From patchwork Thu Sep 5 11:03:05 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lin Yikai X-Patchwork-Id: 13792162 X-Patchwork-Delegate: bpf@iogearbox.net Received: from APC01-PSA-obe.outbound.protection.outlook.com (mail-psaapc01on2088.outbound.protection.outlook.com [40.107.255.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E7E3F195B37; Thu, 5 Sep 2024 11:04:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.255.88 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725534278; cv=fail; b=QNhAYssUe3aHOEF+uOQPglIfBi2brcPx/SiW3T/2K6d2trepKhG/OLfZKpALEgHbVxf13BRbPRfvgYRLU04q9HbqT9LxhETXL/QeriJGc/E+mkjtYDrM6aurJEW+dtdeoIs5anccSvj3Mum0OLXkyOqmc16MWhAhvpG5GZ4Ab4c= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725534278; c=relaxed/simple; bh=Y8cbrZhKDiBbffZt/Sm9VRDP2YyDhSxiAUCxSwZFL7Y=; h=From:To:Cc:Subject:Date:Message-Id:Content-Type:MIME-Version; b=i35EPO48ESuDaGf/hIMhPyFPOS8ojGbvOYU8x9y0NFQrhQTtrrS6SnXXcmvrK3K3Srr3HBZsR76mJ1Z5nMzalUqtK3NCZEqSb8yWH4HUfPbeCkBWAJ7k4NQWKxkoXFzeRqdXYD0uXEMaRha15wdJUozlWpv7PbzCecPvGEMaQ7U= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=vivo.com; spf=pass smtp.mailfrom=vivo.com; dkim=pass (2048-bit key) header.d=vivo.com header.i=@vivo.com header.b=Lii7ks4N; arc=fail smtp.client-ip=40.107.255.88 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=vivo.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=vivo.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=vivo.com header.i=@vivo.com header.b="Lii7ks4N" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Z7gymBM4Nz64/vuvmmWcqwXTgG6ujpVGkJQFygAqqt4Y7Ma8KDO5XxTHOK/iYzUDcYTrlpakxhS7lwyBmNF3zVESezsV6wyhTPKpmypo+xLeyGJY7doI6EF/dl95f5l5bzE60IsWluigrpD3rgmOOHcXVLDQiga5w9gxvgxmMeIci0bCj///NgMhx+X8eTJA6T0p9jbSIe+LqEvyq/6ugwDd46WoUkSaOMOnr+buU509SSQ6ACi3HX6T6kRn+7B+NhCEFcMP2OuvUllFu4EOpQnsoqYfy0lpAjWEFR9HidGim3wol7VNvRK/QrvSK9TEQSo2FU/aV7ZFMtQ4ImwFrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qekFtgrulpb4pTETi1Bg7MPv7KaVvQTe45XPu1nP9QY=; b=GVYT/OI+zBZ33LFNjMIdYYPz3cHhoWWP0G66Dt6asWK+ptPdrKLMxF9yVO0HgEvP+o984adXGqfl/jcew8QWBD9aRA0gha3WoZsiIDI8C5a9gxTS+Ql667zjjHGdUZcDaEjSg7c1ljq2So52ugrL9YNQXoijLGQc+cOqDApzOFLPoJp+SpD+juVfrDkcBp9QL2/nCQsS2zN//sMBjQAWlAESSSQXyCnz1EfbPpCe0nvyuY2A+BuLLPw8/P1R+RLYH7wGWqPK1LKL6FLddRAiLPL9CI+w5axgP+1ztNRAqrEqKpqzukhwIy0nClsa5uaQbKKzfaZG4tdmecregqPMjA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=vivo.com; dmarc=pass action=none header.from=vivo.com; dkim=pass header.d=vivo.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vivo.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qekFtgrulpb4pTETi1Bg7MPv7KaVvQTe45XPu1nP9QY=; b=Lii7ks4Ng+JbUR8RogCHVFHKz2hqAm0Ppd3a8fYLwsG+B7VM4pyPfJDeQMPjJsomScS7YOGoNuVHGZf0+yoPjuQ+6YW/rg5NdyXu1L1H9wpf4TNif37PdNrEEqES/Cm+j47L8Kk56Cs59tiDYuywAvs9PZxq7zAw/DxzQn3ipr7DPSdvfGrN86WjsGDuYm6lu0oYlEleOqjqmmSoB5MJHPZ68hu8N4OAR6Zuu0QxV46fvxr2yiF++VaR84s8pFNP+MeOWssfe/a6xmfusqhhLludXpPcWLHi/NI0RPCa+Fee7rWxdN0qpI7JjRr7keCJb0jffy/iXGGkn1i9SK/4Fw== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=vivo.com; Received: from KL1PR0601MB4324.apcprd06.prod.outlook.com (2603:1096:820:73::6) by SEZPR06MB6138.apcprd06.prod.outlook.com (2603:1096:101:eb::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7918.28; Thu, 5 Sep 2024 11:04:26 +0000 Received: from KL1PR0601MB4324.apcprd06.prod.outlook.com ([fe80::f8ee:b41e:af25:202]) by KL1PR0601MB4324.apcprd06.prod.outlook.com ([fe80::f8ee:b41e:af25:202%7]) with mapi id 15.20.7918.024; Thu, 5 Sep 2024 11:04:26 +0000 From: Lin Yikai To: bpf@vger.kernel.org Cc: opensource.kernel@vivo.com, yikai.lin@vivo.com, Quentin Monnet , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan , Nathan Chancellor , Nick Desaulniers , Bill Wendling , Justin Stitt , Rameez Rehman , Kui-Feng Lee , Alan Maguire , Yuran Pereira , Jordan Rome , Chuyi Zhou , Dave Marchevsky , Menglong Dong , Tony Ambardar , Nikolay Aleksandrov , Geliang Tang , Abhishek Chauhan , Hou Tao , Ilya Leoshkevich , "Jose E. Marchesi" , Shung-Hsi Yu , David Vernet , linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, llvm@lists.linux.dev Subject: [PATCH bpf-next v1 1/3] selftests/bpf: fix some typos in selftests Date: Thu, 5 Sep 2024 19:03:05 +0800 Message-Id: <20240905110354.3274546-1-yikai.lin@vivo.com> X-Mailer: git-send-email 2.34.1 X-ClientProxiedBy: SI2PR01CA0036.apcprd01.prod.exchangelabs.com (2603:1096:4:192::22) To KL1PR0601MB4324.apcprd06.prod.outlook.com (2603:1096:820:73::6) Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: KL1PR0601MB4324:EE_|SEZPR06MB6138:EE_ X-MS-Office365-Filtering-Correlation-Id: f4111582-3870-412a-9436-08dccd9a817c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|7416014|376014|52116014|38350700014; X-Microsoft-Antispam-Message-Info: =?utf-8?q?98xrOpZpnTQrsFc/fyc335VqmDadLCC?= =?utf-8?q?JQoHmY9UiTMntTJDiK+mfJci9rohb8Uevi4DHTUmS4IrEIPKTvFo69iTSP/zxrT3V?= =?utf-8?q?vj3MisX+mN15PusFVPGY+9rF2ImxJw/bT9l2hkLmPqIlwhv9Wk5rnRG39Z8u+Cjdy?= =?utf-8?q?Mx9ChGSpewugwgWipIq+5Tbo77ovKUZCFwu+emDzrtDxVXdY+FaiJHCWbeoWkQONq?= =?utf-8?q?R/sq5JTF6twFFpb1/tXgbAIqzjoRVPuB7TldCx87Y5aoKmh1WkBsPjEDhnr3AEBxx?= =?utf-8?q?uLJhEyajvfiOLKCvl4sguvBipGyn3I24sTOsVmzglxY5Lkji9v/B8xppS2OyaczJ2?= =?utf-8?q?ez6jTXqRWTuwgbQFZiF5uuSz5miOiKfsqJf/R/L6VM/DMyIrq9FGUkgl+QEG5jnDd?= =?utf-8?q?Ys5ti//qvAkSWLI6KFQ2ba+f1TcIQLI1Ry7Ghn0m2JKHiJ/FdhCSimuNElFeHgLdN?= =?utf-8?q?etq8w25xVgJ3tFk6p0oS3kL6mexQaVkavFp1zqPRy7+C2Nl67Fysi5m0cFecIPKWD?= =?utf-8?q?wE5OVXAdcnrtzu8DEW3Ca7wSnHMmaAevPSnN/IwsNPSc9W5vojgBGDAOHZ4DgzPsD?= =?utf-8?q?zF/cFS4pkGRktkVlOrro58rMfEyQgiUk9fDIpERCKVjV2ZLTqp7pVH7qaW38xptoz?= =?utf-8?q?SaEED4RpZBzqDMIp6ZQOlzqbB0uALO1LoBwNr4rPzILMneqikKzhxDfEZnr8fMYGy?= =?utf-8?q?4oQG372Jf/suea7AUs+gU3HXtLhlbvplHjjTtOH3ykGrlO2ZNZZ9UfwYgDHipHGWT?= =?utf-8?q?viUsAj840M5JdJoED5+cgYlFCdNOdQ4NSLvkwlgMyndnpAmv1xs91NOHXimQqsfaS?= =?utf-8?q?ITlafIOxaVpo33UHxhWhcW58dNTO/hHXdE3AIRhqfFvWGjSr1F6Zj8bvjBY8cc7zy?= =?utf-8?q?GNZSU265/x6s6jGMCOQ+XELWy3e9MK8nflQFIp9o3gCq5RrzsFPOvkWZ1K5r4j/so?= =?utf-8?q?xU3RPpLBQzYAjo20w6TwoijR1trMKzqSEKbF/WSWFd1J6I2rK3WkoGMZx5DXbdNFq?= =?utf-8?q?Pa/tUzozABF8c7+rxG3IPg2ODe/8DnXDZA94wOB1/g7mh8Kdo//d2zumsZ4yyJMY2?= =?utf-8?q?0FcMcDfAhqj9S2tN26wSILOfWwxw6jkk2uYNxVOWmzFGGlt/Mscbc0tgL8qOIvUUS?= =?utf-8?q?XleEmwvlQ/QAdnJMVFPuGJVr0/Io2dgMiM++nA5arOgLJGd9XOkSxdNVT4IWprTfG?= =?utf-8?q?DJb5QYHxL25QD1Xjff75WZ2nnjOZdmKFs9UB/BvkfH/L6+WrUHjs54xPHczcC4UeF?= =?utf-8?q?AatvjMUJJpb69GnfWeELwIfriwiatiKdDNIpKcsTerzRj8QTaaWm6joo7AMCw6Wlm?= =?utf-8?q?EeDOiAggsetWwbTVFZ80/4TeyfN2Wfoymg=3D=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:KL1PR0601MB4324.apcprd06.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(7416014)(376014)(52116014)(38350700014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?g+TLzQHrE91rn20d6NN0wFK9cC7B?= =?utf-8?q?c/JZPcuhKmOqiKj7t7mYVY8XnnD85IM5gWx4anOe1CihR8m8G9z7OI4PB/vBmsy8w?= =?utf-8?q?oTmejFB9ASXEJ2S/MTBBxd5ZOwyzLRszWg1dqHrDa3rFq76F6PlZl4BMYpDwyQSiv?= =?utf-8?q?Lcag20LIJv/O734KTstkl6oD/vYTFLq1CCcFZ0k6AB778At05oWgr1ZdYVwetTC0C?= =?utf-8?q?OtYFsj/dxQ+J8gIDvqtyAjYhtJaF4Yjl3OgKiXDmB3MUKYEFM6B8ai2Jxq3wcDjH+?= =?utf-8?q?9yDbkF7Sm5LOOkGat4ASK4bf/0xDuqAuxaI/wwtzaFq5Ak4VfdDwoyCl9lrbFt9ur?= =?utf-8?q?XcRNYzME+nmF1Bya1YRkG1B0UzrrhooOewQQqvww6GCml7wr/FLD5olR6v3P7rtqH?= =?utf-8?q?CzZ1lY9+ba9JPDTpp+bMm6+0e0TV0t6W9HyNJmxVZ50UH3EyKatWBsAXmbbU6JjNw?= =?utf-8?q?h+LSuJrYLEfnGqILUI8dfke3QRMRLnd+XgS6JqAVP0OrGEjbw7ArlUAvuc0aIHZA9?= =?utf-8?q?OtPW+Ac8YCDiLcaBI5+bl/pRHCSzaGUUorXwCt6CW9OHr5TjEykiQ8jM35iIQPw2N?