|author||David S. Miller <email@example.com>||2014-05-23 16:48:50 -0400|
|committer||David S. Miller <firstname.lastname@example.org>||2014-05-23 16:48:50 -0400|
|parent||Merge branch 'inet_csums_part3' (diff)|
|parent||net: filter: add test case for jump with holes and ret x variants (diff)|
Merge branch 'filter-next'
Daniel Borkmann says: ==================== BPF updates These were still in my queue. Please see individual patches for details. I have rebased these on top of current net-next with Andrew's gcc union fixup  applied to avoid dealing with an unnecessary merge conflict.  http://patchwork.ozlabs.org/patch/351577/ ==================== Signed-off-by: David S. Miller <email@example.com>
Diffstat (limited to 'Documentation/networking/filter.txt')
1 files changed, 14 insertions, 0 deletions
diff --git a/Documentation/networking/filter.txt b/Documentation/networking/filter.txt
index 748fd385535d..dc7dcc8c8184 100644
@@ -833,6 +833,20 @@ loops and other CFG validation; second step starts from the first insn and
descends all possible paths. It simulates execution of every insn and observes
the state change of registers and stack.
+Next to the BPF toolchain, the kernel also ships a test module that contains
+various test cases for classic and internal BPF that can be executed against
+the BPF interpreter and JIT compiler. It can be found in lib/test_bpf.c and
+enabled via Kconfig:
+After the module has been built and installed, the test suite can be executed
+via insmod or modprobe against 'test_bpf' module. Results of the test cases
+including timings in nsec can be found in the kernel log (dmesg).