|
Unexpectedly high latencies are showed by self-written script (bpf_ktime_get_ns issue?)
Maybe you want to check with bcc issue https://github.com/iovisor/bcc/issues/728. Basically there is a kernel bug related to bpf_ktime_get_ns() and it is fixed in 4.9. Not sure about your kernel versi
Maybe you want to check with bcc issue https://github.com/iovisor/bcc/issues/728. Basically there is a kernel bug related to bpf_ktime_get_ns() and it is fixed in 4.9. Not sure about your kernel versi
|
By
Yonghong Song
· #1538
·
|
|
Recommended LLVM version for bcc 0.7.0
All LLVM versions ( >= 3.7.1) should work for x86, but to use some features like BPF debug=8 to dump the source embedded byte code, you need llvm 6.0 or later.
All LLVM versions ( >= 3.7.1) should work for x86, but to use some features like BPF debug=8 to dump the source embedded byte code, you need llvm 6.0 or later.
|
By
Yonghong Song
· #1530
·
|
|
eBPF TC for adjusting the packet length
You may check helper bpf_skb_change_tail(), which could serve your purpose.
You may check helper bpf_skb_change_tail(), which could serve your purpose.
|
By
Yonghong Song
· #1526
·
|
|
minutes: IO Visor TSC/Dev Meeting
The link to the llvm patch which generates .BTF and .BTF.ext sections: https://reviews.llvm.org/D52950
The link to the llvm patch which generates .BTF and .BTF.ext sections: https://reviews.llvm.org/D52950
|
By
Yonghong Song
· #1492
·
|
|
minutes: IO Visor TSC/Dev Meeting
Hi, All, Below is the today's meeting notes. Thanks for joining the meeting. Please amend if you see any inaccurate or missing information. Yonghong ==== Discussion ==== Yonghong: - worked and upstrea
Hi, All, Below is the today's meeting notes. Thanks for joining the meeting. Please amend if you see any inaccurate or missing information. Yonghong ==== Discussion ==== Yonghong: - worked and upstrea
|
By
Yonghong Song
· #1484
·
|
|
[PATCH RFC] bpf: Symbol sizes and types in object file
You can also cc llvm-commits.
You can also cc llvm-commits.
|
By
Yonghong Song
· #1483
·
|
|
[PATCH RFC] bpf: Symbol sizes and types in object file
<alexei.starovoitov@...> wrote: Currently, BTF does not deal with symbols, so that is why it is okay. llvm-objdump does not need symbol size either. It only needs symbol offset. that is why we d
<alexei.starovoitov@...> wrote: Currently, BTF does not deal with symbols, so that is why it is okay. llvm-objdump does not need symbol size either. It only needs symbol offset. that is why we d
|
By
Yonghong Song
· #1480
·
|
|
[PATCH 0/2] tools: Skip backward time entries
Jiri, The change looks good. Could you generate a pull request against the bcc/iovisor github repository? Thanks! Yonghong
Jiri, The change looks good. Could you generate a pull request against the bcc/iovisor github repository? Thanks! Yonghong
|
By
Yonghong Song
· #1466
·
|
|
[PATCH] BPF: helpers: New helper bpf_get_current_pidns_info to obtain namespace data from current task.
Looks good. Only one comment in the below. After you addressed it, you can send the patch to netdev with patch prefix [PATCH bpf-next]. Please move this definition to the end of file.
Looks good. Only one comment in the below. After you addressed it, you can send the patch to netdev with patch prefix [PATCH bpf-next]. Please move this definition to the end of file.
|
By
Yonghong Song
· #1453
·
|
|
BTF examples or documentation?
Currently, we are still in the design and prototyping stage. Will definitely share for comments once we got some concept design and RFC implementation.
Currently, we are still in the design and prototyping stage. Will definitely share for comments once we got some concept design and RFC implementation.
|
By
Yonghong Song
· #1452
·
|
|
[PATCH] BPF: helpers: New helper bpf_get_current_pidns_info to obtain namespace data from current task.
bpf_get_current_pid_tgid() This may not enough as different name spaces could have the same tgid. Could you add comparison for pidns.nsid as well? You also need to tell how user can find nsid inside t
bpf_get_current_pid_tgid() This may not enough as different name spaces could have the same tgid. Could you add comparison for pidns.nsid as well? You also need to tell how user can find nsid inside t
|
By
Yonghong Song
· #1442
·
|
|
Notification when an eBPF map is modified
Yes, this approach should work too. I am thinking whether we could do it with one invocation of trace.py...
