Netdev Archive on lore.kernel.org help / color / mirror / Atom feed
From: Jiri Olsa <jolsa@redhat.com> To: Andrii Nakryiko <andrii.nakryiko@gmail.com> Cc: Alexei Starovoitov <ast@kernel.org>, Daniel Borkmann <daniel@iogearbox.net>, Andrii Nakryiko <andriin@fb.com>, "Steven Rostedt (VMware)" <rostedt@goodmis.org>, Networking <netdev@vger.kernel.org>, bpf <bpf@vger.kernel.org>, Martin KaFai Lau <kafai@fb.com>, Song Liu <songliubraving@fb.com>, Yonghong Song <yhs@fb.com>, John Fastabend <john.fastabend@gmail.com>, KP Singh <kpsingh@chromium.org>, Daniel Xu <dxu@dxuuu.xyz>, Viktor Malik <vmalik@redhat.com> Subject: Re: [PATCH bpf-next v4 20/27] libbpf: Add btf__find_by_glob_kind function Date: Wed, 1 Sep 2021 13:33:35 +0200 [thread overview] Message-ID: <YS9lD5r7HSAuh+MR@krava> (raw) In-Reply-To: <CAEf4BzaxuWMDW5shE_LuAkHfy0rkbdd05t9QAtL4j9XPZ1_rYQ@mail.gmail.com> On Tue, Aug 31, 2021 at 05:10:52PM -0700, Andrii Nakryiko wrote: > On Thu, Aug 26, 2021 at 12:41 PM Jiri Olsa <jolsa@redhat.com> wrote: > > > > Adding btf__find_by_glob_kind function that returns array of > > BTF ids that match given kind and allow/deny patterns. > > > > int btf__find_by_glob_kind(const struct btf *btf, __u32 kind, > > const char *allow_pattern, > > const char *deny_pattern, > > __u32 **__ids); > > > > The __ids array is allocated and needs to be manually freed. > > > > At the moment the supported pattern is '*' at the beginning or > > the end of the pattern. > > > > Kindly borrowed from retsnoop. > > > > Suggested-by: Andrii Nakryiko <andrii.nakryiko@gmail.com> > > Signed-off-by: Jiri Olsa <jolsa@kernel.org> > > --- > > tools/lib/bpf/btf.c | 80 +++++++++++++++++++++++++++++++++++++++++++++ > > tools/lib/bpf/btf.h | 3 ++ > > 2 files changed, 83 insertions(+) > > > > diff --git a/tools/lib/bpf/btf.c b/tools/lib/bpf/btf.c > > index 77dc24d58302..5baaca6c3134 100644 > > --- a/tools/lib/bpf/btf.c > > +++ b/tools/lib/bpf/btf.c > > @@ -711,6 +711,86 @@ __s32 btf__find_by_name_kind(const struct btf *btf, const char *type_name, > > return libbpf_err(-ENOENT); > > } > > > > +/* 'borrowed' from retsnoop */ > > +static bool glob_matches(const char *glob, const char *s) > > +{ > > + int n = strlen(glob); > > + > > + if (n == 1 && glob[0] == '*') > > + return true; > > + > > + if (glob[0] == '*' && glob[n - 1] == '*') { > > + const char *subs; > > + /* substring match */ > > + > > + /* this is hacky, but we don't want to allocate for no good reason */ > > + ((char *)glob)[n - 1] = '\0'; > > + subs = strstr(s, glob + 1); > > + ((char *)glob)[n - 1] = '*'; > > + > > + return subs != NULL; > > + } else if (glob[0] == '*') { > > + size_t nn = strlen(s); > > + /* suffix match */ > > + > > + /* too short for a given suffix */ > > + if (nn < n - 1) > > + return false; > > + > > + return strcmp(s + nn - (n - 1), glob + 1) == 0; > > + } else if (glob[n - 1] == '*') { > > + /* prefix match */ > > + return strncmp(s, glob, n - 1) == 0; > > + } else { > > + /* exact match */ > > + return strcmp(glob, s) == 0; > > + } > > +} > > + > > +int btf__find_by_glob_kind(const struct btf *btf, __u32 kind, > > + const char *allow_pattern, const char *deny_pattern, > > + __u32 **__ids) > > +{ > > + __u32 i, nr_types = btf__get_nr_types(btf); > > + int cnt = 0, alloc = 0; > > + __u32 *ids = NULL; > > + > > + for (i = 1; i <= nr_types; i++) { > > + const struct btf_type *t = btf__type_by_id(btf, i); > > + bool match = false; > > + const char *name; > > + __u32 *p; > > + > > + if (btf_kind(t) != kind) > > + continue; > > + name = btf__name_by_offset(btf, t->name_off); > > + if (!name) > > + continue; > > + > > + if (allow_pattern && glob_matches(allow_pattern, name)) > > + match = true; > > + if (deny_pattern && !glob_matches(deny_pattern, name)) > > + match = true; > > this is wrong, if it matches both deny and allow patterns, you'll > still pass it through. Drop the match flag, just check deny first and > `continue` if matches. true, ok > > > + if (!match) > > + continue; > > + > > + if (cnt == alloc) { > > + alloc = max(100, alloc * 3 / 2); > > nit: maybe start with something like 16? ok > > > + p = realloc(ids, alloc * sizeof(__u32)); > > we have libbpf_reallocarray, please use it ok > > > + if (!p) { > > + free(ids); > > + return -ENOMEM; > > + } > > + ids = p; > > + } > > + ids[cnt] = i; > > + cnt++; > > + } > > + > > + *__ids = ids; > > + return cnt ?: -ENOENT; > > cnt == 0 means -ENOENT, basically, no? It's up to the application to > decide if that's an error, let's just return the number of matches, > i.e., zero. ok thanks, jirka