= =?utf-8?q?FCwaEUFIyv+KnmylcG9mqmYot+aNvSWmG8iw01ixNfGMLGebmHKiFUFIslMC+hWVa?= =?utf-8?q?yPbuodbniGaAsqp4GpN5/ekSiSL2i6HWZ8V1z5EwsyQ6p8Z8MLVjKOaPx0dUqY/3k?= =?utf-8?q?NbpcPRyOq8LlkGIV3w1YFlGJMPsuFSZlTFlhGc95sfWXytMEzlWskc9D7F78OvHUb?= =?utf-8?q?QtpHoFx+dSk5pVDPwEm7WYvoBCcXkMGjWkyZPAFchJDl7196R8f7ETU+Eyrpd5KVW?= =?utf-8?q?hSBIhurTl/3v0Ci8lKi+C766bP8Z1tr3Tnpt3D+bIA69UCJHcOwgAdr1sVpL+WO+Y?= =?utf-8?q?vYpGgUaFgtpt9cxQb0IttwHHM72KabcSqK2KxES+0cAfsNzJplGaO3C17ASQmaD2e?= =?utf-8?q?+ZZQbFCFx+/dSKZvt0DTxO6ybDIEH48rLS+dHFHegF05jMyhBZTjzRAKN5QCcf4yc?= =?utf-8?q?6o+KRX+d0LV5/Es4BO3CQtcIpg57VJ4uYMbuKGZ358KWt1nQF8HabzJkl7S3QeMZC?= =?utf-8?q?TgCLZG1Spu7Mv5Z5mxwQ7tFR1SXCMckzQIS9mjkhXjGAU4R2QPPUh/WC0UZltIGkI?= =?utf-8?q?sKcHKPTEejoZjxjUmc3VQ0+JUUKm8JdBovh2x7pYSY7UtoYyM7COzhrkOhrsAwbA7?= =?utf-8?q?5A8MdtLKy+CETen/fpw4cwfL9rDjLNd1//ooLpYSrbws0KFK4v+LY3v/9WIeasVzD?= =?utf-8?q?WtERnZ5tyxwGy8/rKi4+X/Cbw49wGfoatWP+KamAKGiU1GbB4WkfRulDHG3CqV+33?= =?utf-8?q?dEo1P3ziWyJu+N/x2rAWq4ge7Yj48yDG3TpXqMzl6jJ7PWFmgu/bmXlXZas8LjGd6?= =?utf-8?q?b7+8Py91UbGq0+0GU45Uu8npdeLtU5lJbu8pF6DEzNW/7WDwTY51A6spFT2Xm2J2k?= =?utf-8?q?Yjo3xAmoXB7qPEzCWERyDNf9QMaWtBHpGalRstE0hd9XDWK9k+6wu6dkUZzUb0JIa?= =?utf-8?q?CyD1Ee6VpH7W?= X-OriginatorOrg: vivo.com X-MS-Exchange-CrossTenant-Network-Message-Id: f4111582-3870-412a-9436-08dccd9a817c X-MS-Exchange-CrossTenant-AuthSource: KL1PR0601MB4324.apcprd06.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Sep 2024 11:04:26.2628 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 923e42dc-48d5-4cbe-b582-1a797a6412ed X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: awf34xJx8xEBZ4TPEpFUOYr+iijc6Cl5sjXxTg0VaI52V4R8QsJ8+G89/ArFsta703sJlqU5RG0UBXRwCWFnvw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SEZPR06MB6138 X-Patchwork-Delegate: bpf@iogearbox.net Hi, fix some spelling errors in selftest, the details are as follows: -in the codes: test_bpf_sk_stoarge_map_iter_fd(void) ->test_bpf_sk_storage_map_iter_fd(void) load BTF from btf_data.o->load BTF from btf_data.bpf.o -in the code comments: preample->preamble multi-contollers->multi-controllers errono->errno unsighed/unsinged->unsigned egree->egress shoud->should regsiter->register assummed->assumed conditiona->conditional rougly->roughly timetamp->timestamp ingores->ignores null-termainted->null-terminated slepable->sleepable implemenation->implementation veriables->variables timetamps->timestamps substitue a costant->substitute a constant secton->section unreferened->unreferenced verifer->verifier libppf->libbpf ... Signed-off-by: Lin Yikai --- tools/testing/selftests/bpf/benchs/bench_trigger.c | 2 +- tools/testing/selftests/bpf/cgroup_helpers.c | 2 +- .../selftests/bpf/map_tests/htab_map_batch_ops.c | 2 +- .../bpf/map_tests/lpm_trie_map_batch_ops.c | 2 +- tools/testing/selftests/bpf/prog_tests/bpf_iter.c | 4 ++-- tools/testing/selftests/bpf/prog_tests/btf.c | 6 +++--- .../selftests/bpf/prog_tests/cg_storage_multi.c | 2 +- tools/testing/selftests/bpf/prog_tests/log_buf.c | 4 ++-- .../testing/selftests/bpf/prog_tests/reg_bounds.c | 14 +++++++------- .../selftests/bpf/prog_tests/resolve_btfids.c | 2 +- .../testing/selftests/bpf/prog_tests/tc_redirect.c | 2 +- .../selftests/bpf/prog_tests/test_bprm_opts.c | 2 +- .../selftests/bpf/prog_tests/test_strncmp.c | 2 +- tools/testing/selftests/bpf/prog_tests/token.c | 4 ++-- .../selftests/bpf/prog_tests/uprobe_multi_test.c | 2 +- .../selftests/bpf/prog_tests/user_ringbuf.c | 2 +- tools/testing/selftests/bpf/progs/bpf_cubic.c | 6 +++--- tools/testing/selftests/bpf/progs/strobemeta.h | 4 ++-- .../selftests/bpf/progs/test_cls_redirect_dynptr.c | 2 +- .../selftests/bpf/progs/test_core_read_macros.c | 2 +- .../selftests/bpf/progs/test_global_func15.c | 2 +- .../selftests/bpf/progs/test_global_map_resize.c | 2 +- tools/testing/selftests/bpf/test_maps.c | 2 +- tools/testing/selftests/bpf/test_progs.c | 2 +- tools/testing/selftests/bpf/verifier/map_kptr.c | 2 +- 25 files changed, 39 insertions(+), 39 deletions(-) diff --git a/tools/testing/selftests/bpf/benchs/bench_trigger.c b/tools/testing/selftests/bpf/benchs/bench_trigger.c index a220545a3238..2ed0ef6f21ee 100644 --- a/tools/testing/selftests/bpf/benchs/bench_trigger.c +++ b/tools/testing/selftests/bpf/benchs/bench_trigger.c @@ -276,7 +276,7 @@ static void trigger_rawtp_setup(void) * instructions. So use two different targets, one of which starts with nop * and another doesn't. * - * GCC doesn't generate stack setup preample for these functions due to them + * GCC doesn't generate stack setup preamble for these functions due to them * having no input arguments and doing nothing in the body. */ __nocf_check __weak void uprobe_target_nop(void) diff --git a/tools/testing/selftests/bpf/cgroup_helpers.c b/tools/testing/selftests/bpf/cgroup_helpers.c index 23bb9a9e6a7d..e4535451322e 100644 --- a/tools/testing/selftests/bpf/cgroup_helpers.c +++ b/tools/testing/selftests/bpf/cgroup_helpers.c @@ -644,7 +644,7 @@ unsigned long long get_classid_cgroup_id(void) /** * get_cgroup1_hierarchy_id - Retrieves the ID of a cgroup1 hierarchy from the cgroup1 subsys name. * @subsys_name: The cgroup1 subsys name, which can be retrieved from /proc/self/cgroup. It can be - * a named cgroup like "name=systemd", a controller name like "net_cls", or multi-contollers like + * a named cgroup like "name=systemd", a controller name like "net_cls", or multi-controllers like * "net_cls,net_prio". */ int get_cgroup1_hierarchy_id(const char *subsys_name) diff --git a/tools/testing/selftests/bpf/map_tests/htab_map_batch_ops.c b/tools/testing/selftests/bpf/map_tests/htab_map_batch_ops.c index 1230ccf90128..5da493b94ae2 100644 --- a/tools/testing/selftests/bpf/map_tests/htab_map_batch_ops.c +++ b/tools/testing/selftests/bpf/map_tests/htab_map_batch_ops.c @@ -197,7 +197,7 @@ void __test_map_lookup_and_delete_batch(bool is_pcpu) CHECK(total != max_entries, "delete with steps", "total = %u, max_entries = %u\n", total, max_entries); - /* check map is empty, errono == ENOENT */ + /* check map is empty, errno == ENOENT */ err = bpf_map_get_next_key(map_fd, NULL, &key); CHECK(!err || errno != ENOENT, "bpf_map_get_next_key()", "error: %s\n", strerror(errno)); diff --git a/tools/testing/selftests/bpf/map_tests/lpm_trie_map_batch_ops.c b/tools/testing/selftests/bpf/map_tests/lpm_trie_map_batch_ops.c index b66d56ddb7ef..fe3e19f96244 100644 --- a/tools/testing/selftests/bpf/map_tests/lpm_trie_map_batch_ops.c +++ b/tools/testing/selftests/bpf/map_tests/lpm_trie_map_batch_ops.c @@ -135,7 +135,7 @@ void test_lpm_trie_map_batch_ops(void) CHECK(total != max_entries, "delete with steps", "total = %u, max_entries = %u\n", total, max_entries); - /* check map is empty, errono == ENOENT */ + /* check map is empty, errno == ENOENT */ err = bpf_map_get_next_key(map_fd, NULL, &key); CHECK(!err || errno != ENOENT, "bpf_map_get_next_key()", "error: %s\n", strerror(errno)); diff --git a/tools/testing/selftests/bpf/prog_tests/bpf_iter.c b/tools/testing/selftests/bpf/prog_tests/bpf_iter.c index 618af9dfae9b..52e6f7570475 100644 --- a/tools/testing/selftests/bpf/prog_tests/bpf_iter.c +++ b/tools/testing/selftests/bpf/prog_tests/bpf_iter.c @@ -1218,7 +1218,7 @@ static void test_bpf_sk_storage_get(void) bpf_iter_bpf_sk_storage_helpers__destroy(skel); } -static void test_bpf_sk_stoarge_map_iter_fd(void) +static void test_bpf_sk_storage_map_iter_fd(void) { struct