lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ZOsZwQptH05Gn9yU@krava>
Date:   Sun, 27 Aug 2023 11:39:13 +0200
From:   Jiri Olsa <olsajiri@...il.com>
To:     Rong Tao <rtoax@...mail.com>
Cc:     olsajiri@...il.com, andrii@...nel.org, daniel@...earbox.net,
        sdf@...gle.com, Rong Tao <rongtao@...tc.cn>,
        Alexei Starovoitov <ast@...nel.org>,
        Martin KaFai Lau <martin.lau@...ux.dev>,
        Song Liu <song@...nel.org>,
        Yonghong Song <yonghong.song@...ux.dev>,
        John Fastabend <john.fastabend@...il.com>,
        KP Singh <kpsingh@...nel.org>, Hao Luo <haoluo@...gle.com>,
        Mykola Lysenko <mykolal@...com>, Shuah Khan <shuah@...nel.org>,
        Maxime Coquelin <mcoquelin.stm32@...il.com>,
        Alexandre Torgue <alexandre.torgue@...s.st.com>,
        Ilya Leoshkevich <iii@...ux.ibm.com>,
        Yafang Shao <laoar.shao@...il.com>,
        Daniel Müller <deso@...teo.net>,
        Manu Bretelle <chantr4@...il.com>,
        Xu Kuohai <xukuohai@...wei.com>,
        Ross Zwisler <zwisler@...gle.com>,
        Eduard Zingerman <eddyz87@...il.com>,
        "open list:BPF [GENERAL] (Safe Dynamic Programs and Tools)" 
        <bpf@...r.kernel.org>, open list <linux-kernel@...r.kernel.org>,
        "open list:KERNEL SELFTEST FRAMEWORK" 
        <linux-kselftest@...r.kernel.org>,
        "moderated list:ARM/STM32 ARCHITECTURE" 
        <linux-stm32@...md-mailman.stormreply.com>,
        "moderated list:ARM/STM32 ARCHITECTURE" 
        <linux-arm-kernel@...ts.infradead.org>
Subject: Re: [PATCH bpf-next v8] selftests/bpf: trace_helpers.c: optimize
 kallsyms cache

On Sat, Aug 26, 2023 at 10:46:19PM +0800, Rong Tao wrote:

SNIP

> diff --git a/samples/bpf/sampleip_user.c b/samples/bpf/sampleip_user.c
> index 9283f47844fb..aec3d557aa6b 100644
> --- a/samples/bpf/sampleip_user.c
> +++ b/samples/bpf/sampleip_user.c
> @@ -25,6 +25,7 @@
>  static int map_fd;
>  static int nr_cpus;
>  static long _text_addr;
> +struct ksyms *ksyms;
>  
>  static void usage(void)
>  {
> @@ -109,7 +110,7 @@ static void print_ip_map(int fd)
>  	qsort(counts, max, sizeof(struct ipcount), count_cmp);
>  	for (i = 0; i < max; i++) {
>  		if (counts[i].ip > _text_addr) {
> -			sym = ksym_search(counts[i].ip);
> +			sym = ksym_search(ksyms, counts[i].ip);
>  			if (!sym) {
>  				printf("ksym not found. Is kallsyms loaded?\n");
>  				continue;
> @@ -164,13 +165,14 @@ int main(int argc, char **argv)
>  	}
>  
>  	/* initialize kernel symbol translation */
> -	if (load_kallsyms()) {
> +	ksyms = load_kallsyms();

if we keep the load_kallsyms/ksym_search/ksym_get_addr functions as described
in [1] the samples/bpf would stay untouched apart from the Makefile change

jirka

[1] https://lore.kernel.org/lkml/ZOjUpt16gcTSGkdl@krava/

> +	if (!ksyms) {
>  		fprintf(stderr, "ERROR: loading /proc/kallsyms\n");
>  		return 2;
>  	}
>  
>  	/* used to determine whether the address is kernel space */
> -	_text_addr = ksym_get_addr("_text");
> +	_text_addr = ksym_get_addr(ksyms, "_text");
>  	if (!_text_addr) {
