diff options
author | Michael Holzheu <holzheu@linux.vnet.ibm.com> | 2015-05-13 23:40:39 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2015-05-14 22:47:14 -0400 |
commit | 56cbaa45dde2356d46c3d9a26c5f09f91156e5a7 (patch) | |
tree | 2f7786d6df0ca95e4e70e7a2d4d7eafb33c020be /lib/test_bpf.c | |
parent | 3365495c1883561e4a8811f46a3800c512a3c00a (diff) |
test_bpf: fix sparse warnings
Fix several sparse warnings like:
lib/test_bpf.c:1824:25: sparse: constant 4294967295 is so big it is long
lib/test_bpf.c:1878:25: sparse: constant 0x0000ffffffff0000 is so big it is long
Fixes: cffc642d93f9 ("test_bpf: add 173 new testcases for eBPF")
Reported-by: Fengguang Wu <fengguang.wu@intel.com>
Signed-off-by: Michael Holzheu <holzheu@linux.vnet.ibm.com>
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'lib/test_bpf.c')
-rw-r--r-- | lib/test_bpf.c | 122 |
1 files changed, 61 insertions, 61 deletions
diff --git a/lib/test_bpf.c b/lib/test_bpf.c index 66358b21acce..aaa0a40a7eb3 100644 --- a/lib/test_bpf.c +++ b/lib/test_bpf.c | |||
@@ -2008,13 +2008,13 @@ static struct bpf_test tests[] = { | |||
2008 | { | 2008 | { |
2009 | "ALU_MOV_X: dst = 4294967295", | 2009 | "ALU_MOV_X: dst = 4294967295", |
2010 | .u.insns_int = { | 2010 | .u.insns_int = { |
2011 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967295), | 2011 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967295U), |
2012 | BPF_ALU32_REG(BPF_MOV, R0, R1), | 2012 | BPF_ALU32_REG(BPF_MOV, R0, R1), |
2013 | BPF_EXIT_INSN(), | 2013 | BPF_EXIT_INSN(), |
2014 | }, | 2014 | }, |
2015 | INTERNAL, | 2015 | INTERNAL, |
2016 | { }, | 2016 | { }, |
2017 | { { 0, 4294967295 } }, | 2017 | { { 0, 4294967295U } }, |
2018 | }, | 2018 | }, |
2019 | { | 2019 | { |
2020 | "ALU64_MOV_X: dst = 2", | 2020 | "ALU64_MOV_X: dst = 2", |
@@ -2030,13 +2030,13 @@ static struct bpf_test tests[] = { | |||
2030 | { | 2030 | { |
2031 | "ALU64_MOV_X: dst = 4294967295", | 2031 | "ALU64_MOV_X: dst = 4294967295", |
2032 | .u.insns_int = { | 2032 | .u.insns_int = { |
2033 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967295), | 2033 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967295U), |
2034 | BPF_ALU64_REG(BPF_MOV, R0, R1), | 2034 | BPF_ALU64_REG(BPF_MOV, R0, R1), |
2035 | BPF_EXIT_INSN(), | 2035 | BPF_EXIT_INSN(), |
2036 | }, | 2036 | }, |
2037 | INTERNAL, | 2037 | INTERNAL, |
2038 | { }, | 2038 | { }, |
2039 | { { 0, 4294967295 } }, | 2039 | { { 0, 4294967295U } }, |
2040 | }, | 2040 | }, |
2041 | /* BPF_ALU | BPF_MOV | BPF_K */ | 2041 | /* BPF_ALU | BPF_MOV | BPF_K */ |
2042 | { | 2042 | { |
@@ -2052,18 +2052,18 @@ static struct bpf_test tests[] = { | |||
2052 | { | 2052 | { |
2053 | "ALU_MOV_K: dst = 4294967295", | 2053 | "ALU_MOV_K: dst = 4294967295", |
2054 | .u.insns_int = { | 2054 | .u.insns_int = { |
2055 | BPF_ALU32_IMM(BPF_MOV, R0, 4294967295), | 2055 | BPF_ALU32_IMM(BPF_MOV, R0, 4294967295U), |
