diff options
author | 2019-07-15 16:58:23 -0300 | |
---|---|---|
committer | 2019-07-29 18:34:41 -0300 | |
commit | c8c805707ed4c5d976210821da3242af8610a533 (patch) | |
tree | cd9cac3a3125d9742dbb19860d338298d9847bc3 /tools/perf/util/scripting-engines/trace-event-python.c | |
parent | perf evsel: Store backpointer to attached bpf_object (diff) | |
download | wireguard-linux-c8c805707ed4c5d976210821da3242af8610a533.tar.xz wireguard-linux-c8c805707ed4c5d976210821da3242af8610a533.zip |
perf trace: Add pointer to BPF object containing __augmented_syscalls__
So that we can use it when looking for other components of that object
file, such as other programs to add to the BPF_MAP_TYPE_PROG_ARRAY and
use with bpf_tail_call().
Cc: Adrian Hunter <adrian.hunter@intel.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Luis Cláudio Gonçalves <lclaudio@redhat.com>
Cc: Namhyung Kim <namhyung@kernel.org>
Link: https://lkml.kernel.org/n/tip-1ibmz7ouv6llqxajy7m8igtd@git.kernel.org
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions