From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-15.7 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6A7A3C6369E for ; Wed, 18 Nov 2020 07:17:09 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 05EA92462E for ; Wed, 18 Nov 2020 07:17:08 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="BAXFUOga" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726655AbgKRHRI (ORCPT ); Wed, 18 Nov 2020 02:17:08 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56980 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725794AbgKRHRI (ORCPT ); Wed, 18 Nov 2020 02:17:08 -0500 Received: from mail-pf1-x436.google.com (mail-pf1-x436.google.com [IPv6:2607:f8b0:4864:20::436]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2F7D5C0613D4; Tue, 17 Nov 2020 23:17:08 -0800 (PST) Received: by mail-pf1-x436.google.com with SMTP id q5so839922pfk.6; Tue, 17 Nov 2020 23:17:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=0w+Bq27/X0GIM1BI/NmY3YCnW8k8aSVxxtLiS5VSHa4=; b=BAXFUOgaXVa9W++H6CMOkJixDx0G47ljK4t+NNAQFx5YmxZjVgw0o88tLe/U8RW4NX 8NcG0+CeDGitGfgdPVrDierjmX6fPqWgkH3NC2pO+7dcaDjcmyY+PDTJIF2dQxfr0c0C HRUTm2+/HQgZtX0X4cwHKzNTjki5+AWY8nUwNCmSvEntvZM6EQIB9oK1tLkJL64FJiu8 at02S8TH+mKvsmILkehhskO/Nlf+qsFMgen3VSzqKtkldIZXDMX3F91BuMiuX5XCyHMN YKyHzeD8HsmpAHqhFunJJsxXx6sWGqE9TA/7u4PeiyFf5iIhDMIibUmw6xF2B7K5YRvf mJfA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=0w+Bq27/X0GIM1BI/NmY3YCnW8k8aSVxxtLiS5VSHa4=; b=RsAS5tjXa8gTOPdoWvrI7ze8JFmZpCfZj3aHFSNsPsGpDWvOgM8J/3rIOCirllY9MU 454yHuIs+uiPdKBpX4d5yvYfad5ZnbTXB1c5UzN0zWhhYrgML12AB/TKaLFR1fJReS0a Wj9XOkABlpsPTJqYFdS7Kwi126SWZCuZSZuijlTpHTXahPGNk1+jIiKeZfibizwjTQHJ jakv6ec4eGQR2piLmwt3OEVrz+H/BGrppW0zPDYqeDkbeE4v1FWO+KwYhbIGUflYzVE9 XLEcrc/kqS79BNl0p0Zt6Jhr7P57q4toFCAsovCOROtMX+N8kr7wrxYcFtxpODTatPp1 ntNQ== X-Gm-Message-State: AOAM532pvirV/RvtT5b5L9DV77R+MGoahdGzuuq1NwdpYCAeV40UJ95i hQpnVSuN5Si0wfHAaUTGR4Q= X-Google-Smtp-Source: ABdhPJwpbP84Y6/nHU0afdC6CD4TN367l8gQUfUEiJcxtBej/sP2oyRducY8Glp7q5EE52FJffNoVQ== X-Received: by 2002:a62:7895:0:b029:18b:de24:2a9d with SMTP id t143-20020a6278950000b029018bde242a9dmr3429699pfc.21.1605683827746; Tue, 17 Nov 2020 23:17:07 -0800 (PST) Received: from btopel-mobl.ger.intel.com ([192.55.55.45]) by smtp.gmail.com with ESMTPSA id e128sm23019382pfe.154.2020.11.17.23.17.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 17 Nov 2020 23:17:06 -0800 (PST) From: =?UTF-8?q?Bj=C3=B6rn=20T=C3=B6pel?= To: ast@kernel.org, daniel@iogearbox.net, netdev@vger.kernel.org, bpf@vger.kernel.org Cc: =?UTF-8?q?Bj=C3=B6rn=20T=C3=B6pel?= , xi.wang@gmail.com, luke.r.nels@gmail.com, linux-riscv@lists.infradead.org, andrii.nakryiko@gmail.com Subject: [PATCH bpf-next v2 3/3] selftests/bpf: Mark tests that require unaligned memory access Date: Wed, 18 Nov 2020 08:16:40 +0100 Message-Id: <20201118071640.83773-4-bjorn.topel@gmail.com> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20201118071640.83773-1-bjorn.topel@gmail.com> References: <20201118071640.83773-1-bjorn.topel@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org A lot of tests require unaligned memory access to work. Mark the tests as such, so that they can be avoided on unsupported architectures such as RISC-V. Signed-off-by: Björn Töpel --- .../selftests/bpf/verifier/ctx_sk_lookup.c | 7 +++ .../bpf/verifier/direct_value_access.c | 3 ++ .../testing/selftests/bpf/verifier/map_ptr.c | 1 + .../selftests/bpf/verifier/raw_tp_writable.c | 1 + .../selftests/bpf/verifier/ref_tracking.c | 4 ++ .../testing/selftests/bpf/verifier/regalloc.c | 8 ++++ .../selftests/bpf/verifier/wide_access.c | 46 +++++++++++-------- 7 files changed, 52 insertions(+), 18 deletions(-) diff --git a/tools/testing/selftests/bpf/verifier/ctx_sk_lookup.c b/tools/testing/selftests/bpf/verifier/ctx_sk_lookup.c index 2ad5f974451c..fb13ca2d5606 100644 --- a/tools/testing/selftests/bpf/verifier/ctx_sk_lookup.c +++ b/tools/testing/selftests/bpf/verifier/ctx_sk_lookup.c @@ -266,6 +266,7 @@ .result = REJECT, .prog_type = BPF_PROG_TYPE_SK_LOOKUP, .expected_attach_type = BPF_SK_LOOKUP, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "invalid 8-byte read from bpf_sk_lookup remote_ip4 field", @@ -292,6 +293,7 @@ .result = REJECT, .prog_type = BPF_PROG_TYPE_SK_LOOKUP, .expected_attach_type = BPF_SK_LOOKUP, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "invalid 8-byte read from bpf_sk_lookup remote_port field", @@ -305,6 +307,7 @@ .result = REJECT, .prog_type = BPF_PROG_TYPE_SK_LOOKUP, .expected_attach_type = BPF_SK_LOOKUP, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "invalid 8-byte read from bpf_sk_lookup local_ip4 field", @@ -331,6 +334,7 @@ .result = REJECT, .prog_type = BPF_PROG_TYPE_SK_LOOKUP, .expected_attach_type = BPF_SK_LOOKUP, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "invalid 8-byte read from bpf_sk_lookup local_port field", @@ -344,6 +348,7 @@ .result = REJECT, .prog_type = BPF_PROG_TYPE_SK_LOOKUP, .expected_attach_type = BPF_SK_LOOKUP, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, /* invalid 1,2,4-byte reads from 8-byte fields in bpf_sk_lookup */ { @@ -410,6 +415,7 @@ .result = REJECT, .prog_type = BPF_PROG_TYPE_SK_LOOKUP, .expected_attach_type = BPF_SK_LOOKUP, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "invalid 4-byte unaligned read from bpf_sk_lookup at even offset", @@ -422,6 +428,7 @@ .result = REJECT, .prog_type = BPF_PROG_TYPE_SK_LOOKUP, .expected_attach_type = BPF_SK_LOOKUP, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, /* in-bound and out-of-bound writes to bpf_sk_lookup */ { diff --git a/tools/testing/selftests/bpf/verifier/direct_value_access.c b/tools/testing/selftests/bpf/verifier/direct_value_access.c index 988f46a1a4c7..c0648dc009b5 100644 --- a/tools/testing/selftests/bpf/verifier/direct_value_access.c +++ b/tools/testing/selftests/bpf/verifier/direct_value_access.c @@ -69,6 +69,7 @@ .fixup_map_array_48b = { 1 }, .result = REJECT, .errstr = "R1 min value is outside of the allowed memory range", + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "direct map access, write test 7", @@ -195,6 +196,7 @@ .fixup_map_array_48b = { 1, 3 }, .result = REJECT, .errstr = "invalid access to map value, value_size=48 off=47 size=2", + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "direct map access, write test 17", @@ -209,6 +211,7 @@ .fixup_map_array_48b = { 1, 3 }, .result = REJECT, .errstr = "invalid access to map value, value_size=48 off=47 size=2", + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "direct map access, write test 18", diff --git a/tools/testing/selftests/bpf/verifier/map_ptr.c b/tools/testing/selftests/bpf/verifier/map_ptr.c index 637f9293bda8..b117bdd3806d 100644 --- a/tools/testing/selftests/bpf/verifier/map_ptr.c +++ b/tools/testing/selftests/bpf/verifier/map_ptr.c @@ -44,6 +44,7 @@ .errstr_unpriv = "bpf_array access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN", .result = REJECT, .errstr = "cannot access ptr member ops with moff 0 in struct bpf_map with off 1 size 4", + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "bpf_map_ptr: read ops field accepted", diff --git a/tools/testing/selftests/bpf/verifier/raw_tp_writable.c b/tools/testing/selftests/bpf/verifier/raw_tp_writable.c index 95b5d70a1dc1..2978fb5a769d 100644 --- a/tools/testing/selftests/bpf/verifier/raw_tp_writable.c +++ b/tools/testing/selftests/bpf/verifier/raw_tp_writable.c @@ -31,4 +31,5 @@ .fixup_map_hash_8b = { 1, }, .prog_type = BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE, .errstr = "R6 invalid variable buffer offset: off=0, var_off=(0x0; 0xffffffff)", + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, diff --git a/tools/testing/selftests/bpf/verifier/ref_tracking.c b/tools/testing/selftests/bpf/verifier/ref_tracking.c index 006b5bd99c08..3b6ee009c00b 100644 --- a/tools/testing/selftests/bpf/verifier/ref_tracking.c +++ b/tools/testing/selftests/bpf/verifier/ref_tracking.c @@ -675,6 +675,7 @@ .prog_type = BPF_PROG_TYPE_SCHED_CLS, .result = REJECT, .errstr = "invalid mem access", + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "reference tracking: use ptr from bpf_sk_fullsock() after release", @@ -698,6 +699,7 @@ .prog_type = BPF_PROG_TYPE_SCHED_CLS, .result = REJECT, .errstr = "invalid mem access", + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "reference tracking: use ptr from bpf_sk_fullsock(tp) after release", @@ -725,6 +727,7 @@ .prog_type = BPF_PROG_TYPE_SCHED_CLS, .result = REJECT, .errstr = "invalid mem access", + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "reference tracking: use sk after bpf_sk_release(tp)", @@ -747,6 +750,7 @@ .prog_type = BPF_PROG_TYPE_SCHED_CLS, .result = REJECT, .errstr = "invalid mem access", + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "reference tracking: use ptr from bpf_get_listener_sock() after bpf_sk_release(sk)", diff --git a/tools/testing/selftests/bpf/verifier/regalloc.c b/tools/testing/selftests/bpf/verifier/regalloc.c index 4ad7e05de706..bb0dd89dd212 100644 --- a/tools/testing/selftests/bpf/verifier/regalloc.c +++ b/tools/testing/selftests/bpf/verifier/regalloc.c @@ -21,6 +21,7 @@ .fixup_map_hash_48b = { 4 }, .result = ACCEPT, .prog_type = BPF_PROG_TYPE_TRACEPOINT, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "regalloc negative", @@ -71,6 +72,7 @@ .fixup_map_hash_48b = { 4 }, .result = ACCEPT, .prog_type = BPF_PROG_TYPE_TRACEPOINT, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "regalloc src_reg negative", @@ -97,6 +99,7 @@ .result = REJECT, .errstr = "invalid access to map value, value_size=48 off=44 size=8", .prog_type = BPF_PROG_TYPE_TRACEPOINT, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "regalloc and spill", @@ -126,6 +129,7 @@ .fixup_map_hash_48b = { 4 }, .result = ACCEPT, .prog_type = BPF_PROG_TYPE_TRACEPOINT, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "regalloc and spill negative", @@ -156,6 +160,7 @@ .result = REJECT, .errstr = "invalid access to map value, value_size=48 off=48 size=8", .prog_type = BPF_PROG_TYPE_TRACEPOINT, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "regalloc three regs", @@ -182,6 +187,7 @@ .fixup_map_hash_48b = { 4 }, .result = ACCEPT, .prog_type = BPF_PROG_TYPE_TRACEPOINT, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "regalloc after call", @@ -210,6 +216,7 @@ .fixup_map_hash_48b = { 4 }, .result = ACCEPT, .prog_type = BPF_PROG_TYPE_TRACEPOINT, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "regalloc in callee", @@ -240,6 +247,7 @@ .fixup_map_hash_48b = { 4 }, .result = ACCEPT, .prog_type = BPF_PROG_TYPE_TRACEPOINT, + .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, }, { "regalloc, spill, JEQ", diff --git a/tools/testing/selftests/bpf/verifier/wide_access.c b/tools/testing/selftests/bpf/verifier/wide_access.c index ccade9312d21..55af248efa93 100644 --- a/tools/testing/selftests/bpf/verifier/wide_access.c +++ b/tools/testing/selftests/bpf/verifier/wide_access.c @@ -1,4 +1,4 @@ -#define BPF_SOCK_ADDR_STORE(field, off, res, err) \ +#define BPF_SOCK_ADDR_STORE(field, off, res, err, flgs) \ { \ "wide store to bpf_sock_addr." #field "[" #off "]", \ .insns = { \ @@ -11,31 +11,36 @@ .prog_type = BPF_PROG_TYPE_CGROUP_SOCK_ADDR, \ .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \ .errstr = err, \ + .flags = flgs, \ } /* user_ip6[0] is u64 aligned */ BPF_SOCK_ADDR_STORE(user_ip6, 0, ACCEPT, - NULL), + NULL, 0), BPF_SOCK_ADDR_STORE(user_ip6, 1, REJECT, - "invalid bpf_context access off=12 size=8"), + "invalid bpf_context access off=12 size=8", + F_NEEDS_EFFICIENT_UNALIGNED_ACCESS), BPF_SOCK_ADDR_STORE(user_ip6, 2, ACCEPT, - NULL), + NULL, 0), BPF_SOCK_ADDR_STORE(user_ip6, 3, REJECT, - "invalid bpf_context access off=20 size=8"), + "invalid bpf_context access off=20 size=8", + F_NEEDS_EFFICIENT_UNALIGNED_ACCESS), /* msg_src_ip6[0] is _not_ u64 aligned */ BPF_SOCK_ADDR_STORE(msg_src_ip6, 0, REJECT, - "invalid bpf_context access off=44 size=8"), + "invalid bpf_context access off=44 size=8", + F_NEEDS_EFFICIENT_UNALIGNED_ACCESS), BPF_SOCK_ADDR_STORE(msg_src_ip6, 1, ACCEPT, - NULL), + NULL, 0), BPF_SOCK_ADDR_STORE(msg_src_ip6, 2, REJECT, - "invalid bpf_context access off=52 size=8"), + "invalid bpf_context access off=52 size=8", + F_NEEDS_EFFICIENT_UNALIGNED_ACCESS), BPF_SOCK_ADDR_STORE(msg_src_ip6, 3, REJECT, - "invalid bpf_context access off=56 size=8"), + "invalid bpf_context access off=56 size=8", 0), #undef BPF_SOCK_ADDR_STORE -#define BPF_SOCK_ADDR_LOAD(field, off, res, err) \ +#define BPF_SOCK_ADDR_LOAD(field, off, res, err, flgs) \ { \ "wide load from bpf_sock_addr." #field "[" #off "]", \ .insns = { \ @@ -48,26 +53,31 @@ BPF_SOCK_ADDR_STORE(msg_src_ip6, 3, REJECT, .prog_type = BPF_PROG_TYPE_CGROUP_SOCK_ADDR, \ .expected_attach_type = BPF_CGROUP_UDP6_SENDMSG, \ .errstr = err, \ + .flags = flgs, \ } /* user_ip6[0] is u64 aligned */ BPF_SOCK_ADDR_LOAD(user_ip6, 0, ACCEPT, - NULL), + NULL, 0), BPF_SOCK_ADDR_LOAD(user_ip6, 1, REJECT, - "invalid bpf_context access off=12 size=8"), + "invalid bpf_context access off=12 size=8", + F_NEEDS_EFFICIENT_UNALIGNED_ACCESS), BPF_SOCK_ADDR_LOAD(user_ip6, 2, ACCEPT, - NULL), + NULL, 0), BPF_SOCK_ADDR_LOAD(user_ip6, 3, REJECT, - "invalid bpf_context access off=20 size=8"), + "invalid bpf_context access off=20 size=8", + F_NEEDS_EFFICIENT_UNALIGNED_ACCESS), /* msg_src_ip6[0] is _not_ u64 aligned */ BPF_SOCK_ADDR_LOAD(msg_src_ip6, 0, REJECT, - "invalid bpf_context access off=44 size=8"), + "invalid bpf_context access off=44 size=8", + F_NEEDS_EFFICIENT_UNALIGNED_ACCESS), BPF_SOCK_ADDR_LOAD(msg_src_ip6, 1, ACCEPT, - NULL), + NULL, 0), BPF_SOCK_ADDR_LOAD(msg_src_ip6, 2, REJECT, - "invalid bpf_context access off=52 size=8"), + "invalid bpf_context access off=52 size=8", + F_NEEDS_EFFICIENT_UNALIGNED_ACCESS), BPF_SOCK_ADDR_LOAD(msg_src_ip6, 3, REJECT, - "invalid bpf_context access off=56 size=8"), + "invalid bpf_context access off=56 size=8", 0), #undef BPF_SOCK_ADDR_LOAD -- 2.27.0 From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-13.7 required=3.0 tests=BAYES_00, DKIM_ADSP_CUSTOM_MED,DKIM_SIGNED,DKIM_VALID,FREEMAIL_FORGED_FROMDOMAIN, FREEMAIL_FROM,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8594BC5519F for ; Wed, 18 Nov 2020 07:17:18 +0000 (UTC) Received: from merlin.infradead.org (merlin.infradead.org [205.233.59.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id E7DBB2223D for ; Wed, 18 Nov 2020 07:17:17 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="Pt2lVI3Q"; dkim=fail reason="signature verification failed" (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="BAXFUOga" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org E7DBB2223D Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-riscv-bounces+linux-riscv=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:Message-Id:Date: Subject:To:From:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=miT42r11PutkbHvmK2Ctzop5lbQi67/9BHJkQ7/n/ps=; b=Pt2lVI3Q2tg18hPoZVD/vNdp5 Yo8y80dScHhBJroMX+k490Y9T8Dz9RRfpU3gMx9+sHNZgSMvk8Cxa/qUs3slTihf8kczzkomj8zk7 unHAss6N2ABf5Bc2DuzCuFPG8ug4z3qnLHWG4gWXKF/OreIrL7WQaeDQlOg4GkW1r7ldB1xssR8Fp si5FmQIuRY6C0pQXZj5sTTGgNGA4Zhy2EJK7AEdRCehJL4z/gt2NpU0lm+MznNPyUMhG7JmtQglAr x7k0nT60JRp51Jxit2dJGv1gTOHnfLBUy/5S1tlInjVbJbo0PrJdkd9Mt/PinOQ2Hv3nIWcVyRm+C fwec6bxHw==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1kfHiK-0005Tf-Ei; Wed, 18 Nov 2020 07:17:12 +0000 Received: from mail-pg1-x532.google.com ([2607:f8b0:4864:20::532]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1kfHiH-0005Sg-KV for linux-riscv@lists.infradead.org; Wed, 18 Nov 2020 07:17:10 +0000 Received: by mail-pg1-x532.google.com with SMTP id t21so577542pgl.3 for ; Tue, 17 Nov 2020 23:17:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=0w+Bq27/X0GIM1BI/NmY3YCnW8k8aSVxxtLiS5VSHa4=; b=BAXFUOgaXVa9W++H6CMOkJixDx0G47ljK4t+NNAQFx5YmxZjVgw0o88tLe/U8RW4NX 8NcG0+CeDGitGfgdPVrDierjmX6fPqWgkH3NC2pO+7dcaDjcmyY+PDTJIF2dQxfr0c0C HRUTm2+/HQgZtX0X4cwHKzNTjki5+AWY8nUwNCmSvEntvZM6EQIB9oK1tLkJL64FJiu8 at02S8TH+mKvsmILkehhskO/Nlf+qsFMgen3VSzqKtkldIZXDMX3F91BuMiuX5XCyHMN YKyHzeD8HsmpAHqhFunJJsxXx6sWGqE9TA/7u4PeiyFf5iIhDMIibUmw6xF2B7K5YRvf mJfA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=0w+Bq27/X0GIM1BI/NmY3YCnW8k8aSVxxtLiS5VSHa4=; b=qIMbJMm/Avn6g8ERrnOTem8CdxG2igQs8ZESPl/3+4/YShqROtpOfNRxO41su5Ca/w j4BEssH3tnvJx8M1o5cX0fOmWBZpuYIIfwxeY1AIIcNpDuRdKfHqi/N6lIFYhdydiakF 9uj9s26Hcsqv3ZVh2Tywkyf2PjpS3aZ7qQr/3hGWd+Gtwqc5unit/UJufCtZGODxtbhb lRc6pLov1UgeyuWbM/NVvaFBB3MuxhLx4PC3AAYbXr/b1lQyNFjW61Glczxk0tVJ2tOc Qifss9k251YbpQH3TlaZvvFL1acLLW/7FWgaTuUSHoY0wkKEVFikh9869elAKP/L8jqb IhnA== X-Gm-Message-State: AOAM531PYg6Xqpd8/fX7EHlG0tadTazaYcu4IZMMsBUZ5pq9OjWKYpom abfzj6YjY/8mpVXclsBayQI= X-Google-Smtp-Source: ABdhPJwpbP84Y6/nHU0afdC6CD4TN367l8gQUfUEiJcxtBej/sP2oyRducY8Glp7q5EE52FJffNoVQ== X-Received: by 2002:a62:7895:0:b029:18b:de24:2a9d with SMTP id t143-20020a6278950000b029018bde242a9dmr3429699pfc.21.1605683827746; Tue, 17 Nov 2020 23:17:07 -0800 (PST) Received: from btopel-mobl.ger.intel.com ([192.55.55.45]) by smtp.gmail.com with ESMTPSA id e128sm23019382pfe.154.2020.11.17.23.17.