lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <ABB76EC1-01B7-4B4C-81DC-6C7155D512D8@fb.com> Date: Wed, 27 Feb 2019 17:42:14 +0000 From: Song Liu <songliubraving@...com> To: Jiri Olsa <jolsa@...hat.com> CC: Netdev <netdev@...r.kernel.org>, linux-kernel <linux-kernel@...r.kernel.org>, "ast@...nel.org" <ast@...nel.org>, "daniel@...earbox.net" <daniel@...earbox.net>, Kernel Team <Kernel-team@...com>, "peterz@...radead.org" <peterz@...radead.org>, "acme@...hat.com" <acme@...hat.com>, "jolsa@...nel.org" <jolsa@...nel.org>, "namhyung@...nel.org" <namhyung@...nel.org> Subject: Re: [PATCH v4 perf,bpf 15/15] perf, bpf: save information about short living bpf programs > On Feb 27, 2019, at 5:21 AM, Jiri Olsa <jolsa@...hat.com> wrote: > > On Mon, Feb 25, 2019 at 04:20:19PM -0800, Song Liu wrote: > > SNIP > >> + btf_id = info_linear->info.btf_id; >> + >> + info_node = malloc(sizeof(struct bpf_prog_info_node)); >> + if (info_node) { >> + info_node->info_linear = info_linear; >> + perf_env__insert_bpf_prog_info(env, info_node); Getting bpf_prog_info here. >> + } else >> + free(info_linear); >> + >> + if (btf_id == 0) >> + goto out; >> + >> + if (btf__get_from_id(btf_id, &btf)) { >> + pr_debug("%s: failed to get BTF of id %u, aborting\n", >> + __func__, btf_id); >> + goto out; >> + } >> + perf_env__fetch_btf(env, btf_id, btf); > > so is this the main reason we are doing this? getting the btf > data for bpf prog ids and store them? We are getting both bpf_prog_info (see above) and btf. > > please describe the whole bpf events/features data flow in > changelog as I asked in previous email I will add more details to the change log. Thanks, Song > > thanks, > jirka
Powered by blists - more mailing lists