|
Re: changes_in_tcpaccept.py
Hi Brendan,
Thank you for your response. Please find regenerated patch in attachment. Besides that i tried to minimize scope of the changes.--
Best Regards,
Seliavka Evgenii
Hi Brendan,
Thank you for your response. Please find regenerated patch in attachment. Besides that i tried to minimize scope of the changes.--
Best Regards,
Seliavka Evgenii
|
By
Evgenii Seliavka
·
#1571
·
|
|
Re: kretprobe not consistently being triggered for sys_futex calls?
Hi Ashley,
Could it be that you're reaching the maxactive bound and thus some probes
are missed? From the kprobes documentation [1]:
While the probed function is executing, its return address is
Hi Ashley,
Could it be that you're reaching the maxactive bound and thus some probes
are missed? From the kprobes documentation [1]:
While the probed function is executing, its return address is
|
By
Paul Chaignon
·
#1570
·
|
|
Re: changes_in_tcpaccept.py
G'Day Evgenii,
As in CONTRIBUTING_SCRIPTS.md, we're after tools that do one thing and
do it well, so I'd generally avoid adding features that didn't belong
in tools. In this case, it might actually
G'Day Evgenii,
As in CONTRIBUTING_SCRIPTS.md, we're after tools that do one thing and
do it well, so I'd generally avoid adding features that didn't belong
in tools. In this case, it might actually
|
By
Brendan Gregg
·
#1569
·
|
|
changes_in_tcpaccept.py
Hello,
I slightly changed tools/tcpaccept.py and enhance the script with the possibility to track only connection which very dropped because of listen queue overflow. Just want to know community
Hello,
I slightly changed tools/tcpaccept.py and enhance the script with the possibility to track only connection which very dropped because of listen queue overflow. Just want to know community
|
By
Evgenii Seliavka
·
#1568
·
|
|
kretprobe not consistently being triggered for sys_futex calls?
Hi all,
I have a problem which has been plaguing me for a few days, and was hoping for some insight or information that might help get to the bottom of it. I think itmight be a bug in the kernel
Hi all,
I have a problem which has been plaguing me for a few days, and was hoping for some insight or information that might help get to the bottom of it. I think itmight be a bug in the kernel
|
By
Ashley <ashley@...>
·
#1567
·
|
|
Re: Atomicity of load and store instructions in eBPF
<mauricio.vasquez@...> wrote:
not just cache line, you mean not in its naturally aligned boundary?
One load/store is actually broken into multiple loads/stores by the compiler?
So you mean both
<mauricio.vasquez@...> wrote:
not just cache line, you mean not in its naturally aligned boundary?
One load/store is actually broken into multiple loads/stores by the compiler?
So you mean both
|
By
Yonghong Song
·
#1566
·
|
|
Re: bpf_map_delet_elem too slow
It is not recommended to do delete() during get_next_key() loop.
The delete() may change kernel internal hash table structure
and get_next_key() may not function as expected.
You can do one loop with
It is not recommended to do delete() during get_next_key() loop.
The delete() may change kernel internal hash table structure
and get_next_key() may not function as expected.
You can do one loop with
|
By
Yonghong Song
·
#1565
·
|
|
bpf_map_delet_elem too slow
I use simple prog to get stat from my map type BPF_MAP_TYPE_HASH.
An got too slow speed to delete elems from it, lookup elem 100-1000x faster.
My code is just
while(bpf_map_get_next_key(fd,
I use simple prog to get stat from my map type BPF_MAP_TYPE_HASH.
An got too slow speed to delete elems from it, lookup elem 100-1000x faster.
My code is just
while(bpf_map_get_next_key(fd,
|
By
Иван Иванов
·
#1564
·
|
|
Atomicity of load and store instructions in eBPF
Hello folks,
We have an eBPF program that shares a 64-bits integer with userspace using an array map. The eBPF program only reads the integer while the user-space application only writes it.
We know
Hello folks,
We have an eBPF program that shares a 64-bits integer with userspace using an array map. The eBPF program only reads the integer while the user-space application only writes it.
We know
|
By
Mauricio Vasquez
·
#1563
·
|
|
minutes: IO Visor TSC/Dev Meeting
Hi All,
Thank you for joining us on the call today. As usual, here are the notes.
-Brenden
=== Discussion ===
Yonghong:
- working on libbpf features
- working on btf support in bcc
- need to use
Hi All,
Thank you for joining us on the call today. As usual, here are the notes.
