Received: by 10.223.185.116 with SMTP id b49csp5589594wrg; Tue, 27 Feb 2018 16:36:55 -0800 (PST) X-Google-Smtp-Source: AH8x2252R3hSnKImbaVfAwH4WMANqd++cG39/YucfRbV0ef/oBu1YgeyeKx2AbLEdA5kyxJ+MJdF X-Received: by 10.99.180.3 with SMTP id s3mr12614710pgf.258.1519778215822; Tue, 27 Feb 2018 16:36:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519778215; cv=none; d=google.com; s=arc-20160816; b=vEWqg+Rc7vCivSzsZSUjKR0u+yQN+PDG5xzGV384e1StE9jzOqHdoBtSDNOtHHI8L9 oOUHs918hrv3uEYFnJQCkFaoXqJe2WrugwlT7WEeZ91qeBHAOi81xgWyYElFKo/Yeo8K Dm9IBQNWf5lFC7hCbm+VuQzHphsp5uwJ+xwdAEad0kQmS/7K5ZTC/rw7NI64OHOg05Rx ZITfGGq9KruFNbT5hUmrCtjPWNQFVZi8YnLuz1rvb4YryoPW3MlZJ6qMfAzGhPmEfNmk QUjMpPA3ugBysrjrovBdn/u5+oml8Jr1viMTDhH6BZICb9NKQFRsLKAVAsfLOxGWGzkz p/+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:to:from :dkim-signature:arc-authentication-results; bh=fC9uIpAGRJiT28efpxsnVrS62IF22DVhH0lr0mtjGZE=; b=NowBQbaPDnnBQ8Uf2PAmXclLPHiugYrHrvM/V/6DHS/wSsn6mNPNckJU/jWt8CHBqj hyLbrxN/B783nsNtVEaFN62WV544jVDJozEAL0xCfxEL4dZOtth4uq7zntxFIyu4m48K bcC7hE922dZw4DUr/97ld0BvnHTM14Aoxdvh6gJIqwpNW3luiHgAghQVt4lPhV7t7nTd lqvwdN1K6sPR7hZ+pzxP1RsGxHo701De1eO6lbr+WOeLjk38JnafFNJ+So2BfMl+nK5p 5d1P+InhTnN/TxVzmjRDGsmAiDdbjBtZbK8gDvGMT5qerwVc40KeLKRFLR+BV23o8Gpe cTOg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=j+om2wOH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y73-v6si310916plh.49.2018.02.27.16.36.28; Tue, 27 Feb 2018 16:36:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=j+om2wOH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751675AbeB1Af3 (ORCPT + 99 others); Tue, 27 Feb 2018 19:35:29 -0500 Received: from userp2130.oracle.com ([156.151.31.86]:36174 "EHLO userp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751117AbeB1Af2 (ORCPT ); Tue, 27 Feb 2018 19:35:28 -0500 Received: from pps.filterd (userp2130.oracle.com [127.0.0.1]) by userp2130.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w1S0RXOF028216; Wed, 28 Feb 2018 00:34:25 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : subject : date : message-id; s=corp-2017-10-26; bh=fC9uIpAGRJiT28efpxsnVrS62IF22DVhH0lr0mtjGZE=; b=j+om2wOHIt7eCNpI0Oor40H1Df/EowfhraPTp4flTMxcbd2Z/6ZBfDsd+i81qg1TtEjz o7Ge2tVu6fdA5NJzLREv/TVUccTjgQECc0mQlk8b89pFdo2QJj8Mf+e2nW6m31NkN0Y9 EcTd3/JbJc70J+XQ2W3YzrTUX4b3AB82TUXZ89x2qe6Gv19kOLECNH2+optP9b/mSBmO V/QKLFSwZD2WTo9N01AMY308RR3A/MIAerKebUMl3G/V7EbCZbBrKICX0OZrFsEkSTgW yUcoUJx5OwjCi7aGf0vptcL4DGwJzKBZfwMW/kqwtMqun+yiRyi38G0lq4KG7UotOV9z /A== Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by userp2130.oracle.com with ESMTP id 2gdgpk87ad-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 28 Feb 2018 00:34:24 +0000 Received: from aserv0121.oracle.com (aserv0121.oracle.com [141.146.126.235]) by aserv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w1S0YNef005296 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 28 Feb 2018 00:34:23 GMT Received: from abhmp0005.oracle.com (abhmp0005.oracle.com [141.146.116.11]) by aserv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w1S0YN1w021111; Wed, 28 Feb 2018 00:34:23 GMT Received: from tndave-linux.us.oracle.com (/10.159.159.181) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 27 Feb 2018 16:34:23 -0800 From: Tushar Dave To: ast@kernel.org, daniel@iogearbox.net, shuah@kernel.org, netdev@vger.kernel.org, linux-selftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] selftests/bpf: Add bpf_probe_read_str to bpf_helpers.h Date: Tue, 27 Feb 2018 16:33:44 -0800 Message-Id: <1519778024-3113-1-git-send-email-tushar.n.dave@oracle.com> X-Mailer: git-send-email 1.9.1 X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8817 signatures=668681 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=954 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1802280004 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Using bpf_probe_read_str() from samples/bpf causes compiler warning. e.g. warning: implicit declaration of function 'bpf_probe_read_str' is invalid in C99 [-Wimplicit-function-declaration] num = bpf_probe_read_str(buf, sizeof(buf), ctx->di); ^ 1 warning generated. Add bpf_probe_read_str() to bpf_helpers.h so it can be used by samples/bpf programs. Signed-off-by: Tushar Dave --- tools/testing/selftests/bpf/bpf_helpers.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/tools/testing/selftests/bpf/bpf_helpers.h b/tools/testing/selftests/bpf/bpf_helpers.h index dde2c11..65a266d 100644 --- a/tools/testing/selftests/bpf/bpf_helpers.h +++ b/tools/testing/selftests/bpf/bpf_helpers.h @@ -65,6 +65,8 @@ static int (*bpf_xdp_adjust_head)(void *ctx, int offset) = (void *) BPF_FUNC_xdp_adjust_head; static int (*bpf_xdp_adjust_meta)(void *ctx, int offset) = (void *) BPF_FUNC_xdp_adjust_meta; +static int (*bpf_probe_read_str)(void *dst, int size, void *unsafe_ptr) = + (void *) BPF_FUNC_probe_read_str; static int (*bpf_setsockopt)(void *ctx, int level, int optname, void *optval, int optlen) = (void *) BPF_FUNC_setsockopt; -- 1.9.1