From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753779AbbJ0C3Q (ORCPT ); Mon, 26 Oct 2015 22:29:16 -0400 Received: from szxga03-in.huawei.com ([119.145.14.66]:8494 "EHLO szxga03-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753244AbbJ0C3P (ORCPT ); Mon, 26 Oct 2015 22:29:15 -0400 Message-ID: <562EE139.8060500@huawei.com> Date: Tue, 27 Oct 2015 10:28:09 +0800 From: "Wangnan (F)" User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0 MIME-Version: 1.0 To: , , CC: , , , , , , , , , , , , Arnaldo Carvalho de Melo Subject: Re: [PATCH 20/31] perf tools: Allow BPF program attach to uprobe events References: <1444826502-49291-1-git-send-email-wangnan0@huawei.com> <1444826502-49291-21-git-send-email-wangnan0@huawei.com> In-Reply-To: <1444826502-49291-21-git-send-email-wangnan0@huawei.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.111.66.109] X-CFilter-Loop: Reflected X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020204.562EE149.007F,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0, ip=0.0.0.0, so=2013-05-26 15:14:31, dmn=2013-03-21 17:37:32 X-Mirapoint-Loop-Id: 7f12bdb2f32cad2b0d15cd0daf0248fa Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2015/10/14 20:41, Wang Nan wrote: > This patch appends new syntax to BPF object section name to support > probing at uprobe event. Now we can use BPF program like this: > > SEC( > "target=/lib64/libc.so.6\n" > "libcwrite=__write" > ) > int libcwrite(void *ctx) > { > return 1; > } > > Where, in section name of a program, before the main config string, > we can use 'key=value' style options. Now the only option key "target" > is for uprobe probing. > > Signed-off-by: Wang Nan > Cc: Alexei Starovoitov > Cc: Brendan Gregg > Cc: Daniel Borkmann > Cc: David Ahern > Cc: He Kuang > Cc: Jiri Olsa > Cc: Kaixu Xia > Cc: Masami Hiramatsu > Cc: Namhyung Kim > Cc: Paul Mackerras > Cc: Peter Zijlstra > Cc: Zefan Li > Cc: pi3orama@163.com > Cc: Arnaldo Carvalho de Melo > Link: http://lkml.kernel.org/n/ebpf-6yw9eg0ej3l4jnqhinngkw86@git.kernel.org > --- > tools/perf/util/bpf-loader.c | 86 ++++++++++++++++++++++++++++++++++++++++---- > 1 file changed, 80 insertions(+), 6 deletions(-) > > diff --git a/tools/perf/util/bpf-loader.c b/tools/perf/util/bpf-loader.c > index af549ea..73ff9a9 100644 > --- a/tools/perf/util/bpf-loader.c > +++ b/tools/perf/util/bpf-loader.c > @@ -111,6 +111,84 @@ bpf_prog_priv__clear(struct bpf_program *prog __maybe_unused, > } > > static int > +do_config(const char *key, const char *value, > + struct perf_probe_event *pev) > +{ > + pr_debug("config bpf program: %s=%s\n", key, value); > + if (strcmp(key, "target") == 0) { > + pev->uprobes = true; > + pev->target = strdup(value); > + return 0; > + } > + > + pr_warning("BPF: WARNING: invalid config option in object: %s=%s\n", > + key, value); > + pr_warning("\tHint: Currently only valid option is 'target='\n"); > + return 0; > +} > This part is very easy to be extended to support probing at modules. I'd like to change "target" to "exec" to make it unify with perf probe, then add another patch to support module probing in next pull request. Thank you.