Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp4428790iog; Tue, 21 Jun 2022 20:43:37 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vG9xtECcVq9xVza4Av/JjRvEvwJWjsYExcvB7iJlzf5X56DUAPREy+QHqXIfd1z1pt4dfi X-Received: by 2002:a17:90a:4e4b:b0:1ec:d1e2:3cd0 with SMTP id t11-20020a17090a4e4b00b001ecd1e23cd0mr1448666pjl.244.1655869417161; Tue, 21 Jun 2022 20:43:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655869417; cv=none; d=google.com; s=arc-20160816; b=v61uscZ7rgFiLqMpqIgKbA5NBzqhMDuFvv8BhZP/cFRe/jrMvy3/P92NbcNCJewxFz 3Giqx/eGLDMXN+QUvXHqb+IEfKzjMzDpYQxZLarffFn8LW96Ca6GO/pGeP8hDHDbIEJf kYW+AdEW14/8boU5+4t0lBehQ3s0b2AzEyeyEHfnaztbXPoW+34WW/LIOzbu4PDA/Dh2 vGpI6F97tsho02C5lTGiIjUhpigHIJQxYFLdZX+rHTGn+cE5We7OMJ2QIaNLzB8GwZ2R BDdUPGnngA0yhJvPK8xcLAhzOHa2Y72ananm9z4agaS9pqg8T7NA1xeY7tXee2DxM5kA rJMA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:abuse-reports-to:tuid:mime-version:message-id :date:subject:cc:to:from; bh=yq6dhTyyT+yr2IiLu6C040weXEkqsl5pow1+95UBPOU=; b=pnsPtccHHjeE5Xhr8WgYM2faiokGuROUBIxw1MwVrZMJXUvTYocKRZ8KefrvDNcZ8/ hxTdZtSnW1mBI9q0FDqS5q6UUhi/buF/4Fjn2G87Lr2jxOKMhOWy995zNkVs3X8Lh3tH o1jCtm5Nq1vzlo/Pd2uPckRBElpoBUf3GSOagVXvjCAZqpGSQYRz9NAbiENSOoRTJUcE lwDkTANKYRfpOhNsRy7hVaOvktmCniyKl367O/lOtfvz2TYBsMrWjpuoxbLxg9AZ+kzy MG0sWJyNtMtVWfyVSp0RkDPDDbxoqYGsmyBRABiBf/898ywFclZ7GxRajlptDj2HQR06 w2Xw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q5-20020a635c05000000b00408c5943df5si20671880pgb.38.2022.06.21.20.43.24; Tue, 21 Jun 2022 20:43:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1356486AbiFVDT4 (ORCPT + 99 others); Tue, 21 Jun 2022 23:19:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43810 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231720AbiFVDTz (ORCPT ); Tue, 21 Jun 2022 23:19:55 -0400 Received: from ssh248.corpemail.net (ssh248.corpemail.net [210.51.61.248]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 483363123C; Tue, 21 Jun 2022 20:19:52 -0700 (PDT) Received: from ([60.208.111.195]) by ssh248.corpemail.net ((D)) with ASMTP (SSL) id QZP00047; Wed, 22 Jun 2022 11:19:47 +0800 Received: from localhost.localdomain (10.49.41.6) by jtjnmail201608.home.langchao.com (10.100.2.8) with Microsoft SMTP Server id 15.1.2308.27; Wed, 22 Jun 2022 11:19:47 +0800 From: Simon wang To: , , CC: , , , Simon Wang Subject: [PATCH] bpf: Replace 0 with BPF_K Date: Tue, 21 Jun 2022 23:19:23 -0400 Message-ID: <20220622031923.65692-1-wangchuanguo@inspur.com> X-Mailer: git-send-email 2.18.2 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.49.41.6] tUid: 2022622111947fb8a8e5ac3db23c86facd553ee87b236 X-Abuse-Reports-To: service@corp-email.com Abuse-Reports-To: service@corp-email.com X-Complaints-To: service@corp-email.com X-Report-Abuse-To: service@corp-email.com X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Simon Wang Enhance readability. Signed-off-by: Simon Wang --- kernel/bpf/verifier.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index 2859901ffbe3..29060f15daab 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -9064,7 +9064,7 @@ static int check_alu_op(struct bpf_verifier_env *env, struct bpf_insn *insn) if (opcode == BPF_END || opcode == BPF_NEG) { if (opcode == BPF_NEG) { - if (BPF_SRC(insn->code) != 0 || + if (BPF_SRC(insn->code) != BPF_K || insn->src_reg != BPF_REG_0 || insn->off != 0 || insn->imm != 0) { verbose(env, "BPF_NEG uses reserved fields\n"); -- 2.27.0