>  		fprintf(stderr, "ERROR: no '_text' in /proc/kallsyms\n");
>  		return 3;
> @@ -230,5 +232,6 @@ int main(int argc, char **argv)
>  
>  	free(links);
>  	bpf_object__close(obj);
> +	free_kallsyms(ksyms);
>  	return error;
>  }
> diff --git a/samples/bpf/spintest_user.c b/samples/bpf/spintest_user.c
> index 55971edb1088..db6a3c6d5329 100644
> --- a/samples/bpf/spintest_user.c
> +++ b/samples/bpf/spintest_user.c
> @@ -16,8 +16,10 @@ int main(int ac, char **argv)
>  	int map_fd, i, j = 0;
>  	char filename[256];
>  	struct ksym *sym;
> +	struct ksyms *ksyms;
>  
> -	if (load_kallsyms()) {
> +	ksyms = load_kallsyms();
> +	if (!ksyms) {
>  		printf("failed to process /proc/kallsyms\n");
>  		return 2;
>  	}
> @@ -58,7 +60,7 @@ int main(int ac, char **argv)
>  		while (bpf_map_get_next_key(map_fd, &key, &next_key) == 0) {
>  			bpf_map_lookup_elem(map_fd, &next_key, &value);
>  			assert(next_key == value);
> -			sym = ksym_search(value);
> +			sym = ksym_search(ksyms, value);
>  			key = next_key;
>  			if (!sym) {
>  				printf("ksym not found. Is kallsyms loaded?\n");
> @@ -80,5 +82,6 @@ int main(int ac, char **argv)
>  		bpf_link__destroy(links[j]);
>  
>  	bpf_object__close(obj);
> +	free_kallsyms(ksyms);
>  	return 0;
>  }
> diff --git a/samples/bpf/task_fd_query_user.c b/samples/bpf/task_fd_query_user.c
> index 1e61f2180470..6e7710a4a96f 100644
> --- a/samples/bpf/task_fd_query_user.c
> +++ b/samples/bpf/task_fd_query_user.c
> @@ -315,8 +315,10 @@ int main(int argc, char **argv)
>  	struct bpf_program *prog;
>  	struct bpf_object *obj;
>  	int i = 0, err = -1;
> +	struct ksyms *ksyms;
>  
> -	if (load_kallsyms()) {
> +	ksyms = load_kallsyms();
> +	if (!ksyms) {
>  		printf("failed to process /proc/kallsyms\n");
>  		return err;
>  	}
> @@ -368,22 +370,22 @@ int main(int argc, char **argv)
>  					     BPF_FD_TYPE_KRETPROBE,
>  					     buf, sizeof(buf)));
>  	CHECK_AND_RET(test_nondebug_fs_probe("kprobe", NULL, 0x0,
> -					     ksym_get_addr("bpf_check"), false,
> +					     ksym_get_addr(ksyms, "bpf_check"), false,
>  					     BPF_FD_TYPE_KPROBE,
>  					     BPF_FD_TYPE_KRETPROBE,
>  					     buf, sizeof(buf)));
>  	CHECK_AND_RET(test_nondebug_fs_probe("kprobe", NULL, 0x0,
> -					     ksym_get_addr("bpf_check"), false,
> +					     ksym_get_addr(ksyms, "bpf_check"), false,
>  					     BPF_FD_TYPE_KPROBE,
>  					     BPF_FD_TYPE_KRETPROBE,
>  					     NULL, 0));
>  	CHECK_AND_RET(test_nondebug_fs_probe("kprobe", NULL, 0x0,
> -					     ksym_get_addr("bpf_check"), true,
> +					     ksym_get_addr(ksyms, "bpf_check"), true,
>  					     BPF_FD_TYPE_KPROBE,
>  					     BPF_FD_TYPE_KRETPROBE,
>  					     buf, sizeof(buf)));
>  	CHECK_AND_RET(test_nondebug_fs_probe("kprobe", NULL, 0x0,
> -					     ksym_get_addr("bpf_check"), true,
> +					     ksym_get_addr(ksyms, "bpf_check"), true,
>  					     BPF_FD_TYPE_KPROBE,
>  					     BPF_FD_TYPE_KRETPROBE,
>  					     0, 0));
> @@ -419,5 +421,6 @@ int main(int argc, char **argv)
>  		bpf_link__destroy(links[i]);
>  
>  	bpf_object__close(obj);
> +	free_kallsyms(ksyms);
