Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp4677253rdh; Wed, 29 Nov 2023 07:47:56 -0800 (PST) X-Google-Smtp-Source: AGHT+IE7w6Ghv7PRbp4GBfbP5u0Fg+RXBwStJJPq+5rHAKitAp40b115Jd7NxXgfeiTBEx9rcF27 X-Received: by 2002:a17:90b:180c:b0:285:adb0:de3e with SMTP id lw12-20020a17090b180c00b00285adb0de3emr14904049pjb.34.1701272876067; Wed, 29 Nov 2023 07:47:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701272876; cv=none; d=google.com; s=arc-20160816; b=eLUUJcouMBJ64rouu41oZXL+60QaZBwYsDmUPf0MZhqVDF4x9hGQDKWumvodU5D/kt MN4Rl5RIX1nt7aORY6J9qfDC9fjLl9Psem9RWncQwiFnsviS3Fa0SAebw4xbxANUtwA0 r384obFwwhJkvQ+k7E9h8HMpF6KQiCot4TqPLVXkGzp3TErXiryhdfg5L0gjB/AOrBm8 CjWYdVkcbw1xTbhqSgbppTlROT4rCWDolcU/OsqZFa5yPhKlzExpOd0wWNhuOoPE8AAy Zv4LrfW3zkc+/4AbBTMSR4oezTGH1FK+2EWaaydN3O9IwZ7AkGpq6ZXKi1OLA3rvgbI/ MVvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=MpzPfEX1Zkj2719RKp5EmMu6IDz7u+uFuBKGdKU09Ck=; fh=WV/Q3i1Afu2/5+m7Cvf6T+31EFLAkJ0ICROXGgKcdPA=; b=mrb/BDMDicwO2t9fQ2Hy6znB1Gnpkuev/rLxwsHaLdh2E2WyEbDqTjEkJopFp9caCU 73BC+ESy297m91wH3Hf7fsmSnIwcK9hPkigS0ynZ1lSwkEFSE4d8JZ1d4rTZr3YSe6yZ 1Zcehlpd0stXie9fnQnmtU8ejgikfDPcXoo0ZPWZ2UGDQ17L2knSB78HTdBBKCLhvGdZ 5XwAvcrsyswj8Aq9fqBFs+nKecIM/HdAxCpzppJL8sQIU2I+RITKFQpnznpKZK0JWfOT o8ReCVG+zGZzcbaad/uemN0r0yFnL+JPr/4uPdxytkOldltmlFCZ4Nnwdwbb24PCmPv9 Jhgg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="VA1aly/F"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from morse.vger.email (morse.vger.email. [23.128.96.31]) by mx.google.com with ESMTPS id b1-20020a170902a9c100b001cfda41729esi5625965plr.364.2023.11.29.07.47.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 29 Nov 2023 07:47:56 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) client-ip=23.128.96.31; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="VA1aly/F"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id B3D188079B02; Wed, 29 Nov 2023 07:47:52 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234971AbjK2Pri (ORCPT + 99 others); Wed, 29 Nov 2023 10:47:38 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35232 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235001AbjK2Pr2 (ORCPT ); Wed, 29 Nov 2023 10:47:28 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 04E78D48 for ; Wed, 29 Nov 2023 07:47:34 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 64C68C433CC; Wed, 29 Nov 2023 15:47:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1701272854; bh=FaUbZPDs3dt6xgm6CO9qGb61yKAwRh5X/pwZrBp62xQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VA1aly/Fp3gSP7LuZ7/s+dY+PMxJDAQaobgrt25L9Z2lj9nKsxjpPMhA4rxS9xxaA RwW+biJB+8E0Q2gMYVyOM0fc7v3XJTbW+MGqzxQzcxInr0Uh5lAzNU2upoQSScrtn4 /4Yy64W9X7bjutY3VQjCvJ/QWQKBqFohG/zGEZgheOe252paZPs/5L/cu13aVU01mh YGXSal/qgNGpGrxJFYSTNYDzt7khvS3NW6QwwgAs8HL2DVz9sWbcEwvRoqnBCRs9aA CHEP/29AHa7JECcA/V5lpHveTi/s9KDmsVqCQYJBm7hSXlbxquaA1Zr/p/z8EHUNlW 6CNgEh42SOmnA== From: Arnaldo Carvalho de Melo To: Namhyung Kim Cc: Ingo Molnar , Thomas Gleixner , Jiri Olsa , Ian Rogers , Adrian Hunter , Clark Williams , Kate Carcia , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, Arnaldo