blob: adfbf4ad31153a96f6980f4240f028b684cf6e6b [file] [log] [blame]
David Pursell0eb8e1b2016-01-14 17:18:27 -08001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17// Tests socket functionality using loopback connections. Requires IPv4 and
David Pursell756e1c82016-01-29 10:39:41 -080018// IPv6 capabilities. These tests assume that no UDP packets are lost, which
19// should be the case for loopback communication, but is not guaranteed.
David Pursell0eb8e1b2016-01-14 17:18:27 -080020
Mark Salyzyn547e0dc2016-10-27 08:04:48 -070021#include <stdio.h>
22#include <stdlib.h>
23#include <sys/socket.h>
24#include <sys/types.h>
25#include <sys/un.h>
David Pursell572bce22016-01-15 14:19:56 -080026#include <time.h>
27
Mark Salyzyn547e0dc2016-10-27 08:04:48 -070028#include <cutils/sockets.h>
David Pursell0eb8e1b2016-01-14 17:18:27 -080029#include <gtest/gtest.h>
30
David Pursell0eb8e1b2016-01-14 17:18:27 -080031// Makes sure the passed sockets are valid, sends data between them, and closes
32// them. Any failures are logged with gtest.
33//
34// On Mac recvfrom() will not fill in the address for TCP sockets, so we need
35// separate logic paths depending on socket type.
36static void TestConnectedSockets(cutils_socket_t server, cutils_socket_t client,
37 int type) {
38 ASSERT_NE(INVALID_SOCKET, server);
39 ASSERT_NE(INVALID_SOCKET, client);
40
David Pursell8385fb22016-01-29 13:49:25 -080041 char buffer[128];
David Pursell0eb8e1b2016-01-14 17:18:27 -080042 sockaddr_storage addr;
43 socklen_t addr_size = sizeof(addr);
44
45 // Send client -> server first to get the UDP client's address.
46 ASSERT_EQ(3, send(client, "foo", 3, 0));
47 if (type == SOCK_DGRAM) {
David Pursell8385fb22016-01-29 13:49:25 -080048 EXPECT_EQ(3, recvfrom(server, buffer, sizeof(buffer), 0,
David Pursell756e1c82016-01-29 10:39:41 -080049 reinterpret_cast<sockaddr*>(&addr), &addr_size));
David Pursell0eb8e1b2016-01-14 17:18:27 -080050 } else {
David Pursell8385fb22016-01-29 13:49:25 -080051 EXPECT_EQ(3, recv(server, buffer, sizeof(buffer), 0));
David Pursell0eb8e1b2016-01-14 17:18:27 -080052 }
53 EXPECT_EQ(0, memcmp(buffer, "foo", 3));
54
55 // Now send server -> client.
56 if (type == SOCK_DGRAM) {
David Pursell756e1c82016-01-29 10:39:41 -080057 ASSERT_EQ(3, sendto(server, "bar", 3, 0,
58 reinterpret_cast<sockaddr*>(&addr), addr_size));
David Pursell0eb8e1b2016-01-14 17:18:27 -080059 } else {
David Pursell756e1c82016-01-29 10:39:41 -080060 ASSERT_EQ(3, send(server, "bar", 3, 0));
David Pursell0eb8e1b2016-01-14 17:18:27 -080061 }
David Pursell8385fb22016-01-29 13:49:25 -080062 EXPECT_EQ(3, recv(client, buffer, sizeof(buffer), 0));
David Pursell0eb8e1b2016-01-14 17:18:27 -080063 EXPECT_EQ(0, memcmp(buffer, "bar", 3));
64
David Pursell8385fb22016-01-29 13:49:25 -080065 // Send multiple buffers using socket_send_buffers().
66 std::string data[] = {"foo", "bar", "12345"};
David Pursellb34e4a02016-02-01 09:42:09 -080067 cutils_socket_buffer_t socket_buffers[] = { {data[0].data(), data[0].length()},
68 {data[1].data(), data[1].length()},
69 {data[2].data(), data[2].length()} };
David Pursell8385fb22016-01-29 13:49:25 -080070 EXPECT_EQ(11, socket_send_buffers(client, socket_buffers, 3));
71 EXPECT_EQ(11, recv(server, buffer, sizeof(buffer), 0));
72 EXPECT_EQ(0, memcmp(buffer, "foobar12345", 11));
73
David Pursell0eb8e1b2016-01-14 17:18:27 -080074 EXPECT_EQ(0, socket_close(server));
75 EXPECT_EQ(0, socket_close(client));
76}
77
David Pursell572bce22016-01-15 14:19:56 -080078// Tests receive timeout. The timing verification logic must be very coarse to
79// make sure different systems can all pass these tests.
