Changes

Summary

  1. Remove namespace code from libbpf to fix USDT (commit: c6a3f02) (details)
  2. fix a bug in networking/simulation.py (commit: dbfb188) (details)
  3. fix line TypeError (commit: 0cafe55) (details)
  4. sync to latest libbpf repo (commit: 83b67c2) (details)
  5. Run BCC test suite with github actions (commit: a47c44f) (details)
  6. Make inode-only matching default, reverse USDT kludge (commit: b090f5f) (details)
  7. remove dead link (commit: 215b724) (details)
  8. tools/klockstat.py: Do not display symbol twice for stack (commit: 90b2382) (details)
  9. fix compilation error due to latest llvm change (commit: 0e63c5c) (details)
  10. Add XSKMAP support (#2730) (commit: 46965c6) (details)
  11. bcc.BPF.cleanup(): Ensure self.funcs items get deleted during cleanup (commit: f727a00) (details)
  12. define CC_USING_FENTRY if CONFIG_FUNCTION_TRACER is defined (commit: 6878949) (details)
  13. snap: update and cleanup snapcraft.yaml (commit: 685ec23) (details)
  14. prevent rewriting for array element type (commit: a4834a6) (details)
  15. Do not rewrite array subscripts if invalid sourceloc range (commit: f149ca5) (details)
  16. Fix offwaketime regression introduced by #ac00ac5 (commit: 0a7da74) (details)
  17. support sockmap/sockhash/cgroup_local_storage maps (commit: 6cacc41) (details)
  18. libbcc debian package is architecture-dependent (commit: 397ff37) (details)
  19. correctly describe installation situation for Ubuntu (commit: 0f92c84) (details)
  20. snapcraft: add missing libfl-dev dependency (commit: c82aa51) (details)
  21. libbpf tools: check in bpftool for use by libbpf-based tool build (commit: 4281c62) (details)
  22. tools: add vmlinux.h header with all kernel types (commit: 7fcb335) (details)
  23. Allow specifying clang base directory (commit: 2d099cd) (details)
  24. tools: add libbpf-based tools to BCC w/ runqslower as first converted tool (commit: e1496e1) (details)
  25. fix pid filter bug (commit: a28ad05) (details)
  26. tools/stackcount: Fix address resolution for user-space stack (commit: 9b6a0e3) (details)
  27. Update dddos.py (commit: 1332e68) (details)
  28. bindsnoop BCC tool (#2749) (commit: 8dd4b5a) (details)
  29. sync to latest libbpf (commit: 51be481) (details)
  30. tools/profile: fix kernel delimiter when folding (#2758) (commit: 29aa619) (details)
  31. tools: fix confusion between execsnoop and opensnoop (commit: b26b429) (details)
  32. debian changelog for v0.13.0 tag (commit: 9422274) (details)
  33. tools: add option --cgroupmap to tcp tools (commit: 1ce868f) (details)
  34. man pages: add documentation about --cgroupmap (commit: 5e3f9e4) (details)
  35. c++ api: add wrapper for raw tracepoints (commit: 5681ea9) (details)
  36. cpp examples: use a raw tracepoint for RandomRead (commit: 2a2e729) (details)
  37. libbpf-tools: add links to BPF CO-RE posts (commit: 7ad1763) (details)
  38. tools: execsnoop add -U and -u flags (commit: c949f61) (details)
  39. tools/oomkill: output PID instead of thread ID (user's view) (commit: 9edbae3) (details)
  40. Fix the python part of the http-parse-complete example (commit: 6f3c33b) (details)
  41. Fix a table of contents of maps (commit: 08de253) (details)
  42. Fix bpf linking if specified via LIBBPF_LIBRARIES variable (commit: 18da40c) (details)
  43. Unite libbpf includes (commit: 1e7862f) (details)
  44. Do not initialize kern_version for TRACING/EXT programs (commit: 550706a) (details)
  45. Introduce {attach|detach}_kfunc API (commit: 572478b) (details)
  46. Add support_kfunc function to BPF object (commit: 1ad2656) (details)
  47. Support kfunc in opensnoop.py (commit: c347fe6) (details)
  48. Support kfunc in klockstat.py (commit: da7cac7) (details)
  49. Support kfunc in vfsstat.py (commit: 2fa54c0) (details)
  50. Update StatusTuple to use enum Code (commit: 6de96c7) (details)
  51. doc: add python3 doc to "Ubuntu - Source" section in INSTALL.md (commit: 440016f) (details)
  52. usdt.py: improve error messags for enable_probe() (commit: c46c7b3) (details)
  53. libbpf-tools: update bpftool (commit: 17ff392) (details)
  54. libbpf-tools: covert BCC drsnoop to BPF CO-RE version (commit: c421970) (details)
  55. usdt.py: print errors to stderr in enable_probe_or_bail() (commit: aeea0e9) (details)
  56. usdt: fix parsing sp register in arguments on AArch64 (commit: 5011f99) (details)
  57. Replace StatusTuple(0) with StatusTuple::OK() (commit: e508059) (details)
  58. print error messages to stderr and exit(1) instead of exit(0) for fatal errors (commit: 98c18b6) (details)
  59. GitHub Actions: optionally publish container image (commit: cf20a49) (details)
  60. libbpf-tools: optimize ksyms cache (commit: b7541d0) (details)
  61. python binding: allow fully-specified probe names for enable_probe() (commit: 37cd183) (details)
  62. trace.py: support an optional provider name for the probe spec (commit: 2162516) (details)
  63. softirqs: Combined CPU as part of the key is necessary to avoid amiss value. (commit: 9465f8c) (details)
  64. tools: add option --cgroupmap to capable.py (commit: 15e998d) (details)
  65. tools: add option --unique to capable.py (commit: 9d7feee) (details)
  66. Reduce container image size with multi-stage builds (commit: c9cfb52) (details)
  67. libbpf-tools: add CO-RE opensnoop (#2778) (commit: 5e123df) (details)
  68. tools: add option --cgroupmap to tcptop (commit: 7d62656) (details)
  69. libbpf-tools: update vmlinux.h with BPF helper flags generated from UAPI (commit: 8b6a7db) (details)
  70. libbpf: sync to latest version (commit: 77d60b1) (details)
  71. libbpf-tools: small clean ups across all tools (commit: 454b138) (details)
  72. libbpf-tools: determine target host architecture (commit: 2b5fcc6) (details)
  73. Backport tcpstates to kernels < 4.15 (commit: d0ec8a2) (details)
  74. libbpf-tools: adjust Kconfig and re-build vmlinux.h (commit: cd43be4) (details)
  75. Factor out ebpf::parse_tracepoint function (commit: 7fd2fa6) (details)
  76. Add test for ebpf::parse_tracepoint function (commit: b9099c5) (details)
  77. Strengthen tracepoint format parsing (commit: b8423e6) (details)
  78. Add support for new common fields (commit: 0a9d6db) (details)
  79. libbpf: update to latest libbpf version (commit: 5302614) (details)
  80. adding example/networking/net_monitor.py (commit: ca1b0af) (details)
  81. Make -DCMAKE_INSTALL_PREFIX=/usr as the default (#2800) (commit: 4c1136e) (details)
  82. tools: add option --cgroupmap to profile.py (commit: f82ea45) (details)
  83. Do not prepend /proc multiple times in bcc_resolve_symname (commit: e1d53a3) (details)
  84. Add regression test for bcc resolve symbol names (commit: 1cd3952) (details)
  85. libbpf-tools: add CO-RE xfsslower (commit: c2772a3) (details)
  86. opensnoop: fix --cgroupmap with kfunc (commit: 510fc74) (details)
  87. chore: include Amazon Linux 2 binary option in INSTALL (commit: 35c9940) (details)
  88. tools: fix alignment of ipv6_key_t in tcptop (commit: 6b8a896) (details)
  89. Change the default sort order to Descending (commit: 1b0fe40) (details)
  90. tools/capable: fix compilation error (commit: 9adda70) (details)
  91. libbpf-tools: add CO-RE filelife (commit: 85f5e7d) (details)
  92. make -lrt linking optional (commit: e323254) (details)
  93. correcting input to hex using ord funtion (commit: 915d6d7) (details)
  94. mallocstacks: validating before stacktrace walk (commit: 472f9b3) (details)
  95. http-parse-simple.py: fix wrong start position (commit: 4f6ecea) (details)
  96. libbpf-tools: CO-RE opensnoop minor improvements (commit: ab54de2) (details)
  97. [C++] add BPF::enable_usdt_all() and disble_usdt_all() to handle all the USDT at once (#2854) (commit: 689f900) (details)
  98. examples/tracing: add nflatency - netfilter hook metrics (commit: 495a4a3) (details)
  99. add test_lpm_trie.py test (commit: 533391e) (details)
  100. adjust layout string in JIT with llvm11 128bit spec support (commit: f35dae0) (details)
  101. Translate virtual addresses to binary addresses for shared libs as well. (commit: 007ee49) (details)
  102. examples/tracing: add io_latencies - IO latency distribution monitor (commit: 5057bbe) (details)
  103. Update pid filter (commit: 15d7955) (details)
  104. doc: fix wrong references to get_syscall_name (commit: 7a38543) (details)
  105. tools: Move io_iolatencies.py example to tools/biolatpcts.py (commit: 1515f28) (details)
  106. tools/biolatpcts: Use #!/usr/bin/python instead of python3 (commit: 66ab787) (details)
  107. tools/biolatpcts: --pcts handling improvements (commit: 7214903) (details)
  108. tools/biolatpcts: Accept device name/node for target device selection (commit: fbf0392) (details)
  109. tools/biolatpcts: Add the example file and man page (commit: 1e9c56f) (details)
  110. examples: Add biolatpcts.py example (commit: 10519c7) (details)
  111. add attribute readers to class USDT (C++ API) (commit: f8f230c) (details)
  112. build: fix clang 10 build (commit: 1599c2e) (details)
  113. Added kernel recompile guidance for  libbpf CO-RE (#2876) (commit: c1d3a65) (details)
  114. Add `bcc_version.h` to access LIBBCC_VERSION from C/C++ (#2856) (commit: 6d61622) (details)
  115. Improve ubuntu installation description (commit: d3359b2) (details)
  116. fix llvm 11 compilation issues (commit: 45e63f2) (details)
  117. sync to latest libbpf (commit: df3e7d6) (details)
  118. prepare for release v0.14.0 (commit: ceb458d) (details)
Commit c6a3f0298ebf0ec1cb1c455320876da5b4a0b07b by yonghong-song
Remove namespace code from libbpf to fix USDT

This removes the namespace code from libbpf, as they are no longer necessary
since #2324 was merged, and have caused regressions on older Kernels that do
not use the new API for creating probes. This also deletes the dead code for
namespace handling in libbpf, as this was the last use of it.

This also introduces regression tests to ensure that processes in containers
can be USDT probed, by adding tests that unshare the mount and process
namespaces.
(commit: c6a3f02)
The file was modifiedsrc/cc/libbpf.c (diff)
The file was modifiedtests/cc/test_usdt_probes.cc (diff)
Commit dbfb18851866254a7b127146c8a9c2d76260ee78 by yonghong-song
fix a bug in networking/simulation.py

test test_brb.py failed on fc31 with the following error messages:
  Traceback (most recent call last):
    File "./test_brb.py", line 162, in test_brb
      disable_ipv6=True)
    File "/home/yhs/work/bcc/tests/python/simulation.py", line 94, in _create_ns
      disable_ipv6)
    File "/home/yhs/work/bcc/tests/python/simulation.py", line 68, in _ns_add_ifc
      ns_ipdb.interfaces.lo.up().commit()
    File "/usr/local/lib/python3.7/site-packages/pyroute2/ipdb/interfaces.py", line 1078, in commit
      raise error
    File "/usr/local/lib/python3.7/site-packages/pyroute2/ipdb/interfaces.py", line 859, in commit
    transaction.wait_all_targets()
    File "/usr/local/lib/python3.7/site-packages/pyroute2/ipdb/transactional.py", line 507, in wait_all_targets
      raise CommitException('target %s is not set' % key)
  pyroute2.ipdb.exceptions.CommitException: target state is not set

The reason is in networking/simulation.py, if the interface 'lo'
inside the namespace is already up and it is tried to commit
to 'up' state again, the pyroute2 library will cause an exception.

The fix is to avoid to 'up' interface 'lo' again if the interface
is already in 'up' state.

Signed-off-by: Yonghong Song <yhs@fb.com>
(commit: dbfb188)
The file was modifiedexamples/networking/simulation.py (diff)
Commit 0cafe5571865d4dcab8ff2bd398b41dbc10b42f4 by yonghong-song
fix line TypeError

./profile.py -adf -p `pgrep -n main` 5
Traceback (most recent call last):
  File "./profile.py", line 342, in <module>
    print("%s %d" % (b";".join(line).decode('utf-8', 'replace'), v.value))
TypeError: sequence item 5: expected a bytes-like object, str found
(commit: 0cafe55)
The file was modifiedtools/profile.py (diff)
Commit 83b67c2a05b107ffc27cb9b8cec0bec9f5c43a84 by yonghong-song
sync to latest libbpf repo

Sync to latest libbpf repo. New helper bpf_jiffies64
and new program type BPF_PROG_TYPE_EXT is added.

Signed-off-by: Yonghong Song <yhs@fb.com>
(commit: 83b67c2)
The file was modifiedintrospection/bps.c (diff)
The file was modifiedsrc/cc/libbpf.c (diff)
The file was modifieddocs/kernel-versions.md (diff)
The file was modifiedsrc/cc/compat/linux/virtual_bpf.h (diff)
The file was modifiedsrc/cc/libbpf (diff)
Commit a47c44fa0d570b64d8cb06449052db4f363e80a4 by yonghong-song
Run BCC test suite with github actions

With this commit, pushes to branches can trigger tests directly on
Github Actions.

Here it will be able to test against kernel 4.14 and 5.0.0, which correspond
to the latest Ubuntu LTS kernel releases.

Tests are run for both Debug and Release modes.

Tests run inside docker, in an ubuntu 19.04 container base.

For the github workflow:

- The test_libbcc suite is run first, to potentially fail fast on these faster
unit tests.
- The Python test suite is run

Some of these tests are allowed to fail, but the failure is still reported:

- In catch2 tests, using the [!mayfail] tag, where this will be displayed in
the test summary
- In Python unittests, using the `@mayFail("Reason")` decorator, which is
introduce for consistency with catch2. These will report the reason for the
failure, and log this to an artifact of the test.
(commit: a47c44f)
The file was modifiedexamples/networking/simulation.py (diff)
The file was modifiedtests/python/test_usdt2.py (diff)
The file was addedDockerfile.tests
The file was modifiedtests/python/utils.py (diff)
The file was modifiedtests/python/test_usdt3.py (diff)
The file was modifiedtests/python/test_trace3.py (diff)
The file was added.github/workflows/bcc-test.yml
The file was modified.gitignore (diff)
The file was modifiedtests/wrapper.sh.in (diff)
The file was modifiedtests/python/test_usdt.py (diff)
The file was modifiedtests/python/test_brb2.py (diff)
The file was modifiedtests/cc/test_c_api.cc (diff)
The file was modifiedtests/python/test_stackid.py (diff)
The file was modifiedtests/python/test_tools_smoke.py (diff)
The file was modifiedtests/python/test_debuginfo.py (diff)
The file was modifiedtests/cc/test_usdt_probes.cc (diff)
Commit b090f5f9eee62796829184ec862e3378a3b7e425 by yonghong-song
Make inode-only matching default, reverse USDT kludge
(commit: b090f5f)
The file was modifiedtests/python/test_usdt2.py (diff)
The file was modifiedtests/python/test_usdt3.py (diff)
The file was modifiedsrc/cc/api/BPF.cc (diff)
The file was modifiedsrc/cc/api/BPF.h (diff)
The file was modifiedsrc/cc/usdt.h (diff)
The file was modifiedtests/python/test_usdt.py (diff)
The file was modifiedREADME.md (diff)
Commit 90b2382b2068031930704d42205829b356f41ffb by yonghong-song
tools/klockstat.py: Do not display symbol twice for stack

Currently we display the caller symbol in stack,
which ends up with output below when we enable stack:

                                  Caller   Avg Hold  Count   Max hold Total hold
                  b'flush_to_ldisc+0x22'      56112      2     103914     112225
                  b'flush_to_ldisc+0x22'
               b'process_one_work+0x1b0'
                   b'worker_thread+0x50'
                         b'kthread+0xfb'

Skipping one more symbol in stack to fix that:

                                  Caller   Avg Hold  Count   Max hold Total hold
                  b'flush_to_ldisc+0x22'       1893      2       2765       3787
               b'process_one_work+0x1b0'
                   b'worker_thread+0x50'
                         b'kthread+0xfb'

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
(commit: 90b2382)
The file was modifiedtools/klockstat.py (diff)
Commit 0e63c5c1ad267281f8d0b652eaf87dd494ddba04 by yonghong-song
fix compilation error due to latest llvm change

llvm 11.0 required explicit conversion from StringRef to std::string.
The patch is
  https://github.com/llvm/llvm-project/commit/777180a32b61070a10dd330b4f038bf24e916af1

This patch made a compatible change which works for old llvm
as well.

Signed-off-by: Yonghong Song <yhs@fb.com>
(commit: 0e63c5c)
The file was modifiedsrc/cc/frontends/clang/b_frontend_action.cc (diff)
Commit 46965c6b3790a51ba288093c68b16fab71914f88 by noreply
Add XSKMAP support (#2730)

* add XSKMAP support
* enable lookup for XSKMAP available from kernel 5.3
* add section for XSKMAP in reference guide
(commit: 46965c6)
The file was modifiedsrc/cc/api/BPFTable.cc (diff)
The file was modifiedsrc/cc/api/BPFTable.h (diff)
The file was modifiedsrc/cc/api/BPF.cc (diff)
The file was modifieddocs/reference_guide.md (diff)
The file was modifiedsrc/cc/export/helpers.h (diff)
The file was modifiedsrc/cc/frontends/clang/b_frontend_action.cc (diff)
The file was modifiedsrc/cc/api/BPF.h (diff)
The file was modifiedsrc/python/bcc/table.py (diff)
Commit f727a00fb4a388f30ab0f637b43f27345b0f6da7 by yonghong-song
bcc.BPF.cleanup(): Ensure self.funcs items get deleted during cleanup

Since commit 115b959d86
("Fix a file descriptor leak when module is deleted (#2530)"), we
observe the following exceptions during python exit:

  Error in atexit._run_exitfuncs:
  Traceback (most recent call last):
    File "/usr/lib/python2.7/atexit.py", line 24, in _run_exitfuncs
      func(*targs, **kargs)
    File "/usr/lib/python2.7/dist-packages/bcc/__init__.py", line 1366, in cleanup
      os.close(fn.fd)
  OSError: [Errno 9] Bad file descriptor

which occurs for python programs issuing a call to 'cleanup()', or using
the 'with bcc.BPF(...)' code pattern.

BPF's 'cleanup' is registered to be invoked atexit. Alas, commit
115b959d86 introduced an 'os.close(fn.fd)' call for each func loaded (to
prevent accidental FD leakage).

Problem is, that the 'self.funcs' dict entries are NOT deleted, making
subsequent calls to 'cleanup' to attempt closing the same 'fn.fd' again
and again.

It is expected from 'cleanup' to operate correctly when called
repeatedly; Therefore, it should "nullify" references to closed
resources.

Fix, by deleting the reference to each unloaded function from the
'self.func' dictionary.

Fixes: 115b959d86 ("Fix a file descriptor leak when module is deleted (#2530)")
Reported-by: Dana Rubin <drubin@metanetworks.com>
Signed-off-by: Shmulik Ladkani <shmulik.ladkani@gmail.com>
(commit: f727a00)
The file was modifiedsrc/python/bcc/__init__.py (diff)
Commit 68789499f281c73d0ef9956dd88100c48558050e by yonghong-song
define CC_USING_FENTRY if CONFIG_FUNCTION_TRACER is defined

Fix issue #2734.

In 4.18 and later, when CONFIG_FUNCTION_TRACER is defined, kernel Makefile adds
-DCC_USING_FENTRY. Let do the same for bpf programs.

