- 28 Feb, 2017 4 commits
-
-
4ast authored
cc: Fix SEGV when there is no build-id section
-
4ast authored
Fix long running test_debuginfo and python3 fix
-
Brenden Blanco authored
Make sure subclass calls super().tearDown to clean up dummy process. Also, fixup a python3 str.encode(). Fixes: #1013 Signed-off-by: Brenden Blanco <bblanco@gmail.com>
-
Brenden Blanco authored
Make perf ring buffer size configurable
-
- 27 Feb, 2017 1 commit
-
-
Mark Drayton authored
As discussed in #966, this PR makes the size of the ring buffer used to send data to userspace configurable. It changes the Python, Lua and C++ APIs to expose this knob. It also defaults the buffer size to a larger value (64 pages per CPU, an 8x increase) for several tools which produce a lot of output, as well as making it configurable in `trace` via a `-b` flag.
-
- 26 Feb, 2017 3 commits
-
-
Brenden Blanco authored
snapcraft: add in some new tools missing from the snapcraft apps list
-
Brenden Blanco authored
Support for macros in rewriter
-
Paul Chaignon authored
Extends the scope of 98b90974's fix to support macros anywhere in the rewriter. All SourceRange objects are replaced to use macro expanded locations.
-
- 23 Feb, 2017 3 commits
-
-
4ast authored
docs: Update eBPF features list
-
Quentin Monnet authored
Update of BPF features list, following the release of kernel 4.10.
-
Colin Ian King authored
Add in syscount, dbstat and dbslower to apps list. Signed-off-by: Colin Ian King <colin.king@canonical.com>
-
- 22 Feb, 2017 2 commits
-
-
4ast authored
Improve matching of file-backed memory mappings
-
Mark Drayton authored
Use the same rules as perf to determine if a mapping in /proc/pid/maps is file-backed. This allows mappings in anonymous huge pages and so on to fall back to resolving from /tmp/perf-pid.map, if appropriate. ref: http://lxr.free-electrons.com/source/tools/perf/util/map.c#L28
-
- 21 Feb, 2017 19 commits
-
-
4ast authored
Fix "for loop initial declarations only in C99" compile error
-
4ast authored
Fix minor error in test instructions
-
Mark Drayton authored
-
Paul Chaignon authored
-
4ast authored
External debuginfo support and general symbols overhaul
-
Sasha Goldshtein authored
This commit introduces support for tests of the new debuglink and build-id debuginfo resolution functionality. The tests build a dummy.c file with a debuglink section, and again with a build-id section, and make sure that the symbol resolution code can locate the debug information correctly (in the binary's directory for debuglink, and in /usr/lib/debug/.build-id for the build-id).
-
Sasha Goldshtein authored
The implementation of `ProcSyms::resolve_name` was only valid for kernel symbols, when there is no module. When a module was provided, it would segfault due to the module being null. Fixed by making `bcc_symcache_resolve_name` take an additional module parameter, which, for kernel symbols, is simply null (`None` from Python).
-
Sasha Goldshtein authored
Adds support for resolving symbols using external debuginfo files, which can be retrieved from two locations. First, check the build-id of the desired binary and look in /usr/lib/debug/.build-id according to the build-id structure. Second, check the debuglink section of the desired binary and look in /usr/lib/debug or in the binary's current directory. These are the rules applied by GDB as well, but GDB lets the user reconfigure the debug directory path from /usr/lib/debug to something else; we do not support this. These changes are based on the following description of how GDB resolves external debuginfo: https://sourceware.org/gdb/onlinedocs/gdb/Separate-Debug-Files.html
-
Sasha Goldshtein authored
When resolving symbols, ProcSyms would treat position-independent executables (PIE files) incorrectly, resulting in symbol resolution failures. Specifically, PIE files are treated like shared objects for ASLR, which means all symbol addresses in the file need to be taken relative to the executable load address at runtime, the same as with dynamic library shared objects. The fix is in the `is_so()` method on `ProcSyms::Module`, which now uses the correct `bcc_elf_is_shared` helper for testing if a file is a shared object rather than just looking at the extension ".so", which is very brittle -- and wrong.
-
Sasha Goldshtein authored
-
Sasha Goldshtein authored
Remove addresses from stack output, as these are not used in the vast majority of the cases.
-
Sasha Goldshtein authored
-
Sasha Goldshtein authored
-
Sasha Goldshtein authored
-
Sasha Goldshtein authored
The default profile output used to include stack addresses, which are not used in 99+% of the cases.
-
Sasha Goldshtein authored
Remove usyms.py dependency and replace with new symbols API.
-
Sasha Goldshtein authored
The new API has two main methods: `sym` and `ksym` (the second is a trivial wrapper of the first one). Both methods accept two Boolean flags arguments: `show_module` and `show_address`. The first controls whether the resulting symbol name should contain the name of the symbol's module, in brackets. For kernel symbols, this is simply "[kernel]". The second controls whether the resulting symbol name should contain the instruction offset from the beginning of the symbol, e.g. "start_thread+0x202".
-
Sasha Goldshtein authored
This class was obsolete and replaced by the SymbolCache class.
-
4ast authored
Support base + index * scale addressing for USDT arguments
-
- 20 Feb, 2017 4 commits
-
-
4ast authored
trace, argdist: Treat small USDT arguments correctly
-
Sasha Goldshtein authored
trace and argdist currently only work correctly for USDT arguments whose size is exactly 8 bytes. Smaller types, such as chars, shorts, ints (signed or unsigned) are not treated correctly. The reason is that the produced program would invoke the `bpf_usdt_readarg` helper with the address of a u64 local variable, and then cast that variable to the user-specified type derived from the format string. However, the `bpf_usdt_readarg` rewriting then passes `sizeof(u64)` to the generated `bpf_..._readarg` macro, which then fails to read anything because the provided size doesn't match the argument size it knows about. The fix is fairly easy: instead of declaring a u64 unconditionally and reading into that variable with `bpf_usdt_readarg`, declare a variable that has the correct type according to what we know about the USDT probe.
-
4ast authored
Fix file descriptor leak
-
Paul Chaignon authored
-
- 19 Feb, 2017 1 commit
-
-
Sasha Goldshtein authored
It turns out that some software will have USDT probe arguments referencing memory using the full `nnn@(%basereg + %idxreg * scale` syntax. This is represented as `nnn@(%basereg,%idxreg,scale)` in the `NT_STAPSDT` note, encountered in building a recent version of PostgreSQL on FC25. This format is now recognized by the USDT parser, and the correct BPF code is emitted to retrieve arguments that reference memory using this full addressing syntax.`
-
- 16 Feb, 2017 3 commits
-
-
Brenden Blanco authored
llcstat: fix TypeError on python3
-
Brendan Gregg authored
dbslower and dbstat
-
Brendan Gregg authored
-