80void TestReceiveTimeout(cutils_socket_t sock) {
81 time_t start_time;
82 char buffer[32];
83
84 // Make sure a 20ms timeout completes in 1 second or less.
85 EXPECT_EQ(0, socket_set_receive_timeout(sock, 20));
86 start_time = time(nullptr);
87 EXPECT_EQ(-1, recv(sock, buffer, sizeof(buffer), 0));
88 EXPECT_LE(difftime(time(nullptr), start_time), 1.0);
89
90 // Make sure a 1250ms timeout takes 1 second or more.
91 EXPECT_EQ(0, socket_set_receive_timeout(sock, 1250));
92 start_time = time(nullptr);
93 EXPECT_EQ(-1, recv(sock, buffer, sizeof(buffer), 0));
94 EXPECT_LE(1.0, difftime(time(nullptr), start_time));
95}
96
David Pursell756e1c82016-01-29 10:39:41 -080097// Tests socket_get_local_port().
98TEST(SocketsTest, TestGetLocalPort) {
99 cutils_socket_t server;
100
101 // Check a bunch of ports so that we can ignore any conflicts in case
102 // of ports already being taken, but if a server is able to start up we
103 // should always be able to read its port.
104 for (int port : {10000, 12345, 15999, 20202, 25000}) {
105 for (int type : {SOCK_DGRAM, SOCK_STREAM}) {
106 server = socket_inaddr_any_server(port, SOCK_DGRAM);
107 if (server != INVALID_SOCKET) {
108 EXPECT_EQ(port, socket_get_local_port(server));
109 }
110 socket_close(server);
111 }
112 }
113
114 // Check expected failure for an invalid socket.
115 EXPECT_EQ(-1, socket_get_local_port(INVALID_SOCKET));
116}
117
David Pursell0eb8e1b2016-01-14 17:18:27 -0800118// Tests socket_inaddr_any_server() and socket_network_client() for IPv4 UDP.
119TEST(SocketsTest, TestIpv4UdpLoopback) {
David Pursell756e1c82016-01-29 10:39:41 -0800120 cutils_socket_t server = socket_inaddr_any_server(0, SOCK_DGRAM);
121 cutils_socket_t client = socket_network_client(
122 "127.0.0.1", socket_get_local_port(server), SOCK_DGRAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800123
124 TestConnectedSockets(server, client, SOCK_DGRAM);
125}
126
127// Tests socket_inaddr_any_server() and socket_network_client() for IPv4 TCP.
128TEST(SocketsTest, TestIpv4TcpLoopback) {
David Pursell756e1c82016-01-29 10:39:41 -0800129 cutils_socket_t server = socket_inaddr_any_server(0, SOCK_STREAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800130 ASSERT_NE(INVALID_SOCKET, server);
131
David Pursell756e1c82016-01-29 10:39:41 -0800132 cutils_socket_t client = socket_network_client(
133 "127.0.0.1", socket_get_local_port(server), SOCK_STREAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800134 cutils_socket_t handler = accept(server, nullptr, nullptr);
135 EXPECT_EQ(0, socket_close(server));
136
137 TestConnectedSockets(handler, client, SOCK_STREAM);
138}
139
140// Tests socket_inaddr_any_server() and socket_network_client() for IPv6 UDP.
141TEST(SocketsTest, TestIpv6UdpLoopback) {
David Pursell756e1c82016-01-29 10:39:41 -0800142 cutils_socket_t server = socket_inaddr_any_server(0, SOCK_DGRAM);
143 cutils_socket_t client = socket_network_client(
144 "::1", socket_get_local_port(server), SOCK_DGRAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800145
146 TestConnectedSockets(server, client, SOCK_DGRAM);
147}
148
149// Tests socket_inaddr_any_server() and socket_network_client() for IPv6 TCP.
150TEST(SocketsTest, TestIpv6TcpLoopback) {
David Pursell756e1c82016-01-29 10:39:41 -0800151 cutils_socket_t server = socket_inaddr_any_server(0, SOCK_STREAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800152 ASSERT_NE(INVALID_SOCKET, server);
153
David Pursell756e1c82016-01-29 10:39:41 -0800154 cutils_socket_t client = socket_network_client(
155 "::1", socket_get_local_port(server), SOCK_STREAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800156 cutils_socket_t handler = accept(server, nullptr, nullptr);
157 EXPECT_EQ(0, socket_close(server));
158
159 TestConnectedSockets(handler, client, SOCK_STREAM);
160}
David Pursell572bce22016-01-15 14:19:56 -0800161
162// Tests setting a receive timeout for UDP sockets.