Signed-off-by: Yonghong Song <yhs@fb.com>
(commit: 6878949)
The file was modifiedsrc/cc/export/helpers.h (diff)
Commit 685ec23ecaa9c55409a21b5cd3c919fe1206fb20 by yonghong-song
snap: update and cleanup snapcraft.yaml

A couple of issues fixed:

- put snapcraft.yaml in the snap directory so it is
  picked up by snapcraft when run from the project root.
- use snap/local for local snapcraft assets.
- setup.py.in should not add root for sdist targets
- cleanup snap/README.md.
- re-arrange parts in snapcraft.yaml and move to python3.

Signed-off-by: Sergio Schvezov <sergio.schvezov@canonical.com>
(commit: 685ec23)
The file was removedsnapcraft/bcc-wrapper
The file was removedsnapcraft/Makefile
The file was addedsnap/snapcraft.yaml
The file was removedsnapcraft/README.md
The file was removedsnapcraft/snapcraft.yaml
The file was modifiedsrc/python/setup.py.in (diff)
The file was addedsnap/README.md
The file was addedsnap/local/bcc-wrapper
Commit a4834a6cacd14f251e72695f08766a16216642b2 by yonghong-song
prevent rewriting for array element type

Fix issue #2352.
Corresponding llvm bug: https://bugs.llvm.org/show_bug.cgi?id=41918.

If the element type is array type, the rewriter may generate code like
  addr = ({ typeof(__u8 [16]) _val; __builtin_memset(&_val, 0, sizeof(_val));
            bpf_probe_read(&_val, sizeof(_val), (u64)&daddr->s6_addr); _val; })
for something like
  addr = daddr->s6_addr;
where s6_addr is an array.

The above code has an issue then as addr is pointing to some data
which is out of scope, which meaning compiler is free to use the space.

Let us disable such transformation until we find a good solution.

Signed-off-by: Yonghong Song <yhs@fb.com>
(commit: a4834a6)
The file was modifiedtools/tcptop.py (diff)
The file was modifiedsrc/cc/frontends/clang/b_frontend_action.cc (diff)
Commit f149ca5d774aa81d8b78cfcd5be6f5cf58cbdab7 by yonghong-song
Do not rewrite array subscripts if invalid sourceloc range

Fix #2739.

The issue exposed an issue that to rewrite
  CODE1: __u8 byte = daddr->s6_addr[4];
will segfault and to rewrite
  CODE2: __u8 byte = (daddr->s6_addr)[4];
will be okay.

For CODE1, the clang did not give enough information to find the text
which contains the left bracket "[", given base "daddr->s6_addr"
and subscript "4". For CODE2, the clang is able to get the information
successfuly.

I think if we really go inside the base "daddr->s6_addr" and gets to
its member field "s6_addr", we can find the needed information
for the text range containing "[". Let us fix the segfault first
and if really desirable, we can try to enhance later for CODE1 patterns.

Signed-off-by: Yonghong Song <yhs@fb.com>
(commit: f149ca5)
The file was modifiedsrc/cc/frontends/clang/b_frontend_action.cc (diff)
Commit 0a7da74e2580150002131aebbe9eaa2d5e2c9b62 by yonghong-song
Fix offwaketime regression introduced by #ac00ac5
(commit: 0a7da74)
The file was modifiedtools/offwaketime.py (diff)
Commit 6cacc41462bae12b1c38aabc7a6b85f40783da9a by yonghong-song
support sockmap/sockhash/cgroup_local_storage maps

This patch supports sockmap, sockhash and cgroup_local_storage
maps. Two C++ APIs, attach_func and detach_func are also
added to allow to attach program to cgroups. So this makes
using C++ APIs for cgroup based networking applications
easier to integrate with bpf programs.

The unit testing is rough as it needs some work to set up
cgroups and establish TCP connections to really test the
result of map operations. But still all supported map
operations in kernel and in C++ APIs are tested syntacically.

Signed-off-by: Yonghong Song <yhs@fb.com>
(commit: 6cacc41)
The file was addedtests/cc/test_cg_storage.cc
The file was modifiedsrc/cc/bpf_module.h (diff)
The file was modifiedsrc/cc/frontends/clang/b_frontend_action.cc (diff)
The file was modifiedsrc/cc/api/BPF.h (diff)
The file was modifiedsrc/cc/export/helpers.h (diff)
The file was modifiedtests/cc/CMakeLists.txt (diff)
The file was addedtests/cc/test_sock_table.cc
The file was modifiedsrc/cc/bpf_module.cc (diff)
The file was modifiedsrc/cc/api/BPF.cc (diff)
The file was modifiedsrc/cc/api/BPFTable.h (diff)
The file was modifiedsrc/cc/api/BPFTable.cc (diff)
Commit 397ff3708f6b0d17ae0a6e2d7edf13c7d0801d83 by yonghong-song
libbcc debian package is architecture-dependent
(commit: 397ff37)
The file was modifieddebian/control (diff)
Commit 0f92c845a7deb60e97f49425f181d7b7e9daf56b by yonghong-song
correctly describe installation situation for Ubuntu
(commit: 0f92c84)
The file was modifiedINSTALL.md (diff)
Commit c82aa514babba5d34e3794a76bf464fdd28ae423 by yonghong-song
snapcraft: add missing libfl-dev dependency

Also need libfl-dev to build on other non-x86 targets

Signed-off-by: Colin Ian King <colin.king@canonical.com>
(commit: c82aa51)
The file was modifiedsnap/snapcraft.yaml (diff)
Commit 4281c62f9f04962bed05a326f68102b6ee8a5464 by andriin
libbpf tools: check in bpftool for use by libbpf-based tool build

Check in bpftool binary to be used for BPF skeleton generation for
libbpf-based tools.

Signed-off-by: Andrii Nakryiko <andriin@fb.com>
(commit: 4281c62)
The file was addedlibbpf-tools/bin/bpftool
Commit 7fcb335b6c068dded2af10918753ead35ad87532 by andriin
tools: add vmlinux.h header with all kernel types

Check in vmlinux.h generated from Linux 5.5 version with default config. This
is used from libbpf-based tools.

Signed-off-by: Andrii Nakryiko <andriin@fb.com>
(commit: 7fcb335)
The file was addedlibbpf-tools/vmlinux.h
The file was addedlibbpf-tools/vmlinux_505.h
Commit 2d099cd8c5cb1598d6e911c0b389132ebc7c101b by yonghong-song
Allow specifying clang base directory
(commit: 2d099cd)
The file was modifiedCMakeLists.txt (diff)
Commit e1496e15a749fa700315f759dfca4ac79f3f6428 by andriin
tools: add libbpf-based tools to BCC w/ runqslower as first converted tool

Add runqslower as a first tool converted from BCC to libbpf, utilizing BPF
CO-RE (Compile Once - Run Everywhere) approach and BPF skeleton for
interfacing with BPF programs. Current set up is Makefile based and is set up
in such a way as to enable easy addition for more tools, based on a simple and
convenient naming pattern. General build infrastructure takes case of BPF
skeleton generation, tracking dependencies, clean up, etc.

Signed-off-by: Andrii Nakryiko <andriin@fb.com>
(commit: e1496e1)
The file was addedlibbpf-tools/runqslower_example.txt
The file was addedlibbpf-tools/README.md
The file was addedlibbpf-tools/Makefile
The file was addedlibbpf-tools/runqslower.bpf.c
The file was addedlibbpf-tools/runqslower.c
The file was modifiedman/man8/runqslower.8 (diff)
The file was addedlibbpf-tools/.gitignore
The file was addedlibbpf-tools/runqslower.h
Commit a28ad059edf6f74acc124fde4b4934a2fc410a35 by yonghong-song
fix pid filter bug

1. Wirte a simple go, just print pid and get some website.
func main() {
pid := os.Getpid()
         fmt.Println(pid)
         response, err := http.Get("http://www.baidu.com")
        ....
}

./main
3581

2. But when run `tcpconnlat`, we just go tid 3585, (not pid 3581)
#./tcpconnlat
PID    COMM         IP SADDR            DADDR            DPORT LAT(ms)
3585   main         4  10.0.2.15        180.101.49.11    80    60.68

3. So run `./tcpconnlat -p 3581` not work
I have tested this situation under kernel 3.10 and 5.0.9.
(commit: a28ad05)
The file was modifiedtools/tcpconnlat.py (diff)
Commit 9b6a0e357c30b52e115f803bb6babb3ffc4fdabf by yonghong-song
tools/stackcount: Fix address resolution for user-space stack

This patch fixes issue #2748. The bug was that address-to-symbol resolution
didn't work for user-space stacks without the `-P` (per-pid) flag when tracing
single, isolated processes. The current documentation of the `-P` option
indicates that it's used to "display stacks separately for each process",
and this doesn't match with the intended usage.

This patch has two parts:

- Fix `tools/stackcount.py` to explicitly set perpid to True if `-p <pid>`
   is used
- Remove the `-P` option from the example of tracing single, isolated process
   in `tools/stackcount_example.txt`, since the usage of the option can
   be confusing (and unnecessary after the current change)
(commit: 9b6a0e3)
The file was modifiedtools/stackcount.py (diff)
The file was modifiedtools/stackcount_example.txt (diff)
Commit 1332e68676fe0f1365dccd5ebffc05259b67abc1 by yonghong-song
Update dddos.py

Fix a few more typos
(commit: 1332e68)
The file was modifiedexamples/tracing/dddos.py (diff)
Commit 8dd4b5a521602d86a9331b5c6c6bdd53a8b4ed72 by noreply
bindsnoop BCC tool (#2749)

bindsnoop BCC utility

bindsnoop tool traces the kernel function performing socket binding and
print socket options set before the system call invocation that might
impact bind behavior and bound interface
(commit: 8dd4b5a)
The file was modifiedtests/python/test_tools_smoke.py (diff)
The file was addedtools/bindsnoop.py
The file was modifiedREADME.md (diff)
The file was addedman/man8/bindsnoop.8
The file was addedtools/bindsnoop_example.txt
Commit 51be481a7957b8d84bd02487f66f819f79e94f4a by yonghong-song
sync to latest libbpf

sync to latest libbpf (libbpf release v0.0.7) to
prepare bcc release.

