Files
linux/tools/testing/selftests/net/.gitignore
Willem de Bruijn fcd7132cb1 selftests/net: test sk_filter support for SKF_NET_OFF on frags
Verify that a classic BPF linux socket filter correctly matches
packet contents. Including when accessing contents in an
skb_frag.

1. Open a SOCK_RAW socket with a classic BPF filter on UDP dport 8000.
2. Open a tap device with IFF_NAPI_FRAGS to inject skbs with frags.
3. Send a packet for which the UDP header is in frag[0].
4. Receive this packet to demonstrate that the socket accepted it.

Acked-by: Stanislav Fomichev <sdf@fomichev.me>
Signed-off-by: Willem de Bruijn <willemb@google.com>
Link: https://lore.kernel.org/r/20250408132833.195491-3-willemdebruijn.kernel@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2025-04-09 20:02:51 -07:00

64 lines
868 B
Plaintext

# SPDX-License-Identifier: GPL-2.0-only
bind_bhash
bind_timewait
bind_wildcard
busy_poller
cmsg_sender
diag_uid
epoll_busy_poll
fin_ack_lat
gro
hwtstamp_config
io_uring_zerocopy_tx
ioam6_parser
ip_defrag
ip_local_port_range
ipsec
ipv6_flowlabel
ipv6_flowlabel_mgr
log.txt
msg_oob
msg_zerocopy
netlink-dumps
nettest
proc_net_pktgen
psock_fanout
psock_snd
psock_tpacket
reuseaddr_conflict
reuseaddr_ports_exhausted
reuseport_addr_any
reuseport_bpf
reuseport_bpf_cpu
reuseport_bpf_numa
reuseport_dualstack
rxtimestamp
sctp_hello
scm_pidfd
scm_rights
sk_bind_sendto_listen
sk_connect_zero_addr
sk_so_peek_off
skf_net_off
socket
so_incoming_cpu
so_netns_cookie
so_txtime
so_rcv_listener
stress_reuseport_listen
tap
tcp_fastopen_backup_key
tcp_inq
tcp_mmap
timestamping
tls
toeplitz
tools
tun
txring_overwrite
txtimestamp
udpgso
udpgso_bench_rx
udpgso_bench_tx
unix_connect