aboutsummaryrefslogtreecommitdiffstats
path: root/tools/perf/scripts/python/syscall-counts-by-pid.py
diff options
context:
space:
mode:
authorIan Rogers <[email protected]>2025-03-19 05:07:34 +0000
committerNamhyung Kim <[email protected]>2025-03-21 05:58:05 +0000
commit70351029b55677ebfe5af60477a79f68724ff72f (patch)
tree25e4eee453c17bdd46fd6a3e393a2d5692c1b080 /tools/perf/scripts/python/syscall-counts-by-pid.py
parentperf dso: Add support for reading the e_machine type for a dso (diff)
downloadkernel-70351029b55677ebfe5af60477a79f68724ff72f.tar.gz
kernel-70351029b55677ebfe5af60477a79f68724ff72f.zip
perf thread: Add support for reading the e_machine type for a thread
First try to read the e_machine from the dsos associated with the thread's maps. If live use the executable from /proc/pid/exe and read the e_machine from the ELF header. On failure use EM_HOST. Change builtin-trace syscall functions to pass e_machine from the thread rather than EM_HOST, so that in later patches when syscalltbl can use the e_machine the system calls are specific to the architecture. Signed-off-by: Ian Rogers <[email protected]> Reviewed-by: Namhyung Kim <[email protected]> Acked-by: Arnaldo Carvalho de Melo <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Namhyung Kim <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts-by-pid.py')
0 files changed, 0 insertions, 0 deletions