>  	return err;
>  }
> diff --git a/samples/bpf/trace_event_user.c b/samples/bpf/trace_event_user.c
> index 9664749bf618..b4822166182f 100644
> --- a/samples/bpf/trace_event_user.c
> +++ b/samples/bpf/trace_event_user.c
> @@ -23,6 +23,7 @@ static int pid;
>  static int map_fd[2];
>  struct bpf_program *prog;
>  static bool sys_read_seen, sys_write_seen;
> +struct ksyms *ksyms;
>  
>  static void print_ksym(__u64 addr)
>  {
> @@ -30,7 +31,7 @@ static void print_ksym(__u64 addr)
>  
>  	if (!addr)
>  		return;
> -	sym = ksym_search(addr);
> +	sym = ksym_search(ksyms, addr);
>  	if (!sym) {
>  		printf("ksym not found. Is kallsyms loaded?\n");
>  		return;
> @@ -303,7 +304,8 @@ int main(int argc, char **argv)
>  	signal(SIGINT, err_exit);
>  	signal(SIGTERM, err_exit);
>  
> -	if (load_kallsyms()) {
> +	ksyms = load_kallsyms();
> +	if (!ksyms) {
>  		printf("failed to process /proc/kallsyms\n");
>  		goto cleanup;
>  	}
> @@ -348,5 +350,6 @@ int main(int argc, char **argv)
>  
>  cleanup:
>  	bpf_object__close(obj);
> +	free_kallsyms(ksyms);
>  	err_exit(error);
>  }
> diff --git a/tools/testing/selftests/bpf/prog_tests/bpf_cookie.c b/tools/testing/selftests/bpf/prog_tests/bpf_cookie.c
> index 1454cebc262b..26bf1f33b8d5 100644
> --- a/tools/testing/selftests/bpf/prog_tests/bpf_cookie.c
> +++ b/tools/testing/selftests/bpf/prog_tests/bpf_cookie.c
> @@ -104,8 +104,10 @@ static void kprobe_multi_link_api_subtest(void)
>  	LIBBPF_OPTS(bpf_link_create_opts, opts);
>  	unsigned long long addrs[8];
>  	__u64 cookies[8];
> +	struct ksyms *ksyms;
>  
> -	if (!ASSERT_OK(load_kallsyms(), "load_kallsyms"))
> +	ksyms = load_kallsyms();
> +	if (!ASSERT_OK(ksyms != NULL, "load_kallsyms"))
>  		goto cleanup;
>  
>  	skel = kprobe_multi__open_and_load();
> @@ -116,7 +118,7 @@ static void kprobe_multi_link_api_subtest(void)
>  	skel->bss->test_cookie = true;
>  
>  #define GET_ADDR(__sym, __addr) ({				\
> -	__addr = ksym_get_addr(__sym);				\
> +	__addr = ksym_get_addr(ksyms, __sym);				\
>  	if (!ASSERT_NEQ(__addr, 0, "ksym_get_addr " #__sym))	\
>  		goto cleanup;					\
>  })
> @@ -171,6 +173,7 @@ static void kprobe_multi_link_api_subtest(void)
>  cleanup:
>  	close(link1_fd);
>  	close(link2_fd);
> +	free_kallsyms(ksyms);
>  	kprobe_multi__destroy(skel);
>  }
>  
> diff --git a/tools/testing/selftests/bpf/prog_tests/fill_link_info.c b/tools/testing/selftests/bpf/prog_tests/fill_link_info.c
> index 9d768e083714..a134eda17446 100644
> --- a/tools/testing/selftests/bpf/prog_tests/fill_link_info.c
> +++ b/tools/testing/selftests/bpf/prog_tests/fill_link_info.c
> @@ -302,16 +302,18 @@ void test_fill_link_info(void)
>  {
>  	struct test_fill_link_info *skel;
>  	int i;
> +	struct ksyms *ksyms;
>  
>  	skel = test_fill_link_info__open_and_load();
>  	if (!ASSERT_OK_PTR(skel, "skel_open"))
>  		return;
>  
>  	/* load kallsyms to compare the addr */
> -	if (!ASSERT_OK(load_kallsyms_refresh(), "load_kallsyms_refresh"))
> +	ksyms = load_kallsyms_refresh(NULL);
> +	if (!ASSERT_OK(ksyms != NULL, "load_kallsyms_refresh"))
