This patch correctly populates the `bpf_link_info.netfilter.flags` field
when user passes the `BPF_F_NETFILTER_IP_DEFRAG` flag.

Fixes: 84601d6ee68a ("bpf: add bpf_link support for BPF_NETFILTER programs")
Signed-off-by: Tyrone Wu <wudevel...@gmail.com>
---
 net/netfilter/nf_bpf_link.c | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/net/netfilter/nf_bpf_link.c b/net/netfilter/nf_bpf_link.c
index 5257d5e7eb09..797fe8a9971e 100644
--- a/net/netfilter/nf_bpf_link.c
+++ b/net/netfilter/nf_bpf_link.c
@@ -150,11 +150,12 @@ static int bpf_nf_link_fill_link_info(const struct 
bpf_link *link,
                                      struct bpf_link_info *info)
 {
        struct bpf_nf_link *nf_link = container_of(link, struct bpf_nf_link, 
link);
+       const struct nf_defrag_hook *hook = nf_link->defrag_hook;
 
        info->netfilter.pf = nf_link->hook_ops.pf;
        info->netfilter.hooknum = nf_link->hook_ops.hooknum;
        info->netfilter.priority = nf_link->hook_ops.priority;
-       info->netfilter.flags = 0;
+       info->netfilter.flags = hook ? BPF_F_NETFILTER_IP_DEFRAG : 0;
 
        return 0;
 }
-- 
2.43.0


Reply via email to