Signed-off-by: Yonghong Song <yhs@fb.com>
(commit: 51be481)
The file was modifiedsrc/cc/libbpf (diff)
Commit 29aa61985c98456177d52a5f00cba092b572e778 by noreply
tools/profile: fix kernel delimiter when folding (#2758)

retain delimiter with folding enabled
(commit: 29aa619)
The file was modifiedtools/profile.py (diff)
Commit b26b429cf38b0e1afe915ceee0a1f0172e803ea4 by yonghong-song
tools: fix confusion between execsnoop and opensnoop

The execsnoop documentation mispelled 'execsnoop' as 'opensnoop'.

Bug introduced by https://github.com/iovisor/bcc/pull/2651
(commit: b26b429)
The file was modifiedtools/execsnoop.py (diff)
Commit 942227484d3207f6a42103674001ef01fb5335a0 by yonghong-song
debian changelog for v0.13.0 tag

  * Support for kernel up to 5.5
  * bindsnoop tool to track tcp/udp bind information
  * added compile-once run-everywhere based libbpf-tools, currently
    only runqslower is implemented.
  * new map support: sockhash, sockmap, sk_storage, cgroup_storage
  * enable to run github actions on the diff
  * cgroupmap based cgroup filtering for opensnoop, execsnoop and bindsnoop.
  * lots of bug fixes.

Signed-off-by: Yonghong Song <yhs@fb.com>
(commit: 9422274)
The file was modifieddebian/changelog (diff)
Commit 1ce868fbb4b4cd45f9d3d043c6d697f45fc6268d by yonghong-song
tools: add option --cgroupmap to tcp tools

List of tcp tools updated: tcpaccept, tcpconnect, tcptracer
(commit: 1ce868f)
The file was modifiedtools/tcpaccept.py (diff)
The file was modifiedtools/tcptracer_example.txt (diff)
The file was modifieddocs/filtering_by_cgroups.md (diff)
The file was modifiedtools/tcpaccept_example.txt (diff)
The file was modifiedtools/tcpconnect_example.txt (diff)
The file was modifiedtools/tcptracer.py (diff)
The file was modifiedtools/tcpconnect.py (diff)
Commit 5e3f9e4915fab83effccf3d20d3fbee715d96f6c by yonghong-song
man pages: add documentation about --cgroupmap
(commit: 5e3f9e4)
The file was modifiedman/man8/opensnoop.8 (diff)
The file was modifiedman/man8/tcpconnect.8 (diff)
The file was modifiedman/man8/tcpaccept.8 (diff)
The file was modifiedman/man8/execsnoop.8 (diff)
The file was modifiedman/man8/tcptracer.8 (diff)
Commit 5681ea9edb5763c6199c2e2e7956bdfa7c13ea36 by yonghong-song
c++ api: add wrapper for raw tracepoints
(commit: 5681ea9)
The file was modifiedsrc/cc/api/BPF.h (diff)
The file was modifiedsrc/cc/libbpf.c (diff)
The file was modifiedsrc/cc/api/BPF.cc (diff)
The file was modifiedsrc/cc/libbpf.h (diff)
Commit 2a2e7290b60fdc420baa93954c20af8338fa6fae by yonghong-song
cpp examples: use a raw tracepoint for RandomRead
(commit: 2a2e729)
The file was modifiedexamples/cpp/RandomRead.cc (diff)
Commit 7ad17638acd9c1d82264451c9b0800ecf5ce4f59 by andriin
libbpf-tools: add links to BPF CO-RE posts

Add links to BPF CO-RE blog posts, explainint what it is, how to use it, and
giving practical recommendations on how to convert BCC BPF program to
libbpf-based one.

Signed-off-by: Andrii Nakryiko <andriin@fb.com>
(commit: 7ad1763)
The file was modifiedlibbpf-tools/README.md (diff)
Commit c949f613315f19fce1fe5e6dacb1f0e5759c91c9 by yonghong-song
tools: execsnoop add -U and -u flags

Add flags to display UID and filter by UID
(commit: c949f61)
The file was modifiedtools/execsnoop_example.txt (diff)
The file was modifiedman/man8/execsnoop.8 (diff)
The file was modifiedtools/execsnoop.py (diff)
Commit 9edbae394f1827a2f5d549795848dc892c6531bf by yonghong-song
tools/oomkill: output PID instead of thread ID (user's view)
(commit: 9edbae3)
The file was modifiedtools/oomkill.py (diff)
Commit 6f3c33b01ce72a44c89a6dcccd3f1cbd99fe1949 by yonghong-song
Fix the python part of the http-parse-complete example

The example wasn't working on my machine, just like in issue #2169
(commit: 6f3c33b)
The file was modifiedexamples/networking/http_filter/http-parse-complete.py (diff)
Commit 08de253fbbc2603d59c19618a3e9f18f5bff7bff by yonghong-song
Fix a table of contents of maps

Signed-off-by: Masanori Misono <m.misono760@gmail.com>
(commit: 08de253)
The file was modifieddocs/reference_guide.md (diff)
Commit 18da40cd186296d277e193fa92dec1791a888b8c by yonghong-song
Fix bpf linking if specified via LIBBPF_LIBRARIES variable

We need to use LIBBPF_LIBRARIES variable instead of just using bpf
for libbpf linking, so it user specified library gets linked in.

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
(commit: 18da40c)
The file was modifiedtests/cc/CMakeLists.txt (diff)
Commit 1e7862fdfd8b428e6b2e3ea23f63a1469c3fabf3 by yonghong-song
Unite libbpf includes

Currently we include headers from local libbpf subpackage,
which does not work if user specify LIBBPF_INCLUDE_DIR.

Adding HAVE_EXTERNAL_LIBBPF macro, that gets defined when
user specifies libbpf header path. This macro is checked
in bcc_libbpf_inc.h and proper files are included.

Using bcc_libbpf_inc.h in place of libbpf includes.

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
(commit: 1e7862f)
The file was addedsrc/cc/bcc_libbpf_inc.h
The file was modifiedsrc/cc/frontends/clang/b_frontend_action.cc (diff)
The file was modifiedsrc/cc/bcc_btf.cc (diff)
The file was modifiedsrc/cc/CMakeLists.txt (diff)
The file was modifiedsrc/cc/bpf_module.cc (diff)
The file was modifiedsrc/cc/libbpf.c (diff)
Commit 550706a220da1636fafd322f0366cfde2a188d16 by yonghong-song
Do not initialize kern_version for TRACING/EXT programs

The TRACING/EXT programs use attach_btf_id and attach_prog_fd
fields from struct bpf_load_program_attr.

The attach_prog_fd field shares space with kern_version,
so by setting kern_version unconditionally we also set
attach_prog_fd to bogus value and kernel fails the load
because it tries to look it up.

Setting kern_version only for programs other than TRACING/EXT
type.

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
(commit: 550706a)
The file was modifiedsrc/cc/bpf_module.cc (diff)
The file was modifiedsrc/cc/libbpf.c (diff)
Commit 572478b2083651f25c4e278f8c34ff3d16e3be6a by yonghong-song
Introduce {attach|detach}_kfunc API

Kernel added new probe called trampoline allowing to probe
almost any kernel function when BTF info is available in
the system.

Adding the interface to define trampoline function for given
kernel function via BPF_PROG macro, like:

  KFUNC_PROBE(do_sys_open, int dfd, const char *filename, int flags, int mode)
  {
    ...
  }

which defines trampoline function with the 'kfunc__do_sys_open'
name, that instruments do_sys_open kernel function before the
function is executed.

or:

  KRETFUNC_PROBE(do_sys_open, int dfd, const char *filename, int flags, int mode, int ret)
  {
    ...
  }

which defines trampoline function with the 'kfunc__do_sys_open'
name, that instruments do_sys_open kernel function after the
function is executed.

The main benefit is really lower overhead for trampolines (please
see following commit for klockstat.py with perf comparison).

Another benefit is the ability of kretfunc probe to access
function arguments, so some tools might need only one program
instead of entry/exit ones (please see following commit for
opensnoop.py changes).

Currently the interface does not allow to define function
of different name than:
  kfunc__<function_name> or kretfunc__<function_name>

which is sufficient by now, and can be easily changed in future
if needed.

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
(commit: 572478b)
The file was modifiedsrc/cc/libbpf.c (diff)
The file was modifiedsrc/cc/libbpf.h (diff)
The file was modifiedsrc/python/bcc/__init__.py (diff)
The file was modifieddocs/reference_guide.md (diff)
The file was modifiedsrc/cc/export/helpers.h (diff)
Commit 1ad2656a1d9ca1e451ebad5af1330863c66a4035 by yonghong-song
Add support_kfunc function to BPF object

Adding support_kfunc function to BPF object to return
state of kfunc trampolines support.

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
(commit: 1ad2656)
The file was modifiedsrc/python/bcc/__init__.py (diff)
The file was modifiedsrc/cc/libbpf.h (diff)
The file was modifiedsrc/cc/libbpf.c (diff)
Commit c347fe6c9f75d6740cf45f80312009daba275f76 by yonghong-song
Support kfunc in opensnoop.py

Adding kfunc return trampoline probe if available instead of
kprobe/kretprobe probes.

The return trampoline has access to function entry arguments,
so we are good with just single eBPF program.

The kfunc trampolines are also faster - less intrusive.

Below are stats for compiling linux kernel while running
opensnoop.py on the background for kprobes and kfuncs.

Without opensnoop.py:

Performance counter stats for 'system wide':

   849,741,782,765      cycles:k

     162.235646336 seconds time elapsed

With opensnoop.py using kprobes:

Performance counter stats for 'system wide':

   941,615,199,769      cycles:k

     164.355032879 seconds time elapsed

With opensnoop.py using trampolines:

Performance counter stats for 'system wide':

   913,437,005,488      cycles:k

     163.742914795 seconds time elapsed

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
(commit: c347fe6)
The file was modifiedtools/opensnoop.py (diff)
Commit da7cac733c931f06801cc3ce118140892fcb8066 by yonghong-song
Support kfunc in klockstat.py

Adding kfunc return trampoline probe if available instead of
kprobe/kretprobe probes.

