2019-05-29 22:18:02 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2016-04-05 00:32:20 +08:00
|
|
|
/*
|
|
|
|
* System call table mapper
|
|
|
|
*
|
|
|
|
* (C) 2016 Arnaldo Carvalho de Melo <acme@redhat.com>
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "syscalltbl.h"
|
2016-04-05 04:52:18 +08:00
|
|
|
#include <stdlib.h>
|
2017-09-23 06:11:53 +08:00
|
|
|
#include <linux/compiler.h>
|
2020-05-29 04:19:17 +08:00
|
|
|
#include <linux/zalloc.h>
|
2016-04-05 04:52:18 +08:00
|
|
|
|
2018-04-09 18:26:48 +08:00
|
|
|
#ifdef HAVE_SYSCALL_TABLE_SUPPORT
|
2016-04-05 00:32:20 +08:00
|
|
|
#include <string.h>
|
2017-08-31 22:46:49 +08:00
|
|
|
#include "string2.h"
|
2016-04-05 04:52:18 +08:00
|
|
|
|
perf tools: Build syscall table .c header from kernel's syscall_64.tbl
We used libaudit to map ids to syscall names and vice-versa, but that
imposes a delay in supporting new syscalls, having to wait for libaudit
to get those new syscalls on its tables.
To remove that delay, for x86_64 initially, grab a copy of
arch/x86/entry/syscalls/syscall_64.tbl and use it to generate those
tables.
Syscalls currently not available in audit-libs:
# trace -e copy_file_range,membarrier,mlock2,pread64,pwrite64,timerfd_create,userfaultfd
Error: Invalid syscall copy_file_range, membarrier, mlock2, pread64, pwrite64, timerfd_create, userfaultfd
Hint: try 'perf list syscalls:sys_enter_*'
Hint: and: 'man syscalls'
#
With this patch:
# trace -e copy_file_range,membarrier,mlock2,pread64,pwrite64,timerfd_create,userfaultfd
8505.733 ( 0.010 ms): gnome-shell/2519 timerfd_create(flags: 524288) = 36
8506.688 ( 0.005 ms): gnome-shell/2519 timerfd_create(flags: 524288) = 40
30023.097 ( 0.025 ms): qemu-system-x8/24629 pwrite64(fd: 18, buf: 0x7f63ae382000, count: 4096, pos: 529592320) = 4096
31268.712 ( 0.028 ms): qemu-system-x8/24629 pwrite64(fd: 18, buf: 0x7f63afd8b000, count: 4096, pos: 2314133504) = 4096
31268.854 ( 0.016 ms): qemu-system-x8/24629 pwrite64(fd: 18, buf: 0x7f63afda2000, count: 4096, pos: 2314137600) = 4096
Cc: Adrian Hunter <adrian.hunter@intel.com>
Cc: David Ahern <dsahern@gmail.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Wang Nan <wangnan0@huawei.com>
Link: http://lkml.kernel.org/n/tip-51xfjbxevdsucmnbc4ka5r88@git.kernel.org
[ Added make dep for 'prepare' in 'LIBPERF_IN', fix by Wang Nan to fix parallell build ]
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2016-04-05 06:05:36 +08:00
|
|
|
#if defined(__x86_64__)
|
|
|
|
#include <asm/syscalls_64.c>
|
|
|
|
const int syscalltbl_native_max_id = SYSCALLTBL_x86_64_MAX_ID;
|
|
|
|
static const char **syscalltbl_native = syscalltbl_x86_64;
|
2017-12-07 16:27:59 +08:00
|
|
|
#elif defined(__s390x__)
|
|
|
|
#include <asm/syscalls_64.c>
|
|
|
|
const int syscalltbl_native_max_id = SYSCALLTBL_S390_64_MAX_ID;
|
|
|
|
static const char **syscalltbl_native = syscalltbl_s390_64;
|
2018-01-29 16:34:17 +08:00
|
|
|
#elif defined(__powerpc64__)
|
|
|
|
#include <asm/syscalls_64.c>
|
|
|
|
const int syscalltbl_native_max_id = SYSCALLTBL_POWERPC_64_MAX_ID;
|
|
|
|
static const char **syscalltbl_native = syscalltbl_powerpc_64;
|
|
|
|
#elif defined(__powerpc__)
|
|
|
|
#include <asm/syscalls_32.c>
|
|
|
|
const int syscalltbl_native_max_id = SYSCALLTBL_POWERPC_32_MAX_ID;
|
|
|
|
static const char **syscalltbl_native = syscalltbl_powerpc_32;
|
2018-07-07 05:34:54 +08:00
|
|
|
#elif defined(__aarch64__)
|
|
|
|
#include <asm/syscalls.c>
|
|
|
|
const int syscalltbl_native_max_id = SYSCALLTBL_ARM64_MAX_ID;
|
|
|
|
static const char **syscalltbl_native = syscalltbl_arm64;
|
2021-02-04 11:35:24 +08:00
|
|
|
#elif defined(__mips__)
|
|
|
|
#include <asm/syscalls_n64.c>
|
|
|
|
const int syscalltbl_native_max_id = SYSCALLTBL_MIPS_N64_MAX_ID;
|
|
|
|
static const char **syscalltbl_native = syscalltbl_mips_n64;
|
perf tools: Build syscall table .c header from kernel's syscall_64.tbl
We used libaudit to map ids to syscall names and vice-versa, but that
imposes a delay in supporting new syscalls, having to wait for libaudit
to get those new syscalls on its tables.