2056 | BPF_EXIT_INSN(), | 2056 | BPF_EXIT_INSN(), |
2057 | }, | 2057 | }, |
2058 | INTERNAL, | 2058 | INTERNAL, |
2059 | { }, | 2059 | { }, |
2060 | { { 0, 4294967295 } }, | 2060 | { { 0, 4294967295U } }, |
2061 | }, | 2061 | }, |
2062 | { | 2062 | { |
2063 | "ALU_MOV_K: 0x0000ffffffff0000 = 0x00000000ffffffff", | 2063 | "ALU_MOV_K: 0x0000ffffffff0000 = 0x00000000ffffffff", |
2064 | .u.insns_int = { | 2064 | .u.insns_int = { |
2065 | BPF_LD_IMM64(R2, 0x0000ffffffff0000), | 2065 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), |
2066 | BPF_LD_IMM64(R3, 0x00000000ffffffff), | 2066 | BPF_LD_IMM64(R3, 0x00000000ffffffffLL), |
2067 | BPF_ALU32_IMM(BPF_MOV, R2, 0xffffffff), | 2067 | BPF_ALU32_IMM(BPF_MOV, R2, 0xffffffff), |
2068 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 2068 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
2069 | BPF_MOV32_IMM(R0, 2), | 2069 | BPF_MOV32_IMM(R0, 2), |
@@ -2098,7 +2098,7 @@ static struct bpf_test tests[] = { | |||
2098 | { | 2098 | { |
2099 | "ALU64_OR_K: dst = 0x0", | 2099 | "ALU64_OR_K: dst = 0x0", |
2100 | .u.insns_int = { | 2100 | .u.insns_int = { |
2101 | BPF_LD_IMM64(R2, 0x0000ffffffff0000), | 2101 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), |
2102 | BPF_LD_IMM64(R3, 0x0), | 2102 | BPF_LD_IMM64(R3, 0x0), |
2103 | BPF_ALU64_IMM(BPF_MOV, R2, 0x0), | 2103 | BPF_ALU64_IMM(BPF_MOV, R2, 0x0), |
2104 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 2104 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
@@ -2114,8 +2114,8 @@ static struct bpf_test tests[] = { | |||
2114 | { | 2114 | { |
2115 | "ALU64_MOV_K: dst = -1", | 2115 | "ALU64_MOV_K: dst = -1", |
2116 | .u.insns_int = { | 2116 | .u.insns_int = { |
2117 | BPF_LD_IMM64(R2, 0x0000ffffffff0000), | 2117 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), |
2118 | BPF_LD_IMM64(R3, 0xffffffffffffffff), | 2118 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), |
2119 | BPF_ALU64_IMM(BPF_MOV, R2, 0xffffffff), | 2119 | BPF_ALU64_IMM(BPF_MOV, R2, 0xffffffff), |
2120 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 2120 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
2121 | BPF_MOV32_IMM(R0, 2), | 2121 | BPF_MOV32_IMM(R0, 2), |
@@ -2144,13 +2144,13 @@ static struct bpf_test tests[] = { | |||
2144 | "ALU_ADD_X: 1 + 4294967294 = 4294967295", | 2144 | "ALU_ADD_X: 1 + 4294967294 = 4294967295", |
2145 | .u.insns_int = { | 2145 | .u.insns_int = { |
2146 | BPF_LD_IMM64(R0, 1), | 2146 | BPF_LD_IMM64(R0, 1), |
2147 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967294), | 2147 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967294U), |
2148 | BPF_ALU32_REG(BPF_ADD, R0, R1), | 2148 | BPF_ALU32_REG(BPF_ADD, R0, R1), |
2149 | BPF_EXIT_INSN(), | 2149 | BPF_EXIT_INSN(), |
2150 | }, | 2150 | }, |
2151 | INTERNAL, | 2151 | INTERNAL, |
2152 | { }, | 2152 | { }, |
2153 | { { 0, 4294967295 } }, | 2153 | { { 0, 4294967295U } }, |
2154 | }, | 2154 | }, |
