diff --git a/1001-bpftrace-anolis-fix-build-failed-on-aarch64.patch b/1001-bpftrace-anolis-fix-build-failed-on-aarch64.patch deleted file mode 100644 index c15dd4f6a26bcb216234924dceef57537b10101f..0000000000000000000000000000000000000000 --- a/1001-bpftrace-anolis-fix-build-failed-on-aarch64.patch +++ /dev/null @@ -1,87 +0,0 @@ -From 330953c11190c23a12f98d374d1b5eb6d7aad1fe Mon Sep 17 00:00:00 2001 -From: Chunmei Xu -Date: Wed, 11 Nov 2020 16:23:19 +0800 -Subject: [PATCH] fix build failed on aarch64 - -since linux has drop __NR_open on aarch64, syscall.c will build -failed on aarch64 without __NR_open defined. - -Signed-off-by: Chunmei Xu ---- - tests/testprogs/syscall.c | 31 ++++++++++++++++++++++++------- - 1 file changed, 24 insertions(+), 7 deletions(-) - -diff --git a/tests/testprogs/syscall.c b/tests/testprogs/syscall.c -index c212466..ca1f699 100644 ---- a/tests/testprogs/syscall.c -+++ b/tests/testprogs/syscall.c -@@ -15,7 +15,9 @@ void usage() - printf("\t./syscall []\n"); - printf("Supported Syscalls:\n"); - printf("\t nanosleep [$N] (default args: 100ns)\n"); -+#if defined(SYS_open) - printf("\t open\n"); -+#endif - printf("\t openat\n"); - printf("\t read\n"); - printf("\t execve [] (at most 128 arguments)\n"); -@@ -82,8 +84,19 @@ int gen_open_openat(bool is_sys_open) - { - char *file_path = get_tmp_file_path( - "/bpftrace_runtime_test_syscall_gen_open_temp"); -- int fd = is_sys_open ? syscall(SYS_open, file_path, O_CREAT) -- : syscall(SYS_openat, AT_FDCWD, file_path, O_CREAT); -+ int fd = -1; -+ -+ if (is_sys_open) -+ { -+#if defined(SYS_open) -+ fd = syscall(SYS_open, file_path, O_CREAT); -+#endif -+ } -+ else -+ { -+ fd = syscall(SYS_openat, AT_FDCWD, file_path, O_CREAT); -+ } -+ - if (fd < 0) - { - perror("Error in syscall open/openat"); -@@ -154,7 +167,6 @@ int main(int argc, char *argv[]) - return 1; - } - const char *syscall_name = argv[1]; -- bool is_sys_open = false; - int r = 0; - - if (strcmp("--help", syscall_name) == 0 || strcmp("-h", syscall_name) == 0) -@@ -165,11 +177,16 @@ int main(int argc, char *argv[]) - { - r = gen_nanosleep(argc, argv); - } -- else if ((is_sys_open = (strcmp("open", syscall_name) == 0)) || -- strcmp("openat", syscall_name) == 0) -+ else if (strcmp("openat", syscall_name) == 0) - { -- r = gen_open_openat(is_sys_open); -+ r = gen_open_openat(false); - } -+#if defined(SYS_open) -+ else if (strcmp("open", syscall_name) == 0) -+ { -+ r = gen_open_openat(true); -+ } -+#endif - else if (strcmp("read", syscall_name) == 0) - { - r = gen_read(); -@@ -186,4 +203,4 @@ int main(int argc, char *argv[]) - } - - return r; --} -\ No newline at end of file -+} --- -2.19.1.6.gb485710b - diff --git a/1002-bpftrace-anolis-tests-Add-architecture-specific-testcase-support.patch b/1002-bpftrace-anolis-tests-Add-architecture-specific-testcase-support.patch deleted file mode 100644 index a225a20d62a0ed00c35c6b83f2bbcb2b9ca918ae..0000000000000000000000000000000000000000 --- a/1002-bpftrace-anolis-tests-Add-architecture-specific-testcase-support.patch +++ /dev/null @@ -1,130 +0,0 @@ -From 2aa294b12568978eca1251100e149e830b23c097 Mon Sep 17 00:00:00 2001 -From: Jeffle Xu -Date: Mon, 26 Oct 2020 22:19:11 +0800 -Subject: [PATCH] tests: Add architecture