From patchwork Thu Sep 5 11:03:07 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lin Yikai X-Patchwork-Id: 825730 Received: from APC01-PSA-obe.outbound.protection.outlook.com (mail-psaapc01on2053.outbound.protection.outlook.com [40.107.255.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C00E1197A95; Thu, 5 Sep 2024 11:06:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.255.53 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725534404; cv=fail; b=rvlgCQ731RaDNSBoR/LCQjmuFitNnw1r2P6iMqC/+zxEF7lA4oWDMzhYEMfTjm45NOXHkQaDbqf5y+8AdVQ/SrU1yDCd+n73y7t7WFZTwAT1QS0dYPqHg4dt6o2Rcs8PKHs3hj/GzT2xsZL2++NPZ3HrEdZRyJNQRpm0eFllgzE= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1725534404; c=relaxed/simple; bh=HvpZwKwLJzGxWdlIr4bYn3E1/Q12W6UXhnH8S3eFvR8=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: Content-Type:MIME-Version; b=rTriIVZOStjVu7YWsazhmOwBvvKDxAeF9wmejm83M6y0n+Fg777wps4c30Im2xIOhIVkTpIvO55hRH+6NiVoDDWKtg2j7TqEb3PpXBo5XjGB4cbfNF6RVLz9XIRNuUm+ip+lYjWk6geQR8TevdjJGwG6/yUVszkcEXFzdMsp4Ws= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=vivo.com; spf=pass smtp.mailfrom=vivo.com; dkim=pass (2048-bit key) header.d=vivo.com header.i=@vivo.com header.b=gPNWjAKk; arc=fail smtp.client-ip=40.107.255.53 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=vivo.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=vivo.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=vivo.com header.i=@vivo.com header.b="gPNWjAKk" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=XETSWqR2Fzj4lkZibpyJYiMmnbAhAEy4zU30a2XMaDI45+sKzcHtxvbkZuLe3yOUO2kbXX4bLxsmqpp0+U4nV08B0PMMH6wSdOqZ4X21rdrA0MjsPQEG8jRv8kSFBvxMXcwsQ5KMgQWC4aknV7kSLJEph9kOPS7oF/S09r2o5L7G4HSKt6ESFH9RHVKEVe2CUVlsGduAOP5zcURFxZD4y4eNN2omHwXGKBoJ5khQT53/M7El5y5hZ/7jJVAbbuucxtOfjpirzFF6Sy8NsHBmQ1YLAHYfHEiucEzRGEX+PQEIqttdN5eoe9YX02FRzrNVmuj9F3f5CPwcrBfXX/Yirg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=PzUbx1KVVm0b3MYO9GzKxITsdXor8K6vEl3Ddou33l8=; b=VQysI3vW3srbVcRHp0a9FYzWAJfc3IxUdguk/f5ou9aY/hhu75PW6SzO8xR8m3SlF0bzGDMNst4q0tzGJWkt4iFLzgZ5h0ob8RjnQdQNzHm1slHqy0u+4o+8ln9uMhdwoR9z7ddWeOwB3oj78IwOfauhYCE5DI9QSGR8+aZ/BkUahXxIETFNhCd1wLjIFQT1eJGYYHot1ZQ19h0jvf1rKeOdiCbrJ9ouYw8qFOWtfY37oF4GyVyGLT/C9UaZtYPBahyOjykc1M+hjW4JhFMWfCecF0FqDGUrr+XgqzuBF2wOLEiJXQ7Sf4jDKi01y8t+eM0iUIgVaaLkASJrYilBag== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=vivo.com; dmarc=pass action=none header.from=vivo.com; dkim=pass header.d=vivo.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vivo.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PzUbx1KVVm0b3MYO9GzKxITsdXor8K6vEl3Ddou33l8=; b=gPNWjAKk4MCqDkxU+G0NrdIi4q12lmC8Gy3NrbWwHGadA/03VxHr7GX9dqLAkL74AFAw+GuPx2V90BELIfx/dBmcJ4OgiTWNi9HZFPrJznXRetGpZHQne5rY9uj9dfjnqWf/weW3wvJW/lIgyPb3XmQWn1kTaxpGKymytLym6b883Q7uHF5nYbIqP3RoxDx+nnT83hlY5S4wV+fjfbsPzjpBhhSLf1OlUkjALLzGjhRwFsyhRGCXC079NoM2+4kEmv1IOlnYB08m0KiapQR/5qXrJA8VfdtGzCkuGosdG0arFlQvjdFLu1I0CE+w8lTUYYZWspXMlIivisfiQbzZMQ== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=vivo.com; Received: from KL1PR0601MB4324.apcprd06.prod.outlook.com (2603:1096:820:73::6) by SEZPR06MB6138.apcprd06.prod.outlook.com (2603:1096:101:eb::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7918.28; Thu, 5 Sep 2024 11:06:35 +0000 Received: from KL1PR0601MB4324.apcprd06.prod.outlook.com ([fe80::f8ee:b41e:af25:202]) by KL1PR0601MB4324.apcprd06.prod.outlook.com ([fe80::f8ee:b41e:af25:202%7]) with mapi id 15.20.7918.024; Thu, 5 Sep 2024 11:06:35 +0000 From: Lin Yikai To: bpf@vger.kernel.org Cc: opensource.kernel@vivo.com, yikai.lin@vivo.com, Quentin Monnet , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Mykola Lysenko , Shuah Khan , Nathan Chancellor , Nick Desaulniers , Bill Wendling , Justin Stitt , Rameez Rehman , Kui-Feng Lee , Alan Maguire , Yuran Pereira , Jordan Rome , Chuyi Zhou , Dave Marchevsky , Menglong Dong , Tony Ambardar , Nikolay Aleksandrov , Abhishek Chauhan , Geliang Tang , Hou Tao , Ilya Leoshkevich , "Jose E. Marchesi" , Shung-Hsi Yu , David Vernet , linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, llvm@lists.linux.dev Subject: [PATCH bpf-next v1 3/3] libbpf: fix some typos in libbpf Date: Thu, 5 Sep 2024 19:03:07 +0800 Message-Id: <20240905110354.3274546-3-yikai.lin@vivo.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20240905110354.3274546-1-yikai.lin@vivo.com> References: <20240905110354.3274546-1-yikai.lin@vivo.com> X-ClientProxiedBy: SI2PR01CA0036.apcprd01.prod.exchangelabs.com (2603:1096:4:192::22) To KL1PR0601MB4324.apcprd06.prod.outlook.com (2603:1096:820:73::6) Precedence: bulk X-Mailing-List: linux-kselftest@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: KL1PR0601MB4324:EE_|SEZPR06MB6138:EE_ X-MS-Office365-Filtering-Correlation-Id: 83eab1fe-24f4-4aa6-fbec-08dccd9ace67 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|366016|7416014|376014|52116014|38350700014; X-Microsoft-Antispam-Message-Info: =?utf-8?q?fjd+NIdHf+L1S7JQFJ1dSipMQsSbtJZ?= =?utf-8?q?u3mj11iE50hZrUotNv2IlaM3e7eBifo7NTOSKzWUDswfGGMkcJMjmOb1fpwUUbnPo?= =?utf-8?q?rmge6JlQoLfjVtR/4B27+6leKgaeGEF25TW9+u8XjseHhApzvD4P3mx6e0lzQZFWj?= =?utf-8?q?EtgRvG1nqz64TlA5K3ZcftnuEnFoCk3QJwVjhvRcV+BQWfX+CcO8klm2RLatizU/n?= =?utf-8?q?jw++219C7A4OxXkxzMm3xepO7IihZOyMMGIYFxadm+UMoYOI4XsXYWBY6/QixZsoX?= =?utf-8?q?vPG9GOkDRys3O1/jouZxMYG2sZCGKIHF4E+DmSkFeQH30hGeJGZYpFsnQynrx609Y?= =?utf-8?q?XsBSTKIMRe+KRaPHFDkK2S9oBfFY8BLD5ajUestjEDhX01cefIl8Tl9vEhp579ZHH?= =?utf-8?q?zq/QsqO2Iohuu5qXZ7c/FgtaNBPktSmrGE3vJWB3HTdFuY/ONGtuOn+w/Rq4XGHfp?= =?utf-8?q?jRu+GHO6M2hJtBc0bn/rEq/j0NwmDM6ILRKFoMqA0MEKHrL+wkOIzCrbQm8XOZjk9?= =?utf-8?q?fMuTn/wbgh8+iIXI36O3FpxlfopvL1BHhVDZQiFW9E6IyXwYTl9dWWWUz9RqAB2YG?= =?utf-8?q?UgNo8nZy81s2+ZAHXw0YkY5ZoWb2uPXXcffqTQvUpqN0VhBAzyg9tBoYL2+DwQH/C?= =?utf-8?q?YWFSuXjL0vmJdgFGyaSo3dqKtc5fB1YaRHQUYITTcVuH32f8d/e+t6igd19lsqBJa?= =?utf-8?q?C6spjOvh2aApIzHs1gcf0702fakyazlq3B3FEjGg1hOm5WMPL5qXYJQQ/7cBdIr2h?= =?utf-8?q?TMWE37pwcfm53BRIlOVwuH6TcDeo8dUUs5sznYnKbBpbTvDa3GY3Vr+xcjrfw1t7W?