From mboxrd@z Thu Jan 1 00:00:00 1970 From: Daniel Borkmann Subject: Re: [PATCH bpf] bpf: btf: Clean up BTF_INT_BITS() in uapi btf.h Date: Fri, 20 Jul 2018 10:37:51 +0200 Message-ID: <27c9a7fd-20b6-01a7-b66d-31729f73c1f0@iogearbox.net> References: <20180720051431.3840338-1-kafai@fb.com> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Cc: Alexei Starovoitov , kernel-team@fb.com To: Martin KaFai Lau , netdev@vger.kernel.org Return-path: Received: from www62.your-server.de ([213.133.104.62]:33716 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727201AbeGTJZE (ORCPT ); Fri, 20 Jul 2018 05:25:04 -0400 In-Reply-To: <20180720051431.3840338-1-kafai@fb.com> Content-Language: en-US Sender: netdev-owner@vger.kernel.org List-ID: On 07/20/2018 07:14 AM, Martin KaFai Lau wrote: > This patch shrinks the BTF_INT_BITS() mask. The current > btf_int_check_meta() ensures the nr_bits of an integer > cannot exceed 64. Hence, it is mostly an uapi cleanup. > > The actual btf usage (i.e. seq_show()) is also modified > to use u8 instead of u16. The verification (e.g. btf_int_check_meta()) > path stays as is to deal with invalid BTF situation. > > Fixes: 69b693f0aefa ("bpf: btf: Introduce BPF Type Format (BTF)") > Signed-off-by: Martin KaFai Lau Applied to bpf, thanks Martin!