1 // SPDX-License-Identifier: GPL-2.0
2 #include <test_progs.h>
3 #include <network_helpers.h>
5 void test_skb_ctx(void)
7 struct __sk_buff skb = {
14 .ingress_ifindex = 11,
23 struct bpf_prog_test_run_attr tattr = {
25 .data_size_in = sizeof(pkt_v4),
27 .ctx_size_in = sizeof(skb),
29 .ctx_size_out = sizeof(skb),
31 struct bpf_object *obj;
35 err = bpf_prog_test_load("./test_skb_ctx.o", BPF_PROG_TYPE_SCHED_CLS, &obj,
37 if (CHECK_ATTR(err, "load", "err %d errno %d\n", err, errno))
40 /* ctx_in != NULL, ctx_size_in == 0 */
42 tattr.ctx_size_in = 0;
43 err = bpf_prog_test_run_xattr(&tattr);
44 CHECK_ATTR(err == 0, "ctx_size_in", "err %d errno %d\n", err, errno);
45 tattr.ctx_size_in = sizeof(skb);
47 /* ctx_out != NULL, ctx_size_out == 0 */
49 tattr.ctx_size_out = 0;
50 err = bpf_prog_test_run_xattr(&tattr);
51 CHECK_ATTR(err == 0, "ctx_size_out", "err %d errno %d\n", err, errno);
52 tattr.ctx_size_out = sizeof(skb);
54 /* non-zero [len, tc_index] fields should be rejected*/
57 err = bpf_prog_test_run_xattr(&tattr);
58 CHECK_ATTR(err == 0, "len", "err %d errno %d\n", err, errno);
62 err = bpf_prog_test_run_xattr(&tattr);
63 CHECK_ATTR(err == 0, "tc_index", "err %d errno %d\n", err, errno);
66 /* non-zero [hash, sk] fields should be rejected */
69 err = bpf_prog_test_run_xattr(&tattr);
70 CHECK_ATTR(err == 0, "hash", "err %d errno %d\n", err, errno);
73 skb.sk = (struct bpf_sock *)1;
74 err = bpf_prog_test_run_xattr(&tattr);
75 CHECK_ATTR(err == 0, "sk", "err %d errno %d\n", err, errno);
78 err = bpf_prog_test_run_xattr(&tattr);
79 CHECK_ATTR(err != 0 || tattr.retval,
81 "err %d errno %d retval %d\n",
82 err, errno, tattr.retval);
84 CHECK_ATTR(tattr.ctx_size_out != sizeof(skb),
86 "incorrect output size, want %zu have %u\n",
87 sizeof(skb), tattr.ctx_size_out);
89 for (i = 0; i < 5; i++)
90 CHECK_ATTR(skb.cb[i] != i + 2,
92 "skb->cb[i] == %d, expected %d\n",
94 CHECK_ATTR(skb.priority != 7,
96 "skb->priority == %d, expected %d\n",
98 CHECK_ATTR(skb.ifindex != 1,
100 "skb->ifindex == %d, expected %d\n",
102 CHECK_ATTR(skb.ingress_ifindex != 11,
103 "ctx_out_ingress_ifindex",
104 "skb->ingress_ifindex == %d, expected %d\n",
105 skb.ingress_ifindex, 11);
106 CHECK_ATTR(skb.tstamp != 8,
108 "skb->tstamp == %lld, expected %d\n",
110 CHECK_ATTR(skb.mark != 10,
112 "skb->mark == %u, expected %d\n",
115 bpf_object__close(obj);