2017-12-21 13:55:20 +01:00
|
|
|
/*
|
|
|
|
* Tests for util/qemu-sockets.c
|
|
|
|
*
|
|
|
|
* Copyright 2018 Red Hat, Inc.
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "qemu/osdep.h"
|
|
|
|
#include "qemu/sockets.h"
|
|
|
|
#include "qapi/error.h"
|
|
|
|
#include "socket-helpers.h"
|
2017-12-22 12:08:49 +01:00
|
|
|
#include "monitor/monitor.h"
|
2017-12-21 13:55:20 +01:00
|
|
|
|
|
|
|
static void test_fd_is_socket_bad(void)
|
|
|
|
{
|
|
|
|
char *tmp = g_strdup("qemu-test-util-sockets-XXXXXX");
|
|
|
|
int fd = mkstemp(tmp);
|
|
|
|
if (fd != 0) {
|
|
|
|
unlink(tmp);
|
|
|
|
}
|
|
|
|
g_free(tmp);
|
|
|
|
|
|
|
|
g_assert(fd >= 0);
|
|
|
|
|
|
|
|
g_assert(!fd_is_socket(fd));
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_fd_is_socket_good(void)
|
|
|
|
{
|
|
|
|
int fd = qemu_socket(PF_INET, SOCK_STREAM, 0);
|
|
|
|
|
|
|
|
g_assert(fd >= 0);
|
|
|
|
|
|
|
|
g_assert(fd_is_socket(fd));
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
|
2017-12-22 12:08:49 +01:00
|
|
|
static int mon_fd = -1;
|
|
|
|
static const char *mon_fdname;
|
2020-10-05 17:58:44 +02:00
|
|
|
__thread Monitor *cur_mon;
|
2017-12-22 12:08:49 +01:00
|
|
|
|
|
|
|
int monitor_get_fd(Monitor *mon, const char *fdname, Error **errp)
|
|
|
|
{
|
|
|
|
g_assert(cur_mon);
|
|
|
|
g_assert(mon == cur_mon);
|
|
|
|
if (mon_fd == -1 || !g_str_equal(mon_fdname, fdname)) {
|
|
|
|
error_setg(errp, "No fd named %s", fdname);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return dup(mon_fd);
|
|
|
|
}
|
|
|
|
|
2020-08-03 21:14:57 +02:00
|
|
|
/*
|
2020-10-05 17:58:44 +02:00
|
|
|
* Syms of stubs in libqemuutil.a are discarded at .o file
|
|
|
|
* granularity. To replace monitor_get_fd() and monitor_cur(), we
|
|
|
|
* must ensure that we also replace any other symbol that is used in
|
|
|
|
* the binary and would be taken from the same stub object file,
|
2017-12-22 12:08:49 +01:00
|
|
|
* otherwise we get duplicate syms at link time.
|
|
|
|
*/
|
2020-10-05 17:58:44 +02:00
|
|
|
Monitor *monitor_cur(void) { return cur_mon; }
|
2021-03-18 16:55:16 +01:00
|
|
|
Monitor *monitor_set_cur(Coroutine *co, Monitor *mon) { abort(); }
|
2019-04-17 21:06:37 +02:00
|
|
|
int monitor_vprintf(Monitor *mon, const char *fmt, va_list ap) { abort(); }
|
2017-12-22 12:08:49 +01:00
|
|
|
|
2020-09-15 14:13:12 +02:00
|
|
|
#ifndef _WIN32
|
2017-12-22 12:04:30 +01:00
|
|
|
static void test_socket_fd_pass_name_good(void)
|
2017-12-22 12:08:49 +01:00
|
|
|
{
|
|
|
|
SocketAddress addr;
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
cur_mon = g_malloc(1); /* Fake a monitor */
|
|
|
|
mon_fdname = "myfd";
|
|
|
|
mon_fd = qemu_socket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
g_assert_cmpint(mon_fd, >, STDERR_FILENO);
|
|
|
|
|
|
|
|
addr.type = SOCKET_ADDRESS_TYPE_FD;
|
|
|
|
addr.u.fd.str = g_strdup(mon_fdname);
|
|
|
|
|
|
|
|
fd = socket_connect(&addr, &error_abort);
|
|
|
|
g_assert_cmpint(fd, !=, -1);
|
|
|
|
