Loading...
1// SPDX-License-Identifier: GPL-2.0
2#include <test_progs.h>
3#include "udp_limit.skel.h"
4
5#include <sys/types.h>
6#include <sys/socket.h>
7
8void test_udp_limit(void)
9{
10 struct udp_limit *skel;
11 int fd1 = -1, fd2 = -1;
12 int cgroup_fd;
13
14 cgroup_fd = test__join_cgroup("/udp_limit");
15 if (!ASSERT_GE(cgroup_fd, 0, "cg-join"))
16 return;
17
18 skel = udp_limit__open_and_load();
19 if (!ASSERT_OK_PTR(skel, "skel-load"))
20 goto close_cgroup_fd;
21
22 skel->links.sock = bpf_program__attach_cgroup(skel->progs.sock, cgroup_fd);
23 if (!ASSERT_OK_PTR(skel->links.sock, "cg_attach_sock"))
24 goto close_skeleton;
25 skel->links.sock_release = bpf_program__attach_cgroup(skel->progs.sock_release, cgroup_fd);
26 if (!ASSERT_OK_PTR(skel->links.sock_release, "cg_attach_sock_release"))
27 goto close_skeleton;
28
29 /* BPF program enforces a single UDP socket per cgroup,
30 * verify that.
31 */
32 fd1 = socket(AF_INET, SOCK_DGRAM, 0);
33 if (!ASSERT_GE(fd1, 0, "socket(fd1)"))
34 goto close_skeleton;
35
36 fd2 = socket(AF_INET, SOCK_DGRAM, 0);
37 if (!ASSERT_LT(fd2, 0, "socket(fd2)"))
38 goto close_skeleton;
39
40 /* We can reopen again after close. */
41 close(fd1);
42 fd1 = -1;
43
44 fd1 = socket(AF_INET, SOCK_DGRAM, 0);
45 if (!ASSERT_GE(fd1, 0, "socket(fd1-again)"))
46 goto close_skeleton;
47
48 /* Make sure the program was invoked the expected
49 * number of times:
50 * - open fd1 - BPF_CGROUP_INET_SOCK_CREATE
51 * - attempt to openfd2 - BPF_CGROUP_INET_SOCK_CREATE
52 * - close fd1 - BPF_CGROUP_INET_SOCK_RELEASE
53 * - open fd1 again - BPF_CGROUP_INET_SOCK_CREATE
54 */
55 if (!ASSERT_EQ(skel->bss->invocations, 4, "bss-invocations"))
56 goto close_skeleton;
57
58 /* We should still have a single socket in use */
59 if (!ASSERT_EQ(skel->bss->in_use, 1, "bss-in_use"))
60 goto close_skeleton;
61
62close_skeleton:
63 if (fd1 >= 0)
64 close(fd1);
65 if (fd2 >= 0)
66 close(fd2);
67 udp_limit__destroy(skel);
68close_cgroup_fd:
69 close(cgroup_fd);
70}
1// SPDX-License-Identifier: GPL-2.0
2#include <test_progs.h>
3#include "udp_limit.skel.h"
4
5#include <sys/types.h>
6#include <sys/socket.h>
7
8static int duration;
9
10void test_udp_limit(void)
11{
12 struct udp_limit *skel;
13 int fd1 = -1, fd2 = -1;
14 int cgroup_fd;
15
16 cgroup_fd = test__join_cgroup("/udp_limit");
17 if (CHECK(cgroup_fd < 0, "cg-join", "errno %d", errno))
18 return;
19
20 skel = udp_limit__open_and_load();
21 if (CHECK(!skel, "skel-load", "errno %d", errno))
22 goto close_cgroup_fd;
23
24 skel->links.sock = bpf_program__attach_cgroup(skel->progs.sock, cgroup_fd);
25 skel->links.sock_release = bpf_program__attach_cgroup(skel->progs.sock_release, cgroup_fd);
26 if (CHECK(IS_ERR(skel->links.sock) || IS_ERR(skel->links.sock_release),
27 "cg-attach", "sock %ld sock_release %ld",
28 PTR_ERR(skel->links.sock),
29 PTR_ERR(skel->links.sock_release)))
30 goto close_skeleton;
31
32 /* BPF program enforces a single UDP socket per cgroup,
33 * verify that.
34 */
35 fd1 = socket(AF_INET, SOCK_DGRAM, 0);
36 if (CHECK(fd1 < 0, "fd1", "errno %d", errno))
37 goto close_skeleton;
38
39 fd2 = socket(AF_INET, SOCK_DGRAM, 0);
40 if (CHECK(fd2 >= 0, "fd2", "errno %d", errno))
41 goto close_skeleton;
42
43 /* We can reopen again after close. */
44 close(fd1);
45 fd1 = -1;
46
47 fd1 = socket(AF_INET, SOCK_DGRAM, 0);
48 if (CHECK(fd1 < 0, "fd1-again", "errno %d", errno))
49 goto close_skeleton;
50
51 /* Make sure the program was invoked the expected
52 * number of times:
53 * - open fd1 - BPF_CGROUP_INET_SOCK_CREATE
54 * - attempt to openfd2 - BPF_CGROUP_INET_SOCK_CREATE
55 * - close fd1 - BPF_CGROUP_INET_SOCK_RELEASE
56 * - open fd1 again - BPF_CGROUP_INET_SOCK_CREATE
57 */
58 if (CHECK(skel->bss->invocations != 4, "bss-invocations",
59 "invocations=%d", skel->bss->invocations))
60 goto close_skeleton;
61
62 /* We should still have a single socket in use */
63 if (CHECK(skel->bss->in_use != 1, "bss-in_use",
64 "in_use=%d", skel->bss->in_use))
65 goto close_skeleton;
66
67close_skeleton:
68 if (fd1 >= 0)
69 close(fd1);
70 if (fd2 >= 0)
71 close(fd2);
72 udp_limit__destroy(skel);
73close_cgroup_fd:
74 close(cgroup_fd);
75}