|
execveat tracepoints issues
Hello everyone!
I am experiencing some issues with the execveat tracepoints, and was wondering if others could reproduce it or help me understand what I am doing wrong.
On Arch Linux (kernel 5.9.1,
Hello everyone!
I am experiencing some issues with the execveat tracepoints, and was wondering if others could reproduce it or help me understand what I am doing wrong.
On Arch Linux (kernel 5.9.1,
|
By
alessandro.gario@...
·
#1931
·
|
|
Re: Minimum LLVM version for bcc
This is a good question. For packaging purpose, no, it does not matter
much. The people who builds package can choose whatever it is
available to them to package. bcc is supposed to work for all
This is a good question. For packaging purpose, no, it does not matter
much. The people who builds package can choose whatever it is
available to them to package. bcc is supposed to work for all
|
By
Yonghong Song
·
#1930
·
|
|
Minimum LLVM version for bcc
Does the LLVM version used by bcc matter, for packaging purposes?
I assume bcc includes some static libraries from LLVM, so I'm curious if the older versions are acceptable. For instance, on ubuntu
Does the LLVM version used by bcc matter, for packaging purposes?
I assume bcc includes some static libraries from LLVM, so I'm curious if the older versions are acceptable. For instance, on ubuntu
|
By
Dale Hamel
·
#1929
·
|
|
Re: [Ext] Re: [iovisor-dev] Questions about current eBPF usages
Thank you very much, Yonghong! Those are very helpful.
Thank you very much, Yonghong! Those are very helpful.
|
By
Jiada Tu
·
#1928
·
|
|
Re: [Ext] Re: [iovisor-dev] Questions about current eBPF usages
e.g., in kernel/events/core.c, for perf event overflow handler, we have
rcu_read_lock();
ret = BPF_PROG_RUN(event->prog, &ctx);
rcu_read_unlock();
out:
e.g., in kernel/events/core.c, for perf event overflow handler, we have
rcu_read_lock();
ret = BPF_PROG_RUN(event->prog, &ctx);
rcu_read_unlock();
out:
|
By
Yonghong Song
·
#1927
·
|
|
Re: [Ext] Re: [iovisor-dev] Questions about current eBPF usages
Thanks a lot, Yonghong. From your response:
1. How can I make a kernel function use the return value of a eBPF program/function?
2. An KProbes related question: from an
Thanks a lot, Yonghong. From your response:
1. How can I make a kernel function use the return value of a eBPF program/function?
2. An KProbes related question: from an
|
By
Jiada Tu
·
#1926
·
|
|
Re: Questions about current eBPF usages
<jtu3=hawk.iit.edu@...> wrote:
Currently, no. Kernel has support to replace a bpf program, but not
kernel function. Replacing kernel functions may easily causing kernel
mishehave. There
<jtu3=hawk.iit.edu@...> wrote:
Currently, no. Kernel has support to replace a bpf program, but not
kernel function. Replacing kernel functions may easily causing kernel
mishehave. There
|
By
Yonghong Song
·
#1925
·
|
|
Questions about current eBPF usages
Hello BPF community,
I am looking for a way to move a user space program's disk I/O scheduling related logic down to kernel space, and then have the new kernel logic communicate with the user space
Hello BPF community,
I am looking for a way to move a user space program's disk I/O scheduling related logic down to kernel space, and then have the new kernel logic communicate with the user space
|
By
Jiada Tu
·
#1924
·
|
|
Re: Tracepoint/Kprobe for tracking inbound connections
XDP only tracks raw packet. There is no skb or other meta data is
available at that point.
You either need to track by yourself or you add another skb or sk level hook.
XDP only tracks raw packet. There is no skb or other meta data is
available at that point.
You either need to track by yourself or you add another skb or sk level hook.
|
By
Yonghong Song
·
#1923
·
|
|
Re: Tracepoint/Kprobe for tracking inbound connections
Thanks Forrest!
By
Kanthi P <Pavuluri.kanthi@...>
·
#1922
·
|
|
Re: Tracepoint/Kprobe for tracking inbound connections
Nice, thanks Song. I am actually looking to track it till it is closed, so might have to remove that tag when the socket goes to closed state.
