|
__builtin_memcpy behavior
The other day I was in the process of porting a little libbpf application from Ubuntu 20 (Linux 5.4) to CentOS 8 (Linux 4.18). This program uses tracepoint:tcp:tcp_send_reset. Here's the relevant BPF
The other day I was in the process of porting a little libbpf application from Ubuntu 20 (Linux 5.4) to CentOS 8 (Linux 4.18). This program uses tracepoint:tcp:tcp_send_reset. Here's the relevant BPF
|
By
Tristan Mayfield
·
#1953
·
|
|
Re: android adeb KASAN_SHADOW_SCALE_SHIFT
Unfortunately, the value is defined in Makefile,
```
ifeq ($(CONFIG_KASAN_SW_TAGS), y)
KASAN_SHADOW_SCALE_SHIFT := 4
else ifeq ($(CONFIG_KASAN_GENERIC), y)
KASAN_SHADOW_SCALE_SHIFT :=
Unfortunately, the value is defined in Makefile,
```
ifeq ($(CONFIG_KASAN_SW_TAGS), y)
KASAN_SHADOW_SCALE_SHIFT := 4
else ifeq ($(CONFIG_KASAN_GENERIC), y)
KASAN_SHADOW_SCALE_SHIFT :=
|
By
Yonghong Song
·
#1952
·
|
|
Re: BPF perf event: runq length
Take a look at bcc tool runqlen.py. Did you get abnormal len with runqlen.py?
Take a look at bcc tool runqlen.py. Did you get abnormal len with runqlen.py?
|
By
Yonghong Song
·
#1951
·
|
|
BPF perf event: runq length
Hi,
I am trying to write a BPF perf event program to get CPU runq length. The Following is the code snippet. I am observing that a big integer (len is 2839296536 ) as queue length in trace output
Hi,
I am trying to write a BPF perf event program to get CPU runq length. The Following is the code snippet. I am observing that a big integer (len is 2839296536 ) as queue length in trace output
|
By
Raga lahari
·
#1950
·
|
|
android adeb KASAN_SHADOW_SCALE_SHIFT
Hi *,
I managed to setup adeb on a pixel4 with custom kernel compiled as suggested by adeb's README.
The setup is working fine for some BCC tools, as vfsstat but a few as opensnoop and the trace
Hi *,
I managed to setup adeb on a pixel4 with custom kernel compiled as suggested by adeb's README.
The setup is working fine for some BCC tools, as vfsstat but a few as opensnoop and the trace
|
By
katrina lulz
·
#1949
·
|
|
get function latency using ebpf-uprobe when using coroutine
Bcc has funclatency.py which support get function latency for the user program, using pid_tgid as the key.
But when it comes to a program was written by golang which supports coroutine(goroutine), it
Bcc has funclatency.py which support get function latency for the user program, using pid_tgid as the key.
But when it comes to a program was written by golang which supports coroutine(goroutine), it
|
By
Forrest Chen
·
#1948
·
|
|
Re: Weird behaviour when updating a hash map from userspace
<williamfindlay@...> wrote:
Does your key data structure have padding? Different padding values
will cause different actual keys.
If padding is not an issue in your case, could you
<williamfindlay@...> wrote:
Does your key data structure have padding? Different padding values
will cause different actual keys.
If padding is not an issue in your case, could you
|
By
Yonghong Song
·
#1947
·
|
|
Weird behaviour when updating a hash map from userspace
Hi all.
Currently debugging a very strange behaviour with eBPF hash maps and was wondering if anyone else has run into a similar issue? I am using libbpf-rs with BPF CO-RE and my kernel
Hi all.
Currently debugging a very strange behaviour with eBPF hash maps and was wondering if anyone else has run into a similar issue? I am using libbpf-rs with BPF CO-RE and my kernel
|
By
williamfindlay@...
·
#1946
·
|
|
Re: verifier: variable offset stack access question
I think your above assessment is kind of correct. For any read/write
to stack in bpf programs, the stack offset must be known so the
verifier knows exactly what the program tries to do. For
I think your above assessment is kind of correct. For any read/write
to stack in bpf programs, the stack offset must be known so the
verifier knows exactly what the program tries to do. For
|
By
Yonghong Song
·
#1945
·
|
|
Re: verifier: variable offset stack access question
I cannot remember details. Here, what "memset" did is to initialize
related bytes in stack to 0. I guess maybe at that point
bpf_probe_read_str requires an initialized memory?
