Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

perf build: Stop using __weak bpf_object__next_map() to handle older libbpf versions

By adding a feature test for bpf_object__next_map() and providing a fallback if
it isn't present in older versions of libbpf.

Committer testing:

$ rpm -q libbpf-devel
libbpf-devel-0.4.0-2.fc35.x86_64
$ make -C tools/perf LIBBPF_DYNAMIC=1 O=/tmp/build/perf install-bin
$ cat /tmp/build/perf/feature/test-libbpf-bpf_object__next_map.make.output
test-libbpf-bpf_object__next_map.c: In function ‘main’:
test-libbpf-bpf_object__next_map.c:6:9: error: implicit declaration of function ‘bpf_object__next_map’; did you mean ‘bpf_object__next’? [-Werror=implicit-function-declaration]
6 | bpf_object__next_map(NULL /* obj */, NULL /* prev */);
| ^~~~~~~~~~~~~~~~~~~~
| bpf_object__next
cc1: all warnings being treated as errors
$
$ objdump -dS /tmp/build/perf/perf | grep '<bpf_object__next_map>:' -A20
00000000005b2e00 <bpf_object__next_map>:
{
5b2e00: 55 push %rbp
5b2e01: 48 89 e5 mov %rsp,%rbp
5b2e04: 48 83 ec 10 sub $0x10,%rsp
5b2e08: 64 48 8b 04 25 28 00 mov %fs:0x28,%rax
5b2e0f: 00 00
5b2e11: 48 89 45 f8 mov %rax,-0x8(%rbp)
5b2e15: 31 c0 xor %eax,%eax
return bpf_map__next(prev, obj);
5b2e17: 48 8b 45 f8 mov -0x8(%rbp),%rax
5b2e1b: 64 48 2b 04 25 28 00 sub %fs:0x28,%rax
5b2e22: 00 00
5b2e24: 75 0f jne 5b2e35 <bpf_object__next_map+0x35>
}
5b2e26: c9 leave
5b2e27: 49 89 f8 mov %rdi,%r8
5b2e2a: 48 89 f7 mov %rsi,%rdi
return bpf_map__next(prev, obj);
5b2e2d: 4c 89 c6 mov %r8,%rsi
5b2e30: e9 cb b1 e5 ff jmp 40e000 <bpf_map__next@plt>
$

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
Tested-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Cc: Heiko Carstens <hca@linux.ibm.com>
Cc: Ian Rogers <irogers@google.com>
Cc: Ilya Leoshkevich <iii@linux.ibm.com>
Cc: Sumanth Korikkar <sumanthk@linux.ibm.com>
Cc: Sven Schnelle <svens@linux.ibm.com>
Cc: Thomas Richter <tmricht@linux.ibm.com>
Cc: Vasily Gorbik <gor@linux.ibm.com>
Link: http://lore.kernel.org/linux-perf-users/YozLKby7ITEtchC9@krava
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>

authored by

Jiri Olsa and committed by
Arnaldo Carvalho de Melo
739c9180 8916d725

+21 -1
+1
tools/build/Makefile.feature
··· 101 101 libbpf-btf__load_from_kernel_by_id \ 102 102 libbpf-bpf_prog_load \ 103 103 libbpf-bpf_object__next_program \ 104 + libbpf-bpf_object__next_map \ 104 105 libpfm4 \ 105 106 libdebuginfod \ 106 107 clang-bpf-co-re
+4
tools/build/feature/Makefile
··· 60 60 test-libbpf-btf__load_from_kernel_by_id.bin \ 61 61 test-libbpf-bpf_prog_load.bin \ 62 62 test-libbpf-bpf_object__next_program.bin \ 63 + test-libbpf-bpf_object__next_map.bin \ 63 64 test-get_cpuid.bin \ 64 65 test-sdt.bin \ 65 66 test-cxx.bin \ ··· 298 297 $(BUILD) -lbpf 299 298 300 299 $(OUTPUT)test-libbpf-bpf_object__next_program.bin: 300 + $(BUILD) -lbpf 301 + 302 + $(OUTPUT)test-libbpf-bpf_object__next_map.bin: 301 303 $(BUILD) -lbpf 302 304 303 305 $(OUTPUT)test-sdt.bin:
+8
tools/build/feature/test-libbpf-bpf_object__next_map.c
··· 1 + // SPDX-License-Identifier: GPL-2.0 2 + #include <bpf/libbpf.h> 3 + 4 + int main(void) 5 + { 6 + bpf_object__next_map(NULL /* obj */, NULL /* prev */); 7 + return 0; 8 + }
+5
tools/perf/Makefile.config
··· 581 581 ifeq ($(feature-libbpf-bpf_object__next_program), 1) 582 582 CFLAGS += -DHAVE_LIBBPF_BPF_OBJECT__NEXT_PROGRAM 583 583 endif 584 + $(call feature_check,libbpf-bpf_object__next_map) 585 + ifeq ($(feature-libbpf-bpf_object__next_map), 1) 586 + CFLAGS += -DHAVE_LIBBPF_BPF_OBJECT__NEXT_MAP 587 + endif 584 588 else 585 589 dummy := $(error Error: No libbpf devel library found, please install libbpf-devel); 586 590 endif ··· 592 588 CFLAGS += -DHAVE_LIBBPF_BTF__LOAD_FROM_KERNEL_BY_ID 593 589 CFLAGS += -DHAVE_LIBBPF_BPF_PROG_LOAD 594 590 CFLAGS += -DHAVE_LIBBPF_BPF_OBJECT__NEXT_PROGRAM 591 + CFLAGS += -DHAVE_LIBBPF_BPF_OBJECT__NEXT_MAP 595 592 endif 596 593 endif 597 594
+3 -1
tools/perf/util/bpf-event.c
··· 61 61 } 62 62 #endif 63 63 64 - struct bpf_map * __weak 64 + #ifndef HAVE_LIBBPF_BPF_OBJECT__NEXT_MAP 65 + struct bpf_map * 65 66 bpf_object__next_map(const struct bpf_object *obj, const struct bpf_map *prev) 66 67 { 67 68 #pragma GCC diagnostic push ··· 70 69 return bpf_map__next(prev, obj); 71 70 #pragma GCC diagnostic pop 72 71 } 72 + #endif 73 73 74 74 const void * __weak 75 75 btf__raw_data(const struct btf *btf_ro, __u32 *size)