g_assert_cmpint(fd, !=, mon_fd);
|
|
|
|
close(fd);
|
|
|
|
|
2019-08-19 14:48:21 +02:00
|
|
|
fd = socket_listen(&addr, 1, &error_abort);
|
2017-12-22 12:08:49 +01:00
|
|
|
g_assert_cmpint(fd, !=, -1);
|
|
|
|
g_assert_cmpint(fd, !=, mon_fd);
|
|
|
|
close(fd);
|
|
|
|
|
|
|
|
g_free(addr.u.fd.str);
|
|
|
|
mon_fdname = NULL;
|
|
|
|
close(mon_fd);
|
|
|
|
mon_fd = -1;
|
|
|
|
g_free(cur_mon);
|
|
|
|
cur_mon = NULL;
|
|
|
|
}
|
|
|
|
|
2017-12-22 12:04:30 +01:00
|
|
|
static void test_socket_fd_pass_name_bad(void)
|
2017-12-22 12:08:49 +01:00
|
|
|
{
|
|
|
|
SocketAddress addr;
|
|
|
|
Error *err = NULL;
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
cur_mon = g_malloc(1); /* Fake a monitor */
|
|
|
|
mon_fdname = "myfd";
|
|
|
|
mon_fd = dup(STDOUT_FILENO);
|
|
|
|
g_assert_cmpint(mon_fd, >, STDERR_FILENO);
|
|
|
|
|
|
|
|
addr.type = SOCKET_ADDRESS_TYPE_FD;
|
|
|
|
addr.u.fd.str = g_strdup(mon_fdname);
|
|
|
|
|
|
|
|
fd = socket_connect(&addr, &err);
|
|
|
|
g_assert_cmpint(fd, ==, -1);
|
|
|
|
error_free_or_abort(&err);
|
|
|
|
|
2019-08-19 14:48:21 +02:00
|
|
|
fd = socket_listen(&addr, 1, &err);
|
2017-12-22 12:08:49 +01:00
|
|
|
g_assert_cmpint(fd, ==, -1);
|
|
|
|
error_free_or_abort(&err);
|
|
|
|
|
|
|
|
g_free(addr.u.fd.str);
|
|
|
|
mon_fdname = NULL;
|
|
|
|
close(mon_fd);
|
|
|
|
mon_fd = -1;
|
|
|
|
g_free(cur_mon);
|
|
|
|
cur_mon = NULL;
|
|
|
|
}
|
|
|
|
|
2017-12-22 12:04:30 +01:00
|
|
|
static void test_socket_fd_pass_name_nomon(void)
|
|
|
|
{
|
|
|
|
SocketAddress addr;
|
|
|
|
Error *err = NULL;
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
g_assert(cur_mon == NULL);
|
|
|
|
|
|
|
|
addr.type = SOCKET_ADDRESS_TYPE_FD;
|
|
|
|
addr.u.fd.str = g_strdup("myfd");
|
|
|
|
|
|
|
|
fd = socket_connect(&addr, &err);
|
|
|
|
g_assert_cmpint(fd, ==, -1);
|
|
|
|
error_free_or_abort(&err);
|
|
|
|
|
2019-08-19 14:48:21 +02:00
|
|
|
fd = socket_listen(&addr, 1, &err);
|
2017-12-22 12:04:30 +01:00
|
|
|
g_assert_cmpint(fd, ==, -1);
|
|
|
|
error_free_or_abort(&err);
|
|
|
|
|
|
|
|
g_free(addr.u.fd.str);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void test_socket_fd_pass_num_good(void)
|
|
|
|
{
|
|
|
|
SocketAddress addr;
|
|
|
|
int fd, sfd;
|
|
|
|
|
|
|
|
g_assert(cur_mon == NULL);
|
|
|
|
sfd = qemu_socket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
g_assert_cmpint(sfd, >, STDERR_FILENO);
|
|
|
|
|
|
|
|
addr.type = SOCKET_ADDRESS_TYPE_FD;
|
|
|
|
addr.u.fd.str = g_strdup_printf("%d", sfd);
|
|
|
|
|
|
|
|
fd = socket_connect(&addr, &error_abort);
|
|
|
|
g_assert_cmpint(fd, ==, sfd);
|
|
|
|
|
2019-08-19 14:48:21 +02:00
|
|
|
fd = socket_listen(&addr, 1, &error_abort);
|
2017-12-22 12:04:30 +01:00
|
|
|
g_assert_cmpint(fd, ==, sfd);
|
|
|
|
|
|
|
|
g_free(addr.u.fd.str);
|
|
|
|
close(sfd);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_socket_fd_pass_num_bad(void)
|
|
|
|
{
|
|
|
|
SocketAddress addr;
|
|
|
|
Error *err = NULL;
|
|
|
|
int fd, sfd;
|
|
|
|
|
|
|
|
