Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp5505819pxj; Wed, 26 May 2021 12:08:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxOqcDAVFgoR6hbwmbqDCuW4PMC+xkdAkABhcCDjDP1+ttmJfo7uXAo/lRp9W02QGF9+yvT X-Received: by 2002:aa7:cd55:: with SMTP id v21mr40266554edw.344.1622056113741; Wed, 26 May 2021 12:08:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622056113; cv=none; d=google.com; s=arc-20160816; b=JEvo5iJNngp5SRQMUYeYPdZnnjmhukURQfVhlpXJLA2Vy/9qs+egKqnzmNYBadexZ6 diMYDfqgNefe0CBbqz3qiQbwVpqnc/4wDL3SWiaOY9Kns7Jxv7E85U3ZNGDBmaCNvlRp nGyhLYfB/vDOZESVcvd1Ck3n2h9eBlN2KdydgDgbrhvc0tUMKdGmL3MoOZm24oDAifkC pzeHgj+5URsMQdNxelHKyp5oUsgFXm8+28qKihJN2XJ0JKmDbQbTr/9i4NcKC08LZTaK 9bBF0Dc5AwbcErE+qZ3H17ioMkkpmhBOl0fV5+15vzmCKmqkq3ng6YlKSq5viEywn25s iwXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=oboUZq0zA1lLeO/aKIPmZ0lOKXyY5wuhOqnQI3+E4XY=; b=JiHEAbhUmR5TFo4H5IcjVbdoMKkhFJTkHlEW7cB8dqfbZfL8CEjXbCqNt08V4bZzNq p79OJ1R7Cbp0Xp2aW3ou3V7J8mwvzINUZpQHhGd9lM+ylR+R/avH+JWSGgYs4eGywkMI josNjX4Btx3r38xThCYw3yUFOAB+20R0cdCnw4o8i6aVmoNl82B0gVLkjW0BpBxxf9cU lENmIFRn2JNngZgzS0uD3fTBi1Qp1HYu9DhZBIGxUGtHvzvfNSP5W/tCJLnh6f55MbDq z5pQKK6jtQ/HNU6LpaW7tGoiiv75o3IBGYQDlG+OscJVl0+H/zc1VbVAN3McRLNba2UU rZRA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=lrwBF36O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b5si187216eju.507.2021.05.26.12.08.03; Wed, 26 May 2021 12:08:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=lrwBF36O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233054AbhEZQgE (ORCPT + 99 others); Wed, 26 May 2021 12:36:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33912 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234348AbhEZQgC (ORCPT ); Wed, 26 May 2021 12:36:02 -0400 Received: from mail-yb1-xb2d.google.com (mail-yb1-xb2d.google.com [IPv6:2607:f8b0:4864:20::b2d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E4CC1C061574; Wed, 26 May 2021 09:34:30 -0700 (PDT) Received: by mail-yb1-xb2d.google.com with SMTP id b13so2905456ybk.4; Wed, 26 May 2021 09:34:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=oboUZq0zA1lLeO/aKIPmZ0lOKXyY5wuhOqnQI3+E4XY=; b=lrwBF36OIGwZ7ESvibiu7dqe+PeJr/jKmEmBzZuOJujwInS7ZVet9HXLB/yQFQunlK iSkoWX4PNlztCCBApgiFE0jtznOA7RstvQW8yDNuUq1VHzpOKCv6MSXhDeXXY7TfBAKw 4B5Btszz+4VnwUBJLd+P9uRo2gGxSLE7HDfAYWhvxNZpSrldba7Y65DjHjKz2Wr9MO8Y exte0jva59f2hvlGpa2Bm0b0+Fw44q8LAoRXx+axgAyjOmomqcKleYyQRgeBtMEFj79V nRFxfdVf5bzENWGh/BfEhHT4hcJYhseRb0aQCNPJj55CXhONoD80zwujOROgyOH/qbTr YhIw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=oboUZq0zA1lLeO/aKIPmZ0lOKXyY5wuhOqnQI3+E4XY=; b=lKFDn6vCnZpBsUv8vTuGOnUcfKgz3k/RttTFjO6AMirGjPLmuXVP7Mw0Nf3YyJX9rL 3tFUnVm5ORnj9083B4FVF0XEB+BKhLzOrmi78beC2CW9DPtvnv5QB+miDevFgoJKAMTO yOsnjbr+wc27PFck0seSSv/xjhvZpb/7jehoa8aokn9gA+C7R24itMSOOO7fQjHmhP/q +ba2mP9KtHfJ1Zn44EKIOtXLG853RBYSBW/aVbpj+bOa5AwoUm8wxBn3dXWpiO+OdroR t3T803QRX785Rb04Rq+/YSN1vzpFUsbv7CQ+IzXRe0xRNsDobLnim12JvAB81AxOrSJA uJvQ== X-Gm-Message-State: AOAM533df7bojmI2j8Z5KqAdbH5rPumlAsiWYqxE5XeFiDMdcpm3z/zp ASrNX5H1zr2ziHR91YONL+OGsVeiTTePq5EaHMg= X-Received: by 2002:a25:ba06:: with SMTP id t6mr49612596ybg.459.1622046870139; Wed, 26 May 2021 09:34:30 -0700 (PDT) MIME-Version: 1.0 References: <20210525201825.2729018-1-revest@chromium.org> In-Reply-To: <20210525201825.2729018-1-revest@chromium.org> From: Andrii Nakryiko Date: Wed, 26 May 2021 09:34:19 -0700 Message-ID: Subject: Re: [PATCH bpf v2] libbpf: Move BPF_SEQ_PRINTF and BPF_SNPRINTF to bpf_helpers.h To: Florent Revest Cc: bpf , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , KP Singh , Brendan Jackman , open list Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 25, 2021 at 1:18 PM Florent Revest wrote: > > These macros are convenient wrappers around the bpf_seq_printf and > bpf_snprintf helpers. They are currently provided by