|
Re: [RFC PATCH 2/3] tests/bpf: add some test cases for BPF_MAP_TYPE_QUEUE
<mauricio.vasquez@...> wrote:
Order the declaration based on reverse Christmas tree shape.
<mauricio.vasquez@...> wrote:
Order the declaration based on reverse Christmas tree shape.
|
By
Yonghong Song
·
#1409
·
|
|
Re: [RFC PATCH 1/3] bpf: add bpf queue map
<mauricio.vasquez@...> wrote:
It is totally up to you, but you could replace the above licensing portion from
"This program" to 'more details" with
/* SPDX-License-Identifier: GPL-2.0
<mauricio.vasquez@...> wrote:
It is totally up to you, but you could replace the above licensing portion from
"This program" to 'more details" with
/* SPDX-License-Identifier: GPL-2.0
|
By
Yonghong Song
·
#1408
·
|
|
[RFC PATCH 3/3] bpf: add sample for BPF_MAP_TYPE_QUEUE
The example is made by two parts, a eBPF program that consumes elements
from a FIFO queue and prints them in the screen and a user space
application that inserts new elements into the queue each time
The example is made by two parts, a eBPF program that consumes elements
from a FIFO queue and prints them in the screen and a user space
application that inserts new elements into the queue each time
|
By
Mauricio Vasquez
·
#1407
·
|
|
[RFC PATCH 2/3] tests/bpf: add some test cases for BPF_MAP_TYPE_QUEUE
Signed-off-by: Mauricio Vasquez B <mauricio.vasquez@...>
---
tools/include/uapi/linux/bpf.h | 5 ++
tools/testing/selftests/bpf/test_maps.c | 72 +++++++++++++++++++++++++++++++
2
Signed-off-by: Mauricio Vasquez B <mauricio.vasquez@...>
---
tools/include/uapi/linux/bpf.h | 5 ++
tools/testing/selftests/bpf/test_maps.c | 72 +++++++++++++++++++++++++++++++
2
|
By
Mauricio Vasquez
·
#1406
·
|
|
[RFC PATCH 1/3] bpf: add bpf queue map
Bpf queue implements a LIFO/FIFO data containers for ebpf programs.
It allows to push an element to the queue by using the update operation
and to pop an element from the queue by using the lookup
Bpf queue implements a LIFO/FIFO data containers for ebpf programs.
It allows to push an element to the queue by using the update operation
and to pop an element from the queue by using the lookup
|
By
Mauricio Vasquez
·
#1405
·
|
|
[RFC PATCH 0/3] Implement bpf map queue
Bpf queue map is a new kind of map that provides a LIFO/FIFO queue
implementation.
In some applications, like a SNAT, it is necessary to keep track of
a pool of free elemenets, network ports in this
Bpf queue map is a new kind of map that provides a LIFO/FIFO queue
implementation.
In some applications, like a SNAT, it is necessary to keep track of
a pool of free elemenets, network ports in this
|
By
Mauricio Vasquez
·
#1404
·
|
|
Re: New helper bpf_get_current_pidns_info
Hi All,
Just tested the code last night, and it did not work. Now I have fixed it and tested in a container, it's finally working except for the the device major and minor info.
Here is the updated
Hi All,
Just tested the code last night, and it did not work. Now I have fixed it and tested in a container, it's finally working except for the the device major and minor info.
Here is the updated
|
By
neirac
·
#1403
·
|
|
Re: New helper bpf_get_current_pidns_info
Hi,
I have resumed work on issue https://github.com/iovisor/bcc/issues/1329. I just added the needed fields in this helper structure and also I updated the bcc code to use this helper, but I have a
Hi,
I have resumed work on issue https://github.com/iovisor/bcc/issues/1329. I just added the needed fields in this helper structure and also I updated the bcc code to use this helper, but I have a
|
By
neirac
·
#1402
·
|
|
minutes: IO Visor TSC/Dev Meeting
Hi All,
Thanks for dialing in today. As usual, here are my notes.
Cheers!
-Brenden
=== Discussion ===
Brenden:
* f28 and ubuntu18.04 support
* 0.6.1 tagged with those packages
* will try to get
Hi All,
Thanks for dialing in today. As usual, here are my notes.
Cheers!
-Brenden
=== Discussion ===
Brenden:
* f28 and ubuntu18.04 support
* 0.6.1 tagged with those packages
* will try to get
|
By
Brenden Blanco
·
#1401
·
|
|
reminder: IO Visor TSC/Dev Meeting
Please join us tomorrow for our bi-weekly call. As usual, this meeting is
open to everybody and completely optional.
