-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] Exploit OS timestamping when capturing packets #277
Labels
Comments
The proposal in #320 is to provide a method to generate a Unix epoch timestamp by simply calling The problem we are facing with |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Problem statement
When capturing packets, e.g., in the packetcapture service, the dataplane code has to take the timestamp of the packet. However, it seems that somewhere the Linux kernel handles the timestamp of the packet, given that there is a
tstamp
member in thesk_buff
structure.Describe the solution you'd like
It would be nice to be able to take the value possibly stored in
sk_buff.tstamp
instead of taking the timestamp in eBPF dataplane code.Additional context
From some tests done on the packetcapture service, it seems that the value in
sk_buff.tstamp
is always zero (program running in TC, attached to both physical and virtual interfaces). However, the member is there and if we typeman packet
, which refers toAF_SOCKET
, it says that thePACKET_TIMESTAMP
is just for this purpose. So, it is not clear how to exploit this timestamping in eBPF code.The text was updated successfully, but these errors were encountered: