|
reminder: IO Visor TSC/Dev Meeting
Please join us tomorrow for our bi-weekly call. As usual, this meeting is
open to everybody and completely optional.
You might be interested to join if:
You want to know what is going on in BPF
Please join us tomorrow for our bi-weekly call. As usual, this meeting is
open to everybody and completely optional.
You might be interested to join if:
You want to know what is going on in BPF
|
By
Brenden Blanco
·
#1307
·
|
|
Contributing example code
Hello,
My name is Usman.
I am interested to contribute an example code for OpenStack VLAN traffic monitoring.
Regarding this can you please guide me how I can submit my code on GitHub (Since I could
Hello,
My name is Usman.
I am interested to contribute an example code for OpenStack VLAN traffic monitoring.
Regarding this can you please guide me how I can submit my code on GitHub (Since I could
|
By
Muhammad Usman <usman476@...>
·
#1306
·
|
|
Re: BPF verifier: ctx+const+const is not allowed
Interesting... thanks for explanation.
OK, I will submit the patch.
Thanks
William
Interesting... thanks for explanation.
OK, I will submit the patch.
Thanks
William
|
By
William Tu
·
#1305
·
|
|
Re: BPF verifier: ctx+const+const is not allowed
Now I remembered that we had this issue before in bcc.
it is a compiler optimization likes this:
if (...)
*(ctx + 60)
else
*(ctx + 56)
The compiler translates it to
if (...)
ptr = ctx +
Now I remembered that we had this issue before in bcc.
it is a compiler optimization likes this:
if (...)
*(ctx + 60)
else
*(ctx + 56)
The compiler translates it to
if (...)
ptr = ctx +
|
By
Yonghong Song
·
#1304
·
|
|
Re: BPF verifier: ctx+const+const is not allowed
Hi, William,
Do you have a test (just compile and load) to demonstrate the problem?
I would like to understand why the compiler generates r1+0 and whether
we could possibly avoid
Hi, William,
Do you have a test (just compile and load) to demonstrate the problem?
I would like to understand why the compiler generates r1+0 and whether
we could possibly avoid
|
By
Yonghong Song
·
#1303
·
|
|
BPF verifier: ctx+const+const is not allowed
Hi,
We're hitting a BPF verifier error saying
"dereference of modified ctx ptr R1 off=36+0, ctx+const is allowed,
ctx+const+const is not
"
but actually the 2nd const is 0. I don't know why compiler
Hi,
We're hitting a BPF verifier error saying
"dereference of modified ctx ptr R1 off=36+0, ctx+const is allowed,
ctx+const+const is not
"
but actually the 2nd const is 0. I don't know why compiler
|
By
William Tu
·
#1302
·
|
|
Re: [PATCH bpf-next v5 0/2] bpf: allow map helpers access to map values directly
Applied to bpf-next, thanks Paul!
Applied to bpf-next, thanks Paul!
|
By
Daniel Borkmann
·
#1301
·
|
|
Re: [PATCH bpf-next v4 1/2] bpf: allow map helpers access to map values directly
Thanks for the review.
I've sent a refactored patchset that uses check_helper_mem_access().
Thanks for the review.
I've sent a refactored patchset that uses check_helper_mem_access().
|
By
Paul Chaignon <paul.chaignon@...>
·
#1300
·
|
|
[PATCH bpf-next v5 2/2] tools/bpf: add verifier tests for accesses to map values
This patch adds new test cases for accesses to map values from map
helpers.
Signed-off-by: Paul Chaignon <paul.chaignon@...>
---
tools/testing/selftests/bpf/test_verifier.c | 266
This patch adds new test cases for accesses to map values from map
helpers.