-Brenden
=== Discussion ===
Yonghong:
- working on libbpf features
- working on btf support in bcc
- need to use
|
By
Brenden Blanco
·
#1562
·
|
|
reminder: IO Visor TSC/Dev Meeting
Please join us tomorrow for our bi-weekly call. As usual, this meeting is
open to everybody and completely optional.
You might be interested to join if:
You want to know what is going on in BPF
Please join us tomorrow for our bi-weekly call. As usual, this meeting is
open to everybody and completely optional.
You might be interested to join if:
You want to know what is going on in BPF
|
By
Brenden Blanco
·
#1561
·
|
|
Re: Question about BPF map type BPF_MAP_TYPE_PERCPU_HASH
You can take a look at bcc/tests/cc/{test_array_table.cc,
test_hash_table.cc, test_bpf_table.cc}.
There are a few examples there testing percpu maps.
You can take a look at bcc/tests/cc/{test_array_table.cc,
test_hash_table.cc, test_bpf_table.cc}.
There are a few examples there testing percpu maps.
|
By
Yonghong Song
·
#1560
·
|
|
Question about BPF map type BPF_MAP_TYPE_PERCPU_HASH
Hi everyone,
I am using BPF_MAP_TYPE_HASH in BPF map definition and my program is working as expected.
I have read eBPF-map type BPF_MAP_TYPE_PERCPU_HASH allows for lock free uses of hash-tables
Hi everyone,
I am using BPF_MAP_TYPE_HASH in BPF map definition and my program is working as expected.
I have read eBPF-map type BPF_MAP_TYPE_PERCPU_HASH allows for lock free uses of hash-tables
|
By
Raga lahari
·
#1559
·
|
|
Re: minutes: IO Visor TSC/Dev Meeting
Finished re-spin and rebased on top of latest bpf-next.
My set will potentially conflict with the following three other bpf-next
pending patches/sets on selftests Makefile and test_verifier.c:
-
Finished re-spin and rebased on top of latest bpf-next.
My set will potentially conflict with the following three other bpf-next
pending patches/sets on selftests Makefile and test_verifier.c:
-
|
By
Jiong Wang
·
#1558
·
|
|
minutes: IO Visor TSC/Dev Meeting
Hi All,
Thanks for dialing in to the call today. Here are notes from the discussion.
Thanks,
Brenden
=== Discussion ===
Alexei:
* Spinlock patches being worked on
* Proposal to standardize the BPF
Hi All,
Thanks for dialing in to the call today. Here are notes from the discussion.
Thanks,
Brenden
=== Discussion ===
Alexei:
* Spinlock patches being worked on
* Proposal to standardize the BPF
|
By
Brenden Blanco
·
#1557
·
|
|
reminder: IO Visor TSC/Dev Meeting
Please join us tomorrow for our bi-weekly call. As usual, this meeting is
open to everybody and completely optional.
You might be interested to join if:
You want to know what is going on in BPF
Please join us tomorrow for our bi-weekly call. As usual, this meeting is
open to everybody and completely optional.
You might be interested to join if:
You want to know what is going on in BPF
|
By
Brenden Blanco
·
#1556
·
|
|
Re: minutes: IO Visor TSC/Dev Meeting
Sorry, I mean AF_XDP for veth driver.
Thank you
William
Sorry, I mean AF_XDP for veth driver.
Thank you
William
|
By
William Tu
·
#1555
·
|
|
minutes: IO Visor TSC/Dev Meeting
Hi All,
Thanks for joining the call today after a short holiday hiatus. Below are my
notes from the call.
=== Discussion ===
Brenden
* Adopted new project kubectl-trace into github.com/iovisor from
Hi All,
Thanks for joining the call today after a short holiday hiatus. Below are my
notes from the call.
=== Discussion ===
Brenden
* Adopted new project kubectl-trace into github.com/iovisor from
|
By
Brenden Blanco
·
#1554
·
|
|
reminder: IO Visor TSC/Dev Meeting
*** Resuming after a holiday break ***
Please join us tomorrow for our bi-weekly call. As usual, this meeting is
open to everybody and completely optional.
You might be interested to join if:
You
*** Resuming after a holiday break ***
Please join us tomorrow for our bi-weekly call. As usual, this meeting is
open to everybody and completely optional.
You might be interested to join if:
You
|
By
Brenden Blanco
·
#1553
·
|
|
Re: Can and should you use very large maps with XDP?
It should be as long as the total memory is less than 4GB (your table
memory + some overhead for each table entry).
It should be as long as the total memory is less than 4GB (your table
memory + some overhead for each table entry).
|
By
Yonghong Song
·
#1552
·
|