Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752282AbbKWQHn (ORCPT ); Mon, 23 Nov 2015 11:07:43 -0500 Received: from terminus.zytor.com ([198.137.202.10]:43748 "EHLO terminus.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751841AbbKWQHk (ORCPT ); Mon, 23 Nov 2015 11:07:40 -0500 Date: Mon, 23 Nov 2015 08:06:36 -0800 From: tip-bot for Wang Nan Message-ID: Cc: wangnan0@huawei.com, linux-kernel@vger.kernel.org, xiakaixu@huawei.com, jolsa@kernel.org, brendan.d.gregg@gmail.com, a.p.zijlstra@chello.nl, dsahern@gmail.com, hekuang@huawei.com, namhyung@kernel.org, acme@redhat.com, ast@kernel.org, daniel@iogearbox.net, mingo@kernel.org, hpa@zytor.com, masami.hiramatsu.pt@hitachi.com, lizefan@huawei.com, tglx@linutronix.de Reply-To: linux-kernel@vger.kernel.org, xiakaixu@huawei.com, wangnan0@huawei.com, hekuang@huawei.com, jolsa@kernel.org, brendan.d.gregg@gmail.com, a.p.zijlstra@chello.nl, dsahern@gmail.com, namhyung@kernel.org, ast@kernel.org, acme@redhat.com, daniel@iogearbox.net, mingo@kernel.org, masami.hiramatsu.pt@hitachi.com, hpa@zytor.com, lizefan@huawei.com, tglx@linutronix.de In-Reply-To: <1447675815-166222-5-git-send-email-wangnan0@huawei.com> References: <1447675815-166222-5-git-send-email-wangnan0@huawei.com> To: linux-tip-commits@vger.kernel.org Subject: [tip:perf/core] perf bpf: Allow attaching BPF programs to modules symbols Git-Commit-ID: 5dbd16c0c9d17ab1ab2226a5926482c26c0287ed X-Mailer: tip-git-log-daemon Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8 Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2544 Lines: 81 Commit-ID: 5dbd16c0c9d17ab1ab2226a5926482c26c0287ed Gitweb: http://git.kernel.org/tip/5dbd16c0c9d17ab1ab2226a5926482c26c0287ed Author: Wang Nan AuthorDate: Mon, 16 Nov 2015 12:10:06 +0000 Committer: Arnaldo Carvalho de Melo CommitDate: Wed, 18 Nov 2015 17:51:03 -0300 perf bpf: Allow attaching BPF programs to modules symbols By extending the syntax of BPF object section names, this patch allows users to attach BPF programs to symbols in modules. For example: SEC("module=i915;" "parse_cmds=i915_parse_cmds") int parse_cmds(void *ctx) { return 1; } The implementation is very simple: like what 'perf probe' does, for module, fill 'uprobe' field in 'struct perf_probe_event'. Other parts will be done automatically. Signed-off-by: Wang Nan Cc: Alexei Starovoitov Cc: Brendan Gregg Cc: Daniel Borkmann Cc: David Ahern Cc: He Kuang Cc: Jiri Olsa Cc: Kaixu Xia Cc: Masami Hiramatsu Cc: Namhyung Kim Cc: Peter Zijlstra Cc: Zefan Li Cc: pi3orama@163.com Link: http://lkml.kernel.org/r/1447675815-166222-5-git-send-email-wangnan0@huawei.com Signed-off-by: Arnaldo Carvalho de Melo --- tools/perf/util/bpf-loader.c | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/tools/perf/util/bpf-loader.c b/tools/perf/util/bpf-loader.c index 84169d6..d0f02ed 100644 --- a/tools/perf/util/bpf-loader.c +++ b/tools/perf/util/bpf-loader.c @@ -119,6 +119,16 @@ config__exec(const char *value, struct perf_probe_event *pev) return 0; } +static int +config__module(const char *value, struct perf_probe_event *pev) +{ + pev->uprobes = false; + pev->target = strdup(value); + if (!pev->target) + return -ENOMEM; + return 0; +} + static struct { const char *key; const char *usage; @@ -131,6 +141,12 @@ static struct { .desc = "Set uprobe target", .func = config__exec, }, + { + .key = "module", + .usage = "module= ", + .desc = "Set kprobe module", + .func = config__module, + } }; static int -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/