From patchwork Sat Oct 26 12:53:38 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Puranjay Mohan X-Patchwork-Id: 13852223 X-Patchwork-Delegate: bpf@iogearbox.net Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 222591D63E6; Sat, 26 Oct 2024 12:54:21 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729947262; cv=none; b=MTHFPzP74UiMpxl2rV/SiBJej347zxJRP6L66mqzw1kCC7upnQtdx6MBn1HfsLzFU6cEQvZK2+d6mq6O+bKD/Jf4NNW8gTnmSq1S/WcV3Y9M54TGGqhCJZSUdp7pgRoL9iqxcKj2RkjtazLxF2kOlvejEvGLhZTgoWFbNWTY6ow= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729947262; c=relaxed/simple; bh=iKa9bcxI6W9fsHF/fh/13PtU+WQ5xvNEzWBxiNVZ7eU=; h=From:To:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version:Content-Type; b=GZWuMPkG97wRnRyHxYLOMo5CS9D8Ko8KTDs5I0cJwqAKcNg9Q84mlwSAYOBUKbu37oHj7Xw1QcmIulGZtYB+uM2Sl45eOCjcCxJ7MdIwKbvnWIVYOcqDIUVSu1KiLryL1lYxApEI8CS5/YBwB6/u6pye5sEbjCgoBgsuVMRGdiQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Rr0HF2A4; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Rr0HF2A4" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 425CCC4CEC6; Sat, 26 Oct 2024 12:54:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1729947261; bh=iKa9bcxI6W9fsHF/fh/13PtU+WQ5xvNEzWBxiNVZ7eU=; h=From:To:Subject:Date:In-Reply-To:References:From; b=Rr0HF2A4OHxPVLkG66zIsA8D6iwuAPYLezAGVOe/LUIHoNOkc7djYPSo/4eVX6vhM KZO9ycMHcppjPtg5UFEHlnpWavhEMZfStN9lFTBq61LrrJKX+S2aC9O/wfTk8q4QEM bHvqgX6KwJlR7NgqtT2XZEgZMhjYnrqNtM8KxPI1v+MhHGRb+KOTVRCgRUmlX4uhr/ 2w83yfInFhGYwKGAjNG+lhqxaRUL2RxRtWSyR8zQ+ywIaK74PRt5gZ6BC8tbgA0VJL t+jAu+jZpKkdFqawZb7PfXODUJOXJNrOLy5zbXX+lFlbUVm3ROekitz7DtYgsJDHJO HbV0NDFvPIhbg== From: Puranjay Mohan To: Albert Ou , Alexei Starovoitov , Andrew Morton , Andrii Nakryiko , bpf@vger.kernel.org, Daniel Borkmann , "David S. Miller" , Eduard Zingerman , Eric Dumazet , Hao Luo , Helge Deller , Jakub Kicinski , "James E.J. Bottomley" , Jiri Olsa , John Fastabend , KP Singh , linux-kernel@vger.kernel.org, linux-parisc@vger.kernel.org, linux-riscv@lists.infradead.org, Martin KaFai Lau , Mykola Lysenko , netdev@vger.kernel.org, Palmer Dabbelt , Paolo Abeni , Paul Walmsley , Puranjay Mohan , Puranjay Mohan , Shuah Khan , Song Liu , Stanislav Fomichev , Yonghong Song Subject: [PATCH bpf-next v3 3/4] selftests/bpf: don't mask result of bpf_csum_diff() in test_verifier Date: Sat, 26 Oct 2024 12:53:38 +0000 Message-Id: <20241026125339.26459-4-puranjay@kernel.org> X-Mailer: git-send-email 2.40.1 In-Reply-To: <20241026125339.26459-1-puranjay@kernel.org> References: <20241026125339.26459-1-puranjay@kernel.org> Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: bpf@iogearbox.net The bpf_csum_diff() helper has been fixed to return a 16-bit value for all archs, so now we don't need to mask the result. This commit is basically reverting the below: commit 6185266c5a85 ("selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier") Signed-off-by: Puranjay Mohan Acked-by: Daniel Borkmann Reviewed-by: Toke Høiland-Jørgensen --- tools/testing/selftests/bpf/progs/verifier_array_access.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/tools/testing/selftests/bpf/progs/verifier_array_access.c b/tools/testing/selftests/bpf/progs/verifier_array_access.c index 95d7ecc12963b..4195aa824ba55 100644 --- a/tools/testing/selftests/bpf/progs/verifier_array_access.c +++ b/tools/testing/selftests/bpf/progs/verifier_array_access.c @@ -368,8 +368,7 @@ __naked void a_read_only_array_2_1(void) r4 = 0; \ r5 = 0; \ call %[bpf_csum_diff]; \ -l0_%=: r0 &= 0xffff; \ - exit; \ +l0_%=: exit; \ " : : __imm(bpf_csum_diff), __imm(bpf_map_lookup_elem),