[RFC PATCH v2 tip 5/7] use BPF in tracing filters

2014-02-05 Thread Alexei Starovoitov
Such filters can be written in C and allow safe read-only access to any kernel data structure. Like systemtap but with safety guaranteed by kernel. The user can do: cat bpf_program > /sys/kernel/debug/tracing/.../filter if tracing event is either static or dynamic via kprobe_events. The program c

[RFC PATCH v2 tip 5/7] use BPF in tracing filters

2014-02-05 Thread Alexei Starovoitov
Such filters can be written in C and allow safe read-only access to any kernel data structure. Like systemtap but with safety guaranteed by kernel. The user can do: cat bpf_program > /sys/kernel/debug/tracing/.../filter if tracing event is either static or dynamic via kprobe_events. The program c