|
bpf_trace_printk
Depends where you have tracefs mounted, f.e. cat /sys/kernel/debug/tracing/trace_pipe Cheers, Daniel
Depends where you have tracefs mounted, f.e. cat /sys/kernel/debug/tracing/trace_pipe Cheers, Daniel
|
By
Daniel Borkmann
· #25
·
|
|
bpf_trace_printk
On 11/12/2015 12:14 AM, O Mahony, Billy wrote: ... > One thing I notice is that immediately after I assign ip addrs to the endpoints of the veth pair I see several log messages: > > <idle>-0 [000] .Ns
On 11/12/2015 12:14 AM, O Mahony, Billy wrote: ... > One thing I notice is that immediately after I assign ip addrs to the endpoints of the veth pair I see several log messages: > > <idle>-0 [000] .Ns
|
By
Daniel Borkmann
· #28
·
|
|
Changing packet fields before redirect
Do you get -EFAULT error from bpf_skb_store_bytes()? What buffer size do you pass into the function (R4)? Would something like the below help? Just compile-tested for now, still needs an audit whether
Do you get -EFAULT error from bpf_skb_store_bytes()? What buffer size do you pass into the function (R4)? Would something like the below help? Just compile-tested for now, still needs an audit whether
|
By
Daniel Borkmann
· #57
·
|
|
Changing packet fields before redirect
Sure, that's fine, can do that. Yeah, I think reloading pointers via JIT should not take too many cycles. Was still thinking if we better should extend this (rather slow-path) test into handling it mo
Sure, that's fine, can do that. Yeah, I think reloading pointers via JIT should not take too many cycles. Was still thinking if we better should extend this (rather slow-path) test into handling it mo
|
By
Daniel Borkmann
· #59
·
|
|
Changing packet fields before redirect
I believe from the old nft ingress discussion. ;) But maybe it was just a different issue w/ other actions (or not up to date fact anymore). There's also skb_ensure_writable(), but seems to be doing m
I believe from the old nft ingress discussion. ;) But maybe it was just a different issue w/ other actions (or not up to date fact anymore). There's also skb_ensure_writable(), but seems to be doing m
|
By
Daniel Borkmann
· #61
·
|
|
Changing packet fields before redirect
[...] Yeah, so I'll do some more testing and get it out for -net-next when it opens up next few days hopefully, keeping also Ashhad in the loop (meanwhile you can use the patch). Cheers, Daniel
[...] Yeah, so I'll do some more testing and get it out for -net-next when it opens up next few days hopefully, keeping also Ashhad in the loop (meanwhile you can use the patch). Cheers, Daniel
|
By
Daniel Borkmann
· #63
·
|
|
unknown func 13
On 03/03/2016 08:19 PM, Brenden Blanco via iovisor-dev wrote: [...] > On Thu, Mar 3, 2016 at 5:52 AM, O Mahony, Billy <billy.o.mahony@...> [...] >> #add a filter to accept all eth frame. Attach
On 03/03/2016 08:19 PM, Brenden Blanco via iovisor-dev wrote: [...] > On Thu, Mar 3, 2016 at 5:52 AM, O Mahony, Billy <billy.o.mahony@...> [...] >> #add a filter to accept all eth frame. Attach
|
By
Daniel Borkmann
· #95
·
|
|
unknown func 13
That's awesome, thanks Brenden!
That's awesome, thanks Brenden!
|
By
Daniel Borkmann
· #98
·
|
|
unknown func 13
If in terms of tc "overhead" you mean first going through this fake u32 match-all classifier, then, as suggested, you can simply use cls_bpf with direct action mode. Check out the bpf_netdev_conferenc
If in terms of tc "overhead" you mean first going through this fake u32 match-all classifier, then, as suggested, you can simply use cls_bpf with direct action mode. Check out the bpf_netdev_conferenc
|
By
Daniel Borkmann
· #105
·
|
|
bpf version of this sample
Actually for network debugging it would be nice if we could classify an skb e.g. from XDP (when passed to stack) or cls_bpf ingress, and tell the kernel that if this particular skb changes e.g. its pr
Actually for network debugging it would be nice if we could classify an skb e.g. from XDP (when passed to stack) or cls_bpf ingress, and tell the kernel that if this particular skb changes e.g. its pr
|
By
Daniel Borkmann
· #138
·
|
|
The page-pool as a component for XDP forwarding
Can't this be done in a second step, with some per-cpu scratch data as we have for redirect? That would seem easier to use to me, and easier to extend with further data required to tx or rx to stack .