Signed-off-by: Paul Chaignon <paul.chaignon@...>
---
tools/testing/selftests/bpf/test_verifier.c | 266
|
By
Paul Chaignon <paul.chaignon@...>
·
#1299
·
|
|
[PATCH bpf-next v5 1/2] bpf: allow map helpers access to map values directly
Helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE can only
access stack and packet memory. Allow these helpers to directly access
map values by passing registers of type
Helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE can only
access stack and packet memory. Allow these helpers to directly access
map values by passing registers of type
|
By
Paul Chaignon <paul.chaignon@...>
·
#1298
·
|
|
[PATCH bpf-next v5 0/2] bpf: allow map helpers access to map values directly
Currently, helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE
can only access stack and packet memory. This patchset allows these
helpers to directly access map values by passing
Currently, helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE
can only access stack and packet memory. This patchset allows these
helpers to directly access map values by passing
|
By
Paul Chaignon <paul.chaignon@...>
·
#1297
·
|
|
Re: [PATCH bpf-next v4 1/2] bpf: allow map helpers access to map values directly
We should reuse check_helper_mem_access() here which covers all three cases
from above already and simplifies the code a bit.
Ditto.
Thanks,
Daniel
We should reuse check_helper_mem_access() here which covers all three cases
from above already and simplifies the code a bit.
Ditto.
Thanks,
Daniel
|
By
Daniel Borkmann
·
#1296
·
|
|
[PATCH bpf-next v4 2/2] tools/bpf: add verifier tests for accesses to map
This patch adds new test cases for accesses to map values from map
helpers.
Signed-off-by: Paul Chaignon <paul.chaignon@...>
---
tools/testing/selftests/bpf/test_verifier.c | 266
This patch adds new test cases for accesses to map values from map
helpers.
Signed-off-by: Paul Chaignon <paul.chaignon@...>
---
tools/testing/selftests/bpf/test_verifier.c | 266
|
By
Paul Chaignon <paul.chaignon@...>
·
#1295
·
|
|
[PATCH bpf-next v4 1/2] bpf: allow map helpers access to map values directly
Helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE can only
access stack and packet memory. Allow these helpers to directly access
map values by passing registers of type
Helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE can only
access stack and packet memory. Allow these helpers to directly access
map values by passing registers of type
|
By
Paul Chaignon <paul.chaignon@...>
·
#1294
·
|
|
[PATCH bpf-next v4 0/2] bpf: allow map helpers access to map values directly
Currently, helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE
can only access stack and packet memory. This patchset allows these
helpers to directly access map values by passing
Currently, helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE
can only access stack and packet memory. This patchset allows these
helpers to directly access map values by passing
|
By
Paul Chaignon <paul.chaignon@...>
·
#1293
·
|
|
Re: Access to struct with kprobe
Thank you very much for your reply . it is more clear now.
Best regards
Thank you very much for your reply . it is more clear now.
Best regards
|
By
Bilal
·
#1291
·
|
|
Re: Access to struct with kprobe
From the "kprobe__" syntax, I'm guessing that you're using bcc. The bcc rewriter will replace the second argument of your function with a dereference on ctx (ctx->di on x86) [1]. It won't check that
From the "kprobe__" syntax, I'm guessing that you're using bcc. The bcc rewriter will replace the second argument of your function with a dereference on ctx (ctx->di on x86) [1]. It won't check that
|
By
Paul Chaignon
·
#1290
·
|
|
Re: Access to struct with kprobe
BPF does not understand function signature. BPF program has access to
the register context (struct pt_regs *ctx).
If you use BCC, when you initiate (compile) your BPF program, the
compiler rewrites
BPF does not understand function signature. BPF program has access to
the register context (struct pt_regs *ctx).
If you use BCC, when you initiate (compile) your BPF program, the
compiler rewrites
|
By
Teng Qin
·
#1289
·
|
|
Re: Access to struct with kprobe
<iovisor-dev@...> wrote:
You can access through arguments or through "current" task pointer.
What exactly you want access on which kprobe? More information will help
people to understand
<iovisor-dev@...> wrote:
You can access through arguments or through "current" task pointer.
What exactly you want access on which kprobe? More information will help
people to understand
|
By
Yonghong Song
·
#1292
·
|
|
Re: bpftool binary size
On 04/18/2018 10:03 PM, Jesper Dangaard Brouer via iovisor-dev wrote:
[...]
> What does bpftool use BFD for?
It's used for the prog JIT dump in order to disassemble the instructions.
On 04/18/2018 10:03 PM, Jesper Dangaard Brouer via iovisor-dev wrote:
[...]
> What does bpftool use BFD for?
It's used for the prog JIT dump in order to disassemble the instructions.
|
By
Daniel Borkmann
·
#1287
·
|