specific testcase support - -commit 48d405133160 ("bpftrace: Add architecture specific testcase -support") added architecture specific support for runtime tests. -Still there are architecture specific testcases in semantic_analyser, -where 'ip' register is hard coded in semantic_analyser.call_reg and -semantic_analyser.builtin_functions. - -Besides registers such as 'ip' and 'bp' are also hard codes in some -codegen tests. - -These testcases are all c/c++ files and thus we need conditional compiling. - -Signed-off-by: Jeffle Xu ---- - tests/CMakeLists.txt | 12 ++++++++++++ - tests/codegen/call_reg.cpp | 2 ++ - tests/codegen/intptrcast_assign_var.cpp | 2 ++ - tests/codegen/intptrcast_call.cpp | 2 ++ - tests/semantic_analyser.cpp | 4 ++++ - 5 files changed, 22 insertions(+) - -diff --git a/tests/CMakeLists.txt b/tests/CMakeLists.txt -index 332eba2..3b843e7 100644 ---- a/tests/CMakeLists.txt -+++ b/tests/CMakeLists.txt -@@ -108,6 +108,18 @@ if(HAVE_BFD_DISASM) - endif(STATIC_LINKING) - endif(HAVE_BFD_DISASM) - -+if(CMAKE_SYSTEM_PROCESSOR STREQUAL "aarch64") -+ target_compile_definitions(bpftrace_test PRIVATE ARCH_AARCH64) -+elseif(CMAKE_SYSTEM_PROCESSOR STREQUAL "ppc64" OR -+ CMAKE_SYSTEM_PROCESSOR STREQUAL "ppc64le") -+ target_compile_definitions(bpftrace_test PRIVATE ARCH_PPC64) -+elseif(CMAKE_SYSTEM_PROCESSOR STREQUAL "s390" OR -+ CMAKE_SYSTEM_PROCESSOR STREQUAL "s390x") -+ target_compile_definitions(bpftrace_test PRIVATE ARCH_S390) -+elseif(CMAKE_SYSTEM_PROCESSOR STREQUAL "x86_64") -+ target_compile_definitions(bpftrace_test PRIVATE ARCH_X86_64) -+endif() -+ - target_link_libraries(bpftrace_test arch ast parser resources) - - target_link_libraries(bpftrace_test ${LIBBCC_LIBRARIES}) -diff --git a/tests/codegen/call_reg.cpp b/tests/codegen/call_reg.cpp -index 3f4c790..c660451 100644 ---- a/tests/codegen/call_reg.cpp -+++ b/tests/codegen/call_reg.cpp -@@ -4,12 +4,14 @@ namespace bpftrace { - namespace test { - namespace codegen { - -+#ifdef ARCH_X86_64 - TEST(codegen, call_reg) // Identical to builtin_func apart from variable names - { - test("kprobe:f { @x = reg(\"ip\") }", - - NAME); - } -+#endif - - } // namespace codegen - } // namespace test -diff --git a/tests/codegen/intptrcast_assign_var.cpp b/tests/codegen/intptrcast_assign_var.cpp -index a536a90..53e4a5a 100644 ---- a/tests/codegen/intptrcast_assign_var.cpp -+++ b/tests/codegen/intptrcast_assign_var.cpp -@@ -4,10 +4,12 @@ namespace bpftrace { - namespace test { - namespace codegen { - -+#ifdef ARCH_X86_64 - TEST(codegen, intptrcast_assign_var) - { - test("kretprobe:f { @=*(int8*)(reg(\"bp\")-1) }", NAME); - } -+#endif - - } // namespace codegen - } // namespace test -diff --git a/tests/codegen/intptrcast_call.cpp b/tests/codegen/intptrcast_call.cpp -index 70e73ea..5ccceae 100644 ---- a/tests/codegen/intptrcast_call.cpp -+++ b/tests/codegen/intptrcast_call.cpp -@@ -4,11 +4,13 @@ namespace bpftrace { - namespace test { - namespace codegen { - -+#ifdef ARCH_X86_64 - TEST(codegen, intptrcast_call) - { - // Casting should work inside a call - test("kretprobe:f { @=sum(*(int8*)(reg(\"bp\")-1)) }", NAME); - } -+#endif - - } // namespace codegen - } // namespace test -diff --git a/tests/semantic_analyser.cpp