-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Attach XDP program to interface before running ctstraffic #152
Conversation
@nibanks @mtfriesen How do I determine why XDP is refusing the attach? What logs can I gather? |
Got traces. Issue remains: |
Something doesn't match here. |
Resolved. @mtfriesen pointed out there was a typo. |
BPF program is returning 0 instead of XDP_PASS, which causes XDP to drop the packets. |
Signed-off-by: Alan Jowett <[email protected]>
Signed-off-by: Alan Jowett <[email protected]>
Signed-off-by: Alan Jowett <[email protected]>
Signed-off-by: Alan Jowett <[email protected]>
Signed-off-by: Alan Jowett <[email protected]>
Signed-off-by: Alan Jowett <[email protected]>
This pull request includes several changes to the
.github/workflows/ebpf.yml
file that improve the testing process for eBPF (Extended Berkeley Packet Filter) on Windows. The most significant changes include adding a step to clean up the installer, updating the anti-malware signatures for Windows Defender, updating the URL for downloading the bpf_performance repository artifacts, and adding steps to run the CTS traffic with and without XDP installed to measure performance impacts. There are also changes to merge and upload the results.Installer cleanup:
Windows Defender updates:
Repository artifacts:
CTS traffic testing:
Results merging and uploading:
Windows Defender exclusions restoration: