Searched refs:__augmented_syscalls__ (Results 1 - 2 of 2) sorted by relevance
/linux-master/tools/perf/util/bpf_skel/ |
H A D | augmented_raw_syscalls.bpf.c | 26 struct __augmented_syscalls__ { struct 31 } __augmented_syscalls__ SEC(".maps"); 136 return bpf_perf_event_output(ctx, &__augmented_syscalls__, BPF_F_CURRENT_CPU, args, len);
|
/linux-master/tools/perf/ |
H A D | builtin-trace.c | 3915 * Set up the __augmented_syscalls__ BPF map to hold for each 3919 bpf_map__update_elem(trace->skel->maps.__augmented_syscalls__, 4669 int err = parse_event(evlist, "bpf-output/no-inherit=1,name=__augmented_syscalls__/"); 4672 pr_debug("ERROR: failed to create the \"__augmented_syscalls__\" bpf-output event\n"); 4838 * __augmented_syscalls__ code, if it is in the mix, say, via 4905 assert(!strcmp(evsel__name(trace.syscalls.events.bpf_output), "__augmented_syscalls__")); 4951 * __augmented_syscalls__ BPF map with what is in the 4976 * Augmented is __augmented_syscalls__ BPF_OUTPUT event
|
Completed in 303 milliseconds