>  		goto cleanup;
>  
> -	kprobe_addr = ksym_get_addr(KPROBE_FUNC);
> +	kprobe_addr = ksym_get_addr(ksyms, KPROBE_FUNC);
>  	if (test__start_subtest("kprobe_link_info"))
>  		test_kprobe_fill_link_info(skel, BPF_PERF_EVENT_KPROBE, false);
>  	if (test__start_subtest("kretprobe_link_info"))
> @@ -329,7 +331,7 @@ void test_fill_link_info(void)
>  
>  	qsort(kmulti_syms, KMULTI_CNT, sizeof(kmulti_syms[0]), symbols_cmp_r);
>  	for (i = 0; i < KMULTI_CNT; i++)
> -		kmulti_addrs[i] = ksym_get_addr(kmulti_syms[i]);
> +		kmulti_addrs[i] = ksym_get_addr(ksyms, kmulti_syms[i]);
>  	if (test__start_subtest("kprobe_multi_link_info"))
>  		test_kprobe_multi_fill_link_info(skel, false, false);
>  	if (test__start_subtest("kretprobe_multi_link_info"))
> @@ -339,4 +341,5 @@ void test_fill_link_info(void)
>  
>  cleanup:
>  	test_fill_link_info__destroy(skel);
> +	free_kallsyms(ksyms);
>  }
> diff --git a/tools/testing/selftests/bpf/prog_tests/get_stack_raw_tp.c b/tools/testing/selftests/bpf/prog_tests/get_stack_raw_tp.c
> index 858e0575f502..7a5e7741da14 100644
> --- a/tools/testing/selftests/bpf/prog_tests/get_stack_raw_tp.c
> +++ b/tools/testing/selftests/bpf/prog_tests/get_stack_raw_tp.c
> @@ -9,6 +9,7 @@
>  #define MAX_STACK_RAWTP	100
>  
>  static int duration = 0;
> +static struct ksyms *ksyms;
>  
>  struct get_stack_trace_t {
>  	int pid;
> @@ -48,7 +49,7 @@ static void get_stack_print_output(void *ctx, int cpu, void *data, __u32 size)
>  			found = num_stack > 0;
>  		} else {
>  			for (i = 0; i < num_stack; i++) {
> -				ks = ksym_search(raw_data[i]);
> +				ks = ksym_search(ksyms, raw_data[i]);
>  				if (ks && (strcmp(ks->name, nonjit_func) == 0)) {
>  					found = true;
>  					break;
> @@ -65,7 +66,7 @@ static void get_stack_print_output(void *ctx, int cpu, void *data, __u32 size)
>  			good_kern_stack = num_stack > 0;
>  		} else {
>  			for (i = 0; i < num_stack; i++) {
> -				ks = ksym_search(e.kern_stack[i]);
> +				ks = ksym_search(ksyms, e.kern_stack[i]);
>  				if (ks && (strcmp(ks->name, nonjit_func) == 0)) {
>  					good_kern_stack = true;
>  					break;
> @@ -112,8 +113,8 @@ void test_get_stack_raw_tp(void)
>  	if (CHECK(!map, "bpf_find_map", "not found\n"))
>  		goto close_prog;
>  
> -	err = load_kallsyms();
> -	if (CHECK(err < 0, "load_kallsyms", "err %d errno %d\n", err, errno))
> +	ksyms = load_kallsyms();
> +	if (CHECK(!ksyms, "load_kallsyms", "err %d errno %d\n", err, errno))
>  		goto close_prog;
>  
>  	CPU_ZERO(&cpu_set);
> @@ -146,4 +147,5 @@ void test_get_stack_raw_tp(void)
>  	bpf_link__destroy(link);
>  	perf_buffer__free(pb);
>  	bpf_object__close(obj);
> +	free_kallsyms(ksyms);
>  }
> diff --git a/tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c b/tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c
> index 179fe300534f..e902ea50de57 100644
> --- a/tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c
> +++ b/tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c
> @@ -6,6 +6,8 @@
>  #include "bpf/libbpf_internal.h"
>  #include "bpf/hashmap.h"
>  
> +static struct ksyms *ksyms;
