|
reminder: IO Visor TSC/Dev Meeting
Please join us tomorrow for our bi-weekly call. As usual, this meeting is open to everybody and completely optional. You might be interested to join if: You want to know what is going on in BPF land Y
Please join us tomorrow for our bi-weekly call. As usual, this meeting is open to everybody and completely optional. You might be interested to join if: You want to know what is going on in BPF land Y
|
By
Brenden Blanco
·
|
|
BPF verifier: ctx+const+const is not allowed
4 messages
Hi, We're hitting a BPF verifier error saying "dereference of modified ctx ptr R1 off=36+0, ctx+const is allowed, ctx+const+const is not " but actually the 2nd const is 0. I don't know why compiler ge
Hi, We're hitting a BPF verifier error saying "dereference of modified ctx ptr R1 off=36+0, ctx+const is allowed, ctx+const+const is not " but actually the 2nd const is 0. I don't know why compiler ge
|
By
William Tu
·
|
|
[PATCH bpf-next v5 0/2] bpf: allow map helpers access to map values directly
2 messages
Currently, helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE can only access stack and packet memory. This patchset allows these helpers to directly access map values by passing register
Currently, helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE can only access stack and packet memory. This patchset allows these helpers to directly access map values by passing register
|
By
Paul Chaignon
·
|
|
[PATCH bpf-next v4 1/2] bpf: allow map helpers access to map values directly
3 messages
Helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE can only access stack and packet memory. Allow these helpers to directly access map values by passing registers of type PTR_TO_MAP_VALUE
Helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE can only access stack and packet memory. Allow these helpers to directly access map values by passing registers of type PTR_TO_MAP_VALUE
|
By
Paul Chaignon
·
|
|
[PATCH bpf-next v5 2/2] tools/bpf: add verifier tests for accesses to map values
This patch adds new test cases for accesses to map values from map helpers. Signed-off-by: Paul Chaignon <paul.chaignon@...> --- tools/testing/selftests/bpf/test_verifier.c | 266 +++++++++++++++++++++
This patch adds new test cases for accesses to map values from map helpers. Signed-off-by: Paul Chaignon <paul.chaignon@...> --- tools/testing/selftests/bpf/test_verifier.c | 266 +++++++++++++++++++++
|
By
Paul Chaignon
·
|
|
[PATCH bpf-next v5 1/2] bpf: allow map helpers access to map values directly
Helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE can only access stack and packet memory. Allow these helpers to directly access map values by passing registers of type PTR_TO_MAP_VALUE
Helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE can only access stack and packet memory. Allow these helpers to directly access map values by passing registers of type PTR_TO_MAP_VALUE
|
By
Paul Chaignon
·
|
|
[PATCH bpf-next v4 2/2] tools/bpf: add verifier tests for accesses to map
This patch adds new test cases for accesses to map values from map helpers. Signed-off-by: Paul Chaignon <paul.chaignon@...> --- tools/testing/selftests/bpf/test_verifier.c | 266 +++++++++++++++++++++
This patch adds new test cases for accesses to map values from map helpers. Signed-off-by: Paul Chaignon <paul.chaignon@...> --- tools/testing/selftests/bpf/test_verifier.c | 266 +++++++++++++++++++++
|
By
Paul Chaignon
·
|
|
[PATCH bpf-next v4 0/2] bpf: allow map helpers access to map values directly
Currently, helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE can only access stack and packet memory. This patchset allows these helpers to directly access map values by passing register
Currently, helpers that expect ARG_PTR_TO_MAP_KEY and ARG_PTR_TO_MAP_VALUE can only access stack and packet memory. This patchset allows these helpers to directly access map values by passing register
|
By
Paul Chaignon
·
|
|
Access to struct with kprobe
5 messages
Dear all I'm a student at Paris-VI Univercity and currently I'm working on a project involving eBPF with linux network stack ,and I need some guidence. If we attach the eBPF program to a kprobe ,and t
Dear all I'm a student at Paris-VI Univercity and currently I'm working on a project involving eBPF with linux network stack ,and I need some guidence. If we attach the eBPF program to a kprobe ,and t
|
By
Bilal
·
|
|
bpftool binary size
2 messages
(Cc. iovisor-dev list) So, I figured out why this happens. What does bpftool use BFD for? I need the BFD lib and include file: /usr/include/bfd.h. Thus, on fedora I need to install package binutils-de
(Cc. iovisor-dev list) So, I figured out why this happens. What does bpftool use BFD for? I need the BFD lib and include file: /usr/include/bfd.h. Thus, on fedora I need to install package binutils-de
|
By
Jesper Dangaard Brouer
·
|
|
minutes: IO Visort TSC/Dev Meeting
Hi All, Thanks for attending the meeting today. As usual, here are my notes. Cheers, Brenden === Discussion === Alexei - bpf-next queue is quite large, please have patience with delays in clearing the
Hi All, Thanks for attending the meeting today. As usual, here are my notes. Cheers, Brenden === Discussion === Alexei - bpf-next queue is quite large, please have patience with delays in clearing the
|
By
Brenden Blanco
·
|
|
reminder: IO Visor TSC/Dev Meeting
Please join us tomorrow for our bi-weekly call. As usual, this meeting is open to everybody and completely optional. You might be interested to join if: You want to know what is going on in BPF land Y
Please join us tomorrow for our bi-weekly call. As usual, this meeting is open to everybody and completely optional. You might be interested to join if: You want to know what is going on in BPF land Y
|
By
Brenden Blanco
·
|
|
Best userspace programming API for XDP features query to kernel?
