2019-04-29 21:25:05 +00:00
|
|
|
// Copyright 2018 The gVisor Authors.
|
2018-12-27 07:51:00 +00:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
#include "test/syscalls/linux/socket_ip_udp_generic.h"
|
|
|
|
|
2020-02-18 23:44:22 +00:00
|
|
|
#include <errno.h>
|
2018-12-27 07:51:00 +00:00
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/tcp.h>
|
2019-04-25 21:56:02 +00:00
|
|
|
#include <poll.h>
|
2018-12-27 07:51:00 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/un.h>
|
|
|
|
|
|
|
|
#include "gtest/gtest.h"
|
|
|
|
#include "test/syscalls/linux/socket_test_util.h"
|
|
|
|
#include "test/util/test_util.h"
|
|
|
|
|
|
|
|
namespace gvisor {
|
|
|
|
namespace testing {
|
|
|
|
|
|
|
|
TEST_P(UDPSocketPairTest, MulticastTTLDefault) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
2019-11-12 22:02:53 +00:00
|
|
|
ASSERT_THAT(getsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_TTL,
|
2018-12-27 07:51:00 +00:00
|
|
|
&get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_P(UDPSocketPairTest, SetUDPMulticastTTLMin) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
constexpr int kMin = 0;
|
|
|
|
EXPECT_THAT(setsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_TTL,
|
|
|
|
&kMin, sizeof(kMin)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
2019-11-12 22:02:53 +00:00
|
|
|
ASSERT_THAT(getsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_TTL,
|
2018-12-27 07:51:00 +00:00
|
|
|
&get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kMin);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_P(UDPSocketPairTest, SetUDPMulticastTTLMax) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
constexpr int kMax = 255;
|
|
|
|
EXPECT_THAT(setsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_TTL,
|
|
|
|
&kMax, sizeof(kMax)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
2019-11-12 22:02:53 +00:00
|
|
|
ASSERT_THAT(getsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_TTL,
|
2018-12-27 07:51:00 +00:00
|
|
|
&get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kMax);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_P(UDPSocketPairTest, SetUDPMulticastTTLNegativeOne) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
constexpr int kArbitrary = 6;
|
|
|
|
EXPECT_THAT(setsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_TTL,
|
|
|
|
&kArbitrary, sizeof(kArbitrary)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
constexpr int kNegOne = -1;
|
|
|
|
EXPECT_THAT(setsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_TTL,
|
|
|
|
&kNegOne, sizeof(kNegOne)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
2019-11-12 22:02:53 +00:00
|
|
|
ASSERT_THAT(getsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_TTL,
|
2018-12-27 07:51:00 +00:00
|
|
|
&get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_P(UDPSocketPairTest, SetUDPMulticastTTLBelowMin) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
constexpr int kBelowMin = -2;
|
|
|
|
EXPECT_THAT(setsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_TTL,
|
|
|
|
&kBelowMin, sizeof(kBelowMin)),
|
|
|
|
SyscallFailsWithErrno(EINVAL));
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_P(UDPSocketPairTest, SetUDPMulticastTTLAboveMax) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
constexpr int kAboveMax = 256;
|
|
|
|
EXPECT_THAT(setsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_TTL,
|
|
|
|
&kAboveMax, sizeof(kAboveMax)),
|
|
|
|
SyscallFailsWithErrno(EINVAL));
|
|
|
|
}
|
|
|
|
|
2019-03-09 04:26:55 +00:00
|
|
|
TEST_P(UDPSocketPairTest, SetUDPMulticastTTLChar) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
constexpr char kArbitrary = 6;
|
|
|
|
EXPECT_THAT(setsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_TTL,
|
|
|
|
&kArbitrary, sizeof(kArbitrary)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
2019-11-12 22:02:53 +00:00
|
|
|
ASSERT_THAT(getsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_TTL,
|
2019-03-09 04:26:55 +00:00
|
|
|
&get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kArbitrary);
|
|
|
|
}
|
|
|
|
|
2019-02-08 07:14:06 +00:00
|
|
|
TEST_P(UDPSocketPairTest, SetEmptyIPAddMembership) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
struct ip_mreqn req = {};
|
2019-03-09 03:04:29 +00:00
|
|
|
EXPECT_THAT(setsockopt(sockets->first_fd(), IPPROTO_IP, IP_ADD_MEMBERSHIP,
|
|
|
|
&req, sizeof(req)),
|
|
|
|
SyscallFailsWithErrno(EINVAL));
|
2019-02-08 07:14:06 +00:00
|
|
|
}
|
|
|
|
|
2019-03-09 04:26:55 +00:00
|
|
|
TEST_P(UDPSocketPairTest, MulticastLoopDefault) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
2019-11-12 22:02:53 +00:00
|
|
|
ASSERT_THAT(getsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_LOOP,
|
2019-03-09 04:26:55 +00:00
|
|
|
&get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOn);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_P(UDPSocketPairTest, SetMulticastLoop) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_LOOP,
|
|
|
|
&kSockOptOff, sizeof(kSockOptOff)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
2019-11-12 22:02:53 +00:00
|
|
|
ASSERT_THAT(getsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_LOOP,
