Re: [PATCH v4,bpf-next] bpf: Don't redirect packets with invalid pkt_len

From: Lorenz Bauer
Date: Wed Sep 14 2022 - 07:20:17 EST


Hi,

I think this patch is causing user-space breakage, see [0].

The gist is that we do BPF_PROG_RUN of a socket filter with 14 byte input to determine whether
BPF_PROG_RUN is available or not. I'll fix this in cilium/ebpf, but I think this patch
needs more work since users may be doing the same thing in their code.


Thanks,
Lorenz

0: https://github.com/cilium/ebpf/pull/788