And once I have the concurrent connections info, say in a
Nice, thanks Song. I am actually looking to track it till it is closed, so might have to remove that tag when the socket goes to closed state.
And once I have the concurrent connections info, say in a
|
By
Kanthi P <Pavuluri.kanthi@...>
·
#1921
·
Edited
|
|
Re: Question about inet_set_socket_state trace point
Hi,
Observing established connection counter discrepancy as 20% (30-40 connections mismatch out of 200) in one day that builds to 30% by day-2 and so on.
This observation is with this code
if
Hi,
Observing established connection counter discrepancy as 20% (30-40 connections mismatch out of 200) in one day that builds to 30% by day-2 and so on.
This observation is with this code
if
|
By
Raga lahari
·
#1920
·
|
|
Re: Question about inet_set_socket_state trace point
Hello,
Correcting typo in code snippet
<code>
TRACEPOINT_PROBE(sock, inet_sock_set_state) {
if (args->newstate == TCP_ESTABLISHED)
__sync_fetch_and_add(val, 1);
if
Hello,
Correcting typo in code snippet
<code>
TRACEPOINT_PROBE(sock, inet_sock_set_state) {
if (args->newstate == TCP_ESTABLISHED)
__sync_fetch_and_add(val, 1);
if
|
By
Raga lahari
·
#1919
·
|
|
Re: Question about inet_set_socket_state trace point
Hi Ragalahari,
In your code you seem to not check for "old state" when you're heading to decrement. It looks like you are adding 1 and then immediately subtracting 1 in the same condition. That might
Hi Ragalahari,
In your code you seem to not check for "old state" when you're heading to decrement. It looks like you are adding 1 and then immediately subtracting 1 in the same condition. That might
|
By
Tristan Mayfield
·
#1918
·
|
|
Question about inet_set_socket_state trace point
Hi everyone,
I am using inet_set_socket_state trace point to get current establish connection count
Here, incrementing counter value in BPF map when new state is TCP_ESTABLISHED and decrementing
Hi everyone,
I am using inet_set_socket_state trace point to get current establish connection count
Here, incrementing counter value in BPF map when new state is TCP_ESTABLISHED and decrementing
|
By
Raga lahari
·
#1917
·
|
|
Re: [vagrant] accept PR to bring iovisor/vagrant to ubuntu 20.04 (from ubuntu 14.04)
Sure I can accept a PR.
By
Brenden Blanco
·
#1916
·
|
|
[vagrant] accept PR to bring iovisor/vagrant to ubuntu 20.04 (from ubuntu 14.04)
I have to create a test-environment (based on vagrant) the last couple of days and i've done this with ubuntu 20.04 as base image.
Is the repository https://github.com/iovisor/vagrant still active?
If
I have to create a test-environment (based on vagrant) the last couple of days and i've done this with ubuntu 20.04 as base image.
Is the repository https://github.com/iovisor/vagrant still active?
If
|
By
github@...
·
#1915
·
|
|
Re: Tracepoint/Kprobe for tracking inbound connections
you can attach kprobe in 'tcp_conn_request" for inbound connection
--
forrest0579@...
you can attach kprobe in 'tcp_conn_request" for inbound connection
--
forrest0579@...
|
By
Forrest Chen
·
#1914
·
|
|
Re: Tracepoint/Kprobe for tracking inbound connections
Maybe you can use sk_local_storage? You can attach a piece of
information to the socket during TCP_SYN_RECV and later on during
TCP_ESTABLISHED to check that data, and you can delete that data
Maybe you can use sk_local_storage? You can attach a piece of
information to the socket during TCP_SYN_RECV and later on during
TCP_ESTABLISHED to check that data, and you can delete that data
|
By
Yonghong Song
·
#1913
·
|
|
Tracepoint/Kprobe for tracking inbound connections
Hi,
I am looking for tracking inbound connections on a system using tracepoints/kprobes.
I was checking "trace_inet_sock_set_state", with which we can track the state changes during connection
Hi,
I am looking for tracking inbound connections on a system using tracepoints/kprobes.
I was checking "trace_inet_sock_set_state", with which we can track the state changes during connection
|
By
Kanthi P <Pavuluri.kanthi@...>
·
#1912
·
|