2155 | { | 2155 | { |
2156 | "ALU64_ADD_X: 1 + 2 = 3", | 2156 | "ALU64_ADD_X: 1 + 2 = 3", |
@@ -2168,13 +2168,13 @@ static struct bpf_test tests[] = { | |||
2168 | "ALU64_ADD_X: 1 + 4294967294 = 4294967295", | 2168 | "ALU64_ADD_X: 1 + 4294967294 = 4294967295", |
2169 | .u.insns_int = { | 2169 | .u.insns_int = { |
2170 | BPF_LD_IMM64(R0, 1), | 2170 | BPF_LD_IMM64(R0, 1), |
2171 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967294), | 2171 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967294U), |
2172 | BPF_ALU64_REG(BPF_ADD, R0, R1), | 2172 | BPF_ALU64_REG(BPF_ADD, R0, R1), |
2173 | BPF_EXIT_INSN(), | 2173 | BPF_EXIT_INSN(), |
2174 | }, | 2174 | }, |
2175 | INTERNAL, | 2175 | INTERNAL, |
2176 | { }, | 2176 | { }, |
2177 | { { 0, 4294967295 } }, | 2177 | { { 0, 4294967295U } }, |
2178 | }, | 2178 | }, |
2179 | /* BPF_ALU | BPF_ADD | BPF_K */ | 2179 | /* BPF_ALU | BPF_ADD | BPF_K */ |
2180 | { | 2180 | { |
@@ -2203,12 +2203,12 @@ static struct bpf_test tests[] = { | |||
2203 | "ALU_ADD_K: 1 + 4294967294 = 4294967295", | 2203 | "ALU_ADD_K: 1 + 4294967294 = 4294967295", |
2204 | .u.insns_int = { | 2204 | .u.insns_int = { |
2205 | BPF_LD_IMM64(R0, 1), | 2205 | BPF_LD_IMM64(R0, 1), |
2206 | BPF_ALU32_IMM(BPF_ADD, R0, 4294967294), | 2206 | BPF_ALU32_IMM(BPF_ADD, R0, 4294967294U), |
2207 | BPF_EXIT_INSN(), | 2207 | BPF_EXIT_INSN(), |
2208 | }, | 2208 | }, |
2209 | INTERNAL, | 2209 | INTERNAL, |
2210 | { }, | 2210 | { }, |
2211 | { { 0, 4294967295 } }, | 2211 | { { 0, 4294967295U } }, |
2212 | }, | 2212 | }, |
2213 | { | 2213 | { |
2214 | "ALU_ADD_K: 0 + (-1) = 0x00000000ffffffff", | 2214 | "ALU_ADD_K: 0 + (-1) = 0x00000000ffffffff", |
@@ -2290,7 +2290,7 @@ static struct bpf_test tests[] = { | |||
2290 | "ALU64_ADD_K: 0 + (-1) = 0xffffffffffffffff", | 2290 | "ALU64_ADD_K: 0 + (-1) = 0xffffffffffffffff", |
2291 | .u.insns_int = { | 2291 | .u.insns_int = { |
2292 | BPF_LD_IMM64(R2, 0x0), | 2292 | BPF_LD_IMM64(R2, 0x0), |
2293 | BPF_LD_IMM64(R3, 0xffffffffffffffff), | 2293 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), |
2294 | BPF_ALU64_IMM(BPF_ADD, R2, 0xffffffff), | 2294 | BPF_ALU64_IMM(BPF_ADD, R2, 0xffffffff), |
2295 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 2295 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
2296 | BPF_MOV32_IMM(R0, 2), | 2296 | BPF_MOV32_IMM(R0, 2), |
@@ -2318,8 +2318,8 @@ static struct bpf_test tests[] = { | |||
2318 | { | 2318 | { |
2319 | "ALU_SUB_X: 4294967295 - 4294967294 = 1", | 2319 | "ALU_SUB_X: 4294967295 - 4294967294 = 1", |
2320 | .u.insns_int = { | 2320 | .u.insns_int = { |
2321 | BPF_LD_IMM64(R0, 4294967295), | 2321 | BPF_LD_IMM64(R0, 4294967295U), |
2322 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967294), | 2322 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967294U), |
2323 | BPF_ALU32_REG(BPF_SUB, R0, R1), | 2323 | BPF_ALU32_REG(BPF_SUB, R0, R1), |
