diff options
| author | Willem de Bruijn <[email protected]> | 2025-04-08 13:27:49 +0000 |
|---|---|---|
| committer | Alexei Starovoitov <[email protected]> | 2025-04-10 03:02:51 +0000 |
| commit | fcd7132cb1f93e4d4594ecb19b8dcecdf0497d9e (patch) | |
| tree | 33bbb467e9359bc65b2a5587afcb79d7e9d0e06b /tools/testing/selftests/net/lib/py/ynl.py | |
| parent | bpf: support SKF_NET_OFF and SKF_LL_OFF on skb frags (diff) | |
| download | kernel-fcd7132cb1f93e4d4594ecb19b8dcecdf0497d9e.tar.gz kernel-fcd7132cb1f93e4d4594ecb19b8dcecdf0497d9e.zip | |
selftests/net: test sk_filter support for SKF_NET_OFF on frags
Verify that a classic BPF linux socket filter correctly matches
packet contents. Including when accessing contents in an
skb_frag.
1. Open a SOCK_RAW socket with a classic BPF filter on UDP dport 8000.
2. Open a tap device with IFF_NAPI_FRAGS to inject skbs with frags.
3. Send a packet for which the UDP header is in frag[0].
4. Receive this packet to demonstrate that the socket accepted it.
Acked-by: Stanislav Fomichev <[email protected]>
Signed-off-by: Willem de Bruijn <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Alexei Starovoitov <[email protected]>
Diffstat (limited to 'tools/testing/selftests/net/lib/py/ynl.py')
0 files changed, 0 insertions, 0 deletions
