Re: [PATCH v4,bpf-next] bpf: Don't redirect packets with invalid pkt_len
From: Lorenz Bauer
Date: Wed Sep 14 2022 - 07:20:17 EST
Hi,
I think this patch is causing user-space breakage, see [0].
The gist is that we do BPF_PROG_RUN of a socket filter with 14 byte input to determine whether
BPF_PROG_RUN is available or not. I'll fix this in cilium/ebpf, but I think this patch
needs more work since users may be doing the same thing in their code.
Thanks,
Lorenz
0: https://github.com/cilium/ebpf/pull/788