b/tests/semantic_analyser.cpp -index b51313a..e7345c3 100644 ---- a/tests/semantic_analyser.cpp -+++ b/tests/semantic_analyser.cpp -@@ -188,7 +188,9 @@ TEST(semantic_analyser, builtin_functions) - test("kprobe:f { kaddr(\"sym\") }", 0); - test("kprobe:f { ntop(0xffff) }", 0); - test("kprobe:f { ntop(2, 0xffff) }", 0); -+#ifdef ARCH_X86_64 - test("kprobe:f { reg(\"ip\") }", 0); -+#endif - test("kprobe:f { kstack(1) }", 0); - test("kprobe:f { ustack(1) }", 0); - test("kprobe:f { cat(\"/proc/uptime\") }", 0); -@@ -684,8 +686,10 @@ TEST(semantic_analyser, call_cgroupid) - - TEST(semantic_analyser, call_reg) - { -+#ifdef ARCH_X86_64 - test("kprobe:f { reg(\"ip\"); }", 0); - test("kprobe:f { @x = reg(\"ip\"); }", 0); -+#endif - test("kprobe:f { reg(\"blah\"); }", 1); - test("kprobe:f { reg(); }", 1); - test("kprobe:f { reg(123); }", 1); --- -2.19.1.6.gb485710b - diff --git a/1003-bpftrace-anolis-tests-fix-semantic_analyser.type_ctx-failed-on-aarch64.patch b/1003-bpftrace-anolis-tests-fix-semantic_analyser.type_ctx-failed-on-aarch64.patch deleted file mode 100644 index 105508bb02657075c048d1621c8c74d489abe4dc..0000000000000000000000000000000000000000 --- a/1003-bpftrace-anolis-tests-fix-semantic_analyser.type_ctx-failed-on-aarch64.patch +++ /dev/null @@ -1,52 +0,0 @@ -From 3ed572dd5564ae043331862a3afc4c1e3843c1db Mon Sep 17 00:00:00 2001 -From: Chunmei Xu -Date: Thu, 24 Dec 2020 09:48:14 +0800 -Subject: [PATCH] tests: fix semantic_analyser.type_ctx failed on aarch64 - -char is default to signed on x86_64, but default to unsigned on aarch64, -powerpc and s390. - -Signed-off-by: Chunmei Xu ---- - tests/semantic_analyser.cpp | 14 ++++++++++---- - 1 file changed, 10 insertions(+), 4 deletions(-) - -diff --git a/tests/semantic_analyser.cpp b/tests/semantic_analyser.cpp -index 8ea7028..a7612b6 100644 ---- a/tests/semantic_analyser.cpp -+++ b/tests/semantic_analyser.cpp -@@ -1646,11 +1646,17 @@ TEST(semantic_analyser, type_ctx) - var = static_cast(unop->expr); - EXPECT_EQ(SizedType(Type::ctx, 8, false), var->type); - -+#if ARCH_X86_64 -+ auto chartype = CreateInt8(); -+#else -+ auto chartype = CreateUInt8(); -+#endif -+ - // $c = $x->c.c; - assignment = static_cast(stmts->at(3)); -- EXPECT_EQ(CreateInt8(), assignment->var->type); -+ EXPECT_EQ(chartype, assignment->var->type); - fieldaccess = static_cast(assignment->expr); -- EXPECT_EQ(CreateInt8(), fieldaccess->type); -+ EXPECT_EQ(chartype, fieldaccess->type); - fieldaccess = static_cast(fieldaccess->expr); - EXPECT_EQ(SizedType(Type::ctx, 1, false), fieldaccess->type); - unop = static_cast(fieldaccess->expr); -@@ -1660,9 +1666,9 @@ TEST(semantic_analyser, type_ctx) - - // $d = $x->d->c; - assignment = static_cast(stmts->at(4)); -- EXPECT_EQ(CreateInt8(), assignment->var->type); -+ EXPECT_EQ(chartype, assignment->var->type); - fieldaccess = static_cast(assignment->expr); -- EXPECT_EQ(CreateInt8(), fieldaccess->type); -+ EXPECT_EQ(chartype, fieldaccess->type); - unop = static_cast(fieldaccess->expr); - EXPECT_EQ(CreateCast(8), unop->type); - fieldaccess = static_cast(unop->expr); --- -2.18.1 - diff --git a/1004-bpftrace-anolis-tests-childproc-resume-SIGHUP-to-SIG_DFL-before-test.patch b/1004-bpftrace-anolis-tests-childproc-resume-SIGHUP-to-SIG_DFL-before-test.patch