xref: /linux/tools/testing/selftests/bpf/prog_tests/udp_limit.c (revision b83deaa741558babf4b8d51d34f6637ccfff1b26)
1 // SPDX-License-Identifier: GPL-2.0
2 #include <test_progs.h>
3 #include "udp_limit.skel.h"
4 
5 #include <sys/types.h>
6 #include <sys/socket.h>
7 
8 static int duration;
9 
10 void test_udp_limit(void)
11 {
12 	struct udp_limit *skel;
13 	int fd1 = -1, fd2 = -1;
14 	int cgroup_fd;
15 
16 	cgroup_fd = test__join_cgroup("/udp_limit");
17 	if (CHECK(cgroup_fd < 0, "cg-join", "errno %d", errno))
18 		return;
19 
20 	skel = udp_limit__open_and_load();
21 	if (CHECK(!skel, "skel-load", "errno %d", errno))
22 		goto close_cgroup_fd;
23 
24 	skel->links.sock = bpf_program__attach_cgroup(skel->progs.sock, cgroup_fd);
25 	if (!ASSERT_OK_PTR(skel->links.sock, "cg_attach_sock"))
26 		goto close_skeleton;
27 	skel->links.sock_release = bpf_program__attach_cgroup(skel->progs.sock_release, cgroup_fd);
28 	if (!ASSERT_OK_PTR(skel->links.sock_release, "cg_attach_sock_release"))
29 		goto close_skeleton;
30 
31 	/* BPF program enforces a single UDP socket per cgroup,
32 	 * verify that.
33 	 */
34 	fd1 = socket(AF_INET, SOCK_DGRAM, 0);
35 	if (CHECK(fd1 < 0, "fd1", "errno %d", errno))
36 		goto close_skeleton;
37 
38 	fd2 = socket(AF_INET, SOCK_DGRAM, 0);
39 	if (CHECK(fd2 >= 0, "fd2", "errno %d", errno))
40 		goto close_skeleton;
41 
42 	/* We can reopen again after close. */
43 	close(fd1);
44 	fd1 = -1;
45 
46 	fd1 = socket(AF_INET, SOCK_DGRAM, 0);
47 	if (CHECK(fd1 < 0, "fd1-again", "errno %d", errno))
48 		goto close_skeleton;
49 
50 	/* Make sure the program was invoked the expected
51 	 * number of times:
52 	 * - open fd1           - BPF_CGROUP_INET_SOCK_CREATE
53 	 * - attempt to openfd2 - BPF_CGROUP_INET_SOCK_CREATE
54 	 * - close fd1          - BPF_CGROUP_INET_SOCK_RELEASE
55 	 * - open fd1 again     - BPF_CGROUP_INET_SOCK_CREATE
56 	 */
57 	if (CHECK(skel->bss->invocations != 4, "bss-invocations",
58 		  "invocations=%d", skel->bss->invocations))
59 		goto close_skeleton;
60 
61 	/* We should still have a single socket in use */
62 	if (CHECK(skel->bss->in_use != 1, "bss-in_use",
63 		  "in_use=%d", skel->bss->in_use))
64 		goto close_skeleton;
65 
66 close_skeleton:
67 	if (fd1 >= 0)
68 		close(fd1);
69 	if (fd2 >= 0)
70 		close(fd2);
71 	udp_limit__destroy(skel);
72 close_cgroup_fd:
73 	close(cgroup_fd);
74 }
75