|
2019-03-09 04:26:55 +00:00
|
|
|
&get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOff);
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_LOOP,
|
|
|
|
&kSockOptOn, sizeof(kSockOptOn)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
2019-11-12 22:02:53 +00:00
|
|
|
ASSERT_THAT(getsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_LOOP,
|
2019-03-09 04:26:55 +00:00
|
|
|
&get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOn);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_P(UDPSocketPairTest, SetMulticastLoopChar) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
constexpr char kSockOptOnChar = kSockOptOn;
|
|
|
|
constexpr char kSockOptOffChar = kSockOptOff;
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_LOOP,
|
|
|
|
&kSockOptOffChar, sizeof(kSockOptOffChar)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
2019-11-12 22:02:53 +00:00
|
|
|
ASSERT_THAT(getsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_LOOP,
|
2019-03-09 04:26:55 +00:00
|
|
|
&get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOff);
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_LOOP,
|
|
|
|
&kSockOptOnChar, sizeof(kSockOptOnChar)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
2019-11-12 22:02:53 +00:00
|
|
|
ASSERT_THAT(getsockopt(sockets->first_fd(), IPPROTO_IP, IP_MULTICAST_LOOP,
|
2019-03-09 04:26:55 +00:00
|
|
|
&get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOn);
|
|
|
|
}
|
|
|
|
|
2019-11-12 22:02:53 +00:00
|
|
|
TEST_P(UDPSocketPairTest, ReuseAddrDefault) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
|
|
|
ASSERT_THAT(
|
|
|
|
getsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEADDR, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOff);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_P(UDPSocketPairTest, SetReuseAddr) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
// FIXME(b/129164367): Support SO_REUSEADDR on UDP sockets.
|
|
|
|
SKIP_IF(IsRunningOnGvisor());
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEADDR,
|
|
|
|
&kSockOptOn, sizeof(kSockOptOn)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
|
|
|
ASSERT_THAT(
|
|
|
|
getsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEADDR, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOn);
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEADDR,
|
|
|
|
&kSockOptOff, sizeof(kSockOptOff)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
ASSERT_THAT(
|
|
|
|
getsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEADDR, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOff);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_P(UDPSocketPairTest, ReusePortDefault) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
|
|
|
ASSERT_THAT(
|
|
|
|
getsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEPORT, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOff);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_P(UDPSocketPairTest, SetReusePort) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEPORT,
|
|
|
|
&kSockOptOn, sizeof(kSockOptOn)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
|
|
|
ASSERT_THAT(
|
|
|
|
getsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEPORT, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOn);
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEPORT,
|
|
|
|
&kSockOptOff, sizeof(kSockOptOff)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
ASSERT_THAT(
|
|
|
|
getsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEPORT, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOff);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_P(UDPSocketPairTest, SetReuseAddrReusePort) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
// FIXME(b/129164367): Support SO_REUSEADDR on UDP sockets.
|
|
|
|
SKIP_IF(IsRunningOnGvisor());
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEADDR,
|
|
|
|
&kSockOptOn, sizeof(kSockOptOn)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEPORT,
|
|
|
|
&kSockOptOn, sizeof(kSockOptOn)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
|
|
|
ASSERT_THAT(
|
|
|
|
getsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEADDR, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOn);
|
|
|
|
|
|
|
|
ASSERT_THAT(
|
|
|
|
getsockopt(sockets->first_fd(), SOL_SOCKET, SO_REUSEPORT, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOn);
|
|
|
|
}
|
|
|
|
|
2020-02-13 18:58:47 +00:00
|
|
|
// Test getsockopt for a socket which is not set with IP_PKTINFO option.
|
|
|
|
TEST_P(UDPSocketPairTest, IPPKTINFODefault) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
|
|
|
|
|
|
|
ASSERT_THAT(
|
|
|
|
getsockopt(sockets->first_fd(), SOL_IP, IP_PKTINFO, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOff);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test setsockopt and getsockopt for a socket with IP_PKTINFO option.
|
|
|
|
TEST_P(UDPSocketPairTest, SetAndGetIPPKTINFO) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
int level = SOL_IP;
|
|
|
|
int type = IP_PKTINFO;
|
|
|
|
|
|
|
|
// Check getsockopt before IP_PKTINFO is set.
