diff options
author | 2019-07-16 11:27:03 -0300 | |
---|---|---|
committer | 2019-07-29 18:34:41 -0300 | |
commit | 3803a229312de539d2878f2fc5c6ee0202ce6728 (patch) | |
tree | b4ad2f5482dd6fd9d82f88d0a86e62760c6a3b02 /tools/perf/util/scripting-engines/trace-event-python.c | |
parent | perf trace: Allow specifying the bpf prog to augment specific syscalls (diff) | |
download | wireguard-linux-3803a229312de539d2878f2fc5c6ee0202ce6728.tar.xz wireguard-linux-3803a229312de539d2878f2fc5c6ee0202ce6728.zip |
perf trace: Put the per-syscall entry/exit prog_array BPF map infrastructure in place
I.e. look for "syscalls_sys_enter" and "syscalls_sys_exit" BPF maps of
type PROG_ARRAY and populate it with the handlers as specified per
syscall, for now only 'open' is wiring it to something, in time all
syscalls that need to copy arguments entering a syscall or returning
from one will set these to the right handlers, reusing when possible
pre-existing ones.
Next step is to use bpf_tail_call() into that.
Cc: Adrian Hunter <adrian.hunter@intel.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Luis Cláudio Gonçalves <lclaudio@redhat.com>
Cc: Namhyung Kim <namhyung@kernel.org>
Link: https://lkml.kernel.org/n/tip-t0p4u43i9vbpzs1xtowna3gb@git.kernel.org
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions