From: Hari Bathini <hbathini@linux.ibm.com>
To: Yonghong Song <yonghong.song@linux.dev>, bpf@vger.kernel.org
Cc: Alexei Starovoitov <ast@kernel.org>,
Daniel Borkmann <daniel@iogearbox.net>,
Andrii Nakryiko <andrii@kernel.org>,
Shuah Khan <shuah@kernel.org>,
linux-kselftest@vger.kernel.org
Subject: Re: [PATCH bpf-next v2] selftests/bpf: improve test coverage for kfunc call
Date: Fri, 13 Mar 2026 14:59:52 +0530 [thread overview]
Message-ID: <ec4e7ff6-55e3-4889-b507-fee71fab99f8@linux.ibm.com> (raw)
In-Reply-To: <02e68ebf-5782-4632-aed8-0026a3aab96b@linux.dev>
On 12/03/26 11:52 pm, Yonghong Song wrote:
>
>
> On 3/12/26 1:01 AM, Hari Bathini wrote:
>> On powerpc, immediate load instructions are sign extended. In case
>> of unsigned types, arguments should be explicitly zero-extended by
>> the caller. For kfunc call, this needs to be handled in the JIT code.
>> In bpf_kfunc_call_test4(), that tests for sign-extension of signed
>> argument types in kfunc calls, add some additional failure checks.
>> And add bpf_kfunc_call_test5() to test zero-extension of unsigned
>> argument types in kfunc calls.
>>
>> Signed-off-by: Hari Bathini <hbathini@linux.ibm.com>
>
> LGTM with a nit below.
>
> Acked-by: Yonghong Song <yonghong.song@linux.dev>
Thanks for the review, Yonghong.
>
>> ---
>>
>> Changes in v2:
>> - Added asm version of the selftest for consistent testing across
>> different BPF ISA versions.
>> - Added comments clearly stating the intent of the test cases.
>> - Updated sign-extension selftest to have additional failure checks.
>>
>>
>> .../selftests/bpf/prog_tests/kfunc_call.c | 2 +
>> .../selftests/bpf/progs/kfunc_call_test.c | 98 +++++++++++++++++++
>> .../selftests/bpf/test_kmods/bpf_testmod.c | 54 +++++++++-
>> .../bpf/test_kmods/bpf_testmod_kfunc.h | 1 +
>> 4 files changed, 154 insertions(+), 1 deletion(-)
>>
>> diff --git a/tools/testing/selftests/bpf/prog_tests/kfunc_call.c b/
>> tools/testing/selftests/bpf/prog_tests/kfunc_call.c
>> index f79c8e53cb3e..62f3fb79f5d1 100644
>> --- a/tools/testing/selftests/bpf/prog_tests/kfunc_call.c
>> +++ b/tools/testing/selftests/bpf/prog_tests/kfunc_call.c
>> @@ -74,6 +74,8 @@ static struct kfunc_test_params kfunc_tests[] = {
>> TC_TEST(kfunc_call_test1, 12),
>> TC_TEST(kfunc_call_test2, 3),
>> TC_TEST(kfunc_call_test4, -1234),
>> + TC_TEST(kfunc_call_test5, 0),
>> + TC_TEST(kfunc_call_test5_asm, 0),
>> TC_TEST(kfunc_call_test_ref_btf_id, 0),
>> TC_TEST(kfunc_call_test_get_mem, 42),
>> SYSCALL_TEST(kfunc_syscall_test, 0),
>> diff --git a/tools/testing/selftests/bpf/progs/kfunc_call_test.c b/
>> tools/testing/selftests/bpf/progs/kfunc_call_test.c
>> index 8b86113a0126..5edc51564f71 100644
>> --- a/tools/testing/selftests/bpf/progs/kfunc_call_test.c
>> +++ b/tools/testing/selftests/bpf/progs/kfunc_call_test.c
>> @@ -2,8 +2,106 @@
>> /* Copyright (c) 2021 Facebook */
>> #include <vmlinux.h>
>> #include <bpf/bpf_helpers.h>
>> +#include "bpf_misc.h"
>> #include "../test_kmods/bpf_testmod_kfunc.h"
>> +SEC("tc")
>> +int kfunc_call_test5(struct __sk_buff *skb)
>> +{
>> + struct bpf_sock *sk = skb->sk;
>> + int ret;
>> + u32 val32;
>> + u16 val16;
>> + u8 val8;
>> +
>> + if (!sk)
>> + return -1;
>> +
>> + sk = bpf_sk_fullsock(sk);
>> + if (!sk)
>> + return -1;
>> +
>> + /*
>> + * Test with constant values to verify zero-extension.
>> + * ISA-dependent BPF asm:
>> + * With ALU32: w1 = 0xFF; w2 = 0xFFFF; w3 = 0xFFFFffff
>> + * Without ALU32: r1 = 0xFF; r2 = 0xFFFF; r3 = 0xFFFFffff
>> + * Both zero-extend to 64-bit before the kfunc call.
>> + */
>> + ret = bpf_kfunc_call_test5(0xFF, 0xFFFF, 0xFFFFffffULL);
>
> Can we just use 0xFFFFffff instead of 0xFFFFffffULL?
Alexei, can you confirm if I need to respin with this change?
- Hari
next prev parent reply other threads:[~2026-03-13 9:30 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-12 8:01 [PATCH bpf-next v2] selftests/bpf: improve test coverage for kfunc call Hari Bathini
2026-03-12 18:22 ` Yonghong Song
2026-03-13 9:29 ` Hari Bathini [this message]
2026-03-13 14:20 ` Alexei Starovoitov
2026-03-13 16:51 ` Ilya Leoshkevich
2026-03-13 16:22 ` Mykyta Yatsenko
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ec4e7ff6-55e3-4889-b507-fee71fab99f8@linux.ibm.com \
--to=hbathini@linux.ibm.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=linux-kselftest@vger.kernel.org \
--cc=shuah@kernel.org \
--cc=yonghong.song@linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox