Skip to content

Commit 0e75aea

Browse files
committed
selftests/xattr: sockfs socket xattr tests
Test user.* extended attribute operations on sockfs sockets. Sockets created via socket() have their inodes in sockfs, which now supports user.* xattrs with per-inode limits. Tests fsetxattr/fgetxattr/flistxattr/fremovexattr operations including set/get, listing (verifies system.sockprotoname presence), remove, update, XATTR_CREATE/XATTR_REPLACE flags, empty values, size queries, and buffer-too-small errors. Also tests per-inode limit enforcement: maximum 128 xattrs, maximum 128KB total value size, limit recovery after removal, and independent limits across different sockets. Link: https://patch.msgid.link/20260216-work-xattr-socket-v1-13-c2efa4f74cb7@kernel.org Acked-by: Darrick J. Wong <djwong@kernel.org> Reviewed-by: Jan Kara <jack@suse.cz> Signed-off-by: Christian Brauner <brauner@kernel.org>
1 parent 7e28fef commit 0e75aea

3 files changed

Lines changed: 365 additions & 1 deletion

File tree

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1 +1,2 @@
11
xattr_socket_test
2+
xattr_sockfs_test
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# SPDX-License-Identifier: GPL-2.0
22

33
CFLAGS += $(KHDR_INCLUDES)
4-
TEST_GEN_PROGS := xattr_socket_test
4+
TEST_GEN_PROGS := xattr_socket_test xattr_sockfs_test
55

