diff options
author | Eduard Zingerman <eddyz87@gmail.com> | 2025-07-08 15:08:56 -0700 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2025-07-08 18:57:47 -0700 |
commit | ad97cb2ed06a6ba9025fd8bd14fa24369550cbb5 (patch) | |
tree | ac820a594de11c3457c9f7766e89e1f6cab9a02c /tools | |
parent | 3413bc0cf16e38db53830c837b4bf639fb2126ef (diff) |
selftests/bpf: Remove enum64 case from __arg_untrusted test suite
The enum64 type used by verifier_global_ptr_args test case requires
CONFIG_SCHED_CLASS_EXT. At the moment selftets do not depend on this
option. There are just a few enum64 types in the kernel. Instead of
tying selftests to implementation details of unrelated sub-systems,
just remove enum64 test case. Simple enums are covered and that should
be sufficient.
Fixes: 68cca81fd57f ("selftests/bpf: tests for __arg_untrusted void * global func params")
Reported-by: Amery Hung <ameryhung@gmail.com>
Signed-off-by: Eduard Zingerman <eddyz87@gmail.com>
Tested-by: Amery Hung <ameryhung@gmail.com>
Link: https://lore.kernel.org/r/20250708220856.3059578-1-eddyz87@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'tools')
-rw-r--r-- | tools/testing/selftests/bpf/progs/verifier_global_ptr_args.c | 8 |
1 files changed, 1 insertions, 7 deletions
diff --git a/tools/testing/selftests/bpf/progs/verifier_global_ptr_args.c b/tools/testing/selftests/bpf/progs/verifier_global_ptr_args.c index b346f669d159..181da86ba5f0 100644 --- a/tools/testing/selftests/bpf/progs/verifier_global_ptr_args.c +++ b/tools/testing/selftests/bpf/progs/verifier_global_ptr_args.c @@ -275,11 +275,6 @@ __weak int subprog_enum_untrusted(enum bpf_attach_type *p __arg_untrusted) return *(int *)p; } -__weak int subprog_enum64_untrusted(enum scx_public_consts *p __arg_untrusted) -{ - return *(int *)p; -} - SEC("tp_btf/sys_enter") __success __log_level(2) @@ -306,10 +301,9 @@ int anything_to_untrusted_mem(void *ctx) subprog_void_untrusted((void *)mem + off); /* variable offset to untrusted mem (trusted) */ subprog_void_untrusted(bpf_get_current_task_btf() + off); - /* variable offset to untrusted char/enum/enum64 (map) */ + /* variable offset to untrusted char/enum (map) */ subprog_char_untrusted(mem + off); subprog_enum_untrusted((void *)mem + off); - subprog_enum64_untrusted((void *)mem + off); return 0; } |