You might be interested to join if:
You want to know what is going on in BPF
Please join us tomorrow for our bi-weekly call. As usual, this meeting is
open to everybody and completely optional.
You might be interested to join if:
You want to know what is going on in BPF
|
By
Brenden Blanco
·
#1400
·
|
|
Re: Helper functions available for XDP?
There is no skb in XDP. The helper bpf_l4_csum_replace cannot be used.
You need to use other csum functions and can directly modify the packet data.
There is no skb in XDP. The helper bpf_l4_csum_replace cannot be used.
You need to use other csum functions and can directly modify the packet data.
|
By
Yonghong Song
·
#1399
·
|
|
Re: Fixing stack trace function names by argument introspection
It is a piece of complicated software, let me see how much I can do.
Yes, it is `#pragma unroll`.
Not 100% whether just frame pointers are enough for you or not.
Remeber, on the stack, typically
It is a piece of complicated software, let me see how much I can do.
Yes, it is `#pragma unroll`.
Not 100% whether just frame pointers are enough for you or not.
Remeber, on the stack, typically
|
By
Yonghong Song
·
#1398
·
|
|
Re: Helper functions available for XDP?
Then in this case is it possible to replace TCP checksum on ingress with XDP? How do I test if the skb is writable?
Then in this case is it possible to replace TCP checksum on ingress with XDP? How do I test if the skb is writable?
|
By
Andrew Wang
·
#1397
·
|
|
Re: Fixing stack trace function names by argument introspection
Can you share it with me? Maybe I can use it as an example.
I have never used pragma unroll before, but I understand what it is supposed to do.
Quick search gives me usages for CUDA and several
Can you share it with me? Maybe I can use it as an example.
I have never used pragma unroll before, but I understand what it is supposed to do.
Quick search gives me usages for CUDA and several
|
By
marko@kevac.org
·
#1396
·
|
|
Re: Helper functions available for XDP?
bpf_csum_diff only accesses packet data and can be used in both cls_act and xdp.
bpf_l4_csum_replace accesses skb data structure, e.g., it needs to
replace the csum
and hence needs to test whether skb
bpf_csum_diff only accesses packet data and can be used in both cls_act and xdp.
bpf_l4_csum_replace accesses skb data structure, e.g., it needs to
replace the csum
and hence needs to test whether skb
|
By
Yonghong Song
·
#1395
·
|
|
Re: Helper functions available for XDP?
I was thinking maybe those helpers were not available because no skb
was construct. But after checking, the helper you're mentionning is in
the tc_cls. Also, the csum_diff helper lies in the same
I was thinking maybe those helpers were not available because no skb
was construct. But after checking, the helper you're mentionning is in
the tc_cls. Also, the csum_diff helper lies in the same
|
By
François
·
#1394
·
|
|
Re: Helper functions available for XDP?
XDP programs cannot use bpf_l4_csum_replace, but they can use
bpf_csum_diff since commit 205c380 ("bpf: add csum_diff helper to xdp as
well") which landed in v4.16-rc1.
The list of helpers available
XDP programs cannot use bpf_l4_csum_replace, but they can use
bpf_csum_diff since commit 205c380 ("bpf: add csum_diff helper to xdp as
well") which landed in v4.16-rc1.
The list of helpers available
|
By
Paul Chaignon
·
#1393
·
|
|
Helper functions available for XDP?
Hi
I am writing a bpf program for packet processing and have loaded my ingress function at BPF.XDP.
I'm updating the destination IPv6 address and want to update the TCP checksum, but when I try to
Hi
I am writing a bpf program for packet processing and have loaded my ingress function at BPF.XDP.
I'm updating the destination IPv6 address and want to update the TCP checksum, but when I try to
|
By
Andrew Wang
·
#1392
·
|
|
Re: Fixing stack trace function names by argument introspection
We did not have such an example in BCC. In Facebook, we have a bpf
program to catch
stack traces for python programs. It is very similar to what you want
to achieve in the above.
Basically, you need
We did not have such an example in BCC. In Facebook, we have a bpf
program to catch
stack traces for python programs. It is very similar to what you want
to achieve in the above.
Basically, you need
|
By
Yonghong Song
·
#1391
·
|
|
Fixing stack trace function names by argument introspection
Hi!
Imagine I have an interpreter that runs some program in some custom language. If I were to get a stack trace, it would look like:
sys_read()
Hi!
Imagine I have an interpreter that runs some program in some custom language. If I were to get a stack trace, it would look like:
sys_read()
|
By
marko@kevac.org
·
#1390
·
|