From patchwork Wed Aug 24 16:39:06 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Daniel_M=C3=BCller?= X-Patchwork-Id: 12953806 X-Patchwork-Delegate: bpf@iogearbox.net Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id B374CC00140 for ; Wed, 24 Aug 2022 16:39:14 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234790AbiHXQjN (ORCPT ); Wed, 24 Aug 2022 12:39:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60786 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234115AbiHXQjM (ORCPT ); Wed, 24 Aug 2022 12:39:12 -0400 Received: from mout01.posteo.de (mout01.posteo.de [185.67.36.65]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B31579C506 for ; Wed, 24 Aug 2022 09:39:11 -0700 (PDT) Received: from submission (posteo.de [185.67.36.169]) by mout01.posteo.de (Postfix) with ESMTPS id 04779240029 for ; Wed, 24 Aug 2022 18:39:09 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=posteo.net; s=2017; t=1661359150; bh=P1RsBqCRRezVNBirWXboUlNd84CQGYFCPshH/9/Tfr0=; h=From:To:Subject:Date:From; b=U22UcYJVdUvnrF6XencXqqN9wTesFZo4E+4UmtJ14zzeH2xrvjRU2S42mw9oQFoMf 3LMr05GYoolgu5QLgrGijq+4kojLUGdaeUymm0PRr8LG6M7p+vzPiAGZSiehLnOBxY E2KhlPI7qVx40DucCciHecbnqY4jvjIq0dSLYSkoV15nmt6QkieP4R41Qpf84kANG/ bK3eJd+jpsMfevCxEFHJS5nKKANppqQQYM0Pms2VjKb6M9rZUsZ2ZVwtW8tcUCvtCi qqwDzvg+RPzli9mCwaoYiXxnFm8YUBbu3E19mxE8/n/emoTuqIPx9uKsL2rqN+mG4c B5HfAjfXjGJOQ== Received: from customer (localhost [127.0.0.1]) by submission (posteo.de) with ESMTPSA id 4MCWyP0WWHz9rxS; Wed, 24 Aug 2022 18:39:08 +0200 (CEST) From: =?utf-8?q?Daniel_M=C3=BCller?= To: bpf@vger.kernel.org, ast@kernel.org, andrii@kernel.org, daniel@iogearbox.net, kernel-team@fb.com Subject: [PATCH bpf-next] selftests/bpf: Add cb_refs test to s390x deny list Date: Wed, 24 Aug 2022 16:39:06 +0000 Message-Id: <20220824163906.1186832-1-deso@posteo.net> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org X-Patchwork-Delegate: bpf@iogearbox.net The cb_refs BPF selftest is failing execution on s390x machines. This is a newly added test that requires a feature not presently supported on this architecture. Denylist the test for this architecture. Fixes: 3cf7e7d8685c ("selftests/bpf: Add tests for reference state fixes for callbacks") Signed-off-by: Daniel Müller --- tools/testing/selftests/bpf/DENYLIST.s390x | 1 + 1 file changed, 1 insertion(+) diff --git a/tools/testing/selftests/bpf/DENYLIST.s390x b/tools/testing/selftests/bpf/DENYLIST.s390x index a708c3d..37bafcb 100644 --- a/tools/testing/selftests/bpf/DENYLIST.s390x +++ b/tools/testing/selftests/bpf/DENYLIST.s390x @@ -66,3 +66,4 @@ select_reuseport # intermittently fails on new s390x set xdp_synproxy # JIT does not support calling kernel function (kfunc) unpriv_bpf_disabled # fentry setget_sockopt # attach unexpected error: -524 (trampoline) +cb_refs # expected error message unexpected error: -524 (trampoline)