deleted file mode 100644 index 6dd9f36f95892852d3a6e6379becb3d95395066c..0000000000000000000000000000000000000000 --- a/1004-bpftrace-anolis-tests-childproc-resume-SIGHUP-to-SIG_DFL-before-test.patch +++ /dev/null @@ -1,28 +0,0 @@ -From 9458ab3415cd4c7d2476da71def2314da96b6ba8 Mon Sep 17 00:00:00 2001 -From: Chunmei Xu -Date: Wed, 6 Jan 2021 12:38:57 +0800 -Subject: [PATCH] tests/childproc: resume SIGHUP to SIG_DFL before test - -since SIGHUP could be set SIG_IGN in parent process, -test will get failed, so resume SIGHUP before test. - -Signed-off-by: Chunmei Xu ---- - tests/child.cpp | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/tests/child.cpp b/tests/child.cpp -index adab527..8dedca0 100644 ---- a/tests/child.cpp -+++ b/tests/child.cpp -@@ -110,6 +110,7 @@ TEST(childproc, destructor_destroy_child) - - TEST(childproc, child_kill_before_exec) - { -+ signal(SIGHUP, SIG_DFL); - auto child = getChild(TEST_BIN_SLOW); - - EXPECT_EQ(kill(child->pid(), SIGHUP), 0); --- -2.19.1.6.gb485710b - diff --git a/bpftrace-0.11.2-Fix-clear-when-called-on-an-array.patch b/bpftrace-0.11.2-Fix-clear-when-called-on-an-array.patch deleted file mode 100644 index 491f7c1f8ef8e36a153060ec1e3eb4b50cfff99a..0000000000000000000000000000000000000000 --- a/bpftrace-0.11.2-Fix-clear-when-called-on-an-array.patch +++ /dev/null @@ -1,49 +0,0 @@ -From ed9caea4efcffdd9f37c67b272324a87abfd20c8 Mon Sep 17 00:00:00 2001 -From: Jerome Marchand -Date: Thu, 5 Nov 2020 15:17:14 +0100 -Subject: [PATCH] Fix clear() when called on an array - -Fixes the following error: -Error looking up elem: -1 -terminate called after throwing an instance of 'std::runtime_error' - what(): Could not clear map with ident "@", err=-1 -Aborted (core dumped) ---- - src/bpftrace.cpp | 5 +++++ - src/imap.h | 4 ++++ - 2 files changed, 9 insertions(+) - -diff --git a/src/bpftrace.cpp b/src/bpftrace.cpp -index 23b65a5..fe2fb66 100644 ---- a/src/bpftrace.cpp -+++ b/src/bpftrace.cpp -@@ -1147,6 +1147,11 @@ int BPFtrace::print_maps() - int BPFtrace::clear_map(IMap &map) - { - std::vector old_key; -+ if (map.is_array_type()) -+ { -+ return zero_map(map); -+ } -+ - try - { - if (map.type_.IsHistTy() || map.type_.IsLhistTy() || -diff --git a/src/imap.h b/src/imap.h -index 27d0d74..ca9f424 100644 ---- a/src/imap.h -+++ b/src/imap.h -@@ -27,6 +27,10 @@ class IMap - return map_type_ == BPF_MAP_TYPE_PERCPU_HASH || - map_type_ == BPF_MAP_TYPE_PERCPU_ARRAY; - } -+ bool is_array_type() -+ { -+ return map_type_ == BPF_MAP_TYPE_PERCPU_ARRAY; -+ } - - // unique id of this map. Used by (bpf) runtime to reference - // this map --- -2.25.4 - diff --git a/bpftrace-0.11.2.tar.gz b/bpftrace-0.11.2.tar.gz deleted file mode 100644 index 7e0eef7aecae2090c356f433161c502327c5f5d5..0000000000000000000000000000000000000000 Binary files a/bpftrace-0.11.2.tar.gz and /dev/null differ diff --git a/bpftrace-0.11.2-RHEL-8-aarch64-fixes-statsnoop-and-opensnoop.patch b/bpftrace-0.12.1-RHEL-8-aarch64-fixes-statsnoop-and-opensnoop.patch old mode 100644 new mode 100755 similarity index 92% rename from bpftrace-0.11.2-RHEL-8-aarch64-fixes-statsnoop-and-opensnoop.patch rename to bpftrace-0.12.1-RHEL-8-aarch64-fixes-statsnoop-and-opensnoop.patch