diff options
author | 2015-11-16 12:10:06 +0000 | |
---|---|---|
committer | 2015-11-18 17:51:03 -0300 | |
commit | 5dbd16c0c9d17ab1ab2226a5926482c26c0287ed (patch) | |
tree | c1e2a394a24fae044594c6f7131ae7162e0fb548 /tools/perf/tests/task-exit.c | |
parent | perf bpf: Allow BPF program attach to uprobe events (diff) | |
download | linux-rng-5dbd16c0c9d17ab1ab2226a5926482c26c0287ed.tar.xz linux-rng-5dbd16c0c9d17ab1ab2226a5926482c26c0287ed.zip |
perf bpf: Allow attaching BPF programs to modules symbols
By extending the syntax of BPF object section names, this patch allows
users to attach BPF programs to symbols in modules. For example:
SEC("module=i915;"
"parse_cmds=i915_parse_cmds")
int parse_cmds(void *ctx)
{
return 1;
}
The implementation is very simple: like what 'perf probe' does, for module,
fill 'uprobe' field in 'struct perf_probe_event'. Other parts will be done
automatically.
Signed-off-by: Wang Nan <wangnan0@huawei.com>
Cc: Alexei Starovoitov <ast@kernel.org>
Cc: Brendan Gregg <brendan.d.gregg@gmail.com>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Cc: David Ahern <dsahern@gmail.com>
Cc: He Kuang <hekuang@huawei.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Kaixu Xia <xiakaixu@huawei.com>
Cc: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
Cc: Zefan Li <lizefan@huawei.com>
Cc: pi3orama@163.com
Link: http://lkml.kernel.org/r/1447675815-166222-5-git-send-email-wangnan0@huawei.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Diffstat (limited to 'tools/perf/tests/task-exit.c')
0 files changed, 0 insertions, 0 deletions