diff options
author | 2022-08-21 14:35:19 +0300 | |
---|---|---|
committer | 2022-08-23 22:48:12 +0200 | |
commit | d6513727c2af39a8cffb0d9b07376e51a85f347f (patch) | |
tree | 8921b6c73ef0bd0cfcb561954bb42c0e8cc4f98e /scripts/bpf_doc.py | |
parent | bpf, test_run: Propagate bpf_flow_dissect's retval to user's bpf_attr.test.retval (diff) | |
download | wireguard-linux-d6513727c2af39a8cffb0d9b07376e51a85f347f.tar.xz wireguard-linux-d6513727c2af39a8cffb0d9b07376e51a85f347f.zip |
bpf, selftests: Test BPF_FLOW_DISSECTOR_CONTINUE
The dissector program returns BPF_FLOW_DISSECTOR_CONTINUE (and avoids
setting skb->flow_keys or last_dissection map) in case it encounters
IP packets whose (outer) source address is 127.0.0.127.
Additional test is added to prog_tests/flow_dissector.c which sets
this address as test's pkk.iph.saddr, with the expected retval of
BPF_FLOW_DISSECTOR_CONTINUE.
Also, legacy test_flow_dissector.sh was similarly augmented.
Signed-off-by: Shmulik Ladkani <shmulik.ladkani@gmail.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Reviewed-by: Stanislav Fomichev <sdf@google.com>
Acked-by: John Fastabend <john.fastabend@gmail.com>
Link: https://lore.kernel.org/bpf/20220821113519.116765-5-shmulik.ladkani@gmail.com
Diffstat (limited to 'scripts/bpf_doc.py')
0 files changed, 0 insertions, 0 deletions