Blame SOURCES/rhbz1643997.0015-tapset-bpf-conversions.stp-bugfix-helper-name-in-ker.patch

e4e640
From 4e9775b55b5ddd7447c100894ab816a849c2c8cc Mon Sep 17 00:00:00 2001
e4e640
From: Serhei Makarov <smakarov@redhat.com>
e4e640
Date: Tue, 30 Oct 2018 17:13:28 -0400
e4e640
Subject: [PATCH 15/32] tapset/bpf/conversions.stp bugfix :: helper name in
e4e640
 kernel_string(addr, err_msg)
e4e640
e4e640
---
e4e640
 tapset/bpf/conversions.stp | 4 ++--
e4e640
 1 file changed, 2 insertions(+), 2 deletions(-)
e4e640
e4e640
diff --git a/tapset/bpf/conversions.stp b/tapset/bpf/conversions.stp
e4e640
index 1140a6875..88d63b70a 100644
e4e640
--- a/tapset/bpf/conversions.stp
e4e640
+++ b/tapset/bpf/conversions.stp
e4e640
@@ -34,10 +34,10 @@ function kernel_string:string (addr:long, err_msg:string)
e4e640
 %{ /* bpf */ /* pure */
e4e640
   /* buf = bpf_stk_alloc(BPF_MAXSTRINGLEN);
e4e640
      buf[0] = 0x0; // guarantee NUL byte
e4e640
-     rc = bpf_probe_read_str(buf, n, addr); */
e4e640
+     rc = bpf_probe_read_str(buf, BPF_MAXSTRINGLEN, addr); */
e4e640
   alloc, $buf, BPF_MAXSTRINGLEN;
e4e640
   0x62, $buf, -, -, 0x0; /* stw [$buf+0], 0x0 -- guarantee NUL byte */
e4e640
-  call, $rc, bpf_probe_read_str, $buf, BPF_MAXSTRINGLEN, $addr;
e4e640
+  call, $rc, probe_read_str, $buf, BPF_MAXSTRINGLEN, $addr;
e4e640
 
e4e640
   /* if (rc < 0) return err_msg;
e4e640
      return buf; */
e4e640
-- 
e4e640
2.14.5
e4e640