⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.96
Server IP:
147.93.97.220
Server:
Linux srv843233 6.8.0-71-generic #71-Ubuntu SMP PREEMPT_DYNAMIC Tue Jul 22 16:52:38 UTC 2025 x86_64
Server Software:
nginx/1.28.0
PHP Version:
8.2.29
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
src
/
linux-headers-6.8.0-60
/
samples
/
bpf
/
View File Name :
test_cls_bpf.sh
#!/bin/bash # SPDX-License-Identifier: GPL-2.0 function pktgen { ../pktgen/pktgen_bench_xmit_mode_netif_receive.sh -i $IFC -s 64 \ -m 90:e2:ba:ff:ff:ff -d 192.168.0.1 -t 4 local dropped=`tc -s qdisc show dev $IFC | tail -3 | awk '/drop/{print $7}'` if [ "$dropped" == "0," ]; then echo "FAIL" else echo "Successfully filtered " $dropped " packets" fi } function test { echo -n "Loading bpf program '$2'... " tc qdisc add dev $IFC clsact tc filter add dev $IFC ingress bpf da obj $1 sec $2 local status=$? if [ $status -ne 0 ]; then echo "FAIL" else echo "ok" pktgen fi tc qdisc del dev $IFC clsact } IFC=test_veth ip link add name $IFC type veth peer name pair_$IFC ip link set $IFC up ip link set pair_$IFC up test ./parse_simple.o simple test ./parse_varlen.o varlen test ./parse_ldabs.o ldabs ip link del dev $IFC