Searched hist:"815581 c11cc29f74af252b6306ea1ec94160231a" (Results 1 – 2 of 2) sorted by relevance
/linux/kernel/bpf/ |
H A D | syscall.c | diff 815581c11cc29f74af252b6306ea1ec94160231a Thu May 24 08:56:52 CEST 2018 Sandipan Das <sandipan@linux.vnet.ibm.com> bpf: get JITed image lengths of functions via syscall
This adds new two new fields to struct bpf_prog_info. For multi-function programs, these fields can be used to pass a list of the JITed image lengths of each function for a given program to userspace using the bpf system call with the BPF_OBJ_GET_INFO_BY_FD command.
This can be used by userspace applications like bpftool to split up the contiguous JITed dump, also obtained via the system call, into more relatable chunks corresponding to each function.
Signed-off-by: Sandipan Das <sandipan@linux.vnet.ibm.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
|
/linux/include/uapi/linux/ |
H A D | bpf.h | diff 815581c11cc29f74af252b6306ea1ec94160231a Thu May 24 08:56:52 CEST 2018 Sandipan Das <sandipan@linux.vnet.ibm.com> bpf: get JITed image lengths of functions via syscall
This adds new two new fields to struct bpf_prog_info. For multi-function programs, these fields can be used to pass a list of the JITed image lengths of each function for a given program to userspace using the bpf system call with the BPF_OBJ_GET_INFO_BY_FD command.
This can be used by userspace applications like bpftool to split up the contiguous JITed dump, also obtained via the system call, into more relatable chunks corresponding to each function.
Signed-off-by: Sandipan Das <sandipan@linux.vnet.ibm.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
|