66
include ../../lib.mk
Lines changed: 363 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,363 @@
1+
// SPDX-License-Identifier: GPL-2.0
2+
// Copyright (c) 2026 Christian Brauner <brauner@kernel.org>
3+
/*
4+
* Test extended attributes on sockfs sockets.
5+
*
6+
* Sockets created via socket() have their inodes in sockfs, which supports
7+
* user.* xattrs with per-inode limits: up to 128 xattrs and 128KB total
8+
* value size. These tests verify xattr operations via fsetxattr/fgetxattr/
9+
* flistxattr/fremovexattr on the socket fd, as well as limit enforcement.
10+
*/
11+
12+
#define _GNU_SOURCE
13+
#include <errno.h>
14+
#include <stdio.h>
15+
#include <stdlib.h>
16+
#include <string.h>
17+
#include <sys/socket.h>
18+
#include <sys/types.h>
19+
#include <sys/xattr.h>
20+
#include <unistd.h>
21+
22+
#include "../../kselftest_harness.h"
23+
24+
#define TEST_XATTR_NAME "user.testattr"
25+
#define TEST_XATTR_VALUE "testvalue"
26+
#define TEST_XATTR_VALUE2 "newvalue"
27+
28+
/* Per-inode limits for user.* xattrs on sockfs (from include/linux/xattr.h) */
29+
#define SIMPLE_XATTR_MAX_NR 128
30+
#define SIMPLE_XATTR_MAX_SIZE (128 << 10) /* 128 KB */
31+
32+
#ifndef XATTR_SIZE_MAX
33+
#define XATTR_SIZE_MAX 65536
34+
#endif
35+
36+
/*
37+
* Fixture for sockfs socket xattr tests.
38+
* Creates an AF_UNIX socket (lives in sockfs, not bound to any path).
39+
*/
40+
FIXTURE(xattr_sockfs)
41+
{
42+
int sockfd;
43+
};
44+
45+
FIXTURE_SETUP(xattr_sockfs)
46+
{
47+
self->sockfd = socket(AF_UNIX, SOCK_STREAM, 0);
48+
ASSERT_GE(self->sockfd, 0) {
49+
TH_LOG("Failed to create socket: %s", strerror(errno));
50+
}
51+
}
52+
53+
FIXTURE_TEARDOWN(xattr_sockfs)
54+
{
55+
if (self->sockfd >= 0)
56+
close(self->sockfd);
57+
}
58+
59+
TEST_F(xattr_sockfs, set_get_user_xattr)
60+
{
61+
char buf[256];
62+
ssize_t ret;
63+
64+
ret = fsetxattr(self->sockfd, TEST_XATTR_NAME,
65+
TEST_XATTR_VALUE, strlen(TEST_XATTR_VALUE), 0);
66+
ASSERT_EQ(ret, 0) {
67+
TH_LOG("fsetxattr failed: %s", strerror(errno));
68+
}
69+
70+
memset(buf, 0, sizeof(buf));
71+
ret = fgetxattr(self->sockfd, TEST_XATTR_NAME, buf, sizeof(buf));
72+
ASSERT_EQ(ret, (ssize_t)strlen(TEST_XATTR_VALUE)) {
73+
TH_LOG("fgetxattr returned %zd: %s", ret, strerror(errno));
74+
}
75+
ASSERT_STREQ(buf, TEST_XATTR_VALUE);
76+
}
77+
78+
/*
79+
* Test listing xattrs on a sockfs socket.
80+
* Should include user.* xattrs and system.sockprotoname.
81+
*/
82+
TEST_F(xattr_sockfs, list_user_xattr)
83+
{
84+
char list[4096];
85+
ssize_t ret;
86+
char *ptr;
87+
bool found_user = false;
88+
bool found_proto = false;
89+
90+
ret = fsetxattr(self->sockfd, TEST_XATTR_NAME,
91+
TEST_XATTR_VALUE, strlen(TEST_XATTR_VALUE), 0);
92+
ASSERT_EQ(ret, 0) {
93+
TH_LOG("fsetxattr failed: %s", strerror(errno));
94+
}
95+
96+
memset(list, 0, sizeof(list));
97+
ret = flistxattr(self->sockfd, list, sizeof(list));
98+
ASSERT_GT(ret, 0) {
99+
TH_LOG("flistxattr failed: %s", strerror(errno));
100+
}
101+
102+
for (ptr = list; ptr < list + ret; ptr += strlen(ptr) + 1) {
103+
if (strcmp(ptr, TEST_XATTR_NAME) == 0)
104+
found_user = true;
105+
if (strcmp(ptr, "system.sockprotoname") == 0)
106+
found_proto = true;
107+
}
108+
ASSERT_TRUE(found_user) {
109+
TH_LOG("user xattr not found in list");
110+
}
111+
ASSERT_TRUE(found_proto) {
112+
TH_LOG("system.sockprotoname not found in list");
113+
}
114+
}
115+
116+
TEST_F(xattr_sockfs, remove_user_xattr)
117+
{
118+
char buf[256];
119+
ssize_t ret;
120+
121+
ret = fsetxattr(self->sockfd, TEST_XATTR_NAME,
122+