2324 | BPF_EXIT_INSN(), | 2324 | BPF_EXIT_INSN(), |
2325 | }, | 2325 | }, |
@@ -2342,8 +2342,8 @@ static struct bpf_test tests[] = { | |||
2342 | { | 2342 | { |
2343 | "ALU64_SUB_X: 4294967295 - 4294967294 = 1", | 2343 | "ALU64_SUB_X: 4294967295 - 4294967294 = 1", |
2344 | .u.insns_int = { | 2344 | .u.insns_int = { |
2345 | BPF_LD_IMM64(R0, 4294967295), | 2345 | BPF_LD_IMM64(R0, 4294967295U), |
2346 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967294), | 2346 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967294U), |
2347 | BPF_ALU64_REG(BPF_SUB, R0, R1), | 2347 | BPF_ALU64_REG(BPF_SUB, R0, R1), |
2348 | BPF_EXIT_INSN(), | 2348 | BPF_EXIT_INSN(), |
2349 | }, | 2349 | }, |
@@ -2377,8 +2377,8 @@ static struct bpf_test tests[] = { | |||
2377 | { | 2377 | { |
2378 | "ALU_SUB_K: 4294967295 - 4294967294 = 1", | 2378 | "ALU_SUB_K: 4294967295 - 4294967294 = 1", |
2379 | .u.insns_int = { | 2379 | .u.insns_int = { |
2380 | BPF_LD_IMM64(R0, 4294967295), | 2380 | BPF_LD_IMM64(R0, 4294967295U), |
2381 | BPF_ALU32_IMM(BPF_SUB, R0, 4294967294), | 2381 | BPF_ALU32_IMM(BPF_SUB, R0, 4294967294U), |
2382 | BPF_EXIT_INSN(), | 2382 | BPF_EXIT_INSN(), |
2383 | }, | 2383 | }, |
2384 | INTERNAL, | 2384 | INTERNAL, |
@@ -2410,8 +2410,8 @@ static struct bpf_test tests[] = { | |||
2410 | { | 2410 | { |
2411 | "ALU64_SUB_K: 4294967294 - 4294967295 = -1", | 2411 | "ALU64_SUB_K: 4294967294 - 4294967295 = -1", |
2412 | .u.insns_int = { | 2412 | .u.insns_int = { |
2413 | BPF_LD_IMM64(R0, 4294967294), | 2413 | BPF_LD_IMM64(R0, 4294967294U), |
2414 | BPF_ALU64_IMM(BPF_SUB, R0, 4294967295), | 2414 | BPF_ALU64_IMM(BPF_SUB, R0, 4294967295U), |
2415 | BPF_EXIT_INSN(), | 2415 | BPF_EXIT_INSN(), |
2416 | }, | 2416 | }, |
2417 | INTERNAL, | 2417 | INTERNAL, |
@@ -2588,7 +2588,7 @@ static struct bpf_test tests[] = { | |||
2588 | "ALU64_MUL_K: 1 * (-1) = 0xffffffffffffffff", | 2588 | "ALU64_MUL_K: 1 * (-1) = 0xffffffffffffffff", |
2589 | .u.insns_int = { | 2589 | .u.insns_int = { |
2590 | BPF_LD_IMM64(R2, 0x1), | 2590 | BPF_LD_IMM64(R2, 0x1), |
2591 | BPF_LD_IMM64(R3, 0xffffffffffffffff), | 2591 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), |
2592 | BPF_ALU64_IMM(BPF_MUL, R2, 0xffffffff), | 2592 | BPF_ALU64_IMM(BPF_MUL, R2, 0xffffffff), |
2593 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 2593 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
2594 | BPF_MOV32_IMM(R0, 2), | 2594 | BPF_MOV32_IMM(R0, 2), |
@@ -2616,8 +2616,8 @@ static struct bpf_test tests[] = { | |||
2616 | { | 2616 | { |
2617 | "ALU_DIV_X: 4294967295 / 4294967295 = 1", | 2617 | "ALU_DIV_X: 4294967295 / 4294967295 = 1", |
2618 | .u.insns_int = { | 2618 | .u.insns_int = { |
2619 | BPF_LD_IMM64(R0, 4294967295), | 2619 | BPF_LD_IMM64(R0, 4294967295U), |
2620 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967295), | 2620 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967295U), |
