From nobody Fri Apr 3 02:56:34 2026 Received: from mail-wm1-f43.google.com (mail-wm1-f43.google.com [209.85.128.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 46639299A84 for ; Wed, 18 Feb 2026 09:20:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.43 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771406424; cv=none; b=SX7jbKAce/nzC/3XeX545y7dbMfze1WAa0gcuYZPEQf/Y8nOrUlbYaDTT/UV479DG9sQgCPXQBWDFmUwfHHvn0YC/LmEF8viMyMRepe6ncJlY9tshkJ/y4/EW7rEbHJNrZJJrWZYIDe08RNewAyh1fDGEgyYQ/zmrZVu9Ax8DXA= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771406424; c=relaxed/simple; bh=G8i8l1HaUJwIvvVaqfhi1fhbz840otW5i4iqXUQWS+4=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=NcXRXI0mjeigMkDsgvfEhce6w+0ht/Fi61nLhOSIZziH0wE7KDG70jJXUE7bAi5ANnUNpjxAW3hXr8QfW0pR1pcQKkBbxokXHlNjhj8udh5WkVKMOwxJMfXCnuHd7c+NQDHzJ2plSeYuFULbvvixhjnzr0kHhjmXQEVPl8TrBxg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=jabSSRve; arc=none smtp.client-ip=209.85.128.43 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="jabSSRve" Received: by mail-wm1-f43.google.com with SMTP id 5b1f17b1804b1-480706554beso49642645e9.1 for ; Wed, 18 Feb 2026 01:20:22 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1771406421; x=1772011221; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=GT47+DDqY1qh+uutKLyaKTWw+O5qS7pkg63HL+xIqBo=; b=jabSSRvekg3DRCyMFsYJyuYp83OWeRHZaHI5fK7PIr/UCygBn1xAUdvA3B7EMX2Dnt MqmDPoW7BPIWFp0JnK5kM1dLpSWON8QGv1wVs7yEgj/+RTAhMfHGHTGgxjLErJMqEZqb zGjZc8CXEgMseEgVrpzhQtdPs/yk/QIcMlnh7O668DbXmK+Ulj+AJ/C2kxatZWvToGg/ fPB76rK7QmP0T0aoHUJyRdYMhYyjfqOh342vToFR1+6oHEG8VUQClmheIdKU3zGHwfXs GpRALIDSXrj9SJTy3ZGWRtQW6E+J77/7vaTizLrKOybQbtmR/f4UP08RaoEH0p7rb7bI /Hsw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1771406421; x=1772011221; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=GT47+DDqY1qh+uutKLyaKTWw+O5qS7pkg63HL+xIqBo=; b=Lc8ntPa3sRS8M+vcAYIDsB9RVw5g5yMBD1jilN2xI3XhkMyyQg7vVK6zW8WEegjHT4 Vt7h//4afVoB2EromU9GhIzBDYWLUmfb1tQ5KYa4pvb2zSgQikXsDzoNhod1EisyOn7r i78+lv3YD8IYubpoOwtfFikNhbJ4ImjcYiuZPRQD/XNPpev0zMjIZoRIMBjmdHTx2lxt Valy4VNuJxzm3LJVh6TeKd8pjyxNx+jQaT6zC+GQcfC/aQsYkZxXRFbCNy5M//pag5HC kXQZYuipFca/xf22eAHWXjvHpLdSLFRfNeTiptYA1eyqkUhGMzTWl8GDXYa0v7A5QwWm o/GA== X-Forwarded-Encrypted: i=1; AJvYcCUV0MCEV2/+Bc83R8ZyWZMkyEY4So17Yw9Q9NeVL54yW2ym8f+mzsJbmnBeAYFdJrX9zSp3b/uTTPRRFQo=@vger.kernel.org X-Gm-Message-State: AOJu0Yy8S2W+pGvHOmegFJtacHnfBWvk3puxL18nAVvTL6HhKVDVtzpM 1IewitbMnJyowphKgO8F3Q++EaRt983QYBfVmDr8goMzgH/5I4dRcuAd X-Gm-Gg: AZuq6aKq7W5mq9wPOxX0cdBtTHyh07YR6AJ6YORCvPSXNjJhpf36Xy4jQZFsNuLoxq4 xKtOeC9wQDwvFIUHLZRBp/Fs+tn7qh6zWPqhstmFfSb2all+eW8/+qXq0VPuTuMJkFJTv0HY+Rh qjDT/fRJsewm9i+GgSfz3tZcwJB5YpOetWv6ygptzD3Me4SgfWbzwO/JeFDx5Ao+DqOeagosMLe qj1RWp1qG12sZG+DXcBqloGgIl2mx/eaQWFQCzbA+F77TPpQgntepWK/4SSKh0mRv3JUSKALY+h