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 17 Nov 2020 23:17:06 -0800 (PST) From: =?UTF-8?q?Bj=C3=B6rn=20T=C3=B6pel?= To: ast@kernel.org, daniel@iogearbox.net, netdev@vger.kernel.org, bpf@vger.kernel.org Subject: [PATCH bpf-next v2 3/3] selftests/bpf: Mark tests that require unaligned memory access Date: Wed, 18 Nov 2020 08:16:40 +0100 Message-Id: <20201118071640.83773-4-bjorn.topel@gmail.com> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20201118071640.83773-1-bjorn.topel@gmail.com> References: <20201118071640.83773-1-bjorn.topel@gmail.com> MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20201118_021709_757756_6659C050 X-CRM114-Status: GOOD ( 13.94 ) X-BeenThere: linux-riscv@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: =?UTF-8?q?Bj=C3=B6rn=20T=C3=B6pel?= , linux-riscv@lists.infradead.org, andrii.nakryiko@gmail.com, xi.wang@gmail.com, luke.r.nels@gmail.com Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Sender: "linux-riscv" Errors-To: linux-riscv-bounces+linux-riscv=archiver.kernel.org@lists.infradead.org QSBsb3Qgb2YgdGVzdHMgcmVxdWlyZSB1bmFsaWduZWQgbWVtb3J5IGFjY2VzcyB0byB3b3JrLiBN YXJrIHRoZSB0ZXN0cwphcyBzdWNoLCBzbyB0aGF0IHRoZXkgY2FuIGJlIGF2b2lkZWQgb24gdW5z dXBwb3J0ZWQgYXJjaGl0ZWN0dXJlcyBzdWNoCmFzIFJJU0MtVi4KClNpZ25lZC1vZmYtYnk6IEJq w7ZybiBUw7ZwZWwgPGJqb3JuLnRvcGVsQGdtYWlsLmNvbT4KLS0tCiAuLi4vc2VsZnRlc3RzL2Jw Zi92ZXJpZmllci9jdHhfc2tfbG9va3VwLmMgICAgfCAgNyArKysKIC4uLi9icGYvdmVyaWZpZXIv ZGlyZWN0X3ZhbHVlX2FjY2Vzcy5jICAgICAgICB8ICAzICsrCiAuLi4vdGVzdGluZy9zZWxmdGVz dHMvYnBmL3ZlcmlmaWVyL21hcF9wdHIuYyAgfCAgMSArCiAuLi4vc2VsZnRlc3RzL2JwZi92ZXJp Zmllci9yYXdfdHBfd3JpdGFibGUuYyAgfCAgMSArCiAuLi4vc2VsZnRlc3RzL2JwZi92ZXJpZmll ci9yZWZfdHJhY2tpbmcuYyAgICAgfCAgNCArKwogLi4uL3Rlc3Rpbmcvc2VsZnRlc3RzL2JwZi92 ZXJpZmllci9yZWdhbGxvYy5jIHwgIDggKysrKwogLi4uL3NlbGZ0ZXN0cy9icGYvdmVyaWZpZXIv d2lkZV9hY2Nlc3MuYyAgICAgIHwgNDYgKysrKysrKysrKystLS0tLS0tLQogNyBmaWxlcyBjaGFu Z2VkLCA1MiBpbnNlcnRpb25zKCspLCAxOCBkZWxldGlvbnMoLSkKCmRpZmYgLS1naXQgYS90b29s cy90ZXN0aW5nL3NlbGZ0ZXN0cy9icGYvdmVyaWZpZXIvY3R4X3NrX2xvb2t1cC5jIGIvdG9vbHMv dGVzdGluZy9zZWxmdGVzdHMvYnBmL3ZlcmlmaWVyL2N0eF9za19sb29rdXAuYwppbmRleCAyYWQ1 Zjk3NDQ1MWMuLmZiMTNjYTJkNTYwNiAxMDA2NDQKLS0tIGEvdG9vbHMvdGVzdGluZy9zZWxmdGVz dHMvYnBmL3ZlcmlmaWVyL2N0eF9za19sb29rdXAuYworKysgYi90b29scy90ZXN0aW5nL3NlbGZ0 ZXN0cy9icGYvdmVyaWZpZXIvY3R4X3NrX2xvb2t1cC5jCkBAIC0yNjYsNiArMjY2LDcgQEAKIAku cmVzdWx0ID0gUkVKRUNULAogCS5wcm9nX3R5cGUgPSBCUEZfUFJPR19UWVBFX1NLX0xPT0tVUCwK IAkuZXhwZWN0ZWRfYXR0YWNoX3R5cGUgPSBCUEZfU0tfTE9PS1VQLAorCS5mbGFncyA9IEZfTkVF RFNfRUZGSUNJRU5UX1VOQUxJR05FRF9BQ0NFU1MsCiB9LAogewogCSJpbnZhbGlkIDgtYnl0ZSBy ZWFkIGZyb20gYnBmX3NrX2xvb2t1cCByZW1vdGVfaXA0IGZpZWxkIiwKQEAgLTI5Miw2ICsyOTMs NyBAQAogCS5yZXN1bHQgPSBSRUpFQ1QsCiAJLnByb2dfdHlwZSA9IEJQRl9QUk9HX1RZUEVfU0tf TE9PS1VQLAogCS5leHBlY3RlZF9hdHRhY2hfdHlwZSA9IEJQRl9TS19MT09LVVAsCisJLmZsYWdz ID0gRl9ORUVEU19FRkZJQ0lFTlRfVU5BTElHTkVEX0FDQ0VTUywKIH0sCiB7CiAJImludmFsaWQg OC1ieXRlIHJlYWQgZnJvbSBicGZfc2tfbG9va3VwIHJlbW90ZV9wb3J0IGZpZWxkIiwKQEAgLTMw NSw2ICszMDcsNyBAQAogCS5yZXN1bHQgPSBSRUpFQ1QsCiAJLnByb2dfdHlwZSA9IEJQRl9QUk9H X1RZUEVfU0tfTE9PS1VQLAogCS5leHBlY3RlZF9hdHRhY2hfdHlwZSA9IEJQRl9TS19MT09LVVAs CisJLmZsYWdzID0gRl9ORUVEU19FRkZJQ0lFTlRfVU5BTElHTkVEX0FDQ0VTUywKIH0sCiB7CiAJ ImludmFsaWQgOC1ieXRlIHJlYWQgZnJvbSBicGZfc2tfbG9va3VwIGxvY2FsX2lwNCBmaWVsZCIs CkBAIC0zMzEsNiArMzM0LDcgQEAKIAkucmVzdWx0ID0gUkVKRUNULAogCS5wcm9nX3R5cGUgPSBC UEZfUFJPR19UWVBFX1NLX0xPT0tVUCwKIAkuZXhwZWN0ZWRfYXR0YWNoX3R5cGUgPSBCUEZfU0tf TE9PS1VQLAorCS5mbGFncyA9IEZfTkVFRFNfRUZGSUNJRU5UX1VOQUxJR05FRF9BQ0NFU1MsCiB9 LAogewogCSJpbnZhbGlkIDgtYnl0ZSByZWFkIGZyb20gYnBmX3NrX2xvb2t1cCBsb2NhbF9wb3J0 IGZpZWxkIiwKQEAgLTM0NCw2ICszNDgsNyBAQAogCS5yZXN1bHQgPSBSRUpFQ1QsCiAJLnByb2df dHlwZSA9IEJQRl9QUk9HX1RZUEVfU0tfTE9PS1VQLAogCS5leHBlY3RlZF9hdHRhY2hfdHlwZSA9 IEJQRl9TS19MT09LVVAsCisJLmZsYWdzID0gRl9ORUVEU19FRkZJQ0lFTlRfVU5BTElHTkVEX0FD Q0VTUywKIH0sCiAvKiBpbnZhbGlkIDEsMiw0LWJ5dGUgcmVhZHMgZnJvbSA4LWJ5dGUgZmllbGRz IGluIGJwZl9za19sb29rdXAgKi8KIHsKQEAgLTQxMCw2ICs0MTUsNyBAQAogCS5yZXN1bHQgPSBS