The test_bpftool.sh script runs a python unittest script checking
bpftool json output on different commands. As part of the ongoing effort
to get rid of any standalone test, this script should either be
converted to test_progs or removed.

As validating bpftool json output does not bring much value to the test
base (and because it would need test_progs to bring in a json parser),
remove the standalone test script.

Signed-off-by: Alexis LothorĂ© (eBPF Foundation) <[email protected]>
---
This removal follows the discussion in [1]

[1] https://lore.kernel.org/bpf/[email protected]/
---
 tools/testing/selftests/bpf/Makefile        |   4 +-
 tools/testing/selftests/bpf/test_bpftool.py | 174 ----------------------------
 tools/testing/selftests/bpf/test_bpftool.sh |  11 --
 3 files changed, 1 insertion(+), 188 deletions(-)

diff --git a/tools/testing/selftests/bpf/Makefile 
b/tools/testing/selftests/bpf/Makefile
index c6bf4dfb1495..c3e1116b146e 100644
--- a/tools/testing/selftests/bpf/Makefile
+++ b/tools/testing/selftests/bpf/Makefile
@@ -107,14 +107,12 @@ TEST_PROGS := test_kmod.sh \
        test_lirc_mode2.sh \
        test_xdping.sh \
        test_bpftool_build.sh \
-       test_bpftool.sh \
        test_doc_build.sh \
        test_xsk.sh \
        test_xdp_features.sh
 
 TEST_PROGS_EXTENDED := \
-       ima_setup.sh verify_sig_setup.sh \
-       test_bpftool.py
+       ima_setup.sh verify_sig_setup.sh
 