index 3c1599fb8e37259d77d453b13e041b3a9e0c11b6..54ed64a63f3cedd34a85c1d044dbc57adcf9b477 --- a/bpftrace-0.11.2-RHEL-8-aarch64-fixes-statsnoop-and-opensnoop.patch +++ b/bpftrace-0.12.1-RHEL-8-aarch64-fixes-statsnoop-and-opensnoop.patch @@ -1,4 +1,4 @@ -From e9ebda9b3d14831df5e1c5174d21f322e084d074 Mon Sep 17 00:00:00 2001 +From 69f6d7ff04f43451eea2fb028a84a76331bbf6ea Mon Sep 17 00:00:00 2001 From: Jerome Marchand Date: Thu, 11 Jun 2020 14:56:36 +0200 Subject: [PATCH] RHEL-8: aarch64: fixes statsnoop and opensnoop @@ -18,7 +18,7 @@ patches. 2 files changed, 2 insertions(+), 8 deletions(-) diff --git a/tools/opensnoop.bt b/tools/opensnoop.bt -index a7de802..d99db93 100755 +index a7de8026..d99db93e 100755 --- a/tools/opensnoop.bt +++ b/tools/opensnoop.bt @@ -21,13 +21,11 @@ BEGIN @@ -36,7 +36,7 @@ index a7de802..d99db93 100755 /@filename[tid]/ { diff --git a/tools/statsnoop.bt b/tools/statsnoop.bt -index b2d529e..f612ea9 100755 +index b2d529e2..f612ea94 100755 --- a/tools/statsnoop.bt +++ b/tools/statsnoop.bt @@ -30,17 +30,13 @@ tracepoint:syscalls:sys_enter_statfs @@ -60,5 +60,5 @@ index b2d529e..f612ea9 100755 { $ret = args->ret; -- -2.25.4 +2.30.2 diff --git a/bpftrace-0.11.2-RHEL-8-fixes.patch b/bpftrace-0.12.1-RHEL-8-fixes.patch old mode 100644 new mode 100755 similarity index 83% rename from bpftrace-0.11.2-RHEL-8-fixes.patch rename to bpftrace-0.12.1-RHEL-8-fixes.patch index df3586e58b8e74b63923edcf76c036139cecd4fa..270277bab4eb84602e4eee972dd96e6767497794 --- a/bpftrace-0.11.2-RHEL-8-fixes.patch +++ b/bpftrace-0.12.1-RHEL-8-fixes.patch @@ -1,4 +1,4 @@ -From 30cd8a899ec375ca0e46db51fa48ee80c5463470 Mon Sep 17 00:00:00 2001 +From 3a7f0bf4f506014644cf935332346e3c227123c9 Mon Sep 17 00:00:00 2001 From: Jerome Marchand Date: Tue, 11 Jun 2019 16:41:59 +0200 Subject: [PATCH] RHEL 8 fixes @@ -11,7 +11,7 @@ Fixes the following RHEL 8 specific issues: 2 files changed, 7 insertions(+), 7 deletions(-) diff --git a/tools/gethostlatency.bt b/tools/gethostlatency.bt -index a1ac1b2..ade1005 100755 +index 9f4ec31e..dd389c6f 100755 --- a/tools/gethostlatency.bt +++ b/tools/gethostlatency.bt @@ -26,17 +26,17 @@ BEGIN @@ -37,9 +37,9 @@ index a1ac1b2..ade1005 100755 +uretprobe:/lib64/libc.so.6:gethostbyname2 /@start[tid]/ { - $latms = (nsecs - @start[tid]) / 1000000; + $latms = (nsecs - @start[tid]) / 1e6; diff --git a/tools/threadsnoop.bt b/tools/threadsnoop.bt -index e4d3875..c56b1ac 100755 +index 3824bc6d..bdc6e4df 100755 --- a/tools/threadsnoop.bt +++ b/tools/threadsnoop.bt @@ -18,7 +18,7 @@ BEGIN @@ -47,10 +47,10 @@ index e4d3875..c56b1ac 100755 } -uprobe:/lib/x86_64-linux-gnu/libpthread.so.0:pthread_create -+uprobe:/usr/lib64/libpthread.so:pthread_create ++uprobe:/usr/lib64/libpthread.so.0:pthread_create { - printf("%-10u %-6d %-16s %s\n", elapsed / 1000000, pid, comm, + printf("%-10u %-6d %-16s %s\n", elapsed / 1e6, pid, comm, usym(arg2)); -- -2.25.4 +2.30.2 diff --git a/bpftrace-0.12.1.tar.gz b/bpftrace-0.12.1.tar.gz new file mode 100755 index 0000000000000000000000000000000000000000..a485ddde16221a91c45b3467bc789204183842de Binary files /dev/null and b/bpftrace-0.12.1.tar.gz differ diff --git a/bpftrace.spec b/bpftrace.spec old mode 100644 new mode 100755 index 