[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <tencent_9E0636426959DE97692A50AF79A3D9888B08@qq.com>
Date: Mon, 6 Feb 2023 19:27:57 +0800
From: Rong Tao <rtoax@...mail.com>
To: ast@...nel.org
Cc: Rong Tao <rongtao@...tc.cn>,
Daniel Borkmann <daniel@...earbox.net>,
Andrii Nakryiko <andrii@...nel.org>,
Martin KaFai Lau <martin.lau@...ux.dev>,
Song Liu <song@...nel.org>, Yonghong Song <yhs@...com>,
John Fastabend <john.fastabend@...il.com>,
KP Singh <kpsingh@...nel.org>,
Stanislav Fomichev <sdf@...gle.com>,
Hao Luo <haoluo@...gle.com>, Jiri Olsa <jolsa@...nel.org>,
bpf@...r.kernel.org (open list:BPF [GENERAL] (Safe Dynamic Programs and
Tools)), linux-kernel@...r.kernel.org (open list)
Subject: [PATCH bpf-next] samples: bpf: Add macro SYSCALL() for aarch64
From: Rong Tao <rongtao@...tc.cn>
kernel arm64/kernel/sys.c macro __SYSCALL() adds a prefix __arm64_, we
should support it for aarch64. The following is the output of the bpftrace
script:
$ sudo bpftrace -l | grep sys_write
...
kprobe:__arm64_sys_write
kprobe:__arm64_sys_writev
...
Signed-off-by: Rong Tao <rongtao@...tc.cn>
---
samples/bpf/trace_common.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/samples/bpf/trace_common.h b/samples/bpf/trace_common.h
index 8cb5400aed1f..fafc699af0a3 100644
--- a/samples/bpf/trace_common.h
+++ b/samples/bpf/trace_common.h
@@ -6,6 +6,8 @@
#define SYSCALL(SYS) "__x64_" __stringify(SYS)
#elif defined(__s390x__)
#define SYSCALL(SYS) "__s390x_" __stringify(SYS)
+#elif defined(__aarch64__)
+#define SYSCALL(SYS) "__arm64_" __stringify(SYS)
#else
#define SYSCALL(SYS) __stringify(SYS)
#endif
--
2.39.1
Powered by blists - more mailing lists