Received: by 10.213.65.68 with SMTP id h4csp1400863imn; Wed, 21 Mar 2018 09:46:11 -0700 (PDT) X-Google-Smtp-Source: AG47ELsmV7MHpEHtuOxNG44VQQi6hfcGwiGyJ8+qYnxLBpxHrinDmWIhhiob/fA+HlYK8WWGSmsj X-Received: by 2002:a17:902:5501:: with SMTP id f1-v6mr21143864pli.50.1521650770960; Wed, 21 Mar 2018 09:46:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521650770; cv=none; d=google.com; s=arc-20160816; b=TEZwnuuKLtH/dm0z/hLloegE8iq9Qa+/TFfokh6E0qpIR01IpZONngWAKYkHemzIwJ JadizSdRxKK6MNNm9AjBM/0+qN3qFUj2/G2XuscXPTajqta08RpdmL/7tQqG6H/U4Skv fwfX4KM2CtAmJkSOqCgf822T3yu3hVOGMsHhb0ZRSgEdj9vJtLQztz3elsr+GViHvUD5 gEUvj7rdxUVxQ3Bu5Cs+vroTRzlxXsAO5/ZK2TPCsOIEieA1PCIE/831ktxQpkaurmLU 6yWDKUXRPDQ4i6zIwnGwSQwSflgkGT6knnI2qZEYcjUb7nmcthDSfx4T1vbiTMy0S4lj rW2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=6DY7C7uocJLnXRC2eieMYwLDF03eExQ2TIGlzZQ3RMU=; b=ZB65wLsfFSfKUYsyVhSPXZXYjXl3Kmf967AWLpHG1LzYjj20rxE3dj7cPCYvWSLd7w 8IzviniZu4IqaiE5/j1tnIBKCyZ1xuTtfu+zoXjCQDRD6f3Js3Igxd4Xr0TzhgpJHeur r8Q2745LDo4r6I2j/QY9m1lcJ2NUlkmuavtJo3/w+UWt81RN/5QIP9AU+51rZjAo8X06 A7p14y0HJ3PNGxWaOc/Axf3mRG/GJkJgivrXrlLCvVl0BDhemVj3kmW5XB4bTUEnJDG0 B+Th2cpqAriO5OlHcoLfZ2EVBrkgHKwqgP9H08LvZYjvhtpy2Cpi+/cWS4uuqgPoxNOS G2dA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r63-v6si4246028plb.289.2018.03.21.09.45.56; Wed, 21 Mar 2018 09:46:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751824AbeCUQpG (ORCPT + 99 others); Wed, 21 Mar 2018 12:45:06 -0400 Received: from www62.your-server.de ([213.133.104.62]:59462 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751854AbeCUQo4 (ORCPT ); Wed, 21 Mar 2018 12:44:56 -0400 Received: from [62.202.221.10] (helo=linux.home) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-SHA:256) (Exim 4.85_2) (envelope-from ) id 1eygr7-0001ie-0P; Wed, 21 Mar 2018 17:44:53 +0100 Subject: Re: [PATCH 2/2] bpftool: Adjust to new print_bpf_insn interface To: Jiri Olsa , Quentin Monnet Cc: Jiri Olsa , Alexei Starovoitov , lkml , netdev@vger.kernel.org References: <20180321150212.5586-1-jolsa@kernel.org> <20180321150212.5586-2-jolsa@kernel.org> <20180321164324.GD2707@krava> From: Daniel Borkmann Message-ID: <774f0eca-72cf-1c70-e025-beea2084ebe0@iogearbox.net> Date: Wed, 21 Mar 2018 17:44:52 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <20180321164324.GD2707@krava> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.99.3/24407/Wed Mar 21 13:24:41 2018) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03/21/2018 05:43 PM, Jiri Olsa wrote: > On Wed, Mar 21, 2018 at 04:39:09PM +0000, Quentin Monnet wrote: >> 2018-03-21 16:02 UTC+0100 ~ Jiri Olsa >>> Change bpftool to skip the removed struct bpf_verifier_env >>> argument in print_bpf_insn. It was passed as NULL anyway. >>> >>> No functional change intended. >>> >>> Signed-off-by: Jiri Olsa >>> --- >>> tools/bpf/bpftool/prog.c | 8 ++++---- >>> 1 file changed, 4 insertions(+), 4 deletions(-) >>> >>> diff --git a/tools/bpf/bpftool/prog.c b/tools/bpf/bpftool/prog.c >>> index e549e329be82..108001d974ee 100644 >>> --- a/tools/bpf/bpftool/prog.c >>> +++ b/tools/bpf/bpftool/prog.c >>> @@ -489,7 +489,7 @@ static struct kernel_sym *kernel_syms_search(struct dump_data *dd, >>> sizeof(*dd->sym_mapping), kernel_syms_cmp) : NULL; >>> } >>> >>> -static void print_insn(struct bpf_verifier_env *env, const char *fmt, ...) >>> +static void print_insn(void *private_data, const char *fmt, ...) >>> { >>> va_list args; >>> >>> @@ -576,7 +576,7 @@ static void dump_xlated_plain(struct dump_data *dd, void *buf, >>> double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW); >>> >>> printf("% 4d: ", i); >>> - print_bpf_insn(&cbs, NULL, insn + i, true); >>> + print_bpf_insn(&cbs, insn + i, true); >>> >>> if (opcodes) { >>> printf(" "); >>> @@ -590,7 +590,7 @@ static void dump_xlated_plain(struct dump_data *dd, void *buf, >>> } >>> } >>> >>> -static void print_insn_json(struct bpf_verifier_env *env, const char *fmt, ...) >>> +static void print_insn_json(void *private_data, const char *fmt, ...) >>> { >>> unsigned int l = strlen(fmt); >>> char chomped_fmt[l]; >>> @@ -628,7 +628,7 @@ static void dump_xlated_json(struct dump_data *dd, void *buf, >>> >>> jsonw_start_object(json_wtr); >>> jsonw_name(json_wtr, "disasm"); >>> - print_bpf_insn(&cbs, NULL, insn + i, true); >>> + print_bpf_insn(&cbs, insn + i, true); >>> >>> if (opcodes) { >>> jsonw_name(json_wtr, "opcodes"); >>> >> >> Hi Jiri, this code has changed in the tree. It was moved to >> tools/bpf/bpftool/xlated_dumper.c, and there is now a third function to >> update: print_insn_for_graph(). Could you please rebase the patch? > > sure.. I was over perf tree, I'll check on bpf tree Just to be sure, it should be bpf-next. bpf is for fixes only. Thanks, Daniel