bpf_iter_bpf_sk_storage_map *skel; @@ -1693,7 +1693,7 @@ void test_bpf_iter(void) if (test__start_subtest("bpf_sk_storage_map")) test_bpf_sk_storage_map(); if (test__start_subtest("bpf_sk_storage_map_iter_fd")) - test_bpf_sk_stoarge_map_iter_fd(); + test_bpf_sk_storage_map_iter_fd(); if (test__start_subtest("bpf_sk_storage_delete")) test_bpf_sk_storage_delete(); if (test__start_subtest("bpf_sk_storage_get")) diff --git a/tools/testing/selftests/bpf/prog_tests/btf.c b/tools/testing/selftests/bpf/prog_tests/btf.c index 00965a6e83bb..7eafcf91b02e 100644 --- a/tools/testing/selftests/bpf/prog_tests/btf.c +++ b/tools/testing/selftests/bpf/prog_tests/btf.c @@ -4986,7 +4986,7 @@ struct pprint_mapv_int128 { static struct btf_raw_test pprint_test_template[] = { { .raw_types = { - /* unsighed char */ /* [1] */ + /* unsigned char */ /* [1] */ BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 8, 1), /* unsigned short */ /* [2] */ BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 16, 2), @@ -5053,7 +5053,7 @@ static struct btf_raw_test pprint_test_template[] = { * be encoded with kind_flag set. */ .raw_types = { - /* unsighed char */ /* [1] */ + /* unsigned char */ /* [1] */ BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 8, 1), /* unsigned short */ /* [2] */ BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 16, 2), @@ -5120,7 +5120,7 @@ static struct btf_raw_test pprint_test_template[] = { * will have both int and enum types. */ .raw_types = { - /* unsighed char */ /* [1] */ + /* unsigned char */ /* [1] */ BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 8, 1), /* unsigned short */ /* [2] */ BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 16, 2), diff --git a/tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c b/tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c index 63ee892bc757..10224f845568 100644 --- a/tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c +++ b/tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c @@ -214,7 +214,7 @@ static void test_isolated(int parent_cgroup_fd, int child_cgroup_fd) /* Attach to parent and child cgroup, trigger packet from child. * Assert that there is six additional runs, parent cgroup egresses and * ingress, child cgroup egresses and ingress. - * Assert that egree and ingress storages are separate. + * Assert that egress and ingress storages are separate. */ child_egress1_link = bpf_program__attach_cgroup(obj->progs.egress1, child_cgroup_fd); diff --git a/tools/testing/selftests/bpf/prog_tests/log_buf.c b/tools/testing/selftests/bpf/prog_tests/log_buf.c index 0f7ea4d7d9f6..6c1f3c73ae6a 100644 --- a/tools/testing/selftests/bpf/prog_tests/log_buf.c +++ b/tools/testing/selftests/bpf/prog_tests/log_buf.c @@ -159,7 +159,7 @@ static void bpf_prog_load_log_buf(void) opts.log_buf = log_buf; opts.log_size = log_buf_sz; - /* with log_level == 0 log_buf shoud stay empty for good prog */ + /* with log_level == 0 log_buf should stay empty for good prog */ log_buf[0] = '\0'; opts.log_level = 0; fd = bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, "good_prog", "GPL", @@ -221,7 +221,7 @@ static void bpf_btf_load_log_buf(void) opts.log_buf = log_buf; opts.log_size = log_buf_sz; - /* with log_level == 0 log_buf shoud stay empty for good BTF */ + /* with log_level == 0 log_buf should stay empty for good BTF */ log_buf[0] = '\0'; opts.log_level = 0; fd = bpf_btf_load(raw_btf_data, raw_btf_size, &opts); diff --git a/tools/testing/selftests/bpf/prog_tests/reg_bounds.c b/tools/testing/selftests/bpf/prog_tests/reg_bounds.c index 467027236d30..39d42271cc46 100644 --- a/tools/testing/selftests/bpf/prog_tests/reg_bounds.c +++ b/tools/testing/selftests/bpf/prog_tests/reg_bounds.c @@ -503,7 +503,7 @@ static const char *op_str(enum op op) /* Can register with range [x.a, x.b] *EVER* satisfy * OP (<, <=, >, >=, ==, !=) relation to - * a regsiter with range [y.a, y.b] + * a register with range [y.a, y.b] * _in *num_t* domain_ */ static bool range_canbe_op(enum num_t t, struct range x, struct range y, enum op op) @@ -532,7 +532,7 @@ static bool range_canbe_op(enum num_t t, struct range x, struct range y, enum op /* Does register with range [x.a, x.b] *ALWAYS* satisfy * OP (<, <=, >, >=, ==, !=) relation to - * a regsiter with range [y.a, y.b] + * a register with range [y.a, y.b] * _in *num_t* domain_ */ static bool range_always_op(enum num_t t, struct range x, struct range y, enum op op) @@ -543,7 +543,7 @@ static bool range_always_op(enum num_t t, struct range x, struct range y, enum o /* Does register with range [x.a, x.b] *NEVER* satisfy * OP (<, <=, >, >=, ==, !=) relation to - * a regsiter with range [y.a, y.b] + * a register with range [y.a, y.b] * _in *num_t* domain_ */ static bool range_never_op(enum num_t t, struct range x, struct range y, enum op op) @@ -1018,11 +1018,11 @@ static int parse_reg_state(const char *s, struct reg_state *reg) * - umin=%llu, if missing, assumed 0; * - umax=%llu, if missing, assumed U64_MAX; * - smin=%lld, if missing, assumed S64_MIN; - * - smax=%lld, if missing, assummed S64_MAX; + * - smax=%lld, if missing, assumed S64_MAX; * - umin32=%d, if missing, assumed 0; * - umax32=%d, if missing, assumed U32_MAX; * - smin32=%d, if missing, assumed S32_MIN; - * - smax32=%d, if missing, assummed S32_MAX; + * - smax32=%d, if missing, assumed S32_MAX; * - var_off=(%#llx; %#llx), tnum part, we don't care about it. * * If some of the values are equal, they will be grouped (but min/max @@ -1884,7 +1884,7 @@ static void validate_gen_range_vs_range(enum num_t init_t, enum num_t cond_t) * envvar is not set, this test is skipped during test_progs testing. * * We split this up into smaller subsets based on initialization and - * conditiona numeric domains to get an easy parallelization with test_progs' + * conditional numeric domains to get an easy parallelization with test_progs' * -j argument. */ @@ -1938,7 +1938,7 @@ static u64 rand_u64() { /* RAND_MAX is guaranteed to be at least 1<<15, but in practice it * seems to be 1<<31, so we need to call it thrice to get full u64; - * we'll use rougly equal split: 22 + 21 + 21 bits + * we'll use roughly equal split: 22 + 21 + 21 bits */ return ((u64)random() << 42) | (((u64)random() & RAND_21BIT_MASK) << 21) | diff --git a/tools/testing/selftests/bpf/prog_tests/resolve_btfids.c b/tools/testing/selftests/bpf/prog_tests/resolve_btfids.c index f81d08d429a2..51544372f52e 100644 --- a/tools/testing/selftests/bpf/prog_tests/resolve_btfids.c +++ b/tools/testing/selftests/bpf/prog_tests/resolve_btfids.c @@ -103,7 +103,7 @@ static int resolve_symbols(void) btf = btf__parse_elf("btf_data.bpf.o", NULL); if (CHECK(libbpf_get_error(btf), "resolve", - "Failed to load BTF from btf_data.o\n")) + "Failed to load BTF from btf_data.bpf.o\n")) return -1; nr = btf__type_cnt(btf); diff --git a/tools/testing/selftests/bpf/prog_tests/tc_redirect.c b/tools/testing/selftests/bpf/prog_tests/tc_redirect.c index 974f9d6269c9..c85798966aec 100644 --- a/tools/testing/selftests/bpf/prog_tests/tc_redirect.c +++ b/tools/testing/selftests/bpf/prog_tests/tc_redirect.c @@ -872,7 +872,7 @@ static void test_tcp_dtime(struct test_tc_dtime *skel, int family, bool bpf_fwd) test_inet_dtime(family, SOCK_STREAM, addr, 50000 + t); /* fwdns_prio100 prog does not read delivery_time_type, so - * kernel puts the (rcv) timetamp in __sk_buff->tstamp + * kernel puts the (rcv) timestamp in __sk_buff->tstamp */ ASSERT_EQ(dtimes[INGRESS_FWDNS_P100], 0, dtime_cnt_str(t, INGRESS_FWDNS_P100)); diff --git a/tools/testing/selftests/bpf/prog_tests/test_bprm_opts.c b/tools/testing/selftests/bpf/prog_tests/test_bprm_opts.c index a0054019e677..9c0200c132d9 100644 --- a/tools/testing/selftests/bpf/prog_tests/test_bprm_opts.c +++ b/tools/testing/selftests/bpf/prog_tests/test_bprm_opts.c @@ -51,7 +51,7 @@ static int run_set_secureexec(int map_fd, int secureexec) exit(ret); /* If the binary is executed with securexec=1, the dynamic - * loader ingores and unsets certain variables like LD_PRELOAD, + * loader ignores and unsets certain variables like LD_PRELOAD, * TMPDIR etc. TMPDIR is used here to simplify the example, as * LD_PRELOAD requires a real .so file. * diff --git a/tools/testing/selftests/bpf/prog_tests/test_strncmp.c b/tools/testing/selftests/bpf/prog_tests/test_strncmp.c index 7ddd6615b7e7..baceb0de9d49 100644 --- a/tools/testing/selftests/bpf/prog_tests/test_strncmp.c +++ b/tools/testing/selftests/bpf/prog_tests/test_strncmp.c @@ -72,7 +72,7 @@ static void test_strncmp_ret(void) got = trigger_strncmp(skel); ASSERT_EQ(got, 0, "strncmp: same str"); - /* Not-null-termainted string */ + /* Not-null-terminated string */ memcpy(skel->bss->str, skel->rodata->target, sizeof(skel->bss->str)); skel->bss->str[sizeof(skel->bss->str) - 1] = 'A'; got = trigger_strncmp(skel); diff --git a/tools/testing/selftests/bpf/prog_tests/token.c b/tools/testing/selftests/bpf/prog_tests/token.c index fc4a175d8d76..fe86e4fdb89c 100644 --- a/tools/testing/selftests/bpf/prog_tests/token.c +++ b/tools/testing/selftests/bpf/prog_tests/token.c @@ -867,7 +867,7 @@ static int userns_obj_priv_implicit_token(int mnt_fd, struct token_lsm *lsm_skel } unsetenv(TOKEN_ENVVAR); - /* now the same struct_ops skeleton should succeed thanks to libppf + /* now the same struct_ops skeleton should succeed thanks to libbpf * creating BPF token from /sys/fs/bpf mount point */ skel = dummy_st_ops_success__open_and_load(); @@ -929,7 +929,7 @@ static int userns_obj_priv_implicit_token_envvar(int mnt_fd, struct token_lsm *l if (!ASSERT_OK(err, "setenv_token_path")) goto err_out; - /* now the same struct_ops skeleton should succeed thanks to libppf + /* now the same struct_ops skeleton should succeed thanks to libbpf * creating BPF token from custom mount point */ skel = dummy_st_ops_success__open_and_load(); diff --git a/tools/testing/selftests/bpf/prog_tests/uprobe_multi_test.c b/tools/testing/selftests/bpf/prog_tests/uprobe_multi_test.c index acb62675ff65..dad9e3736e04 100644 --- a/tools/testing/selftests/bpf/prog_tests/uprobe_multi_test.c +++ b/tools/testing/selftests/bpf/prog_tests/uprobe_multi_test.c @@ -199,7 +199,7 @@ static void uprobe_multi_test_run(struct uprobe_multi *skel, struct child *child /* * There are 2 entry and 2 exit probe called for each uprobe_multi_func_[123] - * function and each slepable probe (6) increments uprobe_multi_sleep_result. + * function and each sleepable probe (6) increments uprobe_multi_sleep_result. */ ASSERT_EQ(skel->bss->uprobe_multi_func_1_result, 2, "uprobe_multi_func_1_result"); ASSERT_EQ(skel->bss->uprobe_multi_func_2_result, 2, "uprobe_multi_func_2_result"); diff --git a/tools/testing/selftests/bpf/prog_tests/user_ringbuf.c b/tools/testing/selftests/bpf/prog_tests/user_ringbuf.c index dfff6feac12c..d424e7ecbd12 100644 --- a/tools/testing/selftests/bpf/prog_tests/user_ringbuf.c +++ b/tools/testing/selftests/bpf/prog_tests/user_ringbuf.c @@ -643,7 +643,7 @@ static void test_user_ringbuf_blocking_reserve(void) if (!ASSERT_EQ(err, 0, "deferred_kick_thread\n")) goto cleanup; - /* After spawning another thread that asychronously kicks the kernel to + /* After spawning another thread that asynchronously kicks the kernel to * drain the messages, we're able to block and successfully get a * sample once we receive an event notification. */ diff --git a/tools/testing/selftests/bpf/progs/bpf_cubic.c b/tools/testing/selftests/bpf/progs/bpf_cubic.c index d665b8a15cc4..f089faa97ae6 100644 --- a/tools/testing/selftests/bpf/progs/bpf_cubic.c +++ b/tools/testing/selftests/bpf/progs/bpf_cubic.c @@ -1,6 +1,6 @@ // SPDX-License-Identifier: GPL-2.0-only -/* WARNING: This implemenation is not necessarily the same +/* WARNING: This implementation is not necessarily the same * as the tcp_cubic.c. The purpose is mainly for testing * the kernel BPF logic. * @@ -314,7 +314,7 @@ static void bictcp_update(struct bpf_bictcp *ca, __u32 cwnd, __u32 acked) * (so time^3 is done by using 64 bit) * and without the support of division of 64bit numbers * (so all divisions are done by using 32 bit) - * also NOTE the unit of those veriables + * also NOTE the unit of those variables * time = (t - K) / 2^bictcp_HZ * c = bic_scale >> 10 * rtt = (srtt >> 3) / HZ @@ -507,7 +507,7 @@ void BPF_PROG(bpf_cubic_acked, struct sock *sk, const struct ack_sample *sample) __u32 delay; bpf_cubic_acked_called = 1; - /* Some calls are for duplicates without timetamps */ + /* Some calls are for duplicates without timestamps */ if (sample->rtt_us < 0) return; diff --git a/tools/testing/selftests/bpf/progs/strobemeta.h b/tools/testing/selftests/bpf/progs/strobemeta.h index f74459eead26..a5c74d31a244 100644 --- a/tools/testing/selftests/bpf/progs/strobemeta.h +++ b/tools/testing/selftests/bpf/progs/strobemeta.h @@ -373,7 +373,7 @@ static __always_inline uint64_t read_str_var(struct strobemeta_cfg *cfg, len = bpf_probe_read_user_str(&data->payload[off], STROBE_MAX_STR_LEN, value->ptr); /* * if bpf_probe_read_user_str returns error (<0), due to casting to - * unsinged int, it will become big number, so next check is + * unsigned int, it will become big number, so next check is * sufficient to check for errors AND prove to BPF verifier, that * bpf_probe_read_user_str won't return anything bigger than * STROBE_MAX_STR_LEN @@ -557,7 +557,7 @@ static void *read_strobe_meta(struct task_struct *task, return NULL; payload_off = ctx.payload_off; - /* this should not really happen, here only to satisfy verifer */ + /* this should not really happen, here only to satisfy verifier */ if (payload_off > sizeof(data->payload)) payload_off = sizeof(data->payload); #else diff --git a/tools/testing/selftests/bpf/progs/test_cls_redirect_dynptr.c b/tools/testing/selftests/bpf/progs/test_cls_redirect_dynptr.c index da54c09e9a15..464515b824b9 100644 --- a/tools/testing/selftests/bpf/progs/test_cls_redirect_dynptr.c +++ b/tools/testing/selftests/bpf/progs/test_cls_redirect_dynptr.c @@ -503,7 +503,7 @@ static ret_t get_next_hop(struct bpf_dynptr *dynptr, __u64 *offset, encap_header * * fill_tuple(&t, foo, sizeof(struct iphdr), 123, 321) * - * clang will substitue a costant for sizeof, which allows the verifier + * clang will substitute a constant for sizeof, which allows the verifier * to track it's value. Based on this, it can figure out the constant * return value, and calling code works while still being "generic" to * IPv4 and IPv6. diff --git a/tools/testing/selftests/bpf/progs/test_core_read_macros.c b/tools/testing/selftests/bpf/progs/test_core_read_macros.c index fd54caa17319..873d85a4739b 100644 --- a/tools/testing/selftests/bpf/progs/test_core_read_macros.c +++ b/tools/testing/selftests/bpf/progs/test_core_read_macros.c @@ -36,7 +36,7 @@ int handler(void *ctx) return 0; /* next pointers for kernel address space have to be