On Mon, Nov 21, 2022 at 3:17 PM Peter Zijlstra <peterz@xxxxxxxxxxxxx> wrote: > > On Mon, Nov 21, 2022 at 02:47:10PM +0100, KP Singh wrote: > > > > > How do I know that a function return was modified by BPF? If I'm debugging > > > > You can list the BPF programs that are loaded in the kernel with > > > > # bpftool prog list > > Only when you have access to the machine; most cases it's people sending > random splats by email. Good point, What about having information about loaded BPF programs in the kernel stack traces and sharing bytecode, somehow, like in crash dumps? > > > Also, the BPF programs show up in call stacks when you are debugging. > > Only when it splats inside the BPF part, not when it splats after > because BPF changed semantics of a function. > >