The kfunc trampolines are faster - less intrusive. The benchmark
without klockstat.py script on background:

$ perf bench sched messaging -l 50000
# Running 'sched/messaging' benchmark:
# 20 sender and receiver processes per group
# 10 groups == 400 processes run

     Total time: 18.571 [sec]

With kprobe tracing:
$ perf bench sched messaging -l 50000
# Running 'sched/messaging' benchmark:
# 20 sender and receiver processes per group
# 10 groups == 400 processes run

     Total time: 183.395 [sec]

With kfunc tracing:
$ perf bench sched messaging -l 50000
# Running 'sched/messaging' benchmark:
# 20 sender and receiver processes per group
# 10 groups == 400 processes run

     Total time: 39.773 [sec]

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
(commit: da7cac7)
The file was modifiedtools/klockstat.py (diff)
Commit 2fa54c0bd388898fdda58f30dcfe5a68d6715efc by yonghong-song
Support kfunc in vfsstat.py

Adding kfunc return trampoline probe if available instead of
kprobe/kretprobe probes.

The kfunc trampolines are faster - less intrusive.

Below are stats for running perf bench sched pipe benchamark while
running vfsstat.py on the background for kprobes and kfuncs.

With kprobes:
         Performance counter stats for './perf bench sched pipe -l 5000000' (3 runs):

           112,520,853,574      cycles:k

                    48.674 +- 0.672 seconds time elapsed  ( +-  1.38% )

With kfuncs:
         Performance counter stats for './perf bench sched pipe -l 5000000' (3 runs):

           106,304,165,424      cycles:k

                    46.820 +- 0.197 seconds time elapsed  ( +-  0.42% )

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
(commit: 2fa54c0)
The file was modifiedtools/vfsstat.py (diff)
Commit 6de96c71f11ace5091651c6cdf645a2d3426214b by yonghong-song
Update StatusTuple to use enum Code
(commit: 6de96c7)
The file was modifiedsrc/cc/bcc_exception.h (diff)
Commit 440016f70b24e2913860e21eb2c2a6bbca970f0d by yonghong-song
doc: add python3 doc to "Ubuntu - Source" section in INSTALL.md
(commit: 440016f)
The file was modifiedINSTALL.md (diff)
Commit c46c7b3d4203adbbc964c25451b918c0df5d94ff by yonghong-song
usdt.py: improve error messags for enable_probe()
(commit: c46c7b3)
The file was modifiedsrc/python/bcc/usdt.py (diff)
Commit 17ff39223a4dd2ff28f63239cb82f785e47ba45c by andriin
libbpf-tools: update bpftool

Newer bpftool generates vmlinux.h with header guard `#define`, which plays
nicely with bpf_tracing.h header and PT_REGS_PARM macros.

Signed-off-by: Andrii Nakryiko <andriin@fb.com>
(commit: 17ff392)
The file was modifiedlibbpf-tools/bin/bpftool (diff)
Commit c42197080dda3f565280b918b9bd5223f5e509d6 by yonghong-song
libbpf-tools: covert BCC drsnoop to BPF CO-RE version

Signed-off-by: Wenbo Zhang <ethercflow@gmail.com>
(commit: c421970)
The file was addedlibbpf-tools/drsnoop.bpf.c
The file was addedlibbpf-tools/drsnoop.c
The file was modifiedman/man8/compactsnoop.8 (diff)
The file was modifiedsnap/snapcraft.yaml (diff)
The file was modifiedman/man8/drsnoop.8 (diff)
The file was addedlibbpf-tools/trace_helpers.h
The file was addedlibbpf-tools/drsnoop_example.txt
The file was addedlibbpf-tools/drsnoop.h
The file was modifiedtools/drsnoop.py (diff)
The file was modifiedlibbpf-tools/Makefile (diff)
The file was addedlibbpf-tools/trace_helpers.c
Commit aeea0e9fce7e868f27cac45f5d6ab4f67c383c62 by yonghong-song
usdt.py: print errors to stderr in enable_probe_or_bail()
(commit: aeea0e9)
The file was modifiedsrc/python/bcc/usdt.py (diff)
Commit 5011f992b3167c162b5a0ad57fd3fa23c9ea76b3 by yonghong-song
usdt: fix parsing sp register in arguments on AArch64

One of the USDT probes for OpenJDK on AArch64 has an argument as an
offset from the stack pointer register like "8@[sp, 112]". This causes
the argument parser to fail:

  Parse error:
      8@x22 8@x20 8@x23 8@x0 8@x26 8@x27 8@[sp, 112] 8@[sp, 120]
  ------------------------------------------^

The error message then repeats forever.

Changed ArgumentParser_aarch64::parse_register so it accepts either
"xNN" or "sp" and outputs the register name rather than the register
number. The stack pointer is in a separate field `sp` in `struct
pt_regs` rather than in the `regs[]` array [1].

Note that the parser currently accepts "x31" and converts that into a
reference to `regs[31]' but that array only has 31 elements. Made x31 an
alias for `sp` to avoid undefined behaviour from reading past the end of
the array.

[1]: https://elixir.bootlin.com/linux/latest/source/arch/arm64/include/asm/ptrace.h#L160

Change-Id: I88b6ff741914b5d06ad5798a55bd21ea03f69825
Signed-off-by: Nick Gasson <nick.gasson@arm.com>
(commit: 5011f99)
The file was modifiedtests/cc/test_usdt_args.cc (diff)
The file was modifiedsrc/cc/usdt/usdt_args.cc (diff)
The file was modifiedsrc/cc/usdt.h (diff)
Commit e508059878525159ccff8c3672d36ecb03b27dac by yonghong-song
Replace StatusTuple(0) with StatusTuple::OK()

With the following shell command:
$ find src -type f -regex '.*\.\(h\|cc\)' -exec sed -i 's/StatusTuple(0)/StatusTuple::OK()/' {} \;
(commit: e508059)
The file was modifiedsrc/cc/frontends/b/type_check.cc (diff)
The file was modifiedsrc/cc/api/BPFTable.cc (diff)
The file was modifiedsrc/cc/frontends/b/printer.cc (diff)
The file was modifiedsrc/cc/api/BPF.cc (diff)
The file was modifiedsrc/cc/frontends/b/codegen_llvm.cc (diff)
The file was modifiedsrc/cc/bpf_module_rw_engine.cc (diff)
The file was modifiedsrc/cc/api/BPFTable.h (diff)
Commit 98c18b640117b10f923c8697be8bfff8ad39834b by yonghong-song
print error messages to stderr and exit(1) instead of exit(0) for fatal errors
(commit: 98c18b6)
The file was modifiedsrc/python/bcc/table.py (diff)
Commit cf20a499655583a985eb959f98fae9c2e7ecf189 by yonghong-song
GitHub Actions: optionally publish container image

This is optional: this GitHub Action will only attempt to publish the
container image if the GitHub repository has been configured with GitHub
secrets (e.g. https://github.com/iovisor/bcc/settings/secrets).

The GitHub secrets can be configured as follows:
- DOCKER_PUBLISH = 1
- DOCKER_IMAGE = docker.io/myorg/bcc
- DOCKER_USERNAME = username
- DOCKER_PASSWORD = password

This is intended to make it easy for anyone to fork iovisor/bcc on
GitHub and publish custom container images with bcc.
(commit: cf20a49)
The file was modifiedDockerfile.ubuntu (diff)
The file was modified.github/workflows/bcc-test.yml (diff)
Commit b7541d0b9497e5bca4de28d894d18cc8578ccdc4 by yonghong-song
libbpf-tools: optimize ksyms cache

Re-implement internals of ksyms cache to minimize memory overhead and
allocations. Addr is also changed to be unsigned long.

fscanf() can be further optimized into manual parsing, but it's low enough
overhead right now that I felt like readibility is more important.

Benchmarking ksyms loading/parsing parts:

BEFORE:
$ /usr/bin/time ./test
0.03user 0.04system 0:00.08elapsed 98%CPU (0avgtext+0avgdata 6968maxresident)k
0inputs+0outputs (0major+1512minor)pagefaults 0swaps

AFTER:
$ /usr/bin/time ./test
0.02user 0.03system 0:00.06elapsed 100%CPU (0avgtext+0avgdata 9508maxresident)k
  0inputs+0outputs (0major+2106minor)pagefaults 0swaps

RSS goes down from 9.5MB to <7MB, while CPU time went up about 20ms.

Signed-off-by: Andrii Nakryiko <andriin@fb.com>
(commit: b7541d0)
The file was modifiedlibbpf-tools/trace_helpers.c (diff)
The file was modifiedlibbpf-tools/trace_helpers.h (diff)
The file was modifiedlibbpf-tools/.gitignore (diff)
The file was modifiedlibbpf-tools/Makefile (diff)
Commit 37cd183a71f19c25c08a2a93d271450b392bdca5 by yonghong-song
python binding: allow fully-specified probe names for enable_probe()
(commit: 37cd183)
The file was modifiedtests/python/test_usdt3.py (diff)
The file was modifiedsrc/python/bcc/libbcc.py (diff)
The file was modifiedsrc/python/bcc/usdt.py (diff)
Commit 21625167988a5ed1e07046e8048b4de59e9fd023 by yonghong-song
trace.py: support an optional provider name for the probe spec
(commit: 2162516)
The file was modifiedsrc/python/bcc/usdt.py (diff)
The file was modifiedsrc/cc/usdt/usdt.cc (diff)
The file was modifiedsrc/cc/bcc_usdt.h (diff)
The file was modifiedsrc/python/bcc/libbcc.py (diff)
The file was modifiedtools/trace.py (diff)
Commit 9465f8cf2a19d28dcc8bce5845b5e8017ee9feb8 by edwardwu
softirqs: Combined CPU as part of the key is necessary to avoid amiss value.