To remove that delay, for x86_64 initially, grab a copy of
arch/x86/entry/syscalls/syscall_64.tbl and use it to generate those
tables.
Syscalls currently not available in audit-libs:
# trace -e copy_file_range,membarrier,mlock2,pread64,pwrite64,timerfd_create,userfaultfd
Error: Invalid syscall copy_file_range, membarrier, mlock2, pread64, pwrite64, timerfd_create, userfaultfd
Hint: try 'perf list syscalls:sys_enter_*'
Hint: and: 'man syscalls'
#
With this patch:
# trace -e copy_file_range,membarrier,mlock2,pread64,pwrite64,timerfd_create,userfaultfd
8505.733 ( 0.010 ms): gnome-shell/2519 timerfd_create(flags: 524288) = 36
8506.688 ( 0.005 ms): gnome-shell/2519 timerfd_create(flags: 524288) = 40
30023.097 ( 0.025 ms): qemu-system-x8/24629 pwrite64(fd: 18, buf: 0x7f63ae382000, count: 4096, pos: 529592320) = 4096
31268.712 ( 0.028 ms): qemu-system-x8/24629 pwrite64(fd: 18, buf: 0x7f63afd8b000, count: 4096, pos: 2314133504) = 4096
31268.854 ( 0.016 ms): qemu-system-x8/24629 pwrite64(fd: 18, buf: 0x7f63afda2000, count: 4096, pos: 2314137600) = 4096
Cc: Adrian Hunter <adrian.hunter@intel.com>
Cc: David Ahern <dsahern@gmail.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Wang Nan <wangnan0@huawei.com>
Link: http://lkml.kernel.org/n/tip-51xfjbxevdsucmnbc4ka5r88@git.kernel.org
[ Added make dep for 'prepare' in 'LIBPERF_IN', fix by Wang Nan to fix parallell build ]
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2016-04-05 06:05:36 +08:00
|
|
|
#endif
|
|
|
|
|
2016-04-05 04:52:18 +08:00
|
|
|
struct syscall {
|
|
|
|
int id;
|
|
|
|
const char *name;
|
|
|
|
};
|
2016-04-05 00:32:20 +08:00
|
|
|
|
2016-04-05 04:52:18 +08:00
|
|
|
static int syscallcmpname(const void *vkey, const void *ventry)
|
|
|
|
{
|
|
|
|
const char *key = vkey;
|
|
|
|
const struct syscall *entry = ventry;
|
|
|
|
|
|
|
|
return strcmp(key, entry->name);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int syscallcmp(const void *va, const void *vb)
|
|
|
|
{
|
|
|
|
const struct syscall *a = va, *b = vb;
|
|
|
|
|
|
|
|
return strcmp(a->name, b->name);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int syscalltbl__init_native(struct syscalltbl *tbl)
|
|
|
|
{
|
|
|
|
int nr_entries = 0, i, j;
|
|
|
|
struct syscall *entries;
|
|
|
|
|
|
|
|
for (i = 0; i <= syscalltbl_native_max_id; ++i)
|
|
|
|
if (syscalltbl_native[i])
|
|
|
|
++nr_entries;
|
|
|
|
|
|
|
|
entries = tbl->syscalls.entries = malloc(sizeof(struct syscall) * nr_entries);
|
|
|
|
if (tbl->syscalls.entries == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
for (i = 0, j = 0; i <= syscalltbl_native_max_id; ++i) {
|
|
|
|
if (syscalltbl_native[i]) {
|
|
|
|
entries[j].name = syscalltbl_native[i];
|
|
|
|
entries[j].id = i;
|
|
|
|
++j;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
qsort(tbl->syscalls.entries, nr_entries, sizeof(struct syscall), syscallcmp);
|
|
|
|
tbl->syscalls.nr_entries = nr_entries;
|
2019-07-19 07:19:30 +08:00
|
|
|
tbl->syscalls.max_id = syscalltbl_native_max_id;
|
2016-04-05 04:52:18 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2016-04-05 00:32:20 +08:00