2621 | BPF_ALU32_REG(BPF_DIV, R0, R1), | 2621 | BPF_ALU32_REG(BPF_DIV, R0, R1), |
2622 | BPF_EXIT_INSN(), | 2622 | BPF_EXIT_INSN(), |
2623 | }, | 2623 | }, |
@@ -2652,9 +2652,9 @@ static struct bpf_test tests[] = { | |||
2652 | { | 2652 | { |
2653 | "ALU64_DIV_X: 0xffffffffffffffff / (-1) = 0x0000000000000001", | 2653 | "ALU64_DIV_X: 0xffffffffffffffff / (-1) = 0x0000000000000001", |
2654 | .u.insns_int = { | 2654 | .u.insns_int = { |
2655 | BPF_LD_IMM64(R2, 0xffffffffffffffffUL), | 2655 | BPF_LD_IMM64(R2, 0xffffffffffffffffLL), |
2656 | BPF_LD_IMM64(R4, 0xffffffffffffffffUL), | 2656 | BPF_LD_IMM64(R4, 0xffffffffffffffffLL), |
2657 | BPF_LD_IMM64(R3, 0x0000000000000001UL), | 2657 | BPF_LD_IMM64(R3, 0x0000000000000001LL), |
2658 | BPF_ALU64_REG(BPF_DIV, R2, R4), | 2658 | BPF_ALU64_REG(BPF_DIV, R2, R4), |
2659 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 2659 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
2660 | BPF_MOV32_IMM(R0, 2), | 2660 | BPF_MOV32_IMM(R0, 2), |
@@ -2692,8 +2692,8 @@ static struct bpf_test tests[] = { | |||
2692 | { | 2692 | { |
2693 | "ALU_DIV_K: 4294967295 / 4294967295 = 1", | 2693 | "ALU_DIV_K: 4294967295 / 4294967295 = 1", |
2694 | .u.insns_int = { | 2694 | .u.insns_int = { |
2695 | BPF_LD_IMM64(R0, 4294967295), | 2695 | BPF_LD_IMM64(R0, 4294967295U), |
2696 | BPF_ALU32_IMM(BPF_DIV, R0, 4294967295), | 2696 | BPF_ALU32_IMM(BPF_DIV, R0, 4294967295U), |
2697 | BPF_EXIT_INSN(), | 2697 | BPF_EXIT_INSN(), |
2698 | }, | 2698 | }, |
2699 | INTERNAL, | 2699 | INTERNAL, |
@@ -2703,7 +2703,7 @@ static struct bpf_test tests[] = { | |||
2703 | { | 2703 | { |
2704 | "ALU_DIV_K: 0xffffffffffffffff / (-1) = 0x1", | 2704 | "ALU_DIV_K: 0xffffffffffffffff / (-1) = 0x1", |
2705 | .u.insns_int = { | 2705 | .u.insns_int = { |
2706 | BPF_LD_IMM64(R2, 0xffffffffffffffffUL), | 2706 | BPF_LD_IMM64(R2, 0xffffffffffffffffLL), |
2707 | BPF_LD_IMM64(R3, 0x1UL), | 2707 | BPF_LD_IMM64(R3, 0x1UL), |
2708 | BPF_ALU32_IMM(BPF_DIV, R2, 0xffffffff), | 2708 | BPF_ALU32_IMM(BPF_DIV, R2, 0xffffffff), |
2709 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 2709 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
@@ -2752,8 +2752,8 @@ static struct bpf_test tests[] = { | |||
2752 | { | 2752 | { |
2753 | "ALU64_DIV_K: 0xffffffffffffffff / (-1) = 0x0000000000000001", | 2753 | "ALU64_DIV_K: 0xffffffffffffffff / (-1) = 0x0000000000000001", |
2754 | .u.insns_int = { | 2754 | .u.insns_int = { |
2755 | BPF_LD_IMM64(R2, 0xffffffffffffffffUL), | 2755 | BPF_LD_IMM64(R2, 0xffffffffffffffffLL), |
2756 | BPF_LD_IMM64(R3, 0x0000000000000001UL), | 2756 | BPF_LD_IMM64(R3, 0x0000000000000001LL), |
2757 | BPF_ALU64_IMM(BPF_DIV, R2, 0xffffffff), | 2757 | BPF_ALU64_IMM(BPF_DIV, R2, 0xffffffff), |
2758 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 2758 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
2759 | BPF_MOV32_IMM(R0, 2), | 2759 | BPF_MOV32_IMM(R0, 2), |
