Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp68075imm; Wed, 5 Sep 2018 15:07:54 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZWsAuhHIYTcjBKb5z9Xf0Z9TTl08HVPJUL2vevf52qc7TeD1/tN4SkiCBk2SSel2HfhmKb X-Received: by 2002:a17:902:29e3:: with SMTP id h90-v6mr41074565plb.215.1536185274121; Wed, 05 Sep 2018 15:07:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536185274; cv=none; d=google.com; s=arc-20160816; b=lD4VezImg6WPwEA9P0z/7WK0qab3Q8+bmJASGZdNFblPeG7uNtapo/PbPMszfVQsNW vFrwreDE8JUjZYGSqZNrBrXDz8tsrn/L+FLsnoW9X9/d/ggieyUluGfcMT+Hcci2vJ/2 J1nKIz7QxrZAgV7c9N6Szxz9cSZRfmMIiwtTIvJH7ybuIVnRnRbhP+6+zpFWQRZzg6S7 Qd41+4VrfAHaQsgQcHQuP5eAnDjlBqvY+YaPXMEn++oteNMesK/jU2q9uRrJnLzS6eVE rwIhO75CUHJstOFs/Xs5DXPTRJH9lUzzUQkS4QCRp+ENOGBMRvpDCozsha5b3WZmcnQ0 DRBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=jMHfRs6QQHOjAci6yjEH44QvF/HJorkb1CMNZkGnJVI=; b=m7NiQ2/HXASVrne6WSxoA4eWra3JqZk/8GWz5NKV4jDo8kVPp4UJTJG9FNMNuosqfU kA4jaPJPGfbNtDYwO7y0Qn2hbl7P6XLEE4Pnptml8ycf89VXUNOLMasf1HQIlxMemBmW 8QTnlDU5NxNM2ylgAX5mmrVY97e6VSktNSbYWSnO/UUbaa8cNX5JYFhMYfjz16fBjhA/ OiMVqL5cnP3DvmCJUNnL4cwL1oQEgGsdFXWprImj8ZkiEASgRCF+Anr7HwsCloqHvU6Y 4xgputX8pmTWRySCvJzmejd2J97Gfp7a1s+tGBMYsRqQHYBQPKjr3qCljFtaw7Ka5xdX nY6A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AYCuOIwP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s32-v6si3256708pgl.531.2018.09.05.15.07.38; Wed, 05 Sep 2018 15:07:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AYCuOIwP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728366AbeIFCiB (ORCPT + 99 others); Wed, 5 Sep 2018 22:38:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:52370 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727518AbeIFCiA (ORCPT ); Wed, 5 Sep 2018 22:38:00 -0400 Received: from jouet.infradead.org (unknown [179.97.41.186]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7854F2077C; Wed, 5 Sep 2018 22:05:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1536185149; bh=wBEvWpzK8UvyCHzZg1T81+/ipiSs8CspKaSmKrAJRqg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AYCuOIwPYCj+UCdeGNyluMSHa/JkHjFtw0JTtb7ZGvclyKR4BerJm6h0d5EoE2u+H YNVoTizZUfgWkn+WpbFbbmGs7u/nPS8A9xywBVD4uk7NW2KnKNGs3R7QO9MpWMcOCg 7ZgBitiq649M8uiO4sx3ufb7J2klGn1hhEoajEhs= From: Arnaldo Carvalho de Melo To: Ingo Molnar Cc: Clark Williams , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, Arnaldo Carvalho de Melo , Adrian Hunter , David Ahern , Jiri Olsa , Namhyung Kim , Wang Nan Subject: [PATCH 21/77] perf bpf: Add syscall_exit() helper Date: Wed, 5 Sep 2018 19:03:44 -0300 Message-Id: <20180905220440.20256-22-acme@kernel.org> X-Mailer: git-send-email 2.14.4 In-Reply-To: <20180905220440.20256-1-acme@kernel.org> References: <20180905220440.20256-1-acme@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Arnaldo Carvalho de Melo So that we can hook to the syscalls:sys_exit_SYSCALL tracepoints in addition to the syscalls:sys_enter_SYSCALL we hook using the syscall_enter() helper. Cc: Adrian Hunter Cc: David Ahern Cc: Jiri Olsa Cc: Namhyung Kim Cc: Wang Nan Link: https://lkml.kernel.org/n/tip-6qh8aph1jklyvdu7w89c0izc@git.kernel.org Signed-off-by: Arnaldo Carvalho de Melo --- tools/perf/include/bpf/bpf.h | 3 +++ 1 file changed, 3 insertions(+) diff --git a/tools/perf/include/bpf/bpf.h b/tools/perf/include/bpf/bpf.h index 47897d65e799..52b6d87fe822 100644 --- a/tools/perf/include/bpf/bpf.h +++ b/tools/perf/include/bpf/bpf.h @@ -26,6 +26,9 @@ struct bpf_map { #define syscall_enter(name) \ SEC("syscalls:sys_enter_" #name) syscall_enter_ ## name +#define syscall_exit(name) \ + SEC("syscalls:sys_exit_" #name) syscall_exit_ ## name + #define license(name) \ char _license[] SEC("license") = #name; \ int _version SEC("version") = LINUX_VERSION_CODE; -- 2.14.4