Carvalho de Melo Subject: [PATCH 1/2] perf test sigtrap: Generalize the BTF routine to reuse it in this test Date: Wed, 29 Nov 2023 12:47:17 -0300 Message-ID: <20231129154718.326330-2-acme@kernel.org> X-Mailer: git-send-email 2.41.0 In-Reply-To: <20231129154718.326330-1-acme@kernel.org> References: <20231129154718.326330-1-acme@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Wed, 29 Nov 2023 07:47:52 -0800 (PST) From: Arnaldo Carvalho de Melo Move the part that loads the BTF info to a "btf__available()" that will lazy load the BTF info so that if we need it for some other test, which we will in the following cset, we can reuse it. At some point this will move from this specific 'perf test' entry to be used in other parts of perf, do it when needed. Cc: Adrian Hunter Cc: Ian Rogers Cc: Jiri Olsa Cc: Namhyung Kim Signed-off-by: Arnaldo Carvalho de Melo --- tools/perf/tests/sigtrap.c | 60 +++++++++++++++++++++++++------------- 1 file changed, 40 insertions(+), 20 deletions(-) diff --git a/tools/perf/tests/sigtrap.c b/tools/perf/tests/sigtrap.c index 1de7478ec1894d77..a1bc7c776254ed2f 100644 --- a/tools/perf/tests/sigtrap.c +++ b/tools/perf/tests/sigtrap.c @@ -57,36 +57,51 @@ static struct perf_event_attr make_event_attr(void) #ifdef HAVE_BPF_SKEL #include -static bool attr_has_sigtrap(void) +static struct btf *btf; + +static bool btf__available(void) { - bool ret = false; - struct btf *btf; - const struct btf_type *t; + if (btf == NULL) + btf = btf__load_vmlinux_btf(); + + return btf != NULL; +} + +static void btf__exit(void) +{ + btf__free(btf); + btf = NULL; +} + +static const struct btf_member *__btf_type__find_member_by_name(int type_id, const char *member_name) +{ + const struct btf_type *t = btf__type_by_id(btf, type_id); const struct btf_member *m; - const char *name; - int i, id; + int i; + + for (i = 0, m = btf_members(t); i < btf_vlen(t); i++, m++) { + const char *current_member_name = btf__name_by_offset(btf, m->name_off); + if (!strcmp(current_member_name, member_name)) + return m; + } + + return NULL; +} + +static bool attr_has_sigtrap(void) +{ + int id; - btf = btf__load_vmlinux_btf(); - if (btf == NULL) { + if (!btf__available()) { /* should be an old kernel */ return false; } id = btf__find_by_name_kind(btf, "perf_event_attr", BTF_KIND_STRUCT); if (id < 0) - goto out; + return false; - t = btf__type_by_id(btf, id); - for (i = 0, m = btf_members(t); i < btf_vlen(t); i++, m++) { - name = btf__name_by_offset(btf, m->name_off); - if (!strcmp(name, "sigtrap")) { - ret = true; - break; - } - } -out: - btf__free(btf); - return ret; + return __btf_type__find_member_by_name(id, "sigtrap") != NULL; } #else /* !HAVE_BPF_SKEL */ static bool attr_has_sigtrap(void) @@ -109,6 +124,10 @@ static bool attr_has_sigtrap(void) return ret; } + +static void btf__exit(void) +{ +} #endif /* HAVE_BPF_SKEL */ static void @@ -221,6 +240,7 @@ static int test__sigtrap(struct test_suite *test __maybe_unused, int subtest __m sigaction(SIGTRAP, &oldact, NULL); out: pthread_barrier_destroy(&barrier); + btf__exit(); return ret; } -- 2.41.0