Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

tools headers API: Update close_range affected files

To pick the changes from:

55db9c0e8534 ("net: remove compat_sys_{get,set}sockopt")
9b4feb630e8e ("arch: wire-up close_range()")

That automagically add the 'close_range' syscall to tools such as 'perf
trace'.

Before:

# perf trace -e close_range
event syntax error: 'close_range'
\___ parser error
Run 'perf list' for a list of valid events

Usage: perf trace [<options>] [<command>]
or: perf trace [<options>] -- <command> [<options>]
or: perf trace record [<options>] [<command>]
or: perf trace record [<options>] -- <command> [<options>]

-e, --event <event> event/syscall selector. use 'perf list' to list available events
#

After, system wide strace like tracing for this syscall:

# perf trace -e close_range
^C#

No calls, I need some test proggie :-)

Cc: Adrian Hunter <adrian.hunter@intel.com>
Cc: Christian Brauner <christian.brauner@ubuntu.com>
Cc: Christoph Hellwig <hch@lst.de>
Cc: David S. Miller <davem@davemloft.net>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>

+3
+2
tools/include/uapi/asm-generic/unistd.h
··· 850 850 #define __NR_clone3 435 851 851 __SYSCALL(__NR_clone3, sys_clone3) 852 852 #endif 853 + #define __NR_close_range 436 854 + __SYSCALL(__NR_close_range, sys_close_range) 853 855 854 856 #define __NR_openat2 437 855 857 __SYSCALL(__NR_openat2, sys_openat2)
+1
tools/perf/arch/x86/entry/syscalls/syscall_64.tbl
··· 357 357 433 common fspick sys_fspick 358 358 434 common pidfd_open sys_pidfd_open 359 359 435 common clone3 sys_clone3 360 + 436 common close_range sys_close_range 360 361 437 common openat2 sys_openat2 361 362 438 common pidfd_getfd sys_pidfd_getfd 362 363 439 common faccessat2 sys_faccessat2