Right now,
I cannot remember details. Here, what "memset" did is to initialize
related bytes in stack to 0. I guess maybe at that point
bpf_probe_read_str requires an initialized memory?
Right now,
|
By
Yonghong Song
·
#1944
·
|
|
Re: verifier: variable offset stack access question
For posterity, I think I can now answer my own question. I suspect
things were different in 2018 (because otherwise I don’t see how the
referenced exchange makes sense); here’s my understanding
For posterity, I think I can now answer my own question. I suspect
things were different in 2018 (because otherwise I don’t see how the
referenced exchange makes sense); here’s my understanding
|
By
Andrei Matei
·
#1943
·
|
|
verifier: variable offset stack access question
Hello Yonghong, all,
I'm curious about a verifier workaround that Yonghong provided two years ago, in this thread.
Brendan Gregg was asking about accessing stack buffers through a register with a
Hello Yonghong, all,
I'm curious about a verifier workaround that Yonghong provided two years ago, in this thread.
Brendan Gregg was asking about accessing stack buffers through a register with a
|
By
Andrei Matei
·
#1942
·
|
|
[Warning ⚠] Do you understand how to built bpf.file for snort on fedora?
Hello,
[Warning ⚠] Do you understand how to built bpf.file for snort on fedora?
Thank you in advance,
I hope the success,
Regards.
Dorian Rosse Téléchargez Outlook pour Android
Hello,
[Warning ⚠] Do you understand how to built bpf.file for snort on fedora?
Thank you in advance,
I hope the success,
Regards.
Dorian Rosse Téléchargez Outlook pour Android
|
By
Dorian ROSSE
·
#1941
·
|
|
Re: High volume bpf_perf_output tracing
Hi,
Ideally you’d want to do as much work in the kernel as possible. Passing that much data to user space is kind of mis using bpf.
What kind of work are you doing that can only be done in user
Hi,
Ideally you’d want to do as much work in the kernel as possible. Passing that much data to user space is kind of mis using bpf.
What kind of work are you doing that can only be done in user
|
By
Daniel Xu
·
#1940
·
|
|
Re: BPF Maps with wildcards
<dimolianis.marinos@...> wrote:
eBPF/XDP.
Right, BPF does not have TCAM style maps. If you organize data
structure properly, you may be able to use LPM.
<dimolianis.marinos@...> wrote:
eBPF/XDP.
Right, BPF does not have TCAM style maps. If you organize data
structure properly, you may be able to use LPM.
|
By
Yonghong Song
·
#1939
·
|
|
High volume bpf_perf_output tracing
I'm currently working on a python script to trace the nvme driver. I'm hitting a performance bottleneck on the event callback in python and am looking for the best way (or maybe a quick and dirty way)
I'm currently working on a python script to trace the nvme driver. I'm hitting a performance bottleneck on the event callback in python and am looking for the best way (or maybe a quick and dirty way)
|
By
wes.vaske@...
·
#1938
·
|
|
Re: BPF Maps with wildcards
Thanks for the response.
LPM is actually the closest solution however I wanted a structure closer to the way TCAMs operate in which you can have wildcards also in the interim bits.
I believe that
Thanks for the response.
LPM is actually the closest solution however I wanted a structure closer to the way TCAMs operate in which you can have wildcards also in the interim bits.
I believe that
|
By
Marinos Dimolianis
·
#1937
·
|
|
Re: BPF Maps with wildcards
The closest map is lpm (trie) map. You may want to take a look.
The closest map is lpm (trie) map. You may want to take a look.
|
By
Yonghong Song
·
#1936
·
|
|
BPF Maps with wildcards
Hi all, I am trying to find a way to represent wildcards in BPF Map Keys?
I could not find anything relevant to that, does anyone know anything further.
Are there any efforts towards that
Hi all, I am trying to find a way to represent wildcards in BPF Map Keys?
I could not find anything relevant to that, does anyone know anything further.
Are there any efforts towards that
|
By
Marinos Dimolianis
·
#1935
·
|
|
Attaching dynamic uprobe to C++ library/application
#bcc
Hi all,
I am learning about ebpf and the bcc tools/library. I have a question about dynamic uprobe of C++ code. I have been able to attach a uprobe successfully by looking up the mangled symbol name.
Hi all,
I am learning about ebpf and the bcc tools/library. I have a question about dynamic uprobe of C++ code. I have been able to attach a uprobe successfully by looking up the mangled symbol name.
|
By
harnan@...
·
#1934
·
|