TEST_XATTR_VALUE, strlen(TEST_XATTR_VALUE), 0);
123+
ASSERT_EQ(ret, 0);
124+
125+
ret = fremovexattr(self->sockfd, TEST_XATTR_NAME);
126+
ASSERT_EQ(ret, 0) {
127+
TH_LOG("fremovexattr failed: %s", strerror(errno));
128+
}
129+
130+
ret = fgetxattr(self->sockfd, TEST_XATTR_NAME, buf, sizeof(buf));
131+
ASSERT_EQ(ret, -1);
132+
ASSERT_EQ(errno, ENODATA);
133+
}
134+
135+
TEST_F(xattr_sockfs, update_user_xattr)
136+
{
137+
char buf[256];
138+
ssize_t ret;
139+
140+
ret = fsetxattr(self->sockfd, TEST_XATTR_NAME,
141+
TEST_XATTR_VALUE, strlen(TEST_XATTR_VALUE), 0);
142+
ASSERT_EQ(ret, 0);
143+
144+
ret = fsetxattr(self->sockfd, TEST_XATTR_NAME,
145+
TEST_XATTR_VALUE2, strlen(TEST_XATTR_VALUE2), 0);
146+
ASSERT_EQ(ret, 0);
147+
148+
memset(buf, 0, sizeof(buf));
149+
ret = fgetxattr(self->sockfd, TEST_XATTR_NAME, buf, sizeof(buf));
150+
ASSERT_EQ(ret, (ssize_t)strlen(TEST_XATTR_VALUE2));
151+
ASSERT_STREQ(buf, TEST_XATTR_VALUE2);
152+
}
153+
154+
TEST_F(xattr_sockfs, xattr_create_flag)
155+
{
156+
int ret;
157+
158+
ret = fsetxattr(self->sockfd, TEST_XATTR_NAME,
159+
TEST_XATTR_VALUE, strlen(TEST_XATTR_VALUE), 0);
160+
ASSERT_EQ(ret, 0);
161+
162+
ret = fsetxattr(self->sockfd, TEST_XATTR_NAME,
163+
TEST_XATTR_VALUE2, strlen(TEST_XATTR_VALUE2),
164+
XATTR_CREATE);
165+
ASSERT_EQ(ret, -1);
166+
ASSERT_EQ(errno, EEXIST);
167+
}
168+
169+
TEST_F(xattr_sockfs, xattr_replace_flag)
170+
{
171+
int ret;
172+
173+
ret = fsetxattr(self->sockfd, TEST_XATTR_NAME,
174+
TEST_XATTR_VALUE, strlen(TEST_XATTR_VALUE),
175+
XATTR_REPLACE);
176+
ASSERT_EQ(ret, -1);
177+
ASSERT_EQ(errno, ENODATA);
178+
}
179+
180+
TEST_F(xattr_sockfs, get_nonexistent)
181+
{
182+
char buf[256];
183+
ssize_t ret;
184+
185+
ret = fgetxattr(self->sockfd, "user.nonexistent", buf, sizeof(buf));
186+
ASSERT_EQ(ret, -1);
187+
ASSERT_EQ(errno, ENODATA);
188+
}
189+
190+
TEST_F(xattr_sockfs, empty_value)
191+
{
192+
ssize_t ret;
193+
194+
ret = fsetxattr(self->sockfd, TEST_XATTR_NAME, "", 0, 0);
195+
ASSERT_EQ(ret, 0);
196+
197+
ret = fgetxattr(self->sockfd, TEST_XATTR_NAME, NULL, 0);
198+
ASSERT_EQ(ret, 0);
199+
}
200+
201+
TEST_F(xattr_sockfs, get_size)
202+
{
203+
ssize_t ret;
204+
205+
ret = fsetxattr(self->sockfd, TEST_XATTR_NAME,
206+
TEST_XATTR_VALUE, strlen(TEST_XATTR_VALUE), 0);
207+
ASSERT_EQ(ret, 0);
208+
209+
ret = fgetxattr(self->sockfd, TEST_XATTR_NAME, NULL, 0);
210+
ASSERT_EQ(ret, (ssize_t)strlen(TEST_XATTR_VALUE));
211+
}
212+
213+
TEST_F(xattr_sockfs, buffer_too_small)
214+
{
215+
char buf[2];
216+
ssize_t ret;
217+
218+
ret = fsetxattr(self->sockfd, TEST_XATTR_NAME,
219+
TEST_XATTR_VALUE, strlen(TEST_XATTR_VALUE), 0);
220+
ASSERT_EQ(ret, 0);
221+
222+
ret = fgetxattr(self->sockfd, TEST_XATTR_NAME, buf, sizeof(buf));
223+
ASSERT_EQ(ret, -1);
224+
ASSERT_EQ(errno, ERANGE);
225+
}
226+
227+
/*
228+
* Test maximum number of user.* xattrs per socket.
229+
* The kernel enforces SIMPLE_XATTR_MAX_NR (128), so the 129th should
230+
* fail with ENOSPC.
231+
*/
232+
TEST_F(xattr_sockfs, max_nr_xattrs)
233+
{
234+
char name[32];
235+
int i, ret;
236+
237+
for (i = 0; i < SIMPLE_XATTR_MAX_NR; i++) {
238+
snprintf(name, sizeof(name), "user.test%03d", i);
239+
ret = fsetxattr(self->sockfd, name, "v", 1, 0);
240+
ASSERT_EQ(ret, 0) {
241+
TH_LOG("fsetxattr %s failed at i=%d: %s",
242+
name, i, strerror(errno));
243+
}
244+
}
245+
246+
ret = fsetxattr(self->sockfd, "user.overflow", "v", 1, 0);
247+
ASSERT_EQ(ret, -1);
248+
ASSERT_EQ(errno, ENOSPC) {
249+
TH_LOG("Expected ENOSPC for xattr %d, got %s",
250+
SIMPLE_XATTR_MAX_NR + 1, strerror(errno));
