On Thu, 20 Mar 2025 09:45:17 -0700 Song Liu <s...@kernel.org> wrote:
>
> On Wed, Mar 19, 2025 at 8:23 PM Feng Yang <yangfeng59...@163.com> wrote:
> >
> > From: Feng Yang <yangf...@kylinos.cn>
> >
> > Most of the judgments also exist in bpf_base_func_deto, remove them.
>
> "Most" of them also exist is not enough. Please make sure that this does
> not introduce any behavior change. For example, we should not remove
> return of bpf_perf_event_read_value_proto.

in trace/bpf_trace.c:
const struct bpf_func_proto *bpf_get_perf_event_read_value_proto(void)
{
        return &bpf_perf_event_read_value_proto;
}
in bpf/core.c:
const struct bpf_func_proto * __weak bpf_get_perf_event_read_value_proto(void)
{
        return NULL;
}

And weak symbols will be covered
nm vmlinux | grep bpf_get_perf_event_read_value_proto
ffffffff814b90e0 T bpf_get_perf_event_read_value_proto
ffffffff814b90d0 T __pfx_bpf_get_perf_event_read_value_proto

So the return of bpf_perf_event_read_value_proto can be done through the 
bpf_base_func_proto function.
bpf_base_func_proto
        ......
        case BPF_FUNC_perf_event_read_value:
                return bpf_get_perf_event_read_value_proto();

I think this can be removed.

> For future patches, please read Documentation/bpf/bpf_devel_QA.rst
> and follow rules for email subject, etc. For example, this patch should
> have a subject like "[PATCH bpf-next] xxx".

Thank you very much for your suggestion. I will pay attention to it next time.

> Thanks,
> Song



Reply via email to