diff options
author | Ilya Leoshkevich <iii@linux.ibm.com> | 2024-07-02 01:40:24 +0200 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2024-07-02 18:31:52 +0200 |
commit | 4d3a453b434fd2f389960890ae6d767f8d50c403 (patch) | |
tree | 05ca7c02eff3e01621d9602e74f425ceb0e4cb7f /tools/perf/scripts/python/exported-sql-viewer.py | |
parent | a1c04bcc41f9638460a9c68f894fb770596380de (diff) |
s390/bpf: Support BPF_PROBE_MEM32
BPF_PROBE_MEM32 is a new mode for LDX, ST and STX instructions. The JIT
is supposed to add the start address of the kernel arena mapping to the
%dst register, and use a probing variant of the respective memory
access.
Reuse the existing probing infrastructure for that. Put the arena
address into the literal pool, load it into %r1 and use that as an
index register. Do not clear any registers in ex_handler_bpf() for
failing ST and STX instructions.
Signed-off-by: Ilya Leoshkevich <iii@linux.ibm.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Link: https://lore.kernel.org/bpf/20240701234304.14336-7-iii@linux.ibm.com
Diffstat (limited to 'tools/perf/scripts/python/exported-sql-viewer.py')
0 files changed, 0 insertions, 0 deletions