In the environment of massive software interrupts.
<idle>-0     [003] ..s1   106.421020: softirq_entry: vec=6 [action=TASKLET]
<idle>-0     [000] ..s1   106.421063: softirq_entry: vec=3 [action=NET_RX]
<idle>-0     [003] ..s1   106.421083: softirq_exit: vec=6 [action=TASKLET]

Follow the above ftrace logs, we know the correct vec-6 start timestamp is replaced with incorrect vec-3.
Because PID is idle-0. It will produce the wrong result after calculating delta.
(commit: 9465f8c)
The file was modifiedtools/softirqs.py (diff)
Commit 15e998db6ea8617ae8798a09b9d8115ce5e95473 by yonghong-song
tools: add option --cgroupmap to capable.py

Documentation (man page and example text) updated.
(commit: 15e998d)
The file was modifiedman/man8/capable.8 (diff)
The file was modifiedtools/capable_example.txt (diff)
The file was modifiedtools/capable.py (diff)
Commit 9d7feeed87c5e2977e0e996cc097dcd9d3001c0d by yonghong-song
tools: add option --unique to capable.py

Some processes can do a lot of security capability checks, generating a
lot of ouput. In this case, the --unique option is useful to only print
once the same set of capability, pid (or cgroup if --cgroupmap is used)
and kernel/user stacks (if -K or -U are used).

  # ./capable.py -K -U --unique

Documentation (man page and example text) updated.
(commit: 9d7feee)
The file was modifiedtools/capable.py (diff)
The file was modifiedman/man8/capable.8 (diff)
The file was modifiedtools/capable_example.txt (diff)
Commit c9cfb52f3bc39fd78f40e3c3de5e066239ce1904 by yonghong-song
Reduce container image size with multi-stage builds

Before this patch, Dockerfile.ubuntu was generating an oversized image.

                       Uncompressed size      Compressed size
Before this patch:     1.3GB                  390MB
After this patch:      250MB                  110MB
(commit: c9cfb52)
The file was modifiedDockerfile.ubuntu (diff)
Commit 5e123df1dd33cdff5798560e4f0390c69cdba00f by noreply
libbpf-tools: add CO-RE opensnoop (#2778)

* libbpf-tools: add CO-RE opensnoop

* libbpf-tools/opensnoop: feedback
(commit: 5e123df)
The file was modifiedlibbpf-tools/Makefile (diff)
The file was addedlibbpf-tools/opensnoop.h
The file was addedlibbpf-tools/opensnoop.c
The file was addedlibbpf-tools/opensnoop.bpf.c
Commit 7d62656805cca60ff9d6f5e9b8b5b8d096cf226a by yonghong-song
tools: add option --cgroupmap to tcptop
(commit: 7d62656)
The file was modifiedtools/tcptop_example.txt (diff)
The file was modifiedman/man8/tcptop.8 (diff)
The file was modifiedtools/tcptop.py (diff)
Commit 8b6a7db9c8eeb5c513a162c90a7dd8f0bd7620dd by yonghong-song
libbpf-tools: update vmlinux.h with BPF helper flags generated from UAPI

Update vmlinux.h to a version generated from same v5.5 tag and default config
with cherry-picked 1aae4bdd7879 ("bpf: Switch BPF UAPI #define constants used
from BPF program side to enums") on top of it. This adds lots of BPF helper
flags often useful from BPF program side.

Signed-off-by: Andrii Nakryiko <andriin@fb.com>
(commit: 8b6a7db)
The file was modifiedlibbpf-tools/vmlinux_505.h (diff)
Commit 77d60b19f9d608d1039c3297f3e7fcf9548c879e by yonghong-song
libbpf: sync to latest version

Sync libbpf to latest revision. It brings latest BPF headers, among other
things.

Signed-off-by: Andrii Nakryiko <andriin@fb.com>
(commit: 77d60b1)
The file was modifiedsrc/cc/libbpf (diff)
Commit 454b138e6b75a47d4070a4f99c8f2372b383f71e by yonghong-song
libbpf-tools: small clean ups across all tools

Remove BPF_F_CURRENT_CPU definitions, which are now provided by vmlinux.h
after 1aae4bdd7879 ("bpf: Switch BPF UAPI #define constants used from BPF
program side to enums") commit in kernel.

Fix potential uninitialized read warning in opensnoop.

Also add opensnoop to .gitignore.

Signed-off-by: Andrii Nakryiko <andriin@fb.com>
(commit: 454b138)
The file was modifiedlibbpf-tools/drsnoop.bpf.c (diff)
The file was modifiedlibbpf-tools/runqslower.bpf.c (diff)
The file was modifiedlibbpf-tools/opensnoop.bpf.c (diff)
The file was modifiedlibbpf-tools/opensnoop.c (diff)
The file was modifiedlibbpf-tools/.gitignore (diff)
Commit 2b5fcc6ec332f8067dab50da833ee870fd690579 by yonghong-song
libbpf-tools: determine target host architecture

BPF code is compiled with -target bpf, but for PT_REGS_PARM macro (and by
induction for BPF_KPROBE/BPF_KRETPROBE macros as well), it's important to know
what's the target host original architecture was, to use correct definition of
struct pt_regs. Determine that based on output of `uname -m` (taking into
account that both x86_64 and x86 are defined as x86 internally for kernel).

Signed-off-by: Andrii Nakryiko <andriin@fb.com>
(commit: 2b5fcc6)
The file was modifiedlibbpf-tools/Makefile (diff)
Commit d0ec8a27db740304d46d898d1a930bfcb6e09627 by yonghong-song
Backport tcpstates to kernels < 4.15

The tracepoint inet_sock_set_state only exists in kernels 4.15.
Backported the bpf tracepoint to use kprobes on older kernels.
(commit: d0ec8a2)
The file was modifiedtools/tcpstates.py (diff)
Commit cd43be4c6a52540a8e272ed3dcea48211c198073 by yonghong-song
libbpf-tools: adjust Kconfig and re-build vmlinux.h

Default v5.5 kernel config doesn't have most of BPF-related functionality
enabled, which leads to vmlinux.h not containing a lot of useful constants.
This patch contains re-generated vmlinux.h from kernel built with default
config plus minimal changes to enable most (all?) BPF-relevant parts of
kernel. Here's a list of added options:

CONFIG_BPF_EVENTS=y
CONFIG_BPFILTER_UMH=m
CONFIG_BPFILTER=y
CONFIG_BPF_JIT=y
CONFIG_BPF_KPROBE_OVERRIDE=y
CONFIG_BPF_STREAM_PARSER=y
CONFIG_BPF_SYSCALL=y
CONFIG_CC_HAS_ASM_INLINE=y
CONFIG_CC_HAS_KASAN_GENERIC=y
CONFIG_CC_HAS_SANCOV_TRACE_PC=y
CONFIG_CGROUP_BPF=y
CONFIG_GCC_VERSION=70300
CONFIG_IPV6_MULTIPLE_TABLES=y
CONFIG_IPV6_SEG6_BPF=y
CONFIG_IPV6_SEG6_LWTUNNEL=y
CONFIG_LIBCRC32C=y
CONFIG_LWTUNNEL_BPF=y
CONFIG_LWTUNNEL=y
CONFIG_NET_ACT_BPF=y
CONFIG_NET_CLS_BPF=y
CONFIG_NETFILTER_ADVANCED=y
CONFIG_NETFILTER_XT_MATCH_BPF=y
CONFIG_NET_SOCK_MSG=y
CONFIG_NF_CT_PROTO_DCCP=y
CONFIG_NF_CT_PROTO_SCTP=y
CONFIG_NF_CT_PROTO_UDPLITE=y
CONFIG_SOCK_CGROUP_DATA=y
CONFIG_STREAM_PARSER=y
CONFIG_XDP_SOCKETS_DIAG=y
CONFIG_XDP_SOCKETS=y

To make this vmlinux.h generation process easier for future adjustments (e.g.,
if some of the tools would need types that default config compiles out), check
in used Kconfig along the vmlinux.h itself.

Signed-off-by: Andrii Nakryiko <andriin@fb.com>
(commit: cd43be4)
The file was addedlibbpf-tools/kernel.config
The file was modifiedlibbpf-tools/vmlinux_505.h (diff)
Commit 7fd2fa68b52e0f38dd4915bf786d67445941eedd by yonghong-song
Factor out ebpf::parse_tracepoint function

And moving it to common.cc in order to be able to make
automated tests for it. Following patches are adding
automated test for this function and it seems too much
to link in all the clang/llvm stuff to the test binary
just for single function test.

Adding ebpf::parse_tracepoint that takes istream of the
tracepoint format data and returns tracepoint struct
as std::string.

No functional change is intended or expected.

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
(commit: 7fd2fa6)
The file was modifiedsrc/cc/common.h (diff)
The file was modifiedsrc/cc/frontends/clang/tp_frontend_action.cc (diff)
The file was modifiedsrc/cc/common.cc (diff)
Commit b9099c51ca570f33a5a9baef6f4f566c126b2b16 by yonghong-song
Add test for ebpf::parse_tracepoint function

The test prepares tracepoint format file and run
ebpf::parse_tracepoint on it. Then it compares
expected struct output with actual function result.

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
(commit: b9099c5)
The file was modifiedtests/cc/CMakeLists.txt (diff)
The file was addedtests/cc/test_parse_tracepoint.cc
Commit b8423e66ce450418c6142aab61ee9330e1fcefcc by yonghong-song
Strengthen tracepoint format parsing

There's issue in current RHEL real time kernel with tracepoint format,
which makes bcc-tools to return wrong data.

Two new 'common_' fields were added and it causes 2 issues for tracepoint
format parser.

First issue
  - is the gap between common fields and other fields, which is not
    picked up by the parser, so the resulted struct is not aligned with
    the data.

Second issue
  - is the fact that current parser covers common fields with:
      u64 __do_not_use__
    so the new common fields are not accounted for.

    This issue is solved in the following patch. I kept both
    issues and fixes separated to make the change readable.

