Received: by 2002:ac0:a874:0:0:0:0:0 with SMTP id c49csp435077ima; Fri, 15 Mar 2019 06:15:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqz/oZAAohGUfUfKPuyse3kGQu1MDdVY8VrQwn0W3gHm2o8ozwceS9tWIKD5lx2b+pXHYEEB X-Received: by 2002:a17:902:e90b:: with SMTP id cs11mr4088607plb.197.1552655709247; Fri, 15 Mar 2019 06:15:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552655709; cv=none; d=google.com; s=arc-20160816; b=0AtpxntdzwdIvHpzXEWOEck+motAZG0VJLQbcjrRsTjUCZg8Z6hcNWEsJc+vxwMcn0 PlGC6H8itdhFtGCGWJbq4nwhs2i1NXFZAXXOWBfA4ym7x+R+uGHCmPeQArAksvHcct/Y tvoSGbfya1qZashDUclrICRjdYXi4i3InWGJng3sxpdOrd/b+TmwLMTeqDOkQu8rhtvd iXwmYn2XU9YnBj1gH/24SjNKvGczRcfmiU12qJD1004x9rc7ElKYupBc66PaB3TunfjS /vobjVzBkM2Q6TuJDNDsRVGoW0sg12iTnD2Z7yLnGNh/GmVbGFPhQEUPdgcdZGF899aa 9IYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=2yYvlsYL7IMKPJqgFMCEVnaLXUcnQ0XzP0t5p3JccKE=; b=VbCOOBKFUnn3rSIaHXNK76q3c3gHxJmr2h3D4IDHj3gIdzxhosRGI4ZPkHp8mZYcB2 GXdbVATtwQQ+m5y/axOjez5JCEXVlaAgScWuI3g0juh+0cPNSMMFfrLcUg8BoDc9txJC plJ65ciyQrAeh+OaGfZn4ZbVOoUaUySc0Mc/xeQXQL6gdjb1UBWZSvhVt57u1CO12XSu JzEYpndHiqqxtfuhHnHTcudL9yWe9FP6PaDukUoGGM4mXOKoZUlDqfpbXZHDgtoc0FBg 3Ck4rkKUxcPZmPu5AJ609h30oJ2/wtNEja8XArJNQFdKwjVRacAsU870c88bjaTsKJd3 mHrA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="JD/Y36s/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i31si1899405pgi.284.2019.03.15.06.14.54; Fri, 15 Mar 2019 06:15:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="JD/Y36s/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729077AbfCONOR (ORCPT + 99 others); Fri, 15 Mar 2019 09:14:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:47594 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726875AbfCONOQ (ORCPT ); Fri, 15 Mar 2019 09:14:16 -0400 Received: from devnote2 (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D1DD021871; Fri, 15 Mar 2019 13:14:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552655656; bh=IEpUyL36q8/726NLraqLaGuCSWvp+z1d0IVNkmrGaZc=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=JD/Y36s/ANTZMHwjoVQs98Vc/TdnjKZpxOrd3o8Q5CWbWoEO2OrnHTYQNWf61qD70 QGkzLqvrc9wQunN+3VCCesWkBmuthUsgfLPj2uR4SvrSk38oQPGArH4KmmwgVYePyi bk3S668CcIIgN1QzQLPPn/u+ZkKOY+u2e2b3YWAU= Date: Fri, 15 Mar 2019 22:14:07 +0900 From: Masami Hiramatsu To: Joel Fernandes Cc: Steven Rostedt , Daniel Colascione , Karim Yaghmour , Geert Uytterhoeven , Greg KH , LKML , Andrew Morton , Alexei Starovoitov , atish patra , Dan Williams , Dietmar Eggemann , Guenter Roeck , Jonathan Corbet , Kees Cook , Android Kernel Team , "open list:DOCUMENTATION" , "open list:KERNEL SELFTEST FRAMEWORK" , linux-trace-devel@vger.kernel.org, Manoj Rao , Masahiro Yamada , Qais Yousef , Randy Dunlap , Shuah Khan , Yonghong Song Subject: Re: [PATCH v4 1/2] Provide in-kernel headers for making it easy to extend the kernel Message-Id: <20190315221407.790154f634fc5fc084d7bf15@kernel.org> In-Reply-To: <20190314122748.GA101545@google.com> References: <20190309121141.GA30173@kroah.com> <3e84e1ef-e266-e983-5874-6c26ac7f38b8@opersys.com> <20190311193612.4f09bf11@oasis.local.home> <20190312003912.GA170478@google.com> <20190311212823.60684182@oasis.local.home> <20190313101843.800dd8d6a9babb635580ebdc@kernel.org> <20190314122748.GA101545@google.com> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 14 Mar 2019 08:27:48 -0400 Joel Fernandes wrote: > > But the eBPF is based on kprobe-events. What kind of usage would you > > expected? (with macros??) > > eBPF C programs are compiled with kernel headers. They can execute inline > functions or refer to macros in the kernel headers. They are similar to > kernel modules where you build a C program that then later is executed in > kernel context. It goes through the whole compiler pipeline. This is slightly > different usage from pure kprobe-events. Also eBPF kprobe programs need > LINUX_VERSION_CODE (or similarly named) macro which it provides to the bpf(2) > syscall when loading kprobe programs. This is because eBPF implementation in > the kernel checks if the eBPF programs that use kprobes are being loaded > against the right kernel. Ah, I got it. It's similar to SystemTap. :) Thank you, -- Masami Hiramatsu