next prev parent reply other threads:[~2021-09-01 11:33 UTC|newest] Thread overview: 44+ messages / expand[flat|nested] mbox.gz Atom feed top 2021-08-26 19:38 [PATCH bpf-next v4 00/27] x86/ftrace/bpf: Add batch support for direct/tracing attach Jiri Olsa 2021-08-26 19:38 ` [PATCH bpf-next v4 01/27] x86/ftrace: Remove extra orig rax move Jiri Olsa 2021-08-26 19:38 ` [PATCH bpf-next v4 02/27] x86/ftrace: Remove fault protection code in prepare_ftrace_return Jiri Olsa 2021-08-26 19:38 ` [PATCH bpf-next v4 03/27] x86/ftrace: Make function graph use ftrace directly Jiri Olsa 2021-08-26 19:38 ` [PATCH bpf-next v4 04/27] tracing: Add trampoline/graph selftest Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 05/27] ftrace: Add ftrace_add_rec_direct function Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 06/27] ftrace: Add multi direct register/unregister interface Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 07/27] ftrace: Add multi direct modify interface Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 08/27] ftrace/samples: Add multi direct interface test module Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 09/27] bpf: Add support to load multi func tracing program Jiri Olsa 2021-08-31 23:17 ` Andrii Nakryiko 2021-09-01 11:32 ` Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 10/27] bpf: Add struct bpf_tramp_node layer Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 11/27] bpf: Factor out bpf_trampoline_init function Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 12/27] bpf: Factor out __bpf_trampoline_lookup function Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 13/27] bpf: Factor out __bpf_trampoline_put function Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 14/27] bpf: Change bpf_trampoline_get to return error pointer Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 15/27] bpf, x64: Allow to use caller address from stack Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 16/27] bpf: Add bpf_trampoline_multi_get/put functions Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 17/27] bpf: Add multi trampoline attach support Jiri Olsa 2021-08-31 23:36 ` Andrii Nakryiko 2021-09-01 0:02 ` Andrii Nakryiko 2021-09-01 11:39 ` Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 18/27] bpf, x64: Store properly return value for trampoline with multi func programs Jiri Olsa 2021-08-31 23:51 ` Andrii Nakryiko 2021-09-01 15:15 ` Jiri Olsa 2021-09-02 3:56 ` Andrii Nakryiko 2021-09-02 12:57 ` Jiri Olsa 2021-09-02 16:54 ` Andrii Nakryiko 2021-09-02 21:55 ` Alexei Starovoitov 2021-09-03 9:50 ` Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 19/27] bpf: Attach multi trampoline with ftrace_ops Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 20/27] libbpf: Add btf__find_by_glob_kind function Jiri Olsa 2021-09-01 0:10 ` Andrii Nakryiko 2021-09-01 11:33 ` Jiri Olsa [this message] 2021-08-26 19:39 ` [PATCH bpf-next v4 21/27] libbpf: Add support to link multi func tracing program Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 22/27] selftests/bpf: Add fentry multi func test Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 23/27] selftests/bpf: Add fexit " Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 24/27] selftests/bpf: Add fentry/fexit " Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 25/27] selftests/bpf: Add mixed " Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 26/27] selftests/bpf: Add attach " Jiri Olsa 2021-08-26 19:39 ` [PATCH bpf-next v4 27/27] selftests/bpf: Add ret_mod " Jiri Olsa 2021-08-29 17:04 ` [PATCH bpf-next v4 00/27] x86/ftrace/bpf: Add batch support for direct/tracing attach Alexei Starovoitov 2021-08-30 8:02 ` Jiri Olsa
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=YS9lD5r7HSAuh+MR@krava \ --to=jolsa@redhat.com \ --cc=andrii.nakryiko@gmail.com \ --cc=andriin@fb.com \ --cc=ast@kernel.org \ --cc=bpf@vger.kernel.org \ --cc=daniel@iogearbox.net \ --cc=dxu@dxuuu.xyz \ --cc=john.fastabend@gmail.com \ --cc=kafai@fb.com \ --cc=kpsingh@chromium.org \ --cc=netdev@vger.kernel.org \ --cc=rostedt@goodmis.org \ --cc=songliubraving@fb.com \ --cc=vmalik@redhat.com \ --cc=yhs@fb.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).