> +
>  static void kprobe_multi_test_run(struct kprobe_multi *skel, bool test_return)
>  {
>  	LIBBPF_OPTS(bpf_test_run_opts, topts);
> @@ -89,7 +91,7 @@ static void test_link_api(struct bpf_link_create_opts *opts)
>  }
>  
>  #define GET_ADDR(__sym, __addr) ({					\
> -	__addr = ksym_get_addr(__sym);					\
> +	__addr = ksym_get_addr(ksyms, __sym);					\
>  	if (!ASSERT_NEQ(__addr, 0, "kallsyms load failed for " #__sym))	\
>  		return;							\
>  })
> @@ -222,8 +224,8 @@ static void test_attach_api_fails(void)
>  	};
>  	__u64 cookies[2];
>  
> -	addrs[0] = ksym_get_addr("bpf_fentry_test1");
> -	addrs[1] = ksym_get_addr("bpf_fentry_test2");
> +	addrs[0] = ksym_get_addr(ksyms, "bpf_fentry_test1");
> +	addrs[1] = ksym_get_addr(ksyms, "bpf_fentry_test2");
>  
>  	if (!ASSERT_FALSE(!addrs[0] || !addrs[1], "ksym_get_addr"))
>  		goto cleanup;
> @@ -463,7 +465,8 @@ void serial_test_kprobe_multi_bench_attach(void)
>  
>  void test_kprobe_multi_test(void)
>  {
> -	if (!ASSERT_OK(load_kallsyms(), "load_kallsyms"))
> +	ksyms = load_kallsyms();
> +	if (!ASSERT_OK(ksyms != NULL, "load_kallsyms"))
>  		return;
>  
>  	if (test__start_subtest("skel_api"))
> @@ -480,4 +483,6 @@ void test_kprobe_multi_test(void)
>  		test_attach_api_syms();
>  	if (test__start_subtest("attach_api_fails"))
>  		test_attach_api_fails();
> +
> +	free_kallsyms(ksyms);
>  }
> diff --git a/tools/testing/selftests/bpf/prog_tests/kprobe_multi_testmod_test.c b/tools/testing/selftests/bpf/prog_tests/kprobe_multi_testmod_test.c
> index 1fbe7e4ac00a..69de53db63fd 100644
> --- a/tools/testing/selftests/bpf/prog_tests/kprobe_multi_testmod_test.c
> +++ b/tools/testing/selftests/bpf/prog_tests/kprobe_multi_testmod_test.c
> @@ -4,6 +4,8 @@
>  #include "trace_helpers.h"
>  #include "bpf/libbpf_internal.h"
>  
> +static struct ksyms *ksyms;
> +
>  static void kprobe_multi_testmod_check(struct kprobe_multi *skel)
>  {
>  	ASSERT_EQ(skel->bss->kprobe_testmod_test1_result, 1, "kprobe_test1_result");
> @@ -50,11 +52,11 @@ static void test_testmod_attach_api_addrs(void)
>  	LIBBPF_OPTS(bpf_kprobe_multi_opts, opts);
>  	unsigned long long addrs[3];
>  
> -	addrs[0] = ksym_get_addr("bpf_testmod_fentry_test1");
> +	addrs[0] = ksym_get_addr(ksyms, "bpf_testmod_fentry_test1");
>  	ASSERT_NEQ(addrs[0], 0, "ksym_get_addr");
> -	addrs[1] = ksym_get_addr("bpf_testmod_fentry_test2");
> +	addrs[1] = ksym_get_addr(ksyms, "bpf_testmod_fentry_test2");
>  	ASSERT_NEQ(addrs[1], 0, "ksym_get_addr");
> -	addrs[2] = ksym_get_addr("bpf_testmod_fentry_test3");
> +	addrs[2] = ksym_get_addr(ksyms, "bpf_testmod_fentry_test3");
>  	ASSERT_NEQ(addrs[2], 0, "ksym_get_addr");
>  
>  	opts.addrs = (const unsigned long *) addrs;
> @@ -79,11 +81,14 @@ static void test_testmod_attach_api_syms(void)
>  
>  void serial_test_kprobe_multi_testmod_test(void)
>  {
> -	if (!ASSERT_OK(load_kallsyms_refresh(), "load_kallsyms_refresh"))
> +	ksyms = load_kallsyms_refresh(NULL);
> +	if (!ASSERT_OK(ksyms != NULL, "load_kallsyms_refresh"))
>  		return;
>  
>  	if (test__start_subtest("testmod_attach_api_syms"))