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), level, type, &kSockOptOn,
|
|
|
|
sizeof(kSockOptOn)),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
|
|
|
|
ASSERT_THAT(getsockopt(sockets->first_fd(), level, type, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get, kSockOptOn);
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), level, type, &kSockOptOff,
|
|
|
|
sizeof(kSockOptOff)),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
|
|
|
|
ASSERT_THAT(getsockopt(sockets->first_fd(), level, type, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get, kSockOptOff);
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
}
|
|
|
|
|
2020-02-18 23:44:22 +00:00
|
|
|
// Holds TOS or TClass information for IPv4 or IPv6 respectively.
|
|
|
|
struct RecvTosOption {
|
|
|
|
int level;
|
|
|
|
int option;
|
|
|
|
};
|
|
|
|
|
|
|
|
RecvTosOption GetRecvTosOption(int domain) {
|
|
|
|
TEST_CHECK(domain == AF_INET || domain == AF_INET6);
|
|
|
|
RecvTosOption opt;
|
|
|
|
switch (domain) {
|
|
|
|
case AF_INET:
|
|
|
|
opt.level = IPPROTO_IP;
|
|
|
|
opt.option = IP_RECVTOS;
|
|
|
|
break;
|
|
|
|
case AF_INET6:
|
|
|
|
opt.level = IPPROTO_IPV6;
|
|
|
|
opt.option = IPV6_RECVTCLASS;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return opt;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure that Receiving TOS or TCLASS is off by default.
|
|
|
|
TEST_P(UDPSocketPairTest, RecvTosDefault) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
RecvTosOption t = GetRecvTosOption(GetParam().domain);
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
|
|
|
ASSERT_THAT(
|
|
|
|
getsockopt(sockets->first_fd(), t.level, t.option, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOff);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test that setting and getting IP_RECVTOS or IPV6_RECVTCLASS works as
|
|
|
|
// expected.
|
|
|
|
TEST_P(UDPSocketPairTest, SetRecvTos) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
RecvTosOption t = GetRecvTosOption(GetParam().domain);
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), t.level, t.option, &kSockOptOff,
|
|
|
|
sizeof(kSockOptOff)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
|
|
|
ASSERT_THAT(
|
|
|
|
getsockopt(sockets->first_fd(), t.level, t.option, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOff);
|
|
|
|
|
|
|
|
ASSERT_THAT(setsockopt(sockets->first_fd(), t.level, t.option, &kSockOptOn,
|
|
|
|
sizeof(kSockOptOn)),
|
|
|
|
SyscallSucceeds());
|
|
|
|
|
|
|
|
ASSERT_THAT(
|
|
|
|
getsockopt(sockets->first_fd(), t.level, t.option, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
EXPECT_EQ(get_len, sizeof(get));
|
|
|
|
EXPECT_EQ(get, kSockOptOn);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test that any socket (including IPv6 only) accepts the IPv4 TOS option: this
|
|
|
|
// mirrors behavior in linux.
|
|
|
|
TEST_P(UDPSocketPairTest, TOSRecvMismatch) {
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
RecvTosOption t = GetRecvTosOption(AF_INET);
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
|
|
|
|
|
|
|
ASSERT_THAT(
|
|
|
|
getsockopt(sockets->first_fd(), t.level, t.option, &get, &get_len),
|
|
|
|
SyscallSucceedsWithValue(0));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test that an IPv4 socket does not support the IPv6 TClass option.
|
|
|
|
TEST_P(UDPSocketPairTest, TClassRecvMismatch) {
|
|
|
|
// This should only test AF_INET sockets for the mismatch behavior.
|
|
|
|
SKIP_IF(GetParam().domain != AF_INET);
|
|
|
|
|
|
|
|
auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair());
|
|
|
|
|
|
|
|
int get = -1;
|
|
|
|
socklen_t get_len = sizeof(get);
|
|
|
|
|
|
|
|
ASSERT_THAT(getsockopt(sockets->first_fd(), IPPROTO_IPV6, IPV6_RECVTCLASS,
|
|
|
|
&get, &get_len),
|
|
|
|
SyscallFailsWithErrno(EOPNOTSUPP));
|
|
|
|
}
|
|
|
|
|
2018-12-27 07:51:00 +00:00
|
|
|
} // namespace testing
|
|
|
|
} // namespace gvisor
|