Cilium v1.6 Documentationpod-template-generation labels k8s:!pod-template-hash Ignore all pod-template-hash labels k8s:!controller-revision-hash Ignore all controller-revision-hash labels k8s:!annotation.* Ignore all annotation you as the developer to implement three primary functions, shown as blue in the diagram below. We will cover OnData() in this section, and the other functions in section Step 9: Add Policy Loading and Matching entries, and stores them as aRule object. See r2d2/r2d2parser.go for examples of both functions for the r2d2 protocol. You’ll also need to update OnData to call p.connection.Matches(), and if 0 码力 | 734 页 | 11.45 MB | 1 年前3
Cilium v1.7 Documentationunit tests on code changes BPF and XDP Reference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment pod-template-generation labels any:!pod-template-hash Ignore all pod-template-hash labels any:!controller-revision-hash Ignore all controller-revision-hash labels any:!annotation.* Ignore all annotation you as the developer to implement three primary functions, shown as blue in the diagram below. We will cover OnData() in this section, and the other functions in section Step 9: Add Policy Loading and Matching0 码力 | 885 页 | 12.41 MB | 1 年前3
Cilium v1.11 Documentationunit tests on code changes BPF and XDP Reference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment -c12 /dev/urandom | base64 - w0, for example. Every Cilium agent in the cluster must use the same hash seed in order for Maglev to work. The below deployment example is generating and passing such seed you as the developer to implement three primary functions, shown as blue in the diagram below. We will cover OnData() in this section, and the other functions in section Step 9: Add Policy Loading and Matching0 码力 | 1373 页 | 19.37 MB | 1 年前3
Cilium v1.10 Documentationunit tests on code changes BPF and XDP Reference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment -c12 /dev/urandom | base64 - w0, for example. Every Cilium agent in the cluster must use the same hash seed in order for Maglev to work. The below deployment example is generating and passing such seed you as the developer to implement three primary functions, shown as blue in the diagram below. We will cover OnData() in this section, and the other functions in section Step 9: Add Policy Loading and Matching0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.9 Documentationunit tests on code changes BPF and XDP Reference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment -c12 /dev/urandom | base64 - w0, for example. Every Cilium agent in the cluster must use the same hash seed in order for Maglev to work. The below deployment example is generating and passing such seed you as the developer to implement three primary functions, shown as blue in the diagram below. We will cover OnData() in this section, and the other functions in section Step 9: Add Policy Loading and Matching0 码力 | 1263 页 | 18.62 MB | 1 年前3
Cilium v1.8 Documentationunit tests on code changes BPF and XDP Reference Guide BPF Architecture Instruction Set Helper Functions Maps Object Pinning Tail Calls BPF to BPF Calls JIT Hardening Offloads Toolchain Development Environment you as the developer to implement three primary functions, shown as blue in the diagram below. We will cover OnData() in this section, and the other functions in section Step 9: Add Policy Loading and Matching entries, and stores them as aRule object. See r2d2/r2d2parser.go for examples of both functions for the r2d2 protocol. You’ll also need to update OnData to call p.connection.Matches(), and if 0 码力 | 1124 页 | 21.33 MB | 1 年前3
Cilium v1.5 DocumentationCONFIG_BPF_JIT=y CONFIG_NET_CLS_ACT=y CONFIG_NET_SCH_INGRESS=y CONFIG_CRYPTO_SHA1=y CONFIG_CRYPTO_USER_API_HASH=y Note Users running Linux 4.10 or earlier with Cilium CIDR policies may face Restric�ons on unique you have version >= 0.4.1 $ dep version dep: version : v0.4.1 build date : 2018-01-24 git hash : 37d9ea0a go version : go1.9.1 go compiler : gc platform : linux/amd64 A�er that, you cilium_lb4_reverse_nat cili # bpf-map info /sys/fs/bpf/tc/globals/cilium_policy_15124 Type: Hash Key size: 8 Value size: 24 Max entries: 1024 Flags: 0x0 # bpf-map dump /0 码力 | 740 页 | 12.52 MB | 1 年前3
Steering connections to sockets with BPF socket lookup hooklocal_ip4; __u32 local_port; /* ... */ }; /usr/include/linux/bpf.h 7 77 777 echo_ports BPF HASH map Ncat socket echo_socket BPF SOCKMAP (2) is local port open? (3) pick echo service socket BPF maps */ struct bpf_map_def SEC("maps") echo_ports = { .type = BPF_MAP_TYPE_HASH, .max_entries = 1024, .key_size = sizeof(__u16), .value_size bpf none ~vagrant/bpffs # sudo chown vagrant.vagrant ~vagrant/bpffs # bpftool map show id 28 28: hash name echo_ports flags 0x0 key 2B value 1B max_entries 1024 memlock 86016B # bpftool map0 码力 | 23 页 | 441.22 KB | 1 年前3
Hardware Breakpoint implementation in BCCchar name[16]; int user_stack_id; int kernel_stack_id; }; BPF_STACK_TRACE(stack_traces, 16384); BPF_HASH(counts, struct stack_key_t, uint64_t); int func(struct pt_regs *ctx) { struct stack_key_t key =0 码力 | 8 页 | 2.02 MB | 1 年前3
eBPF at LINE's Private Cloud• Network domain specific function call tracer • Trace “which packets have gone through which functions” Output Attaching program (total 1803, succeeded 1001, failed 0 filtered: 0 untraceable: 802) gso_type: tcpv4) 3347634422951 0000 skb_csum_hwoffload_help (len: 5764 gso_type: tcpv4) Functions the packets have gone through CPU ID Time Stamp User defined tracing data (with Lua script) …0 码力 | 12 页 | 1.05 MB | 1 年前3
共 13 条
- 1
- 2













