From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7914623A8 for ; Thu, 23 Jun 2022 21:36:56 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id BEFC5C341C0; Thu, 23 Jun 2022 21:36:55 +0000 (UTC) Date: Thu, 23 Jun 2022 17:36:54 -0400 From: Steven Rostedt To: Alexei Starovoitov Cc: Jiri Kosina , Benjamin Tissoires , Hans de Goede , ksummit@lists.linux.dev Subject: Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] How far to go with eBPF Message-ID: <20220623173654.4517e325@rorschach.local.home> In-Reply-To: References: <20220615174601.GX1790663@paulmck-ThinkPad-P17-Gen-1> <20220616122634.6e11e58c@gandalf.local.home> <20220616125128.68151432@gandalf.local.home> <20220617103050.2almimus5hjcifxl@quack3.lan> <20220620091344.6c6499e4@rorschach.local.home> <20220621110514.6ef174d0@rorschach.local.home> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) Precedence: bulk X-Mailing-List: ksummit@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Thu, 23 Jun 2022 14:23:51 -0700 Alexei Starovoitov wrote: > tracepoints exposed an api through cat-able and echo-able files > that 'ubertrace' can use without any knowledge of the underlying kernel, > without access to kernel sources, etc. > Now please explain how bpf based tracing tools are similar? > What exposed api do they use? Question to you. Can eBPF provide information that normally is not available without the eBPF program? Could there be someone that creates a eBPF program based on internal information where that developer had to read the kernel source to implement. But then provide this program to other users that can now write programs based on that new information? Years and versions can go by, and the code that the eBPF program hasn't changed so this works for years, without the maintainer of the attached code even being aware of this use. Then one day that maintainer changes the code and this eBPF program breaks for the first time in years, and with that, it breaks all the user space applications that relied on this. I can see that change falling under the "broke user space" clause of the Linux kernel and reverted.