= =?utf-8?q?UwqqeE17w2MA/ACYkIQZixgH7Qp55e/rAxOYfPGwOIehwCeYtbNvs4mkwYHHrxoJR?= =?utf-8?q?o0pvizjrM3+imTwymAwphI7Q2fojoWHyRpdhIMZcde9P0RCKOZ1EYoTHygpEFthHd?= =?utf-8?q?3nvmuO1GEdLuqphRDOqL5m0vO3/VYGwywPyjecZHbiNtot2NEhzQbtITNtI4XPNnL?= =?utf-8?q?X2Fw6GI+b08WzcTKaXKuFXU6vf0JDPpce9oaTeypP1yyUAmEHFsXjX8ZGtaGm6LOk?= =?utf-8?q?hXF9jNUL41wbOaljY9QdrkJNun6N7MEN51ml2fOjBy19NTa4jvG8ykxp53OxcjxON?= =?utf-8?q?Lwq3Ve9dJhBo/BX//OuHJ9jMsge2wLexypEwnse/XTLQObLTxIvvlXr4NhAYPVy7S?= =?utf-8?q?Qy05B0RKoh5+7MttaJ4A/rjfGGpTM1u8x70Z+i7R4Z24ZpH7WrgxzLqRunuy2YDdR?= =?utf-8?q?v+vB7n3kyxF5UvxsM2WXahxdSgMMBxnyEEmpr2zbP2mB6eCWTbflM+1EvOK6j2kbC?= =?utf-8?q?rtFz4YD89NJVrhW9U51Ty5wLps7+9oiP8w=3D=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:KL1PR0601MB4324.apcprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230040)(1800799024)(366016)(7416014)(376014)(52116014)(38350700014); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?yKx9Koz2LVKEbTyda5N2oS4MUsvB?= =?utf-8?q?AZa75swE7FT5Wcshtpo92yaw1PDhy3BwQmBExdQs2GmvzMAqllEuGS24BNphCU7db?= =?utf-8?q?d5/BibbwxZVqTz6OpHRWKwEcWHMIPt4tCxwdnTV99BIbkegLNcoO39eIVJQOhneaM?= =?utf-8?q?zWV/N8ZJVPubIYgySvvhWJQRbqjM6g1J2V2dqzfeoXa094Y1kRmpNskSL0bBFh+CK?= =?utf-8?q?ZppKsDptZp+kYjcI1PDIz9wSNw32ATa4AZ5PmEZEWB5h9tkGXZqoF6NTqF6WKvwPI?= =?utf-8?q?Hj9WnTQuvFLXYn4/uX7r/Q2rPDzs9AocRth0UgRvfLdMOGiKLSjfl07wkvJKm7WhI?= =?utf-8?q?21FItQmFAOWNwcZixyc6R/vmK8VDcnuofj3Xc38co7t6jRE+nlEE2VsUvcRWj8ERr?= =?utf-8?q?c7NErmmrDDUYsnhfaiDmi3hr+MfAqNztw38Q9D9yGcJRiPjRBjOKcmUJtCT8XLYvo?= =?utf-8?q?DLxG6YFbmtDQKg7/wZDg0/sQITABB+POEh7JiVWjUMsvPFLaGXo0MpmyYNiAz09w7?= =?utf-8?q?14CEvczAxsxUFHk4/f1nPtMDK9Bk1I0Z7PlfViv08Ta2qWYOuI30u6O178jBLIZ6T?= =?utf-8?q?1McFNp1MZMaXuYaPAXORlgemdsHUZZ3bO6NB2xyr9a0j0YSGe3WndAG4zY52RYgeW?= =?utf-8?q?qbCapXNeIVTPqJwSX5uyxFZdk6duV5JCKhjKXHo+iNLcmfKymVRvF1dm9i2MySTj1?= =?utf-8?q?3tmtoZWGv6vf/Y06SIggfLYKmOVjBo2mMg9RCdOPNlJRoCKHj2CjxCkX6lq9bUWCR?= =?utf-8?q?ulpF+Y6Z0GsvuonlOnRSJel+VpKaKubmiunJdv25eE4pKHbisI+uJCn0fJY9siaaL?= =?utf-8?q?K9ovsCyGhSbrmd5Csw/DKzVgU1HC7+eh+1o65KZ5PorC8mGolr2mUtyEDYQsicG1f?= =?utf-8?q?FF2cN/90nu8FTrsiz0iPrsLQT3dk/uut/bjmHfwqaySb+xKt3STHOa22MOvKFsfM1?= =?utf-8?q?NYPVy5bO5NRvUHG0GhiHVRGN9NbJidGD+pUbDy2tdOhcYpHqubAXCUhitCMInJxA/?= =?utf-8?q?P+RjE+MLoKU2p4jaPXvqD5WO2gGK9RE1kR23svxlHutmxFSKrn8DJ39deur8bWgmZ?= =?utf-8?q?aDvF/h1nlUFd9tV8/IHuSs03XCrNfK0z/ktdIXcg23Ckeh5z9FuYd9vrl7h/FTWmd?= =?utf-8?q?SN5EBt/wk1hO3uBy4eTmew0g9pTETw9XV6wKbAsf/2pD79unzgGYKdJKlTG4Pm20l?= =?utf-8?q?h9TXIeHLgCwU/yHeE0oFhb+IGttN7CO2FXB62q4GWHeOXVl6N2FkDDmWTl3xSq7oD?= =?utf-8?q?kafvT3bmLQooUpXXimu7IAjheC7mET+XSHXNWWZ2j+p1zah5e2TzGOPfOtVtI0G5w?= =?utf-8?q?8uEoWbS+NOe3RN3+yBchUvBhGjLtOyFzaDjg/lBHnpaJBvB3gaQQPaRgPgNodBac/?= =?utf-8?q?fVoHARkalDHbZXsT8EAkVASYrPuS5C2Xx3rhjtOyGBSD0YpYBxfsTn8T8+4xMPhHK?= =?utf-8?q?1iHNkenp5k+vG0l7JwqXSMHNnFqiwOaJQGJ2fFpZtgkWjtKYR9xlBZvtvPqZ+5sn0?= =?utf-8?q?dKXIRqAqwcgR?= X-OriginatorOrg: vivo.com X-MS-Exchange-CrossTenant-Network-Message-Id: 83eab1fe-24f4-4aa6-fbec-08dccd9ace67 X-MS-Exchange-CrossTenant-AuthSource: KL1PR0601MB4324.apcprd06.