Yes, this approach should work too. I am thinking whether we could do it with one invocation of trace.py...
|
By
Yonghong Song
· #1435
·
|
|
Notification when an eBPF map is modified
Okay, the htab_map_update_elem is indeed called, but you cannot trace it. The following kernel code in kernel/bpf/syscall.c explained the reason: /* must increment bpf_prog_active to avoid kprobe+bpf
Okay, the htab_map_update_elem is indeed called, but you cannot trace it. The following kernel code in kernel/bpf/syscall.c explained the reason: /* must increment bpf_prog_active to avoid kprobe+bpf
|
By
Yonghong Song
· #1433
·
|
|
using BPF for driver memory leak detection
<chaitanya.mgit@...> wrote: Which tracepoint you tried to attach? For kernel memory, a few kmem tracepoints are attached in memleak. If you want to attach a tracepoint only defined by the module
<chaitanya.mgit@...> wrote: Which tracepoint you tried to attach? For kernel memory, a few kmem tracepoints are attached in memleak. If you want to attach a tracepoint only defined by the module
|
By
Yonghong Song
· #1431
·
|
|
Notification when an eBPF map is modified
Please directly use the map lookup function for the specific map. For example, for hashmap, the verifier is smart enough to change the byte code to call the underlying hashmap map lookup function. ===
Please directly use the map lookup function for the specific map. For example, for hashmap, the verifier is smart enough to change the byte code to call the underlying hashmap map lookup function. ===
|
By
Yonghong Song
· #1430
·
|
|
[RFC PATCH v2 0/3] Implement bpf map queue
<mauricio.vasquez@...> wrote: I did not check the detailed implementation for percpu freelist implementation, but the general framework looks sound. I think the patch is ready to send to netdev
<mauricio.vasquez@...> wrote: I did not check the detailed implementation for percpu freelist implementation, but the general framework looks sound. I think the patch is ready to send to netdev
|
By
Yonghong Song
· #1426
·
|
|
[RFC PATCH v2 1/3] bpf: add bpf queue map
<mauricio.vasquez@...> wrote: Maybe we should "&& (arg_type == ARG_PTR_TO_MAP_VALUE || type != SCALAR_VALUE)"?
<mauricio.vasquez@...> wrote: Maybe we should "&& (arg_type == ARG_PTR_TO_MAP_VALUE || type != SCALAR_VALUE)"?
|
By
Yonghong Song
· #1425
·
|
|
[RFC PATCH 3/3] bpf: add sample for BPF_MAP_TYPE_QUEUE
<mauricio.vasquez@...> wrote: There are still some values as it has bpf program doing "pop" operation.
<mauricio.vasquez@...> wrote: There are still some values as it has bpf program doing "pop" operation.
|
By
Yonghong Song
· #1424
·
|
|
Notification when an eBPF map is modified
bpf tracepoints have been removed from recent linux so the you need to use kprobe to trace update/delete. typical map_update_elem and map_delete_elem first argument is 'struct bpf_map *map', you can g
bpf tracepoints have been removed from recent linux so the you need to use kprobe to trace update/delete. typical map_update_elem and map_delete_elem first argument is 'struct bpf_map *map', you can g
|
By
Yonghong Song
· #1412
·
|
|
[RFC PATCH 3/3] bpf: add sample for BPF_MAP_TYPE_QUEUE
<mauricio.vasquez@...> wrote: Could you put the test in tools/testing/selftests/bpf? This way, it will be executed by various kernel testing infrastructure. For /sys/fs/bpf mount, you can check
<mauricio.vasquez@...> wrote: Could you put the test in tools/testing/selftests/bpf? This way, it will be executed by various kernel testing infrastructure. For /sys/fs/bpf mount, you can check
|
By
Yonghong Song
· #1410
·
|