>  		test_testmod_attach_api_syms();
>  	if (test__start_subtest("testmod_attach_api_addrs"))
>  		test_testmod_attach_api_addrs();
> +
> +	free_kallsyms(ksyms);
>  }
> diff --git a/tools/testing/selftests/bpf/trace_helpers.c b/tools/testing/selftests/bpf/trace_helpers.c
> index f83d9f65c65b..048522d2ac6e 100644
> --- a/tools/testing/selftests/bpf/trace_helpers.c
> +++ b/tools/testing/selftests/bpf/trace_helpers.c
> @@ -14,99 +14,143 @@
>  #include <linux/limits.h>
>  #include <libelf.h>
>  #include <gelf.h>
> +#include "bpf/libbpf_internal.h"
>  
>  #define TRACEFS_PIPE	"/sys/kernel/tracing/trace_pipe"
>  #define DEBUGFS_PIPE	"/sys/kernel/debug/tracing/trace_pipe"
>  
> -#define MAX_SYMS 400000
> -static struct ksym syms[MAX_SYMS];
> -static int sym_cnt;
> +struct ksyms {
> +	struct ksym *syms;
> +	size_t sym_cap;
> +	size_t sym_cnt;
> +};
> +
> +static int ksyms__add_symbol(struct ksyms *ksyms, const char *name,
> +							 unsigned long addr)
> +{
> +	void *tmp;
> +
> +	tmp = strdup(name);
> +	if (!tmp)
> +		return -ENOMEM;
> +	ksyms->syms[ksyms->sym_cnt].addr = addr;
> +	ksyms->syms[ksyms->sym_cnt].name = tmp;
> +
> +	ksyms->sym_cnt++;
> +
> +	return 0;
> +}
> +
> +void free_kallsyms(struct ksyms *ksyms)
> +{
> +	unsigned int i;
> +
> +	if (!ksyms)
> +		return;
> +
> +	if (!ksyms->syms) {
> +		free(ksyms);
> +		return;
> +	}
> +
> +	for (i = 0; i < ksyms->sym_cnt; i++)
> +		free(ksyms->syms[i].name);
> +	free(ksyms->syms);
> +	free(ksyms);
> +}
>  
>  static int ksym_cmp(const void *p1, const void *p2)
>  {
>  	return ((struct ksym *)p1)->addr - ((struct ksym *)p2)->addr;
>  }
>  
> -int load_kallsyms_refresh(void)
> +struct ksyms *load_kallsyms_refresh(struct ksyms *ksyms)
>  {
>  	FILE *f;
>  	char func[256], buf[256];
>  	char symbol;
>  	void *addr;
> -	int i = 0;
> +	int ret;
>  
> -	sym_cnt = 0;
> +	/* flush kallsyms, free the previously allocated dynamic memory */
> +	free_kallsyms(ksyms);
>  
>  	f = fopen("/proc/kallsyms", "r");
>  	if (!f)
> -		return -ENOENT;
> +		return NULL;
> +
> +	ksyms = calloc(1, sizeof(struct ksyms));
> +	if (!ksyms)
> +		return NULL;
>  
>  	while (fgets(buf, sizeof(buf), f)) {
>  		if (sscanf(buf, "%p %c %s", &addr, &symbol, func) != 3)
>  			break;
>  		if (!addr)
>  			continue;
> -		if (i >= MAX_SYMS)
> -			return -EFBIG;
>  
> -		syms[i].addr = (long) addr;
> -		syms[i].name = strdup(func);
> -		i++;
> +		ret = libbpf_ensure_mem((void **) &ksyms->syms, &ksyms->sym_cap,
> +					sizeof(struct ksym), ksyms->sym_cnt + 1);
> +		if (ret)
> +			goto error;
> +		ret = ksyms__add_symbol(ksyms, func, (unsigned long)addr);
> +		if (ret)
> +			goto error;
>  	}
>  	fclose(f);
> -	sym_cnt = i;
> -	qsort(syms, sym_cnt, sizeof(struct ksym), ksym_cmp);
> -	return 0;
> +	qsort(ksyms->syms, ksyms->sym_cnt, sizeof(struct ksym), ksym_cmp);
> +	return ksyms;
> +
> +error:
> +	free_kallsyms(ksyms);
> +	return NULL;
>  }
>  
> -int load_kallsyms(void)
> +struct ksyms *load_kallsyms(void)
>  {
> -	/*
> -	 * This is called/used from multiplace places,
> -	 * load symbols just once.
