Florian Westphal <fw@xxxxxxxxx> writes: > Call bpf_program__attach_netfilter() with different > protocol/hook/priority combinations. > > Test fails if supposedly-illegal attachments work > (e.g., bogus protocol family, illegal priority and so on) or if a > should-work attachment fails. Expected output: > > ./test_progs -t netfilter_link_attach > #145/1 netfilter_link_attach/allzero:OK > #145/2 netfilter_link_attach/invalid-pf:OK > #145/3 netfilter_link_attach/invalid-hooknum:OK > #145/4 netfilter_link_attach/invalid-priority-min:OK > #145/5 netfilter_link_attach/invalid-priority-max:OK > #145/6 netfilter_link_attach/invalid-flags:OK > #145/7 netfilter_link_attach/invalid-inet-not-supported:OK > #145/8 netfilter_link_attach/attach ipv4:OK > #145/9 netfilter_link_attach/attach ipv6:OK > > Signed-off-by: Florian Westphal <fw@xxxxxxxxx> Reviewed-by: Toke Høiland-Jørgensen <toke@xxxxxxxxxx>