|
|
|
|
|
|
|
struct syscalltbl *syscalltbl__new(void)
|
|
|
|
{
|
|
|
|
struct syscalltbl *tbl = malloc(sizeof(*tbl));
|
|
|
|
if (tbl) {
|
2016-04-05 04:52:18 +08:00
|
|
|
if (syscalltbl__init_native(tbl)) {
|
|
|
|
free(tbl);
|
|
|
|
return NULL;
|
|
|
|
}
|
2016-04-05 00:32:20 +08:00
|
|
|
}
|
|
|
|
return tbl;
|
|
|
|
}
|
|
|
|
|
2016-04-05 04:52:18 +08:00
|
|
|
void syscalltbl__delete(struct syscalltbl *tbl)
|
|
|
|
{
|
|
|
|
zfree(&tbl->syscalls.entries);
|
|
|
|
free(tbl);
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *syscalltbl__name(const struct syscalltbl *tbl __maybe_unused, int id)
|
|
|
|
{
|
|
|
|
return id <= syscalltbl_native_max_id ? syscalltbl_native[id]: NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
int syscalltbl__id(struct syscalltbl *tbl, const char *name)
|
|
|
|
{
|
|
|
|
struct syscall *sc = bsearch(name, tbl->syscalls.entries,
|
|
|
|
tbl->syscalls.nr_entries, sizeof(*sc),
|
|
|
|
syscallcmpname);
|
|
|
|
|
|
|
|
return sc ? sc->id : -1;
|
|
|
|
}
|
|
|
|
|
2017-08-31 22:46:49 +08:00
|
|
|
int syscalltbl__strglobmatch_next(struct syscalltbl *tbl, const char *syscall_glob, int *idx)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
struct syscall *syscalls = tbl->syscalls.entries;
|
|
|
|
|
|
|
|
for (i = *idx + 1; i < tbl->syscalls.nr_entries; ++i) {
|
|
|
|
if (strglobmatch(syscalls[i].name, syscall_glob)) {
|
|
|
|
*idx = i;
|
|
|
|
return syscalls[i].id;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int syscalltbl__strglobmatch_first(struct syscalltbl *tbl, const char *syscall_glob, int *idx)
|
|
|
|
{
|
|
|
|
*idx = -1;
|
|
|
|
return syscalltbl__strglobmatch_next(tbl, syscall_glob, idx);
|
|
|
|
}
|
|
|
|
|
2018-04-09 18:26:48 +08:00
|
|
|
#else /* HAVE_SYSCALL_TABLE_SUPPORT */
|
2016-04-05 04:52:18 +08:00
|
|
|
|
|
|
|
#include <libaudit.h>
|
|
|
|
|
|
|
|
struct syscalltbl *syscalltbl__new(void)
|
|
|
|
{
|
2020-05-29 04:19:17 +08:00
|
|
|
struct syscalltbl *tbl = zalloc(sizeof(*tbl));
|
2016-04-05 04:52:18 +08:00
|
|
|
if (tbl)
|
|
|
|
tbl->audit_machine = audit_detect_machine();
|
|
|
|
return tbl;
|
|
|
|
}
|
|
|
|
|
2016-04-05 00:32:20 +08:00
|
|
|
void syscalltbl__delete(struct syscalltbl *tbl)
|
|
|
|
{
|
|
|
|
free(tbl);
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *syscalltbl__name(const struct syscalltbl *tbl, int id)
|
|
|
|
{
|
|
|
|
return audit_syscall_to_name(id, tbl->audit_machine);
|
|
|
|
}
|
|
|
|
|
|
|
|
int syscalltbl__id(struct syscalltbl *tbl, const char *name)
|
|
|
|
{
|
|
|
|
return audit_name_to_syscall(name, tbl->audit_machine);
|
|
|
|
}
|
2017-08-31 22:46:49 +08:00
|
|
|
|
|
|
|
int syscalltbl__strglobmatch_next(struct syscalltbl *tbl __maybe_unused,
|
|
|
|
const char *syscall_glob __maybe_unused, int *idx __maybe_unused)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int syscalltbl__strglobmatch_first(struct syscalltbl *tbl, const char *syscall_glob, int *idx)
|
|
|
|
{
|
|
|
|
return syscalltbl__strglobmatch_next(tbl, syscall_glob, idx);
|
|
|
|
}
|
2018-04-09 18:26:48 +08:00
|
|
|
#endif /* HAVE_SYSCALL_TABLE_SUPPORT */
|