diff options
author | Maciej Żenczykowski <maze@google.com> | 2024-03-15 08:08:59 +0000 |
---|---|---|
committer | Maciej Żenczykowski <maze@google.com> | 2024-03-15 09:01:42 +0000 |
commit | 40722a77f8fec020fa6e0b3595c9a10c309577a4 (patch) | |
tree | ec20d93dcf3dcba4391f19f74f398b725c88f32f | |
parent | 5e86dcf660af60ad7a1a33d18f271f7043db72b9 (diff) | |
download | netd-40722a77f8fec020fa6e0b3595c9a10c309577a4.tar.gz |
kernel_test: add TestRequireBpfUnprivDefaultOn
Turns out this was always the case,
and has always been required...
Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I2f63d8ad9534997a4e9a68bc83f53ff180c21a31
-rw-r--r-- | tests/kernel_test.cpp | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/tests/kernel_test.cpp b/tests/kernel_test.cpp index 14950d62..775be14f 100644 --- a/tests/kernel_test.cpp +++ b/tests/kernel_test.cpp @@ -74,6 +74,11 @@ TEST(KernelTest, TestRateLimitingSupport) { EXPECT_TRUE(configVerifier.hasOption("CONFIG_BPF_JIT")); } +TEST(KernelTest, TestRequireBpfUnprivDefaultOn) { + KernelConfigVerifier configVerifier; + EXPECT_FALSE(configVerifier.hasOption("CONFIG_BPF_UNPRIV_DEFAULT_OFF")); +} + TEST(KernelTest, TestBpfJitAlwaysOn) { // 32-bit arm & x86 kernels aren't capable of JIT-ing all of our BPF code, if (bpf::isKernel32Bit()) GTEST_SKIP() << "Exempt on 32-bit kernel."; |