Home
last modified time | relevance | path

Searched hist:"815581 c11cc29f74af252b6306ea1ec94160231a" (Results 1 – 2 of 2) sorted by relevance

/linux/kernel/bpf/
H A Dsyscall.cdiff 815581c11cc29f74af252b6306ea1ec94160231a Thu May 24 08:56:52 CEST 2018 Sandipan Das <sandipan@linux.vnet.ibm.com> bpf: get JITed image lengths of functions via syscall

This adds new two new fields to struct bpf_prog_info. For
multi-function programs, these fields can be used to pass
a list of the JITed image lengths of each function for a
given program to userspace using the bpf system call with
the BPF_OBJ_GET_INFO_BY_FD command.

This can be used by userspace applications like bpftool
to split up the contiguous JITed dump, also obtained via
the system call, into more relatable chunks corresponding
to each function.

Signed-off-by: Sandipan Das <sandipan@linux.vnet.ibm.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
/linux/include/uapi/linux/
H A Dbpf.hdiff 815581c11cc29f74af252b6306ea1ec94160231a Thu May 24 08:56:52 CEST 2018 Sandipan Das <sandipan@linux.vnet.ibm.com> bpf: get JITed image lengths of functions via syscall

This adds new two new fields to struct bpf_prog_info. For
multi-function programs, these fields can be used to pass
a list of the JITed image lengths of each function for a
given program to userspace using the bpf system call with
the BPF_OBJ_GET_INFO_BY_FD command.

This can be used by userspace applications like bpftool
to split up the contiguous JITed dump, also obtained via
the system call, into more relatable chunks corresponding
to each function.

Signed-off-by: Sandipan Das <sandipan@linux.vnet.ibm.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>