On Sun, Apr 29, 2018 at 03:06:31PM -0700, Yonghong Song wrote:
> Commit d5a00528b58c ("syscalls/core, syscalls/x86: Rename
> struct pt_regs-based sys_*() to __x64_sys_*()") renamed a lot
> of syscall function sys_*() to __x64_sys_*().
> This caused several kprobe based samples/bpf tests failing.
> 
> This patch fixed the problem by using __x64_sys_*(),
> instead of sys_*(), in bpf program SEC annotations if
> the target arch is __TARGET_ARCH_x86.
> 
> Fixes: d5a00528b58c ("syscalls/core, syscalls/x86: Rename struct 
> pt_regs-based sys_*() to __x64_sys_*()")
> Signed-off-by: Yonghong Song <y...@fb.com>
> ---
>  samples/bpf/map_perf_test_kern.c                  | 32 
> +++++++++++++++++++++++
>  samples/bpf/test_current_task_under_cgroup_kern.c |  4 +++
>  samples/bpf/test_map_in_map_kern.c                |  4 +++
>  samples/bpf/test_probe_write_user_kern.c          |  4 +++
>  samples/bpf/trace_output_kern.c                   |  4 +++
>  samples/bpf/tracex2_kern.c                        |  4 +++
>  6 files changed, 52 insertions(+)
> 
> diff --git a/samples/bpf/map_perf_test_kern.c 
> b/samples/bpf/map_perf_test_kern.c
> index 2b2ffb9..79f4320 100644
> --- a/samples/bpf/map_perf_test_kern.c
> +++ b/samples/bpf/map_perf_test_kern.c
> @@ -95,7 +95,11 @@ struct bpf_map_def SEC("maps") lru_hash_lookup_map = {
>       .max_entries = MAX_ENTRIES,
>  };
>  
> +#ifdef __TARGET_ARCH_x86
> +SEC("kprobe/__x64_sys_getuid")
> +#else
>  SEC("kprobe/sys_getuid")
> +#endif

I think it would be better to hack bpf_load.c to add __x64_
automatically when it matches "sys_" in the beginning of kprobe name.

Reply via email to