From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 2299EC0219B for ; Tue, 11 Feb 2025 02:41:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:In-Reply-To:Content-Type: MIME-Version:References:Message-ID:Subject:Cc:To:From:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=ISAQBQ0fr+yj+zIbyh7W8nrLRTzv2QG8A8GpANmjBC4=; b=J5p3bIQ5ZYle4Xr3t8vyNr5QMs 6luZMIJ5iSbVluH4b3TkR8mKSARw6uGgwU/69HyIeZLtzRbFFjKObbf1NGdhjF9Dwc0Kkkf9RsPHO bD+HZELpPtha0siGewYICBbSWrJ/kJWVfJwKuEqzrmwE+/7uGMP7iC5//q5eI+xy5ksqWmBa/K9l6 9VG5AvC1SnLSIXZeMRlILGEuxsWrBY4AnCc49Uz4rGc2BY0wUJP1lHoAdycHpPOJCf2k/TaZpkhuN smXC8qj3K+ICNzSowD7Y/3zyKoZntupjSpgDpw3BR6J9GrTjkH9VrVur5D+zteJOJuXTEznJ8/pij YqICWxDg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.98 #2 (Red Hat Linux)) id 1thgCn-00000002IW8-3izw; Tue, 11 Feb 2025 02:40:58 +0000 Received: from desiato.infradead.org ([2001:8b0:10b:1:d65d:64ff:fe57:4e05]) by bombadil.infradead.org with esmtps (Exim 4.98 #2 (Red Hat Linux)) id 1thdyb-00000001xTW-3l3S for linux-arm-kernel@bombadil.infradead.org; Tue, 11 Feb 2025 00:18:10 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=desiato.20200630; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=ISAQBQ0fr+yj+zIbyh7W8nrLRTzv2QG8A8GpANmjBC4=; b=ZJftv22Rmr1gDFcAGr4NS8WAEu JZHSffFfAH0aHRS5/bPZo/4ZCrzXUKqPmqOUOTwsUInB3CMWLcHNcoaqrAMX+IbOrzkrVoZ6WV5XZ SGP8qgWLxRVGwN+wzqzWLneoCUIwy1UPlbRJDoF03qXSy/kfWuUK5s0DBi27miUITuzc6mPMmNLFX Xf4xvU1Cc331NwireTa47EuceYH/KisSaTgyfSosAVj8/5L9Rzi1Mph+I4DU8ohCudO/hOUCjk/4u /K1gsy1ulYx6OCuu4Geb8RI3B8StetKNxiJw1YIAuW10VrhQDNIxEVrCJkk0fbFpn/WvFeNXP/aRG +L7B9ipg==; Received: from mail-yw1-x1143.google.com ([2607:f8b0:4864:20::1143]) by desiato.infradead.org with esmtps (Exim 4.98 #2 (Red Hat Linux)) id 1thdyV-00000000OHT-45t5 for linux-arm-kernel@lists.infradead.org; Tue, 11 Feb 2025 00:18:08 +0000 Received: by mail-yw1-x1143.google.com with SMTP id 00721157ae682-6f6ca1a8aa6so28089967b3.3 for ; Mon, 10 Feb 2025 16:18:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rivosinc-com.20230601.gappssmtp.com; s=20230601; t=1739233080; x=1739837880; darn=lists.infradead.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=ISAQBQ0fr+yj+zIbyh7W8nrLRTzv2QG8A8GpANmjBC4=; b=DnOEe5WRbRS+dk+29EjEtXmwwTW0ajF7NzthY9l388zyoPscV/9yt0ZZdUYvuVlYdt TycISKML/wcp0Nd/4I0WmiKlSNKAAb7WWcMhVrZ4tkR4vg4Oo7JLuD8XQeCfDKJj/HlZ RQ/KU4UkXyhdBKCvUYB69LaUXTZeeuXV94KUallKHOx+tUaPiRQIiLxPtGa+SN1JJ4UL EkfJeLbAiKxPpWOmtqVWyr/JPEj9jrvQCD/pD5VJqXrt1UwyQaWmlGncbQ+S6JtHJurn JMRn50ckww6ZxQeWTVpWdw0z9TWPspIkUUG/zFTVY1LeCgaZUH5kIprLayyWDxYHIrmS 3V1w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1739233080; x=1739837880; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=ISAQBQ0fr+yj+zIbyh7W8nrLRTzv2QG8A8GpANmjBC4=; b=aQB+aRLIm2xnbG9ve3ZFZE+DlZ5OM5SeHUMXthwD+Qs29O/TrystqihQnl9/1bYLTY THPQ+TReg4AHQk3Czah7ytgMD8vFiVmI9LV8SgwySSXlLv/gAcYOQwgR5Aig5D5KPqg9 amTqrKDozO1VYRZzGsFehJER6mtlMHUF3CrSUPGySt85n0WRrbl4Vc3e9nT15CA/wNUq IphJKnb+thGUXwlKompYkzKrmk2R52BOI1aTqDh4MsUelh8+Z1WJKlsz9qYcEQ0uzmSi