Summary
Recently, I learned some container technologies in Linux such as namespace and
cgroup. However, after reading several articles and man pages, there was still
one question lingering in my head - “How are the technologies put together?” In
other words, how are they used to implement containers?
[Read More]
tl;dr
If you don’t want to shoot yourself in the foot, then don’t mess up with
checksum in any way. But if you’d like to see a counterexample, keep reading
this note written by lame me.
[Read More]
Summary Our project uses Identifier-Locator Addressing (ILA) for IPv6. Recently, we noticed that traceroute doesn’t work well for SIR address. The problem is, though traceroute can reach ILA router and eventualy reach the ILA host, all the intermediate nodes between the ILA router and the ILA host are shown as...
[Read More]
Tcpkill
tcpkill is part of dsniff, a
collection of tools for network auditing and penetration testing. It can be
used to kill specified in-progress TCP connections.
[Read More]
Background
In a BPF program, we use a BPF_MAP_TYPE_PERF_EVENT_ARRAY map to communicate
with userspace. Initially, for our BPF program, we set the locked memory limit
to be infinity:
[Read More]
Introduction
bpftrace is a high-level tracing
language for Linux enhanced Berkeley Packet Filter (eBPF). I found it very
useful for debugging issues as well as understanding kernel code. In this post,
I will use one example to demonstrate how I used bpftrace for debugging.
[Read More]