RUpFQ1QsCiAJLnByb2dfdHlwZSA9IEJQRl9QUk9HX1RZUEVfU0tfTE9PS1VQLAogCS5leHBlY3Rl ZF9hdHRhY2hfdHlwZSA9IEJQRl9TS19MT09LVVAsCisJLmZsYWdzID0gRl9ORUVEU19FRkZJQ0lF TlRfVU5BTElHTkVEX0FDQ0VTUywKIH0sCiB7CiAJImludmFsaWQgNC1ieXRlIHVuYWxpZ25lZCBy ZWFkIGZyb20gYnBmX3NrX2xvb2t1cCBhdCBldmVuIG9mZnNldCIsCkBAIC00MjIsNiArNDI4LDcg QEAKIAkucmVzdWx0ID0gUkVKRUNULAogCS5wcm9nX3R5cGUgPSBCUEZfUFJPR19UWVBFX1NLX0xP T0tVUCwKIAkuZXhwZWN0ZWRfYXR0YWNoX3R5cGUgPSBCUEZfU0tfTE9PS1VQLAorCS5mbGFncyA9 IEZfTkVFRFNfRUZGSUNJRU5UX1VOQUxJR05FRF9BQ0NFU1MsCiB9LAogLyogaW4tYm91bmQgYW5k IG91dC1vZi1ib3VuZCB3cml0ZXMgdG8gYnBmX3NrX2xvb2t1cCAqLwogewpkaWZmIC0tZ2l0IGEv dG9vbHMvdGVzdGluZy9zZWxmdGVzdHMvYnBmL3ZlcmlmaWVyL2RpcmVjdF92YWx1ZV9hY2Nlc3Mu YyBiL3Rvb2xzL3Rlc3Rpbmcvc2VsZnRlc3RzL2JwZi92ZXJpZmllci9kaXJlY3RfdmFsdWVfYWNj ZXNzLmMKaW5kZXggOTg4ZjQ2YTFhNGM3Li5jMDY0OGRjMDA5YjUgMTAwNjQ0Ci0tLSBhL3Rvb2xz L3Rlc3Rpbmcvc2VsZnRlc3RzL2JwZi92ZXJpZmllci9kaXJlY3RfdmFsdWVfYWNjZXNzLmMKKysr IGIvdG9vbHMvdGVzdGluZy9zZWxmdGVzdHMvYnBmL3ZlcmlmaWVyL2RpcmVjdF92YWx1ZV9hY2Nl c3MuYwpAQCAtNjksNiArNjksNyBAQAogCS5maXh1cF9tYXBfYXJyYXlfNDhiID0geyAxIH0sCiAJ LnJlc3VsdCA9IFJFSkVDVCwKIAkuZXJyc3RyID0gIlIxIG1pbiB2YWx1ZSBpcyBvdXRzaWRlIG9m IHRoZSBhbGxvd2VkIG1lbW9yeSByYW5nZSIsCisJLmZsYWdzID0gRl9ORUVEU19FRkZJQ0lFTlRf VU5BTElHTkVEX0FDQ0VTUywKIH0sCiB7CiAJImRpcmVjdCBtYXAgYWNjZXNzLCB3cml0ZSB0ZXN0 IDciLApAQCAtMTk1LDYgKzE5Niw3IEBACiAJLmZpeHVwX21hcF9hcnJheV80OGIgPSB7IDEsIDMg fSwKIAkucmVzdWx0ID0gUkVKRUNULAogCS5lcnJzdHIgPSAiaW52YWxpZCBhY2Nlc3MgdG8gbWFw IHZhbHVlLCB2YWx1ZV9zaXplPTQ4IG9mZj00NyBzaXplPTIiLAorCS5mbGFncyA9IEZfTkVFRFNf RUZGSUNJRU5UX1VOQUxJR05FRF9BQ0NFU1MsCiB9LAogewogCSJkaXJlY3QgbWFwIGFjY2Vzcywg d3JpdGUgdGVzdCAxNyIsCkBAIC0yMDksNiArMjExLDcgQEAKIAkuZml4dXBfbWFwX2FycmF5XzQ4 YiA9IHsgMSwgMyB9LAogCS5yZXN1bHQgPSBSRUpFQ1QsCiAJLmVycnN0ciA9ICJpbnZhbGlkIGFj Y2VzcyB0byBtYXAgdmFsdWUsIHZhbHVlX3NpemU9NDggb2ZmPTQ3IHNpemU9MiIsCisJLmZsYWdz ID0gRl9ORUVEU19FRkZJQ0lFTlRfVU5BTElHTkVEX0FDQ0VTUywKIH0sCiB7CiAJImRpcmVjdCBt YXAgYWNjZXNzLCB3cml0ZSB0ZXN0IDE4IiwKZGlmZiAtLWdpdCBhL3Rvb2xzL3Rlc3Rpbmcvc2Vs ZnRlc3RzL2JwZi92ZXJpZmllci9tYXBfcHRyLmMgYi90b29scy90ZXN0aW5nL3NlbGZ0ZXN0cy9i cGYvdmVyaWZpZXIvbWFwX3B0ci5jCmluZGV4IDYzN2Y5MjkzYmRhOC4uYjExN2JkZDM4MDZkIDEw MDY0NAotLS0gYS90b29scy90ZXN0aW5nL3NlbGZ0ZXN0cy9icGYvdmVyaWZpZXIvbWFwX3B0ci5j CisrKyBiL3Rvb2xzL3Rlc3Rpbmcvc2VsZnRlc3RzL2JwZi92ZXJpZmllci9tYXBfcHRyLmMKQEAg LTQ0LDYgKzQ0LDcgQEAKIAkuZXJyc3RyX3VucHJpdiA9ICJicGZfYXJyYXkgYWNjZXNzIGlzIGFs bG93ZWQgb25seSB0byBDQVBfUEVSRk1PTiBhbmQgQ0FQX1NZU19BRE1JTiIsCiAJLnJlc3VsdCA9 IFJFSkVDVCwKIAkuZXJyc3RyID0gImNhbm5vdCBhY2Nlc3MgcHRyIG1lbWJlciBvcHMgd2l0aCBt b2ZmIDAgaW4gc3RydWN0IGJwZl9tYXAgd2l0aCBvZmYgMSBzaXplIDQiLAorCS5mbGFncyA9IEZf TkVFRFNfRUZGSUNJRU5UX1VOQUxJR05FRF9BQ0NFU1MsCiB9LAogewogCSJicGZfbWFwX3B0cjog cmVhZCBvcHMgZmllbGQgYWNjZXB0ZWQiLApkaWZmIC0tZ2l0IGEvdG9vbHMvdGVzdGluZy9zZWxm dGVzdHMvYnBmL3ZlcmlmaWVyL3Jhd190cF93cml0YWJsZS5jIGIvdG9vbHMvdGVzdGluZy9zZWxm dGVzdHMvYnBmL3ZlcmlmaWVyL3Jhd190cF93cml0YWJsZS5jCmluZGV4IDk1YjVkNzBhMWRjMS4u Mjk3OGZiNWE3NjlkIDEwMDY0NAotLS0gYS90b29scy90ZXN0aW5nL3NlbGZ0ZXN0cy9icGYvdmVy aWZpZXIvcmF3X3RwX3dyaXRhYmxlLmMKKysrIGIvdG9vbHMvdGVzdGluZy9zZWxmdGVzdHMvYnBm L3ZlcmlmaWVyL3Jhd190cF93cml0YWJsZS5jCkBAIC0zMSw0ICszMSw1IEBACiAJLmZpeHVwX21h cF9oYXNoXzhiID0geyAxLCB9LAogCS5wcm9nX3R5cGUgPSBCUEZfUFJPR19UWVBFX1JBV19UUkFD RVBPSU5UX1dSSVRBQkxFLAogCS5lcnJzdHIgPSAiUjYgaW52YWxpZCB2YXJpYWJsZSBidWZmZXIg b2Zmc2V0OiBvZmY9MCwgdmFyX29mZj0oMHgwOyAweGZmZmZmZmZmKSIsCisJLmZsYWdzID0gRl9O RUVEU19FRkZJQ0lFTlRfVU5BTElHTkVEX0FDQ0VTUywKIH0sCmRpZmYgLS1naXQgYS90b29scy90 ZXN0aW5nL3NlbGZ0ZXN0cy9icGYvdmVyaWZpZXIvcmVmX3RyYWNraW5nLmMgYi90b29scy90ZXN0 aW5nL3NlbGZ0ZXN0cy9icGYvdmVyaWZpZXIvcmVmX3RyYWNraW5nLmMKaW5kZXggMDA2YjViZDk5 YzA4Li4zYjZlZTAwOWMwMGIgMTAwNjQ0Ci0tLSBhL3Rvb2xzL3Rlc3Rpbmcvc2VsZnRlc3RzL2Jw Zi92ZXJpZmllci9yZWZfdHJhY2tpbmcuYworKysgYi90b29scy90ZXN0aW5nL3NlbGZ0ZXN0cy9i cGYvdmVyaWZpZXIvcmVmX3RyYWNraW5nLmMKQEAgLTY3NSw2ICs2NzUsNyBAQAogCS5wcm9nX3R5 cGUgPSBCUEZfUFJPR19UWVBFX1NDSEVEX0NMUywKIAkucmVzdWx0ID0gUkVKRUNULAogCS5lcnJz dHIgPSAiaW52YWxpZCBtZW0gYWNjZXNzIiwKKwkuZmxhZ3MgPSBGX05FRURTX0VGRklDSUVOVF9V TkFMSUdORURfQUNDRVNTLAogfSwKIHsKIAkicmVmZXJlbmNlIHRyYWNraW5nOiB1c2UgcHRyIGZy b20gYnBmX3NrX2Z1bGxzb2NrKCkgYWZ0ZXIgcmVsZWFzZSIsCkBAIC02OTgsNiArNjk5LDcgQEAK