oOJTkusgkgecYLNUHFt1B4i1tLJIhYIMuhIOCJqOesr3JNUANYCemm7vTsn3EXGlJsjv EuEw== X-Forwarded-Encrypted: i=1; AJvYcCXFVT9bWWhAMQNlWMhRMKU76ChIj3y1vUd4TI7IAdpb4EIpfqpfHMZQb++66mHu1xxvnUBZMskOcDs0tXuWeloe@lists.infradead.org X-Gm-Message-State: AOJu0YxLR04dZ3mNfOHaQwuwqinivEmtnOjE+/VL2eMFRpK+xb0tJ+54 Gdhn3sPBC6mocwi+sZadpEL4ZShQeRxX+HJm8nXxUIxeKE4LVfkp6btZObzF0kk= X-Gm-Gg: ASbGncvwQqMIdOx1E8URm5OFsBnTb61CVI13v2LfkhA8jAjzUv0SElTvpDejB5RkWmv CammhPrWW2/1SVLvJVlESuU3rC03Pj6kuNpZQJuFv8cxnq9DfoYkJC+jj5VnAp9f7Tx2mMALzm4 4UShQ0lRPipvoiRT17M7xWFcv7/VB911Q+0jId1KvZPr2HaswKWUpjO1vdULWR4lrnJwyyPlg+y PsgvvVNABk9VN2z5fv/dAR3Jp8U6+OWNjx95FS9uwwm892K6jg0SZsAOqyK5/ndDfj9DRcvDDYs 9m4= X-Google-Smtp-Source: AGHT+IG2lYjSA9U8mtH8kqy2zToEQOfHxV7dx2DoND3Wn8X6MxCq6iEaLq5Q27PfBoeN7LzH0kZjXg== X-Received: by 2002:a05:690c:4d44:b0:6ef:8177:c322 with SMTP id 00721157ae682-6f9b28783cbmr160095467b3.13.1739233080336; Mon, 10 Feb 2025 16:18:00 -0800 (PST) Received: from ghost ([50.146.0.9]) by smtp.gmail.com with ESMTPSA id 00721157ae682-6f99ffc3501sm18888087b3.116.2025.02.10.16.17.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 10 Feb 2025 16:17:59 -0800 (PST) Date: Mon, 10 Feb 2025 16:17:57 -0800 From: Charlie Jenkins To: Ian Rogers Cc: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Adrian Hunter , Kan Liang , John Garry , Will Deacon , James Clark , Mike Leach , Leo Yan , Guo Ren , Paul Walmsley , Palmer Dabbelt , Albert Ou , Bibo Mao , Arnd Bergmann , Huacai Chen , Catalin Marinas , Jiri Slaby , =?iso-8859-1?Q?Bj=F6rn_T=F6pel?= , Howard Chu , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-csky@vger.kernel.org, linux-riscv@lists.infradead.org Subject: Re: [PATCH v2 2/7] perf trace: Reorganize syscalls Message-ID: References: <20250210165108.95894-1-irogers@google.com> <20250210165108.95894-3-irogers@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20250210165108.95894-3-irogers@google.com> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20250211_001805_524455_CF138BE5 X-CRM114-Status: GOOD ( 35.00 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Mon, Feb 10, 2025 at 08:51:03AM -0800, Ian Rogers wrote: > Identify struct syscall information in the syscalls table by a machine > type and syscall number, not just system call number. Having the > machine type means that 32-bit system calls can be differentiated from > 64-bit ones on a machine capable of both. Having a table for all > machine types and all system call numbers would be too large, so > maintain a sorted array of system calls as they are encountered. Reviewed-by: Charlie Jenkins Tested-by: Charlie Jenkins > > Signed-off-by: Ian Rogers > Reviewed-by: Howard Chu > --- > tools/perf/builtin-trace.c | 178 +++++++++++++++++++++++++------------ > 1 file changed, 119 insertions(+), 59 deletions(-) > > diff --git a/tools/perf/builtin-trace.c b/tools/perf/builtin-trace.c > index 06356217adeb..916a51df236b 100644 > --- a/tools/perf/builtin-trace.c > +++ b/tools/perf/builtin-trace.c > @@ -66,6 +66,7 @@ > #include "rb_resort.h" > #include "../perf.h" > #include "trace_augment.h" > +#include "dwarf-regs.h" > > #include > #include > @@ -86,6 +87,7 @@ > > #include > #include > +#include > > #ifdef HAVE_LIBTRACEEVENT > #include > @@ -143,7 +145,10 @@ struct trace { > struct perf_tool tool; > struct syscalltbl *sctbl; > struct { > + /** Sorted sycall numbers used by the trace. */ > struct syscall *table; > + /** Size of table. */ > + size_t table_size; > struct { > struct evsel *sys_enter, > *sys_exit, > @@ -1445,22 +1450,37 @@ static const struct syscall_fmt *syscall_fmt__find_by_alias(const char *alias) > return __syscall_fmt__find_by_alias(syscall_fmts, nmemb, alias); > } > > -/* > - * is_exit: is this "exit" or "exit_group"? > - * is_open: is this "open" or "openat"? To associate the fd returned in sys_exit with the pathname in sys_enter. > - * args_size: sum of the sizes of the syscall arguments, anything after that is augmented stuff: pathname for openat, etc. > - * nonexistent: Just a hole in the syscall table, syscall id not allocated > +/** > + * struct syscall > */ > struct syscall { > + /** @e_machine: The ELF machine associated with the entry. */ > + int e_machine; > + /** @id: id value from the tracepoint, the system call number. */ > + int id; > struct tep_event *tp_format; > int nr_args; > + /** > + * @args_size: sum of the sizes of the syscall arguments, anything > + * after that is augmented stuff: pathname for openat, etc. > + */ > + > int args_size; > struct { > struct bpf_program *sys_enter, > *sys_exit; > } bpf_prog; > + /** @is_exit: is this "exit" or "exit_group"? */ > bool is_exit; > + /** > + * @is_open: is this "open" or "openat"? To associate the fd returned in > + * sys_exit with the pathname in sys_enter. > + */ > bool is_open; > + /** > + * @nonexistent: Name lookup failed. Just a hole in the syscall table, > + * syscall id not allocated. > + */ > bool nonexistent; > bool use_btf; > struct tep_format_field *args; > @@ -2066,22 +2086,21 @@ static int syscall__set_arg_fmts(struct syscall *sc) > return 0; > } > > -static int trace__read_syscall_info(struct trace *trace, int id) > +static int syscall__read_info(struct syscall *sc, struct trace *trace) > { > char tp_name[128]; > - struct syscall *sc; > - const char *name = syscalltbl__name(trace->sctbl, id); > + const char *name; > int err; > > - if (trace->syscalls.table == NULL) { > - trace->syscalls.table = calloc(trace->sctbl->syscalls.max_id + 1, sizeof(*sc)); > - if (trace->syscalls.table == NULL) > - return -ENOMEM; > - } > - sc = trace->syscalls.table + id; > if (sc->nonexistent) > return -EEXIST; > > + if (sc->name) { > + /* Info already read. */ > + return 0; > + } > + > + name = syscalltbl__name(trace->sctbl, sc->id); > if (name == NULL) { > sc->nonexistent = true; > return -EEXIST; > @@ -2104,15 +2123,16 @@ static int trace__read_syscall_info(struct trace *trace, int id) > */ > if (IS_ERR(sc->tp_format)) { > sc->nonexistent = true; > - return PTR_ERR(sc->tp_format); > + err = PTR_ERR(sc->tp_format); > + sc->tp_format = NULL; > + return err; > } > > /* > * The