While running some examples from samples/bpf
I noticed that bpf_printk
output is prepended with some extra information, e.g. :
telnet-470 [001] .N.. 419421.045894: 0x00000001: BPF command: 2
BPF command: 2
is actual string passed to bpf_printk
in the bpf program, but what is the rest? I assume this comes from kernel's JIT ?
Where can I look closer what those bits mean? Thanks.
bpf_trace_printk()
is a helper, so it's not JITted anyway (instead it's compiled as part of the kernel, and called from the eBPF program, whether it's interpreted or JITted). @pchaignon You mind if I reuse the details you provide for the doc about helpers I'm working on? – Lebbie