251+
}
252+
}
253+
254+
/*
255+
* Test maximum total value size for user.* xattrs.
256+
* The kernel enforces SIMPLE_XATTR_MAX_SIZE (128KB). Individual xattr
257+
* values are limited to XATTR_SIZE_MAX (64KB) by the VFS, so we need
258+
* at least two xattrs to hit the total limit.
259+
*/
260+
TEST_F(xattr_sockfs, max_xattr_size)
261+
{
262+
char *value;
263+
int ret;
264+
265+
value = malloc(XATTR_SIZE_MAX);
266+
ASSERT_NE(value, NULL);
267+
memset(value, 'A', XATTR_SIZE_MAX);
268+
269+
/* First 64KB xattr - total = 64KB */
270+
ret = fsetxattr(self->sockfd, "user.big1", value, XATTR_SIZE_MAX, 0);
271+
ASSERT_EQ(ret, 0) {
272+
TH_LOG("first large xattr failed: %s", strerror(errno));
273+
}
274+
275+
/* Second 64KB xattr - total = 128KB (exactly at limit) */
276+
ret = fsetxattr(self->sockfd, "user.big2", value, XATTR_SIZE_MAX, 0);
277+
free(value);
278+
ASSERT_EQ(ret, 0) {
279+
TH_LOG("second large xattr failed: %s", strerror(errno));
280+
}
281+
282+
/* Third xattr with 1 byte - total > 128KB, should fail */
283+
ret = fsetxattr(self->sockfd, "user.big3", "v", 1, 0);
284+
ASSERT_EQ(ret, -1);
285+
ASSERT_EQ(errno, ENOSPC) {
286+
TH_LOG("Expected ENOSPC when exceeding size limit, got %s",
287+
strerror(errno));
288+
}
289+
}
290+
291+
/*
292+
* Test that removing an xattr frees limit space, allowing re-addition.
293+
*/
294+
TEST_F(xattr_sockfs, limit_remove_readd)
295+
{
296+
char name[32];
297+
int i, ret;
298+
299+
/* Fill up to the maximum count */
300+
for (i = 0; i < SIMPLE_XATTR_MAX_NR; i++) {
301+
snprintf(name, sizeof(name), "user.test%03d", i);
302+
ret = fsetxattr(self->sockfd, name, "v", 1, 0);
303+
ASSERT_EQ(ret, 0);
304+
}
305+
306+
/* Verify we're at the limit */
307+
ret = fsetxattr(self->sockfd, "user.overflow", "v", 1, 0);
308+
ASSERT_EQ(ret, -1);
309+
ASSERT_EQ(errno, ENOSPC);
310+
311+
/* Remove one xattr */
312+
ret = fremovexattr(self->sockfd, "user.test000");
313+
ASSERT_EQ(ret, 0);
314+
315+
/* Now we should be able to add one more */
316+
ret = fsetxattr(self->sockfd, "user.newattr", "v", 1, 0);
317+
ASSERT_EQ(ret, 0) {
318+
TH_LOG("re-add after remove failed: %s", strerror(errno));
319+
}
320+
}
321+
322+
/*
323+
* Test that two different sockets have independent xattr limits.
324+
*/
325+
TEST_F(xattr_sockfs, limits_per_inode)
326+
{
327+
char buf[256];
328+
int sock2;
329+
ssize_t ret;
330+
331+
sock2 = socket(AF_UNIX, SOCK_STREAM, 0);
332+
ASSERT_GE(sock2, 0);
333+
334+
/* Set xattr on first socket */
335+
ret = fsetxattr(self->sockfd, TEST_XATTR_NAME,
336+
TEST_XATTR_VALUE, strlen(TEST_XATTR_VALUE), 0);
337+
ASSERT_EQ(ret, 0);
338+
339+
/* First socket's xattr should not be visible on second socket */
340+
ret = fgetxattr(sock2, TEST_XATTR_NAME, NULL, 0);
341+
ASSERT_EQ(ret, -1);
342+
ASSERT_EQ(errno, ENODATA);
343+
344+
/* Second socket should independently accept xattrs */
345+
ret = fsetxattr(sock2, TEST_XATTR_NAME,
346+
TEST_XATTR_VALUE2, strlen(TEST_XATTR_VALUE2), 0);
347+
ASSERT_EQ(ret, 0);
348+
349+
/* Verify each socket has its own value */
350+
memset(buf, 0, sizeof(buf));
351+
ret = fgetxattr(self->sockfd, TEST_XATTR_NAME, buf, sizeof(buf));
352+
ASSERT_EQ(ret, (ssize_t)strlen(TEST_XATTR_VALUE));
353+
ASSERT_STREQ(buf, TEST_XATTR_VALUE);
354+
355+
memset(buf, 0, sizeof(buf));
356+
ret = fgetxattr(sock2, TEST_XATTR_NAME, buf, sizeof(buf));
357+
ASSERT_EQ(ret, (ssize_t)strlen(TEST_XATTR_VALUE2));
358+
ASSERT_STREQ(buf, TEST_XATTR_VALUE2);
359+
360+
close(sock2);
361+
}
362+
363+
TEST_HARNESS_MAIN

0 commit comments

Comments
 (0)