blob: 78e247f62108ae34b0c7f5011f12fbbede75a6bd [file] [log] [blame]
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001This file describes how to run the tcp_*_kern.o tcp_bpf (or socket_ops)
2programs. These programs attach to a cgroupv2. The following commands create
3a cgroupv2 and attach a bash shell to the group.
4
5 mkdir -p /tmp/cgroupv2
6 mount -t cgroup2 none /tmp/cgroupv2
7 mkdir -p /tmp/cgroupv2/foo
8 bash
9 echo $$ >> /tmp/cgroupv2/foo/cgroup.procs
10
David Brazdil0f672f62019-12-10 10:32:29 +000011Anything that runs under this shell belongs to the foo cgroupv2. To load
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000012(attach) one of the tcp_*_kern.o programs:
13
David Brazdil0f672f62019-12-10 10:32:29 +000014 bpftool prog load tcp_basertt_kern.o /sys/fs/bpf/tcp_prog
15 bpftool cgroup attach /tmp/cgroupv2/foo sock_ops pinned /sys/fs/bpf/tcp_prog
16 bpftool prog tracelog
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000017
David Brazdil0f672f62019-12-10 10:32:29 +000018"bpftool prog tracelog" will continue to run printing the BPF log buffer.
19The tcp_*_kern.o programs use special print functions to print logging
20information (if enabled by the ifdef).
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000021
22If using netperf/netserver to create traffic, you need to run them under the
23cgroupv2 to which the BPF programs are attached (i.e. under bash shell
24attached to the cgroupv2).
25
26To remove (unattach) a socket_ops BPF program from a cgroupv2:
27
David Brazdil0f672f62019-12-10 10:32:29 +000028 bpftool cgroup detach /tmp/cgroupv2/foo sock_ops pinned /sys/fs/bpf/tcp_prog