tracepoint format contains __syscall_nr field, so it's one more > * than the actual number of syscall arguments. > */ > - if (syscall__alloc_arg_fmts(sc, IS_ERR(sc->tp_format) ? > - RAW_SYSCALL_ARGS_NUM : sc->tp_format->format.nr_fields - 1)) > + if (syscall__alloc_arg_fmts(sc, sc->tp_format->format.nr_fields - 1)) > return -ENOMEM; > > sc->args = sc->tp_format->format.fields; > @@ -2401,13 +2421,67 @@ static size_t syscall__scnprintf_args(struct syscall *sc, char *bf, size_t size, > return printed; > } > > +static void syscall__init(struct syscall *sc, int e_machine, int id) > +{ > + memset(sc, 0, sizeof(*sc)); > + sc->e_machine = e_machine; > + sc->id = id; > +} > + > +static void syscall__exit(struct syscall *sc) > +{ > + if (!sc) > + return; > + > + zfree(&sc->arg_fmt); > +} > + > +static int syscall__cmp(const void *va, const void *vb) > +{ > + const struct syscall *a = va, *b = vb; > + > + if (a->e_machine != b->e_machine) > + return a->e_machine - b->e_machine; > + > + return a->id - b->id; > +} > + > +static struct syscall *trace__find_syscall(struct trace *trace, int e_machine, int id) > +{ > + struct syscall key = { > + .e_machine = e_machine, > + .id = id, > + }; > + struct syscall *sc, *tmp; > + > + sc = bsearch(&key, trace->syscalls.table, trace->syscalls.table_size, > + sizeof(struct syscall), syscall__cmp); > + if (sc) > + return sc; > + > + tmp = reallocarray(trace->syscalls.table, trace->syscalls.table_size + 1, > + sizeof(struct syscall)); > + if (!tmp) > + return NULL; > + > + trace->syscalls.table = tmp; > + sc = &trace->syscalls.table[trace->syscalls.table_size++]; > + syscall__init(sc, e_machine, id); > + qsort(trace->syscalls.table, trace->syscalls.table_size, sizeof(struct syscall), > + syscall__cmp); > + sc = bsearch(&key, trace->syscalls.table, trace->syscalls.table_size, > + sizeof(struct syscall), syscall__cmp); > + return sc; > +} > + > typedef int (*tracepoint_handler)(struct trace *trace, struct evsel *evsel, > union perf_event *event, > struct perf_sample *sample); > > -static struct syscall *trace__syscall_info(struct trace *trace, > - struct evsel *evsel, int id) > +static struct syscall *trace__syscall_info(struct trace *trace, struct evsel *evsel, > + int e_machine, int id) > { > + struct syscall *sc; > int err = 0; > > if (id < 0) { > @@ -2432,28 +2506,20 @@ static struct syscall *trace__syscall_info(struct trace *trace, > > err = -EINVAL; > > - if (id > trace->sctbl->syscalls.max_id) { > - goto out_cant_read; > - } > - > - if ((trace->syscalls.table == NULL || trace->syscalls.table[id].name == NULL) && > - (err = trace__read_syscall_info(trace, id)) != 0) > - goto out_cant_read; > + sc = trace__find_syscall(trace, e_machine, id); > + if (sc) > + err = syscall__read_info(sc, trace); > > - if (trace->syscalls.table && trace->syscalls.table[id].nonexistent) > - goto out_cant_read; > - > - return &trace->syscalls.table[id]; > - > -out_cant_read: > - if (verbose > 0) { > + if (err && verbose > 0) { > char