initialized from - * BPF side, user-space mmaped addresses are stil user-space addresses + * BPF side, user-space mmaped addresses are still user-space addresses */ k_probe_in.next = &k_probe_in; __builtin_preserve_access_index(({k_core_in.next = &k_core_in;})); diff --git a/tools/testing/selftests/bpf/progs/test_global_func15.c b/tools/testing/selftests/bpf/progs/test_global_func15.c index b4e089d6981d..201cc000b3f4 100644 --- a/tools/testing/selftests/bpf/progs/test_global_func15.c +++ b/tools/testing/selftests/bpf/progs/test_global_func15.c @@ -44,7 +44,7 @@ __naked int global_func15_tricky_pruning(void) * case we have a valid 1 stored in R0 register, but in * a branch case we assign some random value to R0. So if * there is something wrong with precision tracking for R0 at - * program exit, we might erronenously prune branch case, + * program exit, we might erroneously prune branch case, * because R0 in fallthrough case is imprecise (and thus any * value is valid from POV of verifier is_state_equal() logic) */ diff --git a/tools/testing/selftests/bpf/progs/test_global_map_resize.c b/tools/testing/selftests/bpf/progs/test_global_map_resize.c index 714b29c7f8b2..a3f220ba7025 100644 --- a/tools/testing/selftests/bpf/progs/test_global_map_resize.c +++ b/tools/testing/selftests/bpf/progs/test_global_map_resize.c @@ -16,7 +16,7 @@ const volatile size_t data_array_len; int sum = 0; int array[1]; -/* custom data secton */ +/* custom data section */ int my_array[1] SEC(".data.custom"); /* custom data section which should NOT be resizable, diff --git a/tools/testing/selftests/bpf/test_maps.c b/tools/testing/selftests/bpf/test_maps.c index dfbab214f4d1..905d5981ace1 100644 --- a/tools/testing/selftests/bpf/test_maps.c +++ b/tools/testing/selftests/bpf/test_maps.c @@ -1515,7 +1515,7 @@ static void test_map_parallel(void) value == key); } - /* Now let's delete all elemenets in parallel. */ + /* Now let's delete all elements in parallel. */ data[1] = DO_DELETE; run_parallel(TASKS, test_update_delete, data); diff --git a/tools/testing/selftests/bpf/test_progs.c b/tools/testing/selftests/bpf/test_progs.c index 83f390a31681..c7a70e1a1085 100644 --- a/tools/testing/selftests/bpf/test_progs.c +++ b/tools/testing/selftests/bpf/test_progs.c @@ -1500,7 +1500,7 @@ static void calculate_summary_and_print_errors(struct test_env *env) /* * We only print error logs summary when there are failed tests and - * verbose mode is not enabled. Otherwise, results may be incosistent. + * verbose mode is not enabled. Otherwise, results may be inconsistent. * */ if (!verbose() && fail_cnt) { diff --git a/tools/testing/selftests/bpf/verifier/map_kptr.c b/tools/testing/selftests/bpf/verifier/map_kptr.c index d25c3e9605f1..f420c0312aa0 100644 --- a/tools/testing/selftests/bpf/verifier/map_kptr.c +++ b/tools/testing/selftests/bpf/verifier/map_kptr.c @@ -153,7 +153,7 @@ .result = REJECT, .errstr = "variable untrusted_ptr_ access var_off=(0x0; 0x7) disallowed", }, -/* Tests for unreferened PTR_TO_BTF_ID */ +/* Tests for unreferenced PTR_TO_BTF_ID */ { "map_kptr: unref: reject btf_struct_ids_match == false", .insns = { From patchwork Thu Sep 5 11:03:06 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lin Yikai X-Patchwork-Id: 13792163 X-Patchwork-Delegate: bpf@iogearbox.net Received: from APC01-PSA-obe.outbound.protection.outlook.com (mail-psaapc01on2079.outbound.protection.outlook.com [40.107.255.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C22C61991B0; Thu, 5 Sep 2024 11:05:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.255.79 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725534347; cv=fail; b=cQgWc0XGyehKSiFq9hIEsESSfAgPCz3XPwNQH7ylT4guHyQOp5UyNRdSlyl51lrdq9FK0z3pPOEPxTjdIh2AsYBQ6EcsuWiqd0NdI7smAlkI2K/9Qt8hjFMITF7VKeA3kB43836AEowog7ZX+XFFLt5tqHZLJS3kMSqqK+tqEVI= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725534347; c=relaxed/simple; bh=UE0hOfGsiJ0HwmUYoGQneBeHFZdsY+xZselb7lCoa5M=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: Content-Type:MIME-Version; b=N/bvyXLZ3fogmSRg6CErN2YDGP65BX26Pp8rAYDkwr0GJ/ZJR0xPIEhQSQ4VnlwylQ4yKuTut5CeeNsRYED9crc5UDb9pDU4FZhm3H4/1qotzmXckMxdWwCd9y9UqmKBHXW7IRlrLIdPrGJ1RrrF4m3AS7NU1h8yYC3MQidngXU= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=vivo.com; spf=pass smtp.mailfrom=vivo.com; dkim=pass (2048-bit key) header.d=vivo.com header.i=@vivo.com header.b=SIKg8tjG; arc=fail smtp.client-ip=40.107.255.79 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=vivo.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=vivo.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=vivo.com header.i=@vivo.com header.b="SIKg8tjG" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=TuVTTgxyyxluYe1BzQEEHx373b23Yq4k4WcyRhQoBpEi0/Ql/P4E0ulGjnbfYy13S+e/gtdgAItRFCkcYPjGKOjKCI41BwMQR+E1wgtjpk9McQjULUkY+aroqfYN6t6XpNxqtIIj636+I+Kqx8bkSTRG936cUPhzyquh8Wh3LQMbwfhYYSgOHJWPbArBji+jgtWx3Gpuq9lRfXfAAUGxEW4X3Xb6Hd5xJgsSuKrWYJ5KfnYnCsUcT2PBYzrOwPO59/y7W4ViIWqiosQqqbZXlu8bE22+fSotgLcoy8rHcANpOVEEXwWrk+lEIKTJia/d3B40QrtyuoGqBRhJ1dxfHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=tWVBLqv9LI2cNNAZFZTVPo+c8CxN8doYLzH60UehTGA=; b=fzid1FpXDHkRIoxdPAk32Jv4azmI3yS/82idSgUjnYN8Nt7laDp3Ug6vRR4l0YnJ2fQmg95saXQwqP5wx66lG1JgPr79JRUg1Qq+jIEL6pOvvTZ6g0nnRP34j8m6/mP5pKoY1qil4ovoovRL8NfX5LyZrJQ/aakIzvbAqhhysk2bAqHlX9igaTAJcKTUs2VMjHMiPyCGu2c80kj+leGLnIjSbW+F/LO7Dfolnq+KctG0K5rpftd8y5lnFTtDm/c0FoHTLN3TGPTo6nwujmlzLpA95+h1AwuyrzDc/bQE4N80jgMn2W49f9pwuhq6BOyBkgtuVT8Ocmjj807FI+Vd5w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=vivo.com; dmarc=pass action=none header.from=vivo.com; dkim=pass header.d=vivo.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vivo.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tWVBLqv9LI2cNNAZFZTVPo+c8CxN8doYLzH60UehTGA=; b=SIKg8tjGw/0XtxqRHi3t76eKWU9M8E5BQpuLu+QMxElrFjFZefyOMnSoZ3tK6QQWkmkLovk1yBbjCiZ7E2oKCurWagMAadV19UgmFyOIP2Ja9MK0d6MWYQUKRSVtBIh+g/iDijsfXMH/8bYIR0JJF38EQQNL+Umn342XZGmNxmBlsEuB5ytGQuNwQlk/CLansPfbaTpHw18JM+HFVEAyDRcgorMkWgCGTRBM059xKlqqM1oQRjZHTgbVVPDrCV2ZLkjDLHGxhqt4dhd+bUt6d7q/Yi6uDpF0Atn7+7051qaM22utNylDbwSZhee956CQFKBrXum8938XY796tp87Ww== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=vivo.com; Received: from KL1PR0601MB4324.apcprd06.prod.outlook.com (2603:1096:820:73::6) by SEYPR06MB6033.apcprd06.prod.outlook.com (2603:1096:101:d7::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7918.28; Thu, 5 Sep 2024 11:05:39 +0000 Received: from KL1PR0601MB4324.apcprd06.prod.outlook.com ([fe80::f8ee:b41e:af25:202]) by KL1PR0601MB4324.apcprd06.prod.outlook.com ([fe80::f8ee:b41e:af25:202%7]) with mapi id 15.20.7918.024; Thu, 5 Sep 2024 11:05:39 +0000 From: Lin Yikai To: bpf@vger.kernel.org Cc: opensource.kernel@vivo.com, yikai.lin@vivo.com, Quentin Monnet , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan , Nathan Chancellor , Nick Desaulniers , Bill Wendling , Justin Stitt , Rameez Rehman , Kui-Feng Lee , Alan Maguire , Yuran Pereira , Dave Marchevsky , Jordan Rome , Chuyi Zhou , Menglong Dong , Tony Ambardar , Nikolay Aleksandrov , Abhishek Chauhan , Geliang Tang , Hou Tao , Ilya Leoshkevich , "Jose E. Marchesi" , Shung-Hsi Yu , David Vernet , linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, llvm@lists.linux.dev Subject: [PATCH bpf-next v1 2/3] bpftool: fix some typos in bpftool Date: Thu, 5 Sep 2024 19:03:06 +0800 Message-Id: <20240905110354.3274546-2-yikai.lin@vivo.