IAkucHJvZ190eXBlID0gQlBGX1BST0dfVFlQRV9TQ0hFRF9DTFMsCiAJLnJlc3VsdCA9IFJFSkVD VCwKIAkuZXJyc3RyID0gImludmFsaWQgbWVtIGFjY2VzcyIsCisJLmZsYWdzID0gRl9ORUVEU19F RkZJQ0lFTlRfVU5BTElHTkVEX0FDQ0VTUywKIH0sCiB7CiAJInJlZmVyZW5jZSB0cmFja2luZzog dXNlIHB0ciBmcm9tIGJwZl9za19mdWxsc29jayh0cCkgYWZ0ZXIgcmVsZWFzZSIsCkBAIC03MjUs NiArNzI3LDcgQEAKIAkucHJvZ190eXBlID0gQlBGX1BST0dfVFlQRV9TQ0hFRF9DTFMsCiAJLnJl c3VsdCA9IFJFSkVDVCwKIAkuZXJyc3RyID0gImludmFsaWQgbWVtIGFjY2VzcyIsCisJLmZsYWdz ID0gRl9ORUVEU19FRkZJQ0lFTlRfVU5BTElHTkVEX0FDQ0VTUywKIH0sCiB7CiAJInJlZmVyZW5j ZSB0cmFja2luZzogdXNlIHNrIGFmdGVyIGJwZl9za19yZWxlYXNlKHRwKSIsCkBAIC03NDcsNiAr NzUwLDcgQEAKIAkucHJvZ190eXBlID0gQlBGX1BST0dfVFlQRV9TQ0hFRF9DTFMsCiAJLnJlc3Vs dCA9IFJFSkVDVCwKIAkuZXJyc3RyID0gImludmFsaWQgbWVtIGFjY2VzcyIsCisJLmZsYWdzID0g Rl9ORUVEU19FRkZJQ0lFTlRfVU5BTElHTkVEX0FDQ0VTUywKIH0sCiB7CiAJInJlZmVyZW5jZSB0 cmFja2luZzogdXNlIHB0ciBmcm9tIGJwZl9nZXRfbGlzdGVuZXJfc29jaygpIGFmdGVyIGJwZl9z a19yZWxlYXNlKHNrKSIsCmRpZmYgLS1naXQgYS90b29scy90ZXN0aW5nL3NlbGZ0ZXN0cy9icGYv dmVyaWZpZXIvcmVnYWxsb2MuYyBiL3Rvb2xzL3Rlc3Rpbmcvc2VsZnRlc3RzL2JwZi92ZXJpZmll ci9yZWdhbGxvYy5jCmluZGV4IDRhZDdlMDVkZTcwNi4uYmIwZGQ4OWRkMjEyIDEwMDY0NAotLS0g YS90b29scy90ZXN0aW5nL3NlbGZ0ZXN0cy9icGYvdmVyaWZpZXIvcmVnYWxsb2MuYworKysgYi90 b29scy90ZXN0aW5nL3NlbGZ0ZXN0cy9icGYvdmVyaWZpZXIvcmVnYWxsb2MuYwpAQCAtMjEsNiAr MjEsNyBAQAogCS5maXh1cF9tYXBfaGFzaF80OGIgPSB7IDQgfSwKIAkucmVzdWx0ID0gQUNDRVBU LAogCS5wcm9nX3R5cGUgPSBCUEZfUFJPR19UWVBFX1RSQUNFUE9JTlQsCisJLmZsYWdzID0gRl9O RUVEU19FRkZJQ0lFTlRfVU5BTElHTkVEX0FDQ0VTUywKIH0sCiB7CiAJInJlZ2FsbG9jIG5lZ2F0 aXZlIiwKQEAgLTcxLDYgKzcyLDcgQEAKIAkuZml4dXBfbWFwX2hhc2hfNDhiID0geyA0IH0sCiAJ LnJlc3VsdCA9IEFDQ0VQVCwKIAkucHJvZ190eXBlID0gQlBGX1BST0dfVFlQRV9UUkFDRVBPSU5U LAorCS5mbGFncyA9IEZfTkVFRFNfRUZGSUNJRU5UX1VOQUxJR05FRF9BQ0NFU1MsCiB9LAogewog CSJyZWdhbGxvYyBzcmNfcmVnIG5lZ2F0aXZlIiwKQEAgLTk3LDYgKzk5LDcgQEAKIAkucmVzdWx0 ID0gUkVKRUNULAogCS5lcnJzdHIgPSAiaW52YWxpZCBhY2Nlc3MgdG8gbWFwIHZhbHVlLCB2YWx1 ZV9zaXplPTQ4IG9mZj00NCBzaXplPTgiLAogCS5wcm9nX3R5cGUgPSBCUEZfUFJPR19UWVBFX1RS QUNFUE9JTlQsCisJLmZsYWdzID0gRl9ORUVEU19FRkZJQ0lFTlRfVU5BTElHTkVEX0FDQ0VTUywK IH0sCiB7CiAJInJlZ2FsbG9jIGFuZCBzcGlsbCIsCkBAIC0xMjYsNiArMTI5LDcgQEAKIAkuZml4 dXBfbWFwX2hhc2hfNDhiID0geyA0IH0sCiAJLnJlc3VsdCA9IEFDQ0VQVCwKIAkucHJvZ190eXBl ID0gQlBGX1BST0dfVFlQRV9UUkFDRVBPSU5ULAorCS5mbGFncyA9IEZfTkVFRFNfRUZGSUNJRU5U X1VOQUxJR05FRF9BQ0NFU1MsCiB9LAogewogCSJyZWdhbGxvYyBhbmQgc3BpbGwgbmVnYXRpdmUi LApAQCAtMTU2LDYgKzE2MCw3IEBACiAJLnJlc3VsdCA9IFJFSkVDVCwKIAkuZXJyc3RyID0gImlu dmFsaWQgYWNjZXNzIHRvIG1hcCB2YWx1ZSwgdmFsdWVfc2l6ZT00OCBvZmY9NDggc2l6ZT04IiwK IAkucHJvZ190eXBlID0gQlBGX1BST0dfVFlQRV9UUkFDRVBPSU5ULAorCS5mbGFncyA9IEZfTkVF RFNfRUZGSUNJRU5UX1VOQUxJR05FRF9BQ0NFU1MsCiB9LAogewogCSJyZWdhbGxvYyB0aHJlZSBy ZWdzIiwKQEAgLTE4Miw2ICsxODcsNyBAQAogCS5maXh1cF9tYXBfaGFzaF80OGIgPSB7IDQgfSwK IAkucmVzdWx0ID0gQUNDRVBULAogCS5wcm9nX3R5cGUgPSBCUEZfUFJPR19UWVBFX1RSQUNFUE9J TlQsCisJLmZsYWdzID0gRl9ORUVEU19FRkZJQ0lFTlRfVU5BTElHTkVEX0FDQ0VTUywKIH0sCiB7 CiAJInJlZ2FsbG9jIGFmdGVyIGNhbGwiLApAQCAtMjEwLDYgKzIxNiw3IEBACiAJLmZpeHVwX21h cF9oYXNoXzQ4YiA9IHsgNCB9LAogCS5yZXN1bHQgPSBBQ0NFUFQsCiAJLnByb2dfdHlwZSA9IEJQ Rl9QUk9HX1RZUEVfVFJBQ0VQT0lOVCwKKwkuZmxhZ3MgPSBGX05FRURTX0VGRklDSUVOVF9VTkFM SUdORURfQUNDRVNTLAogfSwKIHsKIAkicmVnYWxsb2MgaW4gY2FsbGVlIiwKQEAgLTI0MCw2ICsy NDcsNyBAQAogCS5maXh1cF9tYXBfaGFzaF80OGIgPSB7IDQgfSwKIAkucmVzdWx0ID0gQUNDRVBU LAogCS5wcm9nX3R5cGUgPSBCUEZfUFJPR19UWVBFX1RSQUNFUE9JTlQsCisJLmZsYWdzID0gRl9O RUVEU19FRkZJQ0lFTlRfVU5BTElHTkVEX0FDQ0VTUywKIH0sCiB7CiAJInJlZ2FsbG9jLCBzcGls bCwgSkVRIiwKZGlmZiAtLWdpdCBhL3Rvb2xzL3Rlc3Rpbmcvc2VsZnRlc3RzL2JwZi92ZXJpZmll ci93aWRlX2FjY2Vzcy5jIGIvdG9vbHMvdGVzdGluZy9zZWxmdGVzdHMvYnBmL3ZlcmlmaWVyL3dp ZGVfYWNjZXNzLmMKaW5kZXggY2NhZGU5MzEyZDIxLi41NWFmMjQ4ZWZhOTMgMTAwNjQ0Ci0tLSBh L3Rvb2xzL3Rlc3Rpbmcvc2VsZnRlc3RzL2JwZi92ZXJpZmllci93aWRlX2FjY2Vzcy5jCisrKyBi L3Rvb2xzL3Rlc3Rpbmcvc2VsZnRlc3RzL2JwZi92ZXJpZmllci93aWRlX2FjY2Vzcy5jCkBAIC0x LDQgKzEsNCBAQAotI2RlZmluZSBCUEZfU09DS19BRERSX1NUT1JFKGZpZWxkLCBvZmYsIHJlcywg ZXJyKSBcCisjZGVmaW5lIEJQRl9TT0NLX0FERFJfU1RPUkUoZmllbGQsIG9mZiwgcmVzLCBlcnIs IGZsZ3MpCVwKIHsgXAogCSJ3aWRlIHN0b3JlIHRvIGJwZl9zb2NrX2FkZHIuIiAjZmllbGQgIlsi ICNvZmYgIl0iLCBcCiAJLmluc25zID0geyBcCkBAIC0xMSwzMSArMTEsMzYgQEAKIAkucHJvZ190 eXBlID0gQlBGX1BST0dfVFlQRV9DR1JPVVBfU09DS19BRERSLCBcCiAJLmV4cGVjdGVkX2F0dGFj