sbuf[STRERR_BUFSIZE]; > - fprintf(trace->output, "Problems reading syscall %d: %d (%s)", id, -err, str_error_r(-err, sbuf, sizeof(sbuf))); > - if (id <= trace->sctbl->syscalls.max_id && trace->syscalls.table[id].name != NULL) > - fprintf(trace->output, "(%s)", trace->syscalls.table[id].name); > + > + fprintf(trace->output, "Problems reading syscall %d: %d (%s)", id, -err, > + str_error_r(-err, sbuf, sizeof(sbuf))); > + if (sc && sc->name) > + fprintf(trace->output, "(%s)", sc->name); > fputs(" information\n", trace->output); > } > - return NULL; > + return err ? NULL : sc; > } > > struct syscall_stats { > @@ -2600,14 +2666,6 @@ static void *syscall__augmented_args(struct syscall *sc, struct perf_sample *sam > return NULL; > } > > -static void syscall__exit(struct syscall *sc) > -{ > - if (!sc) > - return; > - > - zfree(&sc->arg_fmt); > -} > - > static int trace__sys_enter(struct trace *trace, struct evsel *evsel, > union perf_event *event __maybe_unused, > struct perf_sample *sample) > @@ -2619,7 +2677,7 @@ static int trace__sys_enter(struct trace *trace, struct evsel *evsel, > int id = perf_evsel__sc_tp_uint(evsel, id, sample), err = -1; > int augmented_args_size = 0; > void *augmented_args = NULL; > - struct syscall *sc = trace__syscall_info(trace, evsel, id); > + struct syscall *sc = trace__syscall_info(trace, evsel, EM_HOST, id); > struct thread_trace *ttrace; > > if (sc == NULL) > @@ -2693,7 +2751,7 @@ static int trace__fprintf_sys_enter(struct trace *trace, struct evsel *evsel, > struct thread_trace *ttrace; > struct thread *thread; > int id = perf_evsel__sc_tp_uint(evsel, id, sample), err = -1; > - struct syscall *sc = trace__syscall_info(trace, evsel, id); > + struct syscall *sc = trace__syscall_info(trace, evsel, EM_HOST, id); > char msg[1024]; > void *args, *augmented_args = NULL; > int augmented_args_size; > @@ -2768,7 +2826,7 @@ static int trace__sys_exit(struct trace *trace, struct evsel *evsel, > struct thread *thread; > int id = perf_evsel__sc_tp_uint(evsel, id, sample), err = -1, callchain_ret = 0, printed = 0; > int alignment = trace->args_alignment; > - struct syscall *sc = trace__syscall_info(trace, evsel, id); > + struct syscall *sc = trace__syscall_info(trace, evsel, EM_HOST, id); > struct thread_trace *ttrace; > > if (sc == NULL) > @@ -3121,7 +3179,7 @@ static int trace__event_handler(struct trace *trace, struct evsel *evsel, > > if (evsel == trace->syscalls.events.bpf_output) { > int id = perf_evsel__sc_tp_uint(evsel, id, sample); > - struct syscall *sc = trace__syscall_info(trace, evsel, id); > + struct syscall *sc = trace__syscall_info(trace, evsel, EM_HOST, id); > > if (sc) { > fprintf(trace->output, "%s(", sc->name); > @@ -3626,7 +3684,7 @@ static struct bpf_program *trace__find_syscall_bpf_prog(struct trace *trace, str > > static void trace__init_syscall_bpf_progs(struct trace *trace, int id) > { > - struct syscall *sc = trace__syscall_info(trace, NULL, id); > + struct syscall *sc = trace__syscall_info(trace, NULL, EM_HOST, id); > > if (sc == NULL) > return; > @@ -3637,20 +3695,20 @@ static void trace__init_syscall_bpf_progs(struct trace *trace, int id) > > static int trace__bpf_prog_sys_enter_fd(struct trace *trace, int id) > { > - struct syscall *sc = trace__syscall_info(trace, NULL, id); > + struct syscall *sc = trace__syscall_info(trace, NULL, EM_HOST, id); > return sc ? bpf_program__fd(sc->bpf_prog.sys_enter) : bpf_program__fd(trace->skel->progs.syscall_unaugmented); > } > > static int trace__bpf_prog_sys_exit_fd(struct trace *trace, int id) > { > - struct syscall *sc = trace__syscall_info(trace, NULL, id); > + struct syscall *sc = trace__syscall_info(trace, NULL, EM_HOST, id); > return sc ? bpf_program__fd(sc->bpf_prog.sys_exit) : bpf_program__fd(trace->skel->progs.syscall_unaugmented); > } > > static int trace__bpf_sys_enter_beauty_map(struct trace *trace, int key, unsigned int *beauty_array) > { > struct tep_format_field *field; > - struct syscall *sc = trace__syscall_info(trace, NULL, key); > + struct syscall *sc = trace__syscall_info(trace, NULL, EM_HOST, key); > const struct btf_type *bt; > char *struct_offset, *tmp, name[32]; > bool can_augment = false; > @@ -3748,7 +3806,7 @@ static struct bpf_program *trace__find_usable_bpf_prog_entry(struct trace *trace > try_to_find_pair: > for (int i = 0; i < trace->sctbl->syscalls.nr_entries; ++i) { > int id = syscalltbl__id_at_idx(trace->sctbl, i); > - struct syscall *pair = trace__syscall_info(trace, NULL, id); > + struct syscall *pair = trace__syscall_info(trace, NULL, EM_HOST, id); > struct bpf_program *pair_prog; > bool is_candidate = false; > > @@ -3898,7 +3956,7 @@ static int trace__init_syscalls_bpf_prog_array_maps(struct trace *trace) > */ > for (int i = 0; i < trace->sctbl->syscalls.nr_entries; ++i) { > int key = syscalltbl__id_at_idx(trace->sctbl, i); > - struct syscall *sc = trace__syscall_info(trace, NULL, key); > + struct syscall *sc = trace__syscall_info(trace, NULL, EM_HOST, key); > struct bpf_program *pair_prog; > int prog_fd; > > @@ -4663,7 +4721,11 @@ static size_t thread__dump_stats(struct thread_trace *ttrace, > pct = avg ? 100.0 * stddev_stats(&stats->stats) / avg : 0.0; > avg /= NSEC_PER_MSEC; > > - sc = &trace->syscalls.table[syscall_stats_entry->syscall]; > + sc = trace__syscall_info(trace, /*evsel=*/NULL, EM_HOST, > + syscall_stats_entry->syscall); > + if (!sc) > + continue; > + > printed += fprintf(fp, " %-15s", sc->name); > printed += fprintf(fp, " %8" PRIu64 " %6" PRIu64 " %9.3f %9.3f %9.3f", > n, stats->nr_failures, syscall_stats_entry->msecs, min, avg); > @@ -5071,12 +5133,10 @@ static int trace__config(const char *var, const char *value, void *arg) > > static void trace__exit(struct trace *trace) > { > - int i; > - > strlist__delete(trace->ev_qualifier); > zfree(&trace->ev_qualifier_ids.entries); > if (trace->syscalls.table) { > - for (i = 0; i <= trace->sctbl->syscalls.max_id; i++) > + for (size_t i = 0; i < trace->syscalls.table_size; i++) > syscall__exit(&trace->syscalls.table[i]); > zfree(&trace->syscalls.table); > } > -- > 2.48.1.502.g6dc24dfdaf-goog >