bpf_tracing.h which > targets low level tracing primitives. bpf_helpers.h is a better fit. > > The __bpf_narg and __bpf_apply macros are needed in both files so > provided twice and guarded by ifndefs. > > Reported-by: Andrii Nakryiko > Signed-off-by: Florent Revest > --- > kernel/bpf/preload/iterators/iterators.bpf.c | 1 - > tools/lib/bpf/bpf_helpers.h | 70 +++++++++++++++++++ > tools/lib/bpf/bpf_tracing.h | 62 +++------------- > .../bpf/progs/bpf_iter_bpf_hash_map.c | 1 - > .../selftests/bpf/progs/bpf_iter_bpf_map.c | 1 - > .../selftests/bpf/progs/bpf_iter_ipv6_route.c | 1 - > .../selftests/bpf/progs/bpf_iter_netlink.c | 1 - > .../selftests/bpf/progs/bpf_iter_task.c | 1 - > .../selftests/bpf/progs/bpf_iter_task_btf.c | 1 - > .../selftests/bpf/progs/bpf_iter_task_file.c | 1 - > .../selftests/bpf/progs/bpf_iter_task_stack.c | 1 - > .../selftests/bpf/progs/bpf_iter_task_vma.c | 1 - > .../selftests/bpf/progs/bpf_iter_tcp4.c | 1 - > .../selftests/bpf/progs/bpf_iter_tcp6.c | 1 - > .../selftests/bpf/progs/bpf_iter_udp4.c | 1 - > .../selftests/bpf/progs/bpf_iter_udp6.c | 1 - > .../selftests/bpf/progs/test_snprintf.c | 1 - > 17 files changed, 80 insertions(+), 67 deletions(-) > > diff --git a/kernel/bpf/preload/iterators/iterators.bpf.c b/kernel/bpf/preload/iterators/iterators.bpf.c > index 52aa7b38e8b8..03af863314ea 100644 > --- a/kernel/bpf/preload/iterators/iterators.bpf.c > +++ b/kernel/bpf/preload/iterators/iterators.bpf.c > @@ -2,7 +2,6 @@ > /* Copyright (c) 2020 Facebook */ > #include > #include > -#include > #include > > #pragma clang attribute push (__attribute__((preserve_access_index)), apply_to = record) > diff --git a/tools/lib/bpf/bpf_helpers.h b/tools/lib/bpf/bpf_helpers.h > index 9720dc0b4605..68d992b30f26 100644 > --- a/tools/lib/bpf/bpf_helpers.h > +++ b/tools/lib/bpf/bpf_helpers.h > @@ -158,4 +158,74 @@ enum libbpf_tristate { > #define __kconfig __attribute__((section(".kconfig"))) > #define __ksym __attribute__((section(".ksyms"))) > > +#ifndef ___bpf_concat > +#define ___bpf_concat(a, b) a ## b > +#endif > +#ifndef ___bpf_apply > +#define ___bpf_apply(fn, n) ___bpf_concat(fn, n) > +#endif > +#ifndef ___bpf_nth > +#define ___bpf_nth(_, _1, _2, _3, _4, _5, _6, _7, _8, _9, _a, _b, _c, N, ...) N > +#endif > +#ifndef ___bpf_narg > +#define ___bpf_narg(...) \ > + ___bpf_nth(_, ##__VA_ARGS__, 12, 11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0) > +#endif > +#ifndef ___bpf_empty > +#define ___bpf_empty(...) \ > + ___bpf_nth(_, ##__VA_ARGS__, N, N, N, N, N, N, N, N, N, N, 0) > +#endif ___bpf_empty doesn't seem to be used, let's remove it for now? Otherwise it looks good. > + > +#define ___bpf_fill0(arr, p, x) do {} while (0) > +#define ___bpf_fill1(arr, p, x) arr[p] = x > +#define ___bpf_fill2(arr, p, x, args...) arr[p] = x; ___bpf_fill1(arr, p + 1, args) > +#define ___bpf_fill3(arr, p, x, args...) arr[p] = x; ___bpf_fill2(arr, p + 1, args) > +#define ___bpf_fill4(arr, p, x, args...) arr[p] = x; ___bpf_fill3(arr, p + 1, args) > +#define ___bpf_fill5(arr, p, x, args...) arr[p] = x; ___bpf_fill4(arr, p + 1, args) > +#define ___bpf_fill6(arr, p, x, args...) arr[p] = x; ___bpf_fill5(arr, p + 1, args) > +#define ___bpf_fill7(arr, p, x, args...) arr[p] = x; ___bpf_fill6(arr, p + 1, args) > +#define ___bpf_fill8(arr, p, x, args...) arr[p] = x; ___bpf_fill7(arr, p + 1, args) > +#define ___bpf_fill9(arr, p, x, args...) arr[p] = x; ___bpf_fill8(arr, p + 1, args) > +#define ___bpf_fill10(arr, p, x, args...) arr[p] = x; ___bpf_fill9(arr, p + 1, args) > +#define ___bpf_fill11(arr, p, x, args...) arr[p] = x; ___bpf_fill10(arr, p + 1, args) > +#define ___bpf_fill12(arr, p, x, args...) arr[p] = x; ___bpf_fill11(arr, p + 1, args) > +#define ___bpf_fill(arr, args...) \ > + ___bpf_apply(___bpf_fill, ___bpf_narg(args))(arr, 0, args) > + [...]