@@ -2781,8 +2781,8 @@ static struct bpf_test tests[] = { | |||
2781 | { | 2781 | { |
2782 | "ALU_MOD_X: 4294967295 % 4294967293 = 2", | 2782 | "ALU_MOD_X: 4294967295 % 4294967293 = 2", |
2783 | .u.insns_int = { | 2783 | .u.insns_int = { |
2784 | BPF_LD_IMM64(R0, 4294967295), | 2784 | BPF_LD_IMM64(R0, 4294967295U), |
2785 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967293), | 2785 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967293U), |
2786 | BPF_ALU32_REG(BPF_MOD, R0, R1), | 2786 | BPF_ALU32_REG(BPF_MOD, R0, R1), |
2787 | BPF_EXIT_INSN(), | 2787 | BPF_EXIT_INSN(), |
2788 | }, | 2788 | }, |
@@ -2840,8 +2840,8 @@ static struct bpf_test tests[] = { | |||
2840 | { | 2840 | { |
2841 | "ALU_MOD_K: 4294967295 % 4294967293 = 2", | 2841 | "ALU_MOD_K: 4294967295 % 4294967293 = 2", |
2842 | .u.insns_int = { | 2842 | .u.insns_int = { |
2843 | BPF_LD_IMM64(R0, 4294967295), | 2843 | BPF_LD_IMM64(R0, 4294967295U), |
2844 | BPF_ALU32_IMM(BPF_MOD, R0, 4294967293), | 2844 | BPF_ALU32_IMM(BPF_MOD, R0, 4294967293U), |
2845 | BPF_EXIT_INSN(), | 2845 | BPF_EXIT_INSN(), |
2846 | }, | 2846 | }, |
2847 | INTERNAL, | 2847 | INTERNAL, |
@@ -2978,8 +2978,8 @@ static struct bpf_test tests[] = { | |||
2978 | { | 2978 | { |
2979 | "ALU64_AND_K: 0x0000ffffffff0000 & 0x0 = 0x0000ffff00000000", | 2979 | "ALU64_AND_K: 0x0000ffffffff0000 & 0x0 = 0x0000ffff00000000", |
2980 | .u.insns_int = { | 2980 | .u.insns_int = { |
2981 | BPF_LD_IMM64(R2, 0x0000ffffffff0000), | 2981 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), |
2982 | BPF_LD_IMM64(R3, 0x0000000000000000), | 2982 | BPF_LD_IMM64(R3, 0x0000000000000000LL), |
2983 | BPF_ALU64_IMM(BPF_AND, R2, 0x0), | 2983 | BPF_ALU64_IMM(BPF_AND, R2, 0x0), |
2984 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 2984 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
2985 | BPF_MOV32_IMM(R0, 2), | 2985 | BPF_MOV32_IMM(R0, 2), |
@@ -2994,8 +2994,8 @@ static struct bpf_test tests[] = { | |||
2994 | { | 2994 | { |
2995 | "ALU64_AND_K: 0x0000ffffffff0000 & -1 = 0x0000ffffffffffff", | 2995 | "ALU64_AND_K: 0x0000ffffffff0000 & -1 = 0x0000ffffffffffff", |
2996 | .u.insns_int = { | 2996 | .u.insns_int = { |
2997 | BPF_LD_IMM64(R2, 0x0000ffffffff0000), | 2997 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), |
2998 | BPF_LD_IMM64(R3, 0x0000ffffffff0000), | 2998 | BPF_LD_IMM64(R3, 0x0000ffffffff0000LL), |
2999 | BPF_ALU64_IMM(BPF_AND, R2, 0xffffffff), | 2999 | BPF_ALU64_IMM(BPF_AND, R2, 0xffffffff), |
3000 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 3000 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
3001 | BPF_MOV32_IMM(R0, 2), | 3001 | BPF_MOV32_IMM(R0, 2), |
@@ -3010,8 +3010,8 @@ static struct bpf_test tests[] = { | |||
3010 | { | 3010 | { |
3011 | "ALU64_AND_K: 0xffffffffffffffff & -1 = 0xffffffffffffffff", | 3011 | "ALU64_AND_K: 0xffffffffffffffff & -1 = 0xffffffffffffffff", |
3012 | .u.insns_int = { | 3012 | .u.insns_int = { |