 TEST_KMODS := bpf_testmod.ko bpf_test_no_cfi.ko bpf_test_modorder_x.ko \
        bpf_test_modorder_y.ko bpf_test_rqspinlock.ko
diff --git a/tools/testing/selftests/bpf/test_bpftool.py 
b/tools/testing/selftests/bpf/test_bpftool.py
deleted file mode 100644
index 1c2408ee1f5d..000000000000
--- a/tools/testing/selftests/bpf/test_bpftool.py
+++ /dev/null
@@ -1,174 +0,0 @@
-# SPDX-License-Identifier: GPL-2.0
-# Copyright (c) 2020 SUSE LLC.
-
-import collections
-import functools
-import json
-import os
-import socket
-import subprocess
-import unittest
-
-
-# Add the source tree of bpftool and /usr/local/sbin to PATH
-cur_dir = os.path.dirname(os.path.realpath(__file__))
-bpftool_dir = os.path.abspath(os.path.join(cur_dir, "..", "..", "..", "..",
-                                           "tools", "bpf", "bpftool"))
-os.environ["PATH"] = bpftool_dir + ":/usr/local/sbin:" + os.environ["PATH"]
-
-
-class IfaceNotFoundError(Exception):
-    pass
-
-
-class UnprivilegedUserError(Exception):
-    pass
-
-
-def _bpftool(args, json=True):
-    _args = ["bpftool"]
-    if json:
-        _args.append("-j")
-    _args.extend(args)
-
-    return subprocess.check_output(_args)
-
-
-def bpftool(args):
-    return _bpftool(args, json=False).decode("utf-8")
-
-
-def bpftool_json(args):
-    res = _bpftool(args)
-    return json.loads(res)
-
-
-def get_default_iface():
-    for iface in socket.if_nameindex():
-        if iface[1] != "lo":
-            return iface[1]
-    raise IfaceNotFoundError("Could not find any network interface to probe")
-
-
-def default_iface(f):
-    @functools.wraps(f)
-    def wrapper(*args, **kwargs):
-        iface = get_default_iface()
-        return f(*args, iface, **kwargs)
-    return wrapper
-
-DMESG_EMITTING_HELPERS = [
-        "bpf_probe_write_user",
-        "bpf_trace_printk",
-        "bpf_trace_vprintk",
-    ]
-
-class TestBpftool(unittest.TestCase):
-    @classmethod
-    def setUpClass(cls):
-        if os.getuid() != 0:
-            raise UnprivilegedUserError(
-                "This test suite needs root privileges")
-
-    @default_iface
-    def test_feature_dev_json(self, iface):
-        unexpected_helpers = DMESG_EMITTING_HELPERS
-        expected_keys = [
-            "syscall_config",
-            "program_types",
-            "map_types",
-            "helpers",
-            "misc",
-        ]
-
-        res = bpftool_json(["feature", "probe", "dev", iface])
-        # Check if the result has all expected keys.
-        self.assertCountEqual(res.keys(), expected_keys)
-        # Check if unexpected helpers are not included in helpers probes
-        # result.
-        for helpers in res["helpers"].values():
-            for unexpected_helper in unexpected_helpers:
-                self.assertNotIn(unexpected_helper, helpers)
-
-    def test_feature_kernel(self):
-        test_cases = [
-            bpftool_json(["feature", "probe", "kernel"]),
-            bpftool_json(["feature", "probe"]),
-            bpftool_json(["feature"]),
-        ]
-        unexpected_helpers = DMESG_EMITTING_HELPERS
-        expected_keys = [
-            "syscall_config",
-            "system_config",
-            "program_types",
-            "map_types",
-            "helpers",
-            "misc",
-        ]
-
-        for tc in test_cases:
-            # Check if the result has all expected keys.
-            self.assertCountEqual(tc.keys(), expected_keys)
-            # Check if unexpected helpers are not included in helpers probes
-            # result.
-            for helpers in tc["helpers"].values():
-                for unexpected_helper in unexpected_helpers:
-                    self.assertNotIn(unexpected_helper, helpers)
-
-    def test_feature_kernel_full(self):
-        test_cases = [
-            bpftool_json(["feature", "probe", "kernel", "full"]),
-            bpftool_json(["feature", "probe", "full"]),
-        ]
-        expected_helpers = DMESG_EMITTING_HELPERS
-
-        for tc in test_cases:
-            # Check if expected helpers are included at least once in any
-            # helpers list for any program type. Unfortunately we cannot assume
-            # that they will be included in all program types or a specific
-            # subset of programs. It depends on the kernel version and
-            # configuration.
-            found_helpers = False
-
-            for helpers in tc["helpers"].values():
-                if all(expected_helper in helpers
-                       for expected_helper in expected_helpers):
-                    found_helpers = True
-                    break
-
-            self.assertTrue(found_helpers)
-
-    def test_feature_kernel_full_vs_not_full(self):
-        full_res = bpftool_json(["feature", "probe", "full"])
-        not_full_res = bpftool_json(["feature", "probe"])
-        not_full_set = set()
-        full_set = set()
-
-        for helpers in full_res["helpers"].values():
-            for helper in helpers:
-                full_set.add(helper)
-
-        for helpers in not_full_res["helpers"].values():
-            for helper in helpers:
-                not_full_set.add(helper)
-
-        self.assertCountEqual(full_set - not_full_set,
-                              set(DMESG_EMITTING_HELPERS))
-        self.assertCountEqual(not_full_set - full_set, set())
-
-    def test_feature_macros(self):
-        expected_patterns = [
-            r"/\*\*\* System call availability \*\*\*/",
-            r"#define HAVE_BPF_SYSCALL",
-            r"/\*\*\* eBPF program types \*\*\*/",
-            r"#define HAVE.*PROG_TYPE",
-            r"/\*\*\* eBPF map types \*\*\*/",
-            r"#define HAVE.*MAP_TYPE",
-            r"/\*\*\* eBPF helper functions \*\*\*/",
-            r"#define HAVE.*HELPER",
-            r"/\*\*\* eBPF misc features \*\*\*/",
-        ]
-
-        res = bpftool(["feature", "probe", "macros"])
-        for pattern in expected_patterns:
-            self.assertRegex(res, pattern)
diff --git a/tools/testing/selftests/bpf/test_bpftool.sh 
b/tools/testing/selftests/bpf/test_bpftool.sh
deleted file mode 100755
index 718f59692ccb..000000000000
--- a/tools/testing/selftests/bpf/test_bpftool.sh
+++ /dev/null
@@ -1,11 +0,0 @@
-#!/bin/bash
-# SPDX-License-Identifier: GPL-2.0
-# Copyright (c) 2020 SUSE LLC.
-
-# 'make -C tools/testing/selftests/bpf install' will install to SCRIPT_DIR
-SCRIPT_DIR=$(dirname $(realpath $0))
-
-# 'make -C tools/testing/selftests/bpf' will install to BPFTOOL_INSTALL_PATH
-BPFTOOL_INSTALL_PATH="$SCRIPT_DIR"/tools/sbin
-export PATH=$SCRIPT_DIR:$BPFTOOL_INSTALL_PATH:$PATH
-python3 -m unittest -v test_bpftool.TestBpftool

---
base-commit: 2294d0a45832f16cc20e9c1431165b4e0eb69bcb
change-id: 20260211-bpftool_feature-64114bcc7740

Best regards,
-- 
Alexis LothorĂ© (eBPF Foundation) <[email protected]>


Reply via email to