From patchwork Wed Jan 8 16:23:51 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michal Rostecki X-Patchwork-Id: 1219815 Return-Path: X-Original-To: incoming-bpf@patchwork.ozlabs.org Delivered-To: patchwork-incoming-bpf@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=bpf-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=opensuse.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 47tF2N0jpDz9sP6 for ; Thu, 9 Jan 2020 03:24:44 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727789AbgAHQYn (ORCPT ); Wed, 8 Jan 2020 11:24:43 -0500 Received: from mx2.suse.de ([195.135.220.15]:32850 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727618AbgAHQYm (ORCPT ); Wed, 8 Jan 2020 11:24:42 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id BD268B281; Wed, 8 Jan 2020 16:24:40 +0000 (UTC) From: Michal Rostecki To: bpf@vger.kernel.org Cc: Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , Andrii Nakryiko , Quentin Monnet , Jakub Kicinski , Stanislav Fomichev , Prashant Bhole , Peter Wu , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH bpf-next v3 0/2] bpftool/libbpf: Add probe for large INSN limit Date: Wed, 8 Jan 2020 17:23:51 +0100 Message-Id: <20200108162428.25014-1-mrostecki@opensuse.org> X-Mailer: git-send-email 2.16.4 Sender: bpf-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org This series implements a new BPF feature probe which checks for the commit c04c0d2b968a ("bpf: increase complexity limit and maximum program size"), which increases the maximum program size to 1M. It's based on the similar check in Cilium, although Cilium is already aiming to use bpftool checks and eventually drop all its custom checks. Examples of outputs: # bpftool feature probe [...] Scanning miscellaneous eBPF features... Large complexity limit and maximum program size (1M) is available # bpftool feature probe macros [...] /*** eBPF misc features ***/ #define HAVE_HAVE_LARGE_INSN_LIMIT # bpftool feature probe -j | jq '.["misc"]' { "have_large_insn_limit": true } v1 -> v2: - Test for 'BPF_MAXINSNS + 1' number of total insns. - Remove info about current 1M limit from probe's description. v2 -> v3: - Remove the "complexity" word from probe's description. Michal Rostecki (2): libbpf: Add probe for large INSN limit bpftool: Add misc section and probe for large INSN limit tools/bpf/bpftool/feature.c | 18 ++++++++++++++++++ tools/lib/bpf/libbpf.h | 1 + tools/lib/bpf/libbpf.map | 1 + tools/lib/bpf/libbpf_probes.c | 21 +++++++++++++++++++++ 4 files changed, 41 insertions(+) Reviewed-by: Quentin Monnet