]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
selftests/bpf: Removed obsolete tests
authorMykyta Yatsenko <yatsenko@meta.com>
Sun, 1 Feb 2026 02:54:02 +0000 (18:54 -0800)
committerAndrii Nakryiko <andrii@kernel.org>
Wed, 4 Feb 2026 00:58:47 +0000 (16:58 -0800)
Now bpf_timer can be used in tracepoints, so these tests are no longer
relevant.

Signed-off-by: Mykyta Yatsenko <yatsenko@meta.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/20260201025403.66625-9-alexei.starovoitov@gmail.com
tools/testing/selftests/bpf/progs/verifier_helper_restricted.c

index 059aa716e3d0badba8a62ff3c957ce0847e72001..889c9b78b912e444d22b92eef5d524a35fe9e595 100644 (file)
@@ -17,17 +17,6 @@ struct {
        __type(value, struct val);
 } map_spin_lock SEC(".maps");
 
-struct timer {
-       struct bpf_timer t;
-};
-
-struct {
-       __uint(type, BPF_MAP_TYPE_ARRAY);
-       __uint(max_entries, 1);
-       __type(key, int);
-       __type(value, struct timer);
-} map_timer SEC(".maps");
-
 SEC("kprobe")
 __description("bpf_ktime_get_coarse_ns is forbidden in BPF_PROG_TYPE_KPROBE")
 __failure __msg("program of this type cannot use helper bpf_ktime_get_coarse_ns")
@@ -84,106 +73,6 @@ __naked void bpf_prog_type_raw_tracepoint_1(void)
        : __clobber_all);
 }
 
-SEC("kprobe")
-__description("bpf_timer_init isn restricted in BPF_PROG_TYPE_KPROBE")
-__failure __msg("tracing progs cannot use bpf_timer yet")
-__naked void in_bpf_prog_type_kprobe_2(void)
-{
-       asm volatile ("                                 \
-       r2 = r10;                                       \
-       r2 += -8;                                       \
-       r1 = 0;                                         \
-       *(u64*)(r2 + 0) = r1;                           \
-       r1 = %[map_timer] ll;                           \
-       call %[bpf_map_lookup_elem];                    \
-       if r0 == 0 goto l0_%=;                          \
-       r1 = r0;                                        \
-       r2 = %[map_timer] ll;                           \
-       r3 = 1;                                         \
-l0_%=: call %[bpf_timer_init];                         \
-       exit;                                           \
-"      :
-       : __imm(bpf_map_lookup_elem),
-         __imm(bpf_timer_init),
-         __imm_addr(map_timer)
-       : __clobber_all);
-}
-
-SEC("perf_event")
-__description("bpf_timer_init is forbidden in BPF_PROG_TYPE_PERF_EVENT")
-__failure __msg("tracing progs cannot use bpf_timer yet")
-__naked void bpf_prog_type_perf_event_2(void)
-{
-       asm volatile ("                                 \
-       r2 = r10;                                       \
-       r2 += -8;                                       \
-       r1 = 0;                                         \
-       *(u64*)(r2 + 0) = r1;                           \
-       r1 = %[map_timer] ll;                           \
-       call %[bpf_map_lookup_elem];                    \
-       if r0 == 0 goto l0_%=;                          \
-       r1 = r0;                                        \
-       r2 = %[map_timer] ll;                           \
-       r3 = 1;                                         \
-l0_%=: call %[bpf_timer_init];                         \
-       exit;                                           \
-"      :
-       : __imm(bpf_map_lookup_elem),
-         __imm(bpf_timer_init),
-         __imm_addr(map_timer)
-       : __clobber_all);
-}
-
-SEC("tracepoint")
-__description("bpf_timer_init is forbidden in BPF_PROG_TYPE_TRACEPOINT")
-__failure __msg("tracing progs cannot use bpf_timer yet")
-__naked void in_bpf_prog_type_tracepoint_2(void)
-{
-       asm volatile ("                                 \
-       r2 = r10;                                       \
-       r2 += -8;                                       \
-       r1 = 0;                                         \
-       *(u64*)(r2 + 0) = r1;                           \
-       r1 = %[map_timer] ll;                           \
-       call %[bpf_map_lookup_elem];                    \
-       if r0 == 0 goto l0_%=;                          \
-       r1 = r0;                                        \
-       r2 = %[map_timer] ll;                           \
-       r3 = 1;                                         \
-l0_%=: call %[bpf_timer_init];                         \
-       exit;                                           \
-"      :
-       : __imm(bpf_map_lookup_elem),
-         __imm(bpf_timer_init),
-         __imm_addr(map_timer)
-       : __clobber_all);
-}
-
-SEC("raw_tracepoint")
-__description("bpf_timer_init is forbidden in BPF_PROG_TYPE_RAW_TRACEPOINT")
-__failure __msg("tracing progs cannot use bpf_timer yet")
-__naked void bpf_prog_type_raw_tracepoint_2(void)
-{
-       asm volatile ("                                 \
-       r2 = r10;                                       \
-       r2 += -8;                                       \
-       r1 = 0;                                         \
-       *(u64*)(r2 + 0) = r1;                           \
-       r1 = %[map_timer] ll;                           \
-       call %[bpf_map_lookup_elem];                    \
-       if r0 == 0 goto l0_%=;                          \
-       r1 = r0;                                        \
-       r2 = %[map_timer] ll;                           \
-       r3 = 1;                                         \
-l0_%=: call %[bpf_timer_init];                         \
-       exit;                                           \
-"      :
-       : __imm(bpf_map_lookup_elem),
-         __imm(bpf_timer_init),
-         __imm_addr(map_timer)
-       : __clobber_all);
-}
-
 SEC("kprobe")
 __description("bpf_spin_lock is forbidden in BPF_PROG_TYPE_KPROBE")
 __failure __msg("tracing progs cannot use bpf_spin_lock yet")