Received: by 10.223.185.116 with SMTP id b49csp6677231wrg; Wed, 28 Feb 2018 13:33:24 -0800 (PST) X-Google-Smtp-Source: AH8x225xSgzHJsK+gp5PepnT6PFe8dEEu4zoew5cWPYS5UwP2Y/nlRZJ6YxskCXk9zlF1q/MPE7X X-Received: by 2002:a17:902:57db:: with SMTP id g27-v6mr19008858plj.75.1519853604628; Wed, 28 Feb 2018 13:33:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519853604; cv=none; d=google.com; s=arc-20160816; b=oIFgs2MkvBbGJGNxlAY77P7Gt9PG9aspF3y4tl7hczuPr1jkHZXt00zVz2+KB/+XfW EOd/xniW9CnRkYj+udPC27CwAHhA1O8CiQoL+qlBbQGpbBwXMTxmMD0Q0wdYvbXV1AmJ w2N7aFApmIkHf9JtzIQr6qHaA+SZhbbMRFqmhAZVV3jxpCJkNjbm8M7/bnbbCK2qUmyX 29//rkA1WudJcp0IvD8BrEgBi61OCSxcIpNsd7C8moQgj9V3i1xfYI0kGs3bbia7w1PF SHC5qDAFCh4KR6OmL4mVzWV1N+4jHY7SYM0fi4oFIKLr3bmq9K2BNCV3JCq10ds7RvIR p61w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:arc-authentication-results; bh=vx+OQwNDfg7u62aHlIa6DCE9zDDxok125W1DFP5hA2A=; b=JaOVTik7WeyA70Vz9SsZUkrK4qnyVyYYnuWusOtBhKvyLO8kOuJ909ODScCws1cZrB qclCR/UupQ/Olb3X/GZEa3WpYtu4Hg2y+HFUmeAHQ71qfxeUHebLGQTFY6EqO3+gyhZB joFh4CxO7bJynR+oP7pFC3GfcIWhkG7OzfeXLIG89FjJnA72Ot3mI0cFRCQwzvxq97eb cfJaAniS8D1BPFRXshn1+dGViuvjDlaiDz1yIMQHsYs43p2mvnEvlcz20WsbQFSxkqSt 9f0dfpCfBsui+icE4lmDU0CZqn8eIGTP6nq9xr0XH56DrI5CiclR4S3L8Lrr+wr5afK1 PvAg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o33-v6si1854185plb.772.2018.02.28.13.33.09; Wed, 28 Feb 2018 13:33:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935109AbeB1Vbn (ORCPT + 99 others); Wed, 28 Feb 2018 16:31:43 -0500 Received: from www62.your-server.de ([213.133.104.62]:58395 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934866AbeB1Vbk (ORCPT ); Wed, 28 Feb 2018 16:31:40 -0500 Received: from [194.230.159.193] (helo=localhost.localdomain) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-SHA:256) (Exim 4.85_2) (envelope-from ) id 1er9Jw-0006v6-TC; Wed, 28 Feb 2018 22:31:28 +0100 Subject: Re: [PATCH] selftests/bpf: Add bpf_probe_read_str to bpf_helpers.h To: Tushar Dave , ast@kernel.org, shuah@kernel.org, netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org References: <1519778024-3113-1-git-send-email-tushar.n.dave@oracle.com> <1d72361e-e8a7-38e0-16db-ade3f658ce92@iogearbox.net> From: Daniel Borkmann Message-ID: <916737aa-6b2b-b207-a1ed-4751c8deca3b@iogearbox.net> Date: Wed, 28 Feb 2018 22:31:17 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.99.3/24353/Wed Feb 28 19:32:08 2018) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/28/2018 10:28 PM, Tushar Dave wrote: > On 02/28/2018 08:57 AM, Daniel Borkmann wrote: >> Hi Tushar, >> >> On 02/28/2018 01:33 AM, Tushar Dave wrote: >>> Using bpf_probe_read_str() from samples/bpf causes compiler warning. >>> e.g. >>> warning: implicit declaration of function 'bpf_probe_read_str' is invalid in C99 >>>        [-Wimplicit-function-declaration] >>>          num = bpf_probe_read_str(buf, sizeof(buf), ctx->di); >>>                ^ >>> 1 warning generated. >>> >>> Add bpf_probe_read_str() to bpf_helpers.h so it can be used by >>> samples/bpf programs. >>> >>> Signed-off-by: Tushar Dave >> >> In general no objections to it, but it would need an in-tree >> user first: >> >> $ git grep -n bpf_probe_read_str tools/ >> tools/include/uapi/linux/bpf.h:596: * int bpf_probe_read_str(void *dst, int size, const void *unsafe_ptr) >> $ >> >> Why not adding this along with a sample? > Okay, I will send new patch along with new sample or add usage of > bpf_probe_read_str() in one of our exiting sample :) Sounds great, the latter is totally fine as well. :-) Thanks, Daniel