diff options
author | Ilya Leoshkevich <[email protected]> | 2024-07-02 01:40:24 +0200 |
---|---|---|
committer | Daniel Borkmann <[email protected]> | 2024-07-02 18:31:52 +0200 |
commit | 4d3a453b434fd2f389960890ae6d767f8d50c403 (patch) | |
tree | 05ca7c02eff3e01621d9602e74f425ceb0e4cb7f /tools/perf/scripts/python/syscall-counts.py | |
parent | a1c04bcc41f9638460a9c68f894fb770596380de (diff) |
s390/bpf: Support BPF_PROBE_MEM32
BPF_PROBE_MEM32 is a new mode for LDX, ST and STX instructions. The JIT
is supposed to add the start address of the kernel arena mapping to the
%dst register, and use a probing variant of the respective memory
access.
Reuse the existing probing infrastructure for that. Put the arena
address into the literal pool, load it into %r1 and use that as an
index register. Do not clear any registers in ex_handler_bpf() for
failing ST and STX instructions.
Signed-off-by: Ilya Leoshkevich <[email protected]>
Signed-off-by: Daniel Borkmann <[email protected]>
Link: https://lore.kernel.org/bpf/[email protected]
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts.py')
0 files changed, 0 insertions, 0 deletions