summaryrefslogtreecommitdiff
path: root/tools
diff options
context:
space:
mode:
authorEduard Zingerman <eddyz87@gmail.com>2025-07-08 15:08:56 -0700
committerAlexei Starovoitov <ast@kernel.org>2025-07-08 18:57:47 -0700
commitad97cb2ed06a6ba9025fd8bd14fa24369550cbb5 (patch)
treeac820a594de11c3457c9f7766e89e1f6cab9a02c /tools
parent3413bc0cf16e38db53830c837b4bf639fb2126ef (diff)
selftests/bpf: Remove enum64 case from __arg_untrusted test suite
The enum64 type used by verifier_global_ptr_args test case requires CONFIG_SCHED_CLASS_EXT. At the moment selftets do not depend on this option. There are just a few enum64 types in the kernel. Instead of tying selftests to implementation details of unrelated sub-systems, just remove enum64 test case. Simple enums are covered and that should be sufficient. Fixes: 68cca81fd57f ("selftests/bpf: tests for __arg_untrusted void * global func params") Reported-by: Amery Hung <ameryhung@gmail.com> Signed-off-by: Eduard Zingerman <eddyz87@gmail.com> Tested-by: Amery Hung <ameryhung@gmail.com> Link: https://lore.kernel.org/r/20250708220856.3059578-1-eddyz87@gmail.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'tools')
-rw-r--r--tools/testing/selftests/bpf/progs/verifier_global_ptr_args.c8
1 files changed, 1 insertions, 7 deletions
diff --git a/tools/testing/selftests/bpf/progs/verifier_global_ptr_args.c b/tools/testing/selftests/bpf/progs/verifier_global_ptr_args.c
index b346f669d159..181da86ba5f0 100644
--- a/tools/testing/selftests/bpf/progs/verifier_global_ptr_args.c
+++ b/tools/testing/selftests/bpf/progs/verifier_global_ptr_args.c
@@ -275,11 +275,6 @@ __weak int subprog_enum_untrusted(enum bpf_attach_type *p __arg_untrusted)
return *(int *)p;
}
-__weak int subprog_enum64_untrusted(enum scx_public_consts *p __arg_untrusted)
-{
- return *(int *)p;
-}
-
SEC("tp_btf/sys_enter")
__success
__log_level(2)
@@ -306,10 +301,9 @@ int anything_to_untrusted_mem(void *ctx)
subprog_void_untrusted((void *)mem + off);
/* variable offset to untrusted mem (trusted) */
subprog_void_untrusted(bpf_get_current_task_btf() + off);
- /* variable offset to untrusted char/enum/enum64 (map) */
+ /* variable offset to untrusted char/enum (map) */
subprog_char_untrusted(mem + off);
subprog_enum_untrusted((void *)mem + off);
- subprog_enum64_untrusted((void *)mem + off);
return 0;
}