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Sep 2024 11:06:35.3027 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 923e42dc-48d5-4cbe-b582-1a797a6412ed X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: wr+T0H57P++6c1f4OLwWmuFPV4fJ7gjD0gJHMSBY3+3MQj1tBeHeuSdpsVUgD71v2XElz14Pm7Q/Es8TsVWNpg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SEZPR06MB6138 Hi, fix some spelling errors in libbpf, the details are as follows: -in the code comments: termintaing->terminating architecutre->architecture requring->requiring recored->recoded sanitise->sanities allowd->allowed abover->above see bpf_udst_arg()->see bpf_usdt_arg() Signed-off-by: Lin Yikai --- tools/lib/bpf/bpf.h | 4 ++-- tools/lib/bpf/bpf_tracing.h | 4 ++-- tools/lib/bpf/btf.c | 2 +- tools/lib/bpf/libbpf.c | 2 +- tools/lib/bpf/linker.c | 4 ++-- tools/lib/bpf/usdt.bpf.h | 2 +- 6 files changed, 9 insertions(+), 9 deletions(-) diff --git a/tools/lib/bpf/bpf.h b/tools/lib/bpf/bpf.h index 972e17ec0c09..a4a7b1ad1b63 100644 --- a/tools/lib/bpf/bpf.h +++ b/tools/lib/bpf/bpf.h @@ -100,7 +100,7 @@ struct bpf_prog_load_opts { __u32 log_level; __u32 log_size; char *log_buf; - /* output: actual total log contents size (including termintaing zero). + /* output: actual total log contents size (including terminating zero). * It could be both larger than original log_size (if log was * truncated), or smaller (if log buffer wasn't filled completely). * If kernel doesn't support this feature, log_size is left unchanged. @@ -129,7 +129,7 @@ struct bpf_btf_load_opts { char *log_buf; __u32 log_level; __u32 log_size; - /* output: actual total log contents size (including termintaing zero). + /* output: actual total log contents size (including terminating zero). * It could be both larger than original log_size (if log was * truncated), or smaller (if log buffer wasn't filled completely). * If kernel doesn't support this feature, log_size is left unchanged. diff --git a/tools/lib/bpf/bpf_tracing.h b/tools/lib/bpf/bpf_tracing.h index 9314fa95f04e..9e45291e40ee 100644 --- a/tools/lib/bpf/bpf_tracing.h +++ b/tools/lib/bpf/bpf_tracing.h @@ -473,7 +473,7 @@ struct pt_regs; #endif /* * Similarly, syscall-specific conventions might differ between function call - * conventions within each architecutre. All supported architectures pass + * conventions within each architecture. All supported architectures pass * either 6 or 7 syscall arguments in registers. * * See syscall(2) manpage for succinct table with information on each arch. @@ -651,7 +651,7 @@ struct pt_regs; * BPF_PROG is a convenience wrapper for generic tp_btf/fentry/fexit and * similar kinds of BPF programs, that accept input arguments as a single * pointer to untyped u64 array, where each u64 can actually be a typed - * pointer or integer of different size. Instead of requring user to write + * pointer or integer of different size. Instead of requiring user to write * manual casts and work with array elements