diff options
author | Gary Lin <glin@suse.com> | 2021-01-19 13:25:00 +0300 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2021-01-21 01:13:48 +0300 |
commit | 16a660ef7d8c89787ee4bf352458681439485649 (patch) | |
tree | 524e0faee7b069a90143aec3850e77684d80400a /lib | |
parent | 93c5aecc35c61414073d848e1ba637fc2cae98a8 (diff) | |
download | linux-16a660ef7d8c89787ee4bf352458681439485649.tar.xz |
test_bpf: Remove EXPECTED_FAIL flag from bpf_fill_maxinsns11
With NOPs padding, x64 jit now can handle the jump cases like
bpf_fill_maxinsns11().
Signed-off-by: Gary Lin <glin@suse.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Link: https://lore.kernel.org/bpf/20210119102501.511-3-glin@suse.com
Diffstat (limited to 'lib')
-rw-r--r-- | lib/test_bpf.c | 7 |
1 files changed, 1 insertions, 6 deletions
diff --git a/lib/test_bpf.c b/lib/test_bpf.c index 49ec9e8d8aed..4dc4dcbecd12 100644 --- a/lib/test_bpf.c +++ b/lib/test_bpf.c @@ -345,7 +345,7 @@ static int __bpf_fill_ja(struct bpf_test *self, unsigned int len, static int bpf_fill_maxinsns11(struct bpf_test *self) { - /* Hits 70 passes on x86_64, so cannot get JITed there. */ + /* Hits 70 passes on x86_64 and triggers NOPs padding. */ return __bpf_fill_ja(self, BPF_MAXINSNS, 68); } @@ -5318,15 +5318,10 @@ static struct bpf_test tests[] = { { "BPF_MAXINSNS: Jump, gap, jump, ...", { }, -#if defined(CONFIG_BPF_JIT_ALWAYS_ON) && defined(CONFIG_X86) - CLASSIC | FLAG_NO_DATA | FLAG_EXPECTED_FAIL, -#else CLASSIC | FLAG_NO_DATA, -#endif { }, { { 0, 0xababcbac } }, .fill_helper = bpf_fill_maxinsns11, - .expected_errcode = -ENOTSUPP, }, { "BPF_MAXINSNS: jump over MSH", |