- 12 Jun, 2017 1 commit
-
-
Gary Ching-Pang Lin authored
-
- 10 Jun, 2017 1 commit
-
-
Carlos Neira authored
cnb@ubuntu-14:~/iovisor/bcc/build$ make [ 6%] Built target clang_frontend [ 9%] Built target bpf-static [ 16%] Built target bcc-loader-static [ 30%] Built target b_frontend [ 47%] Built target bcc-static [ 48%] Built target CPUDistribution [ 50%] Built target FollyRequestContextSwitch [ 51%] Built target HelloWorld [ 52%] Built target LLCStat [ 54%] Built target RandomRead [ 55%] Built target RecordMySQLQuery [ 56%] Built target TCPSendStack [ 80%] Built target bcc-shared [ 83%] Built target bpf-shared [ 84%] Built target bcc_py Linking C executable bcc-lua cc: error: unrecognized command line option â-no-pieâ make[2]: *** [src/lua/bcc-lua] Error 1 make[1]: *** [src/lua/CMakeFiles/bcc-lua.dir/all] Error option is called -fno-pie
-
- 08 Jun, 2017 1 commit
-
-
Ryan Tomayko authored
Fixes #782. Solution taken verbatim from @jepio here: https://github.com/iovisor/bcc/issues/782#issuecomment-259075010 I ran into the same issue attempting to compile from source on a fresh Ubuntu 16.10/Yakkety host: Linking C executable bcc-lua /usr/bin/ld: libluajit-5.1.a(ljamalg.o): relocation R_X86_64_32S against `.rodata' can not be used when making a shared object; recompile with -fPIC /usr/bin/ld: final link failed: Nonrepresentable section on output Build succeeded after patch was applied.
-
- 07 Jun, 2017 1 commit
-
-
Yonghong Song authored
o This is caused by my ignorant error in previous usdt change. Obviously, I need to store into pointer address in order to propagate value back to caller. o Thanks Tetsuo Handa pointing this out. Signed-off-by: Yonghong Song <yhs@fb.com>
-
- 06 Jun, 2017 3 commits
-
-
Evan Dandrea authored
-
Evan Dandrea authored
-
Evan Dandrea authored
-
- 05 Jun, 2017 1 commit
-
-
Taekho Nam authored
-
- 03 Jun, 2017 1 commit
-
-
Yonghong Song authored
o The sample application covers different aspects of usdt rewriter code generation: - const - *(ctx + offset) - use bpf_probe_read to get trace data - the switch in ctx->ip if the same probe is triggered in multiple .text locations. o folly (https://github.com/facebook/folly/) tracing header files are pulled into python test directory and used to produce USDT probes. Signed-off-by: Yonghong Song <yhs@fb.com>
-
- 01 Jun, 2017 1 commit
-
-
Teng Qin authored
-
- 31 May, 2017 5 commits
-
-
4ast authored
Force udst ctx->#reg load to be volatile
-
4ast authored
Add linux/sched.h to list of libbpf.c includes
-
Brenden Blanco authored
This should hopefully fix compile errors on some ubuntu systems. Also, reorders the includes according to clang-format Signed-off-by: Brenden Blanco <bblanco@gmail.com>
-
Brenden Blanco authored
Break the c++ dependency in libbpf.c, and turn it into a separate lib from cmake point of view. Signed-off-by: Brenden Blanco <bblanco@gmail.com>
-
Brenden Blanco authored
This moves ProcMountNS[Guard] classes to a separate header file and implementation. The goal will be to use these more directly in libbpf.c without creating a circular dependency. Removed the friend class statements and exposed a few public getters instead. Slightly changed the implementation in ProcMountNS constructor to avoid a few error cases and the use of snprintf. Signed-off-by: Brenden Blanco <bblanco@gmail.com>
-
- 30 May, 2017 3 commits
-
-
Christian Resell authored
-
Christian Resell authored
-
Yonghong Song authored
This is related to issue #1133. Compiler sometimes generates code patterns likes: r1 = ctx + 96 goto next here: r1 = ctx + 48 next: r3 = load (r1 + 0) Verifier will fail for such cases as r1 is marked as "unknown" at the time of load. The previous workaround is to add volatile attribute to the store like *(volatile u64 *)&dest = ctx->bx The hope is to force ctx related load in-place since its value is needed for store. Unfortunately, this does not always work and compiler still has freedom to merge different ctx loads at the same time honoring the volatile &dest. In USDT generated code, different branches of &dest are the same. This patch directly make ctx->bx itself as a volatile load: *(volatile u64 *)&ctx->bx This seems working as compiler stops playing around the address pointing to a volatile data. Signed-off-by: Yonghong Song <yhs@fb.com>
-
- 27 May, 2017 1 commit
-
-
Tomaz Solc authored
-
- 25 May, 2017 3 commits
-
-
Brenden Blanco authored
funclatency/sslsniff: fix the TypeError when enabling pid filter on u…
-
4ast authored
Fix usage of CMAKE_BUILD_TYPE setting
-
4ast authored
Use BPF_F_CURRENT_CPU in perf_submit when possible
-
- 24 May, 2017 6 commits
- 23 May, 2017 3 commits
-
-
Brenden Blanco authored
Add support for generic XDP mode
-
Teng Qin authored
-
Andy Gospodarek authored
Reused some of the code and command-line format from kernel XDP samples. $ sudo ./xdp_drop_count.py -S enp1s0 Printing drops per IP protocol-number, hit CTRL+C to stop 17: 36616 pkt/s 17: 19720757 pkt/s 17: 19685768 pkt/s 17: 19643601 pkt/s 17: 19694537 pkt/s [...] $ sudo ./xdp_drop_count.py enp1s0 Printing drops per IP protocol-number, hit CTRL+C to stop 17: 7029 pkt/s 17: 29996706 pkt/s 17: 30048705 pkt/s 17: 30261417 pkt/s 17: 30291967 pkt/s [...] Throughput difference is expected since generic XDP takes more instructions per packet than optimized XDP. v2: switch __u32 to uint32_t in bpf_attach_xdp Signed-off-by: Andy Gospodarek <gospo@broadcom.com>
-
- 22 May, 2017 3 commits
- 21 May, 2017 3 commits
- 20 May, 2017 3 commits
-
-
Teng Qin authored
-
Teng Qin authored
-
Brenden Blanco authored
Add ability for users to control symboling behavior
-