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20240905110354.3274546-1-yikai.lin@vivo.com> References: <20240905110354.3274546-1-yikai.lin@vivo.com> X-ClientProxiedBy: SI2PR01CA0036.apcprd01.prod.exchangelabs.com (2603:1096:4:192::22) To KL1PR0601MB4324.apcprd06.prod.outlook.com (2603:1096:820:73::6) Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: KL1PR0601MB4324:EE_|SEYPR06MB6033:EE_ X-MS-Office365-Filtering-Correlation-Id: 7c68ff6f-a347-4c93-e849-08dccd9aacd6 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|366016|7416014|52116014|38350700014; X-Microsoft-Antispam-Message-Info: =?utf-8?q?Bz87Bm5Uh/CW9m6/njBT25+AmFHFsHj?= =?utf-8?q?AyeZDgs2TlPDRLiKYg/18W1BTZ12b3gTQlHeKp5yHU1y7IJfZTF+SYAF2pvCKqFu0?= =?utf-8?q?83kaS8f+V6fbqwSKegcG/zEWnlStzw6oeQjBmbCwcU2EzWGsbEYTEplDmUsDN5aAq?= =?utf-8?q?+6B03gLrA6y+OVpIip+x/cci7WmO2tnXVsz+V4V/3Cf5zYN4+EcCBXuYUycB5596g?= =?utf-8?q?5I6PcVdnJf0QJhVIYj79UVc7hmlg3qykQeSRuxK+BWNyB2X3VwnZQJmvbhzOeISWm?= =?utf-8?q?wYnUzKbE2D56xpnItpfAXaulTeWWqXp8AwiskTReu+v7csRa3QeVz9bQ2F/SVCBrZ?= =?utf-8?q?GJLitqxhhCk6hdujj4dqSij7hZL4v1g29pCKLnrs6/PRKeAOPCihoFbx54qSZLVyh?= =?utf-8?q?fY9ZxcAYWOfHd1kXTt3JR6uJUp0jEBPmzTflS3Ha4IsD4LhWasZucNL71KBFd74SP?= =?utf-8?q?IGJHXnDAFJGcgTyJd7Gu7DyQhlZ3+Kj4YZwmG4bv/9sQ0keensMuSCbhc9E3B4Vbm?= =?utf-8?q?5BKMaXLpESUydg1z64UZfHjXnWKVDLxY3ED83Fhi3kvKH4Cpq87Yjx0qOHod2YX7c?= =?utf-8?q?MbIdXVkf0CY9JAfjWnTVscSTY+mezgN4POMjedfcKyZtfz4F8qQ3tsb2b+IRm1q3i?= =?utf-8?q?srPPHnOE9X8fiyAwKdiRBfX3UTq3XQtzSJeZEM2h/HFMaX89n0MqX8el69pLVMHuK?= =?utf-8?q?D1voNMhk4Y4Pp2KtweDXJd4EyD8iHr98Vk7vjZ8qYVWoTnUyFVAvhyqqJ1MTWM7++?= =?utf-8?q?Xxyl/qhbzRfRcxLIwReLj5em2nwEQJgsiTTi5nh6NOpCJyZOCDMJiBEVCv8+iNXcP?= =?utf-8?q?aBAgct9C3cYIRfV6s7EbQzahRbMiXRGPJ78LgSO4rF4joi94zbI1Wvaq0qkpfxcmz?= =?utf-8?q?9kfmsA66VIHRd4W3Mzx15PY0igeyzogIVcRteZpoDmOJV1DWkPQGmqXlvP5cmiTkz?= =?utf-8?q?n++SMEjL6xXWsoAFI3rbypXPT14xuSyZ4rTmnGykmWkpBXrlAe+upV6zpDIEU643t?= =?utf-8?q?btPLqVHI/n/K9y6YsVVPfN3OCAbnkUYXA2kjBmu9FZIqy78vkBau7UxMhrMKccjlb?= =?utf-8?q?FY4XCrnDrpH4p5BgWC3nM4Qbz+N7t922L/wg7+VWjSJ012WDogFiMe/+qIWZEAihy?= =?utf-8?q?7NfCzJMLJYQdUDNtzZ+ggGeUa32GSfV2RBHUHOOqKHyF5f7vE2h4HmsdbaIxba+Y3?= =?utf-8?q?s8q0xXwT9Qt/GMN2BZS8C2Ub9xsIN4IUw+kXSLxOWcBRs/a0B+BC7RC7yNfqEjm47?= =?utf-8?q?/xreOVyJQLvlc5XZMy/2NOve9bwDl5SBdpLDc4Kiz12io6Fjl/n57jdlf3f4RgJO3?= =?utf-8?q?VNkt/m2TDwmr/MWzkAl1bPzMnEyfqveQ+Q=3D=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:KL1PR0601MB4324.apcprd06.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(7416014)(52116014)(38350700014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?zdZh7zuq9hBarvu3xTDTsNmqSak1?= =?utf-8?q?NeK+KAGawjAI4bFxDP0H8o7qtd8EJjxfSg5zobMArubcKTZ972914de/U9qR3E86k?= =?utf-8?q?SWMmqwscOKTSdechKO+APJA+TGmV6WOKCX+5uQ0cJeSIJI5HH1nBdN+GS0AsoOJqu?= =?utf-8?q?FtUSMceF6CKOypA1mAJSf64fawLwOin3u3KSjIiequbsJ2STHbx05RnuqKZ8Yy6n6?= =?utf-8?q?PF7cHv2GJUXHOb9xo2M0Z6B81B4wpuzWkzZB4NZTvWkUhkfhJLaSlo0G4DqD7LCyu?= =?utf-8?q?dq0JbHboZO0ggzC6r106XpJZNtRrAWZh4Y8Lj7VgCi4cK5azRm9rsgvs8WpZjkPbn?= =?utf-8?q?CMZGTysDcUAMwfG1lSlSTD/mTncoSYvp9OBm0UXXbNVVMgul58I+uDISt1IlcrtXi?= =?utf-8?q?rLSKhTunvB7TZBJUh4VYn/jGCuu2WI+up+5RODq+frLmrXzofrB8LlUZOmI6S5pqd?= =?utf-8?q?eUsXBETxLVizOxx5119dQG1eaboOUEfFssQxsGJnNyolzgoYJG69yUs3MUg/M2WXX?= =?utf-8?q?6v4KoajinyL+Yoc00PkCAD3bYze0f9G5wLujnHTowiGSkEzumY0zf8ttJu+oWW6yw?= =?utf-8?q?8klODCPbdBQQKQDBmMQakwUxYgHsWaFTDvdK3CQl+f/URCEc69/RIFlqxeehT9Alz?= =?utf-8?q?dfyk7AvUJQAUb3mVV6qfb73GrVs7jcmQW0sAW4TwnIXgcTLw52rclUQzhDB0o9XB0?= =?utf-8?q?wrif2Gt2YhFYp/A/bHeRvrsVhpJMHtLkEpwojPWnjo2AqQklH1tHMbzlTpfL8kAvI?= =?utf-8?q?C/w8VP/LWP8HuBgVmNdJFflS0piEDoZLjm8kjaek1uQqNfe9gAH4A/WR09al85co4?= =?utf-8?q?oxM+oim5z13XWXUMVUizl8RvHbbLgwvFXJ1t2yaB+DpzfPnlGrvv3y8Ms6RZT7ZYg?= =?utf-8?q?WPSQ9m06MhkI4gzMVVgi97aarygaw9oDeiQSyfz2g6KWJFXTLf85Brkjg204XN8mN?= =?utf-8?q?H84F7KTnG8sdujPY6Yxrth+tVCuoAgJDQOdT/hDc9PkqY0JqRWDuCU1yO4ksR6lcR?= =?utf-8?q?gNEnax8jMhmFjz74TqamKAYJ2AKCfwgjYhj4D0AZBfwV7WetaRDEHsYagxvTIwoCK?= =?utf-8?q?ASaYVkUqX6svpoagsRE5upGyEmdNkvTy6MDWuwJo/uX6xaUKrgmo60PTY9DLln2hZ?= =?utf-8?q?7rvuRxPrtUtsP+dEWf/wDK8REDzSl/4kkC1d4wUOGNwm9xkGc+O3l5ebfCvtiPRu5?= =?utf-8?q?5FcAx/t7zGjd8jIP/lAhv9ucj4CNxvXWgqRwnsAT5Uq+NB3mCXRFoH/ARRroZOsFk?= =?utf-8?q?RiPARzqJNr7WHnUFTz8DtBwctZid1emcE1DCo7hyxDIc5i40Ncm+pdxGDyYDnZFo9?= =?utf-8?q?ih9SzsOtxVjRQkFdgphySShGmq+gAbfaCAlQxp1t9J4LBVUCzdku1aHDsTCoKhxyV?= =?utf-8?q?ogsiYshTZ9rMw2nTV7Nxuty6JXHKz24TZkiMxqqiaO/CADp64RnWtC1GbZIZybx5j?= =?utf-8?q?09QC7tnrO3LexVGQLf256uedmNFiYM8SFreOiHf1aXrB/FGsuzzaNXHeRxuCQBFpm?= =?utf-8?q?shjU4ro8md7X?= X-OriginatorOrg: vivo.com X-MS-Exchange-CrossTenant-Network-Message-Id: 7c68ff6f-a347-4c93-e849-08dccd9aacd6 X-MS-Exchange-CrossTenant-AuthSource: KL1PR0601MB4324.apcprd06.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Sep 2024 11:05:39.0077 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 923e42dc-48d5-4cbe-b582-1a797a6412ed X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: VWV03yr2V/RxYmGt88kd/PVxtapqZi2q09EnSoXEMWPGtzbrurKvxVyQHGLKDMzsMxDF8kXS6e6MgHLsBnM0Kw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SEYPR06MB6033 X-Patchwork-Delegate: bpf@iogearbox.net Hi, fix some spelling errors in bpftool, the details are as follows: -in file "bpftool-gen.rst" libppf->libbpf -in the code comments: ouptut->output Signed-off-by: Lin Yikai --- tools/bpf/bpftool/Documentation/bpftool-gen.rst | 2 +- tools/bpf/bpftool/feature.c | 10 +++++----- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/tools/bpf/bpftool/Documentation/bpftool-gen.rst b/tools/bpf/bpftool/Documentation/bpftool-gen.rst index c768e6d4ae09..1b426e58a7cd 100644 --- a/tools/bpf/bpftool/Documentation/bpftool-gen.rst +++ b/tools/bpf/bpftool/Documentation/bpftool-gen.rst @@ -104,7 +104,7 @@ bpftool gen skeleton *FILE* - **example__load**. This function creates maps, loads and verifies BPF programs, initializes - global data maps. It corresponds to libppf's **bpf_object__load**\ () + global data maps. It corresponds to libbpf's **bpf_object__load**\ () API. - **example__open_and_load** combines **example__open** and diff --git a/tools/bpf/bpftool/feature.c b/tools/bpf/bpftool/feature.c index c754a428c8c6..4dbc4fcdf473 100644 --- a/tools/bpf/bpftool/feature.c +++ b/tools/bpf/bpftool/feature.c @@ -196,7 +196,7 @@ static void probe_unprivileged_disabled(void) { long res; - /* No support for C-style ouptut */ + /* No support for C-style output */ res = read_procfs("/proc/sys/kernel/unprivileged_bpf_disabled"); if (json_output) { @@ -225,7 +225,7 @@ static void probe_jit_enable(void) { long res; - /* No support for C-style ouptut */ + /* No support for C-style output */ res = read_procfs("/proc/sys/net/core/bpf_jit_enable"); if (json_output) { @@ -255,7 +255,7 @@ static void probe_jit_harden(void) { long res; - /* No support for C-style ouptut */ + /* No support for C-style output */ res = read_procfs("/proc/sys/net/core/bpf_jit_harden"); if (json_output) { @@ -285,7 +285,7 @@ static void probe_jit_kallsyms(void) { long res; - /* No support for C-style ouptut */ + /* No support for C-style output */ res = read_procfs("/proc/sys/net/core/bpf_jit_kallsyms"); if (json_output) { @@ -311,7 +311,7 @@ static void probe_jit_limit(void) { long res; - /* No support for C-style ouptut */ + /* No support for C-style output */ res = read_procfs("/proc/sys/net/core/bpf_jit_limit"); if (json_output) { From patchwork Thu Sep 5 11:03:07 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lin Yikai X-Patchwork-Id: 13792165 X-Patchwork-Delegate: bpf@iogearbox.net Received: from APC01-PSA-obe.outbound.protection.outlook.com (mail-psaapc01on2053.outbound.protection.outlook.com [40.107.255.