From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.1 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id D1345C04AB5 for ; Thu, 6 Jun 2019 07:56:44 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id A4F1F20866 for ; Thu, 6 Jun 2019 07:56:44 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="JYJ+BH8p" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726747AbfFFH4l (ORCPT ); Thu, 6 Jun 2019 03:56:41 -0400 Received: from mail-yb1-f194.google.com ([209.85.219.194]:46458 "EHLO mail-yb1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726014AbfFFH4k (ORCPT ); Thu, 6 Jun 2019 03:56:40 -0400 Received: by mail-yb1-f194.google.com with SMTP id p8so585081ybo.13 for ; Thu, 06 Jun 2019 00:56:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id; bh=5zxl/1kwHqAI4DRUEiMT/LtSxO6kWAE0NYYYjCPxIgw=; b=JYJ+BH8ph9BynXcTk2T/3rfh/N0Ej+7xz1AMhk6isvVyWzHAuJc/sM8EEU+qAcYtvl BAxgMC7pwl1YD2LI1XPyg1yT0FesASXKl7La/mTM9ibgfsmC/hJ3YYuBUQ76nPx1cXT8 /wxcxr4b/GImAmIEFcbo/ufvJh6kqnUJJbztB6Tk5TB/n2VYGPO/fXFEJ/edIwOm6mnK hn7QrepywI0oofHP87M/f5zrj4UgwXMzpppSSCxAIu9s2tRr+IbB4g0APtILtcFMk/Ho xYMPWajy77pzC5mzpW7AXUsZQSEgWcNeMcjl3lhMNJyldTfbD9Na5CsLCdbrV7wWpM0Z gNqA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=5zxl/1kwHqAI4DRUEiMT/LtSxO6kWAE0NYYYjCPxIgw=; b=nYs6jfWozrM9Z9eMgh4JtNXMvGpgNaoyQXVdhZTd7xDjm1u0mWdqC8LSq31BbcJAI4 Kx5Zit7Oh7m7fcm0In3Z63pNF1yfqpt18j7M/CKadxCRDiLx7p0i2MJH2Ibjv3i3RNtV R3EdWAUbgVD77JI8SGQeiF/1/h+esGVtm4yscwV+rq5M4swrVmhbNonSQycY1UGM+NOE 676inHKoRZn3vZZqieE/YE1cTqz3bOKbZhDBXk3jV/s7LtySZI59Up307uwp9ujij7C8 78CiIvLB3NjiSQFuTkLSbXJdiTE0jfPNqpWfSFDg3XQ4PrQNZRI32i1oTEOCNE54wHy+ mfsQ== X-Gm-Message-State: APjAAAWAK8N2H1arEXhu6qJpji4kVygbLUUWzWJdfkzW7I5A7dcBdvyb sZsHijIf8qoFJ1JgfE47MiMJMQ== X-Google-Smtp-Source: APXvYqzdoeciY6MLysk++kMEtzU9vvDXtgdZswYM+X9azUgBXZKQokrV4uheSAdrBO38BdvIhQn58A== X-Received: by 2002:a25:19d6:: with SMTP id 205mr3559544ybz.135.1559807799726; Thu, 06 Jun 2019 00:56:39 -0700 (PDT) Received: from localhost.localdomain (li1322-146.members.linode.com. [45.79.223.146]) by smtp.gmail.com with ESMTPSA id 14sm316343yws.16.2019.06.06.00.56.31 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 06 Jun 2019 00:56:38 -0700 (PDT) From: Leo Yan To: Arnaldo Carvalho de Melo , Alexander Shishkin , Jiri Olsa , Namhyung Kim , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , Adrian Hunter , Mathieu Poirier , Mike Leach , Suzuki K Poulose , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org Cc: Leo Yan Subject: [PATCH v1 0/4] perf augmented_raw_syscalls: Support for arm64 Date: Thu, 6 Jun 2019 15:56:13 +0800 Message-Id: <20190606075617.14327-1-leo.yan@linaro.org> X-Mailer: git-send-email 2.17.1 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org When I tried to run the trace on arm64 platform with eBPF program augmented_raw_syscalls, it reports several failures for eBPF program compilation. So tried to resolve these issues and this patch set is the working result. 0001 patch lets perf command to exit directly if find eBPF program building failure. 0002 patch is minor refactoring code to remove duplicate macro. 0003 patch is to add support arm64 raw syscalls numbers. 0004 patch is to document clang configuration so that can easily use this program on both x86_64 and aarch64 platforms. Leo Yan (4): perf trace: Exit when build eBPF program failure perf augmented_raw_syscalls: Remove duplicate macros perf augmented_raw_syscalls: Support arm64 raw syscalls perf augmented_raw_syscalls: Document clang configuration tools/perf/builtin-trace.c | 8 ++ .../examples/bpf/augmented_raw_syscalls.c | 102 +++++++++++++++++- 2 files changed, 109 insertions(+), 1 deletion(-) -- 2.17.1