g_assert(cur_mon == NULL);
|
|
|
|
sfd = dup(STDOUT_FILENO);
|
|
|
|
|
|
|
|
addr.type = SOCKET_ADDRESS_TYPE_FD;
|
|
|
|
addr.u.fd.str = g_strdup_printf("%d", sfd);
|
|
|
|
|
|
|
|
fd = socket_connect(&addr, &err);
|
|
|
|
g_assert_cmpint(fd, ==, -1);
|
|
|
|
error_free_or_abort(&err);
|
|
|
|
|
2019-08-19 14:48:21 +02:00
|
|
|
fd = socket_listen(&addr, 1, &err);
|
2017-12-22 12:04:30 +01:00
|
|
|
g_assert_cmpint(fd, ==, -1);
|
|
|
|
error_free_or_abort(&err);
|
|
|
|
|
|
|
|
g_free(addr.u.fd.str);
|
|
|
|
close(sfd);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_socket_fd_pass_num_nocli(void)
|
|
|
|
{
|
|
|
|
SocketAddress addr;
|
|
|
|
Error *err = NULL;
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
cur_mon = g_malloc(1); /* Fake a monitor */
|
|
|
|
|
|
|
|
addr.type = SOCKET_ADDRESS_TYPE_FD;
|
|
|
|
addr.u.fd.str = g_strdup_printf("%d", STDOUT_FILENO);
|
|
|
|
|
|
|
|
fd = socket_connect(&addr, &err);
|
|
|
|
g_assert_cmpint(fd, ==, -1);
|
|
|
|
error_free_or_abort(&err);
|
|
|
|
|
2019-08-19 14:48:21 +02:00
|
|
|
fd = socket_listen(&addr, 1, &err);
|
2017-12-22 12:04:30 +01:00
|
|
|
g_assert_cmpint(fd, ==, -1);
|
|
|
|
error_free_or_abort(&err);
|
|
|
|
|
|
|
|
g_free(addr.u.fd.str);
|
|
|
|
}
|
2020-09-15 14:13:12 +02:00
|
|
|
#endif
|
2017-12-22 12:04:30 +01:00
|
|
|
|
2020-11-02 10:44:22 +01:00
|
|
|
#ifdef CONFIG_LINUX
|
2020-11-02 10:44:17 +01:00
|
|
|
|
|
|
|
#define ABSTRACT_SOCKET_VARIANTS 3
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
SocketAddress *server, *client[ABSTRACT_SOCKET_VARIANTS];
|
|
|
|
bool expect_connect[ABSTRACT_SOCKET_VARIANTS];
|
|
|
|
} abstract_socket_matrix_row;
|
|
|
|
|
2020-05-16 05:13:26 +02:00
|
|
|
static gpointer unix_client_thread_func(gpointer user_data)
|
|
|
|
{
|
2020-11-02 10:44:17 +01:00
|
|
|
abstract_socket_matrix_row *row = user_data;
|
|
|
|
Error *err = NULL;
|
|
|
|
int i, fd;
|
|
|
|
|
|
|
|
for (i = 0; i < ABSTRACT_SOCKET_VARIANTS; i++) {
|
|
|
|
if (row->expect_connect[i]) {
|
|
|
|
fd = socket_connect(row->client[i], &error_abort);
|
|
|
|
g_assert_cmpint(fd, >=, 0);
|
|
|
|
} else {
|
|
|
|
fd = socket_connect(row->client[i], &err);
|
|
|
|
g_assert_cmpint(fd, ==, -1);
|
|
|
|
error_free_or_abort(&err);
|
|
|
|
}
|
|
|
|
close(fd);
|
|
|
|
}
|
2020-05-16 05:13:26 +02:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2020-11-02 10:44:17 +01:00
|
|
|
static void test_socket_unix_abstract_row(abstract_socket_matrix_row *test)
|
2020-11-02 10:44:15 +01:00
|
|
|
{
|
2020-11-02 10:44:17 +01:00
|
|
|
int fd, connfd, i;
|
2020-11-02 10:44:16 +01:00
|
|
|
GThread *cli;
|
|
|
|
struct sockaddr_un un;
|
|
|
|
socklen_t len = sizeof(un);
|
2020-11-02 10:44:15 +01:00
|
|
|
|
2020-11-02 10:44:17 +01:00
|
|
|
/* Last one must connect, or else accept() below hangs */
|
|
|
|
assert(test->expect_connect[ABSTRACT_SOCKET_VARIANTS - 1]);
|
|
|
|
|
|
|
|
fd = socket_listen(test->server, 1, &error_abort);
|
2020-11-02 10:44:16 +01:00
|
|
|
