[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEf4BzaxuWMDW5shE_LuAkHfy0rkbdd05t9QAtL4j9XPZ1_rYQ@mail.gmail.com>
Date: Tue, 31 Aug 2021 17:10:52 -0700
From: Andrii Nakryiko <andrii.nakryiko@...il.com>
To: Jiri Olsa <jolsa@...hat.com>
Cc: Alexei Starovoitov <ast@...nel.org>,
Daniel Borkmann <daniel@...earbox.net>,
Andrii Nakryiko <andriin@...com>,
"Steven Rostedt (VMware)" <rostedt@...dmis.org>,
Networking <netdev@...r.kernel.org>, bpf <bpf@...r.kernel.org>,
Martin KaFai Lau <kafai@...com>,
Song Liu <songliubraving@...com>, Yonghong Song <yhs@...com>,
John Fastabend <john.fastabend@...il.com>,
KP Singh <kpsingh@...omium.org>, Daniel Xu <dxu@...uu.xyz>,
Viktor Malik <vmalik@...hat.com>
Subject: Re: [PATCH bpf-next v4 20/27] libbpf: Add btf__find_by_glob_kind function
On Thu, Aug 26, 2021 at 12:41 PM Jiri Olsa <jolsa@...hat.com> wrote:
>
> Adding btf__find_by_glob_kind function that returns array of
> BTF ids that match given kind and allow/deny patterns.
>
> int btf__find_by_glob_kind(const struct btf *btf, __u32 kind,
> const char *allow_pattern,
> const char *deny_pattern,
> __u32 **__ids);
>
> The __ids array is allocated and needs to be manually freed.
>
> At the moment the supported pattern is '*' at the beginning or
> the end of the pattern.
>
> Kindly borrowed from retsnoop.
>
> Suggested-by: Andrii Nakryiko <andrii.nakryiko@...il.com>
> Signed-off-by: Jiri Olsa <jolsa@...nel.org>
> ---
> tools/lib/bpf/btf.c | 80 +++++++++++++++++++++++++++++++++++++++++++++
> tools/lib/bpf/btf.h | 3 ++
> 2 files changed, 83 insertions(+)
>
> diff --git a/tools/lib/bpf/btf.c b/tools/lib/bpf/btf.c
> index 77dc24d58302..5baaca6c3134 100644
> --- a/tools/lib/bpf/btf.c
> +++ b/tools/lib/bpf/btf.c
> @@ -711,6 +711,86 @@ __s32 btf__find_by_name_kind(const struct btf *btf, const char *type_name,
> return libbpf_err(-ENOENT);
> }
>
> +/* 'borrowed' from retsnoop */
> +static bool glob_matches(const char *glob, const char *s)
> +{
> + int n = strlen(glob);
> +
> + if (n == 1 && glob[0] == '*')
> + return true;
> +
> + if (glob[0] == '*' && glob[n - 1] == '*') {
> + const char *subs;
> + /* substring match */
> +
> + /* this is hacky, but we don't want to allocate for no good reason */
> + ((char *)glob)[n - 1] = '\0';
> + subs = strstr(s, glob + 1);
> + ((char *)glob)[n - 1] = '*';
> +
> + return subs != NULL;
> + } else if (glob[0] == '*') {
> + size_t nn = strlen(s);
> + /* suffix match */
> +
> + /* too short for a given suffix */
> + if (nn < n - 1)
> + return false;
> +
> + return strcmp(s + nn - (n - 1), glob + 1) == 0;
> + } else if (glob[n - 1] == '*') {
> + /* prefix match */
> + return strncmp(s, glob, n - 1) == 0;
> + } else {
> + /* exact match */
> + return strcmp(glob, s) == 0;
> + }
> +}
> +
> +int btf__find_by_glob_kind(const struct btf *btf, __u32 kind,
> + const char *allow_pattern, const char *deny_pattern,
> + __u32 **__ids)
> +{
> + __u32 i, nr_types = btf__get_nr_types(btf);
> + int cnt = 0, alloc = 0;
> + __u32 *ids = NULL;
> +
> + for (i = 1; i <= nr_types; i++) {
> + const struct btf_type *t = btf__type_by_id(btf, i);
> + bool match = false;
> + const char *name;
> + __u32 *p;
> +
> + if (btf_kind(t) != kind)
> + continue;
> + name = btf__name_by_offset(btf, t->name_off);
> + if (!name)
> + continue;
> +
> + if (allow_pattern && glob_matches(allow_pattern, name))
> + match = true;
> + if (deny_pattern && !glob_matches(deny_pattern, name))
> + match = true;
this is wrong, if it matches both deny and allow patterns, you'll
still pass it through. Drop the match flag, just check deny first and
`continue` if matches.
> + if (!match)
> + continue;
> +
> + if (cnt == alloc) {
> + alloc = max(100, alloc * 3 / 2);
nit: maybe start with something like 16?
> + p = realloc(ids, alloc * sizeof(__u32));
we have libbpf_reallocarray, please use it
> + if (!p) {
> + free(ids);
> + return -ENOMEM;
> + }
> + ids = p;
> + }
> + ids[cnt] = i;
> + cnt++;
> + }
> +
> + *__ids = ids;
> + return cnt ?: -ENOENT;
cnt == 0 means -ENOENT, basically, no? It's up to the application to
decide if that's an error, let's just return the number of matches,
i.e., zero.
> +}
> +
> static bool btf_is_modifiable(const struct btf *btf)
> {
> return (void *)btf->hdr != btf->raw_data;
> diff --git a/tools/lib/bpf/btf.h b/tools/lib/bpf/btf.h
> index 4a711f990904..b288211770c3 100644
> --- a/tools/lib/bpf/btf.h
> +++ b/tools/lib/bpf/btf.h
> @@ -396,6 +396,9 @@ btf_var_secinfos(const struct btf_type *t)
> return (struct btf_var_secinfo *)(t + 1);
> }
>
> +int btf__find_by_glob_kind(const struct btf *btf, __u32 kind,
> + const char *allow_pattern, const char *deny_pattern,
> + __u32 **__ids);
> #ifdef __cplusplus
> } /* extern "C" */
> #endif
> --
> 2.31.1
>
Powered by blists - more mailing lists