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C00E1197A95; Thu, 5 Sep 2024 11:06:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.255.53 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725534404; cv=fail; b=rvlgCQ731RaDNSBoR/LCQjmuFitNnw1r2P6iMqC/+zxEF7lA4oWDMzhYEMfTjm45NOXHkQaDbqf5y+8AdVQ/SrU1yDCd+n73y7t7WFZTwAT1QS0dYPqHg4dt6o2Rcs8PKHs3hj/GzT2xsZL2++NPZ3HrEdZRyJNQRpm0eFllgzE= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725534404; c=relaxed/simple; bh=HvpZwKwLJzGxWdlIr4bYn3E1/Q12W6UXhnH8S3eFvR8=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: Content-Type:MIME-Version; b=rTriIVZOStjVu7YWsazhmOwBvvKDxAeF9wmejm83M6y0n+Fg777wps4c30Im2xIOhIVkTpIvO55hRH+6NiVoDDWKtg2j7TqEb3PpXBo5XjGB4cbfNF6RVLz9XIRNuUm+ip+lYjWk6geQR8TevdjJGwG6/yUVszkcEXFzdMsp4Ws= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=vivo.com; spf=pass smtp.mailfrom=vivo.com; dkim=pass (2048-bit key) header.d=vivo.com header.i=@vivo.com header.b=gPNWjAKk; arc=fail smtp.client-ip=40.107.255.53 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=vivo.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=vivo.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=vivo.com header.i=@vivo.com header.b="gPNWjAKk" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=XETSWqR2Fzj4lkZibpyJYiMmnbAhAEy4zU30a2XMaDI45+sKzcHtxvbkZuLe3yOUO2kbXX4bLxsmqpp0+U4nV08B0PMMH6wSdOqZ4X21rdrA0MjsPQEG8jRv8kSFBvxMXcwsQ5KMgQWC4aknV7kSLJEph9kOPS7oF/S09r2o5L7G4HSKt6ESFH9RHVKEVe2CUVlsGduAOP5zcURFxZD4y4eNN2omHwXGKBoJ5khQT53/M7El5y5hZ/7jJVAbbuucxtOfjpirzFF6Sy8NsHBmQ1YLAHYfHEiucEzRGEX+PQEIqttdN5eoe9YX02FRzrNVmuj9F3f5CPwcrBfXX/Yirg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=PzUbx1KVVm0b3MYO9GzKxITsdXor8K6vEl3Ddou33l8=; b=VQysI3vW3srbVcRHp0a9FYzWAJfc3IxUdguk/f5ou9aY/hhu75PW6SzO8xR8m3SlF0bzGDMNst4q0tzGJWkt4iFLzgZ5h0ob8RjnQdQNzHm1slHqy0u+4o+8ln9uMhdwoR9z7ddWeOwB3oj78IwOfauhYCE5DI9QSGR8+aZ/BkUahXxIETFNhCd1wLjIFQT1eJGYYHot1ZQ19h0jvf1rKeOdiCbrJ9ouYw8qFOWtfY37oF4GyVyGLT/C9UaZtYPBahyOjykc1M+hjW4JhFMWfCecF0FqDGUrr+XgqzuBF2wOLEiJXQ7Sf4jDKi01y8t+eM0iUIgVaaLkASJrYilBag== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=vivo.com; dmarc=pass action=none header.from=vivo.com; dkim=pass header.d=vivo.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vivo.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PzUbx1KVVm0b3MYO9GzKxITsdXor8K6vEl3Ddou33l8=; b=gPNWjAKk4MCqDkxU+G0NrdIi4q12lmC8Gy3NrbWwHGadA/03VxHr7GX9dqLAkL74AFAw+GuPx2V90BELIfx/dBmcJ4OgiTWNi9HZFPrJznXRetGpZHQne5rY9uj9dfjnqWf/weW3wvJW/lIgyPb3XmQWn1kTaxpGKymytLym6b883Q7uHF5nYbIqP3RoxDx+nnT83hlY5S4wV+fjfbsPzjpBhhSLf1OlUkjALLzGjhRwFsyhRGCXC079NoM2+4kEmv1IOlnYB08m0KiapQR/5qXrJA8VfdtGzCkuGosdG0arFlQvjdFLu1I0CE+w8lTUYYZWspXMlIivisfiQbzZMQ== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=vivo.com; Received: from KL1PR0601MB4324.apcprd06.prod.outlook.com (2603:1096:820:73::6) by SEZPR06MB6138.apcprd06.prod.outlook.com (2603:1096:101:eb::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7918.28; Thu, 5 Sep 2024 11:06:35 +0000 Received: from KL1PR0601MB4324.apcprd06.prod.outlook.com ([fe80::f8ee:b41e:af25:202]) by KL1PR0601MB4324.apcprd06.prod.outlook.com ([fe80::f8ee:b41e:af25:202%7]) with mapi id 15.20.7918.024; Thu, 5 Sep 2024 11:06:35 +0000 From: Lin Yikai To: bpf@vger.kernel.org Cc: opensource.kernel@vivo.com, yikai.lin@vivo.com, Quentin Monnet , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan , Nathan Chancellor , Nick Desaulniers , Bill Wendling , Justin Stitt , Rameez Rehman , Kui-Feng Lee , Alan Maguire , Yuran Pereira , Jordan Rome , Chuyi Zhou , Dave Marchevsky , Menglong Dong , Tony Ambardar , Nikolay Aleksandrov , Abhishek Chauhan , Geliang Tang , Hou Tao , Ilya Leoshkevich , "Jose E. Marchesi" , Shung-Hsi Yu , David Vernet , linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, llvm@lists.linux.dev Subject: [PATCH bpf-next v1 3/3] libbpf: fix some typos in libbpf Date: Thu, 5 Sep 2024 19:03:07 +0800 Message-Id: <20240905110354.3274546-3-yikai.lin@vivo.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20240905110354.3274546-1-yikai.lin@vivo.com> References: <20240905110354.3274546-1-yikai.lin@vivo.com> X-ClientProxiedBy: SI2PR01CA0036.apcprd01.prod.exchangelabs.com (2603:1096:4:192::22) To KL1PR0601MB4324.apcprd06.prod.outlook.com (2603:1096:820:73::6) Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: KL1PR0601MB4324:EE_|SEZPR06MB6138:EE_ X-MS-Office365-Filtering-Correlation-Id: 83eab1fe-24f4-4aa6-fbec-08dccd9ace67 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|7416014|376014|52116014|38350700014; X-Microsoft-Antispam-Message-Info: =?utf-8?q?fjd+NIdHf+L1S7JQFJ1dSipMQsSbtJZ?= =?utf-8?q?u3mj11iE50hZrUotNv2IlaM3e7eBifo7NTOSKzWUDswfGGMkcJMjmOb1fpwUUbnPo?= =?utf-8?q?rmge6JlQoLfjVtR/4B27+6leKgaeGEF25TW9+u8XjseHhApzvD4P3mx6e0lzQZFWj?= =?utf-8?q?EtgRvG1nqz64TlA5K3ZcftnuEnFoCk3QJwVjhvRcV+BQWfX+CcO8klm2RLatizU/n?= =?utf-8?q?jw++219C7A4OxXkxzMm3xepO7IihZOyMMGIYFxadm+UMoYOI4XsXYWBY6/QixZsoX?= =?utf-8?q?vPG9GOkDRys3O1/jouZxMYG2sZCGKIHF4E+DmSkFeQH30hGeJGZYpFsnQynrx609Y?= =?utf-8?q?XsBSTKIMRe+KRaPHFDkK2S9oBfFY8BLD5ajUestjEDhX01cefIl8Tl9vEhp579ZHH?= =?utf-8?q?zq/QsqO2Iohuu5qXZ7c/FgtaNBPktSmrGE3vJWB3HTdFuY/ONGtuOn+w/Rq4XGHfp?= =?utf-8?q?jRu+GHO6M2hJtBc0bn/rEq/j0NwmDM6ILRKFoMqA0MEKHrL+wkOIzCrbQm8XOZjk9?= =?utf-8?q?fMuTn/wbgh8+iIXI36O3FpxlfopvL1BHhVDZQiFW9E6IyXwYTl9dWWWUz9RqAB2YG?= =?utf-8?q?UgNo8nZy81s2+ZAHXw0YkY5ZoWb2uPXXcffqTQvUpqN0VhBAzyg9tBoYL2+DwQH/C?= =?utf-8?q?YWFSuXjL0vmJdgFGyaSo3dqKtc5fB1YaRHQUYITTcVuH32f8d/e+t6igd19lsqBJa?= =?utf-8?q?C6spjOvh2aApIzHs1gcf0702fakyazlq3B3FEjGg1hOm5WMPL5qXYJQQ/7cBdIr2h?= =?utf-8?q?TMWE37pwcfm53BRIlOVwuH6TcDeo8dUUs5sznYnKbBpbTvDa3GY3Vr+xcjrfw1t7W?= =?utf-8?q?UwqqeE17w2MA/ACYkIQZixgH7Qp55e/rAxOYfPGwOIehwCeYtbNvs4mkwYHHrxoJR?= =?utf-8?q?o0pvizjrM3+imTwymAwphI7Q2fojoWHyRpdhIMZcde9P0RCKOZ1EYoTHygpEFthHd?= =?utf-8?q?3nvmuO1GEdLuqphRDOqL5m0vO3/VYGwywPyjecZHbiNtot2NEhzQbtITNtI4XPNnL?= =?utf-8?q?X2Fw6GI+b08WzcTKaXKuFXU6vf0JDPpce9oaTeypP1yyUAmEHFsXjX8ZGtaGm6LOk?= =?utf-8?q?hXF9jNUL41wbOaljY9QdrkJNun6N7MEN51ml2fOjBy19NTa4jvG8ykxp53OxcjxON?= =?utf-8?q?Lwq3Ve9dJhBo/BX//OuHJ9jMsge2wLexypEwnse/XTLQObLTxIvvlXr4NhAYPVy7S?= =?utf-8?q?Qy05B0RKoh5+7MttaJ4A/rjfGGpTM1u8x70Z+i7R4Z24ZpH7WrgxzLqRunuy2YDdR?= =?utf-8?q?v+vB7n3kyxF5UvxsM2WXahxdSgMMBxnyEEmpr2zbP2mB6eCWTbflM+1EvOK6j2kbC?= =?utf-8?q?rtFz4YD89NJVrhW9U51Ty5wLps7+9oiP8w=3D=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:KL1PR0601MB4324.apcprd06.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(7416014)(376014)(52116014)(38350700014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?yKx9Koz2LVKEbTyda5N2oS4MUsvB?= =?utf-8?q?AZa75swE7FT5Wcshtpo92yaw1PDhy3BwQmBExdQs2GmvzMAqllEuGS24BNphCU7db?= =?utf-8?q?d5/BibbwxZVqTz6OpHRWKwEcWHMIPt4tCxwdnTV99BIbkegLNcoO39eIVJQOhneaM?= =?utf-8?q?zWV/N8ZJVPubIYgySvvhWJQRbqjM6g1J2V2dqzfeoXa094Y1kRmpNskSL0bBFh+CK?= =?utf-8?q?ZppKsDptZp+kYjcI1PDIz9wSNw32ATa4AZ5PmEZEWB5h9tkGXZqoF6NTqF6WKvwPI?= =?utf-8?q?Hj9WnTQuvFLXYn4/uX7r/Q2rPDzs9AocRth0UgRvfLdMOGiKLSjfl07wkvJKm7WhI?= =?utf-8?q?21FItQmFAOWNwcZixyc6R/vmK8VDcnuofj3Xc38co7t6jRE+nlEE2VsUvcRWj8ERr?= =?utf-8?q?c7NErmmrDDUYsnhfaiDmi3hr+MfAqNztw38Q9D9yGcJRiPjRBjOKcmUJtCT8XLYvo?= =?utf-8?q?DLxG6YFbmtDQKg7/wZDg0/sQITABB+POEh7JiVWjUMsvPFLaGXo0MpmyYNiAz09w7?= =?utf-8?q?14CEvczAxsxUFHk4/f1nPtMDK9Bk1I0Z7PlfViv08Ta2qWYOuI30u6O178jBLIZ6T?