g_assert_cmpint(fd, >=, 0);
|
|
|
|
g_assert(fd_is_socket(fd));
|
2020-11-02 10:44:15 +01:00
|
|
|
|
|
|
|
cli = g_thread_new("abstract_unix_client",
|
|
|
|
unix_client_thread_func,
|
2020-11-02 10:44:17 +01:00
|
|
|
test);
|
|
|
|
|
|
|
|
for (i = 0; i < ABSTRACT_SOCKET_VARIANTS; i++) {
|
|
|
|
if (test->expect_connect[i]) {
|
|
|
|
connfd = accept(fd, (struct sockaddr *)&un, &len);
|
|
|
|
g_assert_cmpint(connfd, !=, -1);
|
|
|
|
close(connfd);
|
|
|
|
}
|
|
|
|
}
|
2020-11-02 10:44:16 +01:00
|
|
|
|
|
|
|
close(fd);
|
2020-11-02 10:44:15 +01:00
|
|
|
g_thread_join(cli);
|
|
|
|
}
|
|
|
|
|
2020-11-02 10:44:17 +01:00
|
|
|
static void test_socket_unix_abstract(void)
|
2020-05-16 05:13:26 +02:00
|
|
|
{
|
2020-11-02 10:44:17 +01:00
|
|
|
SocketAddress addr, addr_tight, addr_padded;
|
|
|
|
abstract_socket_matrix_row matrix[ABSTRACT_SOCKET_VARIANTS] = {
|
|
|
|
{ &addr,
|
|
|
|
{ &addr_tight, &addr_padded, &addr },
|
sockets: Fix default of UnixSocketAddress member @tight
An optional bool member of a QAPI struct can be false, true, or absent.
The previous commit demonstrated that socket_listen() and
socket_connect() are broken for absent @tight, and indeed QMP chardev-
add also defaults absent member @tight to false instead of true.
In C, QAPI members are represented by two fields, has_MEMBER and MEMBER.
We have:
has_MEMBER MEMBER
false true false
true true true
absent false false/ignore
When has_MEMBER is false, MEMBER should be set to false on write, and
ignored on read.
For QMP, the QAPI visitors handle absent @tight by setting both
@has_tight and @tight to false. unix_listen_saddr() and
unix_connect_saddr() however use @tight only, disregarding @has_tight.
This is wrong and means that absent @tight defaults to false whereas it
should default to true.
The same is true for @has_abstract, though @abstract defaults to
false and therefore has the same behavior for all of QMP, HMP and CLI.
Fix unix_listen_saddr() and unix_connect_saddr() to check
@has_abstract/@has_tight, and to default absent @tight to true.
However, this is only half of the story. HMP chardev-add and CLI
-chardev so far correctly defaulted @tight to true, but defaults to
false again with the above fix for HMP and CLI. In fact, the "tight"
and "abstract" options now break completely.
Digging deeper, we find that qemu_chr_parse_socket() also ignores
@has_tight, leaving it false when it sets @tight. That is also wrong,
but the two wrongs cancelled out. Fix qemu_chr_parse_socket() to set
@has_tight and @has_abstract; writing testcases for HMP and CLI is left
for another day.
Fixes: 776b97d3605ed0fc94443048fdf988c7725e38a9
Reported-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
2020-11-02 10:44:18 +01:00
|
|
|
{ true, false, true } },
|
2020-11-02 10:44:17 +01:00
|
|
|
{ &addr_tight,
|
|
|
|
{ &addr_padded, &addr, &addr_tight },
|
sockets: Fix default of UnixSocketAddress member @tight
An optional bool member of a QAPI struct can be false, true, or absent.