There's a 'not described gap' in the sched_wakeup's format file and
probably in other formats as well:

Having:
  # cat /sys/kernel/debug/tracing/events/sched/sched_wakeup/format
  name: sched_wakeup
  ID: 310
  format:
          field:unsigned short common_type;       offset:0;       size:2; signed:0;
          field:unsigned char common_flags;       offset:2;       size:1; signed:0;
          field:unsigned char common_preempt_count;       offset:3;       size:1; signed:0;
          field:int common_pid;   offset:4;       size:4; signed:1;
          field:unsigned char common_migrate_disable;     offset:8;       size:1; signed:0;
          field:unsigned char common_preempt_lazy_count;  offset:9;       size:1; signed:0;

          field:char comm[16];    offset:12;      size:16;        signed:1;
          field:pid_t pid;        offset:28;      size:4; signed:1;
          field:int prio; offset:32;      size:4; signed:1;
          field:int success;      offset:36;      size:4; signed:1;
          field:int target_cpu;   offset:40;      size:4; signed:1;

There's "common_preempt_lazy_count" field on offset 9 with size 1:
        common_preempt_lazy_count;  offset:9;       size:1;

and it's followed by "comm" field on offset 12:
        field:char comm[16];    offset:12;      size:16;        signed:1;

which makes 2 bytes gap in between, that might confuse some applications
like bpftrace or bcc-tools library.

The tracepoint parser makes struct out of the field descriptions,
but does not account for such gaps.

I posted patch to fix this [1] in RT kernel, but that might take a while,
and we could easily fix our tracepoint parser to workaround this issue.

Adding code to detect this gaps and add 1 byte __pad_X fields, where X is
the offset number.

[1] https://lore.kernel.org/linux-rt-users/20200221153541.681468-1-jolsa@kernel.org/
Signed-off-by: Jiri Olsa <jolsa@kernel.org>
(commit: b8423e6)
The file was modifiedsrc/cc/common.cc (diff)
The file was modifiedtests/cc/test_parse_tracepoint.cc (diff)
Commit 0a9d6db96c6410d2ef741507255f5258d6406032 by yonghong-song
Add support for new common fields

Current parser covers common fields with:
  u64 __do_not_use__
so the new common fields are not accounted for.

Keeping the 'u64 __do_not_use__' field for backward compatibility
(who knows who's actualy using it) and adding new fields, like:
  char __do_not_use__X

for each byte of extra common fields, where X is the offset of the
field.

With this fix the bcc-tools correctly parses tracepoints on RT kernel
and it's usable again.

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
(commit: 0a9d6db)
The file was modifiedsrc/cc/common.cc (diff)
The file was modifiedtests/cc/test_parse_tracepoint.cc (diff)
Commit 5302614d31645db8fb5466e95ba7e6500c2c46c2 by yonghong-song
libbpf: update to latest libbpf version

Pull in latest libbpf changes. In particular, containing BPF_KRETPROBE fix.

Signed-off-by: Andrii Nakryiko <andriin@fb.com>
(commit: 5302614)
The file was modifiedsrc/cc/libbpf (diff)
Commit ca1b0af0eff9d994a49606899c2f110a68addeca by noreply
adding example/networking/net_monitor.py

Aggregates incoming network traffic
outputs source ip, destination ip, the number of their network traffic, and current time

Co-authored-by: gist-banana <gist.banana@gist.ac.kr>
(commit: ca1b0af)
The file was addedexamples/networking/net_monitor.py
Commit 4c1136ee6c08eb9fef86ebaafe2544692472b5b7 by noreply
Make -DCMAKE_INSTALL_PREFIX=/usr as the default (#2800)

* make -DCMAKE_INSTALL_PREFIX=/usr as the default
* remove -DCMAKE_INSTALL_PEREFIX=/usr from INSTALL.md  as it gets the default
(commit: 4c1136e)
The file was modifiedCMakeLists.txt (diff)
The file was modifiedINSTALL.md (diff)
Commit f82ea454ea55ad73ee3284a0bd6fc3b45a7d73a8 by yonghong-song
tools: add option --cgroupmap to profile.py
(commit: f82ea45)
The file was modifiedtools/profile.py (diff)
The file was modifiedman/man8/profile.8 (diff)
The file was modifiedtools/profile_example.txt (diff)
Commit e1d53a3ab329ee3504dd58db09859baea0ca724a by yonghong-song
Do not prepend /proc multiple times in bcc_resolve_symname
(commit: e1d53a3)
The file was modifiedsrc/cc/bcc_syms.cc (diff)
Commit 1cd3952b7c2bc7ab0e545f42711402b9f8fe65d8 by yonghong-song
Add regression test for bcc resolve symbol names
(commit: 1cd3952)
The file was modifiedtests/cc/test_usdt_probes.cc (diff)
Commit c2772a334bd10f6e7f66b7d79c269ab9ca5e525c by yonghong-song
libbpf-tools: add CO-RE xfsslower

Signed-off-by: Wenbo Zhang <ethercflow@gmail.com>
(commit: c2772a3)
The file was addedlibbpf-tools/xfsslower.h
The file was modifiedlibbpf-tools/.gitignore (diff)
The file was addedlibbpf-tools/xfsslower.c
The file was modifiedlibbpf-tools/Makefile (diff)
The file was addedlibbpf-tools/xfsslower.bpf.c
Commit 510fc7425ccd0bc53d53a56ae847d786eb15e1ce by yonghong-song
opensnoop: fix --cgroupmap with kfunc

Commit c347fe6c9f75 ("Support kfunc in opensnoop.py") introduces an
alternative probe on do_sys_open() with kfuncs instead of kprobes. This
new implementation is used if the kernel supports it. But it removed the
--cgroupmap filter added in commit b2aa29fa3269 ("tools: cgroup
filtering in execsnoop/opensnoop").

This patch adds the --cgroupmap filter in the kfunc implementation.
(commit: 510fc74)
The file was modifiedtools/opensnoop.py (diff)
Commit 35c9940ee7297eafa7d8bcc8d9cda29a3b17a25b by yonghong-song
chore: include Amazon Linux 2 binary option in INSTALL
(commit: 35c9940)
The file was modifiedINSTALL.md (diff)
Commit 6b8a89673dbba9b9203a6555735e451dd9477836 by yonghong-song
tools: fix alignment of ipv6_key_t in tcptop

Fixes the following error on aarch64:

bpf: Failed to load program: Permission denied
; struct sock *sk = ctx->regs[0]; int copied = ctx->regs[1];
0: (79) r8 = *(u64 *)(r1 +8)
...
; struct ipv6_key_t ipv6_key = {.pid = pid};
79: (63) *(u32 *)(r10 -48) = r7
; struct ipv6_key_t ipv6_key = {.pid = pid};
80: (7b) *(u64 *)(r10 +8) = r9
invalid stack off=8 size=8
processed 96 insns (limit 1000000) max_states_per_insn 0 total_states 7 peak_states 7 mark_read 4
(commit: 6b8a896)
The file was modifiedtools/tcptop.py (diff)
Commit 1b0fe40663e48b315e75a9b1ed74820207f76658 by yonghong-song
Change the default sort order to Descending
currently with ascending sort the useful information
is commonly beyond the bottom of the terminal window
and it is necessary to reverse the sort manually every execution.

Signed-off-by: Mark Kogan <mkogan@redhat.com>
(commit: 1b0fe40)
The file was modifiedtools/cachetop.py (diff)
Commit 9adda7092054e1637a68e61e391ac755416a2fb1 by yonghong-song
tools/capable: fix compilation error

9d7feeed87c5 ("tools: add option --unique to capable.py") introduced a
compilation error when the --unique flag is passed.

Signed-off-by: Mauricio Vásquez <mauricio@kinvolk.io>
(commit: 9adda70)
The file was modifiedtools/capable.py (diff)
Commit 85f5e7d5673e3273f61550d806d348626dffc140 by yonghong-song
libbpf-tools: add CO-RE filelife

Signed-off-by: Wenbo Zhang <ethercflow@gmail.com>
(commit: 85f5e7d)
The file was modifiedlibbpf-tools/.gitignore (diff)
The file was modifiedlibbpf-tools/Makefile (diff)
The file was addedlibbpf-tools/filelife.c
The file was addedlibbpf-tools/filelife.h
The file was addedlibbpf-tools/filelife.bpf.c
Commit e323254466575e03d753a33c77667011626c389f by yonghong-song
make -lrt linking optional

On Android there is no standalone rt library and relevant symbols are provided
by libc (bionic).
(commit: e323254)
The file was modifiedintrospection/CMakeLists.txt (diff)
Commit 915d6d7617b20d4af8360c1d53efe8abd8697efa by yonghong-song
correcting input to hex using ord funtion
(commit: 915d6d7)
The file was modifiedexamples/networking/http_filter/http-parse-complete.py (diff)
Commit 472f9b3bd6bcc63e6e959148320eb76184c51870 by yonghong-song
mallocstacks: validating before stacktrace walk
(commit: 472f9b3)
The file was modifiedexamples/tracing/mallocstacks.py (diff)
Commit 4f6ecea67b58699b52c315088c5829448add57c5 by yonghong-song
http-parse-simple.py: fix wrong start position

Signed-off-by: Jean-Philippe Menil <jpmenil@gmail.com>
(commit: 4f6ecea)
The file was modifiedexamples/networking/http_filter/http-parse-simple.py (diff)
Commit ab54de2e4449027f2b4dccd022adc57bec4fd4eb by yonghong-song
libbpf-tools: CO-RE opensnoop minor improvements

* allow passing 0 as valid uid
* fix type for targ_uid
* improve uid validation (uid >= 4294967295 now invalid)
(commit: ab54de2)
The file was modifiedlibbpf-tools/opensnoop.bpf.c (diff)
The file was modifiedlibbpf-tools/opensnoop.c (diff)
The file was modifiedlibbpf-tools/opensnoop.h (diff)
Commit 689f90087e0d59caea63e10be04bcf1172a90c4f by noreply
[C++] add BPF::enable_usdt_all() and disble_usdt_all() to handle all the USDT at once (#2854)

* add BPF::enable_usdt_all() to enable all the USDT
* add detach_usdt_all() to detach all the USDTs
(commit: 689f900)
The file was modifiedsrc/cc/api/BPF.h (diff)
The file was modifiedsrc/cc/api/BPF.cc (diff)
The file was modifiedexamples/cpp/FollyRequestContextSwitch.cc (diff)
The file was modifiedtests/cc/test_usdt_probes.cc (diff)
Commit 495a4a3403371b3fb1f7049a8cefc996621e61aa by yonghong-song
examples/tracing: add nflatency - netfilter hook metrics

This adds a kprobe / kretprobe for chasing down slow netfilter hooks.
Since, often, the slowest hooks are on connection initialization and
teardown, it is bucketed by TCP flags. (rather than dive deep in to
conntrack)

Signed-off-by: Casey Callendrello <cdc@redhat.com>
(commit: 495a4a3)
The file was addedexamples/tracing/nflatency.py
Commit 533391eaa94c4b3a148bf801b8aea5bb803c1e9d by yonghong-song
add test_lpm_trie.py test

test_lpm_trie.py has been in the repo for quite some time,
but is not included in the unit test.