> -	 */
> -	if (sym_cnt)
> -		return 0;
> -	return load_kallsyms_refresh();
> +	return load_kallsyms_refresh(NULL);
>  }
>  
> -struct ksym *ksym_search(long key)
> +struct ksym *ksym_search(struct ksyms *ksyms, long key)
>  {
> -	int start = 0, end = sym_cnt;
> +	int start = 0, end = ksyms->sym_cnt;
>  	int result;
>  
> +	if (!ksyms)
> +		return NULL;
> +
>  	/* kallsyms not loaded. return NULL */
> -	if (sym_cnt <= 0)
> +	if (ksyms->sym_cnt <= 0)
>  		return NULL;
>  
>  	while (start < end) {
>  		size_t mid = start + (end - start) / 2;
>  
> -		result = key - syms[mid].addr;
> +		result = key - ksyms->syms[mid].addr;
>  		if (result < 0)
>  			end = mid;
>  		else if (result > 0)
>  			start = mid + 1;
>  		else
> -			return &syms[mid];
> +			return &ksyms->syms[mid];
>  	}
>  
> -	if (start >= 1 && syms[start - 1].addr < key &&
> -	    key < syms[start].addr)
> +	if (start >= 1 && ksyms->syms[start - 1].addr < key &&
> +	    key < ksyms->syms[start].addr)
>  		/* valid ksym */
> -		return &syms[start - 1];
> +		return &ksyms->syms[start - 1];
>  
>  	/* out of range. return _stext */
> -	return &syms[0];
> +	return &ksyms->syms[0];
>  }
>  
> -long ksym_get_addr(const char *name)
> +long ksym_get_addr(struct ksyms *ksyms, const char *name)
>  {
>  	int i;
>  
> -	for (i = 0; i < sym_cnt; i++) {
> -		if (strcmp(syms[i].name, name) == 0)
> -			return syms[i].addr;
> +	for (i = 0; i < ksyms->sym_cnt; i++) {
> +		if (strcmp(ksyms->syms[i].name, name) == 0)
> +			return ksyms->syms[i].addr;
>  	}
>  
>  	return 0;
> diff --git a/tools/testing/selftests/bpf/trace_helpers.h b/tools/testing/selftests/bpf/trace_helpers.h
> index 876f3e711df6..6be64f44dd76 100644
> --- a/tools/testing/selftests/bpf/trace_helpers.h
> +++ b/tools/testing/selftests/bpf/trace_helpers.h
> @@ -11,12 +11,14 @@ struct ksym {
>  	long addr;
>  	char *name;
>  };
> +struct ksyms;
>  
> -int load_kallsyms(void);
> -int load_kallsyms_refresh(void);
> +struct ksyms *load_kallsyms(void);
> +struct ksyms *load_kallsyms_refresh(struct ksyms *ksyms);
> +void free_kallsyms(struct ksyms *ksyms);
>  
> -struct ksym *ksym_search(long key);
> -long ksym_get_addr(const char *name);
> +struct ksym *ksym_search(struct ksyms *ksyms, long key);
> +long ksym_get_addr(struct ksyms *ksyms, const char *name);
>  
>  /* open kallsyms and find addresses on the fly, faster than load + search. */
>  int kallsyms_find(const char *sym, unsigned long long *addr);
> -- 
> 2.41.0
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