1. 19 Jun, 2017 1 commit
    • Yonghong Song's avatar
      Change clang frontend optimization level from 0 to 2 · 42c00adb
      Yonghong Song authored
      The issue is caused by the following clang change on 5.0:
      https://reviews.llvm.org/D28404
      
      Basically, at -O0, unless always inlining is specified, a
      function will be marked as optnone and noinline.
      
      This causes two kinds of issues: (1). optnone will generate
      suboptimal code with heavy stack use and this high likely can
      cause verifier failure; and (2). even if user mark all his/her
      defined functions in bpf program as always inlining, some
      functions in linux header files are not marked as always inline
      and hence will be marked as noinline instead, ultimately
      causing llvm complaining about global function reference.
      
      This patch bumps the clang optimization level to -O2.
      This should work with older versions of llvm as well.
      Signed-off-by: default avatarYonghong Song <yhs@fb.com>
      42c00adb
  2. 14 Jun, 2017 3 commits
  3. 12 Jun, 2017 1 commit
  4. 10 Jun, 2017 1 commit
    • Carlos Neira's avatar
      fix cc: error: unrecognized command line option -no-pie · 9da21f9e
      Carlos Neira authored
      
      
      cnb@ubuntu-14:~/iovisor/bcc/build$ make
      [  6%] Built target clang_frontend
      [  9%] Built target bpf-static
      [ 16%] Built target bcc-loader-static
      [ 30%] Built target b_frontend
      [ 47%] Built target bcc-static
      [ 48%] Built target CPUDistribution
      [ 50%] Built target FollyRequestContextSwitch
      [ 51%] Built target HelloWorld
      [ 52%] Built target LLCStat
      [ 54%] Built target RandomRead
      [ 55%] Built target RecordMySQLQuery
      [ 56%] Built target TCPSendStack
      [ 80%] Built target bcc-shared
      [ 83%] Built target bpf-shared
      [ 84%] Built target bcc_py
      Linking C executable bcc-lua
      cc: error: unrecognized command line option â-no-pieâ
      make[2]: *** [src/lua/bcc-lua] Error 1
      make[1]: *** [src/lua/CMakeFiles/bcc-lua.dir/all] Error
      
      option is called -fno-pie
      9da21f9e
  5. 08 Jun, 2017 1 commit
  6. 07 Jun, 2017 1 commit
  7. 06 Jun, 2017 3 commits
  8. 05 Jun, 2017 1 commit
  9. 03 Jun, 2017 1 commit
    • Yonghong Song's avatar
      Add a python test for usdt · 505c110a
      Yonghong Song authored
        o The sample application covers different aspects
          of usdt rewriter code generation:
          - const
          - *(ctx + offset)
          - use bpf_probe_read to get trace data
          - the switch in ctx->ip if the same probe
            is triggered in multiple .text locations.
        o folly (https://github.com/facebook/folly/) tracing
          header files are pulled into python test directory and
          used to produce USDT probes.
      Signed-off-by: default avatarYonghong Song <yhs@fb.com>
      505c110a
  10. 01 Jun, 2017 1 commit
  11. 31 May, 2017 5 commits
  12. 30 May, 2017 3 commits
    • Christian Resell's avatar
    • Christian Resell's avatar
    • Yonghong Song's avatar
      Force udst ctx->#reg load to be volatile · b0f891d1
      Yonghong Song authored
      This is related to issue #1133. Compiler sometimes
      generates code patterns likes:
           r1 = ctx + 96
           goto next
         here:
           r1 = ctx + 48
         next:
           r3 = load (r1 + 0)
      Verifier will fail for such cases as r1 is marked
      as "unknown" at the time of load.
      
      The previous workaround is to add volatile attribute
      to the store like
         *(volatile u64 *)&dest = ctx->bx
      The hope is to force ctx related load in-place since
      its value is needed for store.
      
      Unfortunately, this does not always work and compiler
      still has freedom to merge different ctx loads at the
      same time honoring the volatile &dest. In USDT generated
      code, different branches of &dest are the same.
      
      This patch directly make ctx->bx itself as a volatile load:
        *(volatile u64 *)&ctx->bx
      This seems working as compiler stops playing around
      the address pointing to a volatile data.
      Signed-off-by: default avatarYonghong Song <yhs@fb.com>
      b0f891d1
  13. 27 May, 2017 1 commit
  14. 25 May, 2017 3 commits
  15. 24 May, 2017 6 commits
  16. 23 May, 2017 3 commits
    • Brenden Blanco's avatar
      Merge pull request #1185 from gospo/master · 2631f6dc
      Brenden Blanco authored
      Add support for generic XDP mode
      2631f6dc
    • Teng Qin's avatar
      Support symbol option in C++ API stack table · 5703ccc1
      Teng Qin authored
      5703ccc1
    • Andy Gospodarek's avatar
      Add support for generic XDP mode · 9f3cab70
      Andy Gospodarek authored
      Reused some of the code and command-line format from kernel XDP samples.
      
      $ sudo ./xdp_drop_count.py -S enp1s0
      Printing drops per IP protocol-number, hit CTRL+C to stop
      17: 36616 pkt/s
      17: 19720757 pkt/s
      17: 19685768 pkt/s
      17: 19643601 pkt/s
      17: 19694537 pkt/s
      [...]
      $ sudo ./xdp_drop_count.py enp1s0
      Printing drops per IP protocol-number, hit CTRL+C to stop
      17: 7029 pkt/s
      17: 29996706 pkt/s
      17: 30048705 pkt/s
      17: 30261417 pkt/s
      17: 30291967 pkt/s
      [...]
      
      Throughput difference is expected since generic XDP takes more
      instructions per packet than optimized XDP.
      
      v2: switch __u32 to uint32_t in bpf_attach_xdp
      Signed-off-by: default avatarAndy Gospodarek <gospo@broadcom.com>
      9f3cab70
  17. 22 May, 2017 3 commits
  18. 21 May, 2017 2 commits