samples/bpf: syscall_tp: Aarch64 no open syscall
authorRong Tao <rongtao@cestc.cn>
Tue, 11 Jul 2023 11:14:59 +0000 (19:14 +0800)
committerAndrii Nakryiko <andrii@kernel.org>
Tue, 11 Jul 2023 17:02:42 +0000 (10:02 -0700)
__NR_open never exist on AArch64.

Signed-off-by: Rong Tao <rongtao@cestc.cn>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/tencent_C6AD4AD72BEFE813228FC188905F96C6A506@qq.com
samples/bpf/syscall_tp_kern.c

index e7121dd1ee3773004e28b4e379e9b8b30e22d015..090fecfe641a94cc213b63fc6947a4cf8e2b821c 100644 (file)
@@ -44,12 +44,14 @@ static __always_inline void count(void *map)
                bpf_map_update_elem(map, &key, &init_val, BPF_NOEXIST);
 }
 
+#if !defined(__aarch64__)
 SEC("tracepoint/syscalls/sys_enter_open")
 int trace_enter_open(struct syscalls_enter_open_args *ctx)
 {
        count(&enter_open_map);
        return 0;
 }
+#endif
 
 SEC("tracepoint/syscalls/sys_enter_openat")
 int trace_enter_open_at(struct syscalls_enter_open_args *ctx)
@@ -65,12 +67,14 @@ int trace_enter_open_at2(struct syscalls_enter_open_args *ctx)
        return 0;
 }
 
+#if !defined(__aarch64__)
 SEC("tracepoint/syscalls/sys_exit_open")
 int trace_enter_exit(struct syscalls_exit_open_args *ctx)
 {
        count(&exit_open_map);
        return 0;
 }
+#endif
 
 SEC("tracepoint/syscalls/sys_exit_openat")
 int trace_enter_exit_at(struct syscalls_exit_open_args *ctx)