mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2026-03-02 21:23:42 -05:00
Verify that a classic BPF linux socket filter correctly matches packet contents. Including when accessing contents in an skb_frag. 1. Open a SOCK_RAW socket with a classic BPF filter on UDP dport 8000. 2. Open a tap device with IFF_NAPI_FRAGS to inject skbs with frags. 3. Send a packet for which the UDP header is in frag[0]. 4. Receive this packet to demonstrate that the socket accepted it. Acked-by: Stanislav Fomichev <sdf@fomichev.me> Signed-off-by: Willem de Bruijn <willemb@google.com> Link: https://lore.kernel.org/r/20250408132833.195491-3-willemdebruijn.kernel@gmail.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
64 lines
868 B
Plaintext
64 lines
868 B
Plaintext
# SPDX-License-Identifier: GPL-2.0-only
|
|
bind_bhash
|
|
bind_timewait
|
|
bind_wildcard
|
|
busy_poller
|
|
cmsg_sender
|
|
diag_uid
|
|
epoll_busy_poll
|
|
fin_ack_lat
|
|
gro
|
|
hwtstamp_config
|
|
io_uring_zerocopy_tx
|
|
ioam6_parser
|
|
ip_defrag
|
|
ip_local_port_range
|
|
ipsec
|
|
ipv6_flowlabel
|
|
ipv6_flowlabel_mgr
|
|
log.txt
|
|
msg_oob
|
|
msg_zerocopy
|
|
netlink-dumps
|
|
nettest
|
|
proc_net_pktgen
|
|
psock_fanout
|
|
psock_snd
|
|
psock_tpacket
|
|
reuseaddr_conflict
|
|
reuseaddr_ports_exhausted
|
|
reuseport_addr_any
|
|
reuseport_bpf
|
|
reuseport_bpf_cpu
|
|
reuseport_bpf_numa
|
|
reuseport_dualstack
|
|
rxtimestamp
|
|
sctp_hello
|
|
scm_pidfd
|
|
scm_rights
|
|
sk_bind_sendto_listen
|
|
sk_connect_zero_addr
|
|
sk_so_peek_off
|
|
skf_net_off
|
|
socket
|
|
so_incoming_cpu
|
|
so_netns_cookie
|
|
so_txtime
|
|
so_rcv_listener
|
|
stress_reuseport_listen
|
|
tap
|
|
tcp_fastopen_backup_key
|
|
tcp_inq
|
|
tcp_mmap
|
|
timestamping
|
|
tls
|
|
toeplitz
|
|
tools
|
|
tun
|
|
txring_overwrite
|
|
txtimestamp
|
|
udpgso
|
|
udpgso_bench_rx
|
|
udpgso_bench_tx
|
|
unix_connect
|