= =?utf-8?q?1McFNp1MZMaXuYaPAXORlgemdsHUZZ3bO6NB2xyr9a0j0YSGe3WndAG4zY52RYgeW?= =?utf-8?q?qbCapXNeIVTPqJwSX5uyxFZdk6duV5JCKhjKXHo+iNLcmfKymVRvF1dm9i2MySTj1?= =?utf-8?q?3tmtoZWGv6vf/Y06SIggfLYKmOVjBo2mMg9RCdOPNlJRoCKHj2CjxCkX6lq9bUWCR?= =?utf-8?q?ulpF+Y6Z0GsvuonlOnRSJel+VpKaKubmiunJdv25eE4pKHbisI+uJCn0fJY9siaaL?= =?utf-8?q?K9ovsCyGhSbrmd5Csw/DKzVgU1HC7+eh+1o65KZ5PorC8mGolr2mUtyEDYQsicG1f?= =?utf-8?q?FF2cN/90nu8FTrsiz0iPrsLQT3dk/uut/bjmHfwqaySb+xKt3STHOa22MOvKFsfM1?= =?utf-8?q?NYPVy5bO5NRvUHG0GhiHVRGN9NbJidGD+pUbDy2tdOhcYpHqubAXCUhitCMInJxA/?= =?utf-8?q?P+RjE+MLoKU2p4jaPXvqD5WO2gGK9RE1kR23svxlHutmxFSKrn8DJ39deur8bWgmZ?= =?utf-8?q?aDvF/h1nlUFd9tV8/IHuSs03XCrNfK0z/ktdIXcg23Ckeh5z9FuYd9vrl7h/FTWmd?= =?utf-8?q?SN5EBt/wk1hO3uBy4eTmew0g9pTETw9XV6wKbAsf/2pD79unzgGYKdJKlTG4Pm20l?= =?utf-8?q?h9TXIeHLgCwU/yHeE0oFhb+IGttN7CO2FXB62q4GWHeOXVl6N2FkDDmWTl3xSq7oD?= =?utf-8?q?kafvT3bmLQooUpXXimu7IAjheC7mET+XSHXNWWZ2j+p1zah5e2TzGOPfOtVtI0G5w?= =?utf-8?q?8uEoWbS+NOe3RN3+yBchUvBhGjLtOyFzaDjg/lBHnpaJBvB3gaQQPaRgPgNodBac/?= =?utf-8?q?fVoHARkalDHbZXsT8EAkVASYrPuS5C2Xx3rhjtOyGBSD0YpYBxfsTn8T8+4xMPhHK?= =?utf-8?q?1iHNkenp5k+vG0l7JwqXSMHNnFqiwOaJQGJ2fFpZtgkWjtKYR9xlBZvtvPqZ+5sn0?= =?utf-8?q?dKXIRqAqwcgR?= X-OriginatorOrg: vivo.com X-MS-Exchange-CrossTenant-Network-Message-Id: 83eab1fe-24f4-4aa6-fbec-08dccd9ace67 X-MS-Exchange-CrossTenant-AuthSource: KL1PR0601MB4324.apcprd06.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Sep 2024 11:06:35.3027 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 923e42dc-48d5-4cbe-b582-1a797a6412ed X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: wr+T0H57P++6c1f4OLwWmuFPV4fJ7gjD0gJHMSBY3+3MQj1tBeHeuSdpsVUgD71v2XElz14Pm7Q/Es8TsVWNpg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SEZPR06MB6138 X-Patchwork-Delegate: bpf@iogearbox.net Hi, fix some spelling errors in libbpf, the details are as follows: -in the code comments: termintaing->terminating architecutre->architecture requring->requiring recored->recoded sanitise->sanities allowd->allowed abover->above see bpf_udst_arg()->see bpf_usdt_arg() Signed-off-by: Lin Yikai --- tools/lib/bpf/bpf.h | 4 ++-- tools/lib/bpf/bpf_tracing.h | 4 ++-- tools/lib/bpf/btf.c | 2 +- tools/lib/bpf/libbpf.c | 2 +- tools/lib/bpf/linker.c | 4 ++-- tools/lib/bpf/usdt.bpf.h | 2 +- 6 files changed, 9 insertions(+), 9 deletions(-) diff --git a/tools/lib/bpf/bpf.h b/tools/lib/bpf/bpf.h index 972e17ec0c09..a4a7b1ad1b63 100644 --- a/tools/lib/bpf/bpf.h +++ b/tools/lib/bpf/bpf.h @@ -100,7 +100,7 @@ struct bpf_prog_load_opts { __u32 log_level; __u32 log_size; char *log_buf; - /* output: actual total log contents size (including termintaing zero). + /* output: actual total log contents size (including terminating zero). * It could be both larger than original log_size (if log was * truncated), or smaller (if log buffer wasn't filled completely). * If kernel doesn't support this feature, log_size is left unchanged. @@ -129,7 +129,7 @@ struct bpf_btf_load_opts { char *log_buf; __u32 log_level; __u32 log_size; - /* output: actual total log contents size (including termintaing zero). + /* output: actual total log contents size (including terminating zero). * It could be both larger than original log_size (if log was * truncated), or smaller (if log buffer wasn't filled completely). * If kernel doesn't support this feature, log_size is left unchanged. diff --git a/tools/lib/bpf/bpf_tracing.h b/tools/lib/bpf/bpf_tracing.h index 9314fa95f04e..9e45291e40ee 100644 --- a/tools/lib/bpf/bpf_tracing.h +++ b/tools/lib/bpf/bpf_tracing.h @@ -473,7 +473,7 @@ struct pt_regs; #endif /* * Similarly, syscall-specific conventions might differ between function call - * conventions within each architecutre. All supported architectures pass + * conventions within each architecture. All supported architectures pass * either 6 or 7 syscall arguments in registers. * * See syscall(2) manpage for succinct table with information on each arch. @@ -651,7 +651,7 @@ struct pt_regs; * BPF_PROG is a convenience wrapper for generic tp_btf/fentry/fexit and * similar kinds of BPF programs, that accept input arguments as a single * pointer to untyped u64 array, where each u64 can actually be a typed - * pointer or integer of different size. Instead of requring user to write + * pointer or integer of different size. Instead of requiring user to write * manual casts and work with array elements by index, BPF_PROG macro * allows user to declare a list of named and typed input arguments in the * same syntax as for normal C function. All the casting is hidden and diff --git a/tools/lib/bpf/btf.c b/tools/lib/bpf/btf.c index 40aae244e35f..8d51e73d55a8 100644 --- a/tools/lib/bpf/btf.c +++ b/tools/lib/bpf/btf.c @@ -4192,7 +4192,7 @@ static bool btf_dedup_identical_structs(struct btf_dedup *d, __u32 id1, __u32 id * and canonical graphs are not compatible structurally, whole graphs are * incompatible. If types are structurally equivalent (i.e., all information * except referenced type IDs is exactly the same), a mapping from `canon_id` to - * a `cand_id` is recored in hypothetical mapping (`btf_dedup->hypot_map`). + * a `cand_id` is recoded in hypothetical mapping (`btf_dedup->hypot_map`). * If a type references other types, then those referenced types are checked * for equivalence recursively. * diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c index d3a542649e6b..27ad3c6ee868 100644 --- a/tools/lib/bpf/libbpf.c +++ b/tools/lib/bpf/libbpf.c @@ -1848,7 +1848,7 @@ static char *internal_map_name(struct bpf_object *obj, const char *real_name) snprintf(map_name, sizeof(map_name), "%.*s%.*s", pfx_len, obj->name, sfx_len, real_name); - /* sanitise map name to characters allowed by kernel */ + /* sanities map name to characters allowed by kernel */ for (p = map_name; *p && p < map_name + sizeof(map_name); p++) if (!isalnum(*p) && *p != '_' && *p != '.') *p = '_'; diff --git a/tools/lib/bpf/linker.c b/tools/lib/bpf/linker.c index 9cd3d4109788..e0005c6ade88 100644 --- a/tools/lib/bpf/linker.c +++ b/tools/lib/bpf/linker.c @@ -1413,7 +1413,7 @@ static bool glob_sym_btf_matches(const char *sym_name, bool exact, return true; case BTF_KIND_PTR: /* just validate overall shape of the referenced type, so no - * contents comparison for struct/union, and allowd fwd vs + * contents comparison for struct/union, and allowed fwd vs * struct/union */ exact = false; @@ -1962,7 +1962,7 @@ static int linker_append_elf_sym(struct bpf_linker *linker, struct src_obj *obj, /* If existing symbol is a strong resolved symbol, bail out, * because we lost resolution battle have nothing to - * contribute. We already checked abover that there is no + * contribute. We already checked above that there is no * strong-strong conflict. We also already tightened binding * and visibility, so nothing else to contribute at that point. */ diff --git a/tools/lib/bpf/usdt.bpf.h b/tools/lib/bpf/usdt.bpf.h index 76359bcdc94a..b811f754939f 100644 --- a/tools/lib/bpf/usdt.bpf.h +++ b/tools/lib/bpf/usdt.bpf.h @@ -39,7 +39,7 @@ enum __bpf_usdt_arg_type { struct __bpf_usdt_arg_spec { /* u64 scalar interpreted depending on arg_type, see below */ __u64 val_off; - /* arg location case, see bpf_udst_arg() for details */ + /* arg location case, see bpf_usdt_arg() for details */ enum __bpf_usdt_arg_type arg_type; /* offset of referenced register within struct pt_regs */ short reg_off;