163TEST(SocketsTest, TestUdpReceiveTimeout) {
David Pursell756e1c82016-01-29 10:39:41 -0800164 cutils_socket_t sock = socket_inaddr_any_server(0, SOCK_DGRAM);
David Pursell572bce22016-01-15 14:19:56 -0800165 ASSERT_NE(INVALID_SOCKET, sock);
166
167 TestReceiveTimeout(sock);
168
169 EXPECT_EQ(0, socket_close(sock));
170}
171
172// Tests setting a receive timeout for TCP sockets.
173TEST(SocketsTest, TestTcpReceiveTimeout) {
David Pursell756e1c82016-01-29 10:39:41 -0800174 cutils_socket_t server = socket_inaddr_any_server(0, SOCK_STREAM);
David Pursell572bce22016-01-15 14:19:56 -0800175 ASSERT_NE(INVALID_SOCKET, server);
176
David Pursell756e1c82016-01-29 10:39:41 -0800177 cutils_socket_t client = socket_network_client(
178 "localhost", socket_get_local_port(server), SOCK_STREAM);
David Pursell572bce22016-01-15 14:19:56 -0800179 cutils_socket_t handler = accept(server, nullptr, nullptr);
180 EXPECT_EQ(0, socket_close(server));
181
182 TestReceiveTimeout(handler);
183
184 EXPECT_EQ(0, socket_close(client));
185 EXPECT_EQ(0, socket_close(handler));
186}
David Pursell8385fb22016-01-29 13:49:25 -0800187
188// Tests socket_send_buffers() failure.
189TEST(SocketsTest, TestSocketSendBuffersFailure) {
190 EXPECT_EQ(-1, socket_send_buffers(INVALID_SOCKET, nullptr, 0));
191}
Mark Salyzyn547e0dc2016-10-27 08:04:48 -0700192
Mark Salyzyn44ba1392016-11-04 08:40:30 -0700193#ifndef SOCK_NONBLOCK
194#define SOCK_NONBLOCK 0
195#endif
196
197#ifndef SOCK_CLOEXEC
198#define SOCK_CLOEXEC 0
199#endif
200
Mark Salyzyn547e0dc2016-10-27 08:04:48 -0700201TEST(SocketsTest, android_get_control_socket) {
Mark Salyzyn44ba1392016-11-04 08:40:30 -0700202 static const char key[] = ANDROID_SOCKET_ENV_PREFIX "SocketsTest_android_get_control_socket";
Mark Salyzyn547e0dc2016-10-27 08:04:48 -0700203 static const char* name = key + strlen(ANDROID_SOCKET_ENV_PREFIX);
204
205 EXPECT_EQ(unsetenv(key), 0);
206 EXPECT_EQ(android_get_control_socket(name), -1);
207
208 int fd;
209 ASSERT_GE(fd = socket(PF_UNIX, SOCK_STREAM | SOCK_CLOEXEC | SOCK_NONBLOCK, 0), 0);
Mark Salyzyn44ba1392016-11-04 08:40:30 -0700210#ifdef F_GETFL
211 int flags;
212 ASSERT_GE(flags = fcntl(fd, F_GETFL), 0);
213 ASSERT_GE(fcntl(fd, F_SETFL, flags | O_NONBLOCK), 0);
214#endif
Mark Salyzyn547e0dc2016-10-27 08:04:48 -0700215 EXPECT_EQ(android_get_control_socket(name), -1);
216
217 struct sockaddr_un addr;
218 memset(&addr, 0, sizeof(addr));
219 addr.sun_family = AF_UNIX;
220 snprintf(addr.sun_path, sizeof(addr.sun_path), ANDROID_SOCKET_DIR"/%s", name);
221 unlink(addr.sun_path);
222
223 EXPECT_EQ(bind(fd, (struct sockaddr*)&addr, sizeof(addr)), 0);
224 EXPECT_EQ(android_get_control_socket(name), -1);
225
226 char val[32];
227 snprintf(val, sizeof(val), "%d", fd);
228 EXPECT_EQ(setenv(key, val, true), 0);
229
230 EXPECT_EQ(android_get_control_socket(name), fd);
231 socket_close(fd);
232 EXPECT_EQ(android_get_control_socket(name), -1);
233 EXPECT_EQ(unlink(addr.sun_path), 0);
234 EXPECT_EQ(android_get_control_socket(name), -1);
235 EXPECT_EQ(unsetenv(key), 0);
236 EXPECT_EQ(android_get_control_socket(name), -1);
237}