From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.8 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7C5C5C43603 for ; Thu, 12 Dec 2019 18:43:39 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 544DA206DA for ; Thu, 12 Dec 2019 18:43:39 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=netronome-com.20150623.gappssmtp.com header.i=@netronome-com.20150623.gappssmtp.com header.b="ABRb/h4S" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730467AbfLLSni (ORCPT ); Thu, 12 Dec 2019 13:43:38 -0500 Received: from mail-pf1-f175.google.com ([209.85.210.175]:36328 "EHLO mail-pf1-f175.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730406AbfLLSni (ORCPT ); Thu, 12 Dec 2019 13:43:38 -0500 Received: by mail-pf1-f175.google.com with SMTP id x184so1243741pfb.3 for ; Thu, 12 Dec 2019 10:43:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netronome-com.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:in-reply-to:references :organization:mime-version:content-transfer-encoding; bh=fEIPg/nQz4H3SkrhOeevoDfxx5kg6oJ1sVD3wkmZeI0=; b=ABRb/h4SFCN15IlJ59pRxlKmFUVBRkKSP6xEkKHRgMqwZqw8UpadE/n46IhjBKm0xI Hw1BTt6v5y/rIocXnccHBkGIZVICyVqoz7xSWV3uvQoQCugmlWIqMOnOZYzBrg5cUpmG 0+5vBkHOKMxEjtmzhGa3uzOdCsXMc7nOlFLXDOzzplMSDchmHph+zrBYze+a5cBo+LX2 ymnHRs8Jc2JLBOi7lFmdClxmXEtdYs8rvZ5Bap2HczqawwPjhm47w2r/96Lb/IiRn55+ Vc8URDEpeNvnjiUsCGI37gERHaXpJDwJbNcy+GHI8WYirzeS+z/DZdl/KAJQzyYcmXDj q2vw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:in-reply-to :references:organization:mime-version:content-transfer-encoding; bh=fEIPg/nQz4H3SkrhOeevoDfxx5kg6oJ1sVD3wkmZeI0=; b=frNn/HqwX8+lkQbkcjZI69z0O0tEHD7uE+8kZvVrKjf8u53pHtMKyII1OOAM+wOkQQ UZ8goYWGow6TodYUPZxx4/YEKWVQVzdsDzRrohf3r3IhDZQ5t4iWWy1lAyJHZKPDGQoR W1U4MaeSb5eCaMmM2cndSMw1xXZQK8h9WtV1vww6sLRnj9WWStHgVdoQhgjw/R6UE6QR bDYj5Pa0vR1ltUcL8ZSOOq7rUafh663xFKFE02hbsVDoAib18c5nrmzu0XznNOFzOUll Y8Q3zOeP+1RbpUms8naM3pjNBUwALC3N0zGXBQtNNQaEYH6xiGVqOjvZkvLUWesYkRLf AvNA== X-Gm-Message-State: APjAAAXHE12u7fIzS56OZ0UPddd7a1ZOOVWHLMTouqOu6SMtsXFbtpUZ 7azaMcvQMo9XYJYLaoGTTSkyOA== X-Google-Smtp-Source: APXvYqyVlBeifCyE3IO6vVv8sLrUbg/iyOye4wEh0A4o2JqPV+oWytkfEMTm0IaR5HFgRNwZljzrVg== X-Received: by 2002:a62:1742:: with SMTP id 63mr11114346pfx.231.1576176217889; Thu, 12 Dec 2019 10:43:37 -0800 (PST) Received: from cakuba.netronome.com ([66.60.152.14]) by smtp.gmail.com with ESMTPSA id j14sm7532044pgs.57.2019.12.12.10.43.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 12 Dec 2019 10:43:37 -0800 (PST) Date: Thu, 12 Dec 2019 10:43:34 -0800 From: Jakub Kicinski To: Andrii Nakryiko Cc: Stanislav Fomichev , Andrii Nakryiko , LKML , bpf , Networking , Alexei Starovoitov , Daniel Borkmann , Kernel Team Subject: Re: [PATCH bpf-next 11/15] bpftool: add skeleton codegen command Message-ID: <20191212104334.222552a1@cakuba.netronome.com> In-Reply-To: References: <20191210225900.GB3105713@mini-arch> <20191211172432.GC3105713@mini-arch> <20191211191518.GD3105713@mini-arch> <20191211200924.GE3105713@mini-arch> <20191212025735.GK3105713@mini-arch> <20191212162953.GM3105713@mini-arch> Organization: Netronome Systems, Ltd. MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: bpf-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org On Thu, 12 Dec 2019 08:53:22 -0800, Andrii Nakryiko wrote: > > > > Btw, how hard it would be to do this generation with a new python > > > > script instead of bpftool? Something along the lines of > > > > scripts/bpf_helpers_doc.py that parses BTF and spits out this C header > > > > (shouldn't be that hard to write custom BTF parser in python, right)? > > > > > > > > > > Not impossible, but harder than I'd care to deal with. I certainly > > > don't want to re-implement a good chunk of ELF and BTF parsing (maps, > > > progs, in addition to datasec stuff). But "it's hard to use bpftool in > > > our build system" doesn't seem like good enough reason to do all that. > > You can replace "our build system" with some other project you care about, > > like systemd. They'd have the same problem with vendoring in recent enough > > bpftool or waiting for every distro to do it. And all this work is > > because you think that doing: > > > > my_obj->rodata->my_var = 123; > > > > Is easier / more type safe than doing: > > int *my_var = bpf_object__rodata_lookup(obj, "my_var"); > > *my_var = 123; > > Your arguments are confusing me. Did I say that we shouldn't add this > type of "dynamic" interface to variables? Or did I say that every > single BPF application has to adopt skeleton and bpftool? I made no > such claims and it seems like discussion is just based around where I > have to apply my time and efforts... You think it's not useful - don't > integrate bpftool into your build system, simple as that. Skeleton is > used for selftests, but it's up to maintainers to decide whether to > keep this, similar to all the BTF decisions. Since we have two people suggesting this functionality to be a separate tool could you please reconsider my arguments from two days ago? There absolutely nothing this tool needs from [bpftool], no JSON needed, no bpffs etc. It can be a separate tool like libbpf-skel-gen or libbpf-c-skel or something, distributed with libbpf. That way you can actually soften the backward compat. In case people become dependent on it they can carry that little tool on their own. I'd honestly leave the distro packaging problem for people who actually work on that to complain about.