kernel_optimize_test/tools/perf/examples/bpf
Arnaldo Carvalho de Melo 6ff8fff456 perf trace: Allow specifying the bpf prog to augment specific syscalls
This is a step in the direction of being able to use a
BPF_MAP_TYPE_PROG_ARRAY to handle syscalls that need to copy pointer
payloads in addition to the raw tracepoint syscall args.

There is a first example in
tools/perf/examples/bpf/augmented_raw_syscalls.c for the 'open' syscall.

Next step is to introduce the prog array map and use this 'open'
augmenter, then use that augmenter in other syscalls that also only copy
the first arg as a string, and then show how to use with a syscall that
reads more than one filename, like 'rename', etc.

Cc: Adrian Hunter <adrian.hunter@intel.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Luis Cláudio Gonçalves <lclaudio@redhat.com>
Cc: Namhyung Kim <namhyung@kernel.org>
Link: https://lkml.kernel.org/n/tip-pys4v57x5qqrybb4cery2mc8@git.kernel.org
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2019-07-29 18:34:41 -03:00
..
5sec.c perf bpf: Add probe() helper to reduce kprobes boilerplate 2018-05-15 14:31:24 -03:00
augmented_raw_syscalls.c perf trace: Allow specifying the bpf prog to augment specific syscalls 2019-07-29 18:34:41 -03:00
augmented_syscalls.c perf augmented_syscalls: Convert to bpf_map() 2019-01-25 15:12:11 +01:00
empty.c perf bpf: Add license(NAME) helper 2018-05-15 14:31:24 -03:00
etcsnoop.c perf bpf examples: Convert etcsnoop to use bpf_map() 2019-01-25 15:12:11 +01:00
hello.c perf bpf: Add bpf/stdio.h wrapper to bpf_perf_event_output function 2018-08-08 15:55:55 -03:00
sys_enter_openat.c perf bpf: Add 'syscall_enter' probe helper for syscall enter tracepoints 2018-08-08 15:55:44 -03:00