Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp10905235ybl; Fri, 27 Dec 2019 04:22:40 -0800 (PST) X-Google-Smtp-Source: APXvYqwKGwiSaYlp/YnAsTUYOsBXq1uF6eKFW1HP9JQagn8jYN0TQed+kegc2olmLZjCcYd00clq X-Received: by 2002:a05:6830:2110:: with SMTP id i16mr54861076otc.337.1577449360574; Fri, 27 Dec 2019 04:22:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577449360; cv=none; d=google.com; s=arc-20160816; b=pDTjaP0M+rx4Q5EDvBMstlhpSS2qQNKKCKuVQzc2lxayKttCWjkZWHastpOEynDSNt igBKlf+ST1fskjENkUvATv5tXZZj192W5yiAYmmldhyTotRnlwzIQyJ4fXosJdJMAzZ8 8koYyy1oVXePwvAUshsnTgRCPtMjKB2O95WNmljC+N4g/fxmXiCkK7K0xA/fo/iFN7cG ghFzlx0kLw+Mu1Rdj3Y0Dmro4HT8UGLdBjKCyQl4ob0yjHLE18ZvHG9U2nl9M1rwKemw A7a5xeNJt3euEDByLJj2Av4u3mIkz/bFHNJ3ezRQ1Y4QxxAnRUy6YxscTTv5xK2gtZ1X JjbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=clH0RMLjprPkjLRNPZWBEfr94YYenBOvXyegkSuOkCA=; b=KH9f85ZdE/e8g0207H0ABQhXeJ6UBpW+xVHTUtapHHNa9M0EKEnWpbP94PYvgg2VYU gqfsHN2tRSeJ8S/b0HefyoNEVPOvp2M4UGG/lakQOcYgCkQsycXoh9UKsrcTA1Ji01HR QdW/ql02/psb1vCF/ZW4BerPB6zWrdh4vcfUySj2lSIfZD8PmFr69u2rB6dO3iFMeuEO 2ZzQuKnoS5B5+5gzKgC1BDpTgrtYyBNDR+uPmmP3s0H1S4/l2LWpiKfcZIEXmjzCABQS 1FXGNY1tjsO+BYlggCfyKy3EYZcInDX7qxsoKz9sDAfIjOyVIVyOT4J2W3Othwoo8kCB iuJQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v202si15634630oie.79.2019.12.27.04.22.29; Fri, 27 Dec 2019 04:22:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727152AbfL0MVv (ORCPT + 99 others); Fri, 27 Dec 2019 07:21:51 -0500 Received: from mx2.suse.de ([195.135.220.15]:38860 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726408AbfL0MVu (ORCPT ); Fri, 27 Dec 2019 07:21:50 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id A7DE2B285; Fri, 27 Dec 2019 12:21:48 +0000 (UTC) From: Michal Rostecki To: bpf@vger.kernel.org Cc: Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , Andrii Nakryiko , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Michal Rostecki Subject: [PATCH bpf-next 0/2] bpftool/libbpf: Add probe for large INSN limit Date: Fri, 27 Dec 2019 12:06:03 +0100 Message-Id: <20191227110605.1757-1-mrostecki@suse.de> X-Mailer: git-send-email 2.16.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series implements a new BPF feature probe which checks for the commit c04c0d2b968a ("bpf: increase complexity limit and maximum program size"), which increases the maximum program size to 1M. It's based on the similar check in Cilium, althogh Cilium is already aiming to use bpftool checks and eventually drop all its custom checks. Examples of outputs: # bpftool feature probe [...] Scanning miscellaneous eBPF features... Large complexity limit and maximum program size (1M) is available # bpftool feature probe macros [...] /*** eBPF misc features ***/ #define HAVE_HAVE_LARGE_INSN_LIMIT # bpftool feature probe -j | jq '.["misc"]' { "have_large_insn_limit": true } Michal Rostecki (2): libbpf: Add probe for large INSN limit bpftool: Add misc secion and probe for large INSN limit tools/bpf/bpftool/feature.c | 18 ++++++++++++++++++ tools/lib/bpf/libbpf.h | 1 + tools/lib/bpf/libbpf.map | 1 + tools/lib/bpf/libbpf_probes.c | 23 +++++++++++++++++++++++ 4 files changed, 43 insertions(+) -- 2.16.4