Loading...
1// SPDX-License-Identifier: GPL-2.0
2#include <test_progs.h>
3#include "udp_limit.skel.h"
4
5#include <sys/types.h>
6#include <sys/socket.h>
7
8void test_udp_limit(void)
9{
10 struct udp_limit *skel;
11 int fd1 = -1, fd2 = -1;
12 int cgroup_fd;
13
14 cgroup_fd = test__join_cgroup("/udp_limit");
15 if (!ASSERT_GE(cgroup_fd, 0, "cg-join"))
16 return;
17
18 skel = udp_limit__open_and_load();
19 if (!ASSERT_OK_PTR(skel, "skel-load"))
20 goto close_cgroup_fd;
21
22 skel->links.sock = bpf_program__attach_cgroup(skel->progs.sock, cgroup_fd);
23 if (!ASSERT_OK_PTR(skel->links.sock, "cg_attach_sock"))
24 goto close_skeleton;
25 skel->links.sock_release = bpf_program__attach_cgroup(skel->progs.sock_release, cgroup_fd);
26 if (!ASSERT_OK_PTR(skel->links.sock_release, "cg_attach_sock_release"))
27 goto close_skeleton;
28
29 /* BPF program enforces a single UDP socket per cgroup,
30 * verify that.
31 */
32 fd1 = socket(AF_INET, SOCK_DGRAM, 0);
33 if (!ASSERT_GE(fd1, 0, "socket(fd1)"))
34 goto close_skeleton;
35
36 fd2 = socket(AF_INET, SOCK_DGRAM, 0);
37 if (!ASSERT_LT(fd2, 0, "socket(fd2)"))
38 goto close_skeleton;
39
40 /* We can reopen again after close. */
41 close(fd1);
42 fd1 = -1;
43
44 fd1 = socket(AF_INET, SOCK_DGRAM, 0);
45 if (!ASSERT_GE(fd1, 0, "socket(fd1-again)"))
46 goto close_skeleton;
47
48 /* Make sure the program was invoked the expected
49 * number of times:
50 * - open fd1 - BPF_CGROUP_INET_SOCK_CREATE
51 * - attempt to openfd2 - BPF_CGROUP_INET_SOCK_CREATE
52 * - close fd1 - BPF_CGROUP_INET_SOCK_RELEASE
53 * - open fd1 again - BPF_CGROUP_INET_SOCK_CREATE
54 */
55 if (!ASSERT_EQ(skel->bss->invocations, 4, "bss-invocations"))
56 goto close_skeleton;
57
58 /* We should still have a single socket in use */
59 if (!ASSERT_EQ(skel->bss->in_use, 1, "bss-in_use"))
60 goto close_skeleton;
61
62close_skeleton:
63 if (fd1 >= 0)
64 close(fd1);
65 if (fd2 >= 0)
66 close(fd2);
67 udp_limit__destroy(skel);
68close_cgroup_fd:
69 close(cgroup_fd);
70}
1// SPDX-License-Identifier: GPL-2.0
2#include <test_progs.h>
3#include "udp_limit.skel.h"
4
5#include <sys/types.h>
6#include <sys/socket.h>
7
8static int duration;
9
10void test_udp_limit(void)
11{
12 struct udp_limit *skel;
13 int fd1 = -1, fd2 = -1;
14 int cgroup_fd;
15
16 cgroup_fd = test__join_cgroup("/udp_limit");
17 if (CHECK(cgroup_fd < 0, "cg-join", "errno %d", errno))
18 return;
19
20 skel = udp_limit__open_and_load();
21 if (CHECK(!skel, "skel-load", "errno %d", errno))
22 goto close_cgroup_fd;
23
24 skel->links.sock = bpf_program__attach_cgroup(skel->progs.sock, cgroup_fd);
25 if (!ASSERT_OK_PTR(skel->links.sock, "cg_attach_sock"))
26 goto close_skeleton;
27 skel->links.sock_release = bpf_program__attach_cgroup(skel->progs.sock_release, cgroup_fd);
28 if (!ASSERT_OK_PTR(skel->links.sock_release, "cg_attach_sock_release"))
29 goto close_skeleton;
30
31 /* BPF program enforces a single UDP socket per cgroup,
32 * verify that.
33 */
34 fd1 = socket(AF_INET, SOCK_DGRAM, 0);
35 if (CHECK(fd1 < 0, "fd1", "errno %d", errno))
36 goto close_skeleton;
37
38 fd2 = socket(AF_INET, SOCK_DGRAM, 0);
39 if (CHECK(fd2 >= 0, "fd2", "errno %d", errno))
40 goto close_skeleton;
41
42 /* We can reopen again after close. */
43 close(fd1);
44 fd1 = -1;
45
46 fd1 = socket(AF_INET, SOCK_DGRAM, 0);
47 if (CHECK(fd1 < 0, "fd1-again", "errno %d", errno))
48 goto close_skeleton;
49
50 /* Make sure the program was invoked the expected
51 * number of times:
52 * - open fd1 - BPF_CGROUP_INET_SOCK_CREATE
53 * - attempt to openfd2 - BPF_CGROUP_INET_SOCK_CREATE
54 * - close fd1 - BPF_CGROUP_INET_SOCK_RELEASE
55 * - open fd1 again - BPF_CGROUP_INET_SOCK_CREATE
56 */
57 if (CHECK(skel->bss->invocations != 4, "bss-invocations",
58 "invocations=%d", skel->bss->invocations))
59 goto close_skeleton;
60
61 /* We should still have a single socket in use */
62 if (CHECK(skel->bss->in_use != 1, "bss-in_use",
63 "in_use=%d", skel->bss->in_use))
64 goto close_skeleton;
65
66close_skeleton:
67 if (fd1 >= 0)
68 close(fd1);
69 if (fd2 >= 0)
70 close(fd2);
71 udp_limit__destroy(skel);
72close_cgroup_fd:
73 close(cgroup_fd);
74}