|
|
|
pair[1] = safe_close(pair[1]);
|
|
|
|
k = receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd);
|
|
assert_se(k > 0);
|
|
buf[k] = 0;
|
|
assert_se(streq(buf, wire_contents));
|
|
|
|
/* no fd passed here, confirm it was reset */
|
|
assert_se(fd == -1);
|
|
}
|
|
|
|
static void test_send_nodata_nofd(void) {
|
|
_cleanup_close_pair_ int pair[2] = { -1, -1 };
|
|
int r;
|
|
|
|
log_info("/* %s */", __func__);
|
|
|
|
assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0);
|
|
|
|
r = safe_fork("(send_nodata_nofd)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
|
|
assert_se(r >= 0);
|
|
|
|
if (r == 0) {
|
|
/* Child */
|
|
pair[0] = safe_close(pair[0]);
|
|
|
|
assert_se(send_one_fd_iov(pair[1], -1, NULL, 0, MSG_DONTWAIT) == -EINVAL);
|
|
_exit(EXIT_SUCCESS);
|
|
}
|
|
|
|
/* Parent */
|
|
char buf[64];
|
|
struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1);
|
|
int fd = -999;
|
|
ssize_t k;
|
|
|
|
pair[1] = safe_close(pair[1]);
|
|
|
|
k = receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd);
|
|
/* recvmsg() will return errno EAGAIN if nothing was sent */
|
|
assert_se(k == -EAGAIN);
|
|
|
|
/* receive_one_fd_iov returned error, so confirm &fd wasn't touched */
|
|
assert_se(fd == -999);
|
|
}
|
|
|
|
static void test_send_emptydata(void) {
|
|
_cleanup_close_pair_ int pair[2] = { -1, -1 };
|
|
int r;
|
|
|
|
log_info("/* %s */", __func__);
|
|
|
|
assert_se(socketpair(AF_UNIX, SOCK_DGRAM, 0, pair) >= 0);
|
|
|
|
r = safe_fork("(send_emptydata)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
|
|
assert_se(r >= 0);
|
|
|
|
if (r == 0) {
|
|
/* Child */
|
|
struct iovec iov = IOVEC_INIT_STRING(""); /* zero-length iov */
|
|
assert_se(iov.iov_len == 0);
|
|
|
|
pair[0] = safe_close(pair[0]);
|
|
|
|
/* This will succeed, since iov is set. */
|
|
assert_se(send_one_fd_iov(pair[1], -1, &iov, 1, MSG_DONTWAIT) == 0);
|
|
_exit(EXIT_SUCCESS);
|
|
}
|
|
|
|
/* Parent */
|
|
char buf[64];
|
|
struct iovec iov = IOVEC_INIT(buf, sizeof(buf)-1);
|
|
int fd = -999;
|
|
ssize_t k;
|
|
|
|
pair[1] = safe_close(pair[1]);
|
|
|
|
k = receive_one_fd_iov(pair[0], &iov, 1, MSG_DONTWAIT, &fd);
|
|
/* receive_one_fd_iov() returns -EIO if an fd is not found and no data was returned. */
|
|
assert_se(k == -EIO);
|
|
|
|
/* receive_one_fd_iov returned error, so confirm &fd wasn't touched */
|
|
assert_se(fd == -999);
|
|
}
|
|
|
|
static void test_flush_accept(void) {
|
|
_cleanup_close_ int listen_stream = -1, listen_dgram = -1, listen_seqpacket = 1, connect_stream = -1, connect_dgram = -1, connect_seqpacket = -1;
|
|
static const union sockaddr_union sa = { .un.sun_family = AF_UNIX };
|
|
union sockaddr_union lsa;
|
|
socklen_t l;
|
|
|
|
listen_stream = socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
|
|
assert_se(listen_stream >= 0);
|
|
|
|
listen_dgram = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
|
|
assert_se(listen_dgram >= 0);
|
|
|
|
listen_seqpacket = socket(AF_UNIX, SOCK_SEQPACKET|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
|
|
assert_se(listen_seqpacket >= 0);
|
|
|
|
assert_se(flush_accept(listen_stream) < 0);
|
|
assert_se(flush_accept(listen_dgram) < 0);
|
|
assert_se(flush_accept(listen_seqpacket) < 0);
|
|
|
|
assert_se(bind(listen_stream, &sa.sa, sizeof(sa_family_t)) >= 0);
|
|
assert_se(bind(listen_dgram, &sa.sa, sizeof(sa_family_t)) >= 0);
|
|
assert_se(bind(listen_seqpacket, &sa.sa, sizeof(sa_family_t)) >= 0);
|
|
|
|
assert_se(flush_accept(listen_stream) < 0);
|
|
assert_se(flush_accept(listen_dgram) < 0);
|
|
assert_se(flush_accept(listen_seqpacket) < 0);
|
|
|
|
assert_se(listen(listen_stream, SOMAXCONN) >= 0);
|
|
assert_se(listen(listen_dgram, SOMAXCONN) < 0);
|
|
assert_se(listen(listen_seqpacket, SOMAXCONN) >= 0);
|
|
|
|
assert_se(flush_accept(listen_stream) >= 0);
|
|
assert_se(flush_accept(listen_dgram) < 0);
|
|
assert_se(flush_accept(listen_seqpacket) >= 0);
|
|
|
|
connect_stream = socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
|
|
assert_se(connect_stream >= 0);
|
|
|
|
connect_dgram = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
|
|
assert_se(connect_dgram >= 0);
|
|
|
|
connect_seqpacket = socket(AF_UNIX, SOCK_SEQPACKET|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
|
|
assert_se(connect_seqpacket >= 0);
|
|
|
|
l = sizeof(lsa);
|
|
assert_se(getsockname(listen_stream, &lsa.sa, &l) >= 0);
|
|
assert_se(connect(connect_stream, &lsa.sa, l) >= 0);
|
|
|
|
l = sizeof(lsa);
|
|
assert_se(getsockname(listen_dgram, &lsa.sa, &l) >= 0);
|
|
assert_se(connect(connect_dgram, &lsa.sa, l) >= 0);
|
|
|
|
l = sizeof(lsa);
|
|
assert_se(getsockname(listen_seqpacket, &lsa.sa, &l) >= 0);
|
|
assert_se(connect(connect_seqpacket, &lsa.sa, l) >= 0);
|
|
|
|
assert_se(flush_accept(listen_stream) >= 0);
|
|
assert_se(flush_accept(listen_dgram) < 0);
|
|
assert_se(flush_accept(listen_seqpacket) >= 0);
|
|
}
|
|
|
|
int main(int argc, char *argv[]) {
|
|
test_setup_logging(LOG_DEBUG);
|
|
|
|
test_ifname_valid();
|
|
test_socket_print_unix();
|
|
test_sockaddr_equal();
|
|
test_sockaddr_un_len();
|
|
test_in_addr_is_multicast();
|
|
test_getpeercred_getpeergroups();
|
|
test_passfd_read();
|
|
test_passfd_contents_read();
|
|
test_receive_nopassfd();
|
|
test_send_nodata_nofd();
|
|
test_send_emptydata();
|
|
test_flush_accept();
|
|
|
|
return 0;
|
|
}
|