1. 14 Jun, 2017 1 commit
  2. 12 Jun, 2017 1 commit
  3. 10 Jun, 2017 1 commit
    • Carlos Neira's avatar
      fix cc: error: unrecognized command line option -no-pie · 9da21f9e
      Carlos Neira authored
      
      
      cnb@ubuntu-14:~/iovisor/bcc/build$ make
      [  6%] Built target clang_frontend
      [  9%] Built target bpf-static
      [ 16%] Built target bcc-loader-static
      [ 30%] Built target b_frontend
      [ 47%] Built target bcc-static
      [ 48%] Built target CPUDistribution
      [ 50%] Built target FollyRequestContextSwitch
      [ 51%] Built target HelloWorld
      [ 52%] Built target LLCStat
      [ 54%] Built target RandomRead
      [ 55%] Built target RecordMySQLQuery
      [ 56%] Built target TCPSendStack
      [ 80%] Built target bcc-shared
      [ 83%] Built target bpf-shared
      [ 84%] Built target bcc_py
      Linking C executable bcc-lua
      cc: error: unrecognized command line option â-no-pieâ
      make[2]: *** [src/lua/bcc-lua] Error 1
      make[1]: *** [src/lua/CMakeFiles/bcc-lua.dir/all] Error
      
      option is called -fno-pie
      9da21f9e
  4. 08 Jun, 2017 1 commit
  5. 07 Jun, 2017 1 commit
  6. 06 Jun, 2017 3 commits
  7. 05 Jun, 2017 1 commit
  8. 03 Jun, 2017 1 commit
    • Yonghong Song's avatar
      Add a python test for usdt · 505c110a
      Yonghong Song authored
        o The sample application covers different aspects
          of usdt rewriter code generation:
          - const
          - *(ctx + offset)
          - use bpf_probe_read to get trace data
          - the switch in ctx->ip if the same probe
            is triggered in multiple .text locations.
        o folly (https://github.com/facebook/folly/) tracing
          header files are pulled into python test directory and
          used to produce USDT probes.
      Signed-off-by: default avatarYonghong Song <yhs@fb.com>
      505c110a
  9. 01 Jun, 2017 1 commit
  10. 31 May, 2017 5 commits
  11. 30 May, 2017 3 commits
    • Christian Resell's avatar
    • Christian Resell's avatar
    • Yonghong Song's avatar
      Force udst ctx->#reg load to be volatile · b0f891d1
      Yonghong Song authored
      This is related to issue #1133. Compiler sometimes
      generates code patterns likes:
           r1 = ctx + 96
           goto next
         here:
           r1 = ctx + 48
         next:
           r3 = load (r1 + 0)
      Verifier will fail for such cases as r1 is marked
      as "unknown" at the time of load.
      
      The previous workaround is to add volatile attribute
      to the store like
         *(volatile u64 *)&dest = ctx->bx
      The hope is to force ctx related load in-place since
      its value is needed for store.
      
      Unfortunately, this does not always work and compiler
      still has freedom to merge different ctx loads at the
      same time honoring the volatile &dest. In USDT generated
      code, different branches of &dest are the same.
      
      This patch directly make ctx->bx itself as a volatile load:
        *(volatile u64 *)&ctx->bx
      This seems working as compiler stops playing around
      the address pointing to a volatile data.
      Signed-off-by: default avatarYonghong Song <yhs@fb.com>
      b0f891d1
  12. 27 May, 2017 1 commit
  13. 25 May, 2017 3 commits
  14. 24 May, 2017 6 commits
  15. 23 May, 2017 3 commits
    • Brenden Blanco's avatar
      Merge pull request #1185 from gospo/master · 2631f6dc
      Brenden Blanco authored
      Add support for generic XDP mode
      2631f6dc
    • Teng Qin's avatar
      Support symbol option in C++ API stack table · 5703ccc1
      Teng Qin authored
      5703ccc1
    • Andy Gospodarek's avatar
      Add support for generic XDP mode · 9f3cab70
      Andy Gospodarek authored
      Reused some of the code and command-line format from kernel XDP samples.
      
      $ sudo ./xdp_drop_count.py -S enp1s0
      Printing drops per IP protocol-number, hit CTRL+C to stop
      17: 36616 pkt/s
      17: 19720757 pkt/s
      17: 19685768 pkt/s
      17: 19643601 pkt/s
      17: 19694537 pkt/s
      [...]
      $ sudo ./xdp_drop_count.py enp1s0
      Printing drops per IP protocol-number, hit CTRL+C to stop
      17: 7029 pkt/s
      17: 29996706 pkt/s
      17: 30048705 pkt/s
      17: 30261417 pkt/s
      17: 30291967 pkt/s
      [...]
      
      Throughput difference is expected since generic XDP takes more
      instructions per packet than optimized XDP.
      
      v2: switch __u32 to uint32_t in bpf_attach_xdp
      Signed-off-by: default avatarAndy Gospodarek <gospo@broadcom.com>
      9f3cab70
  16. 22 May, 2017 3 commits
  17. 21 May, 2017 3 commits
  18. 20 May, 2017 2 commits