From c69f8205e422b33c055c02f82b3ffa927b1322d7 Mon Sep 17 00:00:00 2001 From: zhangzihengya Date: Fri, 22 Dec 2023 16:54:51 +0800 Subject: [PATCH] md detail --- .../CPU_Subsystem/eBPF_proc_image/proc_image.c | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/eBPF_Supermarket/CPU_Subsystem/eBPF_proc_image/proc_image.c b/eBPF_Supermarket/CPU_Subsystem/eBPF_proc_image/proc_image.c index cd9bc28c4..ca9a1d02f 100644 --- a/eBPF_Supermarket/CPU_Subsystem/eBPF_proc_image/proc_image.c +++ b/eBPF_Supermarket/CPU_Subsystem/eBPF_proc_image/proc_image.c @@ -440,12 +440,12 @@ static void sig_handler(int signo) int main(int argc, char **argv) { - struct resource_image_bpf *resource_skel; - struct syscall_image_bpf *syscall_skel; + struct resource_image_bpf *resource_skel = NULL; + struct syscall_image_bpf *syscall_skel = NULL; struct ring_buffer *syscall_rb = NULL; - struct lock_image_bpf *lock_skel; + struct lock_image_bpf *lock_skel = NULL; struct ring_buffer *lock_rb = NULL; - struct keytime_image_bpf *keytime_skel; + struct keytime_image_bpf *keytime_skel = NULL; struct ring_buffer *keytime_rb = NULL; pthread_t thread_enable; int err; @@ -489,7 +489,6 @@ int main(int argc, char **argv) } - if(env.enable_syscall){ syscall_skel = syscall_image_bpf__open(); if(!syscall_skel) {