8 messages
Hi Suricata people, When Eric Leblond (and I helped) integrated XDP in Suricata, we ran into the issue, that at Suricata load/start time, we cannot determine if the chosen XDP config options, like xdp
Hi Suricata people, When Eric Leblond (and I helped) integrated XDP in Suricata, we ran into the issue, that at Suricata load/start time, we cannot determine if the chosen XDP config options, like xdp
|
By
Jesper Dangaard Brouer
·
|
|
bps helper functions
5 messages
Dear developers, Is it a good idea to export kernel compression/decompression (lib/zlib_*, lib/lz*) as helper functions to enable corresponding use cases? Has this been tried before? Thanks, Ashish
Dear developers, Is it a good idea to export kernel compression/decompression (lib/zlib_*, lib/lz*) as helper functions to enable corresponding use cases? Has this been tried before? Thanks, Ashish
|
By
riya
·
|
|
[Oisf-devel] Best userspace programming API for XDP features query to kernel?
3 messages
I think if it would use the ioctl ETHTOOL interface it'd be easiest for us, as we already have code for this in place to check for offloading settings. See [1]. Do you have an example of how this is q
I think if it would use the ioctl ETHTOOL interface it'd be easiest for us, as we already have code for this in place to check for offloading settings. See [1]. Do you have an example of how this is q
|
By
Victor Julien
·
|
|
[Oisf-devel] Best userspace programming API for XDP features query to kernel?
Extending the ethtools mechanism seems like a clean solution here. It is, by design, a 50% reporting tool and the XDP feature set would be just yet another feature here.
Extending the ethtools mechanism seems like a clean solution here. It is, by design, a 50% reporting tool and the XDP feature set would be just yet another feature here.
|
By
Michał Purzyński
·
|
|
minutes: IO VIsor TSC/Dev Meeting
Hi All, Thanks for attending the meeting today. Here are my notes from the call. Cheers, Brenden === Status === Yonghong - Debugging incorrect user stack - fastpath vs slowpath register difference - s
Hi All, Thanks for attending the meeting today. Here are my notes from the call. Cheers, Brenden === Status === Yonghong - Debugging incorrect user stack - fastpath vs slowpath register difference - s
|
By
Brenden Blanco
·
|
|
reminder: IO Visor TSC/Dev Meeting
Please join us tomorrow for our bi-weekly call. As usual, this meeting is open to everybody and completely optional. You might be interested to join if: You want to know what is going on in BPF land Y
Please join us tomorrow for our bi-weekly call. As usual, this meeting is open to everybody and completely optional. You might be interested to join if: You want to know what is going on in BPF land Y
|
By
Brenden Blanco
·
|
|
trace_printk
5 messages
Hi - When I use bpf_trace_printk - I am getting this NOTICE. Does it mean, that eBPF shouldn't be used in the production kernel. Mar 20 12:26:44 lenovo-e565 kernel: [ 267.467518] *********************
Hi - When I use bpf_trace_printk - I am getting this NOTICE. Does it mean, that eBPF shouldn't be used in the production kernel. Mar 20 12:26:44 lenovo-e565 kernel: [ 267.467518] *********************
|
By
SARANKUMAR KRISHNAN
·
|
|
BPF hackfest in Berlin end of September 2018?
4 messages
Hi, I’d like to suggest a BPF hackfest in Berlin in the days before the All Systems Go! Conference which will take place September 28-30. All Systems Go! is the user-space Linux conference we help org
Hi, I’d like to suggest a BPF hackfest in Berlin in the days before the All Systems Go! Conference which will take place September 28-30. All Systems Go! is the user-space Linux conference we help org
|
By
Alban Crequy
·
|