perf trace augmented_syscalls: Rename augmented_*_syscall__enter to just *_syscall
authorArnaldo Carvalho de Melo <acme@redhat.com>
Thu, 30 Aug 2018 14:50:21 +0000 (11:50 -0300)
committerArnaldo Carvalho de Melo <acme@redhat.com>
Thu, 30 Aug 2018 18:52:21 +0000 (15:52 -0300)
As we'll also hook into the syscalls:sys_exit_SYSCALL for which there
are enter hooks.

This way we'll be able to iterate the ELF file for the eBPF program,
find the syscalls that have hooks and filter them out from the general
raw_syscalls:sys_{enter,exit} tracepoint for not-yet-augmented (the ones
with pointer arguments not yet being attached to the usual syscalls
tracepoint payload) and non augmentable syscalls (syscalls without
pointer arguments).

Cc: Adrian Hunter <adrian.hunter@intel.com>
Cc: David Ahern <dsahern@gmail.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Wang Nan <wangnan0@huawei.com>
Link: https://lkml.kernel.org/n/tip-cl1xyghwb1usp500354mv37h@git.kernel.org
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
tools/perf/examples/bpf/augmented_syscalls.c

index bfa28eaf27b33240e4e2f87f2bd22da0a39592a5..253b3ccbd17da44ee93553a2bca289f318809fc4 100644 (file)
@@ -32,7 +32,7 @@ struct augmented_filename {
        char    value[256];
 };
 
-#define augmented_filename_syscall_enter(syscall)                                              \
+#define augmented_filename_syscall(syscall)                                                    \
 struct augmented_enter_##syscall##_args {                                                      \
        struct syscall_enter_##syscall##_args   args;                                           \
        struct augmented_filename               filename;                                       \
@@ -60,7 +60,7 @@ struct syscall_enter_openat_args {
        long               mode;
 };
 
-augmented_filename_syscall_enter(openat);
+augmented_filename_syscall(openat);
 
 struct syscall_enter_open_args {
        unsigned long long common_tp_fields;
@@ -70,7 +70,7 @@ struct syscall_enter_open_args {
        long               mode;
 };
 
-augmented_filename_syscall_enter(open);
+augmented_filename_syscall(open);
 
 struct syscall_enter_inotify_add_watch_args {
        unsigned long long common_tp_fields;
@@ -80,7 +80,7 @@ struct syscall_enter_inotify_add_watch_args {
        long               mask;
 };
 
-augmented_filename_syscall_enter(inotify_add_watch);
+augmented_filename_syscall(inotify_add_watch);
 
 struct statbuf;
 
@@ -91,13 +91,13 @@ struct syscall_enter_newstat_args {
        struct stat        *statbuf;
 };
 
-augmented_filename_syscall_enter(newstat);
+augmented_filename_syscall(newstat);
 
 #ifndef _K_SS_MAXSIZE
 #define _K_SS_MAXSIZE 128
 #endif
 
-#define augmented_sockaddr_syscall_enter(syscall)                                              \
+#define augmented_sockaddr_syscall(syscall)                                            \
 struct augmented_enter_##syscall##_args {                                                      \
        struct syscall_enter_##syscall##_args   args;                                           \
        struct sockaddr_storage                 addr;                                           \
@@ -128,7 +128,7 @@ struct syscall_enter_bind_args {
        unsigned long      addrlen;
 };
 
-augmented_sockaddr_syscall_enter(bind);
+augmented_sockaddr_syscall(bind);
 
 struct syscall_enter_connect_args {
        unsigned long long common_tp_fields;
@@ -138,7 +138,7 @@ struct syscall_enter_connect_args {
        unsigned long      addrlen;
 };
 
-augmented_sockaddr_syscall_enter(connect);
+augmented_sockaddr_syscall(connect);
 
 struct syscall_enter_sendto_args {
        unsigned long long common_tp_fields;
@@ -151,6 +151,6 @@ struct syscall_enter_sendto_args {
        long               addr_len;
 };
 
-augmented_sockaddr_syscall_enter(sendto);
+augmented_sockaddr_syscall(sendto);
 
 license(GPL);