Can't this be done in a second step, with some per-cpu scratch data as we have for redirect? That would seem easier to use to me, and easier to extend with further data required to tx or rx to stack .
|
By
Daniel Borkmann
· #171
·
|
|
The page-pool as a component for XDP forwarding
Yep, first step with opcodes 0=drop, 1=pass/stack, 2=tx/fwd defined sounds reasonable to me with rest as drop.
Yep, first step with opcodes 0=drop, 1=pass/stack, 2=tx/fwd defined sounds reasonable to me with rest as drop.
|
By
Daniel Borkmann
· #173
·
|
|
The page-pool as a component for XDP forwarding
But that would mean, that XDP programs are not portable anymore across different drivers, no? So they'd have to be rewritten when porting to a different nic or cannot be supported there due to missing
But that would mean, that XDP programs are not portable anymore across different drivers, no? So they'd have to be rewritten when porting to a different nic or cannot be supported there due to missing
|
By
Daniel Borkmann
· #177
·
|
|
[PATCH, BPF 1/5] BPF: Use a provisional ELF e_machine value
Great, can that be assumed the final magic e_machine number for the ELF header that eBPF loaders can check for as well then (I do like 0xeb9f ;))?
Great, can that be assumed the final magic e_machine number for the ELF header that eBPF loaders can check for as well then (I do like 0xeb9f ;))?
|
By
Daniel Borkmann
· #253
·
|
|
[PATCH, BPF 1/5] BPF: Use a provisional ELF e_machine value
Yeah, sounds good!
By
Daniel Borkmann
· #257
·
|
|
Direct packet access validation across tail calls
Yeah, checks cannot be carried over in two occasions: i) calling helpers that change skb->data (and therefore prior checks become invalid) and ii) tail calls. For tail calls the verifier doesn't know
Yeah, checks cannot be carried over in two occasions: i) calling helpers that change skb->data (and therefore prior checks become invalid) and ii) tail calls. For tail calls the verifier doesn't know
|
By
Daniel Borkmann
· #288
·
|
|
Unable to run the bpf samples on Fedora 25 beta (4.8.2-300)
On 10/25/2016 08:00 PM, Chandrasekar Kannan via iovisor-dev wrote: [...] > But when I try to run the sample from the linux source tree under release > (v4.8), > I get some strange errors. > > "Error f
On 10/25/2016 08:00 PM, Chandrasekar Kannan via iovisor-dev wrote: [...] > But when I try to run the sample from the linux source tree under release > (v4.8), > I get some strange errors. > > "Error f
|
By
Daniel Borkmann
· #503
·
|
|
How to update the csum of a trimmed UDP packet?
What's your specific use-case on this? Reason why I'm asking is that the helper needs to linearize skb and is thus only suitable for slow path [1]. F.e. we use it for rewriting an skb as time exceeded
What's your specific use-case on this? Reason why I'm asking is that the helper needs to linearize skb and is thus only suitable for slow path [1]. F.e. we use it for rewriting an skb as time exceeded
|
By
Daniel Borkmann
· #588
·
|
|
How to update the csum of a trimmed UDP packet?
On just a very quick glance, don't you need UDP length here (aka UDP header and data)?
On just a very quick glance, don't you need UDP length here (aka UDP header and data)?
|
By
Daniel Borkmann
· #593
·
|
|
BPF verifier: cannot add integer value with 0 upper zero bits to ptr_to_packet
Hi William, Can you try out the below patch? evaluate_reg_imm_alu() is invoked on ALU ops where the dst reg is CONST_IMM and the src is either a constant from the insn or a reg with type CONST_IMM. Cu
Hi William, Can you try out the below patch? evaluate_reg_imm_alu() is invoked on ALU ops where the dst reg is CONST_IMM and the src is either a constant from the insn or a reg with type CONST_IMM. Cu
|
By
Daniel Borkmann
· #602
·
|