gwcZBzxwiIGB4/l2HHOyCmp+x8qhDLUTp3kMtGObH4SPny1xfT/42MlA+a7e4ZYpQn9EQCyvsEE cHik14ak/yxlNsU7E5o4wf/g2NqLyee0OYjIyoxJnGrs7PM6OEtJUOhNyGtRj06hQ677O+t/QwY Z95UF13fZGl81U X-Received: by 2002:a05:600c:154f:b0:483:3384:a873 with SMTP id 5b1f17b1804b1-48379c15d86mr228677965e9.36.1771406420254; Wed, 18 Feb 2026 01:20:20 -0800 (PST) Received: from wdesk. ([86.57.23.242]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43796ac8d46sm41352691f8f.32.2026.02.18.01.20.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 Feb 2026 01:20:19 -0800 (PST) From: Mahdi Faramarzpour X-Google-Original-From: Mahdi Faramarzpour To: bpf@vger.kernel.org Cc: Magnus Karlsson , Maciej Fijalkowski , Stanislav Fomichev , Andrii Nakryiko , Eduard Zingerman , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Hao Luo , Jiri Olsa , Shuah Khan , netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Mahdi Faramarzpour Subject: [PATCH bpf-next] bpf: fix selftest/xsk single test selection Date: Wed, 18 Feb 2026 12:50:02 +0330 Message-Id: <20260218092002.147306-1-mahdifrmz@gmail.com> X-Mailer: git-send-email 2.34.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Mahdi Faramarzpour This commit fixes the integer parsing of -t option. The cli parser only relies on errno to detect parsing errors. The manpage for strtol (https://man7.org/linux/man-pages/man3/strtol.3.html) states that the said function "MAY" set errno to EINVAL in case the conversion fails. Currently on some systems, this leads to a silent failure with return value not being exactly documented in the manpages (probably zero). The reliable way to validate the input is to check whether the endptr has been bumped all the way to the end of the string or not. Fixes: 146e30554a53 ("selftests/xsk: add option to run single test") Signed-off-by: Mahdi Faramarzpour --- v2: - fix style issues v1: https://lore.kernel.org/all/20260217080326.50564-1-mahdifrmz@gmail.com/ --- tools/testing/selftests/bpf/xskxceiver.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/bpf/xskxceiver.c b/tools/testing/selft= ests/bpf/xskxceiver.c index 05b3cebc5..5e4095fd1 100644 --- a/tools/testing/selftests/bpf/xskxceiver.c +++ b/tools/testing/selftests/bpf/xskxceiver.c @@ -200,6 +200,7 @@ static void parse_command_line(struct ifobject *ifobj_t= x, struct ifobject *ifobj struct ifobject *ifobj; u32 interface_nb =3D 0; int option_index, c; + char *eptr; =20 opterr =3D 0; =20 @@ -248,8 +249,8 @@ static void parse_command_line(struct ifobject *ifobj_t= x, struct ifobject *ifobj break; case 't': errno =3D 0; - opt_run_test =3D strtol(optarg, NULL, 0); - if (errno) + opt_run_test =3D strtol(optarg, &eptr, 0); + if (errno || *eptr) print_usage(argv); break; case 'h': --=20 2.34.1