OK. Found it. Thanks! it works!
On Thu, Jun 1, 2017 at 9:43 AM, Adel Fuchs wrote:
> Hi,
> Thanks for your reply. Where do I need to add this workaround?
>
> Thanks,
> Adel
>
> On Mon, May 29, 2017 at 8:31 AM, Y Song wrote:
>> On Sun, May 28, 2017 at 12:38 AM, Adel Fuchs wrote:
>>> Hi,
>>> Is th
Hi,
Thanks for your reply. Where do I need to add this workaround?
Thanks,
Adel
On Mon, May 29, 2017 at 8:31 AM, Y Song wrote:
> On Sun, May 28, 2017 at 12:38 AM, Adel Fuchs wrote:
>> Hi,
>> Is there any way to run this eBPF program without that patch?
>> Alternatively, is there any other eBPF
On Sun, May 28, 2017 at 12:38 AM, Adel Fuchs wrote:
> Hi,
> Is there any way to run this eBPF program without that patch?
> Alternatively, is there any other eBPF sample that does run properly? I need
> to run a program that filters packets according to IP address or port.
The following is tempor
Hi,
Is there any way to run this eBPF program without that patch?
Alternatively, is there any other eBPF sample that does run properly?
I need to run a program that filters packets according to IP address
or port.
Thanks,
Adel
On Sun, May 28, 2017 at 8:08 AM, Y Song wrote:
> On Sat, May 27, 2017
On Sat, May 27, 2017 at 5:11 PM, David Miller wrote:
> From: Y Song
> Date: Sat, 27 May 2017 13:52:27 -0700
>
>> On Sat, May 27, 2017 at 1:23 PM, Y Song wrote:
>>>
>>> From verifier error message:
>>> ==
>>> 0: (bf) r6 = r1
>>>
>>> 1: (18) r9 = 0xffee
>>>
>>> 3: (69) r0 = *(u16 *)(r6 +16
From: Y Song
Date: Sat, 27 May 2017 13:52:27 -0700
> On Sat, May 27, 2017 at 1:23 PM, Y Song wrote:
>>
>> From verifier error message:
>> ==
>> 0: (bf) r6 = r1
>>
>> 1: (18) r9 = 0xffee
>>
>> 3: (69) r0 = *(u16 *)(r6 +16)
>>
>> invalid bpf_context access off=16 size=2
>> ==
>>
>> The
On Sat, May 27, 2017 at 1:23 PM, Y Song wrote:
>
> From verifier error message:
> ==
> 0: (bf) r6 = r1
>
> 1: (18) r9 = 0xffee
>
> 3: (69) r0 = *(u16 *)(r6 +16)
>
> invalid bpf_context access off=16 size=2
> ==
>
> The offset 16 of struct __sk_buff is hash.
> What instruction #3 tries
>From verifier error message:
==
0: (bf) r6 = r1
1: (18) r9 = 0xffee
3: (69) r0 = *(u16 *)(r6 +16)
invalid bpf_context access off=16 size=2
==
The offset 16 of struct __sk_buff is hash.
What instruction #3 tries to do is to access 2 bytes of the hash value
instead of full 4 bytes.
T
Hi
I'm trying to run this eBPF program:
https://git.kernel.org/pub/scm/linux/kernel/git/shemminger/iproute2.git/tree/examples/bpf
and I get this error:
:~/iproute2/examples/bpf$sudo tc filter add dev enx00e11100329b parent
1: bpf obj bpf.o exp /tmp/bpf-uds flowid 1:1 action bpf obj bpf.o sec