The issue https://github.com/iovisor/bcc/issues/2860
exposed an issue involved in using together with BTF,
which requires the key type to be a structure.

Let add it as a unit test so we can be sure
lpm_trie map is supported properly by bcc.

Signed-off-by: Yonghong Song <yhs@fb.com>
(commit: 533391e)
The file was modifiedtests/python/CMakeLists.txt (diff)
The file was modifiedtests/python/test_lpm_trie.py (diff)
Commit f35dae07bbe48f6233bf50f05ddbf835cc18c86e by yonghong-song
adjust layout string in JIT with llvm11 128bit spec support

To fix the issue (https://github.com/iovisor/bcc/issues/2827)
which exposed a problem with aarch64 frontend and bpf backend
regarding __int128 type, the following llvm patch
   https://reviews.llvm.org/D76587
landed to explicitly support i128 type in bpf layout spec.

Adjust the layout string in bpf_module JIT compilation
accordingly.

Signed-off-by: Yonghong Song <yhs@fb.com>
(commit: f35dae0)
The file was modifiedsrc/cc/bpf_module.cc (diff)
Commit 007ee4930798f854da47f5838097193d75c67ad1 by yonghong-song
Translate virtual addresses to binary addresses for shared libs as well.

Quoting https://refspecs.linuxbase.org/elf/elf.pdf:
```
Symbol table entries for different object file types have slightly different
interpretations for the st_value member.
- In relocatable files, st_value holds alignment constraints for a symbol
whose section index is SHN_COMMON.
- In relocatable files, st_value holds a section offset for a defined symbol.
That is, st_value is an offset from the beginning of the section that st_shndx
identifies.
- In executable and shared object files, st_value holds a virtual address. To
make these files' symbols more useful for the dynamic linker, the section offset
(file interpretation) gives way to a virtual address (memory interpretation) for
which the section number is irrelevant.
```

This is a problem in practice as well. I run into this while tracing shared
libraries on Android with bpftrace. Some of them have text sections mmapped
at different offset than file offset which results in probes being placed
at wrong offsets.
(commit: 007ee49)
The file was addedtests/python/test_uprobes2.py
The file was modifiedtests/python/CMakeLists.txt (diff)
The file was modifiedsrc/cc/bcc_syms.cc (diff)
Commit 5057bbe6fb00a112c03ac5c5277646fd9602c1b1 by yonghong-song
examples/tracing: add io_latencies - IO latency distribution monitor

This adds flexible low overhead latency percentile monitoring for block
devices which can be useful in understanding and debugging IO related
issues.

Signed-off-by: Tejun Heo <tj@kernel.org>
(commit: 5057bbe)
The file was addedexamples/tracing/io_latencies.py
Commit 15d7955e07a942340610f71e44f44046b960e3a8 by yonghong-song
Update pid filter

Update pid filter;  u32 pid = bpf_get_current_pid_tgid() >> 32;
(commit: 15d7955)
The file was modifiedtools/filelife.py (diff)
Commit 7a3854319929e7f126b893c74290076cf7a328b1 by yonghong-song
doc: fix wrong references to get_syscall_name
(commit: 7a38543)
The file was modifieddocs/reference_guide.md (diff)
Commit 1515f28a483d62ff056602daacecd7631c98492d by tj
tools: Move io_iolatencies.py example to tools/biolatpcts.py
(commit: 1515f28)
The file was addedtools/biolatpcts.py
The file was removedexamples/tracing/io_latencies.py
Commit 66ab787b5f853d97bad8fb950b12b11b8e281b7c by tj
tools/biolatpcts: Use #!/usr/bin/python instead of python3

Nothing in the script requires python3.
(commit: 66ab787)
The file was modifiedtools/biolatpcts.py (diff)
Commit 7214903a9c42c3501e50a47d3698b77547036f70 by tj
tools/biolatpcts: --pcts handling improvements

* Multiple arguments parsing conflicts with positional argument and can become
  confusing. Use a single comma separated list instead.

* Instead of converting to floats while parsing arguments, keep the strings
  verbatim and use them when outputting results. This allows matching the same
  target percentile string in the output and is helpful when it's consumed by
  other programs.
(commit: 7214903)
The file was modifiedtools/biolatpcts.py (diff)
Commit fbf0392d72a6ced87a5e8ea8a84dfddb5a86c6bd by tj
tools/biolatpcts: Accept device name/node for target device selection

MAJ:MIN is cumbersome. Update it to accept DEVNAME and /dev/DEVNAME too.
(commit: fbf0392)
The file was modifiedtools/biolatpcts.py (diff)
Commit 1e9c56f40a44faf72569ddc2e37ca5d554aee93b by tj
tools/biolatpcts: Add the example file and man page
(commit: 1e9c56f)
The file was addedtools/biolatpcts_example.txt
The file was addedman/man8/biolatpcts.8
Commit 10519c74c72b58109a2c14eba59d3cfe985ddc0f by tj
examples: Add biolatpcts.py example

This is simplified version of tools/biolatpcts.py and demonstrates how to
obtain and calculate latency percentiles.
(commit: 10519c7)
The file was addedexamples/tracing/biolatpcts_example.txt
The file was addedexamples/tracing/biolatpcts.py
Commit f8f230c8162e59202987fb46f2d3d867a5cbef1d by yonghong-song
add attribute readers to class USDT (C++ API)
(commit: f8f230c)
The file was modifiedtests/cc/test_usdt_probes.cc (diff)
The file was modifiedsrc/cc/api/BPF.h (diff)
Commit 1599c2ef8206988d5df7eeadc3c5138c006ac245 by yonghong-song
build: fix clang 10 build

some distros already packaging clang 10 (checked fedora and arch) no longer
ship all the individual libclang*.so component libraries.
Instead, clang from 9.0 onwards provides a new lib, libclang-cpp.so, which
includes everything we need.

Tell cmake to use it if the individual libraries are no longer found.
(Build-wise, if both are present it is more efficient to use the individual
components so keep these first)
(commit: 1599c2e)
The file was modifiedCMakeLists.txt (diff)
Commit c1d3a65f0d6dd29aad71ffc87f21345473a2bca3 by noreply
Added kernel recompile guidance for  libbpf CO-RE (#2876)

Added kernel recompile guidance for  libbpf CO-RE
(commit: c1d3a65)
The file was modifiedlibbpf-tools/README.md (diff)
Commit 6d61622f6300fa140647de82122e66b6288fe2ed by noreply
Add `bcc_version.h` to access LIBBCC_VERSION from C/C++ (#2856)

add bcc/bcc_version.h to install
(commit: 6d61622)
The file was modifiedexamples/cpp/HelloWorld.cc (diff)
The file was modifiedexamples/cpp/CMakeLists.txt (diff)
The file was modifiedsrc/cc/CMakeLists.txt (diff)
The file was addedsrc/cc/bcc_version.h.in
Commit d3359b294636579649f200deabe71fd98d4edd35 by yonghong-song
Improve ubuntu installation description
(commit: d3359b2)
The file was modifiedINSTALL.md (diff)
Commit 45e63f2b316cdce2d8cc925f6f14a8726ade9ff6 by yonghong-song
fix llvm 11 compilation issues

The llvm CreateCall used in bcc is deprecated in llvm 11:
  https://reviews.llvm.org/D76269
The llvm CreateMemCpy is changed in llvm 11 as well:
  https://reviews.llvm.org/D71473

This caused bcc compilation error.

  /home/yhs/work/bcc/src/cc/frontends/b/codegen_llvm.cc: In member function
     ‘ebpf::StatusTuple ebpf::cc::CodegenLLVM::emit_log(ebpf::cc::Method CallExprNode*)’:
  /home/yhs/work/bcc/src/cc/frontends/b/codegen_llvm.cc:691:39: error: no matching function for call to
     ‘llvm::IRBuilder<>::CreateCall(llvm::Value*&, std::vector<llvm::Value*, std::allocator<llvm::Value*> >&)’
     expr_ = B.CreateCall(printk_fn, args);
                                       ^
  ...

  /home/yhs/work/bcc/src/cc/frontends/b/codegen_llvm.cc: In member function
     ‘virtual ebpf::StatusTuple ebpf::cc::CodegenLLVM::visit_string_exp_node(ebpf::cc::StringExprNode*)’:
  /home/yhs/work/bcc/src/cc/frontends/b/codegen_llvm.cc:440:55: error: no matching function for call to
     ‘llvm::IRBuilder<>::CreateMemCpy(llvm:Value*&, int, llvm::Value*&, int, std::__cxx11::basic_string<char>::size_type)’
   B.CreateMemCpy(ptr, 1, global, 1, n->val_.size() + 1);
                                                       ^
  ...

This patch fixed the compilation issue.
(commit: 45e63f2)
The file was modifiedsrc/cc/frontends/b/codegen_llvm.h (diff)
The file was modifiedsrc/cc/frontends/b/codegen_llvm.cc (diff)
Commit df3e7d673da4bd4acab333f28851eccf00ca9f87 by yonghong-song
sync to latest libbpf

sync to libbpf v0.0.8. Add newer helpers to
helpers.h, libbpf.c error reporting and docs.
(commit: df3e7d6)
The file was modifiedintrospection/bps.c (diff)
The file was modifiedsrc/cc/compat/linux/virtual_bpf.h (diff)
The file was modifiedsrc/cc/export/helpers.h (diff)
The file was modifieddocs/kernel-versions.md (diff)
The file was modifiedsrc/cc/libbpf.c (diff)
The file was modifiedsrc/cc/libbpf (diff)
Commit ceb458d6a07a42d8d6d3c16a3b8e387b5131d610 by yonghong-song
prepare for release v0.14.0

added changelog for release v0.14.0
(commit: ceb458d)
The file was modifieddebian/changelog (diff)