2ab54abbd070508357165fbac08dc2d0be1c8410..cafc44aea23338b9c53ad8ad773d9deda2da8046 --- a/bpftrace.spec +++ b/bpftrace.spec @@ -1,25 +1,18 @@ -%define anolis_release .0.1 %bcond_without llvm_static Name: bpftrace -Version: 0.11.2 -Release: 1%{anolis_release}%{?dist} +Version: 0.12.1 +Release: 3%{?dist} Summary: High-level tracing language for Linux eBPF License: ASL 2.0 URL: https://github.com/iovisor/bpftrace Source0: %{url}/archive/v%{version}/%{name}-%{version}.tar.gz Patch0: %{name}-%{version}-RHEL-8-fixes.patch -Patch1: %{name}-%{version}-Fix-clear-when-called-on-an-array.patch # WARNING: because of the arch-specific patch, no autosetup is used # Remember to patch accordingly Patch10: %{name}-%{version}-RHEL-8-aarch64-fixes-statsnoop-and-opensnoop.patch -Patch1001: 1001-bpftrace-anolis-fix-build-failed-on-aarch64.patch -Patch1002: 1002-bpftrace-anolis-tests-Add-architecture-specific-testcase-support.patch -Patch1003: 1003-bpftrace-anolis-tests-fix-semantic_analyser.type_ctx-failed-on-aarch64.patch -Patch1004: 1004-bpftrace-anolis-tests-childproc-resume-SIGHUP-to-SIG_DFL-before-test.patch - # Arches will be included as upstream support is added and dependencies are # satisfied in the respective arches ExclusiveArch: x86_64 %{power64} aarch64 s390x @@ -41,6 +34,9 @@ BuildRequires: binutils-devel BuildRequires: llvm-static %endif +# We don't need kernel-devel to use bpftrace, but some tools need it +Recommends: kernel-devel + %description BPFtrace is a high-level tracing language for Linux enhanced Berkeley Packet Filter (eBPF) available in recent Linux kernels (4.x). BPFtrace uses LLVM as a @@ -55,23 +51,16 @@ and predecessor tracers such as DTrace and SystemTap %setup %patch0 -p1 -%patch1 -p1 %ifarch aarch64 %patch10 -p1 %endif -%patch1001 -p1 -%patch1002 -p1 -%patch1003 -p1 -%patch1004 -p1 - %build %cmake . \ -DCMAKE_BUILD_TYPE=RelWithDebInfo \ -DBUILD_TESTING:BOOL=OFF \ - -DBUILD_SHARED_LIBS:BOOL=OFF \ - -DLIBBCC_LIBRARIES:PATH=%{_libdir}/libbcc-no-libbpf.so + -DBUILD_SHARED_LIBS:BOOL=OFF %make_build @@ -88,11 +77,6 @@ and predecessor tracers such as DTrace and SystemTap find %{buildroot}%{_datadir}/%{name}/tools -type f -exec \ sed -i -e '1s=^#!/usr/bin/env %{name}\([0-9.]\+\)\?$=#!%{_bindir}/%{name}=' {} \; -# Move man pages to the right location -#mkdir -p %{buildroot}%{_mandir} -#mv %{buildroot}%{_prefix}/man/* %{buildroot}%{_mandir}/ - - %files %doc README.md CONTRIBUTING-TOOLS.md %doc docs/reference_guide.md docs/tutorial_one_liners.md @@ -112,14 +96,14 @@ find %{buildroot}%{_datadir}/%{name}/tools -type f -exec \ %endif %changelog -* Mon Nov 22 2021 Chunmei Xu - 0.11.2-1.0.1 -- fix build failed on aarch64 -- tests: Add architecture specific testcase support -- tests: fix semantic_analyser.type_ctx failed on aarch64 -- tests/childproc: resume SIGHUP to SIG_DFL before test - -* Mon Nov 22 2021 Chunmei Xu - 0.11.2-1 -- update to bpftrace 0.11.2 +* Thu Jun 24 2021 Jerome Marchand - 0.12.1-3 +- Have threadsnoop points to libpthread.so.0 + +* Wed Jun 09 2021 Jerome Marchand - 0.12.1-2 +- Rebuild on LLVM12 + +* Fri Apr 30 2021 Jerome Marchand - 0.12.1-1 +- Rebase on bpftrace 0.12.1 * Thu Jan 28 2021 Jerome Marchand - 0.11.1-3 - Add missing libbpf and binutils-dev dependencies