From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0ACB5C05027 for ; Fri, 17 Feb 2023 18:33:38 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229539AbjBQSdh (ORCPT ); Fri, 17 Feb 2023 13:33:37 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41868 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229445AbjBQSdg (ORCPT ); Fri, 17 Feb 2023 13:33:36 -0500 Received: from out0.migadu.com (out0.migadu.com [94.23.1.103]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 43FC86242D for ; Fri, 17 Feb 2023 10:33:35 -0800 (PST) Message-ID: <58374b80-34b6-4c4f-b7bd-9c2f6be3eba6@linux.dev> DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1676658813; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=FBrzUnhtrE6SbL73tcs5ktHIqhkF4qIy0Od4Q9hHGRI=; b=tzSWRx4431bb6c4b1J9oS+xlwmIyGznYMLqc16/fO8oRMMpz2JSPnuYvdqkbeWFbDLhYWL LIX0Fv9OVHNWL4MyCkS7oPRYKTowmu2IKQ3ZalvY71hcjsIr5NO8TdqM+4AiGgOS0XE3Yj eT5ONKvKXgRRkaaRYek6TpzQ7I+sQok= Date: Fri, 17 Feb 2023 10:33:30 -0800 MIME-Version: 1.0 Subject: Re: [linux-next:master 12987/13499] include/linux/build_bug.h:78:41: error: static assertion failed: "SKB_WITH_OVERHEAD(TEST_XDP_FRAME_SIZE - XDP_PACKET_HEADROOM) == TEST_MAX_PKT_SIZE" Content-Language: en-US To: Alexander Lobakin , =?UTF-8?Q?Toke_H=c3=b8iland-J=c3=b8rgensen?= Cc: oe-kbuild-all@lists.linux.dev, kernel test robot , Linux Memory Management List , bpf@vger.kernel.org, Martin KaFai Lau References: <202302172104.q3ddwzqu-lkp@intel.com> <50c35055-afa9-d01e-9a05-ea5351280e4f@intel.com> X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Martin KaFai Lau In-Reply-To: <50c35055-afa9-d01e-9a05-ea5351280e4f@intel.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Migadu-Flow: FLOW_OUT Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org On 2/17/23 5:50 AM, Alexander Lobakin wrote: > From: Kernel Test Robot > Date: Fri, 17 Feb 2023 21:45:40 +0800 > >> tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master >> head: c068f40300a0eaa34f7105d137a5560b86951aa9 >> commit: 6c20822fada1b8adb77fa450d03a0d449686a4a9 [12987/13499] bpf, test_run: fix &xdp_frame misplacement for LIVE_FRAMES >> config: ia64-randconfig-r025-20230213 (https://download.01.org/0day-ci/archive/20230217/202302172104.q3ddwzqu-lkp@intel.com/config) >> compiler: ia64-linux-gcc (GCC) 12.1.0 > > ia64 has 128-byte cacheline on some configs. While I can easily test it > in the kernel, what do I do in the userspace test >_< > Or just exclude non-{64,256} CLs from the assertion? I would remove the static_assert from the kernel. Having a comment in the xdp_do_redirect.c selftest is good enough. Considering the bpf supported archs are more mainstream, it is easier for the xdp_do_redirect.c test to take care of it.