by index, BPF_PROG macro * allows user to declare a list of named and typed input arguments in the * same syntax as for normal C function. All the casting is hidden and diff --git a/tools/lib/bpf/btf.c b/tools/lib/bpf/btf.c index 40aae244e35f..8d51e73d55a8 100644 --- a/tools/lib/bpf/btf.c +++ b/tools/lib/bpf/btf.c @@ -4192,7 +4192,7 @@ static bool btf_dedup_identical_structs(struct btf_dedup *d, __u32 id1, __u32 id * and canonical graphs are not compatible structurally, whole graphs are * incompatible. If types are structurally equivalent (i.e., all information * except referenced type IDs is exactly the same), a mapping from `canon_id` to - * a `cand_id` is recored in hypothetical mapping (`btf_dedup->hypot_map`). + * a `cand_id` is recoded in hypothetical mapping (`btf_dedup->hypot_map`). * If a type references other types, then those referenced types are checked * for equivalence recursively. * diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c index d3a542649e6b..27ad3c6ee868 100644 --- a/tools/lib/bpf/libbpf.c +++ b/tools/lib/bpf/libbpf.c @@ -1848,7 +1848,7 @@ static char *internal_map_name(struct bpf_object *obj, const char *real_name) snprintf(map_name, sizeof(map_name), "%.*s%.*s", pfx_len, obj->name, sfx_len, real_name); - /* sanitise map name to characters allowed by kernel */ + /* sanities map name to characters allowed by kernel */ for (p = map_name; *p && p < map_name + sizeof(map_name); p++) if (!isalnum(*p) && *p != '_' && *p != '.') *p = '_'; diff --git a/tools/lib/bpf/linker.c b/tools/lib/bpf/linker.c index 9cd3d4109788..e0005c6ade88 100644 --- a/tools/lib/bpf/linker.c +++ b/tools/lib/bpf/linker.c @@ -1413,7 +1413,7 @@ static bool glob_sym_btf_matches(const char *sym_name, bool exact, return true; case BTF_KIND_PTR: /* just validate overall shape of the referenced type, so no - * contents comparison for struct/union, and allowd fwd vs + * contents comparison for struct/union, and allowed fwd vs * struct/union */ exact = false; @@ -1962,7 +1962,7 @@ static int linker_append_elf_sym(struct bpf_linker *linker, struct src_obj *obj, /* If existing symbol is a strong resolved symbol, bail out, * because we lost resolution battle have nothing to - * contribute. We already checked abover that there is no + * contribute. We already checked above that there is no * strong-strong conflict. We also already tightened binding * and visibility, so nothing else to contribute at that point. */ diff --git a/tools/lib/bpf/usdt.bpf.h b/tools/lib/bpf/usdt.bpf.h index 76359bcdc94a..b811f754939f 100644 --- a/tools/lib/bpf/usdt.bpf.h +++ b/tools/lib/bpf/usdt.bpf.h @@ -39,7 +39,7 @@ enum __bpf_usdt_arg_type { struct __bpf_usdt_arg_spec { /* u64 scalar interpreted depending on arg_type, see below */ __u64 val_off; - /* arg location case, see bpf_udst_arg() for details */ + /* arg location case, see bpf_usdt_arg() for details */ enum __bpf_usdt_arg_type arg_type; /* offset of referenced register within struct pt_regs */ short reg_off;