The previous commit demonstrated that socket_listen() and
socket_connect() are broken for absent @tight, and indeed QMP chardev-
add also defaults absent member @tight to false instead of true.
In C, QAPI members are represented by two fields, has_MEMBER and MEMBER.
We have:
has_MEMBER MEMBER
false true false
true true true
absent false false/ignore
When has_MEMBER is false, MEMBER should be set to false on write, and
ignored on read.
For QMP, the QAPI visitors handle absent @tight by setting both
@has_tight and @tight to false. unix_listen_saddr() and
unix_connect_saddr() however use @tight only, disregarding @has_tight.
This is wrong and means that absent @tight defaults to false whereas it
should default to true.
The same is true for @has_abstract, though @abstract defaults to
false and therefore has the same behavior for all of QMP, HMP and CLI.
Fix unix_listen_saddr() and unix_connect_saddr() to check
@has_abstract/@has_tight, and to default absent @tight to true.
However, this is only half of the story. HMP chardev-add and CLI
-chardev so far correctly defaulted @tight to true, but defaults to
false again with the above fix for HMP and CLI. In fact, the "tight"
and "abstract" options now break completely.
Digging deeper, we find that qemu_chr_parse_socket() also ignores
@has_tight, leaving it false when it sets @tight. That is also wrong,
but the two wrongs cancelled out. Fix qemu_chr_parse_socket() to set
@has_tight and @has_abstract; writing testcases for HMP and CLI is left
for another day.
Fixes: 776b97d3605ed0fc94443048fdf988c7725e38a9
Reported-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
2020-11-02 10:44:18 +01:00
|
|
|
{ false, true, true } },
|
2020-11-02 10:44:17 +01:00
|
|
|
{ &addr_padded,
|
|
|
|
{ &addr, &addr_tight, &addr_padded },
|
sockets: Fix default of UnixSocketAddress member @tight
An optional bool member of a QAPI struct can be false, true, or absent.
The previous commit demonstrated that socket_listen() and
socket_connect() are broken for absent @tight, and indeed QMP chardev-
add also defaults absent member @tight to false instead of true.
In C, QAPI members are represented by two fields, has_MEMBER and MEMBER.
We have:
has_MEMBER MEMBER
false true false
true true true
absent false false/ignore
When has_MEMBER is false, MEMBER should be set to false on write, and
ignored on read.
For QMP, the QAPI visitors handle absent @tight by setting both
@has_tight and @tight to false. unix_listen_saddr() and
unix_connect_saddr() however use @tight only, disregarding @has_tight.
This is wrong and means that absent @tight defaults to false whereas it
should default to true.
The same is true for @has_abstract, though @abstract defaults to
false and therefore has the same behavior for all of QMP, HMP and CLI.
Fix unix_listen_saddr() and unix_connect_saddr() to check
@has_abstract/@has_tight, and to default absent @tight to true.
However, this is only half of the story. HMP chardev-add and CLI
-chardev so far correctly defaulted @tight to true, but defaults to
false again with the above fix for HMP and CLI. In fact, the "tight"
and "abstract" options now break completely.
Digging deeper, we find that qemu_chr_parse_socket() also ignores
@has_tight, leaving it false when it sets @tight. That is also wrong,
but the two wrongs cancelled out. Fix qemu_chr_parse_socket() to set
@has_tight and @has_abstract; writing testcases for HMP and CLI is left
for another day.