3013 | BPF_LD_IMM64(R2, 0xffffffffffffffff), | 3013 | BPF_LD_IMM64(R2, 0xffffffffffffffffLL), |
3014 | BPF_LD_IMM64(R3, 0xffffffffffffffff), | 3014 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), |
3015 | BPF_ALU64_IMM(BPF_AND, R2, 0xffffffff), | 3015 | BPF_ALU64_IMM(BPF_AND, R2, 0xffffffff), |
3016 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 3016 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
3017 | BPF_MOV32_IMM(R0, 2), | 3017 | BPF_MOV32_IMM(R0, 2), |
@@ -3120,8 +3120,8 @@ static struct bpf_test tests[] = { | |||
3120 | { | 3120 | { |
3121 | "ALU64_OR_K: 0x0000ffffffff0000 | 0x0 = 0x0000ffff00000000", | 3121 | "ALU64_OR_K: 0x0000ffffffff0000 | 0x0 = 0x0000ffff00000000", |
3122 | .u.insns_int = { | 3122 | .u.insns_int = { |
3123 | BPF_LD_IMM64(R2, 0x0000ffffffff0000), | 3123 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), |
3124 | BPF_LD_IMM64(R3, 0x0000ffffffff0000), | 3124 | BPF_LD_IMM64(R3, 0x0000ffffffff0000LL), |
3125 | BPF_ALU64_IMM(BPF_OR, R2, 0x0), | 3125 | BPF_ALU64_IMM(BPF_OR, R2, 0x0), |
3126 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 3126 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
3127 | BPF_MOV32_IMM(R0, 2), | 3127 | BPF_MOV32_IMM(R0, 2), |
@@ -3136,8 +3136,8 @@ static struct bpf_test tests[] = { | |||
3136 | { | 3136 | { |
3137 | "ALU64_OR_K: 0x0000ffffffff0000 | -1 = 0xffffffffffffffff", | 3137 | "ALU64_OR_K: 0x0000ffffffff0000 | -1 = 0xffffffffffffffff", |
3138 | .u.insns_int = { | 3138 | .u.insns_int = { |
3139 | BPF_LD_IMM64(R2, 0x0000ffffffff0000), | 3139 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), |
3140 | BPF_LD_IMM64(R3, 0xffffffffffffffff), | 3140 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), |
3141 | BPF_ALU64_IMM(BPF_OR, R2, 0xffffffff), | 3141 | BPF_ALU64_IMM(BPF_OR, R2, 0xffffffff), |
3142 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 3142 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
3143 | BPF_MOV32_IMM(R0, 2), | 3143 | BPF_MOV32_IMM(R0, 2), |
@@ -3152,8 +3152,8 @@ static struct bpf_test tests[] = { | |||
3152 | { | 3152 | { |
3153 | "ALU64_OR_K: 0x000000000000000 | -1 = 0xffffffffffffffff", | 3153 | "ALU64_OR_K: 0x000000000000000 | -1 = 0xffffffffffffffff", |
3154 | .u.insns_int = { | 3154 | .u.insns_int = { |
3155 | BPF_LD_IMM64(R2, 0x0000000000000000), | 3155 | BPF_LD_IMM64(R2, 0x0000000000000000LL), |
3156 | BPF_LD_IMM64(R3, 0xffffffffffffffff), | 3156 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), |
3157 | BPF_ALU64_IMM(BPF_OR, R2, 0xffffffff), | 3157 | BPF_ALU64_IMM(BPF_OR, R2, 0xffffffff), |
3158 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 3158 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
3159 | BPF_MOV32_IMM(R0, 2), | 3159 | BPF_MOV32_IMM(R0, 2), |
@@ -3262,8 +3262,8 @@ static struct bpf_test tests[] = { | |||
3262 | { | 3262 | { |