aF90eXBlID0gQlBGX0NHUk9VUF9VRFA2X1NFTkRNU0csIFwKIAkuZXJyc3RyID0gZXJyLCBcCisJ LmZsYWdzID0gZmxncywgXAogfQogCiAvKiB1c2VyX2lwNlswXSBpcyB1NjQgYWxpZ25lZCAqLwog QlBGX1NPQ0tfQUREUl9TVE9SRSh1c2VyX2lwNiwgMCwgQUNDRVBULAotCQkgICAgTlVMTCksCisJ CSAgICBOVUxMLCAwKSwKIEJQRl9TT0NLX0FERFJfU1RPUkUodXNlcl9pcDYsIDEsIFJFSkVDVCwK LQkJICAgICJpbnZhbGlkIGJwZl9jb250ZXh0IGFjY2VzcyBvZmY9MTIgc2l6ZT04IiksCisJCSAg ICAiaW52YWxpZCBicGZfY29udGV4dCBhY2Nlc3Mgb2ZmPTEyIHNpemU9OCIsCisJCSAgICBGX05F RURTX0VGRklDSUVOVF9VTkFMSUdORURfQUNDRVNTKSwKIEJQRl9TT0NLX0FERFJfU1RPUkUodXNl cl9pcDYsIDIsIEFDQ0VQVCwKLQkJICAgIE5VTEwpLAorCQkgICAgTlVMTCwgMCksCiBCUEZfU09D S19BRERSX1NUT1JFKHVzZXJfaXA2LCAzLCBSRUpFQ1QsCi0JCSAgICAiaW52YWxpZCBicGZfY29u dGV4dCBhY2Nlc3Mgb2ZmPTIwIHNpemU9OCIpLAorCQkgICAgImludmFsaWQgYnBmX2NvbnRleHQg YWNjZXNzIG9mZj0yMCBzaXplPTgiLAorCQkgICAgRl9ORUVEU19FRkZJQ0lFTlRfVU5BTElHTkVE X0FDQ0VTUyksCiAKIC8qIG1zZ19zcmNfaXA2WzBdIGlzIF9ub3RfIHU2NCBhbGlnbmVkICovCiBC UEZfU09DS19BRERSX1NUT1JFKG1zZ19zcmNfaXA2LCAwLCBSRUpFQ1QsCi0JCSAgICAiaW52YWxp ZCBicGZfY29udGV4dCBhY2Nlc3Mgb2ZmPTQ0IHNpemU9OCIpLAorCQkgICAgImludmFsaWQgYnBm X2NvbnRleHQgYWNjZXNzIG9mZj00NCBzaXplPTgiLAorCQkgICAgRl9ORUVEU19FRkZJQ0lFTlRf VU5BTElHTkVEX0FDQ0VTUyksCiBCUEZfU09DS19BRERSX1NUT1JFKG1zZ19zcmNfaXA2LCAxLCBB Q0NFUFQsCi0JCSAgICBOVUxMKSwKKwkJICAgIE5VTEwsIDApLAogQlBGX1NPQ0tfQUREUl9TVE9S RShtc2dfc3JjX2lwNiwgMiwgUkVKRUNULAotCQkgICAgImludmFsaWQgYnBmX2NvbnRleHQgYWNj ZXNzIG9mZj01MiBzaXplPTgiKSwKKwkJICAgICJpbnZhbGlkIGJwZl9jb250ZXh0IGFjY2VzcyBv ZmY9NTIgc2l6ZT04IiwKKwkJICAgIEZfTkVFRFNfRUZGSUNJRU5UX1VOQUxJR05FRF9BQ0NFU1Mp LAogQlBGX1NPQ0tfQUREUl9TVE9SRShtc2dfc3JjX2lwNiwgMywgUkVKRUNULAotCQkgICAgImlu dmFsaWQgYnBmX2NvbnRleHQgYWNjZXNzIG9mZj01NiBzaXplPTgiKSwKKwkJICAgICJpbnZhbGlk IGJwZl9jb250ZXh0IGFjY2VzcyBvZmY9NTYgc2l6ZT04IiwgMCksCiAKICN1bmRlZiBCUEZfU09D S19BRERSX1NUT1JFCiAKLSNkZWZpbmUgQlBGX1NPQ0tfQUREUl9MT0FEKGZpZWxkLCBvZmYsIHJl cywgZXJyKSBcCisjZGVmaW5lIEJQRl9TT0NLX0FERFJfTE9BRChmaWVsZCwgb2ZmLCByZXMsIGVy ciwgZmxncykJXAogeyBcCiAJIndpZGUgbG9hZCBmcm9tIGJwZl9zb2NrX2FkZHIuIiAjZmllbGQg IlsiICNvZmYgIl0iLCBcCiAJLmluc25zID0geyBcCkBAIC00OCwyNiArNTMsMzEgQEAgQlBGX1NP Q0tfQUREUl9TVE9SRShtc2dfc3JjX2lwNiwgMywgUkVKRUNULAogCS5wcm9nX3R5cGUgPSBCUEZf UFJPR19UWVBFX0NHUk9VUF9TT0NLX0FERFIsIFwKIAkuZXhwZWN0ZWRfYXR0YWNoX3R5cGUgPSBC UEZfQ0dST1VQX1VEUDZfU0VORE1TRywgXAogCS5lcnJzdHIgPSBlcnIsIFwKKwkuZmxhZ3MgPSBm bGdzLCBcCiB9CiAKIC8qIHVzZXJfaXA2WzBdIGlzIHU2NCBhbGlnbmVkICovCiBCUEZfU09DS19B RERSX0xPQUQodXNlcl9pcDYsIDAsIEFDQ0VQVCwKLQkJICAgTlVMTCksCisJCSAgIE5VTEwsIDAp LAogQlBGX1NPQ0tfQUREUl9MT0FEKHVzZXJfaXA2LCAxLCBSRUpFQ1QsCi0JCSAgICJpbnZhbGlk IGJwZl9jb250ZXh0IGFjY2VzcyBvZmY9MTIgc2l6ZT04IiksCisJCSAgICJpbnZhbGlkIGJwZl9j b250ZXh0IGFjY2VzcyBvZmY9MTIgc2l6ZT04IiwKKwkJICAgIEZfTkVFRFNfRUZGSUNJRU5UX1VO QUxJR05FRF9BQ0NFU1MpLAogQlBGX1NPQ0tfQUREUl9MT0FEKHVzZXJfaXA2LCAyLCBBQ0NFUFQs Ci0JCSAgIE5VTEwpLAorCQkgICBOVUxMLCAwKSwKIEJQRl9TT0NLX0FERFJfTE9BRCh1c2VyX2lw NiwgMywgUkVKRUNULAotCQkgICAiaW52YWxpZCBicGZfY29udGV4dCBhY2Nlc3Mgb2ZmPTIwIHNp emU9OCIpLAorCQkgICAiaW52YWxpZCBicGZfY29udGV4dCBhY2Nlc3Mgb2ZmPTIwIHNpemU9OCIs CisJCSAgICBGX05FRURTX0VGRklDSUVOVF9VTkFMSUdORURfQUNDRVNTKSwKIAogLyogbXNnX3Ny Y19pcDZbMF0gaXMgX25vdF8gdTY0IGFsaWduZWQgKi8KIEJQRl9TT0NLX0FERFJfTE9BRChtc2df c3JjX2lwNiwgMCwgUkVKRUNULAotCQkgICAiaW52YWxpZCBicGZfY29udGV4dCBhY2Nlc3Mgb2Zm PTQ0IHNpemU9OCIpLAorCQkgICAiaW52YWxpZCBicGZfY29udGV4dCBhY2Nlc3Mgb2ZmPTQ0IHNp emU9OCIsCisJCSAgICBGX05FRURTX0VGRklDSUVOVF9VTkFMSUdORURfQUNDRVNTKSwKIEJQRl9T T0NLX0FERFJfTE9BRChtc2dfc3JjX2lwNiwgMSwgQUNDRVBULAotCQkgICBOVUxMKSwKKwkJICAg TlVMTCwgMCksCiBCUEZfU09DS19BRERSX0xPQUQobXNnX3NyY19pcDYsIDIsIFJFSkVDVCwKLQkJ ICAgImludmFsaWQgYnBmX2NvbnRleHQgYWNjZXNzIG9mZj01MiBzaXplPTgiKSwKKwkJICAgImlu dmFsaWQgYnBmX2NvbnRleHQgYWNjZXNzIG9mZj01MiBzaXplPTgiLAorCQkgICAgRl9ORUVEU19F RkZJQ0lFTlRfVU5BTElHTkVEX0FDQ0VTUyksCiBCUEZfU09DS19BRERSX0xPQUQobXNnX3NyY19p cDYsIDMsIFJFSkVDVCwKLQkJICAgImludmFsaWQgYnBmX2NvbnRleHQgYWNjZXNzIG9mZj01NiBz aXplPTgiKSwKKwkJICAgImludmFsaWQgYnBmX2NvbnRleHQgYWNjZXNzIG9mZj01NiBzaXplPTgi LCAwKSwKIAogI3VuZGVmIEJQRl9TT0NLX0FERFJfTE9BRAotLSAKMi4yNy4wCgoKX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KbGludXgtcmlzY3YgbWFpbGlu ZyBsaXN0CmxpbnV4LXJpc2N2QGxpc3RzLmluZnJhZGVhZC5vcmcKaHR0cDovL2xpc3RzLmluZnJh ZGVhZC5vcmcvbWFpbG1hbi9saXN0aW5mby9saW51eC1yaXNjdgo=