Fixes: 776b97d3605ed0fc94443048fdf988c7725e38a9
Reported-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
2020-11-02 10:44:18 +01:00
|
|
|
{ false, false, true } }
|
2020-11-02 10:44:17 +01:00
|
|
|
};
|
|
|
|
int i;
|
2020-05-16 05:13:26 +02:00
|
|
|
|
2021-12-25 00:45:04 +01:00
|
|
|
i = g_file_open_tmp("unix-XXXXXX", &addr.u.q_unix.path, NULL);
|
|
|
|
g_assert_true(i >= 0);
|
|
|
|
close(i);
|
|
|
|
|
2020-11-02 10:44:14 +01:00
|
|
|
addr.type = SOCKET_ADDRESS_TYPE_UNIX;
|
|
|
|
addr.u.q_unix.has_abstract = true;
|
|
|
|
addr.u.q_unix.abstract = true;
|
|
|
|
addr.u.q_unix.has_tight = false;
|
|
|
|
addr.u.q_unix.tight = false;
|
2020-05-16 05:13:26 +02:00
|
|
|
|
2020-11-02 10:44:17 +01:00
|
|
|
addr_tight = addr;
|
|
|
|
addr_tight.u.q_unix.has_tight = true;
|
|
|
|
addr_tight.u.q_unix.tight = true;
|
|
|
|
|
|
|
|
addr_padded = addr;
|
|
|
|
addr_padded.u.q_unix.has_tight = true;
|
|
|
|
addr_padded.u.q_unix.tight = false;
|
|
|
|
|
|
|
|
for (i = 0; i < ABSTRACT_SOCKET_VARIANTS; i++) {
|
|
|
|
test_socket_unix_abstract_row(&matrix[i]);
|
|
|
|
}
|
2020-05-16 05:13:26 +02:00
|
|
|
|
2024-02-26 09:27:28 +01:00
|
|
|
unlink(addr.u.q_unix.path);
|
2020-11-02 10:44:14 +01:00
|
|
|
g_free(addr.u.q_unix.path);
|
2020-05-16 05:13:26 +02:00
|
|
|
}
|
2020-11-02 10:44:22 +01:00
|
|
|
|
|
|
|
#endif /* CONFIG_LINUX */
|
2017-12-22 12:04:30 +01:00
|
|
|
|
2017-12-21 13:55:20 +01:00
|
|
|
int main(int argc, char **argv)
|
|
|
|
{
|
|
|
|
bool has_ipv4, has_ipv6;
|
|
|
|
|
2020-09-15 14:13:12 +02:00
|
|
|
qemu_init_main_loop(&error_abort);
|
2017-12-21 13:55:20 +01:00
|
|
|
socket_init();
|
|
|
|
|
|
|
|
g_test_init(&argc, &argv, NULL);
|
|
|
|
|
|
|
|
/* We're creating actual IPv4/6 sockets, so we should
|
|
|
|
* check if the host running tests actually supports
|
|
|
|
* each protocol to avoid breaking tests on machines
|
|
|
|
* with either IPv4 or IPv6 disabled.
|
|
|
|
*/
|
|
|
|
if (socket_check_protocol_support(&has_ipv4, &has_ipv6) < 0) {
|
2019-07-09 21:24:46 +02:00
|
|
|
g_printerr("socket_check_protocol_support() failed\n");
|
|
|
|
goto end;
|
2017-12-21 13:55:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (has_ipv4) {
|
|
|
|
g_test_add_func("/util/socket/is-socket/bad",
|
|
|
|
test_fd_is_socket_bad);
|
|
|
|
g_test_add_func("/util/socket/is-socket/good",
|
|
|
|
test_fd_is_socket_good);
|
2020-09-15 14:13:12 +02:00
|
|
|
#ifndef _WIN32
|
2017-12-22 12:04:30 +01:00
|
|
|
g_test_add_func("/socket/fd-pass/name/good",
|
|
|
|
test_socket_fd_pass_name_good);
|
|
|
|
g_test_add_func("/socket/fd-pass/name/bad",
|
|
|
|
test_socket_fd_pass_name_bad);
|
|
|
|
g_test_add_func("/socket/fd-pass/name/nomon",
|
|
|
|
test_socket_fd_pass_name_nomon);
|
|
|
|
g_test_add_func("/socket/fd-pass/num/good",
|
|
|
|
test_socket_fd_pass_num_good);
|
|
|
|
g_test_add_func("/socket/fd-pass/num/bad",
|
|
|
|
test_socket_fd_pass_num_bad);
|
|
|
|
g_test_add_func("/socket/fd-pass/num/nocli",
|
|
|
|
test_socket_fd_pass_num_nocli);
|
2020-09-15 14:13:12 +02:00
|
|
|
#endif
|
2017-12-21 13:55:20 +01:00
|
|
|
}
|
|
|
|
|
2020-11-02 10:44:22 +01:00
|
|
|
#ifdef CONFIG_LINUX
|
2020-11-02 10:44:17 +01:00
|
|
|
g_test_add_func("/util/socket/unix-abstract",
|
|
|
|
test_socket_unix_abstract);
|
2020-05-16 05:13:26 +02:00
|
|
|
#endif
|
|
|
|
|
2019-07-09 21:24:46 +02:00
|
|
|
end:
|
2017-12-21 13:55:20 +01:00
|
|
|
return g_test_run();
|
|
|
|
}
|