3263 | "ALU64_XOR_K: 0x0000ffffffff0000 ^ 0x0 = 0x0000ffffffff0000", | 3263 | "ALU64_XOR_K: 0x0000ffffffff0000 ^ 0x0 = 0x0000ffffffff0000", |
3264 | .u.insns_int = { | 3264 | .u.insns_int = { |
3265 | BPF_LD_IMM64(R2, 0x0000ffffffff0000), | 3265 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), |
3266 | BPF_LD_IMM64(R3, 0x0000ffffffff0000), | 3266 | BPF_LD_IMM64(R3, 0x0000ffffffff0000LL), |
3267 | BPF_ALU64_IMM(BPF_XOR, R2, 0x0), | 3267 | BPF_ALU64_IMM(BPF_XOR, R2, 0x0), |
3268 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 3268 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
3269 | BPF_MOV32_IMM(R0, 2), | 3269 | BPF_MOV32_IMM(R0, 2), |
@@ -3278,8 +3278,8 @@ static struct bpf_test tests[] = { | |||
3278 | { | 3278 | { |
3279 | "ALU64_XOR_K: 0x0000ffffffff0000 ^ -1 = 0xffff00000000ffff", | 3279 | "ALU64_XOR_K: 0x0000ffffffff0000 ^ -1 = 0xffff00000000ffff", |
3280 | .u.insns_int = { | 3280 | .u.insns_int = { |
3281 | BPF_LD_IMM64(R2, 0x0000ffffffff0000), | 3281 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), |
3282 | BPF_LD_IMM64(R3, 0xffff00000000ffff), | 3282 | BPF_LD_IMM64(R3, 0xffff00000000ffffLL), |
3283 | BPF_ALU64_IMM(BPF_XOR, R2, 0xffffffff), | 3283 | BPF_ALU64_IMM(BPF_XOR, R2, 0xffffffff), |
3284 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 3284 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
3285 | BPF_MOV32_IMM(R0, 2), | 3285 | BPF_MOV32_IMM(R0, 2), |
@@ -3294,8 +3294,8 @@ static struct bpf_test tests[] = { | |||
3294 | { | 3294 | { |
3295 | "ALU64_XOR_K: 0x000000000000000 ^ -1 = 0xffffffffffffffff", | 3295 | "ALU64_XOR_K: 0x000000000000000 ^ -1 = 0xffffffffffffffff", |
3296 | .u.insns_int = { | 3296 | .u.insns_int = { |
3297 | BPF_LD_IMM64(R2, 0x0000000000000000), | 3297 | BPF_LD_IMM64(R2, 0x0000000000000000LL), |
3298 | BPF_LD_IMM64(R3, 0xffffffffffffffff), | 3298 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), |
3299 | BPF_ALU64_IMM(BPF_XOR, R2, 0xffffffff), | 3299 | BPF_ALU64_IMM(BPF_XOR, R2, 0xffffffff), |
3300 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 3300 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |
3301 | BPF_MOV32_IMM(R0, 2), | 3301 | BPF_MOV32_IMM(R0, 2), |
@@ -3760,8 +3760,8 @@ static struct bpf_test tests[] = { | |||
3760 | { | 3760 | { |
3761 | "ST_MEM_DW: Store/Load double word: max negative 2", | 3761 | "ST_MEM_DW: Store/Load double word: max negative 2", |
3762 | .u.insns_int = { | 3762 | .u.insns_int = { |
3763 | BPF_LD_IMM64(R2, 0xffff00000000ffff), | 3763 | BPF_LD_IMM64(R2, 0xffff00000000ffffLL), |
3764 | BPF_LD_IMM64(R3, 0xffffffffffffffff), | 3764 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), |
3765 | BPF_ST_MEM(BPF_DW, R10, -40, 0xffffffff), | 3765 | BPF_ST_MEM(BPF_DW, R10, -40, 0xffffffff), |
3766 | BPF_LDX_MEM(BPF_DW, R2, R10, -40), | 3766 | BPF_LDX_MEM(BPF_DW, R2, R10, -40), |
3767 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | 3767 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), |